2015-08-23 22:38:18 +02:00
< ? php
/**
* @ file include / zot . php
* @ brief Hubzilla implementation of zot protocol .
*
* https :// github . com / friendica / red / wiki / zot
* https :// github . com / friendica / red / wiki / Zot --- A - High - Level - Overview
*
*/
require_once ( 'include/crypto.php' );
require_once ( 'include/items.php' );
require_once ( 'include/hubloc.php' );
2016-01-12 02:47:38 +01:00
require_once ( 'include/queue_fn.php' );
2015-08-23 22:38:18 +02:00
/**
* @ brief Generates a unique string for use as a zot guid .
*
* Generates a unique string for use as a zot guid using our DNS - based url , the
* channel nickname and some entropy .
* The entropy ensures uniqueness against re - installs where the same URL and
* nickname are chosen .
*
* @ note zot doesn ' t require this to be unique . Internally we use a whirlpool
* hash of this guid and the signature of this guid signed with the channel
* private key . This can be verified and should make the probability of
* collision of the verified result negligible within the constraints of our
* immediate universe .
*
* @ param string $channel_nick a unique nickname of controlling entity
* @ returns string
*/
function zot_new_uid ( $channel_nick ) {
$rawstr = z_root () . '/' . $channel_nick . '.' . mt_rand ();
return ( base64url_encode ( hash ( 'whirlpool' , $rawstr , true ), true ));
}
/**
* @ brief Generates a portable hash identifier for a channel .
*
* Generates a portable hash identifier for the channel identified by $guid and
* signed with $guid_sig .
*
* @ note This ID is portable across the network but MUST be calculated locally
* by verifying the signature and can not be trusted as an identity .
*
* @ param string $guid
* @ param string $guid_sig
*/
function make_xchan_hash ( $guid , $guid_sig ) {
return base64url_encode ( hash ( 'whirlpool' , $guid . $guid_sig , true ));
}
/**
* @ brief Given a zot hash , return all distinct hubs .
*
* This function is used in building the zot discovery packet and therefore
* should only be used by channels which are defined on this hub .
*
* @ param string $hash - xchan_hash
* @ returns array of hubloc ( hub location structures )
* * \b hubloc_id int
* * \b hubloc_guid char ( 255 )
* * \b hubloc_guid_sig text
* * \b hubloc_hash char ( 255 )
* * \b hubloc_addr char ( 255 )
* * \b hubloc_flags int
* * \b hubloc_status int
* * \b hubloc_url char ( 255 )
* * \b hubloc_url_sig text
* * \b hubloc_host char ( 255 )
* * \b hubloc_callback char ( 255 )
* * \b hubloc_connect char ( 255 )
* * \b hubloc_sitekey text
* * \b hubloc_updated datetime
* * \b hubloc_connected datetime
*/
function zot_get_hublocs ( $hash ) {
/* Only search for active hublocs - e.g. those that haven't been marked deleted */
$ret = q ( " select * from hubloc where hubloc_hash = '%s' and hubloc_deleted = 0 order by hubloc_url " ,
dbesc ( $hash )
);
return $ret ;
}
/**
* @ brief Builds a zot notification packet .
*
* Builds a zot notification packet that you can either store in the queue with
* a message array or call zot_zot to immediately zot it to the other side .
*
* @ param array $channel
* sender channel structure
* @ param string $type
* packet type : one of 'ping' , 'pickup' , 'purge' , 'refresh' , 'force_refresh' , 'notify' , 'auth_check'
* @ param array $recipients
* envelope information , array ( 'guid' => string , 'guid_sig' => string ); empty for public posts
* @ param string $remote_key
* optional public site key of target hub used to encrypt entire packet
* NOTE : remote_key and encrypted packets are required for 'auth_check' packets , optional for all others
* @ param string $secret
* random string , required for packets which require verification / callback
* e . g . 'pickup' , 'purge' , 'notify' , 'auth_check' . Packet types 'ping' , 'force_refresh' , and 'refresh' do not require verification
* @ param string $extra
* @ returns string json encoded zot packet
*/
function zot_build_packet ( $channel , $type = 'notify' , $recipients = null , $remote_key = null , $secret = null , $extra = null ) {
$data = array (
'type' => $type ,
'sender' => array (
'guid' => $channel [ 'channel_guid' ],
'guid_sig' => base64url_encode ( rsa_sign ( $channel [ 'channel_guid' ], $channel [ 'channel_prvkey' ])),
'url' => z_root (),
2015-11-15 19:51:39 +01:00
'url_sig' => base64url_encode ( rsa_sign ( z_root (), $channel [ 'channel_prvkey' ])),
'sitekey' => get_config ( 'system' , 'pubkey' )
2015-08-23 22:38:18 +02:00
),
'callback' => '/post' ,
'version' => ZOT_REVISION
);
if ( $recipients ) {
for ( $x = 0 ; $x < count ( $recipients ); $x ++ )
unset ( $recipients [ $x ][ 'hash' ]);
$data [ 'recipients' ] = $recipients ;
}
if ( $secret ) {
$data [ 'secret' ] = $secret ;
$data [ 'secret_sig' ] = base64url_encode ( rsa_sign ( $secret , $channel [ 'channel_prvkey' ]));
}
if ( $extra ) {
foreach ( $extra as $k => $v )
$data [ $k ] = $v ;
}
2016-01-12 02:47:38 +01:00
logger ( 'zot_build_packet: ' . print_r ( $data , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
// Hush-hush ultra top-secret mode
if ( $remote_key ) {
$data = crypto_encapsulate ( json_encode ( $data ), $remote_key );
}
return json_encode ( $data );
}
/**
* @ brief
*
* @ see z_post_url ()
*
* @ param string $url
* @ param array $data
* @ return array see z_post_url () for returned data format
*/
function zot_zot ( $url , $data ) {
return z_post_url ( $url , array ( 'data' => $data ));
}
/**
* @ brief Look up information about channel .
*
* @ param string $webbie
* does not have to be host qualified e . g . 'foo' is treated as 'foo\@thishub'
* @ param array $channel
* ( optional ), if supplied permissions will be enumerated specifically for $channel
* @ param boolean $autofallback
* fallback / failover to http if https connection cannot be established . Default is true .
*
* @ return array see z_post_url () and \ref mod / zfinger . php
*/
function zot_finger ( $webbie , $channel = null , $autofallback = true ) {
if ( strpos ( $webbie , '@' ) === false ) {
$address = $webbie ;
2016-04-17 16:29:18 +02:00
$host = App :: get_hostname ();
2015-08-23 22:38:18 +02:00
} else {
$address = substr ( $webbie , 0 , strpos ( $webbie , '@' ));
$host = substr ( $webbie , strpos ( $webbie , '@' ) + 1 );
}
$xchan_addr = $address . '@' . $host ;
if (( ! $address ) || ( ! $xchan_addr )) {
logger ( 'zot_finger: no address :' . $webbie );
return array ( 'success' => false );
}
2016-01-12 02:47:38 +01:00
logger ( 'using xchan_addr: ' . $xchan_addr , LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
// potential issue here; the xchan_addr points to the primary hub.
// The webbie we were called with may not, so it might not be found
// unless we query for hubloc_addr instead of xchan_addr
$r = q ( " select xchan.*, hubloc.* from xchan
left join hubloc on xchan_hash = hubloc_hash
where xchan_addr = '%s' and hubloc_primary = 1 limit 1 " ,
dbesc ( $xchan_addr )
);
if ( $r ) {
$url = $r [ 0 ][ 'hubloc_url' ];
if ( $r [ 0 ][ 'hubloc_network' ] && $r [ 0 ][ 'hubloc_network' ] !== 'zot' ) {
logger ( 'zot_finger: alternate network: ' . $webbie );
2016-01-12 02:47:38 +01:00
logger ( 'url: ' . $url . ', net: ' . var_export ( $r [ 0 ][ 'hubloc_network' ], true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
return array ( 'success' => false );
}
} else {
$url = 'https://' . $host ;
}
$rhs = '/.well-known/zot-info' ;
$https = (( strpos ( $url , 'https://' ) === 0 ) ? true : false );
logger ( 'zot_finger: ' . $address . ' at ' . $url , LOGGER_DEBUG );
if ( $channel ) {
$postvars = array (
'address' => $address ,
'target' => $channel [ 'channel_guid' ],
'target_sig' => $channel [ 'channel_guid_sig' ],
'key' => $channel [ 'channel_pubkey' ]
);
$result = z_post_url ( $url . $rhs , $postvars );
if (( ! $result [ 'success' ]) && ( $autofallback )) {
if ( $https ) {
logger ( 'zot_finger: https failed. falling back to http' );
$result = z_post_url ( 'http://' . $host . $rhs , $postvars );
}
}
} else {
$rhs .= '?f=&address=' . urlencode ( $address );
$result = z_fetch_url ( $url . $rhs );
if (( ! $result [ 'success' ]) && ( $autofallback )) {
if ( $https ) {
logger ( 'zot_finger: https failed. falling back to http' );
$result = z_fetch_url ( 'http://' . $host . $rhs );
}
}
}
if ( ! $result [ 'success' ])
logger ( 'zot_finger: no results' );
return $result ;
}
/**
* @ brief Refreshes after permission changed or friending , etc .
*
* zot_refresh is typically invoked when somebody has changed permissions of a channel and they are notified
* to fetch new permissions via a finger / discovery operation . This may result in a new connection
* ( abook entry ) being added to a local channel and it may result in auto - permissions being granted .
*
* Friending in zot is accomplished by sending a refresh packet to a specific channel which indicates a
* permission change has been made by the sender which affects the target channel . The hub controlling
* the target channel does targetted discovery ( a zot - finger request requesting permissions for the local
* channel ) . These are decoded here , and if necessary and abook structure ( addressbook ) is created to store
* the permissions assigned to this channel .
*
* Initially these abook structures are created with a 'pending' flag , so that no reverse permissions are
* implied until this is approved by the owner channel . A channel can also auto - populate permissions in
* return and send back a refresh packet of its own . This is used by forum and group communication channels
* so that friending and membership in the channel ' s " club " is automatic .
*
* @ param array $them => xchan structure of sender
* @ param array $channel => local channel structure of target recipient , required for " friending " operations
* @ param array $force default false
*
* @ returns boolean true if successful , else false
*/
function zot_refresh ( $them , $channel = null , $force = false ) {
if ( array_key_exists ( 'xchan_network' , $them ) && ( $them [ 'xchan_network' ] !== 'zot' )) {
logger ( 'zot_refresh: not got zot. ' . $them [ 'xchan_name' ]);
return true ;
}
2016-01-12 02:47:38 +01:00
logger ( 'zot_refresh: them: ' . print_r ( $them , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
if ( $channel )
2016-01-12 02:47:38 +01:00
logger ( 'zot_refresh: channel: ' . print_r ( $channel , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$url = null ;
if ( $them [ 'hubloc_url' ]) {
$url = $them [ 'hubloc_url' ];
} else {
2015-10-24 13:04:14 +02:00
$r = null ;
// if they re-installed the server we could end up with the wrong record - pointing to the old install.
// We'll order by reverse id to try and pick off the newest one first and hopefully end up with the
// correct hubloc. If this doesn't work we may have to re-write this section to try them all.
if ( array_key_exists ( 'xchan_addr' , $them ) && $them [ 'xchan_addr' ]) {
$r = q ( " select hubloc_url, hubloc_primary from hubloc where hubloc_addr = '%s' order by hubloc_id desc " ,
dbesc ( $them [ 'xchan_addr' ])
);
}
if ( ! $r ) {
$r = q ( " select hubloc_url, hubloc_primary from hubloc where hubloc_hash = '%s' order by hubloc_id desc " ,
dbesc ( $them [ 'xchan_hash' ])
);
}
2015-08-23 22:38:18 +02:00
if ( $r ) {
foreach ( $r as $rr ) {
2015-10-24 13:04:14 +02:00
if ( intval ( $rr [ 'hubloc_primary' ])) {
2015-08-23 22:38:18 +02:00
$url = $rr [ 'hubloc_url' ];
break ;
}
}
if ( ! $url )
$url = $r [ 0 ][ 'hubloc_url' ];
}
}
if ( ! $url ) {
logger ( 'zot_refresh: no url' );
return false ;
}
$postvars = array ();
if ( $channel ) {
$postvars [ 'target' ] = $channel [ 'channel_guid' ];
$postvars [ 'target_sig' ] = $channel [ 'channel_guid_sig' ];
$postvars [ 'key' ] = $channel [ 'channel_pubkey' ];
}
if ( array_key_exists ( 'xchan_addr' , $them ) && $them [ 'xchan_addr' ])
$postvars [ 'address' ] = $them [ 'xchan_addr' ];
if ( array_key_exists ( 'xchan_hash' , $them ) && $them [ 'xchan_hash' ])
$postvars [ 'guid_hash' ] = $them [ 'xchan_hash' ];
if ( array_key_exists ( 'xchan_guid' , $them ) && $them [ 'xchan_guid' ]
&& array_key_exists ( 'xchan_guid_sig' , $them ) && $them [ 'xchan_guid_sig' ]) {
$postvars [ 'guid' ] = $them [ 'xchan_guid' ];
$postvars [ 'guid_sig' ] = $them [ 'xchan_guid_sig' ];
}
$rhs = '/.well-known/zot-info' ;
$result = z_post_url ( $url . $rhs , $postvars );
2016-01-12 02:47:38 +01:00
logger ( 'zot_refresh: zot-info: ' . print_r ( $result , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
if ( $result [ 'success' ]) {
$j = json_decode ( $result [ 'body' ], true );
if ( ! (( $j ) && ( $j [ 'success' ]))) {
logger ( 'zot_refresh: result not decodable' );
return false ;
}
$x = import_xchan ( $j , (( $force ) ? UPDATE_FLAGS_FORCED : UPDATE_FLAGS_UPDATED ));
if ( ! $x [ 'success' ])
return false ;
$their_perms = 0 ;
if ( $channel ) {
$global_perms = get_perms ();
if ( $j [ 'permissions' ][ 'data' ]) {
$permissions = crypto_unencapsulate ( array (
'data' => $j [ 'permissions' ][ 'data' ],
'key' => $j [ 'permissions' ][ 'key' ],
'iv' => $j [ 'permissions' ][ 'iv' ]),
$channel [ 'channel_prvkey' ]);
if ( $permissions )
$permissions = json_decode ( $permissions , true );
2016-01-12 02:47:38 +01:00
logger ( 'decrypted permissions: ' . print_r ( $permissions , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
}
else
$permissions = $j [ 'permissions' ];
$connected_set = false ;
if ( $permissions && is_array ( $permissions )) {
foreach ( $permissions as $k => $v ) {
// The connected permission means you are in their address book
if ( $k === 'connected' ) {
$connected_set = intval ( $v );
continue ;
}
if (( $v ) && ( array_key_exists ( $k , $global_perms ))) {
$their_perms = $their_perms | intval ( $global_perms [ $k ][ 1 ]);
}
}
}
if ( array_key_exists ( 'profile' , $j ) && array_key_exists ( 'next_birthday' , $j [ 'profile' ])) {
$next_birthday = datetime_convert ( 'UTC' , 'UTC' , $j [ 'profile' ][ 'next_birthday' ]);
}
else {
$next_birthday = NULL_DATE ;
}
2015-10-24 13:04:14 +02:00
$r = q ( " select * from abook where abook_xchan = '%s' and abook_channel = %d and abook_self = 0 limit 1 " ,
dbesc ( $x [ 'hash' ]),
intval ( $channel [ 'channel_id' ])
);
2015-08-23 22:38:18 +02:00
if ( $r ) {
2015-10-24 13:04:14 +02:00
// connection exists
2015-08-23 22:38:18 +02:00
// if the dob is the same as what we have stored (disregarding the year), keep the one
// we have as we may have updated the year after sending a notification; and resetting
// to the one we just received would cause us to create duplicated events.
if ( substr ( $r [ 0 ][ 'abook_dob' ], 5 ) == substr ( $next_birthday , 5 ))
$next_birthday = $r [ 0 ][ 'abook_dob' ];
$current_abook_connected = ( intval ( $r [ 0 ][ 'abook_unconnected' ]) ? 0 : 1 );
$y = q ( " update abook set abook_their_perms = %d, abook_dob = '%s'
where abook_xchan = '%s' and abook_channel = % d
and abook_self = 0 " ,
intval ( $their_perms ),
dbescdate ( $next_birthday ),
dbesc ( $x [ 'hash' ]),
intval ( $channel [ 'channel_id' ])
);
// if(($connected_set === 0 || $connected_set === 1) && ($connected_set !== $current_abook_unconnected)) {
// if they are in your address book but you aren't in theirs, and/or this does not
// match your current connected state setting, toggle it.
/** @FIXME uncoverted to postgres */
/** @FIXME when this was enabled, all contacts became unconnected. Currently disabled intentionally */
// $y1 = q("update abook set abook_unconnected = 1
// where abook_xchan = '%s' and abook_channel = %d
// and abook_self = 0 limit 1",
// dbesc($x['hash']),
// intval($channel['channel_id'])
// );
// }
if ( ! $y )
logger ( 'abook update failed' );
else {
// if we were just granted read stream permission and didn't have it before, try to pull in some posts
if (( ! ( $r [ 0 ][ 'abook_their_perms' ] & PERMS_R_STREAM )) && ( $their_perms & PERMS_R_STREAM ))
proc_run ( 'php' , 'include/onepoll.php' , $r [ 0 ][ 'abook_id' ]);
}
}
else {
2015-10-24 13:04:14 +02:00
// new connection
2015-08-23 22:38:18 +02:00
$role = get_pconfig ( $channel [ 'channel_id' ], 'system' , 'permissions_role' );
if ( $role ) {
$xx = get_role_perms ( $role );
if ( $xx [ 'perms_auto' ])
$default_perms = $xx [ 'perms_accept' ];
}
if ( ! $default_perms )
$default_perms = intval ( get_pconfig ( $channel [ 'channel_id' ], 'system' , 'autoperms' ));
// Keep original perms to check if we need to notify them
$previous_perms = get_all_perms ( $channel [ 'channel_id' ], $x [ 'hash' ]);
$closeness = get_pconfig ( $channel [ 'channel_id' ], 'system' , 'new_abook_closeness' );
if ( $closeness === false )
$closeness = 80 ;
$y = q ( " insert into abook ( abook_account, abook_channel, abook_closeness, abook_xchan, abook_their_perms, abook_my_perms, abook_created, abook_updated, abook_dob, abook_pending ) values ( %d, %d, %d, '%s', %d, %d, '%s', '%s', '%s', %d ) " ,
intval ( $channel [ 'channel_account_id' ]),
intval ( $channel [ 'channel_id' ]),
intval ( $closeness ),
dbesc ( $x [ 'hash' ]),
intval ( $their_perms ),
intval ( $default_perms ),
dbesc ( datetime_convert ()),
dbesc ( datetime_convert ()),
dbesc ( $next_birthday ),
intval (( $default_perms ) ? 0 : 1 )
);
if ( $y ) {
logger ( " New introduction received for { $channel [ 'channel_name' ] } " );
$new_perms = get_all_perms ( $channel [ 'channel_id' ], $x [ 'hash' ]);
2015-10-24 13:04:14 +02:00
// Send a clone sync packet and a permissions update if permissions have changed
$new_connection = q ( " select * from abook left join xchan on abook_xchan = xchan_hash where abook_xchan = '%s' and abook_channel = %d and abook_self = 0 order by abook_created desc limit 1 " ,
dbesc ( $x [ 'hash' ]),
intval ( $channel [ 'channel_id' ])
2015-08-23 22:38:18 +02:00
);
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
if ( $new_connection ) {
2015-10-24 13:04:14 +02:00
if ( $new_perms != $previous_perms )
proc_run ( 'php' , 'include/notifier.php' , 'permission_create' , $new_connection [ 0 ][ 'abook_id' ]);
2015-08-23 22:38:18 +02:00
require_once ( 'include/enotify.php' );
notification ( array (
'type' => NOTIFY_INTRO ,
'from_xchan' => $x [ 'hash' ],
'to_xchan' => $channel [ 'channel_hash' ],
'link' => z_root () . '/connedit/' . $new_connection [ 0 ][ 'abook_id' ],
));
2015-10-24 13:04:14 +02:00
if ( $their_perms & PERMS_R_STREAM ) {
if (( $channel [ 'channel_w_stream' ] & PERMS_PENDING )
|| ( ! intval ( $new_connection [ 0 ][ 'abook_pending' ])) )
proc_run ( 'php' , 'include/onepoll.php' , $new_connection [ 0 ][ 'abook_id' ]);
}
2015-08-23 22:38:18 +02:00
2015-10-24 13:04:14 +02:00
unset ( $new_connection [ 0 ][ 'abook_id' ]);
unset ( $new_connection [ 0 ][ 'abook_account' ]);
unset ( $new_connection [ 0 ][ 'abook_channel' ]);
2016-03-20 08:06:33 +01:00
$abconfig = load_abconfig ( $channel [ 'channel_hash' ], $new_connection [ 'abook_xchan' ]);
if ( $abconfig )
$new_connection [ 'abconfig' ] = $abconfig ;
2015-10-24 13:04:14 +02:00
build_sync_packet ( $channel [ 'channel_id' ], array ( 'abook' => $new_connection ));
2015-08-23 22:38:18 +02:00
}
}
}
}
return true ;
}
return false ;
}
/**
* @ brief Look up if channel is known and previously verified .
*
* A guid and a url , both signed by the sender , distinguish a known sender at a
* known location .
* This function looks these up to see if the channel is known and therefore
* previously verified . If not , we will need to verify it .
*
* @ param array $arr an associative array which must contain :
* * \e string \b guid => guid of conversant
* * \e string \b guid_sig => guid signed with conversant ' s private key
* * \e string \b url => URL of the origination hub of this communication
* * \e string \b url_sig => URL signed with conversant ' s private key
*
* @ returns array | null null if site is blacklisted or not found , otherwise an
* array with an hubloc record
*/
2015-10-24 13:04:14 +02:00
function zot_gethub ( $arr , $multiple = false ) {
2015-08-23 22:38:18 +02:00
if ( $arr [ 'guid' ] && $arr [ 'guid_sig' ] && $arr [ 'url' ] && $arr [ 'url_sig' ]) {
2015-12-06 02:08:25 +01:00
if ( ! check_siteallowed ( $arr [ 'url' ])) {
logger ( 'blacklisted site: ' . $arr [ 'url' ]);
2015-08-23 22:38:18 +02:00
return null ;
}
2015-10-24 13:04:14 +02:00
$limit = (( $multiple ) ? '' : ' limit 1 ' );
2015-11-15 19:51:39 +01:00
$sitekey = (( array_key_exists ( 'sitekey' , $arr ) && $arr [ 'sitekey' ]) ? " and hubloc_sitekey = ' " . protect_sprintf ( $arr [ 'sitekey' ]) . " ' " : '' );
2015-08-23 22:38:18 +02:00
$r = q ( " select * from hubloc
where hubloc_guid = '%s' and hubloc_guid_sig = '%s'
and hubloc_url = '%s' and hubloc_url_sig = '%s'
2015-11-15 19:51:39 +01:00
$sitekey $limit " ,
2015-08-23 22:38:18 +02:00
dbesc ( $arr [ 'guid' ]),
dbesc ( $arr [ 'guid_sig' ]),
dbesc ( $arr [ 'url' ]),
dbesc ( $arr [ 'url_sig' ])
);
2015-10-24 13:04:14 +02:00
if ( $r ) {
2015-08-23 22:38:18 +02:00
logger ( 'zot_gethub: found' , LOGGER_DEBUG );
2015-10-24 13:04:14 +02:00
return (( $multiple ) ? $r : $r [ 0 ]);
2015-08-23 22:38:18 +02:00
}
}
logger ( 'zot_gethub: not found: ' . print_r ( $arr , true ), LOGGER_DEBUG );
return null ;
}
/**
* @ brief Registers an unknown hub .
*
* A communication has been received which has an unknown ( to us ) sender .
* Perform discovery based on our calculated hash of the sender at the
* origination address . This will fetch the discovery packet of the sender ,
* which contains the public key we need to verify our guid and url signatures .
*
* @ param array $arr an associative array which must contain :
* * \e string \b guid => guid of conversant
* * \e string \b guid_sig => guid signed with conversant ' s private key
* * \e string \b url => URL of the origination hub of this communication
* * \e string \b url_sig => URL signed with conversant ' s private key
*
* @ returns array an associative array with
* * \b success boolean true or false
* * \b message ( optional ) error string only if success is false
*/
function zot_register_hub ( $arr ) {
$result = array ( 'success' => false );
if ( $arr [ 'url' ] && $arr [ 'url_sig' ] && $arr [ 'guid' ] && $arr [ 'guid_sig' ]) {
$guid_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
$url = $arr [ 'url' ] . '/.well-known/zot-info/?f=&guid_hash=' . $guid_hash ;
logger ( 'zot_register_hub: ' . $url , LOGGER_DEBUG );
$x = z_fetch_url ( $url );
2016-01-12 02:47:38 +01:00
logger ( 'zot_register_hub: ' . print_r ( $x , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
if ( $x [ 'success' ]) {
$record = json_decode ( $x [ 'body' ], true );
/*
* We now have a key - only continue registration if our signatures are valid
* AND the guid and guid sig in the returned packet match those provided in
* our current communication .
*/
if (( rsa_verify ( $arr [ 'guid' ], base64url_decode ( $arr [ 'guid_sig' ]), $record [ 'key' ]))
&& ( rsa_verify ( $arr [ 'url' ], base64url_decode ( $arr [ 'url_sig' ]), $record [ 'key' ]))
&& ( $arr [ 'guid' ] === $record [ 'guid' ])
&& ( $arr [ 'guid_sig' ] === $record [ 'guid_sig' ])) {
$c = import_xchan ( $record );
if ( $c [ 'success' ])
$result [ 'success' ] = true ;
}
else {
logger ( 'zot_register_hub: failure to verify returned packet.' );
}
}
}
return $result ;
}
/**
* @ brief Takes an associative array of a fetched discovery packet and updates
* all internal data structures which need to be updated as a result .
*
* @ param array $arr => json_decoded discovery packet
* @ param int $ud_flags
* Determines whether to create a directory update record if any changes occur , default is UPDATE_FLAGS_UPDATED
* $ud_flags = UPDATE_FLAGS_FORCED indicates a forced refresh where we unconditionally create a directory update record
* this typically occurs once a month for each channel as part of a scheduled ping to notify the directory
* that the channel still exists
* @ param array $ud_arr
* If set [ typically by update_directory_entry ()] indicates a specific update table row and more particularly
* contains a particular address ( ud_addr ) which needs to be updated in that table .
*
* @ return associative array
* * \e boolean \b success boolean true or false
* * \e string \b message ( optional ) error string only if success is false
*/
function import_xchan ( $arr , $ud_flags = UPDATE_FLAGS_UPDATED , $ud_arr = null ) {
call_hooks ( 'import_xchan' , $arr );
$ret = array ( 'success' => false );
$dirmode = intval ( get_config ( 'system' , 'directory_mode' ));
$changed = false ;
$what = '' ;
if ( ! ( is_array ( $arr ) && array_key_exists ( 'success' , $arr ) && $arr [ 'success' ])) {
logger ( 'import_xchan: invalid data packet: ' . print_r ( $arr , true ));
$ret [ 'message' ] = t ( 'Invalid data packet' );
return $ret ;
}
if ( ! ( $arr [ 'guid' ] && $arr [ 'guid_sig' ])) {
logger ( 'import_xchan: no identity information provided. ' . print_r ( $arr , true ));
return $ret ;
}
$xchan_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
$arr [ 'hash' ] = $xchan_hash ;
$import_photos = false ;
if ( ! rsa_verify ( $arr [ 'guid' ], base64url_decode ( $arr [ 'guid_sig' ]), $arr [ 'key' ])) {
logger ( 'import_xchan: Unable to verify channel signature for ' . $arr [ 'address' ]);
$ret [ 'message' ] = t ( 'Unable to verify channel signature' );
return $ret ;
}
logger ( 'import_xchan: ' . $xchan_hash , LOGGER_DEBUG );
$r = q ( " select * from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $xchan_hash )
);
if ( ! array_key_exists ( 'connect_url' , $arr ))
$arr [ 'connect_url' ] = '' ;
if ( strpos ( $arr [ 'address' ], '/' ) !== false )
$arr [ 'address' ] = substr ( $arr [ 'address' ], 0 , strpos ( $arr [ 'address' ], '/' ));
if ( $r ) {
if ( $r [ 0 ][ 'xchan_photo_date' ] != $arr [ 'photo_updated' ])
$import_photos = true ;
// if we import an entry from a site that's not ours and either or both of us is off the grid - hide the entry.
/** @TODO: check if we're the same directory realm, which would mean we are allowed to see it */
$dirmode = get_config ( 'system' , 'directory_mode' );
if ((( $arr [ 'site' ][ 'directory_mode' ] === 'standalone' ) || ( $dirmode & DIRECTORY_MODE_STANDALONE )) && ( $arr [ 'site' ][ 'url' ] != z_root ()))
$arr [ 'searchable' ] = false ;
$hidden = ( 1 - intval ( $arr [ 'searchable' ]));
$hidden_changed = $adult_changed = $deleted_changed = $pubforum_changed = 0 ;
if ( intval ( $r [ 0 ][ 'xchan_hidden' ]) != ( 1 - intval ( $arr [ 'searchable' ])))
$hidden_changed = 1 ;
if ( intval ( $r [ 0 ][ 'xchan_selfcensored' ]) != intval ( $arr [ 'adult_content' ]))
$adult_changed = 1 ;
if ( intval ( $r [ 0 ][ 'xchan_deleted' ]) != intval ( $arr [ 'deleted' ]))
$deleted_changed = 1 ;
if ( intval ( $r [ 0 ][ 'xchan_pubforum' ]) != intval ( $arr [ 'public_forum' ]))
$pubforum_changed = 1 ;
if (( $r [ 0 ][ 'xchan_name_date' ] != $arr [ 'name_updated' ])
|| ( $r [ 0 ][ 'xchan_connurl' ] != $arr [ 'connections_url' ])
|| ( $r [ 0 ][ 'xchan_addr' ] != $arr [ 'address' ])
|| ( $r [ 0 ][ 'xchan_follow' ] != $arr [ 'follow_url' ])
|| ( $r [ 0 ][ 'xchan_connpage' ] != $arr [ 'connect_url' ])
|| ( $r [ 0 ][ 'xchan_url' ] != $arr [ 'url' ])
2015-12-06 02:08:25 +01:00
|| $hidden_changed || $adult_changed || $deleted_changed || $pubforum_changed ) {
$rup = q ( " update xchan set xchan_name = '%s', xchan_name_date = '%s', xchan_connurl = '%s', xchan_follow = '%s',
2015-08-23 22:38:18 +02:00
xchan_connpage = '%s' , xchan_hidden = % d , xchan_selfcensored = % d , xchan_deleted = % d , xchan_pubforum = % d ,
xchan_addr = '%s' , xchan_url = '%s' where xchan_hash = '%s' " ,
dbesc (( $arr [ 'name' ]) ? $arr [ 'name' ] : '-' ),
dbesc ( $arr [ 'name_updated' ]),
dbesc ( $arr [ 'connections_url' ]),
dbesc ( $arr [ 'follow_url' ]),
dbesc ( $arr [ 'connect_url' ]),
intval ( 1 - intval ( $arr [ 'searchable' ])),
intval ( $arr [ 'adult_content' ]),
intval ( $arr [ 'deleted' ]),
intval ( $arr [ 'public_forum' ]),
dbesc ( $arr [ 'address' ]),
dbesc ( $arr [ 'url' ]),
dbesc ( $xchan_hash )
);
2016-01-12 02:47:38 +01:00
logger ( 'import_xchan: update: existing: ' . print_r ( $r [ 0 ], true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'import_xchan: update: new: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$what .= 'xchan ' ;
$changed = true ;
}
} else {
$import_photos = true ;
if ((( $arr [ 'site' ][ 'directory_mode' ] === 'standalone' )
|| ( $dirmode & DIRECTORY_MODE_STANDALONE ))
&& ( $arr [ 'site' ][ 'url' ] != z_root ()))
$arr [ 'searchable' ] = false ;
$x = q ( " insert into xchan ( xchan_hash, xchan_guid, xchan_guid_sig, xchan_pubkey, xchan_photo_mimetype,
xchan_photo_l , xchan_addr , xchan_url , xchan_connurl , xchan_follow , xchan_connpage , xchan_name , xchan_network , xchan_photo_date , xchan_name_date , xchan_hidden , xchan_selfcensored , xchan_deleted , xchan_pubforum )
values ( '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , % d , % d , % d , % d ) " ,
dbesc ( $xchan_hash ),
dbesc ( $arr [ 'guid' ]),
dbesc ( $arr [ 'guid_sig' ]),
dbesc ( $arr [ 'key' ]),
dbesc ( $arr [ 'photo_mimetype' ]),
dbesc ( $arr [ 'photo' ]),
dbesc ( $arr [ 'address' ]),
dbesc ( $arr [ 'url' ]),
dbesc ( $arr [ 'connections_url' ]),
dbesc ( $arr [ 'follow_url' ]),
dbesc ( $arr [ 'connect_url' ]),
dbesc (( $arr [ 'name' ]) ? $arr [ 'name' ] : '-' ),
dbesc ( 'zot' ),
dbescdate ( $arr [ 'photo_updated' ]),
dbescdate ( $arr [ 'name_updated' ]),
intval ( 1 - intval ( $arr [ 'searchable' ])),
intval ( $arr [ 'adult_content' ]),
intval ( $arr [ 'deleted' ]),
intval ( $arr [ 'public_forum' ])
);
$what .= 'new_xchan' ;
$changed = true ;
}
if ( $import_photos ) {
require_once ( 'include/photo/photo_driver.php' );
// see if this is a channel clone that's hosted locally - which we treat different from other xchans/connections
$local = q ( " select channel_account_id, channel_id from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $xchan_hash )
);
if ( $local ) {
$ph = z_fetch_url ( $arr [ 'photo' ], true );
if ( $ph [ 'success' ]) {
2015-11-15 19:51:39 +01:00
$hash = import_channel_photo ( $ph [ 'body' ], $arr [ 'photo_mimetype' ], $local [ 0 ][ 'channel_account_id' ], $local [ 0 ][ 'channel_id' ]);
if ( $hash ) {
// unless proven otherwise
$is_default_profile = 1 ;
$profile = q ( " select is_default from profile where aid = %d and uid = %d limit 1 " ,
intval ( $local [ 0 ][ 'channel_account_id' ]),
intval ( $local [ 0 ][ 'channel_id' ])
);
if ( $profile ) {
if ( ! intval ( $profile [ 0 ][ 'is_default' ]))
$is_default_profile = 0 ;
}
// If setting for the default profile, unset the profile photo flag from any other photos I own
if ( $is_default_profile ) {
q ( " UPDATE photo SET photo_usage = %d WHERE photo_usage = %d AND resource_id != '%s' AND aid = %d AND uid = %d " ,
intval ( PHOTO_NORMAL ),
intval ( PHOTO_PROFILE ),
dbesc ( $hash ),
intval ( $local [ 0 ][ 'channel_account_id' ]),
intval ( $local [ 0 ][ 'channel_id' ])
);
}
}
2015-08-23 22:38:18 +02:00
// reset the names in case they got messed up when we had a bug in this function
$photos = array (
z_root () . '/photo/profile/l/' . $local [ 0 ][ 'channel_id' ],
z_root () . '/photo/profile/m/' . $local [ 0 ][ 'channel_id' ],
z_root () . '/photo/profile/s/' . $local [ 0 ][ 'channel_id' ],
$arr [ 'photo_mimetype' ],
false
);
}
} else {
2015-10-24 13:04:14 +02:00
$photos = import_xchan_photo ( $arr [ 'photo' ], $xchan_hash );
2015-08-23 22:38:18 +02:00
}
if ( $photos ) {
if ( $photos [ 4 ]) {
// importing the photo failed somehow. Leave the photo_date alone so we can try again at a later date.
// This often happens when somebody joins the matrix with a bad cert.
$r = q ( " update xchan set xchan_photo_l = '%s', xchan_photo_m = '%s', xchan_photo_s = '%s', xchan_photo_mimetype = '%s'
where xchan_hash = '%s' " ,
dbesc ( $photos [ 0 ]),
dbesc ( $photos [ 1 ]),
dbesc ( $photos [ 2 ]),
dbesc ( $photos [ 3 ]),
dbesc ( $xchan_hash )
);
} else {
$r = q ( " update xchan set xchan_photo_date = '%s', xchan_photo_l = '%s', xchan_photo_m = '%s', xchan_photo_s = '%s', xchan_photo_mimetype = '%s'
where xchan_hash = '%s' " ,
dbescdate ( datetime_convert ( 'UTC' , 'UTC' , $arr [ 'photo_updated' ])),
dbesc ( $photos [ 0 ]),
dbesc ( $photos [ 1 ]),
dbesc ( $photos [ 2 ]),
dbesc ( $photos [ 3 ]),
dbesc ( $xchan_hash )
);
}
$what .= 'photo ' ;
$changed = true ;
}
}
// what we are missing for true hub independence is for any changes in the primary hub to
// get reflected not only in the hublocs, but also to update the URLs and addr in the appropriate xchan
$s = sync_locations ( $arr , $arr );
if ( $s ) {
if ( $s [ 'change_message' ])
$what .= $s [ 'change_message' ];
if ( $s [ 'changed' ])
$changed = $s [ 'changed' ];
if ( $s [ 'message' ])
$ret [ 'message' ] .= $s [ 'message' ];
}
// Which entries in the update table are we interested in updating?
$address = (( $ud_arr && $ud_arr [ 'ud_addr' ]) ? $ud_arr [ 'ud_addr' ] : $arr [ 'address' ]);
// Are we a directory server of some kind?
$other_realm = false ;
$realm = get_directory_realm ();
if ( array_key_exists ( 'site' , $arr )
&& array_key_exists ( 'realm' , $arr [ 'site' ])
&& ( strpos ( $arr [ 'site' ][ 'realm' ], $realm ) === false ))
$other_realm = true ;
if ( $dirmode != DIRECTORY_MODE_NORMAL ) {
// We're some kind of directory server. However we can only add directory information
// if the entry is in the same realm (or is a sub-realm). Sub-realms are denoted by
// including the parent realm in the name. e.g. 'RED_GLOBAL:foo' would allow an entry to
// be in directories for the local realm (foo) and also the RED_GLOBAL realm.
if ( array_key_exists ( 'profile' , $arr ) && is_array ( $arr [ 'profile' ]) && ( ! $other_realm )) {
$profile_changed = import_directory_profile ( $xchan_hash , $arr [ 'profile' ], $address , $ud_flags , 1 );
if ( $profile_changed ) {
$what .= 'profile ' ;
$changed = true ;
}
} else {
logger ( 'import_xchan: profile not available - hiding' );
// they may have made it private
$r = q ( " delete from xprof where xprof_hash = '%s' " ,
dbesc ( $xchan_hash )
);
2015-10-24 13:04:14 +02:00
$r = q ( " delete from xtag where xtag_hash = '%s' and xtag_flags = 0 " ,
2015-08-23 22:38:18 +02:00
dbesc ( $xchan_hash )
);
}
}
if ( array_key_exists ( 'site' , $arr ) && is_array ( $arr [ 'site' ])) {
$profile_changed = import_site ( $arr [ 'site' ], $arr [ 'key' ]);
if ( $profile_changed ) {
$what .= 'site ' ;
$changed = true ;
}
}
if (( $changed ) || ( $ud_flags == UPDATE_FLAGS_FORCED )) {
2016-04-17 16:29:18 +02:00
$guid = random_string () . '@' . App :: get_hostname ();
2015-08-23 22:38:18 +02:00
update_modtime ( $xchan_hash , $guid , $address , $ud_flags );
logger ( 'import_xchan: changed: ' . $what , LOGGER_DEBUG );
}
elseif ( ! $ud_flags ) {
// nothing changed but we still need to update the updates record
q ( " update updates set ud_flags = ( ud_flags | %d ) where ud_addr = '%s' and not (ud_flags & %d)>0 " ,
intval ( UPDATE_FLAGS_UPDATED ),
dbesc ( $address ),
intval ( UPDATE_FLAGS_UPDATED )
);
}
if ( ! x ( $ret , 'message' )) {
$ret [ 'success' ] = true ;
$ret [ 'hash' ] = $xchan_hash ;
}
2016-01-12 02:47:38 +01:00
logger ( 'import_xchan: result: ' . print_r ( $ret , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
return $ret ;
}
/**
* @ brief Called immediately after sending a zot message which is using queue processing .
*
* Updates the queue item according to the response result and logs any information
* returned to aid communications troubleshooting .
*
* @ param string $hub - url of site we just contacted
* @ param array $arr - output of z_post_url ()
* @ param array $outq - The queue structure attached to this request
*/
function zot_process_response ( $hub , $arr , $outq ) {
if ( ! $arr [ 'success' ]) {
logger ( 'zot_process_response: failed: ' . $hub );
return ;
}
$x = json_decode ( $arr [ 'body' ], true );
if ( ! $x ) {
logger ( 'zot_process_response: No json from ' . $hub );
2016-01-12 02:47:38 +01:00
logger ( 'zot_process_response: headers: ' . print_r ( $arr [ 'header' ], true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
}
2015-10-24 13:04:14 +02:00
if ( is_array ( $x ) && array_key_exists ( 'delivery_report' , $x ) && is_array ( $x [ 'delivery_report' ])) {
foreach ( $x [ 'delivery_report' ] as $xx ) {
if ( is_array ( $xx ) && array_key_exists ( 'message_id' , $xx ) && delivery_report_is_storable ( $xx )) {
q ( " insert into dreport ( dreport_mid, dreport_site, dreport_recip, dreport_result, dreport_time, dreport_xchan ) values ( '%s', '%s','%s','%s','%s','%s' ) " ,
dbesc ( $xx [ 'message_id' ]),
dbesc ( $xx [ 'location' ]),
dbesc ( $xx [ 'recipient' ]),
dbesc ( $xx [ 'status' ]),
dbesc ( datetime_convert ( $xx [ 'date' ])),
dbesc ( $xx [ 'sender' ])
);
}
}
}
2016-01-12 02:47:38 +01:00
// we have a more descriptive delivery report, so discard the per hub 'queued' report.
q ( " delete from dreport where dreport_queue = '%s' " ,
2015-10-24 13:04:14 +02:00
dbesc ( $outq [ 'outq_hash' ])
);
2015-08-23 22:38:18 +02:00
// update the timestamp for this site
2015-10-24 13:04:14 +02:00
q ( " update site set site_dead = 0, site_update = '%s' where site_url = '%s' " ,
2015-08-23 22:38:18 +02:00
dbesc ( datetime_convert ()),
dbesc ( dirname ( $hub ))
);
// synchronous message types are handled immediately
// async messages remain in the queue until processed.
2016-01-12 02:47:38 +01:00
if ( intval ( $outq [ 'outq_async' ]))
remove_queue_item ( $outq [ 'outq_hash' ], $outq [ 'outq_channel' ]);
2015-08-23 22:38:18 +02:00
2015-10-24 13:04:14 +02:00
logger ( 'zot_process_response: ' . print_r ( $x , true ), LOGGER_DEBUG );
2015-08-23 22:38:18 +02:00
}
/**
* @ brief
*
* We received a notification packet ( in mod / post . php ) that a message is waiting for us , and we ' ve verified the sender .
* Now send back a pickup message , using our message tracking ID ( $arr [ 'secret' ]), which we will sign with our site private key .
* The entire pickup message is encrypted with the remote site ' s public key .
* If everything checks out on the remote end , we will receive back a packet containing one or more messages ,
* which will be processed and delivered before this function ultimately returns .
*
* @ see zot_import ()
*
* @ param array $arr
* decrypted and json decoded notify packet from remote site
* @ return array from zot_import ()
*/
function zot_fetch ( $arr ) {
2016-01-12 02:47:38 +01:00
logger ( 'zot_fetch: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$url = $arr [ 'sender' ][ 'url' ] . $arr [ 'callback' ];
2015-10-24 13:04:14 +02:00
// set $multiple param on zot_gethub() to return all matching hubs
// This allows us to recover from re-installs when a redundant (but invalid) hubloc for
// this identity is widely dispersed throughout the network.
$ret_hubs = zot_gethub ( $arr [ 'sender' ], true );
if ( ! $ret_hubs ) {
2015-08-23 22:38:18 +02:00
logger ( 'zot_fetch: no hub: ' . print_r ( $arr [ 'sender' ], true ));
return ;
}
2015-10-24 13:04:14 +02:00
foreach ( $ret_hubs as $ret_hub ) {
$data = array (
'type' => 'pickup' ,
'url' => z_root (),
'callback_sig' => base64url_encode ( rsa_sign ( z_root () . '/post' , get_config ( 'system' , 'prvkey' ))),
'callback' => z_root () . '/post' ,
'secret' => $arr [ 'secret' ],
'secret_sig' => base64url_encode ( rsa_sign ( $arr [ 'secret' ], get_config ( 'system' , 'prvkey' )))
);
2015-08-23 22:38:18 +02:00
2015-10-24 13:04:14 +02:00
$datatosend = json_encode ( crypto_encapsulate ( json_encode ( $data ), $ret_hub [ 'hubloc_sitekey' ]));
2015-08-23 22:38:18 +02:00
2015-10-24 13:04:14 +02:00
$fetch = zot_zot ( $url , $datatosend );
$result = zot_import ( $fetch , $arr [ 'sender' ][ 'url' ]);
if ( $result )
return $result ;
}
return ;
2015-08-23 22:38:18 +02:00
}
/**
* @ brief Process incoming array of messages .
*
* Process an incoming array of messages which were obtained via pickup , and
* import , update , delete as directed .
*
* The message types handled here are 'activity' ( e . g . posts ), 'mail' ,
* 'profile' , 'location' and 'channel_sync' .
*
* @ param array $arr
* 'pickup' structure returned from remote site
* @ param string $sender_url
* the url specified by the sender in the initial communication .
* We will verify the sender and url in each returned message structure and
* also verify that all the messages returned match the site url that we are
* currently processing .
*
* @ returns array
* suitable for logging remotely , enumerating the processing results of each message / recipient combination
* * [ 0 ] => \e string $channel_hash
* * [ 1 ] => \e string $delivery_status
* * [ 2 ] => \e string $address
*/
function zot_import ( $arr , $sender_url ) {
$data = json_decode ( $arr [ 'body' ], true );
if ( ! $data ) {
logger ( 'zot_import: empty body' );
return array ();
}
if ( array_key_exists ( 'iv' , $data )) {
$data = json_decode ( crypto_unencapsulate ( $data , get_config ( 'system' , 'prvkey' )), true );
}
2015-10-24 13:04:14 +02:00
if ( ! $data [ 'success' ]) {
if ( $data [ 'message' ])
logger ( 'remote pickup failed: ' . $data [ 'message' ]);
return false ;
}
2015-08-23 22:38:18 +02:00
$incoming = $data [ 'pickup' ];
$return = array ();
if ( is_array ( $incoming )) {
foreach ( $incoming as $i ) {
if ( ! is_array ( $i )) {
logger ( 'incoming is not an array' );
continue ;
}
$result = null ;
if ( array_key_exists ( 'iv' , $i [ 'notify' ])) {
$i [ 'notify' ] = json_decode ( crypto_unencapsulate ( $i [ 'notify' ], get_config ( 'system' , 'prvkey' )), true );
}
2016-01-12 02:47:38 +01:00
logger ( 'zot_import: notify: ' . print_r ( $i [ 'notify' ], true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$hub = zot_gethub ( $i [ 'notify' ][ 'sender' ]);
if (( ! $hub ) || ( $hub [ 'hubloc_url' ] != $sender_url )) {
logger ( 'zot_import: potential forgery: wrong site for sender: ' . $sender_url . ' != ' . print_r ( $i [ 'notify' ], true ));
continue ;
}
$message_request = (( array_key_exists ( 'message_id' , $i [ 'notify' ])) ? true : false );
if ( $message_request )
logger ( 'processing message request' );
$i [ 'notify' ][ 'sender' ][ 'hash' ] = make_xchan_hash ( $i [ 'notify' ][ 'sender' ][ 'guid' ], $i [ 'notify' ][ 'sender' ][ 'guid_sig' ]);
$deliveries = null ;
if ( array_key_exists ( 'message' , $i ) && array_key_exists ( 'type' , $i [ 'message' ]) && $i [ 'message' ][ 'type' ] === 'rating' ) {
// rating messages are processed only by directory servers
2016-01-12 02:47:38 +01:00
logger ( 'Rating received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$result = process_rating_delivery ( $i [ 'notify' ][ 'sender' ], $i [ 'message' ]);
continue ;
}
if ( array_key_exists ( 'recipients' , $i [ 'notify' ]) && count ( $i [ 'notify' ][ 'recipients' ])) {
logger ( 'specific recipients' );
$recip_arr = array ();
foreach ( $i [ 'notify' ][ 'recipients' ] as $recip ) {
if ( is_array ( $recip )) {
$recip_arr [] = make_xchan_hash ( $recip [ 'guid' ], $recip [ 'guid_sig' ]);
}
}
$r = false ;
if ( $recip_arr ) {
stringify_array_elms ( $recip_arr );
$recips = implode ( ',' , $recip_arr );
$r = q ( " select channel_hash as hash from channel where channel_hash in ( " . $recips . " )
and channel_removed = 0 " );
}
if ( ! $r ) {
logger ( 'recips: no recipients on this site' );
continue ;
}
// It's a specifically targetted post. If we were sent a public_scope hint (likely),
// get rid of it so that it doesn't get stored and cause trouble.
if (( $i ) && is_array ( $i ) && array_key_exists ( 'message' , $i ) && is_array ( $i [ 'message' ])
&& $i [ 'message' ][ 'type' ] === 'activity' && array_key_exists ( 'public_scope' , $i [ 'message' ]))
unset ( $i [ 'message' ][ 'public_scope' ]);
$deliveries = $r ;
// We found somebody on this site that's in the recipient list.
}
else {
if (( $i [ 'message' ]) && ( array_key_exists ( 'flags' , $i [ 'message' ])) && ( in_array ( 'private' , $i [ 'message' ][ 'flags' ])) && $i [ 'message' ][ 'type' ] === 'activity' ) {
if ( array_key_exists ( 'public_scope' , $i [ 'message' ]) && $i [ 'message' ][ 'public_scope' ] === 'public' ) {
// This should not happen but until we can stop it...
logger ( 'private message was delivered with no recipients.' );
continue ;
}
}
logger ( 'public post' );
// Public post. look for any site members who are or may be accepting posts from this sender
// and who are allowed to see them based on the sender's permissions
$deliveries = allowed_public_recips ( $i );
if ( $i [ 'message' ] && array_key_exists ( 'type' , $i [ 'message' ]) && $i [ 'message' ][ 'type' ] === 'location' ) {
$sys = get_sys_channel ();
$deliveries = array ( array ( 'hash' => $sys [ 'xchan_hash' ]));
}
// if the scope is anything but 'public' we're going to store it as private regardless
// of the private flag on the post.
if ( $i [ 'message' ] && array_key_exists ( 'public_scope' , $i [ 'message' ])
&& $i [ 'message' ][ 'public_scope' ] !== 'public' ) {
if ( ! array_key_exists ( 'flags' , $i [ 'message' ]))
$i [ 'message' ][ 'flags' ] = array ();
if ( ! in_array ( 'private' , $i [ 'message' ][ 'flags' ]))
$i [ 'message' ][ 'flags' ][] = 'private' ;
}
}
// Go through the hash array and remove duplicates. array_unique() won't do this because the array is more than one level.
$no_dups = array ();
if ( $deliveries ) {
foreach ( $deliveries as $d ) {
2015-12-06 02:08:25 +01:00
if ( ! is_array ( $d )) {
logger ( 'Delivery hash array is not an array: ' . print_r ( $d , true ));
continue ;
}
2015-08-23 22:38:18 +02:00
if ( ! in_array ( $d [ 'hash' ], $no_dups ))
$no_dups [] = $d [ 'hash' ];
}
if ( $no_dups ) {
$deliveries = array ();
foreach ( $no_dups as $n ) {
$deliveries [] = array ( 'hash' => $n );
}
}
}
if ( ! $deliveries ) {
logger ( 'zot_import: no deliveries on this site' );
continue ;
}
if ( $i [ 'message' ]) {
if ( $i [ 'message' ][ 'type' ] === 'activity' ) {
$arr = get_item_elements ( $i [ 'message' ]);
$v = validate_item_elements ( $i [ 'message' ], $arr );
if ( ! $v [ 'success' ]) {
logger ( 'Activity rejected: ' . $v [ 'message' ] . ' ' . print_r ( $i [ 'message' ], true ));
continue ;
}
2016-01-12 02:47:38 +01:00
logger ( 'Activity received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'Activity recipients: ' . print_r ( $deliveries , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$relay = (( array_key_exists ( 'flags' , $i [ 'message' ]) && in_array ( 'relay' , $i [ 'message' ][ 'flags' ])) ? true : false );
$result = process_delivery ( $i [ 'notify' ][ 'sender' ], $arr , $deliveries , $relay , false , $message_request );
}
elseif ( $i [ 'message' ][ 'type' ] === 'mail' ) {
$arr = get_mail_elements ( $i [ 'message' ]);
2016-01-12 02:47:38 +01:00
logger ( 'Mail received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'Mail recipients: ' . print_r ( $deliveries , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$result = process_mail_delivery ( $i [ 'notify' ][ 'sender' ], $arr , $deliveries );
}
elseif ( $i [ 'message' ][ 'type' ] === 'profile' ) {
$arr = get_profile_elements ( $i [ 'message' ]);
2016-01-12 02:47:38 +01:00
logger ( 'Profile received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'Profile recipients: ' . print_r ( $deliveries , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$result = process_profile_delivery ( $i [ 'notify' ][ 'sender' ], $arr , $deliveries );
}
elseif ( $i [ 'message' ][ 'type' ] === 'channel_sync' ) {
// $arr = get_channelsync_elements($i['message']);
$arr = $i [ 'message' ];
2016-01-12 02:47:38 +01:00
logger ( 'Channel sync received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'Channel sync recipients: ' . print_r ( $deliveries , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$result = process_channel_sync_delivery ( $i [ 'notify' ][ 'sender' ], $arr , $deliveries );
}
elseif ( $i [ 'message' ][ 'type' ] === 'location' ) {
$arr = $i [ 'message' ];
2016-01-12 02:47:38 +01:00
logger ( 'Location message received: ' . print_r ( $arr , true ), LOGGER_DATA , LOG_DEBUG );
logger ( 'Location message recipients: ' . print_r ( $deliveries , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
$result = process_location_delivery ( $i [ 'notify' ][ 'sender' ], $arr , $deliveries );
}
}
if ( $result ){
$return = array_merge ( $return , $result );
}
}
}
return $return ;
}
/**
* @ brief
*
* A public message with no listed recipients can be delivered to anybody who
* has PERMS_NETWORK for that type of post , PERMS_AUTHED ( in - network senders are
* by definition authenticated ) or PERMS_SITE and is one the same site ,
* or PERMS_SPECIFIC and the sender is a contact who is granted permissions via
* their connection permissions in the address book .
* Here we take a given message and construct a list of hashes of everybody
* on the site that we should try and deliver to .
* Some of these will be rejected , but this gives us a place to start .
*
* @ param array $msg
* @ return NULL | array
*/
function public_recips ( $msg ) {
require_once ( 'include/identity.php' );
$check_mentions = false ;
$include_sys = false ;
if ( $msg [ 'message' ][ 'type' ] === 'activity' ) {
if ( ! get_config ( 'system' , 'disable_discover_tab' ))
$include_sys = true ;
$col = 'channel_w_stream' ;
$field = PERMS_W_STREAM ;
if ( array_key_exists ( 'flags' , $msg [ 'message' ]) && in_array ( 'thread_parent' , $msg [ 'message' ][ 'flags' ])) {
// check mention recipient permissions on top level posts only
$check_mentions = true ;
}
else {
// This doesn't look like it works so I have to explain what happened. These are my
// notes (below) from when I got this section of code working. You would think that
// we only have to find those with the requisite stream or comment permissions,
// depending on whether this is a top-level post or a comment - but you would be wrong.
// ... so public_recips and allowed_public_recips is working so much better
// than before, but was still not quite right. We seem to be getting all the right
// results for top-level posts now, but comments aren't getting through on channels
// for which we've allowed them to send us their stream, but not comment on our posts.
// The reason is we were seeing if they could comment - and we only need to do that if
// we own the post. If they own the post, we only need to check if they can send us their stream.
// if this is a comment and it wasn't sent by the post owner, check to see who is allowing them to comment.
// We should have one specific recipient and this step shouldn't be needed unless somebody stuffed up
// their software. We may need this step to protect us from bad guys intentionally stuffing up their software.
// If it is sent by the post owner, we don't need to do this. We only need to see who is receiving the
// owner's stream (which was already set above) - as they control the comment permissions, not us.
// Note that by doing this we introduce another bug because some public forums have channel_w_stream
// permissions set to themselves only. We also need in this function to add these public forums to the
// public recipient list based on if they are tagged or not and have tag permissions. This is complicated
// by the fact that this activity doesn't have the public forum tag. It's the parent activity that
// contains the tag. we'll solve that further below.
if ( $msg [ 'notify' ][ 'sender' ][ 'guid_sig' ] != $msg [ 'message' ][ 'owner' ][ 'guid_sig' ]) {
$col = 'channel_w_comment' ;
$field = PERMS_W_COMMENT ;
}
}
}
elseif ( $msg [ 'message' ][ 'type' ] === 'mail' ) {
$col = 'channel_w_mail' ;
$field = PERMS_W_MAIL ;
}
if ( ! $col )
return NULL ;
$col = dbesc ( $col );
// First find those channels who are accepting posts from anybody, or at least
// something greater than just their connections.
if ( $msg [ 'notify' ][ 'sender' ][ 'url' ] === z_root ()) {
$sql = " where (( " . $col . " & " . intval ( PERMS_NETWORK ) . " ) > 0
or ( " . $col . " & " . intval(PERMS_SITE) . " ) > 0
or ( " . $col . " & " . intval(PERMS_PUBLIC) . " ) > 0
or ( " . $col . " & " . intval(PERMS_AUTHED) . " ) > 0 ) " ;
} else {
$sql = " where ( " . $col . " = " . intval ( PERMS_NETWORK ) . "
or " . $col . " = " . intval(PERMS_PUBLIC) . "
or " . $col . " = " . intval(PERMS_AUTHED) . " ) " ;
}
$r = q ( " select channel_hash as hash from channel $sql or channel_hash = '%s'
and channel_removed = 0 " ,
dbesc ( $msg [ 'notify' ][ 'sender' ][ 'hash' ])
);
if ( ! $r )
$r = array ();
// Now we have to get a bit dirty. Find every channel that has the sender in their connections (abook)
// and is allowing this sender at least at a high level.
$x = q ( " select channel_hash as hash from channel left join abook on abook_channel = channel_id
where abook_xchan = '%s' and channel_removed = 0
and (( " . $col . " = " . intval(PERMS_SPECIFIC) . " and ( abook_my_perms & " . intval( $field ) . " ) > 0 )
OR " . $col . " = " . intval(PERMS_PENDING) . "
OR ( " . $col . " = " . intval(PERMS_CONTACTS) . " and abook_pending = 0 )) " ,
dbesc ( $msg [ 'notify' ][ 'sender' ][ 'hash' ])
);
if ( ! $x )
$x = array ();
$r = array_merge ( $r , $x );
//logger('message: ' . print_r($msg['message'],true));
if ( $include_sys && array_key_exists ( 'public_scope' , $msg [ 'message' ]) && $msg [ 'message' ][ 'public_scope' ] === 'public' ) {
$sys = get_sys_channel ();
if ( $sys )
$r [] = array ( 'hash' => $sys [ 'channel_hash' ]);
}
// look for any public mentions on this site
// They will get filtered by tgroup_check() so we don't need to check permissions now
if ( $check_mentions ) {
// It's a top level post. Look at the tags. See if any of them are mentions and are on this hub.
if ( $msg [ 'message' ][ 'tags' ]) {
if ( is_array ( $msg [ 'message' ][ 'tags' ]) && $msg [ 'message' ][ 'tags' ]) {
foreach ( $msg [ 'message' ][ 'tags' ] as $tag ) {
if (( $tag [ 'type' ] === 'mention' ) && ( strpos ( $tag [ 'url' ], z_root ()) !== false )) {
$address = basename ( $tag [ 'url' ]);
if ( $address ) {
$z = q ( " select channel_hash as hash from channel where channel_address = '%s'
and channel_removed = 0 limit 1 " ,
dbesc ( $address )
);
if ( $z )
$r = array_merge ( $r , $z );
}
}
}
}
}
}
else {
// This is a comment. We need to find any parent with ITEM_UPLINK set. But in fact, let's just return
// everybody that stored a copy of the parent. This way we know we're covered. We'll check the
// comment permissions when we deliver them.
if ( $msg [ 'message' ][ 'message_top' ]) {
$z = q ( " select owner_xchan as hash from item where parent_mid = '%s' " ,
dbesc ( $msg [ 'message' ][ 'message_top' ])
);
if ( $z )
$r = array_merge ( $r , $z );
}
}
// There are probably a lot of duplicates in $r at this point. We need to filter those out.
// It's a bit of work since it's a multi-dimensional array
if ( $r ) {
$uniq = array ();
foreach ( $r as $rr ) {
if ( ! in_array ( $rr [ 'hash' ], $uniq ))
$uniq [] = $rr [ 'hash' ];
}
$r = array ();
foreach ( $uniq as $rr ) {
$r [] = array ( 'hash' => $rr );
}
}
2016-01-12 02:47:38 +01:00
logger ( 'public_recips: ' . print_r ( $r , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
return $r ;
}
/**
* @ brief
*
* This is the second part of public_recipes () .
* We ' ll find all the channels willing to accept public posts from us , then
* match them against the sender privacy scope and see who in that list that
* the sender is allowing .
*
* @ see public_recipes ()
* @ param array $msg
* @ return array
*/
function allowed_public_recips ( $msg ) {
2016-01-12 02:47:38 +01:00
logger ( 'allowed_public_recips: ' . print_r ( $msg , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
if ( array_key_exists ( 'public_scope' , $msg [ 'message' ]))
$scope = $msg [ 'message' ][ 'public_scope' ];
// Mail won't have a public scope.
// in fact, it's doubtful mail will ever get here since it almost universally
// has a recipient, but in fact we don't require this, so it's technically
// possible to send mail to anybody that's listening.
$recips = public_recips ( $msg );
if ( ! $recips )
return $recips ;
if ( $msg [ 'message' ][ 'type' ] === 'mail' )
return $recips ;
if ( $scope === 'public' || $scope === 'network: red' || $scope === 'authenticated' )
return $recips ;
if ( strpos ( $scope , 'site:' ) === 0 ) {
2016-04-17 16:29:18 +02:00
if (( $scope === 'site: ' . App :: get_hostname ()) && ( $msg [ 'notify' ][ 'sender' ][ 'url' ] === z_root ()))
2015-08-23 22:38:18 +02:00
return $recips ;
else
return array ();
}
$hash = make_xchan_hash ( $msg [ 'notify' ][ 'sender' ][ 'guid' ], $msg [ 'notify' ][ 'sender' ][ 'guid_sig' ]);
if ( $scope === 'self' ) {
foreach ( $recips as $r )
if ( $r [ 'hash' ] === $hash )
return array ( 'hash' => $hash );
}
// note: we shouldn't ever see $scope === 'specific' in this function, but handle it anyway
if ( $scope === 'contacts' || $scope === 'any connections' || $scope === 'specific' ) {
$condensed_recips = array ();
foreach ( $recips as $rr )
$condensed_recips [] = $rr [ 'hash' ];
$results = array ();
$r = q ( " select channel_hash as hash from channel left join abook on abook_channel = channel_id where abook_xchan = '%s' and channel_removed = 0 " ,
dbesc ( $hash )
);
if ( $r ) {
foreach ( $r as $rr )
if ( in_array ( $rr [ 'hash' ], $condensed_recips ))
$results [] = array ( 'hash' => $rr [ 'hash' ]);
}
return $results ;
}
return array ();
}
/**
* @ brief
*
* @ param array $sender
* @ param array $arr
* @ param array $deliveries
* @ param boolean $relay
* @ param boolean $public ( optional ) default false
* @ param boolean $request ( optional ) default false
* @ return array
*/
function process_delivery ( $sender , $arr , $deliveries , $relay , $public = false , $request = false ) {
$result = array ();
2015-10-24 13:04:14 +02:00
$result [ 'site' ] = z_root ();
2015-08-23 22:38:18 +02:00
// We've validated the sender. Now make sure that the sender is the owner or author
if ( ! $public ) {
if ( $sender [ 'hash' ] != $arr [ 'owner_xchan' ] && $sender [ 'hash' ] != $arr [ 'author_xchan' ]) {
logger ( " process_delivery: sender { $sender [ 'hash' ] } is not owner { $arr [ 'owner_xchan' ] } or author { $arr [ 'author_xchan' ] } - mid { $arr [ 'mid' ] } " );
return ;
}
}
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
foreach ( $deliveries as $d ) {
$local_public = $public ;
2015-10-24 13:04:14 +02:00
2016-03-20 08:06:33 +01:00
$DR = new Zotlabs\Zot\DReport ( z_root (), $sender [ 'hash' ], $d [ 'hash' ], $arr [ 'mid' ]);
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
$r = q ( " select * from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $d [ 'hash' ])
);
if ( ! $r ) {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'recipient not found' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
$channel = $r [ 0 ];
2016-04-17 16:29:18 +02:00
$DR -> addto_recipient ( $channel [ 'channel_name' ] . ' <' . $channel [ 'channel_address' ] . '@' . App :: get_hostname () . '>' );
2015-10-24 13:04:14 +02:00
2016-01-12 02:47:38 +01:00
/* blacklisted channels get a permission denied, no special message to tip them off */
if ( ! check_channelallowed ( $sender [ 'hash' ])) {
$DR -> update ( 'permission denied' );
$result [] = $DR -> get ();
continue ;
}
2015-10-24 13:04:14 +02:00
/**
* @ FIXME : Somehow we need to block normal message delivery from our clones , as the delivered
* message doesn ' t have ACL information in it as the cloned copy does . That copy
* will normally arrive first via sync delivery , but this isn ' t guaranteed .
* There ' s a chance the current delivery could take place before the cloned copy arrives
* hence the item could have the wrong ACL and * could * be used in subsequent deliveries or
* access checks . So far all attempts at identifying this situation precisely
* have caused issues with delivery of relayed comments .
*/
// if(($d['hash'] === $sender['hash']) && ($sender['url'] !== z_root()) && (! $relay)) {
// $DR->update('self delivery ignored');
// $result[] = $DR->get();
// continue;
// }
2015-08-23 22:38:18 +02:00
// allow public postings to the sys channel regardless of permissions, but not
// for comments travelling upstream. Wait and catch them on the way down.
// They may have been blocked by the owner.
if ( intval ( $channel [ 'channel_system' ]) && ( ! $arr [ 'item_private' ]) && ( ! $relay )) {
$local_public = true ;
$r = q ( " select xchan_selfcensored from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $sender [ 'hash' ])
);
// don't import sys channel posts from selfcensored authors
if ( $r && ( intval ( $r [ 0 ][ 'xchan_selfcensored' ]))) {
$local_public = false ;
continue ;
}
}
$tag_delivery = tgroup_check ( $channel [ 'channel_id' ], $arr );
$perm = 'send_stream' ;
if (( $arr [ 'mid' ] !== $arr [ 'parent_mid' ]) && ( $relay ))
$perm = 'post_comments' ;
// This is our own post, possibly coming from a channel clone
if ( $arr [ 'owner_xchan' ] == $d [ 'hash' ]) {
$arr [ 'item_wall' ] = 1 ;
}
else {
$arr [ 'item_wall' ] = 0 ;
}
if (( ! perm_is_allowed ( $channel [ 'channel_id' ], $sender [ 'hash' ], $perm )) && ( ! $tag_delivery ) && ( ! $local_public )) {
logger ( " permission denied for delivery to channel { $channel [ 'channel_id' ] } { $channel [ 'channel_address' ] } " );
2015-10-24 13:04:14 +02:00
$DR -> update ( 'permission denied' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
if ( $arr [ 'mid' ] != $arr [ 'parent_mid' ]) {
// check source route.
// We are only going to accept comments from this sender if the comment has the same route as the top-level-post,
// this is so that permissions mismatches between senders apply to the entire conversation
// As a side effect we will also do a preliminary check that we have the top-level-post, otherwise
// processing it is pointless.
$r = q ( " select route, id from item where mid = '%s' and uid = %d limit 1 " ,
dbesc ( $arr [ 'parent_mid' ]),
intval ( $channel [ 'channel_id' ])
);
if ( ! $r ) {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'comment parent not found' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
// We don't seem to have a copy of this conversation or at least the parent
// - so request a copy of the entire conversation to date.
// Don't do this if it's a relay post as we're the ones who are supposed to
// have the copy and we don't want the request to loop.
// Also don't do this if this comment came from a conversation request packet.
// It's possible that comments are allowed but posting isn't and that could
// cause a conversation fetch loop. We can detect these packets since they are
// delivered via a 'notify' packet type that has a message_id element in the
// initial zot packet (just like the corresponding 'request' packet type which
// makes the request).
// We'll also check the send_stream permission - because if it isn't allowed,
// the top level post is unlikely to be imported and
// this is just an exercise in futility.
if (( ! $relay ) && ( ! $request ) && ( ! $local_public )
&& perm_is_allowed ( $channel [ 'channel_id' ], $sender [ 'hash' ], 'send_stream' )) {
proc_run ( 'php' , 'include/notifier.php' , 'request' , $channel [ 'channel_id' ], $sender [ 'hash' ], $arr [ 'parent_mid' ]);
}
continue ;
}
if ( $relay ) {
// reset the route in case it travelled a great distance upstream
// use our parent's route so when we go back downstream we'll match
// with whatever route our parent has.
$arr [ 'route' ] = $r [ 0 ][ 'route' ];
}
else {
// going downstream check that we have the same upstream provider that
// sent it to us originally. Ignore it if it came from another source
// (with potentially different permissions).
// only compare the last hop since it could have arrived at the last location any number of ways.
// Always accept empty routes and firehose items (route contains 'undefined') .
$existing_route = explode ( ',' , $r [ 0 ][ 'route' ]);
$routes = count ( $existing_route );
if ( $routes ) {
$last_hop = array_pop ( $existing_route );
$last_prior_route = implode ( ',' , $existing_route );
}
else {
$last_hop = '' ;
$last_prior_route = '' ;
}
if ( in_array ( 'undefined' , $existing_route ) || $last_hop == 'undefined' || $sender [ 'hash' ] == 'undefined' )
$last_hop = '' ;
$current_route = (( $arr [ 'route' ]) ? $arr [ 'route' ] . ',' : '' ) . $sender [ 'hash' ];
if ( $last_hop && $last_hop != $sender [ 'hash' ]) {
logger ( 'comment route mismatch: parent route = ' . $r [ 0 ][ 'route' ] . ' expected = ' . $current_route , LOGGER_DEBUG );
logger ( 'comment route mismatch: parent msg = ' . $r [ 0 ][ 'id' ], LOGGER_DEBUG );
2015-10-24 13:04:14 +02:00
$DR -> update ( 'comment route mismatch' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
// we'll add sender['hash'] onto this when we deliver it. $last_prior_route now has the previously stored route
// *except* for the sender['hash'] which would've been the last hop before it got to us.
$arr [ 'route' ] = $last_prior_route ;
}
}
2015-10-24 13:04:14 +02:00
$ab = q ( " select * from abook where abook_channel = %d and abook_xchan = '%s' " ,
intval ( $channel [ 'channel_id' ]),
dbesc ( $arr [ 'owner_xchan' ])
2015-08-23 22:38:18 +02:00
);
$abook = (( $ab ) ? $ab [ 0 ] : null );
if ( intval ( $arr [ 'item_deleted' ])) {
// remove_community_tag is a no-op if this isn't a community tag activity
remove_community_tag ( $sender , $arr , $channel [ 'channel_id' ]);
// set these just in case we need to store a fresh copy of the deleted post.
// This could happen if the delete got here before the original post did.
$arr [ 'aid' ] = $channel [ 'channel_account_id' ];
$arr [ 'uid' ] = $channel [ 'channel_id' ];
$item_id = delete_imported_item ( $sender , $arr , $channel [ 'channel_id' ], $relay );
2015-10-24 13:04:14 +02:00
$DR -> update (( $item_id ) ? 'deleted' : 'delete_failed' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
if ( $relay && $item_id ) {
logger ( 'process_delivery: invoking relay' );
proc_run ( 'php' , 'include/notifier.php' , 'relay' , intval ( $item_id ));
2015-10-24 13:04:14 +02:00
$DR -> update ( 'relayed' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
continue ;
}
$r = q ( " select * from item where mid = '%s' and uid = %d limit 1 " ,
dbesc ( $arr [ 'mid' ]),
intval ( $channel [ 'channel_id' ])
);
if ( $r ) {
// We already have this post.
$item_id = $r [ 0 ][ 'id' ];
if ( intval ( $r [ 0 ][ 'item_deleted' ])) {
// It was deleted locally.
2015-10-24 13:04:14 +02:00
$DR -> update ( 'update ignored' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
// Maybe it has been edited?
elseif ( $arr [ 'edited' ] > $r [ 0 ][ 'edited' ]) {
$arr [ 'id' ] = $r [ 0 ][ 'id' ];
$arr [ 'uid' ] = $channel [ 'channel_id' ];
if (( $arr [ 'mid' ] == $arr [ 'parent_mid' ]) && ( ! post_is_importable ( $arr , $abook ))) {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'update ignored' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
else {
update_imported_item ( $sender , $arr , $r [ 0 ], $channel [ 'channel_id' ]);
2015-10-24 13:04:14 +02:00
$DR -> update ( 'updated' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
if ( ! $relay )
add_source_route ( $item_id , $sender [ 'hash' ]);
}
}
else {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'update ignored' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
// We need this line to ensure wall-to-wall comments are relayed (by falling through to the relay bit),
// and at the same time not relay any other relayable posts more than once, because to do so is very wasteful.
if ( ! intval ( $r [ 0 ][ 'item_origin' ]))
continue ;
}
}
else {
$arr [ 'aid' ] = $channel [ 'channel_account_id' ];
$arr [ 'uid' ] = $channel [ 'channel_id' ];
// if it's a sourced post, call the post_local hooks as if it were
// posted locally so that crosspost connectors will be triggered.
if ( check_item_source ( $arr [ 'uid' ], $arr ))
call_hooks ( 'post_local' , $arr );
$item_id = 0 ;
if (( $arr [ 'mid' ] == $arr [ 'parent_mid' ]) && ( ! post_is_importable ( $arr , $abook ))) {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'post ignored' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
else {
$item_result = item_store ( $arr );
if ( $item_result [ 'success' ]) {
$item_id = $item_result [ 'item_id' ];
$parr = array ( 'item_id' => $item_id , 'item' => $arr , 'sender' => $sender , 'channel' => $channel );
call_hooks ( 'activity_received' , $parr );
// don't add a source route if it's a relay or later recipients will get a route mismatch
if ( ! $relay )
add_source_route ( $item_id , $sender [ 'hash' ]);
}
2015-10-24 13:04:14 +02:00
$DR -> update (( $item_id ) ? 'posted' : 'storage failed: ' . $item_result [ 'message' ]);
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
}
if ( $relay && $item_id ) {
logger ( 'process_delivery: invoking relay' );
proc_run ( 'php' , 'include/notifier.php' , 'relay' , intval ( $item_id ));
2015-10-24 13:04:14 +02:00
$DR -> addto_update ( 'relayed' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
}
if ( ! $deliveries )
$result [] = array ( '' , 'no recipients' , '' , $arr [ 'mid' ]);
logger ( 'process_delivery: local results: ' . print_r ( $result , true ), LOGGER_DEBUG );
return $result ;
}
/**
* @ brief
*
* @ param array $sender an associative array with
* * \e string \b hash a xchan_hash
* @ param array $arr an associative array
* * \e int \b verb
* * \e int \b obj_type
* * \e int \b mid
* @ param int $uid
*/
function remove_community_tag ( $sender , $arr , $uid ) {
if ( ! ( activity_match ( $arr [ 'verb' ], ACTIVITY_TAG ) && ( $arr [ 'obj_type' ] == ACTIVITY_OBJ_TAGTERM )))
return ;
logger ( 'remove_community_tag: invoked' );
if ( ! get_pconfig ( $uid , 'system' , 'blocktags' )) {
logger ( 'remove_community tag: permission denied.' );
return ;
}
$r = q ( " select * from item where mid = '%s' and uid = %d limit 1 " ,
dbesc ( $arr [ 'mid' ]),
intval ( $uid )
);
if ( ! $r ) {
logger ( 'remove_community_tag: no item' );
return ;
}
if (( $sender [ 'hash' ] != $r [ 0 ][ 'owner_xchan' ]) && ( $sender [ 'hash' ] != $r [ 0 ][ 'author_xchan' ])) {
logger ( 'remove_community_tag: sender not authorised.' );
return ;
}
$i = $r [ 0 ];
if ( $i [ 'target' ])
$i [ 'target' ] = json_decode_plus ( $i [ 'target' ]);
if ( $i [ 'object' ])
$i [ 'object' ] = json_decode_plus ( $i [ 'object' ]);
if ( ! ( $i [ 'target' ] && $i [ 'object' ])) {
logger ( 'remove_community_tag: no target/object' );
return ;
}
$message_id = $i [ 'target' ][ 'id' ];
$r = q ( " select id from item where mid = '%s' and uid = %d limit 1 " ,
dbesc ( $message_id ),
intval ( $uid )
);
if ( ! $r ) {
logger ( 'remove_community_tag: no parent message' );
return ;
}
2015-12-06 02:08:25 +01:00
q ( " delete from term where uid = %d and oid = %d and otype = %d and type in ( %d, %d ) and term = '%s' and url = '%s' " ,
2015-08-23 22:38:18 +02:00
intval ( $uid ),
intval ( $r [ 0 ][ 'id' ]),
intval ( TERM_OBJ_POST ),
intval ( TERM_HASHTAG ),
2015-12-06 02:08:25 +01:00
intval ( TERM_COMMUNITYTAG ),
2015-08-23 22:38:18 +02:00
dbesc ( $i [ 'object' ][ 'title' ]),
dbesc ( get_rel_link ( $i [ 'object' ][ 'link' ], 'alternate' ))
);
}
/**
* @ brief Just calls item_store_update () and logs result .
*
* @ see item_store_update ()
* @ param array $sender ( unused )
* @ param array $item
* @ param int $uid ( unused )
*/
function update_imported_item ( $sender , $item , $orig , $uid ) {
$x = item_store_update ( $item );
// If we're updating an event that we've saved locally, we store the item info first
// because event_addtocal will parse the body to get the 'new' event details
if ( $orig [ 'resource_type' ] === 'event' ) {
$res = event_addtocal ( $orig [ 'id' ], $uid );
if ( ! $res )
logger ( 'update event: failed' );
}
if ( ! $x [ 'item_id' ])
logger ( 'update_imported_item: failed: ' . $x [ 'message' ]);
else
logger ( 'update_imported_item' );
}
/**
* @ brief Deletes an imported item .
*
* @ param array $sender
* * \e string \b hash a xchan_hash
* @ param array $item
* @ param int $uid
* @ param boolean $relay
* @ return boolean | int post_id
*/
function delete_imported_item ( $sender , $item , $uid , $relay ) {
logger ( 'delete_imported_item invoked' , LOGGER_DEBUG );
$ownership_valid = false ;
$item_found = false ;
$post_id = 0 ;
2015-10-24 13:04:14 +02:00
$r = q ( " select id, author_xchan, owner_xchan, source_xchan, item_deleted from item where ( author_xchan = '%s' or owner_xchan = '%s' or source_xchan = '%s' )
2015-08-23 22:38:18 +02:00
and mid = '%s' and uid = % d limit 1 " ,
dbesc ( $sender [ 'hash' ]),
dbesc ( $sender [ 'hash' ]),
dbesc ( $sender [ 'hash' ]),
dbesc ( $item [ 'mid' ]),
intval ( $uid )
);
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
if ( $r ) {
if ( $r [ 0 ][ 'author_xchan' ] === $sender [ 'hash' ] || $r [ 0 ][ 'owner_xchan' ] === $sender [ 'hash' ] || $r [ 0 ][ 'source_xchan' ] === $sender [ 'hash' ])
$ownership_valid = true ;
$post_id = $r [ 0 ][ 'id' ];
$item_found = true ;
} else {
// perhaps the item is still in transit and the delete notification got here before the actual item did. Store it with the deleted flag set.
// item_store() won't try to deliver any notifications or start delivery chains if this flag is set.
// This means we won't end up with potentially even more delivery threads trying to push this delete notification.
// But this will ensure that if the (undeleted) original post comes in at a later date, we'll reject it because it will have an older timestamp.
logger ( 'delete received for non-existent item - storing item data.' );
/** @BUG $arr is undefined here, so this is dead code */
if ( $arr [ 'author_xchan' ] === $sender [ 'hash' ] || $arr [ 'owner_xchan' ] === $sender [ 'hash' ] || $arr [ 'source_xchan' ] === $sender [ 'hash' ]) {
$ownership_valid = true ;
$item_result = item_store ( $arr );
$post_id = $item_result [ 'item_id' ];
}
}
if ( $ownership_valid === false ) {
logger ( 'delete_imported_item: failed: ownership issue' );
return false ;
}
require_once ( 'include/items.php' );
if ( $item_found ) {
if ( intval ( $r [ 0 ][ 'item_deleted' ])) {
logger ( 'delete_imported_item: item was already deleted' );
if ( ! $relay )
return false ;
// This is a bit hackish, but may have to suffice until the notification/delivery loop is optimised
// a bit further. We're going to strip the ITEM_ORIGIN on this item if it's a comment, because
// it was already deleted, and we're already relaying, and this ensures that no other process or
// code path downstream can relay it again (causing a loop). Since it's already gone it's not coming
// back, and we aren't going to (or shouldn't at any rate) delete it again in the future - so losing
// this information from the metadata should have no other discernible impact.
if (( $r [ 0 ][ 'id' ] != $r [ 0 ][ 'parent' ]) && intval ( $r [ 0 ][ 'item_origin' ])) {
q ( " update item set item_origin = 0 where id = %d and uid = %d " ,
intval ( $r [ 0 ][ 'id' ]),
intval ( $r [ 0 ][ 'uid' ])
);
}
}
require_once ( 'include/items.php' );
// Use phased deletion to set the deleted flag, call both tag_deliver and the notifier to notify downstream channels
// and then clean up after ourselves with a cron job after several days to do the delete_item_lowlevel() (DROPITEM_PHASE2).
drop_item ( $post_id , false , DROPITEM_PHASE1 );
tag_deliver ( $uid , $post_id );
}
return $post_id ;
}
function process_mail_delivery ( $sender , $arr , $deliveries ) {
$result = array ();
if ( $sender [ 'hash' ] != $arr [ 'from_xchan' ]) {
logger ( 'process_mail_delivery: sender is not mail author' );
return ;
}
foreach ( $deliveries as $d ) {
2015-10-24 13:04:14 +02:00
2016-03-20 08:06:33 +01:00
$DR = new Zotlabs\Zot\DReport ( z_root (), $sender [ 'hash' ], $d [ 'hash' ], $arr [ 'mid' ]);
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
$r = q ( " select * from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $d [ 'hash' ])
);
if ( ! $r ) {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'recipient not found' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
$channel = $r [ 0 ];
2016-04-17 16:29:18 +02:00
$DR -> addto_recipient ( $channel [ 'channel_name' ] . ' <' . $channel [ 'channel_address' ] . '@' . App :: get_hostname () . '>' );
2015-08-23 22:38:18 +02:00
2016-01-12 02:47:38 +01:00
/* blacklisted channels get a permission denied, no special message to tip them off */
if ( ! check_channelallowed ( $sender [ 'hash' ])) {
$DR -> update ( 'permission denied' );
$result [] = $DR -> get ();
continue ;
}
2015-08-23 22:38:18 +02:00
if ( ! perm_is_allowed ( $channel [ 'channel_id' ], $sender [ 'hash' ], 'post_mail' )) {
logger ( " permission denied for mail delivery { $channel [ 'channel_id' ] } " );
2015-10-24 13:04:14 +02:00
$DR -> update ( 'permission denied' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
continue ;
}
$r = q ( " select id from mail where mid = '%s' and channel_id = %d limit 1 " ,
dbesc ( $arr [ 'mid' ]),
intval ( $channel [ 'channel_id' ])
);
if ( $r ) {
if ( intval ( $arr [ 'mail_recalled' ])) {
$x = q ( " delete from mail where id = %d and channel_id = %d " ,
intval ( $r [ 0 ][ 'id' ]),
intval ( $channel [ 'channel_id' ])
);
2015-10-24 13:04:14 +02:00
$DR -> update ( 'mail recalled' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
logger ( 'mail_recalled' );
}
else {
2015-10-24 13:04:14 +02:00
$DR -> update ( 'duplicate mail received' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
logger ( 'duplicate mail received' );
}
continue ;
}
else {
$arr [ 'account_id' ] = $channel [ 'channel_account_id' ];
$arr [ 'channel_id' ] = $channel [ 'channel_id' ];
$item_id = mail_store ( $arr );
2015-10-24 13:04:14 +02:00
$DR -> update ( 'mail delivered' );
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
}
return $result ;
}
/**
* @ brief Processes delivery of rating .
*
* @ param array $sender
* * \e string \b hash a xchan_hash
* @ param array $arr
*/
function process_rating_delivery ( $sender , $arr ) {
logger ( 'process_rating_delivery: ' . print_r ( $arr , true ));
if ( ! $arr [ 'target' ])
return ;
$z = q ( " select xchan_pubkey from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $sender [ 'hash' ])
);
if (( ! $z ) || ( ! rsa_verify ( $arr [ 'target' ] . '.' . $arr [ 'rating' ] . '.' . $arr [ 'rating_text' ], base64url_decode ( $arr [ 'signature' ]), $z [ 0 ][ 'xchan_pubkey' ]))) {
logger ( 'failed to verify rating' );
return ;
}
$r = q ( " select * from xlink where xlink_xchan = '%s' and xlink_link = '%s' and xlink_static = 1 limit 1 " ,
dbesc ( $sender [ 'hash' ]),
dbesc ( $arr [ 'target' ])
);
if ( $r ) {
if ( $r [ 0 ][ 'xlink_updated' ] >= $arr [ 'edited' ]) {
logger ( 'rating message duplicate' );
return ;
}
$x = q ( " update xlink set xlink_rating = %d, xlink_rating_text = '%s', xlink_sig = '%s', xlink_updated = '%s' where xlink_id = %d " ,
intval ( $arr [ 'rating' ]),
dbesc ( $arr [ 'rating_text' ]),
dbesc ( $arr [ 'signature' ]),
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'xlink_id' ])
);
logger ( 'rating updated' );
}
else {
$x = q ( " insert into xlink ( xlink_xchan, xlink_link, xlink_rating, xlink_rating_text, xlink_sig, xlink_updated, xlink_static )
values ( '%s' , '%s' , % d , '%s' , '%s' , '%s' , 1 ) " ,
dbesc ( $sender [ 'hash' ]),
dbesc ( $arr [ 'target' ]),
intval ( $arr [ 'rating' ]),
dbesc ( $arr [ 'rating_text' ]),
dbesc ( $arr [ 'signature' ]),
dbesc ( datetime_convert ())
);
logger ( 'rating created' );
}
}
/**
* @ brief Processes delivery of profile .
*
* @ see import_directory_profile ()
* @ param array $sender an associative array
* * \e string \b hash a xchan_hash
* @ param array $arr
* @ param array $deliveries ( unused )
*/
function process_profile_delivery ( $sender , $arr , $deliveries ) {
logger ( 'process_profile_delivery' , LOGGER_DEBUG );
$r = q ( " select xchan_addr from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $sender [ 'hash' ])
);
if ( $r )
import_directory_profile ( $sender [ 'hash' ], $arr , $r [ 0 ][ 'xchan_addr' ], UPDATE_FLAGS_UPDATED , 0 );
}
function process_location_delivery ( $sender , $arr , $deliveries ) {
// deliveries is irrelevant
logger ( 'process_location_delivery' , LOGGER_DEBUG );
$r = q ( " select xchan_pubkey from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $sender [ 'hash' ])
);
if ( $r )
$sender [ 'key' ] = $r [ 0 ][ 'xchan_pubkey' ];
if ( array_key_exists ( 'locations' , $arr ) && $arr [ 'locations' ]) {
$x = sync_locations ( $sender , $arr , true );
logger ( 'process_location_delivery: results: ' . print_r ( $x , true ), LOGGER_DEBUG );
if ( $x [ 'changed' ]) {
2016-04-17 16:29:18 +02:00
$guid = random_string () . '@' . App :: get_hostname ();
2015-08-23 22:38:18 +02:00
update_modtime ( $sender [ 'hash' ], $sender [ 'guid' ], $arr [ 'locations' ][ 0 ][ 'address' ], UPDATE_FLAGS_UPDATED );
}
}
}
2016-03-20 08:06:33 +01:00
/**
* @ brief checks for a moved UNO channel and sets the channel_moved flag
*
* Currently the effect of this flag is to turn the channel into 'read-only' mode .
* New content will not be processed ( there was still an issue with blocking the
* ability to post comments as of 10 - Mar - 2016 ) .
* We do not physically remove the channel at this time . The hub admin may choose
* to do so , but is encouraged to allow a grace period of several days in case there
* are any issues migrating content . This packet will generally be received by the
* original site when the basic channel import has been processed .
*
* This will only be executed on the UNO system which is the old location
* if a new location is reported and there is only one location record .
* The rest of the hubloc syncronisation will be handled within
* sync_locations
*/
function check_location_move ( $sender_hash , $locations ) {
if ( ! $locations )
return ;
if ( ! UNO )
return ;
if ( count ( $locations ) != 1 )
return ;
$loc = $locations [ 0 ];
$r = q ( " select * from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $sender_hash )
);
if ( ! $r )
return ;
if ( $loc [ 'url' ] !== z_root ()) {
$x = q ( " update channel set channel_moved = '%s' where channel_hash = '%s' limit 1 " ,
dbesc ( $loc [ 'url' ]),
dbesc ( $sender_hash )
);
2016-04-17 16:29:18 +02:00
// federation plugins may wish to notify connections
// of the move on singleton networks
$arr = array ( 'channel' => $r [ 0 ], 'locations' => $locations );
call_hooks ( 'location_move' , $arr );
2016-03-20 08:06:33 +01:00
}
}
2015-08-23 22:38:18 +02:00
/**
* @ brief Synchronises locations .
*
* @ param array $sender
* @ param array $arr
* @ param boolean $absolute ( optional ) default false
* @ return array
*/
function sync_locations ( $sender , $arr , $absolute = false ) {
$ret = array ();
if ( $arr [ 'locations' ]) {
2016-03-20 08:06:33 +01:00
if ( $absolute )
check_location_move ( $sender [ 'hash' ], $arr [ 'locations' ]);
2015-08-23 22:38:18 +02:00
$xisting = q ( " select hubloc_id, hubloc_url, hubloc_sitekey from hubloc where hubloc_hash = '%s' " ,
dbesc ( $sender [ 'hash' ])
);
// See if a primary is specified
$has_primary = false ;
foreach ( $arr [ 'locations' ] as $location ) {
if ( $location [ 'primary' ]) {
$has_primary = true ;
break ;
}
}
// Ensure that they have one primary hub
if ( ! $has_primary )
$arr [ 'locations' ][ 0 ][ 'primary' ] = true ;
foreach ( $arr [ 'locations' ] as $location ) {
if ( ! rsa_verify ( $location [ 'url' ], base64url_decode ( $location [ 'url_sig' ]), $sender [ 'key' ])) {
logger ( 'sync_locations: Unable to verify site signature for ' . $location [ 'url' ]);
$ret [ 'message' ] .= sprintf ( t ( 'Unable to verify site signature for %s' ), $location [ 'url' ]) . EOL ;
continue ;
}
for ( $x = 0 ; $x < count ( $xisting ); $x ++ ) {
if (( $xisting [ $x ][ 'hubloc_url' ] === $location [ 'url' ])
&& ( $xisting [ $x ][ 'hubloc_sitekey' ] === $location [ 'sitekey' ])) {
$xisting [ $x ][ 'updated' ] = true ;
}
}
if ( ! $location [ 'sitekey' ]) {
logger ( 'sync_locations: empty hubloc sitekey. ' . print_r ( $location , true ));
continue ;
}
// Catch some malformed entries from the past which still exist
if ( strpos ( $location [ 'address' ], '/' ) !== false )
$location [ 'address' ] = substr ( $location [ 'address' ], 0 , strpos ( $location [ 'address' ], '/' ));
// match as many fields as possible in case anything at all changed.
$r = q ( " select * from hubloc where hubloc_hash = '%s' and hubloc_guid = '%s' and hubloc_guid_sig = '%s' and hubloc_url = '%s' and hubloc_url_sig = '%s' and hubloc_host = '%s' and hubloc_addr = '%s' and hubloc_callback = '%s' and hubloc_sitekey = '%s' " ,
dbesc ( $sender [ 'hash' ]),
dbesc ( $sender [ 'guid' ]),
dbesc ( $sender [ 'guid_sig' ]),
dbesc ( $location [ 'url' ]),
dbesc ( $location [ 'url_sig' ]),
dbesc ( $location [ 'host' ]),
dbesc ( $location [ 'address' ]),
dbesc ( $location [ 'callback' ]),
dbesc ( $location [ 'sitekey' ])
);
if ( $r ) {
logger ( 'sync_locations: hub exists: ' . $location [ 'url' ], LOGGER_DEBUG );
// update connection timestamp if this is the site we're talking to
// This only happens when called from import_xchan
$current_site = false ;
if ( array_key_exists ( 'site' , $arr ) && $location [ 'url' ] == $arr [ 'site' ][ 'url' ]) {
q ( " update hubloc set hubloc_connected = '%s', hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'hubloc_id' ])
);
$current_site = true ;
}
if ( $current_site && intval ( $r [ 0 ][ 'hubloc_error' ])) {
q ( " update hubloc set hubloc_error = 0 where hubloc_id = %d " ,
intval ( $r [ 0 ][ 'hubloc_id' ])
);
if ( intval ( $r [ 0 ][ 'hubloc_orphancheck' ])) {
q ( " update hubloc set hubloc_orphancheck = 0 where hubloc_id = %d " ,
intval ( $r [ 0 ][ 'hubloc_id' ])
);
}
q ( " update xchan set xchan_orphan = 0 where xchan_orphan = 1 and xchan_hash = '%s' " ,
dbesc ( $sender [ 'hash' ])
);
}
// Remove pure duplicates
if ( count ( $r ) > 1 ) {
for ( $h = 1 ; $h < count ( $r ); $h ++ ) {
q ( " delete from hubloc where hubloc_id = %d " ,
intval ( $r [ $h ][ 'hubloc_id' ])
);
$what .= 'duplicate_hubloc_removed ' ;
$changed = true ;
}
}
if ( intval ( $r [ 0 ][ 'hubloc_primary' ]) && ( ! $location [ 'primary' ])) {
$m = q ( " update hubloc set hubloc_primary = 0, hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'hubloc_id' ])
);
2015-10-24 13:04:14 +02:00
$r [ 0 ][ 'hubloc_primary' ] = intval ( $location [ 'primary' ]);
2015-08-23 22:38:18 +02:00
hubloc_change_primary ( $r [ 0 ]);
$what .= 'primary_hub ' ;
$changed = true ;
}
elseif (( ! intval ( $r [ 0 ][ 'hubloc_primary' ])) && ( $location [ 'primary' ])) {
$m = q ( " update hubloc set hubloc_primary = 1, hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'hubloc_id' ])
);
// make sure hubloc_change_primary() has current data
$r [ 0 ][ 'hubloc_primary' ] = intval ( $location [ 'primary' ]);
hubloc_change_primary ( $r [ 0 ]);
$what .= 'primary_hub ' ;
$changed = true ;
}
elseif ( $absolute ) {
// Absolute sync - make sure the current primary is correctly reflected in the xchan
$pr = hubloc_change_primary ( $r [ 0 ]);
if ( $pr ) {
2015-10-24 13:04:14 +02:00
$what .= 'xchan_primary ' ;
2015-08-23 22:38:18 +02:00
$changed = true ;
}
}
2015-11-15 19:51:39 +01:00
if ( intval ( $r [ 0 ][ 'hubloc_deleted' ]) && ( ! intval ( $location [ 'deleted' ]))) {
2015-08-23 22:38:18 +02:00
$n = q ( " update hubloc set hubloc_deleted = 0, hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'hubloc_id' ])
);
2015-11-15 19:51:39 +01:00
$what .= 'undelete_hub ' ;
2015-08-23 22:38:18 +02:00
$changed = true ;
}
2015-11-15 19:51:39 +01:00
elseif (( ! intval ( $r [ 0 ][ 'hubloc_deleted' ])) && ( intval ( $location [ 'deleted' ]))) {
logger ( 'deleting hubloc: ' . $r [ 0 ][ 'hubloc_addr' ]);
2015-08-23 22:38:18 +02:00
$n = q ( " update hubloc set hubloc_deleted = 1, hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
intval ( $r [ 0 ][ 'hubloc_id' ])
);
$what .= 'delete_hub ' ;
$changed = true ;
}
continue ;
}
// Existing hubs are dealt with. Now let's process any new ones.
// New hub claiming to be primary. Make it so by removing any existing primaries.
if ( intval ( $location [ 'primary' ])) {
$r = q ( " update hubloc set hubloc_primary = 0, hubloc_updated = '%s' where hubloc_hash = '%s' and hubloc_primary = 1 " ,
dbesc ( datetime_convert ()),
dbesc ( $sender [ 'hash' ])
);
}
logger ( 'sync_locations: new hub: ' . $location [ 'url' ]);
$r = q ( " insert into hubloc ( hubloc_guid, hubloc_guid_sig, hubloc_hash, hubloc_addr, hubloc_network, hubloc_primary, hubloc_url, hubloc_url_sig, hubloc_host, hubloc_callback, hubloc_sitekey, hubloc_updated, hubloc_connected)
values ( '%s' , '%s' , '%s' , '%s' , '%s' , % d , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' ) " ,
dbesc ( $sender [ 'guid' ]),
dbesc ( $sender [ 'guid_sig' ]),
dbesc ( $sender [ 'hash' ]),
dbesc ( $location [ 'address' ]),
dbesc ( 'zot' ),
intval ( $location [ 'primary' ]),
dbesc ( $location [ 'url' ]),
dbesc ( $location [ 'url_sig' ]),
dbesc ( $location [ 'host' ]),
dbesc ( $location [ 'callback' ]),
dbesc ( $location [ 'sitekey' ]),
dbesc ( datetime_convert ()),
dbesc ( datetime_convert ())
);
$what .= 'newhub ' ;
$changed = true ;
if ( $location [ 'primary' ]) {
$r = q ( " select * from hubloc where hubloc_addr = '%s' and hubloc_sitekey = '%s' limit 1 " ,
dbesc ( $location [ 'address' ]),
dbesc ( $location [ 'sitekey' ])
);
if ( $r )
hubloc_change_primary ( $r [ 0 ]);
}
}
// get rid of any hubs we have for this channel which weren't reported.
if ( $absolute && $xisting ) {
foreach ( $xisting as $x ) {
if ( ! array_key_exists ( 'updated' , $x )) {
2015-11-15 19:51:39 +01:00
logger ( 'sync_locations: deleting unreferenced hub location ' . $x [ 'hubloc_addr' ]);
2015-08-23 22:38:18 +02:00
$r = q ( " update hubloc set hubloc_deleted = 1, hubloc_updated = '%s' where hubloc_id = %d " ,
dbesc ( datetime_convert ()),
intval ( $x [ 'hubloc_id' ])
);
$what .= 'removed_hub ' ;
$changed = true ;
}
}
}
}
2015-10-24 13:04:14 +02:00
else {
logger ( 'No locations to sync!' );
}
2015-08-23 22:38:18 +02:00
$ret [ 'change_message' ] = $what ;
$ret [ 'changed' ] = $changed ;
return $ret ;
}
/**
* @ brief Returns an array with all known distinct hubs for this channel .
*
* @ see zot_get_hublocs ()
* @ param array $channel an associative array which must contain
* * \e string \b channel_hash the hash of the channel
* @ return array an array with associative arrays
*/
function zot_encode_locations ( $channel ) {
$ret = array ();
$x = zot_get_hublocs ( $channel [ 'channel_hash' ]);
if ( $x && count ( $x )) {
foreach ( $x as $hub ) {
2015-11-15 19:51:39 +01:00
// if this is a local channel that has been deleted, the hubloc is no good - make sure it is marked deleted
// so that nobody tries to use it.
if ( intval ( $channel [ 'channel_removed' ]) && $hub [ 'hubloc_url' ] === z_root ())
$hub [ 'hubloc_deleted' ] = 1 ;
2015-08-23 22:38:18 +02:00
$ret [] = array (
'host' => $hub [ 'hubloc_host' ],
'address' => $hub [ 'hubloc_addr' ],
'primary' => ( intval ( $hub [ 'hubloc_primary' ]) ? true : false ),
'url' => $hub [ 'hubloc_url' ],
'url_sig' => $hub [ 'hubloc_url_sig' ],
'callback' => $hub [ 'hubloc_callback' ],
'sitekey' => $hub [ 'hubloc_sitekey' ],
'deleted' => ( intval ( $hub [ 'hubloc_deleted' ]) ? true : false )
);
}
}
return $ret ;
}
/**
* @ brief Imports a directory profile .
*
* @ param string $hash
* @ param array $profile
* @ param string $addr
* @ param number $ud_flags
* @ param number $suppress_update default 0
* @ return boolean $updated if something changed
*/
function import_directory_profile ( $hash , $profile , $addr , $ud_flags = UPDATE_FLAGS_UPDATED , $suppress_update = 0 ) {
logger ( 'import_directory_profile' , LOGGER_DEBUG );
if ( ! $hash )
return false ;
$arr = array ();
$arr [ 'xprof_hash' ] = $hash ;
$arr [ 'xprof_dob' ] = datetime_convert ( '' , '' , $profile [ 'birthday' ], 'Y-m-d' ); // !!!! check this for 0000 year
$arr [ 'xprof_age' ] = (( $profile [ 'age' ]) ? intval ( $profile [ 'age' ]) : 0 );
$arr [ 'xprof_desc' ] = (( $profile [ 'description' ]) ? htmlspecialchars ( $profile [ 'description' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_gender' ] = (( $profile [ 'gender' ]) ? htmlspecialchars ( $profile [ 'gender' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_marital' ] = (( $profile [ 'marital' ]) ? htmlspecialchars ( $profile [ 'marital' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_sexual' ] = (( $profile [ 'sexual' ]) ? htmlspecialchars ( $profile [ 'sexual' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_locale' ] = (( $profile [ 'locale' ]) ? htmlspecialchars ( $profile [ 'locale' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_region' ] = (( $profile [ 'region' ]) ? htmlspecialchars ( $profile [ 'region' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_postcode' ] = (( $profile [ 'postcode' ]) ? htmlspecialchars ( $profile [ 'postcode' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_country' ] = (( $profile [ 'country' ]) ? htmlspecialchars ( $profile [ 'country' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_about' ] = (( $profile [ 'about' ]) ? htmlspecialchars ( $profile [ 'about' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_homepage' ] = (( $profile [ 'homepage' ]) ? htmlspecialchars ( $profile [ 'homepage' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$arr [ 'xprof_hometown' ] = (( $profile [ 'hometown' ]) ? htmlspecialchars ( $profile [ 'hometown' ], ENT_COMPAT , 'UTF-8' , false ) : '' );
$clean = array ();
if ( array_key_exists ( 'keywords' , $profile ) and is_array ( $profile [ 'keywords' ])) {
import_directory_keywords ( $hash , $profile [ 'keywords' ]);
foreach ( $profile [ 'keywords' ] as $kw ) {
$kw = trim ( htmlspecialchars ( $kw , ENT_COMPAT , 'UTF-8' , false ));
$kw = trim ( $kw , ',' );
$clean [] = $kw ;
}
}
$arr [ 'xprof_keywords' ] = implode ( ' ' , $clean );
// Self censored, make it so
// These are not translated, so the German "erwachsenen" keyword will not censor the directory profile. Only the English form - "adult".
if ( in_arrayi ( 'nsfw' , $clean ) || in_arrayi ( 'adult' , $clean )) {
q ( " update xchan set xchan_selfcensored = 1 where xchan_hash = '%s' " ,
dbesc ( $hash )
);
}
$r = q ( " select * from xprof where xprof_hash = '%s' limit 1 " ,
dbesc ( $hash )
);
if ( $arr [ 'xprof_age' ] > 150 )
$arr [ 'xprof_age' ] = 150 ;
if ( $arr [ 'xprof_age' ] < 0 )
$arr [ 'xprof_age' ] = 0 ;
if ( $r ) {
$update = false ;
foreach ( $r [ 0 ] as $k => $v ) {
if (( array_key_exists ( $k , $arr )) && ( $arr [ $k ] != $v )) {
logger ( 'import_directory_profile: update ' . $k . ' => ' . $arr [ $k ]);
$update = true ;
break ;
}
}
if ( $update ) {
q ( " update xprof set
xprof_desc = '%s' ,
xprof_dob = '%s' ,
xprof_age = % d ,
xprof_gender = '%s' ,
xprof_marital = '%s' ,
xprof_sexual = '%s' ,
xprof_locale = '%s' ,
xprof_region = '%s' ,
xprof_postcode = '%s' ,
xprof_country = '%s' ,
xprof_about = '%s' ,
xprof_homepage = '%s' ,
xprof_hometown = '%s' ,
xprof_keywords = '%s'
where xprof_hash = '%s' " ,
dbesc ( $arr [ 'xprof_desc' ]),
dbesc ( $arr [ 'xprof_dob' ]),
intval ( $arr [ 'xprof_age' ]),
dbesc ( $arr [ 'xprof_gender' ]),
dbesc ( $arr [ 'xprof_marital' ]),
dbesc ( $arr [ 'xprof_sexual' ]),
dbesc ( $arr [ 'xprof_locale' ]),
dbesc ( $arr [ 'xprof_region' ]),
dbesc ( $arr [ 'xprof_postcode' ]),
dbesc ( $arr [ 'xprof_country' ]),
dbesc ( $arr [ 'xprof_about' ]),
dbesc ( $arr [ 'xprof_homepage' ]),
dbesc ( $arr [ 'xprof_hometown' ]),
dbesc ( $arr [ 'xprof_keywords' ]),
dbesc ( $arr [ 'xprof_hash' ])
);
}
} else {
$update = true ;
logger ( 'import_directory_profile: new profile ' );
q ( " insert into xprof (xprof_hash, xprof_desc, xprof_dob, xprof_age, xprof_gender, xprof_marital, xprof_sexual, xprof_locale, xprof_region, xprof_postcode, xprof_country, xprof_about, xprof_homepage, xprof_hometown, xprof_keywords) values ('%s', '%s', '%s', %d, '%s', '%s', '%s', '%s', '%s', '%s', '%s', '%s', '%s', '%s', '%s') " ,
dbesc ( $arr [ 'xprof_hash' ]),
dbesc ( $arr [ 'xprof_desc' ]),
dbesc ( $arr [ 'xprof_dob' ]),
intval ( $arr [ 'xprof_age' ]),
dbesc ( $arr [ 'xprof_gender' ]),
dbesc ( $arr [ 'xprof_marital' ]),
dbesc ( $arr [ 'xprof_sexual' ]),
dbesc ( $arr [ 'xprof_locale' ]),
dbesc ( $arr [ 'xprof_region' ]),
dbesc ( $arr [ 'xprof_postcode' ]),
dbesc ( $arr [ 'xprof_country' ]),
dbesc ( $arr [ 'xprof_about' ]),
dbesc ( $arr [ 'xprof_homepage' ]),
dbesc ( $arr [ 'xprof_hometown' ]),
dbesc ( $arr [ 'xprof_keywords' ])
);
}
$d = array ( 'xprof' => $arr , 'profile' => $profile , 'update' => $update );
call_hooks ( 'import_directory_profile' , $d );
if (( $d [ 'update' ]) && ( ! $suppress_update ))
2016-04-17 16:29:18 +02:00
update_modtime ( $arr [ 'xprof_hash' ], random_string () . '@' . App :: get_hostname (), $addr , $ud_flags );
2015-08-23 22:38:18 +02:00
return $d [ 'update' ];
}
/**
* @ brief
*
* @ param string $hash
* @ param array $keywords
*/
function import_directory_keywords ( $hash , $keywords ) {
$existing = array ();
2015-10-24 13:04:14 +02:00
$r = q ( " select * from xtag where xtag_hash = '%s' and xtag_flags = 0 " ,
2015-08-23 22:38:18 +02:00
dbesc ( $hash )
);
if ( $r ) {
foreach ( $r as $rr )
$existing [] = $rr [ 'xtag_term' ];
}
$clean = array ();
foreach ( $keywords as $kw ) {
$kw = trim ( htmlspecialchars ( $kw , ENT_COMPAT , 'UTF-8' , false ));
$kw = trim ( $kw , ',' );
$clean [] = $kw ;
}
foreach ( $existing as $x ) {
if ( ! in_array ( $x , $clean ))
2015-10-24 13:04:14 +02:00
$r = q ( " delete from xtag where xtag_hash = '%s' and xtag_term = '%s' and xtag_flags = 0 " ,
2015-08-23 22:38:18 +02:00
dbesc ( $hash ),
dbesc ( $x )
);
}
foreach ( $clean as $x ) {
if ( ! in_array ( $x , $existing )) {
2015-10-24 13:04:14 +02:00
$r = q ( " insert into xtag ( xtag_hash, xtag_term, xtag_flags) values ( '%s' ,'%s', 0 ) " ,
2015-08-23 22:38:18 +02:00
dbesc ( $hash ),
dbesc ( $x )
);
}
}
}
/**
* @ brief
*
* @ param string $hash
* @ param string $guid
* @ param string $addr
* @ param int $flags ( optional ) default 0
*/
function update_modtime ( $hash , $guid , $addr , $flags = 0 ) {
$dirmode = intval ( get_config ( 'system' , 'directory_mode' ));
if ( $dirmode == DIRECTORY_MODE_NORMAL )
return ;
if ( $flags ) {
q ( " insert into updates (ud_hash, ud_guid, ud_date, ud_flags, ud_addr ) values ( '%s', '%s', '%s', %d, '%s' ) " ,
dbesc ( $hash ),
dbesc ( $guid ),
dbesc ( datetime_convert ()),
intval ( $flags ),
dbesc ( $addr )
);
}
else {
q ( " update updates set ud_flags = ( ud_flags | %d ) where ud_addr = '%s' and not (ud_flags & %d)>0 " ,
intval ( UPDATE_FLAGS_UPDATED ),
dbesc ( $addr ),
intval ( UPDATE_FLAGS_UPDATED )
);
}
}
/**
* @ brief
*
* @ param array $arr
* @ param string $pubkey
* @ return boolean true if updated or inserted
*/
function import_site ( $arr , $pubkey ) {
if ( ( ! is_array ( $arr )) || ( ! $arr [ 'url' ]) || ( ! $arr [ 'url_sig' ]))
return false ;
if ( ! rsa_verify ( $arr [ 'url' ], base64url_decode ( $arr [ 'url_sig' ]), $pubkey )) {
logger ( 'import_site: bad url_sig' );
return false ;
}
$update = false ;
$exists = false ;
$r = q ( " select * from site where site_url = '%s' limit 1 " ,
dbesc ( $arr [ 'url' ])
);
if ( $r ) {
$exists = true ;
$siterecord = $r [ 0 ];
}
$site_directory = 0 ;
if ( $arr [ 'directory_mode' ] == 'normal' )
$site_directory = DIRECTORY_MODE_NORMAL ;
if ( $arr [ 'directory_mode' ] == 'primary' )
$site_directory = DIRECTORY_MODE_PRIMARY ;
if ( $arr [ 'directory_mode' ] == 'secondary' )
$site_directory = DIRECTORY_MODE_SECONDARY ;
if ( $arr [ 'directory_mode' ] == 'standalone' )
$site_directory = DIRECTORY_MODE_STANDALONE ;
$register_policy = 0 ;
if ( $arr [ 'register_policy' ] == 'closed' )
$register_policy = REGISTER_CLOSED ;
if ( $arr [ 'register_policy' ] == 'open' )
$register_policy = REGISTER_OPEN ;
if ( $arr [ 'register_policy' ] == 'approve' )
$register_policy = REGISTER_APPROVE ;
$access_policy = 0 ;
if ( array_key_exists ( 'access_policy' , $arr )) {
if ( $arr [ 'access_policy' ] === 'private' )
$access_policy = ACCESS_PRIVATE ;
if ( $arr [ 'access_policy' ] === 'paid' )
$access_policy = ACCESS_PAID ;
if ( $arr [ 'access_policy' ] === 'free' )
$access_policy = ACCESS_FREE ;
if ( $arr [ 'access_policy' ] === 'tiered' )
$access_policy = ACCESS_TIERED ;
}
// don't let insecure sites register as public hubs
if ( strpos ( $arr [ 'url' ], 'https://' ) === false )
$access_policy = ACCESS_PRIVATE ;
if ( $access_policy != ACCESS_PRIVATE ) {
$x = z_fetch_url ( $arr [ 'url' ] . '/siteinfo/json' );
if ( ! $x [ 'success' ])
$access_policy = ACCESS_PRIVATE ;
}
$directory_url = htmlspecialchars ( $arr [ 'directory_url' ], ENT_COMPAT , 'UTF-8' , false );
$url = htmlspecialchars ( strtolower ( $arr [ 'url' ]), ENT_COMPAT , 'UTF-8' , false );
$sellpage = htmlspecialchars ( $arr [ 'sellpage' ], ENT_COMPAT , 'UTF-8' , false );
$site_location = htmlspecialchars ( $arr [ 'location' ], ENT_COMPAT , 'UTF-8' , false );
$site_realm = htmlspecialchars ( $arr [ 'realm' ], ENT_COMPAT , 'UTF-8' , false );
2015-10-24 13:04:14 +02:00
$site_project = htmlspecialchars ( $arr [ 'project' ], ENT_COMPAT , 'UTF-8' , false );
2015-08-23 22:38:18 +02:00
// You can have one and only one primary directory per realm.
// Downgrade any others claiming to be primary. As they have
// flubbed up this badly already, don't let them be directory servers at all.
if (( $site_directory === DIRECTORY_MODE_PRIMARY )
&& ( $site_realm === get_directory_realm ())
&& ( $arr [ 'url' ] != get_directory_primary ())) {
$site_directory = DIRECTORY_MODE_NORMAL ;
}
if ( $exists ) {
if (( $siterecord [ 'site_flags' ] != $site_directory )
|| ( $siterecord [ 'site_access' ] != $access_policy )
|| ( $siterecord [ 'site_directory' ] != $directory_url )
|| ( $siterecord [ 'site_sellpage' ] != $sellpage )
|| ( $siterecord [ 'site_location' ] != $site_location )
|| ( $siterecord [ 'site_register' ] != $register_policy )
2015-10-24 13:04:14 +02:00
|| ( $siterecord [ 'site_project' ] != $site_project )
2015-08-23 22:38:18 +02:00
|| ( $siterecord [ 'site_realm' ] != $site_realm )) {
$update = true ;
// logger('import_site: input: ' . print_r($arr,true));
// logger('import_site: stored: ' . print_r($siterecord,true));
2015-10-24 13:04:14 +02:00
$r = q ( " update site set site_dead = 0, site_location = '%s', site_flags = %d, site_access = %d, site_directory = '%s', site_register = %d, site_update = '%s', site_sellpage = '%s', site_realm = '%s', site_type = %d, site_project = '%s'
2015-08-23 22:38:18 +02:00
where site_url = '%s' " ,
dbesc ( $site_location ),
intval ( $site_directory ),
intval ( $access_policy ),
dbesc ( $directory_url ),
intval ( $register_policy ),
dbesc ( datetime_convert ()),
dbesc ( $sellpage ),
dbesc ( $site_realm ),
2015-10-24 13:04:14 +02:00
intval ( SITE_TYPE_ZOT ),
dbesc ( $site_project ),
2015-08-23 22:38:18 +02:00
dbesc ( $url )
);
if ( ! $r ) {
logger ( 'import_site: update failed. ' . print_r ( $arr , true ));
}
}
else {
// update the timestamp to indicate we communicated with this site
2015-10-24 13:04:14 +02:00
q ( " update site set site_dead = 0, site_update = '%s' where site_url = '%s' " ,
2015-08-23 22:38:18 +02:00
dbesc ( datetime_convert ()),
dbesc ( $url )
);
}
}
else {
$update = true ;
2015-10-24 13:04:14 +02:00
$r = q ( " insert into site ( site_location, site_url, site_access, site_flags, site_update, site_directory, site_register, site_sellpage, site_realm, site_type, site_project )
values ( '%s' , '%s' , % d , % d , '%s' , '%s' , % d , '%s' , '%s' , % d , '%s' ) " ,
2015-08-23 22:38:18 +02:00
dbesc ( $site_location ),
dbesc ( $url ),
intval ( $access_policy ),
intval ( $site_directory ),
dbesc ( datetime_convert ()),
dbesc ( $directory_url ),
intval ( $register_policy ),
dbesc ( $sellpage ),
2015-10-24 13:04:14 +02:00
dbesc ( $site_realm ),
intval ( SITE_TYPE_ZOT ),
dbesc ( $site_project )
2015-08-23 22:38:18 +02:00
);
if ( ! $r ) {
logger ( 'import_site: record create failed. ' . print_r ( $arr , true ));
}
}
return $update ;
}
/**
* Send a zot packet to all hubs where this channel is duplicated , refreshing
* such things as personal settings , channel permissions , address book updates , etc .
*
* @ param int $uid
* @ param array $packet ( optional ) default null
* @ param boolean $groups_changed ( optional ) default false
*/
function build_sync_packet ( $uid = 0 , $packet = null , $groups_changed = false ) {
2016-03-20 08:06:33 +01:00
if ( UNO )
return ;
2015-08-23 22:38:18 +02:00
$a = get_app ();
logger ( 'build_sync_packet' );
if ( $packet )
2016-01-12 02:47:38 +01:00
logger ( 'packet: ' . print_r ( $packet , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
if ( ! $uid )
$uid = local_channel ();
if ( ! $uid )
return ;
$r = q ( " select * from channel where channel_id = %d limit 1 " ,
intval ( $uid )
);
if ( ! $r )
return ;
$channel = $r [ 0 ];
2015-10-24 13:04:14 +02:00
if ( intval ( $channel [ 'channel_removed' ]))
return ;
$h = q ( " select * from hubloc where hubloc_hash = '%s' and hubloc_deleted = 0 " ,
2015-08-23 22:38:18 +02:00
dbesc ( $channel [ 'channel_hash' ])
);
if ( ! $h )
return ;
$synchubs = array ();
foreach ( $h as $x ) {
2016-04-17 16:29:18 +02:00
if ( $x [ 'hubloc_host' ] == App :: get_hostname ())
2015-08-23 22:38:18 +02:00
continue ;
$synchubs [] = $x ;
}
if ( ! $synchubs )
return ;
$r = q ( " select xchan_guid, xchan_guid_sig from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $channel [ 'channel_hash' ])
);
if ( ! $r )
return ;
$env_recips = array ();
$env_recips [] = array ( 'guid' => $r [ 0 ][ 'xchan_guid' ], 'guid_sig' => $r [ 0 ][ 'xchan_guid_sig' ]);
$info = (( $packet ) ? $packet : array ());
$info [ 'type' ] = 'channel_sync' ;
$info [ 'encoding' ] = 'red' ; // note: not zot, this packet is very red specific
2016-04-17 16:29:18 +02:00
if ( array_key_exists ( $uid , App :: $config ) && array_key_exists ( 'transient' , App :: $config [ $uid ])) {
$settings = App :: $config [ $uid ][ 'transient' ];
2015-08-23 22:38:18 +02:00
if ( $settings ) {
$info [ 'config' ] = $settings ;
}
}
if ( $channel ) {
$info [ 'channel' ] = array ();
foreach ( $channel as $k => $v ) {
// filter out any joined tables like xchan
if ( strpos ( $k , 'channel_' ) !== 0 )
continue ;
// don't pass these elements, they should not be synchronised
2015-10-24 13:04:14 +02:00
$disallowed = array ( 'channel_id' , 'channel_account_id' , 'channel_primary' , 'channel_prvkey' , 'channel_address' , 'channel_deleted' , 'channel_removed' , 'channel_system' );
2015-08-23 22:38:18 +02:00
if ( in_array ( $k , $disallowed ))
continue ;
$info [ 'channel' ][ $k ] = $v ;
}
}
if ( $groups_changed ) {
$r = q ( " select hash as collection, visible, deleted, name from groups where uid = %d " ,
intval ( $uid )
);
if ( $r )
$info [ 'collections' ] = $r ;
$r = q ( " select groups.hash as collection, group_member.xchan as member from groups left join group_member on groups.id = group_member.gid where group_member.uid = %d " ,
intval ( $uid )
);
if ( $r )
$info [ 'collection_members' ] = $r ;
}
$interval = (( get_config ( 'system' , 'delivery_interval' ) !== false )
? intval ( get_config ( 'system' , 'delivery_interval' )) : 2 );
2016-01-12 02:47:38 +01:00
logger ( 'build_sync_packet: packet: ' . print_r ( $info , true ), LOGGER_DATA , LOG_DEBUG );
2015-08-23 22:38:18 +02:00
2016-03-20 08:06:33 +01:00
$total = count ( $synchubs );
2015-08-23 22:38:18 +02:00
foreach ( $synchubs as $hub ) {
$hash = random_string ();
$n = zot_build_packet ( $channel , 'notify' , $env_recips , $hub [ 'hubloc_sitekey' ], $hash );
2016-01-12 02:47:38 +01:00
queue_insert ( array (
'hash' => $hash ,
'account_id' => $channel [ 'channel_account_id' ],
'channel_id' => $channel [ 'channel_id' ],
'posturl' => $hub [ 'hubloc_callback' ],
'notify' => $n ,
'msg' => json_encode ( $info )
));
2015-08-23 22:38:18 +02:00
proc_run ( 'php' , 'include/deliver.php' , $hash );
2016-03-20 08:06:33 +01:00
$total = $total - 1 ;
if ( $interval && $total )
2015-08-23 22:38:18 +02:00
@ time_sleep_until ( microtime ( true ) + ( float ) $interval );
}
}
/**
* @ brief
*
* @ param array $sender
* @ param array $arr
* @ param array $deliveries
* @ return array
*/
function process_channel_sync_delivery ( $sender , $arr , $deliveries ) {
2016-03-20 08:06:33 +01:00
if ( UNO )
return ;
2015-10-24 13:04:14 +02:00
require_once ( 'include/import.php' );
2015-08-23 22:38:18 +02:00
/** @FIXME this will sync red structures (channel, pconfig and abook). Eventually we need to make this application agnostic. */
$result = array ();
foreach ( $deliveries as $d ) {
$r = q ( " select * from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $d [ 'hash' ])
);
if ( ! $r ) {
$result [] = array ( $d [ 'hash' ], 'not found' );
continue ;
}
$channel = $r [ 0 ];
$max_friends = service_class_fetch ( $channel [ 'channel_id' ], 'total_channels' );
$max_feeds = account_service_class_fetch ( $channel [ 'channel_account_id' ], 'total_feeds' );
if ( $channel [ 'channel_hash' ] != $sender [ 'hash' ]) {
logger ( 'process_channel_sync_delivery: possible forgery. Sender ' . $sender [ 'hash' ] . ' is not ' . $channel [ 'channel_hash' ]);
$result [] = array ( $d [ 'hash' ], 'channel mismatch' , $channel [ 'channel_name' ], '' );
continue ;
}
if ( array_key_exists ( 'config' , $arr ) && is_array ( $arr [ 'config' ]) && count ( $arr [ 'config' ])) {
foreach ( $arr [ 'config' ] as $cat => $k ) {
foreach ( $arr [ 'config' ][ $cat ] as $k => $v )
set_pconfig ( $channel [ 'channel_id' ], $cat , $k , $v );
}
}
2015-10-24 13:04:14 +02:00
if ( array_key_exists ( 'obj' , $arr ) && $arr [ 'obj' ])
sync_objs ( $channel , $arr [ 'obj' ]);
if ( array_key_exists ( 'likes' , $arr ) && $arr [ 'likes' ])
import_likes ( $channel , $arr [ 'likes' ]);
if ( array_key_exists ( 'app' , $arr ) && $arr [ 'app' ])
sync_apps ( $channel , $arr [ 'app' ]);
if ( array_key_exists ( 'chatroom' , $arr ) && $arr [ 'chatroom' ])
sync_chatrooms ( $channel , $arr [ 'chatroom' ]);
if ( array_key_exists ( 'conv' , $arr ) && $arr [ 'conv' ])
import_conv ( $channel , $arr [ 'conv' ]);
if ( array_key_exists ( 'mail' , $arr ) && $arr [ 'mail' ])
import_mail ( $channel , $arr [ 'mail' ]);
if ( array_key_exists ( 'event' , $arr ) && $arr [ 'event' ])
sync_events ( $channel , $arr [ 'event' ]);
if ( array_key_exists ( 'event_item' , $arr ) && $arr [ 'event_item' ])
sync_items ( $channel , $arr [ 'event_item' ]);
if ( array_key_exists ( 'item' , $arr ) && $arr [ 'item' ])
sync_items ( $channel , $arr [ 'item' ]);
if ( array_key_exists ( 'item_id' , $arr ) && $arr [ 'item_id' ])
sync_items ( $channel , $arr [ 'item_id' ]);
if ( array_key_exists ( 'menu' , $arr ) && $arr [ 'menu' ])
sync_menus ( $channel , $arr [ 'menu' ]);
2016-04-17 16:29:18 +02:00
if ( array_key_exists ( 'file' , $arr ) && $arr [ 'file' ])
sync_files ( $channel , $arr [ 'file' ]);
2015-08-23 22:38:18 +02:00
if ( array_key_exists ( 'channel' , $arr ) && is_array ( $arr [ 'channel' ]) && count ( $arr [ 'channel' ])) {
2015-10-24 13:04:14 +02:00
if ( array_key_exists ( 'channel_pageflags' , $arr [ 'channel' ]) && intval ( $arr [ 'channel' ][ 'channel_pageflags' ])) {
// These flags cannot be sync'd.
// remove the bits from the incoming flags.
// These correspond to PAGE_REMOVED and PAGE_SYSTEM on redmatrix
if ( $arr [ 'channel' ][ 'channel_pageflags' ] & 0x8000 )
$arr [ 'channel' ][ 'channel_pageflags' ] = $arr [ 'channel' ][ 'channel_pageflags' ] - 0x8000 ;
if ( $arr [ 'channel' ][ 'channel_pageflags' ] & 0x1000 )
$arr [ 'channel' ][ 'channel_pageflags' ] = $arr [ 'channel' ][ 'channel_pageflags' ] - 0x1000 ;
2015-08-23 22:38:18 +02:00
}
2015-10-24 13:04:14 +02:00
$disallowed = array ( 'channel_id' , 'channel_account_id' , 'channel_primary' , 'channel_prvkey' , 'channel_address' , 'channel_notifyflags' , 'channel_removed' , 'channel_deleted' , 'channel_system' );
2015-08-23 22:38:18 +02:00
$clean = array ();
foreach ( $arr [ 'channel' ] as $k => $v ) {
if ( in_array ( $k , $disallowed ))
continue ;
$clean [ $k ] = $v ;
}
if ( count ( $clean )) {
foreach ( $clean as $k => $v ) {
$r = dbq ( " UPDATE channel set " . dbesc ( $k ) . " = ' " . dbesc ( $v )
. " ' where channel_id = " . intval ( $channel [ 'channel_id' ]) );
}
}
}
if ( array_key_exists ( 'abook' , $arr ) && is_array ( $arr [ 'abook' ]) && count ( $arr [ 'abook' ])) {
$total_friends = 0 ;
$total_feeds = 0 ;
$r = q ( " select abook_id, abook_feed from abook where abook_channel = %d " ,
intval ( $channel [ 'channel_id' ])
);
if ( $r ) {
// don't count yourself
$total_friends = (( count ( $r ) > 0 ) ? count ( $r ) - 1 : 0 );
foreach ( $r as $rr )
if ( intval ( $rr [ 'abook_feed' ]))
$total_feeds ++ ;
}
2015-10-24 13:04:14 +02:00
2015-08-23 22:38:18 +02:00
$disallowed = array ( 'abook_id' , 'abook_account' , 'abook_channel' , 'abook_rating' , 'abook_rating_text' );
foreach ( $arr [ 'abook' ] as $abook ) {
2016-03-20 08:06:33 +01:00
$abconfig = null ;
if ( array_key_exists ( 'abconfig' , $abook ) && is_array ( $abook [ 'abconfig' ]) && count ( $abook [ 'abconfig' ]))
$abconfig = $abook [ 'abconfig' ];
2015-08-23 22:38:18 +02:00
if ( ! array_key_exists ( 'abook_blocked' , $abook )) {
// convert from redmatrix
$abook [ 'abook_blocked' ] = (( $abook [ 'abook_flags' ] & 0x0001 ) ? 1 : 0 );
$abook [ 'abook_ignored' ] = (( $abook [ 'abook_flags' ] & 0x0002 ) ? 1 : 0 );
$abook [ 'abook_hidden' ] = (( $abook [ 'abook_flags' ] & 0x0004 ) ? 1 : 0 );
$abook [ 'abook_archived' ] = (( $abook [ 'abook_flags' ] & 0x0008 ) ? 1 : 0 );
$abook [ 'abook_pending' ] = (( $abook [ 'abook_flags' ] & 0x0010 ) ? 1 : 0 );
$abook [ 'abook_unconnected' ] = (( $abook [ 'abook_flags' ] & 0x0020 ) ? 1 : 0 );
$abook [ 'abook_self' ] = (( $abook [ 'abook_flags' ] & 0x0080 ) ? 1 : 0 );
$abook [ 'abook_feed' ] = (( $abook [ 'abook_flags' ] & 0x0100 ) ? 1 : 0 );
}
$clean = array ();
if ( $abook [ 'abook_xchan' ] && $abook [ 'entry_deleted' ]) {
logger ( 'process_channel_sync_delivery: removing abook entry for ' . $abook [ 'abook_xchan' ]);
require_once ( 'include/Contact.php' );
$r = q ( " select abook_id, abook_feed from abook where abook_xchan = '%s' and abook_channel = %d and abook_self = 0 limit 1 " ,
dbesc ( $abook [ 'abook_xchan' ]),
intval ( $channel [ 'channel_id' ])
);
if ( $r ) {
contact_remove ( $channel [ 'channel_id' ], $r [ 0 ][ 'abook_id' ]);
if ( $total_friends )
$total_friends -- ;
if ( intval ( $r [ 0 ][ 'abook_feed' ]))
$total_feeds -- ;
}
continue ;
}
// Perform discovery if the referenced xchan hasn't ever been seen on this hub.
// This relies on the undocumented behaviour that red sites send xchan info with the abook
// and import_author_xchan will look them up on all federated networks
if ( $abook [ 'abook_xchan' ] && $abook [ 'xchan_addr' ]) {
$h = zot_get_hublocs ( $abook [ 'abook_xchan' ]);
if ( ! $h ) {
$xhash = import_author_xchan ( encode_item_xchan ( $abook ));
if ( ! $xhash ) {
logger ( 'process_channel_sync_delivery: import of ' . $abook [ 'xchan_addr' ] . ' failed.' );
continue ;
}
}
}
foreach ( $abook as $k => $v ) {
if ( in_array ( $k , $disallowed ) || ( strpos ( $k , 'abook' ) !== 0 ))
continue ;
$clean [ $k ] = $v ;
}
if ( ! array_key_exists ( 'abook_xchan' , $clean ))
continue ;
$r = q ( " select * from abook where abook_xchan = '%s' and abook_channel = %d limit 1 " ,
dbesc ( $clean [ 'abook_xchan' ]),
intval ( $channel [ 'channel_id' ])
);
// make sure we have an abook entry for this xchan on this system
if ( ! $r ) {
if ( $max_friends !== false && $total_friends > $max_friends ) {
logger ( 'process_channel_sync_delivery: total_channels service class limit exceeded' );
continue ;
}
if ( $max_feeds !== false && intval ( $clean [ 'abook_feed' ]) && $total_feeds > $max_feeds ) {
logger ( 'process_channel_sync_delivery: total_feeds service class limit exceeded' );
continue ;
}
2016-02-28 12:11:12 +01:00
q ( " insert into abook ( abook_xchan, abook_account, abook_channel ) values ('%s', %d, %d ) " ,
2015-08-23 22:38:18 +02:00
dbesc ( $clean [ 'abook_xchan' ]),
2016-02-28 12:11:12 +01:00
intval ( $channel [ 'channel_account_id' ]),
2015-08-23 22:38:18 +02:00
intval ( $channel [ 'channel_id' ])
);
$total_friends ++ ;
if ( intval ( $clean [ 'abook_feed' ]))
$total_feeds ++ ;
}
if ( count ( $clean )) {
foreach ( $clean as $k => $v ) {
if ( $k == 'abook_dob' )
$v = dbescdate ( $v );
$r = dbq ( " UPDATE abook set " . dbesc ( $k ) . " = ' " . dbesc ( $v )
. " ' where abook_xchan = ' " . dbesc ( $clean [ 'abook_xchan' ]) . " ' and abook_channel = " . intval ( $channel [ 'channel_id' ]));
}
}
2016-03-20 08:06:33 +01:00
if ( $abconfig ) {
// @fixme does not handle sync of del_abconfig
foreach ( $abconfig as $abc ) {
if ( $abc [ 'chan' ] === $channel [ 'channel_hash' ])
set_abconfig ( $abc [ 'chan' ], $abc [ 'xchan' ], $abc [ 'cat' ], $abc [ 'k' ], $abc [ 'v' ]);
}
}
2015-08-23 22:38:18 +02:00
}
}
// sync collections (privacy groups) oh joy...
if ( array_key_exists ( 'collections' , $arr ) && is_array ( $arr [ 'collections' ]) && count ( $arr [ 'collections' ])) {
$x = q ( " select * from groups where uid = %d " ,
intval ( $channel [ 'channel_id' ])
);
foreach ( $arr [ 'collections' ] as $cl ) {
$found = false ;
if ( $x ) {
foreach ( $x as $y ) {
if ( $cl [ 'collection' ] == $y [ 'hash' ]) {
$found = true ;
break ;
}
}
if ( $found ) {
if (( $y [ 'name' ] != $cl [ 'name' ])
|| ( $y [ 'visible' ] != $cl [ 'visible' ])
|| ( $y [ 'deleted' ] != $cl [ 'deleted' ])) {
q ( " update groups set name = '%s', visible = %d, deleted = %d where hash = '%s' and uid = %d " ,
dbesc ( $cl [ 'name' ]),
intval ( $cl [ 'visible' ]),
intval ( $cl [ 'deleted' ]),
dbesc ( $cl [ 'hash' ]),
intval ( $channel [ 'channel_id' ])
);
}
if ( intval ( $cl [ 'deleted' ]) && ( ! intval ( $y [ 'deleted' ]))) {
q ( " delete from group_member where gid = %d " ,
intval ( $y [ 'id' ])
);
}
}
}
if ( ! $found ) {
$r = q ( " INSERT INTO `groups` ( hash, uid, visible, deleted, name )
VALUES ( '%s' , % d , % d , % d , '%s' ) " ,
dbesc ( $cl [ 'collection' ]),
intval ( $channel [ 'channel_id' ]),
intval ( $cl [ 'visible' ]),
intval ( $cl [ 'deleted' ]),
dbesc ( $cl [ 'name' ])
);
}
// now look for any collections locally which weren't in the list we just received.
// They need to be removed by marking deleted and removing the members.
// This shouldn't happen except for clones created before this function was written.
if ( $x ) {
$found_local = false ;
foreach ( $x as $y ) {
foreach ( $arr [ 'collections' ] as $cl ) {
if ( $cl [ 'collection' ] == $y [ 'hash' ]) {
$found_local = true ;
break ;
}
}
if ( ! $found_local ) {
q ( " delete from group_member where gid = %d " ,
intval ( $y [ 'id' ])
);
q ( " update groups set deleted = 1 where id = %d and uid = %d " ,
intval ( $y [ 'id' ]),
intval ( $channel [ 'channel_id' ])
);
}
}
}
}
// reload the group list with any updates
$x = q ( " select * from groups where uid = %d " ,
intval ( $channel [ 'channel_id' ])
);
// now sync the members
if ( array_key_exists ( 'collection_members' , $arr )
&& is_array ( $arr [ 'collection_members' ])
&& count ( $arr [ 'collection_members' ])) {
// first sort into groups keyed by the group hash
$members = array ();
foreach ( $arr [ 'collection_members' ] as $cm ) {
if ( ! array_key_exists ( $cm [ 'collection' ], $members ))
$members [ $cm [ 'collection' ]] = array ();
$members [ $cm [ 'collection' ]][] = $cm [ 'member' ];
}
// our group list is already synchronised
if ( $x ) {
foreach ( $x as $y ) {
// for each group, loop on members list we just received
foreach ( $members [ $y [ 'hash' ]] as $member ) {
$found = false ;
$z = q ( " select xchan from group_member where gid = %d and uid = %d and xchan = '%s' limit 1 " ,
intval ( $y [ 'id' ]),
intval ( $channel [ 'channel_id' ]),
dbesc ( $member )
);
if ( $z )
$found = true ;
// if somebody is in the group that wasn't before - add them
if ( ! $found ) {
q ( " INSERT INTO `group_member` (`uid`, `gid`, `xchan`)
VALUES ( % d , % d , '%s' ) " ,
intval ( $channel [ 'channel_id' ]),
intval ( $y [ 'id' ]),
dbesc ( $member )
);
}
}
// now retrieve a list of members we have on this site
$m = q ( " select xchan from group_member where gid = %d and uid = %d " ,
intval ( $y [ 'id' ]),
intval ( $channel [ 'channel_id' ])
);
if ( $m ) {
foreach ( $m as $mm ) {
// if the local existing member isn't in the list we just received - remove them
if ( ! in_array ( $mm [ 'xchan' ], $members [ $y [ 'hash' ]])) {
q ( " delete from group_member where xchan = '%s' and gid = %d and uid = %d " ,
dbesc ( $mm [ 'xchan' ]),
intval ( $y [ 'id' ]),
intval ( $channel [ 'channel_id' ])
);
}
}
}
}
}
}
}
if ( array_key_exists ( 'profile' , $arr ) && is_array ( $arr [ 'profile' ]) && count ( $arr [ 'profile' ])) {
$disallowed = array ( 'id' , 'aid' , 'uid' );
foreach ( $arr [ 'profile' ] as $profile ) {
$x = q ( " select * from profile where profile_guid = '%s' and uid = %d limit 1 " ,
dbesc ( $profile [ 'profile_guid' ]),
intval ( $channel [ 'channel_id' ])
);
if ( ! $x ) {
q ( " insert into profile ( profile_guid, aid, uid ) values ('%s', %d, %d) " ,
dbesc ( $profile [ 'profile_guid' ]),
intval ( $channel [ 'channel_account_id' ]),
intval ( $channel [ 'channel_id' ])
);
$x = q ( " select * from profile where profile_guid = '%s' and uid = %d limit 1 " ,
dbesc ( $profile [ 'profile_guid' ]),
intval ( $channel [ 'channel_id' ])
);
if ( ! $x )
continue ;
}
$clean = array ();
foreach ( $profile as $k => $v ) {
if ( in_array ( $k , $disallowed ))
continue ;
$clean [ $k ] = $v ;
/**
* @ TODO check if these are allowed , otherwise we ' ll error
* We also need to import local photos if a custom photo is selected
*/
}
if ( count ( $clean )) {
foreach ( $clean as $k => $v ) {
$r = dbq ( " UPDATE profile set ` " . dbesc ( $k ) . " ` = ' " . dbesc ( $v )
. " ' where profile_guid = ' " . dbesc ( $profile [ 'profile_guid' ]) . " ' and uid = " . intval ( $channel [ 'channel_id' ]));
}
}
}
}
2015-10-24 13:04:14 +02:00
if ( array_key_exists ( 'item' , $arr ) && $arr [ 'item' ])
sync_items ( $channel , $arr [ 'item' ]);
if ( array_key_exists ( 'item_id' , $arr ) && $arr [ 'item_id' ])
sync_items ( $channel , $arr [ 'item_id' ]);
$addon = array ( 'channel' => $channel , 'data' => $arr );
call_hooks ( 'process_channel_sync_delivery' , $addon );
// we should probably do this for all items, but usually we only send one.
if ( array_key_exists ( 'item' , $arr ) && is_array ( $arr [ 'item' ][ 0 ])) {
2016-03-20 08:06:33 +01:00
$DR = new Zotlabs\Zot\DReport ( z_root (), $d [ 'hash' ], $d [ 'hash' ], $arr [ 'item' ][ 0 ][ 'message_id' ], 'channel sync processed' );
2016-04-17 16:29:18 +02:00
$DR -> addto_recipient ( $channel [ 'channel_name' ] . ' <' . $channel [ 'channel_address' ] . '@' . App :: get_hostname () . '>' );
2015-10-24 13:04:14 +02:00
}
else
2016-03-20 08:06:33 +01:00
$DR = new Zotlabs\Zot\DReport ( z_root (), $d [ 'hash' ], $d [ 'hash' ], 'sync packet' , 'channel sync delivered' );
2015-10-24 13:04:14 +02:00
$result [] = $DR -> get ();
2015-08-23 22:38:18 +02:00
}
return $result ;
}
/**
* @ brief Returns path to / rpost
*
* @ todo We probably should make rpost discoverable .
*
* @ param array $observer
* * \e string \b xchan_url
* @ return string
*/
function get_rpost_path ( $observer ) {
if ( ! $observer )
return '' ;
$parsed = parse_url ( $observer [ 'xchan_url' ]);
return $parsed [ 'scheme' ] . '://' . $parsed [ 'host' ] . (( $parsed [ 'port' ]) ? ':' . $parsed [ 'port' ] : '' ) . '/rpost?f=' ;
}
/**
* @ brief
*
* @ param array $x
* @ return boolean | string return false or a hash
*/
function import_author_zot ( $x ) {
$hash = make_xchan_hash ( $x [ 'guid' ], $x [ 'guid_sig' ]);
$r = q ( " select hubloc_url from hubloc where hubloc_guid = '%s' and hubloc_guid_sig = '%s' and hubloc_primary = 1 limit 1 " ,
dbesc ( $x [ 'guid' ]),
dbesc ( $x [ 'guid_sig' ])
);
if ( $r ) {
logger ( 'import_author_zot: in cache' , LOGGER_DEBUG );
return $hash ;
}
logger ( 'import_author_zot: entry not in cache - probing: ' . print_r ( $x , true ), LOGGER_DEBUG );
$them = array ( 'hubloc_url' => $x [ 'url' ], 'xchan_guid' => $x [ 'guid' ], 'xchan_guid_sig' => $x [ 'guid_sig' ]);
if ( zot_refresh ( $them ))
return $hash ;
return false ;
}
/**
* @ brief Process a message request .
*
* If a site receives a comment to a post but finds they have no parent to attach it with , they
* may send a 'request' packet containing the message_id of the missing parent . This is the handler
* for that packet . We will create a message_list array of the entire conversation starting with
* the missing parent and invoke delivery to the sender of the packet .
*
* include / deliver . php ( for local delivery ) and mod / post . php ( for web delivery ) detect the existence of
* this 'message_list' at the destination and split it into individual messages which are
* processed / delivered in order .
*
* Called from mod / post . php
*
* @ param array $data
* @ return array
*/
2016-01-12 02:47:38 +01:00
function zot_reply_message_request ( $data ) {
2015-08-23 22:38:18 +02:00
$ret = array ( 'success' => false );
if ( ! $data [ 'message_id' ]) {
$ret [ 'message' ] = 'no message_id' ;
logger ( 'no message_id' );
2016-01-12 02:47:38 +01:00
json_return_and_die ( $ret );
2015-08-23 22:38:18 +02:00
}
$sender = $data [ 'sender' ];
$sender_hash = make_xchan_hash ( $sender [ 'guid' ], $sender [ 'guid_sig' ]);
/*
* Find the local channel in charge of this post ( the first and only recipient of the request packet )
*/
$arr = $data [ 'recipients' ][ 0 ];
$recip_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
$c = q ( " select * from channel left join xchan on channel_hash = xchan_hash where channel_hash = '%s' limit 1 " ,
dbesc ( $recip_hash )
);
if ( ! $c ) {
logger ( 'recipient channel not found.' );
$ret [ 'message' ] .= 'recipient not found.' . EOL ;
2016-01-12 02:47:38 +01:00
json_return_and_die ( $ret );
2015-08-23 22:38:18 +02:00
}
/*
* fetch the requested conversation
*/
$messages = zot_feed ( $c [ 0 ][ 'channel_id' ], $sender_hash , array ( 'message_id' => $data [ 'message_id' ]));
if ( $messages ) {
$env_recips = null ;
2016-01-12 02:47:38 +01:00
$r = q ( " select * from hubloc where hubloc_hash = '%s' and hubloc_error = 0 and hubloc_deleted = 0
2015-08-23 22:38:18 +02:00
group by hubloc_sitekey " ,
dbesc ( $sender_hash )
);
if ( ! $r ) {
logger ( 'no hubs' );
2016-01-12 02:47:38 +01:00
json_return_and_die ( $ret );
2015-08-23 22:38:18 +02:00
}
$hubs = $r ;
$private = (( array_key_exists ( 'flags' , $messages [ 0 ]) && in_array ( 'private' , $messages [ 0 ][ 'flags' ])) ? true : false );
if ( $private )
$env_recips = array ( 'guid' => $sender [ 'guid' ], 'guid_sig' => $sender [ 'guid_sig' ], 'hash' => $sender_hash );
$data_packet = json_encode ( array ( 'message_list' => $messages ));
foreach ( $hubs as $hub ) {
$hash = random_string ();
/*
* create a notify packet and drop the actual message packet in the queue for pickup
*/
$n = zot_build_packet ( $c [ 0 ], 'notify' , $env_recips ,(( $private ) ? $hub [ 'hubloc_sitekey' ] : null ), $hash , array ( 'message_id' => $data [ 'message_id' ]));
2016-01-12 02:47:38 +01:00
queue_insert ( array (
'hash' => $hash ,
'account_id' => $c [ 0 ][ 'channel_account_id' ],
'channel_id' => $c [ 0 ][ 'channel_id' ],
'posturl' => $hub [ 'hubloc_callback' ],
'notify' => $n ,
'msg' => $data_packet
));
2015-08-23 22:38:18 +02:00
/*
* invoke delivery to send out the notify packet
*/
proc_run ( 'php' , 'include/deliver.php' , $hash );
}
}
$ret [ 'success' ] = true ;
2016-01-12 02:47:38 +01:00
json_return_and_die ( $ret );
2015-08-23 22:38:18 +02:00
}
2015-10-24 13:04:14 +02:00
function zotinfo ( $arr ) {
$ret = array ( 'success' => false );
$zhash = (( x ( $arr , 'guid_hash' )) ? $arr [ 'guid_hash' ] : '' );
$zguid = (( x ( $arr , 'guid' )) ? $arr [ 'guid' ] : '' );
$zguid_sig = (( x ( $arr , 'guid_sig' )) ? $arr [ 'guid_sig' ] : '' );
$zaddr = (( x ( $arr , 'address' )) ? $arr [ 'address' ] : '' );
$ztarget = (( x ( $arr , 'target' )) ? $arr [ 'target' ] : '' );
$zsig = (( x ( $arr , 'target_sig' )) ? $arr [ 'target_sig' ] : '' );
$zkey = (( x ( $arr , 'key' )) ? $arr [ 'key' ] : '' );
$mindate = (( x ( $arr , 'mindate' )) ? $arr [ 'mindate' ] : '' );
$feed = (( x ( $arr , 'feed' )) ? intval ( $arr [ 'feed' ]) : 0 );
if ( $ztarget ) {
if (( ! $zkey ) || ( ! $zsig ) || ( ! rsa_verify ( $ztarget , base64url_decode ( $zsig ), $zkey ))) {
logger ( 'zfinger: invalid target signature' );
$ret [ 'message' ] = t ( " invalid target signature " );
return ( $ret );
}
}
$r = null ;
if ( strlen ( $zhash )) {
$r = q ( " select channel.*, xchan.* from channel left join xchan on channel_hash = xchan_hash
where channel_hash = '%s' limit 1 " ,
dbesc ( $zhash )
);
}
elseif ( strlen ( $zguid ) && strlen ( $zguid_sig )) {
$r = q ( " select channel.*, xchan.* from channel left join xchan on channel_hash = xchan_hash
where channel_guid = '%s' and channel_guid_sig = '%s' limit 1 " ,
dbesc ( $zguid ),
dbesc ( $zguid_sig )
);
}
elseif ( strlen ( $zaddr )) {
if ( strpos ( $zaddr , '[system]' ) === false ) { /* normal address lookup */
$r = q ( " select channel.*, xchan.* from channel left join xchan on channel_hash = xchan_hash
where ( channel_address = '%s' or xchan_addr = '%s' ) limit 1 " ,
dbesc ( $zaddr ),
dbesc ( $zaddr )
);
}
else {
/**
* The special address '[system]' will return a system channel if one has been defined ,
* Or the first valid channel we find if there are no system channels .
*
* This is used by magic - auth if we have no prior communications with this site - and
* returns an identity on this site which we can use to create a valid hub record so that
* we can exchange signed messages . The precise identity is irrelevant . It ' s the hub
* information that we really need at the other end - and this will return it .
*
*/
$r = q ( " select channel.*, xchan.* from channel left join xchan on channel_hash = xchan_hash
where channel_system = 1 order by channel_id limit 1 " );
if ( ! $r ) {
$r = q ( " select channel.*, xchan.* from channel left join xchan on channel_hash = xchan_hash
where channel_removed = 0 order by channel_id limit 1 " );
}
}
}
else {
$ret [ 'message' ] = 'Invalid request' ;
return ( $ret );
}
if ( ! $r ) {
$ret [ 'message' ] = 'Item not found.' ;
return ( $ret );
}
$e = $r [ 0 ];
$id = $e [ 'channel_id' ];
$sys_channel = ( intval ( $e [ 'channel_system' ]) ? true : false );
$special_channel = (( $e [ 'channel_pageflags' ] & PAGE_PREMIUM ) ? true : false );
$adult_channel = (( $e [ 'channel_pageflags' ] & PAGE_ADULT ) ? true : false );
$censored = (( $e [ 'channel_pageflags' ] & PAGE_CENSORED ) ? true : false );
$searchable = (( $e [ 'channel_pageflags' ] & PAGE_HIDDEN ) ? false : true );
$deleted = ( intval ( $e [ 'xchan_deleted' ]) ? true : false );
if ( $deleted || $censored || $sys_channel )
$searchable = false ;
$public_forum = false ;
$role = get_pconfig ( $e [ 'channel_id' ], 'system' , 'permissions_role' );
if ( $role === 'forum' || $role === 'repository' ) {
$public_forum = true ;
}
else {
// check if it has characteristics of a public forum based on custom permissions.
$t = q ( " select abook_my_perms from abook where abook_channel = %d and abook_self = 1 limit 1 " ,
intval ( $e [ 'channel_id' ])
);
if (( $t ) && (( $t [ 0 ][ 'abook_my_perms' ] & PERMS_W_TAGWALL ) && ( ! ( $t [ 0 ][ 'abook_my_perms' ] & PERMS_W_STREAM ))))
$public_forum = true ;
}
// This is for birthdays and keywords, but must check access permissions
$p = q ( " select * from profile where uid = %d and is_default = 1 " ,
intval ( $e [ 'channel_id' ])
);
$profile = array ();
if ( $p ) {
if ( ! intval ( $p [ 0 ][ 'publish' ]))
$searchable = false ;
$profile [ 'description' ] = $p [ 0 ][ 'pdesc' ];
$profile [ 'birthday' ] = $p [ 0 ][ 'dob' ];
if (( $profile [ 'birthday' ] != '0000-00-00' ) && (( $bd = z_birthday ( $p [ 0 ][ 'dob' ], $e [ 'channel_timezone' ])) !== '' ))
$profile [ 'next_birthday' ] = $bd ;
if ( $age = age ( $p [ 0 ][ 'dob' ], $e [ 'channel_timezone' ], '' ))
$profile [ 'age' ] = $age ;
$profile [ 'gender' ] = $p [ 0 ][ 'gender' ];
$profile [ 'marital' ] = $p [ 0 ][ 'marital' ];
$profile [ 'sexual' ] = $p [ 0 ][ 'sexual' ];
$profile [ 'locale' ] = $p [ 0 ][ 'locality' ];
$profile [ 'region' ] = $p [ 0 ][ 'region' ];
$profile [ 'postcode' ] = $p [ 0 ][ 'postal_code' ];
$profile [ 'country' ] = $p [ 0 ][ 'country_name' ];
$profile [ 'about' ] = $p [ 0 ][ 'about' ];
$profile [ 'homepage' ] = $p [ 0 ][ 'homepage' ];
$profile [ 'hometown' ] = $p [ 0 ][ 'hometown' ];
if ( $p [ 0 ][ 'keywords' ]) {
$tags = array ();
$k = explode ( ' ' , $p [ 0 ][ 'keywords' ]);
if ( $k ) {
foreach ( $k as $kk ) {
if ( trim ( $kk , " \t \n \r \0 \x0B , " )) {
$tags [] = trim ( $kk , " \t \n \r \0 \x0B , " );
}
}
}
if ( $tags )
$profile [ 'keywords' ] = $tags ;
}
}
$ret [ 'success' ] = true ;
// Communication details
$ret [ 'guid' ] = $e [ 'xchan_guid' ];
$ret [ 'guid_sig' ] = $e [ 'xchan_guid_sig' ];
$ret [ 'key' ] = $e [ 'xchan_pubkey' ];
$ret [ 'name' ] = $e [ 'xchan_name' ];
$ret [ 'name_updated' ] = $e [ 'xchan_name_date' ];
$ret [ 'address' ] = $e [ 'xchan_addr' ];
$ret [ 'photo_mimetype' ] = $e [ 'xchan_photo_mimetype' ];
$ret [ 'photo' ] = $e [ 'xchan_photo_l' ];
$ret [ 'photo_updated' ] = $e [ 'xchan_photo_date' ];
$ret [ 'url' ] = $e [ 'xchan_url' ];
$ret [ 'connections_url' ] = (( $e [ 'xchan_connurl' ]) ? $e [ 'xchan_connurl' ] : z_root () . '/poco/' . $e [ 'channel_address' ]);
$ret [ 'target' ] = $ztarget ;
$ret [ 'target_sig' ] = $zsig ;
$ret [ 'searchable' ] = $searchable ;
$ret [ 'adult_content' ] = $adult_channel ;
$ret [ 'public_forum' ] = $public_forum ;
if ( $deleted )
$ret [ 'deleted' ] = $deleted ;
2015-11-15 19:51:39 +01:00
if ( intval ( $e [ 'channel_removed' ]))
$ret [ 'deleted_locally' ] = true ;
2015-10-24 13:04:14 +02:00
// premium or other channel desiring some contact with potential followers before connecting.
// This is a template - %s will be replaced with the follow_url we discover for the return channel.
if ( $special_channel )
$ret [ 'connect_url' ] = z_root () . '/connect/' . $e [ 'channel_address' ];
// This is a template for our follow url, %s will be replaced with a webbie
$ret [ 'follow_url' ] = z_root () . '/follow?f=&url=%s' ;
$ztarget_hash = (( $ztarget && $zsig )
? make_xchan_hash ( $ztarget , $zsig )
: '' );
$permissions = get_all_perms ( $e [ 'channel_id' ], $ztarget_hash , false );
if ( $ztarget_hash ) {
$permissions [ 'connected' ] = false ;
$b = q ( " select * from abook where abook_xchan = '%s' and abook_channel = %d limit 1 " ,
dbesc ( $ztarget_hash ),
intval ( $e [ 'channel_id' ])
);
if ( $b )
$permissions [ 'connected' ] = true ;
}
$ret [ 'permissions' ] = (( $ztarget && $zkey ) ? crypto_encapsulate ( json_encode ( $permissions ), $zkey ) : $permissions );
if ( $permissions [ 'view_profile' ])
$ret [ 'profile' ] = $profile ;
// array of (verified) hubs this channel uses
$x = zot_encode_locations ( $e );
if ( $x )
$ret [ 'locations' ] = $x ;
$ret [ 'site' ] = array ();
$ret [ 'site' ][ 'url' ] = z_root ();
$ret [ 'site' ][ 'url_sig' ] = base64url_encode ( rsa_sign ( z_root (), $e [ 'channel_prvkey' ]));
2016-01-12 02:47:38 +01:00
$ret [ 'site' ][ 'zot_auth' ] = z_root () . '/magic' ;
2015-10-24 13:04:14 +02:00
$dirmode = get_config ( 'system' , 'directory_mode' );
if (( $dirmode === false ) || ( $dirmode == DIRECTORY_MODE_NORMAL ))
$ret [ 'site' ][ 'directory_mode' ] = 'normal' ;
if ( $dirmode == DIRECTORY_MODE_PRIMARY )
$ret [ 'site' ][ 'directory_mode' ] = 'primary' ;
elseif ( $dirmode == DIRECTORY_MODE_SECONDARY )
$ret [ 'site' ][ 'directory_mode' ] = 'secondary' ;
elseif ( $dirmode == DIRECTORY_MODE_STANDALONE )
$ret [ 'site' ][ 'directory_mode' ] = 'standalone' ;
if ( $dirmode != DIRECTORY_MODE_NORMAL )
$ret [ 'site' ][ 'directory_url' ] = z_root () . '/dirsearch' ;
// hide detailed site information if you're off the grid
if ( $dirmode != DIRECTORY_MODE_STANDALONE ) {
$register_policy = intval ( get_config ( 'system' , 'register_policy' ));
if ( $register_policy == REGISTER_CLOSED )
$ret [ 'site' ][ 'register_policy' ] = 'closed' ;
if ( $register_policy == REGISTER_APPROVE )
$ret [ 'site' ][ 'register_policy' ] = 'approve' ;
if ( $register_policy == REGISTER_OPEN )
$ret [ 'site' ][ 'register_policy' ] = 'open' ;
$access_policy = intval ( get_config ( 'system' , 'access_policy' ));
if ( $access_policy == ACCESS_PRIVATE )
$ret [ 'site' ][ 'access_policy' ] = 'private' ;
if ( $access_policy == ACCESS_PAID )
$ret [ 'site' ][ 'access_policy' ] = 'paid' ;
if ( $access_policy == ACCESS_FREE )
$ret [ 'site' ][ 'access_policy' ] = 'free' ;
if ( $access_policy == ACCESS_TIERED )
$ret [ 'site' ][ 'access_policy' ] = 'tiered' ;
$ret [ 'site' ][ 'accounts' ] = account_total ();
require_once ( 'include/identity.php' );
$ret [ 'site' ][ 'channels' ] = channel_total ();
2016-03-20 08:06:33 +01:00
$ret [ 'site' ][ 'version' ] = Zotlabs\Project\System :: get_platform_name () . ' ' . RED_VERSION . '[' . DB_UPDATE_VERSION . ']' ;
2015-10-24 13:04:14 +02:00
$ret [ 'site' ][ 'admin' ] = get_config ( 'system' , 'admin_email' );
$a = get_app ();
$visible_plugins = array ();
2016-04-17 16:29:18 +02:00
if ( is_array ( App :: $plugins ) && count ( App :: $plugins )) {
2015-10-24 13:04:14 +02:00
$r = q ( " select * from addon where hidden = 0 " );
if ( $r )
foreach ( $r as $rr )
$visible_plugins [] = $rr [ 'name' ];
}
$ret [ 'site' ][ 'plugins' ] = $visible_plugins ;
$ret [ 'site' ][ 'sitehash' ] = get_config ( 'system' , 'location_hash' );
$ret [ 'site' ][ 'sitename' ] = get_config ( 'system' , 'sitename' );
$ret [ 'site' ][ 'sellpage' ] = get_config ( 'system' , 'sellpage' );
$ret [ 'site' ][ 'location' ] = get_config ( 'system' , 'site_location' );
$ret [ 'site' ][ 'realm' ] = get_directory_realm ();
2016-03-20 08:06:33 +01:00
$ret [ 'site' ][ 'project' ] = Zotlabs\Project\System :: get_platform_name ();
2015-10-24 13:04:14 +02:00
}
check_zotinfo ( $e , $x , $ret );
call_hooks ( 'zot_finger' , $ret );
return ( $ret );
}
function check_zotinfo ( $channel , $locations , & $ret ) {
2016-01-12 02:47:38 +01:00
// logger('locations: ' . print_r($locations,true),LOGGER_DATA, LOG_DEBUG);
2015-10-24 13:04:14 +02:00
// This function will likely expand as we find more things to detect and fix.
// 1. Because magic-auth is reliant on it, ensure that the system channel has a valid hubloc
// Force this to be the case if anything is found to be wrong with it.
// @FIXME ensure that the system channel exists in the first place and has an xchan
if ( $channel [ 'channel_system' ]) {
// the sys channel must have a location (hubloc)
$valid_location = false ;
if (( count ( $locations ) === 1 ) && ( $locations [ 0 ][ 'primary' ]) && ( ! $locations [ 0 ][ 'deleted' ])) {
if (( rsa_verify ( $locations [ 0 ][ 'url' ], base64url_decode ( $locations [ 0 ][ 'url_sig' ]), $channel [ 'channel_pubkey' ]))
&& ( $locations [ 0 ][ 'sitekey' ] === get_config ( 'system' , 'pubkey' ))
&& ( $locations [ 0 ][ 'url' ] === z_root ()))
$valid_location = true ;
else
logger ( 'sys channel: invalid url signature' );
}
if (( ! $locations ) || ( ! $valid_location )) {
logger ( 'System channel locations are not valid. Attempting repair.' );
// Don't trust any existing records. Just get rid of them, but only do this
// for the sys channel as normal channels will be trickier.
q ( " delete from hubloc where hubloc_hash = '%s' " ,
dbesc ( $channel [ 'channel_hash' ])
);
$r = q ( " insert into hubloc ( hubloc_guid, hubloc_guid_sig, hubloc_hash, hubloc_addr, hubloc_primary,
hubloc_url , hubloc_url_sig , hubloc_host , hubloc_callback , hubloc_sitekey , hubloc_network )
values ( '%s' , '%s' , '%s' , '%s' , % d , '%s' , '%s' , '%s' , '%s' , '%s' , '%s' ) " ,
dbesc ( $channel [ 'channel_guid' ]),
dbesc ( $channel [ 'channel_guid_sig' ]),
dbesc ( $channel [ 'channel_hash' ]),
2016-04-17 16:29:18 +02:00
dbesc ( $channel [ 'channel_address' ] . '@' . App :: get_hostname ()),
2015-10-24 13:04:14 +02:00
intval ( 1 ),
dbesc ( z_root ()),
dbesc ( base64url_encode ( rsa_sign ( z_root (), $channel [ 'channel_prvkey' ]))),
2016-04-17 16:29:18 +02:00
dbesc ( App :: get_hostname ()),
2015-10-24 13:04:14 +02:00
dbesc ( z_root () . '/post' ),
dbesc ( get_config ( 'system' , 'pubkey' )),
dbesc ( 'zot' )
);
if ( $r ) {
$x = zot_encode_locations ( $channel );
if ( $x ) {
$ret [ 'locations' ] = $x ;
}
}
else {
logger ( 'Unable to store sys hub location' );
}
}
}
}
function delivery_report_is_storable ( $dr ) {
2016-02-28 12:11:12 +01:00
if ( get_config ( 'system' , 'disable_dreport' ))
return false ;
2015-10-24 13:04:14 +02:00
call_hooks ( 'dreport_is_storable' , $dr );
// let plugins accept or reject - if neither, continue on
if ( array_key_exists ( 'accept' , $dr ) && intval ( $dr [ 'accept' ]))
return true ;
if ( array_key_exists ( 'reject' , $dr ) && intval ( $dr [ 'reject' ]))
return false ;
if ( ! ( $dr [ 'sender' ]))
return false ;
// Is the sender one of our channels?
$c = q ( " select channel_id from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $dr [ 'sender' ])
);
if ( ! $c )
return false ;
2015-12-06 02:08:25 +01:00
2015-10-24 13:04:14 +02:00
// is the recipient one of our connections, or do we want to store every report?
$r = explode ( ' ' , $dr [ 'recipient' ]);
$rxchan = $r [ 0 ];
$pcf = get_pconfig ( $c [ 0 ][ 'channel_id' ], 'system' , 'dreport_store_all' );
if ( $pcf )
return true ;
2015-12-06 02:08:25 +01:00
// We always add ourself as a recipient to private and relayed posts
// So if a remote site says they can't find us, that's no big surprise
// and just creates a lot of extra report noise
if (( $dr [ 'location' ] !== z_root ()) && ( $dr [ 'sender' ] === $rxchan ) && ( $dr [ 'status' ] === 'recipient_not_found' ))
return false ;
2015-10-24 13:04:14 +02:00
$r = q ( " select abook_id from abook where abook_xchan = '%s' and abook_channel = %d limit 1 " ,
dbesc ( $rxchan ),
intval ( $c [ 0 ][ 'channel_id' ])
);
if ( $r )
return true ;
return false ;
}
2016-01-12 02:47:38 +01:00
function update_hub_connected ( $hub , $sitekey = '' ) {
if ( $sitekey ) {
/*
* This hub has now been proven to be valid .
* Any hub with the same URL and a different sitekey cannot be valid .
* Get rid of them ( mark them deleted ) . There ' s a good chance they were re - installs .
*/
q ( " update hubloc set hubloc_deleted = 1, hubloc_error = 1 where hubloc_url = '%s' and hubloc_sitekey != '%s' " ,
dbesc ( $hub [ 'hubloc_url' ]),
dbesc ( $sitekey )
);
}
else {
$sitekey = $hub [ 'sitekey' ];
}
// $sender['sitekey'] is a new addition to the protcol to distinguish
// hublocs coming from re-installed sites. Older sites will not provide
// this field and we have to still mark them valid, since we can't tell
// if this hubloc has the same sitekey as the packet we received.
// Update our DB to show when we last communicated successfully with this hub
// This will allow us to prune dead hubs from using up resources
$r = q ( " update hubloc set hubloc_connected = '%s' where hubloc_id = %d and hubloc_sitekey = '%s' " ,
dbesc ( datetime_convert ()),
intval ( $hub [ 'hubloc_id' ]),
dbesc ( $sitekey )
);
// a dead hub came back to life - reset any tombstones we might have
if ( intval ( $hub [ 'hubloc_error' ])) {
q ( " update hubloc set hubloc_error = 0 where hubloc_id = %d and hubloc_sitekey = '%s' " ,
intval ( $hub [ 'hubloc_id' ]),
dbesc ( $sitekey )
);
if ( intval ( $r [ 0 ][ 'hubloc_orphancheck' ])) {
q ( " update hubloc set hubloc_orhpancheck = 0 where hubloc_id = %d and hubloc_sitekey = '%s' " ,
intval ( $hub [ 'hubloc_id' ]),
dbesc ( $sitekey )
);
}
q ( " update xchan set xchan_orphan = 0 where xchan_orphan = 1 and xchan_hash = '%s' " ,
dbesc ( $hub [ 'hubloc_hash' ])
);
}
return $hub [ 'hubloc_url' ];
}
function zot_reply_ping () {
$ret = array ( 'success' => false );
// Useful to get a health check on a remote site.
// This will let us know if any important communication details
// that we may have stored are no longer valid, regardless of xchan details.
logger ( 'POST: got ping send pong now back: ' . z_root () , LOGGER_DEBUG );
$ret [ 'success' ] = true ;
$ret [ 'site' ] = array ();
$ret [ 'site' ][ 'url' ] = z_root ();
$ret [ 'site' ][ 'url_sig' ] = base64url_encode ( rsa_sign ( z_root (), get_config ( 'system' , 'prvkey' )));
$ret [ 'site' ][ 'sitekey' ] = get_config ( 'system' , 'pubkey' );
json_return_and_die ( $ret );
}
function zot_reply_pickup ( $data ) {
$ret = array ( 'success' => false );
/*
* The 'pickup' message arrives with a tracking ID which is associated with a particular outq_hash
* First verify that that the returned signatures verify , then check that we have an outbound queue item
* with the correct hash .
* If everything verifies , find any / all outbound messages in the queue for this hubloc and send them back
*/
if (( ! $data [ 'secret' ]) || ( ! $data [ 'secret_sig' ])) {
$ret [ 'message' ] = 'no verification signature' ;
logger ( 'mod_zot: pickup: ' . $ret [ 'message' ], LOGGER_DEBUG );
json_return_and_die ( $ret );
}
$r = q ( " select distinct hubloc_sitekey from hubloc where hubloc_url = '%s' and hubloc_callback = '%s' and hubloc_sitekey != '' group by hubloc_sitekey " ,
dbesc ( $data [ 'url' ]),
dbesc ( $data [ 'callback' ])
);
if ( ! $r ) {
$ret [ 'message' ] = 'site not found' ;
logger ( 'mod_zot: pickup: ' . $ret [ 'message' ]);
json_return_and_die ( $ret );
}
foreach ( $r as $hubsite ) {
// verify the url_sig
// If the server was re-installed at some point, there could be multiple hubs with the same url and callback.
// Only one will have a valid key.
$forgery = true ;
$secret_fail = true ;
$sitekey = $hubsite [ 'hubloc_sitekey' ];
logger ( 'mod_zot: Checking sitekey: ' . $sitekey , LOGGER_DATA , LOG_DEBUG );
if ( rsa_verify ( $data [ 'callback' ], base64url_decode ( $data [ 'callback_sig' ]), $sitekey )) {
$forgery = false ;
}
if ( rsa_verify ( $data [ 'secret' ], base64url_decode ( $data [ 'secret_sig' ]), $sitekey )) {
$secret_fail = false ;
}
if (( ! $forgery ) && ( ! $secret_fail ))
break ;
}
if ( $forgery ) {
$ret [ 'message' ] = 'possible site forgery' ;
logger ( 'mod_zot: pickup: ' . $ret [ 'message' ]);
json_return_and_die ( $ret );
}
if ( $secret_fail ) {
$ret [ 'message' ] = 'secret validation failed' ;
logger ( 'mod_zot: pickup: ' . $ret [ 'message' ]);
json_return_and_die ( $ret );
}
/*
* If we made it to here , the signatures verify , but we still don ' t know if the tracking ID is valid .
* It wouldn 't be an error if the tracking ID isn' t found , because we may have sent this particular
* queue item with another pickup ( after the tracking ID for the other pickup was verified ) .
*/
$r = q ( " select outq_posturl from outq where outq_hash = '%s' and outq_posturl = '%s' limit 1 " ,
dbesc ( $data [ 'secret' ]),
dbesc ( $data [ 'callback' ])
);
if ( ! $r ) {
$ret [ 'message' ] = 'nothing to pick up' ;
logger ( 'mod_zot: pickup: ' . $ret [ 'message' ]);
json_return_and_die ( $ret );
}
/*
* Everything is good if we made it here , so find all messages that are going to this location
* and send them all .
*/
$r = q ( " select * from outq where outq_posturl = '%s' " ,
dbesc ( $data [ 'callback' ])
);
if ( $r ) {
logger ( 'mod_zot: successful pickup message received from ' . $data [ 'callback' ] . ' ' . count ( $r ) . ' message(s) picked up' , LOGGER_DEBUG );
$ret [ 'success' ] = true ;
$ret [ 'pickup' ] = array ();
foreach ( $r as $rr ) {
if ( $rr [ 'outq_msg' ]) {
$x = json_decode ( $rr [ 'outq_msg' ], true );
if ( ! $x )
continue ;
if ( is_array ( $x ) && array_key_exists ( 'message_list' , $x )) {
foreach ( $x [ 'message_list' ] as $xx ) {
$ret [ 'pickup' ][] = array ( 'notify' => json_decode ( $rr [ 'outq_notify' ], true ), 'message' => $xx );
}
}
else
$ret [ 'pickup' ][] = array ( 'notify' => json_decode ( $rr [ 'outq_notify' ], true ), 'message' => $x );
remove_queue_item ( $rr [ 'outq_hash' ]);
}
}
}
$encrypted = crypto_encapsulate ( json_encode ( $ret ), $sitekey );
json_return_and_die ( $encrypted );
/* pickup: end */
}
function zot_reply_auth_check ( $data , $encrypted_packet ) {
$ret = array ( 'success' => false );
/*
* Requestor visits / magic / ? dest = somewhere on their own site with a browser
* magic redirects them to $destsite / post [ with auth args .... ]
* $destsite sends an auth_check packet to originator site
* The auth_check packet is handled here by the originator ' s site
* - the browser session is still waiting
* inside $destsite / post for everything to verify
* If everything checks out we ' ll return a token to $destsite
* and then $destsite will verify the token , authenticate the browser
* session and then redirect to the original destination .
* If authentication fails , the redirection to the original destination
* will still take place but without authentication .
*/
logger ( 'mod_zot: auth_check' , LOGGER_DEBUG );
if ( ! $encrypted_packet ) {
logger ( 'mod_zot: auth_check packet was not encrypted.' );
$ret [ 'message' ] .= 'no packet encryption' . EOL ;
json_return_and_die ( $ret );
}
$arr = $data [ 'sender' ];
$sender_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
// garbage collect any old unused notifications
// This was and should be 10 minutes but my hosting provider has time lag between the DB and
// the web server. We should probably convert this to webserver time rather than DB time so
// that the different clocks won't affect it and allow us to keep the time short.
2016-04-17 16:29:18 +02:00
Zotlabs\Zot\Verify :: purge ( 'auth' , '30 MINUTE' );
2016-01-12 02:47:38 +01:00
$y = q ( " select xchan_pubkey from xchan where xchan_hash = '%s' limit 1 " ,
dbesc ( $sender_hash )
);
// We created a unique hash in mod/magic.php when we invoked remote auth, and stored it in
// the verify table. It is now coming back to us as 'secret' and is signed by a channel at the other end.
// First verify their signature. We will have obtained a zot-info packet from them as part of the sender
// verification.
if (( ! $y ) || ( ! rsa_verify ( $data [ 'secret' ], base64url_decode ( $data [ 'secret_sig' ]), $y [ 0 ][ 'xchan_pubkey' ]))) {
logger ( 'mod_zot: auth_check: sender not found or secret_sig invalid.' );
$ret [ 'message' ] .= 'sender not found or sig invalid ' . print_r ( $y , true ) . EOL ;
json_return_and_die ( $ret );
}
// There should be exactly one recipient, the original auth requestor
$ret [ 'message' ] .= 'recipients ' . print_r ( $recipients , true ) . EOL ;
if ( $data [ 'recipients' ]) {
$arr = $data [ 'recipients' ][ 0 ];
$recip_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
$c = q ( " select channel_id, channel_account_id, channel_prvkey from channel where channel_hash = '%s' limit 1 " ,
dbesc ( $recip_hash )
);
if ( ! $c ) {
logger ( 'mod_zot: auth_check: recipient channel not found.' );
$ret [ 'message' ] .= 'recipient not found.' . EOL ;
json_return_and_die ( $ret );
}
$confirm = base64url_encode ( rsa_sign ( $data [ 'secret' ] . $recip_hash , $c [ 0 ][ 'channel_prvkey' ]));
// This additionally checks for forged sites since we already stored the expected result in meta
// and we've already verified that this is them via zot_gethub() and that their key signed our token
2016-04-17 16:29:18 +02:00
$z = Zotlabs\Zot\Verify :: match ( 'auth' , $c [ 0 ][ 'channel_id' ], $data [ 'secret' ], $data [ 'sender' ][ 'url' ]);
2016-01-12 02:47:38 +01:00
if ( ! $z ) {
logger ( 'mod_zot: auth_check: verification key not found.' );
$ret [ 'message' ] .= 'verification key not found' . EOL ;
json_return_and_die ( $ret );
}
$u = q ( " select account_service_class from account where account_id = %d limit 1 " ,
intval ( $c [ 0 ][ 'channel_account_id' ])
);
logger ( 'mod_zot: auth_check: success' , LOGGER_DEBUG );
$ret [ 'success' ] = true ;
$ret [ 'confirm' ] = $confirm ;
if ( $u && $u [ 0 ][ 'account_service_class' ])
$ret [ 'service_class' ] = $u [ 0 ][ 'account_service_class' ];
// Set "do not track" flag if this site or this channel's profile is restricted
// in some way
if ( intval ( get_config ( 'system' , 'block_public' )))
$ret [ 'DNT' ] = true ;
if ( ! perm_is_allowed ( $c [ 0 ][ 'channel_id' ], '' , 'view_profile' ))
$ret [ 'DNT' ] = true ;
if ( get_pconfig ( $c [ 0 ][ 'channel_id' ], 'system' , 'do_not_track' ))
$ret [ 'DNT' ] = true ;
if ( get_pconfig ( $c [ 0 ][ 'channel_id' ], 'system' , 'hide_online_status' ))
$ret [ 'DNT' ] = true ;
json_return_and_die ( $ret );
}
json_return_and_die ( $ret );
}
function zot_reply_purge ( $sender , $recipients ) {
$ret = array ( 'success' => false );
if ( $recipients ) {
// basically this means "unfriend"
foreach ( $recipients as $recip ) {
$r = q ( " select channel.*,xchan.* from channel
left join xchan on channel_hash = xchan_hash
where channel_guid = '%s' and channel_guid_sig = '%s' limit 1 " ,
dbesc ( $recip [ 'guid' ]),
dbesc ( $recip [ 'guid_sig' ])
);
if ( $r ) {
$r = q ( " select abook_id from abook where uid = %d and abook_xchan = '%s' limit 1 " ,
intval ( $r [ 0 ][ 'channel_id' ]),
dbesc ( make_xchan_hash ( $sender [ 'guid' ], $sender [ 'guid_sig' ]))
);
if ( $r ) {
contact_remove ( $r [ 0 ][ 'channel_id' ], $r [ 0 ][ 'abook_id' ]);
}
}
}
$ret [ 'success' ] = true ;
}
else {
// Unfriend everybody - basically this means the channel has committed suicide
$arr = $sender ;
$sender_hash = make_xchan_hash ( $arr [ 'guid' ], $arr [ 'guid_sig' ]);
require_once ( 'include/Contact.php' );
remove_all_xchan_resources ( $sender_hash );
$ret [ 'success' ] = true ;
}
json_return_and_die ( $ret );
}
function zot_reply_refresh ( $sender , $recipients ) {
$ret = array ( 'success' => false );
// remote channel info (such as permissions or photo or something)
// has been updated. Grab a fresh copy and sync it.
// The difference between refresh and force_refresh is that
// force_refresh unconditionally creates a directory update record,
// even if no changes were detected upon processing.
if ( $recipients ) {
// This would be a permissions update, typically for one connection
foreach ( $recipients as $recip ) {
$r = q ( " select channel.*,xchan.* from channel
left join xchan on channel_hash = xchan_hash
where channel_guid = '%s' and channel_guid_sig = '%s' limit 1 " ,
dbesc ( $recip [ 'guid' ]),
dbesc ( $recip [ 'guid_sig' ])
);
$x = zot_refresh ( array (
'xchan_guid' => $sender [ 'guid' ],
'xchan_guid_sig' => $sender [ 'guid_sig' ],
'hubloc_url' => $sender [ 'url' ]
), $r [ 0 ], (( $msgtype === 'force_refresh' ) ? true : false ));
}
}
else {
// system wide refresh
$x = zot_refresh ( array (
'xchan_guid' => $sender [ 'guid' ],
'xchan_guid_sig' => $sender [ 'guid_sig' ],
'hubloc_url' => $sender [ 'url' ]
), null , (( $msgtype === 'force_refresh' ) ? true : false ));
}
$ret [ 'success' ] = true ;
json_return_and_die ( $ret );
}
function zot_reply_notify ( $data ) {
$ret = array ( 'success' => false );
logger ( 'notify received from ' . $data [ 'sender' ][ 'url' ]);
$async = get_config ( 'system' , 'queued_fetch' );
if ( $async ) {
// add to receive queue
// qreceive_add($data);
}
else {
$x = zot_fetch ( $data );
$ret [ 'delivery_report' ] = $x ;
}
$ret [ 'success' ] = true ;
json_return_and_die ( $ret );
}