OAuthProxyListener.php 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. <?php
  2. namespace AuthBundle\Security\Firewall;
  3. use AuthBundle\Services\AccessTokenService;
  4. use Base\OAuthClientBundle\Security\Core\User\CustomOAuthUser;
  5. use HWI\Bundle\OAuthBundle\Security\Core\Authentication\Token\OAuthToken;
  6. use Monolog\Logger;
  7. use Symfony\Component\HttpFoundation\Response;
  8. use Symfony\Component\HttpKernel\Event\GetResponseEvent;
  9. use Symfony\Component\Security\Core\Authentication\AuthenticationManagerInterface;
  10. use Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorageInterface;
  11. use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken;
  12. use Symfony\Component\Security\Core\Exception\AuthenticationException;
  13. use Symfony\Component\Security\Core\Exception\BadCredentialsException;
  14. use Symfony\Component\Security\Http\Firewall\ListenerInterface;
  15. use Symfony\Component\HttpFoundation\Request;
  16. class OAuthProxyListener implements ListenerInterface
  17. {
  18. /**
  19. * @var TokenStorageInterface
  20. */
  21. protected $tokenStorage;
  22. /**
  23. * @var AuthenticationManagerInterface
  24. */
  25. protected $authenticationManager;
  26. /**
  27. * @var AccessTokenService
  28. */
  29. protected $accessTokenService;
  30. /**
  31. * @var Logger
  32. */
  33. private $logger;
  34. /**
  35. * @param TokenStorageInterface $tokenStorage
  36. * @param AuthenticationManagerInterface $authenticationManager
  37. * @param AccessTokenService $accessTokenService
  38. */
  39. public function __construct(TokenStorageInterface $tokenStorage, AuthenticationManagerInterface $authenticationManager, AccessTokenService $accessTokenService)
  40. {
  41. $this->tokenStorage = $tokenStorage;
  42. $this->authenticationManager = $authenticationManager;
  43. $this->accessTokenService = $accessTokenService;
  44. }
  45. /**
  46. * @param Logger $logger
  47. */
  48. public function setLogger(Logger $logger)
  49. {
  50. $this->logger = $logger;
  51. }
  52. /**
  53. * Se crea el User y Token mediante alguno de los métodos
  54. *
  55. * 1. Http Basic
  56. * 2. Authorization
  57. * 3. Client Ip
  58. * 4. Firewalls
  59. *
  60. * @param GetResponseEvent $event
  61. */
  62. public function handle(GetResponseEvent $event)
  63. {
  64. $request = $event->getRequest();
  65. $messageLog = "";
  66. // verifico si la ip esta bloqueada. Se utiliza la variable API_CIDR_DENY para almacenar las ip o rangos de ip
  67. if (\AuthBundle\Utils\IpUtils::checkIpDeny($request->getClientIp())) {
  68. $messageLog = "Deny IP: " . $request->getClientIp();
  69. $error = true;
  70. } else if (($this->tokenStorage != null &&
  71. $this->tokenStorage->getToken() != null &&
  72. $this->tokenStorage->getToken() instanceof OAuthToken)) {
  73. // como los firewalls comparten info a traves del context no tengo que hacer nada, ya esta logueado.
  74. $messageLog = "Firewalls (IP: " . $request->getClientIp() . ")";
  75. $error = false;
  76. } else if ($request->headers->has("php-auth-user") && $request->headers->has("php-auth-pw")) {
  77. $messageLog = "PHP-AUTH (IP: " . $request->getClientIp() . ")";
  78. // el header contiene php-auth-user && php-auth-pw
  79. $error = !$this->PHPAuth($request);
  80. } elseif ($request->headers->has("authorization")) {
  81. $messageLog = "AUTHORIZATION (IP: " . $request->getClientIp() . ")";
  82. // el header contiene authorization
  83. $error = !$this->PHPAuthorization($request);
  84. } elseif ($request->getClientIp()) {
  85. $messageLog = "AUTHORIZATION (IP: " . $request->getClientIp() . ")";
  86. $error = !$this->clientIp($request);
  87. } else {
  88. $messageLog = "NO REFERENCE. DENY ALL.";
  89. $error = true;
  90. }
  91. if ($error) {
  92. $this->logger->info("ERROR - " . $messageLog);
  93. $this->deny($event);
  94. } else {
  95. $this->logger->info("OK - " . $messageLog);
  96. }
  97. }
  98. /**
  99. * @param GetResponseEvent $event
  100. */
  101. private function deny(GetResponseEvent $event)
  102. {
  103. $this->tokenStorage->setToken(null);
  104. $response = new Response();
  105. $response->setStatusCode(Response::HTTP_FORBIDDEN);
  106. $event->setResponse($response);
  107. echo 'The OAuth authentication failed.' . PHP_EOL;
  108. return;
  109. }
  110. /**
  111. * @param Request $request
  112. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  113. */
  114. private function PHPAuth(Request $request)
  115. {
  116. $username = $request->headers->get("php-auth-user");
  117. $password = $request->headers->get("php-auth-pw");
  118. $token = $this->accessTokenService->getToken($username, $password);
  119. unset($token['user_info']);
  120. $accessToken = $token;
  121. $auth_info = $this->accessTokenService->getUserInfo($username, $password);
  122. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  123. }
  124. /**
  125. * Crea el custom user.
  126. * @param string $username
  127. * @param array $accessToken
  128. * @param array $auth_info
  129. * @return bool Retorna TRUE si pudo crear el CustomOAuthUser
  130. */
  131. private function createCustomOAuthUser(string $username, array $accessToken, array $auth_info)
  132. {
  133. try {
  134. $user = new CustomOAuthUser($username);
  135. if (count($auth_info)) {
  136. $user->setRoles($auth_info['roles']);
  137. $user->setTenancies($auth_info['tenancies']);
  138. $user->setTenancyCurrent($auth_info['tenancyCurrent']);
  139. }
  140. $token = new OAuthToken($accessToken, $user->getRoles());
  141. $token->setUser($user);
  142. $authToken = $this->authenticationManager->authenticate($token);
  143. $this->tokenStorage->setToken($authToken);
  144. return true;
  145. } catch (\Exception $failed) {
  146. var_dump($failed->getMessage());
  147. return false;
  148. }
  149. }
  150. /**
  151. * @param Request $request
  152. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  153. */
  154. private function PHPAuthorization($request)
  155. {
  156. $authorization = $request->headers->get("authorization");
  157. $pieces = explode(' ', $authorization);
  158. $accessToken = array(
  159. 'access_token' => $pieces[1],
  160. );
  161. $auth_info = $this->accessTokenService->requestUserInfo($authorization);
  162. if (isset($auth_info['username'])) {
  163. $username = $auth_info['username'];
  164. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  165. } else {
  166. return false;
  167. }
  168. }
  169. /**
  170. * @param Request $request
  171. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  172. */
  173. private function clientIp($request)
  174. {
  175. $username = $clientIp = $request->getClientIp();
  176. if (\AuthBundle\Utils\IpUtils::checkIp($clientIp) === false) {
  177. return false;
  178. }
  179. // @TODO: Generar access token para el caso de IP valida
  180. $accessToken = array(
  181. 'access_token' => '',
  182. );
  183. $auth_info['roles'] = array('ROLE_USER');
  184. // @TODO: Traer la tenencia Base de la app Base
  185. $tenancy = array(
  186. 'id' => 1,
  187. 'name' => 'Tenencia Base',
  188. );
  189. $auth_info['tenancies'] = $auth_info['tenancyCurrent'] = $tenancy;
  190. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  191. }
  192. }