Completed
Pull Request — master (#116)
by Franco
01:38
created

LDAPAuthenticator   B

Complexity

Total Complexity 23

Size/Duplication

Total Lines 180
Duplicated Lines 15 %

Coupling/Cohesion

Components 0
Dependencies 16

Importance

Changes 0
Metric Value
wmc 23
lcom 0
cbo 16
dl 27
loc 180
rs 8.4614
c 0
b 0
f 0

7 Methods

Rating   Name   Duplication   Size   Complexity  
A get_name() 0 4 1
A get_login_form() 0 4 1
A getLoginHandler() 0 4 1
C authenticate() 27 73 13
A fallbackAuthenticate() 0 18 4
A supportedServices() 0 9 2
A getLostPasswordHandler() 0 4 1

How to fix   Duplicated Code   

Duplicated Code

Duplicate code is one of the most pungent code smells. A rule that is often used is to re-structure code once it is duplicated in three or more places.

Common duplication problems, and corresponding solutions are:

1
<?php
2
3
namespace SilverStripe\ActiveDirectory\Authenticators;
4
5
use SilverStripe\ActiveDirectory\Services\LDAPService;
6
use SilverStripe\Control\Controller;
7
use SilverStripe\Control\Email\Email;
8
use SilverStripe\Control\HTTPRequest;
9
use SilverStripe\Control\Session;
10
use SilverStripe\Core\Config\Config;
11
use SilverStripe\Core\Injector\Injector;
12
use SilverStripe\ORM\ValidationResult;
13
use SilverStripe\Security\Authenticator;
14
use SilverStripe\Security\Member;
15
use SilverStripe\Security\MemberAuthenticator\LogoutHandler;
16
use SilverStripe\Security\MemberAuthenticator\MemberAuthenticator;
17
18
/**
19
 * Class LDAPAuthenticator
20
 *
21
 * Authenticate a user against LDAP, without the single sign-on component.
22
 *
23
 * See SAMLAuthenticator for further information.
24
 *
25
 * @package activedirectory
26
 */
27
class LDAPAuthenticator extends MemberAuthenticator
28
{
29
    /**
30
     * @var string
31
     */
32
    private $name = 'LDAP';
0 ignored issues
show
Unused Code introduced by
The property $name is not used and could be removed.

This check marks private properties in classes that are never used. Those properties can be removed.

Loading history...
33
34
    /**
35
     * Set to 'yes' to indicate if this module should look up usernames in LDAP by matching the email addresses.
36
     *
37
     * CAVEAT #1: only set to 'yes' for systems that enforce email uniqueness.
38
     * Otherwise only the first LDAP user with matching email will be accessible.
39
     *
40
     * CAVEAT #2: this is untested for systems that use LDAP with principal style usernames (i.e. [email protected]).
41
     * The system will misunderstand emails for usernames with uncertain outcome.
42
     *
43
     * @var string 'no' or 'yes'
44
     */
45
    private static $allow_email_login = 'no';
0 ignored issues
show
Unused Code introduced by
The property $allow_email_login is not used and could be removed.

This check marks private properties in classes that are never used. Those properties can be removed.

Loading history...
46
47
    /**
48
     * Set to 'yes' to fallback login attempts to {@link $fallback_authenticator}.
49
     * This will occur if LDAP fails to authenticate the user.
50
     *
51
     * @var string 'no' or 'yes'
52
     */
53
    private static $fallback_authenticator = 'no';
0 ignored issues
show
Unused Code introduced by
The property $fallback_authenticator is not used and could be removed.

This check marks private properties in classes that are never used. Those properties can be removed.

Loading history...
54
55
    /**
56
     * The class of {@link Authenticator} to use as the fallback authenticator.
57
     *
58
     * @var string
59
     */
60
    private static $fallback_authenticator_class = MemberAuthenticator::class;
0 ignored issues
show
Unused Code introduced by
The property $fallback_authenticator_class is not used and could be removed.

This check marks private properties in classes that are never used. Those properties can be removed.

Loading history...
61
62
    /**
63
     * @return string
64
     */
65
    public static function get_name()
66
    {
67
        return Config::inst()->get(self::class, 'name');
68
    }
69
70
    /**
71
     * @param Controller $controller
72
     * @return LDAPLoginForm
73
     */
74
    public static function get_login_form(Controller $controller)
75
    {
76
        return LDAPLoginForm::create($controller, LDAPAuthenticator::class, 'LoginForm');
77
    }
78
79
    /**
80
     * Performs the login, but will also create and sync the Member record on-the-fly, if not found.
81
     *
82
     * @param array $data
83
     * @param HTTPRequest $request
84
     * @param ValidationResult|null $result
85
     * @return null|Member
86
     */
87
    public function authenticate(array $data, HTTPRequest $request, ValidationResult &$result = null)
88
    {
89
        $result = $result ?: ValidationResult::create();
90
        /** @var LDAPService $service */
91
        $service = Injector::inst()->get(LDAPService::class);
92
        $login = trim($data['Login']);
93
        if (Email::is_valid_address($login)) {
94
            if (Config::inst()->get(self::class, 'allow_email_login') != 'yes') {
95
                $result->addError(
96
                    _t(
97
                        'LDAPAuthenticator.PLEASEUSEUSERNAME',
98
                        'Please enter your username instead of your email to log in.'
99
                    )
100
                );
101
                return null;
102
            }
103
            $username = $service->getUsernameByEmail($login);
104
105
            // No user found with this email.
106 View Code Duplication
            if (!$username) {
0 ignored issues
show
Duplication introduced by
This code seems to be duplicated across your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
Bug Best Practice introduced by
The expression $username of type null|string is loosely compared to false; this is ambiguous if the string can be empty. You might want to explicitly use === null instead.

In PHP, under loose comparison (like ==, or !=, or switch conditions), values of different types might be equal.

For string values, the empty string '' is a special case, in particular the following results might be unexpected:

''   == false // true
''   == null  // true
'ab' == false // false
'ab' == null  // false

// It is often better to use strict comparison
'' === false // false
'' === null  // false
Loading history...
107
                if (Config::inst()->get(self::class, 'fallback_authenticator') === 'yes') {
108
                    if ($fallbackMember = $this->fallbackAuthenticate($data, $request)) {
109
                        {
110
                            return $fallbackMember;
111
                        }
112
                    }
113
                }
114
115
                $result->addError(_t('LDAPAuthenticator.INVALIDCREDENTIALS', 'Invalid credentials'));
116
                return null;
117
            }
118
        } else {
119
            $username = $login;
120
        }
121
        $serviceAuthenticationResult = $service->authenticate($username, $data['Password']);
122
        $success = $serviceAuthenticationResult['success'] === true;
123 View Code Duplication
        if (!$success) {
0 ignored issues
show
Duplication introduced by
This code seems to be duplicated across your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
124
            if (Config::inst()->get(self::class, 'fallback_authenticator') === 'yes') {
125
                if ($fallbackMember = $this->fallbackAuthenticate($data, $request)) {
126
                    return $fallbackMember;
127
                }
128
            }
129
130
            $result->addError($serviceAuthenticationResult['message']);
131
132
            return null;
133
        }
134
        $data = $service->getUserByUsername($serviceAuthenticationResult['identity']);
135
        if (!$data) {
0 ignored issues
show
Bug Best Practice introduced by
The expression $data of type array is implicitly converted to a boolean; are you sure this is intended? If so, consider using empty($expr) instead to make it clear that you intend to check for an array without elements.

This check marks implicit conversions of arrays to boolean values in a comparison. While in PHP an empty array is considered to be equal (but not identical) to false, this is not always apparent.

Consider making the comparison explicit by using empty(..) or ! empty(...) instead.

Loading history...
136
            $result->addError(
137
                _t(
138
                    'LDAPAuthenticator.PROBLEMFINDINGDATA',
139
                    'There was a problem retrieving your user data'
140
                )
141
            );
142
            return null;
143
        }
144
145
        // LDAPMemberExtension::memberLoggedIn() will update any other AD attributes mapped to Member fields
146
        $member = Member::get()->filter('GUID', $data['objectguid'])->limit(1)->first();
147 View Code Duplication
        if (!($member && $member->exists())) {
0 ignored issues
show
Duplication introduced by
This code seems to be duplicated across your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
148
            $member = new Member();
149
            $member->GUID = $data['objectguid'];
150
        }
151
152
        // Update the users from LDAP so we are sure that the email is correct.
153
        // This will also write the Member record.
154
        $service->updateMemberFromLDAP($member);
0 ignored issues
show
Compatibility introduced by
$member of type object<SilverStripe\ORM\DataObject> is not a sub-type of object<SilverStripe\Security\Member>. It seems like you assume a child class of the class SilverStripe\ORM\DataObject to be always present.

This check looks for parameters that are defined as one type in their type hint or doc comment but seem to be used as a narrower type, i.e an implementation of an interface or a subclass.

Consider changing the type of the parameter or doing an instanceof check before assuming your parameter is of the expected type.

Loading history...
155
156
        $request->getSession()->clear('BackURL');
157
158
        return $member;
159
    }
160
161
    /**
162
     * Try to authenticate using the fallback authenticator.
163
     *
164
     * @param array $data
165
     * @param HTTPRequest $request
166
     * @return null|Member
167
     */
168
    protected function fallbackAuthenticate($data, HTTPRequest $request)
169
    {
170
        if (array_key_exists('Login', $data) && !array_key_exists('Email', $data)) {
171
            $data['Email'] = $data['Login'];
172
        }
173
        $authenticatorClass = Config::inst()->get(self::class, 'fallback_authenticator_class');
174
        if ($authenticator = Injector::inst()->get($authenticatorClass)) {
175
            $result = call_user_func(
176
                [
177
                    $authenticator,
178
                    'authenticate'
179
                ],
180
                $data,
181
                $request
182
            );
183
            return $result;
184
        }
185
    }
186
187
    public function getLoginHandler($link)
188
    {
189
        return LDAPLoginHandler::create($link, $this);
190
    }
191
192
    public function supportedServices()
193
    {
194
        $result = Authenticator::LOGIN | Authenticator::LOGOUT | Authenticator::RESET_PASSWORD;
195
196
        if ((bool)LDAPService::config()->get('allow_password_change')) {
197
            $result |= Authenticator::CHANGE_PASSWORD;
198
        }
199
        return $result;
200
    }
201
202
    public function getLostPasswordHandler($link)
203
    {
204
        return LDAPLostPasswordHandler::create($link, $this);
205
    }
206
}
207