RemoteOidcController.php 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. <?php
  2. namespace App\Http\Controllers;
  3. use App\Models\UserOidcMapping;
  4. use Purify;
  5. use App\Services\EmailService;
  6. use App\Services\UserOidcService;
  7. use App\User;
  8. use Illuminate\Auth\Events\Registered;
  9. use Illuminate\Http\Request;
  10. use Illuminate\Support\Facades\Auth;
  11. use Illuminate\Support\Facades\Hash;
  12. use Illuminate\Support\Str;
  13. use App\Rules\EmailNotBanned;
  14. use App\Rules\PixelfedUsername;
  15. class RemoteOidcController extends Controller
  16. {
  17. protected $fractal;
  18. public function start(UserOidcService $provider, Request $request)
  19. {
  20. abort_unless((bool) config('remote-auth.oidc.enabled'), 404);
  21. if ($request->user()) {
  22. return redirect('/');
  23. }
  24. $url = $provider->getAuthorizationUrl([
  25. 'scope' => $provider->getDefaultScopes(),
  26. ]);
  27. $request->session()->put('oauth2state', $provider->getState());
  28. return redirect($url);
  29. }
  30. public function handleCallback(UserOidcService $provider, Request $request)
  31. {
  32. abort_unless((bool) config('remote-auth.oidc.enabled'), 404);
  33. if ($request->user()) {
  34. return redirect('/');
  35. }
  36. abort_unless($request->input("state"), 400);
  37. abort_unless($request->input("code"), 400);
  38. abort_unless(hash_equals($request->session()->pull('oauth2state'), $request->input("state")), 400, "invalid state");
  39. $accessToken = $provider->getAccessToken('authorization_code', [
  40. 'code' => $request->get('code')
  41. ]);
  42. $userInfo = $provider->getResourceOwner($accessToken);
  43. $userInfoId = $userInfo->getId();
  44. $userInfoData = $userInfo->toArray();
  45. $mappedUser = UserOidcMapping::where('oidc_id', $userInfoId)->first();
  46. if ($mappedUser) {
  47. $this->guarder()->login($mappedUser->user);
  48. return redirect('/');
  49. }
  50. abort_if(EmailService::isBanned($userInfoData["email"]), 400, 'Banned email.');
  51. $user = $this->createUser([
  52. 'username' => $userInfoData[config('remote-auth.oidc.field_username')],
  53. 'name' => $userInfoData["name"] ?? $userInfoData["display_name"] ?? $userInfoData[config('remote-auth.oidc.field_username')] ?? null,
  54. 'email' => $userInfoData["email"],
  55. ]);
  56. UserOidcMapping::create([
  57. 'user_id' => $user->id,
  58. 'oidc_id' => $userInfoId,
  59. ]);
  60. return redirect('/');
  61. }
  62. protected function createUser($data)
  63. {
  64. $this->validate(new Request($data), [
  65. 'email' => [
  66. 'required',
  67. 'string',
  68. 'email:strict,filter_unicode,dns,spoof',
  69. 'max:255',
  70. 'unique:users',
  71. new EmailNotBanned(),
  72. ],
  73. 'username' => [
  74. 'required',
  75. 'min:2',
  76. 'max:30',
  77. 'unique:users,username',
  78. new PixelfedUsername(),
  79. ],
  80. 'name' => 'nullable|max:30',
  81. ]);
  82. event(new Registered($user = User::create([
  83. 'name' => Purify::clean($data['name']),
  84. 'username' => $data['username'],
  85. 'email' => $data['email'],
  86. 'password' => Hash::make(Str::password()),
  87. 'email_verified_at' => now(),
  88. 'app_register_ip' => request()->ip(),
  89. 'register_source' => 'oidc',
  90. ])));
  91. $this->guarder()->login($user);
  92. return $user;
  93. }
  94. protected function guarder()
  95. {
  96. return Auth::guard();
  97. }
  98. }