summaryrefslogtreecommitdiff
path: root/IkiWiki/Plugin/openid.pm
blob: d75099ce9c0baa4e3127f442f9ba38d9157aced9 (plain)
  1. #!/usr/bin/perl
  2. # OpenID support.
  3. package IkiWiki::Plugin::openid;
  4. use warnings;
  5. use strict;
  6. use IkiWiki 3.00;
  7. sub import {
  8. add_underlay("openid-selector");
  9. hook(type => "checkconfig", id => "openid", call => \&checkconfig);
  10. hook(type => "getsetup", id => "openid", call => \&getsetup);
  11. hook(type => "auth", id => "openid", call => \&auth);
  12. hook(type => "formbuilder_setup", id => "openid",
  13. call => \&formbuilder_setup, last => 1);
  14. }
  15. sub checkconfig () {
  16. if ($config{cgi}) {
  17. # Intercept normal signin form, so the openid selector
  18. # can be displayed.
  19. #
  20. # When other auth hooks are registered, give the selector
  21. # a reference to the normal signin form.
  22. require IkiWiki::CGI;
  23. my $real_cgi_signin;
  24. if (keys %{$IkiWiki::hooks{auth}} > 1) {
  25. $real_cgi_signin=\&IkiWiki::cgi_signin;
  26. }
  27. inject(name => "IkiWiki::cgi_signin", call => sub ($$) {
  28. openid_selector($real_cgi_signin, @_);
  29. });
  30. }
  31. }
  32. sub getsetup () {
  33. return
  34. plugin => {
  35. safe => 1,
  36. rebuild => 0,
  37. section => "auth",
  38. },
  39. }
  40. sub openid_selector {
  41. my $real_cgi_signin=shift;
  42. my $q=shift;
  43. my $session=shift;
  44. my $openid_url=$q->param('openid_identifier');
  45. my $openid_error;
  46. if (! load_openid_module()) {
  47. if ($real_cgi_signin) {
  48. $real_cgi_signin->($q, $session);
  49. exit;
  50. }
  51. error(sprintf(gettext("failed to load openid module: "), @_));
  52. }
  53. elsif (defined $q->param("action") && $q->param("action") eq "verify") {
  54. validate($q, $session, $openid_url, sub {
  55. $openid_error=shift;
  56. });
  57. }
  58. elsif ($q->param("do") eq "signin" && $real_cgi_signin) {
  59. $real_cgi_signin->($q, $session);
  60. exit;
  61. }
  62. my $template=IkiWiki::template("openid-selector.tmpl");
  63. $template->param(
  64. cgiurl => $config{cgiurl},
  65. (defined $openid_error ? (openid_error => $openid_error) : ()),
  66. (defined $openid_url ? (openid_url => $openid_url) : ()),
  67. ($real_cgi_signin ? (nonopenidurl => IkiWiki::cgiurl(do => "signin")) : ()),
  68. );
  69. IkiWiki::printheader($session);
  70. print IkiWiki::misctemplate("signin", $template->output);
  71. exit;
  72. }
  73. sub formbuilder_setup (@) {
  74. my %params=@_;
  75. my $form=$params{form};
  76. my $session=$params{session};
  77. my $cgi=$params{cgi};
  78. if ($form->title eq "preferences" &&
  79. IkiWiki::openiduser($session->param("name"))) {
  80. $form->field(name => "openid_identifier", disabled => 1,
  81. label => htmllink("", "", "ikiwiki/OpenID", noimageinline => 1),
  82. value => $session->param("name"),
  83. size => length($session->param("name")), force => 1,
  84. fieldset => "login");
  85. $form->field(name => "email", type => "hidden");
  86. }
  87. }
  88. sub validate ($$$;$) {
  89. my $q=shift;
  90. my $session=shift;
  91. my $openid_url=shift;
  92. my $errhandler=shift;
  93. my $csr=getobj($q, $session);
  94. my $claimed_identity = $csr->claimed_identity($openid_url);
  95. if (! $claimed_identity) {
  96. if ($errhandler) {
  97. $errhandler->($csr->err);
  98. return 0;
  99. }
  100. else {
  101. error($csr->err);
  102. }
  103. }
  104. # Ask for client to provide a name and email, if possible.
  105. # Try sreg and ax
  106. if ($claimed_identity->can("set_extension_args")) {
  107. $claimed_identity->set_extension_args(
  108. 'http://openid.net/extensions/sreg/1.1',
  109. {
  110. optional => 'email,fullname,nickname',
  111. },
  112. );
  113. $claimed_identity->set_extension_args(
  114. 'http://openid.net/srv/ax/1.0',
  115. {
  116. mode => 'fetch_request',
  117. 'required' => 'email,fullname,nickname,firstname',
  118. 'type.email' => "http://schema.openid.net/contact/email",
  119. 'type.fullname' => "http://axschema.org/namePerson",
  120. 'type.nickname' => "http://axschema.org/namePerson/friendly",
  121. 'type.firstname' => "http://axschema.org/namePerson/first",
  122. },
  123. );
  124. }
  125. my $check_url = $claimed_identity->check_url(
  126. return_to => IkiWiki::cgiurl(do => "postsignin"),
  127. trust_root => $config{cgiurl},
  128. delayed_return => 1,
  129. );
  130. # Redirect the user to the OpenID server, which will
  131. # eventually bounce them back to auth()
  132. IkiWiki::redirect($q, $check_url);
  133. exit 0;
  134. }
  135. sub auth ($$) {
  136. my $q=shift;
  137. my $session=shift;
  138. if (defined $q->param('openid.mode')) {
  139. my $csr=getobj($q, $session);
  140. if (my $setup_url = $csr->user_setup_url) {
  141. IkiWiki::redirect($q, $setup_url);
  142. }
  143. elsif ($csr->user_cancel) {
  144. IkiWiki::redirect($q, $config{url});
  145. }
  146. elsif (my $vident = $csr->verified_identity) {
  147. $session->param(name => $vident->url);
  148. my @extensions;
  149. if ($vident->can("signed_extension_fields")) {
  150. @extensions=grep { defined } (
  151. $vident->signed_extension_fields('http://openid.net/extensions/sreg/1.1'),
  152. $vident->signed_extension_fields('http://openid.net/srv/ax/1.0'),
  153. );
  154. }
  155. foreach my $ext (@extensions) {
  156. foreach my $field (qw{value.email email}) {
  157. if (exists $ext->{$field} &&
  158. defined $ext->{$field} &&
  159. length $ext->{$field}) {
  160. $session->param(email => $ext->{$field});
  161. last;
  162. }
  163. }
  164. foreach my $field (qw{value.nickname nickname value.fullname fullname value.firstname}) {
  165. if (exists $ext->{$field} &&
  166. defined $ext->{$field} &&
  167. length $ext->{$field}) {
  168. $session->param(username => $ext->{$field});
  169. last;
  170. }
  171. }
  172. }
  173. }
  174. else {
  175. error("OpenID failure: ".$csr->err);
  176. }
  177. }
  178. elsif (defined $q->param('openid_identifier')) {
  179. # myopenid.com affiliate support
  180. validate($q, $session, $q->param('openid_identifier'));
  181. }
  182. }
  183. sub getobj ($$) {
  184. my $q=shift;
  185. my $session=shift;
  186. eval q{use Net::OpenID::Consumer};
  187. error($@) if $@;
  188. my $ua;
  189. eval q{use LWPx::ParanoidAgent};
  190. if (! $@) {
  191. $ua=LWPx::ParanoidAgent->new;
  192. }
  193. else {
  194. $ua=LWP::UserAgent->new;
  195. }
  196. # Store the secret in the session.
  197. my $secret=$session->param("openid_secret");
  198. if (! defined $secret) {
  199. $secret=rand;
  200. $session->param(openid_secret => $secret);
  201. }
  202. return Net::OpenID::Consumer->new(
  203. ua => $ua,
  204. args => $q,
  205. consumer_secret => sub { return shift()+$secret },
  206. required_root => $config{cgiurl},
  207. );
  208. }
  209. sub load_openid_module {
  210. # Give up if module is unavailable to avoid needing to depend on it.
  211. eval q{use Net::OpenID::Consumer};
  212. if ($@) {
  213. debug("unable to load Net::OpenID::Consumer, not enabling OpenID login ($@)");
  214. return;
  215. }
  216. return 1;
  217. }
  218. 1