git.gnu.io has moved to IP address 209.51.188.249 -- please double check where you are logging in.

authenticationplugin.php 10.3 KB
Newer Older
1 2 3 4
<?php
/**
 * StatusNet, the distributed open-source microblogging tool
 *
5
 * Superclass for plugins that do authentication and/or authorization
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
 *
 * PHP version 5
 *
 * LICENCE: This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU Affero General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU Affero General Public License for more details.
 *
 * You should have received a copy of the GNU Affero General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 *
 * @category  Plugin
 * @package   StatusNet
 * @author    Craig Andrews <candrews@integralblue.com>
25
 * @copyright 2009 Free Software Foundation, Inc http://www.fsf.org
26 27 28 29
 * @license   http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
 * @link      http://status.net/
 */

30
if (!defined('GNUSOCIAL')) { exit(1); }
31 32 33 34 35 36 37 38 39 40

/**
 * Superclass for plugins that do authentication
 *
 * @category Plugin
 * @package  StatusNet
 * @author   Craig Andrews <candrews@integralblue.com>
 * @license  http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
 * @link     http://status.net/
 */
41
abstract class AuthenticationPlugin extends Plugin
42 43
{
    //is this plugin authoritative for authentication?
44
    public $authoritative = false;
45

46
    //should accounts be automatically created after a successful login attempt?
47 48 49 50 51
    public $autoregistration = false;

    //can the user change their email address
    public $password_changeable=true;

52 53 54
    //unique name for this authentication provider
    public $provider_name;

55 56 57
    //------------Auth plugin should implement some (or all) of these methods------------\\
    /**
    * Check if a nickname/password combination is valid
58
    * @param username
59 60 61
    * @param password
    * @return boolean true if the credentials are valid, false if they are invalid.
    */
62
    function checkPassword($username, $password)
63 64 65 66 67 68 69
    {
        return false;
    }

    /**
    * Automatically register a user when they attempt to login with valid credentials.
    * User::register($data) is a very useful method for this implementation
70 71
    * @param username username (that is used to login and find the user in the authentication provider) of the user to be registered
    * @param nickname nickname of the user in the SN system. If nickname is null, then set nickname = username
72
    * @return mixed instance of User, or false (if user couldn't be created)
73
    */
74
    function autoRegister($username, $nickname = null)
75
    {
76 77 78
        if(is_null($nickname)){
            $nickname = $username;
        }
79
        $registration_data = array();
80
        $registration_data['nickname'] = $nickname;
81
        return User::register($registration_data);
82 83 84 85 86
    }

    /**
    * Change a user's password
    * The old password has been verified to be valid by this plugin before this call is made
87
    * @param username
88 89
    * @param oldpassword
    * @param newpassword
90
    * @return boolean true if the password was changed, false if password changing failed for some reason
91
    */
92
    function changePassword($username,$oldpassword,$newpassword)
93
    {
94
        return false;
95 96
    }

97 98 99 100 101
    /**
    * Given a username, suggest what the nickname should be
    * Used during autoregistration
    * Useful if your usernames are ugly, and you want to suggest
    * nice looking nicknames when users initially sign on
102 103
    * All nicknames returned by this function should be valid
    *  implementations may want to use common_nicknamize() to ensure validity
104 105 106 107 108
    * @param username
    * @return string nickname
    */
    function suggestNicknameForUsername($username)
    {
109
        return common_nicknamize($username);
110 111
    }

112
    //------------Below are the methods that connect StatusNet to the implementing Auth plugin------------\\
113 114 115 116
    function onInitializePlugin(){
        if(!isset($this->provider_name)){
            throw new Exception("must specify a provider_name for this authentication provider");
        }
117
    }
118

119 120 121 122 123 124 125 126 127
    /**
    * Internal AutoRegister event handler
    * @param nickname
    * @param provider_name
    * @param user - the newly registered user
    */
    function onAutoRegister($nickname, $provider_name, &$user)
    {
        if($provider_name == $this->provider_name && $this->autoregistration){
128
            $suggested_nickname = $this->suggestNicknameForUsername($nickname);
129
            $test_user = User::getKV('nickname', $suggested_nickname);
130 131
            if($test_user) {
                //someone already exists with the suggested nickname, so used the passed nickname
132
                $suggested_nickname = common_nicknamize($nickname);
133
            }
134
            $test_user = User::getKV('nickname', $suggested_nickname);
135 136 137 138
            if($test_user) {
                //someone already exists with the suggested nickname
                //not much else we can do
            }else{
139
                $user = $this->autoRegister($nickname, $suggested_nickname);
140
                if ($user instanceof User) {
141 142 143
                    User_username::register($user,$nickname,$this->provider_name);
                    return false;
                }
144 145 146 147
            }
        }
    }

148
    function onStartCheckPassword($nickname, $password, &$authenticatedUser){
149 150 151 152 153
        //map the nickname to a username
        $user_username = new User_username();
        $user_username->username=$nickname;
        $user_username->provider_name=$this->provider_name;
        if($user_username->find() && $user_username->fetch()){
154
            $authenticated = $this->checkPassword($user_username->username, $password);
155
            if($authenticated){
156
                $authenticatedUser = User::getKV('id', $user_username->user_id);
157 158 159
                return false;
            }
        }else{
160 161 162
            //$nickname is the username used to login
            //$suggested_nickname is the nickname the auth provider suggests for that username
            $suggested_nickname = $this->suggestNicknameForUsername($nickname);
163
            $user = User::getKV('nickname', $suggested_nickname);
164
            if($user){
165
                //make sure this user isn't claimed
166
                $user_username = new User_username();
167 168 169 170 171 172 173 174
                $user_username->user_id=$user->id;
                $we_can_handle = false;
                if($user_username->find()){
                    //either this provider, or another one, has already claimed this user
                    //so we cannot. Let another plugin try.
                    return;
                }else{
                    //no other provider claims this user, so it's safe for us to handle it
175 176
                    $authenticated = $this->checkPassword($nickname, $password);
                    if($authenticated){
177
                        $authenticatedUser = $user;
178
                        User_username::register($authenticatedUser,$nickname,$this->provider_name);
179
                        return false;
180 181 182
                    }
                }
            }else{
183 184
                $authenticated = $this->checkPassword($nickname, $password);
                if($authenticated){
185 186 187 188
                    if(! Event::handle('AutoRegister', array($nickname, $this->provider_name, &$authenticatedUser))){
                        //unlike most Event::handle lines of code, this one has a ! (not)
                        //we want to do this if the event *was* handled - this isn't a "default" implementation
                        //like most code of this form.
189
                        if($authenticatedUser){
190 191
                            return false;
                        }
192
                    }
193 194
                }
            }
195 196 197
        }
        if($this->authoritative){
            return false;
198
        }else{
199 200
            //we're not authoritative, so let other handlers try
            return;
201 202 203
        }
    }

204
    function onStartChangePassword(Profile $target ,$oldpassword, $newpassword)
205
    {
206
        if($this->password_changeable){
207
            $user_username = new User_username();
208
            $user_username->user_id = $target->getID();
209
            $user_username->provider_name=$this->provider_name;
210
            if ($user_username->find(true)) {
211 212 213 214 215 216 217
                $authenticated = $this->checkPassword($user_username->username, $oldpassword);
                if($authenticated){
                    $result = $this->changePassword($user_username->username,$oldpassword,$newpassword);
                    if($result){
                        //stop handling of other handlers, because what was requested was done
                        return false;
                    }else{
218 219
                        // TRANS: Exception thrown when a password change fails.
                        throw new Exception(_('Password changing failed.'));
220
                    }
221
                }else{
222 223
                    if($this->authoritative){
                        //since we're authoritative, no other plugin could do this
224 225
                        // TRANS: Exception thrown when a password change fails.
                        throw new Exception(_('Password changing failed.'));
226 227 228 229
                    }else{
                        //let another handler try
                        return null;
                    }
230
                }
231 232
            }
        }else{
233
            if($this->authoritative){
234
                //since we're authoritative, no other plugin could do this
235 236
                // TRANS: Exception thrown when a password change attempt fails because it is not allowed.
                throw new Exception(_('Password changing is not allowed.'));
237 238
            }
        }
239 240 241 242
    }

    function onStartAccountSettingsPasswordMenuItem($widget)
    {
243
        if($this->authoritative && !$this->password_changeable){
244 245 246 247 248 249 250
            //since we're authoritative, no other plugin could change passwords, so do not render the menu item
            return false;
        }
    }

    function onCheckSchema() {
        $schema = Schema::get();
251
        $schema->ensureTable('user_username', User_username::schemaDef());
252 253 254 255 256 257 258 259
        return true;
    }

    function onUserDeleteRelated($user, &$tables)
    {
        $tables[] = 'User_username';
        return true;
    }
260
}