2016-04-25 15:10:55 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2016-11-02 15:37:39 +03:00
|
|
|
* @copyright Copyright (c) 2016, Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 18:07:57 +03:00
|
|
|
*
|
2016-04-25 15:10:55 +03:00
|
|
|
* @author Christoph Wurst <christoph@owncloud.com>
|
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Authentication\Token;
|
|
|
|
|
2016-05-08 20:31:42 +03:00
|
|
|
use Exception;
|
2016-04-25 15:10:55 +03:00
|
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
2016-05-31 11:48:14 +03:00
|
|
|
use OC\Authentication\Exceptions\PasswordlessTokenException;
|
2016-04-25 15:10:55 +03:00
|
|
|
use OCP\AppFramework\Db\DoesNotExistException;
|
2016-05-02 20:58:19 +03:00
|
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
2016-04-25 15:10:55 +03:00
|
|
|
use OCP\IConfig;
|
|
|
|
use OCP\ILogger;
|
2016-05-18 12:33:56 +03:00
|
|
|
use OCP\IUser;
|
2016-04-25 15:10:55 +03:00
|
|
|
use OCP\Security\ICrypto;
|
|
|
|
|
|
|
|
class DefaultTokenProvider implements IProvider {
|
|
|
|
|
|
|
|
/** @var DefaultTokenMapper */
|
|
|
|
private $mapper;
|
|
|
|
|
|
|
|
/** @var ICrypto */
|
|
|
|
private $crypto;
|
|
|
|
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
|
|
|
|
/** @var ILogger $logger */
|
|
|
|
private $logger;
|
|
|
|
|
2016-05-02 20:58:19 +03:00
|
|
|
/** @var ITimeFactory $time */
|
|
|
|
private $time;
|
|
|
|
|
2016-04-25 17:40:41 +03:00
|
|
|
/**
|
|
|
|
* @param DefaultTokenMapper $mapper
|
|
|
|
* @param ICrypto $crypto
|
|
|
|
* @param IConfig $config
|
|
|
|
* @param ILogger $logger
|
2016-05-06 17:31:40 +03:00
|
|
|
* @param ITimeFactory $time
|
2016-04-25 17:40:41 +03:00
|
|
|
*/
|
2016-11-02 15:37:39 +03:00
|
|
|
public function __construct(DefaultTokenMapper $mapper,
|
|
|
|
ICrypto $crypto,
|
|
|
|
IConfig $config,
|
|
|
|
ILogger $logger,
|
|
|
|
ITimeFactory $time) {
|
2016-04-25 15:10:55 +03:00
|
|
|
$this->mapper = $mapper;
|
|
|
|
$this->crypto = $crypto;
|
|
|
|
$this->config = $config;
|
|
|
|
$this->logger = $logger;
|
2016-05-02 20:58:19 +03:00
|
|
|
$this->time = $time;
|
2016-04-25 15:10:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create and persist a new token
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $uid
|
2016-05-24 11:50:18 +03:00
|
|
|
* @param string $loginName
|
2016-05-31 11:48:14 +03:00
|
|
|
* @param string|null $password
|
2016-05-06 17:31:40 +03:00
|
|
|
* @param string $name
|
2016-05-02 20:58:19 +03:00
|
|
|
* @param int $type token type
|
2016-09-06 22:41:15 +03:00
|
|
|
* @param int $remember whether the session token should be used for remember-me
|
2016-05-24 11:50:18 +03:00
|
|
|
* @return IToken
|
2016-04-25 15:10:55 +03:00
|
|
|
*/
|
2016-09-06 22:41:15 +03:00
|
|
|
public function generateToken($token, $uid, $loginName, $password, $name, $type = IToken::TEMPORARY_TOKEN, $remember = IToken::DO_NOT_REMEMBER) {
|
2016-04-25 15:10:55 +03:00
|
|
|
$dbToken = new DefaultToken();
|
|
|
|
$dbToken->setUid($uid);
|
2016-05-24 11:50:18 +03:00
|
|
|
$dbToken->setLoginName($loginName);
|
2016-05-31 11:48:14 +03:00
|
|
|
if (!is_null($password)) {
|
|
|
|
$dbToken->setPassword($this->encryptPassword($password, $token));
|
|
|
|
}
|
2016-04-25 15:10:55 +03:00
|
|
|
$dbToken->setName($name);
|
2016-04-25 17:40:41 +03:00
|
|
|
$dbToken->setToken($this->hashToken($token));
|
2016-04-26 13:48:19 +03:00
|
|
|
$dbToken->setType($type);
|
2016-09-06 22:41:15 +03:00
|
|
|
$dbToken->setRemember($remember);
|
2016-05-02 20:58:19 +03:00
|
|
|
$dbToken->setLastActivity($this->time->getTime());
|
2016-04-25 15:10:55 +03:00
|
|
|
|
|
|
|
$this->mapper->insert($dbToken);
|
|
|
|
|
|
|
|
return $dbToken;
|
|
|
|
}
|
|
|
|
|
2016-06-17 14:59:15 +03:00
|
|
|
/**
|
|
|
|
* Save the updated token
|
|
|
|
*
|
|
|
|
* @param IToken $token
|
2016-11-02 15:37:39 +03:00
|
|
|
* @throws InvalidTokenException
|
2016-06-17 14:59:15 +03:00
|
|
|
*/
|
|
|
|
public function updateToken(IToken $token) {
|
|
|
|
if (!($token instanceof DefaultToken)) {
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
|
|
|
|
2016-04-26 12:32:35 +03:00
|
|
|
/**
|
|
|
|
* Update token activity timestamp
|
|
|
|
*
|
2016-05-06 17:31:40 +03:00
|
|
|
* @throws InvalidTokenException
|
|
|
|
* @param IToken $token
|
2016-04-26 12:32:35 +03:00
|
|
|
*/
|
2016-06-17 13:08:48 +03:00
|
|
|
public function updateTokenActivity(IToken $token) {
|
2016-04-27 10:38:30 +03:00
|
|
|
if (!($token instanceof DefaultToken)) {
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
|
|
|
/** @var DefaultToken $token */
|
2016-06-17 13:08:48 +03:00
|
|
|
$now = $this->time->getTime();
|
|
|
|
if ($token->getLastActivity() < ($now - 60)) {
|
|
|
|
// Update token only once per minute
|
|
|
|
$token->setLastActivity($now);
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
2016-04-26 12:32:35 +03:00
|
|
|
}
|
|
|
|
|
2016-05-18 12:33:56 +03:00
|
|
|
/**
|
2017-07-21 10:50:44 +03:00
|
|
|
* Get all tokens of a user
|
2016-05-18 12:33:56 +03:00
|
|
|
*
|
|
|
|
* The provider may limit the number of result rows in case of an abuse
|
|
|
|
* where a high number of (session) tokens is generated
|
|
|
|
*
|
|
|
|
* @param IUser $user
|
|
|
|
* @return IToken[]
|
|
|
|
*/
|
|
|
|
public function getTokenByUser(IUser $user) {
|
|
|
|
return $this->mapper->getTokenByUser($user);
|
|
|
|
}
|
|
|
|
|
2016-04-26 12:32:35 +03:00
|
|
|
/**
|
2016-08-03 16:57:06 +03:00
|
|
|
* Get a token by token
|
2016-05-17 18:20:54 +03:00
|
|
|
*
|
|
|
|
* @param string $tokenId
|
2016-04-26 12:32:35 +03:00
|
|
|
* @throws InvalidTokenException
|
2016-05-06 17:31:40 +03:00
|
|
|
* @return DefaultToken
|
2016-04-26 12:32:35 +03:00
|
|
|
*/
|
2016-05-17 18:20:54 +03:00
|
|
|
public function getToken($tokenId) {
|
2016-04-26 12:32:35 +03:00
|
|
|
try {
|
2016-05-17 18:20:54 +03:00
|
|
|
return $this->mapper->getToken($this->hashToken($tokenId));
|
2016-04-26 12:32:35 +03:00
|
|
|
} catch (DoesNotExistException $ex) {
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-03 16:57:06 +03:00
|
|
|
/**
|
|
|
|
* Get a token by token id
|
|
|
|
*
|
|
|
|
* @param string $tokenId
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
* @return DefaultToken
|
|
|
|
*/
|
|
|
|
public function getTokenById($tokenId) {
|
|
|
|
try {
|
|
|
|
return $this->mapper->getTokenById($tokenId);
|
|
|
|
} catch (DoesNotExistException $ex) {
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-06 22:41:15 +03:00
|
|
|
/**
|
|
|
|
* @param string $oldSessionId
|
|
|
|
* @param string $sessionId
|
2016-11-02 15:37:39 +03:00
|
|
|
* @throws InvalidTokenException
|
2016-09-06 22:41:15 +03:00
|
|
|
*/
|
|
|
|
public function renewSessionToken($oldSessionId, $sessionId) {
|
|
|
|
$token = $this->getToken($oldSessionId);
|
|
|
|
|
|
|
|
$newToken = new DefaultToken();
|
|
|
|
$newToken->setUid($token->getUID());
|
|
|
|
$newToken->setLoginName($token->getLoginName());
|
|
|
|
if (!is_null($token->getPassword())) {
|
|
|
|
$password = $this->decryptPassword($token->getPassword(), $oldSessionId);
|
|
|
|
$newToken->setPassword($this->encryptPassword($password, $sessionId));
|
|
|
|
}
|
|
|
|
$newToken->setName($token->getName());
|
|
|
|
$newToken->setToken($this->hashToken($sessionId));
|
|
|
|
$newToken->setType(IToken::TEMPORARY_TOKEN);
|
2016-11-27 16:19:57 +03:00
|
|
|
$newToken->setRemember($token->getRemember());
|
2016-09-06 22:41:15 +03:00
|
|
|
$newToken->setLastActivity($this->time->getTime());
|
|
|
|
$this->mapper->insert($newToken);
|
2017-09-18 11:33:19 +03:00
|
|
|
$this->mapper->delete($token);
|
2016-09-06 22:41:15 +03:00
|
|
|
}
|
|
|
|
|
2016-04-26 12:32:35 +03:00
|
|
|
/**
|
2016-05-17 18:20:54 +03:00
|
|
|
* @param IToken $savedToken
|
|
|
|
* @param string $tokenId session token
|
2016-05-18 19:25:05 +03:00
|
|
|
* @throws InvalidTokenException
|
2016-05-31 11:48:14 +03:00
|
|
|
* @throws PasswordlessTokenException
|
2016-05-06 17:31:40 +03:00
|
|
|
* @return string
|
2016-04-26 12:32:35 +03:00
|
|
|
*/
|
2016-05-17 18:20:54 +03:00
|
|
|
public function getPassword(IToken $savedToken, $tokenId) {
|
2016-05-31 11:48:14 +03:00
|
|
|
$password = $savedToken->getPassword();
|
|
|
|
if (is_null($password)) {
|
|
|
|
throw new PasswordlessTokenException();
|
|
|
|
}
|
|
|
|
return $this->decryptPassword($password, $tokenId);
|
2016-04-26 12:32:35 +03:00
|
|
|
}
|
|
|
|
|
2016-06-21 11:23:50 +03:00
|
|
|
/**
|
|
|
|
* Encrypt and set the password of the given token
|
|
|
|
*
|
|
|
|
* @param IToken $token
|
|
|
|
* @param string $tokenId
|
|
|
|
* @param string $password
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
*/
|
|
|
|
public function setPassword(IToken $token, $tokenId, $password) {
|
|
|
|
if (!($token instanceof DefaultToken)) {
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
|
|
|
/** @var DefaultToken $token */
|
|
|
|
$token->setPassword($this->encryptPassword($password, $tokenId));
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
|
|
|
|
2016-04-25 17:40:41 +03:00
|
|
|
/**
|
|
|
|
* Invalidate (delete) the given session token
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
*/
|
|
|
|
public function invalidateToken($token) {
|
|
|
|
$this->mapper->invalidate($this->hashToken($token));
|
|
|
|
}
|
|
|
|
|
2016-05-19 12:20:22 +03:00
|
|
|
/**
|
|
|
|
* Invalidate (delete) the given token
|
|
|
|
*
|
|
|
|
* @param IUser $user
|
|
|
|
* @param int $id
|
|
|
|
*/
|
|
|
|
public function invalidateTokenById(IUser $user, $id) {
|
|
|
|
$this->mapper->deleteById($user, $id);
|
|
|
|
}
|
|
|
|
|
2016-04-25 17:40:41 +03:00
|
|
|
/**
|
|
|
|
* Invalidate (delete) old session tokens
|
|
|
|
*/
|
|
|
|
public function invalidateOldTokens() {
|
2016-05-02 20:58:19 +03:00
|
|
|
$olderThan = $this->time->getTime() - (int) $this->config->getSystemValue('session_lifetime', 60 * 60 * 24);
|
2017-02-22 19:24:27 +03:00
|
|
|
$this->logger->debug('Invalidating session tokens older than ' . date('c', $olderThan), ['app' => 'cron']);
|
2016-09-06 22:41:15 +03:00
|
|
|
$this->mapper->invalidateOld($olderThan, IToken::DO_NOT_REMEMBER);
|
|
|
|
$rememberThreshold = $this->time->getTime() - (int) $this->config->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15);
|
2017-02-22 19:24:27 +03:00
|
|
|
$this->logger->debug('Invalidating remembered session tokens older than ' . date('c', $rememberThreshold), ['app' => 'cron']);
|
2016-09-06 22:41:15 +03:00
|
|
|
$this->mapper->invalidateOld($rememberThreshold, IToken::REMEMBER);
|
2016-04-25 17:40:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $token
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private function hashToken($token) {
|
2016-05-02 20:58:19 +03:00
|
|
|
$secret = $this->config->getSystemValue('secret');
|
|
|
|
return hash('sha512', $token . $secret);
|
2016-04-25 17:40:41 +03:00
|
|
|
}
|
|
|
|
|
2016-04-26 12:32:35 +03:00
|
|
|
/**
|
|
|
|
* Encrypt the given password
|
|
|
|
*
|
|
|
|
* The token is used as key
|
|
|
|
*
|
|
|
|
* @param string $password
|
|
|
|
* @param string $token
|
|
|
|
* @return string encrypted password
|
|
|
|
*/
|
|
|
|
private function encryptPassword($password, $token) {
|
|
|
|
$secret = $this->config->getSystemValue('secret');
|
|
|
|
return $this->crypto->encrypt($password, $token . $secret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt the given password
|
|
|
|
*
|
|
|
|
* The token is used as key
|
|
|
|
*
|
|
|
|
* @param string $password
|
|
|
|
* @param string $token
|
2016-05-18 19:25:05 +03:00
|
|
|
* @throws InvalidTokenException
|
2016-04-26 12:32:35 +03:00
|
|
|
* @return string the decrypted key
|
|
|
|
*/
|
|
|
|
private function decryptPassword($password, $token) {
|
|
|
|
$secret = $this->config->getSystemValue('secret');
|
2016-05-08 20:31:42 +03:00
|
|
|
try {
|
|
|
|
return $this->crypto->decrypt($password, $token . $secret);
|
|
|
|
} catch (Exception $ex) {
|
|
|
|
// Delete the invalid token
|
|
|
|
$this->invalidateToken($token);
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
2016-04-26 12:32:35 +03:00
|
|
|
}
|
|
|
|
|
2016-04-25 15:10:55 +03:00
|
|
|
}
|