
* Added user registration process * Added user password reset process * Added user email verification proccess * update token id to return custom claims * update access token instrospection to return user custom claims * Migrated to Doctrine ORM ( from eloquent) * Added User CRUD * Added User Groups CRUD * Refactoring * Bug Fixing * added user registration oauth2 endpoint POST /api/v1/user-registration-requests payload * first_name ( required ) * last_name ( required) * email ( required ) * country ( optional ) scope user-registration ( private scope) Change-Id: I36e8cd4473ccad734565051442e2c6033b204f27
263 lines
8.1 KiB
PHP
263 lines
8.1 KiB
PHP
<?php namespace OAuth2\Requests;
|
|
/**
|
|
* Copyright 2015 OpenStack Foundation
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
**/
|
|
|
|
use OAuth2\OAuth2Protocol;
|
|
use OAuth2\ResourceServer\IUserService;
|
|
|
|
/**
|
|
* Class OAuth2AuthenticationRequest
|
|
* @package OAuth2\Requests
|
|
* @see http://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
|
|
* An Authentication Request is an OAuth 2.0 Authorization Request that requests that the End-User be authenticated by
|
|
* the Authorization Server.
|
|
*/
|
|
class OAuth2AuthenticationRequest extends OAuth2AuthorizationRequest
|
|
{
|
|
|
|
/**
|
|
* @var array
|
|
*/
|
|
public static $optional_params = array
|
|
(
|
|
OAuth2Protocol::OAuth2Protocol_Nonce,
|
|
OAuth2Protocol::OAuth2Protocol_Display,
|
|
OAuth2Protocol::OAuth2Protocol_Prompt,
|
|
OAuth2Protocol::OAuth2Protocol_MaxAge,
|
|
OAuth2Protocol::OAuth2Protocol_UILocales,
|
|
OAuth2Protocol::OAuth2Protocol_IDTokenHint,
|
|
OAuth2Protocol::OAuth2Protocol_LoginHint,
|
|
OAuth2Protocol::OAuth2Protocol_ACRValues,
|
|
);
|
|
|
|
/**
|
|
* @return null|string
|
|
*/
|
|
public function getNonce()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_Nonce);
|
|
}
|
|
|
|
/**
|
|
* @param bool|false $raw
|
|
* @return array|string|null
|
|
*/
|
|
public function getPrompt($raw = false)
|
|
{
|
|
$prompt = $this->getParam(OAuth2Protocol::OAuth2Protocol_Prompt);
|
|
if($raw) return $prompt;
|
|
if(!empty($prompt))
|
|
return explode(' ', $prompt);
|
|
return [];
|
|
}
|
|
|
|
/**
|
|
* @return null|int
|
|
*/
|
|
public function getMaxAge()
|
|
{
|
|
$value = $this->getParam(OAuth2Protocol::OAuth2Protocol_MaxAge);
|
|
if(!is_null($value))
|
|
$value = intval($value);
|
|
return $value;
|
|
}
|
|
|
|
/**
|
|
* @return null|string
|
|
*/
|
|
public function getUILocales()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_UILocales);
|
|
}
|
|
|
|
/**
|
|
* @return null|string
|
|
*/
|
|
public function getIdTokenHint()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_IDTokenHint);
|
|
}
|
|
|
|
/**
|
|
* @return null|string
|
|
*/
|
|
public function getLoginHint()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_LoginHint);
|
|
}
|
|
|
|
/**
|
|
* @return null|string
|
|
*/
|
|
public function getACRValues()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_ACRValues);
|
|
}
|
|
|
|
/**
|
|
* @return bool
|
|
*/
|
|
public function offlineAccessRequested()
|
|
{
|
|
return str_contains($this->getScope(), OAuth2Protocol::OfflineAccess_Scope);
|
|
}
|
|
|
|
/**
|
|
* @param OAuth2AuthorizationRequest $auth_request
|
|
*/
|
|
public function __construct(OAuth2AuthorizationRequest $auth_request)
|
|
{
|
|
parent::__construct($auth_request->getMessage());
|
|
}
|
|
|
|
/**
|
|
* @see http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html#ResponseModes
|
|
* The Response Mode request parameter response_mode informs the Authorization Server of the mechanism to be used
|
|
* for returning Authorization Response parameters from the Authorization Endpoint
|
|
*/
|
|
public function getResponseMode()
|
|
{
|
|
return $this->getParam(OAuth2Protocol::OAuth2Protocol_ResponseMode);
|
|
}
|
|
|
|
/**
|
|
* Validates current request
|
|
* @return bool
|
|
*/
|
|
public function isValid()
|
|
{
|
|
$res = parent::isValid();
|
|
|
|
if($res)
|
|
{
|
|
// Reject requests without nonce unless using the code flow
|
|
$nonce = $this->getNonce();
|
|
if(empty($nonce) && !OAuth2Protocol::responseTypeBelongsToFlow($this->getResponseType(false), OAuth2Protocol::OAuth2Protocol_GrantType_AuthCode))
|
|
{
|
|
$this->last_validation_error = 'nonce not set';
|
|
return false;
|
|
}
|
|
|
|
$current_scope = trim($this->getScope());
|
|
|
|
if(!str_contains($current_scope, OAuth2Protocol::OpenIdConnect_Scope))
|
|
{
|
|
$this->last_validation_error = 'missing openid scope';
|
|
return false;
|
|
}
|
|
|
|
if($current_scope === OAuth2Protocol::OpenIdConnect_Scope)
|
|
{
|
|
// add as default scope to current request
|
|
$this->setParam(OAuth2Protocol::OAuth2Protocol_Scope, sprintf('%s %s', $current_scope, IUserService::UserProfileScope_Profile));
|
|
}
|
|
|
|
$display = $this->getDisplay();
|
|
|
|
if(!in_array($display, OAuth2Protocol::$valid_display_values))
|
|
{
|
|
$this->last_validation_error = 'not valid display value';
|
|
return false;
|
|
}
|
|
|
|
$prompt = $this->getPrompt();
|
|
|
|
if(!empty($prompt) && is_array($prompt))
|
|
{
|
|
// if this parameter contains none with any other value, an error is returned.
|
|
if(in_array(OAuth2Protocol::OAuth2Protocol_Prompt_None, $prompt) && count($prompt) > 1)
|
|
{
|
|
$this->last_validation_error = 'not valid prompt';
|
|
return false;
|
|
}
|
|
|
|
foreach($prompt as $p)
|
|
{
|
|
if(!in_array($p, OAuth2Protocol::$valid_prompt_values))
|
|
{
|
|
$this->last_validation_error = 'not valid prompt';
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
$response_mode = $this->getResponseMode();
|
|
|
|
if(!empty($response_mode))
|
|
{
|
|
if(!in_array($response_mode, OAuth2Protocol::$valid_response_modes))
|
|
{
|
|
$this->last_validation_error = 'invalid response_mode';
|
|
return false;
|
|
}
|
|
|
|
$default_response_mode = OAuth2Protocol::getDefaultResponseMode($this->getResponseType(false));
|
|
|
|
if($default_response_mode === $response_mode)
|
|
{
|
|
$this->last_validation_error = 'invalid response_mode';
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// http://openid.net/specs/openid-connect-core-1_0.html#OfflineAccess
|
|
// MUST ensure that the prompt parameter contains consent unless other conditions for processing the request
|
|
// permitting offline access to the requested resources are in place
|
|
if($this->offlineAccessRequested() && empty($prompt))
|
|
{
|
|
$this->last_validation_error = 'invalid offline access';
|
|
return false;
|
|
}
|
|
|
|
if($this->offlineAccessRequested() && !in_array(OAuth2Protocol::OAuth2Protocol_Prompt_Consent, $prompt))
|
|
{
|
|
$this->last_validation_error = 'invalid offline access';
|
|
return false;
|
|
}
|
|
|
|
// if has requested offline access
|
|
if($this->offlineAccessRequested() && $this->getAccessType() === OAuth2Protocol::OAuth2Protocol_AccessType_Offline)
|
|
{
|
|
$this->last_validation_error = 'invalid param access_type=offline (OAUTH2.0)';
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return $res;
|
|
}
|
|
|
|
/**
|
|
* @param string $param_name
|
|
* @return bool
|
|
*/
|
|
public function isProcessedParam($param_name){
|
|
$res = explode(' ', $this->getParam('processed_params'));
|
|
return in_array($param_name, $res);
|
|
}
|
|
|
|
/**
|
|
* @param string $param_name
|
|
* @return $this
|
|
*/
|
|
public function markParamAsProcessed($param_name)
|
|
{
|
|
$res = $this->getParam('processed_params');
|
|
if(!empty($res))
|
|
{
|
|
$res = $res .' ';
|
|
}
|
|
$res = $res .$param_name;
|
|
$this->setParam('processed_params', $res);
|
|
return $this;
|
|
}
|
|
} |