diff --git a/includes/openid-connect-generic-client-wrapper.php b/includes/openid-connect-generic-client-wrapper.php index 0bf5278..3823a3d 100644 --- a/includes/openid-connect-generic-client-wrapper.php +++ b/includes/openid-connect-generic-client-wrapper.php @@ -1,12 +1,12 @@ <?php class OpenID_Connect_Generic_Client_Wrapper { - + private $client; - + // settings object private $settings; - + // logger object private $logger; @@ -19,10 +19,9 @@ class OpenID_Connect_Generic_Client_Wrapper { // WP_Error if there was a problem, or false if no error private $error = false; - /** * Inject necessary objects and services into the client - * + * * @param \OpenID_Connect_Generic_Client $client * @param \OpenID_Connect_Generic_Option_Settings $settings * @param \OpenID_Connect_Generic_Option_Logger $logger @@ -44,7 +43,7 @@ class OpenID_Connect_Generic_Client_Wrapper { */ static public function register( OpenID_Connect_Generic_Client $client, OpenID_Connect_Generic_Option_Settings $settings, OpenID_Connect_Generic_Option_Logger $logger ){ $client_wrapper = new self( $client, $settings, $logger ); - + // integrated logout if ( $settings->endpoint_end_session ) { add_filter( 'allowed_redirect_hosts', array( $client_wrapper, 'update_allowed_redirect_hosts' ), 99, 1 ); @@ -72,13 +71,13 @@ class OpenID_Connect_Generic_Client_Wrapper { if ( is_user_logged_in() ) { add_action( 'wp_loaded', array($client_wrapper, 'ensure_tokens_still_fresh')); } - + return $client_wrapper; } /** * Implements WP action - parse_request - * + * * @param $query * * @return mixed @@ -96,7 +95,7 @@ class OpenID_Connect_Generic_Client_Wrapper { /** * Get the authentication url from the client - * + * * @return string */ function get_authentication_url(){ @@ -144,7 +143,7 @@ class OpenID_Connect_Generic_Client_Wrapper { } $token_result = $this->client->request_new_tokens( $refresh_token ); - + if ( is_wp_error( $token_result ) ) { wp_logout(); $this->error_redirect( $token_result ); @@ -168,10 +167,10 @@ class OpenID_Connect_Generic_Client_Wrapper { */ function error_redirect( $error ) { $this->logger->log( $error ); - + // redirect user back to login page - wp_redirect( - wp_login_url() . + wp_redirect( + wp_login_url() . '?login-error=' . $error->get_error_code() . '&message=' . urlencode( $error->get_error_message() ) ); @@ -186,7 +185,7 @@ class OpenID_Connect_Generic_Client_Wrapper { function get_error(){ return $this->error; } - + /** * Add the end_session endpoint to WP core's whitelist of redirect hosts * @@ -266,31 +265,31 @@ class OpenID_Connect_Generic_Client_Wrapper { return $request; } - + /** * Control the authentication and subsequent authorization of the user when * returning from the IDP. */ function authentication_request_callback() { $client = $this->client; - + // start the authentication flow $authentication_request = $client->validate_authentication_request( $_GET ); - + if ( is_wp_error( $authentication_request ) ){ $this->error_redirect( $authentication_request ); } - + // retrieve the authentication code from the authentication request $code = $client->get_authentication_code( $authentication_request ); - + if ( is_wp_error( $code ) ){ $this->error_redirect( $code ); } // attempting to exchange an authorization code for an authentication token $token_result = $client->request_authentication_token( $code ); - + if ( is_wp_error( $token_result ) ) { $this->error_redirect( $token_result ); } @@ -307,7 +306,7 @@ class OpenID_Connect_Generic_Client_Wrapper { // ensure the that response contains required information $valid = $client->validate_token_response( $token_response ); - + if ( is_wp_error( $valid ) ) { $this->error_redirect( $valid ); } @@ -328,28 +327,28 @@ class OpenID_Connect_Generic_Client_Wrapper { if ( is_wp_error( $id_token_claim ) ){ $this->error_redirect( $id_token_claim ); } - + // validate our id_token has required values $valid = $client->validate_id_token_claim( $id_token_claim ); - + if ( is_wp_error( $valid ) ){ $this->error_redirect( $valid ); } - + // if userinfo endpoint is set, exchange the token_response for a user_claim if ( !empty( $this->settings->endpoint_userinfo ) && isset( $token_response['access_token'] )) { $user_claim = $client->get_user_claim( $token_response ); } else { $user_claim = $id_token_claim; } - + if ( is_wp_error( $user_claim ) ){ $this->error_redirect( $user_claim ); } - + // validate our user_claim has required values $valid = $client->validate_user_claim( $user_claim, $id_token_claim ); - + if ( is_wp_error( $valid ) ){ $this->error_redirect( $valid ); } @@ -380,7 +379,7 @@ class OpenID_Connect_Generic_Client_Wrapper { // validate the found / created user $valid = $this->validate_user( $user ); - + if ( is_wp_error( $valid ) ){ $this->error_redirect( $valid ); } @@ -405,13 +404,13 @@ class OpenID_Connect_Generic_Client_Wrapper { else { wp_redirect( home_url() ); } - + exit; } /** - * Validate the potential WP_User - * + * Validate the potential WP_User + * * @param $user * * @return true|\WP_Error @@ -421,13 +420,13 @@ class OpenID_Connect_Generic_Client_Wrapper { if ( ! is_a( $user, 'WP_User' ) || ! $user->exists() ) { return new WP_Error( 'invalid-user', __( 'Invalid user' ), $user ); } - + return true; } /** * Record user meta data, and provide an authorization cookie - * + * * @param $user */ function login_user( $user, $token_response, $id_token_claim, $user_claim, $subject_identity ){ @@ -478,8 +477,8 @@ class OpenID_Connect_Generic_Client_Wrapper { } /** - * Get the user that has meta data matching a - * + * Get the user that has meta data matching a + * * @param $subject_identity * * @return false|\WP_User @@ -500,7 +499,7 @@ class OpenID_Connect_Generic_Client_Wrapper { $users = $user_query->get_results(); return $users[0]; } - + return false; } @@ -592,7 +591,7 @@ class OpenID_Connect_Generic_Client_Wrapper { $string .= substr( $format, $i, $match[ 1 ] - $i ); if ( ! isset( $user_claim[ $key ] ) ) { if ( $error_on_missing_key ) { - return new WP_Error( 'incomplete-user-claim', __( 'User claim incomplete' ), + return new WP_Error( 'incomplete-user-claim', __( 'User claim incomplete' ), array('message'=>'Unable to find key: '.$key.' in user_claim', 'hint'=>'Verify OpenID Scope includes a scope with the attributes you need', 'user_claim'=>$user_claim, @@ -638,7 +637,7 @@ class OpenID_Connect_Generic_Client_Wrapper { /** * Create a new user from details in a user_claim - * + * * @param $subject_identity * @param $user_claim * @@ -738,14 +737,14 @@ class OpenID_Connect_Generic_Client_Wrapper { } } - // allow other plugins / themes to determine authorization + // allow other plugins / themes to determine authorization // of new accounts based on the returned user claim $create_user = apply_filters( 'openid-connect-generic-user-creation-test', true, $user_claim ); if ( ! $create_user ) { return new WP_Error( 'cannot-authorize', __( 'Can not authorize.' ), $create_user ); } - + $user_data = array( 'user_login' => $username, 'user_pass' => wp_generate_password( 32, true, true ), @@ -776,26 +775,25 @@ class OpenID_Connect_Generic_Client_Wrapper { // allow plugins / themes to take action on new user creation do_action( 'openid-connect-generic-user-create', $user, $user_claim ); - + return $user; } - - + /** * Update an existing user with OpenID Connect meta data - * + * * @param $uid * @param $subject_identity * * @return \WP_Error | \WP_User */ function update_existing_user( $uid, $subject_identity ) { - // add the OpenID Connect meta data + // add the OpenID Connect meta data update_user_meta( $uid, 'openid-connect-generic-subject-identity', (string) $subject_identity ); - + // allow plugins / themes to take action on user update do_action( 'openid-connect-generic-user-update', $uid ); - + // return our updated user return get_user_by( 'id', $uid ); } diff --git a/includes/openid-connect-generic-client.php b/includes/openid-connect-generic-client.php index aa635fd..100d3a1 100644 --- a/includes/openid-connect-generic-client.php +++ b/includes/openid-connect-generic-client.php @@ -67,9 +67,9 @@ class OpenID_Connect_Generic_Client { /** * Validate the request for login authentication - * + * * @param $request - * + * * @return array|\WP_Error */ function validate_authentication_request( $request ){ @@ -111,7 +111,7 @@ class OpenID_Connect_Generic_Client { * Using the authorization_code, request an authentication token from the idp * * @param $code - authorization_code - * + * * @return array|\WP_Error */ function request_authentication_token( $code ) { @@ -142,7 +142,7 @@ class OpenID_Connect_Generic_Client { if ( is_wp_error( $response ) ){ $response->add( 'request_authentication_token' , __( 'Request for authentication token failed.' ) ); } - + return $response; } @@ -203,12 +203,12 @@ class OpenID_Connect_Generic_Client { return $token_response; } - + /** * Exchange an access_token for a user_claim from the userinfo endpoint * * @param $access_token - * + * * @return array|\WP_Error */ function request_userinfo( $access_token ) { @@ -240,7 +240,7 @@ class OpenID_Connect_Generic_Client { if ( is_wp_error( $response ) ){ $response->add( 'request_userinfo' , __( 'Request for userinfo failed.' ) ); } - + return $response; } @@ -293,18 +293,18 @@ class OpenID_Connect_Generic_Client { function validate_token_response( $token_response ){ // we need to ensure 2 specific items exist with the token response in order // to proceed with confidence: id_token and token_type == 'Bearer' - if ( ! isset( $token_response['id_token'] ) || + if ( ! isset( $token_response['id_token'] ) || ! isset( $token_response['token_type'] ) || strcasecmp( $token_response['token_type'], 'Bearer' ) ) { return new WP_Error( 'invalid-token-response', 'Invalid token response', $token_response ); } - + return true; } /** * Extract the id_token_claim from the token_response - * + * * @param $token_response * * @return array|\WP_Error @@ -333,13 +333,13 @@ class OpenID_Connect_Generic_Client { ) , true ); - + return $id_token_claim; } /** * Ensure the id_token_claim contains the required values - * + * * @param $id_token_claim * * @return bool|\WP_Error @@ -348,20 +348,20 @@ class OpenID_Connect_Generic_Client { if ( ! is_array( $id_token_claim ) ) { return new WP_Error( 'bad-id-token-claim', __( 'Bad ID token claim' ), $id_token_claim ); } - + // make sure we can find our identification data and that it has a value if ( ! isset( $id_token_claim['sub'] ) || empty( $id_token_claim['sub'] ) ) { return new WP_Error( 'no-subject-identity', __( 'No subject identity' ), $id_token_claim ); } - + return true; } /** * Attempt to exchange the access_token for a user_claim - * + * * @param $token_response - * + * * @return array|mixed|object|\WP_Error */ function get_user_claim( $token_response ){ @@ -377,11 +377,11 @@ class OpenID_Connect_Generic_Client { return $user_claim; } - + /** * Make sure the user_claim has all required values, and that the subject * identity matches of the id_token matches that of the user_claim. - * + * * @param $user_claim * @param $id_token_claim * @@ -409,17 +409,17 @@ class OpenID_Connect_Generic_Client { // allow for other plugins to alter the login success $login_user = apply_filters( 'openid-connect-generic-user-login-test', true, $user_claim ); - + if ( ! $login_user ) { return new WP_Error( 'unauthorized', __( 'Unauthorized access' ), $login_user ); } - + return true; } /** * Retrieve the subject identity from the id_token - * + * * @param $id_token_claim array * * @return mixed diff --git a/includes/openid-connect-generic-option-logger.php b/includes/openid-connect-generic-option-logger.php index 96ce655..3ea7b1d 100644 --- a/includes/openid-connect-generic-option-logger.php +++ b/includes/openid-connect-generic-option-logger.php @@ -3,25 +3,25 @@ * Simple class for logging messages to the options table */ class OpenID_Connect_Generic_Option_Logger { - + // wp option name/key private $option_name; - + // default message type private $default_message_type; - + // the number of items to keep in the log private $log_limit; - - // whether or not the + + // whether or not the private $logging_enabled; - + // internal cache of logs private $logs; /** * Setup the logger according to the needs of the instance - * + * * @param string $option_name * @param string $default_message_type * @param bool|TRUE $logging_enabled @@ -36,7 +36,7 @@ class OpenID_Connect_Generic_Option_Logger { /** * Subscribe logger to a set of filters - * + * * @param $filter_names * @param int $priority */ @@ -44,7 +44,7 @@ class OpenID_Connect_Generic_Option_Logger { if ( ! is_array( $filter_names ) ) { $filter_names = array( $filter_names ); } - + foreach ( $filter_names as $filter ){ add_filter( $filter, array( $this, 'log_hook' ), $priority ); } @@ -52,7 +52,7 @@ class OpenID_Connect_Generic_Option_Logger { /** * Subscribe logger to a set of actions - * + * * @param $action_names * @param $priority */ @@ -67,8 +67,8 @@ class OpenID_Connect_Generic_Option_Logger { } /** - * Log the data - * + * Log the data + * * @param null $arg1 * @return null */ @@ -76,10 +76,10 @@ class OpenID_Connect_Generic_Option_Logger { $this->log( func_get_args(), current_filter() ); return $arg1; } - + /** * Save an array of data to the logs - * + * * @param $data mixed * @return bool */ @@ -90,13 +90,13 @@ class OpenID_Connect_Generic_Option_Logger { $logs = $this->upkeep_logs( $logs ); return $this->save_logs( $logs ); } - + return false; } /** * Retrieve all log messages - * + * * @return array */ public function get_logs() { @@ -109,7 +109,7 @@ class OpenID_Connect_Generic_Option_Logger { /** * Get the name of the option where this log is stored - * + * * @return string */ public function get_option_name(){ @@ -128,7 +128,7 @@ class OpenID_Connect_Generic_Option_Logger { // determine the type of message if ( empty( $type ) ) { $this->default_message_type; - + if ( is_array( $data ) && isset( $data['type'] ) ){ $type = $data['type']; } @@ -148,7 +148,7 @@ class OpenID_Connect_Generic_Option_Logger { return $message; } - + /** * Keep our log count under the limit * @@ -161,14 +161,14 @@ class OpenID_Connect_Generic_Option_Logger { if ( $items_to_remove > 0 ){ // keep only the last $log_limit messages from the end $logs = array_slice( $logs, ( $items_to_remove * -1) ); - } - + } + return $logs; } /** * Save the log messages - * + * * @param $logs * @return bool */ @@ -187,7 +187,7 @@ class OpenID_Connect_Generic_Option_Logger { /** * Get a simple html table of all the logs - * + * * @param array $logs * @return string */ @@ -196,9 +196,9 @@ class OpenID_Connect_Generic_Option_Logger { $logs = $this->get_logs(); } $logs = array_reverse( $logs ); - + ini_set( 'xdebug.var_display_max_depth', -1 ); - + ob_start(); ?> <style type="text/css"> @@ -232,7 +232,7 @@ class OpenID_Connect_Generic_Option_Logger { <?php print $log['uri']; ?> </div> </td> - + <td class="col-data"><pre><?php var_dump( $log['data'] ); ?></pre></td> </tr> <?php } ?> @@ -240,7 +240,7 @@ class OpenID_Connect_Generic_Option_Logger { </table> <?php $output = ob_get_clean(); - + return $output; } } diff --git a/includes/openid-connect-generic-option-settings.php b/includes/openid-connect-generic-option-settings.php index b88e0f9..7b9b9a0 100644 --- a/includes/openid-connect-generic-option-settings.php +++ b/includes/openid-connect-generic-option-settings.php @@ -3,13 +3,13 @@ * Class OpenId_Connect_Generic_Option_Settings */ class OpenID_Connect_Generic_Option_Settings { - + // wp option name/key private $option_name; - + // stored option values array private $values; - + // default plugin settings values private $default_settings; @@ -22,38 +22,38 @@ class OpenID_Connect_Generic_Option_Settings { $this->option_name = $option_name; $this->default_settings = $default_settings; $this->values = get_option( $this->option_name, $this->default_settings ); - + if ( $granular_defaults ) { $this->values = array_replace_recursive( $this->default_settings, $this->values ); } } - + function __get( $key ){ if ( isset( $this->values[ $key ] ) ) { return $this->values[ $key ]; } } - + function __set( $key, $value ){ $this->values[ $key ] = $value; } - + function __isset( $key ){ return isset( $this->values[ $key ] ); } - + function __unset( $key ){ unset( $this->values[ $key ]); } - + function get_values(){ return $this->values; } - + function get_option_name() { return $this->option_name; } - + function save(){ update_option( $this->option_name, $this->values ); } diff --git a/includes/openid-connect-generic-settings-page.php b/includes/openid-connect-generic-settings-page.php index 00c8f15..5178521 100644 --- a/includes/openid-connect-generic-settings-page.php +++ b/includes/openid-connect-generic-settings-page.php @@ -27,10 +27,10 @@ class OpenID_Connect_Generic_Settings_Page { $this->settings = $settings; $this->logger = $logger; $this->settings_field_group = $this->settings->get_option_name() . '-group'; - + /* * Simple settings fields simply have: - * + * * - title * - description * - type ( checkbox | text | select ) @@ -225,7 +225,7 @@ class OpenID_Connect_Generic_Settings_Page { // register our settings add_action( 'admin_init', array( $settings_page, 'admin_init' ) ); - + return $settings_page; } @@ -262,7 +262,7 @@ class OpenID_Connect_Generic_Settings_Page { array( $this, 'user_settings_description' ), $this->options_page_name ); - + add_settings_section( 'authorization_settings', __( 'Authorization Settings' ), array( $this, 'authorization_settings_description' ), @@ -322,7 +322,7 @@ class OpenID_Connect_Generic_Settings_Page { foreach ( $this->settings_fields as $key => $field ) { if ( isset( $input[ $key ] ) ) { $options[ $key ] = sanitize_text_field( trim( $input[ $key ] ) ); - } + } else { $options[ $key ] = ''; } @@ -349,7 +349,7 @@ class OpenID_Connect_Generic_Settings_Page { settings_fields( $this->settings_field_group ); do_settings_sections( $this->options_page_name ); submit_button(); - + // simple debug to view settings array if ( isset( $_GET['debug'] ) ) { var_dump( $this->settings->get_values() ); @@ -452,11 +452,11 @@ class OpenID_Connect_Generic_Settings_Page { public function client_settings_description() { _e( 'Enter your OpenID Connect identity provider settings' ); } - + public function user_settings_description() { _e( 'Modify the interaction between OpenID Connect and WordPress users' ); } - + public function authorization_settings_description() { _e( 'Control the authorization mechanics of the site' ); }