add server-to-server magic auth to dav and cdav controllers
This commit is contained in:
parent
0cf5536e90
commit
b413beeb36
@ -3,30 +3,78 @@ namespace Zotlabs\Module;
|
|||||||
|
|
||||||
require_once('include/event.php');
|
require_once('include/event.php');
|
||||||
|
|
||||||
|
require_once('include/auth.php');
|
||||||
|
require_once('include/security.php');
|
||||||
|
|
||||||
class Cdav extends \Zotlabs\Web\Controller {
|
class Cdav extends \Zotlabs\Web\Controller {
|
||||||
|
|
||||||
function init() {
|
function init() {
|
||||||
|
|
||||||
|
$record = null;
|
||||||
|
$channel_login = false;
|
||||||
|
|
||||||
if((argv(1) !== 'calendar') && (argv(1) !== 'addressbook')) {
|
if((argv(1) !== 'calendar') && (argv(1) !== 'addressbook')) {
|
||||||
|
|
||||||
// workaround for HTTP-auth in CGI mode
|
foreach([ 'REDIRECT_REMOTE_USER', 'HTTP_AUTHORIZATION' ] as $head) {
|
||||||
if (x($_SERVER, 'REDIRECT_REMOTE_USER')) {
|
|
||||||
$userpass = base64_decode(substr($_SERVER["REDIRECT_REMOTE_USER"], 6)) ;
|
/* Basic authentication */
|
||||||
if(strlen($userpass)) {
|
|
||||||
list($name, $password) = explode(':', $userpass);
|
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,5) === 'Basic') {
|
||||||
$_SERVER['PHP_AUTH_USER'] = $name;
|
$userpass = @base64_decode(substr(trim($_SERVER[$head]),6)) ;
|
||||||
$_SERVER['PHP_AUTH_PW'] = $password;
|
if(strlen($userpass)) {
|
||||||
|
list($name, $password) = explode(':', $userpass);
|
||||||
|
$_SERVER['PHP_AUTH_USER'] = $name;
|
||||||
|
$_SERVER['PHP_AUTH_PW'] = $password;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Signature authentication */
|
||||||
|
|
||||||
|
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,9) === 'Signature') {
|
||||||
|
$sigblock = \Zotlabs\Web\HTTPSig::parse_sigheader($_SERVER[$head]);
|
||||||
|
if($sigblock) {
|
||||||
|
$keyId = $sigblock['keyId'];
|
||||||
|
if($keyId) {
|
||||||
|
$r = q("select * from hubloc where hubloc_addr = '%s' limit 1",
|
||||||
|
dbesc($keyId)
|
||||||
|
);
|
||||||
|
if($r) {
|
||||||
|
$c = channelx_by_hash($r[0]['hubloc_hash']);
|
||||||
|
if($c) {
|
||||||
|
$a = q("select * from account where account_id = %d limit 1",
|
||||||
|
intval($c[0]['channel_account_id'])
|
||||||
|
);
|
||||||
|
if($a) {
|
||||||
|
$record = [ 'channel' => $c[0], 'account' => $a[0] ];
|
||||||
|
$channel_login = $c[0]['channel_id'];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if(! $record)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
if($head !== 'HTTP_AUTHORIZATION') {
|
||||||
|
$_SERVER['HTTP_AUTHORIZATION'] = $_SERVER[$head];
|
||||||
|
}
|
||||||
|
if($record) {
|
||||||
|
$verified = \Zotlabs\Web\HTTPSig::verify('',$record['channel']['channel_pubkey']);
|
||||||
|
if(! ($verified && $verified['header_signed'] && $verified['header_valid'])) {
|
||||||
|
$record = null;
|
||||||
|
}
|
||||||
|
if($record['account']) {
|
||||||
|
authenticate_success($record['account']);
|
||||||
|
if($channel_login) {
|
||||||
|
change_channel($channel_login);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (x($_SERVER, 'HTTP_AUTHORIZATION')) {
|
|
||||||
$userpass = base64_decode(substr($_SERVER["HTTP_AUTHORIZATION"], 6)) ;
|
|
||||||
if(strlen($userpass)) {
|
|
||||||
list($name, $password) = explode(':', $userpass);
|
|
||||||
$_SERVER['PHP_AUTH_USER'] = $name;
|
|
||||||
$_SERVER['PHP_AUTH_PW'] = $password;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This server combines both CardDAV and CalDAV functionality into a single
|
* This server combines both CardDAV and CalDAV functionality into a single
|
||||||
|
@ -12,6 +12,9 @@ use \Sabre\DAV as SDAV;
|
|||||||
use \Zotlabs\Storage;
|
use \Zotlabs\Storage;
|
||||||
|
|
||||||
require_once('include/attach.php');
|
require_once('include/attach.php');
|
||||||
|
require_once('include/auth.php');
|
||||||
|
require_once('include/security.php');
|
||||||
|
|
||||||
|
|
||||||
class Dav extends \Zotlabs\Web\Controller {
|
class Dav extends \Zotlabs\Web\Controller {
|
||||||
|
|
||||||
@ -21,22 +24,62 @@ class Dav extends \Zotlabs\Web\Controller {
|
|||||||
*/
|
*/
|
||||||
function init() {
|
function init() {
|
||||||
|
|
||||||
// workaround for HTTP-auth in CGI mode
|
foreach([ 'REDIRECT_REMOTE_USER', 'HTTP_AUTHORIZATION' ] as $head) {
|
||||||
if (x($_SERVER, 'REDIRECT_REMOTE_USER')) {
|
|
||||||
$userpass = base64_decode(substr($_SERVER["REDIRECT_REMOTE_USER"], 6)) ;
|
|
||||||
if(strlen($userpass)) {
|
|
||||||
list($name, $password) = explode(':', $userpass);
|
|
||||||
$_SERVER['PHP_AUTH_USER'] = $name;
|
|
||||||
$_SERVER['PHP_AUTH_PW'] = $password;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (x($_SERVER, 'HTTP_AUTHORIZATION')) {
|
/* Basic authentication */
|
||||||
$userpass = base64_decode(substr($_SERVER["HTTP_AUTHORIZATION"], 6)) ;
|
|
||||||
if(strlen($userpass)) {
|
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,5) === 'Basic') {
|
||||||
list($name, $password) = explode(':', $userpass);
|
$userpass = @base64_decode(substr(trim($_SERVER[$head]),6)) ;
|
||||||
$_SERVER['PHP_AUTH_USER'] = $name;
|
if(strlen($userpass)) {
|
||||||
$_SERVER['PHP_AUTH_PW'] = $password;
|
list($name, $password) = explode(':', $userpass);
|
||||||
|
$_SERVER['PHP_AUTH_USER'] = $name;
|
||||||
|
$_SERVER['PHP_AUTH_PW'] = $password;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Signature authentication */
|
||||||
|
|
||||||
|
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,9) === 'Signature') {
|
||||||
|
$sigblock = \Zotlabs\Web\HTTPSig::parse_sigheader($_SERVER[$head]);
|
||||||
|
if($sigblock) {
|
||||||
|
$keyId = $sigblock['keyId'];
|
||||||
|
if($keyId) {
|
||||||
|
$r = q("select * from hubloc where hubloc_addr = '%s' limit 1",
|
||||||
|
dbesc($keyId)
|
||||||
|
);
|
||||||
|
if($r) {
|
||||||
|
$c = channelx_by_hash($r[0]['hubloc_hash']);
|
||||||
|
if($c) {
|
||||||
|
$a = q("select * from account where account_id = %d limit 1",
|
||||||
|
intval($c[0]['channel_account_id'])
|
||||||
|
);
|
||||||
|
if($a) {
|
||||||
|
$record = [ 'channel' => $c[0], 'account' => $a[0] ];
|
||||||
|
$channel_login = $c[0]['channel_id'];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if(! $record)
|
||||||
|
continue;
|
||||||
|
if($head !== 'HTTP_AUTHORIZATION') {
|
||||||
|
$_SERVER['HTTP_AUTHORIZATION'] = $_SERVER[$head];
|
||||||
|
}
|
||||||
|
if($record) {
|
||||||
|
$verified = \Zotlabs\Web\HTTPSig::verify('',$record['channel']['channel_pubkey']);
|
||||||
|
if(! ($verified && $verified['header_signed'] && $verified['header_valid'])) {
|
||||||
|
$record = null;
|
||||||
|
}
|
||||||
|
if($record['account']) {
|
||||||
|
authenticate_success($record['account']);
|
||||||
|
if($channel_login) {
|
||||||
|
change_channel($channel_login);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ function api_login(&$a){
|
|||||||
|
|
||||||
/* Signature authentication */
|
/* Signature authentication */
|
||||||
|
|
||||||
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,5) === 'Signature') {
|
if(array_key_exists($head,$_SERVER) && substr(trim($_SERVER[$head]),0,9) === 'Signature') {
|
||||||
$sigblock = \Zotlabs\Web\HTTPSig::parse_sigheader($_SERVER[$head]);
|
$sigblock = \Zotlabs\Web\HTTPSig::parse_sigheader($_SERVER[$head]);
|
||||||
if($sigblock) {
|
if($sigblock) {
|
||||||
$keyId = $sigblock['keyId'];
|
$keyId = $sigblock['keyId'];
|
||||||
|
Reference in New Issue
Block a user