vendor/symfony/security-bundle/DependencyInjection/SecurityExtension.php line 721

Open in your IDE?
  1. <?php
  2. /*
  3. * This file is part of the Symfony package.
  4. *
  5. * (c) Fabien Potencier <fabien@symfony.com>
  6. *
  7. * For the full copyright and license information, please view the LICENSE
  8. * file that was distributed with this source code.
  9. */
  10. namespace Symfony\Bundle\SecurityBundle\DependencyInjection;
  11. use Composer\InstalledVersions;
  12. use Symfony\Bridge\Twig\Extension\LogoutUrlExtension;
  13. use Symfony\Bundle\SecurityBundle\DependencyInjection\Security\Factory\AuthenticatorFactoryInterface;
  14. use Symfony\Bundle\SecurityBundle\DependencyInjection\Security\Factory\FirewallListenerFactoryInterface;
  15. use Symfony\Bundle\SecurityBundle\DependencyInjection\Security\Factory\SecurityFactoryInterface;
  16. use Symfony\Bundle\SecurityBundle\DependencyInjection\Security\UserProvider\UserProviderFactoryInterface;
  17. use Symfony\Bundle\SecurityBundle\Security\LegacyLogoutHandlerListener;
  18. use Symfony\Component\Config\Definition\Exception\InvalidConfigurationException;
  19. use Symfony\Component\Config\FileLocator;
  20. use Symfony\Component\Console\Application;
  21. use Symfony\Component\DependencyInjection\Alias;
  22. use Symfony\Component\DependencyInjection\Argument\IteratorArgument;
  23. use Symfony\Component\DependencyInjection\Argument\ServiceClosureArgument;
  24. use Symfony\Component\DependencyInjection\ChildDefinition;
  25. use Symfony\Component\DependencyInjection\Compiler\ServiceLocatorTagPass;
  26. use Symfony\Component\DependencyInjection\ContainerBuilder;
  27. use Symfony\Component\DependencyInjection\Definition;
  28. use Symfony\Component\DependencyInjection\Extension\PrependExtensionInterface;
  29. use Symfony\Component\DependencyInjection\Loader\PhpFileLoader;
  30. use Symfony\Component\DependencyInjection\Reference;
  31. use Symfony\Component\EventDispatcher\EventDispatcher;
  32. use Symfony\Component\ExpressionLanguage\ExpressionLanguage;
  33. use Symfony\Component\HttpKernel\DependencyInjection\Extension;
  34. use Symfony\Component\HttpKernel\KernelEvents;
  35. use Symfony\Component\PasswordHasher\Hasher\NativePasswordHasher;
  36. use Symfony\Component\PasswordHasher\Hasher\Pbkdf2PasswordHasher;
  37. use Symfony\Component\PasswordHasher\Hasher\PlaintextPasswordHasher;
  38. use Symfony\Component\PasswordHasher\Hasher\SodiumPasswordHasher;
  39. use Symfony\Component\Security\Core\Authorization\Strategy\AffirmativeStrategy;
  40. use Symfony\Component\Security\Core\Authorization\Strategy\ConsensusStrategy;
  41. use Symfony\Component\Security\Core\Authorization\Strategy\PriorityStrategy;
  42. use Symfony\Component\Security\Core\Authorization\Strategy\UnanimousStrategy;
  43. use Symfony\Component\Security\Core\Authorization\Voter\VoterInterface;
  44. use Symfony\Component\Security\Core\Encoder\NativePasswordEncoder;
  45. use Symfony\Component\Security\Core\Encoder\SodiumPasswordEncoder;
  46. use Symfony\Component\Security\Core\User\ChainUserProvider;
  47. use Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface;
  48. use Symfony\Component\Security\Core\User\UserProviderInterface;
  49. use Symfony\Component\Security\Http\Authenticator\Debug\TraceableAuthenticatorManagerListener;
  50. use Symfony\Component\Security\Http\Event\CheckPassportEvent;
  51. /**
  52. * SecurityExtension.
  53. *
  54. * @author Fabien Potencier <fabien@symfony.com>
  55. * @author Johannes M. Schmitt <schmittjoh@gmail.com>
  56. */
  57. class SecurityExtension extends Extension implements PrependExtensionInterface
  58. {
  59. private $requestMatchers = [];
  60. private $expressions = [];
  61. private $contextListeners = [];
  62. /** @var list<array{int, AuthenticatorFactoryInterface|SecurityFactoryInterface}> */
  63. private $factories = [];
  64. /** @var list<AuthenticatorFactoryInterface|SecurityFactoryInterface> */
  65. private $sortedFactories = [];
  66. private $userProviderFactories = [];
  67. private $statelessFirewallKeys = [];
  68. private $authenticatorManagerEnabled = false;
  69. public function prepend(ContainerBuilder $container)
  70. {
  71. foreach ($this->getSortedFactories() as $factory) {
  72. if ($factory instanceof PrependExtensionInterface) {
  73. $factory->prepend($container);
  74. }
  75. }
  76. }
  77. public function load(array $configs, ContainerBuilder $container)
  78. {
  79. if (!class_exists(InstalledVersions::class)) {
  80. trigger_deprecation('symfony/security-bundle', '5.4', 'Configuring Symfony without the Composer Runtime API is deprecated. Consider upgrading to Composer 2.1 or later.');
  81. }
  82. if (!array_filter($configs)) {
  83. return;
  84. }
  85. $mainConfig = $this->getConfiguration($configs, $container);
  86. $config = $this->processConfiguration($mainConfig, $configs);
  87. // load services
  88. $loader = new PhpFileLoader($container, new FileLocator(\dirname(__DIR__).'/Resources/config'));
  89. $loader->load('security.php');
  90. $loader->load('password_hasher.php');
  91. $loader->load('security_listeners.php');
  92. $loader->load('security_rememberme.php');
  93. if ($this->authenticatorManagerEnabled = $config['enable_authenticator_manager']) {
  94. if ($config['always_authenticate_before_granting']) {
  95. throw new InvalidConfigurationException('The security option "always_authenticate_before_granting" cannot be used when "enable_authenticator_manager" is set to true. If you rely on this behavior, set it to false.');
  96. }
  97. $loader->load('security_authenticator.php');
  98. // The authenticator system no longer has anonymous tokens. This makes sure AccessListener
  99. // and AuthorizationChecker do not throw AuthenticationCredentialsNotFoundException when no
  100. // token is available in the token storage.
  101. $container->getDefinition('security.access_listener')->setArgument(3, false);
  102. $container->getDefinition('security.authorization_checker')->setArgument(3, false);
  103. $container->getDefinition('security.authorization_checker')->setArgument(4, false);
  104. } else {
  105. trigger_deprecation('symfony/security-bundle', '5.3', 'Not setting the "security.enable_authenticator_manager" config option to true is deprecated.');
  106. if ($config['always_authenticate_before_granting']) {
  107. $authorizationChecker = $container->getDefinition('security.authorization_checker');
  108. $authorizationCheckerArgs = $authorizationChecker->getArguments();
  109. array_splice($authorizationCheckerArgs, 1, 0, [new Reference('security.authentication.manager')]);
  110. $authorizationChecker->setArguments($authorizationCheckerArgs);
  111. }
  112. $loader->load('security_legacy.php');
  113. }
  114. if ($container::willBeAvailable('symfony/twig-bridge', LogoutUrlExtension::class, ['symfony/security-bundle'], true)) {
  115. $loader->load('templating_twig.php');
  116. }
  117. $loader->load('collectors.php');
  118. $loader->load('guard.php');
  119. $container->getDefinition('data_collector.security')->addArgument($this->authenticatorManagerEnabled);
  120. if ($container->hasParameter('kernel.debug') && $container->getParameter('kernel.debug')) {
  121. $loader->load('security_debug.php');
  122. }
  123. if (!$container::willBeAvailable('symfony/expression-language', ExpressionLanguage::class, ['symfony/security-bundle'], true)) {
  124. $container->removeDefinition('security.expression_language');
  125. $container->removeDefinition('security.access.expression_voter');
  126. }
  127. // set some global scalars
  128. $container->setParameter('security.access.denied_url', $config['access_denied_url']);
  129. $container->setParameter('security.authentication.manager.erase_credentials', $config['erase_credentials']);
  130. $container->setParameter('security.authentication.session_strategy.strategy', $config['session_fixation_strategy']);
  131. if (isset($config['access_decision_manager']['service'])) {
  132. $container->setAlias('security.access.decision_manager', $config['access_decision_manager']['service']);
  133. } elseif (isset($config['access_decision_manager']['strategy_service'])) {
  134. $container
  135. ->getDefinition('security.access.decision_manager')
  136. ->addArgument(new Reference($config['access_decision_manager']['strategy_service']));
  137. } else {
  138. $container
  139. ->getDefinition('security.access.decision_manager')
  140. ->addArgument($this->createStrategyDefinition(
  141. $config['access_decision_manager']['strategy'] ?? MainConfiguration::STRATEGY_AFFIRMATIVE,
  142. $config['access_decision_manager']['allow_if_all_abstain'],
  143. $config['access_decision_manager']['allow_if_equal_granted_denied']
  144. ));
  145. }
  146. $container->setParameter('security.access.always_authenticate_before_granting', $config['always_authenticate_before_granting']);
  147. $container->setParameter('security.authentication.hide_user_not_found', $config['hide_user_not_found']);
  148. if (class_exists(Application::class)) {
  149. $loader->load('debug_console.php');
  150. $debugCommand = $container->getDefinition('security.command.debug_firewall');
  151. $debugCommand->replaceArgument(4, $this->authenticatorManagerEnabled);
  152. }
  153. $this->createFirewalls($config, $container);
  154. $this->createAuthorization($config, $container);
  155. $this->createRoleHierarchy($config, $container);
  156. $container->getDefinition('security.authentication.guard_handler')
  157. ->replaceArgument(2, $this->statelessFirewallKeys);
  158. // @deprecated since Symfony 5.3
  159. if ($config['encoders']) {
  160. $this->createEncoders($config['encoders'], $container);
  161. }
  162. if ($config['password_hashers']) {
  163. $this->createHashers($config['password_hashers'], $container);
  164. }
  165. if (class_exists(Application::class)) {
  166. $loader->load('console.php');
  167. // @deprecated since Symfony 5.3
  168. $container->getDefinition('security.command.user_password_encoder')->replaceArgument(1, array_keys($config['encoders']));
  169. $container->getDefinition('security.command.user_password_hash')->replaceArgument(1, array_keys($config['password_hashers']));
  170. }
  171. $container->registerForAutoconfiguration(VoterInterface::class)
  172. ->addTag('security.voter');
  173. }
  174. /**
  175. * @throws \InvalidArgumentException if the $strategy is invalid
  176. */
  177. private function createStrategyDefinition(string $strategy, bool $allowIfAllAbstainDecisions, bool $allowIfEqualGrantedDeniedDecisions): Definition
  178. {
  179. switch ($strategy) {
  180. case MainConfiguration::STRATEGY_AFFIRMATIVE:
  181. return new Definition(AffirmativeStrategy::class, [$allowIfAllAbstainDecisions]);
  182. case MainConfiguration::STRATEGY_CONSENSUS:
  183. return new Definition(ConsensusStrategy::class, [$allowIfAllAbstainDecisions, $allowIfEqualGrantedDeniedDecisions]);
  184. case MainConfiguration::STRATEGY_UNANIMOUS:
  185. return new Definition(UnanimousStrategy::class, [$allowIfAllAbstainDecisions]);
  186. case MainConfiguration::STRATEGY_PRIORITY:
  187. return new Definition(PriorityStrategy::class, [$allowIfAllAbstainDecisions]);
  188. }
  189. throw new \InvalidArgumentException(sprintf('The strategy "%s" is not supported.', $strategy));
  190. }
  191. private function createRoleHierarchy(array $config, ContainerBuilder $container)
  192. {
  193. if (!isset($config['role_hierarchy']) || 0 === \count($config['role_hierarchy'])) {
  194. $container->removeDefinition('security.access.role_hierarchy_voter');
  195. return;
  196. }
  197. $container->setParameter('security.role_hierarchy.roles', $config['role_hierarchy']);
  198. $container->removeDefinition('security.access.simple_role_voter');
  199. }
  200. private function createAuthorization(array $config, ContainerBuilder $container)
  201. {
  202. foreach ($config['access_control'] as $access) {
  203. $matcher = $this->createRequestMatcher(
  204. $container,
  205. $access['path'],
  206. $access['host'],
  207. $access['port'],
  208. $access['methods'],
  209. $access['ips']
  210. );
  211. $attributes = $access['roles'];
  212. if ($access['allow_if']) {
  213. $attributes[] = $this->createExpression($container, $access['allow_if']);
  214. }
  215. $emptyAccess = 0 === \count(array_filter($access));
  216. if ($emptyAccess) {
  217. throw new InvalidConfigurationException('One or more access control items are empty. Did you accidentally add lines only containing a "-" under "security.access_control"?');
  218. }
  219. $container->getDefinition('security.access_map')
  220. ->addMethodCall('add', [$matcher, $attributes, $access['requires_channel']]);
  221. }
  222. // allow cache warm-up for expressions
  223. if (\count($this->expressions)) {
  224. $container->getDefinition('security.cache_warmer.expression')
  225. ->replaceArgument(0, new IteratorArgument(array_values($this->expressions)));
  226. } else {
  227. $container->removeDefinition('security.cache_warmer.expression');
  228. }
  229. }
  230. private function createFirewalls(array $config, ContainerBuilder $container)
  231. {
  232. if (!isset($config['firewalls'])) {
  233. return;
  234. }
  235. $firewalls = $config['firewalls'];
  236. $providerIds = $this->createUserProviders($config, $container);
  237. $container->setParameter('security.firewalls', array_keys($firewalls));
  238. // make the ContextListener aware of the configured user providers
  239. $contextListenerDefinition = $container->getDefinition('security.context_listener');
  240. $arguments = $contextListenerDefinition->getArguments();
  241. $userProviders = [];
  242. foreach ($providerIds as $userProviderId) {
  243. $userProviders[] = new Reference($userProviderId);
  244. }
  245. $arguments[1] = $userProviderIteratorsArgument = new IteratorArgument($userProviders);
  246. $contextListenerDefinition->setArguments($arguments);
  247. $nbUserProviders = \count($userProviders);
  248. if ($nbUserProviders > 1) {
  249. $container->setDefinition('security.user_providers', new Definition(ChainUserProvider::class, [$userProviderIteratorsArgument]))
  250. ->setPublic(false);
  251. } elseif (0 === $nbUserProviders) {
  252. $container->removeDefinition('security.listener.user_provider');
  253. } else {
  254. $container->setAlias('security.user_providers', new Alias(current($providerIds)))->setPublic(false);
  255. }
  256. if (1 === \count($providerIds)) {
  257. $container->setAlias(UserProviderInterface::class, current($providerIds));
  258. }
  259. $customUserChecker = false;
  260. // load firewall map
  261. $mapDef = $container->getDefinition('security.firewall.map');
  262. $map = $authenticationProviders = $contextRefs = [];
  263. foreach ($firewalls as $name => $firewall) {
  264. if (isset($firewall['user_checker']) && 'security.user_checker' !== $firewall['user_checker']) {
  265. $customUserChecker = true;
  266. }
  267. $configId = 'security.firewall.map.config.'.$name;
  268. [$matcher, $listeners, $exceptionListener, $logoutListener] = $this->createFirewall($container, $name, $firewall, $authenticationProviders, $providerIds, $configId);
  269. $contextId = 'security.firewall.map.context.'.$name;
  270. $isLazy = !$firewall['stateless'] && (!empty($firewall['anonymous']['lazy']) || $firewall['lazy']);
  271. $context = new ChildDefinition($isLazy ? 'security.firewall.lazy_context' : 'security.firewall.context');
  272. $context = $container->setDefinition($contextId, $context);
  273. $context
  274. ->replaceArgument(0, new IteratorArgument($listeners))
  275. ->replaceArgument(1, $exceptionListener)
  276. ->replaceArgument(2, $logoutListener)
  277. ->replaceArgument(3, new Reference($configId))
  278. ;
  279. $contextRefs[$contextId] = new Reference($contextId);
  280. $map[$contextId] = $matcher;
  281. }
  282. $container->setAlias('security.firewall.context_locator', (string) ServiceLocatorTagPass::register($container, $contextRefs));
  283. $mapDef->replaceArgument(0, new Reference('security.firewall.context_locator'));
  284. $mapDef->replaceArgument(1, new IteratorArgument($map));
  285. if (!$this->authenticatorManagerEnabled) {
  286. // add authentication providers to authentication manager
  287. $authenticationProviders = array_map(function ($id) {
  288. return new Reference($id);
  289. }, array_values(array_unique($authenticationProviders)));
  290. $container
  291. ->getDefinition('security.authentication.manager')
  292. ->replaceArgument(0, new IteratorArgument($authenticationProviders));
  293. }
  294. // register an autowire alias for the UserCheckerInterface if no custom user checker service is configured
  295. if (!$customUserChecker) {
  296. $container->setAlias('Symfony\Component\Security\Core\User\UserCheckerInterface', new Alias('security.user_checker', false));
  297. }
  298. }
  299. private function createFirewall(ContainerBuilder $container, string $id, array $firewall, array &$authenticationProviders, array $providerIds, string $configId)
  300. {
  301. $config = $container->setDefinition($configId, new ChildDefinition('security.firewall.config'));
  302. $config->replaceArgument(0, $id);
  303. $config->replaceArgument(1, $firewall['user_checker']);
  304. // Matcher
  305. $matcher = null;
  306. if (isset($firewall['request_matcher'])) {
  307. $matcher = new Reference($firewall['request_matcher']);
  308. } elseif (isset($firewall['pattern']) || isset($firewall['host'])) {
  309. $pattern = $firewall['pattern'] ?? null;
  310. $host = $firewall['host'] ?? null;
  311. $methods = $firewall['methods'] ?? [];
  312. $matcher = $this->createRequestMatcher($container, $pattern, $host, null, $methods);
  313. }
  314. $config->replaceArgument(2, $matcher ? (string) $matcher : null);
  315. $config->replaceArgument(3, $firewall['security']);
  316. // Security disabled?
  317. if (false === $firewall['security']) {
  318. return [$matcher, [], null, null];
  319. }
  320. $config->replaceArgument(4, $firewall['stateless']);
  321. $firewallEventDispatcherId = 'security.event_dispatcher.'.$id;
  322. // Provider id (must be configured explicitly per firewall/authenticator if more than one provider is set)
  323. $defaultProvider = null;
  324. if (isset($firewall['provider'])) {
  325. if (!isset($providerIds[$normalizedName = str_replace('-', '_', $firewall['provider'])])) {
  326. throw new InvalidConfigurationException(sprintf('Invalid firewall "%s": user provider "%s" not found.', $id, $firewall['provider']));
  327. }
  328. $defaultProvider = $providerIds[$normalizedName];
  329. if ($this->authenticatorManagerEnabled) {
  330. $container->setDefinition('security.listener.'.$id.'.user_provider', new ChildDefinition('security.listener.user_provider.abstract'))
  331. ->addTag('kernel.event_listener', ['dispatcher' => $firewallEventDispatcherId, 'event' => CheckPassportEvent::class, 'priority' => 2048, 'method' => 'checkPassport'])
  332. ->replaceArgument(0, new Reference($defaultProvider));
  333. }
  334. } elseif (1 === \count($providerIds)) {
  335. $defaultProvider = reset($providerIds);
  336. }
  337. $config->replaceArgument(5, $defaultProvider);
  338. // Register Firewall-specific event dispatcher
  339. $container->register($firewallEventDispatcherId, EventDispatcher::class)
  340. ->addTag('event_dispatcher.dispatcher', ['name' => $firewallEventDispatcherId]);
  341. // Register listeners
  342. $listeners = [];
  343. $listenerKeys = [];
  344. // Channel listener
  345. $listeners[] = new Reference('security.channel_listener');
  346. $contextKey = null;
  347. $contextListenerId = null;
  348. // Context serializer listener
  349. if (false === $firewall['stateless']) {
  350. $contextKey = $firewall['context'] ?? $id;
  351. $listeners[] = new Reference($contextListenerId = $this->createContextListener($container, $contextKey, $this->authenticatorManagerEnabled ? $firewallEventDispatcherId : null));
  352. $sessionStrategyId = 'security.authentication.session_strategy';
  353. if ($this->authenticatorManagerEnabled) {
  354. $container
  355. ->setDefinition('security.listener.session.'.$id, new ChildDefinition('security.listener.session'))
  356. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  357. }
  358. } else {
  359. $this->statelessFirewallKeys[] = $id;
  360. $sessionStrategyId = 'security.authentication.session_strategy_noop';
  361. }
  362. $container->setAlias(new Alias('security.authentication.session_strategy.'.$id, false), $sessionStrategyId);
  363. $config->replaceArgument(6, $contextKey);
  364. // Logout listener
  365. $logoutListenerId = null;
  366. if (isset($firewall['logout'])) {
  367. $logoutListenerId = 'security.logout_listener.'.$id;
  368. $logoutListener = $container->setDefinition($logoutListenerId, new ChildDefinition('security.logout_listener'));
  369. $logoutListener->replaceArgument(2, new Reference($firewallEventDispatcherId));
  370. $logoutListener->replaceArgument(3, [
  371. 'csrf_parameter' => $firewall['logout']['csrf_parameter'],
  372. 'csrf_token_id' => $firewall['logout']['csrf_token_id'],
  373. 'logout_path' => $firewall['logout']['path'],
  374. ]);
  375. // add default logout listener
  376. if (isset($firewall['logout']['success_handler'])) {
  377. // deprecated, to be removed in Symfony 6.0
  378. $logoutSuccessHandlerId = $firewall['logout']['success_handler'];
  379. $container->register('security.logout.listener.legacy_success_listener.'.$id, LegacyLogoutHandlerListener::class)
  380. ->setArguments([new Reference($logoutSuccessHandlerId)])
  381. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  382. } else {
  383. $logoutSuccessListenerId = 'security.logout.listener.default.'.$id;
  384. $container->setDefinition($logoutSuccessListenerId, new ChildDefinition('security.logout.listener.default'))
  385. ->replaceArgument(1, $firewall['logout']['target'])
  386. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  387. }
  388. // add CSRF provider
  389. if (isset($firewall['logout']['csrf_token_generator'])) {
  390. $logoutListener->addArgument(new Reference($firewall['logout']['csrf_token_generator']));
  391. }
  392. // add session logout listener
  393. if (true === $firewall['logout']['invalidate_session'] && false === $firewall['stateless']) {
  394. $container->setDefinition('security.logout.listener.session.'.$id, new ChildDefinition('security.logout.listener.session'))
  395. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  396. }
  397. // add cookie logout listener
  398. if (\count($firewall['logout']['delete_cookies']) > 0) {
  399. $container->setDefinition('security.logout.listener.cookie_clearing.'.$id, new ChildDefinition('security.logout.listener.cookie_clearing'))
  400. ->addArgument($firewall['logout']['delete_cookies'])
  401. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  402. }
  403. // add custom listeners (deprecated)
  404. foreach ($firewall['logout']['handlers'] as $i => $handlerId) {
  405. $container->register('security.logout.listener.legacy_handler.'.$i, LegacyLogoutHandlerListener::class)
  406. ->addArgument(new Reference($handlerId))
  407. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  408. }
  409. // register with LogoutUrlGenerator
  410. $container
  411. ->getDefinition('security.logout_url_generator')
  412. ->addMethodCall('registerListener', [
  413. $id,
  414. $firewall['logout']['path'],
  415. $firewall['logout']['csrf_token_id'],
  416. $firewall['logout']['csrf_parameter'],
  417. isset($firewall['logout']['csrf_token_generator']) ? new Reference($firewall['logout']['csrf_token_generator']) : null,
  418. false === $firewall['stateless'] && isset($firewall['context']) ? $firewall['context'] : null,
  419. ])
  420. ;
  421. }
  422. // Determine default entry point
  423. $configuredEntryPoint = $firewall['entry_point'] ?? null;
  424. // Authentication listeners
  425. $firewallAuthenticationProviders = [];
  426. [$authListeners, $defaultEntryPoint] = $this->createAuthenticationListeners($container, $id, $firewall, $firewallAuthenticationProviders, $defaultProvider, $providerIds, $configuredEntryPoint, $contextListenerId);
  427. if (!$this->authenticatorManagerEnabled) {
  428. $authenticationProviders = array_merge($authenticationProviders, $firewallAuthenticationProviders);
  429. } else {
  430. // $configuredEntryPoint is resolved into a service ID and stored in $defaultEntryPoint
  431. $configuredEntryPoint = $defaultEntryPoint;
  432. // authenticator manager
  433. $authenticators = array_map(function ($id) {
  434. return new Reference($id);
  435. }, $firewallAuthenticationProviders);
  436. $container
  437. ->setDefinition($managerId = 'security.authenticator.manager.'.$id, new ChildDefinition('security.authenticator.manager'))
  438. ->replaceArgument(0, $authenticators)
  439. ->replaceArgument(2, new Reference($firewallEventDispatcherId))
  440. ->replaceArgument(3, $id)
  441. ->replaceArgument(7, $firewall['required_badges'] ?? [])
  442. ->addTag('monolog.logger', ['channel' => 'security'])
  443. ;
  444. $managerLocator = $container->getDefinition('security.authenticator.managers_locator');
  445. $managerLocator->replaceArgument(0, array_merge($managerLocator->getArgument(0), [$id => new ServiceClosureArgument(new Reference($managerId))]));
  446. // authenticator manager listener
  447. $container
  448. ->setDefinition('security.firewall.authenticator.'.$id, new ChildDefinition('security.firewall.authenticator'))
  449. ->replaceArgument(0, new Reference($managerId))
  450. ;
  451. if ($container->hasDefinition('debug.security.firewall') && $this->authenticatorManagerEnabled) {
  452. $container
  453. ->register('debug.security.firewall.authenticator.'.$id, TraceableAuthenticatorManagerListener::class)
  454. ->setDecoratedService('security.firewall.authenticator.'.$id)
  455. ->setArguments([new Reference('debug.security.firewall.authenticator.'.$id.'.inner')])
  456. ->addTag('kernel.reset', ['method' => 'reset'])
  457. ;
  458. }
  459. // user checker listener
  460. $container
  461. ->setDefinition('security.listener.user_checker.'.$id, new ChildDefinition('security.listener.user_checker'))
  462. ->replaceArgument(0, new Reference('security.user_checker.'.$id))
  463. ->addTag('kernel.event_subscriber', ['dispatcher' => $firewallEventDispatcherId]);
  464. $listeners[] = new Reference('security.firewall.authenticator.'.$id);
  465. // Add authenticators to the debug:firewall command
  466. if ($container->hasDefinition('security.command.debug_firewall')) {
  467. $debugCommand = $container->getDefinition('security.command.debug_firewall');
  468. $debugCommand->replaceArgument(3, array_merge($debugCommand->getArgument(3), [$id => $authenticators]));
  469. }
  470. }
  471. $config->replaceArgument(7, $configuredEntryPoint ?: $defaultEntryPoint);
  472. $listeners = array_merge($listeners, $authListeners);
  473. // Switch user listener
  474. if (isset($firewall['switch_user'])) {
  475. $listenerKeys[] = 'switch_user';
  476. $listeners[] = new Reference($this->createSwitchUserListener($container, $id, $firewall['switch_user'], $defaultProvider, $firewall['stateless']));
  477. }
  478. // Access listener
  479. $listeners[] = new Reference('security.access_listener');
  480. // Exception listener
  481. $exceptionListener = new Reference($this->createExceptionListener($container, $firewall, $id, $configuredEntryPoint ?: $defaultEntryPoint, $firewall['stateless']));
  482. $config->replaceArgument(8, $firewall['access_denied_handler'] ?? null);
  483. $config->replaceArgument(9, $firewall['access_denied_url'] ?? null);
  484. $container->setAlias('security.user_checker.'.$id, new Alias($firewall['user_checker'], false));
  485. foreach ($this->getSortedFactories() as $factory) {
  486. $key = str_replace('-', '_', $factory->getKey());
  487. if ('custom_authenticators' !== $key && \array_key_exists($key, $firewall)) {
  488. $listenerKeys[] = $key;
  489. }
  490. }
  491. if ($firewall['custom_authenticators'] ?? false) {
  492. foreach ($firewall['custom_authenticators'] as $customAuthenticatorId) {
  493. $listenerKeys[] = $customAuthenticatorId;
  494. }
  495. }
  496. $config->replaceArgument(10, $listenerKeys);
  497. $config->replaceArgument(11, $firewall['switch_user'] ?? null);
  498. return [$matcher, $listeners, $exceptionListener, null !== $logoutListenerId ? new Reference($logoutListenerId) : null];
  499. }
  500. private function createContextListener(ContainerBuilder $container, string $contextKey, ?string $firewallEventDispatcherId)
  501. {
  502. if (isset($this->contextListeners[$contextKey])) {
  503. return $this->contextListeners[$contextKey];
  504. }
  505. $listenerId = 'security.context_listener.'.\count($this->contextListeners);
  506. $listener = $container->setDefinition($listenerId, new ChildDefinition('security.context_listener'));
  507. $listener->replaceArgument(2, $contextKey);
  508. if (null !== $firewallEventDispatcherId) {
  509. $listener->replaceArgument(4, new Reference($firewallEventDispatcherId));
  510. $listener->addTag('kernel.event_listener', ['event' => KernelEvents::RESPONSE, 'method' => 'onKernelResponse']);
  511. }
  512. return $this->contextListeners[$contextKey] = $listenerId;
  513. }
  514. private function createAuthenticationListeners(ContainerBuilder $container, string $id, array $firewall, array &$authenticationProviders, ?string $defaultProvider, array $providerIds, ?string $defaultEntryPoint, ?string $contextListenerId = null)
  515. {
  516. $listeners = [];
  517. $hasListeners = false;
  518. $entryPoints = [];
  519. foreach ($this->getSortedFactories() as $factory) {
  520. $key = str_replace('-', '_', $factory->getKey());
  521. if (isset($firewall[$key])) {
  522. $userProvider = $this->getUserProvider($container, $id, $firewall, $key, $defaultProvider, $providerIds, $contextListenerId);
  523. if ($this->authenticatorManagerEnabled) {
  524. if (!$factory instanceof AuthenticatorFactoryInterface) {
  525. throw new InvalidConfigurationException(sprintf('Cannot configure AuthenticatorManager as "%s" authentication does not support it, set "security.enable_authenticator_manager" to `false`.', $key));
  526. }
  527. $authenticators = $factory->createAuthenticator($container, $id, $firewall[$key], $userProvider);
  528. if (\is_array($authenticators)) {
  529. foreach ($authenticators as $authenticator) {
  530. $authenticationProviders[] = $authenticator;
  531. $entryPoints[] = $authenticator;
  532. }
  533. } else {
  534. $authenticationProviders[] = $authenticators;
  535. $entryPoints[$key] = $authenticators;
  536. }
  537. } else {
  538. [$provider, $listenerId, $defaultEntryPoint] = $factory->create($container, $id, $firewall[$key], $userProvider, $defaultEntryPoint);
  539. $listeners[] = new Reference($listenerId);
  540. $authenticationProviders[] = $provider;
  541. }
  542. if ($factory instanceof FirewallListenerFactoryInterface) {
  543. $firewallListenerIds = $factory->createListeners($container, $id, $firewall[$key]);
  544. foreach ($firewallListenerIds as $firewallListenerId) {
  545. $listeners[] = new Reference($firewallListenerId);
  546. }
  547. }
  548. $hasListeners = true;
  549. }
  550. }
  551. // the actual entry point is configured by the RegisterEntryPointPass
  552. $container->setParameter('security.'.$id.'._indexed_authenticators', $entryPoints);
  553. if (false === $hasListeners && !$this->authenticatorManagerEnabled) {
  554. throw new InvalidConfigurationException(sprintf('No authentication listener registered for firewall "%s".', $id));
  555. }
  556. return [$listeners, $defaultEntryPoint];
  557. }
  558. private function getUserProvider(ContainerBuilder $container, string $id, array $firewall, string $factoryKey, ?string $defaultProvider, array $providerIds, ?string $contextListenerId): string
  559. {
  560. if (isset($firewall[$factoryKey]['provider'])) {
  561. if (!isset($providerIds[$normalizedName = str_replace('-', '_', $firewall[$factoryKey]['provider'])])) {
  562. throw new InvalidConfigurationException(sprintf('Invalid firewall "%s": user provider "%s" not found.', $id, $firewall[$factoryKey]['provider']));
  563. }
  564. return $providerIds[$normalizedName];
  565. }
  566. if ('remember_me' === $factoryKey && $contextListenerId) {
  567. $container->getDefinition($contextListenerId)->addTag('security.remember_me_aware', ['id' => $id, 'provider' => 'none']);
  568. }
  569. if ($defaultProvider) {
  570. return $defaultProvider;
  571. }
  572. if (!$providerIds) {
  573. $userProvider = sprintf('security.user.provider.missing.%s', $factoryKey);
  574. $container->setDefinition(
  575. $userProvider,
  576. (new ChildDefinition('security.user.provider.missing'))->replaceArgument(0, $id)
  577. );
  578. return $userProvider;
  579. }
  580. if ('remember_me' === $factoryKey || 'anonymous' === $factoryKey || 'custom_authenticators' === $factoryKey) {
  581. if ('custom_authenticators' === $factoryKey) {
  582. trigger_deprecation('symfony/security-bundle', '5.4', 'Not configuring explicitly the provider for the "%s" firewall is deprecated because it\'s ambiguous as there is more than one registered provider. Set the "provider" key to one of the configured providers, even if your custom authenticators don\'t use it.', $id);
  583. }
  584. return 'security.user_providers';
  585. }
  586. throw new InvalidConfigurationException(sprintf('Not configuring explicitly the provider for the "%s" %s on "%s" firewall is ambiguous as there is more than one registered provider.', $factoryKey, $this->authenticatorManagerEnabled ? 'authenticator' : 'listener', $id));
  587. }
  588. private function createEncoders(array $encoders, ContainerBuilder $container)
  589. {
  590. $encoderMap = [];
  591. foreach ($encoders as $class => $encoder) {
  592. if (class_exists($class) && !is_a($class, PasswordAuthenticatedUserInterface::class, true)) {
  593. trigger_deprecation('symfony/security-bundle', '5.3', 'Configuring an encoder for a user class that does not implement "%s" is deprecated, class "%s" should implement it.', PasswordAuthenticatedUserInterface::class, $class);
  594. }
  595. $encoderMap[$class] = $this->createEncoder($encoder);
  596. }
  597. $container
  598. ->getDefinition('security.encoder_factory.generic')
  599. ->setArguments([$encoderMap])
  600. ;
  601. }
  602. private function createEncoder(array $config)
  603. {
  604. // a custom encoder service
  605. if (isset($config['id'])) {
  606. return new Reference($config['id']);
  607. }
  608. if ($config['migrate_from'] ?? false) {
  609. return $config;
  610. }
  611. // plaintext encoder
  612. if ('plaintext' === $config['algorithm']) {
  613. $arguments = [$config['ignore_case']];
  614. return [
  615. 'class' => 'Symfony\Component\Security\Core\Encoder\PlaintextPasswordEncoder',
  616. 'arguments' => $arguments,
  617. ];
  618. }
  619. // pbkdf2 encoder
  620. if ('pbkdf2' === $config['algorithm']) {
  621. return [
  622. 'class' => 'Symfony\Component\Security\Core\Encoder\Pbkdf2PasswordEncoder',
  623. 'arguments' => [
  624. $config['hash_algorithm'],
  625. $config['encode_as_base64'],
  626. $config['iterations'],
  627. $config['key_length'],
  628. ],
  629. ];
  630. }
  631. // bcrypt encoder
  632. if ('bcrypt' === $config['algorithm']) {
  633. $config['algorithm'] = 'native';
  634. $config['native_algorithm'] = \PASSWORD_BCRYPT;
  635. return $this->createEncoder($config);
  636. }
  637. // Argon2i encoder
  638. if ('argon2i' === $config['algorithm']) {
  639. if (SodiumPasswordHasher::isSupported() && !\defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13')) {
  640. $config['algorithm'] = 'sodium';
  641. } elseif (\defined('PASSWORD_ARGON2I')) {
  642. $config['algorithm'] = 'native';
  643. $config['native_algorithm'] = \PASSWORD_ARGON2I;
  644. } else {
  645. throw new InvalidConfigurationException(sprintf('Algorithm "argon2i" is not available. Use "%s" instead.', \defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13') ? 'argon2id", "auto' : 'auto'));
  646. }
  647. return $this->createEncoder($config);
  648. }
  649. if ('argon2id' === $config['algorithm']) {
  650. if (($hasSodium = SodiumPasswordHasher::isSupported()) && \defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13')) {
  651. $config['algorithm'] = 'sodium';
  652. } elseif (\defined('PASSWORD_ARGON2ID')) {
  653. $config['algorithm'] = 'native';
  654. $config['native_algorithm'] = \PASSWORD_ARGON2ID;
  655. } else {
  656. throw new InvalidConfigurationException(sprintf('Algorithm "argon2id" is not available. Either use "%s", upgrade to PHP 7.3+ or use libsodium 1.0.15+ instead.', \defined('PASSWORD_ARGON2I') || $hasSodium ? 'argon2i", "auto' : 'auto'));
  657. }
  658. return $this->createEncoder($config);
  659. }
  660. if ('native' === $config['algorithm']) {
  661. return [
  662. 'class' => NativePasswordEncoder::class,
  663. 'arguments' => [
  664. $config['time_cost'],
  665. (($config['memory_cost'] ?? 0) << 10) ?: null,
  666. $config['cost'],
  667. ] + (isset($config['native_algorithm']) ? [3 => $config['native_algorithm']] : []),
  668. ];
  669. }
  670. if ('sodium' === $config['algorithm']) {
  671. if (!SodiumPasswordHasher::isSupported()) {
  672. throw new InvalidConfigurationException('Libsodium is not available. Install the sodium extension or use "auto" instead.');
  673. }
  674. return [
  675. 'class' => SodiumPasswordEncoder::class,
  676. 'arguments' => [
  677. $config['time_cost'],
  678. (($config['memory_cost'] ?? 0) << 10) ?: null,
  679. ],
  680. ];
  681. }
  682. // run-time configured encoder
  683. return $config;
  684. }
  685. private function createHashers(array $hashers, ContainerBuilder $container)
  686. {
  687. $hasherMap = [];
  688. foreach ($hashers as $class => $hasher) {
  689. // @deprecated since Symfony 5.3, remove the check in 6.0
  690. if (class_exists($class) && !is_a($class, PasswordAuthenticatedUserInterface::class, true)) {
  691. trigger_deprecation('symfony/security-bundle', '5.3', 'Configuring a password hasher for a user class that does not implement "%s" is deprecated, class "%s" should implement it.', PasswordAuthenticatedUserInterface::class, $class);
  692. }
  693. $hasherMap[$class] = $this->createHasher($hasher);
  694. }
  695. $container
  696. ->getDefinition('security.password_hasher_factory')
  697. ->setArguments([$hasherMap])
  698. ;
  699. }
  700. private function createHasher(array $config)
  701. {
  702. // a custom hasher service
  703. if (isset($config['id'])) {
  704. return $config['migrate_from'] ?? false ? [
  705. 'instance' => new Reference($config['id']),
  706. 'migrate_from' => $config['migrate_from'],
  707. ] : new Reference($config['id']);
  708. }
  709. if ($config['migrate_from'] ?? false) {
  710. return $config;
  711. }
  712. // plaintext hasher
  713. if ('plaintext' === $config['algorithm']) {
  714. $arguments = [$config['ignore_case']];
  715. return [
  716. 'class' => PlaintextPasswordHasher::class,
  717. 'arguments' => $arguments,
  718. ];
  719. }
  720. // pbkdf2 hasher
  721. if ('pbkdf2' === $config['algorithm']) {
  722. return [
  723. 'class' => Pbkdf2PasswordHasher::class,
  724. 'arguments' => [
  725. $config['hash_algorithm'],
  726. $config['encode_as_base64'],
  727. $config['iterations'],
  728. $config['key_length'],
  729. ],
  730. ];
  731. }
  732. // bcrypt hasher
  733. if ('bcrypt' === $config['algorithm']) {
  734. $config['algorithm'] = 'native';
  735. $config['native_algorithm'] = \PASSWORD_BCRYPT;
  736. return $this->createHasher($config);
  737. }
  738. // Argon2i hasher
  739. if ('argon2i' === $config['algorithm']) {
  740. if (SodiumPasswordHasher::isSupported() && !\defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13')) {
  741. $config['algorithm'] = 'sodium';
  742. } elseif (\defined('PASSWORD_ARGON2I')) {
  743. $config['algorithm'] = 'native';
  744. $config['native_algorithm'] = \PASSWORD_ARGON2I;
  745. } else {
  746. throw new InvalidConfigurationException(sprintf('Algorithm "argon2i" is not available. Either use "%s" or upgrade to PHP 7.2+ instead.', \defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13') ? 'argon2id", "auto' : 'auto'));
  747. }
  748. return $this->createHasher($config);
  749. }
  750. if ('argon2id' === $config['algorithm']) {
  751. if (($hasSodium = SodiumPasswordHasher::isSupported()) && \defined('SODIUM_CRYPTO_PWHASH_ALG_ARGON2ID13')) {
  752. $config['algorithm'] = 'sodium';
  753. } elseif (\defined('PASSWORD_ARGON2ID')) {
  754. $config['algorithm'] = 'native';
  755. $config['native_algorithm'] = \PASSWORD_ARGON2ID;
  756. } else {
  757. throw new InvalidConfigurationException(sprintf('Algorithm "argon2id" is not available. Either use "%s", upgrade to PHP 7.3+ or use libsodium 1.0.15+ instead.', \defined('PASSWORD_ARGON2I') || $hasSodium ? 'argon2i", "auto' : 'auto'));
  758. }
  759. return $this->createHasher($config);
  760. }
  761. if ('native' === $config['algorithm']) {
  762. return [
  763. 'class' => NativePasswordHasher::class,
  764. 'arguments' => [
  765. $config['time_cost'],
  766. (($config['memory_cost'] ?? 0) << 10) ?: null,
  767. $config['cost'],
  768. ] + (isset($config['native_algorithm']) ? [3 => $config['native_algorithm']] : []),
  769. ];
  770. }
  771. if ('sodium' === $config['algorithm']) {
  772. if (!SodiumPasswordHasher::isSupported()) {
  773. throw new InvalidConfigurationException('Libsodium is not available. Install the sodium extension or use "auto" instead.');
  774. }
  775. return [
  776. 'class' => SodiumPasswordHasher::class,
  777. 'arguments' => [
  778. $config['time_cost'],
  779. (($config['memory_cost'] ?? 0) << 10) ?: null,
  780. ],
  781. ];
  782. }
  783. // run-time configured hasher
  784. return $config;
  785. }
  786. // Parses user providers and returns an array of their ids
  787. private function createUserProviders(array $config, ContainerBuilder $container): array
  788. {
  789. $providerIds = [];
  790. foreach ($config['providers'] as $name => $provider) {
  791. $id = $this->createUserDaoProvider($name, $provider, $container);
  792. $providerIds[str_replace('-', '_', $name)] = $id;
  793. }
  794. return $providerIds;
  795. }
  796. // Parses a <provider> tag and returns the id for the related user provider service
  797. private function createUserDaoProvider(string $name, array $provider, ContainerBuilder $container): string
  798. {
  799. $name = $this->getUserProviderId($name);
  800. // Doctrine Entity and In-memory DAO provider are managed by factories
  801. foreach ($this->userProviderFactories as $factory) {
  802. $key = str_replace('-', '_', $factory->getKey());
  803. if (!empty($provider[$key])) {
  804. $factory->create($container, $name, $provider[$key]);
  805. return $name;
  806. }
  807. }
  808. // Existing DAO service provider
  809. if (isset($provider['id'])) {
  810. $container->setAlias($name, new Alias($provider['id'], false));
  811. return $provider['id'];
  812. }
  813. // Chain provider
  814. if (isset($provider['chain'])) {
  815. $providers = [];
  816. foreach ($provider['chain']['providers'] as $providerName) {
  817. $providers[] = new Reference($this->getUserProviderId($providerName));
  818. }
  819. $container
  820. ->setDefinition($name, new ChildDefinition('security.user.provider.chain'))
  821. ->addArgument(new IteratorArgument($providers));
  822. return $name;
  823. }
  824. throw new InvalidConfigurationException(sprintf('Unable to create definition for "%s" user provider.', $name));
  825. }
  826. private function getUserProviderId(string $name): string
  827. {
  828. return 'security.user.provider.concrete.'.strtolower($name);
  829. }
  830. private function createExceptionListener(ContainerBuilder $container, array $config, string $id, ?string $defaultEntryPoint, bool $stateless): string
  831. {
  832. $exceptionListenerId = 'security.exception_listener.'.$id;
  833. $listener = $container->setDefinition($exceptionListenerId, new ChildDefinition('security.exception_listener'));
  834. $listener->replaceArgument(3, $id);
  835. $listener->replaceArgument(4, null === $defaultEntryPoint ? null : new Reference($defaultEntryPoint));
  836. $listener->replaceArgument(8, $stateless);
  837. // access denied handler setup
  838. if (isset($config['access_denied_handler'])) {
  839. $listener->replaceArgument(6, new Reference($config['access_denied_handler']));
  840. } elseif (isset($config['access_denied_url'])) {
  841. $listener->replaceArgument(5, $config['access_denied_url']);
  842. }
  843. return $exceptionListenerId;
  844. }
  845. private function createSwitchUserListener(ContainerBuilder $container, string $id, array $config, ?string $defaultProvider, bool $stateless): string
  846. {
  847. $userProvider = isset($config['provider']) ? $this->getUserProviderId($config['provider']) : $defaultProvider;
  848. if (!$userProvider) {
  849. throw new InvalidConfigurationException(sprintf('Not configuring explicitly the provider for the "switch_user" listener on "%s" firewall is ambiguous as there is more than one registered provider.', $id));
  850. }
  851. $switchUserListenerId = 'security.authentication.switchuser_listener.'.$id;
  852. $listener = $container->setDefinition($switchUserListenerId, new ChildDefinition('security.authentication.switchuser_listener'));
  853. $listener->replaceArgument(1, new Reference($userProvider));
  854. $listener->replaceArgument(2, new Reference('security.user_checker.'.$id));
  855. $listener->replaceArgument(3, $id);
  856. $listener->replaceArgument(6, $config['parameter']);
  857. $listener->replaceArgument(7, $config['role']);
  858. $listener->replaceArgument(9, $stateless);
  859. return $switchUserListenerId;
  860. }
  861. private function createExpression(ContainerBuilder $container, string $expression): Reference
  862. {
  863. if (isset($this->expressions[$id = '.security.expression.'.ContainerBuilder::hash($expression)])) {
  864. return $this->expressions[$id];
  865. }
  866. if (!$container::willBeAvailable('symfony/expression-language', ExpressionLanguage::class, ['symfony/security-bundle'], true)) {
  867. throw new \RuntimeException('Unable to use expressions as the Symfony ExpressionLanguage component is not installed. Try running "composer require symfony/expression-language".');
  868. }
  869. $container
  870. ->register($id, 'Symfony\Component\ExpressionLanguage\Expression')
  871. ->setPublic(false)
  872. ->addArgument($expression)
  873. ;
  874. return $this->expressions[$id] = new Reference($id);
  875. }
  876. private function createRequestMatcher(ContainerBuilder $container, ?string $path = null, ?string $host = null, ?int $port = null, array $methods = [], ?array $ips = null, array $attributes = []): Reference
  877. {
  878. if ($methods) {
  879. $methods = array_map('strtoupper', $methods);
  880. }
  881. if (null !== $ips) {
  882. foreach ($ips as $ip) {
  883. $container->resolveEnvPlaceholders($ip, null, $usedEnvs);
  884. if (!$usedEnvs && !$this->isValidIps($ip)) {
  885. throw new \LogicException(sprintf('The given value "%s" in the "security.access_control" config option is not a valid IP address.', $ip));
  886. }
  887. $usedEnvs = null;
  888. }
  889. }
  890. $id = '.security.request_matcher.'.ContainerBuilder::hash([$path, $host, $port, $methods, $ips, $attributes]);
  891. if (isset($this->requestMatchers[$id])) {
  892. return $this->requestMatchers[$id];
  893. }
  894. // only add arguments that are necessary
  895. $arguments = [$path, $host, $methods, $ips, $attributes, null, $port];
  896. while (\count($arguments) > 0 && !end($arguments)) {
  897. array_pop($arguments);
  898. }
  899. $container
  900. ->register($id, 'Symfony\Component\HttpFoundation\RequestMatcher')
  901. ->setPublic(false)
  902. ->setArguments($arguments)
  903. ;
  904. return $this->requestMatchers[$id] = new Reference($id);
  905. }
  906. /**
  907. * @deprecated since Symfony 5.4, use "addAuthenticatorFactory()" instead
  908. */
  909. public function addSecurityListenerFactory(SecurityFactoryInterface $factory)
  910. {
  911. trigger_deprecation('symfony/security-bundle', '5.4', 'Method "%s()" is deprecated, use "addAuthenticatorFactory()" instead.', __METHOD__);
  912. $this->factories[] = [[
  913. 'pre_auth' => -10,
  914. 'form' => -30,
  915. 'http' => -40,
  916. 'remember_me' => -50,
  917. 'anonymous' => -60,
  918. ][$factory->getPosition()], $factory];
  919. $this->sortedFactories = [];
  920. }
  921. public function addAuthenticatorFactory(AuthenticatorFactoryInterface $factory)
  922. {
  923. $this->factories[] = [method_exists($factory, 'getPriority') ? $factory->getPriority() : 0, $factory];
  924. $this->sortedFactories = [];
  925. }
  926. public function addUserProviderFactory(UserProviderFactoryInterface $factory)
  927. {
  928. $this->userProviderFactories[] = $factory;
  929. }
  930. /**
  931. * {@inheritdoc}
  932. */
  933. public function getXsdValidationBasePath()
  934. {
  935. return __DIR__.'/../Resources/config/schema';
  936. }
  937. public function getNamespace()
  938. {
  939. return 'http://symfony.com/schema/dic/security';
  940. }
  941. public function getConfiguration(array $config, ContainerBuilder $container)
  942. {
  943. // first assemble the factories
  944. return new MainConfiguration($this->getSortedFactories(), $this->userProviderFactories);
  945. }
  946. private function isValidIps($ips): bool
  947. {
  948. $ipsList = array_reduce((array) $ips, static function (array $ips, string $ip) {
  949. return array_merge($ips, preg_split('/\s*,\s*/', $ip));
  950. }, []);
  951. if (!$ipsList) {
  952. return false;
  953. }
  954. foreach ($ipsList as $cidr) {
  955. if (!$this->isValidIp($cidr)) {
  956. return false;
  957. }
  958. }
  959. return true;
  960. }
  961. private function isValidIp(string $cidr): bool
  962. {
  963. $cidrParts = explode('/', $cidr);
  964. if (1 === \count($cidrParts)) {
  965. return false !== filter_var($cidrParts[0], \FILTER_VALIDATE_IP);
  966. }
  967. $ip = $cidrParts[0];
  968. $netmask = $cidrParts[1];
  969. if (!ctype_digit($netmask)) {
  970. return false;
  971. }
  972. if (filter_var($ip, \FILTER_VALIDATE_IP, \FILTER_FLAG_IPV4)) {
  973. return $netmask <= 32;
  974. }
  975. if (filter_var($ip, \FILTER_VALIDATE_IP, \FILTER_FLAG_IPV6)) {
  976. return $netmask <= 128;
  977. }
  978. return false;
  979. }
  980. /**
  981. * @return array<int, SecurityFactoryInterface|AuthenticatorFactoryInterface>
  982. */
  983. private function getSortedFactories(): array
  984. {
  985. if (!$this->sortedFactories) {
  986. $factories = [];
  987. foreach ($this->factories as $i => $factory) {
  988. $factories[] = array_merge($factory, [$i]);
  989. }
  990. usort($factories, function ($a, $b) {
  991. return $b[0] <=> $a[0] ?: $a[2] <=> $b[2];
  992. });
  993. $this->sortedFactories = array_column($factories, 1);
  994. }
  995. return $this->sortedFactories;
  996. }
  997. }