openstackid/app/libs/OAuth2/Requests/OAuth2AuthenticationRequest.php
smarcet b52c932636 IDP - User Management
* Added user registration process
* Added user password reset process
* Added user email verification proccess
* update token id to return custom claims
* update access token instrospection to return user custom claims
* Migrated to Doctrine ORM ( from eloquent)
* Added User CRUD
* Added User Groups CRUD
* Refactoring
* Bug Fixing
* added user registration oauth2 endpoint
  POST /api/v1/user-registration-requests

payload

* first_name ( required )
* last_name ( required)
* email ( required )
* country ( optional )

scope

user-registration ( private scope)

Change-Id: I36e8cd4473ccad734565051442e2c6033b204f27
2020-01-23 03:06:05 -03:00

263 lines
8.1 KiB
PHP

<?php namespace OAuth2\Requests;
/**
* Copyright 2015 OpenStack Foundation
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
**/
use OAuth2\OAuth2Protocol;
use OAuth2\ResourceServer\IUserService;
/**
* Class OAuth2AuthenticationRequest
* @package OAuth2\Requests
* @see http://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
* An Authentication Request is an OAuth 2.0 Authorization Request that requests that the End-User be authenticated by
* the Authorization Server.
*/
class OAuth2AuthenticationRequest extends OAuth2AuthorizationRequest
{
/**
* @var array
*/
public static $optional_params = array
(
OAuth2Protocol::OAuth2Protocol_Nonce,
OAuth2Protocol::OAuth2Protocol_Display,
OAuth2Protocol::OAuth2Protocol_Prompt,
OAuth2Protocol::OAuth2Protocol_MaxAge,
OAuth2Protocol::OAuth2Protocol_UILocales,
OAuth2Protocol::OAuth2Protocol_IDTokenHint,
OAuth2Protocol::OAuth2Protocol_LoginHint,
OAuth2Protocol::OAuth2Protocol_ACRValues,
);
/**
* @return null|string
*/
public function getNonce()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_Nonce);
}
/**
* @param bool|false $raw
* @return array|string|null
*/
public function getPrompt($raw = false)
{
$prompt = $this->getParam(OAuth2Protocol::OAuth2Protocol_Prompt);
if($raw) return $prompt;
if(!empty($prompt))
return explode(' ', $prompt);
return [];
}
/**
* @return null|int
*/
public function getMaxAge()
{
$value = $this->getParam(OAuth2Protocol::OAuth2Protocol_MaxAge);
if(!is_null($value))
$value = intval($value);
return $value;
}
/**
* @return null|string
*/
public function getUILocales()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_UILocales);
}
/**
* @return null|string
*/
public function getIdTokenHint()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_IDTokenHint);
}
/**
* @return null|string
*/
public function getLoginHint()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_LoginHint);
}
/**
* @return null|string
*/
public function getACRValues()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_ACRValues);
}
/**
* @return bool
*/
public function offlineAccessRequested()
{
return str_contains($this->getScope(), OAuth2Protocol::OfflineAccess_Scope);
}
/**
* @param OAuth2AuthorizationRequest $auth_request
*/
public function __construct(OAuth2AuthorizationRequest $auth_request)
{
parent::__construct($auth_request->getMessage());
}
/**
* @see http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html#ResponseModes
* The Response Mode request parameter response_mode informs the Authorization Server of the mechanism to be used
* for returning Authorization Response parameters from the Authorization Endpoint
*/
public function getResponseMode()
{
return $this->getParam(OAuth2Protocol::OAuth2Protocol_ResponseMode);
}
/**
* Validates current request
* @return bool
*/
public function isValid()
{
$res = parent::isValid();
if($res)
{
// Reject requests without nonce unless using the code flow
$nonce = $this->getNonce();
if(empty($nonce) && !OAuth2Protocol::responseTypeBelongsToFlow($this->getResponseType(false), OAuth2Protocol::OAuth2Protocol_GrantType_AuthCode))
{
$this->last_validation_error = 'nonce not set';
return false;
}
$current_scope = trim($this->getScope());
if(!str_contains($current_scope, OAuth2Protocol::OpenIdConnect_Scope))
{
$this->last_validation_error = 'missing openid scope';
return false;
}
if($current_scope === OAuth2Protocol::OpenIdConnect_Scope)
{
// add as default scope to current request
$this->setParam(OAuth2Protocol::OAuth2Protocol_Scope, sprintf('%s %s', $current_scope, IUserService::UserProfileScope_Profile));
}
$display = $this->getDisplay();
if(!in_array($display, OAuth2Protocol::$valid_display_values))
{
$this->last_validation_error = 'not valid display value';
return false;
}
$prompt = $this->getPrompt();
if(!empty($prompt) && is_array($prompt))
{
// if this parameter contains none with any other value, an error is returned.
if(in_array(OAuth2Protocol::OAuth2Protocol_Prompt_None, $prompt) && count($prompt) > 1)
{
$this->last_validation_error = 'not valid prompt';
return false;
}
foreach($prompt as $p)
{
if(!in_array($p, OAuth2Protocol::$valid_prompt_values))
{
$this->last_validation_error = 'not valid prompt';
return false;
}
}
}
$response_mode = $this->getResponseMode();
if(!empty($response_mode))
{
if(!in_array($response_mode, OAuth2Protocol::$valid_response_modes))
{
$this->last_validation_error = 'invalid response_mode';
return false;
}
$default_response_mode = OAuth2Protocol::getDefaultResponseMode($this->getResponseType(false));
if($default_response_mode === $response_mode)
{
$this->last_validation_error = 'invalid response_mode';
return false;
}
}
// http://openid.net/specs/openid-connect-core-1_0.html#OfflineAccess
// MUST ensure that the prompt parameter contains consent unless other conditions for processing the request
// permitting offline access to the requested resources are in place
if($this->offlineAccessRequested() && empty($prompt))
{
$this->last_validation_error = 'invalid offline access';
return false;
}
if($this->offlineAccessRequested() && !in_array(OAuth2Protocol::OAuth2Protocol_Prompt_Consent, $prompt))
{
$this->last_validation_error = 'invalid offline access';
return false;
}
// if has requested offline access
if($this->offlineAccessRequested() && $this->getAccessType() === OAuth2Protocol::OAuth2Protocol_AccessType_Offline)
{
$this->last_validation_error = 'invalid param access_type=offline (OAUTH2.0)';
return false;
}
}
return $res;
}
/**
* @param string $param_name
* @return bool
*/
public function isProcessedParam($param_name){
$res = explode(' ', $this->getParam('processed_params'));
return in_array($param_name, $res);
}
/**
* @param string $param_name
* @return $this
*/
public function markParamAsProcessed($param_name)
{
$res = $this->getParam('processed_params');
if(!empty($res))
{
$res = $res .' ';
}
$res = $res .$param_name;
$this->setParam('processed_params', $res);
return $this;
}
}