summaryrefslogtreecommitdiffabout
path: root/test/OP.cc
Unidiff
Diffstat (limited to 'test/OP.cc') (more/less context) (show whitespace changes)
-rw-r--r--test/OP.cc6
1 files changed, 5 insertions, 1 deletions
diff --git a/test/OP.cc b/test/OP.cc
index 6012b2e..4e2a5ed 100644
--- a/test/OP.cc
+++ b/test/OP.cc
@@ -1,402 +1,406 @@
1#include <uuid/uuid.h> 1#include <uuid/uuid.h>
2#include <iostream> 2#include <iostream>
3#include <cassert> 3#include <cassert>
4#include <string> 4#include <string>
5#include <ext/algorithm>
6using namespace std; 5using namespace std;
7#include <kingate/exception.h> 6#include <kingate/exception.h>
8#include <kingate/plaincgi.h> 7#include <kingate/plaincgi.h>
9#include <kingate/cgi_gateway.h> 8#include <kingate/cgi_gateway.h>
10#include <opkele/exception.h> 9#include <opkele/exception.h>
11#include <opkele/util.h> 10#include <opkele/util.h>
12#include <opkele/uris.h> 11#include <opkele/uris.h>
13#include <opkele/extension.h> 12#include <opkele/extension.h>
14#include <opkele/association.h> 13#include <opkele/association.h>
15#include <opkele/debug.h> 14#include <opkele/debug.h>
16#include <opkele/verify_op.h> 15#include <opkele/verify_op.h>
17#include <opkele/sreg.h> 16#include <opkele/sreg.h>
18 17
18#include "config.h"
19#ifdef HAVE_EXT_ALGORITHM_H
20# include <ext/algorithm>
21#endif
22
19#include "sqlite.h" 23#include "sqlite.h"
20#include "kingate_openid_message.h" 24#include "kingate_openid_message.h"
21 25
22static const string get_self_url(const kingate::cgi_gateway& gw) { 26static const string get_self_url(const kingate::cgi_gateway& gw) {
23 bool s = gw.has_meta("SSL_PROTOCOL_VERSION"); 27 bool s = gw.has_meta("SSL_PROTOCOL_VERSION");
24 string rv = s?"https://":"http://"; 28 string rv = s?"https://":"http://";
25 rv += gw.http_request_header("Host"); 29 rv += gw.http_request_header("Host");
26 const string& port = gw.get_meta("SERVER_PORT"); 30 const string& port = gw.get_meta("SERVER_PORT");
27 if( port!=(s?"443":"80") ) { 31 if( port!=(s?"443":"80") ) {
28 rv += ':'; rv += port; 32 rv += ':'; rv += port;
29 } 33 }
30 rv += gw.get_meta("REQUEST_URI"); 34 rv += gw.get_meta("REQUEST_URI");
31 string::size_type q = rv.find('?'); 35 string::size_type q = rv.find('?');
32 if(q!=string::npos) 36 if(q!=string::npos)
33 rv.erase(q); 37 rv.erase(q);
34 return rv; 38 return rv;
35} 39}
36 40
37class opdb_t : public sqlite3_t { 41class opdb_t : public sqlite3_t {
38 public: 42 public:
39 opdb_t() 43 opdb_t()
40 : sqlite3_t("/tmp/OP.db") { 44 : sqlite3_t("/tmp/OP.db") {
41 assert(_D); 45 assert(_D);
42 char **resp; int nr,nc; char *errm; 46 char **resp; int nr,nc; char *errm;
43 if(sqlite3_get_table( 47 if(sqlite3_get_table(
44 _D, "SELECT a_op FROM assoc LIMIT 0", 48 _D, "SELECT a_op FROM assoc LIMIT 0",
45 &resp,&nr,&nc,&errm)!=SQLITE_OK) { 49 &resp,&nr,&nc,&errm)!=SQLITE_OK) {
46 extern const char *__OP_db_bootstrap; 50 extern const char *__OP_db_bootstrap;
47 DOUT_("Bootstrapping DB"); 51 DOUT_("Bootstrapping DB");
48 if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK) 52 if(sqlite3_exec(_D,__OP_db_bootstrap,NULL,NULL,&errm)!=SQLITE_OK)
49 throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm); 53 throw opkele::exception(OPKELE_CP_ string("Failed to boostrap SQLite database: ")+errm);
50 }else 54 }else
51 sqlite3_free_table(resp); 55 sqlite3_free_table(resp);
52 } 56 }
53}; 57};
54 58
55class example_op_t : public opkele::verify_OP { 59class example_op_t : public opkele::verify_OP {
56 public: 60 public:
57 kingate::cgi_gateway& gw; 61 kingate::cgi_gateway& gw;
58 opdb_t db; 62 opdb_t db;
59 kingate::cookie htc; 63 kingate::cookie htc;
60 64
61 65
62 example_op_t(kingate::cgi_gateway& g) 66 example_op_t(kingate::cgi_gateway& g)
63 : gw(g) { 67 : gw(g) {
64 try { 68 try {
65 htc = gw.cookies.get_cookie("htop_session"); 69 htc = gw.cookies.get_cookie("htop_session");
66 sqlite3_mem_t<char*> S = sqlite3_mprintf( 70 sqlite3_mem_t<char*> S = sqlite3_mprintf(
67 "SELECT 1 FROM ht_sessions WHERE hts_id=%Q", 71 "SELECT 1 FROM ht_sessions WHERE hts_id=%Q",
68 htc.get_value().c_str()); 72 htc.get_value().c_str());
69 sqlite3_table_t T; int nr,nc; 73 sqlite3_table_t T; int nr,nc;
70 db.get_table(S,T,&nr,&nc); 74 db.get_table(S,T,&nr,&nc);
71 if(nr<1) 75 if(nr<1)
72 throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation"); 76 throw kingate::exception_notfound(CODEPOINT,"forcing cookie generation");
73 }catch(kingate::exception_notfound& kenf) { 77 }catch(kingate::exception_notfound& kenf) {
74 uuid_t uuid; uuid_generate(uuid); 78 uuid_t uuid; uuid_generate(uuid);
75 htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid))); 79 htc = kingate::cookie("htop_session",opkele::util::encode_base64(uuid,sizeof(uuid)));
76 sqlite3_mem_t<char*> S = sqlite3_mprintf( 80 sqlite3_mem_t<char*> S = sqlite3_mprintf(
77 "INSERT INTO ht_sessions (hts_id) VALUES (%Q)", 81 "INSERT INTO ht_sessions (hts_id) VALUES (%Q)",
78 htc.get_value().c_str()); 82 htc.get_value().c_str());
79 db.exec(S); 83 db.exec(S);
80 } 84 }
81 } 85 }
82 86
83 void set_authorized(bool a) { 87 void set_authorized(bool a) {
84 sqlite3_mem_t<char*> 88 sqlite3_mem_t<char*>
85 S = sqlite3_mprintf( 89 S = sqlite3_mprintf(
86 "UPDATE ht_sessions" 90 "UPDATE ht_sessions"
87 " SET authorized=%d" 91 " SET authorized=%d"
88 " WHERE hts_id=%Q", 92 " WHERE hts_id=%Q",
89 (int)a,htc.get_value().c_str()); 93 (int)a,htc.get_value().c_str());
90 db.exec(S); 94 db.exec(S);
91 } 95 }
92 bool get_authorized() { 96 bool get_authorized() {
93 sqlite3_mem_t<char*> 97 sqlite3_mem_t<char*>
94 S = sqlite3_mprintf( 98 S = sqlite3_mprintf(
95 "SELECT authorized" 99 "SELECT authorized"
96 " FROM ht_sessions" 100 " FROM ht_sessions"
97 " WHERE hts_id=%Q", 101 " WHERE hts_id=%Q",
98 htc.get_value().c_str()); 102 htc.get_value().c_str());
99 sqlite3_table_t T; int nr,nc; 103 sqlite3_table_t T; int nr,nc;
100 db.get_table(S,T,&nr,&nc); 104 db.get_table(S,T,&nr,&nc);
101 assert(nr==1); assert(nc=1); 105 assert(nr==1); assert(nc=1);
102 return opkele::util::string_to_long(T.get(1,0,nc)); 106 return opkele::util::string_to_long(T.get(1,0,nc));
103 } 107 }
104 108
105 ostream& cookie_header(ostream& o) const { 109 ostream& cookie_header(ostream& o) const {
106 o << "Set-Cookie: " << htc.set_cookie_header() << "\n"; 110 o << "Set-Cookie: " << htc.set_cookie_header() << "\n";
107 return o; 111 return o;
108 } 112 }
109 113
110 opkele::assoc_t alloc_assoc(const string& type,size_t klength,bool sl) { 114 opkele::assoc_t alloc_assoc(const string& type,size_t klength,bool sl) {
111 uuid_t uuid; uuid_generate(uuid); 115 uuid_t uuid; uuid_generate(uuid);
112 string a_handle = opkele::util::encode_base64(uuid,sizeof(uuid)); 116 string a_handle = opkele::util::encode_base64(uuid,sizeof(uuid));
113 opkele::secret_t a_secret; 117 opkele::secret_t a_secret;
114 generate_n( 118 generate_n(
115 back_insert_iterator<opkele::secret_t>(a_secret),klength, 119 back_insert_iterator<opkele::secret_t>(a_secret),klength,
116 rand ); 120 rand );
117 string ssecret; a_secret.to_base64(ssecret); 121 string ssecret; a_secret.to_base64(ssecret);
118 time_t now = time(0); 122 time_t now = time(0);
119 int expires_in = sl?3600*2:3600*24*7*2; 123 int expires_in = sl?3600*2:3600*24*7*2;
120 sqlite3_mem_t<char*> 124 sqlite3_mem_t<char*>
121 S = sqlite3_mprintf( 125 S = sqlite3_mprintf(
122 "INSERT INTO assoc" 126 "INSERT INTO assoc"
123 " (a_handle,a_type,a_ctime,a_etime,a_secret,a_stateless)" 127 " (a_handle,a_type,a_ctime,a_etime,a_secret,a_stateless)"
124 " VALUES (" 128 " VALUES ("
125 " %Q,%Q,datetime('now')," 129 " %Q,%Q,datetime('now'),"
126 " datetime('now','+%d seconds')," 130 " datetime('now','+%d seconds'),"
127 " %Q,%d );", 131 " %Q,%d );",
128 a_handle.c_str(), type.c_str(), 132 a_handle.c_str(), type.c_str(),
129 expires_in, 133 expires_in,
130 ssecret.c_str(), sl ); 134 ssecret.c_str(), sl );
131 db.exec(S); 135 db.exec(S);
132 return opkele::assoc_t(new opkele::association( 136 return opkele::assoc_t(new opkele::association(
133 "", 137 "",
134 a_handle, type, a_secret, 138 a_handle, type, a_secret,
135 now+expires_in, sl )); 139 now+expires_in, sl ));
136 } 140 }
137 141
138 opkele::assoc_t retrieve_assoc(const string& h) { 142 opkele::assoc_t retrieve_assoc(const string& h) {
139 sqlite3_mem_t<char*> 143 sqlite3_mem_t<char*>
140 S = sqlite3_mprintf( 144 S = sqlite3_mprintf(
141 "SELECT" 145 "SELECT"
142 " a_handle,a_type,a_secret,a_stateless," 146 " a_handle,a_type,a_secret,a_stateless,"
143 " strftime('%%s',a_etime) AS a_etime," 147 " strftime('%%s',a_etime) AS a_etime,"
144 " a_itime" 148 " a_itime"
145 " FROM assoc" 149 " FROM assoc"
146 " WHERE a_handle=%Q AND a_itime IS NULL" 150 " WHERE a_handle=%Q AND a_itime IS NULL"
147 " AND datetime('now') < a_etime" 151 " AND datetime('now') < a_etime"
148 " LIMIT 1", 152 " LIMIT 1",
149 h.c_str() ); 153 h.c_str() );
150 sqlite3_table_t T; 154 sqlite3_table_t T;
151 int nr,nc; 155 int nr,nc;
152 db.get_table(S,T,&nr,&nc); 156 db.get_table(S,T,&nr,&nc);
153 if(nr<1) 157 if(nr<1)
154 throw opkele::failed_lookup(OPKELE_CP_ 158 throw opkele::failed_lookup(OPKELE_CP_
155 "couldn't retrieve valid unexpired assoc"); 159 "couldn't retrieve valid unexpired assoc");
156 assert(nr==1); assert(nc==6); 160 assert(nr==1); assert(nc==6);
157 opkele::secret_t secret; opkele::util::decode_base64(T.get(1,2,nc),secret); 161 opkele::secret_t secret; opkele::util::decode_base64(T.get(1,2,nc),secret);
158 return opkele::assoc_t(new opkele::association( 162 return opkele::assoc_t(new opkele::association(
159 "", h, T.get(1,1,nc), secret, 163 "", h, T.get(1,1,nc), secret,
160 strtol(T.get(1,4,nc),0,0), 164 strtol(T.get(1,4,nc),0,0),
161 strtol(T.get(1,3,nc),0,0) )); 165 strtol(T.get(1,3,nc),0,0) ));
162 } 166 }
163 167
164 string& alloc_nonce(string& nonce) { 168 string& alloc_nonce(string& nonce) {
165 uuid_t uuid; uuid_generate(uuid); 169 uuid_t uuid; uuid_generate(uuid);
166 nonce += opkele::util::encode_base64(uuid,sizeof(uuid)); 170 nonce += opkele::util::encode_base64(uuid,sizeof(uuid));
167 sqlite3_mem_t<char*> 171 sqlite3_mem_t<char*>
168 S = sqlite3_mprintf( 172 S = sqlite3_mprintf(
169 "INSERT INTO nonces" 173 "INSERT INTO nonces"
170 " (n_once) VALUES (%Q)", 174 " (n_once) VALUES (%Q)",
171 nonce.c_str() ); 175 nonce.c_str() );
172 db.exec(S); 176 db.exec(S);
173 return nonce; 177 return nonce;
174 } 178 }
175 bool check_nonce(const string& nonce) { 179 bool check_nonce(const string& nonce) {
176 sqlite3_mem_t<char*> 180 sqlite3_mem_t<char*>
177 S = sqlite3_mprintf( 181 S = sqlite3_mprintf(
178 "SELECT 1" 182 "SELECT 1"
179 " FROM nonces" 183 " FROM nonces"
180 " WHERE n_once=%Q AND n_itime IS NULL", 184 " WHERE n_once=%Q AND n_itime IS NULL",
181 nonce.c_str()); 185 nonce.c_str());
182 sqlite3_table_t T; 186 sqlite3_table_t T;
183 int nr,nc; 187 int nr,nc;
184 db.get_table(S,T,&nr,&nc); 188 db.get_table(S,T,&nr,&nc);
185 return nr>=1; 189 return nr>=1;
186 } 190 }
187 void invalidate_nonce(const string& nonce) { 191 void invalidate_nonce(const string& nonce) {
188 sqlite3_mem_t<char*> 192 sqlite3_mem_t<char*>
189 S = sqlite3_mprintf( 193 S = sqlite3_mprintf(
190 "UPDATE nonces" 194 "UPDATE nonces"
191 " SET n_itime=datetime('now')" 195 " SET n_itime=datetime('now')"
192 " WHERE n_once=%Q", 196 " WHERE n_once=%Q",
193 nonce.c_str()); 197 nonce.c_str());
194 db.exec(S); 198 db.exec(S);
195 } 199 }
196 200
197 const string get_op_endpoint() const { 201 const string get_op_endpoint() const {
198 return get_self_url(gw); 202 return get_self_url(gw);
199 } 203 }
200 204
201}; 205};
202 206
203int main(int,char **) { 207int main(int,char **) {
204 try { 208 try {
205 kingate::plaincgi_interface ci; 209 kingate::plaincgi_interface ci;
206 kingate::cgi_gateway gw(ci); 210 kingate::cgi_gateway gw(ci);
207 string op; 211 string op;
208 try { op = gw.get_param("op"); }catch(kingate::exception_notfound&) { } 212 try { op = gw.get_param("op"); }catch(kingate::exception_notfound&) { }
209 string message; 213 string message;
210 if(op=="set_password") { 214 if(op=="set_password") {
211 example_op_t OP(gw); 215 example_op_t OP(gw);
212 string password = gw.get_param("password"); 216 string password = gw.get_param("password");
213 sqlite3_mem_t<char*> 217 sqlite3_mem_t<char*>
214 Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); 218 Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1");
215 sqlite3_table_t T; int nr,nc; 219 sqlite3_table_t T; int nr,nc;
216 OP.db.get_table(Sget,T,&nr,&nc); 220 OP.db.get_table(Sget,T,&nr,&nc);
217 if(nr>=1) 221 if(nr>=1)
218 throw opkele::exception(OPKELE_CP_ "Password already set"); 222 throw opkele::exception(OPKELE_CP_ "Password already set");
219 sqlite3_mem_t<char*> 223 sqlite3_mem_t<char*>
220 Sset = sqlite3_mprintf( 224 Sset = sqlite3_mprintf(
221 "INSERT INTO setup (s_password) VALUES (%Q)", 225 "INSERT INTO setup (s_password) VALUES (%Q)",
222 password.c_str()); 226 password.c_str());
223 OP.db.exec(Sset); 227 OP.db.exec(Sset);
224 op.clear(); 228 op.clear();
225 message = "password set"; 229 message = "password set";
226 }else if(op=="login") { 230 }else if(op=="login") {
227 example_op_t OP(gw); 231 example_op_t OP(gw);
228 string password = gw.get_param("password"); 232 string password = gw.get_param("password");
229 sqlite3_mem_t<char*> 233 sqlite3_mem_t<char*>
230 Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); 234 Sget = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1");
231 sqlite3_table_t T; int nr,nc; 235 sqlite3_table_t T; int nr,nc;
232 OP.db.get_table(Sget,T,&nr,&nc); 236 OP.db.get_table(Sget,T,&nr,&nc);
233 if(nr<1) 237 if(nr<1)
234 throw opkele::exception(OPKELE_CP_ "no password set"); 238 throw opkele::exception(OPKELE_CP_ "no password set");
235 if(password!=T.get(1,0,nc)) 239 if(password!=T.get(1,0,nc))
236 throw opkele::exception(OPKELE_CP_ "wrong password"); 240 throw opkele::exception(OPKELE_CP_ "wrong password");
237 OP.set_authorized(true); 241 OP.set_authorized(true);
238 op.clear(); 242 op.clear();
239 message = "logged in"; 243 message = "logged in";
240 OP.cookie_header(cout); 244 OP.cookie_header(cout);
241 }else if(op=="logout") { 245 }else if(op=="logout") {
242 example_op_t OP(gw); 246 example_op_t OP(gw);
243 OP.set_authorized(false); 247 OP.set_authorized(false);
244 op.clear(); 248 op.clear();
245 message = "logged out"; 249 message = "logged out";
246 } 250 }
247 string omode; 251 string omode;
248 try { omode = gw.get_param("openid.mode"); }catch(kingate::exception_notfound&) { } 252 try { omode = gw.get_param("openid.mode"); }catch(kingate::exception_notfound&) { }
249 if(op=="xrds") { 253 if(op=="xrds") {
250 cout << 254 cout <<
251 "Content-type: application/xrds+xml\n\n" 255 "Content-type: application/xrds+xml\n\n"
252 "<?xml version='1.0' encoding='utf-8'?>" 256 "<?xml version='1.0' encoding='utf-8'?>"
253 "<xrds:XRDS xmlns:xrds='xri://$xrds' xmlns='xri://$xrd*($v*2.0)'>" 257 "<xrds:XRDS xmlns:xrds='xri://$xrds' xmlns='xri://$xrd*($v*2.0)'>"
254 "<XRD>" 258 "<XRD>"
255 "<Service>" 259 "<Service>"
256 "<Type>" STURI_OPENID20 "</Type>" 260 "<Type>" STURI_OPENID20 "</Type>"
257 "<URI>" << get_self_url(gw) << "</URI>" 261 "<URI>" << get_self_url(gw) << "</URI>"
258 "</Service>"; 262 "</Service>";
259 if(gw.has_param("idsel")){ 263 if(gw.has_param("idsel")){
260 cout << 264 cout <<
261 "<Service>" 265 "<Service>"
262 "<Type>" STURI_OPENID20_OP "</Type>" 266 "<Type>" STURI_OPENID20_OP "</Type>"
263 "<URI>" << get_self_url(gw) << "</URI>"; 267 "<URI>" << get_self_url(gw) << "</URI>";
264 } 268 }
265 cout << 269 cout <<
266 "</XRD>" 270 "</XRD>"
267 "</xrds:XRDS>"; 271 "</xrds:XRDS>";
268 }else if(op=="id_res" || op=="cancel") { 272 }else if(op=="id_res" || op=="cancel") {
269 kingate_openid_message_t inm(gw); 273 kingate_openid_message_t inm(gw);
270 example_op_t OP(gw); 274 example_op_t OP(gw);
271 if(gw.get_param("hts_id")!=OP.htc.get_value()) 275 if(gw.get_param("hts_id")!=OP.htc.get_value())
272 throw opkele::exception(OPKELE_CP_ "toying around, huh?"); 276 throw opkele::exception(OPKELE_CP_ "toying around, huh?");
273 opkele::sreg_t sreg; 277 opkele::sreg_t sreg;
274 OP.checkid_(inm,sreg); 278 OP.checkid_(inm,sreg);
275 OP.cookie_header(cout); 279 OP.cookie_header(cout);
276 opkele::openid_message_t om; 280 opkele::openid_message_t om;
277 if(op=="id_res") { 281 if(op=="id_res") {
278 if(!OP.get_authorized()) 282 if(!OP.get_authorized())
279 throw opkele::exception(OPKELE_CP_ "not logged in"); 283 throw opkele::exception(OPKELE_CP_ "not logged in");
280 if(OP.is_id_select()) { 284 if(OP.is_id_select()) {
281 OP.select_identity( get_self_url(gw), get_self_url(gw) ); 285 OP.select_identity( get_self_url(gw), get_self_url(gw) );
282 } 286 }
283 sreg.set_field(opkele::sreg_t::field_nickname,"anonymous"); 287 sreg.set_field(opkele::sreg_t::field_nickname,"anonymous");
284 sreg.set_field(opkele::sreg_t::field_fullname,"Ann O'Nymus"); 288 sreg.set_field(opkele::sreg_t::field_fullname,"Ann O'Nymus");
285 sreg.set_field(opkele::sreg_t::field_gender,"F"); 289 sreg.set_field(opkele::sreg_t::field_gender,"F");
286 sreg.setup_response(); 290 sreg.setup_response();
287 cout << 291 cout <<
288 "Status: 302 Going back to RP with id_res\n" 292 "Status: 302 Going back to RP with id_res\n"
289 "Location: " << OP.id_res(om,sreg).append_query(OP.get_return_to()) 293 "Location: " << OP.id_res(om,sreg).append_query(OP.get_return_to())
290 << "\n\n"; 294 << "\n\n";
291 }else{ 295 }else{
292 cout << 296 cout <<
293 "Status: 302 Going back to RP with cancel\n" 297 "Status: 302 Going back to RP with cancel\n"
294 "Location: " << OP.cancel(om).append_query(OP.get_return_to()) 298 "Location: " << OP.cancel(om).append_query(OP.get_return_to())
295 << "\n\n"; 299 << "\n\n";
296 } 300 }
297 om.to_keyvalues(clog); 301 om.to_keyvalues(clog);
298 }else if(omode=="associate") { 302 }else if(omode=="associate") {
299 kingate_openid_message_t inm(gw); 303 kingate_openid_message_t inm(gw);
300 opkele::openid_message_t oum; 304 opkele::openid_message_t oum;
301 example_op_t OP(gw); 305 example_op_t OP(gw);
302 OP.associate(oum,inm); 306 OP.associate(oum,inm);
303 cout << "Content-type: text/plain\n\n"; 307 cout << "Content-type: text/plain\n\n";
304 oum.to_keyvalues(cout); 308 oum.to_keyvalues(cout);
305 }else if(omode=="checkid_setup") { 309 }else if(omode=="checkid_setup") {
306 kingate_openid_message_t inm(gw); 310 kingate_openid_message_t inm(gw);
307 example_op_t OP(gw); 311 example_op_t OP(gw);
308 OP.checkid_(inm,0); 312 OP.checkid_(inm,0);
309 OP.cookie_header(cout) << 313 OP.cookie_header(cout) <<
310 "Content-type: text/html\n" 314 "Content-type: text/html\n"
311 "\n" 315 "\n"
312 316
313 "<html>" 317 "<html>"
314 "<head>" 318 "<head>"
315 "<title>test OP: confirm authentication</title>" 319 "<title>test OP: confirm authentication</title>"
316 "</head>" 320 "</head>"
317 "<body>" 321 "<body>"
318 "realm: " << OP.get_realm() << "<br/>" 322 "realm: " << OP.get_realm() << "<br/>"
319 "return_to: " << OP.get_return_to() << "<br/>" 323 "return_to: " << OP.get_return_to() << "<br/>"
320 "claimed_id: " << OP.get_claimed_id() << "<br/>" 324 "claimed_id: " << OP.get_claimed_id() << "<br/>"
321 "identity: " << OP.get_identity() << "<br/>"; 325 "identity: " << OP.get_identity() << "<br/>";
322 if(OP.is_id_select()) { 326 if(OP.is_id_select()) {
323 OP.select_identity( get_self_url(gw), get_self_url(gw) ); 327 OP.select_identity( get_self_url(gw), get_self_url(gw) );
324 cout << 328 cout <<
325 "selected claimed_id: " << OP.get_claimed_id() << "<br/>" 329 "selected claimed_id: " << OP.get_claimed_id() << "<br/>"
326 "selected identity: " << OP.get_identity() << "<br/>"; 330 "selected identity: " << OP.get_identity() << "<br/>";
327 } 331 }
328 cout << 332 cout <<
329 "<form method='post'>"; 333 "<form method='post'>";
330 inm.to_htmlhiddens(cout); 334 inm.to_htmlhiddens(cout);
331 cout << 335 cout <<
332 "<input type='hidden' name='hts_id'" 336 "<input type='hidden' name='hts_id'"
333 " value='" << opkele::util::attr_escape(OP.htc.get_value()) << "'/>" 337 " value='" << opkele::util::attr_escape(OP.htc.get_value()) << "'/>"
334 "<input type='submit' name='op' value='id_res'/>" 338 "<input type='submit' name='op' value='id_res'/>"
335 "<input type='submit' name='op' value='cancel'/>" 339 "<input type='submit' name='op' value='cancel'/>"
336 "</form>" 340 "</form>"
337 "</body>" 341 "</body>"
338 "</html>"; 342 "</html>";
339 }else if(omode=="check_authentication") { 343 }else if(omode=="check_authentication") {
340 kingate_openid_message_t inm(gw); 344 kingate_openid_message_t inm(gw);
341 example_op_t OP(gw); 345 example_op_t OP(gw);
342 opkele::openid_message_t oum; 346 opkele::openid_message_t oum;
343 OP.check_authentication(oum,inm); 347 OP.check_authentication(oum,inm);
344 cout << "Content-type: text/plain\n\n"; 348 cout << "Content-type: text/plain\n\n";
345 oum.to_keyvalues(cout); 349 oum.to_keyvalues(cout);
346 oum.to_keyvalues(clog); 350 oum.to_keyvalues(clog);
347 }else{ 351 }else{
348 example_op_t OP(gw); 352 example_op_t OP(gw);
349 string idsel; 353 string idsel;
350 if(gw.has_param("idsel")) 354 if(gw.has_param("idsel"))
351 idsel = "&idsel=idsel"; 355 idsel = "&idsel=idsel";
352 OP.cookie_header(cout) << 356 OP.cookie_header(cout) <<
353 "Content-type: text/html\n" 357 "Content-type: text/html\n"
354 "X-XRDS-Location: " << get_self_url(gw) << "?op=xrds" << idsel << "\n" 358 "X-XRDS-Location: " << get_self_url(gw) << "?op=xrds" << idsel << "\n"
355 "\n" 359 "\n"
356 360
357 "<html>" 361 "<html>"
358 "<head>" 362 "<head>"
359 "<title>test OP</title>" 363 "<title>test OP</title>"
360 "<link rel='openid.server' href='" << get_self_url(gw) << "'/>" 364 "<link rel='openid.server' href='" << get_self_url(gw) << "'/>"
361 "</head>" 365 "</head>"
362 "<body>" 366 "<body>"
363 "test openid 2.0 endpoint" 367 "test openid 2.0 endpoint"
364 "<br/>" 368 "<br/>"
365 "<a href='" << get_self_url(gw) << "?op=xrds" << idsel << "'>XRDS document</a>" 369 "<a href='" << get_self_url(gw) << "?op=xrds" << idsel << "'>XRDS document</a>"
366 "<br/>" 370 "<br/>"
367 "<h1>" << message << "</h1>"; 371 "<h1>" << message << "</h1>";
368 sqlite3_mem_t<char*> 372 sqlite3_mem_t<char*>
369 S = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1"); 373 S = sqlite3_mprintf("SELECT s_password FROM setup LIMIT 1");
370 sqlite3_table_t T; int nr,nc; 374 sqlite3_table_t T; int nr,nc;
371 OP.db.get_table(S,T,&nr,&nc); 375 OP.db.get_table(S,T,&nr,&nc);
372 if(nr<1) { 376 if(nr<1) {
373 cout << 377 cout <<
374 "<form method='post'>" 378 "<form method='post'>"
375 "set password " 379 "set password "
376 "<input type='hidden' name='op' value='set_password'/>" 380 "<input type='hidden' name='op' value='set_password'/>"
377 "<input type='password' name='password' value=''/>" 381 "<input type='password' name='password' value=''/>"
378 "<input type='submit' name='submit' value='submit'/>" 382 "<input type='submit' name='submit' value='submit'/>"
379 "</form>"; 383 "</form>";
380 }else if(OP.get_authorized()) { 384 }else if(OP.get_authorized()) {
381 cout << 385 cout <<
382 "<br/>" 386 "<br/>"
383 "<a href='" << get_self_url(gw) << "?op=logout'>logout</a>"; 387 "<a href='" << get_self_url(gw) << "?op=logout'>logout</a>";
384 }else{ 388 }else{
385 cout << 389 cout <<
386 "<form method='post'>" 390 "<form method='post'>"
387 "login " 391 "login "
388 "<input type='hidden' name='op' value='login'/>" 392 "<input type='hidden' name='op' value='login'/>"
389 "<input type='password' name='password' value=''/>" 393 "<input type='password' name='password' value=''/>"
390 "<input type='submit' name='submit' value='submit'/>" 394 "<input type='submit' name='submit' value='submit'/>"
391 "</form>"; 395 "</form>";
392 } 396 }
393 cout << "</body>"; 397 cout << "</body>";
394 } 398 }
395#ifdef OPKELE_HAVE_KONFORKA 399#ifdef OPKELE_HAVE_KONFORKA
396 }catch(konforka::exception& e) { 400 }catch(konforka::exception& e) {
397#else 401#else
398 }catch(std::exception& e){ 402 }catch(std::exception& e){
399#endif 403#endif
400 DOUT_("Oops: " << e.what()); 404 DOUT_("Oops: " << e.what());
401 cout << "Content-Type: text/plain\n\n" 405 cout << "Content-Type: text/plain\n\n"
402 "Exception:\n" 406 "Exception:\n"