diff options
author | Aaron Parecki <aaron@parecki.com> | 2014-05-24 14:41:21 -0700 |
---|---|---|
committer | Aaron Parecki <aaron@parecki.com> | 2014-05-24 14:41:21 -0700 |
commit | 3f82ec2f757c62c25a31b461e0a0cddc14886117 (patch) | |
tree | 8eb85c7f356df87f2bf477a54c7ab521002492a1 /controllers/auth.php |
Working app! Copied signin logic from OwnYourGram. New "post" interface for writing a simple text post. Also supports browser geolocation.
Diffstat (limited to 'controllers/auth.php')
-rw-r--r-- | controllers/auth.php | 268 |
1 files changed, 268 insertions, 0 deletions
diff --git a/controllers/auth.php b/controllers/auth.php new file mode 100644 index 0000000..208f0f8 --- /dev/null +++ b/controllers/auth.php @@ -0,0 +1,268 @@ +<?php + +function buildRedirectURI() { + return 'http://' . $_SERVER['SERVER_NAME'] . '/auth/callback'; +} + +function clientID() { + return 'https://indiepost.micropub.net'; +} + +function build_url($parsed_url) { + $scheme = isset($parsed_url['scheme']) ? $parsed_url['scheme'] . '://' : ''; + $host = isset($parsed_url['host']) ? $parsed_url['host'] : ''; + $port = isset($parsed_url['port']) ? ':' . $parsed_url['port'] : ''; + $user = isset($parsed_url['user']) ? $parsed_url['user'] : ''; + $pass = isset($parsed_url['pass']) ? ':' . $parsed_url['pass'] : ''; + $pass = ($user || $pass) ? "$pass@" : ''; + $path = isset($parsed_url['path']) ? $parsed_url['path'] : ''; + $query = isset($parsed_url['query']) ? '?' . $parsed_url['query'] : ''; + $fragment = isset($parsed_url['fragment']) ? '#' . $parsed_url['fragment'] : ''; + return "$scheme$user$pass$host$port$path$query$fragment"; +} + +// Input: Any URL or string like "aaronparecki.com" +// Output: Normlized URL (default to http if no scheme, force "/" path) +// or return false if not a valid URL (has query string params, etc) +function normalizeMeURL($url) { + $me = parse_url($url); + + // parse_url returns just "path" for naked domains + if(count($me) == 1 && array_key_exists('path', $me)) { + $me['host'] = $me['path']; + unset($me['path']); + } + + if(!array_key_exists('scheme', $me)) + $me['scheme'] = 'http'; + + if(!array_key_exists('path', $me)) + $me['path'] = '/'; + + // Invalid scheme + if(!in_array($me['scheme'], array('http','https'))) + return false; + + // Invalid path + if($me['path'] != '/') + return false; + + // query and fragment not allowed + if(array_key_exists('query', $me) || array_key_exists('fragment', $me)) + return false; + + return build_url($me); +} + +$app->get('/', function($format='html') use($app) { + $res = $app->response(); + + + ob_start(); + render('index', array( + 'title' => 'OwnYourGram', + 'meta' => '' + )); + $html = ob_get_clean(); + $res->body($html); +}); + +$app->get('/signin', function() use($app) { + $html = render('signin', array('title' => 'Sign In')); + $app->response()->body($html); +}); + +$app->get('/auth/start', function() use($app) { + $req = $app->request(); + + $params = $req->params(); + + // the "me" parameter is user input, and may be in a couple of different forms: + // aaronparecki.com http://aaronparecki.com http://aaronparecki.com/ + // Normlize the value now (move this into a function in IndieAuth\Client later) + if(!array_key_exists('me', $params) || !($me = normalizeMeURL($params['me']))) { + $html = render('auth_error', array( + 'title' => 'Sign In', + 'error' => 'Invalid "me" Parameter', + 'errorDescription' => 'The ID you entered, <strong>' . $params['me'] . '</strong> is not valid.' + )); + $app->response()->body($html); + return; + } + + $authorizationEndpoint = IndieAuth\Client::discoverAuthorizationEndpoint($me); + $tokenEndpoint = IndieAuth\Client::discoverTokenEndpoint($me); + $micropubEndpoint = IndieAuth\Client::discoverMicropubEndpoint($me); + + if($tokenEndpoint && $micropubEndpoint && $authorizationEndpoint) { + // Generate a "state" parameter for the request + $state = IndieAuth\Client::generateStateParameter(); + $_SESSION['auth_state'] = $state; + + $scope = 'post'; + $authorizationURL = IndieAuth\Client::buildAuthorizationURL($authorizationEndpoint, $me, buildRedirectURI(), clientID(), $state, $scope); + } else { + $authorizationURL = false; + } + + // If the user has already signed in before and has a micropub access token, skip + // the debugging screens and redirect immediately to the auth endpoint. + // This will still generate a new access token when they finish logging in. + $user = ORM::for_table('users')->where('url', $me)->find_one(); + if($user && $user->micropub_access_token && !array_key_exists('restart', $params)) { + + $user->micropub_endpoint = $micropubEndpoint; + $user->authorization_endpoint = $authorizationEndpoint; + $user->token_endpoint = $tokenEndpoint; + $user->save(); + + $app->redirect($authorizationURL, 301); + + } else { + + if(!$user) + $user = ORM::for_table('users')->create(); + $user->url = $me; + $user->date_created = date('Y-m-d H:i:s'); + $user->micropub_endpoint = $micropubEndpoint; + $user->authorization_endpoint = $authorizationEndpoint; + $user->token_endpoint = $tokenEndpoint; + $user->save(); + + $html = render('auth_start', array( + 'title' => 'Sign In', + 'me' => $me, + 'authorizing' => $me, + 'meParts' => parse_url($me), + 'tokenEndpoint' => $tokenEndpoint, + 'micropubEndpoint' => $micropubEndpoint, + 'authorizationEndpoint' => $authorizationEndpoint, + 'authorizationURL' => $authorizationURL + )); + $app->response()->body($html); + } +}); + +$app->get('/auth/callback', function() use($app) { + $req = $app->request(); + $params = $req->params(); + + // Double check there is a "me" parameter + // Should only fail for really hacked up requests + if(!array_key_exists('me', $params) || !($me = normalizeMeURL($params['me']))) { + $html = render('auth_error', array( + 'title' => 'Auth Callback', + 'error' => 'Invalid "me" Parameter', + 'errorDescription' => 'The ID you entered, <strong>' . $params['me'] . '</strong> is not valid.' + )); + $app->response()->body($html); + return; + } + + // If there is no state in the session, start the login again + if(!array_key_exists('auth_state', $_SESSION)) { + $app->redirect('/auth/start?me='.urlencode($params['me'])); + return; + } + + if(!array_key_exists('code', $params) || trim($params['code']) == '') { + $html = render('auth_error', array( + 'title' => 'Auth Callback', + 'error' => 'Missing authorization code', + 'errorDescription' => 'No authorization code was provided in the request.' + )); + $app->response()->body($html); + return; + } + + // Verify the state came back and matches what we set in the session + // Should only fail for malicious attempts, ok to show a not as nice error message + if(!array_key_exists('state', $params)) { + $html = render('auth_error', array( + 'title' => 'Auth Callback', + 'error' => 'Missing state parameter', + 'errorDescription' => 'No state parameter was provided in the request. This shouldn\'t happen. It is possible this is a malicious authorization attempt.' + )); + $app->response()->body($html); + return; + } + + if($params['state'] != $_SESSION['auth_state']) { + $html = render('auth_error', array( + 'title' => 'Auth Callback', + 'error' => 'Invalid state', + 'errorDescription' => 'The state parameter provided did not match the state provided at the start of authorization. This is most likely caused by a malicious authorization attempt.' + )); + $app->response()->body($html); + return; + } + + // Now the basic sanity checks have passed. Time to start providing more helpful messages when there is an error. + // An authorization code is in the query string, and we want to exchange that for an access token at the token endpoint. + + // Discover the endpoints + $micropubEndpoint = IndieAuth\Client::discoverMicropubEndpoint($me); + $tokenEndpoint = IndieAuth\Client::discoverTokenEndpoint($me); + + if($tokenEndpoint) { + $token = IndieAuth\Client::getAccessToken($tokenEndpoint, $params['code'], $params['me'], buildRedirectURI(), clientID(), $params['state'], true); + + } else { + $token = array('auth'=>false, 'response'=>false); + } + + $redirectToDashboardImmediately = false; + + // If a valid access token was returned, store the token info in the session and they are signed in + if(k($token['auth'], array('me','access_token','scope'))) { + $_SESSION['auth'] = $token['auth']; + $_SESSION['me'] = $params['me']; + + $user = ORM::for_table('users')->where('url', $me)->find_one(); + if($user) { + // Already logged in, update the last login date + $user->last_login = date('Y-m-d H:i:s'); + // If they have logged in before and we already have an access token, then redirect to the dashboard now + if($user->micropub_access_token) + $redirectToDashboardImmediately = true; + } else { + // New user! Store the user in the database + $user = ORM::for_table('users')->create(); + $user->url = $me; + $user->date_created = date('Y-m-d H:i:s'); + } + $user->micropub_endpoint = $micropubEndpoint; + $user->micropub_access_token = $token['auth']['access_token']; + $user->micropub_scope = $token['auth']['scope']; + $user->micropub_response = $token['response']; + $user->save(); + $_SESSION['user_id'] = $user->id(); + } + + unset($_SESSION['auth_state']); + + if($redirectToDashboardImmediately) { + $app->redirect('/new', 301); + } else { + $html = render('auth_callback', array( + 'title' => 'Sign In', + 'me' => $me, + 'authorizing' => $me, + 'meParts' => parse_url($me), + 'tokenEndpoint' => $tokenEndpoint, + 'auth' => $token['auth'], + 'response' => $token['response'], + 'curl_error' => (array_key_exists('error', $token) ? $token['error'] : false) + )); + $app->response()->body($html); + } +}); + +$app->get('/signout', function() use($app) { + unset($_SESSION['auth']); + unset($_SESSION['me']); + unset($_SESSION['auth_state']); + unset($_SESSION['user_id']); + $app->redirect('/', 301); +}); + |