This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include
, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
1 | <?php |
||
2 | |||
3 | namespace CodexShaper\OAuth2\Server; |
||
4 | |||
5 | use CodexShaper\OAuth2\Server\Repositories\AccessTokenRepository; |
||
6 | use CodexShaper\OAuth2\Server\Repositories\AuthCodeRepository; |
||
7 | use CodexShaper\OAuth2\Server\Repositories\ClientRepository; |
||
8 | use CodexShaper\OAuth2\Server\Repositories\RefreshTokenRepository; |
||
9 | use CodexShaper\OAuth2\Server\Repositories\ScopeRepository; |
||
10 | use CodexShaper\OAuth2\Server\Repositories\UserRepository; |
||
11 | use DateInterval; |
||
12 | use Defuse\Crypto\Key; |
||
13 | use League\OAuth2\Server\AuthorizationServer; |
||
14 | use League\OAuth2\Server\CryptKey; |
||
15 | use League\OAuth2\Server\Grant\AuthCodeGrant; |
||
16 | use League\OAuth2\Server\Grant\ClientCredentialsGrant; |
||
17 | use League\OAuth2\Server\Grant\ImplicitGrant; |
||
18 | use League\OAuth2\Server\Grant\PasswordGrant; |
||
19 | use League\OAuth2\Server\Grant\RefreshTokenGrant; |
||
20 | use League\OAuth2\Server\ResourceServer; |
||
21 | use phpseclib\Crypt\RSA; |
||
22 | |||
23 | class Manager |
||
24 | { |
||
25 | /** |
||
26 | * Authorization server. |
||
27 | * |
||
28 | * @var string |
||
29 | */ |
||
30 | protected $server; |
||
31 | |||
32 | /** |
||
33 | * All scopes. |
||
34 | * |
||
35 | * @var string |
||
36 | */ |
||
37 | protected static $scopes = [ |
||
38 | 'read' => 'Read', |
||
39 | 'read_write' => 'Read and Write', |
||
40 | ]; |
||
41 | |||
42 | /** |
||
43 | * Default scope. |
||
44 | * |
||
45 | * @var string |
||
46 | */ |
||
47 | protected static $defaultScope; |
||
48 | |||
49 | /** |
||
50 | * Enable or didable implicit grant. |
||
51 | * |
||
52 | * @var string |
||
53 | */ |
||
54 | protected $isEnableImplicitGrant = false; |
||
55 | |||
56 | /** |
||
57 | * Refresh token expire at. |
||
58 | * |
||
59 | * @var string |
||
60 | */ |
||
61 | protected static $refreshTokensExpireAt = 'P1Y'; |
||
62 | |||
63 | /** |
||
64 | * token exipre at. |
||
65 | * |
||
66 | * @var string |
||
67 | */ |
||
68 | protected static $tokensExpireAt = 'P1Y'; |
||
69 | |||
70 | /** |
||
71 | * Create RSA authorisation keys. |
||
72 | * |
||
73 | * @return void |
||
74 | */ |
||
75 | public static function keys($dir = null) |
||
76 | { |
||
77 | if (!$dir) { |
||
78 | $dir = __DIR__.'/../storage/rsa'; |
||
79 | } |
||
80 | |||
81 | if (!is_dir($dir)) { |
||
82 | mkdir($dir, 0777, true); |
||
83 | } |
||
84 | |||
85 | $publicKey = $dir.'/oauth-public.key'; |
||
86 | $privateKey = $dir.'/oauth-private.key'; |
||
87 | $rsa = new RSA(); |
||
88 | $keys = $rsa->createKey(4096); |
||
89 | |||
90 | file_put_contents($publicKey, $keys['publickey']); |
||
91 | file_put_contents($privateKey, $keys['privatekey']); |
||
92 | } |
||
93 | |||
94 | /** |
||
95 | * Add New scopes. |
||
96 | * |
||
97 | * @return void |
||
98 | */ |
||
99 | public static function setScopes(array $scopes = []) |
||
100 | { |
||
101 | if (!empty($scopes)) { |
||
102 | return; |
||
103 | } |
||
104 | |||
105 | static::$scopes = array_merge(static::$scopes, $scopes); |
||
0 ignored issues
–
show
|
|||
106 | } |
||
107 | |||
108 | /** |
||
109 | * Get all available scopes. |
||
110 | * |
||
111 | * @return array |
||
112 | */ |
||
113 | public static function getScopes() |
||
114 | { |
||
115 | return static::$scopes; |
||
116 | } |
||
117 | |||
118 | /** |
||
119 | * Given a client, grant type and optional user identifier validate the set of scopes requested are valid and optionally |
||
120 | * append additional scopes or remove requested scopes. |
||
121 | * |
||
122 | * @param \League\OAuth2\Server\Entities\ScopeEntityInterface[] $scopes |
||
123 | * @param string $grantType |
||
124 | * @param \League\OAuth2\Server\Entities\ClientEntityInterface $clientEntity |
||
125 | * @param null|string $userIdentifier |
||
126 | * |
||
127 | * @return \League\OAuth2\Server\Entities\ScopeEntityInterface[] |
||
128 | */ |
||
129 | public static function filterScopes($scopes, $grantType) |
||
130 | { |
||
131 | if (!in_array($grantType, ['password', 'personal_access', 'client_credentials'])) { |
||
132 | $scopes = array_filter($scopes, function ($scope) { |
||
133 | return trim($scope->getIdentifier()) !== '*'; |
||
134 | }); |
||
135 | } |
||
136 | |||
137 | return array_filter($scopes, function ($scope) { |
||
138 | return static::hasScope($scope->getIdentifier()); |
||
139 | }); |
||
140 | } |
||
141 | |||
142 | /** |
||
143 | * Create a CryptKey instance without permissions check. |
||
144 | * |
||
145 | * @param string $identifier |
||
146 | * |
||
147 | * @return bool |
||
148 | */ |
||
149 | public static function hasScope($identifier) |
||
150 | { |
||
151 | return trim($identifier) === '*' || array_key_exists($identifier, static::$scopes); |
||
152 | } |
||
153 | |||
154 | /** |
||
155 | * Check is isset a scope or not. |
||
156 | * |
||
157 | * @param string $identifier |
||
158 | * |
||
159 | * @return bool |
||
160 | */ |
||
161 | public static function isValidateScope($identifier) |
||
162 | { |
||
163 | return array_key_exists($identifier, static::$scopes); |
||
164 | } |
||
165 | |||
166 | /** |
||
167 | * Make the authorization service instance. |
||
168 | * |
||
169 | * @return \League\OAuth2\Server\AuthorizationServer |
||
170 | */ |
||
171 | public function makeAuthorizationServer() |
||
172 | { |
||
173 | $encryptionKey = 'def00000069ceedc03a1f91fd51a49ce08ebb8580d688f4fbc3774c86aaa4df516eea0f72c1f62e3e577ec9f0c83c773b890222966bf93ac22e84a9eca55638be310665b'; |
||
174 | |||
175 | $this->server = new AuthorizationServer( |
||
0 ignored issues
–
show
It seems like
new \League\OAuth2\Serve...String($encryptionKey)) of type object<League\OAuth2\Server\AuthorizationServer> is incompatible with the declared type string of property $server .
Our type inference engine has found an assignment to a property that is incompatible with the declared type of that property. Either this assignment is in error or the assigned type should be added to the documentation/type hint for that property.. ![]() |
|||
176 | new ClientRepository(), |
||
177 | new AccessTokenRepository(), |
||
178 | new ScopeRepository(), |
||
179 | $this->makeCryptKey('private'), |
||
180 | Key::loadFromAsciiSafeString($encryptionKey) |
||
181 | ); |
||
182 | |||
183 | $this->server->setDefaultScope(static::$defaultScope); |
||
184 | $this->enableGrantTypes(); |
||
185 | |||
186 | return $this->server; |
||
187 | } |
||
188 | |||
189 | /** |
||
190 | * Enable All grant types. |
||
191 | * |
||
192 | * @return void |
||
193 | */ |
||
194 | protected function enableGrantTypes() |
||
195 | { |
||
196 | $this->server->enableGrantType( |
||
197 | new ClientCredentialsGrant(), |
||
198 | new DateInterval(static::$tokensExpireAt) // access tokens will expire after 1 hour |
||
199 | ); |
||
200 | |||
201 | $this->enableAuthCodeGrant(); |
||
202 | $this->enablePasswordGrant(); |
||
203 | $this->enableRefreshTokenGrant(); |
||
204 | |||
205 | if ($this->isEnableImplicitGrant) { |
||
206 | $this->server->enableGrantType( |
||
207 | new ImplicitGrant(new DateInterval(static::$tokensExpireAt)), |
||
208 | new DateInterval(static::$tokensExpireAt) // access tokens will expire after 1 hour |
||
209 | ); |
||
210 | } |
||
211 | } |
||
212 | |||
213 | /** |
||
214 | * Enable Authorization code Grant. |
||
215 | * |
||
216 | * @return void |
||
217 | */ |
||
218 | View Code Duplication | protected function enableAuthCodeGrant() |
|
219 | { |
||
220 | $authCodeGrant = new AuthCodeGrant( |
||
221 | new AuthCodeRepository(), |
||
222 | new RefreshTokenRepository(), |
||
223 | new DateInterval('PT10M') |
||
224 | ); |
||
225 | |||
226 | $authCodeGrant->setRefreshTokenTTL(new DateInterval(static::$refreshTokensExpireAt)); |
||
227 | |||
228 | $this->server->enableGrantType( |
||
229 | $authCodeGrant, |
||
230 | new DateInterval(static::$tokensExpireAt) |
||
231 | ); |
||
232 | } |
||
233 | |||
234 | /** |
||
235 | * Enable Password Grant. |
||
236 | * |
||
237 | * @return void |
||
238 | */ |
||
239 | View Code Duplication | protected function enablePasswordGrant() |
|
240 | { |
||
241 | $passwordGrant = new PasswordGrant( |
||
242 | new UserRepository(), |
||
243 | new RefreshTokenRepository() |
||
244 | ); |
||
245 | |||
246 | $passwordGrant->setRefreshTokenTTL(new DateInterval(static::$refreshTokensExpireAt)); // refresh tokens will expire after 1 month |
||
247 | |||
248 | // Enable the password grant on the server |
||
249 | $this->server->enableGrantType( |
||
250 | $passwordGrant, |
||
251 | new DateInterval(static::$tokensExpireAt) // access tokens will expire after 1 hour |
||
252 | ); |
||
253 | } |
||
254 | |||
255 | /** |
||
256 | * Enable Refresh token Grant. |
||
257 | * |
||
258 | * @return void |
||
259 | */ |
||
260 | View Code Duplication | protected function enableRefreshTokenGrant() |
|
261 | { |
||
262 | $refreshTokenGrant = new RefreshTokenGrant(new RefreshTokenRepository()); |
||
263 | $refreshTokenGrant->setRefreshTokenTTL(new \DateInterval(static::$refreshTokensExpireAt)); // new refresh tokens will expire after 1 month |
||
264 | |||
265 | // Enable the refresh token grant on the server |
||
266 | $this->server->enableGrantType( |
||
267 | $refreshTokenGrant, |
||
268 | new \DateInterval(static::$tokensExpireAt) // new access tokens will expire after an hour |
||
269 | ); |
||
270 | } |
||
271 | |||
272 | /** |
||
273 | * Create a resource server for validation. |
||
274 | * |
||
275 | * @return \League\OAuth2\Server\ResourServer |
||
276 | */ |
||
277 | public function getResourceServer() |
||
278 | { |
||
279 | return new ResourceServer( |
||
280 | new AccessTokenRepository(), |
||
281 | $this->makeCryptKey('public') |
||
282 | ); |
||
283 | } |
||
284 | |||
285 | /** |
||
286 | * Create a CryptKey instance without permissions check. |
||
287 | * |
||
288 | * @param string $key |
||
289 | * |
||
290 | * @return \League\OAuth2\Server\CryptKey |
||
291 | */ |
||
292 | protected function makeCryptKey($type) |
||
293 | { |
||
294 | $key = __DIR__.'/../storage/rsa/oauth-'.$type.'.key'; |
||
295 | |||
296 | return new CryptKey($key, null, false); |
||
297 | } |
||
298 | |||
299 | /** |
||
300 | * Validate user for current request. |
||
301 | * |
||
302 | * @param \Psr\Http\Message\ServerRequestInterface $request |
||
303 | * |
||
304 | * @return null|int |
||
305 | */ |
||
306 | public function validateUserForRequest($request) |
||
307 | { |
||
308 | $token = Model::instance('tokenModel')->find($request->getAttribute('oauth_access_token_id')); |
||
309 | $client = Model::instance('clientModel')->find($request->getAttribute('oauth_client_id')); |
||
310 | |||
311 | if (!$token || !$client) { |
||
312 | return null; |
||
313 | } |
||
314 | |||
315 | if (!$token->user_id && !$client->user_id) { |
||
316 | return null; |
||
317 | } |
||
318 | |||
319 | if ($token->user_id != null) { |
||
320 | return $token->user_id; |
||
321 | } |
||
322 | |||
323 | return $client->user_id; |
||
324 | } |
||
325 | |||
326 | /** |
||
327 | * Migrate tables. |
||
328 | * |
||
329 | * @param string $dir |
||
330 | * |
||
331 | * @return void |
||
332 | */ |
||
333 | View Code Duplication | public static function migrate($dir = null) |
|
334 | { |
||
335 | if (is_null($dir)) { |
||
336 | $dir = __DIR__.'/../database/migrations'; |
||
337 | } |
||
338 | |||
339 | foreach (glob($dir.'/*.php') as $file) { |
||
340 | require_once $file; |
||
341 | $table = pathinfo($file)['filename']; |
||
342 | (new $table())->up(); |
||
343 | } |
||
344 | } |
||
345 | |||
346 | /** |
||
347 | * Drop tables. |
||
348 | * |
||
349 | * @param string $dir |
||
350 | * |
||
351 | * @return void |
||
352 | */ |
||
353 | View Code Duplication | public static function rollback($dir = null) |
|
354 | { |
||
355 | if (is_null($dir)) { |
||
356 | $dir = __DIR__.'/../database/migrations'; |
||
357 | } |
||
358 | |||
359 | foreach (glob($dir.'/*.php') as $file) { |
||
360 | require_once $file; |
||
361 | $table = pathinfo($file)['filename']; |
||
362 | (new $table())->down(); |
||
363 | } |
||
364 | } |
||
365 | |||
366 | /** |
||
367 | * Drop and migrate fresh tables. |
||
368 | * |
||
369 | * @param string $dir |
||
370 | * |
||
371 | * @return void |
||
372 | */ |
||
373 | public static function refresh($dir = null) |
||
374 | { |
||
375 | if (is_null($dir)) { |
||
376 | $dir = __DIR__.'/../database/migrations'; |
||
377 | } |
||
378 | |||
379 | static::rollback($dir); |
||
380 | static::migrate($dir); |
||
381 | } |
||
382 | } |
||
383 |
Our type inference engine has found an assignment to a property that is incompatible with the declared type of that property.
Either this assignment is in error or the assigned type should be added to the documentation/type hint for that property..