2014-10-15 13:58:44 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Georg Ehrke <georg@owncloud.com>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Piotr Filiciak <piotr@filiciak.pl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-10-26 15:54:55 +03:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-10-15 13:58:44 +04:00
|
|
|
*
|
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-10-15 13:58:44 +04:00
|
|
|
namespace OCA\Files_Sharing\Controllers;
|
|
|
|
|
|
|
|
use OC_Files;
|
|
|
|
use OC_Util;
|
2016-04-18 19:17:08 +03:00
|
|
|
use OCA\FederatedFileSharing\FederatedShareProvider;
|
2014-10-15 13:58:44 +04:00
|
|
|
use OCP\Template;
|
|
|
|
use OCP\Share;
|
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\AppFramework\Http\TemplateResponse;
|
|
|
|
use OCP\AppFramework\Http\RedirectResponse;
|
2015-03-24 13:21:58 +03:00
|
|
|
use OCP\AppFramework\Http\NotFoundResponse;
|
2016-01-15 11:41:51 +03:00
|
|
|
use OCP\IURLGenerator;
|
|
|
|
use OCP\IConfig;
|
2014-10-15 13:58:44 +04:00
|
|
|
use OCP\ILogger;
|
2016-01-15 11:41:51 +03:00
|
|
|
use OCP\IUserManager;
|
|
|
|
use OCP\ISession;
|
|
|
|
use OCP\IPreview;
|
2014-10-15 13:58:44 +04:00
|
|
|
use OCP\Util;
|
2014-12-22 14:35:50 +03:00
|
|
|
use OCA\Files_Sharing\Activity;
|
2015-09-30 14:32:20 +03:00
|
|
|
use \OCP\Files\NotFoundException;
|
2016-01-15 13:49:50 +03:00
|
|
|
use OCP\Files\IRootFolder;
|
2016-02-02 16:07:11 +03:00
|
|
|
use OCP\Share\Exceptions\ShareNotFound;
|
2016-07-15 16:01:14 +03:00
|
|
|
use Symfony\Component\EventDispatcher\EventDispatcherInterface;
|
2014-10-15 13:58:44 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class ShareController
|
|
|
|
*
|
|
|
|
* @package OCA\Files_Sharing\Controllers
|
|
|
|
*/
|
|
|
|
class ShareController extends Controller {
|
|
|
|
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var IConfig */
|
2014-10-15 13:58:44 +04:00
|
|
|
protected $config;
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var IURLGenerator */
|
2014-10-15 13:58:44 +04:00
|
|
|
protected $urlGenerator;
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var IUserManager */
|
2014-10-15 13:58:44 +04:00
|
|
|
protected $userManager;
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var ILogger */
|
2014-10-15 13:58:44 +04:00
|
|
|
protected $logger;
|
2016-07-18 14:34:18 +03:00
|
|
|
/** @var \OCP\Activity\IManager */
|
2014-12-22 14:35:50 +03:00
|
|
|
protected $activityManager;
|
2016-07-18 14:34:18 +03:00
|
|
|
/** @var \OCP\Share\IManager */
|
2016-01-15 10:11:11 +03:00
|
|
|
protected $shareManager;
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var ISession */
|
2016-01-15 10:11:11 +03:00
|
|
|
protected $session;
|
2016-01-15 11:41:51 +03:00
|
|
|
/** @var IPreview */
|
2016-01-15 10:11:11 +03:00
|
|
|
protected $previewManager;
|
2016-01-15 13:49:50 +03:00
|
|
|
/** @var IRootFolder */
|
|
|
|
protected $rootFolder;
|
2016-04-18 19:17:08 +03:00
|
|
|
/** @var FederatedShareProvider */
|
|
|
|
protected $federatedShareProvider;
|
2016-07-15 16:01:14 +03:00
|
|
|
/** @var EventDispatcherInterface */
|
|
|
|
protected $eventDispatcher;
|
2014-10-15 13:58:44 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
2016-01-15 11:41:51 +03:00
|
|
|
* @param IConfig $config
|
|
|
|
* @param IURLGenerator $urlGenerator
|
|
|
|
* @param IUserManager $userManager
|
2014-10-15 13:58:44 +04:00
|
|
|
* @param ILogger $logger
|
2016-07-18 14:34:18 +03:00
|
|
|
* @param \OCP\Activity\IManager $activityManager
|
2016-02-09 12:36:44 +03:00
|
|
|
* @param \OCP\Share\IManager $shareManager
|
2016-01-15 11:41:51 +03:00
|
|
|
* @param ISession $session
|
|
|
|
* @param IPreview $previewManager
|
2016-01-20 12:14:03 +03:00
|
|
|
* @param IRootFolder $rootFolder
|
2016-04-18 19:17:08 +03:00
|
|
|
* @param FederatedShareProvider $federatedShareProvider
|
2016-07-15 16:01:14 +03:00
|
|
|
* @param EventDispatcherInterface $eventDispatcher
|
2014-10-15 13:58:44 +04:00
|
|
|
*/
|
|
|
|
public function __construct($appName,
|
|
|
|
IRequest $request,
|
2016-01-15 11:41:51 +03:00
|
|
|
IConfig $config,
|
|
|
|
IURLGenerator $urlGenerator,
|
|
|
|
IUserManager $userManager,
|
2014-12-22 14:35:50 +03:00
|
|
|
ILogger $logger,
|
2016-01-15 11:41:51 +03:00
|
|
|
\OCP\Activity\IManager $activityManager,
|
2016-02-09 12:36:44 +03:00
|
|
|
\OCP\Share\IManager $shareManager,
|
2016-01-15 11:41:51 +03:00
|
|
|
ISession $session,
|
2016-01-15 13:49:50 +03:00
|
|
|
IPreview $previewManager,
|
2016-04-18 19:17:08 +03:00
|
|
|
IRootFolder $rootFolder,
|
2016-07-15 16:01:14 +03:00
|
|
|
FederatedShareProvider $federatedShareProvider,
|
|
|
|
EventDispatcherInterface $eventDispatcher) {
|
2014-10-15 13:58:44 +04:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
|
|
|
|
$this->config = $config;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
|
|
|
$this->userManager = $userManager;
|
|
|
|
$this->logger = $logger;
|
2014-12-22 14:35:50 +03:00
|
|
|
$this->activityManager = $activityManager;
|
2016-01-15 10:11:11 +03:00
|
|
|
$this->shareManager = $shareManager;
|
|
|
|
$this->session = $session;
|
|
|
|
$this->previewManager = $previewManager;
|
2016-01-15 13:49:50 +03:00
|
|
|
$this->rootFolder = $rootFolder;
|
2016-04-18 19:17:08 +03:00
|
|
|
$this->federatedShareProvider = $federatedShareProvider;
|
2016-07-15 16:01:14 +03:00
|
|
|
$this->eventDispatcher = $eventDispatcher;
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @return TemplateResponse|RedirectResponse
|
|
|
|
*/
|
|
|
|
public function showAuthenticate($token) {
|
2016-01-15 10:11:11 +03:00
|
|
|
$share = $this->shareManager->getShareByToken($token);
|
2014-10-15 13:58:44 +04:00
|
|
|
|
2016-01-15 10:11:11 +03:00
|
|
|
if($this->linkShareAuth($share)) {
|
2014-10-15 13:58:44 +04:00
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('files_sharing.sharecontroller.showShare', array('token' => $token)));
|
|
|
|
}
|
|
|
|
|
|
|
|
return new TemplateResponse($this->appName, 'authenticate', array(), 'guest');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @PublicPage
|
2014-11-17 15:10:15 +03:00
|
|
|
* @UseSession
|
2014-10-15 13:58:44 +04:00
|
|
|
*
|
|
|
|
* Authenticates against password-protected shares
|
2015-12-07 15:05:27 +03:00
|
|
|
* @param string $token
|
2014-10-15 13:58:44 +04:00
|
|
|
* @param string $password
|
2016-07-18 14:34:18 +03:00
|
|
|
* @return RedirectResponse|TemplateResponse|NotFoundResponse
|
2014-10-15 13:58:44 +04:00
|
|
|
*/
|
|
|
|
public function authenticate($token, $password = '') {
|
2016-01-15 10:11:11 +03:00
|
|
|
|
|
|
|
// Check whether share exists
|
|
|
|
try {
|
|
|
|
$share = $this->shareManager->getShareByToken($token);
|
2016-02-02 16:07:11 +03:00
|
|
|
} catch (ShareNotFound $e) {
|
2015-03-24 13:21:58 +03:00
|
|
|
return new NotFoundResponse();
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
2016-01-15 10:11:11 +03:00
|
|
|
$authenticate = $this->linkShareAuth($share, $password);
|
2014-10-15 13:58:44 +04:00
|
|
|
|
|
|
|
if($authenticate === true) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('files_sharing.sharecontroller.showShare', array('token' => $token)));
|
|
|
|
}
|
|
|
|
|
|
|
|
return new TemplateResponse($this->appName, 'authenticate', array('wrongpw' => true), 'guest');
|
|
|
|
}
|
|
|
|
|
2016-01-15 10:11:11 +03:00
|
|
|
/**
|
|
|
|
* Authenticate a link item with the given password.
|
|
|
|
* Or use the session if no password is provided.
|
|
|
|
*
|
|
|
|
* This is a modified version of Helper::authenticate
|
|
|
|
* TODO: Try to merge back eventually with Helper::authenticate
|
|
|
|
*
|
2016-01-27 14:13:53 +03:00
|
|
|
* @param \OCP\Share\IShare $share
|
2016-01-15 10:11:11 +03:00
|
|
|
* @param string|null $password
|
|
|
|
* @return bool
|
|
|
|
*/
|
2016-01-27 14:13:53 +03:00
|
|
|
private function linkShareAuth(\OCP\Share\IShare $share, $password = null) {
|
2016-01-15 10:11:11 +03:00
|
|
|
if ($password !== null) {
|
|
|
|
if ($this->shareManager->checkPassword($share, $password)) {
|
|
|
|
$this->session->set('public_link_authenticated', (string)$share->getId());
|
|
|
|
} else {
|
2016-02-09 02:34:10 +03:00
|
|
|
$this->emitAccessShareHook($share, 403, 'Wrong password');
|
2016-01-15 10:11:11 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// not authenticated ?
|
|
|
|
if ( ! $this->session->exists('public_link_authenticated')
|
|
|
|
|| $this->session->get('public_link_authenticated') !== (string)$share->getId()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-02-09 02:34:10 +03:00
|
|
|
/**
|
|
|
|
* throws hooks when a share is attempted to be accessed
|
|
|
|
*
|
2016-02-09 12:36:44 +03:00
|
|
|
* @param \OCP\Share\IShare|string $share the Share instance if available,
|
2016-02-09 02:34:10 +03:00
|
|
|
* otherwise token
|
|
|
|
* @param int $errorCode
|
|
|
|
* @param string $errorMessage
|
2016-07-18 14:34:18 +03:00
|
|
|
* @throws \OC\HintException
|
|
|
|
* @throws \OC\ServerNotAvailableException
|
2016-02-09 02:34:10 +03:00
|
|
|
*/
|
|
|
|
protected function emitAccessShareHook($share, $errorCode = 200, $errorMessage = '') {
|
|
|
|
$itemType = $itemSource = $uidOwner = '';
|
|
|
|
$token = $share;
|
|
|
|
$exception = null;
|
2016-02-09 12:36:44 +03:00
|
|
|
if($share instanceof \OCP\Share\IShare) {
|
2016-02-09 02:34:10 +03:00
|
|
|
try {
|
|
|
|
$token = $share->getToken();
|
|
|
|
$uidOwner = $share->getSharedBy();
|
2016-02-09 12:36:44 +03:00
|
|
|
$itemType = $share->getNodeType();
|
|
|
|
$itemSource = $share->getNodeId();
|
2016-02-09 02:34:10 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
// we log what we know and pass on the exception afterwards
|
|
|
|
$exception = $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
\OC_Hook::emit('OCP\Share', 'share_link_access', [
|
|
|
|
'itemType' => $itemType,
|
|
|
|
'itemSource' => $itemSource,
|
|
|
|
'uidOwner' => $uidOwner,
|
|
|
|
'token' => $token,
|
|
|
|
'errorCode' => $errorCode,
|
|
|
|
'errorMessage' => $errorMessage,
|
|
|
|
]);
|
|
|
|
if(!is_null($exception)) {
|
|
|
|
throw $exception;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-09 15:00:08 +03:00
|
|
|
/**
|
|
|
|
* Validate the permissions of the share
|
|
|
|
*
|
|
|
|
* @param Share\IShare $share
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function validateShare(\OCP\Share\IShare $share) {
|
|
|
|
return $share->getNode()->isReadable() && $share->getNode()->isShareable();
|
|
|
|
}
|
|
|
|
|
2014-10-15 13:58:44 +04:00
|
|
|
/**
|
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $path
|
2016-07-18 14:34:18 +03:00
|
|
|
* @return TemplateResponse|RedirectResponse|NotFoundResponse
|
2015-09-30 14:32:20 +03:00
|
|
|
* @throws NotFoundException
|
2016-06-08 16:38:11 +03:00
|
|
|
* @throws \Exception
|
2014-10-15 13:58:44 +04:00
|
|
|
*/
|
|
|
|
public function showShare($token, $path = '') {
|
|
|
|
\OC_User::setIncognitoMode(true);
|
|
|
|
|
|
|
|
// Check whether share exists
|
2016-01-15 10:11:11 +03:00
|
|
|
try {
|
|
|
|
$share = $this->shareManager->getShareByToken($token);
|
2016-02-02 16:07:11 +03:00
|
|
|
} catch (ShareNotFound $e) {
|
2016-02-09 02:34:10 +03:00
|
|
|
$this->emitAccessShareHook($token, 404, 'Share not found');
|
2015-03-24 13:21:58 +03:00
|
|
|
return new NotFoundResponse();
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Share is password protected - check whether the user is permitted to access the share
|
2016-01-15 10:11:11 +03:00
|
|
|
if ($share->getPassword() !== null && !$this->linkShareAuth($share)) {
|
2014-10-15 13:58:44 +04:00
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('files_sharing.sharecontroller.authenticate',
|
|
|
|
array('token' => $token)));
|
|
|
|
}
|
|
|
|
|
2016-02-09 15:00:08 +03:00
|
|
|
if (!$this->validateShare($share)) {
|
|
|
|
throw new NotFoundException();
|
|
|
|
}
|
2016-01-15 10:11:11 +03:00
|
|
|
// We can't get the path of a file share
|
2016-02-09 02:34:10 +03:00
|
|
|
try {
|
|
|
|
if ($share->getNode() instanceof \OCP\Files\File && $path !== '') {
|
|
|
|
$this->emitAccessShareHook($share, 404, 'Share not found');
|
|
|
|
throw new NotFoundException();
|
|
|
|
}
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
$this->emitAccessShareHook($share, 404, 'Share not found');
|
|
|
|
throw $e;
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
2015-03-24 13:21:58 +03:00
|
|
|
$shareTmpl = [];
|
2016-02-03 10:25:57 +03:00
|
|
|
$shareTmpl['displayName'] = $this->userManager->get($share->getShareOwner())->getDisplayName();
|
|
|
|
$shareTmpl['owner'] = $share->getShareOwner();
|
2016-01-27 22:51:26 +03:00
|
|
|
$shareTmpl['filename'] = $share->getNode()->getName();
|
2016-01-15 10:11:11 +03:00
|
|
|
$shareTmpl['directory_path'] = $share->getTarget();
|
2016-01-27 22:51:26 +03:00
|
|
|
$shareTmpl['mimetype'] = $share->getNode()->getMimetype();
|
|
|
|
$shareTmpl['previewSupported'] = $this->previewManager->isMimeSupported($share->getNode()->getMimetype());
|
2016-01-15 10:11:11 +03:00
|
|
|
$shareTmpl['dirToken'] = $token;
|
2014-10-15 13:58:44 +04:00
|
|
|
$shareTmpl['sharingToken'] = $token;
|
2016-04-18 19:17:08 +03:00
|
|
|
$shareTmpl['server2serversharing'] = $this->federatedShareProvider->isOutgoingServer2serverShareEnabled();
|
2016-01-15 10:11:11 +03:00
|
|
|
$shareTmpl['protected'] = $share->getPassword() !== null ? 'true' : 'false';
|
2014-11-18 16:54:08 +03:00
|
|
|
$shareTmpl['dir'] = '';
|
2016-01-27 22:51:26 +03:00
|
|
|
$shareTmpl['nonHumanFileSize'] = $share->getNode()->getSize();
|
|
|
|
$shareTmpl['fileSize'] = \OCP\Util::humanFileSize($share->getNode()->getSize());
|
2014-10-15 13:58:44 +04:00
|
|
|
|
|
|
|
// Show file list
|
2016-06-07 13:28:02 +03:00
|
|
|
$hideFileList = false;
|
2016-01-27 22:51:26 +03:00
|
|
|
if ($share->getNode() instanceof \OCP\Files\Folder) {
|
2016-07-06 00:35:32 +03:00
|
|
|
/** @var \OCP\Files\Folder $rootFolder */
|
|
|
|
$rootFolder = $share->getNode();
|
|
|
|
|
|
|
|
try {
|
|
|
|
$folderNode = $rootFolder->get($path);
|
|
|
|
} catch (\OCP\Files\NotFoundException $e) {
|
|
|
|
$this->emitAccessShareHook($share, 404, 'Share not found');
|
|
|
|
throw new NotFoundException();
|
|
|
|
}
|
|
|
|
|
2016-07-06 00:15:41 +03:00
|
|
|
$shareTmpl['dir'] = $rootFolder->getRelativePath($folderNode->getPath());
|
2016-01-19 12:17:29 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The OC_Util methods require a view. This just uses the node API
|
|
|
|
*/
|
2016-01-27 22:51:26 +03:00
|
|
|
$freeSpace = $share->getNode()->getStorage()->free_space($share->getNode()->getInternalPath());
|
2016-06-02 16:27:16 +03:00
|
|
|
if ($freeSpace < \OCP\Files\FileInfo::SPACE_UNLIMITED) {
|
2016-01-19 12:17:29 +03:00
|
|
|
$freeSpace = max($freeSpace, 0);
|
|
|
|
} else {
|
|
|
|
$freeSpace = (INF > 0) ? INF: PHP_INT_MAX; // work around https://bugs.php.net/bug.php?id=69188
|
|
|
|
}
|
|
|
|
|
2014-10-15 13:58:44 +04:00
|
|
|
$uploadLimit = Util::uploadLimit();
|
2016-01-19 12:17:29 +03:00
|
|
|
$maxUploadFilesize = min($freeSpace, $uploadLimit);
|
2016-06-07 13:28:02 +03:00
|
|
|
$hideFileList = $share->getPermissions() & \OCP\Constants::PERMISSION_READ ? false : true;
|
2016-01-19 12:17:29 +03:00
|
|
|
|
2014-10-15 13:58:44 +04:00
|
|
|
$folder = new Template('files', 'list', '');
|
2016-07-06 00:15:41 +03:00
|
|
|
$folder->assign('dir', $rootFolder->getRelativePath($folderNode->getPath()));
|
2016-01-15 10:11:11 +03:00
|
|
|
$folder->assign('dirToken', $token);
|
2014-11-25 18:28:41 +03:00
|
|
|
$folder->assign('permissions', \OCP\Constants::PERMISSION_READ);
|
2014-10-15 13:58:44 +04:00
|
|
|
$folder->assign('isPublic', true);
|
2016-06-07 13:28:02 +03:00
|
|
|
$folder->assign('hideFileList', $hideFileList);
|
2014-10-15 13:58:44 +04:00
|
|
|
$folder->assign('publicUploadEnabled', 'no');
|
|
|
|
$folder->assign('uploadMaxFilesize', $maxUploadFilesize);
|
2016-07-18 14:34:18 +03:00
|
|
|
$folder->assign('uploadMaxHumanFilesize', \OCP\Util::humanFileSize($maxUploadFilesize));
|
2014-10-15 13:58:44 +04:00
|
|
|
$folder->assign('freeSpace', $freeSpace);
|
|
|
|
$folder->assign('uploadLimit', $uploadLimit); // PHP upload limit
|
|
|
|
$folder->assign('usedSpacePercent', 0);
|
|
|
|
$folder->assign('trash', false);
|
|
|
|
$shareTmpl['folder'] = $folder->fetchPage();
|
|
|
|
}
|
|
|
|
|
2016-06-07 13:28:02 +03:00
|
|
|
$shareTmpl['hideFileList'] = $hideFileList;
|
|
|
|
$shareTmpl['shareOwner'] = $this->userManager->get($share->getShareOwner())->getDisplayName();
|
2014-10-15 13:58:44 +04:00
|
|
|
$shareTmpl['downloadURL'] = $this->urlGenerator->linkToRouteAbsolute('files_sharing.sharecontroller.downloadShare', array('token' => $token));
|
2015-01-17 14:11:52 +03:00
|
|
|
$shareTmpl['maxSizeAnimateGif'] = $this->config->getSystemValue('max_filesize_animated_gifs_public_sharing', 10);
|
2015-06-09 17:33:26 +03:00
|
|
|
$shareTmpl['previewEnabled'] = $this->config->getSystemValue('enable_previews', true);
|
2016-05-24 13:34:37 +03:00
|
|
|
$shareTmpl['previewMaxX'] = $this->config->getSystemValue('preview_max_x', 1024);
|
|
|
|
$shareTmpl['previewMaxY'] = $this->config->getSystemValue('preview_max_y', 1024);
|
2014-10-15 13:58:44 +04:00
|
|
|
|
2016-07-15 15:39:57 +03:00
|
|
|
// Load files we need
|
2016-07-18 14:34:18 +03:00
|
|
|
\OCP\Util::addScript('files', 'file-upload');
|
|
|
|
\OCP\Util::addStyle('files_sharing', 'public');
|
|
|
|
\OCP\Util::addStyle('files_sharing', 'mobile');
|
|
|
|
\OCP\Util::addScript('files_sharing', 'public');
|
|
|
|
\OCP\Util::addScript('files', 'fileactions');
|
|
|
|
\OCP\Util::addScript('files', 'fileactionsmenu');
|
|
|
|
\OCP\Util::addScript('files', 'jquery.fileupload');
|
|
|
|
\OCP\Util::addScript('files_sharing', 'files_drop');
|
2016-07-15 15:39:57 +03:00
|
|
|
|
|
|
|
if (isset($shareTmpl['folder'])) {
|
|
|
|
// JS required for folders
|
2016-07-18 14:34:18 +03:00
|
|
|
\OCP\Util::addStyle('files', 'files');
|
|
|
|
\OCP\Util::addStyle('files', 'upload');
|
|
|
|
\OCP\Util::addScript('files', 'filesummary');
|
|
|
|
\OCP\Util::addScript('files', 'breadcrumb');
|
|
|
|
\OCP\Util::addScript('files', 'fileinfomodel');
|
|
|
|
\OCP\Util::addScript('files', 'newfilemenu');
|
|
|
|
\OCP\Util::addScript('files', 'files');
|
|
|
|
\OCP\Util::addScript('files', 'filelist');
|
|
|
|
\OCP\Util::addScript('files', 'keyboardshortcuts');
|
2016-07-15 15:39:57 +03:00
|
|
|
}
|
|
|
|
|
2016-07-15 16:01:14 +03:00
|
|
|
$this->eventDispatcher->dispatch('OCA\Files_Sharing::loadAdditionalScripts');
|
|
|
|
|
2016-07-18 14:34:18 +03:00
|
|
|
$csp = new \OCP\AppFramework\Http\ContentSecurityPolicy();
|
2015-03-10 12:06:15 +03:00
|
|
|
$csp->addAllowedFrameDomain('\'self\'');
|
|
|
|
$response = new TemplateResponse($this->appName, 'public', $shareTmpl, 'base');
|
|
|
|
$response->setContentSecurityPolicy($csp);
|
|
|
|
|
2016-02-09 02:34:10 +03:00
|
|
|
$this->emitAccessShareHook($share);
|
|
|
|
|
2015-03-10 12:06:15 +03:00
|
|
|
return $response;
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
2014-11-24 17:02:49 +03:00
|
|
|
*
|
2014-10-15 13:58:44 +04:00
|
|
|
* @param string $token
|
|
|
|
* @param string $files
|
|
|
|
* @param string $path
|
2015-10-08 12:21:17 +03:00
|
|
|
* @param string $downloadStartSecret
|
2016-07-18 14:34:18 +03:00
|
|
|
* @return void|\OCP\AppFramework\Http\Response
|
2016-06-08 16:38:11 +03:00
|
|
|
* @throws NotFoundException
|
2014-10-15 13:58:44 +04:00
|
|
|
*/
|
2015-10-08 12:21:17 +03:00
|
|
|
public function downloadShare($token, $files = null, $path = '', $downloadStartSecret = '') {
|
2014-10-15 13:58:44 +04:00
|
|
|
\OC_User::setIncognitoMode(true);
|
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
$share = $this->shareManager->getShareByToken($token);
|
2014-10-15 13:58:44 +04:00
|
|
|
|
2016-06-08 16:38:11 +03:00
|
|
|
if(!($share->getPermissions() & \OCP\Constants::PERMISSION_READ)) {
|
2016-07-18 14:34:18 +03:00
|
|
|
return new \OCP\AppFramework\Http\DataResponse('Share is read-only');
|
2016-06-08 16:38:11 +03:00
|
|
|
}
|
|
|
|
|
2014-10-15 13:58:44 +04:00
|
|
|
// Share is password protected - check whether the user is permitted to access the share
|
2016-01-15 13:49:50 +03:00
|
|
|
if ($share->getPassword() !== null && !$this->linkShareAuth($share)) {
|
|
|
|
return new RedirectResponse($this->urlGenerator->linkToRoute('files_sharing.sharecontroller.authenticate',
|
|
|
|
['token' => $token]));
|
2014-10-15 13:58:44 +04:00
|
|
|
}
|
|
|
|
|
2015-02-17 17:08:16 +03:00
|
|
|
$files_list = null;
|
|
|
|
if (!is_null($files)) { // download selected files
|
|
|
|
$files_list = json_decode($files);
|
|
|
|
// in case we get only a single file
|
|
|
|
if ($files_list === null) {
|
2016-01-15 13:49:50 +03:00
|
|
|
$files_list = [$files];
|
2015-02-17 17:08:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-03 10:25:57 +03:00
|
|
|
$userFolder = $this->rootFolder->getUserFolder($share->getShareOwner());
|
2016-01-27 22:51:26 +03:00
|
|
|
$originalSharePath = $userFolder->getRelativePath($share->getNode()->getPath());
|
2016-01-15 13:49:50 +03:00
|
|
|
|
2016-02-09 15:00:08 +03:00
|
|
|
if (!$this->validateShare($share)) {
|
|
|
|
throw new NotFoundException();
|
|
|
|
}
|
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
// Single file share
|
2016-01-27 22:51:26 +03:00
|
|
|
if ($share->getNode() instanceof \OCP\Files\File) {
|
2016-01-20 11:39:05 +03:00
|
|
|
// Single file download
|
|
|
|
$event = $this->activityManager->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType(Activity::TYPE_PUBLIC_LINKS)
|
2016-01-27 22:51:26 +03:00
|
|
|
->setSubject(Activity::SUBJECT_PUBLIC_SHARED_FILE_DOWNLOADED, [$userFolder->getRelativePath($share->getNode()->getPath())])
|
2016-02-03 10:25:57 +03:00
|
|
|
->setAffectedUser($share->getShareOwner())
|
2016-01-27 22:51:26 +03:00
|
|
|
->setObject('files', $share->getNode()->getId(), $userFolder->getRelativePath($share->getNode()->getPath()));
|
2016-01-20 11:39:05 +03:00
|
|
|
$this->activityManager->publish($event);
|
2016-01-15 13:49:50 +03:00
|
|
|
}
|
|
|
|
// Directory share
|
|
|
|
else {
|
|
|
|
/** @var \OCP\Files\Folder $node */
|
2016-01-27 22:51:26 +03:00
|
|
|
$node = $share->getNode();
|
2016-01-15 13:49:50 +03:00
|
|
|
|
|
|
|
// Try to get the path
|
|
|
|
if ($path !== '') {
|
|
|
|
try {
|
|
|
|
$node = $node->get($path);
|
|
|
|
} catch (NotFoundException $e) {
|
2016-02-09 02:34:10 +03:00
|
|
|
$this->emitAccessShareHook($share, 404, 'Share not found');
|
2016-01-15 13:49:50 +03:00
|
|
|
return new NotFoundResponse();
|
|
|
|
}
|
|
|
|
}
|
2014-10-15 13:58:44 +04:00
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
$originalSharePath = $userFolder->getRelativePath($node->getPath());
|
2014-10-15 13:58:44 +04:00
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
if ($node instanceof \OCP\Files\File) {
|
|
|
|
// Single file download
|
2016-01-20 11:39:05 +03:00
|
|
|
$event = $this->activityManager->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType(Activity::TYPE_PUBLIC_LINKS)
|
|
|
|
->setSubject(Activity::SUBJECT_PUBLIC_SHARED_FILE_DOWNLOADED, [$userFolder->getRelativePath($node->getPath())])
|
2016-02-03 10:25:57 +03:00
|
|
|
->setAffectedUser($share->getShareOwner())
|
2016-01-20 11:39:05 +03:00
|
|
|
->setObject('files', $node->getId(), $userFolder->getRelativePath($node->getPath()));
|
|
|
|
$this->activityManager->publish($event);
|
2015-02-17 17:08:16 +03:00
|
|
|
} else if (!empty($files_list)) {
|
2016-01-15 13:49:50 +03:00
|
|
|
/** @var \OCP\Files\Folder $node */
|
|
|
|
|
|
|
|
// Subset of files is downloaded
|
2015-02-17 17:08:16 +03:00
|
|
|
foreach ($files_list as $file) {
|
2016-01-15 13:49:50 +03:00
|
|
|
$subNode = $node->get($file);
|
2016-01-20 11:39:05 +03:00
|
|
|
|
|
|
|
$event = $this->activityManager->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType(Activity::TYPE_PUBLIC_LINKS)
|
2016-02-03 10:25:57 +03:00
|
|
|
->setAffectedUser($share->getShareOwner())
|
2016-01-20 11:39:05 +03:00
|
|
|
->setObject('files', $subNode->getId(), $userFolder->getRelativePath($subNode->getPath()));
|
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
if ($subNode instanceof \OCP\Files\File) {
|
2016-01-20 11:39:05 +03:00
|
|
|
$event->setSubject(Activity::SUBJECT_PUBLIC_SHARED_FILE_DOWNLOADED, [$userFolder->getRelativePath($subNode->getPath())]);
|
2016-01-15 13:49:50 +03:00
|
|
|
} else {
|
2016-01-20 11:39:05 +03:00
|
|
|
$event->setSubject(Activity::SUBJECT_PUBLIC_SHARED_FOLDER_DOWNLOADED, [$userFolder->getRelativePath($subNode->getPath())]);
|
2016-01-15 13:49:50 +03:00
|
|
|
}
|
2016-01-20 11:39:05 +03:00
|
|
|
|
|
|
|
$this->activityManager->publish($event);
|
2015-02-17 17:08:16 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// The folder is downloaded
|
2016-01-20 11:39:05 +03:00
|
|
|
$event = $this->activityManager->generateEvent();
|
|
|
|
$event->setApp('files_sharing')
|
|
|
|
->setType(Activity::TYPE_PUBLIC_LINKS)
|
|
|
|
->setSubject(Activity::SUBJECT_PUBLIC_SHARED_FOLDER_DOWNLOADED, [$userFolder->getRelativePath($node->getPath())])
|
2016-02-03 10:25:57 +03:00
|
|
|
->setAffectedUser($share->getShareOwner())
|
2016-01-20 11:39:05 +03:00
|
|
|
->setObject('files', $node->getId(), $userFolder->getRelativePath($node->getPath()));
|
|
|
|
$this->activityManager->publish($event);
|
2015-02-17 17:08:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-15 13:49:50 +03:00
|
|
|
/* FIXME: We should do this all nicely in OCP */
|
|
|
|
OC_Util::tearDownFS();
|
2016-02-03 10:25:57 +03:00
|
|
|
OC_Util::setupFS($share->getShareOwner());
|
2016-01-15 13:49:50 +03:00
|
|
|
|
2015-10-08 12:21:17 +03:00
|
|
|
/**
|
|
|
|
* this sets a cookie to be able to recognize the start of the download
|
|
|
|
* the content must not be longer than 32 characters and must only contain
|
|
|
|
* alphanumeric characters
|
|
|
|
*/
|
|
|
|
if (!empty($downloadStartSecret)
|
|
|
|
&& !isset($downloadStartSecret[32])
|
|
|
|
&& preg_match('!^[a-zA-Z0-9]+$!', $downloadStartSecret) === 1) {
|
|
|
|
|
|
|
|
// FIXME: set on the response once we use an actual app framework response
|
|
|
|
setcookie('ocDownloadStarted', $downloadStartSecret, time() + 20, '/');
|
|
|
|
}
|
|
|
|
|
2016-02-09 02:34:10 +03:00
|
|
|
$this->emitAccessShareHook($share);
|
|
|
|
|
2016-05-20 19:16:44 +03:00
|
|
|
$server_params = array( 'head' => $this->request->getMethod() == 'HEAD' );
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Http range requests support
|
|
|
|
*/
|
|
|
|
if (isset($_SERVER['HTTP_RANGE'])) {
|
|
|
|
$server_params['range'] = $this->request->getHeader('Range');
|
|
|
|
}
|
|
|
|
|
2015-02-17 17:08:16 +03:00
|
|
|
// download selected files
|
2016-03-07 13:37:49 +03:00
|
|
|
if (!is_null($files) && $files !== '') {
|
2014-10-15 13:58:44 +04:00
|
|
|
// FIXME: The exit is required here because otherwise the AppFramework is trying to add headers as well
|
2014-11-25 12:17:31 +03:00
|
|
|
// after dispatching the request which results in a "Cannot modify header information" notice.
|
2016-05-20 19:16:44 +03:00
|
|
|
OC_Files::get($originalSharePath, $files_list, $server_params);
|
2014-10-15 13:58:44 +04:00
|
|
|
exit();
|
|
|
|
} else {
|
|
|
|
// FIXME: The exit is required here because otherwise the AppFramework is trying to add headers as well
|
|
|
|
// after dispatching the request which results in a "Cannot modify header information" notice.
|
2016-05-20 19:16:44 +03:00
|
|
|
OC_Files::get(dirname($originalSharePath), basename($originalSharePath), $server_params);
|
2014-10-15 13:58:44 +04:00
|
|
|
exit();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|