2018-05-15 21:03:35 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-05-15 21:03:35 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-05-15 21:03:35 +03:00
|
|
|
/**
|
|
|
|
* @copyright Copyright 2018, Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2018-05-15 21:03:35 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @license GNU AGPL version 3 or any later version
|
2018-05-15 21:03:35 +03:00
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
2018-05-15 21:03:35 +03:00
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2019-12-03 21:57:53 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2018-05-15 21:03:35 +03:00
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-05-15 21:03:35 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Authentication\Token;
|
|
|
|
|
2019-11-14 14:14:26 +03:00
|
|
|
use Doctrine\DBAL\Exception\UniqueConstraintViolationException;
|
2018-10-30 15:18:41 +03:00
|
|
|
use OC\Authentication\Exceptions\ExpiredTokenException;
|
2018-05-15 21:03:35 +03:00
|
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
|
|
|
use OC\Authentication\Exceptions\PasswordlessTokenException;
|
2019-04-03 17:00:46 +03:00
|
|
|
use OC\Authentication\Exceptions\WipeTokenException;
|
2018-05-15 21:03:35 +03:00
|
|
|
|
|
|
|
class Manager implements IProvider {
|
|
|
|
|
|
|
|
/** @var DefaultTokenProvider */
|
|
|
|
private $defaultTokenProvider;
|
|
|
|
|
2018-05-29 14:38:26 +03:00
|
|
|
/** @var PublicKeyTokenProvider */
|
|
|
|
private $publicKeyTokenProvider;
|
|
|
|
|
|
|
|
public function __construct(DefaultTokenProvider $defaultTokenProvider, PublicKeyTokenProvider $publicKeyTokenProvider) {
|
2018-05-15 21:03:35 +03:00
|
|
|
$this->defaultTokenProvider = $defaultTokenProvider;
|
2018-05-29 14:38:26 +03:00
|
|
|
$this->publicKeyTokenProvider = $publicKeyTokenProvider;
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create and persist a new token
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $loginName
|
|
|
|
* @param string|null $password
|
|
|
|
* @param string $name
|
|
|
|
* @param int $type token type
|
|
|
|
* @param int $remember whether the session token should be used for remember-me
|
|
|
|
* @return IToken
|
|
|
|
*/
|
|
|
|
public function generateToken(string $token,
|
|
|
|
string $uid,
|
|
|
|
string $loginName,
|
|
|
|
$password,
|
|
|
|
string $name,
|
|
|
|
int $type = IToken::TEMPORARY_TOKEN,
|
|
|
|
int $remember = IToken::DO_NOT_REMEMBER): IToken {
|
2019-11-14 14:14:26 +03:00
|
|
|
try {
|
|
|
|
return $this->publicKeyTokenProvider->generateToken(
|
|
|
|
$token,
|
|
|
|
$uid,
|
|
|
|
$loginName,
|
|
|
|
$password,
|
|
|
|
$name,
|
|
|
|
$type,
|
|
|
|
$remember
|
|
|
|
);
|
|
|
|
} catch (UniqueConstraintViolationException $e) {
|
|
|
|
// It's rare, but if two requests of the same session (e.g. env-based SAML)
|
|
|
|
// try to create the session token they might end up here at the same time
|
|
|
|
// because we use the session ID as token and the db token is created anew
|
|
|
|
// with every request.
|
|
|
|
//
|
|
|
|
// If the UIDs match, then this should be fine.
|
|
|
|
$existing = $this->getToken($token);
|
|
|
|
if ($existing->getUID() !== $uid) {
|
|
|
|
throw new \Exception('Token conflict handled, but UIDs do not match. This should not happen', 0, $e);
|
|
|
|
}
|
|
|
|
return $existing;
|
|
|
|
}
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Save the updated token
|
|
|
|
*
|
|
|
|
* @param IToken $token
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
*/
|
|
|
|
public function updateToken(IToken $token) {
|
2018-06-04 11:03:49 +03:00
|
|
|
$provider = $this->getProvider($token);
|
|
|
|
$provider->updateToken($token);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update token activity timestamp
|
|
|
|
*
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
* @param IToken $token
|
|
|
|
*/
|
|
|
|
public function updateTokenActivity(IToken $token) {
|
2018-06-04 11:03:49 +03:00
|
|
|
$provider = $this->getProvider($token);
|
|
|
|
$provider->updateTokenActivity($token);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
2018-06-14 20:39:07 +03:00
|
|
|
/**
|
|
|
|
* @param string $uid
|
|
|
|
* @return IToken[]
|
|
|
|
*/
|
2018-05-29 10:29:29 +03:00
|
|
|
public function getTokenByUser(string $uid): array {
|
2018-05-29 14:38:26 +03:00
|
|
|
$old = $this->defaultTokenProvider->getTokenByUser($uid);
|
|
|
|
$new = $this->publicKeyTokenProvider->getTokenByUser($uid);
|
|
|
|
|
|
|
|
return array_merge($old, $new);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a token by token
|
|
|
|
*
|
|
|
|
* @param string $tokenId
|
|
|
|
* @throws InvalidTokenException
|
2019-07-18 12:36:50 +03:00
|
|
|
* @throws \RuntimeException when OpenSSL reports a problem
|
2018-05-15 21:03:35 +03:00
|
|
|
* @return IToken
|
|
|
|
*/
|
|
|
|
public function getToken(string $tokenId): IToken {
|
2018-05-29 14:38:26 +03:00
|
|
|
try {
|
|
|
|
return $this->publicKeyTokenProvider->getToken($tokenId);
|
2019-04-03 17:00:46 +03:00
|
|
|
} catch (WipeTokenException $e) {
|
|
|
|
throw $e;
|
2018-10-21 15:37:08 +03:00
|
|
|
} catch (ExpiredTokenException $e) {
|
|
|
|
throw $e;
|
2020-04-10 15:19:56 +03:00
|
|
|
} catch (InvalidTokenException $e) {
|
2018-05-31 22:56:17 +03:00
|
|
|
// No worries we try to convert it to a PublicKey Token
|
2018-05-29 14:38:26 +03:00
|
|
|
}
|
2018-05-31 22:56:17 +03:00
|
|
|
|
|
|
|
//Convert!
|
|
|
|
$token = $this->defaultTokenProvider->getToken($tokenId);
|
|
|
|
|
|
|
|
try {
|
|
|
|
$password = $this->defaultTokenProvider->getPassword($token, $tokenId);
|
|
|
|
} catch (PasswordlessTokenException $e) {
|
|
|
|
$password = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->publicKeyTokenProvider->convertToken($token, $tokenId, $password);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a token by token id
|
|
|
|
*
|
|
|
|
* @param int $tokenId
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
* @return IToken
|
|
|
|
*/
|
|
|
|
public function getTokenById(int $tokenId): IToken {
|
2018-05-29 14:38:26 +03:00
|
|
|
try {
|
2018-05-31 23:56:26 +03:00
|
|
|
return $this->publicKeyTokenProvider->getTokenById($tokenId);
|
2018-10-21 15:34:29 +03:00
|
|
|
} catch (ExpiredTokenException $e) {
|
|
|
|
throw $e;
|
2019-04-03 17:00:46 +03:00
|
|
|
} catch (WipeTokenException $e) {
|
|
|
|
throw $e;
|
2018-05-29 14:38:26 +03:00
|
|
|
} catch (InvalidTokenException $e) {
|
|
|
|
return $this->defaultTokenProvider->getTokenById($tokenId);
|
|
|
|
}
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $oldSessionId
|
|
|
|
* @param string $sessionId
|
|
|
|
* @throws InvalidTokenException
|
2019-10-08 12:01:53 +03:00
|
|
|
* @return IToken
|
2018-05-15 21:03:35 +03:00
|
|
|
*/
|
2019-10-08 12:01:53 +03:00
|
|
|
public function renewSessionToken(string $oldSessionId, string $sessionId): IToken {
|
2018-05-29 14:38:26 +03:00
|
|
|
try {
|
2019-10-08 12:01:53 +03:00
|
|
|
return $this->publicKeyTokenProvider->renewSessionToken($oldSessionId, $sessionId);
|
2018-10-21 15:37:08 +03:00
|
|
|
} catch (ExpiredTokenException $e) {
|
|
|
|
throw $e;
|
2018-05-29 14:38:26 +03:00
|
|
|
} catch (InvalidTokenException $e) {
|
2019-10-08 12:01:53 +03:00
|
|
|
return $this->defaultTokenProvider->renewSessionToken($oldSessionId, $sessionId);
|
2018-05-29 14:38:26 +03:00
|
|
|
}
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param IToken $savedToken
|
|
|
|
* @param string $tokenId session token
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
* @throws PasswordlessTokenException
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getPassword(IToken $savedToken, string $tokenId): string {
|
2018-06-04 11:03:49 +03:00
|
|
|
$provider = $this->getProvider($savedToken);
|
|
|
|
return $provider->getPassword($savedToken, $tokenId);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function setPassword(IToken $token, string $tokenId, string $password) {
|
2018-06-04 11:03:49 +03:00
|
|
|
$provider = $this->getProvider($token);
|
|
|
|
$provider->setPassword($token, $tokenId, $password);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function invalidateToken(string $token) {
|
|
|
|
$this->defaultTokenProvider->invalidateToken($token);
|
2018-05-29 14:38:26 +03:00
|
|
|
$this->publicKeyTokenProvider->invalidateToken($token);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
2018-05-29 10:29:29 +03:00
|
|
|
public function invalidateTokenById(string $uid, int $id) {
|
|
|
|
$this->defaultTokenProvider->invalidateTokenById($uid, $id);
|
2018-05-29 14:38:26 +03:00
|
|
|
$this->publicKeyTokenProvider->invalidateTokenById($uid, $id);
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function invalidateOldTokens() {
|
|
|
|
$this->defaultTokenProvider->invalidateOldTokens();
|
2018-05-29 14:38:26 +03:00
|
|
|
$this->publicKeyTokenProvider->invalidateOldTokens();
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
2018-06-14 20:39:07 +03:00
|
|
|
/**
|
|
|
|
* @param IToken $token
|
|
|
|
* @param string $oldTokenId
|
|
|
|
* @param string $newTokenId
|
|
|
|
* @return IToken
|
|
|
|
* @throws InvalidTokenException
|
2019-07-18 12:36:50 +03:00
|
|
|
* @throws \RuntimeException when OpenSSL reports a problem
|
2018-06-14 20:39:07 +03:00
|
|
|
*/
|
2018-05-15 21:03:35 +03:00
|
|
|
public function rotate(IToken $token, string $oldTokenId, string $newTokenId): IToken {
|
2018-05-29 14:38:26 +03:00
|
|
|
if ($token instanceof DefaultToken) {
|
2018-05-31 22:56:17 +03:00
|
|
|
try {
|
|
|
|
$password = $this->defaultTokenProvider->getPassword($token, $oldTokenId);
|
|
|
|
} catch (PasswordlessTokenException $e) {
|
|
|
|
$password = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->publicKeyTokenProvider->convertToken($token, $newTokenId, $password);
|
2018-05-29 14:38:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($token instanceof PublicKeyToken) {
|
|
|
|
return $this->publicKeyTokenProvider->rotate($token, $oldTokenId, $newTokenId);
|
|
|
|
}
|
2018-05-31 23:56:26 +03:00
|
|
|
|
|
|
|
throw new InvalidTokenException();
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|
|
|
|
|
2018-06-14 20:39:07 +03:00
|
|
|
/**
|
|
|
|
* @param IToken $token
|
|
|
|
* @return IProvider
|
|
|
|
* @throws InvalidTokenException
|
|
|
|
*/
|
2018-06-04 11:03:49 +03:00
|
|
|
private function getProvider(IToken $token): IProvider {
|
|
|
|
if ($token instanceof DefaultToken) {
|
|
|
|
return $this->defaultTokenProvider;
|
|
|
|
}
|
|
|
|
if ($token instanceof PublicKeyToken) {
|
|
|
|
return $this->publicKeyTokenProvider;
|
|
|
|
}
|
|
|
|
throw new InvalidTokenException();
|
|
|
|
}
|
2018-09-26 14:10:17 +03:00
|
|
|
|
|
|
|
|
|
|
|
public function markPasswordInvalid(IToken $token, string $tokenId) {
|
|
|
|
$this->getProvider($token)->markPasswordInvalid($token, $tokenId);
|
|
|
|
}
|
2018-09-26 14:36:04 +03:00
|
|
|
|
|
|
|
public function updatePasswords(string $uid, string $password) {
|
|
|
|
$this->defaultTokenProvider->updatePasswords($uid, $password);
|
|
|
|
$this->publicKeyTokenProvider->updatePasswords($uid, $password);
|
|
|
|
}
|
2018-05-15 21:03:35 +03:00
|
|
|
}
|