Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F445049
PhabricatorOAuthServer.php
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Size
7 KB
Referenced Files
None
Subscribers
None
PhabricatorOAuthServer.php
View Options
<?php
/*
* Copyright 2012 Facebook, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/**
* Implements core OAuth 2.0 Server logic.
*
* This class should be used behind business logic that parses input to
* determine pertinent @{class:PhabricatorUser} $user,
* @{class:PhabricatorOAuthServerClient} $client(s),
* @{class:PhabricatorOAuthServerAuthorizationCode} $code(s), and.
* @{class:PhabricatorOAuthServerAccessToken} $token(s).
*
* For an OAuth 2.0 server, there are two main steps:
*
* 1) Authorization - the user authorizes a given client to access the data
* the OAuth 2.0 server protects. Once this is achieved / if it has
* been achived already, the OAuth server sends the client an authorization
* code.
* 2) Access Token - the client should send the authorization code received in
* step 1 along with its id and secret to the OAuth server to receive an
* access token. This access token can later be used to access Phabricator
* data on behalf of the user.
*
* @task auth Authorizing @{class:PhabricatorOAuthServerClient}s and
* generating @{class:PhabricatorOAuthServerAuthorizationCode}s
* @task token Validating @{class:PhabricatorOAuthServerAuthorizationCode}s
* and generating @{class:PhabricatorOAuthServerAccessToken}s
* @task internal Internals
*
* @group oauthserver
*/
final
class
PhabricatorOAuthServer
{
const
AUTHORIZATION_CODE_TIMEOUT
=
300
;
const
ACCESS_TOKEN_TIMEOUT
=
3600
;
private
$user
;
private
$client
;
/**
* @group internal
*/
private
function
getUser
()
{
if
(!
$this
->
user
)
{
throw
new
Exception
(
'You must setUser before you can getUser!'
);
}
return
$this
->
user
;
}
public
function
setUser
(
PhabricatorUser
$user
)
{
$this
->
user
=
$user
;
return
$this
;
}
/**
* @group internal
*/
private
function
getClient
()
{
if
(!
$this
->
client
)
{
throw
new
Exception
(
'You must setClient before you can getClient!'
);
}
return
$this
->
client
;
}
public
function
setClient
(
PhabricatorOAuthServerClient
$client
)
{
$this
->
client
=
$client
;
return
$this
;
}
/**
* @task auth
*/
public
function
userHasAuthorizedClient
(
array
$scope
)
{
$authorization
=
id
(
new
PhabricatorOAuthClientAuthorization
())->
loadOneWhere
(
'userPHID = %s AND clientPHID = %s'
,
$this
->
getUser
()->
getPHID
(),
$this
->
getClient
()->
getPHID
());
if
(
$scope
)
{
$missing_scope
=
array_diff_key
(
$scope
,
$authorization
->
getScope
());
}
else
{
$missing_scope
=
false
;
}
if
(
$missing_scope
)
{
return
false
;
}
return
$authorization
;
}
/**
* @task auth
*/
public
function
authorizeClient
(
array
$scope
)
{
$authorization
=
new
PhabricatorOAuthClientAuthorization
();
$authorization
->
setUserPHID
(
$this
->
getUser
()->
getPHID
());
$authorization
->
setClientPHID
(
$this
->
getClient
()->
getPHID
());
$authorization
->
setScope
(
$scope
);
$authorization
->
save
();
return
$authorization
;
}
/**
* @task auth
*/
public
function
generateAuthorizationCode
(
PhutilURI
$redirect_uri
)
{
$code
=
Filesystem
::
readRandomCharacters
(
32
);
$client
=
$this
->
getClient
();
$authorization_code
=
new
PhabricatorOAuthServerAuthorizationCode
();
$authorization_code
->
setCode
(
$code
);
$authorization_code
->
setClientPHID
(
$client
->
getPHID
());
$authorization_code
->
setClientSecret
(
$client
->
getSecret
());
$authorization_code
->
setUserPHID
(
$this
->
getUser
()->
getPHID
());
$authorization_code
->
setRedirectURI
((
string
)
$redirect_uri
);
$authorization_code
->
save
();
return
$authorization_code
;
}
/**
* @task token
*/
public
function
generateAccessToken
()
{
$token
=
Filesystem
::
readRandomCharacters
(
32
);
$access_token
=
new
PhabricatorOAuthServerAccessToken
();
$access_token
->
setToken
(
$token
);
$access_token
->
setUserPHID
(
$this
->
getUser
()->
getPHID
());
$access_token
->
setClientPHID
(
$this
->
getClient
()->
getPHID
());
$access_token
->
save
();
return
$access_token
;
}
/**
* @task token
*/
public
function
validateAuthorizationCode
(
PhabricatorOAuthServerAuthorizationCode
$test_code
,
PhabricatorOAuthServerAuthorizationCode
$valid_code
)
{
// check that all the meta data matches
if
(
$test_code
->
getClientPHID
()
!=
$valid_code
->
getClientPHID
())
{
return
false
;
}
if
(
$test_code
->
getClientSecret
()
!=
$valid_code
->
getClientSecret
())
{
return
false
;
}
// check that the authorization code hasn't timed out
$created_time
=
$test_code
->
getDateCreated
();
$must_be_used_by
=
$created_time
+
self
::
AUTHORIZATION_CODE_TIMEOUT
;
return
(
time
()
<
$must_be_used_by
);
}
/**
* @task token
*/
public
function
validateAccessToken
(
PhabricatorOAuthServerAccessToken
$token
,
$required_scope
)
{
$created_time
=
$token
->
getDateCreated
();
$must_be_used_by
=
$created_time
+
self
::
ACCESS_TOKEN_TIMEOUT
;
$expired
=
time
()
>
$must_be_used_by
;
$authorization
=
id
(
new
PhabricatorOAuthClientAuthorization
())
->
loadOneWhere
(
'userPHID = %s AND clientPHID = %s'
,
$token
->
getUserPHID
(),
$token
->
getClientPHID
());
if
(!
$authorization
)
{
return
false
;
}
$token_scope
=
$authorization
->
getScope
();
if
(!
isset
(
$token_scope
[
$required_scope
]))
{
return
false
;
}
$valid
=
true
;
if
(
$expired
)
{
$valid
=
false
;
// check if the scope includes "offline_access", which makes the
// token valid despite being expired
if
(
isset
(
$token_scope
[
PhabricatorOAuthServerScope
::
SCOPE_OFFLINE_ACCESS
]
))
{
$valid
=
true
;
}
}
return
$valid
;
}
/**
* See http://tools.ietf.org/html/draft-ietf-oauth-v2-23#section-3.1.2
* for details on what makes a given redirect URI "valid".
*/
public
function
validateRedirectURI
(
PhutilURI
$uri
)
{
if
(
PhabricatorEnv
::
isValidRemoteWebResource
(
$uri
))
{
if
(
$uri
->
getFragment
())
{
return
false
;
}
if
(
$uri
->
getDomain
())
{
return
true
;
}
}
return
false
;
}
/**
* If there's a URI specified in an OAuth request, it must be validated in
* its own right. Further, it must have the same domain and (at least) the
* same query parameters as the primary URI.
*/
public
function
validateSecondaryRedirectURI
(
PhutilURI
$secondary_uri
,
PhutilURI
$primary_uri
)
{
$valid
=
$this
->
validateRedirectURI
(
$secondary_uri
);
if
(
$valid
)
{
$valid_domain
=
(
$secondary_uri
->
getDomain
()
==
$primary_uri
->
getDomain
());
$good_params
=
$primary_uri
->
getQueryParams
();
$test_params
=
$secondary_uri
->
getQueryParams
();
$missing_params
=
array_diff_key
(
$good_params
,
$test_params
);
$valid
=
$valid_domain
&&
empty
(
$missing_params
);
}
return
$valid
;
}
}
File Metadata
Details
Attached
Mime Type
text/x-php
Expires
Sun, May 4, 1:03 PM (2 d)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
65510
Default Alt Text
PhabricatorOAuthServer.php (7 KB)
Attached To
Mode
rP Phorge
Attached
Detach File
Event Timeline
Log In to Comment