mirror of
https://github.com/nuxsmin/sysPass.git
synced 2026-03-03 23:24:07 +01:00
Controllers are being splited into commands to better dependency management. Signed-off-by: Rubén D <nuxsmin@syspass.org>
464 lines
12 KiB
PHP
464 lines
12 KiB
PHP
<?php
|
|
/*
|
|
* sysPass
|
|
*
|
|
* @author nuxsmin
|
|
* @link https://syspass.org
|
|
* @copyright 2012-2021, Rubén Domínguez nuxsmin@$syspass.org
|
|
*
|
|
* This file is part of sysPass.
|
|
*
|
|
* sysPass is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* sysPass is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with sysPass. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
namespace SP\Http;
|
|
|
|
use Exception;
|
|
use Klein\DataCollection\DataCollection;
|
|
use Klein\DataCollection\HeaderDataCollection;
|
|
use SP\Core\Bootstrap\BootstrapBase;
|
|
use SP\Core\Crypt\CryptPKI;
|
|
use SP\Core\Crypt\Hash;
|
|
use SP\Core\Exceptions\SPException;
|
|
use SP\Util\Filter;
|
|
use SP\Util\Util;
|
|
|
|
/**
|
|
* Clase Request para la gestión de peticiones HTTP
|
|
*
|
|
* @package SP
|
|
*/
|
|
class Request implements RequestInterface
|
|
{
|
|
/**
|
|
* @var array Directorios seguros para include
|
|
*/
|
|
public const SECURE_DIRS = ['css', 'js'];
|
|
|
|
private HeaderDataCollection $headers;
|
|
private \Klein\Request $request;
|
|
private DataCollection $params;
|
|
private ?string $method = null;
|
|
private ?bool $https = null;
|
|
|
|
/**
|
|
* Request constructor.
|
|
*/
|
|
public function __construct(\Klein\Request $request)
|
|
{
|
|
$this->request = $request;
|
|
$this->headers = $this->request->headers();
|
|
$this->params = $this->getParamsByMethod();
|
|
$this->detectHttps();
|
|
}
|
|
|
|
private function getParamsByMethod(): DataCollection
|
|
{
|
|
if ($this->request->method('GET')) {
|
|
$this->method = 'GET';
|
|
|
|
return $this->request->paramsGet();
|
|
}
|
|
|
|
$this->method = 'POST';
|
|
|
|
return $this->request->paramsPost();
|
|
}
|
|
|
|
/**
|
|
* Detects if the connection is done through HTTPS
|
|
*/
|
|
private function detectHttps(): void
|
|
{
|
|
$this->https = Util::boolval($this->request->server()->get('HTTPS', 'off'))
|
|
|| $this->request->server()->get('SERVER_PORT', 0) === 443;
|
|
}
|
|
|
|
/**
|
|
* Devuelve un nombre de archivo seguro
|
|
*/
|
|
public static function getSecureAppFile(
|
|
string $file,
|
|
?string $base = null
|
|
): string {
|
|
return basename(self::getSecureAppPath($file, $base));
|
|
}
|
|
|
|
/**
|
|
* Devolver una ruta segura para
|
|
*/
|
|
public static function getSecureAppPath(
|
|
string $path,
|
|
?string $base = null
|
|
): string {
|
|
if ($base === null) {
|
|
$base = APP_ROOT;
|
|
} elseif (!in_array(basename($base), self::SECURE_DIRS, true)) {
|
|
return '';
|
|
}
|
|
|
|
$realPath = realpath($base.DIRECTORY_SEPARATOR.$path);
|
|
|
|
if ($realPath === false
|
|
|| strpos($realPath, $base) !== 0
|
|
) {
|
|
return '';
|
|
}
|
|
|
|
return $realPath;
|
|
}
|
|
|
|
public function getClientAddress(bool $fullForwarded = false): string
|
|
{
|
|
if (IS_TESTING) {
|
|
return '127.0.0.1';
|
|
}
|
|
|
|
$forwarded = $this->getForwardedFor();
|
|
|
|
if ($forwarded !== null) {
|
|
return $fullForwarded
|
|
? implode(',', $forwarded)
|
|
: $forwarded[0];
|
|
}
|
|
|
|
return $this->request->server()->get('REMOTE_ADDR', '');
|
|
}
|
|
|
|
/**
|
|
* @return string[]|null
|
|
*/
|
|
public function getForwardedFor(): ?array
|
|
{
|
|
// eg: Forwarded: by=<identifier>; for=<identifier>; host=<host>; proto=<http|https>
|
|
// Forwarded: for=12.34.56.78;host=example.com;proto=https, for=23.45.67.89
|
|
$forwarded = $this->headers->get('HTTP_FORWARDED');
|
|
|
|
if ($forwarded !== null
|
|
&& preg_match_all(
|
|
'/for="?\[?([\w.:]+)]?"?/',
|
|
$forwarded,
|
|
$matches
|
|
)
|
|
) {
|
|
return array_filter(
|
|
$matches[1],
|
|
static function ($value) {
|
|
return !empty($value);
|
|
}
|
|
);
|
|
}
|
|
|
|
// eg: X-Forwarded-For: 192.0.2.43, 2001:db8:cafe::17
|
|
$xForwarded = $this->headers->get('HTTP_X_FORWARDED_FOR');
|
|
|
|
if ($xForwarded !== null) {
|
|
$matches = preg_split(
|
|
'/(?<=[\w])+,\s?/',
|
|
$xForwarded,
|
|
-1,
|
|
PREG_SPLIT_NO_EMPTY
|
|
);
|
|
|
|
if (count($matches) > 0) {
|
|
return $matches;
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Comprobar si se realiza una recarga de la página
|
|
*/
|
|
public function checkReload(): bool
|
|
{
|
|
return $this->headers->get('Cache-Control') === 'max-age=0';
|
|
}
|
|
|
|
public function analyzeEmail(
|
|
string $param,
|
|
?string $default = null
|
|
): ?string {
|
|
if (!$this->params->exists($param)) {
|
|
return $default;
|
|
}
|
|
|
|
return Filter::getEmail($this->params->get($param));
|
|
}
|
|
|
|
/**
|
|
* Analizar un valor encriptado y devolverlo desencriptado
|
|
*/
|
|
public function analyzeEncrypted(string $param): string
|
|
{
|
|
$encryptedData = $this->analyzeString($param);
|
|
|
|
if ($encryptedData === null) {
|
|
return '';
|
|
}
|
|
|
|
try {
|
|
// Desencriptar con la clave RSA
|
|
$clearData = BootstrapBase::getContainer()->get(CryptPKI::class)
|
|
->decryptRSA(base64_decode($encryptedData));
|
|
|
|
// Desencriptar con la clave RSA
|
|
if ($clearData === null) {
|
|
logger('No RSA encrypted data from request');
|
|
|
|
return $encryptedData;
|
|
}
|
|
|
|
return $clearData;
|
|
} catch (Exception $e) {
|
|
processException($e);
|
|
|
|
return $encryptedData;
|
|
}
|
|
}
|
|
|
|
public function analyzeString(
|
|
string $param,
|
|
?string $default = null
|
|
): ?string {
|
|
if (!$this->params->exists($param)) {
|
|
return $default;
|
|
}
|
|
|
|
return Filter::getString($this->params->get($param));
|
|
}
|
|
|
|
public function analyzeUnsafeString(
|
|
string $param,
|
|
?string $default = null
|
|
): ?string {
|
|
if (!$this->params->exists($param)) {
|
|
return $default;
|
|
}
|
|
|
|
return Filter::getRaw($this->params->get($param));
|
|
}
|
|
|
|
/**
|
|
* @param string $param
|
|
* @param callable|null $mapper
|
|
* @param null $default
|
|
*
|
|
* @return array|null
|
|
*/
|
|
public function analyzeArray(
|
|
string $param,
|
|
callable $mapper = null,
|
|
$default = null
|
|
): ?array {
|
|
$requestValue = $this->params->get($param);
|
|
|
|
if (is_array($requestValue)) {
|
|
if (is_callable($mapper)) {
|
|
return $mapper($requestValue);
|
|
}
|
|
|
|
return Filter::getArray($requestValue);
|
|
}
|
|
|
|
return $default;
|
|
}
|
|
|
|
/**
|
|
* Comprobar si la petición es en formato JSON
|
|
*/
|
|
public function isJson(): bool
|
|
{
|
|
return strpos($this->headers->get('Accept'), 'application/json') !== false;
|
|
}
|
|
|
|
/**
|
|
* Comprobar si la petición es Ajax
|
|
*/
|
|
public function isAjax(): bool
|
|
{
|
|
return $this->headers->get('X-Requested-With') === 'XMLHttpRequest'
|
|
|| $this->analyzeInt('isAjax', 0) === 1;
|
|
}
|
|
|
|
public function analyzeInt(string $param, ?int $default = null): ?int
|
|
{
|
|
if (!$this->params->exists($param)) {
|
|
return $default;
|
|
}
|
|
|
|
return Filter::getInt($this->params->get($param));
|
|
}
|
|
|
|
public function getFile(string $file): ?array
|
|
{
|
|
return $this->request->files()->get($file);
|
|
}
|
|
|
|
public function analyzeBool(string $param, ?bool $default = null): bool
|
|
{
|
|
if (!$this->params->exists($param)) {
|
|
return (bool)$default;
|
|
}
|
|
|
|
return Util::boolval($this->params->get($param));
|
|
}
|
|
|
|
/**
|
|
* @param string $key
|
|
* @param string|null $param Checks the signature only for the given param
|
|
*
|
|
* @throws SPException
|
|
*/
|
|
public function verifySignature(string $key, ?string $param = null): void
|
|
{
|
|
$result = false;
|
|
$hash = $this->params->get('h');
|
|
|
|
if ($hash !== null) {
|
|
// Strips out the hash param from the URI to get the
|
|
// route which will be checked against the computed HMAC
|
|
if ($param === null) {
|
|
$uri = str_replace('&h='.$hash, '', $this->request->uri());
|
|
$uri = substr($uri, strpos($uri, '?') + 1);
|
|
} else {
|
|
$uri = $this->params->get($param, '');
|
|
}
|
|
|
|
$result = Hash::checkMessage($uri, $key, $hash);
|
|
}
|
|
|
|
if ($result === false) {
|
|
throw new SPException(
|
|
'URI string altered',
|
|
SPException::ERROR,
|
|
null,
|
|
1
|
|
);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the URI used by the browser and checks for the protocol used
|
|
*
|
|
* @see https://tools.ietf.org/html/rfc7239#section-7.5
|
|
*/
|
|
public function getHttpHost(): string
|
|
{
|
|
// Check in style of RFC 7239 otherwise the deprecated standard
|
|
$forwarded = $this->getForwardedData() ?? $this->getXForwardedData();
|
|
|
|
if (null !== $forwarded) {
|
|
return strtolower($forwarded['proto'].'://'.$forwarded['host']);
|
|
}
|
|
|
|
/** @noinspection HttpUrlsUsage */
|
|
$protocol = 'http://';
|
|
|
|
// We got called directly
|
|
if ($this->https) {
|
|
$protocol = 'https://';
|
|
}
|
|
|
|
return $protocol.$this->request->server()->get('HTTP_HOST');
|
|
}
|
|
|
|
/**
|
|
* Devolver datos de forward RFC 7239
|
|
*
|
|
* @see https://tools.ietf.org/html/rfc7239#section-7.5
|
|
*/
|
|
public function getForwardedData(): ?array
|
|
{
|
|
$forwarded = $this->getHeader('HTTP_FORWARDED');
|
|
|
|
// Check in style of RFC 7239
|
|
if (!empty($forwarded)
|
|
&& preg_match_all(
|
|
'/(?P<proto>proto=(\w+))|(?P<host>host=([\w.]+))/i',
|
|
$forwarded,
|
|
$matches
|
|
)
|
|
) {
|
|
$data = [
|
|
'host ' => $matches['host'][1] ?? null,
|
|
'proto' => $matches['proto'][1] ?? null,
|
|
'for' => $this->getForwardedFor(),
|
|
];
|
|
|
|
// Check if protocol and host are not empty
|
|
if (!empty($data['proto']) && !empty($data['host'])) {
|
|
return $data;
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
public function getHeader(string $header): string
|
|
{
|
|
return $this->headers->get($header, '');
|
|
}
|
|
|
|
/**
|
|
* Devolver datos de x-forward
|
|
*/
|
|
public function getXForwardedData(): ?array
|
|
{
|
|
$forwardedHost = $this->getHeader('HTTP_X_FORWARDED_HOST');
|
|
$forwardedProto = $this->getHeader('HTTP_X_FORWARDED_PROTO');
|
|
|
|
// Check (deprecated) de facto standard
|
|
if (!empty($forwardedHost) && !empty($forwardedProto)) {
|
|
$data = [
|
|
'host' => trim(str_replace('"', '', $forwardedHost)),
|
|
'proto' => trim(str_replace('"', '', $forwardedProto)),
|
|
'for' => $this->getForwardedFor(),
|
|
];
|
|
|
|
// Check if protocol and host are not empty
|
|
if (!empty($data['host']) && !empty($data['proto'])) {
|
|
return $data;
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
public function getMethod(): ?string
|
|
{
|
|
return $this->method;
|
|
}
|
|
|
|
public function isHttps(): ?bool
|
|
{
|
|
return $this->https;
|
|
}
|
|
|
|
public function getServerPort(): int
|
|
{
|
|
return (int)$this->request->server()->get('SERVER_PORT', 80);
|
|
}
|
|
|
|
public function getRequest(): \Klein\Request
|
|
{
|
|
return $this->request;
|
|
}
|
|
|
|
public function getServer(string $key): string
|
|
{
|
|
return (string)$this->request->server()->get($key, '');
|
|
}
|
|
} |