2009-11-11 06:27:20 +09:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* StatusNet, the distributed open-source microblogging tool
|
|
|
|
*
|
2009-11-19 02:57:37 +09:00
|
|
|
* Superclass for plugins that do authentication
|
2009-11-11 06:27:20 +09:00
|
|
|
*
|
|
|
|
* PHP version 5
|
|
|
|
*
|
|
|
|
* LICENCE: This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* @category Plugin
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!defined('STATUSNET') && !defined('LACONICA')) {
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Superclass for plugins that do authentication
|
|
|
|
*
|
|
|
|
* @category Plugin
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
|
2009-11-12 02:16:58 +09:00
|
|
|
abstract class AuthenticationPlugin extends Plugin
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
|
|
|
//is this plugin authoritative for authentication?
|
2009-11-12 02:16:58 +09:00
|
|
|
public $authoritative = false;
|
2009-11-11 06:27:20 +09:00
|
|
|
|
|
|
|
//should accounts be automatically created after a successful login attempt?
|
2009-11-11 07:54:24 +09:00
|
|
|
public $autoregistration = false;
|
|
|
|
|
|
|
|
//can the user change their email address
|
|
|
|
public $password_changeable=true;
|
|
|
|
|
2009-11-13 10:12:00 +09:00
|
|
|
//unique name for this authentication provider
|
|
|
|
public $provider_name;
|
|
|
|
|
2009-11-11 06:27:20 +09:00
|
|
|
//------------Auth plugin should implement some (or all) of these methods------------\\
|
|
|
|
/**
|
|
|
|
* Check if a nickname/password combination is valid
|
2009-11-13 10:12:00 +09:00
|
|
|
* @param username
|
2009-11-11 06:27:20 +09:00
|
|
|
* @param password
|
|
|
|
* @return boolean true if the credentials are valid, false if they are invalid.
|
|
|
|
*/
|
2009-11-13 10:12:00 +09:00
|
|
|
function checkPassword($username, $password)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Automatically register a user when they attempt to login with valid credentials.
|
|
|
|
* User::register($data) is a very useful method for this implementation
|
2009-11-13 10:12:00 +09:00
|
|
|
* @param username
|
2009-11-14 02:54:27 +09:00
|
|
|
* @return mixed instance of User, or false (if user couldn't be created)
|
2009-11-11 06:27:20 +09:00
|
|
|
*/
|
2009-11-13 10:12:00 +09:00
|
|
|
function autoRegister($username)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2009-11-13 10:12:00 +09:00
|
|
|
$registration_data = array();
|
|
|
|
$registration_data['nickname'] = $username ;
|
|
|
|
return User::register($registration_data);
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Change a user's password
|
|
|
|
* The old password has been verified to be valid by this plugin before this call is made
|
2009-11-13 10:12:00 +09:00
|
|
|
* @param username
|
2009-11-11 06:27:20 +09:00
|
|
|
* @param oldpassword
|
|
|
|
* @param newpassword
|
2009-11-13 10:12:00 +09:00
|
|
|
* @return boolean true if the password was changed, false if password changing failed for some reason
|
2009-11-11 06:27:20 +09:00
|
|
|
*/
|
2009-11-13 10:12:00 +09:00
|
|
|
function changePassword($username,$oldpassword,$newpassword)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2009-11-13 10:12:00 +09:00
|
|
|
return false;
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
//------------Below are the methods that connect StatusNet to the implementing Auth plugin------------\\
|
2009-11-13 10:12:00 +09:00
|
|
|
function onInitializePlugin(){
|
|
|
|
if(!isset($this->provider_name)){
|
|
|
|
throw new Exception("must specify a provider_name for this authentication provider");
|
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
|
2009-11-12 04:04:32 +09:00
|
|
|
function onStartCheckPassword($nickname, $password, &$authenticatedUser){
|
2009-11-13 10:12:00 +09:00
|
|
|
//map the nickname to a username
|
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->username=$nickname;
|
|
|
|
$user_username->provider_name=$this->provider_name;
|
|
|
|
if($user_username->find() && $user_username->fetch()){
|
|
|
|
$username = $user_username->username;
|
|
|
|
$authenticated = $this->checkPassword($username, $password);
|
2009-11-11 07:54:24 +09:00
|
|
|
if($authenticated){
|
2009-11-13 10:12:00 +09:00
|
|
|
$authenticatedUser = User::staticGet('id', $user_username->user_id);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
$user = User::staticGet('nickname', $nickname);
|
|
|
|
if($user){
|
|
|
|
//make sure a different provider isn't handling this nickname
|
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->username=$nickname;
|
|
|
|
if(!$user_username->find()){
|
|
|
|
//no other provider claims this username, so it's safe for us to handle it
|
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
|
|
|
if($authenticated){
|
2009-11-11 07:54:24 +09:00
|
|
|
$authenticatedUser = User::staticGet('nickname', $nickname);
|
2009-11-14 03:11:28 +09:00
|
|
|
User_username::register($authenticatedUser,$nickname,$this->provider_name);
|
2009-11-13 10:12:00 +09:00
|
|
|
return false;
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}else{
|
2009-11-13 10:12:00 +09:00
|
|
|
if($this->autoregistration){
|
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
2009-11-14 02:54:27 +09:00
|
|
|
if($authenticated){
|
|
|
|
$user = $this->autoregister($nickname);
|
|
|
|
if($user){
|
|
|
|
$authenticatedUser = $user;
|
2009-11-14 03:11:28 +09:00
|
|
|
User_username::register($authenticatedUser,$nickname,$this->provider_name);
|
2009-11-14 02:54:27 +09:00
|
|
|
return false;
|
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
}
|
|
|
|
if($this->authoritative){
|
|
|
|
return false;
|
2009-11-11 06:27:20 +09:00
|
|
|
}else{
|
2009-11-13 10:12:00 +09:00
|
|
|
//we're not authoritative, so let other handlers try
|
|
|
|
return;
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-13 10:12:00 +09:00
|
|
|
function onStartChangePassword($user,$oldpassword,$newpassword)
|
2009-11-11 06:27:20 +09:00
|
|
|
{
|
2009-11-11 07:54:24 +09:00
|
|
|
if($this->password_changeable){
|
2009-11-13 10:12:00 +09:00
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->user_id=$user->id;
|
|
|
|
$user_username->provider_name=$this->provider_name;
|
|
|
|
if($user_username->find() && $user_username->fetch()){
|
|
|
|
$authenticated = $this->checkPassword($user_username->username, $oldpassword);
|
|
|
|
if($authenticated){
|
|
|
|
$result = $this->changePassword($user_username->username,$oldpassword,$newpassword);
|
|
|
|
if($result){
|
|
|
|
//stop handling of other handlers, because what was requested was done
|
|
|
|
return false;
|
|
|
|
}else{
|
|
|
|
throw new Exception(_('Password changing failed'));
|
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}else{
|
2009-11-13 10:12:00 +09:00
|
|
|
if($this->authoritative){
|
|
|
|
//since we're authoritative, no other plugin could do this
|
|
|
|
throw new Exception(_('Password changing failed'));
|
|
|
|
}else{
|
|
|
|
//let another handler try
|
|
|
|
return null;
|
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}else{
|
2009-11-12 02:16:58 +09:00
|
|
|
if($this->authoritative){
|
2009-11-11 06:27:20 +09:00
|
|
|
//since we're authoritative, no other plugin could do this
|
2009-11-11 07:54:24 +09:00
|
|
|
throw new Exception(_('Password changing is not allowed'));
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
}
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
function onStartAccountSettingsPasswordMenuItem($widget)
|
|
|
|
{
|
2009-11-12 02:16:58 +09:00
|
|
|
if($this->authoritative && !$this->password_changeable){
|
2009-11-13 10:12:00 +09:00
|
|
|
//since we're authoritative, no other plugin could change passwords, so do not render the menu item
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function onAutoload($cls)
|
|
|
|
{
|
|
|
|
switch ($cls)
|
|
|
|
{
|
|
|
|
case 'User_username':
|
|
|
|
require_once(INSTALLDIR.'/plugins/Authentication/User_username.php');
|
2009-11-11 07:54:24 +09:00
|
|
|
return false;
|
2009-11-13 10:12:00 +09:00
|
|
|
default:
|
|
|
|
return true;
|
2009-11-11 07:54:24 +09:00
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
2009-11-13 10:12:00 +09:00
|
|
|
|
|
|
|
function onCheckSchema() {
|
|
|
|
$schema = Schema::get();
|
2009-11-17 08:36:30 +09:00
|
|
|
$schema->ensureDataObject('User_username');
|
2009-11-13 10:12:00 +09:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
function onUserDeleteRelated($user, &$tables)
|
|
|
|
{
|
|
|
|
$tables[] = 'User_username';
|
|
|
|
return true;
|
|
|
|
}
|
2009-11-11 06:27:20 +09:00
|
|
|
}
|
|
|
|
|