Merge pull request #10170 from nextcloud/backport/9823/stable13

[stable13] Allow updating the token on session regeneration
This commit is contained in:
Morris Jobke 2018-07-11 10:02:30 +02:00 committed by GitHub
commit 4ff6ea9a55
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 42 additions and 7 deletions

View File

@ -204,7 +204,7 @@ class ShareController extends Controller {
private function linkShareAuth(\OCP\Share\IShare $share, $password = null) {
if ($password !== null) {
if ($this->shareManager->checkPassword($share, $password)) {
$this->session->regenerateId();
$this->session->regenerateId(true, true);
$this->session->set('public_link_authenticated', (string)$share->getId());
} else {
$this->emitAccessShareHook($share, 403, 'Wrong password');

View File

@ -149,10 +149,11 @@ class CryptoSessionData implements \ArrayAccess, ISession {
* Wrapper around session_regenerate_id
*
* @param bool $deleteOldSession Whether to delete the old associated session file or not.
* @param bool $updateToken Wheater to update the associated auth token
* @return void
*/
public function regenerateId($deleteOldSession = true) {
$this->session->regenerateId($deleteOldSession);
public function regenerateId($deleteOldSession = true, $updateToken = false) {
$this->session->regenerateId($deleteOldSession, $updateToken);
}
/**

View File

@ -29,6 +29,10 @@
namespace OC\Session;
use OC\Authentication\Exceptions\InvalidTokenException;
use OC\Authentication\Token\IProvider;
use OC\SystemConfig;
use OCP\IConfig;
use OCP\Session\Exceptions\SessionNotAvailableException;
/**
@ -110,14 +114,41 @@ class Internal extends Session {
* Wrapper around session_regenerate_id
*
* @param bool $deleteOldSession Whether to delete the old associated session file or not.
* @param bool $updateToken Wheater to update the associated auth token
* @return void
*/
public function regenerateId($deleteOldSession = true) {
public function regenerateId($deleteOldSession = true, $updateToken = false) {
$oldId = null;
if ($updateToken) {
// Get the old id to update the token
try {
$oldId = $this->getId();
} catch (SessionNotAvailableException $e) {
// We can't update a token if there is no previous id
$updateToken = false;
}
}
try {
@session_regenerate_id($deleteOldSession);
} catch (\Error $e) {
$this->trapError($e->getCode(), $e->getMessage());
}
if ($updateToken) {
// Get the new id to update the token
$newId = $this->getId();
/** @var IProvider $tokenProvider */
$tokenProvider = \OC::$server->query(IProvider::class);
try {
$tokenProvider->renewSessionToken($oldId, $newId);
} catch (InvalidTokenException $e) {
// Just ignore
}
}
}
/**

View File

@ -90,7 +90,7 @@ class Memory extends Session {
*
* @param bool $deleteOldSession
*/
public function regenerateId($deleteOldSession = true) {}
public function regenerateId($deleteOldSession = true, $updateToken = false) {}
/**
* Wrapper around session_id

View File

@ -624,6 +624,8 @@ class Session implements IUserSession, Emitter {
try {
$sessionId = $this->session->getId();
$pwd = $this->getPassword($password);
// Make sure the current sessionId has no leftover tokens
$this->tokenProvider->invalidateToken($sessionId);
$this->tokenProvider->generateToken($sessionId, $uid, $loginName, $pwd, $name, IToken::TEMPORARY_TOKEN, $remember);
return true;
} catch (SessionNotAvailableException $ex) {

View File

@ -93,10 +93,11 @@ interface ISession {
* Wrapper around session_regenerate_id
*
* @param bool $deleteOldSession Whether to delete the old associated session file or not.
* @param bool $updateToken Wheater to update the associated auth token
* @return void
* @since 9.0.0
* @since 9.0.0, $updateToken added in 14.0.0
*/
public function regenerateId($deleteOldSession = true);
public function regenerateId($deleteOldSession = true, $updateToken = false);
/**
* Wrapper around session_id