2013-07-18 07:09:21 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class ParameterConfirmationToken
|
|
|
|
*
|
|
|
|
* When you need to use a dangerous GET parameter that needs to be set before core/Core.php is
|
|
|
|
* established, this class takes care of allowing some other code of confirming the parameter,
|
|
|
|
* by generating a one-time-use token & redirecting with that token included in the redirected URL
|
|
|
|
*
|
|
|
|
* WARNING: This class is experimental and designed specifically for use pre-startup in main.php
|
|
|
|
* It will likely be heavily refactored before the release of 3.2
|
|
|
|
*/
|
|
|
|
class ParameterConfirmationToken {
|
|
|
|
protected $parameterName = null;
|
|
|
|
protected $parameter = null;
|
|
|
|
protected $token = null;
|
|
|
|
|
|
|
|
protected function pathForToken($token) {
|
2013-07-22 03:52:00 +02:00
|
|
|
return TEMP_FOLDER.'/token_'.preg_replace('/[^a-z0-9]+/', '', $token);
|
2013-07-18 07:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
protected function genToken() {
|
|
|
|
// Generate a new random token (as random as possible)
|
2013-07-19 04:33:56 +02:00
|
|
|
require_once(dirname(dirname(dirname(__FILE__))).'/security/RandomGenerator.php');
|
2013-07-18 07:09:21 +02:00
|
|
|
$rg = new RandomGenerator();
|
|
|
|
$token = $rg->randomToken('md5');
|
|
|
|
|
|
|
|
// Store a file in the session save path (safer than /tmp, as open_basedir might limit that)
|
|
|
|
file_put_contents($this->pathForToken($token), $token);
|
|
|
|
|
|
|
|
return $token;
|
|
|
|
}
|
|
|
|
|
|
|
|
protected function checkToken($token) {
|
|
|
|
$file = $this->pathForToken($token);
|
|
|
|
$content = null;
|
|
|
|
|
|
|
|
if (file_exists($file)) {
|
|
|
|
$content = file_get_contents($file);
|
|
|
|
unlink($file);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $content == $token;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function __construct($parameterName) {
|
|
|
|
// Store the parameter name
|
|
|
|
$this->parameterName = $parameterName;
|
|
|
|
// Store the parameter value
|
|
|
|
$this->parameter = isset($_GET[$parameterName]) ? $_GET[$parameterName] : null;
|
|
|
|
// Store the token
|
|
|
|
$this->token = isset($_GET[$parameterName.'token']) ? $_GET[$parameterName.'token'] : null;
|
|
|
|
|
2013-07-19 04:47:05 +02:00
|
|
|
// If a token was provided, but isn't valid, ignore it
|
|
|
|
if ($this->token && (!$this->checkToken($this->token))) $this->token = null;
|
2013-07-18 07:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
public function parameterProvided() {
|
|
|
|
return $this->parameter !== null;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function tokenProvided() {
|
|
|
|
return $this->token !== null;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function params() {
|
|
|
|
return array(
|
|
|
|
$this->parameterName => $this->parameter,
|
|
|
|
$this->parameterName.'token' => $this->genToken()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2013-08-19 01:35:34 +02:00
|
|
|
/** What to use instead of BASE_URL. Must not contain protocol or host. @var string */
|
|
|
|
static public $alternateBaseURL = null;
|
|
|
|
|
|
|
|
protected function currentAbsoluteURL() {
|
2013-07-18 07:09:21 +02:00
|
|
|
global $url;
|
|
|
|
|
2014-05-22 08:34:15 +02:00
|
|
|
// Are we http or https? Replicates Director::is_https() without its dependencies/
|
2013-07-18 07:09:21 +02:00
|
|
|
$proto = 'http';
|
2014-05-22 08:34:15 +02:00
|
|
|
if(
|
|
|
|
isset($_SERVER['HTTP_X_FORWARDED_PROTO'])
|
|
|
|
&& strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == 'https'
|
|
|
|
) {
|
|
|
|
// Convention for (non-standard) proxy signaling a HTTPS forward,
|
|
|
|
// see https://en.wikipedia.org/wiki/List_of_HTTP_header_fields
|
|
|
|
$proto = 'https';
|
|
|
|
} else if(
|
|
|
|
isset($_SERVER['HTTP_X_FORWARDED_PROTOCOL'])
|
|
|
|
&& strtolower($_SERVER['HTTP_X_FORWARDED_PROTOCOL']) == 'https'
|
|
|
|
) {
|
|
|
|
// Less conventional proxy header
|
|
|
|
$proto = 'https';
|
|
|
|
} else if(
|
|
|
|
isset($_SERVER['HTTP_FRONT_END_HTTPS'])
|
|
|
|
&& strtolower($_SERVER['HTTP_FRONT_END_HTTPS']) == 'on'
|
|
|
|
) {
|
|
|
|
// Microsoft proxy convention: https://support.microsoft.com/?kbID=307347
|
|
|
|
$proto = 'https';
|
|
|
|
} else if((!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] != 'off')) {
|
|
|
|
$proto = 'https';
|
|
|
|
} else if(isset($_SERVER['SSL'])) {
|
|
|
|
$proto = 'https';
|
2013-07-18 07:09:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if((!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] != 'off')) $proto = 'https';
|
|
|
|
if(isset($_SERVER['SSL'])) $proto = 'https';
|
|
|
|
|
2013-08-19 01:35:34 +02:00
|
|
|
$parts = array_filter(array(
|
|
|
|
// What's our host
|
|
|
|
$_SERVER['HTTP_HOST'],
|
|
|
|
// SilverStripe base
|
|
|
|
self::$alternateBaseURL !== null ? self::$alternateBaseURL : BASE_URL,
|
|
|
|
// And URL
|
|
|
|
$url
|
|
|
|
));
|
|
|
|
|
|
|
|
// Join together with protocol into our current absolute URL, avoiding duplicated "/" characters
|
|
|
|
return "$proto://" . preg_replace('#/{2,}#', '/', implode('/', $parts));
|
|
|
|
}
|
|
|
|
|
|
|
|
public function reloadWithToken() {
|
|
|
|
$location = $this->currentAbsoluteURL();
|
2013-07-18 07:09:21 +02:00
|
|
|
|
|
|
|
// What's our GET params (ensuring they include the original parameter + a new token)
|
|
|
|
$params = array_merge($_GET, $this->params());
|
|
|
|
unset($params['url']);
|
|
|
|
|
2013-08-19 01:35:34 +02:00
|
|
|
if ($params) $location .= '?'.http_build_query($params);
|
2013-07-18 07:09:21 +02:00
|
|
|
|
|
|
|
// And redirect
|
2013-07-31 23:44:36 +02:00
|
|
|
if (headers_sent()) {
|
|
|
|
echo "
|
|
|
|
<script>location.href='$location';</script>
|
|
|
|
<noscript><meta http-equiv='refresh' content='0; url=$location'></noscript>
|
|
|
|
You are being redirected. If you are not redirected soon, <a href='$location'>click here to continue the flush</a>
|
|
|
|
";
|
|
|
|
}
|
|
|
|
else header('location: '.$location, true, 302);
|
2013-07-18 07:09:21 +02:00
|
|
|
die;
|
|
|
|
}
|
|
|
|
}
|