]> git.mxchange.org Git - quix0rs-gnu-social.git/blob - plugins/OpenID/openidserver.php
Added an "Verify Your Identity" page to the OpenID provider
[quix0rs-gnu-social.git] / plugins / OpenID / openidserver.php
1 <?php
2 /**
3  * StatusNet, the distributed open-source microblogging tool
4  *
5  * Settings for OpenID
6  *
7  * PHP version 5
8  *
9  * LICENCE: This program is free software: you can redistribute it and/or modify
10  * it under the terms of the GNU Affero General Public License as published by
11  * the Free Software Foundation, either version 3 of the License, or
12  * (at your option) any later version.
13  *
14  * This program is distributed in the hope that it will be useful,
15  * but WITHOUT ANY WARRANTY; without even the implied warranty of
16  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17  * GNU Affero General Public License for more details.
18  *
19  * You should have received a copy of the GNU Affero General Public License
20  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
21  *
22  * @category  Settings
23  * @package   StatusNet
24  * @author   Craig Andrews <candrews@integralblue.com>
25  * @copyright 2008-2009 StatusNet, Inc.
26  * @license   http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
27  * @link      http://status.net/
28  */
29
30 if (!defined('STATUSNET') && !defined('LACONICA')) {
31     exit(1);
32 }
33
34 require_once INSTALLDIR.'/lib/action.php';
35 require_once INSTALLDIR.'/plugins/OpenID/openid.php';
36 require_once(INSTALLDIR.'/plugins/OpenID/User_openid_trustroot.php');
37
38 /**
39  * Settings for OpenID
40  *
41  * Lets users add, edit and delete OpenIDs from their account
42  *
43  * @category Settings
44  * @package  StatusNet
45  * @author   Craig Andrews <candrews@integralblue.com>
46  * @license  http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
47  * @link     http://status.net/
48  */
49 class OpenidserverAction extends Action
50 {
51
52     function handle($args)
53     {
54         parent::handle($args);
55         $oserver = oid_server();
56         $request = $oserver->decodeRequest();
57         if (in_array($request->mode, array('checkid_immediate',
58             'checkid_setup'))) {
59             $cur = common_current_user();
60             if(!$cur){
61                 /* Go log in, and then come back. */
62                 common_set_returnto($_SERVER['REQUEST_URI']);
63                 common_redirect(common_local_url('login'));
64                 return;
65             }else if(common_profile_url($cur->nickname) == $request->identity || $request->idSelect()){
66                 $user_openid_trustroot = User_openid_trustroot::pkeyGet(
67                                                 array('user_id'=>$cur->id, 'trustroot'=>$request->trustroot));
68                 if(empty($user_openid_trustroot)){
69                     if($request->immediate){
70                         //cannot prompt the user to trust this trust root in immediate mode, so answer false
71                         $response = &$request->answer(false);
72                     }else{
73                         //ask the user to trust this trust root
74                         $_SESSION['openid_trust_root'] = $request->trust_root;
75                         $allowResponse = $request->answer(true, null, common_profile_url($cur->nickname));
76                         $denyResponse = $request->answer(false);
77                         common_ensure_session();
78                         $_SESSION['openid_allow_url'] = $allowResponse->encodeToUrl();
79                         $_SESSION['openid_deny_url'] = $denyResponse->encodeToUrl();
80                         common_redirect(common_local_url('openidtrust'));
81                         return;
82                     }
83                 }else{
84                     //user has previously authorized this trust root
85                     $response = &$request->answer(true, null, common_profile_url($cur->nickname));
86                 }
87             } else if ($request->immediate) {
88                 $response = &$request->answer(false);
89             } else {
90                 //invalid
91                 $this->clientError(sprintf(_('You are not authorized to use the identity %s'),$request->identity),$code=403);
92             }
93         } else {
94             $response = &$oserver->handleRequest($request);
95         }
96
97         if($response){
98             $webresponse = $oserver->encodeResponse($response);
99
100             if ($webresponse->code != AUTH_OPENID_HTTP_OK) {
101                 header(sprintf("HTTP/1.1 %d ", $webresponse->code),
102                        true, $webresponse->code);
103             }
104
105             if($webresponse->headers){
106                 foreach ($webresponse->headers as $k => $v) {
107                     header("$k: $v");
108                 }
109             }
110             $this->raw($webresponse->body);
111         }else{
112             $this->clientError(_('Just an OpenID provider. Nothing to see here, move along...'),$code=500);
113         }
114     }
115 }