@@ -39,60 +39,60 @@ |
||
39 | 39 | */ |
40 | 40 | abstract class ApiController extends Controller { |
41 | 41 | |
42 | - private $corsMethods; |
|
43 | - private $corsAllowedHeaders; |
|
44 | - private $corsMaxAge; |
|
42 | + private $corsMethods; |
|
43 | + private $corsAllowedHeaders; |
|
44 | + private $corsMaxAge; |
|
45 | 45 | |
46 | - /** |
|
47 | - * constructor of the controller |
|
48 | - * @param string $appName the name of the app |
|
49 | - * @param IRequest $request an instance of the request |
|
50 | - * @param string $corsMethods comma separated string of HTTP verbs which |
|
51 | - * should be allowed for websites or webapps when calling your API, defaults to |
|
52 | - * 'PUT, POST, GET, DELETE, PATCH' |
|
53 | - * @param string $corsAllowedHeaders comma separated string of HTTP headers |
|
54 | - * which should be allowed for websites or webapps when calling your API, |
|
55 | - * defaults to 'Authorization, Content-Type, Accept' |
|
56 | - * @param int $corsMaxAge number in seconds how long a preflighted OPTIONS |
|
57 | - * request should be cached, defaults to 1728000 seconds |
|
58 | - * @since 7.0.0 |
|
59 | - */ |
|
60 | - public function __construct($appName, |
|
61 | - IRequest $request, |
|
62 | - $corsMethods='PUT, POST, GET, DELETE, PATCH', |
|
63 | - $corsAllowedHeaders='Authorization, Content-Type, Accept', |
|
64 | - $corsMaxAge=1728000){ |
|
65 | - parent::__construct($appName, $request); |
|
66 | - $this->corsMethods = $corsMethods; |
|
67 | - $this->corsAllowedHeaders = $corsAllowedHeaders; |
|
68 | - $this->corsMaxAge = $corsMaxAge; |
|
69 | - } |
|
46 | + /** |
|
47 | + * constructor of the controller |
|
48 | + * @param string $appName the name of the app |
|
49 | + * @param IRequest $request an instance of the request |
|
50 | + * @param string $corsMethods comma separated string of HTTP verbs which |
|
51 | + * should be allowed for websites or webapps when calling your API, defaults to |
|
52 | + * 'PUT, POST, GET, DELETE, PATCH' |
|
53 | + * @param string $corsAllowedHeaders comma separated string of HTTP headers |
|
54 | + * which should be allowed for websites or webapps when calling your API, |
|
55 | + * defaults to 'Authorization, Content-Type, Accept' |
|
56 | + * @param int $corsMaxAge number in seconds how long a preflighted OPTIONS |
|
57 | + * request should be cached, defaults to 1728000 seconds |
|
58 | + * @since 7.0.0 |
|
59 | + */ |
|
60 | + public function __construct($appName, |
|
61 | + IRequest $request, |
|
62 | + $corsMethods='PUT, POST, GET, DELETE, PATCH', |
|
63 | + $corsAllowedHeaders='Authorization, Content-Type, Accept', |
|
64 | + $corsMaxAge=1728000){ |
|
65 | + parent::__construct($appName, $request); |
|
66 | + $this->corsMethods = $corsMethods; |
|
67 | + $this->corsAllowedHeaders = $corsAllowedHeaders; |
|
68 | + $this->corsMaxAge = $corsMaxAge; |
|
69 | + } |
|
70 | 70 | |
71 | 71 | |
72 | - /** |
|
73 | - * This method implements a preflighted cors response for you that you can |
|
74 | - * link to for the options request |
|
75 | - * |
|
76 | - * @NoAdminRequired |
|
77 | - * @NoCSRFRequired |
|
78 | - * @PublicPage |
|
79 | - * @since 7.0.0 |
|
80 | - */ |
|
81 | - public function preflightedCors() { |
|
82 | - if(isset($this->request->server['HTTP_ORIGIN'])) { |
|
83 | - $origin = $this->request->server['HTTP_ORIGIN']; |
|
84 | - } else { |
|
85 | - $origin = '*'; |
|
86 | - } |
|
72 | + /** |
|
73 | + * This method implements a preflighted cors response for you that you can |
|
74 | + * link to for the options request |
|
75 | + * |
|
76 | + * @NoAdminRequired |
|
77 | + * @NoCSRFRequired |
|
78 | + * @PublicPage |
|
79 | + * @since 7.0.0 |
|
80 | + */ |
|
81 | + public function preflightedCors() { |
|
82 | + if(isset($this->request->server['HTTP_ORIGIN'])) { |
|
83 | + $origin = $this->request->server['HTTP_ORIGIN']; |
|
84 | + } else { |
|
85 | + $origin = '*'; |
|
86 | + } |
|
87 | 87 | |
88 | - $response = new Response(); |
|
89 | - $response->addHeader('Access-Control-Allow-Origin', $origin); |
|
90 | - $response->addHeader('Access-Control-Allow-Methods', $this->corsMethods); |
|
91 | - $response->addHeader('Access-Control-Max-Age', (string)$this->corsMaxAge); |
|
92 | - $response->addHeader('Access-Control-Allow-Headers', $this->corsAllowedHeaders); |
|
93 | - $response->addHeader('Access-Control-Allow-Credentials', 'false'); |
|
94 | - return $response; |
|
95 | - } |
|
88 | + $response = new Response(); |
|
89 | + $response->addHeader('Access-Control-Allow-Origin', $origin); |
|
90 | + $response->addHeader('Access-Control-Allow-Methods', $this->corsMethods); |
|
91 | + $response->addHeader('Access-Control-Max-Age', (string)$this->corsMaxAge); |
|
92 | + $response->addHeader('Access-Control-Allow-Headers', $this->corsAllowedHeaders); |
|
93 | + $response->addHeader('Access-Control-Allow-Credentials', 'false'); |
|
94 | + return $response; |
|
95 | + } |
|
96 | 96 | |
97 | 97 | |
98 | 98 | } |
@@ -59,9 +59,9 @@ discard block |
||
59 | 59 | */ |
60 | 60 | public function __construct($appName, |
61 | 61 | IRequest $request, |
62 | - $corsMethods='PUT, POST, GET, DELETE, PATCH', |
|
63 | - $corsAllowedHeaders='Authorization, Content-Type, Accept', |
|
64 | - $corsMaxAge=1728000){ |
|
62 | + $corsMethods = 'PUT, POST, GET, DELETE, PATCH', |
|
63 | + $corsAllowedHeaders = 'Authorization, Content-Type, Accept', |
|
64 | + $corsMaxAge = 1728000) { |
|
65 | 65 | parent::__construct($appName, $request); |
66 | 66 | $this->corsMethods = $corsMethods; |
67 | 67 | $this->corsAllowedHeaders = $corsAllowedHeaders; |
@@ -79,7 +79,7 @@ discard block |
||
79 | 79 | * @since 7.0.0 |
80 | 80 | */ |
81 | 81 | public function preflightedCors() { |
82 | - if(isset($this->request->server['HTTP_ORIGIN'])) { |
|
82 | + if (isset($this->request->server['HTTP_ORIGIN'])) { |
|
83 | 83 | $origin = $this->request->server['HTTP_ORIGIN']; |
84 | 84 | } else { |
85 | 85 | $origin = '*'; |
@@ -88,7 +88,7 @@ discard block |
||
88 | 88 | $response = new Response(); |
89 | 89 | $response->addHeader('Access-Control-Allow-Origin', $origin); |
90 | 90 | $response->addHeader('Access-Control-Allow-Methods', $this->corsMethods); |
91 | - $response->addHeader('Access-Control-Max-Age', (string)$this->corsMaxAge); |
|
91 | + $response->addHeader('Access-Control-Max-Age', (string) $this->corsMaxAge); |
|
92 | 92 | $response->addHeader('Access-Control-Allow-Headers', $this->corsAllowedHeaders); |
93 | 93 | $response->addHeader('Access-Control-Allow-Credentials', 'false'); |
94 | 94 | return $response; |
@@ -34,59 +34,59 @@ |
||
34 | 34 | */ |
35 | 35 | class DataDisplayResponse extends Response { |
36 | 36 | |
37 | - /** |
|
38 | - * response data |
|
39 | - * @var string |
|
40 | - */ |
|
41 | - protected $data; |
|
37 | + /** |
|
38 | + * response data |
|
39 | + * @var string |
|
40 | + */ |
|
41 | + protected $data; |
|
42 | 42 | |
43 | 43 | |
44 | - /** |
|
45 | - * @param string $data the data to display |
|
46 | - * @param int $statusCode the Http status code, defaults to 200 |
|
47 | - * @param array $headers additional key value based headers |
|
48 | - * @since 8.1.0 |
|
49 | - */ |
|
50 | - public function __construct($data='', $statusCode=Http::STATUS_OK, |
|
51 | - $headers=[]) { |
|
52 | - parent::__construct(); |
|
44 | + /** |
|
45 | + * @param string $data the data to display |
|
46 | + * @param int $statusCode the Http status code, defaults to 200 |
|
47 | + * @param array $headers additional key value based headers |
|
48 | + * @since 8.1.0 |
|
49 | + */ |
|
50 | + public function __construct($data='', $statusCode=Http::STATUS_OK, |
|
51 | + $headers=[]) { |
|
52 | + parent::__construct(); |
|
53 | 53 | |
54 | - $this->data = $data; |
|
55 | - $this->setStatus($statusCode); |
|
56 | - $this->setHeaders(array_merge($this->getHeaders(), $headers)); |
|
57 | - $this->addHeader('Content-Disposition', 'inline; filename=""'); |
|
58 | - } |
|
54 | + $this->data = $data; |
|
55 | + $this->setStatus($statusCode); |
|
56 | + $this->setHeaders(array_merge($this->getHeaders(), $headers)); |
|
57 | + $this->addHeader('Content-Disposition', 'inline; filename=""'); |
|
58 | + } |
|
59 | 59 | |
60 | - /** |
|
61 | - * Outputs data. No processing is done. |
|
62 | - * @return string |
|
63 | - * @since 8.1.0 |
|
64 | - */ |
|
65 | - public function render() { |
|
66 | - return $this->data; |
|
67 | - } |
|
60 | + /** |
|
61 | + * Outputs data. No processing is done. |
|
62 | + * @return string |
|
63 | + * @since 8.1.0 |
|
64 | + */ |
|
65 | + public function render() { |
|
66 | + return $this->data; |
|
67 | + } |
|
68 | 68 | |
69 | 69 | |
70 | - /** |
|
71 | - * Sets values in the data |
|
72 | - * @param string $data the data to display |
|
73 | - * @return DataDisplayResponse Reference to this object |
|
74 | - * @since 8.1.0 |
|
75 | - */ |
|
76 | - public function setData($data){ |
|
77 | - $this->data = $data; |
|
70 | + /** |
|
71 | + * Sets values in the data |
|
72 | + * @param string $data the data to display |
|
73 | + * @return DataDisplayResponse Reference to this object |
|
74 | + * @since 8.1.0 |
|
75 | + */ |
|
76 | + public function setData($data){ |
|
77 | + $this->data = $data; |
|
78 | 78 | |
79 | - return $this; |
|
80 | - } |
|
79 | + return $this; |
|
80 | + } |
|
81 | 81 | |
82 | 82 | |
83 | - /** |
|
84 | - * Used to get the set parameters |
|
85 | - * @return string the data |
|
86 | - * @since 8.1.0 |
|
87 | - */ |
|
88 | - public function getData(){ |
|
89 | - return $this->data; |
|
90 | - } |
|
83 | + /** |
|
84 | + * Used to get the set parameters |
|
85 | + * @return string the data |
|
86 | + * @since 8.1.0 |
|
87 | + */ |
|
88 | + public function getData(){ |
|
89 | + return $this->data; |
|
90 | + } |
|
91 | 91 | |
92 | 92 | } |
@@ -47,8 +47,8 @@ discard block |
||
47 | 47 | * @param array $headers additional key value based headers |
48 | 48 | * @since 8.1.0 |
49 | 49 | */ |
50 | - public function __construct($data='', $statusCode=Http::STATUS_OK, |
|
51 | - $headers=[]) { |
|
50 | + public function __construct($data = '', $statusCode = Http::STATUS_OK, |
|
51 | + $headers = []) { |
|
52 | 52 | parent::__construct(); |
53 | 53 | |
54 | 54 | $this->data = $data; |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | * @return DataDisplayResponse Reference to this object |
74 | 74 | * @since 8.1.0 |
75 | 75 | */ |
76 | - public function setData($data){ |
|
76 | + public function setData($data) { |
|
77 | 77 | $this->data = $data; |
78 | 78 | |
79 | 79 | return $this; |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | * @return string the data |
86 | 86 | * @since 8.1.0 |
87 | 87 | */ |
88 | - public function getData(){ |
|
88 | + public function getData() { |
|
89 | 89 | return $this->data; |
90 | 90 | } |
91 | 91 |
@@ -40,132 +40,132 @@ |
||
40 | 40 | */ |
41 | 41 | class TemplateResponse extends Response { |
42 | 42 | |
43 | - const EVENT_LOAD_ADDITIONAL_SCRIPTS = self::class . '::loadAdditionalScripts'; |
|
44 | - const EVENT_LOAD_ADDITIONAL_SCRIPTS_LOGGEDIN = self::class . '::loadAdditionalScriptsLoggedIn'; |
|
45 | - |
|
46 | - /** |
|
47 | - * name of the template |
|
48 | - * @var string |
|
49 | - */ |
|
50 | - protected $templateName; |
|
51 | - |
|
52 | - /** |
|
53 | - * parameters |
|
54 | - * @var array |
|
55 | - */ |
|
56 | - protected $params; |
|
57 | - |
|
58 | - /** |
|
59 | - * rendering type (admin, user, blank) |
|
60 | - * @var string |
|
61 | - */ |
|
62 | - protected $renderAs; |
|
63 | - |
|
64 | - /** |
|
65 | - * app name |
|
66 | - * @var string |
|
67 | - */ |
|
68 | - protected $appName; |
|
69 | - |
|
70 | - /** |
|
71 | - * constructor of TemplateResponse |
|
72 | - * @param string $appName the name of the app to load the template from |
|
73 | - * @param string $templateName the name of the template |
|
74 | - * @param array $params an array of parameters which should be passed to the |
|
75 | - * template |
|
76 | - * @param string $renderAs how the page should be rendered, defaults to user |
|
77 | - * @since 6.0.0 - parameters $params and $renderAs were added in 7.0.0 |
|
78 | - */ |
|
79 | - public function __construct($appName, $templateName, array $params=[], |
|
80 | - $renderAs='user') { |
|
81 | - parent::__construct(); |
|
82 | - |
|
83 | - $this->templateName = $templateName; |
|
84 | - $this->appName = $appName; |
|
85 | - $this->params = $params; |
|
86 | - $this->renderAs = $renderAs; |
|
87 | - |
|
88 | - $this->setContentSecurityPolicy(new ContentSecurityPolicy()); |
|
89 | - $this->setFeaturePolicy(new FeaturePolicy()); |
|
90 | - } |
|
91 | - |
|
92 | - |
|
93 | - /** |
|
94 | - * Sets template parameters |
|
95 | - * @param array $params an array with key => value structure which sets template |
|
96 | - * variables |
|
97 | - * @return TemplateResponse Reference to this object |
|
98 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
99 | - */ |
|
100 | - public function setParams(array $params){ |
|
101 | - $this->params = $params; |
|
102 | - |
|
103 | - return $this; |
|
104 | - } |
|
105 | - |
|
106 | - |
|
107 | - /** |
|
108 | - * Used for accessing the set parameters |
|
109 | - * @return array the params |
|
110 | - * @since 6.0.0 |
|
111 | - */ |
|
112 | - public function getParams(){ |
|
113 | - return $this->params; |
|
114 | - } |
|
115 | - |
|
116 | - |
|
117 | - /** |
|
118 | - * Used for accessing the name of the set template |
|
119 | - * @return string the name of the used template |
|
120 | - * @since 6.0.0 |
|
121 | - */ |
|
122 | - public function getTemplateName(){ |
|
123 | - return $this->templateName; |
|
124 | - } |
|
125 | - |
|
126 | - |
|
127 | - /** |
|
128 | - * Sets the template page |
|
129 | - * @param string $renderAs admin, user or blank. Admin also prints the admin |
|
130 | - * settings header and footer, user renders the normal |
|
131 | - * normal page including footer and header and blank |
|
132 | - * just renders the plain template |
|
133 | - * @return TemplateResponse Reference to this object |
|
134 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
135 | - */ |
|
136 | - public function renderAs($renderAs){ |
|
137 | - $this->renderAs = $renderAs; |
|
138 | - |
|
139 | - return $this; |
|
140 | - } |
|
141 | - |
|
142 | - |
|
143 | - /** |
|
144 | - * Returns the set renderAs |
|
145 | - * @return string the renderAs value |
|
146 | - * @since 6.0.0 |
|
147 | - */ |
|
148 | - public function getRenderAs(){ |
|
149 | - return $this->renderAs; |
|
150 | - } |
|
151 | - |
|
152 | - |
|
153 | - /** |
|
154 | - * Returns the rendered html |
|
155 | - * @return string the rendered html |
|
156 | - * @since 6.0.0 |
|
157 | - */ |
|
158 | - public function render(){ |
|
159 | - // \OCP\Template needs an empty string instead of 'blank' for an unwrapped response |
|
160 | - $renderAs = $this->renderAs === 'blank' ? '' : $this->renderAs; |
|
161 | - |
|
162 | - $template = new \OCP\Template($this->appName, $this->templateName, $renderAs); |
|
163 | - |
|
164 | - foreach($this->params as $key => $value){ |
|
165 | - $template->assign($key, $value); |
|
166 | - } |
|
167 | - |
|
168 | - return $template->fetchPage($this->params); |
|
169 | - } |
|
43 | + const EVENT_LOAD_ADDITIONAL_SCRIPTS = self::class . '::loadAdditionalScripts'; |
|
44 | + const EVENT_LOAD_ADDITIONAL_SCRIPTS_LOGGEDIN = self::class . '::loadAdditionalScriptsLoggedIn'; |
|
45 | + |
|
46 | + /** |
|
47 | + * name of the template |
|
48 | + * @var string |
|
49 | + */ |
|
50 | + protected $templateName; |
|
51 | + |
|
52 | + /** |
|
53 | + * parameters |
|
54 | + * @var array |
|
55 | + */ |
|
56 | + protected $params; |
|
57 | + |
|
58 | + /** |
|
59 | + * rendering type (admin, user, blank) |
|
60 | + * @var string |
|
61 | + */ |
|
62 | + protected $renderAs; |
|
63 | + |
|
64 | + /** |
|
65 | + * app name |
|
66 | + * @var string |
|
67 | + */ |
|
68 | + protected $appName; |
|
69 | + |
|
70 | + /** |
|
71 | + * constructor of TemplateResponse |
|
72 | + * @param string $appName the name of the app to load the template from |
|
73 | + * @param string $templateName the name of the template |
|
74 | + * @param array $params an array of parameters which should be passed to the |
|
75 | + * template |
|
76 | + * @param string $renderAs how the page should be rendered, defaults to user |
|
77 | + * @since 6.0.0 - parameters $params and $renderAs were added in 7.0.0 |
|
78 | + */ |
|
79 | + public function __construct($appName, $templateName, array $params=[], |
|
80 | + $renderAs='user') { |
|
81 | + parent::__construct(); |
|
82 | + |
|
83 | + $this->templateName = $templateName; |
|
84 | + $this->appName = $appName; |
|
85 | + $this->params = $params; |
|
86 | + $this->renderAs = $renderAs; |
|
87 | + |
|
88 | + $this->setContentSecurityPolicy(new ContentSecurityPolicy()); |
|
89 | + $this->setFeaturePolicy(new FeaturePolicy()); |
|
90 | + } |
|
91 | + |
|
92 | + |
|
93 | + /** |
|
94 | + * Sets template parameters |
|
95 | + * @param array $params an array with key => value structure which sets template |
|
96 | + * variables |
|
97 | + * @return TemplateResponse Reference to this object |
|
98 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
99 | + */ |
|
100 | + public function setParams(array $params){ |
|
101 | + $this->params = $params; |
|
102 | + |
|
103 | + return $this; |
|
104 | + } |
|
105 | + |
|
106 | + |
|
107 | + /** |
|
108 | + * Used for accessing the set parameters |
|
109 | + * @return array the params |
|
110 | + * @since 6.0.0 |
|
111 | + */ |
|
112 | + public function getParams(){ |
|
113 | + return $this->params; |
|
114 | + } |
|
115 | + |
|
116 | + |
|
117 | + /** |
|
118 | + * Used for accessing the name of the set template |
|
119 | + * @return string the name of the used template |
|
120 | + * @since 6.0.0 |
|
121 | + */ |
|
122 | + public function getTemplateName(){ |
|
123 | + return $this->templateName; |
|
124 | + } |
|
125 | + |
|
126 | + |
|
127 | + /** |
|
128 | + * Sets the template page |
|
129 | + * @param string $renderAs admin, user or blank. Admin also prints the admin |
|
130 | + * settings header and footer, user renders the normal |
|
131 | + * normal page including footer and header and blank |
|
132 | + * just renders the plain template |
|
133 | + * @return TemplateResponse Reference to this object |
|
134 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
135 | + */ |
|
136 | + public function renderAs($renderAs){ |
|
137 | + $this->renderAs = $renderAs; |
|
138 | + |
|
139 | + return $this; |
|
140 | + } |
|
141 | + |
|
142 | + |
|
143 | + /** |
|
144 | + * Returns the set renderAs |
|
145 | + * @return string the renderAs value |
|
146 | + * @since 6.0.0 |
|
147 | + */ |
|
148 | + public function getRenderAs(){ |
|
149 | + return $this->renderAs; |
|
150 | + } |
|
151 | + |
|
152 | + |
|
153 | + /** |
|
154 | + * Returns the rendered html |
|
155 | + * @return string the rendered html |
|
156 | + * @since 6.0.0 |
|
157 | + */ |
|
158 | + public function render(){ |
|
159 | + // \OCP\Template needs an empty string instead of 'blank' for an unwrapped response |
|
160 | + $renderAs = $this->renderAs === 'blank' ? '' : $this->renderAs; |
|
161 | + |
|
162 | + $template = new \OCP\Template($this->appName, $this->templateName, $renderAs); |
|
163 | + |
|
164 | + foreach($this->params as $key => $value){ |
|
165 | + $template->assign($key, $value); |
|
166 | + } |
|
167 | + |
|
168 | + return $template->fetchPage($this->params); |
|
169 | + } |
|
170 | 170 | |
171 | 171 | } |
@@ -40,8 +40,8 @@ discard block |
||
40 | 40 | */ |
41 | 41 | class TemplateResponse extends Response { |
42 | 42 | |
43 | - const EVENT_LOAD_ADDITIONAL_SCRIPTS = self::class . '::loadAdditionalScripts'; |
|
44 | - const EVENT_LOAD_ADDITIONAL_SCRIPTS_LOGGEDIN = self::class . '::loadAdditionalScriptsLoggedIn'; |
|
43 | + const EVENT_LOAD_ADDITIONAL_SCRIPTS = self::class.'::loadAdditionalScripts'; |
|
44 | + const EVENT_LOAD_ADDITIONAL_SCRIPTS_LOGGEDIN = self::class.'::loadAdditionalScriptsLoggedIn'; |
|
45 | 45 | |
46 | 46 | /** |
47 | 47 | * name of the template |
@@ -76,8 +76,8 @@ discard block |
||
76 | 76 | * @param string $renderAs how the page should be rendered, defaults to user |
77 | 77 | * @since 6.0.0 - parameters $params and $renderAs were added in 7.0.0 |
78 | 78 | */ |
79 | - public function __construct($appName, $templateName, array $params=[], |
|
80 | - $renderAs='user') { |
|
79 | + public function __construct($appName, $templateName, array $params = [], |
|
80 | + $renderAs = 'user') { |
|
81 | 81 | parent::__construct(); |
82 | 82 | |
83 | 83 | $this->templateName = $templateName; |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | * @return TemplateResponse Reference to this object |
98 | 98 | * @since 6.0.0 - return value was added in 7.0.0 |
99 | 99 | */ |
100 | - public function setParams(array $params){ |
|
100 | + public function setParams(array $params) { |
|
101 | 101 | $this->params = $params; |
102 | 102 | |
103 | 103 | return $this; |
@@ -109,7 +109,7 @@ discard block |
||
109 | 109 | * @return array the params |
110 | 110 | * @since 6.0.0 |
111 | 111 | */ |
112 | - public function getParams(){ |
|
112 | + public function getParams() { |
|
113 | 113 | return $this->params; |
114 | 114 | } |
115 | 115 | |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | * @return string the name of the used template |
120 | 120 | * @since 6.0.0 |
121 | 121 | */ |
122 | - public function getTemplateName(){ |
|
122 | + public function getTemplateName() { |
|
123 | 123 | return $this->templateName; |
124 | 124 | } |
125 | 125 | |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | * @return TemplateResponse Reference to this object |
134 | 134 | * @since 6.0.0 - return value was added in 7.0.0 |
135 | 135 | */ |
136 | - public function renderAs($renderAs){ |
|
136 | + public function renderAs($renderAs) { |
|
137 | 137 | $this->renderAs = $renderAs; |
138 | 138 | |
139 | 139 | return $this; |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | * @return string the renderAs value |
146 | 146 | * @since 6.0.0 |
147 | 147 | */ |
148 | - public function getRenderAs(){ |
|
148 | + public function getRenderAs() { |
|
149 | 149 | return $this->renderAs; |
150 | 150 | } |
151 | 151 | |
@@ -155,13 +155,13 @@ discard block |
||
155 | 155 | * @return string the rendered html |
156 | 156 | * @since 6.0.0 |
157 | 157 | */ |
158 | - public function render(){ |
|
158 | + public function render() { |
|
159 | 159 | // \OCP\Template needs an empty string instead of 'blank' for an unwrapped response |
160 | 160 | $renderAs = $this->renderAs === 'blank' ? '' : $this->renderAs; |
161 | 161 | |
162 | 162 | $template = new \OCP\Template($this->appName, $this->templateName, $renderAs); |
163 | 163 | |
164 | - foreach($this->params as $key => $value){ |
|
164 | + foreach ($this->params as $key => $value) { |
|
165 | 165 | $template->assign($key, $value); |
166 | 166 | } |
167 | 167 |
@@ -45,359 +45,359 @@ |
||
45 | 45 | */ |
46 | 46 | class Response { |
47 | 47 | |
48 | - /** |
|
49 | - * Headers - defaults to ['Cache-Control' => 'no-cache, no-store, must-revalidate'] |
|
50 | - * @var array |
|
51 | - */ |
|
52 | - private $headers = [ |
|
53 | - 'Cache-Control' => 'no-cache, no-store, must-revalidate' |
|
54 | - ]; |
|
55 | - |
|
56 | - |
|
57 | - /** |
|
58 | - * Cookies that will be need to be constructed as header |
|
59 | - * @var array |
|
60 | - */ |
|
61 | - private $cookies = []; |
|
62 | - |
|
63 | - |
|
64 | - /** |
|
65 | - * HTTP status code - defaults to STATUS OK |
|
66 | - * @var int |
|
67 | - */ |
|
68 | - private $status = Http::STATUS_OK; |
|
69 | - |
|
70 | - |
|
71 | - /** |
|
72 | - * Last modified date |
|
73 | - * @var \DateTime |
|
74 | - */ |
|
75 | - private $lastModified; |
|
76 | - |
|
77 | - |
|
78 | - /** |
|
79 | - * ETag |
|
80 | - * @var string |
|
81 | - */ |
|
82 | - private $ETag; |
|
83 | - |
|
84 | - /** @var ContentSecurityPolicy|null Used Content-Security-Policy */ |
|
85 | - private $contentSecurityPolicy = null; |
|
86 | - |
|
87 | - /** @var FeaturePolicy */ |
|
88 | - private $featurePolicy; |
|
89 | - |
|
90 | - /** @var bool */ |
|
91 | - private $throttled = false; |
|
92 | - /** @var array */ |
|
93 | - private $throttleMetadata = []; |
|
94 | - |
|
95 | - /** |
|
96 | - * @since 17.0.0 |
|
97 | - */ |
|
98 | - public function __construct() { |
|
99 | - } |
|
100 | - |
|
101 | - /** |
|
102 | - * Caches the response |
|
103 | - * @param int $cacheSeconds the amount of seconds that should be cached |
|
104 | - * if 0 then caching will be disabled |
|
105 | - * @return $this |
|
106 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
107 | - */ |
|
108 | - public function cacheFor(int $cacheSeconds) { |
|
109 | - if($cacheSeconds > 0) { |
|
110 | - $this->addHeader('Cache-Control', 'max-age=' . $cacheSeconds . ', must-revalidate'); |
|
111 | - |
|
112 | - // Old scool prama caching |
|
113 | - $this->addHeader('Pragma', 'public'); |
|
114 | - |
|
115 | - // Set expires header |
|
116 | - $expires = new \DateTime(); |
|
117 | - /** @var ITimeFactory $time */ |
|
118 | - $time = \OC::$server->query(ITimeFactory::class); |
|
119 | - $expires->setTimestamp($time->getTime()); |
|
120 | - $expires->add(new \DateInterval('PT'.$cacheSeconds.'S')); |
|
121 | - $this->addHeader('Expires', $expires->format(\DateTime::RFC2822)); |
|
122 | - } else { |
|
123 | - $this->addHeader('Cache-Control', 'no-cache, no-store, must-revalidate'); |
|
124 | - unset($this->headers['Expires'], $this->headers['Pragma']); |
|
125 | - } |
|
126 | - |
|
127 | - return $this; |
|
128 | - } |
|
129 | - |
|
130 | - /** |
|
131 | - * Adds a new cookie to the response |
|
132 | - * @param string $name The name of the cookie |
|
133 | - * @param string $value The value of the cookie |
|
134 | - * @param \DateTime|null $expireDate Date on that the cookie should expire, if set |
|
135 | - * to null cookie will be considered as session |
|
136 | - * cookie. |
|
137 | - * @return $this |
|
138 | - * @since 8.0.0 |
|
139 | - */ |
|
140 | - public function addCookie($name, $value, \DateTime $expireDate = null) { |
|
141 | - $this->cookies[$name] = ['value' => $value, 'expireDate' => $expireDate]; |
|
142 | - return $this; |
|
143 | - } |
|
144 | - |
|
145 | - |
|
146 | - /** |
|
147 | - * Set the specified cookies |
|
148 | - * @param array $cookies array('foo' => array('value' => 'bar', 'expire' => null)) |
|
149 | - * @return $this |
|
150 | - * @since 8.0.0 |
|
151 | - */ |
|
152 | - public function setCookies(array $cookies) { |
|
153 | - $this->cookies = $cookies; |
|
154 | - return $this; |
|
155 | - } |
|
156 | - |
|
157 | - |
|
158 | - /** |
|
159 | - * Invalidates the specified cookie |
|
160 | - * @param string $name |
|
161 | - * @return $this |
|
162 | - * @since 8.0.0 |
|
163 | - */ |
|
164 | - public function invalidateCookie($name) { |
|
165 | - $this->addCookie($name, 'expired', new \DateTime('1971-01-01 00:00')); |
|
166 | - return $this; |
|
167 | - } |
|
168 | - |
|
169 | - /** |
|
170 | - * Invalidates the specified cookies |
|
171 | - * @param array $cookieNames array('foo', 'bar') |
|
172 | - * @return $this |
|
173 | - * @since 8.0.0 |
|
174 | - */ |
|
175 | - public function invalidateCookies(array $cookieNames) { |
|
176 | - foreach($cookieNames as $cookieName) { |
|
177 | - $this->invalidateCookie($cookieName); |
|
178 | - } |
|
179 | - return $this; |
|
180 | - } |
|
181 | - |
|
182 | - /** |
|
183 | - * Returns the cookies |
|
184 | - * @return array |
|
185 | - * @since 8.0.0 |
|
186 | - */ |
|
187 | - public function getCookies() { |
|
188 | - return $this->cookies; |
|
189 | - } |
|
190 | - |
|
191 | - /** |
|
192 | - * Adds a new header to the response that will be called before the render |
|
193 | - * function |
|
194 | - * @param string $name The name of the HTTP header |
|
195 | - * @param string $value The value, null will delete it |
|
196 | - * @return $this |
|
197 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
198 | - */ |
|
199 | - public function addHeader($name, $value) { |
|
200 | - $name = trim($name); // always remove leading and trailing whitespace |
|
201 | - // to be able to reliably check for security |
|
202 | - // headers |
|
203 | - |
|
204 | - if(is_null($value)) { |
|
205 | - unset($this->headers[$name]); |
|
206 | - } else { |
|
207 | - $this->headers[$name] = $value; |
|
208 | - } |
|
209 | - |
|
210 | - return $this; |
|
211 | - } |
|
212 | - |
|
213 | - |
|
214 | - /** |
|
215 | - * Set the headers |
|
216 | - * @param array $headers value header pairs |
|
217 | - * @return $this |
|
218 | - * @since 8.0.0 |
|
219 | - */ |
|
220 | - public function setHeaders(array $headers) { |
|
221 | - $this->headers = $headers; |
|
222 | - |
|
223 | - return $this; |
|
224 | - } |
|
225 | - |
|
226 | - |
|
227 | - /** |
|
228 | - * Returns the set headers |
|
229 | - * @return array the headers |
|
230 | - * @since 6.0.0 |
|
231 | - */ |
|
232 | - public function getHeaders() { |
|
233 | - $mergeWith = []; |
|
234 | - |
|
235 | - if($this->lastModified) { |
|
236 | - $mergeWith['Last-Modified'] = |
|
237 | - $this->lastModified->format(\DateTime::RFC2822); |
|
238 | - } |
|
239 | - |
|
240 | - $this->headers['Content-Security-Policy'] = $this->getContentSecurityPolicy()->buildPolicy(); |
|
241 | - $this->headers['Feature-Policy'] = $this->getFeaturePolicy()->buildPolicy(); |
|
242 | - |
|
243 | - if($this->ETag) { |
|
244 | - $mergeWith['ETag'] = '"' . $this->ETag . '"'; |
|
245 | - } |
|
246 | - |
|
247 | - return array_merge($mergeWith, $this->headers); |
|
248 | - } |
|
249 | - |
|
250 | - |
|
251 | - /** |
|
252 | - * By default renders no output |
|
253 | - * @return string |
|
254 | - * @since 6.0.0 |
|
255 | - */ |
|
256 | - public function render() { |
|
257 | - return ''; |
|
258 | - } |
|
259 | - |
|
260 | - |
|
261 | - /** |
|
262 | - * Set response status |
|
263 | - * @param int $status a HTTP status code, see also the STATUS constants |
|
264 | - * @return Response Reference to this object |
|
265 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
266 | - */ |
|
267 | - public function setStatus($status) { |
|
268 | - $this->status = $status; |
|
269 | - |
|
270 | - return $this; |
|
271 | - } |
|
272 | - |
|
273 | - /** |
|
274 | - * Set a Content-Security-Policy |
|
275 | - * @param EmptyContentSecurityPolicy $csp Policy to set for the response object |
|
276 | - * @return $this |
|
277 | - * @since 8.1.0 |
|
278 | - */ |
|
279 | - public function setContentSecurityPolicy(EmptyContentSecurityPolicy $csp) { |
|
280 | - $this->contentSecurityPolicy = $csp; |
|
281 | - return $this; |
|
282 | - } |
|
283 | - |
|
284 | - /** |
|
285 | - * Get the currently used Content-Security-Policy |
|
286 | - * @return EmptyContentSecurityPolicy|null Used Content-Security-Policy or null if |
|
287 | - * none specified. |
|
288 | - * @since 8.1.0 |
|
289 | - */ |
|
290 | - public function getContentSecurityPolicy() { |
|
291 | - if ($this->contentSecurityPolicy === null) { |
|
292 | - $this->setContentSecurityPolicy(new EmptyContentSecurityPolicy()); |
|
293 | - } |
|
294 | - return $this->contentSecurityPolicy; |
|
295 | - } |
|
296 | - |
|
297 | - |
|
298 | - /** |
|
299 | - * @since 17.0.0 |
|
300 | - */ |
|
301 | - public function getFeaturePolicy(): EmptyFeaturePolicy { |
|
302 | - if ($this->featurePolicy === null) { |
|
303 | - $this->setFeaturePolicy(new EmptyFeaturePolicy()); |
|
304 | - } |
|
305 | - return $this->featurePolicy; |
|
306 | - } |
|
307 | - |
|
308 | - /** |
|
309 | - * @since 17.0.0 |
|
310 | - */ |
|
311 | - public function setFeaturePolicy(EmptyFeaturePolicy $featurePolicy): self { |
|
312 | - $this->featurePolicy = $featurePolicy; |
|
313 | - |
|
314 | - return $this; |
|
315 | - } |
|
316 | - |
|
317 | - |
|
318 | - |
|
319 | - /** |
|
320 | - * Get response status |
|
321 | - * @since 6.0.0 |
|
322 | - */ |
|
323 | - public function getStatus() { |
|
324 | - return $this->status; |
|
325 | - } |
|
326 | - |
|
327 | - |
|
328 | - /** |
|
329 | - * Get the ETag |
|
330 | - * @return string the etag |
|
331 | - * @since 6.0.0 |
|
332 | - */ |
|
333 | - public function getETag() { |
|
334 | - return $this->ETag; |
|
335 | - } |
|
336 | - |
|
337 | - |
|
338 | - /** |
|
339 | - * Get "last modified" date |
|
340 | - * @return \DateTime RFC2822 formatted last modified date |
|
341 | - * @since 6.0.0 |
|
342 | - */ |
|
343 | - public function getLastModified() { |
|
344 | - return $this->lastModified; |
|
345 | - } |
|
346 | - |
|
347 | - |
|
348 | - /** |
|
349 | - * Set the ETag |
|
350 | - * @param string $ETag |
|
351 | - * @return Response Reference to this object |
|
352 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
353 | - */ |
|
354 | - public function setETag($ETag) { |
|
355 | - $this->ETag = $ETag; |
|
356 | - |
|
357 | - return $this; |
|
358 | - } |
|
359 | - |
|
360 | - |
|
361 | - /** |
|
362 | - * Set "last modified" date |
|
363 | - * @param \DateTime $lastModified |
|
364 | - * @return Response Reference to this object |
|
365 | - * @since 6.0.0 - return value was added in 7.0.0 |
|
366 | - */ |
|
367 | - public function setLastModified($lastModified) { |
|
368 | - $this->lastModified = $lastModified; |
|
369 | - |
|
370 | - return $this; |
|
371 | - } |
|
372 | - |
|
373 | - /** |
|
374 | - * Marks the response as to throttle. Will be throttled when the |
|
375 | - * @BruteForceProtection annotation is added. |
|
376 | - * |
|
377 | - * @param array $metadata |
|
378 | - * @since 12.0.0 |
|
379 | - */ |
|
380 | - public function throttle(array $metadata = []) { |
|
381 | - $this->throttled = true; |
|
382 | - $this->throttleMetadata = $metadata; |
|
383 | - } |
|
384 | - |
|
385 | - /** |
|
386 | - * Returns the throttle metadata, defaults to empty array |
|
387 | - * |
|
388 | - * @return array |
|
389 | - * @since 13.0.0 |
|
390 | - */ |
|
391 | - public function getThrottleMetadata() { |
|
392 | - return $this->throttleMetadata; |
|
393 | - } |
|
394 | - |
|
395 | - /** |
|
396 | - * Whether the current response is throttled. |
|
397 | - * |
|
398 | - * @since 12.0.0 |
|
399 | - */ |
|
400 | - public function isThrottled() { |
|
401 | - return $this->throttled; |
|
402 | - } |
|
48 | + /** |
|
49 | + * Headers - defaults to ['Cache-Control' => 'no-cache, no-store, must-revalidate'] |
|
50 | + * @var array |
|
51 | + */ |
|
52 | + private $headers = [ |
|
53 | + 'Cache-Control' => 'no-cache, no-store, must-revalidate' |
|
54 | + ]; |
|
55 | + |
|
56 | + |
|
57 | + /** |
|
58 | + * Cookies that will be need to be constructed as header |
|
59 | + * @var array |
|
60 | + */ |
|
61 | + private $cookies = []; |
|
62 | + |
|
63 | + |
|
64 | + /** |
|
65 | + * HTTP status code - defaults to STATUS OK |
|
66 | + * @var int |
|
67 | + */ |
|
68 | + private $status = Http::STATUS_OK; |
|
69 | + |
|
70 | + |
|
71 | + /** |
|
72 | + * Last modified date |
|
73 | + * @var \DateTime |
|
74 | + */ |
|
75 | + private $lastModified; |
|
76 | + |
|
77 | + |
|
78 | + /** |
|
79 | + * ETag |
|
80 | + * @var string |
|
81 | + */ |
|
82 | + private $ETag; |
|
83 | + |
|
84 | + /** @var ContentSecurityPolicy|null Used Content-Security-Policy */ |
|
85 | + private $contentSecurityPolicy = null; |
|
86 | + |
|
87 | + /** @var FeaturePolicy */ |
|
88 | + private $featurePolicy; |
|
89 | + |
|
90 | + /** @var bool */ |
|
91 | + private $throttled = false; |
|
92 | + /** @var array */ |
|
93 | + private $throttleMetadata = []; |
|
94 | + |
|
95 | + /** |
|
96 | + * @since 17.0.0 |
|
97 | + */ |
|
98 | + public function __construct() { |
|
99 | + } |
|
100 | + |
|
101 | + /** |
|
102 | + * Caches the response |
|
103 | + * @param int $cacheSeconds the amount of seconds that should be cached |
|
104 | + * if 0 then caching will be disabled |
|
105 | + * @return $this |
|
106 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
107 | + */ |
|
108 | + public function cacheFor(int $cacheSeconds) { |
|
109 | + if($cacheSeconds > 0) { |
|
110 | + $this->addHeader('Cache-Control', 'max-age=' . $cacheSeconds . ', must-revalidate'); |
|
111 | + |
|
112 | + // Old scool prama caching |
|
113 | + $this->addHeader('Pragma', 'public'); |
|
114 | + |
|
115 | + // Set expires header |
|
116 | + $expires = new \DateTime(); |
|
117 | + /** @var ITimeFactory $time */ |
|
118 | + $time = \OC::$server->query(ITimeFactory::class); |
|
119 | + $expires->setTimestamp($time->getTime()); |
|
120 | + $expires->add(new \DateInterval('PT'.$cacheSeconds.'S')); |
|
121 | + $this->addHeader('Expires', $expires->format(\DateTime::RFC2822)); |
|
122 | + } else { |
|
123 | + $this->addHeader('Cache-Control', 'no-cache, no-store, must-revalidate'); |
|
124 | + unset($this->headers['Expires'], $this->headers['Pragma']); |
|
125 | + } |
|
126 | + |
|
127 | + return $this; |
|
128 | + } |
|
129 | + |
|
130 | + /** |
|
131 | + * Adds a new cookie to the response |
|
132 | + * @param string $name The name of the cookie |
|
133 | + * @param string $value The value of the cookie |
|
134 | + * @param \DateTime|null $expireDate Date on that the cookie should expire, if set |
|
135 | + * to null cookie will be considered as session |
|
136 | + * cookie. |
|
137 | + * @return $this |
|
138 | + * @since 8.0.0 |
|
139 | + */ |
|
140 | + public function addCookie($name, $value, \DateTime $expireDate = null) { |
|
141 | + $this->cookies[$name] = ['value' => $value, 'expireDate' => $expireDate]; |
|
142 | + return $this; |
|
143 | + } |
|
144 | + |
|
145 | + |
|
146 | + /** |
|
147 | + * Set the specified cookies |
|
148 | + * @param array $cookies array('foo' => array('value' => 'bar', 'expire' => null)) |
|
149 | + * @return $this |
|
150 | + * @since 8.0.0 |
|
151 | + */ |
|
152 | + public function setCookies(array $cookies) { |
|
153 | + $this->cookies = $cookies; |
|
154 | + return $this; |
|
155 | + } |
|
156 | + |
|
157 | + |
|
158 | + /** |
|
159 | + * Invalidates the specified cookie |
|
160 | + * @param string $name |
|
161 | + * @return $this |
|
162 | + * @since 8.0.0 |
|
163 | + */ |
|
164 | + public function invalidateCookie($name) { |
|
165 | + $this->addCookie($name, 'expired', new \DateTime('1971-01-01 00:00')); |
|
166 | + return $this; |
|
167 | + } |
|
168 | + |
|
169 | + /** |
|
170 | + * Invalidates the specified cookies |
|
171 | + * @param array $cookieNames array('foo', 'bar') |
|
172 | + * @return $this |
|
173 | + * @since 8.0.0 |
|
174 | + */ |
|
175 | + public function invalidateCookies(array $cookieNames) { |
|
176 | + foreach($cookieNames as $cookieName) { |
|
177 | + $this->invalidateCookie($cookieName); |
|
178 | + } |
|
179 | + return $this; |
|
180 | + } |
|
181 | + |
|
182 | + /** |
|
183 | + * Returns the cookies |
|
184 | + * @return array |
|
185 | + * @since 8.0.0 |
|
186 | + */ |
|
187 | + public function getCookies() { |
|
188 | + return $this->cookies; |
|
189 | + } |
|
190 | + |
|
191 | + /** |
|
192 | + * Adds a new header to the response that will be called before the render |
|
193 | + * function |
|
194 | + * @param string $name The name of the HTTP header |
|
195 | + * @param string $value The value, null will delete it |
|
196 | + * @return $this |
|
197 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
198 | + */ |
|
199 | + public function addHeader($name, $value) { |
|
200 | + $name = trim($name); // always remove leading and trailing whitespace |
|
201 | + // to be able to reliably check for security |
|
202 | + // headers |
|
203 | + |
|
204 | + if(is_null($value)) { |
|
205 | + unset($this->headers[$name]); |
|
206 | + } else { |
|
207 | + $this->headers[$name] = $value; |
|
208 | + } |
|
209 | + |
|
210 | + return $this; |
|
211 | + } |
|
212 | + |
|
213 | + |
|
214 | + /** |
|
215 | + * Set the headers |
|
216 | + * @param array $headers value header pairs |
|
217 | + * @return $this |
|
218 | + * @since 8.0.0 |
|
219 | + */ |
|
220 | + public function setHeaders(array $headers) { |
|
221 | + $this->headers = $headers; |
|
222 | + |
|
223 | + return $this; |
|
224 | + } |
|
225 | + |
|
226 | + |
|
227 | + /** |
|
228 | + * Returns the set headers |
|
229 | + * @return array the headers |
|
230 | + * @since 6.0.0 |
|
231 | + */ |
|
232 | + public function getHeaders() { |
|
233 | + $mergeWith = []; |
|
234 | + |
|
235 | + if($this->lastModified) { |
|
236 | + $mergeWith['Last-Modified'] = |
|
237 | + $this->lastModified->format(\DateTime::RFC2822); |
|
238 | + } |
|
239 | + |
|
240 | + $this->headers['Content-Security-Policy'] = $this->getContentSecurityPolicy()->buildPolicy(); |
|
241 | + $this->headers['Feature-Policy'] = $this->getFeaturePolicy()->buildPolicy(); |
|
242 | + |
|
243 | + if($this->ETag) { |
|
244 | + $mergeWith['ETag'] = '"' . $this->ETag . '"'; |
|
245 | + } |
|
246 | + |
|
247 | + return array_merge($mergeWith, $this->headers); |
|
248 | + } |
|
249 | + |
|
250 | + |
|
251 | + /** |
|
252 | + * By default renders no output |
|
253 | + * @return string |
|
254 | + * @since 6.0.0 |
|
255 | + */ |
|
256 | + public function render() { |
|
257 | + return ''; |
|
258 | + } |
|
259 | + |
|
260 | + |
|
261 | + /** |
|
262 | + * Set response status |
|
263 | + * @param int $status a HTTP status code, see also the STATUS constants |
|
264 | + * @return Response Reference to this object |
|
265 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
266 | + */ |
|
267 | + public function setStatus($status) { |
|
268 | + $this->status = $status; |
|
269 | + |
|
270 | + return $this; |
|
271 | + } |
|
272 | + |
|
273 | + /** |
|
274 | + * Set a Content-Security-Policy |
|
275 | + * @param EmptyContentSecurityPolicy $csp Policy to set for the response object |
|
276 | + * @return $this |
|
277 | + * @since 8.1.0 |
|
278 | + */ |
|
279 | + public function setContentSecurityPolicy(EmptyContentSecurityPolicy $csp) { |
|
280 | + $this->contentSecurityPolicy = $csp; |
|
281 | + return $this; |
|
282 | + } |
|
283 | + |
|
284 | + /** |
|
285 | + * Get the currently used Content-Security-Policy |
|
286 | + * @return EmptyContentSecurityPolicy|null Used Content-Security-Policy or null if |
|
287 | + * none specified. |
|
288 | + * @since 8.1.0 |
|
289 | + */ |
|
290 | + public function getContentSecurityPolicy() { |
|
291 | + if ($this->contentSecurityPolicy === null) { |
|
292 | + $this->setContentSecurityPolicy(new EmptyContentSecurityPolicy()); |
|
293 | + } |
|
294 | + return $this->contentSecurityPolicy; |
|
295 | + } |
|
296 | + |
|
297 | + |
|
298 | + /** |
|
299 | + * @since 17.0.0 |
|
300 | + */ |
|
301 | + public function getFeaturePolicy(): EmptyFeaturePolicy { |
|
302 | + if ($this->featurePolicy === null) { |
|
303 | + $this->setFeaturePolicy(new EmptyFeaturePolicy()); |
|
304 | + } |
|
305 | + return $this->featurePolicy; |
|
306 | + } |
|
307 | + |
|
308 | + /** |
|
309 | + * @since 17.0.0 |
|
310 | + */ |
|
311 | + public function setFeaturePolicy(EmptyFeaturePolicy $featurePolicy): self { |
|
312 | + $this->featurePolicy = $featurePolicy; |
|
313 | + |
|
314 | + return $this; |
|
315 | + } |
|
316 | + |
|
317 | + |
|
318 | + |
|
319 | + /** |
|
320 | + * Get response status |
|
321 | + * @since 6.0.0 |
|
322 | + */ |
|
323 | + public function getStatus() { |
|
324 | + return $this->status; |
|
325 | + } |
|
326 | + |
|
327 | + |
|
328 | + /** |
|
329 | + * Get the ETag |
|
330 | + * @return string the etag |
|
331 | + * @since 6.0.0 |
|
332 | + */ |
|
333 | + public function getETag() { |
|
334 | + return $this->ETag; |
|
335 | + } |
|
336 | + |
|
337 | + |
|
338 | + /** |
|
339 | + * Get "last modified" date |
|
340 | + * @return \DateTime RFC2822 formatted last modified date |
|
341 | + * @since 6.0.0 |
|
342 | + */ |
|
343 | + public function getLastModified() { |
|
344 | + return $this->lastModified; |
|
345 | + } |
|
346 | + |
|
347 | + |
|
348 | + /** |
|
349 | + * Set the ETag |
|
350 | + * @param string $ETag |
|
351 | + * @return Response Reference to this object |
|
352 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
353 | + */ |
|
354 | + public function setETag($ETag) { |
|
355 | + $this->ETag = $ETag; |
|
356 | + |
|
357 | + return $this; |
|
358 | + } |
|
359 | + |
|
360 | + |
|
361 | + /** |
|
362 | + * Set "last modified" date |
|
363 | + * @param \DateTime $lastModified |
|
364 | + * @return Response Reference to this object |
|
365 | + * @since 6.0.0 - return value was added in 7.0.0 |
|
366 | + */ |
|
367 | + public function setLastModified($lastModified) { |
|
368 | + $this->lastModified = $lastModified; |
|
369 | + |
|
370 | + return $this; |
|
371 | + } |
|
372 | + |
|
373 | + /** |
|
374 | + * Marks the response as to throttle. Will be throttled when the |
|
375 | + * @BruteForceProtection annotation is added. |
|
376 | + * |
|
377 | + * @param array $metadata |
|
378 | + * @since 12.0.0 |
|
379 | + */ |
|
380 | + public function throttle(array $metadata = []) { |
|
381 | + $this->throttled = true; |
|
382 | + $this->throttleMetadata = $metadata; |
|
383 | + } |
|
384 | + |
|
385 | + /** |
|
386 | + * Returns the throttle metadata, defaults to empty array |
|
387 | + * |
|
388 | + * @return array |
|
389 | + * @since 13.0.0 |
|
390 | + */ |
|
391 | + public function getThrottleMetadata() { |
|
392 | + return $this->throttleMetadata; |
|
393 | + } |
|
394 | + |
|
395 | + /** |
|
396 | + * Whether the current response is throttled. |
|
397 | + * |
|
398 | + * @since 12.0.0 |
|
399 | + */ |
|
400 | + public function isThrottled() { |
|
401 | + return $this->throttled; |
|
402 | + } |
|
403 | 403 | } |
@@ -106,8 +106,8 @@ discard block |
||
106 | 106 | * @since 6.0.0 - return value was added in 7.0.0 |
107 | 107 | */ |
108 | 108 | public function cacheFor(int $cacheSeconds) { |
109 | - if($cacheSeconds > 0) { |
|
110 | - $this->addHeader('Cache-Control', 'max-age=' . $cacheSeconds . ', must-revalidate'); |
|
109 | + if ($cacheSeconds > 0) { |
|
110 | + $this->addHeader('Cache-Control', 'max-age='.$cacheSeconds.', must-revalidate'); |
|
111 | 111 | |
112 | 112 | // Old scool prama caching |
113 | 113 | $this->addHeader('Pragma', 'public'); |
@@ -173,7 +173,7 @@ discard block |
||
173 | 173 | * @since 8.0.0 |
174 | 174 | */ |
175 | 175 | public function invalidateCookies(array $cookieNames) { |
176 | - foreach($cookieNames as $cookieName) { |
|
176 | + foreach ($cookieNames as $cookieName) { |
|
177 | 177 | $this->invalidateCookie($cookieName); |
178 | 178 | } |
179 | 179 | return $this; |
@@ -197,11 +197,11 @@ discard block |
||
197 | 197 | * @since 6.0.0 - return value was added in 7.0.0 |
198 | 198 | */ |
199 | 199 | public function addHeader($name, $value) { |
200 | - $name = trim($name); // always remove leading and trailing whitespace |
|
200 | + $name = trim($name); // always remove leading and trailing whitespace |
|
201 | 201 | // to be able to reliably check for security |
202 | 202 | // headers |
203 | 203 | |
204 | - if(is_null($value)) { |
|
204 | + if (is_null($value)) { |
|
205 | 205 | unset($this->headers[$name]); |
206 | 206 | } else { |
207 | 207 | $this->headers[$name] = $value; |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | public function getHeaders() { |
233 | 233 | $mergeWith = []; |
234 | 234 | |
235 | - if($this->lastModified) { |
|
235 | + if ($this->lastModified) { |
|
236 | 236 | $mergeWith['Last-Modified'] = |
237 | 237 | $this->lastModified->format(\DateTime::RFC2822); |
238 | 238 | } |
@@ -240,8 +240,8 @@ discard block |
||
240 | 240 | $this->headers['Content-Security-Policy'] = $this->getContentSecurityPolicy()->buildPolicy(); |
241 | 241 | $this->headers['Feature-Policy'] = $this->getFeaturePolicy()->buildPolicy(); |
242 | 242 | |
243 | - if($this->ETag) { |
|
244 | - $mergeWith['ETag'] = '"' . $this->ETag . '"'; |
|
243 | + if ($this->ETag) { |
|
244 | + $mergeWith['ETag'] = '"'.$this->ETag.'"'; |
|
245 | 245 | } |
246 | 246 | |
247 | 247 | return array_merge($mergeWith, $this->headers); |
@@ -39,50 +39,50 @@ |
||
39 | 39 | */ |
40 | 40 | class DataResponse extends Response { |
41 | 41 | |
42 | - /** |
|
43 | - * response data |
|
44 | - * @var array|object |
|
45 | - */ |
|
46 | - protected $data; |
|
42 | + /** |
|
43 | + * response data |
|
44 | + * @var array|object |
|
45 | + */ |
|
46 | + protected $data; |
|
47 | 47 | |
48 | 48 | |
49 | - /** |
|
50 | - * @param array|object $data the object or array that should be transformed |
|
51 | - * @param int $statusCode the Http status code, defaults to 200 |
|
52 | - * @param array $headers additional key value based headers |
|
53 | - * @since 8.0.0 |
|
54 | - */ |
|
55 | - public function __construct($data=[], $statusCode=Http::STATUS_OK, |
|
56 | - array $headers=[]) { |
|
57 | - parent::__construct(); |
|
49 | + /** |
|
50 | + * @param array|object $data the object or array that should be transformed |
|
51 | + * @param int $statusCode the Http status code, defaults to 200 |
|
52 | + * @param array $headers additional key value based headers |
|
53 | + * @since 8.0.0 |
|
54 | + */ |
|
55 | + public function __construct($data=[], $statusCode=Http::STATUS_OK, |
|
56 | + array $headers=[]) { |
|
57 | + parent::__construct(); |
|
58 | 58 | |
59 | - $this->data = $data; |
|
60 | - $this->setStatus($statusCode); |
|
61 | - $this->setHeaders(array_merge($this->getHeaders(), $headers)); |
|
62 | - } |
|
59 | + $this->data = $data; |
|
60 | + $this->setStatus($statusCode); |
|
61 | + $this->setHeaders(array_merge($this->getHeaders(), $headers)); |
|
62 | + } |
|
63 | 63 | |
64 | 64 | |
65 | - /** |
|
66 | - * Sets values in the data json array |
|
67 | - * @param array|object $data an array or object which will be transformed |
|
68 | - * @return DataResponse Reference to this object |
|
69 | - * @since 8.0.0 |
|
70 | - */ |
|
71 | - public function setData($data){ |
|
72 | - $this->data = $data; |
|
65 | + /** |
|
66 | + * Sets values in the data json array |
|
67 | + * @param array|object $data an array or object which will be transformed |
|
68 | + * @return DataResponse Reference to this object |
|
69 | + * @since 8.0.0 |
|
70 | + */ |
|
71 | + public function setData($data){ |
|
72 | + $this->data = $data; |
|
73 | 73 | |
74 | - return $this; |
|
75 | - } |
|
74 | + return $this; |
|
75 | + } |
|
76 | 76 | |
77 | 77 | |
78 | - /** |
|
79 | - * Used to get the set parameters |
|
80 | - * @return array the data |
|
81 | - * @since 8.0.0 |
|
82 | - */ |
|
83 | - public function getData(){ |
|
84 | - return $this->data; |
|
85 | - } |
|
78 | + /** |
|
79 | + * Used to get the set parameters |
|
80 | + * @return array the data |
|
81 | + * @since 8.0.0 |
|
82 | + */ |
|
83 | + public function getData(){ |
|
84 | + return $this->data; |
|
85 | + } |
|
86 | 86 | |
87 | 87 | |
88 | 88 | } |
@@ -52,8 +52,8 @@ discard block |
||
52 | 52 | * @param array $headers additional key value based headers |
53 | 53 | * @since 8.0.0 |
54 | 54 | */ |
55 | - public function __construct($data=[], $statusCode=Http::STATUS_OK, |
|
56 | - array $headers=[]) { |
|
55 | + public function __construct($data = [], $statusCode = Http::STATUS_OK, |
|
56 | + array $headers = []) { |
|
57 | 57 | parent::__construct(); |
58 | 58 | |
59 | 59 | $this->data = $data; |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | * @return DataResponse Reference to this object |
69 | 69 | * @since 8.0.0 |
70 | 70 | */ |
71 | - public function setData($data){ |
|
71 | + public function setData($data) { |
|
72 | 72 | $this->data = $data; |
73 | 73 | |
74 | 74 | return $this; |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | * @return array the data |
81 | 81 | * @since 8.0.0 |
82 | 82 | */ |
83 | - public function getData(){ |
|
83 | + public function getData() { |
|
84 | 84 | return $this->data; |
85 | 85 | } |
86 | 86 |
@@ -46,116 +46,116 @@ |
||
46 | 46 | */ |
47 | 47 | abstract class Controller { |
48 | 48 | |
49 | - /** |
|
50 | - * app name |
|
51 | - * @var string |
|
52 | - * @since 7.0.0 |
|
53 | - */ |
|
54 | - protected $appName; |
|
55 | - |
|
56 | - /** |
|
57 | - * current request |
|
58 | - * @var \OCP\IRequest |
|
59 | - * @since 6.0.0 |
|
60 | - */ |
|
61 | - protected $request; |
|
62 | - |
|
63 | - /** |
|
64 | - * @var array |
|
65 | - * @since 7.0.0 |
|
66 | - */ |
|
67 | - private $responders; |
|
68 | - |
|
69 | - /** |
|
70 | - * constructor of the controller |
|
71 | - * @param string $appName the name of the app |
|
72 | - * @param IRequest $request an instance of the request |
|
73 | - * @since 6.0.0 - parameter $appName was added in 7.0.0 - parameter $app was removed in 7.0.0 |
|
74 | - */ |
|
75 | - public function __construct($appName, |
|
76 | - IRequest $request) { |
|
77 | - $this->appName = $appName; |
|
78 | - $this->request = $request; |
|
79 | - |
|
80 | - // default responders |
|
81 | - $this->responders = [ |
|
82 | - 'json' => function ($data) { |
|
83 | - if ($data instanceof DataResponse) { |
|
84 | - $response = new JSONResponse( |
|
85 | - $data->getData(), |
|
86 | - $data->getStatus() |
|
87 | - ); |
|
88 | - $dataHeaders = $data->getHeaders(); |
|
89 | - $headers = $response->getHeaders(); |
|
90 | - // do not overwrite Content-Type if it already exists |
|
91 | - if (isset($dataHeaders['Content-Type'])) { |
|
92 | - unset($headers['Content-Type']); |
|
93 | - } |
|
94 | - $response->setHeaders(array_merge($dataHeaders, $headers)); |
|
95 | - return $response; |
|
96 | - } |
|
97 | - return new JSONResponse($data); |
|
98 | - } |
|
99 | - ]; |
|
100 | - } |
|
101 | - |
|
102 | - |
|
103 | - /** |
|
104 | - * Parses an HTTP accept header and returns the supported responder type |
|
105 | - * @param string $acceptHeader |
|
106 | - * @param string $default |
|
107 | - * @return string the responder type |
|
108 | - * @since 7.0.0 |
|
109 | - * @since 9.1.0 Added default parameter |
|
110 | - */ |
|
111 | - public function getResponderByHTTPHeader($acceptHeader, $default='json') { |
|
112 | - $headers = explode(',', $acceptHeader); |
|
113 | - |
|
114 | - // return the first matching responder |
|
115 | - foreach ($headers as $header) { |
|
116 | - $header = strtolower(trim($header)); |
|
117 | - |
|
118 | - $responder = str_replace('application/', '', $header); |
|
119 | - |
|
120 | - if (array_key_exists($responder, $this->responders)) { |
|
121 | - return $responder; |
|
122 | - } |
|
123 | - } |
|
124 | - |
|
125 | - // no matching header return default |
|
126 | - return $default; |
|
127 | - } |
|
128 | - |
|
129 | - |
|
130 | - /** |
|
131 | - * Registers a formatter for a type |
|
132 | - * @param string $format |
|
133 | - * @param \Closure $responder |
|
134 | - * @since 7.0.0 |
|
135 | - */ |
|
136 | - protected function registerResponder($format, \Closure $responder) { |
|
137 | - $this->responders[$format] = $responder; |
|
138 | - } |
|
139 | - |
|
140 | - |
|
141 | - /** |
|
142 | - * Serializes and formats a response |
|
143 | - * @param mixed $response the value that was returned from a controller and |
|
144 | - * is not a Response instance |
|
145 | - * @param string $format the format for which a formatter has been registered |
|
146 | - * @throws \DomainException if format does not match a registered formatter |
|
147 | - * @return Response |
|
148 | - * @since 7.0.0 |
|
149 | - */ |
|
150 | - public function buildResponse($response, $format='json') { |
|
151 | - if(array_key_exists($format, $this->responders)) { |
|
152 | - |
|
153 | - $responder = $this->responders[$format]; |
|
154 | - |
|
155 | - return $responder($response); |
|
156 | - |
|
157 | - } |
|
158 | - throw new \DomainException('No responder registered for format '. |
|
159 | - $format . '!'); |
|
160 | - } |
|
49 | + /** |
|
50 | + * app name |
|
51 | + * @var string |
|
52 | + * @since 7.0.0 |
|
53 | + */ |
|
54 | + protected $appName; |
|
55 | + |
|
56 | + /** |
|
57 | + * current request |
|
58 | + * @var \OCP\IRequest |
|
59 | + * @since 6.0.0 |
|
60 | + */ |
|
61 | + protected $request; |
|
62 | + |
|
63 | + /** |
|
64 | + * @var array |
|
65 | + * @since 7.0.0 |
|
66 | + */ |
|
67 | + private $responders; |
|
68 | + |
|
69 | + /** |
|
70 | + * constructor of the controller |
|
71 | + * @param string $appName the name of the app |
|
72 | + * @param IRequest $request an instance of the request |
|
73 | + * @since 6.0.0 - parameter $appName was added in 7.0.0 - parameter $app was removed in 7.0.0 |
|
74 | + */ |
|
75 | + public function __construct($appName, |
|
76 | + IRequest $request) { |
|
77 | + $this->appName = $appName; |
|
78 | + $this->request = $request; |
|
79 | + |
|
80 | + // default responders |
|
81 | + $this->responders = [ |
|
82 | + 'json' => function ($data) { |
|
83 | + if ($data instanceof DataResponse) { |
|
84 | + $response = new JSONResponse( |
|
85 | + $data->getData(), |
|
86 | + $data->getStatus() |
|
87 | + ); |
|
88 | + $dataHeaders = $data->getHeaders(); |
|
89 | + $headers = $response->getHeaders(); |
|
90 | + // do not overwrite Content-Type if it already exists |
|
91 | + if (isset($dataHeaders['Content-Type'])) { |
|
92 | + unset($headers['Content-Type']); |
|
93 | + } |
|
94 | + $response->setHeaders(array_merge($dataHeaders, $headers)); |
|
95 | + return $response; |
|
96 | + } |
|
97 | + return new JSONResponse($data); |
|
98 | + } |
|
99 | + ]; |
|
100 | + } |
|
101 | + |
|
102 | + |
|
103 | + /** |
|
104 | + * Parses an HTTP accept header and returns the supported responder type |
|
105 | + * @param string $acceptHeader |
|
106 | + * @param string $default |
|
107 | + * @return string the responder type |
|
108 | + * @since 7.0.0 |
|
109 | + * @since 9.1.0 Added default parameter |
|
110 | + */ |
|
111 | + public function getResponderByHTTPHeader($acceptHeader, $default='json') { |
|
112 | + $headers = explode(',', $acceptHeader); |
|
113 | + |
|
114 | + // return the first matching responder |
|
115 | + foreach ($headers as $header) { |
|
116 | + $header = strtolower(trim($header)); |
|
117 | + |
|
118 | + $responder = str_replace('application/', '', $header); |
|
119 | + |
|
120 | + if (array_key_exists($responder, $this->responders)) { |
|
121 | + return $responder; |
|
122 | + } |
|
123 | + } |
|
124 | + |
|
125 | + // no matching header return default |
|
126 | + return $default; |
|
127 | + } |
|
128 | + |
|
129 | + |
|
130 | + /** |
|
131 | + * Registers a formatter for a type |
|
132 | + * @param string $format |
|
133 | + * @param \Closure $responder |
|
134 | + * @since 7.0.0 |
|
135 | + */ |
|
136 | + protected function registerResponder($format, \Closure $responder) { |
|
137 | + $this->responders[$format] = $responder; |
|
138 | + } |
|
139 | + |
|
140 | + |
|
141 | + /** |
|
142 | + * Serializes and formats a response |
|
143 | + * @param mixed $response the value that was returned from a controller and |
|
144 | + * is not a Response instance |
|
145 | + * @param string $format the format for which a formatter has been registered |
|
146 | + * @throws \DomainException if format does not match a registered formatter |
|
147 | + * @return Response |
|
148 | + * @since 7.0.0 |
|
149 | + */ |
|
150 | + public function buildResponse($response, $format='json') { |
|
151 | + if(array_key_exists($format, $this->responders)) { |
|
152 | + |
|
153 | + $responder = $this->responders[$format]; |
|
154 | + |
|
155 | + return $responder($response); |
|
156 | + |
|
157 | + } |
|
158 | + throw new \DomainException('No responder registered for format '. |
|
159 | + $format . '!'); |
|
160 | + } |
|
161 | 161 | } |
@@ -49,94 +49,94 @@ |
||
49 | 49 | */ |
50 | 50 | class Share extends \OC\Share\Constants { |
51 | 51 | |
52 | - /** |
|
53 | - * Get the item of item type shared with a given user by source |
|
54 | - * @param string $itemType |
|
55 | - * @param string $itemSource |
|
56 | - * @param string $user User to whom the item was shared |
|
57 | - * @param string $owner Owner of the share |
|
58 | - * @return array Return list of items with file_target, permissions and expiration |
|
59 | - * @since 6.0.0 - parameter $owner was added in 8.0.0 |
|
60 | - * @deprecated 17.0.0 |
|
61 | - */ |
|
62 | - public static function getItemSharedWithUser($itemType, $itemSource, $user, $owner = null) { |
|
63 | - return \OC\Share\Share::getItemSharedWithUser($itemType, $itemSource, $user, $owner); |
|
64 | - } |
|
52 | + /** |
|
53 | + * Get the item of item type shared with a given user by source |
|
54 | + * @param string $itemType |
|
55 | + * @param string $itemSource |
|
56 | + * @param string $user User to whom the item was shared |
|
57 | + * @param string $owner Owner of the share |
|
58 | + * @return array Return list of items with file_target, permissions and expiration |
|
59 | + * @since 6.0.0 - parameter $owner was added in 8.0.0 |
|
60 | + * @deprecated 17.0.0 |
|
61 | + */ |
|
62 | + public static function getItemSharedWithUser($itemType, $itemSource, $user, $owner = null) { |
|
63 | + return \OC\Share\Share::getItemSharedWithUser($itemType, $itemSource, $user, $owner); |
|
64 | + } |
|
65 | 65 | |
66 | - /** |
|
67 | - * Get the item of item type shared with the current user by source |
|
68 | - * @param string $itemType |
|
69 | - * @param string $itemSource |
|
70 | - * @param int $format (optional) Format type must be defined by the backend |
|
71 | - * @param mixed $parameters |
|
72 | - * @param bool $includeCollections |
|
73 | - * @return array |
|
74 | - * @since 5.0.0 |
|
75 | - * @deprecated 17.0.0 |
|
76 | - */ |
|
77 | - public static function getItemSharedWithBySource($itemType, $itemSource, $format = self::FORMAT_NONE, |
|
78 | - $parameters = null, $includeCollections = false) { |
|
79 | - // not used by any app - only here to not break apps syntax |
|
80 | - } |
|
66 | + /** |
|
67 | + * Get the item of item type shared with the current user by source |
|
68 | + * @param string $itemType |
|
69 | + * @param string $itemSource |
|
70 | + * @param int $format (optional) Format type must be defined by the backend |
|
71 | + * @param mixed $parameters |
|
72 | + * @param bool $includeCollections |
|
73 | + * @return array |
|
74 | + * @since 5.0.0 |
|
75 | + * @deprecated 17.0.0 |
|
76 | + */ |
|
77 | + public static function getItemSharedWithBySource($itemType, $itemSource, $format = self::FORMAT_NONE, |
|
78 | + $parameters = null, $includeCollections = false) { |
|
79 | + // not used by any app - only here to not break apps syntax |
|
80 | + } |
|
81 | 81 | |
82 | - /** |
|
83 | - * Based on the given token the share information will be returned - password protected shares will be verified |
|
84 | - * @param string $token |
|
85 | - * @param bool $checkPasswordProtection |
|
86 | - * @return array|bool false will be returned in case the token is unknown or unauthorized |
|
87 | - * @since 5.0.0 - parameter $checkPasswordProtection was added in 7.0.0 |
|
88 | - * @deprecated 17.0.0 |
|
89 | - */ |
|
90 | - public static function getShareByToken($token, $checkPasswordProtection = true) { |
|
91 | - // not used by any app - only here to not break apps syntax |
|
92 | - } |
|
82 | + /** |
|
83 | + * Based on the given token the share information will be returned - password protected shares will be verified |
|
84 | + * @param string $token |
|
85 | + * @param bool $checkPasswordProtection |
|
86 | + * @return array|bool false will be returned in case the token is unknown or unauthorized |
|
87 | + * @since 5.0.0 - parameter $checkPasswordProtection was added in 7.0.0 |
|
88 | + * @deprecated 17.0.0 |
|
89 | + */ |
|
90 | + public static function getShareByToken($token, $checkPasswordProtection = true) { |
|
91 | + // not used by any app - only here to not break apps syntax |
|
92 | + } |
|
93 | 93 | |
94 | 94 | |
95 | - /** |
|
96 | - * Get the shared items of item type owned by the current user |
|
97 | - * @param string $itemType |
|
98 | - * @param int $format (optional) Format type must be defined by the backend |
|
99 | - * @param mixed $parameters |
|
100 | - * @param int $limit Number of items to return (optional) Returns all by default |
|
101 | - * @param bool $includeCollections |
|
102 | - * @return mixed Return depends on format |
|
103 | - * @since 5.0.0 |
|
104 | - * @deprecated 17.0.0 |
|
105 | - */ |
|
106 | - public static function getItemsShared($itemType, $format = self::FORMAT_NONE, $parameters = null, |
|
107 | - $limit = -1, $includeCollections = false) { |
|
95 | + /** |
|
96 | + * Get the shared items of item type owned by the current user |
|
97 | + * @param string $itemType |
|
98 | + * @param int $format (optional) Format type must be defined by the backend |
|
99 | + * @param mixed $parameters |
|
100 | + * @param int $limit Number of items to return (optional) Returns all by default |
|
101 | + * @param bool $includeCollections |
|
102 | + * @return mixed Return depends on format |
|
103 | + * @since 5.0.0 |
|
104 | + * @deprecated 17.0.0 |
|
105 | + */ |
|
106 | + public static function getItemsShared($itemType, $format = self::FORMAT_NONE, $parameters = null, |
|
107 | + $limit = -1, $includeCollections = false) { |
|
108 | 108 | |
109 | - // only used by AppVNCSafe app (https://github.com/vnc-biz/nextcloud-appvncsafe/issues/2) - only here to not break apps syntax |
|
110 | - } |
|
109 | + // only used by AppVNCSafe app (https://github.com/vnc-biz/nextcloud-appvncsafe/issues/2) - only here to not break apps syntax |
|
110 | + } |
|
111 | 111 | |
112 | - /** |
|
113 | - * Get the shared item of item type owned by the current user |
|
114 | - * @param string $itemType |
|
115 | - * @param string $itemSource |
|
116 | - * @param int $format (optional) Format type must be defined by the backend |
|
117 | - * @param mixed $parameters |
|
118 | - * @param bool $includeCollections |
|
119 | - * @return mixed Return depends on format |
|
120 | - * @since 5.0.0 |
|
121 | - * @deprecated 17.0.0 |
|
122 | - */ |
|
123 | - public static function getItemShared($itemType, $itemSource, $format = self::FORMAT_NONE, |
|
124 | - $parameters = null, $includeCollections = false) { |
|
112 | + /** |
|
113 | + * Get the shared item of item type owned by the current user |
|
114 | + * @param string $itemType |
|
115 | + * @param string $itemSource |
|
116 | + * @param int $format (optional) Format type must be defined by the backend |
|
117 | + * @param mixed $parameters |
|
118 | + * @param bool $includeCollections |
|
119 | + * @return mixed Return depends on format |
|
120 | + * @since 5.0.0 |
|
121 | + * @deprecated 17.0.0 |
|
122 | + */ |
|
123 | + public static function getItemShared($itemType, $itemSource, $format = self::FORMAT_NONE, |
|
124 | + $parameters = null, $includeCollections = false) { |
|
125 | 125 | |
126 | - return \OC\Share\Share::getItemShared($itemType, $itemSource, $format, $parameters, $includeCollections); |
|
127 | - } |
|
126 | + return \OC\Share\Share::getItemShared($itemType, $itemSource, $format, $parameters, $includeCollections); |
|
127 | + } |
|
128 | 128 | |
129 | - /** |
|
130 | - * sent status if users got informed by mail about share |
|
131 | - * @param string $itemType |
|
132 | - * @param string $itemSource |
|
133 | - * @param int $shareType SHARE_TYPE_USER, SHARE_TYPE_GROUP, or SHARE_TYPE_LINK |
|
134 | - * @param string $recipient with whom was the item shared |
|
135 | - * @param bool $status |
|
136 | - * @since 6.0.0 - parameter $originIsSource was added in 8.0.0 |
|
137 | - * @deprecated 17.0.0 |
|
138 | - */ |
|
139 | - public static function setSendMailStatus($itemType, $itemSource, $shareType, $recipient, $status) { |
|
140 | - // not used by any app - only here to not break apps syntax |
|
141 | - } |
|
129 | + /** |
|
130 | + * sent status if users got informed by mail about share |
|
131 | + * @param string $itemType |
|
132 | + * @param string $itemSource |
|
133 | + * @param int $shareType SHARE_TYPE_USER, SHARE_TYPE_GROUP, or SHARE_TYPE_LINK |
|
134 | + * @param string $recipient with whom was the item shared |
|
135 | + * @param bool $status |
|
136 | + * @since 6.0.0 - parameter $originIsSource was added in 8.0.0 |
|
137 | + * @deprecated 17.0.0 |
|
138 | + */ |
|
139 | + public static function setSendMailStatus($itemType, $itemSource, $shareType, $recipient, $status) { |
|
140 | + // not used by any app - only here to not break apps syntax |
|
141 | + } |
|
142 | 142 | } |
@@ -58,540 +58,540 @@ |
||
58 | 58 | * @package OC\IntegrityCheck |
59 | 59 | */ |
60 | 60 | class Checker { |
61 | - const CACHE_KEY = 'oc.integritycheck.checker'; |
|
62 | - /** @var EnvironmentHelper */ |
|
63 | - private $environmentHelper; |
|
64 | - /** @var AppLocator */ |
|
65 | - private $appLocator; |
|
66 | - /** @var FileAccessHelper */ |
|
67 | - private $fileAccessHelper; |
|
68 | - /** @var IConfig */ |
|
69 | - private $config; |
|
70 | - /** @var ICache */ |
|
71 | - private $cache; |
|
72 | - /** @var IAppManager */ |
|
73 | - private $appManager; |
|
74 | - /** @var ITempManager */ |
|
75 | - private $tempManager; |
|
76 | - /** @var IMimeTypeDetector */ |
|
77 | - private $mimeTypeDetector; |
|
78 | - |
|
79 | - /** |
|
80 | - * @param EnvironmentHelper $environmentHelper |
|
81 | - * @param FileAccessHelper $fileAccessHelper |
|
82 | - * @param AppLocator $appLocator |
|
83 | - * @param IConfig $config |
|
84 | - * @param ICacheFactory $cacheFactory |
|
85 | - * @param IAppManager $appManager |
|
86 | - * @param ITempManager $tempManager |
|
87 | - * @param IMimeTypeDetector $mimeTypeDetector |
|
88 | - */ |
|
89 | - public function __construct(EnvironmentHelper $environmentHelper, |
|
90 | - FileAccessHelper $fileAccessHelper, |
|
91 | - AppLocator $appLocator, |
|
92 | - IConfig $config = null, |
|
93 | - ICacheFactory $cacheFactory, |
|
94 | - IAppManager $appManager = null, |
|
95 | - ITempManager $tempManager, |
|
96 | - IMimeTypeDetector $mimeTypeDetector) { |
|
97 | - $this->environmentHelper = $environmentHelper; |
|
98 | - $this->fileAccessHelper = $fileAccessHelper; |
|
99 | - $this->appLocator = $appLocator; |
|
100 | - $this->config = $config; |
|
101 | - $this->cache = $cacheFactory->createDistributed(self::CACHE_KEY); |
|
102 | - $this->appManager = $appManager; |
|
103 | - $this->tempManager = $tempManager; |
|
104 | - $this->mimeTypeDetector = $mimeTypeDetector; |
|
105 | - } |
|
106 | - |
|
107 | - /** |
|
108 | - * Whether code signing is enforced or not. |
|
109 | - * |
|
110 | - * @return bool |
|
111 | - */ |
|
112 | - public function isCodeCheckEnforced(): bool { |
|
113 | - $notSignedChannels = [ '', 'git']; |
|
114 | - if (\in_array($this->environmentHelper->getChannel(), $notSignedChannels, true)) { |
|
115 | - return false; |
|
116 | - } |
|
117 | - |
|
118 | - /** |
|
119 | - * This config option is undocumented and supposed to be so, it's only |
|
120 | - * applicable for very specific scenarios and we should not advertise it |
|
121 | - * too prominent. So please do not add it to config.sample.php. |
|
122 | - */ |
|
123 | - $isIntegrityCheckDisabled = false; |
|
124 | - if ($this->config !== null) { |
|
125 | - $isIntegrityCheckDisabled = $this->config->getSystemValue('integrity.check.disabled', false); |
|
126 | - } |
|
127 | - if ($isIntegrityCheckDisabled === true) { |
|
128 | - return false; |
|
129 | - } |
|
130 | - |
|
131 | - return true; |
|
132 | - } |
|
133 | - |
|
134 | - /** |
|
135 | - * Enumerates all files belonging to the folder. Sensible defaults are excluded. |
|
136 | - * |
|
137 | - * @param string $folderToIterate |
|
138 | - * @param string $root |
|
139 | - * @return \RecursiveIteratorIterator |
|
140 | - * @throws \Exception |
|
141 | - */ |
|
142 | - private function getFolderIterator(string $folderToIterate, string $root = ''): \RecursiveIteratorIterator { |
|
143 | - $dirItr = new \RecursiveDirectoryIterator( |
|
144 | - $folderToIterate, |
|
145 | - \RecursiveDirectoryIterator::SKIP_DOTS |
|
146 | - ); |
|
147 | - if($root === '') { |
|
148 | - $root = \OC::$SERVERROOT; |
|
149 | - } |
|
150 | - $root = rtrim($root, '/'); |
|
151 | - |
|
152 | - $excludeGenericFilesIterator = new ExcludeFileByNameFilterIterator($dirItr); |
|
153 | - $excludeFoldersIterator = new ExcludeFoldersByPathFilterIterator($excludeGenericFilesIterator, $root); |
|
154 | - |
|
155 | - return new \RecursiveIteratorIterator( |
|
156 | - $excludeFoldersIterator, |
|
157 | - \RecursiveIteratorIterator::SELF_FIRST |
|
158 | - ); |
|
159 | - } |
|
160 | - |
|
161 | - /** |
|
162 | - * Returns an array of ['filename' => 'SHA512-hash-of-file'] for all files found |
|
163 | - * in the iterator. |
|
164 | - * |
|
165 | - * @param \RecursiveIteratorIterator $iterator |
|
166 | - * @param string $path |
|
167 | - * @return array Array of hashes. |
|
168 | - */ |
|
169 | - private function generateHashes(\RecursiveIteratorIterator $iterator, |
|
170 | - string $path): array { |
|
171 | - $hashes = []; |
|
172 | - |
|
173 | - $baseDirectoryLength = \strlen($path); |
|
174 | - foreach($iterator as $filename => $data) { |
|
175 | - /** @var \DirectoryIterator $data */ |
|
176 | - if($data->isDir()) { |
|
177 | - continue; |
|
178 | - } |
|
179 | - |
|
180 | - $relativeFileName = substr($filename, $baseDirectoryLength); |
|
181 | - $relativeFileName = ltrim($relativeFileName, '/'); |
|
182 | - |
|
183 | - // Exclude signature.json files in the appinfo and root folder |
|
184 | - if($relativeFileName === 'appinfo/signature.json') { |
|
185 | - continue; |
|
186 | - } |
|
187 | - // Exclude signature.json files in the appinfo and core folder |
|
188 | - if($relativeFileName === 'core/signature.json') { |
|
189 | - continue; |
|
190 | - } |
|
191 | - |
|
192 | - // The .htaccess file in the root folder of ownCloud can contain |
|
193 | - // custom content after the installation due to the fact that dynamic |
|
194 | - // content is written into it at installation time as well. This |
|
195 | - // includes for example the 404 and 403 instructions. |
|
196 | - // Thus we ignore everything below the first occurrence of |
|
197 | - // "#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####" and have the |
|
198 | - // hash generated based on this. |
|
199 | - if($filename === $this->environmentHelper->getServerRoot() . '/.htaccess') { |
|
200 | - $fileContent = file_get_contents($filename); |
|
201 | - $explodedArray = explode('#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####', $fileContent); |
|
202 | - if(\count($explodedArray) === 2) { |
|
203 | - $hashes[$relativeFileName] = hash('sha512', $explodedArray[0]); |
|
204 | - continue; |
|
205 | - } |
|
206 | - } |
|
207 | - if ($filename === $this->environmentHelper->getServerRoot() . '/core/js/mimetypelist.js') { |
|
208 | - $oldMimetypeList = new GenerateMimetypeFileBuilder(); |
|
209 | - $newFile = $oldMimetypeList->generateFile($this->mimeTypeDetector->getAllAliases()); |
|
210 | - if($newFile === file_get_contents($filename)) { |
|
211 | - $hashes[$relativeFileName] = hash('sha512', $oldMimetypeList->generateFile($this->mimeTypeDetector->getOnlyDefaultAliases())); |
|
212 | - continue; |
|
213 | - } |
|
214 | - } |
|
215 | - |
|
216 | - $hashes[$relativeFileName] = hash_file('sha512', $filename); |
|
217 | - } |
|
218 | - |
|
219 | - return $hashes; |
|
220 | - } |
|
221 | - |
|
222 | - /** |
|
223 | - * Creates the signature data |
|
224 | - * |
|
225 | - * @param array $hashes |
|
226 | - * @param X509 $certificate |
|
227 | - * @param RSA $privateKey |
|
228 | - * @return array |
|
229 | - */ |
|
230 | - private function createSignatureData(array $hashes, |
|
231 | - X509 $certificate, |
|
232 | - RSA $privateKey): array { |
|
233 | - ksort($hashes); |
|
234 | - |
|
235 | - $privateKey->setSignatureMode(RSA::SIGNATURE_PSS); |
|
236 | - $privateKey->setMGFHash('sha512'); |
|
237 | - // See https://tools.ietf.org/html/rfc3447#page-38 |
|
238 | - $privateKey->setSaltLength(0); |
|
239 | - $signature = $privateKey->sign(json_encode($hashes)); |
|
240 | - |
|
241 | - return [ |
|
242 | - 'hashes' => $hashes, |
|
243 | - 'signature' => base64_encode($signature), |
|
244 | - 'certificate' => $certificate->saveX509($certificate->currentCert), |
|
245 | - ]; |
|
246 | - } |
|
247 | - |
|
248 | - /** |
|
249 | - * Write the signature of the app in the specified folder |
|
250 | - * |
|
251 | - * @param string $path |
|
252 | - * @param X509 $certificate |
|
253 | - * @param RSA $privateKey |
|
254 | - * @throws \Exception |
|
255 | - */ |
|
256 | - public function writeAppSignature($path, |
|
257 | - X509 $certificate, |
|
258 | - RSA $privateKey) { |
|
259 | - $appInfoDir = $path . '/appinfo'; |
|
260 | - try { |
|
261 | - $this->fileAccessHelper->assertDirectoryExists($appInfoDir); |
|
262 | - |
|
263 | - $iterator = $this->getFolderIterator($path); |
|
264 | - $hashes = $this->generateHashes($iterator, $path); |
|
265 | - $signature = $this->createSignatureData($hashes, $certificate, $privateKey); |
|
266 | - $this->fileAccessHelper->file_put_contents( |
|
267 | - $appInfoDir . '/signature.json', |
|
268 | - json_encode($signature, JSON_PRETTY_PRINT) |
|
269 | - ); |
|
270 | - } catch (\Exception $e){ |
|
271 | - if (!$this->fileAccessHelper->is_writable($appInfoDir)) { |
|
272 | - throw new \Exception($appInfoDir . ' is not writable'); |
|
273 | - } |
|
274 | - throw $e; |
|
275 | - } |
|
276 | - } |
|
277 | - |
|
278 | - /** |
|
279 | - * Write the signature of core |
|
280 | - * |
|
281 | - * @param X509 $certificate |
|
282 | - * @param RSA $rsa |
|
283 | - * @param string $path |
|
284 | - * @throws \Exception |
|
285 | - */ |
|
286 | - public function writeCoreSignature(X509 $certificate, |
|
287 | - RSA $rsa, |
|
288 | - $path) { |
|
289 | - $coreDir = $path . '/core'; |
|
290 | - try { |
|
291 | - |
|
292 | - $this->fileAccessHelper->assertDirectoryExists($coreDir); |
|
293 | - $iterator = $this->getFolderIterator($path, $path); |
|
294 | - $hashes = $this->generateHashes($iterator, $path); |
|
295 | - $signatureData = $this->createSignatureData($hashes, $certificate, $rsa); |
|
296 | - $this->fileAccessHelper->file_put_contents( |
|
297 | - $coreDir . '/signature.json', |
|
298 | - json_encode($signatureData, JSON_PRETTY_PRINT) |
|
299 | - ); |
|
300 | - } catch (\Exception $e){ |
|
301 | - if (!$this->fileAccessHelper->is_writable($coreDir)) { |
|
302 | - throw new \Exception($coreDir . ' is not writable'); |
|
303 | - } |
|
304 | - throw $e; |
|
305 | - } |
|
306 | - } |
|
307 | - |
|
308 | - /** |
|
309 | - * Verifies the signature for the specified path. |
|
310 | - * |
|
311 | - * @param string $signaturePath |
|
312 | - * @param string $basePath |
|
313 | - * @param string $certificateCN |
|
314 | - * @return array |
|
315 | - * @throws InvalidSignatureException |
|
316 | - * @throws \Exception |
|
317 | - */ |
|
318 | - private function verify(string $signaturePath, string $basePath, string $certificateCN): array { |
|
319 | - if(!$this->isCodeCheckEnforced()) { |
|
320 | - return []; |
|
321 | - } |
|
322 | - |
|
323 | - $content = $this->fileAccessHelper->file_get_contents($signaturePath); |
|
324 | - $signatureData = null; |
|
325 | - |
|
326 | - if (\is_string($content)) { |
|
327 | - $signatureData = json_decode($content, true); |
|
328 | - } |
|
329 | - if(!\is_array($signatureData)) { |
|
330 | - throw new InvalidSignatureException('Signature data not found.'); |
|
331 | - } |
|
332 | - |
|
333 | - $expectedHashes = $signatureData['hashes']; |
|
334 | - ksort($expectedHashes); |
|
335 | - $signature = base64_decode($signatureData['signature']); |
|
336 | - $certificate = $signatureData['certificate']; |
|
337 | - |
|
338 | - // Check if certificate is signed by Nextcloud Root Authority |
|
339 | - $x509 = new \phpseclib\File\X509(); |
|
340 | - $rootCertificatePublicKey = $this->fileAccessHelper->file_get_contents($this->environmentHelper->getServerRoot().'/resources/codesigning/root.crt'); |
|
341 | - $x509->loadCA($rootCertificatePublicKey); |
|
342 | - $x509->loadX509($certificate); |
|
343 | - if(!$x509->validateSignature()) { |
|
344 | - throw new InvalidSignatureException('Certificate is not valid.'); |
|
345 | - } |
|
346 | - // Verify if certificate has proper CN. "core" CN is always trusted. |
|
347 | - if($x509->getDN(X509::DN_OPENSSL)['CN'] !== $certificateCN && $x509->getDN(X509::DN_OPENSSL)['CN'] !== 'core') { |
|
348 | - throw new InvalidSignatureException( |
|
349 | - sprintf('Certificate is not valid for required scope. (Requested: %s, current: CN=%s)', $certificateCN, $x509->getDN(true)['CN']) |
|
350 | - ); |
|
351 | - } |
|
352 | - |
|
353 | - // Check if the signature of the files is valid |
|
354 | - $rsa = new \phpseclib\Crypt\RSA(); |
|
355 | - $rsa->loadKey($x509->currentCert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']); |
|
356 | - $rsa->setSignatureMode(RSA::SIGNATURE_PSS); |
|
357 | - $rsa->setMGFHash('sha512'); |
|
358 | - // See https://tools.ietf.org/html/rfc3447#page-38 |
|
359 | - $rsa->setSaltLength(0); |
|
360 | - if(!$rsa->verify(json_encode($expectedHashes), $signature)) { |
|
361 | - throw new InvalidSignatureException('Signature could not get verified.'); |
|
362 | - } |
|
363 | - |
|
364 | - // Fixes for the updater as shipped with ownCloud 9.0.x: The updater is |
|
365 | - // replaced after the code integrity check is performed. |
|
366 | - // |
|
367 | - // Due to this reason we exclude the whole updater/ folder from the code |
|
368 | - // integrity check. |
|
369 | - if($basePath === $this->environmentHelper->getServerRoot()) { |
|
370 | - foreach($expectedHashes as $fileName => $hash) { |
|
371 | - if(strpos($fileName, 'updater/') === 0) { |
|
372 | - unset($expectedHashes[$fileName]); |
|
373 | - } |
|
374 | - } |
|
375 | - } |
|
376 | - |
|
377 | - // Compare the list of files which are not identical |
|
378 | - $currentInstanceHashes = $this->generateHashes($this->getFolderIterator($basePath), $basePath); |
|
379 | - $differencesA = array_diff($expectedHashes, $currentInstanceHashes); |
|
380 | - $differencesB = array_diff($currentInstanceHashes, $expectedHashes); |
|
381 | - $differences = array_unique(array_merge($differencesA, $differencesB)); |
|
382 | - $differenceArray = []; |
|
383 | - foreach($differences as $filename => $hash) { |
|
384 | - // Check if file should not exist in the new signature table |
|
385 | - if(!array_key_exists($filename, $expectedHashes)) { |
|
386 | - $differenceArray['EXTRA_FILE'][$filename]['expected'] = ''; |
|
387 | - $differenceArray['EXTRA_FILE'][$filename]['current'] = $hash; |
|
388 | - continue; |
|
389 | - } |
|
390 | - |
|
391 | - // Check if file is missing |
|
392 | - if(!array_key_exists($filename, $currentInstanceHashes)) { |
|
393 | - $differenceArray['FILE_MISSING'][$filename]['expected'] = $expectedHashes[$filename]; |
|
394 | - $differenceArray['FILE_MISSING'][$filename]['current'] = ''; |
|
395 | - continue; |
|
396 | - } |
|
397 | - |
|
398 | - // Check if hash does mismatch |
|
399 | - if($expectedHashes[$filename] !== $currentInstanceHashes[$filename]) { |
|
400 | - $differenceArray['INVALID_HASH'][$filename]['expected'] = $expectedHashes[$filename]; |
|
401 | - $differenceArray['INVALID_HASH'][$filename]['current'] = $currentInstanceHashes[$filename]; |
|
402 | - continue; |
|
403 | - } |
|
404 | - |
|
405 | - // Should never happen. |
|
406 | - throw new \Exception('Invalid behaviour in file hash comparison experienced. Please report this error to the developers.'); |
|
407 | - } |
|
408 | - |
|
409 | - return $differenceArray; |
|
410 | - } |
|
411 | - |
|
412 | - /** |
|
413 | - * Whether the code integrity check has passed successful or not |
|
414 | - * |
|
415 | - * @return bool |
|
416 | - */ |
|
417 | - public function hasPassedCheck(): bool { |
|
418 | - $results = $this->getResults(); |
|
419 | - if(empty($results)) { |
|
420 | - return true; |
|
421 | - } |
|
422 | - |
|
423 | - return false; |
|
424 | - } |
|
425 | - |
|
426 | - /** |
|
427 | - * @return array |
|
428 | - */ |
|
429 | - public function getResults(): array { |
|
430 | - $cachedResults = $this->cache->get(self::CACHE_KEY); |
|
431 | - if(!\is_null($cachedResults)) { |
|
432 | - return json_decode($cachedResults, true); |
|
433 | - } |
|
434 | - |
|
435 | - if ($this->config !== null) { |
|
436 | - return json_decode($this->config->getAppValue('core', self::CACHE_KEY, '{}'), true); |
|
437 | - } |
|
438 | - return []; |
|
439 | - } |
|
440 | - |
|
441 | - /** |
|
442 | - * Stores the results in the app config as well as cache |
|
443 | - * |
|
444 | - * @param string $scope |
|
445 | - * @param array $result |
|
446 | - */ |
|
447 | - private function storeResults(string $scope, array $result) { |
|
448 | - $resultArray = $this->getResults(); |
|
449 | - unset($resultArray[$scope]); |
|
450 | - if(!empty($result)) { |
|
451 | - $resultArray[$scope] = $result; |
|
452 | - } |
|
453 | - if ($this->config !== null) { |
|
454 | - $this->config->setAppValue('core', self::CACHE_KEY, json_encode($resultArray)); |
|
455 | - } |
|
456 | - $this->cache->set(self::CACHE_KEY, json_encode($resultArray)); |
|
457 | - } |
|
458 | - |
|
459 | - /** |
|
460 | - * |
|
461 | - * Clean previous results for a proper rescanning. Otherwise |
|
462 | - */ |
|
463 | - private function cleanResults() { |
|
464 | - $this->config->deleteAppValue('core', self::CACHE_KEY); |
|
465 | - $this->cache->remove(self::CACHE_KEY); |
|
466 | - } |
|
467 | - |
|
468 | - /** |
|
469 | - * Verify the signature of $appId. Returns an array with the following content: |
|
470 | - * [ |
|
471 | - * 'FILE_MISSING' => |
|
472 | - * [ |
|
473 | - * 'filename' => [ |
|
474 | - * 'expected' => 'expectedSHA512', |
|
475 | - * 'current' => 'currentSHA512', |
|
476 | - * ], |
|
477 | - * ], |
|
478 | - * 'EXTRA_FILE' => |
|
479 | - * [ |
|
480 | - * 'filename' => [ |
|
481 | - * 'expected' => 'expectedSHA512', |
|
482 | - * 'current' => 'currentSHA512', |
|
483 | - * ], |
|
484 | - * ], |
|
485 | - * 'INVALID_HASH' => |
|
486 | - * [ |
|
487 | - * 'filename' => [ |
|
488 | - * 'expected' => 'expectedSHA512', |
|
489 | - * 'current' => 'currentSHA512', |
|
490 | - * ], |
|
491 | - * ], |
|
492 | - * ] |
|
493 | - * |
|
494 | - * Array may be empty in case no problems have been found. |
|
495 | - * |
|
496 | - * @param string $appId |
|
497 | - * @param string $path Optional path. If none is given it will be guessed. |
|
498 | - * @return array |
|
499 | - */ |
|
500 | - public function verifyAppSignature(string $appId, string $path = ''): array { |
|
501 | - try { |
|
502 | - if($path === '') { |
|
503 | - $path = $this->appLocator->getAppPath($appId); |
|
504 | - } |
|
505 | - $result = $this->verify( |
|
506 | - $path . '/appinfo/signature.json', |
|
507 | - $path, |
|
508 | - $appId |
|
509 | - ); |
|
510 | - } catch (\Exception $e) { |
|
511 | - $result = [ |
|
512 | - 'EXCEPTION' => [ |
|
513 | - 'class' => \get_class($e), |
|
514 | - 'message' => $e->getMessage(), |
|
515 | - ], |
|
516 | - ]; |
|
517 | - } |
|
518 | - $this->storeResults($appId, $result); |
|
519 | - |
|
520 | - return $result; |
|
521 | - } |
|
522 | - |
|
523 | - /** |
|
524 | - * Verify the signature of core. Returns an array with the following content: |
|
525 | - * [ |
|
526 | - * 'FILE_MISSING' => |
|
527 | - * [ |
|
528 | - * 'filename' => [ |
|
529 | - * 'expected' => 'expectedSHA512', |
|
530 | - * 'current' => 'currentSHA512', |
|
531 | - * ], |
|
532 | - * ], |
|
533 | - * 'EXTRA_FILE' => |
|
534 | - * [ |
|
535 | - * 'filename' => [ |
|
536 | - * 'expected' => 'expectedSHA512', |
|
537 | - * 'current' => 'currentSHA512', |
|
538 | - * ], |
|
539 | - * ], |
|
540 | - * 'INVALID_HASH' => |
|
541 | - * [ |
|
542 | - * 'filename' => [ |
|
543 | - * 'expected' => 'expectedSHA512', |
|
544 | - * 'current' => 'currentSHA512', |
|
545 | - * ], |
|
546 | - * ], |
|
547 | - * ] |
|
548 | - * |
|
549 | - * Array may be empty in case no problems have been found. |
|
550 | - * |
|
551 | - * @return array |
|
552 | - */ |
|
553 | - public function verifyCoreSignature(): array { |
|
554 | - try { |
|
555 | - $result = $this->verify( |
|
556 | - $this->environmentHelper->getServerRoot() . '/core/signature.json', |
|
557 | - $this->environmentHelper->getServerRoot(), |
|
558 | - 'core' |
|
559 | - ); |
|
560 | - } catch (\Exception $e) { |
|
561 | - $result = [ |
|
562 | - 'EXCEPTION' => [ |
|
563 | - 'class' => \get_class($e), |
|
564 | - 'message' => $e->getMessage(), |
|
565 | - ], |
|
566 | - ]; |
|
567 | - } |
|
568 | - $this->storeResults('core', $result); |
|
569 | - |
|
570 | - return $result; |
|
571 | - } |
|
572 | - |
|
573 | - /** |
|
574 | - * Verify the core code of the instance as well as all applicable applications |
|
575 | - * and store the results. |
|
576 | - */ |
|
577 | - public function runInstanceVerification() { |
|
578 | - $this->cleanResults(); |
|
579 | - $this->verifyCoreSignature(); |
|
580 | - $appIds = $this->appLocator->getAllApps(); |
|
581 | - foreach($appIds as $appId) { |
|
582 | - // If an application is shipped a valid signature is required |
|
583 | - $isShipped = $this->appManager->isShipped($appId); |
|
584 | - $appNeedsToBeChecked = false; |
|
585 | - if ($isShipped) { |
|
586 | - $appNeedsToBeChecked = true; |
|
587 | - } elseif ($this->fileAccessHelper->file_exists($this->appLocator->getAppPath($appId) . '/appinfo/signature.json')) { |
|
588 | - // Otherwise only if the application explicitly ships a signature.json file |
|
589 | - $appNeedsToBeChecked = true; |
|
590 | - } |
|
591 | - |
|
592 | - if($appNeedsToBeChecked) { |
|
593 | - $this->verifyAppSignature($appId); |
|
594 | - } |
|
595 | - } |
|
596 | - } |
|
61 | + const CACHE_KEY = 'oc.integritycheck.checker'; |
|
62 | + /** @var EnvironmentHelper */ |
|
63 | + private $environmentHelper; |
|
64 | + /** @var AppLocator */ |
|
65 | + private $appLocator; |
|
66 | + /** @var FileAccessHelper */ |
|
67 | + private $fileAccessHelper; |
|
68 | + /** @var IConfig */ |
|
69 | + private $config; |
|
70 | + /** @var ICache */ |
|
71 | + private $cache; |
|
72 | + /** @var IAppManager */ |
|
73 | + private $appManager; |
|
74 | + /** @var ITempManager */ |
|
75 | + private $tempManager; |
|
76 | + /** @var IMimeTypeDetector */ |
|
77 | + private $mimeTypeDetector; |
|
78 | + |
|
79 | + /** |
|
80 | + * @param EnvironmentHelper $environmentHelper |
|
81 | + * @param FileAccessHelper $fileAccessHelper |
|
82 | + * @param AppLocator $appLocator |
|
83 | + * @param IConfig $config |
|
84 | + * @param ICacheFactory $cacheFactory |
|
85 | + * @param IAppManager $appManager |
|
86 | + * @param ITempManager $tempManager |
|
87 | + * @param IMimeTypeDetector $mimeTypeDetector |
|
88 | + */ |
|
89 | + public function __construct(EnvironmentHelper $environmentHelper, |
|
90 | + FileAccessHelper $fileAccessHelper, |
|
91 | + AppLocator $appLocator, |
|
92 | + IConfig $config = null, |
|
93 | + ICacheFactory $cacheFactory, |
|
94 | + IAppManager $appManager = null, |
|
95 | + ITempManager $tempManager, |
|
96 | + IMimeTypeDetector $mimeTypeDetector) { |
|
97 | + $this->environmentHelper = $environmentHelper; |
|
98 | + $this->fileAccessHelper = $fileAccessHelper; |
|
99 | + $this->appLocator = $appLocator; |
|
100 | + $this->config = $config; |
|
101 | + $this->cache = $cacheFactory->createDistributed(self::CACHE_KEY); |
|
102 | + $this->appManager = $appManager; |
|
103 | + $this->tempManager = $tempManager; |
|
104 | + $this->mimeTypeDetector = $mimeTypeDetector; |
|
105 | + } |
|
106 | + |
|
107 | + /** |
|
108 | + * Whether code signing is enforced or not. |
|
109 | + * |
|
110 | + * @return bool |
|
111 | + */ |
|
112 | + public function isCodeCheckEnforced(): bool { |
|
113 | + $notSignedChannels = [ '', 'git']; |
|
114 | + if (\in_array($this->environmentHelper->getChannel(), $notSignedChannels, true)) { |
|
115 | + return false; |
|
116 | + } |
|
117 | + |
|
118 | + /** |
|
119 | + * This config option is undocumented and supposed to be so, it's only |
|
120 | + * applicable for very specific scenarios and we should not advertise it |
|
121 | + * too prominent. So please do not add it to config.sample.php. |
|
122 | + */ |
|
123 | + $isIntegrityCheckDisabled = false; |
|
124 | + if ($this->config !== null) { |
|
125 | + $isIntegrityCheckDisabled = $this->config->getSystemValue('integrity.check.disabled', false); |
|
126 | + } |
|
127 | + if ($isIntegrityCheckDisabled === true) { |
|
128 | + return false; |
|
129 | + } |
|
130 | + |
|
131 | + return true; |
|
132 | + } |
|
133 | + |
|
134 | + /** |
|
135 | + * Enumerates all files belonging to the folder. Sensible defaults are excluded. |
|
136 | + * |
|
137 | + * @param string $folderToIterate |
|
138 | + * @param string $root |
|
139 | + * @return \RecursiveIteratorIterator |
|
140 | + * @throws \Exception |
|
141 | + */ |
|
142 | + private function getFolderIterator(string $folderToIterate, string $root = ''): \RecursiveIteratorIterator { |
|
143 | + $dirItr = new \RecursiveDirectoryIterator( |
|
144 | + $folderToIterate, |
|
145 | + \RecursiveDirectoryIterator::SKIP_DOTS |
|
146 | + ); |
|
147 | + if($root === '') { |
|
148 | + $root = \OC::$SERVERROOT; |
|
149 | + } |
|
150 | + $root = rtrim($root, '/'); |
|
151 | + |
|
152 | + $excludeGenericFilesIterator = new ExcludeFileByNameFilterIterator($dirItr); |
|
153 | + $excludeFoldersIterator = new ExcludeFoldersByPathFilterIterator($excludeGenericFilesIterator, $root); |
|
154 | + |
|
155 | + return new \RecursiveIteratorIterator( |
|
156 | + $excludeFoldersIterator, |
|
157 | + \RecursiveIteratorIterator::SELF_FIRST |
|
158 | + ); |
|
159 | + } |
|
160 | + |
|
161 | + /** |
|
162 | + * Returns an array of ['filename' => 'SHA512-hash-of-file'] for all files found |
|
163 | + * in the iterator. |
|
164 | + * |
|
165 | + * @param \RecursiveIteratorIterator $iterator |
|
166 | + * @param string $path |
|
167 | + * @return array Array of hashes. |
|
168 | + */ |
|
169 | + private function generateHashes(\RecursiveIteratorIterator $iterator, |
|
170 | + string $path): array { |
|
171 | + $hashes = []; |
|
172 | + |
|
173 | + $baseDirectoryLength = \strlen($path); |
|
174 | + foreach($iterator as $filename => $data) { |
|
175 | + /** @var \DirectoryIterator $data */ |
|
176 | + if($data->isDir()) { |
|
177 | + continue; |
|
178 | + } |
|
179 | + |
|
180 | + $relativeFileName = substr($filename, $baseDirectoryLength); |
|
181 | + $relativeFileName = ltrim($relativeFileName, '/'); |
|
182 | + |
|
183 | + // Exclude signature.json files in the appinfo and root folder |
|
184 | + if($relativeFileName === 'appinfo/signature.json') { |
|
185 | + continue; |
|
186 | + } |
|
187 | + // Exclude signature.json files in the appinfo and core folder |
|
188 | + if($relativeFileName === 'core/signature.json') { |
|
189 | + continue; |
|
190 | + } |
|
191 | + |
|
192 | + // The .htaccess file in the root folder of ownCloud can contain |
|
193 | + // custom content after the installation due to the fact that dynamic |
|
194 | + // content is written into it at installation time as well. This |
|
195 | + // includes for example the 404 and 403 instructions. |
|
196 | + // Thus we ignore everything below the first occurrence of |
|
197 | + // "#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####" and have the |
|
198 | + // hash generated based on this. |
|
199 | + if($filename === $this->environmentHelper->getServerRoot() . '/.htaccess') { |
|
200 | + $fileContent = file_get_contents($filename); |
|
201 | + $explodedArray = explode('#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####', $fileContent); |
|
202 | + if(\count($explodedArray) === 2) { |
|
203 | + $hashes[$relativeFileName] = hash('sha512', $explodedArray[0]); |
|
204 | + continue; |
|
205 | + } |
|
206 | + } |
|
207 | + if ($filename === $this->environmentHelper->getServerRoot() . '/core/js/mimetypelist.js') { |
|
208 | + $oldMimetypeList = new GenerateMimetypeFileBuilder(); |
|
209 | + $newFile = $oldMimetypeList->generateFile($this->mimeTypeDetector->getAllAliases()); |
|
210 | + if($newFile === file_get_contents($filename)) { |
|
211 | + $hashes[$relativeFileName] = hash('sha512', $oldMimetypeList->generateFile($this->mimeTypeDetector->getOnlyDefaultAliases())); |
|
212 | + continue; |
|
213 | + } |
|
214 | + } |
|
215 | + |
|
216 | + $hashes[$relativeFileName] = hash_file('sha512', $filename); |
|
217 | + } |
|
218 | + |
|
219 | + return $hashes; |
|
220 | + } |
|
221 | + |
|
222 | + /** |
|
223 | + * Creates the signature data |
|
224 | + * |
|
225 | + * @param array $hashes |
|
226 | + * @param X509 $certificate |
|
227 | + * @param RSA $privateKey |
|
228 | + * @return array |
|
229 | + */ |
|
230 | + private function createSignatureData(array $hashes, |
|
231 | + X509 $certificate, |
|
232 | + RSA $privateKey): array { |
|
233 | + ksort($hashes); |
|
234 | + |
|
235 | + $privateKey->setSignatureMode(RSA::SIGNATURE_PSS); |
|
236 | + $privateKey->setMGFHash('sha512'); |
|
237 | + // See https://tools.ietf.org/html/rfc3447#page-38 |
|
238 | + $privateKey->setSaltLength(0); |
|
239 | + $signature = $privateKey->sign(json_encode($hashes)); |
|
240 | + |
|
241 | + return [ |
|
242 | + 'hashes' => $hashes, |
|
243 | + 'signature' => base64_encode($signature), |
|
244 | + 'certificate' => $certificate->saveX509($certificate->currentCert), |
|
245 | + ]; |
|
246 | + } |
|
247 | + |
|
248 | + /** |
|
249 | + * Write the signature of the app in the specified folder |
|
250 | + * |
|
251 | + * @param string $path |
|
252 | + * @param X509 $certificate |
|
253 | + * @param RSA $privateKey |
|
254 | + * @throws \Exception |
|
255 | + */ |
|
256 | + public function writeAppSignature($path, |
|
257 | + X509 $certificate, |
|
258 | + RSA $privateKey) { |
|
259 | + $appInfoDir = $path . '/appinfo'; |
|
260 | + try { |
|
261 | + $this->fileAccessHelper->assertDirectoryExists($appInfoDir); |
|
262 | + |
|
263 | + $iterator = $this->getFolderIterator($path); |
|
264 | + $hashes = $this->generateHashes($iterator, $path); |
|
265 | + $signature = $this->createSignatureData($hashes, $certificate, $privateKey); |
|
266 | + $this->fileAccessHelper->file_put_contents( |
|
267 | + $appInfoDir . '/signature.json', |
|
268 | + json_encode($signature, JSON_PRETTY_PRINT) |
|
269 | + ); |
|
270 | + } catch (\Exception $e){ |
|
271 | + if (!$this->fileAccessHelper->is_writable($appInfoDir)) { |
|
272 | + throw new \Exception($appInfoDir . ' is not writable'); |
|
273 | + } |
|
274 | + throw $e; |
|
275 | + } |
|
276 | + } |
|
277 | + |
|
278 | + /** |
|
279 | + * Write the signature of core |
|
280 | + * |
|
281 | + * @param X509 $certificate |
|
282 | + * @param RSA $rsa |
|
283 | + * @param string $path |
|
284 | + * @throws \Exception |
|
285 | + */ |
|
286 | + public function writeCoreSignature(X509 $certificate, |
|
287 | + RSA $rsa, |
|
288 | + $path) { |
|
289 | + $coreDir = $path . '/core'; |
|
290 | + try { |
|
291 | + |
|
292 | + $this->fileAccessHelper->assertDirectoryExists($coreDir); |
|
293 | + $iterator = $this->getFolderIterator($path, $path); |
|
294 | + $hashes = $this->generateHashes($iterator, $path); |
|
295 | + $signatureData = $this->createSignatureData($hashes, $certificate, $rsa); |
|
296 | + $this->fileAccessHelper->file_put_contents( |
|
297 | + $coreDir . '/signature.json', |
|
298 | + json_encode($signatureData, JSON_PRETTY_PRINT) |
|
299 | + ); |
|
300 | + } catch (\Exception $e){ |
|
301 | + if (!$this->fileAccessHelper->is_writable($coreDir)) { |
|
302 | + throw new \Exception($coreDir . ' is not writable'); |
|
303 | + } |
|
304 | + throw $e; |
|
305 | + } |
|
306 | + } |
|
307 | + |
|
308 | + /** |
|
309 | + * Verifies the signature for the specified path. |
|
310 | + * |
|
311 | + * @param string $signaturePath |
|
312 | + * @param string $basePath |
|
313 | + * @param string $certificateCN |
|
314 | + * @return array |
|
315 | + * @throws InvalidSignatureException |
|
316 | + * @throws \Exception |
|
317 | + */ |
|
318 | + private function verify(string $signaturePath, string $basePath, string $certificateCN): array { |
|
319 | + if(!$this->isCodeCheckEnforced()) { |
|
320 | + return []; |
|
321 | + } |
|
322 | + |
|
323 | + $content = $this->fileAccessHelper->file_get_contents($signaturePath); |
|
324 | + $signatureData = null; |
|
325 | + |
|
326 | + if (\is_string($content)) { |
|
327 | + $signatureData = json_decode($content, true); |
|
328 | + } |
|
329 | + if(!\is_array($signatureData)) { |
|
330 | + throw new InvalidSignatureException('Signature data not found.'); |
|
331 | + } |
|
332 | + |
|
333 | + $expectedHashes = $signatureData['hashes']; |
|
334 | + ksort($expectedHashes); |
|
335 | + $signature = base64_decode($signatureData['signature']); |
|
336 | + $certificate = $signatureData['certificate']; |
|
337 | + |
|
338 | + // Check if certificate is signed by Nextcloud Root Authority |
|
339 | + $x509 = new \phpseclib\File\X509(); |
|
340 | + $rootCertificatePublicKey = $this->fileAccessHelper->file_get_contents($this->environmentHelper->getServerRoot().'/resources/codesigning/root.crt'); |
|
341 | + $x509->loadCA($rootCertificatePublicKey); |
|
342 | + $x509->loadX509($certificate); |
|
343 | + if(!$x509->validateSignature()) { |
|
344 | + throw new InvalidSignatureException('Certificate is not valid.'); |
|
345 | + } |
|
346 | + // Verify if certificate has proper CN. "core" CN is always trusted. |
|
347 | + if($x509->getDN(X509::DN_OPENSSL)['CN'] !== $certificateCN && $x509->getDN(X509::DN_OPENSSL)['CN'] !== 'core') { |
|
348 | + throw new InvalidSignatureException( |
|
349 | + sprintf('Certificate is not valid for required scope. (Requested: %s, current: CN=%s)', $certificateCN, $x509->getDN(true)['CN']) |
|
350 | + ); |
|
351 | + } |
|
352 | + |
|
353 | + // Check if the signature of the files is valid |
|
354 | + $rsa = new \phpseclib\Crypt\RSA(); |
|
355 | + $rsa->loadKey($x509->currentCert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']); |
|
356 | + $rsa->setSignatureMode(RSA::SIGNATURE_PSS); |
|
357 | + $rsa->setMGFHash('sha512'); |
|
358 | + // See https://tools.ietf.org/html/rfc3447#page-38 |
|
359 | + $rsa->setSaltLength(0); |
|
360 | + if(!$rsa->verify(json_encode($expectedHashes), $signature)) { |
|
361 | + throw new InvalidSignatureException('Signature could not get verified.'); |
|
362 | + } |
|
363 | + |
|
364 | + // Fixes for the updater as shipped with ownCloud 9.0.x: The updater is |
|
365 | + // replaced after the code integrity check is performed. |
|
366 | + // |
|
367 | + // Due to this reason we exclude the whole updater/ folder from the code |
|
368 | + // integrity check. |
|
369 | + if($basePath === $this->environmentHelper->getServerRoot()) { |
|
370 | + foreach($expectedHashes as $fileName => $hash) { |
|
371 | + if(strpos($fileName, 'updater/') === 0) { |
|
372 | + unset($expectedHashes[$fileName]); |
|
373 | + } |
|
374 | + } |
|
375 | + } |
|
376 | + |
|
377 | + // Compare the list of files which are not identical |
|
378 | + $currentInstanceHashes = $this->generateHashes($this->getFolderIterator($basePath), $basePath); |
|
379 | + $differencesA = array_diff($expectedHashes, $currentInstanceHashes); |
|
380 | + $differencesB = array_diff($currentInstanceHashes, $expectedHashes); |
|
381 | + $differences = array_unique(array_merge($differencesA, $differencesB)); |
|
382 | + $differenceArray = []; |
|
383 | + foreach($differences as $filename => $hash) { |
|
384 | + // Check if file should not exist in the new signature table |
|
385 | + if(!array_key_exists($filename, $expectedHashes)) { |
|
386 | + $differenceArray['EXTRA_FILE'][$filename]['expected'] = ''; |
|
387 | + $differenceArray['EXTRA_FILE'][$filename]['current'] = $hash; |
|
388 | + continue; |
|
389 | + } |
|
390 | + |
|
391 | + // Check if file is missing |
|
392 | + if(!array_key_exists($filename, $currentInstanceHashes)) { |
|
393 | + $differenceArray['FILE_MISSING'][$filename]['expected'] = $expectedHashes[$filename]; |
|
394 | + $differenceArray['FILE_MISSING'][$filename]['current'] = ''; |
|
395 | + continue; |
|
396 | + } |
|
397 | + |
|
398 | + // Check if hash does mismatch |
|
399 | + if($expectedHashes[$filename] !== $currentInstanceHashes[$filename]) { |
|
400 | + $differenceArray['INVALID_HASH'][$filename]['expected'] = $expectedHashes[$filename]; |
|
401 | + $differenceArray['INVALID_HASH'][$filename]['current'] = $currentInstanceHashes[$filename]; |
|
402 | + continue; |
|
403 | + } |
|
404 | + |
|
405 | + // Should never happen. |
|
406 | + throw new \Exception('Invalid behaviour in file hash comparison experienced. Please report this error to the developers.'); |
|
407 | + } |
|
408 | + |
|
409 | + return $differenceArray; |
|
410 | + } |
|
411 | + |
|
412 | + /** |
|
413 | + * Whether the code integrity check has passed successful or not |
|
414 | + * |
|
415 | + * @return bool |
|
416 | + */ |
|
417 | + public function hasPassedCheck(): bool { |
|
418 | + $results = $this->getResults(); |
|
419 | + if(empty($results)) { |
|
420 | + return true; |
|
421 | + } |
|
422 | + |
|
423 | + return false; |
|
424 | + } |
|
425 | + |
|
426 | + /** |
|
427 | + * @return array |
|
428 | + */ |
|
429 | + public function getResults(): array { |
|
430 | + $cachedResults = $this->cache->get(self::CACHE_KEY); |
|
431 | + if(!\is_null($cachedResults)) { |
|
432 | + return json_decode($cachedResults, true); |
|
433 | + } |
|
434 | + |
|
435 | + if ($this->config !== null) { |
|
436 | + return json_decode($this->config->getAppValue('core', self::CACHE_KEY, '{}'), true); |
|
437 | + } |
|
438 | + return []; |
|
439 | + } |
|
440 | + |
|
441 | + /** |
|
442 | + * Stores the results in the app config as well as cache |
|
443 | + * |
|
444 | + * @param string $scope |
|
445 | + * @param array $result |
|
446 | + */ |
|
447 | + private function storeResults(string $scope, array $result) { |
|
448 | + $resultArray = $this->getResults(); |
|
449 | + unset($resultArray[$scope]); |
|
450 | + if(!empty($result)) { |
|
451 | + $resultArray[$scope] = $result; |
|
452 | + } |
|
453 | + if ($this->config !== null) { |
|
454 | + $this->config->setAppValue('core', self::CACHE_KEY, json_encode($resultArray)); |
|
455 | + } |
|
456 | + $this->cache->set(self::CACHE_KEY, json_encode($resultArray)); |
|
457 | + } |
|
458 | + |
|
459 | + /** |
|
460 | + * |
|
461 | + * Clean previous results for a proper rescanning. Otherwise |
|
462 | + */ |
|
463 | + private function cleanResults() { |
|
464 | + $this->config->deleteAppValue('core', self::CACHE_KEY); |
|
465 | + $this->cache->remove(self::CACHE_KEY); |
|
466 | + } |
|
467 | + |
|
468 | + /** |
|
469 | + * Verify the signature of $appId. Returns an array with the following content: |
|
470 | + * [ |
|
471 | + * 'FILE_MISSING' => |
|
472 | + * [ |
|
473 | + * 'filename' => [ |
|
474 | + * 'expected' => 'expectedSHA512', |
|
475 | + * 'current' => 'currentSHA512', |
|
476 | + * ], |
|
477 | + * ], |
|
478 | + * 'EXTRA_FILE' => |
|
479 | + * [ |
|
480 | + * 'filename' => [ |
|
481 | + * 'expected' => 'expectedSHA512', |
|
482 | + * 'current' => 'currentSHA512', |
|
483 | + * ], |
|
484 | + * ], |
|
485 | + * 'INVALID_HASH' => |
|
486 | + * [ |
|
487 | + * 'filename' => [ |
|
488 | + * 'expected' => 'expectedSHA512', |
|
489 | + * 'current' => 'currentSHA512', |
|
490 | + * ], |
|
491 | + * ], |
|
492 | + * ] |
|
493 | + * |
|
494 | + * Array may be empty in case no problems have been found. |
|
495 | + * |
|
496 | + * @param string $appId |
|
497 | + * @param string $path Optional path. If none is given it will be guessed. |
|
498 | + * @return array |
|
499 | + */ |
|
500 | + public function verifyAppSignature(string $appId, string $path = ''): array { |
|
501 | + try { |
|
502 | + if($path === '') { |
|
503 | + $path = $this->appLocator->getAppPath($appId); |
|
504 | + } |
|
505 | + $result = $this->verify( |
|
506 | + $path . '/appinfo/signature.json', |
|
507 | + $path, |
|
508 | + $appId |
|
509 | + ); |
|
510 | + } catch (\Exception $e) { |
|
511 | + $result = [ |
|
512 | + 'EXCEPTION' => [ |
|
513 | + 'class' => \get_class($e), |
|
514 | + 'message' => $e->getMessage(), |
|
515 | + ], |
|
516 | + ]; |
|
517 | + } |
|
518 | + $this->storeResults($appId, $result); |
|
519 | + |
|
520 | + return $result; |
|
521 | + } |
|
522 | + |
|
523 | + /** |
|
524 | + * Verify the signature of core. Returns an array with the following content: |
|
525 | + * [ |
|
526 | + * 'FILE_MISSING' => |
|
527 | + * [ |
|
528 | + * 'filename' => [ |
|
529 | + * 'expected' => 'expectedSHA512', |
|
530 | + * 'current' => 'currentSHA512', |
|
531 | + * ], |
|
532 | + * ], |
|
533 | + * 'EXTRA_FILE' => |
|
534 | + * [ |
|
535 | + * 'filename' => [ |
|
536 | + * 'expected' => 'expectedSHA512', |
|
537 | + * 'current' => 'currentSHA512', |
|
538 | + * ], |
|
539 | + * ], |
|
540 | + * 'INVALID_HASH' => |
|
541 | + * [ |
|
542 | + * 'filename' => [ |
|
543 | + * 'expected' => 'expectedSHA512', |
|
544 | + * 'current' => 'currentSHA512', |
|
545 | + * ], |
|
546 | + * ], |
|
547 | + * ] |
|
548 | + * |
|
549 | + * Array may be empty in case no problems have been found. |
|
550 | + * |
|
551 | + * @return array |
|
552 | + */ |
|
553 | + public function verifyCoreSignature(): array { |
|
554 | + try { |
|
555 | + $result = $this->verify( |
|
556 | + $this->environmentHelper->getServerRoot() . '/core/signature.json', |
|
557 | + $this->environmentHelper->getServerRoot(), |
|
558 | + 'core' |
|
559 | + ); |
|
560 | + } catch (\Exception $e) { |
|
561 | + $result = [ |
|
562 | + 'EXCEPTION' => [ |
|
563 | + 'class' => \get_class($e), |
|
564 | + 'message' => $e->getMessage(), |
|
565 | + ], |
|
566 | + ]; |
|
567 | + } |
|
568 | + $this->storeResults('core', $result); |
|
569 | + |
|
570 | + return $result; |
|
571 | + } |
|
572 | + |
|
573 | + /** |
|
574 | + * Verify the core code of the instance as well as all applicable applications |
|
575 | + * and store the results. |
|
576 | + */ |
|
577 | + public function runInstanceVerification() { |
|
578 | + $this->cleanResults(); |
|
579 | + $this->verifyCoreSignature(); |
|
580 | + $appIds = $this->appLocator->getAllApps(); |
|
581 | + foreach($appIds as $appId) { |
|
582 | + // If an application is shipped a valid signature is required |
|
583 | + $isShipped = $this->appManager->isShipped($appId); |
|
584 | + $appNeedsToBeChecked = false; |
|
585 | + if ($isShipped) { |
|
586 | + $appNeedsToBeChecked = true; |
|
587 | + } elseif ($this->fileAccessHelper->file_exists($this->appLocator->getAppPath($appId) . '/appinfo/signature.json')) { |
|
588 | + // Otherwise only if the application explicitly ships a signature.json file |
|
589 | + $appNeedsToBeChecked = true; |
|
590 | + } |
|
591 | + |
|
592 | + if($appNeedsToBeChecked) { |
|
593 | + $this->verifyAppSignature($appId); |
|
594 | + } |
|
595 | + } |
|
596 | + } |
|
597 | 597 | } |
@@ -42,413 +42,413 @@ |
||
42 | 42 | |
43 | 43 | class Generator { |
44 | 44 | |
45 | - /** @var IPreview */ |
|
46 | - private $previewManager; |
|
47 | - /** @var IConfig */ |
|
48 | - private $config; |
|
49 | - /** @var IAppData */ |
|
50 | - private $appData; |
|
51 | - /** @var GeneratorHelper */ |
|
52 | - private $helper; |
|
53 | - /** @var EventDispatcherInterface */ |
|
54 | - private $eventDispatcher; |
|
55 | - |
|
56 | - /** |
|
57 | - * @param IConfig $config |
|
58 | - * @param IPreview $previewManager |
|
59 | - * @param IAppData $appData |
|
60 | - * @param GeneratorHelper $helper |
|
61 | - * @param EventDispatcherInterface $eventDispatcher |
|
62 | - */ |
|
63 | - public function __construct( |
|
64 | - IConfig $config, |
|
65 | - IPreview $previewManager, |
|
66 | - IAppData $appData, |
|
67 | - GeneratorHelper $helper, |
|
68 | - EventDispatcherInterface $eventDispatcher |
|
69 | - ) { |
|
70 | - $this->config = $config; |
|
71 | - $this->previewManager = $previewManager; |
|
72 | - $this->appData = $appData; |
|
73 | - $this->helper = $helper; |
|
74 | - $this->eventDispatcher = $eventDispatcher; |
|
75 | - } |
|
76 | - |
|
77 | - /** |
|
78 | - * Returns a preview of a file |
|
79 | - * |
|
80 | - * The cache is searched first and if nothing usable was found then a preview is |
|
81 | - * generated by one of the providers |
|
82 | - * |
|
83 | - * @param File $file |
|
84 | - * @param int $width |
|
85 | - * @param int $height |
|
86 | - * @param bool $crop |
|
87 | - * @param string $mode |
|
88 | - * @param string $mimeType |
|
89 | - * @return ISimpleFile |
|
90 | - * @throws NotFoundException |
|
91 | - * @throws \InvalidArgumentException if the preview would be invalid (in case the original image is invalid) |
|
92 | - */ |
|
93 | - public function getPreview(File $file, $width = -1, $height = -1, $crop = false, $mode = IPreview::MODE_FILL, $mimeType = null) { |
|
94 | - //Make sure that we can read the file |
|
95 | - if (!$file->isReadable()) { |
|
96 | - throw new NotFoundException('Cannot read file'); |
|
97 | - } |
|
98 | - |
|
99 | - |
|
100 | - $this->eventDispatcher->dispatch( |
|
101 | - IPreview::EVENT, |
|
102 | - new GenericEvent($file, [ |
|
103 | - 'width' => $width, |
|
104 | - 'height' => $height, |
|
105 | - 'crop' => $crop, |
|
106 | - 'mode' => $mode |
|
107 | - ]) |
|
108 | - ); |
|
109 | - |
|
110 | - if ($mimeType === null) { |
|
111 | - $mimeType = $file->getMimeType(); |
|
112 | - } |
|
113 | - if (!$this->previewManager->isMimeSupported($mimeType)) { |
|
114 | - throw new NotFoundException(); |
|
115 | - } |
|
116 | - |
|
117 | - $previewFolder = $this->getPreviewFolder($file); |
|
118 | - |
|
119 | - $previewVersion = ''; |
|
120 | - if ($file instanceof IVersionedPreviewFile) { |
|
121 | - $previewVersion = $file->getPreviewVersion() . '-'; |
|
122 | - } |
|
123 | - |
|
124 | - // Get the max preview and infer the max preview sizes from that |
|
125 | - $maxPreview = $this->getMaxPreview($previewFolder, $file, $mimeType, $previewVersion); |
|
126 | - if ($maxPreview->getSize() === 0) { |
|
127 | - $maxPreview->delete(); |
|
128 | - throw new NotFoundException('Max preview size 0, invalid!'); |
|
129 | - } |
|
130 | - |
|
131 | - list($maxWidth, $maxHeight) = $this->getPreviewSize($maxPreview, $previewVersion); |
|
132 | - |
|
133 | - // If both width and heigth are -1 we just want the max preview |
|
134 | - if ($width === -1 && $height === -1) { |
|
135 | - $width = $maxWidth; |
|
136 | - $height = $maxHeight; |
|
137 | - } |
|
138 | - |
|
139 | - // Calculate the preview size |
|
140 | - list($width, $height) = $this->calculateSize($width, $height, $crop, $mode, $maxWidth, $maxHeight); |
|
141 | - |
|
142 | - // No need to generate a preview that is just the max preview |
|
143 | - if ($width === $maxWidth && $height === $maxHeight) { |
|
144 | - return $maxPreview; |
|
145 | - } |
|
146 | - |
|
147 | - // Try to get a cached preview. Else generate (and store) one |
|
148 | - try { |
|
149 | - try { |
|
150 | - $preview = $this->getCachedPreview($previewFolder, $width, $height, $crop, $maxPreview->getMimeType(), $previewVersion); |
|
151 | - } catch (NotFoundException $e) { |
|
152 | - $preview = $this->generatePreview($previewFolder, $maxPreview, $width, $height, $crop, $maxWidth, $maxHeight, $previewVersion); |
|
153 | - } |
|
154 | - } catch (\InvalidArgumentException $e) { |
|
155 | - throw new NotFoundException(); |
|
156 | - } |
|
157 | - |
|
158 | - if ($preview->getSize() === 0) { |
|
159 | - $preview->delete(); |
|
160 | - throw new NotFoundException('Cached preview size 0, invalid!'); |
|
161 | - } |
|
162 | - |
|
163 | - return $preview; |
|
164 | - } |
|
165 | - |
|
166 | - /** |
|
167 | - * @param ISimpleFolder $previewFolder |
|
168 | - * @param File $file |
|
169 | - * @param string $mimeType |
|
170 | - * @param string $prefix |
|
171 | - * @return ISimpleFile |
|
172 | - * @throws NotFoundException |
|
173 | - */ |
|
174 | - private function getMaxPreview(ISimpleFolder $previewFolder, File $file, $mimeType, $prefix) { |
|
175 | - $nodes = $previewFolder->getDirectoryListing(); |
|
176 | - |
|
177 | - foreach ($nodes as $node) { |
|
178 | - $name = $node->getName(); |
|
179 | - if (($prefix === '' || strpos($name, $prefix) === 0) && strpos($name, 'max')) { |
|
180 | - return $node; |
|
181 | - } |
|
182 | - } |
|
183 | - |
|
184 | - $previewProviders = $this->previewManager->getProviders(); |
|
185 | - foreach ($previewProviders as $supportedMimeType => $providers) { |
|
186 | - if (!preg_match($supportedMimeType, $mimeType)) { |
|
187 | - continue; |
|
188 | - } |
|
189 | - |
|
190 | - foreach ($providers as $providerClosure) { |
|
191 | - $provider = $this->helper->getProvider($providerClosure); |
|
192 | - if (!($provider instanceof IProviderV2)) { |
|
193 | - continue; |
|
194 | - } |
|
195 | - |
|
196 | - if (!$provider->isAvailable($file)) { |
|
197 | - continue; |
|
198 | - } |
|
199 | - |
|
200 | - $maxWidth = (int)$this->config->getSystemValue('preview_max_x', 4096); |
|
201 | - $maxHeight = (int)$this->config->getSystemValue('preview_max_y', 4096); |
|
202 | - |
|
203 | - $preview = $this->helper->getThumbnail($provider, $file, $maxWidth, $maxHeight); |
|
204 | - |
|
205 | - if (!($preview instanceof IImage)) { |
|
206 | - continue; |
|
207 | - } |
|
208 | - |
|
209 | - // Try to get the extention. |
|
210 | - try { |
|
211 | - $ext = $this->getExtention($preview->dataMimeType()); |
|
212 | - } catch (\InvalidArgumentException $e) { |
|
213 | - // Just continue to the next iteration if this preview doesn't have a valid mimetype |
|
214 | - continue; |
|
215 | - } |
|
216 | - |
|
217 | - $path = $prefix . (string)$preview->width() . '-' . (string)$preview->height() . '-max.' . $ext; |
|
218 | - try { |
|
219 | - $file = $previewFolder->newFile($path); |
|
220 | - $file->putContent($preview->data()); |
|
221 | - } catch (NotPermittedException $e) { |
|
222 | - throw new NotFoundException(); |
|
223 | - } |
|
224 | - |
|
225 | - return $file; |
|
226 | - } |
|
227 | - } |
|
228 | - |
|
229 | - throw new NotFoundException(); |
|
230 | - } |
|
231 | - |
|
232 | - /** |
|
233 | - * @param ISimpleFile $file |
|
234 | - * @param string $prefix |
|
235 | - * @return int[] |
|
236 | - */ |
|
237 | - private function getPreviewSize(ISimpleFile $file, string $prefix = '') { |
|
238 | - $size = explode('-', substr($file->getName(), strlen($prefix))); |
|
239 | - return [(int)$size[0], (int)$size[1]]; |
|
240 | - } |
|
241 | - |
|
242 | - /** |
|
243 | - * @param int $width |
|
244 | - * @param int $height |
|
245 | - * @param bool $crop |
|
246 | - * @param string $mimeType |
|
247 | - * @param string $prefix |
|
248 | - * @return string |
|
249 | - */ |
|
250 | - private function generatePath($width, $height, $crop, $mimeType, $prefix) { |
|
251 | - $path = $prefix . (string)$width . '-' . (string)$height; |
|
252 | - if ($crop) { |
|
253 | - $path .= '-crop'; |
|
254 | - } |
|
255 | - |
|
256 | - $ext = $this->getExtention($mimeType); |
|
257 | - $path .= '.' . $ext; |
|
258 | - return $path; |
|
259 | - } |
|
260 | - |
|
261 | - |
|
262 | - /** |
|
263 | - * @param int $width |
|
264 | - * @param int $height |
|
265 | - * @param bool $crop |
|
266 | - * @param string $mode |
|
267 | - * @param int $maxWidth |
|
268 | - * @param int $maxHeight |
|
269 | - * @return int[] |
|
270 | - */ |
|
271 | - private function calculateSize($width, $height, $crop, $mode, $maxWidth, $maxHeight) { |
|
272 | - |
|
273 | - /* |
|
45 | + /** @var IPreview */ |
|
46 | + private $previewManager; |
|
47 | + /** @var IConfig */ |
|
48 | + private $config; |
|
49 | + /** @var IAppData */ |
|
50 | + private $appData; |
|
51 | + /** @var GeneratorHelper */ |
|
52 | + private $helper; |
|
53 | + /** @var EventDispatcherInterface */ |
|
54 | + private $eventDispatcher; |
|
55 | + |
|
56 | + /** |
|
57 | + * @param IConfig $config |
|
58 | + * @param IPreview $previewManager |
|
59 | + * @param IAppData $appData |
|
60 | + * @param GeneratorHelper $helper |
|
61 | + * @param EventDispatcherInterface $eventDispatcher |
|
62 | + */ |
|
63 | + public function __construct( |
|
64 | + IConfig $config, |
|
65 | + IPreview $previewManager, |
|
66 | + IAppData $appData, |
|
67 | + GeneratorHelper $helper, |
|
68 | + EventDispatcherInterface $eventDispatcher |
|
69 | + ) { |
|
70 | + $this->config = $config; |
|
71 | + $this->previewManager = $previewManager; |
|
72 | + $this->appData = $appData; |
|
73 | + $this->helper = $helper; |
|
74 | + $this->eventDispatcher = $eventDispatcher; |
|
75 | + } |
|
76 | + |
|
77 | + /** |
|
78 | + * Returns a preview of a file |
|
79 | + * |
|
80 | + * The cache is searched first and if nothing usable was found then a preview is |
|
81 | + * generated by one of the providers |
|
82 | + * |
|
83 | + * @param File $file |
|
84 | + * @param int $width |
|
85 | + * @param int $height |
|
86 | + * @param bool $crop |
|
87 | + * @param string $mode |
|
88 | + * @param string $mimeType |
|
89 | + * @return ISimpleFile |
|
90 | + * @throws NotFoundException |
|
91 | + * @throws \InvalidArgumentException if the preview would be invalid (in case the original image is invalid) |
|
92 | + */ |
|
93 | + public function getPreview(File $file, $width = -1, $height = -1, $crop = false, $mode = IPreview::MODE_FILL, $mimeType = null) { |
|
94 | + //Make sure that we can read the file |
|
95 | + if (!$file->isReadable()) { |
|
96 | + throw new NotFoundException('Cannot read file'); |
|
97 | + } |
|
98 | + |
|
99 | + |
|
100 | + $this->eventDispatcher->dispatch( |
|
101 | + IPreview::EVENT, |
|
102 | + new GenericEvent($file, [ |
|
103 | + 'width' => $width, |
|
104 | + 'height' => $height, |
|
105 | + 'crop' => $crop, |
|
106 | + 'mode' => $mode |
|
107 | + ]) |
|
108 | + ); |
|
109 | + |
|
110 | + if ($mimeType === null) { |
|
111 | + $mimeType = $file->getMimeType(); |
|
112 | + } |
|
113 | + if (!$this->previewManager->isMimeSupported($mimeType)) { |
|
114 | + throw new NotFoundException(); |
|
115 | + } |
|
116 | + |
|
117 | + $previewFolder = $this->getPreviewFolder($file); |
|
118 | + |
|
119 | + $previewVersion = ''; |
|
120 | + if ($file instanceof IVersionedPreviewFile) { |
|
121 | + $previewVersion = $file->getPreviewVersion() . '-'; |
|
122 | + } |
|
123 | + |
|
124 | + // Get the max preview and infer the max preview sizes from that |
|
125 | + $maxPreview = $this->getMaxPreview($previewFolder, $file, $mimeType, $previewVersion); |
|
126 | + if ($maxPreview->getSize() === 0) { |
|
127 | + $maxPreview->delete(); |
|
128 | + throw new NotFoundException('Max preview size 0, invalid!'); |
|
129 | + } |
|
130 | + |
|
131 | + list($maxWidth, $maxHeight) = $this->getPreviewSize($maxPreview, $previewVersion); |
|
132 | + |
|
133 | + // If both width and heigth are -1 we just want the max preview |
|
134 | + if ($width === -1 && $height === -1) { |
|
135 | + $width = $maxWidth; |
|
136 | + $height = $maxHeight; |
|
137 | + } |
|
138 | + |
|
139 | + // Calculate the preview size |
|
140 | + list($width, $height) = $this->calculateSize($width, $height, $crop, $mode, $maxWidth, $maxHeight); |
|
141 | + |
|
142 | + // No need to generate a preview that is just the max preview |
|
143 | + if ($width === $maxWidth && $height === $maxHeight) { |
|
144 | + return $maxPreview; |
|
145 | + } |
|
146 | + |
|
147 | + // Try to get a cached preview. Else generate (and store) one |
|
148 | + try { |
|
149 | + try { |
|
150 | + $preview = $this->getCachedPreview($previewFolder, $width, $height, $crop, $maxPreview->getMimeType(), $previewVersion); |
|
151 | + } catch (NotFoundException $e) { |
|
152 | + $preview = $this->generatePreview($previewFolder, $maxPreview, $width, $height, $crop, $maxWidth, $maxHeight, $previewVersion); |
|
153 | + } |
|
154 | + } catch (\InvalidArgumentException $e) { |
|
155 | + throw new NotFoundException(); |
|
156 | + } |
|
157 | + |
|
158 | + if ($preview->getSize() === 0) { |
|
159 | + $preview->delete(); |
|
160 | + throw new NotFoundException('Cached preview size 0, invalid!'); |
|
161 | + } |
|
162 | + |
|
163 | + return $preview; |
|
164 | + } |
|
165 | + |
|
166 | + /** |
|
167 | + * @param ISimpleFolder $previewFolder |
|
168 | + * @param File $file |
|
169 | + * @param string $mimeType |
|
170 | + * @param string $prefix |
|
171 | + * @return ISimpleFile |
|
172 | + * @throws NotFoundException |
|
173 | + */ |
|
174 | + private function getMaxPreview(ISimpleFolder $previewFolder, File $file, $mimeType, $prefix) { |
|
175 | + $nodes = $previewFolder->getDirectoryListing(); |
|
176 | + |
|
177 | + foreach ($nodes as $node) { |
|
178 | + $name = $node->getName(); |
|
179 | + if (($prefix === '' || strpos($name, $prefix) === 0) && strpos($name, 'max')) { |
|
180 | + return $node; |
|
181 | + } |
|
182 | + } |
|
183 | + |
|
184 | + $previewProviders = $this->previewManager->getProviders(); |
|
185 | + foreach ($previewProviders as $supportedMimeType => $providers) { |
|
186 | + if (!preg_match($supportedMimeType, $mimeType)) { |
|
187 | + continue; |
|
188 | + } |
|
189 | + |
|
190 | + foreach ($providers as $providerClosure) { |
|
191 | + $provider = $this->helper->getProvider($providerClosure); |
|
192 | + if (!($provider instanceof IProviderV2)) { |
|
193 | + continue; |
|
194 | + } |
|
195 | + |
|
196 | + if (!$provider->isAvailable($file)) { |
|
197 | + continue; |
|
198 | + } |
|
199 | + |
|
200 | + $maxWidth = (int)$this->config->getSystemValue('preview_max_x', 4096); |
|
201 | + $maxHeight = (int)$this->config->getSystemValue('preview_max_y', 4096); |
|
202 | + |
|
203 | + $preview = $this->helper->getThumbnail($provider, $file, $maxWidth, $maxHeight); |
|
204 | + |
|
205 | + if (!($preview instanceof IImage)) { |
|
206 | + continue; |
|
207 | + } |
|
208 | + |
|
209 | + // Try to get the extention. |
|
210 | + try { |
|
211 | + $ext = $this->getExtention($preview->dataMimeType()); |
|
212 | + } catch (\InvalidArgumentException $e) { |
|
213 | + // Just continue to the next iteration if this preview doesn't have a valid mimetype |
|
214 | + continue; |
|
215 | + } |
|
216 | + |
|
217 | + $path = $prefix . (string)$preview->width() . '-' . (string)$preview->height() . '-max.' . $ext; |
|
218 | + try { |
|
219 | + $file = $previewFolder->newFile($path); |
|
220 | + $file->putContent($preview->data()); |
|
221 | + } catch (NotPermittedException $e) { |
|
222 | + throw new NotFoundException(); |
|
223 | + } |
|
224 | + |
|
225 | + return $file; |
|
226 | + } |
|
227 | + } |
|
228 | + |
|
229 | + throw new NotFoundException(); |
|
230 | + } |
|
231 | + |
|
232 | + /** |
|
233 | + * @param ISimpleFile $file |
|
234 | + * @param string $prefix |
|
235 | + * @return int[] |
|
236 | + */ |
|
237 | + private function getPreviewSize(ISimpleFile $file, string $prefix = '') { |
|
238 | + $size = explode('-', substr($file->getName(), strlen($prefix))); |
|
239 | + return [(int)$size[0], (int)$size[1]]; |
|
240 | + } |
|
241 | + |
|
242 | + /** |
|
243 | + * @param int $width |
|
244 | + * @param int $height |
|
245 | + * @param bool $crop |
|
246 | + * @param string $mimeType |
|
247 | + * @param string $prefix |
|
248 | + * @return string |
|
249 | + */ |
|
250 | + private function generatePath($width, $height, $crop, $mimeType, $prefix) { |
|
251 | + $path = $prefix . (string)$width . '-' . (string)$height; |
|
252 | + if ($crop) { |
|
253 | + $path .= '-crop'; |
|
254 | + } |
|
255 | + |
|
256 | + $ext = $this->getExtention($mimeType); |
|
257 | + $path .= '.' . $ext; |
|
258 | + return $path; |
|
259 | + } |
|
260 | + |
|
261 | + |
|
262 | + /** |
|
263 | + * @param int $width |
|
264 | + * @param int $height |
|
265 | + * @param bool $crop |
|
266 | + * @param string $mode |
|
267 | + * @param int $maxWidth |
|
268 | + * @param int $maxHeight |
|
269 | + * @return int[] |
|
270 | + */ |
|
271 | + private function calculateSize($width, $height, $crop, $mode, $maxWidth, $maxHeight) { |
|
272 | + |
|
273 | + /* |
|
274 | 274 | * If we are not cropping we have to make sure the requested image |
275 | 275 | * respects the aspect ratio of the original. |
276 | 276 | */ |
277 | - if (!$crop) { |
|
278 | - $ratio = $maxHeight / $maxWidth; |
|
277 | + if (!$crop) { |
|
278 | + $ratio = $maxHeight / $maxWidth; |
|
279 | 279 | |
280 | - if ($width === -1) { |
|
281 | - $width = $height / $ratio; |
|
282 | - } |
|
283 | - if ($height === -1) { |
|
284 | - $height = $width * $ratio; |
|
285 | - } |
|
280 | + if ($width === -1) { |
|
281 | + $width = $height / $ratio; |
|
282 | + } |
|
283 | + if ($height === -1) { |
|
284 | + $height = $width * $ratio; |
|
285 | + } |
|
286 | 286 | |
287 | - $ratioH = $height / $maxHeight; |
|
288 | - $ratioW = $width / $maxWidth; |
|
287 | + $ratioH = $height / $maxHeight; |
|
288 | + $ratioW = $width / $maxWidth; |
|
289 | 289 | |
290 | - /* |
|
290 | + /* |
|
291 | 291 | * Fill means that the $height and $width are the max |
292 | 292 | * Cover means min. |
293 | 293 | */ |
294 | - if ($mode === IPreview::MODE_FILL) { |
|
295 | - if ($ratioH > $ratioW) { |
|
296 | - $height = $width * $ratio; |
|
297 | - } else { |
|
298 | - $width = $height / $ratio; |
|
299 | - } |
|
300 | - } else if ($mode === IPreview::MODE_COVER) { |
|
301 | - if ($ratioH > $ratioW) { |
|
302 | - $width = $height / $ratio; |
|
303 | - } else { |
|
304 | - $height = $width * $ratio; |
|
305 | - } |
|
306 | - } |
|
307 | - } |
|
308 | - |
|
309 | - if ($height !== $maxHeight && $width !== $maxWidth) { |
|
310 | - /* |
|
294 | + if ($mode === IPreview::MODE_FILL) { |
|
295 | + if ($ratioH > $ratioW) { |
|
296 | + $height = $width * $ratio; |
|
297 | + } else { |
|
298 | + $width = $height / $ratio; |
|
299 | + } |
|
300 | + } else if ($mode === IPreview::MODE_COVER) { |
|
301 | + if ($ratioH > $ratioW) { |
|
302 | + $width = $height / $ratio; |
|
303 | + } else { |
|
304 | + $height = $width * $ratio; |
|
305 | + } |
|
306 | + } |
|
307 | + } |
|
308 | + |
|
309 | + if ($height !== $maxHeight && $width !== $maxWidth) { |
|
310 | + /* |
|
311 | 311 | * Scale to the nearest power of four |
312 | 312 | */ |
313 | - $pow4height = 4 ** ceil(log($height) / log(4)); |
|
314 | - $pow4width = 4 ** ceil(log($width) / log(4)); |
|
315 | - |
|
316 | - // Minimum size is 64 |
|
317 | - $pow4height = max($pow4height, 64); |
|
318 | - $pow4width = max($pow4width, 64); |
|
319 | - |
|
320 | - $ratioH = $height / $pow4height; |
|
321 | - $ratioW = $width / $pow4width; |
|
322 | - |
|
323 | - if ($ratioH < $ratioW) { |
|
324 | - $width = $pow4width; |
|
325 | - $height /= $ratioW; |
|
326 | - } else { |
|
327 | - $height = $pow4height; |
|
328 | - $width /= $ratioH; |
|
329 | - } |
|
330 | - } |
|
331 | - |
|
332 | - /* |
|
313 | + $pow4height = 4 ** ceil(log($height) / log(4)); |
|
314 | + $pow4width = 4 ** ceil(log($width) / log(4)); |
|
315 | + |
|
316 | + // Minimum size is 64 |
|
317 | + $pow4height = max($pow4height, 64); |
|
318 | + $pow4width = max($pow4width, 64); |
|
319 | + |
|
320 | + $ratioH = $height / $pow4height; |
|
321 | + $ratioW = $width / $pow4width; |
|
322 | + |
|
323 | + if ($ratioH < $ratioW) { |
|
324 | + $width = $pow4width; |
|
325 | + $height /= $ratioW; |
|
326 | + } else { |
|
327 | + $height = $pow4height; |
|
328 | + $width /= $ratioH; |
|
329 | + } |
|
330 | + } |
|
331 | + |
|
332 | + /* |
|
333 | 333 | * Make sure the requested height and width fall within the max |
334 | 334 | * of the preview. |
335 | 335 | */ |
336 | - if ($height > $maxHeight) { |
|
337 | - $ratio = $height / $maxHeight; |
|
338 | - $height = $maxHeight; |
|
339 | - $width /= $ratio; |
|
340 | - } |
|
341 | - if ($width > $maxWidth) { |
|
342 | - $ratio = $width / $maxWidth; |
|
343 | - $width = $maxWidth; |
|
344 | - $height /= $ratio; |
|
345 | - } |
|
346 | - |
|
347 | - return [(int)round($width), (int)round($height)]; |
|
348 | - } |
|
349 | - |
|
350 | - /** |
|
351 | - * @param ISimpleFolder $previewFolder |
|
352 | - * @param ISimpleFile $maxPreview |
|
353 | - * @param int $width |
|
354 | - * @param int $height |
|
355 | - * @param bool $crop |
|
356 | - * @param int $maxWidth |
|
357 | - * @param int $maxHeight |
|
358 | - * @param string $prefix |
|
359 | - * @return ISimpleFile |
|
360 | - * @throws NotFoundException |
|
361 | - * @throws \InvalidArgumentException if the preview would be invalid (in case the original image is invalid) |
|
362 | - */ |
|
363 | - private function generatePreview(ISimpleFolder $previewFolder, ISimpleFile $maxPreview, $width, $height, $crop, $maxWidth, $maxHeight, $prefix) { |
|
364 | - $preview = $this->helper->getImage($maxPreview); |
|
365 | - |
|
366 | - if (!$preview->valid()) { |
|
367 | - throw new \InvalidArgumentException('Failed to generate preview, failed to load image'); |
|
368 | - } |
|
369 | - |
|
370 | - if ($crop) { |
|
371 | - if ($height !== $preview->height() && $width !== $preview->width()) { |
|
372 | - //Resize |
|
373 | - $widthR = $preview->width() / $width; |
|
374 | - $heightR = $preview->height() / $height; |
|
375 | - |
|
376 | - if ($widthR > $heightR) { |
|
377 | - $scaleH = $height; |
|
378 | - $scaleW = $maxWidth / $heightR; |
|
379 | - } else { |
|
380 | - $scaleH = $maxHeight / $widthR; |
|
381 | - $scaleW = $width; |
|
382 | - } |
|
383 | - $preview->preciseResize((int)round($scaleW), (int)round($scaleH)); |
|
384 | - } |
|
385 | - $cropX = (int)floor(abs($width - $preview->width()) * 0.5); |
|
386 | - $cropY = (int)floor(abs($height - $preview->height()) * 0.5); |
|
387 | - $preview->crop($cropX, $cropY, $width, $height); |
|
388 | - } else { |
|
389 | - $preview->resize(max($width, $height)); |
|
390 | - } |
|
391 | - |
|
392 | - |
|
393 | - $path = $this->generatePath($width, $height, $crop, $preview->dataMimeType(), $prefix); |
|
394 | - try { |
|
395 | - $file = $previewFolder->newFile($path); |
|
396 | - $file->putContent($preview->data()); |
|
397 | - } catch (NotPermittedException $e) { |
|
398 | - throw new NotFoundException(); |
|
399 | - } |
|
400 | - |
|
401 | - return $file; |
|
402 | - } |
|
403 | - |
|
404 | - /** |
|
405 | - * @param ISimpleFolder $previewFolder |
|
406 | - * @param int $width |
|
407 | - * @param int $height |
|
408 | - * @param bool $crop |
|
409 | - * @param string $mimeType |
|
410 | - * @param string $prefix |
|
411 | - * @return ISimpleFile |
|
412 | - * |
|
413 | - * @throws NotFoundException |
|
414 | - */ |
|
415 | - private function getCachedPreview(ISimpleFolder $previewFolder, $width, $height, $crop, $mimeType, $prefix) { |
|
416 | - $path = $this->generatePath($width, $height, $crop, $mimeType, $prefix); |
|
417 | - |
|
418 | - return $previewFolder->getFile($path); |
|
419 | - } |
|
420 | - |
|
421 | - /** |
|
422 | - * Get the specific preview folder for this file |
|
423 | - * |
|
424 | - * @param File $file |
|
425 | - * @return ISimpleFolder |
|
426 | - */ |
|
427 | - private function getPreviewFolder(File $file) { |
|
428 | - try { |
|
429 | - $folder = $this->appData->getFolder($file->getId()); |
|
430 | - } catch (NotFoundException $e) { |
|
431 | - $folder = $this->appData->newFolder($file->getId()); |
|
432 | - } |
|
433 | - |
|
434 | - return $folder; |
|
435 | - } |
|
436 | - |
|
437 | - /** |
|
438 | - * @param string $mimeType |
|
439 | - * @return null|string |
|
440 | - * @throws \InvalidArgumentException |
|
441 | - */ |
|
442 | - private function getExtention($mimeType) { |
|
443 | - switch ($mimeType) { |
|
444 | - case 'image/png': |
|
445 | - return 'png'; |
|
446 | - case 'image/jpeg': |
|
447 | - return 'jpg'; |
|
448 | - case 'image/gif': |
|
449 | - return 'gif'; |
|
450 | - default: |
|
451 | - throw new \InvalidArgumentException('Not a valid mimetype'); |
|
452 | - } |
|
453 | - } |
|
336 | + if ($height > $maxHeight) { |
|
337 | + $ratio = $height / $maxHeight; |
|
338 | + $height = $maxHeight; |
|
339 | + $width /= $ratio; |
|
340 | + } |
|
341 | + if ($width > $maxWidth) { |
|
342 | + $ratio = $width / $maxWidth; |
|
343 | + $width = $maxWidth; |
|
344 | + $height /= $ratio; |
|
345 | + } |
|
346 | + |
|
347 | + return [(int)round($width), (int)round($height)]; |
|
348 | + } |
|
349 | + |
|
350 | + /** |
|
351 | + * @param ISimpleFolder $previewFolder |
|
352 | + * @param ISimpleFile $maxPreview |
|
353 | + * @param int $width |
|
354 | + * @param int $height |
|
355 | + * @param bool $crop |
|
356 | + * @param int $maxWidth |
|
357 | + * @param int $maxHeight |
|
358 | + * @param string $prefix |
|
359 | + * @return ISimpleFile |
|
360 | + * @throws NotFoundException |
|
361 | + * @throws \InvalidArgumentException if the preview would be invalid (in case the original image is invalid) |
|
362 | + */ |
|
363 | + private function generatePreview(ISimpleFolder $previewFolder, ISimpleFile $maxPreview, $width, $height, $crop, $maxWidth, $maxHeight, $prefix) { |
|
364 | + $preview = $this->helper->getImage($maxPreview); |
|
365 | + |
|
366 | + if (!$preview->valid()) { |
|
367 | + throw new \InvalidArgumentException('Failed to generate preview, failed to load image'); |
|
368 | + } |
|
369 | + |
|
370 | + if ($crop) { |
|
371 | + if ($height !== $preview->height() && $width !== $preview->width()) { |
|
372 | + //Resize |
|
373 | + $widthR = $preview->width() / $width; |
|
374 | + $heightR = $preview->height() / $height; |
|
375 | + |
|
376 | + if ($widthR > $heightR) { |
|
377 | + $scaleH = $height; |
|
378 | + $scaleW = $maxWidth / $heightR; |
|
379 | + } else { |
|
380 | + $scaleH = $maxHeight / $widthR; |
|
381 | + $scaleW = $width; |
|
382 | + } |
|
383 | + $preview->preciseResize((int)round($scaleW), (int)round($scaleH)); |
|
384 | + } |
|
385 | + $cropX = (int)floor(abs($width - $preview->width()) * 0.5); |
|
386 | + $cropY = (int)floor(abs($height - $preview->height()) * 0.5); |
|
387 | + $preview->crop($cropX, $cropY, $width, $height); |
|
388 | + } else { |
|
389 | + $preview->resize(max($width, $height)); |
|
390 | + } |
|
391 | + |
|
392 | + |
|
393 | + $path = $this->generatePath($width, $height, $crop, $preview->dataMimeType(), $prefix); |
|
394 | + try { |
|
395 | + $file = $previewFolder->newFile($path); |
|
396 | + $file->putContent($preview->data()); |
|
397 | + } catch (NotPermittedException $e) { |
|
398 | + throw new NotFoundException(); |
|
399 | + } |
|
400 | + |
|
401 | + return $file; |
|
402 | + } |
|
403 | + |
|
404 | + /** |
|
405 | + * @param ISimpleFolder $previewFolder |
|
406 | + * @param int $width |
|
407 | + * @param int $height |
|
408 | + * @param bool $crop |
|
409 | + * @param string $mimeType |
|
410 | + * @param string $prefix |
|
411 | + * @return ISimpleFile |
|
412 | + * |
|
413 | + * @throws NotFoundException |
|
414 | + */ |
|
415 | + private function getCachedPreview(ISimpleFolder $previewFolder, $width, $height, $crop, $mimeType, $prefix) { |
|
416 | + $path = $this->generatePath($width, $height, $crop, $mimeType, $prefix); |
|
417 | + |
|
418 | + return $previewFolder->getFile($path); |
|
419 | + } |
|
420 | + |
|
421 | + /** |
|
422 | + * Get the specific preview folder for this file |
|
423 | + * |
|
424 | + * @param File $file |
|
425 | + * @return ISimpleFolder |
|
426 | + */ |
|
427 | + private function getPreviewFolder(File $file) { |
|
428 | + try { |
|
429 | + $folder = $this->appData->getFolder($file->getId()); |
|
430 | + } catch (NotFoundException $e) { |
|
431 | + $folder = $this->appData->newFolder($file->getId()); |
|
432 | + } |
|
433 | + |
|
434 | + return $folder; |
|
435 | + } |
|
436 | + |
|
437 | + /** |
|
438 | + * @param string $mimeType |
|
439 | + * @return null|string |
|
440 | + * @throws \InvalidArgumentException |
|
441 | + */ |
|
442 | + private function getExtention($mimeType) { |
|
443 | + switch ($mimeType) { |
|
444 | + case 'image/png': |
|
445 | + return 'png'; |
|
446 | + case 'image/jpeg': |
|
447 | + return 'jpg'; |
|
448 | + case 'image/gif': |
|
449 | + return 'gif'; |
|
450 | + default: |
|
451 | + throw new \InvalidArgumentException('Not a valid mimetype'); |
|
452 | + } |
|
453 | + } |
|
454 | 454 | } |