2013-05-29 01:46:57 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
|
|
* @author Georg Ehrke <oc.list@georgehrke.com>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2016-03-01 19:25:15 +03:00
|
|
|
* @author Vincent Chan <plus.vincchan@gmail.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
namespace OC\User;
|
|
|
|
|
2020-10-08 12:41:16 +03:00
|
|
|
use OC\HintException;
|
2013-05-29 01:46:57 +04:00
|
|
|
use OC\Hooks\PublicEmitter;
|
2017-07-22 13:21:00 +03:00
|
|
|
use OCP\DB\QueryBuilder\IQueryBuilder;
|
2019-11-20 16:22:00 +03:00
|
|
|
use OCP\EventDispatcher\IEventDispatcher;
|
2021-02-02 17:45:34 +03:00
|
|
|
use OCP\ICache;
|
|
|
|
use OCP\ICacheFactory;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\IConfig;
|
2018-05-24 12:29:48 +03:00
|
|
|
use OCP\IGroup;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\IUser;
|
2016-04-05 11:26:04 +03:00
|
|
|
use OCP\IUserBackend;
|
2014-07-09 17:32:33 +04:00
|
|
|
use OCP\IUserManager;
|
2020-10-08 12:41:16 +03:00
|
|
|
use OCP\Support\Subscription\IRegistry;
|
2019-08-13 10:33:46 +03:00
|
|
|
use OCP\User\Backend\IGetRealUIDBackend;
|
2020-11-24 01:59:50 +03:00
|
|
|
use OCP\User\Events\BeforeUserCreatedEvent;
|
2019-11-20 16:22:00 +03:00
|
|
|
use OCP\User\Events\UserCreatedEvent;
|
2017-04-26 16:07:11 +03:00
|
|
|
use OCP\UserInterface;
|
2019-02-22 15:07:26 +03:00
|
|
|
use Symfony\Component\EventDispatcher\EventDispatcherInterface;
|
2013-05-29 01:46:57 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class Manager
|
|
|
|
*
|
|
|
|
* Hooks available in scope \OC\User:
|
|
|
|
* - preSetPassword(\OC\User\User $user, string $password, string $recoverPassword)
|
|
|
|
* - postSetPassword(\OC\User\User $user, string $password, string $recoverPassword)
|
|
|
|
* - preDelete(\OC\User\User $user)
|
|
|
|
* - postDelete(\OC\User\User $user)
|
|
|
|
* - preCreateUser(string $uid, string $password)
|
2013-05-29 03:05:49 +04:00
|
|
|
* - postCreateUser(\OC\User\User $user, string $password)
|
2016-01-18 22:27:43 +03:00
|
|
|
* - change(\OC\User\User $user)
|
2018-03-19 17:23:30 +03:00
|
|
|
* - assignedUserId(string $uid)
|
|
|
|
* - preUnassignedUserId(string $uid)
|
|
|
|
* - postUnassignedUserId(string $uid)
|
2013-05-29 01:46:57 +04:00
|
|
|
*
|
|
|
|
* @package OC\User
|
|
|
|
*/
|
2014-07-09 17:32:33 +04:00
|
|
|
class Manager extends PublicEmitter implements IUserManager {
|
2013-05-29 01:46:57 +04:00
|
|
|
/**
|
2016-02-14 23:28:22 +03:00
|
|
|
* @var \OCP\UserInterface[] $backends
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
2020-03-26 11:30:18 +03:00
|
|
|
private $backends = [];
|
2013-05-29 01:46:57 +04:00
|
|
|
|
2013-07-10 02:06:22 +04:00
|
|
|
/**
|
|
|
|
* @var \OC\User\User[] $cachedUsers
|
|
|
|
*/
|
2020-03-26 11:30:18 +03:00
|
|
|
private $cachedUsers = [];
|
2013-05-31 19:31:27 +04:00
|
|
|
|
2019-02-22 15:07:26 +03:00
|
|
|
/** @var IConfig */
|
2013-12-16 17:22:25 +04:00
|
|
|
private $config;
|
2019-11-20 16:22:00 +03:00
|
|
|
|
2019-02-22 15:07:26 +03:00
|
|
|
/** @var EventDispatcherInterface */
|
|
|
|
private $dispatcher;
|
2013-12-16 17:22:25 +04:00
|
|
|
|
2021-02-02 17:45:34 +03:00
|
|
|
/** @var ICache */
|
|
|
|
private $cache;
|
|
|
|
|
2019-11-20 16:22:00 +03:00
|
|
|
/** @var IEventDispatcher */
|
|
|
|
private $eventDispatcher;
|
|
|
|
|
|
|
|
public function __construct(IConfig $config,
|
|
|
|
EventDispatcherInterface $oldDispatcher,
|
2021-02-02 17:45:34 +03:00
|
|
|
ICacheFactory $cacheFactory,
|
2019-11-20 16:22:00 +03:00
|
|
|
IEventDispatcher $eventDispatcher) {
|
2013-12-16 17:22:25 +04:00
|
|
|
$this->config = $config;
|
2019-11-20 16:22:00 +03:00
|
|
|
$this->dispatcher = $oldDispatcher;
|
2021-02-02 17:45:34 +03:00
|
|
|
$this->cache = $cacheFactory->createDistributed('user_backend_map');
|
2014-11-05 17:45:58 +03:00
|
|
|
$cachedUsers = &$this->cachedUsers;
|
2013-05-31 19:42:51 +04:00
|
|
|
$this->listen('\OC\User', 'postDelete', function ($user) use (&$cachedUsers) {
|
2014-11-05 17:45:58 +03:00
|
|
|
/** @var \OC\User\User $user */
|
|
|
|
unset($cachedUsers[$user->getUID()]);
|
2013-05-31 19:42:51 +04:00
|
|
|
});
|
2019-11-20 16:22:00 +03:00
|
|
|
$this->eventDispatcher = $eventDispatcher;
|
2013-05-31 19:42:51 +04:00
|
|
|
}
|
|
|
|
|
2014-12-09 20:36:40 +03:00
|
|
|
/**
|
|
|
|
* Get the active backends
|
2014-12-11 14:29:58 +03:00
|
|
|
* @return \OCP\UserInterface[]
|
2014-12-09 20:36:40 +03:00
|
|
|
*/
|
|
|
|
public function getBackends() {
|
|
|
|
return $this->backends;
|
|
|
|
}
|
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
/**
|
2013-06-03 15:33:56 +04:00
|
|
|
* register a user backend
|
|
|
|
*
|
2014-12-11 14:29:58 +03:00
|
|
|
* @param \OCP\UserInterface $backend
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
|
|
|
public function registerBackend($backend) {
|
|
|
|
$this->backends[] = $backend;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-06-03 15:33:56 +04:00
|
|
|
* remove a user backend
|
|
|
|
*
|
2014-12-11 14:29:58 +03:00
|
|
|
* @param \OCP\UserInterface $backend
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
|
|
|
public function removeBackend($backend) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->cachedUsers = [];
|
2013-05-29 01:46:57 +04:00
|
|
|
if (($i = array_search($backend, $this->backends)) !== false) {
|
|
|
|
unset($this->backends[$i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-03 15:33:56 +04:00
|
|
|
/**
|
|
|
|
* remove all user backends
|
|
|
|
*/
|
2013-05-29 01:46:57 +04:00
|
|
|
public function clearBackends() {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->cachedUsers = [];
|
|
|
|
$this->backends = [];
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-06-03 15:33:56 +04:00
|
|
|
* get a user by user id
|
|
|
|
*
|
2013-05-29 01:46:57 +04:00
|
|
|
* @param string $uid
|
2015-03-13 15:19:29 +03:00
|
|
|
* @return \OC\User\User|null Either the user or null if the specified user does not exist
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
|
|
|
public function get($uid) {
|
2017-07-13 15:33:46 +03:00
|
|
|
if (is_null($uid) || $uid === '' || $uid === false) {
|
|
|
|
return null;
|
|
|
|
}
|
2013-06-03 15:33:56 +04:00
|
|
|
if (isset($this->cachedUsers[$uid])) { //check the cache first to prevent having to loop over the backends
|
2013-05-31 19:31:27 +04:00
|
|
|
return $this->cachedUsers[$uid];
|
|
|
|
}
|
2021-02-02 17:45:34 +03:00
|
|
|
|
|
|
|
$cachedBackend = $this->cache->get($uid);
|
|
|
|
if ($cachedBackend !== null && isset($this->backends[$cachedBackend])) {
|
|
|
|
// Cache has the info of the user backend already, so ask that one directly
|
|
|
|
$backend = $this->backends[$cachedBackend];
|
|
|
|
if ($backend->userExists($uid)) {
|
|
|
|
return $this->getUserObject($uid, $backend);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($this->backends as $i => $backend) {
|
|
|
|
if ($i === $cachedBackend) {
|
|
|
|
// Tried that one already
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
if ($backend->userExists($uid)) {
|
2021-02-02 17:45:34 +03:00
|
|
|
$this->cache->set($uid, $i, 300);
|
2013-05-31 19:42:51 +04:00
|
|
|
return $this->getUserObject($uid, $backend);
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2013-06-03 15:33:56 +04:00
|
|
|
/**
|
|
|
|
* get or construct the user object
|
|
|
|
*
|
|
|
|
* @param string $uid
|
2014-12-11 14:29:58 +03:00
|
|
|
* @param \OCP\UserInterface $backend
|
2016-04-28 13:26:48 +03:00
|
|
|
* @param bool $cacheUser If false the newly created user object will not be cached
|
2013-06-03 15:33:56 +04:00
|
|
|
* @return \OC\User\User
|
|
|
|
*/
|
2016-04-28 13:26:48 +03:00
|
|
|
protected function getUserObject($uid, $backend, $cacheUser = true) {
|
2019-08-13 10:33:46 +03:00
|
|
|
if ($backend instanceof IGetRealUIDBackend) {
|
|
|
|
$uid = $backend->getRealUID($uid);
|
|
|
|
}
|
|
|
|
|
2013-05-31 19:42:51 +04:00
|
|
|
if (isset($this->cachedUsers[$uid])) {
|
|
|
|
return $this->cachedUsers[$uid];
|
|
|
|
}
|
2016-04-28 13:26:48 +03:00
|
|
|
|
2019-02-22 15:07:26 +03:00
|
|
|
$user = new User($uid, $backend, $this->dispatcher, $this, $this->config);
|
2016-04-28 13:26:48 +03:00
|
|
|
if ($cacheUser) {
|
|
|
|
$this->cachedUsers[$uid] = $user;
|
|
|
|
}
|
|
|
|
return $user;
|
2013-05-31 19:42:51 +04:00
|
|
|
}
|
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
/**
|
2013-06-03 15:33:56 +04:00
|
|
|
* check if a user exists
|
|
|
|
*
|
2013-05-29 01:46:57 +04:00
|
|
|
* @param string $uid
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function userExists($uid) {
|
2013-06-03 15:46:05 +04:00
|
|
|
$user = $this->get($uid);
|
2020-04-16 00:49:16 +03:00
|
|
|
return ($user !== null);
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
|
2013-09-16 16:15:35 +04:00
|
|
|
/**
|
|
|
|
* Check if the password is valid for the user
|
|
|
|
*
|
2016-04-05 11:26:04 +03:00
|
|
|
* @param string $loginName
|
2014-02-06 19:30:58 +04:00
|
|
|
* @param string $password
|
2013-09-16 16:15:35 +04:00
|
|
|
* @return mixed the User object on success, false otherwise
|
|
|
|
*/
|
2016-04-05 11:26:04 +03:00
|
|
|
public function checkPassword($loginName, $password) {
|
2017-01-12 14:38:45 +03:00
|
|
|
$result = $this->checkPasswordNoLogging($loginName, $password);
|
|
|
|
|
|
|
|
if ($result === false) {
|
|
|
|
\OC::$server->getLogger()->warning('Login failed: \''. $loginName .'\' (Remote IP: \''. \OC::$server->getRequest()->getRemoteAddress(). '\')', ['app' => 'core']);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the password is valid for the user
|
|
|
|
*
|
|
|
|
* @internal
|
|
|
|
* @param string $loginName
|
|
|
|
* @param string $password
|
2019-05-03 16:09:19 +03:00
|
|
|
* @return IUser|false the User object on success, false otherwise
|
2017-01-12 14:38:45 +03:00
|
|
|
*/
|
|
|
|
public function checkPasswordNoLogging($loginName, $password) {
|
2016-04-05 11:26:04 +03:00
|
|
|
$loginName = str_replace("\0", '', $loginName);
|
2014-12-17 14:47:00 +03:00
|
|
|
$password = str_replace("\0", '', $password);
|
2017-01-12 14:38:45 +03:00
|
|
|
|
2013-09-16 16:15:35 +04:00
|
|
|
foreach ($this->backends as $backend) {
|
2016-08-11 10:52:02 +03:00
|
|
|
if ($backend->implementsActions(Backend::CHECK_PASSWORD)) {
|
2016-04-05 11:26:04 +03:00
|
|
|
$uid = $backend->checkPassword($loginName, $password);
|
2013-09-24 19:10:01 +04:00
|
|
|
if ($uid !== false) {
|
|
|
|
return $this->getUserObject($uid, $backend);
|
|
|
|
}
|
2013-09-16 16:15:35 +04:00
|
|
|
}
|
|
|
|
}
|
2014-08-15 14:13:00 +04:00
|
|
|
|
2020-09-21 17:13:09 +03:00
|
|
|
// since http basic auth doesn't provide a standard way of handling non ascii password we allow password to be urlencoded
|
|
|
|
// we only do this decoding after using the plain password fails to maintain compatibility with any password that happens
|
|
|
|
// to contains urlencoded patterns by "accident".
|
|
|
|
$password = urldecode($password);
|
|
|
|
|
|
|
|
foreach ($this->backends as $backend) {
|
|
|
|
if ($backend->implementsActions(Backend::CHECK_PASSWORD)) {
|
|
|
|
$uid = $backend->checkPassword($loginName, $password);
|
|
|
|
if ($uid !== false) {
|
|
|
|
return $this->getUserObject($uid, $backend);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-24 19:10:01 +04:00
|
|
|
return false;
|
2013-09-16 16:15:35 +04:00
|
|
|
}
|
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
/**
|
|
|
|
* search by user id
|
|
|
|
*
|
|
|
|
* @param string $pattern
|
|
|
|
* @param int $limit
|
|
|
|
* @param int $offset
|
|
|
|
* @return \OC\User\User[]
|
|
|
|
*/
|
|
|
|
public function search($pattern, $limit = null, $offset = null) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$users = [];
|
2013-05-29 01:46:57 +04:00
|
|
|
foreach ($this->backends as $backend) {
|
|
|
|
$backendUsers = $backend->getUsers($pattern, $limit, $offset);
|
|
|
|
if (is_array($backendUsers)) {
|
|
|
|
foreach ($backendUsers as $uid) {
|
2014-03-14 16:51:17 +04:00
|
|
|
$users[$uid] = $this->getUserObject($uid, $backend);
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-14 16:51:17 +04:00
|
|
|
uasort($users, function ($a, $b) {
|
2013-05-29 01:46:57 +04:00
|
|
|
/**
|
|
|
|
* @var \OC\User\User $a
|
|
|
|
* @var \OC\User\User $b
|
|
|
|
*/
|
2018-05-26 13:01:13 +03:00
|
|
|
return strcasecmp($a->getUID(), $b->getUID());
|
2013-05-29 01:46:57 +04:00
|
|
|
});
|
|
|
|
return $users;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* search by displayName
|
|
|
|
*
|
|
|
|
* @param string $pattern
|
|
|
|
* @param int $limit
|
|
|
|
* @param int $offset
|
|
|
|
* @return \OC\User\User[]
|
|
|
|
*/
|
|
|
|
public function searchDisplayName($pattern, $limit = null, $offset = null) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$users = [];
|
2013-05-29 01:46:57 +04:00
|
|
|
foreach ($this->backends as $backend) {
|
|
|
|
$backendUsers = $backend->getDisplayNames($pattern, $limit, $offset);
|
|
|
|
if (is_array($backendUsers)) {
|
|
|
|
foreach ($backendUsers as $uid => $displayName) {
|
2013-05-31 19:42:51 +04:00
|
|
|
$users[] = $this->getUserObject($uid, $backend);
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
usort($users, function ($a, $b) {
|
|
|
|
/**
|
|
|
|
* @var \OC\User\User $a
|
|
|
|
* @var \OC\User\User $b
|
|
|
|
*/
|
2018-05-26 13:01:13 +03:00
|
|
|
return strcasecmp($a->getDisplayName(), $b->getDisplayName());
|
2013-05-29 01:46:57 +04:00
|
|
|
});
|
|
|
|
return $users;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $password
|
2017-04-27 09:56:51 +03:00
|
|
|
* @throws \InvalidArgumentException
|
|
|
|
* @return bool|IUser the created user or false
|
2013-05-29 01:46:57 +04:00
|
|
|
*/
|
|
|
|
public function createUser($uid, $password) {
|
2020-10-08 12:41:16 +03:00
|
|
|
// DI injection is not used here as IRegistry needs the user manager itself for user count and thus it would create a cyclic dependency
|
|
|
|
if (\OC::$server->get(IRegistry::class)->delegateIsHardUserLimitReached()) {
|
|
|
|
$l = \OC::$server->getL10N('lib');
|
|
|
|
throw new HintException($l->t('The user limit has been reached and the user was not created.'));
|
|
|
|
}
|
|
|
|
|
2017-06-20 20:59:41 +03:00
|
|
|
$localBackends = [];
|
2017-04-27 09:56:51 +03:00
|
|
|
foreach ($this->backends as $backend) {
|
2017-06-20 20:59:41 +03:00
|
|
|
if ($backend instanceof Database) {
|
|
|
|
// First check if there is another user backend
|
|
|
|
$localBackends[] = $backend;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($backend->implementsActions(Backend::CREATE_USER)) {
|
|
|
|
return $this->createUserFromBackend($uid, $password, $backend);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($localBackends as $backend) {
|
2017-04-27 09:56:51 +03:00
|
|
|
if ($backend->implementsActions(Backend::CREATE_USER)) {
|
|
|
|
return $this->createUserFromBackend($uid, $password, $backend);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $password
|
|
|
|
* @param UserInterface $backend
|
|
|
|
* @return IUser|null
|
|
|
|
* @throws \InvalidArgumentException
|
|
|
|
*/
|
|
|
|
public function createUserFromBackend($uid, $password, UserInterface $backend) {
|
2014-08-31 12:05:59 +04:00
|
|
|
$l = \OC::$server->getL10N('lib');
|
2017-04-27 09:56:51 +03:00
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
// Check the name for bad characters
|
2016-01-20 16:21:54 +03:00
|
|
|
// Allowed are: "a-z", "A-Z", "0-9" and "_.@-'"
|
2019-11-27 12:27:31 +03:00
|
|
|
if (preg_match('/[^a-zA-Z0-9 _.@\-\']/', $uid)) {
|
2017-04-27 09:56:51 +03:00
|
|
|
throw new \InvalidArgumentException($l->t('Only the following characters are allowed in a username:'
|
2016-01-20 16:21:54 +03:00
|
|
|
. ' "a-z", "A-Z", "0-9", and "_.@-\'"'));
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
2019-11-27 12:27:31 +03:00
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
// No empty username
|
2017-04-27 09:56:51 +03:00
|
|
|
if (trim($uid) === '') {
|
|
|
|
throw new \InvalidArgumentException($l->t('A valid username must be provided'));
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
2019-11-27 12:27:31 +03:00
|
|
|
|
2016-02-03 16:09:15 +03:00
|
|
|
// No whitespace at the beginning or at the end
|
2017-04-12 11:29:28 +03:00
|
|
|
if (trim($uid) !== $uid) {
|
2017-04-27 09:56:51 +03:00
|
|
|
throw new \InvalidArgumentException($l->t('Username contains whitespace at the beginning or at the end'));
|
2016-02-03 16:09:15 +03:00
|
|
|
}
|
2019-11-27 12:27:31 +03:00
|
|
|
|
2017-04-12 11:29:28 +03:00
|
|
|
// Username only consists of 1 or 2 dots (directory traversal)
|
|
|
|
if ($uid === '.' || $uid === '..') {
|
2017-04-27 09:56:51 +03:00
|
|
|
throw new \InvalidArgumentException($l->t('Username must not consist of dots only'));
|
2017-04-12 11:29:28 +03:00
|
|
|
}
|
2019-11-27 12:27:31 +03:00
|
|
|
|
|
|
|
if (!$this->verifyUid($uid)) {
|
|
|
|
throw new \InvalidArgumentException($l->t('Username is invalid because files already exist for this user'));
|
|
|
|
}
|
|
|
|
|
2013-05-29 01:46:57 +04:00
|
|
|
// No empty password
|
2017-04-27 09:56:51 +03:00
|
|
|
if (trim($password) === '') {
|
|
|
|
throw new \InvalidArgumentException($l->t('A valid password must be provided'));
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if user already exists
|
|
|
|
if ($this->userExists($uid)) {
|
2017-04-27 09:56:51 +03:00
|
|
|
throw new \InvalidArgumentException($l->t('The username is already being used'));
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|
|
|
|
|
2020-11-24 01:59:50 +03:00
|
|
|
/** @deprecated 21.0.0 use BeforeUserCreatedEvent event with the IEventDispatcher instead */
|
2017-04-26 16:07:11 +03:00
|
|
|
$this->emit('\OC\User', 'preCreateUser', [$uid, $password]);
|
2020-11-24 01:59:50 +03:00
|
|
|
$this->eventDispatcher->dispatchTyped(new BeforeUserCreatedEvent($uid, $password));
|
2017-08-17 13:08:40 +03:00
|
|
|
$state = $backend->createUser($uid, $password);
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($state === false) {
|
2017-08-17 13:08:40 +03:00
|
|
|
throw new \InvalidArgumentException($l->t('Could not create user'));
|
|
|
|
}
|
2017-04-26 16:07:11 +03:00
|
|
|
$user = $this->getUserObject($uid, $backend);
|
|
|
|
if ($user instanceof IUser) {
|
2020-11-24 01:59:50 +03:00
|
|
|
/** @deprecated 21.0.0 use UserCreatedEvent event with the IEventDispatcher instead */
|
2017-04-26 16:07:11 +03:00
|
|
|
$this->emit('\OC\User', 'postCreateUser', [$user, $password]);
|
2019-11-20 16:22:00 +03:00
|
|
|
$this->eventDispatcher->dispatchTyped(new UserCreatedEvent($user, $password));
|
2017-04-26 16:07:11 +03:00
|
|
|
}
|
|
|
|
return $user;
|
|
|
|
}
|
|
|
|
|
2014-01-08 02:05:37 +04:00
|
|
|
/**
|
|
|
|
* returns how many users per backend exist (if supported by backend)
|
|
|
|
*
|
2016-10-19 11:03:29 +03:00
|
|
|
* @param boolean $hasLoggedIn when true only users that have a lastLogin
|
|
|
|
* entry in the preferences table will be affected
|
|
|
|
* @return array|int an array of backend class as key and count number as value
|
|
|
|
* if $hasLoggedIn is true only an int is returned
|
2014-01-08 02:05:37 +04:00
|
|
|
*/
|
2016-10-19 11:03:29 +03:00
|
|
|
public function countUsers($hasLoggedIn = false) {
|
|
|
|
if ($hasLoggedIn) {
|
|
|
|
return $this->countSeenUsers();
|
|
|
|
}
|
|
|
|
$userCountStatistics = [];
|
2014-01-08 02:05:37 +04:00
|
|
|
foreach ($this->backends as $backend) {
|
2016-08-11 10:52:02 +03:00
|
|
|
if ($backend->implementsActions(Backend::COUNT_USERS)) {
|
2015-12-01 14:48:23 +03:00
|
|
|
$backendUsers = $backend->countUsers();
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($backendUsers !== false) {
|
|
|
|
if ($backend instanceof IUserBackend) {
|
2014-12-12 19:25:03 +03:00
|
|
|
$name = $backend->getBackendName();
|
2014-01-08 16:24:28 +04:00
|
|
|
} else {
|
2014-12-12 19:25:03 +03:00
|
|
|
$name = get_class($backend);
|
|
|
|
}
|
2020-04-10 15:19:56 +03:00
|
|
|
if (isset($userCountStatistics[$name])) {
|
2015-12-01 14:48:23 +03:00
|
|
|
$userCountStatistics[$name] += $backendUsers;
|
2014-12-12 19:25:03 +03:00
|
|
|
} else {
|
2015-12-01 14:48:23 +03:00
|
|
|
$userCountStatistics[$name] = $backendUsers;
|
2014-01-08 16:24:28 +04:00
|
|
|
}
|
2014-01-08 02:05:37 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $userCountStatistics;
|
|
|
|
}
|
2015-12-01 14:48:23 +03:00
|
|
|
|
2018-05-24 12:29:48 +03:00
|
|
|
/**
|
|
|
|
* returns how many users per backend exist in the requested groups (if supported by backend)
|
|
|
|
*
|
|
|
|
* @param IGroup[] $groups an array of gid to search in
|
|
|
|
* @return array|int an array of backend class as key and count number as value
|
|
|
|
* if $hasLoggedIn is true only an int is returned
|
|
|
|
*/
|
|
|
|
public function countUsersOfGroups(array $groups) {
|
|
|
|
$users = [];
|
2020-04-10 15:19:56 +03:00
|
|
|
foreach ($groups as $group) {
|
2020-04-09 14:53:40 +03:00
|
|
|
$usersIds = array_map(function ($user) {
|
2018-05-24 12:29:48 +03:00
|
|
|
return $user->getUID();
|
|
|
|
}, $group->getUsers());
|
|
|
|
$users = array_merge($users, $usersIds);
|
|
|
|
}
|
|
|
|
return count(array_unique($users));
|
|
|
|
}
|
|
|
|
|
2015-12-01 14:48:23 +03:00
|
|
|
/**
|
|
|
|
* The callback is executed for each user on each backend.
|
|
|
|
* If the callback returns false no further users will be retrieved.
|
|
|
|
*
|
|
|
|
* @param \Closure $callback
|
2016-04-05 11:26:04 +03:00
|
|
|
* @param string $search
|
2016-10-19 11:03:29 +03:00
|
|
|
* @param boolean $onlySeen when true only users that have a lastLogin entry
|
|
|
|
* in the preferences table will be affected
|
2015-12-01 14:48:23 +03:00
|
|
|
* @since 9.0.0
|
|
|
|
*/
|
2016-10-19 11:03:29 +03:00
|
|
|
public function callForAllUsers(\Closure $callback, $search = '', $onlySeen = false) {
|
|
|
|
if ($onlySeen) {
|
|
|
|
$this->callForSeenUsers($callback);
|
|
|
|
} else {
|
|
|
|
foreach ($this->getBackends() as $backend) {
|
|
|
|
$limit = 500;
|
|
|
|
$offset = 0;
|
|
|
|
do {
|
|
|
|
$users = $backend->getUsers($search, $limit, $offset);
|
|
|
|
foreach ($users as $uid) {
|
|
|
|
if (!$backend->userExists($uid)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$user = $this->getUserObject($uid, $backend, false);
|
|
|
|
$return = $callback($user);
|
|
|
|
if ($return === false) {
|
|
|
|
break;
|
|
|
|
}
|
2016-04-05 11:26:04 +03:00
|
|
|
}
|
2016-10-19 11:03:29 +03:00
|
|
|
$offset += $limit;
|
|
|
|
} while (count($users) >= $limit);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-26 13:37:48 +03:00
|
|
|
/**
|
2018-05-16 13:32:56 +03:00
|
|
|
* returns how many users are disabled
|
2017-04-26 13:37:48 +03:00
|
|
|
*
|
|
|
|
* @return int
|
|
|
|
* @since 12.0.0
|
|
|
|
*/
|
2018-05-16 13:32:56 +03:00
|
|
|
public function countDisabledUsers(): int {
|
2017-04-26 13:37:48 +03:00
|
|
|
$queryBuilder = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
2018-10-19 17:44:28 +03:00
|
|
|
$queryBuilder->select($queryBuilder->func()->count('*'))
|
2017-04-26 13:37:48 +03:00
|
|
|
->from('preferences')
|
|
|
|
->where($queryBuilder->expr()->eq('appid', $queryBuilder->createNamedParameter('core')))
|
|
|
|
->andWhere($queryBuilder->expr()->eq('configkey', $queryBuilder->createNamedParameter('enabled')))
|
2017-07-22 13:21:00 +03:00
|
|
|
->andWhere($queryBuilder->expr()->eq('configvalue', $queryBuilder->createNamedParameter('false'), IQueryBuilder::PARAM_STR));
|
2017-04-26 13:37:48 +03:00
|
|
|
|
2019-11-20 16:22:00 +03:00
|
|
|
|
2018-05-16 13:32:56 +03:00
|
|
|
$result = $queryBuilder->execute();
|
2021-01-03 17:28:31 +03:00
|
|
|
$count = $result->fetchOne();
|
2018-05-16 13:32:56 +03:00
|
|
|
$result->closeCursor();
|
2019-11-20 16:22:00 +03:00
|
|
|
|
2018-05-16 13:32:56 +03:00
|
|
|
if ($count !== false) {
|
|
|
|
$count = (int)$count;
|
|
|
|
} else {
|
|
|
|
$count = 0;
|
|
|
|
}
|
2017-04-26 13:37:48 +03:00
|
|
|
|
2018-05-16 13:32:56 +03:00
|
|
|
return $count;
|
|
|
|
}
|
2017-04-26 13:37:48 +03:00
|
|
|
|
2018-05-16 13:32:56 +03:00
|
|
|
/**
|
|
|
|
* returns how many users are disabled in the requested groups
|
|
|
|
*
|
|
|
|
* @param array $groups groupids to search
|
|
|
|
* @return int
|
|
|
|
* @since 14.0.0
|
|
|
|
*/
|
|
|
|
public function countDisabledUsersOfGroups(array $groups): int {
|
|
|
|
$queryBuilder = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
2018-10-16 15:55:41 +03:00
|
|
|
$queryBuilder->select($queryBuilder->createFunction('COUNT(DISTINCT ' . $queryBuilder->getColumnName('uid') . ')'))
|
2018-05-16 13:32:56 +03:00
|
|
|
->from('preferences', 'p')
|
2018-10-16 15:55:41 +03:00
|
|
|
->innerJoin('p', 'group_user', 'g', $queryBuilder->expr()->eq('p.userid', 'g.uid'))
|
2018-05-16 13:32:56 +03:00
|
|
|
->where($queryBuilder->expr()->eq('appid', $queryBuilder->createNamedParameter('core')))
|
|
|
|
->andWhere($queryBuilder->expr()->eq('configkey', $queryBuilder->createNamedParameter('enabled')))
|
|
|
|
->andWhere($queryBuilder->expr()->eq('configvalue', $queryBuilder->createNamedParameter('false'), IQueryBuilder::PARAM_STR))
|
|
|
|
->andWhere($queryBuilder->expr()->in('gid', $queryBuilder->createNamedParameter($groups, IQueryBuilder::PARAM_STR_ARRAY)));
|
|
|
|
|
|
|
|
$result = $queryBuilder->execute();
|
2021-01-03 17:28:31 +03:00
|
|
|
$count = $result->fetchOne();
|
2018-05-16 13:32:56 +03:00
|
|
|
$result->closeCursor();
|
2019-11-20 16:22:00 +03:00
|
|
|
|
2018-05-16 13:32:56 +03:00
|
|
|
if ($count !== false) {
|
|
|
|
$count = (int)$count;
|
|
|
|
} else {
|
|
|
|
$count = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $count;
|
2017-04-26 13:37:48 +03:00
|
|
|
}
|
|
|
|
|
2016-10-19 11:03:29 +03:00
|
|
|
/**
|
|
|
|
* returns how many users have logged in once
|
|
|
|
*
|
|
|
|
* @return int
|
2016-11-15 20:51:52 +03:00
|
|
|
* @since 11.0.0
|
2016-10-19 11:03:29 +03:00
|
|
|
*/
|
|
|
|
public function countSeenUsers() {
|
|
|
|
$queryBuilder = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
2018-10-19 17:44:28 +03:00
|
|
|
$queryBuilder->select($queryBuilder->func()->count('*'))
|
2016-10-19 11:03:29 +03:00
|
|
|
->from('preferences')
|
2016-10-28 10:07:40 +03:00
|
|
|
->where($queryBuilder->expr()->eq('appid', $queryBuilder->createNamedParameter('login')))
|
|
|
|
->andWhere($queryBuilder->expr()->eq('configkey', $queryBuilder->createNamedParameter('lastLogin')))
|
|
|
|
->andWhere($queryBuilder->expr()->isNotNull('configvalue'));
|
2016-10-19 11:03:29 +03:00
|
|
|
|
|
|
|
$query = $queryBuilder->execute();
|
2016-10-28 10:07:40 +03:00
|
|
|
|
2021-01-03 17:28:31 +03:00
|
|
|
$result = (int)$query->fetchOne();
|
2016-10-28 10:07:40 +03:00
|
|
|
$query->closeCursor();
|
|
|
|
|
|
|
|
return $result;
|
2016-10-19 11:03:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param \Closure $callback
|
2020-10-28 11:43:26 +03:00
|
|
|
* @psalm-param \Closure(\OCP\IUser):?bool $callback
|
2016-11-15 20:51:52 +03:00
|
|
|
* @since 11.0.0
|
2016-10-19 11:03:29 +03:00
|
|
|
*/
|
2016-10-28 10:07:40 +03:00
|
|
|
public function callForSeenUsers(\Closure $callback) {
|
2016-10-19 11:03:29 +03:00
|
|
|
$limit = 1000;
|
|
|
|
$offset = 0;
|
|
|
|
do {
|
|
|
|
$userIds = $this->getSeenUserIds($limit, $offset);
|
|
|
|
$offset += $limit;
|
|
|
|
foreach ($userIds as $userId) {
|
|
|
|
foreach ($this->backends as $backend) {
|
|
|
|
if ($backend->userExists($userId)) {
|
|
|
|
$user = $this->getUserObject($userId, $backend, false);
|
|
|
|
$return = $callback($user);
|
|
|
|
if ($return === false) {
|
|
|
|
return;
|
|
|
|
}
|
2018-04-03 18:00:18 +03:00
|
|
|
break;
|
2015-12-01 14:48:23 +03:00
|
|
|
}
|
|
|
|
}
|
2016-10-19 11:03:29 +03:00
|
|
|
}
|
|
|
|
} while (count($userIds) >= $limit);
|
2015-12-01 14:48:23 +03:00
|
|
|
}
|
2016-05-02 15:19:10 +03:00
|
|
|
|
2016-10-19 11:03:29 +03:00
|
|
|
/**
|
|
|
|
* Getting all userIds that have a listLogin value requires checking the
|
|
|
|
* value in php because on oracle you cannot use a clob in a where clause,
|
|
|
|
* preventing us from doing a not null or length(value) > 0 check.
|
2018-04-03 18:00:18 +03:00
|
|
|
*
|
2016-10-19 11:03:29 +03:00
|
|
|
* @param int $limit
|
|
|
|
* @param int $offset
|
|
|
|
* @return string[] with user ids
|
|
|
|
*/
|
|
|
|
private function getSeenUserIds($limit = null, $offset = null) {
|
|
|
|
$queryBuilder = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
|
|
|
$queryBuilder->select(['userid'])
|
|
|
|
->from('preferences')
|
|
|
|
->where($queryBuilder->expr()->eq(
|
|
|
|
'appid', $queryBuilder->createNamedParameter('login'))
|
|
|
|
)
|
|
|
|
->andWhere($queryBuilder->expr()->eq(
|
|
|
|
'configkey', $queryBuilder->createNamedParameter('lastLogin'))
|
|
|
|
)
|
|
|
|
->andWhere($queryBuilder->expr()->isNotNull('configvalue')
|
|
|
|
);
|
|
|
|
|
|
|
|
if ($limit !== null) {
|
|
|
|
$queryBuilder->setMaxResults($limit);
|
|
|
|
}
|
|
|
|
if ($offset !== null) {
|
|
|
|
$queryBuilder->setFirstResult($offset);
|
|
|
|
}
|
|
|
|
$query = $queryBuilder->execute();
|
|
|
|
$result = [];
|
|
|
|
|
|
|
|
while ($row = $query->fetch()) {
|
|
|
|
$result[] = $row['userid'];
|
|
|
|
}
|
|
|
|
|
2016-10-28 10:07:40 +03:00
|
|
|
$query->closeCursor();
|
|
|
|
|
2016-10-19 11:03:29 +03:00
|
|
|
return $result;
|
|
|
|
}
|
2016-10-28 10:07:40 +03:00
|
|
|
|
2016-05-02 15:19:10 +03:00
|
|
|
/**
|
|
|
|
* @param string $email
|
|
|
|
* @return IUser[]
|
|
|
|
* @since 9.1.0
|
|
|
|
*/
|
|
|
|
public function getByEmail($email) {
|
2018-12-20 13:09:10 +03:00
|
|
|
$userIds = $this->config->getUsersForUserValueCaseInsensitive('settings', 'email', $email);
|
2016-05-02 15:19:10 +03:00
|
|
|
|
2020-04-09 14:53:40 +03:00
|
|
|
$users = array_map(function ($uid) {
|
2016-05-02 15:19:10 +03:00
|
|
|
return $this->get($uid);
|
|
|
|
}, $userIds);
|
2018-10-14 20:09:55 +03:00
|
|
|
|
2020-04-09 14:53:40 +03:00
|
|
|
return array_values(array_filter($users, function ($u) {
|
2018-10-14 20:09:55 +03:00
|
|
|
return ($u instanceof IUser);
|
|
|
|
}));
|
2016-05-02 15:19:10 +03:00
|
|
|
}
|
2019-03-13 11:45:25 +03:00
|
|
|
|
|
|
|
private function verifyUid(string $uid): bool {
|
|
|
|
$appdata = 'appdata_' . $this->config->getSystemValueString('instanceid');
|
|
|
|
|
2019-11-27 12:27:31 +03:00
|
|
|
if (\in_array($uid, [
|
|
|
|
'.htaccess',
|
|
|
|
'files_external',
|
2021-03-15 23:09:12 +03:00
|
|
|
'__groupfolders',
|
2019-11-27 12:27:31 +03:00
|
|
|
'.ocdata',
|
|
|
|
'owncloud.log',
|
|
|
|
'nextcloud.log',
|
|
|
|
$appdata], true)) {
|
2019-03-13 11:45:25 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-11-27 12:27:31 +03:00
|
|
|
$dataDirectory = $this->config->getSystemValueString('datadirectory', \OC::$SERVERROOT . '/data');
|
|
|
|
|
|
|
|
return !file_exists(rtrim($dataDirectory, '/') . '/' . $uid);
|
2019-03-13 11:45:25 +03:00
|
|
|
}
|
2013-05-29 01:46:57 +04:00
|
|
|
}
|