2010-01-08 11:33:17 +09:00
|
|
|
<?php
|
|
|
|
/*
|
|
|
|
* StatusNet - the distributed open-source microblogging tool
|
|
|
|
* Copyright (C) 2008, 2009, StatusNet, Inc.
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!defined('STATUSNET') && !defined('LACONICA')) { exit(1); }
|
|
|
|
|
|
|
|
require_once INSTALLDIR . '/lib/oauthstore.php';
|
|
|
|
|
|
|
|
class ApiStatusNetOAuthDataStore extends StatusNetOAuthDataStore
|
|
|
|
{
|
|
|
|
function lookup_consumer($consumer_key)
|
|
|
|
{
|
|
|
|
$con = Consumer::staticGet('consumer_key', $consumer_key);
|
|
|
|
|
|
|
|
if (!$con) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return new OAuthConsumer($con->consumer_key,
|
|
|
|
$con->consumer_secret);
|
|
|
|
}
|
|
|
|
|
2010-01-13 20:31:15 +09:00
|
|
|
function getAppByRequestToken($token_key)
|
|
|
|
{
|
|
|
|
// Look up the full req tokenx
|
|
|
|
$req_token = $this->lookup_token(null,
|
|
|
|
'request',
|
|
|
|
$token_key);
|
|
|
|
|
|
|
|
if (empty($req_token)) {
|
|
|
|
common_debug("couldn't get request token from oauth datastore");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look up the full Token
|
|
|
|
$token = new Token();
|
|
|
|
$token->tok = $req_token->key;
|
|
|
|
$result = $token->find(true);
|
|
|
|
|
|
|
|
if (empty($result)) {
|
|
|
|
common_debug('Couldn\'t find req token in the token table.');
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look up the app
|
|
|
|
|
|
|
|
$app = new Oauth_application();
|
|
|
|
$app->consumer_key = $token->consumer_key;
|
|
|
|
$result = $app->find(true);
|
|
|
|
|
|
|
|
if (!empty($result)) {
|
|
|
|
return $app;
|
|
|
|
} else {
|
|
|
|
common_debug("Couldn't find the app!");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-01-08 11:33:17 +09:00
|
|
|
function new_access_token($token, $consumer)
|
|
|
|
{
|
|
|
|
common_debug('new_access_token("'.$token->key.'","'.$consumer->key.'")', __FILE__);
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
$rt = new Token();
|
2010-01-08 11:33:17 +09:00
|
|
|
$rt->consumer_key = $consumer->key;
|
|
|
|
$rt->tok = $token->key;
|
|
|
|
$rt->type = 0; // request
|
2010-01-11 18:11:50 +09:00
|
|
|
|
|
|
|
$app = Oauth_application::getByConsumerKey($consumer->key);
|
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
if (empty($app)) {
|
|
|
|
common_debug("empty app!");
|
|
|
|
}
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
if ($rt->find(true) && $rt->state == 1) { // authorized
|
2010-01-08 11:33:17 +09:00
|
|
|
common_debug('request token found.', __FILE__);
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
// find the associated user of the app
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
$appUser = new Oauth_application_user();
|
|
|
|
$appUser->application_id = $app->id;
|
|
|
|
$appUser->token = $rt->tok;
|
|
|
|
$result = $appUser->find(true);
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
if (!empty($result)) {
|
|
|
|
common_debug("Oath app user found.");
|
|
|
|
} else {
|
2010-01-13 20:31:15 +09:00
|
|
|
common_debug("Oauth app user not found. app id $app->id token $rt->tok");
|
2010-01-13 14:06:35 +09:00
|
|
|
return null;
|
|
|
|
}
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
// go ahead and make the access token
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
$at = new Token();
|
2010-01-08 11:33:17 +09:00
|
|
|
$at->consumer_key = $consumer->key;
|
|
|
|
$at->tok = common_good_rand(16);
|
|
|
|
$at->secret = common_good_rand(16);
|
|
|
|
$at->type = 1; // access
|
|
|
|
$at->created = DB_DataObject_Cast::dateTime();
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
if (!$at->insert()) {
|
2010-01-08 11:33:17 +09:00
|
|
|
$e = $at->_lastError;
|
|
|
|
common_debug('access token "'.$at->tok.'" not inserted: "'.$e->message.'"', __FILE__);
|
|
|
|
return null;
|
|
|
|
} else {
|
|
|
|
common_debug('access token "'.$at->tok.'" inserted', __FILE__);
|
|
|
|
// burn the old one
|
|
|
|
$orig_rt = clone($rt);
|
|
|
|
$rt->state = 2; // used
|
|
|
|
if (!$rt->update($orig_rt)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
common_debug('request token "'.$rt->tok.'" updated', __FILE__);
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
// update the token from req to access for the user
|
|
|
|
|
|
|
|
$orig = clone($appUser);
|
|
|
|
$appUser->token = $at->tok;
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
// It's at this point that we change the access type
|
|
|
|
// to whatever the application's access is. Request
|
|
|
|
// tokens should always have an access type of 0, and
|
|
|
|
// therefore be unuseable for making requests for
|
|
|
|
// protected resources.
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
$appUser->access_type = $app->access_type;
|
|
|
|
|
|
|
|
$result = $appUser->update($orig);
|
|
|
|
|
|
|
|
if (empty($result)) {
|
|
|
|
common_debug('couldn\'t update OAuth app user.');
|
|
|
|
return null;
|
|
|
|
}
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-13 14:06:35 +09:00
|
|
|
// Okay, good
|
|
|
|
return new OAuthToken($at->tok, $at->secret);
|
|
|
|
}
|
2010-01-11 18:11:50 +09:00
|
|
|
|
2010-01-08 11:33:17 +09:00
|
|
|
} else {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-02-02 16:35:54 +09:00
|
|
|
/**
|
|
|
|
* Revoke specified access token
|
|
|
|
*
|
|
|
|
* Revokes the token specified by $token_key.
|
|
|
|
* Throws exceptions in case of error.
|
|
|
|
*
|
|
|
|
* @param string $token_key the token to be revoked
|
|
|
|
* @param int $type type of token (0 = req, 1 = access)
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function revoke_token($token_key, $type = 0) {
|
|
|
|
$rt = new Token();
|
|
|
|
$rt->tok = $token_key;
|
|
|
|
$rt->type = $type;
|
|
|
|
$rt->state = 0;
|
|
|
|
if (!$rt->find(true)) {
|
2010-09-13 07:57:35 +09:00
|
|
|
// TRANS: Exception thrown when an attempt is made to revoke an unknown token.
|
2010-09-15 05:30:55 +09:00
|
|
|
throw new Exception(_('Tried to revoke unknown token.'));
|
2010-02-02 16:35:54 +09:00
|
|
|
}
|
|
|
|
if (!$rt->delete()) {
|
2010-09-13 07:57:35 +09:00
|
|
|
// TRANS: Exception thrown when an attempt is made to remove a revoked token.
|
2010-09-15 05:30:55 +09:00
|
|
|
throw new Exception(_('Failed to delete revoked token.'));
|
2010-02-02 16:35:54 +09:00
|
|
|
}
|
|
|
|
}
|
2010-01-08 11:33:17 +09:00
|
|
|
}
|