2015-03-31 17:23:31 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2020-08-24 15:54:25 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-04-07 18:02:49 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2015-03-31 17:23:31 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* @license AGPL-3.0
|
2015-03-31 17:23:31 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2015-03-31 17:23:31 +03:00
|
|
|
*
|
2015-04-07 18:02:49 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2015-03-31 17:23:31 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-04-07 18:02:49 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-31 17:23:31 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Encryption;
|
|
|
|
|
2016-06-10 14:02:41 +03:00
|
|
|
use OC\Cache\CappedMemoryCache;
|
2016-10-19 22:27:34 +03:00
|
|
|
use OCP\Files\IRootFolder;
|
|
|
|
use OCP\Files\NotFoundException;
|
|
|
|
use OCP\Share\IManager;
|
2016-06-10 14:02:41 +03:00
|
|
|
|
2015-03-31 17:23:31 +03:00
|
|
|
class File implements \OCP\Encryption\IFile {
|
|
|
|
|
|
|
|
/** @var Util */
|
|
|
|
protected $util;
|
|
|
|
|
2016-10-19 22:27:34 +03:00
|
|
|
/** @var IRootFolder */
|
|
|
|
private $rootFolder;
|
|
|
|
|
|
|
|
/** @var IManager */
|
|
|
|
private $shareManager;
|
|
|
|
|
2015-08-17 13:53:24 +03:00
|
|
|
/**
|
|
|
|
* cache results of already checked folders
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $cache;
|
|
|
|
|
2016-10-19 22:27:34 +03:00
|
|
|
public function __construct(Util $util,
|
|
|
|
IRootFolder $rootFolder,
|
|
|
|
IManager $shareManager) {
|
2015-03-31 17:23:31 +03:00
|
|
|
$this->util = $util;
|
2016-06-10 14:02:41 +03:00
|
|
|
$this->cache = new CappedMemoryCache();
|
2016-10-19 22:27:34 +03:00
|
|
|
$this->rootFolder = $rootFolder;
|
|
|
|
$this->shareManager = $shareManager;
|
2015-03-31 17:23:31 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get list of users with access to the file
|
|
|
|
*
|
2015-04-01 13:31:28 +03:00
|
|
|
* @param string $path to the file
|
2015-04-23 17:48:11 +03:00
|
|
|
* @return array ['users' => $uniqueUserIds, 'public' => $public]
|
2015-03-31 17:23:31 +03:00
|
|
|
*/
|
|
|
|
public function getAccessList($path) {
|
|
|
|
|
|
|
|
// Make sure that a share key is generated for the owner too
|
2021-01-12 12:15:48 +03:00
|
|
|
[$owner, $ownerPath] = $this->util->getUidAndFilename($path);
|
2015-03-31 17:23:31 +03:00
|
|
|
|
|
|
|
// always add owner to the list of users with access to the file
|
2020-03-26 11:30:18 +03:00
|
|
|
$userIds = [$owner];
|
2015-03-31 17:23:31 +03:00
|
|
|
|
2015-04-23 17:48:11 +03:00
|
|
|
if (!$this->util->isFile($owner . '/' . $ownerPath)) {
|
2020-03-26 11:30:18 +03:00
|
|
|
return ['users' => $userIds, 'public' => false];
|
2015-03-31 17:23:31 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$ownerPath = substr($ownerPath, strlen('/files'));
|
2016-10-19 22:27:34 +03:00
|
|
|
$userFolder = $this->rootFolder->getUserFolder($owner);
|
|
|
|
try {
|
|
|
|
$file = $userFolder->get($ownerPath);
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
$file = null;
|
|
|
|
}
|
2015-03-31 17:23:31 +03:00
|
|
|
$ownerPath = $this->util->stripPartialFileExtension($ownerPath);
|
|
|
|
|
2015-08-17 13:53:24 +03:00
|
|
|
// first get the shares for the parent and cache the result so that we don't
|
|
|
|
// need to check all parents for every file
|
|
|
|
$parent = dirname($ownerPath);
|
2016-10-19 22:27:34 +03:00
|
|
|
$parentNode = $userFolder->get($parent);
|
2015-08-17 13:53:24 +03:00
|
|
|
if (isset($this->cache[$parent])) {
|
|
|
|
$resultForParents = $this->cache[$parent];
|
|
|
|
} else {
|
2016-10-19 22:27:34 +03:00
|
|
|
$resultForParents = $this->shareManager->getAccessList($parentNode);
|
2015-08-17 13:53:24 +03:00
|
|
|
$this->cache[$parent] = $resultForParents;
|
|
|
|
}
|
2017-03-28 11:51:44 +03:00
|
|
|
$userIds = array_merge($userIds, $resultForParents['users']);
|
2017-04-11 13:40:36 +03:00
|
|
|
$public = $resultForParents['public'] || $resultForParents['remote'];
|
2015-08-17 13:53:24 +03:00
|
|
|
|
|
|
|
|
2015-03-31 17:23:31 +03:00
|
|
|
// Find out who, if anyone, is sharing the file
|
2016-10-19 22:27:34 +03:00
|
|
|
if ($file !== null) {
|
|
|
|
$resultForFile = $this->shareManager->getAccessList($file, false);
|
2017-03-20 16:22:06 +03:00
|
|
|
$userIds = array_merge($userIds, $resultForFile['users']);
|
2017-04-11 13:40:36 +03:00
|
|
|
$public = $resultForFile['public'] || $resultForFile['remote'] || $public;
|
2016-10-19 22:27:34 +03:00
|
|
|
}
|
2015-03-31 17:23:31 +03:00
|
|
|
|
|
|
|
// check if it is a group mount
|
|
|
|
if (\OCP\App::isEnabled("files_external")) {
|
2020-07-10 00:39:58 +03:00
|
|
|
$mounts = \OCA\Files_External\MountConfig::getSystemMountPoints();
|
2015-03-31 17:23:31 +03:00
|
|
|
foreach ($mounts as $mount) {
|
|
|
|
if ($mount['mountpoint'] == substr($ownerPath, 1, strlen($mount['mountpoint']))) {
|
|
|
|
$mountedFor = $this->util->getUserWithAccessToMountPoint($mount['applicable']['users'], $mount['applicable']['groups']);
|
|
|
|
$userIds = array_merge($userIds, $mountedFor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove duplicate UIDs
|
|
|
|
$uniqueUserIds = array_unique($userIds);
|
|
|
|
|
2020-03-26 11:30:18 +03:00
|
|
|
return ['users' => $uniqueUserIds, 'public' => $public];
|
2015-03-31 17:23:31 +03:00
|
|
|
}
|
2015-04-01 13:31:28 +03:00
|
|
|
}
|