|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
declare(strict_types=1); |
|
4
|
|
|
|
|
5
|
|
|
namespace TMV\OpenIdClient\RequestObject; |
|
6
|
|
|
|
|
7
|
|
|
use function array_filter; |
|
8
|
|
|
use function array_merge; |
|
9
|
|
|
use function implode; |
|
10
|
|
|
use Jose\Component\Core\AlgorithmManager; |
|
11
|
|
|
use Jose\Component\Encryption\Compression\CompressionMethodManager; |
|
12
|
|
|
use Jose\Component\Encryption\Compression\Deflate; |
|
13
|
|
|
use Jose\Component\Encryption\JWEBuilder; |
|
14
|
|
|
use Jose\Component\Encryption\Serializer\CompactSerializer as EncryptionCompactSerializer; |
|
15
|
|
|
use Jose\Component\Encryption\Serializer\JWESerializer; |
|
16
|
|
|
use Jose\Component\Signature\Algorithm\None; |
|
17
|
|
|
use Jose\Component\Signature\Algorithm\RS256; |
|
18
|
|
|
use Jose\Component\Signature\JWSBuilder; |
|
19
|
|
|
use Jose\Component\Signature\Serializer\CompactSerializer as SignatureCompactSerializer; |
|
20
|
|
|
use Jose\Component\Signature\Serializer\JWSSerializer; |
|
21
|
|
|
use function json_encode; |
|
22
|
|
|
use function preg_match; |
|
23
|
|
|
use function random_bytes; |
|
24
|
|
|
use function strpos; |
|
25
|
|
|
use function time; |
|
26
|
|
|
use function TMV\OpenIdClient\base64url_encode; |
|
27
|
|
|
use TMV\OpenIdClient\Client\ClientInterface; |
|
28
|
|
|
use TMV\OpenIdClient\Exception\RuntimeException; |
|
29
|
|
|
use function TMV\OpenIdClient\jose_secret_key; |
|
30
|
|
|
|
|
31
|
|
|
class RequestObjectFactory |
|
32
|
|
|
{ |
|
33
|
|
|
/** @var AlgorithmManager */ |
|
34
|
|
|
private $algorithmManager; |
|
35
|
|
|
|
|
36
|
|
|
/** @var JWSBuilder */ |
|
37
|
|
|
private $jwsBuilder; |
|
38
|
|
|
|
|
39
|
|
|
/** @var JWEBuilder */ |
|
40
|
|
|
private $jweBuilder; |
|
41
|
|
|
|
|
42
|
|
|
/** @var JWSSerializer */ |
|
43
|
|
|
private $signatureSerializer; |
|
44
|
|
|
|
|
45
|
|
|
/** @var JWESerializer */ |
|
46
|
|
|
private $encryptionSerializer; |
|
47
|
|
|
|
|
48
|
6 |
|
public function __construct( |
|
49
|
|
|
?AlgorithmManager $algorithmManager = null, |
|
50
|
|
|
?JWSBuilder $jwsBuilder = null, |
|
51
|
|
|
?JWEBuilder $jweBuilder = null, |
|
52
|
|
|
?JWSSerializer $signatureSerializer = null, |
|
53
|
|
|
?JWESerializer $encryptionSerializer = null |
|
54
|
|
|
) { |
|
55
|
6 |
|
$this->algorithmManager = $algorithmManager ?: new AlgorithmManager([new None(), new RS256()]); |
|
56
|
6 |
|
$this->jwsBuilder = $jwsBuilder ?: new JWSBuilder($this->algorithmManager); |
|
57
|
6 |
|
$this->jweBuilder = $jweBuilder ?: new JWEBuilder( |
|
58
|
1 |
|
$this->algorithmManager, |
|
59
|
1 |
|
$this->algorithmManager, |
|
60
|
1 |
|
new CompressionMethodManager([new Deflate()]) |
|
61
|
|
|
); |
|
62
|
6 |
|
$this->signatureSerializer = $signatureSerializer ?: new SignatureCompactSerializer(); |
|
63
|
6 |
|
$this->encryptionSerializer = $encryptionSerializer ?: new EncryptionCompactSerializer(); |
|
64
|
6 |
|
} |
|
65
|
|
|
|
|
66
|
5 |
|
public function create(ClientInterface $client, array $params = []): string |
|
67
|
|
|
{ |
|
68
|
5 |
|
$payload = $this->createPayload($client, $params); |
|
69
|
5 |
|
$signedToken = $this->createSignedToken($client, $payload); |
|
70
|
|
|
|
|
71
|
5 |
|
return $this->createEncryptedToken($client, $signedToken); |
|
72
|
|
|
} |
|
73
|
|
|
|
|
74
|
5 |
|
private function createPayload(ClientInterface $client, array $params = []): string |
|
75
|
|
|
{ |
|
76
|
5 |
|
$metadata = $client->getMetadata(); |
|
77
|
5 |
|
$issuer = $client->getIssuer(); |
|
78
|
|
|
|
|
79
|
5 |
|
$payload = json_encode(array_merge($params, [ |
|
80
|
5 |
|
'iss' => $metadata->getClientId(), |
|
81
|
5 |
|
'aud' => $issuer->getMetadata()->getIssuer(), |
|
82
|
5 |
|
'client_id' => $metadata->getClientId(), |
|
83
|
5 |
|
'jti' => base64url_encode(random_bytes(32)), |
|
84
|
5 |
|
'iat' => time(), |
|
85
|
5 |
|
'exp' => time() + 300, |
|
86
|
|
|
])); |
|
87
|
|
|
|
|
88
|
5 |
|
if (false === $payload) { |
|
89
|
|
|
throw new RuntimeException('Unable to encode payload'); |
|
90
|
|
|
} |
|
91
|
|
|
|
|
92
|
5 |
|
return $payload; |
|
93
|
|
|
} |
|
94
|
|
|
|
|
95
|
5 |
|
private function createSignedToken(ClientInterface $client, string $payload): string |
|
96
|
|
|
{ |
|
97
|
5 |
|
$metadata = $client->getMetadata(); |
|
98
|
|
|
|
|
99
|
|
|
/** @var string $alg */ |
|
100
|
5 |
|
$alg = $metadata->get('request_object_signing_alg') ?: 'none'; |
|
101
|
|
|
|
|
102
|
5 |
|
if ('none' === $alg) { |
|
103
|
3 |
|
return implode('.', [ |
|
104
|
3 |
|
base64url_encode((string) json_encode(['alg' => $alg])), |
|
105
|
3 |
|
base64url_encode($payload), |
|
106
|
3 |
|
'', |
|
107
|
|
|
]); |
|
108
|
|
|
} |
|
109
|
|
|
|
|
110
|
2 |
|
if (0 === strpos($alg, 'HS')) { |
|
111
|
1 |
|
$jwk = jose_secret_key($metadata->getClientSecret() ?: ''); |
|
112
|
|
|
} else { |
|
113
|
1 |
|
$jwk = $client->getJwks()->selectKey('sig', $this->algorithmManager->get($alg)); |
|
114
|
|
|
} |
|
115
|
|
|
|
|
116
|
2 |
|
if (null === $jwk) { |
|
117
|
|
|
throw new RuntimeException('No key to sign with alg ' . $alg); |
|
118
|
|
|
} |
|
119
|
|
|
|
|
120
|
2 |
|
$ktyIsOct = $jwk->has('kty') && $jwk->get('kty') === 'oct'; |
|
121
|
|
|
|
|
122
|
2 |
|
$header = array_filter([ |
|
123
|
2 |
|
'alg' => $alg, |
|
124
|
2 |
|
'typ' => 'JWT', |
|
125
|
2 |
|
'kid' => ! $ktyIsOct && $jwk->has('kid') ? $jwk->get('kid') : null, |
|
126
|
|
|
]); |
|
127
|
|
|
|
|
128
|
2 |
|
$jws = $this->jwsBuilder->create() |
|
129
|
2 |
|
->withPayload($payload) |
|
130
|
2 |
|
->addSignature($jwk, $header) |
|
131
|
2 |
|
->build(); |
|
132
|
|
|
|
|
133
|
2 |
|
return $this->signatureSerializer->serialize($jws, 0); |
|
134
|
|
|
} |
|
135
|
|
|
|
|
136
|
5 |
|
private function createEncryptedToken(ClientInterface $client, string $payload): string |
|
137
|
|
|
{ |
|
138
|
5 |
|
$metadata = $client->getMetadata(); |
|
139
|
|
|
|
|
140
|
|
|
/** @var null|string $alg */ |
|
141
|
5 |
|
$alg = $metadata->get('request_object_encryption_alg'); |
|
142
|
|
|
|
|
143
|
5 |
|
if (null === $alg) { |
|
144
|
3 |
|
return $payload; |
|
145
|
|
|
} |
|
146
|
|
|
|
|
147
|
|
|
/** @var null|string $enc */ |
|
148
|
2 |
|
$enc = $metadata->get('request_object_encryption_enc'); |
|
149
|
|
|
|
|
150
|
2 |
|
if ((bool) preg_match('/^(RSA|ECDH)/', $alg)) { |
|
151
|
1 |
|
$jwk = $client->getIssuer() |
|
152
|
1 |
|
->getJwks() |
|
153
|
1 |
|
->selectKey('enc', $this->algorithmManager->get($alg)); |
|
154
|
|
|
} else { |
|
155
|
1 |
|
$jwk = jose_secret_key( |
|
156
|
1 |
|
$metadata->getClientSecret() ?: '', |
|
157
|
1 |
|
'dir' === $alg ? $enc : $alg |
|
158
|
|
|
); |
|
159
|
|
|
} |
|
160
|
|
|
|
|
161
|
2 |
|
if (null === $jwk) { |
|
162
|
|
|
throw new RuntimeException('No key to sign with alg ' . $alg); |
|
163
|
|
|
} |
|
164
|
|
|
|
|
165
|
2 |
|
$ktyIsOct = $jwk->has('kty') && $jwk->get('kty') === 'oct'; |
|
166
|
|
|
|
|
167
|
2 |
|
$header = array_filter([ |
|
168
|
2 |
|
'alg' => $alg, |
|
169
|
2 |
|
'enc' => $enc, |
|
170
|
2 |
|
'cty' => 'JWT', |
|
171
|
2 |
|
'kid' => ! $ktyIsOct && $jwk->has('kid') ? $jwk->get('kid') : null, |
|
172
|
|
|
]); |
|
173
|
|
|
|
|
174
|
2 |
|
$jwe = $this->jweBuilder->create() |
|
175
|
2 |
|
->withPayload($payload) |
|
176
|
2 |
|
->withSharedProtectedHeader($header) |
|
177
|
2 |
|
->addRecipient($jwk) |
|
178
|
2 |
|
->build(); |
|
179
|
|
|
|
|
180
|
2 |
|
return $this->encryptionSerializer->serialize($jwe, 0); |
|
181
|
|
|
} |
|
182
|
|
|
} |
|
183
|
|
|
|