2015-03-09 18:20:18 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Daniel Calviño Sánchez <danxuliu@gmail.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
|
|
|
* @author Maxence Lange <maxence@nextcloud.com>
|
2015-06-25 12:43:55 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2015-06-25 12:43:55 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-06-25 12:43:55 +03:00
|
|
|
*
|
2015-03-09 18:20:18 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Files_Sharing;
|
|
|
|
|
2018-08-16 22:05:01 +03:00
|
|
|
use OC\Cache\CappedMemoryCache;
|
2018-08-16 21:10:45 +03:00
|
|
|
use OC\Files\View;
|
2015-03-09 18:20:18 +03:00
|
|
|
use OCP\Files\Config\IMountProvider;
|
|
|
|
use OCP\Files\Storage\IStorageFactory;
|
|
|
|
use OCP\IConfig;
|
2016-06-20 23:11:05 +03:00
|
|
|
use OCP\ILogger;
|
2015-03-09 18:20:18 +03:00
|
|
|
use OCP\IUser;
|
2016-04-15 10:01:10 +03:00
|
|
|
use OCP\Share\IManager;
|
2019-08-21 17:15:23 +03:00
|
|
|
use OCP\Share\IShare;
|
2015-03-09 18:20:18 +03:00
|
|
|
|
|
|
|
class MountProvider implements IMountProvider {
|
|
|
|
/**
|
|
|
|
* @var \OCP\IConfig
|
|
|
|
*/
|
|
|
|
protected $config;
|
|
|
|
|
2016-04-15 10:01:10 +03:00
|
|
|
/**
|
|
|
|
* @var IManager
|
|
|
|
*/
|
|
|
|
protected $shareManager;
|
|
|
|
|
2016-06-20 23:11:05 +03:00
|
|
|
/**
|
|
|
|
* @var ILogger
|
|
|
|
*/
|
|
|
|
protected $logger;
|
|
|
|
|
2015-03-09 18:20:18 +03:00
|
|
|
/**
|
|
|
|
* @param \OCP\IConfig $config
|
2016-04-15 10:01:10 +03:00
|
|
|
* @param IManager $shareManager
|
2016-06-20 23:11:05 +03:00
|
|
|
* @param ILogger $logger
|
2015-03-09 18:20:18 +03:00
|
|
|
*/
|
2016-06-20 23:11:05 +03:00
|
|
|
public function __construct(IConfig $config, IManager $shareManager, ILogger $logger) {
|
2015-03-09 18:20:18 +03:00
|
|
|
$this->config = $config;
|
2016-04-15 10:01:10 +03:00
|
|
|
$this->shareManager = $shareManager;
|
2016-06-20 23:11:05 +03:00
|
|
|
$this->logger = $logger;
|
2015-03-09 18:20:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-04-20 14:32:09 +03:00
|
|
|
* Get all mountpoints applicable for the user and check for shares where we need to update the etags
|
2015-03-09 18:20:18 +03:00
|
|
|
*
|
|
|
|
* @param \OCP\IUser $user
|
2020-08-19 18:54:00 +03:00
|
|
|
* @param \OCP\Files\Storage\IStorageFactory $loader
|
2015-03-09 18:20:18 +03:00
|
|
|
* @return \OCP\Files\Mount\IMountPoint[]
|
|
|
|
*/
|
2020-08-19 18:54:00 +03:00
|
|
|
public function getMountsForUser(IUser $user, IStorageFactory $loader) {
|
2020-06-24 17:49:16 +03:00
|
|
|
$shares = $this->shareManager->getSharedWith($user->getUID(), IShare::TYPE_USER, null, -1);
|
|
|
|
$shares = array_merge($shares, $this->shareManager->getSharedWith($user->getUID(), IShare::TYPE_GROUP, null, -1));
|
|
|
|
$shares = array_merge($shares, $this->shareManager->getSharedWith($user->getUID(), IShare::TYPE_CIRCLE, null, -1));
|
|
|
|
$shares = array_merge($shares, $this->shareManager->getSharedWith($user->getUID(), IShare::TYPE_ROOM, null, -1));
|
2017-03-17 22:48:33 +03:00
|
|
|
|
2016-06-21 12:36:28 +03:00
|
|
|
// filter out excluded shares and group shares that includes self
|
|
|
|
$shares = array_filter($shares, function (\OCP\Share\IShare $share) use ($user) {
|
|
|
|
return $share->getPermissions() > 0 && $share->getShareOwner() !== $user->getUID();
|
2015-03-09 18:20:18 +03:00
|
|
|
});
|
2016-04-15 10:01:10 +03:00
|
|
|
|
2016-07-22 16:30:13 +03:00
|
|
|
$superShares = $this->buildSuperShares($shares, $user);
|
2016-04-15 10:01:10 +03:00
|
|
|
|
2016-06-15 10:47:33 +03:00
|
|
|
$mounts = [];
|
2018-08-16 21:10:45 +03:00
|
|
|
$view = new View('/' . $user->getUID() . '/files');
|
|
|
|
$ownerViews = [];
|
2018-08-16 21:24:02 +03:00
|
|
|
$sharingDisabledForUser = $this->shareManager->sharingDisabledForUser($user->getUID());
|
2018-08-16 22:05:01 +03:00
|
|
|
$foldersExistCache = new CappedMemoryCache();
|
2016-06-15 10:47:33 +03:00
|
|
|
foreach ($superShares as $share) {
|
2016-06-20 23:11:05 +03:00
|
|
|
try {
|
2018-08-16 21:10:45 +03:00
|
|
|
/** @var \OCP\Share\IShare $parentShare */
|
|
|
|
$parentShare = $share[0];
|
2019-08-21 17:15:23 +03:00
|
|
|
|
2019-10-31 14:02:09 +03:00
|
|
|
if ($parentShare->getStatus() !== IShare::STATUS_ACCEPTED &&
|
|
|
|
($parentShare->getShareType() === IShare::TYPE_GROUP ||
|
|
|
|
$parentShare->getShareType() === IShare::TYPE_USERGROUP ||
|
|
|
|
$parentShare->getShareType() === IShare::TYPE_USER)) {
|
2019-08-21 17:15:23 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-08-16 21:10:45 +03:00
|
|
|
$owner = $parentShare->getShareOwner();
|
|
|
|
if (!isset($ownerViews[$owner])) {
|
|
|
|
$ownerViews[$owner] = new View('/' . $parentShare->getShareOwner() . '/files');
|
|
|
|
}
|
2018-08-16 20:16:24 +03:00
|
|
|
$mount = new SharedMount(
|
2016-06-01 15:29:31 +03:00
|
|
|
'\OCA\Files_Sharing\SharedStorage',
|
2016-06-20 23:11:05 +03:00
|
|
|
$mounts,
|
|
|
|
[
|
|
|
|
'user' => $user->getUID(),
|
2016-07-11 20:43:46 +03:00
|
|
|
// parent share
|
2018-08-16 21:10:45 +03:00
|
|
|
'superShare' => $parentShare,
|
2016-07-11 20:43:46 +03:00
|
|
|
// children/component of the superShare
|
2016-06-15 10:47:33 +03:00
|
|
|
'groupedShares' => $share[1],
|
2018-08-16 21:24:02 +03:00
|
|
|
'ownerView' => $ownerViews[$owner],
|
|
|
|
'sharingDisabledForUser' => $sharingDisabledForUser
|
2016-06-20 23:11:05 +03:00
|
|
|
],
|
2020-08-19 18:54:00 +03:00
|
|
|
$loader,
|
2018-08-16 22:05:01 +03:00
|
|
|
$view,
|
|
|
|
$foldersExistCache
|
2016-06-20 23:11:05 +03:00
|
|
|
);
|
2018-08-16 20:16:24 +03:00
|
|
|
$mounts[$mount->getMountPoint()] = $mount;
|
2016-06-20 23:11:05 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
$this->logger->logException($e);
|
|
|
|
$this->logger->error('Error while trying to create shared mount');
|
|
|
|
}
|
2016-04-14 12:50:27 +03:00
|
|
|
}
|
|
|
|
|
2015-06-23 18:09:00 +03:00
|
|
|
// array_filter removes the null values from the array
|
2018-08-16 20:16:24 +03:00
|
|
|
return array_values(array_filter($mounts));
|
2015-03-09 18:20:18 +03:00
|
|
|
}
|
2016-06-15 10:47:33 +03:00
|
|
|
|
|
|
|
/**
|
2016-07-11 20:43:46 +03:00
|
|
|
* Groups shares by path (nodeId) and target path
|
|
|
|
*
|
2016-06-15 10:47:33 +03:00
|
|
|
* @param \OCP\Share\IShare[] $shares
|
2016-07-11 20:43:46 +03:00
|
|
|
* @return \OCP\Share\IShare[][] array of grouped shares, each element in the
|
|
|
|
* array is a group which itself is an array of shares
|
2016-06-15 10:47:33 +03:00
|
|
|
*/
|
|
|
|
private function groupShares(array $shares) {
|
|
|
|
$tmp = [];
|
|
|
|
|
|
|
|
foreach ($shares as $share) {
|
|
|
|
if (!isset($tmp[$share->getNodeId()])) {
|
|
|
|
$tmp[$share->getNodeId()] = [];
|
|
|
|
}
|
2016-07-22 16:30:13 +03:00
|
|
|
$tmp[$share->getNodeId()][] = $share;
|
2016-06-15 10:47:33 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$result = [];
|
2016-07-22 16:30:13 +03:00
|
|
|
// sort by stime, the super share will be based on the least recent share
|
|
|
|
foreach ($tmp as &$tmp2) {
|
2020-04-09 14:53:40 +03:00
|
|
|
@usort($tmp2, function ($a, $b) {
|
2020-06-08 15:47:15 +03:00
|
|
|
$aTime = $a->getShareTime()->getTimestamp();
|
|
|
|
$bTime = $b->getShareTime()->getTimestamp();
|
|
|
|
if ($aTime === $bTime) {
|
|
|
|
return $a->getId() < $b->getId() ? -1 : 1;
|
2016-07-22 16:30:13 +03:00
|
|
|
}
|
2020-06-08 15:47:15 +03:00
|
|
|
return $aTime < $bTime ? -1 : 1;
|
2016-07-22 16:30:13 +03:00
|
|
|
});
|
|
|
|
$result[] = $tmp2;
|
2016-06-15 10:47:33 +03:00
|
|
|
}
|
|
|
|
|
2016-07-22 16:30:13 +03:00
|
|
|
return array_values($result);
|
2016-06-15 10:47:33 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-07-11 20:43:46 +03:00
|
|
|
* Build super shares (virtual share) by grouping them by node id and target,
|
|
|
|
* then for each group compute the super share and return it along with the matching
|
|
|
|
* grouped shares. The most permissive permissions are used based on the permissions
|
|
|
|
* of all shares within the group.
|
2016-06-15 10:47:33 +03:00
|
|
|
*
|
2016-07-11 20:43:46 +03:00
|
|
|
* @param \OCP\Share\IShare[] $allShares
|
2016-07-22 16:30:13 +03:00
|
|
|
* @param \OCP\IUser $user user
|
2016-06-15 10:47:33 +03:00
|
|
|
* @return array Tuple of [superShare, groupedShares]
|
|
|
|
*/
|
2016-07-22 16:30:13 +03:00
|
|
|
private function buildSuperShares(array $allShares, \OCP\IUser $user) {
|
2016-06-15 10:47:33 +03:00
|
|
|
$result = [];
|
|
|
|
|
2016-07-11 20:43:46 +03:00
|
|
|
$groupedShares = $this->groupShares($allShares);
|
|
|
|
|
2016-06-15 10:47:33 +03:00
|
|
|
/** @var \OCP\Share\IShare[] $shares */
|
|
|
|
foreach ($groupedShares as $shares) {
|
|
|
|
if (count($shares) === 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
$superShare = $this->shareManager->newShare();
|
|
|
|
|
2016-07-11 20:43:46 +03:00
|
|
|
// compute super share based on first entry of the group
|
2016-06-15 10:47:33 +03:00
|
|
|
$superShare->setId($shares[0]->getId())
|
|
|
|
->setShareOwner($shares[0]->getShareOwner())
|
|
|
|
->setNodeId($shares[0]->getNodeId())
|
2019-10-31 14:02:09 +03:00
|
|
|
->setShareType($shares[0]->getShareType())
|
2016-06-15 10:47:33 +03:00
|
|
|
->setTarget($shares[0]->getTarget());
|
|
|
|
|
2016-07-11 20:43:46 +03:00
|
|
|
// use most permissive permissions
|
2016-06-15 10:47:33 +03:00
|
|
|
$permissions = 0;
|
2019-08-21 17:15:23 +03:00
|
|
|
$status = IShare::STATUS_PENDING;
|
2016-06-15 10:47:33 +03:00
|
|
|
foreach ($shares as $share) {
|
|
|
|
$permissions |= $share->getPermissions();
|
2019-08-21 17:15:23 +03:00
|
|
|
$status = max($status, $share->getStatus());
|
|
|
|
|
2016-07-22 16:30:13 +03:00
|
|
|
if ($share->getTarget() !== $superShare->getTarget()) {
|
|
|
|
// adjust target, for database consistency
|
|
|
|
$share->setTarget($superShare->getTarget());
|
2017-01-19 17:02:46 +03:00
|
|
|
try {
|
|
|
|
$this->shareManager->moveShare($share, $user->getUID());
|
|
|
|
} catch (\InvalidArgumentException $e) {
|
|
|
|
// ignore as it is not important and we don't want to
|
|
|
|
// block FS setup
|
|
|
|
|
|
|
|
// the subsequent code anyway only uses the target of the
|
|
|
|
// super share
|
|
|
|
|
|
|
|
// such issue can usually happen when dealing with
|
|
|
|
// null groups which usually appear with group backend
|
|
|
|
// caching inconsistencies
|
2017-03-17 12:23:04 +03:00
|
|
|
$this->logger->debug(
|
2017-01-19 17:02:46 +03:00
|
|
|
'Could not adjust share target for share ' . $share->getId() . ' to make it consistent: ' . $e->getMessage(),
|
|
|
|
['app' => 'files_sharing']
|
|
|
|
);
|
|
|
|
}
|
2016-07-22 16:30:13 +03:00
|
|
|
}
|
2016-11-17 16:18:47 +03:00
|
|
|
if (!is_null($share->getNodeCacheEntry())) {
|
|
|
|
$superShare->setNodeCacheEntry($share->getNodeCacheEntry());
|
|
|
|
}
|
2016-06-15 10:47:33 +03:00
|
|
|
}
|
|
|
|
|
2019-08-21 17:15:23 +03:00
|
|
|
$superShare->setPermissions($permissions)
|
|
|
|
->setStatus($status);
|
2016-06-15 10:47:33 +03:00
|
|
|
|
|
|
|
$result[] = [$superShare, $shares];
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
2015-03-09 18:20:18 +03:00
|
|
|
}
|