2018-04-13 17:39:27 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @copyright Copyright (c) 2018 Robin Appelman <robin@icewind.nl>
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2018-04-13 17:39:27 +03:00
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-04-13 17:39:27 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Log;
|
|
|
|
|
2019-05-07 01:19:48 +03:00
|
|
|
use OC\Core\Controller\SetupController;
|
2018-04-13 17:39:27 +03:00
|
|
|
use OC\HintException;
|
2020-06-19 14:44:27 +03:00
|
|
|
use OC\Security\IdentityProof\Key;
|
2019-05-07 01:19:48 +03:00
|
|
|
use OC\Setup;
|
2018-04-13 17:39:27 +03:00
|
|
|
|
|
|
|
class ExceptionSerializer {
|
2020-04-10 17:54:27 +03:00
|
|
|
public const methodsWithSensitiveParameters = [
|
2018-04-13 17:39:27 +03:00
|
|
|
// Session/User
|
|
|
|
'completeLogin',
|
|
|
|
'login',
|
|
|
|
'checkPassword',
|
|
|
|
'checkPasswordNoLogging',
|
|
|
|
'loginWithPassword',
|
|
|
|
'updatePrivateKeyPassword',
|
|
|
|
'validateUserPass',
|
|
|
|
'loginWithToken',
|
|
|
|
'{closure}',
|
2018-07-11 15:26:57 +03:00
|
|
|
'createSessionToken',
|
2018-04-13 17:39:27 +03:00
|
|
|
|
2019-01-10 12:46:58 +03:00
|
|
|
// Provisioning
|
|
|
|
'addUser',
|
|
|
|
|
2018-04-13 17:39:27 +03:00
|
|
|
// TokenProvider
|
|
|
|
'getToken',
|
|
|
|
'isTokenPassword',
|
|
|
|
'getPassword',
|
|
|
|
'decryptPassword',
|
|
|
|
'logClientIn',
|
|
|
|
'generateToken',
|
|
|
|
'validateToken',
|
|
|
|
|
|
|
|
// TwoFactorAuth
|
|
|
|
'solveChallenge',
|
|
|
|
'verifyChallenge',
|
|
|
|
|
|
|
|
// ICrypto
|
|
|
|
'calculateHMAC',
|
|
|
|
'encrypt',
|
|
|
|
'decrypt',
|
|
|
|
|
|
|
|
// LoginController
|
|
|
|
'tryLogin',
|
|
|
|
'confirmPassword',
|
|
|
|
|
|
|
|
// LDAP
|
|
|
|
'bind',
|
|
|
|
'areCredentialsValid',
|
|
|
|
'invokeLDAPMethod',
|
|
|
|
|
|
|
|
// Encryption
|
|
|
|
'storeKeyPair',
|
|
|
|
'setupUser',
|
2019-03-12 17:51:38 +03:00
|
|
|
|
|
|
|
// files_external: OC_Mount_Config
|
|
|
|
'getBackendStatus',
|
|
|
|
|
|
|
|
// files_external: UserStoragesController
|
|
|
|
'update',
|
2019-05-07 01:19:48 +03:00
|
|
|
];
|
2019-04-30 13:21:12 +03:00
|
|
|
|
2020-04-10 17:54:27 +03:00
|
|
|
public const methodsWithSensitiveParametersByClass = [
|
2019-05-07 01:19:48 +03:00
|
|
|
SetupController::class => [
|
|
|
|
'run',
|
|
|
|
'display',
|
|
|
|
'loadAutoConfig',
|
|
|
|
],
|
|
|
|
Setup::class => [
|
|
|
|
'install'
|
2020-06-19 14:44:27 +03:00
|
|
|
],
|
|
|
|
Key::class => [
|
|
|
|
'__construct'
|
|
|
|
],
|
2018-04-13 17:39:27 +03:00
|
|
|
];
|
|
|
|
|
2019-05-07 01:19:48 +03:00
|
|
|
private function editTrace(array &$sensitiveValues, array $traceLine): array {
|
2019-11-22 00:25:08 +03:00
|
|
|
if (isset($traceLine['args'])) {
|
|
|
|
$sensitiveValues = array_merge($sensitiveValues, $traceLine['args']);
|
|
|
|
}
|
2019-11-22 14:37:32 +03:00
|
|
|
$traceLine['args'] = ['*** sensitive parameters replaced ***'];
|
2019-05-07 01:19:48 +03:00
|
|
|
return $traceLine;
|
|
|
|
}
|
|
|
|
|
2018-04-13 17:39:27 +03:00
|
|
|
private function filterTrace(array $trace) {
|
|
|
|
$sensitiveValues = [];
|
|
|
|
$trace = array_map(function (array $traceLine) use (&$sensitiveValues) {
|
2019-05-08 11:00:33 +03:00
|
|
|
$className = $traceLine['class'] ?? '';
|
|
|
|
if ($className && isset(self::methodsWithSensitiveParametersByClass[$className])
|
2019-05-07 01:19:48 +03:00
|
|
|
&& in_array($traceLine['function'], self::methodsWithSensitiveParametersByClass[$className], true)) {
|
|
|
|
return $this->editTrace($sensitiveValues, $traceLine);
|
|
|
|
}
|
2018-04-13 17:39:27 +03:00
|
|
|
foreach (self::methodsWithSensitiveParameters as $sensitiveMethod) {
|
|
|
|
if (strpos($traceLine['function'], $sensitiveMethod) !== false) {
|
2019-05-07 01:19:48 +03:00
|
|
|
return $this->editTrace($sensitiveValues, $traceLine);
|
2018-04-13 17:39:27 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $traceLine;
|
|
|
|
}, $trace);
|
|
|
|
return array_map(function (array $traceLine) use ($sensitiveValues) {
|
2018-07-18 15:42:05 +03:00
|
|
|
if (isset($traceLine['args'])) {
|
|
|
|
$traceLine['args'] = $this->removeValuesFromArgs($traceLine['args'], $sensitiveValues);
|
|
|
|
}
|
2018-04-13 17:39:27 +03:00
|
|
|
return $traceLine;
|
|
|
|
}, $trace);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function removeValuesFromArgs($args, $values) {
|
|
|
|
foreach ($args as &$arg) {
|
|
|
|
if (in_array($arg, $values, true)) {
|
|
|
|
$arg = '*** sensitive parameter replaced ***';
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (is_array($arg)) {
|
2018-04-13 17:39:27 +03:00
|
|
|
$arg = $this->removeValuesFromArgs($arg, $values);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $args;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function encodeTrace($trace) {
|
|
|
|
$filteredTrace = $this->filterTrace($trace);
|
|
|
|
return array_map(function (array $line) {
|
2018-07-18 15:42:05 +03:00
|
|
|
if (isset($line['args'])) {
|
|
|
|
$line['args'] = array_map([$this, 'encodeArg'], $line['args']);
|
|
|
|
}
|
2018-04-13 17:39:27 +03:00
|
|
|
return $line;
|
|
|
|
}, $filteredTrace);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function encodeArg($arg) {
|
|
|
|
if (is_object($arg)) {
|
|
|
|
$data = get_object_vars($arg);
|
|
|
|
$data['__class__'] = get_class($arg);
|
|
|
|
return array_map([$this, 'encodeArg'], $data);
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (is_array($arg)) {
|
2018-04-13 17:39:27 +03:00
|
|
|
return array_map([$this, 'encodeArg'], $arg);
|
|
|
|
} else {
|
|
|
|
return $arg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function serializeException(\Throwable $exception) {
|
|
|
|
$data = [
|
|
|
|
'Exception' => get_class($exception),
|
|
|
|
'Message' => $exception->getMessage(),
|
|
|
|
'Code' => $exception->getCode(),
|
|
|
|
'Trace' => $this->encodeTrace($exception->getTrace()),
|
|
|
|
'File' => $exception->getFile(),
|
|
|
|
'Line' => $exception->getLine(),
|
|
|
|
];
|
|
|
|
|
|
|
|
if ($exception instanceof HintException) {
|
|
|
|
$data['Hint'] = $exception->getHint();
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($exception->getPrevious()) {
|
|
|
|
$data['Previous'] = $this->serializeException($exception->getPrevious());
|
|
|
|
}
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
2018-07-18 15:42:05 +03:00
|
|
|
}
|