mirror of
https://gh.llkk.cc/https://github.com/h5p/moodle-mod_hvp.git
synced 2026-03-04 13:36:41 +08:00
123 lines
3.6 KiB
PHP
123 lines
3.6 KiB
PHP
<?php
|
|
// This file is part of Moodle - http://moodle.org/
|
|
//
|
|
// Moodle is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// Moodle is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
/**
|
|
* Helpers for authenticating mobile users through tokens
|
|
*
|
|
* @package mod_hvp
|
|
* @copyright 2019 Joubel AS
|
|
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
|
|
*/
|
|
|
|
namespace mod_hvp;
|
|
|
|
defined('MOODLE_INTERNAL') || die();
|
|
|
|
class mobile_auth {
|
|
|
|
const VALID_TIME = 60;
|
|
|
|
/**
|
|
* Generate embed auth token
|
|
*
|
|
* @param string $secret Secret phrase added to the hash
|
|
* @param int $validfor Time factor that determines how long the token is valid
|
|
*
|
|
* @return array Login token and secret
|
|
* @throws \Exception
|
|
*/
|
|
public static function create_embed_auth_token($secret = null, $validfor = null) {
|
|
if (!$validfor) {
|
|
$validfor = self::get_time_factor();
|
|
}
|
|
|
|
if (empty($secret)) {
|
|
if (function_exists('random_bytes')) {
|
|
$secret = base64_encode(random_bytes(15));
|
|
} else if (function_exists('openssl_random_pseudo_bytes')) {
|
|
$secret = base64_encode(openssl_random_pseudo_bytes(15));
|
|
} else {
|
|
$secret = uniqid('', true);
|
|
}
|
|
}
|
|
|
|
return [
|
|
hash('md5', 'embed_auth' . $validfor . $secret),
|
|
$secret
|
|
];
|
|
}
|
|
|
|
/**
|
|
* Validate embed auth token
|
|
*
|
|
* @param string $token
|
|
* @param string $secret
|
|
*
|
|
* @return bool True if valid token was supplied
|
|
* @throws \Exception
|
|
*/
|
|
public static function validate_embed_auth_token($token, $secret) {
|
|
$timefactor = self::get_time_factor();
|
|
// Splitting into two halves and allowing both allows for fractions roundup in the time factor.
|
|
list($generatedtoken) = self::create_embed_auth_token($secret, $timefactor);
|
|
list($generatedtoken2) = self::create_embed_auth_token($secret, $timefactor - 1);
|
|
return $token === $generatedtoken || $token === $generatedtoken2;
|
|
}
|
|
|
|
/**
|
|
* Check if provided user_id and token are valid for authenticating the user
|
|
*
|
|
* @param string $userid
|
|
* @param string $token
|
|
*
|
|
* @return bool True if token and user_id is valid
|
|
* @throws \dml_exception
|
|
*/
|
|
public static function has_valid_token($userid, $secret) {
|
|
global $DB;
|
|
|
|
if (!$userid || !$secret) {
|
|
return false;
|
|
}
|
|
|
|
$auth = $DB->get_record('hvp_auth', array(
|
|
'user_id' => $userid,
|
|
));
|
|
if (!$auth) {
|
|
return false;
|
|
}
|
|
|
|
$isvalid = self::validate_embed_auth_token($auth->secret, $secret);
|
|
|
|
// Cleanup user's token when used.
|
|
if ($isvalid) {
|
|
$DB->delete_records('hvp_auth', array(
|
|
'user_id' => $userid
|
|
));
|
|
}
|
|
|
|
return $isvalid;
|
|
}
|
|
|
|
/**
|
|
* Get time factor for how long the token is valid
|
|
*
|
|
* @return float
|
|
*/
|
|
public static function get_time_factor() {
|
|
return ceil(time() / self::VALID_TIME);
|
|
}
|
|
}
|