mirror of
https://github.com/nextcloud/server.git
synced 2025-05-04 05:51:06 +00:00
264 lines
9.6 KiB
PHP
264 lines
9.6 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
/**
|
|
* SPDX-FileCopyrightText: 2017 Nextcloud GmbH and Nextcloud contributors
|
|
* SPDX-License-Identifier: AGPL-3.0-or-later
|
|
*/
|
|
namespace OCA\AdminAudit\AppInfo;
|
|
|
|
use OC\Group\Manager as GroupManager;
|
|
use OC\User\Session as UserSession;
|
|
use OCA\AdminAudit\Actions\AppManagement;
|
|
use OCA\AdminAudit\Actions\Auth;
|
|
use OCA\AdminAudit\Actions\Console;
|
|
use OCA\AdminAudit\Actions\Files;
|
|
use OCA\AdminAudit\Actions\GroupManagement;
|
|
use OCA\AdminAudit\Actions\Security;
|
|
use OCA\AdminAudit\Actions\Sharing;
|
|
use OCA\AdminAudit\Actions\TagManagement;
|
|
use OCA\AdminAudit\Actions\Trashbin;
|
|
use OCA\AdminAudit\Actions\UserManagement;
|
|
use OCA\AdminAudit\Actions\Versions;
|
|
use OCA\AdminAudit\AuditLogger;
|
|
use OCA\AdminAudit\IAuditLogger;
|
|
use OCA\AdminAudit\Listener\CriticalActionPerformedEventListener;
|
|
use OCP\App\ManagerEvent;
|
|
use OCP\AppFramework\App;
|
|
use OCP\AppFramework\Bootstrap\IBootContext;
|
|
use OCP\AppFramework\Bootstrap\IBootstrap;
|
|
use OCP\AppFramework\Bootstrap\IRegistrationContext;
|
|
use OCP\Authentication\TwoFactorAuth\TwoFactorProviderChallengeFailed;
|
|
use OCP\Authentication\TwoFactorAuth\TwoFactorProviderChallengePassed;
|
|
use OCP\Console\ConsoleEvent;
|
|
use OCP\EventDispatcher\IEventDispatcher;
|
|
use OCP\Files\Events\Node\BeforeNodeDeletedEvent;
|
|
use OCP\Files\Events\Node\BeforeNodeReadEvent;
|
|
use OCP\Files\Events\Node\BeforeNodeRenamedEvent;
|
|
use OCP\Files\Events\Node\NodeCopiedEvent;
|
|
use OCP\Files\Events\Node\NodeCreatedEvent;
|
|
use OCP\Files\Events\Node\NodeRenamedEvent;
|
|
use OCP\Files\Events\Node\NodeWrittenEvent;
|
|
use OCP\IConfig;
|
|
use OCP\IGroupManager;
|
|
use OCP\IUserSession;
|
|
use OCP\Log\Audit\CriticalActionPerformedEvent;
|
|
use OCP\Log\ILogFactory;
|
|
use OCP\Preview\BeforePreviewFetchedEvent;
|
|
use OCP\Share;
|
|
use OCP\Util;
|
|
use Psr\Container\ContainerInterface;
|
|
use Psr\Log\LoggerInterface;
|
|
|
|
class Application extends App implements IBootstrap {
|
|
/** @var LoggerInterface */
|
|
protected $logger;
|
|
|
|
public function __construct() {
|
|
parent::__construct('admin_audit');
|
|
}
|
|
|
|
public function register(IRegistrationContext $context): void {
|
|
$context->registerService(IAuditLogger::class, function (ContainerInterface $c) {
|
|
return new AuditLogger($c->get(ILogFactory::class), $c->get(IConfig::class));
|
|
});
|
|
|
|
$context->registerEventListener(CriticalActionPerformedEvent::class, CriticalActionPerformedEventListener::class);
|
|
}
|
|
|
|
public function boot(IBootContext $context): void {
|
|
/** @var IAuditLogger $logger */
|
|
$logger = $context->getAppContainer()->get(IAuditLogger::class);
|
|
|
|
/*
|
|
* TODO: once the hooks are migrated to lazy events, this should be done
|
|
* in \OCA\AdminAudit\AppInfo\Application::register
|
|
*/
|
|
$this->registerHooks($logger, $context->getServerContainer());
|
|
}
|
|
|
|
/**
|
|
* Register hooks in order to log them
|
|
*/
|
|
private function registerHooks(IAuditLogger $logger,
|
|
ContainerInterface $serverContainer): void {
|
|
$this->userManagementHooks($logger, $serverContainer->get(IUserSession::class));
|
|
$this->groupHooks($logger, $serverContainer->get(IGroupManager::class));
|
|
$this->authHooks($logger);
|
|
|
|
|
|
/** @var IEventDispatcher $eventDispatcher */
|
|
$eventDispatcher = $serverContainer->get(IEventDispatcher::class);
|
|
$this->consoleHooks($logger, $eventDispatcher);
|
|
$this->appHooks($logger, $eventDispatcher);
|
|
|
|
$this->sharingHooks($logger);
|
|
|
|
$this->fileHooks($logger, $eventDispatcher);
|
|
$this->trashbinHooks($logger);
|
|
$this->versionsHooks($logger);
|
|
|
|
$this->securityHooks($logger, $eventDispatcher);
|
|
$this->tagHooks($logger, $eventDispatcher);
|
|
}
|
|
|
|
private function userManagementHooks(IAuditLogger $logger,
|
|
IUserSession $userSession): void {
|
|
$userActions = new UserManagement($logger);
|
|
|
|
Util::connectHook('OC_User', 'post_createUser', $userActions, 'create');
|
|
Util::connectHook('OC_User', 'post_deleteUser', $userActions, 'delete');
|
|
Util::connectHook('OC_User', 'changeUser', $userActions, 'change');
|
|
|
|
assert($userSession instanceof UserSession);
|
|
$userSession->listen('\OC\User', 'postSetPassword', [$userActions, 'setPassword']);
|
|
$userSession->listen('\OC\User', 'assignedUserId', [$userActions, 'assign']);
|
|
$userSession->listen('\OC\User', 'postUnassignedUserId', [$userActions, 'unassign']);
|
|
}
|
|
|
|
private function groupHooks(IAuditLogger $logger,
|
|
IGroupManager $groupManager): void {
|
|
$groupActions = new GroupManagement($logger);
|
|
|
|
assert($groupManager instanceof GroupManager);
|
|
$groupManager->listen('\OC\Group', 'postRemoveUser', [$groupActions, 'removeUser']);
|
|
$groupManager->listen('\OC\Group', 'postAddUser', [$groupActions, 'addUser']);
|
|
$groupManager->listen('\OC\Group', 'postDelete', [$groupActions, 'deleteGroup']);
|
|
$groupManager->listen('\OC\Group', 'postCreate', [$groupActions, 'createGroup']);
|
|
}
|
|
|
|
private function sharingHooks(IAuditLogger $logger): void {
|
|
$shareActions = new Sharing($logger);
|
|
|
|
Util::connectHook(Share::class, 'post_shared', $shareActions, 'shared');
|
|
Util::connectHook(Share::class, 'post_unshare', $shareActions, 'unshare');
|
|
Util::connectHook(Share::class, 'post_unshareFromSelf', $shareActions, 'unshare');
|
|
Util::connectHook(Share::class, 'post_update_permissions', $shareActions, 'updatePermissions');
|
|
Util::connectHook(Share::class, 'post_update_password', $shareActions, 'updatePassword');
|
|
Util::connectHook(Share::class, 'post_set_expiration_date', $shareActions, 'updateExpirationDate');
|
|
Util::connectHook(Share::class, 'share_link_access', $shareActions, 'shareAccessed');
|
|
}
|
|
|
|
private function authHooks(IAuditLogger $logger): void {
|
|
$authActions = new Auth($logger);
|
|
|
|
Util::connectHook('OC_User', 'pre_login', $authActions, 'loginAttempt');
|
|
Util::connectHook('OC_User', 'post_login', $authActions, 'loginSuccessful');
|
|
Util::connectHook('OC_User', 'logout', $authActions, 'logout');
|
|
}
|
|
|
|
private function appHooks(IAuditLogger $logger,
|
|
IEventDispatcher $eventDispatcher): void {
|
|
$eventDispatcher->addListener(ManagerEvent::EVENT_APP_ENABLE, function (ManagerEvent $event) use ($logger) {
|
|
$appActions = new AppManagement($logger);
|
|
$appActions->enableApp($event->getAppID());
|
|
});
|
|
$eventDispatcher->addListener(ManagerEvent::EVENT_APP_ENABLE_FOR_GROUPS, function (ManagerEvent $event) use ($logger) {
|
|
$appActions = new AppManagement($logger);
|
|
$appActions->enableAppForGroups($event->getAppID(), $event->getGroups());
|
|
});
|
|
$eventDispatcher->addListener(ManagerEvent::EVENT_APP_DISABLE, function (ManagerEvent $event) use ($logger) {
|
|
$appActions = new AppManagement($logger);
|
|
$appActions->disableApp($event->getAppID());
|
|
});
|
|
}
|
|
|
|
private function consoleHooks(IAuditLogger $logger,
|
|
IEventDispatcher $eventDispatcher): void {
|
|
$eventDispatcher->addListener(ConsoleEvent::class, function (ConsoleEvent $event) use ($logger) {
|
|
$appActions = new Console($logger);
|
|
$appActions->runCommand($event->getArguments());
|
|
});
|
|
}
|
|
private function tagHooks(IAuditLogger $logger,
|
|
IEventDispatcher $eventDispatcher): void {
|
|
$eventDispatcher->addListener(\OCP\SystemTag\ManagerEvent::EVENT_CREATE, function (\OCP\SystemTag\ManagerEvent $event) use ($logger) {
|
|
$tagActions = new TagManagement($logger);
|
|
$tagActions->createTag($event->getTag());
|
|
});
|
|
}
|
|
|
|
private function fileHooks(IAuditLogger $logger,
|
|
IEventDispatcher $eventDispatcher): void {
|
|
$fileActions = new Files($logger);
|
|
$eventDispatcher->addListener(
|
|
BeforePreviewFetchedEvent::class,
|
|
function (BeforePreviewFetchedEvent $event) use ($fileActions) {
|
|
$fileActions->preview($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
BeforeNodeRenamedEvent::class,
|
|
function (BeforeNodeRenamedEvent $event) use ($fileActions) {
|
|
$fileActions->beforeRename($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
NodeRenamedEvent::class,
|
|
function (NodeRenamedEvent $event) use ($fileActions) {
|
|
$fileActions->afterRename($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
NodeCreatedEvent::class,
|
|
function (NodeCreatedEvent $event) use ($fileActions) {
|
|
$fileActions->create($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
NodeCopiedEvent::class,
|
|
function (NodeCopiedEvent $event) use ($fileActions) {
|
|
$fileActions->copy($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
NodeWrittenEvent::class,
|
|
function (NodeWrittenEvent $event) use ($fileActions): void {
|
|
$fileActions->write($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
BeforeNodeReadEvent::class,
|
|
function (BeforeNodeReadEvent $event) use ($fileActions) {
|
|
$fileActions->read($event);
|
|
}
|
|
);
|
|
|
|
$eventDispatcher->addListener(
|
|
BeforeNodeDeletedEvent::class,
|
|
function (BeforeNodeDeletedEvent $event) use ($fileActions): void {
|
|
$fileActions->delete($event);
|
|
}
|
|
);
|
|
}
|
|
|
|
private function versionsHooks(IAuditLogger $logger): void {
|
|
$versionsActions = new Versions($logger);
|
|
Util::connectHook('\OCP\Versions', 'rollback', $versionsActions, 'rollback');
|
|
Util::connectHook('\OCP\Versions', 'delete', $versionsActions, 'delete');
|
|
}
|
|
|
|
private function trashbinHooks(IAuditLogger $logger): void {
|
|
$trashActions = new Trashbin($logger);
|
|
Util::connectHook('\OCP\Trashbin', 'preDelete', $trashActions, 'delete');
|
|
Util::connectHook('\OCA\Files_Trashbin\Trashbin', 'post_restore', $trashActions, 'restore');
|
|
}
|
|
|
|
private function securityHooks(IAuditLogger $logger,
|
|
IEventDispatcher $eventDispatcher): void {
|
|
$eventDispatcher->addListener(TwoFactorProviderChallengePassed::class, function (TwoFactorProviderChallengePassed $event) use ($logger) {
|
|
$security = new Security($logger);
|
|
$security->twofactorSuccess($event->getUser(), $event->getProvider());
|
|
});
|
|
$eventDispatcher->addListener(TwoFactorProviderChallengeFailed::class, function (TwoFactorProviderChallengeFailed $event) use ($logger) {
|
|
$security = new Security($logger);
|
|
$security->twofactorFailed($event->getUser(), $event->getProvider());
|
|
});
|
|
}
|
|
}
|