2022-03-19 00:14:20 +01:00
|
|
|
<?php
|
|
|
|
|
2022-03-24 14:58:30 +01:00
|
|
|
// Largely inspired by Firefly III remote user implementation (https://github.com/firefly-iii)
|
|
|
|
// See https://github.com/firefly-iii/firefly-iii/blob/main/app/Support/Authentication/RemoteUserGuard.php
|
|
|
|
|
2022-03-19 00:14:20 +01:00
|
|
|
namespace App\Services\Auth;
|
|
|
|
|
2022-11-22 15:15:52 +01:00
|
|
|
use Illuminate\Auth\GuardHelpers;
|
2022-03-19 00:14:20 +01:00
|
|
|
use Illuminate\Contracts\Auth\Guard;
|
|
|
|
use Illuminate\Contracts\Auth\UserProvider;
|
|
|
|
use Illuminate\Support\Facades\Log;
|
|
|
|
|
|
|
|
class ReverseProxyGuard implements Guard
|
|
|
|
{
|
2022-09-07 17:58:34 +02:00
|
|
|
use GuardHelpers;
|
|
|
|
|
2022-03-19 00:14:20 +01:00
|
|
|
/**
|
|
|
|
* The currently authenticated user.
|
|
|
|
*
|
2022-09-07 17:58:34 +02:00
|
|
|
* @var \Illuminate\Contracts\Auth\Authenticatable|null
|
2022-03-19 00:14:20 +01:00
|
|
|
*/
|
|
|
|
protected $user;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a new authentication guard.
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function __construct(UserProvider $provider)
|
|
|
|
{
|
|
|
|
$this->provider = $provider;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2022-11-22 15:15:52 +01:00
|
|
|
* {@inheritDoc}
|
2022-03-19 00:14:20 +01:00
|
|
|
*/
|
|
|
|
public function user()
|
|
|
|
{
|
|
|
|
// If we've already retrieved the user for the current request we can just
|
|
|
|
// return it back immediately. We do not want to fetch the user data on
|
|
|
|
// every call to this method because that would be tremendously slow.
|
2022-09-07 17:58:34 +02:00
|
|
|
if (! is_null($this->user)) {
|
2022-03-19 00:14:20 +01:00
|
|
|
return $this->user;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the user identifier from $_SERVER or apache filtered headers
|
2022-05-18 23:42:30 +02:00
|
|
|
$remoteUserHeader = config('auth.auth_proxy_headers.user');
|
|
|
|
$remoteUserHeader = $remoteUserHeader ?: 'REMOTE_USER';
|
2022-11-22 15:15:52 +01:00
|
|
|
$identifier = [];
|
2022-03-19 00:14:20 +01:00
|
|
|
|
2022-03-31 08:38:35 +02:00
|
|
|
try {
|
2023-03-12 17:47:40 +01:00
|
|
|
$identifier['id'] = request()->server($remoteUserHeader) ?? apache_request_headers()[$remoteUserHeader] ?? null;
|
2022-11-22 15:15:52 +01:00
|
|
|
} catch (\Throwable $e) {
|
2023-03-12 17:47:40 +01:00
|
|
|
$identifier['id'] = null;
|
2022-03-31 08:38:35 +02:00
|
|
|
}
|
|
|
|
|
2023-03-12 17:47:40 +01:00
|
|
|
if (! $identifier['id'] || is_array($identifier['id'])) {
|
|
|
|
Log::error(sprintf('Proxy remote-user header %s is empty or missing.', var_export($remoteUserHeader, true)));
|
2022-11-22 15:15:52 +01:00
|
|
|
|
2022-03-19 00:14:20 +01:00
|
|
|
return $this->user = null;
|
|
|
|
}
|
|
|
|
|
2022-03-24 14:58:30 +01:00
|
|
|
// Get the email identifier from $_SERVER
|
2023-03-12 17:47:40 +01:00
|
|
|
$remoteEmailHeader = config('auth.auth_proxy_headers.email');
|
|
|
|
$identifier['email'] = null;
|
2022-03-24 14:58:30 +01:00
|
|
|
|
|
|
|
if ($remoteEmailHeader) {
|
2022-03-31 08:38:35 +02:00
|
|
|
try {
|
2022-11-22 15:15:52 +01:00
|
|
|
$remoteEmail = (string) (request()->server($remoteEmailHeader) ?? apache_request_headers()[$remoteEmailHeader] ?? null);
|
|
|
|
} catch (\Throwable $e) {
|
2022-03-31 08:38:35 +02:00
|
|
|
$remoteEmail = null;
|
|
|
|
}
|
2022-03-24 14:58:30 +01:00
|
|
|
|
|
|
|
if ($remoteEmail) {
|
|
|
|
$identifier['email'] = $remoteEmail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-07 17:58:34 +02:00
|
|
|
return $this->user = $this->provider->retrieveById($identifier);
|
2022-03-19 00:14:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Validate a user's credentials.
|
|
|
|
*
|
2022-09-07 17:58:34 +02:00
|
|
|
* @return bool
|
2022-11-22 15:15:52 +01:00
|
|
|
*
|
2022-03-31 08:38:35 +02:00
|
|
|
* @codeCoverageIgnore
|
2022-03-19 00:14:20 +01:00
|
|
|
*/
|
|
|
|
public function validate(array $credentials = [])
|
|
|
|
{
|
2022-09-07 17:58:34 +02:00
|
|
|
return $this->check();
|
2022-03-19 00:14:20 +01:00
|
|
|
}
|
|
|
|
}
|