2018-02-09 04:49:49 +01:00
< ? php
2020-02-09 15:45:36 +01:00
/**
2021-03-29 08:40:20 +02:00
* @ copyright Copyright ( C ) 2010 - 2021 , the Friendica project
2020-02-09 15:45:36 +01:00
*
* @ license GNU AGPL version 3 or any later version
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation , either version 3 of the
* License , or ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
*
* You should have received a copy of the GNU Affero General Public License
* along with this program . If not , see < https :// www . gnu . org / licenses />.
*
*/
2018-02-09 04:49:49 +01:00
namespace Friendica ;
2021-11-19 22:47:49 +01:00
use Friendica\App\Router ;
2021-11-14 20:28:36 +01:00
use Friendica\Capabilities\ICanHandleRequests ;
2021-11-21 21:52:36 +01:00
use Friendica\Capabilities\ICanCreateResponses ;
2021-11-20 15:38:03 +01:00
use Friendica\Core\Hook ;
2021-11-19 20:18:48 +01:00
use Friendica\Core\L10n ;
2018-10-29 22:20:46 +01:00
use Friendica\Core\Logger ;
2021-08-08 12:14:56 +02:00
use Friendica\Model\User ;
2021-11-21 20:06:36 +01:00
use Friendica\Module\Response ;
2021-11-20 15:38:03 +01:00
use Friendica\Module\Special\HTTPException as ModuleHTTPException ;
use Friendica\Network\HTTPException ;
2021-11-19 22:47:49 +01:00
use Friendica\Util\Profiler ;
2021-11-21 23:37:17 +01:00
use Psr\Http\Message\ResponseInterface ;
2021-11-19 22:47:49 +01:00
use Psr\Log\LoggerInterface ;
2018-10-17 21:30:41 +02:00
2018-02-09 04:49:49 +01:00
/**
* All modules in Friendica should extend BaseModule , although not all modules
* need to extend all the methods described here
*
2018-04-03 16:33:39 +02:00
* The filename of the module in src / Module needs to match the class name
* exactly to make the module available .
*
2018-09-16 01:28:38 +02:00
* @ author Hypolite Petovan < hypolite @ mrpetovan . com >
2018-02-09 04:49:49 +01:00
*/
2021-11-14 20:28:36 +01:00
abstract class BaseModule implements ICanHandleRequests
2018-02-09 04:49:49 +01:00
{
2021-11-14 20:28:36 +01:00
/** @var array */
2021-11-14 23:19:25 +01:00
protected $parameters = [];
2021-11-19 20:18:48 +01:00
/** @var L10n */
protected $l10n ;
2021-11-20 15:38:03 +01:00
/** @var App\BaseURL */
protected $baseUrl ;
/** @var App\Arguments */
protected $args ;
/** @var LoggerInterface */
protected $logger ;
/** @var Profiler */
protected $profiler ;
/** @var array */
protected $server ;
2021-11-21 21:52:36 +01:00
/** @var ICanCreateResponses */
2021-11-21 20:06:36 +01:00
protected $response ;
2021-11-19 20:18:48 +01:00
2021-11-21 20:06:36 +01:00
public function __construct ( L10n $l10n , App\BaseURL $baseUrl , App\Arguments $args , LoggerInterface $logger , Profiler $profiler , Response $response , array $server , array $parameters = [])
2018-02-09 04:49:49 +01:00
{
2021-11-17 21:32:57 +01:00
$this -> parameters = $parameters ;
2021-11-19 20:18:48 +01:00
$this -> l10n = $l10n ;
2021-11-20 15:38:03 +01:00
$this -> baseUrl = $baseUrl ;
$this -> args = $args ;
$this -> logger = $logger ;
$this -> profiler = $profiler ;
$this -> server = $server ;
2021-11-21 20:06:36 +01:00
$this -> response = $response ;
2018-09-30 22:47:28 +02:00
}
2018-02-09 04:49:49 +01:00
2021-11-18 21:33:05 +01:00
/**
2021-11-19 20:18:48 +01:00
* Wraps the L10n :: t () function for Modules
*
* @ see L10n :: t ()
*/
protected function t ( string $s , ... $args ) : string
{
2021-11-24 16:57:05 +01:00
return $this -> l10n -> t ( $s , ... $args );
2021-11-19 20:18:48 +01:00
}
/**
* Wraps the L10n :: tt () function for Modules
*
* @ see L10n :: tt ()
2021-11-18 21:33:05 +01:00
*/
2021-11-19 20:18:48 +01:00
protected function tt ( string $singular , string $plurarl , int $count ) : string
2021-11-18 21:33:05 +01:00
{
2021-11-19 20:18:48 +01:00
return $this -> l10n -> tt ( $singular , $plurarl , $count );
2021-11-18 21:33:05 +01:00
}
2018-09-30 22:47:28 +02:00
/**
2021-11-20 15:38:03 +01:00
* Module GET method to display raw content from technical endpoints
*
* Extend this method if the module is supposed to return communication data ,
* e . g . from protocol implementations .
*
* @ param string [] $request The $_REQUEST content
2018-09-30 22:47:28 +02:00
*/
2021-11-20 15:38:03 +01:00
protected function rawContent ( array $request = [])
2018-09-30 22:47:28 +02:00
{
2019-11-05 23:01:45 +01:00
// echo '';
// exit;
2018-02-09 04:49:49 +01:00
}
/**
2021-11-20 15:38:03 +01:00
* Module GET method to display any content
*
* Extend this method if the module is supposed to return any display
* through a GET request . It can be an HTML page through templating or a
* XML feed or a JSON output .
*
* @ param string [] $request The $_REQUEST content
2018-02-09 04:49:49 +01:00
*/
2021-11-20 15:38:03 +01:00
protected function content ( array $request = []) : string
2018-02-09 04:49:49 +01:00
{
2021-11-14 20:28:36 +01:00
return '' ;
2018-02-09 04:49:49 +01:00
}
2021-05-08 11:14:19 +02:00
/**
2021-11-20 15:38:03 +01:00
* Module DELETE method to process submitted data
*
* Extend this method if the module is supposed to process DELETE requests .
* Doesn ' t display any content
2021-11-28 13:44:42 +01:00
*
* @ param string [] $request The $_REQUEST content
2021-05-08 11:14:19 +02:00
*/
2021-11-28 13:44:42 +01:00
protected function delete ( array $request = [])
2021-05-08 11:14:19 +02:00
{
}
/**
2021-11-20 15:38:03 +01:00
* Module PATCH method to process submitted data
*
* Extend this method if the module is supposed to process PATCH requests .
* Doesn ' t display any content
2021-11-28 13:44:42 +01:00
*
* @ param string [] $request The $_REQUEST content
2021-05-08 11:14:19 +02:00
*/
2021-11-28 13:44:42 +01:00
protected function patch ( array $request = [])
2021-05-08 11:14:19 +02:00
{
}
2018-02-09 04:49:49 +01:00
/**
2021-11-20 15:38:03 +01:00
* Module POST method to process submitted data
*
* Extend this method if the module is supposed to process POST requests .
* Doesn ' t display any content
*
* @ param string [] $request The $_REQUEST content
*
2018-02-09 04:49:49 +01:00
*/
2021-11-28 13:44:42 +01:00
protected function post ( array $request = [])
2018-02-09 04:49:49 +01:00
{
2021-11-20 15:38:03 +01:00
// $this->baseUrl->redirect('module');
2018-02-09 04:49:49 +01:00
}
2021-05-08 11:14:19 +02:00
/**
2021-11-20 15:38:03 +01:00
* Module PUT method to process submitted data
*
* Extend this method if the module is supposed to process PUT requests .
* Doesn ' t display any content
2021-11-28 13:44:42 +01:00
*
* @ param string [] $request The $_REQUEST content
2021-05-08 11:14:19 +02:00
*/
2021-11-28 13:44:42 +01:00
protected function put ( array $request = [])
2021-05-08 11:14:19 +02:00
{
}
2021-11-20 15:38:03 +01:00
/**
* { @ inheritDoc }
*/
2021-11-28 13:44:42 +01:00
public function run ( array $request = []) : ResponseInterface
2021-11-19 22:47:49 +01:00
{
// @see https://github.com/tootsuite/mastodon/blob/c3aef491d66aec743a3a53e934a494f653745b61/config/initializers/cors.rb
2021-11-20 15:38:03 +01:00
if ( substr ( $request [ 'pagename' ] ? ? '' , 0 , 12 ) == '.well-known/' ) {
2021-11-21 22:23:35 +01:00
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Origin' );
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Headers' );
$this -> response -> setHeader ( Router :: GET , 'Access-Control-Allow-Methods' );
$this -> response -> setHeader ( 'false' , 'Access-Control-Allow-Credentials' );
2021-11-20 15:38:03 +01:00
} elseif ( substr ( $request [ 'pagename' ] ? ? '' , 0 , 8 ) == 'profile/' ) {
2021-11-21 22:23:35 +01:00
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Origin' );
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Headers' );
$this -> response -> setHeader ( Router :: GET , 'Access-Control-Allow-Methods' );
$this -> response -> setHeader ( 'false' , 'Access-Control-Allow-Credentials' );
2021-11-20 15:38:03 +01:00
} elseif ( substr ( $request [ 'pagename' ] ? ? '' , 0 , 4 ) == 'api/' ) {
2021-11-21 22:23:35 +01:00
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Origin' );
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Headers' );
$this -> response -> setHeader ( implode ( ',' , Router :: ALLOWED_METHODS ), 'Access-Control-Allow-Methods' );
$this -> response -> setHeader ( 'false' , 'Access-Control-Allow-Credentials' );
$this -> response -> setHeader ( 'Link' , 'Access-Control-Expose-Headers' );
2021-11-20 15:38:03 +01:00
} elseif ( substr ( $request [ 'pagename' ] ? ? '' , 0 , 11 ) == 'oauth/token' ) {
2021-11-21 22:23:35 +01:00
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Origin' );
$this -> response -> setHeader ( '*' , 'Access-Control-Allow-Headers' );
$this -> response -> setHeader ( Router :: POST , 'Access-Control-Allow-Methods' );
$this -> response -> setHeader ( 'false' , 'Access-Control-Allow-Credentials' );
2021-11-19 22:47:49 +01:00
}
$placeholder = '' ;
2021-11-20 15:38:03 +01:00
$this -> profiler -> set ( microtime ( true ), 'ready' );
2021-11-19 22:47:49 +01:00
$timestamp = microtime ( true );
2021-11-20 15:38:03 +01:00
Core\Hook :: callAll ( $this -> args -> getModuleName () . '_mod_init' , $placeholder );
2021-11-19 22:47:49 +01:00
2021-11-20 15:38:03 +01:00
$this -> profiler -> set ( microtime ( true ) - $timestamp , 'init' );
2021-11-19 22:47:49 +01:00
2021-11-21 21:52:36 +01:00
switch ( $this -> server [ 'REQUEST_METHOD' ] ? ? Router :: GET ) {
2021-11-21 20:06:36 +01:00
case Router :: DELETE :
2021-11-28 13:44:42 +01:00
$this -> delete ( $request );
2021-11-21 20:06:36 +01:00
break ;
case Router :: PATCH :
2021-11-28 13:44:42 +01:00
$this -> patch ( $request );
2021-11-21 20:06:36 +01:00
break ;
case Router :: POST :
2021-11-28 13:44:42 +01:00
Core\Hook :: callAll ( $this -> args -> getModuleName () . '_mod_post' , $request );
$this -> post ( $request );
2021-11-21 20:06:36 +01:00
break ;
case Router :: PUT :
2021-11-28 13:44:42 +01:00
$this -> put ( $request );
2021-11-21 20:06:36 +01:00
break ;
2021-11-27 13:41:37 +01:00
}
$timestamp = microtime ( true );
// "rawContent" is especially meant for technical endpoints.
// This endpoint doesn't need any theme initialization or other comparable stuff.
$this -> rawContent ( $request );
try {
$arr = [ 'content' => '' ];
Hook :: callAll ( static :: class . '_mod_content' , $arr );
$this -> response -> addContent ( $arr [ 'content' ]);
2021-11-28 13:44:42 +01:00
$this -> response -> addContent ( $this -> content ( $request ));
2021-11-27 13:41:37 +01:00
} catch ( HTTPException $e ) {
$this -> response -> addContent (( new ModuleHTTPException ()) -> content ( $e ));
} finally {
$this -> profiler -> set ( microtime ( true ) - $timestamp , 'content' );
2021-11-19 22:47:49 +01:00
}
2021-11-21 23:37:17 +01:00
return $this -> response -> generate ();
2021-11-19 22:47:49 +01:00
}
2021-11-28 13:22:27 +01:00
/**
* Checks request inputs and sets default parameters
*
* @ param array $defaults Associative array of expected request keys and their default typed value . A null
* value will remove the request key from the resulting value array .
* @ param array $input Custom REQUEST array , superglobal instead
*
* @ return array Request data
*/
protected function checkDefaults ( array $defaults , array $input ) : array
{
$request = [];
foreach ( $defaults as $parameter => $defaultvalue ) {
if ( is_string ( $defaultvalue )) {
$request [ $parameter ] = $input [ $parameter ] ? ? $defaultvalue ;
} elseif ( is_int ( $defaultvalue )) {
$request [ $parameter ] = ( int )( $input [ $parameter ] ? ? $defaultvalue );
} elseif ( is_float ( $defaultvalue )) {
$request [ $parameter ] = ( float )( $input [ $parameter ] ? ? $defaultvalue );
} elseif ( is_array ( $defaultvalue )) {
$request [ $parameter ] = $input [ $parameter ] ? ? [];
} elseif ( is_bool ( $defaultvalue )) {
$request [ $parameter ] = in_array ( strtolower ( $input [ $parameter ] ? ? '' ), [ 'true' , '1' ]);
} else {
$this -> logger -> notice ( 'Unhandled default value type' , [ 'parameter' => $parameter , 'type' => gettype ( $defaultvalue )]);
}
}
foreach ( $input ? ? [] as $parameter => $value ) {
if ( $parameter == 'pagename' ) {
continue ;
}
if ( ! in_array ( $parameter , array_keys ( $defaults ))) {
$this -> logger -> notice ( 'Unhandled request field' , [ 'parameter' => $parameter , 'value' => $value , 'command' => $this -> args -> getCommand ()]);
}
}
$this -> logger -> debug ( 'Got request parameters' , [ 'request' => $request , 'command' => $this -> args -> getCommand ()]);
return $request ;
}
2018-10-17 21:30:41 +02:00
/*
* Functions used to protect against Cross - Site Request Forgery
* The security token has to base on at least one value that an attacker can 't know - here it' s the session ID and the private key .
* In this implementation , a security token is reusable ( if the user submits a form , goes back and resubmits the form , maybe with small changes ;
2020-07-09 21:08:09 +02:00
* or if the security token is used for ajax - calls that happen several times ), but only valid for a certain amount of time ( 3 hours ) .
* The " typename " separates the security tokens of different types of forms . This could be relevant in the following case :
* A security token is used to protect a link from CSRF ( e . g . the " delete this profile " - link ) .
2018-10-17 21:30:41 +02:00
* If the new page contains by any chance external elements , then the used security token is exposed by the referrer .
2020-07-09 21:08:09 +02:00
* Actually , important actions should not be triggered by Links / GET - Requests at all , but sometimes they still are ,
2018-10-17 21:30:41 +02:00
* so this mechanism brings in some damage control ( the attacker would be able to forge a request to a form of this type , but not to forms of other types ) .
*/
public static function getFormSecurityToken ( $typename = '' )
{
2021-11-21 20:06:36 +01:00
$user = User :: getById ( DI :: app () -> getLoggedInUserId (), [ 'guid' , 'prvkey' ]);
2018-10-17 21:30:41 +02:00
$timestamp = time ();
2021-11-21 20:06:36 +01:00
$sec_hash = hash ( 'whirlpool' , ( $user [ 'guid' ] ? ? '' ) . ( $user [ 'prvkey' ] ? ? '' ) . session_id () . $timestamp . $typename );
2018-10-17 21:30:41 +02:00
return $timestamp . '.' . $sec_hash ;
}
public static function checkFormSecurityToken ( $typename = '' , $formname = 'form_security_token' )
{
$hash = null ;
if ( ! empty ( $_REQUEST [ $formname ])) {
/// @TODO Careful, not secured!
$hash = $_REQUEST [ $formname ];
}
if ( ! empty ( $_SERVER [ 'HTTP_X_CSRF_TOKEN' ])) {
/// @TODO Careful, not secured!
$hash = $_SERVER [ 'HTTP_X_CSRF_TOKEN' ];
}
if ( empty ( $hash )) {
return false ;
}
$max_livetime = 10800 ; // 3 hours
2021-08-09 22:33:46 +02:00
$user = User :: getById ( DI :: app () -> getLoggedInUserId (), [ 'guid' , 'prvkey' ]);
2018-10-17 21:30:41 +02:00
$x = explode ( '.' , $hash );
2019-10-07 20:10:30 +02:00
if ( time () > ( intval ( $x [ 0 ]) + $max_livetime )) {
2018-10-17 21:30:41 +02:00
return false ;
}
2021-08-08 12:14:56 +02:00
$sec_hash = hash ( 'whirlpool' , ( $user [ 'guid' ] ? ? '' ) . ( $user [ 'prvkey' ] ? ? '' ) . session_id () . $x [ 0 ] . $typename );
2018-10-17 21:30:41 +02:00
return ( $sec_hash == $x [ 1 ]);
}
public static function getFormSecurityStandardErrorMessage ()
{
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( " The form security token was not correct. This probably happened because the form has been opened for too long \x28 >3 hours \x29 before submitting it. " ) . EOL ;
2018-10-17 21:30:41 +02:00
}
public static function checkFormSecurityTokenRedirectOnError ( $err_redirect , $typename = '' , $formname = 'form_security_token' )
{
if ( ! self :: checkFormSecurityToken ( $typename , $formname )) {
2021-10-20 20:53:52 +02:00
Logger :: notice ( 'checkFormSecurityToken failed: user ' . DI :: app () -> getLoggedInUserNickname () . ' - form element ' . $typename );
Logger :: debug ( 'checkFormSecurityToken failed' , [ 'request' => $_REQUEST ]);
2018-10-19 10:03:52 +02:00
notice ( self :: getFormSecurityStandardErrorMessage ());
2019-12-16 00:28:31 +01:00
DI :: baseUrl () -> redirect ( $err_redirect );
2018-10-17 21:30:41 +02:00
}
}
public static function checkFormSecurityTokenForbiddenOnError ( $typename = '' , $formname = 'form_security_token' )
{
if ( ! self :: checkFormSecurityToken ( $typename , $formname )) {
2021-10-20 20:53:52 +02:00
Logger :: notice ( 'checkFormSecurityToken failed: user ' . DI :: app () -> getLoggedInUserNickname () . ' - form element ' . $typename );
Logger :: debug ( 'checkFormSecurityToken failed' , [ 'request' => $_REQUEST ]);
2018-12-26 06:40:12 +01:00
2019-05-02 05:16:10 +02:00
throw new \Friendica\Network\HTTPException\ForbiddenException ();
2018-10-17 21:30:41 +02:00
}
}
2020-08-06 16:34:11 +02:00
protected static function getContactFilterTabs ( string $baseUrl , string $current , bool $displayCommonTab )
{
$tabs = [
[
'label' => DI :: l10n () -> t ( 'All contacts' ),
'url' => $baseUrl . '/contacts' ,
'sel' => ! $current || $current == 'all' ? 'active' : '' ,
],
[
'label' => DI :: l10n () -> t ( 'Followers' ),
'url' => $baseUrl . '/contacts/followers' ,
'sel' => $current == 'followers' ? 'active' : '' ,
],
[
'label' => DI :: l10n () -> t ( 'Following' ),
'url' => $baseUrl . '/contacts/following' ,
'sel' => $current == 'following' ? 'active' : '' ,
],
[
'label' => DI :: l10n () -> t ( 'Mutual friends' ),
'url' => $baseUrl . '/contacts/mutuals' ,
'sel' => $current == 'mutuals' ? 'active' : '' ,
],
];
if ( $displayCommonTab ) {
$tabs [] = [
'label' => DI :: l10n () -> t ( 'Common' ),
'url' => $baseUrl . '/contacts/common' ,
'sel' => $current == 'common' ? 'active' : '' ,
];
}
return $tabs ;
}
2018-02-09 04:49:49 +01:00
}