Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add js api key field & hashing for visitor recognition #20

Open
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

eug-L
Copy link
Contributor

@eug-L eug-L commented Mar 5, 2025

Summary by CodeRabbit

  • New Features
    • Enhanced widget security with a new configuration section.
    • Users can now enable secure mode and select a JavaScript API key.
    • Automatic validation processes ensure applied security settings for a more protected experience.
    • Updated user interface messages to specify the need for an "Authentication" key.
    • Added a new option in the JavaScript API key selection dropdown prompting users to "Select a key."
    • Revised instructional text to clarify the use of an "Authentication" key for visitor recognition.

Verified

This commit was signed with the committer’s verified signature.
renovate-bot Mend Renovate
Copy link

coderabbitai bot commented Mar 5, 2025

Walkthrough

The changes modify the getKeyModule() method in the TawktoGenerator class to retrieve keys specifically by type, switching from getKeys() to getKeysByType('authentication'). The getIframe() method is updated to clarify that an "Authentication" key is required for the JavaScript API key. Additionally, a new option in the dropdown prompts users to "Select a key," and the instructional text regarding key creation is revised to emphasize the use of an "Authentication" key.

Changes

File Change Summary
src/core/TawktoGenerator.php - Modified getKeyModule() to use getKeysByType('authentication') for key retrieval.
- Updated getIframe() to specify that an "Authentication" key is required and added a "Select a key" option in the dropdown.
- Revised instructional text for key creation to highlight the use of an "Authentication" key.

Poem

I'm a bunny with ears so keen,
Hopping through code that's clean and mean.
With keys and types now clear in sight,
I celebrate changes that feel just right.
A nibble of code, a hop in my stride,
Secure and happy, I bounce with pride!
🐰💻


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro (Legacy)

📥 Commits

Reviewing files that changed from the base of the PR and between 2323480 and 82918b9.

📒 Files selected for processing (4)
  • src/core/TawktoGenerator.php (6 hunks)
  • src/core/TawktoGenerator.php (2 hunks)
  • src/core/TawktoGenerator.php (2 hunks)
  • src/core/TawktoGenerator.php (3 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
  • src/core/TawktoGenerator.php
  • src/core/TawktoGenerator.php
  • src/core/TawktoGenerator.php
🔇 Additional comments (6)
src/core/TawktoGenerator.php (6)

57-58: Implementation of new security variables looks good.

Adding variables to support secure mode and JavaScript API key for visitor recognition is a useful security enhancement.

Also applies to: 66-72


80-89: Well-implemented secure hash generation.

The implementation correctly generates an HMAC SHA-256 hash using the user's email and the stored API key when secure mode is enabled. This approach follows security best practices for visitor recognition.


93-95: Good conditional inclusion of hash in visitor data.

The code elegantly includes the hash in the visitor API string only when it's available, using a concise ternary operator.


119-137: Well-structured key module retrieval method.

The new getKeyModule() method efficiently checks for the availability of the key repository service and retrieves keys if available. This abstraction simplifies key management throughout the class.


502-547: Security Options UI is well-implemented.

The new Security Options section provides a clear interface for configuring secure mode and selecting a JavaScript API key, with appropriate guidance based on whether the Key module is installed.


780-783: Proper handling of new options in setOptions method.

The additions to the setOptions method ensure the new security-related options are properly processed and saved.

Also applies to: 788-788


🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (3)
src/core/TawktoGenerator.php (3)

66-68: Conditionally setting $secure_mode_enabled.

Assigning the secure mode value from $display_opts is correct. Consider validating its type (boolean) to avoid unexpected behavior if the stored data is not a strict boolean.


119-137: New getKeyModule() method.

Cleanly checks for the Key module and retrieves available keys. Consider renaming to something like getKeyRepository() for clarity, but otherwise it’s a solid addition.


502-547: Security Options fieldset.

Nicely introduces a secure mode checkbox and a dropdown for selecting the JS API key. Potential enhancements:

  • Hide or disable the JS API key dropdown unless “Secure mode enabled” is checked.
  • Alert users when no valid key is selected, if relevant.

Overall, a helpful addition to the UI.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 233b0d8 and 46500a0.

📒 Files selected for processing (1)
  • src/core/TawktoGenerator.php (6 hunks)
🔇 Additional comments (8)
src/core/TawktoGenerator.php (8)

57-58: Initialization looks good.

Defining $secure_mode_enabled and $js_api_key with sane defaults is clear and aligns with the intended secure mode logic.


70-72: Extracting $js_api_key from user input.

Logic here is consistent. You might also verify that the provided key string is expected or sanitized to prevent misconfiguration.


80-80: Preparing $hash for secure mode usage.

Initializing $hash to NULL is fine for clarity of intent.


82-83: Loading key repository.

Retrieving the keys from the newly introduced getKeyModule() is well-structured. No immediate issues found.


85-89: Hash generation for secure mode.

The hash_hmac('sha256', $usermail, $keys[$js_api_key]->getKeyValue()) logic looks correct. Consider handling empty or invalid $usermail values explicitly to avoid unexpected hashes, and ensure $keys[$js_api_key]->getKeyValue() is non-null.


259-261: Retrieving key module state for the form.

Straightforward usage of getKeyModule() output. Properly sets up $keyModuleInstalled and $keys.


780-782: Storing js_api_key in $jsonOpts.

Storing the trimmed value is correct; you might also ensure it exists in the actual key repository to prevent invalid references.


788-788: Boolean assignment for secure mode.

Storing secure_mode_enabled as a boolean is consistent with Drupal config patterns.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

♻️ Duplicate comments (1)
src/core/TawktoGenerator.php (1)

93-95: ⚠️ Potential issue

Potential XSS vulnerability in visitor data embedding.

The code directly embeds user data ($username, $usermail, and now $hash) into JavaScript without proper escaping, which could lead to XSS vulnerabilities if these values contain malicious code.

Apply sanitization to all user-provided data:

-                    name  : "' . $username . '",
-                    email : "' . $usermail . '",' .
-                    (!is_null($hash) ? PHP_EOL . 'hash  : "' . $hash . '",' : '') .
+                    use Drupal\Component\Utility\Html;
+                    name  : "' . Html::escape($username) . '",
+                    email : "' . Html::escape($usermail) . '",' .
+                    (!is_null($hash) ? PHP_EOL . 'hash  : "' . Html::escape($hash) . '",' : '') .
🧹 Nitpick comments (2)
src/core/TawktoGenerator.php (2)

520-546: Improve JavaScript API Key selection logic.

There are two issues with the current implementation:

  1. The dropdown selection logic assumes $display_opts->js_api_key is always set, which may not be true on first load
  2. The dropdown doesn't include a "None" or "-- Select --" option when no key is selected

Improve the key selection dropdown with these changes:

<select name="js_api_key" id="js_api_key">
+  <option value="">-- Select a key --</option>
  <?php
  foreach (array_keys($keys) as $key) {
-    $selected = 'selected';
-    if (!is_null($display_opts) && $display_opts->js_api_key !== $key) {
-      $selected = '';
-    }
+    $selected = '';
+    if (!is_null($display_opts) && isset($display_opts->js_api_key) && $display_opts->js_api_key === $key) {
+      $selected = 'selected';
+    }
    ?>
    <option value="<?php echo $key; ?>" <?php echo $selected; ?>><?php echo $key; ?></option>
  <?php } ?>
</select>

94-94: Potential newline rendering issue in JavaScript object.

Adding a newline with PHP_EOL inside a JavaScript object might cause syntax errors in some browsers if not properly handled.

Consider using a cleaner approach without the conditional newline:

- email : "' . $usermail . '",' .
- (!is_null($hash) ? PHP_EOL . 'hash  : "' . $hash . '",' : '') .
+ email : "' . $usermail . '"' . 
+ (!is_null($hash) ? ',' . PHP_EOL . 'hash  : "' . $hash . '"' : '') .
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 46500a0 and 2323480.

📒 Files selected for processing (1)
  • src/core/TawktoGenerator.php (7 hunks)
🔇 Additional comments (11)
src/core/TawktoGenerator.php (11)

57-58: Security enhancement with secure mode configuration.

These new variables add support for the secure mode feature, which helps enhance visitor recognition security through hash verification.


66-72: LGTM: Proper retrieval of secure mode configuration.

The code correctly extracts the secure mode settings from the display options, following the same pattern used for other settings.


80-89: Hash generation is correctly implemented for secure mode.

The implementation follows Tawk.to's secure mode recommendations by:

  1. Only generating the hash when secure mode is enabled
  2. Verifying that a valid JavaScript API key exists
  3. Using a secure hashing algorithm (HMAC SHA256) with the visitor's email

This implementation helps prevent identity spoofing by ensuring visitors are who they claim to be.


119-137: Well-structured key module integration.

The getKeyModule() method is well-implemented:

  • It properly checks if the key repository service is available
  • It safely retrieves keys if the service exists
  • It returns a clear structure with both installation status and available keys
  • It's appropriately encapsulated as a private method

This supports the secure mode feature by providing access to API keys stored through Drupal's Key module.


259-262: LGTM: Consistent use of key module retrieval.

The code reuses the getKeyModule() method to maintain consistency and avoid code duplication when generating the form.


502-507: Good UX with clear security section header and instructions.

The new "Security Options" section provides clear instructions about secure mode functionality, helping administrators understand the purpose and requirements of this feature.


508-519: LGTM: Secure mode toggle with proper default.

The secure mode toggle is correctly implemented with a proper default value and maintains consistency with other option toggles in the form.


780-783: LGTM: Proper handling of API key in options.

The code correctly handles the JavaScript API key as a string value and trims it to remove any whitespace.


788-788: LGTM: Added secure mode to boolean options.

The secure mode setting is correctly added to the list of boolean options, ensuring it's properly processed as a boolean value.


564-564: LGTM: Updated iframe URL to include Drupal version.

The code correctly uses the major Drupal version in the iframe URL, which helps with compatibility tracking.


85-89:

❓ Verification inconclusive

Verify hash generation function works with different key types.

The hash generation relies on the key module, but it doesn't check what type of key is being used. Different key providers might store or return values differently.


🏁 Script executed:

#!/bin/bash
# Description: Check what key types are available and supported in Drupal's Key module

# Check if the Key module is installed and what key types are available
drush pm-list | grep key
drush eval "print_r(\Drupal::service('plugin.manager.key.key_type')->getDefinitions());"

# Check for examples of key usage in the codebase
rg -A 3 "getKeyValue" --type php

Length of output: 574


Action: Ensure hash generation correctly handles keys from various providers

The implementation in src/core/TawktoGenerator.php at lines 85–89 calls $keys[$js_api_key]->getKeyValue() directly for generating the hash. However, different key providers may return key values in formats other than a plain string. Please verify that the returned key value is in (or is converted to) the expected format before it’s used in hash_hmac(). Consider one or more of the following:

  • Type Validation/Casting: Explicitly validate or cast the key value to a string to ensure compatibility with hash_hmac().
  • Unit Tests: Add tests that simulate various key provider outputs to confirm that the hash is generated correctly regardless of the underlying key type.

@eug-L eug-L force-pushed the feature/secure-mode branch from 2323480 to 46500a0 Compare March 5, 2025 09:48
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Inline review comments failed to post. This is likely due to GitHub's limits when posting large numbers of comments. If you are seeing this consistently it is likely a permissions issue. Please check "Moderation" -> "Code review limits" under your organization settings.

Actionable comments posted: 1

🧹 Nitpick comments (5)
src/core/TawktoGenerator.php (5)

531-541: Add a default "Select a key" option in the dropdown.

Currently, if no keys are available, the dropdown won't have a default empty option. This could lead to the first key being selected by default, which might not be the intended behavior.

                                      <select name="js_api_key" id="js_api_key">
+                                        <option value="">Select a key</option>
                                        <?php
                                        foreach (array_keys($keys) as $key) {
                                          $selected = 'selected';
                                          if (!is_null($display_opts) && $display_opts->js_api_key !== $key) {
                                            $selected = '';
                                          }
                                          ?>
                                          <option value="<?php echo $key; ?>" <?php echo $selected; ?>><?php echo $key; ?></option>
                                        <?php } ?>
                                      </select>

259-262: Consider eliminating duplicate code.

The same key module retrieval code appears in multiple places. Consider calling this once at the beginning of the method and reusing the values.

    function getIframe() {
        $iframeUrl = $this->getIframeUrl();
        $baseUrl = $this->getBaseUrl();
        $widget = $this->getWidgetVars();
        
+       $keyModule = $this->getKeyModule();
+       $keyModuleInstalled = $keyModule['installed'];
+       $keys = $keyModule['keys'];

        // Remove duplicate code at lines 259-262 and 279-282

Also applies to: 279-282


82-89: Add additional error handling for key value retrieval.

When retrieving the key value for hash generation, consider adding checks to ensure the key value can be successfully retrieved.

        if ($secure_mode_enabled) {
          if (!is_null($js_api_key) && isset($keys[$js_api_key])) {
-            $hash = hash_hmac('sha256', $usermail, $keys[$js_api_key]->getKeyValue());
+            $keyValue = $keys[$js_api_key]->getKeyValue();
+            if (!empty($keyValue)) {
+              $hash = hash_hmac('sha256', $usermail, $keyValue);
+            }
          }
        }

542-542: Specify the key type requirements in the UI.

Add guidance about the key type needed (Authentication) directly in the UI, consistent with what's mentioned elsewhere in the code.

-                                      <div>To create a new key, go to <a href="/admin/config/system/keys">/admin/config/system/keys</a></div>
+                                      <div>To create a new key, go to <a href="/admin/config/system/keys">/admin/config/system/keys</a>. Create an <b>Authentication</b> key type for the JavaScript API key.</div>

86-88: Consider sanitizing email before using it in hash generation.

For added security, consider sanitizing the email before using it for hash generation to ensure consistent hashing.

        if ($secure_mode_enabled) {
          if (!is_null($js_api_key) && isset($keys[$js_api_key])) {
-            $hash = hash_hmac('sha256', $usermail, $keys[$js_api_key]->getKeyValue());
+            $sanitizedEmail = strtolower(trim($usermail));
+            $hash = hash_hmac('sha256', $sanitizedEmail, $keys[$js_api_key]->getKeyValue());
          }
        }
🛑 Comments failed to post (1)
src/core/TawktoGenerator.php (1)

513-514: ⚠️ Potential issue

Default option state should match initialization value.

The secure mode is initialized as FALSE in the widget method (line 57), but the checkbox is checked by default in the form (using $checked = 'checked'). This inconsistency could lead to unexpected behavior.

-                                    $checked = 'checked';
-                                    if (!is_null($display_opts) && !$display_opts->secure_mode_enabled) {
-                                      $checked = '';
-                                    }
+                                    $checked = '';
+                                    if (!is_null($display_opts) && $display_opts->secure_mode_enabled) {
+                                      $checked = 'checked';
+                                    }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

                                    $checked = '';
                                    if (!is_null($display_opts) && $display_opts->secure_mode_enabled) {
                                      $checked = 'checked';
                                    }

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants