2018-06-18 17:05:44 -04:00
|
|
|
<?php
|
|
|
|
/**
|
2020-02-09 10:18:46 -05:00
|
|
|
* @copyright Copyright (C) 2020, Friendica
|
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2018-06-18 17:05:44 -04:00
|
|
|
*/
|
2020-02-09 10:18:46 -05:00
|
|
|
|
2018-06-18 17:05:44 -04:00
|
|
|
namespace Friendica\Module;
|
|
|
|
|
|
|
|
use Friendica\BaseModule;
|
2018-10-29 17:20:46 -04:00
|
|
|
use Friendica\Core\Logger;
|
|
|
|
use Friendica\Core\System;
|
2018-07-20 08:19:26 -04:00
|
|
|
use Friendica\Database\DBA;
|
2019-12-15 16:34:11 -05:00
|
|
|
use Friendica\DI;
|
2018-06-19 10:15:28 -04:00
|
|
|
use Friendica\Model\Contact;
|
2020-03-04 16:07:05 -05:00
|
|
|
use Friendica\Network\HTTPRequest;
|
2018-06-20 12:38:23 -04:00
|
|
|
use Friendica\Util\HTTPSignature;
|
2018-11-08 08:45:46 -05:00
|
|
|
use Friendica\Util\Strings;
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2018-06-19 07:30:55 -04:00
|
|
|
/**
|
|
|
|
* Magic Auth (remote authentication) module.
|
2018-07-10 08:27:56 -04:00
|
|
|
*
|
2018-06-19 07:30:55 -04:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/Zotlabs/Module/Magic.php
|
|
|
|
*/
|
2018-06-18 17:05:44 -04:00
|
|
|
class Magic extends BaseModule
|
|
|
|
{
|
2019-11-05 16:48:54 -05:00
|
|
|
public static function init(array $parameters = [])
|
2018-06-18 17:05:44 -04:00
|
|
|
{
|
2019-12-15 16:34:11 -05:00
|
|
|
$a = DI::app();
|
2018-06-18 17:05:44 -04:00
|
|
|
$ret = ['success' => false, 'url' => '', 'message' => ''];
|
2020-06-29 16:22:00 -04:00
|
|
|
Logger::info('magic mdule: invoked');
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2020-06-29 16:22:00 -04:00
|
|
|
Logger::debug('args', ['request' => $_REQUEST]);
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2019-10-15 09:20:32 -04:00
|
|
|
$addr = $_REQUEST['addr'] ?? '';
|
|
|
|
$dest = $_REQUEST['dest'] ?? '';
|
2018-11-30 09:06:22 -05:00
|
|
|
$test = (!empty($_REQUEST['test']) ? intval($_REQUEST['test']) : 0);
|
|
|
|
$owa = (!empty($_REQUEST['owa']) ? intval($_REQUEST['owa']) : 0);
|
2019-09-29 06:23:36 -04:00
|
|
|
$cid = 0;
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2019-09-28 20:16:09 -04:00
|
|
|
if (!empty($addr)) {
|
2018-06-19 10:15:28 -04:00
|
|
|
$cid = Contact::getIdForURL($addr);
|
2019-09-29 06:23:36 -04:00
|
|
|
} elseif (!empty($dest)) {
|
2019-09-28 20:16:09 -04:00
|
|
|
$cid = Contact::getIdForURL($dest);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
|
|
|
|
2018-06-19 10:15:28 -04:00
|
|
|
if (!$cid) {
|
2019-09-29 06:23:36 -04:00
|
|
|
Logger::info('No contact record found', $_REQUEST);
|
2018-10-19 19:01:15 -04:00
|
|
|
// @TODO Finding a more elegant possibility to redirect to either internal or external URL
|
2018-10-24 14:16:14 -04:00
|
|
|
$a->redirect($dest);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
2018-07-20 08:19:26 -04:00
|
|
|
$contact = DBA::selectFirst('contact', ['id', 'nurl', 'url'], ['id' => $cid]);
|
2018-06-19 10:15:28 -04:00
|
|
|
|
2018-06-18 17:05:44 -04:00
|
|
|
// Redirect if the contact is already authenticated on this site.
|
2019-12-15 19:05:15 -05:00
|
|
|
if (!empty($a->contact) && array_key_exists('id', $a->contact) && strpos($contact['nurl'], Strings::normaliseLink(DI::baseUrl()->get())) !== false) {
|
2018-07-10 08:27:56 -04:00
|
|
|
if ($test) {
|
2018-06-18 17:05:44 -04:00
|
|
|
$ret['success'] = true;
|
|
|
|
$ret['message'] .= 'Local site - you are already authenticated.' . EOL;
|
|
|
|
return $ret;
|
|
|
|
}
|
|
|
|
|
2020-06-29 16:22:00 -04:00
|
|
|
Logger::info('Contact is already authenticated');
|
2018-10-19 19:01:15 -04:00
|
|
|
System::externalRedirect($dest);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (local_user()) {
|
|
|
|
$user = $a->user;
|
|
|
|
|
|
|
|
// OpenWebAuth
|
|
|
|
if ($owa) {
|
|
|
|
// Extract the basepath
|
|
|
|
// NOTE: we need another solution because this does only work
|
|
|
|
// for friendica contacts :-/ . We should have the basepath
|
|
|
|
// of a contact also in the contact table.
|
2018-06-19 10:15:28 -04:00
|
|
|
$exp = explode('/profile/', $contact['url']);
|
2018-06-18 17:05:44 -04:00
|
|
|
$basepath = $exp[0];
|
|
|
|
|
|
|
|
$headers = [];
|
2019-01-08 06:17:05 -05:00
|
|
|
$headers['Accept'] = 'application/x-dfrn+json, application/x-zot+json';
|
2018-11-08 08:45:46 -05:00
|
|
|
$headers['X-Open-Web-Auth'] = Strings::getRandomHex();
|
2018-06-18 17:05:44 -04:00
|
|
|
|
|
|
|
// Create a header that is signed with the local users private key.
|
2018-06-20 12:38:23 -04:00
|
|
|
$headers = HTTPSignature::createSig(
|
2018-06-20 13:32:26 -04:00
|
|
|
$headers,
|
|
|
|
$user['prvkey'],
|
2019-12-29 20:17:16 -05:00
|
|
|
'acct:' . $user['nickname'] . '@' . DI::baseUrl()->getHostname() . (DI::baseUrl()->getUrlPath() ? '/' . DI::baseUrl()->getUrlPath() : '')
|
2018-06-18 17:05:44 -04:00
|
|
|
);
|
|
|
|
|
|
|
|
// Try to get an authentication token from the other instance.
|
2020-03-04 16:07:05 -05:00
|
|
|
$curlResult = HTTPRequest::curl($basepath . '/owa', false, ['headers' => $headers]);
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2018-10-10 15:08:43 -04:00
|
|
|
if ($curlResult->isSuccess()) {
|
|
|
|
$j = json_decode($curlResult->getBody(), true);
|
2018-06-18 17:05:44 -04:00
|
|
|
|
|
|
|
if ($j['success']) {
|
|
|
|
$token = '';
|
|
|
|
if ($j['encrypted_token']) {
|
|
|
|
// The token is encrypted. If the local user is really the one the other instance
|
|
|
|
// thinks he/she is, the token can be decrypted with the local users public key.
|
2018-11-08 10:37:08 -05:00
|
|
|
openssl_private_decrypt(Strings::base64UrlDecode($j['encrypted_token']), $token, $user['prvkey']);
|
2018-06-18 17:05:44 -04:00
|
|
|
} else {
|
|
|
|
$token = $j['token'];
|
|
|
|
}
|
2019-09-29 14:59:03 -04:00
|
|
|
$args = (strpbrk($dest, '?&') ? '&' : '?') . 'owt=' . $token;
|
2018-06-18 17:05:44 -04:00
|
|
|
|
2019-09-29 06:58:07 -04:00
|
|
|
Logger::info('Redirecting', ['path' => $dest . $args]);
|
2018-10-19 19:01:15 -04:00
|
|
|
System::externalRedirect($dest . $args);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
|
|
|
}
|
2018-10-19 19:01:15 -04:00
|
|
|
System::externalRedirect($dest);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-10 08:27:56 -04:00
|
|
|
if ($test) {
|
2018-06-18 17:05:44 -04:00
|
|
|
$ret['message'] = 'Not authenticated or invalid arguments' . EOL;
|
|
|
|
return $ret;
|
|
|
|
}
|
|
|
|
|
2018-10-19 19:01:15 -04:00
|
|
|
// @TODO Finding a more elegant possibility to redirect to either internal or external URL
|
2018-10-24 14:16:14 -04:00
|
|
|
$a->redirect($dest);
|
2018-06-18 17:05:44 -04:00
|
|
|
}
|
|
|
|
}
|