mirror of
https://github.com/elyby/oauth2-server.git
synced 2025-01-19 01:52:57 +05:30
Merge pull request #377 from starJammer/master
AuthCodeGrant and RefreshTokenGrant don't require client_secret
This commit is contained in:
commit
a9f61fd3ed
@ -60,6 +60,14 @@ class AuthCodeGrant extends AbstractGrant
|
|||||||
*/
|
*/
|
||||||
protected $authTokenTTL = 600;
|
protected $authTokenTTL = 600;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Whether to require the client secret when
|
||||||
|
* completing the flow.
|
||||||
|
*
|
||||||
|
* @var boolean
|
||||||
|
*/
|
||||||
|
protected $requireClientSecret = true;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Override the default access token expire time
|
* Override the default access token expire time
|
||||||
*
|
*
|
||||||
@ -72,6 +80,27 @@ class AuthCodeGrant extends AbstractGrant
|
|||||||
$this->authTokenTTL = $authTokenTTL;
|
$this->authTokenTTL = $authTokenTTL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @param bool $required True to require client secret during access
|
||||||
|
* token request. False if not. Default = true
|
||||||
|
*/
|
||||||
|
public function setRequireClientSecret($required)
|
||||||
|
{
|
||||||
|
$this->requireClientSecret = $required;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* True if client secret is required during
|
||||||
|
* access token request. False if it isn't.
|
||||||
|
*
|
||||||
|
* @return bool
|
||||||
|
*/
|
||||||
|
public function shouldRequireClientSecret()
|
||||||
|
{
|
||||||
|
return $this->requireClientSecret;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Check authorize parameters
|
* Check authorize parameters
|
||||||
*
|
*
|
||||||
@ -184,7 +213,7 @@ class AuthCodeGrant extends AbstractGrant
|
|||||||
|
|
||||||
$clientSecret = $this->server->getRequest()->request->get('client_secret',
|
$clientSecret = $this->server->getRequest()->request->get('client_secret',
|
||||||
$this->server->getRequest()->getPassword());
|
$this->server->getRequest()->getPassword());
|
||||||
if (is_null($clientSecret)) {
|
if ($this->shouldRequireClientSecret() && is_null($clientSecret)) {
|
||||||
throw new Exception\InvalidRequestException('client_secret');
|
throw new Exception\InvalidRequestException('client_secret');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -42,6 +42,14 @@ class RefreshTokenGrant extends AbstractGrant
|
|||||||
*/
|
*/
|
||||||
protected $refreshTokenRotate = true;
|
protected $refreshTokenRotate = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Whether to require the client secret when
|
||||||
|
* completing the flow.
|
||||||
|
*
|
||||||
|
* @var boolean
|
||||||
|
*/
|
||||||
|
protected $requireClientSecret = true;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Set the TTL of the refresh token
|
* Set the TTL of the refresh token
|
||||||
*
|
*
|
||||||
@ -83,6 +91,28 @@ class RefreshTokenGrant extends AbstractGrant
|
|||||||
return $this->refreshTokenRotate;
|
return $this->refreshTokenRotate;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @param bool $required True to require client secret during access
|
||||||
|
* token request. False if not. Default = true
|
||||||
|
*/
|
||||||
|
public function setRequireClientSecret($required)
|
||||||
|
{
|
||||||
|
$this->requireClientSecret = $required;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* True if client secret is required during
|
||||||
|
* access token request. False if it isn't.
|
||||||
|
*
|
||||||
|
* @return bool
|
||||||
|
*/
|
||||||
|
public function shouldRequireClientSecret()
|
||||||
|
{
|
||||||
|
return $this->requireClientSecret;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* {@inheritdoc}
|
* {@inheritdoc}
|
||||||
*/
|
*/
|
||||||
@ -95,7 +125,7 @@ class RefreshTokenGrant extends AbstractGrant
|
|||||||
|
|
||||||
$clientSecret = $this->server->getRequest()->request->get('client_secret',
|
$clientSecret = $this->server->getRequest()->request->get('client_secret',
|
||||||
$this->server->getRequest()->getPassword());
|
$this->server->getRequest()->getPassword());
|
||||||
if (is_null($clientSecret)) {
|
if ($this->shouldRequireClientSecret() && is_null($clientSecret)) {
|
||||||
throw new Exception\InvalidRequestException('client_secret');
|
throw new Exception\InvalidRequestException('client_secret');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -498,4 +498,73 @@ class RefreshTokenGrantTest extends \PHPUnit_Framework_TestCase
|
|||||||
$this->assertTrue(array_key_exists('expires_in', $response));
|
$this->assertTrue(array_key_exists('expires_in', $response));
|
||||||
$this->assertEquals($response['refresh_token'], $_POST['refresh_token']);
|
$this->assertEquals($response['refresh_token'], $_POST['refresh_token']);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public function testCompleteFlowShouldRequireClientSecret()
|
||||||
|
{
|
||||||
|
$_POST = [
|
||||||
|
'grant_type' => 'refresh_token',
|
||||||
|
'client_id' => 'testapp',
|
||||||
|
'refresh_token' => 'refresh_token',
|
||||||
|
];
|
||||||
|
|
||||||
|
$server = new AuthorizationServer();
|
||||||
|
$grant = new RefreshTokenGrant();
|
||||||
|
$grant->setRequireClientSecret(false);
|
||||||
|
|
||||||
|
$clientStorage = M::mock('League\OAuth2\Server\Storage\ClientInterface');
|
||||||
|
$clientStorage->shouldReceive('setServer');
|
||||||
|
$clientStorage->shouldReceive('get')->andReturn(
|
||||||
|
(new ClientEntity($server))->hydrate(['id' => 'testapp'])
|
||||||
|
);
|
||||||
|
|
||||||
|
$sessionStorage = M::mock('League\OAuth2\Server\Storage\SessionInterface');
|
||||||
|
$sessionStorage->shouldReceive('setServer');
|
||||||
|
$sessionStorage->shouldReceive('getScopes')->shouldReceive('getScopes')->andReturn([]);
|
||||||
|
$sessionStorage->shouldReceive('associateScope');
|
||||||
|
$sessionStorage->shouldReceive('getByAccessToken')->andReturn(
|
||||||
|
(new SessionEntity($server))
|
||||||
|
);
|
||||||
|
|
||||||
|
$accessTokenStorage = M::mock('League\OAuth2\Server\Storage\AccessTokenInterface');
|
||||||
|
$accessTokenStorage->shouldReceive('setServer');
|
||||||
|
$accessTokenStorage->shouldReceive('get')->andReturn(
|
||||||
|
(new AccessTokenEntity($server))
|
||||||
|
);
|
||||||
|
$accessTokenStorage->shouldReceive('delete');
|
||||||
|
$accessTokenStorage->shouldReceive('create');
|
||||||
|
$accessTokenStorage->shouldReceive('getScopes')->andReturn([
|
||||||
|
(new ScopeEntity($server))->hydrate(['id' => 'foo']),
|
||||||
|
]);
|
||||||
|
$accessTokenStorage->shouldReceive('associateScope');
|
||||||
|
|
||||||
|
$refreshTokenStorage = M::mock('League\OAuth2\Server\Storage\RefreshTokenInterface');
|
||||||
|
$refreshTokenStorage->shouldReceive('setServer');
|
||||||
|
$refreshTokenStorage->shouldReceive('associateScope');
|
||||||
|
$refreshTokenStorage->shouldReceive('delete');
|
||||||
|
$refreshTokenStorage->shouldReceive('create');
|
||||||
|
$refreshTokenStorage->shouldReceive('get')->andReturn(
|
||||||
|
(new RefreshTokenEntity($server))->setId('refresh_token')->setExpireTime(time() + 86400)
|
||||||
|
);
|
||||||
|
|
||||||
|
$scopeStorage = M::mock('League\OAuth2\Server\Storage\ScopeInterface');
|
||||||
|
$scopeStorage->shouldReceive('setServer');
|
||||||
|
$scopeStorage->shouldReceive('get')->andReturn(
|
||||||
|
(new ScopeEntity($server))->hydrate(['id' => 'foo'])
|
||||||
|
);
|
||||||
|
|
||||||
|
$server->setClientStorage($clientStorage);
|
||||||
|
$server->setScopeStorage($scopeStorage);
|
||||||
|
$server->setSessionStorage($sessionStorage);
|
||||||
|
$server->setAccessTokenStorage($accessTokenStorage);
|
||||||
|
$server->setRefreshTokenStorage($refreshTokenStorage);
|
||||||
|
|
||||||
|
$server->addGrantType($grant);
|
||||||
|
|
||||||
|
$response = $server->issueAccessToken();
|
||||||
|
$this->assertTrue(array_key_exists('access_token', $response));
|
||||||
|
$this->assertTrue(array_key_exists('refresh_token', $response));
|
||||||
|
$this->assertTrue(array_key_exists('token_type', $response));
|
||||||
|
$this->assertTrue(array_key_exists('expires_in', $response));
|
||||||
|
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user