| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  | <?php | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-18 00:56:55 +08:00
										 |  |  | namespace BookStack\Access\Oidc; | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-19 21:12:27 +08:00
										 |  |  | class OidcIdToken extends OidcJwtWithClaims implements ProvidesClaims | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  | { | 
					
						
							|  |  |  |     /** | 
					
						
							|  |  |  |      * Validate all possible parts of the id token. | 
					
						
							| 
									
										
										
										
											2021-10-16 23:01:59 +08:00
										 |  |  |      * | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |      * @throws OidcInvalidTokenException | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2021-10-12 07:01:51 +08:00
										 |  |  |     public function validate(string $clientId): bool | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2024-04-19 23:43:51 +08:00
										 |  |  |         parent::validateCommonTokenDetails($clientId); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         $this->validateTokenClaims($clientId); | 
					
						
							| 
									
										
										
										
											2021-10-16 23:01:59 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-12 07:01:51 +08:00
										 |  |  |         return true; | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |     /** | 
					
						
							|  |  |  |      * Validate the claims of the token. | 
					
						
							| 
									
										
										
										
											2021-10-16 23:01:59 +08:00
										 |  |  |      * As per https://openid.net/specs/openid-connect-basic-1_0.html#IDTokenValidation.
 | 
					
						
							|  |  |  |      * | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |      * @throws OidcInvalidTokenException | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |      */ | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |     protected function validateTokenClaims(string $clientId): void | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |     { | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         // 1. The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)
 | 
					
						
							|  |  |  |         // MUST exactly match the value of the iss (issuer) Claim.
 | 
					
						
							| 
									
										
										
										
											2024-04-19 21:12:27 +08:00
										 |  |  |         // Already done in parent.
 | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |         // 2. The Client MUST validate that the aud (audience) Claim contains its client_id value registered
 | 
					
						
							|  |  |  |         // at the Issuer identified by the iss (issuer) Claim as an audience. The ID Token MUST be rejected
 | 
					
						
							|  |  |  |         // if the ID Token does not list the Client as a valid audience, or if it contains additional
 | 
					
						
							|  |  |  |         // audiences not trusted by the Client.
 | 
					
						
							| 
									
										
										
										
											2024-04-19 21:12:27 +08:00
										 |  |  |         // Partially done in parent.
 | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         $aud = is_string($this->payload['aud']) ? [$this->payload['aud']] : $this->payload['aud']; | 
					
						
							|  |  |  |         if (count($aud) !== 1) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Token audience value has ' . count($aud) . ' values, Expected 1'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 3. If the ID Token contains multiple audiences, the Client SHOULD verify that an azp Claim is present.
 | 
					
						
							|  |  |  |         // NOTE: Addressed by enforcing a count of 1 above.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 4. If an azp (authorized party) Claim is present, the Client SHOULD verify that its client_id
 | 
					
						
							|  |  |  |         // is the Claim Value.
 | 
					
						
							|  |  |  |         if (isset($this->payload['azp']) && $this->payload['azp'] !== $clientId) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Token authorized party exists but does not match the expected client_id'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 5. The current time MUST be before the time represented by the exp Claim
 | 
					
						
							|  |  |  |         // (possibly allowing for some small leeway to account for clock skew).
 | 
					
						
							|  |  |  |         if (empty($this->payload['exp'])) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Missing token expiration time value'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         $skewSeconds = 120; | 
					
						
							|  |  |  |         $now = time(); | 
					
						
							|  |  |  |         if ($now >= (intval($this->payload['exp']) + $skewSeconds)) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Token has expired'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 6. The iat Claim can be used to reject tokens that were issued too far away from the current time,
 | 
					
						
							|  |  |  |         // limiting the amount of time that nonces need to be stored to prevent attacks.
 | 
					
						
							|  |  |  |         // The acceptable range is Client specific.
 | 
					
						
							|  |  |  |         if (empty($this->payload['iat'])) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Missing token issued at time value'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         $dayAgo = time() - 86400; | 
					
						
							|  |  |  |         $iat = intval($this->payload['iat']); | 
					
						
							|  |  |  |         if ($iat > ($now + $skewSeconds) || $iat < $dayAgo) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Token issue at time is not recent or is invalid'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 7. If the acr Claim was requested, the Client SHOULD check that the asserted Claim Value is appropriate.
 | 
					
						
							|  |  |  |         // The meaning and processing of acr Claim Values is out of scope for this document.
 | 
					
						
							|  |  |  |         // NOTE: Not used for our case here. acr is not requested.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // 8. When a max_age request is made, the Client SHOULD check the auth_time Claim value and request
 | 
					
						
							|  |  |  |         // re-authentication if it determines too much time has elapsed since the last End-User authentication.
 | 
					
						
							|  |  |  |         // NOTE: Not used for our case here. A max_age request is not made.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         // Custom: Ensure the "sub" (Subject) Claim exists and has a value.
 | 
					
						
							|  |  |  |         if (empty($this->payload['sub'])) { | 
					
						
							| 
									
										
										
										
											2021-10-13 06:04:28 +08:00
										 |  |  |             throw new OidcInvalidTokenException('Missing token subject value'); | 
					
						
							| 
									
										
										
										
											2021-10-12 06:00:45 +08:00
										 |  |  |         } | 
					
						
							| 
									
										
										
										
											2021-10-12 02:05:16 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2021-10-16 23:01:59 +08:00
										 |  |  | } |