|
| 1 | +package MetaCPAN::Server::Controller::Login::OpenID; |
| 2 | + |
| 3 | +use strict; |
| 4 | +use warnings; |
| 5 | + |
| 6 | +use Moose; |
| 7 | +use Net::OpenID::Consumer; |
| 8 | +use LWP::UserAgent::Paranoid; |
| 9 | +use MooseX::ClassAttribute; |
| 10 | + |
| 11 | +BEGIN { extends 'MetaCPAN::Server::Controller::Login' } |
| 12 | + |
| 13 | +class_has '_ua' => ( |
| 14 | + is => 'ro', |
| 15 | + isa => 'LWP::UserAgent::Paranoid', |
| 16 | + lazy => 1, |
| 17 | + builder => '_build_ua', |
| 18 | +); |
| 19 | + |
| 20 | +sub _build_ua { |
| 21 | + LWP::UserAgent::Paranoid->new( |
| 22 | + protocols_allowed => [ 'http', 'https' ], |
| 23 | + request_timeout => 10, |
| 24 | + resolver => Net::DNS::Paranoid->new(), |
| 25 | + ); |
| 26 | +} |
| 27 | + |
| 28 | +has 'sreg' => ( |
| 29 | + is => 'rw', |
| 30 | + isa => 'Str', |
| 31 | + default => 'http://openid.net/extensions/sreg/1.1', |
| 32 | +); |
| 33 | + |
| 34 | +sub index : Path { |
| 35 | + my ( $self, $c ) = @_; |
| 36 | + my $claimed_uri = $c->req->params->{openid_identifier}; |
| 37 | + my $csr = Net::OpenID::Consumer->new( |
| 38 | + ua => $self->_ua, |
| 39 | + required_root => $c->uri_for(q{/}), |
| 40 | + args => $c->req->params, |
| 41 | + consumer_secret => |
| 42 | + $c->config->{'Controller::Login::OpenID'}->{secret_key}, |
| 43 | + assoc_options => [ |
| 44 | + max_encrypt => 1, |
| 45 | + session_no_encrypt_https => 1, |
| 46 | + ], |
| 47 | + ); |
| 48 | + if ($claimed_uri) { |
| 49 | + if ( my $claimed_identity = $csr->claimed_identity("$claimed_uri") ) { |
| 50 | + $claimed_identity->set_extension_args( |
| 51 | + $self->sreg, |
| 52 | + { |
| 53 | + optional => 'email,fullname', |
| 54 | + }, |
| 55 | + ); |
| 56 | + |
| 57 | + my $check_url = $claimed_identity->check_url( |
| 58 | + return_to => $c->uri_for( $self->action_for('index') ), |
| 59 | + trust_root => $c->uri_for(q{/}), |
| 60 | + delayed_return => 1, |
| 61 | + ); |
| 62 | + |
| 63 | + $c->res->redirect($check_url); |
| 64 | + } |
| 65 | + else { |
| 66 | + $c->controller('OAuth2')->redirect( $c, error => $csr->err ); |
| 67 | + } |
| 68 | + } |
| 69 | + |
| 70 | + if ( $c->req->params->{'openid.mode'} ) { |
| 71 | + if ( $csr->setup_needed and my $setup_url = $csr->user_setup_url ) { |
| 72 | + $c->res->redirect($setup_url); |
| 73 | + } |
| 74 | + elsif ( $csr->user_cancel ) { |
| 75 | + $c->controller('OAuth2') |
| 76 | + ->redirect( $c, error => 'access denied' ); |
| 77 | + } |
| 78 | + elsif ( my $vident = $csr->verified_identity ) { |
| 79 | + my $user_data = $vident->signed_extension_fields( $self->sreg ); |
| 80 | + $self->update_user( |
| 81 | + $c, |
| 82 | + openid => $vident->url, |
| 83 | + $user_data, |
| 84 | + ); |
| 85 | + } |
| 86 | + else { |
| 87 | + $c->controller('OAuth2')->redirect( $c, error => $csr->err ); |
| 88 | + } |
| 89 | + } |
| 90 | +} |
| 91 | + |
| 92 | +1; |
0 commit comments