2014-10-31 13:41:07 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Jesús Macias <jmacias@solidgear.es>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Juan Pablo Villafáñez <jvillafanez@solidgear.es>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Files_External\Controller;
|
|
|
|
|
|
|
|
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCA\Files_External\Lib\Auth\AuthMechanism;
|
|
|
|
use OCA\Files_External\Lib\Backend\Backend;
|
2020-03-12 21:45:23 +03:00
|
|
|
use OCA\Files_External\Lib\DefinitionParameter;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCA\Files_External\Lib\InsufficientDataForMeaningfulAnswerException;
|
2016-05-13 12:56:47 +03:00
|
|
|
use OCA\Files_External\Lib\StorageConfig;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCA\Files_External\NotFoundException;
|
|
|
|
use OCA\Files_External\Service\StoragesService;
|
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\AppFramework\Http;
|
|
|
|
use OCP\AppFramework\Http\DataResponse;
|
|
|
|
use OCP\Files\StorageNotAvailableException;
|
|
|
|
use OCP\IL10N;
|
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\IRequest;
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2015-03-17 13:42:52 +03:00
|
|
|
/**
|
|
|
|
* Base class for storages controllers
|
|
|
|
*/
|
2014-10-31 13:41:07 +03:00
|
|
|
abstract class StoragesController extends Controller {
|
|
|
|
|
|
|
|
/**
|
2015-03-17 13:42:52 +03:00
|
|
|
* L10N service
|
|
|
|
*
|
2015-03-16 16:39:48 +03:00
|
|
|
* @var IL10N
|
2014-10-31 13:41:07 +03:00
|
|
|
*/
|
|
|
|
protected $l10n;
|
|
|
|
|
|
|
|
/**
|
2015-03-17 13:42:52 +03:00
|
|
|
* Storages service
|
|
|
|
*
|
2014-10-31 13:41:07 +03:00
|
|
|
* @var StoragesService
|
|
|
|
*/
|
|
|
|
protected $service;
|
|
|
|
|
2016-01-28 15:07:19 +03:00
|
|
|
/**
|
|
|
|
* @var ILogger
|
|
|
|
*/
|
|
|
|
protected $logger;
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
2015-03-16 16:39:48 +03:00
|
|
|
* Creates a new storages controller.
|
|
|
|
*
|
|
|
|
* @param string $AppName application name
|
|
|
|
* @param IRequest $request request object
|
|
|
|
* @param IL10N $l10n l10n service
|
|
|
|
* @param StoragesService $storagesService storage service
|
2016-01-28 15:07:19 +03:00
|
|
|
* @param ILogger $logger
|
2014-10-31 13:41:07 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
$AppName,
|
|
|
|
IRequest $request,
|
2015-03-16 16:39:48 +03:00
|
|
|
IL10N $l10n,
|
2016-01-28 15:07:19 +03:00
|
|
|
StoragesService $storagesService,
|
|
|
|
ILogger $logger
|
2015-03-17 13:42:52 +03:00
|
|
|
) {
|
2014-10-31 13:41:07 +03:00
|
|
|
parent::__construct($AppName, $request);
|
|
|
|
$this->l10n = $l10n;
|
|
|
|
$this->service = $storagesService;
|
2016-01-28 15:07:19 +03:00
|
|
|
$this->logger = $logger;
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2015-08-11 20:45:07 +03:00
|
|
|
/**
|
|
|
|
* Create a storage from its parameters
|
|
|
|
*
|
|
|
|
* @param string $mountPoint storage mount point
|
2015-08-12 22:03:11 +03:00
|
|
|
* @param string $backend backend identifier
|
|
|
|
* @param string $authMechanism authentication mechanism identifier
|
2015-08-11 20:45:07 +03:00
|
|
|
* @param array $backendOptions backend-specific options
|
|
|
|
* @param array|null $mountOptions mount-specific options
|
|
|
|
* @param array|null $applicableUsers users for which to mount the storage
|
|
|
|
* @param array|null $applicableGroups groups for which to mount the storage
|
|
|
|
* @param int|null $priority priority
|
|
|
|
*
|
|
|
|
* @return StorageConfig|DataResponse
|
|
|
|
*/
|
|
|
|
protected function createStorage(
|
|
|
|
$mountPoint,
|
2015-08-12 22:03:11 +03:00
|
|
|
$backend,
|
|
|
|
$authMechanism,
|
2015-08-11 20:45:07 +03:00
|
|
|
$backendOptions,
|
|
|
|
$mountOptions = null,
|
|
|
|
$applicableUsers = null,
|
|
|
|
$applicableGroups = null,
|
|
|
|
$priority = null
|
|
|
|
) {
|
|
|
|
try {
|
|
|
|
return $this->service->createStorage(
|
|
|
|
$mountPoint,
|
2015-08-12 22:03:11 +03:00
|
|
|
$backend,
|
|
|
|
$authMechanism,
|
2015-08-11 20:45:07 +03:00
|
|
|
$backendOptions,
|
|
|
|
$mountOptions,
|
|
|
|
$applicableUsers,
|
|
|
|
$applicableGroups,
|
|
|
|
$priority
|
|
|
|
);
|
|
|
|
} catch (\InvalidArgumentException $e) {
|
2016-01-28 15:07:19 +03:00
|
|
|
$this->logger->logException($e);
|
2015-08-11 20:45:07 +03:00
|
|
|
return new DataResponse(
|
|
|
|
[
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'message' => (string)$this->l10n->t('Invalid backend or authentication mechanism class')
|
2015-08-11 20:45:07 +03:00
|
|
|
],
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Validate storage config
|
|
|
|
*
|
|
|
|
* @param StorageConfig $storage storage config
|
2016-01-28 15:07:19 +03:00
|
|
|
*1
|
2014-10-31 13:41:07 +03:00
|
|
|
* @return DataResponse|null returns response in case of validation error
|
|
|
|
*/
|
2015-09-17 12:24:19 +03:00
|
|
|
protected function validate(StorageConfig $storage) {
|
2014-10-31 13:41:07 +03:00
|
|
|
$mountPoint = $storage->getMountPoint();
|
2017-02-10 15:29:18 +03:00
|
|
|
if ($mountPoint === '') {
|
2014-10-31 13:41:07 +03:00
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
|
|
|
'message' => (string)$this->l10n->t('Invalid mount point'),
|
|
|
|
],
|
2014-10-31 13:41:07 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-08-25 16:51:47 +03:00
|
|
|
if ($storage->getBackendOption('objectstore')) {
|
|
|
|
// objectstore must not be sent from client side
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
|
|
|
'message' => (string)$this->l10n->t('Objectstore forbidden'),
|
|
|
|
],
|
2015-08-25 16:51:47 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-08-11 20:45:07 +03:00
|
|
|
/** @var Backend */
|
|
|
|
$backend = $storage->getBackend();
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
/** @var AuthMechanism */
|
|
|
|
$authMechanism = $storage->getAuthMechanism();
|
2015-09-23 17:35:17 +03:00
|
|
|
if ($backend->checkDependencies()) {
|
2014-10-31 13:41:07 +03:00
|
|
|
// invalid backend
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
2015-08-11 20:45:07 +03:00
|
|
|
'message' => (string)$this->l10n->t('Invalid storage backend "%s"', [
|
2020-03-12 21:45:23 +03:00
|
|
|
$backend->getIdentifier(),
|
|
|
|
]),
|
|
|
|
],
|
2015-08-11 20:45:07 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
2015-08-28 18:15:21 +03:00
|
|
|
|
2015-09-23 17:35:17 +03:00
|
|
|
if (!$backend->isVisibleFor($this->service->getVisibilityType())) {
|
2015-08-28 18:15:21 +03:00
|
|
|
// not permitted to use backend
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
2015-08-28 18:15:21 +03:00
|
|
|
'message' => (string)$this->l10n->t('Not permitted to use backend "%s"', [
|
2020-03-12 21:45:23 +03:00
|
|
|
$backend->getIdentifier(),
|
|
|
|
]),
|
|
|
|
],
|
2015-08-28 18:15:21 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
2015-09-23 17:35:17 +03:00
|
|
|
if (!$authMechanism->isVisibleFor($this->service->getVisibilityType())) {
|
2015-08-28 18:15:21 +03:00
|
|
|
// not permitted to use auth mechanism
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
2015-08-28 18:15:21 +03:00
|
|
|
'message' => (string)$this->l10n->t('Not permitted to use authentication mechanism "%s"', [
|
2020-03-12 21:45:23 +03:00
|
|
|
$authMechanism->getIdentifier(),
|
|
|
|
]),
|
|
|
|
],
|
2015-08-28 18:15:21 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-08-11 20:45:07 +03:00
|
|
|
if (!$backend->validateStorage($storage)) {
|
|
|
|
// unsatisfied parameters
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
[
|
|
|
|
'message' => (string)$this->l10n->t('Unsatisfied backend parameters'),
|
|
|
|
],
|
2014-10-31 13:41:07 +03:00
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
if (!$authMechanism->validateStorage($storage)) {
|
|
|
|
// unsatisfied parameters
|
|
|
|
return new DataResponse(
|
|
|
|
[
|
2020-03-12 21:45:23 +03:00
|
|
|
'message' => (string)$this->l10n->t('Unsatisfied authentication mechanism parameters'),
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
],
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2016-01-05 18:56:09 +03:00
|
|
|
protected function manipulateStorageConfig(StorageConfig $storage) {
|
|
|
|
/** @var AuthMechanism */
|
|
|
|
$authMechanism = $storage->getAuthMechanism();
|
|
|
|
$authMechanism->manipulateStorageConfig($storage);
|
|
|
|
/** @var Backend */
|
|
|
|
$backend = $storage->getBackend();
|
|
|
|
$backend->manipulateStorageConfig($storage);
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Check whether the given storage is available / valid.
|
|
|
|
*
|
|
|
|
* Note that this operation can be time consuming depending
|
|
|
|
* on whether the remote storage is available or not.
|
|
|
|
*
|
2015-03-17 13:42:52 +03:00
|
|
|
* @param StorageConfig $storage storage configuration
|
2016-06-17 15:25:29 +03:00
|
|
|
* @param bool $testOnly whether to storage should only test the connection or do more things
|
2014-10-31 13:41:07 +03:00
|
|
|
*/
|
2016-06-08 13:48:33 +03:00
|
|
|
protected function updateStorageStatus(StorageConfig &$storage, $testOnly = true) {
|
2015-08-12 21:51:09 +03:00
|
|
|
try {
|
2016-01-05 18:56:09 +03:00
|
|
|
$this->manipulateStorageConfig($storage);
|
|
|
|
|
2015-08-12 21:51:09 +03:00
|
|
|
/** @var Backend */
|
|
|
|
$backend = $storage->getBackend();
|
|
|
|
// update status (can be time-consuming)
|
|
|
|
$storage->setStatus(
|
|
|
|
\OC_Mount_Config::getBackendStatus(
|
|
|
|
$backend->getStorageClass(),
|
|
|
|
$storage->getBackendOptions(),
|
2016-06-07 17:53:16 +03:00
|
|
|
false,
|
2016-06-07 19:25:17 +03:00
|
|
|
$testOnly
|
2015-08-12 21:51:09 +03:00
|
|
|
)
|
|
|
|
);
|
|
|
|
} catch (InsufficientDataForMeaningfulAnswerException $e) {
|
2015-12-03 14:28:52 +03:00
|
|
|
$status = $e->getCode() ? $e->getCode() : StorageNotAvailableException::STATUS_INDETERMINATE;
|
2015-09-16 18:58:26 +03:00
|
|
|
$storage->setStatus(
|
2015-12-03 14:28:52 +03:00
|
|
|
$status,
|
2015-09-16 18:58:26 +03:00
|
|
|
$this->l10n->t('Insufficient data: %s', [$e->getMessage()])
|
|
|
|
);
|
2015-11-25 20:04:31 +03:00
|
|
|
} catch (StorageNotAvailableException $e) {
|
|
|
|
$storage->setStatus(
|
2015-11-26 10:26:07 +03:00
|
|
|
$e->getCode(),
|
2015-11-25 20:04:31 +03:00
|
|
|
$this->l10n->t('%s', [$e->getMessage()])
|
|
|
|
);
|
2015-09-16 18:58:26 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
// FIXME: convert storage exceptions to StorageNotAvailableException
|
|
|
|
$storage->setStatus(
|
2015-11-26 19:51:47 +03:00
|
|
|
StorageNotAvailableException::STATUS_ERROR,
|
2020-03-12 21:45:23 +03:00
|
|
|
get_class($e) . ': ' . $e->getMessage()
|
2015-09-16 18:58:26 +03:00
|
|
|
);
|
2015-08-12 21:51:09 +03:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
/**
|
|
|
|
* Get all storage entries
|
|
|
|
*
|
|
|
|
* @return DataResponse
|
|
|
|
*/
|
|
|
|
public function index() {
|
2020-03-12 21:45:23 +03:00
|
|
|
$storages = $this->formatStoragesForUI($this->service->getStorages());
|
2015-09-14 01:23:42 +03:00
|
|
|
|
|
|
|
return new DataResponse(
|
|
|
|
$storages,
|
|
|
|
Http::STATUS_OK
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2020-03-12 21:45:23 +03:00
|
|
|
protected function formatStoragesForUI(array $storages): array {
|
|
|
|
return array_map(function ($storage) {
|
|
|
|
return $this->formatStorageForUI($storage);
|
|
|
|
}, $storages);
|
|
|
|
}
|
|
|
|
|
|
|
|
protected function formatStorageForUI(StorageConfig $storage): StorageConfig {
|
|
|
|
/** @var DefinitionParameter[] $parameters */
|
|
|
|
$parameters = array_merge($storage->getBackend()->getParameters(), $storage->getAuthMechanism()->getParameters());
|
|
|
|
|
|
|
|
$options = $storage->getBackendOptions();
|
|
|
|
foreach ($options as $key => $value) {
|
|
|
|
foreach ($parameters as $parameter) {
|
|
|
|
if ($parameter->getName() === $key && $parameter->getType() === DefinitionParameter::VALUE_PASSWORD) {
|
|
|
|
$storage->setBackendOption($key, DefinitionParameter::UNMODIFIED_PLACEHOLDER);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $storage;
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Get an external storage entry.
|
|
|
|
*
|
|
|
|
* @param int $id storage id
|
2016-06-17 15:25:29 +03:00
|
|
|
* @param bool $testOnly whether to storage should only test the connection or do more things
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
|
|
|
* @return DataResponse
|
|
|
|
*/
|
2016-06-08 13:48:33 +03:00
|
|
|
public function show($id, $testOnly = true) {
|
2014-10-31 13:41:07 +03:00
|
|
|
try {
|
|
|
|
$storage = $this->service->getStorage($id);
|
|
|
|
|
2016-06-07 19:25:17 +03:00
|
|
|
$this->updateStorageStatus($storage, $testOnly);
|
2014-10-31 13:41:07 +03:00
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return new DataResponse(
|
|
|
|
[
|
2020-03-12 21:45:23 +03:00
|
|
|
'message' => (string)$this->l10n->t('Storage with ID "%d" not found', [$id]),
|
2014-10-31 13:41:07 +03:00
|
|
|
],
|
|
|
|
Http::STATUS_NOT_FOUND
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
return new DataResponse(
|
2020-03-12 21:45:23 +03:00
|
|
|
$this->formatStorageForUI($storage),
|
2014-10-31 13:41:07 +03:00
|
|
|
Http::STATUS_OK
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Deletes the storage with the given id.
|
|
|
|
*
|
|
|
|
* @param int $id storage id
|
|
|
|
*
|
|
|
|
* @return DataResponse
|
|
|
|
*/
|
|
|
|
public function destroy($id) {
|
|
|
|
try {
|
|
|
|
$this->service->removeStorage($id);
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return new DataResponse(
|
|
|
|
[
|
2020-03-12 21:45:23 +03:00
|
|
|
'message' => (string)$this->l10n->t('Storage with ID "%d" not found', [$id]),
|
2014-10-31 13:41:07 +03:00
|
|
|
],
|
|
|
|
Http::STATUS_NOT_FOUND
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
return new DataResponse([], Http::STATUS_NO_CONTENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|