OAuthProxyListener.php 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. <?php
  2. namespace AuthBundle\Security\Firewall;
  3. use AuthBundle\Services\AccessTokenService;
  4. use Base\OAuthClientBundle\Security\Core\User\CustomOAuthUser;
  5. use HWI\Bundle\OAuthBundle\Security\Core\Authentication\Token\OAuthToken;
  6. use Monolog\Logger;
  7. use Symfony\Component\HttpFoundation\Response;
  8. use Symfony\Component\HttpKernel\Event\GetResponseEvent;
  9. use Symfony\Component\Security\Core\Authentication\AuthenticationManagerInterface;
  10. use Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorageInterface;
  11. use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken;
  12. use Symfony\Component\Security\Core\Exception\AuthenticationException;
  13. use Symfony\Component\Security\Core\Exception\BadCredentialsException;
  14. use Symfony\Component\Security\Http\Firewall\ListenerInterface;
  15. use Symfony\Component\HttpFoundation\Request;
  16. class OAuthProxyListener implements ListenerInterface
  17. {
  18. /**
  19. * @var TokenStorageInterface
  20. */
  21. protected $tokenStorage;
  22. /**
  23. * @var AuthenticationManagerInterface
  24. */
  25. protected $authenticationManager;
  26. /**
  27. * @var AccessTokenService
  28. */
  29. protected $accessTokenService;
  30. /**
  31. * @var Logger
  32. */
  33. private $logger;
  34. /**
  35. * @param TokenStorageInterface $tokenStorage
  36. * @param AuthenticationManagerInterface $authenticationManager
  37. * @param AccessTokenService $accessTokenService
  38. */
  39. public function __construct(TokenStorageInterface $tokenStorage, AuthenticationManagerInterface $authenticationManager, AccessTokenService $accessTokenService)
  40. {
  41. $this->tokenStorage = $tokenStorage;
  42. $this->authenticationManager = $authenticationManager;
  43. $this->accessTokenService = $accessTokenService;
  44. }
  45. /**
  46. * @param Logger $logger
  47. */
  48. public function setLogger(Logger $logger)
  49. {
  50. $this->logger = $logger;
  51. }
  52. /**
  53. * Se crea el User y Token mediante alguno de los métodos
  54. *
  55. * 1. Http Basic
  56. * 2. Authorization
  57. * 3. Client Ip
  58. * 4. Firewalls
  59. *
  60. * @param GetResponseEvent $event
  61. * @return type
  62. *
  63. */
  64. public function handle(GetResponseEvent $event)
  65. {
  66. $request = $event->getRequest();
  67. $messageLog = "";
  68. // verifico si la ip esta bloqueada. Se utiliza la variable API_CIDR_DENY para almacenar las ip o rangos de ip
  69. if (\AuthBundle\Utils\IpUtils::checkIpDeny($request->getClientIp())) {
  70. $messageLog = "Deny IP: " . $request->getClientIp();
  71. $error = true;
  72. } else if (($this->tokenStorage != null &&
  73. $this->tokenStorage->getToken() != null &&
  74. $this->tokenStorage->getToken() instanceof OAuthToken)) {
  75. // como los firewalls comparten info a traves del context no tengo que hacer nada, ya esta logueado.
  76. $messageLog = "Firewalls (IP: " . $request->getClientIp() . ")";
  77. $error = false;
  78. } else if ($request->headers->has("php-auth-user") && $request->headers->has("php-auth-pw")) {
  79. $messageLog = "PHP-AUTH (IP: " . $request->getClientIp() . ")";
  80. // el header contiene php-auth-user && php-auth-pw
  81. $error = !$this->PHPAuth($request);
  82. } else if($request->headers->has("microservice") && $request->headers->has("authorization")){
  83. $messageLog = "AUTHORIZATION A (IP: " . $request->getClientIp() . ")";
  84. $error = !$this->PHPMicroservice($request);
  85. } elseif ($request->headers->has("authorization") && !$request->headers->has("microservice")) {
  86. $messageLog = "AUTHORIZATION A (IP: " . $request->getClientIp() . ")";
  87. // el header contiene authorization
  88. $error = !$this->PHPAuthorization($request);
  89. } elseif ($request->getClientIp()) {
  90. $messageLog = "AUTHORIZATION B (IP: " . $request->getClientIp() . ")";
  91. $error = !$this->clientIp($request);
  92. } else {
  93. $messageLog = "NO REFERENCE. DENY ALL.";
  94. $error = true;
  95. }
  96. if ($error) {
  97. $this->logger->info("ERROR - " . $messageLog);
  98. $this->deny($event);
  99. } else {
  100. $this->logger->info("OK - " . $messageLog);
  101. }
  102. }
  103. /**
  104. * @param GetResponseEvent $event
  105. */
  106. private function deny(GetResponseEvent $event)
  107. {
  108. $this->tokenStorage->setToken(null);
  109. $response = new Response();
  110. $response->setStatusCode(Response::HTTP_FORBIDDEN);
  111. $event->setResponse($response);
  112. echo 'The OAuth authentication failed.' . PHP_EOL;
  113. return;
  114. }
  115. /**
  116. * @param Request $request
  117. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  118. */
  119. private function PHPAuth(Request $request)
  120. {
  121. $username = $request->headers->get("php-auth-user");
  122. $password = $request->headers->get("php-auth-pw");
  123. $token = $this->accessTokenService->getToken($username, $password);
  124. unset($token['user_info']);
  125. $accessToken = $token;
  126. $auth_info = $this->accessTokenService->getUserInfo($username, $password);
  127. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  128. }
  129. /**
  130. * @param Request $request
  131. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  132. */
  133. private function PHPMicroservice($request)
  134. {
  135. $authorization = $request->headers->get("authorization");
  136. $clientId = $request->headers->get('clientid');
  137. $clientSecret = $request->headers->get('clientsecret');
  138. $pieces = explode(' ', $authorization);
  139. $accessToken = array(
  140. 'access_token' => $pieces[1],
  141. );
  142. if(getenv('OAUTH_CLIENT_ID') != $clientId || getenv('OAUTH_CLIENT_SECRET') != $clientSecret){
  143. return false;
  144. }
  145. $auth_info = [
  146. 'username' => 'Microservice',
  147. 'roles' => [
  148. 'ROLE_USER'
  149. ],
  150. 'hasIntercom' => false,
  151. 'tenancyCurrent' => null,
  152. 'tenancies' => []
  153. ];
  154. if (isset($auth_info['username'])) {
  155. $username = $auth_info['username'];
  156. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  157. } else {
  158. return false;
  159. }
  160. }
  161. /**
  162. * Crea el custom user.
  163. * @param string $username
  164. * @param array $accessToken
  165. * @param array $auth_info
  166. * @return bool Retorna TRUE si pudo crear el CustomOAuthUser
  167. */
  168. private function createCustomOAuthUser(string $username, array $accessToken, array $auth_info)
  169. {
  170. try {
  171. $user = new CustomOAuthUser($username);
  172. if (count($auth_info)) {
  173. $user->setRoles($auth_info['roles']);
  174. $user->setTenancies($auth_info['tenancies']);
  175. $user->setTenancyCurrent($auth_info['tenancyCurrent']);
  176. $user->setHasIntercom($auth_info['hasIntercom']);
  177. }
  178. $token = new OAuthToken($accessToken, $user->getRoles());
  179. $token->setUser($user);
  180. $authToken = $this->authenticationManager->authenticate($token);
  181. $this->tokenStorage->setToken($authToken);
  182. return true;
  183. } catch (\Exception $failed) {
  184. //var_dump($failed->getMessage());
  185. return false;
  186. }
  187. }
  188. /**
  189. * @param Request $request
  190. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  191. */
  192. private function PHPAuthorization($request)
  193. {
  194. $authorization = $request->headers->get("authorization");
  195. $pieces = explode(' ', $authorization);
  196. $accessToken = array(
  197. 'access_token' => $pieces[1],
  198. );
  199. $auth_info = $this->accessTokenService->requestUserInfo($authorization);
  200. if (isset($auth_info['username'])) {
  201. $username = $auth_info['username'];
  202. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  203. } else {
  204. return false;
  205. }
  206. }
  207. /**
  208. * @param Request $request
  209. * @return bool Retorna TRUE si pudo crear y setear el CustomOAuthUser
  210. */
  211. private function clientIp($request)
  212. {
  213. $username = $clientIp = $request->getClientIp();
  214. if (\AuthBundle\Utils\IpUtils::checkIp($clientIp) === false) {
  215. return false;
  216. }
  217. // @TODO: Generar access token para el caso de IP valida
  218. $accessToken = array(
  219. 'access_token' => '',
  220. );
  221. $auth_info['roles'] = array('ROLE_USER');
  222. // @TODO: Traer la tenencia Base de la app Base
  223. $filter = $request->query->get('filters');
  224. if(isset($filter['tenancyId']) && $filter['tenancyId'] != 1) {
  225. $tenancy = array(
  226. array('id' => 1,'name' => 'Tenencia Base',),
  227. array('id' => (int) $filter['tenancyId'], 'name' => 'Tenancy Fix'));
  228. } else {
  229. $tenancy = array(array(
  230. 'id' => 1,
  231. 'name' => 'Tenencia Base',
  232. ));
  233. }
  234. $auth_info['tenancies'] = $tenancy;
  235. $auth_info['tenancyCurrent'] = end($tenancy);
  236. return $this->createCustomOAuthUser($username, $accessToken, $auth_info);
  237. }
  238. }