mirror of
https://codeberg.org/streams/streams.git
synced 2024-09-22 19:15:19 +00:00
161 lines
4.4 KiB
PHP
161 lines
4.4 KiB
PHP
<?php
|
|
namespace Zotlabs\Module;
|
|
|
|
use Zotlabs\Web\HTTPSig;
|
|
|
|
|
|
class Magic extends \Zotlabs\Web\Controller {
|
|
|
|
function init() {
|
|
|
|
$ret = array('success' => false, 'url' => '', 'message' => '');
|
|
logger('mod_magic: invoked', LOGGER_DEBUG);
|
|
|
|
logger('args: ' . print_r($_REQUEST,true),LOGGER_DATA);
|
|
|
|
$addr = ((x($_REQUEST,'addr')) ? $_REQUEST['addr'] : '');
|
|
$bdest = ((x($_REQUEST,'bdest')) ? $_REQUEST['bdest'] : '');
|
|
$dest = ((x($_REQUEST,'dest')) ? $_REQUEST['dest'] : '');
|
|
$rev = ((x($_REQUEST,'rev')) ? intval($_REQUEST['rev']) : 0);
|
|
$owa = ((x($_REQUEST,'owa')) ? intval($_REQUEST['owa']) : 0);
|
|
$delegate = ((x($_REQUEST,'delegate')) ? $_REQUEST['delegate'] : '');
|
|
|
|
if($bdest)
|
|
$dest = hex2bin($bdest);
|
|
|
|
$parsed = parse_url($dest);
|
|
if(! $parsed) {
|
|
if($test) {
|
|
$ret['message'] .= 'could not parse ' . $dest . EOL;
|
|
return($ret);
|
|
}
|
|
goaway($dest);
|
|
}
|
|
|
|
$basepath = $parsed['scheme'] . '://' . $parsed['host'] . (($parsed['port']) ? ':' . $parsed['port'] : '');
|
|
|
|
$x = q("select * from hubloc where hubloc_url = '%s' order by hubloc_connected desc limit 1",
|
|
dbesc($basepath)
|
|
);
|
|
|
|
if(! $x) {
|
|
|
|
/*
|
|
* We have no records for, or prior communications with this hub.
|
|
* If an address was supplied, let's finger them to create a hub record.
|
|
* Otherwise we'll use the special address '[system]' which will return
|
|
* either a system channel or the first available normal channel. We don't
|
|
* really care about what channel is returned - we need the hub information
|
|
* from that response so that we can create signed auth packets destined
|
|
* for that hub.
|
|
*
|
|
*/
|
|
|
|
$j = \Zotlabs\Zot\Finger::run((($addr) ? $addr : '[system]@' . $parsed['host']),null);
|
|
if($j['success']) {
|
|
import_xchan($j);
|
|
|
|
// Now try again
|
|
|
|
$x = q("select * from hubloc where hubloc_url = '%s' order by hubloc_connected desc limit 1",
|
|
dbesc($basepath)
|
|
);
|
|
}
|
|
}
|
|
|
|
if(! $x) {
|
|
if($rev)
|
|
goaway($dest);
|
|
else {
|
|
logger('mod_magic: no channels found for requested hub.' . print_r($_REQUEST,true));
|
|
if($test) {
|
|
$ret['message'] .= 'This site has no previous connections with ' . $basepath . EOL;
|
|
return $ret;
|
|
}
|
|
notice( t('Hub not found.') . EOL);
|
|
return;
|
|
}
|
|
}
|
|
|
|
|
|
// This is ready-made for a plugin that provides a blacklist or "ask me" before blindly authenticating.
|
|
// By default, we'll proceed without asking.
|
|
|
|
$arr = array(
|
|
'channel_id' => local_channel(),
|
|
'xchan' => $x[0],
|
|
'destination' => $dest,
|
|
'proceed' => true
|
|
);
|
|
|
|
call_hooks('magic_auth',$arr);
|
|
$dest = $arr['destination'];
|
|
if(! $arr['proceed']) {
|
|
if($test) {
|
|
$ret['message'] .= 'cancelled by plugin.' . EOL;
|
|
return $ret;
|
|
}
|
|
goaway($dest);
|
|
}
|
|
|
|
if((get_observer_hash()) && (stripos($dest,z_root()) === 0)) {
|
|
|
|
// We are already authenticated on this site and a registered observer.
|
|
// Just redirect.
|
|
|
|
if($delegate) {
|
|
|
|
$r = q("select * from channel left join hubloc on channel_hash = hubloc_hash where hubloc_addr = '%s' limit 1",
|
|
dbesc($delegate)
|
|
);
|
|
|
|
if($r) {
|
|
$c = array_shift($r);
|
|
if(perm_is_allowed($c['channel_id'],get_observer_hash(),'delegate')) {
|
|
$tmp = $_SESSION;
|
|
$_SESSION['delegate_push'] = $tmp;
|
|
$_SESSION['delegate_channel'] = $c['channel_id'];
|
|
$_SESSION['delegate'] = get_observer_hash();
|
|
$_SESSION['account_id'] = intval($c['channel_account_id']);
|
|
|
|
change_channel($c['channel_id']);
|
|
}
|
|
}
|
|
}
|
|
|
|
goaway($dest);
|
|
}
|
|
|
|
if(local_channel()) {
|
|
$channel = \App::get_channel();
|
|
|
|
// OpenWebAuth
|
|
|
|
if($owa) {
|
|
|
|
$dest = strip_zids($dest);
|
|
$dest = strip_query_param($dest,'f');
|
|
|
|
$headers = [];
|
|
$headers['Accept'] = 'application/x-zot+json' ;
|
|
$headers['X-Open-Web-Auth'] = random_string();
|
|
$headers = HTTPSig::create_sig($headers,$channel['channel_prvkey'], channel_url($channel),true,'sha512');
|
|
$x = z_fetch_url($basepath . '/owa',false,$redirects,[ 'headers' => $headers ]);
|
|
|
|
if($x['success']) {
|
|
$j = json_decode($x['body'],true);
|
|
if($j['success'] && $j['encrypted_token']) {
|
|
$token = '';
|
|
openssl_private_decrypt(base64url_decode($j['encrypted_token']),$token,$channel['channel_prvkey']);
|
|
$x = strpbrk($dest,'?&');
|
|
$args = (($x) ? '&owt=' . $token : '?f=&owt=' . $token) . (($delegate) ? '&delegate=1' : '');
|
|
goaway($dest . $args);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
goaway($dest);
|
|
}
|
|
|
|
}
|