mirror of
https://github.com/nextcloud/server.git
synced 2026-02-03 20:41:22 -05:00
To continue this formatting madness, here's a tiny patch that adds unified formatting for control structures like if and loops as well as classes, their methods and anonymous functions. This basically forces the constructs to start on the same line. This is not exactly what PSR2 wants, but I think we can have a few exceptions with "our" style. The starting of braces on the same line is pracrically standard for our code. This also removes and empty lines from method/function bodies at the beginning and end. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
113 lines
3.3 KiB
PHP
113 lines
3.3 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
/**
|
|
* @copyright 2018 Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
*
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
*
|
|
* @license GNU AGPL version 3 or any later version
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
namespace OC\Authentication\TwoFactorAuth;
|
|
|
|
use OCP\IConfig;
|
|
use OCP\IGroupManager;
|
|
use OCP\IUser;
|
|
|
|
class MandatoryTwoFactor {
|
|
|
|
/** @var IConfig */
|
|
private $config;
|
|
|
|
/** @var IGroupManager */
|
|
private $groupManager;
|
|
|
|
public function __construct(IConfig $config, IGroupManager $groupManager) {
|
|
$this->config = $config;
|
|
$this->groupManager = $groupManager;
|
|
}
|
|
|
|
/**
|
|
* Get the state of enforced two-factor auth
|
|
*/
|
|
public function getState(): EnforcementState {
|
|
return new EnforcementState(
|
|
$this->config->getSystemValue('twofactor_enforced', 'false') === 'true',
|
|
$this->config->getSystemValue('twofactor_enforced_groups', []),
|
|
$this->config->getSystemValue('twofactor_enforced_excluded_groups', [])
|
|
);
|
|
}
|
|
|
|
/**
|
|
* Set the state of enforced two-factor auth
|
|
*/
|
|
public function setState(EnforcementState $state) {
|
|
$this->config->setSystemValue('twofactor_enforced', $state->isEnforced() ? 'true' : 'false');
|
|
$this->config->setSystemValue('twofactor_enforced_groups', $state->getEnforcedGroups());
|
|
$this->config->setSystemValue('twofactor_enforced_excluded_groups', $state->getExcludedGroups());
|
|
}
|
|
|
|
/**
|
|
* Check if two-factor auth is enforced for a specific user
|
|
*
|
|
* The admin(s) can enforce two-factor auth system-wide, for certain groups only
|
|
* and also have the option to exclude users of certain groups. This method will
|
|
* check their membership of those groups.
|
|
*
|
|
* @param IUser $user
|
|
*
|
|
* @return bool
|
|
*/
|
|
public function isEnforcedFor(IUser $user): bool {
|
|
$state = $this->getState();
|
|
if (!$state->isEnforced()) {
|
|
return false;
|
|
}
|
|
$uid = $user->getUID();
|
|
|
|
/*
|
|
* If there is a list of enforced groups, we only enforce 2FA for members of those groups.
|
|
* For all the other users it is not enforced (overruling the excluded groups list).
|
|
*/
|
|
if (!empty($state->getEnforcedGroups())) {
|
|
foreach ($state->getEnforcedGroups() as $group) {
|
|
if ($this->groupManager->isInGroup($uid, $group)) {
|
|
return true;
|
|
}
|
|
}
|
|
// Not a member of any of these groups -> no 2FA enforced
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* If the user is member of an excluded group, 2FA won't be enforced.
|
|
*/
|
|
foreach ($state->getExcludedGroups() as $group) {
|
|
if ($this->groupManager->isInGroup($uid, $group)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* No enforced groups configured and user not member of an excluded groups,
|
|
* so 2FA is enforced.
|
|
*/
|
|
return true;
|
|
}
|
|
}
|