summaryrefslogtreecommitdiff
path: root/IkiWiki/Plugin/openid.pm
blob: 0ad8697d872be8517394ea5366bb4ea55c42e6d2 (plain)
  1. #!/usr/bin/perl
  2. # OpenID support.
  3. package IkiWiki::Plugin::openid;
  4. use warnings;
  5. use strict;
  6. use IkiWiki 3.00;
  7. sub import {
  8. hook(type => "checkconfig", id => "openid", call => \&checkconfig);
  9. hook(type => "getopt", id => "openid", call => \&getopt);
  10. hook(type => "getsetup", id => "openid", call => \&getsetup);
  11. hook(type => "auth", id => "openid", call => \&auth);
  12. hook(type => "formbuilder_setup", id => "openid",
  13. call => \&formbuilder_setup, last => 1);
  14. }
  15. sub checkconfig () {
  16. if ($config{cgi}) {
  17. # Intercept normal signin form, so the openid selector
  18. # can be displayed.
  19. require IkiWiki::CGI;
  20. my $real_cgi_signin=\&IkiWiki::cgi_signin;
  21. inject(name => "IkiWiki::cgi_signin", call => sub ($$) {
  22. openid_selector($real_cgi_signin, @_);
  23. });
  24. }
  25. }
  26. sub getopt () {
  27. eval q{use Getopt::Long};
  28. error($@) if $@;
  29. Getopt::Long::Configure('pass_through');
  30. GetOptions("openidsignup=s" => \$config{openidsignup});
  31. }
  32. sub getsetup () {
  33. return
  34. plugin => {
  35. safe => 1,
  36. rebuild => 0,
  37. section => "auth",
  38. },
  39. openidsignup => {
  40. type => "string",
  41. example => "http://myopenid.com/",
  42. description => "an url where users can signup for an OpenID",
  43. safe => 1,
  44. rebuild => 0,
  45. },
  46. }
  47. sub openid_selector {
  48. my $real_cgi_signin=shift;
  49. my $q=shift;
  50. my $session=shift;
  51. my $openid_url=$q->param('openid_url');
  52. my $openid_error;
  53. if (defined $q->param("action") && $q->param("action") eq "verify") {
  54. validate($q, $session, $openid_url, sub {
  55. $openid_error=shift;
  56. });
  57. }
  58. elsif ($q->param("do") eq "signin" || ! load_openid_module()) {
  59. $real_cgi_signin->($q, $session);
  60. exit;
  61. }
  62. my $template=IkiWiki::template("openid-selector.tmpl");
  63. $template->param(
  64. cgiurl => $config{cgiurl},
  65. (defined $openid_error ? (openid_error => $openid_error) : ()),
  66. (defined $openid_url ? (openid_url => $openid_url) : ()),
  67. # TODO only if other auth methods are available
  68. nonopenidurl => IkiWiki::cgiurl(do => "signin"),
  69. loginlabel => loginlabel(),
  70. );
  71. IkiWiki::printheader($session);
  72. print IkiWiki::misctemplate("signin", $template->output);
  73. exit;
  74. }
  75. sub formbuilder_setup (@) {
  76. my %params=@_;
  77. my $form=$params{form};
  78. my $session=$params{session};
  79. my $cgi=$params{cgi};
  80. if ($form->title eq "signin") {
  81. return unless load_openid_module();
  82. # This avoids it displaying a redundant label for the
  83. # OpenID fieldset.
  84. $form->fieldsets("OpenID");
  85. $form->field(
  86. name => "openid_url",
  87. label => loginlabel(),
  88. fieldset => "OpenID",
  89. size => 30,
  90. comment => ($config{openidsignup} ? " | <a href=\"$config{openidsignup}\">".gettext("Get an OpenID")."</a>" : "")
  91. );
  92. # Handle submission of an OpenID as validation.
  93. if ($form->submitted && $form->submitted eq "Login" &&
  94. defined $form->field("openid_url") &&
  95. length $form->field("openid_url")) {
  96. $form->field(
  97. name => "openid_url",
  98. validate => sub {
  99. validate($cgi, $session, shift, sub {
  100. # Display error in the form.
  101. $form->field(name => "openid_url", comment => shift);
  102. });
  103. },
  104. );
  105. # Skip all other required fields in this case.
  106. foreach my $field ($form->field) {
  107. next if $field eq "openid_url";
  108. $form->field(name => $field, required => 0,
  109. validate => '/.*/');
  110. }
  111. }
  112. }
  113. elsif ($form->title eq "preferences" &&
  114. IkiWiki::openiduser($session->param("name"))) {
  115. $form->field(name => "openid_url", disabled => 1,
  116. label => htmllink("", "", "ikiwiki/OpenID", noimageinline => 1),
  117. value => $session->param("name"),
  118. size => 50, force => 1,
  119. fieldset => "login");
  120. $form->field(name => "email", type => "hidden");
  121. }
  122. }
  123. sub validate ($$$;$) {
  124. my $q=shift;
  125. my $session=shift;
  126. my $openid_url=shift;
  127. my $errhandler=shift;
  128. my $csr=getobj($q, $session);
  129. my $claimed_identity = $csr->claimed_identity($openid_url);
  130. if (! $claimed_identity) {
  131. if ($errhandler) {
  132. $errhandler->($csr->err);
  133. return 0;
  134. }
  135. else {
  136. error($csr->err);
  137. }
  138. }
  139. # Ask for client to provide a name and email, if possible.
  140. # Try sreg and ax
  141. if ($claimed_identity->can("set_extension_args")) {
  142. $claimed_identity->set_extension_args(
  143. 'http://openid.net/extensions/sreg/1.1',
  144. {
  145. optional => 'email,fullname,nickname',
  146. },
  147. );
  148. $claimed_identity->set_extension_args(
  149. 'http://openid.net/srv/ax/1.0',
  150. {
  151. mode => 'fetch_request',
  152. 'required' => 'email,fullname,nickname,firstname',
  153. 'type.email' => "http://schema.openid.net/contact/email",
  154. 'type.fullname' => "http://axschema.org/namePerson",
  155. 'type.nickname' => "http://axschema.org/namePerson/friendly",
  156. 'type.firstname' => "http://axschema.org/namePerson/first",
  157. },
  158. );
  159. }
  160. my $check_url = $claimed_identity->check_url(
  161. return_to => IkiWiki::cgiurl(do => "postsignin"),
  162. trust_root => $config{cgiurl},
  163. delayed_return => 1,
  164. );
  165. # Redirect the user to the OpenID server, which will
  166. # eventually bounce them back to auth()
  167. IkiWiki::redirect($q, $check_url);
  168. exit 0;
  169. }
  170. sub auth ($$) {
  171. my $q=shift;
  172. my $session=shift;
  173. if (defined $q->param('openid.mode')) {
  174. my $csr=getobj($q, $session);
  175. if (my $setup_url = $csr->user_setup_url) {
  176. IkiWiki::redirect($q, $setup_url);
  177. }
  178. elsif ($csr->user_cancel) {
  179. IkiWiki::redirect($q, $config{url});
  180. }
  181. elsif (my $vident = $csr->verified_identity) {
  182. $session->param(name => $vident->url);
  183. my @extensions;
  184. if ($vident->can("signed_extension_fields")) {
  185. @extensions=grep { defined } (
  186. $vident->signed_extension_fields('http://openid.net/extensions/sreg/1.1'),
  187. $vident->signed_extension_fields('http://openid.net/srv/ax/1.0'),
  188. );
  189. }
  190. foreach my $ext (@extensions) {
  191. foreach my $field (qw{value.email email}) {
  192. if (exists $ext->{$field} &&
  193. defined $ext->{$field} &&
  194. length $ext->{$field}) {
  195. $session->param(email => $ext->{$field});
  196. last;
  197. }
  198. }
  199. foreach my $field (qw{value.nickname nickname value.fullname fullname value.firstname}) {
  200. if (exists $ext->{$field} &&
  201. defined $ext->{$field} &&
  202. length $ext->{$field}) {
  203. $session->param(username => $ext->{$field});
  204. last;
  205. }
  206. }
  207. }
  208. }
  209. else {
  210. error("OpenID failure: ".$csr->err);
  211. }
  212. }
  213. elsif (defined $q->param('openid_identifier')) {
  214. # myopenid.com affiliate support
  215. validate($q, $session, $q->param('openid_identifier'));
  216. }
  217. }
  218. sub getobj ($$) {
  219. my $q=shift;
  220. my $session=shift;
  221. eval q{use Net::OpenID::Consumer};
  222. error($@) if $@;
  223. my $ua;
  224. eval q{use LWPx::ParanoidAgent};
  225. if (! $@) {
  226. $ua=LWPx::ParanoidAgent->new;
  227. }
  228. else {
  229. $ua=LWP::UserAgent->new;
  230. }
  231. # Store the secret in the session.
  232. my $secret=$session->param("openid_secret");
  233. if (! defined $secret) {
  234. $secret=rand;
  235. $session->param(openid_secret => $secret);
  236. }
  237. return Net::OpenID::Consumer->new(
  238. ua => $ua,
  239. args => $q,
  240. consumer_secret => sub { return shift()+$secret },
  241. required_root => $config{cgiurl},
  242. );
  243. }
  244. sub load_openid_module {
  245. # Give up if module is unavailable to avoid needing to depend on it.
  246. eval q{use Net::OpenID::Consumer};
  247. if ($@) {
  248. debug("unable to load Net::OpenID::Consumer, not enabling OpenID login ($@)");
  249. return;
  250. }
  251. return 1;
  252. }
  253. sub loginlabel {
  254. return gettext("Log in with")." ".htmllink("", "", "ikiwiki/OpenID", noimageinline => 1);
  255. }
  256. 1