Total Complexity | 92 |
Total Lines | 488 |
Duplicated Lines | 0 % |
Changes | 1 | ||
Bugs | 0 | Features | 0 |
Complex classes like Base62x often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use Base62x, and based on these observations, apply Extract Interface, too.
1 | <?php |
||
15 | class Base62x |
||
16 | { |
||
17 | const MODE_ENCODE = 1; |
||
18 | const MODE_DECODE = 2; |
||
19 | |||
20 | protected $_validCompressionAlgorithms = ['gzip' => ['zlib', 'deflate', 'gzip'], 'huffman']; |
||
21 | |||
22 | /** |
||
23 | * The mode: encode or decode. |
||
24 | * |
||
25 | * @var int |
||
26 | */ |
||
27 | protected $mode; |
||
28 | |||
29 | /** |
||
30 | * The payload to be encoded or decoded. |
||
31 | * |
||
32 | * @var mixed |
||
33 | */ |
||
34 | protected $payload; |
||
35 | |||
36 | /** |
||
37 | * Wheter the payload needs to be compressed prior of encoding. Defaults to null. |
||
38 | * |
||
39 | * @var string |
||
40 | */ |
||
41 | protected $compressAlgorithm = null; |
||
42 | |||
43 | /** |
||
44 | * The compression mode related to the compression algo. Defaults to null. |
||
45 | * |
||
46 | * @var string |
||
47 | */ |
||
48 | protected $compressEncoding = null; |
||
49 | |||
50 | /** |
||
51 | * The encryption method (algorithm) to be used in case of password-protected encoding. |
||
52 | * This variable *must* be a valid method supported in openssl_get_cipher_methods(). |
||
53 | * |
||
54 | * @var string |
||
55 | */ |
||
56 | protected $cryptMethod; |
||
57 | |||
58 | /** |
||
59 | * The encrypt/decrypt key (password) to be used to protect/unprotect the encoding. |
||
60 | * |
||
61 | * @var mixed |
||
62 | */ |
||
63 | protected $cryptKey; |
||
64 | |||
65 | /** |
||
66 | * Wheter the payload needs to be decompressed after the decoding. Defaults to false. |
||
67 | * |
||
68 | * @var string |
||
69 | */ |
||
70 | protected $decompressAlgorithm = null; |
||
71 | |||
72 | /** |
||
73 | * The compression mode related to the compression algo. Defaults to null. |
||
74 | * |
||
75 | * @var string |
||
76 | */ |
||
77 | protected $decompressEncoding = null; |
||
78 | |||
79 | /** |
||
80 | * @param mixed $payload |
||
81 | * |
||
82 | * @return \Mfonte\Base62x\Base62x |
||
83 | */ |
||
84 | public static function encode($payload): self |
||
85 | { |
||
86 | return new self(self::MODE_ENCODE, $payload); |
||
87 | } |
||
88 | |||
89 | /** |
||
90 | * @param mixed $payload |
||
91 | * |
||
92 | * @return \Mfonte\Base62x\Base62x |
||
93 | */ |
||
94 | public static function decode($payload): self |
||
95 | { |
||
96 | return new self(self::MODE_DECODE, $payload); |
||
97 | } |
||
98 | |||
99 | public function __construct($mode, $payload) |
||
100 | { |
||
101 | $this->mode = $mode; |
||
102 | |||
103 | if (empty($payload)) { |
||
104 | throw new InvalidParam('payload', __FUNCTION__, __CLASS__, 'The payload cannot be empty'); |
||
105 | } elseif (\is_resource($payload)) { |
||
106 | throw new InvalidParam('payload', __FUNCTION__, __CLASS__, 'The payload cannot be a resource'); |
||
107 | } elseif (\is_object($payload)) { |
||
108 | throw new InvalidParam('payload', __FUNCTION__, __CLASS__, 'The payload cannot be an object'); |
||
109 | } elseif (\is_array($payload)) { |
||
110 | // if the payload is an array, perform here and now the translation to a serialized string |
||
111 | $payload = serialize($payload); |
||
112 | } |
||
113 | |||
114 | $this->payload = $payload; |
||
115 | } |
||
116 | |||
117 | /** |
||
118 | * Sets the compression type and encoding. |
||
119 | * |
||
120 | * @param string $algo A valid compression algorithm as seen on $_validCompressionAlgorithms |
||
121 | * @param string $encoding A valid compression encoding as seen on $_validCompressionAlgorithms |
||
122 | * |
||
123 | * @return \Mfonte\Base62x\Base62x |
||
124 | */ |
||
125 | public function compress($algo = 'gzip', $encoding = 'gzip'): self |
||
126 | { |
||
127 | // sanity check for bad $algo |
||
128 | if ( |
||
129 | !\array_key_exists($algo, $this->_validCompressionAlgorithms) && |
||
130 | !\in_array($algo, $this->_validCompressionAlgorithms, true) |
||
131 | ) { |
||
132 | throw new InvalidParam('algo', __FUNCTION__, __CLASS__); |
||
133 | } |
||
134 | |||
135 | // sanity check for bad $encoding |
||
136 | if ( |
||
137 | \array_key_exists($algo, $this->_validCompressionAlgorithms) && |
||
138 | \is_array($this->_validCompressionAlgorithms[$algo]) && |
||
139 | !\in_array($encoding, $this->_validCompressionAlgorithms[$algo], true) |
||
140 | ) { |
||
141 | throw new InvalidParam('encoding', __FUNCTION__, __CLASS__); |
||
142 | } |
||
143 | |||
144 | // make sure we nullify the $encoding if we don't have one |
||
145 | if ( |
||
146 | !\array_key_exists($algo, $this->_validCompressionAlgorithms) || |
||
147 | !\is_array($this->_validCompressionAlgorithms[$algo]) |
||
148 | ) { |
||
149 | $encoding = null; |
||
150 | } |
||
151 | |||
152 | $this->compressAlgorithm = $algo; |
||
153 | $this->compressEncoding = $encoding; |
||
154 | |||
155 | return $this; |
||
156 | } |
||
157 | |||
158 | /** |
||
159 | * As the decompression is done automagically via the "magic string" at the beginning of the |
||
160 | * encoded payload, this method is pointless. |
||
161 | * It is present only as a reference. |
||
162 | * |
||
163 | * @return \Mfonte\Base62x\Base62x |
||
164 | */ |
||
165 | public function decompress(): self |
||
166 | { |
||
167 | return $this; |
||
168 | } |
||
169 | |||
170 | /** |
||
171 | * Sets the encryption key (password) and method (algorithm). |
||
172 | * |
||
173 | * @param string $key A password for your encoded base62x output string |
||
174 | * @param string $method A valid openssl cypher method as supported in your environment (openssl_get_cipher_methods) |
||
175 | * |
||
176 | * @return \Mfonte\Base62x\Base62x |
||
177 | */ |
||
178 | public function encrypt(string $key, string $method = 'aes-128-ctr'): self |
||
179 | { |
||
180 | if (!\function_exists('openssl_get_cipher_methods')) { |
||
181 | throw new CryptException('openssl_get_cipher_methods unsupported in your PHP installation'); |
||
182 | } |
||
183 | if (!\in_array(mb_strtolower($method), openssl_get_cipher_methods(), true)) { |
||
184 | throw new CryptException('Encryption method "'.$method.'" is either unsupported in your PHP installation or not a valid encryption algorithm.'); |
||
185 | } |
||
186 | |||
187 | $this->cryptMethod = mb_strtolower($method); |
||
188 | $this->cryptKey = $key; |
||
189 | |||
190 | return $this; |
||
191 | } |
||
192 | |||
193 | /** |
||
194 | * Sets the encryption key (password) and method (algorithm). |
||
195 | * |
||
196 | * @see self::encrypt |
||
197 | */ |
||
198 | public function decrypt(string $key, string $method = 'aes-128-ctr'): self |
||
199 | { |
||
200 | return $this->encrypt($key, $method); |
||
201 | } |
||
202 | |||
203 | /** |
||
204 | * Gets the encoded or decoded mixed variable originally passed as $payload to instance. |
||
205 | * |
||
206 | * @return mixed |
||
207 | */ |
||
208 | public function get() |
||
209 | { |
||
210 | $retval = null; |
||
211 | switch ($this->mode) { |
||
212 | case self::MODE_ENCODE: |
||
213 | $retval = $this->_encode($this->payload); |
||
214 | break; |
||
215 | |||
216 | case self::MODE_DECODE: |
||
217 | $retval = $this->_decode($this->payload); |
||
218 | |||
219 | // decoded payload can be a serialized array: if so, we return the original representation |
||
220 | if ($this->_isSerializedString($retval) && ($unserialized = @unserialize($retval)) !== false) { |
||
221 | $retval = $unserialized; |
||
222 | } |
||
223 | break; |
||
224 | } |
||
225 | |||
226 | return $retval; |
||
227 | } |
||
228 | |||
229 | /** |
||
230 | * Performs the actual Base62x encoding. |
||
231 | */ |
||
232 | private function _encode(string $payload): string |
||
233 | { |
||
234 | if ($this->cryptKey && $this->cryptMethod) { |
||
235 | $payload = $this->_performEncryption($payload); |
||
236 | } |
||
237 | if ($this->compressAlgorithm) { |
||
238 | $payload = $this->_performCompress($payload); |
||
239 | } |
||
240 | |||
241 | $encoded = Encoder::encode($payload); |
||
242 | if (empty($encoded)) { |
||
243 | throw new EncodeException(); |
||
244 | } |
||
245 | |||
246 | return $encoded; |
||
247 | } |
||
248 | |||
249 | /** |
||
250 | * Performs the actual Base62x decoding. |
||
251 | */ |
||
252 | private function _decode(string $payload): string |
||
272 | } |
||
273 | |||
274 | /** |
||
275 | * Performs the actual compress before chaining it into the Base62x encoder. |
||
276 | */ |
||
277 | private function _performCompress(string $payload): string |
||
278 | { |
||
279 | $compressed = null; |
||
280 | switch ($this->compressAlgorithm) { |
||
281 | case 'gzip': |
||
282 | $compressed = GzipCompressor::encode($payload, $this->compressEncoding); |
||
283 | break; |
||
284 | case 'huffman': |
||
285 | $compressed = HuffmanCompressor::encode($payload, HuffmanCompressor::createCodeTree($payload)); |
||
286 | break; |
||
287 | } |
||
288 | |||
289 | if (empty($compressed)) { |
||
290 | throw new EncodeException(); |
||
291 | } |
||
292 | |||
293 | // create the compression footprint, to avoid the decompress() on Base62x::decode() |
||
294 | $footprint = $this->_createCompressionFootprint(); |
||
295 | |||
296 | return $footprint.$compressed; |
||
297 | } |
||
298 | |||
299 | /** |
||
300 | * Decompresses the payload, that was prior compressed using one of the available compression types. |
||
301 | */ |
||
302 | private function _performUncompress(string $compressed_payload, string $compression_algo, ?string $compression_encoding): string |
||
303 | { |
||
304 | switch ($compression_algo) { |
||
305 | case 'gzip': |
||
306 | $payload = GzipCompressor::decode($compressed_payload, $compression_encoding); |
||
307 | break; |
||
308 | case 'huffman': |
||
309 | $payload = HuffmanCompressor::decode($compressed_payload); |
||
310 | break; |
||
311 | default: |
||
312 | $payload = ''; |
||
313 | } |
||
314 | |||
315 | return (string) $payload; |
||
316 | } |
||
317 | |||
318 | /** |
||
319 | * Performs the actual encryption before chaining it into the Base62x encoder. |
||
320 | */ |
||
321 | private function _performEncryption(string $payload): ?string |
||
332 | } |
||
333 | } |
||
334 | |||
335 | /** |
||
336 | * Decrypts the payload, that was prior encrypted using the on-board encrypter. |
||
337 | */ |
||
338 | private function _performDecryption(string $payload): string |
||
339 | { |
||
340 | if (empty($this->cryptKey)) { |
||
341 | throw new CryptException('Cannot decrypt the payload without a valid cryptKey'); |
||
342 | } |
||
343 | if (empty($this->cryptMethod)) { |
||
344 | throw new CryptException('Cannot decrypt the payload without a valid cryptMethod'); |
||
345 | } |
||
346 | |||
347 | try { |
||
348 | $crypt = new Crypter([ |
||
349 | 'key' => $this->cryptKey, |
||
350 | 'method' => $this->cryptMethod, |
||
351 | ]); |
||
352 | |||
353 | $decrypted = $crypt->cipher($payload)->decrypt(); |
||
354 | if ($decrypted === false) { |
||
355 | throw new CryptException('Cannot decrypt the payload: result from cipher()->decrypt() is false'); |
||
356 | } |
||
357 | |||
358 | return $decrypted; |
||
359 | } catch (Exception $ex) { |
||
360 | throw new CryptException('Cannot decrypt the payload: '.$ex->getMessage()); |
||
361 | } |
||
362 | } |
||
363 | |||
364 | /** |
||
365 | * Prepares a "magic string" that will be appendend at beginning of the compressed payload, |
||
366 | * prior of chaining it into the Base62x encoder. |
||
367 | * Doing so, the decode method will automagically uncompress the encoded payload, so the subsequent "decode" |
||
368 | * can understand which compression algo+encoding was originally used. |
||
369 | */ |
||
370 | private function _createCompressionFootprint(): string |
||
371 | { |
||
372 | return '[MFB62X.COMPRESS.'.base64_encode(implode(',', [$this->compressAlgorithm, $this->compressEncoding])).']'; |
||
373 | } |
||
374 | |||
375 | /** |
||
376 | * Gets the decoded Base26x string, and checks if it needs decompression, |
||
377 | * by analyzing its "compression footprint" placed at the very beginning of the payload. |
||
378 | */ |
||
379 | private function _getCompressionFootprintAndSanitizePayload(string $payload): array |
||
380 | { |
||
381 | $compression_algo = $compression_encoding = null; |
||
382 | $pos_start = mb_strpos($payload, '[MFB62X.COMPRESS.'); |
||
383 | $pos_end = mb_strpos($payload, ']'); |
||
384 | |||
385 | if ($pos_start === 0 && $pos_end > 0) { |
||
386 | $footprint = mb_substr($payload, 0, $pos_end + 1); |
||
387 | $compression_footprint = str_replace(['[', 'MFB62X.COMPRESS.', ']'], '', $footprint); |
||
388 | |||
389 | $compression_params = @base64_decode($compression_footprint, true); |
||
390 | if ($compression_params && \count(explode(',', $compression_params)) === 2) { |
||
391 | $compression_params = explode(',', $compression_params); |
||
392 | $compression_algo = $compression_params[0]; |
||
393 | $compression_encoding = $compression_params[1]; |
||
394 | } |
||
395 | |||
396 | // clean the payload, removing the compression footprint |
||
397 | $payload = mb_substr($payload, $pos_end + 1); |
||
398 | } |
||
399 | |||
400 | // some sanity checks to avoid tampering with the payload and cause bad behaviour or worse |
||
401 | // sanity check for bad $algo |
||
402 | if ( |
||
403 | $compression_algo && |
||
404 | !\array_key_exists($compression_algo, $this->_validCompressionAlgorithms) && |
||
405 | !\in_array($compression_algo, $this->_validCompressionAlgorithms, true) |
||
406 | ) { |
||
407 | throw new DecodeException(); |
||
408 | } |
||
409 | |||
410 | // sanity check for bad $encoding |
||
411 | if ( |
||
412 | $compression_algo && |
||
413 | $compression_encoding && |
||
414 | \array_key_exists($compression_algo, $this->_validCompressionAlgorithms) && |
||
415 | \is_array($this->_validCompressionAlgorithms[$compression_algo]) && |
||
416 | !\in_array($compression_encoding, $this->_validCompressionAlgorithms[$compression_algo], true) |
||
417 | ) { |
||
418 | throw new DecodeException(); |
||
419 | } |
||
420 | |||
421 | // make sure we nullify the $encoding if we don't have one |
||
422 | if ( |
||
423 | $compression_algo && |
||
424 | (!\array_key_exists($compression_algo, $this->_validCompressionAlgorithms) || |
||
425 | !\is_array($this->_validCompressionAlgorithms[$compression_algo])) |
||
426 | ) { |
||
427 | $compression_encoding = null; |
||
428 | } |
||
429 | |||
430 | return [ |
||
431 | 'payload' => $payload, |
||
432 | 'compression_algo' => $compression_algo, |
||
433 | 'compression_encoding' => ($compression_encoding && mb_strlen($compression_encoding) > 0) ? $compression_encoding : null, |
||
434 | ]; |
||
435 | } |
||
436 | |||
437 | /** |
||
438 | * Checks whether the $data argument is a serialized string, i.e. an array serialized with native PHP's serialize(). |
||
439 | * |
||
440 | * @param mixed $data (should always be a string) |
||
441 | * @param bool $strict Whether to perform a strict analysis or not |
||
442 | */ |
||
443 | private function _isSerializedString($data, $strict = true): bool |
||
503 | } |
||
504 | } |