2014-02-18 18:07:03 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Miguel Prokop <miguel.prokop@vtu.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2014-02-18 18:07:03 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
2014-02-18 18:07:03 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2014-02-18 18:07:03 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2014-02-18 18:07:03 +04:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-02-18 18:07:03 +04:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Share;
|
|
|
|
|
2015-06-18 13:46:52 +03:00
|
|
|
use OC\HintException;
|
2020-11-06 15:02:14 +03:00
|
|
|
use OCP\DB\QueryBuilder\IQueryBuilder;
|
2020-06-24 17:49:16 +03:00
|
|
|
use OCP\Share\IShare;
|
2015-06-18 10:21:06 +03:00
|
|
|
|
2014-02-18 18:07:03 +04:00
|
|
|
class Helper extends \OC\Share\Constants {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Generate a unique target for the item
|
2014-05-12 00:51:30 +04:00
|
|
|
* @param string $itemType
|
|
|
|
* @param string $itemSource
|
|
|
|
* @param int $shareType SHARE_TYPE_USER, SHARE_TYPE_GROUP, or SHARE_TYPE_LINK
|
|
|
|
* @param string $shareWith User or group the item is being shared with
|
|
|
|
* @param string $uidOwner User that is the owner of shared item
|
|
|
|
* @param string $suggestedTarget The suggested target originating from a reshare (optional)
|
|
|
|
* @param int $groupParent The id of the parent group share (optional)
|
2014-05-13 14:17:30 +04:00
|
|
|
* @throws \Exception
|
2014-02-18 18:07:03 +04:00
|
|
|
* @return string Item target
|
|
|
|
*/
|
2014-08-22 17:59:44 +04:00
|
|
|
public static function generateTarget($itemType, $itemSource, $shareType, $shareWith, $uidOwner, $suggestedTarget = null, $groupParent = null) {
|
2014-09-29 13:23:18 +04:00
|
|
|
// FIXME: $uidOwner and $groupParent seems to be unused
|
2014-02-18 18:07:03 +04:00
|
|
|
$backend = \OC\Share\Share::getBackend($itemType);
|
2020-06-24 17:49:16 +03:00
|
|
|
if ($shareType === IShare::TYPE_LINK || $shareType === IShare::TYPE_REMOTE) {
|
2014-02-18 18:07:03 +04:00
|
|
|
if (isset($suggestedTarget)) {
|
|
|
|
return $suggestedTarget;
|
|
|
|
}
|
|
|
|
return $backend->generateTarget($itemSource, false);
|
|
|
|
} else {
|
2020-06-24 17:49:16 +03:00
|
|
|
if ($shareType == IShare::TYPE_USER) {
|
2014-02-18 18:07:03 +04:00
|
|
|
// Share with is a user, so set share type to user and groups
|
|
|
|
$shareType = self::$shareTypeUserAndGroups;
|
|
|
|
}
|
2014-08-22 17:59:44 +04:00
|
|
|
|
|
|
|
// Check if suggested target exists first
|
|
|
|
if (!isset($suggestedTarget)) {
|
|
|
|
$suggestedTarget = $itemSource;
|
|
|
|
}
|
2020-06-24 17:49:16 +03:00
|
|
|
if ($shareType == IShare::TYPE_GROUP) {
|
2015-02-04 19:08:03 +03:00
|
|
|
$target = $backend->generateTarget($suggestedTarget, false);
|
2014-08-22 17:59:44 +04:00
|
|
|
} else {
|
2015-02-04 19:08:03 +03:00
|
|
|
$target = $backend->generateTarget($suggestedTarget, $shareWith);
|
2014-08-22 17:59:44 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $target;
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-01-20 15:09:39 +03:00
|
|
|
* Delete all reshares and group share children of an item
|
2014-05-12 00:51:30 +04:00
|
|
|
* @param int $parent Id of item to delete
|
|
|
|
* @param bool $excludeParent If true, exclude the parent from the delete (optional)
|
2014-05-13 14:17:30 +04:00
|
|
|
* @param string $uidOwner The user that the parent was shared with (optional)
|
2014-09-26 18:58:47 +04:00
|
|
|
* @param int $newParent new parent for the childrens
|
2015-01-20 15:09:39 +03:00
|
|
|
* @param bool $excludeGroupChildren exclude group children elements
|
2014-02-18 18:07:03 +04:00
|
|
|
*/
|
2015-01-20 15:09:39 +03:00
|
|
|
public static function delete($parent, $excludeParent = false, $uidOwner = null, $newParent = null, $excludeGroupChildren = false) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$ids = [$parent];
|
|
|
|
$deletedItems = [];
|
|
|
|
$changeParent = [];
|
|
|
|
$parents = [$parent];
|
2014-02-18 18:07:03 +04:00
|
|
|
while (!empty($parents)) {
|
2020-11-06 15:02:14 +03:00
|
|
|
$query = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
|
|
|
$query->select(
|
|
|
|
'id', 'share_with', 'item_type', 'share_type',
|
|
|
|
'item_target', 'file_target', 'parent'
|
|
|
|
)
|
|
|
|
->from('share')
|
|
|
|
->where($query->expr()->in('parent', $query->createNamedParameter(
|
|
|
|
$parents, IQueryBuilder::PARAM_INT_ARRAY
|
|
|
|
)));
|
|
|
|
|
|
|
|
if (count($ids) === 1 && isset($uidOwner)) {
|
|
|
|
// Check the owner on the first search of reshares, useful for
|
|
|
|
// finding and deleting the reshares by a single user of a group share
|
|
|
|
$query->andWhere($query->expr()->eq('uid_owner', $uidOwner));
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|
2020-11-06 15:02:14 +03:00
|
|
|
|
2015-01-20 15:09:39 +03:00
|
|
|
if ($excludeGroupChildren) {
|
2020-11-06 15:02:14 +03:00
|
|
|
$query->andWhere($query->expr()->eq('share_type', self::$shareTypeGroupUserUnique));
|
2015-01-20 15:09:39 +03:00
|
|
|
}
|
2020-11-06 15:02:14 +03:00
|
|
|
|
|
|
|
$result = $query->execute();
|
2014-02-18 18:07:03 +04:00
|
|
|
// Reset parents array, only go through loop again if items are found
|
2020-03-26 11:30:18 +03:00
|
|
|
$parents = [];
|
2020-11-06 15:02:14 +03:00
|
|
|
while ($item = $result->fetch()) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$tmpItem = [
|
2014-06-24 19:04:27 +04:00
|
|
|
'id' => $item['id'],
|
|
|
|
'shareWith' => $item['share_with'],
|
|
|
|
'itemTarget' => $item['item_target'],
|
|
|
|
'itemType' => $item['item_type'],
|
|
|
|
'shareType' => (int)$item['share_type'],
|
2020-03-26 11:30:18 +03:00
|
|
|
];
|
2014-06-24 19:04:27 +04:00
|
|
|
if (isset($item['file_target'])) {
|
|
|
|
$tmpItem['fileTarget'] = $item['file_target'];
|
|
|
|
}
|
2014-09-26 18:58:47 +04:00
|
|
|
// if we have a new parent for the child we remember the child
|
|
|
|
// to update the parent, if not we add it to the list of items
|
|
|
|
// which should be deleted
|
|
|
|
if ($newParent !== null) {
|
|
|
|
$changeParent[] = $item['id'];
|
|
|
|
} else {
|
|
|
|
$deletedItems[] = $tmpItem;
|
|
|
|
$ids[] = $item['id'];
|
|
|
|
$parents[] = $item['id'];
|
|
|
|
}
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|
2020-11-06 15:02:14 +03:00
|
|
|
$result->closeCursor();
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|
|
|
|
if ($excludeParent) {
|
|
|
|
unset($ids[0]);
|
|
|
|
}
|
2014-09-26 18:58:47 +04:00
|
|
|
|
|
|
|
if (!empty($changeParent)) {
|
2020-11-06 15:02:14 +03:00
|
|
|
$query = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
|
|
|
$query->update('share')
|
|
|
|
->set('parent', $query->createNamedParameter($newParent, IQueryBuilder::PARAM_INT))
|
|
|
|
->where($query->expr()->in('id', $query->createNamedParameter($changeParent, IQueryBuilder::PARAM_INT_ARRAY)));
|
|
|
|
$query->execute();
|
2014-09-26 18:58:47 +04:00
|
|
|
}
|
|
|
|
|
2014-02-18 18:07:03 +04:00
|
|
|
if (!empty($ids)) {
|
2020-11-06 15:02:14 +03:00
|
|
|
$query = \OC::$server->getDatabaseConnection()->getQueryBuilder();
|
|
|
|
$query->delete('share')
|
|
|
|
->where($query->expr()->in('id', $query->createNamedParameter($ids, IQueryBuilder::PARAM_INT_ARRAY)));
|
2014-02-18 18:07:03 +04:00
|
|
|
$query->execute();
|
|
|
|
}
|
2014-06-24 19:04:27 +04:00
|
|
|
|
|
|
|
return $deletedItems;
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|
2014-04-23 14:50:24 +04:00
|
|
|
|
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* get default expire settings defined by the admin
|
2014-04-23 14:50:24 +04:00
|
|
|
* @return array contains 'defaultExpireDateSet', 'enforceExpireDate', 'expireAfterDays'
|
|
|
|
*/
|
|
|
|
public static function getDefaultExpireSetting() {
|
2015-03-18 15:07:39 +03:00
|
|
|
$config = \OC::$server->getConfig();
|
|
|
|
|
2020-03-26 11:30:18 +03:00
|
|
|
$defaultExpireSettings = ['defaultExpireDateSet' => false];
|
2014-04-23 14:50:24 +04:00
|
|
|
|
|
|
|
// get default expire settings
|
2015-03-18 15:07:39 +03:00
|
|
|
$defaultExpireDate = $config->getAppValue('core', 'shareapi_default_expire_date', 'no');
|
2014-04-23 14:50:24 +04:00
|
|
|
if ($defaultExpireDate === 'yes') {
|
2015-03-18 15:07:39 +03:00
|
|
|
$enforceExpireDate = $config->getAppValue('core', 'shareapi_enforce_expire_date', 'no');
|
2014-04-23 14:50:24 +04:00
|
|
|
$defaultExpireSettings['defaultExpireDateSet'] = true;
|
2018-01-27 01:46:40 +03:00
|
|
|
$defaultExpireSettings['expireAfterDays'] = (int)$config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
|
2018-01-26 14:36:25 +03:00
|
|
|
$defaultExpireSettings['enforceExpireDate'] = $enforceExpireDate === 'yes';
|
2014-04-23 14:50:24 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $defaultExpireSettings;
|
|
|
|
}
|
|
|
|
|
2014-06-03 17:15:04 +04:00
|
|
|
public static function calcExpireDate() {
|
|
|
|
$expireAfter = \OC\Share\Share::getExpireInterval() * 24 * 60 * 60;
|
|
|
|
$expireAt = time() + $expireAfter;
|
|
|
|
$date = new \DateTime();
|
|
|
|
$date->setTimestamp($expireAt);
|
|
|
|
$date->setTime(0, 0, 0);
|
|
|
|
//$dateString = $date->format('Y-m-d') . ' 00:00:00';
|
|
|
|
|
|
|
|
return $date;
|
|
|
|
}
|
|
|
|
|
2014-04-23 14:50:24 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* calculate expire date
|
2014-04-23 14:50:24 +04:00
|
|
|
* @param array $defaultExpireSettings contains 'defaultExpireDateSet', 'enforceExpireDate', 'expireAfterDays'
|
|
|
|
* @param int $creationTime timestamp when the share was created
|
|
|
|
* @param int $userExpireDate expire timestamp set by the user
|
|
|
|
* @return mixed integer timestamp or False
|
|
|
|
*/
|
|
|
|
public static function calculateExpireDate($defaultExpireSettings, $creationTime, $userExpireDate = null) {
|
|
|
|
$expires = false;
|
2014-11-21 13:01:39 +03:00
|
|
|
$defaultExpires = null;
|
2014-04-23 14:50:24 +04:00
|
|
|
|
2014-05-12 18:15:13 +04:00
|
|
|
if (!empty($defaultExpireSettings['defaultExpireDateSet'])) {
|
2014-11-21 13:01:39 +03:00
|
|
|
$defaultExpires = $creationTime + $defaultExpireSettings['expireAfterDays'] * 86400;
|
2014-04-23 14:50:24 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (isset($userExpireDate)) {
|
|
|
|
// if the admin decided to enforce the default expire date then we only take
|
|
|
|
// the user defined expire date of it is before the default expire date
|
2014-11-21 13:01:39 +03:00
|
|
|
if ($defaultExpires && !empty($defaultExpireSettings['enforceExpireDate'])) {
|
|
|
|
$expires = min($userExpireDate, $defaultExpires);
|
2014-04-23 14:50:24 +04:00
|
|
|
} else {
|
|
|
|
$expires = $userExpireDate;
|
|
|
|
}
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($defaultExpires && !empty($defaultExpireSettings['enforceExpireDate'])) {
|
2014-11-21 15:31:56 +03:00
|
|
|
$expires = $defaultExpires;
|
2014-04-23 14:50:24 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $expires;
|
|
|
|
}
|
2015-02-02 21:54:56 +03:00
|
|
|
|
|
|
|
/**
|
2015-06-18 12:46:37 +03:00
|
|
|
* Strips away a potential file names and trailing slashes:
|
|
|
|
* - http://localhost
|
|
|
|
* - http://localhost/
|
|
|
|
* - http://localhost/index.php
|
|
|
|
* - http://localhost/index.php/s/{shareToken}
|
2015-02-02 21:54:56 +03:00
|
|
|
*
|
2015-06-18 12:46:37 +03:00
|
|
|
* all return: http://localhost
|
2015-02-02 21:54:56 +03:00
|
|
|
*
|
2016-02-08 18:43:39 +03:00
|
|
|
* @param string $remote
|
2015-02-02 21:54:56 +03:00
|
|
|
* @return string
|
|
|
|
*/
|
2015-06-18 12:46:37 +03:00
|
|
|
protected static function fixRemoteURL($remote) {
|
|
|
|
$remote = str_replace('\\', '/', $remote);
|
|
|
|
if ($fileNamePosition = strpos($remote, '/index.php')) {
|
|
|
|
$remote = substr($remote, 0, $fileNamePosition);
|
2015-02-02 21:54:56 +03:00
|
|
|
}
|
2015-06-18 12:46:37 +03:00
|
|
|
$remote = rtrim($remote, '/');
|
2015-02-02 21:54:56 +03:00
|
|
|
|
2015-06-18 12:46:37 +03:00
|
|
|
return $remote;
|
2015-02-02 21:54:56 +03:00
|
|
|
}
|
2015-06-18 10:21:06 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* split user and remote from federated cloud id
|
|
|
|
*
|
|
|
|
* @param string $id
|
2016-02-08 18:43:39 +03:00
|
|
|
* @return string[]
|
2015-06-18 13:46:52 +03:00
|
|
|
* @throws HintException
|
2015-06-18 10:21:06 +03:00
|
|
|
*/
|
|
|
|
public static function splitUserRemote($id) {
|
2017-01-27 14:52:17 +03:00
|
|
|
try {
|
|
|
|
$cloudId = \OC::$server->getCloudIdManager()->resolveCloudId($id);
|
|
|
|
return [$cloudId->getUser(), $cloudId->getRemote()];
|
|
|
|
} catch (\InvalidArgumentException $e) {
|
2015-06-18 13:46:52 +03:00
|
|
|
$l = \OC::$server->getL10N('core');
|
|
|
|
$hint = $l->t('Invalid Federated Cloud ID');
|
2017-01-27 14:52:17 +03:00
|
|
|
throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
|
2015-06-18 12:46:37 +03:00
|
|
|
}
|
2015-06-18 10:21:06 +03:00
|
|
|
}
|
2015-12-09 14:00:00 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if two federated cloud IDs refer to the same user
|
|
|
|
*
|
|
|
|
* @param string $user1
|
|
|
|
* @param string $server1
|
|
|
|
* @param string $user2
|
|
|
|
* @param string $server2
|
|
|
|
* @return bool true if both users and servers are the same
|
|
|
|
*/
|
|
|
|
public static function isSameUserOnSameServer($user1, $server1, $user2, $server2) {
|
|
|
|
$normalizedServer1 = strtolower(\OC\Share\Share::removeProtocolFromUrl($server1));
|
|
|
|
$normalizedServer2 = strtolower(\OC\Share\Share::removeProtocolFromUrl($server2));
|
|
|
|
|
|
|
|
if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
|
|
|
|
// FIXME this should be a method in the user management instead
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
2020-03-26 11:30:18 +03:00
|
|
|
['uid' => &$user1]
|
2015-12-09 14:00:00 +03:00
|
|
|
);
|
|
|
|
\OCP\Util::emitHook(
|
|
|
|
'\OCA\Files_Sharing\API\Server2Server',
|
|
|
|
'preLoginNameUsedAsUserName',
|
2020-03-26 11:30:18 +03:00
|
|
|
['uid' => &$user2]
|
2015-12-09 14:00:00 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
if ($user1 === $user2) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2014-02-18 18:07:03 +04:00
|
|
|
}
|