nextcloud/apps/encryption/lib/Controller/RecoveryController.php

154 lines
5.3 KiB
PHP
Raw Permalink Normal View History

2015-02-24 13:05:19 -05:00
<?php
2015-02-24 13:05:19 -05:00
/**
* SPDX-FileCopyrightText: 2019-2024 Nextcloud GmbH and Nextcloud contributors
* SPDX-FileCopyrightText: 2016 ownCloud, Inc.
* SPDX-License-Identifier: AGPL-3.0-only
2015-02-24 13:05:19 -05:00
*/
namespace OCA\Encryption\Controller;
use OCA\Encryption\Recovery;
use OCP\AppFramework\Controller;
2015-04-22 13:26:06 -04:00
use OCP\AppFramework\Http;
use OCP\AppFramework\Http\Attribute\NoAdminRequired;
use OCP\AppFramework\Http\DataResponse;
use OCP\Encryption\Exceptions\GenericEncryptionException;
2015-02-24 13:05:19 -05:00
use OCP\IL10N;
use OCP\IRequest;
use Psr\Log\LoggerInterface;
2015-02-24 13:05:19 -05:00
class RecoveryController extends Controller {
public function __construct(
string $appName,
IRequest $request,
private IL10N $l,
private Recovery $recovery,
private LoggerInterface $logger,
) {
parent::__construct($appName, $request);
2015-02-24 13:05:19 -05:00
}
public function adminRecovery(string $recoveryPassword, string $confirmPassword, bool $adminEnableRecovery): DataResponse {
2015-02-24 13:05:19 -05:00
// Check if both passwords are the same
if (empty($recoveryPassword)) {
$errorMessage = $this->l->t('Missing recovery key password');
2015-04-20 10:23:09 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]],
2015-04-24 09:42:02 -04:00
Http::STATUS_BAD_REQUEST);
2015-02-24 13:05:19 -05:00
}
if (empty($confirmPassword)) {
$errorMessage = $this->l->t('Please repeat the recovery key password');
2015-04-20 10:23:09 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]],
2015-04-24 09:42:02 -04:00
Http::STATUS_BAD_REQUEST);
2015-02-24 13:05:19 -05:00
}
if ($recoveryPassword !== $confirmPassword) {
$errorMessage = $this->l->t('Repeated recovery key password does not match the provided recovery key password');
2015-04-20 10:23:09 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]],
2015-04-24 09:42:02 -04:00
Http::STATUS_BAD_REQUEST);
2015-02-24 13:05:19 -05:00
}
try {
if ($adminEnableRecovery) {
if ($this->recovery->enableAdminRecovery($recoveryPassword)) {
return new DataResponse(['data' => ['message' => $this->l->t('Recovery key successfully enabled')]]);
}
return new DataResponse(['data' => ['message' => $this->l->t('Could not enable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
} else {
if ($this->recovery->disableAdminRecovery($recoveryPassword)) {
return new DataResponse(['data' => ['message' => $this->l->t('Recovery key successfully disabled')]]);
}
return new DataResponse(['data' => ['message' => $this->l->t('Could not disable recovery key. Please check your recovery key password!')]], Http::STATUS_BAD_REQUEST);
2015-02-24 13:05:19 -05:00
}
} catch (\Exception $e) {
$this->logger->error('Error enabling or disabling recovery key', ['exception' => $e]);
if ($e instanceof GenericEncryptionException) {
return new DataResponse(['data' => ['message' => $e->getMessage()]], Http::STATUS_INTERNAL_SERVER_ERROR);
2015-02-24 13:05:19 -05:00
}
return new DataResponse([], Http::STATUS_INTERNAL_SERVER_ERROR);
}
}
public function changeRecoveryPassword(string $newPassword, string $oldPassword, string $confirmPassword): DataResponse {
//check if both passwords are the same
if (empty($oldPassword)) {
$errorMessage = $this->l->t('Please provide the old recovery password');
2015-04-24 09:42:02 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
}
if (empty($newPassword)) {
$errorMessage = $this->l->t('Please provide a new recovery password');
return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
}
if (empty($confirmPassword)) {
$errorMessage = $this->l->t('Please repeat the new recovery password');
2015-04-24 09:42:02 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
}
if ($newPassword !== $confirmPassword) {
$errorMessage = $this->l->t('Repeated recovery key password does not match the provided recovery key password');
2015-04-24 09:42:02 -04:00
return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
}
try {
$result = $this->recovery->changeRecoveryKeyPassword($newPassword,
$oldPassword);
if ($result) {
return new DataResponse(
[
'data' => [
'message' => $this->l->t('Password successfully changed.')]
]
);
}
return new DataResponse([
2015-04-20 13:49:21 -04:00
'data' => [
'message' => $this->l->t('Could not change the password. Maybe the old password was not correct.')
2015-04-20 13:49:21 -04:00
]
2015-04-24 09:42:02 -04:00
], Http::STATUS_BAD_REQUEST);
} catch (\Exception $e) {
$this->logger->error('Error changing recovery password', ['exception' => $e]);
if ($e instanceof GenericEncryptionException) {
return new DataResponse(['data' => ['message' => $e->getMessage()]], Http::STATUS_INTERNAL_SERVER_ERROR);
}
return new DataResponse([], Http::STATUS_INTERNAL_SERVER_ERROR);
}
2015-02-24 13:05:19 -05:00
}
2015-04-01 08:24:56 -04:00
/**
2015-04-09 04:46:46 -04:00
* @param string $userEnableRecovery
* @return DataResponse
2015-04-01 08:24:56 -04:00
*/
#[NoAdminRequired]
public function userSetRecovery($userEnableRecovery) {
if ($userEnableRecovery === '0' || $userEnableRecovery === '1') {
$result = $this->recovery->setRecoveryForUser($userEnableRecovery);
if ($result) {
2015-04-22 10:41:47 -04:00
if ($userEnableRecovery === '0') {
return new DataResponse(
[
'data' => [
'message' => $this->l->t('Recovery Key disabled')]
2015-04-22 10:41:47 -04:00
]
);
}
return new DataResponse(
2015-04-22 10:41:47 -04:00
[
2015-04-20 13:49:21 -04:00
'data' => [
'message' => $this->l->t('Recovery Key enabled')]
2015-04-22 10:41:47 -04:00
]
);
}
}
2015-04-20 13:49:21 -04:00
return new DataResponse(
2015-04-22 10:41:47 -04:00
[
2015-04-20 13:49:21 -04:00
'data' => [
'message' => $this->l->t('Could not enable the recovery key, please try again or contact your administrator')
2015-04-20 13:49:21 -04:00
]
2015-04-24 09:42:02 -04:00
], Http::STATUS_BAD_REQUEST);
}
2015-02-24 13:05:19 -05:00
}