2016-02-04 11:59:52 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Julius Härtl <jus@bitgrid.net>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2020-08-24 15:54:25 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\FederatedFileSharing;
|
|
|
|
|
2020-07-13 16:43:42 +03:00
|
|
|
use OCA\FederatedFileSharing\Events\FederatedShareAddedEvent;
|
2016-05-17 16:03:37 +03:00
|
|
|
use OCP\AppFramework\Http;
|
2016-04-05 13:33:15 +03:00
|
|
|
use OCP\BackgroundJob\IJobList;
|
2020-07-13 16:43:42 +03:00
|
|
|
use OCP\EventDispatcher\IEventDispatcher;
|
2018-05-04 16:25:02 +03:00
|
|
|
use OCP\Federation\ICloudFederationFactory;
|
|
|
|
use OCP\Federation\ICloudFederationProviderManager;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OCP\Http\Client\IClientService;
|
2017-03-10 17:37:21 +03:00
|
|
|
use OCP\OCS\IDiscoveryService;
|
2021-02-08 12:11:00 +03:00
|
|
|
use OCP\ILogger;
|
2016-02-04 11:59:52 +03:00
|
|
|
|
|
|
|
class Notifications {
|
2020-04-10 17:54:27 +03:00
|
|
|
public const RESPONSE_FORMAT = 'json'; // default response format for ocs calls
|
2016-02-04 11:59:52 +03:00
|
|
|
|
|
|
|
/** @var AddressHandler */
|
|
|
|
private $addressHandler;
|
2016-04-05 13:33:15 +03:00
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/** @var IClientService */
|
|
|
|
private $httpClientService;
|
2016-04-05 13:33:15 +03:00
|
|
|
|
2017-03-10 17:37:21 +03:00
|
|
|
/** @var IDiscoveryService */
|
|
|
|
private $discoveryService;
|
2016-02-04 11:59:52 +03:00
|
|
|
|
2016-04-05 13:33:15 +03:00
|
|
|
/** @var IJobList */
|
|
|
|
private $jobList;
|
|
|
|
|
2018-05-04 16:25:02 +03:00
|
|
|
/** @var ICloudFederationProviderManager */
|
|
|
|
private $federationProviderManager;
|
|
|
|
|
|
|
|
/** @var ICloudFederationFactory */
|
|
|
|
private $cloudFederationFactory;
|
|
|
|
|
2020-07-13 16:43:42 +03:00
|
|
|
/** @var IEventDispatcher */
|
|
|
|
private $eventDispatcher;
|
|
|
|
|
2021-02-08 12:11:00 +03:00
|
|
|
/** @var ILogger */
|
2021-02-09 10:35:16 +03:00
|
|
|
private $logger;
|
2021-02-08 12:11:00 +03:00
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
public function __construct(
|
|
|
|
AddressHandler $addressHandler,
|
2016-02-25 22:46:01 +03:00
|
|
|
IClientService $httpClientService,
|
2017-03-10 17:37:21 +03:00
|
|
|
IDiscoveryService $discoveryService,
|
2021-02-09 09:49:01 +03:00
|
|
|
ILogger $logger,
|
2018-05-04 16:25:02 +03:00
|
|
|
IJobList $jobList,
|
|
|
|
ICloudFederationProviderManager $federationProviderManager,
|
2020-07-13 16:43:42 +03:00
|
|
|
ICloudFederationFactory $cloudFederationFactory,
|
|
|
|
IEventDispatcher $eventDispatcher
|
2016-02-04 11:59:52 +03:00
|
|
|
) {
|
|
|
|
$this->addressHandler = $addressHandler;
|
|
|
|
$this->httpClientService = $httpClientService;
|
2017-03-10 17:37:21 +03:00
|
|
|
$this->discoveryService = $discoveryService;
|
2016-04-05 13:33:15 +03:00
|
|
|
$this->jobList = $jobList;
|
2021-02-09 09:49:01 +03:00
|
|
|
$this->logger = $logger;
|
2018-05-04 16:25:02 +03:00
|
|
|
$this->federationProviderManager = $federationProviderManager;
|
|
|
|
$this->cloudFederationFactory = $cloudFederationFactory;
|
2020-07-13 16:43:42 +03:00
|
|
|
$this->eventDispatcher = $eventDispatcher;
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* send server-to-server share to remote server
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param string $name
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $remoteId
|
2016-02-04 11:59:52 +03:00
|
|
|
* @param string $owner
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $ownerFederatedId
|
|
|
|
* @param string $sharedBy
|
|
|
|
* @param string $sharedByFederatedId
|
2018-06-13 15:19:59 +03:00
|
|
|
* @param int $shareType (can be a remote user or group share)
|
2016-02-04 11:59:52 +03:00
|
|
|
* @return bool
|
2016-05-04 16:26:30 +03:00
|
|
|
* @throws \OC\HintException
|
|
|
|
* @throws \OC\ServerNotAvailableException
|
2016-02-04 11:59:52 +03:00
|
|
|
*/
|
2020-11-20 15:29:36 +03:00
|
|
|
public function sendRemoteShare($token, $shareWith, $name, $remoteId, $owner, $ownerFederatedId, $sharedBy, $sharedByFederatedId, $shareType) {
|
2021-01-12 12:15:48 +03:00
|
|
|
[$user, $remote] = $this->addressHandler->splitUserRemote($shareWith);
|
2016-02-04 11:59:52 +03:00
|
|
|
|
|
|
|
if ($user && $remote) {
|
|
|
|
$local = $this->addressHandler->generateRemoteURL();
|
|
|
|
|
2020-03-26 11:30:18 +03:00
|
|
|
$fields = [
|
2016-02-04 11:59:52 +03:00
|
|
|
'shareWith' => $user,
|
|
|
|
'token' => $token,
|
|
|
|
'name' => $name,
|
2020-11-20 15:29:36 +03:00
|
|
|
'remoteId' => $remoteId,
|
2016-02-04 11:59:52 +03:00
|
|
|
'owner' => $owner,
|
2016-05-04 16:26:30 +03:00
|
|
|
'ownerFederatedId' => $ownerFederatedId,
|
|
|
|
'sharedBy' => $sharedBy,
|
|
|
|
'sharedByFederatedId' => $sharedByFederatedId,
|
2016-02-04 11:59:52 +03:00
|
|
|
'remote' => $local,
|
2018-06-13 15:19:59 +03:00
|
|
|
'shareType' => $shareType
|
2020-03-26 11:30:18 +03:00
|
|
|
];
|
2016-02-04 11:59:52 +03:00
|
|
|
|
2016-11-02 12:44:55 +03:00
|
|
|
$result = $this->tryHttpPostToShareEndpoint($remote, '', $fields);
|
2016-02-04 11:59:52 +03:00
|
|
|
$status = json_decode($result['result'], true);
|
|
|
|
|
2018-05-04 16:25:02 +03:00
|
|
|
$ocsStatus = isset($status['ocs']);
|
|
|
|
$ocsSuccess = $ocsStatus && ($status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200);
|
|
|
|
|
2020-10-05 16:12:57 +03:00
|
|
|
if ($result['success'] && (!$ocsStatus || $ocsSuccess)) {
|
2020-07-13 16:43:42 +03:00
|
|
|
$event = new FederatedShareAddedEvent($remote);
|
|
|
|
$this->eventDispatcher->dispatchTyped($event);
|
2016-02-04 11:59:52 +03:00
|
|
|
return true;
|
2021-02-05 13:55:56 +03:00
|
|
|
} else {
|
2021-02-08 12:11:00 +03:00
|
|
|
$this->logger->info(
|
2021-02-05 13:55:56 +03:00
|
|
|
"failed sharing $name with $shareWith",
|
2021-02-05 14:16:01 +03:00
|
|
|
['app' => 'federatedfilesharing']
|
|
|
|
);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
2021-02-05 13:55:56 +03:00
|
|
|
} else {
|
2021-02-08 12:11:00 +03:00
|
|
|
$this->logger->info(
|
2021-02-05 13:55:56 +03:00
|
|
|
"could not share $name, invalid contact $shareWith",
|
2021-02-05 14:16:01 +03:00
|
|
|
['app' => 'federatedfilesharing']
|
|
|
|
);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
|
|
|
* ask owner to re-share the file with the given user
|
|
|
|
*
|
|
|
|
* @param string $token
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $id remote Id
|
2020-12-03 19:39:56 +03:00
|
|
|
* @param string $shareId internal share Id
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $remote remote address of the owner
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param int $permission
|
2018-06-04 13:16:03 +03:00
|
|
|
* @param string $filename
|
2020-12-03 19:39:56 +03:00
|
|
|
* @return array|false
|
2016-05-04 16:26:30 +03:00
|
|
|
* @throws \OC\HintException
|
|
|
|
* @throws \OC\ServerNotAvailableException
|
|
|
|
*/
|
2018-06-04 13:16:03 +03:00
|
|
|
public function requestReShare($token, $id, $shareId, $remote, $shareWith, $permission, $filename) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$fields = [
|
2016-05-04 16:26:30 +03:00
|
|
|
'shareWith' => $shareWith,
|
|
|
|
'token' => $token,
|
|
|
|
'permission' => $permission,
|
2018-06-04 13:16:03 +03:00
|
|
|
'remoteId' => $shareId,
|
2020-03-26 11:30:18 +03:00
|
|
|
];
|
2016-05-04 16:26:30 +03:00
|
|
|
|
2018-06-04 13:16:03 +03:00
|
|
|
$ocmFields = $fields;
|
2020-11-20 15:29:36 +03:00
|
|
|
$ocmFields['remoteId'] = (string)$id;
|
2018-06-04 13:16:03 +03:00
|
|
|
$ocmFields['localId'] = $shareId;
|
|
|
|
$ocmFields['name'] = $filename;
|
|
|
|
|
|
|
|
$ocmResult = $this->tryOCMEndPoint($remote, $ocmFields, 'reshare');
|
|
|
|
if (is_array($ocmResult) && isset($ocmResult['token']) && isset($ocmResult['providerId'])) {
|
|
|
|
return [$ocmResult['token'], $ocmResult['providerId']];
|
|
|
|
}
|
|
|
|
|
|
|
|
$result = $this->tryLegacyEndPoint(rtrim($remote, '/'), '/' . $id . '/reshare', $fields);
|
2016-05-04 16:26:30 +03:00
|
|
|
$status = json_decode($result['result'], true);
|
|
|
|
|
|
|
|
$httpRequestSuccessful = $result['success'];
|
|
|
|
$ocsCallSuccessful = $status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200;
|
|
|
|
$validToken = isset($status['ocs']['data']['token']) && is_string($status['ocs']['data']['token']);
|
|
|
|
$validRemoteId = isset($status['ocs']['data']['remoteId']);
|
|
|
|
|
|
|
|
if ($httpRequestSuccessful && $ocsCallSuccessful && $validToken && $validRemoteId) {
|
|
|
|
return [
|
|
|
|
$status['ocs']['data']['token'],
|
2020-11-20 15:29:36 +03:00
|
|
|
$status['ocs']['data']['remoteId']
|
2016-05-04 16:26:30 +03:00
|
|
|
];
|
2021-02-05 14:16:01 +03:00
|
|
|
} elseif (!$validToken) {
|
2021-02-08 12:11:00 +03:00
|
|
|
$this->logger->info(
|
2021-02-05 14:16:01 +03:00
|
|
|
"invalid or missing token requesting re-share for $filename to $remote",
|
|
|
|
['app' => 'federatedfilesharing']
|
|
|
|
);
|
|
|
|
} elseif (!$validRemoteId) {
|
2021-02-08 12:11:00 +03:00
|
|
|
$this->logger->info(
|
2021-02-05 14:16:01 +03:00
|
|
|
"missing remote id requesting re-share for $filename to $remote",
|
|
|
|
['app' => 'federatedfilesharing']
|
|
|
|
);
|
2021-02-05 13:55:56 +03:00
|
|
|
} else {
|
2021-02-08 12:11:00 +03:00
|
|
|
$this->logger->info(
|
2021-02-05 14:16:01 +03:00
|
|
|
"failed requesting re-share for $filename to $remote",
|
|
|
|
['app' => 'federatedfilesharing']
|
|
|
|
);
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* send server-to-server unshare to remote server
|
|
|
|
*
|
|
|
|
* @param string $remote url
|
2020-12-03 19:39:56 +03:00
|
|
|
* @param string $id share id
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $token
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function sendRemoteUnShare($remote, $id, $token) {
|
|
|
|
$this->sendUpdateToRemote($remote, $id, $token, 'unshare');
|
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* send server-to-server unshare to remote server
|
|
|
|
*
|
|
|
|
* @param string $remote url
|
2020-12-03 19:39:56 +03:00
|
|
|
* @param string $id share id
|
2016-02-04 11:59:52 +03:00
|
|
|
* @param string $token
|
|
|
|
* @return bool
|
|
|
|
*/
|
2016-05-04 16:26:30 +03:00
|
|
|
public function sendRevokeShare($remote, $id, $token) {
|
2018-06-04 17:36:37 +03:00
|
|
|
$this->sendUpdateToRemote($remote, $id, $token, 'reshare_undo');
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* send notification to remote server if the permissions was changed
|
|
|
|
*
|
|
|
|
* @param string $remote
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $remoteId
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $token
|
|
|
|
* @param int $permissions
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function sendPermissionChange($remote, $remoteId, $token, $permissions) {
|
2016-05-13 21:36:42 +03:00
|
|
|
$this->sendUpdateToRemote($remote, $remoteId, $token, 'permissions', ['permissions' => $permissions]);
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* forward accept reShare to remote server
|
2016-11-02 12:44:55 +03:00
|
|
|
*
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $remote
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $remoteId
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $token
|
|
|
|
*/
|
|
|
|
public function sendAcceptShare($remote, $remoteId, $token) {
|
|
|
|
$this->sendUpdateToRemote($remote, $remoteId, $token, 'accept');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* forward decline reShare to remote server
|
|
|
|
*
|
|
|
|
* @param string $remote
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $remoteId
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $token
|
|
|
|
*/
|
|
|
|
public function sendDeclineShare($remote, $remoteId, $token) {
|
|
|
|
$this->sendUpdateToRemote($remote, $remoteId, $token, 'decline');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* inform remote server whether server-to-server share was accepted/declined
|
|
|
|
*
|
|
|
|
* @param string $remote
|
|
|
|
* @param string $token
|
2020-11-20 15:29:36 +03:00
|
|
|
* @param string $remoteId Share id on the remote host
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param string $action possible actions: accept, decline, unshare, revoke, permissions
|
|
|
|
* @param array $data
|
|
|
|
* @param int $try
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function sendUpdateToRemote($remote, $remoteId, $token, $action, $data = [], $try = 0) {
|
2018-06-04 17:36:37 +03:00
|
|
|
$fields = [
|
|
|
|
'token' => $token,
|
|
|
|
'remoteId' => $remoteId
|
2020-04-09 10:22:29 +03:00
|
|
|
];
|
2016-05-13 21:36:42 +03:00
|
|
|
foreach ($data as $key => $value) {
|
|
|
|
$fields[$key] = $value;
|
|
|
|
}
|
|
|
|
|
2018-06-04 17:36:37 +03:00
|
|
|
$result = $this->tryHttpPostToShareEndpoint(rtrim($remote, '/'), '/' . $remoteId . '/' . $action, $fields, $action);
|
2016-02-04 11:59:52 +03:00
|
|
|
$status = json_decode($result['result'], true);
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
if ($result['success'] &&
|
|
|
|
($status['ocs']['meta']['statuscode'] === 100 ||
|
2016-04-05 13:33:15 +03:00
|
|
|
$status['ocs']['meta']['statuscode'] === 200
|
|
|
|
)
|
|
|
|
) {
|
|
|
|
return true;
|
|
|
|
} elseif ($try === 0) {
|
|
|
|
// only add new job on first try
|
2016-05-04 16:26:30 +03:00
|
|
|
$this->jobList->add('OCA\FederatedFileSharing\BackgroundJob\RetryJob',
|
2016-04-05 13:33:15 +03:00
|
|
|
[
|
|
|
|
'remote' => $remote,
|
2016-05-04 16:26:30 +03:00
|
|
|
'remoteId' => $remoteId,
|
2016-04-05 13:33:15 +03:00
|
|
|
'token' => $token,
|
2016-05-04 16:26:30 +03:00
|
|
|
'action' => $action,
|
|
|
|
'data' => json_encode($data),
|
2016-04-05 13:33:15 +03:00
|
|
|
'try' => $try,
|
|
|
|
'lastRun' => $this->getTimestamp()
|
|
|
|
]
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
|
2016-04-05 13:33:15 +03:00
|
|
|
/**
|
|
|
|
* return current timestamp
|
|
|
|
*
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getTimestamp() {
|
|
|
|
return time();
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-11-02 12:44:55 +03:00
|
|
|
* try http post with the given protocol, if no protocol is given we pick
|
|
|
|
* the secure one (https)
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
2016-02-25 22:46:01 +03:00
|
|
|
* @param string $remoteDomain
|
|
|
|
* @param string $urlSuffix
|
2016-02-04 11:59:52 +03:00
|
|
|
* @param array $fields post parameters
|
2018-05-04 16:25:02 +03:00
|
|
|
* @param string $action define the action (possible values: share, reshare, accept, decline, unshare, revoke, permissions)
|
2016-02-04 11:59:52 +03:00
|
|
|
* @return array
|
2016-05-19 16:36:05 +03:00
|
|
|
* @throws \Exception
|
2016-02-04 11:59:52 +03:00
|
|
|
*/
|
2020-10-05 16:12:57 +03:00
|
|
|
protected function tryHttpPostToShareEndpoint($remoteDomain, $urlSuffix, array $fields, $action = "share") {
|
2016-11-02 12:44:55 +03:00
|
|
|
if ($this->addressHandler->urlContainProtocol($remoteDomain) === false) {
|
|
|
|
$remoteDomain = 'https://' . $remoteDomain;
|
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
$result = [
|
|
|
|
'success' => false,
|
|
|
|
'result' => '',
|
|
|
|
];
|
2016-11-02 12:44:55 +03:00
|
|
|
|
2018-05-04 16:25:02 +03:00
|
|
|
// if possible we use the new OCM API
|
|
|
|
$ocmResult = $this->tryOCMEndPoint($remoteDomain, $fields, $action);
|
2018-06-05 18:21:51 +03:00
|
|
|
if (is_array($ocmResult)) {
|
2018-05-04 16:25:02 +03:00
|
|
|
$result['success'] = true;
|
2018-06-05 18:21:51 +03:00
|
|
|
$result['result'] = json_encode([
|
|
|
|
'ocs' => ['meta' => ['statuscode' => 200]]]);
|
2018-05-04 16:25:02 +03:00
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2018-06-04 13:16:03 +03:00
|
|
|
return $this->tryLegacyEndPoint($remoteDomain, $urlSuffix, $fields);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* try old federated sharing API if the OCM api doesn't work
|
|
|
|
*
|
|
|
|
* @param $remoteDomain
|
|
|
|
* @param $urlSuffix
|
|
|
|
* @param array $fields
|
|
|
|
* @return mixed
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
protected function tryLegacyEndPoint($remoteDomain, $urlSuffix, array $fields) {
|
|
|
|
$result = [
|
|
|
|
'success' => false,
|
|
|
|
'result' => '',
|
|
|
|
];
|
|
|
|
|
2018-05-04 16:25:02 +03:00
|
|
|
// Fall back to old API
|
|
|
|
$client = $this->httpClientService->newClient();
|
2017-03-10 17:37:21 +03:00
|
|
|
$federationEndpoints = $this->discoveryService->discover($remoteDomain, 'FEDERATED_SHARING');
|
|
|
|
$endpoint = isset($federationEndpoints['share']) ? $federationEndpoints['share'] : '/ocs/v2.php/cloud/shares';
|
2016-11-02 12:44:55 +03:00
|
|
|
try {
|
|
|
|
$response = $client->post($remoteDomain . $endpoint . $urlSuffix . '?format=' . self::RESPONSE_FORMAT, [
|
|
|
|
'body' => $fields,
|
|
|
|
'timeout' => 10,
|
|
|
|
'connect_timeout' => 10,
|
|
|
|
]);
|
|
|
|
$result['result'] = $response->getBody();
|
|
|
|
$result['success'] = true;
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
// if flat re-sharing is not supported by the remote server
|
|
|
|
// we re-throw the exception and fall back to the old behaviour.
|
|
|
|
// (flat re-shares has been introduced in Nextcloud 9.1)
|
|
|
|
if ($e->getCode() === Http::STATUS_INTERNAL_SERVER_ERROR) {
|
|
|
|
throw $e;
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
2018-05-04 16:25:02 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* send action regarding federated sharing to the remote server using the OCM API
|
|
|
|
*
|
|
|
|
* @param $remoteDomain
|
|
|
|
* @param $fields
|
|
|
|
* @param $action
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function tryOCMEndPoint($remoteDomain, $fields, $action) {
|
|
|
|
switch ($action) {
|
|
|
|
case 'share':
|
|
|
|
$share = $this->cloudFederationFactory->getCloudFederationShare(
|
|
|
|
$fields['shareWith'] . '@' . $remoteDomain,
|
|
|
|
$fields['name'],
|
|
|
|
'',
|
|
|
|
$fields['remoteId'],
|
|
|
|
$fields['ownerFederatedId'],
|
|
|
|
$fields['owner'],
|
|
|
|
$fields['sharedByFederatedId'],
|
|
|
|
$fields['sharedBy'],
|
2018-05-28 18:13:19 +03:00
|
|
|
$fields['token'],
|
2018-06-13 15:19:59 +03:00
|
|
|
$fields['shareType'],
|
2018-05-04 16:25:02 +03:00
|
|
|
'file'
|
|
|
|
);
|
|
|
|
return $this->federationProviderManager->sendShare($share);
|
2018-06-04 13:16:03 +03:00
|
|
|
case 'reshare':
|
2018-06-04 17:36:37 +03:00
|
|
|
// ask owner to reshare a file
|
2018-06-04 13:16:03 +03:00
|
|
|
$notification = $this->cloudFederationFactory->getCloudFederationNotification();
|
|
|
|
$notification->setMessage('REQUEST_RESHARE',
|
|
|
|
'file',
|
|
|
|
$fields['remoteId'],
|
|
|
|
[
|
|
|
|
'sharedSecret' => $fields['token'],
|
|
|
|
'shareWith' => $fields['shareWith'],
|
|
|
|
'senderId' => $fields['localId'],
|
2018-06-13 15:19:59 +03:00
|
|
|
'shareType' => $fields['shareType'],
|
2018-06-04 13:16:03 +03:00
|
|
|
'message' => 'Ask owner to reshare the file'
|
|
|
|
]
|
|
|
|
);
|
|
|
|
return $this->federationProviderManager->sendNotification($remoteDomain, $notification);
|
2018-06-04 17:36:37 +03:00
|
|
|
case 'unshare':
|
|
|
|
//owner unshares the file from the recipient again
|
|
|
|
$notification = $this->cloudFederationFactory->getCloudFederationNotification();
|
|
|
|
$notification->setMessage('SHARE_UNSHARED',
|
|
|
|
'file',
|
|
|
|
$fields['remoteId'],
|
|
|
|
[
|
|
|
|
'sharedSecret' => $fields['token'],
|
2018-06-05 18:21:51 +03:00
|
|
|
'messgage' => 'file is no longer shared with you'
|
|
|
|
]
|
|
|
|
);
|
|
|
|
return $this->federationProviderManager->sendNotification($remoteDomain, $notification);
|
|
|
|
case 'reshare_undo':
|
|
|
|
// if a reshare was unshared we send the information to the initiator/owner
|
|
|
|
$notification = $this->cloudFederationFactory->getCloudFederationNotification();
|
|
|
|
$notification->setMessage('RESHARE_UNDO',
|
|
|
|
'file',
|
|
|
|
$fields['remoteId'],
|
|
|
|
[
|
|
|
|
'sharedSecret' => $fields['token'],
|
|
|
|
'message' => 'reshare was revoked'
|
2018-06-04 17:36:37 +03:00
|
|
|
]
|
|
|
|
);
|
|
|
|
return $this->federationProviderManager->sendNotification($remoteDomain, $notification);
|
2018-05-04 16:25:02 +03:00
|
|
|
}
|
|
|
|
|
2018-06-04 13:16:03 +03:00
|
|
|
return false;
|
2018-05-04 16:25:02 +03:00
|
|
|
}
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|