2014-05-09 19:06:08 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2015-10-05 21:54:56 +03:00
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
2015-10-26 15:54:55 +03:00
|
|
|
* @author Roeland Jago Douma <rullzer@owncloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
2014-05-09 19:06:08 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-05-09 19:06:08 +04:00
|
|
|
OCP\JSON::callCheck();
|
|
|
|
OCP\JSON::checkLoggedIn();
|
2014-06-16 14:42:28 +04:00
|
|
|
OCP\JSON::checkAppEnabled('files_sharing');
|
2014-05-09 19:06:08 +04:00
|
|
|
|
2014-08-31 12:05:59 +04:00
|
|
|
$l = \OC::$server->getL10N('files_sharing');
|
2014-06-12 21:49:52 +04:00
|
|
|
|
2016-04-18 19:17:08 +03:00
|
|
|
$federatedSharingApp = new \OCA\FederatedFileSharing\AppInfo\Application('federatedfilesharing');
|
|
|
|
$federatedShareProvider = $federatedSharingApp->getFederatedShareProvider();
|
|
|
|
|
2014-06-12 21:49:52 +04:00
|
|
|
// check if server admin allows to mount public links from other servers
|
2016-04-18 19:17:08 +03:00
|
|
|
if ($federatedShareProvider->isIncomingServer2serverShareEnabled() === false) {
|
2014-06-12 21:49:52 +04:00
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Server to server sharing is not enabled on this server'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2014-05-09 19:06:08 +04:00
|
|
|
$token = $_POST['token'];
|
|
|
|
$remote = $_POST['remote'];
|
|
|
|
$owner = $_POST['owner'];
|
2015-12-14 18:04:05 +03:00
|
|
|
$ownerDisplayName = $_POST['ownerDisplayName'];
|
2014-05-09 19:06:08 +04:00
|
|
|
$name = $_POST['name'];
|
|
|
|
$password = $_POST['password'];
|
|
|
|
|
2014-09-23 21:30:32 +04:00
|
|
|
// Check for invalid name
|
|
|
|
if(!\OCP\Util::isValidFileName($name)) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('The mountpoint name contains invalid characters.'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2015-12-09 14:00:00 +03:00
|
|
|
$currentUser = \OC::$server->getUserSession()->getUser()->getUID();
|
|
|
|
$currentServer = \OC::$server->getURLGenerator()->getAbsoluteURL('/');
|
|
|
|
if (\OC\Share\Helper::isSameUserOnSameServer($owner, $remote, $currentUser, $currentServer )) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Not allowed to create a federated share with the same user server'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2016-02-25 22:46:01 +03:00
|
|
|
$discoveryManager = new \OCA\FederatedFileSharing\DiscoveryManager(
|
|
|
|
\OC::$server->getMemCacheFactory(),
|
|
|
|
\OC::$server->getHTTPClientService()
|
|
|
|
);
|
2014-05-09 19:06:08 +04:00
|
|
|
$externalManager = new \OCA\Files_Sharing\External\Manager(
|
2014-12-04 21:51:04 +03:00
|
|
|
\OC::$server->getDatabaseConnection(),
|
|
|
|
\OC\Files\Filesystem::getMountManager(),
|
|
|
|
\OC\Files\Filesystem::getLoader(),
|
2015-01-20 02:35:47 +03:00
|
|
|
\OC::$server->getHTTPHelper(),
|
2015-09-01 19:56:09 +03:00
|
|
|
\OC::$server->getNotificationManager(),
|
2016-03-01 00:44:40 +03:00
|
|
|
$discoveryManager,
|
2015-01-20 02:35:47 +03:00
|
|
|
\OC::$server->getUserSession()->getUser()->getUID()
|
2014-05-09 19:06:08 +04:00
|
|
|
);
|
|
|
|
|
2014-08-13 18:46:04 +04:00
|
|
|
// check for ssl cert
|
2015-04-02 17:59:47 +03:00
|
|
|
if (substr($remote, 0, 5) === 'https') {
|
|
|
|
try {
|
2016-06-15 17:30:24 +03:00
|
|
|
\OC::$server->getHTTPClientService()->newClient()->get($remote, [
|
2016-06-21 18:37:44 +03:00
|
|
|
'timeout' => 10,
|
|
|
|
'connect_timeout' => 10,
|
2016-06-15 17:30:24 +03:00
|
|
|
])->getBody();
|
2015-04-02 17:59:47 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Invalid or untrusted SSL certificate'))));
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-14 18:04:05 +03:00
|
|
|
$mount = $externalManager->addShare($remote, $token, $password, $name, $ownerDisplayName, true);
|
2015-01-20 21:45:32 +03:00
|
|
|
|
2015-04-02 17:59:47 +03:00
|
|
|
/**
|
|
|
|
* @var \OCA\Files_Sharing\External\Storage $storage
|
|
|
|
*/
|
|
|
|
$storage = $mount->getStorage();
|
|
|
|
try {
|
|
|
|
// check if storage exists
|
|
|
|
$storage->checkStorageAvailability();
|
|
|
|
} catch (\OCP\Files\StorageInvalidException $e) {
|
|
|
|
// note: checkStorageAvailability will already remove the invalid share
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(
|
|
|
|
array(
|
|
|
|
'data' => array(
|
|
|
|
'message' => $l->t('Could not authenticate to remote share, password might be wrong')
|
|
|
|
)
|
|
|
|
)
|
|
|
|
);
|
|
|
|
exit();
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Storage not valid'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
$result = $storage->file_exists('');
|
|
|
|
if ($result) {
|
2015-01-20 21:45:32 +03:00
|
|
|
try {
|
2015-04-02 17:59:47 +03:00
|
|
|
$storage->getScanner()->scanAll();
|
|
|
|
\OCP\JSON::success();
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (\OCP\Files\StorageInvalidException $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
2015-04-02 17:59:47 +03:00
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Storage not valid'))));
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Couldn\'t add remote share'))));
|
2014-08-13 18:46:04 +04:00
|
|
|
}
|
2015-04-02 17:59:47 +03:00
|
|
|
} else {
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Couldn\'t add remote share',
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Couldn\'t add remote share'))));
|
2014-05-19 18:39:57 +04:00
|
|
|
}
|
2015-04-02 17:59:47 +03:00
|
|
|
|