1 | <?php
|
---|
2 | /*
|
---|
3 | * Copyright 2015 Google Inc.
|
---|
4 | *
|
---|
5 | * Licensed under the Apache License, Version 2.0 (the "License");
|
---|
6 | * you may not use this file except in compliance with the License.
|
---|
7 | * You may obtain a copy of the License at
|
---|
8 | *
|
---|
9 | * http://www.apache.org/licenses/LICENSE-2.0
|
---|
10 | *
|
---|
11 | * Unless required by applicable law or agreed to in writing, software
|
---|
12 | * distributed under the License is distributed on an "AS IS" BASIS,
|
---|
13 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
---|
14 | * See the License for the specific language governing permissions and
|
---|
15 | * limitations under the License.
|
---|
16 | */
|
---|
17 |
|
---|
18 | namespace Google\Auth;
|
---|
19 |
|
---|
20 | use Firebase\JWT\JWT;
|
---|
21 | use Firebase\JWT\Key;
|
---|
22 | use Google\Auth\HttpHandler\HttpClientCache;
|
---|
23 | use Google\Auth\HttpHandler\HttpHandlerFactory;
|
---|
24 | use GuzzleHttp\Psr7\Query;
|
---|
25 | use GuzzleHttp\Psr7\Request;
|
---|
26 | use GuzzleHttp\Psr7\Utils;
|
---|
27 | use InvalidArgumentException;
|
---|
28 | use Psr\Http\Message\RequestInterface;
|
---|
29 | use Psr\Http\Message\ResponseInterface;
|
---|
30 | use Psr\Http\Message\UriInterface;
|
---|
31 |
|
---|
32 | /**
|
---|
33 | * OAuth2 supports authentication by OAuth2 2-legged flows.
|
---|
34 | *
|
---|
35 | * It primary supports
|
---|
36 | * - service account authorization
|
---|
37 | * - authorization where a user already has an access token
|
---|
38 | */
|
---|
39 | class OAuth2 implements FetchAuthTokenInterface
|
---|
40 | {
|
---|
41 | const DEFAULT_EXPIRY_SECONDS = 3600; // 1 hour
|
---|
42 | const DEFAULT_SKEW_SECONDS = 60; // 1 minute
|
---|
43 | const JWT_URN = 'urn:ietf:params:oauth:grant-type:jwt-bearer';
|
---|
44 | const STS_URN = 'urn:ietf:params:oauth:grant-type:token-exchange';
|
---|
45 | private const STS_REQUESTED_TOKEN_TYPE = 'urn:ietf:params:oauth:token-type:access_token';
|
---|
46 |
|
---|
47 | /**
|
---|
48 | * TODO: determine known methods from the keys of JWT::methods.
|
---|
49 | *
|
---|
50 | * @var array<string>
|
---|
51 | */
|
---|
52 | public static $knownSigningAlgorithms = [
|
---|
53 | 'HS256',
|
---|
54 | 'HS512',
|
---|
55 | 'HS384',
|
---|
56 | 'RS256',
|
---|
57 | ];
|
---|
58 |
|
---|
59 | /**
|
---|
60 | * The well known grant types.
|
---|
61 | *
|
---|
62 | * @var array<string>
|
---|
63 | */
|
---|
64 | public static $knownGrantTypes = [
|
---|
65 | 'authorization_code',
|
---|
66 | 'refresh_token',
|
---|
67 | 'password',
|
---|
68 | 'client_credentials',
|
---|
69 | ];
|
---|
70 |
|
---|
71 | /**
|
---|
72 | * - authorizationUri
|
---|
73 | * The authorization server's HTTP endpoint capable of
|
---|
74 | * authenticating the end-user and obtaining authorization.
|
---|
75 | *
|
---|
76 | * @var ?UriInterface
|
---|
77 | */
|
---|
78 | private $authorizationUri;
|
---|
79 |
|
---|
80 | /**
|
---|
81 | * - tokenCredentialUri
|
---|
82 | * The authorization server's HTTP endpoint capable of issuing
|
---|
83 | * tokens and refreshing expired tokens.
|
---|
84 | *
|
---|
85 | * @var UriInterface
|
---|
86 | */
|
---|
87 | private $tokenCredentialUri;
|
---|
88 |
|
---|
89 | /**
|
---|
90 | * The redirection URI used in the initial request.
|
---|
91 | *
|
---|
92 | * @var ?string
|
---|
93 | */
|
---|
94 | private $redirectUri;
|
---|
95 |
|
---|
96 | /**
|
---|
97 | * A unique identifier issued to the client to identify itself to the
|
---|
98 | * authorization server.
|
---|
99 | *
|
---|
100 | * @var string
|
---|
101 | */
|
---|
102 | private $clientId;
|
---|
103 |
|
---|
104 | /**
|
---|
105 | * A shared symmetric secret issued by the authorization server, which is
|
---|
106 | * used to authenticate the client.
|
---|
107 | *
|
---|
108 | * @var string
|
---|
109 | */
|
---|
110 | private $clientSecret;
|
---|
111 |
|
---|
112 | /**
|
---|
113 | * The resource owner's username.
|
---|
114 | *
|
---|
115 | * @var ?string
|
---|
116 | */
|
---|
117 | private $username;
|
---|
118 |
|
---|
119 | /**
|
---|
120 | * The resource owner's password.
|
---|
121 | *
|
---|
122 | * @var ?string
|
---|
123 | */
|
---|
124 | private $password;
|
---|
125 |
|
---|
126 | /**
|
---|
127 | * The scope of the access request, expressed either as an Array or as a
|
---|
128 | * space-delimited string.
|
---|
129 | *
|
---|
130 | * @var ?array<string>
|
---|
131 | */
|
---|
132 | private $scope;
|
---|
133 |
|
---|
134 | /**
|
---|
135 | * An arbitrary string designed to allow the client to maintain state.
|
---|
136 | *
|
---|
137 | * @var string
|
---|
138 | */
|
---|
139 | private $state;
|
---|
140 |
|
---|
141 | /**
|
---|
142 | * The authorization code issued to this client.
|
---|
143 | *
|
---|
144 | * Only used by the authorization code access grant type.
|
---|
145 | *
|
---|
146 | * @var ?string
|
---|
147 | */
|
---|
148 | private $code;
|
---|
149 |
|
---|
150 | /**
|
---|
151 | * The issuer ID when using assertion profile.
|
---|
152 | *
|
---|
153 | * @var ?string
|
---|
154 | */
|
---|
155 | private $issuer;
|
---|
156 |
|
---|
157 | /**
|
---|
158 | * The target audience for assertions.
|
---|
159 | *
|
---|
160 | * @var string
|
---|
161 | */
|
---|
162 | private $audience;
|
---|
163 |
|
---|
164 | /**
|
---|
165 | * The target sub when issuing assertions.
|
---|
166 | *
|
---|
167 | * @var string
|
---|
168 | */
|
---|
169 | private $sub;
|
---|
170 |
|
---|
171 | /**
|
---|
172 | * The number of seconds assertions are valid for.
|
---|
173 | *
|
---|
174 | * @var int
|
---|
175 | */
|
---|
176 | private $expiry;
|
---|
177 |
|
---|
178 | /**
|
---|
179 | * The signing key when using assertion profile.
|
---|
180 | *
|
---|
181 | * @var ?string
|
---|
182 | */
|
---|
183 | private $signingKey;
|
---|
184 |
|
---|
185 | /**
|
---|
186 | * The signing key id when using assertion profile. Param kid in jwt header
|
---|
187 | *
|
---|
188 | * @var string
|
---|
189 | */
|
---|
190 | private $signingKeyId;
|
---|
191 |
|
---|
192 | /**
|
---|
193 | * The signing algorithm when using an assertion profile.
|
---|
194 | *
|
---|
195 | * @var ?string
|
---|
196 | */
|
---|
197 | private $signingAlgorithm;
|
---|
198 |
|
---|
199 | /**
|
---|
200 | * The refresh token associated with the access token to be refreshed.
|
---|
201 | *
|
---|
202 | * @var ?string
|
---|
203 | */
|
---|
204 | private $refreshToken;
|
---|
205 |
|
---|
206 | /**
|
---|
207 | * The current access token.
|
---|
208 | *
|
---|
209 | * @var string
|
---|
210 | */
|
---|
211 | private $accessToken;
|
---|
212 |
|
---|
213 | /**
|
---|
214 | * The current ID token.
|
---|
215 | *
|
---|
216 | * @var string
|
---|
217 | */
|
---|
218 | private $idToken;
|
---|
219 |
|
---|
220 | /**
|
---|
221 | * The scopes granted to the current access token
|
---|
222 | *
|
---|
223 | * @var string
|
---|
224 | */
|
---|
225 | private $grantedScope;
|
---|
226 |
|
---|
227 | /**
|
---|
228 | * The lifetime in seconds of the current access token.
|
---|
229 | *
|
---|
230 | * @var ?int
|
---|
231 | */
|
---|
232 | private $expiresIn;
|
---|
233 |
|
---|
234 | /**
|
---|
235 | * The expiration time of the access token as a number of seconds since the
|
---|
236 | * unix epoch.
|
---|
237 | *
|
---|
238 | * @var ?int
|
---|
239 | */
|
---|
240 | private $expiresAt;
|
---|
241 |
|
---|
242 | /**
|
---|
243 | * The issue time of the access token as a number of seconds since the unix
|
---|
244 | * epoch.
|
---|
245 | *
|
---|
246 | * @var ?int
|
---|
247 | */
|
---|
248 | private $issuedAt;
|
---|
249 |
|
---|
250 | /**
|
---|
251 | * The current grant type.
|
---|
252 | *
|
---|
253 | * @var ?string
|
---|
254 | */
|
---|
255 | private $grantType;
|
---|
256 |
|
---|
257 | /**
|
---|
258 | * When using an extension grant type, this is the set of parameters used by
|
---|
259 | * that extension.
|
---|
260 | *
|
---|
261 | * @var array<mixed>
|
---|
262 | */
|
---|
263 | private $extensionParams;
|
---|
264 |
|
---|
265 | /**
|
---|
266 | * When using the toJwt function, these claims will be added to the JWT
|
---|
267 | * payload.
|
---|
268 | *
|
---|
269 | * @var array<mixed>
|
---|
270 | */
|
---|
271 | private $additionalClaims;
|
---|
272 |
|
---|
273 | /**
|
---|
274 | * The code verifier for PKCE for OAuth 2.0. When set, the authorization
|
---|
275 | * URI will contain the Code Challenge and Code Challenge Method querystring
|
---|
276 | * parameters, and the token URI will contain the Code Verifier parameter.
|
---|
277 | *
|
---|
278 | * @see https://datatracker.ietf.org/doc/html/rfc7636
|
---|
279 | * @var ?string
|
---|
280 | */
|
---|
281 | private $codeVerifier;
|
---|
282 |
|
---|
283 | /**
|
---|
284 | * For STS requests.
|
---|
285 | * A URI that indicates the target service or resource where the client
|
---|
286 | * intends to use the requested security token.
|
---|
287 | */
|
---|
288 | private ?string $resource;
|
---|
289 |
|
---|
290 | /**
|
---|
291 | * For STS requests.
|
---|
292 | * A fetcher for the "subject_token", which is a security token that
|
---|
293 | * represents the identity of the party on behalf of whom the request is
|
---|
294 | * being made.
|
---|
295 | */
|
---|
296 | private ?ExternalAccountCredentialSourceInterface $subjectTokenFetcher;
|
---|
297 |
|
---|
298 | /**
|
---|
299 | * For STS requests.
|
---|
300 | * An identifier, that indicates the type of the security token in the
|
---|
301 | * subjectToken parameter.
|
---|
302 | */
|
---|
303 | private ?string $subjectTokenType;
|
---|
304 |
|
---|
305 | /**
|
---|
306 | * For STS requests.
|
---|
307 | * A security token that represents the identity of the acting party.
|
---|
308 | */
|
---|
309 | private ?string $actorToken;
|
---|
310 |
|
---|
311 | /**
|
---|
312 | * For STS requests.
|
---|
313 | * An identifier that indicates the type of the security token in the
|
---|
314 | * actorToken parameter.
|
---|
315 | */
|
---|
316 | private ?string $actorTokenType;
|
---|
317 |
|
---|
318 | /**
|
---|
319 | * From STS response.
|
---|
320 | * An identifier for the representation of the issued security token.
|
---|
321 | */
|
---|
322 | private ?string $issuedTokenType = null;
|
---|
323 |
|
---|
324 | /**
|
---|
325 | * From STS response.
|
---|
326 | * An identifier for the representation of the issued security token.
|
---|
327 | *
|
---|
328 | * @var array<mixed>
|
---|
329 | */
|
---|
330 | private array $additionalOptions;
|
---|
331 |
|
---|
332 | /**
|
---|
333 | * Create a new OAuthCredentials.
|
---|
334 | *
|
---|
335 | * The configuration array accepts various options
|
---|
336 | *
|
---|
337 | * - authorizationUri
|
---|
338 | * The authorization server's HTTP endpoint capable of
|
---|
339 | * authenticating the end-user and obtaining authorization.
|
---|
340 | *
|
---|
341 | * - tokenCredentialUri
|
---|
342 | * The authorization server's HTTP endpoint capable of issuing
|
---|
343 | * tokens and refreshing expired tokens.
|
---|
344 | *
|
---|
345 | * - clientId
|
---|
346 | * A unique identifier issued to the client to identify itself to the
|
---|
347 | * authorization server.
|
---|
348 | *
|
---|
349 | * - clientSecret
|
---|
350 | * A shared symmetric secret issued by the authorization server,
|
---|
351 | * which is used to authenticate the client.
|
---|
352 | *
|
---|
353 | * - scope
|
---|
354 | * The scope of the access request, expressed either as an Array
|
---|
355 | * or as a space-delimited String.
|
---|
356 | *
|
---|
357 | * - state
|
---|
358 | * An arbitrary string designed to allow the client to maintain state.
|
---|
359 | *
|
---|
360 | * - redirectUri
|
---|
361 | * The redirection URI used in the initial request.
|
---|
362 | *
|
---|
363 | * - username
|
---|
364 | * The resource owner's username.
|
---|
365 | *
|
---|
366 | * - password
|
---|
367 | * The resource owner's password.
|
---|
368 | *
|
---|
369 | * - issuer
|
---|
370 | * Issuer ID when using assertion profile
|
---|
371 | *
|
---|
372 | * - audience
|
---|
373 | * Target audience for assertions
|
---|
374 | *
|
---|
375 | * - expiry
|
---|
376 | * Number of seconds assertions are valid for
|
---|
377 | *
|
---|
378 | * - signingKey
|
---|
379 | * Signing key when using assertion profile
|
---|
380 | *
|
---|
381 | * - signingKeyId
|
---|
382 | * Signing key id when using assertion profile
|
---|
383 | *
|
---|
384 | * - refreshToken
|
---|
385 | * The refresh token associated with the access token
|
---|
386 | * to be refreshed.
|
---|
387 | *
|
---|
388 | * - accessToken
|
---|
389 | * The current access token for this client.
|
---|
390 | *
|
---|
391 | * - idToken
|
---|
392 | * The current ID token for this client.
|
---|
393 | *
|
---|
394 | * - extensionParams
|
---|
395 | * When using an extension grant type, this is the set of parameters used
|
---|
396 | * by that extension.
|
---|
397 | *
|
---|
398 | * - codeVerifier
|
---|
399 | * The code verifier for PKCE for OAuth 2.0.
|
---|
400 | *
|
---|
401 | * - resource
|
---|
402 | * The target service or resource where the client ntends to use the
|
---|
403 | * requested security token.
|
---|
404 | *
|
---|
405 | * - subjectTokenFetcher
|
---|
406 | * A fetcher for the "subject_token", which is a security token that
|
---|
407 | * represents the identity of the party on behalf of whom the request is
|
---|
408 | * being made.
|
---|
409 | *
|
---|
410 | * - subjectTokenType
|
---|
411 | * An identifier that indicates the type of the security token in the
|
---|
412 | * subjectToken parameter.
|
---|
413 | *
|
---|
414 | * - actorToken
|
---|
415 | * A security token that represents the identity of the acting party.
|
---|
416 | *
|
---|
417 | * - actorTokenType
|
---|
418 | * An identifier for the representation of the issued security token.
|
---|
419 | *
|
---|
420 | * @param array<mixed> $config Configuration array
|
---|
421 | */
|
---|
422 | public function __construct(array $config)
|
---|
423 | {
|
---|
424 | $opts = array_merge([
|
---|
425 | 'expiry' => self::DEFAULT_EXPIRY_SECONDS,
|
---|
426 | 'extensionParams' => [],
|
---|
427 | 'authorizationUri' => null,
|
---|
428 | 'redirectUri' => null,
|
---|
429 | 'tokenCredentialUri' => null,
|
---|
430 | 'state' => null,
|
---|
431 | 'username' => null,
|
---|
432 | 'password' => null,
|
---|
433 | 'clientId' => null,
|
---|
434 | 'clientSecret' => null,
|
---|
435 | 'issuer' => null,
|
---|
436 | 'sub' => null,
|
---|
437 | 'audience' => null,
|
---|
438 | 'signingKey' => null,
|
---|
439 | 'signingKeyId' => null,
|
---|
440 | 'signingAlgorithm' => null,
|
---|
441 | 'scope' => null,
|
---|
442 | 'additionalClaims' => [],
|
---|
443 | 'codeVerifier' => null,
|
---|
444 | 'resource' => null,
|
---|
445 | 'subjectTokenFetcher' => null,
|
---|
446 | 'subjectTokenType' => null,
|
---|
447 | 'actorToken' => null,
|
---|
448 | 'actorTokenType' => null,
|
---|
449 | 'additionalOptions' => [],
|
---|
450 | ], $config);
|
---|
451 |
|
---|
452 | $this->setAuthorizationUri($opts['authorizationUri']);
|
---|
453 | $this->setRedirectUri($opts['redirectUri']);
|
---|
454 | $this->setTokenCredentialUri($opts['tokenCredentialUri']);
|
---|
455 | $this->setState($opts['state']);
|
---|
456 | $this->setUsername($opts['username']);
|
---|
457 | $this->setPassword($opts['password']);
|
---|
458 | $this->setClientId($opts['clientId']);
|
---|
459 | $this->setClientSecret($opts['clientSecret']);
|
---|
460 | $this->setIssuer($opts['issuer']);
|
---|
461 | $this->setSub($opts['sub']);
|
---|
462 | $this->setExpiry($opts['expiry']);
|
---|
463 | $this->setAudience($opts['audience']);
|
---|
464 | $this->setSigningKey($opts['signingKey']);
|
---|
465 | $this->setSigningKeyId($opts['signingKeyId']);
|
---|
466 | $this->setSigningAlgorithm($opts['signingAlgorithm']);
|
---|
467 | $this->setScope($opts['scope']);
|
---|
468 | $this->setExtensionParams($opts['extensionParams']);
|
---|
469 | $this->setAdditionalClaims($opts['additionalClaims']);
|
---|
470 | $this->setCodeVerifier($opts['codeVerifier']);
|
---|
471 |
|
---|
472 | // for STS
|
---|
473 | $this->resource = $opts['resource'];
|
---|
474 | $this->subjectTokenFetcher = $opts['subjectTokenFetcher'];
|
---|
475 | $this->subjectTokenType = $opts['subjectTokenType'];
|
---|
476 | $this->actorToken = $opts['actorToken'];
|
---|
477 | $this->actorTokenType = $opts['actorTokenType'];
|
---|
478 | $this->additionalOptions = $opts['additionalOptions'];
|
---|
479 |
|
---|
480 | $this->updateToken($opts);
|
---|
481 | }
|
---|
482 |
|
---|
483 | /**
|
---|
484 | * Verifies the idToken if present.
|
---|
485 | *
|
---|
486 | * - if none is present, return null
|
---|
487 | * - if present, but invalid, raises DomainException.
|
---|
488 | * - otherwise returns the payload in the idtoken as a PHP object.
|
---|
489 | *
|
---|
490 | * The behavior of this method varies depending on the version of
|
---|
491 | * `firebase/php-jwt` you are using. In versions 6.0 and above, you cannot
|
---|
492 | * provide multiple $allowed_algs, and instead must provide an array of Key
|
---|
493 | * objects as the $publicKey.
|
---|
494 | *
|
---|
495 | * @param string|Key|Key[] $publicKey The public key to use to authenticate the token
|
---|
496 | * @param string|array<string> $allowed_algs algorithm or array of supported verification algorithms.
|
---|
497 | * Providing more than one algorithm will throw an exception.
|
---|
498 | * @throws \DomainException if the token is missing an audience.
|
---|
499 | * @throws \DomainException if the audience does not match the one set in
|
---|
500 | * the OAuth2 class instance.
|
---|
501 | * @throws \UnexpectedValueException If the token is invalid
|
---|
502 | * @throws \InvalidArgumentException If more than one value for allowed_algs is supplied
|
---|
503 | * @throws \Firebase\JWT\SignatureInvalidException If the signature is invalid.
|
---|
504 | * @throws \Firebase\JWT\BeforeValidException If the token is not yet valid.
|
---|
505 | * @throws \Firebase\JWT\ExpiredException If the token has expired.
|
---|
506 | * @return null|object
|
---|
507 | */
|
---|
508 | public function verifyIdToken($publicKey = null, $allowed_algs = [])
|
---|
509 | {
|
---|
510 | $idToken = $this->getIdToken();
|
---|
511 | if (is_null($idToken)) {
|
---|
512 | return null;
|
---|
513 | }
|
---|
514 |
|
---|
515 | $resp = $this->jwtDecode($idToken, $publicKey, $allowed_algs);
|
---|
516 | if (!property_exists($resp, 'aud')) {
|
---|
517 | throw new \DomainException('No audience found the id token');
|
---|
518 | }
|
---|
519 | if ($resp->aud != $this->getAudience()) {
|
---|
520 | throw new \DomainException('Wrong audience present in the id token');
|
---|
521 | }
|
---|
522 |
|
---|
523 | return $resp;
|
---|
524 | }
|
---|
525 |
|
---|
526 | /**
|
---|
527 | * Obtains the encoded jwt from the instance data.
|
---|
528 | *
|
---|
529 | * @param array<mixed> $config array optional configuration parameters
|
---|
530 | * @return string
|
---|
531 | */
|
---|
532 | public function toJwt(array $config = [])
|
---|
533 | {
|
---|
534 | if (is_null($this->getSigningKey())) {
|
---|
535 | throw new \DomainException('No signing key available');
|
---|
536 | }
|
---|
537 | if (is_null($this->getSigningAlgorithm())) {
|
---|
538 | throw new \DomainException('No signing algorithm specified');
|
---|
539 | }
|
---|
540 | $now = time();
|
---|
541 |
|
---|
542 | $opts = array_merge([
|
---|
543 | 'skew' => self::DEFAULT_SKEW_SECONDS,
|
---|
544 | ], $config);
|
---|
545 |
|
---|
546 | $assertion = [
|
---|
547 | 'iss' => $this->getIssuer(),
|
---|
548 | 'exp' => ($now + $this->getExpiry()),
|
---|
549 | 'iat' => ($now - $opts['skew']),
|
---|
550 | ];
|
---|
551 | foreach ($assertion as $k => $v) {
|
---|
552 | if (is_null($v)) {
|
---|
553 | throw new \DomainException($k . ' should not be null');
|
---|
554 | }
|
---|
555 | }
|
---|
556 | if (!(is_null($this->getAudience()))) {
|
---|
557 | $assertion['aud'] = $this->getAudience();
|
---|
558 | }
|
---|
559 |
|
---|
560 | if (!(is_null($this->getScope()))) {
|
---|
561 | $assertion['scope'] = $this->getScope();
|
---|
562 | }
|
---|
563 |
|
---|
564 | if (empty($assertion['scope']) && empty($assertion['aud'])) {
|
---|
565 | throw new \DomainException('one of scope or aud should not be null');
|
---|
566 | }
|
---|
567 |
|
---|
568 | if (!(is_null($this->getSub()))) {
|
---|
569 | $assertion['sub'] = $this->getSub();
|
---|
570 | }
|
---|
571 | $assertion += $this->getAdditionalClaims();
|
---|
572 |
|
---|
573 | return JWT::encode(
|
---|
574 | $assertion,
|
---|
575 | $this->getSigningKey(),
|
---|
576 | $this->getSigningAlgorithm(),
|
---|
577 | $this->getSigningKeyId()
|
---|
578 | );
|
---|
579 | }
|
---|
580 |
|
---|
581 | /**
|
---|
582 | * Generates a request for token credentials.
|
---|
583 | *
|
---|
584 | * @param callable|null $httpHandler callback which delivers psr7 request
|
---|
585 | * @param array<mixed> $headers [optional] Additional headers to pass to
|
---|
586 | * the token endpoint request.
|
---|
587 | * @return RequestInterface the authorization Url.
|
---|
588 | */
|
---|
589 | public function generateCredentialsRequest(?callable $httpHandler = null, $headers = [])
|
---|
590 | {
|
---|
591 | $uri = $this->getTokenCredentialUri();
|
---|
592 | if (is_null($uri)) {
|
---|
593 | throw new \DomainException('No token credential URI was set.');
|
---|
594 | }
|
---|
595 |
|
---|
596 | $grantType = $this->getGrantType();
|
---|
597 | $params = ['grant_type' => $grantType];
|
---|
598 | switch ($grantType) {
|
---|
599 | case 'authorization_code':
|
---|
600 | $params['code'] = $this->getCode();
|
---|
601 | $params['redirect_uri'] = $this->getRedirectUri();
|
---|
602 | if ($this->codeVerifier) {
|
---|
603 | $params['code_verifier'] = $this->codeVerifier;
|
---|
604 | }
|
---|
605 | $this->addClientCredentials($params);
|
---|
606 | break;
|
---|
607 | case 'password':
|
---|
608 | $params['username'] = $this->getUsername();
|
---|
609 | $params['password'] = $this->getPassword();
|
---|
610 | $this->addClientCredentials($params);
|
---|
611 | break;
|
---|
612 | case 'refresh_token':
|
---|
613 | $params['refresh_token'] = $this->getRefreshToken();
|
---|
614 | if (isset($this->getAdditionalClaims()['target_audience'])) {
|
---|
615 | $params['target_audience'] = $this->getAdditionalClaims()['target_audience'];
|
---|
616 | }
|
---|
617 | $this->addClientCredentials($params);
|
---|
618 | break;
|
---|
619 | case self::JWT_URN:
|
---|
620 | $params['assertion'] = $this->toJwt();
|
---|
621 | break;
|
---|
622 | case self::STS_URN:
|
---|
623 | $token = $this->subjectTokenFetcher->fetchSubjectToken($httpHandler);
|
---|
624 | $params['subject_token'] = $token;
|
---|
625 | $params['subject_token_type'] = $this->subjectTokenType;
|
---|
626 | $params += array_filter([
|
---|
627 | 'resource' => $this->resource,
|
---|
628 | 'audience' => $this->audience,
|
---|
629 | 'scope' => $this->getScope(),
|
---|
630 | 'requested_token_type' => self::STS_REQUESTED_TOKEN_TYPE,
|
---|
631 | 'actor_token' => $this->actorToken,
|
---|
632 | 'actor_token_type' => $this->actorTokenType,
|
---|
633 | ]);
|
---|
634 | if ($this->additionalOptions) {
|
---|
635 | $params['options'] = json_encode($this->additionalOptions);
|
---|
636 | }
|
---|
637 | break;
|
---|
638 | default:
|
---|
639 | if (!is_null($this->getRedirectUri())) {
|
---|
640 | # Grant type was supposed to be 'authorization_code', as there
|
---|
641 | # is a redirect URI.
|
---|
642 | throw new \DomainException('Missing authorization code');
|
---|
643 | }
|
---|
644 | unset($params['grant_type']);
|
---|
645 | if (!is_null($grantType)) {
|
---|
646 | $params['grant_type'] = $grantType;
|
---|
647 | }
|
---|
648 | $params = array_merge($params, $this->getExtensionParams());
|
---|
649 | }
|
---|
650 |
|
---|
651 | $headers = [
|
---|
652 | 'Cache-Control' => 'no-store',
|
---|
653 | 'Content-Type' => 'application/x-www-form-urlencoded',
|
---|
654 | ] + $headers;
|
---|
655 |
|
---|
656 | return new Request(
|
---|
657 | 'POST',
|
---|
658 | $uri,
|
---|
659 | $headers,
|
---|
660 | Query::build($params)
|
---|
661 | );
|
---|
662 | }
|
---|
663 |
|
---|
664 | /**
|
---|
665 | * Fetches the auth tokens based on the current state.
|
---|
666 | *
|
---|
667 | * @param callable|null $httpHandler callback which delivers psr7 request
|
---|
668 | * @param array<mixed> $headers [optional] If present, add these headers to the token
|
---|
669 | * endpoint request.
|
---|
670 | * @return array<mixed> the response
|
---|
671 | */
|
---|
672 | public function fetchAuthToken(?callable $httpHandler = null, $headers = [])
|
---|
673 | {
|
---|
674 | if (is_null($httpHandler)) {
|
---|
675 | $httpHandler = HttpHandlerFactory::build(HttpClientCache::getHttpClient());
|
---|
676 | }
|
---|
677 |
|
---|
678 | $response = $httpHandler($this->generateCredentialsRequest($httpHandler, $headers));
|
---|
679 | $credentials = $this->parseTokenResponse($response);
|
---|
680 | $this->updateToken($credentials);
|
---|
681 | if (isset($credentials['scope'])) {
|
---|
682 | $this->setGrantedScope($credentials['scope']);
|
---|
683 | }
|
---|
684 |
|
---|
685 | return $credentials;
|
---|
686 | }
|
---|
687 |
|
---|
688 | /**
|
---|
689 | * @deprecated
|
---|
690 | *
|
---|
691 | * Obtains a key that can used to cache the results of #fetchAuthToken.
|
---|
692 | *
|
---|
693 | * The key is derived from the scopes.
|
---|
694 | *
|
---|
695 | * @return ?string a key that may be used to cache the auth token.
|
---|
696 | */
|
---|
697 | public function getCacheKey()
|
---|
698 | {
|
---|
699 | if (is_array($this->scope)) {
|
---|
700 | return implode(':', $this->scope);
|
---|
701 | }
|
---|
702 |
|
---|
703 | if ($this->audience) {
|
---|
704 | return $this->audience;
|
---|
705 | }
|
---|
706 |
|
---|
707 | // If scope has not set, return null to indicate no caching.
|
---|
708 | return null;
|
---|
709 | }
|
---|
710 |
|
---|
711 | /**
|
---|
712 | * Gets this instance's SubjectTokenFetcher
|
---|
713 | *
|
---|
714 | * @return null|ExternalAccountCredentialSourceInterface
|
---|
715 | */
|
---|
716 | public function getSubjectTokenFetcher(): ?ExternalAccountCredentialSourceInterface
|
---|
717 | {
|
---|
718 | return $this->subjectTokenFetcher;
|
---|
719 | }
|
---|
720 |
|
---|
721 | /**
|
---|
722 | * Parses the fetched tokens.
|
---|
723 | *
|
---|
724 | * @param ResponseInterface $resp the response.
|
---|
725 | * @return array<mixed> the tokens parsed from the response body.
|
---|
726 | * @throws \Exception
|
---|
727 | */
|
---|
728 | public function parseTokenResponse(ResponseInterface $resp)
|
---|
729 | {
|
---|
730 | $body = (string) $resp->getBody();
|
---|
731 | if ($resp->hasHeader('Content-Type') &&
|
---|
732 | $resp->getHeaderLine('Content-Type') == 'application/x-www-form-urlencoded'
|
---|
733 | ) {
|
---|
734 | $res = [];
|
---|
735 | parse_str($body, $res);
|
---|
736 |
|
---|
737 | return $res;
|
---|
738 | }
|
---|
739 |
|
---|
740 | // Assume it's JSON; if it's not throw an exception
|
---|
741 | if (null === $res = json_decode($body, true)) {
|
---|
742 | throw new \Exception('Invalid JSON response');
|
---|
743 | }
|
---|
744 |
|
---|
745 | return $res;
|
---|
746 | }
|
---|
747 |
|
---|
748 | /**
|
---|
749 | * Updates an OAuth 2.0 client.
|
---|
750 | *
|
---|
751 | * Example:
|
---|
752 | * ```
|
---|
753 | * $oauth->updateToken([
|
---|
754 | * 'refresh_token' => 'n4E9O119d',
|
---|
755 | * 'access_token' => 'FJQbwq9',
|
---|
756 | * 'expires_in' => 3600
|
---|
757 | * ]);
|
---|
758 | * ```
|
---|
759 | *
|
---|
760 | * @param array<mixed> $config
|
---|
761 | * The configuration parameters related to the token.
|
---|
762 | *
|
---|
763 | * - refresh_token
|
---|
764 | * The refresh token associated with the access token
|
---|
765 | * to be refreshed.
|
---|
766 | *
|
---|
767 | * - access_token
|
---|
768 | * The current access token for this client.
|
---|
769 | *
|
---|
770 | * - id_token
|
---|
771 | * The current ID token for this client.
|
---|
772 | *
|
---|
773 | * - expires_in
|
---|
774 | * The time in seconds until access token expiration.
|
---|
775 | *
|
---|
776 | * - expires_at
|
---|
777 | * The time as an integer number of seconds since the Epoch
|
---|
778 | *
|
---|
779 | * - issued_at
|
---|
780 | * The timestamp that the token was issued at.
|
---|
781 | * @return void
|
---|
782 | */
|
---|
783 | public function updateToken(array $config)
|
---|
784 | {
|
---|
785 | $opts = array_merge([
|
---|
786 | 'extensionParams' => [],
|
---|
787 | 'access_token' => null,
|
---|
788 | 'id_token' => null,
|
---|
789 | 'expires_in' => null,
|
---|
790 | 'expires_at' => null,
|
---|
791 | 'issued_at' => null,
|
---|
792 | 'scope' => null,
|
---|
793 | ], $config);
|
---|
794 |
|
---|
795 | $this->setExpiresAt($opts['expires_at']);
|
---|
796 | $this->setExpiresIn($opts['expires_in']);
|
---|
797 | // By default, the token is issued at `Time.now` when `expiresIn` is set,
|
---|
798 | // but this can be used to supply a more precise time.
|
---|
799 | if (!is_null($opts['issued_at'])) {
|
---|
800 | $this->setIssuedAt($opts['issued_at']);
|
---|
801 | }
|
---|
802 |
|
---|
803 | $this->setAccessToken($opts['access_token']);
|
---|
804 | $this->setIdToken($opts['id_token']);
|
---|
805 |
|
---|
806 | // The refresh token should only be updated if a value is explicitly
|
---|
807 | // passed in, as some access token responses do not include a refresh
|
---|
808 | // token.
|
---|
809 | if (array_key_exists('refresh_token', $opts)) {
|
---|
810 | $this->setRefreshToken($opts['refresh_token']);
|
---|
811 | }
|
---|
812 |
|
---|
813 | // Required for STS response. An identifier for the representation of
|
---|
814 | // the issued security token.
|
---|
815 | if (array_key_exists('issued_token_type', $opts)) {
|
---|
816 | $this->issuedTokenType = $opts['issued_token_type'];
|
---|
817 | }
|
---|
818 | }
|
---|
819 |
|
---|
820 | /**
|
---|
821 | * Builds the authorization Uri that the user should be redirected to.
|
---|
822 | *
|
---|
823 | * @param array<mixed> $config configuration options that customize the return url.
|
---|
824 | * @return UriInterface the authorization Url.
|
---|
825 | * @throws InvalidArgumentException
|
---|
826 | */
|
---|
827 | public function buildFullAuthorizationUri(array $config = [])
|
---|
828 | {
|
---|
829 | if (is_null($this->getAuthorizationUri())) {
|
---|
830 | throw new InvalidArgumentException(
|
---|
831 | 'requires an authorizationUri to have been set'
|
---|
832 | );
|
---|
833 | }
|
---|
834 |
|
---|
835 | $params = array_merge([
|
---|
836 | 'response_type' => 'code',
|
---|
837 | 'access_type' => 'offline',
|
---|
838 | 'client_id' => $this->clientId,
|
---|
839 | 'redirect_uri' => $this->redirectUri,
|
---|
840 | 'state' => $this->state,
|
---|
841 | 'scope' => $this->getScope(),
|
---|
842 | ], $config);
|
---|
843 |
|
---|
844 | // Validate the auth_params
|
---|
845 | if (is_null($params['client_id'])) {
|
---|
846 | throw new InvalidArgumentException(
|
---|
847 | 'missing the required client identifier'
|
---|
848 | );
|
---|
849 | }
|
---|
850 | if (is_null($params['redirect_uri'])) {
|
---|
851 | throw new InvalidArgumentException('missing the required redirect URI');
|
---|
852 | }
|
---|
853 | if (!empty($params['prompt']) && !empty($params['approval_prompt'])) {
|
---|
854 | throw new InvalidArgumentException(
|
---|
855 | 'prompt and approval_prompt are mutually exclusive'
|
---|
856 | );
|
---|
857 | }
|
---|
858 | if ($this->codeVerifier) {
|
---|
859 | $params['code_challenge'] = $this->getCodeChallenge($this->codeVerifier);
|
---|
860 | $params['code_challenge_method'] = $this->getCodeChallengeMethod();
|
---|
861 | }
|
---|
862 |
|
---|
863 | // Construct the uri object; return it if it is valid.
|
---|
864 | $result = clone $this->authorizationUri;
|
---|
865 | $existingParams = Query::parse($result->getQuery());
|
---|
866 |
|
---|
867 | $result = $result->withQuery(
|
---|
868 | Query::build(array_merge($existingParams, $params))
|
---|
869 | );
|
---|
870 |
|
---|
871 | if ($result->getScheme() != 'https') {
|
---|
872 | throw new InvalidArgumentException(
|
---|
873 | 'Authorization endpoint must be protected by TLS'
|
---|
874 | );
|
---|
875 | }
|
---|
876 |
|
---|
877 | return $result;
|
---|
878 | }
|
---|
879 |
|
---|
880 | /**
|
---|
881 | * @return string|null
|
---|
882 | */
|
---|
883 | public function getCodeVerifier(): ?string
|
---|
884 | {
|
---|
885 | return $this->codeVerifier;
|
---|
886 | }
|
---|
887 |
|
---|
888 | /**
|
---|
889 | * A cryptographically random string that is used to correlate the
|
---|
890 | * authorization request to the token request.
|
---|
891 | *
|
---|
892 | * The code verifier for PKCE for OAuth 2.0. When set, the authorization
|
---|
893 | * URI will contain the Code Challenge and Code Challenge Method querystring
|
---|
894 | * parameters, and the token URI will contain the Code Verifier parameter.
|
---|
895 | *
|
---|
896 | * @see https://datatracker.ietf.org/doc/html/rfc7636
|
---|
897 | *
|
---|
898 | * @param string|null $codeVerifier
|
---|
899 | */
|
---|
900 | public function setCodeVerifier(?string $codeVerifier): void
|
---|
901 | {
|
---|
902 | $this->codeVerifier = $codeVerifier;
|
---|
903 | }
|
---|
904 |
|
---|
905 | /**
|
---|
906 | * Generates a random 128-character string for the "code_verifier" parameter
|
---|
907 | * in PKCE for OAuth 2.0. This is a cryptographically random string that is
|
---|
908 | * determined using random_int, hashed using "hash" and sha256, and base64
|
---|
909 | * encoded.
|
---|
910 | *
|
---|
911 | * When this method is called, the code verifier is set on the object.
|
---|
912 | *
|
---|
913 | * @return string
|
---|
914 | */
|
---|
915 | public function generateCodeVerifier(): string
|
---|
916 | {
|
---|
917 | return $this->codeVerifier = $this->generateRandomString(128);
|
---|
918 | }
|
---|
919 |
|
---|
920 | private function getCodeChallenge(string $randomString): string
|
---|
921 | {
|
---|
922 | return rtrim(strtr(base64_encode(hash('sha256', $randomString, true)), '+/', '-_'), '=');
|
---|
923 | }
|
---|
924 |
|
---|
925 | private function getCodeChallengeMethod(): string
|
---|
926 | {
|
---|
927 | return 'S256';
|
---|
928 | }
|
---|
929 |
|
---|
930 | private function generateRandomString(int $length): string
|
---|
931 | {
|
---|
932 | $validChars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~';
|
---|
933 | $validCharsLen = strlen($validChars);
|
---|
934 | $str = '';
|
---|
935 | $i = 0;
|
---|
936 | while ($i++ < $length) {
|
---|
937 | $str .= $validChars[random_int(0, $validCharsLen - 1)];
|
---|
938 | }
|
---|
939 | return $str;
|
---|
940 | }
|
---|
941 |
|
---|
942 | /**
|
---|
943 | * Sets the authorization server's HTTP endpoint capable of authenticating
|
---|
944 | * the end-user and obtaining authorization.
|
---|
945 | *
|
---|
946 | * @param string $uri
|
---|
947 | * @return void
|
---|
948 | */
|
---|
949 | public function setAuthorizationUri($uri)
|
---|
950 | {
|
---|
951 | $this->authorizationUri = $this->coerceUri($uri);
|
---|
952 | }
|
---|
953 |
|
---|
954 | /**
|
---|
955 | * Gets the authorization server's HTTP endpoint capable of authenticating
|
---|
956 | * the end-user and obtaining authorization.
|
---|
957 | *
|
---|
958 | * @return ?UriInterface
|
---|
959 | */
|
---|
960 | public function getAuthorizationUri()
|
---|
961 | {
|
---|
962 | return $this->authorizationUri;
|
---|
963 | }
|
---|
964 |
|
---|
965 | /**
|
---|
966 | * Gets the authorization server's HTTP endpoint capable of issuing tokens
|
---|
967 | * and refreshing expired tokens.
|
---|
968 | *
|
---|
969 | * @return ?UriInterface
|
---|
970 | */
|
---|
971 | public function getTokenCredentialUri()
|
---|
972 | {
|
---|
973 | return $this->tokenCredentialUri;
|
---|
974 | }
|
---|
975 |
|
---|
976 | /**
|
---|
977 | * Sets the authorization server's HTTP endpoint capable of issuing tokens
|
---|
978 | * and refreshing expired tokens.
|
---|
979 | *
|
---|
980 | * @param string $uri
|
---|
981 | * @return void
|
---|
982 | */
|
---|
983 | public function setTokenCredentialUri($uri)
|
---|
984 | {
|
---|
985 | $this->tokenCredentialUri = $this->coerceUri($uri);
|
---|
986 | }
|
---|
987 |
|
---|
988 | /**
|
---|
989 | * Gets the redirection URI used in the initial request.
|
---|
990 | *
|
---|
991 | * @return ?string
|
---|
992 | */
|
---|
993 | public function getRedirectUri()
|
---|
994 | {
|
---|
995 | return $this->redirectUri;
|
---|
996 | }
|
---|
997 |
|
---|
998 | /**
|
---|
999 | * Sets the redirection URI used in the initial request.
|
---|
1000 | *
|
---|
1001 | * @param ?string $uri
|
---|
1002 | * @return void
|
---|
1003 | */
|
---|
1004 | public function setRedirectUri($uri)
|
---|
1005 | {
|
---|
1006 | if (is_null($uri)) {
|
---|
1007 | $this->redirectUri = null;
|
---|
1008 |
|
---|
1009 | return;
|
---|
1010 | }
|
---|
1011 | // redirect URI must be absolute
|
---|
1012 | if (!$this->isAbsoluteUri($uri)) {
|
---|
1013 | // "postmessage" is a reserved URI string in Google-land
|
---|
1014 | // @see https://developers.google.com/identity/sign-in/web/server-side-flow
|
---|
1015 | if ('postmessage' !== (string) $uri) {
|
---|
1016 | throw new InvalidArgumentException(
|
---|
1017 | 'Redirect URI must be absolute'
|
---|
1018 | );
|
---|
1019 | }
|
---|
1020 | }
|
---|
1021 | $this->redirectUri = (string) $uri;
|
---|
1022 | }
|
---|
1023 |
|
---|
1024 | /**
|
---|
1025 | * Gets the scope of the access requests as a space-delimited String.
|
---|
1026 | *
|
---|
1027 | * @return ?string
|
---|
1028 | */
|
---|
1029 | public function getScope()
|
---|
1030 | {
|
---|
1031 | if (is_null($this->scope)) {
|
---|
1032 | return $this->scope;
|
---|
1033 | }
|
---|
1034 |
|
---|
1035 | return implode(' ', $this->scope);
|
---|
1036 | }
|
---|
1037 |
|
---|
1038 | /**
|
---|
1039 | * Gets the subject token type
|
---|
1040 | *
|
---|
1041 | * @return ?string
|
---|
1042 | */
|
---|
1043 | public function getSubjectTokenType(): ?string
|
---|
1044 | {
|
---|
1045 | return $this->subjectTokenType;
|
---|
1046 | }
|
---|
1047 |
|
---|
1048 | /**
|
---|
1049 | * Sets the scope of the access request, expressed either as an Array or as
|
---|
1050 | * a space-delimited String.
|
---|
1051 | *
|
---|
1052 | * @param string|array<string>|null $scope
|
---|
1053 | * @return void
|
---|
1054 | * @throws InvalidArgumentException
|
---|
1055 | */
|
---|
1056 | public function setScope($scope)
|
---|
1057 | {
|
---|
1058 | if (is_null($scope)) {
|
---|
1059 | $this->scope = null;
|
---|
1060 | } elseif (is_string($scope)) {
|
---|
1061 | $this->scope = explode(' ', $scope);
|
---|
1062 | } elseif (is_array($scope)) {
|
---|
1063 | foreach ($scope as $s) {
|
---|
1064 | $pos = strpos($s, ' ');
|
---|
1065 | if ($pos !== false) {
|
---|
1066 | throw new InvalidArgumentException(
|
---|
1067 | 'array scope values should not contain spaces'
|
---|
1068 | );
|
---|
1069 | }
|
---|
1070 | }
|
---|
1071 | $this->scope = $scope;
|
---|
1072 | } else {
|
---|
1073 | throw new InvalidArgumentException(
|
---|
1074 | 'scopes should be a string or array of strings'
|
---|
1075 | );
|
---|
1076 | }
|
---|
1077 | }
|
---|
1078 |
|
---|
1079 | /**
|
---|
1080 | * Gets the current grant type.
|
---|
1081 | *
|
---|
1082 | * @return ?string
|
---|
1083 | */
|
---|
1084 | public function getGrantType()
|
---|
1085 | {
|
---|
1086 | if (!is_null($this->grantType)) {
|
---|
1087 | return $this->grantType;
|
---|
1088 | }
|
---|
1089 |
|
---|
1090 | // Returns the inferred grant type, based on the current object instance
|
---|
1091 | // state.
|
---|
1092 | if (!is_null($this->code)) {
|
---|
1093 | return 'authorization_code';
|
---|
1094 | }
|
---|
1095 |
|
---|
1096 | if (!is_null($this->refreshToken)) {
|
---|
1097 | return 'refresh_token';
|
---|
1098 | }
|
---|
1099 |
|
---|
1100 | if (!is_null($this->username) && !is_null($this->password)) {
|
---|
1101 | return 'password';
|
---|
1102 | }
|
---|
1103 |
|
---|
1104 | if (!is_null($this->issuer) && !is_null($this->signingKey)) {
|
---|
1105 | return self::JWT_URN;
|
---|
1106 | }
|
---|
1107 |
|
---|
1108 | if (!is_null($this->subjectTokenFetcher) && !is_null($this->subjectTokenType)) {
|
---|
1109 | return self::STS_URN;
|
---|
1110 | }
|
---|
1111 |
|
---|
1112 | return null;
|
---|
1113 | }
|
---|
1114 |
|
---|
1115 | /**
|
---|
1116 | * Sets the current grant type.
|
---|
1117 | *
|
---|
1118 | * @param string $grantType
|
---|
1119 | * @return void
|
---|
1120 | * @throws InvalidArgumentException
|
---|
1121 | */
|
---|
1122 | public function setGrantType($grantType)
|
---|
1123 | {
|
---|
1124 | if (in_array($grantType, self::$knownGrantTypes)) {
|
---|
1125 | $this->grantType = $grantType;
|
---|
1126 | } else {
|
---|
1127 | // validate URI
|
---|
1128 | if (!$this->isAbsoluteUri($grantType)) {
|
---|
1129 | throw new InvalidArgumentException(
|
---|
1130 | 'invalid grant type'
|
---|
1131 | );
|
---|
1132 | }
|
---|
1133 | $this->grantType = (string) $grantType;
|
---|
1134 | }
|
---|
1135 | }
|
---|
1136 |
|
---|
1137 | /**
|
---|
1138 | * Gets an arbitrary string designed to allow the client to maintain state.
|
---|
1139 | *
|
---|
1140 | * @return string
|
---|
1141 | */
|
---|
1142 | public function getState()
|
---|
1143 | {
|
---|
1144 | return $this->state;
|
---|
1145 | }
|
---|
1146 |
|
---|
1147 | /**
|
---|
1148 | * Sets an arbitrary string designed to allow the client to maintain state.
|
---|
1149 | *
|
---|
1150 | * @param string $state
|
---|
1151 | * @return void
|
---|
1152 | */
|
---|
1153 | public function setState($state)
|
---|
1154 | {
|
---|
1155 | $this->state = $state;
|
---|
1156 | }
|
---|
1157 |
|
---|
1158 | /**
|
---|
1159 | * Gets the authorization code issued to this client.
|
---|
1160 | *
|
---|
1161 | * @return string
|
---|
1162 | */
|
---|
1163 | public function getCode()
|
---|
1164 | {
|
---|
1165 | return $this->code;
|
---|
1166 | }
|
---|
1167 |
|
---|
1168 | /**
|
---|
1169 | * Sets the authorization code issued to this client.
|
---|
1170 | *
|
---|
1171 | * @param string $code
|
---|
1172 | * @return void
|
---|
1173 | */
|
---|
1174 | public function setCode($code)
|
---|
1175 | {
|
---|
1176 | $this->code = $code;
|
---|
1177 | }
|
---|
1178 |
|
---|
1179 | /**
|
---|
1180 | * Gets the resource owner's username.
|
---|
1181 | *
|
---|
1182 | * @return string
|
---|
1183 | */
|
---|
1184 | public function getUsername()
|
---|
1185 | {
|
---|
1186 | return $this->username;
|
---|
1187 | }
|
---|
1188 |
|
---|
1189 | /**
|
---|
1190 | * Sets the resource owner's username.
|
---|
1191 | *
|
---|
1192 | * @param string $username
|
---|
1193 | * @return void
|
---|
1194 | */
|
---|
1195 | public function setUsername($username)
|
---|
1196 | {
|
---|
1197 | $this->username = $username;
|
---|
1198 | }
|
---|
1199 |
|
---|
1200 | /**
|
---|
1201 | * Gets the resource owner's password.
|
---|
1202 | *
|
---|
1203 | * @return string
|
---|
1204 | */
|
---|
1205 | public function getPassword()
|
---|
1206 | {
|
---|
1207 | return $this->password;
|
---|
1208 | }
|
---|
1209 |
|
---|
1210 | /**
|
---|
1211 | * Sets the resource owner's password.
|
---|
1212 | *
|
---|
1213 | * @param string $password
|
---|
1214 | * @return void
|
---|
1215 | */
|
---|
1216 | public function setPassword($password)
|
---|
1217 | {
|
---|
1218 | $this->password = $password;
|
---|
1219 | }
|
---|
1220 |
|
---|
1221 | /**
|
---|
1222 | * Sets a unique identifier issued to the client to identify itself to the
|
---|
1223 | * authorization server.
|
---|
1224 | *
|
---|
1225 | * @return string
|
---|
1226 | */
|
---|
1227 | public function getClientId()
|
---|
1228 | {
|
---|
1229 | return $this->clientId;
|
---|
1230 | }
|
---|
1231 |
|
---|
1232 | /**
|
---|
1233 | * Sets a unique identifier issued to the client to identify itself to the
|
---|
1234 | * authorization server.
|
---|
1235 | *
|
---|
1236 | * @param string $clientId
|
---|
1237 | * @return void
|
---|
1238 | */
|
---|
1239 | public function setClientId($clientId)
|
---|
1240 | {
|
---|
1241 | $this->clientId = $clientId;
|
---|
1242 | }
|
---|
1243 |
|
---|
1244 | /**
|
---|
1245 | * Gets a shared symmetric secret issued by the authorization server, which
|
---|
1246 | * is used to authenticate the client.
|
---|
1247 | *
|
---|
1248 | * @return string
|
---|
1249 | */
|
---|
1250 | public function getClientSecret()
|
---|
1251 | {
|
---|
1252 | return $this->clientSecret;
|
---|
1253 | }
|
---|
1254 |
|
---|
1255 | /**
|
---|
1256 | * Sets a shared symmetric secret issued by the authorization server, which
|
---|
1257 | * is used to authenticate the client.
|
---|
1258 | *
|
---|
1259 | * @param string $clientSecret
|
---|
1260 | * @return void
|
---|
1261 | */
|
---|
1262 | public function setClientSecret($clientSecret)
|
---|
1263 | {
|
---|
1264 | $this->clientSecret = $clientSecret;
|
---|
1265 | }
|
---|
1266 |
|
---|
1267 | /**
|
---|
1268 | * Gets the Issuer ID when using assertion profile.
|
---|
1269 | *
|
---|
1270 | * @return ?string
|
---|
1271 | */
|
---|
1272 | public function getIssuer()
|
---|
1273 | {
|
---|
1274 | return $this->issuer;
|
---|
1275 | }
|
---|
1276 |
|
---|
1277 | /**
|
---|
1278 | * Sets the Issuer ID when using assertion profile.
|
---|
1279 | *
|
---|
1280 | * @param string $issuer
|
---|
1281 | * @return void
|
---|
1282 | */
|
---|
1283 | public function setIssuer($issuer)
|
---|
1284 | {
|
---|
1285 | $this->issuer = $issuer;
|
---|
1286 | }
|
---|
1287 |
|
---|
1288 | /**
|
---|
1289 | * Gets the target sub when issuing assertions.
|
---|
1290 | *
|
---|
1291 | * @return ?string
|
---|
1292 | */
|
---|
1293 | public function getSub()
|
---|
1294 | {
|
---|
1295 | return $this->sub;
|
---|
1296 | }
|
---|
1297 |
|
---|
1298 | /**
|
---|
1299 | * Sets the target sub when issuing assertions.
|
---|
1300 | *
|
---|
1301 | * @param string $sub
|
---|
1302 | * @return void
|
---|
1303 | */
|
---|
1304 | public function setSub($sub)
|
---|
1305 | {
|
---|
1306 | $this->sub = $sub;
|
---|
1307 | }
|
---|
1308 |
|
---|
1309 | /**
|
---|
1310 | * Gets the target audience when issuing assertions.
|
---|
1311 | *
|
---|
1312 | * @return ?string
|
---|
1313 | */
|
---|
1314 | public function getAudience()
|
---|
1315 | {
|
---|
1316 | return $this->audience;
|
---|
1317 | }
|
---|
1318 |
|
---|
1319 | /**
|
---|
1320 | * Sets the target audience when issuing assertions.
|
---|
1321 | *
|
---|
1322 | * @param string $audience
|
---|
1323 | * @return void
|
---|
1324 | */
|
---|
1325 | public function setAudience($audience)
|
---|
1326 | {
|
---|
1327 | $this->audience = $audience;
|
---|
1328 | }
|
---|
1329 |
|
---|
1330 | /**
|
---|
1331 | * Gets the signing key when using an assertion profile.
|
---|
1332 | *
|
---|
1333 | * @return ?string
|
---|
1334 | */
|
---|
1335 | public function getSigningKey()
|
---|
1336 | {
|
---|
1337 | return $this->signingKey;
|
---|
1338 | }
|
---|
1339 |
|
---|
1340 | /**
|
---|
1341 | * Sets the signing key when using an assertion profile.
|
---|
1342 | *
|
---|
1343 | * @param string $signingKey
|
---|
1344 | * @return void
|
---|
1345 | */
|
---|
1346 | public function setSigningKey($signingKey)
|
---|
1347 | {
|
---|
1348 | $this->signingKey = $signingKey;
|
---|
1349 | }
|
---|
1350 |
|
---|
1351 | /**
|
---|
1352 | * Gets the signing key id when using an assertion profile.
|
---|
1353 | *
|
---|
1354 | * @return ?string
|
---|
1355 | */
|
---|
1356 | public function getSigningKeyId()
|
---|
1357 | {
|
---|
1358 | return $this->signingKeyId;
|
---|
1359 | }
|
---|
1360 |
|
---|
1361 | /**
|
---|
1362 | * Sets the signing key id when using an assertion profile.
|
---|
1363 | *
|
---|
1364 | * @param string $signingKeyId
|
---|
1365 | * @return void
|
---|
1366 | */
|
---|
1367 | public function setSigningKeyId($signingKeyId)
|
---|
1368 | {
|
---|
1369 | $this->signingKeyId = $signingKeyId;
|
---|
1370 | }
|
---|
1371 |
|
---|
1372 | /**
|
---|
1373 | * Gets the signing algorithm when using an assertion profile.
|
---|
1374 | *
|
---|
1375 | * @return ?string
|
---|
1376 | */
|
---|
1377 | public function getSigningAlgorithm()
|
---|
1378 | {
|
---|
1379 | return $this->signingAlgorithm;
|
---|
1380 | }
|
---|
1381 |
|
---|
1382 | /**
|
---|
1383 | * Sets the signing algorithm when using an assertion profile.
|
---|
1384 | *
|
---|
1385 | * @param ?string $signingAlgorithm
|
---|
1386 | * @return void
|
---|
1387 | */
|
---|
1388 | public function setSigningAlgorithm($signingAlgorithm)
|
---|
1389 | {
|
---|
1390 | if (is_null($signingAlgorithm)) {
|
---|
1391 | $this->signingAlgorithm = null;
|
---|
1392 | } elseif (!in_array($signingAlgorithm, self::$knownSigningAlgorithms)) {
|
---|
1393 | throw new InvalidArgumentException('unknown signing algorithm');
|
---|
1394 | } else {
|
---|
1395 | $this->signingAlgorithm = $signingAlgorithm;
|
---|
1396 | }
|
---|
1397 | }
|
---|
1398 |
|
---|
1399 | /**
|
---|
1400 | * Gets the set of parameters used by extension when using an extension
|
---|
1401 | * grant type.
|
---|
1402 | *
|
---|
1403 | * @return array<mixed>
|
---|
1404 | */
|
---|
1405 | public function getExtensionParams()
|
---|
1406 | {
|
---|
1407 | return $this->extensionParams;
|
---|
1408 | }
|
---|
1409 |
|
---|
1410 | /**
|
---|
1411 | * Sets the set of parameters used by extension when using an extension
|
---|
1412 | * grant type.
|
---|
1413 | *
|
---|
1414 | * @param array<mixed> $extensionParams
|
---|
1415 | * @return void
|
---|
1416 | */
|
---|
1417 | public function setExtensionParams($extensionParams)
|
---|
1418 | {
|
---|
1419 | $this->extensionParams = $extensionParams;
|
---|
1420 | }
|
---|
1421 |
|
---|
1422 | /**
|
---|
1423 | * Gets the number of seconds assertions are valid for.
|
---|
1424 | *
|
---|
1425 | * @return int
|
---|
1426 | */
|
---|
1427 | public function getExpiry()
|
---|
1428 | {
|
---|
1429 | return $this->expiry;
|
---|
1430 | }
|
---|
1431 |
|
---|
1432 | /**
|
---|
1433 | * Sets the number of seconds assertions are valid for.
|
---|
1434 | *
|
---|
1435 | * @param int $expiry
|
---|
1436 | * @return void
|
---|
1437 | */
|
---|
1438 | public function setExpiry($expiry)
|
---|
1439 | {
|
---|
1440 | $this->expiry = $expiry;
|
---|
1441 | }
|
---|
1442 |
|
---|
1443 | /**
|
---|
1444 | * Gets the lifetime of the access token in seconds.
|
---|
1445 | *
|
---|
1446 | * @return int
|
---|
1447 | */
|
---|
1448 | public function getExpiresIn()
|
---|
1449 | {
|
---|
1450 | return $this->expiresIn;
|
---|
1451 | }
|
---|
1452 |
|
---|
1453 | /**
|
---|
1454 | * Sets the lifetime of the access token in seconds.
|
---|
1455 | *
|
---|
1456 | * @param ?int $expiresIn
|
---|
1457 | * @return void
|
---|
1458 | */
|
---|
1459 | public function setExpiresIn($expiresIn)
|
---|
1460 | {
|
---|
1461 | if (is_null($expiresIn)) {
|
---|
1462 | $this->expiresIn = null;
|
---|
1463 | $this->issuedAt = null;
|
---|
1464 | } else {
|
---|
1465 | $this->issuedAt = time();
|
---|
1466 | $this->expiresIn = (int) $expiresIn;
|
---|
1467 | }
|
---|
1468 | }
|
---|
1469 |
|
---|
1470 | /**
|
---|
1471 | * Gets the time the current access token expires at.
|
---|
1472 | *
|
---|
1473 | * @return ?int
|
---|
1474 | */
|
---|
1475 | public function getExpiresAt()
|
---|
1476 | {
|
---|
1477 | if (!is_null($this->expiresAt)) {
|
---|
1478 | return $this->expiresAt;
|
---|
1479 | }
|
---|
1480 |
|
---|
1481 | if (!is_null($this->issuedAt) && !is_null($this->expiresIn)) {
|
---|
1482 | return $this->issuedAt + $this->expiresIn;
|
---|
1483 | }
|
---|
1484 |
|
---|
1485 | return null;
|
---|
1486 | }
|
---|
1487 |
|
---|
1488 | /**
|
---|
1489 | * Returns true if the acccess token has expired.
|
---|
1490 | *
|
---|
1491 | * @return bool
|
---|
1492 | */
|
---|
1493 | public function isExpired()
|
---|
1494 | {
|
---|
1495 | $expiration = $this->getExpiresAt();
|
---|
1496 | $now = time();
|
---|
1497 |
|
---|
1498 | return !is_null($expiration) && $now >= $expiration;
|
---|
1499 | }
|
---|
1500 |
|
---|
1501 | /**
|
---|
1502 | * Sets the time the current access token expires at.
|
---|
1503 | *
|
---|
1504 | * @param int $expiresAt
|
---|
1505 | * @return void
|
---|
1506 | */
|
---|
1507 | public function setExpiresAt($expiresAt)
|
---|
1508 | {
|
---|
1509 | $this->expiresAt = $expiresAt;
|
---|
1510 | }
|
---|
1511 |
|
---|
1512 | /**
|
---|
1513 | * Gets the time the current access token was issued at.
|
---|
1514 | *
|
---|
1515 | * @return ?int
|
---|
1516 | */
|
---|
1517 | public function getIssuedAt()
|
---|
1518 | {
|
---|
1519 | return $this->issuedAt;
|
---|
1520 | }
|
---|
1521 |
|
---|
1522 | /**
|
---|
1523 | * Sets the time the current access token was issued at.
|
---|
1524 | *
|
---|
1525 | * @param int $issuedAt
|
---|
1526 | * @return void
|
---|
1527 | */
|
---|
1528 | public function setIssuedAt($issuedAt)
|
---|
1529 | {
|
---|
1530 | $this->issuedAt = $issuedAt;
|
---|
1531 | }
|
---|
1532 |
|
---|
1533 | /**
|
---|
1534 | * Gets the current access token.
|
---|
1535 | *
|
---|
1536 | * @return ?string
|
---|
1537 | */
|
---|
1538 | public function getAccessToken()
|
---|
1539 | {
|
---|
1540 | return $this->accessToken;
|
---|
1541 | }
|
---|
1542 |
|
---|
1543 | /**
|
---|
1544 | * Sets the current access token.
|
---|
1545 | *
|
---|
1546 | * @param string $accessToken
|
---|
1547 | * @return void
|
---|
1548 | */
|
---|
1549 | public function setAccessToken($accessToken)
|
---|
1550 | {
|
---|
1551 | $this->accessToken = $accessToken;
|
---|
1552 | }
|
---|
1553 |
|
---|
1554 | /**
|
---|
1555 | * Gets the current ID token.
|
---|
1556 | *
|
---|
1557 | * @return ?string
|
---|
1558 | */
|
---|
1559 | public function getIdToken()
|
---|
1560 | {
|
---|
1561 | return $this->idToken;
|
---|
1562 | }
|
---|
1563 |
|
---|
1564 | /**
|
---|
1565 | * Sets the current ID token.
|
---|
1566 | *
|
---|
1567 | * @param string $idToken
|
---|
1568 | * @return void
|
---|
1569 | */
|
---|
1570 | public function setIdToken($idToken)
|
---|
1571 | {
|
---|
1572 | $this->idToken = $idToken;
|
---|
1573 | }
|
---|
1574 |
|
---|
1575 | /**
|
---|
1576 | * Get the granted space-separated scopes (if they exist) for the last
|
---|
1577 | * fetched token.
|
---|
1578 | *
|
---|
1579 | * @return string|null
|
---|
1580 | */
|
---|
1581 | public function getGrantedScope()
|
---|
1582 | {
|
---|
1583 | return $this->grantedScope;
|
---|
1584 | }
|
---|
1585 |
|
---|
1586 | /**
|
---|
1587 | * Sets the current ID token.
|
---|
1588 | *
|
---|
1589 | * @param string $grantedScope
|
---|
1590 | * @return void
|
---|
1591 | */
|
---|
1592 | public function setGrantedScope($grantedScope)
|
---|
1593 | {
|
---|
1594 | $this->grantedScope = $grantedScope;
|
---|
1595 | }
|
---|
1596 |
|
---|
1597 | /**
|
---|
1598 | * Gets the refresh token associated with the current access token.
|
---|
1599 | *
|
---|
1600 | * @return ?string
|
---|
1601 | */
|
---|
1602 | public function getRefreshToken()
|
---|
1603 | {
|
---|
1604 | return $this->refreshToken;
|
---|
1605 | }
|
---|
1606 |
|
---|
1607 | /**
|
---|
1608 | * Sets the refresh token associated with the current access token.
|
---|
1609 | *
|
---|
1610 | * @param string $refreshToken
|
---|
1611 | * @return void
|
---|
1612 | */
|
---|
1613 | public function setRefreshToken($refreshToken)
|
---|
1614 | {
|
---|
1615 | $this->refreshToken = $refreshToken;
|
---|
1616 | }
|
---|
1617 |
|
---|
1618 | /**
|
---|
1619 | * Sets additional claims to be included in the JWT token
|
---|
1620 | *
|
---|
1621 | * @param array<mixed> $additionalClaims
|
---|
1622 | * @return void
|
---|
1623 | */
|
---|
1624 | public function setAdditionalClaims(array $additionalClaims)
|
---|
1625 | {
|
---|
1626 | $this->additionalClaims = $additionalClaims;
|
---|
1627 | }
|
---|
1628 |
|
---|
1629 | /**
|
---|
1630 | * Gets the additional claims to be included in the JWT token.
|
---|
1631 | *
|
---|
1632 | * @return array<mixed>
|
---|
1633 | */
|
---|
1634 | public function getAdditionalClaims()
|
---|
1635 | {
|
---|
1636 | return $this->additionalClaims;
|
---|
1637 | }
|
---|
1638 |
|
---|
1639 | /**
|
---|
1640 | * Gets the additional claims to be included in the JWT token.
|
---|
1641 | *
|
---|
1642 | * @return ?string
|
---|
1643 | */
|
---|
1644 | public function getIssuedTokenType()
|
---|
1645 | {
|
---|
1646 | return $this->issuedTokenType;
|
---|
1647 | }
|
---|
1648 |
|
---|
1649 | /**
|
---|
1650 | * The expiration of the last received token.
|
---|
1651 | *
|
---|
1652 | * @return array<mixed>|null
|
---|
1653 | */
|
---|
1654 | public function getLastReceivedToken()
|
---|
1655 | {
|
---|
1656 | if ($token = $this->getAccessToken()) {
|
---|
1657 | // the bare necessity of an auth token
|
---|
1658 | $authToken = [
|
---|
1659 | 'access_token' => $token,
|
---|
1660 | 'expires_at' => $this->getExpiresAt(),
|
---|
1661 | ];
|
---|
1662 | } elseif ($idToken = $this->getIdToken()) {
|
---|
1663 | $authToken = [
|
---|
1664 | 'id_token' => $idToken,
|
---|
1665 | 'expires_at' => $this->getExpiresAt(),
|
---|
1666 | ];
|
---|
1667 | } else {
|
---|
1668 | return null;
|
---|
1669 | }
|
---|
1670 |
|
---|
1671 | if ($expiresIn = $this->getExpiresIn()) {
|
---|
1672 | $authToken['expires_in'] = $expiresIn;
|
---|
1673 | }
|
---|
1674 | if ($issuedAt = $this->getIssuedAt()) {
|
---|
1675 | $authToken['issued_at'] = $issuedAt;
|
---|
1676 | }
|
---|
1677 | if ($refreshToken = $this->getRefreshToken()) {
|
---|
1678 | $authToken['refresh_token'] = $refreshToken;
|
---|
1679 | }
|
---|
1680 |
|
---|
1681 | return $authToken;
|
---|
1682 | }
|
---|
1683 |
|
---|
1684 | /**
|
---|
1685 | * Get the client ID.
|
---|
1686 | *
|
---|
1687 | * Alias of {@see Google\Auth\OAuth2::getClientId()}.
|
---|
1688 | *
|
---|
1689 | * @param callable|null $httpHandler
|
---|
1690 | * @return string
|
---|
1691 | * @access private
|
---|
1692 | */
|
---|
1693 | public function getClientName(?callable $httpHandler = null)
|
---|
1694 | {
|
---|
1695 | return $this->getClientId();
|
---|
1696 | }
|
---|
1697 |
|
---|
1698 | /**
|
---|
1699 | * @todo handle uri as array
|
---|
1700 | *
|
---|
1701 | * @param ?string $uri
|
---|
1702 | * @return null|UriInterface
|
---|
1703 | */
|
---|
1704 | private function coerceUri($uri)
|
---|
1705 | {
|
---|
1706 | if (is_null($uri)) {
|
---|
1707 | return null;
|
---|
1708 | }
|
---|
1709 |
|
---|
1710 | return Utils::uriFor($uri);
|
---|
1711 | }
|
---|
1712 |
|
---|
1713 | /**
|
---|
1714 | * @param string $idToken
|
---|
1715 | * @param Key|Key[]|string|string[] $publicKey
|
---|
1716 | * @param string|string[] $allowedAlgs
|
---|
1717 | * @return object
|
---|
1718 | */
|
---|
1719 | private function jwtDecode($idToken, $publicKey, $allowedAlgs)
|
---|
1720 | {
|
---|
1721 | $keys = $this->getFirebaseJwtKeys($publicKey, $allowedAlgs);
|
---|
1722 |
|
---|
1723 | // Default exception if none are caught. We are using the same exception
|
---|
1724 | // class and message from firebase/php-jwt to preserve backwards
|
---|
1725 | // compatibility.
|
---|
1726 | $e = new \InvalidArgumentException('Key may not be empty');
|
---|
1727 | foreach ($keys as $key) {
|
---|
1728 | try {
|
---|
1729 | return JWT::decode($idToken, $key);
|
---|
1730 | } catch (\Exception $e) {
|
---|
1731 | // try next alg
|
---|
1732 | }
|
---|
1733 | }
|
---|
1734 | throw $e;
|
---|
1735 | }
|
---|
1736 |
|
---|
1737 | /**
|
---|
1738 | * @param Key|Key[]|string|string[] $publicKey
|
---|
1739 | * @param string|string[] $allowedAlgs
|
---|
1740 | * @return Key[]
|
---|
1741 | */
|
---|
1742 | private function getFirebaseJwtKeys($publicKey, $allowedAlgs)
|
---|
1743 | {
|
---|
1744 | // If $publicKey is instance of Key, return it
|
---|
1745 | if ($publicKey instanceof Key) {
|
---|
1746 | return [$publicKey];
|
---|
1747 | }
|
---|
1748 |
|
---|
1749 | // If $allowedAlgs is empty, $publicKey must be Key or Key[].
|
---|
1750 | if (empty($allowedAlgs)) {
|
---|
1751 | $keys = [];
|
---|
1752 | foreach ((array) $publicKey as $kid => $pubKey) {
|
---|
1753 | if (!$pubKey instanceof Key) {
|
---|
1754 | throw new \InvalidArgumentException(sprintf(
|
---|
1755 | 'When allowed algorithms is empty, the public key must'
|
---|
1756 | . 'be an instance of %s or an array of %s objects',
|
---|
1757 | Key::class,
|
---|
1758 | Key::class
|
---|
1759 | ));
|
---|
1760 | }
|
---|
1761 | $keys[$kid] = $pubKey;
|
---|
1762 | }
|
---|
1763 | return $keys;
|
---|
1764 | }
|
---|
1765 |
|
---|
1766 | $allowedAlg = null;
|
---|
1767 | if (is_string($allowedAlgs)) {
|
---|
1768 | $allowedAlg = $allowedAlgs;
|
---|
1769 | } elseif (is_array($allowedAlgs)) {
|
---|
1770 | if (count($allowedAlgs) > 1) {
|
---|
1771 | throw new \InvalidArgumentException(
|
---|
1772 | 'To have multiple allowed algorithms, You must provide an'
|
---|
1773 | . ' array of Firebase\JWT\Key objects.'
|
---|
1774 | . ' See https://github.com/firebase/php-jwt for more information.'
|
---|
1775 | );
|
---|
1776 | }
|
---|
1777 | $allowedAlg = array_pop($allowedAlgs);
|
---|
1778 | } else {
|
---|
1779 | throw new \InvalidArgumentException('allowed algorithms must be a string or array.');
|
---|
1780 | }
|
---|
1781 |
|
---|
1782 | if (is_array($publicKey)) {
|
---|
1783 | // When publicKey is greater than 1, create keys with the single alg.
|
---|
1784 | $keys = [];
|
---|
1785 | foreach ($publicKey as $kid => $pubKey) {
|
---|
1786 | if ($pubKey instanceof Key) {
|
---|
1787 | $keys[$kid] = $pubKey;
|
---|
1788 | } else {
|
---|
1789 | $keys[$kid] = new Key($pubKey, $allowedAlg);
|
---|
1790 | }
|
---|
1791 | }
|
---|
1792 | return $keys;
|
---|
1793 | }
|
---|
1794 |
|
---|
1795 | return [new Key($publicKey, $allowedAlg)];
|
---|
1796 | }
|
---|
1797 |
|
---|
1798 | /**
|
---|
1799 | * Determines if the URI is absolute based on its scheme and host or path
|
---|
1800 | * (RFC 3986).
|
---|
1801 | *
|
---|
1802 | * @param string $uri
|
---|
1803 | * @return bool
|
---|
1804 | */
|
---|
1805 | private function isAbsoluteUri($uri)
|
---|
1806 | {
|
---|
1807 | $uri = $this->coerceUri($uri);
|
---|
1808 |
|
---|
1809 | return $uri->getScheme() && ($uri->getHost() || $uri->getPath());
|
---|
1810 | }
|
---|
1811 |
|
---|
1812 | /**
|
---|
1813 | * @param array<mixed> $params
|
---|
1814 | * @return array<mixed>
|
---|
1815 | */
|
---|
1816 | private function addClientCredentials(&$params)
|
---|
1817 | {
|
---|
1818 | $clientId = $this->getClientId();
|
---|
1819 | $clientSecret = $this->getClientSecret();
|
---|
1820 |
|
---|
1821 | if ($clientId && $clientSecret) {
|
---|
1822 | $params['client_id'] = $clientId;
|
---|
1823 | $params['client_secret'] = $clientSecret;
|
---|
1824 | }
|
---|
1825 |
|
---|
1826 | return $params;
|
---|
1827 | }
|
---|
1828 | }
|
---|