openstackid/app/Services/SecurityPolicies/OAuth2SecurityPolicy.php
Sebastian Marcet 6b0d6c36af IDP Upgrade from Laravel 4.X to 5.X
In order to migrate IDP from LV 4.x to
latest LV version, following task were performed:

* Updated namespace to be complain with PSR-4
* General Refactoring: moved all DB access code
  from services to repositories.
* Migration to LV 5.X: these migration guides
  were applied
  - https://laravel.com/docs/5.3/upgrade#upgrade-5.0
  - https://laravel.com/docs/5.3/upgrade#upgrade-5.1.0
  - https://laravel.com/docs/5.3/upgrade#upgrade-5.2.0
* Improved caching: added repositories decorators
  in order to add REDIS cache to queries, entities

Change-Id: I8edf9f5fce6585129701c88bb88332f242307534
2016-11-17 18:37:40 -03:00

128 lines
5.1 KiB
PHP

<?php namespace Services\SecurityPolicies;
/**
* Copyright 2016 OpenStack Foundation
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
**/
use Illuminate\Support\Facades\DB;
use Illuminate\Support\Facades\Log;
use Exception;
use OAuth2\Exceptions\OAuth2ClientBaseException;
use OAuth2\Repositories\IClientRepository;
use OAuth2\Services\IClientService;
use Utils\Services\ISecurityPolicy;
use Utils\Services\ISecurityPolicyCounterMeasure;
use Models\OAuth2\OAuth2TrailException;
use Utils\Services\IServerConfigurationService;
use Utils\IPHelper;
/**
* Class OAuth2SecurityPolicy
* @package Services\SecurityPolicies
*/
class OAuth2SecurityPolicy implements ISecurityPolicy {
/**
* @var ISecurityPolicyCounterMeasure
*/
protected $counter_measure;
/**
* @var array
*/
private $exception_dictionary = array();
/**
* @var IServerConfigurationService
*/
private $server_configuration_service;
/**
* @var IClientRepository
*/
private $client_repository;
/**
* OAuth2SecurityPolicy constructor.
* @param IServerConfigurationService $server_configuration_service
* @param IClientRepository $client_repository
*/
public function __construct(IServerConfigurationService $server_configuration_service, IClientRepository $client_repository)
{
$this->server_configuration_service = $server_configuration_service;
$this->client_repository = $client_repository;
$this->exception_dictionary = array(
'auth2\exceptions\BearerTokenDisclosureAttemptException' => array('OAuth2SecurityPolicy.MaxBearerTokenDisclosureAttempts'),
'auth2\exceptions\InvalidClientException' => array('OAuth2SecurityPolicy.MaxInvalidClientExceptionAttempts'),
'auth2\exceptions\InvalidRedeemAuthCodeException' => array('OAuth2SecurityPolicy.MaxInvalidRedeemAuthCodeAttempts'),
'auth2\exceptions\InvalidClientCredentials' => array('OAuth2SecurityPolicy.MaxInvalidClientCredentialsAttempts'),
);
}
/**
* Check if current security policy is meet or not
* @return boolean
*/
public function check()
{
return true;
}
/**
* Apply security policy on a exception
* @param Exception $ex
* @return $this
*/
public function apply(Exception $ex)
{
try {
if($ex instanceof OAuth2ClientBaseException){
$client_id = $ex->getClientId();
//save oauth2 exception by client id
if (!is_null($client_id) && !empty($client_id)){
$client = $this->client_repository->getClientById($client_id);
if(!is_null($client)) {
$exception_class = get_class($ex);
$trail = new OAuth2TrailException();
$trail->from_ip = IPHelper::getUserIp();
$trail->exception_type = $exception_class;
$trail->client_id = $client->getId();
$trail->Save();
//check exception count by type on last "MinutesWithoutExceptions" minutes...
$exception_count = intval(OAuth2TrailException::where('client_id', '=', intval($client->getId()))
->where('exception_type', '=', $exception_class)
->where('created_at', '>', DB::raw('( UTC_TIMESTAMP() - INTERVAL ' . $this->server_configuration_service->getConfigValue("OAuth2SecurityPolicy.MinutesWithoutExceptions") . ' MINUTE )'))
->count());
if(array_key_exists($exception_class,$this->exception_dictionary)){
$params = $this->exception_dictionary[$exception_class];
$max_attempts = !is_null($params[0]) && !empty($params[0])? intval($this->server_configuration_service->getConfigValue($params[0])):0;
if ($exception_count >= $max_attempts)
$this->counter_measure->trigger(array('client_id' => $client->getId()));
}
}
}
}
} catch (Exception $ex) {
Log::error($ex);
}
return $this;
}
/**
* @param ISecurityPolicyCounterMeasure $counter_measure
* @return $this
*/
public function setCounterMeasure(ISecurityPolicyCounterMeasure $counter_measure)
{
$this->counter_measure = $counter_measure;
return $this;
}
}