3 * IndieAuth to OpenID proxy.
4 * Proxies IndieAuth authorization requests to one's OpenID server
8 * @package indieauth-openid
9 * @author Christian Weiske <cweiske@cweiske.de>
10 * @license http://www.gnu.org/licenses/agpl.html GNU AGPL v3
11 * @link http://indiewebcamp.com/login-brainstorming
12 * @link http://indiewebcamp.com/authorization-endpoint
13 * @link http://indiewebcamp.com/auth-brainstorming
14 * @link https://indieauth.com/developers
16 if (($_SERVER['REQUEST_METHOD'] == 'GET' || $_SERVER['REQUEST_METHOD'] == 'HEAD')
23 require_once 'Net/URL2.php';
24 require_once 'OpenID.php';
25 require_once 'OpenID/RelyingParty.php';
26 require_once 'OpenID/Message.php';
27 require_once 'OpenID/Exception.php';
31 $db = new PDO('sqlite:' . __DIR__ . '/../data/tokens.sq3');
32 $db->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);
33 $db->exec("CREATE TABLE IF NOT EXISTS authtokens(
42 $stmt = $db->prepare('DELETE FROM authtokens WHERE created < :created');
43 $stmt->execute(array(':created' => date('c', time() - 60)));
48 function create_token($me, $redirect_uri, $client_id, $state)
50 $code = base64_encode(openssl_random_pseudo_bytes(32));
53 'INSERT INTO authtokens (code, me, redirect_uri, client_id, state, created)'
54 . ' VALUES(:code, :me, :redirect_uri, :client_id, :state, :created)'
59 ':redirect_uri' => $redirect_uri,
60 ':client_id' => $client_id,
61 ':state' => (string) $state,
62 ':created' => date('c')
68 function validate_token($code, $redirect_uri, $client_id, $state)
72 'SELECT me FROM authtokens WHERE'
74 . ' AND redirect_uri = :redirect_uri'
75 . ' AND client_id = :client_id'
76 . ' AND state = :state'
77 . ' AND created >= :created'
82 ':redirect_uri' => $redirect_uri,
83 ':client_id' => $client_id,
84 ':state' => (string) $state,
85 ':created' => date('c', time() - 60)
88 $row = $stmt->fetch(PDO::FETCH_ASSOC);
90 $stmt = $db->prepare('DELETE FROM authtokens WHERE code = :code');
91 $stmt->execute(array(':code' => $code));
101 header('HTTP/1.0 400 Bad Request');
102 header('Content-type: text/plain; charset=utf-8');
107 function verifyUrlParameter($givenParams, $paramName)
109 if (!isset($givenParams[$paramName])) {
110 error('"' . $paramName . '" parameter missing');
112 $url = parse_url($givenParams[$paramName]);
113 if (!isset($url['scheme'])) {
114 error('Invalid URL in "' . $paramName . '" parameter: scheme missing');
116 if (!isset($url['host'])) {
117 error('Invalid URL in "' . $paramName . '" parameter: host missing');
120 return $givenParams[$paramName];
123 function getBaseUrl()
125 if (!isset($_SERVER['REQUEST_SCHEME'])) {
126 $_SERVER['REQUEST_SCHEME'] = 'http';
128 $file = preg_replace('/[?#].*$/', '', $_SERVER['REQUEST_URI']);
129 return $_SERVER['REQUEST_SCHEME'] . '://'
130 . $_SERVER['HTTP_HOST']
134 header('IndieAuth: authorization_endpoint');
136 $returnTo = getBaseUrl();
137 $realm = getBaseUrl();
139 if (isset($_GET['openid_mode']) && $_GET['openid_mode'] != '') {
140 //verify openid response
141 if (!count($_POST)) {
142 list(, $queryString) = explode('?', $_SERVER['REQUEST_URI']);
144 $queryString = file_get_contents('php://input');
147 $message = new \OpenID_Message($queryString, \OpenID_Message::FORMAT_HTTP);
148 $id = $message->get('openid.claimed_id');
149 if (OpenID::normalizeIdentifier($id) != OpenID::normalizeIdentifier($_SESSION['me'])) {
152 'Given identity URL "%s" and claimed OpenID "%s" do not match',
158 $o = new \OpenID_RelyingParty($returnTo, $realm, $_SESSION['me']);
159 $result = $o->verify(new \Net_URL2($returnTo . '?' . $queryString), $message);
161 if ($result->success()) {
162 $token = create_token(
163 $_SESSION['me'], $_SESSION['redirect_uri'],
164 $_SESSION['client_id'], $_SESSION['state']
166 //redirect to indieauth
167 $url = new Net_URL2($_SESSION['redirect_uri']);
168 $url->setQueryVariable('code', $token);
169 $url->setQueryVariable('me', $_SESSION['me']);
170 $url->setQueryVariable('state', $_SESSION['state']);
171 header('Location: ' . $url->getURL());
174 error('Error verifying OpenID login: ' . $result->getAssertionMethod());
176 } catch (OpenID_Exception $e) {
177 error('Error verifying OpenID login: ' . $e->getMessage());
181 if ($_SERVER['REQUEST_METHOD'] == 'GET') {
182 $me = verifyUrlParameter($_GET, 'me');
183 $redirect_uri = verifyUrlParameter($_GET, 'redirect_uri');
184 $client_id = verifyUrlParameter($_GET, 'client_id');
186 if (isset($_GET['state'])) {
187 $state = $_GET['state'];
189 $response_type = 'id';
190 if (isset($_GET['response_type'])) {
191 $response_type = $_GET['response_type'];
193 if ($response_type != 'id') {
194 error('unsupported response_type: ' . $response_type);
197 $_SESSION['me'] = $me;
198 $_SESSION['redirect_uri'] = $redirect_uri;
199 $_SESSION['client_id'] = $client_id;
200 $_SESSION['state'] = $state;
203 $o = new \OpenID_RelyingParty($returnTo, $realm, $me);
204 $authRequest = $o->prepare();
205 $url = $authRequest->getAuthorizeURL();
206 header("Location: $url");
208 } catch (OpenID_Exception $e) {
209 error('OpenID error: ' . $e->getMessage());
211 } else if ($_SERVER['REQUEST_METHOD'] == 'POST') {
212 $redirect_uri = verifyUrlParameter($_POST, 'redirect_uri');
213 $client_id = verifyUrlParameter($_POST, 'client_id');
215 if (isset($_POST['state'])) {
216 $state = $_POST['state'];
218 if (!isset($_POST['code'])) {
219 error('"code" parameter missing');
221 $token = $_POST['code'];
223 $me = validate_token($token, $redirect_uri, $client_id, $state);
225 header('HTTP/1.0 400 Bad Request');
226 echo "Validating token failed\n";
229 header('Content-type: application/x-www-form-urlencoded');
230 echo 'me=' . urlencode($me);