2015-11-10 12:50:59 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Federation\BackgroundJob;
|
|
|
|
|
2015-11-19 13:48:21 +03:00
|
|
|
use GuzzleHttp\Exception\ClientException;
|
2017-12-11 17:07:08 +03:00
|
|
|
use GuzzleHttp\Exception\RequestException;
|
|
|
|
use GuzzleHttp\Ring\Exception\RingException;
|
2016-03-18 15:22:05 +03:00
|
|
|
use OC\BackgroundJob\Job;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OC\BackgroundJob\JobList;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCA\Federation\TrustedServers;
|
|
|
|
use OCP\AppFramework\Http;
|
2017-08-01 12:23:40 +03:00
|
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCP\BackgroundJob\IJobList;
|
|
|
|
use OCP\Http\Client\IClient;
|
2017-07-28 15:54:08 +03:00
|
|
|
use OCP\Http\Client\IClientService;
|
2016-03-18 15:22:05 +03:00
|
|
|
use OCP\Http\Client\IResponse;
|
2015-11-10 12:50:59 +03:00
|
|
|
use OCP\ILogger;
|
|
|
|
use OCP\IURLGenerator;
|
2017-02-24 17:33:09 +03:00
|
|
|
use OCP\OCS\IDiscoveryService;
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class GetSharedSecret
|
|
|
|
*
|
2017-04-12 07:16:27 +03:00
|
|
|
* request shared secret from remote Nextcloud
|
2015-11-10 12:50:59 +03:00
|
|
|
*
|
|
|
|
* @package OCA\Federation\Backgroundjob
|
|
|
|
*/
|
2017-08-01 12:23:40 +03:00
|
|
|
class GetSharedSecret extends Job {
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
/** @var IClient */
|
|
|
|
private $httpClient;
|
|
|
|
|
|
|
|
/** @var IJobList */
|
|
|
|
private $jobList;
|
|
|
|
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
|
|
|
|
|
|
|
/** @var TrustedServers */
|
|
|
|
private $trustedServers;
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
/** @var IDiscoveryService */
|
|
|
|
private $ocsDiscoveryService;
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
|
|
|
|
2017-08-01 12:23:40 +03:00
|
|
|
/** @var ITimeFactory */
|
|
|
|
private $timeFactory;
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $retainJob = false;
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
private $defaultEndPoint = '/ocs/v2.php/apps/federation/api/v1/shared-secret';
|
2015-11-10 12:50:59 +03:00
|
|
|
|
2017-07-28 15:43:35 +03:00
|
|
|
/** @var int 30 day = 2592000sec */
|
|
|
|
private $maxLifespan = 2592000;
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
/**
|
|
|
|
* RequestSharedSecret constructor.
|
|
|
|
*
|
2017-07-28 15:54:08 +03:00
|
|
|
* @param IClientService $httpClientService
|
2015-11-10 12:50:59 +03:00
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param IJobList $jobList
|
|
|
|
* @param TrustedServers $trustedServers
|
|
|
|
* @param ILogger $logger
|
2017-02-24 17:33:09 +03:00
|
|
|
* @param IDiscoveryService $ocsDiscoveryService
|
2017-08-01 12:23:40 +03:00
|
|
|
* @param ITimeFactory $timeFactory
|
2015-11-10 12:50:59 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
2017-07-28 15:54:08 +03:00
|
|
|
IClientService $httpClientService,
|
|
|
|
IURLGenerator $urlGenerator,
|
|
|
|
IJobList $jobList,
|
|
|
|
TrustedServers $trustedServers,
|
|
|
|
ILogger $logger,
|
2017-08-01 12:23:40 +03:00
|
|
|
IDiscoveryService $ocsDiscoveryService,
|
|
|
|
ITimeFactory $timeFactory
|
2015-11-10 12:50:59 +03:00
|
|
|
) {
|
2017-07-28 15:54:08 +03:00
|
|
|
$this->logger = $logger;
|
|
|
|
$this->httpClient = $httpClientService->newClient();
|
|
|
|
$this->jobList = $jobList;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
|
|
|
$this->ocsDiscoveryService = $ocsDiscoveryService;
|
|
|
|
$this->trustedServers = $trustedServers;
|
2017-08-01 12:23:40 +03:00
|
|
|
$this->timeFactory = $timeFactory;
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* run the job, then remove it from the joblist
|
|
|
|
*
|
|
|
|
* @param JobList $jobList
|
2017-07-19 17:06:22 +03:00
|
|
|
* @param ILogger|null $logger
|
2015-11-10 12:50:59 +03:00
|
|
|
*/
|
|
|
|
public function execute($jobList, ILogger $logger = null) {
|
|
|
|
$target = $this->argument['url'];
|
|
|
|
// only execute if target is still in the list of trusted domains
|
|
|
|
if ($this->trustedServers->isTrustedServer($target)) {
|
2015-11-19 19:49:43 +03:00
|
|
|
$this->parentExecute($jobList, $logger);
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
2016-03-18 15:22:05 +03:00
|
|
|
|
2017-07-28 15:43:35 +03:00
|
|
|
$jobList->remove($this, $this->argument);
|
|
|
|
|
|
|
|
if ($this->retainJob) {
|
2017-08-01 12:23:40 +03:00
|
|
|
$this->reAddJob($this->argument);
|
2016-03-18 15:22:05 +03:00
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|
|
|
|
|
2015-11-19 19:49:43 +03:00
|
|
|
/**
|
|
|
|
* call execute() method of parent
|
|
|
|
*
|
|
|
|
* @param JobList $jobList
|
|
|
|
* @param ILogger $logger
|
|
|
|
*/
|
2016-07-06 00:19:10 +03:00
|
|
|
protected function parentExecute($jobList, $logger = null) {
|
2015-11-19 19:49:43 +03:00
|
|
|
parent::execute($jobList, $logger);
|
|
|
|
}
|
|
|
|
|
2015-11-10 12:50:59 +03:00
|
|
|
protected function run($argument) {
|
|
|
|
$target = $argument['url'];
|
2017-08-01 12:23:40 +03:00
|
|
|
$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
|
|
|
|
$currentTime = $this->timeFactory->getTime();
|
2015-11-10 12:50:59 +03:00
|
|
|
$source = $this->urlGenerator->getAbsoluteURL('/');
|
|
|
|
$source = rtrim($source, '/');
|
|
|
|
$token = $argument['token'];
|
|
|
|
|
2017-07-28 15:43:35 +03:00
|
|
|
// kill job after 30 days of trying
|
|
|
|
$deadline = $currentTime - $this->maxLifespan;
|
|
|
|
if ($created < $deadline) {
|
|
|
|
$this->retainJob = false;
|
|
|
|
$this->trustedServers->setServerStatus($target,TrustedServers::STATUS_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-02-24 17:33:09 +03:00
|
|
|
$endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
|
|
|
|
$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
|
|
|
|
|
2017-08-01 12:23:40 +03:00
|
|
|
// make sure that we have a well formatted url
|
2018-04-20 16:53:10 +03:00
|
|
|
$url = rtrim($target, '/') . '/' . trim($endPoint, '/');
|
2017-02-24 17:33:09 +03:00
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
$result = null;
|
2015-11-19 13:48:21 +03:00
|
|
|
try {
|
|
|
|
$result = $this->httpClient->get(
|
2017-02-24 17:33:09 +03:00
|
|
|
$url,
|
2015-11-19 13:48:21 +03:00
|
|
|
[
|
|
|
|
'query' =>
|
|
|
|
[
|
|
|
|
'url' => $source,
|
2018-04-20 16:53:10 +03:00
|
|
|
'token' => $token,
|
|
|
|
'format' => 'json',
|
2015-11-19 13:48:21 +03:00
|
|
|
],
|
|
|
|
'timeout' => 3,
|
|
|
|
'connect_timeout' => 3,
|
|
|
|
]
|
|
|
|
);
|
|
|
|
|
|
|
|
$status = $result->getStatusCode();
|
|
|
|
} catch (ClientException $e) {
|
|
|
|
$status = $e->getCode();
|
2016-02-15 19:33:06 +03:00
|
|
|
if ($status === Http::STATUS_FORBIDDEN) {
|
|
|
|
$this->logger->info($target . ' refused to exchange a shared secret with you.', ['app' => 'federation']);
|
|
|
|
} else {
|
2017-04-21 12:29:01 +03:00
|
|
|
$this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage(), ['app' => 'federation']);
|
2016-02-15 19:33:06 +03:00
|
|
|
}
|
2017-12-11 17:07:08 +03:00
|
|
|
} catch (RequestException $e) {
|
|
|
|
$status = -1; // There is no status code if we could not connect
|
2018-01-17 17:21:56 +03:00
|
|
|
$this->logger->logException($e, [
|
|
|
|
'message' => 'Could not connect to ' . $target,
|
2018-04-25 16:22:28 +03:00
|
|
|
'level' => ILogger::INFO,
|
2018-01-17 17:21:56 +03:00
|
|
|
'app' => 'federation',
|
|
|
|
]);
|
2017-12-11 17:07:08 +03:00
|
|
|
} catch (RingException $e) {
|
2017-11-29 18:28:38 +03:00
|
|
|
$status = -1; // There is no status code if we could not connect
|
2018-01-17 17:21:56 +03:00
|
|
|
$this->logger->logException($e, [
|
|
|
|
'message' => 'Could not connect to ' . $target,
|
2018-04-25 16:22:28 +03:00
|
|
|
'level' => ILogger::INFO,
|
2018-01-17 17:21:56 +03:00
|
|
|
'app' => 'federation',
|
|
|
|
]);
|
2016-02-01 15:39:13 +03:00
|
|
|
} catch (\Exception $e) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$status = Http::STATUS_INTERNAL_SERVER_ERROR;
|
2016-02-15 19:33:06 +03:00
|
|
|
$this->logger->logException($e, ['app' => 'federation']);
|
2015-11-19 13:48:21 +03:00
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
|
|
|
|
// if we received a unexpected response we try again later
|
|
|
|
if (
|
|
|
|
$status !== Http::STATUS_OK
|
|
|
|
&& $status !== Http::STATUS_FORBIDDEN
|
|
|
|
) {
|
2016-03-18 15:22:05 +03:00
|
|
|
$this->retainJob = true;
|
2015-11-19 13:48:21 +03:00
|
|
|
}
|
|
|
|
|
2016-03-18 15:22:05 +03:00
|
|
|
if ($status === Http::STATUS_OK && $result instanceof IResponse) {
|
2015-11-10 12:50:59 +03:00
|
|
|
$body = $result->getBody();
|
|
|
|
$result = json_decode($body, true);
|
|
|
|
if (isset($result['ocs']['data']['sharedSecret'])) {
|
|
|
|
$this->trustedServers->addSharedSecret(
|
|
|
|
$target,
|
|
|
|
$result['ocs']['data']['sharedSecret']
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
$this->logger->error(
|
2018-04-20 16:53:10 +03:00
|
|
|
'remote server "' . $target . '"" does not return a valid shared secret. Received data: ' . $body,
|
2015-11-10 12:50:59 +03:00
|
|
|
['app' => 'federation']
|
|
|
|
);
|
|
|
|
$this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-07-28 15:43:35 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* re-add background job
|
|
|
|
*
|
|
|
|
* @param array $argument
|
|
|
|
*/
|
2017-08-01 12:23:40 +03:00
|
|
|
protected function reAddJob(array $argument) {
|
2017-07-28 15:43:35 +03:00
|
|
|
$url = $argument['url'];
|
2017-08-01 12:23:40 +03:00
|
|
|
$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
|
2017-07-28 15:43:35 +03:00
|
|
|
$token = $argument['token'];
|
|
|
|
$this->jobList->add(
|
|
|
|
GetSharedSecret::class,
|
|
|
|
[
|
|
|
|
'url' => $url,
|
|
|
|
'token' => $token,
|
|
|
|
'created' => $created
|
|
|
|
]
|
|
|
|
);
|
|
|
|
}
|
2015-11-10 12:50:59 +03:00
|
|
|
}
|