238 lines
6.8 KiB
PHP
238 lines
6.8 KiB
PHP
<?php
|
|
/**
|
|
* @copyright Copyright (c) 2016 Lukas Reschke <lukas@statuscode.ch>
|
|
*
|
|
* @license GNU AGPL version 3 or any later version
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
namespace OCA\User_SAML\Controller;
|
|
|
|
use OCA\User_SAML\Exceptions\NoUserFoundException;
|
|
use OCA\User_SAML\SAMLSettings;
|
|
use OCA\User_SAML\UserBackend;
|
|
use OCP\AppFramework\Controller;
|
|
use OCP\AppFramework\Http;
|
|
use OCP\IConfig;
|
|
use OCP\IRequest;
|
|
use OCP\ISession;
|
|
use OCP\IURLGenerator;
|
|
use OCP\IUserManager;
|
|
use OCP\IUserSession;
|
|
|
|
class SAMLController extends Controller {
|
|
/** @var ISession */
|
|
private $session;
|
|
/** @var IUserSession */
|
|
private $userSession;
|
|
/** @var SAMLSettings */
|
|
private $SAMLSettings;
|
|
/** @var UserBackend */
|
|
private $userBackend;
|
|
/** @var IConfig */
|
|
private $config;
|
|
/** @var IURLGenerator */
|
|
private $urlGenerator;
|
|
/** @var IUserManager */
|
|
private $userManager;
|
|
|
|
/**
|
|
* @param string $appName
|
|
* @param IRequest $request
|
|
* @param ISession $session
|
|
* @param IUserSession $userSession
|
|
* @param SAMLSettings $SAMLSettings
|
|
* @param UserBackend $userBackend
|
|
* @param IConfig $config
|
|
* @param IURLGenerator $urlGenerator
|
|
* @param IUserManager $userManager
|
|
*/
|
|
public function __construct($appName,
|
|
IRequest $request,
|
|
ISession $session,
|
|
IUserSession $userSession,
|
|
SAMLSettings $SAMLSettings,
|
|
UserBackend $userBackend,
|
|
IConfig $config,
|
|
IURLGenerator $urlGenerator,
|
|
IUserManager $userManager) {
|
|
parent::__construct($appName, $request);
|
|
$this->session = $session;
|
|
$this->userSession = $userSession;
|
|
$this->SAMLSettings = $SAMLSettings;
|
|
$this->userBackend = $userBackend;
|
|
$this->config = $config;
|
|
$this->urlGenerator = $urlGenerator;
|
|
$this->userManager = $userManager;
|
|
}
|
|
|
|
/**
|
|
* @param array $auth
|
|
* @throws NoUserFoundException
|
|
*/
|
|
private function autoprovisionIfPossible(array $auth) {
|
|
$uidMapping = $this->config->getAppValue('user_saml', 'general-uid_mapping');
|
|
if(isset($auth[$uidMapping])) {
|
|
if(is_array($auth[$uidMapping])) {
|
|
$uid = $auth[$uidMapping][0];
|
|
} else {
|
|
$uid = $auth[$uidMapping];
|
|
}
|
|
|
|
$userExists = $this->userManager->userExists($uid);
|
|
if($userExists === true) {
|
|
return;
|
|
}
|
|
|
|
$autoProvisioningAllowed = $this->userBackend->autoprovisionAllowed();
|
|
if(!$userExists && !$autoProvisioningAllowed) {
|
|
throw new NoUserFoundException();
|
|
} elseif(!$userExists && $autoProvisioningAllowed) {
|
|
$this->userBackend->createUserIfNotExists($uid);
|
|
return;
|
|
}
|
|
}
|
|
|
|
throw new NoUserFoundException();
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @UseSession
|
|
* @OnlyUnauthenticatedUsers
|
|
*
|
|
* @return Http\RedirectResponse
|
|
* @throws \Exception
|
|
*/
|
|
public function login() {
|
|
$type = $this->config->getAppValue($this->appName, 'type');
|
|
switch($type) {
|
|
case 'saml':
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$ssoUrl = $auth->login(null, [], false, false, true);
|
|
$this->session->set('user_saml.AuthNRequestID', $auth->getLastRequestID());
|
|
break;
|
|
case 'environment-variable':
|
|
$ssoUrl = $this->urlGenerator->getAbsoluteURL('/');
|
|
try {
|
|
$this->autoprovisionIfPossible($this->session->get('user_saml.samlUserData'));
|
|
} catch (NoUserFoundException $e) {
|
|
$ssoUrl = $this->urlGenerator->linkToRouteAbsolute('user_saml.SAML.notProvisioned');
|
|
}
|
|
break;
|
|
default:
|
|
throw new \Exception(
|
|
sprintf(
|
|
'Type of "%s" is not supported for user_saml',
|
|
$type
|
|
)
|
|
);
|
|
}
|
|
|
|
return new Http\RedirectResponse($ssoUrl);
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
*/
|
|
public function getMetadata() {
|
|
$settings = new \OneLogin_Saml2_Settings($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$metadata = $settings->getSPMetadata();
|
|
$errors = $settings->validateMetadata($metadata);
|
|
if (empty($errors)) {
|
|
return new Http\DataDownloadResponse($metadata, 'metadata.xml', 'text/xml');
|
|
} else {
|
|
throw new \OneLogin_Saml2_Error(
|
|
'Invalid SP metadata: '.implode(', ', $errors),
|
|
\OneLogin_Saml2_Error::METADATA_SP_INVALID
|
|
);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
* @UseSession
|
|
* @OnlyUnauthenticatedUsers
|
|
*/
|
|
public function assertionConsumerService() {
|
|
$AuthNRequestID = $this->session->get('user_saml.AuthNRequestID');
|
|
if(is_null($AuthNRequestID) || $AuthNRequestID === '') {
|
|
return;
|
|
}
|
|
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$auth->processResponse($AuthNRequestID);
|
|
|
|
$errors = $auth->getErrors();
|
|
|
|
// FIXME: Appframworkize
|
|
if (!empty($errors)) {
|
|
print_r('<p>'.implode(', ', $errors).'</p>');
|
|
}
|
|
|
|
if (!$auth->isAuthenticated()) {
|
|
echo "<p>Not authenticated</p>";
|
|
exit();
|
|
}
|
|
|
|
// Check whether the user actually exists, if not redirect to an error page
|
|
// explaining the issue.
|
|
try {
|
|
$this->autoprovisionIfPossible($auth->getAttributes());
|
|
} catch (NoUserFoundException $e) {
|
|
return new Http\RedirectResponse($this->urlGenerator->linkToRouteAbsolute('user_saml.SAML.notProvisioned'));
|
|
|
|
}
|
|
|
|
$this->session->set('user_saml.samlUserData', $auth->getAttributes());
|
|
$this->session->set('user_saml.samlNameId', $auth->getNameId());
|
|
$this->session->set('user_saml.samlSessionIndex', $auth->getSessionIndex());
|
|
$this->session->set('user_saml.samlSessionExpiration', $auth->getSessionExpiration());
|
|
|
|
$response = new Http\RedirectResponse(\OC::$server->getURLGenerator()->getAbsoluteURL('/'));
|
|
// The Nextcloud desktop client expects a cookie with the key of "_shibsession"
|
|
// to be there.
|
|
if($this->request->isUserAgent(['/^.*(mirall|csyncoC)\/.*$/'])) {
|
|
$response->addCookie('_shibsession_', 'authenticated');
|
|
}
|
|
return $response;
|
|
}
|
|
|
|
/**
|
|
* @NoAdminRequired
|
|
*/
|
|
public function singleLogoutService() {
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$returnTo = null;
|
|
$parameters = array();
|
|
$nameId = $this->session->get('user_saml.samlNameId');
|
|
$sessionIndex = $this->session->get('user_saml.samlSessionIndex');
|
|
$this->userSession->logout();
|
|
$auth->logout($returnTo, $parameters, $nameId, $sessionIndex);
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
* @OnlyUnauthenticatedUsers
|
|
*/
|
|
public function notProvisioned() {
|
|
return new Http\TemplateResponse($this->appName, 'notProvisioned', [], 'guest');
|
|
}
|
|
}
|