2017-12-04 19:09:23 +00:00
|
|
|
<?php
|
2017-12-17 20:34:29 +00:00
|
|
|
|
2017-12-04 19:09:23 +00:00
|
|
|
/**
|
|
|
|
* @file src/Protocol/FKOAuthDataStore.php
|
|
|
|
* OAuth server
|
|
|
|
* Based on oauth2-php <http://code.google.com/p/oauth2-php/>
|
|
|
|
*
|
|
|
|
*/
|
2017-12-17 20:34:29 +00:00
|
|
|
|
2017-12-04 20:59:21 +00:00
|
|
|
namespace Friendica\Network;
|
2017-12-04 19:09:23 +00:00
|
|
|
|
|
|
|
use Friendica\App;
|
|
|
|
use Friendica\Core\Config;
|
|
|
|
use Friendica\Core\System;
|
|
|
|
use Friendica\Database\DBM;
|
|
|
|
use dba;
|
2017-12-05 02:13:58 +00:00
|
|
|
use OAuthDataStore;
|
2017-12-04 19:09:23 +00:00
|
|
|
|
|
|
|
define('REQUEST_TOKEN_DURATION', 300);
|
|
|
|
define('ACCESS_TOKEN_DURATION', 31536000);
|
|
|
|
|
2017-12-17 20:24:57 +00:00
|
|
|
require_once 'include/dba.php';
|
|
|
|
|
2017-12-04 19:09:23 +00:00
|
|
|
require_once "library/OAuth1.php";
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief OAuthDataStore class
|
|
|
|
*/
|
|
|
|
class FKOAuthDataStore extends OAuthDataStore
|
|
|
|
{
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function genToken()
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
|
|
|
return md5(base64_encode(pack('N6', mt_rand(), mt_rand(), mt_rand(), mt_rand(), mt_rand(), uniqid())));
|
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @param string $consumer_key key
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2017-12-05 02:00:47 +00:00
|
|
|
public function lookup_consumer($consumer_key)
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
2017-12-17 20:34:29 +00:00
|
|
|
logger(__function__ . ":" . $consumer_key);
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
$s = dba::select('clients', array('client_id', 'pw', 'redirect_uri'), array('client_id' => $consumer_key));
|
2017-12-17 20:31:37 +00:00
|
|
|
$r = dba::inArray($s);
|
2017-12-04 19:09:23 +00:00
|
|
|
|
|
|
|
if (DBM::is_result($r)) {
|
2017-12-17 20:24:57 +00:00
|
|
|
return new \OAuthConsumer($r[0]['client_id'], $r[0]['pw'], $r[0]['redirect_uri']);
|
2017-12-04 19:09:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @param string $consumer consumer
|
|
|
|
* @param string $token_type type
|
|
|
|
* @param string $token token
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2017-12-05 02:00:47 +00:00
|
|
|
public function lookup_token($consumer, $token_type, $token)
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
2017-12-17 20:34:29 +00:00
|
|
|
logger(__function__ . ":" . $consumer . ", " . $token_type . ", " . $token);
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
$s = dba::select('tokens', array('id', 'secret', 'scope', 'expires', 'uid'), array('client_id' => $consumer->key, 'scope' => $token_type, 'id' => $token));
|
|
|
|
$r = dba::inArray($s);
|
|
|
|
|
2017-12-04 19:09:23 +00:00
|
|
|
if (DBM::is_result($r)) {
|
2017-12-17 20:24:57 +00:00
|
|
|
$ot = new \OAuthToken($r[0]['id'], $r[0]['secret']);
|
2017-12-04 19:52:04 +00:00
|
|
|
$ot->scope = $r[0]['scope'];
|
2017-12-04 19:09:23 +00:00
|
|
|
$ot->expires = $r[0]['expires'];
|
|
|
|
$ot->uid = $r[0]['uid'];
|
|
|
|
return $ot;
|
|
|
|
}
|
2017-12-04 19:52:04 +00:00
|
|
|
|
2017-12-04 19:09:23 +00:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @param string $consumer consumer
|
|
|
|
* @param string $token token
|
|
|
|
* @param string $nonce nonce
|
|
|
|
* @param string $timestamp timestamp
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2017-12-05 02:00:47 +00:00
|
|
|
public function lookup_nonce($consumer, $token, $nonce, $timestamp)
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
2018-01-11 08:26:30 +00:00
|
|
|
$token = dba::selectFirst('tokens', ['id', 'secret'], ['client_id' => $consumer->key, 'id' => $nonce, 'expires' => $timestamp]);
|
|
|
|
if (DBM::is_result($token)) {
|
|
|
|
return new \OAuthToken($token['id'], $token['secret']);
|
2017-12-04 19:09:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @param string $consumer consumer
|
|
|
|
* @param string $callback optional, default null
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2017-12-05 02:00:47 +00:00
|
|
|
public function new_request_token($consumer, $callback = null)
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
2017-12-17 20:34:29 +00:00
|
|
|
logger(__function__ . ":" . $consumer . ", " . $callback);
|
2017-12-04 19:52:04 +00:00
|
|
|
$key = self::genToken();
|
|
|
|
$sec = self::genToken();
|
2017-12-04 19:09:23 +00:00
|
|
|
|
|
|
|
if ($consumer->key) {
|
|
|
|
$k = $consumer->key;
|
|
|
|
} else {
|
|
|
|
$k = $consumer;
|
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
$r = dba::insert(
|
|
|
|
'tokens',
|
|
|
|
array(
|
|
|
|
'id' => $key,
|
|
|
|
'secret' => $sec,
|
|
|
|
'client_id' => $k,
|
|
|
|
'scope' => 'request',
|
2017-12-17 20:31:37 +00:00
|
|
|
'expires' => time() + REQUEST_TOKEN_DURATION)
|
2017-12-04 19:09:23 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
if (!$r) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2017-12-17 20:24:57 +00:00
|
|
|
return new \OAuthToken($key, $sec);
|
2017-12-04 19:09:23 +00:00
|
|
|
}
|
|
|
|
|
2017-12-04 19:52:04 +00:00
|
|
|
/**
|
|
|
|
* @param string $token token
|
|
|
|
* @param string $consumer consumer
|
|
|
|
* @param string $verifier optional, defult null
|
|
|
|
* @return object
|
|
|
|
*/
|
2017-12-05 02:00:47 +00:00
|
|
|
public function new_access_token($token, $consumer, $verifier = null)
|
2017-12-04 19:09:23 +00:00
|
|
|
{
|
2017-12-17 20:34:29 +00:00
|
|
|
logger(__function__ . ":" . $token . ", " . $consumer . ", " . $verifier);
|
2017-12-04 19:09:23 +00:00
|
|
|
|
|
|
|
// return a new access token attached to this consumer
|
|
|
|
// for the user associated with this token if the request token
|
|
|
|
// is authorized
|
|
|
|
// should also invalidate the request token
|
|
|
|
|
|
|
|
$ret = null;
|
|
|
|
|
|
|
|
// get user for this verifier
|
|
|
|
$uverifier = Config::get("oauth", $verifier);
|
2017-12-17 20:34:29 +00:00
|
|
|
logger(__function__ . ":" . $verifier . "," . $uverifier);
|
2017-12-04 19:09:23 +00:00
|
|
|
|
2017-12-17 20:34:29 +00:00
|
|
|
if (is_null($verifier) || ($uverifier !== false)) {
|
2017-12-04 19:52:04 +00:00
|
|
|
$key = self::genToken();
|
|
|
|
$sec = self::genToken();
|
|
|
|
$r = dba::insert(
|
|
|
|
'tokens',
|
|
|
|
array(
|
|
|
|
'id' => $key,
|
|
|
|
'secret' => $sec,
|
|
|
|
'client_id' => $consumer->key,
|
|
|
|
'scope' => 'access',
|
2017-12-17 20:31:37 +00:00
|
|
|
'expires' => time() + ACCESS_TOKEN_DURATION,
|
2017-12-04 19:52:04 +00:00
|
|
|
'uid' => $uverifier)
|
2017-12-04 19:09:23 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
if ($r) {
|
2017-12-17 20:24:57 +00:00
|
|
|
$ret = new \OAuthToken($key, $sec);
|
2017-12-04 19:09:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dba::delete('tokens', array('id' => $token->key));
|
|
|
|
|
2017-12-06 19:57:06 +00:00
|
|
|
if (!is_null($ret) && !is_null($uverifier)) {
|
2017-12-04 19:09:23 +00:00
|
|
|
Config::delete("oauth", $verifier);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $ret;
|
|
|
|
}
|
|
|
|
}
|