Merge pull request #8026 from owncloud/remove_shared_folder
remove the "Shared" folder
This commit is contained in:
commit
f520305848
|
@ -235,7 +235,7 @@ OC.Upload = {
|
|||
var file = data.files[0];
|
||||
try {
|
||||
// FIXME: not so elegant... need to refactor that method to return a value
|
||||
Files.isFileNameValid(file.name, FileList.getCurrentDirectory());
|
||||
Files.isFileNameValid(file.name);
|
||||
}
|
||||
catch (errorMessage) {
|
||||
data.textStatus = 'invalidcharacters';
|
||||
|
@ -555,8 +555,6 @@ OC.Upload = {
|
|||
throw t('files', 'URL cannot be empty');
|
||||
} else if (type !== 'web' && !Files.isFileNameValid(filename)) {
|
||||
// Files.isFileNameValid(filename) throws an exception itself
|
||||
} else if (FileList.getCurrentDirectory() === '/' && filename.toLowerCase() === 'shared') {
|
||||
throw t('files', 'In the home folder \'Shared\' is a reserved filename');
|
||||
} else if (FileList.inList(filename)) {
|
||||
throw t('files', '{new_name} already exists', {new_name: filename});
|
||||
} else {
|
||||
|
|
|
@ -118,10 +118,6 @@ var FileActions = {
|
|||
};
|
||||
|
||||
var addAction = function (name, action, displayName) {
|
||||
// NOTE: Temporary fix to prevent rename action in root of Shared directory
|
||||
if (name === 'Rename' && $('#dir').val() === '/Shared') {
|
||||
return true;
|
||||
}
|
||||
|
||||
if ((name === 'Download' || action !== defaultAction) && name !== 'Delete') {
|
||||
|
||||
|
@ -160,7 +156,7 @@ var FileActions = {
|
|||
addAction(name, ah, displayName);
|
||||
}
|
||||
});
|
||||
if(actions.Share && !($('#dir').val() === '/' && file === 'Shared')){
|
||||
if(actions.Share){
|
||||
displayName = t('files', 'Share');
|
||||
addAction('Share', actions.Share, displayName);
|
||||
}
|
||||
|
|
|
@ -178,6 +178,13 @@ window.FileList = {
|
|||
if (type === 'dir') {
|
||||
mime = mime || 'httpd/unix-directory';
|
||||
}
|
||||
|
||||
// user should always be able to rename a share mount point
|
||||
var allowRename = 0;
|
||||
if (fileData.isShareMountPoint) {
|
||||
allowRename = OC.PERMISSION_UPDATE;
|
||||
}
|
||||
|
||||
//containing tr
|
||||
var tr = $('<tr></tr>').attr({
|
||||
"data-id" : fileData.id,
|
||||
|
@ -187,7 +194,7 @@ window.FileList = {
|
|||
"data-mime": mime,
|
||||
"data-mtime": mtime,
|
||||
"data-etag": fileData.etag,
|
||||
"data-permissions": fileData.permissions || this.getDirectoryPermissions()
|
||||
"data-permissions": fileData.permissions | allowRename || this.getDirectoryPermissions()
|
||||
});
|
||||
|
||||
if (type === 'dir') {
|
||||
|
@ -283,6 +290,10 @@ window.FileList = {
|
|||
mime = fileData.mimetype,
|
||||
permissions = parseInt(fileData.permissions, 10) || 0;
|
||||
|
||||
if (fileData.isShareMountPoint) {
|
||||
permissions = permissions | OC.PERMISSION_UPDATE;
|
||||
}
|
||||
|
||||
if (type === 'dir') {
|
||||
mime = mime || 'httpd/unix-directory';
|
||||
}
|
||||
|
@ -581,7 +592,7 @@ window.FileList = {
|
|||
var filename = input.val();
|
||||
if (filename !== oldname) {
|
||||
// Files.isFileNameValid(filename) throws an exception itself
|
||||
Files.isFileNameValid(filename, FileList.getCurrentDirectory());
|
||||
Files.isFileNameValid(filename);
|
||||
if (FileList.inList(filename)) {
|
||||
throw t('files', '{new_name} already exists', {new_name: filename});
|
||||
}
|
||||
|
|
|
@ -87,11 +87,9 @@ var Files = {
|
|||
* Throws a string exception with an error message if
|
||||
* the file name is not valid
|
||||
*/
|
||||
isFileNameValid: function (name, root) {
|
||||
isFileNameValid: function (name) {
|
||||
var trimmedName = name.trim();
|
||||
if (trimmedName === '.'
|
||||
|| trimmedName === '..'
|
||||
|| (root === '/' && trimmedName.toLowerCase() === 'shared'))
|
||||
if (trimmedName === '.' || trimmedName === '..')
|
||||
{
|
||||
throw t('files', '"{name}" is an invalid file name.', {name: name});
|
||||
} else if (trimmedName.length === 0) {
|
||||
|
|
|
@ -54,13 +54,8 @@ class App {
|
|||
'data' => NULL
|
||||
);
|
||||
|
||||
// rename to "/Shared" is denied
|
||||
if( $dir === '/' and $newname === 'Shared' ) {
|
||||
$result['data'] = array(
|
||||
'message' => $this->l10n->t("Invalid folder name. Usage of 'Shared' is reserved.")
|
||||
);
|
||||
// rename to non-existing folder is denied
|
||||
} else if (!$this->view->file_exists($dir)) {
|
||||
if (!$this->view->file_exists($dir)) {
|
||||
$result['data'] = array('message' => (string)$this->l10n->t(
|
||||
'The target folder has been moved or deleted.',
|
||||
array($dir)),
|
||||
|
@ -77,8 +72,6 @@ class App {
|
|||
} else if (
|
||||
// rename to "." is denied
|
||||
$newname !== '.' and
|
||||
// rename of "/Shared" is denied
|
||||
!($dir === '/' and $oldname === 'Shared') and
|
||||
// THEN try to rename
|
||||
$this->view->rename($dir . '/' . $oldname, $dir . '/' . $newname)
|
||||
) {
|
||||
|
|
|
@ -37,8 +37,7 @@ class Helper
|
|||
$sid = explode(':', $sid);
|
||||
if ($sid[0] === 'shared') {
|
||||
$icon = \OC_Helper::mimetypeIcon('dir-shared');
|
||||
}
|
||||
if ($sid[0] !== 'local' and $sid[0] !== 'home') {
|
||||
} elseif ($sid[0] !== 'local' and $sid[0] !== 'home') {
|
||||
$icon = \OC_Helper::mimetypeIcon('dir-external');
|
||||
}
|
||||
}
|
||||
|
@ -97,6 +96,9 @@ class Helper
|
|||
if (isset($i['displayname_owner'])) {
|
||||
$entry['shareOwner'] = $i['displayname_owner'];
|
||||
}
|
||||
if (isset($i['is_share_mount_point'])) {
|
||||
$entry['isShareMountPoint'] = $i['is_share_mount_point'];
|
||||
}
|
||||
return $entry;
|
||||
}
|
||||
|
||||
|
|
|
@ -55,88 +55,6 @@ class Test_OC_Files_App_Rename extends \PHPUnit_Framework_TestCase {
|
|||
\OC\Files\Filesystem::tearDown();
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief test rename of file/folder named "Shared"
|
||||
*/
|
||||
function testRenameSharedFolder() {
|
||||
$dir = '/';
|
||||
$oldname = 'Shared';
|
||||
$newname = 'new_name';
|
||||
|
||||
$this->viewMock->expects($this->at(0))
|
||||
->method('file_exists')
|
||||
->with('/')
|
||||
->will($this->returnValue(true));
|
||||
|
||||
$result = $this->files->rename($dir, $oldname, $newname);
|
||||
$expected = array(
|
||||
'success' => false,
|
||||
'data' => array('message' => '%s could not be renamed')
|
||||
);
|
||||
|
||||
$this->assertEquals($expected, $result);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief test rename of file/folder named "Shared"
|
||||
*/
|
||||
function testRenameSharedFolderInSubdirectory() {
|
||||
$dir = '/test';
|
||||
$oldname = 'Shared';
|
||||
$newname = 'new_name';
|
||||
|
||||
$this->viewMock->expects($this->at(0))
|
||||
->method('file_exists')
|
||||
->with('/test')
|
||||
->will($this->returnValue(true));
|
||||
|
||||
$this->viewMock->expects($this->any())
|
||||
->method('getFileInfo')
|
||||
->will($this->returnValue(new \OC\Files\FileInfo(
|
||||
'/test',
|
||||
null,
|
||||
'/test',
|
||||
array(
|
||||
'fileid' => 123,
|
||||
'type' => 'dir',
|
||||
'mimetype' => 'httpd/unix-directory',
|
||||
'mtime' => 0,
|
||||
'permissions' => 31,
|
||||
'size' => 18,
|
||||
'etag' => 'abcdef',
|
||||
'directory' => '/',
|
||||
'name' => 'new_name',
|
||||
))));
|
||||
|
||||
$result = $this->files->rename($dir, $oldname, $newname);
|
||||
|
||||
$this->assertTrue($result['success']);
|
||||
$this->assertEquals(123, $result['data']['id']);
|
||||
$this->assertEquals('new_name', $result['data']['name']);
|
||||
$this->assertEquals(18, $result['data']['size']);
|
||||
$this->assertEquals('httpd/unix-directory', $result['data']['mimetype']);
|
||||
$icon = \OC_Helper::mimetypeIcon('dir');
|
||||
$icon = substr($icon, 0, -3) . 'svg';
|
||||
$this->assertEquals($icon, $result['data']['icon']);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief test rename of file/folder to "Shared"
|
||||
*/
|
||||
function testRenameFolderToShared() {
|
||||
$dir = '/';
|
||||
$oldname = 'oldname';
|
||||
$newname = 'Shared';
|
||||
|
||||
$result = $this->files->rename($dir, $oldname, $newname);
|
||||
$expected = array(
|
||||
'success' => false,
|
||||
'data' => array('message' => "Invalid folder name. Usage of 'Shared' is reserved.")
|
||||
);
|
||||
|
||||
$this->assertEquals($expected, $result);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief test rename of file/folder
|
||||
*/
|
||||
|
|
|
@ -48,41 +48,6 @@ describe('Files tests', function() {
|
|||
expect(error).toEqual(false);
|
||||
}
|
||||
});
|
||||
it('Validates correct file names do not create Shared folder in root', function() {
|
||||
// create shared file in subfolder
|
||||
var error = false;
|
||||
try {
|
||||
expect(Files.isFileNameValid('shared', '/foo')).toEqual(true);
|
||||
expect(Files.isFileNameValid('Shared', '/foo')).toEqual(true);
|
||||
}
|
||||
catch (e) {
|
||||
error = e;
|
||||
}
|
||||
expect(error).toEqual(false);
|
||||
|
||||
// create shared file in root
|
||||
var threwException = false;
|
||||
try {
|
||||
Files.isFileNameValid('Shared', '/');
|
||||
console.error('Invalid file name not detected');
|
||||
}
|
||||
catch (e) {
|
||||
threwException = true;
|
||||
}
|
||||
expect(threwException).toEqual(true);
|
||||
|
||||
// create shared file in root
|
||||
var threwException = false;
|
||||
try {
|
||||
Files.isFileNameValid('shared', '/');
|
||||
console.error('Invalid file name not detected');
|
||||
}
|
||||
catch (e) {
|
||||
threwException = true;
|
||||
}
|
||||
expect(threwException).toEqual(true);
|
||||
|
||||
});
|
||||
it('Detects invalid file names', function() {
|
||||
var fileNames = [
|
||||
'',
|
||||
|
|
|
@ -302,25 +302,6 @@ class Hooks {
|
|||
*/
|
||||
public static function postShared($params) {
|
||||
|
||||
// NOTE: $params has keys:
|
||||
// [itemType] => file
|
||||
// itemSource -> int, filecache file ID
|
||||
// [parent] =>
|
||||
// [itemTarget] => /13
|
||||
// shareWith -> string, uid of user being shared to
|
||||
// fileTarget -> path of file being shared
|
||||
// uidOwner -> owner of the original file being shared
|
||||
// [shareType] => 0
|
||||
// [shareWith] => test1
|
||||
// [uidOwner] => admin
|
||||
// [permissions] => 17
|
||||
// [fileSource] => 13
|
||||
// [fileTarget] => /test8
|
||||
// [id] => 10
|
||||
// [token] =>
|
||||
// [run] => whether emitting script should continue to run
|
||||
// TODO: Should other kinds of item be encrypted too?
|
||||
|
||||
if (\OCP\App::isEnabled('files_encryption') === false) {
|
||||
return true;
|
||||
}
|
||||
|
@ -331,71 +312,22 @@ class Hooks {
|
|||
$session = new \OCA\Encryption\Session($view);
|
||||
$userId = \OCP\User::getUser();
|
||||
$util = new Util($view, $userId);
|
||||
$path = $util->fileIdToPath($params['itemSource']);
|
||||
|
||||
$share = $util->getParentFromShare($params['id']);
|
||||
//if parent is set, then this is a re-share action
|
||||
if ($share['parent'] !== null) {
|
||||
|
||||
// get the parent from current share
|
||||
$parent = $util->getShareParent($params['parent']);
|
||||
|
||||
// if parent has the same type than the child it is a 1:1 share
|
||||
if ($parent['item_type'] === $params['itemType']) {
|
||||
|
||||
// prefix path with Shared
|
||||
$path = '/Shared' . $parent['file_target'];
|
||||
} else {
|
||||
|
||||
// NOTE: parent is folder but shared was a file!
|
||||
// we try to rebuild the missing path
|
||||
// some examples we face here
|
||||
// user1 share folder1 with user2 folder1 has
|
||||
// the following structure
|
||||
// /folder1/subfolder1/subsubfolder1/somefile.txt
|
||||
// user2 re-share subfolder2 with user3
|
||||
// user3 re-share somefile.txt user4
|
||||
// so our path should be
|
||||
// /Shared/subfolder1/subsubfolder1/somefile.txt
|
||||
// while user3 is sharing
|
||||
|
||||
if ($params['itemType'] === 'file') {
|
||||
// get target path
|
||||
$targetPath = $util->fileIdToPath($params['fileSource']);
|
||||
$targetPathSplit = array_reverse(explode('/', $targetPath));
|
||||
|
||||
// init values
|
||||
$path = '';
|
||||
$sharedPart = ltrim($parent['file_target'], '/');
|
||||
|
||||
// rebuild path
|
||||
foreach ($targetPathSplit as $pathPart) {
|
||||
if ($pathPart !== $sharedPart) {
|
||||
$path = '/' . $pathPart . $path;
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
// prefix path with Shared
|
||||
$path = '/Shared' . $parent['file_target'] . $path;
|
||||
} else {
|
||||
// prefix path with Shared
|
||||
$path = '/Shared' . $parent['file_target'] . $params['fileTarget'];
|
||||
}
|
||||
}
|
||||
}
|
||||
$path = \OC\Files\Filesystem::getPath($params['fileSource']);
|
||||
|
||||
$sharingEnabled = \OCP\Share::isEnabled();
|
||||
|
||||
// get the path including mount point only if not a shared folder
|
||||
if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {
|
||||
// get path including the the storage mount point
|
||||
$path = $util->getPathWithMountPoint($params['itemSource']);
|
||||
list($storage, ) = \OC\Files\Filesystem::resolvePath('/' . $userId . '/files' . $path);
|
||||
|
||||
if (!($storage instanceof \OC\Files\Storage\Local)) {
|
||||
$mountPoint = 'files' . $storage->getMountPoint();
|
||||
} else {
|
||||
$mountPoint = '';
|
||||
}
|
||||
|
||||
// if a folder was shared, get a list of all (sub-)folders
|
||||
if ($params['itemType'] === 'folder') {
|
||||
$allFiles = $util->getAllFiles($path);
|
||||
$allFiles = $util->getAllFiles($path, $mountPoint);
|
||||
} else {
|
||||
$allFiles = array($path);
|
||||
}
|
||||
|
@ -412,13 +344,6 @@ class Hooks {
|
|||
*/
|
||||
public static function postUnshare($params) {
|
||||
|
||||
// NOTE: $params has keys:
|
||||
// [itemType] => file
|
||||
// [itemSource] => 13
|
||||
// [shareType] => 0
|
||||
// [shareWith] => test1
|
||||
// [itemParent] =>
|
||||
|
||||
if (\OCP\App::isEnabled('files_encryption') === false) {
|
||||
return true;
|
||||
}
|
||||
|
@ -428,34 +353,7 @@ class Hooks {
|
|||
$view = new \OC_FilesystemView('/');
|
||||
$userId = \OCP\User::getUser();
|
||||
$util = new Util($view, $userId);
|
||||
$path = $util->fileIdToPath($params['itemSource']);
|
||||
|
||||
// check if this is a re-share
|
||||
if ($params['itemParent']) {
|
||||
|
||||
// get the parent from current share
|
||||
$parent = $util->getShareParent($params['itemParent']);
|
||||
|
||||
// get target path
|
||||
$targetPath = $util->fileIdToPath($params['itemSource']);
|
||||
$targetPathSplit = array_reverse(explode('/', $targetPath));
|
||||
|
||||
// init values
|
||||
$path = '';
|
||||
$sharedPart = ltrim($parent['file_target'], '/');
|
||||
|
||||
// rebuild path
|
||||
foreach ($targetPathSplit as $pathPart) {
|
||||
if ($pathPart !== $sharedPart) {
|
||||
$path = '/' . $pathPart . $path;
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
// prefix path with Shared
|
||||
$path = '/Shared' . $parent['file_target'] . $path;
|
||||
}
|
||||
$path = \OC\Files\Filesystem::getPath($params['fileSource']);
|
||||
|
||||
// for group shares get a list of the group members
|
||||
if ($params['shareType'] === \OCP\Share::SHARE_TYPE_GROUP) {
|
||||
|
@ -469,14 +367,17 @@ class Hooks {
|
|||
}
|
||||
|
||||
// get the path including mount point only if not a shared folder
|
||||
if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {
|
||||
// get path including the the storage mount point
|
||||
$path = $util->getPathWithMountPoint($params['itemSource']);
|
||||
list($storage, ) = \OC\Files\Filesystem::resolvePath('/' . $userId . '/files' . $path);
|
||||
|
||||
if (!($storage instanceof \OC\Files\Storage\Local)) {
|
||||
$mountPoint = 'files' . $storage->getMountPoint();
|
||||
} else {
|
||||
$mountPoint = '';
|
||||
}
|
||||
|
||||
// if we unshare a folder we need a list of all (sub-)files
|
||||
if ($params['itemType'] === 'folder') {
|
||||
$allFiles = $util->getAllFiles($path);
|
||||
$allFiles = $util->getAllFiles($path, $mountPoint);
|
||||
} else {
|
||||
$allFiles = array($path);
|
||||
}
|
||||
|
@ -510,6 +411,8 @@ class Hooks {
|
|||
// otherwise we perform a stream copy, so we get a new set of keys
|
||||
$mp1 = $view->getMountPoint('/' . $user . '/files/' . $params['oldpath']);
|
||||
$mp2 = $view->getMountPoint('/' . $user . '/files/' . $params['newpath']);
|
||||
list($storage1, ) = Filesystem::resolvePath($params['oldpath']);
|
||||
|
||||
if ($mp1 === $mp2) {
|
||||
self::$renamedFiles[$params['oldpath']] = array(
|
||||
'uid' => $ownerOld,
|
||||
|
|
|
@ -969,33 +969,6 @@ class Util {
|
|||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get path of a file.
|
||||
* @param int $fileId id of the file
|
||||
* @return string path of the file
|
||||
*/
|
||||
public static function fileIdToPath($fileId) {
|
||||
|
||||
$sql = 'SELECT `path` FROM `*PREFIX*filecache` WHERE `fileid` = ?';
|
||||
|
||||
$query = \OCP\DB::prepare($sql);
|
||||
|
||||
$result = $query->execute(array($fileId));
|
||||
|
||||
$path = false;
|
||||
if (\OCP\DB::isError($result)) {
|
||||
\OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
|
||||
} else {
|
||||
$row = $result->fetchRow();
|
||||
if ($row) {
|
||||
$path = substr($row['path'], strlen('files'));
|
||||
}
|
||||
}
|
||||
|
||||
return $path;
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Filter an array of UIDs to return only ones ready for sharing
|
||||
* @param array $unfilteredUsers users to be checked for sharing readiness
|
||||
|
@ -1398,7 +1371,7 @@ class Util {
|
|||
* @param string $dir relative to the users files folder
|
||||
* @return array with list of files relative to the users files folder
|
||||
*/
|
||||
public function getAllFiles($dir) {
|
||||
public function getAllFiles($dir, $mountPoint = '') {
|
||||
$result = array();
|
||||
$dirList = array($dir);
|
||||
|
||||
|
@ -1408,11 +1381,13 @@ class Util {
|
|||
$this->userFilesDir . '/' . $dir));
|
||||
|
||||
foreach ($content as $c) {
|
||||
$usersPath = isset($c['usersPath']) ? $c['usersPath'] : $c['path'];
|
||||
// getDirectoryContent() returns the paths relative to the mount points, so we need
|
||||
// to re-construct the complete path
|
||||
$path = ($mountPoint !== '') ? $mountPoint . '/' . $c['path'] : $c['path'];
|
||||
if ($c['type'] === 'dir') {
|
||||
$dirList[] = substr($usersPath, strlen("files"));
|
||||
$dirList[] = substr($path, strlen("files"));
|
||||
} else {
|
||||
$result[] = substr($usersPath, strlen("files"));
|
||||
$result[] = substr($path, strlen("files"));
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1421,54 +1396,6 @@ class Util {
|
|||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get shares parent.
|
||||
* @param int $id of the current share
|
||||
* @return array of the parent
|
||||
*/
|
||||
public static function getShareParent($id) {
|
||||
|
||||
$sql = 'SELECT `file_target`, `item_type` FROM `*PREFIX*share` WHERE `id` = ?';
|
||||
|
||||
$query = \OCP\DB::prepare($sql);
|
||||
|
||||
$result = $query->execute(array($id));
|
||||
|
||||
$row = array();
|
||||
if (\OCP\DB::isError($result)) {
|
||||
\OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
|
||||
} else {
|
||||
$row = $result->fetchRow();
|
||||
}
|
||||
|
||||
return $row;
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get shares parent.
|
||||
* @param int $id of the current share
|
||||
* @return array of the parent
|
||||
*/
|
||||
public static function getParentFromShare($id) {
|
||||
|
||||
$sql = 'SELECT `parent` FROM `*PREFIX*share` WHERE `id` = ?';
|
||||
|
||||
$query = \OCP\DB::prepare($sql);
|
||||
|
||||
$result = $query->execute(array($id));
|
||||
|
||||
$row = array();
|
||||
if (\OCP\DB::isError($result)) {
|
||||
\OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
|
||||
} else {
|
||||
$row = $result->fetchRow();
|
||||
}
|
||||
|
||||
return $row;
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get owner of the shared files.
|
||||
* @param $id
|
||||
|
@ -1710,23 +1637,6 @@ class Util {
|
|||
$this->recoverAllFiles('/', $privateKey);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the path including the storage mount point
|
||||
* @param int $id
|
||||
* @return string the path including the mount point like AmazonS3/folder/file.txt
|
||||
*/
|
||||
public function getPathWithMountPoint($id) {
|
||||
list($storage, $internalPath) = \OC\Files\Cache\Cache::getById($id);
|
||||
$mount = \OC\Files\Filesystem::getMountByStorageId($storage);
|
||||
$mountPoint = $mount[0]->getMountPoint();
|
||||
$path = \OC\Files\Filesystem::normalizePath($mountPoint . '/' . $internalPath);
|
||||
|
||||
// reformat the path to be relative e.g. /user/files/folder becomes /folder/
|
||||
$relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
|
||||
|
||||
return $relativePath;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief check if the file is stored on a system wide mount point
|
||||
* @param $path relative to /data/user with leading '/'
|
||||
|
|
|
@ -219,18 +219,20 @@ class Test_Encryption_Hooks extends \PHPUnit_Framework_TestCase {
|
|||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER2);
|
||||
\OC_User::setUserId(\Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER2);
|
||||
|
||||
// user2 has a local file with the same name
|
||||
// user2 update the shared file
|
||||
$this->user2View->file_put_contents($this->filename, $this->data);
|
||||
|
||||
// check if all keys are generated
|
||||
$this->assertTrue($this->rootView->file_exists(
|
||||
// keys should be stored at user1s dir, not in user2s
|
||||
$this->assertFalse($this->rootView->file_exists(
|
||||
self::TEST_ENCRYPTION_HOOKS_USER2 . '/files_encryption/share-keys/'
|
||||
. $this->filename . '.' . \Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER2 . '.shareKey'));
|
||||
$this->assertTrue($this->rootView->file_exists(
|
||||
$this->assertFalse($this->rootView->file_exists(
|
||||
self::TEST_ENCRYPTION_HOOKS_USER2 . '/files_encryption/keyfiles/' . $this->filename . '.key'));
|
||||
|
||||
// delete the Shared file from user1 in data/user2/files/Shared
|
||||
$this->user2View->unlink('/Shared/' . $this->filename);
|
||||
$result = $this->user2View->unlink($this->filename);
|
||||
|
||||
$this->assertTrue($result);
|
||||
|
||||
// now keys from user1s home should be gone
|
||||
$this->assertFalse($this->rootView->file_exists(
|
||||
|
@ -242,26 +244,12 @@ class Test_Encryption_Hooks extends \PHPUnit_Framework_TestCase {
|
|||
$this->assertFalse($this->rootView->file_exists(
|
||||
self::TEST_ENCRYPTION_HOOKS_USER1 . '/files_encryption/keyfiles/' . $this->filename . '.key'));
|
||||
|
||||
// but user2 keys should still exist
|
||||
$this->assertTrue($this->rootView->file_exists(
|
||||
self::TEST_ENCRYPTION_HOOKS_USER2 . '/files_encryption/share-keys/'
|
||||
. $this->filename . '.' . \Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER2 . '.shareKey'));
|
||||
$this->assertTrue($this->rootView->file_exists(
|
||||
self::TEST_ENCRYPTION_HOOKS_USER2 . '/files_encryption/keyfiles/' . $this->filename . '.key'));
|
||||
|
||||
// cleanup
|
||||
|
||||
$this->user2View->unlink($this->filename);
|
||||
|
||||
\Test_Encryption_Util::logoutHelper();
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER1);
|
||||
\OC_User::setUserId(\Test_Encryption_Hooks::TEST_ENCRYPTION_HOOKS_USER1);
|
||||
|
||||
// unshare the file
|
||||
\OCP\Share::unshare('file', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER, self::TEST_ENCRYPTION_HOOKS_USER2);
|
||||
|
||||
$this->user1View->unlink($this->filename);
|
||||
|
||||
if ($stateFilesTrashbin) {
|
||||
OC_App::enable('files_trashbin');
|
||||
}
|
||||
|
|
|
@ -175,7 +175,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
|
||||
// check if data is the same as we previously written
|
||||
$this->assertEquals($this->dataShort, $retrievedCryptedFile);
|
||||
|
@ -213,14 +213,14 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
function testReShareFile($withTeardown = true) {
|
||||
$this->testShareFile(false);
|
||||
|
||||
// login as user1
|
||||
// login as user2
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2);
|
||||
|
||||
// get the file info
|
||||
$fileInfo = $this->view->getFileInfo(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
|
||||
// share the file with user2
|
||||
// share the file with user3
|
||||
\OCP\Share::shareItem('file', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER, \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3, OCP\PERMISSION_ALL);
|
||||
|
||||
// login as admin
|
||||
|
@ -236,7 +236,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/' . $this->filename);
|
||||
|
||||
// check if data is the same as previously written
|
||||
$this->assertEquals($this->dataShort, $retrievedCryptedFile);
|
||||
|
@ -333,7 +333,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared' . $this->folder1
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->folder1
|
||||
. $this->subfolder . $this->subsubfolder . '/' . $this->filename);
|
||||
|
||||
// check if data is the same
|
||||
|
@ -376,7 +376,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
function testReShareFolder($withTeardown = true) {
|
||||
$fileInfoFolder1 = $this->testShareFolder(false);
|
||||
|
||||
// login as user1
|
||||
// login as user2
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2);
|
||||
|
||||
// disable encryption proxy to prevent recursive calls
|
||||
|
@ -385,7 +385,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get the file info from previous created folder
|
||||
$fileInfoSubFolder = $this->view->getFileInfo(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared' . $this->folder1
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->folder1
|
||||
. $this->subfolder);
|
||||
|
||||
// check if we have a valid file info
|
||||
|
@ -394,24 +394,24 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
// re-enable the file proxy
|
||||
\OC_FileProxy::$enabled = $proxyStatus;
|
||||
|
||||
// share the file with user2
|
||||
// share the file with user3
|
||||
\OCP\Share::shareItem('folder', $fileInfoSubFolder['fileid'], \OCP\Share::SHARE_TYPE_USER, \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3, OCP\PERMISSION_ALL);
|
||||
|
||||
// login as admin
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1);
|
||||
|
||||
// check if share key for user2 exists
|
||||
// check if share key for user3 exists
|
||||
$this->assertTrue($this->view->file_exists(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1 . '/files_encryption/share-keys' . $this->folder1
|
||||
. $this->subfolder . $this->subsubfolder . '/'
|
||||
. $this->filename . '.' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '.shareKey'));
|
||||
|
||||
// login as user2
|
||||
// login as user3
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3);
|
||||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/Shared' . $this->subfolder
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/' . $this->subfolder
|
||||
. $this->subsubfolder . '/' . $this->filename);
|
||||
|
||||
// check if data is the same
|
||||
|
@ -419,7 +419,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get the file info
|
||||
$fileInfo = $this->view->getFileInfo(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/Shared' . $this->subfolder
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/' . $this->subfolder
|
||||
. $this->subsubfolder . '/' . $this->filename);
|
||||
|
||||
// check if we have fileInfos
|
||||
|
@ -442,7 +442,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER4 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER4 . '/files/' . $this->filename);
|
||||
|
||||
// check if data is the same
|
||||
$this->assertEquals($this->dataShort, $retrievedCryptedFile);
|
||||
|
@ -624,7 +624,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER3 . '/files/' . $this->filename);
|
||||
|
||||
// check if data is the same as we previously written
|
||||
$this->assertEquals($this->dataShort, $retrievedCryptedFile);
|
||||
|
@ -676,6 +676,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
|
||||
// enable recovery for admin
|
||||
$this->assertTrue($util->setRecoveryForUser(1));
|
||||
$util->addRecoveryKeys();
|
||||
|
||||
// create folder structure
|
||||
$this->view->mkdir('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1 . '/files' . $this->folder1);
|
||||
|
@ -981,7 +982,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
// share the file
|
||||
\OCP\Share::shareItem('file', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER, \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2, OCP\PERMISSION_ALL);
|
||||
|
||||
// check if share key for user2exists
|
||||
// check if share key for user2 exists
|
||||
$this->assertTrue($this->view->file_exists(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1 . '/files_encryption/share-keys/'
|
||||
. $this->filename . '.' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '.shareKey'));
|
||||
|
@ -990,31 +991,29 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
|
|||
// login as user2
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2);
|
||||
|
||||
$this->assertTrue($this->view->file_exists('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared/' . $this->filename));
|
||||
$this->assertTrue($this->view->file_exists('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename));
|
||||
|
||||
// get file contents
|
||||
$retrievedCryptedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
|
||||
// check if data is the same as we previously written
|
||||
$this->assertEquals($this->dataShort, $retrievedCryptedFile);
|
||||
|
||||
// move the file out of the shared folder
|
||||
$this->view->rename('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/Shared/' . $this->filename,
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
// move the file to a subfolder
|
||||
$this->view->rename('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename,
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->folder1 . $this->filename);
|
||||
|
||||
// check if we can read the moved file
|
||||
$retrievedRenamedFile = $this->view->file_get_contents(
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
'/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->folder1 . $this->filename);
|
||||
|
||||
// check if data is the same as we previously written
|
||||
$this->assertEquals($this->dataShort, $retrievedRenamedFile);
|
||||
|
||||
// the owners file should be deleted
|
||||
$this->assertFalse($this->view->file_exists('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1 . '/files/' . $this->filename));
|
||||
|
||||
// cleanup
|
||||
$this->view->unlink('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER2 . '/files/' . $this->filename);
|
||||
\Test_Encryption_Util::loginHelper(\Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1);
|
||||
$this->view->unlink('/' . \Test_Encryption_Share::TEST_ENCRYPTION_SHARE_USER1 . '/files/' . $this->filename);
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -520,8 +520,8 @@ class Test_Encryption_Util extends \PHPUnit_Framework_TestCase {
|
|||
\OC_Util::tearDownFS();
|
||||
\OC_User::setUserId('');
|
||||
\OC\Files\Filesystem::tearDown();
|
||||
\OC_Util::setupFS($user);
|
||||
\OC_User::setUserId($user);
|
||||
\OC_Util::setupFS($user);
|
||||
|
||||
$params['uid'] = $user;
|
||||
$params['password'] = $password;
|
||||
|
|
|
@ -373,8 +373,8 @@ class OC_Mount_Config {
|
|||
$isPersonal = false) {
|
||||
$backends = self::getBackends();
|
||||
$mountPoint = OC\Files\Filesystem::normalizePath($mountPoint);
|
||||
if ($mountPoint === '' || $mountPoint === '/' || $mountPoint == '/Shared') {
|
||||
// can't mount at root or "Shared" folder
|
||||
if ($mountPoint === '' || $mountPoint === '/') {
|
||||
// can't mount at root folder
|
||||
return false;
|
||||
}
|
||||
|
||||
|
|
|
@ -128,9 +128,6 @@ class Test_Mount_Config extends \PHPUnit_Framework_TestCase {
|
|||
$isPersonal = false;
|
||||
$this->assertFalse(OC_Mount_Config::addMountPoint('', $storageClass, array(), $mountType, $applicable, $isPersonal));
|
||||
$this->assertFalse(OC_Mount_Config::addMountPoint('/', $storageClass, array(), $mountType, $applicable, $isPersonal));
|
||||
$this->assertFalse(OC_Mount_Config::addMountPoint('Shared', $storageClass, array(), $mountType, $applicable, $isPersonal));
|
||||
$this->assertFalse(OC_Mount_Config::addMountPoint('/Shared', $storageClass, array(), $mountType, $applicable, $isPersonal));
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -17,6 +17,4 @@ OCP\Util::addScript('files_sharing', 'share');
|
|||
\OC_Hook::connect('OC_Filesystem', 'post_delete', '\OC\Files\Cache\Shared_Updater', 'postDeleteHook');
|
||||
\OC_Hook::connect('OC_Filesystem', 'delete', '\OC\Files\Cache\Shared_Updater', 'deleteHook');
|
||||
\OC_Hook::connect('OC_Filesystem', 'post_rename', '\OC\Files\Cache\Shared_Updater', 'renameHook');
|
||||
\OC_Hook::connect('OCP\Share', 'post_shared', '\OC\Files\Cache\Shared_Updater', 'shareHook');
|
||||
\OC_Hook::connect('OCP\Share', 'pre_unshare', '\OC\Files\Cache\Shared_Updater', 'shareHook');
|
||||
\OC_Hook::connect('OC_Appconfig', 'post_set_value', '\OCA\Files\Share\Maintainer', 'configChangeHook');
|
||||
|
|
|
@ -1,76 +1,77 @@
|
|||
<?php
|
||||
|
||||
$installedVersion = OCP\Config::getAppValue('files_sharing', 'installed_version');
|
||||
if (version_compare($installedVersion, '0.3', '<')) {
|
||||
$update_error = false;
|
||||
$query = OCP\DB::prepare('SELECT * FROM `*PREFIX*sharing`');
|
||||
$result = $query->execute();
|
||||
$groupShares = array();
|
||||
//we need to set up user backends, otherwise creating the shares will fail with "because user does not exist"
|
||||
OC_User::useBackend(new OC_User_Database());
|
||||
OC_Group::useBackend(new OC_Group_Database());
|
||||
OC_App::loadApps(array('authentication'));
|
||||
$rootView = new \OC\Files\View('');
|
||||
while ($row = $result->fetchRow()) {
|
||||
$meta = $rootView->getFileInfo($$row['source']);
|
||||
$itemSource = $meta['fileid'];
|
||||
if ($itemSource != -1) {
|
||||
$file = $meta;
|
||||
if ($file['mimetype'] == 'httpd/unix-directory') {
|
||||
$itemType = 'folder';
|
||||
} else {
|
||||
$itemType = 'file';
|
||||
}
|
||||
if ($row['permissions'] == 0) {
|
||||
$permissions = OCP\PERMISSION_READ | OCP\PERMISSION_SHARE;
|
||||
} else {
|
||||
$permissions = OCP\PERMISSION_READ | OCP\PERMISSION_UPDATE | OCP\PERMISSION_SHARE;
|
||||
if ($itemType == 'folder') {
|
||||
$permissions |= OCP\PERMISSION_CREATE;
|
||||
}
|
||||
}
|
||||
$pos = strrpos($row['uid_shared_with'], '@');
|
||||
if ($pos !== false && OC_Group::groupExists(substr($row['uid_shared_with'], $pos + 1))) {
|
||||
$shareType = OCP\Share::SHARE_TYPE_GROUP;
|
||||
$shareWith = substr($row['uid_shared_with'], 0, $pos);
|
||||
if (isset($groupShares[$shareWith][$itemSource])) {
|
||||
continue;
|
||||
} else {
|
||||
$groupShares[$shareWith][$itemSource] = true;
|
||||
}
|
||||
} else if ($row['uid_shared_with'] == 'public') {
|
||||
$shareType = OCP\Share::SHARE_TYPE_LINK;
|
||||
$shareWith = null;
|
||||
} else {
|
||||
$shareType = OCP\Share::SHARE_TYPE_USER;
|
||||
$shareWith = $row['uid_shared_with'];
|
||||
}
|
||||
OCP\JSON::checkUserExists($row['uid_owner']);
|
||||
OC_User::setUserId($row['uid_owner']);
|
||||
//we need to setup the filesystem for the user, otherwise OC_FileSystem::getRoot will fail and break
|
||||
OC_Util::setupFS($row['uid_owner']);
|
||||
try {
|
||||
OCP\Share::shareItem($itemType, $itemSource, $shareType, $shareWith, $permissions);
|
||||
}
|
||||
catch (Exception $e) {
|
||||
$update_error = true;
|
||||
OCP\Util::writeLog('files_sharing',
|
||||
'Upgrade Routine: Skipping sharing "'.$row['source'].'" to "'.$shareWith
|
||||
.'" (error is "'.$e->getMessage().'")',
|
||||
OCP\Util::WARN);
|
||||
}
|
||||
OC_Util::tearDownFS();
|
||||
}
|
||||
}
|
||||
OC_User::setUserId(null);
|
||||
if ($update_error) {
|
||||
OCP\Util::writeLog('files_sharing', 'There were some problems upgrading the sharing of files', OCP\Util::ERROR);
|
||||
}
|
||||
// NOTE: Let's drop the table after more testing
|
||||
// $query = OCP\DB::prepare('DROP TABLE `*PREFIX*sharing`');
|
||||
// $query->execute();
|
||||
if (version_compare($installedVersion, '0.4', '<')) {
|
||||
removeSharedFolder();
|
||||
}
|
||||
|
||||
// clean up oc_share table from files which are no longer exists
|
||||
if (version_compare($installedVersion, '0.3.5.6', '<')) {
|
||||
\OC\Files\Cache\Shared_Updater::fixBrokenSharesOnAppUpdate();
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* update script for the removal of the logical "Shared" folder, we create physical "Shared" folder and
|
||||
* update the users file_target so that it doesn't make any difference for the user
|
||||
* @note parameters are just for testing, please ignore them
|
||||
*/
|
||||
function removeSharedFolder($mkdirs = true, $chunkSize = 99) {
|
||||
$query = OCP\DB::prepare('SELECT * FROM `*PREFIX*share`');
|
||||
$result = $query->execute();
|
||||
$view = new \OC\Files\View('/');
|
||||
$users = array();
|
||||
$shares = array();
|
||||
//we need to set up user backends
|
||||
OC_User::useBackend(new OC_User_Database());
|
||||
OC_Group::useBackend(new OC_Group_Database());
|
||||
OC_App::loadApps(array('authentication'));
|
||||
//we need to set up user backends, otherwise creating the shares will fail with "because user does not exist"
|
||||
while ($row = $result->fetchRow()) {
|
||||
//collect all user shares
|
||||
if ((int)$row['share_type'] === 0 && ($row['item_type'] === 'file' || $row['item_type'] === 'folder')) {
|
||||
$users[] = $row['share_with'];
|
||||
$shares[$row['id']] = $row['file_target'];
|
||||
} else if ((int)$row['share_type'] === 1 && ($row['item_type'] === 'file' || $row['item_type'] === 'folder')) {
|
||||
//collect all group shares
|
||||
$users = array_merge($users, \OC_group::usersInGroup($row['share_with']));
|
||||
$shares[$row['id']] = $row['file_target'];
|
||||
} else if ((int)$row['share_type'] === 2) {
|
||||
$shares[$row['id']] = $row['file_target'];
|
||||
}
|
||||
}
|
||||
|
||||
$unique_users = array_unique($users);
|
||||
|
||||
if (!empty($unique_users) && !empty($shares)) {
|
||||
|
||||
// create folder Shared for each user
|
||||
|
||||
if ($mkdirs) {
|
||||
foreach ($unique_users as $user) {
|
||||
\OC\Files\Filesystem::initMountPoints($user);
|
||||
if (!$view->file_exists('/' . $user . '/files/Shared')) {
|
||||
$view->mkdir('/' . $user . '/files/Shared');
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
$chunkedShareList = array_chunk($shares, $chunkSize, true);
|
||||
|
||||
foreach ($chunkedShareList as $subList) {
|
||||
|
||||
$statement = "UPDATE `*PREFIX*share` SET `file_target` = CASE `id` ";
|
||||
//update share table
|
||||
$ids = implode(',', array_keys($subList));
|
||||
foreach ($subList as $id => $target) {
|
||||
$statement .= "WHEN " . $id . " THEN '/Shared" . $target . "' ";
|
||||
}
|
||||
$statement .= ' END WHERE `id` IN (' . $ids . ')';
|
||||
|
||||
$query = OCP\DB::prepare($statement);
|
||||
|
||||
$query->execute(array());
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1 +1 @@
|
|||
0.3.5.6
|
||||
0.4
|
||||
|
|
|
@ -184,7 +184,6 @@ class Api {
|
|||
$receivedFrom = \OCP\Share::getItemSharedWithBySource($itemType, $file['fileid']);
|
||||
reset($share);
|
||||
$key = key($share);
|
||||
$share[$key]['path'] = self::correctPath($share[$key]['path'], $path);
|
||||
if ($receivedFrom) {
|
||||
$share[$key]['received_from'] = $receivedFrom['uid_owner'];
|
||||
$share[$key]['received_from_displayname'] = \OCP\User::getDisplayName($receivedFrom['uid_owner']);
|
||||
|
@ -531,15 +530,4 @@ class Api {
|
|||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief make sure that the path has the correct root
|
||||
*
|
||||
* @param string $path path returned from the share API
|
||||
* @param string $folder current root folder
|
||||
* @return string the correct path
|
||||
*/
|
||||
protected static function correctPath($path, $folder) {
|
||||
return \OC_Filesystem::normalizePath('/' . $folder . '/' . basename($path));
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -2,8 +2,9 @@
|
|||
/**
|
||||
* ownCloud
|
||||
*
|
||||
* @author Michael Gapczynski
|
||||
* @copyright 2012 Michael Gapczynski mtgap@owncloud.com
|
||||
* @author Bjoern Schiessle, Michael Gapczynski
|
||||
* @copyright 2012 Michael Gapczynski <mtgap@owncloud.com>
|
||||
* 2014 Bjoern Schiessle <schiessle@owncloud.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
|
@ -46,12 +47,15 @@ class Shared_Cache extends Cache {
|
|||
* @return \OC\Files\Cache\Cache
|
||||
*/
|
||||
private function getSourceCache($target) {
|
||||
$source = \OC_Share_Backend_File::getSource($target);
|
||||
if ($target === false || $target === $this->storage->getMountPoint()) {
|
||||
$target = '';
|
||||
}
|
||||
$source = \OC_Share_Backend_File::getSource($target, $this->storage->getMountPoint(), $this->storage->getItemType());
|
||||
if (isset($source['path']) && isset($source['fileOwner'])) {
|
||||
\OC\Files\Filesystem::initMountPoints($source['fileOwner']);
|
||||
$mount = \OC\Files\Filesystem::getMountByNumericId($source['storage']);
|
||||
if (is_array($mount)) {
|
||||
$fullPath = $mount[key($mount)]->getMountPoint() . $source['path'];
|
||||
$mounts = \OC\Files\Filesystem::getMountByNumericId($source['storage']);
|
||||
if (is_array($mounts) and count($mounts)) {
|
||||
$fullPath = $mounts[0]->getMountPoint() . $source['path'];
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($fullPath);
|
||||
if ($storage) {
|
||||
$this->files[$target] = $internalPath;
|
||||
|
@ -80,23 +84,28 @@ class Shared_Cache extends Cache {
|
|||
* @return array
|
||||
*/
|
||||
public function get($file) {
|
||||
if ($file == '') {
|
||||
$data = \OCP\Share::getItemsSharedWith('file', \OC_Share_Backend_File::FORMAT_FILE_APP_ROOT);
|
||||
$etag = \OCP\Config::getUserValue(\OCP\User::getUser(), 'files_sharing', 'etag');
|
||||
if (!isset($etag)) {
|
||||
$etag = $this->storage->getETag('');
|
||||
\OCP\Config::setUserValue(\OCP\User::getUser(), 'files_sharing', 'etag', $etag);
|
||||
}
|
||||
$data['etag'] = $etag;
|
||||
return $data;
|
||||
} else if (is_string($file)) {
|
||||
if (is_string($file)) {
|
||||
if ($cache = $this->getSourceCache($file)) {
|
||||
return $cache->get($this->files[$file]);
|
||||
$path = 'files' . $this->storage->getMountPoint();
|
||||
$path .= ($file !== '') ? '/' . $file : '';
|
||||
$data = $cache->get($this->files[$file]);
|
||||
$data['displayname_owner'] = \OC_User::getDisplayName($this->storage->getSharedFrom());
|
||||
$data['path'] = $path;
|
||||
if ($file === '') {
|
||||
$data['is_share_mount_point'] = true;
|
||||
}
|
||||
return $data;
|
||||
}
|
||||
} else {
|
||||
// if we are at the root of the mount point we want to return the
|
||||
// cache information for the source item
|
||||
if (!is_int($file) || $file === 0) {
|
||||
$file = $this->storage->getSourceId();
|
||||
$mountPoint = $this->storage->getMountPoint();
|
||||
}
|
||||
$query = \OC_DB::prepare(
|
||||
'SELECT `fileid`, `storage`, `path`, `parent`, `name`, `mimetype`, `mimepart`,'
|
||||
. ' `size`, `mtime`, `encrypted`, `unencrypted_size`'
|
||||
. ' `size`, `mtime`, `encrypted`, `unencrypted_size`, `storage_mtime`, `etag`'
|
||||
. ' FROM `*PREFIX*filecache` WHERE `fileid` = ?');
|
||||
$result = $query->execute(array($file));
|
||||
$data = $result->fetchRow();
|
||||
|
@ -115,6 +124,10 @@ class Shared_Cache extends Cache {
|
|||
} else {
|
||||
$data['size'] = (int)$data['size'];
|
||||
}
|
||||
if (isset($mountPoint)) {
|
||||
$data['path'] = 'files/' . $mountPoint;
|
||||
$data['is_share_mount_point'] = true;
|
||||
}
|
||||
return $data;
|
||||
}
|
||||
return false;
|
||||
|
@ -127,28 +140,26 @@ class Shared_Cache extends Cache {
|
|||
* @return array
|
||||
*/
|
||||
public function getFolderContents($folder) {
|
||||
if ($folder == '') {
|
||||
$files = \OCP\Share::getItemsSharedWith('file', \OC_Share_Backend_File::FORMAT_GET_FOLDER_CONTENTS);
|
||||
foreach ($files as &$file) {
|
||||
$file['mimetype'] = $this->getMimetype($file['mimetype']);
|
||||
$file['mimepart'] = $this->getMimetype($file['mimepart']);
|
||||
$file['usersPath'] = 'files/Shared/' . ltrim($file['path'], '/');
|
||||
|
||||
if ($folder === false) {
|
||||
$folder = '';
|
||||
}
|
||||
return $files;
|
||||
} else {
|
||||
|
||||
$dir = ($folder !== '') ? $folder . '/' : '';
|
||||
|
||||
$cache = $this->getSourceCache($folder);
|
||||
if ($cache) {
|
||||
$parent = $this->storage->getFile($folder);
|
||||
$sourceFolderContent = $cache->getFolderContents($this->files[$folder]);
|
||||
foreach ($sourceFolderContent as $key => $c) {
|
||||
$sourceFolderContent[$key]['usersPath'] = 'files/Shared/' . $folder . '/' . $c['name'];
|
||||
$sourceFolderContent[$key]['path'] = $dir . $c['name'];
|
||||
$sourceFolderContent[$key]['uid_owner'] = $parent['uid_owner'];
|
||||
$sourceFolderContent[$key]['displayname_owner'] = $parent['uid_owner'];
|
||||
}
|
||||
|
||||
return $sourceFolderContent;
|
||||
}
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -161,9 +172,8 @@ class Shared_Cache extends Cache {
|
|||
* @return int file id
|
||||
*/
|
||||
public function put($file, array $data) {
|
||||
if ($file === '' && isset($data['etag'])) {
|
||||
return \OCP\Config::setUserValue(\OCP\User::getUser(), 'files_sharing', 'etag', $data['etag']);
|
||||
} else if ($cache = $this->getSourceCache($file)) {
|
||||
$file = ($file === false) ? '' : $file;
|
||||
if ($cache = $this->getSourceCache($file)) {
|
||||
return $cache->put($this->files[$file], $data);
|
||||
}
|
||||
return false;
|
||||
|
@ -176,7 +186,11 @@ class Shared_Cache extends Cache {
|
|||
* @return int
|
||||
*/
|
||||
public function getId($file) {
|
||||
if ($cache = $this->getSourceCache($file)) {
|
||||
if ($file === false) {
|
||||
return $this->storage->getSourceId();
|
||||
}
|
||||
$cache = $this->getSourceCache($file);
|
||||
if ($cache) {
|
||||
return $cache->getId($this->files[$file]);
|
||||
}
|
||||
return -1;
|
||||
|
@ -201,6 +215,7 @@ class Shared_Cache extends Cache {
|
|||
* @param string $file
|
||||
*/
|
||||
public function remove($file) {
|
||||
$file = ($file === false) ? '' : $file;
|
||||
if ($cache = $this->getSourceCache($file)) {
|
||||
$cache->remove($this->files[$file]);
|
||||
}
|
||||
|
@ -214,7 +229,7 @@ class Shared_Cache extends Cache {
|
|||
*/
|
||||
public function move($source, $target) {
|
||||
if ($cache = $this->getSourceCache($source)) {
|
||||
$file = \OC_Share_Backend_File::getSource($target);
|
||||
$file = \OC_Share_Backend_File::getSource($target, $this->storage->getMountPoint(), $this->storage->getItemType());
|
||||
if ($file && isset($file['path'])) {
|
||||
$cache->move($this->files[$source], $file['path']);
|
||||
}
|
||||
|
@ -290,9 +305,6 @@ class Shared_Cache extends Cache {
|
|||
if ($file['mimetype'] === 'httpd/unix-directory') {
|
||||
$exploreDirs[] = ltrim($dir . '/' . $file['name'], '/');
|
||||
} else if (($mimepart && $file['mimepart'] === $mimepart) || ($mimetype && $file['mimetype'] === $mimetype)) {
|
||||
// usersPath not reliable
|
||||
//$file['path'] = $file['usersPath'];
|
||||
$file['path'] = ltrim($dir . '/' . $file['name'], '/');
|
||||
$result[] = $file;
|
||||
}
|
||||
}
|
||||
|
@ -359,6 +371,7 @@ class Shared_Cache extends Cache {
|
|||
* @return int
|
||||
*/
|
||||
public function calculateFolderSize($path, $entry = null) {
|
||||
$path = ($path === false) ? '' : $path;
|
||||
if ($cache = $this->getSourceCache($path)) {
|
||||
return $cache->calculateFolderSize($this->files[$path]);
|
||||
}
|
||||
|
@ -401,7 +414,7 @@ class Shared_Cache extends Cache {
|
|||
}
|
||||
|
||||
/**
|
||||
* get the path of a file on this storage by it's id
|
||||
* get the path of a file on this storage relative to the mount point by it's id
|
||||
*
|
||||
* @param int $id
|
||||
* @param string $pathEnd (optional) used internally for recursive calls
|
||||
|
@ -409,8 +422,9 @@ class Shared_Cache extends Cache {
|
|||
*/
|
||||
public function getPathById($id, $pathEnd = '') {
|
||||
// direct shares are easy
|
||||
if ($path = $this->getShareById($id)) {
|
||||
return $path . $pathEnd;
|
||||
$path = $this->getShareById($id);
|
||||
if (is_string($path)) {
|
||||
return ltrim($pathEnd, '/');
|
||||
} else {
|
||||
// if the item is a direct share we try and get the path of the parent and append the name of the item to it
|
||||
list($parent, $name) = $this->getParentInfo($id);
|
||||
|
|
|
@ -2,6 +2,9 @@
|
|||
|
||||
namespace OCA\Files_Sharing;
|
||||
|
||||
use OC_Config;
|
||||
use PasswordHash;
|
||||
|
||||
class Helper {
|
||||
|
||||
/**
|
||||
|
@ -26,9 +29,6 @@ class Helper {
|
|||
exit;
|
||||
}
|
||||
|
||||
$type = $linkItem['item_type'];
|
||||
$fileSource = $linkItem['file_source'];
|
||||
$shareOwner = $linkItem['uid_owner'];
|
||||
$rootLinkItem = \OCP\Share::resolveReShare($linkItem);
|
||||
$path = null;
|
||||
if (isset($rootLinkItem['uid_owner'])) {
|
||||
|
@ -61,7 +61,6 @@ class Helper {
|
|||
}
|
||||
|
||||
$basePath = $path;
|
||||
$rootName = basename($path);
|
||||
|
||||
if ($relativePath !== null && \OC\Files\Filesystem::isReadable($basePath . $relativePath)) {
|
||||
$path .= \OC\Files\Filesystem::normalizePath($relativePath);
|
||||
|
@ -111,4 +110,70 @@ class Helper {
|
|||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
public static function getSharesFromItem($target) {
|
||||
$result = array();
|
||||
$owner = \OC\Files\Filesystem::getOwner($target);
|
||||
\OC\Files\Filesystem::initMountPoints($owner);
|
||||
$info = \OC\Files\Filesystem::getFileInfo($target);
|
||||
$ownerView = new \OC\Files\View('/'.$owner.'/files');
|
||||
if ( $owner != \OCP\User::getUser() ) {
|
||||
$path = $ownerView->getPath($info['fileid']);
|
||||
} else {
|
||||
$path = $target;
|
||||
}
|
||||
|
||||
|
||||
$ids = array();
|
||||
while ($path !== '' && $path !== '.' && $path !== '/') {
|
||||
$info = $ownerView->getFileInfo($path);
|
||||
$ids[] = $info['fileid'];
|
||||
$path = dirname($path);
|
||||
}
|
||||
|
||||
if (!empty($ids)) {
|
||||
|
||||
$idList = array_chunk($ids, 99, true);
|
||||
|
||||
foreach ($idList as $subList) {
|
||||
$statement = "SELECT `share_with`, `share_type`, `file_target` FROM `*PREFIX*share` WHERE `file_source` IN (" . implode(',', $subList) . ") AND `share_type` IN (0, 1, 2)";
|
||||
$query = \OCP\DB::prepare($statement);
|
||||
$r = $query->execute();
|
||||
$result = array_merge($result, $r->fetchAll());
|
||||
}
|
||||
}
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
public static function getUidAndFilename($filename) {
|
||||
$uid = \OC\Files\Filesystem::getOwner($filename);
|
||||
\OC\Files\Filesystem::initMountPoints($uid);
|
||||
if ( $uid != \OCP\User::getUser() ) {
|
||||
$info = \OC\Files\Filesystem::getFileInfo($filename);
|
||||
$ownerView = new \OC\Files\View('/'.$uid.'/files');
|
||||
$filename = $ownerView->getPath($info['fileid']);
|
||||
}
|
||||
return array($uid, $filename);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Format a path to be relative to the /user/files/ directory
|
||||
* @param string $path the absolute path
|
||||
* @return string e.g. turns '/admin/files/test.txt' into 'test.txt'
|
||||
*/
|
||||
public static function stripUserFilesPath($path) {
|
||||
$trimmed = ltrim($path, '/');
|
||||
$split = explode('/', $trimmed);
|
||||
|
||||
// it is not a file relative to data/user/files
|
||||
if (count($split) < 3 || $split[1] !== 'files') {
|
||||
return false;
|
||||
}
|
||||
|
||||
$sliced = array_slice($split, 2);
|
||||
$relPath = implode('/', $sliced);
|
||||
|
||||
return $relPath;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -31,7 +31,9 @@ class Shared_Permissions extends Permissions {
|
|||
*/
|
||||
public function get($fileId, $user) {
|
||||
if ($fileId == -1) {
|
||||
return \OCP\PERMISSION_READ;
|
||||
// if we ask for the mount point return -1 so that we can get the correct
|
||||
// permissions by the path, with the root fileId we have no idea which share is meant
|
||||
return -1;
|
||||
}
|
||||
$source = \OCP\Share::getItemSharedWithBySource('file', $fileId, \OC_Share_Backend_File::FORMAT_SHARED_STORAGE,
|
||||
null, true);
|
||||
|
|
|
@ -2,8 +2,9 @@
|
|||
/**
|
||||
* ownCloud
|
||||
*
|
||||
* @author Michael Gapczynski
|
||||
* @copyright 2012 Michael Gapczynski mtgap@owncloud.com
|
||||
* @author Bjoern Schiessle, Michael Gapczynski
|
||||
* @copyright 2012 Michael Gapczynski <mtgap@owncloud.com>
|
||||
* 2014 Bjoern Schiessle <schiessle@owncloud.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
|
@ -27,6 +28,7 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
const FORMAT_OPENDIR = 3;
|
||||
const FORMAT_GET_ALL = 4;
|
||||
const FORMAT_PERMISSIONS = 5;
|
||||
const FORMAT_TARGET_NAMES = 6;
|
||||
|
||||
private $path;
|
||||
|
||||
|
@ -49,24 +51,37 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
return false;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief create unique target
|
||||
* @param string $filePath
|
||||
* @param string $shareWith
|
||||
* @param string $exclude
|
||||
* @return string
|
||||
*/
|
||||
public function generateTarget($filePath, $shareWith, $exclude = null) {
|
||||
$target = '/'.basename($filePath);
|
||||
if (isset($exclude)) {
|
||||
if ($pos = strrpos($target, '.')) {
|
||||
$name = substr($target, 0, $pos);
|
||||
$ext = substr($target, $pos);
|
||||
} else {
|
||||
$name = $target;
|
||||
$ext = '';
|
||||
|
||||
// for group shares we return the target right away
|
||||
if ($shareWith === false) {
|
||||
return $target;
|
||||
}
|
||||
|
||||
\OC\Files\Filesystem::initMountPoints($shareWith);
|
||||
$view = new \OC\Files\View('/' . $shareWith . '/files');
|
||||
$excludeList = \OCP\Share::getItemsSharedWithUser('file', $shareWith, self::FORMAT_TARGET_NAMES);
|
||||
if (is_array($exclude)) {
|
||||
$excludeList = array_merge($excludeList, $exclude);
|
||||
}
|
||||
|
||||
$pathinfo = pathinfo($target);
|
||||
$ext = (isset($pathinfo['extension'])) ? '.'.$pathinfo['extension'] : '';
|
||||
$name = $pathinfo['filename'];
|
||||
$i = 2;
|
||||
$append = '';
|
||||
while (in_array($name.$append.$ext, $exclude)) {
|
||||
$append = ' ('.$i.')';
|
||||
while ($view->file_exists($target) || in_array($target, $excludeList)) {
|
||||
$target = '/' . $name . ' ('.$i.')' . $ext;
|
||||
$i++;
|
||||
}
|
||||
$target = $name.$append.$ext;
|
||||
}
|
||||
|
||||
return $target;
|
||||
}
|
||||
|
||||
|
@ -78,7 +93,7 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
'path' => $items[key($items)]['path'],
|
||||
'storage' => $items[key($items)]['storage'],
|
||||
'permissions' => $items[key($items)]['permissions'],
|
||||
'uid_owner' => $items[key($items)]['uid_owner']
|
||||
'uid_owner' => $items[key($items)]['uid_owner'],
|
||||
);
|
||||
} else if ($format == self::FORMAT_GET_FOLDER_CONTENTS) {
|
||||
$files = array();
|
||||
|
@ -108,22 +123,6 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
$files[] = $file;
|
||||
}
|
||||
return $files;
|
||||
} else if ($format == self::FORMAT_FILE_APP_ROOT) {
|
||||
$mtime = 0;
|
||||
$size = 0;
|
||||
foreach ($items as $item) {
|
||||
if ($item['mtime'] > $mtime) {
|
||||
$mtime = $item['mtime'];
|
||||
}
|
||||
$size += (int)$item['size'];
|
||||
}
|
||||
return array(
|
||||
'fileid' => -1,
|
||||
'name' => 'Shared',
|
||||
'mtime' => $mtime,
|
||||
'mimetype' => 'httpd/unix-directory',
|
||||
'size' => $size
|
||||
);
|
||||
} else if ($format == self::FORMAT_OPENDIR) {
|
||||
$files = array();
|
||||
foreach ($items as $item) {
|
||||
|
@ -142,28 +141,22 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
$filePermissions[$item['file_source']] = $item['permissions'];
|
||||
}
|
||||
return $filePermissions;
|
||||
} else if ($format === self::FORMAT_TARGET_NAMES) {
|
||||
$targets = array();
|
||||
foreach ($items as $item) {
|
||||
$targets[] = $item['file_target'];
|
||||
}
|
||||
return $targets;
|
||||
}
|
||||
return array();
|
||||
}
|
||||
|
||||
public static function getSource($target) {
|
||||
if ($target == '') {
|
||||
return false;
|
||||
}
|
||||
$target = '/'.$target;
|
||||
$target = rtrim($target, '/');
|
||||
$pos = strpos($target, '/', 1);
|
||||
// Get shared folder name
|
||||
if ($pos !== false) {
|
||||
$folder = substr($target, 0, $pos);
|
||||
$source = \OCP\Share::getItemSharedWith('folder', $folder, \OC_Share_Backend_File::FORMAT_SHARED_STORAGE);
|
||||
if ($source) {
|
||||
$source['path'] = $source['path'].substr($target, strlen($folder));
|
||||
}
|
||||
} else {
|
||||
$source = \OCP\Share::getItemSharedWith('file', $target, \OC_Share_Backend_File::FORMAT_SHARED_STORAGE);
|
||||
}
|
||||
if ($source) {
|
||||
/**
|
||||
* @brief resolve reshares to return the correct source item
|
||||
* @param array $source
|
||||
* @return array source item
|
||||
*/
|
||||
protected static function resolveReshares($source) {
|
||||
if (isset($source['parent'])) {
|
||||
$parent = $source['parent'];
|
||||
while (isset($parent)) {
|
||||
|
@ -179,9 +172,29 @@ class OC_Share_Backend_File implements OCP\Share_Backend_File_Dependent {
|
|||
} else {
|
||||
$fileOwner = $source['uid_owner'];
|
||||
}
|
||||
if (isset($fileOwner)) {
|
||||
$source['fileOwner'] = $fileOwner;
|
||||
} else {
|
||||
\OCP\Util::writeLog('files_sharing', "No owner found for reshare", \OCP\Util::ERROR);
|
||||
}
|
||||
|
||||
return $source;
|
||||
}
|
||||
|
||||
public static function getSource($target, $mountPoint, $itemType) {
|
||||
|
||||
if ($itemType === 'folder') {
|
||||
$source = \OCP\Share::getItemSharedWith('folder', $mountPoint, \OC_Share_Backend_File::FORMAT_SHARED_STORAGE);
|
||||
if ($source && $target !== '') {
|
||||
$source['path'] = $source['path'].'/'.$target;
|
||||
}
|
||||
} else {
|
||||
$source = \OCP\Share::getItemSharedWith('file', $mountPoint, \OC_Share_Backend_File::FORMAT_SHARED_STORAGE);
|
||||
}
|
||||
if ($source) {
|
||||
return self::resolveReshares($source);
|
||||
}
|
||||
|
||||
\OCP\Util::writeLog('files_sharing', 'File source not found for: '.$target, \OCP\Util::DEBUG);
|
||||
return false;
|
||||
}
|
||||
|
|
|
@ -2,8 +2,9 @@
|
|||
/**
|
||||
* ownCloud
|
||||
*
|
||||
* @author Michael Gapczynski
|
||||
* @copyright 2011 Michael Gapczynski mtgap@owncloud.com
|
||||
* @author Bjoern Schiessle, Michael Gapczynski
|
||||
* @copyright 2011 Michael Gapczynski <mtgap@owncloud.com>
|
||||
* 2014 Bjoern Schiessle <schiessle@owncloud.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
|
@ -27,15 +28,27 @@ namespace OC\Files\Storage;
|
|||
*/
|
||||
class Shared extends \OC\Files\Storage\Common {
|
||||
|
||||
private $sharedFolder;
|
||||
private $share; // the shared resource
|
||||
private $files = array();
|
||||
|
||||
public function __construct($arguments) {
|
||||
$this->sharedFolder = $arguments['sharedFolder'];
|
||||
$this->share = $arguments['share'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @breif get id of the mount point
|
||||
* @return string
|
||||
*/
|
||||
public function getId() {
|
||||
return 'shared::' . $this->sharedFolder;
|
||||
return 'shared::' . $this->getMountPoint();
|
||||
}
|
||||
|
||||
/**
|
||||
* @breif get file cache of the shared item source
|
||||
* @return string
|
||||
*/
|
||||
public function getSourceId() {
|
||||
return $this->share['file_source'];
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -48,14 +61,14 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
if (!isset($this->files[$target])) {
|
||||
// Check for partial files
|
||||
if (pathinfo($target, PATHINFO_EXTENSION) === 'part') {
|
||||
$source = \OC_Share_Backend_File::getSource(substr($target, 0, -5));
|
||||
$source = \OC_Share_Backend_File::getSource(substr($target, 0, -5), $this->getMountPoint(), $this->getItemType());
|
||||
if ($source) {
|
||||
$source['path'] .= '.part';
|
||||
// All partial files have delete permission
|
||||
$source['permissions'] |= \OCP\PERMISSION_DELETE;
|
||||
}
|
||||
} else {
|
||||
$source = \OC_Share_Backend_File::getSource($target);
|
||||
$source = \OC_Share_Backend_File::getSource($target, $this->getMountPoint(), $this->getItemType());
|
||||
}
|
||||
$this->files[$target] = $source;
|
||||
}
|
||||
|
@ -117,26 +130,16 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
}
|
||||
|
||||
public function opendir($path) {
|
||||
if ($path == '' || $path == '/') {
|
||||
$files = \OCP\Share::getItemsSharedWith('file', \OC_Share_Backend_Folder::FORMAT_OPENDIR);
|
||||
\OC\Files\Stream\Dir::register('shared', $files);
|
||||
return opendir('fakedir://shared');
|
||||
} else if ($source = $this->getSourcePath($path)) {
|
||||
$source = $this->getSourcePath($path);
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
return $storage->opendir($internalPath);
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
public function is_dir($path) {
|
||||
if ($path == '' || $path == '/') {
|
||||
return true;
|
||||
} else if ($source = $this->getSourcePath($path)) {
|
||||
$source = $this->getSourcePath($path);
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
return $storage->is_dir($internalPath);
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
public function is_file($path) {
|
||||
if ($source = $this->getSourcePath($path)) {
|
||||
|
@ -180,7 +183,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function isCreatable($path) {
|
||||
if ($path == '') {
|
||||
return false;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
return ($this->getPermissions($path) & \OCP\PERMISSION_CREATE);
|
||||
}
|
||||
|
@ -191,21 +194,21 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function isUpdatable($path) {
|
||||
if ($path == '') {
|
||||
return false;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
return ($this->getPermissions($path) & \OCP\PERMISSION_UPDATE);
|
||||
}
|
||||
|
||||
public function isDeletable($path) {
|
||||
if ($path == '') {
|
||||
return true;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
return ($this->getPermissions($path) & \OCP\PERMISSION_DELETE);
|
||||
}
|
||||
|
||||
public function isSharable($path) {
|
||||
if ($path == '') {
|
||||
return false;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
return ($this->getPermissions($path) & \OCP\PERMISSION_SHARE);
|
||||
}
|
||||
|
@ -221,32 +224,16 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
}
|
||||
|
||||
public function filemtime($path) {
|
||||
if ($path == '' || $path == '/') {
|
||||
$mtime = 0;
|
||||
$dh = $this->opendir($path);
|
||||
if (is_resource($dh)) {
|
||||
while (($filename = readdir($dh)) !== false) {
|
||||
$tempmtime = $this->filemtime($filename);
|
||||
if ($tempmtime > $mtime) {
|
||||
$mtime = $tempmtime;
|
||||
}
|
||||
}
|
||||
}
|
||||
return $mtime;
|
||||
} else {
|
||||
$source = $this->getSourcePath($path);
|
||||
if ($source) {
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
return $storage->filemtime($internalPath);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public function file_get_contents($path) {
|
||||
$source = $this->getSourcePath($path);
|
||||
if ($source) {
|
||||
$info = array(
|
||||
'target' => $this->sharedFolder . $path,
|
||||
'target' => $this->getMountPoint() . $path,
|
||||
'source' => $source,
|
||||
);
|
||||
\OCP\Util::emitHook('\OC\Files\Storage\Shared', 'file_get_contents', $info);
|
||||
|
@ -264,7 +251,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
return false;
|
||||
}
|
||||
$info = array(
|
||||
'target' => $this->sharedFolder . $path,
|
||||
'target' => $this->getMountPoint() . '/' . $path,
|
||||
'source' => $source,
|
||||
);
|
||||
\OCP\Util::emitHook('\OC\Files\Storage\Shared', 'file_put_contents', $info);
|
||||
|
@ -277,6 +264,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function unlink($path) {
|
||||
// Delete the file if DELETE permission is granted
|
||||
$path = ($path === false) ? '' : $path;
|
||||
if ($source = $this->getSourcePath($path)) {
|
||||
if ($this->isDeletable($path)) {
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
|
@ -286,23 +274,117 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
return false;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Format a path to be relative to the /user/files/ directory
|
||||
* @param string $path the absolute path
|
||||
* @return string e.g. turns '/admin/files/test.txt' into '/test.txt'
|
||||
*/
|
||||
private static function stripUserFilesPath($path) {
|
||||
$trimmed = ltrim($path, '/');
|
||||
$split = explode('/', $trimmed);
|
||||
|
||||
// it is not a file relative to data/user/files
|
||||
if (count($split) < 3 || $split[1] !== 'files') {
|
||||
\OCP\Util::writeLog('file sharing',
|
||||
'Can not strip userid and "files/" from path: ' . $path,
|
||||
\OCP\Util::DEBUG);
|
||||
return false;
|
||||
}
|
||||
|
||||
// skip 'user' and 'files'
|
||||
$sliced = array_slice($split, 2);
|
||||
$relPath = implode('/', $sliced);
|
||||
|
||||
return '/' . $relPath;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief rename a shared folder/file
|
||||
* @param string $sourcePath
|
||||
* @param string $targetPath
|
||||
* @return bool
|
||||
*/
|
||||
private function renameMountPoint($sourcePath, $targetPath) {
|
||||
|
||||
// it shouldn't be possible to move a Shared storage into another one
|
||||
list($targetStorage, ) = \OC\Files\Filesystem::resolvePath($targetPath);
|
||||
if ($targetStorage instanceof \OC\Files\Storage\Shared) {
|
||||
\OCP\Util::writeLog('file sharing',
|
||||
'It is not allowed to move one mount point into another one',
|
||||
\OCP\Util::DEBUG);
|
||||
return false;
|
||||
}
|
||||
|
||||
$relTargetPath = $this->stripUserFilesPath($targetPath);
|
||||
|
||||
// if the user renames a mount point from a group share we need to create a new db entry
|
||||
// for the unique name
|
||||
if ($this->getShareType() === \OCP\Share::SHARE_TYPE_GROUP && $this->uniqueNameSet() === false) {
|
||||
$query = \OC_DB::prepare('INSERT INTO `*PREFIX*share` (`item_type`, `item_source`, `item_target`,'
|
||||
.' `share_type`, `share_with`, `uid_owner`, `permissions`, `stime`, `file_source`,'
|
||||
.' `file_target`, `token`, `parent`) VALUES (?,?,?,?,?,?,?,?,?,?,?,?)');
|
||||
$arguments = array($this->share['item_type'], $this->share['item_source'], $this->share['item_target'],
|
||||
2, \OCP\User::getUser(), $this->share['uid_owner'], $this->share['permissions'], $this->share['stime'], $this->share['file_source'],
|
||||
$relTargetPath, $this->share['token'], $this->share['id']);
|
||||
|
||||
} else {
|
||||
// rename mount point
|
||||
$query = \OC_DB::prepare(
|
||||
'Update `*PREFIX*share`
|
||||
SET `file_target` = ?
|
||||
WHERE `id` = ?'
|
||||
);
|
||||
$arguments = array($relTargetPath, $this->getShareId());
|
||||
}
|
||||
|
||||
$result = $query->execute($arguments);
|
||||
|
||||
if ($result) {
|
||||
// update the mount manager with the new paths
|
||||
$mountManager = \OC\Files\Filesystem::getMountManager();
|
||||
$mount = $mountManager->find($sourcePath);
|
||||
$mount->setMountPoint($targetPath . '/');
|
||||
$mountManager->addMount($mount);
|
||||
$mountManager->removeMount($sourcePath . '/');
|
||||
$this->setUniqueName();
|
||||
$this->setMountPoint($relTargetPath);
|
||||
|
||||
} else {
|
||||
\OCP\Util::writeLog('file sharing',
|
||||
'Could not rename mount point for shared folder "' . $sourcePath . '" to "' . $targetPath . '"',
|
||||
\OCP\Util::ERROR);
|
||||
}
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
|
||||
public function rename($path1, $path2) {
|
||||
// Renaming/moving is only allowed within shared folders
|
||||
$pos1 = strpos($path1, '/', 1);
|
||||
$pos2 = strpos($path2, '/', 1);
|
||||
if ($pos1 !== false && $pos2 !== false && ($oldSource = $this->getSourcePath($path1))) {
|
||||
$newSource = $this->getSourcePath(dirname($path2)) . '/' . basename($path2);
|
||||
// Within the same folder, we only need UPDATE permissions
|
||||
if (dirname($path1) == dirname($path2) and $this->isUpdatable($path1)) {
|
||||
list($storage, $oldInternalPath) = \OC\Files\Filesystem::resolvePath($oldSource);
|
||||
list(, $newInternalPath) = \OC\Files\Filesystem::resolvePath($newSource);
|
||||
return $storage->rename($oldInternalPath, $newInternalPath);
|
||||
|
||||
$sourceMountPoint = \OC\Files\Filesystem::getMountPoint($path1);
|
||||
$targetMountPoint = \OC\Files\Filesystem::getMountPoint($path2);
|
||||
$relPath1 = \OCA\Files_Sharing\Helper::stripUserFilesPath($path1);
|
||||
$relPath2 = \OCA\Files_Sharing\Helper::stripUserFilesPath($path2);
|
||||
|
||||
// if we renamed the mount point we need to adjust the file_target in the
|
||||
// database
|
||||
if (\OC\Files\Filesystem::normalizePath($sourceMountPoint) === \OC\Files\Filesystem::normalizePath($path1)) {
|
||||
return $this->renameMountPoint($path1, $path2);
|
||||
}
|
||||
|
||||
|
||||
if ( // Within the same mount point, we only need UPDATE permissions
|
||||
($sourceMountPoint === $targetMountPoint && $this->isUpdatable($sourceMountPoint)) ||
|
||||
// otherwise DELETE and CREATE permissions required
|
||||
} elseif ($this->isDeletable($path1) && $this->isCreatable(dirname($path2))) {
|
||||
($this->isDeletable($path1) && $this->isCreatable(dirname($path2)))) {
|
||||
|
||||
list($user1, $path1) = \OCA\Files_Sharing\Helper::getUidAndFilename($relPath1);
|
||||
$targetFilename = basename($relPath2);
|
||||
list($user2, $path2) = \OCA\Files_Sharing\Helper::getUidAndFilename(dirname($relPath2));
|
||||
$rootView = new \OC\Files\View('');
|
||||
return $rootView->rename($oldSource, $newSource);
|
||||
}
|
||||
return $rootView->rename('/' . $user1 . '/files/' . $path1, '/' . $user2 . '/files/' . $path2 . '/' . $targetFilename);
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -343,7 +425,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
}
|
||||
}
|
||||
$info = array(
|
||||
'target' => $this->sharedFolder . $path,
|
||||
'target' => $this->getMountPoint() . $path,
|
||||
'source' => $source,
|
||||
'mode' => $mode,
|
||||
);
|
||||
|
@ -355,9 +437,6 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
}
|
||||
|
||||
public function getMimeType($path) {
|
||||
if ($path == '' || $path == '/') {
|
||||
return 'httpd/unix-directory';
|
||||
}
|
||||
if ($source = $this->getSourcePath($path)) {
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
return $storage->getMimeType($internalPath);
|
||||
|
@ -367,13 +446,14 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function free_space($path) {
|
||||
if ($path == '') {
|
||||
return \OC\Files\SPACE_UNKNOWN;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
$source = $this->getSourcePath($path);
|
||||
if ($source) {
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
return $storage->free_space($internalPath);
|
||||
}
|
||||
return \OC\Files\SPACE_UNKNOWN;
|
||||
}
|
||||
|
||||
public function getLocalFile($path) {
|
||||
|
@ -393,20 +473,80 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
}
|
||||
|
||||
public static function setup($options) {
|
||||
$shares = \OCP\Share::getItemsSharedWith('file');
|
||||
if (!\OCP\User::isLoggedIn() || \OCP\User::getUser() != $options['user']
|
||||
|| \OCP\Share::getItemsSharedWith('file')
|
||||
|| $shares
|
||||
) {
|
||||
$user_dir = $options['user_dir'];
|
||||
foreach ($shares as $share) {
|
||||
\OC\Files\Filesystem::mount('\OC\Files\Storage\Shared',
|
||||
array('sharedFolder' => '/Shared'),
|
||||
$user_dir . '/Shared/');
|
||||
array(
|
||||
'share' => $share,
|
||||
),
|
||||
$options['user_dir'] . '/' . $share['file_target']);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public function hasUpdated($path, $time) {
|
||||
if ($path == '') {
|
||||
return false;
|
||||
/**
|
||||
* @brief return mount point of share, relative to data/user/files
|
||||
* @return string
|
||||
*/
|
||||
public function getMountPoint() {
|
||||
return $this->share['file_target'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get share type
|
||||
* @return integer can be single user share (0) group share (1), unique group share name (2)
|
||||
*/
|
||||
private function getShareType() {
|
||||
return $this->share['share_type'];
|
||||
}
|
||||
|
||||
private function setMountPoint($path) {
|
||||
$this->share['file_target'] = $path;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief does the group share already has a user specific unique name
|
||||
* @return bool
|
||||
*/
|
||||
private function uniqueNameSet() {
|
||||
return (isset($this->share['unique_name']) && $this->share['unique_name']);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief the share now uses a unique name of this user
|
||||
*/
|
||||
private function setUniqueName() {
|
||||
$this->share['unique_name'] = true;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get share ID
|
||||
* @return integer unique share ID
|
||||
*/
|
||||
private function getShareId() {
|
||||
return $this->share['id'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief get the user who shared the file
|
||||
* @return string
|
||||
*/
|
||||
public function getSharedFrom() {
|
||||
return $this->share['uid_owner'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief return share type, can be "file" or "folder"
|
||||
* @return string
|
||||
*/
|
||||
public function getItemType() {
|
||||
return $this->share['item_type'];
|
||||
}
|
||||
|
||||
public function hasUpdated($path, $time) {
|
||||
return $this->filemtime($path) > $time;
|
||||
}
|
||||
|
||||
|
@ -428,7 +568,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function getOwner($path) {
|
||||
if ($path == '') {
|
||||
return false;
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
$source = $this->getFile($path);
|
||||
if ($source) {
|
||||
|
@ -439,7 +579,7 @@ class Shared extends \OC\Files\Storage\Common {
|
|||
|
||||
public function getETag($path) {
|
||||
if ($path == '') {
|
||||
return parent::getETag($path);
|
||||
$path = $this->getMountPoint();
|
||||
}
|
||||
if ($source = $this->getSourcePath($path)) {
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath($source);
|
||||
|
|
|
@ -26,31 +26,48 @@ class Shared_Updater {
|
|||
// shares which can be removed from oc_share after the delete operation was successful
|
||||
static private $toRemove = array();
|
||||
|
||||
/**
|
||||
* @brief walk up the users file tree and update the etags
|
||||
* @param string $user
|
||||
* @param string $path
|
||||
*/
|
||||
static private function correctUsersFolder($user, $path) {
|
||||
// $path points to the mount point which is a virtual folder, so we start with
|
||||
// the parent
|
||||
$path = '/files' . dirname($path);
|
||||
\OC\Files\Filesystem::initMountPoints($user);
|
||||
$view = new \OC\Files\View('/' . $user);
|
||||
if ($view->file_exists($path)) {
|
||||
while ($path !== '/') {
|
||||
$etag = $view->getETag($path);
|
||||
$view->putFileInfo($path, array('etag' => $etag));
|
||||
$path = dirname($path);
|
||||
}
|
||||
} else {
|
||||
error_log("error!" . 'can not update etags on ' . $path . ' for user ' . $user);
|
||||
\OCP\Util::writeLog('files_sharing', 'can not update etags on ' . $path . ' for user ' . $user, \OCP\Util::ERROR);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Correct the parent folders' ETags for all users shared the file at $target
|
||||
*
|
||||
* @param string $target
|
||||
*/
|
||||
static public function correctFolders($target) {
|
||||
$uid = \OCP\User::getUser();
|
||||
$uidOwner = \OC\Files\Filesystem::getOwner($target);
|
||||
$info = \OC\Files\Filesystem::getFileInfo($target);
|
||||
$checkedUser = array($uidOwner);
|
||||
// Correct Shared folders of other users shared with
|
||||
$users = \OCP\Share::getUsersItemShared('file', $info['fileid'], $uidOwner, true);
|
||||
if (!empty($users)) {
|
||||
while (!empty($users)) {
|
||||
$reshareUsers = array();
|
||||
$shares = \OCA\Files_Sharing\Helper::getSharesFromItem($target);
|
||||
|
||||
foreach ($shares as $share) {
|
||||
if ((int)$share['share_type'] === \OCP\Share::SHARE_TYPE_USER) {
|
||||
self::correctUsersFolder($share['share_with'], $share['file_target']);
|
||||
} elseif ((int)$share['share_type'] === \OCP\Share::SHARE_TYPE_GROUP) {
|
||||
$users = \OC_Group::usersInGroup($share['share_with']);
|
||||
foreach ($users as $user) {
|
||||
if ( !in_array($user, $checkedUser) ) {
|
||||
$etag = \OC\Files\Filesystem::getETag('');
|
||||
\OCP\Config::setUserValue($user, 'files_sharing', 'etag', $etag);
|
||||
// Look for reshares
|
||||
$reshareUsers = array_merge($reshareUsers, \OCP\Share::getUsersItemShared('file', $info['fileid'], $user, true));
|
||||
$checkedUser[] = $user;
|
||||
self::correctUsersFolder($user, $share['file_target']);
|
||||
}
|
||||
}
|
||||
$users = $reshareUsers;
|
||||
} else { //unique name for group share
|
||||
self::correctUsersFolder($share['share_with'], $share['file_target']);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -107,34 +124,6 @@ class Shared_Updater {
|
|||
self::removeShare($params['path']);
|
||||
}
|
||||
|
||||
/**
|
||||
* @param array $params
|
||||
*/
|
||||
static public function shareHook($params) {
|
||||
if ($params['itemType'] === 'file' || $params['itemType'] === 'folder') {
|
||||
if (isset($params['uidOwner'])) {
|
||||
$uidOwner = $params['uidOwner'];
|
||||
} else {
|
||||
$uidOwner = \OCP\User::getUser();
|
||||
}
|
||||
$users = \OCP\Share::getUsersItemShared($params['itemType'], $params['fileSource'], $uidOwner, true, false);
|
||||
if (!empty($users)) {
|
||||
while (!empty($users)) {
|
||||
$reshareUsers = array();
|
||||
foreach ($users as $user) {
|
||||
if ($user !== $uidOwner) {
|
||||
$etag = \OC\Files\Filesystem::getETag('');
|
||||
\OCP\Config::setUserValue($user, 'files_sharing', 'etag', $etag);
|
||||
// Look for reshares
|
||||
$reshareUsers = array_merge($reshareUsers, \OCP\Share::getUsersItemShared('file', $params['fileSource'], $user, true));
|
||||
}
|
||||
}
|
||||
$users = $reshareUsers;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* clean up oc_share table from files which are no longer exists
|
||||
*
|
||||
|
|
|
@ -32,7 +32,7 @@ class Shared_Watcher extends Watcher {
|
|||
* @param string $path
|
||||
*/
|
||||
public function checkUpdate($path) {
|
||||
if ($path != '' && parent::checkUpdate($path) === true) {
|
||||
if (parent::checkUpdate($path) === true) {
|
||||
// since checkUpdate() has already updated the size of the subdirs,
|
||||
// only apply the update to the owner's parent dirs
|
||||
|
||||
|
|
|
@ -324,10 +324,10 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
$this->assertTrue(is_string($result));
|
||||
|
||||
$testValues=array(
|
||||
array('query' => 'Shared/' . $this->folder,
|
||||
'expectedResult' => '/Shared' . $this->folder . $this->filename),
|
||||
array('query' => 'Shared/' . $this->folder . $this->subfolder,
|
||||
'expectedResult' => '/Shared' . $this->folder . $this->subfolder . $this->filename),
|
||||
array('query' => $this->folder,
|
||||
'expectedResult' => $this->folder . $this->filename),
|
||||
array('query' => $this->folder . $this->subfolder,
|
||||
'expectedResult' => $this->folder . $this->subfolder . $this->filename),
|
||||
);
|
||||
foreach ($testValues as $value) {
|
||||
|
||||
|
@ -382,7 +382,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
// share was successful?
|
||||
$this->assertTrue(is_string($result));
|
||||
|
||||
$_GET['path'] = '/Shared';
|
||||
$_GET['path'] = '/';
|
||||
$_GET['subfiles'] = 'true';
|
||||
|
||||
$result = Share\Api::getAllShares(array());
|
||||
|
@ -395,7 +395,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
// we should get exactly one result
|
||||
$this->assertEquals(1, count($data));
|
||||
|
||||
$expectedPath = '/Shared' . $this->subfolder;
|
||||
$expectedPath = $this->subfolder;
|
||||
$this->assertEquals($expectedPath, $data[0]['path']);
|
||||
|
||||
// cleanup
|
||||
|
@ -444,7 +444,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
$this->assertTrue(is_string($result));
|
||||
|
||||
|
||||
$_GET['path'] = '/Shared';
|
||||
$_GET['path'] = '/';
|
||||
$_GET['subfiles'] = 'true';
|
||||
|
||||
$result = Share\Api::getAllShares(array());
|
||||
|
@ -457,7 +457,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
// we should get exactly one result
|
||||
$this->assertEquals(1, count($data));
|
||||
|
||||
$expectedPath = '/Shared' . $this->subsubfolder;
|
||||
$expectedPath = $this->subsubfolder;
|
||||
$this->assertEquals($expectedPath, $data[0]['path']);
|
||||
|
||||
|
||||
|
@ -512,8 +512,8 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
$this->assertTrue(is_string($result));
|
||||
|
||||
|
||||
// ask for shared/subfolder
|
||||
$expectedPath1 = '/Shared' . $this->subfolder;
|
||||
// ask for subfolder
|
||||
$expectedPath1 = $this->subfolder;
|
||||
$_GET['path'] = $expectedPath1;
|
||||
|
||||
$result1 = Share\Api::getAllShares(array());
|
||||
|
@ -524,8 +524,8 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
$data1 = $result1->getData();
|
||||
$share1 = reset($data1);
|
||||
|
||||
// ask for shared/folder/subfolder
|
||||
$expectedPath2 = '/Shared' . $this->folder . $this->subfolder;
|
||||
// ask for folder/subfolder
|
||||
$expectedPath2 = $this->folder . $this->subfolder;
|
||||
$_GET['path'] = $expectedPath2;
|
||||
|
||||
$result2 = Share\Api::getAllShares(array());
|
||||
|
@ -595,7 +595,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
$this->assertTrue(is_string($result));
|
||||
|
||||
|
||||
$_GET['path'] = '/Shared';
|
||||
$_GET['path'] = '/';
|
||||
$_GET['subfiles'] = 'true';
|
||||
|
||||
$result = Share\Api::getAllShares(array());
|
||||
|
@ -608,7 +608,7 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
// we should get exactly one result
|
||||
$this->assertEquals(1, count($data));
|
||||
|
||||
$expectedPath = '/Shared' . $this->filename;
|
||||
$expectedPath = $this->filename;
|
||||
$this->assertEquals($expectedPath, $data[0]['path']);
|
||||
|
||||
|
||||
|
@ -866,16 +866,66 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
|
||||
$this->assertTrue($result3->succeeded());
|
||||
|
||||
// cleanup
|
||||
\Test_Files_Sharing_Api::loginHelper(\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER1);
|
||||
|
||||
$result = \OCP\Share::unshare('folder', $fileInfo1['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
||||
\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER2);
|
||||
|
||||
$this->assertTrue($result);
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
function testCorrectPath() {
|
||||
$path = "/foo/bar/test.txt";
|
||||
$folder = "/correct/path";
|
||||
$expectedResult = "/correct/path/test.txt";
|
||||
/**
|
||||
* @brief share a folder which contains a share mount point, should be forbidden
|
||||
*/
|
||||
public function testShareFolderWithAMountPoint() {
|
||||
// user 1 shares a folder with user2
|
||||
\Test_Files_Sharing_Api::loginHelper(\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER1);
|
||||
|
||||
$shareApiDummy = new TestShareApi();
|
||||
$fileInfo = $this->view->getFileInfo($this->folder);
|
||||
|
||||
$this->assertSame($expectedResult, $shareApiDummy->correctPathTest($path, $folder));
|
||||
$result = \OCP\Share::shareItem('folder', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
||||
\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER2, 31);
|
||||
|
||||
$this->assertTrue($result);
|
||||
|
||||
// user2 shares a file from the folder as link
|
||||
\Test_Files_Sharing_Api::loginHelper(\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER2);
|
||||
|
||||
$view = new \OC\Files\View('/' . \Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER2 . '/files');
|
||||
$view->mkdir("localDir");
|
||||
|
||||
// move mount point to the folder "localDir"
|
||||
$result = $view->rename($this->folder, 'localDir/'.$this->folder);
|
||||
$this->assertTrue($result !== false);
|
||||
|
||||
// try to share "localDir"
|
||||
$fileInfo2 = $view->getFileInfo('localDir');
|
||||
|
||||
$this->assertTrue($fileInfo2 instanceof \OC\Files\FileInfo);
|
||||
|
||||
try {
|
||||
$result2 = \OCP\Share::shareItem('folder', $fileInfo2['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
||||
\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER3, 31);
|
||||
} catch (\Exception $e) {
|
||||
$result2 = false;
|
||||
}
|
||||
|
||||
$this->assertFalse($result2);
|
||||
|
||||
//cleanup
|
||||
|
||||
$result = $view->rename('localDir/' . $this->folder, $this->folder);
|
||||
$this->assertTrue($result !== false);
|
||||
$view->unlink('localDir');
|
||||
|
||||
\Test_Files_Sharing_Api::loginHelper(\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER1);
|
||||
|
||||
\OCP\Share::unshare('folder', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
||||
\Test_Files_Sharing_Api::TEST_FILES_SHARING_API_USER2);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -902,12 +952,3 @@ class Test_Files_Sharing_Api extends Test_Files_Sharing_Base {
|
|||
}
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief dumnmy class to test protected methods
|
||||
*/
|
||||
class TestShareApi extends \OCA\Files\Share\Api {
|
||||
public function correctPathTest($path, $folder) {
|
||||
return self::correctPath($path, $folder);
|
||||
}
|
||||
}
|
||||
|
|
|
@ -102,22 +102,20 @@ abstract class Test_Files_Sharing_Base extends \PHPUnit_Framework_TestCase {
|
|||
* @param bool $password
|
||||
*/
|
||||
protected static function loginHelper($user, $create = false, $password = false) {
|
||||
if ($create) {
|
||||
\OC_User::createUser($user, $user);
|
||||
}
|
||||
|
||||
if ($password === false) {
|
||||
$password = $user;
|
||||
}
|
||||
|
||||
if ($create) {
|
||||
\OC_User::createUser($user, $password);
|
||||
}
|
||||
|
||||
\OC_Util::tearDownFS();
|
||||
\OC_User::setUserId('');
|
||||
\OC\Files\Filesystem::tearDown();
|
||||
\OC_Util::setupFS($user);
|
||||
\OC_User::setUserId($user);
|
||||
|
||||
$params['uid'] = $user;
|
||||
$params['password'] = $password;
|
||||
\OC_Util::setupFS($user);
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -68,7 +68,7 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
|
||||
// retrieve the shared storage
|
||||
$secondView = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2);
|
||||
list($this->sharedStorage, $internalPath) = $secondView->resolvePath('files/Shared/shareddir');
|
||||
list($this->sharedStorage, $internalPath) = $secondView->resolvePath('files/shareddir');
|
||||
$this->sharedCache = $this->sharedStorage->getCache();
|
||||
}
|
||||
|
||||
|
@ -98,46 +98,46 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
function testSearchByMime() {
|
||||
$results = $this->sharedStorage->getCache()->searchByMime('text');
|
||||
$check = array(
|
||||
array(
|
||||
'name' => 'shared single file.txt',
|
||||
'path' => 'shared single file.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'bar.txt',
|
||||
'path' => 'shareddir/bar.txt'
|
||||
'path' => 'bar.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'another too.txt',
|
||||
'path' => 'shareddir/subdir/another too.txt'
|
||||
'path' => 'subdir/another too.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'another.txt',
|
||||
'path' => 'shareddir/subdir/another.txt'
|
||||
'path' => 'subdir/another.txt'
|
||||
),
|
||||
);
|
||||
$this->verifyFiles($check, $results);
|
||||
|
||||
$results2 = $this->sharedStorage->getCache()->searchByMime('text/plain');
|
||||
|
||||
$this->verifyFiles($check, $results);
|
||||
}
|
||||
|
||||
function testGetFolderContentsInRoot() {
|
||||
$results = $this->user2View->getDirectoryContent('/Shared/');
|
||||
$results = $this->user2View->getDirectoryContent('/');
|
||||
|
||||
// we should get the shared items "shareddir" and "shared single file.txt"
|
||||
// additional root will always contain the example file "welcome.txt",
|
||||
// so this will be part of the result
|
||||
$this->verifyFiles(
|
||||
array(
|
||||
array(
|
||||
'name' => 'welcome.txt',
|
||||
'path' => 'files/welcome.txt',
|
||||
'mimetype' => 'text/plain',
|
||||
),
|
||||
array(
|
||||
'name' => 'shareddir',
|
||||
'path' => '/shareddir',
|
||||
'path' => 'files/shareddir',
|
||||
'mimetype' => 'httpd/unix-directory',
|
||||
'usersPath' => 'files/Shared/shareddir'
|
||||
),
|
||||
array(
|
||||
'name' => 'shared single file.txt',
|
||||
'path' => '/shared single file.txt',
|
||||
'path' => 'files/shared single file.txt',
|
||||
'mimetype' => 'text/plain',
|
||||
'usersPath' => 'files/Shared/shared single file.txt'
|
||||
),
|
||||
),
|
||||
$results
|
||||
|
@ -145,27 +145,24 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
}
|
||||
|
||||
function testGetFolderContentsInSubdir() {
|
||||
$results = $this->user2View->getDirectoryContent('/Shared/shareddir');
|
||||
$results = $this->user2View->getDirectoryContent('/shareddir');
|
||||
|
||||
$this->verifyFiles(
|
||||
array(
|
||||
array(
|
||||
'name' => 'bar.txt',
|
||||
'path' => 'files/container/shareddir/bar.txt',
|
||||
'path' => 'bar.txt',
|
||||
'mimetype' => 'text/plain',
|
||||
'usersPath' => 'files/Shared/shareddir/bar.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'emptydir',
|
||||
'path' => 'files/container/shareddir/emptydir',
|
||||
'path' => 'emptydir',
|
||||
'mimetype' => 'httpd/unix-directory',
|
||||
'usersPath' => 'files/Shared/shareddir/emptydir'
|
||||
),
|
||||
array(
|
||||
'name' => 'subdir',
|
||||
'path' => 'files/container/shareddir/subdir',
|
||||
'path' => 'subdir',
|
||||
'mimetype' => 'httpd/unix-directory',
|
||||
'usersPath' => 'files/Shared/shareddir/subdir'
|
||||
),
|
||||
),
|
||||
$results
|
||||
|
@ -182,27 +179,24 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
self::loginHelper(self::TEST_FILES_SHARING_API_USER3);
|
||||
|
||||
$thirdView = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER3 . '/files');
|
||||
$results = $thirdView->getDirectoryContent('/Shared/subdir');
|
||||
$results = $thirdView->getDirectoryContent('/subdir');
|
||||
|
||||
$this->verifyFiles(
|
||||
array(
|
||||
array(
|
||||
'name' => 'another too.txt',
|
||||
'path' => 'files/container/shareddir/subdir/another too.txt',
|
||||
'path' => 'another too.txt',
|
||||
'mimetype' => 'text/plain',
|
||||
'usersPath' => 'files/Shared/subdir/another too.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'another.txt',
|
||||
'path' => 'files/container/shareddir/subdir/another.txt',
|
||||
'path' => 'another.txt',
|
||||
'mimetype' => 'text/plain',
|
||||
'usersPath' => 'files/Shared/subdir/another.txt'
|
||||
),
|
||||
array(
|
||||
'name' => 'not a text file.xml',
|
||||
'path' => 'files/container/shareddir/subdir/not a text file.xml',
|
||||
'path' => 'not a text file.xml',
|
||||
'mimetype' => 'application/xml',
|
||||
'usersPath' => 'files/Shared/subdir/not a text file.xml'
|
||||
),
|
||||
),
|
||||
$results
|
||||
|
@ -254,14 +248,14 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
\OC_Util::tearDownFS();
|
||||
|
||||
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
||||
$this->assertTrue(\OC\Files\Filesystem::file_exists('/Shared/test.txt'));
|
||||
list($sharedStorage) = \OC\Files\Filesystem::resolvePath('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/Shared/test.txt');
|
||||
$this->assertTrue(\OC\Files\Filesystem::file_exists('/test.txt'));
|
||||
list($sharedStorage) = \OC\Files\Filesystem::resolvePath('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/test.txt');
|
||||
/**
|
||||
* @var \OC\Files\Storage\Shared $sharedStorage
|
||||
*/
|
||||
|
||||
$sharedCache = $sharedStorage->getCache();
|
||||
$this->assertEquals('test.txt', $sharedCache->getPathById($info->getId()));
|
||||
$this->assertEquals('', $sharedCache->getPathById($info->getId()));
|
||||
}
|
||||
|
||||
public function testGetPathByIdShareSubFolder() {
|
||||
|
@ -275,14 +269,14 @@ class Test_Files_Sharing_Cache extends Test_Files_Sharing_Base {
|
|||
\OC_Util::tearDownFS();
|
||||
|
||||
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
||||
$this->assertTrue(\OC\Files\Filesystem::file_exists('/Shared/foo'));
|
||||
list($sharedStorage) = \OC\Files\Filesystem::resolvePath('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/Shared/foo');
|
||||
$this->assertTrue(\OC\Files\Filesystem::file_exists('/foo'));
|
||||
list($sharedStorage) = \OC\Files\Filesystem::resolvePath('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/foo');
|
||||
/**
|
||||
* @var \OC\Files\Storage\Shared $sharedStorage
|
||||
*/
|
||||
|
||||
$sharedCache = $sharedStorage->getCache();
|
||||
$this->assertEquals('foo', $sharedCache->getPathById($folderInfo->getId()));
|
||||
$this->assertEquals('foo/bar/test.txt', $sharedCache->getPathById($fileInfo->getId()));
|
||||
$this->assertEquals('', $sharedCache->getPathById($folderInfo->getId()));
|
||||
$this->assertEquals('bar/test.txt', $sharedCache->getPathById($fileInfo->getId()));
|
||||
}
|
||||
}
|
||||
|
|
|
@ -23,6 +23,9 @@ require_once __DIR__ . '/base.php';
|
|||
|
||||
class Test_Files_Sharing_Permissions extends Test_Files_Sharing_Base {
|
||||
|
||||
private $sharedStorageRestrictedShare;
|
||||
private $sharedCacheRestrictedShare;
|
||||
|
||||
function setUp() {
|
||||
parent::setUp();
|
||||
|
||||
|
@ -55,8 +58,10 @@ class Test_Files_Sharing_Permissions extends Test_Files_Sharing_Base {
|
|||
|
||||
// retrieve the shared storage
|
||||
$this->secondView = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2);
|
||||
list($this->sharedStorage, $internalPath) = $this->secondView->resolvePath('files/Shared/shareddir');
|
||||
list($this->sharedStorage, $internalPath) = $this->secondView->resolvePath('files/shareddir');
|
||||
list($this->sharedStorageRestrictedShare, $internalPath) = $this->secondView->resolvePath('files/shareddirrestricted');
|
||||
$this->sharedCache = $this->sharedStorage->getCache();
|
||||
$this->sharedCacheRestrictedShare = $this->sharedStorageRestrictedShare->getCache();
|
||||
}
|
||||
|
||||
function tearDown() {
|
||||
|
@ -86,9 +91,9 @@ class Test_Files_Sharing_Permissions extends Test_Files_Sharing_Base {
|
|||
$this->assertEquals(31, $sharedDirPerms);
|
||||
$sharedDirPerms = $this->sharedStorage->getPermissions('shareddir/textfile.txt');
|
||||
$this->assertEquals(31, $sharedDirPerms);
|
||||
$sharedDirRestrictedPerms = $this->sharedStorage->getPermissions('shareddirrestricted');
|
||||
$sharedDirRestrictedPerms = $this->sharedStorageRestrictedShare->getPermissions('shareddirrestricted');
|
||||
$this->assertEquals(7, $sharedDirRestrictedPerms);
|
||||
$sharedDirRestrictedPerms = $this->sharedStorage->getPermissions('shareddirrestricted/textfile.txt');
|
||||
$sharedDirRestrictedPerms = $this->sharedStorageRestrictedShare->getPermissions('shareddirrestricted/textfile.txt');
|
||||
$this->assertEquals(7, $sharedDirRestrictedPerms);
|
||||
}
|
||||
|
||||
|
@ -96,12 +101,12 @@ class Test_Files_Sharing_Permissions extends Test_Files_Sharing_Base {
|
|||
* Test that the permissions of shared directory are returned correctly
|
||||
*/
|
||||
function testGetDirectoryPermissions() {
|
||||
$contents = $this->secondView->getDirectoryContent('files/Shared/shareddir');
|
||||
$contents = $this->secondView->getDirectoryContent('files/shareddir');
|
||||
$this->assertEquals('subdir', $contents[0]['name']);
|
||||
$this->assertEquals(31, $contents[0]['permissions']);
|
||||
$this->assertEquals('textfile.txt', $contents[1]['name']);
|
||||
$this->assertEquals(31, $contents[1]['permissions']);
|
||||
$contents = $this->secondView->getDirectoryContent('files/Shared/shareddirrestricted');
|
||||
$contents = $this->secondView->getDirectoryContent('files/shareddirrestricted');
|
||||
$this->assertEquals('subdir', $contents[0]['name']);
|
||||
$this->assertEquals(7, $contents[0]['permissions']);
|
||||
$this->assertEquals('textfile1.txt', $contents[1]['name']);
|
||||
|
|
|
@ -20,6 +20,8 @@
|
|||
*
|
||||
*/
|
||||
|
||||
require_once __DIR__ . '/../appinfo/update.php';
|
||||
|
||||
/**
|
||||
* Class Test_Files_Sharing_Updater
|
||||
*/
|
||||
|
@ -88,4 +90,57 @@ class Test_Files_Sharing_Updater extends \PHPUnit_Framework_TestCase {
|
|||
$result = $countItems->execute()->fetchOne();
|
||||
$this->assertEquals(2, $result);
|
||||
}
|
||||
|
||||
/**
|
||||
* test update for the removal of the logical "Shared" folder. It should update
|
||||
* the file_target for every share and create a physical "Shared" folder for each user
|
||||
*/
|
||||
function testRemoveSharedFolder() {
|
||||
self::prepareDB();
|
||||
// run the update routine to remove the shared folder and replace it with a real folder
|
||||
removeSharedFolder(false, 2);
|
||||
|
||||
// verify results
|
||||
$query = \OC_DB::prepare('SELECT * FROM `*PREFIX*share`');
|
||||
$result = $query->execute(array());
|
||||
|
||||
$newDBContent = $result->fetchAll();
|
||||
|
||||
foreach ($newDBContent as $row) {
|
||||
if ((int)$row['share_type'] === \OCP\Share::SHARE_TYPE_USER) {
|
||||
$this->assertSame('/Shared', substr($row['file_target'], 0, strlen('/Shared')));
|
||||
} else {
|
||||
$this->assertSame('/ShouldNotChange', $row['file_target']);
|
||||
}
|
||||
}
|
||||
|
||||
$this->cleanupSharedTable();
|
||||
|
||||
}
|
||||
|
||||
private function cleanupSharedTable() {
|
||||
$query = \OC_DB::prepare('DELETE FROM `*PREFIX*share`');
|
||||
$query->execute();
|
||||
}
|
||||
|
||||
private function prepareDB() {
|
||||
$this->cleanupSharedTable();
|
||||
// add items except one - because this is the test case for the broken share table
|
||||
$addItems = \OC_DB::prepare('INSERT INTO `*PREFIX*share` (`share_type`, `item_type`, ' .
|
||||
'`share_with`, `uid_owner` , `file_target`) ' .
|
||||
'VALUES (?, ?, ?, ?, ?)');
|
||||
$items = array(
|
||||
array(\OCP\Share::SHARE_TYPE_USER, 'file', 'user1', 'admin' , '/foo'),
|
||||
array(\OCP\Share::SHARE_TYPE_USER, 'folder', 'user2', 'admin', '/foo2'),
|
||||
array(\OCP\Share::SHARE_TYPE_USER, 'file', 'user3', 'admin', '/foo3'),
|
||||
array(\OCP\Share::SHARE_TYPE_USER, 'folder', 'user4', 'admin', '/foo4'),
|
||||
array(\OCP\Share::SHARE_TYPE_LINK, 'file', 'user1', 'admin', '/ShouldNotChange'),
|
||||
array(\OCP\Share::SHARE_TYPE_CONTACT, 'contact', 'admin', 'user1', '/ShouldNotChange'),
|
||||
|
||||
);
|
||||
foreach($items as $item) {
|
||||
// the number is used as path_hash
|
||||
$addItems->execute($item);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -48,7 +48,7 @@ class Test_Files_Sharing_Watcher extends Test_Files_Sharing_Base {
|
|||
|
||||
// retrieve the shared storage
|
||||
$secondView = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2);
|
||||
list($this->sharedStorage, $internalPath) = $secondView->resolvePath('files/Shared/shareddir');
|
||||
list($this->sharedStorage, $internalPath) = $secondView->resolvePath('files/shareddir');
|
||||
$this->sharedCache = $this->sharedStorage->getCache();
|
||||
}
|
||||
|
||||
|
@ -77,12 +77,12 @@ class Test_Files_Sharing_Watcher extends Test_Files_Sharing_Base {
|
|||
|
||||
$textData = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
|
||||
$dataLen = strlen($textData);
|
||||
$this->sharedCache->put('shareddir/bar.txt', array('storage_mtime' => 10));
|
||||
$this->sharedStorage->file_put_contents('shareddir/bar.txt', $textData);
|
||||
$this->sharedCache->put('shareddir', array('storage_mtime' => 10));
|
||||
$this->sharedCache->put('bar.txt', array('mtime' => 10, 'storage_mtime' => 10, 'size' => $dataLen, 'mimetype' => 'text/plain'));
|
||||
$this->sharedStorage->file_put_contents('bar.txt', $textData);
|
||||
$this->sharedCache->put('', array('mtime' => 10, 'storage_mtime' => 10, 'size' => '-1', 'mimetype' => 'httpd/unix-directory'));
|
||||
|
||||
// run the propagation code
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('shareddir');
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('');
|
||||
|
||||
$this->assertTrue($result);
|
||||
|
||||
|
@ -94,7 +94,7 @@ class Test_Files_Sharing_Watcher extends Test_Files_Sharing_Base {
|
|||
$this->assertEquals($initialSizes['files/container/shareddir'] + $dataLen, $newSizes['files/container/shareddir']);
|
||||
|
||||
// no more updates
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('shareddir');
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('');
|
||||
|
||||
$this->assertFalse($result);
|
||||
}
|
||||
|
@ -108,12 +108,12 @@ class Test_Files_Sharing_Watcher extends Test_Files_Sharing_Base {
|
|||
|
||||
$textData = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
|
||||
$dataLen = strlen($textData);
|
||||
$this->sharedCache->put('shareddir/subdir/bar.txt', array('storage_mtime' => 10));
|
||||
$this->sharedStorage->file_put_contents('shareddir/subdir/bar.txt', $textData);
|
||||
$this->sharedCache->put('shareddir/subdir', array('storage_mtime' => 10));
|
||||
$this->sharedCache->put('subdir/bar.txt', array('mtime' => 10, 'storage_mtime' => 10, 'size' => $dataLen, 'mimetype' => 'text/plain'));
|
||||
$this->sharedStorage->file_put_contents('subdir/bar.txt', $textData);
|
||||
$this->sharedCache->put('subdir', array('mtime' => 10, 'storage_mtime' => 10, 'size' => $dataLen, 'mimetype' => 'text/plain'));
|
||||
|
||||
// run the propagation code
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('shareddir/subdir');
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('subdir');
|
||||
|
||||
$this->assertTrue($result);
|
||||
|
||||
|
@ -126,22 +126,11 @@ class Test_Files_Sharing_Watcher extends Test_Files_Sharing_Base {
|
|||
$this->assertEquals($initialSizes['files/container/shareddir/subdir'] + $dataLen, $newSizes['files/container/shareddir/subdir']);
|
||||
|
||||
// no more updates
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('shareddir/subdir');
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('subdir');
|
||||
|
||||
$this->assertFalse($result);
|
||||
}
|
||||
|
||||
function testNoUpdateOnRoot() {
|
||||
// no updates when called for root path
|
||||
$result = $this->sharedStorage->getWatcher()->checkUpdate('');
|
||||
|
||||
$this->assertFalse($result);
|
||||
|
||||
// FIXME: for some reason when running this "naked" test,
|
||||
// there will be remaining nonsensical entries in the
|
||||
// database with a path "test-share-user1/container/..."
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the sizes of the path and its parent dirs in a hash
|
||||
* where the key is the path and the value is the size.
|
||||
|
|
|
@ -50,10 +50,6 @@ class OC_Connector_Sabre_Directory extends OC_Connector_Sabre_Node implements Sa
|
|||
*/
|
||||
public function createFile($name, $data = null) {
|
||||
|
||||
if (strtolower($name) === 'shared' && empty($this->path)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
||||
// for chunked upload also updating a existing file is a "createFile"
|
||||
// because we create all the chunks before reasamble them to the existing file.
|
||||
if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
|
||||
|
@ -86,10 +82,6 @@ class OC_Connector_Sabre_Directory extends OC_Connector_Sabre_Node implements Sa
|
|||
*/
|
||||
public function createDirectory($name) {
|
||||
|
||||
if (strtolower($name) === 'shared' && empty($this->path)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
||||
if (!\OC\Files\Filesystem::isCreatable($this->path)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
@ -196,10 +188,6 @@ class OC_Connector_Sabre_Directory extends OC_Connector_Sabre_Node implements Sa
|
|||
*/
|
||||
public function delete() {
|
||||
|
||||
if ($this->path === 'Shared') {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
||||
if (!\OC\Files\Filesystem::isDeletable($this->path)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
|
|
@ -71,13 +71,6 @@ class OC_Connector_Sabre_File extends OC_Connector_Sabre_Node implements Sabre_D
|
|||
// mark file as partial while uploading (ignored by the scanner)
|
||||
$partpath = $this->path . '.ocTransferId' . rand() . '.part';
|
||||
|
||||
// if file is located in /Shared we write the part file to the users
|
||||
// root folder because we can't create new files in /shared
|
||||
// we extend the name with a random number to avoid overwriting a existing file
|
||||
if (dirname($partpath) === 'Shared') {
|
||||
$partpath = pathinfo($partpath, PATHINFO_FILENAME) . rand() . '.part';
|
||||
}
|
||||
|
||||
try {
|
||||
$putOkay = $fs->file_put_contents($partpath, $data);
|
||||
if ($putOkay === false) {
|
||||
|
@ -149,10 +142,6 @@ class OC_Connector_Sabre_File extends OC_Connector_Sabre_Node implements Sabre_D
|
|||
public function delete() {
|
||||
$fs = $this->getFS();
|
||||
|
||||
if ($this->path === 'Shared') {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
||||
if (!$fs->isDeletable($this->path)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
|
|
@ -87,16 +87,19 @@ class ObjectTree extends \Sabre_DAV_ObjectTree {
|
|||
list($sourceDir,) = \Sabre_DAV_URLUtil::splitPath($sourcePath);
|
||||
list($destinationDir,) = \Sabre_DAV_URLUtil::splitPath($destinationPath);
|
||||
|
||||
$isShareMountPoint = false;
|
||||
list($storage, $internalPath) = \OC\Files\Filesystem::resolvePath( '/' . \OCP\User::getUser() . '/files/' . $sourcePath);
|
||||
if ($storage instanceof \OC\Files\Storage\Shared && !$internalPath) {
|
||||
$isShareMountPoint = true;
|
||||
}
|
||||
|
||||
// check update privileges
|
||||
$fs = $this->getFileView();
|
||||
if (!$fs->isUpdatable($sourcePath)) {
|
||||
if (!$fs->isUpdatable($sourcePath) && !$isShareMountPoint) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
if ($sourceDir !== $destinationDir) {
|
||||
// for a full move we need update privileges on sourcePath and sourceDir as well as destinationDir
|
||||
if (ltrim($destinationDir, '/') === '' && strtolower($sourceNode->getName()) === 'shared') {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
if (!$fs->isUpdatable($sourceDir)) {
|
||||
throw new \Sabre_DAV_Exception_Forbidden();
|
||||
}
|
||||
|
|
|
@ -23,6 +23,13 @@ class Manager {
|
|||
$this->mounts[$mount->getMountPoint()] = $mount;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param string $mountPoint
|
||||
*/
|
||||
public function removeMount($mountPoint) {
|
||||
unset($this->mounts[$mountPoint]);
|
||||
}
|
||||
|
||||
/**
|
||||
* Find the mount for $path
|
||||
*
|
||||
|
|
|
@ -65,6 +65,13 @@ class Mount {
|
|||
return $this->mountPoint;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param string $mountPoint new mount point
|
||||
*/
|
||||
public function setMountPoint($mountPoint) {
|
||||
$this->mountPoint = $mountPoint;
|
||||
}
|
||||
|
||||
/**
|
||||
* create the storage that is mounted
|
||||
*
|
||||
|
|
|
@ -348,7 +348,8 @@ class View {
|
|||
$postFix = (substr($path, -1, 1) === '/') ? '/' : '';
|
||||
$absolutePath = Filesystem::normalizePath($this->getAbsolutePath($path));
|
||||
list($storage, $internalPath) = Filesystem::resolvePath($absolutePath . $postFix);
|
||||
if (!$internalPath || $internalPath === '' || $internalPath === '/') {
|
||||
if (!($storage instanceof \OC\Files\Storage\Shared) &&
|
||||
(!$internalPath || $internalPath === '' || $internalPath === '/')) {
|
||||
// do not allow deleting the storage's root / the mount point
|
||||
// because for some storages it might delete the whole contents
|
||||
// but isn't supposed to work that way
|
||||
|
@ -404,11 +405,21 @@ class View {
|
|||
if ($run) {
|
||||
$mp1 = $this->getMountPoint($path1 . $postFix1);
|
||||
$mp2 = $this->getMountPoint($path2 . $postFix2);
|
||||
if ($mp1 == $mp2) {
|
||||
list($storage, $internalPath1) = Filesystem::resolvePath($absolutePath1 . $postFix1);
|
||||
list($storage1, $internalPath1) = Filesystem::resolvePath($absolutePath1 . $postFix1);
|
||||
list(, $internalPath2) = Filesystem::resolvePath($absolutePath2 . $postFix2);
|
||||
if ($storage) {
|
||||
$result = $storage->rename($internalPath1, $internalPath2);
|
||||
// if source and target are on the same storage we can call the rename operation from the
|
||||
// storage. If it is a "Shared" file/folder we call always the rename operation of the
|
||||
// shared storage to handle mount point renaming, etc correctly
|
||||
if ($storage1 instanceof \OC\Files\Storage\Shared) {
|
||||
if ($storage1) {
|
||||
$result = $storage1->rename($absolutePath1, $absolutePath2);
|
||||
\OC_FileProxy::runPostProxies('rename', $absolutePath1, $absolutePath2);
|
||||
} else {
|
||||
$result = false;
|
||||
}
|
||||
} elseif ($mp1 == $mp2) {
|
||||
if ($storage1) {
|
||||
$result = $storage1->rename($internalPath1, $internalPath2);
|
||||
\OC_FileProxy::runPostProxies('rename', $absolutePath1, $absolutePath2);
|
||||
} else {
|
||||
$result = false;
|
||||
|
@ -417,7 +428,6 @@ class View {
|
|||
if ($this->is_dir($path1)) {
|
||||
$result = $this->copy($path1, $path2);
|
||||
if ($result === true) {
|
||||
list($storage1, $internalPath1) = Filesystem::resolvePath($absolutePath1 . $postFix1);
|
||||
$result = $storage1->unlink($internalPath1);
|
||||
}
|
||||
} else {
|
||||
|
@ -431,7 +441,6 @@ class View {
|
|||
fclose($target);
|
||||
|
||||
if ($result !== false) {
|
||||
list($storage1, $internalPath1) = Filesystem::resolvePath($absolutePath1 . $postFix1);
|
||||
$storage1->unlink($internalPath1);
|
||||
}
|
||||
}
|
||||
|
@ -972,8 +981,13 @@ class View {
|
|||
$permissions = $subStorage->getPermissions($rootEntry['path']);
|
||||
$subPermissionsCache->set($rootEntry['fileid'], $user, $permissions);
|
||||
}
|
||||
// do not allow renaming/deleting the mount point
|
||||
// do not allow renaming/deleting the mount point if they are not shared files/folders
|
||||
// for shared files/folders we use the permissions given by the owner
|
||||
if ($subStorage instanceof \OC\Files\Storage\Shared) {
|
||||
$rootEntry['permissions'] = $permissions;
|
||||
} else {
|
||||
$rootEntry['permissions'] = $permissions & (\OCP\PERMISSION_ALL - (\OCP\PERMISSION_UPDATE | \OCP\PERMISSION_DELETE));
|
||||
}
|
||||
|
||||
//remove any existing entry with the same name
|
||||
foreach ($files as $i => $file) {
|
||||
|
@ -1154,7 +1168,8 @@ class View {
|
|||
* @var \OC\Files\Mount\Mount $mount
|
||||
*/
|
||||
$cache = $mount->getStorage()->getCache();
|
||||
if ($internalPath = $cache->getPathById($id)) {
|
||||
$internalPath = $cache->getPathById($id);
|
||||
if (is_string($internalPath)) {
|
||||
$fullPath = $mount->getMountPoint() . $internalPath;
|
||||
if (!is_null($path = $this->getRelativePath($fullPath))) {
|
||||
return $path;
|
||||
|
|
|
@ -26,13 +26,13 @@ class Constants {
|
|||
const SHARE_TYPE_USER = 0;
|
||||
const SHARE_TYPE_GROUP = 1;
|
||||
const SHARE_TYPE_LINK = 3;
|
||||
const SHARE_TYPE_EMAIL = 4;
|
||||
const SHARE_TYPE_CONTACT = 5;
|
||||
const SHARE_TYPE_REMOTE = 6;
|
||||
const SHARE_TYPE_EMAIL = 4; // ToDo Check if it is still in use otherwise remove it
|
||||
const SHARE_TYPE_CONTACT = 5; // ToDo Check if it is still in use otherwise remove it
|
||||
const SHARE_TYPE_REMOTE = 6; // ToDo Check if it is still in use otherwise remove it
|
||||
|
||||
const FORMAT_NONE = -1;
|
||||
const FORMAT_STATUSES = -2;
|
||||
const FORMAT_SOURCES = -3;
|
||||
const FORMAT_SOURCES = -3; // ToDo Check if it is still in use otherwise remove it
|
||||
|
||||
const TOKEN_LENGTH = 32; // see db_structure.xml
|
||||
|
||||
|
|
|
@ -223,7 +223,7 @@ class Share extends \OC\Share\Constants {
|
|||
} else {
|
||||
while ($row = $result->fetchRow()) {
|
||||
foreach ($fileTargets[$row['fileid']] as $uid => $shareData) {
|
||||
$sharedPath = '/Shared' . $shareData['file_target'];
|
||||
$sharedPath = $shareData['file_target'];
|
||||
$sharedPath .= substr($path, strlen($row['path']) -5);
|
||||
$sharePaths[$uid] = $sharedPath;
|
||||
}
|
||||
|
@ -252,6 +252,22 @@ class Share extends \OC\Share\Constants {
|
|||
$parameters, $limit, $includeCollections);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the items of item type shared with a user
|
||||
* @param string Item type
|
||||
* @param sting user id for which user we want the shares
|
||||
* @param int Format (optional) Format type must be defined by the backend
|
||||
* @param mixed Parameters (optional)
|
||||
* @param int Number of items to return (optional) Returns all by default
|
||||
* @param bool include collections (optional)
|
||||
* @return Return depends on format
|
||||
*/
|
||||
public static function getItemsSharedWithUser($itemType, $user, $format = self::FORMAT_NONE,
|
||||
$parameters = null, $limit = -1, $includeCollections = false) {
|
||||
return self::getItems($itemType, null, self::$shareTypeUserAndGroups, $user, null, $format,
|
||||
$parameters, $limit, $includeCollections);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the item of item type shared with the current user
|
||||
* @param string $itemType
|
||||
|
@ -473,6 +489,7 @@ class Share extends \OC\Share\Constants {
|
|||
$itemSourceName = $itemSource;
|
||||
}
|
||||
|
||||
|
||||
// verify that the file exists before we try to share it
|
||||
if ($itemType === 'file' or $itemType === 'folder') {
|
||||
$path = \OC\Files\Filesystem::getPath($itemSource);
|
||||
|
@ -484,6 +501,21 @@ class Share extends \OC\Share\Constants {
|
|||
}
|
||||
}
|
||||
|
||||
//verify that we don't share a folder which already contains a share mount point
|
||||
if ($itemType === 'folder') {
|
||||
$path = '/' . $uidOwner . '/files' . \OC\Files\Filesystem::getPath($itemSource) . '/';
|
||||
$mountManager = \OC\Files\Filesystem::getMountManager();
|
||||
$mounts = $mountManager->getAll();
|
||||
foreach ($mounts as $mountPoint => $mount) {
|
||||
if ($mount->getStorage() instanceof \OC\Files\Storage\Shared && strpos($mountPoint, $path) === 0) {
|
||||
$message = 'Sharing "' . $itemSourceName . '" failed, because it contains files shared with you!';
|
||||
\OC_Log::write('OCP\Share', $message, \OC_Log::ERROR);
|
||||
throw new \Exception($message);
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
|
||||
// Verify share type and sharing conditions are met
|
||||
if ($shareType === self::SHARE_TYPE_USER) {
|
||||
if ($shareWith == $uidOwner) {
|
||||
|
@ -876,6 +908,7 @@ class Share extends \OC\Share\Constants {
|
|||
$hookParams = array(
|
||||
'itemType' => $item['item_type'],
|
||||
'itemSource' => $item['item_source'],
|
||||
'fileSource' => $item['file_source'],
|
||||
'shareType' => $item['share_type'],
|
||||
'shareWith' => $item['share_with'],
|
||||
'itemParent' => $item['parent'],
|
||||
|
@ -1135,6 +1168,7 @@ class Share extends \OC\Share\Constants {
|
|||
// Filter out duplicate group shares for users with unique targets
|
||||
if ($row['share_type'] == self::$shareTypeGroupUserUnique && isset($items[$row['parent']])) {
|
||||
$row['share_type'] = self::SHARE_TYPE_GROUP;
|
||||
$row['unique_name'] = true; // remember that we use a unique name for this user
|
||||
$row['share_with'] = $items[$row['parent']]['share_with'];
|
||||
// Remove the parent group share
|
||||
unset($items[$row['parent']]);
|
||||
|
@ -1173,10 +1207,6 @@ class Share extends \OC\Share\Constants {
|
|||
// Remove root from file source paths if retrieving own shared items
|
||||
if (isset($uidOwner) && isset($row['path'])) {
|
||||
if (isset($row['parent'])) {
|
||||
// FIXME: Doesn't always construct the correct path, example:
|
||||
// Folder '/a/b', share '/a' and '/a/b' to user2
|
||||
// user2 reshares /Shared/b and ask for share status of /Shared/a/b
|
||||
// expected result: path=/Shared/a/b; actual result /Shared/b because of the parent
|
||||
$query = \OC_DB::prepare('SELECT `file_target` FROM `*PREFIX*share` WHERE `id` = ?');
|
||||
$parentResult = $query->execute(array($row['parent']));
|
||||
if (\OC_DB::isError($result)) {
|
||||
|
@ -1185,7 +1215,7 @@ class Share extends \OC\Share\Constants {
|
|||
\OC_Log::ERROR);
|
||||
} else {
|
||||
$parentRow = $parentResult->fetchRow();
|
||||
$tmpPath = '/Shared' . $parentRow['file_target'];
|
||||
$tmpPath = $parentRow['file_target'];
|
||||
// find the right position where the row path continues from the target path
|
||||
$pos = strrpos($row['path'], $parentRow['file_target']);
|
||||
$subPath = substr($row['path'], $pos);
|
||||
|
@ -1395,8 +1425,8 @@ class Share extends \OC\Share\Constants {
|
|||
}
|
||||
}
|
||||
$query = \OC_DB::prepare('INSERT INTO `*PREFIX*share` (`item_type`, `item_source`, `item_target`,'
|
||||
.' `parent`, `share_type`, `share_with`, `uid_owner`, `permissions`, `stime`, `file_source`,'
|
||||
.' `file_target`, `token`) VALUES (?,?,?,?,?,?,?,?,?,?,?,?)');
|
||||
.' `share_type`, `share_with`, `uid_owner`, `permissions`, `stime`, `file_source`,'
|
||||
.' `file_target`, `token`, `parent`) VALUES (?,?,?,?,?,?,?,?,?,?,?,?)');
|
||||
// Share with a group
|
||||
if ($shareType == self::SHARE_TYPE_GROUP) {
|
||||
$groupItemTarget = Helper::generateTarget($itemType, $itemSource, $shareType, $shareWith['group'],
|
||||
|
@ -1440,10 +1470,9 @@ class Share extends \OC\Share\Constants {
|
|||
} else {
|
||||
$groupFileTarget = null;
|
||||
}
|
||||
$query->execute(array($itemType, $itemSource, $groupItemTarget, $parent, $shareType,
|
||||
$shareWith['group'], $uidOwner, $permissions, time(), $fileSource, $groupFileTarget, $token));
|
||||
// Save this id, any extra rows for this group share will need to reference it
|
||||
$parent = \OC_DB::insertid('*PREFIX*share');
|
||||
$queriesToExecute = array();
|
||||
$queriesToExecute['groupShare'] = array($itemType, $itemSource, $groupItemTarget, $shareType,
|
||||
$shareWith['group'], $uidOwner, $permissions, time(), $fileSource, $groupFileTarget, $token, $parent);
|
||||
// Loop through all users of this group in case we need to add an extra row
|
||||
foreach ($shareWith['users'] as $uid) {
|
||||
$itemTarget = Helper::generateTarget($itemType, $itemSource, self::SHARE_TYPE_USER, $uid,
|
||||
|
@ -1469,12 +1498,21 @@ class Share extends \OC\Share\Constants {
|
|||
}
|
||||
// Insert an extra row for the group share if the item or file target is unique for this user
|
||||
if ($itemTarget != $groupItemTarget || (isset($fileSource) && $fileTarget != $groupFileTarget)) {
|
||||
$query->execute(array($itemType, $itemSource, $itemTarget, $parent,
|
||||
$queriesToExecute[] = array($itemType, $itemSource, $itemTarget,
|
||||
self::$shareTypeGroupUserUnique, $uid, $uidOwner, $permissions, time(),
|
||||
$fileSource, $fileTarget, $token));
|
||||
$fileSource, $fileTarget, $token);
|
||||
$id = \OC_DB::insertid('*PREFIX*share');
|
||||
}
|
||||
}
|
||||
$query->execute($queriesToExecute['groupShare']);
|
||||
// Save this id, any extra rows for this group share will need to reference it
|
||||
$parent = \OC_DB::insertid('*PREFIX*share');
|
||||
unset($queriesToExecute['groupShare']);
|
||||
foreach ($queriesToExecute as $qe) {
|
||||
$qe[] = $parent;
|
||||
$query->execute($qe);
|
||||
}
|
||||
|
||||
\OC_Hook::emit('OCP\Share', 'post_shared', array(
|
||||
'itemType' => $itemType,
|
||||
'itemSource' => $itemSource,
|
||||
|
@ -1534,8 +1572,8 @@ class Share extends \OC\Share\Constants {
|
|||
} else {
|
||||
$fileTarget = null;
|
||||
}
|
||||
$query->execute(array($itemType, $itemSource, $itemTarget, $parent, $shareType, $shareWith, $uidOwner,
|
||||
$permissions, time(), $fileSource, $fileTarget, $token));
|
||||
$query->execute(array($itemType, $itemSource, $itemTarget, $shareType, $shareWith, $uidOwner,
|
||||
$permissions, time(), $fileSource, $fileTarget, $token, $parent));
|
||||
$id = \OC_DB::insertid('*PREFIX*share');
|
||||
\OC_Hook::emit('OCP\Share', 'post_shared', array(
|
||||
'itemType' => $itemType,
|
||||
|
|
|
@ -90,6 +90,22 @@ class Share extends \OC\Share\Constants {
|
|||
return \OC\Share\Share::getItemsSharedWith($itemType, $format, $parameters, $limit, $includeCollections);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the items of item type shared with a user
|
||||
* @param string Item type
|
||||
* @param sting user id for which user we want the shares
|
||||
* @param int Format (optional) Format type must be defined by the backend
|
||||
* @param mixed Parameters (optional)
|
||||
* @param int Number of items to return (optional) Returns all by default
|
||||
* @param bool include collections (optional)
|
||||
* @return Return depends on format
|
||||
*/
|
||||
public static function getItemsSharedWithUser($itemType, $user, $format = self::FORMAT_NONE,
|
||||
$parameters = null, $limit = -1, $includeCollections = false) {
|
||||
|
||||
return \OC\Share\Share::getItemsSharedWithUser($itemType, $user, $format, $parameters, $limit, $includeCollections);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the item of item type shared with the current user
|
||||
* @param string $itemType
|
||||
|
|
Loading…
Reference in New Issue