Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
368 changes: 186 additions & 182 deletions src/Http/Controllers/IntrospectionController.php
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,14 @@
use Laravel\Passport\Bridge\AccessTokenRepository;
use Laravel\Passport\ClientRepository;
use Laravel\Passport\Passport;
use Lcobucci\Clock\SystemClock;
use Lcobucci\JWT\Configuration;
use Lcobucci\JWT\Parser;
use Lcobucci\JWT\Signer\Key\InMemory;
use Lcobucci\JWT\Signer\Rsa\Sha256;
use Lcobucci\JWT\Token;
use Lcobucci\JWT\ValidationData;
use Lcobucci\JWT\Validation\Constraint\SignedWith;
use Lcobucci\JWT\Validation\Constraint\LooseValidAt;
use League\OAuth2\Server\Exception\OAuthServerException;
use League\OAuth2\Server\ResourceServer;
use Psr\Http\Message\ResponseInterface;
Expand All @@ -19,184 +24,183 @@

class IntrospectionController
{
/**
* @var \Lcobucci\JWT\Parser
*/
private $jwt;

/**
* @var \League\OAuth2\Server\ResourceServer
*/
private $resourceServer;

/**
* @var \Laravel\Passport\Bridge\AccessTokenRepository
*/
private $accessTokenRepository;

/**
* @var \Laravel\Passport\ClientRepository
*/
private $clientRepository;

/**
* constructing IntrospectionController
*
* @param \Lcobucci\JWT\Parser $jwt
* @param \League\OAuth2\Server\ResourceServer $resourceServer
* @param \Laravel\Passport\Bridge\AccessTokenRepository $accessTokenRepository
* @param \Laravel\Passport\ClientRepository
*/
public function __construct(
Parser $jwt,
ResourceServer $resourceServer,
AccessTokenRepository $accessTokenRepository,
ClientRepository $clientRepository
)
{
$this->jwt = $jwt;
$this->resourceServer = $resourceServer;
$this->accessTokenRepository = $accessTokenRepository;
$this->clientRepository = $clientRepository;
}

/**
* Authorize a client to access the user's account.
*
* @param ServerRequestInterface $request
*
* @return JsonResponse|ResponseInterface
*/
public function introspectToken(ServerRequestInterface $request)
{
try {
$this->resourceServer->validateAuthenticatedRequest($request);

if (Arr::get($request->getParsedBody(), 'token_type_hint', 'access_token') !== 'access_token') {
// unsupported introspection
return $this->notActiveResponse();
}

$accessToken = Arr::get($request->getParsedBody(), 'token');
if ($accessToken === null) {
return $this->notActiveResponse();
}

$token = $this->jwt->parse($accessToken);
if (!$this->verifyToken($token)) {
return $this->errorResponse([
'error' => [
'title' => 'Token invalid'
]
]);
}

/** @var string $userModel */
$userModel = config('auth.providers.users.model');
$user = (new $userModel)->find($token->getClaim('sub'));

return $this->jsonResponse([
'active' => true,
'scope' => trim(implode(' ', (array)$token->getClaim('scopes', []))),
'client_id' => $token->getClaim('aud'),
'username' => optional($user)->email,
'token_type' => 'access_token',
'exp' => intval($token->getClaim('exp')),
'iat' => intval($token->getClaim('iat')),
'nbf' => intval($token->getClaim('nbf')),
'sub' => $token->getClaim('sub'),
'aud' => $token->getClaim('aud'),
'jti' => $token->getClaim('jti'),
]);
} catch (OAuthServerException $oAuthServerException) {
return $oAuthServerException->generateHttpResponse(new Psr7Response);
} catch (\Exception $exception) {
return $this->exceptionResponse($exception);
}
}

/**
* returns inactive token message
*
* @return \Illuminate\Http\JsonResponse
*/
private function notActiveResponse() : JsonResponse
{
return $this->jsonResponse(['active' => false]);
}

/**
* @param array|mixed $data
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function jsonResponse($data, $status = 200) : JsonResponse
{
return new JsonResponse($data, $status);
}

private function verifyToken(Token $token) : bool
{
$signer = new \Lcobucci\JWT\Signer\Rsa\Sha256();
$publicKey = 'file://' . Passport::keyPath('oauth-public.key');

try {
if (!$token->verify($signer, $publicKey)) {
return false;
}

$data = new ValidationData();
$data->setCurrentTime(time());

if (!$token->validate($data)) {
return false;
}

// is token revoked?
if ($this->accessTokenRepository->isAccessTokenRevoked($token->getClaim('jti'))) {
return false;
}

if ($this->clientRepository->revoked($token->getClaim('aud'))) {
return false;
}

return true;
} catch (\Exception $exception) {
}

return false;
}

/**
* @param array $data
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function errorResponse($data, $status = 400) : JsonResponse
{
return $this->jsonResponse($data, $status);
}

/**
* returns an error
*
* @param \Exception $exception
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function exceptionResponse(\Exception $exception, $status = 500) : JsonResponse
{
return $this->errorResponse([
'error' => [
'id' => Str::slug(get_class($exception) . ' ' . $status),
'status' => $status,
'title' => $exception->getMessage(),
'detail' => $exception->getTraceAsString()
],
], $status);
}
}
/**
* @var Lcobucci\JWT\Configuration
*/
private $configuration;

/**
* @var \League\OAuth2\Server\ResourceServer
*/
private $resourceServer;

/**
* @var \Laravel\Passport\Bridge\AccessTokenRepository
*/
private $accessTokenRepository;

/**
* @var \Laravel\Passport\ClientRepository
*/
private $clientRepository;

/**
* constructing IntrospectionController
*
* @param \Lcobucci\JWT\Parser $jwt
* @param \League\OAuth2\Server\ResourceServer $resourceServer
* @param \Laravel\Passport\Bridge\AccessTokenRepository $accessTokenRepository
* @param \Laravel\Passport\ClientRepository
*/
public function __construct(
Parser $jwt,
ResourceServer $resourceServer,
AccessTokenRepository $accessTokenRepository,
ClientRepository $clientRepository
) {
$this->jwt = $jwt;
$this->resourceServer = $resourceServer;
$this->accessTokenRepository = $accessTokenRepository;
$this->clientRepository = $clientRepository;

$key = InMemory::file(Passport::keyPath('oauth-public.key'));
$configuration = Configuration::forSymmetricSigner( new Sha256(), $key);
$configuration->setValidationConstraints(
new LooseValidAt(new SystemClock(new \DateTimeZone(\date_default_timezone_get()))),
new SignedWith(new Sha256(), $key)
);
$this->configuration = $configuration;
}

/**
* Authorize a client to access the user's account.
*
* @param ServerRequestInterface $request
*
* @return JsonResponse|ResponseInterface
*/
public function introspectToken(ServerRequestInterface $request)
{
try {
$this->resourceServer->validateAuthenticatedRequest($request);

if (Arr::get($request->getParsedBody(), 'token_type_hint', 'access_token') !== 'access_token') {
// unsupported introspection
return $this->notActiveResponse();
}

$accessToken = Arr::get($request->getParsedBody(), 'token');
if ($accessToken === null) {
return $this->notActiveResponse();
}

$token = $this->configuration->parser()->parse($accessToken);
if (!$this->verifyToken($token)) {
return $this->errorResponse([
'error' => [
'title' => 'Token invalid'
]
]);
}

$claims = $token->claims();

/** @var string $userModel */
$userModel = config('auth.providers.users.model');
$user = (new $userModel)->find($claims->get('sub'));

return $this->jsonResponse([
'active' => true,
'scope' => trim(implode(' ', (array)$claims->get('scopes', []))),
'client_id' => $claims->get('aud'),
'username' => optional($user)->email,
'token_type' => 'access_token',
'exp' => $claims->get('exp')->getTimestamp(),
'iat' => $claims->get('iat')->getTimestamp(),
'nbf' => $claims->get('nbf')->getTimestamp(),
'sub' => $claims->get('sub'),
'aud' => $claims->get('aud'),
'jti' => $claims->get('jti'),
]);
} catch (OAuthServerException $oAuthServerException) {
return $oAuthServerException->generateHttpResponse(new Psr7Response);
} catch (\Exception $exception) {
return $this->exceptionResponse($exception);
}
}

/**
* returns inactive token message
*
* @return \Illuminate\Http\JsonResponse
*/
private function notActiveResponse(): JsonResponse
{
return $this->jsonResponse(['active' => false]);
}

/**
* @param array|mixed $data
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function jsonResponse($data, $status = 200): JsonResponse
{
return new JsonResponse($data, $status);
}

private function verifyToken(Token $token): bool
{
try {
if (!$this->configuration->validator()->validate($token, ...$this->configuration->validationConstraints())) {
return false;
}

// is token revoked?
if ($this->accessTokenRepository->isAccessTokenRevoked($token->claims()->get('jti'))) {
return false;
}

if ($this->clientRepository->revoked($token->claims()->get('aud'))) {
return false;
}

return true;
} catch (\Exception $exception) {
}

return false;
}

/**
* @param array $data
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function errorResponse($data, $status = 400): JsonResponse
{
return $this->jsonResponse($data, $status);
}

/**
* returns an error
*
* @param \Exception $exception
* @param int $status
*
* @return \Illuminate\Http\JsonResponse
*/
private function exceptionResponse(\Exception $exception, $status = 500): JsonResponse
{
return $this->errorResponse([
'error' => [
'id' => Str::slug(get_class($exception) . ' ' . $status),
'status' => $status,
'title' => $exception->getMessage(),
'detail' => $exception->getTraceAsString()
],
], $status);
}
}