streams/Zotlabs/Module/Magic.php

136 lines
4 KiB
PHP
Raw Normal View History

2016-04-19 03:38:38 +00:00
<?php
namespace Zotlabs\Module;
2019-04-12 03:26:38 +00:00
use App;
use Zotlabs\Web\Controller;
2018-06-20 02:33:50 +00:00
use Zotlabs\Web\HTTPSig;
2018-09-28 03:13:00 +00:00
use Zotlabs\Lib\Libzot;
2019-04-12 03:26:38 +00:00
use Zotlabs\Lib\SConfig;
2018-06-01 02:42:13 +00:00
2016-04-19 03:38:38 +00:00
2019-04-12 03:26:38 +00:00
class Magic extends Controller {
2016-04-19 03:38:38 +00:00
function init() {
2019-04-12 03:26:38 +00:00
$ret = [
'success' => false,
'url' => '',
'message' => ''
];
2016-04-19 03:38:38 +00:00
logger('mod_magic: invoked', LOGGER_DEBUG);
2018-05-24 04:48:19 +00:00
logger('args: ' . print_r($_REQUEST,true),LOGGER_DATA);
2016-04-19 03:38:38 +00:00
2019-04-12 03:26:38 +00:00
$addr = ((x($_REQUEST,'addr')) ? $_REQUEST['addr'] : '');
$bdest = ((x($_REQUEST,'bdest')) ? $_REQUEST['bdest'] : '');
$dest = ((x($_REQUEST,'dest')) ? $_REQUEST['dest'] : '');
$rev = ((x($_REQUEST,'rev')) ? intval($_REQUEST['rev']) : 0);
$owa = ((x($_REQUEST,'owa')) ? intval($_REQUEST['owa']) : 0);
$delegate = ((x($_REQUEST,'delegate')) ? $_REQUEST['delegate'] : '');
2019-04-12 03:26:38 +00:00
// bdest is preferred as it is hex-encoded and can survive url rewrite and argument parsing
if ($bdest) {
2018-07-19 00:05:38 +00:00
$dest = hex2bin($bdest);
2019-04-12 03:26:38 +00:00
}
2016-04-19 03:38:38 +00:00
$parsed = parse_url($dest);
2018-10-10 04:08:57 +00:00
2019-04-12 03:26:38 +00:00
if (! $parsed) {
2016-04-19 03:38:38 +00:00
goaway($dest);
}
$basepath = $parsed['scheme'] . '://' . $parsed['host'] . (($parsed['port']) ? ':' . $parsed['port'] : '');
2019-04-12 03:26:38 +00:00
$owapath = SConfig::get($basepath,'system','openwebauth', $basepath . '/owa');
2016-04-19 03:38:38 +00:00
// This is ready-made for a plugin that provides a blacklist or "ask me" before blindly authenticating.
// By default, we'll proceed without asking.
2019-04-12 03:26:38 +00:00
$arr = [
2018-05-24 04:48:19 +00:00
'channel_id' => local_channel(),
2016-04-19 03:38:38 +00:00
'destination' => $dest,
2018-05-24 04:48:19 +00:00
'proceed' => true
2019-04-12 03:26:38 +00:00
];
2016-04-19 03:38:38 +00:00
call_hooks('magic_auth',$arr);
$dest = $arr['destination'];
2019-04-12 03:26:38 +00:00
if (! $arr['proceed']) {
2016-04-19 03:38:38 +00:00
goaway($dest);
}
2018-05-24 04:48:19 +00:00
if((get_observer_hash()) && (stripos($dest,z_root()) === 0)) {
2016-04-19 03:38:38 +00:00
// We are already authenticated on this site and a registered observer.
2019-04-12 03:26:38 +00:00
// First check if this is a delegate request on the local system and process accordingly.
// Otherwise redirect.
2016-04-19 03:38:38 +00:00
2019-04-12 03:26:38 +00:00
if ($delegate) {
2018-05-24 04:48:19 +00:00
2016-04-19 03:38:38 +00:00
$r = q("select * from channel left join hubloc on channel_hash = hubloc_hash where hubloc_addr = '%s' limit 1",
dbesc($delegate)
);
2019-04-12 03:26:38 +00:00
if ($r) {
2018-05-24 04:48:19 +00:00
$c = array_shift($r);
2019-04-12 03:26:38 +00:00
if (perm_is_allowed($c['channel_id'],get_observer_hash(),'delegate')) {
$tmp = $_SESSION;
2018-05-24 04:48:19 +00:00
$_SESSION['delegate_push'] = $tmp;
$_SESSION['delegate_channel'] = $c['channel_id'];
$_SESSION['delegate'] = get_observer_hash();
$_SESSION['account_id'] = intval($c['channel_account_id']);
change_channel($c['channel_id']);
2016-04-19 03:38:38 +00:00
}
}
2018-05-24 04:48:19 +00:00
}
2016-04-19 03:38:38 +00:00
goaway($dest);
}
2019-04-12 03:26:38 +00:00
if (local_channel()) {
$channel = App::get_channel();
2016-04-19 03:38:38 +00:00
2017-09-08 00:56:02 +00:00
// OpenWebAuth
2019-04-12 03:26:38 +00:00
if ($owa) {
2017-09-08 00:56:02 +00:00
$dest = strip_zids($dest);
$dest = strip_query_param($dest,'f');
2019-04-12 03:26:38 +00:00
// We now post to the OWA endpoint. This improves security by providing a signed digest
2018-10-10 04:08:57 +00:00
$data = json_encode([ 'OpenWebAuth' => random_string() ]);
2017-09-08 00:56:02 +00:00
$headers = [];
$headers['Accept'] = 'application/x-zot+json' ;
2018-10-10 05:32:20 +00:00
$headers['Content-Type'] = 'application/x-zot+json' ;
2017-09-08 00:56:02 +00:00
$headers['X-Open-Web-Auth'] = random_string();
2018-10-10 04:08:57 +00:00
$headers['Digest'] = HTTPSig::generate_digest_header($data);
$headers['Host'] = $parsed['host'];
2018-10-17 02:32:17 +00:00
$headers['(request-target)'] = 'post ' . '/owa';
2018-10-10 04:08:57 +00:00
2018-06-20 05:11:31 +00:00
$headers = HTTPSig::create_sig($headers,$channel['channel_prvkey'], channel_url($channel),true,'sha512');
2019-04-12 03:26:38 +00:00
$x = z_post_url($owapath,$data,$redirects,[ 'headers' => $headers ]);
2018-10-17 02:32:17 +00:00
logger('owa fetch returned: ' . print_r($x,true),LOGGER_DATA);
2019-04-12 03:26:38 +00:00
if ($x['success']) {
2017-09-08 00:56:02 +00:00
$j = json_decode($x['body'],true);
2019-04-12 03:26:38 +00:00
if ($j['success'] && $j['encrypted_token']) {
// decrypt the token using our private key
2017-10-26 22:23:04 +00:00
$token = '';
2018-05-24 04:48:19 +00:00
openssl_private_decrypt(base64url_decode($j['encrypted_token']),$token,$channel['channel_prvkey']);
2017-10-26 22:23:04 +00:00
$x = strpbrk($dest,'?&');
2019-04-12 03:26:38 +00:00
// redirect using the encrypted token which will be exchanged for an authenticated session
2017-10-26 22:23:04 +00:00
$args = (($x) ? '&owt=' . $token : '?f=&owt=' . $token) . (($delegate) ? '&delegate=1' : '');
2017-09-08 00:56:02 +00:00
goaway($dest . $args);
}
}
2016-04-19 03:38:38 +00:00
}
}
2018-05-24 04:48:19 +00:00
goaway($dest);
2016-04-19 03:38:38 +00:00
}
}