line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Catalyst::Plugin::Authentication::Credential::OpenID; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
11
|
use strict; |
|
1
|
|
|
|
|
5
|
|
|
1
|
|
|
|
|
73
|
|
4
|
1
|
|
|
1
|
|
6
|
use warnings; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
66
|
|
5
|
|
|
|
|
|
|
our $VERSION = '0.03'; |
6
|
|
|
|
|
|
|
|
7
|
1
|
|
|
1
|
|
488
|
use Net::OpenID::Consumer; |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
use LWPx::ParanoidAgent; |
9
|
|
|
|
|
|
|
use UNIVERSAL::require; |
10
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
sub setup { |
12
|
|
|
|
|
|
|
my $c = shift; |
13
|
|
|
|
|
|
|
my $config = $c->config->{authentication}->{openid} ||= {}; |
14
|
|
|
|
|
|
|
( $config->{user_class} |
15
|
|
|
|
|
|
|
||= "Catalyst::Plugin::Authentication::User::Hash" )->require; |
16
|
|
|
|
|
|
|
$c->NEXT::setup(@_); |
17
|
|
|
|
|
|
|
} |
18
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
sub authenticate_openid { |
20
|
|
|
|
|
|
|
my($c, $uri) = @_; |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
my $config = $c->config->{authentication}->{openid}; |
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
my $csr = Net::OpenID::Consumer->new( |
25
|
|
|
|
|
|
|
ua => LWPx::ParanoidAgent->new, |
26
|
|
|
|
|
|
|
args => $c->req->params, |
27
|
|
|
|
|
|
|
consumer_secret => sub { $_[0] }, |
28
|
|
|
|
|
|
|
); |
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
my @try_params = qw( openid_url openid_identifier claimed_uri ); |
31
|
|
|
|
|
|
|
if ($uri ||= (grep defined, @{$c->req->params}{@try_params})[0]) { |
32
|
|
|
|
|
|
|
my $current = $c->req->uri; |
33
|
|
|
|
|
|
|
$current->query(undef); # no query |
34
|
|
|
|
|
|
|
my $identity = $csr->claimed_identity($uri) |
35
|
|
|
|
|
|
|
or Catalyst::Exception->throw($csr->err); |
36
|
|
|
|
|
|
|
my $check_url = $identity->check_url( |
37
|
|
|
|
|
|
|
return_to => $current . '?openid-check=1', |
38
|
|
|
|
|
|
|
trust_root => $current, |
39
|
|
|
|
|
|
|
delayed_return => 1, |
40
|
|
|
|
|
|
|
); |
41
|
|
|
|
|
|
|
$c->res->redirect($check_url); |
42
|
|
|
|
|
|
|
return 0; |
43
|
|
|
|
|
|
|
} elsif ($c->req->param('openid-check')) { |
44
|
|
|
|
|
|
|
if (my $setup_url = $csr->user_setup_url) { |
45
|
|
|
|
|
|
|
$c->res->redirect($setup_url); |
46
|
|
|
|
|
|
|
return 0; |
47
|
|
|
|
|
|
|
} elsif ($csr->user_cancel) { |
48
|
|
|
|
|
|
|
return 0; |
49
|
|
|
|
|
|
|
} elsif (my $identity = $csr->verified_identity) { |
50
|
|
|
|
|
|
|
my $user = +{ map { $_ => scalar $identity->$_ } |
51
|
|
|
|
|
|
|
qw( url display rss atom foaf declared_rss declared_atom declared_foaf foafmaker ) }; |
52
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
my $store = $config->{store} || $c->default_auth_store; |
54
|
|
|
|
|
|
|
if ( $store |
55
|
|
|
|
|
|
|
and my $store_user |
56
|
|
|
|
|
|
|
= $store->get_user( $user->{url}, $user ) ) { |
57
|
|
|
|
|
|
|
$c->set_authenticated($store_user); |
58
|
|
|
|
|
|
|
} else { |
59
|
|
|
|
|
|
|
$user = $config->{user_class}->new($user); |
60
|
|
|
|
|
|
|
$c->set_authenticated($user); |
61
|
|
|
|
|
|
|
} |
62
|
|
|
|
|
|
|
return 1; |
63
|
|
|
|
|
|
|
} else { |
64
|
|
|
|
|
|
|
Catalyst::Exception->throw("Error validating identity: " . |
65
|
|
|
|
|
|
|
$csr->err); |
66
|
|
|
|
|
|
|
} |
67
|
|
|
|
|
|
|
} else { |
68
|
|
|
|
|
|
|
return 0; |
69
|
|
|
|
|
|
|
} |
70
|
|
|
|
|
|
|
} |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
1; |
73
|
|
|
|
|
|
|
__END__ |