2016-04-26 13:45:08 +03:00
|
|
|
<?php
|
2016-06-06 16:09:42 +03:00
|
|
|
|
2016-04-26 13:45:08 +03:00
|
|
|
/**
|
|
|
|
* @author Christoph Wurst <christoph@owncloud.com>
|
|
|
|
*
|
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Core\Controller;
|
|
|
|
|
|
|
|
use OC\AppFramework\Http;
|
|
|
|
use OC\Authentication\Token\DefaultTokenProvider;
|
2016-06-06 16:09:42 +03:00
|
|
|
use OC\Authentication\Token\IProvider;
|
2016-04-26 13:48:19 +03:00
|
|
|
use OC\Authentication\Token\IToken;
|
2016-06-06 16:09:42 +03:00
|
|
|
use OC\Authentication\TwoFactorAuth\Manager as TwoFactorAuthManager;
|
|
|
|
use OC\User\Manager as UserManager;
|
|
|
|
use OCA\User_LDAP\User\Manager;
|
2016-04-26 13:45:08 +03:00
|
|
|
use OCP\AppFramework\Controller;
|
2016-05-06 17:31:40 +03:00
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2016-04-26 13:45:08 +03:00
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\Security\ISecureRandom;
|
|
|
|
|
|
|
|
class TokenController extends Controller {
|
|
|
|
|
2016-06-06 16:09:42 +03:00
|
|
|
/** @var UserManager */
|
2016-04-26 13:45:08 +03:00
|
|
|
private $userManager;
|
|
|
|
|
2016-06-06 16:09:42 +03:00
|
|
|
/** @var IProvider */
|
2016-04-26 13:45:08 +03:00
|
|
|
private $tokenProvider;
|
|
|
|
|
2016-06-06 16:09:42 +03:00
|
|
|
/** @var TwoFactorAuthManager */
|
|
|
|
private $twoFactorAuthManager;
|
|
|
|
|
2016-04-26 13:45:08 +03:00
|
|
|
/** @var ISecureRandom */
|
|
|
|
private $secureRandom;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
|
|
|
* @param Manager $userManager
|
|
|
|
* @param DefaultTokenProvider $tokenProvider
|
2016-04-29 17:31:27 +03:00
|
|
|
* @param ISecureRandom $secureRandom
|
2016-04-26 13:45:08 +03:00
|
|
|
*/
|
2016-06-06 16:09:42 +03:00
|
|
|
public function __construct($appName, IRequest $request, UserManager $userManager, IProvider $tokenProvider, TwoFactorAuthManager $twoFactorAuthManager, ISecureRandom $secureRandom) {
|
2016-04-26 13:45:08 +03:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
$this->userManager = $userManager;
|
|
|
|
$this->tokenProvider = $tokenProvider;
|
2016-04-29 17:31:27 +03:00
|
|
|
$this->secureRandom = $secureRandom;
|
2016-06-06 16:09:42 +03:00
|
|
|
$this->twoFactorAuthManager = $twoFactorAuthManager;
|
2016-04-26 13:45:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Generate a new access token clients can authenticate with
|
|
|
|
*
|
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*
|
|
|
|
* @param string $user
|
|
|
|
* @param string $password
|
2016-05-02 20:58:19 +03:00
|
|
|
* @param string $name the name of the client
|
2016-05-06 17:31:40 +03:00
|
|
|
* @return JSONResponse
|
2016-04-26 13:45:08 +03:00
|
|
|
*/
|
|
|
|
public function generateToken($user, $password, $name = 'unknown client') {
|
|
|
|
if (is_null($user) || is_null($password)) {
|
2016-06-06 16:09:42 +03:00
|
|
|
$response = new JSONResponse();
|
2016-04-27 10:38:30 +03:00
|
|
|
$response->setStatus(Http::STATUS_UNPROCESSABLE_ENTITY);
|
|
|
|
return $response;
|
2016-04-26 13:45:08 +03:00
|
|
|
}
|
2016-06-06 16:09:42 +03:00
|
|
|
$loginName = $user;
|
|
|
|
$user = $this->userManager->checkPassword($loginName, $password);
|
|
|
|
if ($user === false) {
|
|
|
|
$response = new JSONResponse();
|
2016-04-27 10:38:30 +03:00
|
|
|
$response->setStatus(Http::STATUS_UNAUTHORIZED);
|
|
|
|
return $response;
|
2016-04-26 13:45:08 +03:00
|
|
|
}
|
2016-06-06 16:09:42 +03:00
|
|
|
|
|
|
|
if ($this->twoFactorAuthManager->isTwoFactorAuthenticated($user)) {
|
|
|
|
$resp = new JSONResponse();
|
|
|
|
$resp->setStatus(Http::STATUS_UNAUTHORIZED);
|
|
|
|
return $resp;
|
|
|
|
}
|
|
|
|
|
2016-04-26 13:45:08 +03:00
|
|
|
$token = $this->secureRandom->generate(128);
|
2016-06-06 16:09:42 +03:00
|
|
|
$this->tokenProvider->generateToken($token, $user->getUID(), $loginName, $password, $name, IToken::PERMANENT_TOKEN);
|
2016-04-26 13:45:08 +03:00
|
|
|
return [
|
|
|
|
'token' => $token,
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|