Completed
Pull Request — master (#4136)
by Jan-Christoph
11:29
created
lib/private/Share20/Manager.php 4 patches
Doc Comments   +3 added lines patch added patch discarded remove patch
@@ -1100,6 +1100,9 @@
 block discarded – undo
1100 1100
 		return $share;
1101 1101
 	}
1102 1102
 
1103
+	/**
1104
+	 * @param \OCP\Share\IShare $share
1105
+	 */
1103 1106
 	protected function checkExpireDate($share) {
1104 1107
 		if ($share->getExpirationDate() !== null &&
1105 1108
 			$share->getExpirationDate() <= new \DateTime()) {
Please login to merge, or discard this patch.
Unused Use Statements   -1 removed lines patch added patch discarded remove patch
@@ -36,7 +36,6 @@
 block discarded – undo
36 36
 use OCP\Files\IRootFolder;
37 37
 use OCP\Files\Mount\IMountManager;
38 38
 use OCP\Files\Node;
39
-use OCP\Files\NotFoundException;
40 39
 use OCP\IConfig;
41 40
 use OCP\IGroupManager;
42 41
 use OCP\IL10N;
Please login to merge, or discard this patch.
Indentation   +1270 added lines, -1270 removed lines patch added patch discarded remove patch
@@ -57,1298 +57,1298 @@
 block discarded – undo
57 57
  */
58 58
 class Manager implements IManager {
59 59
 
60
-	/** @var IProviderFactory */
61
-	private $factory;
62
-	/** @var ILogger */
63
-	private $logger;
64
-	/** @var IConfig */
65
-	private $config;
66
-	/** @var ISecureRandom */
67
-	private $secureRandom;
68
-	/** @var IHasher */
69
-	private $hasher;
70
-	/** @var IMountManager */
71
-	private $mountManager;
72
-	/** @var IGroupManager */
73
-	private $groupManager;
74
-	/** @var IL10N */
75
-	private $l;
76
-	/** @var IUserManager */
77
-	private $userManager;
78
-	/** @var IRootFolder */
79
-	private $rootFolder;
80
-	/** @var CappedMemoryCache */
81
-	private $sharingDisabledForUsersCache;
82
-	/** @var EventDispatcher */
83
-	private $eventDispatcher;
84
-	/** @var LegacyHooks */
85
-	private $legacyHooks;
86
-
87
-
88
-	/**
89
-	 * Manager constructor.
90
-	 *
91
-	 * @param ILogger $logger
92
-	 * @param IConfig $config
93
-	 * @param ISecureRandom $secureRandom
94
-	 * @param IHasher $hasher
95
-	 * @param IMountManager $mountManager
96
-	 * @param IGroupManager $groupManager
97
-	 * @param IL10N $l
98
-	 * @param IProviderFactory $factory
99
-	 * @param IUserManager $userManager
100
-	 * @param IRootFolder $rootFolder
101
-	 * @param EventDispatcher $eventDispatcher
102
-	 */
103
-	public function __construct(
104
-			ILogger $logger,
105
-			IConfig $config,
106
-			ISecureRandom $secureRandom,
107
-			IHasher $hasher,
108
-			IMountManager $mountManager,
109
-			IGroupManager $groupManager,
110
-			IL10N $l,
111
-			IProviderFactory $factory,
112
-			IUserManager $userManager,
113
-			IRootFolder $rootFolder,
114
-			EventDispatcher $eventDispatcher
115
-	) {
116
-		$this->logger = $logger;
117
-		$this->config = $config;
118
-		$this->secureRandom = $secureRandom;
119
-		$this->hasher = $hasher;
120
-		$this->mountManager = $mountManager;
121
-		$this->groupManager = $groupManager;
122
-		$this->l = $l;
123
-		$this->factory = $factory;
124
-		$this->userManager = $userManager;
125
-		$this->rootFolder = $rootFolder;
126
-		$this->eventDispatcher = $eventDispatcher;
127
-		$this->sharingDisabledForUsersCache = new CappedMemoryCache();
128
-		$this->legacyHooks = new LegacyHooks($this->eventDispatcher);
129
-	}
130
-
131
-	/**
132
-	 * Convert from a full share id to a tuple (providerId, shareId)
133
-	 *
134
-	 * @param string $id
135
-	 * @return string[]
136
-	 */
137
-	private function splitFullId($id) {
138
-		return explode(':', $id, 2);
139
-	}
140
-
141
-	/**
142
-	 * Verify if a password meets all requirements
143
-	 *
144
-	 * @param string $password
145
-	 * @throws \Exception
146
-	 */
147
-	protected function verifyPassword($password) {
148
-		if ($password === null) {
149
-			// No password is set, check if this is allowed.
150
-			if ($this->shareApiLinkEnforcePassword()) {
151
-				throw new \InvalidArgumentException('Passwords are enforced for link shares');
152
-			}
153
-
154
-			return;
155
-		}
156
-
157
-		// Let others verify the password
158
-		try {
159
-			$event = new GenericEvent($password);
160
-			$this->eventDispatcher->dispatch('OCP\PasswordPolicy::validate', $event);
161
-		} catch (HintException $e) {
162
-			throw new \Exception($e->getHint());
163
-		}
164
-	}
165
-
166
-	/**
167
-	 * Check for generic requirements before creating a share
168
-	 *
169
-	 * @param \OCP\Share\IShare $share
170
-	 * @throws \InvalidArgumentException
171
-	 * @throws GenericShareException
172
-	 */
173
-	protected function generalCreateChecks(\OCP\Share\IShare $share) {
174
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
175
-			// We expect a valid user as sharedWith for user shares
176
-			if (!$this->userManager->userExists($share->getSharedWith())) {
177
-				throw new \InvalidArgumentException('SharedWith is not a valid user');
178
-			}
179
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
180
-			// We expect a valid group as sharedWith for group shares
181
-			if (!$this->groupManager->groupExists($share->getSharedWith())) {
182
-				throw new \InvalidArgumentException('SharedWith is not a valid group');
183
-			}
184
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
185
-			if ($share->getSharedWith() !== null) {
186
-				throw new \InvalidArgumentException('SharedWith should be empty');
187
-			}
188
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE) {
189
-			if ($share->getSharedWith() === null) {
190
-				throw new \InvalidArgumentException('SharedWith should not be empty');
191
-			}
192
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
193
-			if ($share->getSharedWith() === null) {
194
-				throw new \InvalidArgumentException('SharedWith should not be empty');
195
-			}
196
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_CIRCLE) {
197
-			$circle = \OCA\Circles\Api\Circles::detailsCircle($share->getSharedWith());
198
-			if ($circle === null) {
199
-				throw new \InvalidArgumentException('SharedWith is not a valid circle');
200
-			}
201
-		} else {
202
-			// We can't handle other types yet
203
-			throw new \InvalidArgumentException('unknown share type');
204
-		}
205
-
206
-		// Verify the initiator of the share is set
207
-		if ($share->getSharedBy() === null) {
208
-			throw new \InvalidArgumentException('SharedBy should be set');
209
-		}
210
-
211
-		// Cannot share with yourself
212
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
213
-			$share->getSharedWith() === $share->getSharedBy()) {
214
-			throw new \InvalidArgumentException('Can\'t share with yourself');
215
-		}
216
-
217
-		// The path should be set
218
-		if ($share->getNode() === null) {
219
-			throw new \InvalidArgumentException('Path should be set');
220
-		}
221
-
222
-		// And it should be a file or a folder
223
-		if (!($share->getNode() instanceof \OCP\Files\File) &&
224
-				!($share->getNode() instanceof \OCP\Files\Folder)) {
225
-			throw new \InvalidArgumentException('Path should be either a file or a folder');
226
-		}
227
-
228
-		// And you can't share your rootfolder
229
-		if ($this->userManager->userExists($share->getSharedBy())) {
230
-			$sharedPath = $this->rootFolder->getUserFolder($share->getSharedBy())->getPath();
231
-		} else {
232
-			$sharedPath = $this->rootFolder->getUserFolder($share->getShareOwner())->getPath();
233
-		}
234
-		if ($sharedPath === $share->getNode()->getPath()) {
235
-			throw new \InvalidArgumentException('You can\'t share your root folder');
236
-		}
237
-
238
-		// Check if we actually have share permissions
239
-		if (!$share->getNode()->isShareable()) {
240
-			$message_t = $this->l->t('You are not allowed to share %s', [$share->getNode()->getPath()]);
241
-			throw new GenericShareException($message_t, $message_t, 404);
242
-		}
243
-
244
-		// Permissions should be set
245
-		if ($share->getPermissions() === null) {
246
-			throw new \InvalidArgumentException('A share requires permissions');
247
-		}
248
-
249
-		/*
60
+    /** @var IProviderFactory */
61
+    private $factory;
62
+    /** @var ILogger */
63
+    private $logger;
64
+    /** @var IConfig */
65
+    private $config;
66
+    /** @var ISecureRandom */
67
+    private $secureRandom;
68
+    /** @var IHasher */
69
+    private $hasher;
70
+    /** @var IMountManager */
71
+    private $mountManager;
72
+    /** @var IGroupManager */
73
+    private $groupManager;
74
+    /** @var IL10N */
75
+    private $l;
76
+    /** @var IUserManager */
77
+    private $userManager;
78
+    /** @var IRootFolder */
79
+    private $rootFolder;
80
+    /** @var CappedMemoryCache */
81
+    private $sharingDisabledForUsersCache;
82
+    /** @var EventDispatcher */
83
+    private $eventDispatcher;
84
+    /** @var LegacyHooks */
85
+    private $legacyHooks;
86
+
87
+
88
+    /**
89
+     * Manager constructor.
90
+     *
91
+     * @param ILogger $logger
92
+     * @param IConfig $config
93
+     * @param ISecureRandom $secureRandom
94
+     * @param IHasher $hasher
95
+     * @param IMountManager $mountManager
96
+     * @param IGroupManager $groupManager
97
+     * @param IL10N $l
98
+     * @param IProviderFactory $factory
99
+     * @param IUserManager $userManager
100
+     * @param IRootFolder $rootFolder
101
+     * @param EventDispatcher $eventDispatcher
102
+     */
103
+    public function __construct(
104
+            ILogger $logger,
105
+            IConfig $config,
106
+            ISecureRandom $secureRandom,
107
+            IHasher $hasher,
108
+            IMountManager $mountManager,
109
+            IGroupManager $groupManager,
110
+            IL10N $l,
111
+            IProviderFactory $factory,
112
+            IUserManager $userManager,
113
+            IRootFolder $rootFolder,
114
+            EventDispatcher $eventDispatcher
115
+    ) {
116
+        $this->logger = $logger;
117
+        $this->config = $config;
118
+        $this->secureRandom = $secureRandom;
119
+        $this->hasher = $hasher;
120
+        $this->mountManager = $mountManager;
121
+        $this->groupManager = $groupManager;
122
+        $this->l = $l;
123
+        $this->factory = $factory;
124
+        $this->userManager = $userManager;
125
+        $this->rootFolder = $rootFolder;
126
+        $this->eventDispatcher = $eventDispatcher;
127
+        $this->sharingDisabledForUsersCache = new CappedMemoryCache();
128
+        $this->legacyHooks = new LegacyHooks($this->eventDispatcher);
129
+    }
130
+
131
+    /**
132
+     * Convert from a full share id to a tuple (providerId, shareId)
133
+     *
134
+     * @param string $id
135
+     * @return string[]
136
+     */
137
+    private function splitFullId($id) {
138
+        return explode(':', $id, 2);
139
+    }
140
+
141
+    /**
142
+     * Verify if a password meets all requirements
143
+     *
144
+     * @param string $password
145
+     * @throws \Exception
146
+     */
147
+    protected function verifyPassword($password) {
148
+        if ($password === null) {
149
+            // No password is set, check if this is allowed.
150
+            if ($this->shareApiLinkEnforcePassword()) {
151
+                throw new \InvalidArgumentException('Passwords are enforced for link shares');
152
+            }
153
+
154
+            return;
155
+        }
156
+
157
+        // Let others verify the password
158
+        try {
159
+            $event = new GenericEvent($password);
160
+            $this->eventDispatcher->dispatch('OCP\PasswordPolicy::validate', $event);
161
+        } catch (HintException $e) {
162
+            throw new \Exception($e->getHint());
163
+        }
164
+    }
165
+
166
+    /**
167
+     * Check for generic requirements before creating a share
168
+     *
169
+     * @param \OCP\Share\IShare $share
170
+     * @throws \InvalidArgumentException
171
+     * @throws GenericShareException
172
+     */
173
+    protected function generalCreateChecks(\OCP\Share\IShare $share) {
174
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
175
+            // We expect a valid user as sharedWith for user shares
176
+            if (!$this->userManager->userExists($share->getSharedWith())) {
177
+                throw new \InvalidArgumentException('SharedWith is not a valid user');
178
+            }
179
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
180
+            // We expect a valid group as sharedWith for group shares
181
+            if (!$this->groupManager->groupExists($share->getSharedWith())) {
182
+                throw new \InvalidArgumentException('SharedWith is not a valid group');
183
+            }
184
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
185
+            if ($share->getSharedWith() !== null) {
186
+                throw new \InvalidArgumentException('SharedWith should be empty');
187
+            }
188
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE) {
189
+            if ($share->getSharedWith() === null) {
190
+                throw new \InvalidArgumentException('SharedWith should not be empty');
191
+            }
192
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
193
+            if ($share->getSharedWith() === null) {
194
+                throw new \InvalidArgumentException('SharedWith should not be empty');
195
+            }
196
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_CIRCLE) {
197
+            $circle = \OCA\Circles\Api\Circles::detailsCircle($share->getSharedWith());
198
+            if ($circle === null) {
199
+                throw new \InvalidArgumentException('SharedWith is not a valid circle');
200
+            }
201
+        } else {
202
+            // We can't handle other types yet
203
+            throw new \InvalidArgumentException('unknown share type');
204
+        }
205
+
206
+        // Verify the initiator of the share is set
207
+        if ($share->getSharedBy() === null) {
208
+            throw new \InvalidArgumentException('SharedBy should be set');
209
+        }
210
+
211
+        // Cannot share with yourself
212
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
213
+            $share->getSharedWith() === $share->getSharedBy()) {
214
+            throw new \InvalidArgumentException('Can\'t share with yourself');
215
+        }
216
+
217
+        // The path should be set
218
+        if ($share->getNode() === null) {
219
+            throw new \InvalidArgumentException('Path should be set');
220
+        }
221
+
222
+        // And it should be a file or a folder
223
+        if (!($share->getNode() instanceof \OCP\Files\File) &&
224
+                !($share->getNode() instanceof \OCP\Files\Folder)) {
225
+            throw new \InvalidArgumentException('Path should be either a file or a folder');
226
+        }
227
+
228
+        // And you can't share your rootfolder
229
+        if ($this->userManager->userExists($share->getSharedBy())) {
230
+            $sharedPath = $this->rootFolder->getUserFolder($share->getSharedBy())->getPath();
231
+        } else {
232
+            $sharedPath = $this->rootFolder->getUserFolder($share->getShareOwner())->getPath();
233
+        }
234
+        if ($sharedPath === $share->getNode()->getPath()) {
235
+            throw new \InvalidArgumentException('You can\'t share your root folder');
236
+        }
237
+
238
+        // Check if we actually have share permissions
239
+        if (!$share->getNode()->isShareable()) {
240
+            $message_t = $this->l->t('You are not allowed to share %s', [$share->getNode()->getPath()]);
241
+            throw new GenericShareException($message_t, $message_t, 404);
242
+        }
243
+
244
+        // Permissions should be set
245
+        if ($share->getPermissions() === null) {
246
+            throw new \InvalidArgumentException('A share requires permissions');
247
+        }
248
+
249
+        /*
250 250
 		 * Quick fix for #23536
251 251
 		 * Non moveable mount points do not have update and delete permissions
252 252
 		 * while we 'most likely' do have that on the storage.
253 253
 		 */
254
-		$permissions = $share->getNode()->getPermissions();
255
-		$mount = $share->getNode()->getMountPoint();
256
-		if (!($mount instanceof MoveableMount)) {
257
-			$permissions |= \OCP\Constants::PERMISSION_DELETE | \OCP\Constants::PERMISSION_UPDATE;
258
-		}
259
-
260
-		// Check that we do not share with more permissions than we have
261
-		if ($share->getPermissions() & ~$permissions) {
262
-			$message_t = $this->l->t('Cannot increase permissions of %s', [$share->getNode()->getPath()]);
263
-			throw new GenericShareException($message_t, $message_t, 404);
264
-		}
265
-
266
-
267
-		// Check that read permissions are always set
268
-		// Link shares are allowed to have no read permissions to allow upload to hidden folders
269
-		$noReadPermissionRequired = $share->getShareType() === \OCP\Share::SHARE_TYPE_LINK
270
-			|| $share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL;
271
-		if (!$noReadPermissionRequired &&
272
-			($share->getPermissions() & \OCP\Constants::PERMISSION_READ) === 0) {
273
-			throw new \InvalidArgumentException('Shares need at least read permissions');
274
-		}
275
-
276
-		if ($share->getNode() instanceof \OCP\Files\File) {
277
-			if ($share->getPermissions() & \OCP\Constants::PERMISSION_DELETE) {
278
-				$message_t = $this->l->t('Files can\'t be shared with delete permissions');
279
-				throw new GenericShareException($message_t);
280
-			}
281
-			if ($share->getPermissions() & \OCP\Constants::PERMISSION_CREATE) {
282
-				$message_t = $this->l->t('Files can\'t be shared with create permissions');
283
-				throw new GenericShareException($message_t);
284
-			}
285
-		}
286
-	}
287
-
288
-	/**
289
-	 * Validate if the expiration date fits the system settings
290
-	 *
291
-	 * @param \OCP\Share\IShare $share The share to validate the expiration date of
292
-	 * @return \OCP\Share\IShare The modified share object
293
-	 * @throws GenericShareException
294
-	 * @throws \InvalidArgumentException
295
-	 * @throws \Exception
296
-	 */
297
-	protected function validateExpirationDate(\OCP\Share\IShare $share) {
298
-
299
-		$expirationDate = $share->getExpirationDate();
300
-
301
-		if ($expirationDate !== null) {
302
-			//Make sure the expiration date is a date
303
-			$expirationDate->setTime(0, 0, 0);
304
-
305
-			$date = new \DateTime();
306
-			$date->setTime(0, 0, 0);
307
-			if ($date >= $expirationDate) {
308
-				$message = $this->l->t('Expiration date is in the past');
309
-				throw new GenericShareException($message, $message, 404);
310
-			}
311
-		}
312
-
313
-		// If expiredate is empty set a default one if there is a default
314
-		$fullId = null;
315
-		try {
316
-			$fullId = $share->getFullId();
317
-		} catch (\UnexpectedValueException $e) {
318
-			// This is a new share
319
-		}
320
-
321
-		if ($fullId === null && $expirationDate === null && $this->shareApiLinkDefaultExpireDate()) {
322
-			$expirationDate = new \DateTime();
323
-			$expirationDate->setTime(0,0,0);
324
-			$expirationDate->add(new \DateInterval('P'.$this->shareApiLinkDefaultExpireDays().'D'));
325
-		}
326
-
327
-		// If we enforce the expiration date check that is does not exceed
328
-		if ($this->shareApiLinkDefaultExpireDateEnforced()) {
329
-			if ($expirationDate === null) {
330
-				throw new \InvalidArgumentException('Expiration date is enforced');
331
-			}
332
-
333
-			$date = new \DateTime();
334
-			$date->setTime(0, 0, 0);
335
-			$date->add(new \DateInterval('P' . $this->shareApiLinkDefaultExpireDays() . 'D'));
336
-			if ($date < $expirationDate) {
337
-				$message = $this->l->t('Cannot set expiration date more than %s days in the future', [$this->shareApiLinkDefaultExpireDays()]);
338
-				throw new GenericShareException($message, $message, 404);
339
-			}
340
-		}
341
-
342
-		$accepted = true;
343
-		$message = '';
344
-		\OCP\Util::emitHook('\OC\Share', 'verifyExpirationDate', [
345
-			'expirationDate' => &$expirationDate,
346
-			'accepted' => &$accepted,
347
-			'message' => &$message,
348
-			'passwordSet' => $share->getPassword() !== null,
349
-		]);
350
-
351
-		if (!$accepted) {
352
-			throw new \Exception($message);
353
-		}
354
-
355
-		$share->setExpirationDate($expirationDate);
356
-
357
-		return $share;
358
-	}
359
-
360
-	/**
361
-	 * Check for pre share requirements for user shares
362
-	 *
363
-	 * @param \OCP\Share\IShare $share
364
-	 * @throws \Exception
365
-	 */
366
-	protected function userCreateChecks(\OCP\Share\IShare $share) {
367
-		// Check if we can share with group members only
368
-		if ($this->shareWithGroupMembersOnly()) {
369
-			$sharedBy = $this->userManager->get($share->getSharedBy());
370
-			$sharedWith = $this->userManager->get($share->getSharedWith());
371
-			// Verify we can share with this user
372
-			$groups = array_intersect(
373
-					$this->groupManager->getUserGroupIds($sharedBy),
374
-					$this->groupManager->getUserGroupIds($sharedWith)
375
-			);
376
-			if (empty($groups)) {
377
-				throw new \Exception('Only sharing with group members is allowed');
378
-			}
379
-		}
380
-
381
-		/*
254
+        $permissions = $share->getNode()->getPermissions();
255
+        $mount = $share->getNode()->getMountPoint();
256
+        if (!($mount instanceof MoveableMount)) {
257
+            $permissions |= \OCP\Constants::PERMISSION_DELETE | \OCP\Constants::PERMISSION_UPDATE;
258
+        }
259
+
260
+        // Check that we do not share with more permissions than we have
261
+        if ($share->getPermissions() & ~$permissions) {
262
+            $message_t = $this->l->t('Cannot increase permissions of %s', [$share->getNode()->getPath()]);
263
+            throw new GenericShareException($message_t, $message_t, 404);
264
+        }
265
+
266
+
267
+        // Check that read permissions are always set
268
+        // Link shares are allowed to have no read permissions to allow upload to hidden folders
269
+        $noReadPermissionRequired = $share->getShareType() === \OCP\Share::SHARE_TYPE_LINK
270
+            || $share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL;
271
+        if (!$noReadPermissionRequired &&
272
+            ($share->getPermissions() & \OCP\Constants::PERMISSION_READ) === 0) {
273
+            throw new \InvalidArgumentException('Shares need at least read permissions');
274
+        }
275
+
276
+        if ($share->getNode() instanceof \OCP\Files\File) {
277
+            if ($share->getPermissions() & \OCP\Constants::PERMISSION_DELETE) {
278
+                $message_t = $this->l->t('Files can\'t be shared with delete permissions');
279
+                throw new GenericShareException($message_t);
280
+            }
281
+            if ($share->getPermissions() & \OCP\Constants::PERMISSION_CREATE) {
282
+                $message_t = $this->l->t('Files can\'t be shared with create permissions');
283
+                throw new GenericShareException($message_t);
284
+            }
285
+        }
286
+    }
287
+
288
+    /**
289
+     * Validate if the expiration date fits the system settings
290
+     *
291
+     * @param \OCP\Share\IShare $share The share to validate the expiration date of
292
+     * @return \OCP\Share\IShare The modified share object
293
+     * @throws GenericShareException
294
+     * @throws \InvalidArgumentException
295
+     * @throws \Exception
296
+     */
297
+    protected function validateExpirationDate(\OCP\Share\IShare $share) {
298
+
299
+        $expirationDate = $share->getExpirationDate();
300
+
301
+        if ($expirationDate !== null) {
302
+            //Make sure the expiration date is a date
303
+            $expirationDate->setTime(0, 0, 0);
304
+
305
+            $date = new \DateTime();
306
+            $date->setTime(0, 0, 0);
307
+            if ($date >= $expirationDate) {
308
+                $message = $this->l->t('Expiration date is in the past');
309
+                throw new GenericShareException($message, $message, 404);
310
+            }
311
+        }
312
+
313
+        // If expiredate is empty set a default one if there is a default
314
+        $fullId = null;
315
+        try {
316
+            $fullId = $share->getFullId();
317
+        } catch (\UnexpectedValueException $e) {
318
+            // This is a new share
319
+        }
320
+
321
+        if ($fullId === null && $expirationDate === null && $this->shareApiLinkDefaultExpireDate()) {
322
+            $expirationDate = new \DateTime();
323
+            $expirationDate->setTime(0,0,0);
324
+            $expirationDate->add(new \DateInterval('P'.$this->shareApiLinkDefaultExpireDays().'D'));
325
+        }
326
+
327
+        // If we enforce the expiration date check that is does not exceed
328
+        if ($this->shareApiLinkDefaultExpireDateEnforced()) {
329
+            if ($expirationDate === null) {
330
+                throw new \InvalidArgumentException('Expiration date is enforced');
331
+            }
332
+
333
+            $date = new \DateTime();
334
+            $date->setTime(0, 0, 0);
335
+            $date->add(new \DateInterval('P' . $this->shareApiLinkDefaultExpireDays() . 'D'));
336
+            if ($date < $expirationDate) {
337
+                $message = $this->l->t('Cannot set expiration date more than %s days in the future', [$this->shareApiLinkDefaultExpireDays()]);
338
+                throw new GenericShareException($message, $message, 404);
339
+            }
340
+        }
341
+
342
+        $accepted = true;
343
+        $message = '';
344
+        \OCP\Util::emitHook('\OC\Share', 'verifyExpirationDate', [
345
+            'expirationDate' => &$expirationDate,
346
+            'accepted' => &$accepted,
347
+            'message' => &$message,
348
+            'passwordSet' => $share->getPassword() !== null,
349
+        ]);
350
+
351
+        if (!$accepted) {
352
+            throw new \Exception($message);
353
+        }
354
+
355
+        $share->setExpirationDate($expirationDate);
356
+
357
+        return $share;
358
+    }
359
+
360
+    /**
361
+     * Check for pre share requirements for user shares
362
+     *
363
+     * @param \OCP\Share\IShare $share
364
+     * @throws \Exception
365
+     */
366
+    protected function userCreateChecks(\OCP\Share\IShare $share) {
367
+        // Check if we can share with group members only
368
+        if ($this->shareWithGroupMembersOnly()) {
369
+            $sharedBy = $this->userManager->get($share->getSharedBy());
370
+            $sharedWith = $this->userManager->get($share->getSharedWith());
371
+            // Verify we can share with this user
372
+            $groups = array_intersect(
373
+                    $this->groupManager->getUserGroupIds($sharedBy),
374
+                    $this->groupManager->getUserGroupIds($sharedWith)
375
+            );
376
+            if (empty($groups)) {
377
+                throw new \Exception('Only sharing with group members is allowed');
378
+            }
379
+        }
380
+
381
+        /*
382 382
 		 * TODO: Could be costly, fix
383 383
 		 *
384 384
 		 * Also this is not what we want in the future.. then we want to squash identical shares.
385 385
 		 */
386
-		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_USER);
387
-		$existingShares = $provider->getSharesByPath($share->getNode());
388
-		foreach($existingShares as $existingShare) {
389
-			// Ignore if it is the same share
390
-			try {
391
-				if ($existingShare->getFullId() === $share->getFullId()) {
392
-					continue;
393
-				}
394
-			} catch (\UnexpectedValueException $e) {
395
-				//Shares are not identical
396
-			}
397
-
398
-			// Identical share already existst
399
-			if ($existingShare->getSharedWith() === $share->getSharedWith()) {
400
-				throw new \Exception('Path already shared with this user');
401
-			}
402
-
403
-			// The share is already shared with this user via a group share
404
-			if ($existingShare->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
405
-				$group = $this->groupManager->get($existingShare->getSharedWith());
406
-				if (!is_null($group)) {
407
-					$user = $this->userManager->get($share->getSharedWith());
408
-
409
-					if ($group->inGroup($user) && $existingShare->getShareOwner() !== $share->getShareOwner()) {
410
-						throw new \Exception('Path already shared with this user');
411
-					}
412
-				}
413
-			}
414
-		}
415
-	}
416
-
417
-	/**
418
-	 * Check for pre share requirements for group shares
419
-	 *
420
-	 * @param \OCP\Share\IShare $share
421
-	 * @throws \Exception
422
-	 */
423
-	protected function groupCreateChecks(\OCP\Share\IShare $share) {
424
-		// Verify group shares are allowed
425
-		if (!$this->allowGroupSharing()) {
426
-			throw new \Exception('Group sharing is now allowed');
427
-		}
428
-
429
-		// Verify if the user can share with this group
430
-		if ($this->shareWithGroupMembersOnly()) {
431
-			$sharedBy = $this->userManager->get($share->getSharedBy());
432
-			$sharedWith = $this->groupManager->get($share->getSharedWith());
433
-			if (is_null($sharedWith) || !$sharedWith->inGroup($sharedBy)) {
434
-				throw new \Exception('Only sharing within your own groups is allowed');
435
-			}
436
-		}
437
-
438
-		/*
386
+        $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_USER);
387
+        $existingShares = $provider->getSharesByPath($share->getNode());
388
+        foreach($existingShares as $existingShare) {
389
+            // Ignore if it is the same share
390
+            try {
391
+                if ($existingShare->getFullId() === $share->getFullId()) {
392
+                    continue;
393
+                }
394
+            } catch (\UnexpectedValueException $e) {
395
+                //Shares are not identical
396
+            }
397
+
398
+            // Identical share already existst
399
+            if ($existingShare->getSharedWith() === $share->getSharedWith()) {
400
+                throw new \Exception('Path already shared with this user');
401
+            }
402
+
403
+            // The share is already shared with this user via a group share
404
+            if ($existingShare->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
405
+                $group = $this->groupManager->get($existingShare->getSharedWith());
406
+                if (!is_null($group)) {
407
+                    $user = $this->userManager->get($share->getSharedWith());
408
+
409
+                    if ($group->inGroup($user) && $existingShare->getShareOwner() !== $share->getShareOwner()) {
410
+                        throw new \Exception('Path already shared with this user');
411
+                    }
412
+                }
413
+            }
414
+        }
415
+    }
416
+
417
+    /**
418
+     * Check for pre share requirements for group shares
419
+     *
420
+     * @param \OCP\Share\IShare $share
421
+     * @throws \Exception
422
+     */
423
+    protected function groupCreateChecks(\OCP\Share\IShare $share) {
424
+        // Verify group shares are allowed
425
+        if (!$this->allowGroupSharing()) {
426
+            throw new \Exception('Group sharing is now allowed');
427
+        }
428
+
429
+        // Verify if the user can share with this group
430
+        if ($this->shareWithGroupMembersOnly()) {
431
+            $sharedBy = $this->userManager->get($share->getSharedBy());
432
+            $sharedWith = $this->groupManager->get($share->getSharedWith());
433
+            if (is_null($sharedWith) || !$sharedWith->inGroup($sharedBy)) {
434
+                throw new \Exception('Only sharing within your own groups is allowed');
435
+            }
436
+        }
437
+
438
+        /*
439 439
 		 * TODO: Could be costly, fix
440 440
 		 *
441 441
 		 * Also this is not what we want in the future.. then we want to squash identical shares.
442 442
 		 */
443
-		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
444
-		$existingShares = $provider->getSharesByPath($share->getNode());
445
-		foreach($existingShares as $existingShare) {
446
-			try {
447
-				if ($existingShare->getFullId() === $share->getFullId()) {
448
-					continue;
449
-				}
450
-			} catch (\UnexpectedValueException $e) {
451
-				//It is a new share so just continue
452
-			}
453
-
454
-			if ($existingShare->getSharedWith() === $share->getSharedWith()) {
455
-				throw new \Exception('Path already shared with this group');
456
-			}
457
-		}
458
-	}
459
-
460
-	/**
461
-	 * Check for pre share requirements for link shares
462
-	 *
463
-	 * @param \OCP\Share\IShare $share
464
-	 * @throws \Exception
465
-	 */
466
-	protected function linkCreateChecks(\OCP\Share\IShare $share) {
467
-		// Are link shares allowed?
468
-		if (!$this->shareApiAllowLinks()) {
469
-			throw new \Exception('Link sharing not allowed');
470
-		}
471
-
472
-		// Link shares by definition can't have share permissions
473
-		if ($share->getPermissions() & \OCP\Constants::PERMISSION_SHARE) {
474
-			throw new \InvalidArgumentException('Link shares can\'t have reshare permissions');
475
-		}
476
-
477
-		// Check if public upload is allowed
478
-		if (!$this->shareApiLinkAllowPublicUpload() &&
479
-			($share->getPermissions() & (\OCP\Constants::PERMISSION_CREATE | \OCP\Constants::PERMISSION_UPDATE | \OCP\Constants::PERMISSION_DELETE))) {
480
-			throw new \InvalidArgumentException('Public upload not allowed');
481
-		}
482
-	}
483
-
484
-	/**
485
-	 * To make sure we don't get invisible link shares we set the parent
486
-	 * of a link if it is a reshare. This is a quick word around
487
-	 * until we can properly display multiple link shares in the UI
488
-	 *
489
-	 * See: https://github.com/owncloud/core/issues/22295
490
-	 *
491
-	 * FIXME: Remove once multiple link shares can be properly displayed
492
-	 *
493
-	 * @param \OCP\Share\IShare $share
494
-	 */
495
-	protected function setLinkParent(\OCP\Share\IShare $share) {
496
-
497
-		// No sense in checking if the method is not there.
498
-		if (method_exists($share, 'setParent')) {
499
-			$storage = $share->getNode()->getStorage();
500
-			if ($storage->instanceOfStorage('\OCA\Files_Sharing\ISharedStorage')) {
501
-				/** @var \OCA\Files_Sharing\SharedStorage $storage */
502
-				$share->setParent($storage->getShareId());
503
-			}
504
-		};
505
-	}
506
-
507
-	/**
508
-	 * @param File|Folder $path
509
-	 */
510
-	protected function pathCreateChecks($path) {
511
-		// Make sure that we do not share a path that contains a shared mountpoint
512
-		if ($path instanceof \OCP\Files\Folder) {
513
-			$mounts = $this->mountManager->findIn($path->getPath());
514
-			foreach($mounts as $mount) {
515
-				if ($mount->getStorage()->instanceOfStorage('\OCA\Files_Sharing\ISharedStorage')) {
516
-					throw new \InvalidArgumentException('Path contains files shared with you');
517
-				}
518
-			}
519
-		}
520
-	}
521
-
522
-	/**
523
-	 * Check if the user that is sharing can actually share
524
-	 *
525
-	 * @param \OCP\Share\IShare $share
526
-	 * @throws \Exception
527
-	 */
528
-	protected function canShare(\OCP\Share\IShare $share) {
529
-		if (!$this->shareApiEnabled()) {
530
-			throw new \Exception('The share API is disabled');
531
-		}
532
-
533
-		if ($this->sharingDisabledForUser($share->getSharedBy())) {
534
-			throw new \Exception('You are not allowed to share');
535
-		}
536
-	}
537
-
538
-	/**
539
-	 * Share a path
540
-	 *
541
-	 * @param \OCP\Share\IShare $share
542
-	 * @return Share The share object
543
-	 * @throws \Exception
544
-	 *
545
-	 * TODO: handle link share permissions or check them
546
-	 */
547
-	public function createShare(\OCP\Share\IShare $share) {
548
-		$this->canShare($share);
549
-
550
-		$this->generalCreateChecks($share);
551
-
552
-		// Verify if there are any issues with the path
553
-		$this->pathCreateChecks($share->getNode());
554
-
555
-		/*
443
+        $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
444
+        $existingShares = $provider->getSharesByPath($share->getNode());
445
+        foreach($existingShares as $existingShare) {
446
+            try {
447
+                if ($existingShare->getFullId() === $share->getFullId()) {
448
+                    continue;
449
+                }
450
+            } catch (\UnexpectedValueException $e) {
451
+                //It is a new share so just continue
452
+            }
453
+
454
+            if ($existingShare->getSharedWith() === $share->getSharedWith()) {
455
+                throw new \Exception('Path already shared with this group');
456
+            }
457
+        }
458
+    }
459
+
460
+    /**
461
+     * Check for pre share requirements for link shares
462
+     *
463
+     * @param \OCP\Share\IShare $share
464
+     * @throws \Exception
465
+     */
466
+    protected function linkCreateChecks(\OCP\Share\IShare $share) {
467
+        // Are link shares allowed?
468
+        if (!$this->shareApiAllowLinks()) {
469
+            throw new \Exception('Link sharing not allowed');
470
+        }
471
+
472
+        // Link shares by definition can't have share permissions
473
+        if ($share->getPermissions() & \OCP\Constants::PERMISSION_SHARE) {
474
+            throw new \InvalidArgumentException('Link shares can\'t have reshare permissions');
475
+        }
476
+
477
+        // Check if public upload is allowed
478
+        if (!$this->shareApiLinkAllowPublicUpload() &&
479
+            ($share->getPermissions() & (\OCP\Constants::PERMISSION_CREATE | \OCP\Constants::PERMISSION_UPDATE | \OCP\Constants::PERMISSION_DELETE))) {
480
+            throw new \InvalidArgumentException('Public upload not allowed');
481
+        }
482
+    }
483
+
484
+    /**
485
+     * To make sure we don't get invisible link shares we set the parent
486
+     * of a link if it is a reshare. This is a quick word around
487
+     * until we can properly display multiple link shares in the UI
488
+     *
489
+     * See: https://github.com/owncloud/core/issues/22295
490
+     *
491
+     * FIXME: Remove once multiple link shares can be properly displayed
492
+     *
493
+     * @param \OCP\Share\IShare $share
494
+     */
495
+    protected function setLinkParent(\OCP\Share\IShare $share) {
496
+
497
+        // No sense in checking if the method is not there.
498
+        if (method_exists($share, 'setParent')) {
499
+            $storage = $share->getNode()->getStorage();
500
+            if ($storage->instanceOfStorage('\OCA\Files_Sharing\ISharedStorage')) {
501
+                /** @var \OCA\Files_Sharing\SharedStorage $storage */
502
+                $share->setParent($storage->getShareId());
503
+            }
504
+        };
505
+    }
506
+
507
+    /**
508
+     * @param File|Folder $path
509
+     */
510
+    protected function pathCreateChecks($path) {
511
+        // Make sure that we do not share a path that contains a shared mountpoint
512
+        if ($path instanceof \OCP\Files\Folder) {
513
+            $mounts = $this->mountManager->findIn($path->getPath());
514
+            foreach($mounts as $mount) {
515
+                if ($mount->getStorage()->instanceOfStorage('\OCA\Files_Sharing\ISharedStorage')) {
516
+                    throw new \InvalidArgumentException('Path contains files shared with you');
517
+                }
518
+            }
519
+        }
520
+    }
521
+
522
+    /**
523
+     * Check if the user that is sharing can actually share
524
+     *
525
+     * @param \OCP\Share\IShare $share
526
+     * @throws \Exception
527
+     */
528
+    protected function canShare(\OCP\Share\IShare $share) {
529
+        if (!$this->shareApiEnabled()) {
530
+            throw new \Exception('The share API is disabled');
531
+        }
532
+
533
+        if ($this->sharingDisabledForUser($share->getSharedBy())) {
534
+            throw new \Exception('You are not allowed to share');
535
+        }
536
+    }
537
+
538
+    /**
539
+     * Share a path
540
+     *
541
+     * @param \OCP\Share\IShare $share
542
+     * @return Share The share object
543
+     * @throws \Exception
544
+     *
545
+     * TODO: handle link share permissions or check them
546
+     */
547
+    public function createShare(\OCP\Share\IShare $share) {
548
+        $this->canShare($share);
549
+
550
+        $this->generalCreateChecks($share);
551
+
552
+        // Verify if there are any issues with the path
553
+        $this->pathCreateChecks($share->getNode());
554
+
555
+        /*
556 556
 		 * On creation of a share the owner is always the owner of the path
557 557
 		 * Except for mounted federated shares.
558 558
 		 */
559
-		$storage = $share->getNode()->getStorage();
560
-		if ($storage->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
561
-			$parent = $share->getNode()->getParent();
562
-			while($parent->getStorage()->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
563
-				$parent = $parent->getParent();
564
-			}
565
-			$share->setShareOwner($parent->getOwner()->getUID());
566
-		} else {
567
-			$share->setShareOwner($share->getNode()->getOwner()->getUID());
568
-		}
569
-
570
-		//Verify share type
571
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
572
-			$this->userCreateChecks($share);
573
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
574
-			$this->groupCreateChecks($share);
575
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
576
-			$this->linkCreateChecks($share);
577
-			$this->setLinkParent($share);
578
-
579
-			/*
559
+        $storage = $share->getNode()->getStorage();
560
+        if ($storage->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
561
+            $parent = $share->getNode()->getParent();
562
+            while($parent->getStorage()->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
563
+                $parent = $parent->getParent();
564
+            }
565
+            $share->setShareOwner($parent->getOwner()->getUID());
566
+        } else {
567
+            $share->setShareOwner($share->getNode()->getOwner()->getUID());
568
+        }
569
+
570
+        //Verify share type
571
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
572
+            $this->userCreateChecks($share);
573
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
574
+            $this->groupCreateChecks($share);
575
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
576
+            $this->linkCreateChecks($share);
577
+            $this->setLinkParent($share);
578
+
579
+            /*
580 580
 			 * For now ignore a set token.
581 581
 			 */
582
-			$share->setToken(
583
-				$this->secureRandom->generate(
584
-					\OC\Share\Constants::TOKEN_LENGTH,
585
-					\OCP\Security\ISecureRandom::CHAR_LOWER.
586
-					\OCP\Security\ISecureRandom::CHAR_UPPER.
587
-					\OCP\Security\ISecureRandom::CHAR_DIGITS
588
-				)
589
-			);
590
-
591
-			//Verify the expiration date
592
-			$this->validateExpirationDate($share);
593
-
594
-			//Verify the password
595
-			$this->verifyPassword($share->getPassword());
596
-
597
-			// If a password is set. Hash it!
598
-			if ($share->getPassword() !== null) {
599
-				$share->setPassword($this->hasher->hash($share->getPassword()));
600
-			}
601
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
602
-			$share->setToken(
603
-				$this->secureRandom->generate(
604
-					\OC\Share\Constants::TOKEN_LENGTH,
605
-					\OCP\Security\ISecureRandom::CHAR_LOWER.
606
-					\OCP\Security\ISecureRandom::CHAR_UPPER.
607
-					\OCP\Security\ISecureRandom::CHAR_DIGITS
608
-				)
609
-			);
610
-		}
611
-
612
-		// Cannot share with the owner
613
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
614
-			$share->getSharedWith() === $share->getShareOwner()) {
615
-			throw new \InvalidArgumentException('Can\'t share with the share owner');
616
-		}
617
-
618
-		// Generate the target
619
-		$target = $this->config->getSystemValue('share_folder', '/') .'/'. $share->getNode()->getName();
620
-		$target = \OC\Files\Filesystem::normalizePath($target);
621
-		$share->setTarget($target);
622
-
623
-		// Pre share hook
624
-		$run = true;
625
-		$error = '';
626
-		$preHookData = [
627
-			'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
628
-			'itemSource' => $share->getNode()->getId(),
629
-			'shareType' => $share->getShareType(),
630
-			'uidOwner' => $share->getSharedBy(),
631
-			'permissions' => $share->getPermissions(),
632
-			'fileSource' => $share->getNode()->getId(),
633
-			'expiration' => $share->getExpirationDate(),
634
-			'token' => $share->getToken(),
635
-			'itemTarget' => $share->getTarget(),
636
-			'shareWith' => $share->getSharedWith(),
637
-			'run' => &$run,
638
-			'error' => &$error,
639
-		];
640
-		\OC_Hook::emit('OCP\Share', 'pre_shared', $preHookData);
641
-
642
-		if ($run === false) {
643
-			throw new \Exception($error);
644
-		}
645
-
646
-		$oldShare = $share;
647
-		$provider = $this->factory->getProviderForType($share->getShareType());
648
-		$share = $provider->create($share);
649
-		//reuse the node we already have
650
-		$share->setNode($oldShare->getNode());
651
-
652
-		// Post share hook
653
-		$postHookData = [
654
-			'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
655
-			'itemSource' => $share->getNode()->getId(),
656
-			'shareType' => $share->getShareType(),
657
-			'uidOwner' => $share->getSharedBy(),
658
-			'permissions' => $share->getPermissions(),
659
-			'fileSource' => $share->getNode()->getId(),
660
-			'expiration' => $share->getExpirationDate(),
661
-			'token' => $share->getToken(),
662
-			'id' => $share->getId(),
663
-			'shareWith' => $share->getSharedWith(),
664
-			'itemTarget' => $share->getTarget(),
665
-			'fileTarget' => $share->getTarget(),
666
-		];
667
-
668
-		\OC_Hook::emit('OCP\Share', 'post_shared', $postHookData);
669
-
670
-		return $share;
671
-	}
672
-
673
-	/**
674
-	 * Update a share
675
-	 *
676
-	 * @param \OCP\Share\IShare $share
677
-	 * @return \OCP\Share\IShare The share object
678
-	 * @throws \InvalidArgumentException
679
-	 */
680
-	public function updateShare(\OCP\Share\IShare $share) {
681
-		$expirationDateUpdated = false;
682
-
683
-		$this->canShare($share);
684
-
685
-		try {
686
-			$originalShare = $this->getShareById($share->getFullId());
687
-		} catch (\UnexpectedValueException $e) {
688
-			throw new \InvalidArgumentException('Share does not have a full id');
689
-		}
690
-
691
-		// We can't change the share type!
692
-		if ($share->getShareType() !== $originalShare->getShareType()) {
693
-			throw new \InvalidArgumentException('Can\'t change share type');
694
-		}
695
-
696
-		// We can only change the recipient on user shares
697
-		if ($share->getSharedWith() !== $originalShare->getSharedWith() &&
698
-		    $share->getShareType() !== \OCP\Share::SHARE_TYPE_USER) {
699
-			throw new \InvalidArgumentException('Can only update recipient on user shares');
700
-		}
701
-
702
-		// Cannot share with the owner
703
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
704
-			$share->getSharedWith() === $share->getShareOwner()) {
705
-			throw new \InvalidArgumentException('Can\'t share with the share owner');
706
-		}
707
-
708
-		$this->generalCreateChecks($share);
709
-
710
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
711
-			$this->userCreateChecks($share);
712
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
713
-			$this->groupCreateChecks($share);
714
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
715
-			$this->linkCreateChecks($share);
716
-
717
-			// Password updated.
718
-			if ($share->getPassword() !== $originalShare->getPassword()) {
719
-				//Verify the password
720
-				$this->verifyPassword($share->getPassword());
721
-
722
-				// If a password is set. Hash it!
723
-				if ($share->getPassword() !== null) {
724
-					$share->setPassword($this->hasher->hash($share->getPassword()));
725
-				}
726
-			}
727
-
728
-			if ($share->getExpirationDate() != $originalShare->getExpirationDate()) {
729
-				//Verify the expiration date
730
-				$this->validateExpirationDate($share);
731
-				$expirationDateUpdated = true;
732
-			}
733
-		}
734
-
735
-		$plainTextPassword = null;
736
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK || $share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
737
-			// Password updated.
738
-			if ($share->getPassword() !== $originalShare->getPassword()) {
739
-				//Verify the password
740
-				$this->verifyPassword($share->getPassword());
741
-
742
-				// If a password is set. Hash it!
743
-				if ($share->getPassword() !== null) {
744
-					$plainTextPassword = $share->getPassword();
745
-					$share->setPassword($this->hasher->hash($plainTextPassword));
746
-				}
747
-			}
748
-		}
749
-
750
-		$this->pathCreateChecks($share->getNode());
751
-
752
-		// Now update the share!
753
-		$provider = $this->factory->getProviderForType($share->getShareType());
754
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
755
-			$share = $provider->update($share, $plainTextPassword);
756
-		} else {
757
-			$share = $provider->update($share);
758
-		}
759
-
760
-		if ($expirationDateUpdated === true) {
761
-			\OC_Hook::emit('OCP\Share', 'post_set_expiration_date', [
762
-				'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
763
-				'itemSource' => $share->getNode()->getId(),
764
-				'date' => $share->getExpirationDate(),
765
-				'uidOwner' => $share->getSharedBy(),
766
-			]);
767
-		}
768
-
769
-		if ($share->getPassword() !== $originalShare->getPassword()) {
770
-			\OC_Hook::emit('OCP\Share', 'post_update_password', [
771
-				'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
772
-				'itemSource' => $share->getNode()->getId(),
773
-				'uidOwner' => $share->getSharedBy(),
774
-				'token' => $share->getToken(),
775
-				'disabled' => is_null($share->getPassword()),
776
-			]);
777
-		}
778
-
779
-		if ($share->getPermissions() !== $originalShare->getPermissions()) {
780
-			if ($this->userManager->userExists($share->getShareOwner())) {
781
-				$userFolder = $this->rootFolder->getUserFolder($share->getShareOwner());
782
-			} else {
783
-				$userFolder = $this->rootFolder->getUserFolder($share->getSharedBy());
784
-			}
785
-			\OC_Hook::emit('OCP\Share', 'post_update_permissions', array(
786
-				'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
787
-				'itemSource' => $share->getNode()->getId(),
788
-				'shareType' => $share->getShareType(),
789
-				'shareWith' => $share->getSharedWith(),
790
-				'uidOwner' => $share->getSharedBy(),
791
-				'permissions' => $share->getPermissions(),
792
-				'path' => $userFolder->getRelativePath($share->getNode()->getPath()),
793
-			));
794
-		}
795
-
796
-		return $share;
797
-	}
798
-
799
-	/**
800
-	 * Delete all the children of this share
801
-	 * FIXME: remove once https://github.com/owncloud/core/pull/21660 is in
802
-	 *
803
-	 * @param \OCP\Share\IShare $share
804
-	 * @return \OCP\Share\IShare[] List of deleted shares
805
-	 */
806
-	protected function deleteChildren(\OCP\Share\IShare $share) {
807
-		$deletedShares = [];
808
-
809
-		$provider = $this->factory->getProviderForType($share->getShareType());
810
-
811
-		foreach ($provider->getChildren($share) as $child) {
812
-			$deletedChildren = $this->deleteChildren($child);
813
-			$deletedShares = array_merge($deletedShares, $deletedChildren);
814
-
815
-			$provider->delete($child);
816
-			$deletedShares[] = $child;
817
-		}
818
-
819
-		return $deletedShares;
820
-	}
821
-
822
-	/**
823
-	 * Delete a share
824
-	 *
825
-	 * @param \OCP\Share\IShare $share
826
-	 * @throws ShareNotFound
827
-	 * @throws \InvalidArgumentException
828
-	 */
829
-	public function deleteShare(\OCP\Share\IShare $share) {
830
-
831
-		try {
832
-			$share->getFullId();
833
-		} catch (\UnexpectedValueException $e) {
834
-			throw new \InvalidArgumentException('Share does not have a full id');
835
-		}
836
-
837
-		$event = new GenericEvent($share);
838
-		$this->eventDispatcher->dispatch('OCP\Share::preUnshare', $event);
839
-
840
-		// Get all children and delete them as well
841
-		$deletedShares = $this->deleteChildren($share);
842
-
843
-		// Do the actual delete
844
-		$provider = $this->factory->getProviderForType($share->getShareType());
845
-		$provider->delete($share);
846
-
847
-		// All the deleted shares caused by this delete
848
-		$deletedShares[] = $share;
849
-
850
-		// Emit post hook
851
-		$event->setArgument('deletedShares', $deletedShares);
852
-		$this->eventDispatcher->dispatch('OCP\Share::postUnshare', $event);
853
-	}
854
-
855
-
856
-	/**
857
-	 * Unshare a file as the recipient.
858
-	 * This can be different from a regular delete for example when one of
859
-	 * the users in a groups deletes that share. But the provider should
860
-	 * handle this.
861
-	 *
862
-	 * @param \OCP\Share\IShare $share
863
-	 * @param string $recipientId
864
-	 */
865
-	public function deleteFromSelf(\OCP\Share\IShare $share, $recipientId) {
866
-		list($providerId, ) = $this->splitFullId($share->getFullId());
867
-		$provider = $this->factory->getProvider($providerId);
868
-
869
-		$provider->deleteFromSelf($share, $recipientId);
870
-	}
871
-
872
-	/**
873
-	 * @inheritdoc
874
-	 */
875
-	public function moveShare(\OCP\Share\IShare $share, $recipientId) {
876
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
877
-			throw new \InvalidArgumentException('Can\'t change target of link share');
878
-		}
879
-
880
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER && $share->getSharedWith() !== $recipientId) {
881
-			throw new \InvalidArgumentException('Invalid recipient');
882
-		}
883
-
884
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
885
-			$sharedWith = $this->groupManager->get($share->getSharedWith());
886
-			if (is_null($sharedWith)) {
887
-				throw new \InvalidArgumentException('Group "' . $share->getSharedWith() . '" does not exist');
888
-			}
889
-			$recipient = $this->userManager->get($recipientId);
890
-			if (!$sharedWith->inGroup($recipient)) {
891
-				throw new \InvalidArgumentException('Invalid recipient');
892
-			}
893
-		}
894
-
895
-		list($providerId, ) = $this->splitFullId($share->getFullId());
896
-		$provider = $this->factory->getProvider($providerId);
897
-
898
-		$provider->move($share, $recipientId);
899
-	}
900
-
901
-	public function getSharesInFolder($userId, Folder $node, $reshares = false) {
902
-		$providers = $this->factory->getAllProviders();
903
-
904
-		return array_reduce($providers, function($shares, IShareProvider $provider) use ($userId, $node, $reshares) {
905
-			$newShares = $provider->getSharesInFolder($userId, $node, $reshares);
906
-			foreach ($newShares as $fid => $data) {
907
-				if (!isset($shares[$fid])) {
908
-					$shares[$fid] = [];
909
-				}
910
-
911
-				$shares[$fid] = array_merge($shares[$fid], $data);
912
-			}
913
-			return $shares;
914
-		}, []);
915
-	}
916
-
917
-	/**
918
-	 * @inheritdoc
919
-	 */
920
-	public function getSharesBy($userId, $shareType, $path = null, $reshares = false, $limit = 50, $offset = 0) {
921
-		if ($path !== null &&
922
-				!($path instanceof \OCP\Files\File) &&
923
-				!($path instanceof \OCP\Files\Folder)) {
924
-			throw new \InvalidArgumentException('invalid path');
925
-		}
926
-
927
-		try {
928
-			$provider = $this->factory->getProviderForType($shareType);
929
-		} catch (ProviderException $e) {
930
-			return [];
931
-		}
932
-
933
-		$shares = $provider->getSharesBy($userId, $shareType, $path, $reshares, $limit, $offset);
934
-
935
-		/*
582
+            $share->setToken(
583
+                $this->secureRandom->generate(
584
+                    \OC\Share\Constants::TOKEN_LENGTH,
585
+                    \OCP\Security\ISecureRandom::CHAR_LOWER.
586
+                    \OCP\Security\ISecureRandom::CHAR_UPPER.
587
+                    \OCP\Security\ISecureRandom::CHAR_DIGITS
588
+                )
589
+            );
590
+
591
+            //Verify the expiration date
592
+            $this->validateExpirationDate($share);
593
+
594
+            //Verify the password
595
+            $this->verifyPassword($share->getPassword());
596
+
597
+            // If a password is set. Hash it!
598
+            if ($share->getPassword() !== null) {
599
+                $share->setPassword($this->hasher->hash($share->getPassword()));
600
+            }
601
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
602
+            $share->setToken(
603
+                $this->secureRandom->generate(
604
+                    \OC\Share\Constants::TOKEN_LENGTH,
605
+                    \OCP\Security\ISecureRandom::CHAR_LOWER.
606
+                    \OCP\Security\ISecureRandom::CHAR_UPPER.
607
+                    \OCP\Security\ISecureRandom::CHAR_DIGITS
608
+                )
609
+            );
610
+        }
611
+
612
+        // Cannot share with the owner
613
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
614
+            $share->getSharedWith() === $share->getShareOwner()) {
615
+            throw new \InvalidArgumentException('Can\'t share with the share owner');
616
+        }
617
+
618
+        // Generate the target
619
+        $target = $this->config->getSystemValue('share_folder', '/') .'/'. $share->getNode()->getName();
620
+        $target = \OC\Files\Filesystem::normalizePath($target);
621
+        $share->setTarget($target);
622
+
623
+        // Pre share hook
624
+        $run = true;
625
+        $error = '';
626
+        $preHookData = [
627
+            'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
628
+            'itemSource' => $share->getNode()->getId(),
629
+            'shareType' => $share->getShareType(),
630
+            'uidOwner' => $share->getSharedBy(),
631
+            'permissions' => $share->getPermissions(),
632
+            'fileSource' => $share->getNode()->getId(),
633
+            'expiration' => $share->getExpirationDate(),
634
+            'token' => $share->getToken(),
635
+            'itemTarget' => $share->getTarget(),
636
+            'shareWith' => $share->getSharedWith(),
637
+            'run' => &$run,
638
+            'error' => &$error,
639
+        ];
640
+        \OC_Hook::emit('OCP\Share', 'pre_shared', $preHookData);
641
+
642
+        if ($run === false) {
643
+            throw new \Exception($error);
644
+        }
645
+
646
+        $oldShare = $share;
647
+        $provider = $this->factory->getProviderForType($share->getShareType());
648
+        $share = $provider->create($share);
649
+        //reuse the node we already have
650
+        $share->setNode($oldShare->getNode());
651
+
652
+        // Post share hook
653
+        $postHookData = [
654
+            'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
655
+            'itemSource' => $share->getNode()->getId(),
656
+            'shareType' => $share->getShareType(),
657
+            'uidOwner' => $share->getSharedBy(),
658
+            'permissions' => $share->getPermissions(),
659
+            'fileSource' => $share->getNode()->getId(),
660
+            'expiration' => $share->getExpirationDate(),
661
+            'token' => $share->getToken(),
662
+            'id' => $share->getId(),
663
+            'shareWith' => $share->getSharedWith(),
664
+            'itemTarget' => $share->getTarget(),
665
+            'fileTarget' => $share->getTarget(),
666
+        ];
667
+
668
+        \OC_Hook::emit('OCP\Share', 'post_shared', $postHookData);
669
+
670
+        return $share;
671
+    }
672
+
673
+    /**
674
+     * Update a share
675
+     *
676
+     * @param \OCP\Share\IShare $share
677
+     * @return \OCP\Share\IShare The share object
678
+     * @throws \InvalidArgumentException
679
+     */
680
+    public function updateShare(\OCP\Share\IShare $share) {
681
+        $expirationDateUpdated = false;
682
+
683
+        $this->canShare($share);
684
+
685
+        try {
686
+            $originalShare = $this->getShareById($share->getFullId());
687
+        } catch (\UnexpectedValueException $e) {
688
+            throw new \InvalidArgumentException('Share does not have a full id');
689
+        }
690
+
691
+        // We can't change the share type!
692
+        if ($share->getShareType() !== $originalShare->getShareType()) {
693
+            throw new \InvalidArgumentException('Can\'t change share type');
694
+        }
695
+
696
+        // We can only change the recipient on user shares
697
+        if ($share->getSharedWith() !== $originalShare->getSharedWith() &&
698
+            $share->getShareType() !== \OCP\Share::SHARE_TYPE_USER) {
699
+            throw new \InvalidArgumentException('Can only update recipient on user shares');
700
+        }
701
+
702
+        // Cannot share with the owner
703
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER &&
704
+            $share->getSharedWith() === $share->getShareOwner()) {
705
+            throw new \InvalidArgumentException('Can\'t share with the share owner');
706
+        }
707
+
708
+        $this->generalCreateChecks($share);
709
+
710
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
711
+            $this->userCreateChecks($share);
712
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
713
+            $this->groupCreateChecks($share);
714
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
715
+            $this->linkCreateChecks($share);
716
+
717
+            // Password updated.
718
+            if ($share->getPassword() !== $originalShare->getPassword()) {
719
+                //Verify the password
720
+                $this->verifyPassword($share->getPassword());
721
+
722
+                // If a password is set. Hash it!
723
+                if ($share->getPassword() !== null) {
724
+                    $share->setPassword($this->hasher->hash($share->getPassword()));
725
+                }
726
+            }
727
+
728
+            if ($share->getExpirationDate() != $originalShare->getExpirationDate()) {
729
+                //Verify the expiration date
730
+                $this->validateExpirationDate($share);
731
+                $expirationDateUpdated = true;
732
+            }
733
+        }
734
+
735
+        $plainTextPassword = null;
736
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK || $share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
737
+            // Password updated.
738
+            if ($share->getPassword() !== $originalShare->getPassword()) {
739
+                //Verify the password
740
+                $this->verifyPassword($share->getPassword());
741
+
742
+                // If a password is set. Hash it!
743
+                if ($share->getPassword() !== null) {
744
+                    $plainTextPassword = $share->getPassword();
745
+                    $share->setPassword($this->hasher->hash($plainTextPassword));
746
+                }
747
+            }
748
+        }
749
+
750
+        $this->pathCreateChecks($share->getNode());
751
+
752
+        // Now update the share!
753
+        $provider = $this->factory->getProviderForType($share->getShareType());
754
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_EMAIL) {
755
+            $share = $provider->update($share, $plainTextPassword);
756
+        } else {
757
+            $share = $provider->update($share);
758
+        }
759
+
760
+        if ($expirationDateUpdated === true) {
761
+            \OC_Hook::emit('OCP\Share', 'post_set_expiration_date', [
762
+                'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
763
+                'itemSource' => $share->getNode()->getId(),
764
+                'date' => $share->getExpirationDate(),
765
+                'uidOwner' => $share->getSharedBy(),
766
+            ]);
767
+        }
768
+
769
+        if ($share->getPassword() !== $originalShare->getPassword()) {
770
+            \OC_Hook::emit('OCP\Share', 'post_update_password', [
771
+                'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
772
+                'itemSource' => $share->getNode()->getId(),
773
+                'uidOwner' => $share->getSharedBy(),
774
+                'token' => $share->getToken(),
775
+                'disabled' => is_null($share->getPassword()),
776
+            ]);
777
+        }
778
+
779
+        if ($share->getPermissions() !== $originalShare->getPermissions()) {
780
+            if ($this->userManager->userExists($share->getShareOwner())) {
781
+                $userFolder = $this->rootFolder->getUserFolder($share->getShareOwner());
782
+            } else {
783
+                $userFolder = $this->rootFolder->getUserFolder($share->getSharedBy());
784
+            }
785
+            \OC_Hook::emit('OCP\Share', 'post_update_permissions', array(
786
+                'itemType' => $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder',
787
+                'itemSource' => $share->getNode()->getId(),
788
+                'shareType' => $share->getShareType(),
789
+                'shareWith' => $share->getSharedWith(),
790
+                'uidOwner' => $share->getSharedBy(),
791
+                'permissions' => $share->getPermissions(),
792
+                'path' => $userFolder->getRelativePath($share->getNode()->getPath()),
793
+            ));
794
+        }
795
+
796
+        return $share;
797
+    }
798
+
799
+    /**
800
+     * Delete all the children of this share
801
+     * FIXME: remove once https://github.com/owncloud/core/pull/21660 is in
802
+     *
803
+     * @param \OCP\Share\IShare $share
804
+     * @return \OCP\Share\IShare[] List of deleted shares
805
+     */
806
+    protected function deleteChildren(\OCP\Share\IShare $share) {
807
+        $deletedShares = [];
808
+
809
+        $provider = $this->factory->getProviderForType($share->getShareType());
810
+
811
+        foreach ($provider->getChildren($share) as $child) {
812
+            $deletedChildren = $this->deleteChildren($child);
813
+            $deletedShares = array_merge($deletedShares, $deletedChildren);
814
+
815
+            $provider->delete($child);
816
+            $deletedShares[] = $child;
817
+        }
818
+
819
+        return $deletedShares;
820
+    }
821
+
822
+    /**
823
+     * Delete a share
824
+     *
825
+     * @param \OCP\Share\IShare $share
826
+     * @throws ShareNotFound
827
+     * @throws \InvalidArgumentException
828
+     */
829
+    public function deleteShare(\OCP\Share\IShare $share) {
830
+
831
+        try {
832
+            $share->getFullId();
833
+        } catch (\UnexpectedValueException $e) {
834
+            throw new \InvalidArgumentException('Share does not have a full id');
835
+        }
836
+
837
+        $event = new GenericEvent($share);
838
+        $this->eventDispatcher->dispatch('OCP\Share::preUnshare', $event);
839
+
840
+        // Get all children and delete them as well
841
+        $deletedShares = $this->deleteChildren($share);
842
+
843
+        // Do the actual delete
844
+        $provider = $this->factory->getProviderForType($share->getShareType());
845
+        $provider->delete($share);
846
+
847
+        // All the deleted shares caused by this delete
848
+        $deletedShares[] = $share;
849
+
850
+        // Emit post hook
851
+        $event->setArgument('deletedShares', $deletedShares);
852
+        $this->eventDispatcher->dispatch('OCP\Share::postUnshare', $event);
853
+    }
854
+
855
+
856
+    /**
857
+     * Unshare a file as the recipient.
858
+     * This can be different from a regular delete for example when one of
859
+     * the users in a groups deletes that share. But the provider should
860
+     * handle this.
861
+     *
862
+     * @param \OCP\Share\IShare $share
863
+     * @param string $recipientId
864
+     */
865
+    public function deleteFromSelf(\OCP\Share\IShare $share, $recipientId) {
866
+        list($providerId, ) = $this->splitFullId($share->getFullId());
867
+        $provider = $this->factory->getProvider($providerId);
868
+
869
+        $provider->deleteFromSelf($share, $recipientId);
870
+    }
871
+
872
+    /**
873
+     * @inheritdoc
874
+     */
875
+    public function moveShare(\OCP\Share\IShare $share, $recipientId) {
876
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
877
+            throw new \InvalidArgumentException('Can\'t change target of link share');
878
+        }
879
+
880
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER && $share->getSharedWith() !== $recipientId) {
881
+            throw new \InvalidArgumentException('Invalid recipient');
882
+        }
883
+
884
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
885
+            $sharedWith = $this->groupManager->get($share->getSharedWith());
886
+            if (is_null($sharedWith)) {
887
+                throw new \InvalidArgumentException('Group "' . $share->getSharedWith() . '" does not exist');
888
+            }
889
+            $recipient = $this->userManager->get($recipientId);
890
+            if (!$sharedWith->inGroup($recipient)) {
891
+                throw new \InvalidArgumentException('Invalid recipient');
892
+            }
893
+        }
894
+
895
+        list($providerId, ) = $this->splitFullId($share->getFullId());
896
+        $provider = $this->factory->getProvider($providerId);
897
+
898
+        $provider->move($share, $recipientId);
899
+    }
900
+
901
+    public function getSharesInFolder($userId, Folder $node, $reshares = false) {
902
+        $providers = $this->factory->getAllProviders();
903
+
904
+        return array_reduce($providers, function($shares, IShareProvider $provider) use ($userId, $node, $reshares) {
905
+            $newShares = $provider->getSharesInFolder($userId, $node, $reshares);
906
+            foreach ($newShares as $fid => $data) {
907
+                if (!isset($shares[$fid])) {
908
+                    $shares[$fid] = [];
909
+                }
910
+
911
+                $shares[$fid] = array_merge($shares[$fid], $data);
912
+            }
913
+            return $shares;
914
+        }, []);
915
+    }
916
+
917
+    /**
918
+     * @inheritdoc
919
+     */
920
+    public function getSharesBy($userId, $shareType, $path = null, $reshares = false, $limit = 50, $offset = 0) {
921
+        if ($path !== null &&
922
+                !($path instanceof \OCP\Files\File) &&
923
+                !($path instanceof \OCP\Files\Folder)) {
924
+            throw new \InvalidArgumentException('invalid path');
925
+        }
926
+
927
+        try {
928
+            $provider = $this->factory->getProviderForType($shareType);
929
+        } catch (ProviderException $e) {
930
+            return [];
931
+        }
932
+
933
+        $shares = $provider->getSharesBy($userId, $shareType, $path, $reshares, $limit, $offset);
934
+
935
+        /*
936 936
 		 * Work around so we don't return expired shares but still follow
937 937
 		 * proper pagination.
938 938
 		 */
939 939
 
940
-		$shares2 = [];
941
-
942
-		while(true) {
943
-			$added = 0;
944
-			foreach ($shares as $share) {
945
-
946
-				try {
947
-					$this->checkExpireDate($share);
948
-				} catch (ShareNotFound $e) {
949
-					//Ignore since this basically means the share is deleted
950
-					continue;
951
-				}
952
-
953
-				$added++;
954
-				$shares2[] = $share;
955
-
956
-				if (count($shares2) === $limit) {
957
-					break;
958
-				}
959
-			}
960
-
961
-			if (count($shares2) === $limit) {
962
-				break;
963
-			}
964
-
965
-			// If there was no limit on the select we are done
966
-			if ($limit === -1) {
967
-				break;
968
-			}
969
-
970
-			$offset += $added;
971
-
972
-			// Fetch again $limit shares
973
-			$shares = $provider->getSharesBy($userId, $shareType, $path, $reshares, $limit, $offset);
974
-
975
-			// No more shares means we are done
976
-			if (empty($shares)) {
977
-				break;
978
-			}
979
-		}
980
-
981
-		$shares = $shares2;
982
-
983
-		return $shares;
984
-	}
985
-
986
-	/**
987
-	 * @inheritdoc
988
-	 */
989
-	public function getSharedWith($userId, $shareType, $node = null, $limit = 50, $offset = 0) {
990
-		try {
991
-			$provider = $this->factory->getProviderForType($shareType);
992
-		} catch (ProviderException $e) {
993
-			return [];
994
-		}
995
-
996
-		$shares = $provider->getSharedWith($userId, $shareType, $node, $limit, $offset);
997
-
998
-		// remove all shares which are already expired
999
-		foreach ($shares as $key => $share) {
1000
-			try {
1001
-				$this->checkExpireDate($share);
1002
-			} catch (ShareNotFound $e) {
1003
-				unset($shares[$key]);
1004
-			}
1005
-		}
1006
-
1007
-		return $shares;
1008
-	}
1009
-
1010
-	/**
1011
-	 * @inheritdoc
1012
-	 */
1013
-	public function getShareById($id, $recipient = null) {
1014
-		if ($id === null) {
1015
-			throw new ShareNotFound();
1016
-		}
1017
-
1018
-		list($providerId, $id) = $this->splitFullId($id);
1019
-
1020
-		try {
1021
-			$provider = $this->factory->getProvider($providerId);
1022
-		} catch (ProviderException $e) {
1023
-			throw new ShareNotFound();
1024
-		}
1025
-
1026
-		$share = $provider->getShareById($id, $recipient);
1027
-
1028
-		$this->checkExpireDate($share);
1029
-
1030
-		return $share;
1031
-	}
1032
-
1033
-	/**
1034
-	 * Get all the shares for a given path
1035
-	 *
1036
-	 * @param \OCP\Files\Node $path
1037
-	 * @param int $page
1038
-	 * @param int $perPage
1039
-	 *
1040
-	 * @return Share[]
1041
-	 */
1042
-	public function getSharesByPath(\OCP\Files\Node $path, $page=0, $perPage=50) {
1043
-		return [];
1044
-	}
1045
-
1046
-	/**
1047
-	 * Get the share by token possible with password
1048
-	 *
1049
-	 * @param string $token
1050
-	 * @return Share
1051
-	 *
1052
-	 * @throws ShareNotFound
1053
-	 */
1054
-	public function getShareByToken($token) {
1055
-		$share = null;
1056
-		try {
1057
-			if($this->shareApiAllowLinks()) {
1058
-				$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_LINK);
1059
-				$share = $provider->getShareByToken($token);
1060
-			}
1061
-		} catch (ProviderException $e) {
1062
-		} catch (ShareNotFound $e) {
1063
-		}
1064
-
1065
-
1066
-		// If it is not a link share try to fetch a federated share by token
1067
-		if ($share === null) {
1068
-			try {
1069
-				$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_REMOTE);
1070
-				$share = $provider->getShareByToken($token);
1071
-			} catch (ProviderException $e) {
1072
-			} catch (ShareNotFound $e) {
1073
-			}
1074
-		}
1075
-
1076
-		// If it is not a link share try to fetch a mail share by token
1077
-		if ($share === null && $this->shareProviderExists(\OCP\Share::SHARE_TYPE_EMAIL)) {
1078
-			try {
1079
-				$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_EMAIL);
1080
-				$share = $provider->getShareByToken($token);
1081
-			} catch (ProviderException $e) {
1082
-			} catch (ShareNotFound $e) {
1083
-			}
1084
-		}
1085
-
1086
-		if ($share === null) {
1087
-			throw new ShareNotFound();
1088
-		}
1089
-
1090
-		$this->checkExpireDate($share);
1091
-
1092
-		/*
940
+        $shares2 = [];
941
+
942
+        while(true) {
943
+            $added = 0;
944
+            foreach ($shares as $share) {
945
+
946
+                try {
947
+                    $this->checkExpireDate($share);
948
+                } catch (ShareNotFound $e) {
949
+                    //Ignore since this basically means the share is deleted
950
+                    continue;
951
+                }
952
+
953
+                $added++;
954
+                $shares2[] = $share;
955
+
956
+                if (count($shares2) === $limit) {
957
+                    break;
958
+                }
959
+            }
960
+
961
+            if (count($shares2) === $limit) {
962
+                break;
963
+            }
964
+
965
+            // If there was no limit on the select we are done
966
+            if ($limit === -1) {
967
+                break;
968
+            }
969
+
970
+            $offset += $added;
971
+
972
+            // Fetch again $limit shares
973
+            $shares = $provider->getSharesBy($userId, $shareType, $path, $reshares, $limit, $offset);
974
+
975
+            // No more shares means we are done
976
+            if (empty($shares)) {
977
+                break;
978
+            }
979
+        }
980
+
981
+        $shares = $shares2;
982
+
983
+        return $shares;
984
+    }
985
+
986
+    /**
987
+     * @inheritdoc
988
+     */
989
+    public function getSharedWith($userId, $shareType, $node = null, $limit = 50, $offset = 0) {
990
+        try {
991
+            $provider = $this->factory->getProviderForType($shareType);
992
+        } catch (ProviderException $e) {
993
+            return [];
994
+        }
995
+
996
+        $shares = $provider->getSharedWith($userId, $shareType, $node, $limit, $offset);
997
+
998
+        // remove all shares which are already expired
999
+        foreach ($shares as $key => $share) {
1000
+            try {
1001
+                $this->checkExpireDate($share);
1002
+            } catch (ShareNotFound $e) {
1003
+                unset($shares[$key]);
1004
+            }
1005
+        }
1006
+
1007
+        return $shares;
1008
+    }
1009
+
1010
+    /**
1011
+     * @inheritdoc
1012
+     */
1013
+    public function getShareById($id, $recipient = null) {
1014
+        if ($id === null) {
1015
+            throw new ShareNotFound();
1016
+        }
1017
+
1018
+        list($providerId, $id) = $this->splitFullId($id);
1019
+
1020
+        try {
1021
+            $provider = $this->factory->getProvider($providerId);
1022
+        } catch (ProviderException $e) {
1023
+            throw new ShareNotFound();
1024
+        }
1025
+
1026
+        $share = $provider->getShareById($id, $recipient);
1027
+
1028
+        $this->checkExpireDate($share);
1029
+
1030
+        return $share;
1031
+    }
1032
+
1033
+    /**
1034
+     * Get all the shares for a given path
1035
+     *
1036
+     * @param \OCP\Files\Node $path
1037
+     * @param int $page
1038
+     * @param int $perPage
1039
+     *
1040
+     * @return Share[]
1041
+     */
1042
+    public function getSharesByPath(\OCP\Files\Node $path, $page=0, $perPage=50) {
1043
+        return [];
1044
+    }
1045
+
1046
+    /**
1047
+     * Get the share by token possible with password
1048
+     *
1049
+     * @param string $token
1050
+     * @return Share
1051
+     *
1052
+     * @throws ShareNotFound
1053
+     */
1054
+    public function getShareByToken($token) {
1055
+        $share = null;
1056
+        try {
1057
+            if($this->shareApiAllowLinks()) {
1058
+                $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_LINK);
1059
+                $share = $provider->getShareByToken($token);
1060
+            }
1061
+        } catch (ProviderException $e) {
1062
+        } catch (ShareNotFound $e) {
1063
+        }
1064
+
1065
+
1066
+        // If it is not a link share try to fetch a federated share by token
1067
+        if ($share === null) {
1068
+            try {
1069
+                $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_REMOTE);
1070
+                $share = $provider->getShareByToken($token);
1071
+            } catch (ProviderException $e) {
1072
+            } catch (ShareNotFound $e) {
1073
+            }
1074
+        }
1075
+
1076
+        // If it is not a link share try to fetch a mail share by token
1077
+        if ($share === null && $this->shareProviderExists(\OCP\Share::SHARE_TYPE_EMAIL)) {
1078
+            try {
1079
+                $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_EMAIL);
1080
+                $share = $provider->getShareByToken($token);
1081
+            } catch (ProviderException $e) {
1082
+            } catch (ShareNotFound $e) {
1083
+            }
1084
+        }
1085
+
1086
+        if ($share === null) {
1087
+            throw new ShareNotFound();
1088
+        }
1089
+
1090
+        $this->checkExpireDate($share);
1091
+
1092
+        /*
1093 1093
 		 * Reduce the permissions for link shares if public upload is not enabled
1094 1094
 		 */
1095
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK &&
1096
-			!$this->shareApiLinkAllowPublicUpload()) {
1097
-			$share->setPermissions($share->getPermissions() & ~(\OCP\Constants::PERMISSION_CREATE | \OCP\Constants::PERMISSION_UPDATE));
1098
-		}
1099
-
1100
-		return $share;
1101
-	}
1102
-
1103
-	protected function checkExpireDate($share) {
1104
-		if ($share->getExpirationDate() !== null &&
1105
-			$share->getExpirationDate() <= new \DateTime()) {
1106
-			$this->deleteShare($share);
1107
-			throw new ShareNotFound();
1108
-		}
1109
-
1110
-	}
1111
-
1112
-	/**
1113
-	 * Verify the password of a public share
1114
-	 *
1115
-	 * @param \OCP\Share\IShare $share
1116
-	 * @param string $password
1117
-	 * @return bool
1118
-	 */
1119
-	public function checkPassword(\OCP\Share\IShare $share, $password) {
1120
-		$passwordProtected = $share->getShareType() !== \OCP\Share::SHARE_TYPE_LINK
1121
-			|| $share->getShareType() !== \OCP\Share::SHARE_TYPE_EMAIL;
1122
-		if (!$passwordProtected) {
1123
-			//TODO maybe exception?
1124
-			return false;
1125
-		}
1126
-
1127
-		if ($password === null || $share->getPassword() === null) {
1128
-			return false;
1129
-		}
1130
-
1131
-		$newHash = '';
1132
-		if (!$this->hasher->verify($password, $share->getPassword(), $newHash)) {
1133
-			return false;
1134
-		}
1135
-
1136
-		if (!empty($newHash)) {
1137
-			$share->setPassword($newHash);
1138
-			$provider = $this->factory->getProviderForType($share->getShareType());
1139
-			$provider->update($share);
1140
-		}
1141
-
1142
-		return true;
1143
-	}
1144
-
1145
-	/**
1146
-	 * @inheritdoc
1147
-	 */
1148
-	public function userDeleted($uid) {
1149
-		$types = [\OCP\Share::SHARE_TYPE_USER, \OCP\Share::SHARE_TYPE_GROUP, \OCP\Share::SHARE_TYPE_LINK, \OCP\Share::SHARE_TYPE_REMOTE, \OCP\Share::SHARE_TYPE_EMAIL];
1150
-
1151
-		foreach ($types as $type) {
1152
-			try {
1153
-				$provider = $this->factory->getProviderForType($type);
1154
-			} catch (ProviderException $e) {
1155
-				continue;
1156
-			}
1157
-			$provider->userDeleted($uid, $type);
1158
-		}
1159
-	}
1160
-
1161
-	/**
1162
-	 * @inheritdoc
1163
-	 */
1164
-	public function groupDeleted($gid) {
1165
-		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
1166
-		$provider->groupDeleted($gid);
1167
-	}
1168
-
1169
-	/**
1170
-	 * @inheritdoc
1171
-	 */
1172
-	public function userDeletedFromGroup($uid, $gid) {
1173
-		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
1174
-		$provider->userDeletedFromGroup($uid, $gid);
1175
-	}
1176
-
1177
-	/**
1178
-	 * Get access list to a path. This means
1179
-	 * all the users and groups that can access a given path.
1180
-	 *
1181
-	 * Consider:
1182
-	 * -root
1183
-	 * |-folder1
1184
-	 *  |-folder2
1185
-	 *   |-fileA
1186
-	 *
1187
-	 * fileA is shared with user1
1188
-	 * folder2 is shared with group2
1189
-	 * folder1 is shared with user2
1190
-	 *
1191
-	 * Then the access list will to '/folder1/folder2/fileA' is:
1192
-	 * [
1193
-	 * 	'users' => ['user1', 'user2'],
1194
-	 *  'groups' => ['group2']
1195
-	 * ]
1196
-	 *
1197
-	 * This is required for encryption
1198
-	 *
1199
-	 * @param \OCP\Files\Node $path
1200
-	 */
1201
-	public function getAccessList(\OCP\Files\Node $path) {
1202
-	}
1203
-
1204
-	/**
1205
-	 * Create a new share
1206
-	 * @return \OCP\Share\IShare;
1207
-	 */
1208
-	public function newShare() {
1209
-		return new \OC\Share20\Share($this->rootFolder, $this->userManager);
1210
-	}
1211
-
1212
-	/**
1213
-	 * Is the share API enabled
1214
-	 *
1215
-	 * @return bool
1216
-	 */
1217
-	public function shareApiEnabled() {
1218
-		return $this->config->getAppValue('core', 'shareapi_enabled', 'yes') === 'yes';
1219
-	}
1220
-
1221
-	/**
1222
-	 * Is public link sharing enabled
1223
-	 *
1224
-	 * @return bool
1225
-	 */
1226
-	public function shareApiAllowLinks() {
1227
-		return $this->config->getAppValue('core', 'shareapi_allow_links', 'yes') === 'yes';
1228
-	}
1229
-
1230
-	/**
1231
-	 * Is password on public link requires
1232
-	 *
1233
-	 * @return bool
1234
-	 */
1235
-	public function shareApiLinkEnforcePassword() {
1236
-		return $this->config->getAppValue('core', 'shareapi_enforce_links_password', 'no') === 'yes';
1237
-	}
1238
-
1239
-	/**
1240
-	 * Is default expire date enabled
1241
-	 *
1242
-	 * @return bool
1243
-	 */
1244
-	public function shareApiLinkDefaultExpireDate() {
1245
-		return $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
1246
-	}
1247
-
1248
-	/**
1249
-	 * Is default expire date enforced
1250
-	 *`
1251
-	 * @return bool
1252
-	 */
1253
-	public function shareApiLinkDefaultExpireDateEnforced() {
1254
-		return $this->shareApiLinkDefaultExpireDate() &&
1255
-			$this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
1256
-	}
1257
-
1258
-	/**
1259
-	 * Number of default expire days
1260
-	 *shareApiLinkAllowPublicUpload
1261
-	 * @return int
1262
-	 */
1263
-	public function shareApiLinkDefaultExpireDays() {
1264
-		return (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
1265
-	}
1266
-
1267
-	/**
1268
-	 * Allow public upload on link shares
1269
-	 *
1270
-	 * @return bool
1271
-	 */
1272
-	public function shareApiLinkAllowPublicUpload() {
1273
-		return $this->config->getAppValue('core', 'shareapi_allow_public_upload', 'yes') === 'yes';
1274
-	}
1275
-
1276
-	/**
1277
-	 * check if user can only share with group members
1278
-	 * @return bool
1279
-	 */
1280
-	public function shareWithGroupMembersOnly() {
1281
-		return $this->config->getAppValue('core', 'shareapi_only_share_with_group_members', 'no') === 'yes';
1282
-	}
1283
-
1284
-	/**
1285
-	 * Check if users can share with groups
1286
-	 * @return bool
1287
-	 */
1288
-	public function allowGroupSharing() {
1289
-		return $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
1290
-	}
1291
-
1292
-	/**
1293
-	 * Copied from \OC_Util::isSharingDisabledForUser
1294
-	 *
1295
-	 * TODO: Deprecate fuction from OC_Util
1296
-	 *
1297
-	 * @param string $userId
1298
-	 * @return bool
1299
-	 */
1300
-	public function sharingDisabledForUser($userId) {
1301
-		if ($userId === null) {
1302
-			return false;
1303
-		}
1304
-
1305
-		if (isset($this->sharingDisabledForUsersCache[$userId])) {
1306
-			return $this->sharingDisabledForUsersCache[$userId];
1307
-		}
1308
-
1309
-		if ($this->config->getAppValue('core', 'shareapi_exclude_groups', 'no') === 'yes') {
1310
-			$groupsList = $this->config->getAppValue('core', 'shareapi_exclude_groups_list', '');
1311
-			$excludedGroups = json_decode($groupsList);
1312
-			if (is_null($excludedGroups)) {
1313
-				$excludedGroups = explode(',', $groupsList);
1314
-				$newValue = json_encode($excludedGroups);
1315
-				$this->config->setAppValue('core', 'shareapi_exclude_groups_list', $newValue);
1316
-			}
1317
-			$user = $this->userManager->get($userId);
1318
-			$usersGroups = $this->groupManager->getUserGroupIds($user);
1319
-			if (!empty($usersGroups)) {
1320
-				$remainingGroups = array_diff($usersGroups, $excludedGroups);
1321
-				// if the user is only in groups which are disabled for sharing then
1322
-				// sharing is also disabled for the user
1323
-				if (empty($remainingGroups)) {
1324
-					$this->sharingDisabledForUsersCache[$userId] = true;
1325
-					return true;
1326
-				}
1327
-			}
1328
-		}
1329
-
1330
-		$this->sharingDisabledForUsersCache[$userId] = false;
1331
-		return false;
1332
-	}
1333
-
1334
-	/**
1335
-	 * @inheritdoc
1336
-	 */
1337
-	public function outgoingServer2ServerSharesAllowed() {
1338
-		return $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes';
1339
-	}
1340
-
1341
-	/**
1342
-	 * @inheritdoc
1343
-	 */
1344
-	public function shareProviderExists($shareType) {
1345
-		try {
1346
-			$this->factory->getProviderForType($shareType);
1347
-		} catch (ProviderException $e) {
1348
-			return false;
1349
-		}
1350
-
1351
-		return true;
1352
-	}
1095
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK &&
1096
+            !$this->shareApiLinkAllowPublicUpload()) {
1097
+            $share->setPermissions($share->getPermissions() & ~(\OCP\Constants::PERMISSION_CREATE | \OCP\Constants::PERMISSION_UPDATE));
1098
+        }
1099
+
1100
+        return $share;
1101
+    }
1102
+
1103
+    protected function checkExpireDate($share) {
1104
+        if ($share->getExpirationDate() !== null &&
1105
+            $share->getExpirationDate() <= new \DateTime()) {
1106
+            $this->deleteShare($share);
1107
+            throw new ShareNotFound();
1108
+        }
1109
+
1110
+    }
1111
+
1112
+    /**
1113
+     * Verify the password of a public share
1114
+     *
1115
+     * @param \OCP\Share\IShare $share
1116
+     * @param string $password
1117
+     * @return bool
1118
+     */
1119
+    public function checkPassword(\OCP\Share\IShare $share, $password) {
1120
+        $passwordProtected = $share->getShareType() !== \OCP\Share::SHARE_TYPE_LINK
1121
+            || $share->getShareType() !== \OCP\Share::SHARE_TYPE_EMAIL;
1122
+        if (!$passwordProtected) {
1123
+            //TODO maybe exception?
1124
+            return false;
1125
+        }
1126
+
1127
+        if ($password === null || $share->getPassword() === null) {
1128
+            return false;
1129
+        }
1130
+
1131
+        $newHash = '';
1132
+        if (!$this->hasher->verify($password, $share->getPassword(), $newHash)) {
1133
+            return false;
1134
+        }
1135
+
1136
+        if (!empty($newHash)) {
1137
+            $share->setPassword($newHash);
1138
+            $provider = $this->factory->getProviderForType($share->getShareType());
1139
+            $provider->update($share);
1140
+        }
1141
+
1142
+        return true;
1143
+    }
1144
+
1145
+    /**
1146
+     * @inheritdoc
1147
+     */
1148
+    public function userDeleted($uid) {
1149
+        $types = [\OCP\Share::SHARE_TYPE_USER, \OCP\Share::SHARE_TYPE_GROUP, \OCP\Share::SHARE_TYPE_LINK, \OCP\Share::SHARE_TYPE_REMOTE, \OCP\Share::SHARE_TYPE_EMAIL];
1150
+
1151
+        foreach ($types as $type) {
1152
+            try {
1153
+                $provider = $this->factory->getProviderForType($type);
1154
+            } catch (ProviderException $e) {
1155
+                continue;
1156
+            }
1157
+            $provider->userDeleted($uid, $type);
1158
+        }
1159
+    }
1160
+
1161
+    /**
1162
+     * @inheritdoc
1163
+     */
1164
+    public function groupDeleted($gid) {
1165
+        $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
1166
+        $provider->groupDeleted($gid);
1167
+    }
1168
+
1169
+    /**
1170
+     * @inheritdoc
1171
+     */
1172
+    public function userDeletedFromGroup($uid, $gid) {
1173
+        $provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
1174
+        $provider->userDeletedFromGroup($uid, $gid);
1175
+    }
1176
+
1177
+    /**
1178
+     * Get access list to a path. This means
1179
+     * all the users and groups that can access a given path.
1180
+     *
1181
+     * Consider:
1182
+     * -root
1183
+     * |-folder1
1184
+     *  |-folder2
1185
+     *   |-fileA
1186
+     *
1187
+     * fileA is shared with user1
1188
+     * folder2 is shared with group2
1189
+     * folder1 is shared with user2
1190
+     *
1191
+     * Then the access list will to '/folder1/folder2/fileA' is:
1192
+     * [
1193
+     * 	'users' => ['user1', 'user2'],
1194
+     *  'groups' => ['group2']
1195
+     * ]
1196
+     *
1197
+     * This is required for encryption
1198
+     *
1199
+     * @param \OCP\Files\Node $path
1200
+     */
1201
+    public function getAccessList(\OCP\Files\Node $path) {
1202
+    }
1203
+
1204
+    /**
1205
+     * Create a new share
1206
+     * @return \OCP\Share\IShare;
1207
+     */
1208
+    public function newShare() {
1209
+        return new \OC\Share20\Share($this->rootFolder, $this->userManager);
1210
+    }
1211
+
1212
+    /**
1213
+     * Is the share API enabled
1214
+     *
1215
+     * @return bool
1216
+     */
1217
+    public function shareApiEnabled() {
1218
+        return $this->config->getAppValue('core', 'shareapi_enabled', 'yes') === 'yes';
1219
+    }
1220
+
1221
+    /**
1222
+     * Is public link sharing enabled
1223
+     *
1224
+     * @return bool
1225
+     */
1226
+    public function shareApiAllowLinks() {
1227
+        return $this->config->getAppValue('core', 'shareapi_allow_links', 'yes') === 'yes';
1228
+    }
1229
+
1230
+    /**
1231
+     * Is password on public link requires
1232
+     *
1233
+     * @return bool
1234
+     */
1235
+    public function shareApiLinkEnforcePassword() {
1236
+        return $this->config->getAppValue('core', 'shareapi_enforce_links_password', 'no') === 'yes';
1237
+    }
1238
+
1239
+    /**
1240
+     * Is default expire date enabled
1241
+     *
1242
+     * @return bool
1243
+     */
1244
+    public function shareApiLinkDefaultExpireDate() {
1245
+        return $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
1246
+    }
1247
+
1248
+    /**
1249
+     * Is default expire date enforced
1250
+     *`
1251
+     * @return bool
1252
+     */
1253
+    public function shareApiLinkDefaultExpireDateEnforced() {
1254
+        return $this->shareApiLinkDefaultExpireDate() &&
1255
+            $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
1256
+    }
1257
+
1258
+    /**
1259
+     * Number of default expire days
1260
+     *shareApiLinkAllowPublicUpload
1261
+     * @return int
1262
+     */
1263
+    public function shareApiLinkDefaultExpireDays() {
1264
+        return (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
1265
+    }
1266
+
1267
+    /**
1268
+     * Allow public upload on link shares
1269
+     *
1270
+     * @return bool
1271
+     */
1272
+    public function shareApiLinkAllowPublicUpload() {
1273
+        return $this->config->getAppValue('core', 'shareapi_allow_public_upload', 'yes') === 'yes';
1274
+    }
1275
+
1276
+    /**
1277
+     * check if user can only share with group members
1278
+     * @return bool
1279
+     */
1280
+    public function shareWithGroupMembersOnly() {
1281
+        return $this->config->getAppValue('core', 'shareapi_only_share_with_group_members', 'no') === 'yes';
1282
+    }
1283
+
1284
+    /**
1285
+     * Check if users can share with groups
1286
+     * @return bool
1287
+     */
1288
+    public function allowGroupSharing() {
1289
+        return $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
1290
+    }
1291
+
1292
+    /**
1293
+     * Copied from \OC_Util::isSharingDisabledForUser
1294
+     *
1295
+     * TODO: Deprecate fuction from OC_Util
1296
+     *
1297
+     * @param string $userId
1298
+     * @return bool
1299
+     */
1300
+    public function sharingDisabledForUser($userId) {
1301
+        if ($userId === null) {
1302
+            return false;
1303
+        }
1304
+
1305
+        if (isset($this->sharingDisabledForUsersCache[$userId])) {
1306
+            return $this->sharingDisabledForUsersCache[$userId];
1307
+        }
1308
+
1309
+        if ($this->config->getAppValue('core', 'shareapi_exclude_groups', 'no') === 'yes') {
1310
+            $groupsList = $this->config->getAppValue('core', 'shareapi_exclude_groups_list', '');
1311
+            $excludedGroups = json_decode($groupsList);
1312
+            if (is_null($excludedGroups)) {
1313
+                $excludedGroups = explode(',', $groupsList);
1314
+                $newValue = json_encode($excludedGroups);
1315
+                $this->config->setAppValue('core', 'shareapi_exclude_groups_list', $newValue);
1316
+            }
1317
+            $user = $this->userManager->get($userId);
1318
+            $usersGroups = $this->groupManager->getUserGroupIds($user);
1319
+            if (!empty($usersGroups)) {
1320
+                $remainingGroups = array_diff($usersGroups, $excludedGroups);
1321
+                // if the user is only in groups which are disabled for sharing then
1322
+                // sharing is also disabled for the user
1323
+                if (empty($remainingGroups)) {
1324
+                    $this->sharingDisabledForUsersCache[$userId] = true;
1325
+                    return true;
1326
+                }
1327
+            }
1328
+        }
1329
+
1330
+        $this->sharingDisabledForUsersCache[$userId] = false;
1331
+        return false;
1332
+    }
1333
+
1334
+    /**
1335
+     * @inheritdoc
1336
+     */
1337
+    public function outgoingServer2ServerSharesAllowed() {
1338
+        return $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes';
1339
+    }
1340
+
1341
+    /**
1342
+     * @inheritdoc
1343
+     */
1344
+    public function shareProviderExists($shareType) {
1345
+        try {
1346
+            $this->factory->getProviderForType($shareType);
1347
+        } catch (ProviderException $e) {
1348
+            return false;
1349
+        }
1350
+
1351
+        return true;
1352
+    }
1353 1353
 
1354 1354
 }
Please login to merge, or discard this patch.
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -320,7 +320,7 @@  discard block
 block discarded – undo
320 320
 
321 321
 		if ($fullId === null && $expirationDate === null && $this->shareApiLinkDefaultExpireDate()) {
322 322
 			$expirationDate = new \DateTime();
323
-			$expirationDate->setTime(0,0,0);
323
+			$expirationDate->setTime(0, 0, 0);
324 324
 			$expirationDate->add(new \DateInterval('P'.$this->shareApiLinkDefaultExpireDays().'D'));
325 325
 		}
326 326
 
@@ -332,7 +332,7 @@  discard block
 block discarded – undo
332 332
 
333 333
 			$date = new \DateTime();
334 334
 			$date->setTime(0, 0, 0);
335
-			$date->add(new \DateInterval('P' . $this->shareApiLinkDefaultExpireDays() . 'D'));
335
+			$date->add(new \DateInterval('P'.$this->shareApiLinkDefaultExpireDays().'D'));
336 336
 			if ($date < $expirationDate) {
337 337
 				$message = $this->l->t('Cannot set expiration date more than %s days in the future', [$this->shareApiLinkDefaultExpireDays()]);
338 338
 				throw new GenericShareException($message, $message, 404);
@@ -385,7 +385,7 @@  discard block
 block discarded – undo
385 385
 		 */
386 386
 		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_USER);
387 387
 		$existingShares = $provider->getSharesByPath($share->getNode());
388
-		foreach($existingShares as $existingShare) {
388
+		foreach ($existingShares as $existingShare) {
389 389
 			// Ignore if it is the same share
390 390
 			try {
391 391
 				if ($existingShare->getFullId() === $share->getFullId()) {
@@ -442,7 +442,7 @@  discard block
 block discarded – undo
442 442
 		 */
443 443
 		$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_GROUP);
444 444
 		$existingShares = $provider->getSharesByPath($share->getNode());
445
-		foreach($existingShares as $existingShare) {
445
+		foreach ($existingShares as $existingShare) {
446 446
 			try {
447 447
 				if ($existingShare->getFullId() === $share->getFullId()) {
448 448
 					continue;
@@ -511,7 +511,7 @@  discard block
 block discarded – undo
511 511
 		// Make sure that we do not share a path that contains a shared mountpoint
512 512
 		if ($path instanceof \OCP\Files\Folder) {
513 513
 			$mounts = $this->mountManager->findIn($path->getPath());
514
-			foreach($mounts as $mount) {
514
+			foreach ($mounts as $mount) {
515 515
 				if ($mount->getStorage()->instanceOfStorage('\OCA\Files_Sharing\ISharedStorage')) {
516 516
 					throw new \InvalidArgumentException('Path contains files shared with you');
517 517
 				}
@@ -559,7 +559,7 @@  discard block
 block discarded – undo
559 559
 		$storage = $share->getNode()->getStorage();
560 560
 		if ($storage->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
561 561
 			$parent = $share->getNode()->getParent();
562
-			while($parent->getStorage()->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
562
+			while ($parent->getStorage()->instanceOfStorage('OCA\Files_Sharing\External\Storage')) {
563 563
 				$parent = $parent->getParent();
564 564
 			}
565 565
 			$share->setShareOwner($parent->getOwner()->getUID());
@@ -616,7 +616,7 @@  discard block
 block discarded – undo
616 616
 		}
617 617
 
618 618
 		// Generate the target
619
-		$target = $this->config->getSystemValue('share_folder', '/') .'/'. $share->getNode()->getName();
619
+		$target = $this->config->getSystemValue('share_folder', '/').'/'.$share->getNode()->getName();
620 620
 		$target = \OC\Files\Filesystem::normalizePath($target);
621 621
 		$share->setTarget($target);
622 622
 
@@ -863,7 +863,7 @@  discard block
 block discarded – undo
863 863
 	 * @param string $recipientId
864 864
 	 */
865 865
 	public function deleteFromSelf(\OCP\Share\IShare $share, $recipientId) {
866
-		list($providerId, ) = $this->splitFullId($share->getFullId());
866
+		list($providerId,) = $this->splitFullId($share->getFullId());
867 867
 		$provider = $this->factory->getProvider($providerId);
868 868
 
869 869
 		$provider->deleteFromSelf($share, $recipientId);
@@ -884,7 +884,7 @@  discard block
 block discarded – undo
884 884
 		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
885 885
 			$sharedWith = $this->groupManager->get($share->getSharedWith());
886 886
 			if (is_null($sharedWith)) {
887
-				throw new \InvalidArgumentException('Group "' . $share->getSharedWith() . '" does not exist');
887
+				throw new \InvalidArgumentException('Group "'.$share->getSharedWith().'" does not exist');
888 888
 			}
889 889
 			$recipient = $this->userManager->get($recipientId);
890 890
 			if (!$sharedWith->inGroup($recipient)) {
@@ -892,7 +892,7 @@  discard block
 block discarded – undo
892 892
 			}
893 893
 		}
894 894
 
895
-		list($providerId, ) = $this->splitFullId($share->getFullId());
895
+		list($providerId,) = $this->splitFullId($share->getFullId());
896 896
 		$provider = $this->factory->getProvider($providerId);
897 897
 
898 898
 		$provider->move($share, $recipientId);
@@ -939,7 +939,7 @@  discard block
 block discarded – undo
939 939
 
940 940
 		$shares2 = [];
941 941
 
942
-		while(true) {
942
+		while (true) {
943 943
 			$added = 0;
944 944
 			foreach ($shares as $share) {
945 945
 
@@ -1039,7 +1039,7 @@  discard block
 block discarded – undo
1039 1039
 	 *
1040 1040
 	 * @return Share[]
1041 1041
 	 */
1042
-	public function getSharesByPath(\OCP\Files\Node $path, $page=0, $perPage=50) {
1042
+	public function getSharesByPath(\OCP\Files\Node $path, $page = 0, $perPage = 50) {
1043 1043
 		return [];
1044 1044
 	}
1045 1045
 
@@ -1054,7 +1054,7 @@  discard block
 block discarded – undo
1054 1054
 	public function getShareByToken($token) {
1055 1055
 		$share = null;
1056 1056
 		try {
1057
-			if($this->shareApiAllowLinks()) {
1057
+			if ($this->shareApiAllowLinks()) {
1058 1058
 				$provider = $this->factory->getProviderForType(\OCP\Share::SHARE_TYPE_LINK);
1059 1059
 				$share = $provider->getShareByToken($token);
1060 1060
 			}
@@ -1261,7 +1261,7 @@  discard block
 block discarded – undo
1261 1261
 	 * @return int
1262 1262
 	 */
1263 1263
 	public function shareApiLinkDefaultExpireDays() {
1264
-		return (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
1264
+		return (int) $this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
1265 1265
 	}
1266 1266
 
1267 1267
 	/**
Please login to merge, or discard this patch.
lib/private/Share20/DefaultShareProvider.php 1 patch
Indentation   +990 added lines, -990 removed lines patch added patch discarded remove patch
@@ -47,1027 +47,1027 @@
 block discarded – undo
47 47
  */
48 48
 class DefaultShareProvider implements IShareProvider {
49 49
 
50
-	// Special share type for user modified group shares
51
-	const SHARE_TYPE_USERGROUP = 2;
52
-
53
-	/** @var IDBConnection */
54
-	private $dbConn;
55
-
56
-	/** @var IUserManager */
57
-	private $userManager;
58
-
59
-	/** @var IGroupManager */
60
-	private $groupManager;
61
-
62
-	/** @var IRootFolder */
63
-	private $rootFolder;
64
-
65
-	/**
66
-	 * DefaultShareProvider constructor.
67
-	 *
68
-	 * @param IDBConnection $connection
69
-	 * @param IUserManager $userManager
70
-	 * @param IGroupManager $groupManager
71
-	 * @param IRootFolder $rootFolder
72
-	 */
73
-	public function __construct(
74
-			IDBConnection $connection,
75
-			IUserManager $userManager,
76
-			IGroupManager $groupManager,
77
-			IRootFolder $rootFolder) {
78
-		$this->dbConn = $connection;
79
-		$this->userManager = $userManager;
80
-		$this->groupManager = $groupManager;
81
-		$this->rootFolder = $rootFolder;
82
-	}
83
-
84
-	/**
85
-	 * Return the identifier of this provider.
86
-	 *
87
-	 * @return string Containing only [a-zA-Z0-9]
88
-	 */
89
-	public function identifier() {
90
-		return 'ocinternal';
91
-	}
92
-
93
-	/**
94
-	 * Share a path
95
-	 *
96
-	 * @param \OCP\Share\IShare $share
97
-	 * @return \OCP\Share\IShare The share object
98
-	 * @throws ShareNotFound
99
-	 * @throws \Exception
100
-	 */
101
-	public function create(\OCP\Share\IShare $share) {
102
-		$qb = $this->dbConn->getQueryBuilder();
103
-
104
-		$qb->insert('share');
105
-		$qb->setValue('share_type', $qb->createNamedParameter($share->getShareType()));
106
-
107
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
108
-			//Set the UID of the user we share with
109
-			$qb->setValue('share_with', $qb->createNamedParameter($share->getSharedWith()));
110
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
111
-			//Set the GID of the group we share with
112
-			$qb->setValue('share_with', $qb->createNamedParameter($share->getSharedWith()));
113
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
114
-			//Set the token of the share
115
-			$qb->setValue('token', $qb->createNamedParameter($share->getToken()));
116
-
117
-			//If a password is set store it
118
-			if ($share->getPassword() !== null) {
119
-				$qb->setValue('password', $qb->createNamedParameter($share->getPassword()));
120
-			}
121
-
122
-			//If an expiration date is set store it
123
-			if ($share->getExpirationDate() !== null) {
124
-				$qb->setValue('expiration', $qb->createNamedParameter($share->getExpirationDate(), 'datetime'));
125
-			}
126
-
127
-			if (method_exists($share, 'getParent')) {
128
-				$qb->setValue('parent', $qb->createNamedParameter($share->getParent()));
129
-			}
130
-		} else {
131
-			throw new \Exception('invalid share type!');
132
-		}
133
-
134
-		// Set what is shares
135
-		$qb->setValue('item_type', $qb->createParameter('itemType'));
136
-		if ($share->getNode() instanceof \OCP\Files\File) {
137
-			$qb->setParameter('itemType', 'file');
138
-		} else {
139
-			$qb->setParameter('itemType', 'folder');
140
-		}
141
-
142
-		// Set the file id
143
-		$qb->setValue('item_source', $qb->createNamedParameter($share->getNode()->getId()));
144
-		$qb->setValue('file_source', $qb->createNamedParameter($share->getNode()->getId()));
145
-
146
-		// set the permissions
147
-		$qb->setValue('permissions', $qb->createNamedParameter($share->getPermissions()));
148
-
149
-		// Set who created this share
150
-		$qb->setValue('uid_initiator', $qb->createNamedParameter($share->getSharedBy()));
151
-
152
-		// Set who is the owner of this file/folder (and this the owner of the share)
153
-		$qb->setValue('uid_owner', $qb->createNamedParameter($share->getShareOwner()));
154
-
155
-		// Set the file target
156
-		$qb->setValue('file_target', $qb->createNamedParameter($share->getTarget()));
157
-
158
-		// Set the time this share was created
159
-		$qb->setValue('stime', $qb->createNamedParameter(time()));
160
-
161
-		// insert the data and fetch the id of the share
162
-		$this->dbConn->beginTransaction();
163
-		$qb->execute();
164
-		$id = $this->dbConn->lastInsertId('*PREFIX*share');
165
-
166
-		// Now fetch the inserted share and create a complete share object
167
-		$qb = $this->dbConn->getQueryBuilder();
168
-		$qb->select('*')
169
-			->from('share')
170
-			->where($qb->expr()->eq('id', $qb->createNamedParameter($id)));
171
-
172
-		$cursor = $qb->execute();
173
-		$data = $cursor->fetch();
174
-		$this->dbConn->commit();
175
-		$cursor->closeCursor();
176
-
177
-		if ($data === false) {
178
-			throw new ShareNotFound();
179
-		}
180
-
181
-		$share = $this->createShare($data);
182
-		return $share;
183
-	}
184
-
185
-	/**
186
-	 * Update a share
187
-	 *
188
-	 * @param \OCP\Share\IShare $share
189
-	 * @return \OCP\Share\IShare The share object
190
-	 */
191
-	public function update(\OCP\Share\IShare $share) {
192
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
193
-			/*
50
+    // Special share type for user modified group shares
51
+    const SHARE_TYPE_USERGROUP = 2;
52
+
53
+    /** @var IDBConnection */
54
+    private $dbConn;
55
+
56
+    /** @var IUserManager */
57
+    private $userManager;
58
+
59
+    /** @var IGroupManager */
60
+    private $groupManager;
61
+
62
+    /** @var IRootFolder */
63
+    private $rootFolder;
64
+
65
+    /**
66
+     * DefaultShareProvider constructor.
67
+     *
68
+     * @param IDBConnection $connection
69
+     * @param IUserManager $userManager
70
+     * @param IGroupManager $groupManager
71
+     * @param IRootFolder $rootFolder
72
+     */
73
+    public function __construct(
74
+            IDBConnection $connection,
75
+            IUserManager $userManager,
76
+            IGroupManager $groupManager,
77
+            IRootFolder $rootFolder) {
78
+        $this->dbConn = $connection;
79
+        $this->userManager = $userManager;
80
+        $this->groupManager = $groupManager;
81
+        $this->rootFolder = $rootFolder;
82
+    }
83
+
84
+    /**
85
+     * Return the identifier of this provider.
86
+     *
87
+     * @return string Containing only [a-zA-Z0-9]
88
+     */
89
+    public function identifier() {
90
+        return 'ocinternal';
91
+    }
92
+
93
+    /**
94
+     * Share a path
95
+     *
96
+     * @param \OCP\Share\IShare $share
97
+     * @return \OCP\Share\IShare The share object
98
+     * @throws ShareNotFound
99
+     * @throws \Exception
100
+     */
101
+    public function create(\OCP\Share\IShare $share) {
102
+        $qb = $this->dbConn->getQueryBuilder();
103
+
104
+        $qb->insert('share');
105
+        $qb->setValue('share_type', $qb->createNamedParameter($share->getShareType()));
106
+
107
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
108
+            //Set the UID of the user we share with
109
+            $qb->setValue('share_with', $qb->createNamedParameter($share->getSharedWith()));
110
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
111
+            //Set the GID of the group we share with
112
+            $qb->setValue('share_with', $qb->createNamedParameter($share->getSharedWith()));
113
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
114
+            //Set the token of the share
115
+            $qb->setValue('token', $qb->createNamedParameter($share->getToken()));
116
+
117
+            //If a password is set store it
118
+            if ($share->getPassword() !== null) {
119
+                $qb->setValue('password', $qb->createNamedParameter($share->getPassword()));
120
+            }
121
+
122
+            //If an expiration date is set store it
123
+            if ($share->getExpirationDate() !== null) {
124
+                $qb->setValue('expiration', $qb->createNamedParameter($share->getExpirationDate(), 'datetime'));
125
+            }
126
+
127
+            if (method_exists($share, 'getParent')) {
128
+                $qb->setValue('parent', $qb->createNamedParameter($share->getParent()));
129
+            }
130
+        } else {
131
+            throw new \Exception('invalid share type!');
132
+        }
133
+
134
+        // Set what is shares
135
+        $qb->setValue('item_type', $qb->createParameter('itemType'));
136
+        if ($share->getNode() instanceof \OCP\Files\File) {
137
+            $qb->setParameter('itemType', 'file');
138
+        } else {
139
+            $qb->setParameter('itemType', 'folder');
140
+        }
141
+
142
+        // Set the file id
143
+        $qb->setValue('item_source', $qb->createNamedParameter($share->getNode()->getId()));
144
+        $qb->setValue('file_source', $qb->createNamedParameter($share->getNode()->getId()));
145
+
146
+        // set the permissions
147
+        $qb->setValue('permissions', $qb->createNamedParameter($share->getPermissions()));
148
+
149
+        // Set who created this share
150
+        $qb->setValue('uid_initiator', $qb->createNamedParameter($share->getSharedBy()));
151
+
152
+        // Set who is the owner of this file/folder (and this the owner of the share)
153
+        $qb->setValue('uid_owner', $qb->createNamedParameter($share->getShareOwner()));
154
+
155
+        // Set the file target
156
+        $qb->setValue('file_target', $qb->createNamedParameter($share->getTarget()));
157
+
158
+        // Set the time this share was created
159
+        $qb->setValue('stime', $qb->createNamedParameter(time()));
160
+
161
+        // insert the data and fetch the id of the share
162
+        $this->dbConn->beginTransaction();
163
+        $qb->execute();
164
+        $id = $this->dbConn->lastInsertId('*PREFIX*share');
165
+
166
+        // Now fetch the inserted share and create a complete share object
167
+        $qb = $this->dbConn->getQueryBuilder();
168
+        $qb->select('*')
169
+            ->from('share')
170
+            ->where($qb->expr()->eq('id', $qb->createNamedParameter($id)));
171
+
172
+        $cursor = $qb->execute();
173
+        $data = $cursor->fetch();
174
+        $this->dbConn->commit();
175
+        $cursor->closeCursor();
176
+
177
+        if ($data === false) {
178
+            throw new ShareNotFound();
179
+        }
180
+
181
+        $share = $this->createShare($data);
182
+        return $share;
183
+    }
184
+
185
+    /**
186
+     * Update a share
187
+     *
188
+     * @param \OCP\Share\IShare $share
189
+     * @return \OCP\Share\IShare The share object
190
+     */
191
+    public function update(\OCP\Share\IShare $share) {
192
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
193
+            /*
194 194
 			 * We allow updating the recipient on user shares.
195 195
 			 */
196
-			$qb = $this->dbConn->getQueryBuilder();
197
-			$qb->update('share')
198
-				->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
199
-				->set('share_with', $qb->createNamedParameter($share->getSharedWith()))
200
-				->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
201
-				->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
202
-				->set('permissions', $qb->createNamedParameter($share->getPermissions()))
203
-				->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
204
-				->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
205
-				->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
206
-				->execute();
207
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
208
-			$qb = $this->dbConn->getQueryBuilder();
209
-			$qb->update('share')
210
-				->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
211
-				->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
212
-				->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
213
-				->set('permissions', $qb->createNamedParameter($share->getPermissions()))
214
-				->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
215
-				->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
216
-				->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
217
-				->execute();
218
-
219
-			/*
196
+            $qb = $this->dbConn->getQueryBuilder();
197
+            $qb->update('share')
198
+                ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
199
+                ->set('share_with', $qb->createNamedParameter($share->getSharedWith()))
200
+                ->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
201
+                ->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
202
+                ->set('permissions', $qb->createNamedParameter($share->getPermissions()))
203
+                ->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
204
+                ->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
205
+                ->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
206
+                ->execute();
207
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
208
+            $qb = $this->dbConn->getQueryBuilder();
209
+            $qb->update('share')
210
+                ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
211
+                ->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
212
+                ->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
213
+                ->set('permissions', $qb->createNamedParameter($share->getPermissions()))
214
+                ->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
215
+                ->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
216
+                ->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
217
+                ->execute();
218
+
219
+            /*
220 220
 			 * Update all user defined group shares
221 221
 			 */
222
-			$qb = $this->dbConn->getQueryBuilder();
223
-			$qb->update('share')
224
-				->where($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
225
-				->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
226
-				->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
227
-				->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
228
-				->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
229
-				->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
230
-				->execute();
231
-
232
-			/*
222
+            $qb = $this->dbConn->getQueryBuilder();
223
+            $qb->update('share')
224
+                ->where($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
225
+                ->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
226
+                ->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
227
+                ->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
228
+                ->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
229
+                ->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
230
+                ->execute();
231
+
232
+            /*
233 233
 			 * Now update the permissions for all children that have not set it to 0
234 234
 			 */
235
-			$qb = $this->dbConn->getQueryBuilder();
236
-			$qb->update('share')
237
-				->where($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
238
-				->andWhere($qb->expr()->neq('permissions', $qb->createNamedParameter(0)))
239
-				->set('permissions', $qb->createNamedParameter($share->getPermissions()))
240
-				->execute();
241
-
242
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
243
-			$qb = $this->dbConn->getQueryBuilder();
244
-			$qb->update('share')
245
-				->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
246
-				->set('password', $qb->createNamedParameter($share->getPassword()))
247
-				->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
248
-				->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
249
-				->set('permissions', $qb->createNamedParameter($share->getPermissions()))
250
-				->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
251
-				->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
252
-				->set('token', $qb->createNamedParameter($share->getToken()))
253
-				->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
254
-				->execute();
255
-		}
256
-
257
-		return $share;
258
-	}
259
-
260
-	/**
261
-	 * Get all children of this share
262
-	 * FIXME: remove once https://github.com/owncloud/core/pull/21660 is in
263
-	 *
264
-	 * @param \OCP\Share\IShare $parent
265
-	 * @return \OCP\Share\IShare[]
266
-	 */
267
-	public function getChildren(\OCP\Share\IShare $parent) {
268
-		$children = [];
269
-
270
-		$qb = $this->dbConn->getQueryBuilder();
271
-		$qb->select('*')
272
-			->from('share')
273
-			->where($qb->expr()->eq('parent', $qb->createNamedParameter($parent->getId())))
274
-			->andWhere(
275
-				$qb->expr()->in(
276
-					'share_type',
277
-					$qb->createNamedParameter([
278
-						\OCP\Share::SHARE_TYPE_USER,
279
-						\OCP\Share::SHARE_TYPE_GROUP,
280
-						\OCP\Share::SHARE_TYPE_LINK,
281
-					], IQueryBuilder::PARAM_INT_ARRAY)
282
-				)
283
-			)
284
-			->andWhere($qb->expr()->orX(
285
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
286
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
287
-			))
288
-			->orderBy('id');
289
-
290
-		$cursor = $qb->execute();
291
-		while($data = $cursor->fetch()) {
292
-			$children[] = $this->createShare($data);
293
-		}
294
-		$cursor->closeCursor();
295
-
296
-		return $children;
297
-	}
298
-
299
-	/**
300
-	 * Delete a share
301
-	 *
302
-	 * @param \OCP\Share\IShare $share
303
-	 */
304
-	public function delete(\OCP\Share\IShare $share) {
305
-		$qb = $this->dbConn->getQueryBuilder();
306
-		$qb->delete('share')
307
-			->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())));
308
-
309
-		/*
235
+            $qb = $this->dbConn->getQueryBuilder();
236
+            $qb->update('share')
237
+                ->where($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
238
+                ->andWhere($qb->expr()->neq('permissions', $qb->createNamedParameter(0)))
239
+                ->set('permissions', $qb->createNamedParameter($share->getPermissions()))
240
+                ->execute();
241
+
242
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
243
+            $qb = $this->dbConn->getQueryBuilder();
244
+            $qb->update('share')
245
+                ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
246
+                ->set('password', $qb->createNamedParameter($share->getPassword()))
247
+                ->set('uid_owner', $qb->createNamedParameter($share->getShareOwner()))
248
+                ->set('uid_initiator', $qb->createNamedParameter($share->getSharedBy()))
249
+                ->set('permissions', $qb->createNamedParameter($share->getPermissions()))
250
+                ->set('item_source', $qb->createNamedParameter($share->getNode()->getId()))
251
+                ->set('file_source', $qb->createNamedParameter($share->getNode()->getId()))
252
+                ->set('token', $qb->createNamedParameter($share->getToken()))
253
+                ->set('expiration', $qb->createNamedParameter($share->getExpirationDate(), IQueryBuilder::PARAM_DATE))
254
+                ->execute();
255
+        }
256
+
257
+        return $share;
258
+    }
259
+
260
+    /**
261
+     * Get all children of this share
262
+     * FIXME: remove once https://github.com/owncloud/core/pull/21660 is in
263
+     *
264
+     * @param \OCP\Share\IShare $parent
265
+     * @return \OCP\Share\IShare[]
266
+     */
267
+    public function getChildren(\OCP\Share\IShare $parent) {
268
+        $children = [];
269
+
270
+        $qb = $this->dbConn->getQueryBuilder();
271
+        $qb->select('*')
272
+            ->from('share')
273
+            ->where($qb->expr()->eq('parent', $qb->createNamedParameter($parent->getId())))
274
+            ->andWhere(
275
+                $qb->expr()->in(
276
+                    'share_type',
277
+                    $qb->createNamedParameter([
278
+                        \OCP\Share::SHARE_TYPE_USER,
279
+                        \OCP\Share::SHARE_TYPE_GROUP,
280
+                        \OCP\Share::SHARE_TYPE_LINK,
281
+                    ], IQueryBuilder::PARAM_INT_ARRAY)
282
+                )
283
+            )
284
+            ->andWhere($qb->expr()->orX(
285
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
286
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
287
+            ))
288
+            ->orderBy('id');
289
+
290
+        $cursor = $qb->execute();
291
+        while($data = $cursor->fetch()) {
292
+            $children[] = $this->createShare($data);
293
+        }
294
+        $cursor->closeCursor();
295
+
296
+        return $children;
297
+    }
298
+
299
+    /**
300
+     * Delete a share
301
+     *
302
+     * @param \OCP\Share\IShare $share
303
+     */
304
+    public function delete(\OCP\Share\IShare $share) {
305
+        $qb = $this->dbConn->getQueryBuilder();
306
+        $qb->delete('share')
307
+            ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())));
308
+
309
+        /*
310 310
 		 * If the share is a group share delete all possible
311 311
 		 * user defined groups shares.
312 312
 		 */
313
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
314
-			$qb->orWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())));
315
-		}
316
-
317
-		$qb->execute();
318
-	}
319
-
320
-	/**
321
-	 * Unshare a share from the recipient. If this is a group share
322
-	 * this means we need a special entry in the share db.
323
-	 *
324
-	 * @param \OCP\Share\IShare $share
325
-	 * @param string $recipient UserId of recipient
326
-	 * @throws BackendError
327
-	 * @throws ProviderException
328
-	 */
329
-	public function deleteFromSelf(\OCP\Share\IShare $share, $recipient) {
330
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
331
-
332
-			$group = $this->groupManager->get($share->getSharedWith());
333
-			$user = $this->userManager->get($recipient);
334
-
335
-			if (is_null($group)) {
336
-				throw new ProviderException('Group "' . $share->getSharedWith() . '" does not exist');
337
-			}
338
-
339
-			if (!$group->inGroup($user)) {
340
-				throw new ProviderException('Recipient not in receiving group');
341
-			}
342
-
343
-			// Try to fetch user specific share
344
-			$qb = $this->dbConn->getQueryBuilder();
345
-			$stmt = $qb->select('*')
346
-				->from('share')
347
-				->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
348
-				->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($recipient)))
349
-				->andWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
350
-				->andWhere($qb->expr()->orX(
351
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
352
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
353
-				))
354
-				->execute();
355
-
356
-			$data = $stmt->fetch();
357
-
358
-			/*
313
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
314
+            $qb->orWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())));
315
+        }
316
+
317
+        $qb->execute();
318
+    }
319
+
320
+    /**
321
+     * Unshare a share from the recipient. If this is a group share
322
+     * this means we need a special entry in the share db.
323
+     *
324
+     * @param \OCP\Share\IShare $share
325
+     * @param string $recipient UserId of recipient
326
+     * @throws BackendError
327
+     * @throws ProviderException
328
+     */
329
+    public function deleteFromSelf(\OCP\Share\IShare $share, $recipient) {
330
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
331
+
332
+            $group = $this->groupManager->get($share->getSharedWith());
333
+            $user = $this->userManager->get($recipient);
334
+
335
+            if (is_null($group)) {
336
+                throw new ProviderException('Group "' . $share->getSharedWith() . '" does not exist');
337
+            }
338
+
339
+            if (!$group->inGroup($user)) {
340
+                throw new ProviderException('Recipient not in receiving group');
341
+            }
342
+
343
+            // Try to fetch user specific share
344
+            $qb = $this->dbConn->getQueryBuilder();
345
+            $stmt = $qb->select('*')
346
+                ->from('share')
347
+                ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
348
+                ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($recipient)))
349
+                ->andWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
350
+                ->andWhere($qb->expr()->orX(
351
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
352
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
353
+                ))
354
+                ->execute();
355
+
356
+            $data = $stmt->fetch();
357
+
358
+            /*
359 359
 			 * Check if there already is a user specific group share.
360 360
 			 * If there is update it (if required).
361 361
 			 */
362
-			if ($data === false) {
363
-				$qb = $this->dbConn->getQueryBuilder();
364
-
365
-				$type = $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder';
366
-
367
-				//Insert new share
368
-				$qb->insert('share')
369
-					->values([
370
-						'share_type' => $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP),
371
-						'share_with' => $qb->createNamedParameter($recipient),
372
-						'uid_owner' => $qb->createNamedParameter($share->getShareOwner()),
373
-						'uid_initiator' => $qb->createNamedParameter($share->getSharedBy()),
374
-						'parent' => $qb->createNamedParameter($share->getId()),
375
-						'item_type' => $qb->createNamedParameter($type),
376
-						'item_source' => $qb->createNamedParameter($share->getNode()->getId()),
377
-						'file_source' => $qb->createNamedParameter($share->getNode()->getId()),
378
-						'file_target' => $qb->createNamedParameter($share->getTarget()),
379
-						'permissions' => $qb->createNamedParameter(0),
380
-						'stime' => $qb->createNamedParameter($share->getShareTime()->getTimestamp()),
381
-					])->execute();
382
-
383
-			} else if ($data['permissions'] !== 0) {
384
-
385
-				// Update existing usergroup share
386
-				$qb = $this->dbConn->getQueryBuilder();
387
-				$qb->update('share')
388
-					->set('permissions', $qb->createNamedParameter(0))
389
-					->where($qb->expr()->eq('id', $qb->createNamedParameter($data['id'])))
390
-					->execute();
391
-			}
392
-
393
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
394
-
395
-			if ($share->getSharedWith() !== $recipient) {
396
-				throw new ProviderException('Recipient does not match');
397
-			}
398
-
399
-			// We can just delete user and link shares
400
-			$this->delete($share);
401
-		} else {
402
-			throw new ProviderException('Invalid shareType');
403
-		}
404
-	}
405
-
406
-	/**
407
-	 * @inheritdoc
408
-	 */
409
-	public function move(\OCP\Share\IShare $share, $recipient) {
410
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
411
-			// Just update the target
412
-			$qb = $this->dbConn->getQueryBuilder();
413
-			$qb->update('share')
414
-				->set('file_target', $qb->createNamedParameter($share->getTarget()))
415
-				->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
416
-				->execute();
417
-
418
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
419
-
420
-			// Check if there is a usergroup share
421
-			$qb = $this->dbConn->getQueryBuilder();
422
-			$stmt = $qb->select('id')
423
-				->from('share')
424
-				->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
425
-				->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($recipient)))
426
-				->andWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
427
-				->andWhere($qb->expr()->orX(
428
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
429
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
430
-				))
431
-				->setMaxResults(1)
432
-				->execute();
433
-
434
-			$data = $stmt->fetch();
435
-			$stmt->closeCursor();
436
-
437
-			if ($data === false) {
438
-				// No usergroup share yet. Create one.
439
-				$qb = $this->dbConn->getQueryBuilder();
440
-				$qb->insert('share')
441
-					->values([
442
-						'share_type' => $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP),
443
-						'share_with' => $qb->createNamedParameter($recipient),
444
-						'uid_owner' => $qb->createNamedParameter($share->getShareOwner()),
445
-						'uid_initiator' => $qb->createNamedParameter($share->getSharedBy()),
446
-						'parent' => $qb->createNamedParameter($share->getId()),
447
-						'item_type' => $qb->createNamedParameter($share->getNode() instanceof File ? 'file' : 'folder'),
448
-						'item_source' => $qb->createNamedParameter($share->getNode()->getId()),
449
-						'file_source' => $qb->createNamedParameter($share->getNode()->getId()),
450
-						'file_target' => $qb->createNamedParameter($share->getTarget()),
451
-						'permissions' => $qb->createNamedParameter($share->getPermissions()),
452
-						'stime' => $qb->createNamedParameter($share->getShareTime()->getTimestamp()),
453
-					])->execute();
454
-			} else {
455
-				// Already a usergroup share. Update it.
456
-				$qb = $this->dbConn->getQueryBuilder();
457
-				$qb->update('share')
458
-					->set('file_target', $qb->createNamedParameter($share->getTarget()))
459
-					->where($qb->expr()->eq('id', $qb->createNamedParameter($data['id'])))
460
-					->execute();
461
-			}
462
-		}
463
-
464
-		return $share;
465
-	}
466
-
467
-	public function getSharesInFolder($userId, Folder $node, $reshares) {
468
-		$qb = $this->dbConn->getQueryBuilder();
469
-		$qb->select('*')
470
-			->from('share', 's')
471
-			->andWhere($qb->expr()->orX(
472
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
473
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
474
-			));
475
-
476
-		$qb->andWhere($qb->expr()->orX(
477
-			$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)),
478
-			$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)),
479
-			$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK))
480
-		));
481
-
482
-		/**
483
-		 * Reshares for this user are shares where they are the owner.
484
-		 */
485
-		if ($reshares === false) {
486
-			$qb->andWhere($qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)));
487
-		} else {
488
-			$qb->andWhere(
489
-				$qb->expr()->orX(
490
-					$qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
491
-					$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
492
-				)
493
-			);
494
-		}
495
-
496
-		$qb->innerJoin('s', 'filecache' ,'f', 's.file_source = f.fileid');
497
-		$qb->andWhere($qb->expr()->eq('f.parent', $qb->createNamedParameter($node->getId())));
498
-
499
-		$qb->orderBy('id');
500
-
501
-		$cursor = $qb->execute();
502
-		$shares = [];
503
-		while ($data = $cursor->fetch()) {
504
-			$shares[$data['fileid']][] = $this->createShare($data);
505
-		}
506
-		$cursor->closeCursor();
507
-
508
-		return $shares;
509
-	}
510
-
511
-	/**
512
-	 * @inheritdoc
513
-	 */
514
-	public function getSharesBy($userId, $shareType, $node, $reshares, $limit, $offset) {
515
-		$qb = $this->dbConn->getQueryBuilder();
516
-		$qb->select('*')
517
-			->from('share')
518
-			->andWhere($qb->expr()->orX(
519
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
520
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
521
-			));
522
-
523
-		$qb->andWhere($qb->expr()->eq('share_type', $qb->createNamedParameter($shareType)));
524
-
525
-		/**
526
-		 * Reshares for this user are shares where they are the owner.
527
-		 */
528
-		if ($reshares === false) {
529
-			$qb->andWhere($qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)));
530
-		} else {
531
-			$qb->andWhere(
532
-				$qb->expr()->orX(
533
-					$qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
534
-					$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
535
-				)
536
-			);
537
-		}
538
-
539
-		if ($node !== null) {
540
-			$qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
541
-		}
542
-
543
-		if ($limit !== -1) {
544
-			$qb->setMaxResults($limit);
545
-		}
546
-
547
-		$qb->setFirstResult($offset);
548
-		$qb->orderBy('id');
549
-
550
-		$cursor = $qb->execute();
551
-		$shares = [];
552
-		while($data = $cursor->fetch()) {
553
-			$shares[] = $this->createShare($data);
554
-		}
555
-		$cursor->closeCursor();
556
-
557
-		return $shares;
558
-	}
559
-
560
-	/**
561
-	 * @inheritdoc
562
-	 */
563
-	public function getShareById($id, $recipientId = null) {
564
-		$qb = $this->dbConn->getQueryBuilder();
565
-
566
-		$qb->select('*')
567
-			->from('share')
568
-			->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
569
-			->andWhere(
570
-				$qb->expr()->in(
571
-					'share_type',
572
-					$qb->createNamedParameter([
573
-						\OCP\Share::SHARE_TYPE_USER,
574
-						\OCP\Share::SHARE_TYPE_GROUP,
575
-						\OCP\Share::SHARE_TYPE_LINK,
576
-					], IQueryBuilder::PARAM_INT_ARRAY)
577
-				)
578
-			)
579
-			->andWhere($qb->expr()->orX(
580
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
581
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
582
-			));
583
-
584
-		$cursor = $qb->execute();
585
-		$data = $cursor->fetch();
586
-		$cursor->closeCursor();
587
-
588
-		if ($data === false) {
589
-			throw new ShareNotFound();
590
-		}
591
-
592
-		try {
593
-			$share = $this->createShare($data);
594
-		} catch (InvalidShare $e) {
595
-			throw new ShareNotFound();
596
-		}
597
-
598
-		// If the recipient is set for a group share resolve to that user
599
-		if ($recipientId !== null && $share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
600
-			$share = $this->resolveGroupShares([$share], $recipientId)[0];
601
-		}
602
-
603
-		return $share;
604
-	}
605
-
606
-	/**
607
-	 * Get shares for a given path
608
-	 *
609
-	 * @param \OCP\Files\Node $path
610
-	 * @return \OCP\Share\IShare[]
611
-	 */
612
-	public function getSharesByPath(Node $path) {
613
-		$qb = $this->dbConn->getQueryBuilder();
614
-
615
-		$cursor = $qb->select('*')
616
-			->from('share')
617
-			->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($path->getId())))
618
-			->andWhere(
619
-				$qb->expr()->orX(
620
-					$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)),
621
-					$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP))
622
-				)
623
-			)
624
-			->andWhere($qb->expr()->orX(
625
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
626
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
627
-			))
628
-			->execute();
629
-
630
-		$shares = [];
631
-		while($data = $cursor->fetch()) {
632
-			$shares[] = $this->createShare($data);
633
-		}
634
-		$cursor->closeCursor();
635
-
636
-		return $shares;
637
-	}
638
-
639
-	/**
640
-	 * Returns whether the given database result can be interpreted as
641
-	 * a share with accessible file (not trashed, not deleted)
642
-	 */
643
-	private function isAccessibleResult($data) {
644
-		// exclude shares leading to deleted file entries
645
-		if ($data['fileid'] === null) {
646
-			return false;
647
-		}
648
-
649
-		// exclude shares leading to trashbin on home storages
650
-		$pathSections = explode('/', $data['path'], 2);
651
-		// FIXME: would not detect rare md5'd home storage case properly
652
-		if ($pathSections[0] !== 'files'
653
-		    	&& in_array(explode(':', $data['storage_string_id'], 2)[0], array('home', 'object'))) {
654
-			return false;
655
-		}
656
-		return true;
657
-	}
658
-
659
-	/**
660
-	 * @inheritdoc
661
-	 */
662
-	public function getSharedWith($userId, $shareType, $node, $limit, $offset) {
663
-		/** @var Share[] $shares */
664
-		$shares = [];
665
-
666
-		if ($shareType === \OCP\Share::SHARE_TYPE_USER) {
667
-			//Get shares directly with this user
668
-			$qb = $this->dbConn->getQueryBuilder();
669
-			$qb->select('s.*',
670
-				'f.fileid', 'f.path', 'f.permissions AS f_permissions', 'f.storage', 'f.path_hash',
671
-				'f.parent AS f_parent', 'f.name', 'f.mimetype', 'f.mimepart', 'f.size', 'f.mtime', 'f.storage_mtime',
672
-				'f.encrypted', 'f.unencrypted_size', 'f.etag', 'f.checksum'
673
-			)
674
-				->selectAlias('st.id', 'storage_string_id')
675
-				->from('share', 's')
676
-				->leftJoin('s', 'filecache', 'f', $qb->expr()->eq('s.file_source', 'f.fileid'))
677
-				->leftJoin('f', 'storages', 'st', $qb->expr()->eq('f.storage', 'st.numeric_id'));
678
-
679
-			// Order by id
680
-			$qb->orderBy('s.id');
681
-
682
-			// Set limit and offset
683
-			if ($limit !== -1) {
684
-				$qb->setMaxResults($limit);
685
-			}
686
-			$qb->setFirstResult($offset);
687
-
688
-			$qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)))
689
-				->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($userId)))
690
-				->andWhere($qb->expr()->orX(
691
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
692
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
693
-				));
694
-
695
-			// Filter by node if provided
696
-			if ($node !== null) {
697
-				$qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
698
-			}
699
-
700
-			$cursor = $qb->execute();
701
-
702
-			while($data = $cursor->fetch()) {
703
-				if ($this->isAccessibleResult($data)) {
704
-					$shares[] = $this->createShare($data);
705
-				}
706
-			}
707
-			$cursor->closeCursor();
708
-
709
-		} else if ($shareType === \OCP\Share::SHARE_TYPE_GROUP) {
710
-			$user = $this->userManager->get($userId);
711
-			$allGroups = $this->groupManager->getUserGroups($user);
712
-
713
-			/** @var Share[] $shares2 */
714
-			$shares2 = [];
715
-
716
-			$start = 0;
717
-			while(true) {
718
-				$groups = array_slice($allGroups, $start, 100);
719
-				$start += 100;
720
-
721
-				if ($groups === []) {
722
-					break;
723
-				}
724
-
725
-				$qb = $this->dbConn->getQueryBuilder();
726
-				$qb->select('s.*',
727
-					'f.fileid', 'f.path', 'f.permissions AS f_permissions', 'f.storage', 'f.path_hash',
728
-					'f.parent AS f_parent', 'f.name', 'f.mimetype', 'f.mimepart', 'f.size', 'f.mtime', 'f.storage_mtime',
729
-					'f.encrypted', 'f.unencrypted_size', 'f.etag', 'f.checksum'
730
-				)
731
-					->selectAlias('st.id', 'storage_string_id')
732
-					->from('share', 's')
733
-					->leftJoin('s', 'filecache', 'f', $qb->expr()->eq('s.file_source', 'f.fileid'))
734
-					->leftJoin('f', 'storages', 'st', $qb->expr()->eq('f.storage', 'st.numeric_id'))
735
-					->orderBy('s.id')
736
-					->setFirstResult(0);
737
-
738
-				if ($limit !== -1) {
739
-					$qb->setMaxResults($limit - count($shares));
740
-				}
741
-
742
-				// Filter by node if provided
743
-				if ($node !== null) {
744
-					$qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
745
-				}
746
-
747
-				$groups = array_map(function(IGroup $group) { return $group->getGID(); }, $groups);
748
-
749
-				$qb->andWhere($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
750
-					->andWhere($qb->expr()->in('share_with', $qb->createNamedParameter(
751
-						$groups,
752
-						IQueryBuilder::PARAM_STR_ARRAY
753
-					)))
754
-					->andWhere($qb->expr()->orX(
755
-						$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
756
-						$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
757
-					));
758
-
759
-				$cursor = $qb->execute();
760
-				while($data = $cursor->fetch()) {
761
-					if ($offset > 0) {
762
-						$offset--;
763
-						continue;
764
-					}
765
-
766
-					if ($this->isAccessibleResult($data)) {
767
-						$shares2[] = $this->createShare($data);
768
-					}
769
-				}
770
-				$cursor->closeCursor();
771
-			}
772
-
773
-			/*
362
+            if ($data === false) {
363
+                $qb = $this->dbConn->getQueryBuilder();
364
+
365
+                $type = $share->getNode() instanceof \OCP\Files\File ? 'file' : 'folder';
366
+
367
+                //Insert new share
368
+                $qb->insert('share')
369
+                    ->values([
370
+                        'share_type' => $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP),
371
+                        'share_with' => $qb->createNamedParameter($recipient),
372
+                        'uid_owner' => $qb->createNamedParameter($share->getShareOwner()),
373
+                        'uid_initiator' => $qb->createNamedParameter($share->getSharedBy()),
374
+                        'parent' => $qb->createNamedParameter($share->getId()),
375
+                        'item_type' => $qb->createNamedParameter($type),
376
+                        'item_source' => $qb->createNamedParameter($share->getNode()->getId()),
377
+                        'file_source' => $qb->createNamedParameter($share->getNode()->getId()),
378
+                        'file_target' => $qb->createNamedParameter($share->getTarget()),
379
+                        'permissions' => $qb->createNamedParameter(0),
380
+                        'stime' => $qb->createNamedParameter($share->getShareTime()->getTimestamp()),
381
+                    ])->execute();
382
+
383
+            } else if ($data['permissions'] !== 0) {
384
+
385
+                // Update existing usergroup share
386
+                $qb = $this->dbConn->getQueryBuilder();
387
+                $qb->update('share')
388
+                    ->set('permissions', $qb->createNamedParameter(0))
389
+                    ->where($qb->expr()->eq('id', $qb->createNamedParameter($data['id'])))
390
+                    ->execute();
391
+            }
392
+
393
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
394
+
395
+            if ($share->getSharedWith() !== $recipient) {
396
+                throw new ProviderException('Recipient does not match');
397
+            }
398
+
399
+            // We can just delete user and link shares
400
+            $this->delete($share);
401
+        } else {
402
+            throw new ProviderException('Invalid shareType');
403
+        }
404
+    }
405
+
406
+    /**
407
+     * @inheritdoc
408
+     */
409
+    public function move(\OCP\Share\IShare $share, $recipient) {
410
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
411
+            // Just update the target
412
+            $qb = $this->dbConn->getQueryBuilder();
413
+            $qb->update('share')
414
+                ->set('file_target', $qb->createNamedParameter($share->getTarget()))
415
+                ->where($qb->expr()->eq('id', $qb->createNamedParameter($share->getId())))
416
+                ->execute();
417
+
418
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
419
+
420
+            // Check if there is a usergroup share
421
+            $qb = $this->dbConn->getQueryBuilder();
422
+            $stmt = $qb->select('id')
423
+                ->from('share')
424
+                ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
425
+                ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($recipient)))
426
+                ->andWhere($qb->expr()->eq('parent', $qb->createNamedParameter($share->getId())))
427
+                ->andWhere($qb->expr()->orX(
428
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
429
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
430
+                ))
431
+                ->setMaxResults(1)
432
+                ->execute();
433
+
434
+            $data = $stmt->fetch();
435
+            $stmt->closeCursor();
436
+
437
+            if ($data === false) {
438
+                // No usergroup share yet. Create one.
439
+                $qb = $this->dbConn->getQueryBuilder();
440
+                $qb->insert('share')
441
+                    ->values([
442
+                        'share_type' => $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP),
443
+                        'share_with' => $qb->createNamedParameter($recipient),
444
+                        'uid_owner' => $qb->createNamedParameter($share->getShareOwner()),
445
+                        'uid_initiator' => $qb->createNamedParameter($share->getSharedBy()),
446
+                        'parent' => $qb->createNamedParameter($share->getId()),
447
+                        'item_type' => $qb->createNamedParameter($share->getNode() instanceof File ? 'file' : 'folder'),
448
+                        'item_source' => $qb->createNamedParameter($share->getNode()->getId()),
449
+                        'file_source' => $qb->createNamedParameter($share->getNode()->getId()),
450
+                        'file_target' => $qb->createNamedParameter($share->getTarget()),
451
+                        'permissions' => $qb->createNamedParameter($share->getPermissions()),
452
+                        'stime' => $qb->createNamedParameter($share->getShareTime()->getTimestamp()),
453
+                    ])->execute();
454
+            } else {
455
+                // Already a usergroup share. Update it.
456
+                $qb = $this->dbConn->getQueryBuilder();
457
+                $qb->update('share')
458
+                    ->set('file_target', $qb->createNamedParameter($share->getTarget()))
459
+                    ->where($qb->expr()->eq('id', $qb->createNamedParameter($data['id'])))
460
+                    ->execute();
461
+            }
462
+        }
463
+
464
+        return $share;
465
+    }
466
+
467
+    public function getSharesInFolder($userId, Folder $node, $reshares) {
468
+        $qb = $this->dbConn->getQueryBuilder();
469
+        $qb->select('*')
470
+            ->from('share', 's')
471
+            ->andWhere($qb->expr()->orX(
472
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
473
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
474
+            ));
475
+
476
+        $qb->andWhere($qb->expr()->orX(
477
+            $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)),
478
+            $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)),
479
+            $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK))
480
+        ));
481
+
482
+        /**
483
+         * Reshares for this user are shares where they are the owner.
484
+         */
485
+        if ($reshares === false) {
486
+            $qb->andWhere($qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)));
487
+        } else {
488
+            $qb->andWhere(
489
+                $qb->expr()->orX(
490
+                    $qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
491
+                    $qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
492
+                )
493
+            );
494
+        }
495
+
496
+        $qb->innerJoin('s', 'filecache' ,'f', 's.file_source = f.fileid');
497
+        $qb->andWhere($qb->expr()->eq('f.parent', $qb->createNamedParameter($node->getId())));
498
+
499
+        $qb->orderBy('id');
500
+
501
+        $cursor = $qb->execute();
502
+        $shares = [];
503
+        while ($data = $cursor->fetch()) {
504
+            $shares[$data['fileid']][] = $this->createShare($data);
505
+        }
506
+        $cursor->closeCursor();
507
+
508
+        return $shares;
509
+    }
510
+
511
+    /**
512
+     * @inheritdoc
513
+     */
514
+    public function getSharesBy($userId, $shareType, $node, $reshares, $limit, $offset) {
515
+        $qb = $this->dbConn->getQueryBuilder();
516
+        $qb->select('*')
517
+            ->from('share')
518
+            ->andWhere($qb->expr()->orX(
519
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
520
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
521
+            ));
522
+
523
+        $qb->andWhere($qb->expr()->eq('share_type', $qb->createNamedParameter($shareType)));
524
+
525
+        /**
526
+         * Reshares for this user are shares where they are the owner.
527
+         */
528
+        if ($reshares === false) {
529
+            $qb->andWhere($qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId)));
530
+        } else {
531
+            $qb->andWhere(
532
+                $qb->expr()->orX(
533
+                    $qb->expr()->eq('uid_owner', $qb->createNamedParameter($userId)),
534
+                    $qb->expr()->eq('uid_initiator', $qb->createNamedParameter($userId))
535
+                )
536
+            );
537
+        }
538
+
539
+        if ($node !== null) {
540
+            $qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
541
+        }
542
+
543
+        if ($limit !== -1) {
544
+            $qb->setMaxResults($limit);
545
+        }
546
+
547
+        $qb->setFirstResult($offset);
548
+        $qb->orderBy('id');
549
+
550
+        $cursor = $qb->execute();
551
+        $shares = [];
552
+        while($data = $cursor->fetch()) {
553
+            $shares[] = $this->createShare($data);
554
+        }
555
+        $cursor->closeCursor();
556
+
557
+        return $shares;
558
+    }
559
+
560
+    /**
561
+     * @inheritdoc
562
+     */
563
+    public function getShareById($id, $recipientId = null) {
564
+        $qb = $this->dbConn->getQueryBuilder();
565
+
566
+        $qb->select('*')
567
+            ->from('share')
568
+            ->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
569
+            ->andWhere(
570
+                $qb->expr()->in(
571
+                    'share_type',
572
+                    $qb->createNamedParameter([
573
+                        \OCP\Share::SHARE_TYPE_USER,
574
+                        \OCP\Share::SHARE_TYPE_GROUP,
575
+                        \OCP\Share::SHARE_TYPE_LINK,
576
+                    ], IQueryBuilder::PARAM_INT_ARRAY)
577
+                )
578
+            )
579
+            ->andWhere($qb->expr()->orX(
580
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
581
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
582
+            ));
583
+
584
+        $cursor = $qb->execute();
585
+        $data = $cursor->fetch();
586
+        $cursor->closeCursor();
587
+
588
+        if ($data === false) {
589
+            throw new ShareNotFound();
590
+        }
591
+
592
+        try {
593
+            $share = $this->createShare($data);
594
+        } catch (InvalidShare $e) {
595
+            throw new ShareNotFound();
596
+        }
597
+
598
+        // If the recipient is set for a group share resolve to that user
599
+        if ($recipientId !== null && $share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
600
+            $share = $this->resolveGroupShares([$share], $recipientId)[0];
601
+        }
602
+
603
+        return $share;
604
+    }
605
+
606
+    /**
607
+     * Get shares for a given path
608
+     *
609
+     * @param \OCP\Files\Node $path
610
+     * @return \OCP\Share\IShare[]
611
+     */
612
+    public function getSharesByPath(Node $path) {
613
+        $qb = $this->dbConn->getQueryBuilder();
614
+
615
+        $cursor = $qb->select('*')
616
+            ->from('share')
617
+            ->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($path->getId())))
618
+            ->andWhere(
619
+                $qb->expr()->orX(
620
+                    $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)),
621
+                    $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP))
622
+                )
623
+            )
624
+            ->andWhere($qb->expr()->orX(
625
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
626
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
627
+            ))
628
+            ->execute();
629
+
630
+        $shares = [];
631
+        while($data = $cursor->fetch()) {
632
+            $shares[] = $this->createShare($data);
633
+        }
634
+        $cursor->closeCursor();
635
+
636
+        return $shares;
637
+    }
638
+
639
+    /**
640
+     * Returns whether the given database result can be interpreted as
641
+     * a share with accessible file (not trashed, not deleted)
642
+     */
643
+    private function isAccessibleResult($data) {
644
+        // exclude shares leading to deleted file entries
645
+        if ($data['fileid'] === null) {
646
+            return false;
647
+        }
648
+
649
+        // exclude shares leading to trashbin on home storages
650
+        $pathSections = explode('/', $data['path'], 2);
651
+        // FIXME: would not detect rare md5'd home storage case properly
652
+        if ($pathSections[0] !== 'files'
653
+                && in_array(explode(':', $data['storage_string_id'], 2)[0], array('home', 'object'))) {
654
+            return false;
655
+        }
656
+        return true;
657
+    }
658
+
659
+    /**
660
+     * @inheritdoc
661
+     */
662
+    public function getSharedWith($userId, $shareType, $node, $limit, $offset) {
663
+        /** @var Share[] $shares */
664
+        $shares = [];
665
+
666
+        if ($shareType === \OCP\Share::SHARE_TYPE_USER) {
667
+            //Get shares directly with this user
668
+            $qb = $this->dbConn->getQueryBuilder();
669
+            $qb->select('s.*',
670
+                'f.fileid', 'f.path', 'f.permissions AS f_permissions', 'f.storage', 'f.path_hash',
671
+                'f.parent AS f_parent', 'f.name', 'f.mimetype', 'f.mimepart', 'f.size', 'f.mtime', 'f.storage_mtime',
672
+                'f.encrypted', 'f.unencrypted_size', 'f.etag', 'f.checksum'
673
+            )
674
+                ->selectAlias('st.id', 'storage_string_id')
675
+                ->from('share', 's')
676
+                ->leftJoin('s', 'filecache', 'f', $qb->expr()->eq('s.file_source', 'f.fileid'))
677
+                ->leftJoin('f', 'storages', 'st', $qb->expr()->eq('f.storage', 'st.numeric_id'));
678
+
679
+            // Order by id
680
+            $qb->orderBy('s.id');
681
+
682
+            // Set limit and offset
683
+            if ($limit !== -1) {
684
+                $qb->setMaxResults($limit);
685
+            }
686
+            $qb->setFirstResult($offset);
687
+
688
+            $qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)))
689
+                ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($userId)))
690
+                ->andWhere($qb->expr()->orX(
691
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
692
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
693
+                ));
694
+
695
+            // Filter by node if provided
696
+            if ($node !== null) {
697
+                $qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
698
+            }
699
+
700
+            $cursor = $qb->execute();
701
+
702
+            while($data = $cursor->fetch()) {
703
+                if ($this->isAccessibleResult($data)) {
704
+                    $shares[] = $this->createShare($data);
705
+                }
706
+            }
707
+            $cursor->closeCursor();
708
+
709
+        } else if ($shareType === \OCP\Share::SHARE_TYPE_GROUP) {
710
+            $user = $this->userManager->get($userId);
711
+            $allGroups = $this->groupManager->getUserGroups($user);
712
+
713
+            /** @var Share[] $shares2 */
714
+            $shares2 = [];
715
+
716
+            $start = 0;
717
+            while(true) {
718
+                $groups = array_slice($allGroups, $start, 100);
719
+                $start += 100;
720
+
721
+                if ($groups === []) {
722
+                    break;
723
+                }
724
+
725
+                $qb = $this->dbConn->getQueryBuilder();
726
+                $qb->select('s.*',
727
+                    'f.fileid', 'f.path', 'f.permissions AS f_permissions', 'f.storage', 'f.path_hash',
728
+                    'f.parent AS f_parent', 'f.name', 'f.mimetype', 'f.mimepart', 'f.size', 'f.mtime', 'f.storage_mtime',
729
+                    'f.encrypted', 'f.unencrypted_size', 'f.etag', 'f.checksum'
730
+                )
731
+                    ->selectAlias('st.id', 'storage_string_id')
732
+                    ->from('share', 's')
733
+                    ->leftJoin('s', 'filecache', 'f', $qb->expr()->eq('s.file_source', 'f.fileid'))
734
+                    ->leftJoin('f', 'storages', 'st', $qb->expr()->eq('f.storage', 'st.numeric_id'))
735
+                    ->orderBy('s.id')
736
+                    ->setFirstResult(0);
737
+
738
+                if ($limit !== -1) {
739
+                    $qb->setMaxResults($limit - count($shares));
740
+                }
741
+
742
+                // Filter by node if provided
743
+                if ($node !== null) {
744
+                    $qb->andWhere($qb->expr()->eq('file_source', $qb->createNamedParameter($node->getId())));
745
+                }
746
+
747
+                $groups = array_map(function(IGroup $group) { return $group->getGID(); }, $groups);
748
+
749
+                $qb->andWhere($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
750
+                    ->andWhere($qb->expr()->in('share_with', $qb->createNamedParameter(
751
+                        $groups,
752
+                        IQueryBuilder::PARAM_STR_ARRAY
753
+                    )))
754
+                    ->andWhere($qb->expr()->orX(
755
+                        $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
756
+                        $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
757
+                    ));
758
+
759
+                $cursor = $qb->execute();
760
+                while($data = $cursor->fetch()) {
761
+                    if ($offset > 0) {
762
+                        $offset--;
763
+                        continue;
764
+                    }
765
+
766
+                    if ($this->isAccessibleResult($data)) {
767
+                        $shares2[] = $this->createShare($data);
768
+                    }
769
+                }
770
+                $cursor->closeCursor();
771
+            }
772
+
773
+            /*
774 774
  			 * Resolve all group shares to user specific shares
775 775
  			 */
776
-			$shares = $this->resolveGroupShares($shares2, $userId);
777
-		} else {
778
-			throw new BackendError('Invalid backend');
779
-		}
780
-
781
-
782
-		return $shares;
783
-	}
784
-
785
-	/**
786
-	 * Get a share by token
787
-	 *
788
-	 * @param string $token
789
-	 * @return \OCP\Share\IShare
790
-	 * @throws ShareNotFound
791
-	 */
792
-	public function getShareByToken($token) {
793
-		$qb = $this->dbConn->getQueryBuilder();
794
-
795
-		$cursor = $qb->select('*')
796
-			->from('share')
797
-			->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK)))
798
-			->andWhere($qb->expr()->eq('token', $qb->createNamedParameter($token)))
799
-			->andWhere($qb->expr()->orX(
800
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
801
-				$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
802
-			))
803
-			->execute();
804
-
805
-		$data = $cursor->fetch();
806
-
807
-		if ($data === false) {
808
-			throw new ShareNotFound();
809
-		}
810
-
811
-		try {
812
-			$share = $this->createShare($data);
813
-		} catch (InvalidShare $e) {
814
-			throw new ShareNotFound();
815
-		}
816
-
817
-		return $share;
818
-	}
819
-
820
-	/**
821
-	 * Create a share object from an database row
822
-	 *
823
-	 * @param mixed[] $data
824
-	 * @return \OCP\Share\IShare
825
-	 * @throws InvalidShare
826
-	 */
827
-	private function createShare($data) {
828
-		$share = new Share($this->rootFolder, $this->userManager);
829
-		$share->setId((int)$data['id'])
830
-			->setShareType((int)$data['share_type'])
831
-			->setPermissions((int)$data['permissions'])
832
-			->setTarget($data['file_target'])
833
-			->setMailSend((bool)$data['mail_send']);
834
-
835
-		$shareTime = new \DateTime();
836
-		$shareTime->setTimestamp((int)$data['stime']);
837
-		$share->setShareTime($shareTime);
838
-
839
-		if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
840
-			$share->setSharedWith($data['share_with']);
841
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
842
-			$share->setSharedWith($data['share_with']);
843
-		} else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
844
-			$share->setPassword($data['password']);
845
-			$share->setToken($data['token']);
846
-		}
847
-
848
-		$share->setSharedBy($data['uid_initiator']);
849
-		$share->setShareOwner($data['uid_owner']);
850
-
851
-		$share->setNodeId((int)$data['file_source']);
852
-		$share->setNodeType($data['item_type']);
853
-
854
-		if ($data['expiration'] !== null) {
855
-			$expiration = \DateTime::createFromFormat('Y-m-d H:i:s', $data['expiration']);
856
-			$share->setExpirationDate($expiration);
857
-		}
858
-
859
-		if (isset($data['f_permissions'])) {
860
-			$entryData = $data;
861
-			$entryData['permissions'] = $entryData['f_permissions'];
862
-			$entryData['parent'] = $entryData['f_parent'];;
863
-			$share->setNodeCacheEntry(Cache::cacheEntryFromData($entryData,
864
-				\OC::$server->getMimeTypeLoader()));
865
-		}
866
-
867
-		$share->setProviderId($this->identifier());
868
-
869
-		return $share;
870
-	}
871
-
872
-	/**
873
-	 * @param Share[] $shares
874
-	 * @param $userId
875
-	 * @return Share[] The updates shares if no update is found for a share return the original
876
-	 */
877
-	private function resolveGroupShares($shares, $userId) {
878
-		$result = [];
879
-
880
-		$start = 0;
881
-		while(true) {
882
-			/** @var Share[] $shareSlice */
883
-			$shareSlice = array_slice($shares, $start, 100);
884
-			$start += 100;
885
-
886
-			if ($shareSlice === []) {
887
-				break;
888
-			}
889
-
890
-			/** @var int[] $ids */
891
-			$ids = [];
892
-			/** @var Share[] $shareMap */
893
-			$shareMap = [];
894
-
895
-			foreach ($shareSlice as $share) {
896
-				$ids[] = (int)$share->getId();
897
-				$shareMap[$share->getId()] = $share;
898
-			}
899
-
900
-			$qb = $this->dbConn->getQueryBuilder();
901
-
902
-			$query = $qb->select('*')
903
-				->from('share')
904
-				->where($qb->expr()->in('parent', $qb->createNamedParameter($ids, IQueryBuilder::PARAM_INT_ARRAY)))
905
-				->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($userId)))
906
-				->andWhere($qb->expr()->orX(
907
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
908
-					$qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
909
-				));
910
-
911
-			$stmt = $query->execute();
912
-
913
-			while($data = $stmt->fetch()) {
914
-				$shareMap[$data['parent']]->setPermissions((int)$data['permissions']);
915
-				$shareMap[$data['parent']]->setTarget($data['file_target']);
916
-			}
917
-
918
-			$stmt->closeCursor();
919
-
920
-			foreach ($shareMap as $share) {
921
-				$result[] = $share;
922
-			}
923
-		}
924
-
925
-		return $result;
926
-	}
927
-
928
-	/**
929
-	 * A user is deleted from the system
930
-	 * So clean up the relevant shares.
931
-	 *
932
-	 * @param string $uid
933
-	 * @param int $shareType
934
-	 */
935
-	public function userDeleted($uid, $shareType) {
936
-		$qb = $this->dbConn->getQueryBuilder();
937
-
938
-		$qb->delete('share');
939
-
940
-		if ($shareType === \OCP\Share::SHARE_TYPE_USER) {
941
-			/*
776
+            $shares = $this->resolveGroupShares($shares2, $userId);
777
+        } else {
778
+            throw new BackendError('Invalid backend');
779
+        }
780
+
781
+
782
+        return $shares;
783
+    }
784
+
785
+    /**
786
+     * Get a share by token
787
+     *
788
+     * @param string $token
789
+     * @return \OCP\Share\IShare
790
+     * @throws ShareNotFound
791
+     */
792
+    public function getShareByToken($token) {
793
+        $qb = $this->dbConn->getQueryBuilder();
794
+
795
+        $cursor = $qb->select('*')
796
+            ->from('share')
797
+            ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK)))
798
+            ->andWhere($qb->expr()->eq('token', $qb->createNamedParameter($token)))
799
+            ->andWhere($qb->expr()->orX(
800
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
801
+                $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
802
+            ))
803
+            ->execute();
804
+
805
+        $data = $cursor->fetch();
806
+
807
+        if ($data === false) {
808
+            throw new ShareNotFound();
809
+        }
810
+
811
+        try {
812
+            $share = $this->createShare($data);
813
+        } catch (InvalidShare $e) {
814
+            throw new ShareNotFound();
815
+        }
816
+
817
+        return $share;
818
+    }
819
+
820
+    /**
821
+     * Create a share object from an database row
822
+     *
823
+     * @param mixed[] $data
824
+     * @return \OCP\Share\IShare
825
+     * @throws InvalidShare
826
+     */
827
+    private function createShare($data) {
828
+        $share = new Share($this->rootFolder, $this->userManager);
829
+        $share->setId((int)$data['id'])
830
+            ->setShareType((int)$data['share_type'])
831
+            ->setPermissions((int)$data['permissions'])
832
+            ->setTarget($data['file_target'])
833
+            ->setMailSend((bool)$data['mail_send']);
834
+
835
+        $shareTime = new \DateTime();
836
+        $shareTime->setTimestamp((int)$data['stime']);
837
+        $share->setShareTime($shareTime);
838
+
839
+        if ($share->getShareType() === \OCP\Share::SHARE_TYPE_USER) {
840
+            $share->setSharedWith($data['share_with']);
841
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_GROUP) {
842
+            $share->setSharedWith($data['share_with']);
843
+        } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_LINK) {
844
+            $share->setPassword($data['password']);
845
+            $share->setToken($data['token']);
846
+        }
847
+
848
+        $share->setSharedBy($data['uid_initiator']);
849
+        $share->setShareOwner($data['uid_owner']);
850
+
851
+        $share->setNodeId((int)$data['file_source']);
852
+        $share->setNodeType($data['item_type']);
853
+
854
+        if ($data['expiration'] !== null) {
855
+            $expiration = \DateTime::createFromFormat('Y-m-d H:i:s', $data['expiration']);
856
+            $share->setExpirationDate($expiration);
857
+        }
858
+
859
+        if (isset($data['f_permissions'])) {
860
+            $entryData = $data;
861
+            $entryData['permissions'] = $entryData['f_permissions'];
862
+            $entryData['parent'] = $entryData['f_parent'];;
863
+            $share->setNodeCacheEntry(Cache::cacheEntryFromData($entryData,
864
+                \OC::$server->getMimeTypeLoader()));
865
+        }
866
+
867
+        $share->setProviderId($this->identifier());
868
+
869
+        return $share;
870
+    }
871
+
872
+    /**
873
+     * @param Share[] $shares
874
+     * @param $userId
875
+     * @return Share[] The updates shares if no update is found for a share return the original
876
+     */
877
+    private function resolveGroupShares($shares, $userId) {
878
+        $result = [];
879
+
880
+        $start = 0;
881
+        while(true) {
882
+            /** @var Share[] $shareSlice */
883
+            $shareSlice = array_slice($shares, $start, 100);
884
+            $start += 100;
885
+
886
+            if ($shareSlice === []) {
887
+                break;
888
+            }
889
+
890
+            /** @var int[] $ids */
891
+            $ids = [];
892
+            /** @var Share[] $shareMap */
893
+            $shareMap = [];
894
+
895
+            foreach ($shareSlice as $share) {
896
+                $ids[] = (int)$share->getId();
897
+                $shareMap[$share->getId()] = $share;
898
+            }
899
+
900
+            $qb = $this->dbConn->getQueryBuilder();
901
+
902
+            $query = $qb->select('*')
903
+                ->from('share')
904
+                ->where($qb->expr()->in('parent', $qb->createNamedParameter($ids, IQueryBuilder::PARAM_INT_ARRAY)))
905
+                ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($userId)))
906
+                ->andWhere($qb->expr()->orX(
907
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('file')),
908
+                    $qb->expr()->eq('item_type', $qb->createNamedParameter('folder'))
909
+                ));
910
+
911
+            $stmt = $query->execute();
912
+
913
+            while($data = $stmt->fetch()) {
914
+                $shareMap[$data['parent']]->setPermissions((int)$data['permissions']);
915
+                $shareMap[$data['parent']]->setTarget($data['file_target']);
916
+            }
917
+
918
+            $stmt->closeCursor();
919
+
920
+            foreach ($shareMap as $share) {
921
+                $result[] = $share;
922
+            }
923
+        }
924
+
925
+        return $result;
926
+    }
927
+
928
+    /**
929
+     * A user is deleted from the system
930
+     * So clean up the relevant shares.
931
+     *
932
+     * @param string $uid
933
+     * @param int $shareType
934
+     */
935
+    public function userDeleted($uid, $shareType) {
936
+        $qb = $this->dbConn->getQueryBuilder();
937
+
938
+        $qb->delete('share');
939
+
940
+        if ($shareType === \OCP\Share::SHARE_TYPE_USER) {
941
+            /*
942 942
 			 * Delete all user shares that are owned by this user
943 943
 			 * or that are received by this user
944 944
 			 */
945 945
 
946
-			$qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)));
946
+            $qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_USER)));
947 947
 
948
-			$qb->andWhere(
949
-				$qb->expr()->orX(
950
-					$qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid)),
951
-					$qb->expr()->eq('share_with', $qb->createNamedParameter($uid))
952
-				)
953
-			);
954
-		} else if ($shareType === \OCP\Share::SHARE_TYPE_GROUP) {
955
-			/*
948
+            $qb->andWhere(
949
+                $qb->expr()->orX(
950
+                    $qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid)),
951
+                    $qb->expr()->eq('share_with', $qb->createNamedParameter($uid))
952
+                )
953
+            );
954
+        } else if ($shareType === \OCP\Share::SHARE_TYPE_GROUP) {
955
+            /*
956 956
 			 * Delete all group shares that are owned by this user
957 957
 			 * Or special user group shares that are received by this user
958 958
 			 */
959
-			$qb->where(
960
-				$qb->expr()->andX(
961
-					$qb->expr()->orX(
962
-						$qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)),
963
-						$qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP))
964
-					),
965
-					$qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid))
966
-				)
967
-			);
968
-
969
-			$qb->orWhere(
970
-				$qb->expr()->andX(
971
-					$qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)),
972
-					$qb->expr()->eq('share_with', $qb->createNamedParameter($uid))
973
-				)
974
-			);
975
-		} else if ($shareType === \OCP\Share::SHARE_TYPE_LINK) {
976
-			/*
959
+            $qb->where(
960
+                $qb->expr()->andX(
961
+                    $qb->expr()->orX(
962
+                        $qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)),
963
+                        $qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP))
964
+                    ),
965
+                    $qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid))
966
+                )
967
+            );
968
+
969
+            $qb->orWhere(
970
+                $qb->expr()->andX(
971
+                    $qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)),
972
+                    $qb->expr()->eq('share_with', $qb->createNamedParameter($uid))
973
+                )
974
+            );
975
+        } else if ($shareType === \OCP\Share::SHARE_TYPE_LINK) {
976
+            /*
977 977
 			 * Delete all link shares owned by this user.
978 978
 			 * And all link shares initiated by this user (until #22327 is in)
979 979
 			 */
980
-			$qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK)));
981
-
982
-			$qb->andWhere(
983
-				$qb->expr()->orX(
984
-					$qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid)),
985
-					$qb->expr()->eq('uid_initiator', $qb->createNamedParameter($uid))
986
-				)
987
-			);
988
-		}
989
-
990
-		$qb->execute();
991
-	}
992
-
993
-	/**
994
-	 * Delete all shares received by this group. As well as any custom group
995
-	 * shares for group members.
996
-	 *
997
-	 * @param string $gid
998
-	 */
999
-	public function groupDeleted($gid) {
1000
-		/*
980
+            $qb->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_LINK)));
981
+
982
+            $qb->andWhere(
983
+                $qb->expr()->orX(
984
+                    $qb->expr()->eq('uid_owner', $qb->createNamedParameter($uid)),
985
+                    $qb->expr()->eq('uid_initiator', $qb->createNamedParameter($uid))
986
+                )
987
+            );
988
+        }
989
+
990
+        $qb->execute();
991
+    }
992
+
993
+    /**
994
+     * Delete all shares received by this group. As well as any custom group
995
+     * shares for group members.
996
+     *
997
+     * @param string $gid
998
+     */
999
+    public function groupDeleted($gid) {
1000
+        /*
1001 1001
 		 * First delete all custom group shares for group members
1002 1002
 		 */
1003
-		$qb = $this->dbConn->getQueryBuilder();
1004
-		$qb->select('id')
1005
-			->from('share')
1006
-			->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1007
-			->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1008
-
1009
-		$cursor = $qb->execute();
1010
-		$ids = [];
1011
-		while($row = $cursor->fetch()) {
1012
-			$ids[] = (int)$row['id'];
1013
-		}
1014
-		$cursor->closeCursor();
1015
-
1016
-		if (!empty($ids)) {
1017
-			$chunks = array_chunk($ids, 100);
1018
-			foreach ($chunks as $chunk) {
1019
-				$qb->delete('share')
1020
-					->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
1021
-					->andWhere($qb->expr()->in('parent', $qb->createNamedParameter($chunk, IQueryBuilder::PARAM_INT_ARRAY)));
1022
-				$qb->execute();
1023
-			}
1024
-		}
1025
-
1026
-		/*
1003
+        $qb = $this->dbConn->getQueryBuilder();
1004
+        $qb->select('id')
1005
+            ->from('share')
1006
+            ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1007
+            ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1008
+
1009
+        $cursor = $qb->execute();
1010
+        $ids = [];
1011
+        while($row = $cursor->fetch()) {
1012
+            $ids[] = (int)$row['id'];
1013
+        }
1014
+        $cursor->closeCursor();
1015
+
1016
+        if (!empty($ids)) {
1017
+            $chunks = array_chunk($ids, 100);
1018
+            foreach ($chunks as $chunk) {
1019
+                $qb->delete('share')
1020
+                    ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
1021
+                    ->andWhere($qb->expr()->in('parent', $qb->createNamedParameter($chunk, IQueryBuilder::PARAM_INT_ARRAY)));
1022
+                $qb->execute();
1023
+            }
1024
+        }
1025
+
1026
+        /*
1027 1027
 		 * Now delete all the group shares
1028 1028
 		 */
1029
-		$qb = $this->dbConn->getQueryBuilder();
1030
-		$qb->delete('share')
1031
-			->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1032
-			->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1033
-		$qb->execute();
1034
-	}
1035
-
1036
-	/**
1037
-	 * Delete custom group shares to this group for this user
1038
-	 *
1039
-	 * @param string $uid
1040
-	 * @param string $gid
1041
-	 */
1042
-	public function userDeletedFromGroup($uid, $gid) {
1043
-		/*
1029
+        $qb = $this->dbConn->getQueryBuilder();
1030
+        $qb->delete('share')
1031
+            ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1032
+            ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1033
+        $qb->execute();
1034
+    }
1035
+
1036
+    /**
1037
+     * Delete custom group shares to this group for this user
1038
+     *
1039
+     * @param string $uid
1040
+     * @param string $gid
1041
+     */
1042
+    public function userDeletedFromGroup($uid, $gid) {
1043
+        /*
1044 1044
 		 * Get all group shares
1045 1045
 		 */
1046
-		$qb = $this->dbConn->getQueryBuilder();
1047
-		$qb->select('id')
1048
-			->from('share')
1049
-			->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1050
-			->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1051
-
1052
-		$cursor = $qb->execute();
1053
-		$ids = [];
1054
-		while($row = $cursor->fetch()) {
1055
-			$ids[] = (int)$row['id'];
1056
-		}
1057
-		$cursor->closeCursor();
1058
-
1059
-		if (!empty($ids)) {
1060
-			$chunks = array_chunk($ids, 100);
1061
-			foreach ($chunks as $chunk) {
1062
-				/*
1046
+        $qb = $this->dbConn->getQueryBuilder();
1047
+        $qb->select('id')
1048
+            ->from('share')
1049
+            ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(\OCP\Share::SHARE_TYPE_GROUP)))
1050
+            ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($gid)));
1051
+
1052
+        $cursor = $qb->execute();
1053
+        $ids = [];
1054
+        while($row = $cursor->fetch()) {
1055
+            $ids[] = (int)$row['id'];
1056
+        }
1057
+        $cursor->closeCursor();
1058
+
1059
+        if (!empty($ids)) {
1060
+            $chunks = array_chunk($ids, 100);
1061
+            foreach ($chunks as $chunk) {
1062
+                /*
1063 1063
 				 * Delete all special shares wit this users for the found group shares
1064 1064
 				 */
1065
-				$qb->delete('share')
1066
-					->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
1067
-					->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($uid)))
1068
-					->andWhere($qb->expr()->in('parent', $qb->createNamedParameter($chunk, IQueryBuilder::PARAM_INT_ARRAY)));
1069
-				$qb->execute();
1070
-			}
1071
-		}
1072
-	}
1065
+                $qb->delete('share')
1066
+                    ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(self::SHARE_TYPE_USERGROUP)))
1067
+                    ->andWhere($qb->expr()->eq('share_with', $qb->createNamedParameter($uid)))
1068
+                    ->andWhere($qb->expr()->in('parent', $qb->createNamedParameter($chunk, IQueryBuilder::PARAM_INT_ARRAY)));
1069
+                $qb->execute();
1070
+            }
1071
+        }
1072
+    }
1073 1073
 }
Please login to merge, or discard this patch.
lib/public/Share/IShare.php 1 patch
Indentation   +304 added lines, -304 removed lines patch added patch discarded remove patch
@@ -37,308 +37,308 @@
 block discarded – undo
37 37
  */
38 38
 interface IShare {
39 39
 
40
-	/**
41
-	 * Set the internal id of the share
42
-	 * It is only allowed to set the internal id of a share once.
43
-	 * Attempts to override the internal id will result in an IllegalIDChangeException
44
-	 *
45
-	 * @param string $id
46
-	 * @return \OCP\Share\IShare
47
-	 * @throws IllegalIDChangeException
48
-	 * @throws \InvalidArgumentException
49
-	 * @since 9.1.0
50
-	 */
51
-	public function setId($id);
52
-
53
-	/**
54
-	 * Get the internal id of the share.
55
-	 *
56
-	 * @return string
57
-	 * @since 9.0.0
58
-	 */
59
-	public function getId();
60
-
61
-	/**
62
-	 * Get the full share id. This is the <providerid>:<internalid>.
63
-	 * The full id is unique in the system.
64
-	 *
65
-	 * @return string
66
-	 * @since 9.0.0
67
-	 * @throws \UnexpectedValueException If the fullId could not be constructed
68
-	 */
69
-	public function getFullId();
70
-
71
-	/**
72
-	 * Set the provider id of the share
73
-	 * It is only allowed to set the provider id of a share once.
74
-	 * Attempts to override the provider id will result in an IllegalIDChangeException
75
-	 *
76
-	 * @param string $id
77
-	 * @return \OCP\Share\IShare
78
-	 * @throws IllegalIDChangeException
79
-	 * @throws \InvalidArgumentException
80
-	 * @since 9.1.0
81
-	 */
82
-	public function setProviderId($id);
83
-
84
-	/**
85
-	 * Set the node of the file/folder that is shared
86
-	 *
87
-	 * @param Node $node
88
-	 * @return \OCP\Share\IShare The modified object
89
-	 * @since 9.0.0
90
-	 */
91
-	public function setNode(Node $node);
92
-
93
-	/**
94
-	 * Get the node of the file/folder that is shared
95
-	 *
96
-	 * @return File|Folder
97
-	 * @since 9.0.0
98
-	 * @throws NotFoundException
99
-	 */
100
-	public function getNode();
101
-
102
-	/**
103
-	 * Set file id for lazy evaluation of the node
104
-	 * @param int $fileId
105
-	 * @return \OCP\Share\IShare The modified object
106
-	 * @since 9.0.0
107
-	 */
108
-	public function setNodeId($fileId);
109
-
110
-	/**
111
-	 * Get the fileid of the node of this share
112
-	 * @return int
113
-	 * @since 9.0.0
114
-	 * @throws NotFoundException
115
-	 */
116
-	public function getNodeId();
117
-
118
-	/**
119
-	 * Set the type of node (file/folder)
120
-	 *
121
-	 * @param string $type
122
-	 * @return \OCP\Share\IShare The modified object
123
-	 * @since 9.0.0
124
-	 */
125
-	public function setNodeType($type);
126
-
127
-	/**
128
-	 * Get the type of node (file/folder)
129
-	 *
130
-	 * @return string
131
-	 * @since 9.0.0
132
-	 * @throws NotFoundException
133
-	 */
134
-	public function getNodeType();
135
-
136
-	/**
137
-	 * Set the shareType
138
-	 *
139
-	 * @param int $shareType
140
-	 * @return \OCP\Share\IShare The modified object
141
-	 * @since 9.0.0
142
-	 */
143
-	public function setShareType($shareType);
144
-
145
-	/**
146
-	 * Get the shareType
147
-	 *
148
-	 * @return int
149
-	 * @since 9.0.0
150
-	 */
151
-	public function getShareType();
152
-
153
-	/**
154
-	 * Set the receiver of this share.
155
-	 *
156
-	 * @param string $sharedWith
157
-	 * @return \OCP\Share\IShare The modified object
158
-	 * @since 9.0.0
159
-	 */
160
-	public function setSharedWith($sharedWith);
161
-
162
-	/**
163
-	 * Get the receiver of this share.
164
-	 *
165
-	 * @return string
166
-	 * @since 9.0.0
167
-	 */
168
-	public function getSharedWith();
169
-
170
-	/**
171
-	 * Set the permissions.
172
-	 * See \OCP\Constants::PERMISSION_*
173
-	 *
174
-	 * @param int $permissions
175
-	 * @return \OCP\Share\IShare The modified object
176
-	 * @since 9.0.0
177
-	 */
178
-	public function setPermissions($permissions);
179
-
180
-	/**
181
-	 * Get the share permissions
182
-	 * See \OCP\Constants::PERMISSION_*
183
-	 *
184
-	 * @return int
185
-	 * @since 9.0.0
186
-	 */
187
-	public function getPermissions();
188
-
189
-	/**
190
-	 * Set the expiration date
191
-	 *
192
-	 * @param null|\DateTime $expireDate
193
-	 * @return \OCP\Share\IShare The modified object
194
-	 * @since 9.0.0
195
-	 */
196
-	public function setExpirationDate($expireDate);
197
-
198
-	/**
199
-	 * Get the expiration date
200
-	 *
201
-	 * @return \DateTime
202
-	 * @since 9.0.0
203
-	 */
204
-	public function getExpirationDate();
205
-
206
-	/**
207
-	 * Set the sharer of the path.
208
-	 *
209
-	 * @param string $sharedBy
210
-	 * @return \OCP\Share\IShare The modified object
211
-	 * @since 9.0.0
212
-	 */
213
-	public function setSharedBy($sharedBy);
214
-
215
-	/**
216
-	 * Get share sharer
217
-	 *
218
-	 * @return string
219
-	 * @since 9.0.0
220
-	 */
221
-	public function getSharedBy();
222
-
223
-	/**
224
-	 * Set the original share owner (who owns the path that is shared)
225
-	 *
226
-	 * @param string $shareOwner
227
-	 * @return \OCP\Share\IShare The modified object
228
-	 * @since 9.0.0
229
-	 */
230
-	public function setShareOwner($shareOwner);
231
-
232
-	/**
233
-	 * Get the original share owner (who owns the path that is shared)
234
-	 *
235
-	 * @return string
236
-	 * @since 9.0.0
237
-	 */
238
-	public function getShareOwner();
239
-
240
-	/**
241
-	 * Set the password for this share.
242
-	 * When the share is passed to the share manager to be created
243
-	 * or updated the password will be hashed.
244
-	 *
245
-	 * @param string $password
246
-	 * @return \OCP\Share\IShare The modified object
247
-	 * @since 9.0.0
248
-	 */
249
-	public function setPassword($password);
250
-
251
-	/**
252
-	 * Get the password of this share.
253
-	 * If this share is obtained via a shareprovider the password is
254
-	 * hashed.
255
-	 *
256
-	 * @return string
257
-	 * @since 9.0.0
258
-	 */
259
-	public function getPassword();
260
-
261
-	/**
262
-	 * Set the public link token.
263
-	 *
264
-	 * @param string $token
265
-	 * @return \OCP\Share\IShare The modified object
266
-	 * @since 9.0.0
267
-	 */
268
-	public function setToken($token);
269
-
270
-	/**
271
-	 * Get the public link token.
272
-	 *
273
-	 * @return string
274
-	 * @since 9.0.0
275
-	 */
276
-	public function getToken();
277
-
278
-	/**
279
-	 * Set the target path of this share relative to the recipients user folder.
280
-	 *
281
-	 * @param string $target
282
-	 * @return \OCP\Share\IShare The modified object
283
-	 * @since 9.0.0
284
-	 */
285
-	public function setTarget($target);
286
-
287
-	/**
288
-	 * Get the target path of this share relative to the recipients user folder.
289
-	 *
290
-	 * @return string
291
-	 * @since 9.0.0
292
-	 */
293
-	public function getTarget();
294
-
295
-	/**
296
-	 * Set the time this share was created
297
-	 *
298
-	 * @param \DateTime $shareTime
299
-	 * @return \OCP\Share\IShare The modified object
300
-	 * @since 9.0.0
301
-	 */
302
-	public function setShareTime(\DateTime $shareTime);
303
-
304
-	/**
305
-	 * Get the timestamp this share was created
306
-	 *
307
-	 * @return \DateTime
308
-	 * @since 9.0.0
309
-	 */
310
-	public function getShareTime();
311
-
312
-	/**
313
-	 * Set if the recipient is informed by mail about the share.
314
-	 *
315
-	 * @param bool $mailSend
316
-	 * @return \OCP\Share\IShare The modified object
317
-	 * @since 9.0.0
318
-	 */
319
-	public function setMailSend($mailSend);
320
-
321
-	/**
322
-	 * Get if the recipient informed by mail about the share.
323
-	 *
324
-	 * @return bool
325
-	 * @since 9.0.0
326
-	 */
327
-	public function getMailSend();
328
-
329
-	/**
330
-	 * Set the cache entry for the shared node
331
-	 *
332
-	 * @param ICacheEntry $entry
333
-	 * @since 11.0.0
334
-	 */
335
-	public function setNodeCacheEntry(ICacheEntry $entry);
336
-
337
-	/**
338
-	 * Get the cache entry for the shared node
339
-	 *
340
-	 * @return null|ICacheEntry
341
-	 * @since 11.0.0
342
-	 */
343
-	public function getNodeCacheEntry();
40
+    /**
41
+     * Set the internal id of the share
42
+     * It is only allowed to set the internal id of a share once.
43
+     * Attempts to override the internal id will result in an IllegalIDChangeException
44
+     *
45
+     * @param string $id
46
+     * @return \OCP\Share\IShare
47
+     * @throws IllegalIDChangeException
48
+     * @throws \InvalidArgumentException
49
+     * @since 9.1.0
50
+     */
51
+    public function setId($id);
52
+
53
+    /**
54
+     * Get the internal id of the share.
55
+     *
56
+     * @return string
57
+     * @since 9.0.0
58
+     */
59
+    public function getId();
60
+
61
+    /**
62
+     * Get the full share id. This is the <providerid>:<internalid>.
63
+     * The full id is unique in the system.
64
+     *
65
+     * @return string
66
+     * @since 9.0.0
67
+     * @throws \UnexpectedValueException If the fullId could not be constructed
68
+     */
69
+    public function getFullId();
70
+
71
+    /**
72
+     * Set the provider id of the share
73
+     * It is only allowed to set the provider id of a share once.
74
+     * Attempts to override the provider id will result in an IllegalIDChangeException
75
+     *
76
+     * @param string $id
77
+     * @return \OCP\Share\IShare
78
+     * @throws IllegalIDChangeException
79
+     * @throws \InvalidArgumentException
80
+     * @since 9.1.0
81
+     */
82
+    public function setProviderId($id);
83
+
84
+    /**
85
+     * Set the node of the file/folder that is shared
86
+     *
87
+     * @param Node $node
88
+     * @return \OCP\Share\IShare The modified object
89
+     * @since 9.0.0
90
+     */
91
+    public function setNode(Node $node);
92
+
93
+    /**
94
+     * Get the node of the file/folder that is shared
95
+     *
96
+     * @return File|Folder
97
+     * @since 9.0.0
98
+     * @throws NotFoundException
99
+     */
100
+    public function getNode();
101
+
102
+    /**
103
+     * Set file id for lazy evaluation of the node
104
+     * @param int $fileId
105
+     * @return \OCP\Share\IShare The modified object
106
+     * @since 9.0.0
107
+     */
108
+    public function setNodeId($fileId);
109
+
110
+    /**
111
+     * Get the fileid of the node of this share
112
+     * @return int
113
+     * @since 9.0.0
114
+     * @throws NotFoundException
115
+     */
116
+    public function getNodeId();
117
+
118
+    /**
119
+     * Set the type of node (file/folder)
120
+     *
121
+     * @param string $type
122
+     * @return \OCP\Share\IShare The modified object
123
+     * @since 9.0.0
124
+     */
125
+    public function setNodeType($type);
126
+
127
+    /**
128
+     * Get the type of node (file/folder)
129
+     *
130
+     * @return string
131
+     * @since 9.0.0
132
+     * @throws NotFoundException
133
+     */
134
+    public function getNodeType();
135
+
136
+    /**
137
+     * Set the shareType
138
+     *
139
+     * @param int $shareType
140
+     * @return \OCP\Share\IShare The modified object
141
+     * @since 9.0.0
142
+     */
143
+    public function setShareType($shareType);
144
+
145
+    /**
146
+     * Get the shareType
147
+     *
148
+     * @return int
149
+     * @since 9.0.0
150
+     */
151
+    public function getShareType();
152
+
153
+    /**
154
+     * Set the receiver of this share.
155
+     *
156
+     * @param string $sharedWith
157
+     * @return \OCP\Share\IShare The modified object
158
+     * @since 9.0.0
159
+     */
160
+    public function setSharedWith($sharedWith);
161
+
162
+    /**
163
+     * Get the receiver of this share.
164
+     *
165
+     * @return string
166
+     * @since 9.0.0
167
+     */
168
+    public function getSharedWith();
169
+
170
+    /**
171
+     * Set the permissions.
172
+     * See \OCP\Constants::PERMISSION_*
173
+     *
174
+     * @param int $permissions
175
+     * @return \OCP\Share\IShare The modified object
176
+     * @since 9.0.0
177
+     */
178
+    public function setPermissions($permissions);
179
+
180
+    /**
181
+     * Get the share permissions
182
+     * See \OCP\Constants::PERMISSION_*
183
+     *
184
+     * @return int
185
+     * @since 9.0.0
186
+     */
187
+    public function getPermissions();
188
+
189
+    /**
190
+     * Set the expiration date
191
+     *
192
+     * @param null|\DateTime $expireDate
193
+     * @return \OCP\Share\IShare The modified object
194
+     * @since 9.0.0
195
+     */
196
+    public function setExpirationDate($expireDate);
197
+
198
+    /**
199
+     * Get the expiration date
200
+     *
201
+     * @return \DateTime
202
+     * @since 9.0.0
203
+     */
204
+    public function getExpirationDate();
205
+
206
+    /**
207
+     * Set the sharer of the path.
208
+     *
209
+     * @param string $sharedBy
210
+     * @return \OCP\Share\IShare The modified object
211
+     * @since 9.0.0
212
+     */
213
+    public function setSharedBy($sharedBy);
214
+
215
+    /**
216
+     * Get share sharer
217
+     *
218
+     * @return string
219
+     * @since 9.0.0
220
+     */
221
+    public function getSharedBy();
222
+
223
+    /**
224
+     * Set the original share owner (who owns the path that is shared)
225
+     *
226
+     * @param string $shareOwner
227
+     * @return \OCP\Share\IShare The modified object
228
+     * @since 9.0.0
229
+     */
230
+    public function setShareOwner($shareOwner);
231
+
232
+    /**
233
+     * Get the original share owner (who owns the path that is shared)
234
+     *
235
+     * @return string
236
+     * @since 9.0.0
237
+     */
238
+    public function getShareOwner();
239
+
240
+    /**
241
+     * Set the password for this share.
242
+     * When the share is passed to the share manager to be created
243
+     * or updated the password will be hashed.
244
+     *
245
+     * @param string $password
246
+     * @return \OCP\Share\IShare The modified object
247
+     * @since 9.0.0
248
+     */
249
+    public function setPassword($password);
250
+
251
+    /**
252
+     * Get the password of this share.
253
+     * If this share is obtained via a shareprovider the password is
254
+     * hashed.
255
+     *
256
+     * @return string
257
+     * @since 9.0.0
258
+     */
259
+    public function getPassword();
260
+
261
+    /**
262
+     * Set the public link token.
263
+     *
264
+     * @param string $token
265
+     * @return \OCP\Share\IShare The modified object
266
+     * @since 9.0.0
267
+     */
268
+    public function setToken($token);
269
+
270
+    /**
271
+     * Get the public link token.
272
+     *
273
+     * @return string
274
+     * @since 9.0.0
275
+     */
276
+    public function getToken();
277
+
278
+    /**
279
+     * Set the target path of this share relative to the recipients user folder.
280
+     *
281
+     * @param string $target
282
+     * @return \OCP\Share\IShare The modified object
283
+     * @since 9.0.0
284
+     */
285
+    public function setTarget($target);
286
+
287
+    /**
288
+     * Get the target path of this share relative to the recipients user folder.
289
+     *
290
+     * @return string
291
+     * @since 9.0.0
292
+     */
293
+    public function getTarget();
294
+
295
+    /**
296
+     * Set the time this share was created
297
+     *
298
+     * @param \DateTime $shareTime
299
+     * @return \OCP\Share\IShare The modified object
300
+     * @since 9.0.0
301
+     */
302
+    public function setShareTime(\DateTime $shareTime);
303
+
304
+    /**
305
+     * Get the timestamp this share was created
306
+     *
307
+     * @return \DateTime
308
+     * @since 9.0.0
309
+     */
310
+    public function getShareTime();
311
+
312
+    /**
313
+     * Set if the recipient is informed by mail about the share.
314
+     *
315
+     * @param bool $mailSend
316
+     * @return \OCP\Share\IShare The modified object
317
+     * @since 9.0.0
318
+     */
319
+    public function setMailSend($mailSend);
320
+
321
+    /**
322
+     * Get if the recipient informed by mail about the share.
323
+     *
324
+     * @return bool
325
+     * @since 9.0.0
326
+     */
327
+    public function getMailSend();
328
+
329
+    /**
330
+     * Set the cache entry for the shared node
331
+     *
332
+     * @param ICacheEntry $entry
333
+     * @since 11.0.0
334
+     */
335
+    public function setNodeCacheEntry(ICacheEntry $entry);
336
+
337
+    /**
338
+     * Get the cache entry for the shared node
339
+     *
340
+     * @return null|ICacheEntry
341
+     * @since 11.0.0
342
+     */
343
+    public function getNodeCacheEntry();
344 344
 }
Please login to merge, or discard this patch.
apps/files_sharing/lib/Capabilities.php 1 patch
Indentation   +80 added lines, -80 removed lines patch added patch discarded remove patch
@@ -32,84 +32,84 @@
 block discarded – undo
32 32
  */
33 33
 class Capabilities implements ICapability {
34 34
 
35
-	/** @var IConfig */
36
-	private $config;
37
-
38
-	/** @var IAppManager */
39
-	private $appManager;
40
-
41
-	public function __construct(IConfig $config, IAppManager $appManager) {
42
-		$this->config = $config;
43
-		$this->appManager = $appManager;
44
-	}
45
-
46
-	/**
47
-	 * Return this classes capabilities
48
-	 *
49
-	 * @return array
50
-	 */
51
-	public function getCapabilities() {
52
-		$res = [];
53
-
54
-		if ($this->config->getAppValue('core', 'shareapi_enabled', 'yes') !== 'yes') {
55
-			$res['api_enabled'] = false;
56
-			$res['public'] = ['enabled' => false];
57
-			$res['user'] = ['send_mail' => false];
58
-			$res['resharing'] = false;
59
-		} else {
60
-			$res['api_enabled'] = true;
61
-
62
-			$public = [];
63
-			$public['enabled'] = $this->config->getAppValue('core', 'shareapi_allow_links', 'yes') === 'yes';
64
-			if ($public['enabled']) {
65
-				$public['password'] = [];
66
-				$public['password']['enforced'] = ($this->config->getAppValue('core', 'shareapi_enforce_links_password', 'no') === 'yes');
67
-
68
-				$public['expire_date'] = [];
69
-				$public['expire_date']['enabled'] = $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
70
-				if ($public['expire_date']['enabled']) {
71
-					$public['expire_date']['days'] = $this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
72
-					$public['expire_date']['enforced'] = $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
73
-				}
74
-
75
-				$public['send_mail'] = $this->config->getAppValue('core', 'shareapi_allow_public_notification', 'no') === 'yes';
76
-				$public['upload'] = $this->config->getAppValue('core', 'shareapi_allow_public_upload', 'yes') === 'yes';
77
-				$public['upload_files_drop'] = $public['upload'];
78
-			}
79
-			$res["public"] = $public;
80
-
81
-			$res['resharing'] = $this->config->getAppValue('core', 'shareapi_allow_resharing', 'yes') === 'yes';
82
-
83
-			$res['user']['send_mail'] = false;
84
-			$res['user']['expire_date']['enabled'] = true;
85
-
86
-			// deprecated in favour of 'group', but we need to keep it for now
87
-			// in order to stay compatible with older clients
88
-			$res['group_sharing'] = $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
89
-
90
-			$res['group'] = [];
91
-			$res['group']['enabled'] = $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
92
-			$res['group']['expire_date']['enabled'] = true;
93
-		}
94
-
95
-		//Federated sharing
96
-		$res['federation'] = [
97
-			'outgoing'  => $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes',
98
-			'incoming' => $this->config->getAppValue('files_sharing', 'incoming_server2server_share_enabled', 'yes') === 'yes',
99
-			'expire_date' => ['enabled' => true]
100
-		];
101
-
102
-		if ($this->appManager->isEnabledForUser('sharebymail')) {
103
-			$res['mailshare'] = [
104
-				'enabled' => true,
105
-				'upload_files_drop' => ['enabled' => true],
106
-				'password' => ['enabled' => true],
107
-				'expire_date' => ['enabled' => true]
108
-			];
109
-		}
110
-
111
-		return [
112
-			'files_sharing' => $res,
113
-		];
114
-	}
35
+    /** @var IConfig */
36
+    private $config;
37
+
38
+    /** @var IAppManager */
39
+    private $appManager;
40
+
41
+    public function __construct(IConfig $config, IAppManager $appManager) {
42
+        $this->config = $config;
43
+        $this->appManager = $appManager;
44
+    }
45
+
46
+    /**
47
+     * Return this classes capabilities
48
+     *
49
+     * @return array
50
+     */
51
+    public function getCapabilities() {
52
+        $res = [];
53
+
54
+        if ($this->config->getAppValue('core', 'shareapi_enabled', 'yes') !== 'yes') {
55
+            $res['api_enabled'] = false;
56
+            $res['public'] = ['enabled' => false];
57
+            $res['user'] = ['send_mail' => false];
58
+            $res['resharing'] = false;
59
+        } else {
60
+            $res['api_enabled'] = true;
61
+
62
+            $public = [];
63
+            $public['enabled'] = $this->config->getAppValue('core', 'shareapi_allow_links', 'yes') === 'yes';
64
+            if ($public['enabled']) {
65
+                $public['password'] = [];
66
+                $public['password']['enforced'] = ($this->config->getAppValue('core', 'shareapi_enforce_links_password', 'no') === 'yes');
67
+
68
+                $public['expire_date'] = [];
69
+                $public['expire_date']['enabled'] = $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
70
+                if ($public['expire_date']['enabled']) {
71
+                    $public['expire_date']['days'] = $this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
72
+                    $public['expire_date']['enforced'] = $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
73
+                }
74
+
75
+                $public['send_mail'] = $this->config->getAppValue('core', 'shareapi_allow_public_notification', 'no') === 'yes';
76
+                $public['upload'] = $this->config->getAppValue('core', 'shareapi_allow_public_upload', 'yes') === 'yes';
77
+                $public['upload_files_drop'] = $public['upload'];
78
+            }
79
+            $res["public"] = $public;
80
+
81
+            $res['resharing'] = $this->config->getAppValue('core', 'shareapi_allow_resharing', 'yes') === 'yes';
82
+
83
+            $res['user']['send_mail'] = false;
84
+            $res['user']['expire_date']['enabled'] = true;
85
+
86
+            // deprecated in favour of 'group', but we need to keep it for now
87
+            // in order to stay compatible with older clients
88
+            $res['group_sharing'] = $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
89
+
90
+            $res['group'] = [];
91
+            $res['group']['enabled'] = $this->config->getAppValue('core', 'shareapi_allow_group_sharing', 'yes') === 'yes';
92
+            $res['group']['expire_date']['enabled'] = true;
93
+        }
94
+
95
+        //Federated sharing
96
+        $res['federation'] = [
97
+            'outgoing'  => $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes',
98
+            'incoming' => $this->config->getAppValue('files_sharing', 'incoming_server2server_share_enabled', 'yes') === 'yes',
99
+            'expire_date' => ['enabled' => true]
100
+        ];
101
+
102
+        if ($this->appManager->isEnabledForUser('sharebymail')) {
103
+            $res['mailshare'] = [
104
+                'enabled' => true,
105
+                'upload_files_drop' => ['enabled' => true],
106
+                'password' => ['enabled' => true],
107
+                'expire_date' => ['enabled' => true]
108
+            ];
109
+        }
110
+
111
+        return [
112
+            'files_sharing' => $res,
113
+        ];
114
+    }
115 115
 }
Please login to merge, or discard this patch.