2010-07-01 19:48:07 -04:00
|
|
|
<?php
|
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/*
|
|
|
|
* Module: dfrn_confirm
|
|
|
|
* Purpose: Friendship acceptance for DFRN contacts
|
|
|
|
*
|
|
|
|
* There are two possible entry points and three scenarios.
|
|
|
|
*
|
|
|
|
* 1. A form was submitted by our user approving a friendship that originated elsewhere.
|
|
|
|
* This may also be called from dfrn_request to automatically approve a friendship.
|
|
|
|
*
|
|
|
|
* 2. We may be the target or other side of the conversation to scenario 1, and will
|
|
|
|
* interact with that process on our own user's behalf.
|
|
|
|
*
|
|
|
|
*/
|
2010-11-18 23:58:46 -05:00
|
|
|
|
2010-10-17 23:04:17 -04:00
|
|
|
function dfrn_confirm_post(&$a,$handsfree = null) {
|
2010-08-27 18:35:41 -04:00
|
|
|
|
2010-10-17 23:04:17 -04:00
|
|
|
if(is_array($handsfree)) {
|
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
* We were called directly from dfrn_request due to automatic friend acceptance.
|
|
|
|
* Any $_POST parameters we may require are supplied in the $handsfree array.
|
|
|
|
*
|
|
|
|
*/
|
2010-10-17 23:04:17 -04:00
|
|
|
|
|
|
|
$node = $handsfree['node'];
|
|
|
|
$a->interactive = false; // notice() becomes a no-op since nobody is there to see it
|
|
|
|
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if($a->argc > 1)
|
|
|
|
$node = $a->argv[1];
|
|
|
|
}
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* Main entry point. Scenario 1. Our user received a friend request notification (perhaps
|
|
|
|
* from another site) and clicked 'Approve'.
|
|
|
|
* $POST['source_url'] is not set. If it is, it indicates Scenario 2.
|
|
|
|
*
|
|
|
|
* We may also have been called directly from dfrn_request ($handsfree != null) due to
|
|
|
|
* this being a page type which supports automatic friend acceptance. That is also Scenario 1
|
|
|
|
* since we are operating on behalf of our registered user to approve a friendship.
|
|
|
|
*
|
|
|
|
*/
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
if(! x($_POST,'source_url')) {
|
2010-10-24 23:39:24 -04:00
|
|
|
|
2010-10-18 17:34:59 -04:00
|
|
|
$uid = ((is_array($handsfree)) ? $handsfree['uid'] : local_user());
|
2010-07-01 19:48:07 -04:00
|
|
|
|
|
|
|
if(! $uid) {
|
2010-10-04 19:04:52 -04:00
|
|
|
notice( t('Permission denied.') . EOL );
|
2010-07-01 19:48:07 -04:00
|
|
|
return;
|
|
|
|
}
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-10-17 23:04:17 -04:00
|
|
|
$user = q("SELECT * FROM `user` WHERE `uid` = %d LIMIT 1",
|
|
|
|
intval($uid)
|
|
|
|
);
|
|
|
|
|
|
|
|
if(! $user) {
|
|
|
|
notice( t('Profile not found.') . EOL );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
// These data elements may come from either the friend request notification form or $handsfree array.
|
2010-10-17 23:04:17 -04:00
|
|
|
|
|
|
|
if(is_array($handsfree)) {
|
2010-11-19 00:14:16 -05:00
|
|
|
logger('dfrn_confirm: Confirm in handsfree mode');
|
2010-12-08 18:30:26 -05:00
|
|
|
$dfrn_id = $handsfree['dfrn_id'];
|
|
|
|
$intro_id = $handsfree['intro_id'];
|
|
|
|
$duplex = $handsfree['duplex'];
|
2010-10-17 23:04:17 -04:00
|
|
|
}
|
|
|
|
else {
|
2010-12-08 18:30:26 -05:00
|
|
|
$dfrn_id = ((x($_POST,'dfrn_id')) ? notags(trim($_POST['dfrn_id'])) : "");
|
|
|
|
$intro_id = ((x($_POST,'intro_id')) ? intval($_POST['intro_id']) : 0 );
|
|
|
|
$duplex = ((x($_POST,'duplex')) ? intval($_POST['duplex']) : 0 );
|
|
|
|
$cid = ((x($_POST,'contact_id')) ? intval($_POST['contact_id']) : 0 );
|
2010-10-17 23:04:17 -04:00
|
|
|
}
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* Ensure that dfrn_id has precedence when we go to find the contact record.
|
|
|
|
* We only want to search based on contact id if there is no dfrn_id,
|
|
|
|
* e.g. for OStatus network followers.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
if(strlen($dfrn_id))
|
|
|
|
$cid = 0;
|
|
|
|
|
2010-11-19 00:14:16 -05:00
|
|
|
logger('dfrn_confirm: Confirming request for dfrn_id (issued) ' . $dfrn_id);
|
2010-12-08 18:30:26 -05:00
|
|
|
if($cid)
|
|
|
|
logger('dfrn_confirm: Confirming follower with contact_id: ' . $cid);
|
2010-11-19 00:14:16 -05:00
|
|
|
|
2010-11-18 23:58:46 -05:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* The other person will have been issued an ID when they first requested friendship.
|
|
|
|
* Locate their record. At this time, their record will have both pending and blocked set to 1.
|
|
|
|
* There won't be any dfrn_id if this is a network follower, so use the contact_id instead.
|
|
|
|
*
|
|
|
|
*/
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$r = q("SELECT * FROM `contact` WHERE ( ( `issued-id` != '' AND `issued-id` = '%s' ) OR ( `id` = %d AND `id` != 0 ) ) AND `uid` = %d LIMIT 1",
|
2010-12-08 18:30:26 -05:00
|
|
|
dbesc($dfrn_id),
|
|
|
|
intval($cid),
|
|
|
|
intval($uid)
|
2010-10-10 19:16:29 -04:00
|
|
|
);
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-09-08 23:14:17 -04:00
|
|
|
if(! count($r)) {
|
2010-12-08 18:30:26 -05:00
|
|
|
logger('dfrn_confirm: Contact not found in DB.');
|
2010-10-10 21:25:34 -04:00
|
|
|
notice( t('Contact not found.') . EOL );
|
2010-07-01 19:48:07 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$contact = $r[0];
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$contact_id = $contact['id'];
|
|
|
|
$relation = $contact['rel'];
|
|
|
|
$site_pubkey = $contact['site-pubkey'];
|
|
|
|
$dfrn_confirm = $contact['confirm'];
|
|
|
|
$aes_allow = $contact['aes_allow'];
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-11-07 01:56:39 -04:00
|
|
|
$network = ((strlen($contact['issued-id'])) ? 'dfrn' : 'stat');
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-11-07 01:56:39 -04:00
|
|
|
if($network === 'dfrn') {
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* Generate a key pair for all further communications with this person.
|
|
|
|
* We have a keypair for every contact, and a site key for unknown people.
|
|
|
|
* This provides a means to carry on relationships with other people if
|
|
|
|
* any single key is compromised. It is a robust key. We're much more
|
|
|
|
* worried about key leakage than anybody cracking it.
|
|
|
|
*
|
|
|
|
*/
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$res = openssl_pkey_new(array(
|
2010-11-24 19:07:42 -05:00
|
|
|
'digest_alg' => 'sha1',
|
2010-10-24 23:39:24 -04:00
|
|
|
'private_key_bits' => 4096,
|
|
|
|
'encrypt_key' => false )
|
|
|
|
);
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$private_key = '';
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
openssl_pkey_export($res, $private_key);
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$pubkey = openssl_pkey_get_details($res);
|
|
|
|
$public_key = $pubkey["key"];
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
// Save the private key. Send them the public key.
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$r = q("UPDATE `contact` SET `prvkey` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1",
|
|
|
|
dbesc($private_key),
|
|
|
|
intval($contact_id),
|
|
|
|
intval($uid)
|
|
|
|
);
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$params = array();
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* Per the DFRN protocol, we will verify both ends by encrypting the dfrn_id with our
|
|
|
|
* site private key (person on the other end can decrypt it with our site public key).
|
|
|
|
* Then encrypt our profile URL with the other person's site public key. They can decrypt
|
|
|
|
* it with their site private key. If the decryption on the other end fails for either
|
|
|
|
* item, it indicates tampering or key failure on at least one site and we will not be
|
|
|
|
* able to provide a secure communication pathway.
|
|
|
|
*
|
|
|
|
* If other site is willing to accept full encryption, (aes_allow is 1 AND we have php5.3
|
|
|
|
* or later) then we encrypt the personal public key we send them using AES-256-CBC and a
|
|
|
|
* random key which is encrypted with their site public key.
|
|
|
|
*
|
|
|
|
*/
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$src_aes_key = random_string();
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$result = '';
|
|
|
|
openssl_private_encrypt($dfrn_id,$result,$user[0]['prvkey']);
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$params['dfrn_id'] = bin2hex($result);
|
|
|
|
$params['public_key'] = $public_key;
|
2010-10-10 19:16:29 -04:00
|
|
|
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$my_url = $a->get_baseurl() . '/profile/' . $user[0]['nickname'];
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
openssl_public_encrypt($my_url, $params['source_url'], $site_pubkey);
|
|
|
|
$params['source_url'] = bin2hex($params['source_url']);
|
2010-09-08 23:14:17 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
if($aes_allow && function_exists('openssl_encrypt')) {
|
|
|
|
openssl_public_encrypt($src_aes_key, $params['aes_key'], $site_pubkey);
|
|
|
|
$params['aes_key'] = bin2hex($params['aes_key']);
|
|
|
|
$params['public_key'] = bin2hex(openssl_encrypt($public_key,'AES-256-CBC',$src_aes_key));
|
|
|
|
}
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$params['dfrn_version'] = DFRN_PROTOCOL_VERSION ;
|
|
|
|
if($duplex == 1)
|
|
|
|
$params['duplex'] = 1;
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
logger('dfrn_confirm: Confirm: posting data to ' . $dfrn_confirm . ': ' . print_r($params,true), LOGGER_DATA);
|
2010-11-18 23:58:46 -05:00
|
|
|
|
2010-12-09 17:29:38 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* POST all this stuff to the other site.
|
|
|
|
* Temporarily raise the network timeout to 120 seconds because the default 60
|
|
|
|
* doesn't always give the other side quite enough time to decrypt everything.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
$a->config['system']['curl_timeout'] = 120;
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$res = post_url($dfrn_confirm,$params);
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-11-18 23:58:46 -05:00
|
|
|
logger('dfrn_confirm: Confirm: received data: ' . $res, LOGGER_DATA);
|
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
// Now figure out what they responded. Try to be robust if the remote site is
|
|
|
|
// having difficulty and throwing up errors of some kind.
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$leading_junk = substr($res,0,strpos($res,'<?xml'));
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$res = substr($res,strpos($res,'<?xml'));
|
|
|
|
if(! strlen($res)) {
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
// No XML at all, this exchange is messed up really bad.
|
|
|
|
// We shouldn't proceed, because the xml parser might choke,
|
|
|
|
// and $status is going to be zero, which indicates success.
|
|
|
|
// We can hardly call this a success.
|
|
|
|
|
|
|
|
notice( t('Response from remote site was not understood.') . EOL);
|
|
|
|
return;
|
|
|
|
}
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
if(strlen($leading_junk) && get_config('system','debugging')) {
|
|
|
|
|
|
|
|
// This might be more common. Mixed error text and some XML.
|
|
|
|
// If we're configured for debugging, show the text. Proceed in either case.
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
notice( t('Unexpected response from remote site: ') . EOL . $leading_junk . EOL );
|
|
|
|
}
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$xml = simplexml_load_string($res);
|
|
|
|
$status = (int) $xml->status;
|
|
|
|
$message = unxmlify($xml->message); // human readable text of what may have gone wrong.
|
|
|
|
switch($status) {
|
|
|
|
case 0:
|
|
|
|
notice( t("Confirmation completed successfully.") . EOL);
|
|
|
|
if(strlen($message))
|
|
|
|
notice( t('Remote site reported: ') . $message . EOL);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
// birthday paradox - generate new dfrn-id and fall through.
|
|
|
|
$new_dfrn_id = random_string();
|
|
|
|
$r = q("UPDATE contact SET `issued-id` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1",
|
|
|
|
dbesc($new_dfrn_id),
|
|
|
|
intval($contact_id),
|
|
|
|
intval($uid)
|
|
|
|
);
|
|
|
|
|
|
|
|
case 2:
|
|
|
|
notice( t("Temporary failure. Please wait and try again.") . EOL);
|
|
|
|
if(strlen($message))
|
|
|
|
notice( t('Remote site reported: ') . $message . EOL);
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
|
|
case 3:
|
|
|
|
notice( t("Introduction failed or was revoked.") . EOL);
|
|
|
|
if(strlen($message))
|
|
|
|
notice( t('Remote site reported: ') . $message . EOL);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(($status == 0) && ($intro_id)) {
|
|
|
|
|
|
|
|
// Success. Delete the notification.
|
|
|
|
|
|
|
|
$r = q("DELETE FROM `intro` WHERE `id` = %d AND `uid` = %d LIMIT 1",
|
|
|
|
intval($intro_id),
|
|
|
|
intval($uid)
|
2010-07-01 19:48:07 -04:00
|
|
|
);
|
2010-10-24 23:39:24 -04:00
|
|
|
|
2010-10-05 22:56:09 -04:00
|
|
|
}
|
2010-07-01 19:48:07 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
if($status != 0)
|
|
|
|
return;
|
2010-07-01 19:48:07 -04:00
|
|
|
}
|
2010-10-05 22:56:09 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
|
|
|
|
/*
|
|
|
|
*
|
|
|
|
* We have now established a relationship with the other site.
|
|
|
|
* Let's make our own personal copy of their profile photo so we don't have
|
|
|
|
* to always load it from their site.
|
|
|
|
*
|
|
|
|
* We will also update the contact record with the nature and scope of the relationship.
|
|
|
|
*
|
|
|
|
*/
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-07-01 19:48:07 -04:00
|
|
|
require_once("Photo.php");
|
|
|
|
|
2010-10-26 17:50:38 -04:00
|
|
|
$photos = import_profile_photo($contact['photo'],$uid,$contact_id);
|
2010-11-18 23:58:46 -05:00
|
|
|
|
|
|
|
logger('dfrn_confirm: confirm - imported photos');
|
2010-09-08 23:14:17 -04:00
|
|
|
|
2010-11-07 01:56:39 -04:00
|
|
|
if($network === 'dfrn') {
|
2010-10-24 23:39:24 -04:00
|
|
|
|
|
|
|
$new_relation = REL_VIP;
|
|
|
|
if(($relation == REL_FAN) || ($duplex))
|
|
|
|
$new_relation = REL_BUD;
|
|
|
|
|
2010-11-09 20:53:20 -05:00
|
|
|
if(($relation == REL_FAN) && ($duplex))
|
|
|
|
$duplex = 0;
|
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$r = q("UPDATE `contact` SET `photo` = '%s',
|
2010-11-05 02:50:32 -04:00
|
|
|
`thumb` = '%s',
|
|
|
|
`micro` = '%s',
|
2010-10-24 23:39:24 -04:00
|
|
|
`rel` = %d,
|
|
|
|
`name-date` = '%s',
|
|
|
|
`uri-date` = '%s',
|
|
|
|
`avatar-date` = '%s',
|
|
|
|
`blocked` = 0,
|
|
|
|
`pending` = 0,
|
|
|
|
`duplex` = %d,
|
|
|
|
`network` = 'dfrn' WHERE `id` = %d LIMIT 1
|
|
|
|
",
|
2010-10-26 17:50:38 -04:00
|
|
|
dbesc($photos[0]),
|
|
|
|
dbesc($photos[1]),
|
2010-11-05 02:50:32 -04:00
|
|
|
dbesc($photos[2]),
|
2010-10-24 23:39:24 -04:00
|
|
|
intval($new_relation),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
intval($duplex),
|
|
|
|
intval($contact_id)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
else {
|
2010-12-08 18:30:26 -05:00
|
|
|
// $network !== 'dfrn'
|
2010-10-24 23:39:24 -04:00
|
|
|
|
|
|
|
$notify = '';
|
|
|
|
$poll = '';
|
|
|
|
|
|
|
|
$arr = lrdd($contact['url']);
|
|
|
|
if(count($arr)) {
|
|
|
|
foreach($arr as $link) {
|
|
|
|
if($link['@attributes']['rel'] === 'salmon')
|
|
|
|
$notify = $link['@attributes']['href'];
|
|
|
|
if($link['@attributes']['rel'] === NAMESPACE_FEED)
|
|
|
|
$poll = $link['@attributes']['href'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$r = q("DELETE FROM `intro` WHERE `id` = %d AND `uid` = %d LIMIT 1",
|
|
|
|
intval($intro_id),
|
|
|
|
intval($uid)
|
|
|
|
);
|
|
|
|
|
2010-11-07 01:56:39 -04:00
|
|
|
|
2010-10-24 23:39:24 -04:00
|
|
|
$r = q("UPDATE `contact` SET `photo` = '%s',
|
2010-11-05 02:50:32 -04:00
|
|
|
`thumb` = '%s',
|
|
|
|
`micro` = '%s',
|
2010-10-24 23:39:24 -04:00
|
|
|
`name-date` = '%s',
|
|
|
|
`uri-date` = '%s',
|
|
|
|
`avatar-date` = '%s',
|
|
|
|
`notify` = '%s',
|
|
|
|
`poll` = '%s',
|
|
|
|
`blocked` = 0,
|
2010-11-07 01:56:39 -04:00
|
|
|
`pending` = 0,
|
|
|
|
`network` = 'stat'
|
2010-10-24 23:39:24 -04:00
|
|
|
WHERE `id` = %d LIMIT 1
|
|
|
|
",
|
2010-10-26 17:50:38 -04:00
|
|
|
dbesc($photos[0]),
|
|
|
|
dbesc($photos[1]),
|
2010-11-05 02:50:32 -04:00
|
|
|
dbesc($photos[2]),
|
2010-10-24 23:39:24 -04:00
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc($notify),
|
|
|
|
dbesc($poll),
|
|
|
|
intval($contact_id)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2010-07-01 19:48:07 -04:00
|
|
|
if($r === false)
|
2010-10-24 23:39:24 -04:00
|
|
|
notice( t('Unable to set contact photo.') . EOL);
|
2010-07-26 23:45:54 -04:00
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
|
|
|
|
// Let's send our user to the contact editor in case they want to
|
|
|
|
// do anything special with this new friend.
|
2010-10-24 23:39:24 -04:00
|
|
|
|
2010-10-17 23:04:17 -04:00
|
|
|
if($handsfree === null)
|
|
|
|
goaway($a->get_baseurl() . '/contacts/' . intval($contact_id));
|
2010-12-08 18:30:26 -05:00
|
|
|
else
|
|
|
|
return;
|
|
|
|
//NOTREACHED
|
2010-07-01 19:48:07 -04:00
|
|
|
}
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* End of Scenario 1. [Local confirmation of remote friend request].
|
|
|
|
*
|
|
|
|
* Begin Scenario 2. This is the remote response to the above scenario.
|
|
|
|
* This will take place on the site that originally initiated the friend request.
|
|
|
|
* In the section above where the confirming party makes a POST and
|
|
|
|
* retrieves xml status information, they are communicating with the following code.
|
|
|
|
*
|
|
|
|
*/
|
2010-10-10 21:25:34 -04:00
|
|
|
|
|
|
|
if(x($_POST,'source_url')) {
|
|
|
|
|
|
|
|
// We are processing an external confirmation to an introduction created by our user.
|
|
|
|
|
2010-12-08 18:30:26 -05:00
|
|
|
$public_key = ((x($_POST,'public_key')) ? $_POST['public_key'] : '');
|
|
|
|
$dfrn_id = ((x($_POST,'dfrn_id')) ? hex2bin($_POST['dfrn_id']) : '');
|
|
|
|
$source_url = ((x($_POST,'source_url')) ? hex2bin($_POST['source_url']) : '');
|
|
|
|
$aes_key = ((x($_POST,'aes_key')) ? $_POST['aes_key'] : '');
|
|
|
|
$duplex = ((x($_POST,'duplex')) ? intval($_POST['duplex']) : 0 );
|
|
|
|
$version_id = ((x($_POST,'dfrn_version')) ? (float) $_POST['dfrn_version'] : 2.0);
|
2010-11-19 00:14:16 -05:00
|
|
|
|
|
|
|
logger('dfrn_confirm: requestee contacted: ' . $node);
|
2010-10-11 07:01:24 -04:00
|
|
|
|
2010-11-18 23:58:46 -05:00
|
|
|
logger('dfrn_confirm: request: POST=' . print_r($_POST,true), LOGGER_DATA);
|
|
|
|
|
2010-10-11 07:01:24 -04:00
|
|
|
// If $aes_key is set, both of these items require unpacking from the hex transport encoding.
|
|
|
|
|
|
|
|
if(x($aes_key)) {
|
|
|
|
$aes_key = hex2bin($aes_key);
|
|
|
|
$public_key = hex2bin($public_key);
|
|
|
|
}
|
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
// Find our user's account
|
|
|
|
|
|
|
|
$r = q("SELECT * FROM `user` WHERE `nickname` = '%s' LIMIT 1",
|
|
|
|
dbesc($node));
|
|
|
|
|
|
|
|
if(! count($r)) {
|
|
|
|
$message = t('No user record found for ') . '\'' . $node . '\'';
|
|
|
|
xml_status(3,$message); // failure
|
|
|
|
// NOTREACHED
|
|
|
|
}
|
|
|
|
|
|
|
|
$my_prvkey = $r[0]['prvkey'];
|
|
|
|
$local_uid = $r[0]['uid'];
|
|
|
|
|
|
|
|
|
|
|
|
if(! strstr($my_prvkey,'BEGIN RSA PRIVATE KEY')) {
|
|
|
|
$message = t('Our site encryption key is apparently messed up.');
|
|
|
|
xml_status(3,$message);
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify everything
|
|
|
|
|
|
|
|
$decrypted_source_url = "";
|
|
|
|
openssl_private_decrypt($source_url,$decrypted_source_url,$my_prvkey);
|
|
|
|
|
|
|
|
|
|
|
|
if(! strlen($decrypted_source_url)) {
|
|
|
|
$message = t('Empty site URL was provided or URL could not be decrypted by us.');
|
|
|
|
xml_status(3,$message);
|
|
|
|
// NOTREACHED
|
|
|
|
}
|
|
|
|
|
|
|
|
$ret = q("SELECT * FROM `contact` WHERE `url` = '%s' AND `uid` = %d LIMIT 1",
|
|
|
|
dbesc($decrypted_source_url),
|
|
|
|
intval($local_uid)
|
|
|
|
);
|
|
|
|
|
|
|
|
if(! count($ret)) {
|
|
|
|
// this is either a bogus confirmation (?) or we deleted the original introduction.
|
|
|
|
$message = t('Contact record was not found for you on our site.');
|
|
|
|
xml_status(3,$message);
|
|
|
|
return; // NOTREACHED
|
|
|
|
}
|
|
|
|
|
|
|
|
$relation = $ret[0]['rel'];
|
|
|
|
|
|
|
|
// Decrypt all this stuff we just received
|
|
|
|
|
|
|
|
$foreign_pubkey = $ret[0]['site-pubkey'];
|
|
|
|
$dfrn_record = $ret[0]['id'];
|
|
|
|
|
|
|
|
$decrypted_dfrn_id = "";
|
|
|
|
openssl_public_decrypt($dfrn_id,$decrypted_dfrn_id,$foreign_pubkey);
|
|
|
|
|
|
|
|
if(strlen($aes_key)) {
|
|
|
|
$decrypted_aes_key = "";
|
|
|
|
openssl_private_decrypt($aes_key,$decrypted_aes_key,$my_prvkey);
|
|
|
|
$dfrn_pubkey = openssl_decrypt($public_key,'AES-256-CBC',$decrypted_aes_key);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$dfrn_pubkey = $public_key;
|
|
|
|
}
|
|
|
|
|
|
|
|
$r = q("SELECT * FROM `contact` WHERE `dfrn-id` = '%s' LIMIT 1",
|
2010-11-16 18:38:56 -05:00
|
|
|
dbesc($decrypted_dfrn_id)
|
2010-10-10 21:25:34 -04:00
|
|
|
);
|
|
|
|
if(count($r)) {
|
|
|
|
$message = t('The ID provided by your system is a duplicate on our system. It should work if you try again.');
|
|
|
|
xml_status(1,$message); // Birthday paradox - duplicate dfrn-id
|
|
|
|
// NOTREACHED
|
|
|
|
}
|
|
|
|
|
|
|
|
$r = q("UPDATE `contact` SET `dfrn-id` = '%s', `pubkey` = '%s' WHERE `id` = %d LIMIT 1",
|
|
|
|
dbesc($decrypted_dfrn_id),
|
|
|
|
dbesc($dfrn_pubkey),
|
|
|
|
intval($dfrn_record)
|
|
|
|
);
|
|
|
|
if(! count($r)) {
|
|
|
|
$message = t('Unable to set your contact credentials on our system.');
|
|
|
|
xml_status(3,$message);
|
|
|
|
}
|
|
|
|
|
|
|
|
// We're good but now we have to scrape the profile photo and send notifications.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
$r = q("SELECT `photo` FROM `contact` WHERE `id` = %d LIMIT 1",
|
|
|
|
intval($dfrn_record));
|
|
|
|
|
2010-10-26 17:50:38 -04:00
|
|
|
if(count($r))
|
|
|
|
$photo = $r[0]['photo'];
|
2010-10-10 21:25:34 -04:00
|
|
|
else
|
|
|
|
$photo = $a->get_baseurl() . '/images/default-profile.jpg';
|
2010-10-26 17:50:38 -04:00
|
|
|
|
|
|
|
require_once("Photo.php");
|
|
|
|
|
|
|
|
$photos = import_profile_photo($photo,$local_uid,$dfrn_record);
|
2010-10-10 21:25:34 -04:00
|
|
|
|
2010-11-18 23:58:46 -05:00
|
|
|
logger('dfrn_confirm: request - photos imported');
|
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
$new_relation = REL_FAN;
|
|
|
|
if(($relation == REL_VIP) || ($duplex))
|
|
|
|
$new_relation = REL_BUD;
|
|
|
|
|
2010-11-09 20:53:20 -05:00
|
|
|
if(($relation == REL_VIP) && ($duplex))
|
|
|
|
$duplex = 0;
|
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
$r = q("UPDATE `contact` SET
|
|
|
|
`photo` = '%s',
|
|
|
|
`thumb` = '%s',
|
2010-11-07 01:56:39 -04:00
|
|
|
`micro` = '%s',
|
2010-10-10 21:25:34 -04:00
|
|
|
`rel` = %d,
|
|
|
|
`name-date` = '%s',
|
|
|
|
`uri-date` = '%s',
|
|
|
|
`avatar-date` = '%s',
|
|
|
|
`blocked` = 0,
|
|
|
|
`pending` = 0,
|
|
|
|
`duplex` = %d,
|
|
|
|
`network` = 'dfrn' WHERE `id` = %d LIMIT 1
|
|
|
|
",
|
2010-10-26 17:50:38 -04:00
|
|
|
dbesc($photos[0]),
|
|
|
|
dbesc($photos[1]),
|
2010-11-07 01:56:39 -04:00
|
|
|
dbesc($photos[2]),
|
2010-10-10 21:25:34 -04:00
|
|
|
intval($new_relation),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
dbesc(datetime_convert()),
|
|
|
|
intval($duplex),
|
|
|
|
intval($dfrn_record)
|
|
|
|
);
|
2010-10-24 23:39:24 -04:00
|
|
|
if($r === false) { // indicates schema is messed up or total db failure
|
2010-10-10 21:25:34 -04:00
|
|
|
$message = t('Unable to update your contact profile details on our system');
|
|
|
|
xml_status(3,$message);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise everything seems to have worked and we are almost done. Yay!
|
|
|
|
// Send an email notification
|
|
|
|
|
2010-11-19 00:14:16 -05:00
|
|
|
logger('dfrn_confirm: request: info updated');
|
|
|
|
|
2010-10-10 21:25:34 -04:00
|
|
|
$r = q("SELECT * FROM `contact` LEFT JOIN `user` ON `contact`.`uid` = `user`.`uid`
|
|
|
|
WHERE `contact`.`id` = %d LIMIT 1",
|
|
|
|
intval($dfrn_record)
|
|
|
|
);
|
|
|
|
if((count($r)) && ($r[0]['notify-flags'] & NOTIFY_CONFIRM)) {
|
|
|
|
|
|
|
|
$tpl = (($new_relation == REL_BUD)
|
|
|
|
? load_view_file('view/friend_complete_eml.tpl')
|
|
|
|
: load_view_file('view/intro_complete_eml.tpl'));
|
|
|
|
|
|
|
|
$email_tpl = replace_macros($tpl, array(
|
|
|
|
'$sitename' => $a->config['sitename'],
|
|
|
|
'$siteurl' => $a->get_baseurl(),
|
|
|
|
'$username' => $r[0]['username'],
|
|
|
|
'$email' => $r[0]['email'],
|
|
|
|
'$fn' => $r[0]['name'],
|
|
|
|
'$dfrn_url' => $r[0]['url'],
|
|
|
|
'$uid' => $newuid )
|
|
|
|
);
|
|
|
|
|
|
|
|
$res = mail($r[0]['email'], t("Connection accepted at ") . $a->config['sitename'],
|
2010-11-07 18:46:49 -05:00
|
|
|
$email_tpl, 'From: ' . t('Administrator') . '@' . $_SERVER['SERVER_NAME'] );
|
2010-10-10 21:25:34 -04:00
|
|
|
if(!$res) {
|
2010-10-12 02:22:38 -04:00
|
|
|
// pointless throwing an error here and confusing the person at the other end of the wire.
|
2010-10-10 21:25:34 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
xml_status(0); // Success
|
|
|
|
return; // NOTREACHED
|
|
|
|
|
|
|
|
////////////////////// End of this scenario ///////////////////////////////////////////////
|
|
|
|
}
|
|
|
|
|
|
|
|
// somebody arrived here by mistake or they are fishing. Send them to the homepage.
|
|
|
|
|
|
|
|
goaway($a->get_baseurl());
|
|
|
|
// NOTREACHED
|
|
|
|
|
2010-07-01 19:48:07 -04:00
|
|
|
}
|