nextcloud/core/Controller/LostController.php

417 lines
12 KiB
PHP
Raw Permalink Normal View History

2014-05-28 01:09:08 +04:00
<?php
/**
2016-07-21 18:07:57 +03:00
* @copyright Copyright (c) 2016, ownCloud, Inc.
*
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
2015-03-26 13:44:34 +03:00
* @author Bernhard Posselt <dev@bernhard-posselt.com>
* @author Bjoern Schiessle <bjoern@schiessle.org>
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
* @author Daniel Kesselberg <mail@danielkesselberg.de>
2016-07-21 18:07:57 +03:00
* @author Joas Schilling <coding@schilljs.com>
2016-05-26 20:56:05 +03:00
* @author Julius Haertl <jus@bitgrid.net>
* @author Julius Härtl <jus@bitgrid.net>
2016-05-26 20:56:05 +03:00
* @author Lukas Reschke <lukas@statuscode.ch>
2015-03-26 13:44:34 +03:00
* @author Morris Jobke <hey@morrisjobke.de>
* @author Rémy Jacquin <remy@remyj.fr>
* @author Robin Appelman <robin@icewind.nl>
2016-07-21 18:07:57 +03:00
* @author Roeland Jago Douma <roeland@famdouma.nl>
2015-03-26 13:44:34 +03:00
* @author Thomas Müller <thomas.mueller@tmit.eu>
* @author Victor Dubiniuk <dubiniuk@owncloud.com>
*
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
2015-03-26 13:44:34 +03:00
*
2014-05-28 01:09:08 +04:00
*/
namespace OC\Core\Controller;
2014-05-28 01:09:08 +04:00
use function array_filter;
use function count;
use OC\Authentication\TwoFactorAuth\Manager;
use OC\Core\Exception\ResetPasswordException;
use OC\HintException;
use OCP\AppFramework\Controller;
use OCP\AppFramework\Http\JSONResponse;
use OCP\AppFramework\Http\TemplateResponse;
use OCP\AppFramework\Utility\ITimeFactory;
use OCP\Defaults;
use OCP\Encryption\IEncryptionModule;
use OCP\Encryption\IManager;
use OCP\IConfig;
use OCP\IInitialStateService;
use OCP\IL10N;
use OCP\ILogger;
use OCP\IRequest;
use OCP\IURLGenerator;
use OCP\IUser;
use OCP\IUserManager;
use OCP\Mail\IMailer;
use OCP\Security\ICrypto;
use OCP\Security\ISecureRandom;
use function reset;
2014-05-28 01:09:08 +04:00
/**
* Class LostController
*
2014-10-24 15:41:44 +04:00
* Successfully changing a password will emit the post_passwordReset hook.
*
* @package OC\Core\Controller
*/
2014-05-28 01:09:08 +04:00
class LostController extends Controller {
/** @var IURLGenerator */
2014-05-28 01:09:08 +04:00
protected $urlGenerator;
/** @var IUserManager */
2014-06-06 18:36:10 +04:00
protected $userManager;
/** @var Defaults */
2014-05-28 21:13:07 +04:00
protected $defaults;
/** @var IL10N */
2014-05-28 21:13:07 +04:00
protected $l10n;
/** @var string */
2014-05-28 21:13:07 +04:00
protected $from;
/** @var IManager */
protected $encryptionManager;
/** @var IConfig */
2014-06-06 18:36:10 +04:00
protected $config;
/** @var ISecureRandom */
protected $secureRandom;
/** @var IMailer */
protected $mailer;
/** @var ITimeFactory */
protected $timeFactory;
/** @var ICrypto */
protected $crypto;
/** @var ILogger */
private $logger;
/** @var Manager */
private $twoFactorManager;
/** @var IInitialStateService */
private $initialStateService;
/**
* @param string $appName
* @param IRequest $request
* @param IURLGenerator $urlGenerator
2014-10-24 15:41:44 +04:00
* @param IUserManager $userManager
* @param Defaults $defaults
* @param IL10N $l10n
* @param IConfig $config
* @param ISecureRandom $secureRandom
* @param string $defaultMailAddress
* @param IManager $encryptionManager
* @param IMailer $mailer
* @param ITimeFactory $timeFactory
* @param ICrypto $crypto
*/
2014-06-06 18:36:10 +04:00
public function __construct($appName,
IRequest $request,
IURLGenerator $urlGenerator,
IUserManager $userManager,
Defaults $defaults,
IL10N $l10n,
IConfig $config,
ISecureRandom $secureRandom,
$defaultMailAddress,
IManager $encryptionManager,
IMailer $mailer,
ITimeFactory $timeFactory,
ICrypto $crypto,
ILogger $logger,
Manager $twoFactorManager,
IInitialStateService $initialStateService) {
2014-05-28 01:09:08 +04:00
parent::__construct($appName, $request);
$this->urlGenerator = $urlGenerator;
2014-06-06 18:36:10 +04:00
$this->userManager = $userManager;
2014-05-28 21:13:07 +04:00
$this->defaults = $defaults;
$this->l10n = $l10n;
$this->secureRandom = $secureRandom;
$this->from = $defaultMailAddress;
$this->encryptionManager = $encryptionManager;
2014-06-06 18:36:10 +04:00
$this->config = $config;
$this->mailer = $mailer;
$this->timeFactory = $timeFactory;
$this->crypto = $crypto;
$this->logger = $logger;
$this->twoFactorManager = $twoFactorManager;
$this->initialStateService = $initialStateService;
2014-05-28 01:09:08 +04:00
}
/**
2014-06-06 18:36:10 +04:00
* Someone wants to reset their password:
*
2014-05-28 01:09:08 +04:00
* @PublicPage
* @NoCSRFRequired
2014-06-06 18:36:10 +04:00
*
2014-05-28 21:13:07 +04:00
* @param string $token
2014-06-13 18:18:21 +04:00
* @param string $userId
* @return TemplateResponse
2014-05-28 01:09:08 +04:00
*/
2014-06-13 18:18:21 +04:00
public function resetform($token, $userId) {
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
return new TemplateResponse('core', 'error', [
'errors' => [['error' => $this->l10n->t('Password reset is disabled')]]
],
'guest'
);
}
try {
$this->checkPasswordResetToken($token, $userId);
} catch (\Exception $e) {
return new TemplateResponse(
'core', 'error', [
"errors" => [["error" => $e->getMessage()]]
],
'guest'
);
}
$this->initialStateService->provideInitialState('core', 'resetPasswordUser', $userId);
$this->initialStateService->provideInitialState('core', 'resetPasswordTarget',
$this->urlGenerator->linkToRouteAbsolute('core.lost.setPassword', ['userId' => $userId, 'token' => $token])
);
2014-06-06 18:36:10 +04:00
return new TemplateResponse(
'core',
'login',
[],
2014-06-06 18:36:10 +04:00
'guest'
);
2014-05-28 01:09:08 +04:00
}
2014-06-06 18:36:10 +04:00
/**
2016-08-29 22:17:16 +03:00
* @param string $token
* @param string $userId
* @throws \Exception
*/
protected function checkPasswordResetToken($token, $userId) {
$user = $this->userManager->get($userId);
if ($user === null || !$user->isEnabled()) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
$encryptedToken = $this->config->getUserValue($userId, 'core', 'lostpassword', null);
if ($encryptedToken === null) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
try {
$mailAddress = !is_null($user->getEMailAddress()) ? $user->getEMailAddress() : '';
$decryptedToken = $this->crypto->decrypt($encryptedToken, $mailAddress.$this->config->getSystemValue('secret'));
} catch (\Exception $e) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
$splittedToken = explode(':', $decryptedToken);
if (count($splittedToken) !== 2) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
if ($splittedToken[0] < ($this->timeFactory->getTime() - 60*60*24*7) ||
$user->getLastLogin() > $splittedToken[0]) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is expired'));
}
2016-08-29 22:17:16 +03:00
if (!hash_equals($splittedToken[1], $token)) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
}
/**
* @param $message
* @param array $additional
* @return array
*/
private function error($message, array $additional=[]) {
return array_merge(['status' => 'error', 'msg' => $message], $additional);
2014-06-06 18:51:58 +04:00
}
/**
* @param array $data
* @return array
*/
private function success($data = []) {
return array_merge($data, ['status'=>'success']);
2014-06-06 18:51:58 +04:00
}
2014-05-28 21:13:07 +04:00
/**
* @PublicPage
* @BruteForceProtection(action=passwordResetEmail)
* @AnonRateThrottle(limit=10, period=300)
2014-06-06 18:36:10 +04:00
*
* @param string $user
* @return JSONResponse
2014-05-28 21:13:07 +04:00
*/
public function email($user) {
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
return new JSONResponse($this->error($this->l10n->t('Password reset is disabled')));
}
\OCP\Util::emitHook(
'\OCA\Files_Sharing\API\Server2Server',
'preLoginNameUsedAsUserName',
['uid' => &$user]
);
2014-06-06 18:36:10 +04:00
// FIXME: use HTTP error codes
2014-05-28 21:13:07 +04:00
try {
$this->sendEmail($user);
} catch (ResetPasswordException $e) {
// Ignore the error since we do not want to leak this info
$this->logger->warning('Could not send password reset email: ' . $e->getMessage());
} catch (\Exception $e) {
$this->logger->logException($e);
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
$response = new JSONResponse($this->success());
$response->throttle();
return $response;
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
2014-05-28 21:13:07 +04:00
/**
* @PublicPage
* @param string $token
* @param string $userId
* @param string $password
* @param boolean $proceed
* @return array
2014-05-28 21:13:07 +04:00
*/
public function setPassword($token, $userId, $password, $proceed) {
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
return $this->error($this->l10n->t('Password reset is disabled'));
}
if ($this->encryptionManager->isEnabled() && !$proceed) {
$encryptionModules = $this->encryptionManager->getEncryptionModules();
foreach ($encryptionModules as $module) {
/** @var IEncryptionModule $instance */
$instance = call_user_func($module['callback']);
// this way we can find out whether per-user keys are used or a system wide encryption key
if ($instance->needDetailedAccessList()) {
return $this->error('', ['encryption' => true]);
}
}
}
2014-05-28 21:13:07 +04:00
try {
$this->checkPasswordResetToken($token, $userId);
2014-06-06 18:51:58 +04:00
$user = $this->userManager->get($userId);
2014-06-06 18:36:10 +04:00
\OC_Hook::emit('\OC\Core\LostPassword\Controller\LostController', 'pre_passwordReset', ['uid' => $userId, 'password' => $password]);
if (!$user->setPassword($password)) {
2014-06-06 18:36:10 +04:00
throw new \Exception();
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
\OC_Hook::emit('\OC\Core\LostPassword\Controller\LostController', 'post_passwordReset', ['uid' => $userId, 'password' => $password]);
2014-10-24 15:41:44 +04:00
$this->twoFactorManager->clearTwoFactorPending($userId);
2016-08-23 16:01:38 +03:00
$this->config->deleteUserValue($userId, 'core', 'lostpassword');
@\OC::$server->getUserSession()->unsetMagicInCookie();
} catch (HintException $e) {
return $this->error($e->getHint());
} catch (\Exception $e) {
2014-06-06 18:51:58 +04:00
return $this->error($e->getMessage());
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
return $this->success(['user' => $userId]);
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
/**
* @param string $input
* @throws ResetPasswordException
* @throws \OCP\PreConditionNotMetException
*/
protected function sendEmail($input) {
$user = $this->findUserByIdOrMail($input);
$email = $user->getEMailAddress();
2014-06-06 18:36:10 +04:00
2014-05-28 21:13:07 +04:00
if (empty($email)) {
throw new ResetPasswordException('Could not send reset e-mail since there is no email for username ' . $input);
2014-05-28 21:13:07 +04:00
}
2014-06-06 18:36:10 +04:00
// Generate the token. It is stored encrypted in the database with the
// secret being the users' email address appended with the system secret.
// This makes the token automatically invalidate once the user changes
// their email address.
$token = $this->secureRandom->generate(
21,
ISecureRandom::CHAR_DIGITS.
ISecureRandom::CHAR_LOWER.
ISecureRandom::CHAR_UPPER
);
$tokenValue = $this->timeFactory->getTime() .':'. $token;
$encryptedValue = $this->crypto->encrypt($tokenValue, $email . $this->config->getSystemValue('secret'));
$this->config->setUserValue($user->getUID(), 'core', 'lostpassword', $encryptedValue);
$link = $this->urlGenerator->linkToRouteAbsolute('core.lost.resetform', ['userId' => $user->getUID(), 'token' => $token]);
2014-06-06 18:36:10 +04:00
$emailTemplate = $this->mailer->createEMailTemplate('core.ResetPassword', [
'link' => $link,
]);
$emailTemplate->setSubject($this->l10n->t('%s password reset', [$this->defaults->getName()]));
$emailTemplate->addHeader();
$emailTemplate->addHeading($this->l10n->t('Password reset'));
$emailTemplate->addBodyText(
htmlspecialchars($this->l10n->t('Click the following button to reset your password. If you have not requested the password reset, then ignore this email.')),
$this->l10n->t('Click the following link to reset your password. If you have not requested the password reset, then ignore this email.')
);
$emailTemplate->addBodyButton(
htmlspecialchars($this->l10n->t('Reset your password')),
$link,
false
);
$emailTemplate->addFooter();
2014-06-06 18:36:10 +04:00
2014-05-28 21:13:07 +04:00
try {
$message = $this->mailer->createMessage();
$message->setTo([$email => $user->getDisplayName()]);
$message->setFrom([$this->from => $this->defaults->getName()]);
$message->useTemplate($emailTemplate);
$this->mailer->send($message);
2014-05-28 21:13:07 +04:00
} catch (\Exception $e) {
// Log the exception and continue
$this->logger->logException($e);
2014-05-28 21:13:07 +04:00
}
}
2014-05-28 01:09:08 +04:00
/**
* @param string $input
* @return IUser
* @throws ResetPasswordException
*/
protected function findUserByIdOrMail($input) {
$user = $this->userManager->get($input);
if ($user instanceof IUser) {
if (!$user->isEnabled()) {
throw new ResetPasswordException('User is disabled');
}
return $user;
}
$users = array_filter($this->userManager->getByEmail($input), function (IUser $user) {
return $user->isEnabled();
});
if (count($users) === 1) {
return reset($users);
}
throw new ResetPasswordException('Could not find user');
}
2014-05-28 01:09:08 +04:00
}