2024-09-13 13:50:50 -04:00
|
|
|
<?php
|
|
|
|
|
2024-12-12 14:55:44 -05:00
|
|
|
namespace Socialbox\Enums;
|
2024-09-13 13:50:50 -04:00
|
|
|
|
2025-01-05 01:23:43 -05:00
|
|
|
use Socialbox\Classes\Configuration;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookAddContact;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookContactExists;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookDeleteContact;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookGetContact;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookGetContacts;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookRevokeSignature;
|
2025-01-30 15:24:55 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookTrustSignature;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\AddressBook\AddressBookUpdateRelationship;
|
|
|
|
use Socialbox\Classes\StandardMethods\Core\GetAllowedMethods;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Core\GetSelf;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Core\GetSessionState;
|
|
|
|
use Socialbox\Classes\StandardMethods\Core\Ping;
|
|
|
|
use Socialbox\Classes\StandardMethods\Core\ResolvePeer;
|
2025-02-20 00:34:07 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Core\ResolveSignature;
|
|
|
|
use Socialbox\Classes\StandardMethods\Core\VerifySignature;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\AcceptCommunityGuidelines;
|
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\AcceptPrivacyPolicy;
|
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\AcceptTermsOfService;
|
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\GetCommunityGuidelines;
|
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\GetPrivacyPolicy;
|
|
|
|
use Socialbox\Classes\StandardMethods\ServerDocuments\GetTermsOfService;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsAddInformationField;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsAddSignature;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsDeleteInformationField;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsDeleteOtp;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsDeletePassword;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsDeleteSignature;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsGetInformationField;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsGetInformationFields;
|
2025-02-10 15:37:53 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsGetSignature;
|
2025-02-10 15:38:43 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsGetSignatures;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsInformationFieldExists;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsSetOtp;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsSetPassword;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsSignatureExists;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsUpdateInformationField;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsUpdateInformationPrivacy;
|
|
|
|
use Socialbox\Classes\StandardMethods\Settings\SettingsUpdatePassword;
|
2025-02-03 17:55:18 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Verification\VerificationAuthenticate;
|
2025-01-29 15:52:38 -05:00
|
|
|
use Socialbox\Classes\StandardMethods\Verification\VerificationAnswerImageCaptcha;
|
|
|
|
use Socialbox\Classes\StandardMethods\Verification\VerificationGetImageCaptcha;
|
|
|
|
use Socialbox\Classes\StandardMethods\Verification\VerificationOtpAuthentication;
|
|
|
|
use Socialbox\Classes\StandardMethods\Verification\VerificationPasswordAuthentication;
|
2024-12-14 00:43:19 -05:00
|
|
|
use Socialbox\Enums\Flags\SessionFlags;
|
2025-01-07 15:25:32 -05:00
|
|
|
use Socialbox\Exceptions\DatabaseOperationException;
|
2025-01-30 00:37:37 -05:00
|
|
|
use Socialbox\Exceptions\Standard\StandardRpcException;
|
2024-12-12 14:55:44 -05:00
|
|
|
use Socialbox\Interfaces\SerializableInterface;
|
2025-01-07 15:25:32 -05:00
|
|
|
use Socialbox\Managers\OneTimePasswordManager;
|
|
|
|
use Socialbox\Managers\PasswordManager;
|
2024-12-12 14:55:44 -05:00
|
|
|
use Socialbox\Objects\ClientRequest;
|
2025-01-07 15:25:32 -05:00
|
|
|
use Socialbox\Objects\Database\SessionRecord;
|
2024-12-12 14:55:44 -05:00
|
|
|
use Socialbox\Objects\RpcRequest;
|
2024-09-13 13:50:50 -04:00
|
|
|
|
2024-12-12 14:55:44 -05:00
|
|
|
enum StandardMethods : string
|
2024-09-13 13:50:50 -04:00
|
|
|
{
|
2025-02-03 17:55:18 -05:00
|
|
|
// AddressBook Methods
|
|
|
|
case ADDRESS_BOOK_ADD_CONTACT = 'addressBookAddContact';
|
|
|
|
case ADDRESS_BOOK_CONTACT_EXISTS = 'addressBookContactExists';
|
|
|
|
case ADDRESS_BOOK_DELETE_CONTACT = 'addressBookDeleteContact';
|
|
|
|
case ADDRESS_BOOK_GET_CONTACT = 'addressBookGetContact';
|
|
|
|
case ADDRESS_BOOK_GET_CONTACTS = 'addressBookGetContacts';
|
|
|
|
case ADDRESS_BOOK_TRUST_SIGNATURE = 'addressBookTrustSignature';
|
|
|
|
case ADDRESS_BOOK_REVOKE_SIGNATURE = 'addressBookRevokeSignature';
|
|
|
|
case ADDRESS_BOOK_UPDATE_RELATIONSHIP = 'addressBookUpdateRelationship';
|
|
|
|
|
|
|
|
// Core Methods
|
2025-01-07 15:25:32 -05:00
|
|
|
case GET_ALLOWED_METHODS = 'getAllowedMethods';
|
2025-02-03 17:55:18 -05:00
|
|
|
case GET_SELF = 'getSelf';
|
|
|
|
case GET_SESSION_STATE = 'getSessionState';
|
|
|
|
case PING = 'ping';
|
|
|
|
case RESOLVE_PEER = 'resolvePeer';
|
2025-03-03 15:03:20 -05:00
|
|
|
case RESOLVE_SIGNATURE = 'resolveSignature';
|
|
|
|
case VERIFY_SIGNATURE = 'verifySignature';
|
|
|
|
|
|
|
|
// Encryption Channel Methods
|
|
|
|
case ENCRYPTION_ACCEPT_CHANNEL = 'encryptionAcceptChannel';
|
2025-03-04 13:41:26 -05:00
|
|
|
case ENCRYPTION_CHANNEL_ACKNOWLEDGE_MESSAGE = 'encryptionChannelAcknowledgeMessage';
|
2025-03-03 15:03:20 -05:00
|
|
|
case ENCRYPTION_CHANNEL_EXISTS = 'encryptionChannelExists';
|
|
|
|
case ENCRYPTION_CHANNEL_SEND = 'encryptionChannelSend';
|
|
|
|
case ENCRYPTION_CLOSE_CHANNEL = 'encryptionCloseChannel';
|
|
|
|
case ENCRYPTION_CREATE_CHANNEL = 'encryptionCreateChannel';
|
|
|
|
case ENCRYPTION_DECLINE_CHANNEL = 'encryptionDeclineChannel';
|
|
|
|
case ENCRYPTION_GET_CHANNEL = 'encryptionGetChannel';
|
2025-02-03 17:55:18 -05:00
|
|
|
|
|
|
|
// ServerDocument Methods
|
|
|
|
case ACCEPT_COMMUNITY_GUIDELINES = 'acceptCommunityGuidelines';
|
2024-12-14 00:43:19 -05:00
|
|
|
case ACCEPT_PRIVACY_POLICY = 'acceptPrivacyPolicy';
|
|
|
|
case ACCEPT_TERMS_OF_SERVICE = 'acceptTermsOfService';
|
2024-12-20 15:02:57 -05:00
|
|
|
case GET_COMMUNITY_GUIDELINES = 'getCommunityGuidelines';
|
2025-02-03 17:55:18 -05:00
|
|
|
case GET_PRIVACY_POLICY = 'getPrivacyPolicy';
|
|
|
|
case GET_TERMS_OF_SERVICE = 'getTermsOfService';
|
2024-12-20 15:02:57 -05:00
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
// Settings Methods
|
|
|
|
case SETTINGS_ADD_INFORMATION_FIELD = 'settingsAddInformationField';
|
|
|
|
case SETTINGS_ADD_SIGNATURE = 'settingsAddSigningKey';
|
|
|
|
case SETTINGS_DELETE_INFORMATION_FIELD = 'settingsDeleteInformationField';
|
|
|
|
case SETTINGS_DELETE_OTP = 'settingsDeleteOtp';
|
|
|
|
case SETTINGS_DELETE_PASSWORD = 'settingsDeletePassword';
|
|
|
|
case SETTINGS_DELETE_SIGNATURE = 'settingsDeleteSigningKey';
|
|
|
|
case SETTINGS_GET_INFORMATION_FIELD = 'settingsGetInformationField';
|
|
|
|
case SETTINGS_GET_INFORMATION_FIELDS = 'settingsGetInformationFields';
|
2025-02-10 15:38:43 -05:00
|
|
|
case SETTINGS_GET_SIGNATURE = 'settingsGetSignature';
|
|
|
|
case SETTINGS_GET_SIGNATURES = 'settingsGetSignatures';
|
2025-02-03 17:55:18 -05:00
|
|
|
case SETTINGS_INFORMATION_FIELD_EXISTS = 'settingsInformationFieldExists';
|
|
|
|
case SETTINGS_SET_OTP = 'settingsSetOtp';
|
|
|
|
case SETTINGS_SET_PASSWORD = 'settingsSetPassword';
|
|
|
|
case SETTINGS_SIGNATURE_EXISTS = 'settingsSignatureExists';
|
|
|
|
case SETTINGS_UPDATE_INFORMATION_FIELD = 'settingsUpdateInformationField';
|
|
|
|
case SETTINGS_UPDATE_INFORMATION_PRIVACY = 'settingsUpdateInformationPrivacy';
|
|
|
|
case SETTINGS_UPDATE_PASSWORD = 'settingsUpdatePassword';
|
|
|
|
|
|
|
|
// Verification Methods
|
|
|
|
case VERIFICATION_ANSWER_IMAGE_CAPTCHA = 'verificationAnswerImageCaptcha';
|
2025-01-29 15:27:21 -05:00
|
|
|
case VERIFICATION_AUTHENTICATE = 'authenticate';
|
2025-02-03 17:55:18 -05:00
|
|
|
case VERIFICATION_GET_IMAGE_CAPTCHA = 'verificationGetImageCaptcha';
|
|
|
|
case VERIFICATION_OTP_AUTHENTICATION = 'verificationOtpAuthentication';
|
|
|
|
case VERIFICATION_PASSWORD_AUTHENTICATION = 'verificationPasswordAuthentication';
|
|
|
|
// NOT IMPLEMENTED VERIFICATION METHODS
|
2025-01-07 15:26:32 -05:00
|
|
|
case VERIFICATION_EMAIL = 'verificationEmail'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_ANSWER_EMAIL = 'verificationAnswerEmail'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_SMS = 'verificationSms'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_ANSWER_SMS = 'verificationAnswerSms'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_PHONE_CALL = 'verificationPhoneCall'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_ANSWER_PHONE_CALL = 'verificationAnswerPhoneCall'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_GET_TEXT_CAPTCHA = 'verificationGetTextCaptcha'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_ANSWER_TEXT_CAPTCHA = 'verificationAnswerTextCaptcha'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_GET_EXTERNAL_URL = 'verificationGetExternalUrl'; // NOT IMPLEMENTED
|
|
|
|
case VERIFICATION_ANSWER_EXTERNAL_URL = 'verificationAnswerExternalUrl'; // NOT IMPLEMENTED
|
2025-01-03 18:30:50 -05:00
|
|
|
|
2025-01-29 15:27:21 -05:00
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
// TODO: COMPLETE THE REST
|
|
|
|
// MISC
|
2025-01-29 15:27:21 -05:00
|
|
|
case GET_STATE = 'getState';
|
|
|
|
|
|
|
|
// Messaging methods
|
|
|
|
case MESSAGES_GET_INBOX = 'messagesGetInbox';
|
|
|
|
case MESSAGES_GET_UNTRUSTED = 'messagesGetUntrusted';
|
|
|
|
case MESSAGES_GET_ARCHIVED = 'messagesGetArchived';
|
|
|
|
case MESSAGES_GET_OUTBOX = 'messagesGetOutbox';
|
|
|
|
case MESSAGES_GET_MESSAGE = 'messagesGetMessage';
|
|
|
|
case MESSAGES_GET_DRAFTS = 'messagesGetDrafts';
|
|
|
|
case MESSAGES_GET_DRAFT = 'messagesGetDraft';
|
|
|
|
case MESSAGES_TOGGLE_MESSAGE_READ = 'messagesToggleMessageRead';
|
|
|
|
case MESSAGES_TOGGLE_MESSAGE_STAR = 'messagesToggleMessageStar';
|
|
|
|
case MESSAGES_TOGGLE_MESSAGE_FLAG = 'messagesToggleMessageFlag';
|
|
|
|
case MESSAGES_ARCHIVE_MESSAGE = 'messagesArchiveMessage';
|
|
|
|
case MESSAGES_UNARCHIVE_MESSAGE = 'messagesUnarchiveMessage';
|
|
|
|
case MESSAGES_DELETE_MESSAGE = 'messagesDeleteMessage';
|
|
|
|
case MESSAGES_DELETE_DRAFT = 'messagesDeleteDraft';
|
|
|
|
case MESSAGES_COMPOSE_NEW_MESSAGE = 'messagesComposeNewMessage';
|
|
|
|
case MESSAGES_COMPOSE_REPLY_MESSAGE = 'messagesComposeReplyMessage';
|
|
|
|
case MESSAGES_COMPOSE_FORWARD_MESSAGE = 'messagesComposeForwardMessage';
|
|
|
|
case MESSAGES_SET_MESSAGE_RECIPIENTS = 'messagesSetMessageRecipients';
|
|
|
|
case MESSAGES_SET_MESSAGE_CARBON_COPY_RECIPIENTS = 'messagesSetMessageCarbonCopyRecipients';
|
|
|
|
case MESSAGES_SET_MESSAGE_BLIND_CARBON_COPY_RECIPIENTS = 'messagesSetMessageBlindCarbonCopyRecipients';
|
|
|
|
case MESSAGES_SET_MESSAGE_ENCRYPTION_CHANNEL = 'messagesSetMessageEncryptionChannel';
|
|
|
|
case MESSAGES_SET_MESSAGE_SUBJECT = 'messagesSetMessageSubject';
|
|
|
|
case MESSAGES_SET_MESSAGE_BODY = 'messagesSetMessageBody';
|
|
|
|
case MESSAGES_SEND_MESSAGE = 'messagesSendMessage';
|
2025-01-22 15:35:35 -05:00
|
|
|
|
2024-12-12 14:55:44 -05:00
|
|
|
/**
|
2024-12-14 00:43:19 -05:00
|
|
|
* Executes the appropriate operation based on the current context and requests provided.
|
|
|
|
*
|
|
|
|
* @param ClientRequest $request The client request object containing necessary data for execution.
|
|
|
|
* @param RpcRequest $rpcRequest The RPC request object providing additional parameters for execution.
|
|
|
|
* @return SerializableInterface|null The result of the operation as a serializable interface or null if no operation matches.
|
2025-01-30 00:37:37 -05:00
|
|
|
* @throws StandardRpcException If an error occurs during execution
|
2024-12-12 14:55:44 -05:00
|
|
|
*/
|
|
|
|
public function execute(ClientRequest $request, RpcRequest $rpcRequest): ?SerializableInterface
|
2024-09-13 13:50:50 -04:00
|
|
|
{
|
2024-12-12 14:55:44 -05:00
|
|
|
return match ($this)
|
|
|
|
{
|
2025-02-03 17:55:18 -05:00
|
|
|
// AddressBook Methods
|
|
|
|
self::ADDRESS_BOOK_ADD_CONTACT => AddressBookAddContact::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_CONTACT_EXISTS => AddressBookContactExists::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_DELETE_CONTACT => AddressBookDeleteContact::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACT => AddressBookGetContact::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACTS => AddressBookGetContacts::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_TRUST_SIGNATURE => AddressBookTrustSignature::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_REVOKE_SIGNATURE => AddressBookRevokeSignature::execute($request, $rpcRequest),
|
|
|
|
self::ADDRESS_BOOK_UPDATE_RELATIONSHIP => AddressBookUpdateRelationship::execute($request, $rpcRequest),
|
|
|
|
|
|
|
|
// Core Methods
|
2025-01-07 15:25:32 -05:00
|
|
|
self::GET_ALLOWED_METHODS => GetAllowedMethods::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::GET_SELF => GetSelf::execute($request, $rpcRequest),
|
|
|
|
self::GET_SESSION_STATE => GetSessionState::execute($request, $rpcRequest),
|
|
|
|
self::PING => Ping::execute($request, $rpcRequest),
|
|
|
|
self::RESOLVE_PEER => ResolvePeer::execute($request, $rpcRequest),
|
2025-03-03 15:03:20 -05:00
|
|
|
self::RESOLVE_SIGNATURE => ResolveSignature::execute($request, $rpcRequest),
|
|
|
|
self::VERIFY_SIGNATURE => VerifySignature::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
|
|
|
|
// Server Document Methods
|
2024-12-14 00:43:19 -05:00
|
|
|
self::ACCEPT_PRIVACY_POLICY => AcceptPrivacyPolicy::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::ACCEPT_COMMUNITY_GUIDELINES => AcceptCommunityGuidelines::execute($request, $rpcRequest),
|
2024-12-14 00:43:19 -05:00
|
|
|
self::ACCEPT_TERMS_OF_SERVICE => AcceptTermsOfService::execute($request, $rpcRequest),
|
2024-12-23 19:02:37 -05:00
|
|
|
self::GET_COMMUNITY_GUIDELINES => GetCommunityGuidelines::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::GET_PRIVACY_POLICY => GetPrivacyPolicy::execute($request, $rpcRequest),
|
|
|
|
self::GET_TERMS_OF_SERVICE => GetTermsOfService::execute($request, $rpcRequest),
|
2025-01-24 15:10:20 -05:00
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
// Settings Methods
|
2025-01-24 15:10:20 -05:00
|
|
|
self::SETTINGS_ADD_INFORMATION_FIELD => SettingsAddInformationField::execute($request, $rpcRequest),
|
2025-01-29 15:27:21 -05:00
|
|
|
self::SETTINGS_ADD_SIGNATURE => SettingsAddSignature::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::SETTINGS_DELETE_INFORMATION_FIELD => SettingsDeleteInformationField::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_DELETE_OTP => SettingsDeleteOtp::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_DELETE_PASSWORD => SettingsDeletePassword::execute($request, $rpcRequest),
|
2025-01-29 15:27:21 -05:00
|
|
|
self::SETTINGS_DELETE_SIGNATURE => SettingsDeleteSignature::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::SETTINGS_GET_INFORMATION_FIELD => SettingsGetInformationField::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_GET_INFORMATION_FIELDS => SettingsGetInformationFields::execute($request, $rpcRequest),
|
2025-02-10 15:37:53 -05:00
|
|
|
self::SETTINGS_GET_SIGNATURE => SettingsGetSignature::execute($request, $rpcRequest),
|
2025-02-10 15:38:43 -05:00
|
|
|
self::SETTINGS_GET_SIGNATURES => SettingsGetSignatures::execute($request, $rpcRequest),
|
2025-02-03 17:55:18 -05:00
|
|
|
self::SETTINGS_INFORMATION_FIELD_EXISTS => SettingsInformationFieldExists::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_SET_OTP => SettingsSetOtp::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_SET_PASSWORD => SettingsSetPassword::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_SIGNATURE_EXISTS => SettingsSignatureExists::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_UPDATE_INFORMATION_FIELD => SettingsUpdateInformationField::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_UPDATE_INFORMATION_PRIVACY => SettingsUpdateInformationPrivacy::execute($request, $rpcRequest),
|
|
|
|
self::SETTINGS_UPDATE_PASSWORD => SettingsUpdatePassword::execute($request, $rpcRequest),
|
2025-01-03 18:30:50 -05:00
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
// Verification Methods
|
|
|
|
self::VERIFICATION_ANSWER_IMAGE_CAPTCHA => VerificationAnswerImageCaptcha::execute($request, $rpcRequest),
|
|
|
|
self::VERIFICATION_AUTHENTICATE => VerificationAuthenticate::execute($request, $rpcRequest),
|
|
|
|
self::VERIFICATION_GET_IMAGE_CAPTCHA => VerificationGetImageCaptcha::execute($request, $rpcRequest),
|
|
|
|
self::VERIFICATION_OTP_AUTHENTICATION => VerificationOtpAuthentication::execute($request, $rpcRequest),
|
|
|
|
self::VERIFICATION_PASSWORD_AUTHENTICATION => VerificationPasswordAuthentication::execute($request, $rpcRequest),
|
2025-01-10 15:16:02 -05:00
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
// Default Unknown/Not Implemented
|
2024-12-23 19:02:37 -05:00
|
|
|
default => $rpcRequest->produceError(StandardError::METHOD_NOT_ALLOWED, sprintf("The method %s is not supported by the server", $rpcRequest->getMethod()))
|
2024-12-12 14:55:44 -05:00
|
|
|
};
|
|
|
|
}
|
2024-12-14 00:43:19 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks if the access method is allowed for the given client request.
|
|
|
|
*
|
|
|
|
* @param ClientRequest $clientRequest The client request instance to check access against.
|
2025-01-07 15:25:32 -05:00
|
|
|
* @throws DatabaseOperationException If an error occurs while checking the database for session information.
|
2025-01-30 00:37:37 -05:00
|
|
|
* @throws StandardRpcException If the method is not allowed for the given client request.
|
2025-02-20 00:34:07 -05:00
|
|
|
* @return bool
|
2024-12-14 00:43:19 -05:00
|
|
|
*/
|
2025-02-20 00:34:07 -05:00
|
|
|
public function checkAccess(ClientRequest $clientRequest): bool
|
2024-12-14 00:43:19 -05:00
|
|
|
{
|
2025-02-20 00:34:07 -05:00
|
|
|
return in_array($this, self::getAllowedMethods($clientRequest));
|
2024-12-14 00:43:19 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines the list of allowed methods for a given client request.
|
|
|
|
*
|
|
|
|
* @param ClientRequest $clientRequest The client request for which allowed methods are determined.
|
|
|
|
* @return array Returns an array of allowed methods for the provided client request.
|
2025-01-07 15:25:32 -05:00
|
|
|
* @throws DatabaseOperationException If an error occurs while checking the database for session information.
|
2025-01-30 15:42:18 -05:00
|
|
|
* @throws StandardRpcException
|
2024-12-14 00:43:19 -05:00
|
|
|
*/
|
|
|
|
public static function getAllowedMethods(ClientRequest $clientRequest): array
|
|
|
|
{
|
2024-12-23 19:02:37 -05:00
|
|
|
// These methods should always accessible
|
2025-02-03 17:55:18 -05:00
|
|
|
$methods = self::getCoreMethods();
|
2024-12-14 00:43:19 -05:00
|
|
|
$session = $clientRequest->getSession();
|
|
|
|
|
2025-01-07 15:25:32 -05:00
|
|
|
if($session === null)
|
|
|
|
{
|
|
|
|
return $methods;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
$external = $session->isExternal();
|
|
|
|
}
|
|
|
|
catch(DatabaseOperationException)
|
|
|
|
{
|
|
|
|
$external = false;
|
|
|
|
}
|
|
|
|
|
2025-01-05 01:23:43 -05:00
|
|
|
// If the session is external (eg; coming from a different server)
|
|
|
|
// Servers will have their own access control mechanisms
|
2025-01-07 15:25:32 -05:00
|
|
|
if($external)
|
2024-12-14 00:43:19 -05:00
|
|
|
{
|
2025-01-07 15:25:32 -05:00
|
|
|
$methods = array_merge($methods, self::getExternalMethods($clientRequest));
|
2024-12-14 00:43:19 -05:00
|
|
|
}
|
2025-01-05 01:23:43 -05:00
|
|
|
// If the session is authenticated, then allow additional method calls
|
|
|
|
elseif($session->isAuthenticated())
|
2024-12-14 00:43:19 -05:00
|
|
|
{
|
2025-02-03 17:55:18 -05:00
|
|
|
$methods = array_merge($methods, self::getAuthenticatedMethods($session));
|
2025-01-07 15:25:32 -05:00
|
|
|
}
|
|
|
|
// If the session isn't authenticated, check if it's a registering user
|
|
|
|
elseif($session->flagExists(SessionFlags::REGISTRATION_REQUIRED))
|
|
|
|
{
|
|
|
|
$methods = array_merge($methods, self::getRegistrationMethods($session));
|
|
|
|
}
|
|
|
|
// If the user is a registering peer, check if it's an authenticating one
|
|
|
|
elseif($session->flagExists(SessionFlags::AUTHENTICATION_REQUIRED))
|
|
|
|
{
|
|
|
|
$methods = array_merge($methods, self::getAuthenticationMethods($clientRequest));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $methods;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2025-01-10 18:09:47 -05:00
|
|
|
* Retrieves a list of external methods based on the client's session state.
|
|
|
|
*
|
2025-01-22 15:35:35 -05:00
|
|
|
* @param ClientRequest $clientRequest The client request object containing all the request parameters
|
|
|
|
* @return array Returns an array methods that are available for external sessions
|
2025-01-30 15:42:18 -05:00
|
|
|
* @throws DatabaseOperationException If an error occurs while checking the database for session information.
|
|
|
|
* @throws StandardRpcException If an error occurs while checking the database for session information.
|
2025-01-10 18:09:47 -05:00
|
|
|
*/
|
2025-01-07 15:25:32 -05:00
|
|
|
private static function getExternalMethods(ClientRequest $clientRequest): array
|
|
|
|
{
|
2025-01-10 18:09:47 -05:00
|
|
|
$methods = [];
|
|
|
|
|
|
|
|
$session = $clientRequest->getSession();
|
|
|
|
if(!$session->isAuthenticated() || $session->flagExists(SessionFlags::AUTHENTICATION_REQUIRED))
|
|
|
|
{
|
2025-01-29 15:27:21 -05:00
|
|
|
$methods[] = self::VERIFICATION_AUTHENTICATE;
|
2025-01-10 18:09:47 -05:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$methods[] = self::RESOLVE_PEER;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $methods;
|
2025-01-07 15:25:32 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieves a list of authenticated user methods based on configuration settings.
|
|
|
|
*
|
|
|
|
* @return array An array of methods that are available to
|
|
|
|
*/
|
2025-02-03 17:55:18 -05:00
|
|
|
private static function getAuthenticatedMethods(?SessionRecord $session=null): array
|
2025-01-07 15:25:32 -05:00
|
|
|
{
|
2025-02-03 17:55:18 -05:00
|
|
|
return array_merge(
|
|
|
|
self::getAddressBookMethods(),
|
|
|
|
self::getServerDocumentMethods($session),
|
|
|
|
self::getSettingsMethods(),
|
|
|
|
self::getVerificationMethods($session)
|
|
|
|
);
|
2025-01-07 15:25:32 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieves a list of registration methods based on the session flags.
|
|
|
|
*
|
|
|
|
* @param SessionRecord $session The session record containing flags that determine available registration methods.
|
|
|
|
* @return array An array of registration methods available for the session.
|
|
|
|
*/
|
|
|
|
private static function getRegistrationMethods(SessionRecord $session): array
|
|
|
|
{
|
|
|
|
// Don't allow registration methods if registration is disabled
|
|
|
|
if(!Configuration::getRegistrationConfiguration()->isRegistrationEnabled())
|
|
|
|
{
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
2025-02-03 17:55:18 -05:00
|
|
|
$methods = self::getSettingsMethods();
|
2025-01-22 15:35:35 -05:00
|
|
|
|
2025-01-07 15:25:32 -05:00
|
|
|
// If the flag `VER_PRIVACY_POLICY` is set, then the user can accept the privacy policy
|
|
|
|
if($session->flagExists(SessionFlags::VER_PRIVACY_POLICY))
|
|
|
|
{
|
|
|
|
$methods[] = self::ACCEPT_PRIVACY_POLICY;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the flag `VER_TERMS_OF_SERVICE` is set, then the user can accept the terms of service
|
|
|
|
if($session->flagExists(SessionFlags::VER_TERMS_OF_SERVICE))
|
|
|
|
{
|
|
|
|
$methods[] = self::ACCEPT_TERMS_OF_SERVICE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the flag `VER_COMMUNITY_GUIDELINES` is set, then the user can accept the community guidelines
|
|
|
|
if($session->flagExists(SessionFlags::VER_COMMUNITY_GUIDELINES))
|
|
|
|
{
|
|
|
|
$methods[] = self::ACCEPT_COMMUNITY_GUIDELINES;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the flag `VER_IMAGE_CAPTCHA` is set, then the user has to get and answer an image captcha
|
|
|
|
if($session->flagExists(SessionFlags::VER_IMAGE_CAPTCHA))
|
|
|
|
{
|
|
|
|
$methods[] = self::VERIFICATION_GET_IMAGE_CAPTCHA;
|
|
|
|
$methods[] = self::VERIFICATION_ANSWER_IMAGE_CAPTCHA;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $methods;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieves the list of authentication methods available for the given client request.
|
|
|
|
*
|
|
|
|
* @param ClientRequest $clientRequest The client request for which the authentication methods are determined.
|
|
|
|
* @return array The list of available authentication methods as an array of constants.
|
|
|
|
* @throws DatabaseOperationException If an error occurs while checking the database for authentication methods.
|
2025-01-30 15:42:18 -05:00
|
|
|
* @throws StandardRpcException
|
2025-01-07 15:25:32 -05:00
|
|
|
*/
|
|
|
|
private static function getAuthenticationMethods(ClientRequest $clientRequest): array
|
|
|
|
{
|
|
|
|
if(!Configuration::getAuthenticationConfiguration()->isEnabled())
|
|
|
|
{
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
$methods = [];
|
|
|
|
|
|
|
|
if(Configuration::getAuthenticationConfiguration()->isImageCaptchaVerificationRequired())
|
|
|
|
{
|
|
|
|
$methods[] = self::VERIFICATION_GET_IMAGE_CAPTCHA;
|
|
|
|
$methods[] = self::VERIFICATION_ANSWER_IMAGE_CAPTCHA;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
$peer = $clientRequest->getPeer();
|
|
|
|
|
|
|
|
if(PasswordManager::usesPassword($peer))
|
|
|
|
{
|
|
|
|
$methods[] = self::VERIFICATION_PASSWORD_AUTHENTICATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(OneTimePasswordManager::usesOtp($peer->getUuid()))
|
|
|
|
{
|
|
|
|
$methods[] = self::VERIFICATION_OTP_AUTHENTICATION;
|
2024-12-23 19:02:37 -05:00
|
|
|
}
|
|
|
|
|
2024-12-14 00:43:19 -05:00
|
|
|
return $methods;
|
|
|
|
}
|
2025-02-03 17:55:18 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns an array of methods for managing the peer's AddressBook
|
|
|
|
*
|
|
|
|
* @param bool $readOnly If True, only methods related to reading will be returned.
|
|
|
|
* @return StandardMethods[] The array of AddressBook methods to return
|
|
|
|
*/
|
|
|
|
public static function getAddressBookMethods(bool $readOnly=false): array
|
|
|
|
{
|
|
|
|
if($readOnly)
|
|
|
|
{
|
|
|
|
return [
|
|
|
|
self::ADDRESS_BOOK_CONTACT_EXISTS,
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACT,
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACTS,
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
return [
|
|
|
|
self::ADDRESS_BOOK_ADD_CONTACT,
|
|
|
|
self::ADDRESS_BOOK_CONTACT_EXISTS,
|
|
|
|
self::ADDRESS_BOOK_DELETE_CONTACT,
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACT,
|
|
|
|
self::ADDRESS_BOOK_GET_CONTACTS,
|
|
|
|
self::ADDRESS_BOOK_REVOKE_SIGNATURE,
|
|
|
|
self::ADDRESS_BOOK_TRUST_SIGNATURE,
|
|
|
|
self::ADDRESS_BOOK_UPDATE_RELATIONSHIP
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns an array of methods for the core methods of the Socialbox RPC protocol
|
|
|
|
*
|
|
|
|
* @return StandardMethods[] An array of Core methods
|
|
|
|
*/
|
|
|
|
public static function getCoreMethods(): array
|
|
|
|
{
|
|
|
|
return [
|
|
|
|
self::GET_ALLOWED_METHODS,
|
|
|
|
self::GET_SELF,
|
|
|
|
self::GET_SESSION_STATE,
|
|
|
|
self::PING,
|
|
|
|
self::RESOLVE_PEER,
|
2025-03-03 15:03:20 -05:00
|
|
|
self::RESOLVE_SIGNATURE,
|
|
|
|
self::VERIFY_SIGNATURE
|
2025-02-03 17:55:18 -05:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns na array of ServerDocument methods made available for the peer, if $session is false then all
|
|
|
|
* methods would be returned, otherwise the allowed methods would be returned.
|
|
|
|
*
|
|
|
|
* @param SessionRecord|null $session Optional. If null, all session will return otherwise only allowed methods would be returned
|
|
|
|
* @return StandardMethods[] An array of standard methods that are related to Server documentation
|
|
|
|
*/
|
|
|
|
public static function getServerDocumentMethods(?SessionRecord $session=null): array
|
|
|
|
{
|
|
|
|
if($session === null)
|
|
|
|
{
|
|
|
|
return [
|
|
|
|
self::ACCEPT_COMMUNITY_GUIDELINES,
|
|
|
|
self::ACCEPT_PRIVACY_POLICY,
|
|
|
|
self::ACCEPT_TERMS_OF_SERVICE,
|
|
|
|
self::GET_COMMUNITY_GUIDELINES,
|
|
|
|
self::GET_PRIVACY_POLICY,
|
|
|
|
self::GET_TERMS_OF_SERVICE
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
$results = [
|
|
|
|
self::GET_COMMUNITY_GUIDELINES,
|
|
|
|
self::GET_PRIVACY_POLICY,
|
|
|
|
self::GET_TERMS_OF_SERVICE
|
|
|
|
];
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFLags::VER_COMMUNITY_GUIDELINES))
|
|
|
|
{
|
|
|
|
$results[] = self::ACCEPT_COMMUNITY_GUIDELINES;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_PRIVACY_POLICY))
|
|
|
|
{
|
|
|
|
$results[] = self::ACCEPT_PRIVACY_POLICY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_TERMS_OF_SERVICE))
|
|
|
|
{
|
|
|
|
$results[] = self::ACCEPT_TERMS_OF_SERVICE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $results;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns an array of setting methods that are accessible.
|
|
|
|
*
|
|
|
|
* @return StandardMethods[]
|
|
|
|
*/
|
|
|
|
public static function getSettingsMethods(): array
|
|
|
|
{
|
|
|
|
return [
|
|
|
|
self::SETTINGS_ADD_INFORMATION_FIELD,
|
|
|
|
self::SETTINGS_ADD_SIGNATURE,
|
|
|
|
self::SETTINGS_DELETE_INFORMATION_FIELD,
|
|
|
|
self::SETTINGS_DELETE_OTP,
|
|
|
|
self::SETTINGS_DELETE_PASSWORD,
|
|
|
|
self::SETTINGS_DELETE_SIGNATURE,
|
|
|
|
self::SETTINGS_GET_INFORMATION_FIELD,
|
|
|
|
self::SETTINGS_GET_INFORMATION_FIELDS,
|
|
|
|
self::SETTINGS_GET_SIGNATURE,
|
|
|
|
self::SETTINGS_GET_SIGNATURES,
|
|
|
|
self::SETTINGS_INFORMATION_FIELD_EXISTS,
|
|
|
|
self::SETTINGS_SET_OTP,
|
|
|
|
self::SETTINGS_SET_PASSWORD,
|
|
|
|
self::SETTINGS_SIGNATURE_EXISTS,
|
|
|
|
self::SETTINGS_UPDATE_INFORMATION_FIELD,
|
|
|
|
self::SETTINGS_UPDATE_INFORMATION_PRIVACY,
|
|
|
|
self::SETTINGS_UPDATE_PASSWORD
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns an array of verification methods that are accessible, if $session is null, all methods are returned,
|
|
|
|
* otherwise only accessible methods are returned.
|
|
|
|
*
|
|
|
|
* @return StandardMethods[]
|
|
|
|
*/
|
|
|
|
public static function getVerificationMethods(?SessionRecord $session=null): array
|
|
|
|
{
|
|
|
|
if($session === null)
|
|
|
|
{
|
|
|
|
return [
|
|
|
|
self::VERIFICATION_ANSWER_IMAGE_CAPTCHA,
|
|
|
|
self::VERIFICATION_AUTHENTICATE,
|
|
|
|
self::VERIFICATION_GET_IMAGE_CAPTCHA,
|
|
|
|
self::VERIFICATION_OTP_AUTHENTICATION,
|
|
|
|
self::VERIFICATION_PASSWORD_AUTHENTICATION
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
$results = [];
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_IMAGE_CAPTCHA))
|
|
|
|
{
|
|
|
|
$results[] = self::VERIFICATION_GET_IMAGE_CAPTCHA;
|
|
|
|
$results[] = self::VERIFICATION_ANSWER_IMAGE_CAPTCHA;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_AUTHENTICATION))
|
|
|
|
{
|
|
|
|
$results[] = self::VERIFICATION_AUTHENTICATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_OTP))
|
|
|
|
{
|
|
|
|
$results[] = self::VERIFICATION_OTP_AUTHENTICATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($session->flagExists(SessionFlags::VER_PASSWORD))
|
|
|
|
{
|
|
|
|
$results[] = self::VERIFICATION_PASSWORD_AUTHENTICATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $results;
|
|
|
|
}
|
2024-12-12 14:55:44 -05:00
|
|
|
}
|