2013-05-28 02:50:00 +04:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-02-27 00:20:21 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2013-05-28 02:50:00 +04:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author cetra3 <peter@parashift.com.au>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author MartB <mart.b@outlook.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Victor Dubiniuk <dubiniuk@owncloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2013-05-28 02:50:00 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2013-05-28 02:50:00 +04:00
|
|
|
namespace OC\Session;
|
|
|
|
|
2018-06-11 11:45:19 +03:00
|
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
|
|
|
use OC\Authentication\Token\IProvider;
|
2016-04-26 10:29:15 +03:00
|
|
|
use OCP\Session\Exceptions\SessionNotAvailableException;
|
|
|
|
|
2013-05-28 02:50:00 +04:00
|
|
|
/**
|
|
|
|
* Class Internal
|
|
|
|
*
|
|
|
|
* wrap php's internal session handling into the Session interface
|
|
|
|
*
|
|
|
|
* @package OC\Session
|
|
|
|
*/
|
2014-08-30 12:48:13 +04:00
|
|
|
class Internal extends Session {
|
2015-09-08 23:05:36 +03:00
|
|
|
/**
|
|
|
|
* @param string $name
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function __construct(string $name) {
|
|
|
|
set_error_handler([$this, 'trapError']);
|
2017-05-31 13:15:06 +03:00
|
|
|
$this->invoke('session_name', [$name]);
|
2015-10-19 20:54:12 +03:00
|
|
|
try {
|
2019-09-09 22:29:58 +03:00
|
|
|
$this->startSession();
|
2015-10-19 20:54:12 +03:00
|
|
|
} catch (\Exception $e) {
|
2018-09-06 21:34:16 +03:00
|
|
|
setcookie($this->invoke('session_name'), '', -1, \OC::$WEBROOT ?: '/');
|
2015-10-19 20:54:12 +03:00
|
|
|
}
|
2015-03-20 14:21:03 +03:00
|
|
|
restore_error_handler();
|
2013-05-28 03:13:36 +04:00
|
|
|
if (!isset($_SESSION)) {
|
2013-05-28 02:50:00 +04:00
|
|
|
throw new \Exception('Failed to start session');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-30 12:48:13 +04:00
|
|
|
/**
|
|
|
|
* @param string $key
|
|
|
|
* @param integer $value
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function set(string $key, $value) {
|
2014-08-30 12:48:13 +04:00
|
|
|
$this->validateSession();
|
|
|
|
$_SESSION[$key] = $value;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function get(string $key) {
|
2014-08-30 12:48:13 +04:00
|
|
|
if (!$this->exists($key)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return $_SESSION[$key];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key
|
|
|
|
* @return bool
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function exists(string $key): bool {
|
2014-08-30 12:48:13 +04:00
|
|
|
return isset($_SESSION[$key]);
|
|
|
|
}
|
|
|
|
|
2013-12-09 15:38:27 +04:00
|
|
|
/**
|
|
|
|
* @param string $key
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function remove(string $key) {
|
2013-12-11 15:59:48 +04:00
|
|
|
if (isset($_SESSION[$key])) {
|
|
|
|
unset($_SESSION[$key]);
|
|
|
|
}
|
2013-12-09 15:38:27 +04:00
|
|
|
}
|
|
|
|
|
2013-05-28 02:50:00 +04:00
|
|
|
public function clear() {
|
2017-05-31 13:15:06 +03:00
|
|
|
$this->invoke('session_unset');
|
2016-01-04 17:00:58 +03:00
|
|
|
$this->regenerateId();
|
2020-08-14 06:23:11 +03:00
|
|
|
$this->startSession(true);
|
2017-05-31 13:15:06 +03:00
|
|
|
$_SESSION = [];
|
2013-05-28 02:50:00 +04:00
|
|
|
}
|
2014-03-10 18:36:20 +04:00
|
|
|
|
|
|
|
public function close() {
|
2017-05-31 13:15:06 +03:00
|
|
|
$this->invoke('session_write_close');
|
2014-03-10 18:36:20 +04:00
|
|
|
parent::close();
|
|
|
|
}
|
|
|
|
|
2016-01-04 17:00:58 +03:00
|
|
|
/**
|
|
|
|
* Wrapper around session_regenerate_id
|
|
|
|
*
|
|
|
|
* @param bool $deleteOldSession Whether to delete the old associated session file or not.
|
2018-06-11 11:45:19 +03:00
|
|
|
* @param bool $updateToken Wheater to update the associated auth token
|
2016-01-04 17:00:58 +03:00
|
|
|
* @return void
|
|
|
|
*/
|
2018-06-11 11:45:19 +03:00
|
|
|
public function regenerateId(bool $deleteOldSession = true, bool $updateToken = false) {
|
|
|
|
$oldId = null;
|
|
|
|
|
|
|
|
if ($updateToken) {
|
|
|
|
// Get the old id to update the token
|
|
|
|
try {
|
|
|
|
$oldId = $this->getId();
|
|
|
|
} catch (SessionNotAvailableException $e) {
|
|
|
|
// We can't update a token if there is no previous id
|
|
|
|
$updateToken = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-31 13:15:06 +03:00
|
|
|
try {
|
|
|
|
@session_regenerate_id($deleteOldSession);
|
|
|
|
} catch (\Error $e) {
|
|
|
|
$this->trapError($e->getCode(), $e->getMessage());
|
|
|
|
}
|
2018-06-11 11:45:19 +03:00
|
|
|
|
|
|
|
if ($updateToken) {
|
|
|
|
// Get the new id to update the token
|
|
|
|
$newId = $this->getId();
|
|
|
|
|
|
|
|
/** @var IProvider $tokenProvider */
|
|
|
|
$tokenProvider = \OC::$server->query(IProvider::class);
|
|
|
|
|
|
|
|
try {
|
|
|
|
$tokenProvider->renewSessionToken($oldId, $newId);
|
|
|
|
} catch (InvalidTokenException $e) {
|
|
|
|
// Just ignore
|
|
|
|
}
|
|
|
|
}
|
2016-01-04 17:00:58 +03:00
|
|
|
}
|
|
|
|
|
2016-04-25 11:23:06 +03:00
|
|
|
/**
|
|
|
|
* Wrapper around session_id
|
|
|
|
*
|
|
|
|
* @return string
|
2016-04-26 10:29:15 +03:00
|
|
|
* @throws SessionNotAvailableException
|
2016-04-25 11:23:06 +03:00
|
|
|
* @since 9.1.0
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function getId(): string {
|
2017-05-31 13:15:06 +03:00
|
|
|
$id = $this->invoke('session_id', [], true);
|
2016-04-26 10:29:15 +03:00
|
|
|
if ($id === '') {
|
|
|
|
throw new SessionNotAvailableException();
|
|
|
|
}
|
|
|
|
return $id;
|
2016-04-25 11:23:06 +03:00
|
|
|
}
|
|
|
|
|
2016-01-04 17:00:58 +03:00
|
|
|
/**
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
public function reopen() {
|
|
|
|
throw new \Exception('The session cannot be reopened - reopen() is ony to be used in unit testing.');
|
|
|
|
}
|
2014-08-30 12:48:13 +04:00
|
|
|
|
2016-01-04 17:00:58 +03:00
|
|
|
/**
|
|
|
|
* @param int $errorNumber
|
|
|
|
* @param string $errorString
|
|
|
|
* @throws \ErrorException
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
public function trapError(int $errorNumber, string $errorString) {
|
2015-03-20 14:21:03 +03:00
|
|
|
throw new \ErrorException($errorString);
|
|
|
|
}
|
|
|
|
|
2016-01-04 17:00:58 +03:00
|
|
|
/**
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2015-03-20 14:21:03 +03:00
|
|
|
private function validateSession() {
|
2014-08-30 12:48:13 +04:00
|
|
|
if ($this->sessionClosed) {
|
2017-04-12 21:25:22 +03:00
|
|
|
throw new SessionNotAvailableException('Session has been closed - no further changes to the session are allowed');
|
2014-08-30 12:48:13 +04:00
|
|
|
}
|
|
|
|
}
|
2017-05-31 13:15:06 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $functionName the full session_* function name
|
|
|
|
* @param array $parameters
|
|
|
|
* @param bool $silence whether to suppress warnings
|
|
|
|
* @throws \ErrorException via trapError
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2018-02-27 00:20:21 +03:00
|
|
|
private function invoke(string $functionName, array $parameters = [], bool $silence = false) {
|
2017-05-31 13:15:06 +03:00
|
|
|
try {
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($silence) {
|
2017-05-31 13:15:06 +03:00
|
|
|
return @call_user_func_array($functionName, $parameters);
|
|
|
|
} else {
|
|
|
|
return call_user_func_array($functionName, $parameters);
|
|
|
|
}
|
2020-04-10 15:19:56 +03:00
|
|
|
} catch (\Error $e) {
|
2017-05-31 13:15:06 +03:00
|
|
|
$this->trapError($e->getCode(), $e->getMessage());
|
|
|
|
}
|
|
|
|
}
|
2019-09-09 22:29:58 +03:00
|
|
|
|
2020-08-14 06:23:11 +03:00
|
|
|
private function startSession(bool $silence = false) {
|
2019-09-09 22:29:58 +03:00
|
|
|
if (PHP_VERSION_ID < 70300) {
|
2020-08-14 06:23:11 +03:00
|
|
|
$this->invoke('session_start', [], $silence);
|
2019-09-09 22:29:58 +03:00
|
|
|
} else {
|
2020-08-14 06:23:11 +03:00
|
|
|
$this->invoke('session_start', [['cookie_samesite' => 'Lax']], $silence);
|
2019-09-09 22:29:58 +03:00
|
|
|
}
|
|
|
|
}
|
2013-05-28 02:50:00 +04:00
|
|
|
}
|