2013-08-17 13:16:48 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Bernhard Posselt <dev@bernhard-posselt.com>
|
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Thomas Tanghus <thomas@tanghus.net>
|
2013-08-17 13:16:48 +04:00
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
2013-08-17 13:16:48 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2013-08-17 13:16:48 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2013-08-17 13:16:48 +04:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2013-08-17 13:16:48 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2013-08-17 13:16:48 +04:00
|
|
|
*
|
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
|
|
|
|
2013-08-17 13:16:48 +04:00
|
|
|
namespace OC\AppFramework\Middleware\Security;
|
|
|
|
|
2016-04-22 16:28:48 +03:00
|
|
|
use OC\AppFramework\Middleware\Security\Exceptions\AppNotEnabledException;
|
|
|
|
use OC\AppFramework\Middleware\Security\Exceptions\CrossSiteRequestForgeryException;
|
|
|
|
use OC\AppFramework\Middleware\Security\Exceptions\NotAdminException;
|
|
|
|
use OC\AppFramework\Middleware\Security\Exceptions\NotLoggedInException;
|
2014-05-06 18:29:19 +04:00
|
|
|
use OC\AppFramework\Utility\ControllerMethodReflector;
|
2016-01-28 16:33:02 +03:00
|
|
|
use OC\Security\CSP\ContentSecurityPolicyManager;
|
|
|
|
use OCP\AppFramework\Http\ContentSecurityPolicy;
|
2014-04-20 18:12:46 +04:00
|
|
|
use OCP\AppFramework\Http\RedirectResponse;
|
2015-11-28 13:06:46 +03:00
|
|
|
use OCP\AppFramework\Http\TemplateResponse;
|
2013-10-05 18:59:06 +04:00
|
|
|
use OCP\AppFramework\Middleware;
|
2013-08-21 03:00:26 +04:00
|
|
|
use OCP\AppFramework\Http\Response;
|
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2014-05-28 04:12:01 +04:00
|
|
|
use OCP\INavigationManager;
|
|
|
|
use OCP\IURLGenerator;
|
2013-10-07 02:33:54 +04:00
|
|
|
use OCP\IRequest;
|
2014-05-28 04:12:01 +04:00
|
|
|
use OCP\ILogger;
|
2014-11-14 19:20:51 +03:00
|
|
|
use OCP\AppFramework\Controller;
|
2014-11-17 17:10:47 +03:00
|
|
|
use OCP\Util;
|
2015-11-28 13:06:46 +03:00
|
|
|
use OC\AppFramework\Middleware\Security\Exceptions\SecurityException;
|
2013-08-17 13:16:48 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Used to do all the authentication and checking stuff for a controller method
|
|
|
|
* It reads out the annotations of a controller method and checks which if
|
|
|
|
* security things should be checked and also handles errors in case a security
|
|
|
|
* check fails
|
|
|
|
*/
|
|
|
|
class SecurityMiddleware extends Middleware {
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var INavigationManager */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $navigationManager;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var IRequest */
|
2013-08-17 13:16:48 +04:00
|
|
|
private $request;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var ControllerMethodReflector */
|
2014-05-06 21:13:59 +04:00
|
|
|
private $reflector;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var string */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $appName;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var IURLGenerator */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $urlGenerator;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var ILogger */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $logger;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var bool */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $isLoggedIn;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var bool */
|
2014-05-28 04:12:01 +04:00
|
|
|
private $isAdminUser;
|
2016-01-28 16:33:02 +03:00
|
|
|
/** @var ContentSecurityPolicyManager */
|
|
|
|
private $contentSecurityPolicyManager;
|
2014-05-06 21:13:59 +04:00
|
|
|
|
2013-08-17 13:16:48 +04:00
|
|
|
/**
|
2013-10-07 02:33:54 +04:00
|
|
|
* @param IRequest $request
|
2014-05-06 18:29:19 +04:00
|
|
|
* @param ControllerMethodReflector $reflector
|
2014-05-28 04:12:01 +04:00
|
|
|
* @param INavigationManager $navigationManager
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param ILogger $logger
|
|
|
|
* @param string $appName
|
|
|
|
* @param bool $isLoggedIn
|
|
|
|
* @param bool $isAdminUser
|
2016-01-28 16:33:02 +03:00
|
|
|
* @param ContentSecurityPolicyManager $contentSecurityPolicyManager
|
2013-08-17 13:16:48 +04:00
|
|
|
*/
|
2014-05-28 04:12:01 +04:00
|
|
|
public function __construct(IRequest $request,
|
2015-07-20 13:54:22 +03:00
|
|
|
ControllerMethodReflector $reflector,
|
|
|
|
INavigationManager $navigationManager,
|
|
|
|
IURLGenerator $urlGenerator,
|
|
|
|
ILogger $logger,
|
|
|
|
$appName,
|
|
|
|
$isLoggedIn,
|
2016-01-28 16:33:02 +03:00
|
|
|
$isAdminUser,
|
|
|
|
ContentSecurityPolicyManager $contentSecurityPolicyManager) {
|
2014-05-28 04:12:01 +04:00
|
|
|
$this->navigationManager = $navigationManager;
|
2013-08-17 13:16:48 +04:00
|
|
|
$this->request = $request;
|
2014-05-06 18:29:19 +04:00
|
|
|
$this->reflector = $reflector;
|
2014-05-28 04:12:01 +04:00
|
|
|
$this->appName = $appName;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->isLoggedIn = $isLoggedIn;
|
|
|
|
$this->isAdminUser = $isAdminUser;
|
2016-01-28 16:33:02 +03:00
|
|
|
$this->contentSecurityPolicyManager = $contentSecurityPolicyManager;
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This runs all the security checks before a method call. The
|
|
|
|
* security checks are determined by inspecting the controller method
|
|
|
|
* annotations
|
2014-02-19 12:31:54 +04:00
|
|
|
* @param string $controller the controllername or string
|
2013-08-17 13:16:48 +04:00
|
|
|
* @param string $methodName the name of the method
|
|
|
|
* @throws SecurityException when a security check fails
|
|
|
|
*/
|
2015-11-28 13:06:46 +03:00
|
|
|
public function beforeController($controller, $methodName) {
|
2013-08-17 13:16:48 +04:00
|
|
|
|
|
|
|
// this will set the current navigation entry of the app, use this only
|
|
|
|
// for normal HTML requests and not for AJAX requests
|
2014-05-28 04:12:01 +04:00
|
|
|
$this->navigationManager->setActiveEntry($this->appName);
|
2013-08-17 13:16:48 +04:00
|
|
|
|
|
|
|
// security checks
|
2014-05-06 18:29:19 +04:00
|
|
|
$isPublicPage = $this->reflector->hasAnnotation('PublicPage');
|
2013-08-20 23:21:21 +04:00
|
|
|
if(!$isPublicPage) {
|
2014-05-28 04:12:01 +04:00
|
|
|
if(!$this->isLoggedIn) {
|
2015-11-28 13:06:46 +03:00
|
|
|
throw new NotLoggedInException();
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
|
2014-05-06 18:29:19 +04:00
|
|
|
if(!$this->reflector->hasAnnotation('NoAdminRequired')) {
|
2014-05-28 04:12:01 +04:00
|
|
|
if(!$this->isAdminUser) {
|
2015-11-28 13:06:46 +03:00
|
|
|
throw new NotAdminException();
|
2013-08-20 23:21:21 +04:00
|
|
|
}
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-17 17:10:47 +03:00
|
|
|
// CSRF check - also registers the CSRF token since the session may be closed later
|
|
|
|
Util::callRegister();
|
2014-05-06 18:29:19 +04:00
|
|
|
if(!$this->reflector->hasAnnotation('NoCSRFRequired')) {
|
2013-10-07 02:33:54 +04:00
|
|
|
if(!$this->request->passesCSRFCheck()) {
|
2015-11-28 13:06:46 +03:00
|
|
|
throw new CrossSiteRequestForgeryException();
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-14 19:20:51 +03:00
|
|
|
/**
|
|
|
|
* FIXME: Use DI once available
|
2015-11-28 13:06:46 +03:00
|
|
|
* Checks if app is enabled (also includes a check whether user is allowed to access the resource)
|
2014-11-14 19:20:51 +03:00
|
|
|
* The getAppPath() check is here since components such as settings also use the AppFramework and
|
|
|
|
* therefore won't pass this check.
|
|
|
|
*/
|
|
|
|
if(\OC_App::getAppPath($this->appName) !== false && !\OC_App::isEnabled($this->appName)) {
|
2015-11-28 13:06:46 +03:00
|
|
|
throw new AppNotEnabledException();
|
2014-11-14 19:20:51 +03:00
|
|
|
}
|
|
|
|
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
|
2016-01-28 16:33:02 +03:00
|
|
|
/**
|
|
|
|
* Performs the default CSP modifications that may be injected by other
|
|
|
|
* applications
|
|
|
|
*
|
|
|
|
* @param Controller $controller
|
|
|
|
* @param string $methodName
|
|
|
|
* @param Response $response
|
|
|
|
* @return Response
|
|
|
|
*/
|
|
|
|
public function afterController($controller, $methodName, Response $response) {
|
|
|
|
$policy = !is_null($response->getContentSecurityPolicy()) ? $response->getContentSecurityPolicy() : new ContentSecurityPolicy();
|
|
|
|
|
|
|
|
$defaultPolicy = $this->contentSecurityPolicyManager->getDefaultPolicy();
|
|
|
|
$defaultPolicy = $this->contentSecurityPolicyManager->mergePolicies($defaultPolicy, $policy);
|
|
|
|
|
|
|
|
$response->setContentSecurityPolicy($defaultPolicy);
|
|
|
|
|
|
|
|
return $response;
|
|
|
|
}
|
2013-08-17 13:16:48 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* If an SecurityException is being caught, ajax requests return a JSON error
|
|
|
|
* response and non ajax requests redirect to the index
|
|
|
|
* @param Controller $controller the controller that is being called
|
|
|
|
* @param string $methodName the name of the method that will be called on
|
|
|
|
* the controller
|
|
|
|
* @param \Exception $exception the thrown exception
|
2016-04-07 20:51:27 +03:00
|
|
|
* @throws \Exception the passed in exception if it can't handle it
|
2013-08-17 13:16:48 +04:00
|
|
|
* @return Response a Response object or null in case that the exception could not be handled
|
|
|
|
*/
|
2015-11-28 13:06:46 +03:00
|
|
|
public function afterException($controller, $methodName, \Exception $exception) {
|
|
|
|
if($exception instanceof SecurityException) {
|
2013-08-17 13:16:48 +04:00
|
|
|
|
2015-11-28 13:06:46 +03:00
|
|
|
if (stripos($this->request->getHeader('Accept'),'html') === false) {
|
2013-08-17 13:16:48 +04:00
|
|
|
$response = new JSONResponse(
|
|
|
|
array('message' => $exception->getMessage()),
|
|
|
|
$exception->getCode()
|
|
|
|
);
|
|
|
|
} else {
|
2015-11-28 13:06:46 +03:00
|
|
|
if($exception instanceof NotLoggedInException) {
|
2016-04-11 13:08:00 +03:00
|
|
|
$url = $this->urlGenerator->linkToRoute(
|
|
|
|
'core.login.showLoginForm',
|
|
|
|
[
|
|
|
|
'redirect_url' => urlencode($this->request->server['REQUEST_URI']),
|
|
|
|
]
|
|
|
|
);
|
2015-11-28 13:06:46 +03:00
|
|
|
$response = new RedirectResponse($url);
|
|
|
|
} else {
|
|
|
|
$response = new TemplateResponse('core', '403', ['file' => $exception->getMessage()], 'guest');
|
|
|
|
$response->setStatus($exception->getCode());
|
|
|
|
}
|
2013-08-17 13:16:48 +04:00
|
|
|
}
|
|
|
|
|
2015-11-28 13:06:46 +03:00
|
|
|
$this->logger->debug($exception->getMessage());
|
2013-08-17 13:16:48 +04:00
|
|
|
return $response;
|
|
|
|
}
|
|
|
|
|
|
|
|
throw $exception;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|