Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php declare(strict_types=1); /** * Passbolt ~ Open source password manager for teams ..

Decoded Output download

<?php
declare(strict_types=1);

/**
 * Passbolt ~ Open source password manager for teams
 * Copyright (c) Passbolt SA (https://www.passbolt.com)
 *
 * Licensed under GNU Affero General Public License version 3 of the or any later version.
 * For full copyright and license information, please see the LICENSE.txt
 * Redistributions of files must retain the above copyright notice.
 *
 * @copyright     Copyright (c) Passbolt SA (https://www.passbolt.com)
 * @license       https://opensource.org/licenses/AGPL-3.0 AGPL License
 * @link          https://www.passbolt.com Passbolt(tm)
 * @since         3.1.0
 */
namespace Passbolt\MultiFactorAuthentication;

use App\Utility\Application\FeaturePluginAwareTrait;
use Authentication\Middleware\AuthenticationMiddleware;
use Cake\Core\BasePlugin;
use Cake\Core\ContainerInterface;
use Cake\Core\PluginApplicationInterface;
use Cake\Http\MiddlewareQueue;
use Cake\ORM\TableRegistry;
use Duo\DuoUniversal\Client;
use Passbolt\JwtAuthentication\Authenticator\JwtArmoredChallengeInterface;
use Passbolt\MultiFactorAuthentication\Authenticator\MfaJwtArmoredChallengeService;
use Passbolt\MultiFactorAuthentication\Event\AddIsMfaEnabledColumnToUsersGrid;
use Passbolt\MultiFactorAuthentication\Event\AddMfaCookieOnSuccessfulRefreshTokenCreation;
use Passbolt\MultiFactorAuthentication\Event\ClearMfaCookieOnSetupAndRecover;
use Passbolt\MultiFactorAuthentication\Middleware\InjectMfaFormMiddleware;
use Passbolt\MultiFactorAuthentication\Middleware\MfaRequiredCheckMiddleware;
use Passbolt\MultiFactorAuthentication\Notification\Email\MfaRedactorPool;
use Passbolt\MultiFactorAuthentication\Service\MfaPolicies\DefaultRememberAMonthSettingService;
use Passbolt\MultiFactorAuthentication\Service\MfaPolicies\RememberAMonthSettingInterface;
use Passbolt\MultiFactorAuthentication\Utility\MfaSettings;

class MultiFactorAuthenticationPlugin extends BasePlugin
{
    use FeaturePluginAwareTrait;

    /**
     * @inheritDoc
     */
    public function bootstrap(PluginApplicationInterface $app): void
    {
        parent::bootstrap($app);

        $this->addAccountSettingsAssociation();
        $this->registerListeners($app);
    }

    /**
     * @inheritDoc
     */
    public function middleware(MiddlewareQueue $middlewareQueue): MiddlewareQueue
    {
        return $middlewareQueue
            ->insertAfter(AuthenticationMiddleware::class, MfaRequiredCheckMiddleware::class)
            ->insertAfter(MfaRequiredCheckMiddleware::class, InjectMfaFormMiddleware::class);
    }

    /**
     * @return void
     */
    public function addAccountSettingsAssociation(): void
    {
        TableRegistry::getTableLocator()->get('Users')
            ->hasOne('MfaSettings')
            ->setClassName('Passbolt/AccountSettings.AccountSettings')
            ->setForeignKey('user_id')
            ->setProperty(Service\Query\IsMfaEnabledQueryService::MFA_SETTINGS_PROPERTY)
            ->setConditions(['MfaSettings.property' => MfaSettings::MFA]);
    }

    /**
     * Register MFA related listeners.
     *
     * @param \Cake\Core\PluginApplicationInterface $app App
     * @return void
     */
    public function registerListeners(PluginApplicationInterface $app): void
    {
        $app->getEventManager()
            // Decorate the users grid and add the column "is_mfa_enabled"
            ->on(new AddIsMfaEnabledColumnToUsersGrid()) // decorate the query to add the new property on the User entity
            ->on(new MfaRedactorPool()) // Register email redactors
            ->on(new ClearMfaCookieOnSetupAndRecover()); // Some end points should have a cleared MFA

        if ($this->isFeaturePluginEnabled('JwtAuthentication')) {
            // If a JWT login or refresh token is successful, and a valid MFA cookie was sent, pass it to the response
            $app->getEventManager()->on(new AddMfaCookieOnSuccessfulRefreshTokenCreation());
        }
    }

    /**
     * @inheritDoc
     */
    public function services(ContainerInterface $container): void
    {
        if ($this->isFeaturePluginEnabled('JwtAuthentication')) {
            $container
                ->extend(JwtArmoredChallengeInterface::class)
                ->setConcrete(MfaJwtArmoredChallengeService::class);
        }

        $container
            ->add(RememberAMonthSettingInterface::class)
            ->setConcrete(DefaultRememberAMonthSettingService::class);

        $container->add(Client::class)->setConcrete(null);
    }
}
 ?>

Did this file decode correctly?

Original Code

<?php
declare(strict_types=1);

/**
 * Passbolt ~ Open source password manager for teams
 * Copyright (c) Passbolt SA (https://www.passbolt.com)
 *
 * Licensed under GNU Affero General Public License version 3 of the or any later version.
 * For full copyright and license information, please see the LICENSE.txt
 * Redistributions of files must retain the above copyright notice.
 *
 * @copyright     Copyright (c) Passbolt SA (https://www.passbolt.com)
 * @license       https://opensource.org/licenses/AGPL-3.0 AGPL License
 * @link          https://www.passbolt.com Passbolt(tm)
 * @since         3.1.0
 */
namespace Passbolt\MultiFactorAuthentication;

use App\Utility\Application\FeaturePluginAwareTrait;
use Authentication\Middleware\AuthenticationMiddleware;
use Cake\Core\BasePlugin;
use Cake\Core\ContainerInterface;
use Cake\Core\PluginApplicationInterface;
use Cake\Http\MiddlewareQueue;
use Cake\ORM\TableRegistry;
use Duo\DuoUniversal\Client;
use Passbolt\JwtAuthentication\Authenticator\JwtArmoredChallengeInterface;
use Passbolt\MultiFactorAuthentication\Authenticator\MfaJwtArmoredChallengeService;
use Passbolt\MultiFactorAuthentication\Event\AddIsMfaEnabledColumnToUsersGrid;
use Passbolt\MultiFactorAuthentication\Event\AddMfaCookieOnSuccessfulRefreshTokenCreation;
use Passbolt\MultiFactorAuthentication\Event\ClearMfaCookieOnSetupAndRecover;
use Passbolt\MultiFactorAuthentication\Middleware\InjectMfaFormMiddleware;
use Passbolt\MultiFactorAuthentication\Middleware\MfaRequiredCheckMiddleware;
use Passbolt\MultiFactorAuthentication\Notification\Email\MfaRedactorPool;
use Passbolt\MultiFactorAuthentication\Service\MfaPolicies\DefaultRememberAMonthSettingService;
use Passbolt\MultiFactorAuthentication\Service\MfaPolicies\RememberAMonthSettingInterface;
use Passbolt\MultiFactorAuthentication\Utility\MfaSettings;

class MultiFactorAuthenticationPlugin extends BasePlugin
{
    use FeaturePluginAwareTrait;

    /**
     * @inheritDoc
     */
    public function bootstrap(PluginApplicationInterface $app): void
    {
        parent::bootstrap($app);

        $this->addAccountSettingsAssociation();
        $this->registerListeners($app);
    }

    /**
     * @inheritDoc
     */
    public function middleware(MiddlewareQueue $middlewareQueue): MiddlewareQueue
    {
        return $middlewareQueue
            ->insertAfter(AuthenticationMiddleware::class, MfaRequiredCheckMiddleware::class)
            ->insertAfter(MfaRequiredCheckMiddleware::class, InjectMfaFormMiddleware::class);
    }

    /**
     * @return void
     */
    public function addAccountSettingsAssociation(): void
    {
        TableRegistry::getTableLocator()->get('Users')
            ->hasOne('MfaSettings')
            ->setClassName('Passbolt/AccountSettings.AccountSettings')
            ->setForeignKey('user_id')
            ->setProperty(Service\Query\IsMfaEnabledQueryService::MFA_SETTINGS_PROPERTY)
            ->setConditions(['MfaSettings.property' => MfaSettings::MFA]);
    }

    /**
     * Register MFA related listeners.
     *
     * @param \Cake\Core\PluginApplicationInterface $app App
     * @return void
     */
    public function registerListeners(PluginApplicationInterface $app): void
    {
        $app->getEventManager()
            // Decorate the users grid and add the column "is_mfa_enabled"
            ->on(new AddIsMfaEnabledColumnToUsersGrid()) // decorate the query to add the new property on the User entity
            ->on(new MfaRedactorPool()) // Register email redactors
            ->on(new ClearMfaCookieOnSetupAndRecover()); // Some end points should have a cleared MFA

        if ($this->isFeaturePluginEnabled('JwtAuthentication')) {
            // If a JWT login or refresh token is successful, and a valid MFA cookie was sent, pass it to the response
            $app->getEventManager()->on(new AddMfaCookieOnSuccessfulRefreshTokenCreation());
        }
    }

    /**
     * @inheritDoc
     */
    public function services(ContainerInterface $container): void
    {
        if ($this->isFeaturePluginEnabled('JwtAuthentication')) {
            $container
                ->extend(JwtArmoredChallengeInterface::class)
                ->setConcrete(MfaJwtArmoredChallengeService::class);
        }

        $container
            ->add(RememberAMonthSettingInterface::class)
            ->setConcrete(DefaultRememberAMonthSettingService::class);

        $container->add(Client::class)->setConcrete(null);
    }
}

Function Calls

None

Variables

None

Stats

MD5 97a7192b72329a25ae67ec647b647e6b
Eval Count 0
Decode Time 98 ms