2018-05-18 20:48:08 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
/**
|
|
|
|
* @copyright Copyright 2018, Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2020-08-24 15:54:25 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Daniel Kesselberg <mail@danielkesselberg.de>
|
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2018-05-18 20:48:08 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @license GNU AGPL version 3 or any later version
|
2018-05-18 20:48:08 +03:00
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
2018-05-18 20:48:08 +03:00
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2019-12-03 21:57:53 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2018-05-18 20:48:08 +03:00
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-05-18 20:48:08 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Authentication\Token;
|
|
|
|
|
2018-10-30 15:18:41 +03:00
|
|
|
use OC\Authentication\Exceptions\ExpiredTokenException;
|
2018-05-18 20:48:08 +03:00
|
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
2019-10-07 15:05:57 +03:00
|
|
|
use OC\Authentication\Exceptions\TokenPasswordExpiredException;
|
2018-05-18 20:48:08 +03:00
|
|
|
use OC\Authentication\Exceptions\PasswordlessTokenException;
|
2019-04-03 17:00:46 +03:00
|
|
|
use OC\Authentication\Exceptions\WipeTokenException;
|
2019-10-08 14:57:36 +03:00
|
|
|
use OC\Cache\CappedMemoryCache;
|
2018-05-18 20:48:08 +03:00
|
|
|
use OCP\AppFramework\Db\DoesNotExistException;
|
|
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
|
|
|
use OCP\IConfig;
|
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\Security\ICrypto;
|
|
|
|
|
|
|
|
class PublicKeyTokenProvider implements IProvider {
|
|
|
|
/** @var PublicKeyTokenMapper */
|
|
|
|
private $mapper;
|
|
|
|
|
|
|
|
/** @var ICrypto */
|
|
|
|
private $crypto;
|
|
|
|
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
|
|
|
|
/** @var ILogger $logger */
|
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var ITimeFactory $time */
|
|
|
|
private $time;
|
|
|
|
|
2019-10-08 14:57:36 +03:00
|
|
|
/** @var CappedMemoryCache */
|
|
|
|
private $cache;
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
public function __construct(PublicKeyTokenMapper $mapper,
|
|
|
|
ICrypto $crypto,
|
|
|
|
IConfig $config,
|
|
|
|
ILogger $logger,
|
|
|
|
ITimeFactory $time) {
|
|
|
|
$this->mapper = $mapper;
|
|
|
|
$this->crypto = $crypto;
|
|
|
|
$this->config = $config;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->time = $time;
|
2019-10-08 14:57:36 +03:00
|
|
|
|
|
|
|
$this->cache = new CappedMemoryCache();
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2019-07-18 12:36:50 +03:00
|
|
|
/**
|
|
|
|
* {@inheritDoc}
|
|
|
|
*/
|
2018-05-18 20:48:08 +03:00
|
|
|
public function generateToken(string $token,
|
|
|
|
string $uid,
|
|
|
|
string $loginName,
|
|
|
|
$password,
|
|
|
|
string $name,
|
|
|
|
int $type = IToken::TEMPORARY_TOKEN,
|
|
|
|
int $remember = IToken::DO_NOT_REMEMBER): IToken {
|
2018-05-31 22:56:17 +03:00
|
|
|
$dbToken = $this->newToken($token, $uid, $loginName, $password, $name, $type, $remember);
|
2018-05-18 20:48:08 +03:00
|
|
|
$this->mapper->insert($dbToken);
|
|
|
|
|
2019-10-08 14:57:36 +03:00
|
|
|
// Add the token to the cache
|
|
|
|
$this->cache[$dbToken->getToken()] = $dbToken;
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
return $dbToken;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getToken(string $tokenId): IToken {
|
2019-10-08 14:57:36 +03:00
|
|
|
$tokenHash = $this->hashToken($tokenId);
|
|
|
|
|
|
|
|
if (isset($this->cache[$tokenHash])) {
|
|
|
|
$token = $this->cache[$tokenHash];
|
|
|
|
} else {
|
|
|
|
try {
|
|
|
|
$token = $this->mapper->getToken($this->hashToken($tokenId));
|
|
|
|
$this->cache[$token->getToken()] = $token;
|
|
|
|
} catch (DoesNotExistException $ex) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Token does not exist: " . $ex->getMessage(), 0, $ex);
|
2019-10-08 14:57:36 +03:00
|
|
|
}
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2018-09-20 10:54:27 +03:00
|
|
|
if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) {
|
2018-05-18 20:48:08 +03:00
|
|
|
throw new ExpiredTokenException($token);
|
|
|
|
}
|
|
|
|
|
2019-04-03 17:00:46 +03:00
|
|
|
if ($token->getType() === IToken::WIPE_TOKEN) {
|
|
|
|
throw new WipeTokenException($token);
|
|
|
|
}
|
|
|
|
|
2019-10-07 15:05:57 +03:00
|
|
|
if ($token->getPasswordInvalid() === true) {
|
|
|
|
//The password is invalid we should throw an TokenPasswordExpiredException
|
|
|
|
throw new TokenPasswordExpiredException($token);
|
|
|
|
}
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
return $token;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getTokenById(int $tokenId): IToken {
|
|
|
|
try {
|
|
|
|
$token = $this->mapper->getTokenById($tokenId);
|
|
|
|
} catch (DoesNotExistException $ex) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Token with ID $tokenId does not exist: " . $ex->getMessage(), 0, $ex);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2018-09-20 10:54:27 +03:00
|
|
|
if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) {
|
2018-05-18 20:48:08 +03:00
|
|
|
throw new ExpiredTokenException($token);
|
|
|
|
}
|
|
|
|
|
2019-04-03 17:00:46 +03:00
|
|
|
if ($token->getType() === IToken::WIPE_TOKEN) {
|
|
|
|
throw new WipeTokenException($token);
|
|
|
|
}
|
|
|
|
|
2019-10-07 15:05:57 +03:00
|
|
|
if ($token->getPasswordInvalid() === true) {
|
|
|
|
//The password is invalid we should throw an TokenPasswordExpiredException
|
|
|
|
throw new TokenPasswordExpiredException($token);
|
|
|
|
}
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
return $token;
|
|
|
|
}
|
|
|
|
|
2019-10-08 12:01:53 +03:00
|
|
|
public function renewSessionToken(string $oldSessionId, string $sessionId): IToken {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
$token = $this->getToken($oldSessionId);
|
|
|
|
|
2018-05-29 10:24:20 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-29 10:24:20 +03:00
|
|
|
}
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
$password = null;
|
|
|
|
if (!is_null($token->getPassword())) {
|
2018-05-29 10:24:20 +03:00
|
|
|
$privateKey = $this->decrypt($token->getPrivateKey(), $oldSessionId);
|
|
|
|
$password = $this->decryptPassword($token->getPassword(), $privateKey);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2019-10-08 12:01:53 +03:00
|
|
|
$newToken = $this->generateToken(
|
2018-05-18 20:48:08 +03:00
|
|
|
$sessionId,
|
|
|
|
$token->getUID(),
|
|
|
|
$token->getLoginName(),
|
|
|
|
$password,
|
|
|
|
$token->getName(),
|
|
|
|
IToken::TEMPORARY_TOKEN,
|
|
|
|
$token->getRemember()
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->mapper->delete($token);
|
2019-10-08 12:01:53 +03:00
|
|
|
|
|
|
|
return $newToken;
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function invalidateToken(string $token) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
$this->mapper->invalidate($this->hashToken($token));
|
|
|
|
}
|
|
|
|
|
2018-05-29 10:29:29 +03:00
|
|
|
public function invalidateTokenById(string $uid, int $id) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-29 10:29:29 +03:00
|
|
|
$this->mapper->deleteById($uid, $id);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function invalidateOldTokens() {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
$olderThan = $this->time->getTime() - (int) $this->config->getSystemValue('session_lifetime', 60 * 60 * 24);
|
|
|
|
$this->logger->debug('Invalidating session tokens older than ' . date('c', $olderThan), ['app' => 'cron']);
|
|
|
|
$this->mapper->invalidateOld($olderThan, IToken::DO_NOT_REMEMBER);
|
|
|
|
$rememberThreshold = $this->time->getTime() - (int) $this->config->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15);
|
|
|
|
$this->logger->debug('Invalidating remembered session tokens older than ' . date('c', $rememberThreshold), ['app' => 'cron']);
|
|
|
|
$this->mapper->invalidateOld($rememberThreshold, IToken::REMEMBER);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function updateToken(IToken $token) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function updateTokenActivity(IToken $token) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
/** @var DefaultToken $token */
|
|
|
|
$now = $this->time->getTime();
|
|
|
|
if ($token->getLastActivity() < ($now - 60)) {
|
|
|
|
// Update token only once per minute
|
|
|
|
$token->setLastActivity($now);
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-29 10:29:29 +03:00
|
|
|
public function getTokenByUser(string $uid): array {
|
|
|
|
return $this->mapper->getTokenByUser($uid);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2020-08-19 18:54:00 +03:00
|
|
|
public function getPassword(IToken $savedToken, string $tokenId): string {
|
|
|
|
if (!($savedToken instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
2020-08-19 18:54:00 +03:00
|
|
|
if ($savedToken->getPassword() === null) {
|
2018-05-29 10:24:20 +03:00
|
|
|
throw new PasswordlessTokenException();
|
|
|
|
}
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
// Decrypt private key with tokenId
|
2020-08-19 18:54:00 +03:00
|
|
|
$privateKey = $this->decrypt($savedToken->getPrivateKey(), $tokenId);
|
2018-05-18 20:48:08 +03:00
|
|
|
|
|
|
|
// Decrypt password with private key
|
2020-08-19 18:54:00 +03:00
|
|
|
return $this->decryptPassword($savedToken->getPassword(), $privateKey);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function setPassword(IToken $token, string $tokenId, string $password) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-29 13:18:10 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-29 13:18:10 +03:00
|
|
|
}
|
|
|
|
|
2018-06-04 10:51:13 +03:00
|
|
|
// When changing passwords all temp tokens are deleted
|
2018-05-31 22:56:17 +03:00
|
|
|
$this->mapper->deleteTempToken($token);
|
|
|
|
|
2018-05-29 13:18:10 +03:00
|
|
|
// Update the password for all tokens
|
|
|
|
$tokens = $this->mapper->getTokenByUser($token->getUID());
|
|
|
|
foreach ($tokens as $t) {
|
2018-05-31 23:56:26 +03:00
|
|
|
$publicKey = $t->getPublicKey();
|
2018-05-29 13:18:10 +03:00
|
|
|
$t->setPassword($this->encryptPassword($password, $publicKey));
|
|
|
|
$this->updateToken($t);
|
|
|
|
}
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function rotate(IToken $token, string $oldTokenId, string $newTokenId): IToken {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-18 20:48:08 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Decrypt private key with oldTokenId
|
|
|
|
$privateKey = $this->decrypt($token->getPrivateKey(), $oldTokenId);
|
|
|
|
// Encrypt with the new token
|
|
|
|
$token->setPrivateKey($this->encrypt($privateKey, $newTokenId));
|
|
|
|
|
|
|
|
$token->setToken($this->hashToken($newTokenId));
|
|
|
|
$this->updateToken($token);
|
|
|
|
|
|
|
|
return $token;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function encrypt(string $plaintext, string $token): string {
|
|
|
|
$secret = $this->config->getSystemValue('secret');
|
|
|
|
return $this->crypto->encrypt($plaintext, $token . $secret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
*/
|
|
|
|
private function decrypt(string $cipherText, string $token): string {
|
|
|
|
$secret = $this->config->getSystemValue('secret');
|
|
|
|
try {
|
|
|
|
return $this->crypto->decrypt($cipherText, $token . $secret);
|
|
|
|
} catch (\Exception $ex) {
|
|
|
|
// Delete the invalid token
|
|
|
|
$this->invalidateToken($token);
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Could not decrypt token password: " . $ex->getMessage(), 0, $ex);
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private function encryptPassword(string $password, string $publicKey): string {
|
|
|
|
openssl_public_encrypt($password, $encryptedPassword, $publicKey, OPENSSL_PKCS1_OAEP_PADDING);
|
2018-05-31 22:56:17 +03:00
|
|
|
$encryptedPassword = base64_encode($encryptedPassword);
|
2018-05-18 20:48:08 +03:00
|
|
|
|
|
|
|
return $encryptedPassword;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function decryptPassword(string $encryptedPassword, string $privateKey): string {
|
2018-05-31 22:56:17 +03:00
|
|
|
$encryptedPassword = base64_decode($encryptedPassword);
|
2018-05-18 20:48:08 +03:00
|
|
|
openssl_private_decrypt($encryptedPassword, $password, $privateKey, OPENSSL_PKCS1_OAEP_PADDING);
|
|
|
|
|
|
|
|
return $password;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function hashToken(string $token): string {
|
|
|
|
$secret = $this->config->getSystemValue('secret');
|
|
|
|
return hash('sha512', $token . $secret);
|
|
|
|
}
|
2018-05-31 22:56:17 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert a DefaultToken to a publicKeyToken
|
|
|
|
* This will also be updated directly in the Database
|
2019-07-18 12:36:50 +03:00
|
|
|
* @throws \RuntimeException when OpenSSL reports a problem
|
2018-05-31 22:56:17 +03:00
|
|
|
*/
|
|
|
|
public function convertToken(DefaultToken $defaultToken, string $token, $password): PublicKeyToken {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-05-31 22:56:17 +03:00
|
|
|
$pkToken = $this->newToken(
|
|
|
|
$token,
|
|
|
|
$defaultToken->getUID(),
|
|
|
|
$defaultToken->getLoginName(),
|
|
|
|
$password,
|
|
|
|
$defaultToken->getName(),
|
|
|
|
$defaultToken->getType(),
|
|
|
|
$defaultToken->getRemember()
|
|
|
|
);
|
|
|
|
|
2018-05-31 23:56:26 +03:00
|
|
|
$pkToken->setExpires($defaultToken->getExpires());
|
2018-05-31 22:56:17 +03:00
|
|
|
$pkToken->setId($defaultToken->getId());
|
|
|
|
|
|
|
|
return $this->mapper->update($pkToken);
|
|
|
|
}
|
|
|
|
|
2019-07-18 12:36:50 +03:00
|
|
|
/**
|
|
|
|
* @throws \RuntimeException when OpenSSL reports a problem
|
|
|
|
*/
|
2018-05-31 22:56:17 +03:00
|
|
|
private function newToken(string $token,
|
|
|
|
string $uid,
|
|
|
|
string $loginName,
|
|
|
|
$password,
|
|
|
|
string $name,
|
|
|
|
int $type,
|
|
|
|
int $remember): PublicKeyToken {
|
|
|
|
$dbToken = new PublicKeyToken();
|
|
|
|
$dbToken->setUid($uid);
|
|
|
|
$dbToken->setLoginName($loginName);
|
|
|
|
|
2018-09-16 12:51:15 +03:00
|
|
|
$config = array_merge([
|
2018-05-31 22:56:17 +03:00
|
|
|
'digest_alg' => 'sha512',
|
|
|
|
'private_key_bits' => 2048,
|
2018-09-16 12:51:15 +03:00
|
|
|
], $this->config->getSystemValue('openssl', []));
|
2018-05-31 22:56:17 +03:00
|
|
|
|
|
|
|
// Generate new key
|
|
|
|
$res = openssl_pkey_new($config);
|
2018-12-06 23:27:57 +03:00
|
|
|
if ($res === false) {
|
|
|
|
$this->logOpensslError();
|
2019-07-18 12:36:50 +03:00
|
|
|
throw new \RuntimeException('OpenSSL reported a problem');
|
2018-12-06 23:27:57 +03:00
|
|
|
}
|
|
|
|
|
2019-07-21 23:21:59 +03:00
|
|
|
if (openssl_pkey_export($res, $privateKey, null, $config) === false) {
|
|
|
|
$this->logOpensslError();
|
|
|
|
throw new \RuntimeException('OpenSSL reported a problem');
|
|
|
|
}
|
2018-05-31 22:56:17 +03:00
|
|
|
|
|
|
|
// Extract the public key from $res to $pubKey
|
|
|
|
$publicKey = openssl_pkey_get_details($res);
|
|
|
|
$publicKey = $publicKey['key'];
|
|
|
|
|
|
|
|
$dbToken->setPublicKey($publicKey);
|
|
|
|
$dbToken->setPrivateKey($this->encrypt($privateKey, $token));
|
|
|
|
|
|
|
|
if (!is_null($password)) {
|
|
|
|
$dbToken->setPassword($this->encryptPassword($password, $publicKey));
|
|
|
|
}
|
|
|
|
|
|
|
|
$dbToken->setName($name);
|
|
|
|
$dbToken->setToken($this->hashToken($token));
|
|
|
|
$dbToken->setType($type);
|
|
|
|
$dbToken->setRemember($remember);
|
|
|
|
$dbToken->setLastActivity($this->time->getTime());
|
|
|
|
$dbToken->setLastCheck($this->time->getTime());
|
2018-06-04 10:51:13 +03:00
|
|
|
$dbToken->setVersion(PublicKeyToken::VERSION);
|
2018-05-31 22:56:17 +03:00
|
|
|
|
|
|
|
return $dbToken;
|
|
|
|
}
|
2018-09-26 14:10:17 +03:00
|
|
|
|
|
|
|
public function markPasswordInvalid(IToken $token, string $tokenId) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-09-26 14:10:17 +03:00
|
|
|
if (!($token instanceof PublicKeyToken)) {
|
2020-05-27 10:21:47 +03:00
|
|
|
throw new InvalidTokenException("Invalid token type");
|
2018-09-26 14:10:17 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$token->setPasswordInvalid(true);
|
|
|
|
$this->mapper->update($token);
|
|
|
|
}
|
|
|
|
|
2018-09-26 14:36:04 +03:00
|
|
|
public function updatePasswords(string $uid, string $password) {
|
2019-10-08 14:57:36 +03:00
|
|
|
$this->cache->clear();
|
|
|
|
|
2018-09-26 14:36:04 +03:00
|
|
|
if (!$this->mapper->hasExpiredTokens($uid)) {
|
|
|
|
// Nothing to do here
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the password for all tokens
|
|
|
|
$tokens = $this->mapper->getTokenByUser($uid);
|
|
|
|
foreach ($tokens as $t) {
|
|
|
|
$publicKey = $t->getPublicKey();
|
|
|
|
$t->setPassword($this->encryptPassword($password, $publicKey));
|
2020-08-31 20:45:40 +03:00
|
|
|
$t->setPasswordInvalid(false);
|
2018-09-26 14:36:04 +03:00
|
|
|
$this->updateToken($t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-06 23:27:57 +03:00
|
|
|
private function logOpensslError() {
|
|
|
|
$errors = [];
|
|
|
|
while ($error = openssl_error_string()) {
|
|
|
|
$errors[] = $error;
|
|
|
|
}
|
|
|
|
$this->logger->critical('Something is wrong with your openssl setup: ' . implode(', ', $errors));
|
|
|
|
}
|
2018-05-18 20:48:08 +03:00
|
|
|
}
|