Merge branch 'testing' of git@gitorious.org:statusnet/mainline into 0.9.x

This commit is contained in:
Brion Vibber
2010-03-24 13:57:20 -07:00
10 changed files with 241 additions and 67 deletions

View File

@@ -92,7 +92,7 @@ class UsersalmonAction extends SalmonAction
throw new ClientException("Not to anyone in reply to anything!");
}
$existing = Notice::staticGet('uri', $this->act->object->id);
$existing = Notice::staticGet('uri', $this->act->objects[0]->id);
if (!empty($existing)) {
common_log(LOG_ERR, "Not saving notice '{$existing->uri}'; already exists.");
@@ -143,7 +143,7 @@ class UsersalmonAction extends SalmonAction
function handleFavorite()
{
$notice = $this->getNotice($this->act->object);
$notice = $this->getNotice($this->act->objects[0]);
$profile = $this->ensureProfile()->localProfile();
$old = Fave::pkeyGet(array('user_id' => $profile->id,
@@ -164,7 +164,7 @@ class UsersalmonAction extends SalmonAction
*/
function handleUnfavorite()
{
$notice = $this->getNotice($this->act->object);
$notice = $this->getNotice($this->act->objects[0]);
$profile = $this->ensureProfile()->localProfile();
$fave = Fave::pkeyGet(array('user_id' => $profile->id,

View File

@@ -27,6 +27,8 @@
* @link http://status.net/
*/
require_once 'Crypt/RSA.php';
class Magicsig extends Memcached_DataObject
{
@@ -50,7 +52,15 @@ class Magicsig extends Memcached_DataObject
{
$obj = parent::staticGet(__CLASS__, $k, $v);
if (!empty($obj)) {
return Magicsig::fromString($obj->keypair);
$obj = Magicsig::fromString($obj->keypair);
// Double check keys: Crypt_RSA did not
// consistently generate good keypairs.
// We've also moved to 1024 bit keys.
if (strlen($obj->publicKey->modulus->toBits()) != 1024) {
$obj->delete();
return false;
}
}
return $obj;
@@ -100,16 +110,16 @@ class Magicsig extends Memcached_DataObject
public function generate($user_id)
{
$rsa = new SafeCrypt_RSA();
$rsa = new Crypt_RSA();
$keypair = $rsa->createKey();
$rsa->loadKey($keypair['privatekey']);
$this->privateKey = new SafeCrypt_RSA();
$this->privateKey = new Crypt_RSA();
$this->privateKey->loadKey($keypair['privatekey']);
$this->publicKey = new SafeCrypt_RSA();
$this->publicKey = new Crypt_RSA();
$this->publicKey->loadKey($keypair['publickey']);
$this->user_id = $user_id;
@@ -161,7 +171,7 @@ class Magicsig extends Memcached_DataObject
{
common_log(LOG_DEBUG, "Adding ".$type." key: (".$mod .', '. $exp .")");
$rsa = new SafeCrypt_RSA();
$rsa = new Crypt_RSA();
$rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1;
$rsa->setHash('sha256');
$rsa->modulus = new Math_BigInteger(base64_url_decode($mod), 256);

View File

@@ -67,7 +67,7 @@
* @author Jim Wigginton <terrafrost@php.net>
* @copyright MMVI Jim Wigginton
* @license http://www.gnu.org/licenses/lgpl.txt
* @version $Id: BigInteger.php,v 1.31 2010/03/01 17:28:19 terrafrost Exp $
* @version $Id: BigInteger.php,v 1.33 2010/03/22 22:32:03 terrafrost Exp $
* @link http://pear.php.net/package/Math_BigInteger
*/
@@ -294,7 +294,7 @@ class Math_BigInteger {
$this->value = array();
}
if ($x === 0) {
if (empty($x)) {
return;
}
@@ -718,7 +718,7 @@ class Math_BigInteger {
*
* Will be called, automatically, when serialize() is called on a Math_BigInteger object.
*
* @see __wakeup
* @see __wakeup()
* @access public
*/
function __sleep()
@@ -740,7 +740,7 @@ class Math_BigInteger {
*
* Will be called, automatically, when unserialize() is called on a Math_BigInteger object.
*
* @see __sleep
* @see __sleep()
* @access public
*/
function __wakeup()

View File

@@ -59,12 +59,21 @@ class MagicEnvelope
}
if ($xrd->links) {
if ($link = Discovery::getService($xrd->links, Magicsig::PUBLICKEYREL)) {
list($type, $keypair) = explode(',', $link['href']);
if (empty($keypair)) {
$keypair = false;
$parts = explode(',', $link['href']);
if (count($parts) == 2) {
$keypair = $parts[1];
} else {
// Backwards compatibility check for separator bug in 0.9.0
list($type, $keypair) = explode(';', $link['href']);
$parts = explode(';', $link['href']);
if (count($parts) == 2) {
$keypair = $parts[1];
}
}
if ($keypair) {
return $keypair;
}
return $keypair;
}
}
throw new Exception('Unable to locate signer public key');

View File

@@ -1,18 +0,0 @@
<?php
require_once 'Crypt/RSA.php';
/**
* Crypt_RSA stores a Math_BigInteger with value 0, which triggers a bug
* in Math_BigInteger's wakeup function which spews notices to log or output.
* This wrapper replaces it with a version that survives serialization.
*/
class SafeCrypt_RSA extends Crypt_RSA
{
function __construct()
{
parent::__construct();
$this->zero = new SafeMath_BigInteger();
}
}

View File

@@ -1,20 +0,0 @@
<?php
require_once 'Math/BigInteger.php';
/**
* Crypt_RSA stores a Math_BigInteger with value 0, which triggers a bug
* in Math_BigInteger's wakeup function which spews notices to log or output.
* This wrapper replaces it with a version that survives serialization.
*/
class SafeMath_BigInteger extends Math_BigInteger
{
function __wakeup()
{
if ($this->hex == '') {
$this->hex = '0';
}
parent::__wakeup();
}
}

View File

@@ -75,11 +75,16 @@ class OStatusTester extends TestBase
{
$this->setup();
$this->testLocalPost();
$this->testMentionUrl();
$this->testSubscribe();
$this->testUnsubscribe();
$methods = get_class_methods($this);
foreach ($methods as $method) {
if (strtolower(substr($method, 0, 4)) == 'test') {
print "\n";
print "== $method ==\n";
call_user_func(array($this, $method));
}
}
print "\n";
$this->log("DONE!");
}
@@ -126,6 +131,26 @@ class OStatusTester extends TestBase
$this->assertTrue($this->pub->hasSubscriber($this->sub->getProfileUri()));
}
function testPush()
{
$this->assertTrue($this->sub->hasSubscription($this->pub->getProfileUri()));
$this->assertTrue($this->pub->hasSubscriber($this->sub->getProfileUri()));
$name = $this->sub->username;
$post = $this->pub->post("Regular post, which $name should get via PuSH");
$this->sub->assertReceived($post);
}
function testMentionSubscribee()
{
$this->assertTrue($this->sub->hasSubscription($this->pub->getProfileUri()));
$this->assertFalse($this->pub->hasSubscription($this->sub->getProfileUri()));
$name = $this->pub->username;
$post = $this->sub->post("Just a quick note back to my remote subscribee @$name");
$this->pub->assertReceived($post);
}
function testUnsubscribe()
{
$this->assertTrue($this->sub->hasSubscription($this->pub->getProfileUri()));
@@ -350,6 +375,7 @@ class SNTestClient extends TestBase
$this->assertEqual($this->fullname, $data['name']);
$this->assertEqual($this->homepage, $data['url']);
$this->assertEqual($this->bio, $data['description']);
$this->log(" looks good!");
}
/**
@@ -386,11 +412,11 @@ class SNTestClient extends TestBase
}
$tries--;
if ($tries) {
$this->log("Didn't see it yet, waiting $timeout seconds");
$this->log(" didn't see it yet, waiting $timeout seconds");
sleep($timeout);
}
}
throw new Exception("Message $notice_uri not received by $this->username");
throw new Exception(" message $notice_uri not received by $this->username");
}
/**
@@ -420,10 +446,9 @@ class SNTestClient extends TestBase
}
foreach ($entries as $entry) {
if ($entry->id == $notice_uri) {
$this->log("found it $notice_uri");
$this->log(" found it $notice_uri");
return true;
}
//$this->log("nope... " . $entry->id);
}
return false;
}
@@ -493,15 +518,15 @@ class SNTestClient extends TestBase
foreach ($follows as $follow) {
$target = $follow->getAttributeNS($ns_rdf, 'resource');
if ($target == ($subscribed . '#acct')) {
$this->log("Confirmed $subscriber subscribed to $subscribed");
$this->log(" confirmed $subscriber subscribed to $subscribed");
return true;
}
}
$this->log("We found $subscriber but they don't follow $subscribed");
$this->log(" we found $subscriber but they don't follow $subscribed");
return false;
}
}
$this->log("Can't find $subscriber in {$this->username}'s social graph.");
$this->log(" can't find $subscriber in {$this->username}'s social graph.");
return false;
}