/**
  * Get honest-to-goodness user data.
  */
 private function fetchData()
 {
     try {
         // TODO: it'd be better using $this->realRequest->getContentType(), but not set before hand. Temporary hack.
         $postBody = $this->realRequest->getPostBody();
         $url = $this->realRequest->getUrl();
         $msgParams = array();
         if (ShindigOAuthUtil::isFormEncoded($this->realRequest->getHeader("Content-Type")) && strlen($postBody) > 0) {
             $entries = explode('&', $postBody);
             foreach ($entries as $entry) {
                 $parts = explode('=', $entry);
                 if (count($parts) == 2) {
                     $msgParams[ShindigOAuthUtil::urldecode_rfc3986($parts[0])] = ShindigOAuthUtil::urldecode_rfc3986($parts[1]);
                 }
             }
         }
         $method = $this->realRequest->getMethod();
         $msgParams[self::$XOAUTH_APP_URL] = $this->authToken->getAppUrl();
         // Build and sign the message.
         $oauthRequest = $this->newRequestMessageMethod($method, $url, $msgParams);
         $oauthParams = $this->filterOAuthParams($oauthRequest);
         $newHeaders = array();
         switch ($method) {
             case 'POST':
                 if (empty($postBody) || count($postBody) == 0) {
                     $postBody = ShindigOAuthUtil::getPostBodyString($oauthParams);
                 } else {
                     $postBody = $postBody . "&" . ShindigOAuthUtil::getPostBodyString($oauthParams);
                 }
                 // To avoid 417 Response from server, adding empty "Expect" header
                 $newHeaders['Expect'] = '';
                 break;
             case 'GET':
                 $url = ShindigOAuthUtil::addParameters($url, $oauthParams);
                 break;
         }
         // To choose HTTP method client requested, we don't use $this->createRemoteContentRequest() here.
         $rcr = new RemoteContentRequest($url);
         $rcr->createRemoteContentRequest($method, $url, $newHeaders, null, $this->realRequest->getOptions());
         $rcr->setPostBody($postBody);
         $remoteFetcherClass = Config::get('remote_content_fetcher');
         $fetcher = new $remoteFetcherClass();
         $content = $fetcher->fetchRequest($rcr);
         $statusCode = $content->getHttpCode();
         //TODO is there a better way to detect an SP error? For example: http://wiki.oauth.net/ProblemReporting
         if ($statusCode == 401) {
             $tokenKey = $this->buildTokenKey();
             $this->tokenStore->removeTokenAndSecret($tokenKey);
         } else {
             if ($statusCode >= 400 && $statusCode < 500) {
                 $message = $this->parseAuthHeader(null, $content);
                 if ($message->get_parameter(ShindigOAuth::$OAUTH_PROBLEM) != null) {
                     throw new ShindigOAuthProtocolException($message);
                 }
             }
         }
         // Track metadata on the response
         $this->addResponseMetadata($content);
         return $content;
     } catch (Exception $e) {
         throw new GadgetException("INTERNAL SERVER ERROR: " . $e);
     }
 }
 /**
  * Sets the headers and post body for the request if they are specified
  *
  * @param RemoteContentRequest $request
  */
 private function setHeaders(RemoteContentRequest $request)
 {
     if ($request->hasHeaders()) {
         $headers = explode("\n", $request->getHeaders());
         $outHeaders = array();
         foreach ($headers as $header) {
             if (strpos($header, ':')) {
                 $key = trim(substr($header, 0, strpos($header, ':')));
                 $key = str_replace(' ', '-', ucwords(str_replace('-', ' ', $key)));
                 $val = trim(substr($header, strpos($header, ':') + 1));
                 if (!in_array($key, $this->disallowedHeaders)) {
                     $outHeaders[] = "{$key}: {$val}";
                 }
             }
         }
         $outHeaders[] = "User-Agent: " . BasicRemoteContentFetcher::USER_AGENT;
         curl_setopt($request->handle, CURLOPT_HTTPHEADER, $outHeaders);
     }
     $method = $request->getMethod();
     if ($request->isPost()) {
         curl_setopt($request->handle, CURLOPT_POST, 1);
         curl_setopt($request->handle, CURLOPT_POSTFIELDS, $request->getPostBody());
     } else {
         if ($method == 'DELETE' || $method == 'HEAD' || $method == 'PUT') {
             curl_setopt($request->handle, CURLOPT_CUSTOMREQUEST, $method);
             if ($method == "PUT") {
                 curl_setopt($request->handle, CURLOPT_POSTFIELDS, $request->getPostBody());
             }
         }
     }
 }
 /**
  * Appends data from <Preload> elements to make them available to
  * gadgets.io.
  *
  * @param gadget
  */
 private function appendPreloads(Gadget $gadget, GadgetContext $context)
 {
     $resp = array();
     $gadgetSigner = Config::get('security_token_signer');
     $gadgetSigner = new $gadgetSigner();
     $token = '';
     try {
         $token = $context->extractAndValidateToken($gadgetSigner);
     } catch (Exception $e) {
         $token = '';
         // no token given, safe to ignore
     }
     $unsignedRequests = $unsignedContexts = array();
     $signedRequests = array();
     foreach ($gadget->getPreloads() as $preload) {
         try {
             if (($preload->getAuth() == Auth::$NONE || $token != null) && (count($preload->getViews()) == 0 || in_array($context->getView(), $preload->getViews()))) {
                 $request = new RemoteContentRequest($preload->getHref());
                 $request->createRemoteContentRequestWithUri($preload->getHref());
                 $request->getOptions()->ownerSigned = $preload->isSignOwner();
                 $request->getOptions()->viewerSigned = $preload->isSignViewer();
                 switch (strtoupper(trim($preload->getAuth()))) {
                     case "NONE":
                         //						Unify all unsigned requests to one single multi request
                         $unsignedRequests[] = $request;
                         $unsignedContexts[] = $context;
                         break;
                     case "SIGNED":
                         //						Unify all signed requests to one single multi request
                         $signingFetcherFactory = new SigningFetcherFactory(Config::get("private_key_file"));
                         $fetcher = $signingFetcherFactory->getSigningFetcher(new BasicRemoteContentFetcher(), $token);
                         $req = $fetcher->signRequest($preload->getHref(), $request->getMethod());
                         $req->setNotSignedUri($preload->getHref());
                         $signedRequests[] = $req;
                         break;
                     default:
                         @ob_end_clean();
                         header("HTTP/1.0 500 Internal Server Error", true);
                         echo "<html><body><h1>" . "500 - Internal Server Error" . "</h1></body></html>";
                         die;
                 }
             }
         } catch (Exception $e) {
             throw new Exception($e);
         }
     }
     if (count($unsignedRequests)) {
         try {
             $brc = new BasicRemoteContent();
             $responses = $brc->multiFetch($unsignedRequests, $unsignedContexts);
             foreach ($responses as $response) {
                 $resp[$response->getUrl()] = array('body' => $response->getResponseContent(), 'rc' => $response->getHttpCode());
             }
         } catch (Exception $e) {
             throw new Exception($e);
         }
     }
     if (count($signedRequests)) {
         try {
             $fetcher = $signingFetcherFactory->getSigningFetcher(new BasicRemoteContentFetcher(), $token);
             $responses = $fetcher->multiFetchRequest($signedRequests);
             foreach ($responses as $response) {
                 $resp[$response->getNotSignedUrl()] = array('body' => $response->getResponseContent(), 'rc' => $response->getHttpCode());
             }
         } catch (Exception $e) {
             throw new Exception($e);
         }
     }
     $resp = count($resp) ? json_encode($resp) : "{}";
     return "gadgets.io.preloaded_ = " . $resp . ";\n";
 }
예제 #4
0
 /**
  * Get honest-to-goodness user data.
  */
 private function fetchData()
 {
     try {
         $msgParams = OAuthUtil::isFormEncoded($this->realRequest->getContentType()) ? OAuthUtil::urldecodeRFC3986($this->realRequest->getPostBody()) : array();
         $method = $this->realRequest->getMethod();
         $msgParams[self::$XOAUTH_APP_URL] = $this->authToken->getAppUrl();
         // Build and sign the message.
         $oauthRequest = $this->newRequestMessageMethod($method, $this->realRequest->getUrl(), $msgParams);
         $rcr = $this->createRemoteContentRequest($this->filterOAuthParams($oauthRequest), $this->realRequest->getMethod(), $this->realRequest->getUrl(), $this->realRequest->getHeaders(), $this->realRequest->getContentType(), $this->realRequest->getPostBody(), $this->realRequest->getOptions());
         //TODO is there a better way to detect an SP error?
         $remoteFetcherClass = Shindig_Config::get('remote_content_fetcher');
         $fetcher = new $remoteFetcherClass();
         $content = $fetcher->fetchRequest($rcr);
         $statusCode = $content->getHttpCode();
         if ($statusCode >= 400 && $statusCode < 500) {
             $message = $this->parseAuthHeader(null, $content);
             if ($message->get_parameter(OAuth::$OAUTH_PROBLEM) != null) {
                 throw new OAuthProtocolException($message);
             }
         }
         // Track metadata on the response
         $this->addResponseMetadata($content);
         return $content;
     } catch (Exception $e) {
         throw new GadgetException("INTERNAL SERVER ERROR: " . $e);
     }
 }
예제 #5
0
 private function signRequest(RemoteContentRequest $request)
 {
     $url = $request->getUrl();
     $method = $request->getMethod();
     try {
         // Parse the request into parameters for OAuth signing, stripping out
         // any OAuth or OpenSocial parameters injected by the client
         $parsedUri = parse_url($url);
         $resource = $url;
         $contentType = $request->getHeader('Content-Type');
         $signBody = stripos($contentType, 'application/x-www-form-urlencoded') !== false || $contentType == null;
         $msgParams = array();
         $postParams = array();
         if ($request->getPostBody()) {
             if ($signBody) {
                 // on normal application/x-www-form-urlencoded type post's encode and parse the post vars
                 parse_str($request->getPostBody(), $postParams);
                 $postParams = $this->sanitize($postParams);
             } else {
                 // on any other content-type of post (application/{json,xml,xml+atom}) use the body signing hash
                 // see http://oauth.googlecode.com/svn/spec/ext/body_hash/1.0/drafts/4/spec.html for details
                 $msgParams['oauth_body_hash'] = base64_encode(sha1($request->getPostBody(), true));
             }
         }
         if ($signBody && isset($postParams)) {
             $msgParams = array_merge($msgParams, $postParams);
         }
         $this->addOpenSocialParams($msgParams, $request->getToken(), $request->getOptions()->ownerSigned, $request->getOptions()->viewerSigned);
         $this->addOAuthParams($msgParams, $request->getToken());
         $consumer = new OAuthConsumer(NULL, NULL, NULL);
         $signatureMethod = new ShindigRsaSha1SignatureMethod($this->privateKeyObject, null);
         $req_req = OAuthRequest::from_consumer_and_token($consumer, NULL, $method, $resource, $msgParams);
         $req_req->sign_request($signatureMethod, $consumer, NULL);
         // Rebuild the query string, including all of the parameters we added.
         // We have to be careful not to copy POST parameters into the query.
         // If post and query parameters share a name, they end up being removed
         // from the query.
         $forPost = array();
         $postData = false;
         if ($method == 'POST' && $signBody) {
             foreach ($postParams as $key => $param) {
                 $forPost[$key] = $param;
                 if ($postData === false) {
                     $postData = array();
                 }
                 $postData[] = OAuthUtil::urlencode_rfc3986($key) . "=" . OAuthUtil::urlencode_rfc3986($param);
             }
             if ($postData !== false) {
                 $postData = implode("&", $postData);
             }
         }
         $newQueryParts = array();
         foreach ($req_req->get_parameters() as $key => $param) {
             if (!isset($forPost[$key])) {
                 if (!is_array($param)) {
                     $newQueryParts[] = urlencode($key) . '=' . urlencode($param);
                 } else {
                     foreach ($param as $elem) {
                         $newQueryParts[] = urlencode($key) . '=' . urlencode($elem);
                     }
                 }
             }
             $newQuery = implode('&', $newQueryParts);
         }
         // Careful here; the OAuth form encoding scheme is slightly different than
         // the normal form encoding scheme, so we have to use the OAuth library
         // formEncode method.
         $url = $parsedUri['scheme'] . '://' . $parsedUri['host'] . (isset($parsedUri['port']) ? ':' . $parsedUri['port'] : '') . (isset($parsedUri['path']) ? $parsedUri['path'] : '') . '?' . $newQuery;
         $request->setUri($url);
         if ($signBody) {
             $request->setPostBody($postData);
         }
     } catch (Exception $e) {
         throw new GadgetException($e);
     }
 }
 private function verifySignedRequest(RemoteContentRequest $request)
 {
     $url = parse_url($request->getUrl());
     $query = array();
     parse_str($url['query'], $query);
     $post = array();
     $contentType = $request->getHeader('Content-Type');
     if (stripos($contentType, 'application/x-www-form-urlencoded') !== false || $contentType == null) {
         parse_str($request->getPostBody(), $post);
     } else {
         $this->assertEquals(base64_encode(sha1($request->getPostBody(), true)), $query['oauth_body_hash']);
     }
     $oauthRequest = OAuthRequest::from_request($request->getMethod(), $request->getUrl(), array_merge($query, $post));
     $signature_method = new MockSignatureMethod();
     $signature_valid = $signature_method->check_signature($oauthRequest, null, null, $query['oauth_signature']);
     $this->assertTrue($signature_valid);
 }