mirror of
				https://github.com/elyby/accounts.git
				synced 2025-05-31 14:11:46 +05:30 
			
		
		
		
	* start updating to PHP 8.3 * taking off! Co-authored-by: ErickSkrauch <erickskrauch@yandex.ru> Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * dropped this Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * migrate to symfonymailer Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * this is so stupid 😭 Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * ah, free, at last. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * oh, Gabriel. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * now dawns thy reckoning. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * and thy gore shall GLISTEN before the temples of man. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * creature of steel. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * my gratitude upon thee for my freedom. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * but the crimes thy kind has committed against humanity Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * Upgrade PHP-CS-Fixer and do fix the codebase * First review round (maybe I have broken something) * are NOT forgotten. Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> * Enable parallel PHP-CS-Fixer runner * PHPStan level 1 * PHPStan level 2 * PHPStan level 3 * PHPStan level 4 * PHPStan level 5 * Levels 6 and 7 takes too much effort. Generate a baseline and fix them eventually * Resolve TODO's related to the php-mock * Drastically reduce baseline size with the Rector * More code modernization with help of the Rector * Update GitLab CI --------- Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com> Co-authored-by: ErickSkrauch <erickskrauch@yandex.ru>
		
			
				
	
	
		
			132 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			132 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
declare(strict_types=1);
 | 
						|
 | 
						|
namespace api\components\OAuth2\Grants;
 | 
						|
 | 
						|
use api\components\OAuth2\CryptTrait;
 | 
						|
use api\components\Tokens\TokenReader;
 | 
						|
use Carbon\FactoryImmutable;
 | 
						|
use common\models\OauthSession;
 | 
						|
use InvalidArgumentException;
 | 
						|
use Lcobucci\JWT\Validation\Constraint\LooseValidAt;
 | 
						|
use Lcobucci\JWT\Validation\Validator;
 | 
						|
use League\OAuth2\Server\Entities\AccessTokenEntityInterface;
 | 
						|
use League\OAuth2\Server\Entities\RefreshTokenEntityInterface;
 | 
						|
use League\OAuth2\Server\Exception\OAuthServerException;
 | 
						|
use League\OAuth2\Server\Grant\RefreshTokenGrant as BaseRefreshTokenGrant;
 | 
						|
use Psr\Http\Message\ServerRequestInterface;
 | 
						|
use Throwable;
 | 
						|
use Yii;
 | 
						|
 | 
						|
class RefreshTokenGrant extends BaseRefreshTokenGrant {
 | 
						|
    use CryptTrait;
 | 
						|
 | 
						|
    /**
 | 
						|
     * Previously, refresh tokens were stored in Redis.
 | 
						|
     * If received refresh token is matches the legacy token template,
 | 
						|
     * restore the information from the legacy storage.
 | 
						|
     *
 | 
						|
     * @param ServerRequestInterface $request
 | 
						|
     * @param string $clientId
 | 
						|
     *
 | 
						|
     * @return array
 | 
						|
     * @throws OAuthServerException
 | 
						|
     */
 | 
						|
    protected function validateOldRefreshToken(ServerRequestInterface $request, string $clientId): array {
 | 
						|
        $refreshToken = $this->getRequestParameter('refresh_token', $request);
 | 
						|
        if ($refreshToken !== null && mb_strlen($refreshToken) === 40) {
 | 
						|
            return $this->validateLegacyRefreshToken($refreshToken);
 | 
						|
        }
 | 
						|
 | 
						|
        return $this->validateAccessToken($refreshToken);
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Currently we're not rotating refresh tokens.
 | 
						|
     * So we're overriding this method to always return null, which means,
 | 
						|
     * that refresh_token will not be issued.
 | 
						|
     *
 | 
						|
     * @param AccessTokenEntityInterface $accessToken
 | 
						|
     *
 | 
						|
     * @return RefreshTokenEntityInterface|null
 | 
						|
     */
 | 
						|
    protected function issueRefreshToken(AccessTokenEntityInterface $accessToken): ?RefreshTokenEntityInterface {
 | 
						|
        return null;
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * @param string $refreshToken
 | 
						|
     * @return array
 | 
						|
     * @throws OAuthServerException
 | 
						|
     */
 | 
						|
    private function validateLegacyRefreshToken(string $refreshToken): array {
 | 
						|
        $result = Yii::$app->redis->get("oauth:refresh:tokens:{$refreshToken}");
 | 
						|
        if ($result === null) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Token has been revoked');
 | 
						|
        }
 | 
						|
 | 
						|
        try {
 | 
						|
            [
 | 
						|
                'access_token_id' => $accessTokenId,
 | 
						|
                'session_id' => $sessionId,
 | 
						|
            ] = json_decode((string)$result, true, 512, JSON_THROW_ON_ERROR);
 | 
						|
        } catch (Throwable $e) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Cannot decrypt the refresh token', $e);
 | 
						|
        }
 | 
						|
 | 
						|
        /** @var OauthSession|null $relatedSession */
 | 
						|
        $relatedSession = OauthSession::findOne(['legacy_id' => $sessionId]);
 | 
						|
        if ($relatedSession === null) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Token has been revoked');
 | 
						|
        }
 | 
						|
 | 
						|
        return [
 | 
						|
            'client_id' => $relatedSession->client_id,
 | 
						|
            'refresh_token_id' => $refreshToken,
 | 
						|
            'access_token_id' => $accessTokenId,
 | 
						|
            'scopes' => $relatedSession->getScopes(),
 | 
						|
            'user_id' => $relatedSession->account_id,
 | 
						|
            'expire_time' => null,
 | 
						|
        ];
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * @return array{
 | 
						|
     *     client_id: string,
 | 
						|
     *     refresh_token_id?: string,
 | 
						|
     *     access_token_id?: string,
 | 
						|
     *     scopes: list<string>|null,
 | 
						|
     *     user_id: string|null,
 | 
						|
     *     expire_time: int|null,
 | 
						|
     * }
 | 
						|
     * @throws OAuthServerException
 | 
						|
     */
 | 
						|
    private function validateAccessToken(string $jwt): array {
 | 
						|
        try {
 | 
						|
            $token = Yii::$app->tokens->parse($jwt);
 | 
						|
        } catch (InvalidArgumentException $e) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Cannot decrypt the refresh token', $e);
 | 
						|
        }
 | 
						|
 | 
						|
        if (!Yii::$app->tokens->verify($token)) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Cannot decrypt the refresh token');
 | 
						|
        }
 | 
						|
 | 
						|
        if (!(new Validator())->validate($token, new LooseValidAt(FactoryImmutable::getDefaultInstance()))) {
 | 
						|
            throw OAuthServerException::invalidRefreshToken('Token has expired');
 | 
						|
        }
 | 
						|
 | 
						|
        $reader = new TokenReader($token);
 | 
						|
 | 
						|
        return [
 | 
						|
            'client_id' => $reader->getClientId(),
 | 
						|
            'refresh_token_id' => '', // This value used only to invalidate old token
 | 
						|
            'access_token_id' => '', // This value used only to invalidate old token
 | 
						|
            'scopes' => $reader->getScopes(),
 | 
						|
            'user_id' => $reader->getAccountId(),
 | 
						|
            'expire_time' => null,
 | 
						|
        ];
 | 
						|
    }
 | 
						|
 | 
						|
}
 |