version 1.5, 2003/03/26 00:03:21
|
version 1.14.10.2.2.1, 2022/01/02 20:43:50
|
Line 31 package Apache::lontrans;
|
Line 31 package Apache::lontrans;
|
use strict; |
use strict; |
use Apache::Constants qw(:common :remotehost); |
use Apache::Constants qw(:common :remotehost); |
use Apache::lonnet(); |
use Apache::lonnet(); |
|
use Apache::loncommon; |
use Apache::File(); |
use Apache::File(); |
|
use LONCAPA qw(:DEFAULT :match); |
sub propath { |
|
my ($udom,$uname)=@_; |
|
$udom=~s/\W//g; |
|
$uname=~s/\W//g; |
|
my $subdir=$uname.'__'; |
|
$subdir =~ s/(.)(.)(.).*/$1\/$2\/$3/; |
|
my $proname="$Apache::lonnet::perlvar{'lonUsersDir'}/$udom/$subdir/$uname"; |
|
return $proname; |
|
} |
|
|
|
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
if ($r->uri=~m|^/uploaded/|) { |
# FIXME line remove when mod_perl fixes BUG#4948 |
my (undef,undef,$udom,$uname,$ufile)=split(/\//,$r->uri); |
$r->notes->set('error-notes' => ''); |
$ufile=~s/^[\~\.]+//; |
my $alias = &Apache::lonnet::get_proxy_alias(); |
$r->filename(&propath($udom,$uname).'/userfiles/'.$ufile); |
if ($alias) { |
} elsif ($r->uri=~m|^/~|) { |
my $hdrhost = $r->headers_in->get('Host'); |
#internal authentication, needs fixup. |
my $lonhost = $r->dir_config('lonHostID'); |
my $fn = $r->uri(); # non users do not get the full path request |
my $hostname = &Apache::lonnet::hostname($lonhost); |
# through SCRIPT_FILENAME |
my $ssourl = '/adm/sso'; |
$fn=~s|^/~(\w+)|/home/$1/public_html|; |
if ($r->dir_config('lonOtherAuthenUrl') ne '') { |
$r->filename($fn); |
$ssourl = $r->dir_config('lonOtherAuthenUrl'); |
} else { return DECLINED; } |
} |
return OK; |
if (($hdrhost eq $alias) || ($hdrhost eq $hostname)) { |
|
my $proxyinfo = &Apache::lonnet::get_proxy_settings($r->dir_config('lonDefDomain')); |
|
my ($vpnint,$vpnext); |
|
if (ref($proxyinfo) eq 'HASH') { |
|
$vpnint = $proxyinfo->{'vpnint'}; |
|
$vpnext = $proxyinfo->{'vpnext'}; |
|
} |
|
my ($redirect,$remote_ip); |
|
if ($hdrhost eq $alias) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP); |
|
if (($vpnext && &Apache::lonnet::ip_match($remote_ip,$vpnext)) && |
|
($r->uri !~ m{^/adm/(lti|launch)/})) { |
|
$redirect = $hostname; |
|
} |
|
if ($r->uri eq $ssourl) { |
|
if (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} else { |
|
$redirect = $hostname; |
|
} |
|
} |
|
if ($redirect eq $hdrhost) { |
|
undef($redirect); |
|
} |
|
} elsif ($hdrhost eq $hostname) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
unless (($remote_ip eq '127.0.0.1') || ($remote_ip eq '::1') || |
|
($remote_ip eq &Apache::lonnet::get_host_ip($lonhost)) || |
|
($r->uri=~m{^/adm/(lti|launch)/}) || |
|
($vpnint && &Apache::lonnet::ip_match($remote_ip,$vpnint))) { |
|
$redirect = $alias; |
|
if (($r->uri=~m{^/raw/}) || ($r->uri=~m{^/adm/dns/})) { |
|
my %iphost = &Apache::lonnet::get_iphost(); |
|
if (exists($iphost{$remote_ip})) { |
|
undef($redirect); |
|
} |
|
} elsif ($r->uri eq $ssourl) { |
|
unless (&Apache::lonnet::alias_sso($lonhost)) { |
|
undef($redirect); |
|
} |
|
} |
|
} |
|
} |
|
if ($redirect) { |
|
my $uri = $r->uri; |
|
if (($uri eq '/adm/switchserver') || ($uri =~ m{^/Shibboleth.sso/})) { |
|
return DECLINED; |
|
} |
|
unless (($uri eq '/adm/migrateuser') || ($uri eq $ssourl)) { |
|
my %user; |
|
my $handle = &Apache::lonnet::check_for_valid_session($r,undef,\%user); |
|
if (($handle) && ($user{'name'} ne '') && ($user{'domain'} ne '')) { |
|
unless (($user{'name'} eq 'public') && ($user{'domain'} eq 'public')) { |
|
my $dest = '/adm/migrateuser'; |
|
my $token = &set_token($r,$dest,$remote_ip,\%user); |
|
unless ($token eq '') { |
|
$r->internal_redirect("$dest?token=$token"); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return DECLINED; |
|
} |
|
} |
|
} |
|
} |
|
my $protocol = 'http'; |
|
my $port = $r->get_server_port(); |
|
if ($port eq '443') { |
|
$protocol = 'https'; |
|
} |
|
if ($uri =~ m{^(/adm/css/)(.+)(.css)$}) { |
|
$uri = $1.&escape($2).$3; |
|
} |
|
my $location = $protocol.'://'.$redirect.$uri; |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$location .= '?ttoken='.$token; |
|
} |
|
} elsif ($r->args) { |
|
$location .= '?'.$r->args; |
|
} |
|
$r->header_out(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
my $token = &set_token($r,$r->uri); |
|
unless ($token eq '') { |
|
$r->args('ttoken='.$token); |
|
} |
|
} |
|
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
|
my $fn = $r->uri(); |
|
$fn=~s/^\/raw//; |
|
my (undef,undef,$udom,$uname,@ufile)=split(/\//,$fn); |
|
if (@ufile) { $ufile[-1]=~s/^[\~\.]+//; } |
|
my $chome=&Apache::lonnet::homeserver($uname,$udom); |
|
my $allowed=0; |
|
my @ids=&Apache::lonnet::current_machine_ids(); |
|
foreach my $id (@ids) { if ($id eq $chome) { $allowed=1; } } |
|
if ($allowed) { |
|
$r->filename(&propath($udom,$uname). |
|
'/userfiles/'.(join('/',@ufile))); |
|
} |
|
return OK; |
|
} elsif ($r->uri =~ m{^\Q/adm/wrapper/ext/https:/\E[^/]}) { |
|
my $uri = $r->uri; |
|
$uri =~ s{^(\Q/adm/wrapper/ext/https:/\E)}{$1/}; |
|
$r->uri($uri); |
|
} |
|
return DECLINED; |
|
} |
|
|
|
sub set_token { |
|
my ($r,$dest,$remote_ip,$userref) = @_; |
|
my (%info,%user); |
|
if ($dest eq '/adm/migrateuser') { |
|
return unless (ref($userref) eq 'HASH'); |
|
%user = %{$userref}; |
|
%info = ('ip' => $remote_ip, |
|
'domain' => $user{'domain'}, |
|
'username' => $user{'name'}, |
|
'server' => $r->dir_config('lonHostID'), |
|
); |
|
} |
|
if ($r->args) { |
|
foreach my $pair (split(/&/,$r->args)) { |
|
my ($name,$value) = split(/=/,$pair); |
|
$name = &LONCAPA::unescape($name); |
|
next unless (($name eq 'role') || ($name eq 'symb') || |
|
($name eq 'ltoken') || ($name eq 'linkkey') || |
|
($name eq 'ttoken')); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
|
$info{$name} = $value; |
|
} |
|
if ($info{'ttoken'}) { |
|
my %current = &Apache::lonnet::tmpget($info{'ttoken'}); |
|
delete($info{'ttoken'}); |
|
if ($current{'origurl'} eq $r->uri) { |
|
return if (keys(%current)); |
|
} |
|
} |
|
} |
|
# |
|
# To be able to support deep-linking for a shortened URL, i.e., |
|
# /tiny/$dom/$id with (a) linkkey included in POSTed data and |
|
# data and (b) non-Shibboleth SSO in use, ltoken (or linkprot |
|
# if sending to /adm/migrateuser), or linkkey are written to a |
|
# .tmp file in /home/httpd/perl/tmp and the query string is |
|
# replaced with ttoken=tokenid. This does mean other POSTed |
|
# data will be discarded. |
|
# |
|
if ($r->uri =~ m{^/tiny/$match_domain/\w+$}) { |
|
unless (($info{'ltoken'}) || ($info{'linkkey'} ne '')) { |
|
&Apache::lonacc::get_posted_cgi($r,['linkkey']); |
|
if ($env{'form.linkkey'} ne '') { |
|
$info{'linkkey'} = $env{'form.linkkey'}; |
|
} |
|
} |
|
} |
|
if ($dest eq '/adm/migrateuser') { |
|
if ($info{'ltoken'}) { |
|
my %link_info = &Apache::lonnet::tmpget($info{'ltoken'}); |
|
if ($link_info{'linkprot'}) { |
|
$info{'linkprot'} = $link_info{'linkprot'}; |
|
} |
|
&Apache::lonnet::tmpdel($info{'ltoken'});; |
|
delete($info{'ltoken'}); |
|
} |
|
unless ($info{'role'}) { |
|
if ($user{'role'} ne '') { |
|
$info{'role'} = $user{'role'}; |
|
} |
|
} |
|
unless ($info{'symb'}) { |
|
unless ($r->uri eq '/adm/roles') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
} |
|
} |
|
if (($dest eq '/adm/migrateuser') || (keys(%info) > 0)) { |
|
unless ($dest eq '/adm/migrateuser') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
my $token = &Apache::lonnet::tmpput(\%info,$r->dir_config('lonHostID'),'link'); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
return $token; |
|
} |
|
} |
|
return; |
} |
} |
|
|
1; |
1; |
__END__ |
__END__ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|