Completed
Pull Request — master (#7115)
by Björn
14:02
created
apps/federatedfilesharing/lib/Notifier.php 2 patches
Indentation   +193 added lines, -193 removed lines patch added patch discarded remove patch
@@ -34,197 +34,197 @@
 block discarded – undo
34 34
 use OCP\Notification\INotifier;
35 35
 
36 36
 class Notifier implements INotifier {
37
-	/** @var IFactory */
38
-	protected $factory;
39
-	/** @var IManager */
40
-	protected $contactsManager;
41
-	/** @var IURLGenerator */
42
-	protected $url;
43
-	/** @var array */
44
-	protected $federatedContacts;
45
-	/** @var ICloudIdManager */
46
-	protected $cloudIdManager;
47
-
48
-	/**
49
-	 * @param IFactory $factory
50
-	 * @param IManager $contactsManager
51
-	 * @param IURLGenerator $url
52
-	 * @param ICloudIdManager $cloudIdManager
53
-	 */
54
-	public function __construct(IFactory $factory, IManager $contactsManager, IURLGenerator $url, ICloudIdManager $cloudIdManager) {
55
-		$this->factory = $factory;
56
-		$this->contactsManager = $contactsManager;
57
-		$this->url = $url;
58
-		$this->cloudIdManager = $cloudIdManager;
59
-	}
60
-
61
-	/**
62
-	 * @param INotification $notification
63
-	 * @param string $languageCode The code of the language that should be used to prepare the notification
64
-	 * @return INotification
65
-	 * @throws \InvalidArgumentException
66
-	 */
67
-	public function prepare(INotification $notification, $languageCode) {
68
-		if ($notification->getApp() !== 'files_sharing') {
69
-			// Not my app => throw
70
-			throw new \InvalidArgumentException();
71
-		}
72
-
73
-		// Read the language from the notification
74
-		$l = $this->factory->get('files_sharing', $languageCode);
75
-
76
-		switch ($notification->getSubject()) {
77
-			// Deal with known subjects
78
-			case 'remote_share':
79
-				$notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/share.svg')));
80
-
81
-				$params = $notification->getSubjectParameters();
82
-				if ($params[0] !== $params[1] && $params[1] !== null) {
83
-					$notification->setParsedSubject(
84
-						$l->t('You received "%3$s" as a remote share from %1$s (on behalf of %2$s)', $params)
85
-					);
86
-					$notification->setRichSubject(
87
-						$l->t('You received {share} as a remote share from {user} (on behalf of {behalf})'),
88
-						[
89
-							'share' => [
90
-								'type' => 'pending-federated-share',
91
-								'id' => $notification->getObjectId(),
92
-								'name' => $params[2],
93
-							],
94
-							'user' => $this->createRemoteUser($params[0]),
95
-							'behalf' => $this->createRemoteUser($params[1]),
96
-						]
97
-					);
98
-				} else {
99
-					$notification->setParsedSubject(
100
-						$l->t('You received "%3$s" as a remote share from %1$s', $params)
101
-					);
102
-					$notification->setRichSubject(
103
-						$l->t('You received {share} as a remote share from {user}'),
104
-						[
105
-							'share' => [
106
-								'type' => 'pending-federated-share',
107
-								'id' => $notification->getObjectId(),
108
-								'name' => $params[2],
109
-							],
110
-							'user' => $this->createRemoteUser($params[0]),
111
-						]
112
-					);
113
-				}
114
-
115
-				// Deal with the actions for a known subject
116
-				foreach ($notification->getActions() as $action) {
117
-					switch ($action->getLabel()) {
118
-						case 'accept':
119
-							$action->setParsedLabel(
120
-								(string) $l->t('Accept')
121
-							)
122
-							->setPrimary(true);
123
-							break;
124
-
125
-						case 'decline':
126
-							$action->setParsedLabel(
127
-								(string) $l->t('Decline')
128
-							);
129
-							break;
130
-					}
131
-
132
-					$notification->addParsedAction($action);
133
-				}
134
-				return $notification;
135
-
136
-			default:
137
-				// Unknown subject => Unknown notification => throw
138
-				throw new \InvalidArgumentException();
139
-		}
140
-	}
141
-
142
-	/**
143
-	 * @param string $cloudId
144
-	 * @return array
145
-	 */
146
-	protected function createRemoteUser($cloudId) {
147
-		$displayName = $cloudId;
148
-		try {
149
-			$resolvedId = $this->cloudIdManager->resolveCloudId($cloudId);
150
-			$displayName = $this->getDisplayName($resolvedId);
151
-			$user = $resolvedId->getUser();
152
-			$server = $resolvedId->getRemote();
153
-		} catch (HintException $e) {
154
-			$user = $cloudId;
155
-			$server = '';
156
-		}
157
-
158
-		return [
159
-			'type' => 'user',
160
-			'id' => $user,
161
-			'name' => $displayName,
162
-			'server' => $server,
163
-		];
164
-	}
165
-
166
-	/**
167
-	 * Try to find the user in the contacts
168
-	 *
169
-	 * @param ICloudId $cloudId
170
-	 * @return string
171
-	 */
172
-	protected function getDisplayName(ICloudId $cloudId) {
173
-		$server = $cloudId->getRemote();
174
-		$user = $cloudId->getUser();
175
-		if (strpos($server, 'http://') === 0) {
176
-			$server = substr($server, strlen('http://'));
177
-		} else if (strpos($server, 'https://') === 0) {
178
-			$server = substr($server, strlen('https://'));
179
-		}
180
-
181
-		try {
182
-			return $this->getDisplayNameFromContact($cloudId->getId());
183
-		} catch (\OutOfBoundsException $e) {
184
-		}
185
-
186
-		try {
187
-			$this->getDisplayNameFromContact($user . '@http://' . $server);
188
-		} catch (\OutOfBoundsException $e) {
189
-		}
190
-
191
-		try {
192
-			$this->getDisplayNameFromContact($user . '@https://' . $server);
193
-		} catch (\OutOfBoundsException $e) {
194
-		}
195
-
196
-		return $cloudId->getId();
197
-	}
198
-
199
-	/**
200
-	 * Try to find the user in the contacts
201
-	 *
202
-	 * @param string $federatedCloudId
203
-	 * @return string
204
-	 * @throws \OutOfBoundsException when there is no contact for the id
205
-	 */
206
-	protected function getDisplayNameFromContact($federatedCloudId) {
207
-		if (isset($this->federatedContacts[$federatedCloudId])) {
208
-			if ($this->federatedContacts[$federatedCloudId] !== '') {
209
-				return $this->federatedContacts[$federatedCloudId];
210
-			} else {
211
-				throw new \OutOfBoundsException('No contact found for federated cloud id');
212
-			}
213
-		}
214
-
215
-		$addressBookEntries = $this->contactsManager->search($federatedCloudId, ['CLOUD']);
216
-		foreach ($addressBookEntries as $entry) {
217
-			if (isset($entry['CLOUD'])) {
218
-				foreach ($entry['CLOUD'] as $cloudID) {
219
-					if ($cloudID === $federatedCloudId) {
220
-						$this->federatedContacts[$federatedCloudId] = $entry['FN'];
221
-						return $entry['FN'];
222
-					}
223
-				}
224
-			}
225
-		}
226
-
227
-		$this->federatedContacts[$federatedCloudId] = '';
228
-		throw new \OutOfBoundsException('No contact found for federated cloud id');
229
-	}
37
+    /** @var IFactory */
38
+    protected $factory;
39
+    /** @var IManager */
40
+    protected $contactsManager;
41
+    /** @var IURLGenerator */
42
+    protected $url;
43
+    /** @var array */
44
+    protected $federatedContacts;
45
+    /** @var ICloudIdManager */
46
+    protected $cloudIdManager;
47
+
48
+    /**
49
+     * @param IFactory $factory
50
+     * @param IManager $contactsManager
51
+     * @param IURLGenerator $url
52
+     * @param ICloudIdManager $cloudIdManager
53
+     */
54
+    public function __construct(IFactory $factory, IManager $contactsManager, IURLGenerator $url, ICloudIdManager $cloudIdManager) {
55
+        $this->factory = $factory;
56
+        $this->contactsManager = $contactsManager;
57
+        $this->url = $url;
58
+        $this->cloudIdManager = $cloudIdManager;
59
+    }
60
+
61
+    /**
62
+     * @param INotification $notification
63
+     * @param string $languageCode The code of the language that should be used to prepare the notification
64
+     * @return INotification
65
+     * @throws \InvalidArgumentException
66
+     */
67
+    public function prepare(INotification $notification, $languageCode) {
68
+        if ($notification->getApp() !== 'files_sharing') {
69
+            // Not my app => throw
70
+            throw new \InvalidArgumentException();
71
+        }
72
+
73
+        // Read the language from the notification
74
+        $l = $this->factory->get('files_sharing', $languageCode);
75
+
76
+        switch ($notification->getSubject()) {
77
+            // Deal with known subjects
78
+            case 'remote_share':
79
+                $notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/share.svg')));
80
+
81
+                $params = $notification->getSubjectParameters();
82
+                if ($params[0] !== $params[1] && $params[1] !== null) {
83
+                    $notification->setParsedSubject(
84
+                        $l->t('You received "%3$s" as a remote share from %1$s (on behalf of %2$s)', $params)
85
+                    );
86
+                    $notification->setRichSubject(
87
+                        $l->t('You received {share} as a remote share from {user} (on behalf of {behalf})'),
88
+                        [
89
+                            'share' => [
90
+                                'type' => 'pending-federated-share',
91
+                                'id' => $notification->getObjectId(),
92
+                                'name' => $params[2],
93
+                            ],
94
+                            'user' => $this->createRemoteUser($params[0]),
95
+                            'behalf' => $this->createRemoteUser($params[1]),
96
+                        ]
97
+                    );
98
+                } else {
99
+                    $notification->setParsedSubject(
100
+                        $l->t('You received "%3$s" as a remote share from %1$s', $params)
101
+                    );
102
+                    $notification->setRichSubject(
103
+                        $l->t('You received {share} as a remote share from {user}'),
104
+                        [
105
+                            'share' => [
106
+                                'type' => 'pending-federated-share',
107
+                                'id' => $notification->getObjectId(),
108
+                                'name' => $params[2],
109
+                            ],
110
+                            'user' => $this->createRemoteUser($params[0]),
111
+                        ]
112
+                    );
113
+                }
114
+
115
+                // Deal with the actions for a known subject
116
+                foreach ($notification->getActions() as $action) {
117
+                    switch ($action->getLabel()) {
118
+                        case 'accept':
119
+                            $action->setParsedLabel(
120
+                                (string) $l->t('Accept')
121
+                            )
122
+                            ->setPrimary(true);
123
+                            break;
124
+
125
+                        case 'decline':
126
+                            $action->setParsedLabel(
127
+                                (string) $l->t('Decline')
128
+                            );
129
+                            break;
130
+                    }
131
+
132
+                    $notification->addParsedAction($action);
133
+                }
134
+                return $notification;
135
+
136
+            default:
137
+                // Unknown subject => Unknown notification => throw
138
+                throw new \InvalidArgumentException();
139
+        }
140
+    }
141
+
142
+    /**
143
+     * @param string $cloudId
144
+     * @return array
145
+     */
146
+    protected function createRemoteUser($cloudId) {
147
+        $displayName = $cloudId;
148
+        try {
149
+            $resolvedId = $this->cloudIdManager->resolveCloudId($cloudId);
150
+            $displayName = $this->getDisplayName($resolvedId);
151
+            $user = $resolvedId->getUser();
152
+            $server = $resolvedId->getRemote();
153
+        } catch (HintException $e) {
154
+            $user = $cloudId;
155
+            $server = '';
156
+        }
157
+
158
+        return [
159
+            'type' => 'user',
160
+            'id' => $user,
161
+            'name' => $displayName,
162
+            'server' => $server,
163
+        ];
164
+    }
165
+
166
+    /**
167
+     * Try to find the user in the contacts
168
+     *
169
+     * @param ICloudId $cloudId
170
+     * @return string
171
+     */
172
+    protected function getDisplayName(ICloudId $cloudId) {
173
+        $server = $cloudId->getRemote();
174
+        $user = $cloudId->getUser();
175
+        if (strpos($server, 'http://') === 0) {
176
+            $server = substr($server, strlen('http://'));
177
+        } else if (strpos($server, 'https://') === 0) {
178
+            $server = substr($server, strlen('https://'));
179
+        }
180
+
181
+        try {
182
+            return $this->getDisplayNameFromContact($cloudId->getId());
183
+        } catch (\OutOfBoundsException $e) {
184
+        }
185
+
186
+        try {
187
+            $this->getDisplayNameFromContact($user . '@http://' . $server);
188
+        } catch (\OutOfBoundsException $e) {
189
+        }
190
+
191
+        try {
192
+            $this->getDisplayNameFromContact($user . '@https://' . $server);
193
+        } catch (\OutOfBoundsException $e) {
194
+        }
195
+
196
+        return $cloudId->getId();
197
+    }
198
+
199
+    /**
200
+     * Try to find the user in the contacts
201
+     *
202
+     * @param string $federatedCloudId
203
+     * @return string
204
+     * @throws \OutOfBoundsException when there is no contact for the id
205
+     */
206
+    protected function getDisplayNameFromContact($federatedCloudId) {
207
+        if (isset($this->federatedContacts[$federatedCloudId])) {
208
+            if ($this->federatedContacts[$federatedCloudId] !== '') {
209
+                return $this->federatedContacts[$federatedCloudId];
210
+            } else {
211
+                throw new \OutOfBoundsException('No contact found for federated cloud id');
212
+            }
213
+        }
214
+
215
+        $addressBookEntries = $this->contactsManager->search($federatedCloudId, ['CLOUD']);
216
+        foreach ($addressBookEntries as $entry) {
217
+            if (isset($entry['CLOUD'])) {
218
+                foreach ($entry['CLOUD'] as $cloudID) {
219
+                    if ($cloudID === $federatedCloudId) {
220
+                        $this->federatedContacts[$federatedCloudId] = $entry['FN'];
221
+                        return $entry['FN'];
222
+                    }
223
+                }
224
+            }
225
+        }
226
+
227
+        $this->federatedContacts[$federatedCloudId] = '';
228
+        throw new \OutOfBoundsException('No contact found for federated cloud id');
229
+    }
230 230
 }
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -184,12 +184,12 @@
 block discarded – undo
184 184
 		}
185 185
 
186 186
 		try {
187
-			$this->getDisplayNameFromContact($user . '@http://' . $server);
187
+			$this->getDisplayNameFromContact($user.'@http://'.$server);
188 188
 		} catch (\OutOfBoundsException $e) {
189 189
 		}
190 190
 
191 191
 		try {
192
-			$this->getDisplayNameFromContact($user . '@https://' . $server);
192
+			$this->getDisplayNameFromContact($user.'@https://'.$server);
193 193
 		} catch (\OutOfBoundsException $e) {
194 194
 		}
195 195
 
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/BackgroundJob/RetryJob.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -105,7 +105,7 @@  discard block
 block discarded – undo
105 105
 		$token = $argument['token'];
106 106
 		$action = $argument['action'];
107 107
 		$data = json_decode($argument['data'], true);
108
-		$try = (int)$argument['try'] + 1;
108
+		$try = (int) $argument['try'] + 1;
109 109
 
110 110
 		$result = $this->notifications->sendUpdateToRemote($remote, $remoteId, $token, $action, $data, $try);
111 111
 		
@@ -128,7 +128,7 @@  discard block
 block discarded – undo
128 128
 				'token' => $argument['token'],
129 129
 				'data' => $argument['data'],
130 130
 				'action' => $argument['action'],
131
-				'try' => (int)$argument['try'] + 1,
131
+				'try' => (int) $argument['try'] + 1,
132 132
 				'lastRun' => time()
133 133
 			]
134 134
 		);
@@ -141,7 +141,7 @@  discard block
 block discarded – undo
141 141
 	 * @return bool
142 142
 	 */
143 143
 	protected function shouldRun(array $argument) {
144
-		$lastRun = (int)$argument['lastRun'];
144
+		$lastRun = (int) $argument['lastRun'];
145 145
 		return ((time() - $lastRun) > $this->interval);
146 146
 	}
147 147
 
Please login to merge, or discard this patch.
Indentation   +98 added lines, -98 removed lines patch added patch discarded remove patch
@@ -41,103 +41,103 @@
 block discarded – undo
41 41
  */
42 42
 class RetryJob extends Job {
43 43
 
44
-	/** @var  bool */
45
-	private $retainJob = true;
46
-
47
-	/** @var Notifications */
48
-	private $notifications;
49
-
50
-	/** @var int max number of attempts to send the request */
51
-	private $maxTry = 20;
52
-
53
-	/** @var int how much time should be between two tries (10 minutes) */
54
-	private $interval = 600;
55
-
56
-	/**
57
-	 * UnShare constructor.
58
-	 *
59
-	 * @param Notifications $notifications
60
-	 */
61
-	public function __construct(Notifications $notifications = null) {
62
-		if ($notifications) {
63
-			$this->notifications = $notifications;
64
-		} else {
65
-			$addressHandler = new AddressHandler(
66
-				\OC::$server->getURLGenerator(),
67
-				\OC::$server->getL10N('federatedfilesharing'),
68
-				\OC::$server->getCloudIdManager()
69
-			);
70
-			$this->notifications = new Notifications(
71
-				$addressHandler,
72
-				\OC::$server->getHTTPClientService(),
73
-				\OC::$server->query(\OCP\OCS\IDiscoveryService::class),
74
-				\OC::$server->getJobList()
75
-			);
76
-		}
77
-
78
-	}
79
-
80
-	/**
81
-	 * run the job, then remove it from the jobList
82
-	 *
83
-	 * @param JobList $jobList
84
-	 * @param ILogger|null $logger
85
-	 */
86
-	public function execute($jobList, ILogger $logger = null) {
87
-
88
-		if ($this->shouldRun($this->argument)) {
89
-			parent::execute($jobList, $logger);
90
-			$jobList->remove($this, $this->argument);
91
-			if ($this->retainJob) {
92
-				$this->reAddJob($jobList, $this->argument);
93
-			}
94
-		}
95
-	}
96
-
97
-	protected function run($argument) {
98
-		$remote = $argument['remote'];
99
-		$remoteId = $argument['remoteId'];
100
-		$token = $argument['token'];
101
-		$action = $argument['action'];
102
-		$data = json_decode($argument['data'], true);
103
-		$try = (int)$argument['try'] + 1;
104
-
105
-		$result = $this->notifications->sendUpdateToRemote($remote, $remoteId, $token, $action, $data, $try);
106
-
107
-		if ($result === true || $try > $this->maxTry) {
108
-			$this->retainJob = false;
109
-		}
110
-	}
111
-
112
-	/**
113
-	 * re-add background job with new arguments
114
-	 *
115
-	 * @param IJobList $jobList
116
-	 * @param array $argument
117
-	 */
118
-	protected function reAddJob(IJobList $jobList, array $argument) {
119
-		$jobList->add('OCA\FederatedFileSharing\BackgroundJob\RetryJob',
120
-			[
121
-				'remote' => $argument['remote'],
122
-				'remoteId' => $argument['remoteId'],
123
-				'token' => $argument['token'],
124
-				'data' => $argument['data'],
125
-				'action' => $argument['action'],
126
-				'try' => (int)$argument['try'] + 1,
127
-				'lastRun' => time()
128
-			]
129
-		);
130
-	}
131
-
132
-	/**
133
-	 * test if it is time for the next run
134
-	 *
135
-	 * @param array $argument
136
-	 * @return bool
137
-	 */
138
-	protected function shouldRun(array $argument) {
139
-		$lastRun = (int)$argument['lastRun'];
140
-		return ((time() - $lastRun) > $this->interval);
141
-	}
44
+    /** @var  bool */
45
+    private $retainJob = true;
46
+
47
+    /** @var Notifications */
48
+    private $notifications;
49
+
50
+    /** @var int max number of attempts to send the request */
51
+    private $maxTry = 20;
52
+
53
+    /** @var int how much time should be between two tries (10 minutes) */
54
+    private $interval = 600;
55
+
56
+    /**
57
+     * UnShare constructor.
58
+     *
59
+     * @param Notifications $notifications
60
+     */
61
+    public function __construct(Notifications $notifications = null) {
62
+        if ($notifications) {
63
+            $this->notifications = $notifications;
64
+        } else {
65
+            $addressHandler = new AddressHandler(
66
+                \OC::$server->getURLGenerator(),
67
+                \OC::$server->getL10N('federatedfilesharing'),
68
+                \OC::$server->getCloudIdManager()
69
+            );
70
+            $this->notifications = new Notifications(
71
+                $addressHandler,
72
+                \OC::$server->getHTTPClientService(),
73
+                \OC::$server->query(\OCP\OCS\IDiscoveryService::class),
74
+                \OC::$server->getJobList()
75
+            );
76
+        }
77
+
78
+    }
79
+
80
+    /**
81
+     * run the job, then remove it from the jobList
82
+     *
83
+     * @param JobList $jobList
84
+     * @param ILogger|null $logger
85
+     */
86
+    public function execute($jobList, ILogger $logger = null) {
87
+
88
+        if ($this->shouldRun($this->argument)) {
89
+            parent::execute($jobList, $logger);
90
+            $jobList->remove($this, $this->argument);
91
+            if ($this->retainJob) {
92
+                $this->reAddJob($jobList, $this->argument);
93
+            }
94
+        }
95
+    }
96
+
97
+    protected function run($argument) {
98
+        $remote = $argument['remote'];
99
+        $remoteId = $argument['remoteId'];
100
+        $token = $argument['token'];
101
+        $action = $argument['action'];
102
+        $data = json_decode($argument['data'], true);
103
+        $try = (int)$argument['try'] + 1;
104
+
105
+        $result = $this->notifications->sendUpdateToRemote($remote, $remoteId, $token, $action, $data, $try);
106
+
107
+        if ($result === true || $try > $this->maxTry) {
108
+            $this->retainJob = false;
109
+        }
110
+    }
111
+
112
+    /**
113
+     * re-add background job with new arguments
114
+     *
115
+     * @param IJobList $jobList
116
+     * @param array $argument
117
+     */
118
+    protected function reAddJob(IJobList $jobList, array $argument) {
119
+        $jobList->add('OCA\FederatedFileSharing\BackgroundJob\RetryJob',
120
+            [
121
+                'remote' => $argument['remote'],
122
+                'remoteId' => $argument['remoteId'],
123
+                'token' => $argument['token'],
124
+                'data' => $argument['data'],
125
+                'action' => $argument['action'],
126
+                'try' => (int)$argument['try'] + 1,
127
+                'lastRun' => time()
128
+            ]
129
+        );
130
+    }
131
+
132
+    /**
133
+     * test if it is time for the next run
134
+     *
135
+     * @param array $argument
136
+     * @return bool
137
+     */
138
+    protected function shouldRun(array $argument) {
139
+        $lastRun = (int)$argument['lastRun'];
140
+        return ((time() - $lastRun) > $this->interval);
141
+    }
142 142
 
143 143
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/TokenHandler.php 2 patches
Indentation   +25 added lines, -25 removed lines patch added patch discarded remove patch
@@ -33,30 +33,30 @@
 block discarded – undo
33 33
  */
34 34
 class TokenHandler {
35 35
 
36
-	const TOKEN_LENGTH = 15;
37
-
38
-	/** @var ISecureRandom */
39
-	private $secureRandom;
40
-
41
-	/**
42
-	 * TokenHandler constructor.
43
-	 *
44
-	 * @param ISecureRandom $secureRandom
45
-	 */
46
-	public function __construct(ISecureRandom $secureRandom) {
47
-		$this->secureRandom = $secureRandom;
48
-	}
49
-
50
-	/**
51
-	 * generate to token used to authenticate federated shares
52
-	 *
53
-	 * @return string
54
-	 */
55
-	public function generateToken() {
56
-		$token = $this->secureRandom->generate(
57
-			self::TOKEN_LENGTH,
58
-			ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_DIGITS);
59
-		return $token;
60
-	}
36
+    const TOKEN_LENGTH = 15;
37
+
38
+    /** @var ISecureRandom */
39
+    private $secureRandom;
40
+
41
+    /**
42
+     * TokenHandler constructor.
43
+     *
44
+     * @param ISecureRandom $secureRandom
45
+     */
46
+    public function __construct(ISecureRandom $secureRandom) {
47
+        $this->secureRandom = $secureRandom;
48
+    }
49
+
50
+    /**
51
+     * generate to token used to authenticate federated shares
52
+     *
53
+     * @return string
54
+     */
55
+    public function generateToken() {
56
+        $token = $this->secureRandom->generate(
57
+            self::TOKEN_LENGTH,
58
+            ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_DIGITS);
59
+        return $token;
60
+    }
61 61
 
62 62
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -55,7 +55,7 @@
 block discarded – undo
55 55
 	public function generateToken() {
56 56
 		$token = $this->secureRandom->generate(
57 57
 			self::TOKEN_LENGTH,
58
-			ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_DIGITS);
58
+			ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_DIGITS);
59 59
 		return $token;
60 60
 	}
61 61
 
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/AddressHandler.php 1 patch
Indentation   +118 added lines, -118 removed lines patch added patch discarded remove patch
@@ -33,122 +33,122 @@
 block discarded – undo
33 33
  */
34 34
 class AddressHandler {
35 35
 
36
-	/** @var IL10N */
37
-	private $l;
38
-
39
-	/** @var IURLGenerator */
40
-	private $urlGenerator;
41
-
42
-	/** @var ICloudIdManager */
43
-	private $cloudIdManager;
44
-
45
-	/**
46
-	 * AddressHandler constructor.
47
-	 *
48
-	 * @param IURLGenerator $urlGenerator
49
-	 * @param IL10N $il10n
50
-	 * @param ICloudIdManager $cloudIdManager
51
-	 */
52
-	public function __construct(
53
-		IURLGenerator $urlGenerator,
54
-		IL10N $il10n,
55
-		ICloudIdManager $cloudIdManager
56
-	) {
57
-		$this->l = $il10n;
58
-		$this->urlGenerator = $urlGenerator;
59
-		$this->cloudIdManager = $cloudIdManager;
60
-	}
61
-
62
-	/**
63
-	 * split user and remote from federated cloud id
64
-	 *
65
-	 * @param string $address federated share address
66
-	 * @return array [user, remoteURL]
67
-	 * @throws HintException
68
-	 */
69
-	public function splitUserRemote($address) {
70
-		try {
71
-			$cloudId = $this->cloudIdManager->resolveCloudId($address);
72
-			return [$cloudId->getUser(), $cloudId->getRemote()];
73
-		} catch (\InvalidArgumentException $e) {
74
-			$hint = $this->l->t('Invalid Federated Cloud ID');
75
-			throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
76
-		}
77
-	}
78
-
79
-	/**
80
-	 * generate remote URL part of federated ID
81
-	 *
82
-	 * @return string url of the current server
83
-	 */
84
-	public function generateRemoteURL() {
85
-		$url = $this->urlGenerator->getAbsoluteURL('/');
86
-		return $url;
87
-	}
88
-
89
-	/**
90
-	 * check if two federated cloud IDs refer to the same user
91
-	 *
92
-	 * @param string $user1
93
-	 * @param string $server1
94
-	 * @param string $user2
95
-	 * @param string $server2
96
-	 * @return bool true if both users and servers are the same
97
-	 */
98
-	public function compareAddresses($user1, $server1, $user2, $server2) {
99
-		$normalizedServer1 = strtolower($this->removeProtocolFromUrl($server1));
100
-		$normalizedServer2 = strtolower($this->removeProtocolFromUrl($server2));
101
-
102
-		if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
103
-			// FIXME this should be a method in the user management instead
104
-			\OCP\Util::emitHook(
105
-				'\OCA\Files_Sharing\API\Server2Server',
106
-				'preLoginNameUsedAsUserName',
107
-				array('uid' => &$user1)
108
-			);
109
-			\OCP\Util::emitHook(
110
-				'\OCA\Files_Sharing\API\Server2Server',
111
-				'preLoginNameUsedAsUserName',
112
-				array('uid' => &$user2)
113
-			);
114
-
115
-			if ($user1 === $user2) {
116
-				return true;
117
-			}
118
-		}
119
-
120
-		return false;
121
-	}
122
-
123
-	/**
124
-	 * remove protocol from URL
125
-	 *
126
-	 * @param string $url
127
-	 * @return string
128
-	 */
129
-	public function removeProtocolFromUrl($url) {
130
-		if (strpos($url, 'https://') === 0) {
131
-			return substr($url, strlen('https://'));
132
-		} else if (strpos($url, 'http://') === 0) {
133
-			return substr($url, strlen('http://'));
134
-		}
135
-
136
-		return $url;
137
-	}
138
-
139
-	/**
140
-	 * check if the url contain the protocol (http or https)
141
-	 *
142
-	 * @param string $url
143
-	 * @return bool
144
-	 */
145
-	public function urlContainProtocol($url) {
146
-		if (strpos($url, 'https://') === 0 ||
147
-			strpos($url, 'http://') === 0) {
148
-
149
-			return true;
150
-		}
151
-
152
-		return false;
153
-	}
36
+    /** @var IL10N */
37
+    private $l;
38
+
39
+    /** @var IURLGenerator */
40
+    private $urlGenerator;
41
+
42
+    /** @var ICloudIdManager */
43
+    private $cloudIdManager;
44
+
45
+    /**
46
+     * AddressHandler constructor.
47
+     *
48
+     * @param IURLGenerator $urlGenerator
49
+     * @param IL10N $il10n
50
+     * @param ICloudIdManager $cloudIdManager
51
+     */
52
+    public function __construct(
53
+        IURLGenerator $urlGenerator,
54
+        IL10N $il10n,
55
+        ICloudIdManager $cloudIdManager
56
+    ) {
57
+        $this->l = $il10n;
58
+        $this->urlGenerator = $urlGenerator;
59
+        $this->cloudIdManager = $cloudIdManager;
60
+    }
61
+
62
+    /**
63
+     * split user and remote from federated cloud id
64
+     *
65
+     * @param string $address federated share address
66
+     * @return array [user, remoteURL]
67
+     * @throws HintException
68
+     */
69
+    public function splitUserRemote($address) {
70
+        try {
71
+            $cloudId = $this->cloudIdManager->resolveCloudId($address);
72
+            return [$cloudId->getUser(), $cloudId->getRemote()];
73
+        } catch (\InvalidArgumentException $e) {
74
+            $hint = $this->l->t('Invalid Federated Cloud ID');
75
+            throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
76
+        }
77
+    }
78
+
79
+    /**
80
+     * generate remote URL part of federated ID
81
+     *
82
+     * @return string url of the current server
83
+     */
84
+    public function generateRemoteURL() {
85
+        $url = $this->urlGenerator->getAbsoluteURL('/');
86
+        return $url;
87
+    }
88
+
89
+    /**
90
+     * check if two federated cloud IDs refer to the same user
91
+     *
92
+     * @param string $user1
93
+     * @param string $server1
94
+     * @param string $user2
95
+     * @param string $server2
96
+     * @return bool true if both users and servers are the same
97
+     */
98
+    public function compareAddresses($user1, $server1, $user2, $server2) {
99
+        $normalizedServer1 = strtolower($this->removeProtocolFromUrl($server1));
100
+        $normalizedServer2 = strtolower($this->removeProtocolFromUrl($server2));
101
+
102
+        if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
103
+            // FIXME this should be a method in the user management instead
104
+            \OCP\Util::emitHook(
105
+                '\OCA\Files_Sharing\API\Server2Server',
106
+                'preLoginNameUsedAsUserName',
107
+                array('uid' => &$user1)
108
+            );
109
+            \OCP\Util::emitHook(
110
+                '\OCA\Files_Sharing\API\Server2Server',
111
+                'preLoginNameUsedAsUserName',
112
+                array('uid' => &$user2)
113
+            );
114
+
115
+            if ($user1 === $user2) {
116
+                return true;
117
+            }
118
+        }
119
+
120
+        return false;
121
+    }
122
+
123
+    /**
124
+     * remove protocol from URL
125
+     *
126
+     * @param string $url
127
+     * @return string
128
+     */
129
+    public function removeProtocolFromUrl($url) {
130
+        if (strpos($url, 'https://') === 0) {
131
+            return substr($url, strlen('https://'));
132
+        } else if (strpos($url, 'http://') === 0) {
133
+            return substr($url, strlen('http://'));
134
+        }
135
+
136
+        return $url;
137
+    }
138
+
139
+    /**
140
+     * check if the url contain the protocol (http or https)
141
+     *
142
+     * @param string $url
143
+     * @return bool
144
+     */
145
+    public function urlContainProtocol($url) {
146
+        if (strpos($url, 'https://') === 0 ||
147
+            strpos($url, 'http://') === 0) {
148
+
149
+            return true;
150
+        }
151
+
152
+        return false;
153
+    }
154 154
 }
Please login to merge, or discard this patch.
apps/federation/templates/settings-admin.php 3 patches
Indentation   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -28,10 +28,10 @@
 block discarded – undo
28 28
 				<?php if((int)$trustedServer['status'] === TrustedServers::STATUS_OK) { ?>
29 29
 					<span class="status success"></span>
30 30
 				<?php
31
-				} elseif(
32
-					(int)$trustedServer['status'] === TrustedServers::STATUS_PENDING ||
33
-					(int)$trustedServer['status'] === TrustedServers::STATUS_ACCESS_REVOKED
34
-				) { ?>
31
+                } elseif(
32
+                    (int)$trustedServer['status'] === TrustedServers::STATUS_PENDING ||
33
+                    (int)$trustedServer['status'] === TrustedServers::STATUS_ACCESS_REVOKED
34
+                ) { ?>
35 35
 					<span class="status indeterminate"></span>
36 36
 				<?php } else {?>
37 37
 					<span class="status error"></span>
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -11,19 +11,19 @@
 block discarded – undo
11 11
 	<p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing.')); ?></p>
12 12
 
13 13
 	<p>
14
-		<input id="autoAddServers" type="checkbox" class="checkbox" <?php if($_['autoAddServers']) p('checked'); ?> />
14
+		<input id="autoAddServers" type="checkbox" class="checkbox" <?php if ($_['autoAddServers']) p('checked'); ?> />
15 15
 		<label for="autoAddServers"><?php p($l->t('Add server automatically once a federated share was created successfully')); ?></label>
16 16
 	</p>
17 17
 
18 18
 	<ul id="listOfTrustedServers">
19
-		<?php foreach($_['trustedServers'] as $trustedServer) { ?>
19
+		<?php foreach ($_['trustedServers'] as $trustedServer) { ?>
20 20
 			<li id="<?php p($trustedServer['id']); ?>">
21
-				<?php if((int)$trustedServer['status'] === TrustedServers::STATUS_OK) { ?>
21
+				<?php if ((int) $trustedServer['status'] === TrustedServers::STATUS_OK) { ?>
22 22
 					<span class="status success"></span>
23 23
 				<?php
24
-				} elseif(
25
-					(int)$trustedServer['status'] === TrustedServers::STATUS_PENDING ||
26
-					(int)$trustedServer['status'] === TrustedServers::STATUS_ACCESS_REVOKED
24
+				} elseif (
25
+					(int) $trustedServer['status'] === TrustedServers::STATUS_PENDING ||
26
+					(int) $trustedServer['status'] === TrustedServers::STATUS_ACCESS_REVOKED
27 27
 				) { ?>
28 28
 					<span class="status indeterminate"></span>
29 29
 				<?php } else {?>
Please login to merge, or discard this patch.
Braces   +4 added lines, -1 removed lines patch added patch discarded remove patch
@@ -11,7 +11,10 @@
 block discarded – undo
11 11
 	<p class="settings-hint"><?php p($l->t('Federation allows you to connect with other trusted servers to exchange the user directory. For example this will be used to auto-complete external users for federated sharing.')); ?></p>
12 12
 
13 13
 	<p>
14
-		<input id="autoAddServers" type="checkbox" class="checkbox" <?php if($_['autoAddServers']) p('checked'); ?> />
14
+		<input id="autoAddServers" type="checkbox" class="checkbox" <?php if($_['autoAddServers']) {
15
+    p('checked');
16
+}
17
+?> />
15 18
 		<label for="autoAddServers"><?php p($l->t('Add server automatically once a federated share was created successfully')); ?></label>
16 19
 	</p>
17 20
 
Please login to merge, or discard this patch.
apps/federation/lib/Controller/OCSAuthAPIController.php 2 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -44,7 +44,7 @@  discard block
 block discarded – undo
44 44
  *
45 45
  * @package OCA\Federation\Controller
46 46
  */
47
-class OCSAuthAPIController extends OCSController{
47
+class OCSAuthAPIController extends OCSController {
48 48
 
49 49
 	/** @var ISecureRandom  */
50 50
 	private $secureRandom;
@@ -103,7 +103,7 @@  discard block
 block discarded – undo
103 103
 	 */
104 104
 	public function requestSharedSecret($url, $token) {
105 105
 		if ($this->trustedServers->isTrustedServer($url) === false) {
106
-			$this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']);
106
+			$this->logger->error('remote server not trusted ('.$url.') while requesting shared secret', ['app' => 'federation']);
107 107
 			throw new OCSForbiddenException();
108 108
 		}
109 109
 
@@ -112,7 +112,7 @@  discard block
 block discarded – undo
112 112
 		$localToken = $this->dbHandler->getToken($url);
113 113
 		if (strcmp($localToken, $token) > 0) {
114 114
 			$this->logger->info(
115
-				'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.',
115
+				'remote server ('.$url.') presented lower token. We will initiate the exchange of the shared secret.',
116 116
 				['app' => 'federation']
117 117
 			);
118 118
 			throw new OCSForbiddenException();
@@ -151,14 +151,14 @@  discard block
 block discarded – undo
151 151
 	 */
152 152
 	public function getSharedSecret($url, $token) {
153 153
 		if ($this->trustedServers->isTrustedServer($url) === false) {
154
-			$this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']);
154
+			$this->logger->error('remote server not trusted ('.$url.') while getting shared secret', ['app' => 'federation']);
155 155
 			throw new OCSForbiddenException();
156 156
 		}
157 157
 
158 158
 		if ($this->isValidToken($url, $token) === false) {
159 159
 			$expectedToken = $this->dbHandler->getToken($url);
160 160
 			$this->logger->error(
161
-				'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret',
161
+				'remote server ('.$url.') didn\'t send a valid token (got "'.$token.'" but expected "'.$expectedToken.'") while getting shared secret',
162 162
 				['app' => 'federation']
163 163
 			);
164 164
 			throw new OCSForbiddenException();
Please login to merge, or discard this patch.
Indentation   +162 added lines, -162 removed lines patch added patch discarded remove patch
@@ -47,166 +47,166 @@
 block discarded – undo
47 47
  */
48 48
 class OCSAuthAPIController extends OCSController{
49 49
 
50
-	/** @var ISecureRandom  */
51
-	private $secureRandom;
52
-
53
-	/** @var IJobList */
54
-	private $jobList;
55
-
56
-	/** @var TrustedServers */
57
-	private $trustedServers;
58
-
59
-	/** @var DbHandler */
60
-	private $dbHandler;
61
-
62
-	/** @var ILogger */
63
-	private $logger;
64
-
65
-	/** @var ITimeFactory */
66
-	private $timeFactory;
67
-
68
-	/**
69
-	 * OCSAuthAPI constructor.
70
-	 *
71
-	 * @param string $appName
72
-	 * @param IRequest $request
73
-	 * @param ISecureRandom $secureRandom
74
-	 * @param IJobList $jobList
75
-	 * @param TrustedServers $trustedServers
76
-	 * @param DbHandler $dbHandler
77
-	 * @param ILogger $logger
78
-	 * @param ITimeFactory $timeFactory
79
-	 */
80
-	public function __construct(
81
-		$appName,
82
-		IRequest $request,
83
-		ISecureRandom $secureRandom,
84
-		IJobList $jobList,
85
-		TrustedServers $trustedServers,
86
-		DbHandler $dbHandler,
87
-		ILogger $logger,
88
-		ITimeFactory $timeFactory
89
-	) {
90
-		parent::__construct($appName, $request);
91
-
92
-		$this->secureRandom = $secureRandom;
93
-		$this->jobList = $jobList;
94
-		$this->trustedServers = $trustedServers;
95
-		$this->dbHandler = $dbHandler;
96
-		$this->logger = $logger;
97
-		$this->timeFactory = $timeFactory;
98
-	}
99
-
100
-	/**
101
-	 * @NoCSRFRequired
102
-	 * @PublicPage
103
-	 *
104
-	 * request received to ask remote server for a shared secret, for legacy end-points
105
-	 *
106
-	 * @param string $url
107
-	 * @param string $token
108
-	 * @return Http\DataResponse
109
-	 * @throws OCSForbiddenException
110
-	 */
111
-	public function requestSharedSecretLegacy($url, $token) {
112
-		return $this->requestSharedSecret($url, $token);
113
-	}
114
-
115
-
116
-	/**
117
-	 * @NoCSRFRequired
118
-	 * @PublicPage
119
-	 *
120
-	 * create shared secret and return it, for legacy end-points
121
-	 *
122
-	 * @param string $url
123
-	 * @param string $token
124
-	 * @return Http\DataResponse
125
-	 * @throws OCSForbiddenException
126
-	 */
127
-	public function getSharedSecretLegacy($url, $token) {
128
-		return $this->getSharedSecret($url, $token);
129
-	}
130
-
131
-	/**
132
-	 * @NoCSRFRequired
133
-	 * @PublicPage
134
-	 *
135
-	 * request received to ask remote server for a shared secret
136
-	 *
137
-	 * @param string $url
138
-	 * @param string $token
139
-	 * @return Http\DataResponse
140
-	 * @throws OCSForbiddenException
141
-	 */
142
-	public function requestSharedSecret($url, $token) {
143
-		if ($this->trustedServers->isTrustedServer($url) === false) {
144
-			$this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']);
145
-			throw new OCSForbiddenException();
146
-		}
147
-
148
-		// if both server initiated the exchange of the shared secret the greater
149
-		// token wins
150
-		$localToken = $this->dbHandler->getToken($url);
151
-		if (strcmp($localToken, $token) > 0) {
152
-			$this->logger->info(
153
-				'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.',
154
-				['app' => 'federation']
155
-			);
156
-			throw new OCSForbiddenException();
157
-		}
158
-
159
-		$this->jobList->add(
160
-			'OCA\Federation\BackgroundJob\GetSharedSecret',
161
-			[
162
-				'url' => $url,
163
-				'token' => $token,
164
-				'created' => $this->timeFactory->getTime()
165
-			]
166
-		);
167
-
168
-		return new Http\DataResponse();
169
-	}
170
-
171
-	/**
172
-	 * @NoCSRFRequired
173
-	 * @PublicPage
174
-	 *
175
-	 * create shared secret and return it
176
-	 *
177
-	 * @param string $url
178
-	 * @param string $token
179
-	 * @return Http\DataResponse
180
-	 * @throws OCSForbiddenException
181
-	 */
182
-	public function getSharedSecret($url, $token) {
183
-		if ($this->trustedServers->isTrustedServer($url) === false) {
184
-			$this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']);
185
-			throw new OCSForbiddenException();
186
-		}
187
-
188
-		if ($this->isValidToken($url, $token) === false) {
189
-			$expectedToken = $this->dbHandler->getToken($url);
190
-			$this->logger->error(
191
-				'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret',
192
-				['app' => 'federation']
193
-			);
194
-			throw new OCSForbiddenException();
195
-		}
196
-
197
-		$sharedSecret = $this->secureRandom->generate(32);
198
-
199
-		$this->trustedServers->addSharedSecret($url, $sharedSecret);
200
-		// reset token after the exchange of the shared secret was successful
201
-		$this->dbHandler->addToken($url, '');
202
-
203
-		return new Http\DataResponse([
204
-			'sharedSecret' => $sharedSecret
205
-		]);
206
-	}
207
-
208
-	protected function isValidToken($url, $token) {
209
-		$storedToken = $this->dbHandler->getToken($url);
210
-		return hash_equals($storedToken, $token);
211
-	}
50
+    /** @var ISecureRandom  */
51
+    private $secureRandom;
52
+
53
+    /** @var IJobList */
54
+    private $jobList;
55
+
56
+    /** @var TrustedServers */
57
+    private $trustedServers;
58
+
59
+    /** @var DbHandler */
60
+    private $dbHandler;
61
+
62
+    /** @var ILogger */
63
+    private $logger;
64
+
65
+    /** @var ITimeFactory */
66
+    private $timeFactory;
67
+
68
+    /**
69
+     * OCSAuthAPI constructor.
70
+     *
71
+     * @param string $appName
72
+     * @param IRequest $request
73
+     * @param ISecureRandom $secureRandom
74
+     * @param IJobList $jobList
75
+     * @param TrustedServers $trustedServers
76
+     * @param DbHandler $dbHandler
77
+     * @param ILogger $logger
78
+     * @param ITimeFactory $timeFactory
79
+     */
80
+    public function __construct(
81
+        $appName,
82
+        IRequest $request,
83
+        ISecureRandom $secureRandom,
84
+        IJobList $jobList,
85
+        TrustedServers $trustedServers,
86
+        DbHandler $dbHandler,
87
+        ILogger $logger,
88
+        ITimeFactory $timeFactory
89
+    ) {
90
+        parent::__construct($appName, $request);
91
+
92
+        $this->secureRandom = $secureRandom;
93
+        $this->jobList = $jobList;
94
+        $this->trustedServers = $trustedServers;
95
+        $this->dbHandler = $dbHandler;
96
+        $this->logger = $logger;
97
+        $this->timeFactory = $timeFactory;
98
+    }
99
+
100
+    /**
101
+     * @NoCSRFRequired
102
+     * @PublicPage
103
+     *
104
+     * request received to ask remote server for a shared secret, for legacy end-points
105
+     *
106
+     * @param string $url
107
+     * @param string $token
108
+     * @return Http\DataResponse
109
+     * @throws OCSForbiddenException
110
+     */
111
+    public function requestSharedSecretLegacy($url, $token) {
112
+        return $this->requestSharedSecret($url, $token);
113
+    }
114
+
115
+
116
+    /**
117
+     * @NoCSRFRequired
118
+     * @PublicPage
119
+     *
120
+     * create shared secret and return it, for legacy end-points
121
+     *
122
+     * @param string $url
123
+     * @param string $token
124
+     * @return Http\DataResponse
125
+     * @throws OCSForbiddenException
126
+     */
127
+    public function getSharedSecretLegacy($url, $token) {
128
+        return $this->getSharedSecret($url, $token);
129
+    }
130
+
131
+    /**
132
+     * @NoCSRFRequired
133
+     * @PublicPage
134
+     *
135
+     * request received to ask remote server for a shared secret
136
+     *
137
+     * @param string $url
138
+     * @param string $token
139
+     * @return Http\DataResponse
140
+     * @throws OCSForbiddenException
141
+     */
142
+    public function requestSharedSecret($url, $token) {
143
+        if ($this->trustedServers->isTrustedServer($url) === false) {
144
+            $this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']);
145
+            throw new OCSForbiddenException();
146
+        }
147
+
148
+        // if both server initiated the exchange of the shared secret the greater
149
+        // token wins
150
+        $localToken = $this->dbHandler->getToken($url);
151
+        if (strcmp($localToken, $token) > 0) {
152
+            $this->logger->info(
153
+                'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.',
154
+                ['app' => 'federation']
155
+            );
156
+            throw new OCSForbiddenException();
157
+        }
158
+
159
+        $this->jobList->add(
160
+            'OCA\Federation\BackgroundJob\GetSharedSecret',
161
+            [
162
+                'url' => $url,
163
+                'token' => $token,
164
+                'created' => $this->timeFactory->getTime()
165
+            ]
166
+        );
167
+
168
+        return new Http\DataResponse();
169
+    }
170
+
171
+    /**
172
+     * @NoCSRFRequired
173
+     * @PublicPage
174
+     *
175
+     * create shared secret and return it
176
+     *
177
+     * @param string $url
178
+     * @param string $token
179
+     * @return Http\DataResponse
180
+     * @throws OCSForbiddenException
181
+     */
182
+    public function getSharedSecret($url, $token) {
183
+        if ($this->trustedServers->isTrustedServer($url) === false) {
184
+            $this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']);
185
+            throw new OCSForbiddenException();
186
+        }
187
+
188
+        if ($this->isValidToken($url, $token) === false) {
189
+            $expectedToken = $this->dbHandler->getToken($url);
190
+            $this->logger->error(
191
+                'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret',
192
+                ['app' => 'federation']
193
+            );
194
+            throw new OCSForbiddenException();
195
+        }
196
+
197
+        $sharedSecret = $this->secureRandom->generate(32);
198
+
199
+        $this->trustedServers->addSharedSecret($url, $sharedSecret);
200
+        // reset token after the exchange of the shared secret was successful
201
+        $this->dbHandler->addToken($url, '');
202
+
203
+        return new Http\DataResponse([
204
+            'sharedSecret' => $sharedSecret
205
+        ]);
206
+    }
207
+
208
+    protected function isValidToken($url, $token) {
209
+        $storedToken = $this->dbHandler->getToken($url);
210
+        return hash_equals($storedToken, $token);
211
+    }
212 212
 }
Please login to merge, or discard this patch.
apps/federation/lib/Command/SyncFederationAddressBooks.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -60,7 +60,7 @@
 block discarded – undo
60 60
 		$progress->start();
61 61
 		$this->syncService->syncThemAll(function($url, $ex) use ($progress, $output) {
62 62
 			if ($ex instanceof \Exception) {
63
-				$output->writeln("Error while syncing $url : " . $ex->getMessage());
63
+				$output->writeln("Error while syncing $url : ".$ex->getMessage());
64 64
 
65 65
 			} else {
66 66
 				$progress->advance();
Please login to merge, or discard this patch.
Indentation   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -30,45 +30,45 @@
 block discarded – undo
30 30
 
31 31
 class SyncFederationAddressBooks extends Command {
32 32
 
33
-	/** @var \OCA\Federation\SyncFederationAddressBooks */
34
-	private $syncService;
33
+    /** @var \OCA\Federation\SyncFederationAddressBooks */
34
+    private $syncService;
35 35
 
36
-	/**
37
-	 * @param \OCA\Federation\SyncFederationAddressBooks $syncService
38
-	 */
39
-	public function __construct(\OCA\Federation\SyncFederationAddressBooks $syncService) {
40
-		parent::__construct();
36
+    /**
37
+     * @param \OCA\Federation\SyncFederationAddressBooks $syncService
38
+     */
39
+    public function __construct(\OCA\Federation\SyncFederationAddressBooks $syncService) {
40
+        parent::__construct();
41 41
 
42
-		$this->syncService = $syncService;
43
-	}
42
+        $this->syncService = $syncService;
43
+    }
44 44
 
45
-	protected function configure() {
46
-		$this
47
-			->setName('federation:sync-addressbooks')
48
-			->setDescription('Synchronizes addressbooks of all federated clouds');
49
-	}
45
+    protected function configure() {
46
+        $this
47
+            ->setName('federation:sync-addressbooks')
48
+            ->setDescription('Synchronizes addressbooks of all federated clouds');
49
+    }
50 50
 
51
-	/**
52
-	 * @param InputInterface $input
53
-	 * @param OutputInterface $output
54
-	 * @return int
55
-	 */
56
-	protected function execute(InputInterface $input, OutputInterface $output) {
51
+    /**
52
+     * @param InputInterface $input
53
+     * @param OutputInterface $output
54
+     * @return int
55
+     */
56
+    protected function execute(InputInterface $input, OutputInterface $output) {
57 57
 
58
-		$progress = new ProgressBar($output);
59
-		$progress->start();
60
-		$this->syncService->syncThemAll(function($url, $ex) use ($progress, $output) {
61
-			if ($ex instanceof \Exception) {
62
-				$output->writeln("Error while syncing $url : " . $ex->getMessage());
58
+        $progress = new ProgressBar($output);
59
+        $progress->start();
60
+        $this->syncService->syncThemAll(function($url, $ex) use ($progress, $output) {
61
+            if ($ex instanceof \Exception) {
62
+                $output->writeln("Error while syncing $url : " . $ex->getMessage());
63 63
 
64
-			} else {
65
-				$progress->advance();
66
-			}
67
-		});
64
+            } else {
65
+                $progress->advance();
66
+            }
67
+        });
68 68
 
69
-		$progress->finish();
70
-		$output->writeln('');
69
+        $progress->finish();
70
+        $output->writeln('');
71 71
 
72
-		return 0;
73
-	}
72
+        return 0;
73
+    }
74 74
 }
Please login to merge, or discard this patch.
apps/federation/lib/TrustedServers.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -221,7 +221,7 @@  discard block
 block discarded – undo
221 221
 		$client = $this->httpClientService->newClient();
222 222
 		try {
223 223
 			$result = $client->get(
224
-				$url . '/status.php',
224
+				$url.'/status.php',
225 225
 				[
226 226
 					'timeout' => 3,
227 227
 					'connect_timeout' => 3,
@@ -232,7 +232,7 @@  discard block
 block discarded – undo
232 232
 
233 233
 			}
234 234
 		} catch (\Exception $e) {
235
-			$this->logger->debug('No Nextcloud server: ' . $e->getMessage());
235
+			$this->logger->debug('No Nextcloud server: '.$e->getMessage());
236 236
 			return false;
237 237
 		}
238 238
 
@@ -273,6 +273,6 @@  discard block
 block discarded – undo
273 273
 
274 274
 		}
275 275
 
276
-		return 'https://' . $url;
276
+		return 'https://'.$url;
277 277
 	}
278 278
 }
Please login to merge, or discard this patch.
Indentation   +244 added lines, -244 removed lines patch added patch discarded remove patch
@@ -39,248 +39,248 @@
 block discarded – undo
39 39
 
40 40
 class TrustedServers {
41 41
 
42
-	/** after a user list was exchanged at least once successfully */
43
-	const STATUS_OK = 1;
44
-	/** waiting for shared secret or initial user list exchange */
45
-	const STATUS_PENDING = 2;
46
-	/** something went wrong, misconfigured server, software bug,... user interaction needed */
47
-	const STATUS_FAILURE = 3;
48
-	/** remote server revoked access */
49
-	const STATUS_ACCESS_REVOKED = 4;
50
-
51
-	/** @var  dbHandler */
52
-	private $dbHandler;
53
-
54
-	/** @var  IClientService */
55
-	private $httpClientService;
56
-
57
-	/** @var ILogger */
58
-	private $logger;
59
-
60
-	/** @var IJobList */
61
-	private $jobList;
62
-
63
-	/** @var ISecureRandom */
64
-	private $secureRandom;
65
-
66
-	/** @var IConfig */
67
-	private $config;
68
-
69
-	/** @var EventDispatcherInterface */
70
-	private $dispatcher;
71
-
72
-	/** @var ITimeFactory */
73
-	private $timeFactory;
74
-
75
-	/**
76
-	 * @param DbHandler $dbHandler
77
-	 * @param IClientService $httpClientService
78
-	 * @param ILogger $logger
79
-	 * @param IJobList $jobList
80
-	 * @param ISecureRandom $secureRandom
81
-	 * @param IConfig $config
82
-	 * @param EventDispatcherInterface $dispatcher
83
-	 * @param ITimeFactory $timeFactory
84
-	 */
85
-	public function __construct(
86
-		DbHandler $dbHandler,
87
-		IClientService $httpClientService,
88
-		ILogger $logger,
89
-		IJobList $jobList,
90
-		ISecureRandom $secureRandom,
91
-		IConfig $config,
92
-		EventDispatcherInterface $dispatcher,
93
-		ITimeFactory $timeFactory
94
-	) {
95
-		$this->dbHandler = $dbHandler;
96
-		$this->httpClientService = $httpClientService;
97
-		$this->logger = $logger;
98
-		$this->jobList = $jobList;
99
-		$this->secureRandom = $secureRandom;
100
-		$this->config = $config;
101
-		$this->dispatcher = $dispatcher;
102
-		$this->timeFactory = $timeFactory;
103
-	}
104
-
105
-	/**
106
-	 * add server to the list of trusted servers
107
-	 *
108
-	 * @param $url
109
-	 * @return int server id
110
-	 */
111
-	public function addServer($url) {
112
-		$url = $this->updateProtocol($url);
113
-		$result = $this->dbHandler->addServer($url);
114
-		if ($result) {
115
-			$token = $this->secureRandom->generate(16);
116
-			$this->dbHandler->addToken($url, $token);
117
-			$this->jobList->add(
118
-				'OCA\Federation\BackgroundJob\RequestSharedSecret',
119
-				[
120
-					'url' => $url,
121
-					'token' => $token,
122
-					'created' => $this->timeFactory->getTime()
123
-				]
124
-			);
125
-		}
126
-
127
-		return $result;
128
-	}
129
-
130
-	/**
131
-	 * enable/disable to automatically add servers to the list of trusted servers
132
-	 * once a federated share was created and accepted successfully
133
-	 *
134
-	 * @param bool $status
135
-	 */
136
-	public function setAutoAddServers($status) {
137
-		$value = $status ? '1' : '0';
138
-		$this->config->setAppValue('federation', 'autoAddServers', $value);
139
-	}
140
-
141
-	/**
142
-	 * return if we automatically add servers to the list of trusted servers
143
-	 * once a federated share was created and accepted successfully
144
-	 *
145
-	 * @return bool
146
-	 */
147
-	public function getAutoAddServers() {
148
-		$value = $this->config->getAppValue('federation', 'autoAddServers', '0');
149
-		return $value === '1';
150
-	}
151
-
152
-	/**
153
-	 * get shared secret for the given server
154
-	 *
155
-	 * @param string $url
156
-	 * @return string
157
-	 */
158
-	public function getSharedSecret($url) {
159
-		return $this->dbHandler->getSharedSecret($url);
160
-	}
161
-
162
-	/**
163
-	 * add shared secret for the given server
164
-	 *
165
-	 * @param string $url
166
-	 * @param $sharedSecret
167
-	 */
168
-	public function addSharedSecret($url, $sharedSecret) {
169
-		$this->dbHandler->addSharedSecret($url, $sharedSecret);
170
-	}
171
-
172
-	/**
173
-	 * remove server from the list of trusted servers
174
-	 *
175
-	 * @param int $id
176
-	 */
177
-	public function removeServer($id) {
178
-		$server = $this->dbHandler->getServerById($id);
179
-		$this->dbHandler->removeServer($id);
180
-		$event = new GenericEvent($server['url_hash']);
181
-		$this->dispatcher->dispatch('OCP\Federation\TrustedServerEvent::remove', $event);
182
-	}
183
-
184
-	/**
185
-	 * get all trusted servers
186
-	 *
187
-	 * @return array
188
-	 */
189
-	public function getServers() {
190
-		return $this->dbHandler->getAllServer();
191
-	}
192
-
193
-	/**
194
-	 * check if given server is a trusted Nextcloud server
195
-	 *
196
-	 * @param string $url
197
-	 * @return bool
198
-	 */
199
-	public function isTrustedServer($url) {
200
-		return $this->dbHandler->serverExists($url);
201
-	}
202
-
203
-	/**
204
-	 * set server status
205
-	 *
206
-	 * @param string $url
207
-	 * @param int $status
208
-	 */
209
-	public function setServerStatus($url, $status) {
210
-		$this->dbHandler->setServerStatus($url, $status);
211
-	}
212
-
213
-	/**
214
-	 * @param string $url
215
-	 * @return int
216
-	 */
217
-	public function getServerStatus($url) {
218
-		return $this->dbHandler->getServerStatus($url);
219
-	}
220
-
221
-	/**
222
-	 * check if URL point to a ownCloud/Nextcloud server
223
-	 *
224
-	 * @param string $url
225
-	 * @return bool
226
-	 */
227
-	public function isOwnCloudServer($url) {
228
-		$isValidOwnCloud = false;
229
-		$client = $this->httpClientService->newClient();
230
-		try {
231
-			$result = $client->get(
232
-				$url . '/status.php',
233
-				[
234
-					'timeout' => 3,
235
-					'connect_timeout' => 3,
236
-				]
237
-			);
238
-			if ($result->getStatusCode() === Http::STATUS_OK) {
239
-				$isValidOwnCloud = $this->checkOwnCloudVersion($result->getBody());
240
-
241
-			}
242
-		} catch (\Exception $e) {
243
-			$this->logger->debug('No Nextcloud server: ' . $e->getMessage());
244
-			return false;
245
-		}
246
-
247
-		return $isValidOwnCloud;
248
-	}
249
-
250
-	/**
251
-	 * check if ownCloud version is >= 9.0
252
-	 *
253
-	 * @param $status
254
-	 * @return bool
255
-	 * @throws HintException
256
-	 */
257
-	protected function checkOwnCloudVersion($status) {
258
-		$decoded = json_decode($status, true);
259
-		if (!empty($decoded) && isset($decoded['version'])) {
260
-			if (!version_compare($decoded['version'], '9.0.0', '>=')) {
261
-				throw new HintException('Remote server version is too low. 9.0 is required.');
262
-			}
263
-			return true;
264
-		}
265
-		return false;
266
-	}
267
-
268
-	/**
269
-	 * check if the URL contain a protocol, if not add https
270
-	 *
271
-	 * @param string $url
272
-	 * @return string
273
-	 */
274
-	protected function updateProtocol($url) {
275
-		if (
276
-			strpos($url, 'https://') === 0
277
-			|| strpos($url, 'http://') === 0
278
-		) {
279
-
280
-			return $url;
281
-
282
-		}
283
-
284
-		return 'https://' . $url;
285
-	}
42
+    /** after a user list was exchanged at least once successfully */
43
+    const STATUS_OK = 1;
44
+    /** waiting for shared secret or initial user list exchange */
45
+    const STATUS_PENDING = 2;
46
+    /** something went wrong, misconfigured server, software bug,... user interaction needed */
47
+    const STATUS_FAILURE = 3;
48
+    /** remote server revoked access */
49
+    const STATUS_ACCESS_REVOKED = 4;
50
+
51
+    /** @var  dbHandler */
52
+    private $dbHandler;
53
+
54
+    /** @var  IClientService */
55
+    private $httpClientService;
56
+
57
+    /** @var ILogger */
58
+    private $logger;
59
+
60
+    /** @var IJobList */
61
+    private $jobList;
62
+
63
+    /** @var ISecureRandom */
64
+    private $secureRandom;
65
+
66
+    /** @var IConfig */
67
+    private $config;
68
+
69
+    /** @var EventDispatcherInterface */
70
+    private $dispatcher;
71
+
72
+    /** @var ITimeFactory */
73
+    private $timeFactory;
74
+
75
+    /**
76
+     * @param DbHandler $dbHandler
77
+     * @param IClientService $httpClientService
78
+     * @param ILogger $logger
79
+     * @param IJobList $jobList
80
+     * @param ISecureRandom $secureRandom
81
+     * @param IConfig $config
82
+     * @param EventDispatcherInterface $dispatcher
83
+     * @param ITimeFactory $timeFactory
84
+     */
85
+    public function __construct(
86
+        DbHandler $dbHandler,
87
+        IClientService $httpClientService,
88
+        ILogger $logger,
89
+        IJobList $jobList,
90
+        ISecureRandom $secureRandom,
91
+        IConfig $config,
92
+        EventDispatcherInterface $dispatcher,
93
+        ITimeFactory $timeFactory
94
+    ) {
95
+        $this->dbHandler = $dbHandler;
96
+        $this->httpClientService = $httpClientService;
97
+        $this->logger = $logger;
98
+        $this->jobList = $jobList;
99
+        $this->secureRandom = $secureRandom;
100
+        $this->config = $config;
101
+        $this->dispatcher = $dispatcher;
102
+        $this->timeFactory = $timeFactory;
103
+    }
104
+
105
+    /**
106
+     * add server to the list of trusted servers
107
+     *
108
+     * @param $url
109
+     * @return int server id
110
+     */
111
+    public function addServer($url) {
112
+        $url = $this->updateProtocol($url);
113
+        $result = $this->dbHandler->addServer($url);
114
+        if ($result) {
115
+            $token = $this->secureRandom->generate(16);
116
+            $this->dbHandler->addToken($url, $token);
117
+            $this->jobList->add(
118
+                'OCA\Federation\BackgroundJob\RequestSharedSecret',
119
+                [
120
+                    'url' => $url,
121
+                    'token' => $token,
122
+                    'created' => $this->timeFactory->getTime()
123
+                ]
124
+            );
125
+        }
126
+
127
+        return $result;
128
+    }
129
+
130
+    /**
131
+     * enable/disable to automatically add servers to the list of trusted servers
132
+     * once a federated share was created and accepted successfully
133
+     *
134
+     * @param bool $status
135
+     */
136
+    public function setAutoAddServers($status) {
137
+        $value = $status ? '1' : '0';
138
+        $this->config->setAppValue('federation', 'autoAddServers', $value);
139
+    }
140
+
141
+    /**
142
+     * return if we automatically add servers to the list of trusted servers
143
+     * once a federated share was created and accepted successfully
144
+     *
145
+     * @return bool
146
+     */
147
+    public function getAutoAddServers() {
148
+        $value = $this->config->getAppValue('federation', 'autoAddServers', '0');
149
+        return $value === '1';
150
+    }
151
+
152
+    /**
153
+     * get shared secret for the given server
154
+     *
155
+     * @param string $url
156
+     * @return string
157
+     */
158
+    public function getSharedSecret($url) {
159
+        return $this->dbHandler->getSharedSecret($url);
160
+    }
161
+
162
+    /**
163
+     * add shared secret for the given server
164
+     *
165
+     * @param string $url
166
+     * @param $sharedSecret
167
+     */
168
+    public function addSharedSecret($url, $sharedSecret) {
169
+        $this->dbHandler->addSharedSecret($url, $sharedSecret);
170
+    }
171
+
172
+    /**
173
+     * remove server from the list of trusted servers
174
+     *
175
+     * @param int $id
176
+     */
177
+    public function removeServer($id) {
178
+        $server = $this->dbHandler->getServerById($id);
179
+        $this->dbHandler->removeServer($id);
180
+        $event = new GenericEvent($server['url_hash']);
181
+        $this->dispatcher->dispatch('OCP\Federation\TrustedServerEvent::remove', $event);
182
+    }
183
+
184
+    /**
185
+     * get all trusted servers
186
+     *
187
+     * @return array
188
+     */
189
+    public function getServers() {
190
+        return $this->dbHandler->getAllServer();
191
+    }
192
+
193
+    /**
194
+     * check if given server is a trusted Nextcloud server
195
+     *
196
+     * @param string $url
197
+     * @return bool
198
+     */
199
+    public function isTrustedServer($url) {
200
+        return $this->dbHandler->serverExists($url);
201
+    }
202
+
203
+    /**
204
+     * set server status
205
+     *
206
+     * @param string $url
207
+     * @param int $status
208
+     */
209
+    public function setServerStatus($url, $status) {
210
+        $this->dbHandler->setServerStatus($url, $status);
211
+    }
212
+
213
+    /**
214
+     * @param string $url
215
+     * @return int
216
+     */
217
+    public function getServerStatus($url) {
218
+        return $this->dbHandler->getServerStatus($url);
219
+    }
220
+
221
+    /**
222
+     * check if URL point to a ownCloud/Nextcloud server
223
+     *
224
+     * @param string $url
225
+     * @return bool
226
+     */
227
+    public function isOwnCloudServer($url) {
228
+        $isValidOwnCloud = false;
229
+        $client = $this->httpClientService->newClient();
230
+        try {
231
+            $result = $client->get(
232
+                $url . '/status.php',
233
+                [
234
+                    'timeout' => 3,
235
+                    'connect_timeout' => 3,
236
+                ]
237
+            );
238
+            if ($result->getStatusCode() === Http::STATUS_OK) {
239
+                $isValidOwnCloud = $this->checkOwnCloudVersion($result->getBody());
240
+
241
+            }
242
+        } catch (\Exception $e) {
243
+            $this->logger->debug('No Nextcloud server: ' . $e->getMessage());
244
+            return false;
245
+        }
246
+
247
+        return $isValidOwnCloud;
248
+    }
249
+
250
+    /**
251
+     * check if ownCloud version is >= 9.0
252
+     *
253
+     * @param $status
254
+     * @return bool
255
+     * @throws HintException
256
+     */
257
+    protected function checkOwnCloudVersion($status) {
258
+        $decoded = json_decode($status, true);
259
+        if (!empty($decoded) && isset($decoded['version'])) {
260
+            if (!version_compare($decoded['version'], '9.0.0', '>=')) {
261
+                throw new HintException('Remote server version is too low. 9.0 is required.');
262
+            }
263
+            return true;
264
+        }
265
+        return false;
266
+    }
267
+
268
+    /**
269
+     * check if the URL contain a protocol, if not add https
270
+     *
271
+     * @param string $url
272
+     * @return string
273
+     */
274
+    protected function updateProtocol($url) {
275
+        if (
276
+            strpos($url, 'https://') === 0
277
+            || strpos($url, 'http://') === 0
278
+        ) {
279
+
280
+            return $url;
281
+
282
+        }
283
+
284
+        return 'https://' . $url;
285
+    }
286 286
 }
Please login to merge, or discard this patch.
apps/federation/lib/BackgroundJob/GetSharedSecret.php 3 patches
Braces   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -177,7 +177,7 @@
 block discarded – undo
177 177
 			&& $status !== Http::STATUS_FORBIDDEN
178 178
 		) {
179 179
 			$this->retainJob = true;
180
-		}  else {
180
+		} else {
181 181
 			// reset token if we received a valid response
182 182
 			$this->dbHandler->addToken($target, '');
183 183
 		}
Please login to merge, or discard this patch.
Indentation   +198 added lines, -198 removed lines patch added patch discarded remove patch
@@ -55,202 +55,202 @@
 block discarded – undo
55 55
  */
56 56
 class GetSharedSecret extends Job {
57 57
 
58
-	/** @var IClient */
59
-	private $httpClient;
60
-
61
-	/** @var IJobList */
62
-	private $jobList;
63
-
64
-	/** @var IURLGenerator */
65
-	private $urlGenerator;
66
-
67
-	/** @var TrustedServers  */
68
-	private $trustedServers;
69
-
70
-	/** @var DbHandler */
71
-	private $dbHandler;
72
-
73
-	/** @var IDiscoveryService  */
74
-	private $ocsDiscoveryService;
75
-
76
-	/** @var ILogger */
77
-	private $logger;
78
-
79
-	/** @var ITimeFactory */
80
-	private $timeFactory;
81
-
82
-	/** @var bool */
83
-	protected $retainJob = false;
84
-
85
-	private $format = '?format=json';
86
-
87
-	private $defaultEndPoint = '/ocs/v2.php/apps/federation/api/v1/shared-secret';
88
-
89
-	/** @var  int  30 day = 2592000sec */
90
-	private $maxLifespan = 2592000;
91
-
92
-	/**
93
-	 * RequestSharedSecret constructor.
94
-	 *
95
-	 * @param IClientService $httpClientService
96
-	 * @param IURLGenerator $urlGenerator
97
-	 * @param IJobList $jobList
98
-	 * @param TrustedServers $trustedServers
99
-	 * @param ILogger $logger
100
-	 * @param DbHandler $dbHandler
101
-	 * @param IDiscoveryService $ocsDiscoveryService
102
-	 * @param ITimeFactory $timeFactory
103
-	 */
104
-	public function __construct(
105
-		IClientService $httpClientService,
106
-		IURLGenerator $urlGenerator,
107
-		IJobList $jobList,
108
-		TrustedServers $trustedServers,
109
-		ILogger $logger,
110
-		DbHandler $dbHandler,
111
-		IDiscoveryService $ocsDiscoveryService,
112
-		ITimeFactory $timeFactory
113
-	) {
114
-		$this->logger = $logger;
115
-		$this->httpClient = $httpClientService->newClient();
116
-		$this->jobList = $jobList;
117
-		$this->urlGenerator = $urlGenerator;
118
-		$this->dbHandler = $dbHandler;
119
-		$this->ocsDiscoveryService = $ocsDiscoveryService;
120
-		$this->trustedServers = $trustedServers;
121
-		$this->timeFactory = $timeFactory;
122
-	}
123
-
124
-	/**
125
-	 * run the job, then remove it from the joblist
126
-	 *
127
-	 * @param JobList $jobList
128
-	 * @param ILogger|null $logger
129
-	 */
130
-	public function execute($jobList, ILogger $logger = null) {
131
-		$target = $this->argument['url'];
132
-		// only execute if target is still in the list of trusted domains
133
-		if ($this->trustedServers->isTrustedServer($target)) {
134
-			$this->parentExecute($jobList, $logger);
135
-		}
136
-
137
-		$jobList->remove($this, $this->argument);
138
-
139
-		if ($this->retainJob) {
140
-			$this->reAddJob($this->argument);
141
-		}
142
-	}
143
-
144
-	/**
145
-	 * call execute() method of parent
146
-	 *
147
-	 * @param JobList $jobList
148
-	 * @param ILogger $logger
149
-	 */
150
-	protected function parentExecute($jobList, $logger = null) {
151
-		parent::execute($jobList, $logger);
152
-	}
153
-
154
-	protected function run($argument) {
155
-		$target = $argument['url'];
156
-		$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
157
-		$currentTime = $this->timeFactory->getTime();
158
-		$source = $this->urlGenerator->getAbsoluteURL('/');
159
-		$source = rtrim($source, '/');
160
-		$token = $argument['token'];
161
-
162
-		// kill job after 30 days of trying
163
-		$deadline = $currentTime - $this->maxLifespan;
164
-		if ($created < $deadline) {
165
-			$this->retainJob = false;
166
-			$this->trustedServers->setServerStatus($target,TrustedServers::STATUS_FAILURE);
167
-			return;
168
-		}
169
-
170
-		$endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
171
-		$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
172
-
173
-		// make sure that we have a well formatted url
174
-		$url = rtrim($target, '/') . '/' . trim($endPoint, '/') . $this->format;
175
-
176
-		$result = null;
177
-		try {
178
-			$result = $this->httpClient->get(
179
-				$url,
180
-				[
181
-					'query' =>
182
-						[
183
-							'url' => $source,
184
-							'token' => $token
185
-						],
186
-					'timeout' => 3,
187
-					'connect_timeout' => 3,
188
-				]
189
-			);
190
-
191
-			$status = $result->getStatusCode();
192
-
193
-		} catch (ClientException $e) {
194
-			$status = $e->getCode();
195
-			if ($status === Http::STATUS_FORBIDDEN) {
196
-				$this->logger->info($target . ' refused to exchange a shared secret with you.', ['app' => 'federation']);
197
-			} else {
198
-				$this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage(), ['app' => 'federation']);
199
-			}
200
-		} catch (ConnectException $e) {
201
-			$status = -1; // There is no status code if we could not connect
202
-			$this->logger->info('Could not connect to ' . $target, ['app' => 'federation']);
203
-		} catch (\Exception $e) {
204
-			$status = Http::STATUS_INTERNAL_SERVER_ERROR;
205
-			$this->logger->logException($e, ['app' => 'federation']);
206
-		}
207
-
208
-		// if we received a unexpected response we try again later
209
-		if (
210
-			$status !== Http::STATUS_OK
211
-			&& $status !== Http::STATUS_FORBIDDEN
212
-		) {
213
-			$this->retainJob = true;
214
-		}  else {
215
-			// reset token if we received a valid response
216
-			$this->dbHandler->addToken($target, '');
217
-		}
218
-
219
-		if ($status === Http::STATUS_OK && $result instanceof IResponse) {
220
-			$body = $result->getBody();
221
-			$result = json_decode($body, true);
222
-			if (isset($result['ocs']['data']['sharedSecret'])) {
223
-				$this->trustedServers->addSharedSecret(
224
-						$target,
225
-						$result['ocs']['data']['sharedSecret']
226
-				);
227
-			} else {
228
-				$this->logger->error(
229
-						'remote server "' . $target . '"" does not return a valid shared secret',
230
-						['app' => 'federation']
231
-				);
232
-				$this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
233
-			}
234
-		}
235
-
236
-	}
237
-
238
-	/**
239
-	 * re-add background job
240
-	 *
241
-	 * @param array $argument
242
-	 */
243
-	protected function reAddJob(array $argument) {
244
-		$url = $argument['url'];
245
-		$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
246
-		$token = $argument['token'];
247
-		$this->jobList->add(
248
-			GetSharedSecret::class,
249
-			[
250
-				'url' => $url,
251
-				'token' => $token,
252
-				'created' => $created
253
-			]
254
-		);
255
-	}
58
+    /** @var IClient */
59
+    private $httpClient;
60
+
61
+    /** @var IJobList */
62
+    private $jobList;
63
+
64
+    /** @var IURLGenerator */
65
+    private $urlGenerator;
66
+
67
+    /** @var TrustedServers  */
68
+    private $trustedServers;
69
+
70
+    /** @var DbHandler */
71
+    private $dbHandler;
72
+
73
+    /** @var IDiscoveryService  */
74
+    private $ocsDiscoveryService;
75
+
76
+    /** @var ILogger */
77
+    private $logger;
78
+
79
+    /** @var ITimeFactory */
80
+    private $timeFactory;
81
+
82
+    /** @var bool */
83
+    protected $retainJob = false;
84
+
85
+    private $format = '?format=json';
86
+
87
+    private $defaultEndPoint = '/ocs/v2.php/apps/federation/api/v1/shared-secret';
88
+
89
+    /** @var  int  30 day = 2592000sec */
90
+    private $maxLifespan = 2592000;
91
+
92
+    /**
93
+     * RequestSharedSecret constructor.
94
+     *
95
+     * @param IClientService $httpClientService
96
+     * @param IURLGenerator $urlGenerator
97
+     * @param IJobList $jobList
98
+     * @param TrustedServers $trustedServers
99
+     * @param ILogger $logger
100
+     * @param DbHandler $dbHandler
101
+     * @param IDiscoveryService $ocsDiscoveryService
102
+     * @param ITimeFactory $timeFactory
103
+     */
104
+    public function __construct(
105
+        IClientService $httpClientService,
106
+        IURLGenerator $urlGenerator,
107
+        IJobList $jobList,
108
+        TrustedServers $trustedServers,
109
+        ILogger $logger,
110
+        DbHandler $dbHandler,
111
+        IDiscoveryService $ocsDiscoveryService,
112
+        ITimeFactory $timeFactory
113
+    ) {
114
+        $this->logger = $logger;
115
+        $this->httpClient = $httpClientService->newClient();
116
+        $this->jobList = $jobList;
117
+        $this->urlGenerator = $urlGenerator;
118
+        $this->dbHandler = $dbHandler;
119
+        $this->ocsDiscoveryService = $ocsDiscoveryService;
120
+        $this->trustedServers = $trustedServers;
121
+        $this->timeFactory = $timeFactory;
122
+    }
123
+
124
+    /**
125
+     * run the job, then remove it from the joblist
126
+     *
127
+     * @param JobList $jobList
128
+     * @param ILogger|null $logger
129
+     */
130
+    public function execute($jobList, ILogger $logger = null) {
131
+        $target = $this->argument['url'];
132
+        // only execute if target is still in the list of trusted domains
133
+        if ($this->trustedServers->isTrustedServer($target)) {
134
+            $this->parentExecute($jobList, $logger);
135
+        }
136
+
137
+        $jobList->remove($this, $this->argument);
138
+
139
+        if ($this->retainJob) {
140
+            $this->reAddJob($this->argument);
141
+        }
142
+    }
143
+
144
+    /**
145
+     * call execute() method of parent
146
+     *
147
+     * @param JobList $jobList
148
+     * @param ILogger $logger
149
+     */
150
+    protected function parentExecute($jobList, $logger = null) {
151
+        parent::execute($jobList, $logger);
152
+    }
153
+
154
+    protected function run($argument) {
155
+        $target = $argument['url'];
156
+        $created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
157
+        $currentTime = $this->timeFactory->getTime();
158
+        $source = $this->urlGenerator->getAbsoluteURL('/');
159
+        $source = rtrim($source, '/');
160
+        $token = $argument['token'];
161
+
162
+        // kill job after 30 days of trying
163
+        $deadline = $currentTime - $this->maxLifespan;
164
+        if ($created < $deadline) {
165
+            $this->retainJob = false;
166
+            $this->trustedServers->setServerStatus($target,TrustedServers::STATUS_FAILURE);
167
+            return;
168
+        }
169
+
170
+        $endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
171
+        $endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
172
+
173
+        // make sure that we have a well formatted url
174
+        $url = rtrim($target, '/') . '/' . trim($endPoint, '/') . $this->format;
175
+
176
+        $result = null;
177
+        try {
178
+            $result = $this->httpClient->get(
179
+                $url,
180
+                [
181
+                    'query' =>
182
+                        [
183
+                            'url' => $source,
184
+                            'token' => $token
185
+                        ],
186
+                    'timeout' => 3,
187
+                    'connect_timeout' => 3,
188
+                ]
189
+            );
190
+
191
+            $status = $result->getStatusCode();
192
+
193
+        } catch (ClientException $e) {
194
+            $status = $e->getCode();
195
+            if ($status === Http::STATUS_FORBIDDEN) {
196
+                $this->logger->info($target . ' refused to exchange a shared secret with you.', ['app' => 'federation']);
197
+            } else {
198
+                $this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage(), ['app' => 'federation']);
199
+            }
200
+        } catch (ConnectException $e) {
201
+            $status = -1; // There is no status code if we could not connect
202
+            $this->logger->info('Could not connect to ' . $target, ['app' => 'federation']);
203
+        } catch (\Exception $e) {
204
+            $status = Http::STATUS_INTERNAL_SERVER_ERROR;
205
+            $this->logger->logException($e, ['app' => 'federation']);
206
+        }
207
+
208
+        // if we received a unexpected response we try again later
209
+        if (
210
+            $status !== Http::STATUS_OK
211
+            && $status !== Http::STATUS_FORBIDDEN
212
+        ) {
213
+            $this->retainJob = true;
214
+        }  else {
215
+            // reset token if we received a valid response
216
+            $this->dbHandler->addToken($target, '');
217
+        }
218
+
219
+        if ($status === Http::STATUS_OK && $result instanceof IResponse) {
220
+            $body = $result->getBody();
221
+            $result = json_decode($body, true);
222
+            if (isset($result['ocs']['data']['sharedSecret'])) {
223
+                $this->trustedServers->addSharedSecret(
224
+                        $target,
225
+                        $result['ocs']['data']['sharedSecret']
226
+                );
227
+            } else {
228
+                $this->logger->error(
229
+                        'remote server "' . $target . '"" does not return a valid shared secret',
230
+                        ['app' => 'federation']
231
+                );
232
+                $this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
233
+            }
234
+        }
235
+
236
+    }
237
+
238
+    /**
239
+     * re-add background job
240
+     *
241
+     * @param array $argument
242
+     */
243
+    protected function reAddJob(array $argument) {
244
+        $url = $argument['url'];
245
+        $created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
246
+        $token = $argument['token'];
247
+        $this->jobList->add(
248
+            GetSharedSecret::class,
249
+            [
250
+                'url' => $url,
251
+                'token' => $token,
252
+                'created' => $created
253
+            ]
254
+        );
255
+    }
256 256
 }
Please login to merge, or discard this patch.
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -153,7 +153,7 @@  discard block
 block discarded – undo
153 153
 
154 154
 	protected function run($argument) {
155 155
 		$target = $argument['url'];
156
-		$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
156
+		$created = isset($argument['created']) ? (int) $argument['created'] : $this->timeFactory->getTime();
157 157
 		$currentTime = $this->timeFactory->getTime();
158 158
 		$source = $this->urlGenerator->getAbsoluteURL('/');
159 159
 		$source = rtrim($source, '/');
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
 		$deadline = $currentTime - $this->maxLifespan;
164 164
 		if ($created < $deadline) {
165 165
 			$this->retainJob = false;
166
-			$this->trustedServers->setServerStatus($target,TrustedServers::STATUS_FAILURE);
166
+			$this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
167 167
 			return;
168 168
 		}
169 169
 
@@ -171,7 +171,7 @@  discard block
 block discarded – undo
171 171
 		$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
172 172
 
173 173
 		// make sure that we have a well formatted url
174
-		$url = rtrim($target, '/') . '/' . trim($endPoint, '/') . $this->format;
174
+		$url = rtrim($target, '/').'/'.trim($endPoint, '/').$this->format;
175 175
 
176 176
 		$result = null;
177 177
 		try {
@@ -193,13 +193,13 @@  discard block
 block discarded – undo
193 193
 		} catch (ClientException $e) {
194 194
 			$status = $e->getCode();
195 195
 			if ($status === Http::STATUS_FORBIDDEN) {
196
-				$this->logger->info($target . ' refused to exchange a shared secret with you.', ['app' => 'federation']);
196
+				$this->logger->info($target.' refused to exchange a shared secret with you.', ['app' => 'federation']);
197 197
 			} else {
198
-				$this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage(), ['app' => 'federation']);
198
+				$this->logger->info($target.' responded with a '.$status.' containing: '.$e->getMessage(), ['app' => 'federation']);
199 199
 			}
200 200
 		} catch (ConnectException $e) {
201 201
 			$status = -1; // There is no status code if we could not connect
202
-			$this->logger->info('Could not connect to ' . $target, ['app' => 'federation']);
202
+			$this->logger->info('Could not connect to '.$target, ['app' => 'federation']);
203 203
 		} catch (\Exception $e) {
204 204
 			$status = Http::STATUS_INTERNAL_SERVER_ERROR;
205 205
 			$this->logger->logException($e, ['app' => 'federation']);
@@ -211,7 +211,7 @@  discard block
 block discarded – undo
211 211
 			&& $status !== Http::STATUS_FORBIDDEN
212 212
 		) {
213 213
 			$this->retainJob = true;
214
-		}  else {
214
+		} else {
215 215
 			// reset token if we received a valid response
216 216
 			$this->dbHandler->addToken($target, '');
217 217
 		}
@@ -226,7 +226,7 @@  discard block
 block discarded – undo
226 226
 				);
227 227
 			} else {
228 228
 				$this->logger->error(
229
-						'remote server "' . $target . '"" does not return a valid shared secret',
229
+						'remote server "'.$target.'"" does not return a valid shared secret',
230 230
 						['app' => 'federation']
231 231
 				);
232 232
 				$this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
@@ -242,7 +242,7 @@  discard block
 block discarded – undo
242 242
 	 */
243 243
 	protected function reAddJob(array $argument) {
244 244
 		$url = $argument['url'];
245
-		$created = isset($argument['created']) ? (int)$argument['created'] : $this->timeFactory->getTime();
245
+		$created = isset($argument['created']) ? (int) $argument['created'] : $this->timeFactory->getTime();
246 246
 		$token = $argument['token'];
247 247
 		$this->jobList->add(
248 248
 			GetSharedSecret::class,
Please login to merge, or discard this patch.