diff default/assets/vendors/theme-widgets/vendor/mute/facebook/example/server-side-re-auth.php @ 0:1d038bc9b3d2 default tip

Up:default
author Liny <dev@neowd.com>
date Sat, 31 May 2025 09:21:51 +0800
parents
children
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/default/assets/vendors/theme-widgets/vendor/mute/facebook/example/server-side-re-auth.php	Sat May 31 09:21:51 2025 +0800
@@ -0,0 +1,58 @@
+<?php
+
+/**
+ * Re-authentication.
+ *
+ * @author Xavier Barbosa
+ * @since 13 February, 2013
+ * @link https://developers.facebook.com/docs/howtos/login/server-side-re-auth/
+ **/
+
+use Mute\Facebook\App;
+
+/**
+ * Default params
+ **/
+
+$app_id = "YOUR_APP_ID";
+$app_secret = "YOUR_APP_SECRET";
+$my_url = "YOUR_URL";
+
+session_start();
+
+/**
+ * The process
+ **/
+
+$app = new App($app_id, $app_secret);
+
+
+$code = $_REQUEST["code"];
+
+if (empty($code)) {
+    $_SESSION['state'] = md5(uniqid(rand(), true));
+    $_SESSION['nonce'] = md5(uniqid(rand(), TRUE)); // New code to generate auth_nonce
+
+    $dialog_url = $app->getOAuth()->getCodeURL($my_url, array('user_birthday', 'read_stream'), $_SESSION['state'], 'reauthenticate', $_SESSION['nonce']);
+
+    echo "<script> top.location.href=" . json_encode($dialog_url) . "</script>";
+    die;
+}
+
+if($_SESSION['state'] && ($_SESSION['state'] === $_REQUEST['state'])) {
+    if($_REQUEST['auth_nonce'] && ($_REQUEST['auth_nonce'] === $_SESSION['nonce'])) {
+        $params = $app->getOAuth()->getAccessToken($code);
+        $_SESSION['access_token'] = $params['access_token'];
+
+        $user = $app->get('me', array(
+            'access_token' => $params['access_token'],
+        ));
+        echo("Hello " . $user->name);
+    }
+    else {
+        echo "The auth_nonce does not match. This may be caused by a replay attack.";
+    }
+}
+else {
+    echo("The state does not match. You may be a victim of CSRF.");
+}