123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345 |
- <?php
- declare(strict_types=1);
- /**
- * @copyright Copyright (c) 2016, ownCloud, Inc.
- *
- * @author Bernhard Posselt <dev@bernhard-posselt.com>
- * @author Bjoern Schiessle <bjoern@schiessle.org>
- * @author Christoph Wurst <christoph@winzerhof-wurst.at>
- * @author Daniel Kesselberg <mail@danielkesselberg.de>
- * @author Holger Hees <holger.hees@gmail.com>
- * @author Joas Schilling <coding@schilljs.com>
- * @author Julien Veyssier <eneiluj@posteo.net>
- * @author Lukas Reschke <lukas@statuscode.ch>
- * @author Morris Jobke <hey@morrisjobke.de>
- * @author Roeland Jago Douma <roeland@famdouma.nl>
- * @author Stefan Weil <sw@weilnetz.de>
- * @author Thomas Müller <thomas.mueller@tmit.eu>
- * @author Thomas Tanghus <thomas@tanghus.net>
- *
- * @license AGPL-3.0
- *
- * This code is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License, version 3,
- * as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License, version 3,
- * along with this program. If not, see <http://www.gnu.org/licenses/>
- *
- */
- namespace OC\AppFramework\Middleware\Security;
- use OC\AppFramework\Middleware\Security\Exceptions\AppNotEnabledException;
- use OC\AppFramework\Middleware\Security\Exceptions\CrossSiteRequestForgeryException;
- use OC\AppFramework\Middleware\Security\Exceptions\NotAdminException;
- use OC\AppFramework\Middleware\Security\Exceptions\NotLoggedInException;
- use OC\AppFramework\Middleware\Security\Exceptions\SecurityException;
- use OC\AppFramework\Middleware\Security\Exceptions\StrictCookieMissingException;
- use OC\AppFramework\Utility\ControllerMethodReflector;
- use OC\Settings\AuthorizedGroupMapper;
- use OCP\App\AppPathNotFoundException;
- use OCP\App\IAppManager;
- use OCP\AppFramework\Controller;
- use OCP\AppFramework\Http\Attribute\AuthorizedAdminSetting;
- use OCP\AppFramework\Http\Attribute\NoAdminRequired;
- use OCP\AppFramework\Http\Attribute\NoCSRFRequired;
- use OCP\AppFramework\Http\Attribute\PublicPage;
- use OCP\AppFramework\Http\Attribute\StrictCookiesRequired;
- use OCP\AppFramework\Http\Attribute\SubAdminRequired;
- use OCP\AppFramework\Http\JSONResponse;
- use OCP\AppFramework\Http\RedirectResponse;
- use OCP\AppFramework\Http\Response;
- use OCP\AppFramework\Http\TemplateResponse;
- use OCP\AppFramework\Middleware;
- use OCP\AppFramework\OCSController;
- use OCP\IL10N;
- use OCP\INavigationManager;
- use OCP\IRequest;
- use OCP\IURLGenerator;
- use OCP\IUserSession;
- use OCP\Util;
- use Psr\Log\LoggerInterface;
- use ReflectionMethod;
- /**
- * Used to do all the authentication and checking stuff for a controller method
- * It reads out the annotations of a controller method and checks which if
- * security things should be checked and also handles errors in case a security
- * check fails
- */
- class SecurityMiddleware extends Middleware {
- /** @var INavigationManager */
- private $navigationManager;
- /** @var IRequest */
- private $request;
- /** @var ControllerMethodReflector */
- private $reflector;
- /** @var string */
- private $appName;
- /** @var IURLGenerator */
- private $urlGenerator;
- /** @var LoggerInterface */
- private $logger;
- /** @var bool */
- private $isLoggedIn;
- /** @var bool */
- private $isAdminUser;
- /** @var bool */
- private $isSubAdmin;
- /** @var IAppManager */
- private $appManager;
- /** @var IL10N */
- private $l10n;
- /** @var AuthorizedGroupMapper */
- private $groupAuthorizationMapper;
- /** @var IUserSession */
- private $userSession;
- public function __construct(IRequest $request,
- ControllerMethodReflector $reflector,
- INavigationManager $navigationManager,
- IURLGenerator $urlGenerator,
- LoggerInterface $logger,
- string $appName,
- bool $isLoggedIn,
- bool $isAdminUser,
- bool $isSubAdmin,
- IAppManager $appManager,
- IL10N $l10n,
- AuthorizedGroupMapper $mapper,
- IUserSession $userSession
- ) {
- $this->navigationManager = $navigationManager;
- $this->request = $request;
- $this->reflector = $reflector;
- $this->appName = $appName;
- $this->urlGenerator = $urlGenerator;
- $this->logger = $logger;
- $this->isLoggedIn = $isLoggedIn;
- $this->isAdminUser = $isAdminUser;
- $this->isSubAdmin = $isSubAdmin;
- $this->appManager = $appManager;
- $this->l10n = $l10n;
- $this->groupAuthorizationMapper = $mapper;
- $this->userSession = $userSession;
- }
- /**
- * This runs all the security checks before a method call. The
- * security checks are determined by inspecting the controller method
- * annotations
- *
- * @param Controller $controller the controller
- * @param string $methodName the name of the method
- * @throws SecurityException when a security check fails
- *
- * @suppress PhanUndeclaredClassConstant
- */
- public function beforeController($controller, $methodName) {
- // this will set the current navigation entry of the app, use this only
- // for normal HTML requests and not for AJAX requests
- $this->navigationManager->setActiveEntry($this->appName);
- if (get_class($controller) === \OCA\Talk\Controller\PageController::class && $methodName === 'showCall') {
- $this->navigationManager->setActiveEntry('spreed');
- }
- $reflectionMethod = new ReflectionMethod($controller, $methodName);
- // security checks
- $isPublicPage = $this->hasAnnotationOrAttribute($reflectionMethod, 'PublicPage', PublicPage::class);
- if (!$isPublicPage) {
- if (!$this->isLoggedIn) {
- throw new NotLoggedInException();
- }
- $authorized = false;
- if ($this->hasAnnotationOrAttribute($reflectionMethod, 'AuthorizedAdminSetting', AuthorizedAdminSetting::class)) {
- $authorized = $this->isAdminUser;
- if (!$authorized && $this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class)) {
- $authorized = $this->isSubAdmin;
- }
- if (!$authorized) {
- $settingClasses = $this->getAuthorizedAdminSettingClasses($reflectionMethod);
- $authorizedClasses = $this->groupAuthorizationMapper->findAllClassesForUser($this->userSession->getUser());
- foreach ($settingClasses as $settingClass) {
- $authorized = in_array($settingClass, $authorizedClasses, true);
- if ($authorized) {
- break;
- }
- }
- }
- if (!$authorized) {
- throw new NotAdminException($this->l10n->t('Logged in user must be an admin, a sub admin or gotten special right to access this setting'));
- }
- }
- if ($this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class)
- && !$this->isSubAdmin
- && !$this->isAdminUser
- && !$authorized) {
- throw new NotAdminException($this->l10n->t('Logged in user must be an admin or sub admin'));
- }
- if (!$this->hasAnnotationOrAttribute($reflectionMethod, 'SubAdminRequired', SubAdminRequired::class)
- && !$this->hasAnnotationOrAttribute($reflectionMethod, 'NoAdminRequired', NoAdminRequired::class)
- && !$this->isAdminUser
- && !$authorized) {
- throw new NotAdminException($this->l10n->t('Logged in user must be an admin'));
- }
- }
- // Check for strict cookie requirement
- if ($this->hasAnnotationOrAttribute($reflectionMethod, 'StrictCookieRequired', StrictCookiesRequired::class) ||
- !$this->hasAnnotationOrAttribute($reflectionMethod, 'NoCSRFRequired', NoCSRFRequired::class)) {
- if (!$this->request->passesStrictCookieCheck()) {
- throw new StrictCookieMissingException();
- }
- }
- // CSRF check - also registers the CSRF token since the session may be closed later
- Util::callRegister();
- if ($this->isInvalidCSRFRequired($reflectionMethod)) {
- /*
- * Only allow the CSRF check to fail on OCS Requests. This kind of
- * hacks around that we have no full token auth in place yet and we
- * do want to offer CSRF checks for web requests.
- *
- * Additionally we allow Bearer authenticated requests to pass on OCS routes.
- * This allows oauth apps (e.g. moodle) to use the OCS endpoints
- */
- if (!$controller instanceof OCSController || !$this->isValidOCSRequest()) {
- throw new CrossSiteRequestForgeryException();
- }
- }
- /**
- * Checks if app is enabled (also includes a check whether user is allowed to access the resource)
- * The getAppPath() check is here since components such as settings also use the AppFramework and
- * therefore won't pass this check.
- * If page is public, app does not need to be enabled for current user/visitor
- */
- try {
- $appPath = $this->appManager->getAppPath($this->appName);
- } catch (AppPathNotFoundException $e) {
- $appPath = false;
- }
- if ($appPath !== false && !$isPublicPage && !$this->appManager->isEnabledForUser($this->appName)) {
- throw new AppNotEnabledException();
- }
- }
- private function isInvalidCSRFRequired(ReflectionMethod $reflectionMethod): bool {
- if ($this->hasAnnotationOrAttribute($reflectionMethod, 'NoCSRFRequired', NoCSRFRequired::class)) {
- return false;
- }
- return !$this->request->passesCSRFCheck();
- }
- private function isValidOCSRequest(): bool {
- return $this->request->getHeader('OCS-APIREQUEST') === 'true'
- || str_starts_with($this->request->getHeader('Authorization'), 'Bearer ');
- }
- /**
- * @template T
- *
- * @param ReflectionMethod $reflectionMethod
- * @param string $annotationName
- * @param class-string<T> $attributeClass
- * @return boolean
- */
- protected function hasAnnotationOrAttribute(ReflectionMethod $reflectionMethod, string $annotationName, string $attributeClass): bool {
- if (!empty($reflectionMethod->getAttributes($attributeClass))) {
- return true;
- }
- if ($this->reflector->hasAnnotation($annotationName)) {
- return true;
- }
- return false;
- }
- /**
- * @param ReflectionMethod $reflectionMethod
- * @return string[]
- */
- protected function getAuthorizedAdminSettingClasses(ReflectionMethod $reflectionMethod): array {
- $classes = [];
- if ($this->reflector->hasAnnotation('AuthorizedAdminSetting')) {
- $classes = explode(';', $this->reflector->getAnnotationParameter('AuthorizedAdminSetting', 'settings'));
- }
- $attributes = $reflectionMethod->getAttributes(AuthorizedAdminSetting::class);
- if (!empty($attributes)) {
- foreach ($attributes as $attribute) {
- /** @var AuthorizedAdminSetting $setting */
- $setting = $attribute->newInstance();
- $classes[] = $setting->getSettings();
- }
- }
- return $classes;
- }
- /**
- * If an SecurityException is being caught, ajax requests return a JSON error
- * response and non ajax requests redirect to the index
- *
- * @param Controller $controller the controller that is being called
- * @param string $methodName the name of the method that will be called on
- * the controller
- * @param \Exception $exception the thrown exception
- * @return Response a Response object or null in case that the exception could not be handled
- * @throws \Exception the passed in exception if it can't handle it
- */
- public function afterException($controller, $methodName, \Exception $exception): Response {
- if ($exception instanceof SecurityException) {
- if ($exception instanceof StrictCookieMissingException) {
- return new RedirectResponse(\OC::$WEBROOT . '/');
- }
- if (stripos($this->request->getHeader('Accept'), 'html') === false) {
- $response = new JSONResponse(
- ['message' => $exception->getMessage()],
- $exception->getCode()
- );
- } else {
- if ($exception instanceof NotLoggedInException) {
- $params = [];
- if (isset($this->request->server['REQUEST_URI'])) {
- $params['redirect_url'] = $this->request->server['REQUEST_URI'];
- }
- $usernamePrefill = $this->request->getParam('user', '');
- if ($usernamePrefill !== '') {
- $params['user'] = $usernamePrefill;
- }
- if ($this->request->getParam('direct')) {
- $params['direct'] = 1;
- }
- $url = $this->urlGenerator->linkToRoute('core.login.showLoginForm', $params);
- $response = new RedirectResponse($url);
- } else {
- $response = new TemplateResponse('core', '403', ['message' => $exception->getMessage()], 'guest');
- $response->setStatus($exception->getCode());
- }
- }
- $this->logger->debug($exception->getMessage(), [
- 'exception' => $exception,
- ]);
- return $response;
- }
- throw $exception;
- }
- }
|