|
|
|
@@ -30,66 +30,66 @@ static const string get_self_url(const kingate::cgi_gateway& gw) { |
30 | rv += gw.get_meta("REQUEST_URI"); |
30 | rv += gw.get_meta("REQUEST_URI"); |
31 | string::size_type q = rv.find('?'); |
31 | string::size_type q = rv.find('?'); |
32 | if(q!=string::npos) |
32 | if(q!=string::npos) |
33 | rv.erase(q); |
33 | rv.erase(q); |
34 | return rv; |
34 | return rv; |
35 | } |
35 | } |
36 | |
36 | |
37 | class opdb_t : public sqlite3_t { |
37 | class opdb_t : public sqlite3_t { |
38 | public: |
38 | public: |
39 | opdb_t() |
39 | opdb_t() |
40 | : sqlite3_t("/tmp/OP.db") { |
40 | : sqlite3_t("/tmp/OP.db") { |
41 | assert(_D); |
41 | assert(_D); |
42 | char **resp; int nr,nc; char *errm; |
42 | char **resp; int nr,nc; char *errm; |
43 | if(sqlite3_get_table( |
43 | if(sqlite3_get_table( |
44 | _D, "SELECT a_op FROM assoc LIMIT 0", |
44 | _D, "SELECT a_op FROM assoc LIMIT 0", |
45 | &resp,&nr,&nc,&errm)!=SQLITE_OK) { |
45 | &resp,&nr,&nc,&errm)!=SQLITE_OK) { |
46 | extern const char *__OP_db_bootstrap; |
46 | extern const char *__OP_db_bootstrap; |
47 | DOUT_("Bootstrapping DB"); |
47 | DOUT_("Bootstrapping DB"); |
48 | if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK) |
48 | if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK) |
49 | throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm); |
49 | throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm); |
50 | }else |
50 | }else |
51 | sqlite3_free_table(resp); |
51 | sqlite3_free_table(resp); |
52 | } |
52 | } |
53 | }; |
53 | }; |
54 | |
54 | |
55 | class example_op_t : public opkele::verify_OP { |
55 | class example_op_t : public opkele::verify_OP { |
56 | public: |
56 | public: |
57 | kingate::cgi_gateway& gw; |
57 | kingate::cgi_gateway& gw; |
58 | opdb_t db; |
58 | opdb_t db; |
59 | kingate::cookie htc; |
59 | kingate::cookie htc; |
60 | |
60 | |
61 | |
61 | |
62 | example_op_t(kingate::cgi_gateway& gw) |
62 | example_op_t(kingate::cgi_gateway& g) |
63 | : gw(gw) { |
63 | : gw(g) { |
64 | try { |
64 | try { |
65 | htc = gw.cookies.get_cookie("htop_session"); |
65 | htc = gw.cookies.get_cookie("htop_session"); |
66 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
66 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
67 | "SELECT 1 FROM ht_sessions WHERE hts_id=%Q", |
67 | "SELECT 1 FROM ht_sessions WHERE hts_id=%Q", |
68 | htc.get_value().c_str()); |
68 | htc.get_value().c_str()); |
69 | sqlite3_table_t T; int nr,nc; |
69 | sqlite3_table_t T; int nr,nc; |
70 | db.get_table(S,T,&nr,&nc); |
70 | db.get_table(S,T,&nr,&nc); |
71 | if(nr<1) |
71 | if(nr<1) |
72 | throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation"); |
72 | throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation"); |
73 | }catch(kingate::exception_notfound& kenf) { |
73 | }catch(kingate::exception_notfound& kenf) { |
74 | uuid_t uuid; uuid_generate(uuid); |
74 | uuid_t uuid; uuid_generate(uuid); |
75 | htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid))); |
75 | htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid))); |
76 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
76 | sqlite3_mem_t<char*> S = sqlite3_mprintf( |
77 | "INSERT INTO ht_sessions (hts_id) VALUES (%Q)", |
77 | "INSERT INTO ht_sessions (hts_id) VALUES (%Q)", |
78 | htc.get_value().c_str()); |
78 | htc.get_value().c_str()); |
79 | db.exec(S); |
79 | db.exec(S); |
80 | } |
80 | } |
81 | } |
81 | } |
82 | |
82 | |
83 | void set_authorized(bool a) { |
83 | void set_authorized(bool a) { |
84 | sqlite3_mem_t<char*> |
84 | sqlite3_mem_t<char*> |
85 | S = sqlite3_mprintf( |
85 | S = sqlite3_mprintf( |
86 | "UPDATE ht_sessions" |
86 | "UPDATE ht_sessions" |
87 | " SET authorized=%d" |
87 | " SET authorized=%d" |
88 | " WHERE hts_id=%Q", |
88 | " WHERE hts_id=%Q", |
89 | (int)a,htc.get_value().c_str()); |
89 | (int)a,htc.get_value().c_str()); |
90 | db.exec(S); |
90 | db.exec(S); |
91 | } |
91 | } |
92 | bool get_authorized() { |
92 | bool get_authorized() { |
93 | sqlite3_mem_t<char*> |
93 | sqlite3_mem_t<char*> |
94 | S = sqlite3_mprintf( |
94 | S = sqlite3_mprintf( |
95 | "SELECT authorized" |
95 | "SELECT authorized" |
@@ -171,201 +171,201 @@ class example_op_t : public opkele::verify_OP { |
171 | nonce.c_str() ); |
171 | nonce.c_str() ); |
172 | db.exec(S); |
172 | db.exec(S); |
173 | return nonce; |
173 | return nonce; |
174 | } |
174 | } |
175 | bool check_nonce(const string& nonce) { |
175 | bool check_nonce(const string& nonce) { |
176 | sqlite3_mem_t<char*> |
176 | sqlite3_mem_t<char*> |
177 | S = sqlite3_mprintf( |
177 | S = sqlite3_mprintf( |
178 | "SELECT 1" |
178 | "SELECT 1" |
179 | " FROM nonces" |
179 | " FROM nonces" |
180 | " WHERE n_once=%Q AND n_itime IS NULL", |
180 | " WHERE n_once=%Q AND n_itime IS NULL", |
181 | nonce.c_str()); |
181 | nonce.c_str()); |
182 | sqlite3_table_t T; |
182 | sqlite3_table_t T; |
183 | int nr,nc; |
183 | int nr,nc; |
184 | db.get_table(S,T,&nr,&nc); |
184 | db.get_table(S,T,&nr,&nc); |
185 | return nr>=1; |
185 | return nr>=1; |
186 | } |
186 | } |
187 | void invalidate_nonce(const string& nonce) { |
187 | void invalidate_nonce(const string& nonce) { |
188 | sqlite3_mem_t<char*> |
188 | sqlite3_mem_t<char*> |
189 | S = sqlite3_mprintf( |
189 | S = sqlite3_mprintf( |
190 | "UPDATE nonces" |
190 | "UPDATE nonces" |
191 | " SET n_itime=datetime('now')" |
191 | " SET n_itime=datetime('now')" |
192 | " WHERE n_once=%Q", |
192 | " WHERE n_once=%Q", |
193 | nonce.c_str()); |
193 | nonce.c_str()); |
194 | db.exec(S); |
194 | db.exec(S); |
195 | } |
195 | } |
196 | |
196 | |
197 | const string get_op_endpoint() const { |
197 | const string get_op_endpoint() const { |
198 | return get_self_url(gw); |
198 | return get_self_url(gw); |
199 | } |
199 | } |
200 | |
200 | |
201 | }; |
201 | }; |
202 | |
202 | |
203 | int main(int argc,char *argv[]) { |
203 | int main(int,char **) { |
204 | try { |
204 | try { |
205 | kingate::plaincgi_interface ci; |
205 | kingate::plaincgi_interface ci; |
206 | kingate::cgi_gateway gw(ci); |
206 | kingate::cgi_gateway gw(ci); |
207 | string op; |
207 | string op; |
208 | try { op = gw.get_param("op"); }catch(kingate::exception_notfound&) { } |
208 | try { op = gw.get_param("op"); }catch(kingate::exception_notfound&) { } |
209 | string message; |
209 | string message; |
210 | if(op=="set_password") { |
210 | if(op=="set_password") { |
211 | example_op_t OP(gw); |
211 | example_op_t OP(gw); |
212 | string password = gw.get_param("password"); |
212 | string password = gw.get_param("password"); |
213 | sqlite3_mem_t<char*> |
213 | sqlite3_mem_t<char*> |
214 | Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
214 | Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
215 | sqlite3_table_t T; int nr,nc; |
215 | sqlite3_table_t T; int nr,nc; |
216 | OP.db.get_table(Sget,T,&nr,&nc); |
216 | OP.db.get_table(Sget,T,&nr,&nc); |
217 | if(nr>=1) |
217 | if(nr>=1) |
218 | throw opkele::exception(OPKELE_CP_ "Password already set"); |
218 | throw opkele::exception(OPKELE_CP_ "Password already set"); |
219 | sqlite3_mem_t<char*> |
219 | sqlite3_mem_t<char*> |
220 | Sset = sqlite3_mprintf( |
220 | Sset = sqlite3_mprintf( |
221 | "INSERT INTO setup (s_password) VALUES (%Q)", |
221 | "INSERT INTO setup (s_password) VALUES (%Q)", |
222 | password.c_str()); |
222 | password.c_str()); |
223 | OP.db.exec(Sset); |
223 | OP.db.exec(Sset); |
224 | op.clear(); |
224 | op.clear(); |
225 | message = "password set"; |
225 | message = "password set"; |
226 | }else if(op=="login") { |
226 | }else if(op=="login") { |
227 | example_op_t OP(gw); |
227 | example_op_t OP(gw); |
228 | string password = gw.get_param("password"); |
228 | string password = gw.get_param("password"); |
229 | sqlite3_mem_t<char*> |
229 | sqlite3_mem_t<char*> |
230 | Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
230 | Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
231 | sqlite3_table_t T; int nr,nc; |
231 | sqlite3_table_t T; int nr,nc; |
232 | OP.db.get_table(Sget,T,&nr,&nc); |
232 | OP.db.get_table(Sget,T,&nr,&nc); |
233 | if(nr<1) |
233 | if(nr<1) |
234 | throw opkele::exception(OPKELE_CP_ "no password set"); |
234 | throw opkele::exception(OPKELE_CP_ "no password set"); |
235 | if(password!=T.get(1,0,nc)) |
235 | if(password!=T.get(1,0,nc)) |
236 | throw opkele::exception(OPKELE_CP_ "wrong password"); |
236 | throw opkele::exception(OPKELE_CP_ "wrong password"); |
237 | OP.set_authorized(true); |
237 | OP.set_authorized(true); |
238 | op.clear(); |
238 | op.clear(); |
239 | message = "logged in"; |
239 | message = "logged in"; |
240 | OP.cookie_header(cout); |
240 | OP.cookie_header(cout); |
241 | }else if(op=="logout") { |
241 | }else if(op=="logout") { |
242 | example_op_t OP(gw); |
242 | example_op_t OP(gw); |
243 | OP.set_authorized(false); |
243 | OP.set_authorized(false); |
244 | op.clear(); |
244 | op.clear(); |
245 | message = "logged out"; |
245 | message = "logged out"; |
246 | } |
246 | } |
247 | string om; |
247 | string omode; |
248 | try { om = gw.get_param("openid.mode"); }catch(kingate::exception_notfound&) { } |
248 | try { omode = gw.get_param("openid.mode"); }catch(kingate::exception_notfound&) { } |
249 | if(op=="xrds") { |
249 | if(op=="xrds") { |
250 | cout << |
250 | cout << |
251 | "Content-type: application/xrds+xml\n\n" |
251 | "Content-type: application/xrds+xml\n\n" |
252 | "<?xml version='1.0' encoding='utf-8'?>" |
252 | "<?xml version='1.0' encoding='utf-8'?>" |
253 | "<xrds:XRDS xmlns:xrds='xri://$xrds' xmlns='xri://$xrd*($v*2.0)'>" |
253 | "<xrds:XRDS xmlns:xrds='xri://$xrds' xmlns='xri://$xrd*($v*2.0)'>" |
254 | "<XRD>" |
254 | "<XRD>" |
255 | "<Service>" |
255 | "<Service>" |
256 | "<Type>" STURI_OPENID20 "</Type>" |
256 | "<Type>" STURI_OPENID20 "</Type>" |
257 | "<URI>" << get_self_url(gw) << "</URI>" |
257 | "<URI>" << get_self_url(gw) << "</URI>" |
258 | "</Service>"; |
258 | "</Service>"; |
259 | if(gw.has_param("idsel")){ |
259 | if(gw.has_param("idsel")){ |
260 | cout << |
260 | cout << |
261 | "<Service>" |
261 | "<Service>" |
262 | "<Type>" STURI_OPENID20_OP "</Type>" |
262 | "<Type>" STURI_OPENID20_OP "</Type>" |
263 | "<URI>" << get_self_url(gw) << "</URI>"; |
263 | "<URI>" << get_self_url(gw) << "</URI>"; |
264 | } |
264 | } |
265 | cout << |
265 | cout << |
266 | "</XRD>" |
266 | "</XRD>" |
267 | "</xrds:XRDS>"; |
267 | "</xrds:XRDS>"; |
268 | }else if(op=="id_res" || op=="cancel") { |
268 | }else if(op=="id_res" || op=="cancel") { |
269 | kingate_openid_message_t inm(gw); |
269 | kingate_openid_message_t inm(gw); |
270 | example_op_t OP(gw); |
270 | example_op_t OP(gw); |
271 | if(gw.get_param("hts_id")!=OP.htc.get_value()) |
271 | if(gw.get_param("hts_id")!=OP.htc.get_value()) |
272 | throw opkele::exception(OPKELE_CP_ "toying around, huh?"); |
272 | throw opkele::exception(OPKELE_CP_ "toying around, huh?"); |
273 | opkele::sreg_t sreg; |
273 | opkele::sreg_t sreg; |
274 | OP.checkid_(inm,sreg); |
274 | OP.checkid_(inm,sreg); |
275 | OP.cookie_header(cout); |
275 | OP.cookie_header(cout); |
276 | opkele::openid_message_t om; |
276 | opkele::openid_message_t om; |
277 | if(op=="id_res") { |
277 | if(op=="id_res") { |
278 | if(!OP.get_authorized()) |
278 | if(!OP.get_authorized()) |
279 | throw opkele::exception(OPKELE_CP_ "not logged in"); |
279 | throw opkele::exception(OPKELE_CP_ "not logged in"); |
280 | if(OP.is_id_select()) { |
280 | if(OP.is_id_select()) { |
281 | OP.select_identity( get_self_url(gw), get_self_url(gw) ); |
281 | OP.select_identity( get_self_url(gw), get_self_url(gw) ); |
282 | } |
282 | } |
283 | sreg.set_field(opkele::sreg_t::field_nickname,"anonymous"); |
283 | sreg.set_field(opkele::sreg_t::field_nickname,"anonymous"); |
284 | sreg.set_field(opkele::sreg_t::field_fullname,"Ann O'Nymus"); |
284 | sreg.set_field(opkele::sreg_t::field_fullname,"Ann O'Nymus"); |
285 | sreg.set_field(opkele::sreg_t::field_gender,"F"); |
285 | sreg.set_field(opkele::sreg_t::field_gender,"F"); |
286 | sreg.setup_response(); |
286 | sreg.setup_response(); |
287 | cout << |
287 | cout << |
288 | "Status: 302 Going back to RP with id_res\n" |
288 | "Status: 302 Going back to RP with id_res\n" |
289 | "Location: " << OP.id_res(om,sreg).append_query(OP.get_return_to()) |
289 | "Location: " << OP.id_res(om,sreg).append_query(OP.get_return_to()) |
290 | << "\n\n"; |
290 | << "\n\n"; |
291 | }else{ |
291 | }else{ |
292 | cout << |
292 | cout << |
293 | "Status: 302 Going back to RP with cancel\n" |
293 | "Status: 302 Going back to RP with cancel\n" |
294 | "Location: " << OP.cancel(om).append_query(OP.get_return_to()) |
294 | "Location: " << OP.cancel(om).append_query(OP.get_return_to()) |
295 | << "\n\n"; |
295 | << "\n\n"; |
296 | } |
296 | } |
297 | om.to_keyvalues(clog); |
297 | om.to_keyvalues(clog); |
298 | }else if(om=="associate") { |
298 | }else if(omode=="associate") { |
299 | kingate_openid_message_t inm(gw); |
299 | kingate_openid_message_t inm(gw); |
300 | opkele::openid_message_t oum; |
300 | opkele::openid_message_t oum; |
301 | example_op_t OP(gw); |
301 | example_op_t OP(gw); |
302 | OP.associate(oum,inm); |
302 | OP.associate(oum,inm); |
303 | cout << "Content-type: text/plain\n\n"; |
303 | cout << "Content-type: text/plain\n\n"; |
304 | oum.to_keyvalues(cout); |
304 | oum.to_keyvalues(cout); |
305 | }else if(om=="checkid_setup") { |
305 | }else if(omode=="checkid_setup") { |
306 | kingate_openid_message_t inm(gw); |
306 | kingate_openid_message_t inm(gw); |
307 | example_op_t OP(gw); |
307 | example_op_t OP(gw); |
308 | OP.checkid_(inm,0); |
308 | OP.checkid_(inm,0); |
309 | OP.cookie_header(cout) << |
309 | OP.cookie_header(cout) << |
310 | "Content-type: text/html\n" |
310 | "Content-type: text/html\n" |
311 | "\n" |
311 | "\n" |
312 | |
312 | |
313 | "<html>" |
313 | "<html>" |
314 | "<head>" |
314 | "<head>" |
315 | "<title>test OP: confirm authentication</title>" |
315 | "<title>test OP: confirm authentication</title>" |
316 | "</head>" |
316 | "</head>" |
317 | "<body>" |
317 | "<body>" |
318 | "realm: " << OP.get_realm() << "<br/>" |
318 | "realm: " << OP.get_realm() << "<br/>" |
319 | "return_to: " << OP.get_return_to() << "<br/>" |
319 | "return_to: " << OP.get_return_to() << "<br/>" |
320 | "claimed_id: " << OP.get_claimed_id() << "<br/>" |
320 | "claimed_id: " << OP.get_claimed_id() << "<br/>" |
321 | "identity: " << OP.get_identity() << "<br/>"; |
321 | "identity: " << OP.get_identity() << "<br/>"; |
322 | if(OP.is_id_select()) { |
322 | if(OP.is_id_select()) { |
323 | OP.select_identity( get_self_url(gw), get_self_url(gw) ); |
323 | OP.select_identity( get_self_url(gw), get_self_url(gw) ); |
324 | cout << |
324 | cout << |
325 | "selected claimed_id: " << OP.get_claimed_id() << "<br/>" |
325 | "selected claimed_id: " << OP.get_claimed_id() << "<br/>" |
326 | "selected identity: " << OP.get_identity() << "<br/>"; |
326 | "selected identity: " << OP.get_identity() << "<br/>"; |
327 | } |
327 | } |
328 | cout << |
328 | cout << |
329 | "<form method='post'>"; |
329 | "<form method='post'>"; |
330 | inm.to_htmlhiddens(cout); |
330 | inm.to_htmlhiddens(cout); |
331 | cout << |
331 | cout << |
332 | "<input type='hidden' name='hts_id'" |
332 | "<input type='hidden' name='hts_id'" |
333 | " value='" << opkele::util::attr_escape(OP.htc.get_value()) << "'/>" |
333 | " value='" << opkele::util::attr_escape(OP.htc.get_value()) << "'/>" |
334 | "<input type='submit' name='op' value='id_res'/>" |
334 | "<input type='submit' name='op' value='id_res'/>" |
335 | "<input type='submit' name='op' value='cancel'/>" |
335 | "<input type='submit' name='op' value='cancel'/>" |
336 | "</form>" |
336 | "</form>" |
337 | "</body>" |
337 | "</body>" |
338 | "</html>"; |
338 | "</html>"; |
339 | }else if(om=="check_authentication") { |
339 | }else if(omode=="check_authentication") { |
340 | kingate_openid_message_t inm(gw); |
340 | kingate_openid_message_t inm(gw); |
341 | example_op_t OP(gw); |
341 | example_op_t OP(gw); |
342 | opkele::openid_message_t oum; |
342 | opkele::openid_message_t oum; |
343 | OP.check_authentication(oum,inm); |
343 | OP.check_authentication(oum,inm); |
344 | cout << "Content-type: text/plain\n\n"; |
344 | cout << "Content-type: text/plain\n\n"; |
345 | oum.to_keyvalues(cout); |
345 | oum.to_keyvalues(cout); |
346 | oum.to_keyvalues(clog); |
346 | oum.to_keyvalues(clog); |
347 | }else{ |
347 | }else{ |
348 | example_op_t OP(gw); |
348 | example_op_t OP(gw); |
349 | string idsel; |
349 | string idsel; |
350 | if(gw.has_param("idsel")) |
350 | if(gw.has_param("idsel")) |
351 | idsel = "&idsel=idsel"; |
351 | idsel = "&idsel=idsel"; |
352 | OP.cookie_header(cout) << |
352 | OP.cookie_header(cout) << |
353 | "Content-type: text/html\n" |
353 | "Content-type: text/html\n" |
354 | "X-XRDS-Location: " << get_self_url(gw) << "?op=xrds" << idsel << "\n" |
354 | "X-XRDS-Location: " << get_self_url(gw) << "?op=xrds" << idsel << "\n" |
355 | "\n" |
355 | "\n" |
356 | |
356 | |
357 | "<html>" |
357 | "<html>" |
358 | "<head>" |
358 | "<head>" |
359 | "<title>test OP</title>" |
359 | "<title>test OP</title>" |
360 | "<link rel='openid.server' href='" << get_self_url(gw) << "'/>" |
360 | "<link rel='openid.server' href='" << get_self_url(gw) << "'/>" |
361 | "</head>" |
361 | "</head>" |
362 | "<body>" |
362 | "<body>" |
363 | "test openid 2.0 endpoint" |
363 | "test openid 2.0 endpoint" |
364 | "<br/>" |
364 | "<br/>" |
365 | "<a href='" << get_self_url(gw) << "?op=xrds" << idsel << "'>XRDS document</a>" |
365 | "<a href='" << get_self_url(gw) << "?op=xrds" << idsel << "'>XRDS document</a>" |
366 | "<br/>" |
366 | "<br/>" |
367 | "<h1>" << message << "</h1>"; |
367 | "<h1>" << message << "</h1>"; |
368 | sqlite3_mem_t<char*> |
368 | sqlite3_mem_t<char*> |
369 | S = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
369 | S = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); |
370 | sqlite3_table_t T; int nr,nc; |
370 | sqlite3_table_t T; int nr,nc; |
371 | OP.db.get_table(S,T,&nr,&nc); |
371 | OP.db.get_table(S,T,&nr,&nc); |
|