2012-09-07 16:09:41 +04:00
< ? php
/**
2015-10-05 21:54:56 +03:00
* @ author Andreas Fischer < bantu @ owncloud . com >
2015-03-26 13:44:34 +03:00
* @ author Bart Visscher < bartv @ thisnet . nl >
* @ author Björn Schießle < schiessle @ owncloud . com >
* @ author Frank Karlitschek < frank @ owncloud . org >
* @ author Joas Schilling < nickvergessen @ owncloud . com >
* @ author Lukas Reschke < lukas @ owncloud . com >
* @ author Michael Gapczynski < GapczynskiM @ gmail . com >
* @ author Morris Jobke < hey @ morrisjobke . de >
* @ author Philipp Kapfer < philipp . kapfer @ gmx . at >
* @ author Robin Appelman < icewind @ owncloud . com >
* @ author Robin McCorkell < rmccorkell @ karoshi . org . uk >
* @ author Thomas Müller < thomas . mueller @ tmit . eu >
* @ author Vincent Petry < pvince81 @ owncloud . com >
2014-12-11 19:35:11 +03:00
*
2015-03-26 13:44:34 +03:00
* @ copyright Copyright ( c ) 2015 , ownCloud , Inc .
* @ license AGPL - 3.0
2014-12-11 19:35:11 +03:00
*
2015-03-26 13:44:34 +03:00
* This code is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License , version 3 ,
* as published by the Free Software Foundation .
2014-12-11 19:35:11 +03:00
*
2015-03-26 13:44:34 +03:00
* This program is distributed in the hope that it will be useful ,
2014-12-11 19:35:11 +03:00
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
2015-03-26 13:44:34 +03:00
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
*
* You should have received a copy of the GNU Affero General Public License , version 3 ,
* along with this program . If not , see < http :// www . gnu . org / licenses />
2014-12-11 19:35:11 +03:00
*
2015-02-26 13:37:37 +03:00
*/
2015-08-03 07:39:53 +03:00
use phpseclib\Crypt\AES ;
2015-08-12 23:43:29 +03:00
use \OCA\Files_External\Appinfo\Application ;
2015-08-11 20:45:07 +03:00
use \OCA\Files_External\Lib\BackendConfig ;
use \OCA\Files_External\Service\BackendService ;
2015-08-12 11:21:09 +03:00
use \OCA\Files_External\Lib\Backend\LegacyBackend ;
use \OCA\Files_External\Lib\StorageConfig ;
2015-08-03 07:39:53 +03:00
2015-02-26 13:37:37 +03:00
/**
* Class to configure mount . json globally and for users
2014-03-19 00:15:11 +04:00
*/
2012-09-07 16:09:41 +04:00
class OC_Mount_Config {
2014-03-19 15:20:48 +04:00
// TODO: make this class non-static and give it a proper namespace
2012-09-07 16:09:41 +04:00
const MOUNT_TYPE_GLOBAL = 'global' ;
const MOUNT_TYPE_GROUP = 'group' ;
const MOUNT_TYPE_USER = 'user' ;
2014-05-09 23:59:56 +04:00
const MOUNT_TYPE_PERSONAL = 'personal' ;
2012-09-07 16:09:41 +04:00
2014-10-31 13:41:07 +03:00
// getBackendStatus return types
const STATUS_SUCCESS = 0 ;
const STATUS_ERROR = 1 ;
2015-08-12 21:51:09 +03:00
const STATUS_INDETERMINATE = 2 ;
2014-10-31 13:41:07 +03:00
2014-03-18 21:29:08 +04:00
// whether to skip backend test (for unit tests, as this static class is not mockable)
public static $skipTest = false ;
2015-08-12 23:43:29 +03:00
/** @var Application */
public static $app ;
2014-04-07 22:18:57 +04:00
2015-08-12 11:21:09 +03:00
/**
* @ param string $class
* @ param array $definition
* @ return bool
* @ deprecated 8.2 . 0 use \OCA\Files_External\Service\BackendService :: registerBackend ()
*/
public static function registerBackend ( $class , $definition ) {
2015-08-12 23:43:29 +03:00
$backendService = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Service\BackendService' );
$auth = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Lib\Auth\Builtin' );
2015-08-12 11:21:09 +03:00
$backendService -> registerBackend ( new LegacyBackend ( $class , $definition , $auth ));
return true ;
}
2015-08-11 20:45:07 +03:00
/*
2014-03-19 17:23:36 +04:00
* Hook that mounts the given user ' s visible mount points
2014-12-11 19:35:11 +03:00
*
2014-03-19 15:20:48 +04:00
* @ param array $data
*/
public static function initMountPointsHook ( $data ) {
2014-09-29 15:46:27 +04:00
if ( $data [ 'user' ]) {
$user = \OC :: $server -> getUserManager () -> get ( $data [ 'user' ]);
2014-11-14 14:45:36 +03:00
if ( ! $user ) {
2015-08-19 00:49:29 +03:00
\OC :: $server -> getLogger () -> warning (
2014-11-14 14:45:36 +03:00
'Cannot init external mount points for non-existant user "' . $data [ 'user' ] . '".' ,
2015-08-19 00:49:29 +03:00
[ 'app' => 'files_external' ]
2014-11-14 14:45:36 +03:00
);
return ;
}
2014-09-29 15:46:27 +04:00
$userView = new \OC\Files\View ( '/' . $user -> getUID () . '/files' );
$changePropagator = new \OC\Files\Cache\ChangePropagator ( $userView );
$etagPropagator = new \OCA\Files_External\EtagPropagator ( $user , $changePropagator , \OC :: $server -> getConfig ());
$etagPropagator -> propagateDirtyMountPoints ();
\OCP\Util :: connectHook (
\OC\Files\Filesystem :: CLASSNAME ,
\OC\Files\Filesystem :: signal_create_mount ,
$etagPropagator , 'updateHook' );
\OCP\Util :: connectHook (
\OC\Files\Filesystem :: CLASSNAME ,
\OC\Files\Filesystem :: signal_delete_mount ,
$etagPropagator , 'updateHook' );
}
2014-03-19 17:23:36 +04:00
}
/**
* Returns the mount points for the given user .
* The mount point is relative to the data directory .
*
2015-08-12 11:21:09 +03:00
* @ param string $uid user
2014-03-19 17:23:36 +04:00
* @ return array of mount point string as key , mountpoint config as value
2015-08-12 11:21:09 +03:00
*
2015-09-23 17:35:17 +03:00
* @ deprecated 8.2 . 0 use UserGlobalStoragesService :: getStorages () and UserStoragesService :: getStorages ()
2014-03-19 17:23:36 +04:00
*/
2015-08-12 11:21:09 +03:00
public static function getAbsoluteMountPoints ( $uid ) {
2014-03-21 18:22:48 +04:00
$mountPoints = array ();
2014-03-28 18:24:38 +04:00
2015-08-12 23:43:29 +03:00
$userGlobalStoragesService = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Service\UserGlobalStoragesService' );
$userStoragesService = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Service\UserStoragesService' );
$user = self :: $app -> getContainer () -> query ( 'OCP\IUserManager' ) -> get ( $uid );
2014-05-09 23:59:56 +04:00
2015-08-12 11:21:09 +03:00
$userGlobalStoragesService -> setUser ( $user );
$userStoragesService -> setUser ( $user );
2015-08-11 20:45:07 +03:00
2015-09-23 17:35:17 +03:00
foreach ( $userGlobalStoragesService -> getStorages () as $storage ) {
2015-08-12 11:21:09 +03:00
$mountPoint = '/' . $uid . '/files' . $storage -> getMountPoint ();
$mountEntry = self :: prepareMountPointEntry ( $storage , false );
foreach ( $mountEntry [ 'options' ] as & $option ) {
$option = self :: setUserVars ( $uid , $option );
2014-03-19 15:20:48 +04:00
}
2015-08-12 11:21:09 +03:00
$mountPoints [ $mountPoint ] = $mountEntry ;
2014-03-19 15:20:48 +04:00
}
2014-03-28 19:22:35 +04:00
2015-09-23 17:35:17 +03:00
foreach ( $userStoragesService -> getStorages () as $storage ) {
2015-08-12 11:21:09 +03:00
$mountPoint = '/' . $uid . '/files' . $storage -> getMountPoint ();
$mountEntry = self :: prepareMountPointEntry ( $storage , true );
foreach ( $mountEntry [ 'options' ] as & $option ) {
$option = self :: setUserVars ( $uid , $option );
2014-03-28 19:22:35 +04:00
}
2015-08-12 11:21:09 +03:00
$mountPoints [ $mountPoint ] = $mountEntry ;
2014-03-28 19:22:35 +04:00
}
2014-03-28 18:24:38 +04:00
2015-08-12 11:21:09 +03:00
$userGlobalStoragesService -> resetUser ();
$userStoragesService -> resetUser ();
2014-03-28 18:24:38 +04:00
2015-08-12 11:21:09 +03:00
return $mountPoints ;
}
/**
* Get the system mount points
*
* @ return array
*
2015-09-23 17:35:17 +03:00
* @ deprecated 8.2 . 0 use GlobalStoragesService :: getStorages ()
2015-08-12 11:21:09 +03:00
*/
public static function getSystemMountPoints () {
$mountPoints = [];
2015-08-12 23:43:29 +03:00
$service = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Service\GlobalStoragesService' );
2015-08-12 11:21:09 +03:00
2015-09-23 17:35:17 +03:00
foreach ( $service -> getStorages () as $storage ) {
2015-08-12 11:21:09 +03:00
$mountPoints [] = self :: prepareMountPointEntry ( $storage , false );
2014-03-19 15:20:48 +04:00
}
2015-08-19 17:26:33 +03:00
return $mountPoints ;
2015-08-12 11:21:09 +03:00
}
2014-03-19 15:20:48 +04:00
2015-08-12 11:21:09 +03:00
/**
* Get the personal mount points of the current user
*
* @ return array
*
2015-09-23 17:35:17 +03:00
* @ deprecated 8.2 . 0 use UserStoragesService :: getStorages ()
2015-08-12 11:21:09 +03:00
*/
public static function getPersonalMountPoints () {
$mountPoints = [];
2015-08-12 23:43:29 +03:00
$service = self :: $app -> getContainer () -> query ( 'OCA\Files_External\Service\UserStoragesService' );
2014-03-28 18:24:38 +04:00
2015-09-23 17:35:17 +03:00
foreach ( $service -> getStorages () as $storage ) {
2015-08-12 11:21:09 +03:00
$mountPoints [] = self :: prepareMountPointEntry ( $storage , true );
2014-03-19 15:20:48 +04:00
}
2015-08-19 17:26:33 +03:00
return $mountPoints ;
2015-08-12 11:21:09 +03:00
}
2014-03-19 17:23:36 +04:00
2015-08-12 11:21:09 +03:00
/**
* Convert a StorageConfig to the legacy mountPoints array format
* There ' s a lot of extra information in here , to satisfy all of the legacy functions
*
* @ param StorageConfig $storage
* @ param bool $isPersonal
* @ return array
*/
private static function prepareMountPointEntry ( StorageConfig $storage , $isPersonal ) {
$mountEntry = [];
$mountEntry [ 'mountpoint' ] = substr ( $storage -> getMountPoint (), 1 ); // remove leading slash
$mountEntry [ 'class' ] = $storage -> getBackend () -> getIdentifier ();
$mountEntry [ 'backend' ] = $storage -> getBackend () -> getText ();
$mountEntry [ 'authMechanism' ] = $storage -> getAuthMechanism () -> getIdentifier ();
$mountEntry [ 'personal' ] = $isPersonal ;
$mountEntry [ 'options' ] = self :: decryptPasswords ( $storage -> getBackendOptions ());
$mountEntry [ 'mountOptions' ] = $storage -> getMountOptions ();
$mountEntry [ 'priority' ] = $storage -> getPriority ();
$mountEntry [ 'applicable' ] = [
'groups' => $storage -> getApplicableGroups (),
'users' => $storage -> getApplicableUsers (),
];
2015-10-02 17:04:04 +03:00
// if mountpoint is applicable to all users the old API expects ['all']
if ( empty ( $mountEntry [ 'applicable' ][ 'groups' ]) && empty ( $mountEntry [ 'applicable' ][ 'users' ])) {
$mountEntry [ 'applicable' ][ 'users' ] = [ 'all' ];
}
2015-08-12 11:21:09 +03:00
$mountEntry [ 'id' ] = $storage -> getId ();
return $mountEntry ;
2014-03-19 15:20:48 +04:00
}
/**
* fill in the correct values for $user
*
2015-03-26 21:24:37 +03:00
* @ param string $user user value
* @ param string | array $input
2014-03-19 15:20:48 +04:00
* @ return string
*/
2015-08-12 21:51:09 +03:00
public static function setUserVars ( $user , $input ) {
2015-03-26 21:24:37 +03:00
if ( is_array ( $input )) {
foreach ( $input as & $value ) {
if ( is_string ( $value )) {
$value = str_replace ( '$user' , $user , $value );
}
}
} else {
2015-08-20 02:37:15 +03:00
if ( is_string ( $input )) {
$input = str_replace ( '$user' , $user , $input );
}
2015-03-26 21:24:37 +03:00
}
return $input ;
2014-03-19 15:20:48 +04:00
}
/**
* Test connecting using the given backend configuration
2014-12-11 19:35:11 +03:00
*
2014-03-19 15:20:48 +04:00
* @ param string $class backend class name
* @ param array $options backend configuration options
2014-10-31 13:41:07 +03:00
* @ return int see self :: STATUS_ *
2014-03-19 15:20:48 +04:00
*/
2014-10-31 13:41:07 +03:00
public static function getBackendStatus ( $class , $options , $isPersonal ) {
2014-03-18 21:29:08 +04:00
if ( self :: $skipTest ) {
2014-10-31 13:41:07 +03:00
return self :: STATUS_SUCCESS ;
2014-03-18 21:29:08 +04:00
}
2012-12-24 22:45:52 +04:00
foreach ( $options as & $option ) {
2014-03-19 15:20:48 +04:00
$option = self :: setUserVars ( OCP\User :: getUser (), $option );
2012-12-24 22:45:52 +04:00
}
if ( class_exists ( $class )) {
try {
2012-12-28 21:00:48 +04:00
$storage = new $class ( $options );
2015-01-24 00:53:21 +03:00
try {
$result = $storage -> test ( $isPersonal );
$storage -> setAvailability ( $result );
if ( $result ) {
return self :: STATUS_SUCCESS ;
}
} catch ( \Exception $e ) {
$storage -> setAvailability ( false );
throw $e ;
2014-10-31 13:41:07 +03:00
}
2012-12-24 22:45:52 +04:00
} catch ( Exception $exception ) {
2013-12-02 19:55:43 +04:00
\OCP\Util :: logException ( 'files_external' , $exception );
2012-12-24 22:45:52 +04:00
}
}
2014-10-31 13:41:07 +03:00
return self :: STATUS_ERROR ;
2012-12-24 22:45:52 +04:00
}
2012-09-07 16:09:41 +04:00
/**
2014-12-11 19:35:11 +03:00
* Read the mount points in the config file into an array
*
* @ param string | null $user If not null , personal for $user , otherwise system
* @ return array
*/
2014-10-31 13:41:07 +03:00
public static function readData ( $user = null ) {
2014-04-22 00:41:45 +04:00
if ( isset ( $user )) {
2015-08-19 00:49:29 +03:00
$jsonFile = \OC :: $server -> getUserManager () -> get ( $user ) -> getHome () . '/mount.json' ;
2012-09-07 16:09:41 +04:00
} else {
2015-08-19 00:49:29 +03:00
$config = \OC :: $server -> getConfig ();
$datadir = $config -> getSystemValue ( 'datadirectory' , \OC :: $SERVERROOT . '/data/' );
$jsonFile = $config -> getSystemValue ( 'mount_file' , $datadir . '/mount.json' );
2012-09-07 16:09:41 +04:00
}
2013-02-16 04:50:40 +04:00
if ( is_file ( $jsonFile )) {
$mountPoints = json_decode ( file_get_contents ( $jsonFile ), true );
if ( is_array ( $mountPoints )) {
return $mountPoints ;
}
2012-09-07 16:09:41 +04:00
}
return array ();
}
/**
2014-12-11 19:35:11 +03:00
* Write the mount points to the config file
*
* @ param string | null $user If not null , personal for $user , otherwise system
* @ param array $data Mount points
*/
2014-10-31 13:41:07 +03:00
public static function writeData ( $user , $data ) {
2014-04-22 00:41:45 +04:00
if ( isset ( $user )) {
2015-08-19 00:49:29 +03:00
$file = \OC :: $server -> getUserManager () -> get ( $user ) -> getHome () . '/mount.json' ;
2012-09-07 16:09:41 +04:00
} else {
2015-08-19 00:49:29 +03:00
$config = \OC :: $server -> getConfig ();
$datadir = $config -> getSystemValue ( 'datadirectory' , \OC :: $SERVERROOT . '/data/' );
$file = $config -> getSystemValue ( 'mount_file' , $datadir . '/mount.json' );
2012-09-07 16:09:41 +04:00
}
2014-12-11 19:35:11 +03:00
2014-12-12 14:25:59 +03:00
$content = json_encode ( $data , JSON_PRETTY_PRINT );
2012-09-07 16:09:41 +04:00
@ file_put_contents ( $file , $content );
2013-04-06 14:21:21 +04:00
@ chmod ( $file , 0640 );
2012-09-07 16:09:41 +04:00
}
2012-12-11 00:10:28 +04:00
/**
2015-08-11 20:45:07 +03:00
* Get backend dependency message
* TODO : move into AppFramework along with templates
*
* @ param BackendConfig [] $backends
* @ return string
2012-12-11 00:10:28 +04:00
*/
2015-08-11 20:45:07 +03:00
public static function dependencyMessage ( $backends ) {
2015-08-19 00:49:29 +03:00
$l = \OC :: $server -> getL10N ( 'files_external' );
2015-08-11 20:45:07 +03:00
$message = '' ;
$dependencyGroups = [];
foreach ( $backends as $backend ) {
foreach ( $backend -> checkDependencies () as $dependency ) {
if ( $message = $dependency -> getMessage ()) {
$message .= '<br />' . $l -> t ( '<b>Note:</b> ' ) . $message ;
2013-08-02 17:44:56 +04:00
} else {
2015-08-11 20:45:07 +03:00
$dependencyGroups [ $dependency -> getDependency ()][] = $backend ;
2013-05-30 19:37:47 +04:00
}
}
2015-08-11 20:45:07 +03:00
}
2013-05-30 19:37:47 +04:00
2015-08-11 20:45:07 +03:00
foreach ( $dependencyGroups as $module => $dependants ) {
$backends = implode ( ', ' , array_map ( function ( $backend ) {
return '<i>' . $backend -> getText () . '</i>' ;
}, $dependants ));
$message .= '<br />' . OC_Mount_Config :: getSingleDependencyMessage ( $l , $module , $backends );
2013-05-30 19:37:47 +04:00
}
2015-08-11 20:45:07 +03:00
return $message ;
2013-08-02 17:44:56 +04:00
}
2013-05-30 19:37:47 +04:00
2013-08-02 17:44:56 +04:00
/**
* Returns a dependency missing message
2014-12-11 19:35:11 +03:00
*
2015-08-19 00:49:29 +03:00
* @ param \OCP\IL10N $l
2014-05-13 15:29:25 +04:00
* @ param string $module
* @ param string $backend
2013-08-02 17:44:56 +04:00
* @ return string
*/
2015-08-19 00:49:29 +03:00
private static function getSingleDependencyMessage ( \OCP\IL10N $l , $module , $backend ) {
2013-08-02 17:44:56 +04:00
switch ( strtolower ( $module )) {
case 'curl' :
return $l -> t ( '<b>Note:</b> The cURL support in PHP is not enabled or installed. Mounting of %s is not possible. Please ask your system administrator to install it.' , $backend );
case 'ftp' :
return $l -> t ( '<b>Note:</b> The FTP support in PHP is not enabled or installed. Mounting of %s is not possible. Please ask your system administrator to install it.' , $backend );
default :
return $l -> t ( '<b>Note:</b> "%s" is not installed. Mounting of %s is not possible. Please ask your system administrator to install it.' , array ( $module , $backend ));
}
2012-12-11 00:10:28 +04:00
}
2014-03-19 00:15:11 +04:00
/**
* Encrypt passwords in the given config options
2014-12-11 19:35:11 +03:00
*
2014-03-19 00:15:11 +04:00
* @ param array $options mount options
* @ return array updated options
*/
2014-10-31 13:41:07 +03:00
public static function encryptPasswords ( $options ) {
2014-03-19 00:15:11 +04:00
if ( isset ( $options [ 'password' ])) {
2014-03-19 14:42:22 +04:00
$options [ 'password_encrypted' ] = self :: encryptPassword ( $options [ 'password' ]);
2014-03-19 20:56:36 +04:00
// do not unset the password, we want to keep the keys order
// on load... because that's how the UI currently works
$options [ 'password' ] = '' ;
2014-03-19 00:15:11 +04:00
}
return $options ;
}
/**
* Decrypt passwords in the given config options
2014-12-11 19:35:11 +03:00
*
2014-03-19 00:15:11 +04:00
* @ param array $options mount options
* @ return array updated options
*/
2014-10-31 13:41:07 +03:00
public static function decryptPasswords ( $options ) {
2014-03-19 00:15:11 +04:00
// note: legacy options might still have the unencrypted password in the "password" field
if ( isset ( $options [ 'password_encrypted' ])) {
2014-03-19 14:42:22 +04:00
$options [ 'password' ] = self :: decryptPassword ( $options [ 'password_encrypted' ]);
2014-03-19 00:15:11 +04:00
unset ( $options [ 'password_encrypted' ]);
}
return $options ;
}
2014-03-19 14:42:22 +04:00
/**
* Encrypt a single password
2014-12-11 19:35:11 +03:00
*
2014-03-19 14:42:22 +04:00
* @ param string $password plain text password
2014-05-13 15:29:25 +04:00
* @ return string encrypted password
2014-03-19 14:42:22 +04:00
*/
private static function encryptPassword ( $password ) {
$cipher = self :: getCipher ();
$iv = \OCP\Util :: generateRandomBytes ( 16 );
$cipher -> setIV ( $iv );
return base64_encode ( $iv . $cipher -> encrypt ( $password ));
}
/**
* Decrypts a single password
2014-12-11 19:35:11 +03:00
*
2014-03-19 14:42:22 +04:00
* @ param string $encryptedPassword encrypted password
2014-05-13 15:29:25 +04:00
* @ return string plain text password
2014-03-19 14:42:22 +04:00
*/
private static function decryptPassword ( $encryptedPassword ) {
$cipher = self :: getCipher ();
$binaryPassword = base64_decode ( $encryptedPassword );
$iv = substr ( $binaryPassword , 0 , 16 );
$cipher -> setIV ( $iv );
$binaryPassword = substr ( $binaryPassword , 16 );
return $cipher -> decrypt ( $binaryPassword );
}
2014-05-13 03:14:30 +04:00
/**
* Merges mount points
2014-12-11 19:35:11 +03:00
*
2014-05-13 03:14:30 +04:00
* @ param array $data Existing mount points
* @ param array $mountPoint New mount point
* @ param string $mountType
* @ return array
*/
private static function mergeMountPoints ( $data , $mountPoint , $mountType ) {
$applicable = key ( $mountPoint );
2014-05-14 23:32:19 +04:00
$mountPath = key ( $mountPoint [ $applicable ]);
2014-05-13 03:14:30 +04:00
if ( isset ( $data [ $mountType ])) {
if ( isset ( $data [ $mountType ][ $applicable ])) {
2014-05-15 01:34:38 +04:00
// Merge priorities
if ( isset ( $data [ $mountType ][ $applicable ][ $mountPath ])
&& isset ( $data [ $mountType ][ $applicable ][ $mountPath ][ 'priority' ])
2014-12-11 19:35:11 +03:00
&& ! isset ( $mountPoint [ $applicable ][ $mountPath ][ 'priority' ])
) {
2014-05-15 01:34:38 +04:00
$mountPoint [ $applicable ][ $mountPath ][ 'priority' ]
= $data [ $mountType ][ $applicable ][ $mountPath ][ 'priority' ];
}
2014-05-13 03:14:30 +04:00
$data [ $mountType ][ $applicable ]
= array_merge ( $data [ $mountType ][ $applicable ], $mountPoint [ $applicable ]);
} else {
$data [ $mountType ] = array_merge ( $data [ $mountType ], $mountPoint );
}
} else {
$data [ $mountType ] = $mountPoint ;
}
return $data ;
}
2014-03-19 00:15:11 +04:00
/**
* Returns the encryption cipher
*/
private static function getCipher () {
2015-08-03 07:39:53 +03:00
$cipher = new AES ( AES :: MODE_CBC );
2014-12-17 13:12:37 +03:00
$cipher -> setKey ( \OC :: $server -> getConfig () -> getSystemValue ( 'passwordsalt' , null ));
2014-03-19 14:42:22 +04:00
return $cipher ;
2014-03-19 00:15:11 +04:00
}
2014-03-26 15:10:17 +04:00
/**
* Computes a hash based on the given configuration .
* This is mostly used to find out whether configurations
* are the same .
*/
2015-03-16 14:18:01 +03:00
public static function makeConfigHash ( $config ) {
2014-03-26 15:10:17 +04:00
$data = json_encode (
array (
2015-08-12 22:03:11 +03:00
'c' => $config [ 'backend' ],
'a' => $config [ 'authMechanism' ],
2014-03-26 15:10:17 +04:00
'm' => $config [ 'mountpoint' ],
2015-03-16 14:18:01 +03:00
'o' => $config [ 'options' ],
'p' => isset ( $config [ 'priority' ]) ? $config [ 'priority' ] : - 1 ,
'mo' => isset ( $config [ 'mountOptions' ]) ? $config [ 'mountOptions' ] : [],
2014-03-26 15:10:17 +04:00
)
);
return hash ( 'md5' , $data );
}
2012-09-07 16:09:41 +04:00
}