mirror of
https://github.com/friendica/friendica
synced 2025-04-23 07:10:14 +00:00
port hubzillas OpenWebAuth - remote authentification
This commit is contained in:
parent
5fb8c758fd
commit
1c7f4e3c63
16 changed files with 1151 additions and 41 deletions
121
src/Module/Magic.php
Normal file
121
src/Module/Magic.php
Normal file
|
@ -0,0 +1,121 @@
|
|||
<?php
|
||||
/**
|
||||
* @file src/Module/Magic.php
|
||||
*/
|
||||
namespace Friendica\Module;
|
||||
|
||||
use Friendica\BaseModule;
|
||||
use Friendica\Database\DBM;
|
||||
use Friendica\Network\Probe;
|
||||
use Friendica\Util\HTTPSig;
|
||||
use Friendica\Util\Network;
|
||||
|
||||
use dba;
|
||||
|
||||
class Magic extends BaseModule
|
||||
{
|
||||
public static function init()
|
||||
{
|
||||
$a = self::getApp();
|
||||
$ret = ['success' => false, 'url' => '', 'message' => ''];
|
||||
logger('magic mdule: invoked', LOGGER_DEBUG);
|
||||
|
||||
logger('args: ' . print_r($_REQUEST, true), LOGGER_DATA);
|
||||
|
||||
$addr = ((x($_REQUEST, 'addr')) ? $_REQUEST['addr'] : '');
|
||||
$dest = ((x($_REQUEST, 'dest')) ? $_REQUEST['dest'] : '');
|
||||
$test = ((x($_REQUEST, 'test')) ? intval($_REQUEST['test']) : 0);
|
||||
$owa = ((x($_REQUEST, 'owa')) ? intval($_REQUEST['owa']) : 0);
|
||||
|
||||
// NOTE: I guess $dest isn't just the profile url (could be also
|
||||
// other profile pages e.g. photo). We need to find a solution
|
||||
// to be able to redirct to other pages than the contact profile.
|
||||
$fields = ["id", "nurl", "url"];
|
||||
$condition = ["nurl" => normalise_link($dest)];
|
||||
|
||||
$contact = dba::selectFirst("contact", $fields, $condition);
|
||||
|
||||
if (!DBM::is_result($contact)) {
|
||||
// If we don't have a contact record, try to probe it.
|
||||
/// @todo: Also check against the $addr.
|
||||
Probe::uri($dest, '', -1, true, true);
|
||||
$contact = dba::selectFirst("contact", $fields, $condition);
|
||||
}
|
||||
|
||||
if (!DBM::is_result($contact)) {
|
||||
logger("No contact record found: " . print_r($_REQUEST, true), LOGGER_DEBUG);
|
||||
goaway($dest);
|
||||
}
|
||||
|
||||
// Redirect if the contact is already authenticated on this site.
|
||||
if (array_key_exists("id", $a->contact) && strpos($contact['nurl'], normalise_link(self::getApp()->get_baseurl())) !== false) {
|
||||
if($test) {
|
||||
$ret['success'] = true;
|
||||
$ret['message'] .= 'Local site - you are already authenticated.' . EOL;
|
||||
return $ret;
|
||||
}
|
||||
|
||||
logger("Contact is already authenticated", LOGGER_DEBUG);
|
||||
goaway($dest);
|
||||
}
|
||||
|
||||
if (local_user()) {
|
||||
$user = $a->user;
|
||||
|
||||
// OpenWebAuth
|
||||
if ($owa) {
|
||||
// Extract the basepath
|
||||
// NOTE: we need another solution because this does only work
|
||||
// for friendica contacts :-/ . We should have the basepath
|
||||
// of a contact also in the contact table.
|
||||
$exp = explode("/profile/", $contact['url']);
|
||||
$basepath = $exp[0];
|
||||
|
||||
$headers = [];
|
||||
$headers['Accept'] = 'application/x-dfrn+json';
|
||||
$headers['X-Open-Web-Auth'] = random_string();
|
||||
|
||||
// Create a header that is signed with the local users private key.
|
||||
$headers = HTTPSig::createSig(
|
||||
'',
|
||||
$headers,
|
||||
$user['prvkey'],
|
||||
'acct:' . $user['nickname'] . '@' . $a->get_hostname() . ($a->path ? '/' . $a->path : ''),
|
||||
false,
|
||||
true,
|
||||
'sha512'
|
||||
);
|
||||
|
||||
// Try to get an authentication token from the other instance.
|
||||
$x = Network::curl($basepath . '/owa', false, $redirects, ['headers' => $headers]);
|
||||
|
||||
if ($x['success']) {
|
||||
$j = json_decode($x['body'], true);
|
||||
|
||||
if ($j['success']) {
|
||||
$token = '';
|
||||
if ($j['encrypted_token']) {
|
||||
// The token is encrypted. If the local user is really the one the other instance
|
||||
// thinks he/she is, the token can be decrypted with the local users public key.
|
||||
openssl_private_decrypt(base64url_decode($j['encrypted_token']), $token, $user['prvkey']);
|
||||
} else {
|
||||
$token = $j['token'];
|
||||
}
|
||||
$x = strpbrk($dest, '?&');
|
||||
$args = (($x) ? '&owt=' . $token : '?f=&owt=' . $token);
|
||||
|
||||
goaway($dest . $args);
|
||||
}
|
||||
}
|
||||
goaway($dest);
|
||||
}
|
||||
}
|
||||
|
||||
if($test) {
|
||||
$ret['message'] = 'Not authenticated or invalid arguments' . EOL;
|
||||
return $ret;
|
||||
}
|
||||
|
||||
goaway($dest);
|
||||
}
|
||||
}
|
94
src/Module/Owa.php
Normal file
94
src/Module/Owa.php
Normal file
|
@ -0,0 +1,94 @@
|
|||
<?php
|
||||
/**
|
||||
* @file src/Module/Owa.php
|
||||
*/
|
||||
namespace Friendica\Module;
|
||||
|
||||
use Friendica\BaseModule;
|
||||
use Friendica\Core\System;
|
||||
use Friendica\Database\DBM;
|
||||
use Friendica\Model\Verify;
|
||||
use Friendica\Network\Probe;
|
||||
use Friendica\Util\DateTimeFormat;
|
||||
use Friendica\Util\HTTPSig;
|
||||
|
||||
use dba;
|
||||
|
||||
/**
|
||||
* @brief OpenWebAuth verifier and token generator
|
||||
*
|
||||
* See https://macgirvin.com/wiki/mike/OpenWebAuth/Home
|
||||
* Requests to this endpoint should be signed using HTTP Signatures
|
||||
* using the 'Authorization: Signature' authentication method
|
||||
* If the signature verifies a token is returned.
|
||||
*
|
||||
* This token may be exchanged for an authenticated cookie.
|
||||
*/
|
||||
class Owa extends BaseModule
|
||||
{
|
||||
public static function init()
|
||||
{
|
||||
|
||||
$ret = [ 'success' => false ];
|
||||
|
||||
foreach (['REDIRECT_REMOTE_USER', 'HTTP_AUTHORIZATION'] as $head) {
|
||||
if (array_key_exists($head, $_SERVER) && substr(trim($_SERVER[$head]), 0, 9) === 'Signature') {
|
||||
if ($head !== 'HTTP_AUTHORIZATION') {
|
||||
$_SERVER['HTTP_AUTHORIZATION'] = $_SERVER[$head];
|
||||
continue;
|
||||
}
|
||||
|
||||
$sigblock = HTTPSig::parseSigheader($_SERVER[$head]);
|
||||
if ($sigblock) {
|
||||
$keyId = $sigblock['keyId'];
|
||||
|
||||
if ($keyId) {
|
||||
// Try to find the public contact entry of the handle.
|
||||
$handle = str_replace("acct:", "", $keyId);
|
||||
$fields = ["id", "url", "addr", "pubkey"];
|
||||
$condition = ["addr" => $handle, "uid" => 0];
|
||||
|
||||
$contact = dba::selectFirst("contact", $fields, $condition);
|
||||
|
||||
// Not found? Try to probe with the handle.
|
||||
if(!DBM::is_result($contact)) {
|
||||
Probe::uri($handle, '', -1, true, true);
|
||||
$contact = dba::selectFirst("contact", $fields, $condition);
|
||||
}
|
||||
|
||||
if (DBM::is_result($contact)) {
|
||||
// Try to verify the signed header with the public key of the contact record
|
||||
// we have found.
|
||||
$verified = HTTPSig::verify('', $contact['pubkey']);
|
||||
|
||||
if ($verified && $verified['header_signed'] && $verified['header_valid']) {
|
||||
logger('OWA header: ' . print_r($verified, true), LOGGER_DATA);
|
||||
logger('OWA success: ' . $contact['addr'], LOGGER_DATA);
|
||||
|
||||
$ret['success'] = true;
|
||||
$token = random_string(32);
|
||||
|
||||
// Store the generated token in the databe.
|
||||
Verify::create('owt', 0, $token, $contact['addr']);
|
||||
|
||||
$result = '';
|
||||
|
||||
// Encrypt the token with the public contacts publik key.
|
||||
// Only the specific public contact will be able to encrypt it.
|
||||
// At a later time, we will compare weather the token we're getting
|
||||
// is really the same token we have stored in the database.
|
||||
openssl_public_encrypt($token, $result, $contact['pubkey']);
|
||||
$ret['encrypted_token'] = base64url_encode($result);
|
||||
} else {
|
||||
logger('OWA fail: ' . $contact['id'] . ' ' . $contact['addr'] . ' ' . $contact['url'], LOGGER_DEBUG);
|
||||
}
|
||||
} else {
|
||||
logger('Contact not found: ' . $handle, LOGGER_DEBUG);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
System::jsonExit($ret, 'application/x-dfrn+json');
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue