123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346 |
- <?php
- /**
- * Twilio Capability Token generator
- *
- * @category Services
- * @package Services_Twilio
- * @author Jeff Lindsay <jeff.lindsay@twilio.com>
- * @license http://creativecommons.org/licenses/MIT/ MIT
- */
- class Services_Twilio_Capability
- {
- public $accountSid;
- public $authToken;
- public $scopes;
- /**
- * Create a new TwilioCapability with zero permissions. Next steps are to
- * grant access to resources by configuring this token through the
- * functions allowXXXX.
- *
- * @param $accountSid the account sid to which this token is granted access
- * @param $authToken the secret key used to sign the token. Note, this auth
- * token is not visible to the user of the token.
- */
- public function __construct($accountSid, $authToken)
- {
- $this->accountSid = $accountSid;
- $this->authToken = $authToken;
- $this->scopes = array();
- $this->clientName = false;
- }
- /**
- * If the user of this token should be allowed to accept incoming
- * connections then configure the TwilioCapability through this method and
- * specify the client name.
- *
- * @param $clientName
- */
- public function allowClientIncoming($clientName)
- {
- // clientName must be a non-zero length alphanumeric string
- if (preg_match('/\W/', $clientName)) {
- throw new InvalidArgumentException(
- 'Only alphanumeric characters allowed in client name.');
- }
- if (strlen($clientName) == 0) {
- throw new InvalidArgumentException(
- 'Client name must not be a zero length string.');
- }
- $this->clientName = $clientName;
- $this->allow('client', 'incoming',
- array('clientName' => $clientName));
- }
- /**
- * Allow the user of this token to make outgoing connections.
- *
- * @param $appSid the application to which this token grants access
- * @param $appParams signed parameters that the user of this token cannot
- * overwrite.
- */
- public function allowClientOutgoing($appSid, array $appParams=array())
- {
- $this->allow('client', 'outgoing', array(
- 'appSid' => $appSid,
- 'appParams' => http_build_query($appParams, '', '&')));
- }
- /**
- * Allow the user of this token to access their event stream.
- *
- * @param $filters key/value filters to apply to the event stream
- */
- public function allowEventStream(array $filters=array())
- {
- $this->allow('stream', 'subscribe', array(
- 'path' => '/2010-04-01/Events',
- 'params' => http_build_query($filters, '', '&'),
- ));
- }
- /**
- * Generates a new token based on the credentials and permissions that
- * previously has been granted to this token.
- *
- * @param $ttl the expiration time of the token (in seconds). Default
- * value is 3600 (1hr)
- * @return the newly generated token that is valid for $ttl seconds
- */
- public function generateToken($ttl = 3600)
- {
- $payload = array(
- 'scope' => array(),
- 'iss' => $this->accountSid,
- 'exp' => time() + $ttl,
- );
- $scopeStrings = array();
- foreach ($this->scopes as $scope) {
- if ($scope->privilege == "outgoing" && $this->clientName)
- $scope->params["clientName"] = $this->clientName;
- $scopeStrings[] = $scope->toString();
- }
- $payload['scope'] = implode(' ', $scopeStrings);
- return JWT::encode($payload, $this->authToken, 'HS256');
- }
- protected function allow($service, $privilege, $params) {
- $this->scopes[] = new ScopeURI($service, $privilege, $params);
- }
- }
- /**
- * Scope URI implementation
- *
- * Simple way to represent configurable privileges in an OAuth
- * friendly way. For our case, they look like this:
- *
- * scope:<service>:<privilege>?<params>
- *
- * For example:
- * scope:client:incoming?name=jonas
- *
- * @author Jeff Lindsay <jeff.lindsay@twilio.com>
- */
- class ScopeURI
- {
- public $service;
- public $privilege;
- public $params;
- public function __construct($service, $privilege, $params = array())
- {
- $this->service = $service;
- $this->privilege = $privilege;
- $this->params = $params;
- }
- public function toString()
- {
- $uri = "scope:{$this->service}:{$this->privilege}";
- if (count($this->params)) {
- $uri .= "?".http_build_query($this->params, '', '&');
- }
- return $uri;
- }
- /**
- * Parse a scope URI into a ScopeURI object
- *
- * @param string $uri The scope URI
- * @return ScopeURI The parsed scope uri
- */
- public static function parse($uri)
- {
- if (strpos($uri, 'scope:') !== 0) {
- throw new UnexpectedValueException(
- 'Not a scope URI according to scheme');
- }
- $parts = explode('?', $uri, 1);
- $params = null;
- if (count($parts) > 1) {
- parse_str($parts[1], $params);
- }
- $parts = explode(':', $parts[0], 2);
- if (count($parts) != 3) {
- throw new UnexpectedValueException(
- 'Not enough parts for scope URI');
- }
- list($scheme, $service, $privilege) = $parts;
- return new ScopeURI($service, $privilege, $params);
- }
- }
- /**
- * JSON Web Token implementation
- *
- * Minimum implementation used by Realtime auth, based on this spec:
- * http://self-issued.info/docs/draft-jones-json-web-token-01.html.
- *
- * @author Neuman Vong <neuman@twilio.com>
- */
- class JWT
- {
- /**
- * @param string $jwt The JWT
- * @param string|null $key The secret key
- * @param bool $verify Don't skip verification process
- *
- * @return object The JWT's payload as a PHP object
- */
- public static function decode($jwt, $key = null, $verify = true)
- {
- $tks = explode('.', $jwt);
- if (count($tks) != 3) {
- throw new UnexpectedValueException('Wrong number of segments');
- }
- list($headb64, $payloadb64, $cryptob64) = $tks;
- if (null === ($header = JWT::jsonDecode(JWT::urlsafeB64Decode($headb64)))
- ) {
- throw new UnexpectedValueException('Invalid segment encoding');
- }
- if (null === $payload = JWT::jsonDecode(JWT::urlsafeB64Decode($payloadb64))
- ) {
- throw new UnexpectedValueException('Invalid segment encoding');
- }
- $sig = JWT::urlsafeB64Decode($cryptob64);
- if ($verify) {
- if (empty($header->alg)) {
- throw new DomainException('Empty algorithm');
- }
- if ($sig != JWT::sign("$headb64.$payloadb64", $key, $header->alg)) {
- throw new UnexpectedValueException('Signature verification failed');
- }
- }
- return $payload;
- }
- /**
- * @param object|array $payload PHP object or array
- * @param string $key The secret key
- * @param string $algo The signing algorithm
- *
- * @return string A JWT
- */
- public static function encode($payload, $key, $algo = 'HS256')
- {
- $header = array('typ' => 'JWT', 'alg' => $algo);
- $segments = array();
- $segments[] = JWT::urlsafeB64Encode(JWT::jsonEncode($header));
- $segments[] = JWT::urlsafeB64Encode(JWT::jsonEncode($payload));
- $signing_input = implode('.', $segments);
- $signature = JWT::sign($signing_input, $key, $algo);
- $segments[] = JWT::urlsafeB64Encode($signature);
- return implode('.', $segments);
- }
- /**
- * @param string $msg The message to sign
- * @param string $key The secret key
- * @param string $method The signing algorithm
- *
- * @return string An encrypted message
- */
- public static function sign($msg, $key, $method = 'HS256')
- {
- $methods = array(
- 'HS256' => 'sha256',
- 'HS384' => 'sha384',
- 'HS512' => 'sha512',
- );
- if (empty($methods[$method])) {
- throw new DomainException('Algorithm not supported');
- }
- return hash_hmac($methods[$method], $msg, $key, true);
- }
- /**
- * @param string $input JSON string
- *
- * @return object Object representation of JSON string
- */
- public static function jsonDecode($input)
- {
- $obj = json_decode($input);
- if (function_exists('json_last_error') && $errno = json_last_error()) {
- JWT::handleJsonError($errno);
- }
- else if ($obj === null && $input !== 'null') {
- throw new DomainException('Null result with non-null input');
- }
- return $obj;
- }
- /**
- * @param object|array $input A PHP object or array
- *
- * @return string JSON representation of the PHP object or array
- */
- public static function jsonEncode($input)
- {
- $json = json_encode($input);
- if (function_exists('json_last_error') && $errno = json_last_error()) {
- JWT::handleJsonError($errno);
- }
- else if ($json === 'null' && $input !== null) {
- throw new DomainException('Null result with non-null input');
- }
- return $json;
- }
- /**
- * @param string $input A base64 encoded string
- *
- * @return string A decoded string
- */
- public static function urlsafeB64Decode($input)
- {
- $padlen = 4 - strlen($input) % 4;
- $input .= str_repeat('=', $padlen);
- return base64_decode(strtr($input, '-_', '+/'));
- }
- /**
- * @param string $input Anything really
- *
- * @return string The base64 encode of what you passed in
- */
- public static function urlsafeB64Encode($input)
- {
- return str_replace('=', '', strtr(base64_encode($input), '+/', '-_'));
- }
- /**
- * @param int $errno An error number from json_last_error()
- *
- * @return void
- */
- private static function handleJsonError($errno)
- {
- $messages = array(
- JSON_ERROR_DEPTH => 'Maximum stack depth exceeded',
- JSON_ERROR_CTRL_CHAR => 'Unexpected control character found',
- JSON_ERROR_SYNTAX => 'Syntax error, malformed JSON'
- );
- throw new DomainException(isset($messages[$errno])
- ? $messages[$errno]
- : 'Unknown JSON error: ' . $errno
- );
- }
- }
|