2011-08-06 13:36:56 +04:00
|
|
|
<?php
|
2012-02-12 00:24:22 +04:00
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2018-10-17 17:06:31 +03:00
|
|
|
* @copyright Copyright (c) 2018, Georg Ehrke
|
2016-07-21 17:49:16 +03:00
|
|
|
*
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Christoph Seitz <christoph.seitz@posteo.de>
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Daniel Kesselberg <mail@danielkesselberg.de>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Georg Ehrke <oc.list@georgehrke.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Jakob Sack <mail@jakobsack.de>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Julius Härtl <jus@bitgrid.net>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2019-02-08 02:30:00 +03:00
|
|
|
* @author Vinicius Cubas Brand <vinicius@eita.org.br>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-12-19 15:28:11 +03:00
|
|
|
*
|
2012-02-12 00:24:22 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
namespace OCA\DAV\Connector\Sabre;
|
2014-12-19 18:50:32 +03:00
|
|
|
|
2019-03-04 01:07:07 +03:00
|
|
|
use OCA\Circles\Exceptions\CircleDoesNotExistException;
|
2019-08-06 14:40:52 +03:00
|
|
|
use OCA\DAV\CalDAV\Proxy\ProxyMapper;
|
2019-08-14 14:38:11 +03:00
|
|
|
use OCA\DAV\Traits\PrincipalProxyTrait;
|
2019-03-05 18:00:47 +03:00
|
|
|
use OCP\App\IAppManager;
|
2019-03-04 01:07:07 +03:00
|
|
|
use OCP\AppFramework\QueryException;
|
2020-12-12 02:25:10 +03:00
|
|
|
use OCP\Constants;
|
2019-11-26 18:37:57 +03:00
|
|
|
use OCP\IConfig;
|
2021-01-19 23:22:26 +03:00
|
|
|
use OCP\IGroup;
|
2016-01-11 19:29:01 +03:00
|
|
|
use OCP\IGroupManager;
|
2015-11-24 13:15:31 +03:00
|
|
|
use OCP\IUser;
|
2014-12-19 15:28:11 +03:00
|
|
|
use OCP\IUserManager;
|
2017-12-04 17:02:55 +03:00
|
|
|
use OCP\IUserSession;
|
|
|
|
use OCP\Share\IManager as IShareManager;
|
2016-01-08 14:11:02 +03:00
|
|
|
use Sabre\DAV\Exception;
|
2017-09-30 00:43:04 +03:00
|
|
|
use Sabre\DAV\PropPatch;
|
2016-01-08 14:11:02 +03:00
|
|
|
use Sabre\DAVACL\PrincipalBackend\BackendInterface;
|
2014-12-19 15:28:11 +03:00
|
|
|
|
2016-01-08 14:11:02 +03:00
|
|
|
class Principal implements BackendInterface {
|
|
|
|
|
2014-12-19 15:28:11 +03:00
|
|
|
/** @var IUserManager */
|
|
|
|
private $userManager;
|
|
|
|
|
2016-01-11 19:29:01 +03:00
|
|
|
/** @var IGroupManager */
|
|
|
|
private $groupManager;
|
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
/** @var IShareManager */
|
|
|
|
private $shareManager;
|
|
|
|
|
|
|
|
/** @var IUserSession */
|
|
|
|
private $userSession;
|
|
|
|
|
2019-03-05 18:00:47 +03:00
|
|
|
/** @var IAppManager */
|
|
|
|
private $appManager;
|
|
|
|
|
2016-01-20 23:08:23 +03:00
|
|
|
/** @var string */
|
|
|
|
private $principalPrefix;
|
|
|
|
|
2016-02-10 12:43:32 +03:00
|
|
|
/** @var bool */
|
|
|
|
private $hasGroups;
|
|
|
|
|
2019-02-08 02:30:00 +03:00
|
|
|
/** @var bool */
|
|
|
|
private $hasCircles;
|
2019-08-14 14:38:11 +03:00
|
|
|
|
2019-08-06 14:40:52 +03:00
|
|
|
/** @var ProxyMapper */
|
|
|
|
private $proxyMapper;
|
2019-02-08 02:30:00 +03:00
|
|
|
|
2019-11-26 18:37:57 +03:00
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
/**
|
|
|
|
* Principal constructor.
|
|
|
|
*
|
|
|
|
* @param IUserManager $userManager
|
|
|
|
* @param IGroupManager $groupManager
|
|
|
|
* @param IShareManager $shareManager
|
|
|
|
* @param IUserSession $userSession
|
|
|
|
* @param IAppManager $appManager
|
|
|
|
* @param ProxyMapper $proxyMapper
|
2019-11-26 18:37:57 +03:00
|
|
|
* @param IConfig $config
|
2019-08-14 14:38:11 +03:00
|
|
|
* @param string $principalPrefix
|
|
|
|
*/
|
2016-01-20 23:08:23 +03:00
|
|
|
public function __construct(IUserManager $userManager,
|
|
|
|
IGroupManager $groupManager,
|
2017-12-04 17:02:55 +03:00
|
|
|
IShareManager $shareManager,
|
|
|
|
IUserSession $userSession,
|
2019-03-05 18:00:47 +03:00
|
|
|
IAppManager $appManager,
|
2019-08-06 14:40:52 +03:00
|
|
|
ProxyMapper $proxyMapper,
|
2019-11-26 18:37:57 +03:00
|
|
|
IConfig $config,
|
2019-05-30 15:37:26 +03:00
|
|
|
string $principalPrefix = 'principals/users/') {
|
2014-12-19 15:28:11 +03:00
|
|
|
$this->userManager = $userManager;
|
2016-01-11 19:29:01 +03:00
|
|
|
$this->groupManager = $groupManager;
|
2017-12-04 17:02:55 +03:00
|
|
|
$this->shareManager = $shareManager;
|
|
|
|
$this->userSession = $userSession;
|
2019-03-05 18:00:47 +03:00
|
|
|
$this->appManager = $appManager;
|
2016-01-20 23:08:23 +03:00
|
|
|
$this->principalPrefix = trim($principalPrefix, '/');
|
2019-02-08 02:30:00 +03:00
|
|
|
$this->hasGroups = $this->hasCircles = ($principalPrefix === 'principals/users/');
|
2019-08-06 14:40:52 +03:00
|
|
|
$this->proxyMapper = $proxyMapper;
|
2019-11-26 18:37:57 +03:00
|
|
|
$this->config = $config;
|
2014-12-19 15:28:11 +03:00
|
|
|
}
|
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
use PrincipalProxyTrait {
|
|
|
|
getGroupMembership as protected traitGetGroupMembership;
|
|
|
|
}
|
|
|
|
|
2011-08-06 13:36:56 +04:00
|
|
|
/**
|
|
|
|
* Returns a list of principals based on a prefix.
|
|
|
|
*
|
|
|
|
* This prefix will often contain something like 'principals'. You are only
|
|
|
|
* expected to return principals that are in this base path.
|
|
|
|
*
|
|
|
|
* You are expected to return at least a 'uri' for every user, you can
|
|
|
|
* return any additional properties if you wish so. Common properties are:
|
|
|
|
* {DAV:}displayname
|
|
|
|
*
|
|
|
|
* @param string $prefixPath
|
2014-12-19 15:28:11 +03:00
|
|
|
* @return string[]
|
2011-08-06 13:36:56 +04:00
|
|
|
*/
|
2014-12-19 15:28:11 +03:00
|
|
|
public function getPrincipalsByPrefix($prefixPath) {
|
|
|
|
$principals = [];
|
2011-08-06 13:36:56 +04:00
|
|
|
|
2016-01-20 23:08:23 +03:00
|
|
|
if ($prefixPath === $this->principalPrefix) {
|
2020-04-10 15:19:56 +03:00
|
|
|
foreach ($this->userManager->search('') as $user) {
|
2015-11-24 13:15:31 +03:00
|
|
|
$principals[] = $this->userToPrincipal($user);
|
2012-02-12 00:09:51 +04:00
|
|
|
}
|
2011-08-06 13:36:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $principals;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns a specific principal, specified by it's path.
|
|
|
|
* The returned structure should be the exact same as from
|
|
|
|
* getPrincipalsByPrefix.
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getPrincipalByPath($path) {
|
2017-07-20 10:43:23 +03:00
|
|
|
list($prefix, $name) = \Sabre\Uri\split($path);
|
2021-01-19 23:22:26 +03:00
|
|
|
$decodedName = urldecode($name);
|
2011-08-06 13:36:56 +04:00
|
|
|
|
2019-08-06 14:40:52 +03:00
|
|
|
if ($name === 'calendar-proxy-write' || $name === 'calendar-proxy-read') {
|
|
|
|
list($prefix2, $name2) = \Sabre\Uri\split($prefix);
|
|
|
|
|
|
|
|
if ($prefix2 === $this->principalPrefix) {
|
|
|
|
$user = $this->userManager->get($name2);
|
|
|
|
|
|
|
|
if ($user !== null) {
|
|
|
|
return [
|
|
|
|
'uri' => 'principals/users/' . $user->getUID() . '/' . $name,
|
|
|
|
];
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-20 23:08:23 +03:00
|
|
|
if ($prefix === $this->principalPrefix) {
|
2020-09-10 13:55:41 +03:00
|
|
|
// Depending on where it is called, it may happen that this function
|
|
|
|
// is called either with a urlencoded version of the name or with a non-urlencoded one.
|
|
|
|
// The urldecode function replaces %## and +, both of which are forbidden in usernames.
|
|
|
|
// Hence there can be no ambiguity here and it is safe to call urldecode on all usernames
|
2021-01-19 23:22:26 +03:00
|
|
|
$user = $this->userManager->get($decodedName);
|
2011-08-06 13:36:56 +04:00
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
if ($user !== null) {
|
2016-01-20 23:08:23 +03:00
|
|
|
return $this->userToPrincipal($user);
|
|
|
|
}
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($prefix === 'principals/circles') {
|
2020-10-23 22:18:02 +03:00
|
|
|
if ($this->userSession->getUser() !== null) {
|
2021-01-19 23:22:26 +03:00
|
|
|
// At the time of writing - 2021-01-19 — a mixed state is possible.
|
|
|
|
// The second condition can be removed when this is fixed.
|
|
|
|
return $this->circleToPrincipal($decodedName)
|
|
|
|
?: $this->circleToPrincipal($name);
|
|
|
|
}
|
|
|
|
} elseif ($prefix === 'principals/groups') {
|
|
|
|
// At the time of writing - 2021-01-19 — a mixed state is possible.
|
|
|
|
// The second condition can be removed when this is fixed.
|
|
|
|
$group = $this->groupManager->get($decodedName)
|
|
|
|
?: $this->groupManager->get($name);
|
|
|
|
if ($group instanceof IGroup) {
|
|
|
|
return [
|
|
|
|
'uri' => 'principals/groups/' . $name,
|
|
|
|
'{DAV:}displayname' => $group->getDisplayName(),
|
|
|
|
];
|
2020-10-23 22:18:02 +03:00
|
|
|
}
|
2016-01-20 23:08:23 +03:00
|
|
|
}
|
2012-02-12 00:09:51 +04:00
|
|
|
return null;
|
2011-08-06 13:36:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the list of groups a principal is a member of
|
|
|
|
*
|
|
|
|
* @param string $principal
|
2016-03-17 17:39:08 +03:00
|
|
|
* @param bool $needGroups
|
2011-08-06 13:36:56 +04:00
|
|
|
* @return array
|
2016-01-08 14:11:02 +03:00
|
|
|
* @throws Exception
|
2011-08-06 13:36:56 +04:00
|
|
|
*/
|
2016-03-17 12:31:33 +03:00
|
|
|
public function getGroupMembership($principal, $needGroups = false) {
|
2017-07-20 10:43:23 +03:00
|
|
|
list($prefix, $name) = \Sabre\Uri\split($principal);
|
2012-02-12 00:09:51 +04:00
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
if ($prefix !== $this->principalPrefix) {
|
|
|
|
return [];
|
2019-08-06 15:41:33 +03:00
|
|
|
}
|
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
$user = $this->userManager->get($name);
|
|
|
|
if (!$user) {
|
|
|
|
throw new Exception('Principal not found');
|
2019-08-06 15:41:33 +03:00
|
|
|
}
|
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
$groups = [];
|
2019-08-06 15:41:33 +03:00
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
if ($this->hasGroups || $needGroups) {
|
|
|
|
$userGroups = $this->groupManager->getUserGroups($user);
|
2020-04-10 15:19:56 +03:00
|
|
|
foreach ($userGroups as $userGroup) {
|
2019-08-14 14:38:11 +03:00
|
|
|
$groups[] = 'principals/groups/' . urlencode($userGroup->getGID());
|
2019-08-06 15:41:33 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-14 14:38:11 +03:00
|
|
|
$groups = array_unique(array_merge(
|
|
|
|
$groups,
|
|
|
|
$this->traitGetGroupMembership($principal, $needGroups)
|
|
|
|
));
|
|
|
|
|
|
|
|
return $groups;
|
2011-08-06 13:36:56 +04:00
|
|
|
}
|
2012-10-14 23:04:08 +04:00
|
|
|
|
2014-12-19 18:50:32 +03:00
|
|
|
/**
|
|
|
|
* @param string $path
|
2015-02-12 14:29:01 +03:00
|
|
|
* @param PropPatch $propPatch
|
2014-12-19 18:50:32 +03:00
|
|
|
* @return int
|
|
|
|
*/
|
2020-04-10 17:51:06 +03:00
|
|
|
public function updatePrincipal($path, PropPatch $propPatch) {
|
2012-09-10 13:28:09 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2012-10-14 23:04:08 +04:00
|
|
|
|
2017-10-01 17:03:30 +03:00
|
|
|
/**
|
|
|
|
* Search user principals
|
|
|
|
*
|
|
|
|
* @param array $searchProperties
|
|
|
|
* @param string $test
|
|
|
|
* @return array
|
|
|
|
*/
|
2017-12-04 17:02:55 +03:00
|
|
|
protected function searchUserPrincipals(array $searchProperties, $test = 'allof') {
|
2017-10-01 17:03:30 +03:00
|
|
|
$results = [];
|
|
|
|
|
2018-10-14 13:48:42 +03:00
|
|
|
// If sharing is disabled, return the empty array
|
2018-05-22 16:09:21 +03:00
|
|
|
$shareAPIEnabled = $this->shareManager->shareApiEnabled();
|
2018-10-14 13:48:42 +03:00
|
|
|
if (!$shareAPIEnabled) {
|
2017-12-04 17:02:55 +03:00
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
2020-02-20 20:52:23 +03:00
|
|
|
$allowEnumeration = $this->shareManager->allowEnumeration();
|
|
|
|
$limitEnumeration = $this->shareManager->limitEnumerationToGroups();
|
2019-11-26 18:37:57 +03:00
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
// If sharing is restricted to group members only,
|
|
|
|
// return only members that have groups in common
|
|
|
|
$restrictGroups = false;
|
|
|
|
if ($this->shareManager->shareWithGroupMembersOnly()) {
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
if (!$user) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
$restrictGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
}
|
|
|
|
|
2020-02-20 20:52:23 +03:00
|
|
|
$currentUserGroups = [];
|
|
|
|
if ($limitEnumeration) {
|
|
|
|
$currentUser = $this->userSession->getUser();
|
|
|
|
if ($currentUser) {
|
|
|
|
$currentUserGroups = $this->groupManager->getUserGroupIds($currentUser);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-12 02:25:10 +03:00
|
|
|
$searchLimit = $this->config->getSystemValueInt('sharing.maxAutocompleteResults', Constants::SHARING_MAX_AUTOCOMPLETE_RESULTS_DEFAULT);
|
|
|
|
if ($searchLimit <= 0) {
|
|
|
|
$searchLimit = null;
|
|
|
|
}
|
2017-10-01 17:03:30 +03:00
|
|
|
foreach ($searchProperties as $prop => $value) {
|
|
|
|
switch ($prop) {
|
|
|
|
case '{http://sabredav.org/ns}email-address':
|
|
|
|
$users = $this->userManager->getByEmail($value);
|
2017-12-04 17:02:55 +03:00
|
|
|
|
2019-11-26 18:37:57 +03:00
|
|
|
if (!$allowEnumeration) {
|
2020-04-09 14:53:40 +03:00
|
|
|
$users = \array_filter($users, static function (IUser $user) use ($value) {
|
2019-11-26 18:37:57 +03:00
|
|
|
return $user->getEMailAddress() === $value;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-02-20 20:52:23 +03:00
|
|
|
if ($limitEnumeration) {
|
|
|
|
$users = \array_filter($users, function (IUser $user) use ($currentUserGroups, $value) {
|
|
|
|
return !empty(array_intersect(
|
|
|
|
$this->groupManager->getUserGroupIds($user),
|
|
|
|
$currentUserGroups
|
|
|
|
)) || $user->getEMailAddress() === $value;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-04-09 14:53:40 +03:00
|
|
|
$results[] = array_reduce($users, function (array $carry, IUser $user) use ($restrictGroups) {
|
2017-12-04 17:02:55 +03:00
|
|
|
// is sharing restricted to groups only?
|
|
|
|
if ($restrictGroups !== false) {
|
|
|
|
$userGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
if (count(array_intersect($userGroups, $restrictGroups)) === 0) {
|
|
|
|
return $carry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$carry[] = $this->principalPrefix . '/' . $user->getUID();
|
|
|
|
return $carry;
|
|
|
|
}, []);
|
2017-10-01 17:03:30 +03:00
|
|
|
break;
|
2017-12-04 17:02:55 +03:00
|
|
|
|
2018-10-17 17:06:31 +03:00
|
|
|
case '{DAV:}displayname':
|
2020-12-11 16:04:40 +03:00
|
|
|
$users = $this->userManager->searchDisplayName($value, $searchLimit);
|
2018-10-17 17:06:31 +03:00
|
|
|
|
2019-11-26 18:37:57 +03:00
|
|
|
if (!$allowEnumeration) {
|
2020-04-09 14:53:40 +03:00
|
|
|
$users = \array_filter($users, static function (IUser $user) use ($value) {
|
2019-11-26 18:37:57 +03:00
|
|
|
return $user->getDisplayName() === $value;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-02-20 20:52:23 +03:00
|
|
|
if ($limitEnumeration) {
|
|
|
|
$users = \array_filter($users, function (IUser $user) use ($currentUserGroups, $value) {
|
|
|
|
return !empty(array_intersect(
|
|
|
|
$this->groupManager->getUserGroupIds($user),
|
|
|
|
$currentUserGroups
|
|
|
|
)) || $user->getDisplayName() === $value;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-04-09 14:53:40 +03:00
|
|
|
$results[] = array_reduce($users, function (array $carry, IUser $user) use ($restrictGroups) {
|
2018-10-17 17:06:31 +03:00
|
|
|
// is sharing restricted to groups only?
|
|
|
|
if ($restrictGroups !== false) {
|
|
|
|
$userGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
if (count(array_intersect($userGroups, $restrictGroups)) === 0) {
|
|
|
|
return $carry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$carry[] = $this->principalPrefix . '/' . $user->getUID();
|
|
|
|
return $carry;
|
|
|
|
}, []);
|
|
|
|
break;
|
|
|
|
|
2019-02-20 22:22:56 +03:00
|
|
|
case '{urn:ietf:params:xml:ns:caldav}calendar-user-address-set':
|
|
|
|
// If you add support for more search properties that qualify as a user-address,
|
|
|
|
// please also add them to the array below
|
|
|
|
$results[] = $this->searchUserPrincipals([
|
|
|
|
// In theory this should also search for principal:principals/users/...
|
|
|
|
// but that's used internally only anyway and i don't know of any client querying that
|
|
|
|
'{http://sabredav.org/ns}email-address' => $value,
|
|
|
|
], 'anyof');
|
|
|
|
break;
|
|
|
|
|
2017-10-01 17:03:30 +03:00
|
|
|
default:
|
|
|
|
$results[] = [];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
// results is an array of arrays, so this is not the first search result
|
|
|
|
// but the results of the first searchProperty
|
|
|
|
if (count($results) === 1) {
|
2017-10-01 17:03:30 +03:00
|
|
|
return $results[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
switch ($test) {
|
|
|
|
case 'anyof':
|
2018-10-17 17:06:31 +03:00
|
|
|
return array_values(array_unique(array_merge(...$results)));
|
2017-10-01 17:03:30 +03:00
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
case 'allof':
|
|
|
|
default:
|
2018-10-17 17:06:31 +03:00
|
|
|
return array_values(array_intersect(...$results));
|
2017-12-04 17:02:55 +03:00
|
|
|
}
|
2017-10-01 17:03:30 +03:00
|
|
|
}
|
|
|
|
|
2014-12-19 18:50:32 +03:00
|
|
|
/**
|
|
|
|
* @param string $prefixPath
|
|
|
|
* @param array $searchProperties
|
2015-02-12 14:29:01 +03:00
|
|
|
* @param string $test
|
2014-12-19 18:50:32 +03:00
|
|
|
* @return array
|
|
|
|
*/
|
2020-04-10 17:51:06 +03:00
|
|
|
public function searchPrincipals($prefixPath, array $searchProperties, $test = 'allof') {
|
2017-12-04 17:02:55 +03:00
|
|
|
if (count($searchProperties) === 0) {
|
2017-10-01 17:03:30 +03:00
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
switch ($prefixPath) {
|
|
|
|
case 'principals/users':
|
|
|
|
return $this->searchUserPrincipals($searchProperties, $test);
|
2017-12-04 17:02:55 +03:00
|
|
|
|
2017-10-01 17:03:30 +03:00
|
|
|
default:
|
|
|
|
return [];
|
|
|
|
}
|
2012-09-10 13:28:09 +04:00
|
|
|
}
|
2015-02-12 14:29:01 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $uri
|
2015-03-17 14:22:29 +03:00
|
|
|
* @param string $principalPrefix
|
2015-02-12 14:29:01 +03:00
|
|
|
* @return string
|
|
|
|
*/
|
2020-04-10 17:51:06 +03:00
|
|
|
public function findByUri($uri, $principalPrefix) {
|
2018-10-14 13:48:42 +03:00
|
|
|
// If sharing is disabled, return the empty array
|
2018-05-22 16:09:21 +03:00
|
|
|
$shareAPIEnabled = $this->shareManager->shareApiEnabled();
|
2018-10-14 13:48:42 +03:00
|
|
|
if (!$shareAPIEnabled) {
|
2017-12-04 17:02:55 +03:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If sharing is restricted to group members only,
|
|
|
|
// return only members that have groups in common
|
|
|
|
$restrictGroups = false;
|
|
|
|
if ($this->shareManager->shareWithGroupMembersOnly()) {
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
if (!$user) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$restrictGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (strpos($uri, 'mailto:') === 0) {
|
|
|
|
if ($principalPrefix === 'principals/users') {
|
|
|
|
$users = $this->userManager->getByEmail(substr($uri, 7));
|
|
|
|
if (count($users) !== 1) {
|
|
|
|
return null;
|
2017-10-01 17:03:30 +03:00
|
|
|
}
|
2017-12-04 17:02:55 +03:00
|
|
|
$user = $users[0];
|
|
|
|
|
|
|
|
if ($restrictGroups !== false) {
|
|
|
|
$userGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
if (count(array_intersect($userGroups, $restrictGroups)) === 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->principalPrefix . '/' . $user->getUID();
|
2016-05-02 15:19:10 +03:00
|
|
|
}
|
|
|
|
}
|
2018-04-23 14:48:39 +03:00
|
|
|
if (substr($uri, 0, 10) === 'principal:') {
|
|
|
|
$principal = substr($uri, 10);
|
|
|
|
$principal = $this->getPrincipalByPath($principal);
|
|
|
|
if ($principal !== null) {
|
|
|
|
return $principal['uri'];
|
|
|
|
}
|
|
|
|
}
|
2016-05-02 15:19:10 +03:00
|
|
|
|
2017-12-04 17:02:55 +03:00
|
|
|
return null;
|
2015-02-12 14:29:01 +03:00
|
|
|
}
|
2015-11-24 13:15:31 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param IUser $user
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function userToPrincipal($user) {
|
|
|
|
$userId = $user->getUID();
|
|
|
|
$displayName = $user->getDisplayName();
|
|
|
|
$principal = [
|
2020-04-09 10:22:29 +03:00
|
|
|
'uri' => $this->principalPrefix . '/' . $userId,
|
|
|
|
'{DAV:}displayname' => is_null($displayName) ? $userId : $displayName,
|
|
|
|
'{urn:ietf:params:xml:ns:caldav}calendar-user-type' => 'INDIVIDUAL',
|
2015-11-24 13:15:31 +03:00
|
|
|
];
|
|
|
|
|
2015-11-25 01:28:24 +03:00
|
|
|
$email = $user->getEMailAddress();
|
2015-11-24 13:15:31 +03:00
|
|
|
if (!empty($email)) {
|
|
|
|
$principal['{http://sabredav.org/ns}email-address'] = $email;
|
|
|
|
}
|
2016-12-23 14:12:38 +03:00
|
|
|
|
2015-11-24 13:15:31 +03:00
|
|
|
return $principal;
|
|
|
|
}
|
2016-01-11 22:04:33 +03:00
|
|
|
|
2016-01-20 23:08:23 +03:00
|
|
|
public function getPrincipalPrefix() {
|
|
|
|
return $this->principalPrefix;
|
|
|
|
}
|
|
|
|
|
2019-02-08 02:30:00 +03:00
|
|
|
/**
|
|
|
|
* @param string $circleUniqueId
|
|
|
|
* @return array|null
|
|
|
|
*/
|
|
|
|
protected function circleToPrincipal($circleUniqueId) {
|
2019-03-05 18:00:47 +03:00
|
|
|
if (!$this->appManager->isEnabledForUser('circles') || !class_exists('\OCA\Circles\Api\v1\Circles')) {
|
2019-02-08 02:30:00 +03:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2019-03-04 01:07:07 +03:00
|
|
|
try {
|
|
|
|
$circle = \OCA\Circles\Api\v1\Circles::detailsCircle($circleUniqueId, true);
|
2020-04-10 15:19:56 +03:00
|
|
|
} catch (QueryException $ex) {
|
2019-03-04 01:07:07 +03:00
|
|
|
return null;
|
2020-04-10 15:19:56 +03:00
|
|
|
} catch (CircleDoesNotExistException $ex) {
|
2019-03-04 01:07:07 +03:00
|
|
|
return null;
|
|
|
|
}
|
2019-02-08 02:30:00 +03:00
|
|
|
|
|
|
|
if (!$circle) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$principal = [
|
|
|
|
'uri' => 'principals/circles/' . $circleUniqueId,
|
|
|
|
'{DAV:}displayname' => $circle->getName(),
|
|
|
|
];
|
|
|
|
|
|
|
|
return $principal;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the list of circles a principal is a member of
|
|
|
|
*
|
|
|
|
* @param string $principal
|
|
|
|
* @return array
|
|
|
|
* @throws Exception
|
2017-09-30 00:43:04 +03:00
|
|
|
* @throws \OCP\AppFramework\QueryException
|
2019-03-05 17:46:56 +03:00
|
|
|
* @suppress PhanUndeclaredClassMethod
|
2019-02-08 02:30:00 +03:00
|
|
|
*/
|
2019-03-01 15:02:30 +03:00
|
|
|
public function getCircleMembership($principal):array {
|
2019-03-05 18:00:47 +03:00
|
|
|
if (!$this->appManager->isEnabledForUser('circles') || !class_exists('\OCA\Circles\Api\v1\Circles')) {
|
2019-02-08 02:30:00 +03:00
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
list($prefix, $name) = \Sabre\Uri\split($principal);
|
|
|
|
if ($this->hasCircles && $prefix === $this->principalPrefix) {
|
|
|
|
$user = $this->userManager->get($name);
|
|
|
|
if (!$user) {
|
|
|
|
throw new Exception('Principal not found');
|
|
|
|
}
|
|
|
|
|
2019-03-01 23:04:43 +03:00
|
|
|
$circles = \OCA\Circles\Api\v1\Circles::joinedCircles($name, true);
|
2019-02-08 02:30:00 +03:00
|
|
|
|
2020-04-09 14:53:40 +03:00
|
|
|
$circles = array_map(function ($circle) {
|
2017-09-30 00:43:04 +03:00
|
|
|
/** @var \OCA\Circles\Model\Circle $circle */
|
2019-02-08 02:30:00 +03:00
|
|
|
return 'principals/circles/' . urlencode($circle->getUniqueId());
|
|
|
|
}, $circles);
|
|
|
|
|
|
|
|
return $circles;
|
|
|
|
}
|
2017-09-30 00:43:04 +03:00
|
|
|
|
2019-02-08 02:30:00 +03:00
|
|
|
return [];
|
|
|
|
}
|
2011-08-06 13:36:56 +04:00
|
|
|
}
|