nextcloud/apps/workflowengine/lib/Check/RequestRemoteAddress.php

173 lines
5.1 KiB
PHP
Raw Permalink Normal View History

2016-07-28 15:16:01 +03:00
<?php
/**
* @copyright Copyright (c) 2016 Joas Schilling <coding@schilljs.com>
*
* @license GNU AGPL version 3 or any later version
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\WorkflowEngine\Check;
2016-08-01 18:56:33 +03:00
use OCP\IL10N;
2016-07-28 15:16:01 +03:00
use OCP\IRequest;
use OCP\WorkflowEngine\ICheck;
class RequestRemoteAddress implements ICheck {
2016-08-01 18:56:33 +03:00
/** @var IL10N */
protected $l;
2016-07-28 15:16:01 +03:00
/** @var IRequest */
protected $request;
/**
2016-08-01 18:56:33 +03:00
* @param IL10N $l
2016-07-28 15:16:01 +03:00
* @param IRequest $request
*/
2016-08-01 18:56:33 +03:00
public function __construct(IL10N $l, IRequest $request) {
$this->l = $l;
2016-07-28 15:16:01 +03:00
$this->request = $request;
}
/**
* @param string $operator
* @param string $value
* @return bool
*/
public function executeCheck($operator, $value) {
$actualValue = $this->request->getRemoteAddress();
$decodedValue = explode('/', $value);
if ($operator === 'matchesIPv4') {
return $this->matchIPv4($actualValue, $decodedValue[0], $decodedValue[1]);
} elseif ($operator === '!matchesIPv4') {
2016-07-28 15:16:01 +03:00
return !$this->matchIPv4($actualValue, $decodedValue[0], $decodedValue[1]);
} elseif ($operator === 'matchesIPv6') {
2016-07-28 15:16:01 +03:00
return $this->matchIPv6($actualValue, $decodedValue[0], $decodedValue[1]);
} else {
return !$this->matchIPv6($actualValue, $decodedValue[0], $decodedValue[1]);
}
}
/**
* @param string $operator
* @param string $value
* @throws \UnexpectedValueException
*/
public function validateCheck($operator, $value) {
if (!in_array($operator, ['matchesIPv4', '!matchesIPv4', 'matchesIPv6', '!matchesIPv6'])) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given operator is invalid'), 1);
2016-07-28 15:16:01 +03:00
}
$decodedValue = explode('/', $value);
if (count($decodedValue) !== 2) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given IP range is invalid'), 2);
2016-07-28 15:16:01 +03:00
}
if (in_array($operator, ['matchesIPv4', '!matchesIPv4'])) {
if (!filter_var($decodedValue[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given IP range is not valid for IPv4'), 3);
2016-07-28 15:16:01 +03:00
}
if ($decodedValue[1] > 32 || $decodedValue[1] <= 0) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given IP range is not valid for IPv4'), 4);
2016-07-28 15:16:01 +03:00
}
} else {
if (!filter_var($decodedValue[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6)) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given IP range is not valid for IPv6'), 3);
2016-07-28 15:16:01 +03:00
}
if ($decodedValue[1] > 128 || $decodedValue[1] <= 0) {
2016-08-01 18:56:33 +03:00
throw new \UnexpectedValueException($this->l->t('The given IP range is not valid for IPv6'), 4);
2016-07-28 15:16:01 +03:00
}
}
}
/**
* Based on https://stackoverflow.com/a/594134
2016-07-28 15:16:01 +03:00
* @param string $ip
* @param string $rangeIp
* @param int $bits
* @return bool
*/
protected function matchIPv4($ip, $rangeIp, $bits) {
$rangeDecimal = ip2long($rangeIp);
$ipDecimal = ip2long($ip);
$mask = -1 << (32 - $bits);
return ($ipDecimal & $mask) === ($rangeDecimal & $mask);
}
/**
* Based on https://stackoverflow.com/a/7951507
2016-07-28 15:16:01 +03:00
* @param string $ip
* @param string $rangeIp
* @param int $bits
* @return bool
*/
protected function matchIPv6($ip, $rangeIp, $bits) {
$ipNet = inet_pton($ip);
$binaryIp = $this->ipv6ToBits($ipNet);
$ipNetBits = substr($binaryIp, 0, $bits);
$rangeNet = inet_pton($rangeIp);
$binaryRange = $this->ipv6ToBits($rangeNet);
$rangeNetBits = substr($binaryRange, 0, $bits);
return $ipNetBits === $rangeNetBits;
}
/**
* Based on https://stackoverflow.com/a/7951507
2016-07-28 15:16:01 +03:00
* @param string $packedIp
* @return string
*/
protected function ipv6ToBits($packedIp) {
$unpackedIp = unpack('A16', $packedIp);
$unpackedIp = str_split($unpackedIp[1]);
$binaryIp = '';
foreach ($unpackedIp as $char) {
$binaryIp .= str_pad(decbin(ord($char)), 8, '0', STR_PAD_LEFT);
}
return str_pad($binaryIp, 128, '0', STR_PAD_RIGHT);
}
/**
* returns a list of Entities the checker supports. The values must match
* the class name of the entity.
*
* An empty result means the check is universally available.
*
* @since 18.0.0
*/
public function supportedEntities(): array {
return [];
}
/**
* returns whether the operation can be used in the requested scope.
*
* Scope IDs are defined as constants in OCP\WorkflowEngine\IManager. At
* time of writing these are SCOPE_ADMIN and SCOPE_USER.
*
* For possibly unknown future scopes the recommended behaviour is: if
* user scope is permitted, the default behaviour should return `true`,
* otherwise `false`.
*
* @since 18.0.0
*/
public function isAvailableForScope(int $scope): bool {
return true;
}
2016-07-28 15:16:01 +03:00
}