forked from GNUsocial/gnu-social
657 lines
26 KiB
PHP
657 lines
26 KiB
PHP
<?php
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
//
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
/**
|
|
* FeedSub handles low-level WebSub (PubSubHubbub/PuSH) subscriptions.
|
|
* Higher-level behavior building OStatus stuff on top is handled
|
|
* under Ostatus_profile.
|
|
*
|
|
* @package OStatusPlugin
|
|
* @author Brion Vibber <brion@status.net>
|
|
* @copyright 2009-2010 StatusNet, Inc.
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
*/
|
|
|
|
defined('GNUSOCIAL') || die();
|
|
|
|
/*
|
|
WebSub (previously PubSubHubbub/PuSH) subscription flow:
|
|
|
|
$profile->subscribe()
|
|
sends a sub request to the hub...
|
|
|
|
main/push/callback
|
|
hub sends confirmation back to us via GET
|
|
We verify the request, then echo back the challenge.
|
|
On our end, we save the time we subscribed and the lease expiration
|
|
|
|
main/push/callback
|
|
hub sends us updates via POST
|
|
*/
|
|
|
|
class FeedSub extends Managed_DataObject
|
|
{
|
|
public $__table = 'feedsub';
|
|
|
|
public $id;
|
|
public $uri; // varchar(191) not 255 because utf8mb4 takes more space
|
|
|
|
// WebSub subscription data
|
|
public $huburi;
|
|
public $secret;
|
|
public $sub_state; // subscribe, active, unsubscribe, inactive, nohub
|
|
public $sub_start;
|
|
public $sub_end;
|
|
public $last_update;
|
|
|
|
public $created;
|
|
public $modified;
|
|
|
|
public static function schemaDef()
|
|
{
|
|
return array(
|
|
'fields' => array(
|
|
'id' => array('type' => 'serial', 'not null' => true, 'description' => 'FeedSub local unique id'),
|
|
'uri' => array('type' => 'varchar', 'not null' => true, 'length' => 191, 'description' => 'FeedSub uri'),
|
|
'huburi' => array('type' => 'text', 'description' => 'FeedSub hub-uri'),
|
|
'secret' => array('type' => 'text', 'description' => 'FeedSub stored secret'),
|
|
'sub_state' => array('type' => 'enum', 'enum' => array('subscribe', 'active', 'unsubscribe', 'inactive', 'nohub'), 'not null' => true, 'description' => 'subscription state'),
|
|
'sub_start' => array('type' => 'datetime', 'description' => 'subscription start'),
|
|
'sub_end' => array('type' => 'datetime', 'description' => 'subscription end'),
|
|
'last_update' => array('type' => 'datetime', 'description' => 'when this record was last updated'),
|
|
'created' => array('type' => 'datetime', 'not null' => true, 'description' => 'date this record was created'),
|
|
'modified' => array('type' => 'timestamp', 'not null' => true, 'description' => 'date this record was modified'),
|
|
),
|
|
'primary key' => array('id'),
|
|
'unique keys' => array(
|
|
'feedsub_uri_key' => array('uri'),
|
|
),
|
|
);
|
|
}
|
|
|
|
/**
|
|
* Get the feed uri (http/https)
|
|
*/
|
|
public function getUri()
|
|
{
|
|
if (empty($this->uri)) {
|
|
throw new NoUriException($this);
|
|
}
|
|
return $this->uri;
|
|
}
|
|
|
|
public function getLeaseRemaining()
|
|
{
|
|
if (empty($this->sub_end)) {
|
|
return null;
|
|
}
|
|
return strtotime($this->sub_end) - time();
|
|
}
|
|
|
|
/**
|
|
* Do we have a hub? Then we are a WebSub feed.
|
|
* WebSub standard: https://www.w3.org/TR/websub/
|
|
* old: https://en.wikipedia.org/wiki/PubSubHubbub
|
|
*
|
|
* If huburi is empty, then doublecheck that we are not using
|
|
* a fallback hub. If there is a fallback hub, it is only if the
|
|
* sub_state is "nohub" that we assume it's not a WebSub feed.
|
|
*/
|
|
public function isWebSub()
|
|
{
|
|
if (empty($this->huburi)
|
|
&& (!common_config('feedsub', 'fallback_hub')
|
|
|| $this->sub_state === 'nohub')) {
|
|
// Here we have no huburi set. Also, either there is no
|
|
// fallback hub configured or sub_state is "nohub".
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Fetch the StatusNet-side profile for this feed
|
|
* @return Profile
|
|
*/
|
|
public function localProfile()
|
|
{
|
|
if ($this->profile_id) {
|
|
return Profile::getKV('id', $this->profile_id);
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Fetch the StatusNet-side profile for this feed
|
|
* @return Profile
|
|
*/
|
|
public function localGroup()
|
|
{
|
|
if ($this->group_id) {
|
|
return User_group::getKV('id', $this->group_id);
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* @param string $feeduri
|
|
* @return FeedSub
|
|
* @throws FeedSubException if feed is invalid or lacks WebSub setup
|
|
*/
|
|
public static function ensureFeed($feeduri)
|
|
{
|
|
$feedsub = self::getKV('uri', $feeduri);
|
|
if ($feedsub instanceof FeedSub) {
|
|
if (!empty($feedsub->huburi)) {
|
|
// If there is already a huburi we don't
|
|
// rediscover it on ensureFeed, call
|
|
// ensureHub to do that (compare ->modified
|
|
// to see if it might be time to do it).
|
|
return $feedsub;
|
|
}
|
|
if ($feedsub->sub_state !== 'inactive') {
|
|
throw new ServerException('Can only ensure WebSub hub for inactive (unsubscribed) feeds.');
|
|
}
|
|
// If huburi is empty we continue with ensureHub
|
|
} else {
|
|
// If we don't have that local feed URI
|
|
// stored then we create a new DB object.
|
|
$feedsub = new FeedSub();
|
|
$feedsub->uri = $feeduri;
|
|
$feedsub->sub_state = 'inactive';
|
|
}
|
|
|
|
try {
|
|
// discover the hub uri
|
|
$feedsub->ensureHub();
|
|
} catch (FeedSubNoHubException $e) {
|
|
// Only throw this exception if we can't handle huburi-less feeds
|
|
// (i.e. we have a fallback hub or we can do feed polling (nohub)
|
|
if (!common_config('feedsub', 'fallback_hub') && !common_config('feedsub', 'nohub')) {
|
|
throw $e;
|
|
}
|
|
}
|
|
|
|
if (empty($feedsub->id)) {
|
|
// if $feedsub doesn't have an id we'll insert it into the db here
|
|
$feedsub->created = common_sql_now();
|
|
$feedsub->modified = common_sql_now();
|
|
$result = $feedsub->insert();
|
|
if ($result === false) {
|
|
throw new FeedDBException($feedsub);
|
|
}
|
|
}
|
|
|
|
return $feedsub;
|
|
}
|
|
|
|
/**
|
|
* ensureHub will only do $this->update if !empty($this->id)
|
|
* because otherwise the object has not been created yet.
|
|
*
|
|
* @param bool $rediscovered Whether the hub info is rediscovered (to avoid endless loop nesting)
|
|
*
|
|
* @return null if actively avoiding the database
|
|
* int number of rows updated in the database (0 means untouched)
|
|
*
|
|
* @throws ServerException if something went wrong when updating the database
|
|
* FeedSubNoHubException if no hub URL was discovered
|
|
*/
|
|
public function ensureHub($rediscovered=false)
|
|
{
|
|
common_debug('Now inside ensureHub again, $rediscovered=='._ve($rediscovered));
|
|
if ($this->sub_state !== 'inactive') {
|
|
common_log(LOG_INFO, sprintf(__METHOD__ . ': Running hub discovery a possibly active feed in %s state for URI %s', _ve($this->sub_state), _ve($this->uri)));
|
|
}
|
|
|
|
$discover = new FeedDiscovery();
|
|
$discover->discoverFromFeedURL($this->uri);
|
|
|
|
$huburi = $discover->getHubLink();
|
|
if (empty($huburi)) {
|
|
// Will be caught and treated with if statements in regards to
|
|
// fallback hub and feed polling (nohub) configuration.
|
|
throw new FeedSubNoHubException();
|
|
}
|
|
|
|
// if we've already got a DB object stored, we want to UPDATE, not INSERT
|
|
$orig = !empty($this->id) ? clone($this) : null;
|
|
|
|
$old_huburi = $this->huburi; // most likely null if we're INSERTing
|
|
$this->huburi = $huburi;
|
|
|
|
if (!empty($this->id)) {
|
|
common_debug(sprintf(__METHOD__ . ': Feed uri==%s huburi before=%s after=%s (identical==%s)', _ve($this->uri), _ve($old_huburi), _ve($this->huburi), _ve($old_huburi===$this->huburi)));
|
|
$result = $this->update($orig);
|
|
if ($result === false) {
|
|
// TODO: Get a DB exception class going...
|
|
common_debug('Database update failed for FeedSub id=='._ve($this->id).' with new huburi: '._ve($this->huburi));
|
|
throw new ServerException('Database update failed for FeedSub.');
|
|
}
|
|
if (!$rediscovered) {
|
|
$this->renew();
|
|
}
|
|
return $result;
|
|
}
|
|
|
|
return null; // we haven't done anything with the database
|
|
}
|
|
|
|
/**
|
|
* Send a subscription request to the hub for this feed.
|
|
* The hub will later send us a confirmation POST to /main/push/callback.
|
|
*
|
|
* @return void
|
|
* @throws ServerException if feed state is not valid
|
|
*/
|
|
public function subscribe($rediscovered=false)
|
|
{
|
|
if ($this->sub_state !== 'inactive') {
|
|
common_log(LOG_WARNING, sprintf('Attempting to (re)start WebSub subscription to %s in unexpected state %s', $this->getUri(), $this->sub_state));
|
|
}
|
|
|
|
if (!Event::handle('FeedSubscribe', array($this))) {
|
|
// A plugin handled it
|
|
return;
|
|
}
|
|
|
|
if (empty($this->huburi)) {
|
|
if (common_config('feedsub', 'fallback_hub')) {
|
|
// No native hub on this feed?
|
|
// Use our fallback hub, which handles polling on our behalf.
|
|
} elseif (common_config('feedsub', 'nohub')) {
|
|
// For this to actually work, we'll need some polling mechanism.
|
|
// The FeedPoller plugin should take care of it.
|
|
return;
|
|
} else {
|
|
// TRANS: Server exception.
|
|
throw new ServerException(_m('Attempting to start WebSub subscription for feed with no hub.'));
|
|
}
|
|
}
|
|
|
|
$this->doSubscribe('subscribe', $rediscovered);
|
|
}
|
|
|
|
/**
|
|
* Send a WebSub unsubscription request to the hub for this feed.
|
|
* The hub will later send us a confirmation POST to /main/push/callback.
|
|
* Warning: this will cancel the subscription even if someone else in
|
|
* the system is using it. Most callers will want garbageCollect() instead,
|
|
* which confirms there's no uses left.
|
|
*
|
|
* @throws ServerException if feed state is not valid
|
|
*/
|
|
public function unsubscribe()
|
|
{
|
|
if ($this->sub_state != 'active') {
|
|
common_log(LOG_WARNING, sprintf('Attempting to (re)end WebSub subscription to %s in unexpected state %s', $this->getUri(), $this->sub_state));
|
|
}
|
|
|
|
if (!Event::handle('FeedUnsubscribe', array($this))) {
|
|
// A plugin handled it
|
|
return;
|
|
}
|
|
|
|
if (empty($this->huburi) && !common_config('feedsub', 'fallback_hub')) {
|
|
/**
|
|
* If the huburi is empty and we don't have a fallback hub,
|
|
* there is nowhere we can send an unsubscribe to.
|
|
*
|
|
* A plugin should handle the FeedSub above and set the proper state
|
|
* if there is no hub. (instead of 'nohub' it should be 'inactive' if
|
|
* the instance has enabled feed polling for feeds that don't publish
|
|
* WebSub/PuSH hubs. FeedPoller is a plugin which enables polling.
|
|
*
|
|
* Secondly, if we don't have the setting "nohub" enabled (i.e.)
|
|
* we're ready to poll ourselves, there is something odd with the
|
|
* database, such as a polling plugin that has been disabled.
|
|
*/
|
|
|
|
if (!common_config('feedsub', 'nohub')) {
|
|
// TRANS: Server exception.
|
|
throw new ServerException(_m('Attempting to end WebSub subscription for feed with no hub.'));
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
$this->doSubscribe('unsubscribe');
|
|
}
|
|
|
|
/**
|
|
* Check if there are any active local uses of this feed, and if not then
|
|
* make sure it's inactive, unsubscribing if necessary.
|
|
*
|
|
* @return boolean true if the subscription is now inactive, false if still active.
|
|
* @throws NoProfileException in FeedSubSubscriberCount for missing Profile entries
|
|
* @throws Exception if something goes wrong in unsubscribe() method
|
|
*/
|
|
public function garbageCollect()
|
|
{
|
|
if ($this->sub_state === 'inactive') {
|
|
// No active WebSub subscription, we can just leave it be.
|
|
return true;
|
|
}
|
|
|
|
// WebSub subscription is either active or in an indeterminate state.
|
|
// Check if we're out of subscribers, and if so send an unsubscribe.
|
|
$count = 0;
|
|
Event::handle('FeedSubSubscriberCount', array($this, &$count));
|
|
|
|
if ($count > 0) {
|
|
common_log(LOG_INFO, __METHOD__ . ': ok, ' . $count . ' user(s) left for ' . $this->getUri());
|
|
return false;
|
|
}
|
|
|
|
common_log(LOG_INFO, __METHOD__ . ': unsubscribing, no users left for ' . $this->getUri());
|
|
// Unsubscribe throws various Exceptions on failure
|
|
$this->unsubscribe();
|
|
|
|
return true;
|
|
}
|
|
|
|
public static function renewalCheck()
|
|
{
|
|
$fs = new FeedSub();
|
|
$fs->whereAdd("sub_end IS NOT NULL AND sub_end < (CURRENT_TIMESTAMP + INTERVAL '1' DAY)");
|
|
// find can be both false and 0, depending on why nothing was found
|
|
if (!$fs->find()) {
|
|
throw new NoResultException($fs);
|
|
}
|
|
return $fs;
|
|
}
|
|
|
|
public function renew($rediscovered=false)
|
|
{
|
|
common_debug('FeedSub is being renewed for uri=='._ve($this->uri).' on huburi=='._ve($this->huburi));
|
|
$this->subscribe($rediscovered);
|
|
}
|
|
|
|
/**
|
|
* Setting to subscribe means it is _waiting_ to become active. This
|
|
* cannot be done in a transaction because there is a chance that the
|
|
* remote script we're calling (as in the case of PuSHpress) performs
|
|
* the lookup _while_ we're POSTing data, which means the transaction
|
|
* never completes (PushcallbackAction gets an 'inactive' state).
|
|
*
|
|
* @return boolean true when everything is ok (throws Exception on fail)
|
|
* @throws Exception on failure, can be HTTPClient's or our own.
|
|
*/
|
|
protected function doSubscribe($mode, $rediscovered=false)
|
|
{
|
|
$msg = null; // carries descriptive error message to enduser (no remote data strings!)
|
|
|
|
$orig = clone($this);
|
|
if ($mode == 'subscribe') {
|
|
$this->secret = common_random_hexstr(32);
|
|
}
|
|
$this->sub_state = $mode;
|
|
$this->update($orig);
|
|
unset($orig);
|
|
|
|
try {
|
|
$callback = common_local_url('pushcallback', array('feed' => $this->id));
|
|
$headers = array('Content-Type: application/x-www-form-urlencoded');
|
|
$post = array('hub.mode' => $mode,
|
|
'hub.callback' => $callback,
|
|
'hub.verify' => 'async', // TODO: deprecated, remove when noone uses PuSH <0.4 (only 'async' method used there)
|
|
'hub.verify_token' => 'Deprecated-since-PuSH-0.4', // TODO: rm!
|
|
|
|
'hub.lease_seconds' => 2592000, // 3600*24*30, request approximately month long lease (may be changed by hub)
|
|
'hub.secret' => $this->secret,
|
|
'hub.topic' => $this->getUri());
|
|
$client = new HTTPClient();
|
|
if ($this->huburi) {
|
|
$hub = $this->huburi;
|
|
} else {
|
|
if (common_config('feedsub', 'fallback_hub')) {
|
|
$hub = common_config('feedsub', 'fallback_hub');
|
|
if (common_config('feedsub', 'hub_user')) {
|
|
$u = common_config('feedsub', 'hub_user');
|
|
$p = common_config('feedsub', 'hub_pass');
|
|
$client->setAuth($u, $p);
|
|
}
|
|
} else {
|
|
throw new FeedSubException('Server could not find a usable WebSub hub.');
|
|
}
|
|
}
|
|
$response = $client->post($hub, $headers, $post);
|
|
$status = $response->getStatus();
|
|
// WebSub specificed response status code
|
|
if ($status == 202 || $status == 204) {
|
|
common_log(LOG_INFO, __METHOD__ . ': sub req ok, awaiting verification callback');
|
|
return;
|
|
} elseif ($status >= 200 && $status < 300) {
|
|
common_log(LOG_ERR, __METHOD__ . ": sub req returned unexpected HTTP $status: " . $response->getBody());
|
|
$msg = sprintf(_m("Unexpected HTTP status: %d"), $status);
|
|
} elseif ($status == 422 && !$rediscovered) {
|
|
// Error code regarding something wrong in the data (it seems
|
|
// that we're talking to a WebSub hub at least, so let's check
|
|
// our own data to be sure we're not mistaken somehow, which
|
|
// means rediscovering hub data (the boolean parameter means
|
|
// we avoid running this part over and over and over and over):
|
|
|
|
common_debug('Running ensureHub again due to 422 status, $rediscovered=='._ve($rediscovered));
|
|
$discoveryResult = $this->ensureHub(true);
|
|
common_debug('ensureHub is now done and its result was: '._ve($discoveryResult));
|
|
} else {
|
|
common_log(LOG_ERR, __METHOD__ . ": sub req failed with HTTP $status: " . $response->getBody());
|
|
}
|
|
} catch (Exception $e) {
|
|
common_log(LOG_ERR, __METHOD__ . ": error \"{$e->getMessage()}\" hitting hub {$this->huburi} subscribing to {$this->getUri()}");
|
|
|
|
// Reset the subscription state.
|
|
$orig = clone($this);
|
|
$this->sub_state = 'inactive';
|
|
$this->update($orig);
|
|
|
|
// Throw the Exception again.
|
|
throw $e;
|
|
}
|
|
throw new ServerException("{$mode} request failed" . (!is_null($msg) ? " ($msg)" : '.'));
|
|
}
|
|
|
|
/**
|
|
* Save WebSub subscription confirmation.
|
|
* Sets approximate lease start and end times and finalizes state.
|
|
*
|
|
* @param int $lease_seconds provided hub.lease_seconds parameter, if given
|
|
*/
|
|
public function confirmSubscribe($lease_seconds)
|
|
{
|
|
$original = clone($this);
|
|
|
|
$this->sub_state = 'active';
|
|
$this->sub_start = common_sql_date(time());
|
|
if ($lease_seconds > 0) {
|
|
$this->sub_end = common_sql_date(time() + $lease_seconds);
|
|
} else {
|
|
// Backwards compatibility to StatusNet (PuSH <0.4 supported permanent subs)
|
|
$this->sub_end = DB_DataObject_Cast::sql('NULL');
|
|
}
|
|
$this->modified = common_sql_now();
|
|
|
|
common_debug(__METHOD__ . ': Updating sub state and metadata for '.$this->getUri());
|
|
return $this->update($original);
|
|
}
|
|
|
|
/**
|
|
* Save WebSub unsubscription confirmation.
|
|
* Wipes active WebSub sub info and resets state.
|
|
*/
|
|
public function confirmUnsubscribe()
|
|
{
|
|
$original = clone($this);
|
|
|
|
$this->secret = DB_DataObject_Cast::sql('NULL');
|
|
$this->sub_state = 'inactive';
|
|
$this->sub_start = DB_DataObject_Cast::sql('NULL');
|
|
$this->sub_end = DB_DataObject_Cast::sql('NULL');
|
|
$this->modified = common_sql_now();
|
|
|
|
return $this->update($original);
|
|
}
|
|
|
|
/**
|
|
* Accept updates from a WebSub feed. If validated, this object and the
|
|
* feed (as a DOMDocument) will be passed to the StartFeedSubHandleFeed
|
|
* and EndFeedSubHandleFeed events for processing.
|
|
*
|
|
* Not guaranteed to be running in an immediate POST context; may be run
|
|
* from a queue handler.
|
|
*
|
|
* Side effects: the feedsub record's lastupdate field will be updated
|
|
* to the current time (not published time) if we got a legit update.
|
|
*
|
|
* @param string $post source of Atom or RSS feed
|
|
* @param string $hmac X-Hub-Signature header, if present
|
|
*/
|
|
public function receive($post, $hmac)
|
|
{
|
|
common_log(LOG_INFO, sprintf(__METHOD__.': packet for %s with HMAC %s', _ve($this->getUri()), _ve($hmac)));
|
|
|
|
if (!in_array($this->sub_state, array('active', 'nohub'))) {
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': ignoring WebSub for inactive feed %s (in state %s)', _ve($this->getUri()), _ve($this->sub_state)));
|
|
return;
|
|
}
|
|
|
|
if ($post === '') {
|
|
common_log(LOG_ERR, __METHOD__ . ": ignoring empty post");
|
|
return;
|
|
}
|
|
|
|
try {
|
|
if (!$this->validatePushSig($post, $hmac)) {
|
|
// Per spec we silently drop input with a bad sig,
|
|
// while reporting receipt to the server.
|
|
return;
|
|
}
|
|
|
|
$this->receiveFeed($post);
|
|
} catch (FeedSubBadPushSignatureException $e) {
|
|
// We got a signature, so something could be wrong. Let's check to see if
|
|
// maybe upstream has switched to another hub. Let's fetch feed and then
|
|
// compare rel="hub" with $this->huburi, which is done in $this->ensureHub()
|
|
|
|
$this->ensureHub(true);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* All our feed URIs should be URLs.
|
|
*/
|
|
public function importFeed()
|
|
{
|
|
$feed_url = $this->getUri();
|
|
|
|
// Fetch the URL
|
|
try {
|
|
common_log(LOG_INFO, sprintf('Importing feed backlog from %s', $feed_url));
|
|
$feed_xml = HTTPClient::quickGet($feed_url, 'application/atom+xml');
|
|
} catch (Exception $e) {
|
|
throw new FeedSubException("Could not fetch feed from URL '%s': %s (%d).\n", $feed_url, $e->getMessage(), $e->getCode());
|
|
}
|
|
|
|
return $this->receiveFeed($feed_xml);
|
|
}
|
|
|
|
protected function receiveFeed($feed_xml)
|
|
{
|
|
// We're passed the XML for the Atom feed as $feed_xml,
|
|
// so read it into a DOMDocument and process.
|
|
$feed = new DOMDocument();
|
|
if (!$feed->loadXML($feed_xml)) {
|
|
// @fixme might help to include the err message
|
|
common_log(LOG_ERR, __METHOD__ . ": ignoring invalid XML");
|
|
return;
|
|
}
|
|
|
|
$orig = clone($this);
|
|
$this->last_update = common_sql_now();
|
|
$this->update($orig);
|
|
|
|
Event::handle('StartFeedSubReceive', array($this, $feed));
|
|
Event::handle('EndFeedSubReceive', array($this, $feed));
|
|
}
|
|
|
|
/**
|
|
* Validate the given Atom chunk and HMAC signature against our
|
|
* shared secret that was set up at subscription time.
|
|
*
|
|
* If we don't have a shared secret, there should be no signature.
|
|
* If we do, our calculated HMAC should match theirs.
|
|
*
|
|
* @param string $post raw XML source as POSTed to us
|
|
* @param string $hmac X-Hub-Signature HTTP header value, or empty
|
|
* @return boolean true for a match
|
|
*/
|
|
protected function validatePushSig($post, $hmac)
|
|
{
|
|
if ($this->secret) {
|
|
// {3,16} because shortest hash algorithm name is 3 characters (md2,md4,md5) and longest
|
|
// is currently 11 characters, but we'll leave some margin in the end...
|
|
if (preg_match('/^([0-9a-zA-Z\-\,]{3,16})=([0-9a-fA-F]+)$/', $hmac, $matches)) {
|
|
$hash_algo = strtolower($matches[1]);
|
|
$their_hmac = strtolower($matches[2]);
|
|
common_debug(sprintf(__METHOD__ . ': WebSub push from feed %s uses HMAC algorithm %s with value: %s', _ve($this->getUri()), _ve($hash_algo), _ve($their_hmac)));
|
|
|
|
if (!in_array($hash_algo, hash_algos())) {
|
|
// We can't handle this at all, PHP doesn't recognize the algorithm name ('md5', 'sha1', 'sha256' etc: https://secure.php.net/manual/en/function.hash-algos.php)
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': HMAC algorithm %s unsupported, not found in PHP hash_algos()', _ve($hash_algo)));
|
|
return false;
|
|
} elseif (!is_null(common_config('security', 'hash_algos')) && !in_array($hash_algo, common_config('security', 'hash_algos'))) {
|
|
// We _won't_ handle this because there is a list of accepted hash algorithms and this one is not in it.
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': Whitelist for HMAC algorithms exist, but %s is not included.', _ve($hash_algo)));
|
|
return false;
|
|
}
|
|
|
|
$our_hmac = hash_hmac($hash_algo, $post, $this->secret);
|
|
if ($their_hmac !== $our_hmac) {
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': ignoring WebSub push with bad HMAC hash: got %s, expected %s for feed %s from hub %s', _ve($their_hmac), _ve($our_hmac), _ve($this->getUri()), _ve($this->huburi)));
|
|
throw new FeedSubBadPushSignatureException('Incoming WebSub push signature did not match expected HMAC hash.');
|
|
}
|
|
return true;
|
|
} else {
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': ignoring WebSub push with bogus HMAC==', _ve($hmac)));
|
|
}
|
|
} else {
|
|
if (empty($hmac)) {
|
|
return true;
|
|
} else {
|
|
common_log(LOG_ERR, sprintf(__METHOD__.': ignoring WebSub push with unexpected HMAC==%s', _ve($hmac)));
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
public function delete($useWhere=false)
|
|
{
|
|
try {
|
|
$oprofile = Ostatus_profile::getKV('feeduri', $this->getUri());
|
|
if ($oprofile instanceof Ostatus_profile) {
|
|
// Check if there's a profile. If not, handle the NoProfileException below
|
|
$profile = $oprofile->localProfile();
|
|
}
|
|
} catch (NoProfileException $e) {
|
|
// If the Ostatus_profile has no local Profile bound to it, let's clean it out at the same time
|
|
$oprofile->delete();
|
|
} catch (NoUriException $e) {
|
|
// FeedSub->getUri() can throw a NoUriException, let's just go ahead and delete it
|
|
}
|
|
return parent::delete($useWhere);
|
|
}
|
|
}
|