2011-07-20 18:36:36 +04:00
|
|
|
<?php
|
2015-02-26 13:37:37 +03:00
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Jakob Sack <mail@jakobsack.de>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Markus Goetz <markus@woboq.com>
|
|
|
|
* @author Michael Gapczynski <GapczynskiM@gmail.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-02-26 13:37:37 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
|
|
|
*/
|
2019-11-22 22:52:10 +03:00
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
namespace OCA\DAV\Connector\Sabre;
|
2015-02-12 14:29:01 +03:00
|
|
|
|
2015-06-29 13:04:41 +03:00
|
|
|
use Exception;
|
2016-06-17 12:01:35 +03:00
|
|
|
use OC\Authentication\Exceptions\PasswordLoginForbiddenException;
|
2016-06-01 11:42:38 +03:00
|
|
|
use OC\Authentication\TwoFactorAuth\Manager;
|
2016-07-20 19:36:15 +03:00
|
|
|
use OC\Security\Bruteforce\Throttler;
|
2016-06-01 11:42:38 +03:00
|
|
|
use OC\User\Session;
|
2016-06-17 12:18:27 +03:00
|
|
|
use OCA\DAV\Connector\Sabre\Exception\PasswordLoginForbidden;
|
2016-02-16 15:16:52 +03:00
|
|
|
use OCP\IRequest;
|
2015-10-23 18:26:54 +03:00
|
|
|
use OCP\ISession;
|
2015-06-29 13:04:41 +03:00
|
|
|
use Sabre\DAV\Auth\Backend\AbstractBasic;
|
|
|
|
use Sabre\DAV\Exception\NotAuthenticated;
|
|
|
|
use Sabre\DAV\Exception\ServiceUnavailable;
|
2015-11-20 15:35:23 +03:00
|
|
|
use Sabre\HTTP\RequestInterface;
|
|
|
|
use Sabre\HTTP\ResponseInterface;
|
2015-06-29 13:04:41 +03:00
|
|
|
|
|
|
|
class Auth extends AbstractBasic {
|
2020-04-10 17:54:27 +03:00
|
|
|
public const DAV_AUTHENTICATED = 'AUTHENTICATED_TO_DAV_BACKEND';
|
2015-01-16 16:31:02 +03:00
|
|
|
|
2015-10-23 18:26:54 +03:00
|
|
|
/** @var ISession */
|
|
|
|
private $session;
|
2016-05-09 16:33:56 +03:00
|
|
|
/** @var Session */
|
2015-10-23 18:26:54 +03:00
|
|
|
private $userSession;
|
2016-02-16 15:16:52 +03:00
|
|
|
/** @var IRequest */
|
|
|
|
private $request;
|
2016-03-23 21:31:17 +03:00
|
|
|
/** @var string */
|
|
|
|
private $currentUser;
|
2016-06-01 11:42:38 +03:00
|
|
|
/** @var Manager */
|
|
|
|
private $twoFactorManager;
|
2016-07-20 19:36:15 +03:00
|
|
|
/** @var Throttler */
|
|
|
|
private $throttler;
|
2015-10-23 18:26:54 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param ISession $session
|
2016-05-09 16:33:56 +03:00
|
|
|
* @param Session $userSession
|
2016-02-16 15:16:52 +03:00
|
|
|
* @param IRequest $request
|
2016-06-01 11:42:38 +03:00
|
|
|
* @param Manager $twoFactorManager
|
2016-07-20 19:36:15 +03:00
|
|
|
* @param Throttler $throttler
|
2016-01-20 23:08:23 +03:00
|
|
|
* @param string $principalPrefix
|
2015-10-23 18:26:54 +03:00
|
|
|
*/
|
|
|
|
public function __construct(ISession $session,
|
2016-05-09 16:33:56 +03:00
|
|
|
Session $userSession,
|
2016-02-16 15:16:52 +03:00
|
|
|
IRequest $request,
|
2016-06-01 11:42:38 +03:00
|
|
|
Manager $twoFactorManager,
|
2016-07-20 19:36:15 +03:00
|
|
|
Throttler $throttler,
|
2016-01-20 23:08:23 +03:00
|
|
|
$principalPrefix = 'principals/users/') {
|
2015-10-23 18:26:54 +03:00
|
|
|
$this->session = $session;
|
|
|
|
$this->userSession = $userSession;
|
2016-06-01 11:42:38 +03:00
|
|
|
$this->twoFactorManager = $twoFactorManager;
|
2016-02-16 15:16:52 +03:00
|
|
|
$this->request = $request;
|
2016-07-20 19:36:15 +03:00
|
|
|
$this->throttler = $throttler;
|
2016-01-20 23:08:23 +03:00
|
|
|
$this->principalPrefix = $principalPrefix;
|
2016-06-09 14:53:32 +03:00
|
|
|
|
|
|
|
// setup realm
|
2016-07-15 09:46:31 +03:00
|
|
|
$defaults = new \OCP\Defaults();
|
2016-06-09 14:53:32 +03:00
|
|
|
$this->realm = $defaults->getName();
|
2015-10-23 18:26:54 +03:00
|
|
|
}
|
|
|
|
|
2015-01-16 16:31:02 +03:00
|
|
|
/**
|
|
|
|
* Whether the user has initially authenticated via DAV
|
|
|
|
*
|
|
|
|
* This is required for WebDAV clients that resent the cookies even when the
|
|
|
|
* account was changed.
|
|
|
|
*
|
|
|
|
* @see https://github.com/owncloud/core/issues/13245
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-11-10 09:54:35 +03:00
|
|
|
public function isDavAuthenticated($username) {
|
2015-10-23 18:26:54 +03:00
|
|
|
return !is_null($this->session->get(self::DAV_AUTHENTICATED)) &&
|
|
|
|
$this->session->get(self::DAV_AUTHENTICATED) === $username;
|
2015-01-16 16:31:02 +03:00
|
|
|
}
|
|
|
|
|
2011-07-20 18:36:36 +04:00
|
|
|
/**
|
|
|
|
* Validates a username and password
|
|
|
|
*
|
|
|
|
* This method should return true or false depending on if login
|
|
|
|
* succeeded.
|
|
|
|
*
|
2015-01-16 16:31:02 +03:00
|
|
|
* @param string $username
|
|
|
|
* @param string $password
|
2011-07-20 18:36:36 +04:00
|
|
|
* @return bool
|
2016-07-20 19:36:15 +03:00
|
|
|
* @throws PasswordLoginForbidden
|
2011-07-20 18:36:36 +04:00
|
|
|
*/
|
2012-09-07 17:22:01 +04:00
|
|
|
protected function validateUserPass($username, $password) {
|
2015-10-23 18:26:54 +03:00
|
|
|
if ($this->userSession->isLoggedIn() &&
|
|
|
|
$this->isDavAuthenticated($this->userSession->getUser()->getUID())
|
2015-01-16 16:31:02 +03:00
|
|
|
) {
|
2015-10-23 18:26:54 +03:00
|
|
|
\OC_Util::setupFS($this->userSession->getUser()->getUID());
|
|
|
|
$this->session->close();
|
2011-07-20 18:36:36 +04:00
|
|
|
return true;
|
2012-07-15 23:17:27 +04:00
|
|
|
} else {
|
2016-06-07 14:41:44 +03:00
|
|
|
\OC_Util::setupFS(); //login hooks may need early access to the filesystem
|
2016-06-17 12:01:35 +03:00
|
|
|
try {
|
2016-07-20 19:36:15 +03:00
|
|
|
if ($this->userSession->logClientIn($username, $password, $this->request, $this->throttler)) {
|
2016-06-17 12:01:35 +03:00
|
|
|
\OC_Util::setupFS($this->userSession->getUser()->getUID());
|
|
|
|
$this->session->set(self::DAV_AUTHENTICATED, $this->userSession->getUser()->getUID());
|
|
|
|
$this->session->close();
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$this->session->close();
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} catch (PasswordLoginForbiddenException $ex) {
|
2015-10-23 18:26:54 +03:00
|
|
|
$this->session->close();
|
2016-06-17 12:18:27 +03:00
|
|
|
throw new PasswordLoginForbidden();
|
2012-07-15 23:17:27 +04:00
|
|
|
}
|
2011-07-20 18:36:36 +04:00
|
|
|
}
|
|
|
|
}
|
2012-12-13 04:30:34 +04:00
|
|
|
|
2013-07-12 15:42:01 +04:00
|
|
|
/**
|
2015-11-20 15:35:23 +03:00
|
|
|
* @param RequestInterface $request
|
|
|
|
* @param ResponseInterface $response
|
|
|
|
* @return array
|
2015-10-23 18:26:54 +03:00
|
|
|
* @throws NotAuthenticated
|
2015-11-20 15:35:23 +03:00
|
|
|
* @throws ServiceUnavailable
|
2015-06-29 13:04:41 +03:00
|
|
|
*/
|
2020-04-10 17:51:06 +03:00
|
|
|
public function check(RequestInterface $request, ResponseInterface $response) {
|
2015-06-29 13:04:41 +03:00
|
|
|
try {
|
2018-02-13 23:55:24 +03:00
|
|
|
return $this->auth($request, $response);
|
2015-06-29 13:04:41 +03:00
|
|
|
} catch (NotAuthenticated $e) {
|
|
|
|
throw $e;
|
|
|
|
} catch (Exception $e) {
|
|
|
|
$class = get_class($e);
|
|
|
|
$msg = $e->getMessage();
|
2016-08-01 19:27:07 +03:00
|
|
|
\OC::$server->getLogger()->logException($e);
|
2015-06-29 13:04:41 +03:00
|
|
|
throw new ServiceUnavailable("$class: $msg");
|
|
|
|
}
|
2016-03-23 21:31:17 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks whether a CSRF check is required on the request
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function requiresCSRFCheck() {
|
|
|
|
// GET requires no check at all
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->request->getMethod() === 'GET') {
|
2016-03-23 21:31:17 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-04-12 07:16:27 +03:00
|
|
|
// Official Nextcloud clients require no checks
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->request->isUserAgent([
|
2017-02-10 12:05:24 +03:00
|
|
|
IRequest::USER_AGENT_CLIENT_DESKTOP,
|
|
|
|
IRequest::USER_AGENT_CLIENT_ANDROID,
|
|
|
|
IRequest::USER_AGENT_CLIENT_IOS,
|
2016-03-23 21:31:17 +03:00
|
|
|
])) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If not logged-in no check is required
|
2020-04-10 15:19:56 +03:00
|
|
|
if (!$this->userSession->isLoggedIn()) {
|
2016-03-23 21:31:17 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// POST always requires a check
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->request->getMethod() === 'POST') {
|
2016-03-23 21:31:17 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If logged-in AND DAV authenticated no check is required
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->userSession->isLoggedIn() &&
|
2016-03-23 21:31:17 +03:00
|
|
|
$this->isDavAuthenticated($this->userSession->getUser()->getUID())) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2014-03-10 17:40:36 +04:00
|
|
|
|
|
|
|
/**
|
2015-11-20 15:35:23 +03:00
|
|
|
* @param RequestInterface $request
|
|
|
|
* @param ResponseInterface $response
|
|
|
|
* @return array
|
2016-02-16 15:16:52 +03:00
|
|
|
* @throws NotAuthenticated
|
2014-03-10 17:40:36 +04:00
|
|
|
*/
|
2015-11-20 15:35:23 +03:00
|
|
|
private function auth(RequestInterface $request, ResponseInterface $response) {
|
2016-03-23 21:31:17 +03:00
|
|
|
$forcedLogout = false;
|
2017-05-05 00:46:59 +03:00
|
|
|
|
2020-04-10 15:19:56 +03:00
|
|
|
if (!$this->request->passesCSRFCheck() &&
|
2016-03-23 21:31:17 +03:00
|
|
|
$this->requiresCSRFCheck()) {
|
|
|
|
// In case of a fail with POST we need to recheck the credentials
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->request->getMethod() === 'POST') {
|
2016-03-23 21:31:17 +03:00
|
|
|
$forcedLogout = true;
|
|
|
|
} else {
|
2016-02-16 15:16:52 +03:00
|
|
|
$response->setStatus(401);
|
|
|
|
throw new \Sabre\DAV\Exception\NotAuthenticated('CSRF check not passed.');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($forcedLogout) {
|
2016-03-23 21:31:17 +03:00
|
|
|
$this->userSession->logout();
|
|
|
|
} else {
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($this->twoFactorManager->needsSecondFactor($this->userSession->getUser())) {
|
2016-06-01 11:42:38 +03:00
|
|
|
throw new \Sabre\DAV\Exception\NotAuthenticated('2FA challenge not passed.');
|
|
|
|
}
|
2018-10-31 00:11:17 +03:00
|
|
|
if (
|
2016-03-23 21:31:17 +03:00
|
|
|
//Fix for broken webdav clients
|
|
|
|
($this->userSession->isLoggedIn() && is_null($this->session->get(self::DAV_AUTHENTICATED))) ||
|
|
|
|
//Well behaved clients that only send the cookie are allowed
|
2018-10-31 00:11:17 +03:00
|
|
|
($this->userSession->isLoggedIn() && $this->session->get(self::DAV_AUTHENTICATED) === $this->userSession->getUser()->getUID() && $request->getHeader('Authorization') === null) ||
|
|
|
|
\OC_User::handleApacheAuth()
|
2016-03-23 21:31:17 +03:00
|
|
|
) {
|
|
|
|
$user = $this->userSession->getUser()->getUID();
|
|
|
|
\OC_Util::setupFS($user);
|
|
|
|
$this->currentUser = $user;
|
|
|
|
$this->session->close();
|
|
|
|
return [true, $this->principalPrefix . $user];
|
|
|
|
}
|
2013-07-12 15:42:01 +04:00
|
|
|
}
|
|
|
|
|
2015-12-11 13:22:38 +03:00
|
|
|
if (!$this->userSession->isLoggedIn() && in_array('XMLHttpRequest', explode(',', $request->getHeader('X-Requested-With')))) {
|
2015-11-19 16:18:27 +03:00
|
|
|
// do not re-authenticate over ajax, use dummy auth name to prevent browser popup
|
2015-11-20 15:35:23 +03:00
|
|
|
$response->addHeader('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"');
|
|
|
|
$response->setStatus(401);
|
2015-11-19 16:18:27 +03:00
|
|
|
throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls');
|
|
|
|
}
|
|
|
|
|
2016-03-19 01:31:11 +03:00
|
|
|
$data = parent::check($request, $response);
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($data[0] === true) {
|
2016-03-19 01:31:11 +03:00
|
|
|
$startPos = strrpos($data[1], '/') + 1;
|
|
|
|
$user = $this->userSession->getUser()->getUID();
|
|
|
|
$data[1] = substr_replace($data[1], $user, $startPos);
|
|
|
|
}
|
|
|
|
return $data;
|
2014-03-10 17:40:36 +04:00
|
|
|
}
|
2012-08-29 10:38:33 +04:00
|
|
|
}
|