auth.utils.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513
  1. <?php
  2. define("CONFIG", 1);
  3. define("SQL", 1);
  4. require_once($_SERVER['DOCUMENT_ROOT'] . "/cfg/config.php");
  5. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/sql.php");
  6. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/common.php");
  7. define('SESSION_TABLE', 'sessions');
  8. define('USER_SESSIONS_TABLE', 'user_sessions');
  9. //set default const values
  10. if (!defined('SESSION_LIFETIME') || SESSION_LIFETIME < 60) { define('SESSION_LIFETIME', 86400); }
  11. if (!defined("HTML_LANG")) { define("HTML_LANG","english"); }
  12. if (!defined("HTML_STYLE")) { define("HTML_STYLE","white"); }
  13. if (!defined("IPCAM_GROUP_ID")) { define("IPCAM_GROUP_ID","5"); }
  14. if (!defined("SNMP_timeout")) { define("SNMP_timeout","500000"); }
  15. if (!defined("SNMP_retry")) { define("SNMP_retry","1"); }
  16. // исправление дублирующихся PHPSESSID <<<
  17. if (isset($_SERVER['HTTP_COOKIE'])) {
  18. preg_match_all('/PHPSESSID=([^;\s]+)/', $_SERVER['HTTP_COOKIE'], $matches);
  19. if (!empty($matches[1])) {
  20. $real_session_id = end($matches[1]);
  21. session_id($real_session_id);
  22. $_COOKIE['PHPSESSID'] = $real_session_id;
  23. }
  24. }
  25. // Включим подробное логирование сессий
  26. LOG_DEBUG($db_link, "=== SESSION DEBUG START ===");
  27. LOG_DEBUG($db_link, "Session status: " . session_status());
  28. LOG_DEBUG($db_link, "PHP_SESSION_ACTIVE: " . PHP_SESSION_ACTIVE);
  29. LOG_DEBUG($db_link, "DOCUMENT_ROOT: " . $_SERVER['DOCUMENT_ROOT']);
  30. LOG_DEBUG($db_link, "REQUEST_URI: " . ($_SERVER['REQUEST_URI'] ?? 'unknown'));
  31. LOG_DEBUG($db_link, "HTTP_COOKIE: " . ($_SERVER['HTTP_COOKIE'] ?? 'no cookies'));
  32. // Удаляем порт из домена для корректной работы кук
  33. $domain_parts = explode(':', $_SERVER['HTTP_HOST']);
  34. $clean_domain = $domain_parts[0];
  35. // Если прокси передаёт HTTPS
  36. if (!empty($_SERVER['HTTP_X_FORWARDED_PROTO']) && $_SERVER['HTTP_X_FORWARDED_PROTO'] === 'https') {
  37. $_SERVER['HTTPS'] = 'on';
  38. }
  39. ini_set('session.cookie_lifetime', SESSION_LIFETIME);
  40. ini_set('session.cookie_path', '/');
  41. ini_set('session.cookie_domain', $clean_domain);
  42. ini_set('session.cookie_secure', isset($_SERVER['HTTPS']));
  43. ini_set('session.cookie_httponly', true);
  44. ini_set('session.cookie_samesite', 'Lax');
  45. ini_set('session.gc_maxlifetime', SESSION_LIFETIME);
  46. //ini_set('session.use_trans_sid', true);
  47. //ini_set('session.use_only_cookies', false);
  48. // Функция для логирования отладки сессий
  49. function log_session_debug($db, $message, $data = null) {
  50. $log_message = "SESSION_DEBUG: " . $message;
  51. if ($data !== null) {
  52. $log_message .= " | Data: " . (is_array($data) ? json_encode($data) : $data);
  53. }
  54. $log_message .= " | SID: " . (session_id() ?: 'no-session-id');
  55. $log_message .= " | Cookies: " . ($_SERVER['HTTP_COOKIE'] ?? 'none');
  56. LOG_DEBUG($db, $log_message);
  57. }
  58. // Инициализация сессий в БД
  59. function init_db_sessions($db) {
  60. log_session_debug($db, "Initializing database sessions");
  61. session_set_save_handler(
  62. 'sess_open',
  63. 'sess_close',
  64. 'sess_read',
  65. 'sess_write',
  66. 'sess_destroy',
  67. 'sess_gc'
  68. );
  69. register_shutdown_function('session_write_close');
  70. }
  71. // Обработчики сессий
  72. function sess_open($savePath, $sessionName) {
  73. global $db_link;
  74. log_session_debug($db_link, "Session opened", ['savePath' => $savePath, 'sessionName' => $sessionName]);
  75. return true;
  76. }
  77. function sess_close() {
  78. global $db_link;
  79. log_session_debug($db_link, "Session closed");
  80. return true;
  81. }
  82. function sess_read($sessionId) {
  83. global $db_link;
  84. log_session_debug($db_link, "Reading session", ['sessionId' => $sessionId]);
  85. $stmt = $db_link->prepare("SELECT data FROM " . SESSION_TABLE . " WHERE id = ?");
  86. $stmt->execute([$sessionId]);
  87. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  88. $data = $row ? $row['data'] : '';
  89. log_session_debug($db_link, "Session data retrieved", ['length' => strlen($data), 'exists' => !empty($data)]);
  90. return $data;
  91. }
  92. function sess_write($sessionId, $data) {
  93. global $db_link;
  94. log_session_debug($db_link, "Writing session", ['sessionId' => $sessionId, 'data_length' => strlen($data)]);
  95. $time = time();
  96. $driver = $db_link->getAttribute(PDO::ATTR_DRIVER_NAME);
  97. $sql = '';
  98. $params = [$sessionId, $data, $time];
  99. switch ($driver) {
  100. case 'mysql':
  101. $sql = "INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  102. VALUES (?, ?, ?)
  103. ON DUPLICATE KEY UPDATE data = VALUES(data), last_accessed = VALUES(last_accessed)";
  104. break;
  105. case 'pgsql':
  106. $sql = "INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  107. VALUES (?, ?, ?)
  108. ON CONFLICT (id) DO UPDATE SET data = EXCLUDED.data, last_accessed = EXCLUDED.last_accessed";
  109. break;
  110. default:
  111. LOG_DEBUG($db_link, "Unsupported database driver: $driver");
  112. log_session_debug($db_link, "Session write failed: unsupported driver");
  113. return false;
  114. }
  115. $stmt = $db_link->prepare($sql);
  116. $success = $stmt->execute($params);
  117. if (!$success) {
  118. $error = $stmt->errorInfo();
  119. LOG_DEBUG($db_link, "Session write failed: " . print_r($error, true));
  120. log_session_debug($db_link, "Session write query failed", $error);
  121. return false;
  122. }
  123. log_session_debug($db_link, "Session write successful");
  124. return true;
  125. }
  126. function sess_destroy($sessionId) {
  127. global $db_link;
  128. log_session_debug($db_link, "Destroying session", ['sessionId' => $sessionId]);
  129. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE id = ?");
  130. $success = $stmt->execute([$sessionId]);
  131. if (!$success) {
  132. $error = $stmt->errorInfo();
  133. LOG_DEBUG($db_link, "Session destroy failed: " . print_r($error, true));
  134. log_session_debug($db_link, "Session destroy query failed", $error);
  135. return false;
  136. }
  137. log_session_debug($db_link, "Session destroy successful");
  138. return true;
  139. }
  140. function sess_gc($maxLifetime) {
  141. global $db_link;
  142. log_session_debug($db_link, "Running session GC", ['maxLifetime' => $maxLifetime]);
  143. $old = time() - $maxLifetime;
  144. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE last_accessed < ?");
  145. $success = $stmt->execute([$old]);
  146. if (!$success) {
  147. $error = $stmt->errorInfo();
  148. LOG_DEBUG($db_link, "Session GC failed: " . print_r($error, true));
  149. log_session_debug($db_link, "Session GC query failed", $error);
  150. return false;
  151. }
  152. log_session_debug($db_link, "Session GC completed");
  153. return true;
  154. }
  155. function login($db) {
  156. log_session_debug($db, "Login function started", [
  157. 'session_status' => session_status(),
  158. 'session_id' => session_id(),
  159. 'has_post' => !empty($_POST),
  160. 'post_login' => !empty($_POST['login']),
  161. 'current_cookies' => $_COOKIE
  162. ]);
  163. $redirect_url = getSafeRedirectUrl(DEFAULT_PAGE);
  164. if ($redirect_url == DEFAULT_PAGE) {
  165. $current_path = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
  166. $current_path = $current_path ? rtrim($current_path, '/') : '/';
  167. $login_path = rtrim(LOGIN_PAGE, '/');
  168. $logout_path = rtrim(LOGOUT_PAGE, '/');
  169. if ($current_path !== $login_path && $current_path !== $logout_path) {
  170. $redirect_url = safeUrlEncode($_SERVER['REQUEST_URI']);
  171. }
  172. }
  173. log_session_debug($db, "Redirect URL determined", ['redirect_url' => $redirect_url]);
  174. if (!empty($_SESSION['user_id'])) {
  175. log_session_debug($db, "Found user_id in session, validating", ['user_id' => $_SESSION['user_id']]);
  176. if (validate_session($db)) {
  177. log_session_debug($db, "Session validation successful");
  178. return true;
  179. } else {
  180. log_session_debug($db, "Session validation failed, continuing to other auth methods");
  181. }
  182. } else {
  183. log_session_debug($db, "No user_id found in session");
  184. }
  185. if (strpos($_SERVER['REQUEST_URI'], '/api.php') === 0) {
  186. log_session_debug($db, "API request detected, attempting silent auth");
  187. return IsSilentAuthenticated($db);
  188. }
  189. if (!empty($_POST['login']) && !empty($_POST['password'])) {
  190. log_session_debug($db, "POST login attempt", ['login' => $_POST['login']]);
  191. if (authenticate_by_credentials($db, $_POST['login'], $_POST['password'])) {
  192. LOG_INFO($db, "Logged in customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']." url: ".$redirect_url);
  193. log_session_debug($db, "Login successful via credentials");
  194. return true;
  195. }
  196. log_session_debug($db, "Login failed via credentials");
  197. sleep(1);
  198. } else {
  199. log_session_debug($db, "No POST credentials provided");
  200. }
  201. log_session_debug($db, "All auth methods failed, calling logout");
  202. logout($db, FALSE, $redirect_url);
  203. exit;
  204. }
  205. function authenticate_by_credentials($db, $login, $password) {
  206. log_session_debug($db, "Authenticating by credentials", ['login' => $login]);
  207. $login = trim($login);
  208. $stmt = $db->prepare("SELECT * FROM customers WHERE login = ?");
  209. $stmt->execute([$login]);
  210. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  211. if (empty($user)) {
  212. log_session_debug($db, "User not found in database");
  213. sleep(1);
  214. return false;
  215. }
  216. log_session_debug($db, "User found", ['user_id' => $user['id']]);
  217. if (!password_verify($password, $user['password'])) {
  218. log_session_debug($db, "Password verification failed");
  219. sleep(1);
  220. return false;
  221. }
  222. log_session_debug($db, "Password verified, creating session");
  223. $old_session_id = session_id();
  224. session_regenerate_id(true);
  225. $new_session_id = session_id();
  226. // Обновляем данные сессии
  227. $_SESSION = [
  228. 'user_id' => $user['id'],
  229. 'login' => $user['login'],
  230. 'acl' => $user['rights'],
  231. 'ip' => get_client_ip(),
  232. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  233. 'created' => time()
  234. ];
  235. // Обновляем запись в user_sessions (удаляем старую, создаём новую)
  236. $stmt = $db->prepare("DELETE FROM " . USER_SESSIONS_TABLE . " WHERE session_id = ?");
  237. $stmt->execute([$old_session_id]);
  238. $stmt = $db->prepare("INSERT INTO " . USER_SESSIONS_TABLE . "
  239. (session_id, user_id, ip_address, user_agent, created_at, last_activity)
  240. VALUES (?, ?, ?, ?, ?, ?)");
  241. $stmt->execute([$new_session_id, $user['id'], $_SESSION['ip'], $_SESSION['user_agent'], time(), time()]);
  242. return true;
  243. }
  244. function validate_session($db) {
  245. // Подготовка данных для логирования
  246. $log_context = [
  247. 'session_data' => $_SESSION,
  248. 'current_ip' => get_client_ip(),
  249. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  250. ];
  251. log_session_debug($db, "Validating session", $log_context);
  252. // Проверка наличия обязательных данных в сессии
  253. if (!isset($_SESSION['user_id']) ||
  254. !isset($_SESSION['ip']) ||
  255. !isset($_SESSION['user_agent'])) {
  256. log_session_debug($db, "Session validation failed - missing required session data");
  257. logout($db);
  258. return false;
  259. }
  260. // Проверка соответствия IP-адреса
  261. if ($_SESSION['ip'] !== get_client_ip()) {
  262. log_session_debug($db, "Session validation failed - IP mismatch", [
  263. 'session_ip' => $_SESSION['ip'],
  264. 'current_ip' => get_client_ip()
  265. ]);
  266. logout($db);
  267. return false;
  268. }
  269. // Проверка соответствия User-Agent
  270. if ($_SESSION['user_agent'] !== ($_SERVER['HTTP_USER_AGENT'] ?? '')) {
  271. log_session_debug($db, "Session validation failed - User-Agent mismatch", [
  272. 'session_ua' => $_SESSION['user_agent'],
  273. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  274. ]);
  275. logout($db);
  276. return false;
  277. }
  278. // Проверка наличия активной записи в user_sessions
  279. try {
  280. $sessionId = session_id();
  281. $stmt = $db->prepare("SELECT 1
  282. FROM " . USER_SESSIONS_TABLE . "
  283. WHERE session_id = ? AND user_id = ? AND is_active = 1
  284. LIMIT 1");
  285. $stmt->execute([$sessionId, $_SESSION['user_id']]);
  286. if ($stmt->rowCount() === 0) {
  287. log_session_debug($db, "Session validation failed - no active session record in database");
  288. logout($db);
  289. return false;
  290. }
  291. } catch (PDOException $e) {
  292. LOG_ERROR($db, "Session validation DB error: " . $e->getMessage());
  293. log_session_debug($db, "Session validation failed - database error", ['error' => $e->getMessage()]);
  294. logout($db);
  295. return false;
  296. }
  297. // Обновление времени последней активности
  298. try {
  299. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . "
  300. SET last_activity = ? WHERE session_id = ?");
  301. $stmt->execute([time(), $sessionId]);
  302. } catch (PDOException $e) {
  303. // Не критично - продолжаем работу
  304. LOG_DEBUG($db, "Failed to update last_activity: " . $e->getMessage());
  305. }
  306. log_session_debug($db, "Session validation successful");
  307. return true;
  308. }
  309. function get_client_ip() {
  310. $ip = '127.0.0.1';
  311. foreach (['HTTP_CLIENT_IP', 'HTTP_X_FORWARDED_FOR', 'REMOTE_ADDR'] as $key) {
  312. if (!empty($_SERVER[$key])) {
  313. $ip = trim(current(explode(',', $_SERVER[$key])));
  314. if (filter_var($ip, FILTER_VALIDATE_IP)) {
  315. break;
  316. }
  317. }
  318. }
  319. log_session_debug($GLOBALS['db_link'], "Client IP determined", ['ip' => $ip]);
  320. return $ip;
  321. }
  322. function IsSilentAuthenticated($db) {
  323. log_session_debug($db, "Silent authentication attempt");
  324. if (!empty($_SESSION['user_id'])) {
  325. log_session_debug($db, "Silent auth - already has user_id in session");
  326. return true;
  327. }
  328. $auth_ip = get_client_ip();
  329. $api_key = '';
  330. $login = '';
  331. if (!empty($_GET['api_key'])) {
  332. $api_key = trim($_GET['api_key']);
  333. } elseif (!empty($_POST['api_key'])) {
  334. $api_key = trim($_POST['api_key']);
  335. }
  336. if (!empty($_GET['login'])) {
  337. $login = trim($_GET['login']);
  338. } elseif (!empty($_POST['login'])) {
  339. $login = trim($_POST['login']);
  340. }
  341. log_session_debug($db, "Silent auth parameters", ['login' => $login, 'has_api_key' => !empty($api_key)]);
  342. if (empty($login) || empty($api_key) || strlen($api_key) < 20) {
  343. log_session_debug($db, "Silent auth failed - missing parameters");
  344. return false;
  345. }
  346. $stmt = $db->prepare("SELECT id, rights FROM customers WHERE login = ? AND api_key = ? LIMIT 1");
  347. $stmt->execute([$login, $api_key]);
  348. if ($stmt->rowCount() === 0) {
  349. LOG_DEBUG($db, "API auth failed for: $login");
  350. log_session_debug($db, "Silent auth failed - user not found or invalid API key");
  351. return false;
  352. }
  353. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  354. $_SESSION = [
  355. 'user_id' => $user['id'],
  356. 'login' => $login,
  357. 'acl' => $user['rights'],
  358. 'ip' => $auth_ip,
  359. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  360. 'api_auth' => true
  361. ];
  362. log_session_debug($db, "Silent auth successful", ['user_id' => $user['id'], 'login' => $login]);
  363. LOG_INFO($db, "Logged in to api customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']);
  364. return true;
  365. }
  366. function logout($db, $silent = FALSE, $redirect_url = DEFAULT_PAGE) {
  367. log_session_debug($db, "Logout function called", [
  368. 'silent' => $silent,
  369. 'redirect_url' => $redirect_url,
  370. 'session_status' => session_status(),
  371. 'session_id' => session_id()
  372. ]);
  373. if (session_status() === PHP_SESSION_ACTIVE) {
  374. $user_info = isset($_SESSION['user_id']) ?
  375. "customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl'] :
  376. "no user session data";
  377. LOG_INFO($db, "Logout " . $user_info);
  378. $sessionId = session_id();
  379. if ($sessionId) {
  380. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET is_active = 0 WHERE session_id = ?");
  381. $result = $stmt->execute([$sessionId]);
  382. log_session_debug($db, "Session deactivation query executed", ['success' => (bool)$result]);
  383. }
  384. $_SESSION = [];
  385. session_destroy();
  386. if (!headers_sent()) {
  387. setcookie(session_name(), '', time() - SESSION_LIFETIME, '/');
  388. if (isset($_COOKIE['Auth'])) {
  389. setcookie('Auth', '', time() - SESSION_LIFETIME, '/');
  390. }
  391. log_session_debug($db, "Session cookies cleared");
  392. }
  393. } else {
  394. log_session_debug($db, "Logout - no active session to destroy");
  395. }
  396. if (!$silent && !headers_sent()) {
  397. log_session_debug($db, "Performing redirect after logout");
  398. if ($redirect_url == DEFAULT_PAGE || empty($redirect_url) || $redirect_url == '/') {
  399. header('Location: ' . LOGIN_PAGE);
  400. } else {
  401. header('Location: ' . LOGIN_PAGE . '?redirect_url=' . urlencode($redirect_url));
  402. }
  403. }
  404. }
  405. // Инициализация системы сессий
  406. log_session_debug($db_link, "Before init_db_sessions");
  407. init_db_sessions($db_link);
  408. // Инициализация сессии
  409. log_session_debug($db_link, "Before session_start check");
  410. if (session_status() !== PHP_SESSION_ACTIVE) {
  411. log_session_debug($db_link, "Starting session");
  412. session_start();
  413. log_session_debug($db_link, "After session_start", [
  414. 'session_status' => session_status(),
  415. 'session_id' => session_id(),
  416. 'session_cookie_params' => session_get_cookie_params()
  417. ]);
  418. } else {
  419. log_session_debug($db_link, "Session already active", [
  420. 'session_id' => session_id(),
  421. 'session_status' => session_status()
  422. ]);
  423. }
  424. log_session_debug($db_link, "=== SESSION DEBUG END ===");