summaryrefslogtreecommitdiffstats
path: root/lib
diff options
context:
space:
mode:
authorArthur Schiwon <blizzz@arthur-schiwon.de>2021-08-25 12:44:38 +0200
committerArthur Schiwon <blizzz@arthur-schiwon.de>2021-09-09 14:03:35 +0200
commita20de15b4388e4d57b0fb26eaeca98cd6ba817f8 (patch)
tree011b653dd5642e8e7f676e41607c517d34644f34 /lib
parent37f510cec28cbca0c849101e471b83293fd30aad (diff)
downloadnextcloud-server-a20de15b4388e4d57b0fb26eaeca98cd6ba817f8.tar.gz
nextcloud-server-a20de15b4388e4d57b0fb26eaeca98cd6ba817f8.zip
add a job to clean up expired verification tokens
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
Diffstat (limited to 'lib')
-rw-r--r--lib/composer/composer/autoload_classmap.php1
-rw-r--r--lib/composer/composer/autoload_static.php1
-rw-r--r--lib/private/Security/VerificationToken/CleanUpJob.php90
-rw-r--r--lib/private/Security/VerificationToken/VerificationToken.php22
-rw-r--r--lib/public/Security/VerificationToken/IVerificationToken.php2
5 files changed, 111 insertions, 5 deletions
diff --git a/lib/composer/composer/autoload_classmap.php b/lib/composer/composer/autoload_classmap.php
index fa7aa3955a2..3f1f0d3b336 100644
--- a/lib/composer/composer/autoload_classmap.php
+++ b/lib/composer/composer/autoload_classmap.php
@@ -1373,6 +1373,7 @@ return array(
'OC\\Security\\RateLimiting\\Limiter' => $baseDir . '/lib/private/Security/RateLimiting/Limiter.php',
'OC\\Security\\SecureRandom' => $baseDir . '/lib/private/Security/SecureRandom.php',
'OC\\Security\\TrustedDomainHelper' => $baseDir . '/lib/private/Security/TrustedDomainHelper.php',
+ 'OC\\Security\\VerificationToken\\CleanUpJob' => $baseDir . '/lib/private/Security/VerificationToken/CleanUpJob.php',
'OC\\Security\\VerificationToken\\VerificationToken' => $baseDir . '/lib/private/Security/VerificationToken/VerificationToken.php',
'OC\\Server' => $baseDir . '/lib/private/Server.php',
'OC\\ServerContainer' => $baseDir . '/lib/private/ServerContainer.php',
diff --git a/lib/composer/composer/autoload_static.php b/lib/composer/composer/autoload_static.php
index 2f268b92ece..a5b624e6e6c 100644
--- a/lib/composer/composer/autoload_static.php
+++ b/lib/composer/composer/autoload_static.php
@@ -1402,6 +1402,7 @@ class ComposerStaticInit53792487c5a8370acc0b06b1a864ff4c
'OC\\Security\\RateLimiting\\Limiter' => __DIR__ . '/../../..' . '/lib/private/Security/RateLimiting/Limiter.php',
'OC\\Security\\SecureRandom' => __DIR__ . '/../../..' . '/lib/private/Security/SecureRandom.php',
'OC\\Security\\TrustedDomainHelper' => __DIR__ . '/../../..' . '/lib/private/Security/TrustedDomainHelper.php',
+ 'OC\\Security\\VerificationToken\\CleanUpJob' => __DIR__ . '/../../..' . '/lib/private/Security/VerificationToken/CleanUpJob.php',
'OC\\Security\\VerificationToken\\VerificationToken' => __DIR__ . '/../../..' . '/lib/private/Security/VerificationToken/VerificationToken.php',
'OC\\Server' => __DIR__ . '/../../..' . '/lib/private/Server.php',
'OC\\ServerContainer' => __DIR__ . '/../../..' . '/lib/private/ServerContainer.php',
diff --git a/lib/private/Security/VerificationToken/CleanUpJob.php b/lib/private/Security/VerificationToken/CleanUpJob.php
new file mode 100644
index 00000000000..331172898ec
--- /dev/null
+++ b/lib/private/Security/VerificationToken/CleanUpJob.php
@@ -0,0 +1,90 @@
+<?php
+
+declare(strict_types=1);
+
+/**
+ * @copyright Copyright (c) 2021 Arthur Schiwon <blizzz@arthur-schiwon.de>
+ *
+ * @author Arthur Schiwon <blizzz@arthur-schiwon.de>
+ *
+ * @license GNU AGPL version 3 or any later version
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License as
+ * published by the Free Software Foundation, either version 3 of the
+ * License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License
+ * along with this program. If not, see <https://www.gnu.org/licenses/>.
+ *
+ */
+
+namespace OC\Security\VerificationToken;
+
+use OCP\AppFramework\Utility\ITimeFactory;
+use OCP\IConfig;
+use OCP\ILogger;
+use OCP\IUserManager;
+use OCP\Security\VerificationToken\InvalidTokenException;
+use OCP\Security\VerificationToken\IVerificationToken;
+
+class CleanUpJob extends \OCP\BackgroundJob\Job {
+
+ /** @var int */
+ protected $runNotBefore;
+ /** @var string */
+ protected $userId;
+ /** @var string */
+ protected $subject;
+ /** @var string */
+ protected $pwdPrefix;
+ /** @var IConfig */
+ private $config;
+ /** @var IVerificationToken */
+ private $verificationToken;
+ /** @var IUserManager */
+ private $userManager;
+
+ public function __construct(ITimeFactory $time, IConfig $config, IVerificationToken $verificationToken, IUserManager $userManager) {
+ parent::__construct($time);
+ $this->config = $config;
+ $this->verificationToken = $verificationToken;
+ $this->userManager = $userManager;
+ }
+
+ public function setArgument($argument) {
+ parent::setArgument($argument);
+ $args = \json_decode($argument);
+ $this->userId = (string)$args['userId'];
+ $this->subject = (string)$args['subject'];
+ $this->pwdPrefix = (string)$args['pp'];
+ $this->runNotBefore = (int)$args['notBefore'];
+ }
+
+ protected function run($argument) {
+ try {
+ $user = $this->userManager->get($this->userId);
+ if ($user === null) {
+ return;
+ }
+ $this->verificationToken->check('irrelevant', $user, $this->subject, $this->pwdPrefix);
+ } catch (InvalidTokenException $e) {
+ if ($e->getCode() === InvalidTokenException::TOKEN_EXPIRED) {
+ // make sure to only remove expired tokens
+ $this->config->deleteUserValue($this->userId, 'core', $this->subject);
+ }
+ }
+ }
+
+ public function execute($jobList, ILogger $logger = null) {
+ if ($this->time->getTime() >= $this->runNotBefore) {
+ $jobList->remove($this, $this->argument);
+ parent::execute($jobList, $logger);
+ }
+ }
+}
diff --git a/lib/private/Security/VerificationToken/VerificationToken.php b/lib/private/Security/VerificationToken/VerificationToken.php
index 4ac5605eecf..ff3cb90727a 100644
--- a/lib/private/Security/VerificationToken/VerificationToken.php
+++ b/lib/private/Security/VerificationToken/VerificationToken.php
@@ -27,14 +27,17 @@ declare(strict_types=1);
namespace OC\Security\VerificationToken;
use OCP\AppFramework\Utility\ITimeFactory;
+use OCP\BackgroundJob\IJobList;
use OCP\IConfig;
use OCP\IUser;
use OCP\Security\ICrypto;
use OCP\Security\ISecureRandom;
use OCP\Security\VerificationToken\InvalidTokenException;
use OCP\Security\VerificationToken\IVerificationToken;
+use function json_encode;
class VerificationToken implements IVerificationToken {
+ protected const TOKEN_LIFETIME = 60 * 60 * 24 * 7;
/** @var IConfig */
private $config;
@@ -44,17 +47,21 @@ class VerificationToken implements IVerificationToken {
private $timeFactory;
/** @var ISecureRandom */
private $secureRandom;
+ /** @var IJobList */
+ private $jobList;
public function __construct(
IConfig $config,
ICrypto $crypto,
ITimeFactory $timeFactory,
- ISecureRandom $secureRandom
+ ISecureRandom $secureRandom,
+ IJobList $jobList
) {
$this->config = $config;
$this->crypto = $crypto;
$this->timeFactory = $timeFactory;
$this->secureRandom = $secureRandom;
+ $this->jobList = $jobList;
}
/**
@@ -64,7 +71,7 @@ class VerificationToken implements IVerificationToken {
throw new InvalidTokenException($code);
}
- public function check(string $token, ?IUser $user, string $subject, string $passwordPrefix = ''): void {
+ public function check(string $token, ?IUser $user, string $subject, string $passwordPrefix = '', bool $expiresWithLogin = false): void {
if ($user === null || !$user->isEnabled()) {
$this->throwInvalidTokenException(InvalidTokenException::USER_UNKNOWN);
}
@@ -85,8 +92,8 @@ class VerificationToken implements IVerificationToken {
$this->throwInvalidTokenException(InvalidTokenException::TOKEN_INVALID_FORMAT);
}
- if ($splitToken[0] < ($this->timeFactory->getTime() - 60 * 60 * 24 * 7) ||
- $user->getLastLogin() > $splitToken[0]) {
+ if ($splitToken[0] < ($this->timeFactory->getTime() - self::TOKEN_LIFETIME)
+ || ($expiresWithLogin && $user->getLastLogin() > $splitToken[0])) {
$this->throwInvalidTokenException(InvalidTokenException::TOKEN_EXPIRED);
}
@@ -105,6 +112,13 @@ class VerificationToken implements IVerificationToken {
$tokenValue = $this->timeFactory->getTime() .':'. $token;
$encryptedValue = $this->crypto->encrypt($tokenValue, $passwordPrefix . $this->config->getSystemValue('secret'));
$this->config->setUserValue($user->getUID(), 'core', $subject, $encryptedValue);
+ $jobArgs = json_encode([
+ 'userId' => $user->getUID(),
+ 'subject' => $subject,
+ 'pp' => $passwordPrefix,
+ 'notBefore' => $this->timeFactory->getTime() + self::TOKEN_LIFETIME * 2, // multiply to provide a grace period
+ ]);
+ $this->jobList->add(CleanUpJob::class, $jobArgs);
return $token;
}
diff --git a/lib/public/Security/VerificationToken/IVerificationToken.php b/lib/public/Security/VerificationToken/IVerificationToken.php
index 12c03178fb6..c5f19e5de7f 100644
--- a/lib/public/Security/VerificationToken/IVerificationToken.php
+++ b/lib/public/Security/VerificationToken/IVerificationToken.php
@@ -46,7 +46,7 @@ interface IVerificationToken {
* @throws InvalidTokenException
* @since 23.0.0
*/
- public function check(string $token, ?IUser $user, string $subject, string $passwordPrefix = ''): void;
+ public function check(string $token, ?IUser $user, string $subject, string $passwordPrefix = '', bool $expiresWithLogin = false): void;
/**
* @since 23.0.0