1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
declare(strict_types=1); |
4
|
|
|
|
5
|
|
|
/* |
6
|
|
|
* The MIT License (MIT) |
7
|
|
|
* |
8
|
|
|
* Copyright (c) 2014-2017 Spomky-Labs |
9
|
|
|
* |
10
|
|
|
* This software may be modified and distributed under the terms |
11
|
|
|
* of the MIT license. See the LICENSE file for details. |
12
|
|
|
*/ |
13
|
|
|
|
14
|
|
|
namespace OAuth2Framework\Bundle\Server\DependencyInjection\Source\OpenIdConnect; |
15
|
|
|
|
16
|
|
|
use Assert\Assertion; |
17
|
|
|
use Fluent\PhpConfigFileLoader; |
18
|
|
|
use Jose\Bundle\JoseFramework\Helper\ConfigurationHelper; |
19
|
|
|
use OAuth2Framework\Bundle\Server\DependencyInjection\Source\ArraySource; |
20
|
|
|
use Symfony\Component\Config\Definition\Builder\NodeDefinition; |
21
|
|
|
use Symfony\Component\Config\FileLocator; |
22
|
|
|
use Symfony\Component\DependencyInjection\ContainerBuilder; |
23
|
|
|
use Symfony\Component\PropertyAccess\PropertyAccess; |
24
|
|
|
|
25
|
|
|
final class IdTokenSource extends ArraySource |
26
|
|
|
{ |
27
|
|
|
/** |
28
|
|
|
* UserinfoSource constructor. |
29
|
|
|
*/ |
30
|
|
|
public function __construct() |
31
|
|
|
{ |
32
|
|
|
$this->addSubSource(new IdTokenResponseTypeSource()); |
33
|
|
|
$this->addSubSource(new IdTokenEncryptionSource()); |
34
|
|
|
} |
35
|
|
|
|
36
|
|
|
/** |
37
|
|
|
* {@inheritdoc} |
38
|
|
|
*/ |
39
|
|
|
public function prepend(array $bundleConfig, string $path, ContainerBuilder $container) |
40
|
|
|
{ |
41
|
|
|
parent::prepend($bundleConfig, $path, $container); |
42
|
|
|
$currentPath = $path.'['.$this->name().']'; |
43
|
|
|
$accessor = PropertyAccess::createPropertyAccessor(); |
44
|
|
|
$sourceConfig = $accessor->getValue($bundleConfig, $currentPath); |
45
|
|
|
ConfigurationHelper::addJWSBuilder($container, $this->name(), $sourceConfig['signature_algorithms'], false); |
46
|
|
|
ConfigurationHelper::addJWSLoader($container, $this->name(), $sourceConfig['signature_algorithms'], [], ['jws_compact'], false); |
47
|
|
|
|
48
|
|
|
Assertion::keyExists($bundleConfig['key_set'], 'signature', 'The signature key set must be enabled.'); |
49
|
|
|
//ConfigurationHelper::addKeyset($container, 'id_token.key_set.signature', 'jwkset', ['value' => $bundleConfig['key_set']['signature']]); |
|
|
|
|
50
|
|
|
} |
51
|
|
|
|
52
|
|
|
/** |
53
|
|
|
* {@inheritdoc} |
54
|
|
|
*/ |
55
|
|
|
protected function continueLoading(string $path, ContainerBuilder $container, array $config) |
56
|
|
|
{ |
57
|
|
|
foreach (['lifetime', 'default_signature_algorithm', 'signature_algorithms', 'claim_checkers', 'header_checkers'] as $k) { |
58
|
|
|
$container->setParameter($path.'.'.$k, $config[$k]); |
59
|
|
|
} |
60
|
|
|
//$container->setAlias($path.'.key_set', 'jose.key_set.id_token.key_set.signature'); |
|
|
|
|
61
|
|
|
|
62
|
|
|
$loader = new PhpConfigFileLoader($container, new FileLocator(__DIR__.'/../../../Resources/config/openid_connect')); |
63
|
|
|
$loader->load('userinfo_scope_support.php'); |
64
|
|
|
} |
65
|
|
|
|
66
|
|
|
/** |
67
|
|
|
* {@inheritdoc} |
68
|
|
|
*/ |
69
|
|
|
protected function name(): string |
70
|
|
|
{ |
71
|
|
|
return 'id_token'; |
72
|
|
|
} |
73
|
|
|
|
74
|
|
|
protected function continueConfiguration(NodeDefinition $node) |
75
|
|
|
{ |
76
|
|
|
parent::continueConfiguration($node); |
77
|
|
|
$node |
78
|
|
|
->validate() |
79
|
|
|
->ifTrue(function ($config) { |
80
|
|
|
return empty($config['default_signature_algorithm']); |
81
|
|
|
}) |
82
|
|
|
->thenInvalid('The option "default_signature_algorithm" must be set.') |
83
|
|
|
->end() |
84
|
|
|
->validate() |
85
|
|
|
->ifTrue(function ($config) { |
86
|
|
|
return empty($config['signature_algorithms']); |
87
|
|
|
}) |
88
|
|
|
->thenInvalid('The option "signature_algorithm" must contain at least one signature algorithm.') |
89
|
|
|
->end() |
90
|
|
|
->validate() |
91
|
|
|
->ifTrue(function ($config) { |
92
|
|
|
return !in_array($config['default_signature_algorithm'], $config['signature_algorithms']); |
93
|
|
|
}) |
94
|
|
|
->thenInvalid('The default signature algorithm must be in the supported signature algorithms.') |
95
|
|
|
->end() |
96
|
|
|
->children() |
97
|
|
|
->scalarNode('default_signature_algorithm') |
98
|
|
|
->info('Signature algorithm used if the client has not defined a preferred one. Recommended value is "RS256".') |
99
|
|
|
->end() |
100
|
|
|
->arrayNode('signature_algorithms') |
101
|
|
|
->info('Signature algorithm used to sign the ID Tokens.') |
102
|
|
|
->useAttributeAsKey('name') |
103
|
|
|
->prototype('scalar')->end() |
104
|
|
|
->treatNullLike([]) |
105
|
|
|
->end() |
106
|
|
|
->arrayNode('claim_checkers') |
107
|
|
|
->info('Checkers will verify the JWT claims.') |
108
|
|
|
->useAttributeAsKey('name') |
109
|
|
|
->prototype('scalar')->end() |
110
|
|
|
->treatNullLike(['exp', 'iat', 'nbf']) |
111
|
|
|
->end() |
112
|
|
|
->arrayNode('header_checkers') |
113
|
|
|
->info('Checkers will verify the JWT headers.') |
114
|
|
|
->useAttributeAsKey('name') |
115
|
|
|
->prototype('scalar')->end() |
116
|
|
|
->treatNullLike(['crit']) |
117
|
|
|
->end() |
118
|
|
|
->integerNode('lifetime') |
119
|
|
|
->info('Lifetime of the ID Tokens (in seconds). If an access token is issued with the ID Token, the lifetime of the access token is used instead of this value.') |
120
|
|
|
->defaultValue(3600) |
121
|
|
|
->min(1) |
122
|
|
|
->end() |
123
|
|
|
->end(); |
124
|
|
|
} |
125
|
|
|
} |
126
|
|
|
|
Sometimes obsolete code just ends up commented out instead of removed. In this case it is better to remove the code once you have checked you do not need it.
The code might also have been commented out for debugging purposes. In this case it is vital that someone uncomments it again or your project may behave in very unexpected ways in production.
This check looks for comments that seem to be mostly valid code and reports them.