Skip to content

AdminSessionsManager and AdminSessionInfo - strtotime issue fix for admin login PR #34514

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions app/code/Magento/Security/Model/AdminSessionInfo.php
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ class AdminSessionInfo extends \Magento\Framework\Model\AbstractModel
/**
* All other open sessions were terminated
* @since 100.1.0
* @var bool
*/
protected $isOtherSessionsTerminated = false;

Expand Down Expand Up @@ -133,10 +134,10 @@ public function isSessionExpired()
$currentTime = $this->dateTime->gmtTimestamp();
$lastUpdatedTime = $this->getUpdatedAt();
if (!is_numeric($lastUpdatedTime)) {
$lastUpdatedTime = strtotime($lastUpdatedTime);
$lastUpdatedTime = $lastUpdatedTime === null ? 0 : strtotime($lastUpdatedTime);
}

return $lastUpdatedTime <= ($currentTime - $lifetime) ? true : false;
return $lastUpdatedTime <= ($currentTime - $lifetime);
}

/**
Expand Down
37 changes: 24 additions & 13 deletions app/code/Magento/Security/Model/AdminSessionsManager.php
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,18 @@

namespace Magento\Security\Model;

use Magento\Backend\Model\Auth\Session;
use Magento\Framework\HTTP\PhpEnvironment\RemoteAddress;
use Magento\Framework\Stdlib\DateTime;
use Magento\Security\Model\ResourceModel\AdminSessionInfo\Collection;
use Magento\Security\Model\ResourceModel\AdminSessionInfo\CollectionFactory;

/**
* Admin Sessions Manager Model
*
* @api
* @since 100.1.0
* @SuppressWarnings(PHPMD.CookieAndSessionMisuse)
*/
class AdminSessionsManager
{
Expand All @@ -35,7 +39,7 @@ class AdminSessionsManager
protected $securityConfig;

/**
* @var \Magento\Backend\Model\Auth\Session
* @var Session
* @since 100.1.0
*/
protected $authSession;
Expand Down Expand Up @@ -73,20 +77,22 @@ class AdminSessionsManager
*
* Means that after session was prolonged
* all other prolongs will be ignored within this period
*
* @var int
*/
private $maxIntervalBetweenConsecutiveProlongs = 60;

/**
* @param ConfigInterface $securityConfig
* @param \Magento\Backend\Model\Auth\Session $authSession
* @param Session $authSession
* @param AdminSessionInfoFactory $adminSessionInfoFactory
* @param CollectionFactory $adminSessionInfoCollectionFactory
* @param \Magento\Framework\Stdlib\DateTime\DateTime $dateTime
* @param RemoteAddress $remoteAddress
*/
public function __construct(
ConfigInterface $securityConfig,
\Magento\Backend\Model\Auth\Session $authSession,
Session $authSession,
\Magento\Security\Model\AdminSessionInfoFactory $adminSessionInfoFactory,
\Magento\Security\Model\ResourceModel\AdminSessionInfo\CollectionFactory $adminSessionInfoCollectionFactory,
\Magento\Framework\Stdlib\DateTime\DateTime $dateTime,
Expand Down Expand Up @@ -138,7 +144,7 @@ public function processProlong()
$this->getCurrentSession()->setData(
'updated_at',
date(
\Magento\Framework\Stdlib\DateTime::DATETIME_PHP_FORMAT,
DateTime::DATETIME_PHP_FORMAT,
$this->authSession->getUpdatedAt()
)
);
Expand Down Expand Up @@ -204,7 +210,7 @@ public function getLogoutReasonMessageByStatus($statusCode)
case AdminSessionInfo::LOGGED_OUT_BY_LOGIN:
$reasonMessage = __(
'Someone logged into this account from another device or browser.'
.' Your current session is terminated.'
. ' Your current session is terminated.'
);
break;
case AdminSessionInfo::LOGGED_OUT_MANUALLY:
Expand Down Expand Up @@ -241,7 +247,7 @@ public function getLogoutReasonMessage()
/**
* Get sessions for current user
*
* @return \Magento\Security\Model\ResourceModel\AdminSessionInfo\Collection
* @return Collection
* @since 100.1.0
*/
public function getSessionsForCurrentUser()
Expand Down Expand Up @@ -314,7 +320,9 @@ protected function createNewSession()
}

/**
* @return \Magento\Security\Model\ResourceModel\AdminSessionInfo\Collection
* Retrieve new instance of admin session info collection
*
* @return Collection
* @since 100.1.0
*/
protected function createAdminSessionInfoCollection()
Expand All @@ -323,24 +331,27 @@ protected function createAdminSessionInfoCollection()
}

/**
* Calculates diff between now and last session updated_at
* and decides whether new prolong must be triggered or not
* Calculates diff between now and last session updated_at and decides whether new prolong must be triggered or not
*
* This is done to limit amount of session prolongs and updates to database
* within some period of time - X
* X - is calculated in getIntervalBetweenConsecutiveProlongs()
*
* @see getIntervalBetweenConsecutiveProlongs()
* @return bool
* @see getIntervalBetweenConsecutiveProlongs()
*/
private function lastProlongIsOldEnough()
{
$lastProlongTimestamp = strtotime($this->getCurrentSession()->getUpdatedAt());
$lastUpdatedTime = $this->getCurrentSession()->getUpdatedAt();
if ($lastUpdatedTime === null || is_numeric($lastUpdatedTime)) {
$lastUpdatedTime = "now";
}
$lastProlongTimestamp = strtotime($lastUpdatedTime);
$nowTimestamp = $this->authSession->getUpdatedAt();

$diff = $nowTimestamp - $lastProlongTimestamp;

return (float) $diff > $this->getIntervalBetweenConsecutiveProlongs();
return (float)$diff > $this->getIntervalBetweenConsecutiveProlongs();
}

/**
Expand All @@ -354,7 +365,7 @@ private function lastProlongIsOldEnough()
*/
private function getIntervalBetweenConsecutiveProlongs()
{
return (float) max(
return (float)max(
1,
min(
4 * log((float)$this->securityConfig->getAdminSessionLifetime()),
Expand Down
20 changes: 20 additions & 0 deletions app/code/Magento/Security/Test/Unit/Model/AdminSessionInfoTest.php
Original file line number Diff line number Diff line change
Expand Up @@ -127,6 +127,26 @@ public function dataProviderSessionLifetime()
];
}

/**
* @return void
*/
public function testSessionExpiredWhenUpdatedAtIsNull()
{
$timestamp = time();
$sessionLifetime = '1';

$this->securityConfigMock->expects($this->once())
->method('getAdminSessionLifetime')
->willReturn($sessionLifetime);

$this->dateTimeMock->expects($this->once())
->method('gmtTimestamp')
->willReturn($timestamp);

$this->model->setUpdatedAt(null);
$this->assertTrue($this->model->isSessionExpired());
}

/**
* @return void
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,9 +58,7 @@ class AdminSessionsManagerTest extends TestCase
/** @var ObjectManager */
protected $objectManager;

/*
* @var RemoteAddress
*/
/** @var RemoteAddress */
protected $remoteAddressMock;

/**
Expand All @@ -72,7 +70,15 @@ protected function setUp(): void
$this->objectManager = new ObjectManager($this);

$this->authSessionMock = $this->getMockBuilder(Session::class)
->addMethods(['isActive', 'getStatus', 'getUser', 'getId', 'getUpdatedAt', 'getAdminSessionInfoId', 'setAdminSessionInfoId'])
->addMethods([
'isActive',
'getStatus',
'getUser',
'getId',
'getUpdatedAt',
'getAdminSessionInfoId',
'setAdminSessionInfoId'
])
->disableOriginalConstructor()
->getMock();

Expand Down Expand Up @@ -255,6 +261,48 @@ public function testProcessProlong()
$this->model->processProlong();
}

/**
* @return void
*/
public function testUpdatedAtIsNull()
{
$newUpdatedAt = '2016-01-01 00:00:30';
$adminSessionInfoId = 50;
$this->authSessionMock->expects($this->any())
->method('getAdminSessionInfoId')
->willReturn($adminSessionInfoId);

$this->adminSessionInfoFactoryMock->expects($this->any())
->method('create')
->willReturn($this->currentSessionMock);

$this->currentSessionMock->expects($this->once())
->method('load')
->willReturnSelf();

$this->currentSessionMock->expects($this->once())
->method('getUpdatedAt')
->willReturn(null);

$this->authSessionMock->expects($this->once())
->method('getUpdatedAt')
->willReturn(strtotime($newUpdatedAt));

$this->securityConfigMock->expects($this->once())
->method('getAdminSessionLifetime')
->willReturn(100);

$this->currentSessionMock->expects($this->never())
->method('setData')
->willReturnSelf();

$this->currentSessionMock->expects($this->never())
->method('save')
->willReturnSelf();

$this->model->processProlong();
}

/**
* @return void
*/
Expand Down