commit
b9bbb894f8
11 changed files with 219 additions and 18 deletions
|
@ -12,6 +12,7 @@ return array(
|
|||
'OCA\\AdminAudit\\Actions\\Console' => $baseDir . '/../lib/Actions/Console.php',
|
||||
'OCA\\AdminAudit\\Actions\\Files' => $baseDir . '/../lib/Actions/Files.php',
|
||||
'OCA\\AdminAudit\\Actions\\GroupManagement' => $baseDir . '/../lib/Actions/GroupManagement.php',
|
||||
'OCA\\AdminAudit\\Actions\\Security' => $baseDir . '/../lib/Actions/Security.php',
|
||||
'OCA\\AdminAudit\\Actions\\Sharing' => $baseDir . '/../lib/Actions/Sharing.php',
|
||||
'OCA\\AdminAudit\\Actions\\Trashbin' => $baseDir . '/../lib/Actions/Trashbin.php',
|
||||
'OCA\\AdminAudit\\Actions\\UserManagement' => $baseDir . '/../lib/Actions/UserManagement.php',
|
||||
|
|
|
@ -27,6 +27,7 @@ class ComposerStaticInitAdminAudit
|
|||
'OCA\\AdminAudit\\Actions\\Console' => __DIR__ . '/..' . '/../lib/Actions/Console.php',
|
||||
'OCA\\AdminAudit\\Actions\\Files' => __DIR__ . '/..' . '/../lib/Actions/Files.php',
|
||||
'OCA\\AdminAudit\\Actions\\GroupManagement' => __DIR__ . '/..' . '/../lib/Actions/GroupManagement.php',
|
||||
'OCA\\AdminAudit\\Actions\\Security' => __DIR__ . '/..' . '/../lib/Actions/Security.php',
|
||||
'OCA\\AdminAudit\\Actions\\Sharing' => __DIR__ . '/..' . '/../lib/Actions/Sharing.php',
|
||||
'OCA\\AdminAudit\\Actions\\Trashbin' => __DIR__ . '/..' . '/../lib/Actions/Trashbin.php',
|
||||
'OCA\\AdminAudit\\Actions\\UserManagement' => __DIR__ . '/..' . '/../lib/Actions/UserManagement.php',
|
||||
|
|
75
apps/admin_audit/lib/Actions/Security.php
Normal file
75
apps/admin_audit/lib/Actions/Security.php
Normal file
|
@ -0,0 +1,75 @@
|
|||
<?php
|
||||
declare(strict_types=1);
|
||||
/**
|
||||
* @copyright Copyright (c) 2018 Roeland Jago Douma <roeland@famdouma.nl>
|
||||
*
|
||||
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
||||
*
|
||||
* @license GNU AGPL version 3 or any later version
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Affero General Public License as
|
||||
* published by the Free Software Foundation, either version 3 of the
|
||||
* License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Affero General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Affero General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*/
|
||||
|
||||
namespace OCA\AdminAudit\Actions;
|
||||
use OCP\IUser;
|
||||
|
||||
/**
|
||||
* Class Sharing logs the sharing actions
|
||||
*
|
||||
* @package OCA\AdminAudit\Actions
|
||||
*/
|
||||
class Security extends Action {
|
||||
/**
|
||||
* Log twofactor auth enabled
|
||||
*
|
||||
* @param IUser $user
|
||||
* @param array $params
|
||||
*/
|
||||
public function twofactorFailed(IUser $user, array $params) {
|
||||
$params['uid'] = $user->getUID();
|
||||
$params['displayName'] = $user->getDisplayName();
|
||||
|
||||
$this->log(
|
||||
'Failed two factor attempt by user %s (%s) with provider %s',
|
||||
$params,
|
||||
[
|
||||
'displayName',
|
||||
'uid',
|
||||
'provider',
|
||||
]
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Logs unsharing of data
|
||||
*
|
||||
* @param IUser $user
|
||||
* @param array $params
|
||||
*/
|
||||
public function twofactorSuccess(IUser $user, array $params) {
|
||||
$params['uid'] = $user->getUID();
|
||||
$params['displayName'] = $user->getDisplayName();
|
||||
|
||||
$this->log(
|
||||
'Successful two factor attempt by user %s (%s) with provider %s',
|
||||
$params,
|
||||
[
|
||||
'displayName',
|
||||
'uid',
|
||||
'provider',
|
||||
]
|
||||
);
|
||||
}
|
||||
}
|
|
@ -33,12 +33,14 @@ use OCA\AdminAudit\Actions\Auth;
|
|||
use OCA\AdminAudit\Actions\Console;
|
||||
use OCA\AdminAudit\Actions\Files;
|
||||
use OCA\AdminAudit\Actions\GroupManagement;
|
||||
use OCA\AdminAudit\Actions\Security;
|
||||
use OCA\AdminAudit\Actions\Sharing;
|
||||
use OCA\AdminAudit\Actions\Trashbin;
|
||||
use OCA\AdminAudit\Actions\UserManagement;
|
||||
use OCA\AdminAudit\Actions\Versions;
|
||||
use OCP\App\ManagerEvent;
|
||||
use OCP\AppFramework\App;
|
||||
use OCP\Authentication\TwoFactorAuth\IProvider;
|
||||
use OCP\Console\ConsoleEvent;
|
||||
use OCP\IGroupManager;
|
||||
use OCP\ILogger;
|
||||
|
@ -75,6 +77,8 @@ class Application extends App {
|
|||
$this->fileHooks($logger);
|
||||
$this->trashbinHooks($logger);
|
||||
$this->versionsHooks($logger);
|
||||
|
||||
$this->securityHooks($logger);
|
||||
}
|
||||
|
||||
protected function userManagementHooks(ILogger $logger) {
|
||||
|
@ -218,4 +222,16 @@ class Application extends App {
|
|||
Util::connectHook('\OCP\Trashbin', 'preDelete', $trashActions, 'delete');
|
||||
Util::connectHook('\OCA\Files_Trashbin\Trashbin', 'post_restore', $trashActions, 'restore');
|
||||
}
|
||||
|
||||
protected function securityHooks(ILogger $logger) {
|
||||
$eventDispatcher = $this->getContainer()->getServer()->getEventDispatcher();
|
||||
$eventDispatcher->addListener(IProvider::EVENT_SUCCESS, function(GenericEvent $event) use ($logger) {
|
||||
$security = new Security($logger);
|
||||
$security->twofactorSuccess($event->getSubject(), $event->getArguments());
|
||||
});
|
||||
$eventDispatcher->addListener(IProvider::EVENT_FAILED, function(GenericEvent $event) use ($logger) {
|
||||
$security = new Security($logger);
|
||||
$security->twofactorFailed($event->getSubject(), $event->getArguments());
|
||||
});
|
||||
}
|
||||
}
|
||||
|
|
75
apps/admin_audit/tests/Actions/SecurityTest.php
Normal file
75
apps/admin_audit/tests/Actions/SecurityTest.php
Normal file
|
@ -0,0 +1,75 @@
|
|||
<?php
|
||||
declare(strict_types=1);
|
||||
/**
|
||||
* @copyright Copyright (c) 2018 Roeland Jago Douma <roeland@famdouma.nl>
|
||||
*
|
||||
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
||||
*
|
||||
* @license GNU AGPL version 3 or any later version
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Affero General Public License as
|
||||
* published by the Free Software Foundation, either version 3 of the
|
||||
* License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Affero General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Affero General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*/
|
||||
|
||||
namespace OCA\AdminAudit\Tests\Actions;
|
||||
|
||||
use OCA\AdminAudit\Actions\Security;
|
||||
use OCP\ILogger;
|
||||
use OCP\IUser;
|
||||
use Test\TestCase;
|
||||
|
||||
class SecurityTest extends TestCase {
|
||||
/** @var ILogger|\PHPUnit_Framework_MockObject_MockObject */
|
||||
private $logger;
|
||||
|
||||
/** @var Security */
|
||||
private $security;
|
||||
|
||||
/** @var IUser|\PHPUnit_Framework_MockObject_MockObject */
|
||||
private $user;
|
||||
|
||||
public function setUp() {
|
||||
parent::setUp();
|
||||
|
||||
$this->logger = $this->createMock(ILogger::class);
|
||||
$this->security = new Security($this->logger);
|
||||
|
||||
$this->user = $this->createMock(IUser::class);
|
||||
$this->user->method('getUID')->willReturn('myuid');
|
||||
$this->user->method('getDisplayName')->willReturn('mydisplayname');
|
||||
}
|
||||
|
||||
public function testTwofactorFailed() {
|
||||
$this->logger->expects($this->once())
|
||||
->method('info')
|
||||
->with(
|
||||
$this->equalTo('Failed two factor attempt by user mydisplayname (myuid) with provider myprovider'),
|
||||
['app' => 'admin_audit']
|
||||
);
|
||||
|
||||
$this->security->twofactorFailed($this->user, ['provider' => 'myprovider']);
|
||||
}
|
||||
|
||||
public function testTwofactorSuccess() {
|
||||
$this->logger->expects($this->once())
|
||||
->method('info')
|
||||
->with(
|
||||
$this->equalTo('Successful two factor attempt by user mydisplayname (myuid) with provider myprovider'),
|
||||
['app' => 'admin_audit']
|
||||
);
|
||||
|
||||
$this->security->twofactorSuccess($this->user, ['provider' => 'myprovider']);
|
||||
}
|
||||
|
||||
}
|
|
@ -1,4 +1,5 @@
|
|||
<?php
|
||||
declare(strict_types=1);
|
||||
/**
|
||||
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
||||
*
|
||||
|
@ -40,6 +41,8 @@ use OCP\IConfig;
|
|||
use OCP\ILogger;
|
||||
use OCP\ISession;
|
||||
use OCP\IUser;
|
||||
use Symfony\Component\EventDispatcher\EventDispatcherInterface;
|
||||
use Symfony\Component\EventDispatcher\GenericEvent;
|
||||
|
||||
class Manager {
|
||||
|
||||
|
@ -70,6 +73,9 @@ class Manager {
|
|||
/** @var ITimeFactory */
|
||||
private $timeFactory;
|
||||
|
||||
/** @var EventDispatcherInterface */
|
||||
private $dispatcher;
|
||||
|
||||
/**
|
||||
* @param AppManager $appManager
|
||||
* @param ISession $session
|
||||
|
@ -78,6 +84,7 @@ class Manager {
|
|||
* @param ILogger $logger
|
||||
* @param TokenProvider $tokenProvider
|
||||
* @param ITimeFactory $timeFactory
|
||||
* @param EventDispatcherInterface $eventDispatcher
|
||||
*/
|
||||
public function __construct(AppManager $appManager,
|
||||
ISession $session,
|
||||
|
@ -85,7 +92,8 @@ class Manager {
|
|||
IManager $activityManager,
|
||||
ILogger $logger,
|
||||
TokenProvider $tokenProvider,
|
||||
ITimeFactory $timeFactory) {
|
||||
ITimeFactory $timeFactory,
|
||||
EventDispatcherInterface $eventDispatcher) {
|
||||
$this->appManager = $appManager;
|
||||
$this->session = $session;
|
||||
$this->config = $config;
|
||||
|
@ -93,6 +101,7 @@ class Manager {
|
|||
$this->logger = $logger;
|
||||
$this->tokenProvider = $tokenProvider;
|
||||
$this->timeFactory = $timeFactory;
|
||||
$this->dispatcher = $eventDispatcher;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -101,9 +110,9 @@ class Manager {
|
|||
* @param IUser $user
|
||||
* @return boolean
|
||||
*/
|
||||
public function isTwoFactorAuthenticated(IUser $user) {
|
||||
public function isTwoFactorAuthenticated(IUser $user): bool {
|
||||
$twoFactorEnabled = ((int) $this->config->getUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 0)) === 0;
|
||||
return $twoFactorEnabled && count($this->getProviders($user)) > 0;
|
||||
return $twoFactorEnabled && \count($this->getProviders($user)) > 0;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -131,9 +140,9 @@ class Manager {
|
|||
* @param string $challengeProviderId
|
||||
* @return IProvider|null
|
||||
*/
|
||||
public function getProvider(IUser $user, $challengeProviderId) {
|
||||
public function getProvider(IUser $user, string $challengeProviderId) {
|
||||
$providers = $this->getProviders($user, true);
|
||||
return isset($providers[$challengeProviderId]) ? $providers[$challengeProviderId] : null;
|
||||
return $providers[$challengeProviderId] ?? null;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -156,7 +165,7 @@ class Manager {
|
|||
* @return IProvider[]
|
||||
* @throws Exception
|
||||
*/
|
||||
public function getProviders(IUser $user, $includeBackupApp = false) {
|
||||
public function getProviders(IUser $user, bool $includeBackupApp = false): array {
|
||||
$allApps = $this->appManager->getEnabledAppsForUser($user);
|
||||
$providers = [];
|
||||
|
||||
|
@ -167,6 +176,7 @@ class Manager {
|
|||
|
||||
$info = $this->appManager->getAppInfo($appId);
|
||||
if (isset($info['two-factor-providers'])) {
|
||||
/** @var string[] $providerClasses */
|
||||
$providerClasses = $info['two-factor-providers'];
|
||||
foreach ($providerClasses as $class) {
|
||||
try {
|
||||
|
@ -192,7 +202,7 @@ class Manager {
|
|||
*
|
||||
* @param string $appId
|
||||
*/
|
||||
protected function loadTwoFactorApp($appId) {
|
||||
protected function loadTwoFactorApp(string $appId) {
|
||||
if (!OC_App::isAppLoaded($appId)) {
|
||||
OC_App::loadApp($appId);
|
||||
}
|
||||
|
@ -206,9 +216,9 @@ class Manager {
|
|||
* @param string $challenge
|
||||
* @return boolean
|
||||
*/
|
||||
public function verifyChallenge($providerId, IUser $user, $challenge) {
|
||||
public function verifyChallenge(string $providerId, IUser $user, string $challenge): bool {
|
||||
$provider = $this->getProvider($user, $providerId);
|
||||
if (is_null($provider)) {
|
||||
if ($provider === null) {
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -228,10 +238,16 @@ class Manager {
|
|||
$tokenId = $token->getId();
|
||||
$this->config->deleteUserValue($user->getUID(), 'login_token_2fa', $tokenId);
|
||||
|
||||
$dispatchEvent = new GenericEvent($user, ['provider' => $provider->getDisplayName()]);
|
||||
$this->dispatcher->dispatch(IProvider::EVENT_SUCCESS, $dispatchEvent);
|
||||
|
||||
$this->publishEvent($user, 'twofactor_success', [
|
||||
'provider' => $provider->getDisplayName(),
|
||||
]);
|
||||
} else {
|
||||
$dispatchEvent = new GenericEvent($user, ['provider' => $provider->getDisplayName()]);
|
||||
$this->dispatcher->dispatch(IProvider::EVENT_FAILED, $dispatchEvent);
|
||||
|
||||
$this->publishEvent($user, 'twofactor_failed', [
|
||||
'provider' => $provider->getDisplayName(),
|
||||
]);
|
||||
|
@ -244,8 +260,9 @@ class Manager {
|
|||
*
|
||||
* @param IUser $user
|
||||
* @param string $event
|
||||
* @param array $params
|
||||
*/
|
||||
private function publishEvent(IUser $user, $event, array $params) {
|
||||
private function publishEvent(IUser $user, string $event, array $params) {
|
||||
$activity = $this->activityManager->generateEvent();
|
||||
$activity->setApp('core')
|
||||
->setType('security')
|
||||
|
@ -266,7 +283,7 @@ class Manager {
|
|||
* @param IUser $user the currently logged in user
|
||||
* @return boolean
|
||||
*/
|
||||
public function needsSecondFactor(IUser $user = null) {
|
||||
public function needsSecondFactor(IUser $user = null): bool {
|
||||
if ($user === null) {
|
||||
return false;
|
||||
}
|
||||
|
@ -295,7 +312,7 @@ class Manager {
|
|||
$tokenId = $token->getId();
|
||||
$tokensNeeding2FA = $this->config->getUserKeys($user->getUID(), 'login_token_2fa');
|
||||
|
||||
if (!in_array($tokenId, $tokensNeeding2FA, true)) {
|
||||
if (!\in_array($tokenId, $tokensNeeding2FA, true)) {
|
||||
$this->session->set(self::SESSION_UID_DONE, $user->getUID());
|
||||
return false;
|
||||
}
|
||||
|
@ -326,7 +343,7 @@ class Manager {
|
|||
* @param IUser $user
|
||||
* @param boolean $rememberMe
|
||||
*/
|
||||
public function prepareTwoFactorLogin(IUser $user, $rememberMe) {
|
||||
public function prepareTwoFactorLogin(IUser $user, bool $rememberMe) {
|
||||
$this->session->set(self::SESSION_UID_KEY, $user->getUID());
|
||||
$this->session->set(self::REMEMBER_LOGIN, $rememberMe);
|
||||
|
||||
|
|
|
@ -420,7 +420,8 @@ class Server extends ServerContainer implements IServerContainer {
|
|||
$c->getActivityManager(),
|
||||
$c->getLogger(),
|
||||
$c->query(\OC\Authentication\Token\IProvider::class),
|
||||
$c->query(ITimeFactory::class)
|
||||
$c->query(ITimeFactory::class),
|
||||
$c->query(EventDispatcherInterface::class)
|
||||
);
|
||||
});
|
||||
|
||||
|
|
|
@ -30,6 +30,12 @@ use OCP\Template;
|
|||
*/
|
||||
interface IProvider {
|
||||
|
||||
/**
|
||||
* @since 14.0.0
|
||||
*/
|
||||
const EVENT_SUCCESS = self::class . '::success';
|
||||
const EVENT_FAILED = self::class . '::failed';
|
||||
|
||||
/**
|
||||
* Get unique identifier of this 2FA provider
|
||||
*
|
||||
|
|
|
@ -24,3 +24,4 @@ enableApp('files_versions');
|
|||
enableApp('provisioning_api');
|
||||
enableApp('federation');
|
||||
enableApp('federatedfilesharing');
|
||||
enableApp('admin_audit');
|
||||
|
|
|
@ -35,6 +35,7 @@ use OCP\IConfig;
|
|||
use OCP\ILogger;
|
||||
use OCP\ISession;
|
||||
use OCP\IUser;
|
||||
use Symfony\Component\EventDispatcher\EventDispatcherInterface;
|
||||
use Test\TestCase;
|
||||
|
||||
class ManagerTest extends TestCase {
|
||||
|
@ -72,6 +73,9 @@ class ManagerTest extends TestCase {
|
|||
/** @var ITimeFactory|\PHPUnit_Framework_MockObject_MockObject */
|
||||
private $timeFactory;
|
||||
|
||||
/** @var EventDispatcherInterface|\PHPUnit_Framework_MockObject_MockObject */
|
||||
private $eventDispatcher;
|
||||
|
||||
protected function setUp() {
|
||||
parent::setUp();
|
||||
|
||||
|
@ -83,6 +87,7 @@ class ManagerTest extends TestCase {
|
|||
$this->logger = $this->createMock(ILogger::class);
|
||||
$this->tokenProvider = $this->createMock(TokenProvider::class);
|
||||
$this->timeFactory = $this->createMock(ITimeFactory::class);
|
||||
$this->eventDispatcher = $this->createMock(EventDispatcherInterface::class);
|
||||
|
||||
$this->manager = $this->getMockBuilder(Manager::class)
|
||||
->setConstructorArgs([
|
||||
|
@ -92,7 +97,8 @@ class ManagerTest extends TestCase {
|
|||
$this->activityManager,
|
||||
$this->logger,
|
||||
$this->tokenProvider,
|
||||
$this->timeFactory
|
||||
$this->timeFactory,
|
||||
$this->eventDispatcher
|
||||
])
|
||||
->setMethods(['loadTwoFactorApp']) // Do not actually load the apps
|
||||
->getMock();
|
||||
|
@ -301,7 +307,7 @@ class ManagerTest extends TestCase {
|
|||
->method('setAffectedUser')
|
||||
->with($this->equalTo('jos'))
|
||||
->willReturnSelf();
|
||||
$this->fakeProvider->expects($this->once())
|
||||
$this->fakeProvider
|
||||
->method('getDisplayName')
|
||||
->willReturn('Fake 2FA');
|
||||
$event->expects($this->once())
|
||||
|
@ -371,7 +377,7 @@ class ManagerTest extends TestCase {
|
|||
->method('setAffectedUser')
|
||||
->with($this->equalTo('jos'))
|
||||
->willReturnSelf();
|
||||
$this->fakeProvider->expects($this->once())
|
||||
$this->fakeProvider
|
||||
->method('getDisplayName')
|
||||
->willReturn('Fake 2FA');
|
||||
$event->expects($this->once())
|
||||
|
@ -424,7 +430,8 @@ class ManagerTest extends TestCase {
|
|||
$this->activityManager,
|
||||
$this->logger,
|
||||
$this->tokenProvider,
|
||||
$this->timeFactory
|
||||
$this->timeFactory,
|
||||
$this->eventDispatcher
|
||||
])
|
||||
->setMethods(['loadTwoFactorApp','isTwoFactorAuthenticated']) // Do not actually load the apps
|
||||
->getMock();
|
||||
|
|
|
@ -21,6 +21,7 @@
|
|||
<directory suffix=".php">..</directory>
|
||||
<exclude>
|
||||
<directory suffix=".php">../3rdparty</directory>
|
||||
<directory suffix=".php">../apps/admin_audit/tests</directory>
|
||||
<directory suffix=".php">../apps/dav/tests</directory>
|
||||
<directory suffix=".php">../apps/encryption/tests</directory>
|
||||
<directory suffix=".php">../apps/federatedfilesharing/tests</directory>
|
||||
|
|
Loading…
Reference in a new issue