|
1
|
|
|
<?php |
|
2
|
|
|
/** |
|
3
|
|
|
* sysPass |
|
4
|
|
|
* |
|
5
|
|
|
* @author nuxsmin |
|
6
|
|
|
* @link https://syspass.org |
|
7
|
|
|
* @copyright 2012-2019, Rubén Domínguez nuxsmin@$syspass.org |
|
8
|
|
|
* |
|
9
|
|
|
* This file is part of sysPass. |
|
10
|
|
|
* |
|
11
|
|
|
* sysPass is free software: you can redistribute it and/or modify |
|
12
|
|
|
* it under the terms of the GNU General Public License as published by |
|
13
|
|
|
* the Free Software Foundation, either version 3 of the License, or |
|
14
|
|
|
* (at your option) any later version. |
|
15
|
|
|
* |
|
16
|
|
|
* sysPass is distributed in the hope that it will be useful, |
|
17
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
18
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
19
|
|
|
* GNU General Public License for more details. |
|
20
|
|
|
* |
|
21
|
|
|
* You should have received a copy of the GNU General Public License |
|
22
|
|
|
* along with sysPass. If not, see <http://www.gnu.org/licenses/>. |
|
23
|
|
|
*/ |
|
24
|
|
|
|
|
25
|
|
|
namespace SP\Modules\Web\Controllers; |
|
26
|
|
|
|
|
27
|
|
|
use DI\DependencyException; |
|
28
|
|
|
use DI\NotFoundException; |
|
29
|
|
|
use Exception; |
|
30
|
|
|
use SP\Core\Acl\Acl; |
|
31
|
|
|
use SP\Core\Acl\UnauthorizedPageException; |
|
32
|
|
|
use SP\Core\Crypt\Hash; |
|
33
|
|
|
use SP\Core\Crypt\Session as CryptSession; |
|
34
|
|
|
use SP\Core\Events\Event; |
|
35
|
|
|
use SP\Core\Events\EventMessage; |
|
36
|
|
|
use SP\Core\Exceptions\SessionTimeout; |
|
37
|
|
|
use SP\Core\Exceptions\SPException; |
|
38
|
|
|
use SP\Http\JsonResponse; |
|
39
|
|
|
use SP\Modules\Web\Controllers\Traits\JsonTrait; |
|
40
|
|
|
use SP\Repositories\NoSuchItemException; |
|
41
|
|
|
use SP\Services\Config\ConfigService; |
|
42
|
|
|
use SP\Services\Crypt\MasterPassService; |
|
43
|
|
|
use SP\Services\Crypt\TemporaryMasterPassService; |
|
44
|
|
|
use SP\Services\Crypt\UpdateMasterPassRequest; |
|
45
|
|
|
use SP\Services\ServiceException; |
|
46
|
|
|
use SP\Services\Task\TaskFactory; |
|
47
|
|
|
|
|
48
|
|
|
/** |
|
49
|
|
|
* Class ConfigEncryptionController |
|
50
|
|
|
* |
|
51
|
|
|
* @package SP\Modules\Web\Controllers |
|
52
|
|
|
*/ |
|
53
|
|
|
final class ConfigEncryptionController extends SimpleControllerBase |
|
54
|
|
|
{ |
|
55
|
|
|
use JsonTrait; |
|
56
|
|
|
|
|
57
|
|
|
/** |
|
58
|
|
|
* @return bool |
|
59
|
|
|
* @throws DependencyException |
|
60
|
|
|
* @throws NotFoundException |
|
61
|
|
|
* @throws NoSuchItemException |
|
62
|
|
|
* @throws ServiceException |
|
63
|
|
|
* @throws SPException |
|
64
|
|
|
*/ |
|
65
|
|
|
public function saveAction() |
|
66
|
|
|
{ |
|
67
|
|
|
$this->checkSecurityToken($this->previousSk, $this->request); |
|
68
|
|
|
|
|
69
|
|
|
$mastePassService = $this->dic->get(MasterPassService::class); |
|
70
|
|
|
|
|
71
|
|
|
$currentMasterPass = $this->request->analyzeEncrypted('current_masterpass'); |
|
72
|
|
|
$newMasterPass = $this->request->analyzeEncrypted('new_masterpass'); |
|
73
|
|
|
$newMasterPassR = $this->request->analyzeEncrypted('new_masterpass_repeat'); |
|
74
|
|
|
$confirmPassChange = $this->request->analyzeBool('confirm_masterpass_change', false); |
|
75
|
|
|
$noAccountPassChange = $this->request->analyzeBool('no_account_change', false); |
|
76
|
|
|
$taskId = $this->request->analyzeString('taskId'); |
|
77
|
|
|
|
|
78
|
|
|
if (!$mastePassService->checkUserUpdateMPass($this->session->getUserData()->getLastUpdateMPass())) { |
|
79
|
|
|
return $this->returnJsonResponse( |
|
80
|
|
|
JsonResponse::JSON_SUCCESS_STICKY, |
|
81
|
|
|
__u('Master password updated'), |
|
82
|
|
|
[__u('Please, restart the session for update it')] |
|
83
|
|
|
); |
|
84
|
|
|
} |
|
85
|
|
|
|
|
86
|
|
|
if (empty($newMasterPass) || empty($currentMasterPass)) { |
|
87
|
|
|
return $this->returnJsonResponse( |
|
88
|
|
|
JsonResponse::JSON_ERROR, |
|
89
|
|
|
__u('Master password not entered') |
|
90
|
|
|
); |
|
91
|
|
|
} |
|
92
|
|
|
|
|
93
|
|
|
if ($confirmPassChange === false) { |
|
94
|
|
|
return $this->returnJsonResponse( |
|
95
|
|
|
JsonResponse::JSON_ERROR, |
|
96
|
|
|
__u('The password update must be confirmed') |
|
97
|
|
|
); |
|
98
|
|
|
} |
|
99
|
|
|
|
|
100
|
|
|
if ($newMasterPass === $currentMasterPass) { |
|
101
|
|
|
return $this->returnJsonResponse( |
|
102
|
|
|
JsonResponse::JSON_ERROR, |
|
103
|
|
|
__u('Passwords are the same') |
|
104
|
|
|
); |
|
105
|
|
|
} |
|
106
|
|
|
|
|
107
|
|
|
if ($newMasterPass !== $newMasterPassR) { |
|
108
|
|
|
return $this->returnJsonResponse( |
|
109
|
|
|
JsonResponse::JSON_ERROR, |
|
110
|
|
|
__u('Master passwords do not match') |
|
111
|
|
|
); |
|
112
|
|
|
} |
|
113
|
|
|
|
|
114
|
|
|
if (!$mastePassService->checkMasterPassword($currentMasterPass)) { |
|
115
|
|
|
return $this->returnJsonResponse( |
|
116
|
|
|
JsonResponse::JSON_ERROR, |
|
117
|
|
|
__u('The current master password does not match') |
|
118
|
|
|
); |
|
119
|
|
|
} |
|
120
|
|
|
|
|
121
|
|
|
if (!$this->config->getConfigData()->isMaintenance()) { |
|
122
|
|
|
return $this->returnJsonResponse( |
|
123
|
|
|
JsonResponse::JSON_WARNING, |
|
124
|
|
|
__u('Maintenance mode not enabled'), |
|
125
|
|
|
[__u('Please, enable it to avoid unwanted behavior from other sessions')] |
|
126
|
|
|
); |
|
127
|
|
|
} |
|
128
|
|
|
|
|
129
|
|
|
if ($this->config->getConfigData()->isDemoEnabled()) { |
|
130
|
|
|
return $this->returnJsonResponse( |
|
131
|
|
|
JsonResponse::JSON_WARNING, |
|
132
|
|
|
__u('Ey, this is a DEMO!!') |
|
133
|
|
|
); |
|
134
|
|
|
} |
|
135
|
|
|
|
|
136
|
|
|
$configService = $this->dic->get(ConfigService::class); |
|
137
|
|
|
|
|
138
|
|
|
if (!$noAccountPassChange) { |
|
139
|
|
|
try { |
|
140
|
|
|
$task = $taskId !== null ? TaskFactory::create(__FUNCTION__, $taskId) : null; |
|
141
|
|
|
|
|
142
|
|
|
$request = new UpdateMasterPassRequest( |
|
143
|
|
|
$currentMasterPass, |
|
144
|
|
|
$newMasterPass, |
|
145
|
|
|
$configService->getByParam(MasterPassService::PARAM_MASTER_PASS_HASH), |
|
146
|
|
|
$task |
|
147
|
|
|
); |
|
148
|
|
|
|
|
149
|
|
|
$this->eventDispatcher->notifyEvent('update.masterPassword.start', new Event($this)); |
|
150
|
|
|
|
|
151
|
|
|
$mastePassService->changeMasterPassword($request); |
|
152
|
|
|
|
|
153
|
|
|
$this->eventDispatcher->notifyEvent('update.masterPassword.end', new Event($this)); |
|
154
|
|
|
} catch (Exception $e) { |
|
155
|
|
|
processException($e); |
|
156
|
|
|
|
|
157
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
158
|
|
|
|
|
159
|
|
|
return $this->returnJsonResponseException($e); |
|
160
|
|
|
} finally { |
|
161
|
|
|
if (isset($task)) { |
|
162
|
|
|
TaskFactory::end($task); |
|
163
|
|
|
} |
|
164
|
|
|
} |
|
165
|
|
|
} else { |
|
166
|
|
|
try { |
|
167
|
|
|
$this->eventDispatcher->notifyEvent('update.masterPassword.hash', new Event($this)); |
|
168
|
|
|
|
|
169
|
|
|
$mastePassService->updateConfig(Hash::hashKey($newMasterPass)); |
|
170
|
|
|
} catch (Exception $e) { |
|
171
|
|
|
processException($e); |
|
172
|
|
|
|
|
173
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
174
|
|
|
|
|
175
|
|
|
return $this->returnJsonResponse(JsonResponse::JSON_ERROR, __u('Error while saving the Master Password\'s hash')); |
|
176
|
|
|
} |
|
177
|
|
|
} |
|
178
|
|
|
|
|
179
|
|
|
return $this->returnJsonResponse( |
|
180
|
|
|
JsonResponse::JSON_SUCCESS_STICKY, |
|
181
|
|
|
__u('Master password updated'), |
|
182
|
|
|
[__u('Please, restart the session for update it')] |
|
183
|
|
|
); |
|
184
|
|
|
} |
|
185
|
|
|
|
|
186
|
|
|
/** |
|
187
|
|
|
* Refresh master password hash |
|
188
|
|
|
*/ |
|
189
|
|
|
public function refreshAction() |
|
190
|
|
|
{ |
|
191
|
|
|
try { |
|
192
|
|
|
$this->checkSecurityToken($this->previousSk, $this->request); |
|
193
|
|
|
|
|
194
|
|
|
if ($this->config->getConfigData()->isDemoEnabled()) { |
|
195
|
|
|
return $this->returnJsonResponse(JsonResponse::JSON_WARNING, __u('Ey, this is a DEMO!!')); |
|
196
|
|
|
} |
|
197
|
|
|
|
|
198
|
|
|
$masterPassService = $this->dic->get(MasterPassService::class); |
|
199
|
|
|
$masterPassService->updateConfig(Hash::hashKey(CryptSession::getSessionKey($this->session))); |
|
200
|
|
|
|
|
201
|
|
|
$this->eventDispatcher->notifyEvent('refresh.masterPassword.hash', |
|
202
|
|
|
new Event($this, EventMessage::factory()->addDescription(__u('Master password hash updated')))); |
|
203
|
|
|
|
|
204
|
|
|
return $this->returnJsonResponse(JsonResponse::JSON_SUCCESS, __u('Master password hash updated')); |
|
205
|
|
|
} catch (Exception $e) { |
|
206
|
|
|
processException($e); |
|
207
|
|
|
|
|
208
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
209
|
|
|
|
|
210
|
|
|
|
|
211
|
|
|
return $this->returnJsonResponse(JsonResponse::JSON_ERROR, __u('Error while updating the master password hash')); |
|
212
|
|
|
} |
|
213
|
|
|
} |
|
214
|
|
|
|
|
215
|
|
|
/** |
|
216
|
|
|
* Create a temporary master pass |
|
217
|
|
|
*/ |
|
218
|
|
|
public function saveTempAction() |
|
219
|
|
|
{ |
|
220
|
|
|
try { |
|
221
|
|
|
$this->checkSecurityToken($this->previousSk, $this->request); |
|
222
|
|
|
|
|
223
|
|
|
$temporaryMasterPassService = $this->dic->get(TemporaryMasterPassService::class); |
|
224
|
|
|
$key = $temporaryMasterPassService->create($this->request->analyzeInt('temporary_masterpass_maxtime', 3600)); |
|
225
|
|
|
|
|
226
|
|
|
$groupId = $this->request->analyzeInt('temporary_masterpass_group', 0); |
|
227
|
|
|
$sendEmail = $this->configData->isMailEnabled() |
|
228
|
|
|
&& $this->request->analyzeBool('temporary_masterpass_email'); |
|
229
|
|
|
|
|
230
|
|
|
if ($sendEmail) { |
|
231
|
|
|
try { |
|
232
|
|
|
if ($groupId > 0) { |
|
233
|
|
|
$temporaryMasterPassService->sendByEmailForGroup($groupId, $key); |
|
234
|
|
|
} else { |
|
235
|
|
|
$temporaryMasterPassService->sendByEmailForAllUsers($key); |
|
236
|
|
|
} |
|
237
|
|
|
|
|
238
|
|
|
return $this->returnJsonResponse( |
|
239
|
|
|
JsonResponse::JSON_SUCCESS, |
|
240
|
|
|
__u('Temporary password generated'), |
|
241
|
|
|
[__u('Email sent')] |
|
242
|
|
|
); |
|
243
|
|
|
} catch (Exception $e) { |
|
244
|
|
|
processException($e); |
|
245
|
|
|
|
|
246
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
247
|
|
|
|
|
248
|
|
|
return $this->returnJsonResponse( |
|
249
|
|
|
JsonResponse::JSON_WARNING, |
|
250
|
|
|
__u('Temporary password generated'), |
|
251
|
|
|
[__u('Error while sending the email')] |
|
252
|
|
|
); |
|
253
|
|
|
} |
|
254
|
|
|
} |
|
255
|
|
|
|
|
256
|
|
|
return $this->returnJsonResponse(JsonResponse::JSON_SUCCESS, __u('Temporary password generated')); |
|
257
|
|
|
} catch (Exception $e) { |
|
258
|
|
|
processException($e); |
|
259
|
|
|
|
|
260
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
261
|
|
|
|
|
262
|
|
|
return $this->returnJsonResponseException($e); |
|
263
|
|
|
} |
|
264
|
|
|
} |
|
265
|
|
|
|
|
266
|
|
|
/** |
|
267
|
|
|
* @return bool |
|
268
|
|
|
* @throws SessionTimeout |
|
269
|
|
|
*/ |
|
270
|
|
|
protected function initialize() |
|
271
|
|
|
{ |
|
272
|
|
|
try { |
|
273
|
|
|
$this->checks(); |
|
274
|
|
|
$this->checkAccess(Acl::CONFIG_CRYPT); |
|
275
|
|
|
} catch (UnauthorizedPageException $e) { |
|
276
|
|
|
$this->eventDispatcher->notifyEvent('exception', new Event($e)); |
|
277
|
|
|
|
|
278
|
|
|
return $this->returnJsonResponseException($e); |
|
|
|
|
|
|
279
|
|
|
} |
|
280
|
|
|
|
|
281
|
|
|
return true; |
|
|
|
|
|
|
282
|
|
|
} |
|
283
|
|
|
} |
In the issue above, the returned value is violating the contract defined by the mentioned interface.
Let's take a look at an example: