OAuthProxyListener.php 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. <?php
  2. namespace AuthBundle\Security\Firewall;
  3. use AuthBundle\Services\AccessTokenService;
  4. use Base\OAuthClientBundle\Security\Core\User\CustomOAuthUser;
  5. use HWI\Bundle\OAuthBundle\Security\Core\Authentication\Token\OAuthToken;
  6. use Monolog\Logger;
  7. use Symfony\Component\HttpFoundation\Response;
  8. use Symfony\Component\HttpKernel\Event\GetResponseEvent;
  9. use Symfony\Component\Security\Core\Authentication\AuthenticationManagerInterface;
  10. use Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorageInterface;
  11. use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken;
  12. use Symfony\Component\Security\Core\Exception\AuthenticationException;
  13. use Symfony\Component\Security\Core\Exception\BadCredentialsException;
  14. use Symfony\Component\Security\Http\Firewall\ListenerInterface;
  15. use Symfony\Component\HttpFoundation\Request;
  16. class OAuthProxyListener implements ListenerInterface
  17. {
  18. /**
  19. * @var TokenStorageInterface
  20. */
  21. protected $tokenStorage;
  22. /**
  23. * @var AuthenticationManagerInterface
  24. */
  25. protected $authenticationManager;
  26. /**
  27. * @var AccessTokenService
  28. */
  29. protected $accessTokenService;
  30. /**
  31. * @var Logger
  32. */
  33. private $logger;
  34. /**
  35. * @param TokenStorageInterface $tokenStorage
  36. * @param AuthenticationManagerInterface $authenticationManager
  37. * @param AccessTokenService $accessTokenService
  38. */
  39. public function __construct(TokenStorageInterface $tokenStorage, AuthenticationManagerInterface $authenticationManager, AccessTokenService $accessTokenService)
  40. {
  41. $this->tokenStorage = $tokenStorage;
  42. $this->authenticationManager = $authenticationManager;
  43. $this->accessTokenService = $accessTokenService;
  44. }
  45. /**
  46. * @param Logger $logger
  47. */
  48. public function setLogger(Logger $logger)
  49. {
  50. $this->logger = $logger;
  51. }
  52. /**
  53. * Se crea el User y Token mediante alguno de los métodos
  54. *
  55. * 1. Http Basic
  56. * 2. Authorization
  57. * 3. Client Ip
  58. * 4. Firewalls
  59. *
  60. * @param GetResponseEvent $event
  61. * @return type
  62. *
  63. */
  64. public function handle(GetResponseEvent $event)
  65. {
  66. $request = $event->getRequest();
  67. $messageLog = "";
  68. // verifico si la ip esta bloqueada. Se utiliza la variable API_CIDR_DENY para almacenar las ip o rangos de ip
  69. if (\AuthBundle\Utils\IpUtils::checkIpDeny($request->getClientIp())) {
  70. $messageLog = "Deny IP: " . $request->getClientIp();
  71. $error = true;
  72. } else if (($this->tokenStorage != null &&
  73. $this->tokenStorage->getToken() != null &&
  74. $this->tokenStorage->getToken() instanceof OAuthToken)) {
  75. // como los firewalls comparten info a traves del context no tengo que hacer nada, ya esta logueado.
  76. $messageLog = "Firewalls (IP: " . $request->getClientIp() . ")";
  77. $error = false;
  78. } else if ($request->headers->has("php-auth-user") && $request->headers->has("php-auth-pw")) {
  79. $messageLog = "PHP-AUTH (IP: " . $request->getClientIp() . ")";
  80. // el header contiene php-auth-user && php-auth-pw
  81. $error = !$this->PHPAuth($request);
  82. } elseif ($request->headers->has("authorization")) {
  83. $messageLog = "AUTHORIZATION A (IP: " . $request->getClientIp() . ")";
  84. // el header contiene authorization
  85. $error = !$this->PHPAuthorization($request);
  86. } elseif ($request->getClientIp()) {
  87. $messageLog = "AUTHORIZATION B (IP: " . $request->getClientIp() . ")";
  88. $error = !$this->clientIp($request);
  89. } else {
  90. $messageLog = "NO REFERENCE. DENY ALL.";
  91. $error = true;
  92. }
  93. if ($error) {
  94. $this->logger->info("ERROR - " . $messageLog);
  95. $this->deny($event);
  96. } else {
  97. $this->logger->info("OK - " . $messageLog);
  98. }
  99. }
  100. /**
  101. * @param GetResponseEvent $event
  102. */
  103. private function deny(GetResponseEvent $event)
  104. {
  105. $this->tokenStorage->setToken(null);
  106. $response = new Response();
  107. $response->setStatusCode(Response::HTTP_FORBIDDEN);
  108. $event->setResponse($response);
  109. echo 'The OAuth authentication failed.' . PHP_EOL;
  110. return;
  111. }
  112. /**
  113. * @param Request $request
  114. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  115. */
  116. private function PHPAuth(Request $request)
  117. {
  118. $username = $request->headers->get("php-auth-user");
  119. $password = $request->headers->get("php-auth-pw");
  120. $token = $this->accessTokenService->getToken($username, $password);
  121. unset($token['user_info']);
  122. $accessToken = $token;
  123. $auth_info = $this->accessTokenService->getUserInfo($username, $password);
  124. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  125. }
  126. /**
  127. * Crea el custom user.
  128. * @param string $username
  129. * @param array $accessToken
  130. * @param array $auth_info
  131. * @return bool Retorna TRUE si pudo crear el CustomOAuthUser
  132. */
  133. private function createCustomOAuthUser(string $username, array $accessToken, array $auth_info)
  134. {
  135. try {
  136. $user = new CustomOAuthUser($username);
  137. if (count($auth_info)) {
  138. $user->setRoles($auth_info['roles']);
  139. $user->setTenancies($auth_info['tenancies']);
  140. $user->setTenancyCurrent($auth_info['tenancyCurrent']);
  141. $user->setHasIntercom($auth_info['hasIntercom']);
  142. }
  143. $token = new OAuthToken($accessToken, $user->getRoles());
  144. $token->setUser($user);
  145. $authToken = $this->authenticationManager->authenticate($token);
  146. $this->tokenStorage->setToken($authToken);
  147. return true;
  148. } catch (\Exception $failed) {
  149. //var_dump($failed->getMessage());
  150. return false;
  151. }
  152. }
  153. /**
  154. * @param Request $request
  155. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  156. */
  157. private function PHPAuthorization($request)
  158. {
  159. $authorization = $request->headers->get("authorization");
  160. $pieces = explode(' ', $authorization);
  161. $accessToken = array(
  162. 'access_token' => $pieces[1],
  163. );
  164. $auth_info = $this->accessTokenService->requestUserInfo($authorization);
  165. if (isset($auth_info['username'])) {
  166. $username = $auth_info['username'];
  167. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  168. } else {
  169. return false;
  170. }
  171. }
  172. /**
  173. * @param Request $request
  174. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  175. */
  176. private function clientIp($request)
  177. {
  178. $username = $clientIp = $request->getClientIp();
  179. if (\AuthBundle\Utils\IpUtils::checkIp($clientIp) === false) {
  180. return false;
  181. }
  182. // @TODO: Generar access token para el caso de IP valida
  183. $accessToken = array(
  184. 'access_token' => '',
  185. );
  186. $auth_info['roles'] = array('ROLE_USER');
  187. // @TODO: Traer la tenencia Base de la app Base
  188. $filter = $request->query->get('filters');
  189. if(isset($filter['tenancyId']) && $filter['tenancyId'] != 1) {
  190. $tenancy = array(
  191. array('id' => 1,'name' => 'Tenencia Base',),
  192. array('id' => (int) $filter['tenancyId'], 'name' => 'Tenancy Fix'));
  193. } else {
  194. $tenancy = array(array(
  195. 'id' => 1,
  196. 'name' => 'Tenencia Base',
  197. ));
  198. }
  199. $auth_info['tenancies'] = $tenancy;
  200. $auth_info['tenancyCurrent'] = end($tenancy);
  201. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  202. }
  203. }