diff options
author | Morris Jobke <hey@morrisjobke.de> | 2020-08-13 07:25:01 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-08-13 07:25:01 +0200 |
commit | 725fecee3454dd1fabe1b373a8c9a37f81040fd9 (patch) | |
tree | 8928539bdd919e25295ebd7b0b15ce0828b4ee75 /lib/private/Authentication | |
parent | 3a39f2ae9165fdbf98ad9fafcb52d7dde7f75df8 (diff) | |
parent | 68794ebc9292cdedaa6a52d190e41e58f6edb1ba (diff) | |
download | nextcloud-server-725fecee3454dd1fabe1b373a8c9a37f81040fd9.tar.gz nextcloud-server-725fecee3454dd1fabe1b373a8c9a37f81040fd9.zip |
Merge pull request #21344 from nextcloud/fix/twofactor-cleanup-event
Emit an event for every disabled 2FA provider during cleanup
Diffstat (limited to 'lib/private/Authentication')
-rw-r--r-- | lib/private/Authentication/TwoFactorAuth/Db/ProviderUserAssignmentDao.php | 35 | ||||
-rw-r--r-- | lib/private/Authentication/TwoFactorAuth/Registry.php | 9 |
2 files changed, 34 insertions, 10 deletions
diff --git a/lib/private/Authentication/TwoFactorAuth/Db/ProviderUserAssignmentDao.php b/lib/private/Authentication/TwoFactorAuth/Db/ProviderUserAssignmentDao.php index 02e6863d1c4..bd8ff0353ee 100644 --- a/lib/private/Authentication/TwoFactorAuth/Db/ProviderUserAssignmentDao.php +++ b/lib/private/Authentication/TwoFactorAuth/Db/ProviderUserAssignmentDao.php @@ -29,6 +29,7 @@ namespace OC\Authentication\TwoFactorAuth\Db; use Doctrine\DBAL\Exception\UniqueConstraintViolationException; use OCP\DB\QueryBuilder\IQueryBuilder; use OCP\IDBConnection; +use function array_map; /** * Data access object to query and assign (provider_id, uid, enabled) tuples of @@ -91,13 +92,35 @@ class ProviderUserAssignmentDao { } } - public function deleteByUser(string $uid) { - $qb = $this->conn->getQueryBuilder(); - - $deleteQuery = $qb->delete(self::TABLE_NAME) - ->where($qb->expr()->eq('uid', $qb->createNamedParameter($uid))); - + /** + * Delete all provider states of a user and return the provider IDs + * + * @param string $uid + * + * @return int[] + */ + public function deleteByUser(string $uid): array { + $qb1 = $this->conn->getQueryBuilder(); + $selectQuery = $qb1->select('*') + ->from(self::TABLE_NAME) + ->where($qb1->expr()->eq('uid', $qb1->createNamedParameter($uid))); + $selectResult = $selectQuery->execute(); + $rows = $selectResult->fetchAll(); + $selectResult->closeCursor(); + + $qb2 = $this->conn->getQueryBuilder(); + $deleteQuery = $qb2 + ->delete(self::TABLE_NAME) + ->where($qb2->expr()->eq('uid', $qb2->createNamedParameter($uid))); $deleteQuery->execute(); + + return array_map(function (array $row) { + return [ + 'provider_id' => $row['provider_id'], + 'uid' => $row['uid'], + 'enabled' => 1 === (int) $row['enabled'], + ]; + }, $rows); } public function deleteAll(string $providerId) { diff --git a/lib/private/Authentication/TwoFactorAuth/Registry.php b/lib/private/Authentication/TwoFactorAuth/Registry.php index 97df2bd5311..2af8566d3e5 100644 --- a/lib/private/Authentication/TwoFactorAuth/Registry.php +++ b/lib/private/Authentication/TwoFactorAuth/Registry.php @@ -31,6 +31,7 @@ use OC\Authentication\TwoFactorAuth\Db\ProviderUserAssignmentDao; use OCP\Authentication\TwoFactorAuth\IProvider; use OCP\Authentication\TwoFactorAuth\IRegistry; use OCP\Authentication\TwoFactorAuth\RegistryEvent; +use OCP\Authentication\TwoFactorAuth\TwoFactorProviderDisabled; use OCP\EventDispatcher\IEventDispatcher; use OCP\IUser; @@ -66,11 +67,11 @@ class Registry implements IRegistry { $this->dispatcher->dispatch(self::EVENT_PROVIDER_DISABLED, $event); } - /** - * @todo evaluate if we should emit RegistryEvents for each of the deleted rows -> needs documentation - */ public function deleteUserData(IUser $user): void { - $this->assignmentDao->deleteByUser($user->getUID()); + foreach ($this->assignmentDao->deleteByUser($user->getUID()) as $provider) { + $event = new TwoFactorProviderDisabled($provider['provider_id']); + $this->dispatcher->dispatchTyped($event); + } } public function cleanUp(string $providerId) { |