|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
declare(strict_types=1); |
|
4
|
|
|
|
|
5
|
|
|
/* For licensing terms, see /license.txt */ |
|
6
|
|
|
|
|
7
|
|
|
namespace Chamilo\CoreBundle\Controller; |
|
8
|
|
|
|
|
9
|
|
|
use Chamilo\CoreBundle\Entity\User; |
|
10
|
|
|
use Chamilo\CoreBundle\Form\ChangePasswordType; |
|
11
|
|
|
use Chamilo\CoreBundle\Form\ProfileType; |
|
12
|
|
|
use Chamilo\CoreBundle\Repository\Node\IllustrationRepository; |
|
13
|
|
|
use Chamilo\CoreBundle\Repository\Node\UserRepository; |
|
14
|
|
|
use Chamilo\CoreBundle\ServiceHelper\UserHelper; |
|
15
|
|
|
use Chamilo\CoreBundle\Settings\SettingsManager; |
|
16
|
|
|
use Chamilo\CoreBundle\Traits\ControllerTrait; |
|
17
|
|
|
use Endroid\QrCode\Builder\Builder; |
|
18
|
|
|
use Endroid\QrCode\Encoding\Encoding; |
|
19
|
|
|
use Endroid\QrCode\ErrorCorrectionLevel\ErrorCorrectionLevelHigh; |
|
20
|
|
|
use Endroid\QrCode\Writer\PngWriter; |
|
21
|
|
|
use OTPHP\TOTP; |
|
22
|
|
|
use Security; |
|
23
|
|
|
use Symfony\Component\Form\FormError; |
|
24
|
|
|
use Symfony\Component\HttpFoundation\RedirectResponse; |
|
25
|
|
|
use Symfony\Component\HttpFoundation\Request; |
|
26
|
|
|
use Symfony\Component\HttpFoundation\Response; |
|
27
|
|
|
use Symfony\Component\Routing\Attribute\Route; |
|
28
|
|
|
use Symfony\Component\Security\Core\User\UserInterface; |
|
29
|
|
|
use Symfony\Component\Security\Csrf\CsrfToken; |
|
30
|
|
|
use Symfony\Component\Security\Csrf\CsrfTokenManagerInterface; |
|
31
|
|
|
use Symfony\Contracts\Translation\TranslatorInterface; |
|
32
|
|
|
|
|
33
|
|
|
/** |
|
34
|
|
|
* @author Julio Montoya <[email protected]> |
|
35
|
|
|
*/ |
|
36
|
|
|
#[Route('/account')] |
|
37
|
|
|
class AccountController extends BaseController |
|
38
|
|
|
{ |
|
39
|
|
|
use ControllerTrait; |
|
40
|
|
|
|
|
41
|
|
|
public function __construct( |
|
42
|
|
|
private readonly UserHelper $userHelper, |
|
43
|
|
|
private readonly TranslatorInterface $translator |
|
44
|
|
|
) {} |
|
45
|
|
|
|
|
46
|
|
|
#[Route('/edit', name: 'chamilo_core_account_edit', methods: ['GET', 'POST'])] |
|
47
|
|
|
public function edit(Request $request, UserRepository $userRepository, IllustrationRepository $illustrationRepo, SettingsManager $settingsManager): Response |
|
48
|
|
|
{ |
|
49
|
|
|
$user = $this->userHelper->getCurrent(); |
|
50
|
|
|
|
|
51
|
|
|
if (!\is_object($user) || !$user instanceof UserInterface) { |
|
52
|
|
|
throw $this->createAccessDeniedException('This user does not have access to this section'); |
|
53
|
|
|
} |
|
54
|
|
|
|
|
55
|
|
|
/** @var User $user */ |
|
56
|
|
|
$form = $this->createForm(ProfileType::class, $user); |
|
57
|
|
|
$form->setData($user); |
|
58
|
|
|
$form->handleRequest($request); |
|
59
|
|
|
|
|
60
|
|
|
if ($form->isSubmitted() && $form->isValid()) { |
|
61
|
|
|
if ($form->has('illustration')) { |
|
62
|
|
|
$illustration = $form['illustration']->getData(); |
|
63
|
|
|
if ($illustration) { |
|
64
|
|
|
$illustrationRepo->deleteIllustration($user); |
|
65
|
|
|
$illustrationRepo->addIllustration($user, $user, $illustration); |
|
66
|
|
|
} |
|
67
|
|
|
} |
|
68
|
|
|
|
|
69
|
|
|
if ($form->has('password')) { |
|
70
|
|
|
$password = $form['password']->getData(); |
|
71
|
|
|
if ($password) { |
|
72
|
|
|
$user->setPlainPassword($password); |
|
73
|
|
|
} |
|
74
|
|
|
} |
|
75
|
|
|
|
|
76
|
|
|
$showTermsIfProfileCompleted = ('true' === $settingsManager->getSetting('show_terms_if_profile_completed')); |
|
77
|
|
|
$user->setProfileCompleted($showTermsIfProfileCompleted); |
|
78
|
|
|
|
|
79
|
|
|
$userRepository->updateUser($user); |
|
80
|
|
|
$this->addFlash('success', $this->trans('Updated')); |
|
81
|
|
|
$url = $this->generateUrl('chamilo_core_account_home'); |
|
82
|
|
|
|
|
83
|
|
|
$request->getSession()->set('_locale_user', $user->getLocale()); |
|
84
|
|
|
|
|
85
|
|
|
return new RedirectResponse($url); |
|
86
|
|
|
} |
|
87
|
|
|
|
|
88
|
|
|
return $this->render('@ChamiloCore/Account/edit.html.twig', [ |
|
89
|
|
|
'form' => $form->createView(), |
|
90
|
|
|
'user' => $user, |
|
91
|
|
|
]); |
|
92
|
|
|
} |
|
93
|
|
|
|
|
94
|
|
|
#[Route('/change-password', name: 'chamilo_core_account_change_password', methods: ['GET', 'POST'])] |
|
95
|
|
|
public function changePassword(Request $request, UserRepository $userRepository, CsrfTokenManagerInterface $csrfTokenManager, SettingsManager $settingsManager): Response |
|
96
|
|
|
{ |
|
97
|
|
|
/** @var User $user */ |
|
98
|
|
|
$user = $this->getUser(); |
|
99
|
|
|
|
|
100
|
|
|
if (!\is_object($user) || !$user instanceof UserInterface) { |
|
101
|
|
|
throw $this->createAccessDeniedException('This user does not have access to this section'); |
|
102
|
|
|
} |
|
103
|
|
|
|
|
104
|
|
|
$form = $this->createForm(ChangePasswordType::class, [ |
|
105
|
|
|
'enable2FA' => $user->getMfaEnabled(), |
|
106
|
|
|
]); |
|
107
|
|
|
$form->handleRequest($request); |
|
108
|
|
|
|
|
109
|
|
|
$qrCodeBase64 = null; |
|
110
|
|
|
$showQRCode = false; |
|
111
|
|
|
if ($user->getMfaEnabled() && 'TOTP' === $user->getMfaService() && $user->getMfaSecret()) { |
|
112
|
|
|
$decryptedSecret = $this->decryptTOTPSecret($user->getMfaSecret(), $_ENV['APP_SECRET']); |
|
113
|
|
|
$totp = TOTP::create($decryptedSecret); |
|
114
|
|
|
$portalName = $settingsManager->getSetting('platform.institution'); |
|
115
|
|
|
$totp->setLabel($portalName . ' - '. $user->getEmail()); |
|
116
|
|
|
$qrCodeResult = Builder::create() |
|
117
|
|
|
->writer(new PngWriter()) |
|
118
|
|
|
->data($totp->getProvisioningUri()) |
|
119
|
|
|
->encoding(new Encoding('UTF-8')) |
|
120
|
|
|
->errorCorrectionLevel(new ErrorCorrectionLevelHigh()) |
|
121
|
|
|
->size(300) |
|
122
|
|
|
->margin(10) |
|
123
|
|
|
->build() |
|
124
|
|
|
; |
|
125
|
|
|
|
|
126
|
|
|
$qrCodeBase64 = base64_encode($qrCodeResult->getString()); |
|
127
|
|
|
$showQRCode = true; |
|
128
|
|
|
} |
|
129
|
|
|
|
|
130
|
|
|
if ($form->isSubmitted() && $form->isValid()) { |
|
131
|
|
|
$submittedToken = $request->request->get('_token'); |
|
132
|
|
|
|
|
133
|
|
|
if (!$csrfTokenManager->isTokenValid(new CsrfToken('change_password', $submittedToken))) { |
|
134
|
|
|
$form->addError(new FormError($this->translator->trans('CSRF token is invalid. Please try again.'))); |
|
135
|
|
|
} else { |
|
136
|
|
|
$currentPassword = $form->get('currentPassword')->getData(); |
|
137
|
|
|
$newPassword = $form->get('newPassword')->getData(); |
|
138
|
|
|
$confirmPassword = $form->get('confirmPassword')->getData(); |
|
139
|
|
|
$enable2FA = $form->get('enable2FA')->getData(); |
|
140
|
|
|
|
|
141
|
|
|
if ($user->getMfaEnabled()) { |
|
142
|
|
|
$enteredCode = $form->get('confirm2FACode')->getData(); |
|
143
|
|
|
if (empty($enteredCode) || !$this->isTOTPValid($user, $enteredCode)) { |
|
144
|
|
|
$form->get('confirm2FACode')->addError(new FormError('The 2FA code is invalid.')); |
|
145
|
|
|
return $this->render('@ChamiloCore/Account/change_password.html.twig', [ |
|
146
|
|
|
'form' => $form->createView(), |
|
147
|
|
|
'qrCode' => $qrCodeBase64, |
|
148
|
|
|
'user' => $user, |
|
149
|
|
|
'showQRCode' => $qrCodeBase64 !== null || ($form->isSubmitted() && $form->get('enable2FA')->getData()), |
|
150
|
|
|
]); |
|
151
|
|
|
} |
|
152
|
|
|
} |
|
153
|
|
|
|
|
154
|
|
|
if ($enable2FA && !$user->getMfaSecret()) { |
|
155
|
|
|
$session = $request->getSession(); |
|
156
|
|
|
|
|
157
|
|
|
if (!$session->has('temporary_mfa_secret')) { |
|
158
|
|
|
$totp = TOTP::create(); |
|
159
|
|
|
$secret = $totp->getSecret(); |
|
160
|
|
|
$session->set('temporary_mfa_secret', $secret); |
|
161
|
|
|
} else { |
|
162
|
|
|
$secret = $session->get('temporary_mfa_secret'); |
|
163
|
|
|
$totp = TOTP::create($secret); |
|
164
|
|
|
} |
|
165
|
|
|
|
|
166
|
|
|
$portalName = $settingsManager->getSetting('platform.institution'); |
|
167
|
|
|
$totp->setLabel($portalName . ' - '. $user->getEmail()); |
|
168
|
|
|
|
|
169
|
|
|
$qrCodeResult = Builder::create() |
|
170
|
|
|
->writer(new PngWriter()) |
|
171
|
|
|
->data($totp->getProvisioningUri()) |
|
172
|
|
|
->encoding(new Encoding('UTF-8')) |
|
173
|
|
|
->errorCorrectionLevel(new ErrorCorrectionLevelHigh()) |
|
174
|
|
|
->size(300) |
|
175
|
|
|
->margin(10) |
|
176
|
|
|
->build() |
|
177
|
|
|
; |
|
178
|
|
|
|
|
179
|
|
|
$qrCodeBase64 = base64_encode($qrCodeResult->getString()); |
|
180
|
|
|
$enteredCode = $form->get('confirm2FACode')->getData(); |
|
181
|
|
|
|
|
182
|
|
|
if (!$enteredCode) { |
|
183
|
|
|
return $this->render('@ChamiloCore/Account/change_password.html.twig', [ |
|
184
|
|
|
'form' => $form->createView(), |
|
185
|
|
|
'qrCode' => $qrCodeBase64, |
|
186
|
|
|
'user' => $user, |
|
187
|
|
|
'showQRCode' => true, |
|
188
|
|
|
]); |
|
189
|
|
|
} |
|
190
|
|
|
|
|
191
|
|
|
if (!$totp->verify($enteredCode)) { |
|
192
|
|
|
$form->get('confirm2FACode')->addError(new FormError('The code is incorrect.')); |
|
193
|
|
|
return $this->render('@ChamiloCore/Account/change_password.html.twig', [ |
|
194
|
|
|
'form' => $form->createView(), |
|
195
|
|
|
'qrCode' => $qrCodeBase64, |
|
196
|
|
|
'user' => $user, |
|
197
|
|
|
'showQRCode' => true, |
|
198
|
|
|
]); |
|
199
|
|
|
} |
|
200
|
|
|
|
|
201
|
|
|
$encryptedSecret = $this->encryptTOTPSecret($secret, $_ENV['APP_SECRET']); |
|
202
|
|
|
$user->setMfaSecret($encryptedSecret); |
|
203
|
|
|
$user->setMfaEnabled(true); |
|
204
|
|
|
$user->setMfaService('TOTP'); |
|
205
|
|
|
$userRepository->updateUser($user); |
|
206
|
|
|
$session->remove('temporary_mfa_secret'); |
|
207
|
|
|
$this->addFlash('success', '2FA activated successfully.'); |
|
208
|
|
|
|
|
209
|
|
|
return $this->redirectToRoute('chamilo_core_account_home'); |
|
210
|
|
|
} |
|
211
|
|
|
if (!$enable2FA) { |
|
212
|
|
|
$user->setMfaEnabled(false); |
|
213
|
|
|
$user->setMfaSecret(null); |
|
214
|
|
|
$userRepository->updateUser($user); |
|
215
|
|
|
$this->addFlash('success', '2FA disabled successfully.'); |
|
216
|
|
|
} |
|
217
|
|
|
|
|
218
|
|
|
if ($newPassword || $confirmPassword || $currentPassword) { |
|
219
|
|
|
if (!$userRepository->isPasswordValid($user, $currentPassword)) { |
|
220
|
|
|
$form->get('currentPassword')->addError(new FormError($this->translator->trans('The current password is incorrect'))); |
|
221
|
|
|
} elseif ($newPassword !== $confirmPassword) { |
|
222
|
|
|
$form->get('confirmPassword')->addError(new FormError($this->translator->trans('Passwords do not match'))); |
|
223
|
|
|
} else { |
|
224
|
|
|
$user->setPlainPassword($newPassword); |
|
225
|
|
|
$userRepository->updateUser($user); |
|
226
|
|
|
$this->addFlash('success', 'Password updated successfully'); |
|
227
|
|
|
} |
|
228
|
|
|
} |
|
229
|
|
|
|
|
230
|
|
|
return $this->redirectToRoute('chamilo_core_account_home'); |
|
231
|
|
|
} |
|
232
|
|
|
} |
|
233
|
|
|
|
|
234
|
|
|
return $this->render('@ChamiloCore/Account/change_password.html.twig', [ |
|
235
|
|
|
'form' => $form->createView(), |
|
236
|
|
|
'qrCode' => $qrCodeBase64, |
|
237
|
|
|
'user' => $user, |
|
238
|
|
|
'showQRCode' => $qrCodeBase64 !== null || ($form->isSubmitted() && $form->get('enable2FA')->getData()), |
|
239
|
|
|
]); |
|
240
|
|
|
} |
|
241
|
|
|
|
|
242
|
|
|
/** |
|
243
|
|
|
* Encrypts the TOTP secret using AES-256-CBC encryption. |
|
244
|
|
|
*/ |
|
245
|
|
|
private function encryptTOTPSecret(string $secret, string $encryptionKey): string |
|
246
|
|
|
{ |
|
247
|
|
|
$cipherMethod = 'aes-256-cbc'; |
|
248
|
|
|
$iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length($cipherMethod)); |
|
249
|
|
|
$encryptedSecret = openssl_encrypt($secret, $cipherMethod, $encryptionKey, 0, $iv); |
|
250
|
|
|
|
|
251
|
|
|
return base64_encode($iv.'::'.$encryptedSecret); |
|
252
|
|
|
} |
|
253
|
|
|
|
|
254
|
|
|
/** |
|
255
|
|
|
* Validates the provided TOTP code for the given user. |
|
256
|
|
|
*/ |
|
257
|
|
|
private function isTOTPValid(User $user, string $totpCode): bool |
|
258
|
|
|
{ |
|
259
|
|
|
$decryptedSecret = $this->decryptTOTPSecret($user->getMfaSecret(), $_ENV['APP_SECRET']); |
|
260
|
|
|
$totp = TOTP::create($decryptedSecret); |
|
261
|
|
|
|
|
262
|
|
|
return $totp->verify($totpCode); |
|
263
|
|
|
} |
|
264
|
|
|
|
|
265
|
|
|
/** |
|
266
|
|
|
* Decrypts the TOTP secret using AES-256-CBC decryption. |
|
267
|
|
|
*/ |
|
268
|
|
|
private function decryptTOTPSecret(string $encryptedSecret, string $encryptionKey): string |
|
269
|
|
|
{ |
|
270
|
|
|
$cipherMethod = 'aes-256-cbc'; |
|
271
|
|
|
list($iv, $encryptedData) = explode('::', base64_decode($encryptedSecret), 2); |
|
272
|
|
|
|
|
273
|
|
|
return openssl_decrypt($encryptedData, $cipherMethod, $encryptionKey, 0, $iv); |
|
274
|
|
|
} |
|
275
|
|
|
|
|
276
|
|
|
/** |
|
277
|
|
|
* Validate the password against the same requirements as the client-side validation. |
|
278
|
|
|
*/ |
|
279
|
|
|
private function validatePassword(string $password): array |
|
|
|
|
|
|
280
|
|
|
{ |
|
281
|
|
|
$errors = []; |
|
282
|
|
|
$minRequirements = Security::getPasswordRequirements()['min']; |
|
283
|
|
|
|
|
284
|
|
|
if (\strlen($password) < $minRequirements['length']) { |
|
285
|
|
|
$errors[] = $this->translator->trans('Password must be at least %length% characters long.', ['%length%' => $minRequirements['length']]); |
|
286
|
|
|
} |
|
287
|
|
|
if ($minRequirements['lowercase'] > 0 && !preg_match('/[a-z]/', $password)) { |
|
288
|
|
|
$errors[] = $this->translator->trans('Password must contain at least %count% lowercase characters.', ['%count%' => $minRequirements['lowercase']]); |
|
289
|
|
|
} |
|
290
|
|
|
if ($minRequirements['uppercase'] > 0 && !preg_match('/[A-Z]/', $password)) { |
|
291
|
|
|
$errors[] = $this->translator->trans('Password must contain at least %count% uppercase characters.', ['%count%' => $minRequirements['uppercase']]); |
|
292
|
|
|
} |
|
293
|
|
|
if ($minRequirements['numeric'] > 0 && !preg_match('/[0-9]/', $password)) { |
|
294
|
|
|
$errors[] = $this->translator->trans('Password must contain at least %count% numerical (0-9) characters.', ['%count%' => $minRequirements['numeric']]); |
|
295
|
|
|
} |
|
296
|
|
|
if ($minRequirements['specials'] > 0 && !preg_match('/[\W]/', $password)) { |
|
297
|
|
|
$errors[] = $this->translator->trans('Password must contain at least %count% special characters.', ['%count%' => $minRequirements['specials']]); |
|
298
|
|
|
} |
|
299
|
|
|
|
|
300
|
|
|
return $errors; |
|
301
|
|
|
} |
|
302
|
|
|
} |
|
303
|
|
|
|
This check looks for private methods that have been defined, but are not used inside the class.