Moodle authentication plugin for Macaroons

auth.php 8.6KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. <?php
  2. // This file is part of Moodle - http://moodle.org/
  3. //
  4. // Moodle is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // Moodle is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU General Public License
  15. // along with Moodle. If not, see <http://www.gnu.org/licenses/>.
  16. /**
  17. * Authentication plugin: Macaroons
  18. *
  19. * Macaroons: Cookies with Contextual Caveats for Decentralized Authorization
  20. *
  21. * @package auth_macaroons
  22. * @author Brendan Abolivier
  23. * @license http://www.gnu.org/copyleft/gpl.html GNU Public License
  24. */
  25. defined('MOODLE_INTERNAL') || die();
  26. require_once($CFG->libdir.'/authlib.php');
  27. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Macaroon.php');
  28. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Caveat.php');
  29. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Packet.php');
  30. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Utils.php');
  31. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Verifier.php');
  32. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/CaveatUnsatisfiedException.php');
  33. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/InvalidMacaroonKeyException.php');
  34. require_once($CFG->dirroot.'/auth/macaroons/Macaroons/Exceptions/SignatureMismatchException.php');
  35. use Macaroons\Macaroon;
  36. use Macaroons\Verifier;
  37. /**
  38. * Plugin for no authentication.
  39. */
  40. class auth_plugin_macaroons extends auth_plugin_base {
  41. /*
  42. * The name of the component. Used by the configuration.
  43. */
  44. const COMPONENT_NAME = 'auth_macaroons';
  45. /**
  46. * Constructor.
  47. */
  48. public function __construct() {
  49. $this->authtype = 'macaroons';
  50. $this->config = get_config(self::COMPONENT_NAME);
  51. }
  52. /**
  53. * Old syntax of class constructor. Deprecated in PHP7.
  54. *
  55. * @deprecated since Moodle 3.1
  56. */
  57. public function auth_plugin_macaroons() {
  58. debugging('Use of class name as constructor is deprecated', DEBUG_DEVELOPER);
  59. self::__construct();
  60. }
  61. /* Login page hook
  62. *
  63. * Called before displaying the login form, is used to authenticate the user
  64. * and bypass the form.
  65. */
  66. function loginpage_hook() {
  67. global $DB, $login, $CFG;
  68. $placeholders[0] = "/{{firstname}}/";
  69. $placeholders[1] = "/{{lastname}}/";
  70. if(!empty($_COOKIE[$this->config->cookie_name])) {
  71. try {
  72. $m = Macaroon::deserialize($_COOKIE[$this->config->cookie_name]);
  73. $callbacks = array();
  74. if(!empty($this->config->caveat1_condition)) {
  75. array_push($callbacks, function($a) {
  76. return !strcmp($a, $this->config->caveat1_condition);
  77. });
  78. }
  79. if(!empty($this->config->caveat2_condition)) {
  80. array_push($callbacks, function($a) {
  81. return !strcmp($a, $this->config->caveat2_condition);
  82. });
  83. }
  84. if(!empty($this->config->caveat3_condition)) {
  85. array_push($callbacks, function($a) {
  86. return !strcmp($a, $this->config->caveat3_condition);
  87. });
  88. }
  89. $v = new Verifier();
  90. $v->setCallbacks($callbacks);
  91. if($v->verify($m, $this->config->secret)) {
  92. $identifier = explode(";", $m->getIdentifier());
  93. $parsed_id = $this->parse_identifier($identifier);
  94. if(empty($parsed_id["username"])) {
  95. $login = $parsed_id["firstname"].$parsed_id["lastname"];
  96. } else {
  97. $login = $parsed_id["username"];
  98. }
  99. $user = authenticate_user_login($login, null);
  100. if($user) {
  101. if(!empty($parsed_id["firstname"])) {
  102. $user->firstname = $parsed_id["firstname"];
  103. }
  104. if(!empty($parsed_id["lastname"])) {
  105. $user->lastname = $parsed_id["lastname"];
  106. }
  107. $user->email = preg_replace($placeholders, [
  108. $parsed_id["firstname"],
  109. $parsed_id["lastname"]
  110. ], $this->config->email_config);
  111. $DB->update_record('user', $user);
  112. var_dump($user);
  113. complete_user_login($user);
  114. redirect($CFG->wwwroot);
  115. }
  116. }
  117. } catch(Exception $e) {
  118. $message = $e->getMessage();
  119. }
  120. }
  121. }
  122. /*
  123. * Parses the macaroon identifier based on the user's config
  124. *
  125. * @param array $identifier The macaroon identifier split based on the separator
  126. * @return array A map linking a field with an user value
  127. */
  128. function parse_identifier($identifier) {
  129. $placeholders = explode(";", $this->config->identifier_format);
  130. $parsed_id = array();
  131. // Check if the identifier has the same number of fields as configured
  132. if(sizeof($placeholders) != sizeof($identifier)) {
  133. // Returning an empty array as the return value is expected to be
  134. // an array
  135. return $parsed_id;
  136. }
  137. if(is_numeric($index = array_search("{{username}}", $placeholders))) {
  138. $parsed_id["username"] = $identifier[$index];
  139. }
  140. if(is_numeric($index = array_search("{{firstname}}", $placeholders))) {
  141. $parsed_id["firstname"] = $identifier[$index];
  142. }
  143. if(is_numeric($index = array_search("{{lastname}}", $placeholders))) {
  144. $parsed_id["lastname"] = $identifier[$index];
  145. }
  146. return $parsed_id;
  147. }
  148. /**
  149. * Returns true if the username and password work or don't exist and false
  150. * if the user exists and the password is wrong.
  151. *
  152. * @param string $username The username
  153. * @param string $password The password
  154. * @return bool Authentication success or failure.
  155. */
  156. function user_login ($username, $password) {
  157. global $login;
  158. if($login == $username) {
  159. return true;
  160. }
  161. return false;
  162. }
  163. /**
  164. * Updates the user's password.
  165. *
  166. * called when the user password is updated.
  167. *
  168. * @param object $user User table object
  169. * @param string $newpassword Plaintext password
  170. * @return boolean result
  171. *
  172. */
  173. function user_update_password($user, $newpassword) {
  174. $user = get_complete_user_data('id', $user->id);
  175. // This will also update the stored hash to the latest algorithm
  176. // if the existing hash is using an out-of-date algorithm (or the
  177. // legacy md5 algorithm).
  178. return update_internal_user_password($user, $newpassword);
  179. }
  180. function prevent_local_passwords() {
  181. return false;
  182. }
  183. /**
  184. * Returns true if this authentication plugin is 'internal'.
  185. *
  186. * @return bool
  187. */
  188. function is_internal() {
  189. return false;
  190. }
  191. /**
  192. * Returns true if this authentication plugin can change the user's
  193. * password.
  194. *
  195. * @return bool
  196. */
  197. function can_change_password() {
  198. return true;
  199. }
  200. /**
  201. * Returns the URL for changing the user's pw, or empty if the default can
  202. * be used.
  203. *
  204. * @return moodle_url
  205. */
  206. function change_password_url() {
  207. return null;
  208. }
  209. /**
  210. * Returns true if plugin allows resetting of internal password.
  211. *
  212. * @return bool
  213. */
  214. function can_reset_password() {
  215. return true;
  216. }
  217. /**
  218. * Returns true if plugin can be manually set.
  219. *
  220. * @return bool
  221. */
  222. function can_be_manually_set() {
  223. return true;
  224. }
  225. /**
  226. * Prints a form for configuring this authentication plugin.
  227. *
  228. * This function is called from admin/auth.php, and outputs a full page with
  229. * a form for configuring this plugin.
  230. *
  231. * @param array $page An object containing all the data for this page.
  232. */
  233. function config_form($config, $err, $user_fields) {
  234. include "config.html";
  235. }
  236. /**
  237. * Processes and stores configuration data for this authentication plugin.
  238. */
  239. function process_config($config) {
  240. if(!isset($config->cookie_name)) {
  241. $config->cookie_name = 'das-macaroon';
  242. }
  243. if(!isset($config->secret)) {
  244. $config->secret = 'pocsecret';
  245. }
  246. if(!isset($config->identifier_format)) {
  247. $config->identifier_format = '{{firstname}};{{lastname}}';
  248. }
  249. if(!isset($config->email_config)) {
  250. $config->email_config = '{{firstname}}.{{lastname}}@company.tld';
  251. }
  252. // Caveats
  253. if(!isset($config->caveat1_condition)) {
  254. $config->caveat1_condition = '';
  255. }
  256. if(!isset($config->caveat2_condition)) {
  257. $config->caveat2_condition = '';
  258. }
  259. if(!isset($config->caveat3_condition)) {
  260. $config->caveat3_condition = '';
  261. }
  262. set_config('cookie_name', $config->cookie_name, self::COMPONENT_NAME);
  263. set_config('secret', $config->secret, self::COMPONENT_NAME);
  264. set_config('identifier_format', $config->identifier_format, self::COMPONENT_NAME);
  265. set_config('email_config', $config->email_config, self::COMPONENT_NAME);
  266. // Caveats
  267. set_config('caveat1_condition', $config->caveat1_condition, self::COMPONENT_NAME);
  268. set_config('caveat2_condition', $config->caveat2_condition, self::COMPONENT_NAME);
  269. set_config('caveat3_condition', $config->caveat3_condition, self::COMPONENT_NAME);
  270. return true;
  271. }
  272. function is_synchronised_with_external() {
  273. return false;
  274. }
  275. }