use Digest::MD5 ();
__PACKAGE__->mk_accessors(qw/
- _config
- authorization_required_message
- password_field
- username_field
- type
- realm
- algorithm
+ _config
+ authorization_required_message
+ password_field
+ username_field
+ type
+ realm
+ algorithm
use_uri_for
+ no_unprompted_authorization_required
+ require_ssl
/);
-our $VERSION = '1.013';
+our $VERSION = '1.014';
sub new {
my ($class, $config, $app, $realm) = @_;
-
+
$config->{username_field} ||= 'username';
# _config is shity back-compat with our base class.
my $self = { %$config, _config => $config, _debug => $app->debug ? 1 : 0 };
bless $self, $class;
-
+
$self->realm($realm);
-
+
$self->init;
return $self;
-}
+}
sub init {
my ($self) = @_;
my $type = $self->type || 'any';
-
+
if (!grep /$type/, ('basic', 'digest', 'any')) {
Catalyst::Exception->throw(__PACKAGE__ . " used with unsupported authentication type: " . $type);
}
my ( $self, $c, $realm, $auth_info ) = @_;
my $auth;
+ $self->authentication_failed( $c, $realm, $auth_info )
+ if $self->require_ssl ? $c->req->base->scheme ne 'https' : 0;
+
$auth = $self->authenticate_digest($c, $realm, $auth_info) if $self->_is_http_auth_type('digest');
return $auth if $auth;
$auth = $self->authenticate_basic($c, $realm, $auth_info) if $self->_is_http_auth_type('basic');
return $auth if $auth;
-
- $self->authorization_required_response($c, $realm, $auth_info);
- die $Catalyst::DETACH;
+
+ $self->authentication_failed( $c, $realm, $auth_info );
+}
+
+sub authentication_failed {
+ my ( $self, $c, $realm, $auth_info ) = @_;
+ unless ($self->no_unprompted_authorization_required) {
+ $self->authorization_required_response($c, $realm, $auth_info);
+ die $Catalyst::DETACH;
+ }
}
sub authenticate_basic {
$c->res->content_type('text/plain');
if (exists $self->{authorization_required_message}) {
# If you set the key to undef, don't stamp on the body.
- $c->res->body($self->authorization_required_message)
- if defined $self->authorization_required_message;
+ $c->res->body($self->authorization_required_message)
+ if defined $self->authorization_required_message;
}
else {
$c->res->body('Authorization required.');
sub _create_digest_auth_response {
my ( $self, $c, $opts ) = @_;
-
+
return unless $self->_is_http_auth_type('digest');
-
+
if ( my $digest = $self->_build_digest_auth_header( $c, $opts ) ) {
_add_authentication_header( $c, $digest );
return 1;
sub _create_basic_auth_response {
my ( $self, $c, $opts ) = @_;
-
+
return unless $self->_is_http_auth_type('basic');
if ( my $basic = $self->_build_basic_auth_header( $c, $opts ) ) {
}
sub _build_auth_header_realm {
- my ( $self, $c, $opts ) = @_;
+ my ( $self, $c, $opts ) = @_;
if ( my $realm_name = String::Escape::qprintable($opts->{realm} ? $opts->{realm} : $self->realm->name) ) {
$realm_name = qq{"$realm_name"} unless $realm_name =~ /^"/;
return 'realm=' . $realm_name;
- }
+ }
return;
}
: ( map { URI::Escape::uri_escape($_) } @$domain );
return qq{domain="@uris"};
- }
+ }
return;
}
my $nonce = $self->_digest_auth_nonce($c, $opts);
my $key = __PACKAGE__ . '::opaque:' . $nonce->opaque;
-
+
$self->store_digest_authorization_nonce( $c, $key, $nonce );
return _join_auth_header_parts( Digest =>
my $nonce = $package->new;
- if ( my $algorithm = $opts->{algorithm} || $self->algorithm) {
+ if ( my $algorithm = $opts->{algorithm} || $self->algorithm) {
$nonce->algorithm( $algorithm );
}
sub get_digest_authorization_nonce {
my ( $self, $c, $key ) = @_;
-
+
_check_cache($c);
return $c->cache->get( $key );
}
__PACKAGE__->config( authentication => {
default_realm => 'example',
- realms => {
- example => {
- credential => {
+ realms => {
+ example => {
+ credential => {
class => 'HTTP',
type => 'any', # or 'digest' or 'basic'
password_type => 'clear',
sub foo : Local {
my ( $self, $c ) = @_;
- $c->authenticate({ realm => "example" });
+ $c->authenticate({ realm => "example" });
# either user gets authenticated or 401 is sent
- # Note that the authentication realm sent to the client (in the
- # RFC 2617 sense) is overridden here, but this *does not*
- # effect the Catalyst::Authentication::Realm used for
- # authentication - to do that, you need
+ # Note that the authentication realm sent to the client (in the
+ # RFC 2617 sense) is overridden here, but this *does not*
+ # effect the Catalyst::Authentication::Realm used for
+ # authentication - to do that, you need
# $c->authenticate({}, 'otherrealm')
do_stuff();
}
-
+
sub always_auth : Local {
my ( $self, $c ) = @_;
-
+
# Force authorization headers onto the response so that the user
# is asked again for authentication, even if they successfully
# authenticated.
Array reference to domains used to build the authorization headers.
-This list of domains defines the protection space. If a domain URI is an
-absolute path (starts with /), it is relative to the root URL of the server being accessed.
-An absolute URI in this list may refer to a different server than the one being accessed.
+This list of domains defines the protection space. If a domain URI is an
+absolute path (starts with /), it is relative to the root URL of the server being accessed.
+An absolute URI in this list may refer to a different server than the one being accessed.
-The client will use this list to determine the set of URIs for which the same authentication
-information may be sent.
+The client will use this list to determine the set of URIs for which the same authentication
+information may be sent.
If this is omitted or its value is empty, the client will assume that the
protection space consists of all URIs on the responding server.
You may override these methods. By default they will call C<get> and C<set> on
C<< $c->cache >>.
+=item authentication_failed
+
+Sets the 401 response and calls C<< $ctx->detach >>.
+
=back
=head1 CONFIGURATION
-All configuration is stored in C<< YourApp->config(authentication => { yourrealm => { credential => { class => 'HTTP', %config } } } >>.
+All configuration is stored in C<< YourApp->config('Plugin::Authentication' => { yourrealm => { credential => { class => 'HTTP', %config } } } >>.
This should be a hash, and it can contain the following entries:
=item password_type
-The type of password returned by the user object. Same usage as in
+The type of password returned by the user object. Same usage as in
L<Catalyst::Authentication::Credential::Password|Catalyst::Authentication::Credential::Password/password_type>
=item password_field
-The name of accessor used to retrieve the value of the password field from the user object. Same usage as in
+The name of accessor used to retrieve the value of the password field from the user object. Same usage as in
L<Catalyst::Authentication::Credential::Password|Catalyst::Authentication::Credential::Password/password_field>
=item username_field
of your domain, and you want to ensure that authentication credentials from your application are not shared with
other applications on the same server.
+=item require_ssl
+
+If this configuration key has a true value then authentication will be denied
+(and a 401 issued in normal circumstances) unless the request is via https.
+
+=item no_unprompted_authorization_required
+
+Causes authentication to fail as normal modules do, without calling
+C<< $c->detach >>. This means that the basic auth credential can be used as
+part of the progressive realm.
+
+However use like this is probably not optimum it also means that users in
+browsers ill never get a HTTP authenticate dialogue box (unless you manually
+return a 401 response in your application), and even some automated
+user agents (for APIs) will not send the Authorization header without
+specific manipulation of the request headers.
+
=back
=head1 RESTRICTIONS