2010-02-22 23:05:32 +09:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* StatusNet - the distributed open-source microblogging tool
|
|
|
|
* Copyright (C) 2010, StatusNet, Inc.
|
|
|
|
*
|
|
|
|
* A sample module to show best practices for StatusNet plugins
|
|
|
|
*
|
|
|
|
* PHP version 5
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* @package StatusNet
|
|
|
|
* @author James Walker <james@status.net>
|
|
|
|
* @copyright 2010 StatusNet, Inc.
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
class MagicEnvelope
|
|
|
|
{
|
|
|
|
const ENCODING = 'base64url';
|
|
|
|
|
|
|
|
const NS = 'http://salmon-protocol.org/ns/magic-env';
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2015-10-04 06:25:02 +09:00
|
|
|
protected $actor = null; // Profile of user who has signed the envelope
|
|
|
|
|
2014-05-27 18:32:12 +09:00
|
|
|
protected $data = null; // When stored here it is _always_ base64url encoded
|
|
|
|
protected $data_type = null;
|
|
|
|
protected $encoding = null;
|
|
|
|
protected $alg = null;
|
|
|
|
protected $sig = null;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Extract envelope data from an XML document containing an <me:env> or <me:provenance> element.
|
|
|
|
*
|
|
|
|
* @param string XML source
|
|
|
|
* @return mixed associative array of envelope data, or false on unrecognized input
|
|
|
|
*
|
|
|
|
* @fixme will spew errors to logs or output in case of XML parse errors
|
|
|
|
* @fixme may give fatal errors if some elements are missing or invalid XML
|
|
|
|
* @fixme calling DOMDocument::loadXML statically triggers warnings in strict mode
|
|
|
|
*/
|
2015-10-04 06:25:02 +09:00
|
|
|
public function __construct($xml=null, Profile $actor=null) {
|
2014-05-27 18:32:12 +09:00
|
|
|
if (!empty($xml)) {
|
2015-07-11 06:24:50 +09:00
|
|
|
$dom = new DOMDocument();
|
|
|
|
if (!$dom->loadXML($xml)) {
|
2014-05-27 18:32:12 +09:00
|
|
|
throw new ServerException('Tried to load malformed XML as DOM');
|
|
|
|
} elseif (!$this->fromDom($dom)) {
|
|
|
|
throw new ServerException('Could not load MagicEnvelope from DOM');
|
|
|
|
}
|
2015-10-04 06:25:02 +09:00
|
|
|
} elseif ($actor instanceof Profile) {
|
|
|
|
// So far we only allow setting with _either_ $xml _or_ $actor as that's
|
|
|
|
// all our circumstances require. But it may be confusing for new developers.
|
|
|
|
// The idea is that feeding XML must be followed by interpretation and then
|
|
|
|
// running $magic_env->verify($profile), just as in SalmonAction->prepare(...)
|
|
|
|
// and supplying an $actor (which right now has to be a User) will require
|
|
|
|
// defining the $data, $data_type etc. attributes manually afterwards before
|
|
|
|
// signing the envelope..
|
|
|
|
$this->setActor($actor);
|
2014-05-27 18:32:12 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-31 19:51:51 +09:00
|
|
|
/**
|
|
|
|
* Retrieve Salmon keypair first by checking local database, but
|
|
|
|
* if it's not found, attempt discovery if it has been requested.
|
|
|
|
*
|
|
|
|
* @param Profile $profile The profile we're looking up keys for.
|
|
|
|
* @param boolean $discovery Network discovery if no local cache?
|
|
|
|
*/
|
|
|
|
public function getKeyPair(Profile $profile, $discovery=false) {
|
2015-10-05 00:26:35 +09:00
|
|
|
if (!$profile->isLocal()) common_debug('Getting magic-public-key for non-local profile id=='.$profile->getID());
|
|
|
|
$magicsig = Magicsig::getKV('user_id', $profile->getID());
|
2014-06-02 23:31:22 +09:00
|
|
|
|
2014-05-31 19:51:51 +09:00
|
|
|
if ($discovery && !$magicsig instanceof Magicsig) {
|
2015-10-05 00:26:35 +09:00
|
|
|
if (!$profile->isLocal()) common_debug('magic-public-key not found, will do discovery for profile id=='.$profile->getID());
|
2014-06-02 23:31:22 +09:00
|
|
|
// Throws exception on failure, but does not try to _load_ the keypair string.
|
|
|
|
$keypair = $this->discoverKeyPair($profile);
|
|
|
|
|
|
|
|
$magicsig = new Magicsig();
|
2015-10-05 00:26:35 +09:00
|
|
|
$magicsig->user_id = $profile->getID();
|
2014-06-02 23:31:22 +09:00
|
|
|
$magicsig->importKeys($keypair);
|
2015-01-24 21:06:09 +09:00
|
|
|
// save the public key for this profile in our database.
|
|
|
|
// TODO: If the profile generates a new key remotely, we must be able to replace
|
|
|
|
// this (of course after callback-verification).
|
|
|
|
$magicsig->insert();
|
2014-05-31 19:51:51 +09:00
|
|
|
} elseif (!$magicsig instanceof Magicsig) { // No discovery request, so we'll give up.
|
|
|
|
throw new ServerException(sprintf('No public key found for profile (id==%d)', $profile->id));
|
|
|
|
}
|
2014-06-02 23:31:22 +09:00
|
|
|
|
|
|
|
assert($magicsig->publicKey instanceof Crypt_RSA);
|
|
|
|
|
2014-05-31 19:51:51 +09:00
|
|
|
return $magicsig;
|
|
|
|
}
|
|
|
|
|
2014-05-06 18:33:06 +09:00
|
|
|
/**
|
2014-06-02 23:31:22 +09:00
|
|
|
* Get the Salmon keypair from a URI, uses XRD Discovery etc. Reasonably
|
|
|
|
* you'll only get the public key ;)
|
2014-05-06 18:33:06 +09:00
|
|
|
*
|
2014-06-02 23:31:22 +09:00
|
|
|
* The string will (hopefully) be formatted as described in Magicsig specification:
|
|
|
|
* https://salmon-protocol.googlecode.com/svn/trunk/draft-panzer-magicsig-01.html#anchor13
|
|
|
|
*
|
|
|
|
* @return string formatted as Magicsig keypair
|
2014-05-06 18:33:06 +09:00
|
|
|
*/
|
2014-06-02 23:11:46 +09:00
|
|
|
public function discoverKeyPair(Profile $profile)
|
2010-02-22 23:05:32 +09:00
|
|
|
{
|
2014-06-02 23:11:46 +09:00
|
|
|
$signer_uri = $profile->getUri();
|
|
|
|
if (empty($signer_uri)) {
|
2015-10-05 00:26:35 +09:00
|
|
|
throw new ServerException(sprintf('Profile missing URI (id==%d)', $profile->getID()));
|
2014-06-02 23:11:46 +09:00
|
|
|
}
|
|
|
|
|
2010-02-26 13:38:25 +09:00
|
|
|
$disco = new Discovery();
|
|
|
|
|
2014-05-06 18:33:06 +09:00
|
|
|
// Throws exception on lookup problems
|
2015-10-05 00:26:35 +09:00
|
|
|
try {
|
|
|
|
$xrd = $disco->lookup($signer_uri);
|
|
|
|
} catch (Exception $e) {
|
|
|
|
// Diaspora seems to require us to request the acct: uri
|
|
|
|
$xrd = $disco->lookup($profile->getAcctUri());
|
|
|
|
}
|
2014-05-06 18:33:06 +09:00
|
|
|
|
2015-10-05 00:26:35 +09:00
|
|
|
common_debug('Will try to find magic-public-key from XRD of profile id=='.$profile->getID());
|
|
|
|
$pubkey = null;
|
|
|
|
if (Event::handle('MagicsigPublicKeyFromXRD', array($xrd, &$pubkey))) {
|
|
|
|
$link = $xrd->get(Magicsig::PUBLICKEYREL);
|
|
|
|
if (is_null($link)) {
|
|
|
|
// TRANS: Exception.
|
|
|
|
throw new Exception(_m('Unable to locate signer public key.'));
|
|
|
|
}
|
|
|
|
$pubkey = $link->href;
|
|
|
|
}
|
|
|
|
if (empty($pubkey)) {
|
|
|
|
throw new ServerException('Empty Magicsig public key. A bug?');
|
2014-05-06 18:33:06 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
// We have a public key element, let's hope it has proper key data.
|
|
|
|
$keypair = false;
|
2015-10-05 00:26:35 +09:00
|
|
|
$parts = explode(',', $pubkey);
|
2014-05-06 18:33:06 +09:00
|
|
|
if (count($parts) == 2) {
|
|
|
|
$keypair = $parts[1];
|
|
|
|
} else {
|
|
|
|
// Backwards compatibility check for separator bug in 0.9.0
|
2015-10-05 00:26:35 +09:00
|
|
|
$parts = explode(';', $pubkey);
|
2013-10-01 00:13:03 +09:00
|
|
|
if (count($parts) == 2) {
|
|
|
|
$keypair = $parts[1];
|
|
|
|
}
|
2014-05-06 18:33:06 +09:00
|
|
|
}
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2014-05-06 18:33:06 +09:00
|
|
|
if ($keypair === false) {
|
|
|
|
// For debugging clarity. Keypair did not pass count()-check above.
|
|
|
|
// TRANS: Exception when public key was not properly formatted.
|
|
|
|
throw new Exception(_m('Incorrectly formatted public key element.'));
|
|
|
|
}
|
|
|
|
|
2014-06-02 23:31:22 +09:00
|
|
|
return $keypair;
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
|
2011-01-06 08:26:09 +09:00
|
|
|
/**
|
|
|
|
* The current MagicEnvelope spec as used in StatusNet 0.9.7 and later
|
|
|
|
* includes both the original data and some signing metadata fields as
|
|
|
|
* the input plaintext for the signature hash.
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
2014-05-27 18:32:12 +09:00
|
|
|
public function signingText() {
|
|
|
|
return implode('.', array($this->data, // this field is pre-base64'd
|
|
|
|
Magicsig::base64_url_encode($this->data_type),
|
|
|
|
Magicsig::base64_url_encode($this->encoding),
|
|
|
|
Magicsig::base64_url_encode($this->alg)));
|
2011-01-06 08:26:09 +09:00
|
|
|
}
|
2010-02-22 23:05:32 +09:00
|
|
|
|
2011-01-06 07:05:59 +09:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param <type> $text
|
|
|
|
* @param <type> $mimetype
|
2014-05-27 18:32:12 +09:00
|
|
|
* @param Magicsig $magicsig Magicsig with private key available.
|
2014-06-03 04:50:40 +09:00
|
|
|
*
|
2014-05-27 18:32:12 +09:00
|
|
|
* @return MagicEnvelope object with all properties set
|
2014-06-03 04:50:40 +09:00
|
|
|
*
|
|
|
|
* @throws Exception of various kinds on signing failure
|
2011-01-06 07:05:59 +09:00
|
|
|
*/
|
2015-10-04 06:25:02 +09:00
|
|
|
public function signMessage($text, $mimetype)
|
2010-02-22 23:05:32 +09:00
|
|
|
{
|
2015-10-04 06:25:02 +09:00
|
|
|
if (!$this->actor instanceof Profile) {
|
|
|
|
throw new ServerException('No profile to sign message with is set.');
|
|
|
|
} elseif (!$this->actor->isLocal()) {
|
|
|
|
throw new ServerException('Cannot sign magic envelopes with remote users since we have no private key.');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find already stored key
|
|
|
|
$magicsig = Magicsig::getKV('user_id', $this->actor->getID());
|
|
|
|
if (!$magicsig instanceof Magicsig) {
|
|
|
|
// and if it doesn't exist, it is time to create one!
|
|
|
|
$magicsig = Magicsig::generate($this->actor->getUser());
|
|
|
|
}
|
|
|
|
assert($magicsig instanceof Magicsig);
|
2014-06-03 04:50:40 +09:00
|
|
|
assert($magicsig->privateKey instanceof Crypt_RSA);
|
2014-05-27 18:32:12 +09:00
|
|
|
|
|
|
|
// Prepare text and metadata for signing
|
2014-06-03 04:50:40 +09:00
|
|
|
$this->data = Magicsig::base64_url_encode($text);
|
|
|
|
$this->data_type = $mimetype;
|
|
|
|
$this->encoding = self::ENCODING;
|
|
|
|
$this->alg = $magicsig->getName();
|
2014-05-27 18:32:12 +09:00
|
|
|
|
2014-06-03 04:50:40 +09:00
|
|
|
// Get the actual signature
|
|
|
|
$this->sig = $magicsig->sign($this->signingText());
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
|
2011-01-06 07:05:59 +09:00
|
|
|
/**
|
|
|
|
* Create an <me:env> XML representation of the envelope.
|
|
|
|
*
|
|
|
|
* @return string representation of XML document
|
|
|
|
*/
|
2015-10-04 19:06:48 +09:00
|
|
|
public function toXML(Profile $target=null, $flavour=null) {
|
2015-10-04 16:59:01 +09:00
|
|
|
$xs = new XMLStringer();
|
|
|
|
$xs->startXML(); // header, to point out it's not HTML or anything...
|
2015-10-04 19:06:48 +09:00
|
|
|
if (Event::handle('StartMagicEnvelopeToXML', array($this, $xs, $flavour, $target))) {
|
2015-10-04 07:17:07 +09:00
|
|
|
// fall back to our default, normal Magic Envelope XML.
|
2015-10-04 16:59:01 +09:00
|
|
|
// the $xs element _may_ have had elements added, or could get in the end event
|
2015-10-04 07:17:07 +09:00
|
|
|
$xs->elementStart('me:env', array('xmlns:me' => self::NS));
|
|
|
|
$xs->element('me:data', array('type' => $this->data_type), $this->data);
|
|
|
|
$xs->element('me:encoding', null, $this->encoding);
|
|
|
|
$xs->element('me:alg', null, $this->alg);
|
|
|
|
$xs->element('me:sig', null, $this->getSignature());
|
|
|
|
$xs->elementEnd('me:env');
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2015-10-04 19:06:48 +09:00
|
|
|
Event::handle('EndMagicEnvelopeToXML', array($this, $xs, $flavour, $target));
|
2015-10-04 07:17:07 +09:00
|
|
|
}
|
2015-10-04 16:59:01 +09:00
|
|
|
return $xs->getString();
|
2010-02-27 05:39:30 +09:00
|
|
|
}
|
|
|
|
|
2014-05-31 18:29:55 +09:00
|
|
|
/*
|
2011-01-06 07:05:59 +09:00
|
|
|
* Extract the contained XML payload, and insert a copy of the envelope
|
|
|
|
* signature data as an <me:provenance> section.
|
|
|
|
*
|
2014-05-31 18:29:55 +09:00
|
|
|
* @return DOMDocument of Atom entry
|
2011-01-06 07:05:59 +09:00
|
|
|
*
|
|
|
|
* @fixme in case of XML parsing errors, this will spew to the error log or output
|
|
|
|
*/
|
2014-05-31 18:29:55 +09:00
|
|
|
public function getPayload()
|
2010-02-22 23:05:32 +09:00
|
|
|
{
|
|
|
|
$dom = new DOMDocument();
|
2014-05-31 18:29:55 +09:00
|
|
|
if (!$dom->loadXML(Magicsig::base64_url_decode($this->data))) {
|
|
|
|
throw new ServerException('Malformed XML in Salmon payload');
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
|
2014-05-31 18:29:55 +09:00
|
|
|
switch ($this->data_type) {
|
|
|
|
case 'application/atom+xml':
|
|
|
|
if ($dom->documentElement->namespaceURI !== Activity::ATOM
|
|
|
|
|| $dom->documentElement->tagName !== 'entry') {
|
|
|
|
throw new ServerException(_m('Salmon post must be an Atom entry.'));
|
|
|
|
}
|
|
|
|
$prov = $dom->createElementNS(self::NS, 'me:provenance');
|
|
|
|
$prov->setAttribute('xmlns:me', self::NS);
|
|
|
|
$data = $dom->createElementNS(self::NS, 'me:data', $this->data);
|
|
|
|
$data->setAttribute('type', $this->data_type);
|
|
|
|
$prov->appendChild($data);
|
|
|
|
$enc = $dom->createElementNS(self::NS, 'me:encoding', $this->encoding);
|
|
|
|
$prov->appendChild($enc);
|
|
|
|
$alg = $dom->createElementNS(self::NS, 'me:alg', $this->alg);
|
|
|
|
$prov->appendChild($alg);
|
2014-06-03 04:50:40 +09:00
|
|
|
$sig = $dom->createElementNS(self::NS, 'me:sig', $this->getSignature());
|
2014-05-31 18:29:55 +09:00
|
|
|
$prov->appendChild($sig);
|
|
|
|
|
|
|
|
$dom->documentElement->appendChild($prov);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw new ServerException('Unknown Salmon payload data type');
|
|
|
|
}
|
|
|
|
return $dom;
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2014-06-03 04:50:40 +09:00
|
|
|
public function getSignature()
|
|
|
|
{
|
2015-10-04 19:06:48 +09:00
|
|
|
if (empty($this->sig)) {
|
|
|
|
throw new ServerException('You must first call signMessage before getSignature');
|
|
|
|
}
|
2014-06-03 04:50:40 +09:00
|
|
|
return $this->sig;
|
|
|
|
}
|
|
|
|
|
2015-10-04 07:17:07 +09:00
|
|
|
public function getSignatureAlgorithm()
|
|
|
|
{
|
|
|
|
return $this->alg;
|
|
|
|
}
|
|
|
|
|
2015-10-04 19:06:48 +09:00
|
|
|
public function getData()
|
|
|
|
{
|
|
|
|
return $this->data;
|
|
|
|
}
|
|
|
|
|
2015-10-04 07:17:07 +09:00
|
|
|
public function getDataType()
|
|
|
|
{
|
|
|
|
return $this->data_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getEncoding()
|
|
|
|
{
|
|
|
|
return $this->encoding;
|
|
|
|
}
|
|
|
|
|
2011-01-06 07:05:59 +09:00
|
|
|
/**
|
2014-05-31 18:29:55 +09:00
|
|
|
* Find the author URI referenced in the payload Atom entry.
|
2011-01-06 07:05:59 +09:00
|
|
|
*
|
2014-05-31 18:29:55 +09:00
|
|
|
* @return string URI for author
|
|
|
|
* @throws ServerException on failure
|
2011-01-06 07:05:59 +09:00
|
|
|
*/
|
2014-05-31 18:29:55 +09:00
|
|
|
public function getAuthorUri() {
|
|
|
|
$doc = $this->getPayload();
|
|
|
|
|
|
|
|
$authors = $doc->documentElement->getElementsByTagName('author');
|
|
|
|
foreach ($authors as $author) {
|
|
|
|
$uris = $author->getElementsByTagName('uri');
|
|
|
|
foreach ($uris as $uri) {
|
|
|
|
return $uri->nodeValue;
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
}
|
2014-05-31 18:29:55 +09:00
|
|
|
throw new ServerException('No author URI found in Salmon payload data');
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2011-01-06 07:05:59 +09:00
|
|
|
/**
|
|
|
|
* Attempt to verify cryptographic signing for parsed envelope data.
|
|
|
|
* Requires network access to retrieve public key referenced by the envelope signer.
|
|
|
|
*
|
|
|
|
* Details of failure conditions are dumped to output log and not exposed to caller.
|
|
|
|
*
|
2014-06-02 21:20:58 +09:00
|
|
|
* @param Profile $profile profile used to get locally cached public signature key
|
|
|
|
* or if necessary perform discovery on.
|
2014-05-31 19:51:51 +09:00
|
|
|
*
|
2011-01-06 07:05:59 +09:00
|
|
|
* @return boolean
|
|
|
|
*/
|
2014-06-02 21:20:58 +09:00
|
|
|
public function verify(Profile $profile)
|
2010-02-22 23:05:32 +09:00
|
|
|
{
|
2014-05-27 18:32:12 +09:00
|
|
|
if ($this->alg != 'RSA-SHA256') {
|
2016-01-14 11:45:11 +09:00
|
|
|
common_log(LOG_DEBUG, 'Salmon error: bad algorithm: '._ve($this->alg));
|
2010-02-22 23:05:32 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-05-27 18:32:12 +09:00
|
|
|
if ($this->encoding != self::ENCODING) {
|
2016-01-14 11:45:11 +09:00
|
|
|
common_log(LOG_DEBUG, 'Salmon error: bad encoding: '._ve($this->encoding));
|
2010-02-22 23:05:32 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-03-04 15:46:34 +09:00
|
|
|
try {
|
2014-06-02 23:11:46 +09:00
|
|
|
$magicsig = $this->getKeyPair($profile, true); // Do discovery too if necessary
|
2010-03-04 15:46:34 +09:00
|
|
|
} catch (Exception $e) {
|
2016-01-14 11:45:11 +09:00
|
|
|
common_log(LOG_DEBUG, "Salmon error: getKeyPair for profile id=='.$profile->getID().': ".$e->getMessage());
|
2010-03-04 15:46:34 +09:00
|
|
|
return false;
|
|
|
|
}
|
2010-09-03 08:35:04 +09:00
|
|
|
|
2015-10-04 06:25:02 +09:00
|
|
|
if (!$magicsig->verify($this->signingText(), $this->getSignature())) {
|
2016-01-14 11:45:11 +09:00
|
|
|
common_log(LOG_INFO, 'Salmon signature verification failed for profile id=='.$profile->getID());
|
2015-10-04 06:25:02 +09:00
|
|
|
// TRANS: Client error when incoming salmon slap signature does not verify cryptographically.
|
|
|
|
throw new ClientException(_m('Salmon signature verification failed.'));
|
|
|
|
}
|
2016-01-14 11:45:11 +09:00
|
|
|
common_debug('Salmon signature verification successful for profile id=='.$profile->getID());
|
2015-10-04 06:25:02 +09:00
|
|
|
$this->setActor($profile);
|
|
|
|
return true;
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
|
2011-01-06 07:05:59 +09:00
|
|
|
/**
|
|
|
|
* Extract envelope data from an XML document containing an <me:env> or <me:provenance> element.
|
|
|
|
*
|
|
|
|
* @param DOMDocument $dom
|
|
|
|
* @return mixed associative array of envelope data, or false on unrecognized input
|
|
|
|
*
|
|
|
|
* @fixme may give fatal errors if some elements are missing
|
|
|
|
*/
|
2014-05-27 18:32:12 +09:00
|
|
|
protected function fromDom(DOMDocument $dom)
|
2010-02-22 23:05:32 +09:00
|
|
|
{
|
2014-05-27 17:16:23 +09:00
|
|
|
$env_element = $dom->getElementsByTagNameNS(self::NS, 'env')->item(0);
|
2010-03-10 08:47:20 +09:00
|
|
|
if (!$env_element) {
|
2014-05-27 17:16:23 +09:00
|
|
|
$env_element = $dom->getElementsByTagNameNS(self::NS, 'provenance')->item(0);
|
2010-03-10 08:47:20 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!$env_element) {
|
2010-02-22 23:05:32 +09:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-05-27 17:16:23 +09:00
|
|
|
$data_element = $env_element->getElementsByTagNameNS(self::NS, 'data')->item(0);
|
|
|
|
$sig_element = $env_element->getElementsByTagNameNS(self::NS, 'sig')->item(0);
|
2014-05-27 18:32:12 +09:00
|
|
|
|
|
|
|
$this->data = preg_replace('/\s/', '', $data_element->nodeValue);
|
|
|
|
$this->data_type = $data_element->getAttribute('type');
|
|
|
|
$this->encoding = $env_element->getElementsByTagNameNS(self::NS, 'encoding')->item(0)->nodeValue;
|
|
|
|
$this->alg = $env_element->getElementsByTagNameNS(self::NS, 'alg')->item(0)->nodeValue;
|
|
|
|
$this->sig = preg_replace('/\s/', '', $sig_element->nodeValue);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-10-04 06:25:02 +09:00
|
|
|
public function setActor(Profile $actor)
|
|
|
|
{
|
|
|
|
if ($this->actor instanceof Profile) {
|
|
|
|
throw new ServerException('Cannot set a new actor profile for MagicEnvelope object.');
|
|
|
|
}
|
|
|
|
$this->actor = $actor;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getActor()
|
|
|
|
{
|
|
|
|
if (!$this->actor instanceof Profile) {
|
|
|
|
throw new ServerException('No actor set for this magic envelope.');
|
|
|
|
}
|
|
|
|
return $this->actor;
|
|
|
|
}
|
|
|
|
|
2014-05-27 18:32:12 +09:00
|
|
|
/**
|
|
|
|
* Encode the given string as a signed MagicEnvelope XML document,
|
|
|
|
* using the keypair for the given local user profile. We can of
|
|
|
|
* course not sign a remote profile's slap, since we don't have the
|
|
|
|
* private key.
|
|
|
|
*
|
|
|
|
* Side effects: will create and store a keypair on-demand if one
|
|
|
|
* hasn't already been generated for this user. This can be very slow
|
|
|
|
* on some systems.
|
|
|
|
*
|
|
|
|
* @param string $text XML fragment to sign, assumed to be Atom
|
2014-06-03 02:44:57 +09:00
|
|
|
* @param User $user User who cryptographically signs $text
|
2014-05-27 18:32:12 +09:00
|
|
|
*
|
2014-06-03 04:50:40 +09:00
|
|
|
* @return MagicEnvelope object complete with signature
|
2014-05-27 18:32:12 +09:00
|
|
|
*
|
|
|
|
* @throws Exception on bad profile input or key generation problems
|
|
|
|
*/
|
2014-06-03 02:44:57 +09:00
|
|
|
public static function signAsUser($text, User $user)
|
2014-05-27 18:32:12 +09:00
|
|
|
{
|
2015-10-04 06:25:02 +09:00
|
|
|
$magic_env = new MagicEnvelope(null, $user->getProfile());
|
|
|
|
$magic_env->signMessage($text, 'application/atom+xml');
|
2014-05-27 18:32:12 +09:00
|
|
|
|
|
|
|
return $magic_env;
|
2010-02-22 23:05:32 +09:00
|
|
|
}
|
|
|
|
}
|