|
1
|
|
|
<?php |
|
2
|
|
|
/** |
|
3
|
|
|
* Created by PhpStorm. |
|
4
|
|
|
* User: Alexandre |
|
5
|
|
|
* Date: 30/12/2017 |
|
6
|
|
|
* Time: 18:49 |
|
7
|
|
|
*/ |
|
8
|
|
|
|
|
9
|
|
|
namespace OAuth2OLD\Endpoint\Server; |
|
10
|
|
|
|
|
11
|
|
|
use GuzzleHttp\Psr7\Response; |
|
12
|
|
|
use GuzzleHttp\Psr7\Uri; |
|
13
|
|
|
use OAuth2OLD\Credential\AuthorizationCode; |
|
14
|
|
|
use OAuth2OLD\Endpoint\Config; |
|
15
|
|
|
use OAuth2OLD\Endpoint\Endpoint; |
|
16
|
|
|
use OAuth2OLD\Endpoint\Server\Messages\Authorization\AuthorizationRequest as AuthorizationRequest; |
|
17
|
|
|
use OAuth2OLD\Endpoint\Server\Messages\Authorization\AuthorizationResponse as AuthorizationResponse; |
|
18
|
|
|
use OAuth2OLD\Endpoint\Server\Messages\Authorization\ErrorResponse; |
|
19
|
|
|
use OAuth2OLD\Exception\MissingResourceOwnerDecision; |
|
20
|
|
|
use OAuth2OLD\Exception\ResourceOwnerNotAuthenticatedException; |
|
|
|
|
|
|
21
|
|
|
use OAuth2OLD\ResponseType\ResponseTypeInterface; |
|
22
|
|
|
use OAuth2OLD\Storage\ClientStorage; |
|
23
|
|
|
use OAuth2OLD\Role\Client\RegisteredClient; |
|
24
|
|
|
use OAuth2OLD\Role\Client\Type\ClientPassword; |
|
|
|
|
|
|
25
|
|
|
use OAuth2OLD\Role\Client\Type\PublicClient; |
|
26
|
|
|
use OAuth2OLD\Role\Client\WebApplication; |
|
27
|
|
|
use OAuth2OLD\Role\ResourceOwner; |
|
28
|
|
|
|
|
29
|
|
|
|
|
30
|
|
|
/** |
|
31
|
|
|
* @deprecated |
|
32
|
|
|
* Class Authorization |
|
33
|
|
|
* @package OAuth2\endpoints |
|
34
|
|
|
* |
|
35
|
|
|
* @see https://tools.ietf.org/html/rfc6749#section-3.1 |
|
36
|
|
|
* |
|
37
|
|
|
* Authorization Endpoint |
|
38
|
|
|
* |
|
39
|
|
|
* The authorization endpoint is used to interact with the resource |
|
40
|
|
|
* owner and obtain an authorization grant. The authorization server |
|
41
|
|
|
* MUST first verify the identity of the resource owner. The way in |
|
42
|
|
|
* which the authorization server authenticates the resource owner |
|
43
|
|
|
* (e.g., username and password login, session cookies) is beyond the |
|
44
|
|
|
* scope of this specification. |
|
45
|
|
|
* |
|
46
|
|
|
* The means through which the client obtains the location of the |
|
47
|
|
|
* authorization endpoint are beyond the scope of this specification, |
|
48
|
|
|
* but the location is typically provided in the service documentation. |
|
49
|
|
|
* |
|
50
|
|
|
* The endpoint URI MAY include an "application/x-www-form-urlencoded" |
|
51
|
|
|
* formatted (per Appendix B) query component ([RFC3986] Section 3.4), |
|
52
|
|
|
* which MUST be retained when adding additional query parameters. The |
|
53
|
|
|
* endpoint URI MUST NOT include a fragment component. |
|
54
|
|
|
* |
|
55
|
|
|
* Since requests to the authorization endpoint result in user |
|
56
|
|
|
* authentication and the transmission of clear-text credentials (in the |
|
57
|
|
|
* HTTP response), the authorization server MUST require the use of TLS |
|
58
|
|
|
* as described in Section 1.6 when sending requests to the |
|
59
|
|
|
* authorization endpoint. |
|
60
|
|
|
* |
|
61
|
|
|
* The authorization server MUST support the use of the HTTP "GET" |
|
62
|
|
|
* method [RFC2616] for the authorization endpoint and MAY support the |
|
63
|
|
|
* use of the "POST" method as well. |
|
64
|
|
|
* |
|
65
|
|
|
* Parameters sent without a value MUST be treated as if they were |
|
66
|
|
|
* omitted from the request. The authorization server MUST ignore |
|
67
|
|
|
* unrecognized request parameters. Request and response parameters |
|
68
|
|
|
* MUST NOT be included more than once. |
|
69
|
|
|
*/ |
|
70
|
|
|
class Authorization extends Endpoint |
|
71
|
|
|
{ |
|
72
|
|
|
/** |
|
73
|
|
|
* @var array |
|
74
|
|
|
* |
|
75
|
|
|
* @see https://tools.ietf.org/html/rfc6749#section-3.1.1 |
|
76
|
|
|
* |
|
77
|
|
|
* Response Type |
|
78
|
|
|
* |
|
79
|
|
|
* The authorization endpoint is used by the authorization code grant |
|
80
|
|
|
* type and implicit grant type flows. The client informs the |
|
81
|
|
|
* authorization server of the desired grant type using the following |
|
82
|
|
|
* parameter: |
|
83
|
|
|
* |
|
84
|
|
|
* response_type |
|
85
|
|
|
* REQUIRED. The value MUST be one of "code" for requesting an |
|
86
|
|
|
* authorization code as described by Section 4.1.1, "token" for |
|
87
|
|
|
* requesting an access token (implicit grant) as described by |
|
88
|
|
|
* Section 4.2.1, or a registered extension value as described by |
|
89
|
|
|
* Section 8.4. |
|
90
|
|
|
* |
|
91
|
|
|
* Extension response types MAY contain a space-delimited (%x20) list of |
|
92
|
|
|
* values, where the order of values does not matter (e.g., response |
|
93
|
|
|
* type "a b" is the same as "b a"). The meaning of such composite |
|
94
|
|
|
* response types is defined by their respective specifications. |
|
95
|
|
|
* |
|
96
|
|
|
* If an authorization request is missing the "response_type" parameter, |
|
97
|
|
|
* or if the response type is not understood, the authorization server |
|
98
|
|
|
* MUST return an error response as described in Section 4.1.2.1. |
|
99
|
|
|
*/ |
|
100
|
|
|
protected $responseTypesRegistry; |
|
101
|
|
|
/** |
|
102
|
|
|
* @var Server |
|
103
|
|
|
*/ |
|
104
|
|
|
private $server; |
|
105
|
|
|
|
|
106
|
|
|
/** |
|
107
|
|
|
* Authorization constructor. |
|
108
|
|
|
* @param Server $server |
|
109
|
|
|
*/ |
|
110
|
|
|
public function __construct(Server $server) |
|
111
|
|
|
{ |
|
112
|
|
|
$this->responseTypesRegistry = [ |
|
113
|
|
|
'code' => 'class' |
|
114
|
|
|
]; |
|
115
|
|
|
$this->server = $server; |
|
116
|
|
|
} |
|
117
|
|
|
|
|
118
|
|
|
|
|
119
|
|
|
/** |
|
120
|
|
|
* @see https://tools.ietf.org/html/rfc6749#section-3.3 |
|
121
|
|
|
* |
|
122
|
|
|
* Access Token Scope |
|
123
|
|
|
* |
|
124
|
|
|
* The authorization and token endpoints allow the client to specify the |
|
125
|
|
|
* scope of the access request using the "scope" request parameter. In |
|
126
|
|
|
* turn, the authorization server uses the "scope" response parameter to |
|
127
|
|
|
* inform the client of the scope of the access token issued. |
|
128
|
|
|
* |
|
129
|
|
|
* The value of the scope parameter is expressed as a list of space- |
|
130
|
|
|
* delimited, case-sensitive strings. The strings are defined by the |
|
131
|
|
|
* authorization server. If the value contains multiple space-delimited |
|
132
|
|
|
* strings, their order does not matter, and each string adds an |
|
133
|
|
|
* additional access range to the requested scope. |
|
134
|
|
|
* |
|
135
|
|
|
* scope = scope-token *( SP scope-token ) |
|
136
|
|
|
* scope-token = 1*( %x21 / %x23-5B / %x5D-7E ) |
|
137
|
|
|
* |
|
138
|
|
|
* The authorization server MAY fully or partially ignore the scope |
|
139
|
|
|
* requested by the client, based on the authorization server policy or |
|
140
|
|
|
* the resource owner's instructions. If the issued access token scope |
|
141
|
|
|
* is different from the one requested by the client, the authorization |
|
142
|
|
|
* server MUST include the "scope" response parameter to inform the |
|
143
|
|
|
* client of the actual scope granted. |
|
144
|
|
|
* |
|
145
|
|
|
* If the client omits the scope parameter when requesting |
|
146
|
|
|
* authorization, the authorization server MUST either process the |
|
147
|
|
|
* request using a pre-defined default value or fail the request |
|
148
|
|
|
* indicating an invalid scope. The authorization server SHOULD |
|
149
|
|
|
* document its scope requirements and default value (if defined). |
|
150
|
|
|
* |
|
151
|
|
|
* |
|
152
|
|
|
* @see https://tools.ietf.org/html/rfc6749#section-10.12 |
|
153
|
|
|
* |
|
154
|
|
|
* The authorization server MUST implement CSRF protection for its |
|
155
|
|
|
* authorization endpoint and ensure that a malicious client cannot |
|
156
|
|
|
* obtain authorization without the awareness and explicit consent of |
|
157
|
|
|
* the resource owner. |
|
158
|
|
|
* |
|
159
|
|
|
* @param AuthorizationRequest $request |
|
160
|
|
|
* @param ResourceOwner $resourceOwner |
|
161
|
|
|
* @param bool|null $authorizationDecision |
|
162
|
|
|
* @return Response |
|
163
|
|
|
* @throws MissingResourceOwnerDecision |
|
164
|
|
|
* @throws ResourceOwnerNotAuthenticatedException |
|
165
|
|
|
* @throws \Exception |
|
166
|
|
|
*/ |
|
167
|
|
|
public function authorize(AuthorizationRequest $request, ResourceOwner $resourceOwner, |
|
168
|
|
|
?bool $authorizationDecision = null) |
|
169
|
|
|
{ |
|
170
|
|
|
$client = $this->server->getClientStorage()->getByIdentifier($request->getClientId()); |
|
171
|
|
|
$redirectUri = $request->getRedirectUri(); |
|
172
|
|
|
|
|
173
|
|
|
try { |
|
174
|
|
|
$isImplicitResponseType = false; |
|
175
|
|
|
$responseTypes = []; |
|
176
|
|
|
foreach (explode(' ', $request->getResponseType()) as $responseTypeRequested) { |
|
177
|
|
|
$responseType = $this->server->getResponseType($responseTypeRequested); |
|
178
|
|
|
if(!$responseType) { |
|
179
|
|
|
return new ErrorResponse($redirectUri, 'unsupported_response_type', 'Invalid response_type parameter', |
|
180
|
|
|
'https://tools.ietf.org/html/rfc6749#section-3.1.1'); |
|
181
|
|
|
} |
|
182
|
|
|
|
|
183
|
|
|
if($responseType->isImplicit()) { |
|
184
|
|
|
$isImplicitResponseType = true; |
|
185
|
|
|
} |
|
186
|
|
|
|
|
187
|
|
|
$responseTypes[] = $responseType; |
|
188
|
|
|
} |
|
189
|
|
|
|
|
190
|
|
|
$redirectUri = $this->checkClientRedirectUri($client, $redirectUri, $isImplicitResponseType); |
|
191
|
|
|
|
|
192
|
|
|
$redirectUri = Uri::withoutQueryValue($redirectUri, 'response_type'); |
|
193
|
|
|
$redirectUri = Uri::withoutQueryValue($redirectUri, 'client_id'); |
|
194
|
|
|
$redirectUri = Uri::withoutQueryValue($redirectUri, 'redirect_uri'); |
|
195
|
|
|
$redirectUri = Uri::withoutQueryValue($redirectUri, 'scope'); |
|
196
|
|
|
$redirectUri = Uri::withoutQueryValue($redirectUri, 'state'); |
|
197
|
|
|
} catch (\Exception $e) { |
|
198
|
|
|
return new Response(302, ['Location' => $this->server->getConfig(Config::INVALID_ENDPOINT_URI)]); |
|
199
|
|
|
} |
|
200
|
|
|
|
|
201
|
|
|
try { |
|
202
|
|
|
$request->validate(); |
|
203
|
|
|
} catch (\Exception $e) { |
|
204
|
|
|
return new ErrorResponse($redirectUri, 'invalid_request', $e->getMessage(), |
|
205
|
|
|
'https://tools.ietf.org/html/rfc6749#section-4.1.1'); |
|
206
|
|
|
} |
|
207
|
|
|
|
|
208
|
|
|
|
|
209
|
|
|
if ($this->server->getConfig(Config::ENFORCE_STATE) && !$request->getState()) { |
|
210
|
|
|
return new ErrorResponse($redirectUri, 'invalid_request', 'Missing state parameter', |
|
211
|
|
|
'https://tools.ietf.org/html/rfc6749#section-4.1.1'); |
|
212
|
|
|
} |
|
213
|
|
|
|
|
214
|
|
|
if (!$resourceOwner->isAuthenticated()) { |
|
215
|
|
|
throw new ResourceOwnerNotAuthenticatedException(); |
|
216
|
|
|
} |
|
217
|
|
|
|
|
218
|
|
|
if (is_null($authorizationDecision)) { |
|
219
|
|
|
throw new MissingResourceOwnerDecision(); |
|
220
|
|
|
} |
|
221
|
|
|
|
|
222
|
|
|
if (!$authorizationDecision) { |
|
223
|
|
|
return new ErrorResponse($redirectUri, 'access_denied', 'The resource owner server denied the request', |
|
224
|
|
|
'https://tools.ietf.org/html/rfc6749#section-4.1.1'); |
|
225
|
|
|
} |
|
226
|
|
|
|
|
227
|
|
|
/** |
|
228
|
|
|
* @var ResponseTypeInterface $responseType |
|
229
|
|
|
*/ |
|
230
|
|
|
$params = array(); |
|
231
|
|
|
foreach ($responseTypes as $responseType) { |
|
232
|
|
|
$params = array_merge($responseType->getResponse($client, $redirectUri)); |
|
233
|
|
|
} |
|
234
|
|
|
|
|
235
|
|
|
if ($request->getState()) { |
|
236
|
|
|
$params['state'] = $request->getState(); |
|
237
|
|
|
} |
|
238
|
|
|
|
|
239
|
|
|
if($isImplicitResponseType) { |
|
240
|
|
|
$redirectUri = $redirectUri->withFragment(http_build_query($params)); |
|
241
|
|
|
} |
|
242
|
|
|
else { |
|
243
|
|
|
foreach ($params as $key => $value) { |
|
244
|
|
|
$redirectUri = Uri::withQueryValue($redirectUri, $key, $value); |
|
245
|
|
|
} |
|
246
|
|
|
} |
|
247
|
|
|
|
|
248
|
|
|
return new Response(302, ['Location' => $redirectUri->__toString()]); |
|
249
|
|
|
|
|
250
|
|
|
// $code = AuthorizationCode::generate(); |
|
|
|
|
|
|
251
|
|
|
// $authorizationCode = new AuthorizationCode($code, $client->getIdentifier(), $redirectUri); |
|
252
|
|
|
// $this->server->getAuthorizationCodeStorage()->create($authorizationCode); |
|
253
|
|
|
// return new AuthorizationResponse($redirectUri, $authorizationCode, $request->getState()); |
|
254
|
|
|
} |
|
255
|
|
|
|
|
256
|
|
|
/** |
|
257
|
|
|
* @see https://tools.ietf.org/html/rfc6749#section-3.1.2.3 |
|
258
|
|
|
* |
|
259
|
|
|
* Dynamic Configuration |
|
260
|
|
|
* |
|
261
|
|
|
* If multiple redirection URIs have been registered, if only part of |
|
262
|
|
|
* the redirection URI has been registered, or if no redirection URI has |
|
263
|
|
|
* been registered, the client MUST include a redirection URI with the |
|
264
|
|
|
* authorization request using the "redirect_uri" request parameter. |
|
265
|
|
|
* |
|
266
|
|
|
* When a redirection URI is included in an authorization request, the |
|
267
|
|
|
* authorization server MUST compare and match the value received |
|
268
|
|
|
* against at least one of the registered redirection URIs (or URI |
|
269
|
|
|
* components) as defined in [RFC3986] Section 6, if any redirection |
|
270
|
|
|
* URIs were registered. If the client registration included the full |
|
271
|
|
|
* redirection URI, the authorization server MUST compare the two URIs |
|
272
|
|
|
* using simple string comparison as defined in [RFC3986] Section 6.2.1 |
|
273
|
|
|
* |
|
274
|
|
|
* @param RegisteredClient $client |
|
275
|
|
|
* @param null|string $redirectUri |
|
276
|
|
|
* @param bool $isImplicitGrant |
|
277
|
|
|
* @return Uri|null|string |
|
278
|
|
|
* @throws \Exception |
|
279
|
|
|
*/ |
|
280
|
|
|
private function checkClientRedirectUri(RegisteredClient $client, ?string $redirectUri, $isImplicitGrant = false) |
|
281
|
|
|
{ |
|
282
|
|
|
if (!$client instanceof RegisteredClient) { |
|
|
|
|
|
|
283
|
|
|
throw new \Exception('Only registered clients are supported'); |
|
284
|
|
|
} |
|
285
|
|
|
if (!$client instanceof PublicClient && !$client instanceof ClientPassword) { |
|
286
|
|
|
throw new \Exception('Only public and confidential clients are supported'); |
|
287
|
|
|
} |
|
288
|
|
|
|
|
289
|
|
|
if (!$redirectUri && $this->server->getConfig(Config::ENFORCE_REDIRECT_URI)) { |
|
290
|
|
|
throw new \Exception('Invalid URI'); |
|
291
|
|
|
} |
|
292
|
|
|
|
|
293
|
|
|
if (!$redirectUri) { |
|
294
|
|
|
if (count($client->getRedirectUris()) !== 1) { |
|
295
|
|
|
throw new \Exception('Invalid URI'); |
|
296
|
|
|
} |
|
297
|
|
|
$redirectUri = new Uri($client->getRedirectUris()[0]); |
|
298
|
|
|
} else { |
|
299
|
|
|
if (!$redirectUri) { |
|
300
|
|
|
throw new \Exception('Invalid URI'); |
|
301
|
|
|
} |
|
302
|
|
|
|
|
303
|
|
|
$redirectUri = new Uri($redirectUri); |
|
304
|
|
|
if ($redirectUri->getFragment()) { |
|
305
|
|
|
throw new \Exception('Invalid URI'); |
|
306
|
|
|
} |
|
307
|
|
|
|
|
308
|
|
|
if (empty($client->getRedirectUris())) { |
|
309
|
|
|
if ($client instanceof ClientPassword && !$isImplicitGrant) { |
|
310
|
|
|
return $redirectUri; |
|
311
|
|
|
} else { |
|
312
|
|
|
throw new \Exception('Invalid URI'); |
|
313
|
|
|
} |
|
314
|
|
|
} |
|
315
|
|
|
|
|
316
|
|
|
$redirectUriWithoutQuery = Uri::composeComponents( |
|
317
|
|
|
$redirectUri->getScheme(), $redirectUri->getAuthority(), $redirectUri->getPath(), '', ''); |
|
318
|
|
|
|
|
319
|
|
|
$match = false; |
|
320
|
|
|
foreach ($client->getRedirectUris() as $registeredUri) { |
|
321
|
|
|
$registeredUri = new Uri($registeredUri); |
|
322
|
|
|
if ($registeredUri->getQuery()) { |
|
323
|
|
|
if ($registeredUri->__toString() === $redirectUri->__toString()) { |
|
324
|
|
|
$match = true; |
|
325
|
|
|
break; |
|
326
|
|
|
} |
|
327
|
|
|
} else { |
|
328
|
|
|
if ($this->server->getConfig(Config::STRICT_REDIRECT_URI_COMPARISON)) { |
|
329
|
|
|
if ($registeredUri->__toString() === $redirectUri->__toString()) { |
|
330
|
|
|
$match = true; |
|
331
|
|
|
break; |
|
332
|
|
|
} |
|
333
|
|
|
} else if ($registeredUri->__toString() === $redirectUriWithoutQuery) { |
|
334
|
|
|
$match = true; |
|
335
|
|
|
break; |
|
336
|
|
|
} |
|
337
|
|
|
} |
|
338
|
|
|
} |
|
339
|
|
|
if (!$match) { |
|
340
|
|
|
throw new \Exception('Invalid URI'); |
|
341
|
|
|
} |
|
342
|
|
|
} |
|
343
|
|
|
return $redirectUri; |
|
344
|
|
|
} |
|
345
|
|
|
} |
The issue could also be caused by a filter entry in the build configuration. If the path has been excluded in your configuration, e.g.
excluded_paths: ["lib/*"], you can move it to the dependency path list as follows:For further information see https://scrutinizer-ci.com/docs/tools/php/php-scrutinizer/#list-dependency-paths