This repository has been archived on 2023-08-20. You can view files and clone it, but cannot push or open issues or pull requests.
symfony/src/Symfony/Bundle/FrameworkBundle/DependencyInjection/SecurityExtension.php

674 lines
24 KiB
PHP
Raw Normal View History

<?php
/*
* This file is part of the Symfony package.
*
* (c) Fabien Potencier <fabien.potencier@symfony-project.com>
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Symfony\Bundle\FrameworkBundle\DependencyInjection;
2011-01-07 14:44:29 +00:00
use Symfony\Component\DependencyInjection\Alias;
use Symfony\Component\DependencyInjection\Parameter;
use Symfony\Component\HttpKernel\DependencyInjection\Extension;
use Symfony\Component\DependencyInjection\Loader\XmlFileLoader;
use Symfony\Component\DependencyInjection\Resource\FileResource;
use Symfony\Component\DependencyInjection\ContainerBuilder;
use Symfony\Component\DependencyInjection\Reference;
use Symfony\Component\DependencyInjection\Definition;
use Symfony\Component\DependencyInjection\ParameterBag\ParameterBag;
use Symfony\Component\HttpFoundation\RequestMatcher;
/**
* SecurityExtension.
*
* @author Fabien Potencier <fabien.potencier@symfony-project.com>
*/
class SecurityExtension extends Extension
{
protected $requestMatchers = array();
/**
* Loads the web configuration.
*
* @param array $config An array of configuration settings
* @param ContainerBuilder $container A ContainerBuilder instance
*/
public function configLoad($config, ContainerBuilder $container)
{
if (!$container->hasDefinition('security.context')) {
$loader = new XmlFileLoader($container, array(__DIR__.'/../Resources/config', __DIR__.'/Resources/config'));
$loader->load('security.xml');
}
if (isset($config['access-denied-url'])) {
$container->setParameter('security.access_denied.url', $config['access-denied-url']);
}
$this->createFirewalls($config, $container);
$this->createAuthorization($config, $container);
$this->createRoleHierarchy($config, $container);
return $container;
}
protected function createRoleHierarchy($config, ContainerBuilder $container)
{
$roles = array();
if (isset($config['role_hierarchy'])) {
$roles = $config['role_hierarchy'];
} elseif (isset($config['role-hierarchy'])) {
$roles = $config['role-hierarchy'];
}
if (isset($roles['role']) && is_int(key($roles['role']))) {
$roles = $roles['role'];
}
$hierarchy = array();
foreach ($roles as $id => $role) {
if (is_array($role) && isset($role['id'])) {
$id = $role['id'];
}
$value = $role;
if (is_array($role) && isset($role['value'])) {
$value = $role['value'];
}
$hierarchy[$id] = is_array($value) ? $value : preg_split('/\s*,\s*/', $value);
}
$container->setParameter('security.role_hierarchy.roles', $hierarchy);
$container->remove('security.access.simple_role_voter');
$container->getDefinition('security.access.role_hierarchy_voter')->addTag('security.voter');
}
protected function createAuthorization($config, ContainerBuilder $container)
{
$rules = array();
if (isset($config['access_control'])) {
$rules = $config['access_control'];
} elseif (isset($config['access-control'])) {
$rules = $config['access-control'];
}
if (isset($rules['rule']) && is_array($rules['rule'])) {
$rules = $rules['rule'];
}
foreach ($rules as $i => $access) {
$roles = isset($access['role']) ? (is_array($access['role']) ? $access['role'] : preg_split('/\s*,\s*/', $access['role'])) : array();
$channel = null;
if (isset($access['requires-channel'])) {
$channel = $access['requires-channel'];
} elseif (isset($access['requires_channel'])) {
$channel = $access['requires_channel'];
}
// matcher
$path = $host = $methods = $ip = null;
if (isset($access['path'])) {
$path = $access['path'];
}
if (isset($access['host'])) {
$host = $access['host'];
}
if (count($tMethods = $this->fixConfig($access, 'method')) > 0) {
$methods = $tMethods;
}
if (isset($access['ip'])) {
$ip = $access['ip'];
}
$matchAttributes = array();
$attributes = $this->fixConfig($access, 'attribute');
foreach ($attributes as $key => $attribute) {
if (isset($attribute['key'])) {
$key = $attribute['key'];
}
$matchAttributes[$key] = $attribute['pattern'];
}
$matcher = $this->createRequestMatcher($container, $path, $host, $methods, $ip, $matchAttributes);
$container->getDefinition('security.access_map')->addMethodCall('add', array($matcher, $roles, $channel));
}
}
protected function createFirewalls($config, ContainerBuilder $container)
{
$providerIds = $this->createUserProviders($config, $container);
$this->createEncoders($config, $container);
2010-12-21 15:10:53 +00:00
if (!$firewalls = $this->fixConfig($config, 'firewall')) {
return;
}
// make the ContextListener aware of the configured user providers
$definition = $container->getDefinition('security.context_listener');
$arguments = $definition->getArguments();
$userProviders = array();
2010-12-21 15:10:53 +00:00
foreach ($providerIds as $userProviderId) {
$userProviders[] = new Reference($userProviderId);
}
$arguments[1] = $userProviders;
$definition->setArguments($arguments);
// load service templates
$c = new ContainerBuilder($container->getParameterBag());
$loader = new XmlFileLoader($c, array(__DIR__.'/../Resources/config', __DIR__.'/Resources/config'));
$loader->load('security_templates.xml');
foreach ($this->fixConfig($config, 'template') as $template) {
2010-12-02 10:04:57 +00:00
$loader->load($c->getParameterBag()->resolveValue($template));
}
$container->merge($c);
// load firewall map
$mapDef = $container->getDefinition('security.firewall.map');
$map = array();
foreach ($firewalls as $firewall) {
list($matcher, $listeners, $exceptionListener) = $this->createFirewall($container, $firewall, $providerIds);
$contextId = 'security.firewall.map.context.'.count($map);
$context = $container->setDefinition($contextId, clone $container->getDefinition('security.firewall.context'));
$context
->setPublic(true)
->setArgument(0, $listeners)
->setArgument(1, $exceptionListener)
;
$map[$contextId] = $matcher;
}
$mapDef->setArgument(1, $map);
}
protected function createFirewall(ContainerBuilder $container, $firewall, $providerIds)
{
// unique id for this firewall
$id = md5(serialize($firewall));
// Matcher
$i = 0;
$matcher = null;
if (isset($firewall['pattern'])) {
$matcher = $this->createRequestMatcher($container, $firewall['pattern']);
}
// Security disabled?
if (isset($firewall['security']) && !$firewall['security']) {
return array($matcher, array(), null);
}
// Provider id (take the first registered provider if none defined)
if (isset($firewall['provider'])) {
$defaultProvider = $this->getUserProviderId($firewall['provider']);
} else {
if (!$providerIds) {
throw new \InvalidArgumentException('You must provide at least one authentication provider.');
}
2010-12-21 15:10:53 +00:00
$defaultProvider = reset($providerIds);
}
// Register listeners
$listeners = array();
$providers = array();
// Channel listener
$listeners[] = new Reference('security.channel_listener');
// Context serializer listener
if (!isset($firewall['stateless']) || !$firewall['stateless']) {
$listeners[] = new Reference('security.context_listener');
}
// Logout listener
if (array_key_exists('logout', $firewall)) {
2010-12-03 10:52:17 +00:00
$listenerId = 'security.logout_listener.'.$id;
$listener = $container->setDefinition($listenerId, clone $container->getDefinition('security.logout_listener'));
2010-12-03 10:52:17 +00:00
$listeners[] = new Reference($listenerId);
2010-12-03 10:52:17 +00:00
$arguments = $listener->getArguments();
if (isset($firewall['logout']['path'])) {
2010-12-03 10:52:17 +00:00
$arguments[1] = $firewall['logout']['path'];
}
if (isset($firewall['logout']['target'])) {
2010-12-03 10:52:17 +00:00
$arguments[2] = $firewall['logout']['target'];
}
$listener->setArguments($arguments);
2010-12-03 10:52:17 +00:00
if (!isset($firewall['stateless']) || !$firewall['stateless']) {
$listener->addMethodCall('addHandler', array(new Reference('security.logout.handler.session')));
}
2010-12-03 10:52:17 +00:00
if (count($cookies = $this->fixConfig($firewall['logout'], 'cookie')) > 0) {
$cookieHandlerId = 'security.logout.handler.cookie_clearing.'.$id;
$cookieHandler = $container->setDefinition($cookieHandlerId, clone $container->getDefinition('security.logout.handler.cookie_clearing'));
$cookieHandler->setArguments(array($cookies));
$listener->addMethodCall('addHandler', array(new Reference($cookieHandlerId)));
}
}
// Authentication listeners
2010-12-21 15:10:53 +00:00
list($authListeners, $providers, $defaultEntryPoint) = $this->createAuthenticationListeners($container, $id, $firewall, $defaultProvider);
$listeners = array_merge($listeners, $authListeners);
// Access listener
$listeners[] = new Reference($this->createAccessListener($container, $id, $providers));
// Switch user listener
if (array_key_exists('switch_user', $firewall)) {
$firewall['switch-user'] = $firewall['switch_user'];
}
if (array_key_exists('switch-user', $firewall)) {
$listeners[] = new Reference($this->createSwitchUserListener($container, $id, $firewall['switch-user'], $defaultProvider));
}
// Exception listener
$exceptionListener = new Reference($this->createExceptionListener($container, $id, $defaultEntryPoint));
return array($matcher, $listeners, $exceptionListener);
}
2010-12-21 15:10:53 +00:00
protected function createAuthenticationListeners($container, $id, $firewall, $defaultProvider)
{
$listeners = array();
$providers = array();
$hasListeners = false;
$defaultEntryPoint = null;
$positions = array('pre_auth', 'form', 'http');
$tags = $container->findTaggedServiceIds('security.listener.factory');
$factories = array();
foreach ($positions as $position) {
$factories[$position] = array();
}
foreach (array_keys($tags) as $tag) {
$factory = $container->get($tag);
$factories[$factory->getPosition()][] = $factory;
}
foreach ($positions as $position) {
foreach ($factories[$position] as $factory) {
$key = $factory->getKey();
$keybis = str_replace('-', '_', $key);
if (array_key_exists($keybis, $firewall)) {
$firewall[$key] = $firewall[$keybis];
}
if (array_key_exists($key, $firewall) && $firewall[$key] !== false) {
$userProvider = isset($firewall[$key]['provider']) ? $this->getUserProviderId($firewall[$key]['provider']) : $defaultProvider;
2010-12-21 15:10:53 +00:00
list($provider, $listener, $defaultEntryPoint) = $factory->create($container, $id, $firewall[$key], $userProvider, $defaultEntryPoint);
$listeners[] = new Reference($listener);
$providers[] = new Reference($provider);
$hasListeners = true;
}
}
}
// Anonymous
if (array_key_exists('anonymous', $firewall)) {
$listeners[] = new Reference('security.authentication.listener.anonymous');
$hasListeners = true;
}
if (false === $hasListeners) {
throw new \LogicException(sprintf('No authentication listener registered for pattern "%s".', isset($firewall['pattern']) ? $firewall['pattern'] : ''));
}
return array($listeners, $providers, $defaultEntryPoint);
}
// Parses user providers and returns an array of their ids
protected function createUserProviders($config, ContainerBuilder $container)
{
$providers = $this->fixConfig($config, 'provider');
if (!$providers) {
return array();
}
$providerIds = array();
foreach ($providers as $name => $provider) {
2010-12-21 15:10:53 +00:00
$id = $this->createUserDaoProvider($name, $provider, $container);
2010-12-21 15:10:53 +00:00
if (in_array($id, $providerIds, true)) {
throw new \RuntimeException(sprintf('Provider names must be unique. Duplicate entry for %s.', $id));
}
2010-12-21 15:10:53 +00:00
$providerIds[] = $id;
}
return $providerIds;
}
2010-12-21 15:10:53 +00:00
protected function createEncoders($config, ContainerBuilder $container)
{
2010-12-21 15:10:53 +00:00
$encoders = $this->fixConfig($config, 'encoder');
if (!$encoders) {
return array();
}
2010-12-21 15:10:53 +00:00
$encoderMap = array();
foreach ($encoders as $class => $encoder) {
$encoderMap = $this->createEncoder($encoderMap, $class, $encoder, $container);
}
$container
->getDefinition('security.encoder_factory.generic')
->setArguments(array($encoderMap))
;
}
protected function createEncoder(array $encoderMap, $accountClass, $config, ContainerBuilder $container)
{
if (is_array($config) && isset($config['class'])) {
$accountClass = $config['class'];
}
if (empty($accountClass)) {
throw new \RuntimeException('Each encoder needs an account class.');
}
2011-01-06 18:12:47 +00:00
// a minimal message digest, or plaintext encoder
2010-12-21 15:10:53 +00:00
if (is_string($config)) {
2011-01-06 18:12:47 +00:00
$config = array(
'algorithm' => $config,
2010-12-21 15:10:53 +00:00
);
}
// a custom encoder service
if (isset($config['id'])) {
$container
->getDefinition('security.encoder_factory.generic')
->addMethodCall('addEncoder', array($accountClass, new Reference($config['id'])))
;
return $encoderMap;
}
2011-01-06 18:12:47 +00:00
// a lazy loaded, message digest or plaintext encoder
2010-12-21 15:10:53 +00:00
if (!isset($config['algorithm'])) {
2011-01-14 13:21:14 +00:00
throw new \RuntimeException('"algorithm" must be defined.');
2010-12-21 15:10:53 +00:00
}
2011-01-06 18:12:47 +00:00
// plaintext encoder
if ('plaintext' === $config['algorithm']) {
$arguments = array();
if (array_key_exists('ignore-case', $config)) {
$arguments[0] = (Boolean) $config['ignore-case'];
}
$encoderMap[$accountClass] = array(
'class' => new Parameter('security.encoder.plain.class'),
'arguments' => $arguments,
);
return $encoderMap;
}
// message digest encoder
2010-12-21 15:10:53 +00:00
$arguments = array($config['algorithm']);
// add optional arguments
if (isset($config['encode-as-base64'])) {
2011-01-06 18:12:47 +00:00
$arguments[1] = (Boolean) $config['encode-as-base64'];
2010-12-21 15:10:53 +00:00
} else {
$arguments[1] = false;
}
2010-12-21 15:10:53 +00:00
if (isset($config['iterations'])) {
$arguments[2] = $config['iterations'];
} else {
$arguments[2] = 1;
}
$encoderMap[$accountClass] = array(
'class' => new Parameter('security.encoder.digest.class'),
'arguments' => $arguments,
);
return $encoderMap;
}
// Parses a <provider> tag and returns the id for the related user provider service
protected function createUserDaoProvider($name, $provider, ContainerBuilder $container, $master = true)
{
if (isset($provider['name'])) {
$name = $provider['name'];
}
if (!$name) {
throw new \RuntimeException('You must define a name for each user provider.');
}
$name = $this->getUserProviderId(strtolower($name));
// Existing DAO service provider
if (isset($provider['id'])) {
2011-01-07 14:44:29 +00:00
$container->setAlias($name, new Alias($provider['id'], false));
2010-12-21 15:10:53 +00:00
return $provider['id'];
}
// Chain provider
if (isset($provider['provider'])) {
// FIXME
throw new \RuntimeException('Not implemented yet.');
}
// Doctrine Entity DAO provider
if (isset($provider['entity'])) {
$container
->register($name, '%security.user.provider.entity.class%')
2011-01-05 11:38:41 +00:00
->setPublic(false)
->setArguments(array(
new Reference('security.user.entity_manager'),
$provider['entity']['class'],
isset($provider['entity']['property']) ? $provider['entity']['property'] : null,
));
2010-12-21 15:10:53 +00:00
return $name;
}
// Doctrine Document DAO provider
if (isset($provider['document'])) {
$container
->register($name, '%security.user.provider.document.class%')
2011-01-05 11:38:41 +00:00
->setPublic(false)
->setArguments(array(
new Reference('security.user.document_manager'),
$provider['document']['class'],
isset($provider['document']['property']) ? $provider['document']['property'] : null,
));
2010-12-21 15:10:53 +00:00
return $name;
}
// In-memory DAO provider
2010-12-16 21:27:16 +00:00
$definition = $container->register($name, '%security.user.provider.in_memory.class%');
2011-01-05 11:38:41 +00:00
$definition->setPublic(false);
foreach ($this->fixConfig($provider, 'user') as $username => $user) {
if (isset($user['name'])) {
$username = $user['name'];
}
if (!array_key_exists('password', $user)) {
// if no password is provided explicitly, it means that
// the user will be used with OpenID, X.509 certificates, ...
// Let's generate a random password just to be sure this
// won't be used accidentally with other authentication schemes.
// If you want an empty password, just say so explicitly
$user['password'] = uniqid();
}
if (!isset($user['roles'])) {
$user['roles'] = array();
} else {
$user['roles'] = is_array($user['roles']) ? $user['roles'] : preg_split('/\s*,\s*/', $user['roles']);
}
$userId = $name.'_'.md5(serialize(array($username, $user['password'], $user['roles'])));
$container
->register($userId, 'Symfony\Component\Security\User\User')
->setArguments(array($username, $user['password'], $user['roles']))
2011-01-05 11:38:41 +00:00
->setPublic(false)
;
$definition->addMethodCall('createUser', array(new Reference($userId)));
}
2010-12-21 15:10:53 +00:00
return $name;
}
protected function getUserProviderId($name)
{
return 'security.authentication.provider.'.$name;
}
protected function createAccessListener($container, $id, $providers)
{
// Authentication manager
$authManager = 'security.authentication.manager.'.$id;
$container
->register($authManager, '%security.authentication.manager.class%')
->addArgument($providers)
2011-01-05 11:38:41 +00:00
->setPublic(false)
;
// Access listener
$listenerId = 'security.access_listener.'.$id;
$listener = $container->setDefinition($listenerId, clone $container->getDefinition('security.access_listener'));
$arguments = $listener->getArguments();
$arguments[3] = new Reference($authManager);
$listener->setArguments($arguments);
return $listenerId;
}
protected function createExceptionListener($container, $id, $defaultEntryPoint)
{
$exceptionListenerId = 'security.exception_listener.'.$id;
$listener = $container->setDefinition($exceptionListenerId, clone $container->getDefinition('security.exception_listener'));
$arguments = $listener->getArguments();
2010-12-12 08:41:47 +00:00
$arguments[2] = null === $defaultEntryPoint ? null : new Reference($defaultEntryPoint);
$listener->setArguments($arguments);
return $exceptionListenerId;
}
protected function createSwitchUserListener($container, $id, $config, $defaultProvider)
{
$userProvider = isset($config['provider']) ? $this->getUserProviderId($config['provider']) : $defaultProvider;
$switchUserListenerId = 'security.authentication.switchuser_listener.'.$id;
$listener = $container->setDefinition($switchUserListenerId, clone $container->getDefinition('security.authentication.switchuser_listener'));
$arguments = $listener->getArguments();
$arguments[1] = new Reference($userProvider);
$listener->setArguments($arguments);
if (isset($config['role'])) {
$container->setParameter('security.authentication.switchuser.role', $config['role']);
}
if (isset($config['parameter'])) {
$container->setParameter('security.authentication.switchuser.parameter', $config['parameter']);
}
return $switchUserListenerId;
}
protected function createRequestMatcher($container, $path = null, $host = null, $methods = null, $ip = null, array $attributes = array())
{
$serialized = serialize(array($path, $host, $methods, $ip, $attributes));
$id = 'security.request_matcher.'.md5($serialized).sha1($serialized);
if (isset($this->requestMatchers[$id])) {
return $this->requestMatchers[$id];
}
// only add arguments that are necessary
$arguments = array($path, $host, $methods, $ip, $attributes);
while (count($arguments) > 0 && !end($arguments)) {
array_pop($arguments);
}
$container
->register($id, '%security.matcher.class%')
->setPublic(false)
->setArguments($arguments)
;
return $this->requestMatchers[$id] = new Reference($id);
}
public function aclLoad(array $config, ContainerBuilder $container)
{
if (!$container->hasDefinition('security.acl')) {
$loader = new XmlFileLoader($container, array(__DIR__.'/../Resources/config', __DIR__.'/Resources/config'));
$loader->load('security_acl.xml');
}
2011-01-06 18:12:47 +00:00
if (isset($config['connection'])) {
2011-01-19 09:59:46 +00:00
$container->setAlias('security.acl.dbal.connection', sprintf('doctrine.dbal.%s_connection', $config['connection']));
}
2011-01-06 18:12:47 +00:00
if (isset($config['cache'])) {
$container->setAlias('security.acl.cache', sprintf('security.acl.cache.%s', $config['cache']));
} else {
$container->remove('security.acl.cache.doctrine');
$container->removeAlias('security.acl.cache.doctrine.cache_impl');
}
}
/**
* Returns the base path for the XSD files.
*
* @return string The XSD base path
*/
public function getXsdValidationBasePath()
{
return __DIR__.'/../Resources/config/schema';
}
public function getNamespace()
{
return 'http://www.symfony-project.org/schema/dic/security';
}
public function getAlias()
{
return 'security';
}
protected function fixConfig($config, $key)
{
$values = array();
if (isset($config[$key.'s'])) {
$values = $config[$key.'s'];
} elseif (isset($config[$key])) {
if (is_string($config[$key]) || !is_int(key($config[$key]))) {
// only one
$values = array($config[$key]);
} else {
$values = $config[$key];
}
}
return $values;
}
}