aboutsummaryrefslogtreecommitdiffstats
path: root/Zotlabs/Module/Owa.php
blob: 900ab9f8597ea7e3e41634bbca084c112386b21f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
<?php

namespace Zotlabs\Module;

/**
 * OpenWebAuth verifier and token generator
 * See https://macgirvin.com/wiki/mike/OpenWebAuth/Home
 * Requests to this endpoint should be signed using HTTP Signatures
 * using the 'Authorization: Signature' authentication method
 * If the signature verifies a token is returned. 
 *
 * This token may be exchanged for an authenticated cookie. 
 */

class Owa extends \Zotlabs\Web\Controller {

	function init() {
		foreach([ 'REDIRECT_REMOTE_USER', 'HTTP_AUTHORIZATION' ] as $head) {

			if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,9) === 'Signature') {
				if($head !== 'HTTP_AUTHORIZATION') {
					$_SERVER['HTTP_AUTHORIZATION'] = $_SERVER[$head];
					continue;
				}

				$sigblock = \Zotlabs\Web\HTTPSig::parse_sigheader($_SERVER[$head]);
				if($sigblock) {
					$keyId = $sigblock['keyId'];

					if($keyId) {
						$r = q("select * from hubloc left join xchan on hubloc_hash = xchan_hash 
							where hubloc_addr = '%s' limit 1",
							dbesc(str_replace('acct:','',$keyId))
						);
						if($r) {
							$hubloc = $r[0];
							$verified = \Zotlabs\Web\HTTPSig::verify('',$hubloc['xchan_pubkey']);

							if($verified && $verified['header_signed'] && $verified['header_valid']) {
								$token = random_string(32);
								\Zotlabs\Zot\Verify::create('owt',0,$token,$r[0]['hubloc_addr']);
								$x = json_encode([ 'success' => true, 'token' => $token ]);
								header('Content-Type: application/x-zot+json');
								echo $x;
								killme();
							}
						}
					}
				}
			}
		}
		$x = json_encode([ 'success' => false ]);
		header('Content-Type: application/x-zot+json');
		echo $x;
		killme();	
	}
}