1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
require_once UMAPI_PATH . '/mapi.util.php'; |
4
|
|
|
require_once UMAPI_PATH . '/class.keycloak.php'; |
5
|
|
|
|
6
|
|
|
require_once BASE_PATH . 'server/includes/core/class.encryptionstore.php'; |
7
|
|
|
require_once BASE_PATH . 'server/includes/core/class.webappsession.php'; |
8
|
|
|
require_once BASE_PATH . 'server/includes/core/class.mapisession.php'; |
9
|
|
|
require_once BASE_PATH . 'server/includes/core/class.browserfingerprint.php'; |
10
|
|
|
|
11
|
|
|
/* |
12
|
|
|
* Class that handles authentication. |
13
|
|
|
* |
14
|
|
|
* @singleton |
15
|
|
|
*/ |
16
|
|
|
class WebAppAuthentication { |
17
|
|
|
/** |
18
|
|
|
* @var null|self A reference to the only instance of this class |
19
|
|
|
*/ |
20
|
|
|
private static $_instance; |
21
|
|
|
|
22
|
|
|
/** |
23
|
|
|
* @var bool|false True if the user is authenticated, false otherwise |
24
|
|
|
*/ |
25
|
|
|
private static $_authenticated = false; |
26
|
|
|
|
27
|
|
|
/** |
28
|
|
|
* @var null|WebAppSession A reference to the php session object |
29
|
|
|
*/ |
30
|
|
|
private static $_phpSession; |
31
|
|
|
|
32
|
|
|
/** |
33
|
|
|
* @var null|MAPISession A reference to the MAPISession object |
34
|
|
|
*/ |
35
|
|
|
private static $_mapiSession; |
36
|
|
|
|
37
|
|
|
/** |
38
|
|
|
* @var 0|int An code that reflects the latest error |
|
|
|
|
39
|
|
|
* |
40
|
|
|
* @see $UMAPI_PATH/mapicodes.php |
41
|
|
|
*/ |
42
|
|
|
private static $_errorCode = NOERROR; |
43
|
|
|
|
44
|
|
|
/** |
45
|
|
|
* @var bool True if MAPI session savng support exists |
46
|
|
|
*/ |
47
|
|
|
private static $_sessionSaveSupport = false; |
48
|
|
|
|
49
|
|
|
/** |
50
|
|
|
* Returns the only instance of the WebAppAuthentication class. |
51
|
|
|
* If it does not exist yet, it will create an instance, and |
52
|
|
|
* also an MAPISession object, and it will start a php session |
53
|
|
|
* by instantiating a WebAppSession. |
54
|
|
|
* |
55
|
|
|
* @return self |
56
|
|
|
*/ |
57
|
|
|
public static function getInstance() { |
58
|
|
|
if (is_null(WebAppAuthentication::$_instance)) { |
59
|
|
|
// Make sure a php session is started |
60
|
|
|
WebAppAuthentication::$_phpSession = WebAppSession::getInstance(); |
61
|
|
|
|
62
|
|
|
// Instantiate this class |
63
|
|
|
WebAppAuthentication::$_instance = new WebAppAuthentication(); |
64
|
|
|
|
65
|
|
|
// Instantiate the mapiSession |
66
|
|
|
WebAppAuthentication::$_mapiSession = new MAPISession(); |
67
|
|
|
|
68
|
|
|
// Check if MAPI Saving session support exists |
69
|
|
|
WebAppAuthentication::$_sessionSaveSupport = function_exists('kc_session_save') && function_exists('kc_session_restore'); |
70
|
|
|
} |
71
|
|
|
|
72
|
|
|
return WebAppAuthentication::$_instance; |
73
|
|
|
} |
74
|
|
|
|
75
|
|
|
/** |
76
|
|
|
* Returns the error code of the last logon attempt. |
77
|
|
|
* |
78
|
|
|
* @return int |
79
|
|
|
*/ |
80
|
|
|
public static function getErrorCode() { |
81
|
|
|
return WebAppAuthentication::$_errorCode; |
82
|
|
|
} |
83
|
|
|
|
84
|
|
|
/** |
85
|
|
|
* Returns an error message that goed with the error code of |
86
|
|
|
* the last logon attempt. |
87
|
|
|
* |
88
|
|
|
* @return string |
89
|
|
|
*/ |
90
|
|
|
public static function getErrorMessage() { |
91
|
|
|
return match (WebAppAuthentication::getErrorCode()) { |
92
|
|
|
NOERROR => '', |
93
|
|
|
ecUnknownUser, MAPI_E_LOGON_FAILED, MAPI_E_UNCONFIGURED => _('Logon failed. Please verify your credentials and try again.'), |
94
|
|
|
MAPI_E_NETWORK_ERROR => _('Cannot connect to Gromox.'), |
95
|
|
|
MAPI_E_INVALID_WORKSTATION_ACCOUNT => _('Login did not work due to a duplicate session. The issue was automatically resolved, please log in again.'), |
96
|
|
|
MAPI_E_END_OF_SESSION => '', |
97
|
|
|
default => _('Unknown MAPI Error') . ': ' . get_mapi_error_name(WebAppAuthentication::getErrorCode()), |
98
|
|
|
}; |
99
|
|
|
} |
100
|
|
|
|
101
|
|
|
/** |
102
|
|
|
* Returns the MAPISession instance. |
103
|
|
|
* |
104
|
|
|
* @see server/includes/core/class.mapisession.php |
105
|
|
|
* |
106
|
|
|
* @return MAPISession |
107
|
|
|
*/ |
108
|
|
|
public static function getMAPISession() { |
109
|
|
|
return WebAppAuthentication::$_mapiSession; |
110
|
|
|
} |
111
|
|
|
|
112
|
|
|
/** |
113
|
|
|
* Set the MAPISession instance. |
114
|
|
|
* |
115
|
|
|
* @param MAPISession $session the mapisession to set |
116
|
|
|
*/ |
117
|
|
|
public static function setMAPISession($session) { |
118
|
|
|
WebAppAuthentication::$_mapiSession->setSession($session); |
|
|
|
|
119
|
|
|
} |
120
|
|
|
|
121
|
|
|
/** |
122
|
|
|
* Tries to authenticate the user. First it will check if the |
123
|
|
|
* user is using the login-form. And finally if not of above |
124
|
|
|
* methods apply, it will try to find credentials in the |
125
|
|
|
* php session. |
126
|
|
|
*/ |
127
|
|
|
public static function authenticate() { |
128
|
|
|
WebAppAuthentication::regenerate_access_token(); |
129
|
|
|
if (isset($_GET['code']) && (!defined('DISABLE_KEYCLOAK') || !DISABLE_KEYCLOAK)) { |
130
|
|
|
WebAppAuthentication::authenticateWithAccessToken($_GET['code']); |
131
|
|
|
} |
132
|
|
|
elseif (WebAppAuthentication::isUsingLoginForm()) { |
133
|
|
|
WebAppAuthentication::authenticateWithPostedCredentials(); |
134
|
|
|
} |
135
|
|
|
// At last check if we have credentials in the session |
136
|
|
|
// and if found, try to login with those |
137
|
|
|
else { |
138
|
|
|
WebAppAuthentication::_authenticateWithSession(); |
139
|
|
|
} |
140
|
|
|
} |
141
|
|
|
|
142
|
|
|
/* |
143
|
|
|
* Checks if keycloak features are enabled and regenerates |
144
|
|
|
* the access token before expiration. |
145
|
|
|
*/ |
146
|
|
|
public static function regenerate_access_token() { |
147
|
|
|
if (isset($_SESSION['_keycloak_auth'])) { |
148
|
|
|
$_keycloak_auth = $_SESSION['_keycloak_auth']; |
149
|
|
|
if (time() - $_keycloak_auth->get_last_refresh_time() > 280) { |
150
|
|
|
if (!$_keycloak_auth->refresh_grant_req() && !$_keycloak_auth->validate_grant()) { |
151
|
|
|
header('Location:' . $_keycloak_auth->login_url($_keycloak_auth->redirect_url) . ''); |
152
|
|
|
} |
153
|
|
|
$token = $_keycloak_auth->access_token->get_payload(); |
154
|
|
|
$user = $_keycloak_auth->access_token->get_claims('email'); |
155
|
|
|
WebAppAuthentication::_storeCredentialsInSession($user, $token); |
156
|
|
|
$_keycloak_auth->set_last_refresh_time(time()); |
157
|
|
|
$_SESSION['_keycloak_auth'] = $_keycloak_auth; |
158
|
|
|
} |
159
|
|
|
} |
160
|
|
|
} |
161
|
|
|
|
162
|
|
|
/** |
163
|
|
|
* Returns true if a user is authenticated, or false otherwise. |
164
|
|
|
* |
165
|
|
|
* @return bool |
166
|
|
|
*/ |
167
|
|
|
public static function isAuthenticated() { |
168
|
|
|
return WebAppAuthentication::$_authenticated; |
169
|
|
|
} |
170
|
|
|
|
171
|
|
|
/** |
172
|
|
|
* Tries to logon to Gromox with the given username and password/token. Returns |
173
|
|
|
* the error code that was given back. |
174
|
|
|
* |
175
|
|
|
* @param string $username The username |
176
|
|
|
* @param string $pass The password/token |
177
|
|
|
* |
178
|
|
|
* @return int |
179
|
|
|
*/ |
180
|
|
|
public static function login($username, $pass) { |
181
|
|
|
if (!WebAppAuthentication::_restoreMAPISession()) { |
182
|
|
|
// TODO: move logon from MAPISession to here |
183
|
|
|
|
184
|
|
|
WebAppAuthentication::$_errorCode = isset($_SESSION['_keycloak_auth']) ? |
185
|
|
|
WebAppAuthentication::$_mapiSession->logon_token($username, $pass) : |
186
|
|
|
WebAppAuthentication::$_mapiSession->logon($username, $pass, DEFAULT_SERVER); |
187
|
|
|
|
188
|
|
|
// Include external login plugins to be loaded |
189
|
|
|
if (file_exists(BASE_PATH . 'extlogin.php')) { |
190
|
|
|
include BASE_PATH . 'extlogin.php'; |
191
|
|
|
} |
192
|
|
|
if (WebAppAuthentication::$_errorCode === NOERROR) { |
193
|
|
|
WebAppAuthentication::$_authenticated = true; |
194
|
|
|
WebAppAuthentication::_storeMAPISession(WebAppAuthentication::$_mapiSession->getSession()); |
195
|
|
|
$tmp = explode('@', $username); |
196
|
|
|
if (count($tmp) == 2) { |
197
|
|
|
setcookie('domainname', $tmp[1], ['expires' => time() + 31536000, 'path' => '/', 'domain' => '', 'secure' => true, 'httponly' => true, 'samesite' => 'Strict']); |
198
|
|
|
} |
199
|
|
|
$wa_title = WebAppAuthentication::$_mapiSession->getFullName(); |
200
|
|
|
$companyname = WebAppAuthentication::$_mapiSession->getCompanyName(); |
201
|
|
|
if (isset($companyname) && strlen($companyname) != 0) { |
202
|
|
|
$wa_title .= " ({$companyname})"; |
203
|
|
|
} |
204
|
|
|
if (strlen($wa_title) != 0) { |
205
|
|
|
setcookie('webapp_title', $wa_title, ['expires' => time() + 31536000, 'path' => '/', 'domain' => '', 'secure' => true, 'httponly' => true, 'samesite' => 'Strict']); |
206
|
|
|
} |
207
|
|
|
} |
208
|
|
|
elseif (WebAppAuthentication::$_errorCode == MAPI_E_LOGON_FAILED || WebAppAuthentication::$_errorCode == MAPI_E_UNCONFIGURED) { |
209
|
|
|
error_log('grommunio Web user: ' . $username . ': authentication failure at MAPI'); |
210
|
|
|
} |
211
|
|
|
} |
212
|
|
|
|
213
|
|
|
return WebAppAuthentication::$_errorCode; |
214
|
|
|
} |
215
|
|
|
|
216
|
|
|
/** |
217
|
|
|
* Store a serialized MAPI Session, which can be used by _restoreMAPISession to re-create |
218
|
|
|
* a MAPISession, which saves a login call. |
219
|
|
|
* |
220
|
|
|
* @param MAPISession $session the session to serialize and save |
221
|
|
|
*/ |
222
|
|
|
private static function _storeMAPISession($session) { |
223
|
|
|
if (!WebAppAuthentication::$_sessionSaveSupport) { |
224
|
|
|
return; |
225
|
|
|
} |
226
|
|
|
|
227
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
228
|
|
|
$data = ''; |
229
|
|
|
if (kc_session_save($session, $data) === NOERROR) { |
230
|
|
|
$encryptionStore->add('savedsession', bin2hex((string) $data)); |
231
|
|
|
} |
232
|
|
|
} |
233
|
|
|
|
234
|
|
|
/** |
235
|
|
|
* Restore a MAPISession from the serialized with kc_session_restore. |
236
|
|
|
* |
237
|
|
|
* @return bool true if session has been restored successfully |
238
|
|
|
*/ |
239
|
|
|
private static function _restoreMAPISession() { |
240
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
241
|
|
|
|
242
|
|
|
if (!WebAppAuthentication::$_sessionSaveSupport || $encryptionStore->get('savedsession') === null) { |
243
|
|
|
return false; |
244
|
|
|
} |
245
|
|
|
|
246
|
|
|
if (kc_session_restore(hex2bin((string) $encryptionStore->get('savedsession')), $session) === NOERROR) { |
|
|
|
|
247
|
|
|
WebAppAuthentication::$_errorCode = NOERROR; |
248
|
|
|
WebAppAuthentication::$_authenticated = true; |
249
|
|
|
WebAppAuthentication::setMAPISession($session); |
250
|
|
|
|
251
|
|
|
return true; |
252
|
|
|
} |
253
|
|
|
|
254
|
|
|
return false; |
255
|
|
|
} |
256
|
|
|
|
257
|
|
|
/** |
258
|
|
|
* Stores the given username and password in the session using the encryptionstore. |
259
|
|
|
* |
260
|
|
|
* @param string The username |
261
|
|
|
* @param string The password |
262
|
|
|
* @param mixed $username |
263
|
|
|
* @param mixed $password |
264
|
|
|
*/ |
265
|
|
|
private static function _storeCredentialsInSession($username, $password) { |
266
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
267
|
|
|
$encryptionStore->add('username', $username); |
268
|
|
|
$encryptionStore->add('password', $password); |
269
|
|
|
} |
270
|
|
|
|
271
|
|
|
/** |
272
|
|
|
* Checks if a user tries to log in by submitting the login form. |
273
|
|
|
* |
274
|
|
|
* @return bool |
275
|
|
|
*/ |
276
|
|
|
public static function isUsingLoginForm() { |
277
|
|
|
// Login form is only found on index.php |
278
|
|
|
// If we don't check it, then posting to grommunio.php would |
279
|
|
|
// also make authenticating possible. |
280
|
|
|
if (basename((string) $_SERVER['SCRIPT_NAME']) !== 'index.php') { |
281
|
|
|
return false; |
282
|
|
|
} |
283
|
|
|
|
284
|
|
|
return isset($_POST) && isset($_POST['username'], $_POST['password']); |
285
|
|
|
} |
286
|
|
|
|
287
|
|
|
/** |
288
|
|
|
* Tries to authenticate the user with credentials that were posted. |
289
|
|
|
* Returns the error code from the logon attempt. |
290
|
|
|
* |
291
|
|
|
* @return int |
292
|
|
|
*/ |
293
|
|
|
public static function authenticateWithPostedCredentials() { |
294
|
|
|
$email = appendDefaultDomain($_POST['username']); |
295
|
|
|
if (empty($email) || empty($_POST['password'])) { |
296
|
|
|
WebAppAuthentication::$_errorCode = MAPI_E_LOGON_FAILED; |
297
|
|
|
|
298
|
|
|
return WebAppAuthentication::getErrorCode(); |
299
|
|
|
} |
300
|
|
|
// Check if a session is already running and if the credentials match |
301
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
302
|
|
|
$username = $encryptionStore->get('username'); |
303
|
|
|
$password = $encryptionStore->get('password'); |
304
|
|
|
|
305
|
|
|
if (!is_null($username) && !is_null($password)) { |
306
|
|
|
if ($username != $email || $password != $_POST['password']) { |
307
|
|
|
WebAppAuthentication::$_errorCode = MAPI_E_INVALID_WORKSTATION_ACCOUNT; |
308
|
|
|
WebAppAuthentication::$_phpSession->destroy(); |
|
|
|
|
309
|
|
|
|
310
|
|
|
return WebAppAuthentication::getErrorCode(); |
311
|
|
|
} |
312
|
|
|
} |
313
|
|
|
else { |
314
|
|
|
// If no session is currently running, then store a fingerprint of the requester |
315
|
|
|
// in the session. |
316
|
|
|
$_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
317
|
|
|
} |
318
|
|
|
|
319
|
|
|
// Give the session a new id |
320
|
|
|
session_regenerate_id(); |
321
|
|
|
|
322
|
|
|
WebAppAuthentication::login($email, $_POST['password']); |
323
|
|
|
|
324
|
|
|
// Store the credentials in the session if logging in was successful |
325
|
|
|
if (WebAppAuthentication::$_errorCode === NOERROR) { |
326
|
|
|
WebAppAuthentication::_storeCredentialsInSession($email, $_POST['password']); |
327
|
|
|
|
328
|
|
|
return WebAppAuthentication::getErrorCode(); |
329
|
|
|
} |
330
|
|
|
|
331
|
|
|
return WebAppAuthentication::getErrorCode(); |
332
|
|
|
} |
333
|
|
|
|
334
|
|
|
/** |
335
|
|
|
* Login with Oauth2.0 keycloak access token. |
336
|
|
|
* User selects login with keycloak, then gets redirected to keycloak server. |
337
|
|
|
* If login is successful, the user is redirected with code grant back to gromox server. |
338
|
|
|
* gromox requests access token with the received grant. |
339
|
|
|
* keycloak server verifies grant, and sends access token. |
340
|
|
|
* access token is used to authenticate user. |
341
|
|
|
* |
342
|
|
|
* @param mixed $code |
343
|
|
|
*/ |
344
|
|
|
public static function authenticateWithAccessToken($code) { |
345
|
|
|
$keycloak = KeyCloak::getInstance(); |
|
|
|
|
346
|
|
|
if (!is_null($keycloak)) { |
347
|
|
|
if ($keycloak->client_credential_grant_req($code) && $keycloak->validate_grant()) { |
348
|
|
|
$keycloak->set_last_refresh_time(time()); |
349
|
|
|
$_SESSION['_keycloak_auth'] = $keycloak; |
350
|
|
|
|
351
|
|
|
if (isset($_SESSION['_keycloak_auth'])) { |
352
|
|
|
$email = appendDefaultDomain($_SESSION['_keycloak_auth']->access_token->get_claims('email')); |
353
|
|
|
$token = $_SESSION['_keycloak_auth']->access_token->get_payload(); |
354
|
|
|
|
355
|
|
|
// Check if a session is already running and if the credentials match |
356
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
357
|
|
|
$username = $encryptionStore->get('username'); |
358
|
|
|
$password = $encryptionStore->get('password'); |
359
|
|
|
|
360
|
|
|
if (!is_null($username) && !is_null($password)) { |
361
|
|
|
if ($username != $email || $password != $token) { |
362
|
|
|
WebAppAuthentication::$_errorCode = MAPI_E_INVALID_WORKSTATION_ACCOUNT; |
363
|
|
|
WebAppAuthentication::$_phpSession->destroy(); |
364
|
|
|
|
365
|
|
|
return WebAppAuthentication::getErrorCode(); |
366
|
|
|
} |
367
|
|
|
} |
368
|
|
|
else { |
369
|
|
|
// If no session is currently running, then store a fingerprint of the requester |
370
|
|
|
// in the session. |
371
|
|
|
$_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
372
|
|
|
} |
373
|
|
|
// Give the session a new id |
374
|
|
|
session_regenerate_id(); |
375
|
|
|
|
376
|
|
|
WebAppAuthentication::login($email, $token); |
377
|
|
|
// Store the credentials in the session if logging in was successful |
378
|
|
|
if (WebAppAuthentication::$_errorCode === NOERROR) { |
379
|
|
|
WebAppAuthentication::_storeCredentialsInSession($email, $token); |
380
|
|
|
|
381
|
|
|
return WebAppAuthentication::getErrorCode(); |
382
|
|
|
} |
383
|
|
|
} |
384
|
|
|
} |
385
|
|
|
header('Location:' . $keycloak->login_url($keycloak->redirect_url) . ''); |
386
|
|
|
} |
387
|
|
|
|
388
|
|
|
return WebAppAuthentication::getErrorCode(); |
389
|
|
|
} |
390
|
|
|
|
391
|
|
|
/** |
392
|
|
|
* Logs the user in with a given username and token in $_POST and logs |
393
|
|
|
* in with the special flag for token authentication enabled. If $new |
394
|
|
|
* is true it's assumed that a session does not exists and there will |
395
|
|
|
* be a new one generated and fingerprint stored in session which is |
396
|
|
|
* later compared after logon. After successful logon the session is stored. |
397
|
|
|
* |
398
|
|
|
* @param bool $new true if user has no session yet |
399
|
|
|
* |
400
|
|
|
* @return int|void |
401
|
|
|
*/ |
402
|
|
|
public static function authenticateWithToken($new = true) { |
403
|
|
|
if (empty($_POST['token'])) { |
404
|
|
|
WebAppAuthentication::$_errorCode = MAPI_E_LOGON_FAILED; |
405
|
|
|
|
406
|
|
|
return WebAppAuthentication::getErrorCode(); |
407
|
|
|
} |
408
|
|
|
|
409
|
|
|
if ($new) { |
410
|
|
|
// If no session is currently running, then store a fingerprint of the requester |
411
|
|
|
// in the session. |
412
|
|
|
$_SESSION['fingerprint'] = BrowserFingerprint::getFingerprint(); |
413
|
|
|
|
414
|
|
|
// Give the session a new id |
415
|
|
|
session_regenerate_id(); |
416
|
|
|
} |
417
|
|
|
|
418
|
|
|
WebAppAuthentication::$_errorCode = WebAppAuthentication::getMAPISession()->logon( |
419
|
|
|
$_POST['username'], |
420
|
|
|
$_POST['token'], |
421
|
|
|
DEFAULT_SERVER, |
422
|
|
|
null, |
423
|
|
|
null, |
424
|
|
|
0 |
425
|
|
|
); |
426
|
|
|
|
427
|
|
|
// Store the credentials in the session if logging in was successful |
428
|
|
|
if (WebAppAuthentication::$_errorCode === NOERROR) { |
429
|
|
|
WebAppAuthentication::_storeCredentialsInSession($_POST['username'], $_POST['token']); |
430
|
|
|
WebAppAuthentication::_storeMAPISession(WebAppAuthentication::$_mapiSession->getSession()); |
431
|
|
|
} |
432
|
|
|
|
433
|
|
|
return WebAppAuthentication::getErrorCode(); |
434
|
|
|
} |
435
|
|
|
|
436
|
|
|
/** |
437
|
|
|
* Tries to authenticate the user with credentials from the session. When credentials |
438
|
|
|
* are found in the session it will return the error code from the logon attempt with |
439
|
|
|
* those credentials, otherwise it will return void. |
440
|
|
|
* |
441
|
|
|
* Before trying to logon, it will compare the requesters fingerprint with the |
442
|
|
|
* fingerprint stored in the session. If they are not the same, the session will be |
443
|
|
|
* destroyed and the script will be killed. |
444
|
|
|
* |
445
|
|
|
* @return int|void |
446
|
|
|
*/ |
447
|
|
|
private static function _authenticateWithSession() { |
448
|
|
|
// Check if the session hasn't timed out |
449
|
|
|
if (WebAppAuthentication::$_phpSession->hasTimedOut()) { |
450
|
|
|
// Using a MAPI error code here, while it is not really a MAPI session timeout |
451
|
|
|
// However to the user this should make no difference, so the MAPI error will do. |
452
|
|
|
WebAppAuthentication::$_errorCode = MAPI_E_END_OF_SESSION; |
453
|
|
|
|
454
|
|
|
return WebAppAuthentication::getErrorCode(); |
455
|
|
|
} |
456
|
|
|
|
457
|
|
|
// Now check if we stored credentials in the session (in the encryption store) |
458
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
459
|
|
|
$username = $encryptionStore->get('username'); |
460
|
|
|
$password = $encryptionStore->get('password'); |
461
|
|
|
if (is_null($username) || is_null($password)) { |
462
|
|
|
return; |
463
|
|
|
} |
464
|
|
|
|
465
|
|
|
// Check if the browser fingerprint is the same as that of the browser that was |
466
|
|
|
// used to login in the first place. |
467
|
|
|
if ($_SESSION['fingerprint'] !== BrowserFingerprint::getFingerprint()) { |
468
|
|
|
// Something bad has happened. This must be someone who stole a session cookie!!! |
469
|
|
|
// We will delete the session and stop the script without any error message |
470
|
|
|
WebAppAuthentication::$_phpSession->destroy(); |
471
|
|
|
|
472
|
|
|
exit; |
|
|
|
|
473
|
|
|
} |
474
|
|
|
|
475
|
|
|
return WebAppAuthentication::login($username, $password); |
476
|
|
|
} |
477
|
|
|
|
478
|
|
|
/** |
479
|
|
|
* Returns the username that is stored in the session. |
480
|
|
|
* |
481
|
|
|
* @return string |
482
|
|
|
*/ |
483
|
|
|
public static function getUserName() { |
484
|
|
|
$encryptionStore = EncryptionStore::getInstance(); |
485
|
|
|
|
486
|
|
|
return $encryptionStore->get('username'); |
487
|
|
|
} |
488
|
|
|
} |
489
|
|
|
|
490
|
|
|
// Instantiate the class |
491
|
|
|
WebAppAuthentication::getInstance(); |
492
|
|
|
|