| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267 |
- <?php
- declare(strict_types=1);
- /**
- * This controller handles action about authentication.
- */
- class FreshRSS_auth_Controller extends FreshRSS_ActionController {
- /**
- * This action handles authentication management page.
- *
- * Parameters are:
- * - token (default: current token)
- * - anon_access (default: false)
- * - anon_refresh (default: false)
- * - auth_type (default: none)
- * - unsafe_autologin (default: false)
- * - api_enabled (default: false)
- */
- public function indexAction(): void {
- if (!FreshRSS_Auth::hasAccess('admin')) {
- Minz_Error::error(403);
- }
- FreshRSS_View::prependTitle(_t('admin.auth.title') . ' · ');
- if (Minz_Request::isPost()) {
- $ok = true;
- $anon = Minz_Request::paramBoolean('anon_access');
- $anon_refresh = Minz_Request::paramBoolean('anon_refresh');
- $auth_type = Minz_Request::paramString('auth_type') ?: 'form';
- $unsafe_autologin = Minz_Request::paramBoolean('unsafe_autologin');
- $api_enabled = Minz_Request::paramBoolean('api_enabled');
- if ($anon !== FreshRSS_Context::systemConf()->allow_anonymous ||
- $auth_type !== FreshRSS_Context::systemConf()->auth_type ||
- $anon_refresh !== FreshRSS_Context::systemConf()->allow_anonymous_refresh ||
- $unsafe_autologin !== FreshRSS_Context::systemConf()->unsafe_autologin_enabled ||
- $api_enabled !== FreshRSS_Context::systemConf()->api_enabled) {
- if (in_array($auth_type, ['form', 'http_auth', 'none'], true)) {
- FreshRSS_Context::systemConf()->auth_type = $auth_type;
- } else {
- FreshRSS_Context::systemConf()->auth_type = 'form';
- }
- FreshRSS_Context::systemConf()->allow_anonymous = $anon;
- FreshRSS_Context::systemConf()->allow_anonymous_refresh = $anon_refresh;
- FreshRSS_Context::systemConf()->unsafe_autologin_enabled = $unsafe_autologin;
- FreshRSS_Context::systemConf()->api_enabled = $api_enabled;
- $ok &= FreshRSS_Context::systemConf()->save();
- }
- invalidateHttpCache();
- if ($ok) {
- Minz_Request::good(_t('feedback.conf.updated'), [ 'c' => 'auth', 'a' => 'index' ]);
- } else {
- Minz_Request::bad(_t('feedback.conf.error'), [ 'c' => 'auth', 'a' => 'index' ]);
- }
- }
- }
- /**
- * This action handles the login page.
- *
- * It forwards to the correct login page (form) or main page if
- * the user is already connected.
- */
- public function loginAction(): void {
- if (FreshRSS_Auth::hasAccess() && Minz_Request::paramString('u') === '') {
- Minz_Request::forward(['c' => 'index', 'a' => 'index'], true);
- }
- $auth_type = FreshRSS_Context::systemConf()->auth_type;
- FreshRSS_Context::initUser(Minz_User::INTERNAL_USER, false);
- match ($auth_type) {
- 'form' => Minz_Request::forward(['c' => 'auth', 'a' => 'formLogin']),
- 'http_auth' => Minz_Error::error(403, [
- 'error' => [
- _t('feedback.access.denied'),
- ' [HTTP Remote-User=' . htmlspecialchars(httpAuthUser(false), ENT_NOQUOTES, 'UTF-8') .
- ' ; Remote IP address=' . connectionRemoteAddress() . ']'
- ]
- ], false),
- 'none' => Minz_Error::error(404), // It should not happen!
- default => Minz_Error::error(404), // TODO load plugin instead
- };
- }
- /**
- * This action handles form login page.
- *
- * If this action is reached through a POST request, username and password
- * are compared to login the current user.
- *
- * Parameters are:
- * - nonce (default: false)
- * - username (default: '')
- * - challenge (default: '')
- * - keep_logged_in (default: false)
- *
- * @todo move unsafe autologin in an extension.
- * @throws Exception
- */
- public function formLoginAction(): void {
- invalidateHttpCache();
- FreshRSS_View::prependTitle(_t('gen.auth.login') . ' · ');
- FreshRSS_View::appendScript(Minz_Url::display('/scripts/vendor/bcrypt.js?' . @filemtime(PUBLIC_PATH . '/scripts/vendor/bcrypt.js')));
- $limits = FreshRSS_Context::systemConf()->limits;
- $this->view->cookie_days = (int)round($limits['cookie_duration'] / 86400, 1);
- $isPOST = Minz_Request::isPost() && !Minz_Session::paramBoolean('POST_to_GET');
- Minz_Session::_param('POST_to_GET');
- if ($isPOST) {
- $nonce = Minz_Session::paramString('nonce');
- $username = Minz_Request::paramString('username');
- $challenge = Minz_Request::paramString('challenge');
- if ($nonce === '') {
- Minz_Log::warning("Invalid session during login for user={$username}, nonce={$nonce}");
- header('HTTP/1.1 403 Forbidden');
- Minz_Session::_param('POST_to_GET', true); //Prevent infinite internal redirect
- Minz_Request::setBadNotification(_t('install.session.nok'));
- Minz_Request::forward(['c' => 'auth', 'a' => 'login'], false);
- return;
- }
- usleep(random_int(100, 10000)); //Primitive mitigation of timing attacks, in μs
- FreshRSS_Context::initUser($username);
- if (!FreshRSS_Context::hasUserConf()) {
- // Initialise the default user to be able to display the error page
- FreshRSS_Context::initUser(FreshRSS_Context::systemConf()->default_user);
- Minz_Error::error(403, _t('feedback.auth.login.invalid'), false);
- return;
- }
- if (!FreshRSS_Context::userConf()->enabled || FreshRSS_Context::userConf()->passwordHash == '') {
- usleep(random_int(100, 5000)); //Primitive mitigation of timing attacks, in μs
- Minz_Error::error(403, _t('feedback.auth.login.invalid'), false);
- return;
- }
- $ok = FreshRSS_FormAuth::checkCredentials(
- $username, FreshRSS_Context::userConf()->passwordHash, $nonce, $challenge
- );
- if ($ok) {
- // Set session parameter to give access to the user.
- Minz_Session::_params([
- Minz_User::CURRENT_USER => $username,
- 'passwordHash' => FreshRSS_Context::userConf()->passwordHash,
- 'csrf' => false,
- ]);
- FreshRSS_Auth::giveAccess();
- // Set cookie parameter if needed.
- if (Minz_Request::paramBoolean('keep_logged_in')) {
- FreshRSS_FormAuth::makeCookie($username, FreshRSS_Context::userConf()->passwordHash);
- } else {
- FreshRSS_FormAuth::deleteCookie();
- }
- Minz_Translate::init(FreshRSS_Context::userConf()->language);
- FreshRSS_UserDAO::touch();
- // All is good, go back to the original request or the index.
- $url = Minz_Url::unserialize(Minz_Request::paramString('original_request'));
- if (empty($url)) {
- $url = [ 'c' => 'index', 'a' => 'index' ];
- }
- Minz_Request::good(_t('feedback.auth.login.success'), $url);
- } else {
- Minz_Log::warning("Password mismatch for user={$username}, nonce={$nonce}, c={$challenge}");
- header('HTTP/1.1 403 Forbidden');
- Minz_Session::_param('POST_to_GET', true); //Prevent infinite internal redirect
- Minz_Request::setBadNotification(_t('feedback.auth.login.invalid'));
- Minz_Request::forward(['c' => 'auth', 'a' => 'login'], false);
- }
- } elseif (FreshRSS_Context::systemConf()->unsafe_autologin_enabled) {
- $username = Minz_Request::paramString('u', plaintext: true);
- $password = Minz_Request::paramString('p', plaintext: true);
- Minz_Request::_param('p');
- if ($username === '') {
- return;
- }
- FreshRSS_FormAuth::deleteCookie();
- FreshRSS_Context::initUser($username);
- if (!FreshRSS_Context::hasUserConf()) {
- return;
- }
- $s = FreshRSS_Context::userConf()->passwordHash;
- $ok = password_verify($password, $s);
- unset($password);
- if ($ok) {
- Minz_Session::_params([
- Minz_User::CURRENT_USER => $username,
- 'passwordHash' => $s,
- 'csrf' => false,
- ]);
- FreshRSS_Auth::giveAccess();
- Minz_Translate::init(FreshRSS_Context::userConf()->language);
- Minz_Request::good(_t('feedback.auth.login.success'), ['c' => 'index', 'a' => 'index']);
- } else {
- Minz_Log::warning('Unsafe password mismatch for user ' . $username);
- Minz_Request::bad(
- _t('feedback.auth.login.invalid'),
- ['c' => 'auth', 'a' => 'login']
- );
- }
- }
- }
- /**
- * This action removes all accesses of the current user.
- */
- public function logoutAction(): void {
- if (Minz_Request::isPost()) {
- invalidateHttpCache();
- FreshRSS_Auth::removeAccess();
- Minz_Request::good(_t('feedback.auth.logout.success'), [ 'c' => 'index', 'a' => 'index' ]);
- } else {
- Minz_Error::error(403);
- }
- }
- /**
- * This action gives possibility to a user to create an account.
- *
- * The user is redirected to the home when logged in.
- *
- * A 403 is sent if max number of registrations is reached.
- */
- public function registerAction(): void {
- if (FreshRSS_Auth::hasAccess()) {
- Minz_Request::forward(['c' => 'index', 'a' => 'index'], true);
- }
- if (max_registrations_reached()) {
- Minz_Error::error(403);
- }
- $this->view->show_tos_checkbox = file_exists(TOS_FILENAME);
- $this->view->show_email_field = FreshRSS_Context::systemConf()->force_email_validation;
- $this->view->preferred_language = Minz_Translate::getLanguage(null, Minz_Request::getPreferredLanguages(), FreshRSS_Context::systemConf()->language);
- FreshRSS_View::prependTitle(_t('gen.auth.registration.title') . ' · ');
- }
- public static function getLogoutUrl(): string {
- if (($_SERVER['AUTH_TYPE'] ?? '') === 'openid-connect') {
- $url_string = urlencode(Minz_Request::guessBaseUrl());
- return './oidc/?logout=' . $url_string . '/';
- # The trailing slash is necessary so that we don’t redirect to http://.
- # https://bz.apache.org/bugzilla/show_bug.cgi?id=61355#c13
- } else {
- return _url('auth', 'logout');
- }
- }
- }
|