@@ -26,8 +26,8 @@ |
||
26 | 26 | $server = \OC::$server; |
27 | 27 | |
28 | 28 | $controller = new \OC\OCS\Provider( |
29 | - 'ocs_provider', |
|
30 | - $server->getRequest(), |
|
31 | - $server->getAppManager() |
|
29 | + 'ocs_provider', |
|
30 | + $server->getRequest(), |
|
31 | + $server->getAppManager() |
|
32 | 32 | ); |
33 | 33 | echo $controller->buildProviderList()->render(); |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | - /** @var array $_ */ |
|
3 | - /** @var \OCP\IL10N $l */ |
|
2 | + /** @var array $_ */ |
|
3 | + /** @var \OCP\IL10N $l */ |
|
4 | 4 | |
5 | 5 | style('core', ['styles', 'header']); |
6 | 6 | ?> |
@@ -34,28 +34,28 @@ |
||
34 | 34 | |
35 | 35 | class RemoveCertificate extends Base { |
36 | 36 | |
37 | - /** @var ICertificateManager */ |
|
38 | - protected $certificateManager; |
|
39 | - |
|
40 | - public function __construct(ICertificateManager $certificateManager) { |
|
41 | - $this->certificateManager = $certificateManager; |
|
42 | - parent::__construct(); |
|
43 | - } |
|
44 | - |
|
45 | - protected function configure() { |
|
46 | - $this |
|
47 | - ->setName('security:certificates:remove') |
|
48 | - ->setDescription('remove trusted certificate') |
|
49 | - ->addArgument( |
|
50 | - 'name', |
|
51 | - InputArgument::REQUIRED, |
|
52 | - 'the file name of the certificate to remove' |
|
53 | - ); |
|
54 | - } |
|
55 | - |
|
56 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
57 | - $name = $input->getArgument('name'); |
|
58 | - |
|
59 | - $this->certificateManager->removeCertificate($name); |
|
60 | - } |
|
37 | + /** @var ICertificateManager */ |
|
38 | + protected $certificateManager; |
|
39 | + |
|
40 | + public function __construct(ICertificateManager $certificateManager) { |
|
41 | + $this->certificateManager = $certificateManager; |
|
42 | + parent::__construct(); |
|
43 | + } |
|
44 | + |
|
45 | + protected function configure() { |
|
46 | + $this |
|
47 | + ->setName('security:certificates:remove') |
|
48 | + ->setDescription('remove trusted certificate') |
|
49 | + ->addArgument( |
|
50 | + 'name', |
|
51 | + InputArgument::REQUIRED, |
|
52 | + 'the file name of the certificate to remove' |
|
53 | + ); |
|
54 | + } |
|
55 | + |
|
56 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
57 | + $name = $input->getArgument('name'); |
|
58 | + |
|
59 | + $this->certificateManager->removeCertificate($name); |
|
60 | + } |
|
61 | 61 | } |
@@ -34,64 +34,64 @@ |
||
34 | 34 | |
35 | 35 | class ListCertificates extends Base { |
36 | 36 | |
37 | - /** @var ICertificateManager */ |
|
38 | - protected $certificateManager; |
|
39 | - /** @var IL10N */ |
|
40 | - protected $l; |
|
37 | + /** @var ICertificateManager */ |
|
38 | + protected $certificateManager; |
|
39 | + /** @var IL10N */ |
|
40 | + protected $l; |
|
41 | 41 | |
42 | - public function __construct(ICertificateManager $certificateManager, IL10N $l) { |
|
43 | - $this->certificateManager = $certificateManager; |
|
44 | - $this->l = $l; |
|
45 | - parent::__construct(); |
|
46 | - } |
|
42 | + public function __construct(ICertificateManager $certificateManager, IL10N $l) { |
|
43 | + $this->certificateManager = $certificateManager; |
|
44 | + $this->l = $l; |
|
45 | + parent::__construct(); |
|
46 | + } |
|
47 | 47 | |
48 | - protected function configure() { |
|
49 | - $this |
|
50 | - ->setName('security:certificates') |
|
51 | - ->setDescription('list trusted certificates'); |
|
52 | - parent::configure(); |
|
53 | - } |
|
48 | + protected function configure() { |
|
49 | + $this |
|
50 | + ->setName('security:certificates') |
|
51 | + ->setDescription('list trusted certificates'); |
|
52 | + parent::configure(); |
|
53 | + } |
|
54 | 54 | |
55 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
56 | - $outputType = $input->getOption('output'); |
|
57 | - if ($outputType === self::OUTPUT_FORMAT_JSON || $outputType === self::OUTPUT_FORMAT_JSON_PRETTY) { |
|
58 | - $certificates = array_map(function (ICertificate $certificate) { |
|
59 | - return [ |
|
60 | - 'name' => $certificate->getName(), |
|
61 | - 'common_name' => $certificate->getCommonName(), |
|
62 | - 'organization' => $certificate->getOrganization(), |
|
63 | - 'expire' => $certificate->getExpireDate()->format(\DateTime::ATOM), |
|
64 | - 'issuer' => $certificate->getIssuerName(), |
|
65 | - 'issuer_organization' => $certificate->getIssuerOrganization(), |
|
66 | - 'issue_date' => $certificate->getIssueDate()->format(\DateTime::ATOM) |
|
67 | - ]; |
|
68 | - }, $this->certificateManager->listCertificates()); |
|
69 | - if ($outputType === self::OUTPUT_FORMAT_JSON) { |
|
70 | - $output->writeln(json_encode(array_values($certificates))); |
|
71 | - } else { |
|
72 | - $output->writeln(json_encode(array_values($certificates), JSON_PRETTY_PRINT)); |
|
73 | - } |
|
74 | - } else { |
|
75 | - $table = new Table($output); |
|
76 | - $table->setHeaders([ |
|
77 | - 'File Name', |
|
78 | - 'Common Name', |
|
79 | - 'Organization', |
|
80 | - 'Valid Until', |
|
81 | - 'Issued By' |
|
82 | - ]); |
|
55 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
56 | + $outputType = $input->getOption('output'); |
|
57 | + if ($outputType === self::OUTPUT_FORMAT_JSON || $outputType === self::OUTPUT_FORMAT_JSON_PRETTY) { |
|
58 | + $certificates = array_map(function (ICertificate $certificate) { |
|
59 | + return [ |
|
60 | + 'name' => $certificate->getName(), |
|
61 | + 'common_name' => $certificate->getCommonName(), |
|
62 | + 'organization' => $certificate->getOrganization(), |
|
63 | + 'expire' => $certificate->getExpireDate()->format(\DateTime::ATOM), |
|
64 | + 'issuer' => $certificate->getIssuerName(), |
|
65 | + 'issuer_organization' => $certificate->getIssuerOrganization(), |
|
66 | + 'issue_date' => $certificate->getIssueDate()->format(\DateTime::ATOM) |
|
67 | + ]; |
|
68 | + }, $this->certificateManager->listCertificates()); |
|
69 | + if ($outputType === self::OUTPUT_FORMAT_JSON) { |
|
70 | + $output->writeln(json_encode(array_values($certificates))); |
|
71 | + } else { |
|
72 | + $output->writeln(json_encode(array_values($certificates), JSON_PRETTY_PRINT)); |
|
73 | + } |
|
74 | + } else { |
|
75 | + $table = new Table($output); |
|
76 | + $table->setHeaders([ |
|
77 | + 'File Name', |
|
78 | + 'Common Name', |
|
79 | + 'Organization', |
|
80 | + 'Valid Until', |
|
81 | + 'Issued By' |
|
82 | + ]); |
|
83 | 83 | |
84 | - $rows = array_map(function (ICertificate $certificate) { |
|
85 | - return [ |
|
86 | - $certificate->getName(), |
|
87 | - $certificate->getCommonName(), |
|
88 | - $certificate->getOrganization(), |
|
89 | - $this->l->l('date', $certificate->getExpireDate()), |
|
90 | - $certificate->getIssuerName() |
|
91 | - ]; |
|
92 | - }, $this->certificateManager->listCertificates()); |
|
93 | - $table->setRows($rows); |
|
94 | - $table->render(); |
|
95 | - } |
|
96 | - } |
|
84 | + $rows = array_map(function (ICertificate $certificate) { |
|
85 | + return [ |
|
86 | + $certificate->getName(), |
|
87 | + $certificate->getCommonName(), |
|
88 | + $certificate->getOrganization(), |
|
89 | + $this->l->l('date', $certificate->getExpireDate()), |
|
90 | + $certificate->getIssuerName() |
|
91 | + ]; |
|
92 | + }, $this->certificateManager->listCertificates()); |
|
93 | + $table->setRows($rows); |
|
94 | + $table->render(); |
|
95 | + } |
|
96 | + } |
|
97 | 97 | } |
@@ -33,36 +33,36 @@ |
||
33 | 33 | |
34 | 34 | class ImportCertificate extends Base { |
35 | 35 | |
36 | - /** @var ICertificateManager */ |
|
37 | - protected $certificateManager; |
|
36 | + /** @var ICertificateManager */ |
|
37 | + protected $certificateManager; |
|
38 | 38 | |
39 | - public function __construct(ICertificateManager $certificateManager) { |
|
40 | - $this->certificateManager = $certificateManager; |
|
41 | - parent::__construct(); |
|
42 | - } |
|
39 | + public function __construct(ICertificateManager $certificateManager) { |
|
40 | + $this->certificateManager = $certificateManager; |
|
41 | + parent::__construct(); |
|
42 | + } |
|
43 | 43 | |
44 | - protected function configure() { |
|
45 | - $this |
|
46 | - ->setName('security:certificates:import') |
|
47 | - ->setDescription('import trusted certificate') |
|
48 | - ->addArgument( |
|
49 | - 'path', |
|
50 | - InputArgument::REQUIRED, |
|
51 | - 'path to the certificate to import' |
|
52 | - ); |
|
53 | - } |
|
44 | + protected function configure() { |
|
45 | + $this |
|
46 | + ->setName('security:certificates:import') |
|
47 | + ->setDescription('import trusted certificate') |
|
48 | + ->addArgument( |
|
49 | + 'path', |
|
50 | + InputArgument::REQUIRED, |
|
51 | + 'path to the certificate to import' |
|
52 | + ); |
|
53 | + } |
|
54 | 54 | |
55 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
56 | - $path = $input->getArgument('path'); |
|
55 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
56 | + $path = $input->getArgument('path'); |
|
57 | 57 | |
58 | - if (!file_exists($path)) { |
|
59 | - $output->writeln('<error>certificate not found</error>'); |
|
60 | - return; |
|
61 | - } |
|
58 | + if (!file_exists($path)) { |
|
59 | + $output->writeln('<error>certificate not found</error>'); |
|
60 | + return; |
|
61 | + } |
|
62 | 62 | |
63 | - $certData = file_get_contents($path); |
|
64 | - $name = basename($path); |
|
63 | + $certData = file_get_contents($path); |
|
64 | + $name = basename($path); |
|
65 | 65 | |
66 | - $this->certificateManager->addCertificate($certData, $name); |
|
67 | - } |
|
66 | + $this->certificateManager->addCertificate($certData, $name); |
|
67 | + } |
|
68 | 68 | } |
@@ -37,69 +37,69 @@ |
||
37 | 37 | * @package OC\Core\Command\Integrity |
38 | 38 | */ |
39 | 39 | class SignCore extends Command { |
40 | - /** @var Checker */ |
|
41 | - private $checker; |
|
42 | - /** @var FileAccessHelper */ |
|
43 | - private $fileAccessHelper; |
|
40 | + /** @var Checker */ |
|
41 | + private $checker; |
|
42 | + /** @var FileAccessHelper */ |
|
43 | + private $fileAccessHelper; |
|
44 | 44 | |
45 | - /** |
|
46 | - * @param Checker $checker |
|
47 | - * @param FileAccessHelper $fileAccessHelper |
|
48 | - */ |
|
49 | - public function __construct(Checker $checker, |
|
50 | - FileAccessHelper $fileAccessHelper) { |
|
51 | - parent::__construct(null); |
|
52 | - $this->checker = $checker; |
|
53 | - $this->fileAccessHelper = $fileAccessHelper; |
|
54 | - } |
|
45 | + /** |
|
46 | + * @param Checker $checker |
|
47 | + * @param FileAccessHelper $fileAccessHelper |
|
48 | + */ |
|
49 | + public function __construct(Checker $checker, |
|
50 | + FileAccessHelper $fileAccessHelper) { |
|
51 | + parent::__construct(null); |
|
52 | + $this->checker = $checker; |
|
53 | + $this->fileAccessHelper = $fileAccessHelper; |
|
54 | + } |
|
55 | 55 | |
56 | - protected function configure() { |
|
57 | - $this |
|
58 | - ->setName('integrity:sign-core') |
|
59 | - ->setDescription('Sign core using a private key.') |
|
60 | - ->addOption('privateKey', null, InputOption::VALUE_REQUIRED, 'Path to private key to use for signing') |
|
61 | - ->addOption('certificate', null, InputOption::VALUE_REQUIRED, 'Path to certificate to use for signing') |
|
62 | - ->addOption('path', null, InputOption::VALUE_REQUIRED, 'Path of core to sign'); |
|
63 | - } |
|
56 | + protected function configure() { |
|
57 | + $this |
|
58 | + ->setName('integrity:sign-core') |
|
59 | + ->setDescription('Sign core using a private key.') |
|
60 | + ->addOption('privateKey', null, InputOption::VALUE_REQUIRED, 'Path to private key to use for signing') |
|
61 | + ->addOption('certificate', null, InputOption::VALUE_REQUIRED, 'Path to certificate to use for signing') |
|
62 | + ->addOption('path', null, InputOption::VALUE_REQUIRED, 'Path of core to sign'); |
|
63 | + } |
|
64 | 64 | |
65 | - /** |
|
66 | - * {@inheritdoc } |
|
67 | - */ |
|
68 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
69 | - $privateKeyPath = $input->getOption('privateKey'); |
|
70 | - $keyBundlePath = $input->getOption('certificate'); |
|
71 | - $path = $input->getOption('path'); |
|
72 | - if(is_null($privateKeyPath) || is_null($keyBundlePath) || is_null($path)) { |
|
73 | - $output->writeln('--privateKey, --certificate and --path are required.'); |
|
74 | - return null; |
|
75 | - } |
|
65 | + /** |
|
66 | + * {@inheritdoc } |
|
67 | + */ |
|
68 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
69 | + $privateKeyPath = $input->getOption('privateKey'); |
|
70 | + $keyBundlePath = $input->getOption('certificate'); |
|
71 | + $path = $input->getOption('path'); |
|
72 | + if(is_null($privateKeyPath) || is_null($keyBundlePath) || is_null($path)) { |
|
73 | + $output->writeln('--privateKey, --certificate and --path are required.'); |
|
74 | + return null; |
|
75 | + } |
|
76 | 76 | |
77 | - $privateKey = $this->fileAccessHelper->file_get_contents($privateKeyPath); |
|
78 | - $keyBundle = $this->fileAccessHelper->file_get_contents($keyBundlePath); |
|
77 | + $privateKey = $this->fileAccessHelper->file_get_contents($privateKeyPath); |
|
78 | + $keyBundle = $this->fileAccessHelper->file_get_contents($keyBundlePath); |
|
79 | 79 | |
80 | - if($privateKey === false) { |
|
81 | - $output->writeln(sprintf('Private key "%s" does not exists.', $privateKeyPath)); |
|
82 | - return null; |
|
83 | - } |
|
80 | + if($privateKey === false) { |
|
81 | + $output->writeln(sprintf('Private key "%s" does not exists.', $privateKeyPath)); |
|
82 | + return null; |
|
83 | + } |
|
84 | 84 | |
85 | - if($keyBundle === false) { |
|
86 | - $output->writeln(sprintf('Certificate "%s" does not exists.', $keyBundlePath)); |
|
87 | - return null; |
|
88 | - } |
|
85 | + if($keyBundle === false) { |
|
86 | + $output->writeln(sprintf('Certificate "%s" does not exists.', $keyBundlePath)); |
|
87 | + return null; |
|
88 | + } |
|
89 | 89 | |
90 | - $rsa = new RSA(); |
|
91 | - $rsa->loadKey($privateKey); |
|
92 | - $x509 = new X509(); |
|
93 | - $x509->loadX509($keyBundle); |
|
94 | - $x509->setPrivateKey($rsa); |
|
90 | + $rsa = new RSA(); |
|
91 | + $rsa->loadKey($privateKey); |
|
92 | + $x509 = new X509(); |
|
93 | + $x509->loadX509($keyBundle); |
|
94 | + $x509->setPrivateKey($rsa); |
|
95 | 95 | |
96 | - try { |
|
97 | - $this->checker->writeCoreSignature($x509, $rsa, $path); |
|
98 | - $output->writeln('Successfully signed "core"'); |
|
99 | - } catch (\Exception $e){ |
|
100 | - $output->writeln('Error: ' . $e->getMessage()); |
|
101 | - return 1; |
|
102 | - } |
|
103 | - return 0; |
|
104 | - } |
|
96 | + try { |
|
97 | + $this->checker->writeCoreSignature($x509, $rsa, $path); |
|
98 | + $output->writeln('Successfully signed "core"'); |
|
99 | + } catch (\Exception $e){ |
|
100 | + $output->writeln('Error: ' . $e->getMessage()); |
|
101 | + return 1; |
|
102 | + } |
|
103 | + return 0; |
|
104 | + } |
|
105 | 105 | } |
@@ -38,76 +38,76 @@ |
||
38 | 38 | * @package OC\Core\Command\Integrity |
39 | 39 | */ |
40 | 40 | class SignApp extends Command { |
41 | - /** @var Checker */ |
|
42 | - private $checker; |
|
43 | - /** @var FileAccessHelper */ |
|
44 | - private $fileAccessHelper; |
|
45 | - /** @var IURLGenerator */ |
|
46 | - private $urlGenerator; |
|
41 | + /** @var Checker */ |
|
42 | + private $checker; |
|
43 | + /** @var FileAccessHelper */ |
|
44 | + private $fileAccessHelper; |
|
45 | + /** @var IURLGenerator */ |
|
46 | + private $urlGenerator; |
|
47 | 47 | |
48 | - /** |
|
49 | - * @param Checker $checker |
|
50 | - * @param FileAccessHelper $fileAccessHelper |
|
51 | - * @param IURLGenerator $urlGenerator |
|
52 | - */ |
|
53 | - public function __construct(Checker $checker, |
|
54 | - FileAccessHelper $fileAccessHelper, |
|
55 | - IURLGenerator $urlGenerator) { |
|
56 | - parent::__construct(null); |
|
57 | - $this->checker = $checker; |
|
58 | - $this->fileAccessHelper = $fileAccessHelper; |
|
59 | - $this->urlGenerator = $urlGenerator; |
|
60 | - } |
|
48 | + /** |
|
49 | + * @param Checker $checker |
|
50 | + * @param FileAccessHelper $fileAccessHelper |
|
51 | + * @param IURLGenerator $urlGenerator |
|
52 | + */ |
|
53 | + public function __construct(Checker $checker, |
|
54 | + FileAccessHelper $fileAccessHelper, |
|
55 | + IURLGenerator $urlGenerator) { |
|
56 | + parent::__construct(null); |
|
57 | + $this->checker = $checker; |
|
58 | + $this->fileAccessHelper = $fileAccessHelper; |
|
59 | + $this->urlGenerator = $urlGenerator; |
|
60 | + } |
|
61 | 61 | |
62 | - protected function configure() { |
|
63 | - $this |
|
64 | - ->setName('integrity:sign-app') |
|
65 | - ->setDescription('Signs an app using a private key.') |
|
66 | - ->addOption('path', null, InputOption::VALUE_REQUIRED, 'Application to sign') |
|
67 | - ->addOption('privateKey', null, InputOption::VALUE_REQUIRED, 'Path to private key to use for signing') |
|
68 | - ->addOption('certificate', null, InputOption::VALUE_REQUIRED, 'Path to certificate to use for signing'); |
|
69 | - } |
|
62 | + protected function configure() { |
|
63 | + $this |
|
64 | + ->setName('integrity:sign-app') |
|
65 | + ->setDescription('Signs an app using a private key.') |
|
66 | + ->addOption('path', null, InputOption::VALUE_REQUIRED, 'Application to sign') |
|
67 | + ->addOption('privateKey', null, InputOption::VALUE_REQUIRED, 'Path to private key to use for signing') |
|
68 | + ->addOption('certificate', null, InputOption::VALUE_REQUIRED, 'Path to certificate to use for signing'); |
|
69 | + } |
|
70 | 70 | |
71 | - /** |
|
72 | - * {@inheritdoc } |
|
73 | - */ |
|
74 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
75 | - $path = $input->getOption('path'); |
|
76 | - $privateKeyPath = $input->getOption('privateKey'); |
|
77 | - $keyBundlePath = $input->getOption('certificate'); |
|
78 | - if(is_null($path) || is_null($privateKeyPath) || is_null($keyBundlePath)) { |
|
79 | - $documentationUrl = $this->urlGenerator->linkToDocs('developer-code-integrity'); |
|
80 | - $output->writeln('This command requires the --path, --privateKey and --certificate.'); |
|
81 | - $output->writeln('Example: ./occ integrity:sign-app --path="/Users/lukasreschke/Programming/myapp/" --privateKey="/Users/lukasreschke/private/myapp.key" --certificate="/Users/lukasreschke/public/mycert.crt"'); |
|
82 | - $output->writeln('For more information please consult the documentation: '. $documentationUrl); |
|
83 | - return null; |
|
84 | - } |
|
71 | + /** |
|
72 | + * {@inheritdoc } |
|
73 | + */ |
|
74 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
75 | + $path = $input->getOption('path'); |
|
76 | + $privateKeyPath = $input->getOption('privateKey'); |
|
77 | + $keyBundlePath = $input->getOption('certificate'); |
|
78 | + if(is_null($path) || is_null($privateKeyPath) || is_null($keyBundlePath)) { |
|
79 | + $documentationUrl = $this->urlGenerator->linkToDocs('developer-code-integrity'); |
|
80 | + $output->writeln('This command requires the --path, --privateKey and --certificate.'); |
|
81 | + $output->writeln('Example: ./occ integrity:sign-app --path="/Users/lukasreschke/Programming/myapp/" --privateKey="/Users/lukasreschke/private/myapp.key" --certificate="/Users/lukasreschke/public/mycert.crt"'); |
|
82 | + $output->writeln('For more information please consult the documentation: '. $documentationUrl); |
|
83 | + return null; |
|
84 | + } |
|
85 | 85 | |
86 | - $privateKey = $this->fileAccessHelper->file_get_contents($privateKeyPath); |
|
87 | - $keyBundle = $this->fileAccessHelper->file_get_contents($keyBundlePath); |
|
86 | + $privateKey = $this->fileAccessHelper->file_get_contents($privateKeyPath); |
|
87 | + $keyBundle = $this->fileAccessHelper->file_get_contents($keyBundlePath); |
|
88 | 88 | |
89 | - if($privateKey === false) { |
|
90 | - $output->writeln(sprintf('Private key "%s" does not exists.', $privateKeyPath)); |
|
91 | - return null; |
|
92 | - } |
|
89 | + if($privateKey === false) { |
|
90 | + $output->writeln(sprintf('Private key "%s" does not exists.', $privateKeyPath)); |
|
91 | + return null; |
|
92 | + } |
|
93 | 93 | |
94 | - if($keyBundle === false) { |
|
95 | - $output->writeln(sprintf('Certificate "%s" does not exists.', $keyBundlePath)); |
|
96 | - return null; |
|
97 | - } |
|
94 | + if($keyBundle === false) { |
|
95 | + $output->writeln(sprintf('Certificate "%s" does not exists.', $keyBundlePath)); |
|
96 | + return null; |
|
97 | + } |
|
98 | 98 | |
99 | - $rsa = new RSA(); |
|
100 | - $rsa->loadKey($privateKey); |
|
101 | - $x509 = new X509(); |
|
102 | - $x509->loadX509($keyBundle); |
|
103 | - $x509->setPrivateKey($rsa); |
|
104 | - try { |
|
105 | - $this->checker->writeAppSignature($path, $x509, $rsa); |
|
106 | - $output->writeln('Successfully signed "'.$path.'"'); |
|
107 | - } catch (\Exception $e){ |
|
108 | - $output->writeln('Error: ' . $e->getMessage()); |
|
109 | - return 1; |
|
110 | - } |
|
111 | - return 0; |
|
112 | - } |
|
99 | + $rsa = new RSA(); |
|
100 | + $rsa->loadKey($privateKey); |
|
101 | + $x509 = new X509(); |
|
102 | + $x509->loadX509($keyBundle); |
|
103 | + $x509->setPrivateKey($rsa); |
|
104 | + try { |
|
105 | + $this->checker->writeAppSignature($path, $x509, $rsa); |
|
106 | + $output->writeln('Successfully signed "'.$path.'"'); |
|
107 | + } catch (\Exception $e){ |
|
108 | + $output->writeln('Error: ' . $e->getMessage()); |
|
109 | + return 1; |
|
110 | + } |
|
111 | + return 0; |
|
112 | + } |
|
113 | 113 | } |
@@ -34,34 +34,34 @@ |
||
34 | 34 | * @package OC\Core\Command\Integrity |
35 | 35 | */ |
36 | 36 | class CheckCore extends Base { |
37 | - /** |
|
38 | - * @var Checker |
|
39 | - */ |
|
40 | - private $checker; |
|
37 | + /** |
|
38 | + * @var Checker |
|
39 | + */ |
|
40 | + private $checker; |
|
41 | 41 | |
42 | - public function __construct(Checker $checker) { |
|
43 | - parent::__construct(); |
|
44 | - $this->checker = $checker; |
|
45 | - } |
|
42 | + public function __construct(Checker $checker) { |
|
43 | + parent::__construct(); |
|
44 | + $this->checker = $checker; |
|
45 | + } |
|
46 | 46 | |
47 | - /** |
|
48 | - * {@inheritdoc } |
|
49 | - */ |
|
50 | - protected function configure() { |
|
51 | - parent::configure(); |
|
52 | - $this |
|
53 | - ->setName('integrity:check-core') |
|
54 | - ->setDescription('Check integrity of core code using a signature.'); |
|
55 | - } |
|
47 | + /** |
|
48 | + * {@inheritdoc } |
|
49 | + */ |
|
50 | + protected function configure() { |
|
51 | + parent::configure(); |
|
52 | + $this |
|
53 | + ->setName('integrity:check-core') |
|
54 | + ->setDescription('Check integrity of core code using a signature.'); |
|
55 | + } |
|
56 | 56 | |
57 | - /** |
|
58 | - * {@inheritdoc } |
|
59 | - */ |
|
60 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
61 | - $result = $this->checker->verifyCoreSignature(); |
|
62 | - $this->writeArrayInOutputFormat($input, $output, $result); |
|
63 | - if (count($result)>0){ |
|
64 | - return 1; |
|
65 | - } |
|
66 | - } |
|
57 | + /** |
|
58 | + * {@inheritdoc } |
|
59 | + */ |
|
60 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
61 | + $result = $this->checker->verifyCoreSignature(); |
|
62 | + $this->writeArrayInOutputFormat($input, $output, $result); |
|
63 | + if (count($result)>0){ |
|
64 | + return 1; |
|
65 | + } |
|
66 | + } |
|
67 | 67 | } |
@@ -32,56 +32,56 @@ |
||
32 | 32 | use Symfony\Component\Console\Output\OutputInterface; |
33 | 33 | |
34 | 34 | class Report extends Command { |
35 | - /** @var IUserManager */ |
|
36 | - protected $userManager; |
|
35 | + /** @var IUserManager */ |
|
36 | + protected $userManager; |
|
37 | 37 | |
38 | - /** |
|
39 | - * @param IUserManager $userManager |
|
40 | - */ |
|
41 | - public function __construct(IUserManager $userManager) { |
|
42 | - $this->userManager = $userManager; |
|
43 | - parent::__construct(); |
|
44 | - } |
|
38 | + /** |
|
39 | + * @param IUserManager $userManager |
|
40 | + */ |
|
41 | + public function __construct(IUserManager $userManager) { |
|
42 | + $this->userManager = $userManager; |
|
43 | + parent::__construct(); |
|
44 | + } |
|
45 | 45 | |
46 | - protected function configure() { |
|
47 | - $this |
|
48 | - ->setName('user:report') |
|
49 | - ->setDescription('shows how many users have access'); |
|
50 | - } |
|
46 | + protected function configure() { |
|
47 | + $this |
|
48 | + ->setName('user:report') |
|
49 | + ->setDescription('shows how many users have access'); |
|
50 | + } |
|
51 | 51 | |
52 | - protected function execute(InputInterface $input, OutputInterface $output) { |
|
53 | - $table = new Table($output); |
|
54 | - $table->setHeaders(array('User Report', '')); |
|
55 | - $userCountArray = $this->countUsers(); |
|
56 | - if(!empty($userCountArray)) { |
|
57 | - $total = 0; |
|
58 | - $rows = array(); |
|
59 | - foreach($userCountArray as $classname => $users) { |
|
60 | - $total += $users; |
|
61 | - $rows[] = array($classname, $users); |
|
62 | - } |
|
52 | + protected function execute(InputInterface $input, OutputInterface $output) { |
|
53 | + $table = new Table($output); |
|
54 | + $table->setHeaders(array('User Report', '')); |
|
55 | + $userCountArray = $this->countUsers(); |
|
56 | + if(!empty($userCountArray)) { |
|
57 | + $total = 0; |
|
58 | + $rows = array(); |
|
59 | + foreach($userCountArray as $classname => $users) { |
|
60 | + $total += $users; |
|
61 | + $rows[] = array($classname, $users); |
|
62 | + } |
|
63 | 63 | |
64 | - $rows[] = array(' '); |
|
65 | - $rows[] = array('total users', $total); |
|
66 | - } else { |
|
67 | - $rows[] = array('No backend enabled that supports user counting', ''); |
|
68 | - } |
|
64 | + $rows[] = array(' '); |
|
65 | + $rows[] = array('total users', $total); |
|
66 | + } else { |
|
67 | + $rows[] = array('No backend enabled that supports user counting', ''); |
|
68 | + } |
|
69 | 69 | |
70 | - $userDirectoryCount = $this->countUserDirectories(); |
|
71 | - $rows[] = array(' '); |
|
72 | - $rows[] = array('user directories', $userDirectoryCount); |
|
70 | + $userDirectoryCount = $this->countUserDirectories(); |
|
71 | + $rows[] = array(' '); |
|
72 | + $rows[] = array('user directories', $userDirectoryCount); |
|
73 | 73 | |
74 | - $table->setRows($rows); |
|
75 | - $table->render(); |
|
76 | - } |
|
74 | + $table->setRows($rows); |
|
75 | + $table->render(); |
|
76 | + } |
|
77 | 77 | |
78 | - private function countUsers() { |
|
79 | - return $this->userManager->countUsers(); |
|
80 | - } |
|
78 | + private function countUsers() { |
|
79 | + return $this->userManager->countUsers(); |
|
80 | + } |
|
81 | 81 | |
82 | - private function countUserDirectories() { |
|
83 | - $dataview = new \OC\Files\View('/'); |
|
84 | - $userDirectories = $dataview->getDirectoryContent('/', 'httpd/unix-directory'); |
|
85 | - return count($userDirectories); |
|
86 | - } |
|
82 | + private function countUserDirectories() { |
|
83 | + $dataview = new \OC\Files\View('/'); |
|
84 | + $userDirectories = $dataview->getDirectoryContent('/', 'httpd/unix-directory'); |
|
85 | + return count($userDirectories); |
|
86 | + } |
|
87 | 87 | } |