* */ namespace Friendica\Protocol; use Friendica\App; use Friendica\Core\Config; use Friendica\Core\System; use Friendica\Database\DBM; use dba; define('REQUEST_TOKEN_DURATION', 300); define('ACCESS_TOKEN_DURATION', 31536000); require_once "library/OAuth1.php"; require_once "library/oauth2-php/lib/OAuth2.inc"; /** * @brief OAuthDataStore class */ class FKOAuthDataStore extends OAuthDataStore { function gen_token() { return md5(base64_encode(pack('N6', mt_rand(), mt_rand(), mt_rand(), mt_rand(), mt_rand(), uniqid()))); } function lookup_consumer($consumer_key) { logger(__function__.":".$consumer_key); $r = q("SELECT client_id, pw, redirect_uri FROM clients WHERE client_id='%s'", dbesc($consumer_key) ); if (DBM::is_result($r)) { return new OAuthConsumer($r[0]['client_id'], $r[0]['pw'], $r[0]['redirect_uri']); } return null; } function lookup_token($consumer, $token_type, $token) { logger(__function__.":".$consumer.", ". $token_type.", ".$token); $r = q("SELECT id, secret,scope, expires, uid FROM tokens WHERE client_id='%s' AND scope='%s' AND id='%s'", dbesc($consumer->key), dbesc($token_type), dbesc($token) ); if (DBM::is_result($r)) { $ot=new OAuthToken($r[0]['id'], $r[0]['secret']); $ot->scope=$r[0]['scope']; $ot->expires = $r[0]['expires']; $ot->uid = $r[0]['uid']; return $ot; } return null; } function lookup_nonce($consumer, $token, $nonce, $timestamp) { //echo __file__.":".__line__."
"; var_dump($consumer,$key); killme();
		$r = q("SELECT id, secret  FROM tokens WHERE client_id='%s' AND id='%s' AND expires=%d",
			dbesc($consumer->key),
			dbesc($nonce),
			intval($timestamp)
		);
		
		if (DBM::is_result($r)) {
			return new OAuthToken($r[0]['id'], $r[0]['secret']);
		}

		return null;
	}

	function new_request_token($consumer, $callback = null)
	{
		logger(__function__.":".$consumer.", ". $callback);
		$key = $this->gen_token();
		$sec = $this->gen_token();

		if ($consumer->key) {
			$k = $consumer->key;
		} else {
			$k = $consumer;
		}

		$r = q("INSERT INTO tokens (id, secret, client_id, scope, expires) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d)",
			dbesc($key),
			dbesc($sec),
			dbesc($k),
			'request',
			intval(REQUEST_TOKEN_DURATION)
		);

		if (!$r) {
			return null;
		}

		return new OAuthToken($key, $sec);
	}

	function new_access_token($token, $consumer, $verifier = null)
	{
		logger(__function__.":".$token.", ". $consumer.", ". $verifier);

		// return a new access token attached to this consumer
		// for the user associated with this token if the request token
		// is authorized
		// should also invalidate the request token

		$ret = null;

		// get user for this verifier
		$uverifier = Config::get("oauth", $verifier);
		logger(__function__.":".$verifier.",".$uverifier);

		if (is_null($verifier) || ($uverifier!==false)) {
			$key = $this->gen_token();
			$sec = $this->gen_token();
			$r = q("INSERT INTO tokens (id, secret, client_id, scope, expires, uid) VALUES ('%s','%s','%s','%s', UNIX_TIMESTAMP()+%d, %d)",
				dbesc($key),
				dbesc($sec),
				dbesc($consumer->key),
				'access',
				intval(ACCESS_TOKEN_DURATION),
				intval($uverifier)
			);

			if ($r) {
				$ret = new OAuthToken($key, $sec);
			}
		}


		dba::delete('tokens', array('id' => $token->key));


		if (!is_null($ret) && $uverifier !== false) {
			Config::delete("oauth", $verifier);
		}

		return $ret;
	}
}