mirror of
https://github.com/espocrm/espocrm.git
synced 2026-03-03 02:27:01 +00:00
144 lines
4.9 KiB
PHP
144 lines
4.9 KiB
PHP
<?php
|
||
/************************************************************************
|
||
* This file is part of EspoCRM.
|
||
*
|
||
* EspoCRM – Open Source CRM application.
|
||
* Copyright (C) 2014-2026 EspoCRM, Inc.
|
||
* Website: https://www.espocrm.com
|
||
*
|
||
* This program is free software: you can redistribute it and/or modify
|
||
* it under the terms of the GNU Affero General Public License as published by
|
||
* the Free Software Foundation, either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* This program is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU Affero General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU Affero General Public License
|
||
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||
*
|
||
* The interactive user interfaces in modified source and object code versions
|
||
* of this program must display Appropriate Legal Notices, as required under
|
||
* Section 5 of the GNU Affero General Public License version 3.
|
||
*
|
||
* In accordance with Section 7(b) of the GNU Affero General Public License version 3,
|
||
* these Appropriate Legal Notices must retain the display of the "EspoCRM" word.
|
||
************************************************************************/
|
||
|
||
namespace Espo\Tools\Oidc;
|
||
|
||
use Espo\Core\Authentication\Jwt\Exceptions\Invalid;
|
||
use Espo\Core\Authentication\Oidc\ConfigDataProvider;
|
||
use Espo\Core\Authentication\Oidc\Login as OidcLogin;
|
||
use Espo\Core\Authentication\Oidc\BackchannelLogout;
|
||
use Espo\Core\Authentication\Oidc\PkceUtil;
|
||
use Espo\Core\Authentication\Util\MethodProvider;
|
||
use Espo\Core\Exceptions\Error;
|
||
use Espo\Core\Exceptions\Forbidden;
|
||
use Espo\Core\Session\Session;
|
||
use Espo\Core\Utils\Json;
|
||
|
||
class Service
|
||
{
|
||
public function __construct(
|
||
private BackchannelLogout $backchannelLogout,
|
||
private MethodProvider $methodProvider,
|
||
private ConfigDataProvider $configDataProvider,
|
||
private Session $session,
|
||
) {}
|
||
|
||
/**
|
||
* @return array{
|
||
* clientId: non-empty-string,
|
||
* endpoint: non-empty-string,
|
||
* redirectUri: string,
|
||
* scopes: non-empty-array<string>,
|
||
* claims: ?string,
|
||
* prompt: 'none'|'login'|'consent'|'select_account',
|
||
* maxAge: ?int,
|
||
* codeChallenge: ?string,
|
||
* codeChallengeMethod: ?string,
|
||
* }
|
||
* @throws Forbidden
|
||
* @throws Error
|
||
*/
|
||
public function getAuthorizationData(): array
|
||
{
|
||
if ($this->methodProvider->get() !== OidcLogin::NAME) {
|
||
throw new Forbidden();
|
||
}
|
||
|
||
$clientId = $this->configDataProvider->getClientId();
|
||
$endpoint = $this->configDataProvider->getAuthorizationEndpoint();
|
||
$scopes = $this->configDataProvider->getScopes();
|
||
$groupClaim = $this->configDataProvider->getGroupClaim();
|
||
$redirectUri = $this->configDataProvider->getRedirectUri();
|
||
$codeChallenge = $this->configDataProvider->useAuthorizationPkce() ? $this->prepareCodeChallenge() : null;
|
||
|
||
if (!$clientId) {
|
||
throw new Error("No client ID.");
|
||
}
|
||
|
||
if (!$endpoint) {
|
||
throw new Error("No authorization endpoint.");
|
||
}
|
||
|
||
array_unshift($scopes, 'openid');
|
||
|
||
$claims = null;
|
||
|
||
if ($groupClaim) {
|
||
$claims = Json::encode([
|
||
'id_token' => [
|
||
$groupClaim => ['essential' => true],
|
||
],
|
||
]);
|
||
}
|
||
|
||
/** @var 'none'|'login'|'consent'|'select_account' $prompt
|
||
* @noinspection PhpRedundantVariableDocTypeInspection
|
||
*/
|
||
$prompt = $this->configDataProvider->getAuthorizationPrompt();
|
||
$maxAge = $this->configDataProvider->getAuthorizationMaxAge();
|
||
|
||
return [
|
||
'clientId' => $clientId,
|
||
'endpoint' => $endpoint,
|
||
'redirectUri' => $redirectUri,
|
||
'scopes' => $scopes,
|
||
'claims' => $claims,
|
||
'prompt' => $prompt,
|
||
'maxAge' => $maxAge,
|
||
'codeChallenge' => $codeChallenge,
|
||
'codeChallengeMethod' => $codeChallenge ? 'S256' : null,
|
||
];
|
||
}
|
||
|
||
/**
|
||
* @throws Forbidden
|
||
*/
|
||
public function backchannelLogout(string $rawToken): void
|
||
{
|
||
if ($this->methodProvider->get() !== OidcLogin::NAME) {
|
||
throw new Forbidden();
|
||
}
|
||
|
||
try {
|
||
$this->backchannelLogout->logout($rawToken);
|
||
} catch (Invalid $e) {
|
||
throw new Forbidden("OIDC logout: Invalid JWT. " . $e->getMessage());
|
||
}
|
||
}
|
||
|
||
private function prepareCodeChallenge(): string
|
||
{
|
||
$codeVerifier = PkceUtil::generateCodeVerifier();
|
||
|
||
$this->session->set(OidcLogin::SESSION_KEY_CODE_VERIFIER, $codeVerifier);
|
||
|
||
return PkceUtil::hashAndEncodeCodeVerifier($codeVerifier);
|
||
}
|
||
}
|