LDAPAccountManager/lam/lib/webauthn.inc

703 lines
23 KiB
PHP
Raw Normal View History

2019-11-21 21:03:42 +00:00
<?php
2019-11-24 08:45:57 +00:00
2019-11-21 21:03:42 +00:00
namespace LAM\LOGIN\WEBAUTHN;
2019-11-24 08:45:57 +00:00
2019-11-28 20:19:44 +00:00
use CBOR\Decoder;
use CBOR\OtherObject\OtherObjectManager;
use CBOR\Tag\TagObjectManager;
use Cose\Algorithm\Manager;
use Cose\Algorithm\Signature\ECDSA\ES256;
use Cose\Algorithm\Signature\ECDSA\ES384;
use Cose\Algorithm\Signature\ECDSA\ES512;
use Cose\Algorithm\Signature\EdDSA\EdDSA;
use Cose\Algorithm\Signature\RSA\RS1;
use Cose\Algorithm\Signature\RSA\RS256;
use Cose\Algorithm\Signature\RSA\RS384;
use Cose\Algorithm\Signature\RSA\RS512;
2019-11-24 08:45:57 +00:00
use \Cose\Algorithms;
2019-11-30 13:23:49 +00:00
use Nyholm\Psr7\Factory\Psr17Factory;
use PDO;
2019-11-30 13:23:49 +00:00
use Symfony\Bridge\PsrHttpMessage\Factory\PsrHttpFactory;
2019-11-30 07:48:01 +00:00
use Symfony\Component\HttpFoundation\Request;
2019-12-31 16:01:51 +00:00
use Throwable;
2019-11-28 20:19:44 +00:00
use Webauthn\AttestationStatement\AndroidKeyAttestationStatementSupport;
2019-11-30 07:48:01 +00:00
use Webauthn\AttestationStatement\AttestationObjectLoader;
2019-11-28 20:19:44 +00:00
use Webauthn\AttestationStatement\AttestationStatementSupportManager;
use Webauthn\AttestationStatement\FidoU2FAttestationStatementSupport;
use Webauthn\AttestationStatement\NoneAttestationStatementSupport;
use Webauthn\AttestationStatement\PackedAttestationStatementSupport;
use Webauthn\AttestationStatement\TPMAttestationStatementSupport;
2019-11-30 07:48:01 +00:00
use Webauthn\AuthenticationExtensions\ExtensionOutputCheckerHandler;
2019-12-31 16:01:51 +00:00
use Webauthn\AuthenticatorAssertionResponse;
use Webauthn\AuthenticatorAssertionResponseValidator;
2019-11-30 07:48:01 +00:00
use Webauthn\AuthenticatorAttestationResponse;
use Webauthn\AuthenticatorAttestationResponseValidator;
2019-11-24 08:45:57 +00:00
use \Webauthn\PublicKeyCredentialCreationOptions;
use Webauthn\PublicKeyCredentialDescriptor;
2019-11-30 07:48:01 +00:00
use Webauthn\PublicKeyCredentialLoader;
2019-12-31 16:01:51 +00:00
use Webauthn\PublicKeyCredentialRequestOptions;
2019-11-24 08:45:57 +00:00
use \Webauthn\PublicKeyCredentialRpEntity;
use \Webauthn\PublicKeyCredentialParameters;
2019-11-30 07:48:01 +00:00
use Webauthn\PublicKeyCredentialSource;
use Webauthn\PublicKeyCredentialSourceRepository;
2019-11-24 08:45:57 +00:00
use \Webauthn\PublicKeyCredentialUserEntity;
use \Webauthn\AuthenticationExtensions\AuthenticationExtensionsClientInputs;
use \Webauthn\AuthenticatorSelectionCriteria;
2019-11-28 20:19:44 +00:00
use Webauthn\TokenBinding\IgnoreTokenBindingHandler;
2019-12-19 21:01:54 +00:00
use \LAMException;
2019-11-24 08:45:57 +00:00
2019-11-21 21:03:42 +00:00
/*
This code is part of LDAP Account Manager (http://www.ldap-account-manager.org/)
2020-01-05 18:05:55 +00:00
Copyright (C) 2019 - 2020 Roland Gruber
2019-11-21 21:03:42 +00:00
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
/**
2019-11-24 08:45:57 +00:00
* Manages webauthn requests.
*
* @author Roland Gruber
*/
2019-11-21 21:03:42 +00:00
2019-11-30 13:23:49 +00:00
include_once __DIR__ . '/3rdParty/composer/autoload.php';
2019-11-21 21:03:42 +00:00
/**
2019-12-21 14:08:48 +00:00
* Manages Webauthn registrations and authentications.
2019-11-21 21:03:42 +00:00
*
2019-12-21 14:08:48 +00:00
* @package LAM\LOGIN\WEBAUTHN
2019-11-21 21:03:42 +00:00
*/
2019-12-21 14:08:48 +00:00
class WebauthnManager {
2019-11-21 21:03:42 +00:00
2019-12-21 14:08:48 +00:00
/**
* Returns if the given DN is registered for webauthn.
*
* @param string $dn DN
* @return boolean is registered
*/
public function isRegistered($dn) {
$database = $this->getDatabase();
$userEntity = $this->getUserEntity($dn);
$results = $database->findAllForUserEntity($userEntity);
return !empty($results);
}
2019-11-24 08:45:57 +00:00
2019-12-21 14:08:48 +00:00
/**
* Returns a challenge for a new token.
*
* @param string $dn DN
* @param bool $isSelfService is executed in self service
2020-01-11 16:29:05 +00:00
* @param array $extraExcludedKeys credentialIds that should be added to excluded keys
2019-12-21 14:08:48 +00:00
* @return PublicKeyCredentialCreationOptions registration object
*/
2020-01-11 16:29:05 +00:00
public function getRegistrationObject($dn, $isSelfService, $extraExcludedKeys = array()) {
2019-12-21 14:08:48 +00:00
$rpEntity = $this->createRpEntry($isSelfService);
$userEntity = $this->getUserEntity($dn);
2019-12-31 16:01:51 +00:00
$challenge = $this->createChallenge();
2019-12-21 14:08:48 +00:00
$credentialParameters = $this->getCredentialParameters();
2020-01-11 16:29:05 +00:00
$excludedKeys = $this->getExcludedKeys($userEntity, $extraExcludedKeys);
2019-12-31 16:01:51 +00:00
$timeout = $this->getTimeout();
2020-06-01 18:08:58 +00:00
$authenticatorSelectionCriteria = new AuthenticatorSelectionCriteria(null, false, AuthenticatorSelectionCriteria::USER_VERIFICATION_REQUIREMENT_DISCOURAGED);
2019-12-21 14:08:48 +00:00
$registrationObject = new PublicKeyCredentialCreationOptions(
$rpEntity,
$userEntity,
$challenge,
$credentialParameters,
$timeout,
$excludedKeys,
2020-06-01 18:08:58 +00:00
$authenticatorSelectionCriteria,
2019-12-21 14:08:48 +00:00
PublicKeyCredentialCreationOptions::ATTESTATION_CONVEYANCE_PREFERENCE_NONE,
new AuthenticationExtensionsClientInputs());
2020-08-07 20:07:47 +00:00
logNewMessage(LOG_DEBUG, 'WebAuthn registration: ' . json_encode($registrationObject));
2019-12-21 14:08:48 +00:00
return $registrationObject;
2019-11-25 20:07:23 +00:00
}
2019-11-21 21:03:42 +00:00
2019-12-21 14:13:48 +00:00
/**
* Verifies the registration and stores it in the database.
*
* @param PublicKeyCredentialCreationOptions $registration registration object
* @param string $clientResponse client response
* @return bool true if response is valid and registration succeeded
*/
public function storeNewRegistration($registration, $clientResponse) {
$decoder = $this->getCborDecoder();
$tokenBindingHandler = new IgnoreTokenBindingHandler();
$attestationSupportManager = $this->getAttestationSupportManager($decoder);
$attestationObjectLoader = $this->getAttestationObjectLoader($attestationSupportManager, $decoder);
$publicKeyCredentialLoader = $this->getPublicKeyCredentialLoader($attestationObjectLoader, $decoder);
$extensionOutputCheckerHandler = $this->getExtensionOutputChecker();
$repository = new PublicKeyCredentialSourceRepositorySQLite();
$responseValidator = new AuthenticatorAttestationResponseValidator(
$attestationSupportManager, $repository, $tokenBindingHandler, $extensionOutputCheckerHandler);
try {
$publicKeyCredential = $publicKeyCredentialLoader->load($clientResponse);
$authenticatorAttestationResponse = $publicKeyCredential->getResponse();
if (!$authenticatorAttestationResponse instanceof AuthenticatorAttestationResponse) {
logNewMessage(LOG_ERR, 'Invalid webauthn response: ' . $clientResponse);
return false;
}
$symfonyRequest = Request::createFromGlobals();
$psr17Factory = new Psr17Factory();
$psrFactory = new PsrHttpFactory($psr17Factory, $psr17Factory, $psr17Factory, $psr17Factory);
$psr7Request = $psrFactory->createRequest($symfonyRequest);
$publicKeyCredentialSource = $responseValidator->check($authenticatorAttestationResponse, $registration, $psr7Request);
$repository->saveCredentialSource($publicKeyCredentialSource);
return true;
}
catch (\Throwable $exception) {
2020-08-07 20:07:47 +00:00
logNewMessage(LOG_ERR, 'WebAuthn validation failed: ' . $exception->getMessage() . $exception->getTraceAsString());
2019-12-21 14:13:48 +00:00
}
return false;
}
2020-01-11 16:29:05 +00:00
/**
* Returns a public key credential loader.
*
* @return PublicKeyCredentialLoader public key credential loader
*/
public function createPublicKeyCredentialLoader() {
$decoder = $this->getCborDecoder();
$attestationSupportManager = $this->getAttestationSupportManager($decoder);
$attestationObjectLoader = $this->getAttestationObjectLoader($attestationSupportManager, $decoder);
return $this->getPublicKeyCredentialLoader($attestationObjectLoader, $decoder);
}
2019-12-21 14:08:48 +00:00
/**
* Returns the user entity for the registration.
*
* @param $dn DN
* @return PublicKeyCredentialUserEntity user entity
*/
private function getUserEntity($dn) {
return new PublicKeyCredentialUserEntity(
$dn,
$dn,
extractRDNValue($dn),
null
);
}
2019-11-21 21:03:42 +00:00
2019-12-21 14:08:48 +00:00
/**
* Returns the part that identifies the server and application.
*
* @param bool $isSelfService is executed in self service
* @return PublicKeyCredentialRpEntity relying party entry
*/
private function createRpEntry($isSelfService) {
$pathPrefix = $isSelfService ? '../' : '';
$icon = $pathPrefix . '../graphics/logo136.png';
2020-01-08 19:38:26 +00:00
if ($isSelfService) {
$domain = $_SESSION['selfServiceProfile']->twoFactorAuthenticationDomain;
}
else {
2019-12-21 14:08:48 +00:00
$domain = $_SESSION['config']->getTwoFactorAuthenticationDomain();
}
return new PublicKeyCredentialRpEntity(
'LDAP Account Manager', //Name
$domain,
$icon
);
}
2019-11-21 21:03:42 +00:00
2019-12-21 14:08:48 +00:00
/**
* Returns the supported credential algorithms.
*
* @return array algorithms
*/
private function getCredentialParameters() {
return array(
new PublicKeyCredentialParameters('public-key', Algorithms::COSE_ALGORITHM_ES256),
new PublicKeyCredentialParameters('public-key', Algorithms::COSE_ALGORITHM_RS256),
);
}
2019-12-21 14:08:48 +00:00
/**
* Returns a list of all credential ids that are already registered.
*
* @param PublicKeyCredentialUserEntity $user user data
2020-01-11 16:29:05 +00:00
* @param array $extraExcludedKeys credentialIds that should be added to excluded keys
2019-12-21 14:08:48 +00:00
* @return PublicKeyCredentialDescriptor[] credential ids
*/
2020-01-11 16:29:05 +00:00
private function getExcludedKeys($user, $extraExcludedKeys = array()) {
2019-12-21 14:08:48 +00:00
$keys = array();
$repository = $this->getDatabase();
$credentialSources = $repository->findAllForUserEntity($user);
foreach ($credentialSources as $credentialSource) {
$keys[] = new PublicKeyCredentialDescriptor(PublicKeyCredentialDescriptor::CREDENTIAL_TYPE_PUBLIC_KEY, $credentialSource->getPublicKeyCredentialId());
}
2020-01-11 16:29:05 +00:00
foreach ($extraExcludedKeys as $extraExcludedKey) {
$keys[] = new PublicKeyCredentialDescriptor(PublicKeyCredentialDescriptor::CREDENTIAL_TYPE_PUBLIC_KEY, $extraExcludedKey);
}
2019-12-21 14:08:48 +00:00
return $keys;
}
/**
2019-12-21 14:13:48 +00:00
* Returns a CBOR decoder.
2019-12-21 14:08:48 +00:00
*
2019-12-21 14:13:48 +00:00
* @return Decoder decoder
2019-12-21 14:08:48 +00:00
*/
2019-12-21 14:13:48 +00:00
private function getCborDecoder() {
return new Decoder(new TagObjectManager(), new OtherObjectManager());
2019-12-21 14:08:48 +00:00
}
2019-12-21 14:13:48 +00:00
/**
* Creates the attestation support manager.
*
* @param Decoder $decoder decoder
* @return AttestationStatementSupportManager manager
*/
private function getAttestationSupportManager($decoder) {
$manager = new AttestationStatementSupportManager();
$manager->add(new NoneAttestationStatementSupport());
$manager->add(new FidoU2FAttestationStatementSupport());
$manager->add(new AndroidKeyAttestationStatementSupport($decoder));
$manager->add(new TPMAttestationStatementSupport());
2019-12-31 16:01:51 +00:00
$coseManager = $this->getAlgorithmManager();
$manager->add(new PackedAttestationStatementSupport($decoder, $coseManager));
return $manager;
}
/**
* Returns the COSE algorithm manager.
*
* @return Manager algorithm manager
*/
private function getAlgorithmManager() {
2019-12-21 14:13:48 +00:00
$coseManager = new Manager();
$coseManager->add(new ES256());
$coseManager->add(new ES384());
$coseManager->add(new ES512());
$coseManager->add(new EdDSA());
$coseManager->add(new RS1());
$coseManager->add(new RS256());
$coseManager->add(new RS384);
$coseManager->add(new RS512());
2019-12-31 16:01:51 +00:00
return $coseManager;
2019-11-30 07:48:01 +00:00
}
2019-11-28 20:19:44 +00:00
2019-12-21 14:13:48 +00:00
/**
* Returns the attestation object loader.
*
* @param AttestationStatementSupportManager $manager support manager
* @param Decoder $decoder decoder
* @return AttestationObjectLoader attestation object loader
*/
private function getAttestationObjectLoader($manager, $decoder) {
return new AttestationObjectLoader($manager, $decoder);
}
2019-11-28 20:19:44 +00:00
2019-12-21 14:13:48 +00:00
/**
* Creates the public key credential loader.
*
* @param AttestationObjectLoader $attestationObjectLoader attestation object loader
* @param Decoder $decoder decoder
* @return PublicKeyCredentialLoader public key credential loader
*/
private function getPublicKeyCredentialLoader($attestationObjectLoader, $decoder) {
return new PublicKeyCredentialLoader($attestationObjectLoader, $decoder);
}
2019-11-30 07:48:01 +00:00
2019-12-21 14:13:48 +00:00
/**
* Returns the extension output checker handler.
* No extensions are checked at this time.
*
* @return ExtensionOutputCheckerHandler handler
*/
2019-12-21 18:40:29 +00:00
private function getExtensionOutputChecker() {
2019-12-21 14:13:48 +00:00
return new ExtensionOutputCheckerHandler();
}
2019-11-30 07:48:01 +00:00
2019-12-21 14:13:48 +00:00
/**
* Returns the webauthn database.
*
* @return PublicKeyCredentialSourceRepositorySQLite database
*/
public function getDatabase() {
return new PublicKeyCredentialSourceRepositorySQLite();
}
2019-11-30 07:48:01 +00:00
2019-12-31 16:01:51 +00:00
/**
* Returns the timeout for user operations.
*
* @return int timeout in ms
*/
private function getTimeout() {
return 120000;
}
/**
* Creates a new challenge.
*
* @return String challenge
*/
private function createChallenge() {
return generateRandomPassword(32);
}
/**
* Returns the authentication object for a registered user.
*
* @param $userDN user DN
* @param bool $isSelfService self service
* @return PublicKeyCredentialRequestOptions authentication object
*/
public function getAuthenticationObject($userDN, bool $isSelfService) {
$timeout = $this->getTimeout();
$challenge = $this->createChallenge();
$database = $this->getDatabase();
$userEntity = $this->getUserEntity($userDN);
$publicKeyCredentialSources = $database->findAllForUserEntity($userEntity);
$publicKeyDescriptors = array();
foreach ($publicKeyCredentialSources as $publicKeyCredentialSource) {
$publicKeyDescriptors[] = $publicKeyCredentialSource->getPublicKeyCredentialDescriptor();
}
$userVerification = PublicKeyCredentialRequestOptions::USER_VERIFICATION_REQUIREMENT_DISCOURAGED;
$extensions = new AuthenticationExtensionsClientInputs();
$relyingParty = $this->createRpEntry($isSelfService);
return new PublicKeyCredentialRequestOptions(
$challenge,
$timeout,
$relyingParty->getId(),
$publicKeyDescriptors,
$userVerification,
$extensions
);
}
/**
* Checks if the provided authentication is valid.
*
* @param string $response authentication response
* @param string $userDn user DN
* @return bool true if all is ok
*/
public function isValidAuthentication(string $response, string $userDn) {
$database = $this->getDatabase();
$decoder = $this->getCborDecoder();
$tokenBindingHandler = new IgnoreTokenBindingHandler();
$extensionOutputCheckerHandler = $this->getExtensionOutputChecker();
$algorithmManager = $this->getAlgorithmManager();
$responseValidator = new AuthenticatorAssertionResponseValidator(
$database,
$decoder,
$tokenBindingHandler,
$extensionOutputCheckerHandler,
$algorithmManager
);
$attestationSupportManager = $this->getAttestationSupportManager($decoder);
$attestationObjectLoader = $this->getAttestationObjectLoader($attestationSupportManager, $decoder);
$publicKeyCredentialLoader = $this->getPublicKeyCredentialLoader($attestationObjectLoader, $decoder);
$publicKeyCredential = $publicKeyCredentialLoader->load($response);
$authenticatorAssertionResponse = $publicKeyCredential->getResponse();
if (!$authenticatorAssertionResponse instanceof AuthenticatorAssertionResponse) {
logNewMessage(LOG_ERR, 'Invalid authenticator assertion response');
return false;
}
try {
$symfonyRequest = Request::createFromGlobals();
$psr17Factory = new Psr17Factory();
$psrFactory = new PsrHttpFactory($psr17Factory, $psr17Factory, $psr17Factory, $psr17Factory);
$psr7Request = $psrFactory->createRequest($symfonyRequest);
$publicKeyCredentialRequestOptions = PublicKeyCredentialRequestOptions::createFromString($_SESSION['webauthn_authentication']);
$responseValidator->check(
$publicKeyCredential->getRawId(),
$publicKeyCredential->getResponse(),
$publicKeyCredentialRequestOptions,
$psr7Request,
$userDn
);
return true;
}
catch (Throwable $e) {
logNewMessage(LOG_ERR, 'Error validating webauthn authentication: ' . $e->getMessage());
}
return false;
}
2019-11-30 07:48:01 +00:00
}
/**
* Stores the public key credentials in the SQLite database.
*
* @package LAM\LOGIN\WEBAUTHN
*/
class PublicKeyCredentialSourceRepositorySQLite implements PublicKeyCredentialSourceRepository {
const TABLE_NAME = 'lam_webauthn';
2019-11-30 07:48:01 +00:00
/**
* Finds the public key for the given credential id.
*
* @param string $publicKeyCredentialId credential id
* @return PublicKeyCredentialSource|null credential source
*/
public function findOneByCredentialId(string $publicKeyCredentialId): ?PublicKeyCredentialSource {
try {
$pdo = $this->getPDO();
$statement = $pdo->prepare('select * from ' . self::TABLE_NAME . ' where credentialId = :credentialid');
$statement->execute(array(':credentialid' => base64_encode($publicKeyCredentialId)));
$results = $statement->fetchAll();
if (!empty($results)) {
$jsonArray = json_decode($results[0]['credentialSource'], true);
return PublicKeyCredentialSource::createFromArray($jsonArray);
}
}
catch (\PDOException $e) {
2020-08-07 20:07:47 +00:00
logNewMessage(LOG_ERR, 'WebAuthn database error: ' . $e->getMessage());
}
2019-11-30 07:48:01 +00:00
return null;
}
/**
* Finds all credential entries for the given user.
*
* @param PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity credential user entity
* @return PublicKeyCredentialSource[] credential sources
*/
public function findAllForUserEntity(PublicKeyCredentialUserEntity $publicKeyCredentialUserEntity): array {
$credentials = array();
try {
$pdo = $this->getPDO();
$statement = $pdo->prepare('select * from ' . self::TABLE_NAME . ' where userId = :userid');
$statement->execute(array(':userid' => $publicKeyCredentialUserEntity->getId()));
$results = $statement->fetchAll();
foreach ($results as $result) {
2020-01-01 16:17:35 +00:00
$jsonArray = json_decode($result['credentialSource'], true);
$credentials[] = PublicKeyCredentialSource::createFromArray($jsonArray);
}
}
catch (\PDOException $e) {
2020-08-07 20:07:47 +00:00
logNewMessage(LOG_ERR, 'WebAuthn database error: ' . $e->getMessage());
}
return $credentials;
2019-11-30 07:48:01 +00:00
}
/**
* Saves the given credential in the database.
*
* @param PublicKeyCredentialSource $publicKeyCredentialSource credential
*/
public function saveCredentialSource(PublicKeyCredentialSource $publicKeyCredentialSource): void {
$json = json_encode($publicKeyCredentialSource);
$credentialId = base64_encode($publicKeyCredentialSource->getPublicKeyCredentialId());
$userId = $publicKeyCredentialSource->getUserHandle();
2019-12-31 16:01:51 +00:00
$currentTime = time();
$pdo = $this->getPDO();
2019-12-31 16:01:51 +00:00
$statement = $pdo->prepare('select * from ' . self::TABLE_NAME . ' where userId = :userId and credentialId = :credentialId');
$statement->execute(array(
2019-12-31 16:01:51 +00:00
':userId' => $userId,
':credentialId' => $credentialId
));
2019-12-31 16:01:51 +00:00
$results = $statement->fetchAll();
if (empty($results)) {
$statement = $pdo->prepare('insert into ' . self::TABLE_NAME . ' (userId, credentialId, credentialSource, registrationTime, lastUseTime) VALUES (?, ?, ?, ?, ?)');
$statement->execute(array(
$userId,
$credentialId,
$json,
$currentTime,
$currentTime
));
logNewMessage(LOG_DEBUG, 'Stored new credential for ' . $userId);
}
else {
$statement = $pdo->prepare(
'update ' . self::TABLE_NAME .
' set credentialSource = :credentialSource, lastUseTime = :lastUseTime' .
' WHERE userId = :userId AND credentialId = :credentialId'
);
$statement->execute(array(
':credentialSource' => $json,
':lastUseTime' => $currentTime,
':userId' => $userId,
':credentialId' => $credentialId
));
logNewMessage(LOG_DEBUG, 'Stored updated credential for ' . $userId);
}
}
/**
* Returns the database URL.
*
* @return string the PDO URL
*/
2019-12-21 13:18:03 +00:00
public function getPdoUrl() {
$fileName = dirname(__FILE__) . '/../config/__lam.webauthn.sqlite';
if (!file_exists($fileName)) {
$handle = fopen($fileName, 'w');
fclose($handle);
chmod($fileName, 0600);
}
return 'sqlite:' . $fileName;
}
2020-01-04 17:28:25 +00:00
/**
* Returns if there are any credentials in the database.
*
* @return bool at least one credential in the database
*/
public function hasRegisteredCredentials() {
$pdo = $this->getPDO();
$statement = $pdo->prepare('select count(*) from ' . self::TABLE_NAME);
$statement->execute();
$results = $statement->fetchAll();
return ($results[0][0] > 0);
}
/**
* Performs a full-text search on the user names and returns all devices found.
*
* @param string $searchTerm search term for user field
* @return array list of devices array('dn' => ..., 'credentialId' => ..., 'lastUseTime' => ..., 'registrationTime' => ...)
*/
public function searchDevices(string $searchTerm) {
$pdo = $this->getPDO();
2020-01-06 11:26:50 +00:00
$statement = $pdo->prepare('select * from ' . self::TABLE_NAME . ' where userId like :searchTerm order by userId,registrationTime');
2020-01-04 17:28:25 +00:00
$statement->execute(array(
2020-01-05 18:05:55 +00:00
':searchTerm' => $searchTerm
2020-01-04 17:28:25 +00:00
));
$results = $statement->fetchAll();
$devices = array();
foreach ($results as $result) {
$devices[] = array(
'dn' => $result['userId'],
'credentialId' => $result['credentialId'],
'lastUseTime' => $result['lastUseTime'],
'registrationTime' => $result['registrationTime']
);
}
return $devices;
}
/**
* Deletes a single device from the database.
*
* @param string $dn user DN
* @param string $credentialId credential id
* @return bool deletion was ok
*/
public function deleteDevice(string $dn, string $credentialId) {
logNewMessage(LOG_NOTICE, 'Delete webauthn device ' . $credentialId . ' of ' . $dn);
$pdo = $this->getPDO();
$statement = $pdo->prepare('delete from ' . self::TABLE_NAME . ' where userId = :userId and credentialId = :credentialId');
2020-03-13 19:59:30 +00:00
$statement->execute(array(
2020-01-04 17:28:25 +00:00
':userId' => $dn,
':credentialId' => $credentialId
));
return $statement->rowCount() > 0;
}
/**
* Returns the PDO.
*
* @return PDO PDO
*/
protected function getPDO() {
$pdo = new PDO($this->getPdoUrl(), null, null, array(
PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION
));
// initial schema
if (!$this->tableExists($pdo, self::TABLE_NAME)) {
$this->createInitialSchema($pdo);
}
return $pdo;
}
/**
* Checks if the given table name exists.
*
* @param PDO $pdo PDO object
* @param String $tableName table name to check
* @return boolean table exists
*/
protected function tableExists(&$pdo, $tableName) {
try {
$result = $pdo->query("SELECT 1 FROM $tableName LIMIT 1");
2020-01-01 16:17:35 +00:00
return ($result !== false);
} catch (\PDOException $e) {
return false;
}
}
/**
* Creates the initial schema.
*
* @param PDO $pdo PDO object
*/
protected function createInitialSchema($pdo) {
logNewMessage(LOG_DEBUG, 'Creating database table ' . self::TABLE_NAME);
$sql = 'create table ' . self::TABLE_NAME . '('
. 'userId TEXT NOT NULL,'
. 'credentialId TEXT NOT NULL,'
. 'credentialSource TEXT NOT NULL,'
. 'registrationTime VARCHAR(11) NOT NULL,'
2019-12-31 16:01:51 +00:00
. 'lastUseTime VARCHAR(11) NOT NULL,'
. 'PRIMARY KEY(userId,credentialId)'
. ');';
$pdo->exec($sql);
2019-11-30 07:48:01 +00:00
}
2020-07-08 18:46:56 +00:00
/**
* Exports all entries.
*
* @return array data
*/
public function export() {
$pdo = $this->getPDO();
$statement = $pdo->prepare('select * from ' . self::TABLE_NAME);
$statement->execute();
$dbData = $statement->fetchAll();
$data = array();
foreach ($dbData as $dbRow) {
$data[] = array(
'userId' => $dbRow['userId'],
'credentialId' => $dbRow['credentialId'],
'credentialSource' => $dbRow['credentialSource'],
'registrationTime' => $dbRow['registrationTime'],
'lastUseTime' => $dbRow['lastUseTime'],
);
}
return $data;
}
/**
* Imports entries from export data.
*
* @param array $data export data
*/
public function import($data) {
$pdo = $this->getPDO();
$statement = $pdo->prepare('delete from ' . self::TABLE_NAME);
$statement->execute();
if (empty($data)) {
return;
}
foreach ($data as $dbRow) {
$statement = $pdo->prepare('insert into ' . self::TABLE_NAME . ' (userId, credentialId, credentialSource, registrationTime, lastUseTime) VALUES (?, ?, ?, ?, ?)');
$statement->execute(array(
$dbRow['userId'],
$dbRow['credentialId'],
$dbRow['credentialSource'],
$dbRow['registrationTime'],
$dbRow['lastUseTime']
));
}
}
2019-11-30 07:48:01 +00:00
}