| Total Complexity | 40 |
| Total Lines | 277 |
| Duplicated Lines | 0 % |
| Changes | 3 | ||
| Bugs | 0 | Features | 0 |
Complex classes like CookieService often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use CookieService, and based on these observations, apply Extract Interface, too.
| 1 | <?php declare(strict_types=1); |
||
| 45 | class CookieService implements CookieServiceInterface |
||
| 46 | { |
||
| 47 | /** |
||
| 48 | * @var CookieHelperInterface |
||
| 49 | */ |
||
| 50 | private $cookieHelper; |
||
| 51 | /** |
||
| 52 | * @var InstitutionConfigurationService |
||
| 53 | */ |
||
| 54 | private $institutionConfigurationService; |
||
| 55 | /** |
||
| 56 | * @var LoggerInterface |
||
| 57 | */ |
||
| 58 | private $logger; |
||
| 59 | /** |
||
| 60 | * @var SecondFactorService |
||
| 61 | */ |
||
| 62 | private $secondFactorService; |
||
| 63 | |||
| 64 | /** |
||
| 65 | * @var SecondFactorTypeService |
||
| 66 | */ |
||
| 67 | private $secondFactorTypeService; |
||
| 68 | /** |
||
| 69 | * @var ExpirationHelperInterface |
||
| 70 | */ |
||
| 71 | private $expirationHelper; |
||
| 72 | |||
| 73 | public function __construct( |
||
| 87 | } |
||
| 88 | |||
| 89 | public function handleSsoOn2faCookieStorage( |
||
| 90 | ResponseContext $responseContext, |
||
| 91 | Request $request, |
||
| 92 | Response $httpResponse |
||
| 93 | ): Response { |
||
| 94 | // Check if this specific SP is configured to allow setting of an SSO on 2FA cookie (configured in MW config) |
||
| 95 | $remoteSp = $this->getRemoteSp($responseContext); |
||
| 96 | if (!$remoteSp->allowedToSetSsoCookieOn2fa()) { |
||
| 97 | $this->logger->notice( |
||
| 98 | sprintf( |
||
| 99 | 'SP: %s does not allow writing SSO on 2FA cookies', |
||
| 100 | $remoteSp->getEntityId() |
||
| 101 | ) |
||
| 102 | ); |
||
| 103 | return $httpResponse; |
||
| 104 | } |
||
| 105 | |||
| 106 | // The second factor id is read from state. It is the SF Id of the token used during authentication |
||
| 107 | $secondFactorId = $responseContext->getSelectedSecondFactor(); |
||
| 108 | |||
| 109 | // We can only set an SSO on 2FA cookie if a second factor authentication is being handled. |
||
| 110 | if ($secondFactorId) { |
||
| 111 | $secondFactor = $this->secondFactorService->findByUuid($secondFactorId); |
||
| 112 | if (!$secondFactor) { |
||
| 113 | throw new RuntimeException(sprintf('Second Factor token not found with ID: %s', $secondFactorId)); |
||
| 114 | } |
||
| 115 | // Test if the institution of the Identity this SF belongs to has SSO on 2FA enabled |
||
| 116 | $isEnabled = $this->institutionConfigurationService->ssoOn2faEnabled($secondFactor->institution); |
||
| 117 | $this->logger->notice( |
||
| 118 | sprintf( |
||
| 119 | 'SSO on 2FA is %senabled for %s', |
||
| 120 | $isEnabled ? '' : 'not ', |
||
| 121 | $secondFactor->institution |
||
| 122 | ) |
||
| 123 | ); |
||
| 124 | if ($isEnabled) { |
||
| 125 | // The cookie reader can return a NullCookie if the cookie is not present, was expired or was otherwise |
||
| 126 | // deemed invalid. See the CookieHelper::read implementation for details. |
||
| 127 | $ssoCookie = $this->read($request); |
||
| 128 | $identityId = $responseContext->getIdentityNameId(); |
||
| 129 | $loa = $secondFactor->getLoaLevel($this->secondFactorTypeService); |
||
| 130 | $isValid = $this->isCookieValid($ssoCookie, $loa, $identityId); |
||
| 131 | $isVerifiedBySsoOn2faCookie = $responseContext->isVerifiedBySsoOn2faCookie(); |
||
| 132 | // Did the LoA requirement change? If a higher LoA was requested, or did a new token authentication |
||
| 133 | // take place? In that case create a new SSO on 2FA cookie |
||
| 134 | if ($this->shouldAddCookie($ssoCookie, $isValid, $loa, $isVerifiedBySsoOn2faCookie)) { |
||
| 135 | $cookie = CookieValue::from($identityId, $secondFactor->secondFactorId, $loa); |
||
| 136 | $this->store($httpResponse, $cookie); |
||
| 137 | } |
||
| 138 | } |
||
| 139 | } |
||
| 140 | $responseContext->finalizeAuthentication(); |
||
| 141 | return $httpResponse; |
||
| 142 | } |
||
| 143 | |||
| 144 | /** |
||
| 145 | * Allow high cyclomatic complexity in favour of keeping this method readable |
||
| 146 | * @SuppressWarnings(PHPMD.CyclomaticComplexity) |
||
| 147 | * @SuppressWarnings(PHPMD.NPathComplexity) |
||
| 148 | */ |
||
| 149 | public function shouldSkip2faAuthentication( |
||
| 150 | ResponseContext $responseContext, |
||
| 151 | float $requiredLoa, |
||
| 152 | string $identityNameId, |
||
| 153 | Collection $secondFactorCollection, |
||
| 154 | Request $request |
||
| 155 | ): bool { |
||
| 156 | if ($responseContext->isForceAuthn()) { |
||
| 157 | $this->logger->notice('Ignoring SSO on 2FA cookie when ForceAuthN is specified.'); |
||
| 158 | return false; |
||
| 159 | } |
||
| 160 | $remoteSp = $this->getRemoteSp($responseContext); |
||
| 161 | // Test if the SP allows SSO on 2FA to take place (configured in MW config) |
||
| 162 | if (!$remoteSp->allowSsoOn2fa()) { |
||
| 163 | $this->logger->notice( |
||
| 164 | sprintf( |
||
| 165 | 'Ignoring SSO on 2FA for SP: %s', |
||
| 166 | $remoteSp->getEntityId() |
||
| 167 | ) |
||
| 168 | ); |
||
| 169 | return false; |
||
| 170 | } |
||
| 171 | $ssoCookie = $this->read($request); |
||
| 172 | // Perform validation on the cookie and its contents |
||
| 173 | if (!$this->isCookieValid($ssoCookie, $requiredLoa, $identityNameId)) { |
||
| 174 | return false; |
||
| 175 | } |
||
| 176 | if (!$this->secondFactorService->findByUuid($ssoCookie->secondFactorId())) { |
||
| 177 | $this->logger->notice( |
||
| 178 | 'The second factor stored in the SSO cookie was revoked or has otherwise became unknown to Gateway', |
||
| 179 | [ |
||
| 180 | 'secondFactorIdFromCookie' => $ssoCookie->secondFactorId() |
||
| 181 | ] |
||
| 182 | ); |
||
| 183 | return false; |
||
| 184 | } |
||
| 185 | |||
| 186 | /** @var SecondFactor $secondFactor */ |
||
| 187 | foreach ($secondFactorCollection as $secondFactor) { |
||
| 188 | $loa = $secondFactor->getLoaLevel($this->secondFactorTypeService); |
||
| 189 | if ($loa >= $requiredLoa) { |
||
| 190 | $this->logger->notice('Verified the current 2FA authentication can be given with the SSO on 2FA cookie'); |
||
| 191 | $responseContext->saveSelectedSecondFactor($secondFactor); |
||
| 192 | return true; |
||
| 193 | } |
||
| 194 | } |
||
| 195 | return false; |
||
| 196 | } |
||
| 197 | |||
| 198 | public function getCookieFingerprint(Request $request): string |
||
| 199 | { |
||
| 200 | return $this->cookieHelper->fingerprint($request); |
||
| 201 | } |
||
| 202 | |||
| 203 | /** |
||
| 204 | * This method determines if an SSO on 2FA cookie should be created. |
||
| 205 | * |
||
| 206 | * The comments in the code block should give a good feel for what business rules |
||
| 207 | * are applied in this method. |
||
| 208 | * |
||
| 209 | * @param CookieValueInterface $ssoCookie The SSO on 2FA cookie as read from the HTTP response |
||
| 210 | * @param float $loa The LoA that was requested for this authentication, used to |
||
| 211 | * compare to the LoA stored in the SSO cookie |
||
| 212 | * @param bool $wasAuthenticatedWithSsoOn2faCookie Indicator if the currently running authentication was performed |
||
| 213 | * with the SSO on 2FA cookie |
||
| 214 | */ |
||
| 215 | private function shouldAddCookie( |
||
| 216 | CookieValueInterface $ssoCookie, |
||
| 217 | bool $isCookieValid, |
||
| 218 | float $loa, |
||
| 219 | bool $wasAuthenticatedWithSsoOn2faCookie |
||
| 220 | ): bool { |
||
| 221 | // When the cookie is not yet set, was expired or was otherwise deemed invalid, we get a NullCookieValue |
||
| 222 | // back from the reader. Indicating there is no valid cookie present. |
||
| 223 | $cookieNotSet = $ssoCookie instanceof NullCookieValue; |
||
| 224 | // OR the existing cookie does exist, but the LoA stored in that cookie does not match the required LoA |
||
| 225 | $cookieDoesNotMeetLoaRequirement = ($ssoCookie instanceof CookieValue && !$ssoCookie->meetsRequiredLoa($loa)); |
||
| 226 | if (!$ssoCookie instanceof NullCookieValue && $cookieDoesNotMeetLoaRequirement) { |
||
| 227 | $this->logger->notice( |
||
| 228 | sprintf( |
||
| 229 | 'Storing new SSO on 2FA cookie as LoA requirement (%d changed to %d) changed', |
||
| 230 | $ssoCookie->getLoa(), |
||
| 231 | $loa |
||
| 232 | ) |
||
| 233 | ); |
||
| 234 | } |
||
| 235 | // OR when a new authentication took place, we replace the existing cookie with a new one |
||
| 236 | if (!$wasAuthenticatedWithSsoOn2faCookie) { |
||
| 237 | $this->logger->notice('Storing new SSO on 2FA cookie as a new authentication took place'); |
||
| 238 | } |
||
| 239 | |||
| 240 | // Or when the cookie is not valid for some reason (see logs for the specific error) |
||
| 241 | if (!$isCookieValid) { |
||
| 242 | $this->logger->notice('Storing new SSO on 2FA cookie, the current cookie is invalid'); |
||
| 243 | } |
||
| 244 | |||
| 245 | return $cookieNotSet || |
||
| 246 | !$isCookieValid || |
||
| 247 | $cookieDoesNotMeetLoaRequirement || |
||
| 248 | !$wasAuthenticatedWithSsoOn2faCookie; |
||
| 249 | } |
||
| 250 | |||
| 251 | private function store(Response $response, CookieValueInterface $cookieValue) |
||
| 254 | } |
||
| 255 | |||
| 256 | private function read(Request $request): CookieValueInterface |
||
| 257 | { |
||
| 258 | try { |
||
| 259 | return $this->cookieHelper->read($request); |
||
| 260 | } catch (CookieNotFoundException $e) { |
||
| 261 | $this->logger->notice('Attempt to decrypt the cookie failed, the cookie could not be found'); |
||
| 262 | return new NullCookieValue(); |
||
| 263 | } catch (DecryptionFailedException $e) { |
||
| 264 | $this->logger->notice('Decryption of the SSO on 2FA cookie failed'); |
||
| 265 | return new NullCookieValue(); |
||
| 266 | } catch (Exception $e) { |
||
| 267 | $this->logger->notice( |
||
| 268 | 'Decryption failed, see original message in context', |
||
| 269 | ['original-exception-message' => $e->getMessage()] |
||
| 270 | ); |
||
| 271 | return new NullCookieValue(); |
||
| 272 | } |
||
| 273 | } |
||
| 274 | |||
| 275 | private function getRemoteSp(ResponseContext $responseContext): ServiceProvider |
||
| 276 | { |
||
| 277 | $remoteSp = $responseContext->getServiceProvider(); |
||
| 278 | if (!$remoteSp) { |
||
| 279 | throw new RuntimeException('SP not found in the response context, unable to continue with SSO on 2FA'); |
||
| 280 | } |
||
| 281 | return $remoteSp; |
||
| 282 | } |
||
| 283 | |||
| 284 | private function isCookieValid(CookieValueInterface $ssoCookie, float $requiredLoa, string $identityNameId): bool |
||
| 322 | } |
||
| 323 | } |
||
| 324 |