168 lines
5.3 KiB
PHP
168 lines
5.3 KiB
PHP
<?php
|
|
/**
|
|
* @copyright Copyright (c) 2016 Lukas Reschke <lukas@statuscode.ch>
|
|
*
|
|
* @license GNU AGPL version 3 or any later version
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
namespace OCA\User_SAML\Controller;
|
|
|
|
use OCA\User_SAML\SAMLSettings;
|
|
use OCA\User_SAML\UserBackend;
|
|
use OCP\AppFramework\Controller;
|
|
use OCP\AppFramework\Http;
|
|
use OCP\IRequest;
|
|
use OCP\ISession;
|
|
use OCP\IUserSession;
|
|
|
|
class SAMLController extends Controller {
|
|
/** @var ISession */
|
|
private $session;
|
|
/** @var IUserSession */
|
|
private $userSession;
|
|
/** @var SAMLSettings */
|
|
private $SAMLSettings;
|
|
/** @var UserBackend */
|
|
private $userBackend;
|
|
|
|
/**
|
|
* @param string $appName
|
|
* @param IRequest $request
|
|
* @param ISession $session
|
|
* @param IUserSession $userSession
|
|
* @param SAMLSettings $SAMLSettings
|
|
* @param UserBackend $userBackend
|
|
*/
|
|
public function __construct($appName,
|
|
IRequest $request,
|
|
ISession $session,
|
|
IUserSession $userSession,
|
|
SAMLSettings $SAMLSettings,
|
|
UserBackend $userBackend) {
|
|
parent::__construct($appName, $request);
|
|
$this->session = $session;
|
|
$this->userSession = $userSession;
|
|
$this->SAMLSettings = $SAMLSettings;
|
|
$this->userBackend = $userBackend;
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @UseSession
|
|
* @OnlyUnauthenticatedUsers
|
|
*/
|
|
public function login() {
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$ssoUrl = $auth->login(null, array(), false, false, true);
|
|
$this->session->set('user_saml.AuthNRequestID', $auth->getLastRequestID());
|
|
return new Http\RedirectResponse($ssoUrl);
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
*/
|
|
public function getMetadata() {
|
|
$settings = new \OneLogin_Saml2_Settings($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$metadata = $settings->getSPMetadata();
|
|
$errors = $settings->validateMetadata($metadata);
|
|
if (empty($errors)) {
|
|
return new Http\DataDownloadResponse($metadata, 'metadata.xml', 'text/xml');
|
|
} else {
|
|
throw new \OneLogin_Saml2_Error(
|
|
'Invalid SP metadata: '.implode(', ', $errors),
|
|
\OneLogin_Saml2_Error::METADATA_SP_INVALID
|
|
);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
* @UseSession
|
|
* @OnlyUnauthenticatedUsers
|
|
*/
|
|
public function assertionConsumerService() {
|
|
$AuthNRequestID = $this->session->get('user_saml.AuthNRequestID');
|
|
if(is_null($AuthNRequestID) || $AuthNRequestID === '') {
|
|
return;
|
|
}
|
|
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$auth->processResponse($AuthNRequestID);
|
|
|
|
$errors = $auth->getErrors();
|
|
|
|
// FIXME: Appframworkize
|
|
if (!empty($errors)) {
|
|
print_r('<p>'.implode(', ', $errors).'</p>');
|
|
}
|
|
if (!$auth->isAuthenticated()) {
|
|
echo "<p>Not authenticated</p>";
|
|
exit();
|
|
}
|
|
|
|
// Check whether the user actually exists, if not redirect to an error page
|
|
// explaining the issue.
|
|
$uidMapping = \OC::$server->getConfig()->getAppValue('user_saml', 'general-uid_mapping', '');
|
|
if(isset($auth->getAttributes()[$uidMapping])) {
|
|
$uid = $auth->getAttributes()[$uidMapping][0];
|
|
$userExists = \OC::$server->getUserManager()->userExists($uid);
|
|
if(!$userExists && !$this->userBackend->autoprovisionAllowed()) {
|
|
return new Http\RedirectResponse(\OC::$server->getURLGenerator()->linkToRouteAbsolute('user_saml.SAML.notProvisioned'));
|
|
} elseif(!$userExists && $this->userBackend->autoprovisionAllowed()) {
|
|
$this->userBackend->createUserIfNotExists($uid);
|
|
}
|
|
}
|
|
|
|
$this->session->set('user_saml.samlUserData', $auth->getAttributes());
|
|
$this->session->set('user_saml.samlNameId', $auth->getNameId());
|
|
$this->session->set('user_saml.samlSessionIndex', $auth->getSessionIndex());
|
|
$this->session->set('user_saml.samlSessionExpiration', $auth->getSessionExpiration());
|
|
|
|
$response = new Http\RedirectResponse(\OC::$server->getURLGenerator()->getAbsoluteURL('/'));
|
|
// The Nextcloud desktop client expects a cookie with the key of "_shibsession"
|
|
// to be there.
|
|
if($this->request->isUserAgent(['/^.*(mirall|csyncoC)\/.*$/'])) {
|
|
$response->addCookie('_shibsession_', 'authenticated');
|
|
}
|
|
return $response;
|
|
}
|
|
|
|
/**
|
|
* @NoAdminRequired
|
|
*/
|
|
public function singleLogoutService() {
|
|
$auth = new \OneLogin_Saml2_Auth($this->SAMLSettings->getOneLoginSettingsArray());
|
|
$returnTo = null;
|
|
$parameters = array();
|
|
$nameId = $this->session->get('user_saml.samlNameId');
|
|
$sessionIndex = $this->session->get('user_saml.samlSessionIndex');
|
|
$this->userSession->logout();
|
|
$auth->logout($returnTo, $parameters, $nameId, $sessionIndex);
|
|
}
|
|
|
|
/**
|
|
* @PublicPage
|
|
* @NoCSRFRequired
|
|
* @OnlyUnauthenticatedUsers
|
|
*/
|
|
public function notProvisioned() {
|
|
return new Http\TemplateResponse($this->appName, 'notProvisioned', [], 'guest');
|
|
}
|
|
}
|