mirror of
https://github.com/nextcloud/server.git
synced 2025-03-01 02:55:29 +00:00
feat(perf): add cache for authtoken lookup
Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
This commit is contained in:
parent
6f95febe17
commit
d1189f923c
4 changed files with 93 additions and 82 deletions
lib/private/Authentication/Token
tests/lib/Authentication/Token
|
@ -29,6 +29,7 @@ namespace OC\Authentication\Token;
|
|||
|
||||
use OCP\AppFramework\Db\DoesNotExistException;
|
||||
use OCP\AppFramework\Db\QBMapper;
|
||||
use OCP\Authentication\Token\IToken;
|
||||
use OCP\DB\QueryBuilder\IQueryBuilder;
|
||||
use OCP\IDBConnection;
|
||||
|
||||
|
@ -42,8 +43,6 @@ class PublicKeyTokenMapper extends QBMapper {
|
|||
|
||||
/**
|
||||
* Invalidate (delete) a given token
|
||||
*
|
||||
* @param string $token
|
||||
*/
|
||||
public function invalidate(string $token) {
|
||||
/* @var $qb IQueryBuilder */
|
||||
|
@ -150,14 +149,15 @@ class PublicKeyTokenMapper extends QBMapper {
|
|||
return $entities;
|
||||
}
|
||||
|
||||
public function deleteById(string $uid, int $id) {
|
||||
public function getTokenByUserAndId(string $uid, int $id): ?string {
|
||||
/* @var $qb IQueryBuilder */
|
||||
$qb = $this->db->getQueryBuilder();
|
||||
$qb->delete($this->tableName)
|
||||
$qb->select('token')
|
||||
->from($this->tableName)
|
||||
->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
|
||||
->andWhere($qb->expr()->eq('uid', $qb->createNamedParameter($uid)))
|
||||
->andWhere($qb->expr()->eq('version', $qb->createNamedParameter(PublicKeyToken::VERSION, IQueryBuilder::PARAM_INT)));
|
||||
$qb->execute();
|
||||
return $qb->executeQuery()->fetchOne() ?: null;
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -38,7 +38,8 @@ use OCP\AppFramework\Db\DoesNotExistException;
|
|||
use OCP\AppFramework\Db\TTransactional;
|
||||
use OCP\AppFramework\Utility\ITimeFactory;
|
||||
use OCP\Authentication\Token\IToken as OCPIToken;
|
||||
use OCP\Cache\CappedMemoryCache;
|
||||
use OCP\ICache;
|
||||
use OCP\ICacheFactory;
|
||||
use OCP\IConfig;
|
||||
use OCP\IDBConnection;
|
||||
use OCP\IUserManager;
|
||||
|
@ -48,6 +49,8 @@ use Psr\Log\LoggerInterface;
|
|||
|
||||
class PublicKeyTokenProvider implements IProvider {
|
||||
public const TOKEN_MIN_LENGTH = 22;
|
||||
/** Token cache TTL in seconds */
|
||||
private const TOKEN_CACHE_TTL = 10;
|
||||
|
||||
use TTransactional;
|
||||
|
||||
|
@ -68,10 +71,11 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
/** @var ITimeFactory */
|
||||
private $time;
|
||||
|
||||
/** @var CappedMemoryCache */
|
||||
/** @var ICache */
|
||||
private $cache;
|
||||
|
||||
private IHasher $hasher;
|
||||
/** @var IHasher */
|
||||
private $hasher;
|
||||
|
||||
public function __construct(PublicKeyTokenMapper $mapper,
|
||||
ICrypto $crypto,
|
||||
|
@ -79,7 +83,8 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
IDBConnection $db,
|
||||
LoggerInterface $logger,
|
||||
ITimeFactory $time,
|
||||
IHasher $hasher) {
|
||||
IHasher $hasher,
|
||||
ICacheFactory $cacheFactory) {
|
||||
$this->mapper = $mapper;
|
||||
$this->crypto = $crypto;
|
||||
$this->config = $config;
|
||||
|
@ -87,7 +92,9 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
$this->logger = $logger;
|
||||
$this->time = $time;
|
||||
|
||||
$this->cache = new CappedMemoryCache();
|
||||
$this->cache = $cacheFactory->isLocalCacheAvailable()
|
||||
? $cacheFactory->createLocal('authtoken_')
|
||||
: $cacheFactory->createInMemory();
|
||||
$this->hasher = $hasher;
|
||||
}
|
||||
|
||||
|
@ -129,7 +136,7 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
// Add the token to the cache
|
||||
$this->cache[$dbToken->getToken()] = $dbToken;
|
||||
$this->cacheToken($dbToken);
|
||||
|
||||
return $dbToken;
|
||||
}
|
||||
|
@ -157,45 +164,58 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
$tokenHash = $this->hashToken($tokenId);
|
||||
if ($token = $this->getTokenFromCache($tokenHash)) {
|
||||
$this->checkToken($token);
|
||||
return $token;
|
||||
}
|
||||
|
||||
if (isset($this->cache[$tokenHash])) {
|
||||
if ($this->cache[$tokenHash] instanceof DoesNotExistException) {
|
||||
$ex = $this->cache[$tokenHash];
|
||||
try {
|
||||
$token = $this->mapper->getToken($tokenHash);
|
||||
$this->cacheToken($token);
|
||||
} catch (DoesNotExistException $ex) {
|
||||
try {
|
||||
$token = $this->mapper->getToken($this->hashTokenWithEmptySecret($tokenId));
|
||||
$this->rotate($token, $tokenId, $tokenId);
|
||||
} catch (DoesNotExistException) {
|
||||
$this->cacheInvalidHash($tokenHash);
|
||||
throw new InvalidTokenException("Token does not exist: " . $ex->getMessage(), 0, $ex);
|
||||
}
|
||||
$token = $this->cache[$tokenHash];
|
||||
} else {
|
||||
try {
|
||||
$token = $this->mapper->getToken($tokenHash);
|
||||
$this->cache[$token->getToken()] = $token;
|
||||
} catch (DoesNotExistException $ex) {
|
||||
try {
|
||||
$token = $this->mapper->getToken($this->hashTokenWithEmptySecret($tokenId));
|
||||
$this->cache[$token->getToken()] = $token;
|
||||
$this->rotate($token, $tokenId, $tokenId);
|
||||
} catch (DoesNotExistException $ex2) {
|
||||
$this->cache[$tokenHash] = $ex2;
|
||||
throw new InvalidTokenException("Token does not exist: " . $ex->getMessage(), 0, $ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) {
|
||||
throw new ExpiredTokenException($token);
|
||||
}
|
||||
|
||||
if ($token->getType() === OCPIToken::WIPE_TOKEN) {
|
||||
throw new WipeTokenException($token);
|
||||
}
|
||||
|
||||
if ($token->getPasswordInvalid() === true) {
|
||||
//The password is invalid we should throw an TokenPasswordExpiredException
|
||||
throw new TokenPasswordExpiredException($token);
|
||||
}
|
||||
$this->checkToken($token);
|
||||
|
||||
return $token;
|
||||
}
|
||||
|
||||
/**
|
||||
* @throws InvalidTokenException when token doesn't exist
|
||||
*/
|
||||
private function getTokenFromCache(string $tokenHash): ?PublicKeyToken {
|
||||
$serializedToken = $this->cache->get($tokenHash);
|
||||
if (null === $serializedToken) {
|
||||
if ($this->cache->hasKey($tokenHash)) {
|
||||
throw new InvalidTokenException('Token does not exist: ' . $tokenHash);
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
$token = unserialize($serializedToken, [
|
||||
'allowed_classes' => [PublicKeyToken::class],
|
||||
]);
|
||||
|
||||
return $token instanceof PublicKeyToken ? $token : null;
|
||||
}
|
||||
|
||||
private function cacheToken(PublicKeyToken $token): void {
|
||||
$this->cache->set($token->getToken(), serialize($token), self::TOKEN_CACHE_TTL);
|
||||
}
|
||||
|
||||
private function cacheInvalidHash(string $tokenHash) {
|
||||
// Invalid entries can be kept longer in cache since it’s unlikely to reuse them
|
||||
$this->cache->set($tokenHash, null, self::TOKEN_CACHE_TTL * 2);
|
||||
}
|
||||
|
||||
public function getTokenById(int $tokenId): OCPIToken {
|
||||
try {
|
||||
$token = $this->mapper->getTokenById($tokenId);
|
||||
|
@ -203,6 +223,12 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
throw new InvalidTokenException("Token with ID $tokenId does not exist: " . $ex->getMessage(), 0, $ex);
|
||||
}
|
||||
|
||||
$this->checkToken($token);
|
||||
|
||||
return $token;
|
||||
}
|
||||
|
||||
private function checkToken($token): void {
|
||||
if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) {
|
||||
throw new ExpiredTokenException($token);
|
||||
}
|
||||
|
@ -215,13 +241,9 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
//The password is invalid we should throw an TokenPasswordExpiredException
|
||||
throw new TokenPasswordExpiredException($token);
|
||||
}
|
||||
|
||||
return $token;
|
||||
}
|
||||
|
||||
public function renewSessionToken(string $oldSessionId, string $sessionId): OCPIToken {
|
||||
$this->cache->clear();
|
||||
|
||||
return $this->atomic(function () use ($oldSessionId, $sessionId) {
|
||||
$token = $this->getToken($oldSessionId);
|
||||
|
||||
|
@ -243,7 +265,9 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
OCPIToken::TEMPORARY_TOKEN,
|
||||
$token->getRemember()
|
||||
);
|
||||
$this->cacheToken($newToken);
|
||||
|
||||
$this->cacheInvalidHash($token->getToken());
|
||||
$this->mapper->delete($token);
|
||||
|
||||
return $newToken;
|
||||
|
@ -251,21 +275,23 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
public function invalidateToken(string $token) {
|
||||
$this->cache->clear();
|
||||
|
||||
$tokenHash = $this->hashToken($token);
|
||||
$this->mapper->invalidate($this->hashToken($token));
|
||||
$this->mapper->invalidate($this->hashTokenWithEmptySecret($token));
|
||||
$this->cacheInvalidHash($tokenHash);
|
||||
}
|
||||
|
||||
public function invalidateTokenById(string $uid, int $id) {
|
||||
$this->cache->clear();
|
||||
$token = $this->mapper->getTokenById($id);
|
||||
if ($token->getUID() !== $uid) {
|
||||
return;
|
||||
}
|
||||
$this->mapper->invalidate($token->getToken());
|
||||
$this->cacheInvalidHash($token->getToken());
|
||||
|
||||
$this->mapper->deleteById($uid, $id);
|
||||
}
|
||||
|
||||
public function invalidateOldTokens() {
|
||||
$this->cache->clear();
|
||||
|
||||
$olderThan = $this->time->getTime() - $this->config->getSystemValueInt('session_lifetime', 60 * 60 * 24);
|
||||
$this->logger->debug('Invalidating session tokens older than ' . date('c', $olderThan), ['app' => 'cron']);
|
||||
$this->mapper->invalidateOld($olderThan, OCPIToken::DO_NOT_REMEMBER);
|
||||
|
@ -275,23 +301,18 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
public function invalidateLastUsedBefore(string $uid, int $before): void {
|
||||
$this->cache->clear();
|
||||
|
||||
$this->mapper->invalidateLastUsedBefore($uid, $before);
|
||||
}
|
||||
|
||||
public function updateToken(OCPIToken $token) {
|
||||
$this->cache->clear();
|
||||
|
||||
if (!($token instanceof PublicKeyToken)) {
|
||||
throw new InvalidTokenException("Invalid token type");
|
||||
}
|
||||
$this->mapper->update($token);
|
||||
$this->cacheToken($token);
|
||||
}
|
||||
|
||||
public function updateTokenActivity(OCPIToken $token) {
|
||||
$this->cache->clear();
|
||||
|
||||
if (!($token instanceof PublicKeyToken)) {
|
||||
throw new InvalidTokenException("Invalid token type");
|
||||
}
|
||||
|
@ -304,6 +325,7 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
if ($token->getLastActivity() < ($now - $activityInterval)) {
|
||||
$token->setLastActivity($now);
|
||||
$this->mapper->updateActivity($token, $now);
|
||||
$this->cacheToken($token);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -328,8 +350,6 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
public function setPassword(OCPIToken $token, string $tokenId, string $password) {
|
||||
$this->cache->clear();
|
||||
|
||||
if (!($token instanceof PublicKeyToken)) {
|
||||
throw new InvalidTokenException("Invalid token type");
|
||||
}
|
||||
|
@ -355,8 +375,6 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
public function rotate(OCPIToken $token, string $oldTokenId, string $newTokenId): OCPIToken {
|
||||
$this->cache->clear();
|
||||
|
||||
if (!($token instanceof PublicKeyToken)) {
|
||||
throw new InvalidTokenException("Invalid token type");
|
||||
}
|
||||
|
@ -480,19 +498,16 @@ class PublicKeyTokenProvider implements IProvider {
|
|||
}
|
||||
|
||||
public function markPasswordInvalid(OCPIToken $token, string $tokenId) {
|
||||
$this->cache->clear();
|
||||
|
||||
if (!($token instanceof PublicKeyToken)) {
|
||||
throw new InvalidTokenException("Invalid token type");
|
||||
}
|
||||
|
||||
$token->setPasswordInvalid(true);
|
||||
$this->mapper->update($token);
|
||||
$this->cacheToken($token);
|
||||
}
|
||||
|
||||
public function updatePasswords(string $uid, string $password) {
|
||||
$this->cache->clear();
|
||||
|
||||
// prevent setting an empty pw as result of pw-less-login
|
||||
if ($password === '' || !$this->config->getSystemValueBool('auth.storeCryptedPassword', true)) {
|
||||
return;
|
||||
|
|
|
@ -26,9 +26,9 @@ declare(strict_types=1);
|
|||
namespace Test\Authentication\Token;
|
||||
|
||||
use OC;
|
||||
use OC\Authentication\Token\IToken;
|
||||
use OC\Authentication\Token\PublicKeyToken;
|
||||
use OC\Authentication\Token\PublicKeyTokenMapper;
|
||||
use OCP\Authentication\Token\IToken;
|
||||
use OCP\DB\QueryBuilder\IQueryBuilder;
|
||||
use OCP\IDBConnection;
|
||||
use OCP\IUser;
|
||||
|
@ -249,7 +249,7 @@ class PublicKeyTokenMapperTest extends TestCase {
|
|||
$this->assertCount(0, $this->mapper->getTokenByUser('user1000'));
|
||||
}
|
||||
|
||||
public function testDeleteById() {
|
||||
public function testGetById() {
|
||||
/** @var IUser|\PHPUnit\Framework\MockObject\MockObject $user */
|
||||
$user = $this->createMock(IUser::class);
|
||||
$qb = $this->dbConnection->getQueryBuilder();
|
||||
|
@ -259,17 +259,8 @@ class PublicKeyTokenMapperTest extends TestCase {
|
|||
$result = $qb->execute();
|
||||
$id = $result->fetch()['id'];
|
||||
|
||||
$this->mapper->deleteById('user1', (int)$id);
|
||||
$this->assertEquals(4, $this->getNumberOfTokens());
|
||||
}
|
||||
|
||||
public function testDeleteByIdWrongUser() {
|
||||
/** @var IUser|\PHPUnit\Framework\MockObject\MockObject $user */
|
||||
$user = $this->createMock(IUser::class);
|
||||
$id = 33;
|
||||
|
||||
$this->mapper->deleteById('user1000', $id);
|
||||
$this->assertEquals(5, $this->getNumberOfTokens());
|
||||
$token = $this->mapper->getTokenById((int)$id);
|
||||
$this->assertEquals('user1', $token->getUID());
|
||||
}
|
||||
|
||||
public function testDeleteByName() {
|
||||
|
|
|
@ -29,12 +29,13 @@ namespace Test\Authentication\Token;
|
|||
use OC\Authentication\Exceptions\ExpiredTokenException;
|
||||
use OC\Authentication\Exceptions\InvalidTokenException;
|
||||
use OC\Authentication\Exceptions\PasswordlessTokenException;
|
||||
use OC\Authentication\Token\IToken;
|
||||
use OC\Authentication\Token\PublicKeyToken;
|
||||
use OC\Authentication\Token\PublicKeyTokenMapper;
|
||||
use OC\Authentication\Token\PublicKeyTokenProvider;
|
||||
use OCP\AppFramework\Db\DoesNotExistException;
|
||||
use OCP\AppFramework\Utility\ITimeFactory;
|
||||
use OCP\Authentication\Token\IToken;
|
||||
use OCP\ICacheFactory;
|
||||
use OCP\IConfig;
|
||||
use OCP\IDBConnection;
|
||||
use OCP\Security\ICrypto;
|
||||
|
@ -60,6 +61,8 @@ class PublicKeyTokenProviderTest extends TestCase {
|
|||
private $logger;
|
||||
/** @var ITimeFactory|\PHPUnit\Framework\MockObject\MockObject */
|
||||
private $timeFactory;
|
||||
/** @var ICacheFactory|\PHPUnit\Framework\MockObject\MockObject */
|
||||
private $cacheFactory;
|
||||
/** @var int */
|
||||
private $time;
|
||||
|
||||
|
@ -90,6 +93,7 @@ class PublicKeyTokenProviderTest extends TestCase {
|
|||
$this->time = 1313131;
|
||||
$this->timeFactory->method('getTime')
|
||||
->willReturn($this->time);
|
||||
$this->cacheFactory = $this->createMock(ICacheFactory::class);
|
||||
|
||||
$this->tokenProvider = new PublicKeyTokenProvider(
|
||||
$this->mapper,
|
||||
|
@ -99,6 +103,7 @@ class PublicKeyTokenProviderTest extends TestCase {
|
|||
$this->logger,
|
||||
$this->timeFactory,
|
||||
$this->hasher,
|
||||
$this->cacheFactory,
|
||||
);
|
||||
}
|
||||
|
||||
|
@ -332,12 +337,12 @@ class PublicKeyTokenProviderTest extends TestCase {
|
|||
$this->tokenProvider->invalidateToken('token7');
|
||||
}
|
||||
|
||||
public function testInvaildateTokenById() {
|
||||
public function testInvalidateTokenById() {
|
||||
$id = 123;
|
||||
|
||||
$this->mapper->expects($this->once())
|
||||
->method('deleteById')
|
||||
->with('uid', $id);
|
||||
->method('getTokenById')
|
||||
->with($id);
|
||||
|
||||
$this->tokenProvider->invalidateTokenById('uid', $id);
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue