|
1
|
|
|
<?php |
|
2
|
|
|
/** |
|
3
|
|
|
* @copyright Copyright (c) 2018 Bjoern Schiessle <[email protected]> |
|
4
|
|
|
* |
|
5
|
|
|
* @license GNU AGPL version 3 or any later version |
|
6
|
|
|
* |
|
7
|
|
|
* This program is free software: you can redistribute it and/or modify |
|
8
|
|
|
* it under the terms of the GNU Affero General Public License as |
|
9
|
|
|
* published by the Free Software Foundation, either version 3 of the |
|
10
|
|
|
* License, or (at your option) any later version. |
|
11
|
|
|
* |
|
12
|
|
|
* This program is distributed in the hope that it will be useful, |
|
13
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
14
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
15
|
|
|
* GNU Affero General Public License for more details. |
|
16
|
|
|
* |
|
17
|
|
|
* You should have received a copy of the GNU Affero General Public License |
|
18
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
19
|
|
|
* |
|
20
|
|
|
*/ |
|
21
|
|
|
|
|
22
|
|
|
namespace OCA\FederatedFileSharing\OCM; |
|
23
|
|
|
|
|
24
|
|
|
use OC\AppFramework\Http; |
|
25
|
|
|
use OC\Files\Filesystem; |
|
26
|
|
|
use OCA\Files_Sharing\Activity\Providers\RemoteShares; |
|
27
|
|
|
use OCA\FederatedFileSharing\AddressHandler; |
|
28
|
|
|
use OCA\FederatedFileSharing\FederatedShareProvider; |
|
29
|
|
|
use OCP\Activity\IManager as IActivityManager; |
|
30
|
|
|
use OCP\App\IAppManager; |
|
31
|
|
|
use OCP\Constants; |
|
32
|
|
|
use OCP\Federation\Exceptions\ActionNotSupportedException; |
|
33
|
|
|
use OCP\Federation\Exceptions\AuthenticationFailedException; |
|
34
|
|
|
use OCP\Federation\Exceptions\BadRequestException; |
|
35
|
|
|
use OCP\Federation\Exceptions\ProviderCouldNotAddShareException; |
|
36
|
|
|
use OCP\Federation\ICloudFederationFactory; |
|
37
|
|
|
use OCP\Federation\ICloudFederationProvider; |
|
38
|
|
|
use OCP\Federation\ICloudFederationProviderManager; |
|
39
|
|
|
use OCP\Federation\ICloudFederationShare; |
|
40
|
|
|
use OCP\Federation\ICloudIdManager; |
|
41
|
|
|
use OCP\Files\NotFoundException; |
|
42
|
|
|
use OCP\IDBConnection; |
|
43
|
|
|
use OCP\ILogger; |
|
44
|
|
|
use OCP\IURLGenerator; |
|
45
|
|
|
use OCP\IUserManager; |
|
46
|
|
|
use OCP\Notification\IManager as INotificationManager; |
|
47
|
|
|
use OCP\Share\Exceptions\ShareNotFound; |
|
48
|
|
|
use OCP\Share\IShare; |
|
49
|
|
|
use OCP\Util; |
|
50
|
|
|
|
|
51
|
|
|
class CloudFederationProviderFiles implements ICloudFederationProvider { |
|
52
|
|
|
|
|
53
|
|
|
/** @var IAppManager */ |
|
54
|
|
|
private $appManager; |
|
55
|
|
|
|
|
56
|
|
|
/** @var FederatedShareProvider */ |
|
57
|
|
|
private $federatedShareProvider; |
|
58
|
|
|
|
|
59
|
|
|
/** @var AddressHandler */ |
|
60
|
|
|
private $addressHandler; |
|
61
|
|
|
|
|
62
|
|
|
/** @var ILogger */ |
|
63
|
|
|
private $logger; |
|
64
|
|
|
|
|
65
|
|
|
/** @var IUserManager */ |
|
66
|
|
|
private $userManager; |
|
67
|
|
|
|
|
68
|
|
|
/** @var ICloudIdManager */ |
|
69
|
|
|
private $cloudIdManager; |
|
70
|
|
|
|
|
71
|
|
|
/** @var IActivityManager */ |
|
72
|
|
|
private $activityManager; |
|
73
|
|
|
|
|
74
|
|
|
/** @var INotificationManager */ |
|
75
|
|
|
private $notificationManager; |
|
76
|
|
|
|
|
77
|
|
|
/** @var IURLGenerator */ |
|
78
|
|
|
private $urlGenerator; |
|
79
|
|
|
|
|
80
|
|
|
/** @var ICloudFederationFactory */ |
|
81
|
|
|
private $cloudFederationFactory; |
|
82
|
|
|
|
|
83
|
|
|
/** @var ICloudFederationProviderManager */ |
|
84
|
|
|
private $cloudFederationProviderManager; |
|
85
|
|
|
|
|
86
|
|
|
/** @var IDBConnection */ |
|
87
|
|
|
private $connection; |
|
88
|
|
|
|
|
89
|
|
|
/** |
|
90
|
|
|
* CloudFederationProvider constructor. |
|
91
|
|
|
* |
|
92
|
|
|
* @param IAppManager $appManager |
|
93
|
|
|
* @param FederatedShareProvider $federatedShareProvider |
|
94
|
|
|
* @param AddressHandler $addressHandler |
|
95
|
|
|
* @param ILogger $logger |
|
96
|
|
|
* @param IUserManager $userManager |
|
97
|
|
|
* @param ICloudIdManager $cloudIdManager |
|
98
|
|
|
* @param IActivityManager $activityManager |
|
99
|
|
|
* @param INotificationManager $notificationManager |
|
100
|
|
|
* @param IURLGenerator $urlGenerator |
|
101
|
|
|
* @param ICloudFederationFactory $cloudFederationFactory |
|
102
|
|
|
* @param ICloudFederationProviderManager $cloudFederationProviderManager |
|
103
|
|
|
* @param IDBConnection $connection |
|
104
|
|
|
*/ |
|
105
|
|
|
public function __construct(IAppManager $appManager, |
|
106
|
|
|
FederatedShareProvider $federatedShareProvider, |
|
107
|
|
|
AddressHandler $addressHandler, |
|
108
|
|
|
ILogger $logger, |
|
109
|
|
|
IUserManager $userManager, |
|
110
|
|
|
ICloudIdManager $cloudIdManager, |
|
111
|
|
|
IActivityManager $activityManager, |
|
112
|
|
|
INotificationManager $notificationManager, |
|
113
|
|
|
IURLGenerator $urlGenerator, |
|
114
|
|
|
ICloudFederationFactory $cloudFederationFactory, |
|
115
|
|
|
ICloudFederationProviderManager $cloudFederationProviderManager, |
|
116
|
|
|
IDBConnection $connection |
|
117
|
|
|
) { |
|
118
|
|
|
$this->appManager = $appManager; |
|
119
|
|
|
$this->federatedShareProvider = $federatedShareProvider; |
|
120
|
|
|
$this->addressHandler = $addressHandler; |
|
121
|
|
|
$this->logger = $logger; |
|
122
|
|
|
$this->userManager = $userManager; |
|
123
|
|
|
$this->cloudIdManager = $cloudIdManager; |
|
124
|
|
|
$this->activityManager = $activityManager; |
|
125
|
|
|
$this->notificationManager = $notificationManager; |
|
126
|
|
|
$this->urlGenerator = $urlGenerator; |
|
127
|
|
|
$this->cloudFederationFactory = $cloudFederationFactory; |
|
128
|
|
|
$this->cloudFederationProviderManager = $cloudFederationProviderManager; |
|
129
|
|
|
$this->connection = $connection; |
|
130
|
|
|
} |
|
131
|
|
|
|
|
132
|
|
|
|
|
133
|
|
|
|
|
134
|
|
|
/** |
|
135
|
|
|
* @return string |
|
136
|
|
|
*/ |
|
137
|
|
|
public function getShareType() { |
|
138
|
|
|
return 'file'; |
|
139
|
|
|
} |
|
140
|
|
|
|
|
141
|
|
|
/** |
|
142
|
|
|
* share received from another server |
|
143
|
|
|
* |
|
144
|
|
|
* @param ICloudFederationShare $share |
|
145
|
|
|
* @return string provider specific unique ID of the share |
|
146
|
|
|
* |
|
147
|
|
|
* @throws ProviderCouldNotAddShareException |
|
148
|
|
|
* @throws \OCP\AppFramework\QueryException |
|
149
|
|
|
* @throws \OC\HintException |
|
150
|
|
|
* @since 14.0.0 |
|
151
|
|
|
*/ |
|
152
|
|
|
public function shareReceived(ICloudFederationShare $share) { |
|
153
|
|
|
|
|
154
|
|
|
if (!$this->isS2SEnabled(true)) { |
|
155
|
|
|
throw new ProviderCouldNotAddShareException('Server does not support federated cloud sharing', '', Http::STATUS_SERVICE_UNAVAILABLE); |
|
156
|
|
|
} |
|
157
|
|
|
|
|
158
|
|
|
$protocol = $share->getProtocol(); |
|
159
|
|
|
if ($protocol['name'] !== 'webdav') { |
|
160
|
|
|
throw new ProviderCouldNotAddShareException('Unsupported protocol for data exchange.', '', Http::STATUS_NOT_IMPLEMENTED); |
|
161
|
|
|
} |
|
162
|
|
|
|
|
163
|
|
|
list($ownerUid, $remote) = $this->addressHandler->splitUserRemote($share->getOwner()); |
|
|
|
|
|
|
164
|
|
|
// for backward compatibility make sure that the remote url stored in the |
|
165
|
|
|
// database ends with a trailing slash |
|
166
|
|
|
if (substr($remote, -1) !== '/') { |
|
167
|
|
|
$remote = $remote . '/'; |
|
168
|
|
|
} |
|
169
|
|
|
|
|
170
|
|
|
$token = $share->getShareSecret(); |
|
171
|
|
|
$name = $share->getResourceName(); |
|
172
|
|
|
$owner = $share->getOwnerDisplayName(); |
|
173
|
|
|
$sharedBy = $share->getSharedByDisplayName(); |
|
|
|
|
|
|
174
|
|
|
$shareWith = $share->getShareWith(); |
|
175
|
|
|
$remoteId = $share->getProviderId(); |
|
176
|
|
|
$sharedByFederatedId = $share->getSharedBy(); |
|
177
|
|
|
$ownerFederatedId = $share->getOwner(); |
|
178
|
|
|
|
|
179
|
|
|
// if no explicit information about the person who created the share was send |
|
180
|
|
|
// we assume that the share comes from the owner |
|
181
|
|
|
if ($sharedByFederatedId === null) { |
|
182
|
|
|
$sharedBy = $owner; |
|
|
|
|
|
|
183
|
|
|
$sharedByFederatedId = $ownerFederatedId; |
|
184
|
|
|
} |
|
185
|
|
|
|
|
186
|
|
|
if ($remote && $token && $name && $owner && $remoteId && $shareWith) { |
|
187
|
|
|
|
|
188
|
|
|
if (!Util::isValidFileName($name)) { |
|
189
|
|
|
throw new ProviderCouldNotAddShareException('The mountpoint name contains invalid characters.', '', Http::STATUS_BAD_REQUEST); |
|
190
|
|
|
} |
|
191
|
|
|
|
|
192
|
|
|
// FIXME this should be a method in the user management instead |
|
193
|
|
|
$this->logger->debug('shareWith before, ' . $shareWith, ['app' => 'files_sharing']); |
|
194
|
|
|
Util::emitHook( |
|
195
|
|
|
'\OCA\Files_Sharing\API\Server2Server', |
|
196
|
|
|
'preLoginNameUsedAsUserName', |
|
197
|
|
|
array('uid' => &$shareWith) |
|
198
|
|
|
); |
|
199
|
|
|
$this->logger->debug('shareWith after, ' . $shareWith, ['app' => 'files_sharing']); |
|
200
|
|
|
|
|
201
|
|
|
if (!$this->userManager->userExists($shareWith)) { |
|
202
|
|
|
throw new ProviderCouldNotAddShareException('User does not exists', '',Http::STATUS_BAD_REQUEST); |
|
203
|
|
|
} |
|
204
|
|
|
|
|
205
|
|
|
\OC_Util::setupFS($shareWith); |
|
206
|
|
|
|
|
207
|
|
|
$externalManager = new \OCA\Files_Sharing\External\Manager( |
|
208
|
|
|
\OC::$server->getDatabaseConnection(), |
|
209
|
|
|
Filesystem::getMountManager(), |
|
210
|
|
|
Filesystem::getLoader(), |
|
211
|
|
|
\OC::$server->getHTTPClientService(), |
|
212
|
|
|
\OC::$server->getNotificationManager(), |
|
213
|
|
|
\OC::$server->query(\OCP\OCS\IDiscoveryService::class), |
|
214
|
|
|
\OC::$server->getCloudFederationProviderManager(), |
|
215
|
|
|
\OC::$server->getCloudFederationFactory(), |
|
216
|
|
|
$shareWith |
|
217
|
|
|
); |
|
218
|
|
|
|
|
219
|
|
|
try { |
|
220
|
|
|
$externalManager->addShare($remote, $token, '', $name, $owner, false, $shareWith, $remoteId); |
|
221
|
|
|
$shareId = \OC::$server->getDatabaseConnection()->lastInsertId('*PREFIX*share_external'); |
|
222
|
|
|
|
|
223
|
|
|
$event = $this->activityManager->generateEvent(); |
|
224
|
|
|
$event->setApp('files_sharing') |
|
225
|
|
|
->setType('remote_share') |
|
226
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_RECEIVED, [$ownerFederatedId, trim($name, '/')]) |
|
227
|
|
|
->setAffectedUser($shareWith) |
|
228
|
|
|
->setObject('remote_share', (int)$shareId, $name); |
|
229
|
|
|
\OC::$server->getActivityManager()->publish($event); |
|
230
|
|
|
|
|
231
|
|
|
$notification = $this->notificationManager->createNotification(); |
|
232
|
|
|
$notification->setApp('files_sharing') |
|
233
|
|
|
->setUser($shareWith) |
|
234
|
|
|
->setDateTime(new \DateTime()) |
|
235
|
|
|
->setObject('remote_share', $shareId) |
|
236
|
|
|
->setSubject('remote_share', [$ownerFederatedId, $sharedByFederatedId, trim($name, '/')]); |
|
237
|
|
|
|
|
238
|
|
|
$declineAction = $notification->createAction(); |
|
239
|
|
|
$declineAction->setLabel('decline') |
|
240
|
|
|
->setLink($this->urlGenerator->getAbsoluteURL($this->urlGenerator->linkTo('', 'ocs/v2.php/apps/files_sharing/api/v1/remote_shares/pending/' . $shareId)), 'DELETE'); |
|
241
|
|
|
$notification->addAction($declineAction); |
|
242
|
|
|
|
|
243
|
|
|
$acceptAction = $notification->createAction(); |
|
244
|
|
|
$acceptAction->setLabel('accept') |
|
245
|
|
|
->setLink($this->urlGenerator->getAbsoluteURL($this->urlGenerator->linkTo('', 'ocs/v2.php/apps/files_sharing/api/v1/remote_shares/pending/' . $shareId)), 'POST'); |
|
246
|
|
|
$notification->addAction($acceptAction); |
|
247
|
|
|
|
|
248
|
|
|
$this->notificationManager->notify($notification); |
|
249
|
|
|
|
|
250
|
|
|
return $shareId; |
|
251
|
|
|
} catch (\Exception $e) { |
|
252
|
|
|
$this->logger->logException($e, [ |
|
|
|
|
|
|
253
|
|
|
'message' => 'Server can not add remote share.', |
|
254
|
|
|
'level' => ILogger::ERROR, |
|
255
|
|
|
'app' => 'files_sharing' |
|
256
|
|
|
]); |
|
257
|
|
|
throw new ProviderCouldNotAddShareException('internal server error, was not able to add share from ' . $remote, '', HTTP::STATUS_INTERNAL_SERVER_ERROR); |
|
258
|
|
|
} |
|
259
|
|
|
} |
|
260
|
|
|
|
|
261
|
|
|
throw new ProviderCouldNotAddShareException('server can not add remote share, missing parameter', '', HTTP::STATUS_BAD_REQUEST); |
|
262
|
|
|
|
|
263
|
|
|
} |
|
264
|
|
|
|
|
265
|
|
|
/** |
|
266
|
|
|
* notification received from another server |
|
267
|
|
|
* |
|
268
|
|
|
* @param string $notificationType (e.g. SHARE_ACCEPTED) |
|
269
|
|
|
* @param string $providerId id of the share |
|
270
|
|
|
* @param array $notification payload of the notification |
|
271
|
|
|
* @return array data send back to the sender |
|
272
|
|
|
* |
|
273
|
|
|
* @throws ActionNotSupportedException |
|
274
|
|
|
* @throws AuthenticationFailedException |
|
275
|
|
|
* @throws BadRequestException |
|
276
|
|
|
* @throws \OC\HintException |
|
277
|
|
|
* @since 14.0.0 |
|
278
|
|
|
*/ |
|
279
|
|
|
public function notificationReceived($notificationType, $providerId, array $notification) { |
|
280
|
|
|
|
|
281
|
|
|
switch ($notificationType) { |
|
282
|
|
|
case 'SHARE_ACCEPTED': |
|
283
|
|
|
return $this->shareAccepted($providerId, $notification); |
|
284
|
|
|
case 'SHARE_DECLINED': |
|
285
|
|
|
return $this->shareDeclined($providerId, $notification); |
|
286
|
|
|
case 'SHARE_UNSHARED': |
|
287
|
|
|
return $this->unshare($providerId, $notification); |
|
288
|
|
|
case 'REQUEST_RESHARE': |
|
289
|
|
|
return $this->reshareRequested($providerId, $notification); |
|
290
|
|
|
case 'RESHARE_UNDO': |
|
291
|
|
|
return $this->undoReshare($providerId, $notification); |
|
292
|
|
|
case 'RESHARE_CHANGE_PERMISSION': |
|
293
|
|
|
return $this->updateResharePermissions($providerId, $notification); |
|
294
|
|
|
} |
|
295
|
|
|
|
|
296
|
|
|
|
|
297
|
|
|
throw new BadRequestException([$notificationType]); |
|
298
|
|
|
} |
|
299
|
|
|
|
|
300
|
|
|
/** |
|
301
|
|
|
* process notification that the recipient accepted a share |
|
302
|
|
|
* |
|
303
|
|
|
* @param string $id |
|
304
|
|
|
* @param array $notification |
|
305
|
|
|
* @return array |
|
306
|
|
|
* @throws ActionNotSupportedException |
|
307
|
|
|
* @throws AuthenticationFailedException |
|
308
|
|
|
* @throws BadRequestException |
|
309
|
|
|
* @throws \OC\HintException |
|
310
|
|
|
*/ |
|
311
|
|
View Code Duplication |
private function shareAccepted($id, array $notification) { |
|
312
|
|
|
|
|
313
|
|
|
if (!$this->isS2SEnabled()) { |
|
314
|
|
|
throw new ActionNotSupportedException('Server does not support federated cloud sharing'); |
|
315
|
|
|
} |
|
316
|
|
|
|
|
317
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
318
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
319
|
|
|
} |
|
320
|
|
|
|
|
321
|
|
|
$token = $notification['sharedSecret']; |
|
322
|
|
|
|
|
323
|
|
|
$share = $this->federatedShareProvider->getShareById($id); |
|
324
|
|
|
|
|
325
|
|
|
$this->verifyShare($share, $token); |
|
326
|
|
|
$this->executeAcceptShare($share); |
|
327
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) { |
|
328
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy()); |
|
329
|
|
|
$remoteId = $this->federatedShareProvider->getRemoteId($share); |
|
330
|
|
|
$notification = $this->cloudFederationFactory->getCloudFederationNotification(); |
|
331
|
|
|
$notification->setMessage( |
|
332
|
|
|
'SHARE_ACCEPTED', |
|
333
|
|
|
'file', |
|
334
|
|
|
$remoteId, |
|
335
|
|
|
[ |
|
336
|
|
|
'sharedSecret' => $token, |
|
337
|
|
|
'message' => 'Recipient accepted the re-share' |
|
338
|
|
|
] |
|
339
|
|
|
|
|
340
|
|
|
); |
|
341
|
|
|
$this->cloudFederationProviderManager->sendNotification($remote, $notification); |
|
342
|
|
|
|
|
343
|
|
|
} |
|
344
|
|
|
|
|
345
|
|
|
return []; |
|
346
|
|
|
} |
|
347
|
|
|
|
|
348
|
|
|
/** |
|
349
|
|
|
* @param IShare $share |
|
350
|
|
|
* @throws ShareNotFound |
|
351
|
|
|
*/ |
|
352
|
|
View Code Duplication |
protected function executeAcceptShare(IShare $share) { |
|
353
|
|
|
try { |
|
354
|
|
|
$fileId = (int)$share->getNode()->getId(); |
|
355
|
|
|
list($file, $link) = $this->getFile($this->getCorrectUid($share), $fileId); |
|
356
|
|
|
} catch (\Exception $e) { |
|
357
|
|
|
throw new ShareNotFound(); |
|
358
|
|
|
} |
|
359
|
|
|
|
|
360
|
|
|
$event = $this->activityManager->generateEvent(); |
|
361
|
|
|
$event->setApp('files_sharing') |
|
362
|
|
|
->setType('remote_share') |
|
363
|
|
|
->setAffectedUser($this->getCorrectUid($share)) |
|
364
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_ACCEPTED, [$share->getSharedWith(), [$fileId => $file]]) |
|
365
|
|
|
->setObject('files', $fileId, $file) |
|
366
|
|
|
->setLink($link); |
|
367
|
|
|
$this->activityManager->publish($event); |
|
368
|
|
|
} |
|
369
|
|
|
|
|
370
|
|
|
/** |
|
371
|
|
|
* process notification that the recipient declined a share |
|
372
|
|
|
* |
|
373
|
|
|
* @param string $id |
|
374
|
|
|
* @param array $notification |
|
375
|
|
|
* @return array |
|
376
|
|
|
* @throws ActionNotSupportedException |
|
377
|
|
|
* @throws AuthenticationFailedException |
|
378
|
|
|
* @throws BadRequestException |
|
379
|
|
|
* @throws ShareNotFound |
|
380
|
|
|
* @throws \OC\HintException |
|
381
|
|
|
* |
|
382
|
|
|
*/ |
|
383
|
|
View Code Duplication |
protected function shareDeclined($id, array $notification) { |
|
384
|
|
|
|
|
385
|
|
|
if (!$this->isS2SEnabled()) { |
|
386
|
|
|
throw new ActionNotSupportedException('Server does not support federated cloud sharing'); |
|
387
|
|
|
} |
|
388
|
|
|
|
|
389
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
390
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
391
|
|
|
} |
|
392
|
|
|
|
|
393
|
|
|
$token = $notification['sharedSecret']; |
|
394
|
|
|
|
|
395
|
|
|
$share = $this->federatedShareProvider->getShareById($id); |
|
396
|
|
|
|
|
397
|
|
|
$this->verifyShare($share, $token); |
|
398
|
|
|
|
|
399
|
|
|
if ($share->getShareOwner() !== $share->getSharedBy()) { |
|
400
|
|
|
list(, $remote) = $this->addressHandler->splitUserRemote($share->getSharedBy()); |
|
401
|
|
|
$remoteId = $this->federatedShareProvider->getRemoteId($share); |
|
402
|
|
|
$notification = $this->cloudFederationFactory->getCloudFederationNotification(); |
|
403
|
|
|
$notification->setMessage( |
|
404
|
|
|
'SHARE_DECLINED', |
|
405
|
|
|
'file', |
|
406
|
|
|
$remoteId, |
|
407
|
|
|
[ |
|
408
|
|
|
'sharedSecret' => $token, |
|
409
|
|
|
'message' => 'Recipient declined the re-share' |
|
410
|
|
|
] |
|
411
|
|
|
|
|
412
|
|
|
); |
|
413
|
|
|
$this->cloudFederationProviderManager->sendNotification($remote, $notification); |
|
414
|
|
|
} |
|
415
|
|
|
|
|
416
|
|
|
$this->executeDeclineShare($share); |
|
417
|
|
|
|
|
418
|
|
|
return []; |
|
419
|
|
|
|
|
420
|
|
|
} |
|
421
|
|
|
|
|
422
|
|
|
/** |
|
423
|
|
|
* delete declined share and create a activity |
|
424
|
|
|
* |
|
425
|
|
|
* @param IShare $share |
|
426
|
|
|
* @throws ShareNotFound |
|
427
|
|
|
*/ |
|
428
|
|
View Code Duplication |
protected function executeDeclineShare(IShare $share) { |
|
429
|
|
|
$this->federatedShareProvider->removeShareFromTable($share); |
|
430
|
|
|
|
|
431
|
|
|
try { |
|
432
|
|
|
$fileId = (int)$share->getNode()->getId(); |
|
433
|
|
|
list($file, $link) = $this->getFile($this->getCorrectUid($share), $fileId); |
|
434
|
|
|
} catch (\Exception $e) { |
|
435
|
|
|
throw new ShareNotFound(); |
|
436
|
|
|
} |
|
437
|
|
|
|
|
438
|
|
|
$event = $this->activityManager->generateEvent(); |
|
439
|
|
|
$event->setApp('files_sharing') |
|
440
|
|
|
->setType('remote_share') |
|
441
|
|
|
->setAffectedUser($this->getCorrectUid($share)) |
|
442
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_DECLINED, [$share->getSharedWith(), [$fileId => $file]]) |
|
443
|
|
|
->setObject('files', $fileId, $file) |
|
444
|
|
|
->setLink($link); |
|
445
|
|
|
$this->activityManager->publish($event); |
|
446
|
|
|
|
|
447
|
|
|
} |
|
448
|
|
|
|
|
449
|
|
|
/** |
|
450
|
|
|
* received the notification that the owner unshared a file from you |
|
451
|
|
|
* |
|
452
|
|
|
* @param string $id |
|
453
|
|
|
* @param array $notification |
|
454
|
|
|
* @return array |
|
455
|
|
|
* @throws AuthenticationFailedException |
|
456
|
|
|
* @throws BadRequestException |
|
457
|
|
|
*/ |
|
458
|
|
|
private function undoReshare($id, array $notification) { |
|
459
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
460
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
461
|
|
|
} |
|
462
|
|
|
$token = $notification['sharedSecret']; |
|
463
|
|
|
|
|
464
|
|
|
$share = $this->federatedShareProvider->getShareById($id); |
|
465
|
|
|
|
|
466
|
|
|
$this->verifyShare($share, $token); |
|
467
|
|
|
$this->federatedShareProvider->removeShareFromTable($share); |
|
468
|
|
|
return []; |
|
469
|
|
|
} |
|
470
|
|
|
|
|
471
|
|
|
/** |
|
472
|
|
|
* unshare file from self |
|
473
|
|
|
* |
|
474
|
|
|
* @param string $id |
|
475
|
|
|
* @param array $notification |
|
476
|
|
|
* @return array |
|
477
|
|
|
* @throws ActionNotSupportedException |
|
478
|
|
|
* @throws BadRequestException |
|
479
|
|
|
*/ |
|
480
|
|
|
private function unshare($id, array $notification) { |
|
481
|
|
|
|
|
482
|
|
|
if (!$this->isS2SEnabled(true)) { |
|
483
|
|
|
throw new ActionNotSupportedException("incoming shares disabled!"); |
|
484
|
|
|
} |
|
485
|
|
|
|
|
486
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
487
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
488
|
|
|
} |
|
489
|
|
|
$token = $notification['sharedSecret']; |
|
490
|
|
|
|
|
491
|
|
|
$qb = $this->connection->getQueryBuilder(); |
|
492
|
|
|
$qb->select('*') |
|
493
|
|
|
->from('share_external') |
|
494
|
|
|
->where( |
|
495
|
|
|
$qb->expr()->andX( |
|
496
|
|
|
$qb->expr()->eq('remote_id', $qb->createNamedParameter($id)), |
|
497
|
|
|
$qb->expr()->eq('share_token', $qb->createNamedParameter($token)) |
|
498
|
|
|
) |
|
499
|
|
|
); |
|
500
|
|
|
|
|
501
|
|
|
$result = $qb->execute(); |
|
502
|
|
|
$share = $result->fetch(); |
|
503
|
|
|
$result->closeCursor(); |
|
504
|
|
|
|
|
505
|
|
|
if ($token && $id && !empty($share)) { |
|
506
|
|
|
|
|
507
|
|
|
$remote = $this->cleanupRemote($share['remote']); |
|
508
|
|
|
|
|
509
|
|
|
$owner = $this->cloudIdManager->getCloudId($share['owner'], $remote); |
|
510
|
|
|
$mountpoint = $share['mountpoint']; |
|
511
|
|
|
$user = $share['user']; |
|
512
|
|
|
|
|
513
|
|
|
$qb = $this->connection->getQueryBuilder(); |
|
514
|
|
|
$qb->delete('share_external') |
|
515
|
|
|
->where( |
|
516
|
|
|
$qb->expr()->andX( |
|
517
|
|
|
$qb->expr()->eq('remote_id', $qb->createNamedParameter($id)), |
|
518
|
|
|
$qb->expr()->eq('share_token', $qb->createNamedParameter($token)) |
|
519
|
|
|
) |
|
520
|
|
|
); |
|
521
|
|
|
|
|
522
|
|
|
$qb->execute(); |
|
523
|
|
|
|
|
524
|
|
|
if ($share['accepted']) { |
|
525
|
|
|
$path = trim($mountpoint, '/'); |
|
526
|
|
|
} else { |
|
527
|
|
|
$path = trim($share['name'], '/'); |
|
528
|
|
|
} |
|
529
|
|
|
|
|
530
|
|
|
$notification = $this->notificationManager->createNotification(); |
|
531
|
|
|
$notification->setApp('files_sharing') |
|
532
|
|
|
->setUser($share['user']) |
|
533
|
|
|
->setObject('remote_share', (int)$share['id']); |
|
534
|
|
|
$this->notificationManager->markProcessed($notification); |
|
535
|
|
|
|
|
536
|
|
|
$event = $this->activityManager->generateEvent(); |
|
537
|
|
|
$event->setApp('files_sharing') |
|
538
|
|
|
->setType('remote_share') |
|
539
|
|
|
->setSubject(RemoteShares::SUBJECT_REMOTE_SHARE_UNSHARED, [$owner->getId(), $path]) |
|
540
|
|
|
->setAffectedUser($user) |
|
541
|
|
|
->setObject('remote_share', (int)$share['id'], $path); |
|
542
|
|
|
\OC::$server->getActivityManager()->publish($event); |
|
543
|
|
|
} |
|
544
|
|
|
|
|
545
|
|
|
return []; |
|
546
|
|
|
} |
|
547
|
|
|
|
|
548
|
|
|
private function cleanupRemote($remote) { |
|
549
|
|
|
$remote = substr($remote, strpos($remote, '://') + 3); |
|
550
|
|
|
|
|
551
|
|
|
return rtrim($remote, '/'); |
|
552
|
|
|
} |
|
553
|
|
|
|
|
554
|
|
|
/** |
|
555
|
|
|
* recipient of a share request to re-share the file with another user |
|
556
|
|
|
* |
|
557
|
|
|
* @param string $id |
|
558
|
|
|
* @param array $notification |
|
559
|
|
|
* @return array |
|
560
|
|
|
* @throws AuthenticationFailedException |
|
561
|
|
|
* @throws BadRequestException |
|
562
|
|
|
* @throws ProviderCouldNotAddShareException |
|
563
|
|
|
* @throws ShareNotFound |
|
564
|
|
|
*/ |
|
565
|
|
|
protected function reshareRequested($id, array $notification) { |
|
566
|
|
|
|
|
567
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
568
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
569
|
|
|
} |
|
570
|
|
|
$token = $notification['sharedSecret']; |
|
571
|
|
|
|
|
572
|
|
|
if (!isset($notification['shareWith'])) { |
|
573
|
|
|
throw new BadRequestException(['shareWith']); |
|
574
|
|
|
} |
|
575
|
|
|
$shareWith = $notification['shareWith']; |
|
576
|
|
|
|
|
577
|
|
|
if (!isset($notification['senderId'])) { |
|
578
|
|
|
throw new BadRequestException(['senderId']); |
|
579
|
|
|
} |
|
580
|
|
|
$senderId = $notification['senderId']; |
|
581
|
|
|
|
|
582
|
|
|
$share = $this->federatedShareProvider->getShareById($id); |
|
583
|
|
|
// don't allow to share a file back to the owner |
|
584
|
|
|
try { |
|
585
|
|
|
list($user, $remote) = $this->addressHandler->splitUserRemote($shareWith); |
|
586
|
|
|
$owner = $share->getShareOwner(); |
|
587
|
|
|
$currentServer = $this->addressHandler->generateRemoteURL(); |
|
588
|
|
|
if ($this->addressHandler->compareAddresses($user, $remote, $owner, $currentServer)) { |
|
589
|
|
|
throw new ProviderCouldNotAddShareException('Resharing back to the owner is not allowed: ' . $id); |
|
590
|
|
|
} |
|
591
|
|
|
} catch (\Exception $e) { |
|
592
|
|
|
throw new ProviderCouldNotAddShareException($e->getMessage()); |
|
593
|
|
|
} |
|
594
|
|
|
|
|
595
|
|
|
$this->verifyShare($share, $token); |
|
596
|
|
|
|
|
597
|
|
|
// check if re-sharing is allowed |
|
598
|
|
|
if ($share->getPermissions() & Constants::PERMISSION_SHARE) { |
|
599
|
|
|
// the recipient of the initial share is now the initiator for the re-share |
|
600
|
|
|
$share->setSharedBy($share->getSharedWith()); |
|
601
|
|
|
$share->setSharedWith($shareWith); |
|
602
|
|
|
$result = $this->federatedShareProvider->create($share); |
|
603
|
|
|
$this->federatedShareProvider->storeRemoteId((int)$result->getId(), $senderId); |
|
604
|
|
|
return ['token' => $result->getToken(), 'providerId' => $result->getId()]; |
|
605
|
|
|
} else { |
|
606
|
|
|
throw new ProviderCouldNotAddShareException('resharing not allowed for share: ' . $id); |
|
607
|
|
|
} |
|
608
|
|
|
|
|
609
|
|
|
} |
|
610
|
|
|
|
|
611
|
|
|
/** |
|
612
|
|
|
* update permission of a re-share so that the share dialog shows the right |
|
613
|
|
|
* permission if the owner or the sender changes the permission |
|
614
|
|
|
* |
|
615
|
|
|
* @param string $id |
|
616
|
|
|
* @param array $notification |
|
617
|
|
|
* @return array |
|
618
|
|
|
* @throws AuthenticationFailedException |
|
619
|
|
|
* @throws BadRequestException |
|
620
|
|
|
*/ |
|
621
|
|
|
protected function updateResharePermissions($id, array $notification) { |
|
622
|
|
|
|
|
623
|
|
|
if (!isset($notification['sharedSecret'])) { |
|
624
|
|
|
throw new BadRequestException(['sharedSecret']); |
|
625
|
|
|
} |
|
626
|
|
|
$token = $notification['sharedSecret']; |
|
627
|
|
|
|
|
628
|
|
|
if (!isset($notification['permission'])) { |
|
629
|
|
|
throw new BadRequestException(['permission']); |
|
630
|
|
|
} |
|
631
|
|
|
$ocmPermissions = $notification['permission']; |
|
632
|
|
|
|
|
633
|
|
|
$share = $this->federatedShareProvider->getShareById($id); |
|
634
|
|
|
|
|
635
|
|
|
$ncPermission = $this->ocmPermissions2ncPermissions($ocmPermissions); |
|
636
|
|
|
|
|
637
|
|
|
$this->verifyShare($share, $token); |
|
638
|
|
|
$this->updatePermissionsInDatabase($share, $ncPermission); |
|
639
|
|
|
|
|
640
|
|
|
return []; |
|
641
|
|
|
} |
|
642
|
|
|
|
|
643
|
|
|
/** |
|
644
|
|
|
* translate OCM Permissions to Nextcloud permissions |
|
645
|
|
|
* |
|
646
|
|
|
* @param array $ocmPermissions |
|
647
|
|
|
* @return int |
|
648
|
|
|
* @throws BadRequestException |
|
649
|
|
|
*/ |
|
650
|
|
|
protected function ocmPermissions2ncPermissions(array $ocmPermissions) { |
|
651
|
|
|
$ncPermissions = 0; |
|
652
|
|
View Code Duplication |
foreach($ocmPermissions as $permission) { |
|
653
|
|
|
switch (strtolower($permission)) { |
|
654
|
|
|
case 'read': |
|
655
|
|
|
$ncPermissions += Constants::PERMISSION_READ; |
|
656
|
|
|
break; |
|
657
|
|
|
case 'write': |
|
658
|
|
|
$ncPermissions += Constants::PERMISSION_CREATE + Constants::PERMISSION_UPDATE; |
|
659
|
|
|
break; |
|
660
|
|
|
case 'share': |
|
661
|
|
|
$ncPermissions += Constants::PERMISSION_SHARE; |
|
662
|
|
|
break; |
|
663
|
|
|
default: |
|
664
|
|
|
throw new BadRequestException(['permission']); |
|
665
|
|
|
} |
|
666
|
|
|
|
|
667
|
|
|
} |
|
668
|
|
|
|
|
669
|
|
|
return $ncPermissions; |
|
670
|
|
|
} |
|
671
|
|
|
|
|
672
|
|
|
/** |
|
673
|
|
|
* update permissions in database |
|
674
|
|
|
* |
|
675
|
|
|
* @param IShare $share |
|
676
|
|
|
* @param int $permissions |
|
677
|
|
|
*/ |
|
678
|
|
|
protected function updatePermissionsInDatabase(IShare $share, $permissions) { |
|
679
|
|
|
$query = $this->connection->getQueryBuilder(); |
|
680
|
|
|
$query->update('share') |
|
681
|
|
|
->where($query->expr()->eq('id', $query->createNamedParameter($share->getId()))) |
|
682
|
|
|
->set('permissions', $query->createNamedParameter($permissions)) |
|
683
|
|
|
->execute(); |
|
684
|
|
|
} |
|
685
|
|
|
|
|
686
|
|
|
|
|
687
|
|
|
/** |
|
688
|
|
|
* get file |
|
689
|
|
|
* |
|
690
|
|
|
* @param string $user |
|
691
|
|
|
* @param int $fileSource |
|
692
|
|
|
* @return array with internal path of the file and a absolute link to it |
|
693
|
|
|
*/ |
|
694
|
|
|
private function getFile($user, $fileSource) { |
|
695
|
|
|
\OC_Util::setupFS($user); |
|
696
|
|
|
|
|
697
|
|
|
try { |
|
698
|
|
|
$file = Filesystem::getPath($fileSource); |
|
699
|
|
|
} catch (NotFoundException $e) { |
|
700
|
|
|
$file = null; |
|
701
|
|
|
} |
|
702
|
|
|
$args = Filesystem::is_dir($file) ? array('dir' => $file) : array('dir' => dirname($file), 'scrollto' => $file); |
|
703
|
|
|
$link = Util::linkToAbsolute('files', 'index.php', $args); |
|
704
|
|
|
|
|
705
|
|
|
return [$file, $link]; |
|
706
|
|
|
|
|
707
|
|
|
} |
|
708
|
|
|
|
|
709
|
|
|
/** |
|
710
|
|
|
* check if we are the initiator or the owner of a re-share and return the correct UID |
|
711
|
|
|
* |
|
712
|
|
|
* @param IShare $share |
|
713
|
|
|
* @return string |
|
714
|
|
|
*/ |
|
715
|
|
|
protected function getCorrectUid(IShare $share) { |
|
716
|
|
|
if ($this->userManager->userExists($share->getShareOwner())) { |
|
717
|
|
|
return $share->getShareOwner(); |
|
718
|
|
|
} |
|
719
|
|
|
|
|
720
|
|
|
return $share->getSharedBy(); |
|
721
|
|
|
} |
|
722
|
|
|
|
|
723
|
|
|
|
|
724
|
|
|
|
|
725
|
|
|
/** |
|
726
|
|
|
* check if we got the right share |
|
727
|
|
|
* |
|
728
|
|
|
* @param IShare $share |
|
729
|
|
|
* @param string $token |
|
730
|
|
|
* @return bool |
|
731
|
|
|
* @throws AuthenticationFailedException |
|
732
|
|
|
*/ |
|
733
|
|
|
protected function verifyShare(IShare $share, $token) { |
|
734
|
|
|
if ( |
|
735
|
|
|
$share->getShareType() === FederatedShareProvider::SHARE_TYPE_REMOTE && |
|
736
|
|
|
$share->getToken() === $token |
|
737
|
|
|
) { |
|
738
|
|
|
return true; |
|
739
|
|
|
} |
|
740
|
|
|
|
|
741
|
|
|
throw new AuthenticationFailedException(); |
|
742
|
|
|
} |
|
743
|
|
|
|
|
744
|
|
|
|
|
745
|
|
|
|
|
746
|
|
|
/** |
|
747
|
|
|
* check if server-to-server sharing is enabled |
|
748
|
|
|
* |
|
749
|
|
|
* @param bool $incoming |
|
750
|
|
|
* @return bool |
|
751
|
|
|
*/ |
|
752
|
|
View Code Duplication |
private function isS2SEnabled($incoming = false) { |
|
753
|
|
|
|
|
754
|
|
|
$result = $this->appManager->isEnabledForUser('files_sharing'); |
|
755
|
|
|
|
|
756
|
|
|
if ($incoming) { |
|
757
|
|
|
$result = $result && $this->federatedShareProvider->isIncomingServer2serverShareEnabled(); |
|
758
|
|
|
} else { |
|
759
|
|
|
$result = $result && $this->federatedShareProvider->isOutgoingServer2serverShareEnabled(); |
|
760
|
|
|
} |
|
761
|
|
|
|
|
762
|
|
|
return $result; |
|
763
|
|
|
} |
|
764
|
|
|
|
|
765
|
|
|
|
|
766
|
|
|
/** |
|
767
|
|
|
* get the supported share types, e.g. "user", "group", etc. |
|
768
|
|
|
* |
|
769
|
|
|
* @return array |
|
770
|
|
|
* |
|
771
|
|
|
* @since 14.0.0 |
|
772
|
|
|
*/ |
|
773
|
|
|
public function getSupportedShareTypes() { |
|
774
|
|
|
return ['user']; |
|
775
|
|
|
} |
|
776
|
|
|
} |
|
777
|
|
|
|
This checks looks for assignemnts to variables using the
list(...)function, where not all assigned variables are subsequently used.Consider the following code example.
Only the variables
$aand$care used. There was no need to assign$b.Instead, the list call could have been.