2016-01-25 19:15:54 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-03-05 17:01:02 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2016-01-25 19:15:54 +03:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2016-01-25 19:15:54 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2016-01-25 19:15:54 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Security\CSRF;
|
|
|
|
|
|
|
|
use OC\Security\CSRF\TokenStorage\SessionStorage;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class CsrfTokenManager is the manager for all CSRF token related activities.
|
|
|
|
*
|
|
|
|
* @package OC\Security\CSRF
|
|
|
|
*/
|
|
|
|
class CsrfTokenManager {
|
|
|
|
/** @var CsrfTokenGenerator */
|
|
|
|
private $tokenGenerator;
|
|
|
|
/** @var SessionStorage */
|
|
|
|
private $sessionStorage;
|
2016-10-24 12:00:00 +03:00
|
|
|
/** @var CsrfToken|null */
|
|
|
|
private $csrfToken = null;
|
2016-01-25 19:15:54 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param CsrfTokenGenerator $tokenGenerator
|
|
|
|
* @param SessionStorage $storageInterface
|
|
|
|
*/
|
|
|
|
public function __construct(CsrfTokenGenerator $tokenGenerator,
|
|
|
|
SessionStorage $storageInterface) {
|
|
|
|
$this->tokenGenerator = $tokenGenerator;
|
|
|
|
$this->sessionStorage = $storageInterface;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the current CSRF token, if none set it will create a new one.
|
|
|
|
*
|
|
|
|
* @return CsrfToken
|
|
|
|
*/
|
2018-03-05 17:01:02 +03:00
|
|
|
public function getToken(): CsrfToken {
|
2020-04-10 15:19:56 +03:00
|
|
|
if (!\is_null($this->csrfToken)) {
|
2016-10-24 12:00:00 +03:00
|
|
|
return $this->csrfToken;
|
|
|
|
}
|
|
|
|
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->sessionStorage->hasToken()) {
|
2016-01-25 19:15:54 +03:00
|
|
|
$value = $this->sessionStorage->getToken();
|
|
|
|
} else {
|
|
|
|
$value = $this->tokenGenerator->generateToken();
|
|
|
|
$this->sessionStorage->setToken($value);
|
|
|
|
}
|
|
|
|
|
2016-10-24 12:00:00 +03:00
|
|
|
$this->csrfToken = new CsrfToken($value);
|
|
|
|
return $this->csrfToken;
|
2016-01-25 19:15:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Invalidates any current token and sets a new one.
|
|
|
|
*
|
|
|
|
* @return CsrfToken
|
|
|
|
*/
|
2018-03-05 17:01:02 +03:00
|
|
|
public function refreshToken(): CsrfToken {
|
2016-01-25 19:15:54 +03:00
|
|
|
$value = $this->tokenGenerator->generateToken();
|
|
|
|
$this->sessionStorage->setToken($value);
|
2016-10-24 12:00:00 +03:00
|
|
|
$this->csrfToken = new CsrfToken($value);
|
|
|
|
return $this->csrfToken;
|
2016-01-25 19:15:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Remove the current token from the storage.
|
|
|
|
*/
|
|
|
|
public function removeToken() {
|
2016-10-24 12:00:00 +03:00
|
|
|
$this->csrfToken = null;
|
2016-01-25 19:15:54 +03:00
|
|
|
$this->sessionStorage->removeToken();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Verifies whether the provided token is valid.
|
|
|
|
*
|
|
|
|
* @param CsrfToken $token
|
|
|
|
* @return bool
|
|
|
|
*/
|
2018-03-05 17:01:02 +03:00
|
|
|
public function isTokenValid(CsrfToken $token): bool {
|
2020-04-10 15:19:56 +03:00
|
|
|
if (!$this->sessionStorage->hasToken()) {
|
2016-01-25 19:15:54 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return hash_equals(
|
|
|
|
$this->sessionStorage->getToken(),
|
|
|
|
$token->getDecryptedValue()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|