Completed
Pull Request — master (#9895)
by Björn
43:43 queued 13:05
created
apps/encryption/lib/Hooks/Contracts/IHook.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -24,10 +24,10 @@
 block discarded – undo
24 24
 
25 25
 
26 26
 interface IHook {
27
-	/**
28
-	 * Connects Hooks
29
-	 *
30
-	 * @return null
31
-	 */
32
-	public function addHooks();
27
+    /**
28
+     * Connects Hooks
29
+     *
30
+     * @return null
31
+     */
32
+    public function addHooks();
33 33
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Settings/Admin.php 1 patch
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -38,90 +38,90 @@
 block discarded – undo
38 38
 
39 39
 class Admin implements ISettings {
40 40
 
41
-	/** @var IL10N */
42
-	private $l;
43
-
44
-	/** @var ILogger */
45
-	private $logger;
46
-
47
-	/** @var IUserSession */
48
-	private $userSession;
49
-
50
-	/** @var IConfig */
51
-	private $config;
52
-
53
-	/** @var IUserManager */
54
-	private $userManager;
55
-
56
-	/** @var ISession */
57
-	private $session;
58
-
59
-	public function __construct(
60
-		IL10N $l,
61
-		ILogger $logger,
62
-		IUserSession $userSession,
63
-		IConfig $config,
64
-		IUserManager $userManager,
65
-		ISession $session
66
-	) {
67
-		$this->l = $l;
68
-		$this->logger = $logger;
69
-		$this->userSession = $userSession;
70
-		$this->config = $config;
71
-		$this->userManager = $userManager;
72
-		$this->session = $session;
73
-	}
74
-
75
-	/**
76
-	 * @return TemplateResponse
77
-	 */
78
-	public function getForm() {
79
-		$crypt = new Crypt(
80
-			$this->logger,
81
-			$this->userSession,
82
-			$this->config,
83
-			$this->l);
84
-
85
-		$util = new Util(
86
-			new View(),
87
-			$crypt,
88
-			$this->logger,
89
-			$this->userSession,
90
-			$this->config,
91
-			$this->userManager);
92
-
93
-		// Check if an adminRecovery account is enabled for recovering files after lost pwd
94
-		$recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
-		$session = new Session($this->session);
96
-
97
-		$encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
-
99
-		$parameters = [
100
-			'recoveryEnabled'    => $recoveryAdminEnabled,
101
-			'initStatus'         => $session->getStatus(),
102
-			'encryptHomeStorage' => $encryptHomeStorage,
103
-			'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
-		];
105
-
106
-		return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
-	}
108
-
109
-	/**
110
-	 * @return string the section ID, e.g. 'sharing'
111
-	 */
112
-	public function getSection() {
113
-		return 'encryption';
114
-	}
115
-
116
-	/**
117
-	 * @return int whether the form should be rather on the top or bottom of
118
-	 * the admin section. The forms are arranged in ascending order of the
119
-	 * priority values. It is required to return a value between 0 and 100.
120
-	 *
121
-	 * E.g.: 70
122
-	 */
123
-	public function getPriority() {
124
-		return 5;
125
-	}
41
+    /** @var IL10N */
42
+    private $l;
43
+
44
+    /** @var ILogger */
45
+    private $logger;
46
+
47
+    /** @var IUserSession */
48
+    private $userSession;
49
+
50
+    /** @var IConfig */
51
+    private $config;
52
+
53
+    /** @var IUserManager */
54
+    private $userManager;
55
+
56
+    /** @var ISession */
57
+    private $session;
58
+
59
+    public function __construct(
60
+        IL10N $l,
61
+        ILogger $logger,
62
+        IUserSession $userSession,
63
+        IConfig $config,
64
+        IUserManager $userManager,
65
+        ISession $session
66
+    ) {
67
+        $this->l = $l;
68
+        $this->logger = $logger;
69
+        $this->userSession = $userSession;
70
+        $this->config = $config;
71
+        $this->userManager = $userManager;
72
+        $this->session = $session;
73
+    }
74
+
75
+    /**
76
+     * @return TemplateResponse
77
+     */
78
+    public function getForm() {
79
+        $crypt = new Crypt(
80
+            $this->logger,
81
+            $this->userSession,
82
+            $this->config,
83
+            $this->l);
84
+
85
+        $util = new Util(
86
+            new View(),
87
+            $crypt,
88
+            $this->logger,
89
+            $this->userSession,
90
+            $this->config,
91
+            $this->userManager);
92
+
93
+        // Check if an adminRecovery account is enabled for recovering files after lost pwd
94
+        $recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
+        $session = new Session($this->session);
96
+
97
+        $encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
+
99
+        $parameters = [
100
+            'recoveryEnabled'    => $recoveryAdminEnabled,
101
+            'initStatus'         => $session->getStatus(),
102
+            'encryptHomeStorage' => $encryptHomeStorage,
103
+            'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
+        ];
105
+
106
+        return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
+    }
108
+
109
+    /**
110
+     * @return string the section ID, e.g. 'sharing'
111
+     */
112
+    public function getSection() {
113
+        return 'encryption';
114
+    }
115
+
116
+    /**
117
+     * @return int whether the form should be rather on the top or bottom of
118
+     * the admin section. The forms are arranged in ascending order of the
119
+     * priority values. It is required to return a value between 0 and 100.
120
+     *
121
+     * E.g.: 70
122
+     */
123
+    public function getPriority() {
124
+        return 5;
125
+    }
126 126
 
127 127
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/EncryptAll.php 2 patches
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
 		$this->input = $input;
134 134
 		$this->output = $output;
135 135
 
136
-		$headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
136
+		$headline = 'Encrypt all files with the '.Encryption::DISPLAY_NAME;
137 137
 		$this->output->writeln("\n");
138 138
 		$this->output->writeln($headline);
139 139
 		$this->output->writeln(str_pad('', strlen($headline), '='));
@@ -179,14 +179,14 @@  discard block
 block discarded – undo
179 179
 		$progress->setFormat(" %message% \n [%bar%]");
180 180
 		$progress->start();
181 181
 
182
-		foreach($this->userManager->getBackends() as $backend) {
182
+		foreach ($this->userManager->getBackends() as $backend) {
183 183
 			$limit = 500;
184 184
 			$offset = 0;
185 185
 			do {
186 186
 				$users = $backend->getUsers('', $limit, $offset);
187 187
 				foreach ($users as $user) {
188 188
 					if ($this->keyManager->userHasKeys($user) === false) {
189
-						$progress->setMessage('Create key-pair for ' . $user);
189
+						$progress->setMessage('Create key-pair for '.$user);
190 190
 						$progress->advance();
191 191
 						$this->setupUserFS($user);
192 192
 						$password = $this->generateOneTimePassword($user);
@@ -198,7 +198,7 @@  discard block
 block discarded – undo
198 198
 					}
199 199
 				}
200 200
 				$offset += $limit;
201
-			} while(count($users) >= $limit);
201
+			} while (count($users) >= $limit);
202 202
 		}
203 203
 
204 204
 		$progress->setMessage('Key-pair created for all users');
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
 	 */
237 237
 	protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
238 238
 		$userNo = 1;
239
-		foreach($this->userManager->getBackends() as $backend) {
239
+		foreach ($this->userManager->getBackends() as $backend) {
240 240
 			$limit = 500;
241 241
 			$offset = 0;
242 242
 			do {
@@ -247,7 +247,7 @@  discard block
 block discarded – undo
247 247
 					$userNo++;
248 248
 				}
249 249
 				$offset += $limit;
250
-			} while(count($users) >= $limit);
250
+			} while (count($users) >= $limit);
251 251
 		}
252 252
 	}
253 253
 
@@ -262,19 +262,19 @@  discard block
 block discarded – undo
262 262
 
263 263
 		$this->setupUserFS($uid);
264 264
 		$directories = array();
265
-		$directories[] =  '/' . $uid . '/files';
265
+		$directories[] = '/'.$uid.'/files';
266 266
 
267
-		while($root = array_pop($directories)) {
267
+		while ($root = array_pop($directories)) {
268 268
 			$content = $this->rootView->getDirectoryContent($root);
269 269
 			foreach ($content as $file) {
270
-				$path = $root . '/' . $file['name'];
270
+				$path = $root.'/'.$file['name'];
271 271
 				if ($this->rootView->is_dir($path)) {
272 272
 					$directories[] = $path;
273 273
 					continue;
274 274
 				} else {
275 275
 					$progress->setMessage("encrypt files for user $userCount: $path");
276 276
 					$progress->advance();
277
-					if($this->encryptFile($path) === false) {
277
+					if ($this->encryptFile($path) === false) {
278 278
 						$progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
279 279
 						$progress->advance();
280 280
 					}
@@ -292,7 +292,7 @@  discard block
 block discarded – undo
292 292
 	protected function encryptFile($path) {
293 293
 
294 294
 		$source = $path;
295
-		$target = $path . '.encrypted.' . time();
295
+		$target = $path.'.encrypted.'.time();
296 296
 
297 297
 		try {
298 298
 			$this->rootView->copy($source, $target);
@@ -414,7 +414,7 @@  discard block
 block discarded – undo
414 414
 					continue;
415 415
 				}
416 416
 
417
-				$subject = (string)$this->l->t('one-time password for server-side-encryption');
417
+				$subject = (string) $this->l->t('one-time password for server-side-encryption');
418 418
 				list($htmlBody, $textBody) = $this->createMailBody($password);
419 419
 
420 420
 				// send it out now
@@ -462,11 +462,11 @@  discard block
 block discarded – undo
462 462
 	protected function createMailBody($password) {
463 463
 
464 464
 		$html = new \OC_Template("encryption", "mail", "");
465
-		$html->assign ('password', $password);
465
+		$html->assign('password', $password);
466 466
 		$htmlMail = $html->fetchPage();
467 467
 
468 468
 		$plainText = new \OC_Template("encryption", "altmail", "");
469
-		$plainText->assign ('password', $password);
469
+		$plainText->assign('password', $password);
470 470
 		$plainTextMail = $plainText->fetchPage();
471 471
 
472 472
 		return [$htmlMail, $plainTextMail];
Please login to merge, or discard this patch.
Indentation   +429 added lines, -429 removed lines patch added patch discarded remove patch
@@ -45,434 +45,434 @@
 block discarded – undo
45 45
 
46 46
 class EncryptAll {
47 47
 
48
-	/** @var Setup */
49
-	protected $userSetup;
50
-
51
-	/** @var IUserManager */
52
-	protected $userManager;
53
-
54
-	/** @var View */
55
-	protected $rootView;
56
-
57
-	/** @var KeyManager */
58
-	protected $keyManager;
59
-
60
-	/** @var Util */
61
-	protected $util;
62
-
63
-	/** @var array  */
64
-	protected $userPasswords;
65
-
66
-	/** @var  IConfig */
67
-	protected $config;
68
-
69
-	/** @var IMailer */
70
-	protected $mailer;
71
-
72
-	/** @var  IL10N */
73
-	protected $l;
74
-
75
-	/** @var  QuestionHelper */
76
-	protected $questionHelper;
77
-
78
-	/** @var  OutputInterface */
79
-	protected $output;
80
-
81
-	/** @var  InputInterface */
82
-	protected $input;
83
-
84
-	/** @var ISecureRandom */
85
-	protected $secureRandom;
86
-
87
-	/**
88
-	 * @param Setup $userSetup
89
-	 * @param IUserManager $userManager
90
-	 * @param View $rootView
91
-	 * @param KeyManager $keyManager
92
-	 * @param Util $util
93
-	 * @param IConfig $config
94
-	 * @param IMailer $mailer
95
-	 * @param IL10N $l
96
-	 * @param QuestionHelper $questionHelper
97
-	 * @param ISecureRandom $secureRandom
98
-	 */
99
-	public function __construct(
100
-		Setup $userSetup,
101
-		IUserManager $userManager,
102
-		View $rootView,
103
-		KeyManager $keyManager,
104
-		Util $util,
105
-		IConfig $config,
106
-		IMailer $mailer,
107
-		IL10N $l,
108
-		QuestionHelper $questionHelper,
109
-		ISecureRandom $secureRandom
110
-	) {
111
-		$this->userSetup = $userSetup;
112
-		$this->userManager = $userManager;
113
-		$this->rootView = $rootView;
114
-		$this->keyManager = $keyManager;
115
-		$this->util = $util;
116
-		$this->config = $config;
117
-		$this->mailer = $mailer;
118
-		$this->l = $l;
119
-		$this->questionHelper = $questionHelper;
120
-		$this->secureRandom = $secureRandom;
121
-		// store one time passwords for the users
122
-		$this->userPasswords = array();
123
-	}
124
-
125
-	/**
126
-	 * start to encrypt all files
127
-	 *
128
-	 * @param InputInterface $input
129
-	 * @param OutputInterface $output
130
-	 */
131
-	public function encryptAll(InputInterface $input, OutputInterface $output) {
132
-
133
-		$this->input = $input;
134
-		$this->output = $output;
135
-
136
-		$headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
-		$this->output->writeln("\n");
138
-		$this->output->writeln($headline);
139
-		$this->output->writeln(str_pad('', strlen($headline), '='));
140
-		$this->output->writeln("\n");
141
-
142
-		if ($this->util->isMasterKeyEnabled()) {
143
-			$this->output->writeln('Use master key to encrypt all files.');
144
-			$this->keyManager->validateMasterKey();
145
-		} else {
146
-			//create private/public keys for each user and store the private key password
147
-			$this->output->writeln('Create key-pair for every user');
148
-			$this->output->writeln('------------------------------');
149
-			$this->output->writeln('');
150
-			$this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
-			$this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
-			$this->output->writeln('');
153
-			$this->createKeyPairs();
154
-		}
155
-
156
-
157
-		// output generated encryption key passwords
158
-		if ($this->util->isMasterKeyEnabled() === false) {
159
-			//send-out or display password list and write it to a file
160
-			$this->output->writeln("\n");
161
-			$this->output->writeln('Generated encryption key passwords');
162
-			$this->output->writeln('----------------------------------');
163
-			$this->output->writeln('');
164
-			$this->outputPasswords();
165
-		}
166
-
167
-		//setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
168
-		$this->output->writeln("\n");
169
-		$this->output->writeln('Start to encrypt users files');
170
-		$this->output->writeln('----------------------------');
171
-		$this->output->writeln('');
172
-		$this->encryptAllUsersFiles();
173
-		$this->output->writeln("\n");
174
-	}
175
-
176
-	/**
177
-	 * create key-pair for every user
178
-	 */
179
-	protected function createKeyPairs() {
180
-		$this->output->writeln("\n");
181
-		$progress = new ProgressBar($this->output);
182
-		$progress->setFormat(" %message% \n [%bar%]");
183
-		$progress->start();
184
-
185
-		foreach($this->userManager->getBackends() as $backend) {
186
-			$limit = 500;
187
-			$offset = 0;
188
-			do {
189
-				$users = $backend->getUsers('', $limit, $offset);
190
-				foreach ($users as $user) {
191
-					if ($this->keyManager->userHasKeys($user) === false) {
192
-						$progress->setMessage('Create key-pair for ' . $user);
193
-						$progress->advance();
194
-						$this->setupUserFS($user);
195
-						$password = $this->generateOneTimePassword($user);
196
-						$this->userSetup->setupUser($user, $password);
197
-					} else {
198
-						// users which already have a key-pair will be stored with a
199
-						// empty password and filtered out later
200
-						$this->userPasswords[$user] = '';
201
-					}
202
-				}
203
-				$offset += $limit;
204
-			} while(count($users) >= $limit);
205
-		}
206
-
207
-		$progress->setMessage('Key-pair created for all users');
208
-		$progress->finish();
209
-	}
210
-
211
-	/**
212
-	 * iterate over all user and encrypt their files
213
-	 */
214
-	protected function encryptAllUsersFiles() {
215
-		$this->output->writeln("\n");
216
-		$progress = new ProgressBar($this->output);
217
-		$progress->setFormat(" %message% \n [%bar%]");
218
-		$progress->start();
219
-		$numberOfUsers = count($this->userPasswords);
220
-		$userNo = 1;
221
-		if ($this->util->isMasterKeyEnabled()) {
222
-			$this->encryptAllUserFilesWithMasterKey($progress);
223
-		} else {
224
-			foreach ($this->userPasswords as $uid => $password) {
225
-				$userCount = "$uid ($userNo of $numberOfUsers)";
226
-				$this->encryptUsersFiles($uid, $progress, $userCount);
227
-				$userNo++;
228
-			}
229
-		}
230
-		$progress->setMessage("all files encrypted");
231
-		$progress->finish();
232
-
233
-	}
234
-
235
-	/**
236
-	 * encrypt all user files with the master key
237
-	 *
238
-	 * @param ProgressBar $progress
239
-	 */
240
-	protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
241
-		$userNo = 1;
242
-		foreach($this->userManager->getBackends() as $backend) {
243
-			$limit = 500;
244
-			$offset = 0;
245
-			do {
246
-				$users = $backend->getUsers('', $limit, $offset);
247
-				foreach ($users as $user) {
248
-					$userCount = "$user ($userNo)";
249
-					$this->encryptUsersFiles($user, $progress, $userCount);
250
-					$userNo++;
251
-				}
252
-				$offset += $limit;
253
-			} while(count($users) >= $limit);
254
-		}
255
-	}
256
-
257
-	/**
258
-	 * encrypt files from the given user
259
-	 *
260
-	 * @param string $uid
261
-	 * @param ProgressBar $progress
262
-	 * @param string $userCount
263
-	 */
264
-	protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
265
-
266
-		$this->setupUserFS($uid);
267
-		$directories = array();
268
-		$directories[] =  '/' . $uid . '/files';
269
-
270
-		while($root = array_pop($directories)) {
271
-			$content = $this->rootView->getDirectoryContent($root);
272
-			foreach ($content as $file) {
273
-				$path = $root . '/' . $file['name'];
274
-				if ($this->rootView->is_dir($path)) {
275
-					$directories[] = $path;
276
-					continue;
277
-				} else {
278
-					$progress->setMessage("encrypt files for user $userCount: $path");
279
-					$progress->advance();
280
-					if($this->encryptFile($path) === false) {
281
-						$progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
282
-						$progress->advance();
283
-					}
284
-				}
285
-			}
286
-		}
287
-	}
288
-
289
-	/**
290
-	 * encrypt file
291
-	 *
292
-	 * @param string $path
293
-	 * @return bool
294
-	 */
295
-	protected function encryptFile($path) {
296
-
297
-		$source = $path;
298
-		$target = $path . '.encrypted.' . time();
299
-
300
-		try {
301
-			$this->rootView->copy($source, $target);
302
-			$this->rootView->rename($target, $source);
303
-		} catch (DecryptionFailedException $e) {
304
-			if ($this->rootView->file_exists($target)) {
305
-				$this->rootView->unlink($target);
306
-			}
307
-			return false;
308
-		}
309
-
310
-		return true;
311
-	}
312
-
313
-	/**
314
-	 * output one-time encryption passwords
315
-	 */
316
-	protected function outputPasswords() {
317
-		$table = new Table($this->output);
318
-		$table->setHeaders(array('Username', 'Private key password'));
319
-
320
-		//create rows
321
-		$newPasswords = array();
322
-		$unchangedPasswords = array();
323
-		foreach ($this->userPasswords as $uid => $password) {
324
-			if (empty($password)) {
325
-				$unchangedPasswords[] = $uid;
326
-			} else {
327
-				$newPasswords[] = [$uid, $password];
328
-			}
329
-		}
330
-
331
-		if (empty($newPasswords)) {
332
-			$this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
333
-			return;
334
-		}
335
-
336
-		$table->setRows($newPasswords);
337
-		$table->render();
338
-
339
-		if (!empty($unchangedPasswords)) {
340
-			$this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
341
-			foreach ($unchangedPasswords as $uid) {
342
-				$this->output->writeln("    $uid");
343
-			}
344
-		}
345
-
346
-		$this->writePasswordsToFile($newPasswords);
347
-
348
-		$this->output->writeln('');
349
-		$question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
350
-		if ($this->questionHelper->ask($this->input, $this->output, $question)) {
351
-			$this->sendPasswordsByMail();
352
-		}
353
-	}
354
-
355
-	/**
356
-	 * write one-time encryption passwords to a csv file
357
-	 *
358
-	 * @param array $passwords
359
-	 */
360
-	protected function writePasswordsToFile(array $passwords) {
361
-		$fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
362
-		foreach ($passwords as $pwd) {
363
-			fputcsv($fp, $pwd);
364
-		}
365
-		fclose($fp);
366
-		$this->output->writeln("\n");
367
-		$this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
368
-		$this->output->writeln('');
369
-		$this->output->writeln('Each of these users need to login to the web interface, go to the');
370
-		$this->output->writeln('personal settings section "basic encryption module" and');
371
-		$this->output->writeln('update the private key password to match the login password again by');
372
-		$this->output->writeln('entering the one-time password into the "old log-in password" field');
373
-		$this->output->writeln('and their current login password');
374
-	}
375
-
376
-	/**
377
-	 * setup user file system
378
-	 *
379
-	 * @param string $uid
380
-	 */
381
-	protected function setupUserFS($uid) {
382
-		\OC_Util::tearDownFS();
383
-		\OC_Util::setupFS($uid);
384
-	}
385
-
386
-	/**
387
-	 * generate one time password for the user and store it in a array
388
-	 *
389
-	 * @param string $uid
390
-	 * @return string password
391
-	 */
392
-	protected function generateOneTimePassword($uid) {
393
-		$password = $this->secureRandom->generate(8);
394
-		$this->userPasswords[$uid] = $password;
395
-		return $password;
396
-	}
397
-
398
-	/**
399
-	 * send encryption key passwords to the users by mail
400
-	 */
401
-	protected function sendPasswordsByMail() {
402
-		$noMail = [];
403
-
404
-		$this->output->writeln('');
405
-		$progress = new ProgressBar($this->output, count($this->userPasswords));
406
-		$progress->start();
407
-
408
-		foreach ($this->userPasswords as $uid => $password) {
409
-			$progress->advance();
410
-			if (!empty($password)) {
411
-				$recipient = $this->userManager->get($uid);
412
-				$recipientDisplayName = $recipient->getDisplayName();
413
-				$to = $recipient->getEMailAddress();
414
-
415
-				if ($to === '') {
416
-					$noMail[] = $uid;
417
-					continue;
418
-				}
419
-
420
-				$subject = (string)$this->l->t('one-time password for server-side-encryption');
421
-				list($htmlBody, $textBody) = $this->createMailBody($password);
422
-
423
-				// send it out now
424
-				try {
425
-					$message = $this->mailer->createMessage();
426
-					$message->setSubject($subject);
427
-					$message->setTo([$to => $recipientDisplayName]);
428
-					$message->setHtmlBody($htmlBody);
429
-					$message->setPlainBody($textBody);
430
-					$message->setFrom([
431
-						\OCP\Util::getDefaultEmailAddress('admin-noreply')
432
-					]);
433
-
434
-					$this->mailer->send($message);
435
-				} catch (\Exception $e) {
436
-					$noMail[] = $uid;
437
-				}
438
-			}
439
-		}
440
-
441
-		$progress->finish();
442
-
443
-		if (empty($noMail)) {
444
-			$this->output->writeln("\n\nPassword successfully send to all users");
445
-		} else {
446
-			$table = new Table($this->output);
447
-			$table->setHeaders(array('Username', 'Private key password'));
448
-			$this->output->writeln("\n\nCould not send password to following users:\n");
449
-			$rows = [];
450
-			foreach ($noMail as $uid) {
451
-				$rows[] = [$uid, $this->userPasswords[$uid]];
452
-			}
453
-			$table->setRows($rows);
454
-			$table->render();
455
-		}
456
-
457
-	}
458
-
459
-	/**
460
-	 * create mail body for plain text and html mail
461
-	 *
462
-	 * @param string $password one-time encryption password
463
-	 * @return array an array of the html mail body and the plain text mail body
464
-	 */
465
-	protected function createMailBody($password) {
466
-
467
-		$html = new \OC_Template("encryption", "mail", "");
468
-		$html->assign ('password', $password);
469
-		$htmlMail = $html->fetchPage();
470
-
471
-		$plainText = new \OC_Template("encryption", "altmail", "");
472
-		$plainText->assign ('password', $password);
473
-		$plainTextMail = $plainText->fetchPage();
474
-
475
-		return [$htmlMail, $plainTextMail];
476
-	}
48
+    /** @var Setup */
49
+    protected $userSetup;
50
+
51
+    /** @var IUserManager */
52
+    protected $userManager;
53
+
54
+    /** @var View */
55
+    protected $rootView;
56
+
57
+    /** @var KeyManager */
58
+    protected $keyManager;
59
+
60
+    /** @var Util */
61
+    protected $util;
62
+
63
+    /** @var array  */
64
+    protected $userPasswords;
65
+
66
+    /** @var  IConfig */
67
+    protected $config;
68
+
69
+    /** @var IMailer */
70
+    protected $mailer;
71
+
72
+    /** @var  IL10N */
73
+    protected $l;
74
+
75
+    /** @var  QuestionHelper */
76
+    protected $questionHelper;
77
+
78
+    /** @var  OutputInterface */
79
+    protected $output;
80
+
81
+    /** @var  InputInterface */
82
+    protected $input;
83
+
84
+    /** @var ISecureRandom */
85
+    protected $secureRandom;
86
+
87
+    /**
88
+     * @param Setup $userSetup
89
+     * @param IUserManager $userManager
90
+     * @param View $rootView
91
+     * @param KeyManager $keyManager
92
+     * @param Util $util
93
+     * @param IConfig $config
94
+     * @param IMailer $mailer
95
+     * @param IL10N $l
96
+     * @param QuestionHelper $questionHelper
97
+     * @param ISecureRandom $secureRandom
98
+     */
99
+    public function __construct(
100
+        Setup $userSetup,
101
+        IUserManager $userManager,
102
+        View $rootView,
103
+        KeyManager $keyManager,
104
+        Util $util,
105
+        IConfig $config,
106
+        IMailer $mailer,
107
+        IL10N $l,
108
+        QuestionHelper $questionHelper,
109
+        ISecureRandom $secureRandom
110
+    ) {
111
+        $this->userSetup = $userSetup;
112
+        $this->userManager = $userManager;
113
+        $this->rootView = $rootView;
114
+        $this->keyManager = $keyManager;
115
+        $this->util = $util;
116
+        $this->config = $config;
117
+        $this->mailer = $mailer;
118
+        $this->l = $l;
119
+        $this->questionHelper = $questionHelper;
120
+        $this->secureRandom = $secureRandom;
121
+        // store one time passwords for the users
122
+        $this->userPasswords = array();
123
+    }
124
+
125
+    /**
126
+     * start to encrypt all files
127
+     *
128
+     * @param InputInterface $input
129
+     * @param OutputInterface $output
130
+     */
131
+    public function encryptAll(InputInterface $input, OutputInterface $output) {
132
+
133
+        $this->input = $input;
134
+        $this->output = $output;
135
+
136
+        $headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
+        $this->output->writeln("\n");
138
+        $this->output->writeln($headline);
139
+        $this->output->writeln(str_pad('', strlen($headline), '='));
140
+        $this->output->writeln("\n");
141
+
142
+        if ($this->util->isMasterKeyEnabled()) {
143
+            $this->output->writeln('Use master key to encrypt all files.');
144
+            $this->keyManager->validateMasterKey();
145
+        } else {
146
+            //create private/public keys for each user and store the private key password
147
+            $this->output->writeln('Create key-pair for every user');
148
+            $this->output->writeln('------------------------------');
149
+            $this->output->writeln('');
150
+            $this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
+            $this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
+            $this->output->writeln('');
153
+            $this->createKeyPairs();
154
+        }
155
+
156
+
157
+        // output generated encryption key passwords
158
+        if ($this->util->isMasterKeyEnabled() === false) {
159
+            //send-out or display password list and write it to a file
160
+            $this->output->writeln("\n");
161
+            $this->output->writeln('Generated encryption key passwords');
162
+            $this->output->writeln('----------------------------------');
163
+            $this->output->writeln('');
164
+            $this->outputPasswords();
165
+        }
166
+
167
+        //setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
168
+        $this->output->writeln("\n");
169
+        $this->output->writeln('Start to encrypt users files');
170
+        $this->output->writeln('----------------------------');
171
+        $this->output->writeln('');
172
+        $this->encryptAllUsersFiles();
173
+        $this->output->writeln("\n");
174
+    }
175
+
176
+    /**
177
+     * create key-pair for every user
178
+     */
179
+    protected function createKeyPairs() {
180
+        $this->output->writeln("\n");
181
+        $progress = new ProgressBar($this->output);
182
+        $progress->setFormat(" %message% \n [%bar%]");
183
+        $progress->start();
184
+
185
+        foreach($this->userManager->getBackends() as $backend) {
186
+            $limit = 500;
187
+            $offset = 0;
188
+            do {
189
+                $users = $backend->getUsers('', $limit, $offset);
190
+                foreach ($users as $user) {
191
+                    if ($this->keyManager->userHasKeys($user) === false) {
192
+                        $progress->setMessage('Create key-pair for ' . $user);
193
+                        $progress->advance();
194
+                        $this->setupUserFS($user);
195
+                        $password = $this->generateOneTimePassword($user);
196
+                        $this->userSetup->setupUser($user, $password);
197
+                    } else {
198
+                        // users which already have a key-pair will be stored with a
199
+                        // empty password and filtered out later
200
+                        $this->userPasswords[$user] = '';
201
+                    }
202
+                }
203
+                $offset += $limit;
204
+            } while(count($users) >= $limit);
205
+        }
206
+
207
+        $progress->setMessage('Key-pair created for all users');
208
+        $progress->finish();
209
+    }
210
+
211
+    /**
212
+     * iterate over all user and encrypt their files
213
+     */
214
+    protected function encryptAllUsersFiles() {
215
+        $this->output->writeln("\n");
216
+        $progress = new ProgressBar($this->output);
217
+        $progress->setFormat(" %message% \n [%bar%]");
218
+        $progress->start();
219
+        $numberOfUsers = count($this->userPasswords);
220
+        $userNo = 1;
221
+        if ($this->util->isMasterKeyEnabled()) {
222
+            $this->encryptAllUserFilesWithMasterKey($progress);
223
+        } else {
224
+            foreach ($this->userPasswords as $uid => $password) {
225
+                $userCount = "$uid ($userNo of $numberOfUsers)";
226
+                $this->encryptUsersFiles($uid, $progress, $userCount);
227
+                $userNo++;
228
+            }
229
+        }
230
+        $progress->setMessage("all files encrypted");
231
+        $progress->finish();
232
+
233
+    }
234
+
235
+    /**
236
+     * encrypt all user files with the master key
237
+     *
238
+     * @param ProgressBar $progress
239
+     */
240
+    protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
241
+        $userNo = 1;
242
+        foreach($this->userManager->getBackends() as $backend) {
243
+            $limit = 500;
244
+            $offset = 0;
245
+            do {
246
+                $users = $backend->getUsers('', $limit, $offset);
247
+                foreach ($users as $user) {
248
+                    $userCount = "$user ($userNo)";
249
+                    $this->encryptUsersFiles($user, $progress, $userCount);
250
+                    $userNo++;
251
+                }
252
+                $offset += $limit;
253
+            } while(count($users) >= $limit);
254
+        }
255
+    }
256
+
257
+    /**
258
+     * encrypt files from the given user
259
+     *
260
+     * @param string $uid
261
+     * @param ProgressBar $progress
262
+     * @param string $userCount
263
+     */
264
+    protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
265
+
266
+        $this->setupUserFS($uid);
267
+        $directories = array();
268
+        $directories[] =  '/' . $uid . '/files';
269
+
270
+        while($root = array_pop($directories)) {
271
+            $content = $this->rootView->getDirectoryContent($root);
272
+            foreach ($content as $file) {
273
+                $path = $root . '/' . $file['name'];
274
+                if ($this->rootView->is_dir($path)) {
275
+                    $directories[] = $path;
276
+                    continue;
277
+                } else {
278
+                    $progress->setMessage("encrypt files for user $userCount: $path");
279
+                    $progress->advance();
280
+                    if($this->encryptFile($path) === false) {
281
+                        $progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
282
+                        $progress->advance();
283
+                    }
284
+                }
285
+            }
286
+        }
287
+    }
288
+
289
+    /**
290
+     * encrypt file
291
+     *
292
+     * @param string $path
293
+     * @return bool
294
+     */
295
+    protected function encryptFile($path) {
296
+
297
+        $source = $path;
298
+        $target = $path . '.encrypted.' . time();
299
+
300
+        try {
301
+            $this->rootView->copy($source, $target);
302
+            $this->rootView->rename($target, $source);
303
+        } catch (DecryptionFailedException $e) {
304
+            if ($this->rootView->file_exists($target)) {
305
+                $this->rootView->unlink($target);
306
+            }
307
+            return false;
308
+        }
309
+
310
+        return true;
311
+    }
312
+
313
+    /**
314
+     * output one-time encryption passwords
315
+     */
316
+    protected function outputPasswords() {
317
+        $table = new Table($this->output);
318
+        $table->setHeaders(array('Username', 'Private key password'));
319
+
320
+        //create rows
321
+        $newPasswords = array();
322
+        $unchangedPasswords = array();
323
+        foreach ($this->userPasswords as $uid => $password) {
324
+            if (empty($password)) {
325
+                $unchangedPasswords[] = $uid;
326
+            } else {
327
+                $newPasswords[] = [$uid, $password];
328
+            }
329
+        }
330
+
331
+        if (empty($newPasswords)) {
332
+            $this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
333
+            return;
334
+        }
335
+
336
+        $table->setRows($newPasswords);
337
+        $table->render();
338
+
339
+        if (!empty($unchangedPasswords)) {
340
+            $this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
341
+            foreach ($unchangedPasswords as $uid) {
342
+                $this->output->writeln("    $uid");
343
+            }
344
+        }
345
+
346
+        $this->writePasswordsToFile($newPasswords);
347
+
348
+        $this->output->writeln('');
349
+        $question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
350
+        if ($this->questionHelper->ask($this->input, $this->output, $question)) {
351
+            $this->sendPasswordsByMail();
352
+        }
353
+    }
354
+
355
+    /**
356
+     * write one-time encryption passwords to a csv file
357
+     *
358
+     * @param array $passwords
359
+     */
360
+    protected function writePasswordsToFile(array $passwords) {
361
+        $fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
362
+        foreach ($passwords as $pwd) {
363
+            fputcsv($fp, $pwd);
364
+        }
365
+        fclose($fp);
366
+        $this->output->writeln("\n");
367
+        $this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
368
+        $this->output->writeln('');
369
+        $this->output->writeln('Each of these users need to login to the web interface, go to the');
370
+        $this->output->writeln('personal settings section "basic encryption module" and');
371
+        $this->output->writeln('update the private key password to match the login password again by');
372
+        $this->output->writeln('entering the one-time password into the "old log-in password" field');
373
+        $this->output->writeln('and their current login password');
374
+    }
375
+
376
+    /**
377
+     * setup user file system
378
+     *
379
+     * @param string $uid
380
+     */
381
+    protected function setupUserFS($uid) {
382
+        \OC_Util::tearDownFS();
383
+        \OC_Util::setupFS($uid);
384
+    }
385
+
386
+    /**
387
+     * generate one time password for the user and store it in a array
388
+     *
389
+     * @param string $uid
390
+     * @return string password
391
+     */
392
+    protected function generateOneTimePassword($uid) {
393
+        $password = $this->secureRandom->generate(8);
394
+        $this->userPasswords[$uid] = $password;
395
+        return $password;
396
+    }
397
+
398
+    /**
399
+     * send encryption key passwords to the users by mail
400
+     */
401
+    protected function sendPasswordsByMail() {
402
+        $noMail = [];
403
+
404
+        $this->output->writeln('');
405
+        $progress = new ProgressBar($this->output, count($this->userPasswords));
406
+        $progress->start();
407
+
408
+        foreach ($this->userPasswords as $uid => $password) {
409
+            $progress->advance();
410
+            if (!empty($password)) {
411
+                $recipient = $this->userManager->get($uid);
412
+                $recipientDisplayName = $recipient->getDisplayName();
413
+                $to = $recipient->getEMailAddress();
414
+
415
+                if ($to === '') {
416
+                    $noMail[] = $uid;
417
+                    continue;
418
+                }
419
+
420
+                $subject = (string)$this->l->t('one-time password for server-side-encryption');
421
+                list($htmlBody, $textBody) = $this->createMailBody($password);
422
+
423
+                // send it out now
424
+                try {
425
+                    $message = $this->mailer->createMessage();
426
+                    $message->setSubject($subject);
427
+                    $message->setTo([$to => $recipientDisplayName]);
428
+                    $message->setHtmlBody($htmlBody);
429
+                    $message->setPlainBody($textBody);
430
+                    $message->setFrom([
431
+                        \OCP\Util::getDefaultEmailAddress('admin-noreply')
432
+                    ]);
433
+
434
+                    $this->mailer->send($message);
435
+                } catch (\Exception $e) {
436
+                    $noMail[] = $uid;
437
+                }
438
+            }
439
+        }
440
+
441
+        $progress->finish();
442
+
443
+        if (empty($noMail)) {
444
+            $this->output->writeln("\n\nPassword successfully send to all users");
445
+        } else {
446
+            $table = new Table($this->output);
447
+            $table->setHeaders(array('Username', 'Private key password'));
448
+            $this->output->writeln("\n\nCould not send password to following users:\n");
449
+            $rows = [];
450
+            foreach ($noMail as $uid) {
451
+                $rows[] = [$uid, $this->userPasswords[$uid]];
452
+            }
453
+            $table->setRows($rows);
454
+            $table->render();
455
+        }
456
+
457
+    }
458
+
459
+    /**
460
+     * create mail body for plain text and html mail
461
+     *
462
+     * @param string $password one-time encryption password
463
+     * @return array an array of the html mail body and the plain text mail body
464
+     */
465
+    protected function createMailBody($password) {
466
+
467
+        $html = new \OC_Template("encryption", "mail", "");
468
+        $html->assign ('password', $password);
469
+        $htmlMail = $html->fetchPage();
470
+
471
+        $plainText = new \OC_Template("encryption", "altmail", "");
472
+        $plainText->assign ('password', $password);
473
+        $plainTextMail = $plainText->fetchPage();
474
+
475
+        return [$htmlMail, $plainTextMail];
476
+    }
477 477
 
478 478
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/DecryptAll.php 2 patches
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -35,127 +35,127 @@
 block discarded – undo
35 35
 
36 36
 class DecryptAll {
37 37
 
38
-	/** @var Util  */
39
-	protected $util;
40
-
41
-	/** @var QuestionHelper  */
42
-	protected $questionHelper;
43
-
44
-	/** @var  Crypt */
45
-	protected $crypt;
46
-
47
-	/** @var  KeyManager */
48
-	protected $keyManager;
49
-
50
-	/** @var Session  */
51
-	protected $session;
52
-
53
-	/**
54
-	 * @param Util $util
55
-	 * @param KeyManager $keyManager
56
-	 * @param Crypt $crypt
57
-	 * @param Session $session
58
-	 * @param QuestionHelper $questionHelper
59
-	 */
60
-	public function __construct(
61
-		Util $util,
62
-		KeyManager $keyManager,
63
-		Crypt $crypt,
64
-		Session $session,
65
-		QuestionHelper $questionHelper
66
-	) {
67
-		$this->util = $util;
68
-		$this->keyManager = $keyManager;
69
-		$this->crypt = $crypt;
70
-		$this->session = $session;
71
-		$this->questionHelper = $questionHelper;
72
-	}
73
-
74
-	/**
75
-	 * prepare encryption module to decrypt all files
76
-	 *
77
-	 * @param InputInterface $input
78
-	 * @param OutputInterface $output
79
-	 * @param $user
80
-	 * @return bool
81
-	 */
82
-	public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
-
84
-		$question = new Question('Please enter the recovery key password: ');
85
-
86
-		if($this->util->isMasterKeyEnabled()) {
87
-			$output->writeln('Use master key to decrypt all files');
88
-			$user = $this->keyManager->getMasterKeyId();
89
-			$password =$this->keyManager->getMasterKeyPassword();
90
-		} else {
91
-			$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
-			if (!empty($user)) {
93
-				$output->writeln('You can only decrypt the users files if you know');
94
-				$output->writeln('the users password or if he activated the recovery key.');
95
-				$output->writeln('');
96
-				$questionUseLoginPassword = new ConfirmationQuestion(
97
-					'Do you want to use the users login password to decrypt all files? (y/n) ',
98
-					false
99
-				);
100
-				$useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
-				if ($useLoginPassword) {
102
-					$question = new Question('Please enter the user\'s login password: ');
103
-				} else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
-					$output->writeln('No recovery key available for user ' . $user);
105
-					return false;
106
-				} else {
107
-					$user = $recoveryKeyId;
108
-				}
109
-			} else {
110
-				$output->writeln('You can only decrypt the files of all users if the');
111
-				$output->writeln('recovery key is enabled by the admin and activated by the users.');
112
-				$output->writeln('');
113
-				$user = $recoveryKeyId;
114
-			}
115
-
116
-			$question->setHidden(true);
117
-			$question->setHiddenFallback(false);
118
-			$password = $this->questionHelper->ask($input, $output, $question);
119
-		}
120
-
121
-		$privateKey = $this->getPrivateKey($user, $password);
122
-		if ($privateKey !== false) {
123
-			$this->updateSession($user, $privateKey);
124
-			return true;
125
-		} else {
126
-			$output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
-		}
128
-
129
-
130
-		return false;
131
-	}
132
-
133
-	/**
134
-	 * get the private key which will be used to decrypt all files
135
-	 *
136
-	 * @param string $user
137
-	 * @param string $password
138
-	 * @return bool|string
139
-	 * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
-	 */
141
-	protected function getPrivateKey($user, $password) {
142
-		$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
-		$masterKeyId = $this->keyManager->getMasterKeyId();
144
-		if ($user === $recoveryKeyId) {
145
-			$recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
-			$privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
-		} elseif ($user === $masterKeyId) {
148
-			$masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
-			$privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
-		} else {
151
-			$userKey = $this->keyManager->getPrivateKey($user);
152
-			$privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
-		}
154
-
155
-		return $privateKey;
156
-	}
157
-
158
-	protected function updateSession($user, $privateKey) {
159
-		$this->session->prepareDecryptAll($user, $privateKey);
160
-	}
38
+    /** @var Util  */
39
+    protected $util;
40
+
41
+    /** @var QuestionHelper  */
42
+    protected $questionHelper;
43
+
44
+    /** @var  Crypt */
45
+    protected $crypt;
46
+
47
+    /** @var  KeyManager */
48
+    protected $keyManager;
49
+
50
+    /** @var Session  */
51
+    protected $session;
52
+
53
+    /**
54
+     * @param Util $util
55
+     * @param KeyManager $keyManager
56
+     * @param Crypt $crypt
57
+     * @param Session $session
58
+     * @param QuestionHelper $questionHelper
59
+     */
60
+    public function __construct(
61
+        Util $util,
62
+        KeyManager $keyManager,
63
+        Crypt $crypt,
64
+        Session $session,
65
+        QuestionHelper $questionHelper
66
+    ) {
67
+        $this->util = $util;
68
+        $this->keyManager = $keyManager;
69
+        $this->crypt = $crypt;
70
+        $this->session = $session;
71
+        $this->questionHelper = $questionHelper;
72
+    }
73
+
74
+    /**
75
+     * prepare encryption module to decrypt all files
76
+     *
77
+     * @param InputInterface $input
78
+     * @param OutputInterface $output
79
+     * @param $user
80
+     * @return bool
81
+     */
82
+    public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
+
84
+        $question = new Question('Please enter the recovery key password: ');
85
+
86
+        if($this->util->isMasterKeyEnabled()) {
87
+            $output->writeln('Use master key to decrypt all files');
88
+            $user = $this->keyManager->getMasterKeyId();
89
+            $password =$this->keyManager->getMasterKeyPassword();
90
+        } else {
91
+            $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
+            if (!empty($user)) {
93
+                $output->writeln('You can only decrypt the users files if you know');
94
+                $output->writeln('the users password or if he activated the recovery key.');
95
+                $output->writeln('');
96
+                $questionUseLoginPassword = new ConfirmationQuestion(
97
+                    'Do you want to use the users login password to decrypt all files? (y/n) ',
98
+                    false
99
+                );
100
+                $useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
+                if ($useLoginPassword) {
102
+                    $question = new Question('Please enter the user\'s login password: ');
103
+                } else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
+                    $output->writeln('No recovery key available for user ' . $user);
105
+                    return false;
106
+                } else {
107
+                    $user = $recoveryKeyId;
108
+                }
109
+            } else {
110
+                $output->writeln('You can only decrypt the files of all users if the');
111
+                $output->writeln('recovery key is enabled by the admin and activated by the users.');
112
+                $output->writeln('');
113
+                $user = $recoveryKeyId;
114
+            }
115
+
116
+            $question->setHidden(true);
117
+            $question->setHiddenFallback(false);
118
+            $password = $this->questionHelper->ask($input, $output, $question);
119
+        }
120
+
121
+        $privateKey = $this->getPrivateKey($user, $password);
122
+        if ($privateKey !== false) {
123
+            $this->updateSession($user, $privateKey);
124
+            return true;
125
+        } else {
126
+            $output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
+        }
128
+
129
+
130
+        return false;
131
+    }
132
+
133
+    /**
134
+     * get the private key which will be used to decrypt all files
135
+     *
136
+     * @param string $user
137
+     * @param string $password
138
+     * @return bool|string
139
+     * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
+     */
141
+    protected function getPrivateKey($user, $password) {
142
+        $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
+        $masterKeyId = $this->keyManager->getMasterKeyId();
144
+        if ($user === $recoveryKeyId) {
145
+            $recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
+            $privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
+        } elseif ($user === $masterKeyId) {
148
+            $masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
+            $privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
+        } else {
151
+            $userKey = $this->keyManager->getPrivateKey($user);
152
+            $privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
+        }
154
+
155
+        return $privateKey;
156
+    }
157
+
158
+    protected function updateSession($user, $privateKey) {
159
+        $this->session->prepareDecryptAll($user, $privateKey);
160
+    }
161 161
 }
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -83,10 +83,10 @@  discard block
 block discarded – undo
83 83
 
84 84
 		$question = new Question('Please enter the recovery key password: ');
85 85
 
86
-		if($this->util->isMasterKeyEnabled()) {
86
+		if ($this->util->isMasterKeyEnabled()) {
87 87
 			$output->writeln('Use master key to decrypt all files');
88 88
 			$user = $this->keyManager->getMasterKeyId();
89
-			$password =$this->keyManager->getMasterKeyPassword();
89
+			$password = $this->keyManager->getMasterKeyPassword();
90 90
 		} else {
91 91
 			$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92 92
 			if (!empty($user)) {
@@ -101,7 +101,7 @@  discard block
 block discarded – undo
101 101
 				if ($useLoginPassword) {
102 102
 					$question = new Question('Please enter the user\'s login password: ');
103 103
 				} else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
-					$output->writeln('No recovery key available for user ' . $user);
104
+					$output->writeln('No recovery key available for user '.$user);
105 105
 					return false;
106 106
 				} else {
107 107
 					$user = $recoveryKeyId;
Please login to merge, or discard this patch.
apps/encryption/lib/HookManager.php 1 patch
Indentation   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -28,38 +28,38 @@
 block discarded – undo
28 28
 
29 29
 class HookManager {
30 30
 
31
-	private $hookInstances = [];
31
+    private $hookInstances = [];
32 32
 
33
-	/**
34
-	 * @param array|IHook $instances
35
-	 *        - This accepts either a single instance of IHook or an array of instances of IHook
36
-	 * @return bool
37
-	 */
38
-	public function registerHook($instances) {
39
-		if (is_array($instances)) {
40
-			foreach ($instances as $instance) {
41
-				if (!$instance instanceof IHook) {
42
-					return false;
43
-				}
44
-				$this->hookInstances[] = $instance;
45
-			}
33
+    /**
34
+     * @param array|IHook $instances
35
+     *        - This accepts either a single instance of IHook or an array of instances of IHook
36
+     * @return bool
37
+     */
38
+    public function registerHook($instances) {
39
+        if (is_array($instances)) {
40
+            foreach ($instances as $instance) {
41
+                if (!$instance instanceof IHook) {
42
+                    return false;
43
+                }
44
+                $this->hookInstances[] = $instance;
45
+            }
46 46
 
47
-		} elseif ($instances instanceof IHook) {
48
-			$this->hookInstances[] = $instances;
49
-		}
50
-		return true;
51
-	}
47
+        } elseif ($instances instanceof IHook) {
48
+            $this->hookInstances[] = $instances;
49
+        }
50
+        return true;
51
+    }
52 52
 
53
-	public function fireHooks() {
54
-		foreach ($this->hookInstances as $instance) {
55
-			/**
56
-			 * Fire off the add hooks method of each instance stored in cache
57
-			 *
58
-			 * @var $instance IHook
59
-			 */
60
-			$instance->addHooks();
61
-		}
53
+    public function fireHooks() {
54
+        foreach ($this->hookInstances as $instance) {
55
+            /**
56
+             * Fire off the add hooks method of each instance stored in cache
57
+             *
58
+             * @var $instance IHook
59
+             */
60
+            $instance->addHooks();
61
+        }
62 62
 
63
-	}
63
+    }
64 64
 
65 65
 }
Please login to merge, or discard this patch.
apps/encryption/appinfo/routes.php 1 patch
Indentation   +30 added lines, -30 removed lines patch added patch discarded remove patch
@@ -26,36 +26,36 @@
 block discarded – undo
26 26
 
27 27
 (new Application())->registerRoutes($this, array('routes' => array(
28 28
 
29
-	[
30
-		'name' => 'Recovery#adminRecovery',
31
-		'url' => '/ajax/adminRecovery',
32
-		'verb' => 'POST'
33
-	],
34
-	[
35
-		'name' => 'Settings#updatePrivateKeyPassword',
36
-		'url' => '/ajax/updatePrivateKeyPassword',
37
-		'verb' => 'POST'
38
-	],
39
-	[
40
-		'name' => 'Settings#setEncryptHomeStorage',
41
-		'url' => '/ajax/setEncryptHomeStorage',
42
-		'verb' => 'POST'
43
-	],
44
-	[
45
-		'name' => 'Recovery#changeRecoveryPassword',
46
-		'url' => '/ajax/changeRecoveryPassword',
47
-		'verb' => 'POST'
48
-	],
49
-	[
50
-		'name' => 'Recovery#userSetRecovery',
51
-		'url' => '/ajax/userSetRecovery',
52
-		'verb' => 'POST'
53
-	],
54
-	[
55
-		'name' => 'Status#getStatus',
56
-		'url' => '/ajax/getStatus',
57
-		'verb' => 'GET'
58
-	]
29
+    [
30
+        'name' => 'Recovery#adminRecovery',
31
+        'url' => '/ajax/adminRecovery',
32
+        'verb' => 'POST'
33
+    ],
34
+    [
35
+        'name' => 'Settings#updatePrivateKeyPassword',
36
+        'url' => '/ajax/updatePrivateKeyPassword',
37
+        'verb' => 'POST'
38
+    ],
39
+    [
40
+        'name' => 'Settings#setEncryptHomeStorage',
41
+        'url' => '/ajax/setEncryptHomeStorage',
42
+        'verb' => 'POST'
43
+    ],
44
+    [
45
+        'name' => 'Recovery#changeRecoveryPassword',
46
+        'url' => '/ajax/changeRecoveryPassword',
47
+        'verb' => 'POST'
48
+    ],
49
+    [
50
+        'name' => 'Recovery#userSetRecovery',
51
+        'url' => '/ajax/userSetRecovery',
52
+        'verb' => 'POST'
53
+    ],
54
+    [
55
+        'name' => 'Status#getStatus',
56
+        'url' => '/ajax/getStatus',
57
+        'verb' => 'GET'
58
+    ]
59 59
 
60 60
 
61 61
 )));
Please login to merge, or discard this patch.
apps/comments/lib/Activity/Provider.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -181,12 +181,12 @@
 block discarded – undo
181 181
 				}
182 182
 
183 183
 				$message = preg_replace(
184
-					'/(^|\s)(' . '@' . $mention['id'] . ')(\b)/',
184
+					'/(^|\s)('.'@'.$mention['id'].')(\b)/',
185 185
 					//'${1}' . $this->regexSafeUser($mention['id'], $displayName) . '${3}',
186
-					'${1}' . '{mention' . $mentionCount . '}' . '${3}',
186
+					'${1}'.'{mention'.$mentionCount.'}'.'${3}',
187 187
 					$message
188 188
 				);
189
-				$mentions['mention' . $mentionCount] = $this->generateUserParameter($mention['id']);
189
+				$mentions['mention'.$mentionCount] = $this->generateUserParameter($mention['id']);
190 190
 				$mentionCount++;
191 191
 			}
192 192
 
Please login to merge, or discard this patch.
Indentation   +236 added lines, -236 removed lines patch added patch discarded remove patch
@@ -34,240 +34,240 @@
 block discarded – undo
34 34
 
35 35
 class Provider implements IProvider {
36 36
 
37
-	/** @var IFactory */
38
-	protected $languageFactory;
39
-
40
-	/** @var IL10N */
41
-	protected $l;
42
-
43
-	/** @var IURLGenerator */
44
-	protected $url;
45
-
46
-	/** @var ICommentsManager */
47
-	protected $commentsManager;
48
-
49
-	/** @var IUserManager */
50
-	protected $userManager;
51
-
52
-	/** @var IManager */
53
-	protected $activityManager;
54
-
55
-	/** @var string[] */
56
-	protected $displayNames = [];
57
-
58
-	/**
59
-	 * @param IFactory $languageFactory
60
-	 * @param IURLGenerator $url
61
-	 * @param ICommentsManager $commentsManager
62
-	 * @param IUserManager $userManager
63
-	 * @param IManager $activityManager
64
-	 */
65
-	public function __construct(IFactory $languageFactory, IURLGenerator $url, ICommentsManager $commentsManager, IUserManager $userManager, IManager $activityManager) {
66
-		$this->languageFactory = $languageFactory;
67
-		$this->url = $url;
68
-		$this->commentsManager = $commentsManager;
69
-		$this->userManager = $userManager;
70
-		$this->activityManager = $activityManager;
71
-	}
72
-
73
-	/**
74
-	 * @param string $language
75
-	 * @param IEvent $event
76
-	 * @param IEvent|null $previousEvent
77
-	 * @return IEvent
78
-	 * @throws \InvalidArgumentException
79
-	 * @since 11.0.0
80
-	 */
81
-	public function parse($language, IEvent $event, IEvent $previousEvent = null) {
82
-		if ($event->getApp() !== 'comments') {
83
-			throw new \InvalidArgumentException();
84
-		}
85
-
86
-		$this->l = $this->languageFactory->get('comments', $language);
87
-
88
-		if ($event->getSubject() === 'add_comment_subject') {
89
-			$this->parseMessage($event);
90
-			if ($this->activityManager->getRequirePNG()) {
91
-				$event->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.png')));
92
-			} else {
93
-				$event->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg')));
94
-			}
95
-
96
-			if ($this->activityManager->isFormattingFilteredObject()) {
97
-				try {
98
-					return $this->parseShortVersion($event);
99
-				} catch (\InvalidArgumentException $e) {
100
-					// Ignore and simply use the long version...
101
-				}
102
-			}
103
-
104
-			return $this->parseLongVersion($event);
105
-		} else {
106
-			throw new \InvalidArgumentException();
107
-		}
108
-	}
109
-
110
-	/**
111
-	 * @param IEvent $event
112
-	 * @return IEvent
113
-	 * @throws \InvalidArgumentException
114
-	 */
115
-	protected function parseShortVersion(IEvent $event) {
116
-		$subjectParameters = $this->getSubjectParameters($event);
117
-
118
-		if ($event->getSubject() === 'add_comment_subject') {
119
-			if ($subjectParameters['actor'] === $this->activityManager->getCurrentUserId()) {
120
-				$event->setParsedSubject($this->l->t('You commented'))
121
-					->setRichSubject($this->l->t('You commented'), []);
122
-			} else {
123
-				$author = $this->generateUserParameter($subjectParameters['actor']);
124
-				$event->setParsedSubject($this->l->t('%1$s commented', [$author['name']]))
125
-					->setRichSubject($this->l->t('{author} commented'), [
126
-						'author' => $author,
127
-					]);
128
-			}
129
-		} else {
130
-			throw new \InvalidArgumentException();
131
-		}
132
-
133
-		return $event;
134
-	}
135
-
136
-	/**
137
-	 * @param IEvent $event
138
-	 * @return IEvent
139
-	 * @throws \InvalidArgumentException
140
-	 */
141
-	protected function parseLongVersion(IEvent $event) {
142
-		$subjectParameters = $this->getSubjectParameters($event);
143
-
144
-		if ($event->getSubject() === 'add_comment_subject') {
145
-			if ($subjectParameters['actor'] === $this->activityManager->getCurrentUserId()) {
146
-				$event->setParsedSubject($this->l->t('You commented on %1$s', [
147
-						$subjectParameters['filePath'],
148
-					]))
149
-					->setRichSubject($this->l->t('You commented on {file}'), [
150
-						'file' => $this->generateFileParameter($subjectParameters['fileId'], $subjectParameters['filePath']),
151
-					]);
152
-			} else {
153
-				$author = $this->generateUserParameter($subjectParameters['actor']);
154
-				$event->setParsedSubject($this->l->t('%1$s commented on %2$s', [
155
-						$author['name'],
156
-						$subjectParameters['filePath'],
157
-					]))
158
-					->setRichSubject($this->l->t('{author} commented on {file}'), [
159
-						'author' => $author,
160
-						'file' => $this->generateFileParameter($subjectParameters['fileId'], $subjectParameters['filePath']),
161
-					]);
162
-			}
163
-		} else {
164
-			throw new \InvalidArgumentException();
165
-		}
166
-
167
-		return $event;
168
-	}
169
-
170
-	protected function getSubjectParameters(IEvent $event) {
171
-		$subjectParameters = $event->getSubjectParameters();
172
-		if (isset($subjectParameters['fileId'])) {
173
-			return $subjectParameters;
174
-		}
175
-
176
-		// Fix subjects from 12.0.3 and older
177
-		//
178
-		// Do NOT Remove unless necessary
179
-		// Removing this will break parsing of activities that were created on
180
-		// Nextcloud 12, so we should keep this as long as it's acceptable.
181
-		// Otherwise if people upgrade over multiple releases in a short period,
182
-		// they will get the dead entries in their stream.
183
-		return [
184
-			'actor' => $subjectParameters[0],
185
-			'fileId' => (int) $event->getObjectId(),
186
-			'filePath' => trim($subjectParameters[1], '/'),
187
-		];
188
-	}
189
-
190
-	/**
191
-	 * @param IEvent $event
192
-	 */
193
-	protected function parseMessage(IEvent $event) {
194
-		$messageParameters = $event->getMessageParameters();
195
-		if (empty($messageParameters)) {
196
-			// Email
197
-			return;
198
-		}
199
-
200
-		$commentId = isset($messageParameters['commentId']) ? $messageParameters['commentId'] : $messageParameters[0];
201
-
202
-		try {
203
-			$comment = $this->commentsManager->get((string) $commentId);
204
-			$message = $comment->getMessage();
205
-			$message = str_replace("\n", '<br />', str_replace(['<', '>'], ['&lt;', '&gt;'], $message));
206
-
207
-			$mentionCount = 1;
208
-			$mentions = [];
209
-			foreach ($comment->getMentions() as $mention) {
210
-				if ($mention['type'] !== 'user') {
211
-					continue;
212
-				}
213
-
214
-				$message = preg_replace(
215
-					'/(^|\s)(' . '@' . $mention['id'] . ')(\b)/',
216
-					//'${1}' . $this->regexSafeUser($mention['id'], $displayName) . '${3}',
217
-					'${1}' . '{mention' . $mentionCount . '}' . '${3}',
218
-					$message
219
-				);
220
-				$mentions['mention' . $mentionCount] = $this->generateUserParameter($mention['id']);
221
-				$mentionCount++;
222
-			}
223
-
224
-			$event->setParsedMessage($comment->getMessage())
225
-				->setRichMessage($message, $mentions);
226
-		} catch (NotFoundException $e) {
227
-		}
228
-	}
229
-
230
-	/**
231
-	 * @param int $id
232
-	 * @param string $path
233
-	 * @return array
234
-	 */
235
-	protected function generateFileParameter($id, $path) {
236
-		return [
237
-			'type' => 'file',
238
-			'id' => $id,
239
-			'name' => basename($path),
240
-			'path' => $path,
241
-			'link' => $this->url->linkToRouteAbsolute('files.viewcontroller.showFile', ['fileid' => $id]),
242
-		];
243
-	}
244
-
245
-	/**
246
-	 * @param string $uid
247
-	 * @return array
248
-	 */
249
-	protected function generateUserParameter($uid) {
250
-		if (!isset($this->displayNames[$uid])) {
251
-			$this->displayNames[$uid] = $this->getDisplayName($uid);
252
-		}
253
-
254
-		return [
255
-			'type' => 'user',
256
-			'id' => $uid,
257
-			'name' => $this->displayNames[$uid],
258
-		];
259
-	}
260
-
261
-	/**
262
-	 * @param string $uid
263
-	 * @return string
264
-	 */
265
-	protected function getDisplayName($uid) {
266
-		$user = $this->userManager->get($uid);
267
-		if ($user instanceof IUser) {
268
-			return $user->getDisplayName();
269
-		} else {
270
-			return $uid;
271
-		}
272
-	}
37
+    /** @var IFactory */
38
+    protected $languageFactory;
39
+
40
+    /** @var IL10N */
41
+    protected $l;
42
+
43
+    /** @var IURLGenerator */
44
+    protected $url;
45
+
46
+    /** @var ICommentsManager */
47
+    protected $commentsManager;
48
+
49
+    /** @var IUserManager */
50
+    protected $userManager;
51
+
52
+    /** @var IManager */
53
+    protected $activityManager;
54
+
55
+    /** @var string[] */
56
+    protected $displayNames = [];
57
+
58
+    /**
59
+     * @param IFactory $languageFactory
60
+     * @param IURLGenerator $url
61
+     * @param ICommentsManager $commentsManager
62
+     * @param IUserManager $userManager
63
+     * @param IManager $activityManager
64
+     */
65
+    public function __construct(IFactory $languageFactory, IURLGenerator $url, ICommentsManager $commentsManager, IUserManager $userManager, IManager $activityManager) {
66
+        $this->languageFactory = $languageFactory;
67
+        $this->url = $url;
68
+        $this->commentsManager = $commentsManager;
69
+        $this->userManager = $userManager;
70
+        $this->activityManager = $activityManager;
71
+    }
72
+
73
+    /**
74
+     * @param string $language
75
+     * @param IEvent $event
76
+     * @param IEvent|null $previousEvent
77
+     * @return IEvent
78
+     * @throws \InvalidArgumentException
79
+     * @since 11.0.0
80
+     */
81
+    public function parse($language, IEvent $event, IEvent $previousEvent = null) {
82
+        if ($event->getApp() !== 'comments') {
83
+            throw new \InvalidArgumentException();
84
+        }
85
+
86
+        $this->l = $this->languageFactory->get('comments', $language);
87
+
88
+        if ($event->getSubject() === 'add_comment_subject') {
89
+            $this->parseMessage($event);
90
+            if ($this->activityManager->getRequirePNG()) {
91
+                $event->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.png')));
92
+            } else {
93
+                $event->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg')));
94
+            }
95
+
96
+            if ($this->activityManager->isFormattingFilteredObject()) {
97
+                try {
98
+                    return $this->parseShortVersion($event);
99
+                } catch (\InvalidArgumentException $e) {
100
+                    // Ignore and simply use the long version...
101
+                }
102
+            }
103
+
104
+            return $this->parseLongVersion($event);
105
+        } else {
106
+            throw new \InvalidArgumentException();
107
+        }
108
+    }
109
+
110
+    /**
111
+     * @param IEvent $event
112
+     * @return IEvent
113
+     * @throws \InvalidArgumentException
114
+     */
115
+    protected function parseShortVersion(IEvent $event) {
116
+        $subjectParameters = $this->getSubjectParameters($event);
117
+
118
+        if ($event->getSubject() === 'add_comment_subject') {
119
+            if ($subjectParameters['actor'] === $this->activityManager->getCurrentUserId()) {
120
+                $event->setParsedSubject($this->l->t('You commented'))
121
+                    ->setRichSubject($this->l->t('You commented'), []);
122
+            } else {
123
+                $author = $this->generateUserParameter($subjectParameters['actor']);
124
+                $event->setParsedSubject($this->l->t('%1$s commented', [$author['name']]))
125
+                    ->setRichSubject($this->l->t('{author} commented'), [
126
+                        'author' => $author,
127
+                    ]);
128
+            }
129
+        } else {
130
+            throw new \InvalidArgumentException();
131
+        }
132
+
133
+        return $event;
134
+    }
135
+
136
+    /**
137
+     * @param IEvent $event
138
+     * @return IEvent
139
+     * @throws \InvalidArgumentException
140
+     */
141
+    protected function parseLongVersion(IEvent $event) {
142
+        $subjectParameters = $this->getSubjectParameters($event);
143
+
144
+        if ($event->getSubject() === 'add_comment_subject') {
145
+            if ($subjectParameters['actor'] === $this->activityManager->getCurrentUserId()) {
146
+                $event->setParsedSubject($this->l->t('You commented on %1$s', [
147
+                        $subjectParameters['filePath'],
148
+                    ]))
149
+                    ->setRichSubject($this->l->t('You commented on {file}'), [
150
+                        'file' => $this->generateFileParameter($subjectParameters['fileId'], $subjectParameters['filePath']),
151
+                    ]);
152
+            } else {
153
+                $author = $this->generateUserParameter($subjectParameters['actor']);
154
+                $event->setParsedSubject($this->l->t('%1$s commented on %2$s', [
155
+                        $author['name'],
156
+                        $subjectParameters['filePath'],
157
+                    ]))
158
+                    ->setRichSubject($this->l->t('{author} commented on {file}'), [
159
+                        'author' => $author,
160
+                        'file' => $this->generateFileParameter($subjectParameters['fileId'], $subjectParameters['filePath']),
161
+                    ]);
162
+            }
163
+        } else {
164
+            throw new \InvalidArgumentException();
165
+        }
166
+
167
+        return $event;
168
+    }
169
+
170
+    protected function getSubjectParameters(IEvent $event) {
171
+        $subjectParameters = $event->getSubjectParameters();
172
+        if (isset($subjectParameters['fileId'])) {
173
+            return $subjectParameters;
174
+        }
175
+
176
+        // Fix subjects from 12.0.3 and older
177
+        //
178
+        // Do NOT Remove unless necessary
179
+        // Removing this will break parsing of activities that were created on
180
+        // Nextcloud 12, so we should keep this as long as it's acceptable.
181
+        // Otherwise if people upgrade over multiple releases in a short period,
182
+        // they will get the dead entries in their stream.
183
+        return [
184
+            'actor' => $subjectParameters[0],
185
+            'fileId' => (int) $event->getObjectId(),
186
+            'filePath' => trim($subjectParameters[1], '/'),
187
+        ];
188
+    }
189
+
190
+    /**
191
+     * @param IEvent $event
192
+     */
193
+    protected function parseMessage(IEvent $event) {
194
+        $messageParameters = $event->getMessageParameters();
195
+        if (empty($messageParameters)) {
196
+            // Email
197
+            return;
198
+        }
199
+
200
+        $commentId = isset($messageParameters['commentId']) ? $messageParameters['commentId'] : $messageParameters[0];
201
+
202
+        try {
203
+            $comment = $this->commentsManager->get((string) $commentId);
204
+            $message = $comment->getMessage();
205
+            $message = str_replace("\n", '<br />', str_replace(['<', '>'], ['&lt;', '&gt;'], $message));
206
+
207
+            $mentionCount = 1;
208
+            $mentions = [];
209
+            foreach ($comment->getMentions() as $mention) {
210
+                if ($mention['type'] !== 'user') {
211
+                    continue;
212
+                }
213
+
214
+                $message = preg_replace(
215
+                    '/(^|\s)(' . '@' . $mention['id'] . ')(\b)/',
216
+                    //'${1}' . $this->regexSafeUser($mention['id'], $displayName) . '${3}',
217
+                    '${1}' . '{mention' . $mentionCount . '}' . '${3}',
218
+                    $message
219
+                );
220
+                $mentions['mention' . $mentionCount] = $this->generateUserParameter($mention['id']);
221
+                $mentionCount++;
222
+            }
223
+
224
+            $event->setParsedMessage($comment->getMessage())
225
+                ->setRichMessage($message, $mentions);
226
+        } catch (NotFoundException $e) {
227
+        }
228
+    }
229
+
230
+    /**
231
+     * @param int $id
232
+     * @param string $path
233
+     * @return array
234
+     */
235
+    protected function generateFileParameter($id, $path) {
236
+        return [
237
+            'type' => 'file',
238
+            'id' => $id,
239
+            'name' => basename($path),
240
+            'path' => $path,
241
+            'link' => $this->url->linkToRouteAbsolute('files.viewcontroller.showFile', ['fileid' => $id]),
242
+        ];
243
+    }
244
+
245
+    /**
246
+     * @param string $uid
247
+     * @return array
248
+     */
249
+    protected function generateUserParameter($uid) {
250
+        if (!isset($this->displayNames[$uid])) {
251
+            $this->displayNames[$uid] = $this->getDisplayName($uid);
252
+        }
253
+
254
+        return [
255
+            'type' => 'user',
256
+            'id' => $uid,
257
+            'name' => $this->displayNames[$uid],
258
+        ];
259
+    }
260
+
261
+    /**
262
+     * @param string $uid
263
+     * @return string
264
+     */
265
+    protected function getDisplayName($uid) {
266
+        $user = $this->userManager->get($uid);
267
+        if ($user instanceof IUser) {
268
+            return $user->getDisplayName();
269
+        } else {
270
+            return $uid;
271
+        }
272
+    }
273 273
 }
Please login to merge, or discard this patch.
apps/comments/lib/Activity/Setting.php 1 patch
Indentation   +59 added lines, -59 removed lines patch added patch discarded remove patch
@@ -27,72 +27,72 @@
 block discarded – undo
27 27
 
28 28
 class Setting implements ISetting {
29 29
 
30
-	/** @var IL10N */
31
-	protected $l;
30
+    /** @var IL10N */
31
+    protected $l;
32 32
 
33
-	/**
34
-	 * @param IL10N $l
35
-	 */
36
-	public function __construct(IL10N $l) {
37
-		$this->l = $l;
38
-	}
33
+    /**
34
+     * @param IL10N $l
35
+     */
36
+    public function __construct(IL10N $l) {
37
+        $this->l = $l;
38
+    }
39 39
 
40
-	/**
41
-	 * @return string Lowercase a-z and underscore only identifier
42
-	 * @since 11.0.0
43
-	 */
44
-	public function getIdentifier() {
45
-		return 'comments';
46
-	}
40
+    /**
41
+     * @return string Lowercase a-z and underscore only identifier
42
+     * @since 11.0.0
43
+     */
44
+    public function getIdentifier() {
45
+        return 'comments';
46
+    }
47 47
 
48
-	/**
49
-	 * @return string A translated string
50
-	 * @since 11.0.0
51
-	 */
52
-	public function getName() {
53
-		return $this->l->t('<strong>Comments</strong> for files');
54
-	}
48
+    /**
49
+     * @return string A translated string
50
+     * @since 11.0.0
51
+     */
52
+    public function getName() {
53
+        return $this->l->t('<strong>Comments</strong> for files');
54
+    }
55 55
 
56
-	/**
57
-	 * @return int whether the filter should be rather on the top or bottom of
58
-	 * the admin section. The filters are arranged in ascending order of the
59
-	 * priority values. It is required to return a value between 0 and 100.
60
-	 * @since 11.0.0
61
-	 */
62
-	public function getPriority() {
63
-		return 50;
64
-	}
56
+    /**
57
+     * @return int whether the filter should be rather on the top or bottom of
58
+     * the admin section. The filters are arranged in ascending order of the
59
+     * priority values. It is required to return a value between 0 and 100.
60
+     * @since 11.0.0
61
+     */
62
+    public function getPriority() {
63
+        return 50;
64
+    }
65 65
 
66
-	/**
67
-	 * @return bool True when the option can be changed for the stream
68
-	 * @since 11.0.0
69
-	 */
70
-	public function canChangeStream() {
71
-		return true;
72
-	}
66
+    /**
67
+     * @return bool True when the option can be changed for the stream
68
+     * @since 11.0.0
69
+     */
70
+    public function canChangeStream() {
71
+        return true;
72
+    }
73 73
 
74
-	/**
75
-	 * @return bool True when the option can be changed for the stream
76
-	 * @since 11.0.0
77
-	 */
78
-	public function isDefaultEnabledStream() {
79
-		return true;
80
-	}
74
+    /**
75
+     * @return bool True when the option can be changed for the stream
76
+     * @since 11.0.0
77
+     */
78
+    public function isDefaultEnabledStream() {
79
+        return true;
80
+    }
81 81
 
82
-	/**
83
-	 * @return bool True when the option can be changed for the mail
84
-	 * @since 11.0.0
85
-	 */
86
-	public function canChangeMail() {
87
-		return true;
88
-	}
82
+    /**
83
+     * @return bool True when the option can be changed for the mail
84
+     * @since 11.0.0
85
+     */
86
+    public function canChangeMail() {
87
+        return true;
88
+    }
89 89
 
90
-	/**
91
-	 * @return bool True when the option can be changed for the stream
92
-	 * @since 11.0.0
93
-	 */
94
-	public function isDefaultEnabledMail() {
95
-		return false;
96
-	}
90
+    /**
91
+     * @return bool True when the option can be changed for the stream
92
+     * @since 11.0.0
93
+     */
94
+    public function isDefaultEnabledMail() {
95
+        return false;
96
+    }
97 97
 }
98 98
 
Please login to merge, or discard this patch.
apps/comments/lib/Activity/Filter.php 1 patch
Indentation   +51 added lines, -51 removed lines patch added patch discarded remove patch
@@ -28,63 +28,63 @@
 block discarded – undo
28 28
 
29 29
 class Filter implements IFilter {
30 30
 
31
-	/** @var IL10N */
32
-	protected $l;
31
+    /** @var IL10N */
32
+    protected $l;
33 33
 
34
-	/** @var IURLGenerator */
35
-	protected $url;
34
+    /** @var IURLGenerator */
35
+    protected $url;
36 36
 
37
-	public function __construct(IL10N $l, IURLGenerator $url) {
38
-		$this->l = $l;
39
-		$this->url = $url;
40
-	}
37
+    public function __construct(IL10N $l, IURLGenerator $url) {
38
+        $this->l = $l;
39
+        $this->url = $url;
40
+    }
41 41
 
42
-	/**
43
-	 * @return string Lowercase a-z only identifier
44
-	 * @since 11.0.0
45
-	 */
46
-	public function getIdentifier() {
47
-		return 'comments';
48
-	}
42
+    /**
43
+     * @return string Lowercase a-z only identifier
44
+     * @since 11.0.0
45
+     */
46
+    public function getIdentifier() {
47
+        return 'comments';
48
+    }
49 49
 
50
-	/**
51
-	 * @return string A translated string
52
-	 * @since 11.0.0
53
-	 */
54
-	public function getName() {
55
-		return $this->l->t('Comments');
56
-	}
50
+    /**
51
+     * @return string A translated string
52
+     * @since 11.0.0
53
+     */
54
+    public function getName() {
55
+        return $this->l->t('Comments');
56
+    }
57 57
 
58
-	/**
59
-	 * @return int
60
-	 * @since 11.0.0
61
-	 */
62
-	public function getPriority() {
63
-		return 40;
64
-	}
58
+    /**
59
+     * @return int
60
+     * @since 11.0.0
61
+     */
62
+    public function getPriority() {
63
+        return 40;
64
+    }
65 65
 
66
-	/**
67
-	 * @return string Full URL to an icon, empty string when none is given
68
-	 * @since 11.0.0
69
-	 */
70
-	public function getIcon() {
71
-		return $this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg'));
72
-	}
66
+    /**
67
+     * @return string Full URL to an icon, empty string when none is given
68
+     * @since 11.0.0
69
+     */
70
+    public function getIcon() {
71
+        return $this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg'));
72
+    }
73 73
 
74
-	/**
75
-	 * @param string[] $types
76
-	 * @return string[] An array of allowed apps from which activities should be displayed
77
-	 * @since 11.0.0
78
-	 */
79
-	public function filterTypes(array $types) {
80
-		return $types;
81
-	}
74
+    /**
75
+     * @param string[] $types
76
+     * @return string[] An array of allowed apps from which activities should be displayed
77
+     * @since 11.0.0
78
+     */
79
+    public function filterTypes(array $types) {
80
+        return $types;
81
+    }
82 82
 
83
-	/**
84
-	 * @return string[] An array of allowed apps from which activities should be displayed
85
-	 * @since 11.0.0
86
-	 */
87
-	public function allowedApps() {
88
-		return ['comments'];
89
-	}
83
+    /**
84
+     * @return string[] An array of allowed apps from which activities should be displayed
85
+     * @since 11.0.0
86
+     */
87
+    public function allowedApps() {
88
+        return ['comments'];
89
+    }
90 90
 }
Please login to merge, or discard this patch.