2015-11-10 12:50:59 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-11-10 12:50:59 +03:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
namespace OCA\Federation\BackgroundJob;
|
|
|
|
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
use GuzzleHttp\Exception\ClientException;
|
2015-11-19 19:10:42 +03:00
|
|
|
use OC\BackgroundJob\JobList;
|
2016-03-18 15:22:05 +03:00
|
|
|
use OC\BackgroundJob\Job;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCA\Federation\DbHandler;
|
|
|
|
use OCA\Federation\TrustedServers;
|
|
|
|
use OCP\AppFramework\Http;
|
|
|
|
use OCP\BackgroundJob\IJobList;
|
|
|
|
use OCP\Http\Client\IClient;
|
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\IURLGenerator;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class RequestSharedSecret
|
|
|
|
*
|
|
|
|
* Ask remote ownCloud to request a sharedSecret from this server
|
|
|
|
*
|
|
|
|
* @package OCA\Federation\Backgroundjob
|
|
|
|
*/
|
2016-03-18 15:22:05 +03:00
|
|
|
class RequestSharedSecret extends Job {
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/** @var IClient */
|
|
|
|
private $httpClient;
|
|
|
|
|
|
|
|
/** @var IJobList */
|
|
|
|
private $jobList;
|
|
|
|
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
/** @var DbHandler */
|
|
|
|
private $dbHandler;
|
|
|
|
|
|
|
|
/** @var TrustedServers */
|
|
|
|
private $trustedServers;
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
private $endPoint = '/ocs/v2.php/apps/federation/api/v1/request-shared-secret?format=json';
|
|
|
|
|
2015-12-21 17:48:02 +03:00
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $retainJob = false;
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
/**
|
|
|
|
* RequestSharedSecret constructor.
|
|
|
|
*
|
|
|
|
* @param IClient $httpClient
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param IJobList $jobList
|
|
|
|
* @param TrustedServers $trustedServers
|
2015-11-19 13:48:21 +03:00
|
|
|
* @param DbHandler $dbHandler
|
2015-11-10 12:50:59 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
IClient $httpClient = null,
|
|
|
|
IURLGenerator $urlGenerator = null,
|
|
|
|
IJobList $jobList = null,
|
2015-11-19 13:48:21 +03:00
|
|
|
TrustedServers $trustedServers = null,
|
2016-03-18 15:22:05 +03:00
|
|
|
DbHandler $dbHandler = null
|
2015-11-10 12:50:59 +03:00
|
|
|
) {
|
|
|
|
$this->httpClient = $httpClient ? $httpClient : \OC::$server->getHTTPClientService()->newClient();
|
|
|
|
$this->jobList = $jobList ? $jobList : \OC::$server->getJobList();
|
|
|
|
$this->urlGenerator = $urlGenerator ? $urlGenerator : \OC::$server->getURLGenerator();
|
2015-11-19 13:48:21 +03:00
|
|
|
$this->dbHandler = $dbHandler ? $dbHandler : new DbHandler(\OC::$server->getDatabaseConnection(), \OC::$server->getL10N('federation'));
|
2015-12-21 17:48:02 +03:00
|
|
|
$this->logger = \OC::$server->getLogger();
|
2015-11-10 12:50:59 +03:00
|
|
|
if ($trustedServers) {
|
|
|
|
$this->trustedServers = $trustedServers;
|
|
|
|
} else {
|
|
|
|
$this->trustedServers = new TrustedServers(
|
2015-11-19 13:48:21 +03:00
|
|
|
$this->dbHandler,
|
2015-11-10 12:50:59 +03:00
|
|
|
\OC::$server->getHTTPClientService(),
|
2015-12-21 17:48:02 +03:00
|
|
|
$this->logger,
|
2015-11-10 12:50:59 +03:00
|
|
|
$this->jobList,
|
2015-11-18 17:07:41 +03:00
|
|
|
\OC::$server->getSecureRandom(),
|
2016-02-26 18:59:53 +03:00
|
|
|
\OC::$server->getConfig(),
|
|
|
|
\OC::$server->getEventDispatcher()
|
2015-11-10 12:50:59 +03:00
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* run the job, then remove it from the joblist
|
|
|
|
*
|
|
|
|
* @param JobList $jobList
|
|
|
|
* @param ILogger $logger
|
|
|
|
*/
|
|
|
|
public function execute($jobList, ILogger $logger = null) {
|
|
|
|
$target = $this->argument['url'];
|
|
|
|
// only execute if target is still in the list of trusted domains
|
|
|
|
if ($this->trustedServers->isTrustedServer($target)) {
|
2015-11-19 19:49:43 +03:00
|
|
|
$this->parentExecute($jobList, $logger);
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
2016-03-18 15:22:05 +03:00
|
|
|
|
|
|
|
if (!$this->retainJob) {
|
|
|
|
$jobList->remove($this, $this->argument);
|
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
|
2015-11-19 19:49:43 +03:00
|
|
|
/**
|
2016-03-18 15:22:05 +03:00
|
|
|
* call execute() method of parent
|
|
|
|
*
|
2015-11-19 19:49:43 +03:00
|
|
|
* @param JobList $jobList
|
|
|
|
* @param ILogger $logger
|
|
|
|
*/
|
|
|
|
protected function parentExecute($jobList, $logger) {
|
|
|
|
parent::execute($jobList, $logger);
|
|
|
|
}
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
protected function run($argument) {
|
|
|
|
|
|
|
|
$target = $argument['url'];
|
|
|
|
$source = $this->urlGenerator->getAbsoluteURL('/');
|
|
|
|
$source = rtrim($source, '/');
|
|
|
|
$token = $argument['token'];
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
try {
|
|
|
|
$result = $this->httpClient->post(
|
|
|
|
$target . $this->endPoint,
|
|
|
|
[
|
|
|
|
'body' => [
|
|
|
|
'url' => $source,
|
|
|
|
'token' => $token,
|
|
|
|
],
|
|
|
|
'timeout' => 3,
|
|
|
|
'connect_timeout' => 3,
|
|
|
|
]
|
|
|
|
);
|
2015-11-10 12:50:59 +03:00
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
$status = $result->getStatusCode();
|
|
|
|
|
|
|
|
} catch (ClientException $e) {
|
|
|
|
$status = $e->getCode();
|
2016-02-15 19:33:06 +03:00
|
|
|
if ($status === Http::STATUS_FORBIDDEN) {
|
|
|
|
$this->logger->info($target . ' refused to ask for a shared secret.', ['app' => 'federation']);
|
|
|
|
} else {
|
|
|
|
$this->logger->logException($e, ['app' => 'federation']);
|
|
|
|
}
|
2016-02-01 15:39:13 +03:00
|
|
|
} catch (\Exception $e) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$status = Http::STATUS_INTERNAL_SERVER_ERROR;
|
2016-02-15 19:33:06 +03:00
|
|
|
$this->logger->logException($e, ['app' => 'federation']);
|
2015-11-19 13:48:21 +03:00
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
// if we received a unexpected response we try again later
|
|
|
|
if (
|
|
|
|
$status !== Http::STATUS_OK
|
|
|
|
&& $status !== Http::STATUS_FORBIDDEN
|
|
|
|
) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$this->retainJob = true;
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
if ($status === Http::STATUS_FORBIDDEN) {
|
|
|
|
// clear token if remote server refuses to ask for shared secret
|
|
|
|
$this->dbHandler->addToken($target, '');
|
|
|
|
}
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
}
|