| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Bio::Graphics::Browser2::AuthorizedFeatureFile; |
|
2
|
|
|
|
|
|
|
|
|
3
|
6
|
|
|
6
|
|
27
|
use strict; |
|
|
6
|
|
|
|
|
7
|
|
|
|
6
|
|
|
|
|
125
|
|
|
4
|
6
|
|
|
6
|
|
18
|
use warnings; |
|
|
6
|
|
|
|
|
7
|
|
|
|
6
|
|
|
|
|
164
|
|
|
5
|
6
|
|
|
6
|
|
2292
|
use Bio::Graphics 2.24; |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
use base 'Bio::Graphics::FeatureFile'; |
|
7
|
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
use Socket 'AF_INET','inet_aton'; # for inet_aton() call |
|
9
|
|
|
|
|
|
|
use Carp 'croak','cluck'; |
|
10
|
|
|
|
|
|
|
use CGI(); |
|
11
|
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
=head1 NAME |
|
13
|
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
Bio::Graphics::Browser2::AuthorizedFeatureFile -- Add HTTP authorization features to FeatureFile |
|
15
|
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
GBrowse internal module. |
|
19
|
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
GBrowse internal module. |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
=head2 METHODS |
|
25
|
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
=over 4 |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=cut |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
# override setting to default to 'general' |
|
31
|
|
|
|
|
|
|
sub setting { |
|
32
|
|
|
|
|
|
|
my $self = shift; |
|
33
|
|
|
|
|
|
|
my ($label,$option,@rest) = @_ >= 2 ? @_ : ('general',@_); |
|
34
|
|
|
|
|
|
|
$label ||= 'general'; |
|
35
|
|
|
|
|
|
|
$label = 'general' if lc $label eq 'general'; # buglet |
|
36
|
|
|
|
|
|
|
$self->SUPER::setting($label,$option,@rest); |
|
37
|
|
|
|
|
|
|
} |
|
38
|
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
sub label_options { |
|
40
|
|
|
|
|
|
|
my $self = shift; |
|
41
|
|
|
|
|
|
|
my $label = shift; |
|
42
|
|
|
|
|
|
|
return $self->SUPER::_setting($label); |
|
43
|
|
|
|
|
|
|
} |
|
44
|
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
# get or set the authenticator used to map usernames onto groups |
|
46
|
|
|
|
|
|
|
sub set_authenticator { |
|
47
|
|
|
|
|
|
|
my $self = shift; |
|
48
|
|
|
|
|
|
|
$self->{'.authenticator'} = shift; |
|
49
|
|
|
|
|
|
|
} |
|
50
|
|
|
|
|
|
|
sub authenticator { |
|
51
|
|
|
|
|
|
|
shift->{'.authenticator'}; |
|
52
|
|
|
|
|
|
|
} |
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
# get or set the username used in authentication processes |
|
55
|
|
|
|
|
|
|
sub set_username { |
|
56
|
|
|
|
|
|
|
my $self = shift; |
|
57
|
|
|
|
|
|
|
my $username = shift; |
|
58
|
|
|
|
|
|
|
$self->{'.authenticated_username'} = $username; |
|
59
|
|
|
|
|
|
|
} |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
sub username { |
|
62
|
|
|
|
|
|
|
my $self = shift; |
|
63
|
|
|
|
|
|
|
return $self->{'.authenticated_username'} || CGI->remote_user; |
|
64
|
|
|
|
|
|
|
} |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
# implement the "restrict" option |
|
67
|
|
|
|
|
|
|
sub authorized { |
|
68
|
|
|
|
|
|
|
my $self = shift; |
|
69
|
|
|
|
|
|
|
my $label = shift; |
|
70
|
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
my $restrict = $self->code_setting($label=>'restrict') |
|
72
|
|
|
|
|
|
|
|| ($label ne 'general' && $self->code_setting('TRACK DEFAULTS' => 'restrict')); |
|
73
|
|
|
|
|
|
|
return 1 unless $restrict; |
|
74
|
|
|
|
|
|
|
|
|
75
|
|
|
|
|
|
|
my $host = CGI->remote_host; |
|
76
|
|
|
|
|
|
|
my $addr = CGI->remote_addr; |
|
77
|
|
|
|
|
|
|
my $user = $self->username; |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
undef $host if $host eq $addr; |
|
80
|
|
|
|
|
|
|
return $restrict->($host,$addr,$user) if ref $restrict eq 'CODE'; |
|
81
|
|
|
|
|
|
|
my @tokens = split /\s*(satisfy|order|allow from|deny from|require user|require group|require valid-user)\s*/i,$restrict; |
|
82
|
|
|
|
|
|
|
shift @tokens unless $tokens[0] =~ /\S/; |
|
83
|
|
|
|
|
|
|
my $mode = 'allow,deny'; |
|
84
|
|
|
|
|
|
|
my $satisfy = 'all'; |
|
85
|
|
|
|
|
|
|
my $user_directive; |
|
86
|
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
my (@allow,@deny,%users); |
|
88
|
|
|
|
|
|
|
while (@tokens) { |
|
89
|
|
|
|
|
|
|
my ($directive,$value) = splice(@tokens,0,2); |
|
90
|
|
|
|
|
|
|
$directive = lc $directive; |
|
91
|
|
|
|
|
|
|
$value ||= ''; |
|
92
|
|
|
|
|
|
|
if ($directive eq 'order') { |
|
93
|
|
|
|
|
|
|
$mode = $value; |
|
94
|
|
|
|
|
|
|
next; |
|
95
|
|
|
|
|
|
|
} |
|
96
|
|
|
|
|
|
|
my @values = split /[^\w.@-]/,$value; |
|
97
|
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
if ($directive eq 'allow from') { |
|
99
|
|
|
|
|
|
|
push @allow,@values; |
|
100
|
|
|
|
|
|
|
next; |
|
101
|
|
|
|
|
|
|
} |
|
102
|
|
|
|
|
|
|
if ($directive eq 'deny from') { |
|
103
|
|
|
|
|
|
|
push @deny,@values; |
|
104
|
|
|
|
|
|
|
next; |
|
105
|
|
|
|
|
|
|
} |
|
106
|
|
|
|
|
|
|
if ($directive eq 'satisfy') { |
|
107
|
|
|
|
|
|
|
$satisfy = $value; |
|
108
|
|
|
|
|
|
|
next; |
|
109
|
|
|
|
|
|
|
} |
|
110
|
|
|
|
|
|
|
if ($directive eq 'require user') { |
|
111
|
|
|
|
|
|
|
$user_directive++; |
|
112
|
|
|
|
|
|
|
foreach (@values) { |
|
113
|
|
|
|
|
|
|
if ($_ eq 'valid-user' && defined $user) { |
|
114
|
|
|
|
|
|
|
$users{$user}++; # ensures that this user will match |
|
115
|
|
|
|
|
|
|
} else { |
|
116
|
|
|
|
|
|
|
$users{$_}++; |
|
117
|
|
|
|
|
|
|
} |
|
118
|
|
|
|
|
|
|
} |
|
119
|
|
|
|
|
|
|
next; |
|
120
|
|
|
|
|
|
|
} |
|
121
|
|
|
|
|
|
|
if ($directive eq 'require valid-user') { |
|
122
|
|
|
|
|
|
|
$user_directive++; |
|
123
|
|
|
|
|
|
|
$users{$user}++ if defined $user; |
|
124
|
|
|
|
|
|
|
} |
|
125
|
|
|
|
|
|
|
if ($directive eq 'require group' && defined $user) { |
|
126
|
|
|
|
|
|
|
$user_directive++; |
|
127
|
|
|
|
|
|
|
if (my $auth_plugin = $self->authenticator) { |
|
128
|
|
|
|
|
|
|
for my $grp (@values) { |
|
129
|
|
|
|
|
|
|
$users{$user} ||= $auth_plugin->user_in_group($user,$grp); |
|
130
|
|
|
|
|
|
|
} |
|
131
|
|
|
|
|
|
|
} else { |
|
132
|
|
|
|
|
|
|
warn "To use the 'require group' limit you must load an authentication plugin. Otherwise use a subroutine to implement role-based authentication."; |
|
133
|
|
|
|
|
|
|
} |
|
134
|
|
|
|
|
|
|
} |
|
135
|
|
|
|
|
|
|
} |
|
136
|
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
my $allow = $mode eq 'allow,deny' ? match_host(\@allow,$host,$addr) && !match_host(\@deny,$host,$addr) |
|
138
|
|
|
|
|
|
|
: 'deny,allow' ? !match_host(\@deny,$host,$addr) || match_host(\@allow,$host,$addr) |
|
139
|
|
|
|
|
|
|
: croak "$mode is not a valid authorization mode"; |
|
140
|
|
|
|
|
|
|
return $allow unless $user_directive; |
|
141
|
|
|
|
|
|
|
$satisfy = 'any' if !@allow && !@deny; # no host restrictions |
|
142
|
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
# prevent unint variable warnings |
|
144
|
|
|
|
|
|
|
$user ||= ''; |
|
145
|
|
|
|
|
|
|
$allow ||= ''; |
|
146
|
|
|
|
|
|
|
$users{$user} ||= ''; |
|
147
|
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
return $satisfy eq 'any' ? $allow || $users{$user} |
|
149
|
|
|
|
|
|
|
: $allow && $users{$user}; |
|
150
|
|
|
|
|
|
|
} |
|
151
|
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
sub match_host { |
|
153
|
|
|
|
|
|
|
my ($matches,$host,$addr) = @_; |
|
154
|
|
|
|
|
|
|
my $ok; |
|
155
|
|
|
|
|
|
|
for my $candidate (@$matches) { |
|
156
|
|
|
|
|
|
|
if ($candidate eq 'all') { |
|
157
|
|
|
|
|
|
|
$ok ||= 1; |
|
158
|
|
|
|
|
|
|
} elsif ($candidate =~ /^[\d.]+$/) { # ip match |
|
159
|
|
|
|
|
|
|
$addr .= '.' unless $addr =~ /\.$/; # these lines ensure subnets match correctly |
|
160
|
|
|
|
|
|
|
$candidate .= '.' unless $candidate =~ /\.$/; |
|
161
|
|
|
|
|
|
|
$ok ||= $addr =~ /^\Q$candidate\E/; |
|
162
|
|
|
|
|
|
|
} else { |
|
163
|
|
|
|
|
|
|
$host ||= gethostbyaddr(inet_aton($addr),AF_INET); |
|
164
|
|
|
|
|
|
|
next unless $host; |
|
165
|
|
|
|
|
|
|
$candidate = ".$candidate" unless $candidate =~ /^\./; # these lines ensure domains match correctly |
|
166
|
|
|
|
|
|
|
$host = ".$host" unless $host =~ /^\./; |
|
167
|
|
|
|
|
|
|
$ok ||= $host =~ /\Q$candidate\E$/; |
|
168
|
|
|
|
|
|
|
} |
|
169
|
|
|
|
|
|
|
return 1 if $ok; |
|
170
|
|
|
|
|
|
|
} |
|
171
|
|
|
|
|
|
|
$ok; |
|
172
|
|
|
|
|
|
|
} |
|
173
|
|
|
|
|
|
|
|
|
174
|
|
|
|
|
|
|
1; |
|
175
|
|
|
|
|
|
|
|