. /** * User key auth method. * * @package auth_userkey * @copyright 2016 Dmitrii Metelkin (dmitriim@catalyst-au.net) * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ defined('MOODLE_INTERNAL') || die(); use auth_userkey\core_userkey_manager; use auth_userkey\userkey_manager_interface; require_once($CFG->libdir . "/externallib.php"); require_once($CFG->libdir.'/authlib.php'); require_once($CFG->dirroot . '/user/lib.php'); /** * User key authentication plugin. */ class auth_plugin_userkey extends auth_plugin_base { /** * Default mapping field. */ const DEFAULT_MAPPING_FIELD = 'email'; /** * User key manager. * * @var userkey_manager_interface */ protected $userkeymanager; /** * Defaults for config form. * * @var array */ protected $defaults = array( 'mappingfield' => self::DEFAULT_MAPPING_FIELD, 'keylifetime' => 60, 'iprestriction' => 0, 'ipwhitelist' => '', 'redirecturl' => '', 'ssourl' => '', 'createuser' => false, 'updateuser' => false, ); /** * Constructor. */ public function __construct() { $this->authtype = 'userkey'; $this->config = get_config('auth_userkey'); $this->userkeymanager = new core_userkey_manager($this->config); } /** * All the checking happens before the login page in this hook. * * It redirects a user if required or return true. */ public function pre_loginpage_hook() { global $SESSION; // If we previously tried to skip SSO on, but then navigated // away, and come in from another deep link while SSO only is // on, then reset the previous session memory of forcing SSO. if (isset($SESSION->enrolkey_skipsso)) { unset($SESSION->enrolkey_skipsso); } return $this->loginpage_hook(); } /** * All the checking happens before the login page in this hook. * * It redirects a user if required or return true. */ public function loginpage_hook() { if ($this->should_login_redirect()) { $this->redirect($this->config->ssourl); } return true; } /** * Redirects the user to provided URL. * * @param string $url URL to redirect to. * * @throws \moodle_exception If gets running via CLI or AJAX call. */ protected function redirect($url) { if (CLI_SCRIPT || AJAX_SCRIPT) { throw new moodle_exception('redirecterrordetected', 'auth_userkey', '', $url); } redirect($url); } /** * Don't allow login using login form. * * @param string $username The username (with system magic quotes) * @param string $password The password (with system magic quotes) * * @return bool Authentication success or failure. */ public function user_login($username, $password) { return false; } /** * Logs a user in using userkey and redirects after. * * @throws \moodle_exception If something went wrong. */ public function user_login_userkey() { global $SESSION, $CFG, $USER; $keyvalue = required_param('key', PARAM_ALPHANUM); $wantsurl = optional_param('wantsurl', '', PARAM_URL); if (!empty($wantsurl)) { $redirecturl = $wantsurl; } else { $redirecturl = $CFG->wwwroot; } try { $key = $this->userkeymanager->validate_key($keyvalue); } catch (moodle_exception $exception) { // If user is logged in and key is not valid, we'd like to logout a user. if (isloggedin()) { require_logout(); } throw $exception; } if (isloggedin()) { if ($USER->id != $key->userid) { // Logout the current user if it's different to one that associated to the valid key. require_logout(); } else { // Don't process further if the user is already logged in. $this->userkeymanager->delete_keys($key->userid); $this->redirect($redirecturl); } } $this->userkeymanager->delete_keys($key->userid); $user = get_complete_user_data('id', $key->userid); complete_user_login($user); // Identify this session as using user key auth method. $SESSION->userkey = true; $this->redirect($redirecturl); } /** * Don't store local passwords. * * @return bool True. */ public function prevent_local_passwords() { return true; } /** * Returns true if this authentication plugin is external. * * @return bool False. */ public function is_internal() { return false; } /** * The plugin can't change the user's password. * * @return bool False. */ public function can_change_password() { return false; } /** * Set userkey manager. * * This function is the only way to inject dependency, because of the way auth plugins work. * * @param \auth_userkey\userkey_manager_interface $keymanager */ public function set_userkey_manager(userkey_manager_interface $keymanager) { $this->userkeymanager = $keymanager; } /** * Return mapping field to find a lms user. * * @return string */ public function get_mapping_field() { if (isset($this->config->mappingfield) && !empty($this->config->mappingfield)) { return $this->config->mappingfield; } return self::DEFAULT_MAPPING_FIELD; } /** * Check if we need to create a new user. * * @return bool */ protected function should_create_user() { if (isset($this->config->createuser) && $this->config->createuser == true) { return true; } return false; } /** * Check if we need to update users. * * @return bool */ protected function should_update_user() { if (isset($this->config->updateuser) && $this->config->updateuser == true) { return true; } return false; } /** * Check if restriction by IP is enabled. * * @return bool */ protected function is_ip_restriction_enabled() { if (isset($this->config->iprestriction) && $this->config->iprestriction == true) { return true; } return false; } /** * Create a new user. * * @param array $data Validated user data from web service. * * @return object User object. */ protected function create_user(array $data) { global $DB, $CFG; $user = $data; unset($user['ip']); $user['auth'] = 'userkey'; $user['confirmed'] = 1; $user['mnethostid'] = $CFG->mnet_localhost_id; $requiredfieds = ['username', 'email', 'firstname', 'lastname']; $missingfields = []; foreach ($requiredfieds as $requiredfied) { if (empty($user[$requiredfied])) { $missingfields[] = $requiredfied; } } if (!empty($missingfields)) { throw new invalid_parameter_exception('Unable to create user, missing value(s): ' . implode(',', $missingfields)); } if ($DB->record_exists('user', array('username' => $user['username'], 'mnethostid' => $CFG->mnet_localhost_id))) { throw new invalid_parameter_exception('Username already exists: '.$user['username']); } if (!validate_email($user['email'])) { throw new invalid_parameter_exception('Email address is invalid: '.$user['email']); } else if (empty($CFG->allowaccountssameemail) && $DB->record_exists('user', array('email' => $user['email'], 'mnethostid' => $user['mnethostid']))) { throw new invalid_parameter_exception('Email address already exists: '.$user['email']); } $userid = user_create_user($user); return $DB->get_record('user', ['id' => $userid]); } /** * Update an existing user. * * @param stdClass $user Existing user record. * @param array $data Validated user data from web service. * * @return object User object. */ protected function update_user(\stdClass $user, array $data) { global $DB, $CFG; $userdata = $data; unset($userdata['ip']); $userdata['auth'] = 'userkey'; $changed = false; foreach ($userdata as $key => $value) { if ($user->$key != $value) { $changed = true; break; } } if (!$changed) { return $user; } if ( $user->username != $userdata['username'] && $DB->record_exists('user', array('username' => $userdata['username'], 'mnethostid' => $CFG->mnet_localhost_id)) ) { throw new invalid_parameter_exception('Username already exists: '.$userdata['username']); } if (!validate_email($userdata['email'])) { throw new invalid_parameter_exception('Email address is invalid: '.$userdata['email']); } else if ( empty($CFG->allowaccountssameemail) && $user->email != $userdata['email'] && $DB->record_exists('user', array('email' => $userdata['email'], 'mnethostid' => $CFG->mnet_localhost_id)) ) { throw new invalid_parameter_exception('Email address already exists: '.$userdata['email']); } $userdata['id'] = $user->id; $userdata = (object) $userdata; user_update_user($userdata, false); return $DB->get_record('user', ['id' => $user->id]); } /** * Validate user data from web service. * * @param mixed $data User data from web service. * * @return array * * @throws \invalid_parameter_exception If provided data is invalid. */ protected function validate_user_data($data) { $data = (array)$data; $mappingfield = $this->get_mapping_field(); if (!isset($data[$mappingfield]) || empty($data[$mappingfield])) { throw new invalid_parameter_exception('Required field "' . $mappingfield . '" is not set or empty.'); } if ($this->is_ip_restriction_enabled() && !isset($data['ip'])) { throw new invalid_parameter_exception('Required parameter "ip" is not set.'); } return $data; } /** * Return user object. * * @param array $data Validated user data. * * @return object A user object. * * @throws \invalid_parameter_exception If user is not exist and we don't need to create a new. */ protected function get_user(array $data) { global $DB, $CFG; $mappingfield = $this->get_mapping_field(); $params = array( $mappingfield => $data[$mappingfield], 'mnethostid' => $CFG->mnet_localhost_id, ); $user = $DB->get_record('user', $params); if (empty($user)) { if ($this->should_create_user()) { $user = $this->create_user($data); } else { throw new invalid_parameter_exception('User is not exist'); } } else if ($this->should_update_user()) { $user = $this->update_user($user, $data); } return $user; } /** * Return allowed IPs from user data. * * @param array $data Validated user data. * * @return null|string Allowed IPs or null. */ protected function get_allowed_ips(array $data) { if (isset($data['ip']) && !empty($data['ip'])) { return $data['ip']; } return null; } /** * Generate login user key. * * @param array $data Validated user data. * * @return string * @throws \invalid_parameter_exception */ protected function generate_user_key(array $data) { $user = $this->get_user($data); $ips = $this->get_allowed_ips($data); return $this->userkeymanager->create_key($user->id, $ips); } /** * Return login URL. * * @param array|stdClass $data User data from web service. * * @return string Login URL. * * @throws \invalid_parameter_exception */ public function get_login_url($data) { global $CFG; $userdata = $this->validate_user_data($data); $userkey = $this->generate_user_key($userdata); return $CFG->wwwroot . '/auth/userkey/login.php?key=' . $userkey; } /** * Return a list of mapping fields. * * @return array */ public function get_allowed_mapping_fields() { return array( 'username' => get_string('username'), 'email' => get_string('email'), 'idnumber' => get_string('idnumber'), ); } /** * Return a mapping parameter for request_login_url_parameters(). * * @return array */ protected function get_mapping_parameter() { $mappingfield = $this->get_mapping_field(); switch ($mappingfield) { case 'username': $parameter = array( 'username' => new external_value( PARAM_USERNAME, 'Username' ), ); break; case 'email': $parameter = array( 'email' => new external_value( PARAM_EMAIL, 'A valid email address' ), ); break; case 'idnumber': $parameter = array( 'idnumber' => new external_value( PARAM_RAW, 'An arbitrary ID code number perhaps from the institution' ), ); break; default: $parameter = array(); break; } return $parameter; } /** * Return user fields parameters for request_login_url_parameters(). * * @return array */ protected function get_user_fields_parameters() { $parameters = array(); if ($this->is_ip_restriction_enabled()) { $parameters['ip'] = new external_value( PARAM_HOST, 'User IP address' ); } $mappingfield = $this->get_mapping_field(); if ($this->should_create_user() || $this->should_update_user()) { $parameters['firstname'] = new external_value(PARAM_NOTAGS, 'The first name(s) of the user', VALUE_OPTIONAL); $parameters['lastname'] = new external_value(PARAM_NOTAGS, 'The family name of the user', VALUE_OPTIONAL); if ($mappingfield != 'email') { $parameters['email'] = new external_value(PARAM_RAW_TRIMMED, 'A valid and unique email address', VALUE_OPTIONAL); } if ($mappingfield != 'username') { $parameters['username'] = new external_value(PARAM_USERNAME, 'A valid and unique username', VALUE_OPTIONAL); } } return $parameters; } /** * Return parameters for request_login_url_parameters(). * * @return array */ public function get_request_login_url_user_parameters() { $parameters = array_merge($this->get_mapping_parameter(), $this->get_user_fields_parameters()); return $parameters; } /** * Check if we should redirect a user as part of login. * * @return bool */ protected function should_login_redirect() { global $SESSION; $skipsso = optional_param('enrolkey_skipsso', 0, PARAM_BOOL); // Check whether we've skipped SSO already. // This is here because loginpage_hook is called again during form // submission (all of login.php is processed) and ?skipsso=on is not // preserved forcing us to the SSO. if ((isset($SESSION->enrolkey_skipsso) && $SESSION->enrolkey_skipsso == 1)) { return false; } $SESSION->enrolkey_skipsso = $skipsso; // If SSO only is set and user is not passing the skip param // or has it already set in their session then redirect to the SSO URL. if (isset($this->config->ssourl) && $this->config->ssourl != '' && !$skipsso) { return true; } } /** * Check if we should redirect a user after logout. * * @return bool */ protected function should_logout_redirect() { global $SESSION; if (!isset($SESSION->userkey)) { return false; } if (!isset($this->config->redirecturl)) { return false; } if (empty($this->config->redirecturl)) { return false; } return true; } /** * Logout page hook. * * Override redirect URL after logout. * * @see auth_plugin_base::logoutpage_hook() */ public function logoutpage_hook() { global $redirect; if ($this->should_logout_redirect()) { $redirect = $this->config->redirecturl; } } /** * Log out user and redirect. */ public function user_logout_userkey() { global $CFG, $USER; $redirect = required_param('return', PARAM_URL); // We redirect when user's session in Moodle already has expired // or the user is still logged in using "userkey" auth type. if (!isloggedin() || $USER->auth == 'userkey') { require_logout(); $this->redirect($redirect); } else { // If logged in with different auth type, then display an error. throw new moodle_exception('incorrectlogout', 'auth_userkey', $CFG->wwwroot); } } }