hestia-sso.php 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. <?php
  2. /* Hestia way to enable support for SSO to PHPmyAdmin */
  3. /* To install please run v-add-sys-pma-sso */
  4. /* Following keys will get replaced when calling v-add-sys-pma-sso */
  5. define("PHPMYADMIN_KEY", "%PHPMYADMIN_KEY%");
  6. define("API_HOST_NAME", "%API_HOST_NAME%");
  7. define("API_HESTIA_PORT", "%API_HESTIA_PORT%");
  8. define("API_KEY", "%API_KEY%");
  9. class Hestia_API {
  10. /** @var string */
  11. public $hostname;
  12. /** @var string */
  13. public $key;
  14. /** @var string */
  15. public $pma_key;
  16. /** @var string */
  17. private $api_url;
  18. public function __construct() {
  19. $this->hostname = "https://" . API_HOST_NAME . ":" . API_HESTIA_PORT . "/api/";
  20. $this->key = API_KEY;
  21. $this->pma_key = PHPMYADMIN_KEY;
  22. }
  23. /* Creates curl request */
  24. public function request($postvars) {
  25. $postdata = http_build_query($postvars);
  26. $curl = curl_init();
  27. curl_setopt($curl, CURLOPT_URL, $this->hostname);
  28. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  29. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  30. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  31. curl_setopt($curl, CURLOPT_POST, true);
  32. curl_setopt($curl, CURLOPT_POSTFIELDS, $postdata);
  33. $answer = curl_exec($curl);
  34. return $answer;
  35. }
  36. /* Creates an new temp user in mysql */
  37. public function create_temp_user($database, $user, $host) {
  38. $post_request = [
  39. "hash" => $this->key,
  40. "returncode" => "no",
  41. "cmd" => "v-add-database-temp-user",
  42. "arg1" => $user,
  43. "arg2" => $database,
  44. "arg3" => "mysql",
  45. "arg4" => $host,
  46. ];
  47. $request = $this->request($post_request);
  48. $json = json_decode($request);
  49. if (json_last_error() == JSON_ERROR_NONE) {
  50. return $json;
  51. } else {
  52. trigger_error("Unable to connect over API please check api connection", E_USER_WARNING);
  53. return false;
  54. }
  55. }
  56. /* Delete an new temp user in mysql */
  57. public function delete_temp_user($database, $user, $dbuser, $host) {
  58. $post_request = [
  59. "hash" => $this->key,
  60. "returncode" => "yes",
  61. "cmd" => "v-delete-database-temp-user",
  62. "arg1" => $user,
  63. "arg2" => $database,
  64. "arg3" => $dbuser,
  65. "arg4" => "mysql",
  66. "arg5" => $host,
  67. ];
  68. $request = $this->request($post_request);
  69. if (is_numeric($request) && $request == 0) {
  70. return true;
  71. } else {
  72. return false;
  73. }
  74. }
  75. public function get_user_ip() {
  76. // Saving user IPs to the session for preventing session hijacking
  77. $user_combined_ip = [];
  78. if ($_SERVER["REMOTE_ADDR"] != $_SERVER["SERVER_ADDR"]) {
  79. $user_combined_ip[] = $_SERVER["REMOTE_ADDR"];
  80. }
  81. if (isset($_SERVER["HTTP_CLIENT_IP"])) {
  82. $user_combined_ip .= "|" . $_SERVER["HTTP_CLIENT_IP"];
  83. }
  84. if (isset($_SERVER["HTTP_X_FORWARDED_FOR"])) {
  85. if ($_SERVER["REMOTE_ADDR"] != $_SERVER["HTTP_X_FORWARDED_FOR"]) {
  86. $user_combined_ip[] = $_SERVER["HTTP_X_FORWARDED_FOR"];
  87. }
  88. }
  89. if (isset($_SERVER["HTTP_FORWARDED_FOR"])) {
  90. if ($_SERVER["REMOTE_ADDR"] != $_SERVER["HTTP_FORWARDED_FOR"]) {
  91. $user_combined_ip[] = $_SERVER["HTTP_FORWARDED_FOR"];
  92. }
  93. }
  94. if (isset($_SERVER["HTTP_X_FORWARDED"])) {
  95. if ($_SERVER["REMOTE_ADDR"] != $_SERVER["HTTP_X_FORWARDED"]) {
  96. $user_combined_ip[] = $_SERVER["HTTP_X_FORWARDED"];
  97. }
  98. }
  99. if (isset($_SERVER["HTTP_FORWARDED"])) {
  100. if ($_SERVER["REMOTE_ADDR"] != $_SERVER["HTTP_FORWARDED"]) {
  101. $user_combined_ip[] = "|" . $_SERVER["HTTP_FORWARDED"];
  102. }
  103. }
  104. if (isset($_SERVER["HTTP_CF_CONNECTING_IP"])) {
  105. if (!empty($_SERVER["HTTP_CF_CONNECTING_IP"])) {
  106. $user_combined_ip[] = $_SERVER["HTTP_CF_CONNECTING_IP"];
  107. }
  108. }
  109. return implode("|", $user_combined_ip);
  110. }
  111. }
  112. function verify_token($database, $user, $ip, $time, $token) {
  113. if (!password_verify($database . $user . $ip . $time . PHPMYADMIN_KEY, $token)) {
  114. if (
  115. !password_verify(
  116. $database . $user . $_SERVER["SERVER_ADDR"] . "|" . $ip . $time . PHPMYADMIN_KEY,
  117. $token,
  118. )
  119. ) {
  120. trigger_error(
  121. "Access denied: There is a security token mismatch " . $time,
  122. E_USER_WARNING,
  123. );
  124. session_invalid();
  125. }
  126. }
  127. return;
  128. }
  129. /* Need to have cookie visible from parent directory */
  130. session_set_cookie_params(0, "/", "", true, true);
  131. /* Create signon session */
  132. $session_name = "SignonSession";
  133. session_name($session_name);
  134. @session_start();
  135. function session_invalid() {
  136. global $session_name;
  137. //delete all current sessions
  138. session_destroy();
  139. setcookie($session_name, null, -1, "/");
  140. header("Location: " . dirname($_SERVER["PHP_SELF"]) . "/index.php");
  141. die();
  142. }
  143. $api = new Hestia_API();
  144. if (!empty($_GET)) {
  145. if (isset($_GET["logout"])) {
  146. $api->delete_temp_user(
  147. $_SESSION["HESTIA_sso_database"],
  148. $_SESSION["HESTIA_sso_user"],
  149. $_SESSION["PMA_single_signon_user"],
  150. $_SESSION["HESTIA_sso_host"],
  151. );
  152. //remove session
  153. session_invalid();
  154. } else {
  155. if (isset($_GET["user"]) && isset($_GET["hestia_token"])) {
  156. $database = $_GET["database"];
  157. $user = $_GET["user"];
  158. $host = "localhost";
  159. $token = $_GET["hestia_token"];
  160. if (is_numeric($_GET["exp"])) {
  161. $time = $_GET["exp"];
  162. } else {
  163. $time = 0;
  164. }
  165. if ($time + 60 > time()) {
  166. //note: Possible issues with cloudflare due to ip obfuscation
  167. $ip = $api->get_user_ip();
  168. verify_token($database, $user, $ip, $time, $token);
  169. $id = session_id();
  170. //create a new temp user
  171. $data = $api->create_temp_user($database, $user, $host);
  172. if ($data) {
  173. $_SESSION["PMA_single_signon_user"] = $data->login->user;
  174. $_SESSION["PMA_single_signon_password"] = $data->login->password;
  175. $_SESSION["PMA_single_signon_host"] = $host;
  176. //save database / username to be used for sending logout notification.
  177. $_SESSION["HESTIA_sso_user"] = $user;
  178. $_SESSION["HESTIA_sso_database"] = $database;
  179. $_SESSION["HESTIA_sso_host"] = $host;
  180. @session_write_close();
  181. setcookie($session_name, $id, 0, "/");
  182. header("Location: " . dirname($_SERVER["PHP_SELF"]) . "/index.php");
  183. die();
  184. } else {
  185. session_invalid();
  186. }
  187. } else {
  188. trigger_error(
  189. "Link has been expired: System time: " .
  190. time() .
  191. " / Time provided in link: " .
  192. $time,
  193. E_USER_WARNING,
  194. );
  195. session_invalid();
  196. }
  197. }
  198. }
  199. } else {
  200. session_invalid();
  201. }