@@ -47,8 +47,8 @@ discard block |
||
| 47 | 47 | static function xmlDeserialize(Reader $reader) { |
| 48 | 48 | |
| 49 | 49 | $elements = $reader->parseInnerTree([ |
| 50 | - '{' . Plugin::NS_OWNCLOUD. '}set' => 'Sabre\\Xml\\Element\\KeyValue', |
|
| 51 | - '{' . Plugin::NS_OWNCLOUD . '}remove' => 'Sabre\\Xml\\Element\\KeyValue', |
|
| 50 | + '{'.Plugin::NS_OWNCLOUD.'}set' => 'Sabre\\Xml\\Element\\KeyValue', |
|
| 51 | + '{'.Plugin::NS_OWNCLOUD.'}remove' => 'Sabre\\Xml\\Element\\KeyValue', |
|
| 52 | 52 | ]); |
| 53 | 53 | |
| 54 | 54 | $set = []; |
@@ -57,21 +57,21 @@ discard block |
||
| 57 | 57 | foreach ($elements as $elem) { |
| 58 | 58 | switch ($elem['name']) { |
| 59 | 59 | |
| 60 | - case '{' . Plugin::NS_OWNCLOUD . '}set' : |
|
| 60 | + case '{'.Plugin::NS_OWNCLOUD.'}set' : |
|
| 61 | 61 | $sharee = $elem['value']; |
| 62 | 62 | |
| 63 | - $sumElem = '{' . Plugin::NS_OWNCLOUD . '}summary'; |
|
| 64 | - $commonName = '{' . Plugin::NS_OWNCLOUD . '}common-name'; |
|
| 63 | + $sumElem = '{'.Plugin::NS_OWNCLOUD.'}summary'; |
|
| 64 | + $commonName = '{'.Plugin::NS_OWNCLOUD.'}common-name'; |
|
| 65 | 65 | |
| 66 | 66 | $set[] = [ |
| 67 | 67 | 'href' => $sharee['{DAV:}href'], |
| 68 | 68 | 'commonName' => isset($sharee[$commonName]) ? $sharee[$commonName] : null, |
| 69 | 69 | 'summary' => isset($sharee[$sumElem]) ? $sharee[$sumElem] : null, |
| 70 | - 'readOnly' => !array_key_exists('{' . Plugin::NS_OWNCLOUD . '}read-write', $sharee), |
|
| 70 | + 'readOnly' => !array_key_exists('{'.Plugin::NS_OWNCLOUD.'}read-write', $sharee), |
|
| 71 | 71 | ]; |
| 72 | 72 | break; |
| 73 | 73 | |
| 74 | - case '{' . Plugin::NS_OWNCLOUD . '}remove' : |
|
| 74 | + case '{'.Plugin::NS_OWNCLOUD.'}remove' : |
|
| 75 | 75 | $remove[] = $elem['value']['{DAV:}href']; |
| 76 | 76 | break; |
| 77 | 77 | |
@@ -41,130 +41,130 @@ |
||
| 41 | 41 | */ |
| 42 | 42 | class Invite implements XmlSerializable { |
| 43 | 43 | |
| 44 | - /** |
|
| 45 | - * The list of users a calendar has been shared to. |
|
| 46 | - * |
|
| 47 | - * @var array |
|
| 48 | - */ |
|
| 49 | - protected $users; |
|
| 50 | - |
|
| 51 | - /** |
|
| 52 | - * The organizer contains information about the person who shared the |
|
| 53 | - * object. |
|
| 54 | - * |
|
| 55 | - * @var array|null |
|
| 56 | - */ |
|
| 57 | - protected $organizer; |
|
| 58 | - |
|
| 59 | - /** |
|
| 60 | - * Creates the property. |
|
| 61 | - * |
|
| 62 | - * Users is an array. Each element of the array has the following |
|
| 63 | - * properties: |
|
| 64 | - * |
|
| 65 | - * * href - Often a mailto: address |
|
| 66 | - * * commonName - Optional, for example a first and lastname for a user. |
|
| 67 | - * * status - One of the SharingPlugin::STATUS_* constants. |
|
| 68 | - * * readOnly - true or false |
|
| 69 | - * * summary - Optional, description of the share |
|
| 70 | - * |
|
| 71 | - * The organizer key is optional to specify. It's only useful when a |
|
| 72 | - * 'sharee' requests the sharing information. |
|
| 73 | - * |
|
| 74 | - * The organizer may have the following properties: |
|
| 75 | - * * href - Often a mailto: address. |
|
| 76 | - * * commonName - Optional human-readable name. |
|
| 77 | - * * firstName - Optional first name. |
|
| 78 | - * * lastName - Optional last name. |
|
| 79 | - * |
|
| 80 | - * If you wonder why these two structures are so different, I guess a |
|
| 81 | - * valid answer is that the current spec is still a draft. |
|
| 82 | - * |
|
| 83 | - * @param array $users |
|
| 84 | - */ |
|
| 85 | - function __construct(array $users, array $organizer = null) { |
|
| 86 | - |
|
| 87 | - $this->users = $users; |
|
| 88 | - $this->organizer = $organizer; |
|
| 89 | - |
|
| 90 | - } |
|
| 91 | - |
|
| 92 | - /** |
|
| 93 | - * Returns the list of users, as it was passed to the constructor. |
|
| 94 | - * |
|
| 95 | - * @return array |
|
| 96 | - */ |
|
| 97 | - function getValue() { |
|
| 98 | - |
|
| 99 | - return $this->users; |
|
| 100 | - |
|
| 101 | - } |
|
| 102 | - |
|
| 103 | - /** |
|
| 104 | - * The xmlSerialize metod is called during xml writing. |
|
| 105 | - * |
|
| 106 | - * Use the $writer argument to write its own xml serialization. |
|
| 107 | - * |
|
| 108 | - * An important note: do _not_ create a parent element. Any element |
|
| 109 | - * implementing XmlSerializble should only ever write what's considered |
|
| 110 | - * its 'inner xml'. |
|
| 111 | - * |
|
| 112 | - * The parent of the current element is responsible for writing a |
|
| 113 | - * containing element. |
|
| 114 | - * |
|
| 115 | - * This allows serializers to be re-used for different element names. |
|
| 116 | - * |
|
| 117 | - * If you are opening new elements, you must also close them again. |
|
| 118 | - * |
|
| 119 | - * @param Writer $writer |
|
| 120 | - * @return void |
|
| 121 | - */ |
|
| 122 | - function xmlSerialize(Writer $writer) { |
|
| 123 | - |
|
| 124 | - $cs = '{' . Plugin::NS_OWNCLOUD . '}'; |
|
| 125 | - |
|
| 126 | - if (!is_null($this->organizer)) { |
|
| 127 | - |
|
| 128 | - $writer->startElement($cs . 'organizer'); |
|
| 129 | - $writer->writeElement('{DAV:}href', $this->organizer['href']); |
|
| 130 | - |
|
| 131 | - if (isset($this->organizer['commonName']) && $this->organizer['commonName']) { |
|
| 132 | - $writer->writeElement($cs . 'common-name', $this->organizer['commonName']); |
|
| 133 | - } |
|
| 134 | - if (isset($this->organizer['firstName']) && $this->organizer['firstName']) { |
|
| 135 | - $writer->writeElement($cs . 'first-name', $this->organizer['firstName']); |
|
| 136 | - } |
|
| 137 | - if (isset($this->organizer['lastName']) && $this->organizer['lastName']) { |
|
| 138 | - $writer->writeElement($cs . 'last-name', $this->organizer['lastName']); |
|
| 139 | - } |
|
| 140 | - $writer->endElement(); // organizer |
|
| 141 | - |
|
| 142 | - } |
|
| 143 | - |
|
| 144 | - foreach ($this->users as $user) { |
|
| 145 | - |
|
| 146 | - $writer->startElement($cs . 'user'); |
|
| 147 | - $writer->writeElement('{DAV:}href', $user['href']); |
|
| 148 | - if (isset($user['commonName']) && $user['commonName']) { |
|
| 149 | - $writer->writeElement($cs . 'common-name', $user['commonName']); |
|
| 150 | - } |
|
| 151 | - $writer->writeElement($cs . 'invite-accepted'); |
|
| 152 | - |
|
| 153 | - $writer->startElement($cs . 'access'); |
|
| 154 | - if ($user['readOnly']) { |
|
| 155 | - $writer->writeElement($cs . 'read'); |
|
| 156 | - } else { |
|
| 157 | - $writer->writeElement($cs . 'read-write'); |
|
| 158 | - } |
|
| 159 | - $writer->endElement(); // access |
|
| 160 | - |
|
| 161 | - if (isset($user['summary']) && $user['summary']) { |
|
| 162 | - $writer->writeElement($cs . 'summary', $user['summary']); |
|
| 163 | - } |
|
| 164 | - |
|
| 165 | - $writer->endElement(); //user |
|
| 166 | - |
|
| 167 | - } |
|
| 168 | - |
|
| 169 | - } |
|
| 44 | + /** |
|
| 45 | + * The list of users a calendar has been shared to. |
|
| 46 | + * |
|
| 47 | + * @var array |
|
| 48 | + */ |
|
| 49 | + protected $users; |
|
| 50 | + |
|
| 51 | + /** |
|
| 52 | + * The organizer contains information about the person who shared the |
|
| 53 | + * object. |
|
| 54 | + * |
|
| 55 | + * @var array|null |
|
| 56 | + */ |
|
| 57 | + protected $organizer; |
|
| 58 | + |
|
| 59 | + /** |
|
| 60 | + * Creates the property. |
|
| 61 | + * |
|
| 62 | + * Users is an array. Each element of the array has the following |
|
| 63 | + * properties: |
|
| 64 | + * |
|
| 65 | + * * href - Often a mailto: address |
|
| 66 | + * * commonName - Optional, for example a first and lastname for a user. |
|
| 67 | + * * status - One of the SharingPlugin::STATUS_* constants. |
|
| 68 | + * * readOnly - true or false |
|
| 69 | + * * summary - Optional, description of the share |
|
| 70 | + * |
|
| 71 | + * The organizer key is optional to specify. It's only useful when a |
|
| 72 | + * 'sharee' requests the sharing information. |
|
| 73 | + * |
|
| 74 | + * The organizer may have the following properties: |
|
| 75 | + * * href - Often a mailto: address. |
|
| 76 | + * * commonName - Optional human-readable name. |
|
| 77 | + * * firstName - Optional first name. |
|
| 78 | + * * lastName - Optional last name. |
|
| 79 | + * |
|
| 80 | + * If you wonder why these two structures are so different, I guess a |
|
| 81 | + * valid answer is that the current spec is still a draft. |
|
| 82 | + * |
|
| 83 | + * @param array $users |
|
| 84 | + */ |
|
| 85 | + function __construct(array $users, array $organizer = null) { |
|
| 86 | + |
|
| 87 | + $this->users = $users; |
|
| 88 | + $this->organizer = $organizer; |
|
| 89 | + |
|
| 90 | + } |
|
| 91 | + |
|
| 92 | + /** |
|
| 93 | + * Returns the list of users, as it was passed to the constructor. |
|
| 94 | + * |
|
| 95 | + * @return array |
|
| 96 | + */ |
|
| 97 | + function getValue() { |
|
| 98 | + |
|
| 99 | + return $this->users; |
|
| 100 | + |
|
| 101 | + } |
|
| 102 | + |
|
| 103 | + /** |
|
| 104 | + * The xmlSerialize metod is called during xml writing. |
|
| 105 | + * |
|
| 106 | + * Use the $writer argument to write its own xml serialization. |
|
| 107 | + * |
|
| 108 | + * An important note: do _not_ create a parent element. Any element |
|
| 109 | + * implementing XmlSerializble should only ever write what's considered |
|
| 110 | + * its 'inner xml'. |
|
| 111 | + * |
|
| 112 | + * The parent of the current element is responsible for writing a |
|
| 113 | + * containing element. |
|
| 114 | + * |
|
| 115 | + * This allows serializers to be re-used for different element names. |
|
| 116 | + * |
|
| 117 | + * If you are opening new elements, you must also close them again. |
|
| 118 | + * |
|
| 119 | + * @param Writer $writer |
|
| 120 | + * @return void |
|
| 121 | + */ |
|
| 122 | + function xmlSerialize(Writer $writer) { |
|
| 123 | + |
|
| 124 | + $cs = '{' . Plugin::NS_OWNCLOUD . '}'; |
|
| 125 | + |
|
| 126 | + if (!is_null($this->organizer)) { |
|
| 127 | + |
|
| 128 | + $writer->startElement($cs . 'organizer'); |
|
| 129 | + $writer->writeElement('{DAV:}href', $this->organizer['href']); |
|
| 130 | + |
|
| 131 | + if (isset($this->organizer['commonName']) && $this->organizer['commonName']) { |
|
| 132 | + $writer->writeElement($cs . 'common-name', $this->organizer['commonName']); |
|
| 133 | + } |
|
| 134 | + if (isset($this->organizer['firstName']) && $this->organizer['firstName']) { |
|
| 135 | + $writer->writeElement($cs . 'first-name', $this->organizer['firstName']); |
|
| 136 | + } |
|
| 137 | + if (isset($this->organizer['lastName']) && $this->organizer['lastName']) { |
|
| 138 | + $writer->writeElement($cs . 'last-name', $this->organizer['lastName']); |
|
| 139 | + } |
|
| 140 | + $writer->endElement(); // organizer |
|
| 141 | + |
|
| 142 | + } |
|
| 143 | + |
|
| 144 | + foreach ($this->users as $user) { |
|
| 145 | + |
|
| 146 | + $writer->startElement($cs . 'user'); |
|
| 147 | + $writer->writeElement('{DAV:}href', $user['href']); |
|
| 148 | + if (isset($user['commonName']) && $user['commonName']) { |
|
| 149 | + $writer->writeElement($cs . 'common-name', $user['commonName']); |
|
| 150 | + } |
|
| 151 | + $writer->writeElement($cs . 'invite-accepted'); |
|
| 152 | + |
|
| 153 | + $writer->startElement($cs . 'access'); |
|
| 154 | + if ($user['readOnly']) { |
|
| 155 | + $writer->writeElement($cs . 'read'); |
|
| 156 | + } else { |
|
| 157 | + $writer->writeElement($cs . 'read-write'); |
|
| 158 | + } |
|
| 159 | + $writer->endElement(); // access |
|
| 160 | + |
|
| 161 | + if (isset($user['summary']) && $user['summary']) { |
|
| 162 | + $writer->writeElement($cs . 'summary', $user['summary']); |
|
| 163 | + } |
|
| 164 | + |
|
| 165 | + $writer->endElement(); //user |
|
| 166 | + |
|
| 167 | + } |
|
| 168 | + |
|
| 169 | + } |
|
| 170 | 170 | } |
@@ -121,21 +121,21 @@ discard block |
||
| 121 | 121 | */ |
| 122 | 122 | function xmlSerialize(Writer $writer) { |
| 123 | 123 | |
| 124 | - $cs = '{' . Plugin::NS_OWNCLOUD . '}'; |
|
| 124 | + $cs = '{'.Plugin::NS_OWNCLOUD.'}'; |
|
| 125 | 125 | |
| 126 | 126 | if (!is_null($this->organizer)) { |
| 127 | 127 | |
| 128 | - $writer->startElement($cs . 'organizer'); |
|
| 128 | + $writer->startElement($cs.'organizer'); |
|
| 129 | 129 | $writer->writeElement('{DAV:}href', $this->organizer['href']); |
| 130 | 130 | |
| 131 | 131 | if (isset($this->organizer['commonName']) && $this->organizer['commonName']) { |
| 132 | - $writer->writeElement($cs . 'common-name', $this->organizer['commonName']); |
|
| 132 | + $writer->writeElement($cs.'common-name', $this->organizer['commonName']); |
|
| 133 | 133 | } |
| 134 | 134 | if (isset($this->organizer['firstName']) && $this->organizer['firstName']) { |
| 135 | - $writer->writeElement($cs . 'first-name', $this->organizer['firstName']); |
|
| 135 | + $writer->writeElement($cs.'first-name', $this->organizer['firstName']); |
|
| 136 | 136 | } |
| 137 | 137 | if (isset($this->organizer['lastName']) && $this->organizer['lastName']) { |
| 138 | - $writer->writeElement($cs . 'last-name', $this->organizer['lastName']); |
|
| 138 | + $writer->writeElement($cs.'last-name', $this->organizer['lastName']); |
|
| 139 | 139 | } |
| 140 | 140 | $writer->endElement(); // organizer |
| 141 | 141 | |
@@ -143,23 +143,23 @@ discard block |
||
| 143 | 143 | |
| 144 | 144 | foreach ($this->users as $user) { |
| 145 | 145 | |
| 146 | - $writer->startElement($cs . 'user'); |
|
| 146 | + $writer->startElement($cs.'user'); |
|
| 147 | 147 | $writer->writeElement('{DAV:}href', $user['href']); |
| 148 | 148 | if (isset($user['commonName']) && $user['commonName']) { |
| 149 | - $writer->writeElement($cs . 'common-name', $user['commonName']); |
|
| 149 | + $writer->writeElement($cs.'common-name', $user['commonName']); |
|
| 150 | 150 | } |
| 151 | - $writer->writeElement($cs . 'invite-accepted'); |
|
| 151 | + $writer->writeElement($cs.'invite-accepted'); |
|
| 152 | 152 | |
| 153 | - $writer->startElement($cs . 'access'); |
|
| 153 | + $writer->startElement($cs.'access'); |
|
| 154 | 154 | if ($user['readOnly']) { |
| 155 | - $writer->writeElement($cs . 'read'); |
|
| 155 | + $writer->writeElement($cs.'read'); |
|
| 156 | 156 | } else { |
| 157 | - $writer->writeElement($cs . 'read-write'); |
|
| 157 | + $writer->writeElement($cs.'read-write'); |
|
| 158 | 158 | } |
| 159 | 159 | $writer->endElement(); // access |
| 160 | 160 | |
| 161 | 161 | if (isset($user['summary']) && $user['summary']) { |
| 162 | - $writer->writeElement($cs . 'summary', $user['summary']); |
|
| 162 | + $writer->writeElement($cs.'summary', $user['summary']); |
|
| 163 | 163 | } |
| 164 | 164 | |
| 165 | 165 | $writer->endElement(); //user |
@@ -29,188 +29,188 @@ |
||
| 29 | 29 | |
| 30 | 30 | class Backend { |
| 31 | 31 | |
| 32 | - /** @var IDBConnection */ |
|
| 33 | - private $db; |
|
| 34 | - /** @var Principal */ |
|
| 35 | - private $principalBackend; |
|
| 36 | - /** @var string */ |
|
| 37 | - private $resourceType; |
|
| 38 | - |
|
| 39 | - const ACCESS_OWNER = 1; |
|
| 40 | - const ACCESS_READ_WRITE = 2; |
|
| 41 | - const ACCESS_READ = 3; |
|
| 42 | - |
|
| 43 | - /** |
|
| 44 | - * @param IDBConnection $db |
|
| 45 | - * @param Principal $principalBackend |
|
| 46 | - * @param string $resourceType |
|
| 47 | - */ |
|
| 48 | - public function __construct(IDBConnection $db, Principal $principalBackend, $resourceType) { |
|
| 49 | - $this->db = $db; |
|
| 50 | - $this->principalBackend = $principalBackend; |
|
| 51 | - $this->resourceType = $resourceType; |
|
| 52 | - } |
|
| 53 | - |
|
| 54 | - /** |
|
| 55 | - * @param IShareable $shareable |
|
| 56 | - * @param string[] $add |
|
| 57 | - * @param string[] $remove |
|
| 58 | - */ |
|
| 59 | - public function updateShares($shareable, $add, $remove) { |
|
| 60 | - foreach($add as $element) { |
|
| 61 | - $this->shareWith($shareable, $element); |
|
| 62 | - } |
|
| 63 | - foreach($remove as $element) { |
|
| 64 | - $this->unshare($shareable, $element); |
|
| 65 | - } |
|
| 66 | - } |
|
| 67 | - |
|
| 68 | - /** |
|
| 69 | - * @param IShareable $shareable |
|
| 70 | - * @param string $element |
|
| 71 | - */ |
|
| 72 | - private function shareWith($shareable, $element) { |
|
| 73 | - $user = $element['href']; |
|
| 74 | - $parts = explode(':', $user, 2); |
|
| 75 | - if ($parts[0] !== 'principal') { |
|
| 76 | - return; |
|
| 77 | - } |
|
| 78 | - |
|
| 79 | - // don't share with owner |
|
| 80 | - if ($shareable->getOwner() === $parts[1]) { |
|
| 81 | - return; |
|
| 82 | - } |
|
| 83 | - |
|
| 84 | - // remove the share if it already exists |
|
| 85 | - $this->unshare($shareable, $element['href']); |
|
| 86 | - $access = self::ACCESS_READ; |
|
| 87 | - if (isset($element['readOnly'])) { |
|
| 88 | - $access = $element['readOnly'] ? self::ACCESS_READ : self::ACCESS_READ_WRITE; |
|
| 89 | - } |
|
| 90 | - |
|
| 91 | - $query = $this->db->getQueryBuilder(); |
|
| 92 | - $query->insert('dav_shares') |
|
| 93 | - ->values([ |
|
| 94 | - 'principaluri' => $query->createNamedParameter($parts[1]), |
|
| 95 | - 'type' => $query->createNamedParameter($this->resourceType), |
|
| 96 | - 'access' => $query->createNamedParameter($access), |
|
| 97 | - 'resourceid' => $query->createNamedParameter($shareable->getResourceId()) |
|
| 98 | - ]); |
|
| 99 | - $query->execute(); |
|
| 100 | - } |
|
| 101 | - |
|
| 102 | - /** |
|
| 103 | - * @param $resourceId |
|
| 104 | - */ |
|
| 105 | - public function deleteAllShares($resourceId) { |
|
| 106 | - $query = $this->db->getQueryBuilder(); |
|
| 107 | - $query->delete('dav_shares') |
|
| 108 | - ->where($query->expr()->eq('resourceid', $query->createNamedParameter($resourceId))) |
|
| 109 | - ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 110 | - ->execute(); |
|
| 111 | - } |
|
| 112 | - |
|
| 113 | - public function deleteAllSharesByUser($principaluri) { |
|
| 114 | - $query = $this->db->getQueryBuilder(); |
|
| 115 | - $query->delete('dav_shares') |
|
| 116 | - ->where($query->expr()->eq('principaluri', $query->createNamedParameter($principaluri))) |
|
| 117 | - ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 118 | - ->execute(); |
|
| 119 | - } |
|
| 120 | - |
|
| 121 | - /** |
|
| 122 | - * @param IShareable $shareable |
|
| 123 | - * @param string $element |
|
| 124 | - */ |
|
| 125 | - private function unshare($shareable, $element) { |
|
| 126 | - $parts = explode(':', $element, 2); |
|
| 127 | - if ($parts[0] !== 'principal') { |
|
| 128 | - return; |
|
| 129 | - } |
|
| 130 | - |
|
| 131 | - // don't share with owner |
|
| 132 | - if ($shareable->getOwner() === $parts[1]) { |
|
| 133 | - return; |
|
| 134 | - } |
|
| 135 | - |
|
| 136 | - $query = $this->db->getQueryBuilder(); |
|
| 137 | - $query->delete('dav_shares') |
|
| 138 | - ->where($query->expr()->eq('resourceid', $query->createNamedParameter($shareable->getResourceId()))) |
|
| 139 | - ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 140 | - ->andWhere($query->expr()->eq('principaluri', $query->createNamedParameter($parts[1]))) |
|
| 141 | - ; |
|
| 142 | - $query->execute(); |
|
| 143 | - } |
|
| 144 | - |
|
| 145 | - /** |
|
| 146 | - * Returns the list of people whom this resource is shared with. |
|
| 147 | - * |
|
| 148 | - * Every element in this array should have the following properties: |
|
| 149 | - * * href - Often a mailto: address |
|
| 150 | - * * commonName - Optional, for example a first + last name |
|
| 151 | - * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. |
|
| 152 | - * * readOnly - boolean |
|
| 153 | - * * summary - Optional, a description for the share |
|
| 154 | - * |
|
| 155 | - * @param int $resourceId |
|
| 156 | - * @return array |
|
| 157 | - */ |
|
| 158 | - public function getShares($resourceId) { |
|
| 159 | - $query = $this->db->getQueryBuilder(); |
|
| 160 | - $result = $query->select(['principaluri', 'access']) |
|
| 161 | - ->from('dav_shares') |
|
| 162 | - ->where($query->expr()->eq('resourceid', $query->createNamedParameter($resourceId))) |
|
| 163 | - ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 164 | - ->execute(); |
|
| 165 | - |
|
| 166 | - $shares = []; |
|
| 167 | - while($row = $result->fetch()) { |
|
| 168 | - $p = $this->principalBackend->getPrincipalByPath($row['principaluri']); |
|
| 169 | - $shares[]= [ |
|
| 170 | - 'href' => "principal:${row['principaluri']}", |
|
| 171 | - 'commonName' => isset($p['{DAV:}displayname']) ? $p['{DAV:}displayname'] : '', |
|
| 172 | - 'status' => 1, |
|
| 173 | - 'readOnly' => ($row['access'] == self::ACCESS_READ), |
|
| 174 | - '{http://owncloud.org/ns}principal' => $row['principaluri'], |
|
| 175 | - '{http://owncloud.org/ns}group-share' => is_null($p) |
|
| 176 | - ]; |
|
| 177 | - } |
|
| 178 | - |
|
| 179 | - return $shares; |
|
| 180 | - } |
|
| 181 | - |
|
| 182 | - /** |
|
| 183 | - * For shared resources the sharee is set in the ACL of the resource |
|
| 184 | - * |
|
| 185 | - * @param int $resourceId |
|
| 186 | - * @param array $acl |
|
| 187 | - * @return array |
|
| 188 | - */ |
|
| 189 | - public function applyShareAcl($resourceId, $acl) { |
|
| 190 | - |
|
| 191 | - $shares = $this->getShares($resourceId); |
|
| 192 | - foreach ($shares as $share) { |
|
| 193 | - $acl[] = [ |
|
| 194 | - 'privilege' => '{DAV:}read', |
|
| 195 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 196 | - 'protected' => true, |
|
| 197 | - ]; |
|
| 198 | - if (!$share['readOnly']) { |
|
| 199 | - $acl[] = [ |
|
| 200 | - 'privilege' => '{DAV:}write', |
|
| 201 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 202 | - 'protected' => true, |
|
| 203 | - ]; |
|
| 204 | - } else if ($this->resourceType === 'calendar') { |
|
| 205 | - // Allow changing the properties of read only calendars, |
|
| 206 | - // so users can change the visibility. |
|
| 207 | - $acl[] = [ |
|
| 208 | - 'privilege' => '{DAV:}write-properties', |
|
| 209 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 210 | - 'protected' => true, |
|
| 211 | - ]; |
|
| 212 | - } |
|
| 213 | - } |
|
| 214 | - return $acl; |
|
| 215 | - } |
|
| 32 | + /** @var IDBConnection */ |
|
| 33 | + private $db; |
|
| 34 | + /** @var Principal */ |
|
| 35 | + private $principalBackend; |
|
| 36 | + /** @var string */ |
|
| 37 | + private $resourceType; |
|
| 38 | + |
|
| 39 | + const ACCESS_OWNER = 1; |
|
| 40 | + const ACCESS_READ_WRITE = 2; |
|
| 41 | + const ACCESS_READ = 3; |
|
| 42 | + |
|
| 43 | + /** |
|
| 44 | + * @param IDBConnection $db |
|
| 45 | + * @param Principal $principalBackend |
|
| 46 | + * @param string $resourceType |
|
| 47 | + */ |
|
| 48 | + public function __construct(IDBConnection $db, Principal $principalBackend, $resourceType) { |
|
| 49 | + $this->db = $db; |
|
| 50 | + $this->principalBackend = $principalBackend; |
|
| 51 | + $this->resourceType = $resourceType; |
|
| 52 | + } |
|
| 53 | + |
|
| 54 | + /** |
|
| 55 | + * @param IShareable $shareable |
|
| 56 | + * @param string[] $add |
|
| 57 | + * @param string[] $remove |
|
| 58 | + */ |
|
| 59 | + public function updateShares($shareable, $add, $remove) { |
|
| 60 | + foreach($add as $element) { |
|
| 61 | + $this->shareWith($shareable, $element); |
|
| 62 | + } |
|
| 63 | + foreach($remove as $element) { |
|
| 64 | + $this->unshare($shareable, $element); |
|
| 65 | + } |
|
| 66 | + } |
|
| 67 | + |
|
| 68 | + /** |
|
| 69 | + * @param IShareable $shareable |
|
| 70 | + * @param string $element |
|
| 71 | + */ |
|
| 72 | + private function shareWith($shareable, $element) { |
|
| 73 | + $user = $element['href']; |
|
| 74 | + $parts = explode(':', $user, 2); |
|
| 75 | + if ($parts[0] !== 'principal') { |
|
| 76 | + return; |
|
| 77 | + } |
|
| 78 | + |
|
| 79 | + // don't share with owner |
|
| 80 | + if ($shareable->getOwner() === $parts[1]) { |
|
| 81 | + return; |
|
| 82 | + } |
|
| 83 | + |
|
| 84 | + // remove the share if it already exists |
|
| 85 | + $this->unshare($shareable, $element['href']); |
|
| 86 | + $access = self::ACCESS_READ; |
|
| 87 | + if (isset($element['readOnly'])) { |
|
| 88 | + $access = $element['readOnly'] ? self::ACCESS_READ : self::ACCESS_READ_WRITE; |
|
| 89 | + } |
|
| 90 | + |
|
| 91 | + $query = $this->db->getQueryBuilder(); |
|
| 92 | + $query->insert('dav_shares') |
|
| 93 | + ->values([ |
|
| 94 | + 'principaluri' => $query->createNamedParameter($parts[1]), |
|
| 95 | + 'type' => $query->createNamedParameter($this->resourceType), |
|
| 96 | + 'access' => $query->createNamedParameter($access), |
|
| 97 | + 'resourceid' => $query->createNamedParameter($shareable->getResourceId()) |
|
| 98 | + ]); |
|
| 99 | + $query->execute(); |
|
| 100 | + } |
|
| 101 | + |
|
| 102 | + /** |
|
| 103 | + * @param $resourceId |
|
| 104 | + */ |
|
| 105 | + public function deleteAllShares($resourceId) { |
|
| 106 | + $query = $this->db->getQueryBuilder(); |
|
| 107 | + $query->delete('dav_shares') |
|
| 108 | + ->where($query->expr()->eq('resourceid', $query->createNamedParameter($resourceId))) |
|
| 109 | + ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 110 | + ->execute(); |
|
| 111 | + } |
|
| 112 | + |
|
| 113 | + public function deleteAllSharesByUser($principaluri) { |
|
| 114 | + $query = $this->db->getQueryBuilder(); |
|
| 115 | + $query->delete('dav_shares') |
|
| 116 | + ->where($query->expr()->eq('principaluri', $query->createNamedParameter($principaluri))) |
|
| 117 | + ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 118 | + ->execute(); |
|
| 119 | + } |
|
| 120 | + |
|
| 121 | + /** |
|
| 122 | + * @param IShareable $shareable |
|
| 123 | + * @param string $element |
|
| 124 | + */ |
|
| 125 | + private function unshare($shareable, $element) { |
|
| 126 | + $parts = explode(':', $element, 2); |
|
| 127 | + if ($parts[0] !== 'principal') { |
|
| 128 | + return; |
|
| 129 | + } |
|
| 130 | + |
|
| 131 | + // don't share with owner |
|
| 132 | + if ($shareable->getOwner() === $parts[1]) { |
|
| 133 | + return; |
|
| 134 | + } |
|
| 135 | + |
|
| 136 | + $query = $this->db->getQueryBuilder(); |
|
| 137 | + $query->delete('dav_shares') |
|
| 138 | + ->where($query->expr()->eq('resourceid', $query->createNamedParameter($shareable->getResourceId()))) |
|
| 139 | + ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 140 | + ->andWhere($query->expr()->eq('principaluri', $query->createNamedParameter($parts[1]))) |
|
| 141 | + ; |
|
| 142 | + $query->execute(); |
|
| 143 | + } |
|
| 144 | + |
|
| 145 | + /** |
|
| 146 | + * Returns the list of people whom this resource is shared with. |
|
| 147 | + * |
|
| 148 | + * Every element in this array should have the following properties: |
|
| 149 | + * * href - Often a mailto: address |
|
| 150 | + * * commonName - Optional, for example a first + last name |
|
| 151 | + * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. |
|
| 152 | + * * readOnly - boolean |
|
| 153 | + * * summary - Optional, a description for the share |
|
| 154 | + * |
|
| 155 | + * @param int $resourceId |
|
| 156 | + * @return array |
|
| 157 | + */ |
|
| 158 | + public function getShares($resourceId) { |
|
| 159 | + $query = $this->db->getQueryBuilder(); |
|
| 160 | + $result = $query->select(['principaluri', 'access']) |
|
| 161 | + ->from('dav_shares') |
|
| 162 | + ->where($query->expr()->eq('resourceid', $query->createNamedParameter($resourceId))) |
|
| 163 | + ->andWhere($query->expr()->eq('type', $query->createNamedParameter($this->resourceType))) |
|
| 164 | + ->execute(); |
|
| 165 | + |
|
| 166 | + $shares = []; |
|
| 167 | + while($row = $result->fetch()) { |
|
| 168 | + $p = $this->principalBackend->getPrincipalByPath($row['principaluri']); |
|
| 169 | + $shares[]= [ |
|
| 170 | + 'href' => "principal:${row['principaluri']}", |
|
| 171 | + 'commonName' => isset($p['{DAV:}displayname']) ? $p['{DAV:}displayname'] : '', |
|
| 172 | + 'status' => 1, |
|
| 173 | + 'readOnly' => ($row['access'] == self::ACCESS_READ), |
|
| 174 | + '{http://owncloud.org/ns}principal' => $row['principaluri'], |
|
| 175 | + '{http://owncloud.org/ns}group-share' => is_null($p) |
|
| 176 | + ]; |
|
| 177 | + } |
|
| 178 | + |
|
| 179 | + return $shares; |
|
| 180 | + } |
|
| 181 | + |
|
| 182 | + /** |
|
| 183 | + * For shared resources the sharee is set in the ACL of the resource |
|
| 184 | + * |
|
| 185 | + * @param int $resourceId |
|
| 186 | + * @param array $acl |
|
| 187 | + * @return array |
|
| 188 | + */ |
|
| 189 | + public function applyShareAcl($resourceId, $acl) { |
|
| 190 | + |
|
| 191 | + $shares = $this->getShares($resourceId); |
|
| 192 | + foreach ($shares as $share) { |
|
| 193 | + $acl[] = [ |
|
| 194 | + 'privilege' => '{DAV:}read', |
|
| 195 | + 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 196 | + 'protected' => true, |
|
| 197 | + ]; |
|
| 198 | + if (!$share['readOnly']) { |
|
| 199 | + $acl[] = [ |
|
| 200 | + 'privilege' => '{DAV:}write', |
|
| 201 | + 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 202 | + 'protected' => true, |
|
| 203 | + ]; |
|
| 204 | + } else if ($this->resourceType === 'calendar') { |
|
| 205 | + // Allow changing the properties of read only calendars, |
|
| 206 | + // so users can change the visibility. |
|
| 207 | + $acl[] = [ |
|
| 208 | + 'privilege' => '{DAV:}write-properties', |
|
| 209 | + 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 210 | + 'protected' => true, |
|
| 211 | + ]; |
|
| 212 | + } |
|
| 213 | + } |
|
| 214 | + return $acl; |
|
| 215 | + } |
|
| 216 | 216 | } |
@@ -57,10 +57,10 @@ discard block |
||
| 57 | 57 | * @param string[] $remove |
| 58 | 58 | */ |
| 59 | 59 | public function updateShares($shareable, $add, $remove) { |
| 60 | - foreach($add as $element) { |
|
| 60 | + foreach ($add as $element) { |
|
| 61 | 61 | $this->shareWith($shareable, $element); |
| 62 | 62 | } |
| 63 | - foreach($remove as $element) { |
|
| 63 | + foreach ($remove as $element) { |
|
| 64 | 64 | $this->unshare($shareable, $element); |
| 65 | 65 | } |
| 66 | 66 | } |
@@ -164,9 +164,9 @@ discard block |
||
| 164 | 164 | ->execute(); |
| 165 | 165 | |
| 166 | 166 | $shares = []; |
| 167 | - while($row = $result->fetch()) { |
|
| 167 | + while ($row = $result->fetch()) { |
|
| 168 | 168 | $p = $this->principalBackend->getPrincipalByPath($row['principaluri']); |
| 169 | - $shares[]= [ |
|
| 169 | + $shares[] = [ |
|
| 170 | 170 | 'href' => "principal:${row['principaluri']}", |
| 171 | 171 | 'commonName' => isset($p['{DAV:}displayname']) ? $p['{DAV:}displayname'] : '', |
| 172 | 172 | 'status' => 1, |
@@ -192,13 +192,13 @@ discard block |
||
| 192 | 192 | foreach ($shares as $share) { |
| 193 | 193 | $acl[] = [ |
| 194 | 194 | 'privilege' => '{DAV:}read', |
| 195 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 195 | + 'principal' => $share['{'.\OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD.'}principal'], |
|
| 196 | 196 | 'protected' => true, |
| 197 | 197 | ]; |
| 198 | 198 | if (!$share['readOnly']) { |
| 199 | 199 | $acl[] = [ |
| 200 | 200 | 'privilege' => '{DAV:}write', |
| 201 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 201 | + 'principal' => $share['{'.\OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD.'}principal'], |
|
| 202 | 202 | 'protected' => true, |
| 203 | 203 | ]; |
| 204 | 204 | } else if ($this->resourceType === 'calendar') { |
@@ -206,7 +206,7 @@ discard block |
||
| 206 | 206 | // so users can change the visibility. |
| 207 | 207 | $acl[] = [ |
| 208 | 208 | 'privilege' => '{DAV:}write-properties', |
| 209 | - 'principal' => $share['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}principal'], |
|
| 209 | + 'principal' => $share['{'.\OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD.'}principal'], |
|
| 210 | 210 | 'protected' => true, |
| 211 | 211 | ]; |
| 212 | 212 | } |
@@ -28,48 +28,48 @@ |
||
| 28 | 28 | */ |
| 29 | 29 | interface IShareable extends INode { |
| 30 | 30 | |
| 31 | - /** |
|
| 32 | - * Updates the list of shares. |
|
| 33 | - * |
|
| 34 | - * The first array is a list of people that are to be added to the |
|
| 35 | - * resource. |
|
| 36 | - * |
|
| 37 | - * Every element in the add array has the following properties: |
|
| 38 | - * * href - A url. Usually a mailto: address |
|
| 39 | - * * commonName - Usually a first and last name, or false |
|
| 40 | - * * summary - A description of the share, can also be false |
|
| 41 | - * * readOnly - A boolean value |
|
| 42 | - * |
|
| 43 | - * Every element in the remove array is just the address string. |
|
| 44 | - * |
|
| 45 | - * @param array $add |
|
| 46 | - * @param array $remove |
|
| 47 | - * @return void |
|
| 48 | - */ |
|
| 49 | - function updateShares(array $add, array $remove); |
|
| 31 | + /** |
|
| 32 | + * Updates the list of shares. |
|
| 33 | + * |
|
| 34 | + * The first array is a list of people that are to be added to the |
|
| 35 | + * resource. |
|
| 36 | + * |
|
| 37 | + * Every element in the add array has the following properties: |
|
| 38 | + * * href - A url. Usually a mailto: address |
|
| 39 | + * * commonName - Usually a first and last name, or false |
|
| 40 | + * * summary - A description of the share, can also be false |
|
| 41 | + * * readOnly - A boolean value |
|
| 42 | + * |
|
| 43 | + * Every element in the remove array is just the address string. |
|
| 44 | + * |
|
| 45 | + * @param array $add |
|
| 46 | + * @param array $remove |
|
| 47 | + * @return void |
|
| 48 | + */ |
|
| 49 | + function updateShares(array $add, array $remove); |
|
| 50 | 50 | |
| 51 | - /** |
|
| 52 | - * Returns the list of people whom this resource is shared with. |
|
| 53 | - * |
|
| 54 | - * Every element in this array should have the following properties: |
|
| 55 | - * * href - Often a mailto: address |
|
| 56 | - * * commonName - Optional, for example a first + last name |
|
| 57 | - * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. |
|
| 58 | - * * readOnly - boolean |
|
| 59 | - * * summary - Optional, a description for the share |
|
| 60 | - * |
|
| 61 | - * @return array |
|
| 62 | - */ |
|
| 63 | - function getShares(); |
|
| 51 | + /** |
|
| 52 | + * Returns the list of people whom this resource is shared with. |
|
| 53 | + * |
|
| 54 | + * Every element in this array should have the following properties: |
|
| 55 | + * * href - Often a mailto: address |
|
| 56 | + * * commonName - Optional, for example a first + last name |
|
| 57 | + * * status - See the Sabre\CalDAV\SharingPlugin::STATUS_ constants. |
|
| 58 | + * * readOnly - boolean |
|
| 59 | + * * summary - Optional, a description for the share |
|
| 60 | + * |
|
| 61 | + * @return array |
|
| 62 | + */ |
|
| 63 | + function getShares(); |
|
| 64 | 64 | |
| 65 | - /** |
|
| 66 | - * @return int |
|
| 67 | - */ |
|
| 68 | - public function getResourceId(); |
|
| 65 | + /** |
|
| 66 | + * @return int |
|
| 67 | + */ |
|
| 68 | + public function getResourceId(); |
|
| 69 | 69 | |
| 70 | - /** |
|
| 71 | - * @return string |
|
| 72 | - */ |
|
| 73 | - public function getOwner(); |
|
| 70 | + /** |
|
| 71 | + * @return string |
|
| 72 | + */ |
|
| 73 | + public function getOwner(); |
|
| 74 | 74 | |
| 75 | 75 | } |
| 76 | 76 | \ No newline at end of file |
@@ -43,85 +43,85 @@ |
||
| 43 | 43 | */ |
| 44 | 44 | class EntityTypeCollection extends RootCollection { |
| 45 | 45 | |
| 46 | - /** @var ILogger */ |
|
| 47 | - protected $logger; |
|
| 46 | + /** @var ILogger */ |
|
| 47 | + protected $logger; |
|
| 48 | 48 | |
| 49 | - /** @var IUserManager */ |
|
| 50 | - protected $userManager; |
|
| 49 | + /** @var IUserManager */ |
|
| 50 | + protected $userManager; |
|
| 51 | 51 | |
| 52 | - /** @var \Closure */ |
|
| 53 | - protected $childExistsFunction; |
|
| 52 | + /** @var \Closure */ |
|
| 53 | + protected $childExistsFunction; |
|
| 54 | 54 | |
| 55 | - /** |
|
| 56 | - * @param string $name |
|
| 57 | - * @param ICommentsManager $commentsManager |
|
| 58 | - * @param IUserManager $userManager |
|
| 59 | - * @param IUserSession $userSession |
|
| 60 | - * @param ILogger $logger |
|
| 61 | - * @param \Closure $childExistsFunction |
|
| 62 | - */ |
|
| 63 | - public function __construct( |
|
| 64 | - $name, |
|
| 65 | - ICommentsManager $commentsManager, |
|
| 66 | - IUserManager $userManager, |
|
| 67 | - IUserSession $userSession, |
|
| 68 | - ILogger $logger, |
|
| 69 | - \Closure $childExistsFunction |
|
| 70 | - ) { |
|
| 71 | - $name = trim($name); |
|
| 72 | - if(empty($name) || !is_string($name)) { |
|
| 73 | - throw new \InvalidArgumentException('"name" parameter must be non-empty string'); |
|
| 74 | - } |
|
| 75 | - $this->name = $name; |
|
| 76 | - $this->commentsManager = $commentsManager; |
|
| 77 | - $this->logger = $logger; |
|
| 78 | - $this->userManager = $userManager; |
|
| 79 | - $this->userSession = $userSession; |
|
| 80 | - $this->childExistsFunction = $childExistsFunction; |
|
| 81 | - } |
|
| 55 | + /** |
|
| 56 | + * @param string $name |
|
| 57 | + * @param ICommentsManager $commentsManager |
|
| 58 | + * @param IUserManager $userManager |
|
| 59 | + * @param IUserSession $userSession |
|
| 60 | + * @param ILogger $logger |
|
| 61 | + * @param \Closure $childExistsFunction |
|
| 62 | + */ |
|
| 63 | + public function __construct( |
|
| 64 | + $name, |
|
| 65 | + ICommentsManager $commentsManager, |
|
| 66 | + IUserManager $userManager, |
|
| 67 | + IUserSession $userSession, |
|
| 68 | + ILogger $logger, |
|
| 69 | + \Closure $childExistsFunction |
|
| 70 | + ) { |
|
| 71 | + $name = trim($name); |
|
| 72 | + if(empty($name) || !is_string($name)) { |
|
| 73 | + throw new \InvalidArgumentException('"name" parameter must be non-empty string'); |
|
| 74 | + } |
|
| 75 | + $this->name = $name; |
|
| 76 | + $this->commentsManager = $commentsManager; |
|
| 77 | + $this->logger = $logger; |
|
| 78 | + $this->userManager = $userManager; |
|
| 79 | + $this->userSession = $userSession; |
|
| 80 | + $this->childExistsFunction = $childExistsFunction; |
|
| 81 | + } |
|
| 82 | 82 | |
| 83 | - /** |
|
| 84 | - * Returns a specific child node, referenced by its name |
|
| 85 | - * |
|
| 86 | - * This method must throw Sabre\DAV\Exception\NotFound if the node does not |
|
| 87 | - * exist. |
|
| 88 | - * |
|
| 89 | - * @param string $name |
|
| 90 | - * @return \Sabre\DAV\INode |
|
| 91 | - * @throws NotFound |
|
| 92 | - */ |
|
| 93 | - function getChild($name) { |
|
| 94 | - if(!$this->childExists($name)) { |
|
| 95 | - throw new NotFound('Entity does not exist or is not available'); |
|
| 96 | - } |
|
| 97 | - return new EntityCollection( |
|
| 98 | - $name, |
|
| 99 | - $this->name, |
|
| 100 | - $this->commentsManager, |
|
| 101 | - $this->userManager, |
|
| 102 | - $this->userSession, |
|
| 103 | - $this->logger |
|
| 104 | - ); |
|
| 105 | - } |
|
| 83 | + /** |
|
| 84 | + * Returns a specific child node, referenced by its name |
|
| 85 | + * |
|
| 86 | + * This method must throw Sabre\DAV\Exception\NotFound if the node does not |
|
| 87 | + * exist. |
|
| 88 | + * |
|
| 89 | + * @param string $name |
|
| 90 | + * @return \Sabre\DAV\INode |
|
| 91 | + * @throws NotFound |
|
| 92 | + */ |
|
| 93 | + function getChild($name) { |
|
| 94 | + if(!$this->childExists($name)) { |
|
| 95 | + throw new NotFound('Entity does not exist or is not available'); |
|
| 96 | + } |
|
| 97 | + return new EntityCollection( |
|
| 98 | + $name, |
|
| 99 | + $this->name, |
|
| 100 | + $this->commentsManager, |
|
| 101 | + $this->userManager, |
|
| 102 | + $this->userSession, |
|
| 103 | + $this->logger |
|
| 104 | + ); |
|
| 105 | + } |
|
| 106 | 106 | |
| 107 | - /** |
|
| 108 | - * Returns an array with all the child nodes |
|
| 109 | - * |
|
| 110 | - * @return \Sabre\DAV\INode[] |
|
| 111 | - * @throws MethodNotAllowed |
|
| 112 | - */ |
|
| 113 | - function getChildren() { |
|
| 114 | - throw new MethodNotAllowed('No permission to list folder contents'); |
|
| 115 | - } |
|
| 107 | + /** |
|
| 108 | + * Returns an array with all the child nodes |
|
| 109 | + * |
|
| 110 | + * @return \Sabre\DAV\INode[] |
|
| 111 | + * @throws MethodNotAllowed |
|
| 112 | + */ |
|
| 113 | + function getChildren() { |
|
| 114 | + throw new MethodNotAllowed('No permission to list folder contents'); |
|
| 115 | + } |
|
| 116 | 116 | |
| 117 | - /** |
|
| 118 | - * Checks if a child-node with the specified name exists |
|
| 119 | - * |
|
| 120 | - * @param string $name |
|
| 121 | - * @return bool |
|
| 122 | - */ |
|
| 123 | - function childExists($name) { |
|
| 124 | - return call_user_func($this->childExistsFunction, $name); |
|
| 125 | - } |
|
| 117 | + /** |
|
| 118 | + * Checks if a child-node with the specified name exists |
|
| 119 | + * |
|
| 120 | + * @param string $name |
|
| 121 | + * @return bool |
|
| 122 | + */ |
|
| 123 | + function childExists($name) { |
|
| 124 | + return call_user_func($this->childExistsFunction, $name); |
|
| 125 | + } |
|
| 126 | 126 | |
| 127 | 127 | } |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | \Closure $childExistsFunction |
| 70 | 70 | ) { |
| 71 | 71 | $name = trim($name); |
| 72 | - if(empty($name) || !is_string($name)) { |
|
| 72 | + if (empty($name) || !is_string($name)) { |
|
| 73 | 73 | throw new \InvalidArgumentException('"name" parameter must be non-empty string'); |
| 74 | 74 | } |
| 75 | 75 | $this->name = $name; |
@@ -91,7 +91,7 @@ discard block |
||
| 91 | 91 | * @throws NotFound |
| 92 | 92 | */ |
| 93 | 93 | function getChild($name) { |
| 94 | - if(!$this->childExists($name)) { |
|
| 94 | + if (!$this->childExists($name)) { |
|
| 95 | 95 | throw new NotFound('Entity does not exist or is not available'); |
| 96 | 96 | } |
| 97 | 97 | return new EntityCollection( |
@@ -36,177 +36,177 @@ |
||
| 36 | 36 | |
| 37 | 37 | class RootCollection implements ICollection { |
| 38 | 38 | |
| 39 | - /** @var EntityTypeCollection[]|null */ |
|
| 40 | - private $entityTypeCollections; |
|
| 41 | - |
|
| 42 | - /** @var ICommentsManager */ |
|
| 43 | - protected $commentsManager; |
|
| 44 | - |
|
| 45 | - /** @var string */ |
|
| 46 | - protected $name = 'comments'; |
|
| 47 | - |
|
| 48 | - /** @var ILogger */ |
|
| 49 | - protected $logger; |
|
| 50 | - |
|
| 51 | - /** @var IUserManager */ |
|
| 52 | - protected $userManager; |
|
| 53 | - |
|
| 54 | - /** @var IUserSession */ |
|
| 55 | - protected $userSession; |
|
| 56 | - |
|
| 57 | - /** @var EventDispatcherInterface */ |
|
| 58 | - protected $dispatcher; |
|
| 59 | - |
|
| 60 | - /** |
|
| 61 | - * @param ICommentsManager $commentsManager |
|
| 62 | - * @param IUserManager $userManager |
|
| 63 | - * @param IUserSession $userSession |
|
| 64 | - * @param EventDispatcherInterface $dispatcher |
|
| 65 | - * @param ILogger $logger |
|
| 66 | - */ |
|
| 67 | - public function __construct( |
|
| 68 | - ICommentsManager $commentsManager, |
|
| 69 | - IUserManager $userManager, |
|
| 70 | - IUserSession $userSession, |
|
| 71 | - EventDispatcherInterface $dispatcher, |
|
| 72 | - ILogger $logger) |
|
| 73 | - { |
|
| 74 | - $this->commentsManager = $commentsManager; |
|
| 75 | - $this->logger = $logger; |
|
| 76 | - $this->userManager = $userManager; |
|
| 77 | - $this->userSession = $userSession; |
|
| 78 | - $this->dispatcher = $dispatcher; |
|
| 79 | - } |
|
| 80 | - |
|
| 81 | - /** |
|
| 82 | - * initializes the collection. At this point of time, we need the logged in |
|
| 83 | - * user. Since it is not the case when the instance is created, we cannot |
|
| 84 | - * have this in the constructor. |
|
| 85 | - * |
|
| 86 | - * @throws NotAuthenticated |
|
| 87 | - */ |
|
| 88 | - protected function initCollections() { |
|
| 89 | - if($this->entityTypeCollections !== null) { |
|
| 90 | - return; |
|
| 91 | - } |
|
| 92 | - $user = $this->userSession->getUser(); |
|
| 93 | - if(is_null($user)) { |
|
| 94 | - throw new NotAuthenticated(); |
|
| 95 | - } |
|
| 96 | - |
|
| 97 | - $event = new CommentsEntityEvent(CommentsEntityEvent::EVENT_ENTITY); |
|
| 98 | - $this->dispatcher->dispatch(CommentsEntityEvent::EVENT_ENTITY, $event); |
|
| 99 | - |
|
| 100 | - $this->entityTypeCollections = []; |
|
| 101 | - foreach ($event->getEntityCollections() as $entity => $entityExistsFunction) { |
|
| 102 | - $this->entityTypeCollections[$entity] = new EntityTypeCollection( |
|
| 103 | - $entity, |
|
| 104 | - $this->commentsManager, |
|
| 105 | - $this->userManager, |
|
| 106 | - $this->userSession, |
|
| 107 | - $this->logger, |
|
| 108 | - $entityExistsFunction |
|
| 109 | - ); |
|
| 110 | - } |
|
| 111 | - } |
|
| 112 | - |
|
| 113 | - /** |
|
| 114 | - * Creates a new file in the directory |
|
| 115 | - * |
|
| 116 | - * @param string $name Name of the file |
|
| 117 | - * @param resource|string $data Initial payload |
|
| 118 | - * @return null|string |
|
| 119 | - * @throws Forbidden |
|
| 120 | - */ |
|
| 121 | - function createFile($name, $data = null) { |
|
| 122 | - throw new Forbidden('Cannot create comments by id'); |
|
| 123 | - } |
|
| 124 | - |
|
| 125 | - /** |
|
| 126 | - * Creates a new subdirectory |
|
| 127 | - * |
|
| 128 | - * @param string $name |
|
| 129 | - * @throws Forbidden |
|
| 130 | - */ |
|
| 131 | - function createDirectory($name) { |
|
| 132 | - throw new Forbidden('Permission denied to create collections'); |
|
| 133 | - } |
|
| 134 | - |
|
| 135 | - /** |
|
| 136 | - * Returns a specific child node, referenced by its name |
|
| 137 | - * |
|
| 138 | - * This method must throw Sabre\DAV\Exception\NotFound if the node does not |
|
| 139 | - * exist. |
|
| 140 | - * |
|
| 141 | - * @param string $name |
|
| 142 | - * @return \Sabre\DAV\INode |
|
| 143 | - * @throws NotFound |
|
| 144 | - */ |
|
| 145 | - function getChild($name) { |
|
| 146 | - $this->initCollections(); |
|
| 147 | - if(isset($this->entityTypeCollections[$name])) { |
|
| 148 | - return $this->entityTypeCollections[$name]; |
|
| 149 | - } |
|
| 150 | - throw new NotFound('Entity type "' . $name . '" not found."'); |
|
| 151 | - } |
|
| 152 | - |
|
| 153 | - /** |
|
| 154 | - * Returns an array with all the child nodes |
|
| 155 | - * |
|
| 156 | - * @return \Sabre\DAV\INode[] |
|
| 157 | - */ |
|
| 158 | - function getChildren() { |
|
| 159 | - $this->initCollections(); |
|
| 160 | - return $this->entityTypeCollections; |
|
| 161 | - } |
|
| 162 | - |
|
| 163 | - /** |
|
| 164 | - * Checks if a child-node with the specified name exists |
|
| 165 | - * |
|
| 166 | - * @param string $name |
|
| 167 | - * @return bool |
|
| 168 | - */ |
|
| 169 | - function childExists($name) { |
|
| 170 | - $this->initCollections(); |
|
| 171 | - return isset($this->entityTypeCollections[$name]); |
|
| 172 | - } |
|
| 173 | - |
|
| 174 | - /** |
|
| 175 | - * Deleted the current node |
|
| 176 | - * |
|
| 177 | - * @throws Forbidden |
|
| 178 | - */ |
|
| 179 | - function delete() { |
|
| 180 | - throw new Forbidden('Permission denied to delete this collection'); |
|
| 181 | - } |
|
| 182 | - |
|
| 183 | - /** |
|
| 184 | - * Returns the name of the node. |
|
| 185 | - * |
|
| 186 | - * This is used to generate the url. |
|
| 187 | - * |
|
| 188 | - * @return string |
|
| 189 | - */ |
|
| 190 | - function getName() { |
|
| 191 | - return $this->name; |
|
| 192 | - } |
|
| 193 | - |
|
| 194 | - /** |
|
| 195 | - * Renames the node |
|
| 196 | - * |
|
| 197 | - * @param string $name The new name |
|
| 198 | - * @throws Forbidden |
|
| 199 | - */ |
|
| 200 | - function setName($name) { |
|
| 201 | - throw new Forbidden('Permission denied to rename this collection'); |
|
| 202 | - } |
|
| 203 | - |
|
| 204 | - /** |
|
| 205 | - * Returns the last modification time, as a unix timestamp |
|
| 206 | - * |
|
| 207 | - * @return int |
|
| 208 | - */ |
|
| 209 | - function getLastModified() { |
|
| 210 | - return null; |
|
| 211 | - } |
|
| 39 | + /** @var EntityTypeCollection[]|null */ |
|
| 40 | + private $entityTypeCollections; |
|
| 41 | + |
|
| 42 | + /** @var ICommentsManager */ |
|
| 43 | + protected $commentsManager; |
|
| 44 | + |
|
| 45 | + /** @var string */ |
|
| 46 | + protected $name = 'comments'; |
|
| 47 | + |
|
| 48 | + /** @var ILogger */ |
|
| 49 | + protected $logger; |
|
| 50 | + |
|
| 51 | + /** @var IUserManager */ |
|
| 52 | + protected $userManager; |
|
| 53 | + |
|
| 54 | + /** @var IUserSession */ |
|
| 55 | + protected $userSession; |
|
| 56 | + |
|
| 57 | + /** @var EventDispatcherInterface */ |
|
| 58 | + protected $dispatcher; |
|
| 59 | + |
|
| 60 | + /** |
|
| 61 | + * @param ICommentsManager $commentsManager |
|
| 62 | + * @param IUserManager $userManager |
|
| 63 | + * @param IUserSession $userSession |
|
| 64 | + * @param EventDispatcherInterface $dispatcher |
|
| 65 | + * @param ILogger $logger |
|
| 66 | + */ |
|
| 67 | + public function __construct( |
|
| 68 | + ICommentsManager $commentsManager, |
|
| 69 | + IUserManager $userManager, |
|
| 70 | + IUserSession $userSession, |
|
| 71 | + EventDispatcherInterface $dispatcher, |
|
| 72 | + ILogger $logger) |
|
| 73 | + { |
|
| 74 | + $this->commentsManager = $commentsManager; |
|
| 75 | + $this->logger = $logger; |
|
| 76 | + $this->userManager = $userManager; |
|
| 77 | + $this->userSession = $userSession; |
|
| 78 | + $this->dispatcher = $dispatcher; |
|
| 79 | + } |
|
| 80 | + |
|
| 81 | + /** |
|
| 82 | + * initializes the collection. At this point of time, we need the logged in |
|
| 83 | + * user. Since it is not the case when the instance is created, we cannot |
|
| 84 | + * have this in the constructor. |
|
| 85 | + * |
|
| 86 | + * @throws NotAuthenticated |
|
| 87 | + */ |
|
| 88 | + protected function initCollections() { |
|
| 89 | + if($this->entityTypeCollections !== null) { |
|
| 90 | + return; |
|
| 91 | + } |
|
| 92 | + $user = $this->userSession->getUser(); |
|
| 93 | + if(is_null($user)) { |
|
| 94 | + throw new NotAuthenticated(); |
|
| 95 | + } |
|
| 96 | + |
|
| 97 | + $event = new CommentsEntityEvent(CommentsEntityEvent::EVENT_ENTITY); |
|
| 98 | + $this->dispatcher->dispatch(CommentsEntityEvent::EVENT_ENTITY, $event); |
|
| 99 | + |
|
| 100 | + $this->entityTypeCollections = []; |
|
| 101 | + foreach ($event->getEntityCollections() as $entity => $entityExistsFunction) { |
|
| 102 | + $this->entityTypeCollections[$entity] = new EntityTypeCollection( |
|
| 103 | + $entity, |
|
| 104 | + $this->commentsManager, |
|
| 105 | + $this->userManager, |
|
| 106 | + $this->userSession, |
|
| 107 | + $this->logger, |
|
| 108 | + $entityExistsFunction |
|
| 109 | + ); |
|
| 110 | + } |
|
| 111 | + } |
|
| 112 | + |
|
| 113 | + /** |
|
| 114 | + * Creates a new file in the directory |
|
| 115 | + * |
|
| 116 | + * @param string $name Name of the file |
|
| 117 | + * @param resource|string $data Initial payload |
|
| 118 | + * @return null|string |
|
| 119 | + * @throws Forbidden |
|
| 120 | + */ |
|
| 121 | + function createFile($name, $data = null) { |
|
| 122 | + throw new Forbidden('Cannot create comments by id'); |
|
| 123 | + } |
|
| 124 | + |
|
| 125 | + /** |
|
| 126 | + * Creates a new subdirectory |
|
| 127 | + * |
|
| 128 | + * @param string $name |
|
| 129 | + * @throws Forbidden |
|
| 130 | + */ |
|
| 131 | + function createDirectory($name) { |
|
| 132 | + throw new Forbidden('Permission denied to create collections'); |
|
| 133 | + } |
|
| 134 | + |
|
| 135 | + /** |
|
| 136 | + * Returns a specific child node, referenced by its name |
|
| 137 | + * |
|
| 138 | + * This method must throw Sabre\DAV\Exception\NotFound if the node does not |
|
| 139 | + * exist. |
|
| 140 | + * |
|
| 141 | + * @param string $name |
|
| 142 | + * @return \Sabre\DAV\INode |
|
| 143 | + * @throws NotFound |
|
| 144 | + */ |
|
| 145 | + function getChild($name) { |
|
| 146 | + $this->initCollections(); |
|
| 147 | + if(isset($this->entityTypeCollections[$name])) { |
|
| 148 | + return $this->entityTypeCollections[$name]; |
|
| 149 | + } |
|
| 150 | + throw new NotFound('Entity type "' . $name . '" not found."'); |
|
| 151 | + } |
|
| 152 | + |
|
| 153 | + /** |
|
| 154 | + * Returns an array with all the child nodes |
|
| 155 | + * |
|
| 156 | + * @return \Sabre\DAV\INode[] |
|
| 157 | + */ |
|
| 158 | + function getChildren() { |
|
| 159 | + $this->initCollections(); |
|
| 160 | + return $this->entityTypeCollections; |
|
| 161 | + } |
|
| 162 | + |
|
| 163 | + /** |
|
| 164 | + * Checks if a child-node with the specified name exists |
|
| 165 | + * |
|
| 166 | + * @param string $name |
|
| 167 | + * @return bool |
|
| 168 | + */ |
|
| 169 | + function childExists($name) { |
|
| 170 | + $this->initCollections(); |
|
| 171 | + return isset($this->entityTypeCollections[$name]); |
|
| 172 | + } |
|
| 173 | + |
|
| 174 | + /** |
|
| 175 | + * Deleted the current node |
|
| 176 | + * |
|
| 177 | + * @throws Forbidden |
|
| 178 | + */ |
|
| 179 | + function delete() { |
|
| 180 | + throw new Forbidden('Permission denied to delete this collection'); |
|
| 181 | + } |
|
| 182 | + |
|
| 183 | + /** |
|
| 184 | + * Returns the name of the node. |
|
| 185 | + * |
|
| 186 | + * This is used to generate the url. |
|
| 187 | + * |
|
| 188 | + * @return string |
|
| 189 | + */ |
|
| 190 | + function getName() { |
|
| 191 | + return $this->name; |
|
| 192 | + } |
|
| 193 | + |
|
| 194 | + /** |
|
| 195 | + * Renames the node |
|
| 196 | + * |
|
| 197 | + * @param string $name The new name |
|
| 198 | + * @throws Forbidden |
|
| 199 | + */ |
|
| 200 | + function setName($name) { |
|
| 201 | + throw new Forbidden('Permission denied to rename this collection'); |
|
| 202 | + } |
|
| 203 | + |
|
| 204 | + /** |
|
| 205 | + * Returns the last modification time, as a unix timestamp |
|
| 206 | + * |
|
| 207 | + * @return int |
|
| 208 | + */ |
|
| 209 | + function getLastModified() { |
|
| 210 | + return null; |
|
| 211 | + } |
|
| 212 | 212 | } |
@@ -86,11 +86,11 @@ discard block |
||
| 86 | 86 | * @throws NotAuthenticated |
| 87 | 87 | */ |
| 88 | 88 | protected function initCollections() { |
| 89 | - if($this->entityTypeCollections !== null) { |
|
| 89 | + if ($this->entityTypeCollections !== null) { |
|
| 90 | 90 | return; |
| 91 | 91 | } |
| 92 | 92 | $user = $this->userSession->getUser(); |
| 93 | - if(is_null($user)) { |
|
| 93 | + if (is_null($user)) { |
|
| 94 | 94 | throw new NotAuthenticated(); |
| 95 | 95 | } |
| 96 | 96 | |
@@ -144,10 +144,10 @@ discard block |
||
| 144 | 144 | */ |
| 145 | 145 | function getChild($name) { |
| 146 | 146 | $this->initCollections(); |
| 147 | - if(isset($this->entityTypeCollections[$name])) { |
|
| 147 | + if (isset($this->entityTypeCollections[$name])) { |
|
| 148 | 148 | return $this->entityTypeCollections[$name]; |
| 149 | 149 | } |
| 150 | - throw new NotFound('Entity type "' . $name . '" not found."'); |
|
| 150 | + throw new NotFound('Entity type "'.$name.'" not found."'); |
|
| 151 | 151 | } |
| 152 | 152 | |
| 153 | 153 | /** |
@@ -42,89 +42,89 @@ |
||
| 42 | 42 | */ |
| 43 | 43 | class PublicAuth extends AbstractBasic { |
| 44 | 44 | |
| 45 | - /** @var \OCP\Share\IShare */ |
|
| 46 | - private $share; |
|
| 45 | + /** @var \OCP\Share\IShare */ |
|
| 46 | + private $share; |
|
| 47 | 47 | |
| 48 | - /** @var IManager */ |
|
| 49 | - private $shareManager; |
|
| 48 | + /** @var IManager */ |
|
| 49 | + private $shareManager; |
|
| 50 | 50 | |
| 51 | - /** @var ISession */ |
|
| 52 | - private $session; |
|
| 51 | + /** @var ISession */ |
|
| 52 | + private $session; |
|
| 53 | 53 | |
| 54 | - /** @var IRequest */ |
|
| 55 | - private $request; |
|
| 54 | + /** @var IRequest */ |
|
| 55 | + private $request; |
|
| 56 | 56 | |
| 57 | - /** |
|
| 58 | - * @param IRequest $request |
|
| 59 | - * @param IManager $shareManager |
|
| 60 | - * @param ISession $session |
|
| 61 | - */ |
|
| 62 | - public function __construct(IRequest $request, |
|
| 63 | - IManager $shareManager, |
|
| 64 | - ISession $session) { |
|
| 65 | - $this->request = $request; |
|
| 66 | - $this->shareManager = $shareManager; |
|
| 67 | - $this->session = $session; |
|
| 57 | + /** |
|
| 58 | + * @param IRequest $request |
|
| 59 | + * @param IManager $shareManager |
|
| 60 | + * @param ISession $session |
|
| 61 | + */ |
|
| 62 | + public function __construct(IRequest $request, |
|
| 63 | + IManager $shareManager, |
|
| 64 | + ISession $session) { |
|
| 65 | + $this->request = $request; |
|
| 66 | + $this->shareManager = $shareManager; |
|
| 67 | + $this->session = $session; |
|
| 68 | 68 | |
| 69 | - // setup realm |
|
| 70 | - $defaults = new \OCP\Defaults(); |
|
| 71 | - $this->realm = $defaults->getName(); |
|
| 72 | - } |
|
| 69 | + // setup realm |
|
| 70 | + $defaults = new \OCP\Defaults(); |
|
| 71 | + $this->realm = $defaults->getName(); |
|
| 72 | + } |
|
| 73 | 73 | |
| 74 | - /** |
|
| 75 | - * Validates a username and password |
|
| 76 | - * |
|
| 77 | - * This method should return true or false depending on if login |
|
| 78 | - * succeeded. |
|
| 79 | - * |
|
| 80 | - * @param string $username |
|
| 81 | - * @param string $password |
|
| 82 | - * |
|
| 83 | - * @return bool |
|
| 84 | - * @throws \Sabre\DAV\Exception\NotAuthenticated |
|
| 85 | - */ |
|
| 86 | - protected function validateUserPass($username, $password) { |
|
| 87 | - try { |
|
| 88 | - $share = $this->shareManager->getShareByToken($username); |
|
| 89 | - } catch (ShareNotFound $e) { |
|
| 90 | - return false; |
|
| 91 | - } |
|
| 74 | + /** |
|
| 75 | + * Validates a username and password |
|
| 76 | + * |
|
| 77 | + * This method should return true or false depending on if login |
|
| 78 | + * succeeded. |
|
| 79 | + * |
|
| 80 | + * @param string $username |
|
| 81 | + * @param string $password |
|
| 82 | + * |
|
| 83 | + * @return bool |
|
| 84 | + * @throws \Sabre\DAV\Exception\NotAuthenticated |
|
| 85 | + */ |
|
| 86 | + protected function validateUserPass($username, $password) { |
|
| 87 | + try { |
|
| 88 | + $share = $this->shareManager->getShareByToken($username); |
|
| 89 | + } catch (ShareNotFound $e) { |
|
| 90 | + return false; |
|
| 91 | + } |
|
| 92 | 92 | |
| 93 | - $this->share = $share; |
|
| 93 | + $this->share = $share; |
|
| 94 | 94 | |
| 95 | - \OC_User::setIncognitoMode(true); |
|
| 95 | + \OC_User::setIncognitoMode(true); |
|
| 96 | 96 | |
| 97 | - // check if the share is password protected |
|
| 98 | - if ($share->getPassword() !== null) { |
|
| 99 | - if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) { |
|
| 100 | - if ($this->shareManager->checkPassword($share, $password)) { |
|
| 101 | - return true; |
|
| 102 | - } else if ($this->session->exists('public_link_authenticated') |
|
| 103 | - && $this->session->get('public_link_authenticated') === (string)$share->getId()) { |
|
| 104 | - return true; |
|
| 105 | - } else { |
|
| 106 | - if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) { |
|
| 107 | - // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
|
| 108 | - http_response_code(401); |
|
| 109 | - header('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 110 | - throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
|
| 111 | - } |
|
| 112 | - return false; |
|
| 113 | - } |
|
| 114 | - } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE) { |
|
| 115 | - return true; |
|
| 116 | - } else { |
|
| 117 | - return false; |
|
| 118 | - } |
|
| 119 | - } else { |
|
| 120 | - return true; |
|
| 121 | - } |
|
| 122 | - } |
|
| 97 | + // check if the share is password protected |
|
| 98 | + if ($share->getPassword() !== null) { |
|
| 99 | + if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) { |
|
| 100 | + if ($this->shareManager->checkPassword($share, $password)) { |
|
| 101 | + return true; |
|
| 102 | + } else if ($this->session->exists('public_link_authenticated') |
|
| 103 | + && $this->session->get('public_link_authenticated') === (string)$share->getId()) { |
|
| 104 | + return true; |
|
| 105 | + } else { |
|
| 106 | + if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) { |
|
| 107 | + // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
|
| 108 | + http_response_code(401); |
|
| 109 | + header('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 110 | + throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
|
| 111 | + } |
|
| 112 | + return false; |
|
| 113 | + } |
|
| 114 | + } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE) { |
|
| 115 | + return true; |
|
| 116 | + } else { |
|
| 117 | + return false; |
|
| 118 | + } |
|
| 119 | + } else { |
|
| 120 | + return true; |
|
| 121 | + } |
|
| 122 | + } |
|
| 123 | 123 | |
| 124 | - /** |
|
| 125 | - * @return \OCP\Share\IShare |
|
| 126 | - */ |
|
| 127 | - public function getShare() { |
|
| 128 | - return $this->share; |
|
| 129 | - } |
|
| 124 | + /** |
|
| 125 | + * @return \OCP\Share\IShare |
|
| 126 | + */ |
|
| 127 | + public function getShare() { |
|
| 128 | + return $this->share; |
|
| 129 | + } |
|
| 130 | 130 | } |
@@ -100,13 +100,13 @@ |
||
| 100 | 100 | if ($this->shareManager->checkPassword($share, $password)) { |
| 101 | 101 | return true; |
| 102 | 102 | } else if ($this->session->exists('public_link_authenticated') |
| 103 | - && $this->session->get('public_link_authenticated') === (string)$share->getId()) { |
|
| 103 | + && $this->session->get('public_link_authenticated') === (string) $share->getId()) { |
|
| 104 | 104 | return true; |
| 105 | 105 | } else { |
| 106 | 106 | if (in_array('XMLHttpRequest', explode(',', $this->request->getHeader('X-Requested-With')))) { |
| 107 | 107 | // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
| 108 | 108 | http_response_code(401); |
| 109 | - header('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 109 | + header('WWW-Authenticate', 'DummyBasic realm="'.$this->realm.'"'); |
|
| 110 | 110 | throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
| 111 | 111 | } |
| 112 | 112 | return false; |
@@ -102,11 +102,11 @@ |
||
| 102 | 102 | * @param array $conditions |
| 103 | 103 | */ |
| 104 | 104 | public function validateTokens(RequestInterface $request, &$conditions) { |
| 105 | - foreach($conditions as &$fileCondition) { |
|
| 106 | - if(isset($fileCondition['tokens'])) { |
|
| 107 | - foreach($fileCondition['tokens'] as &$token) { |
|
| 108 | - if(isset($token['token'])) { |
|
| 109 | - if(substr($token['token'], 0, 16) === 'opaquelocktoken:') { |
|
| 105 | + foreach ($conditions as &$fileCondition) { |
|
| 106 | + if (isset($fileCondition['tokens'])) { |
|
| 107 | + foreach ($fileCondition['tokens'] as &$token) { |
|
| 108 | + if (isset($token['token'])) { |
|
| 109 | + if (substr($token['token'], 0, 16) === 'opaquelocktoken:') { |
|
| 110 | 110 | $token['validToken'] = true; |
| 111 | 111 | } |
| 112 | 112 | } |
@@ -45,114 +45,114 @@ |
||
| 45 | 45 | * @package OCA\DAV\Connector\Sabre |
| 46 | 46 | */ |
| 47 | 47 | class FakeLockerPlugin extends ServerPlugin { |
| 48 | - /** @var \Sabre\DAV\Server */ |
|
| 49 | - private $server; |
|
| 48 | + /** @var \Sabre\DAV\Server */ |
|
| 49 | + private $server; |
|
| 50 | 50 | |
| 51 | - /** {@inheritDoc} */ |
|
| 52 | - public function initialize(\Sabre\DAV\Server $server) { |
|
| 53 | - $this->server = $server; |
|
| 54 | - $this->server->on('method:LOCK', [$this, 'fakeLockProvider'], 1); |
|
| 55 | - $this->server->on('method:UNLOCK', [$this, 'fakeUnlockProvider'], 1); |
|
| 56 | - $server->on('propFind', [$this, 'propFind']); |
|
| 57 | - $server->on('validateTokens', [$this, 'validateTokens']); |
|
| 58 | - } |
|
| 51 | + /** {@inheritDoc} */ |
|
| 52 | + public function initialize(\Sabre\DAV\Server $server) { |
|
| 53 | + $this->server = $server; |
|
| 54 | + $this->server->on('method:LOCK', [$this, 'fakeLockProvider'], 1); |
|
| 55 | + $this->server->on('method:UNLOCK', [$this, 'fakeUnlockProvider'], 1); |
|
| 56 | + $server->on('propFind', [$this, 'propFind']); |
|
| 57 | + $server->on('validateTokens', [$this, 'validateTokens']); |
|
| 58 | + } |
|
| 59 | 59 | |
| 60 | - /** |
|
| 61 | - * Indicate that we support LOCK and UNLOCK |
|
| 62 | - * |
|
| 63 | - * @param string $path |
|
| 64 | - * @return string[] |
|
| 65 | - */ |
|
| 66 | - public function getHTTPMethods($path) { |
|
| 67 | - return [ |
|
| 68 | - 'LOCK', |
|
| 69 | - 'UNLOCK', |
|
| 70 | - ]; |
|
| 71 | - } |
|
| 60 | + /** |
|
| 61 | + * Indicate that we support LOCK and UNLOCK |
|
| 62 | + * |
|
| 63 | + * @param string $path |
|
| 64 | + * @return string[] |
|
| 65 | + */ |
|
| 66 | + public function getHTTPMethods($path) { |
|
| 67 | + return [ |
|
| 68 | + 'LOCK', |
|
| 69 | + 'UNLOCK', |
|
| 70 | + ]; |
|
| 71 | + } |
|
| 72 | 72 | |
| 73 | - /** |
|
| 74 | - * Indicate that we support locking |
|
| 75 | - * |
|
| 76 | - * @return integer[] |
|
| 77 | - */ |
|
| 78 | - function getFeatures() { |
|
| 79 | - return [2]; |
|
| 80 | - } |
|
| 73 | + /** |
|
| 74 | + * Indicate that we support locking |
|
| 75 | + * |
|
| 76 | + * @return integer[] |
|
| 77 | + */ |
|
| 78 | + function getFeatures() { |
|
| 79 | + return [2]; |
|
| 80 | + } |
|
| 81 | 81 | |
| 82 | - /** |
|
| 83 | - * Return some dummy response for PROPFIND requests with regard to locking |
|
| 84 | - * |
|
| 85 | - * @param PropFind $propFind |
|
| 86 | - * @param INode $node |
|
| 87 | - * @return void |
|
| 88 | - */ |
|
| 89 | - function propFind(PropFind $propFind, INode $node) { |
|
| 90 | - $propFind->handle('{DAV:}supportedlock', function() { |
|
| 91 | - return new SupportedLock(true); |
|
| 92 | - }); |
|
| 93 | - $propFind->handle('{DAV:}lockdiscovery', function() use ($propFind) { |
|
| 94 | - return new LockDiscovery([]); |
|
| 95 | - }); |
|
| 96 | - } |
|
| 82 | + /** |
|
| 83 | + * Return some dummy response for PROPFIND requests with regard to locking |
|
| 84 | + * |
|
| 85 | + * @param PropFind $propFind |
|
| 86 | + * @param INode $node |
|
| 87 | + * @return void |
|
| 88 | + */ |
|
| 89 | + function propFind(PropFind $propFind, INode $node) { |
|
| 90 | + $propFind->handle('{DAV:}supportedlock', function() { |
|
| 91 | + return new SupportedLock(true); |
|
| 92 | + }); |
|
| 93 | + $propFind->handle('{DAV:}lockdiscovery', function() use ($propFind) { |
|
| 94 | + return new LockDiscovery([]); |
|
| 95 | + }); |
|
| 96 | + } |
|
| 97 | 97 | |
| 98 | - /** |
|
| 99 | - * Mark a locking token always as valid |
|
| 100 | - * |
|
| 101 | - * @param RequestInterface $request |
|
| 102 | - * @param array $conditions |
|
| 103 | - */ |
|
| 104 | - public function validateTokens(RequestInterface $request, &$conditions) { |
|
| 105 | - foreach($conditions as &$fileCondition) { |
|
| 106 | - if(isset($fileCondition['tokens'])) { |
|
| 107 | - foreach($fileCondition['tokens'] as &$token) { |
|
| 108 | - if(isset($token['token'])) { |
|
| 109 | - if(substr($token['token'], 0, 16) === 'opaquelocktoken:') { |
|
| 110 | - $token['validToken'] = true; |
|
| 111 | - } |
|
| 112 | - } |
|
| 113 | - } |
|
| 114 | - } |
|
| 115 | - } |
|
| 116 | - } |
|
| 98 | + /** |
|
| 99 | + * Mark a locking token always as valid |
|
| 100 | + * |
|
| 101 | + * @param RequestInterface $request |
|
| 102 | + * @param array $conditions |
|
| 103 | + */ |
|
| 104 | + public function validateTokens(RequestInterface $request, &$conditions) { |
|
| 105 | + foreach($conditions as &$fileCondition) { |
|
| 106 | + if(isset($fileCondition['tokens'])) { |
|
| 107 | + foreach($fileCondition['tokens'] as &$token) { |
|
| 108 | + if(isset($token['token'])) { |
|
| 109 | + if(substr($token['token'], 0, 16) === 'opaquelocktoken:') { |
|
| 110 | + $token['validToken'] = true; |
|
| 111 | + } |
|
| 112 | + } |
|
| 113 | + } |
|
| 114 | + } |
|
| 115 | + } |
|
| 116 | + } |
|
| 117 | 117 | |
| 118 | - /** |
|
| 119 | - * Fakes a successful LOCK |
|
| 120 | - * |
|
| 121 | - * @param RequestInterface $request |
|
| 122 | - * @param ResponseInterface $response |
|
| 123 | - * @return bool |
|
| 124 | - */ |
|
| 125 | - public function fakeLockProvider(RequestInterface $request, |
|
| 126 | - ResponseInterface $response) { |
|
| 118 | + /** |
|
| 119 | + * Fakes a successful LOCK |
|
| 120 | + * |
|
| 121 | + * @param RequestInterface $request |
|
| 122 | + * @param ResponseInterface $response |
|
| 123 | + * @return bool |
|
| 124 | + */ |
|
| 125 | + public function fakeLockProvider(RequestInterface $request, |
|
| 126 | + ResponseInterface $response) { |
|
| 127 | 127 | |
| 128 | - $lockInfo = new LockInfo(); |
|
| 129 | - $lockInfo->token = md5($request->getPath()); |
|
| 130 | - $lockInfo->uri = $request->getPath(); |
|
| 131 | - $lockInfo->depth = \Sabre\DAV\Server::DEPTH_INFINITY; |
|
| 132 | - $lockInfo->timeout = 1800; |
|
| 128 | + $lockInfo = new LockInfo(); |
|
| 129 | + $lockInfo->token = md5($request->getPath()); |
|
| 130 | + $lockInfo->uri = $request->getPath(); |
|
| 131 | + $lockInfo->depth = \Sabre\DAV\Server::DEPTH_INFINITY; |
|
| 132 | + $lockInfo->timeout = 1800; |
|
| 133 | 133 | |
| 134 | - $body = $this->server->xml->write('{DAV:}prop', [ |
|
| 135 | - '{DAV:}lockdiscovery' => |
|
| 136 | - new LockDiscovery([$lockInfo]) |
|
| 137 | - ]); |
|
| 134 | + $body = $this->server->xml->write('{DAV:}prop', [ |
|
| 135 | + '{DAV:}lockdiscovery' => |
|
| 136 | + new LockDiscovery([$lockInfo]) |
|
| 137 | + ]); |
|
| 138 | 138 | |
| 139 | - $response->setStatus(200); |
|
| 140 | - $response->setBody($body); |
|
| 139 | + $response->setStatus(200); |
|
| 140 | + $response->setBody($body); |
|
| 141 | 141 | |
| 142 | - return false; |
|
| 143 | - } |
|
| 142 | + return false; |
|
| 143 | + } |
|
| 144 | 144 | |
| 145 | - /** |
|
| 146 | - * Fakes a successful LOCK |
|
| 147 | - * |
|
| 148 | - * @param RequestInterface $request |
|
| 149 | - * @param ResponseInterface $response |
|
| 150 | - * @return bool |
|
| 151 | - */ |
|
| 152 | - public function fakeUnlockProvider(RequestInterface $request, |
|
| 153 | - ResponseInterface $response) { |
|
| 154 | - $response->setStatus(204); |
|
| 155 | - $response->setHeader('Content-Length', '0'); |
|
| 156 | - return false; |
|
| 157 | - } |
|
| 145 | + /** |
|
| 146 | + * Fakes a successful LOCK |
|
| 147 | + * |
|
| 148 | + * @param RequestInterface $request |
|
| 149 | + * @param ResponseInterface $response |
|
| 150 | + * @return bool |
|
| 151 | + */ |
|
| 152 | + public function fakeUnlockProvider(RequestInterface $request, |
|
| 153 | + ResponseInterface $response) { |
|
| 154 | + $response->setStatus(204); |
|
| 155 | + $response->setHeader('Content-Length', '0'); |
|
| 156 | + return false; |
|
| 157 | + } |
|
| 158 | 158 | } |
@@ -48,212 +48,212 @@ |
||
| 48 | 48 | class Auth extends AbstractBasic { |
| 49 | 49 | |
| 50 | 50 | |
| 51 | - const DAV_AUTHENTICATED = 'AUTHENTICATED_TO_DAV_BACKEND'; |
|
| 51 | + const DAV_AUTHENTICATED = 'AUTHENTICATED_TO_DAV_BACKEND'; |
|
| 52 | 52 | |
| 53 | - /** @var ISession */ |
|
| 54 | - private $session; |
|
| 55 | - /** @var Session */ |
|
| 56 | - private $userSession; |
|
| 57 | - /** @var IRequest */ |
|
| 58 | - private $request; |
|
| 59 | - /** @var string */ |
|
| 60 | - private $currentUser; |
|
| 61 | - /** @var Manager */ |
|
| 62 | - private $twoFactorManager; |
|
| 63 | - /** @var Throttler */ |
|
| 64 | - private $throttler; |
|
| 53 | + /** @var ISession */ |
|
| 54 | + private $session; |
|
| 55 | + /** @var Session */ |
|
| 56 | + private $userSession; |
|
| 57 | + /** @var IRequest */ |
|
| 58 | + private $request; |
|
| 59 | + /** @var string */ |
|
| 60 | + private $currentUser; |
|
| 61 | + /** @var Manager */ |
|
| 62 | + private $twoFactorManager; |
|
| 63 | + /** @var Throttler */ |
|
| 64 | + private $throttler; |
|
| 65 | 65 | |
| 66 | - /** |
|
| 67 | - * @param ISession $session |
|
| 68 | - * @param Session $userSession |
|
| 69 | - * @param IRequest $request |
|
| 70 | - * @param Manager $twoFactorManager |
|
| 71 | - * @param Throttler $throttler |
|
| 72 | - * @param string $principalPrefix |
|
| 73 | - */ |
|
| 74 | - public function __construct(ISession $session, |
|
| 75 | - Session $userSession, |
|
| 76 | - IRequest $request, |
|
| 77 | - Manager $twoFactorManager, |
|
| 78 | - Throttler $throttler, |
|
| 79 | - $principalPrefix = 'principals/users/') { |
|
| 80 | - $this->session = $session; |
|
| 81 | - $this->userSession = $userSession; |
|
| 82 | - $this->twoFactorManager = $twoFactorManager; |
|
| 83 | - $this->request = $request; |
|
| 84 | - $this->throttler = $throttler; |
|
| 85 | - $this->principalPrefix = $principalPrefix; |
|
| 66 | + /** |
|
| 67 | + * @param ISession $session |
|
| 68 | + * @param Session $userSession |
|
| 69 | + * @param IRequest $request |
|
| 70 | + * @param Manager $twoFactorManager |
|
| 71 | + * @param Throttler $throttler |
|
| 72 | + * @param string $principalPrefix |
|
| 73 | + */ |
|
| 74 | + public function __construct(ISession $session, |
|
| 75 | + Session $userSession, |
|
| 76 | + IRequest $request, |
|
| 77 | + Manager $twoFactorManager, |
|
| 78 | + Throttler $throttler, |
|
| 79 | + $principalPrefix = 'principals/users/') { |
|
| 80 | + $this->session = $session; |
|
| 81 | + $this->userSession = $userSession; |
|
| 82 | + $this->twoFactorManager = $twoFactorManager; |
|
| 83 | + $this->request = $request; |
|
| 84 | + $this->throttler = $throttler; |
|
| 85 | + $this->principalPrefix = $principalPrefix; |
|
| 86 | 86 | |
| 87 | - // setup realm |
|
| 88 | - $defaults = new \OCP\Defaults(); |
|
| 89 | - $this->realm = $defaults->getName(); |
|
| 90 | - } |
|
| 87 | + // setup realm |
|
| 88 | + $defaults = new \OCP\Defaults(); |
|
| 89 | + $this->realm = $defaults->getName(); |
|
| 90 | + } |
|
| 91 | 91 | |
| 92 | - /** |
|
| 93 | - * Whether the user has initially authenticated via DAV |
|
| 94 | - * |
|
| 95 | - * This is required for WebDAV clients that resent the cookies even when the |
|
| 96 | - * account was changed. |
|
| 97 | - * |
|
| 98 | - * @see https://github.com/owncloud/core/issues/13245 |
|
| 99 | - * |
|
| 100 | - * @param string $username |
|
| 101 | - * @return bool |
|
| 102 | - */ |
|
| 103 | - public function isDavAuthenticated($username) { |
|
| 104 | - return !is_null($this->session->get(self::DAV_AUTHENTICATED)) && |
|
| 105 | - $this->session->get(self::DAV_AUTHENTICATED) === $username; |
|
| 106 | - } |
|
| 92 | + /** |
|
| 93 | + * Whether the user has initially authenticated via DAV |
|
| 94 | + * |
|
| 95 | + * This is required for WebDAV clients that resent the cookies even when the |
|
| 96 | + * account was changed. |
|
| 97 | + * |
|
| 98 | + * @see https://github.com/owncloud/core/issues/13245 |
|
| 99 | + * |
|
| 100 | + * @param string $username |
|
| 101 | + * @return bool |
|
| 102 | + */ |
|
| 103 | + public function isDavAuthenticated($username) { |
|
| 104 | + return !is_null($this->session->get(self::DAV_AUTHENTICATED)) && |
|
| 105 | + $this->session->get(self::DAV_AUTHENTICATED) === $username; |
|
| 106 | + } |
|
| 107 | 107 | |
| 108 | - /** |
|
| 109 | - * Validates a username and password |
|
| 110 | - * |
|
| 111 | - * This method should return true or false depending on if login |
|
| 112 | - * succeeded. |
|
| 113 | - * |
|
| 114 | - * @param string $username |
|
| 115 | - * @param string $password |
|
| 116 | - * @return bool |
|
| 117 | - * @throws PasswordLoginForbidden |
|
| 118 | - */ |
|
| 119 | - protected function validateUserPass($username, $password) { |
|
| 120 | - if ($this->userSession->isLoggedIn() && |
|
| 121 | - $this->isDavAuthenticated($this->userSession->getUser()->getUID()) |
|
| 122 | - ) { |
|
| 123 | - \OC_Util::setupFS($this->userSession->getUser()->getUID()); |
|
| 124 | - $this->session->close(); |
|
| 125 | - return true; |
|
| 126 | - } else { |
|
| 127 | - \OC_Util::setupFS(); //login hooks may need early access to the filesystem |
|
| 128 | - try { |
|
| 129 | - if ($this->userSession->logClientIn($username, $password, $this->request, $this->throttler)) { |
|
| 130 | - \OC_Util::setupFS($this->userSession->getUser()->getUID()); |
|
| 131 | - $this->session->set(self::DAV_AUTHENTICATED, $this->userSession->getUser()->getUID()); |
|
| 132 | - $this->session->close(); |
|
| 133 | - return true; |
|
| 134 | - } else { |
|
| 135 | - $this->session->close(); |
|
| 136 | - return false; |
|
| 137 | - } |
|
| 138 | - } catch (PasswordLoginForbiddenException $ex) { |
|
| 139 | - $this->session->close(); |
|
| 140 | - throw new PasswordLoginForbidden(); |
|
| 141 | - } |
|
| 142 | - } |
|
| 143 | - } |
|
| 108 | + /** |
|
| 109 | + * Validates a username and password |
|
| 110 | + * |
|
| 111 | + * This method should return true or false depending on if login |
|
| 112 | + * succeeded. |
|
| 113 | + * |
|
| 114 | + * @param string $username |
|
| 115 | + * @param string $password |
|
| 116 | + * @return bool |
|
| 117 | + * @throws PasswordLoginForbidden |
|
| 118 | + */ |
|
| 119 | + protected function validateUserPass($username, $password) { |
|
| 120 | + if ($this->userSession->isLoggedIn() && |
|
| 121 | + $this->isDavAuthenticated($this->userSession->getUser()->getUID()) |
|
| 122 | + ) { |
|
| 123 | + \OC_Util::setupFS($this->userSession->getUser()->getUID()); |
|
| 124 | + $this->session->close(); |
|
| 125 | + return true; |
|
| 126 | + } else { |
|
| 127 | + \OC_Util::setupFS(); //login hooks may need early access to the filesystem |
|
| 128 | + try { |
|
| 129 | + if ($this->userSession->logClientIn($username, $password, $this->request, $this->throttler)) { |
|
| 130 | + \OC_Util::setupFS($this->userSession->getUser()->getUID()); |
|
| 131 | + $this->session->set(self::DAV_AUTHENTICATED, $this->userSession->getUser()->getUID()); |
|
| 132 | + $this->session->close(); |
|
| 133 | + return true; |
|
| 134 | + } else { |
|
| 135 | + $this->session->close(); |
|
| 136 | + return false; |
|
| 137 | + } |
|
| 138 | + } catch (PasswordLoginForbiddenException $ex) { |
|
| 139 | + $this->session->close(); |
|
| 140 | + throw new PasswordLoginForbidden(); |
|
| 141 | + } |
|
| 142 | + } |
|
| 143 | + } |
|
| 144 | 144 | |
| 145 | - /** |
|
| 146 | - * @param RequestInterface $request |
|
| 147 | - * @param ResponseInterface $response |
|
| 148 | - * @return array |
|
| 149 | - * @throws NotAuthenticated |
|
| 150 | - * @throws ServiceUnavailable |
|
| 151 | - */ |
|
| 152 | - function check(RequestInterface $request, ResponseInterface $response) { |
|
| 153 | - try { |
|
| 154 | - $result = $this->auth($request, $response); |
|
| 155 | - return $result; |
|
| 156 | - } catch (NotAuthenticated $e) { |
|
| 157 | - throw $e; |
|
| 158 | - } catch (Exception $e) { |
|
| 159 | - $class = get_class($e); |
|
| 160 | - $msg = $e->getMessage(); |
|
| 161 | - \OC::$server->getLogger()->logException($e); |
|
| 162 | - throw new ServiceUnavailable("$class: $msg"); |
|
| 163 | - } |
|
| 164 | - } |
|
| 145 | + /** |
|
| 146 | + * @param RequestInterface $request |
|
| 147 | + * @param ResponseInterface $response |
|
| 148 | + * @return array |
|
| 149 | + * @throws NotAuthenticated |
|
| 150 | + * @throws ServiceUnavailable |
|
| 151 | + */ |
|
| 152 | + function check(RequestInterface $request, ResponseInterface $response) { |
|
| 153 | + try { |
|
| 154 | + $result = $this->auth($request, $response); |
|
| 155 | + return $result; |
|
| 156 | + } catch (NotAuthenticated $e) { |
|
| 157 | + throw $e; |
|
| 158 | + } catch (Exception $e) { |
|
| 159 | + $class = get_class($e); |
|
| 160 | + $msg = $e->getMessage(); |
|
| 161 | + \OC::$server->getLogger()->logException($e); |
|
| 162 | + throw new ServiceUnavailable("$class: $msg"); |
|
| 163 | + } |
|
| 164 | + } |
|
| 165 | 165 | |
| 166 | - /** |
|
| 167 | - * Checks whether a CSRF check is required on the request |
|
| 168 | - * |
|
| 169 | - * @return bool |
|
| 170 | - */ |
|
| 171 | - private function requiresCSRFCheck() { |
|
| 172 | - // GET requires no check at all |
|
| 173 | - if($this->request->getMethod() === 'GET') { |
|
| 174 | - return false; |
|
| 175 | - } |
|
| 166 | + /** |
|
| 167 | + * Checks whether a CSRF check is required on the request |
|
| 168 | + * |
|
| 169 | + * @return bool |
|
| 170 | + */ |
|
| 171 | + private function requiresCSRFCheck() { |
|
| 172 | + // GET requires no check at all |
|
| 173 | + if($this->request->getMethod() === 'GET') { |
|
| 174 | + return false; |
|
| 175 | + } |
|
| 176 | 176 | |
| 177 | - // Official ownCloud clients require no checks |
|
| 178 | - if($this->request->isUserAgent([ |
|
| 179 | - IRequest::USER_AGENT_CLIENT_DESKTOP, |
|
| 180 | - IRequest::USER_AGENT_CLIENT_ANDROID, |
|
| 181 | - IRequest::USER_AGENT_CLIENT_IOS, |
|
| 182 | - ])) { |
|
| 183 | - return false; |
|
| 184 | - } |
|
| 177 | + // Official ownCloud clients require no checks |
|
| 178 | + if($this->request->isUserAgent([ |
|
| 179 | + IRequest::USER_AGENT_CLIENT_DESKTOP, |
|
| 180 | + IRequest::USER_AGENT_CLIENT_ANDROID, |
|
| 181 | + IRequest::USER_AGENT_CLIENT_IOS, |
|
| 182 | + ])) { |
|
| 183 | + return false; |
|
| 184 | + } |
|
| 185 | 185 | |
| 186 | - // If not logged-in no check is required |
|
| 187 | - if(!$this->userSession->isLoggedIn()) { |
|
| 188 | - return false; |
|
| 189 | - } |
|
| 186 | + // If not logged-in no check is required |
|
| 187 | + if(!$this->userSession->isLoggedIn()) { |
|
| 188 | + return false; |
|
| 189 | + } |
|
| 190 | 190 | |
| 191 | - // POST always requires a check |
|
| 192 | - if($this->request->getMethod() === 'POST') { |
|
| 193 | - return true; |
|
| 194 | - } |
|
| 191 | + // POST always requires a check |
|
| 192 | + if($this->request->getMethod() === 'POST') { |
|
| 193 | + return true; |
|
| 194 | + } |
|
| 195 | 195 | |
| 196 | - // If logged-in AND DAV authenticated no check is required |
|
| 197 | - if($this->userSession->isLoggedIn() && |
|
| 198 | - $this->isDavAuthenticated($this->userSession->getUser()->getUID())) { |
|
| 199 | - return false; |
|
| 200 | - } |
|
| 196 | + // If logged-in AND DAV authenticated no check is required |
|
| 197 | + if($this->userSession->isLoggedIn() && |
|
| 198 | + $this->isDavAuthenticated($this->userSession->getUser()->getUID())) { |
|
| 199 | + return false; |
|
| 200 | + } |
|
| 201 | 201 | |
| 202 | - return true; |
|
| 203 | - } |
|
| 202 | + return true; |
|
| 203 | + } |
|
| 204 | 204 | |
| 205 | - /** |
|
| 206 | - * @param RequestInterface $request |
|
| 207 | - * @param ResponseInterface $response |
|
| 208 | - * @return array |
|
| 209 | - * @throws NotAuthenticated |
|
| 210 | - */ |
|
| 211 | - private function auth(RequestInterface $request, ResponseInterface $response) { |
|
| 212 | - $forcedLogout = false; |
|
| 213 | - if(!$this->request->passesCSRFCheck() && |
|
| 214 | - $this->requiresCSRFCheck()) { |
|
| 215 | - // In case of a fail with POST we need to recheck the credentials |
|
| 216 | - if($this->request->getMethod() === 'POST') { |
|
| 217 | - $forcedLogout = true; |
|
| 218 | - } else { |
|
| 219 | - $response->setStatus(401); |
|
| 220 | - throw new \Sabre\DAV\Exception\NotAuthenticated('CSRF check not passed.'); |
|
| 221 | - } |
|
| 222 | - } |
|
| 205 | + /** |
|
| 206 | + * @param RequestInterface $request |
|
| 207 | + * @param ResponseInterface $response |
|
| 208 | + * @return array |
|
| 209 | + * @throws NotAuthenticated |
|
| 210 | + */ |
|
| 211 | + private function auth(RequestInterface $request, ResponseInterface $response) { |
|
| 212 | + $forcedLogout = false; |
|
| 213 | + if(!$this->request->passesCSRFCheck() && |
|
| 214 | + $this->requiresCSRFCheck()) { |
|
| 215 | + // In case of a fail with POST we need to recheck the credentials |
|
| 216 | + if($this->request->getMethod() === 'POST') { |
|
| 217 | + $forcedLogout = true; |
|
| 218 | + } else { |
|
| 219 | + $response->setStatus(401); |
|
| 220 | + throw new \Sabre\DAV\Exception\NotAuthenticated('CSRF check not passed.'); |
|
| 221 | + } |
|
| 222 | + } |
|
| 223 | 223 | |
| 224 | - if($forcedLogout) { |
|
| 225 | - $this->userSession->logout(); |
|
| 226 | - } else { |
|
| 227 | - if($this->twoFactorManager->needsSecondFactor($this->userSession->getUser())) { |
|
| 228 | - throw new \Sabre\DAV\Exception\NotAuthenticated('2FA challenge not passed.'); |
|
| 229 | - } |
|
| 230 | - if (\OC_User::handleApacheAuth() || |
|
| 231 | - //Fix for broken webdav clients |
|
| 232 | - ($this->userSession->isLoggedIn() && is_null($this->session->get(self::DAV_AUTHENTICATED))) || |
|
| 233 | - //Well behaved clients that only send the cookie are allowed |
|
| 234 | - ($this->userSession->isLoggedIn() && $this->session->get(self::DAV_AUTHENTICATED) === $this->userSession->getUser()->getUID() && $request->getHeader('Authorization') === null) |
|
| 235 | - ) { |
|
| 236 | - $user = $this->userSession->getUser()->getUID(); |
|
| 237 | - \OC_Util::setupFS($user); |
|
| 238 | - $this->currentUser = $user; |
|
| 239 | - $this->session->close(); |
|
| 240 | - return [true, $this->principalPrefix . $user]; |
|
| 241 | - } |
|
| 242 | - } |
|
| 224 | + if($forcedLogout) { |
|
| 225 | + $this->userSession->logout(); |
|
| 226 | + } else { |
|
| 227 | + if($this->twoFactorManager->needsSecondFactor($this->userSession->getUser())) { |
|
| 228 | + throw new \Sabre\DAV\Exception\NotAuthenticated('2FA challenge not passed.'); |
|
| 229 | + } |
|
| 230 | + if (\OC_User::handleApacheAuth() || |
|
| 231 | + //Fix for broken webdav clients |
|
| 232 | + ($this->userSession->isLoggedIn() && is_null($this->session->get(self::DAV_AUTHENTICATED))) || |
|
| 233 | + //Well behaved clients that only send the cookie are allowed |
|
| 234 | + ($this->userSession->isLoggedIn() && $this->session->get(self::DAV_AUTHENTICATED) === $this->userSession->getUser()->getUID() && $request->getHeader('Authorization') === null) |
|
| 235 | + ) { |
|
| 236 | + $user = $this->userSession->getUser()->getUID(); |
|
| 237 | + \OC_Util::setupFS($user); |
|
| 238 | + $this->currentUser = $user; |
|
| 239 | + $this->session->close(); |
|
| 240 | + return [true, $this->principalPrefix . $user]; |
|
| 241 | + } |
|
| 242 | + } |
|
| 243 | 243 | |
| 244 | - if (!$this->userSession->isLoggedIn() && in_array('XMLHttpRequest', explode(',', $request->getHeader('X-Requested-With')))) { |
|
| 245 | - // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
|
| 246 | - $response->addHeader('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 247 | - $response->setStatus(401); |
|
| 248 | - throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
|
| 249 | - } |
|
| 244 | + if (!$this->userSession->isLoggedIn() && in_array('XMLHttpRequest', explode(',', $request->getHeader('X-Requested-With')))) { |
|
| 245 | + // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
|
| 246 | + $response->addHeader('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 247 | + $response->setStatus(401); |
|
| 248 | + throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
|
| 249 | + } |
|
| 250 | 250 | |
| 251 | - $data = parent::check($request, $response); |
|
| 252 | - if($data[0] === true) { |
|
| 253 | - $startPos = strrpos($data[1], '/') + 1; |
|
| 254 | - $user = $this->userSession->getUser()->getUID(); |
|
| 255 | - $data[1] = substr_replace($data[1], $user, $startPos); |
|
| 256 | - } |
|
| 257 | - return $data; |
|
| 258 | - } |
|
| 251 | + $data = parent::check($request, $response); |
|
| 252 | + if($data[0] === true) { |
|
| 253 | + $startPos = strrpos($data[1], '/') + 1; |
|
| 254 | + $user = $this->userSession->getUser()->getUID(); |
|
| 255 | + $data[1] = substr_replace($data[1], $user, $startPos); |
|
| 256 | + } |
|
| 257 | + return $data; |
|
| 258 | + } |
|
| 259 | 259 | } |
@@ -170,12 +170,12 @@ discard block |
||
| 170 | 170 | */ |
| 171 | 171 | private function requiresCSRFCheck() { |
| 172 | 172 | // GET requires no check at all |
| 173 | - if($this->request->getMethod() === 'GET') { |
|
| 173 | + if ($this->request->getMethod() === 'GET') { |
|
| 174 | 174 | return false; |
| 175 | 175 | } |
| 176 | 176 | |
| 177 | 177 | // Official ownCloud clients require no checks |
| 178 | - if($this->request->isUserAgent([ |
|
| 178 | + if ($this->request->isUserAgent([ |
|
| 179 | 179 | IRequest::USER_AGENT_CLIENT_DESKTOP, |
| 180 | 180 | IRequest::USER_AGENT_CLIENT_ANDROID, |
| 181 | 181 | IRequest::USER_AGENT_CLIENT_IOS, |
@@ -184,17 +184,17 @@ discard block |
||
| 184 | 184 | } |
| 185 | 185 | |
| 186 | 186 | // If not logged-in no check is required |
| 187 | - if(!$this->userSession->isLoggedIn()) { |
|
| 187 | + if (!$this->userSession->isLoggedIn()) { |
|
| 188 | 188 | return false; |
| 189 | 189 | } |
| 190 | 190 | |
| 191 | 191 | // POST always requires a check |
| 192 | - if($this->request->getMethod() === 'POST') { |
|
| 192 | + if ($this->request->getMethod() === 'POST') { |
|
| 193 | 193 | return true; |
| 194 | 194 | } |
| 195 | 195 | |
| 196 | 196 | // If logged-in AND DAV authenticated no check is required |
| 197 | - if($this->userSession->isLoggedIn() && |
|
| 197 | + if ($this->userSession->isLoggedIn() && |
|
| 198 | 198 | $this->isDavAuthenticated($this->userSession->getUser()->getUID())) { |
| 199 | 199 | return false; |
| 200 | 200 | } |
@@ -210,10 +210,10 @@ discard block |
||
| 210 | 210 | */ |
| 211 | 211 | private function auth(RequestInterface $request, ResponseInterface $response) { |
| 212 | 212 | $forcedLogout = false; |
| 213 | - if(!$this->request->passesCSRFCheck() && |
|
| 213 | + if (!$this->request->passesCSRFCheck() && |
|
| 214 | 214 | $this->requiresCSRFCheck()) { |
| 215 | 215 | // In case of a fail with POST we need to recheck the credentials |
| 216 | - if($this->request->getMethod() === 'POST') { |
|
| 216 | + if ($this->request->getMethod() === 'POST') { |
|
| 217 | 217 | $forcedLogout = true; |
| 218 | 218 | } else { |
| 219 | 219 | $response->setStatus(401); |
@@ -221,10 +221,10 @@ discard block |
||
| 221 | 221 | } |
| 222 | 222 | } |
| 223 | 223 | |
| 224 | - if($forcedLogout) { |
|
| 224 | + if ($forcedLogout) { |
|
| 225 | 225 | $this->userSession->logout(); |
| 226 | 226 | } else { |
| 227 | - if($this->twoFactorManager->needsSecondFactor($this->userSession->getUser())) { |
|
| 227 | + if ($this->twoFactorManager->needsSecondFactor($this->userSession->getUser())) { |
|
| 228 | 228 | throw new \Sabre\DAV\Exception\NotAuthenticated('2FA challenge not passed.'); |
| 229 | 229 | } |
| 230 | 230 | if (\OC_User::handleApacheAuth() || |
@@ -237,19 +237,19 @@ discard block |
||
| 237 | 237 | \OC_Util::setupFS($user); |
| 238 | 238 | $this->currentUser = $user; |
| 239 | 239 | $this->session->close(); |
| 240 | - return [true, $this->principalPrefix . $user]; |
|
| 240 | + return [true, $this->principalPrefix.$user]; |
|
| 241 | 241 | } |
| 242 | 242 | } |
| 243 | 243 | |
| 244 | 244 | if (!$this->userSession->isLoggedIn() && in_array('XMLHttpRequest', explode(',', $request->getHeader('X-Requested-With')))) { |
| 245 | 245 | // do not re-authenticate over ajax, use dummy auth name to prevent browser popup |
| 246 | - $response->addHeader('WWW-Authenticate','DummyBasic realm="' . $this->realm . '"'); |
|
| 246 | + $response->addHeader('WWW-Authenticate', 'DummyBasic realm="'.$this->realm.'"'); |
|
| 247 | 247 | $response->setStatus(401); |
| 248 | 248 | throw new \Sabre\DAV\Exception\NotAuthenticated('Cannot authenticate over ajax calls'); |
| 249 | 249 | } |
| 250 | 250 | |
| 251 | 251 | $data = parent::check($request, $response); |
| 252 | - if($data[0] === true) { |
|
| 252 | + if ($data[0] === true) { |
|
| 253 | 253 | $startPos = strrpos($data[1], '/') + 1; |
| 254 | 254 | $user = $this->userSession->getUser()->getUID(); |
| 255 | 255 | $data[1] = substr_replace($data[1], $user, $startPos); |