2016-02-04 11:59:52 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2016-03-01 19:52:32 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\FederatedFileSharing;
|
|
|
|
|
2019-11-22 22:52:10 +03:00
|
|
|
use OC\Share20\Exception\InvalidShare;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OC\Share20\Share;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\DB\QueryBuilder\IQueryBuilder;
|
2018-06-25 12:40:16 +03:00
|
|
|
use OCP\Federation\ICloudFederationProviderManager;
|
2017-01-27 14:52:17 +03:00
|
|
|
use OCP\Federation\ICloudIdManager;
|
2016-10-31 22:26:11 +03:00
|
|
|
use OCP\Files\Folder;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OCP\Files\IRootFolder;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\Files\Node;
|
|
|
|
use OCP\Files\NotFoundException;
|
2016-04-18 19:17:08 +03:00
|
|
|
use OCP\IConfig;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\IDBConnection;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OCP\IL10N;
|
|
|
|
use OCP\ILogger;
|
2016-05-11 21:48:27 +03:00
|
|
|
use OCP\IUserManager;
|
2018-06-19 10:20:35 +03:00
|
|
|
use OCP\Share\Exceptions\GenericShareException;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCP\Share\Exceptions\ShareNotFound;
|
2016-02-04 11:59:52 +03:00
|
|
|
use OCP\Share\IShare;
|
|
|
|
use OCP\Share\IShareProvider;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class FederatedShareProvider
|
|
|
|
*
|
|
|
|
* @package OCA\FederatedFileSharing
|
|
|
|
*/
|
|
|
|
class FederatedShareProvider implements IShareProvider {
|
|
|
|
|
|
|
|
const SHARE_TYPE_REMOTE = 6;
|
|
|
|
|
|
|
|
/** @var IDBConnection */
|
|
|
|
private $dbConnection;
|
|
|
|
|
|
|
|
/** @var AddressHandler */
|
|
|
|
private $addressHandler;
|
|
|
|
|
|
|
|
/** @var Notifications */
|
|
|
|
private $notifications;
|
|
|
|
|
|
|
|
/** @var TokenHandler */
|
|
|
|
private $tokenHandler;
|
|
|
|
|
|
|
|
/** @var IL10N */
|
|
|
|
private $l;
|
|
|
|
|
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
|
|
|
|
|
|
|
/** @var IRootFolder */
|
|
|
|
private $rootFolder;
|
|
|
|
|
2016-04-18 19:17:08 +03:00
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/** @var string */
|
|
|
|
private $externalShareTable = 'share_external';
|
|
|
|
|
2016-05-11 21:48:27 +03:00
|
|
|
/** @var IUserManager */
|
|
|
|
private $userManager;
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
/** @var ICloudIdManager */
|
|
|
|
private $cloudIdManager;
|
|
|
|
|
2017-05-24 10:07:58 +03:00
|
|
|
/** @var \OCP\GlobalScale\IConfig */
|
|
|
|
private $gsConfig;
|
|
|
|
|
2018-06-25 12:40:16 +03:00
|
|
|
/** @var ICloudFederationProviderManager */
|
|
|
|
private $cloudFederationProviderManager;
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
/** @var array list of supported share types */
|
|
|
|
private $supportedShareType = [\OCP\Share::SHARE_TYPE_REMOTE_GROUP, \OCP\Share::SHARE_TYPE_REMOTE];
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* DefaultShareProvider constructor.
|
|
|
|
*
|
|
|
|
* @param IDBConnection $connection
|
|
|
|
* @param AddressHandler $addressHandler
|
|
|
|
* @param Notifications $notifications
|
|
|
|
* @param TokenHandler $tokenHandler
|
|
|
|
* @param IL10N $l10n
|
|
|
|
* @param ILogger $logger
|
|
|
|
* @param IRootFolder $rootFolder
|
2016-04-18 19:17:08 +03:00
|
|
|
* @param IConfig $config
|
2016-05-11 21:48:27 +03:00
|
|
|
* @param IUserManager $userManager
|
2017-01-27 14:52:17 +03:00
|
|
|
* @param ICloudIdManager $cloudIdManager
|
2017-05-24 10:07:58 +03:00
|
|
|
* @param \OCP\GlobalScale\IConfig $globalScaleConfig
|
2018-06-25 12:40:16 +03:00
|
|
|
* @param ICloudFederationProviderManager $cloudFederationProviderManager
|
2016-02-04 11:59:52 +03:00
|
|
|
*/
|
|
|
|
public function __construct(
|
|
|
|
IDBConnection $connection,
|
|
|
|
AddressHandler $addressHandler,
|
|
|
|
Notifications $notifications,
|
|
|
|
TokenHandler $tokenHandler,
|
|
|
|
IL10N $l10n,
|
|
|
|
ILogger $logger,
|
2016-04-18 19:17:08 +03:00
|
|
|
IRootFolder $rootFolder,
|
2016-05-11 21:48:27 +03:00
|
|
|
IConfig $config,
|
2017-01-27 14:52:17 +03:00
|
|
|
IUserManager $userManager,
|
2017-05-24 10:07:58 +03:00
|
|
|
ICloudIdManager $cloudIdManager,
|
2018-06-25 12:40:16 +03:00
|
|
|
\OCP\GlobalScale\IConfig $globalScaleConfig,
|
|
|
|
ICloudFederationProviderManager $cloudFederationProviderManager
|
2016-02-04 11:59:52 +03:00
|
|
|
) {
|
|
|
|
$this->dbConnection = $connection;
|
|
|
|
$this->addressHandler = $addressHandler;
|
|
|
|
$this->notifications = $notifications;
|
|
|
|
$this->tokenHandler = $tokenHandler;
|
|
|
|
$this->l = $l10n;
|
|
|
|
$this->logger = $logger;
|
|
|
|
$this->rootFolder = $rootFolder;
|
2016-04-18 19:17:08 +03:00
|
|
|
$this->config = $config;
|
2016-05-11 21:48:27 +03:00
|
|
|
$this->userManager = $userManager;
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cloudIdManager = $cloudIdManager;
|
2017-05-24 10:07:58 +03:00
|
|
|
$this->gsConfig = $globalScaleConfig;
|
2018-06-25 12:40:16 +03:00
|
|
|
$this->cloudFederationProviderManager = $cloudFederationProviderManager;
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return the identifier of this provider.
|
|
|
|
*
|
|
|
|
* @return string Containing only [a-zA-Z0-9]
|
|
|
|
*/
|
|
|
|
public function identifier() {
|
|
|
|
return 'ocFederatedSharing';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Share a path
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @return IShare The share object
|
|
|
|
* @throws ShareNotFound
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
public function create(IShare $share) {
|
|
|
|
|
|
|
|
$shareWith = $share->getSharedWith();
|
|
|
|
$itemSource = $share->getNodeId();
|
|
|
|
$itemType = $share->getNodeType();
|
|
|
|
$permissions = $share->getPermissions();
|
|
|
|
$sharedBy = $share->getSharedBy();
|
2018-06-13 15:19:59 +03:00
|
|
|
$shareType = $share->getShareType();
|
|
|
|
|
|
|
|
if ($shareType === \OCP\Share::SHARE_TYPE_REMOTE_GROUP &&
|
|
|
|
!$this->isOutgoingServer2serverGroupShareEnabled()
|
|
|
|
) {
|
|
|
|
$message = 'It is not allowed to send federated group shares from this server.';
|
|
|
|
$message_t = $this->l->t('It is not allowed to send federated group shares from this server.');
|
|
|
|
$this->logger->debug($message, ['app' => 'Federated File Sharing']);
|
|
|
|
throw new \Exception($message_t);
|
|
|
|
}
|
2016-05-23 12:48:14 +03:00
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/*
|
|
|
|
* Check if file is not already shared with the remote user
|
|
|
|
*/
|
2018-06-13 15:19:59 +03:00
|
|
|
$alreadyShared = $this->getSharedWith($shareWith, \OCP\Share::SHARE_TYPE_REMOTE, $share->getNode(), 1, 0);
|
|
|
|
$alreadySharedGroup = $this->getSharedWith($shareWith, \OCP\Share::SHARE_TYPE_REMOTE_GROUP, $share->getNode(), 1, 0);
|
|
|
|
if (!empty($alreadyShared) || !empty($alreadySharedGroup)) {
|
2018-10-09 15:32:14 +03:00
|
|
|
$message = 'Sharing %1$s failed, because this item is already shared with %2$s';
|
|
|
|
$message_t = $this->l->t('Sharing %1$s failed, because this item is already shared with %2$s', array($share->getNode()->getName(), $shareWith));
|
2016-02-04 11:59:52 +03:00
|
|
|
$this->logger->debug(sprintf($message, $share->getNode()->getName(), $shareWith), ['app' => 'Federated File Sharing']);
|
|
|
|
throw new \Exception($message_t);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// don't allow federated shares if source and target server are the same
|
2017-01-27 14:52:17 +03:00
|
|
|
$cloudId = $this->cloudIdManager->resolveCloudId($shareWith);
|
2016-02-04 11:59:52 +03:00
|
|
|
$currentServer = $this->addressHandler->generateRemoteURL();
|
|
|
|
$currentUser = $sharedBy;
|
2017-01-27 14:52:17 +03:00
|
|
|
if ($this->addressHandler->compareAddresses($cloudId->getUser(), $cloudId->getRemote(), $currentUser, $currentServer)) {
|
2016-02-04 11:59:52 +03:00
|
|
|
$message = 'Not allowed to create a federated share with the same user.';
|
|
|
|
$message_t = $this->l->t('Not allowed to create a federated share with the same user');
|
|
|
|
$this->logger->debug($message, ['app' => 'Federated File Sharing']);
|
|
|
|
throw new \Exception($message_t);
|
|
|
|
}
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
|
2017-02-09 15:31:06 +03:00
|
|
|
$share->setSharedWith($cloudId->getId());
|
2016-02-04 11:59:52 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
try {
|
|
|
|
$remoteShare = $this->getShareFromExternalShareTable($share);
|
|
|
|
} catch (ShareNotFound $e) {
|
|
|
|
$remoteShare = null;
|
|
|
|
}
|
2016-02-04 11:59:52 +03:00
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
if ($remoteShare) {
|
2016-05-17 16:03:37 +03:00
|
|
|
try {
|
2017-01-27 14:52:17 +03:00
|
|
|
$ownerCloudId = $this->cloudIdManager->getCloudId($remoteShare['owner'], $remoteShare['remote']);
|
2018-06-13 15:19:59 +03:00
|
|
|
$shareId = $this->addShareToDB($itemSource, $itemType, $shareWith, $sharedBy, $ownerCloudId->getId(), $permissions, 'tmp_token_' . time(), $shareType);
|
2016-05-19 16:36:05 +03:00
|
|
|
$share->setId($shareId);
|
2016-05-17 16:03:37 +03:00
|
|
|
list($token, $remoteId) = $this->askOwnerToReShare($shareWith, $share, $shareId);
|
|
|
|
// remote share was create successfully if we get a valid token as return
|
|
|
|
$send = is_string($token) && $token !== '';
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
// fall back to old re-share behavior if the remote server
|
2016-06-20 13:08:23 +03:00
|
|
|
// doesn't support flat re-shares (was introduced with Nextcloud 9.1)
|
2016-05-19 16:36:05 +03:00
|
|
|
$this->removeShareFromTable($share);
|
2016-05-19 17:19:13 +03:00
|
|
|
$shareId = $this->createFederatedShare($share);
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
2016-05-19 16:36:05 +03:00
|
|
|
if ($send) {
|
|
|
|
$this->updateSuccessfulReshare($shareId, $token);
|
|
|
|
$this->storeRemoteId($shareId, $remoteId);
|
|
|
|
} else {
|
|
|
|
$this->removeShareFromTable($share);
|
|
|
|
$message_t = $this->l->t('File is already shared with %s', [$shareWith]);
|
|
|
|
throw new \Exception($message_t);
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
} else {
|
2016-05-19 17:19:13 +03:00
|
|
|
$shareId = $this->createFederatedShare($share);
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
2016-02-04 11:59:52 +03:00
|
|
|
|
|
|
|
$data = $this->getRawShare($shareId);
|
2016-05-19 16:36:05 +03:00
|
|
|
return $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
2016-05-17 16:03:37 +03:00
|
|
|
/**
|
|
|
|
* create federated share and inform the recipient
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
2016-05-19 17:19:13 +03:00
|
|
|
* @return int
|
2016-05-19 16:36:05 +03:00
|
|
|
* @throws ShareNotFound
|
|
|
|
* @throws \Exception
|
2016-05-17 16:03:37 +03:00
|
|
|
*/
|
|
|
|
protected function createFederatedShare(IShare $share) {
|
|
|
|
$token = $this->tokenHandler->generateToken();
|
|
|
|
$shareId = $this->addShareToDB(
|
|
|
|
$share->getNodeId(),
|
|
|
|
$share->getNodeType(),
|
|
|
|
$share->getSharedWith(),
|
|
|
|
$share->getSharedBy(),
|
|
|
|
$share->getShareOwner(),
|
|
|
|
$share->getPermissions(),
|
2018-06-13 15:19:59 +03:00
|
|
|
$token,
|
|
|
|
$share->getShareType()
|
2016-05-17 16:03:37 +03:00
|
|
|
);
|
|
|
|
|
2016-11-02 20:05:14 +03:00
|
|
|
$failure = false;
|
|
|
|
|
2016-06-24 16:59:32 +03:00
|
|
|
try {
|
|
|
|
$sharedByFederatedId = $share->getSharedBy();
|
|
|
|
if ($this->userManager->userExists($sharedByFederatedId)) {
|
2017-01-27 14:52:17 +03:00
|
|
|
$cloudId = $this->cloudIdManager->getCloudId($sharedByFederatedId, $this->addressHandler->generateRemoteURL());
|
|
|
|
$sharedByFederatedId = $cloudId->getId();
|
2016-06-24 16:59:32 +03:00
|
|
|
}
|
2017-01-27 14:52:17 +03:00
|
|
|
$ownerCloudId = $this->cloudIdManager->getCloudId($share->getShareOwner(), $this->addressHandler->generateRemoteURL());
|
2016-06-24 16:59:32 +03:00
|
|
|
$send = $this->notifications->sendRemoteShare(
|
|
|
|
$token,
|
|
|
|
$share->getSharedWith(),
|
|
|
|
$share->getNode()->getName(),
|
|
|
|
$shareId,
|
|
|
|
$share->getShareOwner(),
|
2017-01-27 14:52:17 +03:00
|
|
|
$ownerCloudId->getId(),
|
2016-06-24 16:59:32 +03:00
|
|
|
$share->getSharedBy(),
|
2018-06-13 15:19:59 +03:00
|
|
|
$sharedByFederatedId,
|
|
|
|
$share->getShareType()
|
2016-06-24 16:59:32 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
if ($send === false) {
|
2016-11-02 20:05:14 +03:00
|
|
|
$failure = true;
|
2016-06-24 16:59:32 +03:00
|
|
|
}
|
|
|
|
} catch (\Exception $e) {
|
2018-01-17 17:21:56 +03:00
|
|
|
$this->logger->logException($e, [
|
|
|
|
'message' => 'Failed to notify remote server of federated share, removing share.',
|
2018-04-25 16:22:28 +03:00
|
|
|
'level' => ILogger::ERROR,
|
2018-01-17 17:21:56 +03:00
|
|
|
'app' => 'federatedfilesharing',
|
|
|
|
]);
|
2016-11-02 20:05:14 +03:00
|
|
|
$failure = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($failure) {
|
2016-06-24 16:59:32 +03:00
|
|
|
$this->removeShareFromTableById($shareId);
|
2018-10-09 15:32:14 +03:00
|
|
|
$message_t = $this->l->t('Sharing %1$s failed, could not find %2$s, maybe the server is currently unreachable or uses a self-signed certificate.',
|
2016-11-02 20:05:14 +03:00
|
|
|
[$share->getNode()->getName(), $share->getSharedWith()]);
|
|
|
|
throw new \Exception($message_t);
|
2016-05-19 16:36:05 +03:00
|
|
|
}
|
|
|
|
|
2016-05-19 17:19:13 +03:00
|
|
|
return $shareId;
|
2016-11-02 20:05:14 +03:00
|
|
|
|
2016-05-17 16:03:37 +03:00
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param IShare $share
|
|
|
|
* @param string $shareId internal share Id
|
|
|
|
* @return array
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
protected function askOwnerToReShare($shareWith, IShare $share, $shareId) {
|
|
|
|
|
|
|
|
$remoteShare = $this->getShareFromExternalShareTable($share);
|
|
|
|
$token = $remoteShare['share_token'];
|
|
|
|
$remoteId = $remoteShare['remote_id'];
|
|
|
|
$remote = $remoteShare['remote'];
|
|
|
|
|
|
|
|
list($token, $remoteId) = $this->notifications->requestReShare(
|
|
|
|
$token,
|
|
|
|
$remoteId,
|
|
|
|
$shareId,
|
|
|
|
$remote,
|
|
|
|
$shareWith,
|
2018-06-04 13:16:03 +03:00
|
|
|
$share->getPermissions(),
|
|
|
|
$share->getNode()->getName()
|
2016-05-04 16:26:30 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
return [$token, $remoteId];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get federated share from the share_external table but exclude mounted link shares
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @return array
|
|
|
|
* @throws ShareNotFound
|
|
|
|
*/
|
|
|
|
protected function getShareFromExternalShareTable(IShare $share) {
|
|
|
|
$query = $this->dbConnection->getQueryBuilder();
|
|
|
|
$query->select('*')->from($this->externalShareTable)
|
|
|
|
->where($query->expr()->eq('user', $query->createNamedParameter($share->getShareOwner())))
|
|
|
|
->andWhere($query->expr()->eq('mountpoint', $query->createNamedParameter($share->getTarget())));
|
|
|
|
$result = $query->execute()->fetchAll();
|
|
|
|
|
|
|
|
if (isset($result[0]) && (int)$result[0]['remote_id'] > 0) {
|
|
|
|
return $result[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
throw new ShareNotFound('share not found in share_external table');
|
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* add share to the database and return the ID
|
|
|
|
*
|
|
|
|
* @param int $itemSource
|
|
|
|
* @param string $itemType
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param string $sharedBy
|
|
|
|
* @param string $uidOwner
|
|
|
|
* @param int $permissions
|
|
|
|
* @param string $token
|
2018-06-13 15:19:59 +03:00
|
|
|
* @param int $shareType
|
2016-02-04 11:59:52 +03:00
|
|
|
* @return int
|
|
|
|
*/
|
2018-06-13 15:19:59 +03:00
|
|
|
private function addShareToDB($itemSource, $itemType, $shareWith, $sharedBy, $uidOwner, $permissions, $token, $shareType) {
|
2016-02-04 11:59:52 +03:00
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->insert('share')
|
2018-06-13 15:19:59 +03:00
|
|
|
->setValue('share_type', $qb->createNamedParameter($shareType))
|
2016-02-04 11:59:52 +03:00
|
|
|
->setValue('item_type', $qb->createNamedParameter($itemType))
|
|
|
|
->setValue('item_source', $qb->createNamedParameter($itemSource))
|
|
|
|
->setValue('file_source', $qb->createNamedParameter($itemSource))
|
|
|
|
->setValue('share_with', $qb->createNamedParameter($shareWith))
|
|
|
|
->setValue('uid_owner', $qb->createNamedParameter($uidOwner))
|
|
|
|
->setValue('uid_initiator', $qb->createNamedParameter($sharedBy))
|
|
|
|
->setValue('permissions', $qb->createNamedParameter($permissions))
|
|
|
|
->setValue('token', $qb->createNamedParameter($token))
|
|
|
|
->setValue('stime', $qb->createNamedParameter(time()));
|
|
|
|
|
2016-02-08 20:30:51 +03:00
|
|
|
/*
|
|
|
|
* Added to fix https://github.com/owncloud/core/issues/22215
|
|
|
|
* Can be removed once we get rid of ajax/share.php
|
|
|
|
*/
|
|
|
|
$qb->setValue('file_target', $qb->createNamedParameter(''));
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
$qb->execute();
|
|
|
|
$id = $qb->getLastInsertId();
|
|
|
|
|
|
|
|
return (int)$id;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update a share
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @return IShare The share object
|
|
|
|
*/
|
|
|
|
public function update(IShare $share) {
|
|
|
|
/*
|
|
|
|
* We allow updating the permissions of federated shares
|
|
|
|
*/
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->update('share')
|
|
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
|
|
|
|
->set('permissions', $qb->createNamedParameter($share->getPermissions()))
|
2016-02-08 18:18:15 +03:00
|
|
|
->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
|
|
|
|
->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
|
2016-02-04 11:59:52 +03:00
|
|
|
->execute();
|
|
|
|
|
2016-05-13 21:36:42 +03:00
|
|
|
// send the updated permission to the owner/initiator, if they are not the same
|
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) {
|
|
|
|
$this->sendPermissionUpdate($share);
|
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
2016-05-13 21:36:42 +03:00
|
|
|
/**
|
|
|
|
* send the updated permission to the owner/initiator, if they are not the same
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @throws ShareNotFound
|
|
|
|
* @throws \OC\HintException
|
|
|
|
*/
|
|
|
|
protected function sendPermissionUpdate(IShare $share) {
|
|
|
|
$remoteId = $this->getRemoteId($share);
|
|
|
|
// if the local user is the owner we send the permission change to the initiator
|
|
|
|
if ($this->userManager->userExists($share->getShareOwner())) {
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy());
|
|
|
|
} else { // ... if not we send the permission change to the owner
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getShareOwner());
|
|
|
|
}
|
|
|
|
$this->notifications->sendPermissionChange($remote, $remoteId, $share->getToken(), $share->getPermissions());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
/**
|
|
|
|
* update successful reShare with the correct token
|
|
|
|
*
|
|
|
|
* @param int $shareId
|
|
|
|
* @param string $token
|
|
|
|
*/
|
|
|
|
protected function updateSuccessfulReShare($shareId, $token) {
|
|
|
|
$query = $this->dbConnection->getQueryBuilder();
|
|
|
|
$query->update('share')
|
|
|
|
->where($query->expr()->eq('id', $query->createNamedParameter($shareId)))
|
|
|
|
->set('token', $query->createNamedParameter($token))
|
|
|
|
->execute();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* store remote ID in federated reShare table
|
|
|
|
*
|
|
|
|
* @param $shareId
|
|
|
|
* @param $remoteId
|
|
|
|
*/
|
|
|
|
public function storeRemoteId($shareId, $remoteId) {
|
|
|
|
$query = $this->dbConnection->getQueryBuilder();
|
|
|
|
$query->insert('federated_reshares')
|
|
|
|
->values(
|
|
|
|
[
|
|
|
|
'share_id' => $query->createNamedParameter($shareId),
|
|
|
|
'remote_id' => $query->createNamedParameter($remoteId),
|
|
|
|
]
|
|
|
|
);
|
|
|
|
$query->execute();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get share ID on remote server for federated re-shares
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @return int
|
|
|
|
* @throws ShareNotFound
|
|
|
|
*/
|
|
|
|
public function getRemoteId(IShare $share) {
|
|
|
|
$query = $this->dbConnection->getQueryBuilder();
|
|
|
|
$query->select('remote_id')->from('federated_reshares')
|
|
|
|
->where($query->expr()->eq('share_id', $query->createNamedParameter((int)$share->getId())));
|
|
|
|
$data = $query->execute()->fetch();
|
|
|
|
|
|
|
|
if (!is_array($data) || !isset($data['remote_id'])) {
|
|
|
|
throw new ShareNotFound();
|
|
|
|
}
|
|
|
|
|
|
|
|
return (int)$data['remote_id'];
|
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function move(IShare $share, $recipient) {
|
|
|
|
/*
|
|
|
|
* This function does nothing yet as it is just for outgoing
|
|
|
|
* federated shares.
|
|
|
|
*/
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get all children of this share
|
|
|
|
*
|
|
|
|
* @param IShare $parent
|
|
|
|
* @return IShare[]
|
|
|
|
*/
|
|
|
|
public function getChildren(IShare $parent) {
|
|
|
|
$children = [];
|
|
|
|
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share')
|
|
|
|
->where($qb->expr()->eq('parent', $qb->createNamedParameter($parent->getId())))
|
2018-06-13 15:19:59 +03:00
|
|
|
->andWhere($qb->expr()->in('share_type', $qb->createNamedParameter($this->supportedShareType, IQueryBuilder::PARAM_INT_ARRAY)))
|
2016-02-04 11:59:52 +03:00
|
|
|
->orderBy('id');
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
while($data = $cursor->fetch()) {
|
2016-05-17 16:03:37 +03:00
|
|
|
$children[] = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
return $children;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-05-04 16:26:30 +03:00
|
|
|
* Delete a share (owner unShares the file)
|
2016-02-04 11:59:52 +03:00
|
|
|
*
|
|
|
|
* @param IShare $share
|
2018-06-07 17:36:26 +03:00
|
|
|
* @throws ShareNotFound
|
|
|
|
* @throws \OC\HintException
|
2016-02-04 11:59:52 +03:00
|
|
|
*/
|
|
|
|
public function delete(IShare $share) {
|
2016-05-04 16:26:30 +03:00
|
|
|
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedWith());
|
|
|
|
|
|
|
|
// if the local user is the owner we can send the unShare request directly...
|
|
|
|
if ($this->userManager->userExists($share->getShareOwner())) {
|
|
|
|
$this->notifications->sendRemoteUnShare($remote, $share->getId(), $share->getToken());
|
|
|
|
$this->revokeShare($share, true);
|
|
|
|
} else { // ... if not we need to correct ID for the unShare request
|
|
|
|
$remoteId = $this->getRemoteId($share);
|
|
|
|
$this->notifications->sendRemoteUnShare($remote, $remoteId, $share->getToken());
|
|
|
|
$this->revokeShare($share, false);
|
|
|
|
}
|
|
|
|
|
2018-06-05 18:19:42 +03:00
|
|
|
// only remove the share when all messages are send to not lose information
|
|
|
|
// about the share to early
|
|
|
|
$this->removeShareFromTable($share);
|
2016-05-04 16:26:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* in case of a re-share we need to send the other use (initiator or owner)
|
|
|
|
* a message that the file was unshared
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
* @param bool $isOwner the user can either be the owner or the user who re-sahred it
|
|
|
|
* @throws ShareNotFound
|
|
|
|
* @throws \OC\HintException
|
|
|
|
*/
|
|
|
|
protected function revokeShare($share, $isOwner) {
|
2019-10-03 16:21:04 +03:00
|
|
|
if ($this->userManager->userExists($share->getShareOwner() && $this->userManager->userExists($share->getSharedBy()))) {
|
|
|
|
// If both the owner and the initiator of the share are local users we don't have to notify anybody else
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
// also send a unShare request to the initiator, if this is a different user than the owner
|
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) {
|
|
|
|
if ($isOwner) {
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy());
|
|
|
|
} else {
|
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getShareOwner());
|
|
|
|
}
|
|
|
|
$remoteId = $this->getRemoteId($share);
|
|
|
|
$this->notifications->sendRevokeShare($remote, $remoteId, $share->getToken());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* remove share from table
|
|
|
|
*
|
|
|
|
* @param IShare $share
|
|
|
|
*/
|
|
|
|
public function removeShareFromTable(IShare $share) {
|
2016-06-24 16:59:32 +03:00
|
|
|
$this->removeShareFromTableById($share->getId());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* remove share from table
|
|
|
|
*
|
|
|
|
* @param string $shareId
|
|
|
|
*/
|
|
|
|
private function removeShareFromTableById($shareId) {
|
2016-02-04 11:59:52 +03:00
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->delete('share')
|
2016-06-24 16:59:32 +03:00
|
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($shareId)));
|
2016-02-04 11:59:52 +03:00
|
|
|
$qb->execute();
|
|
|
|
|
2016-05-04 16:26:30 +03:00
|
|
|
$qb->delete('federated_reshares')
|
2016-06-24 16:59:32 +03:00
|
|
|
->where($qb->expr()->eq('share_id', $qb->createNamedParameter($shareId)));
|
2016-05-04 16:26:30 +03:00
|
|
|
$qb->execute();
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function deleteFromSelf(IShare $share, $recipient) {
|
|
|
|
// nothing to do here. Technically deleteFromSelf in the context of federated
|
|
|
|
// shares is a umount of a external storage. This is handled here
|
|
|
|
// apps/files_sharing/lib/external/manager.php
|
|
|
|
// TODO move this code over to this app
|
|
|
|
}
|
|
|
|
|
2018-06-19 10:20:35 +03:00
|
|
|
public function restore(IShare $share, string $recipient): IShare {
|
|
|
|
throw new GenericShareException('not implemented');
|
|
|
|
}
|
|
|
|
|
2016-06-18 23:04:56 +03:00
|
|
|
|
2016-10-31 22:26:11 +03:00
|
|
|
public function getSharesInFolder($userId, Folder $node, $reshares) {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share', 's')
|
|
|
|
->andWhere($qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
|
|
|
|
$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
|
|
|
|
))
|
|
|
|
->andWhere(
|
2016-11-01 14:15:14 +03:00
|
|
|
$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_REMOTE))
|
2016-10-31 22:26:11 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reshares for this user are shares where they are the owner.
|
|
|
|
*/
|
|
|
|
if ($reshares === false) {
|
|
|
|
$qb->andWhere($qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)));
|
|
|
|
} else {
|
|
|
|
$qb->andWhere(
|
|
|
|
$qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
|
|
|
|
$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2017-04-10 18:59:40 +03:00
|
|
|
$qb->innerJoin('s', 'filecache' ,'f', $qb->expr()->eq('s.file_source', 'f.fileid'));
|
2016-10-31 22:26:11 +03:00
|
|
|
$qb->andWhere($qb->expr()->eq('f.parent', $qb->createNamedParameter($node->getId())));
|
|
|
|
|
|
|
|
$qb->orderBy('id');
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
$shares = [];
|
|
|
|
while ($data = $cursor->fetch()) {
|
|
|
|
$shares[$data['fileid']][] = $this->createShareObject($data);
|
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
return $shares;
|
2016-06-18 23:04:56 +03:00
|
|
|
}
|
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function getSharesBy($userId, $shareType, $node, $reshares, $limit, $offset) {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share');
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
$qb->andWhere($qb->expr()->eq('share_type', $qb->createNamedParameter($shareType)));
|
2016-02-04 11:59:52 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Reshares for this user are shares where they are the owner.
|
|
|
|
*/
|
|
|
|
if ($reshares === false) {
|
|
|
|
//Special case for old shares created via the web UI
|
|
|
|
$or1 = $qb->expr()->andX(
|
|
|
|
$qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
|
|
|
|
$qb->expr()->isNull('uid_initiator')
|
|
|
|
);
|
|
|
|
|
|
|
|
$qb->andWhere(
|
|
|
|
$qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)),
|
|
|
|
$or1
|
|
|
|
)
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
$qb->andWhere(
|
|
|
|
$qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
|
|
|
|
$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($node !== null) {
|
|
|
|
$qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($limit !== -1) {
|
|
|
|
$qb->setMaxResults($limit);
|
|
|
|
}
|
|
|
|
|
|
|
|
$qb->setFirstResult($offset);
|
|
|
|
$qb->orderBy('id');
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
$shares = [];
|
|
|
|
while($data = $cursor->fetch()) {
|
2016-05-17 16:03:37 +03:00
|
|
|
$shares[] = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
return $shares;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function getShareById($id, $recipientId = null) {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share')
|
|
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
|
2018-06-13 15:19:59 +03:00
|
|
|
->andWhere($qb->expr()->in('share_type', $qb->createNamedParameter($this->supportedShareType, IQueryBuilder::PARAM_INT_ARRAY)));
|
2016-05-23 12:48:14 +03:00
|
|
|
|
2016-02-04 11:59:52 +03:00
|
|
|
$cursor = $qb->execute();
|
|
|
|
$data = $cursor->fetch();
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
if ($data === false) {
|
2018-06-07 15:40:12 +03:00
|
|
|
throw new ShareNotFound('Can not find share with ID: ' . $id);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2016-05-17 16:03:37 +03:00
|
|
|
$share = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
} catch (InvalidShare $e) {
|
2018-06-07 15:40:12 +03:00
|
|
|
throw new ShareNotFound();
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get shares for a given path
|
|
|
|
*
|
|
|
|
* @param \OCP\Files\Node $path
|
|
|
|
* @return IShare[]
|
|
|
|
*/
|
|
|
|
public function getSharesByPath(Node $path) {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
// get federated user shares
|
2016-02-04 11:59:52 +03:00
|
|
|
$cursor = $qb->select('*')
|
|
|
|
->from('share')
|
|
|
|
->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($path->getId())))
|
2018-06-13 15:19:59 +03:00
|
|
|
->andWhere($qb->expr()->in('share_type', $qb->createNamedParameter($this->supportedShareType, IQueryBuilder::PARAM_INT_ARRAY)))
|
2016-02-04 11:59:52 +03:00
|
|
|
->execute();
|
|
|
|
|
|
|
|
$shares = [];
|
|
|
|
while($data = $cursor->fetch()) {
|
2016-05-17 16:03:37 +03:00
|
|
|
$shares[] = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
return $shares;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function getSharedWith($userId, $shareType, $node, $limit, $offset) {
|
|
|
|
/** @var IShare[] $shares */
|
|
|
|
$shares = [];
|
|
|
|
|
|
|
|
//Get shares directly with this user
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share');
|
|
|
|
|
|
|
|
// Order by id
|
|
|
|
$qb->orderBy('id');
|
|
|
|
|
|
|
|
// Set limit and offset
|
|
|
|
if ($limit !== -1) {
|
|
|
|
$qb->setMaxResults($limit);
|
|
|
|
}
|
|
|
|
$qb->setFirstResult($offset);
|
|
|
|
|
2018-06-13 15:19:59 +03:00
|
|
|
$qb->where($qb->expr()->in('share_type', $qb->createNamedParameter($this->supportedShareType, IQueryBuilder::PARAM_INT_ARRAY)));
|
2016-02-04 11:59:52 +03:00
|
|
|
$qb->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($userId)));
|
|
|
|
|
|
|
|
// Filter by node if provided
|
|
|
|
if ($node !== null) {
|
|
|
|
$qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
|
|
|
|
}
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
|
|
|
|
while($data = $cursor->fetch()) {
|
2016-05-17 16:03:37 +03:00
|
|
|
$shares[] = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
|
|
|
|
return $shares;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a share by token
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @return IShare
|
|
|
|
* @throws ShareNotFound
|
|
|
|
*/
|
|
|
|
public function getShareByToken($token) {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
|
|
|
|
$cursor = $qb->select('*')
|
|
|
|
->from('share')
|
2018-06-13 15:19:59 +03:00
|
|
|
->where($qb->expr()->in('share_type', $qb->createNamedParameter($this->supportedShareType, IQueryBuilder::PARAM_INT_ARRAY)))
|
2016-02-04 11:59:52 +03:00
|
|
|
->andWhere($qb->expr()->eq('token', $qb->createNamedParameter($token)))
|
|
|
|
->execute();
|
|
|
|
|
|
|
|
$data = $cursor->fetch();
|
|
|
|
|
|
|
|
if ($data === false) {
|
2016-05-23 12:48:14 +03:00
|
|
|
throw new ShareNotFound('Share not found', $this->l->t('Could not find share'));
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2016-05-17 16:03:37 +03:00
|
|
|
$share = $this->createShareObject($data);
|
2016-02-04 11:59:52 +03:00
|
|
|
} catch (InvalidShare $e) {
|
2016-05-23 12:48:14 +03:00
|
|
|
throw new ShareNotFound('Share not found', $this->l->t('Could not find share'));
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get database row of a give share
|
|
|
|
*
|
|
|
|
* @param $id
|
|
|
|
* @return array
|
|
|
|
* @throws ShareNotFound
|
|
|
|
*/
|
|
|
|
private function getRawShare($id) {
|
|
|
|
|
|
|
|
// Now fetch the inserted share and create a complete share object
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share')
|
|
|
|
->where($qb->expr()->eq('id', $qb->createNamedParameter($id)));
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
$data = $cursor->fetch();
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
if ($data === false) {
|
|
|
|
throw new ShareNotFound;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a share object from an database row
|
|
|
|
*
|
|
|
|
* @param array $data
|
|
|
|
* @return IShare
|
|
|
|
* @throws InvalidShare
|
|
|
|
* @throws ShareNotFound
|
|
|
|
*/
|
2016-05-17 16:03:37 +03:00
|
|
|
private function createShareObject($data) {
|
2016-02-04 11:59:52 +03:00
|
|
|
|
2016-05-11 21:48:27 +03:00
|
|
|
$share = new Share($this->rootFolder, $this->userManager);
|
2016-02-04 11:59:52 +03:00
|
|
|
$share->setId((int)$data['id'])
|
|
|
|
->setShareType((int)$data['share_type'])
|
|
|
|
->setPermissions((int)$data['permissions'])
|
|
|
|
->setTarget($data['file_target'])
|
|
|
|
->setMailSend((bool)$data['mail_send'])
|
|
|
|
->setToken($data['token']);
|
|
|
|
|
|
|
|
$shareTime = new \DateTime();
|
|
|
|
$shareTime->setTimestamp((int)$data['stime']);
|
|
|
|
$share->setShareTime($shareTime);
|
|
|
|
$share->setSharedWith($data['share_with']);
|
|
|
|
|
|
|
|
if ($data['uid_initiator'] !== null) {
|
|
|
|
$share->setShareOwner($data['uid_owner']);
|
|
|
|
$share->setSharedBy($data['uid_initiator']);
|
|
|
|
} else {
|
|
|
|
//OLD SHARE
|
|
|
|
$share->setSharedBy($data['uid_owner']);
|
|
|
|
$path = $this->getNode($share->getSharedBy(), (int)$data['file_source']);
|
|
|
|
|
|
|
|
$owner = $path->getOwner();
|
|
|
|
$share->setShareOwner($owner->getUID());
|
|
|
|
}
|
|
|
|
|
|
|
|
$share->setNodeId((int)$data['file_source']);
|
|
|
|
$share->setNodeType($data['item_type']);
|
|
|
|
|
|
|
|
$share->setProviderId($this->identifier());
|
|
|
|
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the node with file $id for $user
|
|
|
|
*
|
|
|
|
* @param string $userId
|
|
|
|
* @param int $id
|
|
|
|
* @return \OCP\Files\File|\OCP\Files\Folder
|
|
|
|
* @throws InvalidShare
|
|
|
|
*/
|
|
|
|
private function getNode($userId, $id) {
|
|
|
|
try {
|
|
|
|
$userFolder = $this->rootFolder->getUserFolder($userId);
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
throw new InvalidShare();
|
|
|
|
}
|
|
|
|
|
|
|
|
$nodes = $userFolder->getById($id);
|
|
|
|
|
|
|
|
if (empty($nodes)) {
|
|
|
|
throw new InvalidShare();
|
|
|
|
}
|
|
|
|
|
|
|
|
return $nodes[0];
|
|
|
|
}
|
|
|
|
|
2016-04-04 13:28:19 +03:00
|
|
|
/**
|
|
|
|
* A user is deleted from the system
|
|
|
|
* So clean up the relevant shares.
|
|
|
|
*
|
|
|
|
* @param string $uid
|
|
|
|
* @param int $shareType
|
|
|
|
*/
|
|
|
|
public function userDeleted($uid, $shareType) {
|
|
|
|
//TODO: probabaly a good idea to send unshare info to remote servers
|
|
|
|
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
|
|
|
|
$qb->delete('share')
|
|
|
|
->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_REMOTE)))
|
|
|
|
->andWhere($qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid)))
|
|
|
|
->execute();
|
|
|
|
}
|
2016-04-12 10:46:25 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* This provider does not handle groups
|
|
|
|
*
|
|
|
|
* @param string $gid
|
|
|
|
*/
|
|
|
|
public function groupDeleted($gid) {
|
|
|
|
// We don't handle groups here
|
|
|
|
}
|
2016-04-13 16:00:12 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* This provider does not handle groups
|
|
|
|
*
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $gid
|
|
|
|
*/
|
|
|
|
public function userDeletedFromGroup($uid, $gid) {
|
|
|
|
// We don't handle groups here
|
|
|
|
}
|
2016-04-18 19:17:08 +03:00
|
|
|
|
|
|
|
/**
|
2016-06-20 13:08:23 +03:00
|
|
|
* check if users from other Nextcloud instances are allowed to mount public links share by this instance
|
2016-04-18 19:17:08 +03:00
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isOutgoingServer2serverShareEnabled() {
|
2017-05-24 10:07:58 +03:00
|
|
|
if ($this->gsConfig->onlyInternalFederation()) {
|
|
|
|
return false;
|
|
|
|
}
|
2016-04-18 19:17:08 +03:00
|
|
|
$result = $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes');
|
2017-04-10 10:44:23 +03:00
|
|
|
return ($result === 'yes');
|
2016-04-18 19:17:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-04-12 07:16:27 +03:00
|
|
|
* check if users are allowed to mount public links from other Nextclouds
|
2016-04-18 19:17:08 +03:00
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isIncomingServer2serverShareEnabled() {
|
2017-05-24 10:07:58 +03:00
|
|
|
if ($this->gsConfig->onlyInternalFederation()) {
|
|
|
|
return false;
|
|
|
|
}
|
2016-04-18 19:17:08 +03:00
|
|
|
$result = $this->config->getAppValue('files_sharing', 'incoming_server2server_share_enabled', 'yes');
|
2017-04-10 10:44:23 +03:00
|
|
|
return ($result === 'yes');
|
2016-04-18 19:17:08 +03:00
|
|
|
}
|
2016-11-18 19:39:08 +03:00
|
|
|
|
2018-06-25 12:40:16 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if users from other Nextcloud instances are allowed to send federated group shares
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isOutgoingServer2serverGroupShareEnabled() {
|
|
|
|
if ($this->gsConfig->onlyInternalFederation()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$result = $this->config->getAppValue('files_sharing', 'outgoing_server2server_group_share_enabled', 'no');
|
|
|
|
return ($result === 'yes');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* check if users are allowed to receive federated group shares
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isIncomingServer2serverGroupShareEnabled() {
|
|
|
|
if ($this->gsConfig->onlyInternalFederation()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$result = $this->config->getAppValue('files_sharing', 'incoming_server2server_group_share_enabled', 'no');
|
|
|
|
return ($result === 'yes');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* check if federated group sharing is supported, therefore the OCM API need to be enabled
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isFederatedGroupSharingSupported() {
|
|
|
|
return $this->cloudFederationProviderManager->isReady();
|
|
|
|
}
|
|
|
|
|
2016-11-18 19:39:08 +03:00
|
|
|
/**
|
|
|
|
* Check if querying sharees on the lookup server is enabled
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isLookupServerQueriesEnabled() {
|
2017-05-24 10:07:58 +03:00
|
|
|
// in a global scale setup we should always query the lookup server
|
|
|
|
if ($this->gsConfig->isGlobalScaleEnabled()) {
|
|
|
|
return true;
|
|
|
|
}
|
2016-11-18 19:39:08 +03:00
|
|
|
$result = $this->config->getAppValue('files_sharing', 'lookupServerEnabled', 'no');
|
2017-04-10 10:44:23 +03:00
|
|
|
return ($result === 'yes');
|
2016-11-18 19:39:08 +03:00
|
|
|
}
|
2017-04-07 12:42:33 +03:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if it is allowed to publish user specific data to the lookup server
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function isLookupServerUploadEnabled() {
|
2017-05-24 10:07:58 +03:00
|
|
|
// in a global scale setup the admin is responsible to keep the lookup server up-to-date
|
|
|
|
if ($this->gsConfig->isGlobalScaleEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
2017-04-07 12:42:33 +03:00
|
|
|
$result = $this->config->getAppValue('files_sharing', 'lookupServerUploadEnabled', 'yes');
|
2017-04-10 10:44:23 +03:00
|
|
|
return ($result === 'yes');
|
2017-04-07 12:42:33 +03:00
|
|
|
}
|
2016-12-22 23:44:21 +03:00
|
|
|
|
2017-04-11 13:40:36 +03:00
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
2016-12-22 23:44:21 +03:00
|
|
|
public function getAccessList($nodes, $currentAccess) {
|
|
|
|
$ids = [];
|
|
|
|
foreach ($nodes as $node) {
|
|
|
|
$ids[] = $node->getId();
|
|
|
|
}
|
|
|
|
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
2017-03-28 18:06:26 +03:00
|
|
|
$qb->select('share_with', 'token', 'file_source')
|
2016-12-22 23:44:21 +03:00
|
|
|
->from('share')
|
|
|
|
->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_REMOTE)))
|
|
|
|
->andWhere($qb->expr()->in('file_source', $qb->createNamedParameter($ids, IQueryBuilder::PARAM_INT_ARRAY)))
|
|
|
|
->andWhere($qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
|
|
|
|
$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
|
2017-03-27 17:06:31 +03:00
|
|
|
));
|
2016-12-22 23:44:21 +03:00
|
|
|
$cursor = $qb->execute();
|
|
|
|
|
2017-04-11 13:40:36 +03:00
|
|
|
if ($currentAccess === false) {
|
|
|
|
$remote = $cursor->fetch() !== false;
|
|
|
|
$cursor->closeCursor();
|
|
|
|
|
|
|
|
return ['remote' => $remote];
|
|
|
|
}
|
|
|
|
|
2017-03-27 17:06:31 +03:00
|
|
|
$remote = [];
|
|
|
|
while ($row = $cursor->fetch()) {
|
|
|
|
$remote[$row['share_with']] = [
|
|
|
|
'node_id' => $row['file_source'],
|
2017-03-28 11:51:44 +03:00
|
|
|
'token' => $row['token'],
|
2017-03-27 17:06:31 +03:00
|
|
|
];
|
|
|
|
}
|
2016-12-22 23:44:21 +03:00
|
|
|
$cursor->closeCursor();
|
|
|
|
|
2017-01-04 10:59:43 +03:00
|
|
|
return ['remote' => $remote];
|
2016-12-22 23:44:21 +03:00
|
|
|
}
|
2019-10-29 18:56:06 +03:00
|
|
|
|
|
|
|
public function getAllShares(): iterable {
|
|
|
|
$qb = $this->dbConnection->getQueryBuilder();
|
|
|
|
|
|
|
|
$qb->select('*')
|
|
|
|
->from('share')
|
|
|
|
->where(
|
|
|
|
$qb->expr()->orX(
|
|
|
|
$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share\IShare::TYPE_REMOTE)),
|
|
|
|
$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share\IShare::TYPE_REMOTE_GROUP))
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
$cursor = $qb->execute();
|
|
|
|
while($data = $cursor->fetch()) {
|
|
|
|
try {
|
|
|
|
$share = $this->createShareObject($data);
|
|
|
|
} catch (InvalidShare $e) {
|
|
|
|
continue;
|
|
|
|
} catch (ShareNotFound $e) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
yield $share;
|
|
|
|
}
|
|
|
|
$cursor->closeCursor();
|
|
|
|
}
|
2016-02-04 11:59:52 +03:00
|
|
|
}
|