Ejemplo n.º 1
0
 /**
  * Fetches the gadget xml for the requested URL using the http fetcher
  *
  * @param unknown_type $gadgetUrl
  * @return string gadget's xml content
  */
 protected function fetchGadget($gadgetUrl)
 {
     $request = new RemoteContentRequest($gadgetUrl);
     $request->setToken($this->token);
     $request->getOptions()->ignoreCache = $this->context->getIgnoreCache();
     $xml = $this->context->getHttpFetcher()->fetch($request);
     if ($xml->getHttpCode() != '200') {
         throw new GadgetException("Failed to retrieve gadget content (recieved http code " . $xml->getHttpCode() . ")");
     }
     return $xml->getResponseContent();
 }
 /**
  * Builds a request to retrieve the actual content.
  *
  * @param GadgetContext $context The rendering context.
  * @param MakeRequestOptions $params Options for crafting the request.
  * @param SecurityTokenDecoder $signer A signer needed for signed requests.
  * @return RemoteContentRequest An initialized request object.
  */
 public function buildRequest(GadgetContext $context, MakeRequestOptions $params, SecurityTokenDecoder $signer = null)
 {
     // Check the protocol requested - curl doesn't really support file://
     // requests but the 'error' should be handled properly
     $protocolSplit = explode('://', $params->getHref(), 2);
     if (count($protocolSplit) < 2) {
         throw new Exception("Invalid protocol specified");
     }
     $protocol = strtoupper($protocolSplit[0]);
     if ($protocol != "HTTP" && $protocol != "HTTPS") {
         throw new Exception("Invalid protocol specified in url: " . htmlentities($protocol));
     }
     $method = $params->getHttpMethod();
     if ($method == 'POST' || $method == 'PUT') {
         // even if postData is an empty string, it will still post
         // (since RemoteContentRquest checks if its false)
         // so the request to POST is still honored
         $request = new RemoteContentRequest($params->getHref(), null, $params->getRequestBody());
     } else {
         if ($method == 'DELETE' || $method == 'GET' || $method == 'HEAD') {
             $request = new RemoteContentRequest($params->getHref());
         } else {
             throw new Exception("Invalid HTTP method.");
         }
     }
     $request->setMethod($method);
     if ($signer) {
         switch ($params->getAuthz()) {
             case 'SIGNED':
                 $request->setAuthType(RemoteContentRequest::$AUTH_SIGNED);
                 break;
             case 'OAUTH':
                 $request->setAuthType(RemoteContentRequest::$AUTH_OAUTH);
                 $request->setOAuthRequestParams($params->getOAuthRequestParameters());
                 break;
         }
         $st = $params->getSecurityTokenString();
         if ($st === false) {
             throw new Exception("A security token is required for signed requests");
         }
         $token = $context->validateToken($st, $signer);
         $request->setToken($token);
     }
     // Strip invalid request headers.  This limits the utility of the
     // MakeRequest class a little bit, but ensures that none of the invalid
     // headers are present in any request going through this class.
     $headers = $params->getRequestHeadersArray();
     if ($headers !== false) {
         $headers = $this->stripInvalidArrayKeys($headers, MakeRequest::$BAD_REQUEST_HEADERS);
         $params->setRequestHeaders($headers);
     }
     // The request expects headers to be stored as a normal header text blob.
     // ex: Content-Type: application/atom+xml
     //     Accept-Language: en-us
     $formattedHeaders = $params->getFormattedRequestHeaders();
     if ($formattedHeaders !== false) {
         $request->setHeaders($formattedHeaders);
     }
     return $request;
 }
Ejemplo n.º 3
0
 public function testInvalidateUserResourcesWithEmptyAppId()
 {
     $token = BasicSecurityToken::createFromValues('owner', 'viewer', null, 'domain', 'appUrl', '1', 'default');
     $token->setAuthenticationMode(AuthenticationMode::$OAUTH_CONSUMER_REQUEST);
     $request = new RemoteContentRequest('http://url');
     $request->setToken($token);
     $request->setAuthType(RemoteContentRequest::$AUTH_SIGNED);
     $this->service->markResponse($request);
     $opensocialIds = array('owner');
     $this->service->invalidateUserResources($opensocialIds, $token);
     $this->assertFalse($this->service->isValid($request));
     $this->service->markResponse($request);
     $this->assertTrue($this->service->isValid($request));
 }
 /**
  * Tests through SigningFetcher
  */
 public function testSigningFetch()
 {
     $request1 = new RemoteContentRequest('http://test.chabotc.com/signing.html');
     $token = BasicSecurityToken::createFromValues('owner', 'viewer', 'app', 'domain', 'appUrl', '1', 'default');
     $request1->setToken($token);
     $request1->setAuthType(RemoteContentRequest::$AUTH_SIGNED);
     $request2 = new RemoteContentRequest('http://test.chabotc.com/ok.html');
     $this->basicRemoteContent->invalidate($request1);
     $this->basicRemoteContent->invalidate($request2);
     $requests = array($request1, $request2);
     $this->basicRemoteContent->multiFetch($requests);
     $content = $request1->getResponseContent();
     $this->assertEquals("OK", trim($content));
     $content = $request2->getResponseContent();
     $this->assertEquals("OK", trim($content));
 }
 /**
  * Renders a 'proxied content' view, for reference see:
  * http://opensocial-resources.googlecode.com/svn/spec/draft/OpenSocial-Data-Pipelining.xml
  *
  * @param Gadget $gadget
  * @param array $view
  */
 public function renderGadget(Shindig_Gadget $gadget, $view)
 {
     $this->setGadget($gadget);
     if (Shindig_Config::get('P3P') != '') {
         header("P3P: " . Shindig_Config::get('P3P'));
     }
     /* TODO
      * We should really re-add OAuth fetching support some day, uses these view atributes:
      * $view['oauthServiceName'], $view['oauthTokenName'], $view['oauthRequestToken'], $view['oauthRequestTokenSecret'];
      */
     $authz = $this->getAuthz($view);
     $refreshInterval = $this->getRefreshInterval($view);
     $href = $this->buildHref($view, $authz);
     if (count($view['dataPipelining'])) {
         $request = new RemoteContentRequest($href, "Content-type: application/json\n");
         $request->setMethod('POST');
         $request->getOptions()->ignoreCache = $gadget->gadgetContext->getIgnoreCache();
     } else {
         // no data-pipelining set, use GET and set cache/refresh interval options
         $request = new RemoteContentRequest($href);
         $request->setMethod('GET');
         $request->setRefreshInterval($refreshInterval);
         $request->getOptions()->ignoreCache = $gadget->gadgetContext->getIgnoreCache();
     }
     $signingFetcherFactory = $gadgetSigner = false;
     if ($authz != 'none') {
         $gadgetSigner = Shindig_Config::get('security_token_signer');
         $gadgetSigner = new $gadgetSigner();
         $token = $gadget->gadgetContext->extractAndValidateToken($gadgetSigner);
         $request->setToken($token);
         $request->setAuthType($authz);
         $request->getOptions()->ownerSigned = $this->getSignOwner($view);
         $request->getOptions()->viewerSigned = $this->getSignViewer($view);
         $signingFetcherFactory = new SigningFetcherFactory(Shindig_Config::get("private_key_file"));
     }
     $remoteFetcherClass = Shindig_Config::get('remote_content_fetcher');
     $remoteFetcher = new $remoteFetcherClass();
     $basicRemoteContent = new BasicRemoteContent($remoteFetcher, $signingFetcherFactory, $gadgetSigner);
     // Cache POST's as if they were GET's, since we don't want to re-fetch and repost the social data for each view
     $basicRemoteContent->setCachePostRequest(true);
     if (($response = $basicRemoteContent->getCachedRequest($request)) == false) {
         // Don't fetch the data-pipelining social data unless we don't have a cached version of the gadget's content
         $dataPipeliningResults = DataPipelining::fetch($view['dataPipelining'], $this->context);
         // spec stats that the proxied content data-pipelinging data is *not* available to templates (to avoid duplicate posting
         // of the data to the gadget dev's server and once to js space), so we don't assign it to the data context, and just
         // post the json encoded results to the remote url.
         $request->setPostBody(json_encode($dataPipeliningResults));
         $response = $basicRemoteContent->fetch($request);
     }
     if ($response->getHttpCode() != '200') {
         // an error occured fetching the proxied content's gadget content
         $content = '<html><body><h1>An error occured fetching the gadget content</h1><p>http error code: ' . $response->getHttpCode() . '</p><p>' . $response->getResponseContent() . '</body></html>';
     } else {
         // fetched ok, build the response document and output it
         $content = $response->getResponseContent();
         $content = $this->parseTemplates($content);
         $content = $this->rewriteContent($content);
         $content = $this->addTemplates($content);
     }
     echo $content;
 }
 /**
  * Tests SigningFetcher->fetchRequest
  */
 public function testFetchRequestWithEmptyPath()
 {
     $request = new RemoteContentRequest('http://example.org');
     $request->setAuthType(RemoteContentRequest::$AUTH_SIGNED);
     $request->setToken(BasicSecurityToken::createFromValues('owner', 'viewer', 'app', 'domain', 'appUrl', '1', 'default'));
     $request->setPostBody('key=value&anotherkey=value');
     $this->signingFetcher->fetchRequest($request);
     $this->verifySignedRequest($request);
 }