1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
use Kaliop\IdentityManagementBundle\Security\Authentication\Provider\RemoteUserAuthenticationProvider; |
4
|
|
|
use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken; |
5
|
|
|
use Symfony\Component\Security\Http\Event\InteractiveLoginEvent; |
6
|
|
|
|
7
|
|
|
class eZRemoteUserLoginUser extends eZUser |
|
|
|
|
8
|
|
|
{ |
9
|
|
|
|
10
|
|
|
/** |
11
|
|
|
* We need to override this because parent call uses 'self' instead of 'static' |
12
|
|
|
* @param string $login |
13
|
|
|
* @param string $password |
14
|
|
|
* @param bool $authenticationMatch |
15
|
|
|
* @return bool|mixed |
16
|
|
|
*/ |
17
|
|
|
static function loginUser( $login, $password, $authenticationMatch = false ) |
|
|
|
|
18
|
|
|
{ |
19
|
|
|
$user = self::_loginUser( $login, $password, $authenticationMatch ); |
20
|
|
|
|
21
|
|
|
if ( is_object( $user ) ) |
22
|
|
|
{ |
23
|
|
|
self::loginSucceeded( $user ); |
24
|
|
|
return $user; |
25
|
|
|
} |
26
|
|
|
else |
27
|
|
|
{ |
28
|
|
|
self::loginFailed( $user, $login ); |
29
|
|
|
return false; |
30
|
|
|
} |
31
|
|
|
} |
32
|
|
|
|
33
|
|
|
protected static function _loginUser( $login, $password, $authenticationMatch = false ) |
34
|
|
|
{ |
35
|
|
|
$fwName = eZINI::instance('identitymanagement.ini')->variable('GeneralSettings', 'FirewallName'); |
36
|
|
|
|
37
|
|
|
$container = ezpKernel::instance()->getServiceContainer(); |
38
|
|
|
|
39
|
|
|
// nb: this string is related to the name of the firewall! |
40
|
|
|
/** @var RemoteUserAuthenticationProvider $remoteUserAuthProvider */ |
41
|
|
|
$remoteUserAuthProvider = $container->get('security.authentication.provider.remoteuser.'.$fwName); |
42
|
|
|
$token = new UsernamePasswordToken($login, $password, $fwName, array('ROLE_USER')); |
43
|
|
|
|
44
|
|
|
try { |
45
|
|
|
// get the authorized token, which contains the remoteUser |
46
|
|
|
$authToken = $remoteUserAuthProvider->authenticate($token); |
47
|
|
|
// convert the remoteUser into an eZP user (this creates the user in the db if needed) |
48
|
|
|
$request = $container->get('request'); |
49
|
|
|
$event = new InteractiveLoginEvent($request, $authToken); |
50
|
|
|
$container->get("event_dispatcher")->dispatch("security.interactive_login", $event); |
51
|
|
|
|
52
|
|
|
// now get back the eZP user for the eZ4 stack |
53
|
|
|
/** @var eZ\Publish\Core\Repository\Values\User\User $user */ |
54
|
|
|
$user = $container->get('security.token_storage')->getToken()->getUser()->getAPIUser(); |
55
|
|
|
|
56
|
|
|
// and set back an anon token for Sf, as after the redirect, that's what the eZ\Bundle\EzPublishLegacyBundle\EventListener\RequestListener expects |
57
|
|
|
$container->get('security.token_storage')->setToken(null); |
58
|
|
|
|
59
|
|
|
/// @todo shall we check isenabled ? |
60
|
|
|
|
61
|
|
|
return self::fetch($user->id); |
62
|
|
|
|
63
|
|
|
} catch(\Exception $e) { |
64
|
|
|
/// @todo make it easier to tell apart system error from user errors such as bad password... |
65
|
|
|
|
66
|
|
|
eZDebug::writeError($e->getMessage(), __METHOD__ ); |
67
|
|
|
|
68
|
|
|
return false; |
69
|
|
|
} |
70
|
|
|
} |
71
|
|
|
|
72
|
|
|
} |
73
|
|
|
|
You can fix this by adding a namespace to your class:
When choosing a vendor namespace, try to pick something that is not too generic to avoid conflicts with other libraries.