oauth2-server/src/Grant/AuthCodeGrant.php

353 lines
13 KiB
PHP
Raw Normal View History

2013-02-01 16:20:32 +05:30
<?php
namespace League\OAuth2\Server\Grant;
2013-05-08 23:36:09 +05:30
use DateInterval;
use League\OAuth2\Server\Entities\Interfaces\UserEntityInterface;
2016-02-11 23:00:01 +05:30
use League\OAuth2\Server\Exception\OAuthServerException;
use League\OAuth2\Server\Repositories\AuthCodeRepositoryInterface;
2016-02-12 19:02:58 +05:30
use League\OAuth2\Server\Repositories\RefreshTokenRepositoryInterface;
use League\OAuth2\Server\Repositories\UserRepositoryInterface;
2016-02-11 23:00:01 +05:30
use League\OAuth2\Server\ResponseTypes\ResponseTypeInterface;
use League\OAuth2\Server\Utils\KeyCrypt;
use League\Plates\Engine;
2016-02-11 23:00:01 +05:30
use Psr\Http\Message\ServerRequestInterface;
use Zend\Diactoros\Response;
use Zend\Diactoros\Uri;
2013-02-01 16:20:32 +05:30
2014-05-02 21:54:55 +05:30
class AuthCodeGrant extends AbstractGrant
2014-04-06 23:44:46 +05:30
{
/**
* @var \DateInterval
*/
private $authCodeTTL;
/**
* @var \League\OAuth2\Server\Repositories\AuthCodeRepositoryInterface
*/
private $authCodeRepository;
/**
* @var \League\OAuth2\Server\Repositories\UserRepositoryInterface
*/
private $userRepository;
/**
* @var null|string
*/
private $pathToLoginTemplate;
/**
* @var null|string
*/
private $pathToAuthorizeTemplate;
/**
2016-02-12 19:02:58 +05:30
* @var \League\OAuth2\Server\Repositories\RefreshTokenRepositoryInterface
*/
private $refreshTokenRepository;
/**
* @param \League\OAuth2\Server\Repositories\AuthCodeRepositoryInterface $authCodeRepository
* @param \League\OAuth2\Server\Repositories\RefreshTokenRepositoryInterface $refreshTokenRepository
* @param \League\OAuth2\Server\Repositories\UserRepositoryInterface $userRepository
* @param \DateInterval $authCodeTTL
* @param string|null $pathToLoginTemplate
* @param string|null $pathToAuthorizeTemplate
*/
public function __construct(
AuthCodeRepositoryInterface $authCodeRepository,
2016-02-12 19:02:58 +05:30
RefreshTokenRepositoryInterface $refreshTokenRepository,
UserRepositoryInterface $userRepository,
\DateInterval $authCodeTTL,
$pathToLoginTemplate = null,
$pathToAuthorizeTemplate = null
) {
$this->authCodeRepository = $authCodeRepository;
2016-02-12 19:02:58 +05:30
$this->refreshTokenRepository = $refreshTokenRepository;
$this->userRepository = $userRepository;
$this->authCodeTTL = $authCodeTTL;
$this->pathToLoginTemplate = $pathToLoginTemplate;
$this->pathToAuthorizeTemplate = $pathToAuthorizeTemplate;
2013-05-08 03:50:32 +05:30
}
2013-02-14 01:06:56 +05:30
/**
2016-02-11 23:00:01 +05:30
* Respond to an authorization request
2014-11-12 23:40:29 +05:30
*
2016-02-11 23:00:01 +05:30
* @param \Psr\Http\Message\ServerRequestInterface $request
*
* @return \Psr\Http\Message\ResponseInterface
* @throws \League\OAuth2\Server\Exception\OAuthServerException
*/
2016-02-11 23:00:01 +05:30
protected function respondToAuthorizationRequest(
ServerRequestInterface $request
2016-02-11 23:00:01 +05:30
) {
$clientId = $this->getQueryStringParameter(
'client_id',
$request,
$this->getServerParameter('PHP_AUTH_USER', $request)
);
2014-03-10 01:04:23 +05:30
if (is_null($clientId)) {
2016-02-11 23:00:01 +05:30
throw OAuthServerException::invalidRequest('client_id', null, '`%s` parameter is missing');
}
$redirectUri = $this->getQueryStringParameter('redirect_uri', $request, null);
2014-03-10 01:04:23 +05:30
if (is_null($redirectUri)) {
2016-02-11 23:00:01 +05:30
throw OAuthServerException::invalidRequest('redirect_uri', null, '`%s` parameter is missing');
}
2016-02-11 23:00:01 +05:30
$client = $this->clientRepository->getClientEntity(
2014-08-06 14:23:47 +05:30
$clientId,
null,
$redirectUri,
$this->getIdentifier()
2014-08-06 14:23:47 +05:30
);
if (!$client instanceof ClientEntityInterface) {
$this->emitter->emit(new Event('client.authentication.failed', $request));
2016-02-11 23:00:01 +05:30
throw OAuthServerException::invalidClient();
}
$scopes = $this->validateScopes($request, $client, $redirectUri);
$queryString = http_build_query($request->getQueryParams());
$postbackUri = new Uri(
sprintf(
'//%s%s',
$request->getServerParams()['HTTP_HOST'],
$request->getServerParams()['REQUEST_URI']
)
);
$userId = null;
$userHasApprovedClient = $userHasApprovedClient = $this->getRequestParameter('action', null);
// Check if the user has been validated
$oauthCookie = $this->getCookieParameter('oauth_authorize_request', $request, null);
if ($oauthCookie !== null) {
try {
$oauthCookiePayload = json_decode(KeyCrypt::decrypt($oauthCookie, $this->pathToPublicKey));
$userId = $oauthCookiePayload->user_id;
$userHasApprovedClient = $oauthCookiePayload->client_is_authorized;
} catch (\LogicException $e) {
throw OAuthServerException::serverError($e->getMessage());
}
}
// The username + password might be available in $_POST
$usernameParameter = $this->getRequestParameter('username', null);
$passwordParameter = $this->getRequestParameter('password', null);
$loginError = null;
// Assert if the user has logged in already
if ($userId === null && $usernameParameter !== null && $passwordParameter !== null) {
$userEntity = $this->userRepository->getUserEntityByUserCredentials(
$usernameParameter,
$passwordParameter
);
if ($userEntity instanceof UserEntityInterface) {
$userId = $userEntity->getIdentifier();
} else {
$loginError = 'Incorrect username or password';
}
}
// The user hasn't logged in yet so show a login form
if ($userId === null) {
$engine = new Engine();
$html = $engine->render(
($this->pathToLoginTemplate === null)
? __DIR__ . '/../ResponseTypes/DefaultTemplates/login_user.php'
: $this->pathToLoginTemplate,
[
'error' => $loginError,
'postback_uri' => (string) $postbackUri->withQuery($queryString),
]
);
return new Response\HtmlResponse($html);
}
// The user hasn't approved the client yet so show an authorize form
if ($userId !== null && $userHasApprovedClient === null) {
$engine = new Engine();
$html = $engine->render(
($this->pathToLoginTemplate === null)
? __DIR__ . '/../ResponseTypes/DefaultTemplates/authorize_client.php'
: $this->pathToAuthorizeTemplate,
[
'client' => $client,
'scopes' => $scopes,
'postback_uri' => (string) $postbackUri->withQuery($queryString),
]
);
return new Response\HtmlResponse(
$html,
200,
[
'Set-Cookie' => sprintf(
'oauth_authorize_request=%s; Expires=%s',
KeyCrypt::encrypt(
json_encode([
'user_id' => $userId,
'client_is_authorized' => null,
]),
$this->pathToPrivateKey
),
(new \DateTime())->add(new \DateInterval('PT5M'))->format('D, d M Y H:i:s e')
),
]
);
}
$stateParameter = $this->getQueryStringParameter('state', $request);
$redirectUri = new Uri($redirectUri);
parse_str($redirectUri->getQuery(), $redirectPayload);
if ($stateParameter !== null) {
$redirectPayload['state'] = $stateParameter;
}
if ($userHasApprovedClient === true) {
$authCode = $this->issueAuthCode(
$this->authCodeTTL,
$client,
$userId,
$redirectUri,
$scopes
);
$this->authCodeRepository->persistNewAuthCode($authCode);
$redirectPayload['code'] = KeyCrypt::encrypt(
json_encode(
[
'client_id' => $authCode->getClient()->getIdentifier(),
'auth_code_id' => $authCode->getIdentifier(),
'scopes' => $authCode->getScopes(),
'user_id' => $authCode->getUserIdentifier(),
'expire_time' => $this->authCodeTTL->format('U'),
]
),
$this->pathToPrivateKey
);
return new Response\RedirectResponse($redirectUri->withQuery(http_build_query($redirectPayload)));
}
$exception = OAuthServerException::accessDenied('The user denied the request', (string) $redirectUri);
return $exception->generateHttpResponse();
2016-02-11 23:00:01 +05:30
}
/**
2016-02-11 23:00:01 +05:30
* Respond to an access token request
*
2016-02-11 23:00:01 +05:30
* @param \Psr\Http\Message\ServerRequestInterface $request
* @param \League\OAuth2\Server\ResponseTypes\ResponseTypeInterface $responseType
* @param \DateInterval $accessTokenTTL
2014-12-10 18:40:35 +05:30
*
2016-02-11 23:00:01 +05:30
* @return \League\OAuth2\Server\ResponseTypes\ResponseTypeInterface
2016-02-12 19:02:58 +05:30
* @throws \League\OAuth2\Server\Exception\OAuthServerException
*/
2016-02-11 23:00:01 +05:30
protected function respondToAccessTokenRequest(
ServerRequestInterface $request,
ResponseTypeInterface $responseType,
DateInterval $accessTokenTTL
) {
// Validate request
$client = $this->validateClient($request);
2016-02-12 19:02:58 +05:30
$encryptedAuthCode = $this->getRequestParameter('code', $request, null);
2016-02-12 19:02:58 +05:30
if ($encryptedAuthCode === null) {
throw OAuthServerException::invalidRequest('code');
}
// Validate the authorization code
try {
2016-02-12 19:02:58 +05:30
$authCodePayload = json_decode(KeyCrypt::decrypt($encryptedAuthCode, $this->pathToPrivateKey));
if (time() > $authCodePayload->expire_time) {
throw OAuthServerException::invalidRequest('code', 'Authorization code has expired');
}
2016-02-12 19:02:58 +05:30
if ($this->authCodeRepository->isAuthCodeRevoked($authCodePayload->auth_code_id) === true) {
throw OAuthServerException::invalidRequest('code', 'Authorization code has been revoked');
}
if ($authCodePayload->client_id !== $client->getIdentifier()) {
throw OAuthServerException::invalidRequest('code', 'Authorization code was not issued to this client');
}
} catch (\LogicException $e) {
throw OAuthServerException::invalidRequest('code');
}
2016-02-12 19:02:58 +05:30
// Issue and persist access + refresh tokens
$accessToken = $this->issueAccessToken(
$accessTokenTTL,
$client,
$authCodePayload->user_id,
$authCodePayload->scopes
);
2016-02-12 19:02:58 +05:30
$refreshToken = $this->issueRefreshToken($accessToken);
$this->accessTokenRepository->persistNewAccessToken($accessToken);
2016-02-12 19:02:58 +05:30
$this->refreshTokenRepository->persistNewRefreshToken($refreshToken);
2016-02-12 19:02:58 +05:30
// Inject tokens into response type
$responseType->setAccessToken($accessToken);
2016-02-12 19:02:58 +05:30
$responseType->setRefreshToken($refreshToken);
2014-04-06 23:44:46 +05:30
return $responseType;
2016-02-11 23:00:01 +05:30
}
/**
2016-02-11 23:00:01 +05:30
* @inheritdoc
2013-02-14 01:06:56 +05:30
*/
2016-02-11 23:00:01 +05:30
public function canRespondToRequest(ServerRequestInterface $request)
{
return (
(
strtoupper($request->getMethod()) === 'GET'
&& isset($request->getQueryParams()['response_type'])
&& $request->getQueryParams()['response_type'] === 'code'
&& isset($request->getQueryParams()['client_id'])
) || (parent::canRespondToRequest($request))
2014-04-06 23:44:46 +05:30
);
2013-02-01 16:20:32 +05:30
}
/**
* Return the grant identifier that can be used in matching up requests
*
* @return string
*/
public function getIdentifier()
{
return 'authorization_code';
}
/**
* @inheritdoc
*/
public function respondToRequest(
ServerRequestInterface $request,
ResponseTypeInterface $responseType,
\DateInterval $accessTokenTTL
) {
if (
isset($request->getQueryParams()['response_type'])
&& $request->getQueryParams()['response_type'] === 'code'
&& isset($request->getQueryParams()['client_id'])
) {
return $this->respondToAuthorizationRequest($request);
} elseif (
isset($request->getParsedBody()['grant_type'])
&& $request->getParsedBody()['grant_type'] === 'authorization_code'
) {
return $this->respondToAccessTokenRequest($request, $responseType, $accessTokenTTL);
} else {
throw OAuthServerException::serverError('respondToRequest() should not have been called');
}
}
2013-09-07 22:29:44 +05:30
}