123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160 |
- <?php
- /**
- * StatusNet, the distributed open-source microblogging tool
- *
- * Settings for OpenID
- *
- * PHP version 5
- *
- * LICENCE: This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- * @category Settings
- * @package StatusNet
- * @author Craig Andrews <candrews@integralblue.com>
- * @copyright 2008-2009 StatusNet, Inc.
- * @copyright 2009 Free Software Foundation, Inc http://www.fsf.org
- * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
- * @link http://status.net/
- */
- if (!defined('STATUSNET')) {
- exit(1);
- }
- require_once INSTALLDIR.'/plugins/OpenID/openid.php';
- /**
- * Settings for OpenID
- *
- * Lets users add, edit and delete OpenIDs from their account
- *
- * @category Settings
- * @package StatusNet
- * @author Craig Andrews <candrews@integralblue.com>
- * @copyright 2009 Free Software Foundation, Inc http://www.fsf.org
- * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
- * @link http://status.net/
- */
- class OpenidserverAction extends Action
- {
- var $oserver;
- function prepare($args)
- {
- parent::prepare($args);
- $this->oserver = oid_server();
- return true;
- }
- function handle($args)
- {
- parent::handle($args);
- $request = $this->oserver->decodeRequest();
- if (in_array($request->mode, array('checkid_immediate',
- 'checkid_setup'))) {
- if (!$this->scoped instanceof Profile) {
- if($request->immediate){
- //cannot prompt the user to login in immediate mode, so answer false
- $response = $this->generateDenyResponse($request);
- }else{
- // Go log in, and then come back.
- //
- // Note: 303 redirect rather than 307 to avoid
- // prompting user for form resubmission if we
- // were POSTed here.
- common_set_returnto($_SERVER['REQUEST_URI']);
- common_redirect(common_local_url('login'), 303);
- }
- } elseif (in_array($request->identity, $this->scoped->getAliases()) || $request->idSelect()) {
- $user_openid_trustroot = User_openid_trustroot::pkeyGet(
- array('user_id'=>$this->scoped->getID(), 'trustroot'=>$request->trust_root));
- if(empty($user_openid_trustroot)){
- if($request->immediate){
- //cannot prompt the user to trust this trust root in immediate mode, so answer false
- $response = $this->generateDenyResponse($request);
- }else{
- common_ensure_session();
- $_SESSION['openid_trust_root'] = $request->trust_root;
- $allowResponse = $this->generateAllowResponse($request, $this->scoped);
- $this->oserver->encodeResponse($allowResponse); //sign the response
- $denyResponse = $this->generateDenyResponse($request);
- $this->oserver->encodeResponse($denyResponse); //sign the response
- $_SESSION['openid_allow_url'] = $allowResponse->encodeToUrl();
- $_SESSION['openid_deny_url'] = $denyResponse->encodeToUrl();
- // Ask the user to trust this trust root...
- //
- // Note: 303 redirect rather than 307 to avoid
- // prompting user for form resubmission if we
- // were POSTed here.
- common_redirect(common_local_url('openidtrust'), 303);
- }
- } else {
- //user has previously authorized this trust root
- $response = $this->generateAllowResponse($request, $this->scoped);
- }
- } elseif ($request->immediate) {
- $response = $this->generateDenyResponse($request);
- } else {
- //invalid
- // TRANS: OpenID plugin client error given trying to add an unauthorised OpenID to a user (403).
- // TRANS: %s is a request identity.
- $this->clientError(sprintf(_m('You are not authorized to use the identity %s.'),$request->identity),$code=403);
- }
- } else {
- $response = $this->oserver->handleRequest($request);
- }
- if($response){
- $response = $this->oserver->encodeResponse($response);
- if ($response->code != AUTH_OPENID_HTTP_OK) {
- header(sprintf("HTTP/1.1 %d ", $response->code),
- true, $response->code);
- }
- if($response->headers){
- foreach ($response->headers as $k => $v) {
- header("$k: $v");
- }
- }
- $this->raw($response->body);
- }else{
- // TRANS: OpenID plugin client error given when not getting a response for a given OpenID provider (500).
- $this->clientError(_m('Just an OpenID provider. Nothing to see here, move along...'),$code=500);
- }
- }
- function generateAllowResponse($request, Profile $profile){
- $response = $request->answer(true, null, $profile->getUrl());
- $user = $profile->getUser();
- $sreg_data = array(
- 'fullname' => $profile->getFullname(),
- 'nickname' => $profile->getNickname(),
- 'email' => $user->email, // FIXME: Should we make the email optional?
- 'language' => $user->language,
- 'timezone' => $user->timezone);
- $sreg_request = Auth_OpenID_SRegRequest::fromOpenIDRequest($request);
- $sreg_response = Auth_OpenID_SRegResponse::extractResponse(
- $sreg_request, $sreg_data);
- $sreg_response->toMessage($response->fields);
- return $response;
- }
- function generateDenyResponse($request){
- $response = $request->answer(false);
- return $response;
- }
- }
|