-#!/usr/bin/perl\r
-\r
-package Catalyst::Plugin::Authentication::Credential::HTTP;\r
-use base qw/Catalyst::Plugin::Authentication::Credential::Password/;\r
-\r
-use strict;\r
-use warnings;\r
-\r
-use String::Escape ();\r
-use URI::Escape ();\r
-use Catalyst ();\r
-use Digest::MD5 ();\r
-\r
-our $VERSION = "0.02";\r
-\r
-sub authenticate_http {\r
- my $c = shift;\r
-\r
- return $c->authenticate_digest || $c->authenticate_basic;\r
-}\r
-\r
-sub authenticate_basic {\r
- my $c = shift;\r
-\r
- $c->log->debug('Checking http basic authentication.') if $c->debug;\r
-\r
- my $headers = $c->req->headers;\r
-\r
- if ( my ( $user, $password ) = $headers->authorization_basic ) {\r
-\r
- if ( my $store = $c->config->{authentication}{http}{store} ) {\r
- $user = $store->get_user($user);\r
- }\r
-\r
- return $c->login( $user, $password );\r
- }\r
-\r
- return 0;\r
-}\r
-\r
-sub authenticate_digest {\r
- my $c = shift;\r
-\r
- $c->log->debug('Checking http digest authentication.') if $c->debug;\r
-\r
- my $headers = $c->req->headers;\r
- my @authorization = $headers->header('Authorization');\r
- foreach my $authorization (@authorization) {\r
- next unless $authorization =~ m{^Digest};\r
-\r
- $c->_check_cache;\r
-\r
- my %res = map {\r
- my @key_val = split /=/, $_, 2;\r
- $key_val[0] = lc $key_val[0];\r
- $key_val[1] =~ s{"}{}g; # remove the quotes\r
- @key_val;\r
- } split /,\s?/, substr( $authorization, 7 ); #7 == length "Digest "\r
-\r
- my $opaque = $res{opaque};\r
- my $nonce = $c->cache->get( __PACKAGE__ . '::opaque:' . $opaque );\r
- next unless $nonce;\r
-\r
- $c->log->debug('Checking authentication parameters.')\r
- if $c->debug;\r
-\r
- my $uri = '/' . $c->request->path;\r
- my $algorithm = $res{algorithm} || 'MD5';\r
- my $nonce_count = '0x' . $res{nc};\r
-\r
- my $check = $uri eq $res{uri}\r
- && ( exists $res{username} )\r
- && ( exists $res{qop} )\r
- && ( exists $res{cnonce} )\r
- && ( exists $res{nc} )\r
- && $algorithm eq $nonce->algorithm\r
- && hex($nonce_count) > hex( $nonce->nonce_count )\r
- && $res{nonce} eq $nonce->nonce; # TODO: set Stale instead\r
-\r
- unless ($check) {\r
- $c->log->debug('Digest authentication failed. Bad request.')\r
- if $c->debug;\r
- $c->res->status(400); # bad request\r
- die $Catalyst::DETACH;\r
- }\r
-\r
- $c->log->debug('Checking authentication response.')\r
- if $c->debug;\r
-\r
- my $username = $res{username};\r
- my $realm = $res{realm};\r
-\r
- my $user;\r
- my $store = $c->config->{authentication}{http}{store}\r
- || $c->default_auth_store;\r
- $user = $store->get_user($username) if $store;\r
- unless ($user) { # no user, no authentication\r
- $c->log->debug('Unknown user: $user.') if $c->debug;\r
- return 0;\r
- }\r
-\r
- # everything looks good, let's check the response\r
-\r
- # calculate H(A2) as per spec\r
- my $ctx = Digest::MD5->new;\r
- $ctx->add( join( ':', $c->request->method, $res{uri} ) );\r
- if ( $res{qop} eq 'auth-int' ) {\r
- my $digest =\r
- Digest::MD5::md5_hex( $c->request->body ); # not sure here\r
- $ctx->add( ':', $digest );\r
- }\r
- my $A2_digest = $ctx->hexdigest;\r
-\r
- # the idea of the for loop:\r
- # if we do not want to store the plain password in our user store,\r
- # we can store md5_hex("$username:$realm:$password") instead\r
- for my $r ( 0 .. 1 ) {\r
-\r
- # calculate H(A1) as per spec\r
- my $A1_digest = $r ? $user->password : do {\r
- $ctx = Digest::MD5->new;\r
- $ctx->add( join( ':', $username, $realm, $user->password ) );\r
- $ctx->hexdigest;\r
- };\r
- if ( $nonce->algorithm eq 'MD5-sess' ) {\r
- $ctx = Digest::MD5->new;\r
- $ctx->add( join( ':', $A1_digest, $res{nonce}, $res{cnonce} ) );\r
- $A1_digest = $ctx->hexdigest;\r
- }\r
-\r
- my $rq_digest = Digest::MD5::md5_hex(\r
- join( ':',\r
- $A1_digest, $res{nonce},\r
- $res{qop} ? ( $res{nc}, $res{cnonce}, $res{qop} ) : (),\r
- $A2_digest )\r
- );\r
-\r
- $nonce->nonce_count($nonce_count);\r
- $c->cache->set( __PACKAGE__ . '::opaque:' . $nonce->opaque,\r
- $nonce );\r
-\r
- return $c->login( $user, $user->password )\r
- if $rq_digest eq $res{response};\r
- }\r
- }\r
-\r
- return 0;\r
-}\r
-\r
-sub _check_cache {\r
- my $c = shift;\r
-\r
- die "A cache is needed for http digest authentication."\r
- unless $c->can('cache');\r
-}\r
-\r
-sub _is_auth_type {\r
- my ( $c, $type ) = @_;\r
-\r
- my $cfgtype = lc( $c->config->{authentication}{http}{type} || 'any' );\r
- return 1 if $cfgtype eq 'any' || $cfgtype eq lc $type;\r
- return 0;\r
-}\r
-\r
-sub authorization_required {\r
- my ( $c, %opts ) = @_;\r
-\r
- return 1 if $c->_is_auth_type('digest') && $c->authenticate_digest;\r
- return 1 if $c->_is_auth_type('basic') && $c->authenticate_basic;\r
-\r
- $c->authorization_required_response(%opts);\r
-\r
- die $Catalyst::DETACH;\r
-}\r
-\r
-sub authorization_required_response {\r
- my ( $c, %opts ) = @_;\r
-\r
- $c->res->status(401);\r
-\r
- my ( $digest, $basic );\r
- $digest = $c->build_authorization_required_response( \%opts, 'Digest' )\r
- if $c->_is_auth_type('digest');\r
- $basic = $c->build_authorization_required_response( \%opts, 'Basic' )\r
- if $c->_is_auth_type('basic');\r
-\r
- die 'Could not build authorization required response. '\r
- . 'Did you configure a valid authentication http type: '\r
- . 'basic, digest, any'\r
- unless $digest || $basic;\r
-\r
- $c->res->headers->push_header( 'WWW-Authenticate' => $digest )\r
- if $digest;\r
- $c->res->headers->push_header( 'WWW-Authenticate' => $basic ) if $basic;\r
-}\r
-\r
-sub build_authorization_required_response {\r
- my ( $c, $opts, $type ) = @_;\r
- my @opts;\r
-\r
- if ( my $realm = $opts->{realm} ) {\r
- push @opts, 'realm=' . String::Escape::qprintable($realm);\r
- }\r
-\r
- if ( my $domain = $opts->{domain} ) {\r
- Catalyst::Excpetion->throw("domain must be an array reference")\r
- unless ref($domain) && ref($domain) eq "ARRAY";\r
-\r
- my @uris =\r
- $c->config->{authentication}{http}{use_uri_for}\r
- ? ( map { $c->uri_for($_) } @$domain )\r
- : ( map { URI::Escape::uri_escape($_) } @$domain );\r
-\r
- push @opts, qq{domain="@uris"};\r
- }\r
-\r
- if ( $type eq 'Digest' ) {\r
- my $package = __PACKAGE__ . '::Nonce';\r
- my $nonce = $package->new;\r
- $nonce->algorithm( $c->config->{authentication}{http}{algorithm}\r
- || $nonce->algorithm );\r
-\r
- push @opts, 'qop="' . $nonce->qop . '"';\r
- push @opts, 'nonce="' . $nonce->nonce . '"';\r
- push @opts, 'opaque="' . $nonce->opaque . '"';\r
- push @opts, 'algorithm="' . $nonce->algorithm . '"';\r
-\r
- $c->_check_cache;\r
- $c->cache->set( __PACKAGE__ . '::opaque:' . $nonce->opaque, $nonce );\r
- }\r
-\r
- return "$type " . join( ', ', @opts );\r
-}\r
-\r
-package Catalyst::Plugin::Authentication::Credential::HTTP::Nonce;\r
-\r
-use strict;\r
-use base qw[ Class::Accessor::Fast ];\r
-use Data::UUID ();\r
-\r
-our $VERSION = "0.01";\r
-\r
-__PACKAGE__->mk_accessors(qw[ nonce nonce_count qop opaque algorithm ]);\r
-\r
-sub new {\r
- my $class = shift;\r
- my $self = $class->SUPER::new(@_);\r
-\r
- $self->nonce( Data::UUID->new->create_b64 );\r
- $self->opaque( Data::UUID->new->create_b64 );\r
- $self->qop('auth,auth-int');\r
- $self->nonce_count('0x0');\r
- $self->algorithm('MD5');\r
-\r
- return $self;\r
-}\r
-\r
-1;\r
-\r
-__END__\r
-\r
-=pod\r
-\r
-=head1 NAME\r
-\r
-Catalyst::Plugin::Authentication::Credential::HTTP - HTTP Basic authentication\r
-for Catlayst.\r
-\r
-=head1 SYNOPSIS\r
-\r
- use Catalyst qw/\r
- Authentication\r
- Authentication::Store::Moose\r
- Authentication::Credential::HTTP\r
- /;\r
-\r
- sub foo : Local {\r
- my ( $self, $c ) = @_;\r
-\r
- $c->authorization_required( realm => "foo" ); # named after the status code ;-)\r
-\r
- # either user gets authenticated or 401 is sent\r
-\r
- do_stuff();\r
- }\r
-\r
- # with ACL plugin\r
- __PACKAGE__->deny_access_unless("/path", sub { $_[0]->authenticate_http });\r
-\r
- sub end : Private {\r
- my ( $self, $c ) = @_;\r
-\r
- $c->authorization_required_response( realm => "foo" );\r
- $c->error(0);\r
- }\r
-\r
-=head1 DESCRIPTION\r
-\r
-This moduule lets you use HTTP authentication with\r
-L<Catalyst::Plugin::Authentication>.\r
-\r
-Currently this module only supports the Basic scheme, but upon request Digest\r
-will also be added. Patches welcome!\r
-\r
-=head1 METHODS\r
-\r
-=over 4\r
-\r
-=item authorization_required\r
-\r
-Tries to C<authenticate_http>, and if that fails calls\r
-C<authorization_required_response> and detaches the current action call stack.\r
-\r
-=item authenticate_http\r
-\r
-Looks inside C<< $c->request->headers >> and processes the basic (badly named)\r
-authorization header.\r
-\r
-=item authorization_required_response\r
-\r
-Sets C<< $c->response >> to the correct status code, and adds the correct\r
-header to demand authentication data from the user agent.\r
-\r
-=back\r
-\r
-=head1 AUTHORS\r
-\r
-Yuval Kogman, C<nothingmuch@woobling.org>\r
-\r
-Jess Robinson\r
-\r
-Sascha Kiefer C<esskar@cpan.org>\r
-\r
-=head1 COPYRIGHT & LICENSE\r
-\r
- Copyright (c) 2005-2006 the aforementioned authors. All rights\r
- reserved. This program is free software; you can redistribute\r
- it and/or modify it under the same terms as Perl itself.\r
-\r
-=cut\r
+#!/usr/bin/perl
+
+package Catalyst::Plugin::Authentication::Credential::HTTP;
+use base qw/Catalyst::Plugin::Authentication::Credential::Password/;
+
+use strict;
+use warnings;
+
+use String::Escape ();
+use URI::Escape ();
+use Catalyst ();
+use Digest::MD5 ();
+
+our $VERSION = "0.09";
+
+sub authenticate_http {
+ my ( $c, @args ) = @_;
+
+ return 1 if $c->_is_http_auth_type('digest') && $c->authenticate_digest(@args);
+ return 1 if $c->_is_http_auth_type('basic') && $c->authenticate_basic(@args);
+}
+
+sub get_http_auth_store {
+ my ( $c, %opts ) = @_;
+
+ my $store = $opts{store} || $c->config->{authentication}{http}{store} || return;
+
+ return ref $store
+ ? $store
+ : $c->get_auth_store($store);
+}
+
+sub authenticate_basic {
+ my ( $c, %opts ) = @_;
+
+ $c->log->debug('Checking http basic authentication.') if $c->debug;
+
+ my $headers = $c->req->headers;
+
+ if ( my ( $username, $password ) = $headers->authorization_basic ) {
+
+ my $user;
+
+ unless ( $user = $opts{user} ) {
+ if ( my $store = $c->get_http_auth_store(%opts) ) {
+ $user = $store->get_user($username);
+ } else {
+ $user = $username;
+ }
+ }
+
+ return $c->login( $user, $password );
+ }
+
+ return 0;
+}
+
+sub authenticate_digest {
+ my ( $c, %opts ) = @_;
+
+ $c->log->debug('Checking http digest authentication.') if $c->debug;
+
+ my $headers = $c->req->headers;
+ my @authorization = $headers->header('Authorization');
+ foreach my $authorization (@authorization) {
+ next unless $authorization =~ m{^Digest};
+
+ my %res = map {
+ my @key_val = split /=/, $_, 2;
+ $key_val[0] = lc $key_val[0];
+ $key_val[1] =~ s{"}{}g; # remove the quotes
+ @key_val;
+ } split /,\s?/, substr( $authorization, 7 ); #7 == length "Digest "
+
+ my $opaque = $res{opaque};
+ my $nonce = $c->get_digest_authorization_nonce( __PACKAGE__ . '::opaque:' . $opaque );
+ next unless $nonce;
+
+ $c->log->debug('Checking authentication parameters.')
+ if $c->debug;
+
+ my $uri = '/' . $c->request->path;
+ my $algorithm = $res{algorithm} || 'MD5';
+ my $nonce_count = '0x' . $res{nc};
+
+ my $check = $uri eq $res{uri}
+ && ( exists $res{username} )
+ && ( exists $res{qop} )
+ && ( exists $res{cnonce} )
+ && ( exists $res{nc} )
+ && $algorithm eq $nonce->algorithm
+ && hex($nonce_count) > hex( $nonce->nonce_count )
+ && $res{nonce} eq $nonce->nonce; # TODO: set Stale instead
+
+ unless ($check) {
+ $c->log->debug('Digest authentication failed. Bad request.')
+ if $c->debug;
+ $c->res->status(400); # bad request
+ die $Catalyst::DETACH;
+ }
+
+ $c->log->debug('Checking authentication response.')
+ if $c->debug;
+
+ my $username = $res{username};
+ my $realm = $res{realm};
+
+ my $user;
+
+ unless ( $user = $opts{user} ) {
+ if ( my $store = $c->get_http_auth_store(%opts) || $c->default_auth_store ) {
+ $user = $store->get_user($username);
+ }
+ }
+
+ unless ($user) { # no user, no authentication
+ $c->log->debug('Unknown user: $user.') if $c->debug;
+ return 0;
+ }
+
+ # everything looks good, let's check the response
+
+ # calculate H(A2) as per spec
+ my $ctx = Digest::MD5->new;
+ $ctx->add( join( ':', $c->request->method, $res{uri} ) );
+ if ( $res{qop} eq 'auth-int' ) {
+ my $digest =
+ Digest::MD5::md5_hex( $c->request->body ); # not sure here
+ $ctx->add( ':', $digest );
+ }
+ my $A2_digest = $ctx->hexdigest;
+
+ # the idea of the for loop:
+ # if we do not want to store the plain password in our user store,
+ # we can store md5_hex("$username:$realm:$password") instead
+ for my $r ( 0 .. 1 ) {
+
+ # calculate H(A1) as per spec
+ my $A1_digest = $r ? $user->password : do {
+ $ctx = Digest::MD5->new;
+ $ctx->add( join( ':', $username, $realm, $user->password ) );
+ $ctx->hexdigest;
+ };
+ if ( $nonce->algorithm eq 'MD5-sess' ) {
+ $ctx = Digest::MD5->new;
+ $ctx->add( join( ':', $A1_digest, $res{nonce}, $res{cnonce} ) );
+ $A1_digest = $ctx->hexdigest;
+ }
+
+ my $rq_digest = Digest::MD5::md5_hex(
+ join( ':',
+ $A1_digest, $res{nonce},
+ $res{qop} ? ( $res{nc}, $res{cnonce}, $res{qop} ) : (),
+ $A2_digest )
+ );
+
+ $nonce->nonce_count($nonce_count);
+ $c->cache->set( __PACKAGE__ . '::opaque:' . $nonce->opaque,
+ $nonce );
+
+ return $c->login( $user, $user->password )
+ if $rq_digest eq $res{response};
+ }
+ }
+
+ return 0;
+}
+
+sub _check_cache {
+ my $c = shift;
+
+ die "A cache is needed for http digest authentication."
+ unless $c->can('cache');
+}
+
+sub _is_http_auth_type {
+ my ( $c, $type ) = @_;
+
+ my $cfgtype = lc( $c->config->{authentication}{http}{type} || 'any' );
+ return 1 if $cfgtype eq 'any' || $cfgtype eq lc $type;
+ return 0;
+}
+
+sub authorization_required {
+ my ( $c, @args ) = @_;
+
+ return 1 if $c->authenticate_http(@args);
+
+ $c->authorization_required_response(@args);
+
+ die $Catalyst::DETACH;
+}
+
+sub authorization_required_response {
+ my ( $c, %opts ) = @_;
+
+ $c->res->status(401);
+ $c->res->content_type('text/plain');
+ $c->res->body($c->config->{authentication}{http}{authorization_required_message} ||
+ $opts{authorization_required_message} ||
+ 'Authorization required.');
+
+ # *DONT* short circuit
+ my $ok;
+ $ok++ if $c->_create_digest_auth_response(\%opts);
+ $ok++ if $c->_create_basic_auth_response(\%opts);
+
+ unless ( $ok ) {
+ die 'Could not build authorization required response. '
+ . 'Did you configure a valid authentication http type: '
+ . 'basic, digest, any';
+ }
+}
+
+sub _add_authentication_header {
+ my ( $c, $header ) = @_;
+ $c->res->headers->push_header( 'WWW-Authenticate' => $header );
+}
+
+sub _create_digest_auth_response {
+ my ( $c, $opts ) = @_;
+
+ return unless $c->_is_http_auth_type('digest');
+
+ if ( my $digest = $c->_build_digest_auth_header( $opts ) ) {
+ $c->_add_authentication_header( $digest );
+ return 1;
+ }
+
+ return;
+}
+
+sub _create_basic_auth_response {
+ my ( $c, $opts ) = @_;
+
+ return unless $c->_is_http_auth_type('basic');
+
+ if ( my $basic = $c->_build_basic_auth_header( $opts ) ) {
+ $c->_add_authentication_header( $basic );
+ return 1;
+ }
+
+ return;
+}
+
+sub _build_auth_header_realm {
+ my ( $c, $opts ) = @_;
+
+ if ( my $realm = $opts->{realm} ) {
+ return 'realm=' . String::Escape::qprintable($realm);
+ } else {
+ return;
+ }
+}
+
+sub _build_auth_header_domain {
+ my ( $c, $opts ) = @_;
+
+ if ( my $domain = $opts->{domain} ) {
+ Catalyst::Exception->throw("domain must be an array reference")
+ unless ref($domain) && ref($domain) eq "ARRAY";
+
+ my @uris =
+ $c->config->{authentication}{http}{use_uri_for}
+ ? ( map { $c->uri_for($_) } @$domain )
+ : ( map { URI::Escape::uri_escape($_) } @$domain );
+
+ return qq{domain="@uris"};
+ } else {
+ return;
+ }
+}
+
+sub _build_auth_header_common {
+ my ( $c, $opts ) = @_;
+
+ return (
+ $c->_build_auth_header_realm($opts),
+ $c->_build_auth_header_domain($opts),
+ );
+}
+
+sub _build_basic_auth_header {
+ my ( $c, $opts ) = @_;
+ return $c->_join_auth_header_parts( Basic => $c->_build_auth_header_common( $opts ) );
+}
+
+sub _build_digest_auth_header {
+ my ( $c, $opts ) = @_;
+
+ my $nonce = $c->_digest_auth_nonce($opts);
+
+ my $key = __PACKAGE__ . '::opaque:' . $nonce->opaque;
+
+ $c->store_digest_authorization_nonce( $key, $nonce );
+
+ return $c->_join_auth_header_parts( Digest =>
+ $c->_build_auth_header_common($opts),
+ map { sprintf '%s="%s"', $_, $nonce->$_ } qw(
+ qop
+ nonce
+ opaque
+ algorithm
+ ),
+ );
+}
+
+sub _digest_auth_nonce {
+ my ( $c, $opts ) = @_;
+
+ my $package = __PACKAGE__ . '::Nonce';
+
+ my $nonce = $package->new;
+
+ if ( my $algorithm = $opts->{algorithm} || $c->config->{authentication}{http}{algorithm}) {
+ $nonce->algorithm( $algorithm );
+ }
+
+ return $nonce;
+}
+
+sub _join_auth_header_parts {
+ my ( $c, $type, @parts ) = @_;
+ return "$type " . join(", ", @parts );
+}
+
+sub get_digest_authorization_nonce {
+ my ( $c, $key ) = @_;
+
+ $c->_check_cache;
+ $c->cache->get( $key );
+}
+
+sub store_digest_authorization_nonce {
+ my ( $c, $key, $nonce ) = @_;
+
+ $c->_check_cache;
+ $c->cache->set( $key, $nonce );
+}
+
+package Catalyst::Plugin::Authentication::Credential::HTTP::Nonce;
+
+use strict;
+use base qw[ Class::Accessor::Fast ];
+use Data::UUID ();
+
+our $VERSION = "0.01";
+
+__PACKAGE__->mk_accessors(qw[ nonce nonce_count qop opaque algorithm ]);
+
+sub new {
+ my $class = shift;
+ my $self = $class->SUPER::new(@_);
+
+ $self->nonce( Data::UUID->new->create_b64 );
+ $self->opaque( Data::UUID->new->create_b64 );
+ $self->qop('auth,auth-int');
+ $self->nonce_count('0x0');
+ $self->algorithm('MD5');
+
+ return $self;
+}
+
+1;
+
+__END__
+
+=pod
+
+=head1 NAME
+
+Catalyst::Plugin::Authentication::Credential::HTTP - HTTP Basic and Digest authentication
+for Catalyst.
+
+=head1 SYNOPSIS
+
+ use Catalyst qw/
+ Authentication
+ Authentication::Store::Minimal
+ Authentication::Credential::HTTP
+ /;
+
+ __PACKAGE__->config->{authentication}{http}{type} = 'any'; # or 'digest' or 'basic'
+ __PACKAGE__->config->{authentication}{users} = {
+ Mufasa => { password => "Circle Of Life", },
+ };
+
+ sub foo : Local {
+ my ( $self, $c ) = @_;
+
+ $c->authorization_required( realm => "foo" ); # named after the status code ;-)
+
+ # either user gets authenticated or 401 is sent
+
+ do_stuff();
+ }
+
+ # with ACL plugin
+ __PACKAGE__->deny_access_unless("/path", sub { $_[0]->authenticate_http });
+
+ sub end : Private {
+ my ( $self, $c ) = @_;
+
+ $c->authorization_required_response( realm => "foo" );
+ $c->error(0);
+ }
+
+=head1 DESCRIPTION
+
+This moduule lets you use HTTP authentication with
+L<Catalyst::Plugin::Authentication>. Both basic and digest authentication
+are currently supported.
+
+When authentication is required, this module sets a status of 401, and
+the body of the response to 'Authorization required.'. To override
+this and set your own content, check for the C<< $c->res->status ==
+401 >> in your C<end> action, and change the body accordingly.
+
+=head2 TERMS
+
+=over 4
+
+=item Nonce
+
+A nonce is a one-time value sent with each digest authentication
+request header. The value must always be unique, so per default the
+last value of the nonce is kept using L<Catalyst::Plugin::Cache>. To
+change this behaviour, override the
+C<store_digest_authorization_nonce> and
+C<get_digest_authorization_nonce> methods as shown below.
+
+=back
+
+=head1 METHODS
+
+=over 4
+
+=item authorization_required %opts
+
+Tries to C<authenticate_http>, and if that fails calls
+C<authorization_required_response> and detaches the current action call stack.
+
+This method just passes the options through untouched.
+
+=item authenticate_http %opts
+
+Looks inside C<< $c->request->headers >> and processes the digest and basic
+(badly named) authorization header.
+
+This will only try the methods set in the configuration. First digest, then basic.
+
+See the next two methods for what %opts can contain.
+
+=item authenticate_basic %opts
+
+=item authenticate_digest %opts
+
+Try to authenticate one of the methods without checking if the method is
+allowed in the configuration.
+
+%opts can contain C<store> (either an object or a name), C<user> (to disregard
+%the username from the header altogether, overriding it with a username or user
+%object).
+
+=item authorization_required_response %opts
+
+Sets C<< $c->response >> to the correct status code, and adds the correct
+header to demand authentication data from the user agent.
+
+Typically used by C<authorization_required>, but may be invoked manually.
+
+%opts can contain C<realm>, C<domain> and C<algorithm>, which are used to build
+%the digest header.
+
+=item store_digest_authorization_nonce $key, $nonce
+
+=item get_digest_authorization_nonce $key
+
+Set or get the C<$nonce> object used by the digest auth mode.
+
+You may override these methods. By default they will call C<get> and C<set> on
+C<< $c->cache >>.
+
+=back
+
+=head1 CONFIGURATION
+
+All configuration is stored in C<< YourApp->config->{authentication}{http} >>.
+
+This should be a hash, and it can contain the following entries:
+
+=over 4
+
+=item store
+
+Either a name or an object -- the default store to use for HTTP authentication.
+
+=item type
+
+Can be either C<any> (the default), C<basic> or C<digest>.
+
+This controls C<authorization_required_response> and C<authenticate_http>, but
+not the "manual" methods.
+
+=item authorization_required_message
+
+Set this to a string to override the default body content "Authorization required."
+
+=back
+
+=head1 RESTRICTIONS
+
+When using digest authentication, this module will only work together
+with authentication stores whose User objects have a C<password>
+method that returns the plain-text password. It will not work together
+with L<Catalyst::Authentication::Store::Htpasswd>, or
+L<Catalyst::Plugin::Authentication::Store::DBIC> stores whose
+C<password> methods return a hashed or salted version of the password.
+
+=head1 AUTHORS
+
+Yuval Kogman, C<nothingmuch@woobling.org>
+
+Jess Robinson
+
+Sascha Kiefer C<esskar@cpan.org>
+
+=head1 SEE ALSO
+
+RFC 2617 (or its successors), L<Catalyst::Plugin::Cache>, L<Catalyst::Plugin::Authentication>
+
+=head1 COPYRIGHT & LICENSE
+
+ Copyright (c) 2005-2006 the aforementioned authors. All rights
+ reserved. This program is free software; you can redistribute
+ it and/or modify it under the same terms as Perl itself.
+
+=cut