moodle-auth_jwt/auth.php

541 lines
14 KiB
PHP
Raw Normal View History

2016-08-16 04:46:33 +00:00
<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
/**
* User key auth method.
*
* @package auth_userkey
* @copyright 2016 Dmitrii Metelkin (dmitriim@catalyst-au.net)
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
*/
defined('MOODLE_INTERNAL') || die();
use auth_userkey\core_userkey_manager;
use auth_userkey\userkey_manager_interface;
require_once($CFG->libdir . "/externallib.php");
2016-08-16 04:46:33 +00:00
require_once($CFG->libdir.'/authlib.php');
/**
2016-08-19 03:03:55 +00:00
* User key authentication plugin.
2016-08-16 04:46:33 +00:00
*/
class auth_plugin_userkey extends auth_plugin_base {
2016-08-17 06:02:11 +00:00
/**
* Default mapping field.
*/
const DEFAULT_MAPPING_FIELD = 'email';
2016-08-17 06:02:11 +00:00
/**
* User key manager.
*
* @var userkey_manager_interface
*/
2016-08-18 04:43:57 +00:00
protected $userkeymanager;
/**
* Defaults for config form.
*
* @var array
*/
protected $defaults = array(
'mappingfield' => self::DEFAULT_MAPPING_FIELD,
'keylifetime' => 60,
'iprestriction' => 0,
2016-08-19 00:49:38 +00:00
'redirecturl' => '',
'ssourl' => '',
2016-08-18 13:30:58 +00:00
// TODO: use this field when implementing user creation. 'createuser' => 0.
2016-08-18 04:43:57 +00:00
);
2016-08-16 04:46:33 +00:00
/**
* Constructor.
*/
public function __construct() {
$this->authtype = 'userkey';
$this->config = get_config('auth_userkey');
$this->userkeymanager = new core_userkey_manager($this->config);
2016-08-16 04:46:33 +00:00
}
/**
* All the checking happens before the login page in this hook
*/
public function pre_loginpage_hook() {
global $SESSION;
// If we previously tried to skip SSO on, but then navigated
// away, and come in from another deep link while SSO only is
// on, then reset the previous session memory of forcing SSO.
if (isset($SESSION->enrolkey_skipsso)) {
unset($SESSION->enrolkey_skipsso);
}
$this->loginpage_hook();
}
/**
* All the checking happens before the login page in this hook
*/
public function loginpage_hook() {
if ($this->should_login_redirect()) {
redirect($this->config->ssourl);
}
}
2016-08-16 04:46:33 +00:00
/**
* Don't allow login using login form.
*
* @param string $username The username (with system magic quotes)
* @param string $password The password (with system magic quotes)
*
* @return bool Authentication success or failure.
*/
public function user_login($username, $password) {
return false;
}
2016-08-18 06:10:18 +00:00
/**
* Login user using userkey and return URL to redirect after.
2016-08-18 06:10:18 +00:00
*
* @return string URL to redirect.
*
* @throws \moodle_exception If something went wrong.
2016-08-18 06:10:18 +00:00
*/
public function user_login_userkey() {
global $SESSION, $CFG;
2016-08-18 06:10:18 +00:00
$keyvalue = required_param('key', PARAM_ALPHANUM);
$wantsurl = optional_param('wantsurl', '', PARAM_URL);
2016-08-18 06:10:18 +00:00
$key = $this->userkeymanager->validate_key($keyvalue);
$this->userkeymanager->delete_keys($key->userid);
2016-08-18 06:10:18 +00:00
$user = get_complete_user_data('id', $key->userid);
2016-08-18 06:10:18 +00:00
complete_user_login($user);
2016-08-19 01:54:39 +00:00
// Identify this session as using user key auth method.
$SESSION->userkey = true;
2016-08-18 06:10:18 +00:00
if (!empty($wantsurl)) {
return $wantsurl;
2016-08-18 06:10:18 +00:00
} else {
return $CFG->wwwroot;
2016-08-18 06:10:18 +00:00
}
}
2016-08-16 04:46:33 +00:00
/**
* Don't store local passwords.
*
* @return bool True.
*/
public function prevent_local_passwords() {
return true;
}
/**
* Returns true if this authentication plugin is external.
*
* @return bool False.
*/
public function is_internal() {
return false;
}
/**
* The plugin can't change the user's password.
*
* @return bool False.
*/
public function can_change_password() {
return false;
}
2016-08-18 04:43:57 +00:00
/**
* Prints a form for configuring this authentication plugin.
*
* This function is called from admin/auth.php, and outputs a full page with
* a form for configuring this plugin.
*
* @param object $config
* @param object $err
2016-08-18 13:30:58 +00:00
* @param array $userfields
2016-08-18 04:43:57 +00:00
*/
2016-08-18 13:30:58 +00:00
public function config_form($config, $err, $userfields) {
2016-08-19 00:49:38 +00:00
global $CFG, $OUTPUT;
2016-08-27 11:19:58 +00:00
$config = (object) array_merge($this->defaults, (array) $config);
2016-08-18 04:43:57 +00:00
include("settings.html");
}
/**
* A chance to validate form data, and last chance to
* do stuff before it is inserted in config_plugin
*
* @param object $form with submitted configuration settings (without system magic quotes)
* @param array $err array of error messages
*
* @return array of any errors
*/
public function validate_form($form, &$err) {
if ((int)$form->keylifetime == 0) {
$err['keylifetime'] = get_string('incorrectkeylifetime', 'auth_userkey');
2016-08-18 04:43:57 +00:00
}
2016-08-19 00:49:38 +00:00
if (!empty($form->redirecturl) && filter_var($form->redirecturl, FILTER_VALIDATE_URL) === false) {
$err['redirecturl'] = get_string('incorrectredirecturl', 'auth_userkey');
}
2016-08-18 04:43:57 +00:00
}
/**
* Process and stores configuration data for this authentication plugin.
*
* @param object $config Config object from the form.
*
* @return bool
*/
public function process_config($config) {
foreach ($this->defaults as $key => $value) {
if (!isset($this->config->$key) || $config->$key != $this->config->$key) {
set_config($key, $config->$key, 'auth_userkey');
}
}
return true;
}
/**
2016-08-17 06:02:11 +00:00
* Set userkey manager.
*
* This function is the only way to inject dependency, because of the way auth plugins work.
*
* @param \auth_userkey\userkey_manager_interface $keymanager
*/
public function set_userkey_manager(userkey_manager_interface $keymanager) {
$this->userkeymanager = $keymanager;
}
/**
2016-08-17 06:02:11 +00:00
* Return mapping field to find a lms user.
*
* @return string
*/
public function get_mapping_field() {
if (isset($this->config->mappingfield) && !empty($this->config->mappingfield)) {
return $this->config->mappingfield;
}
return self::DEFAULT_MAPPING_FIELD;
}
2016-08-17 06:02:11 +00:00
/**
* Check if we need to create a new user.
*
* @return bool
*/
protected function should_create_user() {
2016-08-27 11:19:58 +00:00
if (isset($this->config->createuser) && $this->config->createuser == true) {
return true;
2016-08-17 06:02:11 +00:00
}
return false;
}
2016-08-19 06:01:08 +00:00
/**
* Check if restriction by IP is enabled.
*
* @return bool
*/
2016-08-27 11:19:58 +00:00
protected function is_ip_restriction_enabled() {
2016-08-19 06:01:08 +00:00
if (isset($this->config->iprestriction) && $this->config->iprestriction == true) {
return true;
}
return false;
}
2016-08-17 06:02:11 +00:00
/**
* Create a new user.
2016-08-27 11:19:58 +00:00
*
* @param array $data Validated user data from web service.
*
* @return object User object.
2016-08-17 06:02:11 +00:00
*/
2016-08-27 11:19:58 +00:00
protected function create_user(array $data) {
2016-08-17 06:02:11 +00:00
// TODO:
// 1. Validate user
// 2. Create user.
// 3. Throw exception if something went wrong.
}
/**
2016-08-27 11:19:58 +00:00
* Validate user data from web service.
2016-08-17 06:02:11 +00:00
*
2016-08-27 11:19:58 +00:00
* @param mixed $data User data from web service.
2016-08-17 06:02:11 +00:00
*
2016-08-27 11:19:58 +00:00
* @return array
2016-08-17 06:02:11 +00:00
*
2016-08-27 11:19:58 +00:00
* @throws \invalid_parameter_exception If provided data is invalid.
2016-08-17 06:02:11 +00:00
*/
2016-08-27 11:19:58 +00:00
protected function validate_user_data($data) {
2016-08-19 06:01:08 +00:00
$data = (array)$data;
2016-08-27 11:19:58 +00:00
$mappingfield = $this->get_mapping_field();
2016-08-19 06:01:08 +00:00
if (!isset($data[$mappingfield]) || empty($data[$mappingfield])) {
2016-08-17 06:02:11 +00:00
throw new invalid_parameter_exception('Required field "' . $mappingfield . '" is not set or empty.');
}
2016-08-27 11:19:58 +00:00
if ($this->is_ip_restriction_enabled() && !isset($data['ip'])) {
2016-08-19 06:01:08 +00:00
throw new invalid_parameter_exception('Required parameter "ip" is not set.');
}
2016-08-27 11:19:58 +00:00
return $data;
}
/**
* Return user object.
*
* @param array $data Validated user data.
*
* @return object A user object.
*
* @throws \invalid_parameter_exception If user is not exist and we don't need to create a new.
*/
protected function get_user(array $data) {
global $DB, $CFG;
$mappingfield = $this->get_mapping_field();
2016-08-17 06:02:11 +00:00
$params = array(
2016-08-19 06:01:08 +00:00
$mappingfield => $data[$mappingfield],
2016-08-17 06:02:11 +00:00
'mnethostid' => $CFG->mnet_localhost_id,
);
$user = $DB->get_record('user', $params);
if (empty($user)) {
2016-08-27 11:19:58 +00:00
if ($this->should_create_user()) {
$user = $this->create_user($data);
2016-08-17 06:02:11 +00:00
} else {
2016-08-27 11:19:58 +00:00
throw new invalid_parameter_exception('User is not exist');
2016-08-17 06:02:11 +00:00
}
}
2016-08-27 11:19:58 +00:00
return $user;
}
/**
* Return allowed IPs from user data.
*
* @param array $data Validated user data.
*
* @return null|string Allowed IPs or null.
*/
protected function get_allowed_ips(array $data) {
if (isset($data['ip']) && !empty($data['ip'])) {
return $data['ip'];
}
return null;
}
/**
* Generate login user key.
*
* @param array $data Validated user data.
*
* @return string
* @throws \invalid_parameter_exception
*/
protected function generate_user_key(array $data) {
$user = $this->get_user($data);
$ips = $this->get_allowed_ips($data);
return $this->userkeymanager->create_key($user->id, $ips);
}
/**
* Return login URL.
*
* @param array|stdClass $data User data from web service.
*
* @return string Login URL.
*
* @throws \invalid_parameter_exception
*/
public function get_login_url($data) {
global $CFG;
$userdata = $this->validate_user_data($data);
$userkey = $this->generate_user_key($userdata);
2016-08-17 06:02:11 +00:00
return $CFG->wwwroot . '/auth/userkey/login.php?key=' . $userkey;
}
/**
* Return a list of mapping fields.
*
* @return array
*/
public function get_allowed_mapping_fields() {
return array(
2016-08-18 04:43:57 +00:00
'username' => get_string('username'),
'email' => get_string('email'),
'idnumber' => get_string('idnumber'),
);
}
/**
* Return a mapping parameter for request_login_url_parameters().
*
* @return array
*/
protected function get_mapping_parameter() {
$mappingfield = $this->get_mapping_field();
switch ($mappingfield) {
case 'username':
$parameter = array(
'username' => new external_value(
PARAM_USERNAME,
'Username'
),
);
break;
case 'email':
$parameter = array(
'email' => new external_value(
PARAM_EMAIL,
'A valid email address'
),
);
break;
case 'idnumber':
$parameter = array(
'idnumber' => new external_value(
PARAM_RAW,
'An arbitrary ID code number perhaps from the institution'
),
);
break;
default:
$parameter = array();
break;
}
return $parameter;
}
/**
* Return user fields parameters for request_login_url_parameters().
*
* @return array
*/
protected function get_user_fields_parameters() {
2016-08-19 06:01:08 +00:00
$parameters = array();
2016-08-27 11:19:58 +00:00
if ($this->is_ip_restriction_enabled()) {
2016-08-19 06:01:08 +00:00
$parameters['ip'] = new external_value(
PARAM_HOST,
'User IP address'
);
}
// TODO: add more fields here when we implement user creation.
2016-08-19 06:01:08 +00:00
return $parameters;
}
/**
* Return parameters for request_login_url_parameters().
*
* @return array
*/
public function get_request_login_url_user_parameters() {
$parameters = array_merge($this->get_mapping_parameter(), $this->get_user_fields_parameters());
return $parameters;
}
2016-08-19 01:54:39 +00:00
/**
* Check if we should redirect a user as part of login.
*
* @return bool
*/
public function should_login_redirect() {
global $SESSION;
$skipsso = optional_param('enrolkey_skipsso', 0, PARAM_BOOL);
// Check whether we've skipped SSO already.
// This is here because loginpage_hook is called again during form
// submission (all of login.php is processed) and ?skipsso=on is not
// preserved forcing us to the SSO.
if ((isset($SESSION->enrolkey_skipsso) && $SESSION->enrolkey_skipsso == 1)) {
return false;
}
$SESSION->enrolkey_skipsso = $skipsso;
// If SSO only is set and user is not passing the skip param
// or has it already set in their session then redirect to the SSO URL.
if (isset($this->config->ssourl) && $this->config->ssourl != '' && !$skipsso) {
return true;
}
}
2016-08-19 02:13:47 +00:00
/**
* Check if we should redirect a user after logout.
*
* @return bool
*/
protected function should_logout_redirect() {
2016-08-19 02:13:47 +00:00
global $SESSION;
if (!isset($SESSION->userkey)) {
return false;
}
if (!isset($this->config->redirecturl)) {
return false;
}
if (empty($this->config->redirecturl)) {
return false;
}
return true;
}
2016-08-19 01:54:39 +00:00
/**
* Logout page hook.
*
* Override redirect URL after logout.
*
* @see auth_plugin_base::logoutpage_hook()
*/
public function logoutpage_hook() {
2016-08-19 02:13:47 +00:00
global $redirect;
2016-08-19 01:54:39 +00:00
if ($this->should_logout_redirect()) {
2016-08-19 01:54:39 +00:00
$redirect = $this->config->redirecturl;
}
}
2016-08-16 04:46:33 +00:00
}