Commit | Line | Data |
1763fe29 |
1 | package Catalyst::Plugin::RequireSSL; |
2 | |
3 | use strict; |
4 | use base qw/Class::Accessor::Fast/; |
5 | use NEXT; |
6 | |
ffd9355f |
7 | our $VERSION = '0.07'; |
1763fe29 |
8 | |
c4744895 |
9 | __PACKAGE__->mk_accessors( qw/_require_ssl _allow_ssl _ssl_strip_output/ ); |
eeefd598 |
10 | |
11 | sub require_ssl { |
12 | my $c = shift; |
13 | |
14 | $c->_require_ssl(1); |
15 | |
16 | if ( !$c->req->secure && $c->req->method ne "POST" ) { |
17 | my $redir = $c->_redirect_uri('https'); |
18 | if ( $c->config->{require_ssl}->{disabled} ) { |
19 | $c->log->warn( "RequireSSL: Would have redirected to $redir" ); |
20 | } |
21 | else { |
4585dfb1 |
22 | $c->_ssl_strip_output(1); |
eeefd598 |
23 | $c->res->redirect( $redir ); |
794abe2a |
24 | $c->detach if $c->config->{require_ssl}->{detach_on_redirect}; |
eeefd598 |
25 | } |
26 | } |
27 | } |
28 | |
c4744895 |
29 | sub allow_ssl { |
30 | my $c = shift; |
31 | |
32 | $c->_allow_ssl(1); |
33 | } |
34 | |
eeefd598 |
35 | sub finalize { |
36 | my $c = shift; |
37 | |
38 | # Do not redirect static files (only works with Static::Simple) |
39 | if ( $c->isa( "Catalyst::Plugin::Static::Simple" ) ) { |
40 | return $c->NEXT::finalize(@_) if $c->_static_file; |
41 | } |
42 | |
43 | # redirect back to non-SSL mode |
44 | REDIRECT: |
45 | { |
46 | # No redirect if: |
47 | # we're not in SSL mode |
48 | last REDIRECT if !$c->req->secure; |
49 | # it's a POST request |
50 | last REDIRECT if $c->req->method eq "POST"; |
51 | # we're already required to be in SSL for this request |
52 | last REDIRECT if $c->_require_ssl; |
53 | # or the user doesn't want us to redirect |
c4744895 |
54 | last REDIRECT if $c->config->{require_ssl}->{remain_in_ssl} || $c->_allow_ssl; |
eeefd598 |
55 | |
56 | $c->res->redirect( $c->_redirect_uri('http') ); |
57 | } |
58 | |
4585dfb1 |
59 | # do not allow any output to be displayed on the insecure page |
60 | if ( $c->_ssl_strip_output ) { |
cc4f2717 |
61 | $c->res->body( '' ); |
4585dfb1 |
62 | } |
63 | |
eeefd598 |
64 | return $c->NEXT::finalize(@_); |
65 | } |
66 | |
67 | sub setup { |
68 | my $c = shift; |
69 | |
70 | $c->NEXT::setup(@_); |
71 | |
72 | # disable the plugin when running under certain engines which don't |
73 | # support SSL |
cae2ad7f |
74 | if ( $c->engine =~ /Catalyst::Engine::HTTP/ ) { |
eeefd598 |
75 | $c->config->{require_ssl}->{disabled} = 1; |
76 | $c->log->warn( "RequireSSL: Disabling SSL redirection while running " |
77 | . "under " . $c->engine ); |
78 | } |
79 | } |
80 | |
81 | sub _redirect_uri { |
82 | my ( $c, $type ) = @_; |
83 | |
eeefd598 |
84 | if ( !$c->config->{require_ssl}->{$type} ) { |
61b31739 |
85 | my $req_uri = $c->req->uri; |
86 | $c->config->{require_ssl}->{$type} = |
87 | join(':', $req_uri->host, $req_uri->_port); |
eeefd598 |
88 | } |
89 | |
61b31739 |
90 | $c->config->{require_ssl}->{$type} =~ s/\/+$//; |
91 | |
92 | my $redir = $c->req->uri->clone; |
93 | $redir->scheme($type); |
94 | $redir->host_port($c->config->{require_ssl}->{$type}); |
eeefd598 |
95 | |
b0b7bb46 |
96 | if ( $c->config->{require_ssl}->{no_cache} ) { |
ffd9355f |
97 | delete $c->config->{require_ssl}->{$type}; |
98 | } |
99 | |
eeefd598 |
100 | return $redir; |
101 | } |
102 | |
103 | 1; |
104 | __END__ |
1763fe29 |
105 | |
106 | =head1 NAME |
107 | |
108 | Catalyst::Plugin::RequireSSL - Force SSL mode on select pages |
109 | |
110 | =head1 SYNOPSIS |
111 | |
eeefd598 |
112 | # in MyApp.pm |
113 | use Catalyst; |
114 | MyApp->setup( qw/RequireSSL/ ); |
1763fe29 |
115 | |
116 | MyApp->config->{require_ssl} = { |
117 | https => 'secure.mydomain.com', |
118 | http => 'www.mydomain.com', |
119 | remain_in_ssl => 0, |
ffd9355f |
120 | no_cache => 0, |
794abe2a |
121 | detach_on_redirect => 1, |
1763fe29 |
122 | }; |
123 | |
eeefd598 |
124 | # in any controller methods that should be secured |
1763fe29 |
125 | $c->require_ssl; |
126 | |
127 | =head1 DESCRIPTION |
128 | |
eeefd598 |
129 | Use this plugin if you wish to selectively force SSL mode on some of your web |
130 | pages, for example a user login form or shopping cart. |
1763fe29 |
131 | |
eeefd598 |
132 | Simply place $c->require_ssl calls in any controller method you wish to be |
133 | secured. |
1763fe29 |
134 | |
eeefd598 |
135 | This plugin will automatically disable itself if you are running under the |
136 | standalone HTTP::Daemon Catalyst server. A warning message will be printed to |
137 | the log file whenever an SSL redirect would have occurred. |
1763fe29 |
138 | |
139 | =head1 WARNINGS |
140 | |
eeefd598 |
141 | If you utilize different servers or hostnames for non-SSL and SSL requests, |
142 | and you rely on a session cookie to determine redirection (i.e for a login |
143 | page), your cookie must be visible to both servers. For more information, see |
144 | the documentation for the Session plugin you are using. |
1763fe29 |
145 | |
146 | =head1 CONFIGURATION |
147 | |
148 | Configuration is optional. You may define the following configuration values: |
149 | |
150 | https => $ssl_host |
151 | |
152 | If your SSL domain name is different from your non-SSL domain, set this value. |
153 | |
154 | http => $non_ssl_host |
155 | |
eeefd598 |
156 | If you have set the https value above, you must also set the hostname of your |
157 | non-SSL server. |
1763fe29 |
158 | |
159 | remain_in_ssl |
160 | |
eeefd598 |
161 | If you'd like your users to remain in SSL mode after visiting an SSL-required |
162 | page, you can set this option to 1. By default, this option is disabled and |
163 | users will be redirected back to non-SSL mode as soon as possible. |
1763fe29 |
164 | |
ffd9355f |
165 | no_cache |
11f9b043 |
166 | |
167 | If you have a wildcard certificate you will need to set this option if you are |
51ef6cb3 |
168 | using multiple domains on one instance of Catalyst. |
11f9b043 |
169 | |
794abe2a |
170 | detach_on_redirect |
171 | |
172 | By default C<< $c->require_ssl >> only calls C<< $c->response->redirect >> but |
173 | does not stop request processing (so it returns and subsequent statements are |
174 | run). This is probably not what you want. If you set this option to a true |
175 | value C<< $c->require_ssl >> will call C<< $c->detach >> when it redirects. |
176 | |
eeefd598 |
177 | =head1 METHODS |
1763fe29 |
178 | |
eeefd598 |
179 | =head2 require_ssl |
1763fe29 |
180 | |
181 | Call require_ssl in any controller method you wish to be secured. |
182 | |
183 | $c->require_ssl; |
184 | |
eeefd598 |
185 | The browser will be redirected to the same path on your SSL server. POST |
186 | requests are never redirected. |
1763fe29 |
187 | |
c4744895 |
188 | =head2 allow_ssl |
189 | |
190 | Call allow_ssl in any controller method you wish to access both in SSL and |
191 | non-SSL mode. |
192 | |
193 | $c->allow_ssl; |
194 | |
195 | The browser will not be redirected, independently of whether the request was |
196 | made to the SSL or non-SSL server. |
197 | |
ffd9355f |
198 | =head2 setup |
199 | |
200 | Disables this plugin if running under an engine which does not support SSL. |
201 | |
202 | =head2 finalize |
203 | |
204 | Performs the redirect to SSL url if required. |
205 | |
1763fe29 |
206 | =head1 KNOWN ISSUES |
207 | |
eeefd598 |
208 | When viewing an SSL-required page that uses static files served from the |
209 | Static plugin, the static files are redirected to the non-SSL path. |
1763fe29 |
210 | |
eeefd598 |
211 | In order to get the correct behaviour where static files are not redirected, |
212 | you should use the Static::Simple plugin or always serve static files |
213 | directly from your web server. |
1763fe29 |
214 | |
215 | =head1 SEE ALSO |
216 | |
eeefd598 |
217 | L<Catalyst>, L<Catalyst::Plugin::Static::Simple> |
1763fe29 |
218 | |
219 | =head1 AUTHOR |
220 | |
eeefd598 |
221 | Andy Grundman, <andy@hybridized.org> |
1763fe29 |
222 | |
11f9b043 |
223 | =head1 CONTRIBUTORS |
224 | |
225 | Simon Elliott <simon@browsing.co.uk> (support for wildcards) |
226 | |
1763fe29 |
227 | =head1 COPYRIGHT |
228 | |
229 | This program is free software, you can redistribute it and/or modify it under |
230 | the same terms as Perl itself. |
231 | |
232 | =cut |