2019-08-12 23:03:30 +09:00
|
|
|
<?php
|
2020-07-26 01:42:46 +09:00
|
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
|
|
//
|
|
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2019-08-12 23:03:30 +09:00
|
|
|
/**
|
|
|
|
* Superclass for plugins that do authentication and/or authorization
|
|
|
|
*
|
|
|
|
* @category Plugin
|
2020-07-26 01:42:46 +09:00
|
|
|
* @package GNUsocial
|
|
|
|
*
|
2019-08-12 23:03:30 +09:00
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @copyright 2009 Free Software Foundation, Inc http://www.fsf.org
|
2020-07-26 01:42:46 +09:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
2019-08-12 23:03:30 +09:00
|
|
|
*/
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
defined('GNUSOCIAL') || die;
|
2019-08-12 23:03:30 +09:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Superclass for plugins that do authentication
|
|
|
|
*
|
2020-07-26 01:42:46 +09:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
2019-08-12 23:03:30 +09:00
|
|
|
*/
|
|
|
|
abstract class AuthenticationModule extends Module
|
|
|
|
{
|
|
|
|
//is this plugin authoritative for authentication?
|
|
|
|
public $authoritative = false;
|
|
|
|
|
|
|
|
//should accounts be automatically created after a successful login attempt?
|
|
|
|
public $autoregistration = false;
|
|
|
|
|
|
|
|
//can the user change their email address
|
2020-07-26 01:42:46 +09:00
|
|
|
public $password_changeable = true;
|
2019-08-12 23:03:30 +09:00
|
|
|
|
|
|
|
//unique name for this authentication provider
|
2020-07-26 01:42:46 +09:00
|
|
|
public $provider_name = null;
|
2019-08-12 23:03:30 +09:00
|
|
|
|
|
|
|
//------------Auth plugin should implement some (or all) of these methods------------\\
|
|
|
|
/**
|
2020-07-26 01:42:46 +09:00
|
|
|
* Check if a nickname/password combination is valid
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
* @param string $password
|
|
|
|
*
|
|
|
|
* @return bool true if the credentials are valid, false if they are invalid.
|
|
|
|
*/
|
|
|
|
public function checkPassword($username, $password)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-07-26 01:42:46 +09:00
|
|
|
* Automatically register a user when they attempt to login with valid credentials.
|
|
|
|
* User::register($data) is a very useful method for this implementation
|
|
|
|
*
|
|
|
|
* @param string $username username (that is used to login and find the user in the authentication provider) of the user to be registered
|
|
|
|
* @param null|string $nickname nickname of the user in the SN system. If nickname is null, then set nickname = username
|
|
|
|
*
|
|
|
|
* @return mixed instance of User, or false (if user couldn't be created)
|
|
|
|
*/
|
|
|
|
public function autoRegister($username, $nickname = null)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
2020-07-26 01:42:46 +09:00
|
|
|
if (is_null($nickname)) {
|
2019-08-12 23:03:30 +09:00
|
|
|
$nickname = $username;
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
$registration_data = [];
|
2019-08-12 23:03:30 +09:00
|
|
|
$registration_data['nickname'] = $nickname;
|
|
|
|
return User::register($registration_data);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-07-26 01:42:46 +09:00
|
|
|
* Change a user's password
|
|
|
|
* The old password has been verified to be valid by this plugin before this call is made
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
* @param string $oldpassword
|
|
|
|
* @param string $newpassword
|
|
|
|
*
|
|
|
|
* @return bool true if the password was changed, false if password changing failed for some reason
|
|
|
|
*/
|
|
|
|
public function changePassword($username, $oldpassword, $newpassword)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-07-26 01:42:46 +09:00
|
|
|
* Given a username, suggest what the nickname should be
|
|
|
|
* Used during autoregistration
|
|
|
|
* Useful if your usernames are ugly, and you want to suggest
|
|
|
|
* nice looking nicknames when users initially sign on
|
|
|
|
* All nicknames returned by this function should be valid
|
|
|
|
* implementations may want to use common_nicknamize() to ensure validity
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
*
|
|
|
|
* @return string nickname
|
|
|
|
*/
|
|
|
|
public function suggestNicknameForUsername($username)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
|
|
|
return common_nicknamize($username);
|
|
|
|
}
|
|
|
|
|
|
|
|
//------------Below are the methods that connect StatusNet to the implementing Auth plugin------------\\
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onInitializePlugin()
|
|
|
|
{
|
|
|
|
if (is_null($this->provider_name)) {
|
|
|
|
throw new Exception('must specify a provider_name for this authentication provider');
|
2019-08-12 23:03:30 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-07-26 01:42:46 +09:00
|
|
|
* Internal AutoRegister event handler
|
|
|
|
*
|
|
|
|
* @param string $nickname
|
|
|
|
* @param string $provider_name
|
|
|
|
* @param User $user - the newly registered user
|
|
|
|
*/
|
|
|
|
public function onAutoRegister($nickname, $provider_name, &$user)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($provider_name == $this->provider_name && $this->autoregistration) {
|
2019-08-12 23:03:30 +09:00
|
|
|
$suggested_nickname = $this->suggestNicknameForUsername($nickname);
|
2020-07-26 01:42:46 +09:00
|
|
|
$test_user = User::getKV('nickname', $suggested_nickname);
|
|
|
|
if ($test_user) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//someone already exists with the suggested nickname, so used the passed nickname
|
|
|
|
$suggested_nickname = common_nicknamize($nickname);
|
|
|
|
}
|
|
|
|
$test_user = User::getKV('nickname', $suggested_nickname);
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($test_user) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//someone already exists with the suggested nickname
|
|
|
|
//not much else we can do
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
$user = $this->autoRegister($nickname, $suggested_nickname);
|
|
|
|
if ($user instanceof User) {
|
2020-07-26 01:42:46 +09:00
|
|
|
User_username::register($user, $nickname, $this->provider_name);
|
2019-08-12 23:03:30 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onStartCheckPassword($nickname, $password, &$authenticatedUser)
|
|
|
|
{
|
2019-08-12 23:03:30 +09:00
|
|
|
//map the nickname to a username
|
2020-07-26 01:42:46 +09:00
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->username = $nickname;
|
|
|
|
$user_username->provider_name = $this->provider_name;
|
|
|
|
if ($user_username->find() && $user_username->fetch()) {
|
2019-08-12 23:03:30 +09:00
|
|
|
$authenticated = $this->checkPassword($user_username->username, $password);
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($authenticated) {
|
2019-08-12 23:03:30 +09:00
|
|
|
$authenticatedUser = User::getKV('id', $user_username->user_id);
|
|
|
|
return false;
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
//$nickname is the username used to login
|
|
|
|
//$suggested_nickname is the nickname the auth provider suggests for that username
|
|
|
|
$suggested_nickname = $this->suggestNicknameForUsername($nickname);
|
2020-07-26 01:42:46 +09:00
|
|
|
$user = User::getKV('nickname', $suggested_nickname);
|
|
|
|
if ($user) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//make sure this user isn't claimed
|
2020-07-26 01:42:46 +09:00
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->user_id = $user->id;
|
|
|
|
$we_can_handle = false;
|
|
|
|
if ($user_username->find()) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//either this provider, or another one, has already claimed this user
|
|
|
|
//so we cannot. Let another plugin try.
|
|
|
|
return;
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
//no other provider claims this user, so it's safe for us to handle it
|
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($authenticated) {
|
2019-08-12 23:03:30 +09:00
|
|
|
$authenticatedUser = $user;
|
2020-07-26 01:42:46 +09:00
|
|
|
User_username::register($authenticatedUser, $nickname, $this->provider_name);
|
2019-08-12 23:03:30 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
$authenticated = $this->checkPassword($nickname, $password);
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($authenticated) {
|
|
|
|
if (!Event::handle('AutoRegister', [$nickname, $this->provider_name, &$authenticatedUser])) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//unlike most Event::handle lines of code, this one has a ! (not)
|
|
|
|
//we want to do this if the event *was* handled - this isn't a "default" implementation
|
|
|
|
//like most code of this form.
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($authenticatedUser) {
|
2019-08-12 23:03:30 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($this->authoritative) {
|
2019-08-12 23:03:30 +09:00
|
|
|
return false;
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
//we're not authoritative, so let other handlers try
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onStartChangePassword(Profile $target, $oldpassword, $newpassword)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($this->password_changeable) {
|
|
|
|
$user_username = new User_username();
|
|
|
|
$user_username->user_id = $target->getID();
|
|
|
|
$user_username->provider_name = $this->provider_name;
|
2019-08-12 23:03:30 +09:00
|
|
|
if ($user_username->find(true)) {
|
|
|
|
$authenticated = $this->checkPassword($user_username->username, $oldpassword);
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($authenticated) {
|
|
|
|
$result = $this->changePassword($user_username->username, $oldpassword, $newpassword);
|
|
|
|
if ($result) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//stop handling of other handlers, because what was requested was done
|
|
|
|
return false;
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
// TRANS: Exception thrown when a password change fails.
|
|
|
|
throw new Exception(_('Password changing failed.'));
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
|
|
|
if ($this->authoritative) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//since we're authoritative, no other plugin could do this
|
|
|
|
// TRANS: Exception thrown when a password change fails.
|
|
|
|
throw new Exception(_('Password changing failed.'));
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
2019-08-12 23:03:30 +09:00
|
|
|
//let another handler try
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-26 01:42:46 +09:00
|
|
|
} else {
|
|
|
|
if ($this->authoritative) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//since we're authoritative, no other plugin could do this
|
|
|
|
// TRANS: Exception thrown when a password change attempt fails because it is not allowed.
|
|
|
|
throw new Exception(_('Password changing is not allowed.'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onStartAccountSettingsPasswordMenuItem($widget)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
2020-07-26 01:42:46 +09:00
|
|
|
if ($this->authoritative && !$this->password_changeable) {
|
2019-08-12 23:03:30 +09:00
|
|
|
//since we're authoritative, no other plugin could change passwords, so do not render the menu item
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onCheckSchema()
|
|
|
|
{
|
2019-08-12 23:03:30 +09:00
|
|
|
$schema = Schema::get();
|
|
|
|
$schema->ensureTable('user_username', User_username::schemaDef());
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-07-26 01:42:46 +09:00
|
|
|
public function onUserDeleteRelated($user, &$tables)
|
2019-08-12 23:03:30 +09:00
|
|
|
{
|
|
|
|
$tables[] = 'User_username';
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|