* * @author Christoph Wurst * * @license AGPL-3.0 * * This code is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License, version 3, * along with this program. If not, see * */ namespace OC\Authentication\Token; use Exception; use OC\Authentication\Exceptions\InvalidTokenException; use OC\Authentication\Exceptions\PasswordlessTokenException; use OCP\AppFramework\Db\DoesNotExistException; use OCP\AppFramework\Utility\ITimeFactory; use OCP\IConfig; use OCP\ILogger; use OCP\IUser; use OCP\Security\ICrypto; class DefaultTokenProvider implements IProvider { /** @var DefaultTokenMapper */ private $mapper; /** @var ICrypto */ private $crypto; /** @var IConfig */ private $config; /** @var ILogger $logger */ private $logger; /** @var ITimeFactory $time */ private $time; /** * @param DefaultTokenMapper $mapper * @param ICrypto $crypto * @param IConfig $config * @param ILogger $logger * @param ITimeFactory $time */ public function __construct(DefaultTokenMapper $mapper, ICrypto $crypto, IConfig $config, ILogger $logger, ITimeFactory $time) { $this->mapper = $mapper; $this->crypto = $crypto; $this->config = $config; $this->logger = $logger; $this->time = $time; } /** * Create and persist a new token * * @param string $token * @param string $uid * @param string $loginName * @param string|null $password * @param string $name * @param int $type token type * @param int $remember whether the session token should be used for remember-me * @return IToken */ public function generateToken($token, $uid, $loginName, $password, $name, $type = IToken::TEMPORARY_TOKEN, $remember = IToken::DO_NOT_REMEMBER) { $dbToken = new DefaultToken(); $dbToken->setUid($uid); $dbToken->setLoginName($loginName); if (!is_null($password)) { $dbToken->setPassword($this->encryptPassword($password, $token)); } $dbToken->setName($name); $dbToken->setToken($this->hashToken($token)); $dbToken->setType($type); $dbToken->setRemember($remember); $dbToken->setLastActivity($this->time->getTime()); $this->mapper->insert($dbToken); return $dbToken; } /** * Save the updated token * * @param IToken $token * @throws InvalidTokenException */ public function updateToken(IToken $token) { if (!($token instanceof DefaultToken)) { throw new InvalidTokenException(); } $this->mapper->update($token); } /** * Update token activity timestamp * * @throws InvalidTokenException * @param IToken $token */ public function updateTokenActivity(IToken $token) { if (!($token instanceof DefaultToken)) { throw new InvalidTokenException(); } /** @var DefaultToken $token */ $now = $this->time->getTime(); if ($token->getLastActivity() < ($now - 60)) { // Update token only once per minute $token->setLastActivity($now); $this->mapper->update($token); } } /** * Get all token of a user * * The provider may limit the number of result rows in case of an abuse * where a high number of (session) tokens is generated * * @param IUser $user * @return IToken[] */ public function getTokenByUser(IUser $user) { return $this->mapper->getTokenByUser($user); } /** * Get a token by token * * @param string $tokenId * @throws InvalidTokenException * @return DefaultToken */ public function getToken($tokenId) { try { return $this->mapper->getToken($this->hashToken($tokenId)); } catch (DoesNotExistException $ex) { throw new InvalidTokenException(); } } /** * Get a token by token id * * @param string $tokenId * @throws InvalidTokenException * @return DefaultToken */ public function getTokenById($tokenId) { try { return $this->mapper->getTokenById($tokenId); } catch (DoesNotExistException $ex) { throw new InvalidTokenException(); } } /** * @param string $oldSessionId * @param string $sessionId * @throws InvalidTokenException */ public function renewSessionToken($oldSessionId, $sessionId) { $token = $this->getToken($oldSessionId); $newToken = new DefaultToken(); $newToken->setUid($token->getUID()); $newToken->setLoginName($token->getLoginName()); if (!is_null($token->getPassword())) { $password = $this->decryptPassword($token->getPassword(), $oldSessionId); $newToken->setPassword($this->encryptPassword($password, $sessionId)); } $newToken->setName($token->getName()); $newToken->setToken($this->hashToken($sessionId)); $newToken->setType(IToken::TEMPORARY_TOKEN); $newToken->setLastActivity($this->time->getTime()); $this->mapper->insert($newToken); } /** * @param IToken $savedToken * @param string $tokenId session token * @throws InvalidTokenException * @throws PasswordlessTokenException * @return string */ public function getPassword(IToken $savedToken, $tokenId) { $password = $savedToken->getPassword(); if (is_null($password)) { throw new PasswordlessTokenException(); } return $this->decryptPassword($password, $tokenId); } /** * Encrypt and set the password of the given token * * @param IToken $token * @param string $tokenId * @param string $password * @throws InvalidTokenException */ public function setPassword(IToken $token, $tokenId, $password) { if (!($token instanceof DefaultToken)) { throw new InvalidTokenException(); } /** @var DefaultToken $token */ $token->setPassword($this->encryptPassword($password, $tokenId)); $this->mapper->update($token); } /** * Invalidate (delete) the given session token * * @param string $token */ public function invalidateToken($token) { $this->mapper->invalidate($this->hashToken($token)); } /** * Invalidate (delete) the given token * * @param IUser $user * @param int $id */ public function invalidateTokenById(IUser $user, $id) { $this->mapper->deleteById($user, $id); } /** * Invalidate (delete) old session tokens */ public function invalidateOldTokens() { $olderThan = $this->time->getTime() - (int) $this->config->getSystemValue('session_lifetime', 60 * 60 * 24); $this->logger->debug('Invalidating session tokens older than ' . date('c', $olderThan)); $this->mapper->invalidateOld($olderThan, IToken::DO_NOT_REMEMBER); $rememberThreshold = $this->time->getTime() - (int) $this->config->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15); $this->logger->debug('Invalidating remembered session tokens older than ' . date('c', $rememberThreshold)); $this->mapper->invalidateOld($rememberThreshold, IToken::REMEMBER); } /** * @param string $token * @return string */ private function hashToken($token) { $secret = $this->config->getSystemValue('secret'); return hash('sha512', $token . $secret); } /** * Encrypt the given password * * The token is used as key * * @param string $password * @param string $token * @return string encrypted password */ private function encryptPassword($password, $token) { $secret = $this->config->getSystemValue('secret'); return $this->crypto->encrypt($password, $token . $secret); } /** * Decrypt the given password * * The token is used as key * * @param string $password * @param string $token * @throws InvalidTokenException * @return string the decrypted key */ private function decryptPassword($password, $token) { $secret = $this->config->getSystemValue('secret'); try { return $this->crypto->decrypt($password, $token . $secret); } catch (Exception $ex) { // Delete the invalid token $this->invalidateToken($token); throw new InvalidTokenException(); } } }