aboutsummaryrefslogtreecommitdiffstats
path: root/include/oauth.php
diff options
context:
space:
mode:
authorFabio Comuni <fabrix.xm@gmail.com>2011-11-07 17:36:41 +0100
committerFabio Comuni <fabrix.xm@gmail.com>2011-11-07 17:36:41 +0100
commit10e5754e247e9adf7c576547c69d12ca09973c7a (patch)
tree567006262c37e7504e9f812c9cb3c8ee665d8c32 /include/oauth.php
parent967f8b575e8ea3f9710dfb092ff993459edc2ab8 (diff)
downloadvolse-hubzilla-10e5754e247e9adf7c576547c69d12ca09973c7a.tar.gz
volse-hubzilla-10e5754e247e9adf7c576547c69d12ca09973c7a.tar.bz2
volse-hubzilla-10e5754e247e9adf7c576547c69d12ca09973c7a.zip
oauth: authorize
Diffstat (limited to 'include/oauth.php')
-rw-r--r--include/oauth.php91
1 files changed, 74 insertions, 17 deletions
diff --git a/include/oauth.php b/include/oauth.php
index b84309207..2724dcf7c 100644
--- a/include/oauth.php
+++ b/include/oauth.php
@@ -17,6 +17,7 @@ class FKOAuthDataStore extends OAuthDataStore {
}
function lookup_consumer($consumer_key) {
+ logger(__function__.":".$consumer_key);
//echo "<pre>"; var_dump($consumer_key); killme();
$r = q("SELECT client_id, pw, redirect_uri FROM clients WHERE client_id='%s'",
@@ -28,8 +29,8 @@ class FKOAuthDataStore extends OAuthDataStore {
}
function lookup_token($consumer, $token_type, $token) {
- //echo __file__.":".__line__."<pre>"; var_dump($consumer, $token_type, $token); killme();
- $r = q("SELECT id, secret,scope, expires FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'",
+ logger(__function__.":".$consumer.", ". $token_type.", ".$token);
+ $r = q("SELECT id, secret,scope, expires, uid FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'",
dbesc($consumer->key),
dbesc($token_type),
dbesc($token)
@@ -38,6 +39,7 @@ class FKOAuthDataStore extends OAuthDataStore {
$ot=new OAuthToken($r[0]['id'],$r[0]['secret']);
$ot->scope=$r[0]['scope'];
$ot->expires = $r[0]['expires'];
+ $ot->uid = $r[0]['uid'];
return $ot;
}
return null;
@@ -56,12 +58,20 @@ class FKOAuthDataStore extends OAuthDataStore {
}
function new_request_token($consumer, $callback = null) {
+ logger(__function__.":".$consumer.", ". $callback);
$key = $this->gen_token();
$sec = $this->gen_token();
+
+ if ($consumer->key){
+ $k = $consumer->key;
+ } else {
+ $k = $consumer;
+ }
+
$r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)",
dbesc($key),
dbesc($sec),
- dbesc($consumer->key),
+ dbesc($k),
'request',
intval(REQUEST_TOKEN_DURATION));
if (!$r) return null;
@@ -69,6 +79,8 @@ class FKOAuthDataStore extends OAuthDataStore {
}
function new_access_token($token, $consumer, $verifier = null) {
+ logger(__function__.":".$token.", ". $consumer.", ". $verifier);
+
// return a new access token attached to this consumer
// for the user associated with this token if the request token
// is authorized
@@ -76,34 +88,34 @@ class FKOAuthDataStore extends OAuthDataStore {
$ret=Null;
- // get verifier for this user
- $uverifier = get_pconfig(local_user(), "oauth", "verifier");
-
-
- if (is_null($verifier) || ($verifier==$uverifier)){
+ // get user for this verifier
+ $uverifier = get_config("oauth", $verifier);
+ logger(__function__.":".$verifier.",".$uverifier);
+ if (is_null($verifier) || ($uverifier!==false)){
$key = $this->gen_token();
$sec = $this->gen_token();
- $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)",
+ $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires, uid) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d, %d)",
dbesc($key),
dbesc($sec),
- dbesc($consumer->$key),
+ dbesc($consumer->key),
'access',
- intval(ACCESS_TOKEN_DURATION));
+ intval(ACCESS_TOKEN_DURATION),
+ intval($uverifier));
if ($r)
$ret = new OAuthToken($key,$sec);
}
- //q("DELETE FROM tokens WHERE id='%s'", $token->key);
+ q("DELETE FROM tokens WHERE id='%s'", $token->key);
- if (!is_null($ret)){
- //del_pconfig(local_user(), "oauth", "verifier");
- $apps = get_pconfig(local_user(), "oauth", "apps");
+ if (!is_null($ret) && $uverifier!==false){
+ del_config("oauth", $verifier);
+ /* $apps = get_pconfig($uverifier, "oauth", "apps");
if ($apps===false) $apps=array();
$apps[] = $consumer->key;
- //set_pconfig(local_user(), "oauth", "apps", $apps);
+ set_pconfig($uverifier, "oauth", "apps", $apps);*/
}
return $ret;
@@ -117,8 +129,52 @@ class FKOAuth1 extends OAuthServer {
$this->add_signature_method(new OAuthSignatureMethod_PLAINTEXT());
$this->add_signature_method(new OAuthSignatureMethod_HMAC_SHA1());
}
-}
+
+ function loginUser($uid){
+ logger("FKOAuth1::loginUser $uid");
+ $a = get_app();
+ $r = q("SELECT * FROM `user` WHERE uid=%d AND `blocked` = 0 AND `account_expired` = 0 AND `verified` = 1 LIMIT 1",
+ intval($uid)
+ );
+ if(count($r)){
+ $record = $r[0];
+ } else {
+ logger('FKOAuth1::loginUser failure: ' . print_r($_SERVER,true), LOGGER_DEBUG);
+ header('HTTP/1.0 401 Unauthorized');
+ die('This api requires login');
+ }
+ $_SESSION['uid'] = $record['uid'];
+ $_SESSION['theme'] = $record['theme'];
+ $_SESSION['authenticated'] = 1;
+ $_SESSION['page_flags'] = $record['page-flags'];
+ $_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $record['nickname'];
+ $_SESSION['addr'] = $_SERVER['REMOTE_ADDR'];
+
+ //notice( t("Welcome back ") . $record['username'] . EOL);
+ $a->user = $record;
+ if(strlen($a->user['timezone'])) {
+ date_default_timezone_set($a->user['timezone']);
+ $a->timezone = $a->user['timezone'];
+ }
+
+ $r = q("SELECT * FROM `contact` WHERE `uid` = %s AND `self` = 1 LIMIT 1",
+ intval($_SESSION['uid']));
+ if(count($r)) {
+ $a->contact = $r[0];
+ $a->cid = $r[0]['id'];
+ $_SESSION['cid'] = $a->cid;
+ }
+ q("UPDATE `user` SET `login_date` = '%s' WHERE `uid` = %d LIMIT 1",
+ dbesc(datetime_convert()),
+ intval($_SESSION['uid'])
+ );
+
+ call_hooks('logged_in', $a->user);
+ }
+
+}
+/*
class FKOAuth2 extends OAuth2 {
private function db_secret($client_secret){
@@ -207,3 +263,4 @@ class FKOAuth2 extends OAuth2 {
}
}
+*/