Total Complexity | 68 |
Total Lines | 471 |
Duplicated Lines | 0 % |
Changes | 0 |
Complex classes like WebAppAuthentication often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use WebAppAuthentication, and based on these observations, apply Extract Interface, too.
1 | <?php |
||
16 | class WebAppAuthentication { |
||
17 | /** |
||
18 | * @var null|self A reference to the only instance of this class |
||
19 | */ |
||
20 | private static $_instance; |
||
21 | |||
22 | /** |
||
23 | * @var bool|false True if the user is authenticated, false otherwise |
||
24 | */ |
||
25 | private static $_authenticated = false; |
||
26 | |||
27 | /** |
||
28 | * @var null|WebAppSession A reference to the php session object |
||
29 | */ |
||
30 | private static $_phpSession; |
||
31 | |||
32 | /** |
||
33 | * @var null|MAPISession A reference to the MAPISession object |
||
34 | */ |
||
35 | private static $_mapiSession; |
||
36 | |||
37 | /** |
||
38 | * @var 0|int An code that reflects the latest error |
||
|
|||
39 | * |
||
40 | * @see $UMAPI_PATH/mapicodes.php |
||
41 | */ |
||
42 | private static $_errorCode = NOERROR; |
||
43 | |||
44 | /** |
||
45 | * @var bool True if MAPI session savng support exists |
||
46 | */ |
||
47 | private static $_sessionSaveSupport = false; |
||
48 | |||
49 | /** |
||
50 | * Returns the only instance of the WebAppAuthentication class. |
||
51 | * If it does not exist yet, it will create an instance, and |
||
52 | * also an MAPISession object, and it will start a php session |
||
53 | * by instantiating a WebAppSession. |
||
54 | * |
||
55 | * @return self |
||
56 | */ |
||
57 | public static function getInstance() { |
||
73 | } |
||
74 | |||
75 | /** |
||
76 | * Returns the error code of the last logon attempt. |
||
77 | * |
||
78 | * @return int |
||
79 | */ |
||
80 | public static function getErrorCode() { |
||
82 | } |
||
83 | |||
84 | /** |
||
85 | * Returns an error message that goed with the error code of |
||
86 | * the last logon attempt. |
||
87 | * |
||
88 | * @return string |
||
89 | */ |
||
90 | public static function getErrorMessage() { |
||
91 | return match (WebAppAuthentication::getErrorCode()) { |
||
92 | NOERROR => '', |
||
93 | ecUnknownUser, MAPI_E_LOGON_FAILED, MAPI_E_UNCONFIGURED => _('Logon failed. Please verify your credentials and try again.'), |
||
94 | MAPI_E_NETWORK_ERROR => _('Cannot connect to Gromox.'), |
||
95 | MAPI_E_INVALID_WORKSTATION_ACCOUNT => _('Login did not work due to a duplicate session. The issue was automatically resolved, please log in again.'), |
||
96 | MAPI_E_END_OF_SESSION => '', |
||
97 | default => _('Unknown MAPI Error') . ': ' . get_mapi_error_name(WebAppAuthentication::getErrorCode()), |
||
98 | }; |
||
99 | } |
||
100 | |||
101 | /** |
||
102 | * Returns the MAPISession instance. |
||
103 | * |
||
104 | * @see server/includes/core/class.mapisession.php |
||
105 | * |
||
106 | * @return MAPISession |
||
107 | */ |
||
108 | public static function getMAPISession() { |
||
109 | return WebAppAuthentication::$_mapiSession; |
||
110 | } |
||
111 | |||
112 | /** |
||
113 | * Set the MAPISession instance. |
||
114 | * |
||
115 | * @param MAPISession $session the mapisession to set |
||
116 | */ |
||
117 | public static function setMAPISession($session) { |
||
118 | WebAppAuthentication::$_mapiSession->setSession($session); |
||
119 | } |
||
120 | |||
121 | /** |
||
122 | * Tries to authenticate the user. First it will check if the |
||
123 | * user is using the login-form. And finally if not of above |
||
124 | * methods apply, it will try to find credentials in the |
||
125 | * php session. |
||
126 | */ |
||
127 | public static function authenticate() { |
||
139 | } |
||
140 | } |
||
141 | |||
142 | /* |
||
143 | * Checks if keycloak features are enabled and regenerates |
||
144 | * the access token before expiration. |
||
145 | */ |
||
146 | public static function regenerate_access_token() { |
||
147 | if (isset($_SESSION['_keycloak_auth'])) { |
||
148 | $_keycloak_auth = $_SESSION['_keycloak_auth']; |
||
149 | if (time() - $_keycloak_auth->get_last_refresh_time() > 280) { |
||
150 | if (!$_keycloak_auth->refresh_grant_req() && !$_keycloak_auth->validate_grant()) { |
||
151 | header('Location:' . $_keycloak_auth->login_url($_keycloak_auth->redirect_url) . ''); |
||
152 | } |
||
153 | $token = $_keycloak_auth->access_token->get_payload(); |
||
154 | $user = $_keycloak_auth->access_token->get_claims('email'); |
||
155 | WebAppAuthentication::_storeCredentialsInSession($user, $token); |
||
156 | $_keycloak_auth->set_last_refresh_time(time()); |
||
157 | $_SESSION['_keycloak_auth'] = $_keycloak_auth; |
||
158 | } |
||
159 | } |
||
160 | } |
||
161 | |||
162 | /** |
||
163 | * Returns true if a user is authenticated, or false otherwise. |
||
164 | * |
||
165 | * @return bool |
||
166 | */ |
||
167 | public static function isAuthenticated() { |
||
168 | return WebAppAuthentication::$_authenticated; |
||
169 | } |
||
170 | |||
171 | /** |
||
172 | * Tries to logon to Gromox with the given username and password/token. Returns |
||
173 | * the error code that was given back. |
||
174 | * |
||
175 | * @param string $username The username |
||
176 | * @param string $pass The password/token |
||
177 | * |
||
178 | * @return int |
||
179 | */ |
||
180 | public static function login($username, $pass) { |
||
181 | if (!WebAppAuthentication::_restoreMAPISession()) { |
||
182 | // TODO: move logon from MAPISession to here |
||
183 | |||
184 | WebAppAuthentication::$_errorCode = isset($_SESSION['_keycloak_auth']) ? |
||
185 | WebAppAuthentication::$_mapiSession->logon_token($username, $pass) : |
||
186 | WebAppAuthentication::$_mapiSession->logon($username, $pass, DEFAULT_SERVER); |
||
187 | |||
188 | // Include external login plugins to be loaded |
||
189 | if (file_exists(BASE_PATH . 'extlogin.php')) { |
||
190 | include BASE_PATH . 'extlogin.php'; |
||
191 | } |
||
192 | if (WebAppAuthentication::$_errorCode === NOERROR) { |
||
193 | WebAppAuthentication::$_authenticated = true; |
||
194 | WebAppAuthentication::_storeMAPISession(WebAppAuthentication::$_mapiSession->getSession()); |
||
195 | $tmp = explode('@', $username); |
||
196 | if (count($tmp) == 2) { |
||
197 | setcookie('domainname', $tmp[1], ['expires' => time() + 31536000, 'path' => '/', 'domain' => '', 'secure' => true, 'httponly' => true, 'samesite' => 'Strict']); |
||
198 | } |
||
199 | $wa_title = WebAppAuthentication::$_mapiSession->getFullName(); |
||
200 | $companyname = WebAppAuthentication::$_mapiSession->getCompanyName(); |
||
201 | if (isset($companyname) && strlen($companyname) != 0) { |
||
202 | $wa_title .= " ({$companyname})"; |
||
203 | } |
||
204 | if (strlen($wa_title) != 0) { |
||
205 | setcookie('webapp_title', $wa_title, ['expires' => time() + 31536000, 'path' => '/', 'domain' => '', 'secure' => true, 'httponly' => true, 'samesite' => 'Strict']); |
||
206 | } |
||
207 | } |
||
208 | elseif (WebAppAuthentication::$_errorCode == MAPI_E_LOGON_FAILED || WebAppAuthentication::$_errorCode == MAPI_E_UNCONFIGURED) { |
||
209 | error_log('grommunio Web user: ' . $username . ': authentication failure at MAPI'); |
||
210 | } |
||
211 | } |
||
212 | |||
213 | return WebAppAuthentication::$_errorCode; |
||
214 | } |
||
215 | |||
216 | /** |
||
217 | * Store a serialized MAPI Session, which can be used by _restoreMAPISession to re-create |
||
218 | * a MAPISession, which saves a login call. |
||
219 | * |
||
220 | * @param MAPISession $session the session to serialize and save |
||
221 | */ |
||
222 | private static function _storeMAPISession($session) { |
||
223 | if (!WebAppAuthentication::$_sessionSaveSupport) { |
||
224 | return; |
||
225 | } |
||
226 | |||
227 | $encryptionStore = EncryptionStore::getInstance(); |
||
228 | $data = ''; |
||
229 | if (kc_session_save($session, $data) === NOERROR) { |
||
230 | $encryptionStore->add('savedsession', bin2hex((string) $data)); |
||
231 | } |
||
232 | } |
||
233 | |||
234 | /** |
||
235 | * Restore a MAPISession from the serialized with kc_session_restore. |
||
236 | * |
||
237 | * @return bool true if session has been restored successfully |
||
238 | */ |
||
239 | private static function _restoreMAPISession() { |
||
240 | $encryptionStore = EncryptionStore::getInstance(); |
||
241 | |||
242 | if (!WebAppAuthentication::$_sessionSaveSupport || $encryptionStore->get('savedsession') === null) { |
||
243 | return false; |
||
244 | } |
||
245 | |||
246 | if (kc_session_restore(hex2bin((string) $encryptionStore->get('savedsession')), $session) === NOERROR) { |
||
247 | WebAppAuthentication::$_errorCode = NOERROR; |
||
248 | WebAppAuthentication::$_authenticated = true; |
||
249 | WebAppAuthentication::setMAPISession($session); |
||
250 | |||
251 | return true; |
||
252 | } |
||
253 | |||
254 | return false; |
||
255 | } |
||
256 | |||
257 | /** |
||
258 | * Stores the given username and password in the session using the encryptionstore. |
||
259 | * |
||
260 | * @param string The username |
||
261 | * @param string The password |
||
262 | * @param mixed $username |
||
263 | * @param mixed $password |
||
264 | */ |
||
265 | private static function _storeCredentialsInSession($username, $password) { |
||
266 | $encryptionStore = EncryptionStore::getInstance(); |
||
267 | $encryptionStore->add('username', $username); |
||
268 | $encryptionStore->add('password', $password); |
||
269 | } |
||
270 | |||
271 | /** |
||
272 | * Checks if a user tries to log in by submitting the login form. |
||
273 | * |
||
274 | * @return bool |
||
275 | */ |
||
276 | public static function isUsingLoginForm() { |
||
277 | // Login form is only found on index.php |
||
278 | // If we don't check it, then posting to grommunio.php would |
||
279 | // also make authenticating possible. |
||
280 | if (basename((string) $_SERVER['SCRIPT_NAME']) !== 'index.php') { |
||
281 | return false; |
||
282 | } |
||
283 | |||
284 | return isset($_POST) && isset($_POST['username'], $_POST['password']); |
||
285 | } |
||
286 | |||
287 | /** |
||
288 | * Tries to authenticate the user with credentials that were posted. |
||
289 | * Returns the error code from the logon attempt. |
||
290 | * |
||
291 | * @return int |
||
292 | */ |
||
293 | public static function authenticateWithPostedCredentials() { |
||
294 | $email = appendDefaultDomain($_POST['username']); |
||
295 | if (empty($email) || empty($_POST['password'])) { |
||
296 | WebAppAuthentication::$_errorCode = MAPI_E_LOGON_FAILED; |
||
297 | |||
298 | return WebAppAuthentication::getErrorCode(); |
||
299 | } |
||
300 | // Check if a session is already running and if the credentials match |
||
301 | $encryptionStore = EncryptionStore::getInstance(); |
||
302 | $username = $encryptionStore->get('username'); |
||
303 | $password = $encryptionStore->get('password'); |
||
304 | |||
305 | if (!is_null($username) && !is_null($password)) { |
||
306 | if ($username != $email || $password != $_POST['password']) { |
||
307 | WebAppAuthentication::$_errorCode = MAPI_E_INVALID_WORKSTATION_ACCOUNT; |
||
308 | WebAppAuthentication::$_phpSession->destroy(); |
||
309 | |||
310 | return WebAppAuthentication::getErrorCode(); |
||
311 | } |
||
312 | } |
||
313 | else { |
||
314 | // If no session is currently running, then store a fingerprint of the requester |
||
315 | // in the session. |
||
316 | $_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
||
317 | } |
||
318 | |||
319 | // Give the session a new id |
||
320 | session_regenerate_id(); |
||
321 | |||
322 | WebAppAuthentication::login($email, $_POST['password']); |
||
323 | |||
324 | // Store the credentials in the session if logging in was successful |
||
325 | if (WebAppAuthentication::$_errorCode === NOERROR) { |
||
326 | WebAppAuthentication::_storeCredentialsInSession($email, $_POST['password']); |
||
327 | |||
328 | return WebAppAuthentication::getErrorCode(); |
||
329 | } |
||
330 | |||
331 | return WebAppAuthentication::getErrorCode(); |
||
332 | } |
||
333 | |||
334 | /** |
||
335 | * Login with Oauth2.0 keycloak access token. |
||
336 | * User selects login with keycloak, then gets redirected to keycloak server. |
||
337 | * If login is successful, the user is redirected with code grant back to gromox server. |
||
338 | * gromox requests access token with the received grant. |
||
339 | * keycloak server verifies grant, and sends access token. |
||
340 | * access token is used to authenticate user. |
||
341 | * |
||
342 | * @param mixed $code |
||
343 | */ |
||
344 | public static function authenticateWithAccessToken($code) { |
||
345 | $keycloak = KeyCloak::getInstance(); |
||
346 | if (!is_null($keycloak)) { |
||
347 | if ($keycloak->client_credential_grant_req($code) && $keycloak->validate_grant()) { |
||
348 | $keycloak->set_last_refresh_time(time()); |
||
349 | $_SESSION['_keycloak_auth'] = $keycloak; |
||
350 | |||
351 | if (isset($_SESSION['_keycloak_auth'])) { |
||
352 | $email = appendDefaultDomain($_SESSION['_keycloak_auth']->access_token->get_claims('email')); |
||
353 | $token = $_SESSION['_keycloak_auth']->access_token->get_payload(); |
||
354 | |||
355 | // Check if a session is already running and if the credentials match |
||
356 | $encryptionStore = EncryptionStore::getInstance(); |
||
357 | $username = $encryptionStore->get('username'); |
||
358 | $password = $encryptionStore->get('password'); |
||
359 | |||
360 | if (!is_null($username) && !is_null($password)) { |
||
361 | if ($username != $email || $password != $token) { |
||
362 | WebAppAuthentication::$_errorCode = MAPI_E_INVALID_WORKSTATION_ACCOUNT; |
||
363 | WebAppAuthentication::$_phpSession->destroy(); |
||
364 | |||
365 | return WebAppAuthentication::getErrorCode(); |
||
366 | } |
||
367 | } |
||
368 | else { |
||
369 | // If no session is currently running, then store a fingerprint of the requester |
||
370 | // in the session. |
||
371 | $_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
||
372 | } |
||
373 | // Give the session a new id |
||
374 | session_regenerate_id(); |
||
375 | |||
376 | WebAppAuthentication::login($email, $token); |
||
377 | // Store the credentials in the session if logging in was successful |
||
378 | if (WebAppAuthentication::$_errorCode === NOERROR) { |
||
379 | WebAppAuthentication::_storeCredentialsInSession($email, $token); |
||
380 | |||
381 | return WebAppAuthentication::getErrorCode(); |
||
382 | } |
||
383 | } |
||
384 | } |
||
385 | header('Location:' . $keycloak->login_url($keycloak->redirect_url) . ''); |
||
386 | } |
||
387 | |||
388 | return WebAppAuthentication::getErrorCode(); |
||
389 | } |
||
390 | |||
391 | /** |
||
392 | * Logs the user in with a given username and token in $_POST and logs |
||
393 | * in with the special flag for token authentication enabled. If $new |
||
394 | * is true it's assumed that a session does not exists and there will |
||
395 | * be a new one generated and fingerprint stored in session which is |
||
396 | * later compared after logon. After successful logon the session is stored. |
||
397 | * |
||
398 | * @param bool $new true if user has no session yet |
||
399 | * |
||
400 | * @return int|void |
||
401 | */ |
||
402 | public static function authenticateWithToken($new = true) { |
||
403 | if (empty($_POST['token'])) { |
||
404 | WebAppAuthentication::$_errorCode = MAPI_E_LOGON_FAILED; |
||
405 | |||
406 | return WebAppAuthentication::getErrorCode(); |
||
407 | } |
||
408 | |||
409 | if ($new) { |
||
410 | // If no session is currently running, then store a fingerprint of the requester |
||
411 | // in the session. |
||
412 | $_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
||
413 | |||
414 | // Give the session a new id |
||
415 | session_regenerate_id(); |
||
416 | } |
||
417 | |||
418 | WebAppAuthentication::$_errorCode = WebAppAuthentication::getMAPISession()->logon( |
||
419 | $_POST['username'], |
||
420 | $_POST['token'], |
||
421 | DEFAULT_SERVER, |
||
422 | null, |
||
423 | null, |
||
424 | 0 |
||
425 | ); |
||
426 | |||
427 | // Store the credentials in the session if logging in was successful |
||
428 | if (WebAppAuthentication::$_errorCode === NOERROR) { |
||
429 | WebAppAuthentication::_storeCredentialsInSession($_POST['username'], $_POST['token']); |
||
430 | WebAppAuthentication::_storeMAPISession(WebAppAuthentication::$_mapiSession->getSession()); |
||
431 | } |
||
432 | |||
433 | return WebAppAuthentication::getErrorCode(); |
||
434 | } |
||
435 | |||
436 | /** |
||
437 | * Tries to authenticate the user with credentials from the session. When credentials |
||
438 | * are found in the session it will return the error code from the logon attempt with |
||
439 | * those credentials, otherwise it will return void. |
||
440 | * |
||
441 | * Before trying to logon, it will compare the requesters fingerprint with the |
||
442 | * fingerprint stored in the session. If they are not the same, the session will be |
||
443 | * destroyed and the script will be killed. |
||
444 | * |
||
445 | * @return int|void |
||
446 | */ |
||
447 | private static function _authenticateWithSession() { |
||
448 | // Check if the session hasn't timed out |
||
449 | if (WebAppAuthentication::$_phpSession->hasTimedOut()) { |
||
450 | // Using a MAPI error code here, while it is not really a MAPI session timeout |
||
451 | // However to the user this should make no difference, so the MAPI error will do. |
||
452 | WebAppAuthentication::$_errorCode = MAPI_E_END_OF_SESSION; |
||
453 | |||
454 | return WebAppAuthentication::getErrorCode(); |
||
455 | } |
||
456 | |||
457 | // Now check if we stored credentials in the session (in the encryption store) |
||
458 | $encryptionStore = EncryptionStore::getInstance(); |
||
459 | $username = $encryptionStore->get('username'); |
||
460 | $password = $encryptionStore->get('password'); |
||
461 | if (is_null($username) || is_null($password)) { |
||
462 | return; |
||
463 | } |
||
464 | |||
465 | // Check if the browser fingerprint is the same as that of the browser that was |
||
466 | // used to login in the first place. |
||
467 | if ($_SESSION['fingerprint'] !== BrowserFingerprint::getFingerprint()) { |
||
468 | // Something bad has happened. This must be someone who stole a session cookie!!! |
||
469 | // We will delete the session and stop the script without any error message |
||
470 | WebAppAuthentication::$_phpSession->destroy(); |
||
471 | |||
472 | exit; |
||
473 | } |
||
474 | |||
475 | return WebAppAuthentication::login($username, $password); |
||
476 | } |
||
477 | |||
478 | /** |
||
479 | * Returns the username that is stored in the session. |
||
480 | * |
||
481 | * @return string |
||
482 | */ |
||
483 | public static function getUserName() { |
||
487 | } |
||
488 | } |
||
489 | |||
490 | // Instantiate the class |
||
491 | WebAppAuthentication::getInstance(); |
||
492 |