$this->make_hook('openid', AUTH_PUBLIC), 'openid/trust' => $this->make_hook('trust', AUTH_COOKIE), 'openid/trusted' => $this->make_hook('trusted', AUTH_MDP), 'admin/openid/trusted' => $this->make_hook('admin_trusted', AUTH_MDP), 'openid/idp_xrds' => $this->make_hook('idp_xrds', AUTH_PUBLIC), 'openid/user_xrds' => $this->make_hook('user_xrds', AUTH_PUBLIC), 'openid/melix' => $this->make_hook('melix', AUTH_PUBLIC), ); } function handler_openid(&$page, $x = null) { $this->load('openid.inc.php'); // Spec ยง4.1.2: if "openid.mode" is absent, we SHOULD assume that // the request is not an OpenId message if (!array_key_exists('openid_mode', $_REQUEST)) { return $this->render_discovery_page($page, get_user($x)); } // Now, deal with the OpenId message $server = init_openid_server(); $request = $server->decodeRequest(); // In modes 'checkid_immediate' and 'checkid_setup', the request // needs some logic and can not be automatically answered by the server // Immediate mode if ($request->mode == 'checkid_immediate') { // We deny immediate requests, unless: // - the user identifier is known by the RP // - the user is logged in // - the user identifier matches the user logged in // - the user has whitelisted the site $answer = !$request->idSelect() && S::logged() && $request->identity == S::user()->login() && is_trusted_site(S::user(), $request->trust_root); $response =& $request->answer($answer); // Setup mode } else if ($request->mode == 'checkid_setup') { // We redirect to a page where the user will authenticate // and confirm the use of his/her OpenId // The request is saved in session before redirecting S::set('openid_request', serialize($request)); pl_redirect('openid/trust'); return; // Other requests can be automatically handled by the server } else { $response =& $server->handleRequest($request); } $webresponse =& $server->encodeResponse($response); $this->render_openid_response($webresponse); } function handler_trust(&$page, $x = null) { $this->load('openid.inc.php'); // Recover request in session $request = S::v('openid_request'); if (is_null($request)) { // There is no authentication information, something went wrong pl_redirect('/'); return; } require_once 'Auth/OpenID/Server.php'; $request = unserialize($request); $server = init_openid_server(); $user = S::user(); $identity = null; $claimed_id = null; // Set the identity to the user currently logged in // if an OP Identifier was initially used if ($request->identity == Auth_OpenID_IDENTIFIER_SELECT) { $identity = $user->hruid; $claimed_id = get_user_openid_url($user); // Check that the identity matches the user currently logged in // if an User Identifier was initially used } else if ($request->identity != $user->hruid) { $response =& $request->answer(false); $webresponse =& $server->encodeResponse($response); $this->render_openid_response($webresponse); return; } // Prepare Simple Registration response fields require_once 'Auth/OpenID/SReg.php'; $sreg_request = Auth_OpenID_SRegRequest::fromOpenIDRequest($request); $sreg_response = Auth_OpenID_SRegResponse::extractResponse($sreg_request, get_sreg_data($user)); $whitelisted = is_trusted_site($user, $request->trust_root); // Ask the user for confirmation if (!$whitelisted && $_SERVER['REQUEST_METHOD'] != 'POST') { $page->changeTpl('openid/trust.tpl'); $page->assign('relying_party', $request->trust_root); $page->assign_by_ref('sreg_data', $sreg_response->data); return; } // At this point $_SERVER['REQUEST_METHOD'] == 'POST' // Add 'always trusted' sites to whitelist if (isset($_POST['trust']) && @$_POST['always']) { add_trusted_site($user, $request->trust_root); } // Answer to the Relying Party if ($whitelisted || isset($_POST['trust'])) { S::kill('openid_request'); $response =& $request->answer(true, null, $identity, $claimed_id); // Add the simple registration response values to the OpenID // response message. $sreg_response->toMessage($response->fields); } else { // !$whitelisted && !isset($_POST['trust']) S::kill('openid_request'); $response =& $request->answer(false); } $webresponse =& $server->encodeResponse($response); $this->render_openid_response($webresponse); } function handler_trusted(&$page, $action = 'list', $id = null) { $page->setTitle('Sites tiers de confiance'); $page->assign('title', 'Mes sites tiers de confiance pour OpenId'); $table_editor = new PLTableEditor('openid/trusted', 'openid_trusted', 'id'); $table_editor->set_where_clause('user_id = ' . XDB::escape(S::user()->id())); $table_editor->vars['user_id']['display'] = false; $table_editor->describe('url', 'site tiers', true); $page->assign('deleteonly', true); $table_editor->apply($page, $action, $id); } function handler_admin_trusted(&$page, $action = 'list', $id = null) { $page->setTitle('Sites tiers de confiance'); $page->assign('title', 'Sites tiers de confiance globaux pour OpenId'); $table_editor = new PLTableEditor('admin/openid/trusted', 'openid_trusted', 'id'); $table_editor->set_where_clause('user_id IS NULL'); $table_editor->vars['user_id']['display'] = false; $table_editor->describe('url', 'site tiers', true); $page->assign('readonly', true); $table_editor->apply($page, $action, $id); } function handler_idp_xrds(&$page) { $this->load('openid.inc.php'); header('Content-type: application/xrds+xml'); $page->changeTpl('openid/idp_xrds.tpl', NO_SKIN); $page->assign('type2', Auth_OpenID_TYPE_2_0_IDP); $page->assign('sreg', Auth_OpenID_SREG_URI); $page->assign('provider', get_openid_url()); } function handler_user_xrds(&$page, $x = null) { $this->load('openid.inc.php'); $user = get_user($x); if (is_null($user)) { return PL_NOT_FOUND; } header('Content-type: application/xrds+xml'); $page->changeTpl('openid/user_xrds.tpl', NO_SKIN); $page->assign('type2', Auth_OpenID_TYPE_2_0); $page->assign('type1', Auth_OpenID_TYPE_1_1); $page->assign('sreg', Auth_OpenID_SREG_URI); $page->assign('provider', get_openid_url()); $page->assign('local_id', $user->hruid); } function handler_melix(&$page, $x = null) { $this->load('openid.inc.php'); $user = get_user_by_alias($x); // This will redirect to the canonic URL, which was not used // if this hook was triggered return $this->render_discovery_page(&$page, $user); } //--------------------------------------------------------------------// function render_discovery_page(&$page, $user) { // Show the documentation if this is not the OpenId page of an user if (is_null($user)) { pl_redirect('Xorg/OpenId'); } // Redirect to the canonic URL if we are using an alias // There might be a risk of redirection loop here // if $_SERVER was not exactly what we expect $current_url = 'http' . (empty($_SERVER['HTTPS']) ? '' : 's') . '://' . $_SERVER['SERVER_NAME'] . $_SERVER['REQUEST_URI']; $canonic_url = get_user_openid_url($user); if ($current_url != $canonic_url) { http_redirect($canonic_url); } // Include X-XRDS-Location response-header for Yadis discovery header('X-XRDS-Location: ' . get_user_xrds_url($user)); $page->changeTpl('openid/openid.tpl'); $page->setTitle($user->fullName()); // Set the tags for HTML-Based Discovery $page->addLink('openid.server openid2.provider', get_openid_url()); $page->addLink('openid.delegate openid2.local_id', $user->hruid); $page->assign_by_ref('user', $user); return; } function render_openid_response($webresponse) { if ($webresponse->code != AUTH_OPENID_HTTP_OK) { header(sprintf("HTTP/1.1 %d ", $webresponse->code), true, $webresponse->code); } foreach ($webresponse->headers as $k => $v) { header("$k: $v"); } header('Connection: close'); print $webresponse->body; exit; } } // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: ?>