Proyectos de Subversion Moodle

Rev

| Ultima modificación | Ver Log |

Rev Autor Línea Nro. Línea
1 efrain 1
<?php
2
// This file is part of Moodle - http://moodle.org/
3
//
4
// Moodle is free software: you can redistribute it and/or modify
5
// it under the terms of the GNU General Public License as published by
6
// the Free Software Foundation, either version 3 of the License, or
7
// (at your option) any later version.
8
//
9
// Moodle is distributed in the hope that it will be useful,
10
// but WITHOUT ANY WARRANTY; without even the implied warranty of
11
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
// GNU General Public License for more details.
13
//
14
// You should have received a copy of the GNU General Public License
15
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.
16
 
17
namespace core\oauth2\discovery;
18
 
19
use curl;
20
use stdClass;
21
use moodle_exception;
22
use core\oauth2\issuer;
23
use core\oauth2\endpoint;
24
 
25
/**
26
 * Class for IMS Open Badge Connect API (aka OBv2.1) discovery definition.
27
 *
28
 * @package    core
29
 * @since      Moodle 3.11
30
 * @copyright  2021 Sara Arjona (sara@moodle.com)
31
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
32
 */
33
class imsbadgeconnect extends base_definition {
34
 
35
    /**
36
     * Get the URL for the discovery manifest.
37
     *
38
     * @param issuer $issuer The OAuth issuer the endpoints should be discovered for.
39
     * @return string The URL of the discovery file, containing the endpoints.
40
     */
41
    public static function get_discovery_endpoint_url(issuer $issuer): string {
42
        $url = $issuer->get('baseurl');
43
        if (!empty($url)) {
44
            // Add slash at the end of the base url.
45
            $url .= (substr($url, -1) == '/' ? '' : '/');
46
            // Append the well-known file for IMS OBv2.1.
47
            $url .= '.well-known/badgeconnect.json';
48
        }
49
 
50
        return $url;
51
    }
52
 
53
    /**
54
     * Process the discovery information and create endpoints defined with the expected format.
55
     *
56
     * @param issuer $issuer The OAuth issuer the endpoints should be discovered for.
57
     * @param stdClass $info The discovery information, with the endpoints to process and create.
58
     * @return void
59
     */
60
    protected static function process_configuration_json(issuer $issuer, stdClass $info): void {
61
        $info = array_pop($info->badgeConnectAPI);
62
        foreach ($info as $key => $value) {
63
            if (substr_compare($key, 'Url', - strlen('Url')) === 0 && !empty($value)) {
64
                $record = new stdClass();
65
                $record->issuerid = $issuer->get('id');
66
                // Convert key names from xxxxUrl to xxxx_endpoint, in order to make it compliant with the Moodle oAuth API.
67
                $record->name = strtolower(substr($key, 0, - strlen('Url'))) . '_endpoint';
68
                $record->url = $value;
69
 
70
                $endpoint = new endpoint(0, $record);
71
                $endpoint->create();
72
            } else if ($key == 'scopesOffered') {
73
                // Get and update supported scopes.
74
                $issuer->set('scopessupported', implode(' ', $value));
75
                $issuer->update();
76
            } else if ($key == 'image' && empty($issuer->get('image'))) {
77
                // Update the image with the value in the manifest file if it's valid and empty in the issuer.
78
                $url = filter_var($value, FILTER_SANITIZE_URL);
79
                // Remove multiple slashes in URL. It will fix the Badgr bug with image URL defined in their manifest.
80
                $url = preg_replace('/([^:])(\/{2,})/', '$1/', $url);
81
                if (filter_var($url, FILTER_VALIDATE_URL) !== false) {
82
                    $issuer->set('image', $url);
83
                    $issuer->update();
84
                }
85
            } else if ($key == 'apiBase') {
86
                (new endpoint(0, (object) [
87
                    'issuerid' => $issuer->get('id'),
88
                    'name' => $key,
89
                    'url' => $value,
90
                ]))->create();
91
            } else if ($key == 'name') {
92
                // Get and update issuer name.
93
                $issuer->set('name', $value);
94
                $issuer->update();
95
            }
96
        }
97
    }
98
 
99
    /**
100
     * Process how to map user field information.
101
     *
102
     * @param issuer $issuer The OAuth issuer the endpoints should be discovered for.
103
     * @return void
104
     */
105
    protected static function create_field_mappings(issuer $issuer): void {
106
        // In that case, there are no user fields to map.
107
    }
108
 
109
    /**
110
     * Self-register the issuer if the 'registration' endpoint exists and client id and secret aren't defined.
111
     *
112
     * @param issuer $issuer The OAuth issuer to register.
113
     * @return void
114
     */
115
    protected static function register(issuer $issuer): void {
116
        global $CFG, $SITE;
117
 
118
        $clientid = $issuer->get('clientid');
119
        $clientsecret = $issuer->get('clientsecret');
120
 
121
        // Registration request for getting client id and secret will be done only they are empty in the issuer.
122
        // For now this can't be run from PHPUNIT (because IMS testing platform needs real URLs). In the future, this
123
        // request can be moved to the moodle-exttests repository.
124
        if (empty($clientid) && empty($clientsecret) && (!defined('PHPUNIT_TEST') || !PHPUNIT_TEST)) {
125
            $url = $issuer->get_endpoint_url('registration');
126
            if ($url) {
127
                $scopes = str_replace("\r", " ", $issuer->get('scopessupported'));
128
 
129
                // Add slash at the end of the site URL.
130
                $hosturl = $CFG->wwwroot;
131
                $hosturl .= (substr($CFG->wwwroot, -1) == '/' ? '' : '/');
132
 
133
                // Create the registration request following the format defined in the IMS OBv2.1 specification.
134
                $request = [
135
                    'client_name' => $SITE->fullname,
136
                    'client_uri' => $hosturl,
137
                    'logo_uri' => $hosturl . 'pix/moodlelogo.png',
138
                    'tos_uri' => $hosturl,
139
                    'policy_uri' => $hosturl,
140
                    'software_id' => 'moodle',
141
                    'software_version' => $CFG->version,
142
                    'redirect_uris' => [
143
                        $hosturl . 'admin/oauth2callback.php'
144
                    ],
145
                    'token_endpoint_auth_method' => 'client_secret_basic',
146
                    'grant_types' => [
147
                      'authorization_code',
148
                      'refresh_token'
149
                    ],
150
                    'response_types' => [
151
                        'code'
152
                    ],
153
                    'scope' => $scopes
154
                ];
155
                $jsonrequest = json_encode($request);
156
 
157
                $curl = new curl();
158
                $curl->setHeader(['Content-type: application/json']);
159
                $curl->setHeader(['Accept: application/json']);
160
 
161
                // Send the registration request.
162
                if (!$jsonresponse = $curl->post($url, $jsonrequest)) {
163
                    $msg = 'Could not self-register identity issuer: ' . $issuer->get('name') .
164
                        ". Wrong URL or JSON data [URL: $url]";
165
                    throw new moodle_exception($msg);
166
                }
167
 
168
                // Process the response and update client id and secret if they are valid.
169
                $response = json_decode($jsonresponse);
170
                if (property_exists($response, 'client_id')) {
171
                    $issuer->set('clientid', $response->client_id);
172
                    $issuer->set('clientsecret', $response->client_secret);
173
                    $issuer->update();
174
                } else {
175
                    $msg = 'Could not self-register identity issuer: ' . $issuer->get('name') .
176
                        '. Invalid response ' . $jsonresponse;
177
                    throw new moodle_exception($msg);
178
                }
179
            }
180
        }
181
    }
182
 
183
}