auth.utils.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468
  1. <?php
  2. define("CONFIG", 1);
  3. define("SQL", 1);
  4. require_once($_SERVER['DOCUMENT_ROOT'] . "/cfg/config.php");
  5. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/sql.php");
  6. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/common.php");
  7. // исправление дублирующихся PHPSESSID <<<
  8. if (isset($_SERVER['HTTP_COOKIE'])) {
  9. preg_match_all('/PHPSESSID=([^;\s]+)/', $_SERVER['HTTP_COOKIE'], $matches);
  10. if (!empty($matches[1])) {
  11. $real_session_id = end($matches[1]);
  12. session_id($real_session_id);
  13. $_COOKIE['PHPSESSID'] = $real_session_id;
  14. }
  15. }
  16. // Включим подробное логирование сессий
  17. LOG_DEBUG($db_link, "=== SESSION DEBUG START ===");
  18. LOG_DEBUG($db_link, "Session status: " . session_status());
  19. LOG_DEBUG($db_link, "PHP_SESSION_ACTIVE: " . PHP_SESSION_ACTIVE);
  20. LOG_DEBUG($db_link, "DOCUMENT_ROOT: " . $_SERVER['DOCUMENT_ROOT']);
  21. LOG_DEBUG($db_link, "REQUEST_URI: " . ($_SERVER['REQUEST_URI'] ?? 'unknown'));
  22. LOG_DEBUG($db_link, "HTTP_COOKIE: " . ($_SERVER['HTTP_COOKIE'] ?? 'no cookies'));
  23. // Удаляем порт из домена для корректной работы кук
  24. $domain_parts = explode(':', $_SERVER['HTTP_HOST']);
  25. $clean_domain = $domain_parts[0];
  26. // Если прокси передаёт HTTPS
  27. if (!empty($_SERVER['HTTP_X_FORWARDED_PROTO']) && $_SERVER['HTTP_X_FORWARDED_PROTO'] === 'https') {
  28. $_SERVER['HTTPS'] = 'on';
  29. }
  30. ini_set('session.cookie_lifetime', SESSION_LIFETIME);
  31. ini_set('session.cookie_path', '/');
  32. ini_set('session.cookie_domain', $clean_domain);
  33. ini_set('session.cookie_secure', isset($_SERVER['HTTPS']));
  34. ini_set('session.cookie_httponly', true);
  35. ini_set('session.cookie_samesite', 'Lax');
  36. ini_set('session.gc_maxlifetime', SESSION_LIFETIME);
  37. //ini_set('session.use_trans_sid', true);
  38. //ini_set('session.use_only_cookies', false);
  39. define('SESSION_TABLE', 'sessions');
  40. define('USER_SESSIONS_TABLE', 'user_sessions');
  41. //set default const values
  42. if (!defined('SESSION_LIFETIME') || SESSION_LIFETIME < 60) { define('SESSION_LIFETIME', 86400); }
  43. if (!defined("HTML_LANG")) { define("HTML_LANG","english"); }
  44. if (!defined("HTML_STYLE")) { define("HTML_STYLE","white"); }
  45. if (!defined("IPCAM_GROUP_ID")) { define("IPCAM_GROUP_ID","5"); }
  46. if (!defined("SNMP_timeout")) { define("SNMP_timeout","500000"); }
  47. if (!defined("SNMP_retry")) { define("SNMP_retry","1"); }
  48. // Функция для логирования отладки сессий
  49. function log_session_debug($db, $message, $data = null) {
  50. $log_message = "SESSION_DEBUG: " . $message;
  51. if ($data !== null) {
  52. $log_message .= " | Data: " . (is_array($data) ? json_encode($data) : $data);
  53. }
  54. $log_message .= " | SID: " . (session_id() ?: 'no-session-id');
  55. $log_message .= " | Cookies: " . ($_SERVER['HTTP_COOKIE'] ?? 'none');
  56. LOG_DEBUG($db, $log_message);
  57. }
  58. // Инициализация сессий в БД
  59. function init_db_sessions($db) {
  60. log_session_debug($db, "Initializing database sessions");
  61. session_set_save_handler(
  62. 'sess_open',
  63. 'sess_close',
  64. 'sess_read',
  65. 'sess_write',
  66. 'sess_destroy',
  67. 'sess_gc'
  68. );
  69. register_shutdown_function('session_write_close');
  70. }
  71. // Обработчики сессий
  72. function sess_open($savePath, $sessionName) {
  73. global $db_link;
  74. log_session_debug($db_link, "Session opened", ['savePath' => $savePath, 'sessionName' => $sessionName]);
  75. return true;
  76. }
  77. function sess_close() {
  78. global $db_link;
  79. log_session_debug($db_link, "Session closed");
  80. return true;
  81. }
  82. function sess_read($sessionId) {
  83. global $db_link;
  84. log_session_debug($db_link, "Reading session", ['sessionId' => $sessionId]);
  85. $stmt = $db_link->prepare("SELECT data FROM " . SESSION_TABLE . " WHERE id = ?");
  86. $stmt->execute([$sessionId]);
  87. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  88. $data = $row ? $row['data'] : '';
  89. log_session_debug($db_link, "Session data retrieved", ['length' => strlen($data), 'exists' => !empty($data)]);
  90. return $data;
  91. }
  92. function sess_write($sessionId, $data) {
  93. global $db_link;
  94. log_session_debug($db_link, "Writing session", ['sessionId' => $sessionId, 'data_length' => strlen($data)]);
  95. $time = time();
  96. $stmt = $db_link->prepare("INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  97. VALUES (?, ?, ?)
  98. ON DUPLICATE KEY UPDATE data = ?, last_accessed = ?");
  99. $success = $stmt->execute([$sessionId, $data, $time, $data, $time]);
  100. if (!$success) {
  101. $error = $stmt->errorInfo();
  102. LOG_DEBUG($db_link, "Session write failed: " . print_r($error, true));
  103. log_session_debug($db_link, "Session write query failed", $error);
  104. return false;
  105. }
  106. log_session_debug($db_link, "Session write successful");
  107. return true;
  108. }
  109. function sess_destroy($sessionId) {
  110. global $db_link;
  111. log_session_debug($db_link, "Destroying session", ['sessionId' => $sessionId]);
  112. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE id = ?");
  113. $success = $stmt->execute([$sessionId]);
  114. if (!$success) {
  115. $error = $stmt->errorInfo();
  116. LOG_DEBUG($db_link, "Session destroy failed: " . print_r($error, true));
  117. log_session_debug($db_link, "Session destroy query failed", $error);
  118. return false;
  119. }
  120. log_session_debug($db_link, "Session destroy successful");
  121. return true;
  122. }
  123. function sess_gc($maxLifetime) {
  124. global $db_link;
  125. log_session_debug($db_link, "Running session GC", ['maxLifetime' => $maxLifetime]);
  126. $old = time() - $maxLifetime;
  127. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE last_accessed < ?");
  128. $success = $stmt->execute([$old]);
  129. if (!$success) {
  130. $error = $stmt->errorInfo();
  131. LOG_DEBUG($db_link, "Session GC failed: " . print_r($error, true));
  132. log_session_debug($db_link, "Session GC query failed", $error);
  133. return false;
  134. }
  135. log_session_debug($db_link, "Session GC completed");
  136. return true;
  137. }
  138. function login($db) {
  139. log_session_debug($db, "Login function started", [
  140. 'session_status' => session_status(),
  141. 'session_id' => session_id(),
  142. 'has_post' => !empty($_POST),
  143. 'post_login' => !empty($_POST['login']),
  144. 'current_cookies' => $_COOKIE
  145. ]);
  146. $redirect_url = getSafeRedirectUrl(DEFAULT_PAGE);
  147. if ($redirect_url == DEFAULT_PAGE) {
  148. $current_path = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
  149. $current_path = $current_path ? rtrim($current_path, '/') : '/';
  150. $login_path = rtrim(LOGIN_PAGE, '/');
  151. $logout_path = rtrim(LOGOUT_PAGE, '/');
  152. if ($current_path !== $login_path && $current_path !== $logout_path) {
  153. $redirect_url = safeUrlEncode($_SERVER['REQUEST_URI']);
  154. }
  155. }
  156. log_session_debug($db, "Redirect URL determined", ['redirect_url' => $redirect_url]);
  157. if (!empty($_SESSION['user_id'])) {
  158. log_session_debug($db, "Found user_id in session, validating", ['user_id' => $_SESSION['user_id']]);
  159. if (validate_session($db)) {
  160. log_session_debug($db, "Session validation successful");
  161. return true;
  162. } else {
  163. log_session_debug($db, "Session validation failed, continuing to other auth methods");
  164. }
  165. } else {
  166. log_session_debug($db, "No user_id found in session");
  167. }
  168. if (strpos($_SERVER['REQUEST_URI'], '/api.php') === 0) {
  169. log_session_debug($db, "API request detected, attempting silent auth");
  170. return IsSilentAuthenticated($db);
  171. }
  172. if (!empty($_POST['login']) && !empty($_POST['password'])) {
  173. log_session_debug($db, "POST login attempt", ['login' => $_POST['login']]);
  174. if (authenticate_by_credentials($db, $_POST['login'], $_POST['password'])) {
  175. LOG_INFO($db, "Logged in customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']." url: ".$redirect_url);
  176. log_session_debug($db, "Login successful via credentials");
  177. session_write_close();
  178. session_start();
  179. return true;
  180. }
  181. log_session_debug($db, "Login failed via credentials");
  182. sleep(1);
  183. } else {
  184. log_session_debug($db, "No POST credentials provided");
  185. }
  186. log_session_debug($db, "All auth methods failed, calling logout");
  187. logout($db, FALSE, $redirect_url);
  188. exit;
  189. }
  190. function authenticate_by_credentials($db, $login, $password) {
  191. log_session_debug($db, "Authenticating by credentials", ['login' => $login]);
  192. $login = trim($login);
  193. $stmt = $db->prepare("SELECT * FROM `customers` WHERE Login = ?");
  194. $stmt->execute([$login]);
  195. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  196. if (empty($user)) {
  197. log_session_debug($db, "User not found in database");
  198. sleep(1);
  199. return false;
  200. }
  201. log_session_debug($db, "User found", ['user_id' => $user['id']]);
  202. if (!password_verify($password, $user['password'])) {
  203. log_session_debug($db, "Password verification failed");
  204. sleep(1);
  205. return false;
  206. }
  207. log_session_debug($db, "Password verified, creating session");
  208. $regenerate_result = session_regenerate_id(true);
  209. log_session_debug($db, "Session regenerate result", ['success' => $regenerate_result, 'new_sid' => session_id()]);
  210. $_SESSION = [
  211. 'user_id' => $user['id'],
  212. 'login' => $user['Login'],
  213. 'acl' => $user['rights'],
  214. 'ip' => get_client_ip(),
  215. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  216. 'created' => time()
  217. ];
  218. log_session_debug($db, "Session data populated", $_SESSION);
  219. $sessionId = session_id();
  220. $ip = $_SESSION['ip'];
  221. $userAgent = $_SESSION['user_agent'];
  222. $time = time();
  223. $stmt = $db->prepare("INSERT INTO " . USER_SESSIONS_TABLE . "
  224. (session_id, user_id, ip_address, user_agent, created_at, last_activity)
  225. VALUES (?, ?, ?, ?, ?, ?)");
  226. $success = $stmt->execute([$sessionId, $user['id'], $ip, $userAgent, $time, $time]);
  227. if (!$success) {
  228. $error = $stmt->errorInfo();
  229. LOG_DEBUG($db, "Session DB error: " . print_r($error, true));
  230. log_session_debug($db, "User session insert failed", $error);
  231. return false;
  232. }
  233. log_session_debug($db, "User session record created successfully");
  234. return true;
  235. }
  236. function validate_session($db) {
  237. log_session_debug($db, "Validating session", [
  238. 'session_data' => $_SESSION,
  239. 'current_ip' => get_client_ip(),
  240. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  241. ]);
  242. if ($_SESSION['ip'] !== get_client_ip() ||
  243. $_SESSION['user_agent'] !== ($_SERVER['HTTP_USER_AGENT'] ?? '')) {
  244. log_session_debug($db, "Session validation failed - IP or User-Agent mismatch", [
  245. 'session_ip' => $_SESSION['ip'],
  246. 'current_ip' => get_client_ip(),
  247. 'session_ua' => $_SESSION['user_agent'],
  248. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  249. ]);
  250. logout($db);
  251. return false;
  252. }
  253. $sessionId = session_id();
  254. $stmt = $db->prepare("SELECT 1
  255. FROM " . USER_SESSIONS_TABLE . "
  256. WHERE session_id = ? AND user_id = ? AND is_active = 1
  257. LIMIT 1");
  258. $stmt->execute([$sessionId, $_SESSION['user_id']]);
  259. if ($stmt->rowCount() === 0) {
  260. log_session_debug($db, "Session validation failed - no active session in database");
  261. logout($db);
  262. return false;
  263. }
  264. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET last_activity = ? WHERE session_id = ?");
  265. $stmt->execute([time(), $sessionId]);
  266. log_session_debug($db, "Session validation successful");
  267. return true;
  268. }
  269. function get_client_ip() {
  270. $ip = '127.0.0.1';
  271. foreach (['HTTP_CLIENT_IP', 'HTTP_X_FORWARDED_FOR', 'REMOTE_ADDR'] as $key) {
  272. if (!empty($_SERVER[$key])) {
  273. $ip = trim(current(explode(',', $_SERVER[$key])));
  274. if (filter_var($ip, FILTER_VALIDATE_IP)) {
  275. break;
  276. }
  277. }
  278. }
  279. log_session_debug($GLOBALS['db_link'], "Client IP determined", ['ip' => $ip]);
  280. return $ip;
  281. }
  282. function IsSilentAuthenticated($db) {
  283. log_session_debug($db, "Silent authentication attempt");
  284. if (!empty($_SESSION['user_id'])) {
  285. log_session_debug($db, "Silent auth - already has user_id in session");
  286. return true;
  287. }
  288. $auth_ip = get_client_ip();
  289. $api_key = '';
  290. $login = '';
  291. if (!empty($_GET['api_key'])) {
  292. $api_key = trim($_GET['api_key']);
  293. } elseif (!empty($_POST['api_key'])) {
  294. $api_key = trim($_POST['api_key']);
  295. }
  296. if (!empty($_GET['login'])) {
  297. $login = trim($_GET['login']);
  298. } elseif (!empty($_POST['login'])) {
  299. $login = trim($_POST['login']);
  300. }
  301. log_session_debug($db, "Silent auth parameters", ['login' => $login, 'has_api_key' => !empty($api_key)]);
  302. if (empty($login) || empty($api_key) || strlen($api_key) < 20) {
  303. log_session_debug($db, "Silent auth failed - missing parameters");
  304. return false;
  305. }
  306. $stmt = $db->prepare("SELECT id, rights FROM customers WHERE Login = ? AND api_key = ? LIMIT 1");
  307. $stmt->execute([$login, $api_key]);
  308. if ($stmt->rowCount() === 0) {
  309. LOG_DEBUG($db, "API auth failed for: $login");
  310. log_session_debug($db, "Silent auth failed - user not found or invalid API key");
  311. return false;
  312. }
  313. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  314. $_SESSION = [
  315. 'user_id' => $user['id'],
  316. 'login' => $login,
  317. 'acl' => $user['rights'],
  318. 'ip' => $auth_ip,
  319. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  320. 'api_auth' => true
  321. ];
  322. log_session_debug($db, "Silent auth successful", ['user_id' => $user['id'], 'login' => $login]);
  323. LOG_INFO($db, "Logged in to api customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']);
  324. return true;
  325. }
  326. function logout($db, $silent = FALSE, $redirect_url = DEFAULT_PAGE) {
  327. log_session_debug($db, "Logout function called", [
  328. 'silent' => $silent,
  329. 'redirect_url' => $redirect_url,
  330. 'session_status' => session_status(),
  331. 'session_id' => session_id()
  332. ]);
  333. if (session_status() === PHP_SESSION_ACTIVE) {
  334. $user_info = isset($_SESSION['user_id']) ?
  335. "customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl'] :
  336. "no user session data";
  337. LOG_INFO($db, "Logout " . $user_info);
  338. $sessionId = session_id();
  339. if ($sessionId) {
  340. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET is_active = 0 WHERE session_id = ?");
  341. $result = $stmt->execute([$sessionId]);
  342. log_session_debug($db, "Session deactivation query executed", ['success' => (bool)$result]);
  343. }
  344. $_SESSION = [];
  345. session_destroy();
  346. if (!headers_sent()) {
  347. setcookie(session_name(), '', time() - SESSION_LIFETIME, '/');
  348. if (isset($_COOKIE['Auth'])) {
  349. setcookie('Auth', '', time() - SESSION_LIFETIME, '/');
  350. }
  351. log_session_debug($db, "Session cookies cleared");
  352. }
  353. } else {
  354. log_session_debug($db, "Logout - no active session to destroy");
  355. }
  356. if (!$silent && !headers_sent()) {
  357. log_session_debug($db, "Performing redirect after logout");
  358. if ($redirect_url == DEFAULT_PAGE || empty($redirect_url) || $redirect_url == '/') {
  359. header('Location: ' . LOGIN_PAGE);
  360. } else {
  361. header('Location: ' . LOGIN_PAGE . '?redirect_url=' . urlencode($redirect_url));
  362. }
  363. }
  364. }
  365. // Инициализация системы сессий
  366. log_session_debug($db_link, "Before init_db_sessions");
  367. init_db_sessions($db_link);
  368. // Инициализация сессии
  369. log_session_debug($db_link, "Before session_start check");
  370. if (session_status() !== PHP_SESSION_ACTIVE) {
  371. log_session_debug($db_link, "Starting session");
  372. session_start();
  373. log_session_debug($db_link, "After session_start", [
  374. 'session_status' => session_status(),
  375. 'session_id' => session_id(),
  376. 'session_cookie_params' => session_get_cookie_params()
  377. ]);
  378. } else {
  379. log_session_debug($db_link, "Session already active", [
  380. 'session_id' => session_id(),
  381. 'session_status' => session_status()
  382. ]);
  383. }
  384. log_session_debug($db_link, "=== SESSION DEBUG END ===");