Passed
Push — master ( afa51d...34d500 )
by John
14:15
created
core/Controller/LoginController.php 1 patch
Indentation   +374 added lines, -374 removed lines patch added patch discarded remove patch
@@ -59,378 +59,378 @@
 block discarded – undo
59 59
 
60 60
 class LoginController extends Controller {
61 61
 
62
-	const LOGIN_MSG_INVALIDPASSWORD = 'invalidpassword';
63
-	const LOGIN_MSG_USERDISABLED = 'userdisabled';
64
-
65
-	/** @var IUserManager */
66
-	private $userManager;
67
-	/** @var IConfig */
68
-	private $config;
69
-	/** @var ISession */
70
-	private $session;
71
-	/** @var IUserSession|Session */
72
-	private $userSession;
73
-	/** @var IURLGenerator */
74
-	private $urlGenerator;
75
-	/** @var ILogger */
76
-	private $logger;
77
-	/** @var Manager */
78
-	private $twoFactorManager;
79
-	/** @var Defaults */
80
-	private $defaults;
81
-	/** @var Throttler */
82
-	private $throttler;
83
-
84
-	/**
85
-	 * @param string $appName
86
-	 * @param IRequest $request
87
-	 * @param IUserManager $userManager
88
-	 * @param IConfig $config
89
-	 * @param ISession $session
90
-	 * @param IUserSession $userSession
91
-	 * @param IURLGenerator $urlGenerator
92
-	 * @param ILogger $logger
93
-	 * @param Manager $twoFactorManager
94
-	 * @param Defaults $defaults
95
-	 * @param Throttler $throttler
96
-	 */
97
-	public function __construct($appName,
98
-								IRequest $request,
99
-								IUserManager $userManager,
100
-								IConfig $config,
101
-								ISession $session,
102
-								IUserSession $userSession,
103
-								IURLGenerator $urlGenerator,
104
-								ILogger $logger,
105
-								Manager $twoFactorManager,
106
-								Defaults $defaults,
107
-								Throttler $throttler) {
108
-		parent::__construct($appName, $request);
109
-		$this->userManager = $userManager;
110
-		$this->config = $config;
111
-		$this->session = $session;
112
-		$this->userSession = $userSession;
113
-		$this->urlGenerator = $urlGenerator;
114
-		$this->logger = $logger;
115
-		$this->twoFactorManager = $twoFactorManager;
116
-		$this->defaults = $defaults;
117
-		$this->throttler = $throttler;
118
-	}
119
-
120
-	/**
121
-	 * @NoAdminRequired
122
-	 * @UseSession
123
-	 *
124
-	 * @return RedirectResponse
125
-	 */
126
-	public function logout() {
127
-		$loginToken = $this->request->getCookie('nc_token');
128
-		if (!is_null($loginToken)) {
129
-			$this->config->deleteUserValue($this->userSession->getUser()->getUID(), 'login_token', $loginToken);
130
-		}
131
-		$this->userSession->logout();
132
-
133
-		$response = new RedirectResponse($this->urlGenerator->linkToRouteAbsolute(
134
-			'core.login.showLoginForm',
135
-			['clear' => true] // this param the the code in login.js may be removed when the "Clear-Site-Data" is working in the browsers
136
-		));
137
-		$response->addHeader('Clear-Site-Data', '"cache", "storage", "executionContexts"');
138
-		return $response;
139
-	}
140
-
141
-	/**
142
-	 * @PublicPage
143
-	 * @NoCSRFRequired
144
-	 * @UseSession
145
-	 *
146
-	 * @param string $user
147
-	 * @param string $redirect_url
148
-	 *
149
-	 * @return TemplateResponse|RedirectResponse
150
-	 */
151
-	public function showLoginForm(string $user = null, string $redirect_url = null): Http\Response {
152
-
153
-		if ($this->userSession->isLoggedIn()) {
154
-			return new RedirectResponse(OC_Util::getDefaultPageUrl());
155
-		}
156
-
157
-		$parameters = array();
158
-		$loginMessages = $this->session->get('loginMessages');
159
-		$errors = [];
160
-		$messages = [];
161
-		if (is_array($loginMessages)) {
162
-			list($errors, $messages) = $loginMessages;
163
-		}
164
-		$this->session->remove('loginMessages');
165
-		foreach ($errors as $value) {
166
-			$parameters[$value] = true;
167
-		}
168
-
169
-		$parameters['messages'] = $messages;
170
-		if ($user !== null && $user !== '') {
171
-			$parameters['loginName'] = $user;
172
-			$parameters['user_autofocus'] = false;
173
-		} else {
174
-			$parameters['loginName'] = '';
175
-			$parameters['user_autofocus'] = true;
176
-		}
177
-
178
-		$autocomplete = $this->config->getSystemValue('login_form_autocomplete', true);
179
-		if ($autocomplete){
180
-			$parameters['login_form_autocomplete'] = 'on';
181
-		} else {
182
-			$parameters['login_form_autocomplete'] = 'off';
183
-		}
184
-
185
-		if (!empty($redirect_url)) {
186
-			$parameters['redirect_url'] = $redirect_url;
187
-		}
188
-
189
-		$parameters = $this->setPasswordResetParameters($user, $parameters);
190
-		$parameters['alt_login'] = OC_App::getAlternativeLogIns();
191
-
192
-		if ($user !== null && $user !== '') {
193
-			$parameters['loginName'] = $user;
194
-			$parameters['user_autofocus'] = false;
195
-		} else {
196
-			$parameters['loginName'] = '';
197
-			$parameters['user_autofocus'] = true;
198
-		}
199
-
200
-		$parameters['throttle_delay'] = $this->throttler->getDelay($this->request->getRemoteAddress());
201
-
202
-		// OpenGraph Support: http://ogp.me/
203
-		Util::addHeader('meta', ['property' => 'og:title', 'content' => Util::sanitizeHTML($this->defaults->getName())]);
204
-		Util::addHeader('meta', ['property' => 'og:description', 'content' => Util::sanitizeHTML($this->defaults->getSlogan())]);
205
-		Util::addHeader('meta', ['property' => 'og:site_name', 'content' => Util::sanitizeHTML($this->defaults->getName())]);
206
-		Util::addHeader('meta', ['property' => 'og:url', 'content' => $this->urlGenerator->getAbsoluteURL('/')]);
207
-		Util::addHeader('meta', ['property' => 'og:type', 'content' => 'website']);
208
-		Util::addHeader('meta', ['property' => 'og:image', 'content' => $this->urlGenerator->getAbsoluteURL($this->urlGenerator->imagePath('core', 'favicon-touch.png'))]);
209
-
210
-		return new TemplateResponse(
211
-			$this->appName, 'login', $parameters, 'guest'
212
-		);
213
-	}
214
-
215
-	/**
216
-	 * Sets the password reset params.
217
-	 *
218
-	 * Users may not change their passwords if:
219
-	 * - The account is disabled
220
-	 * - The backend doesn't support password resets
221
-	 * - The password reset function is disabled
222
-	 *
223
-	 * @param string $user
224
-	 * @param array $parameters
225
-	 * @return array
226
-	 */
227
-	private function setPasswordResetParameters(
228
-		string $user = null, array $parameters): array {
229
-		if ($user !== null && $user !== '') {
230
-			$userObj = $this->userManager->get($user);
231
-		} else {
232
-			$userObj = null;
233
-		}
234
-
235
-		$parameters['resetPasswordLink'] = $this->config
236
-			->getSystemValue('lost_password_link', '');
237
-
238
-		if ($parameters['resetPasswordLink'] === 'disabled') {
239
-			$parameters['canResetPassword'] = false;
240
-		} else if (!$parameters['resetPasswordLink'] && $userObj !== null) {
241
-			$parameters['canResetPassword'] = $userObj->canChangePassword();
242
-		} else if ($userObj !== null && $userObj->isEnabled() === false) {
243
-			$parameters['canResetPassword'] = false;
244
-		} else {
245
-			$parameters['canResetPassword'] = true;
246
-		}
247
-
248
-		return $parameters;
249
-	}
250
-
251
-	/**
252
-	 * @param string $redirectUrl
253
-	 * @return RedirectResponse
254
-	 */
255
-	private function generateRedirect($redirectUrl) {
256
-		if (!is_null($redirectUrl) && $this->userSession->isLoggedIn()) {
257
-			$location = $this->urlGenerator->getAbsoluteURL(urldecode($redirectUrl));
258
-			// Deny the redirect if the URL contains a @
259
-			// This prevents unvalidated redirects like ?redirect_url=:[email protected]
260
-			if (strpos($location, '@') === false) {
261
-				return new RedirectResponse($location);
262
-			}
263
-		}
264
-		return new RedirectResponse(OC_Util::getDefaultPageUrl());
265
-	}
266
-
267
-	/**
268
-	 * @PublicPage
269
-	 * @UseSession
270
-	 * @NoCSRFRequired
271
-	 * @BruteForceProtection(action=login)
272
-	 *
273
-	 * @param string $user
274
-	 * @param string $password
275
-	 * @param string $redirect_url
276
-	 * @param boolean $remember_login
277
-	 * @param string $timezone
278
-	 * @param string $timezone_offset
279
-	 * @return RedirectResponse
280
-	 */
281
-	public function tryLogin($user, $password, $redirect_url, $remember_login = true, $timezone = '', $timezone_offset = '') {
282
-		if(!is_string($user)) {
283
-			throw new \InvalidArgumentException('Username must be string');
284
-		}
285
-
286
-		// If the user is already logged in and the CSRF check does not pass then
287
-		// simply redirect the user to the correct page as required. This is the
288
-		// case when an user has already logged-in, in another tab.
289
-		if(!$this->request->passesCSRFCheck()) {
290
-			return $this->generateRedirect($redirect_url);
291
-		}
292
-
293
-		if ($this->userManager instanceof PublicEmitter) {
294
-			$this->userManager->emit('\OC\User', 'preLogin', array($user, $password));
295
-		}
296
-
297
-		$originalUser = $user;
298
-
299
-		$userObj = $this->userManager->get($user);
300
-
301
-		if ($userObj !== null && $userObj->isEnabled() === false) {
302
-			$this->logger->warning('Login failed: \''. $user . '\' disabled' .
303
-				' (Remote IP: \''. $this->request->getRemoteAddress(). '\')',
304
-				['app' => 'core']);
305
-			return $this->createLoginFailedResponse($user, $originalUser,
306
-				$redirect_url, self::LOGIN_MSG_USERDISABLED);
307
-		}
308
-
309
-		// TODO: Add all the insane error handling
310
-		/* @var $loginResult IUser */
311
-		$loginResult = $this->userManager->checkPasswordNoLogging($user, $password);
312
-		if ($loginResult === false) {
313
-			$users = $this->userManager->getByEmail($user);
314
-			// we only allow login by email if unique
315
-			if (count($users) === 1) {
316
-				$previousUser = $user;
317
-				$user = $users[0]->getUID();
318
-				if($user !== $previousUser) {
319
-					$loginResult = $this->userManager->checkPassword($user, $password);
320
-				}
321
-			}
322
-		}
323
-
324
-		if ($loginResult === false) {
325
-			$this->logger->warning('Login failed: \''. $user .
326
-				'\' (Remote IP: \''. $this->request->getRemoteAddress(). '\')',
327
-				['app' => 'core']);
328
-			return $this->createLoginFailedResponse($user, $originalUser,
329
-				$redirect_url, self::LOGIN_MSG_INVALIDPASSWORD);
330
-		}
331
-
332
-		// TODO: remove password checks from above and let the user session handle failures
333
-		// requires https://github.com/owncloud/core/pull/24616
334
-		$this->userSession->completeLogin($loginResult, ['loginName' => $user, 'password' => $password]);
335
-
336
-		$tokenType = IToken::REMEMBER;
337
-		if ((int)$this->config->getSystemValue('remember_login_cookie_lifetime', 60*60*24*15) === 0) {
338
-			$remember_login = false;
339
-			$tokenType = IToken::DO_NOT_REMEMBER;
340
-		}
341
-
342
-		$this->userSession->createSessionToken($this->request, $loginResult->getUID(), $user, $password, $tokenType);
343
-		$this->userSession->updateTokens($loginResult->getUID(), $password);
344
-
345
-		// User has successfully logged in, now remove the password reset link, when it is available
346
-		$this->config->deleteUserValue($loginResult->getUID(), 'core', 'lostpassword');
347
-
348
-		$this->session->set('last-password-confirm', $loginResult->getLastLogin());
349
-
350
-		if ($timezone_offset !== '') {
351
-			$this->config->setUserValue($loginResult->getUID(), 'core', 'timezone', $timezone);
352
-			$this->session->set('timezone', $timezone_offset);
353
-		}
354
-
355
-		if ($this->twoFactorManager->isTwoFactorAuthenticated($loginResult)) {
356
-			$this->twoFactorManager->prepareTwoFactorLogin($loginResult, $remember_login);
357
-
358
-			$providers = $this->twoFactorManager->getProviderSet($loginResult)->getPrimaryProviders();
359
-			if (count($providers) === 1) {
360
-				// Single provider, hence we can redirect to that provider's challenge page directly
361
-				/* @var $provider IProvider */
362
-				$provider = array_pop($providers);
363
-				$url = 'core.TwoFactorChallenge.showChallenge';
364
-				$urlParams = [
365
-					'challengeProviderId' => $provider->getId(),
366
-				];
367
-			} else {
368
-				$url = 'core.TwoFactorChallenge.selectChallenge';
369
-				$urlParams = [];
370
-			}
371
-
372
-			if (!is_null($redirect_url)) {
373
-				$urlParams['redirect_url'] = $redirect_url;
374
-			}
375
-
376
-			return new RedirectResponse($this->urlGenerator->linkToRoute($url, $urlParams));
377
-		}
378
-
379
-		if ($remember_login) {
380
-			$this->userSession->createRememberMeToken($loginResult);
381
-		}
382
-
383
-		return $this->generateRedirect($redirect_url);
384
-	}
385
-
386
-	/**
387
-	 * Creates a login failed response.
388
-	 *
389
-	 * @param string $user
390
-	 * @param string $originalUser
391
-	 * @param string $redirect_url
392
-	 * @param string $loginMessage
393
-	 * @return RedirectResponse
394
-	 */
395
-	private function createLoginFailedResponse(
396
-		$user, $originalUser, $redirect_url, string $loginMessage) {
397
-		// Read current user and append if possible we need to
398
-		// return the unmodified user otherwise we will leak the login name
399
-		$args = !is_null($user) ? ['user' => $originalUser] : [];
400
-		if (!is_null($redirect_url)) {
401
-			$args['redirect_url'] = $redirect_url;
402
-		}
403
-		$response = new RedirectResponse(
404
-			$this->urlGenerator->linkToRoute('core.login.showLoginForm', $args)
405
-		);
406
-		$response->throttle(['user' => substr($user, 0, 64)]);
407
-		$this->session->set('loginMessages', [
408
-			[$loginMessage], []
409
-		]);
410
-		return $response;
411
-	}
412
-
413
-	/**
414
-	 * @NoAdminRequired
415
-	 * @UseSession
416
-	 * @BruteForceProtection(action=sudo)
417
-	 *
418
-	 * @license GNU AGPL version 3 or any later version
419
-	 *
420
-	 * @param string $password
421
-	 * @return DataResponse
422
-	 */
423
-	public function confirmPassword($password) {
424
-		$loginName = $this->userSession->getLoginName();
425
-		$loginResult = $this->userManager->checkPassword($loginName, $password);
426
-		if ($loginResult === false) {
427
-			$response = new DataResponse([], Http::STATUS_FORBIDDEN);
428
-			$response->throttle();
429
-			return $response;
430
-		}
431
-
432
-		$confirmTimestamp = time();
433
-		$this->session->set('last-password-confirm', $confirmTimestamp);
434
-		return new DataResponse(['lastLogin' => $confirmTimestamp], Http::STATUS_OK);
435
-	}
62
+    const LOGIN_MSG_INVALIDPASSWORD = 'invalidpassword';
63
+    const LOGIN_MSG_USERDISABLED = 'userdisabled';
64
+
65
+    /** @var IUserManager */
66
+    private $userManager;
67
+    /** @var IConfig */
68
+    private $config;
69
+    /** @var ISession */
70
+    private $session;
71
+    /** @var IUserSession|Session */
72
+    private $userSession;
73
+    /** @var IURLGenerator */
74
+    private $urlGenerator;
75
+    /** @var ILogger */
76
+    private $logger;
77
+    /** @var Manager */
78
+    private $twoFactorManager;
79
+    /** @var Defaults */
80
+    private $defaults;
81
+    /** @var Throttler */
82
+    private $throttler;
83
+
84
+    /**
85
+     * @param string $appName
86
+     * @param IRequest $request
87
+     * @param IUserManager $userManager
88
+     * @param IConfig $config
89
+     * @param ISession $session
90
+     * @param IUserSession $userSession
91
+     * @param IURLGenerator $urlGenerator
92
+     * @param ILogger $logger
93
+     * @param Manager $twoFactorManager
94
+     * @param Defaults $defaults
95
+     * @param Throttler $throttler
96
+     */
97
+    public function __construct($appName,
98
+                                IRequest $request,
99
+                                IUserManager $userManager,
100
+                                IConfig $config,
101
+                                ISession $session,
102
+                                IUserSession $userSession,
103
+                                IURLGenerator $urlGenerator,
104
+                                ILogger $logger,
105
+                                Manager $twoFactorManager,
106
+                                Defaults $defaults,
107
+                                Throttler $throttler) {
108
+        parent::__construct($appName, $request);
109
+        $this->userManager = $userManager;
110
+        $this->config = $config;
111
+        $this->session = $session;
112
+        $this->userSession = $userSession;
113
+        $this->urlGenerator = $urlGenerator;
114
+        $this->logger = $logger;
115
+        $this->twoFactorManager = $twoFactorManager;
116
+        $this->defaults = $defaults;
117
+        $this->throttler = $throttler;
118
+    }
119
+
120
+    /**
121
+     * @NoAdminRequired
122
+     * @UseSession
123
+     *
124
+     * @return RedirectResponse
125
+     */
126
+    public function logout() {
127
+        $loginToken = $this->request->getCookie('nc_token');
128
+        if (!is_null($loginToken)) {
129
+            $this->config->deleteUserValue($this->userSession->getUser()->getUID(), 'login_token', $loginToken);
130
+        }
131
+        $this->userSession->logout();
132
+
133
+        $response = new RedirectResponse($this->urlGenerator->linkToRouteAbsolute(
134
+            'core.login.showLoginForm',
135
+            ['clear' => true] // this param the the code in login.js may be removed when the "Clear-Site-Data" is working in the browsers
136
+        ));
137
+        $response->addHeader('Clear-Site-Data', '"cache", "storage", "executionContexts"');
138
+        return $response;
139
+    }
140
+
141
+    /**
142
+     * @PublicPage
143
+     * @NoCSRFRequired
144
+     * @UseSession
145
+     *
146
+     * @param string $user
147
+     * @param string $redirect_url
148
+     *
149
+     * @return TemplateResponse|RedirectResponse
150
+     */
151
+    public function showLoginForm(string $user = null, string $redirect_url = null): Http\Response {
152
+
153
+        if ($this->userSession->isLoggedIn()) {
154
+            return new RedirectResponse(OC_Util::getDefaultPageUrl());
155
+        }
156
+
157
+        $parameters = array();
158
+        $loginMessages = $this->session->get('loginMessages');
159
+        $errors = [];
160
+        $messages = [];
161
+        if (is_array($loginMessages)) {
162
+            list($errors, $messages) = $loginMessages;
163
+        }
164
+        $this->session->remove('loginMessages');
165
+        foreach ($errors as $value) {
166
+            $parameters[$value] = true;
167
+        }
168
+
169
+        $parameters['messages'] = $messages;
170
+        if ($user !== null && $user !== '') {
171
+            $parameters['loginName'] = $user;
172
+            $parameters['user_autofocus'] = false;
173
+        } else {
174
+            $parameters['loginName'] = '';
175
+            $parameters['user_autofocus'] = true;
176
+        }
177
+
178
+        $autocomplete = $this->config->getSystemValue('login_form_autocomplete', true);
179
+        if ($autocomplete){
180
+            $parameters['login_form_autocomplete'] = 'on';
181
+        } else {
182
+            $parameters['login_form_autocomplete'] = 'off';
183
+        }
184
+
185
+        if (!empty($redirect_url)) {
186
+            $parameters['redirect_url'] = $redirect_url;
187
+        }
188
+
189
+        $parameters = $this->setPasswordResetParameters($user, $parameters);
190
+        $parameters['alt_login'] = OC_App::getAlternativeLogIns();
191
+
192
+        if ($user !== null && $user !== '') {
193
+            $parameters['loginName'] = $user;
194
+            $parameters['user_autofocus'] = false;
195
+        } else {
196
+            $parameters['loginName'] = '';
197
+            $parameters['user_autofocus'] = true;
198
+        }
199
+
200
+        $parameters['throttle_delay'] = $this->throttler->getDelay($this->request->getRemoteAddress());
201
+
202
+        // OpenGraph Support: http://ogp.me/
203
+        Util::addHeader('meta', ['property' => 'og:title', 'content' => Util::sanitizeHTML($this->defaults->getName())]);
204
+        Util::addHeader('meta', ['property' => 'og:description', 'content' => Util::sanitizeHTML($this->defaults->getSlogan())]);
205
+        Util::addHeader('meta', ['property' => 'og:site_name', 'content' => Util::sanitizeHTML($this->defaults->getName())]);
206
+        Util::addHeader('meta', ['property' => 'og:url', 'content' => $this->urlGenerator->getAbsoluteURL('/')]);
207
+        Util::addHeader('meta', ['property' => 'og:type', 'content' => 'website']);
208
+        Util::addHeader('meta', ['property' => 'og:image', 'content' => $this->urlGenerator->getAbsoluteURL($this->urlGenerator->imagePath('core', 'favicon-touch.png'))]);
209
+
210
+        return new TemplateResponse(
211
+            $this->appName, 'login', $parameters, 'guest'
212
+        );
213
+    }
214
+
215
+    /**
216
+     * Sets the password reset params.
217
+     *
218
+     * Users may not change their passwords if:
219
+     * - The account is disabled
220
+     * - The backend doesn't support password resets
221
+     * - The password reset function is disabled
222
+     *
223
+     * @param string $user
224
+     * @param array $parameters
225
+     * @return array
226
+     */
227
+    private function setPasswordResetParameters(
228
+        string $user = null, array $parameters): array {
229
+        if ($user !== null && $user !== '') {
230
+            $userObj = $this->userManager->get($user);
231
+        } else {
232
+            $userObj = null;
233
+        }
234
+
235
+        $parameters['resetPasswordLink'] = $this->config
236
+            ->getSystemValue('lost_password_link', '');
237
+
238
+        if ($parameters['resetPasswordLink'] === 'disabled') {
239
+            $parameters['canResetPassword'] = false;
240
+        } else if (!$parameters['resetPasswordLink'] && $userObj !== null) {
241
+            $parameters['canResetPassword'] = $userObj->canChangePassword();
242
+        } else if ($userObj !== null && $userObj->isEnabled() === false) {
243
+            $parameters['canResetPassword'] = false;
244
+        } else {
245
+            $parameters['canResetPassword'] = true;
246
+        }
247
+
248
+        return $parameters;
249
+    }
250
+
251
+    /**
252
+     * @param string $redirectUrl
253
+     * @return RedirectResponse
254
+     */
255
+    private function generateRedirect($redirectUrl) {
256
+        if (!is_null($redirectUrl) && $this->userSession->isLoggedIn()) {
257
+            $location = $this->urlGenerator->getAbsoluteURL(urldecode($redirectUrl));
258
+            // Deny the redirect if the URL contains a @
259
+            // This prevents unvalidated redirects like ?redirect_url=:[email protected]
260
+            if (strpos($location, '@') === false) {
261
+                return new RedirectResponse($location);
262
+            }
263
+        }
264
+        return new RedirectResponse(OC_Util::getDefaultPageUrl());
265
+    }
266
+
267
+    /**
268
+     * @PublicPage
269
+     * @UseSession
270
+     * @NoCSRFRequired
271
+     * @BruteForceProtection(action=login)
272
+     *
273
+     * @param string $user
274
+     * @param string $password
275
+     * @param string $redirect_url
276
+     * @param boolean $remember_login
277
+     * @param string $timezone
278
+     * @param string $timezone_offset
279
+     * @return RedirectResponse
280
+     */
281
+    public function tryLogin($user, $password, $redirect_url, $remember_login = true, $timezone = '', $timezone_offset = '') {
282
+        if(!is_string($user)) {
283
+            throw new \InvalidArgumentException('Username must be string');
284
+        }
285
+
286
+        // If the user is already logged in and the CSRF check does not pass then
287
+        // simply redirect the user to the correct page as required. This is the
288
+        // case when an user has already logged-in, in another tab.
289
+        if(!$this->request->passesCSRFCheck()) {
290
+            return $this->generateRedirect($redirect_url);
291
+        }
292
+
293
+        if ($this->userManager instanceof PublicEmitter) {
294
+            $this->userManager->emit('\OC\User', 'preLogin', array($user, $password));
295
+        }
296
+
297
+        $originalUser = $user;
298
+
299
+        $userObj = $this->userManager->get($user);
300
+
301
+        if ($userObj !== null && $userObj->isEnabled() === false) {
302
+            $this->logger->warning('Login failed: \''. $user . '\' disabled' .
303
+                ' (Remote IP: \''. $this->request->getRemoteAddress(). '\')',
304
+                ['app' => 'core']);
305
+            return $this->createLoginFailedResponse($user, $originalUser,
306
+                $redirect_url, self::LOGIN_MSG_USERDISABLED);
307
+        }
308
+
309
+        // TODO: Add all the insane error handling
310
+        /* @var $loginResult IUser */
311
+        $loginResult = $this->userManager->checkPasswordNoLogging($user, $password);
312
+        if ($loginResult === false) {
313
+            $users = $this->userManager->getByEmail($user);
314
+            // we only allow login by email if unique
315
+            if (count($users) === 1) {
316
+                $previousUser = $user;
317
+                $user = $users[0]->getUID();
318
+                if($user !== $previousUser) {
319
+                    $loginResult = $this->userManager->checkPassword($user, $password);
320
+                }
321
+            }
322
+        }
323
+
324
+        if ($loginResult === false) {
325
+            $this->logger->warning('Login failed: \''. $user .
326
+                '\' (Remote IP: \''. $this->request->getRemoteAddress(). '\')',
327
+                ['app' => 'core']);
328
+            return $this->createLoginFailedResponse($user, $originalUser,
329
+                $redirect_url, self::LOGIN_MSG_INVALIDPASSWORD);
330
+        }
331
+
332
+        // TODO: remove password checks from above and let the user session handle failures
333
+        // requires https://github.com/owncloud/core/pull/24616
334
+        $this->userSession->completeLogin($loginResult, ['loginName' => $user, 'password' => $password]);
335
+
336
+        $tokenType = IToken::REMEMBER;
337
+        if ((int)$this->config->getSystemValue('remember_login_cookie_lifetime', 60*60*24*15) === 0) {
338
+            $remember_login = false;
339
+            $tokenType = IToken::DO_NOT_REMEMBER;
340
+        }
341
+
342
+        $this->userSession->createSessionToken($this->request, $loginResult->getUID(), $user, $password, $tokenType);
343
+        $this->userSession->updateTokens($loginResult->getUID(), $password);
344
+
345
+        // User has successfully logged in, now remove the password reset link, when it is available
346
+        $this->config->deleteUserValue($loginResult->getUID(), 'core', 'lostpassword');
347
+
348
+        $this->session->set('last-password-confirm', $loginResult->getLastLogin());
349
+
350
+        if ($timezone_offset !== '') {
351
+            $this->config->setUserValue($loginResult->getUID(), 'core', 'timezone', $timezone);
352
+            $this->session->set('timezone', $timezone_offset);
353
+        }
354
+
355
+        if ($this->twoFactorManager->isTwoFactorAuthenticated($loginResult)) {
356
+            $this->twoFactorManager->prepareTwoFactorLogin($loginResult, $remember_login);
357
+
358
+            $providers = $this->twoFactorManager->getProviderSet($loginResult)->getPrimaryProviders();
359
+            if (count($providers) === 1) {
360
+                // Single provider, hence we can redirect to that provider's challenge page directly
361
+                /* @var $provider IProvider */
362
+                $provider = array_pop($providers);
363
+                $url = 'core.TwoFactorChallenge.showChallenge';
364
+                $urlParams = [
365
+                    'challengeProviderId' => $provider->getId(),
366
+                ];
367
+            } else {
368
+                $url = 'core.TwoFactorChallenge.selectChallenge';
369
+                $urlParams = [];
370
+            }
371
+
372
+            if (!is_null($redirect_url)) {
373
+                $urlParams['redirect_url'] = $redirect_url;
374
+            }
375
+
376
+            return new RedirectResponse($this->urlGenerator->linkToRoute($url, $urlParams));
377
+        }
378
+
379
+        if ($remember_login) {
380
+            $this->userSession->createRememberMeToken($loginResult);
381
+        }
382
+
383
+        return $this->generateRedirect($redirect_url);
384
+    }
385
+
386
+    /**
387
+     * Creates a login failed response.
388
+     *
389
+     * @param string $user
390
+     * @param string $originalUser
391
+     * @param string $redirect_url
392
+     * @param string $loginMessage
393
+     * @return RedirectResponse
394
+     */
395
+    private function createLoginFailedResponse(
396
+        $user, $originalUser, $redirect_url, string $loginMessage) {
397
+        // Read current user and append if possible we need to
398
+        // return the unmodified user otherwise we will leak the login name
399
+        $args = !is_null($user) ? ['user' => $originalUser] : [];
400
+        if (!is_null($redirect_url)) {
401
+            $args['redirect_url'] = $redirect_url;
402
+        }
403
+        $response = new RedirectResponse(
404
+            $this->urlGenerator->linkToRoute('core.login.showLoginForm', $args)
405
+        );
406
+        $response->throttle(['user' => substr($user, 0, 64)]);
407
+        $this->session->set('loginMessages', [
408
+            [$loginMessage], []
409
+        ]);
410
+        return $response;
411
+    }
412
+
413
+    /**
414
+     * @NoAdminRequired
415
+     * @UseSession
416
+     * @BruteForceProtection(action=sudo)
417
+     *
418
+     * @license GNU AGPL version 3 or any later version
419
+     *
420
+     * @param string $password
421
+     * @return DataResponse
422
+     */
423
+    public function confirmPassword($password) {
424
+        $loginName = $this->userSession->getLoginName();
425
+        $loginResult = $this->userManager->checkPassword($loginName, $password);
426
+        if ($loginResult === false) {
427
+            $response = new DataResponse([], Http::STATUS_FORBIDDEN);
428
+            $response->throttle();
429
+            return $response;
430
+        }
431
+
432
+        $confirmTimestamp = time();
433
+        $this->session->set('last-password-confirm', $confirmTimestamp);
434
+        return new DataResponse(['lastLogin' => $confirmTimestamp], Http::STATUS_OK);
435
+    }
436 436
 }
Please login to merge, or discard this patch.