auth.utils.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456
  1. <?php
  2. define("CONFIG", 1);
  3. define("SQL", 1);
  4. require_once($_SERVER['DOCUMENT_ROOT'] . "/cfg/config.php");
  5. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/sql.php");
  6. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/common.php");
  7. // Включим подробное логирование сессий
  8. LOG_DEBUG($db_link, "=== SESSION DEBUG START ===");
  9. LOG_DEBUG($db_link, "Session status: " . session_status());
  10. LOG_DEBUG($db_link, "PHP_SESSION_ACTIVE: " . PHP_SESSION_ACTIVE);
  11. LOG_DEBUG($db_link, "DOCUMENT_ROOT: " . $_SERVER['DOCUMENT_ROOT']);
  12. LOG_DEBUG($db_link, "REQUEST_URI: " . ($_SERVER['REQUEST_URI'] ?? 'unknown'));
  13. LOG_DEBUG($db_link, "HTTP_COOKIE: " . ($_SERVER['HTTP_COOKIE'] ?? 'no cookies'));
  14. // Удаляем порт из домена для корректной работы кук
  15. $domain_parts = explode(':', $_SERVER['HTTP_HOST']);
  16. $clean_domain = $domain_parts[0];
  17. //ini_set('session.use_trans_sid', true);
  18. //ini_set('session.use_only_cookies', false);
  19. define('SESSION_TABLE', 'sessions');
  20. define('USER_SESSIONS_TABLE', 'user_sessions');
  21. //set default const values
  22. if (!defined('SESSION_LIFETIME') || SESSION_LIFETIME < 60) { define('SESSION_LIFETIME', 86400); }
  23. if (!defined("HTML_LANG")) { define("HTML_LANG","english"); }
  24. if (!defined("HTML_STYLE")) { define("HTML_STYLE","white"); }
  25. if (!defined("IPCAM_GROUP_ID")) { define("IPCAM_GROUP_ID","5"); }
  26. if (!defined("SNMP_timeout")) { define("SNMP_timeout","500000"); }
  27. if (!defined("SNMP_retry")) { define("SNMP_retry","1"); }
  28. // Функция для логирования отладки сессий
  29. function log_session_debug($db, $message, $data = null) {
  30. $log_message = "SESSION_DEBUG: " . $message;
  31. if ($data !== null) {
  32. $log_message .= " | Data: " . (is_array($data) ? json_encode($data) : $data);
  33. }
  34. $log_message .= " | SID: " . (session_id() ?: 'no-session-id');
  35. $log_message .= " | Cookies: " . ($_SERVER['HTTP_COOKIE'] ?? 'none');
  36. LOG_DEBUG($db, $log_message);
  37. }
  38. // Инициализация сессий в БД
  39. function init_db_sessions($db) {
  40. log_session_debug($db, "Initializing database sessions");
  41. session_set_save_handler(
  42. 'sess_open',
  43. 'sess_close',
  44. 'sess_read',
  45. 'sess_write',
  46. 'sess_destroy',
  47. 'sess_gc'
  48. );
  49. register_shutdown_function('session_write_close');
  50. }
  51. // Обработчики сессий
  52. function sess_open($savePath, $sessionName) {
  53. global $db_link;
  54. log_session_debug($db_link, "Session opened", ['savePath' => $savePath, 'sessionName' => $sessionName]);
  55. return true;
  56. }
  57. function sess_close() {
  58. global $db_link;
  59. log_session_debug($db_link, "Session closed");
  60. return true;
  61. }
  62. function sess_read($sessionId) {
  63. global $db_link;
  64. log_session_debug($db_link, "Reading session", ['sessionId' => $sessionId]);
  65. $stmt = $db_link->prepare("SELECT data FROM " . SESSION_TABLE . " WHERE id = ?");
  66. $stmt->execute([$sessionId]);
  67. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  68. $data = $row ? $row['data'] : '';
  69. log_session_debug($db_link, "Session data retrieved", ['length' => strlen($data), 'exists' => !empty($data)]);
  70. return $data;
  71. }
  72. function sess_write($sessionId, $data) {
  73. global $db_link;
  74. log_session_debug($db_link, "Writing session", ['sessionId' => $sessionId, 'data_length' => strlen($data)]);
  75. $time = time();
  76. $stmt = $db_link->prepare("INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  77. VALUES (?, ?, ?)
  78. ON DUPLICATE KEY UPDATE data = ?, last_accessed = ?");
  79. $success = $stmt->execute([$sessionId, $data, $time, $data, $time]);
  80. if (!$success) {
  81. $error = $stmt->errorInfo();
  82. LOG_DEBUG($db_link, "Session write failed: " . print_r($error, true));
  83. log_session_debug($db_link, "Session write query failed", $error);
  84. return false;
  85. }
  86. log_session_debug($db_link, "Session write successful");
  87. return true;
  88. }
  89. function sess_destroy($sessionId) {
  90. global $db_link;
  91. log_session_debug($db_link, "Destroying session", ['sessionId' => $sessionId]);
  92. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE id = ?");
  93. $success = $stmt->execute([$sessionId]);
  94. if (!$success) {
  95. $error = $stmt->errorInfo();
  96. LOG_DEBUG($db_link, "Session destroy failed: " . print_r($error, true));
  97. log_session_debug($db_link, "Session destroy query failed", $error);
  98. return false;
  99. }
  100. log_session_debug($db_link, "Session destroy successful");
  101. return true;
  102. }
  103. function sess_gc($maxLifetime) {
  104. global $db_link;
  105. log_session_debug($db_link, "Running session GC", ['maxLifetime' => $maxLifetime]);
  106. $old = time() - $maxLifetime;
  107. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE last_accessed < ?");
  108. $success = $stmt->execute([$old]);
  109. if (!$success) {
  110. $error = $stmt->errorInfo();
  111. LOG_DEBUG($db_link, "Session GC failed: " . print_r($error, true));
  112. log_session_debug($db_link, "Session GC query failed", $error);
  113. return false;
  114. }
  115. log_session_debug($db_link, "Session GC completed");
  116. return true;
  117. }
  118. function login($db) {
  119. log_session_debug($db, "Login function started", [
  120. 'session_status' => session_status(),
  121. 'session_id' => session_id(),
  122. 'has_post' => !empty($_POST),
  123. 'post_login' => !empty($_POST['login']),
  124. 'current_cookies' => $_COOKIE
  125. ]);
  126. $redirect_url = getSafeRedirectUrl(DEFAULT_PAGE);
  127. if ($redirect_url == DEFAULT_PAGE) {
  128. $current_path = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
  129. $current_path = $current_path ? rtrim($current_path, '/') : '/';
  130. $login_path = rtrim(LOGIN_PAGE, '/');
  131. $logout_path = rtrim(LOGOUT_PAGE, '/');
  132. if ($current_path !== $login_path && $current_path !== $logout_path) {
  133. $redirect_url = safeUrlEncode($_SERVER['REQUEST_URI']);
  134. }
  135. }
  136. log_session_debug($db, "Redirect URL determined", ['redirect_url' => $redirect_url]);
  137. if (!empty($_SESSION['user_id'])) {
  138. log_session_debug($db, "Found user_id in session, validating", ['user_id' => $_SESSION['user_id']]);
  139. if (validate_session($db)) {
  140. log_session_debug($db, "Session validation successful");
  141. return true;
  142. } else {
  143. log_session_debug($db, "Session validation failed, continuing to other auth methods");
  144. }
  145. } else {
  146. log_session_debug($db, "No user_id found in session");
  147. }
  148. if (strpos($_SERVER['REQUEST_URI'], '/api.php') === 0) {
  149. log_session_debug($db, "API request detected, attempting silent auth");
  150. return IsSilentAuthenticated($db);
  151. }
  152. if (!empty($_POST['login']) && !empty($_POST['password'])) {
  153. log_session_debug($db, "POST login attempt", ['login' => $_POST['login']]);
  154. if (authenticate_by_credentials($db, $_POST['login'], $_POST['password'])) {
  155. LOG_INFO($db, "Logged in customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']." url: ".$redirect_url);
  156. log_session_debug($db, "Login successful via credentials");
  157. session_write_close();
  158. session_start();
  159. return true;
  160. }
  161. log_session_debug($db, "Login failed via credentials");
  162. sleep(1);
  163. } else {
  164. log_session_debug($db, "No POST credentials provided");
  165. }
  166. log_session_debug($db, "All auth methods failed, calling logout");
  167. logout($db, FALSE, $redirect_url);
  168. exit;
  169. }
  170. function authenticate_by_credentials($db, $login, $password) {
  171. log_session_debug($db, "Authenticating by credentials", ['login' => $login]);
  172. $login = trim($login);
  173. $stmt = $db->prepare("SELECT * FROM `Customers` WHERE Login = ?");
  174. $stmt->execute([$login]);
  175. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  176. if (empty($user)) {
  177. log_session_debug($db, "User not found in database");
  178. sleep(1);
  179. return false;
  180. }
  181. log_session_debug($db, "User found", ['user_id' => $user['id']]);
  182. if (!password_verify($password, $user['password'])) {
  183. log_session_debug($db, "Password verification failed");
  184. sleep(1);
  185. return false;
  186. }
  187. log_session_debug($db, "Password verified, creating session");
  188. $regenerate_result = session_regenerate_id(true);
  189. log_session_debug($db, "Session regenerate result", ['success' => $regenerate_result, 'new_sid' => session_id()]);
  190. $_SESSION = [
  191. 'user_id' => $user['id'],
  192. 'login' => $user['Login'],
  193. 'acl' => $user['rights'],
  194. 'ip' => get_client_ip(),
  195. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  196. 'created' => time()
  197. ];
  198. log_session_debug($db, "Session data populated", $_SESSION);
  199. $sessionId = session_id();
  200. $ip = $_SESSION['ip'];
  201. $userAgent = $_SESSION['user_agent'];
  202. $time = time();
  203. $stmt = $db->prepare("INSERT INTO " . USER_SESSIONS_TABLE . "
  204. (session_id, user_id, ip_address, user_agent, created_at, last_activity)
  205. VALUES (?, ?, ?, ?, ?, ?)");
  206. $success = $stmt->execute([$sessionId, $user['id'], $ip, $userAgent, $time, $time]);
  207. if (!$success) {
  208. $error = $stmt->errorInfo();
  209. LOG_DEBUG($db, "Session DB error: " . print_r($error, true));
  210. log_session_debug($db, "User session insert failed", $error);
  211. return false;
  212. }
  213. log_session_debug($db, "User session record created successfully");
  214. return true;
  215. }
  216. function validate_session($db) {
  217. log_session_debug($db, "Validating session", [
  218. 'session_data' => $_SESSION,
  219. 'current_ip' => get_client_ip(),
  220. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  221. ]);
  222. if ($_SESSION['ip'] !== get_client_ip() ||
  223. $_SESSION['user_agent'] !== ($_SERVER['HTTP_USER_AGENT'] ?? '')) {
  224. log_session_debug($db, "Session validation failed - IP or User-Agent mismatch", [
  225. 'session_ip' => $_SESSION['ip'],
  226. 'current_ip' => get_client_ip(),
  227. 'session_ua' => $_SESSION['user_agent'],
  228. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  229. ]);
  230. logout($db);
  231. return false;
  232. }
  233. $sessionId = session_id();
  234. $stmt = $db->prepare("SELECT 1
  235. FROM " . USER_SESSIONS_TABLE . "
  236. WHERE session_id = ? AND user_id = ? AND is_active = 1
  237. LIMIT 1");
  238. $stmt->execute([$sessionId, $_SESSION['user_id']]);
  239. if ($stmt->rowCount() === 0) {
  240. log_session_debug($db, "Session validation failed - no active session in database");
  241. logout($db);
  242. return false;
  243. }
  244. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET last_activity = ? WHERE session_id = ?");
  245. $stmt->execute([time(), $sessionId]);
  246. log_session_debug($db, "Session validation successful");
  247. return true;
  248. }
  249. function get_client_ip() {
  250. $ip = '127.0.0.1';
  251. foreach (['HTTP_CLIENT_IP', 'HTTP_X_FORWARDED_FOR', 'REMOTE_ADDR'] as $key) {
  252. if (!empty($_SERVER[$key])) {
  253. $ip = trim(current(explode(',', $_SERVER[$key])));
  254. if (filter_var($ip, FILTER_VALIDATE_IP)) {
  255. break;
  256. }
  257. }
  258. }
  259. log_session_debug($GLOBALS['db_link'], "Client IP determined", ['ip' => $ip]);
  260. return $ip;
  261. }
  262. function IsSilentAuthenticated($db) {
  263. log_session_debug($db, "Silent authentication attempt");
  264. if (!empty($_SESSION['user_id'])) {
  265. log_session_debug($db, "Silent auth - already has user_id in session");
  266. return true;
  267. }
  268. $auth_ip = get_client_ip();
  269. $api_key = '';
  270. $login = '';
  271. if (!empty($_GET['api_key'])) {
  272. $api_key = trim($_GET['api_key']);
  273. } elseif (!empty($_POST['api_key'])) {
  274. $api_key = trim($_POST['api_key']);
  275. }
  276. if (!empty($_GET['login'])) {
  277. $login = trim($_GET['login']);
  278. } elseif (!empty($_POST['login'])) {
  279. $login = trim($_POST['login']);
  280. }
  281. log_session_debug($db, "Silent auth parameters", ['login' => $login, 'has_api_key' => !empty($api_key)]);
  282. if (empty($login) || empty($api_key) || strlen($api_key) < 20) {
  283. log_session_debug($db, "Silent auth failed - missing parameters");
  284. return false;
  285. }
  286. $stmt = $db->prepare("SELECT id, rights FROM Customers WHERE Login = ? AND api_key = ? LIMIT 1");
  287. $stmt->execute([$login, $api_key]);
  288. if ($stmt->rowCount() === 0) {
  289. LOG_DEBUG($db, "API auth failed for: $login");
  290. log_session_debug($db, "Silent auth failed - user not found or invalid API key");
  291. return false;
  292. }
  293. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  294. $_SESSION = [
  295. 'user_id' => $user['id'],
  296. 'login' => $login,
  297. 'acl' => $user['rights'],
  298. 'ip' => $auth_ip,
  299. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  300. 'api_auth' => true
  301. ];
  302. log_session_debug($db, "Silent auth successful", ['user_id' => $user['id'], 'login' => $login]);
  303. LOG_INFO($db, "Logged in to api customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']);
  304. return true;
  305. }
  306. function logout($db, $silent = FALSE, $redirect_url = DEFAULT_PAGE) {
  307. log_session_debug($db, "Logout function called", [
  308. 'silent' => $silent,
  309. 'redirect_url' => $redirect_url,
  310. 'session_status' => session_status(),
  311. 'session_id' => session_id()
  312. ]);
  313. if (session_status() === PHP_SESSION_ACTIVE) {
  314. $user_info = isset($_SESSION['user_id']) ?
  315. "customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl'] :
  316. "no user session data";
  317. LOG_INFO($db, "Logout " . $user_info);
  318. $sessionId = session_id();
  319. if ($sessionId) {
  320. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET is_active = 0 WHERE session_id = ?");
  321. $result = $stmt->execute([$sessionId]);
  322. log_session_debug($db, "Session deactivation query executed", ['success' => (bool)$result]);
  323. }
  324. $_SESSION = [];
  325. session_destroy();
  326. if (!headers_sent()) {
  327. setcookie(session_name(), '', time() - SESSION_LIFETIME, '/');
  328. if (isset($_COOKIE['Auth'])) {
  329. setcookie('Auth', '', time() - SESSION_LIFETIME, '/');
  330. }
  331. log_session_debug($db, "Session cookies cleared");
  332. }
  333. } else {
  334. log_session_debug($db, "Logout - no active session to destroy");
  335. }
  336. if (!$silent && !headers_sent()) {
  337. log_session_debug($db, "Performing redirect after logout");
  338. if ($redirect_url == DEFAULT_PAGE || empty($redirect_url) || $redirect_url == '/') {
  339. header('Location: ' . LOGIN_PAGE);
  340. } else {
  341. header('Location: ' . LOGIN_PAGE . '?redirect_url=' . urlencode($redirect_url));
  342. }
  343. }
  344. }
  345. // Инициализация системы сессий
  346. log_session_debug($db_link, "Before init_db_sessions");
  347. init_db_sessions($db_link);
  348. // Инициализация сессии
  349. log_session_debug($db_link, "Before session_start check");
  350. if (session_status() !== PHP_SESSION_ACTIVE) {
  351. log_session_debug($db_link, "Starting session");
  352. $domain_parts = explode(':', $_SERVER['HTTP_HOST']);
  353. $clean_domain = $domain_parts[0];
  354. session_start([
  355. 'cookie_lifetime' => SESSION_LIFETIME,
  356. 'cookie_path' => '/',
  357. 'cookie_domain' => $clean_domain,
  358. 'cookie_secure' => isset($_SERVER['HTTPS']),
  359. 'cookie_httponly' => true,
  360. 'cookie_samesite' => 'Lax',
  361. 'gc_maxlifetime' => SESSION_LIFETIME,
  362. ]);
  363. log_session_debug($db_link, "After session_start", [
  364. 'session_status' => session_status(),
  365. 'session_id' => session_id(),
  366. 'session_cookie_params' => session_get_cookie_params()
  367. ]);
  368. } else {
  369. log_session_debug($db_link, "Session already active", [
  370. 'session_id' => session_id(),
  371. 'session_status' => session_status()
  372. ]);
  373. }
  374. log_session_debug($db_link, "=== SESSION DEBUG END ===");