Fix federated link sharing permissions
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com> Signed-off-by: npmbuildbot[bot] <npmbuildbot[bot]@users.noreply.github.com>
This commit is contained in:
parent
a93d182bac
commit
ff20da637e
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
|
@ -53,6 +53,7 @@ use OCP\AppFramework\QueryException;
|
|||
use OCP\Constants;
|
||||
use OCP\Files\InvalidPathException;
|
||||
use OCP\Files\IRootFolder;
|
||||
use OCP\Files\Folder;
|
||||
use OCP\Files\Node;
|
||||
use OCP\Files\NotFoundException;
|
||||
use OCP\IConfig;
|
||||
|
@ -155,7 +156,7 @@ class ShareAPIController extends OCSController {
|
|||
*
|
||||
* @suppress PhanUndeclaredClassMethod
|
||||
*/
|
||||
protected function formatShare(\OCP\Share\IShare $share, Node $recipientNode = null): array {
|
||||
protected function formatShare(IShare $share, Node $recipientNode = null): array {
|
||||
$sharedBy = $this->userManager->get($share->getSharedBy());
|
||||
$shareOwner = $this->userManager->get($share->getShareOwner());
|
||||
|
||||
|
@ -196,7 +197,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
$result['path'] = $userFolder->getRelativePath($node->getPath());
|
||||
if ($node instanceof \OCP\Files\Folder) {
|
||||
if ($node instanceof Folder) {
|
||||
$result['item_type'] = 'folder';
|
||||
} else {
|
||||
$result['item_type'] = 'file';
|
||||
|
@ -215,11 +216,20 @@ class ShareAPIController extends OCSController {
|
|||
$result['expiration'] = $expiration->format('Y-m-d 00:00:00');
|
||||
}
|
||||
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_USER) {
|
||||
// TODO: It might make sense to have a dedicated setting to allow/deny converting link shares into federated ones
|
||||
// For link shares, we need to have the PERMISSION_SHARE if federated is enabled
|
||||
if ($this->shareManager->outgoingServer2ServerSharesAllowed()) {
|
||||
if ($share->getShareType() === IShare::TYPE_LINK
|
||||
|| $share->getShareType() === IShare::TYPE_EMAIL) {
|
||||
$result['permissions'] |= Constants::PERMISSION_SHARE;
|
||||
}
|
||||
}
|
||||
|
||||
if ($share->getShareType() === IShare::TYPE_USER) {
|
||||
$sharedWith = $this->userManager->get($share->getSharedWith());
|
||||
$result['share_with'] = $share->getSharedWith();
|
||||
$result['share_with_displayname'] = $sharedWith !== null ? $sharedWith->getDisplayName() : $share->getSharedWith();
|
||||
} elseif ($share->getShareType() === Share::SHARE_TYPE_GROUP) {
|
||||
} elseif ($share->getShareType() === IShare::TYPE_GROUP) {
|
||||
$group = $this->groupManager->get($share->getSharedWith());
|
||||
$result['share_with'] = $share->getSharedWith();
|
||||
$result['share_with_displayname'] = $group !== null ? $group->getDisplayName() : $share->getSharedWith();
|
||||
|
@ -236,17 +246,17 @@ class ShareAPIController extends OCSController {
|
|||
|
||||
$result['token'] = $share->getToken();
|
||||
$result['url'] = $this->urlGenerator->linkToRouteAbsolute('files_sharing.sharecontroller.showShare', ['token' => $share->getToken()]);
|
||||
} elseif ($share->getShareType() === Share::SHARE_TYPE_REMOTE || $share->getShareType() === Share::SHARE_TYPE_REMOTE_GROUP) {
|
||||
} elseif ($share->getShareType() === IShare::TYPE_REMOTE || $share->getShareType() === IShare::TYPE_REMOTE_GROUP) {
|
||||
$result['share_with'] = $share->getSharedWith();
|
||||
$result['share_with_displayname'] = $this->getDisplayNameFromAddressBook($share->getSharedWith(), 'CLOUD');
|
||||
$result['token'] = $share->getToken();
|
||||
} elseif ($share->getShareType() === Share::SHARE_TYPE_EMAIL) {
|
||||
} elseif ($share->getShareType() === IShare::TYPE_EMAIL) {
|
||||
$result['share_with'] = $share->getSharedWith();
|
||||
$result['password'] = $share->getPassword();
|
||||
$result['send_password_by_talk'] = $share->getSendPasswordByTalk();
|
||||
$result['share_with_displayname'] = $this->getDisplayNameFromAddressBook($share->getSharedWith(), 'EMAIL');
|
||||
$result['token'] = $share->getToken();
|
||||
} elseif ($share->getShareType() === Share::SHARE_TYPE_CIRCLE) {
|
||||
} elseif ($share->getShareType() === IShare::TYPE_CIRCLE) {
|
||||
// getSharedWith() returns either "name (type, owner)" or
|
||||
// "name (type, owner) [id]", depending on the Circles app version.
|
||||
$hasCircleId = (substr($share->getSharedWith(), -1) === ']');
|
||||
|
@ -265,7 +275,7 @@ class ShareAPIController extends OCSController {
|
|||
$shareWithLength = -1;
|
||||
}
|
||||
$result['share_with'] = substr($share->getSharedWith(), $shareWithStart, $shareWithLength);
|
||||
} elseif ($share->getShareType() === Share::SHARE_TYPE_ROOM) {
|
||||
} elseif ($share->getShareType() === IShare::TYPE_ROOM) {
|
||||
$result['share_with'] = $share->getSharedWith();
|
||||
$result['share_with_displayname'] = '';
|
||||
|
||||
|
@ -456,14 +466,14 @@ class ShareAPIController extends OCSController {
|
|||
$permissions &= ~($permissions & ~$path->getPermissions());
|
||||
}
|
||||
|
||||
if ($shareType === Share::SHARE_TYPE_USER) {
|
||||
if ($shareType === IShare::TYPE_USER) {
|
||||
// Valid user is required to share
|
||||
if ($shareWith === null || !$this->userManager->userExists($shareWith)) {
|
||||
throw new OCSNotFoundException($this->l->t('Please specify a valid user'));
|
||||
}
|
||||
$share->setSharedWith($shareWith);
|
||||
$share->setPermissions($permissions);
|
||||
} elseif ($shareType === Share::SHARE_TYPE_GROUP) {
|
||||
} elseif ($shareType === IShare::TYPE_GROUP) {
|
||||
if (!$this->shareManager->allowGroupSharing()) {
|
||||
throw new OCSNotFoundException($this->l->t('Group sharing is disabled by the administrator'));
|
||||
}
|
||||
|
@ -474,8 +484,8 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
$share->setSharedWith($shareWith);
|
||||
$share->setPermissions($permissions);
|
||||
} elseif ($shareType === Share::SHARE_TYPE_LINK
|
||||
|| $shareType === Share::SHARE_TYPE_EMAIL) {
|
||||
} elseif ($shareType === IShare::TYPE_LINK
|
||||
|| $shareType === IShare::TYPE_EMAIL) {
|
||||
|
||||
// Can we even share links?
|
||||
if (!$this->shareManager->shareApiAllowLinks()) {
|
||||
|
@ -500,10 +510,7 @@ class ShareAPIController extends OCSController {
|
|||
} else {
|
||||
$permissions = Constants::PERMISSION_READ;
|
||||
}
|
||||
// TODO: It might make sense to have a dedicated setting to allow/deny converting link shares into federated ones
|
||||
if ($this->shareManager->outgoingServer2ServerSharesAllowed()) {
|
||||
$permissions |= Constants::PERMISSION_SHARE;
|
||||
}
|
||||
|
||||
$share->setPermissions($permissions);
|
||||
|
||||
// Set password
|
||||
|
@ -512,7 +519,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
// Only share by mail have a recipient
|
||||
if ($shareType === Share::SHARE_TYPE_EMAIL) {
|
||||
if ($shareType === IShare::TYPE_EMAIL) {
|
||||
$share->setSharedWith($shareWith);
|
||||
} else {
|
||||
// Only link share have a label
|
||||
|
@ -538,21 +545,21 @@ class ShareAPIController extends OCSController {
|
|||
throw new OCSNotFoundException($this->l->t('Invalid date, date format must be YYYY-MM-DD'));
|
||||
}
|
||||
}
|
||||
} elseif ($shareType === Share::SHARE_TYPE_REMOTE) {
|
||||
} elseif ($shareType === IShare::TYPE_REMOTE) {
|
||||
if (!$this->shareManager->outgoingServer2ServerSharesAllowed()) {
|
||||
throw new OCSForbiddenException($this->l->t('Sharing %1$s failed because the back end does not allow shares from type %2$s', [$path->getPath(), $shareType]));
|
||||
}
|
||||
|
||||
$share->setSharedWith($shareWith);
|
||||
$share->setPermissions($permissions);
|
||||
} elseif ($shareType === Share::SHARE_TYPE_REMOTE_GROUP) {
|
||||
} elseif ($shareType === IShare::TYPE_REMOTE_GROUP) {
|
||||
if (!$this->shareManager->outgoingServer2ServerGroupSharesAllowed()) {
|
||||
throw new OCSForbiddenException($this->l->t('Sharing %1$s failed because the back end does not allow shares from type %2$s', [$path->getPath(), $shareType]));
|
||||
}
|
||||
|
||||
$share->setSharedWith($shareWith);
|
||||
$share->setPermissions($permissions);
|
||||
} elseif ($shareType === Share::SHARE_TYPE_CIRCLE) {
|
||||
} elseif ($shareType === IShare::TYPE_CIRCLE) {
|
||||
if (!\OC::$server->getAppManager()->isEnabledForUser('circles') || !class_exists('\OCA\Circles\ShareByCircleProvider')) {
|
||||
throw new OCSNotFoundException($this->l->t('You cannot share to a Circle if the app is not enabled'));
|
||||
}
|
||||
|
@ -565,7 +572,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
$share->setSharedWith($shareWith);
|
||||
$share->setPermissions($permissions);
|
||||
} elseif ($shareType === Share::SHARE_TYPE_ROOM) {
|
||||
} elseif ($shareType === IShare::TYPE_ROOM) {
|
||||
try {
|
||||
$this->getRoomShareHelper()->createShare($share, $shareWith, $permissions, $expireDate);
|
||||
} catch (QueryException $e) {
|
||||
|
@ -599,10 +606,10 @@ class ShareAPIController extends OCSController {
|
|||
* @return array
|
||||
*/
|
||||
private function getSharedWithMe($node, bool $includeTags): array {
|
||||
$userShares = $this->shareManager->getSharedWith($this->currentUser, Share::SHARE_TYPE_USER, $node, -1, 0);
|
||||
$groupShares = $this->shareManager->getSharedWith($this->currentUser, Share::SHARE_TYPE_GROUP, $node, -1, 0);
|
||||
$circleShares = $this->shareManager->getSharedWith($this->currentUser, Share::SHARE_TYPE_CIRCLE, $node, -1, 0);
|
||||
$roomShares = $this->shareManager->getSharedWith($this->currentUser, Share::SHARE_TYPE_ROOM, $node, -1, 0);
|
||||
$userShares = $this->shareManager->getSharedWith($this->currentUser, IShare::TYPE_USER, $node, -1, 0);
|
||||
$groupShares = $this->shareManager->getSharedWith($this->currentUser, IShare::TYPE_GROUP, $node, -1, 0);
|
||||
$circleShares = $this->shareManager->getSharedWith($this->currentUser, IShare::TYPE_CIRCLE, $node, -1, 0);
|
||||
$roomShares = $this->shareManager->getSharedWith($this->currentUser, IShare::TYPE_ROOM, $node, -1, 0);
|
||||
|
||||
$shares = array_merge($userShares, $groupShares, $circleShares, $roomShares);
|
||||
|
||||
|
@ -754,8 +761,12 @@ class ShareAPIController extends OCSController {
|
|||
* @throws OCSBadRequestException
|
||||
*/
|
||||
private function getFormattedShares(
|
||||
string $viewer, $node = null, bool $sharedWithMe = false, bool $reShares = false,
|
||||
bool $subFiles = false, bool $includeTags = false
|
||||
string $viewer,
|
||||
$node = null,
|
||||
bool $sharedWithMe = false,
|
||||
bool $reShares = false,
|
||||
bool $subFiles = false,
|
||||
bool $includeTags = false
|
||||
): array {
|
||||
if ($sharedWithMe) {
|
||||
return $this->getSharedWithMe($node, $includeTags);
|
||||
|
@ -775,7 +786,7 @@ class ShareAPIController extends OCSController {
|
|||
} catch (NotFoundException $e) {
|
||||
/*
|
||||
* Ignore shares where we can't get the node
|
||||
* For example delted shares
|
||||
* For example deleted shares
|
||||
*/
|
||||
continue;
|
||||
}
|
||||
|
@ -978,8 +989,8 @@ class ShareAPIController extends OCSController {
|
|||
/**
|
||||
* expirationdate, password and publicUpload only make sense for link shares
|
||||
*/
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_LINK
|
||||
|| $share->getShareType() === Share::SHARE_TYPE_EMAIL) {
|
||||
if ($share->getShareType() === IShare::TYPE_LINK
|
||||
|| $share->getShareType() === IShare::TYPE_EMAIL) {
|
||||
|
||||
/**
|
||||
* We do not allow editing link shares that the current user
|
||||
|
@ -1065,7 +1076,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
// only link shares have labels
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_LINK && $label !== null) {
|
||||
if ($share->getShareType() === IShare::TYPE_LINK && $label !== null) {
|
||||
$share->setLabel($label);
|
||||
}
|
||||
|
||||
|
@ -1216,7 +1227,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
// If the share is shared with you, you can access it!
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_USER
|
||||
if ($share->getShareType() === IShare::TYPE_USER
|
||||
&& $share->getSharedWith() === $this->currentUser) {
|
||||
return true;
|
||||
}
|
||||
|
@ -1230,7 +1241,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
// If in the recipient group, you can see the share
|
||||
if ($checkGroups && $share->getShareType() === Share::SHARE_TYPE_GROUP) {
|
||||
if ($checkGroups && $share->getShareType() === IShare::TYPE_GROUP) {
|
||||
$sharedWith = $this->groupManager->get($share->getSharedWith());
|
||||
$user = $this->userManager->get($this->currentUser);
|
||||
if ($user !== null && $sharedWith !== null && $sharedWith->inGroup($user)) {
|
||||
|
@ -1238,12 +1249,12 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
}
|
||||
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_CIRCLE) {
|
||||
if ($share->getShareType() === IShare::TYPE_CIRCLE) {
|
||||
// TODO: have a sanity check like above?
|
||||
return true;
|
||||
}
|
||||
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_ROOM) {
|
||||
if ($share->getShareType() === IShare::TYPE_ROOM) {
|
||||
try {
|
||||
return $this->getRoomShareHelper()->canAccessShare($share, $this->currentUser);
|
||||
} catch (QueryException $e) {
|
||||
|
@ -1295,7 +1306,7 @@ class ShareAPIController extends OCSController {
|
|||
|
||||
// if the user is the recipient, i can unshare
|
||||
// the share with self
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_USER &&
|
||||
if ($share->getShareType() === IShare::TYPE_USER &&
|
||||
$share->getSharedWith() === $this->currentUser
|
||||
) {
|
||||
return true;
|
||||
|
@ -1339,7 +1350,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
// If in the recipient group, you can delete the share from self
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_GROUP) {
|
||||
if ($share->getShareType() === IShare::TYPE_GROUP) {
|
||||
$sharedWith = $this->groupManager->get($share->getSharedWith());
|
||||
$user = $this->userManager->get($this->currentUser);
|
||||
if ($user !== null && $sharedWith !== null && $sharedWith->inGroup($user)) {
|
||||
|
@ -1347,7 +1358,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
}
|
||||
|
||||
if ($share->getShareType() === Share::SHARE_TYPE_ROOM) {
|
||||
if ($share->getShareType() === IShare::TYPE_ROOM) {
|
||||
try {
|
||||
return $this->getRoomShareHelper()->canAccessShare($share, $this->currentUser);
|
||||
} catch (QueryException $e) {
|
||||
|
@ -1405,7 +1416,7 @@ class ShareAPIController extends OCSController {
|
|||
|
||||
|
||||
try {
|
||||
if ($this->shareManager->shareProviderExists(Share::SHARE_TYPE_CIRCLE)) {
|
||||
if ($this->shareManager->shareProviderExists(IShare::TYPE_CIRCLE)) {
|
||||
$share = $this->shareManager->getShareById('ocCircleShare:' . $id, $this->currentUser);
|
||||
return $share;
|
||||
}
|
||||
|
@ -1414,7 +1425,7 @@ class ShareAPIController extends OCSController {
|
|||
}
|
||||
|
||||
try {
|
||||
if ($this->shareManager->shareProviderExists(Share::SHARE_TYPE_EMAIL)) {
|
||||
if ($this->shareManager->shareProviderExists(IShare::TYPE_EMAIL)) {
|
||||
$share = $this->shareManager->getShareById('ocMailShare:' . $id, $this->currentUser);
|
||||
return $share;
|
||||
}
|
||||
|
@ -1485,13 +1496,13 @@ class ShareAPIController extends OCSController {
|
|||
*/
|
||||
private function getSharesFromNode(string $viewer, $node, bool $reShares): array {
|
||||
$providers = [
|
||||
Share::SHARE_TYPE_USER,
|
||||
Share::SHARE_TYPE_GROUP,
|
||||
Share::SHARE_TYPE_LINK,
|
||||
Share::SHARE_TYPE_EMAIL,
|
||||
Share::SHARE_TYPE_EMAIL,
|
||||
Share::SHARE_TYPE_CIRCLE,
|
||||
Share::SHARE_TYPE_ROOM
|
||||
IShare::TYPE_USER,
|
||||
IShare::TYPE_GROUP,
|
||||
IShare::TYPE_LINK,
|
||||
IShare::TYPE_EMAIL,
|
||||
IShare::TYPE_EMAIL,
|
||||
IShare::TYPE_CIRCLE,
|
||||
IShare::TYPE_ROOM
|
||||
];
|
||||
|
||||
// Should we assume that the (currentUser) viewer is the owner of the node !?
|
||||
|
@ -1508,14 +1519,14 @@ class ShareAPIController extends OCSController {
|
|||
|
||||
if ($this->shareManager->outgoingServer2ServerSharesAllowed()) {
|
||||
$federatedShares = $this->shareManager->getSharesBy(
|
||||
$this->currentUser, Share::SHARE_TYPE_REMOTE, $node, $reShares, -1, 0
|
||||
$this->currentUser, IShare::TYPE_REMOTE, $node, $reShares, -1, 0
|
||||
);
|
||||
$shares = array_merge($shares, $federatedShares);
|
||||
}
|
||||
|
||||
if ($this->shareManager->outgoingServer2ServerGroupSharesAllowed()) {
|
||||
$federatedShares = $this->shareManager->getSharesBy(
|
||||
$this->currentUser, Share::SHARE_TYPE_REMOTE_GROUP, $node, $reShares, -1, 0
|
||||
$this->currentUser, IShare::TYPE_REMOTE_GROUP, $node, $reShares, -1, 0
|
||||
);
|
||||
$shares = array_merge($shares, $federatedShares);
|
||||
}
|
||||
|
@ -1590,15 +1601,15 @@ class ShareAPIController extends OCSController {
|
|||
return false;
|
||||
}
|
||||
|
||||
if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER && $share->getSharedWith() === $userId) {
|
||||
if ($share->getShareType() === \OCP\IShare::TYPE_USER && $share->getSharedWith() === $userId) {
|
||||
return true;
|
||||
}
|
||||
|
||||
if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP && $this->groupManager->isInGroup($userId, $share->getSharedWith())) {
|
||||
if ($share->getShareType() === \OCP\IShare::TYPE_GROUP && $this->groupManager->isInGroup($userId, $share->getSharedWith())) {
|
||||
return true;
|
||||
}
|
||||
|
||||
if ($share->getShareType() === \OCP\Share::SHARE_TYPE_CIRCLE && \OC::$server->getAppManager()->isEnabledForUser('circles')
|
||||
if ($share->getShareType() === \OCP\IShare::TYPE_CIRCLE && \OC::$server->getAppManager()->isEnabledForUser('circles')
|
||||
&& class_exists('\OCA\Circles\Api\v1\Circles')) {
|
||||
$hasCircleId = (substr($share->getSharedWith(), -1) === ']');
|
||||
$shareWithStart = ($hasCircleId ? strrpos($share->getSharedWith(), '[') + 1 : 0);
|
||||
|
@ -1630,27 +1641,27 @@ class ShareAPIController extends OCSController {
|
|||
*/
|
||||
private function getAllShares(?Node $path = null, bool $reshares = false) {
|
||||
// Get all shares
|
||||
$userShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_USER, $path, $reshares, -1, 0);
|
||||
$groupShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_GROUP, $path, $reshares, -1, 0);
|
||||
$linkShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_LINK, $path, $reshares, -1, 0);
|
||||
$userShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_USER, $path, $reshares, -1, 0);
|
||||
$groupShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_GROUP, $path, $reshares, -1, 0);
|
||||
$linkShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_LINK, $path, $reshares, -1, 0);
|
||||
|
||||
// EMAIL SHARES
|
||||
$mailShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_EMAIL, $path, $reshares, -1, 0);
|
||||
$mailShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_EMAIL, $path, $reshares, -1, 0);
|
||||
|
||||
// CIRCLE SHARES
|
||||
$circleShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_CIRCLE, $path, $reshares, -1, 0);
|
||||
$circleShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_CIRCLE, $path, $reshares, -1, 0);
|
||||
|
||||
// TALK SHARES
|
||||
$roomShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_ROOM, $path, $reshares, -1, 0);
|
||||
$roomShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_ROOM, $path, $reshares, -1, 0);
|
||||
|
||||
// FEDERATION
|
||||
if ($this->shareManager->outgoingServer2ServerSharesAllowed()) {
|
||||
$federatedShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_REMOTE, $path, $reshares, -1, 0);
|
||||
$federatedShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_REMOTE, $path, $reshares, -1, 0);
|
||||
} else {
|
||||
$federatedShares = [];
|
||||
}
|
||||
if ($this->shareManager->outgoingServer2ServerGroupSharesAllowed()) {
|
||||
$federatedGroupShares = $this->shareManager->getSharesBy($this->currentUser, Share::SHARE_TYPE_REMOTE_GROUP, $path, $reshares, -1, 0);
|
||||
$federatedGroupShares = $this->shareManager->getSharesBy($this->currentUser, IShare::TYPE_REMOTE_GROUP, $path, $reshares, -1, 0);
|
||||
} else {
|
||||
$federatedGroupShares = [];
|
||||
}
|
||||
|
|
|
@ -126,21 +126,21 @@
|
|||
<template v-if="share.canEdit">
|
||||
<!-- folder -->
|
||||
<template v-if="isFolder && fileHasCreatePermission && config.isPublicUploadEnabled">
|
||||
<ActionRadio :checked="share.permissions === publicUploadRValue"
|
||||
<ActionRadio :checked="sharePermissions === publicUploadRValue"
|
||||
:value="publicUploadRValue"
|
||||
:name="randomId"
|
||||
:disabled="saving"
|
||||
@change="togglePermissions">
|
||||
{{ t('files_sharing', 'Read only') }}
|
||||
</ActionRadio>
|
||||
<ActionRadio :checked="share.permissions === publicUploadRWValue"
|
||||
<ActionRadio :checked="sharePermissions === publicUploadRWValue"
|
||||
:value="publicUploadRWValue"
|
||||
:disabled="saving"
|
||||
:name="randomId"
|
||||
@change="togglePermissions">
|
||||
{{ t('files_sharing', 'Allow upload and editing') }}
|
||||
</ActionRadio>
|
||||
<ActionRadio :checked="share.permissions === publicUploadWValue"
|
||||
<ActionRadio :checked="sharePermissions === publicUploadWValue"
|
||||
:value="publicUploadWValue"
|
||||
:disabled="saving"
|
||||
:name="randomId"
|
||||
|
@ -358,6 +358,15 @@ export default {
|
|||
},
|
||||
|
||||
computed: {
|
||||
/**
|
||||
* Return the current share permissions
|
||||
* We always ignore the SHARE permission as this is used for the
|
||||
* federated sharing.
|
||||
* @returns {number}
|
||||
*/
|
||||
sharePermissions() {
|
||||
return this.share.permissions & ~OC.PERMISSION_SHARE
|
||||
},
|
||||
/**
|
||||
* Generate a unique random id for this SharingEntryLink only
|
||||
* This allows ActionRadios to have the same name prop
|
||||
|
|
File diff suppressed because one or more lines are too long
File diff suppressed because it is too large
Load Diff
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
Loading…
Reference in New Issue