mirror of
https://github.com/BookStackApp/BookStack.git
synced 2024-10-30 07:32:39 +01:00
8b14a701a4
Also updated test to suit validation changes
68 lines
2.6 KiB
PHP
68 lines
2.6 KiB
PHP
<?php
|
|
|
|
namespace BookStack\Access\Oidc;
|
|
|
|
use Psr\Http\Message\ResponseInterface;
|
|
|
|
class OidcUserinfoResponse implements ProvidesClaims
|
|
{
|
|
protected array $claims = [];
|
|
protected ?OidcJwtWithClaims $jwt = null;
|
|
|
|
public function __construct(ResponseInterface $response, string $issuer, array $keys)
|
|
{
|
|
$contentType = $response->getHeader('Content-Type')[0];
|
|
if ($contentType === 'application/json') {
|
|
$this->claims = json_decode($response->getBody()->getContents(), true);
|
|
}
|
|
|
|
if ($contentType === 'application/jwt') {
|
|
$this->jwt = new OidcJwtWithClaims($response->getBody()->getContents(), $issuer, $keys);
|
|
$this->claims = $this->jwt->getAllClaims();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @throws OidcInvalidTokenException
|
|
*/
|
|
public function validate(string $idTokenSub, string $clientId): bool
|
|
{
|
|
if (!is_null($this->jwt)) {
|
|
$this->jwt->validateCommonTokenDetails($clientId);
|
|
}
|
|
|
|
$sub = $this->getClaim('sub');
|
|
|
|
// Spec: v1.0 5.3.2: The sub (subject) Claim MUST always be returned in the UserInfo Response.
|
|
if (!is_string($sub) || empty($sub)) {
|
|
throw new OidcInvalidTokenException("No valid subject value found in userinfo data");
|
|
}
|
|
|
|
// Spec: v1.0 5.3.2: The sub Claim in the UserInfo Response MUST be verified to exactly match the sub Claim in the ID Token;
|
|
// if they do not match, the UserInfo Response values MUST NOT be used.
|
|
if ($idTokenSub !== $sub) {
|
|
throw new OidcInvalidTokenException("Subject value provided in the userinfo endpoint does not match the provided ID token value");
|
|
}
|
|
|
|
// Spec v1.0 5.3.4 Defines the following:
|
|
// Verify that the OP that responded was the intended OP through a TLS server certificate check, per RFC 6125 [RFC6125].
|
|
// This is effectively done as part of the HTTP request we're making through CURLOPT_SSL_VERIFYHOST on the request.
|
|
// If the Client has provided a userinfo_encrypted_response_alg parameter during Registration, decrypt the UserInfo Response using the keys specified during Registration.
|
|
// We don't currently support JWT encryption for OIDC
|
|
// If the response was signed, the Client SHOULD validate the signature according to JWS [JWS].
|
|
// This is done as part of the validateCommonClaims above.
|
|
|
|
return true;
|
|
}
|
|
|
|
public function getClaim(string $claim): mixed
|
|
{
|
|
return $this->claims[$claim] ?? null;
|
|
}
|
|
|
|
public function getAllClaims(): array
|
|
{
|
|
return $this->claims;
|
|
}
|
|
}
|