2019-12-05 08:12:59 -05:00
|
|
|
<?php
|
2020-02-09 09:45:36 -05:00
|
|
|
/**
|
2021-03-29 02:40:20 -04:00
|
|
|
* @copyright Copyright (C) 2010-2021, the Friendica project
|
2020-02-09 09:45:36 -05:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
2019-12-05 08:12:59 -05:00
|
|
|
|
2020-01-27 21:18:42 -05:00
|
|
|
namespace Friendica\Module;
|
2019-12-05 08:12:59 -05:00
|
|
|
|
|
|
|
use Friendica\BaseModule;
|
2021-05-08 05:14:19 -04:00
|
|
|
use Friendica\Core\Logger;
|
|
|
|
use Friendica\Core\System;
|
2021-05-11 02:30:20 -04:00
|
|
|
use Friendica\Database\Database;
|
|
|
|
use Friendica\Database\DBA;
|
2019-12-15 16:34:11 -05:00
|
|
|
use Friendica\DI;
|
2019-12-05 08:12:59 -05:00
|
|
|
use Friendica\Network\HTTPException;
|
2021-05-11 04:16:40 -04:00
|
|
|
use Friendica\Util\DateTimeFormat;
|
2021-05-13 17:15:32 -04:00
|
|
|
use Friendica\Util\Network;
|
2019-12-05 08:12:59 -05:00
|
|
|
|
2020-01-27 21:18:42 -05:00
|
|
|
require_once __DIR__ . '/../../include/api.php';
|
2019-12-05 08:12:59 -05:00
|
|
|
|
2020-01-27 21:18:42 -05:00
|
|
|
class BaseApi extends BaseModule
|
2019-12-05 08:12:59 -05:00
|
|
|
{
|
2021-05-16 03:37:11 -04:00
|
|
|
const SCOPE_READ = 'read';
|
|
|
|
const SCOPE_WRITE = 'write';
|
|
|
|
const SCOPE_FOLLOW = 'follow';
|
|
|
|
const SCOPE_PUSH = 'push';
|
|
|
|
|
2019-12-05 08:12:59 -05:00
|
|
|
/**
|
|
|
|
* @var string json|xml|rss|atom
|
|
|
|
*/
|
|
|
|
protected static $format = 'json';
|
|
|
|
/**
|
|
|
|
* @var bool|int
|
|
|
|
*/
|
|
|
|
protected static $current_user_id;
|
2021-05-15 18:40:57 -04:00
|
|
|
/**
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected static $current_token = [];
|
2019-12-05 08:12:59 -05:00
|
|
|
|
|
|
|
public static function init(array $parameters = [])
|
|
|
|
{
|
2019-12-15 17:28:01 -05:00
|
|
|
$arguments = DI::args();
|
2019-12-05 08:12:59 -05:00
|
|
|
|
2020-09-09 00:15:25 -04:00
|
|
|
if (substr($arguments->getCommand(), -4) === '.xml') {
|
2019-12-05 08:12:59 -05:00
|
|
|
self::$format = 'xml';
|
|
|
|
}
|
2020-09-09 00:15:25 -04:00
|
|
|
if (substr($arguments->getCommand(), -4) === '.rss') {
|
2019-12-05 08:12:59 -05:00
|
|
|
self::$format = 'rss';
|
|
|
|
}
|
2020-09-09 00:15:25 -04:00
|
|
|
if (substr($arguments->getCommand(), -4) === '.atom') {
|
2019-12-05 08:12:59 -05:00
|
|
|
self::$format = 'atom';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-08 05:14:19 -04:00
|
|
|
public static function delete(array $parameters = [])
|
|
|
|
{
|
|
|
|
if (!api_user()) {
|
|
|
|
throw new HTTPException\UnauthorizedException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
|
|
|
|
$a = DI::app();
|
|
|
|
|
|
|
|
if (!empty($a->user['uid']) && $a->user['uid'] != api_user()) {
|
|
|
|
throw new HTTPException\ForbiddenException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public static function patch(array $parameters = [])
|
|
|
|
{
|
|
|
|
if (!api_user()) {
|
|
|
|
throw new HTTPException\UnauthorizedException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
|
|
|
|
$a = DI::app();
|
|
|
|
|
|
|
|
if (!empty($a->user['uid']) && $a->user['uid'] != api_user()) {
|
|
|
|
throw new HTTPException\ForbiddenException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-05 08:12:59 -05:00
|
|
|
public static function post(array $parameters = [])
|
|
|
|
{
|
|
|
|
if (!api_user()) {
|
2020-01-18 14:52:34 -05:00
|
|
|
throw new HTTPException\UnauthorizedException(DI::l10n()->t('Permission denied.'));
|
2019-12-05 08:12:59 -05:00
|
|
|
}
|
|
|
|
|
2019-12-15 16:34:11 -05:00
|
|
|
$a = DI::app();
|
2019-12-05 08:12:59 -05:00
|
|
|
|
|
|
|
if (!empty($a->user['uid']) && $a->user['uid'] != api_user()) {
|
2020-01-18 14:52:34 -05:00
|
|
|
throw new HTTPException\ForbiddenException(DI::l10n()->t('Permission denied.'));
|
2019-12-05 08:12:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-08 05:14:19 -04:00
|
|
|
public static function put(array $parameters = [])
|
|
|
|
{
|
|
|
|
if (!api_user()) {
|
|
|
|
throw new HTTPException\UnauthorizedException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
|
|
|
|
$a = DI::app();
|
|
|
|
|
|
|
|
if (!empty($a->user['uid']) && $a->user['uid'] != api_user()) {
|
|
|
|
throw new HTTPException\ForbiddenException(DI::l10n()->t('Permission denied.'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
|
|
|
* Quit execution with the message that the endpoint isn't implemented
|
|
|
|
*
|
|
|
|
* @param string $method
|
|
|
|
* @return void
|
|
|
|
*/
|
2021-05-08 05:14:19 -04:00
|
|
|
public static function unsupported(string $method = 'all')
|
|
|
|
{
|
|
|
|
$path = DI::args()->getQueryString();
|
2021-05-11 02:30:20 -04:00
|
|
|
Logger::info('Unimplemented API call', ['method' => $method, 'path' => $path, 'agent' => $_SERVER['HTTP_USER_AGENT'] ?? '', 'request' => $_REQUEST ?? []]);
|
2021-05-08 08:23:47 -04:00
|
|
|
$error = DI::l10n()->t('API endpoint %s %s is not implemented', strtoupper($method), $path);
|
2021-05-12 08:08:30 -04:00
|
|
|
$error_description = DI::l10n()->t('The API endpoint is currently not implemented but might be in the future.');
|
2021-05-08 05:14:19 -04:00
|
|
|
$errorobj = new \Friendica\Object\Api\Mastodon\Error($error, $error_description);
|
|
|
|
System::jsonError(501, $errorobj->toArray());
|
|
|
|
}
|
|
|
|
|
2021-05-18 02:31:22 -04:00
|
|
|
/**
|
|
|
|
* Processes data from GET requests and sets defaults
|
|
|
|
*
|
|
|
|
* @return array request data
|
|
|
|
*/
|
|
|
|
public static function getRequest(array $defaults) {
|
|
|
|
$request = [];
|
|
|
|
|
|
|
|
foreach ($defaults as $parameter => $defaultvalue) {
|
|
|
|
if (is_string($defaultvalue)) {
|
|
|
|
$request[$parameter] = $_REQUEST[$parameter] ?? $defaultvalue;
|
|
|
|
} elseif (is_int($defaultvalue)) {
|
|
|
|
$request[$parameter] = (int)($_REQUEST[$parameter] ?? $defaultvalue);
|
|
|
|
} elseif (is_float($defaultvalue)) {
|
|
|
|
$request[$parameter] = (float)($_REQUEST[$parameter] ?? $defaultvalue);
|
|
|
|
} elseif (is_array($defaultvalue)) {
|
|
|
|
$request[$parameter] = $_REQUEST[$parameter] ?? [];
|
|
|
|
} elseif (is_bool($defaultvalue)) {
|
|
|
|
$request[$parameter] = in_array(strtolower($_REQUEST[$parameter] ?? ''), ['true', '1']);
|
|
|
|
} else {
|
|
|
|
Logger::notice('Unhandled default value type', ['parameter' => $parameter, 'type' => gettype($defaultvalue)]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($_REQUEST ?? [] as $parameter => $value) {
|
|
|
|
if ($parameter == 'pagename') {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!in_array($parameter, array_keys($defaults))) {
|
|
|
|
Logger::notice('Unhandled request field', ['parameter' => $parameter, 'value' => $value, 'command' => DI::args()->getCommand()]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Logger::debug('Got request parameters', ['request' => $request, 'command' => DI::args()->getCommand()]);
|
|
|
|
return $request;
|
|
|
|
}
|
|
|
|
|
2021-05-13 17:15:32 -04:00
|
|
|
/**
|
|
|
|
* Get post data that is transmitted as JSON
|
|
|
|
*
|
|
|
|
* @return array request data
|
|
|
|
*/
|
|
|
|
public static function getJsonPostData()
|
|
|
|
{
|
|
|
|
$postdata = Network::postdata();
|
|
|
|
if (empty($postdata)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
return json_decode($postdata, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get request data for put requests
|
|
|
|
*
|
|
|
|
* @return array request data
|
|
|
|
*/
|
|
|
|
public static function getPutData()
|
|
|
|
{
|
|
|
|
$rawdata = Network::postdata();
|
|
|
|
if (empty($rawdata)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
$putdata = [];
|
|
|
|
|
|
|
|
foreach (explode('&', $rawdata) as $value) {
|
|
|
|
$data = explode('=', $value);
|
|
|
|
if (count($data) == 2) {
|
|
|
|
$putdata[$data[0]] = urldecode($data[1]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $putdata;
|
|
|
|
}
|
|
|
|
|
2019-12-05 08:12:59 -05:00
|
|
|
/**
|
|
|
|
* Log in user via OAuth1 or Simple HTTP Auth.
|
|
|
|
*
|
2020-01-19 01:05:23 -05:00
|
|
|
* Simple Auth allow username in form of <pre>user@server</pre>, ignoring server part
|
2019-12-05 08:12:59 -05:00
|
|
|
*
|
2021-05-16 03:37:11 -04:00
|
|
|
* @param string $scope the requested scope (read, write, follow)
|
|
|
|
*
|
2019-12-11 03:32:46 -05:00
|
|
|
* @return bool Was a user authenticated?
|
2019-12-05 08:12:59 -05:00
|
|
|
* @throws HTTPException\ForbiddenException
|
|
|
|
* @throws HTTPException\UnauthorizedException
|
|
|
|
* @throws HTTPException\InternalServerErrorException
|
|
|
|
* @hook 'authenticate'
|
|
|
|
* array $addon_auth
|
|
|
|
* 'username' => username from login form
|
|
|
|
* 'password' => password from login form
|
|
|
|
* 'authenticated' => return status,
|
|
|
|
* 'user_record' => return authenticated user record
|
|
|
|
*/
|
2021-05-16 03:37:11 -04:00
|
|
|
protected static function login(string $scope)
|
2019-12-05 08:12:59 -05:00
|
|
|
{
|
2021-05-11 15:15:05 -04:00
|
|
|
if (empty(self::$current_user_id)) {
|
2021-05-15 18:40:57 -04:00
|
|
|
self::$current_token = self::getTokenByBearer();
|
|
|
|
if (!empty(self::$current_token['uid'])) {
|
|
|
|
self::$current_user_id = self::$current_token['uid'];
|
|
|
|
} else {
|
|
|
|
self::$current_user_id = 0;
|
|
|
|
}
|
2021-05-11 02:30:20 -04:00
|
|
|
}
|
|
|
|
|
2021-05-16 03:37:11 -04:00
|
|
|
if (!empty($scope) && !empty(self::$current_token)) {
|
|
|
|
if (empty(self::$current_token[$scope])) {
|
|
|
|
Logger::warning('The requested scope is not allowed', ['scope' => $scope, 'application' => self::$current_token]);
|
|
|
|
DI::mstdnError()->Forbidden();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-11 15:15:05 -04:00
|
|
|
if (empty(self::$current_user_id)) {
|
2021-05-12 08:08:30 -04:00
|
|
|
// The execution stops here if no one is logged in
|
2021-05-11 15:15:05 -04:00
|
|
|
api_login(DI::app());
|
|
|
|
}
|
2019-12-05 08:12:59 -05:00
|
|
|
|
|
|
|
self::$current_user_id = api_user();
|
2019-12-11 03:32:46 -05:00
|
|
|
|
|
|
|
return (bool)self::$current_user_id;
|
2019-12-05 08:12:59 -05:00
|
|
|
}
|
|
|
|
|
2021-05-15 18:40:57 -04:00
|
|
|
/**
|
|
|
|
* Get current application
|
|
|
|
*
|
|
|
|
* @return array token
|
|
|
|
*/
|
|
|
|
protected static function getCurrentApplication()
|
|
|
|
{
|
|
|
|
return self::$current_token;
|
|
|
|
}
|
|
|
|
|
2021-05-03 01:25:54 -04:00
|
|
|
/**
|
|
|
|
* Get current user id, returns 0 if not logged in
|
|
|
|
*
|
|
|
|
* @return int User ID
|
|
|
|
*/
|
|
|
|
protected static function getCurrentUserID()
|
|
|
|
{
|
2021-05-11 15:15:05 -04:00
|
|
|
if (empty(self::$current_user_id)) {
|
2021-05-15 18:40:57 -04:00
|
|
|
self::$current_token = self::getTokenByBearer();
|
|
|
|
if (!empty(self::$current_token['uid'])) {
|
|
|
|
self::$current_user_id = self::$current_token['uid'];
|
|
|
|
} else {
|
|
|
|
self::$current_user_id = 0;
|
|
|
|
}
|
|
|
|
|
2021-05-11 02:30:20 -04:00
|
|
|
}
|
|
|
|
|
2021-05-11 15:15:05 -04:00
|
|
|
if (empty(self::$current_user_id)) {
|
2021-05-12 08:08:30 -04:00
|
|
|
// Fetch the user id if logged in - but don't fail if not
|
2021-05-03 01:25:54 -04:00
|
|
|
api_login(DI::app(), false);
|
|
|
|
|
|
|
|
self::$current_user_id = api_user();
|
|
|
|
}
|
|
|
|
|
|
|
|
return (int)self::$current_user_id;
|
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
2021-05-15 18:40:57 -04:00
|
|
|
* Get the user token via the Bearer token
|
2021-05-12 08:08:30 -04:00
|
|
|
*
|
2021-05-15 18:40:57 -04:00
|
|
|
* @return array User Token
|
2021-05-12 08:08:30 -04:00
|
|
|
*/
|
2021-05-15 18:40:57 -04:00
|
|
|
private static function getTokenByBearer()
|
2021-05-11 02:30:20 -04:00
|
|
|
{
|
2021-05-11 15:15:05 -04:00
|
|
|
$authorization = $_SERVER['HTTP_AUTHORIZATION'] ?? '';
|
2021-05-11 02:30:20 -04:00
|
|
|
|
2021-05-11 15:15:05 -04:00
|
|
|
if (substr($authorization, 0, 7) != 'Bearer ') {
|
2021-05-15 18:40:57 -04:00
|
|
|
return [];
|
2021-05-11 15:15:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
$bearer = trim(substr($authorization, 7));
|
2021-05-11 02:30:20 -04:00
|
|
|
$condition = ['access_token' => $bearer];
|
2021-05-16 03:37:11 -04:00
|
|
|
$token = DBA::selectFirst('application-view', ['uid', 'id', 'name', 'website', 'created_at', 'read', 'write', 'follow', 'push'], $condition);
|
2021-05-11 02:30:20 -04:00
|
|
|
if (!DBA::isResult($token)) {
|
|
|
|
Logger::warning('Token not found', $condition);
|
2021-05-15 18:40:57 -04:00
|
|
|
return [];
|
2021-05-11 02:30:20 -04:00
|
|
|
}
|
2021-05-19 03:02:12 -04:00
|
|
|
Logger::debug('Token found', $token);
|
2021-05-15 18:40:57 -04:00
|
|
|
return $token;
|
2021-05-11 02:30:20 -04:00
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
|
|
|
* Get the application record via the proved request header fields
|
|
|
|
*
|
2021-05-13 07:33:07 -04:00
|
|
|
* @param string $client_id
|
|
|
|
* @param string $client_secret
|
|
|
|
* @param string $redirect_uri
|
2021-05-12 08:08:30 -04:00
|
|
|
* @return array application record
|
|
|
|
*/
|
2021-05-13 07:26:56 -04:00
|
|
|
public static function getApplication(string $client_id, string $client_secret, string $redirect_uri)
|
2021-05-11 02:30:20 -04:00
|
|
|
{
|
2021-05-12 01:30:21 -04:00
|
|
|
$condition = ['client_id' => $client_id];
|
|
|
|
if (!empty($client_secret)) {
|
|
|
|
$condition['client_secret'] = $client_secret;
|
|
|
|
}
|
|
|
|
if (!empty($redirect_uri)) {
|
|
|
|
$condition['redirect_uri'] = $redirect_uri;
|
|
|
|
}
|
|
|
|
|
2021-05-11 02:30:20 -04:00
|
|
|
$application = DBA::selectFirst('application', [], $condition);
|
|
|
|
if (!DBA::isResult($application)) {
|
|
|
|
Logger::warning('Application not found', $condition);
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
return $application;
|
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
|
|
|
* Check if an token for the application and user exists
|
|
|
|
*
|
|
|
|
* @param array $application
|
|
|
|
* @param integer $uid
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2021-05-12 02:50:27 -04:00
|
|
|
public static function existsTokenForUser(array $application, int $uid)
|
|
|
|
{
|
|
|
|
return DBA::exists('application-token', ['application-id' => $application['id'], 'uid' => $uid]);
|
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
|
|
|
* Fetch the token for the given application and user
|
|
|
|
*
|
|
|
|
* @param array $application
|
|
|
|
* @param integer $uid
|
|
|
|
* @return array application record
|
|
|
|
*/
|
2021-05-11 02:30:20 -04:00
|
|
|
public static function getTokenForUser(array $application, int $uid)
|
2021-05-12 02:50:27 -04:00
|
|
|
{
|
|
|
|
return DBA::selectFirst('application-token', [], ['application-id' => $application['id'], 'uid' => $uid]);
|
|
|
|
}
|
|
|
|
|
2021-05-12 08:08:30 -04:00
|
|
|
/**
|
|
|
|
* Create and fetch an token for the application and user
|
|
|
|
*
|
2021-05-13 07:26:56 -04:00
|
|
|
* @param array $application
|
2021-05-12 08:08:30 -04:00
|
|
|
* @param integer $uid
|
2021-05-13 07:26:56 -04:00
|
|
|
* @param string $scope
|
2021-05-12 08:08:30 -04:00
|
|
|
* @return array application record
|
|
|
|
*/
|
2021-05-13 07:26:56 -04:00
|
|
|
public static function createTokenForUser(array $application, int $uid, string $scope)
|
2021-05-11 02:30:20 -04:00
|
|
|
{
|
2021-05-11 09:12:12 -04:00
|
|
|
$code = bin2hex(random_bytes(32));
|
|
|
|
$access_token = bin2hex(random_bytes(32));
|
2021-05-11 02:30:20 -04:00
|
|
|
|
2021-05-13 10:58:55 -04:00
|
|
|
$fields = ['application-id' => $application['id'], 'uid' => $uid, 'code' => $code, 'access_token' => $access_token, 'scopes' => $scope,
|
2021-05-16 03:37:11 -04:00
|
|
|
'read' => (stripos($scope, self::SCOPE_READ) !== false),
|
|
|
|
'write' => (stripos($scope, self::SCOPE_WRITE) !== false),
|
|
|
|
'follow' => (stripos($scope, self::SCOPE_FOLLOW) !== false),
|
|
|
|
'push' => (stripos($scope, self::SCOPE_PUSH) !== false),
|
|
|
|
'created_at' => DateTimeFormat::utcNow(DateTimeFormat::MYSQL)];
|
|
|
|
|
|
|
|
foreach ([self::SCOPE_READ, self::SCOPE_WRITE, self::SCOPE_WRITE, self::SCOPE_PUSH] as $scope) {
|
|
|
|
if ($fields[$scope] && !$application[$scope]) {
|
|
|
|
Logger::warning('Requested token scope is not allowed for the application', ['token' => $fields, 'application' => $application]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-11 02:30:20 -04:00
|
|
|
if (!DBA::insert('application-token', $fields, Database::INSERT_UPDATE)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
return DBA::selectFirst('application-token', [], ['application-id' => $application['id'], 'uid' => $uid]);
|
|
|
|
}
|
2021-05-12 02:50:27 -04:00
|
|
|
|
2019-12-05 08:12:59 -05:00
|
|
|
/**
|
2020-01-19 01:05:23 -05:00
|
|
|
* Get user info array.
|
2019-12-05 08:12:59 -05:00
|
|
|
*
|
|
|
|
* @param int|string $contact_id Contact ID or URL
|
|
|
|
* @return array|bool
|
|
|
|
* @throws HTTPException\BadRequestException
|
|
|
|
* @throws HTTPException\InternalServerErrorException
|
|
|
|
* @throws HTTPException\UnauthorizedException
|
|
|
|
* @throws \ImagickException
|
|
|
|
*/
|
|
|
|
protected static function getUser($contact_id = null)
|
|
|
|
{
|
2019-12-15 16:34:11 -05:00
|
|
|
return api_get_user(DI::app(), $contact_id);
|
2019-12-05 08:12:59 -05:00
|
|
|
}
|
|
|
|
|
2020-01-23 09:08:37 -05:00
|
|
|
/**
|
|
|
|
* Formats the data according to the data type
|
|
|
|
*
|
|
|
|
* @param string $root_element
|
|
|
|
* @param array $data An array with a single element containing the returned result
|
|
|
|
* @return false|string
|
|
|
|
*/
|
|
|
|
protected static function format(string $root_element, array $data)
|
2019-12-05 08:12:59 -05:00
|
|
|
{
|
2020-01-23 09:08:37 -05:00
|
|
|
$return = api_format_data($root_element, self::$format, $data);
|
|
|
|
|
2019-12-05 08:12:59 -05:00
|
|
|
switch (self::$format) {
|
|
|
|
case "xml":
|
2020-01-23 09:08:37 -05:00
|
|
|
header("Content-Type: text/xml");
|
2019-12-05 08:12:59 -05:00
|
|
|
break;
|
|
|
|
case "json":
|
2020-01-23 09:08:37 -05:00
|
|
|
header("Content-Type: application/json");
|
|
|
|
if (!empty($return)) {
|
|
|
|
$json = json_encode(end($return));
|
|
|
|
if (!empty($_GET['callback'])) {
|
|
|
|
$json = $_GET['callback'] . "(" . $json . ")";
|
|
|
|
}
|
|
|
|
$return = $json;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case "rss":
|
|
|
|
header("Content-Type: application/rss+xml");
|
|
|
|
$return = '<?xml version="1.0" encoding="UTF-8"?>' . "\n" . $return;
|
|
|
|
break;
|
|
|
|
case "atom":
|
|
|
|
header("Content-Type: application/atom+xml");
|
|
|
|
$return = '<?xml version="1.0" encoding="UTF-8"?>' . "\n" . $return;
|
2019-12-05 08:12:59 -05:00
|
|
|
break;
|
|
|
|
}
|
2021-05-11 02:30:20 -04:00
|
|
|
|
2020-01-23 09:08:37 -05:00
|
|
|
return $return;
|
|
|
|
}
|
2019-12-05 08:12:59 -05:00
|
|
|
|
2020-01-23 09:08:37 -05:00
|
|
|
/**
|
|
|
|
* Creates the XML from a JSON style array
|
|
|
|
*
|
|
|
|
* @param $data
|
|
|
|
* @param $root_element
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected static function createXml($data, $root_element)
|
|
|
|
{
|
|
|
|
return api_create_xml($data, $root_element);
|
2019-12-05 08:12:59 -05:00
|
|
|
}
|
|
|
|
}
|