SecurityExtension.php 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516
  1. <?php
  2. namespace Symfony\Bundle\FrameworkBundle\DependencyInjection;
  3. use Symfony\Component\DependencyInjection\Extension\Extension;
  4. use Symfony\Component\DependencyInjection\Loader\XmlFileLoader;
  5. use Symfony\Component\DependencyInjection\Resource\FileResource;
  6. use Symfony\Component\DependencyInjection\ContainerBuilder;
  7. use Symfony\Component\DependencyInjection\Reference;
  8. use Symfony\Component\DependencyInjection\Definition;
  9. use Symfony\Component\DependencyInjection\ParameterBag\ParameterBag;
  10. use Symfony\Component\HttpFoundation\RequestMatcher;
  11. /*
  12. * This file is part of the Symfony framework.
  13. *
  14. * (c) Fabien Potencier <fabien.potencier@symfony-project.com>
  15. *
  16. * This source file is subject to the MIT license that is bundled
  17. * with this source code in the file LICENSE.
  18. */
  19. /**
  20. * SecurityExtension.
  21. *
  22. * @author Fabien Potencier <fabien.potencier@symfony-project.com>
  23. */
  24. class SecurityExtension extends Extension
  25. {
  26. /**
  27. * Loads the web configuration.
  28. *
  29. * @param array $config An array of configuration settings
  30. * @param ContainerBuilder $container A ContainerBuilder instance
  31. */
  32. public function configLoad($config, ContainerBuilder $container)
  33. {
  34. if (!$container->hasDefinition('security.context')) {
  35. $loader = new XmlFileLoader($container, array(__DIR__.'/../Resources/config', __DIR__.'/Resources/config'));
  36. $loader->load('security.xml');
  37. }
  38. if (isset($config['access-denied-url'])) {
  39. $container->setParameter('security.access_denied.url', $config['access-denied-url']);
  40. }
  41. $this->createFirewalls($config, $container);
  42. $this->createAuthorization($config, $container);
  43. $this->createRoleHierarchy($config, $container);
  44. return $container;
  45. }
  46. protected function createRoleHierarchy($config, ContainerBuilder $container)
  47. {
  48. $roles = array();
  49. if (isset($config['role_hierarchy'])) {
  50. $roles = $config['role_hierarchy'];
  51. } elseif (isset($config['role-hierarchy'])) {
  52. $roles = $config['role-hierarchy'];
  53. }
  54. if (isset($roles['role']) && is_int(key($roles['role']))) {
  55. $roles = $roles['role'];
  56. }
  57. $hierarchy = array();
  58. foreach ($roles as $id => $role) {
  59. if (is_array($role) && isset($role['id'])) {
  60. $id = $role['id'];
  61. }
  62. $value = $role;
  63. if (is_array($role) && isset($role['value'])) {
  64. $value = $role['value'];
  65. }
  66. $hierarchy[$id] = is_array($value) ? $value : preg_split('/\s*,\s*/', $value);
  67. }
  68. $container->setParameter('security.role_hierarchy.roles', $hierarchy);
  69. $container->remove('security.access.simple_role_voter');
  70. $container->getDefinition('security.access.role_hierarchy_voter')->addTag('security.voter');
  71. }
  72. protected function createAuthorization($config, ContainerBuilder $container)
  73. {
  74. $rules = array();
  75. if (isset($config['access_control'])) {
  76. $rules = $config['access_control'];
  77. } elseif (isset($config['access-control'])) {
  78. $rules = $config['access-control'];
  79. }
  80. if (isset($rules['rule']) && is_array($rules['rule'])) {
  81. $rules = $rules['rule'];
  82. }
  83. foreach ($rules as $i => $access) {
  84. $roles = isset($access['role']) ? (is_array($access['role']) ? $access['role'] : preg_split('/\s*,\s*/', $access['role'])) : array();
  85. $channel = null;
  86. if (isset($access['requires-channel'])) {
  87. $channel = $access['requires-channel'];
  88. } elseif (isset($access['requires_channel'])) {
  89. $channel = $access['requires_channel'];
  90. }
  91. // matcher
  92. $id = 'security.matcher.url.'.$i;
  93. $definition = $container->register($id, '%security.matcher.class%');
  94. if (isset($access['path'])) {
  95. $definition->addMethodCall('matchPath', array(is_array($access['path']) ? $access['path']['pattern'] : $access['path']));
  96. }
  97. $attributes = $this->fixConfig($access, 'attribute');
  98. foreach ($attributes as $key => $attribute) {
  99. if (isset($attribute['key'])) {
  100. $key = $attribute['key'];
  101. }
  102. $definition->addMethodCall('matchAttribute', array($key, $attribute['pattern']));
  103. }
  104. $container->getDefinition('security.access_map')->addMethodCall('add', array(new Reference($id), $roles, $channel));
  105. }
  106. }
  107. protected function createFirewalls($config, ContainerBuilder $container)
  108. {
  109. $providerIds = $this->createAuthenticationProviders($config, $container);
  110. if (!$firewalls = $this->fixConfig($config, 'firewall')) {
  111. return;
  112. }
  113. // load service templates
  114. $c = new ContainerBuilder($container->getParameterBag());
  115. $loader = new XmlFileLoader($c, array(__DIR__.'/../Resources/config', __DIR__.'/Resources/config'));
  116. $loader->load('security_templates.xml');
  117. foreach ($this->fixConfig($config, 'template') as $template) {
  118. $loader->load($c->getParameterBag()->resolveValue($template));
  119. }
  120. $container->merge($c);
  121. // load firewall map
  122. $map = $container->getDefinition('security.firewall.map');
  123. foreach ($firewalls as $firewall) {
  124. list($matcher, $listeners, $exceptionListener) = $this->createFirewall($container, $firewall, $providerIds);
  125. $map->addMethodCall('add', array($matcher, $listeners, $exceptionListener));
  126. }
  127. // remove all service templates
  128. foreach ($c->getServiceIds() as $id) {
  129. $container->remove($id);
  130. }
  131. }
  132. protected function createFirewall(ContainerBuilder $container, $firewall, $providerIds)
  133. {
  134. // unique id for this firewall
  135. $id = md5(serialize($firewall));
  136. // Matcher
  137. $i = 0;
  138. $matcher = null;
  139. if (isset($firewall['pattern'])) {
  140. $id = 'security.matcher.map'.$id.'.'.++$i;
  141. $matcher = $container
  142. ->register($id, '%security.matcher.class%')
  143. ->addMethodCall('matchPath', array($firewall['pattern']))
  144. ;
  145. $matcher = new Reference($id);
  146. }
  147. // Security disabled?
  148. if (isset($firewall['security']) && !$firewall['security']) {
  149. return array($matcher, array(), null);
  150. }
  151. // Provider id (take the first registered provider if none defined)
  152. if (isset($firewall['provider'])) {
  153. $defaultProvider = $this->getUserProviderId($firewall['provider']);
  154. } else {
  155. if (!$providerIds) {
  156. throw new \InvalidArgumentException('You must provide at least one authentication provider.');
  157. }
  158. $keys = array_keys($providerIds);
  159. $defaultProvider = current($keys);
  160. }
  161. // Register listeners
  162. $listeners = array();
  163. $providers = array();
  164. // Channel listener
  165. $listeners[] = new Reference('security.channel_listener');
  166. // Context serializer listener
  167. if (!isset($firewall['stateless']) || !$firewall['stateless']) {
  168. $listeners[] = new Reference('security.context_listener');
  169. }
  170. // Logout listener
  171. if (array_key_exists('logout', $firewall)) {
  172. $listenerId = 'security.logout_listener.'.$id;
  173. $listener = $container->setDefinition($listenerId, clone $container->getDefinition('security.logout_listener'));
  174. $listeners[] = new Reference($listenerId);
  175. $arguments = $listener->getArguments();
  176. if (isset($firewall['logout']['path'])) {
  177. $arguments[1] = $firewall['logout']['path'];
  178. }
  179. if (isset($firewall['logout']['target'])) {
  180. $arguments[2] = $firewall['logout']['target'];
  181. }
  182. $listener->setArguments($arguments);
  183. if (!isset($firewall['stateless']) || !$firewall['stateless']) {
  184. $listener->addMethodCall('addHandler', array(new Reference('security.logout.handler.session')));
  185. }
  186. if (count($cookies = $this->fixConfig($firewall['logout'], 'cookie')) > 0) {
  187. $cookieHandlerId = 'security.logout.handler.cookie_clearing.'.$id;
  188. $cookieHandler = $container->setDefinition($cookieHandlerId, clone $container->getDefinition('security.logout.handler.cookie_clearing'));
  189. $cookieHandler->setArguments(array($cookies));
  190. $listener->addMethodCall('addHandler', array(new Reference($cookieHandlerId)));
  191. }
  192. }
  193. // Authentication listeners
  194. list($authListeners, $providers, $defaultEntryPoint) = $this->createAuthenticationListeners($container, $id, $firewall, $defaultProvider, $providerIds);
  195. $listeners = array_merge($listeners, $authListeners);
  196. // Access listener
  197. $listeners[] = new Reference($this->createAccessListener($container, $id, $providers));
  198. // Switch user listener
  199. if (array_key_exists('switch_user', $firewall)) {
  200. $firewall['switch-user'] = $firewall['switch_user'];
  201. }
  202. if (array_key_exists('switch-user', $firewall)) {
  203. $listeners[] = new Reference($this->createSwitchUserListener($container, $id, $firewall['switch-user'], $defaultProvider));
  204. }
  205. // Exception listener
  206. $exceptionListener = new Reference($this->createExceptionListener($container, $id, $defaultEntryPoint));
  207. return array($matcher, $listeners, $exceptionListener);
  208. }
  209. protected function createAuthenticationListeners($container, $id, $firewall, $defaultProvider, $providerIds)
  210. {
  211. $listeners = array();
  212. $providers = array();
  213. $hasListeners = false;
  214. $defaultEntryPoint = null;
  215. $positions = array('pre_auth', 'form', 'http');
  216. $tags = $container->findTaggedServiceIds('security.listener.factory');
  217. $factories = array();
  218. foreach ($positions as $position) {
  219. $factories[$position] = array();
  220. }
  221. foreach (array_keys($tags) as $tag) {
  222. $factory = $container->get($tag);
  223. $factories[$factory->getPosition()][] = $factory;
  224. }
  225. foreach ($positions as $position) {
  226. foreach ($factories[$position] as $factory) {
  227. $key = $factory->getKey();
  228. $keybis = str_replace('-', '_', $key);
  229. if (array_key_exists($keybis, $firewall)) {
  230. $firewall[$key] = $firewall[$keybis];
  231. }
  232. if (array_key_exists($key, $firewall)) {
  233. $userProvider = isset($firewall[$key]['provider']) ? $this->getUserProviderId($firewall[$key]['provider']) : $defaultProvider;
  234. list($provider, $listener, $defaultEntryPoint) = $factory->create($container, $id, $firewall[$key], $userProvider, $providerIds, $defaultEntryPoint);
  235. $listeners[] = new Reference($listener);
  236. $providers[] = new Reference($provider);
  237. $hasListeners = true;
  238. }
  239. }
  240. }
  241. // Anonymous
  242. if (array_key_exists('anonymous', $firewall)) {
  243. $listeners[] = new Reference('security.authentication.listener.anonymous');
  244. $hasListeners = true;
  245. }
  246. if (false === $hasListeners) {
  247. throw new \LogicException(sprintf('No authentication listener registered for pattern "%s".', isset($firewall['pattern']) ? $firewall['pattern'] : ''));
  248. }
  249. return array($listeners, $providers, $defaultEntryPoint);
  250. }
  251. // Parses user providers and returns an array of their ids
  252. protected function createAuthenticationProviders($config, ContainerBuilder $container)
  253. {
  254. $providers = $this->fixConfig($config, 'provider');
  255. if (!$providers) {
  256. return array();
  257. }
  258. $providerIds = array();
  259. foreach ($providers as $name => $provider) {
  260. list($id, $encoder) = $this->createUserDaoProvider($name, $provider, $container);
  261. $providerIds[$id] = $encoder;
  262. }
  263. return $providerIds;
  264. }
  265. // Parses a <provider> tag and returns the id for the related user provider service
  266. protected function createUserDaoProvider($name, $provider, ContainerBuilder $container, $master = true)
  267. {
  268. // encoder
  269. $encoder = 'plain';
  270. if (isset($provider['password-encoder'])) {
  271. $encoder = $provider['password-encoder'];
  272. } elseif (isset($provider['password_encoder'])) {
  273. $encoder = $provider['password_encoder'];
  274. }
  275. if (isset($provider['name'])) {
  276. $name = $provider['name'];
  277. }
  278. if (!$name) {
  279. $name = md5(serialize($provider));
  280. }
  281. $name = $this->getUserProviderId($name);
  282. // Existing DAO service provider
  283. if (isset($provider['id'])) {
  284. $container->setAlias($name, $provider['id']);
  285. return array($name, $encoder);
  286. }
  287. // Chain provider
  288. if (isset($provider['provider'])) {
  289. // FIXME
  290. throw new \RuntimeException('Not implemented yet.');
  291. }
  292. // Doctrine Entity DAO provider
  293. if (isset($provider['entity'])) {
  294. $container
  295. ->register($name, '%security.user.provider.entity.class%')
  296. ->setArguments(array(
  297. new Reference('security.user.entity_manager'),
  298. $provider['entity']['class'],
  299. isset($provider['entity']['property']) ? $provider['entity']['property'] : null,
  300. ));
  301. return array($name, $encoder);
  302. }
  303. // Doctrine Document DAO provider
  304. if (isset($provider['document'])) {
  305. $container
  306. ->register($name, '%security.user.provider.document.class%')
  307. ->setArguments(array(
  308. new Reference('security.user.document_manager'),
  309. $provider['document']['class'],
  310. isset($provider['document']['property']) ? $provider['document']['property'] : null,
  311. ));
  312. return array($name, $encoder);
  313. }
  314. // In-memory DAO provider
  315. $definition = $container->register($name, '%security.user.provider.in_memory.class%');
  316. foreach ($this->fixConfig($provider, 'user') as $username => $user) {
  317. if (isset($user['name'])) {
  318. $username = $user['name'];
  319. }
  320. if (!array_key_exists('password', $user)) {
  321. // if no password is provided explicitly, it means that
  322. // the user will be used with OpenID, X.509 certificates, ...
  323. // Let's generate a random password just to be sure this
  324. // won't be used accidentally with other authentication schemes.
  325. // If you want an empty password, just say so explicitly
  326. $user['password'] = uniqid();
  327. }
  328. if (!isset($user['roles'])) {
  329. $user['roles'] = array();
  330. } else {
  331. $user['roles'] = is_array($user['roles']) ? $user['roles'] : preg_split('/\s*,\s*/', $user['roles']);
  332. }
  333. $userId = $name.'_'.md5(serialize(array($username, $user['password'], $user['roles'])));
  334. $container
  335. ->register($userId, 'Symfony\Component\Security\User\User')
  336. ->setArguments(array($username, $user['password'], $user['roles']))
  337. ;
  338. $definition->addMethodCall('createUser', array(new Reference($userId)));
  339. }
  340. return array($name, $encoder);
  341. }
  342. protected function getUserProviderId($name)
  343. {
  344. return 'security.authentication.provider.'.$name;
  345. }
  346. protected function createAccessListener($container, $id, $providers)
  347. {
  348. // Authentication manager
  349. $authManager = 'security.authentication.manager.'.$id;
  350. $container
  351. ->register($authManager, '%security.authentication.manager.class%')
  352. ->addArgument($providers)
  353. ;
  354. // Access listener
  355. $listenerId = 'security.access_listener.'.$id;
  356. $listener = $container->setDefinition($listenerId, clone $container->getDefinition('security.access_listener'));
  357. $arguments = $listener->getArguments();
  358. $arguments[3] = new Reference($authManager);
  359. $listener->setArguments($arguments);
  360. return $listenerId;
  361. }
  362. protected function createExceptionListener($container, $id, $defaultEntryPoint)
  363. {
  364. $exceptionListenerId = 'security.exception_listener.'.$id;
  365. $listener = $container->setDefinition($exceptionListenerId, clone $container->getDefinition('security.exception_listener'));
  366. $arguments = $listener->getArguments();
  367. $arguments[1] = null === $defaultEntryPoint ? null : new Reference($defaultEntryPoint);
  368. $listener->setArguments($arguments);
  369. return $exceptionListenerId;
  370. }
  371. protected function createSwitchUserListener($container, $id, $config, $defaultProvider)
  372. {
  373. $userProvider = isset($config['provider']) ? $this->getUserProviderId($config['provider']) : $defaultProvider;
  374. $switchUserListenerId = 'security.authentication.switchuser_listener.'.$id;
  375. $listener = $container->setDefinition($switchUserListenerId, clone $container->getDefinition('security.authentication.switchuser_listener'));
  376. $arguments = $listener->getArguments();
  377. $arguments[1] = new Reference($userProvider);
  378. $listener->setArguments($arguments);
  379. if (isset($config['role'])) {
  380. $container->setParameter('security.authentication.switchuser.role', $config['role']);
  381. }
  382. if (isset($config['parameter'])) {
  383. $container->setParameter('security.authentication.switchuser.parameter', $config['parameter']);
  384. }
  385. return $switchUserListenerId;
  386. }
  387. /**
  388. * Returns the base path for the XSD files.
  389. *
  390. * @return string The XSD base path
  391. */
  392. public function getXsdValidationBasePath()
  393. {
  394. return __DIR__.'/../Resources/config/schema';
  395. }
  396. public function getNamespace()
  397. {
  398. return 'http://www.symfony-project.org/schema/dic/security';
  399. }
  400. public function getAlias()
  401. {
  402. return 'security';
  403. }
  404. protected function fixConfig($config, $key)
  405. {
  406. $values = array();
  407. if (isset($config[$key.'s'])) {
  408. $values = $config[$key.'s'];
  409. } elseif (isset($config[$key])) {
  410. if (is_string($config[$key]) || !is_int(key($config[$key]))) {
  411. // only one
  412. $values = array($config[$key]);
  413. } else {
  414. $values = $config[$key];
  415. }
  416. }
  417. return $values;
  418. }
  419. }