diff options
Diffstat (limited to 'mod/twitter_api')
20 files changed, 2203 insertions, 0 deletions
| diff --git a/mod/twitter_api/actions/twitter_api/interstitial_settings.php b/mod/twitter_api/actions/twitter_api/interstitial_settings.php new file mode 100644 index 000000000..880623973 --- /dev/null +++ b/mod/twitter_api/actions/twitter_api/interstitial_settings.php @@ -0,0 +1,53 @@ +<?php +/** + * Save settings for first time logins with twitter + */ +elgg_make_sticky_form('twitter_api_interstitial'); + +$display_name = get_input('display_name'); +$email = get_input('email'); +$password_1 = get_input('password_1', null, false); +$password_2 = get_input('password_2', null, false); + +if (!$display_name) { +	register_error(elgg_echo('twitter_api:interstitial:no_display_name')); +	forward(REFERER); +} + +if ($email && !is_email_address($email)) { +	register_error(elgg_echo('twitter_api:interstitial:invalid_email')); +	forward(REFERER); +} + +$existing_user = get_user_by_email($email); +if ($email && $existing_user) { +	register_error(elgg_echo('twitter_api:interstitial:existing_email')); +	forward(REFERER); +} + +if ($password_1 && !($password_1 == $password_2)) { +	register_error(elgg_echo('twitter_api:interstitial:password_mismatch')); +	forward(REFERER); +} + +$user = elgg_get_logged_in_user_entity(); +$user->name = $display_name; + +if ($email) { +	$user->email = $email; +} + +if ($password_1) { +	$user->salt = generate_random_cleartext_password(); +	$user->password = generate_user_password($user, $password_1); +} + +if (!$user->save()) { +	register_error(elgg_echo('twitter_api:interstitial:cannot_save')); +	forward(REFERER); +} + +elgg_clear_sticky_form('twitter_api_interstitial'); + +system_message(elgg_echo('twitter_api:interstitial:saved')); +forward('/');
\ No newline at end of file diff --git a/mod/twitter_api/graphics/sign-in-with-twitter-d.png b/mod/twitter_api/graphics/sign-in-with-twitter-d.pngBinary files differ new file mode 100644 index 000000000..b49a0ba59 --- /dev/null +++ b/mod/twitter_api/graphics/sign-in-with-twitter-d.png diff --git a/mod/twitter_api/graphics/sign-in-with-twitter-l.png b/mod/twitter_api/graphics/sign-in-with-twitter-l.pngBinary files differ new file mode 100644 index 000000000..834d43cfd --- /dev/null +++ b/mod/twitter_api/graphics/sign-in-with-twitter-l.png diff --git a/mod/twitter_api/graphics/sign_in_with_twitter.gif b/mod/twitter_api/graphics/sign_in_with_twitter.gifBinary files differ new file mode 100644 index 000000000..a686590fc --- /dev/null +++ b/mod/twitter_api/graphics/sign_in_with_twitter.gif diff --git a/mod/twitter_api/languages/en.php b/mod/twitter_api/languages/en.php new file mode 100644 index 000000000..a6f4b40a5 --- /dev/null +++ b/mod/twitter_api/languages/en.php @@ -0,0 +1,62 @@ +<?php +/** + * An english language definition file + */ + +$english = array( +	'twitter_api' => 'Twitter Services', + +	'twitter_api:requires_oauth' => 'Twitter Services requires the OAuth Libraries plugin to be enabled.', + +	'twitter_api:consumer_key' => 'Consumer Key', +	'twitter_api:consumer_secret' => 'Consumer Secret', + +	'twitter_api:settings:instructions' => 'You must obtain a consumer key and secret from <a href="https://dev.twitter.com/apps/new" target="_blank">Twitter</a>. Fill out the new app application. Select "Browser" as the application type and "Read & Write" for the access type. The callback url is %stwitter_api/authorize', + +	'twitter_api:usersettings:description' => "Link your %s account with Twitter.", +	'twitter_api:usersettings:request' => "You must first <a href=\"%s\">authorize</a> %s to access your Twitter account.", +	'twitter_api:usersettings:cannot_revoke' => "You cannot unlink you account with Twitter because you haven't provided an email address or password. <a href=\"%s\">Provide them now</a>.", +	'twitter_api:authorize:error' => 'Unable to authorize Twitter.', +	'twitter_api:authorize:success' => 'Twitter access has been authorized.', + +	'twitter_api:usersettings:authorized' => "You have authorized %s to access your Twitter account: @%s.", +	'twitter_api:usersettings:revoke' => 'Click <a href="%s">here</a> to revoke access.', +	'twitter_api:usersettings:site_not_configured' => 'An administrator must first configure Twitter before it can be used.', + +	'twitter_api:revoke:success' => 'Twitter access has been revoked.', + +	'twitter_api:post_to_twitter' => "Send users' wire posts to Twitter?", + +	'twitter_api:login' => 'Allow users to sign in with Twitter?', +	'twitter_api:new_users' => 'Allow new users to sign up using their Twitter account even if user registration is disabled?', +	'twitter_api:login:success' => 'You have been logged in.', +	'twitter_api:login:error' => 'Unable to login with Twitter.', +	'twitter_api:login:email' => "You must enter a valid email address for your new %s account.", + +	'twitter_api:invalid_page' => 'Invalid page', + +	'twitter_api:deprecated_callback_url' => 'The callback URL has changed for Twitter API to %s.  Please ask your administrator to change it.', + +	'twitter_api:interstitial:settings' => 'Configure your settings', +	'twitter_api:interstitial:description' => 'You\'re almost ready to use %s! We need a few more details before you can continue. These are optional, but will allow you login if Twitter goes down or you decide to unlink your accounts.', + +	'twitter_api:interstitial:username' => 'This is your username. It cannot be changed. If you set a password, you can use the username or your email address to log in.', + +	'twitter_api:interstitial:name' => 'This is the name people will see when interacting with you.', + +	'twitter_api:interstitial:email' => 'Your email address. Users cannot see this by default.', + +	'twitter_api:interstitial:password' => 'A password to login if Twitter is down or you decide to unlink your accounts.', +	'twitter_api:interstitial:password2' => 'The same password, again.', + +	'twitter_api:interstitial:no_thanks' => 'No thanks', + +	'twitter_api:interstitial:no_display_name' => 'You must have a display name.', +	'twitter_api:interstitial:invalid_email' => 'You must enter a valid email address or nothing.', +	'twitter_api:interstitial:existing_email' => 'This email address is already registered on this site.', +	'twitter_api:interstitial:password_mismatch' => 'Your passwords do not match.', +	'twitter_api:interstitial:cannot_save' => 'Cannot save account details.', +	'twitter_api:interstitial:saved' => 'Account details saved!', +); + +add_translation('en', $english); diff --git a/mod/twitter_api/lib/twitter_api.php b/mod/twitter_api/lib/twitter_api.php new file mode 100644 index 000000000..a7b971876 --- /dev/null +++ b/mod/twitter_api/lib/twitter_api.php @@ -0,0 +1,383 @@ +<?php +/** + * Common library of functions used by Twitter Services. + * + * @package twitter_api + */ + +/** + * Get the API wrapper object + *  + * @param string $oauth_token        User's OAuth token + * @param string $oauth_token_secret User's OAuth secret + * @return TwitterOAuth|null + */ +function twitter_api_get_api_object($oauth_token = null, $oauth_token_secret = null) { +	$consumer_key = elgg_get_plugin_setting('consumer_key', 'twitter_api'); +	$consumer_secret = elgg_get_plugin_setting('consumer_secret', 'twitter_api'); +	if (!($consumer_key && $consumer_secret)) { +		return null; +	} + +	$api = new TwitterOAuth($consumer_key, $consumer_secret, $oauth_token, $oauth_token_secret); +	if ($api) { +		$api->host = "https://api.twitter.com/1.1/"; +	} +	return $api; +} + +/** + * Tests if the system admin has enabled Sign-On-With-Twitter + * + * @param void + * @return bool + */ +function twitter_api_allow_sign_on_with_twitter() { +	if (!$consumer_key = elgg_get_plugin_setting('consumer_key', 'twitter_api')) { +		return FALSE; +	} + +	if (!$consumer_secret = elgg_get_plugin_setting('consumer_secret', 'twitter_api')) { +		return FALSE; +	} + +	return elgg_get_plugin_setting('sign_on', 'twitter_api') == 'yes'; +} + +/** + * Forwards the user to twitter to authenticate + * + * This includes the login URL as the callback + */ +function twitter_api_forward() { +	global $SESSION; + +	// sanity check +	if (!twitter_api_allow_sign_on_with_twitter()) { +		forward(); +	} + +	$callback = elgg_normalize_url("twitter_api/login"); +	$request_link = twitter_api_get_authorize_url($callback); + +	// capture metadata about login to persist through redirects +	$login_metadata = array( +		'persistent' => (bool) get_input("persistent"), +	); +	// capture referrer if in site, but not the twitter_api +	if (!empty($SESSION['last_forward_from'])) { +		$login_metadata['forward'] = $SESSION['last_forward_from']; +	} elseif (!empty($_SERVER['HTTP_REFERER']) +			&& 0 === strpos($_SERVER['HTTP_REFERER'], elgg_get_site_url()) +			&& 0 !== strpos($_SERVER['HTTP_REFERER'], elgg_get_site_url() . 'twitter_api/')) { +		$login_metadata['forward'] = $_SERVER['HTTP_REFERER']; +	} +	$SESSION['twitter_api_login_metadata'] = $login_metadata; + +	forward($request_link, 'twitter_api'); +} + +/** + * Log in a user referred from Twitter's OAuth API + * + * If the user has already linked their account with Twitter, it is a seamless + * login. If this is a first time login (or a user from deprecated twitter login + * plugin), we create a new account (update the account). + * + * If a plugin wants to be notified when someone logs in with twitter or a new + * twitter user signs up, register for the standard login or create user events + * and check for 'twitter_api' context. + * + * The user has to be redirected from Twitter for this to work. It depends on + * the Twitter OAuth data. + */ +function twitter_api_login() { +	/* @var ElggSession $SESSION */ +	global $SESSION; + +	// sanity check +	if (!twitter_api_allow_sign_on_with_twitter()) { +		forward(); +	} + +	$token = twitter_api_get_access_token(get_input('oauth_verifier')); + +	$persistent = false; +	$forward = ''; + +	// fetch login metadata from session +	$login_metadata = $SESSION['twitter_api_login_metadata']; +	unset($SESSION['twitter_api_login_metadata']); +	if (!empty($login_metadata['persistent'])) { +		$persistent = true; +	} +	if (!empty($login_metadata['forward'])) { +		$forward = $login_metadata['forward']; +	} + +	if (!isset($token['oauth_token']) || !isset($token['oauth_token_secret'])) { +		register_error(elgg_echo('twitter_api:login:error')); +		forward(); +	} + +	// attempt to find user and log them in. +	// else, create a new user. +	$options = array( +		'type' => 'user', +		'plugin_user_setting_name_value_pairs' => array( +			'access_key' => $token['oauth_token'], +			'access_secret' => $token['oauth_token_secret'], +		), +		'limit' => 0, +	); + +	$users = elgg_get_entities_from_plugin_user_settings($options); + +	if ($users) { +		if (count($users) == 1 && login($users[0], $persistent)) { +			system_message(elgg_echo('twitter_api:login:success')); +			forward($forward); +		} else { +			register_error(elgg_echo('twitter_api:login:error')); +			forward(); +		} +	} else { +		$api = twitter_api_get_api_object($token['oauth_token'], $token['oauth_token_secret']); +		$twitter = $api->get('account/verify_credentials'); + +		// backward compatibility for deprecated Twitter Login plugin +		$user = FALSE; +		if ($twitter_user = get_user_by_username($token['screen_name'])) { +			if (($screen_name = $twitter_user->twitter_screen_name) && ($screen_name == $token['screen_name'])) { +				// convert existing account +				$user = $twitter_user; +				$forward = ''; +			} +		} + +		// create new user +		if (!$user) { +			$user = twitter_api_create_user($twitter); +			$site_name = elgg_get_site_entity()->name; +			system_message(elgg_echo('twitter_api:login:email', array($site_name))); +			$forward = "twitter_api/interstitial"; +		} + +		// set twitter services tokens +		elgg_set_plugin_user_setting('twitter_name', $token['screen_name'], $user->guid); +		elgg_set_plugin_user_setting('access_key', $token['oauth_token'], $user->guid); +		elgg_set_plugin_user_setting('access_secret', $token['oauth_token_secret'], $user->guid); + +		// pull in Twitter icon +		twitter_api_update_user_avatar($user, $twitter->profile_image_url); + +		// login new user +		if (login($user)) { +			system_message(elgg_echo('twitter_api:login:success')); +		} else { +			system_message(elgg_echo('twitter_api:login:error')); +		} + +		forward($forward, 'twitter_api'); +	} + +	// register login error +	register_error(elgg_echo('twitter_api:login:error')); +	forward(); +} + +/** + * Create a new user from Twitter information + *  + * @param object $twitter Twitter OAuth response + * @return ElggUser + */ +function twitter_api_create_user($twitter) { +	// check new registration allowed +	if (!twitter_api_allow_new_users_with_twitter()) { +		register_error(elgg_echo('registerdisabled')); +		forward(); +	} + +	// Elgg-ify Twitter credentials +	$username = $twitter->screen_name; +	while (get_user_by_username($username)) { +		// @todo I guess we just hope this is good enough +		$username = $twitter->screen_name . '_' . rand(1000, 9999); +	} + +	$password = generate_random_cleartext_password(); +	$name = $twitter->name; + +	$user = new ElggUser(); +	$user->username = $username; +	$user->name = $name; +	$user->access_id = ACCESS_PUBLIC; +	$user->salt = generate_random_cleartext_password(); +	$user->password = generate_user_password($user, $password); +	$user->owner_guid = 0; +	$user->container_guid = 0; + +	if (!$user->save()) { +		register_error(elgg_echo('registerbad')); +		forward(); +	} + +	return $user; +} + +/** + * Pull in the latest avatar from twitter. + * + * @param ElggUser $user + * @param string   $file_location + */ +function twitter_api_update_user_avatar($user, $file_location) { +	// twitter's images have a few suffixes: +	// _normal +	// _reasonably_small +	// _mini +	// the twitter app here returns _normal.  We want standard, so remove the suffix. +	// @todo Should probably check that it's an image file. +	$file_location = str_replace('_normal.jpg', '.jpg', $file_location); + +	$icon_sizes = elgg_get_config('icon_sizes'); + +	$filehandler = new ElggFile(); +	$filehandler->owner_guid = $user->getGUID(); +	foreach ($icon_sizes as $size => $dimensions) { +		$image = get_resized_image_from_existing_file( +			$file_location, +			$dimensions['w'], +			$dimensions['h'], +			$dimensions['square'] +		); + +		$filehandler->setFilename("profile/$user->guid$size.jpg"); +		$filehandler->open('write'); +		$filehandler->write($image); +		$filehandler->close(); +	} +	 +	// update user's icontime +	$user->icontime = time(); +} + +/** + * User-initiated Twitter authorization + * + * Callback action from Twitter registration. Registers a single Elgg user with + * the authorization tokens. Will revoke access from previous users when a + * conflict exists. + * + * Depends upon {@link twitter_api_get_authorize_url} being called previously + * to establish session request tokens. + */ +function twitter_api_authorize() { +	$token = twitter_api_get_access_token(get_input('oauth_verifier')); +	if (!isset($token['oauth_token']) || !isset($token['oauth_token_secret'])) { +		register_error(elgg_echo('twitter_api:authorize:error')); +		forward('settings/plugins', 'twitter_api'); +	} + +	// make sure no other users are registered to this twitter account. +	$options = array( +		'type' => 'user', +		'plugin_user_setting_name_value_pairs' => array( +			'access_key' => $token['oauth_token'], +			'access_secret' => $token['oauth_token_secret'], +		), +		'limit' => 0 +	); +	$users = elgg_get_entities_from_plugin_user_settings($options); + +	if ($users) { +		foreach ($users as $user) { +			// revoke access +			elgg_unset_plugin_user_setting('twitter_name', $user->getGUID()); +			elgg_unset_plugin_user_setting('access_key', $user->getGUID()); +			elgg_unset_plugin_user_setting('access_secret', $user->getGUID()); +		} +	} + +	// register user's access tokens +	elgg_set_plugin_user_setting('twitter_name', $token['screen_name']); +	elgg_set_plugin_user_setting('access_key', $token['oauth_token']); +	elgg_set_plugin_user_setting('access_secret', $token['oauth_token_secret']); +	 +	// trigger authorization hook +	elgg_trigger_plugin_hook('authorize', 'twitter_api', array('token' => $token)); + +	system_message(elgg_echo('twitter_api:authorize:success')); +	forward('settings/plugins', 'twitter_api'); +} + +/** + * Remove twitter access for the currently logged in user. + */ +function twitter_api_revoke() { +	// unregister user's access tokens +	elgg_unset_plugin_user_setting('twitter_name'); +	elgg_unset_plugin_user_setting('access_key'); +	elgg_unset_plugin_user_setting('access_secret'); + +	system_message(elgg_echo('twitter_api:revoke:success')); +	forward('settings/plugins', 'twitter_api'); +} + +/** + * Gets the url to authorize a user. + * + * @param string $callback The callback URL + */ +function twitter_api_get_authorize_url($callback = NULL, $login = true) { +	global $SESSION; + +	// request tokens from Twitter +	$twitter = twitter_api_get_api_object(); +	$token = $twitter->getRequestToken($callback); + +	// save token in session for use after authorization +	$SESSION['twitter_api'] = array( +		'oauth_token' => $token['oauth_token'], +		'oauth_token_secret' => $token['oauth_token_secret'], +	); + +	return $twitter->getAuthorizeURL($token['oauth_token'], $login); +} + +/** + * Returns the access token to use in twitter calls. + * + * @param bool $oauth_verifier + * @return array + */ +function twitter_api_get_access_token($oauth_verifier = FALSE) { +	/* @var ElggSession $SESSION */ +	global $SESSION; + +	// retrieve stored tokens +	$oauth_token = $SESSION['twitter_api']['oauth_token']; +	$oauth_token_secret = $SESSION['twitter_api']['oauth_token_secret']; +	unset($SESSION['twitter_api']); + +	// fetch an access token +	$api = twitter_api_get_api_object($oauth_token, $oauth_token_secret); +	return $api->getAccessToken($oauth_verifier); +} + +/** + * Checks if this site is accepting new users. + * Admins can disable manual registration, but some might want to allow + * twitter-only logins. + */ +function twitter_api_allow_new_users_with_twitter() { +	$site_reg = elgg_get_config('allow_registration'); +	$twitter_reg = elgg_get_plugin_setting('new_users'); + +	if ($site_reg || (!$site_reg && $twitter_reg == 'yes')) { +		return true; +	} + +	return false; +} diff --git a/mod/twitter_api/manifest.xml b/mod/twitter_api/manifest.xml new file mode 100644 index 000000000..3af866bba --- /dev/null +++ b/mod/twitter_api/manifest.xml @@ -0,0 +1,29 @@ +<?xml version="1.0" encoding="UTF-8"?> +<plugin_manifest xmlns="http://www.elgg.org/plugin_manifest/1.8"> +	<name>Twitter API</name> +	<author>Core developers</author> +	<version>1.8.15</version> +	<description>Allows users to authenticate their Elgg account with Twitter.</description> +	<category>api</category> +	<category>bundled</category> +	<website>http://www.elgg.org/</website> +	<copyright>See COPYRIGHT.txt</copyright> +	<license>GNU General Public License version 2</license> +	<requires> +		<type>elgg_release</type> +		<version>1.8</version> +	</requires> +	<requires> +		<type>php_extension</type> +		<name>curl</name> +	</requires> + +	<conflicts> +		<type>plugin</type> +		<name>oauth_api</name> +	</conflicts> +	<conflicts> +		<type>plugin</type> +		<name>twitterservice</name> +	</conflicts> +</plugin_manifest> diff --git a/mod/twitter_api/pages/twitter_api/interstitial.php b/mod/twitter_api/pages/twitter_api/interstitial.php new file mode 100644 index 000000000..23b5069cb --- /dev/null +++ b/mod/twitter_api/pages/twitter_api/interstitial.php @@ -0,0 +1,19 @@ +<?php +/** + * An interstitial page for newly created Twitter users. + * + * This prompts them to enter an email address and set a password in case Twitter goes down or they + * want to disassociate their account from twitter. + */ + +$title = elgg_echo('twitter_api:interstitial:settings'); + +$content = elgg_view_form('twitter_api/interstitial_settings'); + +$params = array( +	'content' => $content, +	'title' => $title, +); +$body = elgg_view_layout('one_sidebar', $params); + +echo elgg_view_page($title, $body); diff --git a/mod/twitter_api/start.php b/mod/twitter_api/start.php new file mode 100644 index 000000000..7318ac55d --- /dev/null +++ b/mod/twitter_api/start.php @@ -0,0 +1,174 @@ +<?php +/** + * Elgg Twitter Service + * This service plugin allows users to authenticate their Elgg account with Twitter. + * + * @package TwitterAPI + */ + +elgg_register_event_handler('init', 'system', 'twitter_api_init'); + +function twitter_api_init() { + +	// require libraries +	$base = elgg_get_plugins_path() . 'twitter_api'; +	elgg_register_class('TwitterOAuth', "$base/vendors/twitteroauth/twitterOAuth.php"); +	elgg_register_library('twitter_api', "$base/lib/twitter_api.php"); +	elgg_load_library('twitter_api'); + +	// extend site views +	//elgg_extend_view('metatags', 'twitter_api/metatags'); +	elgg_extend_view('css/elgg', 'twitter_api/css'); +	elgg_extend_view('css/admin', 'twitter_api/css'); +	elgg_extend_view('js/elgg', 'twitter_api/js'); + +	// sign on with twitter +	if (twitter_api_allow_sign_on_with_twitter()) { +		elgg_extend_view('login/extend', 'twitter_api/login'); +	} + +	// register page handler +	elgg_register_page_handler('twitter_api', 'twitter_api_pagehandler'); +	// backward compatibility +	elgg_register_page_handler('twitterservice', 'twitter_api_pagehandler_deprecated'); + +	// register Walled Garden public pages +	elgg_register_plugin_hook_handler('public_pages', 'walled_garden', 'twitter_api_public_pages'); + +	// push wire post messages to twitter +	if (elgg_get_plugin_setting('wire_posts', 'twitter_api') == 'yes') { +		elgg_register_plugin_hook_handler('status', 'user', 'twitter_api_tweet'); +	} + +	$actions = dirname(__FILE__) . '/actions/twitter_api'; +	elgg_register_action('twitter_api/interstitial_settings', "$actions/interstitial_settings.php", 'logged_in'); +} + +/** + * Handles old pg/twitterservice/ handler + * + * @param array $page + * @return bool + */ +function twitter_api_pagehandler_deprecated($page) { +	$url = elgg_get_site_url() . 'pg/twitter_api/authorize'; +	$msg = elgg_echo('twitter_api:deprecated_callback_url', array($url)); +	register_error($msg); + +	return twitter_api_pagehandler($page); +} + + +/** + * Serves pages for twitter. + * + * @param array $page + * @return bool + */ +function twitter_api_pagehandler($page) { +	if (!isset($page[0])) { +		return false; +	} + +	switch ($page[0]) { +		case 'authorize': +			twitter_api_authorize(); +			break; +		case 'revoke': +			twitter_api_revoke(); +			break; +		case 'forward': +			twitter_api_forward(); +			break; +		case 'login': +			twitter_api_login(); +			break; +		case 'interstitial': +			gatekeeper(); +			// only let twitter users do this. +			$guid = elgg_get_logged_in_user_guid(); +			$twitter_name = elgg_get_plugin_user_setting('twitter_name', $guid, 'twitter_api'); +			if (!$twitter_name) { +				register_error(elgg_echo('twitter_api:invalid_page')); +				forward(); +			} +			$pages = dirname(__FILE__) . '/pages/twitter_api'; +			include "$pages/interstitial.php"; +			break; +		default: +			return false; +	} +	return true; +} + +/** + * Push a status update to twitter. + * + * @param string $hook + * @param string $type + * @param null   $returnvalue + * @param array  $params + */ +function twitter_api_tweet($hook, $type, $returnvalue, $params) { + +	if (!elgg_instanceof($params['user'])) { +		return; +	} + +	// @todo - allow admin to select origins? + +	// check user settings +	$user_id = $params['user']->getGUID(); +	$access_key = elgg_get_plugin_user_setting('access_key', $user_id, 'twitter_api'); +	$access_secret = elgg_get_plugin_user_setting('access_secret', $user_id, 'twitter_api'); +	if (!($access_key && $access_secret)) { +		return; +	} + +	$api = twitter_api_get_api_object($access_key, $access_secret); +	if (!$api) { +		return; +	} + +	$api->post('statuses/update', array('status' => $params['message'])); +} + +/** + * Get tweets for a user. + * + * @param int   $user_guid The Elgg user GUID + * @param array $options + * @return array + */ +function twitter_api_fetch_tweets($user_guid, $options = array()) { + +	// check user settings +	$access_key = elgg_get_plugin_user_setting('access_key', $user_guid, 'twitter_api'); +	$access_secret = elgg_get_plugin_user_setting('access_secret', $user_guid, 'twitter_api'); +	if (!($access_key && $access_secret)) { +		return FALSE; +	} + +	$api = twitter_api_get_api_object($access_key, $access_secret); +	if (!$api) { +		return FALSE; +	} + +	return $api->get('statuses/user_timeline', $options); +} + +/** + * Register as public pages for walled garden. + * + * @param string $hook + * @param string $type + * @param array  $return_value + * @param array  $params + * @return array + */ +function twitter_api_public_pages($hook, $type, $return_value, $params) { +	$return_value[] = 'twitter_api/forward'; +	$return_value[] = 'twitter_api/login'; + +	return $return_value; +} diff --git a/mod/twitter_api/vendors/twitteroauth/LICENSE b/mod/twitter_api/vendors/twitteroauth/LICENSE new file mode 100644 index 000000000..233854f16 --- /dev/null +++ b/mod/twitter_api/vendors/twitteroauth/LICENSE @@ -0,0 +1,22 @@ +Copyright (c) 2009 Abraham Williams - http://abrah.am - abraham@poseurte.ch +  +Permission is hereby granted, free of charge, to any person +obtaining a copy of this software and associated documentation +files (the "Software"), to deal in the Software without +restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the +Software is furnished to do so, subject to the following +conditions: +  +The above copyright notice and this permission notice shall be +included in all copies or substantial portions of the Software. +  +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES +OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT +HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, +WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING +FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR +OTHER DEALINGS IN THE SOFTWARE. diff --git a/mod/twitter_api/vendors/twitteroauth/OAuth.php b/mod/twitter_api/vendors/twitteroauth/OAuth.php new file mode 100644 index 000000000..e76304146 --- /dev/null +++ b/mod/twitter_api/vendors/twitteroauth/OAuth.php @@ -0,0 +1,872 @@ +<?php +// vim: foldmethod=marker + +/* Generic exception class + */ +class OAuthException extends Exception { +  // pass +} + +class OAuthConsumer { +  public $key; +  public $secret; + +  function __construct($key, $secret, $callback_url=NULL) { +    $this->key = $key; +    $this->secret = $secret; +    $this->callback_url = $callback_url; +  } + +  function __toString() { +    return "OAuthConsumer[key=$this->key,secret=$this->secret]"; +  } +} + +class OAuthToken { +  // access tokens and request tokens +  public $key; +  public $secret; + +  /** +   * key = the token +   * secret = the token secret +   */ +  function __construct($key, $secret) { +    $this->key = $key; +    $this->secret = $secret; +  } + +  /** +   * generates the basic string serialization of a token that a server +   * would respond to request_token and access_token calls with +   */ +  function to_string() { +    return "oauth_token=" . +           OAuthUtil::urlencode_rfc3986($this->key) . +           "&oauth_token_secret=" . +           OAuthUtil::urlencode_rfc3986($this->secret); +  } + +  function __toString() { +    return $this->to_string(); +  } +} + +/** + * A class for implementing a Signature Method + * See section 9 ("Signing Requests") in the spec + */ +abstract class OAuthSignatureMethod { +  /** +   * Needs to return the name of the Signature Method (ie HMAC-SHA1) +   * @return string +   */ +  abstract public function get_name(); + +  /** +   * Build up the signature +   * NOTE: The output of this function MUST NOT be urlencoded. +   * the encoding is handled in OAuthRequest when the final +   * request is serialized +   * @param OAuthRequest $request +   * @param OAuthConsumer $consumer +   * @param OAuthToken $token +   * @return string +   */ +  abstract public function build_signature($request, $consumer, $token); + +  /** +   * Verifies that a given signature is correct +   * @param OAuthRequest $request +   * @param OAuthConsumer $consumer +   * @param OAuthToken $token +   * @param string $signature +   * @return bool +   */ +  public function check_signature($request, $consumer, $token, $signature) { +    $built = $this->build_signature($request, $consumer, $token); +    return $built == $signature; +  } +} + +/** + * The HMAC-SHA1 signature method uses the HMAC-SHA1 signature algorithm as defined in [RFC2104]  + * where the Signature Base String is the text and the key is the concatenated values (each first  + * encoded per Parameter Encoding) of the Consumer Secret and Token Secret, separated by an '&'  + * character (ASCII code 38) even if empty. + *   - Chapter 9.2 ("HMAC-SHA1") + */ +class OAuthSignatureMethod_HMAC_SHA1 extends OAuthSignatureMethod { +  function get_name() { +    return "HMAC-SHA1"; +  } + +  public function build_signature($request, $consumer, $token) { +    $base_string = $request->get_signature_base_string(); +    $request->base_string = $base_string; + +    $key_parts = array( +      $consumer->secret, +      ($token) ? $token->secret : "" +    ); + +    $key_parts = OAuthUtil::urlencode_rfc3986($key_parts); +    $key = implode('&', $key_parts); + +    return base64_encode(hash_hmac('sha1', $base_string, $key, true)); +  } +} + +/** + * The PLAINTEXT method does not provide any security protection and SHOULD only be used  + * over a secure channel such as HTTPS. It does not use the Signature Base String. + *   - Chapter 9.4 ("PLAINTEXT") + */ +class OAuthSignatureMethod_PLAINTEXT extends OAuthSignatureMethod { +  public function get_name() { +    return "PLAINTEXT"; +  } + +  /** +   * oauth_signature is set to the concatenated encoded values of the Consumer Secret and  +   * Token Secret, separated by a '&' character (ASCII code 38), even if either secret is  +   * empty. The result MUST be encoded again. +   *   - Chapter 9.4.1 ("Generating Signatures") +   * +   * Please note that the second encoding MUST NOT happen in the SignatureMethod, as +   * OAuthRequest handles this! +   */ +  public function build_signature($request, $consumer, $token) { +    $key_parts = array( +      $consumer->secret, +      ($token) ? $token->secret : "" +    ); + +    $key_parts = OAuthUtil::urlencode_rfc3986($key_parts); +    $key = implode('&', $key_parts); +    $request->base_string = $key; + +    return $key; +  } +} + +/** + * The RSA-SHA1 signature method uses the RSASSA-PKCS1-v1_5 signature algorithm as defined in  + * [RFC3447] section 8.2 (more simply known as PKCS#1), using SHA-1 as the hash function for  + * EMSA-PKCS1-v1_5. It is assumed that the Consumer has provided its RSA public key in a  + * verified way to the Service Provider, in a manner which is beyond the scope of this  + * specification. + *   - Chapter 9.3 ("RSA-SHA1") + */ +abstract class OAuthSignatureMethod_RSA_SHA1 extends OAuthSignatureMethod { +  public function get_name() { +    return "RSA-SHA1"; +  } + +  // Up to the SP to implement this lookup of keys. Possible ideas are: +  // (1) do a lookup in a table of trusted certs keyed off of consumer +  // (2) fetch via http using a url provided by the requester +  // (3) some sort of specific discovery code based on request +  // +  // Either way should return a string representation of the certificate +  protected abstract function fetch_public_cert(&$request); + +  // Up to the SP to implement this lookup of keys. Possible ideas are: +  // (1) do a lookup in a table of trusted certs keyed off of consumer +  // +  // Either way should return a string representation of the certificate +  protected abstract function fetch_private_cert(&$request); + +  public function build_signature($request, $consumer, $token) { +    $base_string = $request->get_signature_base_string(); +    $request->base_string = $base_string; + +    // Fetch the private key cert based on the request +    $cert = $this->fetch_private_cert($request); + +    // Pull the private key ID from the certificate +    $privatekeyid = openssl_get_privatekey($cert); + +    // Sign using the key +    $ok = openssl_sign($base_string, $signature, $privatekeyid); + +    // Release the key resource +    openssl_free_key($privatekeyid); + +    return base64_encode($signature); +  } + +  public function check_signature($request, $consumer, $token, $signature) { +    $decoded_sig = base64_decode($signature); + +    $base_string = $request->get_signature_base_string(); + +    // Fetch the public key cert based on the request +    $cert = $this->fetch_public_cert($request); + +    // Pull the public key ID from the certificate +    $publickeyid = openssl_get_publickey($cert); + +    // Check the computed signature against the one passed in the query +    $ok = openssl_verify($base_string, $decoded_sig, $publickeyid); + +    // Release the key resource +    openssl_free_key($publickeyid); + +    return $ok == 1; +  } +} + +class OAuthRequest { +  private $parameters; +  private $http_method; +  private $http_url; +  // for debug purposes +  public $base_string; +  public static $version = '1.0'; +  public static $POST_INPUT = 'php://input'; + +  function __construct($http_method, $http_url, $parameters=NULL) { +    @$parameters or $parameters = array(); +    $parameters = array_merge( OAuthUtil::parse_parameters(parse_url($http_url, PHP_URL_QUERY)), $parameters); +    $this->parameters = $parameters; +    $this->http_method = $http_method; +    $this->http_url = $http_url; +  } + + +  /** +   * attempt to build up a request from what was passed to the server +   */ +  public static function from_request($http_method=NULL, $http_url=NULL, $parameters=NULL) { +    $scheme = (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != "on") +              ? 'http' +              : 'https'; +    @$http_url or $http_url = $scheme . +                              '://' . $_SERVER['HTTP_HOST'] . +                              ':' . +                              $_SERVER['SERVER_PORT'] . +                              $_SERVER['REQUEST_URI']; +    @$http_method or $http_method = $_SERVER['REQUEST_METHOD']; + +    // We weren't handed any parameters, so let's find the ones relevant to +    // this request. +    // If you run XML-RPC or similar you should use this to provide your own +    // parsed parameter-list +    if (!$parameters) { +      // Find request headers +      $request_headers = OAuthUtil::get_headers(); + +      // Parse the query-string to find GET parameters +      $parameters = OAuthUtil::parse_parameters($_SERVER['QUERY_STRING']); + +      // It's a POST request of the proper content-type, so parse POST +      // parameters and add those overriding any duplicates from GET +      if ($http_method == "POST" +          && @strstr($request_headers["Content-Type"], +                     "application/x-www-form-urlencoded") +          ) { +        $post_data = OAuthUtil::parse_parameters( +          file_get_contents(self::$POST_INPUT) +        ); +        $parameters = array_merge($parameters, $post_data); +      } + +      // We have a Authorization-header with OAuth data. Parse the header +      // and add those overriding any duplicates from GET or POST +      if (@substr($request_headers['Authorization'], 0, 6) == "OAuth ") { +        $header_parameters = OAuthUtil::split_header( +          $request_headers['Authorization'] +        ); +        $parameters = array_merge($parameters, $header_parameters); +      } + +    } + +    return new OAuthRequest($http_method, $http_url, $parameters); +  } + +  /** +   * pretty much a helper function to set up the request +   */ +  public static function from_consumer_and_token($consumer, $token, $http_method, $http_url, $parameters=NULL) { +    @$parameters or $parameters = array(); +    $defaults = array("oauth_version" => OAuthRequest::$version, +                      "oauth_nonce" => OAuthRequest::generate_nonce(), +                      "oauth_timestamp" => OAuthRequest::generate_timestamp(), +                      "oauth_consumer_key" => $consumer->key); +    if ($token) +      $defaults['oauth_token'] = $token->key; + +    $parameters = array_merge($defaults, $parameters); + +    return new OAuthRequest($http_method, $http_url, $parameters); +  } + +  public function set_parameter($name, $value, $allow_duplicates = true) { +    if ($allow_duplicates && isset($this->parameters[$name])) { +      // We have already added parameter(s) with this name, so add to the list +      if (is_scalar($this->parameters[$name])) { +        // This is the first duplicate, so transform scalar (string) +        // into an array so we can add the duplicates +        $this->parameters[$name] = array($this->parameters[$name]); +      } + +      $this->parameters[$name][] = $value; +    } else { +      $this->parameters[$name] = $value; +    } +  } + +  public function get_parameter($name) { +    return isset($this->parameters[$name]) ? $this->parameters[$name] : null; +  } + +  public function get_parameters() { +    return $this->parameters; +  } + +  public function unset_parameter($name) { +    unset($this->parameters[$name]); +  } + +  /** +   * The request parameters, sorted and concatenated into a normalized string. +   * @return string +   */ +  public function get_signable_parameters() { +    // Grab all parameters +    $params = $this->parameters; + +    // Remove oauth_signature if present +    // Ref: Spec: 9.1.1 ("The oauth_signature parameter MUST be excluded.") +    if (isset($params['oauth_signature'])) { +      unset($params['oauth_signature']); +    } + +    return OAuthUtil::build_http_query($params); +  } + +  /** +   * Returns the base string of this request +   * +   * The base string defined as the method, the url +   * and the parameters (normalized), each urlencoded +   * and the concated with &. +   */ +  public function get_signature_base_string() { +    $parts = array( +      $this->get_normalized_http_method(), +      $this->get_normalized_http_url(), +      $this->get_signable_parameters() +    ); + +    $parts = OAuthUtil::urlencode_rfc3986($parts); + +    return implode('&', $parts); +  } + +  /** +   * just uppercases the http method +   */ +  public function get_normalized_http_method() { +    return strtoupper($this->http_method); +  } + +  /** +   * parses the url and rebuilds it to be +   * scheme://host/path +   */ +  public function get_normalized_http_url() { +    $parts = parse_url($this->http_url); + +    $port = @$parts['port']; +    $scheme = $parts['scheme']; +    $host = $parts['host']; +    $path = @$parts['path']; + +    $port or $port = ($scheme == 'https') ? '443' : '80'; + +    if (($scheme == 'https' && $port != '443') +        || ($scheme == 'http' && $port != '80')) { +      $host = "$host:$port"; +    } +    return "$scheme://$host$path"; +  } + +  /** +   * builds a url usable for a GET request +   */ +  public function to_url() { +    $post_data = $this->to_postdata(); +    $out = $this->get_normalized_http_url(); +    if ($post_data) { +      $out .= '?'.$post_data; +    } +    return $out; +  } + +  /** +   * builds the data one would send in a POST request +   */ +  public function to_postdata() { +    return OAuthUtil::build_http_query($this->parameters); +  } + +  /** +   * builds the Authorization: header +   */ +  public function to_header($realm=null) { +    $first = true; +	if($realm) { +      $out = 'Authorization: OAuth realm="' . OAuthUtil::urlencode_rfc3986($realm) . '"'; +      $first = false; +    } else +      $out = 'Authorization: OAuth'; + +    $total = array(); +    foreach ($this->parameters as $k => $v) { +      if (substr($k, 0, 5) != "oauth") continue; +      if (is_array($v)) { +        throw new OAuthException('Arrays not supported in headers'); +      } +      $out .= ($first) ? ' ' : ','; +      $out .= OAuthUtil::urlencode_rfc3986($k) . +              '="' . +              OAuthUtil::urlencode_rfc3986($v) . +              '"'; +      $first = false; +    } +    return $out; +  } + +  public function __toString() { +    return $this->to_url(); +  } + + +  public function sign_request($signature_method, $consumer, $token) { +    $this->set_parameter( +      "oauth_signature_method", +      $signature_method->get_name(), +      false +    ); +    $signature = $this->build_signature($signature_method, $consumer, $token); +    $this->set_parameter("oauth_signature", $signature, false); +  } + +  public function build_signature($signature_method, $consumer, $token) { +    $signature = $signature_method->build_signature($this, $consumer, $token); +    return $signature; +  } + +  /** +   * util function: current timestamp +   */ +  private static function generate_timestamp() { +    return time(); +  } + +  /** +   * util function: current nonce +   */ +  private static function generate_nonce() { +    $mt = microtime(); +    $rand = mt_rand(); + +    return md5($mt . $rand); // md5s look nicer than numbers +  } +} + +class OAuthServer { +  protected $timestamp_threshold = 300; // in seconds, five minutes +  protected $version = '1.0';             // hi blaine +  protected $signature_methods = array(); + +  protected $data_store; + +  function __construct($data_store) { +    $this->data_store = $data_store; +  } + +  public function add_signature_method($signature_method) { +    $this->signature_methods[$signature_method->get_name()] = +      $signature_method; +  } + +  // high level functions + +  /** +   * process a request_token request +   * returns the request token on success +   */ +  public function fetch_request_token(&$request) { +    $this->get_version($request); + +    $consumer = $this->get_consumer($request); + +    // no token required for the initial token request +    $token = NULL; + +    $this->check_signature($request, $consumer, $token); + +    // Rev A change +    $callback = $request->get_parameter('oauth_callback'); +    $new_token = $this->data_store->new_request_token($consumer, $callback); + +    return $new_token; +  } + +  /** +   * process an access_token request +   * returns the access token on success +   */ +  public function fetch_access_token(&$request) { +    $this->get_version($request); + +    $consumer = $this->get_consumer($request); + +    // requires authorized request token +    $token = $this->get_token($request, $consumer, "request"); + +    $this->check_signature($request, $consumer, $token); + +    // Rev A change +    $verifier = $request->get_parameter('oauth_verifier'); +    $new_token = $this->data_store->new_access_token($token, $consumer, $verifier); + +    return $new_token; +  } + +  /** +   * verify an api call, checks all the parameters +   */ +  public function verify_request(&$request) { +    $this->get_version($request); +    $consumer = $this->get_consumer($request); +    $token = $this->get_token($request, $consumer, "access"); +    $this->check_signature($request, $consumer, $token); +    return array($consumer, $token); +  } + +  // Internals from here +  /** +   * version 1 +   */ +  private function get_version(&$request) { +    $version = $request->get_parameter("oauth_version"); +    if (!$version) { +      // Service Providers MUST assume the protocol version to be 1.0 if this parameter is not present.  +      // Chapter 7.0 ("Accessing Protected Ressources") +      $version = '1.0'; +    } +    if ($version !== $this->version) { +      throw new OAuthException("OAuth version '$version' not supported"); +    } +    return $version; +  } + +  /** +   * figure out the signature with some defaults +   */ +  private function get_signature_method(&$request) { +    $signature_method = +        @$request->get_parameter("oauth_signature_method"); + +    if (!$signature_method) { +      // According to chapter 7 ("Accessing Protected Ressources") the signature-method +      // parameter is required, and we can't just fallback to PLAINTEXT +      throw new OAuthException('No signature method parameter. This parameter is required'); +    } + +    if (!in_array($signature_method, +                  array_keys($this->signature_methods))) { +      throw new OAuthException( +        "Signature method '$signature_method' not supported " . +        "try one of the following: " . +        implode(", ", array_keys($this->signature_methods)) +      ); +    } +    return $this->signature_methods[$signature_method]; +  } + +  /** +   * try to find the consumer for the provided request's consumer key +   */ +  private function get_consumer(&$request) { +    $consumer_key = @$request->get_parameter("oauth_consumer_key"); +    if (!$consumer_key) { +      throw new OAuthException("Invalid consumer key"); +    } + +    $consumer = $this->data_store->lookup_consumer($consumer_key); +    if (!$consumer) { +      throw new OAuthException("Invalid consumer"); +    } + +    return $consumer; +  } + +  /** +   * try to find the token for the provided request's token key +   */ +  private function get_token(&$request, $consumer, $token_type="access") { +    $token_field = @$request->get_parameter('oauth_token'); +    $token = $this->data_store->lookup_token( +      $consumer, $token_type, $token_field +    ); +    if (!$token) { +      throw new OAuthException("Invalid $token_type token: $token_field"); +    } +    return $token; +  } + +  /** +   * all-in-one function to check the signature on a request +   * should guess the signature method appropriately +   */ +  private function check_signature(&$request, $consumer, $token) { +    // this should probably be in a different method +    $timestamp = @$request->get_parameter('oauth_timestamp'); +    $nonce = @$request->get_parameter('oauth_nonce'); + +    $this->check_timestamp($timestamp); +    $this->check_nonce($consumer, $token, $nonce, $timestamp); + +    $signature_method = $this->get_signature_method($request); + +    $signature = $request->get_parameter('oauth_signature'); +    $valid_sig = $signature_method->check_signature( +      $request, +      $consumer, +      $token, +      $signature +    ); + +    if (!$valid_sig) { +      throw new OAuthException("Invalid signature"); +    } +  } + +  /** +   * check that the timestamp is new enough +   */ +  private function check_timestamp($timestamp) { +    if( ! $timestamp ) +      throw new OAuthException( +        'Missing timestamp parameter. The parameter is required' +      ); +     +    // verify that timestamp is recentish +    $now = time(); +    if (abs($now - $timestamp) > $this->timestamp_threshold) { +      throw new OAuthException( +        "Expired timestamp, yours $timestamp, ours $now" +      ); +    } +  } + +  /** +   * check that the nonce is not repeated +   */ +  private function check_nonce($consumer, $token, $nonce, $timestamp) { +    if( ! $nonce ) +      throw new OAuthException( +        'Missing nonce parameter. The parameter is required' +      ); + +    // verify that the nonce is uniqueish +    $found = $this->data_store->lookup_nonce( +      $consumer, +      $token, +      $nonce, +      $timestamp +    ); +    if ($found) { +      throw new OAuthException("Nonce already used: $nonce"); +    } +  } + +} + +class OAuthDataStore { +  function lookup_consumer($consumer_key) { +    // implement me +  } + +  function lookup_token($consumer, $token_type, $token) { +    // implement me +  } + +  function lookup_nonce($consumer, $token, $nonce, $timestamp) { +    // implement me +  } + +  function new_request_token($consumer, $callback = null) { +    // return a new token attached to this consumer +  } + +  function new_access_token($token, $consumer, $verifier = null) { +    // return a new access token attached to this consumer +    // for the user associated with this token if the request token +    // is authorized +    // should also invalidate the request token +  } + +} + +class OAuthUtil { +  public static function urlencode_rfc3986($input) { +  if (is_array($input)) { +    return array_map(array('OAuthUtil', 'urlencode_rfc3986'), $input); +  } else if (is_scalar($input)) { +    return str_replace( +      '+', +      ' ', +      str_replace('%7E', '~', rawurlencode($input)) +    ); +  } else { +    return ''; +  } +} + + +  // This decode function isn't taking into consideration the above +  // modifications to the encoding process. However, this method doesn't +  // seem to be used anywhere so leaving it as is. +  public static function urldecode_rfc3986($string) { +    return urldecode($string); +  } + +  // Utility function for turning the Authorization: header into +  // parameters, has to do some unescaping +  // Can filter out any non-oauth parameters if needed (default behaviour) +  public static function split_header($header, $only_allow_oauth_parameters = true) { +    $pattern = '/(([-_a-z]*)=("([^"]*)"|([^,]*)),?)/'; +    $offset = 0; +    $params = array(); +    while (preg_match($pattern, $header, $matches, PREG_OFFSET_CAPTURE, $offset) > 0) { +      $match = $matches[0]; +      $header_name = $matches[2][0]; +      $header_content = (isset($matches[5])) ? $matches[5][0] : $matches[4][0]; +      if (preg_match('/^oauth_/', $header_name) || !$only_allow_oauth_parameters) { +        $params[$header_name] = OAuthUtil::urldecode_rfc3986($header_content); +      } +      $offset = $match[1] + strlen($match[0]); +    } + +    if (isset($params['realm'])) { +      unset($params['realm']); +    } + +    return $params; +  } + +  // helper to try to sort out headers for people who aren't running apache +  public static function get_headers() { +    if (function_exists('apache_request_headers')) { +      // we need this to get the actual Authorization: header +      // because apache tends to tell us it doesn't exist +      $headers = apache_request_headers(); + +      // sanitize the output of apache_request_headers because +      // we always want the keys to be Cased-Like-This and arh() +      // returns the headers in the same case as they are in the +      // request +      $out = array(); +      foreach( $headers AS $key => $value ) { +        $key = str_replace( +            " ", +            "-", +            ucwords(strtolower(str_replace("-", " ", $key))) +          ); +        $out[$key] = $value; +      } +    } else { +      // otherwise we don't have apache and are just going to have to hope +      // that $_SERVER actually contains what we need +      $out = array(); +      if( isset($_SERVER['CONTENT_TYPE']) ) +        $out['Content-Type'] = $_SERVER['CONTENT_TYPE']; +      if( isset($_ENV['CONTENT_TYPE']) ) +        $out['Content-Type'] = $_ENV['CONTENT_TYPE']; + +      foreach ($_SERVER as $key => $value) { +        if (substr($key, 0, 5) == "HTTP_") { +          // this is chaos, basically it is just there to capitalize the first +          // letter of every word that is not an initial HTTP and strip HTTP +          // code from przemek +          $key = str_replace( +            " ", +            "-", +            ucwords(strtolower(str_replace("_", " ", substr($key, 5)))) +          ); +          $out[$key] = $value; +        } +      } +    } +    return $out; +  } + +  // This function takes a input like a=b&a=c&d=e and returns the parsed +  // parameters like this +  // array('a' => array('b','c'), 'd' => 'e') +  public static function parse_parameters( $input ) { +    if (!isset($input) || !$input) return array(); + +    $pairs = explode('&', $input); + +    $parsed_parameters = array(); +    foreach ($pairs as $pair) { +      $split = explode('=', $pair, 2); +      $parameter = OAuthUtil::urldecode_rfc3986($split[0]); +      $value = isset($split[1]) ? OAuthUtil::urldecode_rfc3986($split[1]) : ''; + +      if (isset($parsed_parameters[$parameter])) { +        // We have already recieved parameter(s) with this name, so add to the list +        // of parameters with this name + +        if (is_scalar($parsed_parameters[$parameter])) { +          // This is the first duplicate, so transform scalar (string) into an array +          // so we can add the duplicates +          $parsed_parameters[$parameter] = array($parsed_parameters[$parameter]); +        } + +        $parsed_parameters[$parameter][] = $value; +      } else { +        $parsed_parameters[$parameter] = $value; +      } +    } +    return $parsed_parameters; +  } + +  public static function build_http_query($params) { +    if (!$params) return ''; + +    // Urlencode both keys and values +    $keys = OAuthUtil::urlencode_rfc3986(array_keys($params)); +    $values = OAuthUtil::urlencode_rfc3986(array_values($params)); +    $params = array_combine($keys, $values); + +    // Parameters are sorted by name, using lexicographical byte value ordering. +    // Ref: Spec: 9.1.1 (1) +    uksort($params, 'strcmp'); + +    $pairs = array(); +    foreach ($params as $parameter => $value) { +      if (is_array($value)) { +        // If two or more parameters share the same name, they are sorted by their value +        // Ref: Spec: 9.1.1 (1) +        natsort($value); +        foreach ($value as $duplicate_value) { +          $pairs[] = $parameter . '=' . $duplicate_value; +        } +      } else { +        $pairs[] = $parameter . '=' . $value; +      } +    } +    // For each parameter, the name is separated from the corresponding value by an '=' character (ASCII code 61) +    // Each name-value pair is separated by an '&' character (ASCII code 38) +    return implode('&', $pairs); +  } +} diff --git a/mod/twitter_api/vendors/twitteroauth/README b/mod/twitter_api/vendors/twitteroauth/README new file mode 100644 index 000000000..c9a17ce4b --- /dev/null +++ b/mod/twitter_api/vendors/twitteroauth/README @@ -0,0 +1,114 @@ +TwitterOAuth +------------ + +PHP library for working with Twitter's OAuth API. + +Flow Overview +============= + +1. Build TwitterOAuth object using client credentials. +2. Request temporary credentials from Twitter. +3. Build authorize URL for Twitter. +4. Redirect user to authorize URL. +5. User authorizes access and returns from Twitter. +6. Rebuild TwitterOAuth object with client credentials and temporary credentials. +7. Get token credentials from Twitter. +8. Rebuild TwitterOAuth object with client credentials and token credentials. +9. Query Twitter API. + +Terminology +=========== + +The terminology has changed since 0.1.x to better match the draft-hammer-oauth IETF +RFC. You can read that at http://tools.ietf.org/html/draft-hammer-oauth. Some of the +terms will differ from those Twitter uses as well. + +client credentials - Consumer key/secret you get when registering an app with Twitter. +temporary credentials - Previously known as the request token. +token credentials - Previously known as the access token. + +Parameters +========== + +There are a number of parameters you can modify after creating a TwitterOAuth object. + +Switch an existing TwitterOAuth install to use version 1.1 of the API. + +    $connection->$host = "https://api.twitter.com/1.1/"; + +Custom useragent. + +    $connection->useragent = 'Custom useragent string'; + +Verify Twitters SSL certificate. + +    $connection->ssl_verifypeer = TRUE; + +There are several more you can find in TwitterOAuth.php. + +Extended flow using example code +================================ + +To use TwitterOAuth with the Twitter API you need *TwitterOAuth.php*, *OAuth.php* and +client credentials. You can get client credentials by registering your application at +[dev.twitter.com/apps](https://dev.twitter.com/apps). + +Users start out on connect.php which displays the "Sign in with Twitter" image hyperlinked +to redirect.php. This button should be displayed on your homepage in your login section. The +client credentials are saved in config.php as `CONSUMER_KEY` and `CONSUMER_SECRET`. You can +save a static callback URL in the app settings page, in the config file or use a dynamic +callback URL later in step 2. In example use https://example.com/callback.php. + +1) When a user lands on redirect.php we build a new TwitterOAuth object using the client credentials. +If you have your own configuration method feel free to use it instead of config.php. + +    $connection = new TwitterOAuth(CONSUMER_KEY, CONSUMER_SECRET); // Use config.php client credentials +    $connection = new TwitterOAuth('abc890', '123xyz'); + +2) Using the built $connection object you will ask Twitter for temporary credentials. The `oauth_callback` value is required. + +    $temporary_credentials = $connection->getRequestToken(OAUTH_CALLBACK); // Use config.php callback URL. + +3) Now that we have temporary credentials the user has to go to Twitter and authorize the app +to access and updates their data. You can also pass a second parameter of FALSE to not use [Sign +in with Twitter](https://dev.twitter.com/docs/auth/sign-twitter). + +    $redirect_url = $connection->getAuthorizeURL($temporary_credentials); // Use Sign in with Twitter +    $redirect_url = $connection->getAuthorizeURL($temporary_credentials, FALSE); + +4) You will now have a Twitter URL that you must send the user to. + +    https://api.twitter.com/oauth/authenticate?oauth_token=xyz123 + +5) The user is now on twitter.com and may have to login. Once authenticated with Twitter they will +will either have to click on allow/deny, or will be automatically redirected back to the callback. + +6) Now that the user has returned to callback.php and allowed access we need to build a new +TwitterOAuth object using the temporary credentials. + +    $connection = new TwitterOAuth(CONSUMER_KEY, CONSUMER_SECRET, $_SESSION['oauth_token'], +    $_SESSION['oauth_token_secret']); + +7) Now we ask Twitter for long lasting token credentials. These are specific to the application +and user and will act like password to make future requests. Normally the token credentials would +get saved in your database but for this example we are just using sessions. + +    $token_credentials = $connection->getAccessToken($_REQUEST['oauth_verifier']); + +8) With the token credentials we build a new TwitterOAuth object. + +    $connection = new TwitterOAuth(CONSUMER_KEY, CONSUMER_SECRET, $token_credentials['oauth_token'], +    $token_credentials['oauth_token_secret']); + +9) And finally we can make requests authenticated as the user. You can GET, POST, and DELETE API +methods. Directly copy the path from the API documentation and add an array of any parameter +you wish to include for the API method such as curser or in_reply_to_status_id. + +    $account = $connection->get('account/verify_credentials'); +    $status = $connection->post('statuses/update', array('status' => 'Text of status here', 'in_reply_to_status_id' => 123456)); +    $status = $connection->delete('statuses/destroy/12345'); + +Contributors +============ + +* [Abraham Williams](https://twitter.com/abraham) - Main developer, current maintainer. diff --git a/mod/twitter_api/vendors/twitteroauth/twitterOAuth.php b/mod/twitter_api/vendors/twitteroauth/twitterOAuth.php new file mode 100644 index 000000000..4c2447c46 --- /dev/null +++ b/mod/twitter_api/vendors/twitteroauth/twitterOAuth.php @@ -0,0 +1,241 @@ +<?php + +/* + * Abraham Williams (abraham@abrah.am) http://abrah.am + * + * The first PHP Library to support OAuth for Twitter's REST API. + */ + +/* Load OAuth lib. You can find it at http://oauth.net */ +require_once('OAuth.php'); + +/** + * Twitter OAuth class + */ +class TwitterOAuth { +  /* Contains the last HTTP status code returned. */ +  public $http_code; +  /* Contains the last API call. */ +  public $url; +  /* Set up the API root URL. */ +  public $host = "https://api.twitter.com/1/"; +  /* Set timeout default. */ +  public $timeout = 30; +  /* Set connect timeout. */ +  public $connecttimeout = 30;  +  /* Verify SSL Cert. */ +  public $ssl_verifypeer = FALSE; +  /* Respons format. */ +  public $format = 'json'; +  /* Decode returned json data. */ +  public $decode_json = TRUE; +  /* Contains the last HTTP headers returned. */ +  public $http_info; +  /* Set the useragnet. */ +  public $useragent = 'TwitterOAuth v0.2.0-beta2'; +  /* Immediately retry the API call if the response was not successful. */ +  //public $retry = TRUE; + + + + +  /** +   * Set API URLS +   */ +  function accessTokenURL()  { return 'https://api.twitter.com/oauth/access_token'; } +  function authenticateURL() { return 'https://api.twitter.com/oauth/authenticate'; } +  function authorizeURL()    { return 'https://api.twitter.com/oauth/authorize'; } +  function requestTokenURL() { return 'https://api.twitter.com/oauth/request_token'; } + +  /** +   * Debug helpers +   */ +  function lastStatusCode() { return $this->http_status; } +  function lastAPICall() { return $this->last_api_call; } + +  /** +   * construct TwitterOAuth object +   */ +  function __construct($consumer_key, $consumer_secret, $oauth_token = NULL, $oauth_token_secret = NULL) { +    $this->sha1_method = new OAuthSignatureMethod_HMAC_SHA1(); +    $this->consumer = new OAuthConsumer($consumer_key, $consumer_secret); +    if (!empty($oauth_token) && !empty($oauth_token_secret)) { +      $this->token = new OAuthConsumer($oauth_token, $oauth_token_secret); +    } else { +      $this->token = NULL; +    } +  } + + +  /** +   * Get a request_token from Twitter +   * +   * @returns a key/value array containing oauth_token and oauth_token_secret +   */ +  function getRequestToken($oauth_callback) { +    $parameters = array(); +    $parameters['oauth_callback'] = $oauth_callback;  +    $request = $this->oAuthRequest($this->requestTokenURL(), 'GET', $parameters); +    $token = OAuthUtil::parse_parameters($request); +    $this->token = new OAuthConsumer($token['oauth_token'], $token['oauth_token_secret']); +    return $token; +  } + +  /** +   * Get the authorize URL +   * +   * @returns a string +   */ +  function getAuthorizeURL($token, $sign_in_with_twitter = TRUE) { +    if (is_array($token)) { +      $token = $token['oauth_token']; +    } +    if (empty($sign_in_with_twitter)) { +      return $this->authorizeURL() . "?oauth_token={$token}"; +    } else { +       return $this->authenticateURL() . "?oauth_token={$token}"; +    } +  } + +  /** +   * Exchange request token and secret for an access token and +   * secret, to sign API calls. +   * +   * @returns array("oauth_token" => "the-access-token", +   *                "oauth_token_secret" => "the-access-secret", +   *                "user_id" => "9436992", +   *                "screen_name" => "abraham") +   */ +  function getAccessToken($oauth_verifier) { +    $parameters = array(); +    $parameters['oauth_verifier'] = $oauth_verifier; +    $request = $this->oAuthRequest($this->accessTokenURL(), 'GET', $parameters); +    $token = OAuthUtil::parse_parameters($request); +    $this->token = new OAuthConsumer($token['oauth_token'], $token['oauth_token_secret']); +    return $token; +  } + +  /** +   * One time exchange of username and password for access token and secret. +   * +   * @returns array("oauth_token" => "the-access-token", +   *                "oauth_token_secret" => "the-access-secret", +   *                "user_id" => "9436992", +   *                "screen_name" => "abraham", +   *                "x_auth_expires" => "0") +   */   +  function getXAuthToken($username, $password) { +    $parameters = array(); +    $parameters['x_auth_username'] = $username; +    $parameters['x_auth_password'] = $password; +    $parameters['x_auth_mode'] = 'client_auth'; +    $request = $this->oAuthRequest($this->accessTokenURL(), 'POST', $parameters); +    $token = OAuthUtil::parse_parameters($request); +    $this->token = new OAuthConsumer($token['oauth_token'], $token['oauth_token_secret']); +    return $token; +  } + +  /** +   * GET wrapper for oAuthRequest. +   */ +  function get($url, $parameters = array()) { +    $response = $this->oAuthRequest($url, 'GET', $parameters); +    if ($this->format === 'json' && $this->decode_json) { +      return json_decode($response); +    } +    return $response; +  } +   +  /** +   * POST wrapper for oAuthRequest. +   */ +  function post($url, $parameters = array()) { +    $response = $this->oAuthRequest($url, 'POST', $parameters); +    if ($this->format === 'json' && $this->decode_json) { +      return json_decode($response); +    } +    return $response; +  } + +  /** +   * DELETE wrapper for oAuthReqeust. +   */ +  function delete($url, $parameters = array()) { +    $response = $this->oAuthRequest($url, 'DELETE', $parameters); +    if ($this->format === 'json' && $this->decode_json) { +      return json_decode($response); +    } +    return $response; +  } + +  /** +   * Format and sign an OAuth / API request +   */ +  function oAuthRequest($url, $method, $parameters) { +    if (strrpos($url, 'https://') !== 0 && strrpos($url, 'http://') !== 0) { +      $url = "{$this->host}{$url}.{$this->format}"; +    } +    $request = OAuthRequest::from_consumer_and_token($this->consumer, $this->token, $method, $url, $parameters); +    $request->sign_request($this->sha1_method, $this->consumer, $this->token); +    switch ($method) { +    case 'GET': +      return $this->http($request->to_url(), 'GET'); +    default: +      return $this->http($request->get_normalized_http_url(), $method, $request->to_postdata()); +    } +  } + +  /** +   * Make an HTTP request +   * +   * @return API results +   */ +  function http($url, $method, $postfields = NULL) { +    $this->http_info = array(); +    $ci = curl_init(); +    /* Curl settings */ +    curl_setopt($ci, CURLOPT_USERAGENT, $this->useragent); +    curl_setopt($ci, CURLOPT_CONNECTTIMEOUT, $this->connecttimeout); +    curl_setopt($ci, CURLOPT_TIMEOUT, $this->timeout); +    curl_setopt($ci, CURLOPT_RETURNTRANSFER, TRUE); +    curl_setopt($ci, CURLOPT_HTTPHEADER, array('Expect:')); +    curl_setopt($ci, CURLOPT_SSL_VERIFYPEER, $this->ssl_verifypeer); +    curl_setopt($ci, CURLOPT_HEADERFUNCTION, array($this, 'getHeader')); +    curl_setopt($ci, CURLOPT_HEADER, FALSE); + +    switch ($method) { +      case 'POST': +        curl_setopt($ci, CURLOPT_POST, TRUE); +        if (!empty($postfields)) { +          curl_setopt($ci, CURLOPT_POSTFIELDS, $postfields); +        } +        break; +      case 'DELETE': +        curl_setopt($ci, CURLOPT_CUSTOMREQUEST, 'DELETE'); +        if (!empty($postfields)) { +          $url = "{$url}?{$postfields}"; +        } +    } + +    curl_setopt($ci, CURLOPT_URL, $url); +    $response = curl_exec($ci); +    $this->http_code = curl_getinfo($ci, CURLINFO_HTTP_CODE); +    $this->http_info = array_merge($this->http_info, curl_getinfo($ci)); +    $this->url = $url; +    curl_close ($ci); +    return $response; +  } + +  /** +   * Get the header info to store. +   */ +  function getHeader($ch, $header) { +    $i = strpos($header, ':'); +    if (!empty($i)) { +      $key = str_replace('-', '_', strtolower(substr($header, 0, $i))); +      $value = trim(substr($header, $i + 2)); +      $this->http_header[$key] = $value; +    } +    return strlen($header); +  } +} diff --git a/mod/twitter_api/views/default/forms/twitter_api/interstitial_settings.php b/mod/twitter_api/views/default/forms/twitter_api/interstitial_settings.php new file mode 100644 index 000000000..b4882bb7f --- /dev/null +++ b/mod/twitter_api/views/default/forms/twitter_api/interstitial_settings.php @@ -0,0 +1,67 @@ +<?php +/** + * Make the user set up some alternative ways to login. + */ + +echo '<div>'; +$site = get_config('site'); +echo elgg_echo('twitter_api:interstitial:description', array($site->name)); +echo '</div>'; + +$user = elgg_get_logged_in_user_entity(); + +if (elgg_is_sticky_form('twitter_api_interstitial')) { +	extract(elgg_get_sticky_values('twitter_api_interstitial')); +	elgg_clear_sticky_form('twitter_api_interstitial'); +} + +if (!isset($display_name)) { +	$display_name = $user->name; +} + +// username +$title = elgg_echo('username'); + +$body = elgg_echo('twitter_api:interstitial:username'); +$body .= elgg_view('input/text', array('value' => $user->username, 'disabled' => 'disabled')); + +echo elgg_view_module('info', $title, $body); + +// display name +$title = elgg_echo('name'); + +$body = elgg_echo('twitter_api:interstitial:name'); +$body .= elgg_view('input/text', array('name' => 'display_name', 'value' => $display_name)); + +echo elgg_view_module('info', $title, $body); + +// email +$title = elgg_echo('email'); + +$body = elgg_echo('twitter_api:interstitial:email'); +$body .= elgg_view('input/email', array('name' => 'email', 'value' => $email)); + +echo elgg_view_module('info', $title, $body); + +// password +$title = elgg_echo('password'); + +$body = elgg_echo('twitter_api:interstitial:password'); +$body .= elgg_view('input/password', array('name' => 'password_1')); +$body .= elgg_echo('twitter_api:interstitial:password2'); +$body .= elgg_view('input/password', array('name' => 'password_2')); + +echo elgg_view_module('info', $title, $body); + +// buttons + +echo elgg_view('input/submit', array( +	'value' => elgg_echo('save') +)); + +echo elgg_view('output/url', array( +	'class' => 'float-alt', +	'text' => elgg_echo('twitter_api:interstitial:no_thanks'), +	'href' => '/', +	'is_trusted' => true, +));
\ No newline at end of file diff --git a/mod/twitter_api/views/default/plugins/twitter_api/settings.php b/mod/twitter_api/views/default/plugins/twitter_api/settings.php new file mode 100644 index 000000000..3a3ec93a2 --- /dev/null +++ b/mod/twitter_api/views/default/plugins/twitter_api/settings.php @@ -0,0 +1,65 @@ +<?php +/** + * Twitter API plugin settings + */ + +$instructions = elgg_echo('twitter_api:settings:instructions', array(elgg_get_site_url())); + +$consumer_key_string = elgg_echo('twitter_api:consumer_key'); +$consumer_key_view = elgg_view('input/text', array( +	'name' => 'params[consumer_key]', +	'value' => $vars['entity']->consumer_key, +	'class' => 'elgg-input-thin', +)); + +$consumer_secret_string = elgg_echo('twitter_api:consumer_secret'); +$consumer_secret_view = elgg_view('input/text', array( +	'name' => 'params[consumer_secret]', +	'value' => $vars['entity']->consumer_secret, +	'class' => 'elgg-input-thin', +)); + +$sign_on_with_twitter_string = elgg_echo('twitter_api:login'); +$sign_on_with_twitter_view = elgg_view('input/dropdown', array( +	'name' => 'params[sign_on]', +	'options_values' => array( +		'yes' => elgg_echo('option:yes'), +		'no' => elgg_echo('option:no'), +	), +	'value' => $vars['entity']->sign_on ? $vars['entity']->sign_on : 'no', +)); + +$new_users_with_twitter = elgg_echo('twitter_api:new_users'); +$new_users_with_twitter_view = elgg_view('input/dropdown', array( +	'name' => 'params[new_users]', +	'options_values' => array( +		'yes' => elgg_echo('option:yes'), +		'no' => elgg_echo('option:no'), +	), +	'value' => $vars['entity']->new_users ? $vars['entity']->new_users : 'no', +)); + +$post_to_twitter = ''; +if (elgg_is_active_plugin('thewire')) { +	$post_to_twitter_string = elgg_echo('twitter_api:post_to_twitter'); +	$post_to_twitter_view = elgg_view('input/dropdown', array( +		'name' => 'params[wire_posts]', +		'options_values' => array( +			'yes' => elgg_echo('option:yes'), +			'no' => elgg_echo('option:no'), +		), +		'value' => $vars['entity']->wire_posts ? $vars['entity']->wire_posts : 'no', +	)); +	$post_to_twitter = "<div>$post_to_twitter_string $post_to_twitter_view</div>"; +} + +$settings = <<<__HTML +<div class="elgg-content-thin mtm"><p>$instructions</p></div> +<div><label>$consumer_key_string</label><br /> $consumer_key_view</div> +<div><label>$consumer_secret_string</label><br /> $consumer_secret_view</div> +<div>$sign_on_with_twitter_string $sign_on_with_twitter_view</div> +<div>$new_users_with_twitter $new_users_with_twitter_view</div> +$post_to_twitter +__HTML; + +echo $settings; diff --git a/mod/twitter_api/views/default/plugins/twitter_api/usersettings.php b/mod/twitter_api/views/default/plugins/twitter_api/usersettings.php new file mode 100644 index 000000000..edcea2f0d --- /dev/null +++ b/mod/twitter_api/views/default/plugins/twitter_api/usersettings.php @@ -0,0 +1,37 @@ +<?php +/** + * User settings for Twitter API + */ + +$user = elgg_get_logged_in_user_entity(); +$user_guid = $user->getGUID(); +$twitter_name = elgg_get_plugin_user_setting('twitter_name', $user_guid, 'twitter_api'); +$access_key = elgg_get_plugin_user_setting('access_key', $user_guid, 'twitter_api'); +$access_secret = elgg_get_plugin_user_setting('access_secret', $user_guid, 'twitter_api'); + +$site_key = elgg_get_plugin_setting('consumer_key', 'twitter_api'); +$site_secret = elgg_get_plugin_setting('consumer_secret', 'twitter_api'); + +if (!($site_key && $site_secret)) { +	echo '<div>' . elgg_echo('twitter_api:usersettings:site_not_configured') . '</div>'; +	return true; +} + +$site_name = elgg_get_site_entity()->name; +echo '<div>' . elgg_echo('twitter_api:usersettings:description', array($site_name)) . '</div>'; + +if (!$access_key || !$access_secret) { +	// send user off to validate account +	$request_link = twitter_api_get_authorize_url(null, false); +	echo '<div>' . elgg_echo('twitter_api:usersettings:request', array($request_link, $site_name)) . '</div>'; +} else { +	// if this user logged in through twitter and never set up an email address, don't +	// let them disassociate their account. +	if ($user->email) { +		$url = elgg_get_site_url() . "twitter_api/revoke"; +		echo '<div>' . elgg_echo('twitter_api:usersettings:authorized', array($site_name, $twitter_name)) . '</div>'; +		echo '<div>' . sprintf(elgg_echo('twitter_api:usersettings:revoke'), $url) . '</div>'; +	} else { +		echo elgg_echo('twitter_api:usersettings:cannot_revoke', array(elgg_normalize_url('twitter_api/interstitial'))); +	} +} diff --git a/mod/twitter_api/views/default/twitter_api/css.php b/mod/twitter_api/views/default/twitter_api/css.php new file mode 100644 index 000000000..2d081d361 --- /dev/null +++ b/mod/twitter_api/views/default/twitter_api/css.php @@ -0,0 +1,13 @@ +<?php +/** + * Elgg Twitter API CSS + */ +?> + +.login_with_twitter { +	padding: 10px 0 0 0; +} + +.twitter-secret { +	width: 400px; +}
\ No newline at end of file diff --git a/mod/twitter_api/views/default/twitter_api/js.php b/mod/twitter_api/views/default/twitter_api/js.php new file mode 100644 index 000000000..3d2905a44 --- /dev/null +++ b/mod/twitter_api/views/default/twitter_api/js.php @@ -0,0 +1,16 @@ +<?php if (0): ?><script><?php endif; ?> + +// add ?persistent to login link +elgg.register_hook_handler('init', 'system', function() { +	$('form.elgg-form-login').each(function () { +		var link = $('.login_with_twitter a', this).get(0), +			$input = $('input[name="persistent"]', this); +		function sync() { +			link.href = link.href.replace(/\?.*/, '') + ($input[0].checked ? '?persistent' : ''); +		} +		if (link && $input.length) { +			sync(); +			$input.change(sync); +		} +	}); +}); diff --git a/mod/twitter_api/views/default/twitter_api/login.php b/mod/twitter_api/views/default/twitter_api/login.php new file mode 100644 index 000000000..7b4b4ecb1 --- /dev/null +++ b/mod/twitter_api/views/default/twitter_api/login.php @@ -0,0 +1,17 @@ +<?php +/** + * Extension of login form for Twitter sign in + */ + +$url = elgg_get_site_url() . 'twitter_api/forward'; +$img_url = elgg_get_site_url() . 'mod/twitter_api/graphics/sign-in-with-twitter-d.png'; + +$login = <<<__HTML +<div class="login_with_twitter"> +	<a href="$url"> +		<img src="$img_url" alt="Twitter" /> +	</a> +</div> +__HTML; + +echo $login; diff --git a/mod/twitter_api/views/default/twitter_api/metatags.php b/mod/twitter_api/views/default/twitter_api/metatags.php new file mode 100644 index 000000000..67c66dc37 --- /dev/null +++ b/mod/twitter_api/views/default/twitter_api/metatags.php @@ -0,0 +1,19 @@ +<?php +/** + * Adds required HTML head tags for Twitter Services. + * + * @package TwitterAPI + */ + +if ($api_key = elgg_get_plugin_setting('consumer_key', 'twitter_api')) { +	$tags = <<<__HTML +<script src="http://platform.twitter.com/anywhere.js?id=$api_key&v=1" type="text/javascript"></script> +<script type="text/javascript"> +	twttr.anywhere(function (T) { +		T(".twitter_anywhere").hovercards(); +	}); +</script> +__HTML; + +	echo $tags; +} | 
