2018-06-18 23:05:44 +02:00
|
|
|
<?php
|
|
|
|
/**
|
2021-03-29 08:40:20 +02:00
|
|
|
* @copyright Copyright (C) 2010-2021, the Friendica project
|
2020-02-09 16:18:46 +01:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
2020-02-09 16:18:46 +01:00
|
|
|
|
2018-06-18 23:05:44 +02:00
|
|
|
namespace Friendica\Module;
|
|
|
|
|
|
|
|
use Friendica\BaseModule;
|
2018-10-29 22:20:46 +01:00
|
|
|
use Friendica\Core\Logger;
|
2018-06-18 23:05:44 +02:00
|
|
|
use Friendica\Core\System;
|
2018-07-20 14:19:26 +02:00
|
|
|
use Friendica\Database\DBA;
|
2018-06-19 16:15:28 +02:00
|
|
|
use Friendica\Model\Contact;
|
2018-06-20 19:24:02 +02:00
|
|
|
use Friendica\Model\OpenWebAuthToken;
|
2018-06-20 18:38:23 +02:00
|
|
|
use Friendica\Util\HTTPSignature;
|
2018-11-08 14:45:46 +01:00
|
|
|
use Friendica\Util\Strings;
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
/**
|
2020-01-19 07:05:23 +01:00
|
|
|
* OpenWebAuth verifier and token generator
|
2018-07-20 04:15:21 +02:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* See https://macgirvin.com/wiki/mike/OpenWebAuth/Home
|
|
|
|
* Requests to this endpoint should be signed using HTTP Signatures
|
|
|
|
* using the 'Authorization: Signature' authentication method
|
|
|
|
* If the signature verifies a token is returned.
|
|
|
|
*
|
|
|
|
* This token may be exchanged for an authenticated cookie.
|
2018-07-20 04:15:21 +02:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/Zotlabs/Module/Owa.php
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
|
|
|
class Owa extends BaseModule
|
|
|
|
{
|
2019-11-05 22:48:54 +01:00
|
|
|
public static function init(array $parameters = [])
|
2018-06-18 23:05:44 +02:00
|
|
|
{
|
|
|
|
|
|
|
|
$ret = [ 'success' => false ];
|
|
|
|
|
|
|
|
foreach (['REDIRECT_REMOTE_USER', 'HTTP_AUTHORIZATION'] as $head) {
|
|
|
|
if (array_key_exists($head, $_SERVER) && substr(trim($_SERVER[$head]), 0, 9) === 'Signature') {
|
|
|
|
if ($head !== 'HTTP_AUTHORIZATION') {
|
|
|
|
$_SERVER['HTTP_AUTHORIZATION'] = $_SERVER[$head];
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-06-20 18:38:23 +02:00
|
|
|
$sigblock = HTTPSignature::parseSigheader($_SERVER[$head]);
|
2018-06-18 23:05:44 +02:00
|
|
|
if ($sigblock) {
|
|
|
|
$keyId = $sigblock['keyId'];
|
|
|
|
|
|
|
|
if ($keyId) {
|
|
|
|
// Try to find the public contact entry of the handle.
|
2018-06-19 16:15:28 +02:00
|
|
|
$handle = str_replace('acct:', '', $keyId);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2018-06-19 16:15:28 +02:00
|
|
|
$cid = Contact::getIdForURL($handle);
|
|
|
|
$fields = ['id', 'url', 'addr', 'pubkey'];
|
|
|
|
$condition = ['id' => $cid];
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2018-07-20 14:19:26 +02:00
|
|
|
$contact = DBA::selectFirst('contact', $fields, $condition);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2018-07-21 14:46:04 +02:00
|
|
|
if (DBA::isResult($contact)) {
|
2018-06-18 23:05:44 +02:00
|
|
|
// Try to verify the signed header with the public key of the contact record
|
|
|
|
// we have found.
|
2018-09-30 09:21:57 +02:00
|
|
|
$verified = HTTPSignature::verifyMagic($contact['pubkey']);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
if ($verified && $verified['header_signed'] && $verified['header_valid']) {
|
2020-06-29 22:22:00 +02:00
|
|
|
Logger::debug('OWA header', ['addr' => $contact['addr'], 'data' => $verified]);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
$ret['success'] = true;
|
2018-11-08 14:45:46 +01:00
|
|
|
$token = Strings::getRandomHex(32);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
// Store the generated token in the databe.
|
2018-06-20 19:24:02 +02:00
|
|
|
OpenWebAuthToken::create('owt', 0, $token, $contact['addr']);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
$result = '';
|
|
|
|
|
|
|
|
// Encrypt the token with the public contacts publik key.
|
|
|
|
// Only the specific public contact will be able to encrypt it.
|
|
|
|
// At a later time, we will compare weather the token we're getting
|
|
|
|
// is really the same token we have stored in the database.
|
|
|
|
openssl_public_encrypt($token, $result, $contact['pubkey']);
|
2018-11-08 16:37:08 +01:00
|
|
|
$ret['encrypted_token'] = Strings::base64UrlEncode($result);
|
2018-06-18 23:05:44 +02:00
|
|
|
} else {
|
2020-06-29 22:22:00 +02:00
|
|
|
Logger::info('OWA fail', ['id' => $contact['id'], 'addr' => $contact['addr'], 'url' => $contact['url']]);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
} else {
|
2020-06-29 22:22:00 +02:00
|
|
|
Logger::info('Contact not found', ['handle' => $handle]);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-01-08 12:17:05 +01:00
|
|
|
System::jsonExit($ret, 'application/x-zot+json');
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
}
|