| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Catalyst::Authentication::Credential::HTTP; |
|
2
|
2
|
|
|
2
|
|
58244
|
use base qw/Catalyst::Authentication::Credential::Password/; |
|
|
2
|
|
|
|
|
6
|
|
|
|
2
|
|
|
|
|
1327
|
|
|
3
|
|
|
|
|
|
|
|
|
4
|
|
|
|
|
|
|
use strict; |
|
5
|
|
|
|
|
|
|
use warnings; |
|
6
|
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
use String::Escape (); |
|
8
|
|
|
|
|
|
|
use URI::Escape (); |
|
9
|
|
|
|
|
|
|
use Catalyst (); |
|
10
|
|
|
|
|
|
|
use Digest::MD5 (); |
|
11
|
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
__PACKAGE__->mk_accessors(qw/ |
|
13
|
|
|
|
|
|
|
_config |
|
14
|
|
|
|
|
|
|
authorization_required_message |
|
15
|
|
|
|
|
|
|
password_field |
|
16
|
|
|
|
|
|
|
username_field |
|
17
|
|
|
|
|
|
|
type |
|
18
|
|
|
|
|
|
|
realm |
|
19
|
|
|
|
|
|
|
algorithm |
|
20
|
|
|
|
|
|
|
use_uri_for |
|
21
|
|
|
|
|
|
|
no_unprompted_authorization_required |
|
22
|
|
|
|
|
|
|
require_ssl |
|
23
|
|
|
|
|
|
|
broken_dotnet_digest_without_query_string |
|
24
|
|
|
|
|
|
|
/); |
|
25
|
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
our $VERSION = '1.016'; |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
sub new { |
|
29
|
|
|
|
|
|
|
my ($class, $config, $app, $realm) = @_; |
|
30
|
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
$config->{username_field} ||= 'username'; |
|
32
|
|
|
|
|
|
|
# _config is shity back-compat with our base class. |
|
33
|
|
|
|
|
|
|
my $self = { %$config, _config => $config, _debug => $app->debug ? 1 : 0 }; |
|
34
|
|
|
|
|
|
|
bless $self, $class; |
|
35
|
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
$self->realm($realm); |
|
37
|
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
$self->init; |
|
39
|
|
|
|
|
|
|
return $self; |
|
40
|
|
|
|
|
|
|
} |
|
41
|
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
sub init { |
|
43
|
|
|
|
|
|
|
my ($self) = @_; |
|
44
|
|
|
|
|
|
|
my $type = $self->type || 'any'; |
|
45
|
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
if (!grep /$type/, ('basic', 'digest', 'any')) { |
|
47
|
|
|
|
|
|
|
Catalyst::Exception->throw(__PACKAGE__ . " used with unsupported authentication type: " . $type); |
|
48
|
|
|
|
|
|
|
} |
|
49
|
|
|
|
|
|
|
$self->type($type); |
|
50
|
|
|
|
|
|
|
} |
|
51
|
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
sub authenticate { |
|
53
|
|
|
|
|
|
|
my ( $self, $c, $realm, $auth_info ) = @_; |
|
54
|
|
|
|
|
|
|
my $auth; |
|
55
|
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
$self->authentication_failed( $c, $realm, $auth_info ) |
|
57
|
|
|
|
|
|
|
if $self->require_ssl ? $c->req->base->scheme ne 'https' : 0; |
|
58
|
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
$auth = $self->authenticate_digest($c, $realm, $auth_info) if $self->_is_http_auth_type('digest'); |
|
60
|
|
|
|
|
|
|
return $auth if $auth; |
|
61
|
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
$auth = $self->authenticate_basic($c, $realm, $auth_info) if $self->_is_http_auth_type('basic'); |
|
63
|
|
|
|
|
|
|
return $auth if $auth; |
|
64
|
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
$self->authentication_failed( $c, $realm, $auth_info ); |
|
66
|
|
|
|
|
|
|
} |
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
sub authentication_failed { |
|
69
|
|
|
|
|
|
|
my ( $self, $c, $realm, $auth_info ) = @_; |
|
70
|
|
|
|
|
|
|
unless ($self->no_unprompted_authorization_required) { |
|
71
|
|
|
|
|
|
|
$self->authorization_required_response($c, $realm, $auth_info); |
|
72
|
|
|
|
|
|
|
die $Catalyst::DETACH; |
|
73
|
|
|
|
|
|
|
} |
|
74
|
|
|
|
|
|
|
} |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
sub authenticate_basic { |
|
77
|
|
|
|
|
|
|
my ( $self, $c, $realm, $auth_info ) = @_; |
|
78
|
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
$c->log->debug('Checking http basic authentication.') if $c->debug; |
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
my $headers = $c->req->headers; |
|
82
|
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
if ( my ( $username, $password ) = $headers->authorization_basic ) { |
|
84
|
|
|
|
|
|
|
my $user_obj = $realm->find_user( { $self->username_field => $username }, $c); |
|
85
|
|
|
|
|
|
|
if (ref($user_obj)) { |
|
86
|
|
|
|
|
|
|
my $opts = {}; |
|
87
|
|
|
|
|
|
|
$opts->{$self->password_field} = $password |
|
88
|
|
|
|
|
|
|
if $self->password_field; |
|
89
|
|
|
|
|
|
|
if ($self->check_password($user_obj, $opts)) { |
|
90
|
|
|
|
|
|
|
return $user_obj; |
|
91
|
|
|
|
|
|
|
} |
|
92
|
|
|
|
|
|
|
else { |
|
93
|
|
|
|
|
|
|
$c->log->debug("Password mismatch!") if $c->debug; |
|
94
|
|
|
|
|
|
|
return; |
|
95
|
|
|
|
|
|
|
} |
|
96
|
|
|
|
|
|
|
} |
|
97
|
|
|
|
|
|
|
else { |
|
98
|
|
|
|
|
|
|
$c->log->debug("Unable to locate user matching user info provided") |
|
99
|
|
|
|
|
|
|
if $c->debug; |
|
100
|
|
|
|
|
|
|
return; |
|
101
|
|
|
|
|
|
|
} |
|
102
|
|
|
|
|
|
|
} |
|
103
|
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
return; |
|
105
|
|
|
|
|
|
|
} |
|
106
|
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
sub authenticate_digest { |
|
108
|
|
|
|
|
|
|
my ( $self, $c, $realm, $auth_info ) = @_; |
|
109
|
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
$c->log->debug('Checking http digest authentication.') if $c->debug; |
|
111
|
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
my $headers = $c->req->headers; |
|
113
|
|
|
|
|
|
|
my @authorization = $headers->header('Authorization'); |
|
114
|
|
|
|
|
|
|
foreach my $authorization (@authorization) { |
|
115
|
|
|
|
|
|
|
next unless $authorization =~ m{^Digest}; |
|
116
|
|
|
|
|
|
|
my %res = map { |
|
117
|
|
|
|
|
|
|
my @key_val = split /=/, $_, 2; |
|
118
|
|
|
|
|
|
|
$key_val[0] = lc $key_val[0]; |
|
119
|
|
|
|
|
|
|
$key_val[1] =~ s{"}{}g; # remove the quotes |
|
120
|
|
|
|
|
|
|
@key_val; |
|
121
|
|
|
|
|
|
|
} split /,\s?/, substr( $authorization, 7 ); #7 == length "Digest " |
|
122
|
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
my $opaque = $res{opaque}; |
|
124
|
|
|
|
|
|
|
my $nonce = $self->get_digest_authorization_nonce( $c, __PACKAGE__ . '::opaque:' . $opaque ); |
|
125
|
|
|
|
|
|
|
next unless $nonce; |
|
126
|
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
$c->log->debug('Checking authentication parameters.') |
|
128
|
|
|
|
|
|
|
if $c->debug; |
|
129
|
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
my $uri = $c->request->uri->path_query; |
|
131
|
|
|
|
|
|
|
my $algorithm = $res{algorithm} || 'MD5'; |
|
132
|
|
|
|
|
|
|
my $nonce_count = '0x' . $res{nc}; |
|
133
|
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
my $check = ($uri eq $res{uri} || |
|
135
|
|
|
|
|
|
|
($self->broken_dotnet_digest_without_query_string && |
|
136
|
|
|
|
|
|
|
$c->request->uri->path eq $res{uri})) |
|
137
|
|
|
|
|
|
|
&& ( exists $res{username} ) |
|
138
|
|
|
|
|
|
|
&& ( exists $res{qop} ) |
|
139
|
|
|
|
|
|
|
&& ( exists $res{cnonce} ) |
|
140
|
|
|
|
|
|
|
&& ( exists $res{nc} ) |
|
141
|
|
|
|
|
|
|
&& $algorithm eq $nonce->algorithm |
|
142
|
|
|
|
|
|
|
&& hex($nonce_count) > hex( $nonce->nonce_count ) |
|
143
|
|
|
|
|
|
|
&& $res{nonce} eq $nonce->nonce; # TODO: set Stale instead |
|
144
|
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
unless ($check) { |
|
146
|
|
|
|
|
|
|
$c->log->debug('Digest authentication failed. Bad request.') |
|
147
|
|
|
|
|
|
|
if $c->debug; |
|
148
|
|
|
|
|
|
|
$c->res->status(400); # bad request |
|
149
|
|
|
|
|
|
|
Carp::confess $Catalyst::DETACH; |
|
150
|
|
|
|
|
|
|
} |
|
151
|
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
$c->log->debug('Checking authentication response.') |
|
153
|
|
|
|
|
|
|
if $c->debug; |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
my $username = $res{username}; |
|
156
|
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
my $user_obj; |
|
158
|
|
|
|
|
|
|
|
|
159
|
|
|
|
|
|
|
unless ( $user_obj = $auth_info->{user} ) { |
|
160
|
|
|
|
|
|
|
$user_obj = $realm->find_user( { $self->username_field => $username }, $c); |
|
161
|
|
|
|
|
|
|
} |
|
162
|
|
|
|
|
|
|
unless ($user_obj) { # no user, no authentication |
|
163
|
|
|
|
|
|
|
$c->log->debug("Unable to locate user matching user info provided") if $c->debug; |
|
164
|
|
|
|
|
|
|
return; |
|
165
|
|
|
|
|
|
|
} |
|
166
|
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
# everything looks good, let's check the response |
|
168
|
|
|
|
|
|
|
# calculate H(A2) as per spec |
|
169
|
|
|
|
|
|
|
my $ctx = Digest::MD5->new; |
|
170
|
|
|
|
|
|
|
$ctx->add( join( ':', $c->request->method, $res{uri} ) ); |
|
171
|
|
|
|
|
|
|
if ( $res{qop} eq 'auth-int' ) { |
|
172
|
|
|
|
|
|
|
my $digest = |
|
173
|
|
|
|
|
|
|
Digest::MD5::md5_hex( $c->request->body ); # not sure here |
|
174
|
|
|
|
|
|
|
$ctx->add( ':', $digest ); |
|
175
|
|
|
|
|
|
|
} |
|
176
|
|
|
|
|
|
|
my $A2_digest = $ctx->hexdigest; |
|
177
|
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
# the idea of the for loop: |
|
179
|
|
|
|
|
|
|
# if we do not want to store the plain password in our user store, |
|
180
|
|
|
|
|
|
|
# we can store md5_hex("$username:$realm:$password") instead |
|
181
|
|
|
|
|
|
|
my $password_field = $self->password_field; |
|
182
|
|
|
|
|
|
|
for my $r ( 0 .. 1 ) { |
|
183
|
|
|
|
|
|
|
# calculate H(A1) as per spec |
|
184
|
|
|
|
|
|
|
my $A1_digest = $r ? $user_obj->$password_field() : do { |
|
185
|
|
|
|
|
|
|
$ctx = Digest::MD5->new; |
|
186
|
|
|
|
|
|
|
$ctx->add( join( ':', $username, $realm->name, $user_obj->$password_field() ) ); |
|
187
|
|
|
|
|
|
|
$ctx->hexdigest; |
|
188
|
|
|
|
|
|
|
}; |
|
189
|
|
|
|
|
|
|
if ( $nonce->algorithm eq 'MD5-sess' ) { |
|
190
|
|
|
|
|
|
|
$ctx = Digest::MD5->new; |
|
191
|
|
|
|
|
|
|
$ctx->add( join( ':', $A1_digest, $res{nonce}, $res{cnonce} ) ); |
|
192
|
|
|
|
|
|
|
$A1_digest = $ctx->hexdigest; |
|
193
|
|
|
|
|
|
|
} |
|
194
|
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
my $digest_in = join( ':', |
|
196
|
|
|
|
|
|
|
$A1_digest, $res{nonce}, |
|
197
|
|
|
|
|
|
|
$res{qop} ? ( $res{nc}, $res{cnonce}, $res{qop} ) : (), |
|
198
|
|
|
|
|
|
|
$A2_digest ); |
|
199
|
|
|
|
|
|
|
my $rq_digest = Digest::MD5::md5_hex($digest_in); |
|
200
|
|
|
|
|
|
|
$nonce->nonce_count($nonce_count); |
|
201
|
|
|
|
|
|
|
my $key = __PACKAGE__ . '::opaque:' . $nonce->opaque; |
|
202
|
|
|
|
|
|
|
$self->store_digest_authorization_nonce( $c, $key, $nonce ); |
|
203
|
|
|
|
|
|
|
if ($rq_digest eq $res{response}) { |
|
204
|
|
|
|
|
|
|
return $user_obj; |
|
205
|
|
|
|
|
|
|
} |
|
206
|
|
|
|
|
|
|
} |
|
207
|
|
|
|
|
|
|
} |
|
208
|
|
|
|
|
|
|
return; |
|
209
|
|
|
|
|
|
|
} |
|
210
|
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
sub _check_cache { |
|
212
|
|
|
|
|
|
|
my $c = shift; |
|
213
|
|
|
|
|
|
|
|
|
214
|
|
|
|
|
|
|
die "A cache is needed for http digest authentication." |
|
215
|
|
|
|
|
|
|
unless $c->can('cache'); |
|
216
|
|
|
|
|
|
|
return; |
|
217
|
|
|
|
|
|
|
} |
|
218
|
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
sub _is_http_auth_type { |
|
220
|
|
|
|
|
|
|
my ( $self, $type ) = @_; |
|
221
|
|
|
|
|
|
|
my $cfgtype = lc( $self->type ); |
|
222
|
|
|
|
|
|
|
return 1 if $cfgtype eq 'any' || $cfgtype eq lc $type; |
|
223
|
|
|
|
|
|
|
return 0; |
|
224
|
|
|
|
|
|
|
} |
|
225
|
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
sub authorization_required_response { |
|
227
|
|
|
|
|
|
|
my ( $self, $c, $realm, $auth_info ) = @_; |
|
228
|
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
$c->res->status(401); |
|
230
|
|
|
|
|
|
|
$c->res->content_type('text/plain'); |
|
231
|
|
|
|
|
|
|
if (exists $self->{authorization_required_message}) { |
|
232
|
|
|
|
|
|
|
# If you set the key to undef, don't stamp on the body. |
|
233
|
|
|
|
|
|
|
$c->res->body($self->authorization_required_message) |
|
234
|
|
|
|
|
|
|
if defined $self->authorization_required_message; |
|
235
|
|
|
|
|
|
|
} |
|
236
|
|
|
|
|
|
|
else { |
|
237
|
|
|
|
|
|
|
$c->res->body('Authorization required.'); |
|
238
|
|
|
|
|
|
|
} |
|
239
|
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
# *DONT* short circuit |
|
241
|
|
|
|
|
|
|
my $ok; |
|
242
|
|
|
|
|
|
|
$ok++ if $self->_create_digest_auth_response($c, $auth_info); |
|
243
|
|
|
|
|
|
|
$ok++ if $self->_create_basic_auth_response($c, $auth_info); |
|
244
|
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
unless ( $ok ) { |
|
246
|
|
|
|
|
|
|
die 'Could not build authorization required response. ' |
|
247
|
|
|
|
|
|
|
. 'Did you configure a valid authentication http type: ' |
|
248
|
|
|
|
|
|
|
. 'basic, digest, any'; |
|
249
|
|
|
|
|
|
|
} |
|
250
|
|
|
|
|
|
|
return; |
|
251
|
|
|
|
|
|
|
} |
|
252
|
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
sub _add_authentication_header { |
|
254
|
|
|
|
|
|
|
my ( $c, $header ) = @_; |
|
255
|
|
|
|
|
|
|
$c->response->headers->push_header( 'WWW-Authenticate' => $header ); |
|
256
|
|
|
|
|
|
|
return; |
|
257
|
|
|
|
|
|
|
} |
|
258
|
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
sub _create_digest_auth_response { |
|
260
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
261
|
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
return unless $self->_is_http_auth_type('digest'); |
|
263
|
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
if ( my $digest = $self->_build_digest_auth_header( $c, $opts ) ) { |
|
265
|
|
|
|
|
|
|
_add_authentication_header( $c, $digest ); |
|
266
|
|
|
|
|
|
|
return 1; |
|
267
|
|
|
|
|
|
|
} |
|
268
|
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
return; |
|
270
|
|
|
|
|
|
|
} |
|
271
|
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
sub _create_basic_auth_response { |
|
273
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
274
|
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
return unless $self->_is_http_auth_type('basic'); |
|
276
|
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
if ( my $basic = $self->_build_basic_auth_header( $c, $opts ) ) { |
|
278
|
|
|
|
|
|
|
_add_authentication_header( $c, $basic ); |
|
279
|
|
|
|
|
|
|
return 1; |
|
280
|
|
|
|
|
|
|
} |
|
281
|
|
|
|
|
|
|
|
|
282
|
|
|
|
|
|
|
return; |
|
283
|
|
|
|
|
|
|
} |
|
284
|
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
sub _build_auth_header_realm { |
|
286
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
287
|
|
|
|
|
|
|
if ( my $realm_name = String::Escape::qprintable($opts->{realm} ? $opts->{realm} : $self->realm->name) ) { |
|
288
|
|
|
|
|
|
|
$realm_name = qq{"$realm_name"} unless $realm_name =~ /^"/; |
|
289
|
|
|
|
|
|
|
return 'realm=' . $realm_name; |
|
290
|
|
|
|
|
|
|
} |
|
291
|
|
|
|
|
|
|
return; |
|
292
|
|
|
|
|
|
|
} |
|
293
|
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
sub _build_auth_header_domain { |
|
295
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
296
|
|
|
|
|
|
|
if ( my $domain = $opts->{domain} ) { |
|
297
|
|
|
|
|
|
|
Catalyst::Exception->throw("domain must be an array reference") |
|
298
|
|
|
|
|
|
|
unless ref($domain) && ref($domain) eq "ARRAY"; |
|
299
|
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
my @uris = |
|
301
|
|
|
|
|
|
|
$self->use_uri_for |
|
302
|
|
|
|
|
|
|
? ( map { $c->uri_for($_) } @$domain ) |
|
303
|
|
|
|
|
|
|
: ( map { URI::Escape::uri_escape($_) } @$domain ); |
|
304
|
|
|
|
|
|
|
|
|
305
|
|
|
|
|
|
|
return qq{domain="@uris"}; |
|
306
|
|
|
|
|
|
|
} |
|
307
|
|
|
|
|
|
|
return; |
|
308
|
|
|
|
|
|
|
} |
|
309
|
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
sub _build_auth_header_common { |
|
311
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
312
|
|
|
|
|
|
|
return ( |
|
313
|
|
|
|
|
|
|
$self->_build_auth_header_realm($c, $opts), |
|
314
|
|
|
|
|
|
|
$self->_build_auth_header_domain($c, $opts), |
|
315
|
|
|
|
|
|
|
); |
|
316
|
|
|
|
|
|
|
} |
|
317
|
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
sub _build_basic_auth_header { |
|
319
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
320
|
|
|
|
|
|
|
return _join_auth_header_parts( Basic => $self->_build_auth_header_common( $c, $opts ) ); |
|
321
|
|
|
|
|
|
|
} |
|
322
|
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
sub _build_digest_auth_header { |
|
324
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
325
|
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
my $nonce = $self->_digest_auth_nonce($c, $opts); |
|
327
|
|
|
|
|
|
|
|
|
328
|
|
|
|
|
|
|
my $key = __PACKAGE__ . '::opaque:' . $nonce->opaque; |
|
329
|
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
$self->store_digest_authorization_nonce( $c, $key, $nonce ); |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
return _join_auth_header_parts( Digest => |
|
333
|
|
|
|
|
|
|
$self->_build_auth_header_common($c, $opts), |
|
334
|
|
|
|
|
|
|
map { sprintf '%s="%s"', $_, $nonce->$_ } qw( |
|
335
|
|
|
|
|
|
|
qop |
|
336
|
|
|
|
|
|
|
nonce |
|
337
|
|
|
|
|
|
|
opaque |
|
338
|
|
|
|
|
|
|
algorithm |
|
339
|
|
|
|
|
|
|
), |
|
340
|
|
|
|
|
|
|
); |
|
341
|
|
|
|
|
|
|
} |
|
342
|
|
|
|
|
|
|
|
|
343
|
|
|
|
|
|
|
sub _digest_auth_nonce { |
|
344
|
|
|
|
|
|
|
my ( $self, $c, $opts ) = @_; |
|
345
|
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
my $package = __PACKAGE__ . '::Nonce'; |
|
347
|
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
my $nonce = $package->new; |
|
349
|
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
if ( my $algorithm = $opts->{algorithm} || $self->algorithm) { |
|
351
|
|
|
|
|
|
|
$nonce->algorithm( $algorithm ); |
|
352
|
|
|
|
|
|
|
} |
|
353
|
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
return $nonce; |
|
355
|
|
|
|
|
|
|
} |
|
356
|
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
sub _join_auth_header_parts { |
|
358
|
|
|
|
|
|
|
my ( $type, @parts ) = @_; |
|
359
|
|
|
|
|
|
|
return "$type " . join(", ", @parts ); |
|
360
|
|
|
|
|
|
|
} |
|
361
|
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
sub get_digest_authorization_nonce { |
|
363
|
|
|
|
|
|
|
my ( $self, $c, $key ) = @_; |
|
364
|
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
_check_cache($c); |
|
366
|
|
|
|
|
|
|
return $c->cache->get( $key ); |
|
367
|
|
|
|
|
|
|
} |
|
368
|
|
|
|
|
|
|
|
|
369
|
|
|
|
|
|
|
sub store_digest_authorization_nonce { |
|
370
|
|
|
|
|
|
|
my ( $self, $c, $key, $nonce ) = @_; |
|
371
|
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
_check_cache($c); |
|
373
|
|
|
|
|
|
|
return $c->cache->set( $key, $nonce ); |
|
374
|
|
|
|
|
|
|
} |
|
375
|
|
|
|
|
|
|
|
|
376
|
|
|
|
|
|
|
package Catalyst::Authentication::Credential::HTTP::Nonce; |
|
377
|
|
|
|
|
|
|
|
|
378
|
|
|
|
|
|
|
use strict; |
|
379
|
|
|
|
|
|
|
use base qw[ Class::Accessor::Fast ]; |
|
380
|
|
|
|
|
|
|
use Data::UUID (); |
|
381
|
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
our $VERSION = '0.02'; |
|
383
|
|
|
|
|
|
|
|
|
384
|
|
|
|
|
|
|
__PACKAGE__->mk_accessors(qw[ nonce nonce_count qop opaque algorithm ]); |
|
385
|
|
|
|
|
|
|
|
|
386
|
|
|
|
|
|
|
sub new { |
|
387
|
|
|
|
|
|
|
my $class = shift; |
|
388
|
|
|
|
|
|
|
my $self = $class->SUPER::new(@_); |
|
389
|
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
$self->nonce( Data::UUID->new->create_b64 ); |
|
391
|
|
|
|
|
|
|
$self->opaque( Data::UUID->new->create_b64 ); |
|
392
|
|
|
|
|
|
|
$self->qop('auth,auth-int'); |
|
393
|
|
|
|
|
|
|
$self->nonce_count('0x0'); |
|
394
|
|
|
|
|
|
|
$self->algorithm('MD5'); |
|
395
|
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
return $self; |
|
397
|
|
|
|
|
|
|
} |
|
398
|
|
|
|
|
|
|
|
|
399
|
|
|
|
|
|
|
1; |
|
400
|
|
|
|
|
|
|
|
|
401
|
|
|
|
|
|
|
__END__ |
|
402
|
|
|
|
|
|
|
|
|
403
|
|
|
|
|
|
|
=pod |
|
404
|
|
|
|
|
|
|
|
|
405
|
|
|
|
|
|
|
=head1 NAME |
|
406
|
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
Catalyst::Authentication::Credential::HTTP - HTTP Basic and Digest authentication |
|
408
|
|
|
|
|
|
|
for Catalyst. |
|
409
|
|
|
|
|
|
|
|
|
410
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
411
|
|
|
|
|
|
|
|
|
412
|
|
|
|
|
|
|
use Catalyst qw/ |
|
413
|
|
|
|
|
|
|
Authentication |
|
414
|
|
|
|
|
|
|
/; |
|
415
|
|
|
|
|
|
|
|
|
416
|
|
|
|
|
|
|
__PACKAGE__->config( authentication => { |
|
417
|
|
|
|
|
|
|
default_realm => 'example', |
|
418
|
|
|
|
|
|
|
realms => { |
|
419
|
|
|
|
|
|
|
example => { |
|
420
|
|
|
|
|
|
|
credential => { |
|
421
|
|
|
|
|
|
|
class => 'HTTP', |
|
422
|
|
|
|
|
|
|
type => 'any', # or 'digest' or 'basic' |
|
423
|
|
|
|
|
|
|
password_type => 'clear', |
|
424
|
|
|
|
|
|
|
password_field => 'password' |
|
425
|
|
|
|
|
|
|
}, |
|
426
|
|
|
|
|
|
|
store => { |
|
427
|
|
|
|
|
|
|
class => 'Minimal', |
|
428
|
|
|
|
|
|
|
users => { |
|
429
|
|
|
|
|
|
|
Mufasa => { password => "Circle Of Life", }, |
|
430
|
|
|
|
|
|
|
}, |
|
431
|
|
|
|
|
|
|
}, |
|
432
|
|
|
|
|
|
|
}, |
|
433
|
|
|
|
|
|
|
} |
|
434
|
|
|
|
|
|
|
}); |
|
435
|
|
|
|
|
|
|
|
|
436
|
|
|
|
|
|
|
sub foo : Local { |
|
437
|
|
|
|
|
|
|
my ( $self, $c ) = @_; |
|
438
|
|
|
|
|
|
|
|
|
439
|
|
|
|
|
|
|
$c->authenticate({}, "example"); |
|
440
|
|
|
|
|
|
|
# either user gets authenticated or 401 is sent |
|
441
|
|
|
|
|
|
|
# Note that the authentication realm sent to the client (in the |
|
442
|
|
|
|
|
|
|
# RFC 2617 sense) is overridden here, but this *does not* |
|
443
|
|
|
|
|
|
|
# effect the Catalyst::Authentication::Realm used for |
|
444
|
|
|
|
|
|
|
# authentication - to do that, you need |
|
445
|
|
|
|
|
|
|
# $c->authenticate({}, 'otherrealm') |
|
446
|
|
|
|
|
|
|
|
|
447
|
|
|
|
|
|
|
do_stuff(); |
|
448
|
|
|
|
|
|
|
} |
|
449
|
|
|
|
|
|
|
|
|
450
|
|
|
|
|
|
|
sub always_auth : Local { |
|
451
|
|
|
|
|
|
|
my ( $self, $c ) = @_; |
|
452
|
|
|
|
|
|
|
|
|
453
|
|
|
|
|
|
|
# Force authorization headers onto the response so that the user |
|
454
|
|
|
|
|
|
|
# is asked again for authentication, even if they successfully |
|
455
|
|
|
|
|
|
|
# authenticated. |
|
456
|
|
|
|
|
|
|
my $realm = $c->get_auth_realm('example'); |
|
457
|
|
|
|
|
|
|
$realm->credential->authorization_required_response($c, $realm); |
|
458
|
|
|
|
|
|
|
} |
|
459
|
|
|
|
|
|
|
|
|
460
|
|
|
|
|
|
|
# with ACL plugin |
|
461
|
|
|
|
|
|
|
__PACKAGE__->deny_access_unless("/path", sub { $_[0]->authenticate }); |
|
462
|
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
464
|
|
|
|
|
|
|
|
|
465
|
|
|
|
|
|
|
This module lets you use HTTP authentication with |
|
466
|
|
|
|
|
|
|
L<Catalyst::Plugin::Authentication>. Both basic and digest authentication |
|
467
|
|
|
|
|
|
|
are currently supported. |
|
468
|
|
|
|
|
|
|
|
|
469
|
|
|
|
|
|
|
When authentication is required, this module sets a status of 401, and |
|
470
|
|
|
|
|
|
|
the body of the response to 'Authorization required.'. To override |
|
471
|
|
|
|
|
|
|
this and set your own content, check for the C<< $c->res->status == |
|
472
|
|
|
|
|
|
|
401 >> in your C<end> action, and change the body accordingly. |
|
473
|
|
|
|
|
|
|
|
|
474
|
|
|
|
|
|
|
=head2 TERMS |
|
475
|
|
|
|
|
|
|
|
|
476
|
|
|
|
|
|
|
=over 4 |
|
477
|
|
|
|
|
|
|
|
|
478
|
|
|
|
|
|
|
=item Nonce |
|
479
|
|
|
|
|
|
|
|
|
480
|
|
|
|
|
|
|
A nonce is a one-time value sent with each digest authentication |
|
481
|
|
|
|
|
|
|
request header. The value must always be unique, so per default the |
|
482
|
|
|
|
|
|
|
last value of the nonce is kept using L<Catalyst::Plugin::Cache>. To |
|
483
|
|
|
|
|
|
|
change this behaviour, override the |
|
484
|
|
|
|
|
|
|
C<store_digest_authorization_nonce> and |
|
485
|
|
|
|
|
|
|
C<get_digest_authorization_nonce> methods as shown below. |
|
486
|
|
|
|
|
|
|
|
|
487
|
|
|
|
|
|
|
=back |
|
488
|
|
|
|
|
|
|
|
|
489
|
|
|
|
|
|
|
=head1 METHODS |
|
490
|
|
|
|
|
|
|
|
|
491
|
|
|
|
|
|
|
=over 4 |
|
492
|
|
|
|
|
|
|
|
|
493
|
|
|
|
|
|
|
=item new $config, $c, $realm |
|
494
|
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
Simple constructor. |
|
496
|
|
|
|
|
|
|
|
|
497
|
|
|
|
|
|
|
=item init |
|
498
|
|
|
|
|
|
|
|
|
499
|
|
|
|
|
|
|
Validates that $config is ok. |
|
500
|
|
|
|
|
|
|
|
|
501
|
|
|
|
|
|
|
=item authenticate $c, $realm, \%auth_info |
|
502
|
|
|
|
|
|
|
|
|
503
|
|
|
|
|
|
|
Tries to authenticate the user, and if that fails calls |
|
504
|
|
|
|
|
|
|
C<authorization_required_response> and detaches the current action call stack. |
|
505
|
|
|
|
|
|
|
|
|
506
|
|
|
|
|
|
|
Looks inside C<< $c->request->headers >> and processes the digest and basic |
|
507
|
|
|
|
|
|
|
(badly named) authorization header. |
|
508
|
|
|
|
|
|
|
|
|
509
|
|
|
|
|
|
|
This will only try the methods set in the configuration. First digest, then basic. |
|
510
|
|
|
|
|
|
|
|
|
511
|
|
|
|
|
|
|
The %auth_info hash can contain a number of keys which control the authentication behaviour: |
|
512
|
|
|
|
|
|
|
|
|
513
|
|
|
|
|
|
|
=over |
|
514
|
|
|
|
|
|
|
|
|
515
|
|
|
|
|
|
|
=item realm |
|
516
|
|
|
|
|
|
|
|
|
517
|
|
|
|
|
|
|
Sets the HTTP authentication realm presented to the client. Note this does not alter the |
|
518
|
|
|
|
|
|
|
Catalyst::Authentication::Realm object used for the authentication. |
|
519
|
|
|
|
|
|
|
|
|
520
|
|
|
|
|
|
|
=item domain |
|
521
|
|
|
|
|
|
|
|
|
522
|
|
|
|
|
|
|
Array reference to domains used to build the authorization headers. |
|
523
|
|
|
|
|
|
|
|
|
524
|
|
|
|
|
|
|
This list of domains defines the protection space. If a domain URI is an |
|
525
|
|
|
|
|
|
|
absolute path (starts with /), it is relative to the root URL of the server being accessed. |
|
526
|
|
|
|
|
|
|
An absolute URI in this list may refer to a different server than the one being accessed. |
|
527
|
|
|
|
|
|
|
|
|
528
|
|
|
|
|
|
|
The client will use this list to determine the set of URIs for which the same authentication |
|
529
|
|
|
|
|
|
|
information may be sent. |
|
530
|
|
|
|
|
|
|
|
|
531
|
|
|
|
|
|
|
If this is omitted or its value is empty, the client will assume that the |
|
532
|
|
|
|
|
|
|
protection space consists of all URIs on the responding server. |
|
533
|
|
|
|
|
|
|
|
|
534
|
|
|
|
|
|
|
Therefore, if your application is not hosted at the root of this domain, and you want to |
|
535
|
|
|
|
|
|
|
prevent the authentication credentials for this application being sent to any other applications. |
|
536
|
|
|
|
|
|
|
then you should use the I<use_uri_for> configuration option, and pass a domain of I</>. |
|
537
|
|
|
|
|
|
|
|
|
538
|
|
|
|
|
|
|
=back |
|
539
|
|
|
|
|
|
|
|
|
540
|
|
|
|
|
|
|
=item authenticate_basic $c, $realm, \%auth_info |
|
541
|
|
|
|
|
|
|
|
|
542
|
|
|
|
|
|
|
Performs HTTP basic authentication. |
|
543
|
|
|
|
|
|
|
|
|
544
|
|
|
|
|
|
|
=item authenticate_digest $c, $realm, \%auth_info |
|
545
|
|
|
|
|
|
|
|
|
546
|
|
|
|
|
|
|
Performs HTTP digest authentication. |
|
547
|
|
|
|
|
|
|
|
|
548
|
|
|
|
|
|
|
The password_type B<must> be I<clear> for digest authentication to |
|
549
|
|
|
|
|
|
|
succeed. If you do not want to store your user passwords as clear |
|
550
|
|
|
|
|
|
|
text, you may instead store the MD5 digest in hex of the string |
|
551
|
|
|
|
|
|
|
'$username:$realm:$password'. |
|
552
|
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
L<Catalyst::Plugin::Cache> is used for persistent storage of the nonce |
|
554
|
|
|
|
|
|
|
values (see L</Nonce>). It must be loaded in your application, unless |
|
555
|
|
|
|
|
|
|
you override the C<store_digest_authorization_nonce> and |
|
556
|
|
|
|
|
|
|
C<get_digest_authorization_nonce> methods as shown below. |
|
557
|
|
|
|
|
|
|
|
|
558
|
|
|
|
|
|
|
Takes an additional parameter of I<algorithm>, the possible values of which are 'MD5' (the default) |
|
559
|
|
|
|
|
|
|
and 'MD5-sess'. For more information about 'MD5-sess', see section 3.2.2.2 in RFC 2617. |
|
560
|
|
|
|
|
|
|
|
|
561
|
|
|
|
|
|
|
=item authorization_required_response $c, $realm, \%auth_info |
|
562
|
|
|
|
|
|
|
|
|
563
|
|
|
|
|
|
|
Sets C<< $c->response >> to the correct status code, and adds the correct |
|
564
|
|
|
|
|
|
|
header to demand authentication data from the user agent. |
|
565
|
|
|
|
|
|
|
|
|
566
|
|
|
|
|
|
|
Typically used by C<authenticate>, but may be invoked manually. |
|
567
|
|
|
|
|
|
|
|
|
568
|
|
|
|
|
|
|
%opts can contain C<domain> and C<algorithm>, which are used to build |
|
569
|
|
|
|
|
|
|
%the digest header. |
|
570
|
|
|
|
|
|
|
|
|
571
|
|
|
|
|
|
|
=item store_digest_authorization_nonce $c, $key, $nonce |
|
572
|
|
|
|
|
|
|
|
|
573
|
|
|
|
|
|
|
=item get_digest_authorization_nonce $c, $key |
|
574
|
|
|
|
|
|
|
|
|
575
|
|
|
|
|
|
|
Set or get the C<$nonce> object used by the digest auth mode. |
|
576
|
|
|
|
|
|
|
|
|
577
|
|
|
|
|
|
|
You may override these methods. By default they will call C<get> and C<set> on |
|
578
|
|
|
|
|
|
|
C<< $c->cache >>. |
|
579
|
|
|
|
|
|
|
|
|
580
|
|
|
|
|
|
|
=item authentication_failed |
|
581
|
|
|
|
|
|
|
|
|
582
|
|
|
|
|
|
|
Sets the 401 response and calls C<< $ctx->detach >>. |
|
583
|
|
|
|
|
|
|
|
|
584
|
|
|
|
|
|
|
=back |
|
585
|
|
|
|
|
|
|
|
|
586
|
|
|
|
|
|
|
=head1 CONFIGURATION |
|
587
|
|
|
|
|
|
|
|
|
588
|
|
|
|
|
|
|
All configuration is stored in C<< YourApp->config('Plugin::Authentication' => { yourrealm => { credential => { class => 'HTTP', %config } } } >>. |
|
589
|
|
|
|
|
|
|
|
|
590
|
|
|
|
|
|
|
This should be a hash, and it can contain the following entries: |
|
591
|
|
|
|
|
|
|
|
|
592
|
|
|
|
|
|
|
=over |
|
593
|
|
|
|
|
|
|
|
|
594
|
|
|
|
|
|
|
=item type |
|
595
|
|
|
|
|
|
|
|
|
596
|
|
|
|
|
|
|
Can be either C<any> (the default), C<basic> or C<digest>. |
|
597
|
|
|
|
|
|
|
|
|
598
|
|
|
|
|
|
|
This controls C<authorization_required_response> and C<authenticate>, but |
|
599
|
|
|
|
|
|
|
not the "manual" methods. |
|
600
|
|
|
|
|
|
|
|
|
601
|
|
|
|
|
|
|
=item authorization_required_message |
|
602
|
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
Set this to a string to override the default body content "Authorization required.", or set to undef to suppress body content being generated. |
|
604
|
|
|
|
|
|
|
|
|
605
|
|
|
|
|
|
|
=item password_type |
|
606
|
|
|
|
|
|
|
|
|
607
|
|
|
|
|
|
|
The type of password returned by the user object. Same usage as in |
|
608
|
|
|
|
|
|
|
L<Catalyst::Authentication::Credential::Password|Catalyst::Authentication::Credential::Password/password_type> |
|
609
|
|
|
|
|
|
|
|
|
610
|
|
|
|
|
|
|
=item password_field |
|
611
|
|
|
|
|
|
|
|
|
612
|
|
|
|
|
|
|
The name of accessor used to retrieve the value of the password field from the user object. Same usage as in |
|
613
|
|
|
|
|
|
|
L<Catalyst::Authentication::Credential::Password|Catalyst::Authentication::Credential::Password/password_field> |
|
614
|
|
|
|
|
|
|
|
|
615
|
|
|
|
|
|
|
=item username_field |
|
616
|
|
|
|
|
|
|
|
|
617
|
|
|
|
|
|
|
The field name that the user's username is mapped into when finding the user from the realm. Defaults to 'username'. |
|
618
|
|
|
|
|
|
|
|
|
619
|
|
|
|
|
|
|
=item use_uri_for |
|
620
|
|
|
|
|
|
|
|
|
621
|
|
|
|
|
|
|
If this configuration key has a true value, then the domain(s) for the authorization header will be |
|
622
|
|
|
|
|
|
|
run through $c->uri_for(). Use this configuration option if your application is not running at the root |
|
623
|
|
|
|
|
|
|
of your domain, and you want to ensure that authentication credentials from your application are not shared with |
|
624
|
|
|
|
|
|
|
other applications on the same server. |
|
625
|
|
|
|
|
|
|
|
|
626
|
|
|
|
|
|
|
=item require_ssl |
|
627
|
|
|
|
|
|
|
|
|
628
|
|
|
|
|
|
|
If this configuration key has a true value then authentication will be denied |
|
629
|
|
|
|
|
|
|
(and a 401 issued in normal circumstances) unless the request is via https. |
|
630
|
|
|
|
|
|
|
|
|
631
|
|
|
|
|
|
|
=item no_unprompted_authorization_required |
|
632
|
|
|
|
|
|
|
|
|
633
|
|
|
|
|
|
|
Causes authentication to fail as normal modules do, without calling |
|
634
|
|
|
|
|
|
|
C<< $c->detach >>. This means that the basic auth credential can be used as |
|
635
|
|
|
|
|
|
|
part of the progressive realm. |
|
636
|
|
|
|
|
|
|
|
|
637
|
|
|
|
|
|
|
However use like this is probably not optimum it also means that users in |
|
638
|
|
|
|
|
|
|
browsers ill never get a HTTP authenticate dialogue box (unless you manually |
|
639
|
|
|
|
|
|
|
return a 401 response in your application), and even some automated |
|
640
|
|
|
|
|
|
|
user agents (for APIs) will not send the Authorization header without |
|
641
|
|
|
|
|
|
|
specific manipulation of the request headers. |
|
642
|
|
|
|
|
|
|
|
|
643
|
|
|
|
|
|
|
=item broken_dotnet_digest_without_query_string |
|
644
|
|
|
|
|
|
|
|
|
645
|
|
|
|
|
|
|
Enables support for .NET (or other similarly broken clients), which |
|
646
|
|
|
|
|
|
|
fails to include the query string in the uri in the digest |
|
647
|
|
|
|
|
|
|
Authorization header, contrary to rfc2617. |
|
648
|
|
|
|
|
|
|
|
|
649
|
|
|
|
|
|
|
This option has no effect on clients that include the query string; |
|
650
|
|
|
|
|
|
|
they will continue to work as normal. |
|
651
|
|
|
|
|
|
|
|
|
652
|
|
|
|
|
|
|
=back |
|
653
|
|
|
|
|
|
|
|
|
654
|
|
|
|
|
|
|
=head1 RESTRICTIONS |
|
655
|
|
|
|
|
|
|
|
|
656
|
|
|
|
|
|
|
When using digest authentication, this module will only work together |
|
657
|
|
|
|
|
|
|
with authentication stores whose User objects have a C<password> |
|
658
|
|
|
|
|
|
|
method that returns the plain-text password. It will not work together |
|
659
|
|
|
|
|
|
|
with L<Catalyst::Authentication::Store::Htpasswd>, or |
|
660
|
|
|
|
|
|
|
L<Catalyst::Authentication::Store::DBIC> stores whose |
|
661
|
|
|
|
|
|
|
C<password> methods return a hashed or salted version of the password. |
|
662
|
|
|
|
|
|
|
|
|
663
|
|
|
|
|
|
|
=head1 AUTHORS |
|
664
|
|
|
|
|
|
|
|
|
665
|
|
|
|
|
|
|
Updated to current name space and currently maintained |
|
666
|
|
|
|
|
|
|
by: Tomas Doran C<bobtfish@bobtfish.net>. |
|
667
|
|
|
|
|
|
|
|
|
668
|
|
|
|
|
|
|
Original module by: |
|
669
|
|
|
|
|
|
|
|
|
670
|
|
|
|
|
|
|
=over |
|
671
|
|
|
|
|
|
|
|
|
672
|
|
|
|
|
|
|
=item Yuval Kogman, C<nothingmuch@woobling.org> |
|
673
|
|
|
|
|
|
|
|
|
674
|
|
|
|
|
|
|
=item Jess Robinson |
|
675
|
|
|
|
|
|
|
|
|
676
|
|
|
|
|
|
|
=item Sascha Kiefer C<esskar@cpan.org> |
|
677
|
|
|
|
|
|
|
|
|
678
|
|
|
|
|
|
|
=back |
|
679
|
|
|
|
|
|
|
|
|
680
|
|
|
|
|
|
|
=head1 CONTRIBUTORS |
|
681
|
|
|
|
|
|
|
|
|
682
|
|
|
|
|
|
|
Patches contributed by: |
|
683
|
|
|
|
|
|
|
|
|
684
|
|
|
|
|
|
|
=over |
|
685
|
|
|
|
|
|
|
|
|
686
|
|
|
|
|
|
|
=item Peter Corlett |
|
687
|
|
|
|
|
|
|
|
|
688
|
|
|
|
|
|
|
=item Devin Austin (dhoss) C<dhoss@cpan.org> |
|
689
|
|
|
|
|
|
|
|
|
690
|
|
|
|
|
|
|
=item Ronald J Kimball |
|
691
|
|
|
|
|
|
|
|
|
692
|
|
|
|
|
|
|
=back |
|
693
|
|
|
|
|
|
|
|
|
694
|
|
|
|
|
|
|
=head1 SEE ALSO |
|
695
|
|
|
|
|
|
|
|
|
696
|
|
|
|
|
|
|
RFC 2617 (or its successors), L<Catalyst::Plugin::Cache>, L<Catalyst::Plugin::Authentication> |
|
697
|
|
|
|
|
|
|
|
|
698
|
|
|
|
|
|
|
=head1 COPYRIGHT & LICENSE |
|
699
|
|
|
|
|
|
|
|
|
700
|
|
|
|
|
|
|
Copyright (c) 2005-2008 the aforementioned authors. All rights |
|
701
|
|
|
|
|
|
|
reserved. This program is free software; you can redistribute |
|
702
|
|
|
|
|
|
|
it and/or modify it under the same terms as Perl itself. |
|
703
|
|
|
|
|
|
|
|
|
704
|
|
|
|
|
|
|
=cut |
|
705
|
|
|
|
|
|
|
|