2015-11-10 12:50:59 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
namespace OCA\Federation\BackgroundJob;
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
use GuzzleHttp\Exception\ClientException;
|
2015-11-19 19:10:42 +03:00
|
|
|
use OC\BackgroundJob\JobList;
|
2016-03-18 15:22:05 +03:00
|
|
|
use OC\BackgroundJob\Job;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCA\Federation\DbHandler;
|
|
|
|
use OCA\Federation\TrustedServers;
|
|
|
|
use OCP\AppFramework\Http;
|
|
|
|
use OCP\BackgroundJob\IJobList;
|
|
|
|
use OCP\Http\Client\IClient;
|
2016-03-18 15:22:05 +03:00
|
|
|
use OCP\Http\Client\IResponse;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\IURLGenerator;
|
2017-02-24 17:33:09 +03:00
|
|
|
use OCP\OCS\IDiscoveryService;
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class GetSharedSecret
|
|
|
|
*
|
2017-04-12 07:16:27 +03:00
|
|
|
* request shared secret from remote Nextcloud
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
|
|
|
* @package OCA\Federation\Backgroundjob
|
|
|
|
*/
|
2016-03-18 15:22:05 +03:00
|
|
|
class GetSharedSecret extends Job{
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/** @var IClient */
|
|
|
|
private $httpClient;
|
|
|
|
|
|
|
|
/** @var IJobList */
|
|
|
|
private $jobList;
|
|
|
|
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
|
|
|
/** @var TrustedServers */
|
|
|
|
private $trustedServers;
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
/** @var DbHandler */
|
|
|
|
private $dbHandler;
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
/** @var IDiscoveryService */
|
|
|
|
private $ocsDiscoveryService;
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $retainJob = false;
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
private $format = '?format=json';
|
|
|
|
|
|
|
|
private $defaultEndPoint = '/ocs/v2.php/apps/federation/api/v1/shared-secret';
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* RequestSharedSecret constructor.
|
|
|
|
*
|
|
|
|
* @param IClient $httpClient
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param IJobList $jobList
|
|
|
|
* @param TrustedServers $trustedServers
|
|
|
|
* @param ILogger $logger
|
2015-11-19 13:48:21 +03:00
|
|
|
* @param DbHandler $dbHandler
|
2017-02-24 17:33:09 +03:00
|
|
|
* @param IDiscoveryService $ocsDiscoveryService
|
2015-11-10 12:50:59 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
IClient $httpClient = null,
|
|
|
|
IURLGenerator $urlGenerator = null,
|
|
|
|
IJobList $jobList = null,
|
|
|
|
TrustedServers $trustedServers = null,
|
2015-11-19 13:48:21 +03:00
|
|
|
ILogger $logger = null,
|
2017-02-24 17:33:09 +03:00
|
|
|
DbHandler $dbHandler = null,
|
2017-03-13 12:35:44 +03:00
|
|
|
IDiscoveryService $ocsDiscoveryService = null
|
2015-11-10 12:50:59 +03:00
|
|
|
) {
|
|
|
|
$this->logger = $logger ? $logger : \OC::$server->getLogger();
|
|
|
|
$this->httpClient = $httpClient ? $httpClient : \OC::$server->getHTTPClientService()->newClient();
|
|
|
|
$this->jobList = $jobList ? $jobList : \OC::$server->getJobList();
|
|
|
|
$this->urlGenerator = $urlGenerator ? $urlGenerator : \OC::$server->getURLGenerator();
|
2015-11-19 13:48:21 +03:00
|
|
|
$this->dbHandler = $dbHandler ? $dbHandler : new DbHandler(\OC::$server->getDatabaseConnection(), \OC::$server->getL10N('federation'));
|
2017-04-05 23:35:59 +03:00
|
|
|
$this->ocsDiscoveryService = $ocsDiscoveryService ? $ocsDiscoveryService : \OC::$server->query(\OCP\OCS\IDiscoveryService::class);
|
2015-11-10 12:50:59 +03:00
|
|
|
if ($trustedServers) {
|
|
|
|
$this->trustedServers = $trustedServers;
|
|
|
|
} else {
|
|
|
|
$this->trustedServers = new TrustedServers(
|
2016-02-26 18:59:53 +03:00
|
|
|
$this->dbHandler,
|
|
|
|
\OC::$server->getHTTPClientService(),
|
|
|
|
$this->logger,
|
|
|
|
$this->jobList,
|
|
|
|
\OC::$server->getSecureRandom(),
|
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getEventDispatcher()
|
2015-11-10 12:50:59 +03:00
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* run the job, then remove it from the joblist
|
|
|
|
*
|
|
|
|
* @param JobList $jobList
|
|
|
|
* @param ILogger $logger
|
|
|
|
*/
|
|
|
|
public function execute($jobList, ILogger $logger = null) {
|
|
|
|
$target = $this->argument['url'];
|
|
|
|
// only execute if target is still in the list of trusted domains
|
|
|
|
if ($this->trustedServers->isTrustedServer($target)) {
|
2015-11-19 19:49:43 +03:00
|
|
|
$this->parentExecute($jobList, $logger);
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
2016-03-18 15:22:05 +03:00
|
|
|
|
|
|
|
if (!$this->retainJob) {
|
|
|
|
$jobList->remove($this, $this->argument);
|
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
|
2015-11-19 19:49:43 +03:00
|
|
|
/**
|
|
|
|
* call execute() method of parent
|
|
|
|
*
|
|
|
|
* @param JobList $jobList
|
|
|
|
* @param ILogger $logger
|
|
|
|
*/
|
2016-07-06 00:19:10 +03:00
|
|
|
protected function parentExecute($jobList, $logger = null) {
|
2015-11-19 19:49:43 +03:00
|
|
|
parent::execute($jobList, $logger);
|
|
|
|
}
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
protected function run($argument) {
|
|
|
|
$target = $argument['url'];
|
|
|
|
$source = $this->urlGenerator->getAbsoluteURL('/');
|
|
|
|
$source = rtrim($source, '/');
|
|
|
|
$token = $argument['token'];
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
$endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
|
|
|
|
$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
|
|
|
|
|
|
|
|
// make sure that we have a well formated url
|
|
|
|
$url = rtrim($target, '/') . '/' . trim($endPoint, '/') . $this->format;
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
$result = null;
|
2015-11-19 13:48:21 +03:00
|
|
|
try {
|
|
|
|
$result = $this->httpClient->get(
|
2017-02-24 17:33:09 +03:00
|
|
|
$url,
|
2015-11-19 13:48:21 +03:00
|
|
|
[
|
|
|
|
'query' =>
|
|
|
|
[
|
|
|
|
'url' => $source,
|
|
|
|
'token' => $token
|
|
|
|
],
|
|
|
|
'timeout' => 3,
|
|
|
|
'connect_timeout' => 3,
|
|
|
|
]
|
|
|
|
);
|
|
|
|
|
|
|
|
$status = $result->getStatusCode();
|
|
|
|
|
|
|
|
} catch (ClientException $e) {
|
|
|
|
$status = $e->getCode();
|
2016-02-15 19:33:06 +03:00
|
|
|
if ($status === Http::STATUS_FORBIDDEN) {
|
|
|
|
$this->logger->info($target . ' refused to exchange a shared secret with you.', ['app' => 'federation']);
|
|
|
|
} else {
|
2017-04-21 12:29:01 +03:00
|
|
|
$this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage(), ['app' => 'federation']);
|
2016-02-15 19:33:06 +03:00
|
|
|
}
|
2016-02-01 15:39:13 +03:00
|
|
|
} catch (\Exception $e) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$status = Http::STATUS_INTERNAL_SERVER_ERROR;
|
2016-02-15 19:33:06 +03:00
|
|
|
$this->logger->logException($e, ['app' => 'federation']);
|
2015-11-19 13:48:21 +03:00
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
// if we received a unexpected response we try again later
|
|
|
|
if (
|
|
|
|
$status !== Http::STATUS_OK
|
|
|
|
&& $status !== Http::STATUS_FORBIDDEN
|
|
|
|
) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$this->retainJob = true;
|
2015-11-19 13:48:21 +03:00
|
|
|
} else {
|
|
|
|
// reset token if we received a valid response
|
|
|
|
$this->dbHandler->addToken($target, '');
|
|
|
|
}
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
if ($status === Http::STATUS_OK && $result instanceof IResponse) {
|
2015-11-10 12:50:59 +03:00
|
|
|
$body = $result->getBody();
|
|
|
|
$result = json_decode($body, true);
|
|
|
|
if (isset($result['ocs']['data']['sharedSecret'])) {
|
|
|
|
$this->trustedServers->addSharedSecret(
|
|
|
|
$target,
|
|
|
|
$result['ocs']['data']['sharedSecret']
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
$this->logger->error(
|
|
|
|
'remote server "' . $target . '"" does not return a valid shared secret',
|
|
|
|
['app' => 'federation']
|
|
|
|
);
|
|
|
|
$this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
|
|
|
|
}
|
|
|
|
}
|
2015-11-19 13:48:21 +03:00
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
}
|