2016-05-23 12:48:14 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2016-07-13 18:50:06 +03:00
|
|
|
* @copyright Copyright (c) 2016, Björn Schießle <bjoern@schiessle.org>
|
|
|
|
*
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
|
|
|
*
|
2016-05-23 12:48:14 +03:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
namespace OCA\FederatedFileSharing\Controller;
|
|
|
|
|
2017-01-19 12:07:16 +03:00
|
|
|
use OC\Files\Filesystem;
|
2016-05-23 12:48:14 +03:00
|
|
|
use OC\HintException;
|
2017-01-19 12:07:16 +03:00
|
|
|
use OC\Share\Helper;
|
2016-05-23 12:48:14 +03:00
|
|
|
use OCA\FederatedFileSharing\AddressHandler;
|
|
|
|
use OCA\FederatedFileSharing\FederatedShareProvider;
|
2017-01-19 12:07:16 +03:00
|
|
|
use OCA\Files_Sharing\External\Manager;
|
2016-05-23 12:48:14 +03:00
|
|
|
use OCP\AppFramework\Controller;
|
|
|
|
use OCP\AppFramework\Http;
|
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2017-01-27 14:52:17 +03:00
|
|
|
use OCP\Federation\ICloudIdManager;
|
2017-01-19 12:07:16 +03:00
|
|
|
use OCP\Files\StorageInvalidException;
|
2016-07-12 19:48:00 +03:00
|
|
|
use OCP\Http\Client\IClientService;
|
|
|
|
use OCP\IL10N;
|
2016-05-23 12:48:14 +03:00
|
|
|
use OCP\IRequest;
|
2016-07-12 15:03:29 +03:00
|
|
|
use OCP\ISession;
|
2016-07-12 19:48:00 +03:00
|
|
|
use OCP\IUserSession;
|
2016-05-23 12:48:14 +03:00
|
|
|
use OCP\Share\IManager;
|
2017-01-19 12:07:16 +03:00
|
|
|
use OCP\Util;
|
2016-05-23 12:48:14 +03:00
|
|
|
|
2016-07-14 12:01:25 +03:00
|
|
|
/**
|
|
|
|
* Class MountPublicLinkController
|
|
|
|
*
|
|
|
|
* convert public links to federated shares
|
|
|
|
*
|
|
|
|
* @package OCA\FederatedFileSharing\Controller
|
|
|
|
*/
|
|
|
|
class MountPublicLinkController extends Controller {
|
2016-05-23 12:48:14 +03:00
|
|
|
|
|
|
|
/** @var FederatedShareProvider */
|
|
|
|
private $federatedShareProvider;
|
|
|
|
|
|
|
|
/** @var AddressHandler */
|
|
|
|
private $addressHandler;
|
|
|
|
|
|
|
|
/** @var IManager */
|
|
|
|
private $shareManager;
|
|
|
|
|
2016-07-12 15:03:29 +03:00
|
|
|
/** @var ISession */
|
|
|
|
private $session;
|
|
|
|
|
2016-07-12 19:48:00 +03:00
|
|
|
/** @var IL10N */
|
|
|
|
private $l;
|
|
|
|
|
|
|
|
/** @var IUserSession */
|
|
|
|
private $userSession;
|
|
|
|
|
|
|
|
/** @var IClientService */
|
|
|
|
private $clientService;
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
/** @var ICloudIdManager */
|
|
|
|
private $cloudIdManager;
|
|
|
|
|
2016-07-12 15:03:29 +03:00
|
|
|
/**
|
2016-07-14 12:01:25 +03:00
|
|
|
* MountPublicLinkController constructor.
|
2016-07-12 15:03:29 +03:00
|
|
|
*
|
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
|
|
|
* @param FederatedShareProvider $federatedShareProvider
|
|
|
|
* @param IManager $shareManager
|
|
|
|
* @param AddressHandler $addressHandler
|
|
|
|
* @param ISession $session
|
2016-07-12 19:48:00 +03:00
|
|
|
* @param IL10N $l
|
|
|
|
* @param IUserSession $userSession
|
|
|
|
* @param IClientService $clientService
|
2017-01-27 14:52:17 +03:00
|
|
|
* @param ICloudIdManager $cloudIdManager
|
2016-07-12 15:03:29 +03:00
|
|
|
*/
|
2016-05-23 12:48:14 +03:00
|
|
|
public function __construct($appName,
|
2016-07-12 19:48:00 +03:00
|
|
|
IRequest $request,
|
|
|
|
FederatedShareProvider $federatedShareProvider,
|
|
|
|
IManager $shareManager,
|
|
|
|
AddressHandler $addressHandler,
|
|
|
|
ISession $session,
|
|
|
|
IL10N $l,
|
|
|
|
IUserSession $userSession,
|
2017-01-27 14:52:17 +03:00
|
|
|
IClientService $clientService,
|
|
|
|
ICloudIdManager $cloudIdManager
|
2016-07-12 15:03:29 +03:00
|
|
|
) {
|
2016-05-23 12:48:14 +03:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
|
|
|
|
$this->federatedShareProvider = $federatedShareProvider;
|
|
|
|
$this->shareManager = $shareManager;
|
|
|
|
$this->addressHandler = $addressHandler;
|
2016-07-12 15:03:29 +03:00
|
|
|
$this->session = $session;
|
2016-07-12 19:48:00 +03:00
|
|
|
$this->l = $l;
|
|
|
|
$this->userSession = $userSession;
|
|
|
|
$this->clientService = $clientService;
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cloudIdManager = $cloudIdManager;
|
2016-05-23 12:48:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-07-14 12:01:25 +03:00
|
|
|
* send federated share to a user of a public link
|
2016-05-23 12:48:14 +03:00
|
|
|
*
|
|
|
|
* @NoCSRFRequired
|
|
|
|
* @PublicPage
|
2017-04-12 21:32:48 +03:00
|
|
|
* @BruteForceProtection(action=publicLink2FederatedShare)
|
2016-05-23 12:48:14 +03:00
|
|
|
*
|
|
|
|
* @param string $shareWith
|
|
|
|
* @param string $token
|
2016-07-12 15:03:29 +03:00
|
|
|
* @param string $password
|
2016-05-23 12:48:14 +03:00
|
|
|
* @return JSONResponse
|
|
|
|
*/
|
2016-07-14 12:01:25 +03:00
|
|
|
public function createFederatedShare($shareWith, $token, $password = '') {
|
2016-05-23 12:48:14 +03:00
|
|
|
|
2016-07-14 21:41:10 +03:00
|
|
|
if (!$this->federatedShareProvider->isOutgoingServer2serverShareEnabled()) {
|
|
|
|
return new JSONResponse(
|
|
|
|
['message' => 'This server doesn\'t support outgoing federated shares'],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2016-05-23 12:48:14 +03:00
|
|
|
try {
|
|
|
|
list(, $server) = $this->addressHandler->splitUserRemote($shareWith);
|
|
|
|
$share = $this->shareManager->getShareByToken($token);
|
|
|
|
} catch (HintException $e) {
|
|
|
|
return new JSONResponse(['message' => $e->getHint()], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2016-07-12 15:03:29 +03:00
|
|
|
// make sure that user is authenticated in case of a password protected link
|
|
|
|
$storedPassword = $share->getPassword();
|
|
|
|
$authenticated = $this->session->get('public_link_authenticated') === $share->getId() ||
|
|
|
|
$this->shareManager->checkPassword($share, $password);
|
|
|
|
if (!empty($storedPassword) && !$authenticated ) {
|
2017-04-14 14:42:40 +03:00
|
|
|
$response = new JSONResponse(
|
2016-07-14 21:41:10 +03:00
|
|
|
['message' => 'No permission to access the share'],
|
|
|
|
Http::STATUS_BAD_REQUEST
|
|
|
|
);
|
2017-04-14 14:42:40 +03:00
|
|
|
$response->throttle();
|
|
|
|
return $response;
|
2016-07-12 15:03:29 +03:00
|
|
|
}
|
|
|
|
|
2016-05-23 12:48:14 +03:00
|
|
|
$share->setSharedWith($shareWith);
|
|
|
|
|
|
|
|
try {
|
|
|
|
$this->federatedShareProvider->create($share);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
return new JSONResponse(['message' => $e->getMessage()], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
2016-07-12 15:03:29 +03:00
|
|
|
|
2016-05-23 12:48:14 +03:00
|
|
|
return new JSONResponse(['remoteUrl' => $server]);
|
|
|
|
}
|
2016-07-12 15:03:29 +03:00
|
|
|
|
2016-07-12 19:48:00 +03:00
|
|
|
/**
|
|
|
|
* ask other server to get a federated share
|
|
|
|
*
|
|
|
|
* @NoAdminRequired
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $remote
|
|
|
|
* @param string $password
|
2016-07-13 12:32:27 +03:00
|
|
|
* @param string $owner (only for legacy reasons, can be removed with legacyMountPublicLink())
|
|
|
|
* @param string $ownerDisplayName (only for legacy reasons, can be removed with legacyMountPublicLink())
|
|
|
|
* @param string $name (only for legacy reasons, can be removed with legacyMountPublicLink())
|
2016-07-12 19:48:00 +03:00
|
|
|
* @return JSONResponse
|
|
|
|
*/
|
2016-07-14 12:01:25 +03:00
|
|
|
public function askForFederatedShare($token, $remote, $password = '', $owner = '', $ownerDisplayName = '', $name = '') {
|
2016-07-12 19:48:00 +03:00
|
|
|
// check if server admin allows to mount public links from other servers
|
|
|
|
if ($this->federatedShareProvider->isIncomingServer2serverShareEnabled() === false) {
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Server to server sharing is not enabled on this server')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
$cloudId = $this->cloudIdManager->getCloudId($this->userSession->getUser()->getUID(), $this->addressHandler->generateRemoteURL());
|
2016-07-12 19:48:00 +03:00
|
|
|
|
|
|
|
$httpClient = $this->clientService->newClient();
|
|
|
|
|
|
|
|
try {
|
2016-07-14 12:01:25 +03:00
|
|
|
$response = $httpClient->post($remote . '/index.php/apps/federatedfilesharing/createFederatedShare',
|
2016-07-12 19:48:00 +03:00
|
|
|
[
|
|
|
|
'body' =>
|
|
|
|
[
|
|
|
|
'token' => $token,
|
2017-01-27 14:52:17 +03:00
|
|
|
'shareWith' => rtrim($cloudId->getId(), '/'),
|
2016-07-12 19:48:00 +03:00
|
|
|
'password' => $password
|
2016-07-14 12:01:25 +03:00
|
|
|
],
|
|
|
|
'connect_timeout' => 10,
|
2016-07-12 19:48:00 +03:00
|
|
|
]
|
|
|
|
);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
if (empty($password)) {
|
|
|
|
$message = $this->l->t("Couldn't establish a federated share.");
|
|
|
|
} else {
|
|
|
|
$message = $this->l->t("Couldn't establish a federated share, maybe the password was wrong.");
|
|
|
|
}
|
|
|
|
return new JSONResponse(['message' => $message], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
|
2016-07-13 12:32:27 +03:00
|
|
|
$body = $response->getBody();
|
|
|
|
$result = json_decode($body, true);
|
|
|
|
|
|
|
|
if (is_array($result) && isset($result['remoteUrl'])) {
|
2017-07-14 18:28:57 +03:00
|
|
|
return new JSONResponse(['message' => $this->l->t('Federated Share request sent, you will receive an invitation. Check your notifications.')]);
|
2016-07-13 12:32:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// if we doesn't get the expected response we assume that we try to add
|
|
|
|
// a federated share from a Nextcloud <= 9 server
|
|
|
|
return $this->legacyMountPublicLink($token, $remote, $password, $name, $owner, $ownerDisplayName);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Allow Nextcloud to mount a public link directly
|
|
|
|
*
|
|
|
|
* This code was copied from the apps/files_sharing/ajax/external.php with
|
|
|
|
* minimal changes, just to guarantee backward compatibility
|
|
|
|
*
|
|
|
|
* ToDo: Remove this method once Nextcloud 9 reaches end of life
|
|
|
|
*
|
|
|
|
* @param string $token
|
|
|
|
* @param string $remote
|
|
|
|
* @param string $password
|
|
|
|
* @param string $name
|
|
|
|
* @param string $owner
|
|
|
|
* @param string $ownerDisplayName
|
|
|
|
* @return JSONResponse
|
|
|
|
*/
|
|
|
|
private function legacyMountPublicLink($token, $remote, $password, $name, $owner, $ownerDisplayName) {
|
|
|
|
|
|
|
|
// Check for invalid name
|
2017-01-19 12:07:16 +03:00
|
|
|
if (!Util::isValidFileName($name)) {
|
2016-07-13 12:32:27 +03:00
|
|
|
return new JSONResponse(['message' => $this->l->t('The mountpoint name contains invalid characters.')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
$currentUser = $this->userSession->getUser()->getUID();
|
|
|
|
$currentServer = $this->addressHandler->generateRemoteURL();
|
2017-01-19 12:07:16 +03:00
|
|
|
if (Helper::isSameUserOnSameServer($owner, $remote, $currentUser, $currentServer)) {
|
2016-07-13 12:32:27 +03:00
|
|
|
return new JSONResponse(['message' => $this->l->t('Not allowed to create a federated share with the owner.')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
2017-01-19 12:07:16 +03:00
|
|
|
$externalManager = new Manager(
|
2016-07-13 12:32:27 +03:00
|
|
|
\OC::$server->getDatabaseConnection(),
|
2017-01-19 12:07:16 +03:00
|
|
|
Filesystem::getMountManager(),
|
|
|
|
Filesystem::getLoader(),
|
2016-08-23 10:10:53 +03:00
|
|
|
\OC::$server->getHTTPClientService(),
|
2016-07-13 12:32:27 +03:00
|
|
|
\OC::$server->getNotificationManager(),
|
2017-04-05 23:35:59 +03:00
|
|
|
\OC::$server->query(\OCP\OCS\IDiscoveryService::class),
|
2016-07-13 12:32:27 +03:00
|
|
|
\OC::$server->getUserSession()->getUser()->getUID()
|
|
|
|
);
|
|
|
|
|
|
|
|
// check for ssl cert
|
2017-01-19 12:07:16 +03:00
|
|
|
|
|
|
|
if (strpos($remote, 'https') === 0) {
|
2016-07-13 12:32:27 +03:00
|
|
|
try {
|
|
|
|
$client = $this->clientService->newClient();
|
|
|
|
$client->get($remote, [
|
|
|
|
'timeout' => 10,
|
|
|
|
'connect_timeout' => 10,
|
|
|
|
])->getBody();
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Invalid or untrusted SSL certificate')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$mount = $externalManager->addShare($remote, $token, $password, $name, $ownerDisplayName, true);
|
|
|
|
/**
|
|
|
|
* @var \OCA\Files_Sharing\External\Storage $storage
|
|
|
|
*/
|
|
|
|
$storage = $mount->getStorage();
|
|
|
|
try {
|
|
|
|
// check if storage exists
|
|
|
|
$storage->checkStorageAvailability();
|
2017-01-19 12:07:16 +03:00
|
|
|
} catch (StorageInvalidException $e) {
|
2016-07-13 12:32:27 +03:00
|
|
|
// note: checkStorageAvailability will already remove the invalid share
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::writeLog(
|
2016-07-13 12:32:27 +03:00
|
|
|
'federatedfilesharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::DEBUG
|
2016-07-13 12:32:27 +03:00
|
|
|
);
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Could not authenticate to remote share, password might be wrong')], Http::STATUS_BAD_REQUEST);
|
|
|
|
} catch (\Exception $e) {
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::writeLog(
|
2016-07-13 12:32:27 +03:00
|
|
|
'federatedfilesharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::DEBUG
|
2016-07-13 12:32:27 +03:00
|
|
|
);
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Storage not valid')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
$result = $storage->file_exists('');
|
|
|
|
if ($result) {
|
|
|
|
try {
|
|
|
|
$storage->getScanner()->scanAll();
|
|
|
|
return new JSONResponse(
|
|
|
|
[
|
2017-07-14 18:28:57 +03:00
|
|
|
'message' => $this->l->t('Federated share added'),
|
2016-07-13 12:32:27 +03:00
|
|
|
'legacyMount' => '1'
|
|
|
|
]
|
|
|
|
);
|
2017-01-19 12:07:16 +03:00
|
|
|
} catch (StorageInvalidException $e) {
|
|
|
|
Util::writeLog(
|
2016-07-13 12:32:27 +03:00
|
|
|
'federatedfilesharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::DEBUG
|
2016-07-13 12:32:27 +03:00
|
|
|
);
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Storage not valid')], Http::STATUS_BAD_REQUEST);
|
|
|
|
} catch (\Exception $e) {
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::writeLog(
|
2016-07-13 12:32:27 +03:00
|
|
|
'federatedfilesharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::DEBUG
|
2016-07-13 12:32:27 +03:00
|
|
|
);
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Couldn\'t add remote share')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::writeLog(
|
2016-07-13 12:32:27 +03:00
|
|
|
'federatedfilesharing',
|
|
|
|
'Couldn\'t add remote share',
|
2017-01-19 12:07:16 +03:00
|
|
|
Util::DEBUG
|
2016-07-13 12:32:27 +03:00
|
|
|
);
|
|
|
|
return new JSONResponse(['message' => $this->l->t('Couldn\'t add remote share')], Http::STATUS_BAD_REQUEST);
|
|
|
|
}
|
2016-07-12 19:48:00 +03:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-05-23 12:48:14 +03:00
|
|
|
}
|