version 1.7, 2004/03/31 17:02:51
|
version 1.41, 2023/06/02 01:20:28
|
Line 30 package Apache::lontrans;
|
Line 30 package Apache::lontrans;
|
|
|
use strict; |
use strict; |
use Apache::Constants qw(:common :remotehost); |
use Apache::Constants qw(:common :remotehost); |
use Apache::lonnet(); |
use Apache::lonnet; |
use Apache::File(); |
|
use Apache::loncommon; |
use Apache::loncommon; |
use LONCAPA::Configuration; |
use Apache::File(); |
|
use LONCAPA qw(:DEFAULT :match); |
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
my $configvars = &LONCAPA::Configuration::read_conf('loncapa.conf'); |
# FIXME line remove when mod_perl fixes BUG#4948 |
|
$r->notes->set('error-notes' => ''); |
|
my $hdrhost = $r->headers_in->get('Host'); |
|
if (($r->uri eq '/adm/service/passback') || |
|
($r->uri eq '/adm/service/roster')) { |
|
return OK; |
|
} |
|
if ($r->uri=~m{^/raw/}) { |
|
if ($hdrhost) { |
|
unless ($hdrhost =~ /^internal\-/) { |
|
my $remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
if (&redirect_raw($remote_ip,$lonhost)) { |
|
my $location = 'https://internal-'.$hdrhost.$r->uri; |
|
$r->headers_out->set(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
} |
|
my $alias = &Apache::lonnet::get_proxy_alias(); |
|
if ($alias) { |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
my $hostname = &Apache::lonnet::hostname($lonhost); |
|
my $ssourl = '/adm/sso'; |
|
if ($r->dir_config('lonOtherAuthenUrl') ne '') { |
|
$ssourl = $r->dir_config('lonOtherAuthenUrl'); |
|
} |
|
if (($hdrhost eq $alias) || ($hdrhost eq $hostname)) { |
|
my $proxyinfo = &Apache::lonnet::get_proxy_settings($r->dir_config('lonDefDomain')); |
|
my ($vpnint,$vpnext); |
|
if (ref($proxyinfo) eq 'HASH') { |
|
$vpnint = $proxyinfo->{'vpnint'}; |
|
$vpnext = $proxyinfo->{'vpnext'}; |
|
} |
|
my ($redirect,$remote_ip); |
|
if ($hdrhost eq $alias) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP); |
|
if (($vpnext && &Apache::lonnet::ip_match($remote_ip,$vpnext)) && |
|
($r->uri !~ m{^/adm/(lti|launch)/})) { |
|
$redirect = $hostname; |
|
} |
|
if ($r->uri eq $ssourl) { |
|
if (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} else { |
|
$redirect = $hostname; |
|
} |
|
} |
|
if ($redirect eq $hdrhost) { |
|
undef($redirect); |
|
} |
|
} elsif ($hdrhost eq $hostname) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
unless (($remote_ip eq '127.0.0.1') || ($remote_ip eq '::1') || |
|
($remote_ip eq &Apache::lonnet::get_host_ip($lonhost)) || |
|
($r->uri=~m{^/adm/(lti|launch)/}) || |
|
($vpnint && &Apache::lonnet::ip_match($remote_ip,$vpnint))) { |
|
$redirect = $alias; |
|
if (($r->uri=~m{^/raw/}) || ($r->uri=~m{^/adm/dns/})) { |
|
my %iphost = &Apache::lonnet::get_iphost(); |
|
if (exists($iphost{$remote_ip})) { |
|
undef($redirect); |
|
} |
|
} elsif ($r->uri eq $ssourl) { |
|
unless (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} |
|
} |
|
} |
|
} |
|
if ($redirect) { |
|
my $uri = $r->uri; |
|
if (($uri eq '/adm/switchserver') || ($uri =~ m{^/Shibboleth.sso/})) { |
|
return DECLINED; |
|
} |
|
unless (($uri eq '/adm/migrateuser') || ($uri eq $ssourl)) { |
|
my %user; |
|
my $handle = &Apache::lonnet::check_for_valid_session($r,undef,\%user); |
|
if (($handle) && ($user{'name'} ne '') && ($user{'domain'} ne '')) { |
|
unless (($user{'name'} eq 'public') && ($user{'domain'} eq 'public')) { |
|
my $dest = '/adm/migrateuser'; |
|
my $token = &set_token($r,$dest,$remote_ip,\%user); |
|
unless ($token eq '') { |
|
$r->internal_redirect("$dest?token=$token"); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return DECLINED; |
|
} |
|
} |
|
} |
|
} |
|
my $protocol = 'http'; |
|
my $port = $r->get_server_port(); |
|
if ($port eq '443') { |
|
$protocol = 'https'; |
|
} |
|
if ($uri =~ m{^(/adm/css/)(.+)(.css)$}) { |
|
$uri = $1.&escape($2).$3; |
|
} |
|
my $location = $protocol.'://'.$redirect.$uri; |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$location .= '?ttoken='.$token; |
|
} |
|
} elsif ($r->args) { |
|
$location .= '?'.$r->args; |
|
} |
|
$r->header_out(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$r->args('ttoken='.$token); |
|
} |
|
} |
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
my $fn = $r->uri(); |
my $fn = $r->uri(); |
$fn=~s/^\/raw//; |
$fn=~s/^\/raw//; |
my (undef,undef,$udom,$uname,@ufile)=split(/\//,$fn); |
my (undef,undef,$udom,$uname,@ufile)=split(/\//,$fn); |
$ufile[-1]=~s/^[\~\.]+//; |
if (@ufile) { $ufile[-1]=~s/^[\~\.]+//; } |
my $chome=&Apache::lonnet::homeserver($uname,$udom); |
my $chome=&Apache::lonnet::homeserver($uname,$udom); |
if ($chome eq $$configvars{'lonHostID'}) { |
my $allowed=0; |
$r->filename(&Apache::loncommon::propath($udom,$uname). |
my @ids=&Apache::lonnet::current_machine_ids(); |
'/userfiles/'.(join('/',@ufile))); |
foreach my $id (@ids) { if ($id eq $chome) { $allowed=1; } } |
} |
if ($allowed) { |
} elsif ($r->uri=~m|^/~|) { |
$r->filename(&propath($udom,$uname). |
#internal authentication, needs fixup. |
'/userfiles/'.(join('/',@ufile))); |
my $fn = $r->uri(); # non users do not get the full path request |
} |
# through SCRIPT_FILENAME |
return OK; |
$fn=~s|^/~(\w+)|/home/$1/public_html|; |
} elsif ($r->uri =~ m{^\Q/adm/wrapper/ext/https:/\E[^/]}) { |
$r->filename($fn); |
my $uri = $r->uri; |
} else { return DECLINED; } |
$uri =~ s{^(\Q/adm/wrapper/ext/https:/\E)}{$1/}; |
return OK; |
$r->uri($uri); |
|
} |
|
return DECLINED; |
} |
} |
|
|
1; |
sub redirect_raw { |
__END__ |
my ($remote_ip,$lonhost) = @_; |
|
my @remhostids = &Apache::lonnet::get_hosts_from_ip($remote_ip); |
|
my $redirect; |
|
while (@remhostids) { |
|
my $try_server = pop(@remhostids); |
|
my $remhostname = &Apache::lonnet::hostname($try_server); |
|
if ($remhostname) { |
|
my $remoterev = &Apache::lonnet::get_server_loncaparev(undef,$try_server); |
|
my ($remmajor,$remminor) = ($remoterev =~ /^(\d+)\.(\d+)/); |
|
if (($remmajor > 2) || (($remmajor == 2) && $remminor >= 12)) { |
|
my $internet_names = &Apache::lonnet::get_internet_names($try_server); |
|
if (ref($internet_names) eq 'ARRAY') { |
|
my $intdom = &Apache::lonnet::internet_dom($lonhost); |
|
unless (grep(/^\Q$intdom\E$/,@{$internet_names})) { |
|
my $lonhostname = &Apache::lonnet::hostname($lonhost); |
|
my $serverhomeID = &Apache::lonnet::get_server_homeID($lonhostname); |
|
my $serverhomedom = &Apache::lonnet::host_domain($serverhomeID); |
|
my %domdefaults = &Apache::lonnet::get_domain_defaults($serverhomedom); |
|
my $replication = $domdefaults{'replication'}; |
|
if (ref($replication) eq 'HASH') { |
|
my $remhomeID = &Apache::lonnet::get_server_homeID($remhostname); |
|
my $remhomedom = &Apache::lonnet::host_domain($remhomeID); |
|
my $remprimary = &Apache::lonnet::domain($remhomedom,'primary'); |
|
my $remintdom = &Apache::lonnet::internet_dom($remprimary); |
|
if (ref($replication->{'certreq'}) eq 'ARRAY') { |
|
if (grep(/^\Q$remintdom\E$/,@{$replication->{'certreq'}})) { |
|
$redirect = 0; |
|
} else { |
|
$redirect = 1; |
|
} |
|
} |
|
if (ref($replication->{'nocertreq'}) eq 'ARRAY') { |
|
if (grep(/^\Q$remintdom\E$/,@{$replication->{'nocertreq'}})) { |
|
$redirect = 1; |
|
} else { |
|
$redirect = 0; |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
last; |
|
} |
|
} |
|
return $redirect; |
|
} |
|
|
|
sub set_token { |
|
my ($r,$dest,$remote_ip,$userref) = @_; |
|
my (%info,%user); |
|
if ($dest eq '/adm/migrateuser') { |
|
return unless (ref($userref) eq 'HASH'); |
|
%user = %{$userref}; |
|
%info = ('ip' => $remote_ip, |
|
'domain' => $user{'domain'}, |
|
'username' => $user{'name'}, |
|
'server' => $r->dir_config('lonHostID'), |
|
); |
|
} |
|
if ($r->args) { |
|
foreach my $pair (split(/&/,$r->args)) { |
|
my ($name,$value) = split(/=/,$pair); |
|
$name = &LONCAPA::unescape($name); |
|
next unless (($name eq 'role') || ($name eq 'symb') || |
|
($name eq 'ltoken') || ($name eq 'linkkey') || |
|
($name eq 'ttoken')); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
|
$info{$name} = $value; |
|
} |
|
if ($info{'ttoken'}) { |
|
my %current = &Apache::lonnet::tmpget($info{'ttoken'}); |
|
delete($info{'ttoken'}); |
|
if ($current{'origurl'} eq $r->uri) { |
|
return if (keys(%current)); |
|
} |
|
} |
|
} |
|
# |
|
# To be able to support deep-linking for a shortened URL, i.e., |
|
# /tiny/$dom/$id with (a) linkkey included in POSTed data and |
|
# data and (b) non-Shibboleth SSO in use, ltoken (or linkprot |
|
# if sending to /adm/migrateuser), or linkkey are written to a |
|
# .tmp file in /home/httpd/perl/tmp and the query string is |
|
# replaced with ttoken=tokenid. This does mean other POSTed |
|
# data will be discarded. |
|
# |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
unless (($info{'ltoken'}) || ($info{'linkkey'} ne '')) { |
|
&Apache::lonacc::get_posted_cgi($r,['linkkey']); |
|
if ($env{'form.linkkey'} ne '') { |
|
$info{'linkkey'} = $env{'form.linkkey'}; |
|
} |
|
} |
|
} |
|
if ($dest eq '/adm/migrateuser') { |
|
if ($info{'ltoken'}) { |
|
my %link_info = &Apache::lonnet::tmpget($info{'ltoken'}); |
|
if ($link_info{'linkprot'}) { |
|
$info{'linkprot'} = $link_info{'linkprot'}; |
|
foreach my $item ('linkprotuser','linkprotexit','linkprotpbid','linkprotpburl') { |
|
if ($link_info{$item} ne '') { |
|
$info{$item} = $link_info{$item}; |
|
} |
|
} |
|
} |
|
&Apache::lonnet::tmpdel($info{'ltoken'}); |
|
delete($info{'ltoken'}); |
|
} |
|
unless ($info{'role'}) { |
|
if ($user{'role'} ne '') { |
|
$info{'role'} = $user{'role'}; |
|
} |
|
} |
|
unless ($info{'symb'}) { |
|
unless ($r->uri eq '/adm/roles') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
} |
|
} |
|
if (($dest eq '/adm/migrateuser') || (keys(%info) > 0)) { |
|
unless ($dest eq '/adm/migrateuser') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
my $token = &Apache::lonnet::tmpput(\%info,$r->dir_config('lonHostID'),'link'); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
return $token; |
|
} |
|
} |
|
return; |
|
} |
|
|
|
1; |
|
__END__ |
|
|