Completed
Pull Request — master (#8821)
by Joas
27:41 queued 08:42
created
lib/private/OCS/Provider.php 1 patch
Indentation   +81 added lines, -81 removed lines patch added patch discarded remove patch
@@ -24,92 +24,92 @@
 block discarded – undo
24 24
 namespace OC\OCS;
25 25
 
26 26
 class Provider extends \OCP\AppFramework\Controller {
27
-	/** @var \OCP\App\IAppManager */
28
-	private $appManager;
27
+    /** @var \OCP\App\IAppManager */
28
+    private $appManager;
29 29
 
30
-	/**
31
-	 * @param string $appName
32
-	 * @param \OCP\IRequest $request
33
-	 * @param \OCP\App\IAppManager $appManager
34
-	 */
35
-	public function __construct($appName,
36
-								\OCP\IRequest $request,
37
-								\OCP\App\IAppManager $appManager) {
38
-		parent::__construct($appName, $request);
39
-		$this->appManager = $appManager;
40
-	}
30
+    /**
31
+     * @param string $appName
32
+     * @param \OCP\IRequest $request
33
+     * @param \OCP\App\IAppManager $appManager
34
+     */
35
+    public function __construct($appName,
36
+                                \OCP\IRequest $request,
37
+                                \OCP\App\IAppManager $appManager) {
38
+        parent::__construct($appName, $request);
39
+        $this->appManager = $appManager;
40
+    }
41 41
 
42
-	/**
43
-	 * @return \OCP\AppFramework\Http\JSONResponse
44
-	 */
45
-	public function buildProviderList() {
46
-		$services = [
47
-			'PRIVATE_DATA' => [
48
-				'version' => 1,
49
-				'endpoints' => [
50
-					'store' => '/ocs/v2.php/privatedata/setattribute',
51
-					'read' => '/ocs/v2.php/privatedata/getattribute',
52
-					'delete' => '/ocs/v2.php/privatedata/deleteattribute',
53
-				],
54
-			],
55
-		];
42
+    /**
43
+     * @return \OCP\AppFramework\Http\JSONResponse
44
+     */
45
+    public function buildProviderList() {
46
+        $services = [
47
+            'PRIVATE_DATA' => [
48
+                'version' => 1,
49
+                'endpoints' => [
50
+                    'store' => '/ocs/v2.php/privatedata/setattribute',
51
+                    'read' => '/ocs/v2.php/privatedata/getattribute',
52
+                    'delete' => '/ocs/v2.php/privatedata/deleteattribute',
53
+                ],
54
+            ],
55
+        ];
56 56
 
57
-		if($this->appManager->isEnabledForUser('files_sharing')) {
58
-			$services['SHARING'] = [
59
-				'version' => 1,
60
-				'endpoints' => [
61
-					'share' => '/ocs/v2.php/apps/files_sharing/api/v1/shares',
62
-				],
63
-			];
64
-			$services['FEDERATED_SHARING'] = [
65
-				'version' => 1,
66
-				'endpoints' => [
67
-					'share' => '/ocs/v2.php/cloud/shares',
68
-					'webdav' => '/public.php/webdav/',
69
-				],
70
-			];
71
-		}
57
+        if($this->appManager->isEnabledForUser('files_sharing')) {
58
+            $services['SHARING'] = [
59
+                'version' => 1,
60
+                'endpoints' => [
61
+                    'share' => '/ocs/v2.php/apps/files_sharing/api/v1/shares',
62
+                ],
63
+            ];
64
+            $services['FEDERATED_SHARING'] = [
65
+                'version' => 1,
66
+                'endpoints' => [
67
+                    'share' => '/ocs/v2.php/cloud/shares',
68
+                    'webdav' => '/public.php/webdav/',
69
+                ],
70
+            ];
71
+        }
72 72
 
73
-		if ($this->appManager->isEnabledForUser('federation')) {
74
-			if (isset($services['FEDERATED_SHARING'])) {
75
-				$services['FEDERATED_SHARING']['endpoints']['shared-secret'] = '/ocs/v2.php/cloud/shared-secret';
76
-				$services['FEDERATED_SHARING']['endpoints']['system-address-book'] = '/remote.php/dav/addressbooks/system/system/system';
77
-				$services['FEDERATED_SHARING']['endpoints']['carddav-user'] = 'system';
78
-			} else {
79
-				$services['FEDERATED_SHARING'] = [
80
-					'version' => 1,
81
-					'endpoints' => [
82
-						'shared-secret' => '/ocs/v2.php/cloud/shared-secret',
83
-						'system-address-book' => '/remote.php/dav/addressbooks/system/system/system',
84
-						'carddav-user' => 'system'
85
-					],
86
-				];
87
-			}
88
-		}
73
+        if ($this->appManager->isEnabledForUser('federation')) {
74
+            if (isset($services['FEDERATED_SHARING'])) {
75
+                $services['FEDERATED_SHARING']['endpoints']['shared-secret'] = '/ocs/v2.php/cloud/shared-secret';
76
+                $services['FEDERATED_SHARING']['endpoints']['system-address-book'] = '/remote.php/dav/addressbooks/system/system/system';
77
+                $services['FEDERATED_SHARING']['endpoints']['carddav-user'] = 'system';
78
+            } else {
79
+                $services['FEDERATED_SHARING'] = [
80
+                    'version' => 1,
81
+                    'endpoints' => [
82
+                        'shared-secret' => '/ocs/v2.php/cloud/shared-secret',
83
+                        'system-address-book' => '/remote.php/dav/addressbooks/system/system/system',
84
+                        'carddav-user' => 'system'
85
+                    ],
86
+                ];
87
+            }
88
+        }
89 89
 
90
-		if($this->appManager->isEnabledForUser('activity')) {
91
-			$services['ACTIVITY'] = [
92
-				'version' => 1,
93
-				'endpoints' => [
94
-					'list' => '/ocs/v2.php/cloud/activity',
95
-				],
96
-			];
97
-		}
90
+        if($this->appManager->isEnabledForUser('activity')) {
91
+            $services['ACTIVITY'] = [
92
+                'version' => 1,
93
+                'endpoints' => [
94
+                    'list' => '/ocs/v2.php/cloud/activity',
95
+                ],
96
+            ];
97
+        }
98 98
 
99
-		if($this->appManager->isEnabledForUser('provisioning_api')) {
100
-			$services['PROVISIONING'] = [
101
-				'version' => 1,
102
-				'endpoints' => [
103
-					'user' => '/ocs/v2.php/cloud/users',
104
-					'groups' => '/ocs/v2.php/cloud/groups',
105
-					'apps' => '/ocs/v2.php/cloud/apps',
106
-				],
107
-			];
108
-		}
99
+        if($this->appManager->isEnabledForUser('provisioning_api')) {
100
+            $services['PROVISIONING'] = [
101
+                'version' => 1,
102
+                'endpoints' => [
103
+                    'user' => '/ocs/v2.php/cloud/users',
104
+                    'groups' => '/ocs/v2.php/cloud/groups',
105
+                    'apps' => '/ocs/v2.php/cloud/apps',
106
+                ],
107
+            ];
108
+        }
109 109
 
110
-		return new \OCP\AppFramework\Http\JSONResponse([
111
-			'version' => 2,
112
-			'services' => $services,
113
-		]);
114
-	}
110
+        return new \OCP\AppFramework\Http\JSONResponse([
111
+            'version' => 2,
112
+            'services' => $services,
113
+        ]);
114
+    }
115 115
 }
Please login to merge, or discard this patch.
lib/private/Preview/MP3.php 1 patch
Indentation   +28 added lines, -28 removed lines patch added patch discarded remove patch
@@ -29,38 +29,38 @@
 block discarded – undo
29 29
 use ID3Parser\ID3Parser;
30 30
 
31 31
 class MP3 extends Provider {
32
-	/**
33
-	 * {@inheritDoc}
34
-	 */
35
-	public function getMimeType() {
36
-		return '/audio\/mpeg/';
37
-	}
32
+    /**
33
+     * {@inheritDoc}
34
+     */
35
+    public function getMimeType() {
36
+        return '/audio\/mpeg/';
37
+    }
38 38
 
39
-	/**
40
-	 * {@inheritDoc}
41
-	 */
42
-	public function getThumbnail($path, $maxX, $maxY, $scalingup, $fileview) {
43
-		$getID3 = new ID3Parser();
39
+    /**
40
+     * {@inheritDoc}
41
+     */
42
+    public function getThumbnail($path, $maxX, $maxY, $scalingup, $fileview) {
43
+        $getID3 = new ID3Parser();
44 44
 
45
-		$tmpPath = $fileview->toTmpFile($path);
46
-		$tags = $getID3->analyze($tmpPath);
47
-		unlink($tmpPath);
48
-		$picture = isset($tags['id3v2']['APIC'][0]['data']) ? $tags['id3v2']['APIC'][0]['data'] : null;
49
-		if(is_null($picture) && isset($tags['id3v2']['PIC'][0]['data'])) {
50
-			$picture = $tags['id3v2']['PIC'][0]['data'];
51
-		}
45
+        $tmpPath = $fileview->toTmpFile($path);
46
+        $tags = $getID3->analyze($tmpPath);
47
+        unlink($tmpPath);
48
+        $picture = isset($tags['id3v2']['APIC'][0]['data']) ? $tags['id3v2']['APIC'][0]['data'] : null;
49
+        if(is_null($picture) && isset($tags['id3v2']['PIC'][0]['data'])) {
50
+            $picture = $tags['id3v2']['PIC'][0]['data'];
51
+        }
52 52
 
53
-		if(!is_null($picture)) {
54
-			$image = new \OC_Image();
55
-			$image->loadFromData($picture);
53
+        if(!is_null($picture)) {
54
+            $image = new \OC_Image();
55
+            $image->loadFromData($picture);
56 56
 
57
-			if ($image->valid()) {
58
-				$image->scaleDownToFit($maxX, $maxY);
57
+            if ($image->valid()) {
58
+                $image->scaleDownToFit($maxX, $maxY);
59 59
 
60
-				return $image;
61
-			}
62
-		}
60
+                return $image;
61
+            }
62
+        }
63 63
 
64
-		return false;
65
-	}
64
+        return false;
65
+    }
66 66
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/appinfo/routes.php 1 patch
Indentation   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -23,18 +23,18 @@
 block discarded – undo
23 23
  */
24 24
 
25 25
 return [
26
-	'routes' => [
27
-		['name' => 'MountPublicLink#createFederatedShare', 'url' => '/createFederatedShare', 'verb' => 'POST'],
28
-		['name' => 'MountPublicLink#askForFederatedShare', 'url' => '/askForFederatedShare', 'verb' => 'POST'],
29
-	],
30
-	'ocs' => [
31
-		['root' => '/cloud', 'name' => 'RequestHandler#createShare', 'url' => '/shares', 'verb' => 'POST'],
32
-		['root' => '/cloud', 'name' => 'RequestHandler#reShare', 'url' => '/shares/{id}/reshare', 'verb' => 'POST'],
33
-		['root' => '/cloud', 'name' => 'RequestHandler#updatePermissions', 'url' => '/shares/{id}/permissions', 'verb' => 'POST'],
34
-		['root' => '/cloud', 'name' => 'RequestHandler#acceptShare', 'url' => '/shares/{id}/accept', 'verb' => 'POST'],
35
-		['root' => '/cloud', 'name' => 'RequestHandler#declineShare', 'url' => '/shares/{id}/decline', 'verb' => 'POST'],
36
-		['root' => '/cloud', 'name' => 'RequestHandler#unshare', 'url' => '/shares/{id}/unshare', 'verb' => 'POST'],
37
-		['root' => '/cloud', 'name' => 'RequestHandler#revoke', 'url' => '/shares/{id}/revoke', 'verb' => 'POST'],
38
-		['root' => '/cloud', 'name' => 'RequestHandler#move', 'url' => '/shares/{id}/move', 'verb' => 'POST'],
39
-	],
26
+    'routes' => [
27
+        ['name' => 'MountPublicLink#createFederatedShare', 'url' => '/createFederatedShare', 'verb' => 'POST'],
28
+        ['name' => 'MountPublicLink#askForFederatedShare', 'url' => '/askForFederatedShare', 'verb' => 'POST'],
29
+    ],
30
+    'ocs' => [
31
+        ['root' => '/cloud', 'name' => 'RequestHandler#createShare', 'url' => '/shares', 'verb' => 'POST'],
32
+        ['root' => '/cloud', 'name' => 'RequestHandler#reShare', 'url' => '/shares/{id}/reshare', 'verb' => 'POST'],
33
+        ['root' => '/cloud', 'name' => 'RequestHandler#updatePermissions', 'url' => '/shares/{id}/permissions', 'verb' => 'POST'],
34
+        ['root' => '/cloud', 'name' => 'RequestHandler#acceptShare', 'url' => '/shares/{id}/accept', 'verb' => 'POST'],
35
+        ['root' => '/cloud', 'name' => 'RequestHandler#declineShare', 'url' => '/shares/{id}/decline', 'verb' => 'POST'],
36
+        ['root' => '/cloud', 'name' => 'RequestHandler#unshare', 'url' => '/shares/{id}/unshare', 'verb' => 'POST'],
37
+        ['root' => '/cloud', 'name' => 'RequestHandler#revoke', 'url' => '/shares/{id}/revoke', 'verb' => 'POST'],
38
+        ['root' => '/cloud', 'name' => 'RequestHandler#move', 'url' => '/shares/{id}/move', 'verb' => 'POST'],
39
+    ],
40 40
 ];
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/Notifications.php 1 patch
Indentation   +276 added lines, -276 removed lines patch added patch discarded remove patch
@@ -33,280 +33,280 @@
 block discarded – undo
33 33
 use OCP\OCS\IDiscoveryService;
34 34
 
35 35
 class Notifications {
36
-	const RESPONSE_FORMAT = 'json'; // default response format for ocs calls
37
-
38
-	/** @var AddressHandler */
39
-	private $addressHandler;
40
-
41
-	/** @var IClientService */
42
-	private $httpClientService;
43
-
44
-	/** @var IDiscoveryService */
45
-	private $discoveryService;
46
-
47
-	/** @var IJobList  */
48
-	private $jobList;
49
-
50
-	/**
51
-	 * @param AddressHandler $addressHandler
52
-	 * @param IClientService $httpClientService
53
-	 * @param IDiscoveryService $discoveryService
54
-	 * @param IJobList $jobList
55
-	 */
56
-	public function __construct(
57
-		AddressHandler $addressHandler,
58
-		IClientService $httpClientService,
59
-		IDiscoveryService $discoveryService,
60
-		IJobList $jobList
61
-	) {
62
-		$this->addressHandler = $addressHandler;
63
-		$this->httpClientService = $httpClientService;
64
-		$this->discoveryService = $discoveryService;
65
-		$this->jobList = $jobList;
66
-	}
67
-
68
-	/**
69
-	 * send server-to-server share to remote server
70
-	 *
71
-	 * @param string $token
72
-	 * @param string $shareWith
73
-	 * @param string $name
74
-	 * @param int $remote_id
75
-	 * @param string $owner
76
-	 * @param string $ownerFederatedId
77
-	 * @param string $sharedBy
78
-	 * @param string $sharedByFederatedId
79
-	 * @return bool
80
-	 * @throws \OC\HintException
81
-	 * @throws \OC\ServerNotAvailableException
82
-	 */
83
-	public function sendRemoteShare($token, $shareWith, $name, $remote_id, $owner, $ownerFederatedId, $sharedBy, $sharedByFederatedId) {
84
-
85
-		list($user, $remote) = $this->addressHandler->splitUserRemote($shareWith);
86
-
87
-		if ($user && $remote) {
88
-			$local = $this->addressHandler->generateRemoteURL();
89
-
90
-			$fields = array(
91
-				'shareWith' => $user,
92
-				'token' => $token,
93
-				'name' => $name,
94
-				'remoteId' => $remote_id,
95
-				'owner' => $owner,
96
-				'ownerFederatedId' => $ownerFederatedId,
97
-				'sharedBy' => $sharedBy,
98
-				'sharedByFederatedId' => $sharedByFederatedId,
99
-				'remote' => $local,
100
-			);
101
-
102
-			$result = $this->tryHttpPostToShareEndpoint($remote, '', $fields);
103
-			$status = json_decode($result['result'], true);
104
-
105
-			if ($result['success'] && ($status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200)) {
106
-				\OC_Hook::emit('OCP\Share', 'federated_share_added', ['server' => $remote]);
107
-				return true;
108
-			}
109
-
110
-		}
111
-
112
-		return false;
113
-	}
114
-
115
-	/**
116
-	 * ask owner to re-share the file with the given user
117
-	 *
118
-	 * @param string $token
119
-	 * @param int $id remote Id
120
-	 * @param int $shareId internal share Id
121
-	 * @param string $remote remote address of the owner
122
-	 * @param string $shareWith
123
-	 * @param int $permission
124
-	 * @return bool
125
-	 * @throws \OC\HintException
126
-	 * @throws \OC\ServerNotAvailableException
127
-	 */
128
-	public function requestReShare($token, $id, $shareId, $remote, $shareWith, $permission) {
129
-
130
-		$fields = array(
131
-			'shareWith' => $shareWith,
132
-			'token' => $token,
133
-			'permission' => $permission,
134
-			'remoteId' => $shareId
135
-		);
136
-
137
-		$result = $this->tryHttpPostToShareEndpoint(rtrim($remote, '/'), '/' . $id . '/reshare', $fields);
138
-		$status = json_decode($result['result'], true);
139
-
140
-		$httpRequestSuccessful = $result['success'];
141
-		$ocsCallSuccessful = $status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200;
142
-		$validToken = isset($status['ocs']['data']['token']) && is_string($status['ocs']['data']['token']);
143
-		$validRemoteId = isset($status['ocs']['data']['remoteId']);
144
-
145
-		if ($httpRequestSuccessful && $ocsCallSuccessful && $validToken && $validRemoteId) {
146
-			return [
147
-				$status['ocs']['data']['token'],
148
-				(int)$status['ocs']['data']['remoteId']
149
-			];
150
-		}
151
-
152
-		return false;
153
-	}
154
-
155
-	/**
156
-	 * send server-to-server unshare to remote server
157
-	 *
158
-	 * @param string $remote url
159
-	 * @param int $id share id
160
-	 * @param string $token
161
-	 * @return bool
162
-	 */
163
-	public function sendRemoteUnShare($remote, $id, $token) {
164
-		$this->sendUpdateToRemote($remote, $id, $token, 'unshare');
165
-	}
166
-
167
-	/**
168
-	 * send server-to-server unshare to remote server
169
-	 *
170
-	 * @param string $remote url
171
-	 * @param int $id share id
172
-	 * @param string $token
173
-	 * @return bool
174
-	 */
175
-	public function sendRevokeShare($remote, $id, $token) {
176
-		$this->sendUpdateToRemote($remote, $id, $token, 'revoke');
177
-	}
178
-
179
-	/**
180
-	 * send notification to remote server if the permissions was changed
181
-	 *
182
-	 * @param string $remote
183
-	 * @param int $remoteId
184
-	 * @param string $token
185
-	 * @param int $permissions
186
-	 * @return bool
187
-	 */
188
-	public function sendPermissionChange($remote, $remoteId, $token, $permissions) {
189
-		$this->sendUpdateToRemote($remote, $remoteId, $token, 'permissions', ['permissions' => $permissions]);
190
-	}
191
-
192
-	/**
193
-	 * forward accept reShare to remote server
194
-	 *
195
-	 * @param string $remote
196
-	 * @param int $remoteId
197
-	 * @param string $token
198
-	 */
199
-	public function sendAcceptShare($remote, $remoteId, $token) {
200
-		$this->sendUpdateToRemote($remote, $remoteId, $token, 'accept');
201
-	}
202
-
203
-	/**
204
-	 * forward decline reShare to remote server
205
-	 *
206
-	 * @param string $remote
207
-	 * @param int $remoteId
208
-	 * @param string $token
209
-	 */
210
-	public function sendDeclineShare($remote, $remoteId, $token) {
211
-		$this->sendUpdateToRemote($remote, $remoteId, $token, 'decline');
212
-	}
213
-
214
-	/**
215
-	 * inform remote server whether server-to-server share was accepted/declined
216
-	 *
217
-	 * @param string $remote
218
-	 * @param string $token
219
-	 * @param int $remoteId Share id on the remote host
220
-	 * @param string $action possible actions: accept, decline, unshare, revoke, permissions
221
-	 * @param array $data
222
-	 * @param int $try
223
-	 * @return boolean
224
-	 */
225
-	public function sendUpdateToRemote($remote, $remoteId, $token, $action, $data = [], $try = 0) {
226
-
227
-		$fields = array('token' => $token);
228
-		foreach ($data as $key => $value) {
229
-			$fields[$key] = $value;
230
-		}
231
-
232
-		$result = $this->tryHttpPostToShareEndpoint(rtrim($remote, '/'), '/' . $remoteId . '/' . $action, $fields);
233
-		$status = json_decode($result['result'], true);
234
-
235
-		if ($result['success'] &&
236
-			($status['ocs']['meta']['statuscode'] === 100 ||
237
-				$status['ocs']['meta']['statuscode'] === 200
238
-			)
239
-		) {
240
-			return true;
241
-		} elseif ($try === 0) {
242
-			// only add new job on first try
243
-			$this->jobList->add('OCA\FederatedFileSharing\BackgroundJob\RetryJob',
244
-				[
245
-					'remote' => $remote,
246
-					'remoteId' => $remoteId,
247
-					'token' => $token,
248
-					'action' => $action,
249
-					'data' => json_encode($data),
250
-					'try' => $try,
251
-					'lastRun' => $this->getTimestamp()
252
-				]
253
-			);
254
-		}
255
-
256
-		return false;
257
-	}
258
-
259
-
260
-	/**
261
-	 * return current timestamp
262
-	 *
263
-	 * @return int
264
-	 */
265
-	protected function getTimestamp() {
266
-		return time();
267
-	}
268
-
269
-	/**
270
-	 * try http post with the given protocol, if no protocol is given we pick
271
-	 * the secure one (https)
272
-	 *
273
-	 * @param string $remoteDomain
274
-	 * @param string $urlSuffix
275
-	 * @param array $fields post parameters
276
-	 * @return array
277
-	 * @throws \Exception
278
-	 */
279
-	protected function tryHttpPostToShareEndpoint($remoteDomain, $urlSuffix, array $fields) {
280
-		$client = $this->httpClientService->newClient();
281
-
282
-		if ($this->addressHandler->urlContainProtocol($remoteDomain) === false) {
283
-			$remoteDomain = 'https://' . $remoteDomain;
284
-		}
285
-
286
-		$result = [
287
-			'success' => false,
288
-			'result' => '',
289
-		];
290
-
291
-		$federationEndpoints = $this->discoveryService->discover($remoteDomain, 'FEDERATED_SHARING');
292
-		$endpoint = isset($federationEndpoints['share']) ? $federationEndpoints['share'] : '/ocs/v2.php/cloud/shares';
293
-		try {
294
-			$response = $client->post($remoteDomain . $endpoint . $urlSuffix . '?format=' . self::RESPONSE_FORMAT, [
295
-				'body' => $fields,
296
-				'timeout' => 10,
297
-				'connect_timeout' => 10,
298
-			]);
299
-			$result['result'] = $response->getBody();
300
-			$result['success'] = true;
301
-		} catch (\Exception $e) {
302
-			// if flat re-sharing is not supported by the remote server
303
-			// we re-throw the exception and fall back to the old behaviour.
304
-			// (flat re-shares has been introduced in Nextcloud 9.1)
305
-			if ($e->getCode() === Http::STATUS_INTERNAL_SERVER_ERROR) {
306
-				throw $e;
307
-			}
308
-		}
309
-
310
-		return $result;
311
-	}
36
+    const RESPONSE_FORMAT = 'json'; // default response format for ocs calls
37
+
38
+    /** @var AddressHandler */
39
+    private $addressHandler;
40
+
41
+    /** @var IClientService */
42
+    private $httpClientService;
43
+
44
+    /** @var IDiscoveryService */
45
+    private $discoveryService;
46
+
47
+    /** @var IJobList  */
48
+    private $jobList;
49
+
50
+    /**
51
+     * @param AddressHandler $addressHandler
52
+     * @param IClientService $httpClientService
53
+     * @param IDiscoveryService $discoveryService
54
+     * @param IJobList $jobList
55
+     */
56
+    public function __construct(
57
+        AddressHandler $addressHandler,
58
+        IClientService $httpClientService,
59
+        IDiscoveryService $discoveryService,
60
+        IJobList $jobList
61
+    ) {
62
+        $this->addressHandler = $addressHandler;
63
+        $this->httpClientService = $httpClientService;
64
+        $this->discoveryService = $discoveryService;
65
+        $this->jobList = $jobList;
66
+    }
67
+
68
+    /**
69
+     * send server-to-server share to remote server
70
+     *
71
+     * @param string $token
72
+     * @param string $shareWith
73
+     * @param string $name
74
+     * @param int $remote_id
75
+     * @param string $owner
76
+     * @param string $ownerFederatedId
77
+     * @param string $sharedBy
78
+     * @param string $sharedByFederatedId
79
+     * @return bool
80
+     * @throws \OC\HintException
81
+     * @throws \OC\ServerNotAvailableException
82
+     */
83
+    public function sendRemoteShare($token, $shareWith, $name, $remote_id, $owner, $ownerFederatedId, $sharedBy, $sharedByFederatedId) {
84
+
85
+        list($user, $remote) = $this->addressHandler->splitUserRemote($shareWith);
86
+
87
+        if ($user && $remote) {
88
+            $local = $this->addressHandler->generateRemoteURL();
89
+
90
+            $fields = array(
91
+                'shareWith' => $user,
92
+                'token' => $token,
93
+                'name' => $name,
94
+                'remoteId' => $remote_id,
95
+                'owner' => $owner,
96
+                'ownerFederatedId' => $ownerFederatedId,
97
+                'sharedBy' => $sharedBy,
98
+                'sharedByFederatedId' => $sharedByFederatedId,
99
+                'remote' => $local,
100
+            );
101
+
102
+            $result = $this->tryHttpPostToShareEndpoint($remote, '', $fields);
103
+            $status = json_decode($result['result'], true);
104
+
105
+            if ($result['success'] && ($status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200)) {
106
+                \OC_Hook::emit('OCP\Share', 'federated_share_added', ['server' => $remote]);
107
+                return true;
108
+            }
109
+
110
+        }
111
+
112
+        return false;
113
+    }
114
+
115
+    /**
116
+     * ask owner to re-share the file with the given user
117
+     *
118
+     * @param string $token
119
+     * @param int $id remote Id
120
+     * @param int $shareId internal share Id
121
+     * @param string $remote remote address of the owner
122
+     * @param string $shareWith
123
+     * @param int $permission
124
+     * @return bool
125
+     * @throws \OC\HintException
126
+     * @throws \OC\ServerNotAvailableException
127
+     */
128
+    public function requestReShare($token, $id, $shareId, $remote, $shareWith, $permission) {
129
+
130
+        $fields = array(
131
+            'shareWith' => $shareWith,
132
+            'token' => $token,
133
+            'permission' => $permission,
134
+            'remoteId' => $shareId
135
+        );
136
+
137
+        $result = $this->tryHttpPostToShareEndpoint(rtrim($remote, '/'), '/' . $id . '/reshare', $fields);
138
+        $status = json_decode($result['result'], true);
139
+
140
+        $httpRequestSuccessful = $result['success'];
141
+        $ocsCallSuccessful = $status['ocs']['meta']['statuscode'] === 100 || $status['ocs']['meta']['statuscode'] === 200;
142
+        $validToken = isset($status['ocs']['data']['token']) && is_string($status['ocs']['data']['token']);
143
+        $validRemoteId = isset($status['ocs']['data']['remoteId']);
144
+
145
+        if ($httpRequestSuccessful && $ocsCallSuccessful && $validToken && $validRemoteId) {
146
+            return [
147
+                $status['ocs']['data']['token'],
148
+                (int)$status['ocs']['data']['remoteId']
149
+            ];
150
+        }
151
+
152
+        return false;
153
+    }
154
+
155
+    /**
156
+     * send server-to-server unshare to remote server
157
+     *
158
+     * @param string $remote url
159
+     * @param int $id share id
160
+     * @param string $token
161
+     * @return bool
162
+     */
163
+    public function sendRemoteUnShare($remote, $id, $token) {
164
+        $this->sendUpdateToRemote($remote, $id, $token, 'unshare');
165
+    }
166
+
167
+    /**
168
+     * send server-to-server unshare to remote server
169
+     *
170
+     * @param string $remote url
171
+     * @param int $id share id
172
+     * @param string $token
173
+     * @return bool
174
+     */
175
+    public function sendRevokeShare($remote, $id, $token) {
176
+        $this->sendUpdateToRemote($remote, $id, $token, 'revoke');
177
+    }
178
+
179
+    /**
180
+     * send notification to remote server if the permissions was changed
181
+     *
182
+     * @param string $remote
183
+     * @param int $remoteId
184
+     * @param string $token
185
+     * @param int $permissions
186
+     * @return bool
187
+     */
188
+    public function sendPermissionChange($remote, $remoteId, $token, $permissions) {
189
+        $this->sendUpdateToRemote($remote, $remoteId, $token, 'permissions', ['permissions' => $permissions]);
190
+    }
191
+
192
+    /**
193
+     * forward accept reShare to remote server
194
+     *
195
+     * @param string $remote
196
+     * @param int $remoteId
197
+     * @param string $token
198
+     */
199
+    public function sendAcceptShare($remote, $remoteId, $token) {
200
+        $this->sendUpdateToRemote($remote, $remoteId, $token, 'accept');
201
+    }
202
+
203
+    /**
204
+     * forward decline reShare to remote server
205
+     *
206
+     * @param string $remote
207
+     * @param int $remoteId
208
+     * @param string $token
209
+     */
210
+    public function sendDeclineShare($remote, $remoteId, $token) {
211
+        $this->sendUpdateToRemote($remote, $remoteId, $token, 'decline');
212
+    }
213
+
214
+    /**
215
+     * inform remote server whether server-to-server share was accepted/declined
216
+     *
217
+     * @param string $remote
218
+     * @param string $token
219
+     * @param int $remoteId Share id on the remote host
220
+     * @param string $action possible actions: accept, decline, unshare, revoke, permissions
221
+     * @param array $data
222
+     * @param int $try
223
+     * @return boolean
224
+     */
225
+    public function sendUpdateToRemote($remote, $remoteId, $token, $action, $data = [], $try = 0) {
226
+
227
+        $fields = array('token' => $token);
228
+        foreach ($data as $key => $value) {
229
+            $fields[$key] = $value;
230
+        }
231
+
232
+        $result = $this->tryHttpPostToShareEndpoint(rtrim($remote, '/'), '/' . $remoteId . '/' . $action, $fields);
233
+        $status = json_decode($result['result'], true);
234
+
235
+        if ($result['success'] &&
236
+            ($status['ocs']['meta']['statuscode'] === 100 ||
237
+                $status['ocs']['meta']['statuscode'] === 200
238
+            )
239
+        ) {
240
+            return true;
241
+        } elseif ($try === 0) {
242
+            // only add new job on first try
243
+            $this->jobList->add('OCA\FederatedFileSharing\BackgroundJob\RetryJob',
244
+                [
245
+                    'remote' => $remote,
246
+                    'remoteId' => $remoteId,
247
+                    'token' => $token,
248
+                    'action' => $action,
249
+                    'data' => json_encode($data),
250
+                    'try' => $try,
251
+                    'lastRun' => $this->getTimestamp()
252
+                ]
253
+            );
254
+        }
255
+
256
+        return false;
257
+    }
258
+
259
+
260
+    /**
261
+     * return current timestamp
262
+     *
263
+     * @return int
264
+     */
265
+    protected function getTimestamp() {
266
+        return time();
267
+    }
268
+
269
+    /**
270
+     * try http post with the given protocol, if no protocol is given we pick
271
+     * the secure one (https)
272
+     *
273
+     * @param string $remoteDomain
274
+     * @param string $urlSuffix
275
+     * @param array $fields post parameters
276
+     * @return array
277
+     * @throws \Exception
278
+     */
279
+    protected function tryHttpPostToShareEndpoint($remoteDomain, $urlSuffix, array $fields) {
280
+        $client = $this->httpClientService->newClient();
281
+
282
+        if ($this->addressHandler->urlContainProtocol($remoteDomain) === false) {
283
+            $remoteDomain = 'https://' . $remoteDomain;
284
+        }
285
+
286
+        $result = [
287
+            'success' => false,
288
+            'result' => '',
289
+        ];
290
+
291
+        $federationEndpoints = $this->discoveryService->discover($remoteDomain, 'FEDERATED_SHARING');
292
+        $endpoint = isset($federationEndpoints['share']) ? $federationEndpoints['share'] : '/ocs/v2.php/cloud/shares';
293
+        try {
294
+            $response = $client->post($remoteDomain . $endpoint . $urlSuffix . '?format=' . self::RESPONSE_FORMAT, [
295
+                'body' => $fields,
296
+                'timeout' => 10,
297
+                'connect_timeout' => 10,
298
+            ]);
299
+            $result['result'] = $response->getBody();
300
+            $result['success'] = true;
301
+        } catch (\Exception $e) {
302
+            // if flat re-sharing is not supported by the remote server
303
+            // we re-throw the exception and fall back to the old behaviour.
304
+            // (flat re-shares has been introduced in Nextcloud 9.1)
305
+            if ($e->getCode() === Http::STATUS_INTERNAL_SERVER_ERROR) {
306
+                throw $e;
307
+            }
308
+        }
309
+
310
+        return $result;
311
+    }
312 312
 }
Please login to merge, or discard this patch.
apps/dav/appinfo/v2/remote.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -21,7 +21,7 @@
 block discarded – undo
21 21
  */
22 22
 // no php execution timeout for webdav
23 23
 if (strpos(@ini_get('disable_functions'), 'set_time_limit') === false) {
24
-	@set_time_limit(0);
24
+    @set_time_limit(0);
25 25
 }
26 26
 ignore_user_abort(true);
27 27
 
Please login to merge, or discard this patch.
apps/federatedfilesharing/appinfo/app.php 1 patch
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -30,22 +30,22 @@
 block discarded – undo
30 30
 
31 31
 $manager = \OC::$server->getNotificationManager();
32 32
 $manager->registerNotifier(function() {
33
-	return \OC::$server->query(Notifier::class);
33
+    return \OC::$server->query(Notifier::class);
34 34
 }, function() {
35
-	$l = \OC::$server->getL10N('files_sharing');
36
-	return [
37
-		'id' => 'files_sharing',
38
-		'name' => $l->t('Federated sharing'),
39
-	];
35
+    $l = \OC::$server->getL10N('files_sharing');
36
+    return [
37
+        'id' => 'files_sharing',
38
+        'name' => $l->t('Federated sharing'),
39
+    ];
40 40
 });
41 41
 
42 42
 $federatedShareProvider = $app->getFederatedShareProvider();
43 43
 
44 44
 $eventDispatcher->addListener(
45
-	'OCA\Files::loadAdditionalScripts',
46
-	function() use ($federatedShareProvider) {
47
-		if ($federatedShareProvider->isIncomingServer2serverShareEnabled()) {
48
-			\OCP\Util::addScript('federatedfilesharing', 'external');
49
-		}
50
-	}
45
+    'OCA\Files::loadAdditionalScripts',
46
+    function() use ($federatedShareProvider) {
47
+        if ($federatedShareProvider->isIncomingServer2serverShareEnabled()) {
48
+            \OCP\Util::addScript('federatedfilesharing', 'external');
49
+        }
50
+    }
51 51
 );
Please login to merge, or discard this patch.
apps/federation/appinfo/routes.php 1 patch
Indentation   +46 added lines, -46 removed lines patch added patch discarded remove patch
@@ -23,50 +23,50 @@
 block discarded – undo
23 23
 $application = new \OCA\Federation\AppInfo\Application();
24 24
 
25 25
 $application->registerRoutes(
26
-	$this,
27
-	[
28
-		'routes' => [
29
-			[
30
-				'name' => 'Settings#addServer',
31
-				'url' => '/trusted-servers',
32
-				'verb' => 'POST'
33
-			],
34
-			[
35
-				'name' => 'Settings#removeServer',
36
-				'url' => '/trusted-servers/{id}',
37
-				'verb' => 'DELETE'
38
-			],
39
-			[
40
-				'name' => 'Settings#autoAddServers',
41
-				'url' => '/auto-add-servers',
42
-				'verb' => 'POST'
43
-			],
44
-		],
45
-		'ocs' => [
46
-			// old endpoints, only used by Nextcloud and ownCloud
47
-			[
48
-				'name' => 'OCSAuthAPI#getSharedSecretLegacy',
49
-				'url' => '/api/v1/shared-secret',
50
-				'verb' => 'GET',
51
-			],
52
-			[
53
-				'name' => 'OCSAuthAPI#requestSharedSecretLegacy',
54
-				'url' => '/api/v1/request-shared-secret',
55
-				'verb' => 'POST',
56
-			],
57
-			// new endpoints, published as public api
58
-			[
59
-				'name' => 'OCSAuthAPI#getSharedSecret',
60
-				'root' => '/cloud',
61
-				'url' => '/shared-secret',
62
-				'verb' => 'GET',
63
-			],
64
-			[
65
-				'name' => 'OCSAuthAPI#requestSharedSecret',
66
-				'root' => '/cloud',
67
-				'url' => '/shared-secret',
68
-				'verb' => 'POST',
69
-			],
70
-		],
71
-	]
26
+    $this,
27
+    [
28
+        'routes' => [
29
+            [
30
+                'name' => 'Settings#addServer',
31
+                'url' => '/trusted-servers',
32
+                'verb' => 'POST'
33
+            ],
34
+            [
35
+                'name' => 'Settings#removeServer',
36
+                'url' => '/trusted-servers/{id}',
37
+                'verb' => 'DELETE'
38
+            ],
39
+            [
40
+                'name' => 'Settings#autoAddServers',
41
+                'url' => '/auto-add-servers',
42
+                'verb' => 'POST'
43
+            ],
44
+        ],
45
+        'ocs' => [
46
+            // old endpoints, only used by Nextcloud and ownCloud
47
+            [
48
+                'name' => 'OCSAuthAPI#getSharedSecretLegacy',
49
+                'url' => '/api/v1/shared-secret',
50
+                'verb' => 'GET',
51
+            ],
52
+            [
53
+                'name' => 'OCSAuthAPI#requestSharedSecretLegacy',
54
+                'url' => '/api/v1/request-shared-secret',
55
+                'verb' => 'POST',
56
+            ],
57
+            // new endpoints, published as public api
58
+            [
59
+                'name' => 'OCSAuthAPI#getSharedSecret',
60
+                'root' => '/cloud',
61
+                'url' => '/shared-secret',
62
+                'verb' => 'GET',
63
+            ],
64
+            [
65
+                'name' => 'OCSAuthAPI#requestSharedSecret',
66
+                'root' => '/cloud',
67
+                'url' => '/shared-secret',
68
+                'verb' => 'POST',
69
+            ],
70
+        ],
71
+    ]
72 72
 );
Please login to merge, or discard this patch.
apps/federation/lib/SyncFederationAddressBooks.php 1 patch
Indentation   +53 added lines, -53 removed lines patch added patch discarded remove patch
@@ -30,64 +30,64 @@
 block discarded – undo
30 30
 
31 31
 class SyncFederationAddressBooks {
32 32
 
33
-	/** @var DbHandler */
34
-	protected $dbHandler;
33
+    /** @var DbHandler */
34
+    protected $dbHandler;
35 35
 
36
-	/** @var SyncService */
37
-	private $syncService;
36
+    /** @var SyncService */
37
+    private $syncService;
38 38
 
39
-	/** @var  DiscoveryService */
40
-	private $ocsDiscoveryService;
39
+    /** @var  DiscoveryService */
40
+    private $ocsDiscoveryService;
41 41
 
42
-	/**
43
-	 * @param DbHandler $dbHandler
44
-	 * @param SyncService $syncService
45
-	 * @param IDiscoveryService $ocsDiscoveryService
46
-	 */
47
-	public function __construct(DbHandler $dbHandler,
48
-								SyncService $syncService,
49
-								IDiscoveryService $ocsDiscoveryService
50
-	) {
51
-		$this->syncService = $syncService;
52
-		$this->dbHandler = $dbHandler;
53
-		$this->ocsDiscoveryService = $ocsDiscoveryService;
54
-	}
42
+    /**
43
+     * @param DbHandler $dbHandler
44
+     * @param SyncService $syncService
45
+     * @param IDiscoveryService $ocsDiscoveryService
46
+     */
47
+    public function __construct(DbHandler $dbHandler,
48
+                                SyncService $syncService,
49
+                                IDiscoveryService $ocsDiscoveryService
50
+    ) {
51
+        $this->syncService = $syncService;
52
+        $this->dbHandler = $dbHandler;
53
+        $this->ocsDiscoveryService = $ocsDiscoveryService;
54
+    }
55 55
 
56
-	/**
57
-	 * @param \Closure $callback
58
-	 */
59
-	public function syncThemAll(\Closure $callback) {
56
+    /**
57
+     * @param \Closure $callback
58
+     */
59
+    public function syncThemAll(\Closure $callback) {
60 60
 
61
-		$trustedServers = $this->dbHandler->getAllServer();
62
-		foreach ($trustedServers as $trustedServer) {
63
-			$url = $trustedServer['url'];
64
-			$callback($url, null);
65
-			$sharedSecret = $trustedServer['shared_secret'];
66
-			$syncToken = $trustedServer['sync_token'];
61
+        $trustedServers = $this->dbHandler->getAllServer();
62
+        foreach ($trustedServers as $trustedServer) {
63
+            $url = $trustedServer['url'];
64
+            $callback($url, null);
65
+            $sharedSecret = $trustedServer['shared_secret'];
66
+            $syncToken = $trustedServer['sync_token'];
67 67
 
68
-			$endPoints = $this->ocsDiscoveryService->discover($url, 'FEDERATED_SHARING');
69
-			$cardDavUser = isset($endPoints['carddav-user']) ? $endPoints['carddav-user'] : 'system';
70
-			$addressBookUrl = isset($endPoints['system-address-book']) ? trim($endPoints['system-address-book'], '/') : 'remote.php/dav/addressbooks/system/system/system';
68
+            $endPoints = $this->ocsDiscoveryService->discover($url, 'FEDERATED_SHARING');
69
+            $cardDavUser = isset($endPoints['carddav-user']) ? $endPoints['carddav-user'] : 'system';
70
+            $addressBookUrl = isset($endPoints['system-address-book']) ? trim($endPoints['system-address-book'], '/') : 'remote.php/dav/addressbooks/system/system/system';
71 71
 
72
-			if (is_null($sharedSecret)) {
73
-				continue;
74
-			}
75
-			$targetBookId = $trustedServer['url_hash'];
76
-			$targetPrincipal = "principals/system/system";
77
-			$targetBookProperties = [
78
-					'{DAV:}displayname' => $url
79
-			];
80
-			try {
81
-				$newToken = $this->syncService->syncRemoteAddressBook($url, $cardDavUser, $addressBookUrl, $sharedSecret, $syncToken, $targetBookId, $targetPrincipal, $targetBookProperties);
82
-				if ($newToken !== $syncToken) {
83
-					$this->dbHandler->setServerStatus($url, TrustedServers::STATUS_OK, $newToken);
84
-				}
85
-			} catch (\Exception $ex) {
86
-				if ($ex->getCode() === Http::STATUS_UNAUTHORIZED) {
87
-					$this->dbHandler->setServerStatus($url, TrustedServers::STATUS_ACCESS_REVOKED);
88
-				}
89
-				$callback($url, $ex);
90
-			}
91
-		}
92
-	}
72
+            if (is_null($sharedSecret)) {
73
+                continue;
74
+            }
75
+            $targetBookId = $trustedServer['url_hash'];
76
+            $targetPrincipal = "principals/system/system";
77
+            $targetBookProperties = [
78
+                    '{DAV:}displayname' => $url
79
+            ];
80
+            try {
81
+                $newToken = $this->syncService->syncRemoteAddressBook($url, $cardDavUser, $addressBookUrl, $sharedSecret, $syncToken, $targetBookId, $targetPrincipal, $targetBookProperties);
82
+                if ($newToken !== $syncToken) {
83
+                    $this->dbHandler->setServerStatus($url, TrustedServers::STATUS_OK, $newToken);
84
+                }
85
+            } catch (\Exception $ex) {
86
+                if ($ex->getCode() === Http::STATUS_UNAUTHORIZED) {
87
+                    $this->dbHandler->setServerStatus($url, TrustedServers::STATUS_ACCESS_REVOKED);
88
+                }
89
+                $callback($url, $ex);
90
+            }
91
+        }
92
+    }
93 93
 }
Please login to merge, or discard this patch.
lib/private/Encryption/Keys/Storage.php 1 patch
Indentation   +340 added lines, -340 removed lines patch added patch discarded remove patch
@@ -32,345 +32,345 @@
 block discarded – undo
32 32
 
33 33
 class Storage implements IStorage {
34 34
 
35
-	// hidden file which indicate that the folder is a valid key storage
36
-	const KEY_STORAGE_MARKER = '.oc_key_storage';
37
-
38
-	/** @var View */
39
-	private $view;
40
-
41
-	/** @var Util */
42
-	private $util;
43
-
44
-	// base dir where all the file related keys are stored
45
-	/** @var string */
46
-	private $keys_base_dir;
47
-
48
-	// root of the key storage default is empty which means that we use the data folder
49
-	/** @var string */
50
-	private $root_dir;
51
-
52
-	/** @var string */
53
-	private $encryption_base_dir;
54
-
55
-	/** @var string */
56
-	private $backup_base_dir;
57
-
58
-	/** @var array */
59
-	private $keyCache = [];
60
-
61
-	/**
62
-	 * @param View $view
63
-	 * @param Util $util
64
-	 */
65
-	public function __construct(View $view, Util $util) {
66
-		$this->view = $view;
67
-		$this->util = $util;
68
-
69
-		$this->encryption_base_dir = '/files_encryption';
70
-		$this->keys_base_dir = $this->encryption_base_dir .'/keys';
71
-		$this->backup_base_dir = $this->encryption_base_dir .'/backup';
72
-		$this->root_dir = $this->util->getKeyStorageRoot();
73
-	}
74
-
75
-	/**
76
-	 * @inheritdoc
77
-	 */
78
-	public function getUserKey($uid, $keyId, $encryptionModuleId) {
79
-		$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
80
-		return $this->getKey($path);
81
-	}
82
-
83
-	/**
84
-	 * @inheritdoc
85
-	 */
86
-	public function getFileKey($path, $keyId, $encryptionModuleId) {
87
-		$realFile = $this->util->stripPartialFileExtension($path);
88
-		$keyDir = $this->getFileKeyDir($encryptionModuleId, $realFile);
89
-		$key = $this->getKey($keyDir . $keyId);
90
-
91
-		if ($key === '' && $realFile !== $path) {
92
-			// Check if the part file has keys and use them, if no normal keys
93
-			// exist. This is required to fix copyBetweenStorage() when we
94
-			// rename a .part file over storage borders.
95
-			$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
96
-			$key = $this->getKey($keyDir . $keyId);
97
-		}
98
-
99
-		return $key;
100
-	}
101
-
102
-	/**
103
-	 * @inheritdoc
104
-	 */
105
-	public function getSystemUserKey($keyId, $encryptionModuleId) {
106
-		$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
107
-		return $this->getKey($path);
108
-	}
109
-
110
-	/**
111
-	 * @inheritdoc
112
-	 */
113
-	public function setUserKey($uid, $keyId, $key, $encryptionModuleId) {
114
-		$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
115
-		return $this->setKey($path, $key);
116
-	}
117
-
118
-	/**
119
-	 * @inheritdoc
120
-	 */
121
-	public function setFileKey($path, $keyId, $key, $encryptionModuleId) {
122
-		$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
123
-		return $this->setKey($keyDir . $keyId, $key);
124
-	}
125
-
126
-	/**
127
-	 * @inheritdoc
128
-	 */
129
-	public function setSystemUserKey($keyId, $key, $encryptionModuleId) {
130
-		$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
131
-		return $this->setKey($path, $key);
132
-	}
133
-
134
-	/**
135
-	 * @inheritdoc
136
-	 */
137
-	public function deleteUserKey($uid, $keyId, $encryptionModuleId) {
138
-		try {
139
-			$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
140
-			return !$this->view->file_exists($path) || $this->view->unlink($path);
141
-		} catch (NoUserException $e) {
142
-			// this exception can come from initMountPoints() from setupUserMounts()
143
-			// for a deleted user.
144
-			//
145
-			// It means, that:
146
-			// - we are not running in alternative storage mode because we don't call
147
-			// initMountPoints() in that mode
148
-			// - the keys were in the user's home but since the user was deleted, the
149
-			// user's home is gone and so are the keys
150
-			//
151
-			// So there is nothing to do, just ignore.
152
-		}
153
-	}
154
-
155
-	/**
156
-	 * @inheritdoc
157
-	 */
158
-	public function deleteFileKey($path, $keyId, $encryptionModuleId) {
159
-		$keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
160
-		return !$this->view->file_exists($keyDir . $keyId) || $this->view->unlink($keyDir . $keyId);
161
-	}
162
-
163
-	/**
164
-	 * @inheritdoc
165
-	 */
166
-	public function deleteAllFileKeys($path) {
167
-		$keyDir = $this->getFileKeyDir('', $path);
168
-		return !$this->view->file_exists($keyDir) || $this->view->deleteAll($keyDir);
169
-	}
170
-
171
-	/**
172
-	 * @inheritdoc
173
-	 */
174
-	public function deleteSystemUserKey($keyId, $encryptionModuleId) {
175
-		$path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
176
-		return !$this->view->file_exists($path) || $this->view->unlink($path);
177
-	}
178
-
179
-	/**
180
-	 * construct path to users key
181
-	 *
182
-	 * @param string $encryptionModuleId
183
-	 * @param string $keyId
184
-	 * @param string $uid
185
-	 * @return string
186
-	 */
187
-	protected function constructUserKeyPath($encryptionModuleId, $keyId, $uid) {
188
-
189
-		if ($uid === null) {
190
-			$path = $this->root_dir . '/' . $this->encryption_base_dir . '/' . $encryptionModuleId . '/' . $keyId;
191
-		} else {
192
-			$path = $this->root_dir . '/' . $uid . $this->encryption_base_dir . '/'
193
-				. $encryptionModuleId . '/' . $uid . '.' . $keyId;
194
-		}
195
-
196
-		return \OC\Files\Filesystem::normalizePath($path);
197
-	}
198
-
199
-	/**
200
-	 * read key from hard disk
201
-	 *
202
-	 * @param string $path to key
203
-	 * @return string
204
-	 */
205
-	private function getKey($path) {
206
-
207
-		$key = '';
208
-
209
-		if ($this->view->file_exists($path)) {
210
-			if (isset($this->keyCache[$path])) {
211
-				$key =  $this->keyCache[$path];
212
-			} else {
213
-				$key = $this->view->file_get_contents($path);
214
-				$this->keyCache[$path] = $key;
215
-			}
216
-		}
217
-
218
-		return $key;
219
-	}
220
-
221
-	/**
222
-	 * write key to disk
223
-	 *
224
-	 *
225
-	 * @param string $path path to key directory
226
-	 * @param string $key key
227
-	 * @return bool
228
-	 */
229
-	private function setKey($path, $key) {
230
-		$this->keySetPreparation(dirname($path));
231
-
232
-		$result = $this->view->file_put_contents($path, $key);
233
-
234
-		if (is_int($result) && $result > 0) {
235
-			$this->keyCache[$path] = $key;
236
-			return true;
237
-		}
238
-
239
-		return false;
240
-	}
241
-
242
-	/**
243
-	 * get path to key folder for a given file
244
-	 *
245
-	 * @param string $encryptionModuleId
246
-	 * @param string $path path to the file, relative to data/
247
-	 * @return string
248
-	 */
249
-	private function getFileKeyDir($encryptionModuleId, $path) {
250
-
251
-		list($owner, $filename) = $this->util->getUidAndFilename($path);
252
-
253
-		// in case of system wide mount points the keys are stored directly in the data directory
254
-		if ($this->util->isSystemWideMountPoint($filename, $owner)) {
255
-			$keyPath = $this->root_dir . '/' . $this->keys_base_dir . $filename . '/';
256
-		} else {
257
-			$keyPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $filename . '/';
258
-		}
259
-
260
-		return Filesystem::normalizePath($keyPath . $encryptionModuleId . '/', false);
261
-	}
262
-
263
-	/**
264
-	 * move keys if a file was renamed
265
-	 *
266
-	 * @param string $source
267
-	 * @param string $target
268
-	 * @return boolean
269
-	 */
270
-	public function renameKeys($source, $target) {
271
-
272
-		$sourcePath = $this->getPathToKeys($source);
273
-		$targetPath = $this->getPathToKeys($target);
274
-
275
-		if ($this->view->file_exists($sourcePath)) {
276
-			$this->keySetPreparation(dirname($targetPath));
277
-			$this->view->rename($sourcePath, $targetPath);
278
-
279
-			return true;
280
-		}
281
-
282
-		return false;
283
-	}
284
-
285
-
286
-	/**
287
-	 * copy keys if a file was renamed
288
-	 *
289
-	 * @param string $source
290
-	 * @param string $target
291
-	 * @return boolean
292
-	 */
293
-	public function copyKeys($source, $target) {
294
-
295
-		$sourcePath = $this->getPathToKeys($source);
296
-		$targetPath = $this->getPathToKeys($target);
297
-
298
-		if ($this->view->file_exists($sourcePath)) {
299
-			$this->keySetPreparation(dirname($targetPath));
300
-			$this->view->copy($sourcePath, $targetPath);
301
-			return true;
302
-		}
303
-
304
-		return false;
305
-	}
306
-
307
-	/**
308
-	 * backup keys of a given encryption module
309
-	 *
310
-	 * @param string $encryptionModuleId
311
-	 * @param string $purpose
312
-	 * @param string $uid
313
-	 * @return bool
314
-	 * @since 12.0.0
315
-	 */
316
-	public function backupUserKeys($encryptionModuleId, $purpose, $uid) {
317
-		$source = $uid . $this->encryption_base_dir . '/' . $encryptionModuleId;
318
-		$backupDir = $uid . $this->backup_base_dir;
319
-		if (!$this->view->file_exists($backupDir)) {
320
-			$this->view->mkdir($backupDir);
321
-		}
322
-
323
-		$backupDir = $backupDir . '/' . $purpose . '.' . $encryptionModuleId . '.' . $this->getTimestamp();
324
-		$this->view->mkdir($backupDir);
325
-
326
-		return $this->view->copy($source, $backupDir);
327
-	}
328
-
329
-	/**
330
-	 * get the current timestamp
331
-	 *
332
-	 * @return int
333
-	 */
334
-	protected function getTimestamp() {
335
-		return time();
336
-	}
337
-
338
-	/**
339
-	 * get system wide path and detect mount points
340
-	 *
341
-	 * @param string $path
342
-	 * @return string
343
-	 */
344
-	protected function getPathToKeys($path) {
345
-		list($owner, $relativePath) = $this->util->getUidAndFilename($path);
346
-		$systemWideMountPoint = $this->util->isSystemWideMountPoint($relativePath, $owner);
347
-
348
-		if ($systemWideMountPoint) {
349
-			$systemPath = $this->root_dir . '/' . $this->keys_base_dir . $relativePath . '/';
350
-		} else {
351
-			$systemPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $relativePath . '/';
352
-		}
353
-
354
-		return  Filesystem::normalizePath($systemPath, false);
355
-	}
356
-
357
-	/**
358
-	 * Make preparations to filesystem for saving a key file
359
-	 *
360
-	 * @param string $path relative to the views root
361
-	 */
362
-	protected function keySetPreparation($path) {
363
-		// If the file resides within a subdirectory, create it
364
-		if (!$this->view->file_exists($path)) {
365
-			$sub_dirs = explode('/', ltrim($path, '/'));
366
-			$dir = '';
367
-			foreach ($sub_dirs as $sub_dir) {
368
-				$dir .= '/' . $sub_dir;
369
-				if (!$this->view->is_dir($dir)) {
370
-					$this->view->mkdir($dir);
371
-				}
372
-			}
373
-		}
374
-	}
35
+    // hidden file which indicate that the folder is a valid key storage
36
+    const KEY_STORAGE_MARKER = '.oc_key_storage';
37
+
38
+    /** @var View */
39
+    private $view;
40
+
41
+    /** @var Util */
42
+    private $util;
43
+
44
+    // base dir where all the file related keys are stored
45
+    /** @var string */
46
+    private $keys_base_dir;
47
+
48
+    // root of the key storage default is empty which means that we use the data folder
49
+    /** @var string */
50
+    private $root_dir;
51
+
52
+    /** @var string */
53
+    private $encryption_base_dir;
54
+
55
+    /** @var string */
56
+    private $backup_base_dir;
57
+
58
+    /** @var array */
59
+    private $keyCache = [];
60
+
61
+    /**
62
+     * @param View $view
63
+     * @param Util $util
64
+     */
65
+    public function __construct(View $view, Util $util) {
66
+        $this->view = $view;
67
+        $this->util = $util;
68
+
69
+        $this->encryption_base_dir = '/files_encryption';
70
+        $this->keys_base_dir = $this->encryption_base_dir .'/keys';
71
+        $this->backup_base_dir = $this->encryption_base_dir .'/backup';
72
+        $this->root_dir = $this->util->getKeyStorageRoot();
73
+    }
74
+
75
+    /**
76
+     * @inheritdoc
77
+     */
78
+    public function getUserKey($uid, $keyId, $encryptionModuleId) {
79
+        $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
80
+        return $this->getKey($path);
81
+    }
82
+
83
+    /**
84
+     * @inheritdoc
85
+     */
86
+    public function getFileKey($path, $keyId, $encryptionModuleId) {
87
+        $realFile = $this->util->stripPartialFileExtension($path);
88
+        $keyDir = $this->getFileKeyDir($encryptionModuleId, $realFile);
89
+        $key = $this->getKey($keyDir . $keyId);
90
+
91
+        if ($key === '' && $realFile !== $path) {
92
+            // Check if the part file has keys and use them, if no normal keys
93
+            // exist. This is required to fix copyBetweenStorage() when we
94
+            // rename a .part file over storage borders.
95
+            $keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
96
+            $key = $this->getKey($keyDir . $keyId);
97
+        }
98
+
99
+        return $key;
100
+    }
101
+
102
+    /**
103
+     * @inheritdoc
104
+     */
105
+    public function getSystemUserKey($keyId, $encryptionModuleId) {
106
+        $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
107
+        return $this->getKey($path);
108
+    }
109
+
110
+    /**
111
+     * @inheritdoc
112
+     */
113
+    public function setUserKey($uid, $keyId, $key, $encryptionModuleId) {
114
+        $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
115
+        return $this->setKey($path, $key);
116
+    }
117
+
118
+    /**
119
+     * @inheritdoc
120
+     */
121
+    public function setFileKey($path, $keyId, $key, $encryptionModuleId) {
122
+        $keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
123
+        return $this->setKey($keyDir . $keyId, $key);
124
+    }
125
+
126
+    /**
127
+     * @inheritdoc
128
+     */
129
+    public function setSystemUserKey($keyId, $key, $encryptionModuleId) {
130
+        $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
131
+        return $this->setKey($path, $key);
132
+    }
133
+
134
+    /**
135
+     * @inheritdoc
136
+     */
137
+    public function deleteUserKey($uid, $keyId, $encryptionModuleId) {
138
+        try {
139
+            $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, $uid);
140
+            return !$this->view->file_exists($path) || $this->view->unlink($path);
141
+        } catch (NoUserException $e) {
142
+            // this exception can come from initMountPoints() from setupUserMounts()
143
+            // for a deleted user.
144
+            //
145
+            // It means, that:
146
+            // - we are not running in alternative storage mode because we don't call
147
+            // initMountPoints() in that mode
148
+            // - the keys were in the user's home but since the user was deleted, the
149
+            // user's home is gone and so are the keys
150
+            //
151
+            // So there is nothing to do, just ignore.
152
+        }
153
+    }
154
+
155
+    /**
156
+     * @inheritdoc
157
+     */
158
+    public function deleteFileKey($path, $keyId, $encryptionModuleId) {
159
+        $keyDir = $this->getFileKeyDir($encryptionModuleId, $path);
160
+        return !$this->view->file_exists($keyDir . $keyId) || $this->view->unlink($keyDir . $keyId);
161
+    }
162
+
163
+    /**
164
+     * @inheritdoc
165
+     */
166
+    public function deleteAllFileKeys($path) {
167
+        $keyDir = $this->getFileKeyDir('', $path);
168
+        return !$this->view->file_exists($keyDir) || $this->view->deleteAll($keyDir);
169
+    }
170
+
171
+    /**
172
+     * @inheritdoc
173
+     */
174
+    public function deleteSystemUserKey($keyId, $encryptionModuleId) {
175
+        $path = $this->constructUserKeyPath($encryptionModuleId, $keyId, null);
176
+        return !$this->view->file_exists($path) || $this->view->unlink($path);
177
+    }
178
+
179
+    /**
180
+     * construct path to users key
181
+     *
182
+     * @param string $encryptionModuleId
183
+     * @param string $keyId
184
+     * @param string $uid
185
+     * @return string
186
+     */
187
+    protected function constructUserKeyPath($encryptionModuleId, $keyId, $uid) {
188
+
189
+        if ($uid === null) {
190
+            $path = $this->root_dir . '/' . $this->encryption_base_dir . '/' . $encryptionModuleId . '/' . $keyId;
191
+        } else {
192
+            $path = $this->root_dir . '/' . $uid . $this->encryption_base_dir . '/'
193
+                . $encryptionModuleId . '/' . $uid . '.' . $keyId;
194
+        }
195
+
196
+        return \OC\Files\Filesystem::normalizePath($path);
197
+    }
198
+
199
+    /**
200
+     * read key from hard disk
201
+     *
202
+     * @param string $path to key
203
+     * @return string
204
+     */
205
+    private function getKey($path) {
206
+
207
+        $key = '';
208
+
209
+        if ($this->view->file_exists($path)) {
210
+            if (isset($this->keyCache[$path])) {
211
+                $key =  $this->keyCache[$path];
212
+            } else {
213
+                $key = $this->view->file_get_contents($path);
214
+                $this->keyCache[$path] = $key;
215
+            }
216
+        }
217
+
218
+        return $key;
219
+    }
220
+
221
+    /**
222
+     * write key to disk
223
+     *
224
+     *
225
+     * @param string $path path to key directory
226
+     * @param string $key key
227
+     * @return bool
228
+     */
229
+    private function setKey($path, $key) {
230
+        $this->keySetPreparation(dirname($path));
231
+
232
+        $result = $this->view->file_put_contents($path, $key);
233
+
234
+        if (is_int($result) && $result > 0) {
235
+            $this->keyCache[$path] = $key;
236
+            return true;
237
+        }
238
+
239
+        return false;
240
+    }
241
+
242
+    /**
243
+     * get path to key folder for a given file
244
+     *
245
+     * @param string $encryptionModuleId
246
+     * @param string $path path to the file, relative to data/
247
+     * @return string
248
+     */
249
+    private function getFileKeyDir($encryptionModuleId, $path) {
250
+
251
+        list($owner, $filename) = $this->util->getUidAndFilename($path);
252
+
253
+        // in case of system wide mount points the keys are stored directly in the data directory
254
+        if ($this->util->isSystemWideMountPoint($filename, $owner)) {
255
+            $keyPath = $this->root_dir . '/' . $this->keys_base_dir . $filename . '/';
256
+        } else {
257
+            $keyPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $filename . '/';
258
+        }
259
+
260
+        return Filesystem::normalizePath($keyPath . $encryptionModuleId . '/', false);
261
+    }
262
+
263
+    /**
264
+     * move keys if a file was renamed
265
+     *
266
+     * @param string $source
267
+     * @param string $target
268
+     * @return boolean
269
+     */
270
+    public function renameKeys($source, $target) {
271
+
272
+        $sourcePath = $this->getPathToKeys($source);
273
+        $targetPath = $this->getPathToKeys($target);
274
+
275
+        if ($this->view->file_exists($sourcePath)) {
276
+            $this->keySetPreparation(dirname($targetPath));
277
+            $this->view->rename($sourcePath, $targetPath);
278
+
279
+            return true;
280
+        }
281
+
282
+        return false;
283
+    }
284
+
285
+
286
+    /**
287
+     * copy keys if a file was renamed
288
+     *
289
+     * @param string $source
290
+     * @param string $target
291
+     * @return boolean
292
+     */
293
+    public function copyKeys($source, $target) {
294
+
295
+        $sourcePath = $this->getPathToKeys($source);
296
+        $targetPath = $this->getPathToKeys($target);
297
+
298
+        if ($this->view->file_exists($sourcePath)) {
299
+            $this->keySetPreparation(dirname($targetPath));
300
+            $this->view->copy($sourcePath, $targetPath);
301
+            return true;
302
+        }
303
+
304
+        return false;
305
+    }
306
+
307
+    /**
308
+     * backup keys of a given encryption module
309
+     *
310
+     * @param string $encryptionModuleId
311
+     * @param string $purpose
312
+     * @param string $uid
313
+     * @return bool
314
+     * @since 12.0.0
315
+     */
316
+    public function backupUserKeys($encryptionModuleId, $purpose, $uid) {
317
+        $source = $uid . $this->encryption_base_dir . '/' . $encryptionModuleId;
318
+        $backupDir = $uid . $this->backup_base_dir;
319
+        if (!$this->view->file_exists($backupDir)) {
320
+            $this->view->mkdir($backupDir);
321
+        }
322
+
323
+        $backupDir = $backupDir . '/' . $purpose . '.' . $encryptionModuleId . '.' . $this->getTimestamp();
324
+        $this->view->mkdir($backupDir);
325
+
326
+        return $this->view->copy($source, $backupDir);
327
+    }
328
+
329
+    /**
330
+     * get the current timestamp
331
+     *
332
+     * @return int
333
+     */
334
+    protected function getTimestamp() {
335
+        return time();
336
+    }
337
+
338
+    /**
339
+     * get system wide path and detect mount points
340
+     *
341
+     * @param string $path
342
+     * @return string
343
+     */
344
+    protected function getPathToKeys($path) {
345
+        list($owner, $relativePath) = $this->util->getUidAndFilename($path);
346
+        $systemWideMountPoint = $this->util->isSystemWideMountPoint($relativePath, $owner);
347
+
348
+        if ($systemWideMountPoint) {
349
+            $systemPath = $this->root_dir . '/' . $this->keys_base_dir . $relativePath . '/';
350
+        } else {
351
+            $systemPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $relativePath . '/';
352
+        }
353
+
354
+        return  Filesystem::normalizePath($systemPath, false);
355
+    }
356
+
357
+    /**
358
+     * Make preparations to filesystem for saving a key file
359
+     *
360
+     * @param string $path relative to the views root
361
+     */
362
+    protected function keySetPreparation($path) {
363
+        // If the file resides within a subdirectory, create it
364
+        if (!$this->view->file_exists($path)) {
365
+            $sub_dirs = explode('/', ltrim($path, '/'));
366
+            $dir = '';
367
+            foreach ($sub_dirs as $sub_dir) {
368
+                $dir .= '/' . $sub_dir;
369
+                if (!$this->view->is_dir($dir)) {
370
+                    $this->view->mkdir($dir);
371
+                }
372
+            }
373
+        }
374
+    }
375 375
 
376 376
 }
Please login to merge, or discard this patch.