2016-02-04 11:59:52 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\FederatedFileSharing;
|
|
|
|
use OC\HintException;
|
2017-01-27 14:52:17 +03:00
|
|
|
use OCP\Federation\ICloudIdManager;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OCP\IL10N;
|
|
|
|
use OCP\IURLGenerator;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class AddressHandler - parse, modify and construct federated sharing addresses
|
|
|
|
*
|
|
|
|
* @package OCA\FederatedFileSharing
|
|
|
|
*/
|
|
|
|
class AddressHandler {
|
|
|
|
|
|
|
|
/** @var IL10N */
|
|
|
|
private $l;
|
|
|
|
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
/** @var ICloudIdManager */
|
|
|
|
private $cloudIdManager;
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* AddressHandler constructor.
|
|
|
|
*
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param IL10N $il10n
|
2017-01-27 14:52:17 +03:00
|
|
|
* @param ICloudIdManager $cloudIdManager
|
2016-02-04 11:59:52 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
IURLGenerator $urlGenerator,
|
2017-01-27 14:52:17 +03:00
|
|
|
IL10N $il10n,
|
|
|
|
ICloudIdManager $cloudIdManager
|
2016-02-04 11:59:52 +03:00
|
|
|
) {
|
|
|
|
$this->l = $il10n;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cloudIdManager = $cloudIdManager;
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* split user and remote from federated cloud id
|
|
|
|
*
|
|
|
|
* @param string $address federated share address
|
|
|
|
* @return array [user, remoteURL]
|
|
|
|
* @throws HintException
|
|
|
|
*/
|
|
|
|
public function splitUserRemote($address) {
|
2017-01-27 14:52:17 +03:00
|
|
|
try {
|
|
|
|
$cloudId = $this->cloudIdManager->resolveCloudId($address);
|
|
|
|
return [$cloudId->getUser(), $cloudId->getRemote()];
|
|
|
|
} catch (\InvalidArgumentException $e) {
|
2016-02-04 11:59:52 +03:00
|
|
|
$hint = $this->l->t('Invalid Federated Cloud ID');
|
2017-01-27 14:52:17 +03:00
|
|
|
throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* generate remote URL part of federated ID
|
|
|
|
*
|
|
|
|
* @return string url of the current server
|
|
|
|
*/
|
|
|
|
public function generateRemoteURL() {
|
2018-01-26 02:02:03 +03:00
|
|
|
return $this->urlGenerator->getAbsoluteURL('/');
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* check if two federated cloud IDs refer to the same user
|
|
|
|
*
|
|
|
|
* @param string $user1
|
|
|
|
* @param string $server1
|
|
|
|
* @param string $user2
|
|
|
|
* @param string $server2
|
|
|
|
* @return bool true if both users and servers are the same
|
|
|
|
*/
|
|
|
|
public function compareAddresses($user1, $server1, $user2, $server2) {
|
|
|
|
$normalizedServer1 = strtolower($this->removeProtocolFromUrl($server1));
|
|
|
|
$normalizedServer2 = strtolower($this->removeProtocolFromUrl($server2));
|
|
|
|
|
|
|
|
if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
|
|
|
|
// FIXME this should be a method in the user management instead
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
2020-03-26 11:30:18 +03:00
|
|
|
['uid' => &$user1]
|
2016-02-04 11:59:52 +03:00
|
|
|
);
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
2020-03-26 11:30:18 +03:00
|
|
|
['uid' => &$user2]
|
2016-02-04 11:59:52 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
if ($user1 === $user2) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* remove protocol from URL
|
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function removeProtocolFromUrl($url) {
|
|
|
|
if (strpos($url, 'https://') === 0) {
|
|
|
|
return substr($url, strlen('https://'));
|
|
|
|
} else if (strpos($url, 'http://') === 0) {
|
|
|
|
return substr($url, strlen('http://'));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2016-11-02 12:44:55 +03:00
|
|
|
/**
|
|
|
|
* check if the url contain the protocol (http or https)
|
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function urlContainProtocol($url) {
|
|
|
|
if (strpos($url, 'https://') === 0 ||
|
|
|
|
strpos($url, 'http://') === 0) {
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|