|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
if ( ! class_exists( 'Jetpack_SSO_Helpers' ) ) : |
|
4
|
|
|
|
|
5
|
|
|
/** |
|
6
|
|
|
* A collection of helper functions used in the SSO module. |
|
7
|
|
|
* |
|
8
|
|
|
* @since 4.1.0 |
|
9
|
|
|
*/ |
|
10
|
|
|
class Jetpack_SSO_Helpers { |
|
11
|
|
|
/** |
|
12
|
|
|
* Determine if the login form should be hidden or not |
|
13
|
|
|
* |
|
14
|
|
|
* @return bool |
|
15
|
|
|
**/ |
|
16
|
|
|
static function should_hide_login_form() { |
|
17
|
|
|
/** |
|
18
|
|
|
* Remove the default log in form, only leave the WordPress.com log in button. |
|
19
|
|
|
* |
|
20
|
|
|
* @module sso |
|
21
|
|
|
* |
|
22
|
|
|
* @since 3.1.0 |
|
23
|
|
|
* |
|
24
|
|
|
* @param bool get_option( 'jetpack_sso_remove_login_form', false ) Should the default log in form be removed. Default to false. |
|
25
|
|
|
*/ |
|
26
|
|
|
return (bool) apply_filters( 'jetpack_remove_login_form', get_option( 'jetpack_sso_remove_login_form', false ) ); |
|
27
|
|
|
} |
|
28
|
|
|
|
|
29
|
|
|
/** |
|
30
|
|
|
* Returns a boolean value for whether logging in by matching the WordPress.com user email to a |
|
31
|
|
|
* Jetpack site user's email is allowed. |
|
32
|
|
|
* |
|
33
|
|
|
* @return bool |
|
34
|
|
|
*/ |
|
35
|
|
|
static function match_by_email() { |
|
36
|
|
|
$match_by_email = ( 1 == get_option( 'jetpack_sso_match_by_email', true ) ) ? true: false; |
|
37
|
|
|
$match_by_email = defined( 'WPCC_MATCH_BY_EMAIL' ) ? WPCC_MATCH_BY_EMAIL : $match_by_email; |
|
38
|
|
|
|
|
39
|
|
|
/** |
|
40
|
|
|
* Link the local account to an account on WordPress.com using the same email address. |
|
41
|
|
|
* |
|
42
|
|
|
* @module sso |
|
43
|
|
|
* |
|
44
|
|
|
* @since 2.6.0 |
|
45
|
|
|
* |
|
46
|
|
|
* @param bool $match_by_email Should we link the local account to an account on WordPress.com using the same email address. Default to false. |
|
47
|
|
|
*/ |
|
48
|
|
|
return (bool) apply_filters( 'jetpack_sso_match_by_email', $match_by_email ); |
|
49
|
|
|
} |
|
50
|
|
|
|
|
51
|
|
|
/** |
|
52
|
|
|
* Returns a boolean for whether users are allowed to register on the Jetpack site with SSO, |
|
53
|
|
|
* even though the site disallows normal registrations. |
|
54
|
|
|
* |
|
55
|
|
|
* @return bool |
|
56
|
|
|
*/ |
|
57
|
|
|
static function new_user_override( $user_data = null ) { |
|
58
|
|
|
$new_user_override = defined( 'WPCC_NEW_USER_OVERRIDE' ) ? WPCC_NEW_USER_OVERRIDE : false; |
|
59
|
|
|
|
|
60
|
|
|
/** |
|
61
|
|
|
* Allow users to register on your site with a WordPress.com account, even though you disallow normal registrations. |
|
62
|
|
|
* If you return a string that corresponds to a user role, the user will be given that role. |
|
63
|
|
|
* |
|
64
|
|
|
* @module sso |
|
65
|
|
|
* |
|
66
|
|
|
* @since 2.6.0 |
|
67
|
|
|
* @since 4.6 $user_data object is now passed to the jetpack_sso_new_user_override filter |
|
68
|
|
|
* |
|
69
|
|
|
* @param bool $new_user_override Allow users to register on your site with a WordPress.com account. Default to false. |
|
70
|
|
|
* @param object|null $user_data An object containing the user data returned from WordPress.com. |
|
71
|
|
|
*/ |
|
72
|
|
|
$role = apply_filters( 'jetpack_sso_new_user_override', $new_user_override, $user_data ); |
|
73
|
|
|
|
|
74
|
|
|
if ( $role ) { |
|
75
|
|
|
if ( is_string( $role ) && get_role( $role ) ) { |
|
76
|
|
|
return $role; |
|
77
|
|
|
} else { |
|
78
|
|
|
return get_option( 'default_role' ); |
|
79
|
|
|
} |
|
80
|
|
|
} |
|
81
|
|
|
|
|
82
|
|
|
return false; |
|
83
|
|
|
} |
|
84
|
|
|
|
|
85
|
|
|
/** |
|
86
|
|
|
* Returns a boolean value for whether two-step authentication is required for SSO. |
|
87
|
|
|
* |
|
88
|
|
|
* @since 4.1.0 |
|
89
|
|
|
* |
|
90
|
|
|
* @return bool |
|
91
|
|
|
*/ |
|
92
|
|
|
static function is_two_step_required() { |
|
93
|
|
|
/** |
|
94
|
|
|
* Is it required to have 2-step authentication enabled on WordPress.com to use SSO? |
|
95
|
|
|
* |
|
96
|
|
|
* @module sso |
|
97
|
|
|
* |
|
98
|
|
|
* @since 2.8.0 |
|
99
|
|
|
* |
|
100
|
|
|
* @param bool get_option( 'jetpack_sso_require_two_step' ) Does SSO require 2-step authentication? |
|
101
|
|
|
*/ |
|
102
|
|
|
return (bool) apply_filters( 'jetpack_sso_require_two_step', get_option( 'jetpack_sso_require_two_step', false ) ); |
|
103
|
|
|
} |
|
104
|
|
|
|
|
105
|
|
|
/** |
|
106
|
|
|
* Returns a boolean for whether a user that is attempting to log in will be automatically |
|
107
|
|
|
* redirected to WordPress.com to begin the SSO flow. |
|
108
|
|
|
* |
|
109
|
|
|
* @return bool |
|
110
|
|
|
*/ |
|
111
|
|
|
static function bypass_login_forward_wpcom() { |
|
112
|
|
|
/** |
|
113
|
|
|
* Redirect the site's log in form to WordPress.com's log in form. |
|
114
|
|
|
* |
|
115
|
|
|
* @module sso |
|
116
|
|
|
* |
|
117
|
|
|
* @since 3.1.0 |
|
118
|
|
|
* |
|
119
|
|
|
* @param bool false Should the site's log in form be automatically forwarded to WordPress.com's log in form. |
|
120
|
|
|
*/ |
|
121
|
|
|
return (bool) apply_filters( 'jetpack_sso_bypass_login_forward_wpcom', false ); |
|
122
|
|
|
} |
|
123
|
|
|
|
|
124
|
|
|
/** |
|
125
|
|
|
* Returns a boolean for whether the SSO login form should be displayed as the default |
|
126
|
|
|
* when both the default and SSO login form allowed. |
|
127
|
|
|
* |
|
128
|
|
|
* @since 4.1.0 |
|
129
|
|
|
* |
|
130
|
|
|
* @return bool |
|
131
|
|
|
*/ |
|
132
|
|
|
static function show_sso_login() { |
|
133
|
|
|
if ( self::should_hide_login_form() ) { |
|
134
|
|
|
return true; |
|
135
|
|
|
} |
|
136
|
|
|
|
|
137
|
|
|
/** |
|
138
|
|
|
* Display the SSO login form as the default when both the default and SSO login forms are enabled. |
|
139
|
|
|
* |
|
140
|
|
|
* @module sso |
|
141
|
|
|
* |
|
142
|
|
|
* @since 4.1.0 |
|
143
|
|
|
* |
|
144
|
|
|
* @param bool true Should the SSO login form be displayed by default when the default login form is also enabled? |
|
145
|
|
|
*/ |
|
146
|
|
|
return (bool) apply_filters( 'jetpack_sso_default_to_sso_login', true ); |
|
147
|
|
|
} |
|
148
|
|
|
|
|
149
|
|
|
/** |
|
150
|
|
|
* Returns a boolean for whether the two step required checkbox, displayed on the Jetpack admin page, should be disabled. |
|
151
|
|
|
* |
|
152
|
|
|
* @since 4.1.0 |
|
153
|
|
|
* |
|
154
|
|
|
* @return bool |
|
155
|
|
|
*/ |
|
156
|
|
|
static function is_require_two_step_checkbox_disabled() { |
|
157
|
|
|
return (bool) has_filter( 'jetpack_sso_require_two_step' ); |
|
158
|
|
|
} |
|
159
|
|
|
|
|
160
|
|
|
/** |
|
161
|
|
|
* Returns a boolean for whether the match by email checkbox, displayed on the Jetpack admin page, should be disabled. |
|
162
|
|
|
* |
|
163
|
|
|
* @since 4.1.0 |
|
164
|
|
|
* |
|
165
|
|
|
* @return bool |
|
166
|
|
|
*/ |
|
167
|
|
|
static function is_match_by_email_checkbox_disabled() { |
|
168
|
|
|
return defined( 'WPCC_MATCH_BY_EMAIL' ) || has_filter( 'jetpack_sso_match_by_email' ); |
|
169
|
|
|
} |
|
170
|
|
|
|
|
171
|
|
|
/** |
|
172
|
|
|
* Returns an array of hosts that SSO will redirect to. |
|
173
|
|
|
* |
|
174
|
|
|
* Instead of accessing JETPACK__API_BASE within the method directly, we set it as the |
|
175
|
|
|
* default for $api_base due to restrictions with testing constants in our tests. |
|
176
|
|
|
* |
|
177
|
|
|
* @since 4.3.0 |
|
178
|
|
|
* @since 4.6.0 Added public-api.wordpress.com as an allowed redirect |
|
179
|
|
|
* |
|
180
|
|
|
* @param array $hosts |
|
181
|
|
|
* @param string $api_base |
|
182
|
|
|
* |
|
183
|
|
|
* @return array |
|
184
|
|
|
*/ |
|
185
|
|
|
static function allowed_redirect_hosts( $hosts, $api_base = JETPACK__API_BASE ) { |
|
186
|
|
|
if ( empty( $hosts ) ) { |
|
187
|
|
|
$hosts = array(); |
|
188
|
|
|
} |
|
189
|
|
|
|
|
190
|
|
|
$hosts[] = 'wordpress.com'; |
|
191
|
|
|
$hosts[] = 'jetpack.wordpress.com'; |
|
192
|
|
|
$hosts[] = 'public-api.wordpress.com'; |
|
193
|
|
|
|
|
194
|
|
|
if ( |
|
195
|
|
|
( Jetpack::is_development_mode() || Jetpack::is_development_version() ) && |
|
196
|
|
|
( false === strpos( $api_base, 'jetpack.wordpress.com/jetpack' ) ) |
|
197
|
|
|
) { |
|
198
|
|
|
$base_url_parts = parse_url( esc_url_raw( $api_base ) ); |
|
199
|
|
|
if ( $base_url_parts && ! empty( $base_url_parts[ 'host' ] ) ) { |
|
200
|
|
|
$hosts[] = $base_url_parts[ 'host' ]; |
|
201
|
|
|
} |
|
202
|
|
|
} |
|
203
|
|
|
|
|
204
|
|
|
return array_unique( $hosts ); |
|
205
|
|
|
} |
|
206
|
|
|
|
|
207
|
|
|
static function generate_user( $user_data ) { |
|
208
|
|
|
$username = $user_data->login; |
|
209
|
|
|
|
|
210
|
|
|
/** |
|
211
|
|
|
* Determines how many times the SSO module can attempt to randomly generate a user. |
|
212
|
|
|
* |
|
213
|
|
|
* @module sso |
|
214
|
|
|
* |
|
215
|
|
|
* @since 4.3.2 |
|
216
|
|
|
* |
|
217
|
|
|
* @param int 5 By default, SSO will attempt to random generate a user up to 5 times. |
|
218
|
|
|
*/ |
|
219
|
|
|
$num_tries = intval( apply_filters( 'jetpack_sso_allowed_username_generate_retries', 5 ) ); |
|
220
|
|
|
|
|
221
|
|
|
$tries = 0; |
|
222
|
|
|
while ( ( $exists = username_exists( $username ) ) && $tries++ < $num_tries ) { |
|
223
|
|
|
$username = $user_data->login . '_' . $user_data->ID . '_' . mt_rand(); |
|
224
|
|
|
} |
|
225
|
|
|
|
|
226
|
|
|
if ( $exists ) { |
|
227
|
|
|
return false; |
|
228
|
|
|
} |
|
229
|
|
|
|
|
230
|
|
|
$password = wp_generate_password( 20 ); |
|
231
|
|
|
$user_id = wp_create_user( $username, $password, $user_data->email ); |
|
232
|
|
|
$user = get_userdata( $user_id ); |
|
233
|
|
|
|
|
234
|
|
|
$user->display_name = $user_data->display_name; |
|
235
|
|
|
$user->first_name = $user_data->first_name; |
|
236
|
|
|
$user->last_name = $user_data->last_name; |
|
237
|
|
|
$user->url = $user_data->url; |
|
238
|
|
|
$user->description = $user_data->description; |
|
239
|
|
|
|
|
240
|
|
|
if ( isset( $user_data->role ) && $user_data->role ) { |
|
241
|
|
|
$user->role = $user_data->role; |
|
|
|
|
|
|
242
|
|
|
} |
|
243
|
|
|
|
|
244
|
|
|
wp_update_user( $user ); |
|
245
|
|
|
|
|
246
|
|
|
update_user_meta( $user->ID, 'wpcom_user_id', $user_data->ID ); |
|
247
|
|
|
|
|
248
|
|
|
return $user; |
|
249
|
|
|
} |
|
250
|
|
|
|
|
251
|
|
|
static function extend_auth_cookie_expiration_for_sso() { |
|
252
|
|
|
/** |
|
253
|
|
|
* Determines how long the auth cookie is valid for when a user logs in with SSO. |
|
254
|
|
|
* |
|
255
|
|
|
* @module sso |
|
256
|
|
|
* |
|
257
|
|
|
* @since 4.4.0 |
|
258
|
|
|
* |
|
259
|
|
|
* @param int YEAR_IN_SECONDS |
|
260
|
|
|
*/ |
|
261
|
|
|
return intval( apply_filters( 'jetpack_sso_auth_cookie_expirtation', YEAR_IN_SECONDS ) ); |
|
262
|
|
|
} |
|
263
|
|
|
|
|
264
|
|
|
/** |
|
265
|
|
|
* Determines if the SSO form should be displayed for the current action. |
|
266
|
|
|
* |
|
267
|
|
|
* @since 4.6.0 |
|
268
|
|
|
* |
|
269
|
|
|
* @param string $action |
|
270
|
|
|
* |
|
271
|
|
|
* @return bool Is SSO allowed for the current action? |
|
272
|
|
|
*/ |
|
273
|
|
|
static function display_sso_form_for_action( $action ) { |
|
274
|
|
|
/** |
|
275
|
|
|
* Allows plugins the ability to overwrite actions where the SSO form is allowed to be used. |
|
276
|
|
|
* |
|
277
|
|
|
* @module sso |
|
278
|
|
|
* |
|
279
|
|
|
* @since 4.6.0 |
|
280
|
|
|
* |
|
281
|
|
|
* @param array $allowed_actions_for_sso |
|
282
|
|
|
*/ |
|
283
|
|
|
$allowed_actions_for_sso = (array) apply_filters( 'jetpack_sso_allowed_actions', array( |
|
284
|
|
|
'login', |
|
285
|
|
|
'jetpack-sso', |
|
286
|
|
|
'jetpack_json_api_authorization', |
|
287
|
|
|
) ); |
|
288
|
|
|
return in_array( $action, $allowed_actions_for_sso ); |
|
289
|
|
|
} |
|
290
|
|
|
|
|
291
|
|
|
/** |
|
292
|
|
|
* This method returns an environment array that is meant to simulate `$_REQUEST` when the initial |
|
293
|
|
|
* JSON API auth request was made. |
|
294
|
|
|
* |
|
295
|
|
|
* @since 4.6.0 |
|
296
|
|
|
* |
|
297
|
|
|
* @return array|bool |
|
298
|
|
|
*/ |
|
299
|
|
|
static function get_json_api_auth_environment() { |
|
300
|
|
|
if ( empty( $_COOKIE['jetpack_sso_original_request'] ) ) { |
|
301
|
|
|
return false; |
|
302
|
|
|
} |
|
303
|
|
|
|
|
304
|
|
|
$original_request = esc_url_raw( $_COOKIE['jetpack_sso_original_request'] ); |
|
305
|
|
|
|
|
306
|
|
|
$parsed_url = wp_parse_url( $original_request ); |
|
307
|
|
|
if ( empty( $parsed_url ) || empty( $parsed_url['query'] ) ) { |
|
308
|
|
|
return false; |
|
309
|
|
|
} |
|
310
|
|
|
|
|
311
|
|
|
$args = array(); |
|
312
|
|
|
wp_parse_str( $parsed_url['query'], $args ); |
|
313
|
|
|
|
|
314
|
|
|
if ( empty( $args ) || empty( $args['action'] ) ) { |
|
315
|
|
|
return false; |
|
316
|
|
|
} |
|
317
|
|
|
|
|
318
|
|
|
if ( 'jetpack_json_api_authorization' != $args['action'] ) { |
|
319
|
|
|
return false; |
|
320
|
|
|
} |
|
321
|
|
|
|
|
322
|
|
|
return array_merge( |
|
323
|
|
|
$args, |
|
324
|
|
|
array( 'jetpack_json_api_original_query' => $original_request ) |
|
325
|
|
|
); |
|
326
|
|
|
} |
|
327
|
|
|
} |
|
328
|
|
|
|
|
329
|
|
|
endif; |
|
330
|
|
|
|
This check looks for improperly formatted assignments.
Every assignment must have exactly one space before and one space after the equals operator.
To illustrate:
will have no issues, while
will report issues in lines 1 and 2.