. * * @category Settings * @package StatusNet * @author Craig Andrews * @copyright 2008-2009 StatusNet, Inc. * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0 * @link http://status.net/ */ if (!defined('STATUSNET') && !defined('LACONICA')) { exit(1); } require_once INSTALLDIR.'/lib/action.php'; require_once INSTALLDIR.'/plugins/OpenID/openid.php'; require_once(INSTALLDIR.'/plugins/OpenID/User_openid_trustroot.php'); /** * Settings for OpenID * * Lets users add, edit and delete OpenIDs from their account * * @category Settings * @package StatusNet * @author Craig Andrews * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0 * @link http://status.net/ */ class OpenidserverAction extends Action { var $oserver; function prepare($args) { parent::prepare($args); $this->oserver = oid_server(); return true; } function handle($args) { parent::handle($args); $request = $this->oserver->decodeRequest(); if (in_array($request->mode, array('checkid_immediate', 'checkid_setup'))) { $user = common_current_user(); if(!$user){ if($request->immediate){ //cannot prompt the user to login in immediate mode, so answer false $response = $this->generateDenyResponse($request); }else{ /* Go log in, and then come back. */ common_set_returnto($_SERVER['REQUEST_URI']); common_redirect(common_local_url('login')); return; } }else if(common_profile_url($user->nickname) == $request->identity || $request->idSelect()){ $user_openid_trustroot = User_openid_trustroot::pkeyGet( array('user_id'=>$user->id, 'trustroot'=>$request->trust_root)); if(empty($user_openid_trustroot)){ if($request->immediate){ //cannot prompt the user to trust this trust root in immediate mode, so answer false $response = $this->generateDenyResponse($request); }else{ common_ensure_session(); $_SESSION['openid_trust_root'] = $request->trust_root; $allowResponse = $this->generateAllowResponse($request, $user); $this->oserver->encodeResponse($allowResponse); //sign the response $denyResponse = $this->generateDenyResponse($request); $this->oserver->encodeResponse($denyResponse); //sign the response $_SESSION['openid_allow_url'] = $allowResponse->encodeToUrl(); $_SESSION['openid_deny_url'] = $denyResponse->encodeToUrl(); //ask the user to trust this trust root common_redirect(common_local_url('openidtrust')); return; } }else{ //user has previously authorized this trust root $response = $this->generateAllowResponse($request, $user); //$response = $request->answer(true, null, common_profile_url($user->nickname)); } } else if ($request->immediate) { $response = $this->generateDenyResponse($request); } else { //invalid $this->clientError(sprintf(_m('You are not authorized to use the identity %s'),$request->identity),$code=403); } } else { $response = $this->oserver->handleRequest($request); } if($response){ $response = $this->oserver->encodeResponse($response); if ($response->code != AUTH_OPENID_HTTP_OK) { header(sprintf("HTTP/1.1 %d ", $response->code), true, $response->code); } if($response->headers){ foreach ($response->headers as $k => $v) { header("$k: $v"); } } $this->raw($response->body); }else{ $this->clientError(_m('Just an OpenID provider. Nothing to see here, move along...'),$code=500); } } function generateAllowResponse($request, $user){ $response = $request->answer(true, null, common_profile_url($user->nickname)); $profile = $user->getProfile(); $sreg_data = array( 'fullname' => $profile->fullname, 'nickname' => $user->nickname, 'email' => $user->email, 'language' => $user->language, 'timezone' => $user->timezone); $sreg_request = Auth_OpenID_SRegRequest::fromOpenIDRequest($request); $sreg_response = Auth_OpenID_SRegResponse::extractResponse( $sreg_request, $sreg_data); $sreg_response->toMessage($response->fields); return $response; } function generateDenyResponse($request){ $response = $request->answer(false); return $response; } }