Moodle authentication plugin for Macaroons

auth.php 8.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. <?php
  2. // This file is part of Moodle - http://moodle.org/
  3. //
  4. // Moodle is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // Moodle is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU General Public License
  15. // along with Moodle. If not, see <http://www.gnu.org/licenses/>.
  16. /**
  17. * Authentication plugin: Macaroons
  18. *
  19. * Macaroons: Cookies with Contextual Caveats for Decentralized Authorization
  20. *
  21. * @package auth_macaroons
  22. * @author Brendan Abolivier
  23. * @license http://www.gnu.org/copyleft/gpl.html GNU Public License
  24. */
  25. defined('MOODLE_INTERNAL') || die();
  26. require_once($CFG->libdir.'/authlib.php');
  27. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Macaroon.php');
  28. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Caveat.php');
  29. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Packet.php');
  30. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Utils.php');
  31. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Verifier.php');
  32. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/CaveatUnsatisfiedException.php');
  33. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/InvalidMacaroonKeyException.php');
  34. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/SignatureMismatchException.php');
  35. use Macaroons\Macaroon;
  36. use Macaroons\Verifier;
  37. /**
  38. * Plugin for no authentication.
  39. */
  40. class auth_plugin_macaroons extends auth_plugin_base {
  41. /*
  42. * The name of the component. Used by the configuration.
  43. */
  44. const COMPONENT_NAME = 'auth_macaroons';
  45. /**
  46. * Constructor.
  47. */
  48. public function __construct() {
  49. $this->authtype = 'macaroons';
  50. $this->config = get_config(self::COMPONENT_NAME);
  51. }
  52. /**
  53. * Old syntax of class constructor. Deprecated in PHP7.
  54. *
  55. * @deprecated since Moodle 3.1
  56. */
  57. public function auth_plugin_macaroons() {
  58. debugging('Use of class name as constructor is deprecated', DEBUG_DEVELOPER);
  59. self::__construct();
  60. }
  61. function loginpage_hook() {
  62. global $DB, $login, $CFG;
  63. $placeholders[0] = "/{{firstname}}/";
  64. $placeholders[1] = "/{{lastname}}/";
  65. if(!empty($_COOKIE[$this->config->cookie_name])) {
  66. try {
  67. $m = Macaroon::deserialize($_COOKIE[$this->config->cookie_name]);
  68. $callbacks = array();
  69. if(!empty($this->config->caveat1_condition)) {
  70. array_push($callbacks, function($a) {
  71. return !strcmp($a, $this->config->caveat1_condition);
  72. });
  73. }
  74. if(!empty($this->config->caveat2_condition)) {
  75. array_push($callbacks, function($a) {
  76. return !strcmp($a, $this->config->caveat2_condition);
  77. });
  78. }
  79. if(!empty($this->config->caveat3_condition)) {
  80. array_push($callbacks, function($a) {
  81. return !strcmp($a, $this->config->caveat3_condition);
  82. });
  83. }
  84. $v = new Verifier();
  85. $v->setCallbacks($callbacks);
  86. if($v->verify($m, $this->config->secret)) {
  87. $identifier = explode(";", $m->getIdentifier());
  88. $parsed_id = $this->parse_identifier($identifier);
  89. if(empty($parsed_id["username"])) {
  90. $login = $parsed_id["firstname"].$parsed_id["lastname"];
  91. } else {
  92. $login = $parsed_id["username"];
  93. }
  94. $user = authenticate_user_login($login, null);
  95. if($user) {
  96. if(!empty($parsed_id["firstname"])) {
  97. $user->firstname = $parsed_id["firstname"];
  98. }
  99. if(!empty($parsed_id["lastname"])) {
  100. $user->lastname = $parsed_id["lastname"];
  101. }
  102. $user->email = preg_replace($placeholders, [
  103. $parsed_id["firstname"],
  104. $parsed_id["lastname"]
  105. ], $this->config->email_config);
  106. $DB->update_record('user', $user);
  107. var_dump($user);
  108. complete_user_login($user);
  109. redirect($CFG->wwwroot);
  110. }
  111. }
  112. } catch(Exception $e) {
  113. $message = $e->getMessage();
  114. }
  115. }
  116. }
  117. function parse_identifier($identifier) {
  118. $placeholders = explode(";", $this->config->identifier_format);
  119. $parsed_id = array();
  120. // Check if the identifier has the same number of fields as configured
  121. if(sizeof($placeholders) != sizeof($identifier)) {
  122. // Returning an empty array as the return value is expected to be
  123. // an array
  124. return $parsed_id;
  125. }
  126. if(is_numeric($index = array_search("{{username}}", $placeholders))) {
  127. $parsed_id["username"] = $identifier[$index];
  128. }
  129. if(is_numeric($index = array_search("{{firstname}}", $placeholders))) {
  130. $parsed_id["firstname"] = $identifier[$index];
  131. }
  132. if(is_numeric($index = array_search("{{lastname}}", $placeholders))) {
  133. $parsed_id["lastname"] = $identifier[$index];
  134. }
  135. return $parsed_id;
  136. }
  137. /**
  138. * Returns true if the username and password work or don't exist and false
  139. * if the user exists and the password is wrong.
  140. *
  141. * @param string $username The username
  142. * @param string $password The password
  143. * @return bool Authentication success or failure.
  144. */
  145. function user_login ($username, $password) {
  146. global $login;
  147. if($login == $username) {
  148. return true;
  149. }
  150. return false;
  151. }
  152. /**
  153. * Updates the user's password.
  154. *
  155. * called when the user password is updated.
  156. *
  157. * @param object $user User table object
  158. * @param string $newpassword Plaintext password
  159. * @return boolean result
  160. *
  161. */
  162. function user_update_password($user, $newpassword) {
  163. $user = get_complete_user_data('id', $user->id);
  164. // This will also update the stored hash to the latest algorithm
  165. // if the existing hash is using an out-of-date algorithm (or the
  166. // legacy md5 algorithm).
  167. return update_internal_user_password($user, $newpassword);
  168. }
  169. function prevent_local_passwords() {
  170. return false;
  171. }
  172. /**
  173. * Returns true if this authentication plugin is 'internal'.
  174. *
  175. * @return bool
  176. */
  177. function is_internal() {
  178. return false;
  179. }
  180. /**
  181. * Returns true if this authentication plugin can change the user's
  182. * password.
  183. *
  184. * @return bool
  185. */
  186. function can_change_password() {
  187. return true;
  188. }
  189. /**
  190. * Returns the URL for changing the user's pw, or empty if the default can
  191. * be used.
  192. *
  193. * @return moodle_url
  194. */
  195. function change_password_url() {
  196. return null;
  197. }
  198. /**
  199. * Returns true if plugin allows resetting of internal password.
  200. *
  201. * @return bool
  202. */
  203. function can_reset_password() {
  204. return true;
  205. }
  206. /**
  207. * Returns true if plugin can be manually set.
  208. *
  209. * @return bool
  210. */
  211. function can_be_manually_set() {
  212. return true;
  213. }
  214. /**
  215. * Prints a form for configuring this authentication plugin.
  216. *
  217. * This function is called from admin/auth.php, and outputs a full page with
  218. * a form for configuring this plugin.
  219. *
  220. * @param array $page An object containing all the data for this page.
  221. */
  222. function config_form($config, $err, $user_fields) {
  223. include "config.html";
  224. }
  225. /**
  226. * Processes and stores configuration data for this authentication plugin.
  227. */
  228. function process_config($config) {
  229. if(!isset($config->cookie_name)) {
  230. $config->cookie_name = 'das-macaroon';
  231. }
  232. if(!isset($config->secret)) {
  233. $config->secret = 'pocsecret';
  234. }
  235. if(!isset($config->identifier_format)) {
  236. $config->identifier_format = '{{firstname}};{{lastname}}';
  237. }
  238. if(!isset($config->email_config)) {
  239. $config->email_config = '{{firstname}}.{{lastname}}@company.tld';
  240. }
  241. // Caveats
  242. if(!isset($config->caveat1_condition)) {
  243. $config->caveat1_condition = '';
  244. }
  245. if(!isset($config->caveat2_condition)) {
  246. $config->caveat2_condition = '';
  247. }
  248. if(!isset($config->caveat3_condition)) {
  249. $config->caveat3_condition = '';
  250. }
  251. set_config('cookie_name', $config->cookie_name, self::COMPONENT_NAME);
  252. set_config('secret', $config->secret, self::COMPONENT_NAME);
  253. set_config('identifier_format', $config->identifier_format, self::COMPONENT_NAME);
  254. set_config('email_config', $config->email_config, self::COMPONENT_NAME);
  255. // Caveats
  256. set_config('caveat1_condition', $config->caveat1_condition, self::COMPONENT_NAME);
  257. set_config('caveat2_condition', $config->caveat2_condition, self::COMPONENT_NAME);
  258. set_config('caveat3_condition', $config->caveat3_condition, self::COMPONENT_NAME);
  259. return true;
  260. }
  261. function is_synchronised_with_external() {
  262. return false;
  263. }
  264. }