2008-06-17 23:49:42 +09:00
|
|
|
<?php
|
|
|
|
/*
|
2009-08-26 07:14:12 +09:00
|
|
|
* StatusNet - the distributed open-source microblogging tool
|
2009-08-26 07:12:20 +09:00
|
|
|
* Copyright (C) 2008, 2009, StatusNet, Inc.
|
2008-06-17 23:49:42 +09:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2010-10-09 03:23:53 +09:00
|
|
|
if (!defined('STATUSNET')) {
|
|
|
|
exit(1);
|
|
|
|
}
|
2008-06-18 14:48:47 +09:00
|
|
|
|
2008-06-18 00:12:49 +09:00
|
|
|
require_once('Auth/OpenID.php');
|
2008-06-17 23:49:42 +09:00
|
|
|
require_once('Auth/OpenID/Consumer.php');
|
2009-10-30 05:01:25 +09:00
|
|
|
require_once('Auth/OpenID/Server.php');
|
2008-06-18 00:12:49 +09:00
|
|
|
require_once('Auth/OpenID/SReg.php');
|
2008-06-17 23:49:42 +09:00
|
|
|
require_once('Auth/OpenID/MySQLStore.php');
|
|
|
|
|
2011-03-23 00:54:23 +09:00
|
|
|
// About one year cookie expiry
|
2008-06-19 22:47:10 +09:00
|
|
|
|
|
|
|
define('OPENID_COOKIE_EXPIRY', round(365.25 * 24 * 60 * 60));
|
|
|
|
define('OPENID_COOKIE_KEY', 'lastusedopenid');
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_store()
|
|
|
|
{
|
2008-12-24 04:21:29 +09:00
|
|
|
static $store = null;
|
2008-12-24 04:19:07 +09:00
|
|
|
if (!$store) {
|
2011-03-23 00:54:23 +09:00
|
|
|
// Can't be called statically
|
2008-12-24 04:19:07 +09:00
|
|
|
$user = new User();
|
|
|
|
$conn = $user->getDatabaseConnection();
|
|
|
|
$store = new Auth_OpenID_MySQLStore($conn);
|
|
|
|
}
|
|
|
|
return $store;
|
2008-06-17 23:49:42 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_consumer()
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
$store = oid_store();
|
|
|
|
$consumer = new Auth_OpenID_Consumer($store);
|
|
|
|
return $consumer;
|
2008-06-18 20:43:10 +09:00
|
|
|
}
|
|
|
|
|
2009-10-30 05:01:25 +09:00
|
|
|
function oid_server()
|
|
|
|
{
|
|
|
|
$store = oid_store();
|
|
|
|
$server = new Auth_OpenID_Server($store, common_local_url('openidserver'));
|
|
|
|
return $server;
|
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_clear_last()
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
oid_set_last('');
|
2008-06-19 22:47:10 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_set_last($openid_url)
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
common_set_cookie(OPENID_COOKIE_KEY,
|
|
|
|
$openid_url,
|
|
|
|
time() + OPENID_COOKIE_EXPIRY);
|
2008-06-19 22:47:10 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_get_last()
|
|
|
|
{
|
2009-02-18 13:09:57 +09:00
|
|
|
if (empty($_COOKIE[OPENID_COOKIE_KEY])) {
|
|
|
|
return null;
|
|
|
|
}
|
2008-12-24 04:19:07 +09:00
|
|
|
$openid_url = $_COOKIE[OPENID_COOKIE_KEY];
|
|
|
|
if ($openid_url && strlen($openid_url) > 0) {
|
|
|
|
return $openid_url;
|
|
|
|
} else {
|
2008-12-24 04:21:29 +09:00
|
|
|
return null;
|
2008-12-24 04:19:07 +09:00
|
|
|
}
|
2008-06-19 22:47:10 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_link_user($id, $canonical, $display)
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
$oid = new User_openid();
|
|
|
|
$oid->user_id = $id;
|
|
|
|
$oid->canonical = $canonical;
|
|
|
|
$oid->display = $display;
|
2013-10-14 20:42:27 +09:00
|
|
|
$oid->created = common_sql_now();
|
2008-06-19 05:11:23 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
if (!$oid->insert()) {
|
|
|
|
$err = PEAR::getStaticProperty('DB_DataObject','lastError');
|
|
|
|
return false;
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
return true;
|
2008-06-18 20:43:10 +09:00
|
|
|
}
|
2008-06-18 22:32:51 +09:00
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_get_user($openid_url)
|
|
|
|
{
|
2008-12-24 04:21:29 +09:00
|
|
|
$user = null;
|
2013-08-18 20:04:58 +09:00
|
|
|
$oid = User_openid::getKV('canonical', $openid_url);
|
2008-12-24 04:19:07 +09:00
|
|
|
if ($oid) {
|
2013-08-18 20:04:58 +09:00
|
|
|
$user = User::getKV('id', $oid->user_id);
|
2008-12-24 04:19:07 +09:00
|
|
|
}
|
|
|
|
return $user;
|
2008-06-19 22:47:10 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_check_immediate($openid_url, $backto=null)
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
if (!$backto) {
|
|
|
|
$action = $_REQUEST['action'];
|
|
|
|
$args = common_copy_args($_GET);
|
|
|
|
unset($args['action']);
|
|
|
|
$backto = common_local_url($action, $args);
|
|
|
|
}
|
|
|
|
|
|
|
|
common_ensure_session();
|
|
|
|
|
|
|
|
$_SESSION['openid_immediate_backto'] = $backto;
|
|
|
|
|
|
|
|
oid_authenticate($openid_url,
|
|
|
|
'finishimmediate',
|
|
|
|
true);
|
2008-06-19 22:47:10 +09:00
|
|
|
}
|
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function oid_authenticate($openid_url, $returnto, $immediate=false)
|
|
|
|
{
|
2008-06-19 22:47:10 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
$consumer = oid_consumer();
|
|
|
|
|
|
|
|
if (!$consumer) {
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error.
|
2009-12-09 05:17:11 +09:00
|
|
|
common_server_error(_m('Cannot instantiate OpenID consumer object.'));
|
2008-12-24 04:19:07 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
common_ensure_session();
|
|
|
|
|
|
|
|
$auth_request = $consumer->begin($openid_url);
|
|
|
|
|
|
|
|
// Handle failure status return values.
|
|
|
|
if (!$auth_request) {
|
2010-05-29 08:52:17 +09:00
|
|
|
common_log(LOG_ERR, __METHOD__ . ": mystery fail contacting $openid_url");
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin message. Given when an OpenID is not valid.
|
2009-12-09 05:17:11 +09:00
|
|
|
return _m('Not a valid OpenID.');
|
2008-12-24 04:19:07 +09:00
|
|
|
} else if (Auth_OpenID::isFailure($auth_request)) {
|
2010-05-29 08:52:17 +09:00
|
|
|
common_log(LOG_ERR, __METHOD__ . ": OpenID fail to $openid_url: $auth_request->message");
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error. Given when the OpenID authentication request fails.
|
|
|
|
// TRANS: %s is the failure message.
|
2011-04-28 03:37:44 +09:00
|
|
|
return sprintf(_m('OpenID failure: %s.'), $auth_request->message);
|
2008-12-24 04:19:07 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
$sreg_request = Auth_OpenID_SRegRequest::build(// Required
|
|
|
|
array(),
|
|
|
|
// Optional
|
|
|
|
array('nickname',
|
|
|
|
'email',
|
|
|
|
'fullname',
|
|
|
|
'language',
|
|
|
|
'timezone',
|
|
|
|
'postcode',
|
|
|
|
'country'));
|
|
|
|
|
|
|
|
if ($sreg_request) {
|
|
|
|
$auth_request->addExtension($sreg_request);
|
|
|
|
}
|
|
|
|
|
2010-05-19 02:39:56 +09:00
|
|
|
$requiredTeam = common_config('openid', 'required_team');
|
|
|
|
if ($requiredTeam) {
|
|
|
|
// LaunchPad OpenID extension
|
|
|
|
$team_request = new Auth_OpenID_TeamsRequest(array($requiredTeam));
|
|
|
|
if ($team_request) {
|
|
|
|
$auth_request->addExtension($team_request);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-03-31 23:09:11 +09:00
|
|
|
$trust_root = common_root_url(true);
|
2008-12-24 04:19:07 +09:00
|
|
|
$process_url = common_local_url($returnto);
|
|
|
|
|
2010-09-08 08:15:32 +09:00
|
|
|
// Net::OpenID::Server as used on LiveJournal appears to incorrectly
|
|
|
|
// reject POST requests for data submissions that OpenID 1.1 specs
|
|
|
|
// as GET, although 2.0 allows them:
|
|
|
|
// https://rt.cpan.org/Public/Bug/Display.html?id=42202
|
|
|
|
//
|
|
|
|
// Our OpenID libraries would have switched in the redirect automatically
|
|
|
|
// if it were detecting 1.1 compatibility mode, however the server is
|
|
|
|
// advertising itself as 2.0-compatible, so we got switched to the POST.
|
|
|
|
//
|
|
|
|
// Since the GET should always work anyway, we'll just take out the
|
|
|
|
// autosubmitter for now.
|
|
|
|
//
|
|
|
|
//if ($auth_request->shouldSendRedirect()) {
|
2008-12-24 04:19:07 +09:00
|
|
|
$redirect_url = $auth_request->redirectURL($trust_root,
|
|
|
|
$process_url,
|
|
|
|
$immediate);
|
|
|
|
if (!$redirect_url) {
|
|
|
|
} else if (Auth_OpenID::isFailure($redirect_url)) {
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error. Given when the OpenID authentication request cannot be redirected.
|
|
|
|
// TRANS: %s is the failure message.
|
2011-04-28 03:37:44 +09:00
|
|
|
return sprintf(_m('Could not redirect to server: %s.'), $redirect_url->message);
|
2008-12-24 04:19:07 +09:00
|
|
|
} else {
|
2009-04-02 04:30:59 +09:00
|
|
|
common_redirect($redirect_url, 303);
|
2008-12-24 04:19:07 +09:00
|
|
|
}
|
2010-09-08 08:15:32 +09:00
|
|
|
/*
|
2008-12-24 04:19:07 +09:00
|
|
|
} else {
|
|
|
|
// Generate form markup and render it.
|
|
|
|
$form_id = 'openid_message';
|
|
|
|
$form_html = $auth_request->formMarkup($trust_root, $process_url,
|
|
|
|
$immediate, array('id' => $form_id));
|
|
|
|
|
2011-03-23 00:54:23 +09:00
|
|
|
// XXX: This is cheap, but things choke if we don't escape ampersands
|
|
|
|
// in the HTML attributes
|
2008-12-24 04:19:07 +09:00
|
|
|
|
|
|
|
$form_html = preg_replace('/&/', '&', $form_html);
|
|
|
|
|
2009-11-09 07:28:51 +09:00
|
|
|
// Display an error if the form markup couldn't be generated;
|
2008-12-24 04:19:07 +09:00
|
|
|
// otherwise, render the HTML.
|
|
|
|
if (Auth_OpenID::isFailure($form_html)) {
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error if the form markup could not be generated.
|
|
|
|
// TRANS: %s is the failure message.
|
2009-12-09 05:17:11 +09:00
|
|
|
common_server_error(sprintf(_m('Could not create OpenID form: %s'), $form_html->message));
|
2008-12-24 04:19:07 +09:00
|
|
|
} else {
|
2009-01-23 10:17:29 +09:00
|
|
|
$action = new AutosubmitAction(); // see below
|
|
|
|
$action->form_html = $form_html;
|
|
|
|
$action->form_id = $form_id;
|
|
|
|
$action->prepare(array('action' => 'autosubmit'));
|
|
|
|
$action->handle(array('action' => 'autosubmit'));
|
2008-12-24 04:19:07 +09:00
|
|
|
}
|
|
|
|
}
|
2010-09-08 08:15:32 +09:00
|
|
|
*/
|
2008-06-19 00:05:57 +09:00
|
|
|
}
|
2008-06-19 22:51:48 +09:00
|
|
|
|
2011-03-23 00:54:23 +09:00
|
|
|
// Half-assed attempt at a module-private function
|
2008-06-20 04:03:57 +09:00
|
|
|
|
2008-12-24 04:33:23 +09:00
|
|
|
function _oid_print_instructions()
|
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
common_element('div', 'instructions',
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin user instructions.
|
2009-12-09 05:17:11 +09:00
|
|
|
_m('This form should automatically submit itself. '.
|
2008-12-24 04:19:07 +09:00
|
|
|
'If not, click the submit button to go to your '.
|
|
|
|
'OpenID provider.'));
|
2008-06-20 04:03:57 +09:00
|
|
|
}
|
|
|
|
|
2010-05-21 04:21:29 +09:00
|
|
|
/**
|
|
|
|
* Update a user from sreg parameters
|
|
|
|
* @param User $user
|
|
|
|
* @param array $sreg fields from OpenID sreg response
|
|
|
|
* @access private
|
|
|
|
*/
|
|
|
|
function oid_update_user($user, $sreg)
|
2008-12-24 04:33:23 +09:00
|
|
|
{
|
2008-12-24 04:19:07 +09:00
|
|
|
$profile = $user->getProfile();
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
$orig_profile = clone($profile);
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2010-03-13 03:07:32 +09:00
|
|
|
if (!empty($sreg['fullname']) && strlen($sreg['fullname']) <= 255) {
|
2008-12-24 04:19:07 +09:00
|
|
|
$profile->fullname = $sreg['fullname'];
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2010-03-13 03:07:32 +09:00
|
|
|
if (!empty($sreg['country'])) {
|
2008-12-24 04:19:07 +09:00
|
|
|
if ($sreg['postcode']) {
|
2011-03-23 00:54:23 +09:00
|
|
|
// XXX: use postcode to get city and region
|
|
|
|
// XXX: also, store postcode somewhere -- it's valuable!
|
2008-12-24 04:19:07 +09:00
|
|
|
$profile->location = $sreg['postcode'] . ', ' . $sreg['country'];
|
|
|
|
} else {
|
|
|
|
$profile->location = $sreg['country'];
|
|
|
|
}
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2011-03-23 00:54:23 +09:00
|
|
|
// XXX save language if it's passed
|
|
|
|
// XXX save timezone if it's passed
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
if (!$profile->update($orig_profile)) {
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error.
|
2009-12-09 05:17:11 +09:00
|
|
|
common_server_error(_m('Error saving the profile.'));
|
2008-12-24 04:19:07 +09:00
|
|
|
return false;
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
$orig_user = clone($user);
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2010-03-13 03:07:32 +09:00
|
|
|
if (!empty($sreg['email']) && Validate::email($sreg['email'], common_config('email', 'check_domain'))) {
|
2008-12-24 04:19:07 +09:00
|
|
|
$user->email = $sreg['email'];
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
if (!$user->update($orig_user)) {
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin server error.
|
2009-12-09 05:17:11 +09:00
|
|
|
common_server_error(_m('Error saving the user.'));
|
2008-12-24 04:19:07 +09:00
|
|
|
return false;
|
|
|
|
}
|
2008-06-24 11:52:34 +09:00
|
|
|
|
2008-12-24 04:19:07 +09:00
|
|
|
return true;
|
2008-06-19 22:51:48 +09:00
|
|
|
}
|
2009-01-23 10:17:29 +09:00
|
|
|
|
2010-03-26 05:58:05 +09:00
|
|
|
function oid_assert_allowed($url)
|
|
|
|
{
|
|
|
|
$blacklist = common_config('openid', 'blacklist');
|
|
|
|
$whitelist = common_config('openid', 'whitelist');
|
|
|
|
|
|
|
|
if (empty($blacklist)) {
|
|
|
|
$blacklist = array();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (empty($whitelist)) {
|
|
|
|
$whitelist = array();
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($blacklist as $pattern) {
|
|
|
|
if (preg_match("/$pattern/", $url)) {
|
|
|
|
common_log(LOG_INFO, "Matched OpenID blacklist pattern {$pattern} with {$url}");
|
|
|
|
foreach ($whitelist as $exception) {
|
|
|
|
if (preg_match("/$exception/", $url)) {
|
|
|
|
common_log(LOG_INFO, "Matched OpenID whitelist pattern {$exception} with {$url}");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin client exception (403).
|
2011-04-28 03:37:44 +09:00
|
|
|
throw new ClientException(_m('Unauthorized URL used for OpenID login.'), 403);
|
2010-03-26 05:58:05 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-05-19 02:39:56 +09:00
|
|
|
/**
|
|
|
|
* Check the teams available in the given OpenID response
|
|
|
|
* Using Launchpad's OpenID teams extension
|
|
|
|
*
|
|
|
|
* @return boolean whether this user is acceptable
|
|
|
|
*/
|
|
|
|
function oid_check_teams($response)
|
|
|
|
{
|
|
|
|
$requiredTeam = common_config('openid', 'required_team');
|
|
|
|
if ($requiredTeam) {
|
|
|
|
$team_resp = new Auth_OpenID_TeamsResponse($response);
|
|
|
|
if ($team_resp) {
|
|
|
|
$teams = $team_resp->getTeams();
|
|
|
|
} else {
|
|
|
|
$teams = array();
|
|
|
|
}
|
|
|
|
|
|
|
|
$match = in_array($requiredTeam, $teams);
|
|
|
|
$is = $match ? 'is' : 'is not';
|
|
|
|
common_log(LOG_DEBUG, "Remote user $is in required team $requiredTeam: [" . implode(', ', $teams) . "]");
|
|
|
|
|
|
|
|
return $match;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2009-01-23 10:17:29 +09:00
|
|
|
class AutosubmitAction extends Action
|
|
|
|
{
|
|
|
|
var $form_html = null;
|
|
|
|
var $form_id = null;
|
|
|
|
|
|
|
|
function handle($args)
|
|
|
|
{
|
|
|
|
parent::handle($args);
|
|
|
|
$this->showPage();
|
|
|
|
}
|
|
|
|
|
|
|
|
function title()
|
|
|
|
{
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: Title
|
2010-04-24 03:28:50 +09:00
|
|
|
return _m('OpenID Login Submission');
|
2009-01-23 10:17:29 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
function showContent()
|
|
|
|
{
|
2010-04-24 03:28:50 +09:00
|
|
|
$this->raw('<p style="margin: 20px 80px">');
|
2011-04-28 03:37:44 +09:00
|
|
|
// @todo FIXME: This would be better using standard CSS class, but the present theme's a bit scary.
|
2010-04-24 03:28:50 +09:00
|
|
|
$this->element('img', array('src' => Theme::path('images/icons/icon_processing.gif', 'base'),
|
|
|
|
// for some reason the base CSS sets <img>s as block display?!
|
|
|
|
'style' => 'display: inline'));
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin message used while requesting authorization user's OpenID login provider.
|
2010-04-24 03:28:50 +09:00
|
|
|
$this->text(_m('Requesting authorization from your login provider...'));
|
|
|
|
$this->raw('</p>');
|
|
|
|
$this->raw('<p style="margin-top: 60px; font-style: italic">');
|
2010-05-01 06:07:19 +09:00
|
|
|
// TRANS: OpenID plugin message. User instruction while requesting authorization user's OpenID login provider.
|
2010-04-24 03:28:50 +09:00
|
|
|
$this->text(_m('If you are not redirected to your login provider in a few seconds, try pushing the button below.'));
|
|
|
|
$this->raw('</p>');
|
2009-01-23 10:17:29 +09:00
|
|
|
$this->raw($this->form_html);
|
2009-11-14 08:34:15 +09:00
|
|
|
}
|
2010-03-26 05:35:22 +09:00
|
|
|
|
2009-11-14 08:34:15 +09:00
|
|
|
function showScripts()
|
|
|
|
{
|
|
|
|
parent::showScripts();
|
2009-01-23 10:17:29 +09:00
|
|
|
$this->element('script', null,
|
2010-04-24 03:28:50 +09:00
|
|
|
'document.getElementById(\'' . $this->form_id . '\').submit();');
|
2009-01-23 10:17:29 +09:00
|
|
|
}
|
|
|
|
}
|