123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285 |
- <?php
- /**
- * SPDX-FileCopyrightText: 2019-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- namespace OCA\Settings\Controller;
- use BadMethodCallException;
- use OC\Authentication\Exceptions\InvalidTokenException as OcInvalidTokenException;
- use OC\Authentication\Exceptions\PasswordlessTokenException;
- use OC\Authentication\Token\INamedToken;
- use OC\Authentication\Token\IProvider;
- use OC\Authentication\Token\RemoteWipe;
- use OCA\Settings\Activity\Provider;
- use OCP\Activity\IManager;
- use OCP\AppFramework\Controller;
- use OCP\AppFramework\Http;
- use OCP\AppFramework\Http\Attribute\NoAdminRequired;
- use OCP\AppFramework\Http\Attribute\PasswordConfirmationRequired;
- use OCP\AppFramework\Http\JSONResponse;
- use OCP\Authentication\Exceptions\ExpiredTokenException;
- use OCP\Authentication\Exceptions\InvalidTokenException;
- use OCP\Authentication\Exceptions\WipeTokenException;
- use OCP\Authentication\Token\IToken;
- use OCP\IRequest;
- use OCP\ISession;
- use OCP\IUserSession;
- use OCP\Security\ISecureRandom;
- use OCP\Session\Exceptions\SessionNotAvailableException;
- use Psr\Log\LoggerInterface;
- class AuthSettingsController extends Controller {
- /** @var IProvider */
- private $tokenProvider;
- /** @var RemoteWipe */
- private $remoteWipe;
- /**
- * @param string $appName
- * @param IRequest $request
- * @param IProvider $tokenProvider
- * @param ISession $session
- * @param ISecureRandom $random
- * @param string|null $userId
- * @param IUserSession $userSession
- * @param IManager $activityManager
- * @param RemoteWipe $remoteWipe
- * @param LoggerInterface $logger
- */
- public function __construct(
- string $appName,
- IRequest $request,
- IProvider $tokenProvider,
- private ISession $session,
- private ISecureRandom $random,
- private ?string $userId,
- private IUserSession $userSession,
- private IManager $activityManager,
- RemoteWipe $remoteWipe,
- private LoggerInterface $logger,
- ) {
- parent::__construct($appName, $request);
- $this->tokenProvider = $tokenProvider;
- $this->remoteWipe = $remoteWipe;
- }
- /**
- * @NoSubAdminRequired
- *
- * @param string $name
- * @return JSONResponse
- */
- #[NoAdminRequired]
- #[PasswordConfirmationRequired]
- public function create($name) {
- if ($this->checkAppToken()) {
- return $this->getServiceNotAvailableResponse();
- }
- try {
- $sessionId = $this->session->getId();
- } catch (SessionNotAvailableException $ex) {
- return $this->getServiceNotAvailableResponse();
- }
- if ($this->userSession->getImpersonatingUserID() !== null) {
- return $this->getServiceNotAvailableResponse();
- }
- try {
- $sessionToken = $this->tokenProvider->getToken($sessionId);
- $loginName = $sessionToken->getLoginName();
- try {
- $password = $this->tokenProvider->getPassword($sessionToken, $sessionId);
- } catch (PasswordlessTokenException $ex) {
- $password = null;
- }
- } catch (InvalidTokenException $ex) {
- return $this->getServiceNotAvailableResponse();
- }
- if (mb_strlen($name) > 128) {
- $name = mb_substr($name, 0, 120) . '…';
- }
- $token = $this->generateRandomDeviceToken();
- $deviceToken = $this->tokenProvider->generateToken($token, $this->userId, $loginName, $password, $name, IToken::PERMANENT_TOKEN);
- $tokenData = $deviceToken->jsonSerialize();
- $tokenData['canDelete'] = true;
- $tokenData['canRename'] = true;
- $this->publishActivity(Provider::APP_TOKEN_CREATED, $deviceToken->getId(), ['name' => $deviceToken->getName()]);
- return new JSONResponse([
- 'token' => $token,
- 'loginName' => $loginName,
- 'deviceToken' => $tokenData,
- ]);
- }
- /**
- * @return JSONResponse
- */
- private function getServiceNotAvailableResponse() {
- $resp = new JSONResponse();
- $resp->setStatus(Http::STATUS_SERVICE_UNAVAILABLE);
- return $resp;
- }
- /**
- * Return a 25 digit device password
- *
- * Example: AbCdE-fGhJk-MnPqR-sTwXy-23456
- *
- * @return string
- */
- private function generateRandomDeviceToken() {
- $groups = [];
- for ($i = 0; $i < 5; $i++) {
- $groups[] = $this->random->generate(5, ISecureRandom::CHAR_HUMAN_READABLE);
- }
- return implode('-', $groups);
- }
- private function checkAppToken(): bool {
- return $this->session->exists('app_password');
- }
- /**
- * @NoSubAdminRequired
- *
- * @param int $id
- * @return array|JSONResponse
- */
- #[NoAdminRequired]
- public function destroy($id) {
- if ($this->checkAppToken()) {
- return new JSONResponse([], Http::STATUS_BAD_REQUEST);
- }
- try {
- $token = $this->findTokenByIdAndUser($id);
- } catch (WipeTokenException $e) {
- //continue as we can destroy tokens in wipe
- $token = $e->getToken();
- } catch (InvalidTokenException $e) {
- return new JSONResponse([], Http::STATUS_NOT_FOUND);
- }
- $this->tokenProvider->invalidateTokenById($this->userId, $token->getId());
- $this->publishActivity(Provider::APP_TOKEN_DELETED, $token->getId(), ['name' => $token->getName()]);
- return [];
- }
- /**
- * @NoSubAdminRequired
- *
- * @param int $id
- * @param array $scope
- * @param string $name
- * @return array|JSONResponse
- */
- #[NoAdminRequired]
- public function update($id, array $scope, string $name) {
- if ($this->checkAppToken()) {
- return new JSONResponse([], Http::STATUS_BAD_REQUEST);
- }
- try {
- $token = $this->findTokenByIdAndUser($id);
- } catch (InvalidTokenException $e) {
- return new JSONResponse([], Http::STATUS_NOT_FOUND);
- }
- $currentName = $token->getName();
- if ($scope !== $token->getScopeAsArray()) {
- $token->setScope([IToken::SCOPE_FILESYSTEM => $scope[IToken::SCOPE_FILESYSTEM]]);
- $this->publishActivity($scope[IToken::SCOPE_FILESYSTEM] ? Provider::APP_TOKEN_FILESYSTEM_GRANTED : Provider::APP_TOKEN_FILESYSTEM_REVOKED, $token->getId(), ['name' => $currentName]);
- }
- if (mb_strlen($name) > 128) {
- $name = mb_substr($name, 0, 120) . '…';
- }
- if ($token instanceof INamedToken && $name !== $currentName) {
- $token->setName($name);
- $this->publishActivity(Provider::APP_TOKEN_RENAMED, $token->getId(), ['name' => $currentName, 'newName' => $name]);
- }
- $this->tokenProvider->updateToken($token);
- return [];
- }
- /**
- * @param string $subject
- * @param int $id
- * @param array $parameters
- */
- private function publishActivity(string $subject, int $id, array $parameters = []): void {
- $event = $this->activityManager->generateEvent();
- $event->setApp('settings')
- ->setType('security')
- ->setAffectedUser($this->userId)
- ->setAuthor($this->userId)
- ->setSubject($subject, $parameters)
- ->setObject('app_token', $id, 'App Password');
- try {
- $this->activityManager->publish($event);
- } catch (BadMethodCallException $e) {
- $this->logger->warning('could not publish activity', ['exception' => $e]);
- }
- }
- /**
- * Find a token by given id and check if uid for current session belongs to this token
- *
- * @param int $id
- * @return IToken
- * @throws InvalidTokenException
- */
- private function findTokenByIdAndUser(int $id): IToken {
- try {
- $token = $this->tokenProvider->getTokenById($id);
- } catch (ExpiredTokenException $e) {
- $token = $e->getToken();
- }
- if ($token->getUID() !== $this->userId) {
- /** @psalm-suppress DeprecatedClass We have to throw the OC version so both OC and OCP catches catch it */
- throw new OcInvalidTokenException('This token does not belong to you!');
- }
- return $token;
- }
- /**
- * @NoSubAdminRequired
- *
- * @param int $id
- * @return JSONResponse
- * @throws InvalidTokenException
- * @throws ExpiredTokenException
- */
- #[NoAdminRequired]
- #[PasswordConfirmationRequired]
- public function wipe(int $id): JSONResponse {
- if ($this->checkAppToken()) {
- return new JSONResponse([], Http::STATUS_BAD_REQUEST);
- }
- try {
- $token = $this->findTokenByIdAndUser($id);
- } catch (InvalidTokenException $e) {
- return new JSONResponse([], Http::STATUS_NOT_FOUND);
- }
- if (!$this->remoteWipe->markTokenForWipe($token)) {
- return new JSONResponse([], Http::STATUS_BAD_REQUEST);
- }
- return new JSONResponse([]);
- }
- }
|