5 * @author Donal McMullan donal@catalyst.net.nz
7 * @license http://www.gnu.org/copyleft/gpl.html GNU Public License
11 require_once $CFG->dirroot.'/mnet/lib.php';
14 * Class representing an XMLRPC request against a remote machine
16 class mnet_xmlrpc_client {
19 var $params = array();
26 * Constructor returns true
28 function mnet_xmlrpc_client() {
29 // make sure we've got this set up before we try and do anything else
30 $this->mnet = get_mnet_environment();
35 * Allow users to override the default timeout
36 * @param int $timeout Request timeout in seconds
37 * $return bool True if param is an integer or integer string
39 function set_timeout($timeout) {
40 if (!is_integer($timeout)) {
41 if (is_numeric($timeout)) {
42 $this->timeout = (integer)$timeout;
47 $this->timeout = $timeout;
52 * Set the path to the method or function we want to execute on the remote
54 * mod/scorm/functionname
55 * auth/mnet/methodname
56 * In the case of auth and enrolment plugins, an object will be created and
57 * the method on that object will be called
59 function set_method($xmlrpcpath) {
60 if (is_string($xmlrpcpath)) {
61 $this->method = $xmlrpcpath;
62 $this->params = array();
66 $this->params = array();
71 * Add a parameter to the array of parameters.
73 * @param string $argument A transport ID, as defined in lib.php
74 * @param string $type The argument type, can be one of:
85 * In its weakly-typed wisdom, PHP will (currently)
86 * ignore everything except datetime and base64
87 * @return bool True on success
89 function add_param($argument, $type = 'string') {
91 $allowed_types = array('none',
102 if (!in_array($type, $allowed_types)) {
106 if ($type != 'datetime' && $type != 'base64') {
107 $this->params[] = $argument;
111 // Note weirdness - The type of $argument gets changed to an object with
112 // value and type properties.
113 // bool xmlrpc_set_type ( string &value, string type )
114 xmlrpc_set_type($argument, $type);
115 $this->params[] = $argument;
120 * Send the request to the server - decode and return the response
122 * @param object $mnet_peer A mnet_peer object with details of the
123 * remote host we're connecting to
124 * @return mixed A PHP variable, as returned by the
127 function send($mnet_peer) {
131 if (!$this->permission_to_call($mnet_peer)) {
132 mnet_debug("tried and wasn't allowed to call a method on $mnet_peer->wwwroot");
136 $this->requesttext = xmlrpc_encode_request($this->method, $this->params, array("encoding" => "utf-8", "escaping" => "markup"));
137 $this->signedrequest = mnet_sign_message($this->requesttext);
138 $this->encryptedrequest = mnet_encrypt_message($this->signedrequest, $mnet_peer->public_key);
140 $httprequest = $this->prepare_http_request($mnet_peer);
141 curl_setopt($httprequest, CURLOPT_POSTFIELDS, $this->encryptedrequest);
143 $timestamp_send = time();
144 mnet_debug("about to send the curl request");
145 $this->rawresponse = curl_exec($httprequest);
146 mnet_debug("managed to complete a curl request");
147 $timestamp_receive = time();
149 if ($this->rawresponse === false) {
150 $this->error[] = curl_errno($httprequest) .':'. curl_error($httprequest);
153 curl_close($httprequest);
155 $this->rawresponse = trim($this->rawresponse);
159 $crypt_parser = new mnet_encxml_parser();
160 $crypt_parser->parse($this->rawresponse);
162 // If we couldn't parse the message, or it doesn't seem to have encrypted contents,
163 // give the most specific error msg available & return
164 if (!$crypt_parser->payload_encrypted) {
165 if (! empty($crypt_parser->remoteerror)) {
166 $this->error[] = '4: remote server error: ' . $crypt_parser->remoteerror;
167 } else if (! empty($crypt_parser->error)) {
168 $crypt_parser_error = $crypt_parser->error[0];
170 $message = '3:XML Parse error in payload: '.$crypt_parser_error['string']."\n";
171 if (array_key_exists('lineno', $crypt_parser_error)) {
172 $message .= 'At line number: '.$crypt_parser_error['lineno']."\n";
174 if (array_key_exists('line', $crypt_parser_error)) {
175 $message .= 'Which reads: '.$crypt_parser_error['line']."\n";
177 $this->error[] = $message;
179 $this->error[] = '1:Payload not encrypted ';
182 $crypt_parser->free_resource();
186 $key = array_pop($crypt_parser->cipher);
187 $data = array_pop($crypt_parser->cipher);
189 $crypt_parser->free_resource();
191 // Initialize payload var
192 $decryptedenvelope = '';
194 // &$decryptedenvelope
195 $isOpen = openssl_open(base64_decode($data), $decryptedenvelope, base64_decode($key), $this->mnet->get_private_key());
198 // Decryption failed... let's try our archived keys
199 $openssl_history = get_config('mnet', 'openssl_history');
200 if(empty($openssl_history)) {
201 $openssl_history = array();
202 set_config('openssl_history', serialize($openssl_history), 'mnet');
204 $openssl_history = unserialize($openssl_history);
206 foreach($openssl_history as $keyset) {
207 $keyresource = openssl_pkey_get_private($keyset['keypair_PEM']);
208 $isOpen = openssl_open(base64_decode($data), $decryptedenvelope, base64_decode($key), $keyresource);
210 // It's an older code, sir, but it checks out
217 trigger_error("None of our keys could open the payload from host {$mnet_peer->wwwroot} with id {$mnet_peer->id}.");
218 $this->error[] = '3:No key match';
222 if (strpos(substr($decryptedenvelope, 0, 100), '<signedMessage>')) {
223 $sig_parser = new mnet_encxml_parser();
224 $sig_parser->parse($decryptedenvelope);
226 $this->error[] = '2:Payload not signed: ' . $decryptedenvelope;
230 // Margin of error is the time it took the request to complete.
231 $margin_of_error = $timestamp_receive - $timestamp_send;
233 // Guess the time gap between sending the request and the remote machine
234 // executing the time() function. Marginally better than nothing.
235 $hysteresis = ($margin_of_error) / 2;
237 $remote_timestamp = $sig_parser->remote_timestamp - $hysteresis;
238 $time_offset = $remote_timestamp - $timestamp_send;
239 if ($time_offset > 0) {
240 $threshold = get_config('mnet', 'drift_threshold');
241 if(empty($threshold)) {
242 // We decided 15 seconds was a pretty good arbitrary threshold
243 // for time-drift between servers, but you can customize this in
244 // the config_plugins table. It's not advised though.
245 set_config('drift_threshold', 15, 'mnet');
248 if ($time_offset > $threshold) {
249 $this->error[] = '6:Time gap with '.$mnet_peer->name.' ('.$time_offset.' seconds) is greater than the permitted maximum of '.$threshold.' seconds';
254 $this->xmlrpcresponse = base64_decode($sig_parser->data_object);
255 $this->response = xmlrpc_decode($this->xmlrpcresponse);
257 // xmlrpc errors are pushed onto the $this->error stack
258 if (is_array($this->response) && array_key_exists('faultCode', $this->response)) {
259 // The faultCode 7025 means we tried to connect with an old SSL key
260 // The faultString is the new key - let's save it and try again
261 // The re_key attribute stops us from getting into a loop
262 if($this->response['faultCode'] == 7025 && empty($mnet_peer->re_key)) {
263 mnet_debug('recieved an old-key fault, so trying to get the new key and update our records');
264 // If the new certificate doesn't come thru clean_param() unmolested, error out
265 if($this->response['faultString'] != clean_param($this->response['faultString'], PARAM_PEM)) {
266 $this->error[] = $this->response['faultCode'] . " : " . $this->response['faultString'];
268 $record = new stdClass();
269 $record->id = $mnet_peer->id;
270 $record->public_key = $this->response['faultString'];
271 $details = openssl_x509_parse($record->public_key);
272 if(!isset($details['validTo_time_t'])) {
273 $this->error[] = $this->response['faultCode'] . " : " . $this->response['faultString'];
275 $record->public_key_expires = $details['validTo_time_t'];
276 $DB->update_record('mnet_host', $record);
278 // Create a new peer object populated with the new info & try re-sending the request
279 $rekeyed_mnet_peer = new mnet_peer();
280 $rekeyed_mnet_peer->set_id($record->id);
281 $rekeyed_mnet_peer->re_key = true;
282 return $this->send($rekeyed_mnet_peer);
284 if (!empty($CFG->mnet_rpcdebug)) {
285 if (get_string_manager()->string_exists('error'.$this->response['faultCode'], 'mnet')) {
286 $guidance = get_string('error'.$this->response['faultCode'], 'mnet');
293 $this->error[] = $this->response['faultCode'] . " : " . $this->response['faultString'] ."\n".$guidance;
296 // ok, it's signed, but is it signed with the right certificate ?
297 // do this *after* we check for an out of date key
298 $verified = openssl_verify($this->xmlrpcresponse, base64_decode($sig_parser->signature), $mnet_peer->public_key);
299 if ($verified != 1) {
300 $this->error[] = 'Invalid signature';
303 return empty($this->error);
307 * Check that we are permitted to call method on specified peer
309 * @param object $mnet_peer A mnet_peer object with details of the remote host we're connecting to
310 * @return bool True if we permit calls to method on specified peer, False otherwise.
313 function permission_to_call($mnet_peer) {
314 global $DB, $CFG, $USER;
316 // Executing any system method is permitted.
317 $system_methods = array('system/listMethods', 'system/methodSignature', 'system/methodHelp', 'system/listServices');
318 if (in_array($this->method, $system_methods) ) {
322 $hostids = array($mnet_peer->id);
323 if (!empty($CFG->mnet_all_hosts_id)) {
324 $hostids[] = $CFG->mnet_all_hosts_id;
326 // At this point, we don't care if the remote host implements the
327 // method we're trying to call. We just want to know that:
328 // 1. The method belongs to some service, as far as OUR host knows
329 // 2. We are allowed to subscribe to that service on this mnet_peer
331 list($hostidsql, $hostidparams) = $DB->get_in_or_equal($hostids);
334 FROM {mnet_remote_rpc} r
335 INNER JOIN {mnet_remote_service2rpc} s2r ON s2r.rpcid = r.id
336 INNER JOIN {mnet_host2service} h2s ON h2s.serviceid = s2r.serviceid
337 WHERE r.xmlrpcpath = ?
338 AND h2s.subscribe = ?
339 AND h2s.hostid $hostidsql";
341 $params = array($this->method, 1);
342 $params = array_merge($params, $hostidparams);
344 if ($DB->record_exists_sql($sql, $params)) {
348 $this->error[] = '7:User with ID '. $USER->id .
349 ' attempted to call unauthorised method '.
350 $this->method.' on host '.
356 * Generate a curl handle and prepare it for sending to an mnet host
358 * @param object $mnet_peer A mnet_peer object with details of the remote host the request will be sent to
359 * @return cURL handle - the almost-ready-to-send http request
361 function prepare_http_request ($mnet_peer) {
362 $this->uri = $mnet_peer->wwwroot . $mnet_peer->application->xmlrpc_server_url;
364 // Initialize request the target URL
365 $httprequest = curl_init($this->uri);
366 curl_setopt($httprequest, CURLOPT_TIMEOUT, $this->timeout);
367 curl_setopt($httprequest, CURLOPT_RETURNTRANSFER, true);
368 curl_setopt($httprequest, CURLOPT_POST, true);
369 curl_setopt($httprequest, CURLOPT_USERAGENT, 'Moodle');
370 curl_setopt($httprequest, CURLOPT_HTTPHEADER, array("Content-Type: text/xml charset=UTF-8"));
371 curl_setopt($httprequest, CURLOPT_SSL_VERIFYPEER, false);
372 curl_setopt($httprequest, CURLOPT_SSL_VERIFYHOST, 0);