Proyectos de Subversion Moodle

Rev

| Ultima modificación | Ver Log |

Rev Autor Línea Nro. Línea
1 efrain 1
<?php
2
// This file is part of Moodle - http://moodle.org/
3
//
4
// Moodle is free software: you can redistribute it and/or modify
5
// it under the terms of the GNU General Public License as published by
6
// the Free Software Foundation, either version 3 of the License, or
7
// (at your option) any later version.
8
//
9
// Moodle is distributed in the hope that it will be useful,
10
// but WITHOUT ANY WARRANTY; without even the implied warranty of
11
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
// GNU General Public License for more details.
13
//
14
// You should have received a copy of the GNU General Public License
15
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.
16
 
17
/**
18
 * Configurable OAuth2 client class.
19
 *
20
 * @package    core_badges
21
 * @subpackage badges
22
 * @copyright  2020 Tung Thai
23
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
24
 * @author     Tung Thai <Tung.ThaiDuc@nashtechglobal.com>
25
 */
26
 
27
namespace core_badges\oauth2;
28
 
29
defined('MOODLE_INTERNAL') || die();
30
 
31
require_once($CFG->libdir . '/oauthlib.php');
32
require_once($CFG->libdir . '/filelib.php');
33
require_once('badge_backpack_oauth2.php');
34
 
35
use moodle_url;
36
use moodle_exception;
37
use stdClass;
38
 
39
define('BACKPACK_CHALLENGE_METHOD', 'S256');
40
define('BACKPACK_CODE_VERIFIER_TIME', 60);
41
 
42
/**
43
 * Configurable OAuth2 client to request authorization and store token. Use the PKCE method to verifier authorization.
44
 *
45
 * @copyright  2020 Tung Thai
46
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
47
 * @author     Tung Thai <Tung.ThaiDuc@nashtechglobal.com>
48
 */
49
class client extends \core\oauth2\client {
50
 
51
    /**  @var \core\oauth2\issuer */
52
    private $issuer;
53
 
54
    /** @var string $clientid client identifier issued to the client */
55
    private $clientid = '';
56
 
57
    /** @var string $clientsecret The client secret. */
58
    private $clientsecret = '';
59
 
60
    /** @var moodle_url $returnurl URL to return to after authenticating */
61
    private $returnurl = null;
62
 
63
    /** @var string $grantscope */
64
    protected $grantscope = '';
65
 
66
    /** @var string $scope */
67
    protected $scope = '';
68
 
69
    /** @var bool basicauth */
70
    protected $basicauth = true;
71
 
72
    /** @var string|null backpack object */
73
    public $backpack = '';
74
 
75
    /**
76
     * client constructor.
77
     *
78
     * @param issuer $issuer oauth2 service.
79
     * @param string $returnurl return url after login
80
     * @param string $additionalscopes the scopes has been granted
81
     * @param null $backpack backpack object.
82
     * @throws \coding_exception error message.
83
     */
84
    public function __construct(\core\oauth2\issuer $issuer, $returnurl = '', $additionalscopes = '',
85
                                $backpack = null) {
86
        $this->issuer = $issuer;
87
        $this->clientid = $issuer->get('clientid');
88
        $this->returnurl = $returnurl;
89
        $this->clientsecret = $issuer->get('clientsecret');
90
        $this->backpack = $backpack;
91
        $this->grantscope = $additionalscopes;
92
        $this->scope = $additionalscopes;
93
        parent::__construct($issuer, $returnurl, $additionalscopes, false);
94
    }
95
 
96
    /**
97
     * Get login url.
98
     *
99
     * @return moodle_url
100
     * @throws \coding_exception
101
     * @throws moodle_exception
102
     */
103
    public function get_login_url() {
104
        $callbackurl = self::callback_url();
105
        $scopes = $this->issuer->get('scopessupported');
106
 
107
        // Removed the scopes does not support in authorization.
108
        $excludescopes = ['profile', 'openid'];
109
        $arrascopes = explode(' ', $scopes);
110
        foreach ($excludescopes as $exscope) {
111
            $key = array_search($exscope, $arrascopes);
112
            if (isset($key)) {
113
                unset($arrascopes[$key]);
114
            }
115
        }
116
        $scopes = implode(' ', $arrascopes);
117
 
118
        $params = array_merge(
119
            [
120
                'client_id' => $this->clientid,
121
                'response_type' => 'code',
122
                'redirect_uri' => $callbackurl->out(false),
123
                'state' => $this->returnurl->out_as_local_url(false),
124
                'scope' => $scopes,
125
                'code_challenge' => $this->code_challenge(),
126
                'code_challenge_method' => BACKPACK_CHALLENGE_METHOD,
127
            ]
128
        );
129
        return new moodle_url($this->auth_url(), $params);
130
    }
131
 
132
    /**
133
     * Generate code challenge.
134
     *
135
     * @return string
136
     */
137
    public function code_challenge() {
138
        $random = bin2hex(openssl_random_pseudo_bytes(43));
139
        $verifier = $this->base64url_encode(pack('H*', $random));
140
        $challenge = $this->base64url_encode(pack('H*', hash('sha256', $verifier)));
141
        $_SESSION['SESSION']->code_verifier = $verifier;
142
        return $challenge;
143
    }
144
 
145
    /**
146
     * Get code verifier.
147
     *
148
     * @return bool
149
     */
150
    public function code_verifier() {
151
        if (isset($_SESSION['SESSION']) && !empty($_SESSION['SESSION']->code_verifier)) {
152
            return $_SESSION['SESSION']->code_verifier;
153
        }
154
        return false;
155
    }
156
 
157
    /**
158
     * Generate base64url encode.
159
     *
160
     * @param string $plaintext text to convert.
161
     * @return string
162
     */
163
    public function base64url_encode($plaintext) {
164
        $base64 = base64_encode($plaintext);
165
        $base64 = trim($base64, "=");
166
        $base64url = strtr($base64, '+/', '-_');
167
        return ($base64url);
168
    }
169
 
170
    /**
171
     * Callback url where the request is returned to.
172
     *
173
     * @return moodle_url url of callback
174
     */
175
    public static function callback_url() {
176
        return new moodle_url('/admin/oauth2callback.php');
177
    }
178
 
179
    /**
180
     * Check and refresh token to keep login on backpack site.
181
     *
182
     * @return bool
183
     * @throws \coding_exception
184
     * @throws moodle_exception
185
     */
186
    public function is_logged_in() {
187
 
188
        // Has the token expired?
189
        if (isset($this->accesstoken->expires) && time() >= $this->accesstoken->expires) {
190
            if (isset($this->accesstoken->refreshtoken)) {
191
                return $this->upgrade_token($this->accesstoken->refreshtoken, 'refresh_token');
192
            } else {
193
                throw new moodle_exception('Could not refresh oauth token, please try again.');
194
            }
195
        }
196
 
197
        if (isset($this->accesstoken->token) && isset($this->accesstoken->scope)) {
198
            return true;
199
        }
200
 
201
        // If we've been passed then authorization code generated by the
202
        // authorization server try and upgrade the token to an access token.
203
        $code = optional_param('oauth2code', null, PARAM_RAW);
204
        // Note - sometimes we may call is_logged_in twice in the same request - we don't want to attempt
205
        // to upgrade the same token twice.
206
        if ($code && $this->upgrade_token($code, 'authorization_code')) {
207
            return true;
208
        }
209
 
210
        return false;
211
    }
212
 
213
    /**
214
     * Request new token.
215
     *
216
     * @param string $code code verify from Auth site.
217
     * @param string $granttype grant type.
218
     * @return bool
219
     * @throws moodle_exception
220
     */
221
    public function upgrade_token($code, $granttype = 'authorization_code') {
222
        $callbackurl = self::callback_url();
223
 
224
        if ($granttype == 'authorization_code') {
225
            $this->basicauth = true;
226
            $params = array('code' => $code,
227
                'grant_type' => $granttype,
228
                'redirect_uri' => $callbackurl->out(false),
229
                'scope' => $this->get_scopes(),
230
                'code_verifier' => $this->code_verifier()
231
            );
232
        } else if ($granttype == 'refresh_token') {
233
            $this->basicauth = false;
234
            $params = array('refresh_token' => $code,
235
                'grant_type' => $granttype,
236
                'scope' => $this->get_scopes(),
237
            );
238
        }
239
        if ($this->basicauth) {
240
            $idsecret = $this->clientid . ':' . $this->clientsecret;
241
            $this->setHeader('Authorization: Basic ' . base64_encode($idsecret));
242
        } else {
243
            $params['client_id'] = $this->clientid;
244
            $params['client_secret'] = $this->clientsecret;
245
        }
246
        // Requests can either use http GET or POST.
247
        $response = $this->post($this->token_url(), $this->build_post_data($params));
248
        if ($this->info['http_code'] !== 200) {
249
            $debuginfo = !empty($this->error) ? $this->error : $response;
250
            throw new moodle_exception('oauth2refreshtokenerror', 'core_error', '', $this->info['http_code'], $debuginfo);
251
        }
252
 
253
        $r = json_decode($response);
254
 
255
        if (is_null($r)) {
256
            throw new moodle_exception("Could not decode JSON token response");
257
        }
258
 
259
        if (!empty($r->error)) {
260
            throw new moodle_exception($r->error . ' ' . $r->error_description);
261
        }
262
 
263
        if (!isset($r->access_token)) {
264
            return false;
265
        }
266
 
267
        // Store the token an expiry time.
268
        $accesstoken = new stdClass;
269
        $accesstoken->token = $r->access_token;
270
        if (isset($r->expires_in)) {
271
            // Expires 10 seconds before actual expiry.
272
            $accesstoken->expires = (time() + ($r->expires_in - 10));
273
        }
274
        if (isset($r->refresh_token)) {
275
            $this->refreshtoken = $r->refresh_token;
276
            $accesstoken->refreshtoken = $r->refresh_token;
277
        }
278
        $accesstoken->scope = $r->scope;
279
 
280
        // Also add the scopes.
281
        $this->store_token($accesstoken);
282
 
283
        return true;
284
    }
285
 
286
    /**
287
     * Store a token to verify for send request.
288
     *
289
     * @param null|stdClass $token
290
     */
291
    protected function store_token($token) {
292
        global $USER;
293
 
294
        $this->accesstoken = $token;
295
        // Create or update a DB record with the new token.
296
        $persistedtoken = badge_backpack_oauth2::get_record(['externalbackpackid' => $this->backpack->id, 'userid' => $USER->id]);
297
        if ($token !== null) {
298
            if (!$persistedtoken) {
299
                $persistedtoken = new badge_backpack_oauth2();
300
                $persistedtoken->set('issuerid', $this->backpack->oauth2_issuerid);
301
                $persistedtoken->set('externalbackpackid', $this->backpack->id);
302
                $persistedtoken->set('userid', $USER->id);
303
            } else {
304
                $persistedtoken->set('timemodified', time());
305
            }
306
            // Update values from $token. Don't use from_record because that would skip validation.
307
            $persistedtoken->set('usermodified', $USER->id);
308
            $persistedtoken->set('token', $token->token);
309
            $persistedtoken->set('refreshtoken', $token->refreshtoken);
310
            $persistedtoken->set('expires', $token->expires);
311
            $persistedtoken->set('scope', $token->scope);
312
            $persistedtoken->save();
313
        } else {
314
            if ($persistedtoken) {
315
                $persistedtoken->delete();
316
            }
317
        }
318
    }
319
 
320
    /**
321
     * Get token of current user.
322
     *
323
     * @return stdClass|null token object
324
     */
325
    protected function get_stored_token() {
326
        global $USER;
327
 
328
        $token = badge_backpack_oauth2::get_record(['externalbackpackid' => $this->backpack->id, 'userid' => $USER->id]);
329
        if ($token !== false) {
330
            $token = $token->to_record();
331
            return $token;
332
        }
333
        return null;
334
    }
335
 
336
    /**
337
     * Get scopes granted.
338
     *
339
     * @return null|string
340
     */
341
    protected function get_scopes() {
342
        if (!empty($this->grantscope)) {
343
            return $this->grantscope;
344
        }
345
        $token = $this->get_stored_token();
346
        if ($token) {
347
            return $token->scope;
348
        }
349
        return null;
350
    }
351
}