X-Git-Url: https://git.toastfreeware.priv.at/gregoa/bti.git/blobdiff_plain/6bf1803239e74f165dab471dd2930671fb1fd8ec..37a84bdcca02fc32e9e44c60ce297da2479ffc0a:/bti.c diff --git a/bti.c b/bti.c index 28d205d..881b826 100644 --- a/bti.c +++ b/bti.c @@ -1,6 +1,7 @@ /* - * Copyright (C) 2008 Greg Kroah-Hartman + * Copyright (C) 2008-2011 Greg Kroah-Hartman * Copyright (C) 2009 Bart Trojanowski + * Copyright (C) 2009-2010 Amir Mohammad Saied * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the @@ -32,12 +33,14 @@ #include #include #include -#include #include #include #include #include - +#include +#include +#include +#include "bti.h" #define zalloc(size) calloc(size, 1) @@ -49,68 +52,36 @@ } while (0) -static int debug; - -enum host { - HOST_TWITTER = 0, - HOST_IDENTICA = 1, -}; - -enum action { - ACTION_UPDATE = 0, - ACTION_FRIENDS = 1, - ACTION_USER = 2, - ACTION_REPLIES = 4, - ACTION_PUBLIC = 8, - ACTION_UNKNOWN = 16 -}; - -struct session { - char *password; - char *account; - char *tweet; - char *proxy; - char *time; - char *homedir; - char *logfile; - char *user; - int bash; - int shrink_urls; - int dry_run; - int page; - enum host host; - enum action action; -}; - -struct bti_curl_buffer { - char *data; - enum action action; - int length; -}; +int debug; static void display_help(void) { - fprintf(stdout, "bti - send tweet to twitter or identi.ca\n"); - fprintf(stdout, "Version: " VERSION "\n"); - fprintf(stdout, "Usage:\n"); - fprintf(stdout, " bti [options]\n"); - fprintf(stdout, "options are:\n"); - fprintf(stdout, " --account accountname\n"); - fprintf(stdout, " --password password\n"); - fprintf(stdout, " --action action\n"); - fprintf(stdout, " ('update', 'friends', 'public', 'replies' " - "or 'user')\n"); - fprintf(stdout, " --user screenname\n"); - fprintf(stdout, " --proxy PROXY:PORT\n"); - fprintf(stdout, " --host HOST\n"); - fprintf(stdout, " --logfile logfile\n"); - fprintf(stdout, " --shrink-urls\n"); - fprintf(stdout, " --page PAGENUMBER\n"); - fprintf(stdout, " --bash\n"); - fprintf(stdout, " --debug\n"); - fprintf(stdout, " --dry-run\n"); - fprintf(stdout, " --version\n"); - fprintf(stdout, " --help\n"); + fprintf(stdout, "bti - send tweet to twitter or identi.ca\n" + "Version: %s\n" + "Usage:\n" + " bti [options]\n" + "options are:\n" + " --account accountname\n" + " --password password\n" + " --action action\n" + " ('update', 'friends', 'public', 'replies', or 'user')\n" + " --user screenname\n" + " --group groupname\n" + " --proxy PROXY:PORT\n" + " --host HOST\n" + " --logfile logfile\n" + " --config configfile\n" + " --replyto ID\n" + " --retweet ID\n" + " --shrink-urls\n" + " --page PAGENUMBER\n" + " --bash\n" + " --background\n" + " --debug\n" + " --verbose\n" + " --dry-run\n" + " --version\n" + " --help\n", VERSION); } static void display_version(void) @@ -118,6 +89,102 @@ static void display_version(void) fprintf(stdout, "bti - version %s\n", VERSION); } +static char *get_string(const char *name) +{ + char *temp; + char *string; + + string = zalloc(1000); + if (!string) + exit(1); + if (name != NULL) + fprintf(stdout, "%s", name); + if (!fgets(string, 999, stdin)) + return NULL; + temp = strchr(string, '\n'); + if (temp) + *temp = '\0'; + return string; +} + +/* + * Try to get a handle to a readline function from a variety of different + * libraries. If nothing is present on the system, then fall back to an + * internal one. + * + * Logic originally based off of code in the e2fsutils package in the + * lib/ss/get_readline.c file, which is licensed under the MIT license. + * + * This keeps us from having to relicense the bti codebase if readline + * ever changes its license, as there is no link-time dependancy. + * It is a run-time thing only, and we handle any readline-like library + * in the same manner, making bti not be a derivative work of any + * other program. + */ +static void session_readline_init(struct session *session) +{ + /* Libraries we will try to use for readline/editline functionality */ + const char *libpath = "libreadline.so.6:libreadline.so.5:" + "libreadline.so.4:libreadline.so:libedit.so.2:" + "libedit.so:libeditline.so.0:libeditline.so"; + void *handle = NULL; + char *tmp, *cp, *next; + int (*bind_key)(int, void *); + void (*insert)(void); + + /* default to internal function if we can't or won't find anything */ + session->readline = get_string; + if (!isatty(0)) + return; + session->interactive = 1; + + tmp = malloc(strlen(libpath)+1); + if (!tmp) + return; + strcpy(tmp, libpath); + for (cp = tmp; cp; cp = next) { + next = strchr(cp, ':'); + if (next) + *next++ = 0; + if (*cp == 0) + continue; + handle = dlopen(cp, RTLD_NOW); + if (handle) { + dbg("Using %s for readline library\n", cp); + break; + } + } + free(tmp); + if (!handle) { + dbg("No readline library found.\n"); + return; + } + + session->readline_handle = handle; + session->readline = (char *(*)(const char *))dlsym(handle, "readline"); + if (session->readline == NULL) { + /* something odd happened, default back to internal stuff */ + session->readline_handle = NULL; + session->readline = get_string; + return; + } + + /* + * If we found a library, turn off filename expansion + * as that makes no sense from within bti. + */ + bind_key = (int (*)(int, void *))dlsym(handle, "rl_bind_key"); + insert = (void (*)(void))dlsym(handle, "rl_insert"); + if (bind_key && insert) + bind_key('\t', insert); +} + +static void session_readline_cleanup(struct session *session) +{ + if (session->readline_handle) + dlclose(session->readline_handle); +} + static struct session *session_alloc(void) { struct session *session; @@ -132,13 +199,23 @@ static void session_free(struct session *session) { if (!session) return; + free(session->retweet); + free(session->replyto); free(session->password); free(session->account); + free(session->consumer_key); + free(session->consumer_secret); + free(session->access_token_key); + free(session->access_token_secret); free(session->tweet); free(session->proxy); free(session->time); free(session->homedir); free(session->user); + free(session->group); + free(session->hosturl); + free(session->hostname); + free(session->configfile); free(session); } @@ -170,17 +247,26 @@ static void bti_curl_buffer_free(struct bti_curl_buffer *buffer) free(buffer); } -static const char *twitter_user_url = "http://twitter.com/statuses/user_timeline/"; -static const char *twitter_update_url = "https://twitter.com/statuses/update.xml"; -static const char *twitter_public_url = "http://twitter.com/statuses/public_timeline.xml"; -static const char *twitter_friends_url = "https://twitter.com/statuses/friends_timeline.xml"; -static const char *twitter_replies_url = "http://twitter.com/statuses/replies.xml"; - -static const char *identica_user_url = "http://identi.ca/api/statuses/user_timeline/"; -static const char *identica_update_url = "http://identi.ca/api/statuses/update.xml"; -static const char *identica_public_url = "http://identi.ca/api/statuses/public_timeline.xml"; -static const char *identica_friends_url = "http://identi.ca/api/statuses/friends_timeline.xml"; -static const char *identica_replies_url = "http://identi.ca/api/statuses/replies.xml"; +const char twitter_host[] = "http://api.twitter.com/1/statuses"; +const char identica_host[] = "https://identi.ca/api/statuses"; +const char twitter_name[] = "twitter"; +const char identica_name[] = "identi.ca"; + +static const char twitter_request_token_uri[] = "http://twitter.com/oauth/request_token"; +static const char twitter_access_token_uri[] = "http://twitter.com/oauth/access_token"; +static const char twitter_authorize_uri[] = "http://twitter.com/oauth/authorize?oauth_token="; +static const char identica_request_token_uri[] = "http://identi.ca/api/oauth/request_token?oauth_callback=oob"; +static const char identica_access_token_uri[] = "http://identi.ca/api/oauth/access_token"; +static const char identica_authorize_uri[] = "http://identi.ca/api/oauth/authorize?oauth_token="; + +static const char user_uri[] = "/user_timeline/"; +static const char update_uri[] = "/update.xml"; +static const char public_uri[] = "/public_timeline.xml"; +static const char friends_uri[] = "/friends_timeline.xml"; +static const char mentions_uri[] = "/mentions.xml"; +static const char replies_uri[] = "/replies.xml"; +static const char retweet_uri[] = "/retweet/"; +static const char group_uri[] = "/../statusnet/groups/timeline/"; static CURL *curl_init(void) { @@ -197,11 +283,23 @@ static CURL *curl_init(void) return curl; } -static void parse_statuses(xmlDocPtr doc, xmlNodePtr current) +/* The final place data is sent to the screen/pty/tty */ +static void bti_output_line(struct session *session, xmlChar *user, + xmlChar *id, xmlChar *created, xmlChar *text) +{ + if (session->verbose) + printf("[%s] {%s} (%.16s) %s\n", user, id, created, text); + else + printf("[%s] %s\n", user, text); +} + +static void parse_statuses(struct session *session, + xmlDocPtr doc, xmlNodePtr current) { xmlChar *text = NULL; xmlChar *user = NULL; xmlChar *created = NULL; + xmlChar *id = NULL; xmlNodePtr userinfo; current = current->xmlChildrenNode; @@ -211,6 +309,8 @@ static void parse_statuses(xmlDocPtr doc, xmlNodePtr current) created = xmlNodeListGetString(doc, current->xmlChildrenNode, 1); if (!xmlStrcmp(current->name, (const xmlChar *)"text")) text = xmlNodeListGetString(doc, current->xmlChildrenNode, 1); + if (!xmlStrcmp(current->name, (const xmlChar *)"id")) + id = xmlNodeListGetString(doc, current->xmlChildrenNode, 1); if (!xmlStrcmp(current->name, (const xmlChar *)"user")) { userinfo = current->xmlChildrenNode; while (userinfo != NULL) { @@ -223,15 +323,17 @@ static void parse_statuses(xmlDocPtr doc, xmlNodePtr current) } } - if (user && text && created) { - printf("[%s] (%.16s) %s\n", - user, created, text); + if (user && text && created && id) { + bti_output_line(session, user, id, + created, text); xmlFree(user); xmlFree(text); xmlFree(created); + xmlFree(id); user = NULL; text = NULL; created = NULL; + id = NULL; } } current = current->next; @@ -240,7 +342,7 @@ static void parse_statuses(xmlDocPtr doc, xmlNodePtr current) return; } -static void parse_timeline(char *document) +static void parse_timeline(char *document, struct session *session) { xmlDocPtr doc; xmlNodePtr current; @@ -266,7 +368,7 @@ static void parse_timeline(char *document) current = current->xmlChildrenNode; while (current != NULL) { if ((!xmlStrcmp(current->name, (const xmlChar *)"status"))) - parse_statuses(doc, current); + parse_statuses(session, doc, current); current = current->next; } xmlFreeDoc(doc); @@ -295,293 +397,379 @@ static size_t curl_callback(void *buffer, size_t size, size_t nmemb, memcpy(&curl_buf->data[curl_buf->length], (char *)buffer, buffer_size); curl_buf->length += buffer_size; if (curl_buf->action) - parse_timeline(curl_buf->data); + parse_timeline(curl_buf->data, curl_buf->session); dbg("%s\n", curl_buf->data); return buffer_size; } +static int parse_osp_reply(const char *reply, char **token, char **secret) +{ + int rc; + int retval = 1; + char **rv = NULL; + rc = oauth_split_url_parameters(reply, &rv); + qsort(rv, rc, sizeof(char *), oauth_cmpstringp); + if (rc == 2 || rc == 4) { + if (!strncmp(rv[0], "oauth_token=", 11) && + !strncmp(rv[1], "oauth_token_secret=", 18)) { + if (token) + *token = strdup(&(rv[0][12])); + if (secret) + *secret = strdup(&(rv[1][19])); + + retval = 0; + } + } else if (rc == 3) { + if (!strncmp(rv[1], "oauth_token=", 11) && + !strncmp(rv[2], "oauth_token_secret=", 18)) { + if (token) + *token = strdup(&(rv[1][12])); + if (secret) + *secret = strdup(&(rv[2][19])); + + retval = 0; + } + } + + dbg("token: %s\n", *token); + dbg("secret: %s\n", *secret); + + if (rv) + free(rv); + + return retval; +} + +static int request_access_token(struct session *session) +{ + char *post_params = NULL; + char *request_url = NULL; + char *reply = NULL; + char *at_key = NULL; + char *at_secret = NULL; + char *verifier = NULL; + char at_uri[90]; + + if (!session) + return -EINVAL; + + if (session->host == HOST_TWITTER) + request_url = oauth_sign_url2( + twitter_request_token_uri, NULL, + OA_HMAC, NULL, session->consumer_key, + session->consumer_secret, NULL, NULL); + else if (session->host == HOST_IDENTICA) + request_url = oauth_sign_url2( + identica_request_token_uri, NULL, + OA_HMAC, NULL, session->consumer_key, + session->consumer_secret, NULL, NULL); + reply = oauth_http_get(request_url, post_params); + + if (request_url) + free(request_url); + + if (post_params) + free(post_params); + + if (!reply) + return 1; + + if (parse_osp_reply(reply, &at_key, &at_secret)) + return 1; + + free(reply); + + fprintf(stdout, + "Please open the following link in your browser, and " + "allow 'bti' to access your account. Then paste " + "back the provided PIN in here.\n"); + if (session->host == HOST_TWITTER) { + fprintf(stdout, "%s%s\nPIN: ", twitter_authorize_uri, at_key); + verifier = session->readline(NULL); + sprintf(at_uri, "%s?oauth_verifier=%s", + twitter_access_token_uri, verifier); + } else if (session->host == HOST_IDENTICA) { + fprintf(stdout, "%s%s\nPIN: ", identica_authorize_uri, at_key); + verifier = session->readline(NULL); + sprintf(at_uri, "%s?oauth_verifier=%s", + identica_access_token_uri, verifier); + } + request_url = oauth_sign_url2(at_uri, NULL, OA_HMAC, NULL, + session->consumer_key, + session->consumer_secret, + at_key, at_secret); + reply = oauth_http_get(request_url, post_params); + + if (!reply) + return 1; + + if (parse_osp_reply(reply, &at_key, &at_secret)) + return 1; + + free(reply); + + fprintf(stdout, + "Please put these two lines in your bti " + "configuration file (~/.bti):\n" + "access_token_key=%s\n" + "access_token_secret=%s\n", + at_key, at_secret); + + return 0; +} + static int send_request(struct session *session) { + char endpoint[500]; char user_password[500]; char data[500]; - /* is there usernames longer than 22 chars? */ - char user_url[70]; struct bti_curl_buffer *curl_buf; CURL *curl = NULL; CURLcode res; struct curl_httppost *formpost = NULL; struct curl_httppost *lastptr = NULL; struct curl_slist *slist = NULL; + char *req_url = NULL; + char *reply = NULL; + char *postarg = NULL; + char *escaped_tweet = NULL; + int is_post = 0; if (!session) return -EINVAL; - curl_buf = bti_curl_buffer_alloc(session->action); - if (!curl_buf) - return -ENOMEM; + if (!session->hosturl) + session->hosturl = strdup(twitter_host); - curl = curl_init(); - if (!curl) - return -EINVAL; + if (session->no_oauth || session->guest) { + curl_buf = bti_curl_buffer_alloc(session->action); + if (!curl_buf) + return -ENOMEM; + curl_buf->session = session; - switch (session->action) { - case ACTION_UPDATE: - snprintf(user_password, sizeof(user_password), "%s:%s", - session->account, session->password); - snprintf(data, sizeof(data), "status=\"%s\"", session->tweet); - curl_formadd(&formpost, &lastptr, - CURLFORM_COPYNAME, "status", - CURLFORM_COPYCONTENTS, session->tweet, - CURLFORM_END); - - curl_formadd(&formpost, &lastptr, - CURLFORM_COPYNAME, "source", - CURLFORM_COPYCONTENTS, "bti", - CURLFORM_END); - - curl_easy_setopt(curl, CURLOPT_HTTPPOST, formpost); - slist = curl_slist_append(slist, "Expect:"); - curl_easy_setopt(curl, CURLOPT_HTTPHEADER, slist); - switch (session->host) { - case HOST_TWITTER: - curl_easy_setopt(curl, CURLOPT_URL, - twitter_update_url); - break; - case HOST_IDENTICA: - curl_easy_setopt(curl, CURLOPT_URL, - identica_update_url); - break; - } - curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); + curl = curl_init(); + if (!curl) + return -EINVAL; - break; - case ACTION_FRIENDS: - snprintf(user_password, sizeof(user_password), "%s:%s", - session->account, session->password); - switch (session->host) { - case HOST_TWITTER: - sprintf(user_url, "%s?page=%d", twitter_friends_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + if (!session->hosturl) + session->hosturl = strdup(twitter_host); + + switch (session->action) { + case ACTION_UPDATE: + snprintf(user_password, sizeof(user_password), "%s:%s", + session->account, session->password); + snprintf(data, sizeof(data), "status=\"%s\"", + session->tweet); + curl_formadd(&formpost, &lastptr, + CURLFORM_COPYNAME, "status", + CURLFORM_COPYCONTENTS, session->tweet, + CURLFORM_END); + + curl_formadd(&formpost, &lastptr, + CURLFORM_COPYNAME, "source", + CURLFORM_COPYCONTENTS, "bti", + CURLFORM_END); + + if (session->replyto) + curl_formadd(&formpost, &lastptr, + CURLFORM_COPYNAME, + "in_reply_to_status_id", + CURLFORM_COPYCONTENTS, + session->replyto, + CURLFORM_END); + + curl_easy_setopt(curl, CURLOPT_HTTPPOST, formpost); + slist = curl_slist_append(slist, "Expect:"); + curl_easy_setopt(curl, CURLOPT_HTTPHEADER, slist); + + sprintf(endpoint, "%s%s", session->hosturl, update_uri); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); + curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); break; - case HOST_IDENTICA: - sprintf(user_url, "%s?page=%d", identica_friends_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); - break; - } - curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); - break; - case ACTION_USER: - switch (session->host) { - case HOST_TWITTER: - sprintf(user_url, "%s%s.xml?page=%d", twitter_user_url, session->user, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + case ACTION_FRIENDS: + snprintf(user_password, sizeof(user_password), "%s:%s", + session->account, session->password); + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + friends_uri, session->page); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); + curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); break; - case HOST_IDENTICA: - sprintf(user_url, "%s%s.xml?page=%d", identica_user_url, session->user, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + + case ACTION_USER: + sprintf(endpoint, "%s%s%s.xml?page=%d", session->hosturl, + user_uri, session->user, session->page); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); break; - } - break; - case ACTION_REPLIES: - snprintf(user_password, sizeof(user_password), "%s:%s", - session->account, session->password); - switch (session->host) { - case HOST_TWITTER: - sprintf(user_url, "%s?page=%d", twitter_replies_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + case ACTION_REPLIES: + snprintf(user_password, sizeof(user_password), "%s:%s", + session->account, session->password); + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + replies_uri, session->page); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); + curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); break; - case HOST_IDENTICA: - sprintf(user_url, "%s?page=%d", identica_replies_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + + case ACTION_PUBLIC: + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + public_uri, session->page); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); break; - } - curl_easy_setopt(curl, CURLOPT_USERPWD, user_password); - break; - case ACTION_PUBLIC: - switch (session->host) { - case HOST_TWITTER: - sprintf(user_url, "%s?page=%d", twitter_public_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + case ACTION_GROUP: + sprintf(endpoint, "%s%s%s.xml?page=%d", + session->hosturl, group_uri, session->group, + session->page); + curl_easy_setopt(curl, CURLOPT_URL, endpoint); break; - case HOST_IDENTICA: - sprintf(user_url, "%s?page=%d", identica_public_url, session->page); - curl_easy_setopt(curl, CURLOPT_URL, user_url); + + default: break; } - break; - default: - break; - } + if (session->proxy) + curl_easy_setopt(curl, CURLOPT_PROXY, session->proxy); + + if (debug) + curl_easy_setopt(curl, CURLOPT_VERBOSE, 1); + + dbg("user_password = %s\n", user_password); + dbg("data = %s\n", data); + dbg("proxy = %s\n", session->proxy); + + curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, curl_callback); + curl_easy_setopt(curl, CURLOPT_WRITEDATA, curl_buf); + if (!session->dry_run) { + res = curl_easy_perform(curl); + if (!session->background) { + xmlDocPtr doc; + xmlNodePtr current; + + if (res) { + fprintf(stderr, "error(%d) trying to " + "perform operation\n", res); + return -EINVAL; + } - if (session->proxy) - curl_easy_setopt(curl, CURLOPT_PROXY, session->proxy); + doc = xmlReadMemory(curl_buf->data, + curl_buf->length, + "response.xml", NULL, + XML_PARSE_NOERROR); + if (doc == NULL) + return -EINVAL; + + current = xmlDocGetRootElement(doc); + if (current == NULL) { + fprintf(stderr, "empty document\n"); + xmlFreeDoc(doc); + return -EINVAL; + } - if (debug) - curl_easy_setopt(curl, CURLOPT_VERBOSE, 1); - - dbg("user_password = %s\n", user_password); - dbg("data = %s\n", data); - dbg("proxy = %s\n", session->proxy); - - curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, curl_callback); - curl_easy_setopt(curl, CURLOPT_WRITEDATA, curl_buf); - if (!session->dry_run) { - res = curl_easy_perform(curl); - if (res && !session->bash) { - fprintf(stderr, "error(%d) trying to perform " - "operation\n", res); - return -EINVAL; - } - } + if (xmlStrcmp(current->name, (const xmlChar *)"status")) { + fprintf(stderr, "unexpected document type\n"); + xmlFreeDoc(doc); + return -EINVAL; + } - curl_easy_cleanup(curl); - if (session->action == ACTION_UPDATE) - curl_formfree(formpost); - bti_curl_buffer_free(curl_buf); - return 0; -} + xmlFreeDoc(doc); + } + } -static void parse_configfile(struct session *session) -{ - FILE *config_file; - char *line = NULL; - size_t len = 0; - char *account = NULL; - char *password = NULL; - char *host = NULL; - char *proxy = NULL; - char *logfile = NULL; - char *action = NULL; - char *user = NULL; - char *file; - int shrink_urls = 0; - - /* config file is ~/.bti */ - file = alloca(strlen(session->homedir) + 7); - - sprintf(file, "%s/.bti", session->homedir); - - config_file = fopen(file, "r"); - - /* No error if file does not exist or is unreadable. */ - if (config_file == NULL) - return; + curl_easy_cleanup(curl); + if (session->action == ACTION_UPDATE) + curl_formfree(formpost); + bti_curl_buffer_free(curl_buf); + } else { + switch (session->action) { + case ACTION_UPDATE: + escaped_tweet = oauth_url_escape(session->tweet); + if (session->replyto) { + sprintf(endpoint, + "%s%s?status=%s&in_reply_to_status_id=%s", + session->hosturl, update_uri, + escaped_tweet, session->replyto); + } else { + sprintf(endpoint, "%s%s?status=%s", + session->hosturl, update_uri, + escaped_tweet); + } - do { - ssize_t n = getline(&line, &len, config_file); - if (n < 0) + is_post = 1; break; - if (line[n - 1] == '\n') - line[n - 1] = '\0'; - /* Parse file. Format is the usual value pairs: - account=name - passwort=value - # is a comment character - */ - *strchrnul(line, '#') = '\0'; - char *c = line; - while (isspace(*c)) - c++; - /* Ignore blank lines. */ - if (c[0] == '\0') - continue; + case ACTION_USER: + sprintf(endpoint, "%s%s%s.xml?page=%d", + session->hosturl, user_uri, session->user, + session->page); + break; + case ACTION_REPLIES: + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + mentions_uri, session->page); + break; + case ACTION_PUBLIC: + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + public_uri, session->page); + break; + case ACTION_GROUP: + sprintf(endpoint, "%s%s%s.xml?page=%d", + session->hosturl, group_uri, session->group, + session->page); + break; + case ACTION_FRIENDS: + sprintf(endpoint, "%s%s?page=%d", session->hosturl, + friends_uri, session->page); + break; + case ACTION_RETWEET: + sprintf(endpoint, "%s%s%s.xml", session->hosturl, + retweet_uri, session->retweet); + is_post = 1; + break; + default: + break; + } + + dbg("%s\n", endpoint); + if (!session->dry_run) { + if (is_post) { + req_url = oauth_sign_url2(endpoint, &postarg, OA_HMAC, + NULL, session->consumer_key, + session->consumer_secret, + session->access_token_key, + session->access_token_secret); + reply = oauth_http_post(req_url, postarg); + } else { + req_url = oauth_sign_url2(endpoint, NULL, OA_HMAC, NULL, + session->consumer_key, + session->consumer_secret, + session->access_token_key, + session->access_token_secret); + reply = oauth_http_get(req_url, postarg); + } - if (!strncasecmp(c, "account", 7) && (c[7] == '=')) { - c += 8; - if (c[0] != '\0') - account = strdup(c); - } else if (!strncasecmp(c, "password", 8) && - (c[8] == '=')) { - c += 9; - if (c[0] != '\0') - password = strdup(c); - } else if (!strncasecmp(c, "host", 4) && - (c[4] == '=')) { - c += 5; - if (c[0] != '\0') - host = strdup(c); - } else if (!strncasecmp(c, "proxy", 5) && - (c[5] == '=')) { - c += 6; - if (c[0] != '\0') - proxy = strdup(c); - } else if (!strncasecmp(c, "logfile", 7) && - (c[7] == '=')) { - c += 8; - if (c[0] != '\0') - logfile = strdup(c); - } else if (!strncasecmp(c, "action", 6) && - (c[6] == '=')) { - c += 7; - if (c[0] != '\0') - action = strdup(c); - } else if (!strncasecmp(c, "user", 4) && - (c[4] == '=')) { - c += 5; - if (c[0] != '\0') - user = strdup(c); - } else if (!strncasecmp(c, "shrink-urls", 11) && - (c[11] == '=')) { - c += 12; - if (!strncasecmp(c, "true", 4) || - !strncasecmp(c, "yes", 3)) - shrink_urls = 1; + dbg("%s\n", req_url); + dbg("%s\n", reply); + if (req_url) + free(req_url); + } + + if (!reply) { + fprintf(stderr, "Error retrieving from URL (%s)\n", endpoint); + return -EIO; } - } while (!feof(config_file)); - - if (password) - session->password = password; - if (account) - session->account = account; - if (host) { - if (strcasecmp(host, "twitter") == 0) - session->host = HOST_TWITTER; - if (strcasecmp(host, "identica") == 0) - session->host = HOST_IDENTICA; - free(host); - } - if (proxy) { - if (session->proxy) - free(session->proxy); - session->proxy = proxy; - } - if (logfile) - session->logfile = logfile; - if (action) { - if (strcasecmp(action, "update") == 0) - session->action = ACTION_UPDATE; - else if (strcasecmp(action, "friends") == 0) - session->action = ACTION_FRIENDS; - else if (strcasecmp(action, "user") == 0) - session->action = ACTION_USER; - else if (strcasecmp(action, "replies") == 0) - session->action = ACTION_REPLIES; - else if (strcasecmp(action, "public") == 0) - session->action = ACTION_PUBLIC; - else - session->action = ACTION_UNKNOWN; - free(action); - } - if (user) - session->user = user; - session->shrink_urls = shrink_urls; - /* Free buffer and close file. */ - free(line); - fclose(config_file); + if ((session->action != ACTION_UPDATE) && + (session->action != ACTION_RETWEET)) + parse_timeline(reply, session); + } + return 0; } static void log_session(struct session *session, int retval) { FILE *log_file; char *filename; - char *host; /* Only log something if we have a log file set */ if (!session->logfile) @@ -595,42 +783,36 @@ static void log_session(struct session *session, int retval) log_file = fopen(filename, "a+"); if (log_file == NULL) return; - switch (session->host) { - case HOST_TWITTER: - host = "twitter"; - break; - case HOST_IDENTICA: - host = "identi.ca"; - break; - default: - host = "unknown"; - break; - } switch (session->action) { case ACTION_UPDATE: if (retval) fprintf(log_file, "%s: host=%s tweet failed\n", - session->time, host); + session->time, session->hostname); else fprintf(log_file, "%s: host=%s tweet=%s\n", - session->time, host, session->tweet); + session->time, session->hostname, + session->tweet); break; case ACTION_FRIENDS: fprintf(log_file, "%s: host=%s retrieving friends timeline\n", - session->time, host); + session->time, session->hostname); break; case ACTION_USER: fprintf(log_file, "%s: host=%s retrieving %s's timeline\n", - session->time, host, session->user); + session->time, session->hostname, session->user); break; case ACTION_REPLIES: fprintf(log_file, "%s: host=%s retrieving replies\n", - session->time, host); + session->time, session->hostname); break; case ACTION_PUBLIC: fprintf(log_file, "%s: host=%s retrieving public timeline\n", - session->time, host); + session->time, session->hostname); + break; + case ACTION_GROUP: + fprintf(log_file, "%s: host=%s retrieving group timeline\n", + session->time, session->hostname); break; default: break; @@ -651,10 +833,37 @@ static char *get_string_from_stdin(void) if (!fgets(string, 999, stdin)) return NULL; temp = strchr(string, '\n'); - *temp = '\0'; + if (temp) + *temp = '\0'; return string; } +static void read_password(char *buf, size_t len, char *host) +{ + char pwd[80]; + int retval; + struct termios old; + struct termios tp; + + tcgetattr(0, &tp); + old = tp; + + tp.c_lflag &= (~ECHO); + tcsetattr(0, TCSANOW, &tp); + + fprintf(stdout, "Enter password for %s: ", host); + fflush(stdout); + tcflow(0, TCOOFF); + retval = scanf("%79s", pwd); + tcflow(0, TCOON); + fprintf(stdout, "\n"); + + tcsetattr(0, TCSANOW, &old); + + strncpy(buf, pwd, len); + buf[len-1] = '\0'; +} + static int find_urls(const char *tweet, int **pranges) { /* @@ -921,24 +1130,31 @@ int main(int argc, char *argv[], char *envp[]) { static const struct option options[] = { { "debug", 0, NULL, 'd' }, + { "verbose", 0, NULL, 'V' }, { "account", 1, NULL, 'a' }, { "password", 1, NULL, 'p' }, { "host", 1, NULL, 'H' }, { "proxy", 1, NULL, 'P' }, { "action", 1, NULL, 'A' }, { "user", 1, NULL, 'u' }, + { "group", 1, NULL, 'G' }, { "logfile", 1, NULL, 'L' }, { "shrink-urls", 0, NULL, 's' }, { "help", 0, NULL, 'h' }, { "bash", 0, NULL, 'b' }, + { "background", 0, NULL, 'B' }, { "dry-run", 0, NULL, 'n' }, { "page", 1, NULL, 'g' }, { "version", 0, NULL, 'v' }, + { "config", 1, NULL, 'c' }, + { "replyto", 1, NULL, 'r' }, + { "retweet", 1, NULL, 'w' }, { } }; struct session *session; pid_t child; char *tweet; + static char password[80]; int retval = 0; int option; char *http_proxy; @@ -946,7 +1162,6 @@ int main(int argc, char *argv[], char *envp[]) int page_nr; debug = 0; - rl_bind_key('\t', rl_insert); session = session_alloc(); if (!session) { @@ -959,9 +1174,12 @@ int main(int argc, char *argv[], char *envp[]) session->time = strdup(ctime(&t)); session->time[strlen(session->time)-1] = 0x00; + /* Get the home directory so we can try to find a config file */ session->homedir = strdup(getenv("HOME")); - curl_global_init(CURL_GLOBAL_ALL); + /* set up a default config file location (traditionally ~/.bti) */ + session->configfile = zalloc(strlen(session->homedir) + 7); + sprintf(session->configfile, "%s/.bti", session->homedir); /* Set environment variables first, before reading command line options * or config file values. */ @@ -973,10 +1191,11 @@ int main(int argc, char *argv[], char *envp[]) dbg("http_proxy = %s\n", session->proxy); } - parse_configfile(session); + bti_parse_configfile(session); while (1) { - option = getopt_long_only(argc, argv, "dqe:p:P:H:a:A:u:hg:sn", + option = getopt_long_only(argc, argv, + "dp:P:H:a:A:u:c:hg:G:sr:nVvw:", options, NULL); if (option == -1) break; @@ -984,6 +1203,9 @@ int main(int argc, char *argv[], char *envp[]) case 'd': debug = 1; break; + case 'V': + session->verbose = 1; + break; case 'a': if (session->account) free(session->account); @@ -995,6 +1217,14 @@ int main(int argc, char *argv[], char *envp[]) dbg("page = %d\n", page_nr); session->page = page_nr; break; + case 'r': + session->replyto = strdup(optarg); + dbg("in_reply_to_status_id = %s\n", session->replyto); + break; + case 'w': + session->retweet = strdup(optarg); + dbg("Retweet ID = %s\n", session->retweet); + break; case 'p': if (session->password) free(session->password); @@ -1018,6 +1248,10 @@ int main(int argc, char *argv[], char *envp[]) session->action = ACTION_REPLIES; else if (strcasecmp(optarg, "public") == 0) session->action = ACTION_PUBLIC; + else if (strcasecmp(optarg, "group") == 0) + session->action = ACTION_GROUP; + else if (strcasecmp(optarg, "retweet") == 0) + session->action = ACTION_RETWEET; else session->action = ACTION_UNKNOWN; dbg("action = %d\n", session->action); @@ -1028,6 +1262,13 @@ int main(int argc, char *argv[], char *envp[]) session->user = strdup(optarg); dbg("user = %s\n", session->user); break; + + case 'G': + if (session->group) + free(session->group); + session->group = strdup(optarg); + dbg("group = %s\n", session->group); + break; case 'L': if (session->logfile) free(session->logfile); @@ -1038,14 +1279,43 @@ int main(int argc, char *argv[], char *envp[]) session->shrink_urls = 1; break; case 'H': - if (strcasecmp(optarg, "twitter") == 0) + if (session->hosturl) + free(session->hosturl); + if (session->hostname) + free(session->hostname); + if (strcasecmp(optarg, "twitter") == 0) { session->host = HOST_TWITTER; - if (strcasecmp(optarg, "identica") == 0) + session->hosturl = strdup(twitter_host); + session->hostname = strdup(twitter_name); + } else if (strcasecmp(optarg, "identica") == 0) { session->host = HOST_IDENTICA; + session->hosturl = strdup(identica_host); + session->hostname = strdup(identica_name); + } else { + session->host = HOST_CUSTOM; + session->hosturl = strdup(optarg); + session->hostname = strdup(optarg); + } dbg("host = %d\n", session->host); break; case 'b': session->bash = 1; + /* fall-through intended */ + case 'B': + session->background = 1; + break; + case 'c': + if (session->configfile) + free(session->configfile); + session->configfile = strdup(optarg); + dbg("configfile = %s\n", session->configfile); + + /* + * read the config file now. Yes, this could override + * previously set options from the command line, but + * the user asked for it... + */ + bti_parse_configfile(session); break; case 'h': display_help(); @@ -1062,6 +1332,7 @@ int main(int argc, char *argv[], char *envp[]) } } + session_readline_init(session); /* * Show the version to make it easier to determine what * is going on here @@ -1069,28 +1340,86 @@ int main(int argc, char *argv[], char *envp[]) if (debug) display_version(); + if (session->host == HOST_TWITTER) { + if (!session->consumer_key || !session->consumer_secret) { + if (session->action == ACTION_USER || + session->action == ACTION_PUBLIC) { + /* + * Some actions may still work without + * authentication + */ + session->guest = 1; + } else { + fprintf(stderr, + "Twitter no longer supports HTTP basic authentication.\n" + "Both consumer key, and consumer secret are required" + " for bti in order to behave as an OAuth consumer.\n"); + goto exit; + } + } + if (session->action == ACTION_GROUP) { + fprintf(stderr, "Groups only work in Identi.ca.\n"); + goto exit; + } + } else { + if (!session->consumer_key || !session->consumer_secret) + session->no_oauth = 1; + } + + if (session->no_oauth) { + if (!session->account) { + fprintf(stdout, "Enter account for %s: ", + session->hostname); + session->account = session->readline(NULL); + } + if (!session->password) { + read_password(password, sizeof(password), + session->hostname); + session->password = strdup(password); + } + } else if (!session->guest) { + if (!session->access_token_key || + !session->access_token_secret) { + request_access_token(session); + goto exit; + } + } + if (session->action == ACTION_UNKNOWN) { - fprintf(stderr, "Unknown action, valid actions are:\n"); - fprintf(stderr, "'update', 'friends', 'public', " - "'replies' or 'user'.\n"); + fprintf(stderr, "Unknown action, valid actions are:\n" + "'update', 'friends', 'public', 'replies', 'group' or 'user'.\n"); goto exit; } - if (!session->account) { - fprintf(stdout, "Enter twitter account: "); - session->account = readline(NULL); + if (session->action == ACTION_GROUP && !session->group) { + fprintf(stdout, "Enter group name: "); + session->group = session->readline(NULL); } - if (!session->password) { - fprintf(stdout, "Enter twitter password: "); - session->password = readline(NULL); + if (session->action == ACTION_RETWEET) { + if (!session->retweet) { + char *rtid; + + fprintf(stdout, "Status ID to retweet: "); + rtid = get_string_from_stdin(); + session->retweet = zalloc(strlen(rtid) + 10); + sprintf(session->retweet, "%s", rtid); + free(rtid); + } + + if (!session->retweet || strlen(session->retweet) == 0) { + dbg("no retweet?\n"); + return -1; + } + + dbg("retweet ID = %s\n", session->retweet); } if (session->action == ACTION_UPDATE) { - if (session->bash) + if (session->background || !session->interactive) tweet = get_string_from_stdin(); else - tweet = readline("tweet: "); + tweet = session->readline("tweet: "); if (!tweet || strlen(tweet) == 0) { dbg("no tweet?\n"); return -1; @@ -1101,7 +1430,8 @@ int main(int argc, char *argv[], char *envp[]) session->tweet = zalloc(strlen(tweet) + 10); if (session->bash) - sprintf(session->tweet, "%c %s", getuid() ? '$' : '#', tweet); + sprintf(session->tweet, "%c %s", + getuid() ? '$' : '#', tweet); else sprintf(session->tweet, "%s", tweet); @@ -1109,20 +1439,16 @@ int main(int argc, char *argv[], char *envp[]) dbg("tweet = %s\n", session->tweet); } - if (!session->user) - session->user = strdup(session->account); - if (session->page == 0) session->page = 1; - dbg("account = %s\n", session->account); - dbg("password = %s\n", session->password); + dbg("config file = %s\n", session->configfile); dbg("host = %d\n", session->host); dbg("action = %d\n", session->action); /* fork ourself so that the main shell can get on * with it's life as we try to connect and handle everything */ - if (session->bash) { + if (session->background) { child = fork(); if (child) { dbg("child is %d\n", child); @@ -1131,11 +1457,12 @@ int main(int argc, char *argv[], char *envp[]) } retval = send_request(session); - if (retval && !session->bash) + if (retval && !session->background) fprintf(stderr, "operation failed\n"); log_session(session, retval); exit: + session_readline_cleanup(session); session_free(session); return retval;; }