mirror of
https://github.com/nextcloud/server.git
synced 2025-05-01 20:40:30 +00:00
209 lines
6.6 KiB
PHP
209 lines
6.6 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
/**
|
|
* @copyright Copyright (c) 2018, Roeland Jago Douma <roeland@famdouma.nl>
|
|
*
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
* @author Daniel Kesselberg <mail@danielkesselberg.de>
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
* @author Kate Döen <kate.doeen@nextcloud.com>
|
|
*
|
|
* @license GNU AGPL version 3 or any later version
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
namespace OC\Core\Controller;
|
|
|
|
use OC\Authentication\Events\AppPasswordCreatedEvent;
|
|
use OC\Authentication\Token\IProvider;
|
|
use OC\Authentication\Token\IToken;
|
|
use OC\User\Session;
|
|
use OCP\AppFramework\Http;
|
|
use OCP\AppFramework\Http\Attribute\ApiRoute;
|
|
use OCP\AppFramework\Http\Attribute\UseSession;
|
|
use OCP\AppFramework\Http\DataResponse;
|
|
use OCP\AppFramework\OCS\OCSForbiddenException;
|
|
use OCP\Authentication\Exceptions\CredentialsUnavailableException;
|
|
use OCP\Authentication\Exceptions\InvalidTokenException;
|
|
use OCP\Authentication\Exceptions\PasswordUnavailableException;
|
|
use OCP\Authentication\LoginCredentials\IStore;
|
|
use OCP\EventDispatcher\IEventDispatcher;
|
|
use OCP\IRequest;
|
|
use OCP\ISession;
|
|
use OCP\IUserManager;
|
|
use OCP\Security\Bruteforce\IThrottler;
|
|
use OCP\Security\ISecureRandom;
|
|
|
|
class AppPasswordController extends \OCP\AppFramework\OCSController {
|
|
public function __construct(
|
|
string $appName,
|
|
IRequest $request,
|
|
private ISession $session,
|
|
private ISecureRandom $random,
|
|
private IProvider $tokenProvider,
|
|
private IStore $credentialStore,
|
|
private IEventDispatcher $eventDispatcher,
|
|
private Session $userSession,
|
|
private IUserManager $userManager,
|
|
private IThrottler $throttler,
|
|
) {
|
|
parent::__construct($appName, $request);
|
|
}
|
|
|
|
/**
|
|
* @NoAdminRequired
|
|
* @PasswordConfirmationRequired
|
|
*
|
|
* Create app password
|
|
*
|
|
* @return DataResponse<Http::STATUS_OK, array{apppassword: string}, array{}>
|
|
* @throws OCSForbiddenException Creating app password is not allowed
|
|
*
|
|
* 200: App password returned
|
|
*/
|
|
#[ApiRoute(verb: 'GET', url: '/getapppassword', root: '/core')]
|
|
public function getAppPassword(): DataResponse {
|
|
// We do not allow the creation of new tokens if this is an app password
|
|
if ($this->session->exists('app_password')) {
|
|
throw new OCSForbiddenException('You cannot request an new apppassword with an apppassword');
|
|
}
|
|
|
|
try {
|
|
$credentials = $this->credentialStore->getLoginCredentials();
|
|
} catch (CredentialsUnavailableException $e) {
|
|
throw new OCSForbiddenException();
|
|
}
|
|
|
|
try {
|
|
$password = $credentials->getPassword();
|
|
} catch (PasswordUnavailableException $e) {
|
|
$password = null;
|
|
}
|
|
|
|
$userAgent = $this->request->getHeader('USER_AGENT');
|
|
|
|
$token = $this->random->generate(72, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS);
|
|
|
|
$generatedToken = $this->tokenProvider->generateToken(
|
|
$token,
|
|
$credentials->getUID(),
|
|
$credentials->getLoginName(),
|
|
$password,
|
|
$userAgent,
|
|
IToken::PERMANENT_TOKEN,
|
|
IToken::DO_NOT_REMEMBER
|
|
);
|
|
|
|
$this->eventDispatcher->dispatchTyped(
|
|
new AppPasswordCreatedEvent($generatedToken)
|
|
);
|
|
|
|
return new DataResponse([
|
|
'apppassword' => $token
|
|
]);
|
|
}
|
|
|
|
/**
|
|
* @NoAdminRequired
|
|
*
|
|
* Delete app password
|
|
*
|
|
* @return DataResponse<Http::STATUS_OK, array<empty>, array{}>
|
|
* @throws OCSForbiddenException Deleting app password is not allowed
|
|
*
|
|
* 200: App password deleted successfully
|
|
*/
|
|
#[ApiRoute(verb: 'DELETE', url: '/apppassword', root: '/core')]
|
|
public function deleteAppPassword(): DataResponse {
|
|
if (!$this->session->exists('app_password')) {
|
|
throw new OCSForbiddenException('no app password in use');
|
|
}
|
|
|
|
$appPassword = $this->session->get('app_password');
|
|
|
|
try {
|
|
$token = $this->tokenProvider->getToken($appPassword);
|
|
} catch (InvalidTokenException $e) {
|
|
throw new OCSForbiddenException('could not remove apptoken');
|
|
}
|
|
|
|
$this->tokenProvider->invalidateTokenById($token->getUID(), $token->getId());
|
|
return new DataResponse();
|
|
}
|
|
|
|
/**
|
|
* @NoAdminRequired
|
|
*
|
|
* Rotate app password
|
|
*
|
|
* @return DataResponse<Http::STATUS_OK, array{apppassword: string}, array{}>
|
|
* @throws OCSForbiddenException Rotating app password is not allowed
|
|
*
|
|
* 200: App password returned
|
|
*/
|
|
#[ApiRoute(verb: 'POST', url: '/apppassword/rotate', root: '/core')]
|
|
public function rotateAppPassword(): DataResponse {
|
|
if (!$this->session->exists('app_password')) {
|
|
throw new OCSForbiddenException('no app password in use');
|
|
}
|
|
|
|
$appPassword = $this->session->get('app_password');
|
|
|
|
try {
|
|
$token = $this->tokenProvider->getToken($appPassword);
|
|
} catch (InvalidTokenException $e) {
|
|
throw new OCSForbiddenException('could not rotate apptoken');
|
|
}
|
|
|
|
$newToken = $this->random->generate(72, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS);
|
|
$this->tokenProvider->rotate($token, $appPassword, $newToken);
|
|
|
|
return new DataResponse([
|
|
'apppassword' => $newToken,
|
|
]);
|
|
}
|
|
|
|
/**
|
|
* Confirm the user password
|
|
*
|
|
* @NoAdminRequired
|
|
* @BruteForceProtection(action=sudo)
|
|
*
|
|
* @param string $password The password of the user
|
|
*
|
|
* @return DataResponse<Http::STATUS_OK, array{lastLogin: int}, array{}>|DataResponse<Http::STATUS_FORBIDDEN, array<empty>, array{}>
|
|
*
|
|
* 200: Password confirmation succeeded
|
|
* 403: Password confirmation failed
|
|
*/
|
|
#[UseSession]
|
|
#[ApiRoute(verb: 'PUT', url: '/apppassword/confirm', root: '/core')]
|
|
public function confirmUserPassword(string $password): DataResponse {
|
|
$loginName = $this->userSession->getLoginName();
|
|
$loginResult = $this->userManager->checkPassword($loginName, $password);
|
|
if ($loginResult === false) {
|
|
$response = new DataResponse([], Http::STATUS_FORBIDDEN);
|
|
$response->throttle(['loginName' => $loginName]);
|
|
return $response;
|
|
}
|
|
|
|
$confirmTimestamp = time();
|
|
$this->session->set('last-password-confirm', $confirmTimestamp);
|
|
$this->throttler->resetDelay($this->request->getRemoteAddress(), 'sudo', ['loginName' => $loginName]);
|
|
return new DataResponse(['lastLogin' => $confirmTimestamp], Http::STATUS_OK);
|
|
}
|
|
}
|