2017-05-05 00:46:59 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-12-07 15:43:22 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2017-05-05 00:46:59 +03:00
|
|
|
/**
|
|
|
|
* @copyright Copyright (c) 2017 Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
*
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2017-05-05 00:46:59 +03:00
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2017-05-05 00:46:59 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\OAuth2\Controller;
|
|
|
|
|
2018-10-30 15:18:41 +03:00
|
|
|
use OC\Authentication\Exceptions\ExpiredTokenException;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
2018-05-16 16:09:03 +03:00
|
|
|
use OC\Authentication\Token\IProvider as TokenProvider;
|
2018-10-30 00:12:18 +03:00
|
|
|
use OC\Security\Bruteforce\Throttler;
|
2017-05-05 00:46:59 +03:00
|
|
|
use OCA\OAuth2\Db\AccessTokenMapper;
|
2018-05-16 12:50:37 +03:00
|
|
|
use OCA\OAuth2\Db\ClientMapper;
|
|
|
|
use OCA\OAuth2\Exceptions\AccessTokenNotFoundException;
|
2018-05-16 16:09:03 +03:00
|
|
|
use OCA\OAuth2\Exceptions\ClientNotFoundException;
|
2017-05-05 00:46:59 +03:00
|
|
|
use OCP\AppFramework\Controller;
|
2018-05-16 12:50:37 +03:00
|
|
|
use OCP\AppFramework\Http;
|
2017-05-05 00:46:59 +03:00
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2018-05-16 16:09:03 +03:00
|
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
2017-05-05 00:46:59 +03:00
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\Security\ICrypto;
|
|
|
|
use OCP\Security\ISecureRandom;
|
|
|
|
|
|
|
|
class OauthApiController extends Controller {
|
|
|
|
/** @var AccessTokenMapper */
|
|
|
|
private $accessTokenMapper;
|
2018-05-16 12:50:37 +03:00
|
|
|
/** @var ClientMapper */
|
|
|
|
private $clientMapper;
|
2017-05-05 00:46:59 +03:00
|
|
|
/** @var ICrypto */
|
|
|
|
private $crypto;
|
2018-05-16 16:09:03 +03:00
|
|
|
/** @var TokenProvider */
|
|
|
|
private $tokenProvider;
|
2017-05-05 00:46:59 +03:00
|
|
|
/** @var ISecureRandom */
|
|
|
|
private $secureRandom;
|
2018-05-16 16:09:03 +03:00
|
|
|
/** @var ITimeFactory */
|
|
|
|
private $time;
|
2018-10-30 00:12:18 +03:00
|
|
|
/** @var Throttler */
|
|
|
|
private $throttler;
|
2017-05-05 00:46:59 +03:00
|
|
|
|
2018-12-07 15:43:22 +03:00
|
|
|
public function __construct(string $appName,
|
2017-05-05 00:46:59 +03:00
|
|
|
IRequest $request,
|
|
|
|
ICrypto $crypto,
|
|
|
|
AccessTokenMapper $accessTokenMapper,
|
2018-05-16 12:50:37 +03:00
|
|
|
ClientMapper $clientMapper,
|
2018-05-16 16:09:03 +03:00
|
|
|
TokenProvider $tokenProvider,
|
|
|
|
ISecureRandom $secureRandom,
|
2018-10-30 00:12:18 +03:00
|
|
|
ITimeFactory $time,
|
|
|
|
Throttler $throttler) {
|
2017-05-05 00:46:59 +03:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
$this->crypto = $crypto;
|
|
|
|
$this->accessTokenMapper = $accessTokenMapper;
|
2018-05-16 12:50:37 +03:00
|
|
|
$this->clientMapper = $clientMapper;
|
2018-05-16 16:09:03 +03:00
|
|
|
$this->tokenProvider = $tokenProvider;
|
2017-05-05 00:46:59 +03:00
|
|
|
$this->secureRandom = $secureRandom;
|
2018-05-16 16:09:03 +03:00
|
|
|
$this->time = $time;
|
2018-10-30 00:12:18 +03:00
|
|
|
$this->throttler = $throttler;
|
2017-05-05 00:46:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*
|
2018-05-16 12:50:37 +03:00
|
|
|
* @param string $grant_type
|
2017-05-05 00:46:59 +03:00
|
|
|
* @param string $code
|
2018-05-16 12:50:37 +03:00
|
|
|
* @param string $refresh_token
|
2018-05-16 11:35:18 +03:00
|
|
|
* @param string $client_id
|
|
|
|
* @param string $client_secret
|
2017-05-05 00:46:59 +03:00
|
|
|
* @return JSONResponse
|
|
|
|
*/
|
2018-12-07 15:43:22 +03:00
|
|
|
public function getToken($grant_type, $code, $refresh_token, $client_id, $client_secret): JSONResponse {
|
2018-05-16 12:50:37 +03:00
|
|
|
|
2018-05-16 16:09:35 +03:00
|
|
|
// We only handle two types
|
2018-05-16 12:50:37 +03:00
|
|
|
if ($grant_type !== 'authorization_code' && $grant_type !== 'refresh_token') {
|
|
|
|
return new JSONResponse([
|
|
|
|
'error' => 'invalid_grant',
|
|
|
|
], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
|
|
|
// We handle the initial and refresh tokens the same way
|
2020-04-09 17:07:47 +03:00
|
|
|
if ($grant_type === 'refresh_token') {
|
2018-05-16 12:50:37 +03:00
|
|
|
$code = $refresh_token;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$accessToken = $this->accessTokenMapper->getByCode($code);
|
|
|
|
} catch (AccessTokenNotFoundException $e) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'error' => 'invalid_request',
|
|
|
|
], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$client = $this->clientMapper->getByUid($accessToken->getClientId());
|
|
|
|
} catch (ClientNotFoundException $e) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'error' => 'invalid_request',
|
|
|
|
], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2018-05-29 16:13:43 +03:00
|
|
|
if (isset($this->request->server['PHP_AUTH_USER'])) {
|
|
|
|
$client_id = $this->request->server['PHP_AUTH_USER'];
|
|
|
|
$client_secret = $this->request->server['PHP_AUTH_PW'];
|
|
|
|
}
|
|
|
|
|
2018-05-16 16:09:35 +03:00
|
|
|
// The client id and secret must match. Else we don't provide an access token!
|
2018-05-16 12:50:37 +03:00
|
|
|
if ($client->getClientIdentifier() !== $client_id || $client->getSecret() !== $client_secret) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'error' => 'invalid_client',
|
|
|
|
], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2017-05-05 00:46:59 +03:00
|
|
|
$decryptedToken = $this->crypto->decrypt($accessToken->getEncryptedToken(), $code);
|
2018-05-16 16:09:03 +03:00
|
|
|
|
2018-05-16 16:09:35 +03:00
|
|
|
// Obtain the appToken assoicated
|
2018-05-16 16:09:03 +03:00
|
|
|
try {
|
|
|
|
$appToken = $this->tokenProvider->getTokenById($accessToken->getTokenId());
|
|
|
|
} catch (ExpiredTokenException $e) {
|
|
|
|
$appToken = $e->getToken();
|
|
|
|
} catch (InvalidTokenException $e) {
|
|
|
|
//We can't do anything...
|
|
|
|
$this->accessTokenMapper->delete($accessToken);
|
|
|
|
return new JSONResponse([
|
|
|
|
'error' => 'invalid_request',
|
|
|
|
], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2018-05-16 16:09:35 +03:00
|
|
|
// Rotate the apptoken (so the old one becomes invalid basically)
|
2018-05-16 16:09:03 +03:00
|
|
|
$newToken = $this->secureRandom->generate(72, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS);
|
|
|
|
|
|
|
|
$appToken = $this->tokenProvider->rotate(
|
|
|
|
$appToken,
|
|
|
|
$decryptedToken,
|
|
|
|
$newToken
|
|
|
|
);
|
2018-05-16 16:09:35 +03:00
|
|
|
|
|
|
|
// Expiration is in 1 hour again
|
2018-05-16 16:09:03 +03:00
|
|
|
$appToken->setExpires($this->time->getTime() + 3600);
|
|
|
|
$this->tokenProvider->updateToken($appToken);
|
|
|
|
|
2018-05-16 16:09:35 +03:00
|
|
|
// Generate a new refresh token and encrypt the new apptoken in the DB
|
2018-05-16 16:09:03 +03:00
|
|
|
$newCode = $this->secureRandom->generate(128, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS);
|
2017-05-05 00:46:59 +03:00
|
|
|
$accessToken->setHashedCode(hash('sha512', $newCode));
|
2018-05-16 16:09:03 +03:00
|
|
|
$accessToken->setEncryptedToken($this->crypto->encrypt($newToken, $newCode));
|
2017-05-05 00:46:59 +03:00
|
|
|
$this->accessTokenMapper->update($accessToken);
|
|
|
|
|
2018-10-30 00:12:18 +03:00
|
|
|
$this->throttler->resetDelay($this->request->getRemoteAddress(), 'login', ['user' => $appToken->getUID()]);
|
|
|
|
|
2017-05-05 00:46:59 +03:00
|
|
|
return new JSONResponse(
|
|
|
|
[
|
2018-05-16 16:09:03 +03:00
|
|
|
'access_token' => $newToken,
|
2017-05-05 01:19:28 +03:00
|
|
|
'token_type' => 'Bearer',
|
2017-05-05 00:46:59 +03:00
|
|
|
'expires_in' => 3600,
|
|
|
|
'refresh_token' => $newCode,
|
2018-05-16 16:09:03 +03:00
|
|
|
'user_id' => $appToken->getUID(),
|
2017-05-05 00:46:59 +03:00
|
|
|
]
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|