Passed
Push — wip_sessions ( dba0a8...2f1ef6 )
by Nils
05:51
created
sources/ldap.queries.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -70,7 +70,7 @@  discard block
 block discarded – undo
70 70
 ) {
71 71
     // Not allowed page
72 72
     $session->set('system-error_code', ERR_NOT_ALLOWED);
73
-    include $SETTINGS['cpassman_dir'] . '/error.php';
73
+    include $SETTINGS['cpassman_dir'].'/error.php';
74 74
     exit;
75 75
 }
76 76
 
@@ -144,7 +144,7 @@  discard block
 block discarded – undo
144 144
                     $openLdapExtra = new OpenLdapExtra();
145 145
                     break;
146 146
                 default:
147
-                    throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']);
147
+                    throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']);
148 148
             }
149 149
         } catch (Exception $e) {
150 150
             echo  prepareExchangedData(
@@ -159,7 +159,7 @@  discard block
 block discarded – undo
159 159
             // 2- Get user info from AD
160 160
             // We want to isolate attribute ldap_user_attribute or mostly samAccountName
161 161
             $userADInfos = $ldapConnection->query()
162
-                ->where((isset($SETTINGS['ldap_user_attribute']) ===true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $post_username)
162
+                ->where((isset($SETTINGS['ldap_user_attribute']) === true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $post_username)
163 163
                 ->firstOrFail();
164 164
 
165 165
             // Is user enabled? Only ActiveDirectory
@@ -182,7 +182,7 @@  discard block
 block discarded – undo
182 182
             echo prepareExchangedData(
183 183
                 array(
184 184
                     'error' => true,
185
-                    'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage(). "<br>".$error->getDiagnosticMessage() : $e),
185
+                    'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage()."<br>".$error->getDiagnosticMessage() : $e),
186 186
                 ),
187 187
                 'encode'
188 188
             );
@@ -195,7 +195,7 @@  discard block
 block discarded – undo
195 195
             // For OpenLDAP and others, we use attribute dn
196 196
             $userAuthAttempt = $ldapConnection->auth()->attempt(
197 197
                 $SETTINGS['ldap_type'] === 'ActiveDirectory' ?
198
-                    $userADInfos['userprincipalname'][0] :  // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
198
+                    $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
199 199
                     $userADInfos['dn'],
200 200
                 $post_password
201 201
             );
@@ -216,7 +216,7 @@  discard block
 block discarded – undo
216 216
             echo prepareExchangedData(
217 217
                 array(
218 218
                     'error' => true,
219
-                    'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage(). "<br>".$error->getDiagnosticMessage() : $e),
219
+                    'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage()."<br>".$error->getDiagnosticMessage() : $e),
220 220
                 ),
221 221
                 'encode'
222 222
             );
Please login to merge, or discard this patch.
sources/identify.php 1 patch
Spacing   +47 added lines, -47 removed lines patch added patch discarded remove patch
@@ -100,7 +100,7 @@  discard block
 block discarded – undo
100 100
 if ($checkUserAccess->checkSession() === false) {
101 101
     // Not allowed page
102 102
     $session->set('system-error_code', ERR_NOT_ALLOWED);
103
-    include $SETTINGS['cpassman_dir'] . '/error.php';
103
+    include $SETTINGS['cpassman_dir'].'/error.php';
104 104
     exit;
105 105
 }
106 106
 
@@ -135,7 +135,7 @@  discard block
 block discarded – undo
135 135
      * @param array $SETTINGS
136 136
      * @return bool|string
137 137
      */
138
-    function handleAuthAttempts($post_data, $SETTINGS): bool|string
138
+    function handleAuthAttempts($post_data, $SETTINGS): bool | string
139 139
     {
140 140
         $session = SessionManager::getSession();
141 141
         $lang = new Language();
@@ -262,18 +262,18 @@  discard block
 block discarded – undo
262 262
     }
263 263
 
264 264
     // Check if Duo auth is in progress and pass the pw and login back to the standard login process
265
-    if(
265
+    if (
266 266
         isKeyExistingAndEqual('duo', 1, $SETTINGS) === true
267 267
         && $dataReceived['user_2fa_selection'] === 'duo'
268 268
         && $session->get('user-duo_status') === 'IN_PROGRESS'
269 269
         && !empty($dataReceived['duo_state'])
270
-    ){
270
+    ) {
271 271
         $key = hash('sha256', $dataReceived['duo_state']);
272 272
         $iv = substr(hash('sha256', $dataReceived['duo_state']), 0, 16);
273 273
         $duo_data_dec = openssl_decrypt(base64_decode($session->get('user-duo_status')), 'AES-256-CBC', $key, 0, $iv);
274 274
         // Clear the data from the Duo process to continue clean with the standard login process
275
-        $session->set('user-duo_data','');
276
-        if($duo_data_dec === false){
275
+        $session->set('user-duo_data', '');
276
+        if ($duo_data_dec === false) {
277 277
             echo prepareExchangedData(
278 278
                 [
279 279
                     'error' => true,
@@ -288,7 +288,7 @@  discard block
 block discarded – undo
288 288
         $dataReceived['login'] = $duo_data['duo_login'];
289 289
     }
290 290
 
291
-    if(isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) {
291
+    if (isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) {
292 292
         echo json_encode([
293 293
             'data' => prepareExchangedData(
294 294
                 [
@@ -559,7 +559,7 @@  discard block
 block discarded – undo
559 559
         }
560 560
         // Append with roles from AD groups
561 561
         if (is_null($userInfo['roles_from_ad_groups']) === false) {
562
-            $userInfo['fonction_id'] = empty($userInfo['fonction_id'])  === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id']. ';' . $userInfo['roles_from_ad_groups'];
562
+            $userInfo['fonction_id'] = empty($userInfo['fonction_id']) === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id'].';'.$userInfo['roles_from_ad_groups'];
563 563
         }
564 564
         // store
565 565
         $session->set('user-roles', $userInfo['fonction_id']);
@@ -571,7 +571,7 @@  discard block
 block discarded – undo
571 571
         if (count($session->get('user-roles_array')) > 0) {
572 572
             $rolesList = DB::query(
573 573
                 'SELECT id, title, complexity
574
-                FROM ' . prefixTable('roles_title') . '
574
+                FROM ' . prefixTable('roles_title').'
575 575
                 WHERE id IN %li',
576 576
                 $session->get('user-roles_array')
577 577
             );
@@ -617,7 +617,7 @@  discard block
 block discarded – undo
617 617
             if ($adjustPermissions) {
618 618
                 $session->set('user-admin', (int) $userInfo['admin']);
619 619
                 $session->set('user-manager', (int) $userInfo['gestionnaire']);
620
-                $session->set('user-can_manage_all_users',(int)  $userInfo['can_manage_all_users']);
620
+                $session->set('user-can_manage_all_users', (int) $userInfo['can_manage_all_users']);
621 621
                 $session->set('user-read_only', (int) $userInfo['read_only']);
622 622
                 DB::update(
623 623
                     prefixTable('users'),
@@ -689,10 +689,10 @@  discard block
 block discarded – undo
689 689
         $session->set('user-latest_items_tab', []);
690 690
         $session->set('user-nb_roles', 0);
691 691
         foreach ($session->get('user-latest_items') as $item) {
692
-            if (! empty($item)) {
692
+            if (!empty($item)) {
693 693
                 $dataLastItems = DB::queryFirstRow(
694 694
                     'SELECT id,label,id_tree
695
-                    FROM ' . prefixTable('items') . '
695
+                    FROM ' . prefixTable('items').'
696 696
                     WHERE id=%i',
697 697
                     $item
698 698
                 );
@@ -701,7 +701,7 @@  discard block
 block discarded – undo
701 701
                     [
702 702
                         'id' => $item,
703 703
                         'label' => $dataLastItems['label'],
704
-                        'url' => 'index.php?page=items&amp;group=' . $dataLastItems['id_tree'] . '&amp;id=' . $item,
704
+                        'url' => 'index.php?page=items&amp;group='.$dataLastItems['id_tree'].'&amp;id='.$item,
705 705
                     ],
706 706
                     'add'
707 707
                 );
@@ -711,7 +711,7 @@  discard block
 block discarded – undo
711 711
         // Get cahce tree info
712 712
         $cacheTreeData = DB::queryFirstRow(
713 713
             'SELECT visible_folders
714
-            FROM ' . prefixTable('cache_tree') . '
714
+            FROM ' . prefixTable('cache_tree').'
715 715
             WHERE user_id=%i',
716 716
             (int) $session->get('user-id')
717 717
         );
@@ -743,7 +743,7 @@  discard block
 block discarded – undo
743 743
             && (int) $sessionAdmin !== 1
744 744
         ) {
745 745
             // get all Admin users
746
-            $val = DB::queryfirstrow('SELECT email FROM ' . prefixTable('users') . " WHERE admin = %i and email != ''", 1);
746
+            $val = DB::queryfirstrow('SELECT email FROM '.prefixTable('users')." WHERE admin = %i and email != ''", 1);
747 747
             if (DB::count() > 0) {
748 748
                 // Add email to table
749 749
                 prepareSendingEmail(
@@ -755,7 +755,7 @@  discard block
 block discarded – undo
755 755
                             '#tp_time#',
756 756
                         ],
757 757
                         [
758
-                            ' ' . $session->get('user-login') . ' (IP: ' . getClientIpServer() . ')',
758
+                            ' '.$session->get('user-login').' (IP: '.getClientIpServer().')',
759 759
                             date($SETTINGS['date_format'], (int) $session->get('user-last_connection')),
760 760
                             date($SETTINGS['time_format'], (int) $session->get('user-last_connection')),
761 761
                         ],
@@ -904,7 +904,7 @@  discard block
 block discarded – undo
904 904
 {
905 905
     $rows = DB::query(
906 906
         'SELECT date
907
-        FROM ' . prefixTable('log_system') . "
907
+        FROM ' . prefixTable('log_system')."
908 908
         WHERE field_1 = %s
909 909
         AND type = 'failed_auth'
910 910
         AND label = 'password_is_not_correct'
@@ -918,7 +918,7 @@  discard block
 block discarded – undo
918 918
         foreach ($rows as $record) {
919 919
             array_push(
920 920
                 $arrAttempts,
921
-                date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date'])
921
+                date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], (int) $record['date'])
922 922
             );
923 923
         }
924 924
     }
@@ -972,7 +972,7 @@  discard block
 block discarded – undo
972 972
     $ldapConnection
973 973
 ) : bool
974 974
 {
975
-    include_once $SETTINGS['cpassman_dir'] . '/sources/main.functions.php';
975
+    include_once $SETTINGS['cpassman_dir'].'/sources/main.functions.php';
976 976
 
977 977
     if ((int) $userInfoDisabled === 1) {
978 978
         return false;
@@ -1180,7 +1180,7 @@  discard block
 block discarded – undo
1180 1180
                 $openLdapExtra = new OpenLdapExtra();
1181 1181
                 break;
1182 1182
             default:
1183
-                throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']);
1183
+                throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']);
1184 1184
         }
1185 1185
     } catch (Exception $e) {
1186 1186
         return prepareExchangedData(array(
@@ -1193,7 +1193,7 @@  discard block
 block discarded – undo
1193 1193
         // 2- Get user info from AD
1194 1194
         // We want to isolate attribute ldap_user_attribute or mostly samAccountName
1195 1195
         $userADInfos = $ldapConnection->query()
1196
-            ->where((isset($SETTINGS['ldap_user_attribute']) ===true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username)
1196
+            ->where((isset($SETTINGS['ldap_user_attribute']) === true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username)
1197 1197
             ->firstOrFail();
1198 1198
 
1199 1199
         // Is user enabled? Only ActiveDirectory
@@ -1212,7 +1212,7 @@  discard block
 block discarded – undo
1212 1212
         // For OpenLDAP and others, we use attribute dn
1213 1213
         $userAuthAttempt = $ldapConnection->auth()->attempt(
1214 1214
             $SETTINGS['ldap_type'] === 'ActiveDirectory' ?
1215
-                $userADInfos['userprincipalname'][0] :  // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
1215
+                $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
1216 1216
                 $userADInfos['dn'],
1217 1217
             $passwordClear
1218 1218
         );
@@ -1229,7 +1229,7 @@  discard block
 block discarded – undo
1229 1229
         $error = $e->getDetailedError();
1230 1230
         return [
1231 1231
             'error' => true,
1232
-            'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage(). "<br>".$error->getDiagnosticMessage() : $e),
1232
+            'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage()."<br>".$error->getDiagnosticMessage() : $e),
1233 1233
 
1234 1234
         ];
1235 1235
     }
@@ -1294,7 +1294,7 @@  discard block
 block discarded – undo
1294 1294
         // error
1295 1295
         return [
1296 1296
             'error' => true,
1297
-            'message' => "Error: Unsupported LDAP type: " . $SETTINGS['ldap_type'],
1297
+            'message' => "Error: Unsupported LDAP type: ".$SETTINGS['ldap_type'],
1298 1298
         ];
1299 1299
     }
1300 1300
     
@@ -1329,12 +1329,12 @@  discard block
 block discarded – undo
1329 1329
     if (isset($SETTINGS['enable_ad_users_with_ad_groups']) === true && (int) $SETTINGS['enable_ad_users_with_ad_groups'] === 1) {
1330 1330
         // Get user groups from AD
1331 1331
         $user_ad_groups = [];
1332
-        foreach($groups as $group) {
1332
+        foreach ($groups as $group) {
1333 1333
             //print_r($group);
1334 1334
             // get relation role id for AD group
1335 1335
             $role = DB::queryFirstRow(
1336 1336
                 'SELECT lgr.role_id
1337
-                FROM ' . prefixTable('ldap_groups_roles') . ' AS lgr
1337
+                FROM ' . prefixTable('ldap_groups_roles').' AS lgr
1338 1338
                 WHERE lgr.ldap_group_id = %i',
1339 1339
                 $group
1340 1340
             );
@@ -1483,7 +1483,7 @@  discard block
 block discarded – undo
1483 1483
     }
1484 1484
 
1485 1485
     // Now check yubico validity
1486
-    include_once $SETTINGS['cpassman_dir'] . '/includes/libraries/Authentication/Yubico/Yubico.php';
1486
+    include_once $SETTINGS['cpassman_dir'].'/includes/libraries/Authentication/Yubico/Yubico.php';
1487 1487
     $yubi = new Auth_Yubico($yubico_user_id, $yubico_user_key);
1488 1488
     $auth = $yubi->verify($yubico_key);
1489 1489
     //, null, null, null, 60
@@ -1637,7 +1637,7 @@  discard block
 block discarded – undo
1637 1637
             $mfaMessage = $lang->get('ga_flash_qr_and_login');
1638 1638
             // generate new QR
1639 1639
             $new_2fa_qr = $tfa->getQRCodeImageAsDataUri(
1640
-                'Teampass - ' . $username,
1640
+                'Teampass - '.$username,
1641 1641
                 $userInfo['ga']
1642 1642
             );
1643 1643
             // clear temporary code from DB
@@ -1650,7 +1650,7 @@  discard block
 block discarded – undo
1650 1650
                 $userInfo['id']
1651 1651
             );
1652 1652
             $firstTime = [
1653
-                'value' => '<img src="' . $new_2fa_qr . '">',
1653
+                'value' => '<img src="'.$new_2fa_qr.'">',
1654 1654
                 'user_admin' => isset($sessionAdmin) ? (int) $sessionAdmin : '',
1655 1655
                 'initial_url' => isset($sessionUrl) === true ? $sessionUrl : '',
1656 1656
                 'pwd_attempts' => (int) $sessionPwdAttempts,
@@ -1806,7 +1806,7 @@  discard block
 block discarded – undo
1806 1806
         }*/
1807 1807
         return [
1808 1808
             'error' => true,
1809
-            'message' => $duo_error . $lang->get('duo_error_check_config'),
1809
+            'message' => $duo_error.$lang->get('duo_error_check_config'),
1810 1810
             'pwd_attempts' => (int) $sessionPwdAttempts,
1811 1811
             'debug_message' => $e->getMessage(),
1812 1812
             'proceedIdentification' => false,
@@ -1822,7 +1822,7 @@  discard block
 block discarded – undo
1822 1822
         } catch (DuoException $e) {
1823 1823
             return [
1824 1824
                 'error' => true,
1825
-                'message' => $duo_error . $lang->get('duo_error_url'),
1825
+                'message' => $duo_error.$lang->get('duo_error_url'),
1826 1826
                 'pwd_attempts' => (int) $sessionPwdAttempts,
1827 1827
                 'debug_message' => $e->getMessage(),
1828 1828
                 'proceedIdentification' => false,
@@ -1830,7 +1830,7 @@  discard block
 block discarded – undo
1830 1830
         }
1831 1831
         
1832 1832
         // Somethimes Duo return success but fail to return a URL, double check if the URL has been created
1833
-        if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url,FILTER_SANITIZE_URL)) {
1833
+        if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url, FILTER_SANITIZE_URL)) {
1834 1834
             // Since Duo Universal requires a redirect, let's store some info when the user get's back after completing the Duo prompt
1835 1835
             $key = hash('sha256', $duo_state);
1836 1836
             $iv = substr(hash('sha256', $duo_state), 0, 16);
@@ -1858,7 +1858,7 @@  discard block
 block discarded – undo
1858 1858
         } else {
1859 1859
             return [
1860 1860
                 'error' => true,
1861
-                'message' => $duo_error . $lang->get('duo_error_url'),
1861
+                'message' => $duo_error.$lang->get('duo_error_url'),
1862 1862
                 'pwd_attempts' => (int) $sessionPwdAttempts,
1863 1863
                 'proceedIdentification' => false,
1864 1864
             ];
@@ -1879,8 +1879,8 @@  discard block
 block discarded – undo
1879 1879
         // return the response (which should be the user name)
1880 1880
         if ($decoded_token['preferred_username'] === $username) {
1881 1881
             $session->set('user-duo_status', 'COMPLET');
1882
-            $session->set('user-duo_state','');
1883
-            $session->set('user-duo_data','');
1882
+            $session->set('user-duo_state', '');
1883
+            $session->set('user-duo_data', '');
1884 1884
             $session->set('user-login', $username);
1885 1885
 
1886 1886
             return [
@@ -1891,9 +1891,9 @@  discard block
 block discarded – undo
1891 1891
             ];
1892 1892
         } else {
1893 1893
             // Something wrong, username from the original Duo request is different than the one received now
1894
-            $session->set('user-duo_status','');
1895
-            $session->set('user-duo_state','');
1896
-            $session->set('user-duo_data','');
1894
+            $session->set('user-duo_status', '');
1895
+            $session->set('user-duo_state', '');
1896
+            $session->set('user-duo_data', '');
1897 1897
 
1898 1898
             return [
1899 1899
                 'error' => true,
@@ -1904,9 +1904,9 @@  discard block
 block discarded – undo
1904 1904
         }
1905 1905
     }
1906 1906
     // If we are here something wrong
1907
-    $session->set('user-duo_status','');
1908
-    $session->set('user-duo_state','');
1909
-    $session->set('user-duo_data','');
1907
+    $session->set('user-duo_status', '');
1908
+    $session->set('user-duo_state', '');
1909
+    $session->set('user-duo_data', '');
1910 1910
     return [
1911 1911
         'error' => true,
1912 1912
         'message' => $lang->get('duo_login_mismatch'),
@@ -2062,8 +2062,8 @@  discard block
 block discarded – undo
2062 2062
     public function get_user_info($login, $enable_ad_user_auto_creation) {
2063 2063
         $data = DB::queryFirstRow(
2064 2064
             'SELECT u.*, a.value AS api_key
2065
-            FROM ' . prefixTable('users') . ' AS u
2066
-            LEFT JOIN ' . prefixTable('api') . ' AS a ON (u.id = a.user_id)
2065
+            FROM ' . prefixTable('users').' AS u
2066
+            LEFT JOIN ' . prefixTable('api').' AS a ON (u.id = a.user_id)
2067 2067
             WHERE login = %s AND deleted_at IS NULL',
2068 2068
             $login
2069 2069
         );
@@ -2413,15 +2413,15 @@  discard block
 block discarded – undo
2413 2413
 
2414 2414
             if ($ret['error'] !== false) {
2415 2415
                 logEvents($SETTINGS, 'failed_auth', 'bad_duo_mfa', '', stripslashes($username), stripslashes($username));
2416
-                $session->set('user-duo_status','');
2417
-                $session->set('user-duo_state','');
2418
-                $session->set('user-duo_data','');
2416
+                $session->set('user-duo_status', '');
2417
+                $session->set('user-duo_state', '');
2418
+                $session->set('user-duo_data', '');
2419 2419
                 return [
2420 2420
                     'error' => true,
2421 2421
                     'mfaData' => $ret,
2422 2422
                     'mfaQRCodeInfos' => false,
2423 2423
                 ];
2424
-            } else if ($ret['duo_url_ready'] === true){
2424
+            } else if ($ret['duo_url_ready'] === true) {
2425 2425
                 return [
2426 2426
                     'error' => false,
2427 2427
                     'mfaData' => $ret,
Please login to merge, or discard this patch.