Search in sources :

Example 1 with SRegResponse

use of org.openid4java.message.sreg.SRegResponse in project ratpack by ratpack.

the class PatchedSampleServer method processRequest.

public String processRequest(HttpServletRequest httpReq, HttpServletResponse httpResp) throws Exception {
    // extract the parameters from the request
    ParameterList request = new ParameterList(httpReq.getParameterMap());
    String mode = request.hasParameter("openid.mode") ? request.getParameterValue("openid.mode") : null;
    Message response;
    String responseText;
    if ("associate".equals(mode)) {
        // --- process an association request ---
        response = manager.associationResponse(request);
        responseText = response.keyValueFormEncoding();
    } else if ("checkid_setup".equals(mode) || "checkid_immediate".equals(mode)) {
        // interact with the user and obtain data needed to continue
        List<?> userData = userInteraction(request);
        String userSelectedClaimedId = (String) userData.get(0);
        Boolean authenticatedAndApproved = (Boolean) userData.get(1);
        String email = (String) userData.get(2);
        // --- process an authentication request ---
        AuthRequest authReq = AuthRequest.createAuthRequest(request, manager.getRealmVerifier());
        // Sign after we added extensions.
        response = manager.authResponse(request, null, userSelectedClaimedId, authenticatedAndApproved, false);
        if (response instanceof DirectError) {
            return directResponse(httpResp, response.keyValueFormEncoding());
        } else {
            if (authReq.hasExtension(AxMessage.OPENID_NS_AX)) {
                MessageExtension ext = authReq.getExtension(AxMessage.OPENID_NS_AX);
                if (ext instanceof FetchRequest) {
                    FetchRequest fetchReq = (FetchRequest) ext;
                    Map<?, ?> required = fetchReq.getAttributes(true);
                    //Map optional = fetchReq.getAttributes(false);
                    if (required.containsKey("email")) {
                        Map<Object, Object> userDataExt = new HashMap<>();
                        //userDataExt.put("email", userData.get(3));
                        FetchResponse fetchResp = FetchResponse.createFetchResponse(fetchReq, userDataExt);
                        // (alternatively) manually add attribute values
                        fetchResp.addAttribute("email", "http://schema.openid.net/contact/email", email);
                        response.addExtension(fetchResp);
                    }
                } else {
                    throw new UnsupportedOperationException("TODO");
                }
            }
            if (authReq.hasExtension(SRegMessage.OPENID_NS_SREG)) {
                MessageExtension ext = authReq.getExtension(SRegMessage.OPENID_NS_SREG);
                if (ext instanceof SRegRequest) {
                    SRegRequest sregReq = (SRegRequest) ext;
                    List<?> required = sregReq.getAttributes(true);
                    //List optional = sregReq.getAttributes(false);
                    if (required.contains("email")) {
                        // data released by the user
                        Map<Object, Object> userDataSReg = new HashMap<>();
                        //userData.put("email", "user@example.com");
                        SRegResponse sregResp = SRegResponse.createSRegResponse(sregReq, userDataSReg);
                        // (alternatively) manually add attribute values
                        sregResp.addAttribute("email", email);
                        response.addExtension(sregResp);
                    }
                } else {
                    throw new UnsupportedOperationException("TODO");
                }
            }
            // Sign the auth success message.
            if (response instanceof AuthSuccess) {
                manager.sign((AuthSuccess) response);
            }
            // option1: GET HTTP-redirect to the return_to URL
            return response.getDestinationUrl(true);
        // option2: HTML FORM Redirection
        //RequestDispatcher dispatcher =
        //        getServletContext().getRequestDispatcher("formredirection.jsp");
        //httpReq.setAttribute("prameterMap", response.getParameterMap());
        //httpReq.setAttribute("destinationUrl", response.getDestinationUrl(false));
        //dispatcher.forward(request, response);
        //return null;
        }
    } else if ("check_authentication".equals(mode)) {
        // --- processing a verification request ---
        response = manager.verify(request);
        responseText = response.keyValueFormEncoding();
    } else {
        // --- error response ---
        response = DirectError.createDirectError("Unknown request");
        responseText = response.keyValueFormEncoding();
    }
    // return the result to the user
    return responseText;
}
Also used : SRegRequest(org.openid4java.message.sreg.SRegRequest) AxMessage(org.openid4java.message.ax.AxMessage) SRegMessage(org.openid4java.message.sreg.SRegMessage) FetchResponse(org.openid4java.message.ax.FetchResponse) SRegResponse(org.openid4java.message.sreg.SRegResponse) FetchRequest(org.openid4java.message.ax.FetchRequest) List(java.util.List) HashMap(java.util.HashMap) Map(java.util.Map)

Example 2 with SRegResponse

use of org.openid4java.message.sreg.SRegResponse in project gerrit by GerritCodeReview.

the class OpenIdServiceImpl method doAuth.

/** Called by {@link OpenIdLoginServlet} doGet, doPost */
void doAuth(final HttpServletRequest req, final HttpServletResponse rsp) throws Exception {
    if (OMODE_CANCEL.equals(req.getParameter(OPENID_MODE))) {
        cancel(req, rsp);
        return;
    }
    // Process the authentication response.
    //
    final SignInMode mode = signInMode(req);
    final String openidIdentifier = req.getParameter("openid.identity");
    final String claimedIdentifier = req.getParameter(P_CLAIMED);
    final String returnToken = req.getParameter(P_TOKEN);
    final boolean remember = "1".equals(req.getParameter(P_REMEMBER));
    final String rediscoverIdentifier = claimedIdentifier != null ? claimedIdentifier : openidIdentifier;
    final State state;
    if (!isAllowedOpenID(rediscoverIdentifier) || !isAllowedOpenID(openidIdentifier) || (claimedIdentifier != null && !isAllowedOpenID(claimedIdentifier))) {
        cancelWithError(req, rsp, "Provider not allowed");
        return;
    }
    state = init(req, rediscoverIdentifier, mode, remember, returnToken);
    if (state == null) {
        // Re-discovery must have failed, we can't run a login.
        //
        cancel(req, rsp);
        return;
    }
    final String returnTo = req.getParameter("openid.return_to");
    if (returnTo != null && returnTo.contains("openid.rpnonce=")) {
        // Some providers (claimid.com) seem to embed these request
        // parameters into our return_to URL, and then give us them
        // in the return_to request parameter. But not all.
        //
        state.retTo.put("openid.rpnonce", req.getParameter("openid.rpnonce"));
        state.retTo.put("openid.rpsig", req.getParameter("openid.rpsig"));
    }
    final VerificationResult result = manager.verify(state.retTo.toString(), new ParameterList(req.getParameterMap()), state.discovered);
    if (result.getVerifiedId() == null) /* authentication failure */
    {
        if ("Nonce verification failed.".equals(result.getStatusMsg())) {
            // We might be suffering from clock skew on this system.
            //
            log.error("OpenID failure: " + result.getStatusMsg() + "  Likely caused by clock skew on this server," + " install/configure NTP.");
            cancelWithError(req, rsp, result.getStatusMsg());
        } else if (result.getStatusMsg() != null) {
            // Authentication failed.
            //
            log.error("OpenID failure: " + result.getStatusMsg());
            cancelWithError(req, rsp, result.getStatusMsg());
        } else {
            // Assume authentication was canceled.
            //
            cancel(req, rsp);
        }
        return;
    }
    final Message authRsp = result.getAuthResponse();
    SRegResponse sregRsp = null;
    FetchResponse fetchRsp = null;
    if (0 <= papeMaxAuthAge) {
        PapeResponse ext;
        boolean unsupported = false;
        try {
            ext = (PapeResponse) authRsp.getExtension(PapeMessage.OPENID_NS_PAPE);
        } catch (MessageException err) {
            // Far too many providers are unable to provide PAPE extensions
            // right now. Instead of blocking all of them log the error and
            // let the authentication complete anyway.
            //
            log.error("Invalid PAPE response " + openidIdentifier + ": " + err);
            unsupported = true;
            ext = null;
        }
        if (!unsupported && ext == null) {
            log.error("No PAPE extension response from " + openidIdentifier);
            cancelWithError(req, rsp, "OpenID provider does not support PAPE.");
            return;
        }
    }
    if (authRsp.hasExtension(SRegMessage.OPENID_NS_SREG)) {
        final MessageExtension ext = authRsp.getExtension(SRegMessage.OPENID_NS_SREG);
        if (ext instanceof SRegResponse) {
            sregRsp = (SRegResponse) ext;
        }
    }
    if (authRsp.hasExtension(AxMessage.OPENID_NS_AX)) {
        final MessageExtension ext = authRsp.getExtension(AxMessage.OPENID_NS_AX);
        if (ext instanceof FetchResponse) {
            fetchRsp = (FetchResponse) ext;
        }
    }
    final com.google.gerrit.server.account.AuthRequest areq = new com.google.gerrit.server.account.AuthRequest(ExternalId.Key.parse(openidIdentifier));
    if (sregRsp != null) {
        areq.setDisplayName(sregRsp.getAttributeValue("fullname"));
        areq.setEmailAddress(sregRsp.getAttributeValue("email"));
    } else if (fetchRsp != null) {
        final String firstName = fetchRsp.getAttributeValue("FirstName");
        final String lastName = fetchRsp.getAttributeValue("LastName");
        final StringBuilder n = new StringBuilder();
        if (firstName != null && firstName.length() > 0) {
            n.append(firstName);
        }
        if (lastName != null && lastName.length() > 0) {
            if (n.length() > 0) {
                n.append(' ');
            }
            n.append(lastName);
        }
        areq.setDisplayName(n.length() > 0 ? n.toString() : null);
        areq.setEmailAddress(fetchRsp.getAttributeValue("Email"));
    }
    if (openIdDomains != null && openIdDomains.size() > 0) {
        // Administrator limited email domains, which can be used for OpenID.
        // Login process will only work if the passed email matches one
        // of these domains.
        //
        final String email = areq.getEmailAddress();
        int emailAtIndex = email.lastIndexOf("@");
        if (emailAtIndex >= 0 && emailAtIndex < email.length() - 1) {
            final String emailDomain = email.substring(emailAtIndex);
            boolean match = false;
            for (String domain : openIdDomains) {
                if (emailDomain.equalsIgnoreCase(domain)) {
                    match = true;
                    break;
                }
            }
            if (!match) {
                log.error("Domain disallowed: " + emailDomain);
                cancelWithError(req, rsp, "Domain disallowed");
                return;
            }
        }
    }
    if (claimedIdentifier != null) {
        // The user used a claimed identity which has delegated to the verified
        // identity we have in our AuthRequest above. We still should have a
        // link between the two, so set one up if not present.
        //
        Optional<Account.Id> claimedId = accountManager.lookup(claimedIdentifier);
        Optional<Account.Id> actualId = accountManager.lookup(areq.getExternalIdKey().get());
        if (claimedId.isPresent() && actualId.isPresent()) {
            if (claimedId.get().equals(actualId.get())) {
            // Both link to the same account, that's what we expected.
            } else {
                // This is (for now) a fatal error. There are two records
                // for what might be the same user.
                //
                log.error("OpenID accounts disagree over user identity:\n" + "  Claimed ID: " + claimedId.get() + " is " + claimedIdentifier + "\n" + "  Delgate ID: " + actualId.get() + " is " + areq.getExternalIdKey());
                cancelWithError(req, rsp, "Contact site administrator");
                return;
            }
        } else if (!claimedId.isPresent() && actualId.isPresent()) {
            // Older account, the actual was already created but the claimed
            // was missing due to a bug in Gerrit. Link the claimed.
            //
            final com.google.gerrit.server.account.AuthRequest linkReq = new com.google.gerrit.server.account.AuthRequest(ExternalId.Key.parse(claimedIdentifier));
            linkReq.setDisplayName(areq.getDisplayName());
            linkReq.setEmailAddress(areq.getEmailAddress());
            accountManager.link(actualId.get(), linkReq);
        } else if (claimedId.isPresent() && !actualId.isPresent()) {
            // Claimed account already exists, but it smells like the user has
            // changed their delegate to point to a different provider. Link
            // the new provider.
            //
            accountManager.link(claimedId.get(), areq);
        } else {
        // Both are null, we are going to create a new account below.
        }
    }
    try {
        final com.google.gerrit.server.account.AuthResult arsp;
        switch(mode) {
            case REGISTER:
            case SIGN_IN:
                arsp = accountManager.authenticate(areq);
                final Cookie lastId = new Cookie(OpenIdUrls.LASTID_COOKIE, "");
                lastId.setPath(req.getContextPath() + "/login/");
                if (remember) {
                    lastId.setValue(rediscoverIdentifier);
                    lastId.setMaxAge(LASTID_AGE);
                } else {
                    lastId.setMaxAge(0);
                }
                rsp.addCookie(lastId);
                webSession.get().login(arsp, remember);
                if (arsp.isNew() && claimedIdentifier != null) {
                    final com.google.gerrit.server.account.AuthRequest linkReq = new com.google.gerrit.server.account.AuthRequest(ExternalId.Key.parse(claimedIdentifier));
                    linkReq.setDisplayName(areq.getDisplayName());
                    linkReq.setEmailAddress(areq.getEmailAddress());
                    accountManager.link(arsp.getAccountId(), linkReq);
                }
                callback(arsp.isNew(), req, rsp);
                break;
            case LINK_IDENTIY:
                {
                    arsp = accountManager.link(identifiedUser.get().getAccountId(), areq);
                    webSession.get().login(arsp, remember);
                    callback(false, req, rsp);
                    break;
                }
        }
    } catch (AccountException e) {
        log.error("OpenID authentication failure", e);
        cancelWithError(req, rsp, "Contact site administrator");
    }
}
Also used : AuthRequest(org.openid4java.message.AuthRequest) SRegMessage(org.openid4java.message.sreg.SRegMessage) PapeMessage(org.openid4java.message.pape.PapeMessage) AxMessage(org.openid4java.message.ax.AxMessage) Message(org.openid4java.message.Message) SRegResponse(org.openid4java.message.sreg.SRegResponse) MessageException(org.openid4java.message.MessageException) Cookie(javax.servlet.http.Cookie) FetchResponse(org.openid4java.message.ax.FetchResponse) MessageExtension(org.openid4java.message.MessageExtension) VerificationResult(org.openid4java.consumer.VerificationResult) AccountException(com.google.gerrit.server.account.AccountException) ParameterList(org.openid4java.message.ParameterList) PapeResponse(org.openid4java.message.pape.PapeResponse) ExternalId(com.google.gerrit.server.account.externalids.ExternalId)

Aggregations

AxMessage (org.openid4java.message.ax.AxMessage)2 FetchResponse (org.openid4java.message.ax.FetchResponse)2 SRegMessage (org.openid4java.message.sreg.SRegMessage)2 SRegResponse (org.openid4java.message.sreg.SRegResponse)2 AccountException (com.google.gerrit.server.account.AccountException)1 ExternalId (com.google.gerrit.server.account.externalids.ExternalId)1 HashMap (java.util.HashMap)1 List (java.util.List)1 Map (java.util.Map)1 Cookie (javax.servlet.http.Cookie)1 VerificationResult (org.openid4java.consumer.VerificationResult)1 AuthRequest (org.openid4java.message.AuthRequest)1 Message (org.openid4java.message.Message)1 MessageException (org.openid4java.message.MessageException)1 MessageExtension (org.openid4java.message.MessageExtension)1 ParameterList (org.openid4java.message.ParameterList)1 FetchRequest (org.openid4java.message.ax.FetchRequest)1 PapeMessage (org.openid4java.message.pape.PapeMessage)1 PapeResponse (org.openid4java.message.pape.PapeResponse)1 SRegRequest (org.openid4java.message.sreg.SRegRequest)1