auth.utils.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495
  1. <?php
  2. define("CONFIG", 1);
  3. define("SQL", 1);
  4. require_once($_SERVER['DOCUMENT_ROOT'] . "/cfg/config.php");
  5. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/sql.php");
  6. require_once($_SERVER['DOCUMENT_ROOT'] . "/inc/common.php");
  7. define('SESSION_TABLE', 'sessions');
  8. define('USER_SESSIONS_TABLE', 'user_sessions');
  9. //set default const values
  10. if (!defined("SESSION_LIFETIME") || SESSION_LIFETIME < 60) { define("SESSION_LIFETIME", 86400); }
  11. if (!defined("HTML_LANG")) { define("HTML_LANG","english"); }
  12. if (!defined("HTML_STYLE")) { define("HTML_STYLE","white"); }
  13. if (!defined("IPCAM_GROUP_ID")) { define("IPCAM_GROUP_ID","5"); }
  14. if (!defined("SNMP_timeout")) { define("SNMP_timeout","500000"); }
  15. if (!defined("SNMP_retry")) { define("SNMP_retry","1"); }
  16. // Удаляем порт из домена для корректной работы кук
  17. $domain_parts = explode(':', $_SERVER['HTTP_HOST']);
  18. $clean_domain = $domain_parts[0];
  19. // Если прокси передаёт HTTPS
  20. if (!empty($_SERVER['HTTP_X_FORWARDED_PROTO']) && $_SERVER['HTTP_X_FORWARDED_PROTO'] === 'https') {
  21. $_SERVER['HTTPS'] = 'on';
  22. }
  23. // исправление дублирующихся PHPSESSID <<<
  24. /*
  25. if (session_status() == PHP_SESSION_ACTIVE && isset($_SERVER['HTTP_COOKIE'])) {
  26. preg_match_all('/PHPSESSID=([^;\s]+)/', $_SERVER['HTTP_COOKIE'], $matches);
  27. if (!empty($matches[1])) {
  28. $real_session_id = end($matches[1]);
  29. session_id($real_session_id);
  30. $_COOKIE['PHPSESSID'] = $real_session_id;
  31. }
  32. }
  33. */
  34. ini_set('session.cookie_lifetime', SESSION_LIFETIME);
  35. ini_set('session.cookie_path', '/');
  36. ini_set('session.cookie_domain', $clean_domain);
  37. ini_set('session.cookie_secure', isset($_SERVER['HTTPS']));
  38. ini_set('session.cookie_httponly', true);
  39. ini_set('session.cookie_samesite', 'Lax');
  40. ini_set('session.gc_maxlifetime', SESSION_LIFETIME);
  41. //ini_set('session.use_trans_sid', true);
  42. //ini_set('session.use_only_cookies', false);
  43. // Функция для логирования отладки сессий, нужна только для отладки
  44. function log_session_debug($db, $message, $data = null) {
  45. return;
  46. /*
  47. $log_message = "SESSION_DEBUG: " . $message;
  48. if ($data !== null) {
  49. $log_message .= " | Data: " . (is_array($data) ? json_encode($data) : $data);
  50. }
  51. $log_message .= " | SID: " . (session_id() ?: 'no-session-id');
  52. $log_message .= " | Cookies: " . ($_SERVER['HTTP_COOKIE'] ?? 'none');
  53. LOG_DEBUG($db, $log_message);
  54. */
  55. }
  56. // Инициализация сессий в БД
  57. function init_db_sessions($db) {
  58. log_session_debug($db, "Initializing database sessions");
  59. session_set_save_handler(
  60. 'sess_open',
  61. 'sess_close',
  62. 'sess_read',
  63. 'sess_write',
  64. 'sess_destroy',
  65. 'sess_gc'
  66. );
  67. register_shutdown_function('session_write_close');
  68. }
  69. // Обработчики сессий
  70. function sess_open($savePath, $sessionName) {
  71. global $db_link;
  72. log_session_debug($db_link, "Session opened", ['savePath' => $savePath, 'sessionName' => $sessionName]);
  73. return true;
  74. }
  75. function sess_close() {
  76. global $db_link;
  77. log_session_debug($db_link, "Session closed");
  78. return true;
  79. }
  80. function sess_read($sessionId) {
  81. global $db_link;
  82. log_session_debug($db_link, "Reading session", ['sessionId' => $sessionId]);
  83. $stmt = $db_link->prepare("SELECT data FROM " . SESSION_TABLE . " WHERE id = ?");
  84. $stmt->execute([$sessionId]);
  85. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  86. $data = $row ? $row['data'] : '';
  87. log_session_debug($db_link, "Session data retrieved", ['length' => strlen($data), 'exists' => !empty($data)]);
  88. return $data;
  89. }
  90. function sess_write($sessionId, $data) {
  91. global $db_link;
  92. log_session_debug($db_link, "Writing session", ['sessionId' => $sessionId, 'data_length' => strlen($data)]);
  93. $time = time();
  94. $driver = $db_link->getAttribute(PDO::ATTR_DRIVER_NAME);
  95. $sql = '';
  96. $params = [$sessionId, $data, $time];
  97. switch ($driver) {
  98. case 'mysql':
  99. $sql = "INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  100. VALUES (?, ?, ?)
  101. ON DUPLICATE KEY UPDATE data = VALUES(data), last_accessed = VALUES(last_accessed)";
  102. break;
  103. case 'pgsql':
  104. $sql = "INSERT INTO " . SESSION_TABLE . " (id, data, last_accessed)
  105. VALUES (?, ?, ?)
  106. ON CONFLICT (id) DO UPDATE SET data = EXCLUDED.data, last_accessed = EXCLUDED.last_accessed";
  107. break;
  108. default:
  109. LOG_DEBUG($db_link, "Unsupported database driver: $driver");
  110. log_session_debug($db_link, "Session write failed: unsupported driver");
  111. return false;
  112. }
  113. $stmt = $db_link->prepare($sql);
  114. $success = $stmt->execute($params);
  115. if (!$success) {
  116. $error = $stmt->errorInfo();
  117. LOG_DEBUG($db_link, "Session write failed: " . print_r($error, true));
  118. log_session_debug($db_link, "Session write query failed", $error);
  119. return false;
  120. }
  121. log_session_debug($db_link, "Session write successful");
  122. return true;
  123. }
  124. function sess_destroy($sessionId) {
  125. global $db_link;
  126. log_session_debug($db_link, "Destroying session", ['sessionId' => $sessionId]);
  127. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE id = ?");
  128. $success = $stmt->execute([$sessionId]);
  129. if (!$success) {
  130. $error = $stmt->errorInfo();
  131. LOG_DEBUG($db_link, "Session destroy failed: " . print_r($error, true));
  132. log_session_debug($db_link, "Session destroy query failed", $error);
  133. return false;
  134. }
  135. log_session_debug($db_link, "Session destroy successful");
  136. return true;
  137. }
  138. function sess_gc($maxLifetime) {
  139. global $db_link;
  140. log_session_debug($db_link, "Running session GC", ['maxLifetime' => $maxLifetime]);
  141. $old = time() - $maxLifetime;
  142. $stmt = $db_link->prepare("DELETE FROM " . SESSION_TABLE . " WHERE last_accessed < ?");
  143. $success = $stmt->execute([$old]);
  144. if (!$success) {
  145. $error = $stmt->errorInfo();
  146. LOG_DEBUG($db_link, "Session GC failed: " . print_r($error, true));
  147. log_session_debug($db_link, "Session GC query failed", $error);
  148. return false;
  149. }
  150. log_session_debug($db_link, "Session GC completed");
  151. return true;
  152. }
  153. function login($db) {
  154. if (strpos($_SERVER['REQUEST_URI'], '/api.php') === 0) {
  155. LOG_DEBUG($db, "API request detected, attempting silent auth");
  156. return IsSilentAuthenticated($db);
  157. }
  158. // Включим подробное логирование сессий
  159. LOG_DEBUG($db, "=== SESSION DEBUG START ===");
  160. LOG_DEBUG($db, "Session status: " . session_status());
  161. LOG_DEBUG($db, "PHP_SESSION_ACTIVE: " . PHP_SESSION_ACTIVE);
  162. LOG_DEBUG($db, "DOCUMENT_ROOT: " . $_SERVER['DOCUMENT_ROOT']);
  163. LOG_DEBUG($db, "REQUEST_URI: " . ($_SERVER['REQUEST_URI'] ?? 'unknown'));
  164. LOG_DEBUG($db, "HTTP_COOKIE: " . ($_SERVER['HTTP_COOKIE'] ?? 'no cookies'));
  165. // Гарантируем, что сессия запущена
  166. if (session_status() !== PHP_SESSION_ACTIVE) {
  167. // Инициализация системы сессий
  168. log_session_debug($db, "Session not active, initializing now");
  169. init_db_sessions($db);
  170. // Инициализация сессии
  171. log_session_debug($db, "Starting session");
  172. session_start();
  173. log_session_debug($db, "After session_start", [
  174. 'session_status' => session_status(),
  175. 'session_id' => session_id(),
  176. 'session_cookie_params' => session_get_cookie_params()
  177. ]);
  178. } else {
  179. log_session_debug($db, "Session already active", [
  180. 'session_id' => session_id(),
  181. 'session_status' => session_status()
  182. ]);
  183. }
  184. LOG_DEBUG($db, "=== SESSION DEBUG END ===");
  185. log_session_debug($db, "Login function started", [
  186. 'session_status' => session_status(),
  187. 'session_id' => session_id(),
  188. 'has_post' => !empty($_POST),
  189. 'post_login' => !empty($_POST['login']),
  190. 'current_cookies' => $_COOKIE
  191. ]);
  192. $redirect_url = getSafeRedirectUrl(DEFAULT_PAGE);
  193. if ($redirect_url == DEFAULT_PAGE) {
  194. $current_path = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
  195. $current_path = $current_path ? rtrim($current_path, '/') : '/';
  196. $login_path = rtrim(LOGIN_PAGE, '/');
  197. $logout_path = rtrim(LOGOUT_PAGE, '/');
  198. if ($current_path !== $login_path && $current_path !== $logout_path) {
  199. $redirect_url = safeUrlEncode($_SERVER['REQUEST_URI']);
  200. }
  201. }
  202. log_session_debug($db, "Redirect URL determined", ['redirect_url' => $redirect_url]);
  203. if (!empty($_SESSION['user_id'])) {
  204. log_session_debug($db, "Found user_id in session, validating", ['user_id' => $_SESSION['user_id']]);
  205. if (validate_session($db)) {
  206. log_session_debug($db, "Session validation successful");
  207. return true;
  208. } else {
  209. log_session_debug($db, "Session validation failed, continuing to other auth methods");
  210. }
  211. } else {
  212. log_session_debug($db, "No user_id found in session");
  213. }
  214. if (!empty($_POST['login']) && !empty($_POST['password'])) {
  215. log_session_debug($db, "POST login attempt", ['login' => $_POST['login']]);
  216. if (authenticate_by_credentials($db, $_POST['login'], $_POST['password'])) {
  217. LOG_INFO($db, "Logged in customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl']." url: ".$redirect_url);
  218. log_session_debug($db, "Login successful via credentials");
  219. return true;
  220. }
  221. log_session_debug($db, "Login failed via credentials");
  222. sleep(1);
  223. } else {
  224. log_session_debug($db, "No POST credentials provided");
  225. }
  226. log_session_debug($db, "All auth methods failed, calling logout");
  227. logout($db, $redirect_url);
  228. exit;
  229. }
  230. function authenticate_by_credentials($db, $login, $password) {
  231. log_session_debug($db, "Authenticating by credentials", ['login' => $login]);
  232. $login = trim($login);
  233. $stmt = $db->prepare("SELECT * FROM customers WHERE login = ?");
  234. $stmt->execute([$login]);
  235. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  236. if (empty($user)) {
  237. log_session_debug($db, "User not found in database");
  238. sleep(1);
  239. return false;
  240. }
  241. if (!empty($user) and $user['rights']==0) {
  242. log_session_debug($db, "User $login disabled");
  243. sleep(1);
  244. return false;
  245. }
  246. log_session_debug($db, "User found", ['user_id' => $user['id']]);
  247. if (!password_verify($password, $user['password'])) {
  248. log_session_debug($db, "Password verification failed");
  249. sleep(1);
  250. return false;
  251. }
  252. log_session_debug($db, "Password verified, creating session");
  253. $old_session_id = session_id();
  254. session_regenerate_id(true);
  255. $new_session_id = session_id();
  256. // Обновляем данные сессии
  257. $_SESSION = [
  258. 'user_id' => $user['id'],
  259. 'login' => $user['login'],
  260. 'acl' => $user['rights'],
  261. 'ip' => get_client_ip(),
  262. 'user_agent' => $_SERVER['HTTP_USER_AGENT'] ?? '',
  263. 'created' => time()
  264. ];
  265. // Обновляем запись в user_sessions (удаляем старую, создаём новую)
  266. $stmt = $db->prepare("DELETE FROM " . USER_SESSIONS_TABLE . " WHERE session_id = ?");
  267. $stmt->execute([$old_session_id]);
  268. $stmt = $db->prepare("INSERT INTO " . USER_SESSIONS_TABLE . "
  269. (session_id, user_id, ip_address, user_agent, created_at, last_activity)
  270. VALUES (?, ?, ?, ?, ?, ?)");
  271. $stmt->execute([$new_session_id, $user['id'], $_SESSION['ip'], $_SESSION['user_agent'], time(), time()]);
  272. return true;
  273. }
  274. function validate_session($db) {
  275. // Подготовка данных для логирования
  276. $log_context = [
  277. 'session_data' => $_SESSION,
  278. 'current_ip' => get_client_ip(),
  279. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  280. ];
  281. log_session_debug($db, "Validating session", $log_context);
  282. // Проверка наличия обязательных данных в сессии
  283. if (!isset($_SESSION['user_id']) ||
  284. !isset($_SESSION['ip']) ||
  285. !isset($_SESSION['user_agent'])) {
  286. log_session_debug($db, "Session validation failed - missing required session data");
  287. logout($db);
  288. return false;
  289. }
  290. // Проверка соответствия IP-адреса
  291. if ($_SESSION['ip'] !== get_client_ip()) {
  292. log_session_debug($db, "Session validation failed - IP mismatch", [
  293. 'session_ip' => $_SESSION['ip'],
  294. 'current_ip' => get_client_ip()
  295. ]);
  296. logout($db);
  297. return false;
  298. }
  299. // Проверка соответствия User-Agent
  300. if ($_SESSION['user_agent'] !== ($_SERVER['HTTP_USER_AGENT'] ?? '')) {
  301. log_session_debug($db, "Session validation failed - User-Agent mismatch", [
  302. 'session_ua' => $_SESSION['user_agent'],
  303. 'current_ua' => ($_SERVER['HTTP_USER_AGENT'] ?? '')
  304. ]);
  305. logout($db);
  306. return false;
  307. }
  308. // Проверка наличия активной записи в user_sessions
  309. try {
  310. $sessionId = session_id();
  311. $stmt = $db->prepare("SELECT 1
  312. FROM " . USER_SESSIONS_TABLE . "
  313. WHERE session_id = ? AND user_id = ? AND is_active = 1
  314. LIMIT 1");
  315. $stmt->execute([$sessionId, $_SESSION['user_id']]);
  316. if ($stmt->rowCount() === 0) {
  317. log_session_debug($db, "Session validation failed - no active session record in database");
  318. logout($db);
  319. return false;
  320. }
  321. } catch (PDOException $e) {
  322. LOG_ERROR($db, "Session validation DB error: " . $e->getMessage());
  323. log_session_debug($db, "Session validation failed - database error", ['error' => $e->getMessage()]);
  324. logout($db);
  325. return false;
  326. }
  327. // Обновление времени последней активности
  328. try {
  329. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . "
  330. SET last_activity = ? WHERE session_id = ?");
  331. $stmt->execute([time(), $sessionId]);
  332. } catch (PDOException $e) {
  333. // Не критично - продолжаем работу
  334. LOG_DEBUG($db, "Failed to update last_activity: " . $e->getMessage());
  335. }
  336. log_session_debug($db, "Session validation successful");
  337. return true;
  338. }
  339. function get_client_ip() {
  340. $ip = '127.0.0.1';
  341. foreach (['HTTP_CLIENT_IP', 'HTTP_X_FORWARDED_FOR', 'REMOTE_ADDR'] as $key) {
  342. if (!empty($_SERVER[$key])) {
  343. $ip = trim(current(explode(',', $_SERVER[$key])));
  344. if (filter_var($ip, FILTER_VALIDATE_IP)) {
  345. break;
  346. }
  347. }
  348. }
  349. return $ip;
  350. }
  351. function IsSilentAuthenticated($db) {
  352. $auth_ip = get_client_ip();
  353. $api_key = getParam('api_key', null, null, FILTER_SANITIZE_STRING);
  354. $login = getParam('login', null, null, FILTER_SANITIZE_STRING);
  355. LOG_DEBUG($db, "Silent auth parameters login => {$login} from {$auth_ip}");
  356. if (empty($login) || empty($api_key) || strlen($api_key) < 20) {
  357. LOG_WARNING($db, "Silent auth failed from {$auth_ip} - missing parameters");
  358. return false;
  359. }
  360. $stmt = $db->prepare("SELECT * FROM customers WHERE rights>0 AND login = ? AND api_key = ? LIMIT 1");
  361. $stmt->execute([$login, $api_key]);
  362. if ($stmt->rowCount() === 0) {
  363. LOG_WARNING($db, "API auth failed for $login from $auth_ip: user not found, disabled or invalid API key");
  364. return false;
  365. }
  366. $user = $stmt->fetch(PDO::FETCH_ASSOC);
  367. if (!empty($user)) { return false; }
  368. LOG_DEBUG($db, "Silent auth successful user_id => {$user['id']} login => {$user['login']} from {$auth_ip}");
  369. return true;
  370. }
  371. function logout($db, $redirect_url = DEFAULT_PAGE) {
  372. // Запускаем сессию только если браузер прислал куку —
  373. // это позволяет корректно деактивировать запись в user_sessions
  374. // и удалить куку с теми же параметрами, с которыми она была создана.
  375. if (session_status() !== PHP_SESSION_ACTIVE && !empty($_COOKIE[session_name()])) {
  376. init_db_sessions($db);
  377. session_start();
  378. }
  379. log_session_debug($db, "Logout function called", [
  380. 'redirect_url' => $redirect_url,
  381. 'session_status' => session_status(),
  382. 'session_id' => session_id()
  383. ]);
  384. if (session_status() === PHP_SESSION_ACTIVE) {
  385. $user_info = isset($_SESSION['user_id']) ?
  386. "customer id: ".$_SESSION['user_id']." name: ".$_SESSION['login']." from ".$_SESSION['ip']." with acl: ".$_SESSION['acl'] :
  387. "no user session data";
  388. LOG_INFO($db, "Logout " . $user_info);
  389. $sessionId = session_id();
  390. if ($sessionId) {
  391. $stmt = $db->prepare("UPDATE " . USER_SESSIONS_TABLE . " SET is_active = 0 WHERE session_id = ?");
  392. $result = $stmt->execute([$sessionId]);
  393. log_session_debug($db, "Session deactivation query executed", ['success' => (bool)$result]);
  394. }
  395. $_SESSION = [];
  396. session_destroy();
  397. if (!headers_sent()) {
  398. $params = session_get_cookie_params();
  399. setcookie(session_name(), '', time() - SESSION_LIFETIME, $params['path'], $params['domain'], $params['secure'], $params['httponly']);
  400. // if (isset($_COOKIE['Auth'])) { setcookie('Auth', '', time() - SESSION_LIFETIME, '/'); }
  401. log_session_debug($db, "Session cookies cleared");
  402. }
  403. } else {
  404. log_session_debug($db, "Logout - no active session to destroy");
  405. }
  406. if (!headers_sent()) {
  407. LOG_DEBUG($db, "Performing redirect after logout");
  408. if ($redirect_url == DEFAULT_PAGE || empty($redirect_url) || $redirect_url == '/') {
  409. header('Location: ' . LOGIN_PAGE);
  410. } else {
  411. header('Location: ' . LOGIN_PAGE . '?redirect_url=' . urlencode($redirect_url));
  412. }
  413. }
  414. }