Passed
Push — master ( 35fe1d...092ff4 )
by Joas
17:23 queued 13s
created
apps/dav/appinfo/v1/publicwebdav.php 1 patch
Indentation   +47 added lines, -47 removed lines patch added patch discarded remove patch
@@ -39,24 +39,24 @@  discard block
 block discarded – undo
39 39
 
40 40
 // Backends
41 41
 $authBackend = new OCA\DAV\Connector\PublicAuth(
42
-	\OC::$server->getRequest(),
43
-	\OC::$server->getShareManager(),
44
-	\OC::$server->getSession(),
45
-	\OC::$server->getBruteForceThrottler()
42
+    \OC::$server->getRequest(),
43
+    \OC::$server->getShareManager(),
44
+    \OC::$server->getSession(),
45
+    \OC::$server->getBruteForceThrottler()
46 46
 );
47 47
 $authPlugin = new \Sabre\DAV\Auth\Plugin($authBackend);
48 48
 
49 49
 $serverFactory = new OCA\DAV\Connector\Sabre\ServerFactory(
50
-	\OC::$server->getConfig(),
51
-	\OC::$server->getLogger(),
52
-	\OC::$server->getDatabaseConnection(),
53
-	\OC::$server->getUserSession(),
54
-	\OC::$server->getMountManager(),
55
-	\OC::$server->getTagManager(),
56
-	\OC::$server->getRequest(),
57
-	\OC::$server->getPreviewManager(),
58
-	\OC::$server->getEventDispatcher(),
59
-	\OC::$server->getL10N('dav')
50
+    \OC::$server->getConfig(),
51
+    \OC::$server->getLogger(),
52
+    \OC::$server->getDatabaseConnection(),
53
+    \OC::$server->getUserSession(),
54
+    \OC::$server->getMountManager(),
55
+    \OC::$server->getTagManager(),
56
+    \OC::$server->getRequest(),
57
+    \OC::$server->getPreviewManager(),
58
+    \OC::$server->getEventDispatcher(),
59
+    \OC::$server->getL10N('dav')
60 60
 );
61 61
 
62 62
 $requestUri = \OC::$server->getRequest()->getRequestUri();
@@ -65,45 +65,45 @@  discard block
 block discarded – undo
65 65
 $filesDropPlugin = new \OCA\DAV\Files\Sharing\FilesDropPlugin();
66 66
 
67 67
 $server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function (\Sabre\DAV\Server $server) use ($authBackend, $linkCheckPlugin, $filesDropPlugin) {
68
-	$isAjax = (isset($_SERVER['HTTP_X_REQUESTED_WITH']) && $_SERVER['HTTP_X_REQUESTED_WITH'] === 'XMLHttpRequest');
69
-	/** @var \OCA\FederatedFileSharing\FederatedShareProvider $shareProvider */
70
-	$federatedShareProvider = \OC::$server->query(\OCA\FederatedFileSharing\FederatedShareProvider::class);
71
-	if ($federatedShareProvider->isOutgoingServer2serverShareEnabled() === false && !$isAjax) {
72
-		// this is what is thrown when trying to access a non-existing share
73
-		throw new \Sabre\DAV\Exception\NotAuthenticated();
74
-	}
68
+    $isAjax = (isset($_SERVER['HTTP_X_REQUESTED_WITH']) && $_SERVER['HTTP_X_REQUESTED_WITH'] === 'XMLHttpRequest');
69
+    /** @var \OCA\FederatedFileSharing\FederatedShareProvider $shareProvider */
70
+    $federatedShareProvider = \OC::$server->query(\OCA\FederatedFileSharing\FederatedShareProvider::class);
71
+    if ($federatedShareProvider->isOutgoingServer2serverShareEnabled() === false && !$isAjax) {
72
+        // this is what is thrown when trying to access a non-existing share
73
+        throw new \Sabre\DAV\Exception\NotAuthenticated();
74
+    }
75 75
 
76
-	$share = $authBackend->getShare();
77
-	$owner = $share->getShareOwner();
78
-	$isReadable = $share->getPermissions() & \OCP\Constants::PERMISSION_READ;
79
-	$fileId = $share->getNodeId();
76
+    $share = $authBackend->getShare();
77
+    $owner = $share->getShareOwner();
78
+    $isReadable = $share->getPermissions() & \OCP\Constants::PERMISSION_READ;
79
+    $fileId = $share->getNodeId();
80 80
 
81
-	// FIXME: should not add storage wrappers outside of preSetup, need to find a better way
82
-	$previousLog = \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper(false);
83
-	\OC\Files\Filesystem::addStorageWrapper('sharePermissions', function ($mountPoint, $storage) use ($share) {
84
-		return new \OC\Files\Storage\Wrapper\PermissionsMask(['storage' => $storage, 'mask' => $share->getPermissions() | \OCP\Constants::PERMISSION_SHARE]);
85
-	});
86
-	\OC\Files\Filesystem::addStorageWrapper('shareOwner', function ($mountPoint, $storage) use ($share) {
87
-		return new \OCA\DAV\Storage\PublicOwnerWrapper(['storage' => $storage, 'owner' => $share->getShareOwner()]);
88
-	});
89
-	\OC\Files\Filesystem::logWarningWhenAddingStorageWrapper($previousLog);
81
+    // FIXME: should not add storage wrappers outside of preSetup, need to find a better way
82
+    $previousLog = \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper(false);
83
+    \OC\Files\Filesystem::addStorageWrapper('sharePermissions', function ($mountPoint, $storage) use ($share) {
84
+        return new \OC\Files\Storage\Wrapper\PermissionsMask(['storage' => $storage, 'mask' => $share->getPermissions() | \OCP\Constants::PERMISSION_SHARE]);
85
+    });
86
+    \OC\Files\Filesystem::addStorageWrapper('shareOwner', function ($mountPoint, $storage) use ($share) {
87
+        return new \OCA\DAV\Storage\PublicOwnerWrapper(['storage' => $storage, 'owner' => $share->getShareOwner()]);
88
+    });
89
+    \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper($previousLog);
90 90
 
91
-	OC_Util::tearDownFS();
92
-	OC_Util::setupFS($owner);
93
-	$ownerView = new \OC\Files\View('/'. $owner . '/files');
94
-	$path = $ownerView->getPath($fileId);
95
-	$fileInfo = $ownerView->getFileInfo($path);
96
-	$linkCheckPlugin->setFileInfo($fileInfo);
91
+    OC_Util::tearDownFS();
92
+    OC_Util::setupFS($owner);
93
+    $ownerView = new \OC\Files\View('/'. $owner . '/files');
94
+    $path = $ownerView->getPath($fileId);
95
+    $fileInfo = $ownerView->getFileInfo($path);
96
+    $linkCheckPlugin->setFileInfo($fileInfo);
97 97
 
98
-	// If not readble (files_drop) enable the filesdrop plugin
99
-	if (!$isReadable) {
100
-		$filesDropPlugin->enable();
101
-	}
98
+    // If not readble (files_drop) enable the filesdrop plugin
99
+    if (!$isReadable) {
100
+        $filesDropPlugin->enable();
101
+    }
102 102
 
103
-	$view = new \OC\Files\View($ownerView->getAbsolutePath($path));
104
-	$filesDropPlugin->setView($view);
103
+    $view = new \OC\Files\View($ownerView->getAbsolutePath($path));
104
+    $filesDropPlugin->setView($view);
105 105
 
106
-	return $view;
106
+    return $view;
107 107
 });
108 108
 
109 109
 $server->addPlugin($linkCheckPlugin);
Please login to merge, or discard this patch.
apps/dav/lib/Connector/PublicAuth.php 2 patches
Indentation   +101 added lines, -101 removed lines patch added patch discarded remove patch
@@ -43,105 +43,105 @@
 block discarded – undo
43 43
  * @package OCA\DAV\Connector
44 44
  */
45 45
 class PublicAuth extends AbstractBasic {
46
-	private const BRUTEFORCE_ACTION = 'public_webdav_auth';
47
-
48
-	/** @var \OCP\Share\IShare */
49
-	private $share;
50
-
51
-	/** @var IManager */
52
-	private $shareManager;
53
-
54
-	/** @var ISession */
55
-	private $session;
56
-
57
-	/** @var IRequest */
58
-	private $request;
59
-
60
-	/** @var Throttler */
61
-	private $throttler;
62
-
63
-	/**
64
-	 * @param IRequest $request
65
-	 * @param IManager $shareManager
66
-	 * @param ISession $session
67
-	 * @param Throttler $throttler
68
-	 */
69
-	public function __construct(IRequest $request,
70
-								IManager $shareManager,
71
-								ISession $session,
72
-								Throttler $throttler) {
73
-		$this->request = $request;
74
-		$this->shareManager = $shareManager;
75
-		$this->session = $session;
76
-		$this->throttler = $throttler;
77
-
78
-		// setup realm
79
-		$defaults = new \OCP\Defaults();
80
-		$this->realm = $defaults->getName();
81
-	}
82
-
83
-	/**
84
-	 * Validates a username and password
85
-	 *
86
-	 * This method should return true or false depending on if login
87
-	 * succeeded.
88
-	 *
89
-	 * @param string $username
90
-	 * @param string $password
91
-	 *
92
-	 * @return bool
93
-	 * @throws \Sabre\DAV\Exception\NotAuthenticated
94
-	 */
95
-	protected function validateUserPass($username, $password) {
96
-		$this->throttler->sleepDelayOrThrowOnMax($this->request->getRemoteAddress(), self::BRUTEFORCE_ACTION);
97
-
98
-		try {
99
-			$share = $this->shareManager->getShareByToken($username);
100
-		} catch (ShareNotFound $e) {
101
-			$this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
102
-			return false;
103
-		}
104
-
105
-		$this->share = $share;
106
-
107
-		\OC_User::setIncognitoMode(true);
108
-
109
-		// check if the share is password protected
110
-		if ($share->getPassword() !== null) {
111
-			if ($share->getShareType() === IShare::TYPE_LINK
112
-				|| $share->getShareType() === IShare::TYPE_EMAIL
113
-				|| $share->getShareType() === IShare::TYPE_CIRCLE) {
114
-				if ($this->shareManager->checkPassword($share, $password)) {
115
-					return true;
116
-				} elseif ($this->session->exists('public_link_authenticated')
117
-					&& $this->session->get('public_link_authenticated') === (string)$share->getId()) {
118
-					return true;
119
-				} else {
120
-					if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) {
121
-						// do not re-authenticate over ajax, use dummy auth name to prevent browser popup
122
-						http_response_code(401);
123
-						header('WWW-Authenticate: DummyBasic realm="' . $this->realm . '"');
124
-						throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls');
125
-					}
126
-
127
-					$this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
128
-					return false;
129
-				}
130
-			} elseif ($share->getShareType() === IShare::TYPE_REMOTE) {
131
-				return true;
132
-			} else {
133
-				$this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
134
-				return false;
135
-			}
136
-		} else {
137
-			return true;
138
-		}
139
-	}
140
-
141
-	/**
142
-	 * @return \OCP\Share\IShare
143
-	 */
144
-	public function getShare() {
145
-		return $this->share;
146
-	}
46
+    private const BRUTEFORCE_ACTION = 'public_webdav_auth';
47
+
48
+    /** @var \OCP\Share\IShare */
49
+    private $share;
50
+
51
+    /** @var IManager */
52
+    private $shareManager;
53
+
54
+    /** @var ISession */
55
+    private $session;
56
+
57
+    /** @var IRequest */
58
+    private $request;
59
+
60
+    /** @var Throttler */
61
+    private $throttler;
62
+
63
+    /**
64
+     * @param IRequest $request
65
+     * @param IManager $shareManager
66
+     * @param ISession $session
67
+     * @param Throttler $throttler
68
+     */
69
+    public function __construct(IRequest $request,
70
+                                IManager $shareManager,
71
+                                ISession $session,
72
+                                Throttler $throttler) {
73
+        $this->request = $request;
74
+        $this->shareManager = $shareManager;
75
+        $this->session = $session;
76
+        $this->throttler = $throttler;
77
+
78
+        // setup realm
79
+        $defaults = new \OCP\Defaults();
80
+        $this->realm = $defaults->getName();
81
+    }
82
+
83
+    /**
84
+     * Validates a username and password
85
+     *
86
+     * This method should return true or false depending on if login
87
+     * succeeded.
88
+     *
89
+     * @param string $username
90
+     * @param string $password
91
+     *
92
+     * @return bool
93
+     * @throws \Sabre\DAV\Exception\NotAuthenticated
94
+     */
95
+    protected function validateUserPass($username, $password) {
96
+        $this->throttler->sleepDelayOrThrowOnMax($this->request->getRemoteAddress(), self::BRUTEFORCE_ACTION);
97
+
98
+        try {
99
+            $share = $this->shareManager->getShareByToken($username);
100
+        } catch (ShareNotFound $e) {
101
+            $this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
102
+            return false;
103
+        }
104
+
105
+        $this->share = $share;
106
+
107
+        \OC_User::setIncognitoMode(true);
108
+
109
+        // check if the share is password protected
110
+        if ($share->getPassword() !== null) {
111
+            if ($share->getShareType() === IShare::TYPE_LINK
112
+                || $share->getShareType() === IShare::TYPE_EMAIL
113
+                || $share->getShareType() === IShare::TYPE_CIRCLE) {
114
+                if ($this->shareManager->checkPassword($share, $password)) {
115
+                    return true;
116
+                } elseif ($this->session->exists('public_link_authenticated')
117
+                    && $this->session->get('public_link_authenticated') === (string)$share->getId()) {
118
+                    return true;
119
+                } else {
120
+                    if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) {
121
+                        // do not re-authenticate over ajax, use dummy auth name to prevent browser popup
122
+                        http_response_code(401);
123
+                        header('WWW-Authenticate: DummyBasic realm="' . $this->realm . '"');
124
+                        throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls');
125
+                    }
126
+
127
+                    $this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
128
+                    return false;
129
+                }
130
+            } elseif ($share->getShareType() === IShare::TYPE_REMOTE) {
131
+                return true;
132
+            } else {
133
+                $this->throttler->registerAttempt(self::BRUTEFORCE_ACTION, $this->request->getRemoteAddress());
134
+                return false;
135
+            }
136
+        } else {
137
+            return true;
138
+        }
139
+    }
140
+
141
+    /**
142
+     * @return \OCP\Share\IShare
143
+     */
144
+    public function getShare() {
145
+        return $this->share;
146
+    }
147 147
 }
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -114,13 +114,13 @@
 block discarded – undo
114 114
 				if ($this->shareManager->checkPassword($share, $password)) {
115 115
 					return true;
116 116
 				} elseif ($this->session->exists('public_link_authenticated')
117
-					&& $this->session->get('public_link_authenticated') === (string)$share->getId()) {
117
+					&& $this->session->get('public_link_authenticated') === (string) $share->getId()) {
118 118
 					return true;
119 119
 				} else {
120 120
 					if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) {
121 121
 						// do not re-authenticate over ajax, use dummy auth name to prevent browser popup
122 122
 						http_response_code(401);
123
-						header('WWW-Authenticate: DummyBasic realm="' . $this->realm . '"');
123
+						header('WWW-Authenticate: DummyBasic realm="'.$this->realm.'"');
124 124
 						throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls');
125 125
 					}
126 126
 
Please login to merge, or discard this patch.