version 1.5, 2003/03/26 00:03:21
|
version 1.36, 2021/10/08 14:36:51
|
Line 30 package Apache::lontrans;
|
Line 30 package Apache::lontrans;
|
|
|
use strict; |
use strict; |
use Apache::Constants qw(:common :remotehost); |
use Apache::Constants qw(:common :remotehost); |
use Apache::lonnet(); |
use Apache::lonnet; |
|
use Apache::loncommon; |
use Apache::File(); |
use Apache::File(); |
|
use LONCAPA qw(:DEFAULT :match); |
|
|
sub propath { |
sub handler { |
my ($udom,$uname)=@_; |
my $r = shift; |
$udom=~s/\W//g; |
# FIXME line remove when mod_perl fixes BUG#4948 |
$uname=~s/\W//g; |
$r->notes->set('error-notes' => ''); |
my $subdir=$uname.'__'; |
my $hdrhost = $r->headers_in->get('Host'); |
$subdir =~ s/(.)(.)(.).*/$1\/$2\/$3/; |
if ($r->uri=~m{^/raw/}) { |
my $proname="$Apache::lonnet::perlvar{'lonUsersDir'}/$udom/$subdir/$uname"; |
if ($hdrhost) { |
return $proname; |
unless ($hdrhost =~ /^internal\-/) { |
|
my $remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
if (&redirect_raw($remote_ip,$lonhost)) { |
|
my $location = 'https://internal-'.$hdrhost.$r->uri; |
|
$r->headers_out->set(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
} |
|
my $alias = &Apache::lonnet::get_proxy_alias(); |
|
if ($alias) { |
|
my $lonhost = $r->dir_config('lonHostID'); |
|
my $hostname = &Apache::lonnet::hostname($lonhost); |
|
if (($hdrhost eq $alias) || ($hdrhost eq $hostname)) { |
|
my $proxyinfo = &Apache::lonnet::get_proxy_settings($r->dir_config('lonDefDomain')); |
|
my ($vpnint,$vpnext); |
|
if (ref($proxyinfo) eq 'HASH') { |
|
$vpnint = $proxyinfo->{'vpnint'}; |
|
$vpnext = $proxyinfo->{'vpnext'}; |
|
} |
|
my ($redirect,$remote_ip); |
|
if ($hdrhost eq $alias) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP); |
|
if (($vpnext && &Apache::lonnet::ip_match($remote_ip,$vpnext)) && |
|
($r->uri !~ m{^/adm/(lti|launch)/})) { |
|
$redirect = $hostname; |
|
} |
|
if ($r->uri eq '/adm/sso') { |
|
if (&Apache::lonnet::alias_shibboleth($lonhost)) { |
|
undef($redirect); |
|
} else { |
|
$redirect = $hostname; |
|
} |
|
} |
|
if ($redirect eq $hdrhost) { |
|
undef($redirect); |
|
} |
|
} elsif ($hdrhost eq $hostname) { |
|
$remote_ip = &Apache::lonnet::get_requestor_ip($r,REMOTE_NOLOOKUP,1); |
|
unless (($remote_ip eq '127.0.0.1') || ($remote_ip eq '::1') || |
|
($remote_ip eq &Apache::lonnet::get_host_ip($lonhost)) || |
|
($r->uri=~m{^/adm/(lti|launch)/}) || |
|
($vpnint && &Apache::lonnet::ip_match($remote_ip,$vpnint))) { |
|
$redirect = $alias; |
|
if (($r->uri=~m{^/raw/}) || ($r->uri=~m{^/adm/dns/})) { |
|
my %iphost = &Apache::lonnet::get_iphost(); |
|
if (exists($iphost{$remote_ip})) { |
|
undef($redirect); |
|
} |
|
} elsif ($r->uri eq '/adm/sso') { |
|
unless (&Apache::lonnet::alias_shibboleth($lonhost)) { |
|
undef($redirect); |
|
} |
|
} |
|
} |
|
} |
|
if ($redirect) { |
|
my $uri = $r->uri; |
|
if (($uri eq '/adm/switchserver') || ($uri =~ m{^/Shibboleth.sso/})) { |
|
return DECLINED; |
|
} |
|
unless ($uri eq '/adm/migrateuser') { |
|
my %user; |
|
my $handle = &Apache::lonnet::check_for_valid_session($r,undef,\%user); |
|
if (($handle) && ($user{'name'} ne '') && ($user{'domain'} ne '')) { |
|
unless (($user{'name'} eq 'public') && ($user{'domain'} eq 'public')) { |
|
my $token = &get_token($r,$remote_ip,\%user); |
|
unless ($token eq '') { |
|
$r->internal_redirect("/adm/migrateuser?token=$token"); |
|
$r->set_handlers('PerlHandler'=> undef); |
|
return DECLINED; |
|
} |
|
} |
|
} |
|
} |
|
my $protocol = 'http'; |
|
my $port = $r->get_server_port(); |
|
if ($port eq '443') { |
|
$protocol = 'https'; |
|
} |
|
my $querystring = $r->args; |
|
if ($uri =~ m{^(/adm/css/)(.+)(.css)$}) { |
|
$uri = $1.&escape($2).$3; |
|
} |
|
my $location = $protocol.'://'.$redirect.$uri; |
|
if ($querystring) { |
|
$location .= "?$querystring"; |
|
} |
|
$r->header_out(Location => $location); |
|
return REDIRECT; |
|
} |
|
} |
|
} |
|
if ($r->uri=~m|^(/raw)?/uploaded/|) { |
|
my $fn = $r->uri(); |
|
$fn=~s/^\/raw//; |
|
my (undef,undef,$udom,$uname,@ufile)=split(/\//,$fn); |
|
if (@ufile) { $ufile[-1]=~s/^[\~\.]+//; } |
|
my $chome=&Apache::lonnet::homeserver($uname,$udom); |
|
my $allowed=0; |
|
my @ids=&Apache::lonnet::current_machine_ids(); |
|
foreach my $id (@ids) { if ($id eq $chome) { $allowed=1; } } |
|
if ($allowed) { |
|
$r->filename(&propath($udom,$uname). |
|
'/userfiles/'.(join('/',@ufile))); |
|
} |
|
return OK; |
|
} elsif ($r->uri =~ m{^\Q/adm/wrapper/ext/https:/\E[^/]}) { |
|
my $uri = $r->uri; |
|
$uri =~ s{^(\Q/adm/wrapper/ext/https:/\E)}{$1/}; |
|
$r->uri($uri); |
|
} |
|
return DECLINED; |
} |
} |
|
|
|
sub redirect_raw { |
|
my ($remote_ip,$lonhost) = @_; |
|
my @remhostids = &Apache::lonnet::get_hosts_from_ip($remote_ip); |
|
my $redirect; |
|
while (@remhostids) { |
|
my $try_server = pop(@remhostids); |
|
my $remhostname = &Apache::lonnet::hostname($try_server); |
|
if ($remhostname) { |
|
my $remoterev = &Apache::lonnet::get_server_loncaparev(undef,$try_server); |
|
my ($remmajor,$remminor) = ($remoterev =~ /^(\d+)\.(\d+)/); |
|
if (($remmajor > 2) || (($remmajor == 2) && $remminor >= 12)) { |
|
my $internet_names = &Apache::lonnet::get_internet_names($try_server); |
|
if (ref($internet_names) eq 'ARRAY') { |
|
my $intdom = &Apache::lonnet::internet_dom($lonhost); |
|
unless (grep(/^\Q$intdom\E$/,@{$internet_names})) { |
|
my $lonhostname = &Apache::lonnet::hostname($lonhost); |
|
my $serverhomeID = &Apache::lonnet::get_server_homeID($lonhostname); |
|
my $serverhomedom = &Apache::lonnet::host_domain($serverhomeID); |
|
my %domdefaults = &Apache::lonnet::get_domain_defaults($serverhomedom); |
|
my $replication = $domdefaults{'replication'}; |
|
if (ref($replication) eq 'HASH') { |
|
my $remhomeID = &Apache::lonnet::get_server_homeID($remhostname); |
|
my $remhomedom = &Apache::lonnet::host_domain($remhomeID); |
|
my $remprimary = &Apache::lonnet::domain($remhomedom,'primary'); |
|
my $remintdom = &Apache::lonnet::internet_dom($remprimary); |
|
if (ref($replication->{'certreq'}) eq 'ARRAY') { |
|
if (grep(/^\Q$remintdom\E$/,@{$replication->{'certreq'}})) { |
|
$redirect = 0; |
|
} else { |
|
$redirect = 1; |
|
} |
|
} |
|
if (ref($replication->{'nocertreq'}) eq 'ARRAY') { |
|
if (grep(/^\Q$remintdom\E$/,@{$replication->{'nocertreq'}})) { |
|
$redirect = 1; |
|
} else { |
|
$redirect = 0; |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
last; |
|
} |
|
} |
|
return $redirect; |
|
} |
|
|
sub handler { |
sub get_token { |
my $r = shift; |
my ($r,$remote_ip,$userref) = @_; |
if ($r->uri=~m|^/uploaded/|) { |
return unless (ref($userref) eq 'HASH'); |
my (undef,undef,$udom,$uname,$ufile)=split(/\//,$r->uri); |
my %user = %{$userref}; |
$ufile=~s/^[\~\.]+//; |
my %info = ('ip' => $remote_ip, |
$r->filename(&propath($udom,$uname).'/userfiles/'.$ufile); |
'domain' => $user{'domain'}, |
} elsif ($r->uri=~m|^/~|) { |
'username' => $user{'name'}, |
#internal authentication, needs fixup. |
'server' => $r->dir_config('lonHostID'), |
my $fn = $r->uri(); # non users do not get the full path request |
); |
# through SCRIPT_FILENAME |
my $query = $r->args; |
$fn=~s|^/~(\w+)|/home/$1/public_html|; |
if ($query) { |
$r->filename($fn); |
foreach my $pair (split(/&/,$query)) { |
} else { return DECLINED; } |
my ($name,$value) = split(/=/,$pair); |
return OK; |
$name = &LONCAPA::unescape($name); |
|
next unless (($name eq 'role') || ($name eq 'symb')); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
|
$info{$name} = $value; |
|
} |
|
} |
|
unless ($info{'role'}) { |
|
if ($user{'role'} ne '') { |
|
$info{'role'} = $user{'role'}; |
|
} |
|
} |
|
unless ($info{'symb'}) { |
|
unless ($r->uri eq '/adm/roles') { |
|
$info{'origurl'} = $r->uri; |
|
} |
|
} |
|
my $token = &Apache::lonnet::tmpput(\%info,$r->dir_config('lonHostID')); |
|
unless (($token eq 'con_lost') || ($token eq 'refused') || |
|
($token eq 'unknown_cmd') || ($token eq 'no_such_host')) { |
|
return $token; |
|
} |
|
return; |
} |
} |
|
|
1; |
1; |
__END__ |
__END__ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|