mediawiki-extensions-OATHAuth/src/OATHUserRepository.php
libraryupgrader 5b1a07906a build: Updating mediawiki/mediawiki-codesniffer to 29.0.0
The following sniffs are failing and were disabled:
* MediaWiki.Commenting.FunctionComment.MissingDocumentationPrivate
* MediaWiki.Commenting.FunctionComment.MissingParamName
* MediaWiki.Commenting.FunctionComment.MissingParamTag
* MediaWiki.Commenting.FunctionComment.MissingReturn

Additional changes:
* Also sorted "composer fix" command to run phpcbf last.

Change-Id: Idb1b91244e653b2ba2e27bceb3eba769577124a9
2020-01-14 08:27:31 +00:00

228 lines
5.7 KiB
PHP

<?php
/**
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
* http://www.gnu.org/copyleft/gpl.html
*/
namespace MediaWiki\Extension\OATHAuth;
use BagOStuff;
use CentralIdLookup;
use ConfigException;
use FormatJson;
use MediaWiki\Logger\LoggerFactory;
use MWException;
use Psr\Log\LoggerInterface;
use RequestContext;
use stdClass;
use User;
use Wikimedia\Rdbms\DBConnRef;
use Wikimedia\Rdbms\ILoadBalancer;
class OATHUserRepository {
/** @var ILoadBalancer */
protected $lb;
/** @var BagOStuff */
protected $cache;
/**
* @var OATHAuth
*/
protected $auth;
/** @var LoggerInterface */
private $logger;
/**
* OATHUserRepository constructor.
* @param ILoadBalancer $lb
* @param BagOStuff $cache
* @param OATHAuth $auth
*/
public function __construct( ILoadBalancer $lb, BagOStuff $cache, OATHAuth $auth ) {
$this->lb = $lb;
$this->cache = $cache;
$this->auth = $auth;
$this->setLogger( LoggerFactory::getInstance( 'authentication' ) );
}
/**
* @param LoggerInterface $logger
*/
public function setLogger( LoggerInterface $logger ) {
$this->logger = $logger;
}
/**
* @param User $user
* @return OATHUser
* @throws \ConfigException
* @throws \MWException
*/
public function findByUser( User $user ) {
$oathUser = $this->cache->get( $user->getName() );
if ( !$oathUser ) {
$oathUser = new OATHUser( $user, [] );
$uid = CentralIdLookup::factory()->centralIdFromLocalUser( $user );
$res = $this->getDB( DB_REPLICA )->selectRow(
'oathauth_users',
'*',
[ 'id' => $uid ],
__METHOD__
);
if ( $res ) {
$data = $res->data;
$moduleKey = $res->module;
if ( $this->isLegacy( $res ) ) {
$module = $this->auth->getModuleByKey( 'totp' );
$data = $this->checkAndResolveLegacy( $data, $res );
} else {
$module = $this->auth->getModuleByKey( $moduleKey );
}
if ( $module === null ) {
// For sanity
throw new MWException( 'oathauth-module-invalid' );
}
$oathUser->setModule( $module );
$decodedData = FormatJson::decode( $res->data, true );
if ( !isset( $decodedData['keys'] ) && $module->getName() === 'totp' ) {
// Legacy single-key setup
$key = $module->newKey( $decodedData );
$oathUser->addKey( $key );
} elseif ( is_array( $decodedData['keys'] ) ) {
foreach ( $decodedData['keys'] as $keyData ) {
$key = $module->newKey( $keyData );
$oathUser->addKey( $key );
}
}
}
$this->cache->set( $user->getName(), $oathUser );
}
return $oathUser;
}
/**
* @param OATHUser $user
* @param string|null $clientInfo
* @throws ConfigException
* @throws MWException
*/
public function persist( OATHUser $user, $clientInfo = null ) {
if ( !$clientInfo ) {
$clientInfo = RequestContext::getMain()->getRequest()->getIP();
}
$prevUser = $this->findByUser( $user->getUser() );
$data = $user->getModule()->getDataFromUser( $user );
$this->getDB( DB_MASTER )->replace(
'oathauth_users',
[ 'id' ],
[
'id' => CentralIdLookup::factory()->centralIdFromLocalUser( $user->getUser() ),
'module' => $user->getModule()->getName(),
'data' => FormatJson::encode( $data )
],
__METHOD__
);
$userName = $user->getUser()->getName();
$this->cache->set( $userName, $user );
if ( $prevUser !== false ) {
$this->logger->info( 'OATHAuth updated for {user} from {clientip}', [
'user' => $userName,
'clientip' => $clientInfo,
] );
} else {
// If findByUser() has returned false, there was no user row or cache entry
$this->logger->info( 'OATHAuth enabled for {user} from {clientip}', [
'user' => $userName,
'clientip' => $clientInfo,
] );
}
}
/**
* @param OATHUser $user
* @param string $clientInfo
*/
public function remove( OATHUser $user, $clientInfo ) {
$this->getDB( DB_MASTER )->delete(
'oathauth_users',
[ 'id' => CentralIdLookup::factory()->centralIdFromLocalUser( $user->getUser() ) ],
__METHOD__
);
$userName = $user->getUser()->getName();
$this->cache->delete( $userName );
$this->logger->info( 'OATHAuth disabled for {user} from {clientip}', [
'user' => $userName,
'clientip' => $clientInfo,
] );
}
/**
* @param int $index DB_MASTER/DB_REPLICA
* @return DBConnRef
*/
private function getDB( $index ) {
global $wgOATHAuthDatabase;
return $this->lb->getConnectionRef( $index, [], $wgOATHAuthDatabase );
}
/**
* @param stdClass $row
* @return bool
*/
private function isLegacy( $row ) {
if ( $row->module !== '' ) {
return false;
}
if ( property_exists( $row, 'secret' ) && $row->secret !== null ) {
return true;
}
return false;
}
/**
* Checks if the DB data is in the new format,
* if not converts old data to new
*
* @param string $data
* @param stdClass $row
* @return string
*/
private function checkAndResolveLegacy( $data, $row ) {
if ( $data ) {
// New data exists - no action required
return $data;
}
if ( property_exists( $row, 'secret' ) && property_exists( $row, 'scratch_tokens' ) ) {
return FormatJson::encode( [
'secret' => $row->secret,
'scratch_tokens' => $row->scratch_tokens
] );
}
return '';
}
}