version 1.765, 2006/07/21 18:52:35
|
version 1.770, 2006/08/16 20:27:30
|
Line 3220 sub tmpdel {
|
Line 3220 sub tmpdel {
|
# -------------------------------------------------- portfolio access checking |
# -------------------------------------------------- portfolio access checking |
|
|
sub portfolio_access { |
sub portfolio_access { |
my ($r,$requrl) = @_; |
my ($requrl) = @_; |
my $access=&allowed('bre',$requrl); |
|
if ($access eq '2' || $access eq 'F') { |
|
return 'ok'; |
|
} |
|
my (undef,$udom,$unum,$file_name,$group) = &parse_portfolio_url($requrl); |
my (undef,$udom,$unum,$file_name,$group) = &parse_portfolio_url($requrl); |
my $result = &get_portfolio_access($udom,$unum,$file_name,$group); |
my $result = &get_portfolio_access($udom,$unum,$file_name,$group); |
if ($result eq 'ok') { |
if ($result eq 'ok') { |
return 'ok'; |
return 'F'; |
} elsif ($result =~ /^[^:]+:guest_/) { |
} elsif ($result =~ /^[^:]+:guest_/) { |
&Apache::lonacc::passphrase_access_checker($r,$result,$requrl); |
return 'A'; |
return 'ok'; |
|
} |
} |
return undef; |
return ''; |
} |
} |
|
|
sub get_portfolio_access { |
sub get_portfolio_access { |
my ($udom,$unum,$file_name,$group) = @_; |
my ($udom,$unum,$file_name,$group,$access_hash) = @_; |
|
|
my $current_perms = &get_portfile_permissions($udom,$unum); |
if (!ref($access_hash)) { |
my %access_controls = &get_access_controls($current_perms,$group, |
my $current_perms = &get_portfile_permissions($udom,$unum); |
$file_name); |
my %access_controls = &get_access_controls($current_perms,$group, |
|
$file_name); |
|
$access_hash = $access_controls{$file_name}; |
|
} |
|
|
my ($public,$guest,@domains,@users,@courses,@groups); |
my ($public,$guest,@domains,@users,@courses,@groups); |
my $now = time; |
my $now = time; |
my $access_hash = $access_controls{$file_name}; |
|
if (ref($access_hash) eq 'HASH') { |
if (ref($access_hash) eq 'HASH') { |
foreach my $key (keys(%{$access_hash})) { |
foreach my $key (keys(%{$access_hash})) { |
my ($num,$scope,$end,$start) = ($key =~ /^([^:]+):([a-z]+)_(\d*)_?(\d*)$/); |
my ($num,$scope,$end,$start) = ($key =~ /^([^:]+):([a-z]+)_(\d*)_?(\d*)$/); |
Line 3477 sub allowed {
|
Line 3475 sub allowed {
|
if (defined($env{'allowed.'.$priv})) { return $env{'allowed.'.$priv}; } |
if (defined($env{'allowed.'.$priv})) { return $env{'allowed.'.$priv}; } |
# Free bre access to adm and meta resources |
# Free bre access to adm and meta resources |
if (((($uri=~/^adm\//) && ($uri !~ m|/bulletinboard$|)) |
if (((($uri=~/^adm\//) && ($uri !~ m|/bulletinboard$|)) |
|| ($uri=~/\.meta$/)) && ($priv eq 'bre')) { |
|| (($uri=~/\.meta$/) && ($uri!~m|^uploaded/|) )) |
|
&& ($priv eq 'bre')) { |
return 'F'; |
return 'F'; |
} |
} |
|
|
Line 3602 sub allowed {
|
Line 3601 sub allowed {
|
} |
} |
} |
} |
|
|
|
if ($priv eq 'bre' |
|
&& $thisallowed ne 'F' |
|
&& $thisallowed ne '2' |
|
&& &is_portfolio_url($uri)) { |
|
$thisallowed = &portfolio_access($uri); |
|
} |
|
|
# Full access at system, domain or course-wide level? Exit. |
# Full access at system, domain or course-wide level? Exit. |
|
|
if ($thisallowed=~/F/) { |
if ($thisallowed=~/F/) { |
Line 3752 sub allowed {
|
Line 3758 sub allowed {
|
# |
# |
|
|
unless ($env{'request.course.id'}) { |
unless ($env{'request.course.id'}) { |
return '1'; |
if ($thisallowed eq 'A') { |
|
return 'A'; |
|
} else { |
|
return '1'; |
|
} |
} |
} |
|
|
# |
# |
Line 3815 sub allowed {
|
Line 3825 sub allowed {
|
} |
} |
} |
} |
|
|
|
if ($thisallowed eq 'A') { |
|
return 'A'; |
|
} |
return 'F'; |
return 'F'; |
} |
} |
|
|
Line 4902 sub get_portfile_permissions {
|
Line 4915 sub get_portfile_permissions {
|
|
|
sub get_access_controls { |
sub get_access_controls { |
my ($current_permissions,$group,$file) = @_; |
my ($current_permissions,$group,$file) = @_; |
my %access; |
my %access; |
|
my $real_file = $file; |
|
$file =~ s/\.meta$//; |
if (defined($file)) { |
if (defined($file)) { |
if (ref($$current_permissions{$file."\0".'accesscontrol'}) eq 'HASH') { |
if (ref($$current_permissions{$file."\0".'accesscontrol'}) eq 'HASH') { |
foreach my $control (keys(%{$$current_permissions{$file."\0".'accesscontrol'}})) { |
foreach my $control (keys(%{$$current_permissions{$file."\0".'accesscontrol'}})) { |
$access{$file}{$control} = $$current_permissions{$file."\0".$control}; |
$access{$real_file}{$control} = $$current_permissions{$file."\0".$control}; |
} |
} |
} |
} |
} else { |
} else { |
Line 5722 sub EXT {
|
Line 5737 sub EXT {
|
if (($uname eq $env{'user.name'})&&($udom eq $env{'user.domain'})) { |
if (($uname eq $env{'user.name'})&&($udom eq $env{'user.domain'})) { |
return $env{'environment.'.$spacequalifierrest}; |
return $env{'environment.'.$spacequalifierrest}; |
} else { |
} else { |
|
if ($uname eq 'anonymous' && $udom eq '') { |
|
return ''; |
|
} |
my %returnhash=&userenvironment($udom,$uname, |
my %returnhash=&userenvironment($udom,$uname, |
$spacequalifierrest); |
$spacequalifierrest); |
return $returnhash{$spacequalifierrest}; |
return $returnhash{$spacequalifierrest}; |
Line 5872 sub metadata {
|
Line 5890 sub metadata {
|
my %metathesekeys=(); |
my %metathesekeys=(); |
unless ($filename=~/\.meta$/) { $filename.='.meta'; } |
unless ($filename=~/\.meta$/) { $filename.='.meta'; } |
my $metastring; |
my $metastring; |
if ($uri !~ m -^(uploaded|editupload)/-) { |
if ($uri !~ m -^(editupload)/-) { |
my $file=&filelocation('',&clutter($filename)); |
my $file=&filelocation('',&clutter($filename)); |
#push(@{$metaentry{$uri.'.file'}},$file); |
#push(@{$metaentry{$uri.'.file'}},$file); |
$metastring=&getfile($file); |
$metastring=&getfile($file); |
Line 7508 actions
|
Line 7526 actions
|
'': forbidden |
'': forbidden |
1: user needs to choose course |
1: user needs to choose course |
2: browse allowed |
2: browse allowed |
|
A: passphrase authentication needed |
|
|
=item * |
=item * |
|
|
Line 8235 Internal notes:
|
Line 8254 Internal notes:
|
|
|
Locks on files (resulting from submission of portfolio file to a homework problem stored in array of arrays. |
Locks on files (resulting from submission of portfolio file to a homework problem stored in array of arrays. |
|
|
parse_access_controls(): |
|
|
|
Parses XML of an access control record |
|
Args |
|
1. Text string (XML) of access comtrol record |
|
|
|
Returns: |
|
1. Hash of access control settings. |
|
|
|
modify_access_controls(): |
modify_access_controls(): |
|
|
Modifies access controls for a portfolio file |
Modifies access controls for a portfolio file |