2014-11-24 17:31:52 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
2014-11-24 17:31:52 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2014-11-24 17:31:52 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2014-11-24 17:31:52 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2014-11-24 17:31:52 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-11-24 17:31:52 +03:00
|
|
|
*
|
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
namespace OCA\FederatedFileSharing\Controller;
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
use OCA\FederatedFileSharing\DiscoveryManager;
|
2016-11-16 14:09:41 +03:00
|
|
|
use OCA\Files_Sharing\Activity\Providers\RemoteShares;
|
2016-08-19 13:01:13 +03:00
|
|
|
use OCA\FederatedFileSharing\AddressHandler;
|
|
|
|
use OCA\FederatedFileSharing\FederatedShareProvider;
|
|
|
|
use OCA\FederatedFileSharing\Notifications;
|
2016-05-04 16:26:30 +03:00
|
|
|
use OCP\AppFramework\Http;
|
2016-08-19 13:01:13 +03:00
|
|
|
use OCP\AppFramework\OCS\OCSBadRequestException;
|
|
|
|
use OCP\AppFramework\OCS\OCSException;
|
|
|
|
use OCP\AppFramework\OCS\OCSForbiddenException;
|
|
|
|
use OCP\AppFramework\OCS\OCSNotFoundException;
|
|
|
|
use OCP\AppFramework\OCSController;
|
2016-05-04 16:26:30 +03:00
|
|
|
use OCP\Constants;
|
2017-01-27 14:52:17 +03:00
|
|
|
use OCP\Federation\ICloudIdManager;
|
2015-06-15 15:10:10 +03:00
|
|
|
use OCP\Files\NotFoundException;
|
2016-05-04 13:16:02 +03:00
|
|
|
use OCP\IDBConnection;
|
2016-05-04 16:26:30 +03:00
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\IUserManager;
|
|
|
|
use OCP\Share;
|
2016-08-19 13:01:13 +03:00
|
|
|
use OCP\Share\IShare;
|
2015-07-02 13:27:58 +03:00
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
class RequestHandlerController extends OCSController {
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-04-18 19:17:08 +03:00
|
|
|
/** @var FederatedShareProvider */
|
|
|
|
private $federatedShareProvider;
|
|
|
|
|
2016-05-04 13:16:02 +03:00
|
|
|
/** @var IDBConnection */
|
|
|
|
private $connection;
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/** @var Share\IManager */
|
|
|
|
private $shareManager;
|
|
|
|
|
|
|
|
/** @var Notifications */
|
|
|
|
private $notifications;
|
|
|
|
|
|
|
|
/** @var AddressHandler */
|
|
|
|
private $addressHandler;
|
|
|
|
|
|
|
|
/** @var IUserManager */
|
|
|
|
private $userManager;
|
|
|
|
|
2016-05-04 13:16:02 +03:00
|
|
|
/** @var string */
|
|
|
|
private $shareTable = 'share';
|
2016-04-18 19:17:08 +03:00
|
|
|
|
2017-03-09 18:49:40 +03:00
|
|
|
/** @var ICloudIdManager */
|
2017-01-27 14:52:17 +03:00
|
|
|
private $cloudIdManager;
|
|
|
|
|
2016-04-18 19:17:08 +03:00
|
|
|
/**
|
|
|
|
* Server2Server constructor.
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
2016-04-18 19:17:08 +03:00
|
|
|
* @param FederatedShareProvider $federatedShareProvider
|
2016-05-04 13:16:02 +03:00
|
|
|
* @param IDBConnection $connection
|
2016-05-04 16:26:30 +03:00
|
|
|
* @param Share\IManager $shareManager
|
|
|
|
* @param Notifications $notifications
|
|
|
|
* @param AddressHandler $addressHandler
|
|
|
|
* @param IUserManager $userManager
|
2017-01-27 14:52:17 +03:00
|
|
|
* @param ICloudIdManager $cloudIdManager
|
2016-04-18 19:17:08 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function __construct($appName,
|
|
|
|
IRequest $request,
|
|
|
|
FederatedShareProvider $federatedShareProvider,
|
2016-05-04 16:26:30 +03:00
|
|
|
IDBConnection $connection,
|
|
|
|
Share\IManager $shareManager,
|
|
|
|
Notifications $notifications,
|
|
|
|
AddressHandler $addressHandler,
|
2017-01-27 14:52:17 +03:00
|
|
|
IUserManager $userManager,
|
|
|
|
ICloudIdManager $cloudIdManager
|
2016-05-04 16:26:30 +03:00
|
|
|
) {
|
2016-08-19 13:01:13 +03:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
|
2016-04-18 19:17:08 +03:00
|
|
|
$this->federatedShareProvider = $federatedShareProvider;
|
2016-05-04 13:16:02 +03:00
|
|
|
$this->connection = $connection;
|
2016-05-04 16:26:30 +03:00
|
|
|
$this->shareManager = $shareManager;
|
|
|
|
$this->notifications = $notifications;
|
|
|
|
$this->addressHandler = $addressHandler;
|
|
|
|
$this->userManager = $userManager;
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cloudIdManager = $cloudIdManager;
|
2016-04-18 19:17:08 +03:00
|
|
|
}
|
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2014-11-24 17:31:52 +03:00
|
|
|
* create a new share
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSException
|
2014-11-24 17:31:52 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function createShare() {
|
2014-11-24 17:31:52 +03:00
|
|
|
|
|
|
|
if (!$this->isS2SEnabled(true)) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('Server does not support federated cloud sharing', 503);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$remote = isset($_POST['remote']) ? $_POST['remote'] : null;
|
|
|
|
$token = isset($_POST['token']) ? $_POST['token'] : null;
|
|
|
|
$name = isset($_POST['name']) ? $_POST['name'] : null;
|
|
|
|
$owner = isset($_POST['owner']) ? $_POST['owner'] : null;
|
2016-05-04 16:26:30 +03:00
|
|
|
$sharedBy = isset($_POST['sharedBy']) ? $_POST['sharedBy'] : null;
|
2014-11-24 17:31:52 +03:00
|
|
|
$shareWith = isset($_POST['shareWith']) ? $_POST['shareWith'] : null;
|
2014-12-04 21:51:04 +03:00
|
|
|
$remoteId = isset($_POST['remoteId']) ? (int)$_POST['remoteId'] : null;
|
2016-05-04 16:26:30 +03:00
|
|
|
$sharedByFederatedId = isset($_POST['sharedByFederatedId']) ? $_POST['sharedByFederatedId'] : null;
|
|
|
|
$ownerFederatedId = isset($_POST['ownerFederatedId']) ? $_POST['ownerFederatedId'] : null;
|
2014-11-24 17:31:52 +03:00
|
|
|
|
|
|
|
if ($remote && $token && $name && $owner && $remoteId && $shareWith) {
|
|
|
|
|
2017-03-09 18:49:40 +03:00
|
|
|
if (!\OCP\Util::isValidFileName($name)) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('The mountpoint name contains invalid characters.', 400);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2015-10-05 12:50:36 +03:00
|
|
|
// FIXME this should be a method in the user management instead
|
2015-02-20 15:09:33 +03:00
|
|
|
\OCP\Util::writeLog('files_sharing', 'shareWith before, ' . $shareWith, \OCP\Util::DEBUG);
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
|
|
|
array('uid' => &$shareWith)
|
|
|
|
);
|
|
|
|
\OCP\Util::writeLog('files_sharing', 'shareWith after, ' . $shareWith, \OCP\Util::DEBUG);
|
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
if (!\OCP\User::userExists($shareWith)) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('User does not exists', 400);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
\OC_Util::setupFS($shareWith);
|
|
|
|
|
2016-02-25 22:46:01 +03:00
|
|
|
$discoveryManager = new DiscoveryManager(
|
|
|
|
\OC::$server->getMemCacheFactory(),
|
|
|
|
\OC::$server->getHTTPClientService()
|
|
|
|
);
|
2014-12-04 21:51:04 +03:00
|
|
|
$externalManager = new \OCA\Files_Sharing\External\Manager(
|
2017-03-09 18:49:40 +03:00
|
|
|
\OC::$server->getDatabaseConnection(),
|
|
|
|
\OC\Files\Filesystem::getMountManager(),
|
|
|
|
\OC\Files\Filesystem::getLoader(),
|
|
|
|
\OC::$server->getHTTPClientService(),
|
|
|
|
\OC::$server->getNotificationManager(),
|
|
|
|
$discoveryManager,
|
|
|
|
$shareWith
|
|
|
|
);
|
2014-12-04 21:51:04 +03:00
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
try {
|
2014-12-04 21:51:04 +03:00
|
|
|
$externalManager->addShare($remote, $token, '', $name, $owner, false, $shareWith, $remoteId);
|
2016-02-10 10:23:06 +03:00
|
|
|
$shareId = \OC::$server->getDatabaseConnection()->lastInsertId('*PREFIX*share_external');
|
2014-12-04 21:51:04 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
if ($ownerFederatedId === null) {
|
2017-01-27 14:52:17 +03:00
|
|
|
$ownerFederatedId = $this->cloudIdManager->getCloudId($owner, $this->cleanupRemote($remote))->getId();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
// if the owner of the share and the initiator are the same user
|
|
|
|
// we also complete the federated share ID for the initiator
|
|
|
|
if ($sharedByFederatedId === null && $owner === $sharedBy) {
|
|
|
|
$sharedByFederatedId = $ownerFederatedId;
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-11-16 14:09:41 +03:00
|
|
|
$event = \OC::$server->getActivityManager()->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType('remote_share')
|
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_RECEIVED, [$ownerFederatedId, trim($name, '/')])
|
|
|
|
->setAffectedUser($shareWith)
|
2017-03-09 18:49:40 +03:00
|
|
|
->setObject('remote_share', (int)$shareId, $name);
|
2016-11-16 14:09:41 +03:00
|
|
|
\OC::$server->getActivityManager()->publish($event);
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2015-09-01 18:59:01 +03:00
|
|
|
$urlGenerator = \OC::$server->getURLGenerator();
|
|
|
|
|
|
|
|
$notificationManager = \OC::$server->getNotificationManager();
|
|
|
|
$notification = $notificationManager->createNotification();
|
|
|
|
$notification->setApp('files_sharing')
|
|
|
|
->setUser($shareWith)
|
2016-02-09 18:02:53 +03:00
|
|
|
->setDateTime(new \DateTime())
|
2016-02-09 18:33:17 +03:00
|
|
|
->setObject('remote_share', $shareId)
|
2016-05-04 16:26:30 +03:00
|
|
|
->setSubject('remote_share', [$ownerFederatedId, $sharedByFederatedId, trim($name, '/')]);
|
2015-09-01 18:59:01 +03:00
|
|
|
|
|
|
|
$declineAction = $notification->createAction();
|
|
|
|
$declineAction->setLabel('decline')
|
2016-03-16 11:02:08 +03:00
|
|
|
->setLink($urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'ocs/v1.php/apps/files_sharing/api/v1/remote_shares/pending/' . $shareId)), 'DELETE');
|
2015-09-16 13:05:06 +03:00
|
|
|
$notification->addAction($declineAction);
|
2015-09-01 18:59:01 +03:00
|
|
|
|
2015-09-16 13:05:06 +03:00
|
|
|
$acceptAction = $notification->createAction();
|
|
|
|
$acceptAction->setLabel('accept')
|
2016-03-16 11:02:08 +03:00
|
|
|
->setLink($urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'ocs/v1.php/apps/files_sharing/api/v1/remote_shares/pending/' . $shareId)), 'POST');
|
2015-09-16 13:05:06 +03:00
|
|
|
$notification->addAction($acceptAction);
|
2015-09-01 18:59:01 +03:00
|
|
|
|
|
|
|
$notificationManager->notify($notification);
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2014-11-24 17:31:52 +03:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 21:51:04 +03:00
|
|
|
\OCP\Util::writeLog('files_sharing', 'server can not add remote share, ' . $e->getMessage(), \OCP\Util::ERROR);
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('internal server error, was not able to add share from ' . $remote, 500);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('server can not add remote share, missing parameter', 400);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2016-05-04 16:26:30 +03:00
|
|
|
* create re-share on behalf of another user
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSBadRequestException
|
|
|
|
* @throws OCSForbiddenException
|
|
|
|
* @throws OCSNotFoundException
|
2016-05-04 16:26:30 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function reShare($id) {
|
2016-05-04 16:26:30 +03:00
|
|
|
|
|
|
|
$token = $this->request->getParam('token', null);
|
|
|
|
$shareWith = $this->request->getParam('shareWith', null);
|
|
|
|
$permission = (int)$this->request->getParam('permission', null);
|
|
|
|
$remoteId = (int)$this->request->getParam('remoteId', null);
|
|
|
|
|
|
|
|
if ($id === null ||
|
|
|
|
$token === null ||
|
|
|
|
$shareWith === null ||
|
|
|
|
$permission === null ||
|
|
|
|
$remoteId === null
|
|
|
|
) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$share = $this->federatedShareProvider->getShareById($id);
|
|
|
|
} catch (Share\Exceptions\ShareNotFound $e) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSNotFoundException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// don't allow to share a file back to the owner
|
|
|
|
list($user, $remote) = $this->addressHandler->splitUserRemote($shareWith);
|
|
|
|
$owner = $share->getShareOwner();
|
|
|
|
$currentServer = $this->addressHandler->generateRemoteURL();
|
2017-03-09 18:49:40 +03:00
|
|
|
if ($this->addressHandler->compareAddresses($user, $remote, $owner, $currentServer)) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSForbiddenException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($this->verifyShare($share, $token)) {
|
|
|
|
|
|
|
|
// check if re-sharing is allowed
|
|
|
|
if ($share->getPermissions() | ~Constants::PERMISSION_SHARE) {
|
|
|
|
$share->setPermissions($share->getPermissions() & $permission);
|
|
|
|
// the recipient of the initial share is now the initiator for the re-share
|
|
|
|
$share->setSharedBy($share->getSharedWith());
|
|
|
|
$share->setSharedWith($shareWith);
|
|
|
|
try {
|
|
|
|
$result = $this->federatedShareProvider->create($share);
|
|
|
|
$this->federatedShareProvider->storeRemoteId((int)$result->getId(), $remoteId);
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse([
|
|
|
|
'token' => $result->getToken(),
|
|
|
|
'remoteId' => $result->getId()
|
|
|
|
]);
|
2016-05-04 16:26:30 +03:00
|
|
|
} catch (\Exception $e) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
} else {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSForbiddenException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
}
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2014-11-24 17:31:52 +03:00
|
|
|
* accept server-to-server share
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSException
|
2014-11-24 17:31:52 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function acceptShare($id) {
|
2014-11-24 17:31:52 +03:00
|
|
|
|
|
|
|
if (!$this->isS2SEnabled()) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('Server does not support federated cloud sharing', 503);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$token = isset($_POST['token']) ? $_POST['token'] : null;
|
2016-05-04 16:26:30 +03:00
|
|
|
|
|
|
|
try {
|
|
|
|
$share = $this->federatedShareProvider->getShareById($id);
|
|
|
|
} catch (Share\Exceptions\ShareNotFound $e) {
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($this->verifyShare($share, $token)) {
|
|
|
|
$this->executeAcceptShare($share);
|
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) {
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy());
|
|
|
|
$remoteId = $this->federatedShareProvider->getRemoteId($share);
|
|
|
|
$this->notifications->sendAcceptShare($remote, $remoteId, $share->getToken());
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
protected function executeAcceptShare(Share\IShare $share) {
|
|
|
|
list($file, $link) = $this->getFile($this->getCorrectUid($share), $share->getNode()->getId());
|
|
|
|
|
|
|
|
$event = \OC::$server->getActivityManager()->generateEvent();
|
2016-11-16 14:09:41 +03:00
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType('remote_share')
|
2016-05-04 16:26:30 +03:00
|
|
|
->setAffectedUser($this->getCorrectUid($share))
|
2016-11-16 14:09:41 +03:00
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_ACCEPTED, [$share->getSharedWith(), $file])
|
2017-03-09 18:49:40 +03:00
|
|
|
->setObject('files', (int)$share->getNode()->getId(), $file)
|
2016-05-04 16:26:30 +03:00
|
|
|
->setLink($link);
|
|
|
|
\OC::$server->getActivityManager()->publish($event);
|
|
|
|
}
|
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2014-11-24 17:31:52 +03:00
|
|
|
* decline server-to-server share
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSException
|
2014-11-24 17:31:52 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function declineShare($id) {
|
2014-11-24 17:31:52 +03:00
|
|
|
|
|
|
|
if (!$this->isS2SEnabled()) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('Server does not support federated cloud sharing', 503);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$token = isset($_POST['token']) ? $_POST['token'] : null;
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
try {
|
|
|
|
$share = $this->federatedShareProvider->getShareById($id);
|
|
|
|
} catch (Share\Exceptions\ShareNotFound $e) {
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2017-03-09 18:49:40 +03:00
|
|
|
if ($this->verifyShare($share, $token)) {
|
2016-05-04 16:26:30 +03:00
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) {
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy());
|
|
|
|
$remoteId = $this->federatedShareProvider->getRemoteId($share);
|
|
|
|
$this->notifications->sendDeclineShare($remote, $remoteId, $share->getToken());
|
|
|
|
}
|
|
|
|
$this->executeDeclineShare($share);
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
|
|
|
* delete declined share and create a activity
|
|
|
|
*
|
|
|
|
* @param Share\IShare $share
|
|
|
|
*/
|
|
|
|
protected function executeDeclineShare(Share\IShare $share) {
|
|
|
|
$this->federatedShareProvider->removeShareFromTable($share);
|
|
|
|
list($file, $link) = $this->getFile($this->getCorrectUid($share), $share->getNode()->getId());
|
|
|
|
|
|
|
|
$event = \OC::$server->getActivityManager()->generateEvent();
|
2016-11-16 14:09:41 +03:00
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType('remote_share')
|
2016-05-04 16:26:30 +03:00
|
|
|
->setAffectedUser($this->getCorrectUid($share))
|
2016-11-16 14:09:41 +03:00
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_DECLINED, [$share->getSharedWith(), $file])
|
2017-03-09 18:49:40 +03:00
|
|
|
->setObject('files', (int)$share->getNode()->getId(), $file)
|
2016-05-04 16:26:30 +03:00
|
|
|
->setLink($link);
|
|
|
|
\OC::$server->getActivityManager()->publish($event);
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* check if we are the initiator or the owner of a re-share and return the correct UID
|
|
|
|
*
|
|
|
|
* @param Share\IShare $share
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function getCorrectUid(Share\IShare $share) {
|
2017-03-09 18:49:40 +03:00
|
|
|
if ($this->userManager->userExists($share->getShareOwner())) {
|
2016-05-04 16:26:30 +03:00
|
|
|
return $share->getShareOwner();
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
return $share->getSharedBy();
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2014-11-24 17:31:52 +03:00
|
|
|
* remove server-to-server share if it was unshared by the owner
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSException
|
2014-11-24 17:31:52 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function unshare($id) {
|
2014-11-24 17:31:52 +03:00
|
|
|
|
|
|
|
if (!$this->isS2SEnabled()) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSException('Server does not support federated cloud sharing', 503);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$token = isset($_POST['token']) ? $_POST['token'] : null;
|
|
|
|
|
|
|
|
$query = \OCP\DB::prepare('SELECT * FROM `*PREFIX*share_external` WHERE `remote_id` = ? AND `share_token` = ?');
|
|
|
|
$query->execute(array($id, $token));
|
|
|
|
$share = $query->fetchRow();
|
|
|
|
|
|
|
|
if ($token && $id && !empty($share)) {
|
|
|
|
|
2014-12-04 21:51:04 +03:00
|
|
|
$remote = $this->cleanupRemote($share['remote']);
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
$owner = $this->cloudIdManager->getCloudId($share['owner'], $remote);
|
2014-11-24 17:31:52 +03:00
|
|
|
$mountpoint = $share['mountpoint'];
|
|
|
|
$user = $share['user'];
|
|
|
|
|
|
|
|
$query = \OCP\DB::prepare('DELETE FROM `*PREFIX*share_external` WHERE `remote_id` = ? AND `share_token` = ?');
|
|
|
|
$query->execute(array($id, $token));
|
|
|
|
|
2015-07-02 13:24:20 +03:00
|
|
|
if ($share['accepted']) {
|
|
|
|
$path = trim($mountpoint, '/');
|
|
|
|
} else {
|
|
|
|
$path = trim($share['name'], '/');
|
|
|
|
}
|
|
|
|
|
2016-02-11 12:12:14 +03:00
|
|
|
$notificationManager = \OC::$server->getNotificationManager();
|
|
|
|
$notification = $notificationManager->createNotification();
|
|
|
|
$notification->setApp('files_sharing')
|
|
|
|
->setUser($share['user'])
|
2017-03-09 18:49:40 +03:00
|
|
|
->setObject('remote_share', (int)$share['id']);
|
2016-02-11 12:12:14 +03:00
|
|
|
$notificationManager->markProcessed($notification);
|
|
|
|
|
2016-11-16 14:09:41 +03:00
|
|
|
$event = \OC::$server->getActivityManager()->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType('remote_share')
|
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_UNSHARED, [$owner, $path])
|
|
|
|
->setAffectedUser($user)
|
2017-03-09 18:49:40 +03:00
|
|
|
->setObject('remote_share', (int)$share['id'], $path);
|
2016-11-16 14:09:41 +03:00
|
|
|
\OC::$server->getActivityManager()->publish($event);
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
2014-12-04 21:51:04 +03:00
|
|
|
private function cleanupRemote($remote) {
|
|
|
|
$remote = substr($remote, strpos($remote, '://') + 3);
|
|
|
|
|
|
|
|
return rtrim($remote, '/');
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
|
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2016-05-04 16:26:30 +03:00
|
|
|
* federated share was revoked, either by the owner or the re-sharer
|
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSBadRequestException
|
2016-05-04 16:26:30 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function revoke($id) {
|
2016-05-04 16:26:30 +03:00
|
|
|
$token = $this->request->getParam('token');
|
2017-03-09 18:49:40 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
$share = $this->federatedShareProvider->getShareById($id);
|
2017-03-09 18:49:40 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
if ($this->verifyShare($share, $token)) {
|
|
|
|
$this->federatedShareProvider->removeShareFromTable($share);
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
2017-03-09 18:49:40 +03:00
|
|
|
|
2014-11-24 17:31:52 +03:00
|
|
|
/**
|
|
|
|
* get share
|
|
|
|
*
|
|
|
|
* @param int $id
|
|
|
|
* @param string $token
|
2016-05-04 13:16:02 +03:00
|
|
|
* @return array|bool
|
2014-11-24 17:31:52 +03:00
|
|
|
*/
|
2016-05-04 13:16:02 +03:00
|
|
|
protected function getShare($id, $token) {
|
|
|
|
$query = $this->connection->getQueryBuilder();
|
|
|
|
$query->select('*')->from($this->shareTable)
|
|
|
|
->where($query->expr()->eq('token', $query->createNamedParameter($token)))
|
|
|
|
->andWhere($query->expr()->eq('share_type', $query->createNamedParameter(FederatedShareProvider::SHARE_TYPE_REMOTE)))
|
|
|
|
->andWhere($query->expr()->eq('id', $query->createNamedParameter($id)));
|
|
|
|
|
|
|
|
$result = $query->execute()->fetchAll();
|
|
|
|
|
|
|
|
if (!empty($result) && isset($result[0])) {
|
|
|
|
return $result[0];
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
|
2016-05-04 13:16:02 +03:00
|
|
|
return false;
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get file
|
|
|
|
*
|
|
|
|
* @param string $user
|
|
|
|
* @param int $fileSource
|
|
|
|
* @return array with internal path of the file and a absolute link to it
|
|
|
|
*/
|
|
|
|
private function getFile($user, $fileSource) {
|
|
|
|
\OC_Util::setupFS($user);
|
|
|
|
|
2015-06-15 15:10:10 +03:00
|
|
|
try {
|
|
|
|
$file = \OC\Files\Filesystem::getPath($fileSource);
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
$file = null;
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
$args = \OC\Files\Filesystem::is_dir($file) ? array('dir' => $file) : array('dir' => dirname($file), 'scrollto' => $file);
|
|
|
|
$link = \OCP\Util::linkToAbsolute('files', 'index.php', $args);
|
|
|
|
|
|
|
|
return array($file, $link);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* check if server-to-server sharing is enabled
|
|
|
|
*
|
|
|
|
* @param bool $incoming
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function isS2SEnabled($incoming = false) {
|
|
|
|
|
|
|
|
$result = \OCP\App::isEnabled('files_sharing');
|
|
|
|
|
|
|
|
if ($incoming) {
|
2016-04-18 19:17:08 +03:00
|
|
|
$result = $result && $this->federatedShareProvider->isIncomingServer2serverShareEnabled();
|
2014-11-24 17:31:52 +03:00
|
|
|
} else {
|
2016-04-18 19:17:08 +03:00
|
|
|
$result = $result && $this->federatedShareProvider->isOutgoingServer2serverShareEnabled();
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
|
|
|
* check if we got the right share
|
|
|
|
*
|
|
|
|
* @param Share\IShare $share
|
|
|
|
* @param string $token
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function verifyShare(Share\IShare $share, $token) {
|
|
|
|
if (
|
|
|
|
$share->getShareType() === FederatedShareProvider::SHARE_TYPE_REMOTE &&
|
|
|
|
$share->getToken() === $token
|
|
|
|
) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-08-19 13:01:13 +03:00
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
2016-05-04 16:26:30 +03:00
|
|
|
* update share information to keep federated re-shares in sync
|
2016-05-13 21:36:42 +03:00
|
|
|
*
|
2016-08-19 13:01:13 +03:00
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws OCSBadRequestException
|
2016-05-04 16:26:30 +03:00
|
|
|
*/
|
2016-08-19 13:01:13 +03:00
|
|
|
public function updatePermissions($id) {
|
2016-05-04 16:26:30 +03:00
|
|
|
$token = $this->request->getParam('token', null);
|
2016-05-13 21:36:42 +03:00
|
|
|
$permissions = $this->request->getParam('permissions', null);
|
2016-05-04 16:26:30 +03:00
|
|
|
|
|
|
|
try {
|
2016-05-13 21:36:42 +03:00
|
|
|
$share = $this->federatedShareProvider->getShareById($id);
|
2016-05-04 16:26:30 +03:00
|
|
|
} catch (Share\Exceptions\ShareNotFound $e) {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2016-05-13 21:36:42 +03:00
|
|
|
$validPermission = ctype_digit($permissions);
|
|
|
|
$validToken = $this->verifyShare($share, $token);
|
|
|
|
if ($validPermission && $validToken) {
|
|
|
|
$this->updatePermissionsInDatabase($share, (int)$permissions);
|
|
|
|
} else {
|
2016-08-19 13:01:13 +03:00
|
|
|
throw new OCSBadRequestException();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2016-08-19 13:01:13 +03:00
|
|
|
return new Http\DataResponse();
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
2016-05-13 21:36:42 +03:00
|
|
|
/**
|
|
|
|
* update permissions in database
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @param int $permissions
|
|
|
|
*/
|
|
|
|
protected function updatePermissionsInDatabase(IShare $share, $permissions) {
|
|
|
|
$query = $this->connection->getQueryBuilder();
|
|
|
|
$query->update('share')
|
|
|
|
->where($query->expr()->eq('id', $query->createNamedParameter($share->getId())))
|
|
|
|
->set('permissions', $query->createNamedParameter($permissions))
|
|
|
|
->execute();
|
|
|
|
}
|
|
|
|
|
2017-03-09 18:49:40 +03:00
|
|
|
/**
|
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
|
|
|
*
|
|
|
|
* change the owner of a server-to-server share
|
|
|
|
*
|
|
|
|
* @param int $id
|
|
|
|
* @return Http\DataResponse
|
|
|
|
* @throws \InvalidArgumentException
|
|
|
|
* @throws OCSException
|
|
|
|
*/
|
|
|
|
public function move($id) {
|
|
|
|
|
|
|
|
if (!$this->isS2SEnabled()) {
|
|
|
|
throw new OCSException('Server does not support federated cloud sharing', 503);
|
|
|
|
}
|
|
|
|
|
|
|
|
$token = $this->request->getParam('token');
|
|
|
|
$remote = $this->request->getParam('remote');
|
|
|
|
$newRemoteId = $this->request->getParam('remote_id', $id);
|
|
|
|
$cloudId = $this->cloudIdManager->resolveCloudId($remote);
|
|
|
|
|
|
|
|
$qb = $this->connection->getQueryBuilder();
|
|
|
|
$query = $qb->update('share_external')
|
|
|
|
->set('remote', $qb->createNamedParameter($cloudId->getRemote()))
|
|
|
|
->set('owner', $qb->createNamedParameter($cloudId->getUser()))
|
|
|
|
->set('remote_id', $qb->createNamedParameter($newRemoteId))
|
|
|
|
->where($qb->expr()->eq('remote_id', $qb->createNamedParameter($id)))
|
|
|
|
->andWhere($qb->expr()->eq('share_token', $qb->createNamedParameter($token)));
|
|
|
|
$affected = $query->execute();
|
|
|
|
|
|
|
|
if ($affected > 0) {
|
|
|
|
return new Http\DataResponse(['remote' => $cloudId->getRemote(), 'owner' => $cloudId->getUser()]);
|
|
|
|
} else {
|
|
|
|
throw new OCSBadRequestException('Share not found or token invalid');
|
|
|
|
}
|
|
|
|
}
|
2014-11-24 17:31:52 +03:00
|
|
|
}
|