]> git.mxchange.org Git - friendica.git/blobdiff - include/oauth.php
Issue-#3873
[friendica.git] / include / oauth.php
index b8430920764ac801958032cc0479c2743fef3d1e..c916b6cec525f5b45874c2096e847695d71f296c 100644 (file)
@@ -1,10 +1,15 @@
 <?php
-/** 
+/**
  * OAuth server
  * Based on oauth2-php <http://code.google.com/p/oauth2-php/>
- * 
+ *
  */
 
+use Friendica\App;
+use Friendica\Core\Config;
+use Friendica\Core\PConfig;
+use Friendica\Core\System;
+
 define('REQUEST_TOKEN_DURATION', 300);
 define('ACCESS_TOKEN_DURATION', 31536000);
 
@@ -15,29 +20,31 @@ class FKOAuthDataStore extends OAuthDataStore {
   function gen_token(){
                return md5(base64_encode(pack('N6', mt_rand(), mt_rand(), mt_rand(), mt_rand(), mt_rand(), uniqid())));
   }
-       
+
   function lookup_consumer($consumer_key) {
+               logger(__function__.":".$consumer_key);
       //echo "<pre>"; var_dump($consumer_key); killme();
-         
+
                $r = q("SELECT client_id, pw, redirect_uri FROM clients WHERE client_id='%s'",
                        dbesc($consumer_key)
                );
-               if (count($r))
+               if (dbm::is_result($r))
                        return new OAuthConsumer($r[0]['client_id'],$r[0]['pw'],$r[0]['redirect_uri']);
                return null;
   }
 
   function lookup_token($consumer, $token_type, $token) {
-               //echo __file__.":".__line__."<pre>"; var_dump($consumer, $token_type, $token); killme();
-               $r = q("SELECT id, secret,scope, expires  FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'",
+               logger(__function__.":".$consumer.", ". $token_type.", ".$token);
+               $r = q("SELECT id, secret,scope, expires, uid  FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'",
                        dbesc($consumer->key),
                        dbesc($token_type),
                        dbesc($token)
                );
-               if (count($r)){
+               if (dbm::is_result($r)){
                        $ot=new OAuthToken($r[0]['id'],$r[0]['secret']);
                        $ot->scope=$r[0]['scope'];
                        $ot->expires = $r[0]['expires'];
+                       $ot->uid = $r[0]['uid'];
                        return $ot;
                }
                return null;
@@ -50,18 +57,26 @@ class FKOAuthDataStore extends OAuthDataStore {
                        dbesc($nonce),
                        intval($timestamp)
                );
-               if (count($r))
+               if (dbm::is_result($r))
                        return new OAuthToken($r[0]['id'],$r[0]['secret']);
                return null;
   }
 
   function new_request_token($consumer, $callback = null) {
+               logger(__function__.":".$consumer.", ". $callback);
                $key = $this->gen_token();
                $sec = $this->gen_token();
+
+               if ($consumer->key){
+                       $k = $consumer->key;
+               } else {
+                       $k = $consumer;
+               }
+
                $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)",
                                dbesc($key),
                                dbesc($sec),
-                               dbesc($consumer->key),
+                               dbesc($k),
                                'request',
                                intval(REQUEST_TOKEN_DURATION));
                if (!$r) return null;
@@ -69,45 +84,47 @@ class FKOAuthDataStore extends OAuthDataStore {
   }
 
   function new_access_token($token, $consumer, $verifier = null) {
+    logger(__function__.":".$token.", ". $consumer.", ". $verifier);
+
     // return a new access token attached to this consumer
     // for the user associated with this token if the request token
     // is authorized
     // should also invalidate the request token
-    
+
     $ret=Null;
-    
-    // get verifier for this user
-    $uverifier = get_pconfig(local_user(), "oauth", "verifier");
-    
-    
-    if (is_null($verifier) || ($verifier==$uverifier)){
-               
+
+    // get user for this verifier
+    $uverifier = Config::get("oauth", $verifier);
+    logger(__function__.":".$verifier.",".$uverifier);
+    if (is_null($verifier) || ($uverifier!==false)){
+
                $key = $this->gen_token();
                $sec = $this->gen_token();
-               $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)",
+               $r = q("INSERT INTO tokens (id, secret, client_id, scope, expires, uid) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d, %d)",
                                dbesc($key),
                                dbesc($sec),
-                               dbesc($consumer->$key),
+                               dbesc($consumer->key),
                                'access',
-                               intval(ACCESS_TOKEN_DURATION));
+                               intval(ACCESS_TOKEN_DURATION),
+                               intval($uverifier));
                if ($r)
-                       $ret = new OAuthToken($key,$sec);               
+                       $ret = new OAuthToken($key,$sec);
        }
-               
-               
-       //q("DELETE FROM tokens WHERE id='%s'", $token->key);
-       
-       
-       if (!is_null($ret)){
-               //del_pconfig(local_user(), "oauth", "verifier");
-               $apps = get_pconfig(local_user(), "oauth", "apps");
+
+
+       q("DELETE FROM tokens WHERE id='%s'", $token->key);
+
+
+       if (!is_null($ret) && $uverifier!==false){
+               del_config("oauth", $verifier);
+       /*      $apps = PConfig::get($uverifier, "oauth", "apps");
                if ($apps===false) $apps=array();
                $apps[] = $consumer->key;
-               //set_pconfig(local_user(), "oauth", "apps", $apps);
+               PConfig::set($uverifier, "oauth", "apps", $apps);*/
        }
-               
+
     return $ret;
-    
+
   }
 }
 
@@ -117,8 +134,54 @@ class FKOAuth1 extends OAuthServer {
                $this->add_signature_method(new OAuthSignatureMethod_PLAINTEXT());
                $this->add_signature_method(new OAuthSignatureMethod_HMAC_SHA1());
        }
-}
 
+       function loginUser($uid){
+               logger("FKOAuth1::loginUser $uid");
+               $a = get_app();
+               $r = q("SELECT * FROM `user` WHERE uid=%d AND `blocked` = 0 AND `account_expired` = 0 AND `account_removed` = 0 AND `verified` = 1 LIMIT 1",
+                       intval($uid)
+               );
+               if (dbm::is_result($r)){
+                       $record = $r[0];
+               } else {
+                  logger('FKOAuth1::loginUser failure: ' . print_r($_SERVER,true), LOGGER_DEBUG);
+                   header('HTTP/1.0 401 Unauthorized');
+                   die('This api requires login');
+               }
+               $_SESSION['uid'] = $record['uid'];
+               $_SESSION['theme'] = $record['theme'];
+               $_SESSION['mobile-theme'] = PConfig::get($record['uid'], 'system', 'mobile_theme');
+               $_SESSION['authenticated'] = 1;
+               $_SESSION['page_flags'] = $record['page-flags'];
+               $_SESSION['my_url'] = System::baseUrl() . '/profile/' . $record['nickname'];
+               $_SESSION['addr'] = $_SERVER['REMOTE_ADDR'];
+               $_SESSION["allow_api"] = true;
+
+               //notice( t("Welcome back ") . $record['username'] . EOL);
+               $a->user = $record;
+
+               if (strlen($a->user['timezone'])) {
+                       date_default_timezone_set($a->user['timezone']);
+                       $a->timezone = $a->user['timezone'];
+               }
+
+               $r = q("SELECT * FROM `contact` WHERE `uid` = %s AND `self` = 1 LIMIT 1",
+                       intval($_SESSION['uid']));
+               if (dbm::is_result($r)) {
+                       $a->contact = $r[0];
+                       $a->cid = $r[0]['id'];
+                       $_SESSION['cid'] = $a->cid;
+               }
+               q("UPDATE `user` SET `login_date` = '%s' WHERE `uid` = %d",
+                       dbesc(datetime_convert()),
+                       intval($_SESSION['uid'])
+               );
+
+               call_hooks('logged_in', $a->user);
+       }
+
+}
+/*
 class FKOAuth2 extends OAuth2 {
 
        private function db_secret($client_secret){
@@ -132,13 +195,13 @@ class FKOAuth2 extends OAuth2 {
                        dbesc($client_secret),
                        dbesc($redirect_uri)
                );
-                 
+
                return $r;
        }
 
        protected function checkClientCredentials($client_id, $client_secret = NULL) {
                $client_secret = $this->db_secret($client_secret);
-               
+
                $r = q("SELECT pw FROM clients WHERE client_id = '%s'",
                        dbesc($client_id));
 
@@ -160,21 +223,21 @@ class FKOAuth2 extends OAuth2 {
        protected function getAccessToken($oauth_token) {
                $r = q("SELECT client_id, expires, scope FROM tokens WHERE id = '%s'",
                                dbesc($oauth_token));
-       
-               if (count($r))
+
+               if (dbm::is_result($r))
                        return $r[0];
                return null;
        }
 
 
-       
+
        protected function setAccessToken($oauth_token, $client_id, $expires, $scope = NULL) {
                $r = q("INSERT INTO tokens (id, client_id, expires, scope) VALUES ('%s', '%s', %d, '%s')",
                                dbesc($oauth_token),
                                dbesc($client_id),
                                intval($expires),
                                dbesc($scope));
-                               
+
                return $r;
        }
 
@@ -188,22 +251,23 @@ class FKOAuth2 extends OAuth2 {
        protected function getAuthCode($code) {
                $r = q("SELECT id, client_id, redirect_uri, expires, scope FROM auth_codes WHERE id = '%s'",
                                dbesc($code));
-               
-               if (count($r))
+
+               if (dbm::is_result($r))
                        return $r[0];
                return null;
        }
 
        protected function setAuthCode($code, $client_id, $redirect_uri, $expires, $scope = NULL) {
-               $r = q("INSERT INTO auth_codes 
-                                       (id, client_id, redirect_uri, expires, scope) VALUES 
+               $r = q("INSERT INTO auth_codes
+                                       (id, client_id, redirect_uri, expires, scope) VALUES
                                        ('%s', '%s', '%s', %d, '%s')",
                                dbesc($code),
                                dbesc($client_id),
                                dbesc($redirect_uri),
                                intval($expires),
                                dbesc($scope));
-               return $r;        
-       }       
-       
+               return $r;
+       }
+
 }
+*/