2009-11-11 06:27:20 +09:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* StatusNet, the distributed open-source microblogging tool
|
|
|
|
*
|
2009-11-26 06:38:59 +09:00
|
|
|
* Superclass for plugins that do authentication and/or authorization
|
2009-11-11 06:27:20 +09:00
|
|
|
*
|
|
|
|
* PHP version 5
|
|
|
|
*
|
|
|
|
* LICENCE: This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* @category Plugin
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
2010-05-28 07:26:47 +09:00
|
|
|
* @copyright 2009 Free Software Foundation, Inc http://www.fsf.org
|
2009-11-11 06:27:20 +09:00
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
|
2015-03-01 20:36:19 +09:00
|
|
|
if (!defined('GNUSOCIAL')) { exit(1); }
|
2009-11-11 06:27:20 +09:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Superclass for plugins that do authentication
|
|
|
|
*
|
|
|
|
* @category Plugin
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
2009-11-12 02:16:58 +09:00
|
|
|
abstract class AuthenticationPlugin extends Plugin
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
|
|
|
//is this plugin authoritative for authentication?
|
2009-11-12 02:16:58 +09:00
|
|
|
public $authoritative = false;
|
2010-09-29 07:39:45 +09:00
|
|
|
|
2009-11-11 06:27:20 +09:00
|
|
|
//should accounts be automatically created after a successful login attempt?
|
2009-11-11 07:54:24 +09:00
|
|
|
public $autoregistration = false;
|
|
|
|
|
|
|
|
//can the user change their email address
|
|
|
|
public $password_changeable=true;
|
|
|
|
|
2009-11-13 10:12:00 +09:00
|
|
|
//unique name for this authentication provider
|
|
|
|
public $provider_name;
|
|
|
|
|
2009-11-11 06:27:20 +09:00
|
|
|
//------------Auth plugin should implement some (or all) of these methods------------\\
|
|
|
|
/**
|
|
|
|
* Check if a nickname/password combination is valid
|
2009-11-13 10:12:00 +09:00
|
|
|
* @param username
|
2009-11-11 06:27:20 +09:00
|
|
|
* @param password
|
|
|
|
* @return boolean true if the credentials are valid, false if they are invalid.
|
|
|
|
*/
|
2009-11-13 10:12:00 +09:00
|
|
|
function checkPassword($username, $password)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Automatically register a user when they attempt to login with valid credentials.
|
|
|
|
* User::register($data) is a very useful method for this implementation
|
2010-01-30 10:43:16 +09:00
|
|
|
* @param username username (that is used to login and find the user in the authentication provider) of the user to be registered
|
|
|
|
* @param nickname nickname of the user in the SN system. If nickname is null, then set nickname = username
|
2009-11-14 02:54:27 +09:00
|
|
|
* @return mixed instance of User, or false (if user couldn't be created)
|
2009-11-11 06:27:20 +09:00
|
|
|
*/
|
2010-01-30 10:43:16 +09:00
|
|
|
function autoRegister($username, $nickname = null)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2010-01-30 10:43:16 +09:00
|
|
|
if(is_null($nickname)){
|
|
|
|
$nickname = $username;
|
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
$registration_data = array();
|
2010-03-02 01:48:46 +09:00
|
|
|
$registration_data['nickname'] = $nickname;
|
2009-11-13 10:12:00 +09:00
|
|
|
return User::register($registration_data);
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Change a user's password
|
|
|
|
* The old password has been verified to be valid by this plugin before this call is made
|
2009-11-13 10:12:00 +09:00
|
|
|
* @param username
|
2009-11-11 06:27:20 +09:00
|
|
|
* @param oldpassword
|
|
|
|
* @param newpassword
|
2009-11-13 10:12:00 +09:00
|
|
|
* @return boolean true if the password was changed, false if password changing failed for some reason
|
2009-11-11 06:27:20 +09:00
|
|
|
*/
|
2009-11-13 10:12:00 +09:00
|
|
|
function changePassword($username,$oldpassword,$newpassword)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2009-11-13 10:12:00 +09:00
|
|
|
return false;
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
|
2010-01-15 09:43:03 +09:00
|
|
|
/**
|
|
|
|
* Given a username, suggest what the nickname should be
|
|
|
|
* Used during autoregistration
|
|
|
|
* Useful if your usernames are ugly, and you want to suggest
|
|
|
|
* nice looking nicknames when users initially sign on
|
2010-03-02 01:48:46 +09:00
|
|
|
* All nicknames returned by this function should be valid
|
|
|
|
* implementations may want to use common_nicknamize() to ensure validity
|
2010-01-15 09:43:03 +09:00
|
|
|
* @param username
|
|
|
|
* @return string nickname
|
|
|
|
*/
|
|
|
|
function suggestNicknameForUsername($username)
|
|
|
|
{
|
2010-03-02 01:48:46 +09:00
|
|
|
return common_nicknamize($username);
|
2010-01-15 09:43:03 +09:00
|
|
|
}
|
|
|
|
|
2009-11-11 06:27:20 +09:00
|
|
|
//------------Below are the methods that connect StatusNet to the implementing Auth plugin------------\\
|
2009-11-13 10:12:00 +09:00
|
|
|
function onInitializePlugin(){
|
|
|
|
if(!isset($this->provider_name)){
|
|
|
|
throw new Exception("must specify a provider_name for this authentication provider");
|
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
|
2010-01-05 03:33:52 +09:00
|
|
|
/**
|
|
|
|
* Internal AutoRegister event handler
|
|
|
|
* @param nickname
|
|
|
|
* @param provider_name
|
|
|
|
* @param user - the newly registered user
|
|
|
|
*/
|
|
|
|
function onAutoRegister($nickname, $provider_name, &$user)
|
|
|
|
{
|
|
|
|
if($provider_name == $this->provider_name && $this->autoregistration){
|
2010-01-15 09:43:03 +09:00
|
|
|
$suggested_nickname = $this->suggestNicknameForUsername($nickname);
|
2013-08-18 20:04:58 +09:00
|
|
|
$test_user = User::getKV('nickname', $suggested_nickname);
|
2010-01-15 09:43:03 +09:00
|
|
|
if($test_user) {
|
|
|
|
//someone already exists with the suggested nickname, so used the passed nickname
|
2010-03-02 01:48:46 +09:00
|
|
|
$suggested_nickname = common_nicknamize($nickname);
|
2010-01-15 09:43:03 +09:00
|
|
|
}
|
2013-08-18 20:04:58 +09:00
|
|
|
$test_user = User::getKV('nickname', $suggested_nickname);
|
2010-01-15 09:43:03 +09:00
|
|
|
if($test_user) {
|
|
|
|
//someone already exists with the suggested nickname
|
|
|
|
//not much else we can do
|
|
|
|
}else{
|
2010-01-30 10:43:16 +09:00
|
|
|
$user = $this->autoRegister($nickname, $suggested_nickname);
|
2015-03-01 20:36:19 +09:00
|
|
|
if ($user instanceof User) {
|
2010-01-15 09:43:03 +09:00
|
|
|
User_username::register($user,$nickname,$this->provider_name);
|
|
|
|
return false;
|
|
|
|
}
|
2010-01-05 03:33:52 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-12 04:04:32 +09:00
|
|
|
function onStartCheckPassword($nickname, $password, &$authenticatedUser){
|
2009-11-13 10:12:00 +09:00
|
|
|
//map the nickname to a username
|
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->username=$nickname;
|
|
|
|
$user_username->provider_name=$this->provider_name;
|
|
|
|
if($user_username->find() && $user_username->fetch()){
|
2010-01-15 09:43:03 +09:00
|
|
|
$authenticated = $this->checkPassword($user_username->username, $password);
|
2009-11-11 07:54:24 +09:00
|
|
|
if($authenticated){
|
2013-08-18 20:04:58 +09:00
|
|
|
$authenticatedUser = User::getKV('id', $user_username->user_id);
|
2009-11-13 10:12:00 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}else{
|
2010-01-15 09:43:03 +09:00
|
|
|
//$nickname is the username used to login
|
|
|
|
//$suggested_nickname is the nickname the auth provider suggests for that username
|
|
|
|
$suggested_nickname = $this->suggestNicknameForUsername($nickname);
|
2013-08-18 20:04:58 +09:00
|
|
|
$user = User::getKV('nickname', $suggested_nickname);
|
2009-11-13 10:12:00 +09:00
|
|
|
if($user){
|
2010-01-15 09:43:03 +09:00
|
|
|
//make sure this user isn't claimed
|
2009-11-13 10:12:00 +09:00
|
|
|
$user_username = new User_username();
|
2010-01-15 09:43:03 +09:00
|
|
|
$user_username->user_id=$user->id;
|
|
|
|
$we_can_handle = false;
|
|
|
|
if($user_username->find()){
|
|
|
|
//either this provider, or another one, has already claimed this user
|
|
|
|
//so we cannot. Let another plugin try.
|
|
|
|
return;
|
|
|
|
}else{
|
|
|
|
//no other provider claims this user, so it's safe for us to handle it
|
2009-11-13 10:12:00 +09:00
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
|
|
|
if($authenticated){
|
2010-01-15 09:43:03 +09:00
|
|
|
$authenticatedUser = $user;
|
2009-11-14 03:11:28 +09:00
|
|
|
User_username::register($authenticatedUser,$nickname,$this->provider_name);
|
2009-11-13 10:12:00 +09:00
|
|
|
return false;
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}else{
|
2010-01-05 03:33:52 +09:00
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
|
|
|
if($authenticated){
|
2010-01-06 03:42:15 +09:00
|
|
|
if(! Event::handle('AutoRegister', array($nickname, $this->provider_name, &$authenticatedUser))){
|
|
|
|
//unlike most Event::handle lines of code, this one has a ! (not)
|
|
|
|
//we want to do this if the event *was* handled - this isn't a "default" implementation
|
|
|
|
//like most code of this form.
|
2010-01-05 03:33:52 +09:00
|
|
|
if($authenticatedUser){
|
2009-11-14 02:54:27 +09:00
|
|
|
return false;
|
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
}
|
|
|
|
if($this->authoritative){
|
|
|
|
return false;
|
2009-11-11 06:27:20 +09:00
|
|
|
}else{
|
2009-11-13 10:12:00 +09:00
|
|
|
//we're not authoritative, so let other handlers try
|
|
|
|
return;
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-13 10:12:00 +09:00
|
|
|
function onStartChangePassword($user,$oldpassword,$newpassword)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2009-11-11 07:54:24 +09:00
|
|
|
if($this->password_changeable){
|
2009-11-13 10:12:00 +09:00
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->user_id=$user->id;
|
|
|
|
$user_username->provider_name=$this->provider_name;
|
|
|
|
if($user_username->find() && $user_username->fetch()){
|
|
|
|
$authenticated = $this->checkPassword($user_username->username, $oldpassword);
|
|
|
|
if($authenticated){
|
|
|
|
$result = $this->changePassword($user_username->username,$oldpassword,$newpassword);
|
|
|
|
if($result){
|
|
|
|
//stop handling of other handlers, because what was requested was done
|
|
|
|
return false;
|
|
|
|
}else{
|
2010-09-29 07:39:45 +09:00
|
|
|
// TRANS: Exception thrown when a password change fails.
|
|
|
|
throw new Exception(_('Password changing failed.'));
|
2009-11-13 10:12:00 +09:00
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}else{
|
2009-11-13 10:12:00 +09:00
|
|
|
if($this->authoritative){
|
|
|
|
//since we're authoritative, no other plugin could do this
|
2010-09-29 07:39:45 +09:00
|
|
|
// TRANS: Exception thrown when a password change fails.
|
|
|
|
throw new Exception(_('Password changing failed.'));
|
2009-11-13 10:12:00 +09:00
|
|
|
}else{
|
|
|
|
//let another handler try
|
|
|
|
return null;
|
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}else{
|
2009-11-12 02:16:58 +09:00
|
|
|
if($this->authoritative){
|
2009-11-11 06:27:20 +09:00
|
|
|
//since we're authoritative, no other plugin could do this
|
2010-09-29 07:39:45 +09:00
|
|
|
// TRANS: Exception thrown when a password change attempt fails because it is not allowed.
|
|
|
|
throw new Exception(_('Password changing is not allowed.'));
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
function onStartAccountSettingsPasswordMenuItem($widget)
|
|
|
|
{
|
2009-11-12 02:16:58 +09:00
|
|
|
if($this->authoritative && !$this->password_changeable){
|
2009-11-13 10:12:00 +09:00
|
|
|
//since we're authoritative, no other plugin could change passwords, so do not render the menu item
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function onCheckSchema() {
|
|
|
|
$schema = Schema::get();
|
2013-08-20 00:08:18 +09:00
|
|
|
$schema->ensureTable('user_username', User_username::schemaDef());
|
2009-11-13 10:12:00 +09:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
function onUserDeleteRelated($user, &$tables)
|
|
|
|
{
|
|
|
|
$tables[] = 'User_username';
|
|
|
|
return true;
|
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|