4
0

authController.php 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304
  1. <?php
  2. declare(strict_types=1);
  3. /**
  4. * This controller handles action about authentication.
  5. */
  6. class FreshRSS_auth_Controller extends FreshRSS_ActionController {
  7. /**
  8. * This action handles authentication management page.
  9. *
  10. * Parameters are:
  11. * - token (default: current token)
  12. * - anon_access (default: false)
  13. * - anon_refresh (default: false)
  14. * - auth_type (default: none)
  15. * - unsafe_autologin (default: false)
  16. * - api_enabled (default: false)
  17. */
  18. public function indexAction(): void {
  19. if (!FreshRSS_Auth::hasAccess('admin')) {
  20. Minz_Error::error(403);
  21. }
  22. if (FreshRSS_Auth::requestReauth()) {
  23. return;
  24. }
  25. FreshRSS_View::prependTitle(_t('admin.auth.title') . ' · ');
  26. if (Minz_Request::isPost()) {
  27. $ok = true;
  28. $anon = Minz_Request::paramBoolean('anon_access');
  29. $anon_refresh = Minz_Request::paramBoolean('anon_refresh');
  30. $auth_type = Minz_Request::paramString('auth_type') ?: 'form';
  31. $unsafe_autologin = Minz_Request::paramBoolean('unsafe_autologin');
  32. $api_enabled = Minz_Request::paramBoolean('api_enabled');
  33. if ($anon !== FreshRSS_Context::systemConf()->allow_anonymous ||
  34. $auth_type !== FreshRSS_Context::systemConf()->auth_type ||
  35. $anon_refresh !== FreshRSS_Context::systemConf()->allow_anonymous_refresh ||
  36. $unsafe_autologin !== FreshRSS_Context::systemConf()->unsafe_autologin_enabled ||
  37. $api_enabled !== FreshRSS_Context::systemConf()->api_enabled) {
  38. if (in_array($auth_type, ['form', 'http_auth', 'none'], true)) {
  39. FreshRSS_Context::systemConf()->auth_type = $auth_type;
  40. } else {
  41. FreshRSS_Context::systemConf()->auth_type = 'form';
  42. }
  43. FreshRSS_Context::systemConf()->allow_anonymous = $anon;
  44. FreshRSS_Context::systemConf()->allow_anonymous_refresh = $anon_refresh;
  45. FreshRSS_Context::systemConf()->unsafe_autologin_enabled = $unsafe_autologin;
  46. FreshRSS_Context::systemConf()->api_enabled = $api_enabled;
  47. $ok &= FreshRSS_Context::systemConf()->save();
  48. }
  49. invalidateHttpCache();
  50. if ($ok) {
  51. Minz_Request::good(_t('feedback.conf.updated'), [ 'c' => 'auth', 'a' => 'index' ]);
  52. } else {
  53. Minz_Request::bad(_t('feedback.conf.error'), [ 'c' => 'auth', 'a' => 'index' ]);
  54. }
  55. }
  56. }
  57. /**
  58. * This action handles the login page.
  59. *
  60. * It forwards to the correct login page (form) or main page if
  61. * the user is already connected.
  62. */
  63. public function loginAction(): void {
  64. if (FreshRSS_Auth::hasAccess() && !(FreshRSS_Context::systemConf()->unsafe_autologin_enabled && Minz_Request::paramString('u') !== '')) {
  65. Minz_Request::forward(['c' => 'index', 'a' => 'index'], true);
  66. }
  67. $auth_type = FreshRSS_Context::systemConf()->auth_type;
  68. FreshRSS_Context::initUser(Minz_User::INTERNAL_USER, false);
  69. match ($auth_type) {
  70. 'form' => Minz_Request::forward(['c' => 'auth', 'a' => 'formLogin']),
  71. 'http_auth' => Minz_Error::error(403, [
  72. 'error' => [
  73. _t('feedback.access.denied'),
  74. ' [HTTP Remote-User=' . htmlspecialchars(httpAuthUser(false), ENT_NOQUOTES, 'UTF-8') .
  75. ' ; Remote IP address=' . connectionRemoteAddress() . ']'
  76. ]
  77. ], false),
  78. 'none' => Minz_Error::error(404), // It should not happen!
  79. default => Minz_Error::error(404), // TODO load plugin instead
  80. };
  81. }
  82. /**
  83. * This action handles form login page.
  84. *
  85. * If this action is reached through a POST request, username and password
  86. * are compared to login the current user.
  87. *
  88. * Parameters are:
  89. * - nonce (default: false)
  90. * - username (default: '')
  91. * - challenge (default: '')
  92. * - keep_logged_in (default: false)
  93. *
  94. * @todo move unsafe autologin in an extension.
  95. * @throws Exception
  96. */
  97. public function formLoginAction(): void {
  98. invalidateHttpCache();
  99. FreshRSS_View::prependTitle(_t('gen.auth.login') . ' · ');
  100. FreshRSS_View::appendScript(Minz_Url::display('/scripts/vendor/bcrypt.js?' . @filemtime(PUBLIC_PATH . '/scripts/vendor/bcrypt.js')));
  101. $limits = FreshRSS_Context::systemConf()->limits;
  102. $this->view->cookie_days = (int)round($limits['cookie_duration'] / 86400, 1);
  103. $isPOST = Minz_Request::isPost() && !Minz_Session::paramBoolean('POST_to_GET');
  104. Minz_Session::_param('POST_to_GET');
  105. if ($isPOST) {
  106. $nonce = Minz_Session::paramString('nonce');
  107. $username = Minz_Request::paramString('username');
  108. $challenge = Minz_Request::paramString('challenge');
  109. if ($nonce === '') {
  110. Minz_Log::warning("Invalid session during login for user={$username}, nonce={$nonce}");
  111. header('HTTP/1.1 403 Forbidden');
  112. Minz_Session::_param('POST_to_GET', true); //Prevent infinite internal redirect
  113. Minz_Request::setBadNotification(_t('install.session.nok'));
  114. Minz_Request::forward(['c' => 'auth', 'a' => 'login'], false);
  115. return;
  116. }
  117. usleep(random_int(100, 10000)); //Primitive mitigation of timing attacks, in μs
  118. FreshRSS_Context::initUser($username);
  119. if (!FreshRSS_Context::hasUserConf()) {
  120. // Initialise the default user to be able to display the error page
  121. FreshRSS_Context::initUser(FreshRSS_Context::systemConf()->default_user);
  122. Minz_Error::error(403, _t('feedback.auth.login.invalid'), false);
  123. return;
  124. }
  125. if (!FreshRSS_Context::userConf()->enabled || FreshRSS_Context::userConf()->passwordHash == '') {
  126. usleep(random_int(100, 5000)); //Primitive mitigation of timing attacks, in μs
  127. Minz_Error::error(403, _t('feedback.auth.login.invalid'), false);
  128. return;
  129. }
  130. $ok = FreshRSS_FormAuth::checkCredentials(
  131. $username, FreshRSS_Context::userConf()->passwordHash, $nonce, $challenge
  132. );
  133. if ($ok) {
  134. // Set session parameter to give access to the user.
  135. Minz_Session::regenerateID('FreshRSS');
  136. Minz_Session::_params([
  137. Minz_User::CURRENT_USER => $username,
  138. 'passwordHash' => FreshRSS_Context::userConf()->passwordHash,
  139. 'csrf' => false,
  140. ]);
  141. FreshRSS_Auth::giveAccess();
  142. // Set cookie parameter if needed.
  143. if (Minz_Request::paramBoolean('keep_logged_in')) {
  144. FreshRSS_FormAuth::makeCookie($username, FreshRSS_Context::userConf()->passwordHash);
  145. } else {
  146. FreshRSS_FormAuth::deleteCookie();
  147. }
  148. Minz_Translate::init(FreshRSS_Context::userConf()->language);
  149. FreshRSS_UserDAO::touch();
  150. // All is good, go back to the original request or the index.
  151. $url = Minz_Url::unserialize(Minz_Request::paramString('original_request'));
  152. if (empty($url)) {
  153. $url = [ 'c' => 'index', 'a' => 'index' ];
  154. }
  155. Minz_Request::good(_t('feedback.auth.login.success'), $url);
  156. } else {
  157. Minz_Log::warning("Password mismatch for user={$username}, nonce={$nonce}, c={$challenge}");
  158. header('HTTP/1.1 403 Forbidden');
  159. Minz_Session::_param('POST_to_GET', true); //Prevent infinite internal redirect
  160. Minz_Request::setBadNotification(_t('feedback.auth.login.invalid'));
  161. Minz_Request::forward(['c' => 'auth', 'a' => 'login'], false);
  162. }
  163. } elseif (FreshRSS_Context::systemConf()->unsafe_autologin_enabled) {
  164. $username = Minz_Request::paramString('u', plaintext: true);
  165. $password = Minz_Request::paramString('p', plaintext: true);
  166. Minz_Request::_param('p');
  167. if ($username === '') {
  168. return;
  169. }
  170. FreshRSS_FormAuth::deleteCookie();
  171. FreshRSS_Context::initUser($username);
  172. if (!FreshRSS_Context::hasUserConf()) {
  173. return;
  174. }
  175. $s = FreshRSS_Context::userConf()->passwordHash;
  176. $ok = password_verify($password, $s);
  177. unset($password);
  178. if ($ok) {
  179. Minz_Session::regenerateID('FreshRSS');
  180. Minz_Session::_params([
  181. Minz_User::CURRENT_USER => $username,
  182. 'passwordHash' => $s,
  183. 'csrf' => false,
  184. ]);
  185. FreshRSS_Auth::giveAccess();
  186. Minz_Translate::init(FreshRSS_Context::userConf()->language);
  187. Minz_Request::good(_t('feedback.auth.login.success'), ['c' => 'index', 'a' => 'index']);
  188. } else {
  189. Minz_Log::warning('Unsafe password mismatch for user ' . $username);
  190. Minz_Request::bad(
  191. _t('feedback.auth.login.invalid'),
  192. ['c' => 'auth', 'a' => 'login']
  193. );
  194. }
  195. }
  196. }
  197. public function reauthAction(): void {
  198. if (!FreshRSS_Auth::hasAccess()) {
  199. Minz_Error::error(403);
  200. return;
  201. }
  202. /** @var array{c?: string, a?: string, params?: array<string, mixed>} $redirect */
  203. $redirect = Minz_Url::unserialize(Minz_Request::paramString('r'));
  204. if (!FreshRSS_Auth::needsReauth()) {
  205. Minz_Request::forward($redirect, true);
  206. return;
  207. }
  208. if (Minz_Request::isPost()) {
  209. $username = Minz_User::name() ?? '';
  210. $nonce = Minz_Session::paramString('nonce');
  211. $challenge = Minz_Request::paramString('challenge');
  212. if (!FreshRSS_FormAuth::checkCredentials(
  213. $username, FreshRSS_Context::userConf()->passwordHash, $nonce, $challenge
  214. )) {
  215. Minz_Request::setBadNotification(_t('feedback.auth.login.invalid'));
  216. } else {
  217. Minz_Session::regenerateID('FreshRSS');
  218. Minz_Session::_param('lastReauth', time());
  219. Minz_Request::forward($redirect, true);
  220. return;
  221. }
  222. }
  223. FreshRSS_View::prependTitle(_t('gen.auth.reauth.title') . ' · ');
  224. FreshRSS_View::appendScript(Minz_Url::display('/scripts/vendor/bcrypt.js?' . @filemtime(PUBLIC_PATH . '/scripts/vendor/bcrypt.js')));
  225. }
  226. /**
  227. * This action removes all accesses of the current user.
  228. */
  229. public function logoutAction(): void {
  230. if (Minz_Request::isPost()) {
  231. invalidateHttpCache();
  232. FreshRSS_Auth::removeAccess();
  233. Minz_Session::regenerateID('FreshRSS');
  234. Minz_Request::good(_t('feedback.auth.logout.success'), [ 'c' => 'index', 'a' => 'index' ]);
  235. } else {
  236. Minz_Error::error(403);
  237. }
  238. }
  239. /**
  240. * This action gives possibility to a user to create an account.
  241. *
  242. * The user is redirected to the home when logged in.
  243. *
  244. * A 403 is sent if max number of registrations is reached.
  245. */
  246. public function registerAction(): void {
  247. if (FreshRSS_Auth::hasAccess()) {
  248. Minz_Request::forward(['c' => 'index', 'a' => 'index'], true);
  249. }
  250. if (max_registrations_reached()) {
  251. Minz_Error::error(403);
  252. }
  253. $this->view->show_tos_checkbox = file_exists(TOS_FILENAME);
  254. $this->view->show_email_field = FreshRSS_Context::systemConf()->force_email_validation;
  255. $this->view->preferred_language = Minz_Translate::getLanguage(null, Minz_Request::getPreferredLanguages(), FreshRSS_Context::systemConf()->language);
  256. FreshRSS_View::prependTitle(_t('gen.auth.registration.title') . ' · ');
  257. }
  258. public static function getLogoutUrl(): string {
  259. if (($_SERVER['AUTH_TYPE'] ?? '') === 'openid-connect') {
  260. $url_string = urlencode(Minz_Request::guessBaseUrl());
  261. return './oidc/?logout=' . $url_string . '/';
  262. # The trailing slash is necessary so that we don’t redirect to http://.
  263. # https://bz.apache.org/bugzilla/show_bug.cgi?id=61355#c13
  264. } else {
  265. return _url('auth', 'logout');
  266. }
  267. }
  268. }