Files
sysPass/lib/SP/Services/User/UserPassService.php
Rubén D 41703b50f9 * [MOD] Strict type checking (WIP)
Signed-off-by: Rubén D <nuxsmin@syspass.org>
2020-12-20 14:24:42 +01:00

275 lines
8.8 KiB
PHP

<?php
/*
* sysPass
*
* @author nuxsmin
* @link https://syspass.org
* @copyright 2012-2020, Rubén Domínguez nuxsmin@$syspass.org
*
* This file is part of sysPass.
*
* sysPass is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* sysPass is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with sysPass. If not, see <http://www.gnu.org/licenses/>.
*/
namespace SP\Services\User;
use Defuse\Crypto\Exception\CryptoException;
use Psr\Container\ContainerExceptionInterface;
use Psr\Container\NotFoundExceptionInterface;
use SP\Config\Config;
use SP\Config\ConfigData;
use SP\Core\Crypt\Crypt;
use SP\Core\Crypt\Hash;
use SP\Core\Exceptions\ConstraintException;
use SP\Core\Exceptions\QueryException;
use SP\Core\Exceptions\SPException;
use SP\DataModel\UserLoginData;
use SP\Repositories\NoSuchItemException;
use SP\Repositories\User\UserRepository;
use SP\Services\Config\ConfigService;
use SP\Services\Service;
/**
* Class UserPassService
*
* @package SP\Services\User
*/
final class UserPassService extends Service
{
// La clave maestra incorrecta
const MPASS_WRONG = 0;
// La clave maestra correcta
const MPASS_OK = 1;
// La clave maestra no está guardada
const MPASS_NOTSET = 2;
// La clave maestra ha cambiado
const MPASS_CHANGED = 3;
// Comprobar la clave maestra con la clave del usuario anterior
const MPASS_CHECKOLD = 4;
/**
* @var ConfigData
*/
protected $configData;
/**
* @var UserRepository
*/
protected $userRepository;
/**
* @var ConfigService
*/
protected $configService;
/**
* Actualizar la clave maestra con la clave anterior del usuario
*
* @param string $oldUserPass
* @param UserLoginData $userLoginData $UserData
*
* @return UserPassResponse
* @throws SPException
* @throws CryptoException
* @throws ContainerExceptionInterface
* @throws NotFoundExceptionInterface
*/
public function updateMasterPassFromOldPass($oldUserPass, UserLoginData $userLoginData)
{
$response = $this->loadUserMPass($userLoginData, $oldUserPass);
if ($response->getStatus() === self::MPASS_OK) {
return $this->updateMasterPassOnLogin($response->getClearMasterPass(), $userLoginData);
}
return new UserPassResponse(self::MPASS_WRONG);
}
/**
* Comprueba la clave maestra del usuario.
*
* @param UserLoginData $userLoginData
* @param string $userPass Clave de cifrado
*
* @return UserPassResponse
* @throws SPException
* @throws ContainerExceptionInterface
*/
public function loadUserMPass(UserLoginData $userLoginData, $userPass = null)
{
$userLoginResponse = $userLoginData->getUserLoginResponse();
$configHashMPass = $this->configService->getByParam('masterPwd');
if (empty($configHashMPass)
|| $userLoginResponse === null
|| empty($userLoginResponse->getMPass())
|| empty($userLoginResponse->getMKey())
) {
return new UserPassResponse(self::MPASS_NOTSET);
}
if ($userLoginResponse->getLastUpdateMPass() < $this->configService->getByParam('lastupdatempass')) {
return new UserPassResponse(self::MPASS_CHANGED);
}
// if ($userLoginResponse->getIsMigrate() === 1) {
// $key = $this->makeKeyForUserOld($userLoginData->getLoginUser(), $userPass ?: $userLoginData->getLoginPass());
// }
if ($userPass === null && $userLoginResponse->getIsChangedPass() === 1) {
return new UserPassResponse(self::MPASS_CHECKOLD);
}
try {
$key = $this->makeKeyForUser($userLoginData->getLoginUser(), $userPass ?: $userLoginData->getLoginPass());
$clearMPass = Crypt::decrypt($userLoginResponse->getMPass(), $userLoginResponse->getMKey(), $key);
// Comprobamos el hash de la clave del usuario con la guardada
if (Hash::checkHashKey($clearMPass, $configHashMPass)) {
$this->setMasterKeyInContext($clearMPass);
$response = new UserPassResponse(self::MPASS_OK, $clearMPass);
$response->setCryptMasterPass($userLoginResponse->getMPass());
$response->setCryptSecuredKey($userLoginResponse->getMKey());
return $response;
}
} catch (CryptoException $e) {
return new UserPassResponse(self::MPASS_CHECKOLD);
}
return new UserPassResponse(self::MPASS_WRONG);
}
/**
* Obtener una clave de cifrado basada en la clave del usuario y un salt.
*
* @param string $userLogin
* @param string $userPass
*
* @return string con la clave de cifrado
*/
public function makeKeyForUser($userLogin, $userPass)
{
// Use always the most recent config data
if (Config::getTimeUpdated() > $this->configData->getConfigDate()) {
return trim($userPass . $userLogin . $this->config->getConfigData()->getPasswordSalt());
} else {
return trim($userPass . $userLogin . $this->configData->getPasswordSalt());
}
}
/**
* Actualizar la clave maestra del usuario al realizar login
*
* @param string $userMPass con la clave maestra
* @param UserLoginData $userLoginData $userLoginData
*
* @return UserPassResponse
* @throws SPException
* @throws CryptoException
* @throws ContainerExceptionInterface
* @throws NotFoundExceptionInterface
* @throws SPException
*/
public function updateMasterPassOnLogin($userMPass, UserLoginData $userLoginData)
{
$userData = $userLoginData->getUserLoginResponse();
$configHashMPass = $this->configService->getByParam('masterPwd');
if ($configHashMPass === false) {
return new UserPassResponse(self::MPASS_NOTSET);
}
if (null === $configHashMPass) {
$configHashMPass = Hash::hashKey($userMPass);
$this->configService->save('masterPwd', $configHashMPass);
}
if (Hash::checkHashKey($userMPass, $configHashMPass)) {
$response = $this->createMasterPass($userMPass, $userLoginData->getLoginUser(), $userLoginData->getLoginPass());
$this->userRepository->updateMasterPassById($userData->getId(), $response->getCryptMasterPass(), $response->getCryptSecuredKey());
// Tells that the master password has been updated
$this->context->setTrasientKey('mpass_updated', true);
$this->setMasterKeyInContext($userMPass);
return $response;
}
return new UserPassResponse(self::MPASS_WRONG);
}
/**
* Actualizar la clave maestra del usuario en la BBDD.
*
* @param string $masterPass
* @param string $userLogin
* @param string $userPass
*
* @return UserPassResponse
* @throws CryptoException
* @throws SPException
*/
public function createMasterPass($masterPass, $userLogin, $userPass)
{
$key = $this->makeKeyForUser($userLogin, $userPass);
$securedKey = Crypt::makeSecuredKey($key);
$cryptMPass = Crypt::encrypt($masterPass, $securedKey, $key);
if (strlen($securedKey) > 1000 || strlen($cryptMPass) > 1000) {
throw new SPException(
__u('Internal error'),
SPException::ERROR,
'',
Service::STATUS_INTERNAL_ERROR);
}
$response = new UserPassResponse(self::MPASS_OK, $masterPass);
$response->setCryptMasterPass($cryptMPass);
$response->setCryptSecuredKey($securedKey);
return $response;
}
/**
* @param int $id
* @param string $userPass
*
* @throws ConstraintException
* @throws QueryException
* @throws NoSuchItemException
*/
public function migrateUserPassById($id, string $userPass)
{
if ($this->userRepository->updatePassById($id, new UpdatePassRequest(Hash::hashKey($userPass))) === 0) {
throw new NoSuchItemException(__u('User does not exist'));
}
}
/**
* @throws ContainerExceptionInterface
* @throws NotFoundExceptionInterface
*/
protected function initialize()
{
$this->configData = $this->config->getConfigData();
$this->userRepository = $this->dic->get(UserRepository::class);
$this->configService = $this->dic->get(ConfigService::class);;
}
}