3 * StatusNet - the distributed open-source microblogging tool
4 * Copyright (C) 2008, 2009, StatusNet, Inc.
6 * This program is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU Affero General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU Affero General Public License for more details.
16 * You should have received a copy of the GNU Affero General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 if (!defined('STATUSNET')) {
24 require_once('Auth/OpenID.php');
25 require_once('Auth/OpenID/Consumer.php');
26 require_once('Auth/OpenID/Server.php');
27 require_once('Auth/OpenID/SReg.php');
28 require_once('Auth/OpenID/MySQLStore.php');
30 // About one year cookie expiry
32 define('OPENID_COOKIE_EXPIRY', round(365.25 * 24 * 60 * 60));
33 define('OPENID_COOKIE_KEY', 'lastusedopenid');
38 if (is_null($store)) {
39 // To create a new Database connection is an absolute must
40 // because database is in transaction (auto-commit = false)
41 // mode during OpenID operation
42 // Is a must because our Internal Session Handler uses database
43 // and depends on auto-commit = true
44 $dsn = common_config('db', 'database');
45 $options = PEAR::getStaticProperty('DB', 'options');
47 if (!is_array($options)) {
50 $db = DB::connect($dsn, $options);
52 if (PEAR::isError($db)) {
53 throw new ServerException($db->getMessage());
56 switch (common_config('db', 'type')) {
58 $store = new Auth_OpenID_MySQLStore($db);
61 $store = new Auth_OpenID_PostgreSQLStore($db);
64 throw new ServerException(_m('Unknown DB type for OpenID.'));
70 function oid_consumer()
73 // No need to declare a Yadis Session Handler
74 common_ensure_session(); // This is transparent to OpenID's eyes
75 $consumer = new Auth_OpenID_Consumer($store);
82 $server = new Auth_OpenID_Server($store, common_local_url('openidserver'));
86 function oid_clear_last()
91 function oid_set_last($openid_url)
93 common_set_cookie(OPENID_COOKIE_KEY,
95 time() + OPENID_COOKIE_EXPIRY);
98 function oid_get_last()
100 if (empty($_COOKIE[OPENID_COOKIE_KEY])) {
103 $openid_url = $_COOKIE[OPENID_COOKIE_KEY];
104 if ($openid_url && strlen($openid_url) > 0) {
111 function oid_link_user($id, $canonical, $display)
115 $oid = new User_openid();
117 $oid->canonical = $canonical;
118 $oid->display = $display;
119 $oid->created = common_sql_now();
121 if (!$oid->insert()) {
122 $err = &$_PEAR->getStaticProperty('DB_DataObject','lastError');
129 function oid_get_user($openid_url)
132 $oid = User_openid::getKV('canonical', $openid_url);
134 $user = User::getKV('id', $oid->user_id);
139 function oid_check_immediate($openid_url, $backto=null)
142 $action = $_REQUEST['action'];
143 $args = common_copy_args($_GET);
144 unset($args['action']);
145 $backto = common_local_url($action, $args);
148 common_ensure_session();
150 $_SESSION['openid_immediate_backto'] = $backto;
152 oid_authenticate($openid_url,
157 function oid_authenticate($openid_url, $returnto, $immediate=false)
159 $openid_url = Auth_OpenID::normalizeUrl($openid_url);
160 if (!common_valid_http_url($openid_url)) {
161 throw new ClientException(_m('No valid URL provided for OpenID.'));
164 $consumer = oid_consumer();
167 // TRANS: OpenID plugin server error.
168 throw new ServerException(_m('Cannot instantiate OpenID consumer object.'));
171 common_ensure_session();
173 $auth_request = $consumer->begin($openid_url);
175 // Handle failure status return values.
176 if (!$auth_request) {
177 common_log(LOG_ERR, __METHOD__ . ": mystery fail contacting $openid_url");
178 // TRANS: OpenID plugin message. Given when an OpenID is not valid.
179 throw new ServerException(_m('Not a valid OpenID.'));
180 } else if (Auth_OpenID::isFailure($auth_request)) {
181 common_log(LOG_ERR, __METHOD__ . ": OpenID fail to $openid_url: $auth_request->message");
182 // TRANS: OpenID plugin server error. Given when the OpenID authentication request fails.
183 // TRANS: %s is the failure message.
184 throw new ServerException(sprintf(_m('OpenID failure: %s.'), $auth_request->message));
187 $sreg_request = Auth_OpenID_SRegRequest::build(// Required
199 $auth_request->addExtension($sreg_request);
202 $requiredTeam = common_config('openid', 'required_team');
204 // LaunchPad OpenID extension
205 $team_request = new Auth_OpenID_TeamsRequest(array($requiredTeam));
207 $auth_request->addExtension($team_request);
211 $trust_root = common_root_url(true);
212 $process_url = common_local_url($returnto);
214 // Net::OpenID::Server as used on LiveJournal appears to incorrectly
215 // reject POST requests for data submissions that OpenID 1.1 specs
216 // as GET, although 2.0 allows them:
217 // https://rt.cpan.org/Public/Bug/Display.html?id=42202
219 // Our OpenID libraries would have switched in the redirect automatically
220 // if it were detecting 1.1 compatibility mode, however the server is
221 // advertising itself as 2.0-compatible, so we got switched to the POST.
223 // Since the GET should always work anyway, we'll just take out the
224 // autosubmitter for now.
226 //if ($auth_request->shouldSendRedirect()) {
227 $redirect_url = $auth_request->redirectURL($trust_root,
230 if (Auth_OpenID::isFailure($redirect_url)) {
231 // TRANS: OpenID plugin server error. Given when the OpenID authentication request cannot be redirected.
232 // TRANS: %s is the failure message.
233 throw new ServerException(sprintf(_m('Could not redirect to server: %s.'), $redirect_url->message));
235 common_redirect($redirect_url, 303);
238 // Generate form markup and render it.
239 $form_id = 'openid_message';
240 $form_html = $auth_request->formMarkup($trust_root, $process_url,
241 $immediate, array('id' => $form_id));
243 // XXX: This is cheap, but things choke if we don't escape ampersands
244 // in the HTML attributes
246 $form_html = preg_replace('/&/', '&', $form_html);
248 // Display an error if the form markup couldn't be generated;
249 // otherwise, render the HTML.
250 if (Auth_OpenID::isFailure($form_html)) {
251 // TRANS: OpenID plugin server error if the form markup could not be generated.
252 // TRANS: %s is the failure message.
253 common_server_error(sprintf(_m('Could not create OpenID form: %s'), $form_html->message));
255 $action = new AutosubmitAction(); // see below
256 $action->form_html = $form_html;
257 $action->form_id = $form_id;
258 $action->prepare(array('action' => 'autosubmit'));
259 $action->handle(array('action' => 'autosubmit'));
265 // Half-assed attempt at a module-private function
267 function _oid_print_instructions()
269 common_element('div', 'instructions',
270 // TRANS: OpenID plugin user instructions.
271 _m('This form should automatically submit itself. '.
272 'If not, click the submit button to go to your '.
273 'OpenID provider.'));
277 * Update a user from sreg parameters
279 * @param array $sreg fields from OpenID sreg response
282 function oid_update_user($user, $sreg)
284 $profile = $user->getProfile();
286 $orig_profile = clone($profile);
288 if (!empty($sreg['fullname']) && strlen($sreg['fullname']) <= 255) {
289 $profile->fullname = $sreg['fullname'];
292 if (!empty($sreg['country'])) {
293 if ($sreg['postcode']) {
294 // XXX: use postcode to get city and region
295 // XXX: also, store postcode somewhere -- it's valuable!
296 $profile->location = $sreg['postcode'] . ', ' . $sreg['country'];
298 $profile->location = $sreg['country'];
302 // XXX save language if it's passed
303 // XXX save timezone if it's passed
305 if (!$profile->update($orig_profile)) {
306 // TRANS: OpenID plugin server error.
307 common_server_error(_m('Error saving the profile.'));
311 $orig_user = clone($user);
313 if (!empty($sreg['email']) && Validate::email($sreg['email'], common_config('email', 'check_domain'))) {
314 $user->email = $sreg['email'];
317 if (!$user->update($orig_user)) {
318 // TRANS: OpenID plugin server error.
319 common_server_error(_m('Error saving the user.'));
326 function oid_assert_allowed($url)
328 $blacklist = common_config('openid', 'blacklist');
329 $whitelist = common_config('openid', 'whitelist');
331 if (empty($blacklist)) {
332 $blacklist = array();
335 if (empty($whitelist)) {
336 $whitelist = array();
339 foreach ($blacklist as $pattern) {
340 if (preg_match("/$pattern/", $url)) {
341 common_log(LOG_INFO, "Matched OpenID blacklist pattern {$pattern} with {$url}");
342 foreach ($whitelist as $exception) {
343 if (preg_match("/$exception/", $url)) {
344 common_log(LOG_INFO, "Matched OpenID whitelist pattern {$exception} with {$url}");
348 // TRANS: OpenID plugin client exception (403).
349 throw new ClientException(_m('Unauthorized URL used for OpenID login.'), 403);
357 * Check the teams available in the given OpenID response
358 * Using Launchpad's OpenID teams extension
360 * @return boolean whether this user is acceptable
362 function oid_check_teams($response)
364 $requiredTeam = common_config('openid', 'required_team');
366 $team_resp = new Auth_OpenID_TeamsResponse($response);
368 $teams = $team_resp->getTeams();
373 $match = in_array($requiredTeam, $teams);
374 $is = $match ? 'is' : 'is not';
375 common_log(LOG_DEBUG, "Remote user $is in required team $requiredTeam: [" . implode(', ', $teams) . "]");
383 class AutosubmitAction extends Action
385 var $form_html = null;
397 return _m('OpenID Login Submission');
400 function showContent()
402 $this->raw('<p style="margin: 20px 80px">');
403 // @todo FIXME: This would be better using standard CSS class, but the present theme's a bit scary.
404 $this->element('img', array('src' => Theme::path('images/icons/icon_processing.gif', 'base'),
405 // for some reason the base CSS sets <img>s as block display?!
406 'style' => 'display: inline'));
407 // TRANS: OpenID plugin message used while requesting authorization user's OpenID login provider.
408 $this->text(_m('Requesting authorization from your login provider...'));
410 $this->raw('<p style="margin-top: 60px; font-style: italic">');
411 // TRANS: OpenID plugin message. User instruction while requesting authorization user's OpenID login provider.
412 $this->text(_m('If you are not redirected to your login provider in a few seconds, try pushing the button below.'));
414 $this->raw($this->form_html);
417 function showScripts()
419 parent::showScripts();
420 $this->element('script', null,
421 'document.getElementById(\'' . $this->form_id . '\').submit();');