2016-05-11 12:23:25 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Cornelius Kölbel <cornelius.koelbel@netknights.it>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2016-05-11 12:23:25 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2016-05-11 12:23:25 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Core\Controller;
|
|
|
|
|
|
|
|
use OC\Authentication\TwoFactorAuth\Manager;
|
2016-08-30 12:10:45 +03:00
|
|
|
use OC_User;
|
|
|
|
use OC_Util;
|
2016-05-11 12:23:25 +03:00
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\AppFramework\Http\RedirectResponse;
|
2019-02-04 10:54:56 +03:00
|
|
|
use OCP\AppFramework\Http\StandaloneTemplateResponse;
|
2019-04-05 19:21:08 +03:00
|
|
|
use OCP\Authentication\TwoFactorAuth\IActivatableAtLogin;
|
2018-05-22 09:52:16 +03:00
|
|
|
use OCP\Authentication\TwoFactorAuth\IProvider;
|
2017-08-24 15:00:33 +03:00
|
|
|
use OCP\Authentication\TwoFactorAuth\IProvidesCustomCSP;
|
2017-01-03 11:57:52 +03:00
|
|
|
use OCP\Authentication\TwoFactorAuth\TwoFactorException;
|
2016-05-11 12:23:25 +03:00
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\ISession;
|
|
|
|
use OCP\IURLGenerator;
|
|
|
|
use OCP\IUserSession;
|
|
|
|
|
|
|
|
class TwoFactorChallengeController extends Controller {
|
|
|
|
|
|
|
|
/** @var Manager */
|
|
|
|
private $twoFactorManager;
|
|
|
|
|
|
|
|
/** @var IUserSession */
|
|
|
|
private $userSession;
|
|
|
|
|
|
|
|
/** @var ISession */
|
|
|
|
private $session;
|
|
|
|
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
|
|
|
* @param Manager $twoFactorManager
|
|
|
|
* @param IUserSession $userSession
|
|
|
|
* @param ISession $session
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
*/
|
|
|
|
public function __construct($appName, IRequest $request, Manager $twoFactorManager, IUserSession $userSession,
|
|
|
|
ISession $session, IURLGenerator $urlGenerator) {
|
|
|
|
parent::__construct($appName, $request);
|
|
|
|
$this->twoFactorManager = $twoFactorManager;
|
|
|
|
$this->userSession = $userSession;
|
|
|
|
$this->session = $session;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
|
|
|
}
|
|
|
|
|
2016-06-07 18:53:00 +03:00
|
|
|
/**
|
|
|
|
* @return string
|
|
|
|
*/
|
2017-08-18 13:16:43 +03:00
|
|
|
protected function getLogoutUrl() {
|
2017-08-18 16:32:40 +03:00
|
|
|
return OC_User::getLogoutUrl($this->urlGenerator);
|
2016-06-07 18:53:00 +03:00
|
|
|
}
|
2018-05-22 09:52:16 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param IProvider[] $providers
|
|
|
|
*/
|
|
|
|
private function splitProvidersAndBackupCodes(array $providers): array {
|
|
|
|
$regular = [];
|
|
|
|
$backup = null;
|
|
|
|
foreach ($providers as $provider) {
|
|
|
|
if ($provider->getId() === 'backup_codes') {
|
|
|
|
$backup = $provider;
|
|
|
|
} else {
|
|
|
|
$regular[] = $provider;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return [$regular, $backup];
|
|
|
|
}
|
2016-06-07 18:53:00 +03:00
|
|
|
|
2016-05-11 12:23:25 +03:00
|
|
|
/**
|
2016-05-24 11:50:18 +03:00
|
|
|
* @NoAdminRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
* @NoCSRFRequired
|
2019-10-25 15:42:00 +03:00
|
|
|
* @TwoFactorSetUpDoneRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
*
|
2016-06-01 14:54:08 +03:00
|
|
|
* @param string $redirect_url
|
2019-02-04 10:54:56 +03:00
|
|
|
* @return StandaloneTemplateResponse
|
2016-05-11 12:23:25 +03:00
|
|
|
*/
|
2016-06-01 14:54:08 +03:00
|
|
|
public function selectChallenge($redirect_url) {
|
2016-05-11 12:23:25 +03:00
|
|
|
$user = $this->userSession->getUser();
|
2018-05-22 09:52:16 +03:00
|
|
|
$providerSet = $this->twoFactorManager->getProviderSet($user);
|
|
|
|
$allProviders = $providerSet->getProviders();
|
2021-01-12 12:15:48 +03:00
|
|
|
[$providers, $backupProvider] = $this->splitProvidersAndBackupCodes($allProviders);
|
2019-04-05 19:21:08 +03:00
|
|
|
$setupProviders = $this->twoFactorManager->getLoginSetupProviders($user);
|
2016-05-11 12:23:25 +03:00
|
|
|
|
|
|
|
$data = [
|
|
|
|
'providers' => $providers,
|
2016-08-29 20:19:44 +03:00
|
|
|
'backupProvider' => $backupProvider,
|
2018-05-22 09:52:16 +03:00
|
|
|
'providerMissing' => $providerSet->isProviderMissing(),
|
2016-06-01 14:54:08 +03:00
|
|
|
'redirect_url' => $redirect_url,
|
2017-08-18 13:16:43 +03:00
|
|
|
'logout_url' => $this->getLogoutUrl(),
|
2019-04-05 19:21:08 +03:00
|
|
|
'hasSetupProviders' => !empty($setupProviders),
|
2016-05-11 12:23:25 +03:00
|
|
|
];
|
2019-02-04 10:54:56 +03:00
|
|
|
return new StandaloneTemplateResponse($this->appName, 'twofactorselectchallenge', $data, 'guest');
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-05-24 11:50:18 +03:00
|
|
|
* @NoAdminRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @UseSession
|
2019-10-25 15:42:00 +03:00
|
|
|
* @TwoFactorSetUpDoneRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
*
|
|
|
|
* @param string $challengeProviderId
|
2016-06-01 14:54:08 +03:00
|
|
|
* @param string $redirect_url
|
2019-02-04 10:54:56 +03:00
|
|
|
* @return StandaloneTemplateResponse|RedirectResponse
|
2016-05-11 12:23:25 +03:00
|
|
|
*/
|
2016-06-01 14:54:08 +03:00
|
|
|
public function showChallenge($challengeProviderId, $redirect_url) {
|
2016-05-11 12:23:25 +03:00
|
|
|
$user = $this->userSession->getUser();
|
2018-05-22 09:52:16 +03:00
|
|
|
$providerSet = $this->twoFactorManager->getProviderSet($user);
|
|
|
|
$provider = $providerSet->getProvider($challengeProviderId);
|
2019-04-05 19:21:08 +03:00
|
|
|
|
2016-05-11 12:23:25 +03:00
|
|
|
if (is_null($provider)) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('core.TwoFactorChallenge.selectChallenge'));
|
|
|
|
}
|
|
|
|
|
2018-05-22 09:52:16 +03:00
|
|
|
$backupProvider = $providerSet->getProvider('backup_codes');
|
2016-08-29 20:19:44 +03:00
|
|
|
if (!is_null($backupProvider) && $backupProvider->getId() === $provider->getId()) {
|
|
|
|
// Don't show the backup provider link if we're already showing that provider's challenge
|
|
|
|
$backupProvider = null;
|
|
|
|
}
|
|
|
|
|
2017-01-03 11:57:52 +03:00
|
|
|
$errorMessage = '';
|
|
|
|
$error = false;
|
2016-05-11 12:23:25 +03:00
|
|
|
if ($this->session->exists('two_factor_auth_error')) {
|
|
|
|
$this->session->remove('two_factor_auth_error');
|
|
|
|
$error = true;
|
2017-01-03 11:57:52 +03:00
|
|
|
$errorMessage = $this->session->get("two_factor_auth_error_message");
|
2016-11-14 17:39:19 +03:00
|
|
|
$this->session->remove('two_factor_auth_error_message');
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|
2016-06-01 14:54:08 +03:00
|
|
|
$tmpl = $provider->getTemplate($user);
|
|
|
|
$tmpl->assign('redirect_url', $redirect_url);
|
2016-05-11 12:23:25 +03:00
|
|
|
$data = [
|
|
|
|
'error' => $error,
|
2017-01-03 11:57:52 +03:00
|
|
|
'error_message' => $errorMessage,
|
2016-05-11 12:23:25 +03:00
|
|
|
'provider' => $provider,
|
2016-08-29 20:19:44 +03:00
|
|
|
'backupProvider' => $backupProvider,
|
2017-08-18 13:16:43 +03:00
|
|
|
'logout_url' => $this->getLogoutUrl(),
|
2016-12-23 22:53:26 +03:00
|
|
|
'redirect_url' => $redirect_url,
|
2016-06-01 14:54:08 +03:00
|
|
|
'template' => $tmpl->fetchPage(),
|
2016-05-11 12:23:25 +03:00
|
|
|
];
|
2019-02-04 10:54:56 +03:00
|
|
|
$response = new StandaloneTemplateResponse($this->appName, 'twofactorshowchallenge', $data, 'guest');
|
2017-08-24 15:00:33 +03:00
|
|
|
if ($provider instanceof IProvidesCustomCSP) {
|
|
|
|
$response->setContentSecurityPolicy($provider->getCSP());
|
|
|
|
}
|
|
|
|
return $response;
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-05-24 11:50:18 +03:00
|
|
|
* @NoAdminRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @UseSession
|
2019-10-25 15:42:00 +03:00
|
|
|
* @TwoFactorSetUpDoneRequired
|
2016-05-11 12:23:25 +03:00
|
|
|
*
|
2017-04-22 08:59:40 +03:00
|
|
|
* @UserRateThrottle(limit=5, period=100)
|
|
|
|
*
|
2016-05-11 12:23:25 +03:00
|
|
|
* @param string $challengeProviderId
|
|
|
|
* @param string $challenge
|
2016-06-01 14:54:08 +03:00
|
|
|
* @param string $redirect_url
|
2016-05-11 12:23:25 +03:00
|
|
|
* @return RedirectResponse
|
|
|
|
*/
|
2016-06-01 14:54:08 +03:00
|
|
|
public function solveChallenge($challengeProviderId, $challenge, $redirect_url = null) {
|
2016-05-11 12:23:25 +03:00
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
$provider = $this->twoFactorManager->getProvider($user, $challengeProviderId);
|
|
|
|
if (is_null($provider)) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('core.TwoFactorChallenge.selectChallenge'));
|
|
|
|
}
|
|
|
|
|
2016-11-14 17:39:19 +03:00
|
|
|
try {
|
|
|
|
if ($this->twoFactorManager->verifyChallenge($challengeProviderId, $user, $challenge)) {
|
|
|
|
if (!is_null($redirect_url)) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->getAbsoluteURL(urldecode($redirect_url)));
|
|
|
|
}
|
2017-01-03 11:57:52 +03:00
|
|
|
return new RedirectResponse(OC_Util::getDefaultPageUrl());
|
2016-06-01 14:54:08 +03:00
|
|
|
}
|
2016-11-14 17:39:19 +03:00
|
|
|
} catch (TwoFactorException $e) {
|
|
|
|
/*
|
|
|
|
* The 2FA App threw an TwoFactorException. Now we display more
|
|
|
|
* information to the user. The exception text is stored in the
|
|
|
|
* session to be used in showChallenge()
|
|
|
|
*/
|
2017-01-03 11:57:52 +03:00
|
|
|
$this->session->set('two_factor_auth_error_message', $e->getMessage());
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$this->session->set('two_factor_auth_error', true);
|
2016-06-01 14:54:08 +03:00
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('core.TwoFactorChallenge.showChallenge', [
|
|
|
|
'challengeProviderId' => $provider->getId(),
|
|
|
|
'redirect_url' => $redirect_url,
|
|
|
|
]));
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|
|
|
|
|
2019-04-05 19:21:08 +03:00
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*/
|
|
|
|
public function setupProviders() {
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
$setupProviders = $this->twoFactorManager->getLoginSetupProviders($user);
|
|
|
|
|
|
|
|
$data = [
|
|
|
|
'providers' => $setupProviders,
|
|
|
|
'logout_url' => $this->getLogoutUrl(),
|
|
|
|
];
|
|
|
|
|
|
|
|
$response = new StandaloneTemplateResponse($this->appName, 'twofactorsetupselection', $data, 'guest');
|
|
|
|
return $response;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*/
|
|
|
|
public function setupProvider(string $providerId) {
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
$providers = $this->twoFactorManager->getLoginSetupProviders($user);
|
|
|
|
|
|
|
|
$provider = null;
|
|
|
|
foreach ($providers as $p) {
|
|
|
|
if ($p->getId() === $providerId) {
|
|
|
|
$provider = $p;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($provider === null) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('core.TwoFactorChallenge.selectChallenge'));
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @var IActivatableAtLogin $provider */
|
|
|
|
$tmpl = $provider->getLoginSetup($user)->getBody();
|
|
|
|
$data = [
|
|
|
|
'provider' => $provider,
|
|
|
|
'logout_url' => $this->getLogoutUrl(),
|
|
|
|
'template' => $tmpl->fetchPage(),
|
|
|
|
];
|
|
|
|
$response = new StandaloneTemplateResponse($this->appName, 'twofactorsetupchallenge', $data, 'guest');
|
|
|
|
return $response;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*
|
|
|
|
* @todo handle the extreme edge case of an invalid provider ID and redirect to the provider selection page
|
|
|
|
*/
|
|
|
|
public function confirmProviderSetup(string $providerId) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute(
|
|
|
|
'core.TwoFactorChallenge.showChallenge',
|
|
|
|
[
|
|
|
|
'challengeProviderId' => $providerId,
|
|
|
|
]
|
|
|
|
));
|
|
|
|
}
|
2016-05-11 12:23:25 +03:00
|
|
|
}
|