diff options
author | Fabio Comuni <fabrix.xm@gmail.com> | 2011-11-07 17:41:23 +0100 |
---|---|---|
committer | Fabio Comuni <fabrix.xm@gmail.com> | 2011-11-07 17:41:23 +0100 |
commit | 00c342e13d833fd215e5dc03a508e1abe660fe21 (patch) | |
tree | d276554274475d8a0e2d8e1e9ae34035dd64085a /include | |
parent | 355026ab7a53838c8e7a7b5717626ee057e5cd4c (diff) | |
parent | b070666120fc6cbc0d90a0ad160274f8ecf7a027 (diff) | |
download | volse-hubzilla-00c342e13d833fd215e5dc03a508e1abe660fe21.tar.gz volse-hubzilla-00c342e13d833fd215e5dc03a508e1abe660fe21.tar.bz2 volse-hubzilla-00c342e13d833fd215e5dc03a508e1abe660fe21.zip |
Merge branch 'oauthapi'
Diffstat (limited to 'include')
-rw-r--r-- | include/api.php | 47 | ||||
-rw-r--r-- | include/oauth.php | 266 |
2 files changed, 312 insertions, 1 deletions
diff --git a/include/api.php b/include/api.php index d94cc2942..1196e0aac 100644 --- a/include/api.php +++ b/include/api.php @@ -2,7 +2,7 @@ require_once("bbcode.php"); require_once("datetime.php"); require_once("conversation.php"); - + require_once("oauth.php"); /* * Twitter-Like API * @@ -27,6 +27,23 @@ * Simple HTTP Login */ function api_login(&$a){ + // login with oauth + try{ + $oauth = new FKOAuth1(); + list($consumer,$token) = $oauth->verify_request(OAuthRequest::from_request()); + if (!is_null($token)){ + $oauth->loginUser($token->uid); + call_hooks('logged_in', $a->user); + return; + } + echo __file__.__line__.__function__."<pre>"; var_dump($consumer, $token); die(); + }catch(Exception $e){ + logger(__file__.__line__.__function__."\n".$e); + //die(__file__.__line__.__function__."<pre>".$e); die(); + } + + + // workaround for HTTP-auth in CGI mode if(x($_SERVER,'REDIRECT_REMOTE_USER')) { $userpass = base64_decode(substr($_SERVER["REDIRECT_REMOTE_USER"],6)) ; @@ -1127,3 +1144,31 @@ } api_register_func('api/direct_messages/sent','api_direct_messages_sentbox',true); api_register_func('api/direct_messages','api_direct_messages_inbox',true); + + + + function api_oauth_request_token(&$a, $type){ + try{ + $oauth = new FKOAuth1(); + $r = $oauth->fetch_request_token(OAuthRequest::from_request()); + }catch(Exception $e){ + echo "error=". OAuthUtil::urlencode_rfc3986($e->getMessage()); killme(); + } + echo $r; + killme(); + } + function api_oauth_access_token(&$a, $type){ + try{ + $oauth = new FKOAuth1(); + $r = $oauth->fetch_access_token(OAuthRequest::from_request()); + }catch(Exception $e){ + echo "error=". OAuthUtil::urlencode_rfc3986($e->getMessage()); killme(); + } + echo $r; + killme(); + } + + api_register_func('api/oauth/request_token', 'api_oauth_request_token', false); + api_register_func('api/oauth/access_token', 'api_oauth_access_token', false); + + diff --git a/include/oauth.php b/include/oauth.php new file mode 100644 index 000000000..2724dcf7c --- /dev/null +++ b/include/oauth.php @@ -0,0 +1,266 @@ +<?php +/** + * OAuth server + * Based on oauth2-php <http://code.google.com/p/oauth2-php/> + * + */ + +define('REQUEST_TOKEN_DURATION', 300); +define('ACCESS_TOKEN_DURATION', 31536000); + +require_once("library/OAuth1.php"); +require_once("library/oauth2-php/lib/OAuth2.inc"); + +class FKOAuthDataStore extends OAuthDataStore { + function gen_token(){ + return md5(base64_encode(pack('N6', mt_rand(), mt_rand(), mt_rand(), mt_rand(), mt_rand(), uniqid()))); + } + + function lookup_consumer($consumer_key) { + logger(__function__.":".$consumer_key); + //echo "<pre>"; var_dump($consumer_key); killme(); + + $r = q("SELECT client_id, pw, redirect_uri FROM clients WHERE client_id='%s'", + dbesc($consumer_key) + ); + if (count($r)) + return new OAuthConsumer($r[0]['client_id'],$r[0]['pw'],$r[0]['redirect_uri']); + return null; + } + + function lookup_token($consumer, $token_type, $token) { + logger(__function__.":".$consumer.", ". $token_type.", ".$token); + $r = q("SELECT id, secret,scope, expires, uid FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'", + dbesc($consumer->key), + dbesc($token_type), + dbesc($token) + ); + if (count($r)){ + $ot=new OAuthToken($r[0]['id'],$r[0]['secret']); + $ot->scope=$r[0]['scope']; + $ot->expires = $r[0]['expires']; + $ot->uid = $r[0]['uid']; + return $ot; + } + return null; + } + + function lookup_nonce($consumer, $token, $nonce, $timestamp) { + //echo __file__.":".__line__."<pre>"; var_dump($consumer,$key); killme(); + $r = q("SELECT id, secret FROM tokens WHERE client_id='%s' AND id='%s' AND expires=%d", + dbesc($consumer->key), + dbesc($nonce), + intval($timestamp) + ); + if (count($r)) + return new OAuthToken($r[0]['id'],$r[0]['secret']); + return null; + } + + function new_request_token($consumer, $callback = null) { + logger(__function__.":".$consumer.", ". $callback); + $key = $this->gen_token(); + $sec = $this->gen_token(); + + if ($consumer->key){ + $k = $consumer->key; + } else { + $k = $consumer; + } + + $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)", + dbesc($key), + dbesc($sec), + dbesc($k), + 'request', + intval(REQUEST_TOKEN_DURATION)); + if (!$r) return null; + return new OAuthToken($key,$sec); + } + + function new_access_token($token, $consumer, $verifier = null) { + logger(__function__.":".$token.", ". $consumer.", ". $verifier); + + // return a new access token attached to this consumer + // for the user associated with this token if the request token + // is authorized + // should also invalidate the request token + + $ret=Null; + + // get user for this verifier + $uverifier = get_config("oauth", $verifier); + logger(__function__.":".$verifier.",".$uverifier); + if (is_null($verifier) || ($uverifier!==false)){ + + $key = $this->gen_token(); + $sec = $this->gen_token(); + $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires, uid) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d, %d)", + dbesc($key), + dbesc($sec), + dbesc($consumer->key), + 'access', + intval(ACCESS_TOKEN_DURATION), + intval($uverifier)); + if ($r) + $ret = new OAuthToken($key,$sec); + } + + + q("DELETE FROM tokens WHERE id='%s'", $token->key); + + + if (!is_null($ret) && $uverifier!==false){ + del_config("oauth", $verifier); + /* $apps = get_pconfig($uverifier, "oauth", "apps"); + if ($apps===false) $apps=array(); + $apps[] = $consumer->key; + set_pconfig($uverifier, "oauth", "apps", $apps);*/ + } + + return $ret; + + } +} + +class FKOAuth1 extends OAuthServer { + function __construct() { + parent::__construct(new FKOAuthDataStore()); + $this->add_signature_method(new OAuthSignatureMethod_PLAINTEXT()); + $this->add_signature_method(new OAuthSignatureMethod_HMAC_SHA1()); + } + + function loginUser($uid){ + logger("FKOAuth1::loginUser $uid"); + $a = get_app(); + $r = q("SELECT * FROM `user` WHERE uid=%d AND `blocked` = 0 AND `account_expired` = 0 AND `verified` = 1 LIMIT 1", + intval($uid) + ); + if(count($r)){ + $record = $r[0]; + } else { + logger('FKOAuth1::loginUser failure: ' . print_r($_SERVER,true), LOGGER_DEBUG); + header('HTTP/1.0 401 Unauthorized'); + die('This api requires login'); + } + $_SESSION['uid'] = $record['uid']; + $_SESSION['theme'] = $record['theme']; + $_SESSION['authenticated'] = 1; + $_SESSION['page_flags'] = $record['page-flags']; + $_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $record['nickname']; + $_SESSION['addr'] = $_SERVER['REMOTE_ADDR']; + + //notice( t("Welcome back ") . $record['username'] . EOL); + $a->user = $record; + + if(strlen($a->user['timezone'])) { + date_default_timezone_set($a->user['timezone']); + $a->timezone = $a->user['timezone']; + } + + $r = q("SELECT * FROM `contact` WHERE `uid` = %s AND `self` = 1 LIMIT 1", + intval($_SESSION['uid'])); + if(count($r)) { + $a->contact = $r[0]; + $a->cid = $r[0]['id']; + $_SESSION['cid'] = $a->cid; + } + q("UPDATE `user` SET `login_date` = '%s' WHERE `uid` = %d LIMIT 1", + dbesc(datetime_convert()), + intval($_SESSION['uid']) + ); + + call_hooks('logged_in', $a->user); + } + +} +/* +class FKOAuth2 extends OAuth2 { + + private function db_secret($client_secret){ + return hash('whirlpool',$client_secret); + } + + public function addClient($client_id, $client_secret, $redirect_uri) { + $client_secret = $this->db_secret($client_secret); + $r = q("INSERT INTO clients (client_id, pw, redirect_uri) VALUES ('%s', '%s', '%s')", + dbesc($client_id), + dbesc($client_secret), + dbesc($redirect_uri) + ); + + return $r; + } + + protected function checkClientCredentials($client_id, $client_secret = NULL) { + $client_secret = $this->db_secret($client_secret); + + $r = q("SELECT pw FROM clients WHERE client_id = '%s'", + dbesc($client_id)); + + if ($client_secret === NULL) + return $result !== FALSE; + + return $result["client_secret"] == $client_secret; + } + + protected function getRedirectUri($client_id) { + $r = q("SELECT redirect_uri FROM clients WHERE client_id = '%s'", + dbesc($client_id)); + if ($r === FALSE) + return FALSE; + + return isset($r[0]["redirect_uri"]) && $r[0]["redirect_uri"] ? $r[0]["redirect_uri"] : NULL; + } + + protected function getAccessToken($oauth_token) { + $r = q("SELECT client_id, expires, scope FROM tokens WHERE id = '%s'", + dbesc($oauth_token)); + + if (count($r)) + return $r[0]; + return null; + } + + + + protected function setAccessToken($oauth_token, $client_id, $expires, $scope = NULL) { + $r = q("INSERT INTO tokens (id, client_id, expires, scope) VALUES ('%s', '%s', %d, '%s')", + dbesc($oauth_token), + dbesc($client_id), + intval($expires), + dbesc($scope)); + + return $r; + } + + protected function getSupportedGrantTypes() { + return array( + OAUTH2_GRANT_TYPE_AUTH_CODE, + ); + } + + + protected function getAuthCode($code) { + $r = q("SELECT id, client_id, redirect_uri, expires, scope FROM auth_codes WHERE id = '%s'", + dbesc($code)); + + if (count($r)) + return $r[0]; + return null; + } + + protected function setAuthCode($code, $client_id, $redirect_uri, $expires, $scope = NULL) { + $r = q("INSERT INTO auth_codes + (id, client_id, redirect_uri, expires, scope) VALUES + ('%s', '%s', '%s', %d, '%s')", + dbesc($code), + dbesc($client_id), + dbesc($redirect_uri), + intval($expires), + dbesc($scope)); + return $r; + } + +} +*/ |