Code Coverage |
||||||||||
Lines |
Functions and Methods |
Classes and Traits |
||||||||
Total | |
88.73% |
63 / 71 |
|
60.00% |
3 / 5 |
CRAP | |
0.00% |
0 / 1 |
IpFilterMiddleware | |
88.73% |
63 / 71 |
|
60.00% |
3 / 5 |
30.20 | |
0.00% |
0 / 1 |
__construct | |
100.00% |
2 / 2 |
|
100.00% |
1 / 1 |
1 | |||
process | |
89.29% |
25 / 28 |
|
0.00% |
0 / 1 |
6.04 | |||
parseIpList | |
100.00% |
12 / 12 |
|
100.00% |
1 / 1 |
7 | |||
isIpInList | |
100.00% |
6 / 6 |
|
100.00% |
1 / 1 |
4 | |||
isIpInRange | |
78.26% |
18 / 23 |
|
0.00% |
0 / 1 |
12.24 |
1 | <?php |
2 | |
3 | declare(strict_types=1); |
4 | |
5 | namespace BO\Zmscitizenapi\Middleware; |
6 | |
7 | use BO\Zmscitizenapi\Helper\ClientIpHelper; |
8 | use BO\Zmscitizenapi\Localization\ErrorMessages; |
9 | use BO\Zmscitizenapi\Services\Core\LoggerService; |
10 | use Psr\Http\Message\ResponseInterface; |
11 | use Psr\Http\Message\ServerRequestInterface; |
12 | use Psr\Http\Server\MiddlewareInterface; |
13 | use Psr\Http\Server\RequestHandlerInterface; |
14 | |
15 | class IpFilterMiddleware implements MiddlewareInterface |
16 | { |
17 | private const ERROR_BLACKLISTED = 'ipBlacklisted'; |
18 | private const IPV4_BITS = 32; |
19 | private const IPV6_BITS = 128; |
20 | private string $blacklist; |
21 | private LoggerService $logger; |
22 | public function __construct(LoggerService $logger) |
23 | { |
24 | $this->logger = $logger; |
25 | $this->blacklist = \App::getIpBlacklist(); |
26 | } |
27 | |
28 | public function process(ServerRequestInterface $request, RequestHandlerInterface $handler): ResponseInterface |
29 | { |
30 | try { |
31 | $ip = ClientIpHelper::getClientIp(); |
32 | $uri = (string)$request->getUri(); |
33 | if ($ip === null || !filter_var($ip, FILTER_VALIDATE_IP)) { |
34 | $this->logger->logInfo('Invalid IP address detected', [ |
35 | 'ip' => $ip, |
36 | 'uri' => $uri |
37 | ]); |
38 | return $handler->handle($request); |
39 | } |
40 | |
41 | $blacklist = $this->parseIpList($this->blacklist ?: null); |
42 | if ($this->isIpInList($ip, $blacklist)) { |
43 | $this->logger->logInfo('Access denied - IP blacklisted', [ |
44 | 'ip' => $ip, |
45 | 'uri' => $uri |
46 | ]); |
47 | $language = $request->getAttribute('language'); |
48 | $error = ErrorMessages::get(self::ERROR_BLACKLISTED, $language); |
49 | $response = \App::$slim->getResponseFactory()->createResponse(); |
50 | $response = $response->withStatus($error['statusCode']) |
51 | ->withHeader('Content-Type', 'application/json'); |
52 | // Write JSON response |
53 | $responseBody = json_encode([ |
54 | 'errors' => [$error] |
55 | ]); |
56 | $response->getBody()->write($responseBody); |
57 | return $response; |
58 | } |
59 | |
60 | return $handler->handle($request); |
61 | } catch (\Throwable $e) { |
62 | $this->logger->logError($e, $request); |
63 | throw $e; |
64 | } |
65 | } |
66 | |
67 | private function parseIpList(?string $ipList): array |
68 | { |
69 | if (empty($ipList)) { |
70 | return []; |
71 | } |
72 | |
73 | $list = array_map('trim', explode(',', $ipList)); |
74 | return array_filter($list, function ($entry) { |
75 | |
76 | if (strpos($entry, '/') !== false) { |
77 | list($ip, $bits) = explode('/', $entry); |
78 | return filter_var($ip, FILTER_VALIDATE_IP) && |
79 | is_numeric($bits) && |
80 | (int)$bits >= 0 && |
81 | (int)$bits <= (strpos($ip, ':') !== false ? self::IPV6_BITS : self::IPV4_BITS); |
82 | } |
83 | return filter_var($entry, FILTER_VALIDATE_IP); |
84 | }); |
85 | } |
86 | |
87 | private function isIpInList(string $ip, array $list): bool |
88 | { |
89 | if (empty($list)) { |
90 | return false; |
91 | } |
92 | |
93 | foreach ($list as $range) { |
94 | if ($this->isIpInRange($ip, $range)) { |
95 | return true; |
96 | } |
97 | } |
98 | |
99 | return false; |
100 | } |
101 | |
102 | private function isIpInRange(string $ip, string $range): bool |
103 | { |
104 | $flags = FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6; |
105 | if (!filter_var($ip, FILTER_VALIDATE_IP, $flags)) { |
106 | return false; |
107 | } |
108 | |
109 | if (strpos($range, '/') !== false) { |
110 | list($subnet, $bits) = explode('/', $range); |
111 | if (!filter_var($subnet, FILTER_VALIDATE_IP, $flags)) { |
112 | return false; |
113 | } |
114 | |
115 | $ipBin = @inet_pton($ip); |
116 | $subnetBin = @inet_pton($subnet); |
117 | |
118 | if ( |
119 | $ipBin === false || $subnetBin === false || |
120 | strlen($ipBin) !== strlen($subnetBin) |
121 | ) { |
122 | return false; |
123 | } |
124 | |
125 | $bits = (int)$bits; |
126 | $maxBits = strlen($ipBin) === 4 ? self::IPV4_BITS : self::IPV6_BITS; |
127 | if ($bits < 0 || $bits > $maxBits) { |
128 | return false; |
129 | } |
130 | |
131 | $bytes = strlen($ipBin); |
132 | $mask = str_repeat("\xFF", (int)($bits / 8)); |
133 | if ($bits % 8) { |
134 | $mask .= chr(0xFF << (8 - ($bits % 8))); |
135 | } |
136 | |
137 | $mask = str_pad($mask, $bytes, "\x00"); |
138 | return ($ipBin & $mask) === ($subnetBin & $mask); |
139 | } |
140 | |
141 | return $ip === $range; |
142 | } |
143 | } |