1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267
|
<?php
namespace SimpleSAML\Module\oauth;
require_once(dirname(dirname(__FILE__)).'/libextinc/OAuth.php');
/**
* OAuth Store
*
* Updated version, works with consumer-callbacks, certificates and 1.0-RevA protocol
* behaviour (requestToken-callbacks and verifiers)
*
* @author Andreas Åkre Solberg, <andreas.solberg@uninett.no>, UNINETT AS.
* @author Mark Dobrinic, <mdobrinic@cozmanova.com>, Cozmanova bv
* @package SimpleSAMLphp
*/
class OAuthStore extends \OAuthDataStore
{
/** @var \SimpleSAML\Module\core\Storage\SQLPermanentStorage */
private $store;
/** @var \SimpleSAML\Configuration */
private $config;
/** @var string */
private $defaultversion = '1.0';
/** @var array */
protected $_store_tables = [
'consumers' => 'consumer = array with consumer attributes',
'nonce' => 'nonce+consumer_key = -boolean-',
'requesttorequest' => 'requestToken.key = array(version,callback,consumerKey,)',
'authorized' => 'requestToken.key, verifier = array(authenticated-user-attributes)',
'access' => 'accessToken.key+consumerKey = accesstoken',
'request' => 'requestToken.key+consumerKey = requesttoken',
];
public function __construct()
{
$this->store = new \SimpleSAML\Module\core\Storage\SQLPermanentStorage('oauth');
$this->config = \SimpleSAML\Configuration::getOptionalConfig('module_oauth.php');
}
/**
* Attach the data to the token, and establish the Callback URL and verifier
* @param string $requestTokenKey RequestToken that was authorized
* @param string $data Data that is authorized and to be attached to the requestToken
* @return string[] empty verifier for 1.0-response
*/
public function authorize($requestTokenKey, $data)
{
$url = null;
// See whether to remember values from the original requestToken request:
$request_attributes = $this->store->get('requesttorequest', $requestTokenKey, '');
// must be there
if ($request_attributes['value']) {
// establish callback to use
if ($request_attributes['value']['callback']) {
$url = $request_attributes['value']['callback'];
}
}
// Is there a callback registered? This is leading, even over a supplied oauth_callback-parameter
$oConsumer = $this->lookup_consumer($request_attributes['value']['consumerKey']);
if ($oConsumer && ($oConsumer->callback_url)) {
$url = $oConsumer->callback_url;
}
$verifier = \SimpleSAML\Utils\Random::generateID();
$url = \SimpleSAML\Utils\HTTP::addURLParameters($url, ["oauth_verifier"=>$verifier]);
$this->store->set('authorized', $requestTokenKey, $verifier, $data, $this->config->getValue('requestTokenDuration', 1800)); //60*30=1800
return [$url, $verifier];
}
/**
* Perform lookup whether a given token exists in the list of authorized tokens; if a verifier is
* passed as well, the verifier *must* match the verifier that was registered with the token<br/>
* Note that an accessToken should never be stored with a verifier
* @param string $requestToken
* @param string $verifier
* @return bool
*/
public function isAuthorized($requestToken, $verifier = '')
{
\SimpleSAML\Logger::info('OAuth isAuthorized('.$requestToken.')');
return $this->store->exists('authorized', $requestToken, $verifier);
}
/**
* @param string $token
* @param string $verifier
* @return mixed
*/
public function getAuthorizedData($token, $verifier = '')
{
\SimpleSAML\Logger::info('OAuth getAuthorizedData('.$token.')');
$data = $this->store->get('authorized', $token, $verifier);
return $data['value'];
}
/**
* @param string $requestToken
* @param string $verifier
* @param string $accessTokenKey
* @return void
*/
public function moveAuthorizedData($requestToken, $verifier, $accessTokenKey)
{
\SimpleSAML\Logger::info('OAuth moveAuthorizedData('.$requestToken.', '.$accessTokenKey.')');
// Retrieve authorizedData from authorized.requestToken (with provider verifier)
$authorizedData = $this->getAuthorizedData($requestToken, $verifier);
// Remove the requesttoken+verifier from authorized store
$this->store->remove('authorized', $requestToken, $verifier);
// Add accesstoken with authorizedData to authorized store (with empty verifier)
// accessTokenKey+consumer => accessToken is already registered in 'access'-table
$this->store->set('authorized', $accessTokenKey, '', $authorizedData, $this->config->getValue('accessTokenDuration', 86400)); //60*60*24=86400
}
/**
* @param string $consumer_key
* @return \OAuthConsumer|null
*/
public function lookup_consumer($consumer_key)
{
\SimpleSAML\Logger::info('OAuth lookup_consumer('.$consumer_key.')');
if (!$this->store->exists('consumers', $consumer_key, '')) {
return null;
}
$consumer = $this->store->get('consumers', $consumer_key, '');
$callback = null;
if ($consumer['value']['callback_url']) {
$callback = $consumer['value']['callback_url'];
}
if ($consumer['value']['RSAcertificate']) {
return new \OAuthConsumer($consumer['value']['key'], $consumer['value']['RSAcertificate'], $callback);
} else {
return new \OAuthConsumer($consumer['value']['key'], $consumer['value']['secret'], $callback);
}
}
/**
* @param \OAuthConsumer $consumer
* @param string $tokenType
* @param string $token
* @return string
* @throws \Exception
*/
public function lookup_token($consumer, $tokenType = 'default', $token)
{
\SimpleSAML\Logger::info('OAuth lookup_token('.$consumer->key.', '.$tokenType.','.$token.')');
$data = $this->store->get($tokenType, $token, $consumer->key);
if ($data == null) {
throw new \Exception('Could not find token');
}
return $data['value'];
}
/**
* @param \OAuthConsumer $consumer
* @param string|null $token
* @param string $nonce
* @param int $timestamp
* @return bool
*/
public function lookup_nonce($consumer, $token, $nonce, $timestamp)
{
\SimpleSAML\Logger::info('OAuth lookup_nonce('.$consumer.', '.strval($token).','.$nonce.')');
if ($this->store->exists('nonce', $nonce, $consumer->key)) {
return true;
}
$this->store->set('nonce', $nonce, $consumer->key, true, $this->config->getValue('nonceCache', 1209600)); //60*60*24*14=1209600
return false;
}
/**
* @param \OAuthConsumer $consumer
* @param callable|null $callback
* @param string|null $version
* @return \OAuthToken
*/
public function new_request_token($consumer, $callback = null, $version = null)
{
\SimpleSAML\Logger::info('OAuth new_request_token('.$consumer.')');
$lifetime = $this->config->getValue('requestTokenDuration', 1800); //60*30
$token = new \OAuthToken(\SimpleSAML\Utils\Random::generateID(), \SimpleSAML\Utils\Random::generateID());
$token->callback = $callback; // OAuth1.0-RevA
$this->store->set('request', $token->key, $consumer->key, $token, $lifetime);
// also store in requestToken->key => array('callback'=>CallbackURL, 'version'=>oauth_version
$request_attributes = [
'callback' => $callback,
'version' => ($version ? $version : $this->defaultversion),
'consumerKey' => $consumer->key,
];
$this->store->set('requesttorequest', $token->key, '', $request_attributes, $lifetime);
/* also store in requestToken->key =>
* Consumer->key (enables consumer-lookup during reqToken-authorization stage)
*/
$this->store->set('requesttoconsumer', $token->key, '', $consumer->key, $lifetime);
return $token;
}
/**
* @param string $requestToken
* @param \OAuthConsumer $consumer
* @param string|null $verifier
* @return \OAuthToken
*/
public function new_access_token($requestToken, $consumer, $verifier = null)
{
\SimpleSAML\Logger::info('OAuth new_access_token('.$requestToken.','.$consumer.')');
$accesstoken = new \OAuthToken(\SimpleSAML\Utils\Random::generateID(), \SimpleSAML\Utils\Random::generateID());
$this->store->set(
'access',
$accesstoken->key,
$consumer->key,
$accesstoken,
$this->config->getValue('accessTokenDuration', 86400) //60*60*24=86400
);
return $accesstoken;
}
/**
* Return OAuthConsumer-instance that a given requestToken was issued to
* @param string $requestTokenKey
* @return mixed
*/
public function lookup_consumer_by_requestToken($requestTokenKey)
{
\SimpleSAML\Logger::info('OAuth lookup_consumer_by_requestToken('.$requestTokenKey.')');
if (!$this->store->exists('requesttorequest', $requestTokenKey, '')) {
return null;
}
$request = $this->store->get('requesttorequest', $requestTokenKey, '');
$consumerKey = $request['value']['consumerKey'];
if (!$consumerKey) {
return null;
}
$consumer = $this->store->get('consumers', $consumerKey['value'], '');
return $consumer['value'];
}
}
|