123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109 |
- <?php
- /*
- * This file is part of the Symfony package.
- *
- * (c) Fabien Potencier <fabien@symfony.com>
- *
- * For the full copyright and license information, please view the LICENSE
- * file that was distributed with this source code.
- */
- namespace Symfony\Component\Security\Core\Authentication\Provider;
- use Symfony\Component\Ldap\Exception\ConnectionException;
- use Symfony\Component\Ldap\LdapInterface;
- use Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken;
- use Symfony\Component\Security\Core\Exception\BadCredentialsException;
- use Symfony\Component\Security\Core\Exception\LogicException;
- use Symfony\Component\Security\Core\Exception\UsernameNotFoundException;
- use Symfony\Component\Security\Core\User\UserCheckerInterface;
- use Symfony\Component\Security\Core\User\UserInterface;
- use Symfony\Component\Security\Core\User\UserProviderInterface;
- /**
- * LdapBindAuthenticationProvider authenticates a user against an LDAP server.
- *
- * The only way to check user credentials is to try to connect the user with its
- * credentials to the ldap.
- *
- * @author Charles Sarrazin <charles@sarraz.in>
- */
- class LdapBindAuthenticationProvider extends UserAuthenticationProvider
- {
- private $userProvider;
- private $ldap;
- private $dnString;
- private $queryString;
- private $searchDn;
- private $searchPassword;
- public function __construct(UserProviderInterface $userProvider, UserCheckerInterface $userChecker, string $providerKey, LdapInterface $ldap, string $dnString = '{username}', bool $hideUserNotFoundExceptions = true, string $searchDn = '', string $searchPassword = '')
- {
- parent::__construct($userChecker, $providerKey, $hideUserNotFoundExceptions);
- $this->userProvider = $userProvider;
- $this->ldap = $ldap;
- $this->dnString = $dnString;
- $this->searchDn = $searchDn;
- $this->searchPassword = $searchPassword;
- }
- /**
- * Set a query string to use in order to find a DN for the username.
- */
- public function setQueryString(string $queryString)
- {
- $this->queryString = $queryString;
- }
- /**
- * {@inheritdoc}
- */
- protected function retrieveUser(string $username, UsernamePasswordToken $token)
- {
- if (AuthenticationProviderInterface::USERNAME_NONE_PROVIDED === $username) {
- throw new UsernameNotFoundException('Username can not be null.');
- }
- return $this->userProvider->loadUserByUsername($username);
- }
- /**
- * {@inheritdoc}
- */
- protected function checkAuthentication(UserInterface $user, UsernamePasswordToken $token)
- {
- $username = $token->getUsername();
- $password = $token->getCredentials();
- if ('' === (string) $password) {
- throw new BadCredentialsException('The presented password must not be empty.');
- }
- try {
- if ($this->queryString) {
- if ('' !== $this->searchDn && '' !== $this->searchPassword) {
- $this->ldap->bind($this->searchDn, $this->searchPassword);
- } else {
- throw new LogicException('Using the "query_string" config without using a "search_dn" and a "search_password" is not supported.');
- }
- $username = $this->ldap->escape($username, '', LdapInterface::ESCAPE_FILTER);
- $query = str_replace('{username}', $username, $this->queryString);
- $result = $this->ldap->query($this->dnString, $query)->execute();
- if (1 !== $result->count()) {
- throw new BadCredentialsException('The presented username is invalid.');
- }
- $dn = $result[0]->getDn();
- } else {
- $username = $this->ldap->escape($username, '', LdapInterface::ESCAPE_DN);
- $dn = str_replace('{username}', $username, $this->dnString);
- }
- $this->ldap->bind($dn, $password);
- } catch (ConnectionException $e) {
- throw new BadCredentialsException('The presented password is invalid.');
- }
- }
- }
|