Completed
Pull Request — master (#4212)
by Individual IT
13:52
created
apps/dav/lib/Connector/Sabre/FilesReportPlugin.php 1 patch
Indentation   +358 added lines, -358 removed lines patch added patch discarded remove patch
@@ -41,362 +41,362 @@
 block discarded – undo
41 41
 
42 42
 class FilesReportPlugin extends ServerPlugin {
43 43
 
44
-	// namespace
45
-	const NS_OWNCLOUD = 'http://owncloud.org/ns';
46
-	const REPORT_NAME            = '{http://owncloud.org/ns}filter-files';
47
-	const SYSTEMTAG_PROPERTYNAME = '{http://owncloud.org/ns}systemtag';
48
-
49
-	/**
50
-	 * Reference to main server object
51
-	 *
52
-	 * @var \Sabre\DAV\Server
53
-	 */
54
-	private $server;
55
-
56
-	/**
57
-	 * @var Tree
58
-	 */
59
-	private $tree;
60
-
61
-	/**
62
-	 * @var View
63
-	 */
64
-	private $fileView;
65
-
66
-	/**
67
-	 * @var ISystemTagManager
68
-	 */
69
-	private $tagManager;
70
-
71
-	/**
72
-	 * @var ISystemTagObjectMapper
73
-	 */
74
-	private $tagMapper;
75
-
76
-	/**
77
-	 * Manager for private tags
78
-	 *
79
-	 * @var ITagManager
80
-	 */
81
-	private $fileTagger;
82
-
83
-	/**
84
-	 * @var IUserSession
85
-	 */
86
-	private $userSession;
87
-
88
-	/**
89
-	 * @var IGroupManager
90
-	 */
91
-	private $groupManager;
92
-
93
-	/**
94
-	 * @var Folder
95
-	 */
96
-	private $userFolder;
97
-
98
-	/**
99
-	 * @param Tree $tree
100
-	 * @param View $view
101
-	 * @param ISystemTagManager $tagManager
102
-	 * @param ISystemTagObjectMapper $tagMapper
103
-	 * @param ITagManager $fileTagger manager for private tags
104
-	 * @param IUserSession $userSession
105
-	 * @param IGroupManager $groupManager
106
-	 * @param Folder $userFolder
107
-	 */
108
-	public function __construct(Tree $tree,
109
-								View $view,
110
-								ISystemTagManager $tagManager,
111
-								ISystemTagObjectMapper $tagMapper,
112
-								ITagManager $fileTagger,
113
-								IUserSession $userSession,
114
-								IGroupManager $groupManager,
115
-								Folder $userFolder
116
-	) {
117
-		$this->tree = $tree;
118
-		$this->fileView = $view;
119
-		$this->tagManager = $tagManager;
120
-		$this->tagMapper = $tagMapper;
121
-		$this->fileTagger = $fileTagger;
122
-		$this->userSession = $userSession;
123
-		$this->groupManager = $groupManager;
124
-		$this->userFolder = $userFolder;
125
-	}
126
-
127
-	/**
128
-	 * This initializes the plugin.
129
-	 *
130
-	 * This function is called by \Sabre\DAV\Server, after
131
-	 * addPlugin is called.
132
-	 *
133
-	 * This method should set up the required event subscriptions.
134
-	 *
135
-	 * @param \Sabre\DAV\Server $server
136
-	 * @return void
137
-	 */
138
-	public function initialize(\Sabre\DAV\Server $server) {
139
-
140
-		$server->xml->namespaceMap[self::NS_OWNCLOUD] = 'oc';
141
-
142
-		$this->server = $server;
143
-		$this->server->on('report', array($this, 'onReport'));
144
-	}
145
-
146
-	/**
147
-	 * Returns a list of reports this plugin supports.
148
-	 *
149
-	 * This will be used in the {DAV:}supported-report-set property.
150
-	 *
151
-	 * @param string $uri
152
-	 * @return array
153
-	 */
154
-	public function getSupportedReportSet($uri) {
155
-		return [self::REPORT_NAME];
156
-	}
157
-
158
-	/**
159
-	 * REPORT operations to look for files
160
-	 *
161
-	 * @param string $reportName
162
-	 * @param $report
163
-	 * @param string $uri
164
-	 * @return bool
165
-	 * @throws BadRequest
166
-	 * @throws PreconditionFailed
167
-	 * @internal param $ [] $report
168
-	 */
169
-	public function onReport($reportName, $report, $uri) {
170
-		$reportTargetNode = $this->server->tree->getNodeForPath($uri);
171
-		if (!$reportTargetNode instanceof Directory || $reportName !== self::REPORT_NAME) {
172
-			return;
173
-		}
174
-
175
-		$ns = '{' . $this::NS_OWNCLOUD . '}';
176
-		$requestedProps = [];
177
-		$filterRules = [];
178
-
179
-		// parse report properties and gather filter info
180
-		foreach ($report as $reportProps) {
181
-			$name = $reportProps['name'];
182
-			if ($name === $ns . 'filter-rules') {
183
-				$filterRules = $reportProps['value'];
184
-			} else if ($name === '{DAV:}prop') {
185
-				// propfind properties
186
-				foreach ($reportProps['value'] as $propVal) {
187
-					$requestedProps[] = $propVal['name'];
188
-				}
189
-			}
190
-		}
191
-
192
-		if (empty($filterRules)) {
193
-			// an empty filter would return all existing files which would be slow
194
-			throw new BadRequest('Missing filter-rule block in request');
195
-		}
196
-
197
-		// gather all file ids matching filter
198
-		try {
199
-			$resultFileIds = $this->processFilterRules($filterRules);
200
-		} catch (TagNotFoundException $e) {
201
-			throw new PreconditionFailed('Cannot filter by non-existing tag', 0, $e);
202
-		}
203
-
204
-		// find sabre nodes by file id, restricted to the root node path
205
-		$results = $this->findNodesByFileIds($reportTargetNode, $resultFileIds);
206
-
207
-		$filesUri = $this->getFilesBaseUri($uri, $reportTargetNode->getPath());
208
-		$responses = $this->prepareResponses($filesUri, $requestedProps, $results);
209
-
210
-		$xml = $this->server->xml->write(
211
-			'{DAV:}multistatus',
212
-			new MultiStatus($responses)
213
-		);
214
-
215
-		$this->server->httpResponse->setStatus(207);
216
-		$this->server->httpResponse->setHeader('Content-Type', 'application/xml; charset=utf-8');
217
-		$this->server->httpResponse->setBody($xml);
218
-
219
-		return false;
220
-	}
221
-
222
-	/**
223
-	 * Returns the base uri of the files root by removing
224
-	 * the subpath from the URI
225
-	 *
226
-	 * @param string $uri URI from this request
227
-	 * @param string $subPath subpath to remove from the URI
228
-	 *
229
-	 * @return string files base uri
230
-	 */
231
-	private function getFilesBaseUri($uri, $subPath) {
232
-		$uri = trim($uri, '/');
233
-		$subPath = trim($subPath, '/');
234
-		if (empty($subPath)) {
235
-			$filesUri = $uri;
236
-		} else {
237
-			$filesUri = substr($uri, 0, strlen($uri) - strlen($subPath));
238
-		}
239
-		$filesUri = trim($filesUri, '/');
240
-		if (empty($filesUri)) {
241
-			return '';
242
-		}
243
-		return '/' . $filesUri;
244
-	}
245
-
246
-	/**
247
-	 * Find file ids matching the given filter rules
248
-	 *
249
-	 * @param array $filterRules
250
-	 * @return array array of unique file id results
251
-	 *
252
-	 * @throws TagNotFoundException whenever a tag was not found
253
-	 */
254
-	protected function processFilterRules($filterRules) {
255
-		$ns = '{' . $this::NS_OWNCLOUD . '}';
256
-		$resultFileIds = null;
257
-		$systemTagIds = [];
258
-		$favoriteFilter = null;
259
-		foreach ($filterRules as $filterRule) {
260
-			if ($filterRule['name'] === $ns . 'systemtag') {
261
-				$systemTagIds[] = $filterRule['value'];
262
-			}
263
-			if ($filterRule['name'] === $ns . 'favorite') {
264
-				$favoriteFilter = true;
265
-			}
266
-		}
267
-
268
-		if ($favoriteFilter !== null) {
269
-			$resultFileIds = $this->fileTagger->load('files')->getFavorites();
270
-			if (empty($resultFileIds)) {
271
-				return [];
272
-			}
273
-		}
274
-
275
-		if (!empty($systemTagIds)) {
276
-			$fileIds = $this->getSystemTagFileIds($systemTagIds);
277
-			if (empty($resultFileIds)) {
278
-				$resultFileIds = $fileIds;
279
-			} else {
280
-				$resultFileIds = array_intersect($fileIds, $resultFileIds);
281
-			}
282
-		}
283
-
284
-		return $resultFileIds;
285
-	}
286
-
287
-	private function getSystemTagFileIds($systemTagIds) {
288
-		$resultFileIds = null;
289
-
290
-		// check user permissions, if applicable
291
-		if (!$this->isAdmin()) {
292
-			// check visibility/permission
293
-			$tags = $this->tagManager->getTagsByIds($systemTagIds);
294
-			$unknownTagIds = [];
295
-			foreach ($tags as $tag) {
296
-				if (!$tag->isUserVisible()) {
297
-					$unknownTagIds[] = $tag->getId();
298
-				}
299
-			}
300
-
301
-			if (!empty($unknownTagIds)) {
302
-				throw new TagNotFoundException('Tag with ids ' . implode(', ', $unknownTagIds) . ' not found');
303
-			}
304
-		}
305
-
306
-		// fetch all file ids and intersect them
307
-		foreach ($systemTagIds as $systemTagId) {
308
-			$fileIds = $this->tagMapper->getObjectIdsForTags($systemTagId, 'files');
309
-
310
-			if (empty($fileIds)) {
311
-				// This tag has no files, nothing can ever show up
312
-				return [];
313
-			}
314
-
315
-			// first run ?
316
-			if ($resultFileIds === null) {
317
-				$resultFileIds = $fileIds;
318
-			} else {
319
-				$resultFileIds = array_intersect($resultFileIds, $fileIds);
320
-			}
321
-
322
-			if (empty($resultFileIds)) {
323
-				// Empty intersection, nothing can show up anymore
324
-				return [];
325
-			}
326
-		}
327
-		return $resultFileIds;
328
-	}
329
-
330
-	/**
331
-	 * Prepare propfind response for the given nodes
332
-	 *
333
-	 * @param string $filesUri $filesUri URI leading to root of the files URI,
334
-	 * with a leading slash but no trailing slash
335
-	 * @param string[] $requestedProps requested properties
336
-	 * @param Node[] nodes nodes for which to fetch and prepare responses
337
-	 * @return Response[]
338
-	 */
339
-	public function prepareResponses($filesUri, $requestedProps, $nodes) {
340
-		$responses = [];
341
-		foreach ($nodes as $node) {
342
-			$propFind = new PropFind($filesUri . $node->getPath(), $requestedProps);
343
-
344
-			$this->server->getPropertiesByNode($propFind, $node);
345
-			// copied from Sabre Server's getPropertiesForPath
346
-			$result = $propFind->getResultForMultiStatus();
347
-			$result['href'] = $propFind->getPath();
348
-
349
-			$resourceType = $this->server->getResourceTypeForNode($node);
350
-			if (in_array('{DAV:}collection', $resourceType) || in_array('{DAV:}principal', $resourceType)) {
351
-				$result['href'] .= '/';
352
-			}
353
-
354
-			$responses[] = new Response(
355
-				rtrim($this->server->getBaseUri(), '/') . $filesUri . $node->getPath(),
356
-				$result,
357
-				200
358
-			);
359
-		}
360
-		return $responses;
361
-	}
362
-
363
-	/**
364
-	 * Find Sabre nodes by file ids
365
-	 *
366
-	 * @param Node $rootNode root node for search
367
-	 * @param array $fileIds file ids
368
-	 * @return Node[] array of Sabre nodes
369
-	 */
370
-	public function findNodesByFileIds($rootNode, $fileIds) {
371
-		$folder = $this->userFolder;
372
-		if (trim($rootNode->getPath(), '/') !== '') {
373
-			$folder = $folder->get($rootNode->getPath());
374
-		}
375
-
376
-		$results = [];
377
-		foreach ($fileIds as $fileId) {
378
-			$entry = $folder->getById($fileId);
379
-			if ($entry) {
380
-				$entry = current($entry);
381
-				if ($entry instanceof \OCP\Files\File) {
382
-					$results[] = new File($this->fileView, $entry);
383
-				} else if ($entry instanceof \OCP\Files\Folder) {
384
-					$results[] = new Directory($this->fileView, $entry);
385
-				}
386
-			}
387
-		}
388
-
389
-		return $results;
390
-	}
391
-
392
-	/**
393
-	 * Returns whether the currently logged in user is an administrator
394
-	 */
395
-	private function isAdmin() {
396
-		$user = $this->userSession->getUser();
397
-		if ($user !== null) {
398
-			return $this->groupManager->isAdmin($user->getUID());
399
-		}
400
-		return false;
401
-	}
44
+    // namespace
45
+    const NS_OWNCLOUD = 'http://owncloud.org/ns';
46
+    const REPORT_NAME            = '{http://owncloud.org/ns}filter-files';
47
+    const SYSTEMTAG_PROPERTYNAME = '{http://owncloud.org/ns}systemtag';
48
+
49
+    /**
50
+     * Reference to main server object
51
+     *
52
+     * @var \Sabre\DAV\Server
53
+     */
54
+    private $server;
55
+
56
+    /**
57
+     * @var Tree
58
+     */
59
+    private $tree;
60
+
61
+    /**
62
+     * @var View
63
+     */
64
+    private $fileView;
65
+
66
+    /**
67
+     * @var ISystemTagManager
68
+     */
69
+    private $tagManager;
70
+
71
+    /**
72
+     * @var ISystemTagObjectMapper
73
+     */
74
+    private $tagMapper;
75
+
76
+    /**
77
+     * Manager for private tags
78
+     *
79
+     * @var ITagManager
80
+     */
81
+    private $fileTagger;
82
+
83
+    /**
84
+     * @var IUserSession
85
+     */
86
+    private $userSession;
87
+
88
+    /**
89
+     * @var IGroupManager
90
+     */
91
+    private $groupManager;
92
+
93
+    /**
94
+     * @var Folder
95
+     */
96
+    private $userFolder;
97
+
98
+    /**
99
+     * @param Tree $tree
100
+     * @param View $view
101
+     * @param ISystemTagManager $tagManager
102
+     * @param ISystemTagObjectMapper $tagMapper
103
+     * @param ITagManager $fileTagger manager for private tags
104
+     * @param IUserSession $userSession
105
+     * @param IGroupManager $groupManager
106
+     * @param Folder $userFolder
107
+     */
108
+    public function __construct(Tree $tree,
109
+                                View $view,
110
+                                ISystemTagManager $tagManager,
111
+                                ISystemTagObjectMapper $tagMapper,
112
+                                ITagManager $fileTagger,
113
+                                IUserSession $userSession,
114
+                                IGroupManager $groupManager,
115
+                                Folder $userFolder
116
+    ) {
117
+        $this->tree = $tree;
118
+        $this->fileView = $view;
119
+        $this->tagManager = $tagManager;
120
+        $this->tagMapper = $tagMapper;
121
+        $this->fileTagger = $fileTagger;
122
+        $this->userSession = $userSession;
123
+        $this->groupManager = $groupManager;
124
+        $this->userFolder = $userFolder;
125
+    }
126
+
127
+    /**
128
+     * This initializes the plugin.
129
+     *
130
+     * This function is called by \Sabre\DAV\Server, after
131
+     * addPlugin is called.
132
+     *
133
+     * This method should set up the required event subscriptions.
134
+     *
135
+     * @param \Sabre\DAV\Server $server
136
+     * @return void
137
+     */
138
+    public function initialize(\Sabre\DAV\Server $server) {
139
+
140
+        $server->xml->namespaceMap[self::NS_OWNCLOUD] = 'oc';
141
+
142
+        $this->server = $server;
143
+        $this->server->on('report', array($this, 'onReport'));
144
+    }
145
+
146
+    /**
147
+     * Returns a list of reports this plugin supports.
148
+     *
149
+     * This will be used in the {DAV:}supported-report-set property.
150
+     *
151
+     * @param string $uri
152
+     * @return array
153
+     */
154
+    public function getSupportedReportSet($uri) {
155
+        return [self::REPORT_NAME];
156
+    }
157
+
158
+    /**
159
+     * REPORT operations to look for files
160
+     *
161
+     * @param string $reportName
162
+     * @param $report
163
+     * @param string $uri
164
+     * @return bool
165
+     * @throws BadRequest
166
+     * @throws PreconditionFailed
167
+     * @internal param $ [] $report
168
+     */
169
+    public function onReport($reportName, $report, $uri) {
170
+        $reportTargetNode = $this->server->tree->getNodeForPath($uri);
171
+        if (!$reportTargetNode instanceof Directory || $reportName !== self::REPORT_NAME) {
172
+            return;
173
+        }
174
+
175
+        $ns = '{' . $this::NS_OWNCLOUD . '}';
176
+        $requestedProps = [];
177
+        $filterRules = [];
178
+
179
+        // parse report properties and gather filter info
180
+        foreach ($report as $reportProps) {
181
+            $name = $reportProps['name'];
182
+            if ($name === $ns . 'filter-rules') {
183
+                $filterRules = $reportProps['value'];
184
+            } else if ($name === '{DAV:}prop') {
185
+                // propfind properties
186
+                foreach ($reportProps['value'] as $propVal) {
187
+                    $requestedProps[] = $propVal['name'];
188
+                }
189
+            }
190
+        }
191
+
192
+        if (empty($filterRules)) {
193
+            // an empty filter would return all existing files which would be slow
194
+            throw new BadRequest('Missing filter-rule block in request');
195
+        }
196
+
197
+        // gather all file ids matching filter
198
+        try {
199
+            $resultFileIds = $this->processFilterRules($filterRules);
200
+        } catch (TagNotFoundException $e) {
201
+            throw new PreconditionFailed('Cannot filter by non-existing tag', 0, $e);
202
+        }
203
+
204
+        // find sabre nodes by file id, restricted to the root node path
205
+        $results = $this->findNodesByFileIds($reportTargetNode, $resultFileIds);
206
+
207
+        $filesUri = $this->getFilesBaseUri($uri, $reportTargetNode->getPath());
208
+        $responses = $this->prepareResponses($filesUri, $requestedProps, $results);
209
+
210
+        $xml = $this->server->xml->write(
211
+            '{DAV:}multistatus',
212
+            new MultiStatus($responses)
213
+        );
214
+
215
+        $this->server->httpResponse->setStatus(207);
216
+        $this->server->httpResponse->setHeader('Content-Type', 'application/xml; charset=utf-8');
217
+        $this->server->httpResponse->setBody($xml);
218
+
219
+        return false;
220
+    }
221
+
222
+    /**
223
+     * Returns the base uri of the files root by removing
224
+     * the subpath from the URI
225
+     *
226
+     * @param string $uri URI from this request
227
+     * @param string $subPath subpath to remove from the URI
228
+     *
229
+     * @return string files base uri
230
+     */
231
+    private function getFilesBaseUri($uri, $subPath) {
232
+        $uri = trim($uri, '/');
233
+        $subPath = trim($subPath, '/');
234
+        if (empty($subPath)) {
235
+            $filesUri = $uri;
236
+        } else {
237
+            $filesUri = substr($uri, 0, strlen($uri) - strlen($subPath));
238
+        }
239
+        $filesUri = trim($filesUri, '/');
240
+        if (empty($filesUri)) {
241
+            return '';
242
+        }
243
+        return '/' . $filesUri;
244
+    }
245
+
246
+    /**
247
+     * Find file ids matching the given filter rules
248
+     *
249
+     * @param array $filterRules
250
+     * @return array array of unique file id results
251
+     *
252
+     * @throws TagNotFoundException whenever a tag was not found
253
+     */
254
+    protected function processFilterRules($filterRules) {
255
+        $ns = '{' . $this::NS_OWNCLOUD . '}';
256
+        $resultFileIds = null;
257
+        $systemTagIds = [];
258
+        $favoriteFilter = null;
259
+        foreach ($filterRules as $filterRule) {
260
+            if ($filterRule['name'] === $ns . 'systemtag') {
261
+                $systemTagIds[] = $filterRule['value'];
262
+            }
263
+            if ($filterRule['name'] === $ns . 'favorite') {
264
+                $favoriteFilter = true;
265
+            }
266
+        }
267
+
268
+        if ($favoriteFilter !== null) {
269
+            $resultFileIds = $this->fileTagger->load('files')->getFavorites();
270
+            if (empty($resultFileIds)) {
271
+                return [];
272
+            }
273
+        }
274
+
275
+        if (!empty($systemTagIds)) {
276
+            $fileIds = $this->getSystemTagFileIds($systemTagIds);
277
+            if (empty($resultFileIds)) {
278
+                $resultFileIds = $fileIds;
279
+            } else {
280
+                $resultFileIds = array_intersect($fileIds, $resultFileIds);
281
+            }
282
+        }
283
+
284
+        return $resultFileIds;
285
+    }
286
+
287
+    private function getSystemTagFileIds($systemTagIds) {
288
+        $resultFileIds = null;
289
+
290
+        // check user permissions, if applicable
291
+        if (!$this->isAdmin()) {
292
+            // check visibility/permission
293
+            $tags = $this->tagManager->getTagsByIds($systemTagIds);
294
+            $unknownTagIds = [];
295
+            foreach ($tags as $tag) {
296
+                if (!$tag->isUserVisible()) {
297
+                    $unknownTagIds[] = $tag->getId();
298
+                }
299
+            }
300
+
301
+            if (!empty($unknownTagIds)) {
302
+                throw new TagNotFoundException('Tag with ids ' . implode(', ', $unknownTagIds) . ' not found');
303
+            }
304
+        }
305
+
306
+        // fetch all file ids and intersect them
307
+        foreach ($systemTagIds as $systemTagId) {
308
+            $fileIds = $this->tagMapper->getObjectIdsForTags($systemTagId, 'files');
309
+
310
+            if (empty($fileIds)) {
311
+                // This tag has no files, nothing can ever show up
312
+                return [];
313
+            }
314
+
315
+            // first run ?
316
+            if ($resultFileIds === null) {
317
+                $resultFileIds = $fileIds;
318
+            } else {
319
+                $resultFileIds = array_intersect($resultFileIds, $fileIds);
320
+            }
321
+
322
+            if (empty($resultFileIds)) {
323
+                // Empty intersection, nothing can show up anymore
324
+                return [];
325
+            }
326
+        }
327
+        return $resultFileIds;
328
+    }
329
+
330
+    /**
331
+     * Prepare propfind response for the given nodes
332
+     *
333
+     * @param string $filesUri $filesUri URI leading to root of the files URI,
334
+     * with a leading slash but no trailing slash
335
+     * @param string[] $requestedProps requested properties
336
+     * @param Node[] nodes nodes for which to fetch and prepare responses
337
+     * @return Response[]
338
+     */
339
+    public function prepareResponses($filesUri, $requestedProps, $nodes) {
340
+        $responses = [];
341
+        foreach ($nodes as $node) {
342
+            $propFind = new PropFind($filesUri . $node->getPath(), $requestedProps);
343
+
344
+            $this->server->getPropertiesByNode($propFind, $node);
345
+            // copied from Sabre Server's getPropertiesForPath
346
+            $result = $propFind->getResultForMultiStatus();
347
+            $result['href'] = $propFind->getPath();
348
+
349
+            $resourceType = $this->server->getResourceTypeForNode($node);
350
+            if (in_array('{DAV:}collection', $resourceType) || in_array('{DAV:}principal', $resourceType)) {
351
+                $result['href'] .= '/';
352
+            }
353
+
354
+            $responses[] = new Response(
355
+                rtrim($this->server->getBaseUri(), '/') . $filesUri . $node->getPath(),
356
+                $result,
357
+                200
358
+            );
359
+        }
360
+        return $responses;
361
+    }
362
+
363
+    /**
364
+     * Find Sabre nodes by file ids
365
+     *
366
+     * @param Node $rootNode root node for search
367
+     * @param array $fileIds file ids
368
+     * @return Node[] array of Sabre nodes
369
+     */
370
+    public function findNodesByFileIds($rootNode, $fileIds) {
371
+        $folder = $this->userFolder;
372
+        if (trim($rootNode->getPath(), '/') !== '') {
373
+            $folder = $folder->get($rootNode->getPath());
374
+        }
375
+
376
+        $results = [];
377
+        foreach ($fileIds as $fileId) {
378
+            $entry = $folder->getById($fileId);
379
+            if ($entry) {
380
+                $entry = current($entry);
381
+                if ($entry instanceof \OCP\Files\File) {
382
+                    $results[] = new File($this->fileView, $entry);
383
+                } else if ($entry instanceof \OCP\Files\Folder) {
384
+                    $results[] = new Directory($this->fileView, $entry);
385
+                }
386
+            }
387
+        }
388
+
389
+        return $results;
390
+    }
391
+
392
+    /**
393
+     * Returns whether the currently logged in user is an administrator
394
+     */
395
+    private function isAdmin() {
396
+        $user = $this->userSession->getUser();
397
+        if ($user !== null) {
398
+            return $this->groupManager->isAdmin($user->getUID());
399
+        }
400
+        return false;
401
+    }
402 402
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/CopyEtagHeaderPlugin.php 1 patch
Indentation   +43 added lines, -43 removed lines patch added patch discarded remove patch
@@ -33,50 +33,50 @@
 block discarded – undo
33 33
  */
34 34
 class CopyEtagHeaderPlugin extends \Sabre\DAV\ServerPlugin {
35 35
 
36
-	/** @var \Sabre\DAV\Server */
37
-	private $server;
38
-	/**
39
-	 * This initializes the plugin.
40
-	 *
41
-	 * @param \Sabre\DAV\Server $server Sabre server
42
-	 *
43
-	 * @return void
44
-	 */
45
-	public function initialize(\Sabre\DAV\Server $server) {
46
-		$this->server = $server;
36
+    /** @var \Sabre\DAV\Server */
37
+    private $server;
38
+    /**
39
+     * This initializes the plugin.
40
+     *
41
+     * @param \Sabre\DAV\Server $server Sabre server
42
+     *
43
+     * @return void
44
+     */
45
+    public function initialize(\Sabre\DAV\Server $server) {
46
+        $this->server = $server;
47 47
 
48
-		$server->on('afterMethod', [$this, 'afterMethod']);
49
-		$server->on('afterMove', [$this, 'afterMove']);
50
-	}
48
+        $server->on('afterMethod', [$this, 'afterMethod']);
49
+        $server->on('afterMove', [$this, 'afterMove']);
50
+    }
51 51
 
52
-	/**
53
-	 * After method, copy the "Etag" header to "OC-Etag" header.
54
-	 *
55
-	 * @param RequestInterface $request request
56
-	 * @param ResponseInterface $response response
57
-	 */
58
-	public function afterMethod(RequestInterface $request, ResponseInterface $response) {
59
-		$eTag = $response->getHeader('Etag');
60
-		if (!empty($eTag)) {
61
-			$response->setHeader('OC-ETag', $eTag);
62
-		}
63
-	}
52
+    /**
53
+     * After method, copy the "Etag" header to "OC-Etag" header.
54
+     *
55
+     * @param RequestInterface $request request
56
+     * @param ResponseInterface $response response
57
+     */
58
+    public function afterMethod(RequestInterface $request, ResponseInterface $response) {
59
+        $eTag = $response->getHeader('Etag');
60
+        if (!empty($eTag)) {
61
+            $response->setHeader('OC-ETag', $eTag);
62
+        }
63
+    }
64 64
 
65
-	/**
66
-	 * Called after a node is moved.
67
-	 *
68
-	 * This allows the backend to move all the associated properties.
69
-	 *
70
-	 * @param string $source
71
-	 * @param string $destination
72
-	 * @return void
73
-	 */
74
-	function afterMove($source, $destination) {
75
-		$node = $this->server->tree->getNodeForPath($destination);
76
-		if ($node instanceof File) {
77
-			$eTag = $node->getETag();
78
-			$this->server->httpResponse->setHeader('OC-ETag', $eTag);
79
-			$this->server->httpResponse->setHeader('ETag', $eTag);
80
-		}
81
-	}
65
+    /**
66
+     * Called after a node is moved.
67
+     *
68
+     * This allows the backend to move all the associated properties.
69
+     *
70
+     * @param string $source
71
+     * @param string $destination
72
+     * @return void
73
+     */
74
+    function afterMove($source, $destination) {
75
+        $node = $this->server->tree->getNodeForPath($destination);
76
+        if ($node instanceof File) {
77
+            $eTag = $node->getETag();
78
+            $this->server->httpResponse->setHeader('OC-ETag', $eTag);
79
+            $this->server->httpResponse->setHeader('ETag', $eTag);
80
+        }
81
+    }
82 82
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/ChecksumList.php 1 patch
Indentation   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -32,41 +32,41 @@
 block discarded – undo
32 32
  * checksum name.
33 33
  */
34 34
 class ChecksumList implements XmlSerializable {
35
-	const NS_OWNCLOUD = 'http://owncloud.org/ns';
35
+    const NS_OWNCLOUD = 'http://owncloud.org/ns';
36 36
 
37
-	/** @var string[] of TYPE:CHECKSUM */
38
-	private $checksums;
37
+    /** @var string[] of TYPE:CHECKSUM */
38
+    private $checksums;
39 39
 
40
-	/**
41
-	 * @param string $checksum
42
-	 */
43
-	public function __construct($checksum) {
44
-		$this->checksums = explode(',', $checksum);
45
-	}
40
+    /**
41
+     * @param string $checksum
42
+     */
43
+    public function __construct($checksum) {
44
+        $this->checksums = explode(',', $checksum);
45
+    }
46 46
 
47
-	/**
48
-	 * The xmlSerialize metod is called during xml writing.
49
-	 *
50
-	 * Use the $writer argument to write its own xml serialization.
51
-	 *
52
-	 * An important note: do _not_ create a parent element. Any element
53
-	 * implementing XmlSerializble should only ever write what's considered
54
-	 * its 'inner xml'.
55
-	 *
56
-	 * The parent of the current element is responsible for writing a
57
-	 * containing element.
58
-	 *
59
-	 * This allows serializers to be re-used for different element names.
60
-	 *
61
-	 * If you are opening new elements, you must also close them again.
62
-	 *
63
-	 * @param Writer $writer
64
-	 * @return void
65
-	 */
66
-	function xmlSerialize(Writer $writer) {
47
+    /**
48
+     * The xmlSerialize metod is called during xml writing.
49
+     *
50
+     * Use the $writer argument to write its own xml serialization.
51
+     *
52
+     * An important note: do _not_ create a parent element. Any element
53
+     * implementing XmlSerializble should only ever write what's considered
54
+     * its 'inner xml'.
55
+     *
56
+     * The parent of the current element is responsible for writing a
57
+     * containing element.
58
+     *
59
+     * This allows serializers to be re-used for different element names.
60
+     *
61
+     * If you are opening new elements, you must also close them again.
62
+     *
63
+     * @param Writer $writer
64
+     * @return void
65
+     */
66
+    function xmlSerialize(Writer $writer) {
67 67
 
68
-		foreach ($this->checksums as $checksum) {
69
-			$writer->writeElement('{' . self::NS_OWNCLOUD . '}checksum', $checksum);
70
-		}
71
-	}
68
+        foreach ($this->checksums as $checksum) {
69
+            $writer->writeElement('{' . self::NS_OWNCLOUD . '}checksum', $checksum);
70
+        }
71
+    }
72 72
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/AppEnabledPlugin.php 1 patch
Indentation   +48 added lines, -48 removed lines patch added patch discarded remove patch
@@ -34,58 +34,58 @@
 block discarded – undo
34 34
  */
35 35
 class AppEnabledPlugin extends ServerPlugin {
36 36
 
37
-	/**
38
-	 * Reference to main server object
39
-	 *
40
-	 * @var \Sabre\DAV\Server
41
-	 */
42
-	private $server;
37
+    /**
38
+     * Reference to main server object
39
+     *
40
+     * @var \Sabre\DAV\Server
41
+     */
42
+    private $server;
43 43
 
44
-	/**
45
-	 * @var string
46
-	 */
47
-	private $app;
44
+    /**
45
+     * @var string
46
+     */
47
+    private $app;
48 48
 
49
-	/**
50
-	 * @var \OCP\App\IAppManager
51
-	 */
52
-	private $appManager;
49
+    /**
50
+     * @var \OCP\App\IAppManager
51
+     */
52
+    private $appManager;
53 53
 
54
-	/**
55
-	 * @param string $app
56
-	 * @param \OCP\App\IAppManager $appManager
57
-	 */
58
-	public function __construct($app, IAppManager $appManager) {
59
-		$this->app = $app;
60
-		$this->appManager = $appManager;
61
-	}
54
+    /**
55
+     * @param string $app
56
+     * @param \OCP\App\IAppManager $appManager
57
+     */
58
+    public function __construct($app, IAppManager $appManager) {
59
+        $this->app = $app;
60
+        $this->appManager = $appManager;
61
+    }
62 62
 
63
-	/**
64
-	 * This initializes the plugin.
65
-	 *
66
-	 * This function is called by \Sabre\DAV\Server, after
67
-	 * addPlugin is called.
68
-	 *
69
-	 * This method should set up the required event subscriptions.
70
-	 *
71
-	 * @param \Sabre\DAV\Server $server
72
-	 * @return void
73
-	 */
74
-	public function initialize(\Sabre\DAV\Server $server) {
63
+    /**
64
+     * This initializes the plugin.
65
+     *
66
+     * This function is called by \Sabre\DAV\Server, after
67
+     * addPlugin is called.
68
+     *
69
+     * This method should set up the required event subscriptions.
70
+     *
71
+     * @param \Sabre\DAV\Server $server
72
+     * @return void
73
+     */
74
+    public function initialize(\Sabre\DAV\Server $server) {
75 75
 
76
-		$this->server = $server;
77
-		$this->server->on('beforeMethod', array($this, 'checkAppEnabled'), 30);
78
-	}
76
+        $this->server = $server;
77
+        $this->server->on('beforeMethod', array($this, 'checkAppEnabled'), 30);
78
+    }
79 79
 
80
-	/**
81
-	 * This method is called before any HTTP after auth and checks if the user has access to the app
82
-	 *
83
-	 * @throws \Sabre\DAV\Exception\Forbidden
84
-	 * @return bool
85
-	 */
86
-	public function checkAppEnabled() {
87
-		if (!$this->appManager->isEnabledForUser($this->app)) {
88
-			throw new Forbidden();
89
-		}
90
-	}
80
+    /**
81
+     * This method is called before any HTTP after auth and checks if the user has access to the app
82
+     *
83
+     * @throws \Sabre\DAV\Exception\Forbidden
84
+     * @return bool
85
+     */
86
+    public function checkAppEnabled() {
87
+        if (!$this->appManager->isEnabledForUser($this->app)) {
88
+            throw new Forbidden();
89
+        }
90
+    }
91 91
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/Directory.php 1 patch
Indentation   +248 added lines, -248 removed lines patch added patch discarded remove patch
@@ -39,276 +39,276 @@
 block discarded – undo
39 39
 use Sabre\DAV\Exception\Locked;
40 40
 
41 41
 class Directory extends \OCA\DAV\Connector\Sabre\Node
42
-	implements \Sabre\DAV\ICollection, \Sabre\DAV\IQuota {
42
+    implements \Sabre\DAV\ICollection, \Sabre\DAV\IQuota {
43 43
 
44
-	/**
45
-	 * Cached directory content
46
-	 *
47
-	 * @var \OCP\Files\FileInfo[]
48
-	 */
49
-	private $dirContent;
44
+    /**
45
+     * Cached directory content
46
+     *
47
+     * @var \OCP\Files\FileInfo[]
48
+     */
49
+    private $dirContent;
50 50
 
51
-	/**
52
-	 * Cached quota info
53
-	 *
54
-	 * @var array
55
-	 */
56
-	private $quotaInfo;
51
+    /**
52
+     * Cached quota info
53
+     *
54
+     * @var array
55
+     */
56
+    private $quotaInfo;
57 57
 
58
-	/**
59
-	 * @var ObjectTree|null
60
-	 */
61
-	private $tree;
58
+    /**
59
+     * @var ObjectTree|null
60
+     */
61
+    private $tree;
62 62
 
63
-	/**
64
-	 * Sets up the node, expects a full path name
65
-	 *
66
-	 * @param \OC\Files\View $view
67
-	 * @param \OCP\Files\FileInfo $info
68
-	 * @param ObjectTree|null $tree
69
-	 * @param \OCP\Share\IManager $shareManager
70
-	 */
71
-	public function __construct($view, $info, $tree = null, $shareManager = null) {
72
-		parent::__construct($view, $info, $shareManager);
73
-		$this->tree = $tree;
74
-	}
63
+    /**
64
+     * Sets up the node, expects a full path name
65
+     *
66
+     * @param \OC\Files\View $view
67
+     * @param \OCP\Files\FileInfo $info
68
+     * @param ObjectTree|null $tree
69
+     * @param \OCP\Share\IManager $shareManager
70
+     */
71
+    public function __construct($view, $info, $tree = null, $shareManager = null) {
72
+        parent::__construct($view, $info, $shareManager);
73
+        $this->tree = $tree;
74
+    }
75 75
 
76
-	/**
77
-	 * Creates a new file in the directory
78
-	 *
79
-	 * Data will either be supplied as a stream resource, or in certain cases
80
-	 * as a string. Keep in mind that you may have to support either.
81
-	 *
82
-	 * After successful creation of the file, you may choose to return the ETag
83
-	 * of the new file here.
84
-	 *
85
-	 * The returned ETag must be surrounded by double-quotes (The quotes should
86
-	 * be part of the actual string).
87
-	 *
88
-	 * If you cannot accurately determine the ETag, you should not return it.
89
-	 * If you don't store the file exactly as-is (you're transforming it
90
-	 * somehow) you should also not return an ETag.
91
-	 *
92
-	 * This means that if a subsequent GET to this new file does not exactly
93
-	 * return the same contents of what was submitted here, you are strongly
94
-	 * recommended to omit the ETag.
95
-	 *
96
-	 * @param string $name Name of the file
97
-	 * @param resource|string $data Initial payload
98
-	 * @return null|string
99
-	 * @throws Exception\EntityTooLarge
100
-	 * @throws Exception\UnsupportedMediaType
101
-	 * @throws FileLocked
102
-	 * @throws InvalidPath
103
-	 * @throws \Sabre\DAV\Exception
104
-	 * @throws \Sabre\DAV\Exception\BadRequest
105
-	 * @throws \Sabre\DAV\Exception\Forbidden
106
-	 * @throws \Sabre\DAV\Exception\ServiceUnavailable
107
-	 */
108
-	public function createFile($name, $data = null) {
76
+    /**
77
+     * Creates a new file in the directory
78
+     *
79
+     * Data will either be supplied as a stream resource, or in certain cases
80
+     * as a string. Keep in mind that you may have to support either.
81
+     *
82
+     * After successful creation of the file, you may choose to return the ETag
83
+     * of the new file here.
84
+     *
85
+     * The returned ETag must be surrounded by double-quotes (The quotes should
86
+     * be part of the actual string).
87
+     *
88
+     * If you cannot accurately determine the ETag, you should not return it.
89
+     * If you don't store the file exactly as-is (you're transforming it
90
+     * somehow) you should also not return an ETag.
91
+     *
92
+     * This means that if a subsequent GET to this new file does not exactly
93
+     * return the same contents of what was submitted here, you are strongly
94
+     * recommended to omit the ETag.
95
+     *
96
+     * @param string $name Name of the file
97
+     * @param resource|string $data Initial payload
98
+     * @return null|string
99
+     * @throws Exception\EntityTooLarge
100
+     * @throws Exception\UnsupportedMediaType
101
+     * @throws FileLocked
102
+     * @throws InvalidPath
103
+     * @throws \Sabre\DAV\Exception
104
+     * @throws \Sabre\DAV\Exception\BadRequest
105
+     * @throws \Sabre\DAV\Exception\Forbidden
106
+     * @throws \Sabre\DAV\Exception\ServiceUnavailable
107
+     */
108
+    public function createFile($name, $data = null) {
109 109
 
110
-		try {
111
-			// for chunked upload also updating a existing file is a "createFile"
112
-			// because we create all the chunks before re-assemble them to the existing file.
113
-			if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
110
+        try {
111
+            // for chunked upload also updating a existing file is a "createFile"
112
+            // because we create all the chunks before re-assemble them to the existing file.
113
+            if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
114 114
 
115
-				// exit if we can't create a new file and we don't updatable existing file
116
-				$info = \OC_FileChunking::decodeName($name);
117
-				if (!$this->fileView->isCreatable($this->path) &&
118
-					!$this->fileView->isUpdatable($this->path . '/' . $info['name'])
119
-				) {
120
-					throw new \Sabre\DAV\Exception\Forbidden();
121
-				}
115
+                // exit if we can't create a new file and we don't updatable existing file
116
+                $info = \OC_FileChunking::decodeName($name);
117
+                if (!$this->fileView->isCreatable($this->path) &&
118
+                    !$this->fileView->isUpdatable($this->path . '/' . $info['name'])
119
+                ) {
120
+                    throw new \Sabre\DAV\Exception\Forbidden();
121
+                }
122 122
 
123
-			} else {
124
-				// For non-chunked upload it is enough to check if we can create a new file
125
-				if (!$this->fileView->isCreatable($this->path)) {
126
-					throw new \Sabre\DAV\Exception\Forbidden();
127
-				}
128
-			}
123
+            } else {
124
+                // For non-chunked upload it is enough to check if we can create a new file
125
+                if (!$this->fileView->isCreatable($this->path)) {
126
+                    throw new \Sabre\DAV\Exception\Forbidden();
127
+                }
128
+            }
129 129
 
130
-			$this->fileView->verifyPath($this->path, $name);
130
+            $this->fileView->verifyPath($this->path, $name);
131 131
 
132
-			$path = $this->fileView->getAbsolutePath($this->path) . '/' . $name;
133
-			// using a dummy FileInfo is acceptable here since it will be refreshed after the put is complete
134
-			$info = new \OC\Files\FileInfo($path, null, null, array(), null);
135
-			$node = new \OCA\DAV\Connector\Sabre\File($this->fileView, $info);
136
-			$node->acquireLock(ILockingProvider::LOCK_SHARED);
137
-			return $node->put($data);
138
-		} catch (\OCP\Files\StorageNotAvailableException $e) {
139
-			throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
140
-		} catch (\OCP\Files\InvalidPathException $ex) {
141
-			throw new InvalidPath($ex->getMessage());
142
-		} catch (ForbiddenException $ex) {
143
-			throw new Forbidden($ex->getMessage(), $ex->getRetry());
144
-		} catch (LockedException $e) {
145
-			throw new FileLocked($e->getMessage(), $e->getCode(), $e);
146
-		}
147
-	}
132
+            $path = $this->fileView->getAbsolutePath($this->path) . '/' . $name;
133
+            // using a dummy FileInfo is acceptable here since it will be refreshed after the put is complete
134
+            $info = new \OC\Files\FileInfo($path, null, null, array(), null);
135
+            $node = new \OCA\DAV\Connector\Sabre\File($this->fileView, $info);
136
+            $node->acquireLock(ILockingProvider::LOCK_SHARED);
137
+            return $node->put($data);
138
+        } catch (\OCP\Files\StorageNotAvailableException $e) {
139
+            throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
140
+        } catch (\OCP\Files\InvalidPathException $ex) {
141
+            throw new InvalidPath($ex->getMessage());
142
+        } catch (ForbiddenException $ex) {
143
+            throw new Forbidden($ex->getMessage(), $ex->getRetry());
144
+        } catch (LockedException $e) {
145
+            throw new FileLocked($e->getMessage(), $e->getCode(), $e);
146
+        }
147
+    }
148 148
 
149
-	/**
150
-	 * Creates a new subdirectory
151
-	 *
152
-	 * @param string $name
153
-	 * @throws FileLocked
154
-	 * @throws InvalidPath
155
-	 * @throws \Sabre\DAV\Exception\Forbidden
156
-	 * @throws \Sabre\DAV\Exception\ServiceUnavailable
157
-	 */
158
-	public function createDirectory($name) {
159
-		try {
160
-			if (!$this->info->isCreatable()) {
161
-				throw new \Sabre\DAV\Exception\Forbidden();
162
-			}
149
+    /**
150
+     * Creates a new subdirectory
151
+     *
152
+     * @param string $name
153
+     * @throws FileLocked
154
+     * @throws InvalidPath
155
+     * @throws \Sabre\DAV\Exception\Forbidden
156
+     * @throws \Sabre\DAV\Exception\ServiceUnavailable
157
+     */
158
+    public function createDirectory($name) {
159
+        try {
160
+            if (!$this->info->isCreatable()) {
161
+                throw new \Sabre\DAV\Exception\Forbidden();
162
+            }
163 163
 
164
-			$this->fileView->verifyPath($this->path, $name);
165
-			$newPath = $this->path . '/' . $name;
166
-			if (!$this->fileView->mkdir($newPath)) {
167
-				throw new \Sabre\DAV\Exception\Forbidden('Could not create directory ' . $newPath);
168
-			}
169
-		} catch (\OCP\Files\StorageNotAvailableException $e) {
170
-			throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
171
-		} catch (\OCP\Files\InvalidPathException $ex) {
172
-			throw new InvalidPath($ex->getMessage());
173
-		} catch (ForbiddenException $ex) {
174
-			throw new Forbidden($ex->getMessage(), $ex->getRetry());
175
-		} catch (LockedException $e) {
176
-			throw new FileLocked($e->getMessage(), $e->getCode(), $e);
177
-		}
178
-	}
164
+            $this->fileView->verifyPath($this->path, $name);
165
+            $newPath = $this->path . '/' . $name;
166
+            if (!$this->fileView->mkdir($newPath)) {
167
+                throw new \Sabre\DAV\Exception\Forbidden('Could not create directory ' . $newPath);
168
+            }
169
+        } catch (\OCP\Files\StorageNotAvailableException $e) {
170
+            throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
171
+        } catch (\OCP\Files\InvalidPathException $ex) {
172
+            throw new InvalidPath($ex->getMessage());
173
+        } catch (ForbiddenException $ex) {
174
+            throw new Forbidden($ex->getMessage(), $ex->getRetry());
175
+        } catch (LockedException $e) {
176
+            throw new FileLocked($e->getMessage(), $e->getCode(), $e);
177
+        }
178
+    }
179 179
 
180
-	/**
181
-	 * Returns a specific child node, referenced by its name
182
-	 *
183
-	 * @param string $name
184
-	 * @param \OCP\Files\FileInfo $info
185
-	 * @return \Sabre\DAV\INode
186
-	 * @throws InvalidPath
187
-	 * @throws \Sabre\DAV\Exception\NotFound
188
-	 * @throws \Sabre\DAV\Exception\ServiceUnavailable
189
-	 */
190
-	public function getChild($name, $info = null) {
191
-		$path = $this->path . '/' . $name;
192
-		if (is_null($info)) {
193
-			try {
194
-				$this->fileView->verifyPath($this->path, $name);
195
-				$info = $this->fileView->getFileInfo($path);
196
-			} catch (\OCP\Files\StorageNotAvailableException $e) {
197
-				throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
198
-			} catch (\OCP\Files\InvalidPathException $ex) {
199
-				throw new InvalidPath($ex->getMessage());
200
-			} catch (ForbiddenException $e) {
201
-				throw new \Sabre\DAV\Exception\Forbidden();
202
-			}
203
-		}
180
+    /**
181
+     * Returns a specific child node, referenced by its name
182
+     *
183
+     * @param string $name
184
+     * @param \OCP\Files\FileInfo $info
185
+     * @return \Sabre\DAV\INode
186
+     * @throws InvalidPath
187
+     * @throws \Sabre\DAV\Exception\NotFound
188
+     * @throws \Sabre\DAV\Exception\ServiceUnavailable
189
+     */
190
+    public function getChild($name, $info = null) {
191
+        $path = $this->path . '/' . $name;
192
+        if (is_null($info)) {
193
+            try {
194
+                $this->fileView->verifyPath($this->path, $name);
195
+                $info = $this->fileView->getFileInfo($path);
196
+            } catch (\OCP\Files\StorageNotAvailableException $e) {
197
+                throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage());
198
+            } catch (\OCP\Files\InvalidPathException $ex) {
199
+                throw new InvalidPath($ex->getMessage());
200
+            } catch (ForbiddenException $e) {
201
+                throw new \Sabre\DAV\Exception\Forbidden();
202
+            }
203
+        }
204 204
 
205
-		if (!$info) {
206
-			throw new \Sabre\DAV\Exception\NotFound('File with name ' . $path . ' could not be located');
207
-		}
205
+        if (!$info) {
206
+            throw new \Sabre\DAV\Exception\NotFound('File with name ' . $path . ' could not be located');
207
+        }
208 208
 
209
-		if ($info['mimetype'] == 'httpd/unix-directory') {
210
-			$node = new \OCA\DAV\Connector\Sabre\Directory($this->fileView, $info, $this->tree, $this->shareManager);
211
-		} else {
212
-			$node = new \OCA\DAV\Connector\Sabre\File($this->fileView, $info, $this->shareManager);
213
-		}
214
-		if ($this->tree) {
215
-			$this->tree->cacheNode($node);
216
-		}
217
-		return $node;
218
-	}
209
+        if ($info['mimetype'] == 'httpd/unix-directory') {
210
+            $node = new \OCA\DAV\Connector\Sabre\Directory($this->fileView, $info, $this->tree, $this->shareManager);
211
+        } else {
212
+            $node = new \OCA\DAV\Connector\Sabre\File($this->fileView, $info, $this->shareManager);
213
+        }
214
+        if ($this->tree) {
215
+            $this->tree->cacheNode($node);
216
+        }
217
+        return $node;
218
+    }
219 219
 
220
-	/**
221
-	 * Returns an array with all the child nodes
222
-	 *
223
-	 * @return \Sabre\DAV\INode[]
224
-	 */
225
-	public function getChildren() {
226
-		if (!is_null($this->dirContent)) {
227
-			return $this->dirContent;
228
-		}
229
-		try {
230
-			$folderContent = $this->fileView->getDirectoryContent($this->path);
231
-		} catch (LockedException $e) {
232
-			throw new Locked();
233
-		}
220
+    /**
221
+     * Returns an array with all the child nodes
222
+     *
223
+     * @return \Sabre\DAV\INode[]
224
+     */
225
+    public function getChildren() {
226
+        if (!is_null($this->dirContent)) {
227
+            return $this->dirContent;
228
+        }
229
+        try {
230
+            $folderContent = $this->fileView->getDirectoryContent($this->path);
231
+        } catch (LockedException $e) {
232
+            throw new Locked();
233
+        }
234 234
 
235
-		$nodes = array();
236
-		foreach ($folderContent as $info) {
237
-			$node = $this->getChild($info->getName(), $info);
238
-			$nodes[] = $node;
239
-		}
240
-		$this->dirContent = $nodes;
241
-		return $this->dirContent;
242
-	}
235
+        $nodes = array();
236
+        foreach ($folderContent as $info) {
237
+            $node = $this->getChild($info->getName(), $info);
238
+            $nodes[] = $node;
239
+        }
240
+        $this->dirContent = $nodes;
241
+        return $this->dirContent;
242
+    }
243 243
 
244
-	/**
245
-	 * Checks if a child exists.
246
-	 *
247
-	 * @param string $name
248
-	 * @return bool
249
-	 */
250
-	public function childExists($name) {
251
-		// note: here we do NOT resolve the chunk file name to the real file name
252
-		// to make sure we return false when checking for file existence with a chunk
253
-		// file name.
254
-		// This is to make sure that "createFile" is still triggered
255
-		// (required old code) instead of "updateFile".
256
-		//
257
-		// TODO: resolve chunk file name here and implement "updateFile"
258
-		$path = $this->path . '/' . $name;
259
-		return $this->fileView->file_exists($path);
244
+    /**
245
+     * Checks if a child exists.
246
+     *
247
+     * @param string $name
248
+     * @return bool
249
+     */
250
+    public function childExists($name) {
251
+        // note: here we do NOT resolve the chunk file name to the real file name
252
+        // to make sure we return false when checking for file existence with a chunk
253
+        // file name.
254
+        // This is to make sure that "createFile" is still triggered
255
+        // (required old code) instead of "updateFile".
256
+        //
257
+        // TODO: resolve chunk file name here and implement "updateFile"
258
+        $path = $this->path . '/' . $name;
259
+        return $this->fileView->file_exists($path);
260 260
 
261
-	}
261
+    }
262 262
 
263
-	/**
264
-	 * Deletes all files in this directory, and then itself
265
-	 *
266
-	 * @return void
267
-	 * @throws FileLocked
268
-	 * @throws \Sabre\DAV\Exception\Forbidden
269
-	 */
270
-	public function delete() {
263
+    /**
264
+     * Deletes all files in this directory, and then itself
265
+     *
266
+     * @return void
267
+     * @throws FileLocked
268
+     * @throws \Sabre\DAV\Exception\Forbidden
269
+     */
270
+    public function delete() {
271 271
 
272
-		if ($this->path === '' || $this->path === '/' || !$this->info->isDeletable()) {
273
-			throw new \Sabre\DAV\Exception\Forbidden();
274
-		}
272
+        if ($this->path === '' || $this->path === '/' || !$this->info->isDeletable()) {
273
+            throw new \Sabre\DAV\Exception\Forbidden();
274
+        }
275 275
 
276
-		try {
277
-			if (!$this->fileView->rmdir($this->path)) {
278
-				// assume it wasn't possible to remove due to permission issue
279
-				throw new \Sabre\DAV\Exception\Forbidden();
280
-			}
281
-		} catch (ForbiddenException $ex) {
282
-			throw new Forbidden($ex->getMessage(), $ex->getRetry());
283
-		} catch (LockedException $e) {
284
-			throw new FileLocked($e->getMessage(), $e->getCode(), $e);
285
-		}
286
-	}
276
+        try {
277
+            if (!$this->fileView->rmdir($this->path)) {
278
+                // assume it wasn't possible to remove due to permission issue
279
+                throw new \Sabre\DAV\Exception\Forbidden();
280
+            }
281
+        } catch (ForbiddenException $ex) {
282
+            throw new Forbidden($ex->getMessage(), $ex->getRetry());
283
+        } catch (LockedException $e) {
284
+            throw new FileLocked($e->getMessage(), $e->getCode(), $e);
285
+        }
286
+    }
287 287
 
288
-	/**
289
-	 * Returns available diskspace information
290
-	 *
291
-	 * @return array
292
-	 */
293
-	public function getQuotaInfo() {
294
-		if ($this->quotaInfo) {
295
-			return $this->quotaInfo;
296
-		}
297
-		try {
298
-			$storageInfo = \OC_Helper::getStorageInfo($this->info->getPath(), $this->info);
299
-			if ($storageInfo['quota'] === \OCP\Files\FileInfo::SPACE_UNLIMITED) {
300
-				$free = \OCP\Files\FileInfo::SPACE_UNLIMITED;
301
-			} else {
302
-				$free = $storageInfo['free'];
303
-			}
304
-			$this->quotaInfo = array(
305
-				$storageInfo['used'],
306
-				$free
307
-			);
308
-			return $this->quotaInfo;
309
-		} catch (\OCP\Files\StorageNotAvailableException $e) {
310
-			return array(0, 0);
311
-		}
312
-	}
288
+    /**
289
+     * Returns available diskspace information
290
+     *
291
+     * @return array
292
+     */
293
+    public function getQuotaInfo() {
294
+        if ($this->quotaInfo) {
295
+            return $this->quotaInfo;
296
+        }
297
+        try {
298
+            $storageInfo = \OC_Helper::getStorageInfo($this->info->getPath(), $this->info);
299
+            if ($storageInfo['quota'] === \OCP\Files\FileInfo::SPACE_UNLIMITED) {
300
+                $free = \OCP\Files\FileInfo::SPACE_UNLIMITED;
301
+            } else {
302
+                $free = $storageInfo['free'];
303
+            }
304
+            $this->quotaInfo = array(
305
+                $storageInfo['used'],
306
+                $free
307
+            );
308
+            return $this->quotaInfo;
309
+        } catch (\OCP\Files\StorageNotAvailableException $e) {
310
+            return array(0, 0);
311
+        }
312
+    }
313 313
 
314 314
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/BlockLegacyClientPlugin.php 1 patch
Indentation   +38 added lines, -38 removed lines patch added patch discarded remove patch
@@ -35,47 +35,47 @@
 block discarded – undo
35 35
  * @package OCA\DAV\Connector\Sabre
36 36
  */
37 37
 class BlockLegacyClientPlugin extends ServerPlugin {
38
-	/** @var \Sabre\DAV\Server */
39
-	protected $server;
40
-	/** @var IConfig */
41
-	protected $config;
38
+    /** @var \Sabre\DAV\Server */
39
+    protected $server;
40
+    /** @var IConfig */
41
+    protected $config;
42 42
 
43
-	/**
44
-	 * @param IConfig $config
45
-	 */
46
-	public function __construct(IConfig $config) {
47
-		$this->config = $config;
48
-	}
43
+    /**
44
+     * @param IConfig $config
45
+     */
46
+    public function __construct(IConfig $config) {
47
+        $this->config = $config;
48
+    }
49 49
 
50
-	/**
51
-	 * @param \Sabre\DAV\Server $server
52
-	 * @return void
53
-	 */
54
-	public function initialize(\Sabre\DAV\Server $server) {
55
-		$this->server = $server;
56
-		$this->server->on('beforeMethod', [$this, 'beforeHandler'], 200);
57
-	}
50
+    /**
51
+     * @param \Sabre\DAV\Server $server
52
+     * @return void
53
+     */
54
+    public function initialize(\Sabre\DAV\Server $server) {
55
+        $this->server = $server;
56
+        $this->server->on('beforeMethod', [$this, 'beforeHandler'], 200);
57
+    }
58 58
 
59
-	/**
60
-	 * Detects all unsupported clients and throws a \Sabre\DAV\Exception\Forbidden
61
-	 * exception which will result in a 403 to them.
62
-	 * @param RequestInterface $request
63
-	 * @throws \Sabre\DAV\Exception\Forbidden If the client version is not supported
64
-	 */
65
-	public function beforeHandler(RequestInterface $request) {
66
-		$userAgent = $request->getHeader('User-Agent');
67
-		if($userAgent === null) {
68
-			return;
69
-		}
59
+    /**
60
+     * Detects all unsupported clients and throws a \Sabre\DAV\Exception\Forbidden
61
+     * exception which will result in a 403 to them.
62
+     * @param RequestInterface $request
63
+     * @throws \Sabre\DAV\Exception\Forbidden If the client version is not supported
64
+     */
65
+    public function beforeHandler(RequestInterface $request) {
66
+        $userAgent = $request->getHeader('User-Agent');
67
+        if($userAgent === null) {
68
+            return;
69
+        }
70 70
 
71
-		$minimumSupportedDesktopVersion = $this->config->getSystemValue('minimum.supported.desktop.version', '2.0.0');
71
+        $minimumSupportedDesktopVersion = $this->config->getSystemValue('minimum.supported.desktop.version', '2.0.0');
72 72
 
73
-		// Match on the mirall version which is in scheme "Mozilla/5.0 (%1) mirall/%2" or
74
-		// "mirall/%1" for older releases
75
-		preg_match("/(?:mirall\\/)([\d.]+)/i", $userAgent, $versionMatches);
76
-		if(isset($versionMatches[1]) &&
77
-			version_compare($versionMatches[1], $minimumSupportedDesktopVersion) === -1) {
78
-			throw new \Sabre\DAV\Exception\Forbidden('Unsupported client version.');
79
-		}
80
-	}
73
+        // Match on the mirall version which is in scheme "Mozilla/5.0 (%1) mirall/%2" or
74
+        // "mirall/%1" for older releases
75
+        preg_match("/(?:mirall\\/)([\d.]+)/i", $userAgent, $versionMatches);
76
+        if(isset($versionMatches[1]) &&
77
+            version_compare($versionMatches[1], $minimumSupportedDesktopVersion) === -1) {
78
+            throw new \Sabre\DAV\Exception\Forbidden('Unsupported client version.');
79
+        }
80
+    }
81 81
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/CommentPropertiesPlugin.php 1 patch
Indentation   +98 added lines, -98 removed lines patch added patch discarded remove patch
@@ -29,103 +29,103 @@
 block discarded – undo
29 29
 
30 30
 class CommentPropertiesPlugin extends ServerPlugin {
31 31
 
32
-	const PROPERTY_NAME_HREF   = '{http://owncloud.org/ns}comments-href';
33
-	const PROPERTY_NAME_COUNT  = '{http://owncloud.org/ns}comments-count';
34
-	const PROPERTY_NAME_UNREAD = '{http://owncloud.org/ns}comments-unread';
35
-
36
-	/** @var  \Sabre\DAV\Server */
37
-	protected $server;
38
-
39
-	/** @var ICommentsManager */
40
-	private $commentsManager;
41
-
42
-	/** @var IUserSession */
43
-	private $userSession;
44
-
45
-	public function __construct(ICommentsManager $commentsManager, IUserSession $userSession) {
46
-		$this->commentsManager = $commentsManager;
47
-		$this->userSession = $userSession;
48
-	}
49
-
50
-	/**
51
-	 * This initializes the plugin.
52
-	 *
53
-	 * This function is called by Sabre\DAV\Server, after
54
-	 * addPlugin is called.
55
-	 *
56
-	 * This method should set up the required event subscriptions.
57
-	 *
58
-	 * @param \Sabre\DAV\Server $server
59
-	 * @return void
60
-	 */
61
-	function initialize(\Sabre\DAV\Server $server) {
62
-		$this->server = $server;
63
-		$this->server->on('propFind', array($this, 'handleGetProperties'));
64
-	}
65
-
66
-	/**
67
-	 * Adds tags and favorites properties to the response,
68
-	 * if requested.
69
-	 *
70
-	 * @param PropFind $propFind
71
-	 * @param \Sabre\DAV\INode $node
72
-	 * @return void
73
-	 */
74
-	public function handleGetProperties(
75
-		PropFind $propFind,
76
-		\Sabre\DAV\INode $node
77
-	) {
78
-		if (!($node instanceof File) && !($node instanceof Directory)) {
79
-			return;
80
-		}
81
-
82
-		$propFind->handle(self::PROPERTY_NAME_COUNT, function() use ($node) {
83
-			return $this->commentsManager->getNumberOfCommentsForObject('files', strval($node->getId()));
84
-		});
85
-
86
-		$propFind->handle(self::PROPERTY_NAME_HREF, function() use ($node) {
87
-			return $this->getCommentsLink($node);
88
-		});
89
-
90
-		$propFind->handle(self::PROPERTY_NAME_UNREAD, function() use ($node) {
91
-			return $this->getUnreadCount($node);
92
-		});
93
-	}
94
-
95
-	/**
96
-	 * returns a reference to the comments node
97
-	 *
98
-	 * @param Node $node
99
-	 * @return mixed|string
100
-	 */
101
-	public function getCommentsLink(Node $node) {
102
-		$href =  $this->server->getBaseUri();
103
-		$entryPoint = strpos($href, '/remote.php/');
104
-		if($entryPoint === false) {
105
-			// in case we end up somewhere else, unexpectedly.
106
-			return null;
107
-		}
108
-		$commentsPart = 'dav/comments/files/' . rawurldecode($node->getId());
109
-		$href = substr_replace($href, $commentsPart, $entryPoint + strlen('/remote.php/'));
110
-		return $href;
111
-	}
112
-
113
-	/**
114
-	 * returns the number of unread comments for the currently logged in user
115
-	 * on the given file or directory node
116
-	 *
117
-	 * @param Node $node
118
-	 * @return Int|null
119
-	 */
120
-	public function getUnreadCount(Node $node) {
121
-		$user = $this->userSession->getUser();
122
-		if(is_null($user)) {
123
-			return null;
124
-		}
125
-
126
-		$lastRead = $this->commentsManager->getReadMark('files', strval($node->getId()), $user);
127
-
128
-		return $this->commentsManager->getNumberOfCommentsForObject('files', strval($node->getId()), $lastRead);
129
-	}
32
+    const PROPERTY_NAME_HREF   = '{http://owncloud.org/ns}comments-href';
33
+    const PROPERTY_NAME_COUNT  = '{http://owncloud.org/ns}comments-count';
34
+    const PROPERTY_NAME_UNREAD = '{http://owncloud.org/ns}comments-unread';
35
+
36
+    /** @var  \Sabre\DAV\Server */
37
+    protected $server;
38
+
39
+    /** @var ICommentsManager */
40
+    private $commentsManager;
41
+
42
+    /** @var IUserSession */
43
+    private $userSession;
44
+
45
+    public function __construct(ICommentsManager $commentsManager, IUserSession $userSession) {
46
+        $this->commentsManager = $commentsManager;
47
+        $this->userSession = $userSession;
48
+    }
49
+
50
+    /**
51
+     * This initializes the plugin.
52
+     *
53
+     * This function is called by Sabre\DAV\Server, after
54
+     * addPlugin is called.
55
+     *
56
+     * This method should set up the required event subscriptions.
57
+     *
58
+     * @param \Sabre\DAV\Server $server
59
+     * @return void
60
+     */
61
+    function initialize(\Sabre\DAV\Server $server) {
62
+        $this->server = $server;
63
+        $this->server->on('propFind', array($this, 'handleGetProperties'));
64
+    }
65
+
66
+    /**
67
+     * Adds tags and favorites properties to the response,
68
+     * if requested.
69
+     *
70
+     * @param PropFind $propFind
71
+     * @param \Sabre\DAV\INode $node
72
+     * @return void
73
+     */
74
+    public function handleGetProperties(
75
+        PropFind $propFind,
76
+        \Sabre\DAV\INode $node
77
+    ) {
78
+        if (!($node instanceof File) && !($node instanceof Directory)) {
79
+            return;
80
+        }
81
+
82
+        $propFind->handle(self::PROPERTY_NAME_COUNT, function() use ($node) {
83
+            return $this->commentsManager->getNumberOfCommentsForObject('files', strval($node->getId()));
84
+        });
85
+
86
+        $propFind->handle(self::PROPERTY_NAME_HREF, function() use ($node) {
87
+            return $this->getCommentsLink($node);
88
+        });
89
+
90
+        $propFind->handle(self::PROPERTY_NAME_UNREAD, function() use ($node) {
91
+            return $this->getUnreadCount($node);
92
+        });
93
+    }
94
+
95
+    /**
96
+     * returns a reference to the comments node
97
+     *
98
+     * @param Node $node
99
+     * @return mixed|string
100
+     */
101
+    public function getCommentsLink(Node $node) {
102
+        $href =  $this->server->getBaseUri();
103
+        $entryPoint = strpos($href, '/remote.php/');
104
+        if($entryPoint === false) {
105
+            // in case we end up somewhere else, unexpectedly.
106
+            return null;
107
+        }
108
+        $commentsPart = 'dav/comments/files/' . rawurldecode($node->getId());
109
+        $href = substr_replace($href, $commentsPart, $entryPoint + strlen('/remote.php/'));
110
+        return $href;
111
+    }
112
+
113
+    /**
114
+     * returns the number of unread comments for the currently logged in user
115
+     * on the given file or directory node
116
+     *
117
+     * @param Node $node
118
+     * @return Int|null
119
+     */
120
+    public function getUnreadCount(Node $node) {
121
+        $user = $this->userSession->getUser();
122
+        if(is_null($user)) {
123
+            return null;
124
+        }
125
+
126
+        $lastRead = $this->commentsManager->getReadMark('files', strval($node->getId()), $user);
127
+
128
+        return $this->commentsManager->getNumberOfCommentsForObject('files', strval($node->getId()), $lastRead);
129
+    }
130 130
 
131 131
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/Server.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -34,12 +34,12 @@
 block discarded – undo
34 34
  */
35 35
 class Server extends \Sabre\DAV\Server {
36 36
 
37
-	/**
38
-	 * @see \Sabre\DAV\Server
39
-	 */
40
-	public function __construct($treeOrNode = null) {
41
-		parent::__construct($treeOrNode);
42
-		self::$exposeVersion = false;
43
-		$this->enablePropfindDepthInfinity = true;
44
-	}
37
+    /**
38
+     * @see \Sabre\DAV\Server
39
+     */
40
+    public function __construct($treeOrNode = null) {
41
+        parent::__construct($treeOrNode);
42
+        self::$exposeVersion = false;
43
+        $this->enablePropfindDepthInfinity = true;
44
+    }
45 45
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/ShareTypeList.php 1 patch
Indentation   +51 added lines, -51 removed lines patch added patch discarded remove patch
@@ -32,61 +32,61 @@
 block discarded – undo
32 32
  * This property contains multiple "share-type" elements, each containing a share type.
33 33
  */
34 34
 class ShareTypeList implements Element {
35
-	const NS_OWNCLOUD = 'http://owncloud.org/ns';
35
+    const NS_OWNCLOUD = 'http://owncloud.org/ns';
36 36
 
37
-	/**
38
-	 * Share types
39
-	 *
40
-	 * @var int[]
41
-	 */
42
-	private $shareTypes;
37
+    /**
38
+     * Share types
39
+     *
40
+     * @var int[]
41
+     */
42
+    private $shareTypes;
43 43
 
44
-	/**
45
-	 * @param int[] $shareTypes
46
-	 */
47
-	public function __construct($shareTypes) {
48
-		$this->shareTypes = $shareTypes;
49
-	}
44
+    /**
45
+     * @param int[] $shareTypes
46
+     */
47
+    public function __construct($shareTypes) {
48
+        $this->shareTypes = $shareTypes;
49
+    }
50 50
 
51
-	/**
52
-	 * Returns the share types
53
-	 *
54
-	 * @return int[]
55
-	 */
56
-	public function getShareTypes() {
57
-		return $this->shareTypes;
58
-	}
51
+    /**
52
+     * Returns the share types
53
+     *
54
+     * @return int[]
55
+     */
56
+    public function getShareTypes() {
57
+        return $this->shareTypes;
58
+    }
59 59
 
60
-	/**
61
-	 * The deserialize method is called during xml parsing.
62
-	 *
63
-	 * @param Reader $reader
64
-	 * @return mixed
65
-	 */
66
-	static function xmlDeserialize(Reader $reader) {
67
-		$shareTypes = [];
60
+    /**
61
+     * The deserialize method is called during xml parsing.
62
+     *
63
+     * @param Reader $reader
64
+     * @return mixed
65
+     */
66
+    static function xmlDeserialize(Reader $reader) {
67
+        $shareTypes = [];
68 68
 
69
-		$tree = $reader->parseInnerTree();
70
-		if ($tree === null) {
71
-			return null;
72
-		}
73
-		foreach ($tree as $elem) {
74
-			if ($elem['name'] === '{' . self::NS_OWNCLOUD . '}share-type') {
75
-				$shareTypes[] = (int)$elem['value'];
76
-			}
77
-		}
78
-		return new self($shareTypes);
79
-	}
69
+        $tree = $reader->parseInnerTree();
70
+        if ($tree === null) {
71
+            return null;
72
+        }
73
+        foreach ($tree as $elem) {
74
+            if ($elem['name'] === '{' . self::NS_OWNCLOUD . '}share-type') {
75
+                $shareTypes[] = (int)$elem['value'];
76
+            }
77
+        }
78
+        return new self($shareTypes);
79
+    }
80 80
 
81
-	/**
82
-	 * The xmlSerialize metod is called during xml writing.
83
-	 *
84
-	 * @param Writer $writer
85
-	 * @return void
86
-	 */
87
-	function xmlSerialize(Writer $writer) {
88
-		foreach ($this->shareTypes as $shareType) {
89
-			$writer->writeElement('{' . self::NS_OWNCLOUD . '}share-type', $shareType);
90
-		}
91
-	}
81
+    /**
82
+     * The xmlSerialize metod is called during xml writing.
83
+     *
84
+     * @param Writer $writer
85
+     * @return void
86
+     */
87
+    function xmlSerialize(Writer $writer) {
88
+        foreach ($this->shareTypes as $shareType) {
89
+            $writer->writeElement('{' . self::NS_OWNCLOUD . '}share-type', $shareType);
90
+        }
91
+    }
92 92
 }
Please login to merge, or discard this patch.