2018-04-30 17:29:56 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @copyright Copyright (c) 2018 Bjoern Schiessle <bjoern@schiessle.org>
|
|
|
|
*
|
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2018-04-30 17:29:56 +03:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-04-30 17:29:56 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\CloudFederationAPI\Controller;
|
|
|
|
|
|
|
|
use OCA\CloudFederationAPI\Config;
|
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\AppFramework\Http;
|
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2018-05-09 18:06:35 +03:00
|
|
|
use OCP\Federation\Exceptions\ActionNotSupportedException;
|
2018-05-29 17:21:13 +03:00
|
|
|
use OCP\Federation\Exceptions\AuthenticationFailedException;
|
|
|
|
use OCP\Federation\Exceptions\BadRequestException;
|
2018-04-30 17:29:56 +03:00
|
|
|
use OCP\Federation\Exceptions\ProviderCouldNotAddShareException;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\Federation\Exceptions\ProviderDoesNotExistsException;
|
2018-04-30 17:29:56 +03:00
|
|
|
use OCP\Federation\ICloudFederationFactory;
|
|
|
|
use OCP\Federation\ICloudFederationProviderManager;
|
2018-05-04 16:25:02 +03:00
|
|
|
use OCP\Federation\ICloudIdManager;
|
2018-06-13 15:19:59 +03:00
|
|
|
use OCP\IGroupManager;
|
2018-04-30 17:29:56 +03:00
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\IURLGenerator;
|
|
|
|
use OCP\IUserManager;
|
2018-06-07 15:40:12 +03:00
|
|
|
use OCP\Share\Exceptions\ShareNotFound;
|
2018-04-30 17:29:56 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class RequestHandlerController
|
|
|
|
*
|
|
|
|
* handle API between different Cloud instances
|
|
|
|
*
|
|
|
|
* @package OCA\CloudFederationAPI\Controller
|
|
|
|
*/
|
|
|
|
class RequestHandlerController extends Controller {
|
|
|
|
|
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var IUserManager */
|
|
|
|
private $userManager;
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
/** @var IGroupManager */
|
|
|
|
private $groupManager;
|
|
|
|
|
2018-04-30 17:29:56 +03:00
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
|
|
|
/** @var ICloudFederationProviderManager */
|
|
|
|
private $cloudFederationProviderManager;
|
|
|
|
|
|
|
|
/** @var Config */
|
|
|
|
private $config;
|
|
|
|
|
|
|
|
/** @var ICloudFederationFactory */
|
|
|
|
private $factory;
|
|
|
|
|
2018-05-04 16:25:02 +03:00
|
|
|
/** @var ICloudIdManager */
|
|
|
|
private $cloudIdManager;
|
|
|
|
|
2018-04-30 17:29:56 +03:00
|
|
|
public function __construct($appName,
|
|
|
|
IRequest $request,
|
|
|
|
ILogger $logger,
|
|
|
|
IUserManager $userManager,
|
2018-06-13 15:19:59 +03:00
|
|
|
IGroupManager $groupManager,
|
2018-04-30 17:29:56 +03:00
|
|
|
IURLGenerator $urlGenerator,
|
|
|
|
ICloudFederationProviderManager $cloudFederationProviderManager,
|
|
|
|
Config $config,
|
2018-05-04 16:25:02 +03:00
|
|
|
ICloudFederationFactory $factory,
|
|
|
|
ICloudIdManager $cloudIdManager
|
2018-04-30 17:29:56 +03:00
|
|
|
) {
|
|
|
|
parent::__construct($appName, $request);
|
|
|
|
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->userManager = $userManager;
|
2018-06-13 15:19:59 +03:00
|
|
|
$this->groupManager = $groupManager;
|
2018-04-30 17:29:56 +03:00
|
|
|
$this->urlGenerator = $urlGenerator;
|
|
|
|
$this->cloudFederationProviderManager = $cloudFederationProviderManager;
|
|
|
|
$this->config = $config;
|
|
|
|
$this->factory = $factory;
|
2018-05-04 16:25:02 +03:00
|
|
|
$this->cloudIdManager = $cloudIdManager;
|
2018-04-30 17:29:56 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* add share
|
|
|
|
*
|
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
* @BruteForceProtection(action=receiveFederatedShare)
|
|
|
|
*
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param string $name resource name (e.g. document.odt)
|
|
|
|
* @param string $description share description (optional)
|
|
|
|
* @param string $providerId resource UID on the provider side
|
|
|
|
* @param string $owner provider specific UID of the user who owns the resource
|
|
|
|
* @param string $ownerDisplayName display name of the user who shared the item
|
|
|
|
* @param string $sharedBy provider specific UID of the user who shared the resource
|
2018-05-28 18:13:19 +03:00
|
|
|
* @param string $sharedByDisplayName display name of the user who shared the resource
|
2018-04-30 17:29:56 +03:00
|
|
|
* @param array $protocol (e,.g. ['name' => 'webdav', 'options' => ['username' => 'john', 'permissions' => 31]])
|
|
|
|
* @param string $shareType ('group' or 'user' share)
|
|
|
|
* @param $resourceType ('file', 'calendar',...)
|
|
|
|
* @return Http\DataResponse|JSONResponse
|
|
|
|
*
|
2018-05-28 18:13:19 +03:00
|
|
|
* Example: curl -H "Content-Type: application/json" -X POST -d '{"shareWith":"admin1@serve1","name":"welcome server2.txt","description":"desc","providerId":"2","owner":"admin2@http://localhost/server2","ownerDisplayName":"admin2 display","shareType":"user","resourceType":"file","protocol":{"name":"webdav","options":{"sharedSecret":"secret","permissions":"webdav-property"}}}' http://localhost/server/index.php/ocm/shares
|
2018-04-30 17:29:56 +03:00
|
|
|
*/
|
|
|
|
public function addShare($shareWith, $name, $description, $providerId, $owner, $ownerDisplayName, $sharedBy, $sharedByDisplayName, $protocol, $shareType, $resourceType) {
|
2018-06-04 13:16:03 +03:00
|
|
|
|
2018-04-30 17:29:56 +03:00
|
|
|
// check if all required parameters are set
|
|
|
|
if ($shareWith === null ||
|
|
|
|
$name === null ||
|
|
|
|
$providerId === null ||
|
|
|
|
$owner === null ||
|
|
|
|
$resourceType === null ||
|
|
|
|
$shareType === null ||
|
|
|
|
!is_array($protocol) ||
|
|
|
|
!isset($protocol['name']) ||
|
|
|
|
!isset ($protocol['options']) ||
|
2018-05-28 18:13:19 +03:00
|
|
|
!is_array($protocol['options']) ||
|
|
|
|
!isset($protocol['options']['sharedSecret'])
|
2018-04-30 17:29:56 +03:00
|
|
|
) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'Missing arguments'],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
$supportedShareTypes = $this->config->getSupportedShareTypes($resourceType);
|
|
|
|
if (!in_array($shareType, $supportedShareTypes)) {
|
2018-04-30 17:29:56 +03:00
|
|
|
return new JSONResponse(
|
2018-06-13 15:19:59 +03:00
|
|
|
['message' => 'Share type "' . $shareType . '" not implemented'],
|
|
|
|
Http::STATUS_NOT_IMPLEMENTED
|
2018-04-30 17:29:56 +03:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
$cloudId = $this->cloudIdManager->resolveCloudId($shareWith);
|
|
|
|
$shareWith = $cloudId->getUser();
|
|
|
|
|
|
|
|
if ($shareType === 'user') {
|
|
|
|
$shareWith = $this->mapUid($shareWith);
|
|
|
|
|
|
|
|
if (!$this->userManager->userExists($shareWith)) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'User "' . $shareWith . '" does not exists at ' . $this->urlGenerator->getBaseUrl()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($shareType === 'group') {
|
|
|
|
if(!$this->groupManager->groupExists($shareWith)) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'Group "' . $shareWith . '" does not exists at ' . $this->urlGenerator->getBaseUrl()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-30 17:29:56 +03:00
|
|
|
// if no explicit display name is given, we use the uid as display name
|
|
|
|
$ownerDisplayName = $ownerDisplayName === null ? $owner : $ownerDisplayName;
|
|
|
|
$sharedByDisplayName = $sharedByDisplayName === null ? $sharedBy : $sharedByDisplayName;
|
|
|
|
|
|
|
|
// sharedBy* parameter is optional, if nothing is set we assume that it is the same user as the owner
|
|
|
|
if ($sharedBy === null) {
|
|
|
|
$sharedBy = $owner;
|
|
|
|
$sharedByDisplayName = $ownerDisplayName;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$provider = $this->cloudFederationProviderManager->getCloudFederationProvider($resourceType);
|
2018-05-28 18:13:19 +03:00
|
|
|
$share = $this->factory->getCloudFederationShare($shareWith, $name, $description, $providerId, $owner, $ownerDisplayName, $sharedBy, $sharedByDisplayName, '', $shareType, $resourceType);
|
|
|
|
$share->setProtocol($protocol);
|
2018-06-13 15:19:59 +03:00
|
|
|
$provider->shareReceived($share);
|
2018-04-30 17:29:56 +03:00
|
|
|
} catch (ProviderDoesNotExistsException $e) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => $e->getMessage()],
|
|
|
|
Http::STATUS_NOT_IMPLEMENTED
|
|
|
|
);
|
|
|
|
} catch (ProviderCouldNotAddShareException $e) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => $e->getMessage()],
|
|
|
|
$e->getCode()
|
|
|
|
);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'Internal error at ' . $this->urlGenerator->getBaseUrl()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
$user = $this->userManager->get($shareWith);
|
2018-06-13 12:57:00 +03:00
|
|
|
$recipientDisplayName = '';
|
|
|
|
if($user) {
|
|
|
|
$recipientDisplayName = $user->getDisplayName();
|
|
|
|
}
|
|
|
|
|
2018-04-30 17:29:56 +03:00
|
|
|
return new JSONResponse(
|
2018-06-13 12:57:00 +03:00
|
|
|
['recipientDisplayName' => $recipientDisplayName],
|
2018-04-30 17:29:56 +03:00
|
|
|
Http::STATUS_CREATED);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* receive notification about existing share
|
|
|
|
*
|
2018-05-28 18:13:19 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
* @BruteForceProtection(action=receiveFederatedShareNotification)
|
|
|
|
*
|
2018-05-09 18:06:35 +03:00
|
|
|
* @param string $notificationType (notification type, e.g. SHARE_ACCEPTED)
|
|
|
|
* @param string $resourceType (calendar, file, contact,...)
|
2018-05-28 18:13:19 +03:00
|
|
|
* @param string $providerId id of the share
|
|
|
|
* @param array $notification the actual payload of the notification
|
2018-04-30 17:29:56 +03:00
|
|
|
* @return JSONResponse
|
|
|
|
*/
|
2018-05-28 18:13:19 +03:00
|
|
|
public function receiveNotification($notificationType, $resourceType, $providerId, array $notification) {
|
2018-04-30 17:29:56 +03:00
|
|
|
|
|
|
|
// check if all required parameters are set
|
2018-05-09 18:06:35 +03:00
|
|
|
if ($notificationType === null ||
|
|
|
|
$resourceType === null ||
|
2018-05-28 18:13:19 +03:00
|
|
|
$providerId === null ||
|
|
|
|
!is_array($notification)
|
2018-04-30 17:29:56 +03:00
|
|
|
) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'Missing arguments'],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$provider = $this->cloudFederationProviderManager->getCloudFederationProvider($resourceType);
|
2018-06-04 13:16:03 +03:00
|
|
|
$result = $provider->notificationReceived($notificationType, $providerId, $notification);
|
2018-04-30 17:29:56 +03:00
|
|
|
} catch (ProviderDoesNotExistsException $e) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => $e->getMessage()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
2018-06-07 15:40:12 +03:00
|
|
|
} catch (ShareNotFound $e) {
|
2018-04-30 17:29:56 +03:00
|
|
|
return new JSONResponse(
|
|
|
|
['message' => $e->getMessage()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
2018-05-09 18:06:35 +03:00
|
|
|
} catch (ActionNotSupportedException $e) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => $e->getMessage()],
|
|
|
|
Http::STATUS_NOT_IMPLEMENTED
|
|
|
|
);
|
2018-05-29 17:21:13 +03:00
|
|
|
} catch (BadRequestException $e) {
|
|
|
|
return new JSONResponse($e->getReturnMessage(), Http::STATUS_BAD_REQUEST);
|
|
|
|
} catch (AuthenticationFailedException $e) {
|
|
|
|
return new JSONResponse(["message" => "RESOURCE_NOT_FOUND"], Http::STATUS_FORBIDDEN);
|
|
|
|
}
|
|
|
|
catch (\Exception $e) {
|
2018-04-30 17:29:56 +03:00
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'Internal error at ' . $this->urlGenerator->getBaseUrl()],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-06-04 13:16:03 +03:00
|
|
|
return new JSONResponse($result,Http::STATUS_CREATED);
|
2018-04-30 17:29:56 +03:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* map login name to internal LDAP UID if a LDAP backend is in use
|
|
|
|
*
|
|
|
|
* @param string $uid
|
|
|
|
* @return string mixed
|
|
|
|
*/
|
|
|
|
private function mapUid($uid) {
|
|
|
|
// FIXME this should be a method in the user management instead
|
|
|
|
$this->logger->debug('shareWith before, ' . $uid, ['app' => $this->appName]);
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
|
|
|
array('uid' => &$uid)
|
|
|
|
);
|
|
|
|
$this->logger->debug('shareWith after, ' . $uid, ['app' => $this->appName]);
|
|
|
|
|
|
|
|
return $uid;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|