mirror of
https://github.com/elyby/accounts.git
synced 2025-01-10 22:12:03 +05:30
fix: use custom Redirect URI validation logic in RefreshTokenGrant (#42)
Co-authored-by: ErickSkrauch <erickskrauch@yandex.ru>
This commit is contained in:
parent
7b626507bc
commit
3bba99a757
@ -4,19 +4,15 @@ declare(strict_types=1);
|
|||||||
namespace common\components\OAuth2\Grants;
|
namespace common\components\OAuth2\Grants;
|
||||||
|
|
||||||
use common\components\OAuth2\CryptTrait;
|
use common\components\OAuth2\CryptTrait;
|
||||||
use common\components\OAuth2\Events\RequestedRefreshToken;
|
|
||||||
use common\components\OAuth2\Repositories\PublicScopeRepository;
|
|
||||||
use DateInterval;
|
use DateInterval;
|
||||||
use League\OAuth2\Server\Entities\AccessTokenEntityInterface;
|
use League\OAuth2\Server\Entities\AccessTokenEntityInterface;
|
||||||
use League\OAuth2\Server\Entities\ClientEntityInterface;
|
use League\OAuth2\Server\Entities\ClientEntityInterface;
|
||||||
use League\OAuth2\Server\Exception\OAuthServerException;
|
|
||||||
use League\OAuth2\Server\Grant\AuthCodeGrant as BaseAuthCodeGrant;
|
use League\OAuth2\Server\Grant\AuthCodeGrant as BaseAuthCodeGrant;
|
||||||
use League\OAuth2\Server\RequestEvent;
|
|
||||||
use Psr\Http\Message\ServerRequestInterface;
|
|
||||||
use yii\helpers\StringHelper;
|
|
||||||
|
|
||||||
final class AuthCodeGrant extends BaseAuthCodeGrant {
|
final class AuthCodeGrant extends BaseAuthCodeGrant {
|
||||||
use CryptTrait;
|
use CryptTrait;
|
||||||
|
use CheckOfflineAccessScopeTrait;
|
||||||
|
use ValidateRedirectUriTrait;
|
||||||
|
|
||||||
protected function issueAccessToken(
|
protected function issueAccessToken(
|
||||||
DateInterval $accessTokenTTL,
|
DateInterval $accessTokenTTL,
|
||||||
@ -24,30 +20,8 @@ final class AuthCodeGrant extends BaseAuthCodeGrant {
|
|||||||
?string $userIdentifier,
|
?string $userIdentifier,
|
||||||
array $scopes = [],
|
array $scopes = [],
|
||||||
): AccessTokenEntityInterface {
|
): AccessTokenEntityInterface {
|
||||||
foreach ($scopes as $i => $scope) {
|
$this->checkOfflineAccessScope($scopes);
|
||||||
if ($scope->getIdentifier() === PublicScopeRepository::OFFLINE_ACCESS) {
|
|
||||||
unset($scopes[$i]);
|
|
||||||
$this->getEmitter()->emit(new RequestedRefreshToken('refresh_token_requested'));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return parent::issueAccessToken($accessTokenTTL, $client, $userIdentifier, $scopes);
|
return parent::issueAccessToken($accessTokenTTL, $client, $userIdentifier, $scopes);
|
||||||
}
|
}
|
||||||
|
|
||||||
protected function validateRedirectUri(
|
|
||||||
string $redirectUri,
|
|
||||||
ClientEntityInterface $client,
|
|
||||||
ServerRequestInterface $request,
|
|
||||||
): void {
|
|
||||||
$allowedRedirectUris = (array)$client->getRedirectUri();
|
|
||||||
foreach ($allowedRedirectUris as $allowedRedirectUri) {
|
|
||||||
if (StringHelper::startsWith($redirectUri, $allowedRedirectUri)) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$this->getEmitter()->emit(new RequestEvent(RequestEvent::CLIENT_AUTHENTICATION_FAILED, $request));
|
|
||||||
throw OAuthServerException::invalidClient($request);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,26 @@
|
|||||||
|
<?php
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
namespace common\components\OAuth2\Grants;
|
||||||
|
|
||||||
|
use common\components\OAuth2\Events\RequestedRefreshToken;
|
||||||
|
use common\components\OAuth2\Repositories\PublicScopeRepository;
|
||||||
|
use League\OAuth2\Server\EventEmitting\EventEmitter;
|
||||||
|
|
||||||
|
trait CheckOfflineAccessScopeTrait {
|
||||||
|
|
||||||
|
abstract public function getEmitter(): EventEmitter;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param \League\OAuth2\Server\Entities\ScopeEntityInterface[] $scopes
|
||||||
|
*/
|
||||||
|
protected function checkOfflineAccessScope(array $scopes = []): void {
|
||||||
|
foreach ($scopes as $i => $scope) {
|
||||||
|
if ($scope->getIdentifier() === PublicScopeRepository::OFFLINE_ACCESS) {
|
||||||
|
unset($scopes[$i]);
|
||||||
|
$this->getEmitter()->emit(new RequestedRefreshToken('refresh_token_requested'));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -3,9 +3,7 @@ declare(strict_types=1);
|
|||||||
|
|
||||||
namespace common\components\OAuth2\Grants;
|
namespace common\components\OAuth2\Grants;
|
||||||
|
|
||||||
use common\components\OAuth2\Events\RequestedRefreshToken;
|
|
||||||
use common\components\OAuth2\Repositories\ExtendedDeviceCodeRepositoryInterface;
|
use common\components\OAuth2\Repositories\ExtendedDeviceCodeRepositoryInterface;
|
||||||
use common\components\OAuth2\Repositories\PublicScopeRepository;
|
|
||||||
use common\components\OAuth2\ResponseTypes\EmptyResponse;
|
use common\components\OAuth2\ResponseTypes\EmptyResponse;
|
||||||
use DateInterval;
|
use DateInterval;
|
||||||
use League\OAuth2\Server\Entities\AccessTokenEntityInterface;
|
use League\OAuth2\Server\Entities\AccessTokenEntityInterface;
|
||||||
@ -22,6 +20,7 @@ use Psr\Http\Message\ServerRequestInterface;
|
|||||||
* @property ExtendedDeviceCodeRepositoryInterface $deviceCodeRepository
|
* @property ExtendedDeviceCodeRepositoryInterface $deviceCodeRepository
|
||||||
*/
|
*/
|
||||||
final class DeviceCodeGrant extends BaseDeviceCodeGrant {
|
final class DeviceCodeGrant extends BaseDeviceCodeGrant {
|
||||||
|
use CheckOfflineAccessScopeTrait;
|
||||||
|
|
||||||
public function __construct(
|
public function __construct(
|
||||||
ExtendedDeviceCodeRepositoryInterface $deviceCodeRepository,
|
ExtendedDeviceCodeRepositoryInterface $deviceCodeRepository,
|
||||||
@ -95,12 +94,7 @@ final class DeviceCodeGrant extends BaseDeviceCodeGrant {
|
|||||||
?string $userIdentifier,
|
?string $userIdentifier,
|
||||||
array $scopes = [],
|
array $scopes = [],
|
||||||
): AccessTokenEntityInterface {
|
): AccessTokenEntityInterface {
|
||||||
foreach ($scopes as $i => $scope) {
|
$this->checkOfflineAccessScope($scopes);
|
||||||
if ($scope->getIdentifier() === PublicScopeRepository::OFFLINE_ACCESS) {
|
|
||||||
unset($scopes[$i]);
|
|
||||||
$this->getEmitter()->emit(new RequestedRefreshToken('refresh_token_requested'));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return parent::issueAccessToken($accessTokenTTL, $client, $userIdentifier, $scopes);
|
return parent::issueAccessToken($accessTokenTTL, $client, $userIdentifier, $scopes);
|
||||||
}
|
}
|
||||||
|
@ -20,6 +20,7 @@ use Yii;
|
|||||||
|
|
||||||
final class RefreshTokenGrant extends BaseRefreshTokenGrant {
|
final class RefreshTokenGrant extends BaseRefreshTokenGrant {
|
||||||
use CryptTrait;
|
use CryptTrait;
|
||||||
|
use ValidateRedirectUriTrait;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Previously, refresh tokens were stored in Redis.
|
* Previously, refresh tokens were stored in Redis.
|
||||||
|
34
common/components/OAuth2/Grants/ValidateRedirectUriTrait.php
Normal file
34
common/components/OAuth2/Grants/ValidateRedirectUriTrait.php
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
<?php
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
namespace common\components\OAuth2\Grants;
|
||||||
|
|
||||||
|
use League\OAuth2\Server\Entities\ClientEntityInterface;
|
||||||
|
use League\OAuth2\Server\EventEmitting\EventEmitter;
|
||||||
|
use League\OAuth2\Server\Exception\OAuthServerException;
|
||||||
|
use League\OAuth2\Server\RequestEvent;
|
||||||
|
use Psr\Http\Message\ServerRequestInterface;
|
||||||
|
use yii\helpers\StringHelper;
|
||||||
|
|
||||||
|
trait ValidateRedirectUriTrait {
|
||||||
|
|
||||||
|
abstract public function getEmitter(): EventEmitter;
|
||||||
|
|
||||||
|
protected function validateRedirectUri(
|
||||||
|
string $redirectUri,
|
||||||
|
ClientEntityInterface $client,
|
||||||
|
ServerRequestInterface $request,
|
||||||
|
): void {
|
||||||
|
$allowedRedirectUris = (array)$client->getRedirectUri();
|
||||||
|
foreach ($allowedRedirectUris as $allowedRedirectUri) {
|
||||||
|
if (StringHelper::startsWith($redirectUri, $allowedRedirectUri)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$this->getEmitter()->emit(new RequestEvent(RequestEvent::CLIENT_AUTHENTICATION_FAILED, $request));
|
||||||
|
|
||||||
|
throw OAuthServerException::invalidClient($request);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user