2016-08-15 12:11:41 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
|
|
* @author Daniel Calviño Sánchez <danxuliu@gmail.com>
|
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
* @author Matthew Setter <matthew@matthewsetter.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
2020-01-13 16:23:49 +03:00
|
|
|
|
2018-03-13 09:29:12 +03:00
|
|
|
// FIXME: disabled for now to be able to inject IGroupManager and also use
|
|
|
|
// getSubAdmin()
|
|
|
|
//declare(strict_types=1);
|
2019-11-22 22:52:10 +03:00
|
|
|
|
2019-09-17 17:33:27 +03:00
|
|
|
namespace OCA\Settings\Controller;
|
2016-08-15 12:11:41 +03:00
|
|
|
|
2016-08-19 14:31:43 +03:00
|
|
|
use OC\HintException;
|
2017-07-19 19:28:06 +03:00
|
|
|
use OC\User\Session;
|
2016-08-15 12:11:41 +03:00
|
|
|
use OCP\App\IAppManager;
|
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2018-03-13 09:29:12 +03:00
|
|
|
use OCP\IGroupManager;
|
2016-08-15 12:11:41 +03:00
|
|
|
use OCP\IL10N;
|
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\IUser;
|
2017-08-01 19:19:28 +03:00
|
|
|
use OCP\IUserManager;
|
2016-08-15 12:11:41 +03:00
|
|
|
use OCP\IUserSession;
|
|
|
|
|
|
|
|
class ChangePasswordController extends Controller {
|
|
|
|
|
|
|
|
/** @var string */
|
|
|
|
private $userId;
|
|
|
|
|
2017-08-01 19:19:28 +03:00
|
|
|
/** @var IUserManager */
|
2016-08-15 12:11:41 +03:00
|
|
|
private $userManager;
|
|
|
|
|
|
|
|
/** @var IL10N */
|
|
|
|
private $l;
|
|
|
|
|
2018-03-13 09:29:12 +03:00
|
|
|
/** @var IGroupManager */
|
2016-08-15 12:11:41 +03:00
|
|
|
private $groupManager;
|
|
|
|
|
2017-07-19 19:28:06 +03:00
|
|
|
/** @var Session */
|
2016-08-15 12:11:41 +03:00
|
|
|
private $userSession;
|
|
|
|
|
|
|
|
/** @var IAppManager */
|
|
|
|
private $appManager;
|
|
|
|
|
2018-03-09 10:52:14 +03:00
|
|
|
public function __construct(string $appName,
|
2016-08-15 12:11:41 +03:00
|
|
|
IRequest $request,
|
2018-03-09 10:52:14 +03:00
|
|
|
string $userId,
|
2017-08-01 19:19:28 +03:00
|
|
|
IUserManager $userManager,
|
2016-08-15 12:11:41 +03:00
|
|
|
IUserSession $userSession,
|
2018-03-13 09:29:12 +03:00
|
|
|
IGroupManager $groupManager,
|
2016-08-15 12:11:41 +03:00
|
|
|
IAppManager $appManager,
|
|
|
|
IL10N $l) {
|
|
|
|
parent::__construct($appName, $request);
|
|
|
|
|
|
|
|
$this->userId = $userId;
|
|
|
|
$this->userManager = $userManager;
|
|
|
|
$this->userSession = $userSession;
|
|
|
|
$this->groupManager = $groupManager;
|
|
|
|
$this->appManager = $appManager;
|
|
|
|
$this->l = $l;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
2016-10-26 15:04:38 +03:00
|
|
|
* @NoSubadminRequired
|
2017-04-18 18:55:51 +03:00
|
|
|
* @BruteForceProtection(action=changePersonalPassword)
|
2016-08-15 12:11:41 +03:00
|
|
|
*/
|
2018-03-09 10:52:14 +03:00
|
|
|
public function changePersonalPassword(string $oldpassword = '', string $newpassword = null): JSONResponse {
|
2016-10-06 11:24:02 +03:00
|
|
|
/** @var IUser $user */
|
2016-08-15 12:11:41 +03:00
|
|
|
$user = $this->userManager->checkPassword($this->userId, $oldpassword);
|
|
|
|
if ($user === false) {
|
2017-04-18 18:55:51 +03:00
|
|
|
$response = new JSONResponse([
|
2016-08-15 12:11:41 +03:00
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Wrong password'),
|
|
|
|
],
|
|
|
|
]);
|
2017-04-18 18:55:51 +03:00
|
|
|
$response->throttle();
|
|
|
|
return $response;
|
2016-08-15 12:11:41 +03:00
|
|
|
}
|
|
|
|
|
2016-10-06 11:24:02 +03:00
|
|
|
try {
|
|
|
|
if ($newpassword === null || $user->setPassword($newpassword) === false) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error'
|
|
|
|
]);
|
|
|
|
}
|
2020-04-10 15:19:56 +03:00
|
|
|
// password policy app throws exception
|
|
|
|
} catch (HintException $e) {
|
2016-08-15 12:11:41 +03:00
|
|
|
return new JSONResponse([
|
2016-10-06 11:24:02 +03:00
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $e->getHint(),
|
|
|
|
],
|
2016-08-15 12:11:41 +03:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->userSession->updateSessionTokenPassword($newpassword);
|
|
|
|
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'success',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Saved'),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
2016-10-25 14:05:13 +03:00
|
|
|
* @PasswordConfirmationRequired
|
2016-08-15 12:11:41 +03:00
|
|
|
*/
|
2018-03-09 10:52:14 +03:00
|
|
|
public function changeUserPassword(string $username = null, string $password = null, string $recoveryPassword = null): JSONResponse {
|
2016-08-15 12:11:41 +03:00
|
|
|
if ($username === null) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('No user supplied'),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($password === null) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Unable to change password'),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
$currentUser = $this->userSession->getUser();
|
|
|
|
$targetUser = $this->userManager->get($username);
|
|
|
|
if ($currentUser === null || $targetUser === null ||
|
|
|
|
!($this->groupManager->isAdmin($this->userId) ||
|
|
|
|
$this->groupManager->getSubAdmin()->isUserAccessible($currentUser, $targetUser))
|
|
|
|
) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Authentication error'),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($this->appManager->isEnabledForUser('encryption')) {
|
|
|
|
//handle the recovery case
|
|
|
|
$crypt = new \OCA\Encryption\Crypto\Crypt(
|
|
|
|
\OC::$server->getLogger(),
|
|
|
|
\OC::$server->getUserSession(),
|
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getL10N('encryption'));
|
|
|
|
$keyStorage = \OC::$server->getEncryptionKeyStorage();
|
|
|
|
$util = new \OCA\Encryption\Util(
|
|
|
|
new \OC\Files\View(),
|
|
|
|
$crypt,
|
|
|
|
\OC::$server->getLogger(),
|
|
|
|
\OC::$server->getUserSession(),
|
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getUserManager());
|
|
|
|
$keyManager = new \OCA\Encryption\KeyManager(
|
|
|
|
$keyStorage,
|
|
|
|
$crypt,
|
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getUserSession(),
|
|
|
|
new \OCA\Encryption\Session(\OC::$server->getSession()),
|
|
|
|
\OC::$server->getLogger(),
|
|
|
|
$util);
|
|
|
|
$recovery = new \OCA\Encryption\Recovery(
|
|
|
|
\OC::$server->getUserSession(),
|
|
|
|
$crypt,
|
|
|
|
$keyManager,
|
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getEncryptionFilesHelper(),
|
|
|
|
new \OC\Files\View());
|
|
|
|
$recoveryAdminEnabled = $recovery->isRecoveryKeyEnabled();
|
|
|
|
|
|
|
|
$validRecoveryPassword = false;
|
|
|
|
$recoveryEnabledForUser = false;
|
|
|
|
if ($recoveryAdminEnabled) {
|
|
|
|
$validRecoveryPassword = $keyManager->checkRecoveryPassword($recoveryPassword);
|
|
|
|
$recoveryEnabledForUser = $recovery->isRecoveryEnabledForUser($username);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($recoveryEnabledForUser && $recoveryPassword === '') {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
2017-02-27 12:16:57 +03:00
|
|
|
'message' => $this->l->t('Please provide an admin recovery password; otherwise, all user data will be lost.'),
|
2016-08-15 12:11:41 +03:00
|
|
|
]
|
|
|
|
]);
|
|
|
|
} elseif ($recoveryEnabledForUser && ! $validRecoveryPassword) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Wrong admin recovery password. Please check the password and try again.'),
|
|
|
|
]
|
|
|
|
]);
|
|
|
|
} else { // now we know that everything is fine regarding the recovery password, let's try to change the password
|
2016-10-06 11:24:02 +03:00
|
|
|
try {
|
|
|
|
$result = $targetUser->setPassword($password, $recoveryPassword);
|
2020-04-10 15:19:56 +03:00
|
|
|
// password policy app throws exception
|
|
|
|
} catch (HintException $e) {
|
2016-10-06 11:24:02 +03:00
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $e->getHint(),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
2016-08-15 12:11:41 +03:00
|
|
|
if (!$result && $recoveryEnabledForUser) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
2017-04-18 10:53:02 +03:00
|
|
|
'message' => $this->l->t('Backend doesn\'t support password change, but the user\'s encryption key was updated.'),
|
2016-08-15 12:11:41 +03:00
|
|
|
]
|
|
|
|
]);
|
|
|
|
} elseif (!$result && !$recoveryEnabledForUser) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Unable to change password'),
|
|
|
|
]
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2016-08-19 14:31:43 +03:00
|
|
|
try {
|
|
|
|
if ($targetUser->setPassword($password) === false) {
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
|
|
|
'message' => $this->l->t('Unable to change password'),
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
2020-04-10 15:19:56 +03:00
|
|
|
// password policy app throws exception
|
|
|
|
} catch (HintException $e) {
|
2016-08-15 12:11:41 +03:00
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => [
|
2016-08-19 14:31:43 +03:00
|
|
|
'message' => $e->getHint(),
|
2016-08-15 12:11:41 +03:00
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return new JSONResponse([
|
|
|
|
'status' => 'success',
|
|
|
|
'data' => [
|
|
|
|
'username' => $username,
|
|
|
|
],
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
}
|