lookyman / nette-oauth2-server-doctrine
Integration of The League of Extraordinary Packages' OAuth 2.0 Server into Nette Framework - Kdyby/Doctrine storage implementation
Installs: 25 337
Dependents: 0
Suggesters: 0
Security: 0
Stars: 13
Watchers: 3
Forks: 3
Open Issues: 3
pkg:composer/lookyman/nette-oauth2-server-doctrine
Requires
- php: ^7.1
- kdyby/doctrine: ^3.3
- kdyby/events: ^3.1, >=3.1.2
- league/oauth2-server: ^7.0
- lookyman/nette-oauth2-server: ^3.0
- nette/application: ^2.4, >=2.4.9
- nette/caching: ^2.5, >=2.5.6
- nette/di: ^2.4, >=2.4.10
Requires (Dev)
- jakub-onderka/php-parallel-lint: ^1.0
- lookyman/coding-standard: ^0.1.0
- nette/bootstrap: ^2.4, >=2.4.5
- phpstan/phpstan: ^0.9.2
- phpstan/phpstan-nette: ^0.9.0
- phpstan/phpstan-phpunit: ^0.9.4
- phpstan/phpstan-strict-rules: ^0.9.0
- phpunit/phpunit: ^7.0
README
Integration of The League of Extraordinary Packages' OAuth 2.0 Server into Nette Framework - Kdyby/Doctrine storage implementation.
Installation
The boring part
Read this. All of it. Seriously, don't just skip it and then come back complaining that something doesn't work.
Don't forget to install and configure Kdyby/Doctrine if you haven't already.
Install using Composer:
composer require lookyman/nette-oauth2-server-doctrine
Setup routes
Depending on which grants you want to support, you will have to setup routes to either access_token, authorize, or both endpoints.
- For grants other than
Implicitsetup theaccess_tokenendpoint route. - For
Authorization CodeorImplicitgrants setup theauthorizeendpoint route.
The endpoints are located at NetteOAuth2Server:OAuth2:accessToken and NetteOAuth2Server:OAuth2:authorize mapping respectively, and the setup should look something like this:
class RouterFactory { /** * @return IRouter */ public static function createRouter() { $router = new RouteList(); $router[] = new Route('oauth2/<action>', 'NetteOAuth2Server:OAuth2:default'); // ... return $router; } }
You can then access those endpoints via https://myapp.com/oauth2/access-token and https://myapp.com/oauth2/authorize URLs respectively.
Config
extensions: oauth2: Lookyman\NetteOAuth2Server\Storage\Doctrine\NetteOAuth2ServerDoctrineExtension oauth2: grants: authCode: on clientCredentials: on implicit: on password: on refreshToken: on privateKey: /path/to/private.key publicKey: /path/to/public.key encryptionKey: '32 base64encoded random bytes' approveDestination: :Approve: loginDestination: :Sign:in tablePrefix: nette_oauth2_server_ loginEventPriority: 0
The grants section contains grants that you want to enable. By default they are all disabled, so you just have to enter those you want to use. Each value doesn't have to just be a boolean. You can specify a token TTL like this: [ttl: PT1H]. Two of the grants also have additional settings. The Authorization Code grant has the authCodeTtl option, and the Implicit grant has the accessTokenTtl option. In each of these cases, the format for specifying the intervals follows the format described here.
The Authorization Code grant also has another option to enable support for RFC 7636. You can turn it on by specifying [pkce: on].
Next, you're going to need a pair of private/public keys. If you didn't skip the first step you should know how to do that. If you did, now is the time. Go read it, come back when you have the keys, and enter the paths in the privateKey and publicKey options. If your private key is protected with a passphrase, specify it like this: privateKey: [keyPath: /path/to/private.key, passPhrase: passphrase].
Additionaly, you need to provide an encryption key. The easiest way to do that would be to run php -r 'echo base64_encode(random_bytes(32));' from the terminal and paste the result in the encryptionKey option.
If you are using either Authorization Code or Implicit grants, you need to setup the redirect destinations. These should be normal strings you would use in $presenter->redirect() method. The approveDestination is discussed in detail below. The loginDestination should point to the presenter/action where your application has it's login form. Both paths should be absolute (with module).
You can omit approveDestination and loginDestination options if you are not using Authorization Code or Implicit grants.
The tablePrefix option lets you set the prefix for the generated tables. Default value is nette_oauth2_server_.
Finally, when using Authorization Code or Implicit grants, the user is at some point redirected to the login page. This redirection is done by a subscriber listening for Nette\Security\User::onLoggedIn event, but if you already have some other subscribers listening on it, you might want to tweak the event priority. You can do it with the loginEventPriority option.
Update database schema
php www/index.php orm:schema-tool:update --force
You might want to use --dump-sql instead of --force and run the resulting SQL queries manually. But if your database schema was previously in sync with your mappings, this should be safe.
It will generate 7 new tables in the database:
nette_oauth2_server_access_tokennette_oauth2_server_access_token_scopenette_oauth2_server_auth_codenette_oauth2_server_auth_code_scopenette_oauth2_server_clientnette_oauth2_server_refresh_tokennette_oauth2_server_scope
Implement trait
The last part (and the most fun one) is to hook this all up into your application. For this there's a handy trait ready, so the process should be fairly smooth. Also, this step is only necessary if you want to use Authorization Code or Implicit grants, so if you don't, you are already done. Yay!
You will have to create an approve presenter. Remember that approveDestination option in config? This is where it comes to play. The presenter should use the Lookyman\NetteOAuth2Server\UI\ApprovePresenterTrait trait and call $this['approve'] in the action the approveDestination option leads to. It should look something like this:
class ApprovePresenter extends Presenter { use ApprovePresenterTrait; // ... public function actionDefault() { $this['approve']; } }
Of course, you don't have to create a new presenter just for this. If you want, use the trait in one of your existing ones. Just make sure to set the correct approveDestination in the config and initialize the component with $this['approve'] in the action.
Finally, that action needs a template. So create a Latte template file in the correct destination for the presenter's action to pick it up, and put a single line somewhere into it:
{control approve}
As you can see, this whole process is highly configurable. This is done to let you have a complete control over your application, and just leave the hard work to the package.
Finalizing the setup
This package does not provide ways to manage client applications, access tokens, or scopes. You have to implement those yourself. You can, however, use the entities and repositories provided by this package.
- AccessToken
Lookyman\NetteOAuth2Server\Storage\Doctrine\AccessToken\AccessTokenEntityLookyman\NetteOAuth2Server\Storage\Doctrine\AccessToken\AccessTokenRepository
- AuthCode
Lookyman\NetteOAuth2Server\Storage\Doctrine\AuthCode\AuthCodeEntityLookyman\NetteOAuth2Server\Storage\Doctrine\AuthCode\AuthCodeRepository
- Client
Lookyman\NetteOAuth2Server\Storage\Doctrine\Client\ClientEntityLookyman\NetteOAuth2Server\Storage\Doctrine\Client\ClientRepository
- RefreshToken
Lookyman\NetteOAuth2Server\Storage\Doctrine\RefreshToken\RefreshTokenEntityLookyman\NetteOAuth2Server\Storage\Doctrine\RefreshToken\RefreshTokenRepository
- Scope
Lookyman\NetteOAuth2Server\Storage\Doctrine\Scope\ScopeEntityLookyman\NetteOAuth2Server\Storage\Doctrine\Scope\ScopeRepository
At minimum, you should create a way to register the client applications. Unless of course you just want do it manually in the database.
Protecting resources
This package provides an abstract Lookyman\NetteOAuth2Server\UI\ResourcePresenter that you can use to protect your resources. It's checkRequirements() method validates the access token and fires an onAuthorized event with the modified Psr\Http\Message\ServerRequestInterface object. The following attributes will be set on it in case of successful validation:
oauth_access_token_id- the access token identifier,oauth_client_id- the client identifier,oauth_user_id- the user identifier represented by the access token,oauth_scopes- an array of string scope identifiers.
Advanced usage
Custom approve template
The template of the approve component is Bootstrap ready, but can be changed using some trait magic:
class ApprovePresenter extends Presenter { use ApprovePresenterTrait { createComponentApprove as ___createComponentApprove; } // ... /** * @return ApproveControl */ protected function createComponentApprove() { $control = $this->___createComponentApprove(); $control->setTemplateFile(__DIR__ . '/path/to/template.latte'); return $control; } }
The template gets passed a single variable $authorizationRequest with a League\OAuth2\Server\RequestTypes\AuthorizationRequest object inside containing information about the request being approved.
Custom grants
Custom grants have to implement League\OAuth2\Server\Grant\GrantTypeInterface. Enable them in your config.neon like this:
services: - MyCustomGrant oauth2.authorizationServer: setup: - enableGrantType(@MyCustomGrant)
Logging
This package supports standard PSR-3 logging. If you have a compliant logger registered as a service, the easiest way to enable it is via config.neon:
decorator: Psr\Log\LoggerAwareInterface: setup: - setLogger
Client secret validation
By default, the Lookyman\NetteOAuth2Server\Storage\Doctrine\Client\ClientRepository uses a simple hash_equals function to validate the client secret. This means that it expects the secrets in the database to be stored in plaintext, which might not be the best of ideas for obvious reasons. It is therefore STRONGLY recommended that you store the secrets hashed (for example with password_hash()), and implement your custom secret validator:
class SecretValidator { public function __invoke($expected, $actual) { return password_verify($actual, $expected); } }
Then register it in the config:
services: - SecretValidator oauth2.repository.client: arguments: [secretValidator: @SecretValidator]
User credentials validation
Lookyman\NetteOAuth2Server\User\UserRepository validates user credentials by trying to log the user in. However, if your login process is somehow modified, this can easily fail in unexpected ways. In that case you might need to reimplement the credentials validator. Just get the correct user ID the way your application does it, and return Lookyman\NetteOAuth2Server\User\UserEntity (or null in case of bad credentials).
class CredentialsValidator { public function __invoke($username, $password, $grantType, ClientEntityInterface $clientEntity) { // get the user ID from your application, and return new UserEntity($userId); } }
Then register it in the config:
services: - CredentialsValidator oauth2.repository.user: arguments: [credentialsValidator: @CredentialsValidator]
Modifying scopes
Just before an access token is issued, you can modify the requested scopes. By default the token is issued with exactly the same scopes that were requested, but you can change that with a custom finalizer:
class ScopeFinalizer { public function __invoke(array $scopes, $grantType, ClientEntityInterface $clientEntity, $userIdentifier) { return $scopes; // this is the default behavior } }
Then register it in the config:
services: - ScopeFinalizer oauth2.repository.scope: arguments: [scopeFinalizer: @ScopeFinalizer]