3 * Laconica - a distributed open-source microblogging tool
4 * Copyright (C) 2008, Controlez-Vous, Inc.
6 * This program is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU Affero General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU Affero General Public License for more details.
16 * You should have received a copy of the GNU Affero General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 if (!defined('LACONICA')) { exit(1); }
22 require_once(INSTALLDIR.'/lib/omb.php');
24 class FinishremotesubscribeAction extends Action {
26 function handle($args) {
28 parent::handle($args);
30 if (common_logged_in()) {
31 common_user_error(_('You can use the local subscription!'));
35 $omb = $_SESSION['oauth_authorization_request'];
38 common_user_error(_('Not expecting this response!'));
42 common_debug('stored request: '.print_r($omb,true), __FILE__);
44 common_remove_magic_from_request();
45 $req = OAuthRequest::from_request();
47 $token = $req->get_parameter('oauth_token');
49 # I think this is the success metric
51 if ($token != $omb['token']) {
52 common_user_error(_('Not authorized.'));
56 $version = $req->get_parameter('omb_version');
58 if ($version != OMB_VERSION_01) {
59 common_user_error(_('Unknown version of OMB protocol.'));
63 $nickname = $req->get_parameter('omb_listener_nickname');
66 common_user_error(_('No nickname provided by remote server.'));
70 $profile_url = $req->get_parameter('omb_listener_profile');
73 common_user_error(_('No profile URL returned by server.'));
77 if (!Validate::uri($profile_url, array('allowed_schemes' => array('http', 'https')))) {
78 common_user_error(_('Invalid profile URL returned by server.'));
82 if ($profile_url == common_local_url('showstream', array('nickname' => $nickname))) {
83 common_user_error(_('You can use the local subscription!'));
87 common_debug('listenee: "'.$omb['listenee'].'"', __FILE__);
89 $user = User::staticGet('nickname', $omb['listenee']);
92 common_user_error(_('User being listened to doesn\'t exist.'));
96 $other = User::staticGet('uri', $omb['listener']);
99 common_user_error(_('You can use the local subscription!'));
103 $fullname = $req->get_parameter('omb_listener_fullname');
104 $homepage = $req->get_parameter('omb_listener_homepage');
105 $bio = $req->get_parameter('omb_listener_bio');
106 $location = $req->get_parameter('omb_listener_location');
107 $avatar_url = $req->get_parameter('omb_listener_avatar');
109 list($newtok, $newsecret) = $this->access_token($omb);
111 if (!$newtok || !$newsecret) {
112 common_user_error(_('Couldn\'t convert request tokens to access tokens.'));
116 # XXX: possible attack point; subscribe and return someone else's profile URI
118 $remote = Remote_profile::staticGet('uri', $omb['listener']);
122 $profile = Profile::staticGet($remote->id);
123 $orig_remote = clone($remote);
124 $orig_profile = clone($profile);
125 # XXX: compare current postNotice and updateProfile URLs to the ones
126 # stored in the DB to avoid (possibly...) above attack
129 $remote = new Remote_profile();
130 $remote->uri = $omb['listener'];
131 $profile = new Profile();
134 $profile->nickname = $nickname;
135 $profile->profileurl = $profile_url;
138 $profile->fullname = $fullname;
141 $profile->homepage = $homepage;
144 $profile->bio = $bio;
147 $profile->location = $location;
151 $profile->update($orig_profile);
153 $profile->created = DB_DataObject_Cast::dateTime(); # current time
154 $id = $profile->insert();
156 common_server_error(_('Error inserting new profile'));
163 if (!$this->add_avatar($profile, $avatar_url)) {
164 common_server_error(_('Error inserting avatar'));
169 $remote->postnoticeurl = $omb['post_notice_url'];
170 $remote->updateprofileurl = $omb['update_profile_url'];
173 if (!$remote->update($orig_remote)) {
174 common_server_error(_('Error updating remote profile'));
178 $remote->created = DB_DataObject_Cast::dateTime(); # current time
179 if (!$remote->insert()) {
180 common_server_error(_('Error inserting remote profile'));
185 if ($user->hasBlocked($profile)) {
186 $this->client_error(_('That user has blocked you from subscribing.'));
190 $sub = new Subscription();
192 $sub->subscriber = $remote->id;
193 $sub->subscribed = $user->id;
197 if ($sub->find(true)) {
199 $orig_sub = clone($sub);
202 $sub->created = DB_DataObject_Cast::dateTime(); # current time
205 $sub->token = $newtok;
206 $sub->secret = $newsecret;
209 $result = $sub->update($orig_sub);
211 $result = $sub->insert();
215 common_log_db_error($sub, ($sub_exists) ? 'UPDATE' : 'INSERT', __FILE__);
216 common_user_error(_('Couldn\'t insert new subscription.'));
220 # Notify user, if necessary
222 mail_subscribe_notify_profile($user, $profile);
225 unset($_SESSION['oauth_authorization_request']);
227 # If we show subscriptions in reverse chron order, this should
228 # show up close to the top of the page
230 common_redirect(common_local_url('subscribers', array('nickname' =>
234 function add_avatar($profile, $url) {
235 $temp_filename = tempnam(sys_get_temp_dir(), 'listener_avatar');
236 copy($url, $temp_filename);
237 return $profile->setOriginal($temp_filename);
240 function access_token($omb) {
242 common_debug('starting request for access token', __FILE__);
244 $con = omb_oauth_consumer();
245 $tok = new OAuthToken($omb['token'], $omb['secret']);
247 common_debug('using request token "'.$tok.'"', __FILE__);
249 $url = $omb['access_token_url'];
251 common_debug('using access token url "'.$url.'"', __FILE__);
253 # XXX: Is this the right thing to do? Strip off GET params and make them
254 # POST params? Seems wrong to me.
256 $parsed = parse_url($url);
258 parse_str($parsed['query'], $params);
260 $req = OAuthRequest::from_consumer_and_token($con, $tok, "POST", $url, $params);
262 $req->set_parameter('omb_version', OMB_VERSION_01);
264 # XXX: test to see if endpoint accepts this signature method
266 $req->sign_request(omb_hmac_sha1(), $con, $tok);
268 # We re-use this tool's fetcher, since it's pretty good
270 common_debug('posting to access token url "'.$req->get_normalized_http_url().'"', __FILE__);
271 common_debug('posting request data "'.$req->to_postdata().'"', __FILE__);
273 $fetcher = Auth_Yadis_Yadis::getHTTPFetcher();
274 $result = $fetcher->post($req->get_normalized_http_url(),
276 array('User-Agent' => 'Laconica/' . LACONICA_VERSION));
278 common_debug('got result: "'.print_r($result,TRUE).'"', __FILE__);
280 if ($result->status != 200) {
284 parse_str($result->body, $return);
286 return array($return['oauth_token'], $return['oauth_token_secret']);