2014-04-29 17:14:48 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Bjoern Schiessle <bjoern@schiessle.org>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2014-04-29 17:14:48 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
namespace OCA\Files_Sharing\External;
|
|
|
|
|
2016-03-09 00:13:00 +03:00
|
|
|
use GuzzleHttp\Exception\ClientException;
|
|
|
|
use GuzzleHttp\Exception\ConnectException;
|
2019-02-16 01:06:21 +03:00
|
|
|
use GuzzleHttp\Exception\RequestException;
|
2014-06-12 18:14:43 +04:00
|
|
|
use OC\Files\Storage\DAV;
|
2014-07-01 16:35:44 +04:00
|
|
|
use OC\ForbiddenException;
|
2014-04-29 17:14:48 +04:00
|
|
|
use OCA\Files_Sharing\ISharedStorage;
|
2016-06-27 22:34:28 +03:00
|
|
|
use OCP\AppFramework\Http;
|
2018-06-25 12:14:26 +03:00
|
|
|
use OCP\Constants;
|
2017-01-27 14:52:17 +03:00
|
|
|
use OCP\Federation\ICloudId;
|
2014-07-01 16:35:44 +04:00
|
|
|
use OCP\Files\NotFoundException;
|
2018-11-27 18:54:00 +03:00
|
|
|
use OCP\Files\Storage\IDisableEncryptionStorage;
|
2014-07-01 16:35:44 +04:00
|
|
|
use OCP\Files\StorageInvalidException;
|
|
|
|
use OCP\Files\StorageNotAvailableException;
|
2014-04-29 17:14:48 +04:00
|
|
|
|
2018-11-27 18:54:00 +03:00
|
|
|
class Storage extends DAV implements ISharedStorage, IDisableEncryptionStorage {
|
2017-01-27 14:52:17 +03:00
|
|
|
/** @var ICloudId */
|
|
|
|
private $cloudId;
|
2016-03-09 00:13:00 +03:00
|
|
|
/** @var string */
|
2014-04-29 17:14:48 +04:00
|
|
|
private $mountPoint;
|
2016-03-09 00:13:00 +03:00
|
|
|
/** @var string */
|
2014-05-19 18:39:57 +04:00
|
|
|
private $token;
|
2016-03-09 00:13:00 +03:00
|
|
|
/** @var \OCP\ICacheFactory */
|
2016-03-04 17:13:56 +03:00
|
|
|
private $memcacheFactory;
|
2016-03-09 00:13:00 +03:00
|
|
|
/** @var \OCP\Http\Client\IClientService */
|
|
|
|
private $httpClient;
|
|
|
|
/** @var bool */
|
2014-06-27 19:27:47 +04:00
|
|
|
private $updateChecked = false;
|
|
|
|
|
2014-07-01 16:58:07 +04:00
|
|
|
/**
|
|
|
|
* @var \OCA\Files_Sharing\External\Manager
|
|
|
|
*/
|
|
|
|
private $manager;
|
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
public function __construct($options) {
|
2016-03-04 17:13:56 +03:00
|
|
|
$this->memcacheFactory = \OC::$server->getMemCacheFactory();
|
2016-09-29 01:22:32 +03:00
|
|
|
$this->httpClient = $options['HttpClientService'];
|
2016-02-25 22:46:01 +03:00
|
|
|
|
2014-07-01 16:58:07 +04:00
|
|
|
$this->manager = $options['manager'];
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cloudId = $options['cloudId'];
|
2017-04-05 23:35:59 +03:00
|
|
|
$discoveryService = \OC::$server->query(\OCP\OCS\IDiscoveryService::class);
|
2017-03-10 17:37:21 +03:00
|
|
|
|
2017-01-27 14:52:17 +03:00
|
|
|
list($protocol, $remote) = explode('://', $this->cloudId->getRemote());
|
2014-07-23 15:45:56 +04:00
|
|
|
if (strpos($remote, '/')) {
|
|
|
|
list($host, $root) = explode('/', $remote, 2);
|
|
|
|
} else {
|
|
|
|
$host = $remote;
|
|
|
|
$root = '';
|
|
|
|
}
|
2014-04-29 17:14:48 +04:00
|
|
|
$secure = $protocol === 'https';
|
2017-03-10 17:37:21 +03:00
|
|
|
$federatedSharingEndpoints = $discoveryService->discover($this->cloudId->getRemote(), 'FEDERATED_SHARING');
|
|
|
|
$webDavEndpoint = isset($federatedSharingEndpoints['webdav']) ? $federatedSharingEndpoints['webdav'] : '/public.php/webdav';
|
|
|
|
$root = rtrim($root, '/') . $webDavEndpoint;
|
2014-04-29 17:14:48 +04:00
|
|
|
$this->mountPoint = $options['mountpoint'];
|
2014-05-19 18:39:57 +04:00
|
|
|
$this->token = $options['token'];
|
2017-03-10 17:37:21 +03:00
|
|
|
|
2020-03-26 11:30:18 +03:00
|
|
|
parent::__construct([
|
2014-04-29 17:14:48 +04:00
|
|
|
'secure' => $secure,
|
|
|
|
'host' => $host,
|
|
|
|
'root' => $root,
|
|
|
|
'user' => $options['token'],
|
2015-02-26 15:48:53 +03:00
|
|
|
'password' => (string)$options['password']
|
2020-03-26 11:30:18 +03:00
|
|
|
]);
|
2016-06-14 18:27:06 +03:00
|
|
|
}
|
2015-08-21 16:32:53 +03:00
|
|
|
|
2016-06-14 18:27:06 +03:00
|
|
|
public function getWatcher($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
|
|
|
if (!isset($this->watcher)) {
|
|
|
|
$this->watcher = new Watcher($storage);
|
|
|
|
$this->watcher->setPolicy(\OC\Files\Cache\Watcher::CHECK_ONCE);
|
|
|
|
}
|
|
|
|
return $this->watcher;
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function getRemoteUser() {
|
2017-01-27 14:52:17 +03:00
|
|
|
return $this->cloudId->getUser();
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function getRemote() {
|
2017-01-27 14:52:17 +03:00
|
|
|
return $this->cloudId->getRemote();
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
public function getMountPoint() {
|
|
|
|
return $this->mountPoint;
|
|
|
|
}
|
|
|
|
|
2014-05-19 18:39:57 +04:00
|
|
|
public function getToken() {
|
|
|
|
return $this->token;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getPassword() {
|
|
|
|
return $this->password;
|
|
|
|
}
|
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
/**
|
|
|
|
* @brief get id of the mount point
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getId() {
|
2017-01-27 14:52:17 +03:00
|
|
|
return 'shared::' . md5($this->token . '@' . $this->getRemote());
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
|
2014-06-12 19:23:34 +04:00
|
|
|
public function getCache($path = '', $storage = null) {
|
2015-01-20 14:38:54 +03:00
|
|
|
if (is_null($this->cache)) {
|
2017-01-27 14:52:17 +03:00
|
|
|
$this->cache = new Cache($this, $this->cloudId);
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
return $this->cache;
|
|
|
|
}
|
|
|
|
|
2014-05-19 18:39:57 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
2014-06-12 19:23:34 +04:00
|
|
|
* @param \OC\Files\Storage\Storage $storage
|
2014-05-19 18:39:57 +04:00
|
|
|
* @return \OCA\Files_Sharing\External\Scanner
|
|
|
|
*/
|
2014-06-12 19:23:34 +04:00
|
|
|
public function getScanner($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2014-05-19 18:39:57 +04:00
|
|
|
if (!isset($this->scanner)) {
|
2014-06-12 19:23:34 +04:00
|
|
|
$this->scanner = new Scanner($storage);
|
2014-05-19 18:39:57 +04:00
|
|
|
}
|
|
|
|
return $this->scanner;
|
|
|
|
}
|
2014-06-27 19:27:47 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param int $time
|
2014-07-01 16:35:44 +04:00
|
|
|
* @throws \OCP\Files\StorageNotAvailableException
|
|
|
|
* @throws \OCP\Files\StorageInvalidException
|
2014-06-27 19:27:47 +04:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function hasUpdated($path, $time) {
|
2014-06-27 19:31:51 +04:00
|
|
|
// since for owncloud webdav servers we can rely on etag propagation we only need to check the root of the storage
|
|
|
|
// because of that we only do one check for the entire storage per request
|
2014-06-27 19:27:47 +04:00
|
|
|
if ($this->updateChecked) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$this->updateChecked = true;
|
2014-07-01 16:35:44 +04:00
|
|
|
try {
|
|
|
|
return parent::hasUpdated('', $time);
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (StorageInvalidException $e) {
|
|
|
|
// check if it needs to be removed
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
2014-07-01 16:35:44 +04:00
|
|
|
} catch (StorageNotAvailableException $e) {
|
2015-01-20 21:45:32 +03:00
|
|
|
// check if it needs to be removed or just temp unavailable
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-27 22:34:28 +03:00
|
|
|
public function test() {
|
|
|
|
try {
|
2016-09-06 13:57:14 +03:00
|
|
|
return parent::test();
|
2016-06-27 22:34:28 +03:00
|
|
|
} catch (StorageInvalidException $e) {
|
|
|
|
// check if it needs to be removed
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
|
|
|
} catch (StorageNotAvailableException $e) {
|
|
|
|
// check if it needs to be removed or just temp unavailable
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-20 21:45:32 +03:00
|
|
|
/**
|
|
|
|
* Check whether this storage is permanently or temporarily
|
|
|
|
* unavailable
|
|
|
|
*
|
|
|
|
* @throws \OCP\Files\StorageNotAvailableException
|
|
|
|
* @throws \OCP\Files\StorageInvalidException
|
|
|
|
*/
|
|
|
|
public function checkStorageAvailability() {
|
|
|
|
// see if we can find out why the share is unavailable
|
|
|
|
try {
|
|
|
|
$this->getShareInfo();
|
|
|
|
} catch (NotFoundException $e) {
|
2017-04-12 07:16:27 +03:00
|
|
|
// a 404 can either mean that the share no longer exists or there is no Nextcloud on the remote
|
2015-01-20 21:45:32 +03:00
|
|
|
if ($this->testRemote()) {
|
2017-04-12 07:16:27 +03:00
|
|
|
// valid Nextcloud instance means that the public share no longer exists
|
2015-01-20 21:45:32 +03:00
|
|
|
// since this is permanent (re-sharing the file will create a new token)
|
|
|
|
// we remove the invalid storage
|
|
|
|
$this->manager->removeShare($this->mountPoint);
|
|
|
|
$this->manager->getMountManager()->removeMount($this->mountPoint);
|
|
|
|
throw new StorageInvalidException();
|
|
|
|
} else {
|
2017-04-12 07:16:27 +03:00
|
|
|
// Nextcloud instance is gone, likely to be a temporary server configuration error
|
2015-07-01 12:14:03 +03:00
|
|
|
throw new StorageNotAvailableException();
|
2014-07-01 16:35:44 +04:00
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
// auth error, remove share for now (provide a dialog in the future)
|
|
|
|
$this->manager->removeShare($this->mountPoint);
|
|
|
|
$this->manager->getMountManager()->removeMount($this->mountPoint);
|
|
|
|
throw new StorageInvalidException();
|
2015-04-10 12:55:58 +03:00
|
|
|
} catch (\GuzzleHttp\Exception\ConnectException $e) {
|
|
|
|
throw new StorageNotAvailableException();
|
2015-04-09 19:55:28 +03:00
|
|
|
} catch (\GuzzleHttp\Exception\RequestException $e) {
|
2015-07-01 12:14:03 +03:00
|
|
|
throw new StorageNotAvailableException();
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (\Exception $e) {
|
2014-07-01 16:35:44 +04:00
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-17 18:09:41 +03:00
|
|
|
public function file_exists($path) {
|
|
|
|
if ($path === '') {
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return parent::file_exists($path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-01 16:35:44 +04:00
|
|
|
/**
|
2016-02-29 17:17:06 +03:00
|
|
|
* check if the configured remote is a valid federated share provider
|
2014-07-01 16:35:44 +04:00
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function testRemote() {
|
|
|
|
try {
|
2017-01-27 14:52:17 +03:00
|
|
|
return $this->testRemoteUrl($this->getRemote() . '/ocs-provider/index.php')
|
|
|
|
|| $this->testRemoteUrl($this->getRemote() . '/ocs-provider/')
|
|
|
|
|| $this->testRemoteUrl($this->getRemote() . '/status.php');
|
2014-07-01 16:35:44 +04:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-04 17:13:56 +03:00
|
|
|
/**
|
|
|
|
* @param string $url
|
|
|
|
* @return bool
|
|
|
|
*/
|
2016-02-29 17:17:06 +03:00
|
|
|
private function testRemoteUrl($url) {
|
2017-12-15 13:31:13 +03:00
|
|
|
$cache = $this->memcacheFactory->createDistributed('files_sharing_remote_url');
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($cache->hasKey($url)) {
|
2016-03-09 01:24:44 +03:00
|
|
|
return (bool)$cache->get($url);
|
2016-03-04 17:13:56 +03:00
|
|
|
}
|
|
|
|
|
2016-03-09 00:13:00 +03:00
|
|
|
$client = $this->httpClient->newClient();
|
|
|
|
try {
|
2016-06-15 17:30:24 +03:00
|
|
|
$result = $client->get($url, [
|
2016-06-21 18:37:44 +03:00
|
|
|
'timeout' => 10,
|
|
|
|
'connect_timeout' => 10,
|
2016-06-15 17:30:24 +03:00
|
|
|
])->getBody();
|
2016-03-09 00:13:00 +03:00
|
|
|
$data = json_decode($result);
|
|
|
|
$returnValue = (is_object($data) && !empty($data->version));
|
|
|
|
} catch (ConnectException $e) {
|
|
|
|
$returnValue = false;
|
|
|
|
} catch (ClientException $e) {
|
|
|
|
$returnValue = false;
|
2019-02-16 01:06:21 +03:00
|
|
|
} catch (RequestException $e) {
|
|
|
|
$returnValue = false;
|
2016-03-09 00:13:00 +03:00
|
|
|
}
|
|
|
|
|
2017-12-13 16:51:48 +03:00
|
|
|
$cache->set($url, $returnValue, 60*60*24);
|
2016-03-04 17:13:56 +03:00
|
|
|
return $returnValue;
|
2016-02-29 17:17:06 +03:00
|
|
|
}
|
|
|
|
|
2016-03-01 08:49:35 +03:00
|
|
|
/**
|
2017-04-12 07:16:27 +03:00
|
|
|
* Whether the remote is an ownCloud/Nextcloud, used since some sharing features are not
|
2016-03-01 08:49:35 +03:00
|
|
|
* standardized. Let's use this to detect whether to use it.
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
2016-03-09 12:36:45 +03:00
|
|
|
public function remoteIsOwnCloud() {
|
2020-04-10 15:19:56 +03:00
|
|
|
if (defined('PHPUNIT_RUN') || !$this->testRemoteUrl($this->getRemote() . '/status.php')) {
|
2016-03-01 08:49:35 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-03-16 13:28:23 +03:00
|
|
|
/**
|
|
|
|
* @return mixed
|
|
|
|
* @throws ForbiddenException
|
|
|
|
* @throws NotFoundException
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2014-07-01 16:35:44 +04:00
|
|
|
public function getShareInfo() {
|
|
|
|
$remote = $this->getRemote();
|
|
|
|
$token = $this->getToken();
|
|
|
|
$password = $this->getPassword();
|
2016-03-01 08:12:38 +03:00
|
|
|
|
|
|
|
// If remote is not an ownCloud do not try to get any share info
|
2020-04-10 15:19:56 +03:00
|
|
|
if (!$this->remoteIsOwnCloud()) {
|
2016-03-01 08:12:38 +03:00
|
|
|
return ['status' => 'unsupported'];
|
|
|
|
}
|
|
|
|
|
2015-01-26 18:19:38 +03:00
|
|
|
$url = rtrim($remote, '/') . '/index.php/apps/files_sharing/shareinfo?t=' . $token;
|
2014-07-01 16:35:44 +04:00
|
|
|
|
2015-03-16 13:28:23 +03:00
|
|
|
// TODO: DI
|
|
|
|
$client = \OC::$server->getHTTPClientService()->newClient();
|
2015-04-10 13:12:05 +03:00
|
|
|
try {
|
2016-06-15 17:30:24 +03:00
|
|
|
$response = $client->post($url, [
|
|
|
|
'body' => ['password' => $password],
|
2016-06-21 18:37:44 +03:00
|
|
|
'timeout' => 10,
|
|
|
|
'connect_timeout' => 10,
|
2016-06-15 17:30:24 +03:00
|
|
|
]);
|
2015-04-10 13:12:05 +03:00
|
|
|
} catch (\GuzzleHttp\Exception\RequestException $e) {
|
2016-06-27 22:34:28 +03:00
|
|
|
if ($e->getCode() === Http::STATUS_UNAUTHORIZED || $e->getCode() === Http::STATUS_FORBIDDEN) {
|
2015-11-18 19:08:02 +03:00
|
|
|
throw new ForbiddenException();
|
2015-04-10 13:12:05 +03:00
|
|
|
}
|
2016-06-27 22:34:28 +03:00
|
|
|
if ($e->getCode() === Http::STATUS_NOT_FOUND) {
|
2016-02-18 13:57:03 +03:00
|
|
|
throw new NotFoundException();
|
|
|
|
}
|
2015-07-01 12:14:03 +03:00
|
|
|
// throw this to be on the safe side: the share will still be visible
|
|
|
|
// in the UI in case the failure is intermittent, and the user will
|
|
|
|
// be able to decide whether to remove it if it's really gone
|
2015-07-13 19:51:25 +03:00
|
|
|
throw new StorageNotAvailableException();
|
2014-07-01 16:35:44 +04:00
|
|
|
}
|
|
|
|
|
2015-03-16 13:28:23 +03:00
|
|
|
return json_decode($response->getBody(), true);
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
2015-11-18 19:08:02 +03:00
|
|
|
|
|
|
|
public function getOwner($path) {
|
2017-01-27 14:52:17 +03:00
|
|
|
return $this->cloudId->getDisplayId();
|
2015-11-18 19:08:02 +03:00
|
|
|
}
|
2015-12-08 15:02:57 +03:00
|
|
|
|
|
|
|
public function isSharable($path) {
|
|
|
|
if (\OCP\Util::isSharingDisabledForUser() || !\OC\Share\Share::isResharingAllowed()) {
|
|
|
|
return false;
|
|
|
|
}
|
2018-06-25 12:14:26 +03:00
|
|
|
return ($this->getPermissions($path) & Constants::PERMISSION_SHARE);
|
2015-12-08 15:02:57 +03:00
|
|
|
}
|
2017-03-10 17:37:21 +03:00
|
|
|
|
2016-04-13 18:31:47 +03:00
|
|
|
public function getPermissions($path) {
|
|
|
|
$response = $this->propfind($path);
|
2018-06-25 12:14:26 +03:00
|
|
|
// old federated sharing permissions
|
2016-04-13 18:31:47 +03:00
|
|
|
if (isset($response['{http://open-collaboration-services.org/ns}share-permissions'])) {
|
|
|
|
$permissions = $response['{http://open-collaboration-services.org/ns}share-permissions'];
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (isset($response['{http://open-cloud-mesh.org/ns}share-permissions'])) {
|
2018-06-25 12:14:26 +03:00
|
|
|
// permissions provided by the OCM API
|
2020-06-26 00:42:24 +03:00
|
|
|
$permissions = $this->ocmPermissions2ncPermissions($response['{http://open-collaboration-services.org/ns}share-permissions'], $path);
|
2016-04-13 18:31:47 +03:00
|
|
|
} else {
|
|
|
|
// use default permission if remote server doesn't provide the share permissions
|
2018-06-25 12:14:26 +03:00
|
|
|
$permissions = $this->getDefaultPermissions($path);
|
2016-04-13 18:31:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $permissions;
|
|
|
|
}
|
2015-12-08 15:02:57 +03:00
|
|
|
|
2018-04-30 13:27:45 +03:00
|
|
|
public function needsPartFile() {
|
|
|
|
return false;
|
|
|
|
}
|
2018-06-25 12:14:26 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* translate OCM Permissions to Nextcloud permissions
|
|
|
|
*
|
|
|
|
* @param string $ocmPermissions json encoded OCM permissions
|
|
|
|
* @param string $path path to file
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function ocmPermissions2ncPermissions($ocmPermissions, $path) {
|
|
|
|
try {
|
|
|
|
$ocmPermissions = json_decode($ocmPermissions);
|
|
|
|
$ncPermissions = 0;
|
2020-04-10 15:19:56 +03:00
|
|
|
foreach ($ocmPermissions as $permission) {
|
2018-06-25 12:14:26 +03:00
|
|
|
switch (strtolower($permission)) {
|
|
|
|
case 'read':
|
|
|
|
$ncPermissions += Constants::PERMISSION_READ;
|
|
|
|
break;
|
|
|
|
case 'write':
|
|
|
|
$ncPermissions += Constants::PERMISSION_CREATE + Constants::PERMISSION_UPDATE;
|
|
|
|
break;
|
|
|
|
case 'share':
|
|
|
|
$ncPermissions += Constants::PERMISSION_SHARE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw new \Exception();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
$ncPermissions = $this->getDefaultPermissions($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $ncPermissions;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* calculate default permissions in case no permissions are provided
|
|
|
|
*
|
|
|
|
* @param $path
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function getDefaultPermissions($path) {
|
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
$permissions = Constants::PERMISSION_ALL;
|
|
|
|
} else {
|
|
|
|
$permissions = Constants::PERMISSION_ALL & ~Constants::PERMISSION_CREATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $permissions;
|
|
|
|
}
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|