2020-08-12 14:36:18 +03:00
|
|
|
<?php declare(strict_types=1);
|
|
|
|
namespace openvk\Web\Presenters;
|
|
|
|
use Chandler\Security\Authenticator;
|
|
|
|
use Chandler\Database\DatabaseConnection as DB;
|
|
|
|
use openvk\VKAPI\Exceptions\APIErrorException;
|
|
|
|
use openvk\Web\Models\Entities\{User, APIToken};
|
|
|
|
use openvk\Web\Models\Repositories\{Users, APITokens};
|
2021-12-02 18:31:32 +03:00
|
|
|
use lfkeitel\phptotp\{Base32, Totp};
|
2020-08-12 14:36:18 +03:00
|
|
|
|
|
|
|
final class VKAPIPresenter extends OpenVKPresenter
|
|
|
|
{
|
|
|
|
private function logRequest(string $object, string $method): void
|
|
|
|
{
|
|
|
|
$date = date(DATE_COOKIE);
|
|
|
|
$params = json_encode($_REQUEST);
|
2020-09-12 11:11:00 +03:00
|
|
|
$log = "[$date] $object.$method called with $params\r\n";
|
2020-08-12 14:36:18 +03:00
|
|
|
file_put_contents(OPENVK_ROOT . "/VKAPI/debug.log", $log, FILE_APPEND | LOCK_EX);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function fail(int $code, string $message, string $object, string $method): void
|
|
|
|
{
|
|
|
|
header("HTTP/1.1 400 Bad API Call");
|
|
|
|
header("Content-Type: application/json");
|
|
|
|
|
|
|
|
$payload = [
|
|
|
|
"error_code" => $code,
|
|
|
|
"error_msg" => $message,
|
|
|
|
"request_params" => [
|
|
|
|
[
|
|
|
|
"key" => "method",
|
|
|
|
"value" => "$object.$method",
|
|
|
|
],
|
|
|
|
[
|
|
|
|
"key" => "oauth",
|
|
|
|
"value" => 1,
|
|
|
|
],
|
|
|
|
],
|
|
|
|
];
|
|
|
|
|
|
|
|
foreach($_GET as $key => $value)
|
|
|
|
array_unshift($payload["request_params"], [ "key" => $key, "value" => $value ]);
|
|
|
|
|
|
|
|
exit(json_encode($payload));
|
|
|
|
}
|
2022-07-19 23:40:17 +03:00
|
|
|
|
|
|
|
private function twofaFail(int $userId): void
|
|
|
|
{
|
|
|
|
header("HTTP/1.1 401 Unauthorized");
|
|
|
|
header("Content-Type: application/json");
|
|
|
|
|
|
|
|
$payload = [
|
|
|
|
"error" => "need_validation",
|
|
|
|
"error_description" => "use app code",
|
|
|
|
"validation_type" => "2fa_app",
|
|
|
|
"validation_sid" => "2fa_".$userId."_2839041_randommessdontread",
|
|
|
|
"phone_mask" => "+374 ** *** 420",
|
|
|
|
"redirect_url" => "https://http.cat/418", // Not implemented yet :( So there is a photo of cat :3
|
|
|
|
"validation_resend" => "nowhere"
|
|
|
|
];
|
|
|
|
|
|
|
|
exit(json_encode($payload));
|
|
|
|
}
|
2020-08-12 14:36:18 +03:00
|
|
|
|
|
|
|
private function badMethod(string $object, string $method): void
|
|
|
|
{
|
|
|
|
$this->fail(3, "Unknown method passed.", $object, $method);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function badMethodCall(string $object, string $method, string $param): void
|
|
|
|
{
|
|
|
|
$this->fail(100, "Required parameter '$param' missing.", $object, $method);
|
|
|
|
}
|
|
|
|
|
2020-09-12 11:11:00 +03:00
|
|
|
function onStartup(): void
|
|
|
|
{
|
|
|
|
parent::onStartup();
|
|
|
|
|
|
|
|
# idk, but in case we will ever support non-standard HTTP credential authflow
|
|
|
|
$origin = "*";
|
|
|
|
if(isset($_SERVER["HTTP_REFERER"])) {
|
|
|
|
$refOrigin = parse_url($_SERVER["HTTP_REFERER"], PHP_URL_SCHEME) . "://" . parse_url($_SERVER["HTTP_REFERER"], PHP_URL_HOST);
|
|
|
|
if($refOrigin !== false)
|
|
|
|
$origin = $refOrigin;
|
|
|
|
}
|
2020-09-29 23:02:04 +03:00
|
|
|
|
|
|
|
if(!is_null($this->queryParam("requestPort")))
|
|
|
|
$origin .= ":" . ((int) $this->queryParam("requestPort"));
|
|
|
|
|
2020-09-12 11:11:00 +03:00
|
|
|
header("Access-Control-Allow-Origin: $origin");
|
2020-09-29 23:02:04 +03:00
|
|
|
|
|
|
|
if($_SERVER["REQUEST_METHOD"] === "OPTIONS") {
|
|
|
|
header("Access-Control-Allow-Methods: POST, PUT, DELETE");
|
|
|
|
header("Access-Control-Allow-Headers: " . $_SERVER["HTTP_ACCESS_CONTROL_REQUEST_HEADERS"]);
|
|
|
|
header("Access-Control-Max-Age: -1");
|
|
|
|
exit; # Terminate request processing as this is definitely a CORS preflight request.
|
|
|
|
}
|
2020-09-12 11:11:00 +03:00
|
|
|
}
|
2022-03-29 20:43:34 +03:00
|
|
|
|
|
|
|
function renderPhotoUpload(string $signature): void
|
|
|
|
{
|
|
|
|
$secret = CHANDLER_ROOT_CONF["security"]["secret"];
|
|
|
|
$computedSignature = hash_hmac("sha3-224", $_SERVER["QUERY_STRING"], $secret);
|
|
|
|
if(!(strlen($signature) == 56 && sodium_memcmp($signature, $computedSignature) == 0)) {
|
|
|
|
header("HTTP/1.1 422 Unprocessable Entity");
|
|
|
|
exit("Try harder <3");
|
|
|
|
}
|
|
|
|
|
|
|
|
$data = unpack("vDOMAIN/Z10FIELD/vMF/vMP/PTIME/PUSER/PGROUP", base64_decode($_SERVER["QUERY_STRING"]));
|
|
|
|
if((time() - $data["TIME"]) > 600) {
|
|
|
|
header("HTTP/1.1 422 Unprocessable Entity");
|
|
|
|
exit("Expired");
|
|
|
|
}
|
|
|
|
|
|
|
|
$folder = __DIR__ . "../../tmp/api-storage/photos";
|
|
|
|
$maxSize = OPENVK_ROOT_CONF["openvk"]["preferences"]["uploads"]["api"]["maxFileSize"];
|
|
|
|
$maxFiles = OPENVK_ROOT_CONF["openvk"]["preferences"]["uploads"]["api"]["maxFilesPerDomain"];
|
|
|
|
$usrFiles = sizeof(glob("$folder/$data[USER]_*.oct"));
|
|
|
|
if($usrFiles >= $maxFiles) {
|
|
|
|
header("HTTP/1.1 507 Insufficient Storage");
|
|
|
|
exit("There are $maxFiles pending already. Please save them before uploading more :3");
|
|
|
|
}
|
|
|
|
|
|
|
|
# Not multifile
|
|
|
|
if($data["MF"] === 0) {
|
|
|
|
$file = $_FILES[$data["FIELD"]];
|
|
|
|
if(!$file) {
|
|
|
|
header("HTTP/1.0 400");
|
|
|
|
exit("No file");
|
|
|
|
} else if($file["error"] != UPLOAD_ERR_OK) {
|
|
|
|
header("HTTP/1.0 500");
|
|
|
|
exit("File could not be consumed");
|
|
|
|
} else if($file["size"] > $maxSize) {
|
|
|
|
header("HTTP/1.0 507 Insufficient Storage");
|
|
|
|
exit("File is too big");
|
|
|
|
}
|
|
|
|
|
|
|
|
move_uploaded_file($file["tmp_name"], "$folder/$data[USER]_" . ($usrFiles + 1) . ".oct");
|
|
|
|
header("HTTP/1.0 202 Accepted");
|
|
|
|
|
|
|
|
$photo = $data["USER"] . "|" . ($usrFiles + 1) . "|" . $data["GROUP"];
|
|
|
|
exit(json_encode([
|
|
|
|
"server" => "ephemeral",
|
|
|
|
"photo" => $photo,
|
|
|
|
"hash" => hash_hmac("sha3-224", $photo, $secret),
|
|
|
|
]));
|
|
|
|
}
|
|
|
|
|
|
|
|
$files = [];
|
|
|
|
for($i = 1; $i <= 5; $i++) {
|
|
|
|
$file = $_FILES[$data["FIELD"] . $i] ?? NULL;
|
|
|
|
if (!$file || $file["error"] != UPLOAD_ERR_OK || $file["size"] > $maxSize) {
|
|
|
|
continue;
|
|
|
|
} else if((sizeof($files) + $usrFiles) > $maxFiles) {
|
|
|
|
# Clear uploaded files since they can't be saved anyway
|
|
|
|
foreach($files as $f)
|
|
|
|
unlink($f);
|
|
|
|
|
|
|
|
header("HTTP/1.1 507 Insufficient Storage");
|
|
|
|
exit("There are $maxFiles pending already. Please save them before uploading more :3");
|
|
|
|
}
|
|
|
|
|
|
|
|
$files[++$usrFiles] = move_uploaded_file($file["tmp_name"], "$folder/$data[USER]_$usrFiles.oct");
|
|
|
|
}
|
|
|
|
|
|
|
|
if(sizeof($files) === 0) {
|
|
|
|
header("HTTP/1.0 400");
|
|
|
|
exit("No file");
|
|
|
|
}
|
|
|
|
|
|
|
|
$filesManifest = [];
|
|
|
|
foreach($files as $id => $file)
|
|
|
|
$filesManifest[] = ["keyholder" => $data["USER"], "resource" => $id, "club" => $data["GROUP"]];
|
|
|
|
|
|
|
|
$filesManifest = json_encode($filesManifest);
|
|
|
|
$manifestHash = hash_hmac("sha3-224", $filesManifest, $secret);
|
|
|
|
header("HTTP/1.0 202 Accepted");
|
|
|
|
exit(json_encode([
|
|
|
|
"server" => "ephemeral",
|
|
|
|
"photos_list" => $filesManifest,
|
|
|
|
"album_id" => "undefined",
|
|
|
|
"hash" => $manifestHash,
|
|
|
|
]));
|
|
|
|
}
|
2020-09-12 11:11:00 +03:00
|
|
|
|
2020-08-12 14:36:18 +03:00
|
|
|
function renderRoute(string $object, string $method): void
|
|
|
|
{
|
|
|
|
$authMechanism = $this->queryParam("auth_mechanism") ?? "token";
|
|
|
|
if($authMechanism === "roaming") {
|
|
|
|
if(!$this->user->identity)
|
|
|
|
$this->fail(5, "User authorization failed: roaming mechanism is selected, but user is not logged in.", $object, $method);
|
|
|
|
else
|
|
|
|
$identity = $this->user->identity;
|
|
|
|
} else {
|
|
|
|
if(is_null($this->requestParam("access_token"))) {
|
|
|
|
$identity = NULL;
|
|
|
|
} else {
|
|
|
|
$token = (new APITokens)->getByCode($this->requestParam("access_token"));
|
2022-12-17 02:03:02 +03:00
|
|
|
if(!$token) {
|
2020-08-12 14:36:18 +03:00
|
|
|
$identity = NULL;
|
2022-12-17 02:03:02 +03:00
|
|
|
} else {
|
2020-08-12 14:36:18 +03:00
|
|
|
$identity = $token->getUser();
|
2022-12-17 02:03:02 +03:00
|
|
|
$platform = $token->getPlatform();
|
|
|
|
}
|
2020-08-12 14:36:18 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$object = ucfirst(strtolower($object));
|
|
|
|
$handlerClass = "openvk\\VKAPI\\Handlers\\$object";
|
|
|
|
if(!class_exists($handlerClass))
|
|
|
|
$this->badMethod($object, $method);
|
|
|
|
|
2022-12-17 02:03:02 +03:00
|
|
|
$handler = new $handlerClass($identity, $platform);
|
2020-08-12 14:36:18 +03:00
|
|
|
if(!is_callable([$handler, $method]))
|
|
|
|
$this->badMethod($object, $method);
|
|
|
|
|
|
|
|
$route = new \ReflectionMethod($handler, $method);
|
|
|
|
$params = [];
|
|
|
|
foreach($route->getParameters() as $parameter) {
|
|
|
|
$val = $this->requestParam($parameter->getName());
|
|
|
|
if(is_null($val)) {
|
|
|
|
if($parameter->allowsNull())
|
|
|
|
$val = NULL;
|
|
|
|
else if($parameter->isDefaultValueAvailable())
|
|
|
|
$val = $parameter->getDefaultValue();
|
|
|
|
else if($parameter->isOptional())
|
|
|
|
$val = NULL;
|
|
|
|
else
|
|
|
|
$this->badMethodCall($object, $method, $parameter->getName());
|
|
|
|
}
|
|
|
|
|
|
|
|
settype($val, $parameter->getType()->getName());
|
|
|
|
$params[] = $val;
|
|
|
|
}
|
|
|
|
|
|
|
|
define("VKAPI_DECL_VER", $this->requestParam("v") ?? "4.100", false);
|
|
|
|
|
|
|
|
try {
|
|
|
|
$res = $handler->{$method}(...$params);
|
|
|
|
} catch(APIErrorException $ex) {
|
|
|
|
$this->fail($ex->getCode(), $ex->getMessage(), $object, $method);
|
|
|
|
}
|
|
|
|
|
|
|
|
$result = json_encode([
|
|
|
|
"response" => $res,
|
|
|
|
]);
|
|
|
|
|
|
|
|
$size = strlen($result);
|
|
|
|
header("Content-Type: application/json");
|
|
|
|
header("Content-Length: $size");
|
|
|
|
exit($result);
|
|
|
|
}
|
|
|
|
|
|
|
|
function renderTokenLogin(): void
|
|
|
|
{
|
|
|
|
if($this->requestParam("grant_type") !== "password")
|
|
|
|
$this->fail(7, "Invalid grant type", "internal", "acquireToken");
|
|
|
|
else if(is_null($this->requestParam("username")) || is_null($this->requestParam("password")))
|
|
|
|
$this->fail(100, "Password and username not passed", "internal", "acquireToken");
|
|
|
|
|
|
|
|
$chUser = DB::i()->getContext()->table("ChandlerUsers")->where("login", $this->requestParam("username"))->fetch();
|
|
|
|
if(!$chUser)
|
|
|
|
$this->fail(28, "Invalid username or password", "internal", "acquireToken");
|
|
|
|
|
|
|
|
$auth = Authenticator::i();
|
|
|
|
if(!$auth->verifyCredentials($chUser->id, $this->requestParam("password")))
|
|
|
|
$this->fail(28, "Invalid username or password", "internal", "acquireToken");
|
|
|
|
|
|
|
|
$uId = $chUser->related("profiles.user")->fetch()->id;
|
|
|
|
$user = (new Users)->get($uId);
|
2021-12-02 18:31:32 +03:00
|
|
|
|
|
|
|
$code = $this->requestParam("code");
|
2022-07-19 23:40:17 +03:00
|
|
|
if($user->is2faEnabled() && !($code === (new Totp)->GenerateToken(Base32::decode($user->get2faSecret())) || $user->use2faBackupCode((int) $code))) {
|
|
|
|
if($this->requestParam("2fa_supported") == "1")
|
|
|
|
$this->twofaFail($user->getId());
|
|
|
|
else
|
|
|
|
$this->fail(28, "Invalid 2FA code", "internal", "acquireToken");
|
|
|
|
}
|
2020-08-12 14:36:18 +03:00
|
|
|
|
2022-12-17 02:03:02 +03:00
|
|
|
$platform = $this->requestParam("client_name");
|
|
|
|
|
2020-08-12 14:36:18 +03:00
|
|
|
$token = new APIToken;
|
|
|
|
$token->setUser($user);
|
2022-12-17 02:03:02 +03:00
|
|
|
$token->setPlatform(is_null($platform) ? "api" : $platform);
|
2020-08-12 14:36:18 +03:00
|
|
|
$token->save();
|
|
|
|
|
|
|
|
$payload = json_encode([
|
|
|
|
"access_token" => $token->getFormattedToken(),
|
|
|
|
"expires_in" => 0,
|
|
|
|
"user_id" => $uId,
|
|
|
|
]);
|
|
|
|
|
|
|
|
$size = strlen($payload);
|
|
|
|
header("Content-Type: application/json");
|
|
|
|
header("Content-Length: $size");
|
|
|
|
exit($payload);
|
|
|
|
}
|
2020-09-12 11:11:00 +03:00
|
|
|
}
|