Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F949453
PhabricatorOAuthServerTokenController.php
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Size
5 KB
Referenced Files
None
Subscribers
None
PhabricatorOAuthServerTokenController.php
View Options
<?php
final
class
PhabricatorOAuthServerTokenController
extends
PhabricatorAuthController
{
public
function
shouldRequireLogin
()
{
return
false
;
}
public
function
shouldAllowRestrictedParameter
(
$parameter_name
)
{
if
(
$parameter_name
==
'code'
)
{
return
true
;
}
return
parent
::
shouldAllowRestrictedParameter
(
$parameter_name
);
}
public
function
processRequest
()
{
$request
=
$this
->
getRequest
();
$grant_type
=
$request
->
getStr
(
'grant_type'
);
$code
=
$request
->
getStr
(
'code'
);
$redirect_uri
=
$request
->
getStr
(
'redirect_uri'
);
$client_phid
=
$request
->
getStr
(
'client_id'
);
$client_secret
=
$request
->
getStr
(
'client_secret'
);
$response
=
new
PhabricatorOAuthResponse
();
$server
=
new
PhabricatorOAuthServer
();
if
(
$grant_type
!=
'authorization_code'
)
{
$response
->
setError
(
'unsupported_grant_type'
);
$response
->
setErrorDescription
(
pht
(
'Only %s %s is supported.'
,
'grant_type'
,
'authorization_code'
));
return
$response
;
}
if
(!
$code
)
{
$response
->
setError
(
'invalid_request'
);
$response
->
setErrorDescription
(
pht
(
'Required parameter code missing.'
));
return
$response
;
}
if
(!
$client_phid
)
{
$response
->
setError
(
'invalid_request'
);
$response
->
setErrorDescription
(
pht
(
'Required parameter %s missing.'
,
'client_id'
));
return
$response
;
}
if
(!
$client_secret
)
{
$response
->
setError
(
'invalid_request'
);
$response
->
setErrorDescription
(
pht
(
'Required parameter %s missing.'
,
'client_secret'
));
return
$response
;
}
// one giant try / catch around all the exciting database stuff so we
// can return a 'server_error' response if something goes wrong!
try
{
$auth_code
=
id
(
new
PhabricatorOAuthServerAuthorizationCode
())
->
loadOneWhere
(
'code = %s'
,
$code
);
if
(!
$auth_code
)
{
$response
->
setError
(
'invalid_grant'
);
$response
->
setErrorDescription
(
pht
(
'Authorization code %d not found.'
,
$code
));
return
$response
;
}
// if we have an auth code redirect URI, there must be a redirect_uri
// in the request and it must match the auth code redirect uri *exactly*
$auth_code_redirect_uri
=
$auth_code
->
getRedirectURI
();
if
(
$auth_code_redirect_uri
)
{
$auth_code_redirect_uri
=
new
PhutilURI
(
$auth_code_redirect_uri
);
$redirect_uri
=
new
PhutilURI
(
$redirect_uri
);
if
(!
$redirect_uri
->
getDomain
()
||
$redirect_uri
!=
$auth_code_redirect_uri
)
{
$response
->
setError
(
'invalid_grant'
);
$response
->
setErrorDescription
(
pht
(
'Redirect URI in request must exactly match redirect URI '
.
'from authorization code.'
));
return
$response
;
}
}
else
if
(
$redirect_uri
)
{
$response
->
setError
(
'invalid_grant'
);
$response
->
setErrorDescription
(
pht
(
'Redirect URI in request and no redirect URI in authorization '
.
'code. The two must exactly match.'
));
return
$response
;
}
$client
=
id
(
new
PhabricatorOAuthServerClient
())
->
loadOneWhere
(
'phid = %s'
,
$client_phid
);
if
(!
$client
)
{
$response
->
setError
(
'invalid_client'
);
$response
->
setErrorDescription
(
pht
(
'Client with %s %d not found.'
,
'client_id'
,
$client_phid
));
return
$response
;
}
$server
->
setClient
(
$client
);
$user_phid
=
$auth_code
->
getUserPHID
();
$user
=
id
(
new
PhabricatorUser
())
->
loadOneWhere
(
'phid = %s'
,
$user_phid
);
if
(!
$user
)
{
$response
->
setError
(
'invalid_grant'
);
$response
->
setErrorDescription
(
pht
(
'User with PHID %d not found.'
,
$user_phid
));
return
$response
;
}
$server
->
setUser
(
$user
);
$test_code
=
new
PhabricatorOAuthServerAuthorizationCode
();
$test_code
->
setClientSecret
(
$client_secret
);
$test_code
->
setClientPHID
(
$client_phid
);
$is_good_code
=
$server
->
validateAuthorizationCode
(
$auth_code
,
$test_code
);
if
(!
$is_good_code
)
{
$response
->
setError
(
'invalid_grant'
);
$response
->
setErrorDescription
(
pht
(
'Invalid authorization code %d.'
,
$code
));
return
$response
;
}
$unguarded
=
AphrontWriteGuard
::
beginScopedUnguardedWrites
();
$access_token
=
$server
->
generateAccessToken
();
$auth_code
->
delete
();
unset
(
$unguarded
);
$result
=
array
(
'access_token'
=>
$access_token
->
getToken
(),
'token_type'
=>
'Bearer'
,
'expires_in'
=>
PhabricatorOAuthServer
::
ACCESS_TOKEN_TIMEOUT
,
);
return
$response
->
setContent
(
$result
);
}
catch
(
Exception
$e
)
{
$response
->
setError
(
'server_error'
);
$response
->
setErrorDescription
(
pht
(
'The authorization server encountered an unexpected condition '
.
'which prevented it from fulfilling the request.'
));
return
$response
;
}
}
}
File Metadata
Details
Attached
Mime Type
text/x-php
Expires
Tue, Jun 17, 1:30 PM (2 d)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
222040
Default Alt Text
PhabricatorOAuthServerTokenController.php (5 KB)
Attached To
Mode
rP Phorge
Attached
Detach File
Event Timeline
Log In to Comment