nextcloud/apps/encryption/lib/Hooks/UserHooks.php

347 lines
8.6 KiB
PHP
Raw Normal View History

2015-02-24 21:05:19 +03:00
<?php
/**
2016-07-21 17:49:16 +03:00
* @copyright Copyright (c) 2016, ownCloud, Inc.
*
2016-05-26 20:56:05 +03:00
* @author Björn Schießle <bjoern@schiessle.org>
* @author Clark Tomlinson <fallen013@gmail.com>
* @author Thomas Müller <thomas.mueller@tmit.eu>
*
2015-02-24 21:05:19 +03:00
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
*/
namespace OCA\Encryption\Hooks;
use OC\Files\Filesystem;
use OCP\IUserManager;
use OCP\Util as OCUtil;
2015-02-24 21:05:19 +03:00
use OCA\Encryption\Hooks\Contracts\IHook;
use OCA\Encryption\KeyManager;
2015-04-01 15:24:56 +03:00
use OCA\Encryption\Crypto\Crypt;
2015-02-24 21:05:19 +03:00
use OCA\Encryption\Users\Setup;
use OCP\App;
use OCP\ILogger;
use OCP\IUserSession;
use OCA\Encryption\Util;
use OCA\Encryption\Session;
use OCA\Encryption\Recovery;
2015-02-24 21:05:19 +03:00
class UserHooks implements IHook {
/**
* list of user for which we perform a password reset
* @var array
*/
protected static $passwordResetUsers = [];
2015-02-24 21:05:19 +03:00
/**
* @var KeyManager
*/
private $keyManager;
/**
* @var IUserManager
*/
private $userManager;
2015-02-24 21:05:19 +03:00
/**
* @var ILogger
*/
private $logger;
/**
* @var Setup
*/
private $userSetup;
/**
* @var IUserSession
*/
private $user;
/**
* @var Util
*/
private $util;
2015-03-27 03:35:36 +03:00
/**
* @var Session
2015-03-27 03:35:36 +03:00
*/
private $session;
/**
* @var Recovery
*/
private $recovery;
2015-04-01 15:24:56 +03:00
/**
* @var Crypt
*/
private $crypt;
2015-02-24 21:05:19 +03:00
/**
* UserHooks constructor.
*
* @param KeyManager $keyManager
* @param IUserManager $userManager
2015-02-24 21:05:19 +03:00
* @param ILogger $logger
* @param Setup $userSetup
* @param IUserSession $user
* @param Util $util
* @param Session $session
2015-04-01 15:24:56 +03:00
* @param Crypt $crypt
* @param Recovery $recovery
2015-02-24 21:05:19 +03:00
*/
2015-03-27 03:35:36 +03:00
public function __construct(KeyManager $keyManager,
IUserManager $userManager,
2015-03-27 03:35:36 +03:00
ILogger $logger,
Setup $userSetup,
IUserSession $user,
Util $util,
Session $session,
2015-04-01 15:24:56 +03:00
Crypt $crypt,
Recovery $recovery) {
2015-02-24 21:05:19 +03:00
$this->keyManager = $keyManager;
$this->userManager = $userManager;
2015-02-24 21:05:19 +03:00
$this->logger = $logger;
$this->userSetup = $userSetup;
$this->user = $user;
$this->util = $util;
2015-03-27 03:35:36 +03:00
$this->session = $session;
$this->recovery = $recovery;
2015-04-01 15:24:56 +03:00
$this->crypt = $crypt;
2015-02-24 21:05:19 +03:00
}
/**
* Connects Hooks
*
* @return null
*/
public function addHooks() {
OCUtil::connectHook('OC_User', 'post_login', $this, 'login');
OCUtil::connectHook('OC_User', 'logout', $this, 'logout');
// this hooks only make sense if no master key is used
if ($this->util->isMasterKeyEnabled() === false) {
OCUtil::connectHook('OC_User',
'post_setPassword',
$this,
'setPassphrase');
OCUtil::connectHook('OC_User',
'pre_setPassword',
$this,
'preSetPassphrase');
OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
'post_passwordReset',
$this,
'postPasswordReset');
OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
'pre_passwordReset',
$this,
'prePasswordReset');
OCUtil::connectHook('OC_User',
'post_createUser',
$this,
'postCreateUser');
OCUtil::connectHook('OC_User',
'post_deleteUser',
$this,
'postDeleteUser');
}
2015-02-24 21:05:19 +03:00
}
/**
* Startup encryption backend upon user login
*
* @note This method should never be called for users using client side encryption
* @param array $params
* @return boolean|null
2015-02-24 21:05:19 +03:00
*/
public function login($params) {
if (!App::isEnabled('encryption')) {
return true;
}
// ensure filesystem is loaded
if (!\OC\Files\Filesystem::$loaded) {
$this->setupFS($params['uid']);
2015-02-24 21:05:19 +03:00
}
if ($this->util->isMasterKeyEnabled() === false) {
$this->userSetup->setupUser($params['uid'], $params['password']);
2015-02-24 21:05:19 +03:00
}
$this->keyManager->init($params['uid'], $params['password']);
2015-02-24 21:05:19 +03:00
}
/**
* remove keys from session during logout
*/
public function logout() {
$this->session->clear();
2015-02-24 21:05:19 +03:00
}
/**
* setup encryption backend upon user created
*
* @note This method should never be called for users using client side encryption
* @param array $params
2015-02-24 21:05:19 +03:00
*/
public function postCreateUser($params) {
if (App::isEnabled('encryption')) {
$this->userSetup->setupUser($params['uid'], $params['password']);
2015-02-24 21:05:19 +03:00
}
}
/**
* cleanup encryption backend upon user deleted
*
* @param array $params : uid, password
2015-02-24 21:05:19 +03:00
* @note This method should never be called for users using client side encryption
*/
public function postDeleteUser($params) {
if (App::isEnabled('encryption')) {
$this->keyManager->deletePublicKey($params['uid']);
2015-02-24 21:05:19 +03:00
}
}
public function prePasswordReset($params) {
if (App::isEnabled('encryption')) {
$user = $params['uid'];
self::$passwordResetUsers[$user] = true;
}
}
public function postPasswordReset($params) {
$uid = $params['uid'];
$password = $params['password'];
$this->keyManager->backupUserKeys('passwordReset', $uid);
$this->keyManager->deleteUserKeys($uid);
$this->userSetup->setupUser($uid, $password);
unset(self::$passwordResetUsers[$uid]);
}
2015-02-24 21:05:19 +03:00
/**
* If the password can't be changed within ownCloud, than update the key password in advance.
*
* @param array $params : uid, password
* @return boolean|null
2015-02-24 21:05:19 +03:00
*/
public function preSetPassphrase($params) {
$user = $this->userManager->get($params['uid']);
if ($user && !$user->canChangePassword()) {
$this->setPassphrase($params);
}
}
2015-04-02 14:12:05 +03:00
/**
* Change a user's encryption passphrase
*
* @param array $params keys: uid, password
* @return boolean|null
*/
public function setPassphrase($params) {
// if we are in the process to resetting a user password, we have nothing
// to do here
if (isset(self::$passwordResetUsers[$params['uid']])) {
return true;
}
// Get existing decrypted private key
$privateKey = $this->session->getPrivateKey();
$user = $this->user->getUser();
// current logged in user changes his own password
if ($user && $params['uid'] === $user->getUID() && $privateKey) {
// Encrypt private key with new user pwd as passphrase
$encryptedPrivateKey = $this->crypt->encryptPrivateKey($privateKey, $params['password'], $params['uid']);
// Save private key
if ($encryptedPrivateKey) {
2015-04-01 15:24:56 +03:00
$this->keyManager->setPrivateKey($this->user->getUser()->getUID(),
$this->crypt->generateHeader() . $encryptedPrivateKey);
} else {
2015-04-02 14:12:05 +03:00
$this->logger->error('Encryption could not update users encryption password');
}
// NOTE: Session does not need to be updated as the
// private key has not changed, only the passphrase
// used to decrypt it has changed
} else { // admin changed the password for a different user, create new keys and re-encrypt file keys
$user = $params['uid'];
$this->initMountPoints($user);
$recoveryPassword = isset($params['recoveryPassword']) ? $params['recoveryPassword'] : null;
// we generate new keys if...
// ...we have a recovery password and the user enabled the recovery key
// ...encryption was activated for the first time (no keys exists)
// ...the user doesn't have any files
2015-04-01 15:24:56 +03:00
if (
($this->recovery->isRecoveryEnabledForUser($user) && $recoveryPassword)
|| !$this->keyManager->userHasKeys($user)
|| !$this->util->userHasFiles($user)
) {
// backup old keys
2015-04-01 15:24:56 +03:00
//$this->backupAllKeys('recovery');
$newUserPassword = $params['password'];
$keyPair = $this->crypt->createKeyPair();
// Save public key
2015-04-01 15:24:56 +03:00
$this->keyManager->setPublicKey($user, $keyPair['publicKey']);
// Encrypt private key with new password
$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword, $user);
if ($encryptedKey) {
$this->keyManager->setPrivateKey($user, $this->crypt->generateHeader() . $encryptedKey);
if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
2015-04-01 15:24:56 +03:00
$this->recovery->recoverUsersFiles($recoveryPassword, $user);
}
} else {
2015-04-02 14:12:05 +03:00
$this->logger->error('Encryption Could not update users encryption password');
2015-02-24 21:05:19 +03:00
}
}
}
}
/**
* init mount points for given user
*
* @param string $user
* @throws \OC\User\NoUserException
*/
protected function initMountPoints($user) {
Filesystem::initMountPoints($user);
}
/**
* setup file system for user
*
* @param string $uid user id
*/
protected function setupFS($uid) {
\OC_Util::setupFS($uid);
2015-02-24 21:05:19 +03:00
}
}