1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
/** |
4
|
|
|
* Class for utility functions |
5
|
|
|
* |
6
|
|
|
*/ |
7
|
|
|
class OC_Util { |
8
|
|
|
public static $scripts = array(); |
9
|
|
|
public static $styles = array(); |
10
|
|
|
public static $headers = array(); |
11
|
|
|
private static $rootMounted = false; |
12
|
|
|
private static $fsSetup = false; |
13
|
|
|
|
14
|
|
|
private static function initLocalStorageRootFS() { |
15
|
|
|
// mount local file backend as root |
16
|
|
|
$configDataDirectory = OC_Config::getValue("datadirectory", OC::$SERVERROOT . "/data"); |
17
|
|
|
//first set up the local "root" storage |
18
|
|
|
\OC\Files\Filesystem::initMounts(); |
19
|
|
|
if (!self::$rootMounted) { |
20
|
|
|
\OC\Files\Filesystem::mount('\OC\Files\Storage\Local', array('datadir' => $configDataDirectory), '/'); |
21
|
|
|
self::$rootMounted = true; |
22
|
|
|
} |
23
|
|
|
} |
24
|
|
|
|
25
|
|
|
/** |
26
|
|
|
* mounting an object storage as the root fs will in essence remove the |
27
|
|
|
* necessity of a data folder being present. |
28
|
|
|
* TODO make home storage aware of this and use the object storage instead of local disk access |
29
|
|
|
* |
30
|
|
|
* @param array $config containing 'class' and optional 'arguments' |
31
|
|
|
*/ |
32
|
|
|
private static function initObjectStoreRootFS($config) { |
33
|
|
|
// check misconfiguration |
34
|
|
|
if (empty($config['class'])) { |
35
|
|
|
\OCP\Util::writeLog('files', 'No class given for objectstore', \OCP\Util::ERROR); |
36
|
|
|
} |
37
|
|
|
if (!isset($config['arguments'])) { |
38
|
|
|
$config['arguments'] = array(); |
39
|
|
|
} |
40
|
|
|
|
41
|
|
|
// instantiate object store implementation |
42
|
|
|
$config['arguments']['objectstore'] = new $config['class']($config['arguments']); |
43
|
|
|
// mount with plain / root object store implementation |
44
|
|
|
$config['class'] = '\OC\Files\ObjectStore\ObjectStoreStorage'; |
45
|
|
|
|
46
|
|
|
// mount object storage as root |
47
|
|
|
\OC\Files\Filesystem::initMounts(); |
48
|
|
|
if (!self::$rootMounted) { |
49
|
|
|
\OC\Files\Filesystem::mount($config['class'], $config['arguments'], '/'); |
50
|
|
|
self::$rootMounted = true; |
51
|
|
|
} |
52
|
|
|
} |
53
|
|
|
|
54
|
|
|
/** |
55
|
|
|
* Can be set up |
56
|
|
|
* |
57
|
|
|
* @param string $user |
58
|
|
|
* @return boolean |
59
|
|
|
* @description configure the initial filesystem based on the configuration |
60
|
|
|
*/ |
61
|
|
|
public static function setupFS($user = '') { |
62
|
|
|
//setting up the filesystem twice can only lead to trouble |
63
|
|
|
if (self::$fsSetup) { |
64
|
|
|
return false; |
65
|
|
|
} |
66
|
|
|
|
67
|
|
|
\OC::$server->getEventLogger()->start('setup_fs', 'Setup filesystem'); |
68
|
|
|
|
69
|
|
|
// If we are not forced to load a specific user we load the one that is logged in |
70
|
|
|
if ($user == "" && OC_User::isLoggedIn()) { |
71
|
|
|
$user = OC_User::getUser(); |
72
|
|
|
} |
73
|
|
|
|
74
|
|
|
// load all filesystem apps before, so no setup-hook gets lost |
75
|
|
|
OC_App::loadApps(array('filesystem')); |
76
|
|
|
|
77
|
|
|
// the filesystem will finish when $user is not empty, |
78
|
|
|
// mark fs setup here to avoid doing the setup from loading |
79
|
|
|
// OC_Filesystem |
80
|
|
|
if ($user != '') { |
81
|
|
|
self::$fsSetup = true; |
82
|
|
|
} |
83
|
|
|
|
84
|
|
|
//check if we are using an object storage |
85
|
|
|
$objectStore = OC_Config::getValue('objectstore'); |
86
|
|
|
if (isset($objectStore)) { |
87
|
|
|
self::initObjectStoreRootFS($objectStore); |
88
|
|
|
} else { |
89
|
|
|
self::initLocalStorageRootFS(); |
90
|
|
|
} |
91
|
|
|
|
92
|
|
|
if ($user != '' && !OCP\User::userExists($user)) { |
93
|
|
|
\OC::$server->getEventLogger()->end('setup_fs'); |
94
|
|
|
return false; |
95
|
|
|
} |
96
|
|
|
|
97
|
|
|
//if we aren't logged in, there is no use to set up the filesystem |
98
|
|
|
if ($user != "") { |
99
|
|
|
\OC\Files\Filesystem::addStorageWrapper('oc_quota', function ($mountPoint, $storage) { |
100
|
|
|
// set up quota for home storages, even for other users |
101
|
|
|
// which can happen when using sharing |
102
|
|
|
|
103
|
|
|
/** |
104
|
|
|
* @var \OC\Files\Storage\Storage $storage |
105
|
|
|
*/ |
106
|
|
|
if ($storage->instanceOfStorage('\OC\Files\Storage\Home') |
107
|
|
|
|| $storage->instanceOfStorage('\OC\Files\ObjectStore\HomeObjectStoreStorage') |
108
|
|
|
) { |
109
|
|
|
if (is_object($storage->getUser())) { |
|
|
|
|
110
|
|
|
$user = $storage->getUser()->getUID(); |
|
|
|
|
111
|
|
|
$quota = OC_Util::getUserQuota($user); |
112
|
|
|
if ($quota !== \OCP\Files\FileInfo::SPACE_UNLIMITED) { |
113
|
|
|
return new \OC\Files\Storage\Wrapper\Quota(array('storage' => $storage, 'quota' => $quota, 'root' => 'files')); |
114
|
|
|
} |
115
|
|
|
} |
116
|
|
|
} |
117
|
|
|
|
118
|
|
|
return $storage; |
119
|
|
|
}); |
120
|
|
|
|
121
|
|
|
$userDir = '/' . $user . '/files'; |
122
|
|
|
|
123
|
|
|
//jail the user into his "home" directory |
124
|
|
|
\OC\Files\Filesystem::init($user, $userDir); |
125
|
|
|
|
126
|
|
|
$fileOperationProxy = new OC_FileProxy_FileOperations(); |
127
|
|
|
OC_FileProxy::register($fileOperationProxy); |
128
|
|
|
|
129
|
|
|
//trigger creation of user home and /files folder |
130
|
|
|
\OC::$server->getUserFolder($user); |
131
|
|
|
|
132
|
|
|
OC_Hook::emit('OC_Filesystem', 'setup', array('user' => $user, 'user_dir' => $userDir)); |
133
|
|
|
} |
134
|
|
|
\OC::$server->getEventLogger()->end('setup_fs'); |
135
|
|
|
return true; |
136
|
|
|
} |
137
|
|
|
|
138
|
|
|
/** |
139
|
|
|
* check if a password is required for each public link |
140
|
|
|
* |
141
|
|
|
* @return boolean |
142
|
|
|
*/ |
143
|
|
|
public static function isPublicLinkPasswordRequired() { |
144
|
|
|
$appConfig = \OC::$server->getAppConfig(); |
145
|
|
|
$enforcePassword = $appConfig->getValue('core', 'shareapi_enforce_links_password', 'no'); |
146
|
|
|
return ($enforcePassword === 'yes') ? true : false; |
147
|
|
|
} |
148
|
|
|
|
149
|
|
|
/** |
150
|
|
|
* check if sharing is disabled for the current user |
151
|
|
|
* |
152
|
|
|
* @return boolean |
153
|
|
|
*/ |
154
|
|
|
public static function isSharingDisabledForUser() { |
155
|
|
|
if (\OC_Appconfig::getValue('core', 'shareapi_exclude_groups', 'no') === 'yes') { |
156
|
|
|
$user = \OCP\User::getUser(); |
157
|
|
|
$groupsList = \OC_Appconfig::getValue('core', 'shareapi_exclude_groups_list', ''); |
158
|
|
|
$excludedGroups = explode(',', $groupsList); |
159
|
|
|
$usersGroups = \OC_Group::getUserGroups($user); |
160
|
|
|
if (!empty($usersGroups)) { |
161
|
|
|
$remainingGroups = array_diff($usersGroups, $excludedGroups); |
162
|
|
|
// if the user is only in groups which are disabled for sharing then |
163
|
|
|
// sharing is also disabled for the user |
164
|
|
|
if (empty($remainingGroups)) { |
165
|
|
|
return true; |
166
|
|
|
} |
167
|
|
|
} |
168
|
|
|
} |
169
|
|
|
return false; |
170
|
|
|
} |
171
|
|
|
|
172
|
|
|
/** |
173
|
|
|
* check if share API enforces a default expire date |
174
|
|
|
* |
175
|
|
|
* @return boolean |
176
|
|
|
*/ |
177
|
|
|
public static function isDefaultExpireDateEnforced() { |
178
|
|
|
$isDefaultExpireDateEnabled = \OCP\Config::getAppValue('core', 'shareapi_default_expire_date', 'no'); |
179
|
|
|
$enforceDefaultExpireDate = false; |
180
|
|
|
if ($isDefaultExpireDateEnabled === 'yes') { |
181
|
|
|
$value = \OCP\Config::getAppValue('core', 'shareapi_enforce_expire_date', 'no'); |
182
|
|
|
$enforceDefaultExpireDate = ($value === 'yes') ? true : false; |
183
|
|
|
} |
184
|
|
|
|
185
|
|
|
return $enforceDefaultExpireDate; |
186
|
|
|
} |
187
|
|
|
|
188
|
|
|
/** |
189
|
|
|
* Get the quota of a user |
190
|
|
|
* |
191
|
|
|
* @param string $user |
192
|
|
|
* @return int Quota bytes |
193
|
|
|
*/ |
194
|
|
|
public static function getUserQuota($user) { |
195
|
|
|
$config = \OC::$server->getConfig(); |
196
|
|
|
$userQuota = $config->getUserValue($user, 'files', 'quota', 'default'); |
197
|
|
|
if ($userQuota === 'default') { |
198
|
|
|
$userQuota = $config->getAppValue('files', 'default_quota', 'none'); |
199
|
|
|
} |
200
|
|
|
if($userQuota === 'none') { |
201
|
|
|
return \OCP\Files\FileInfo::SPACE_UNLIMITED; |
202
|
|
|
}else{ |
203
|
|
|
return OC_Helper::computerFileSize($userQuota); |
204
|
|
|
} |
205
|
|
|
} |
206
|
|
|
|
207
|
|
|
/** |
208
|
|
|
* copies the skeleton to the users /files |
209
|
|
|
* |
210
|
|
|
* @param \OC\User\User $user |
211
|
|
|
* @param \OCP\Files\Folder $userDirectory |
212
|
|
|
*/ |
213
|
|
|
public static function copySkeleton(\OC\User\User $user, \OCP\Files\Folder $userDirectory) { |
214
|
|
|
|
215
|
|
|
$skeletonDirectory = \OCP\Config::getSystemValue('skeletondirectory', \OC::$SERVERROOT . '/core/skeleton'); |
216
|
|
|
|
217
|
|
|
if (!empty($skeletonDirectory)) { |
218
|
|
|
\OCP\Util::writeLog( |
219
|
|
|
'files_skeleton', |
220
|
|
|
'copying skeleton for '.$user->getUID().' from '.$skeletonDirectory.' to '.$userDirectory->getFullPath('/'), |
221
|
|
|
\OCP\Util::DEBUG |
222
|
|
|
); |
223
|
|
|
self::copyr($skeletonDirectory, $userDirectory); |
224
|
|
|
// update the file cache |
225
|
|
|
$userDirectory->getStorage()->getScanner()->scan('', \OC\Files\Cache\Scanner::SCAN_RECURSIVE); |
226
|
|
|
} |
227
|
|
|
} |
228
|
|
|
|
229
|
|
|
/** |
230
|
|
|
* copies a directory recursively by using streams |
231
|
|
|
* |
232
|
|
|
* @param string $source |
233
|
|
|
* @param \OCP\Files\Folder $target |
234
|
|
|
* @return void |
235
|
|
|
*/ |
236
|
|
|
public static function copyr($source, \OCP\Files\Folder $target) { |
237
|
|
|
$dir = opendir($source); |
238
|
|
|
while (false !== ($file = readdir($dir))) { |
239
|
|
|
if (!\OC\Files\Filesystem::isIgnoredDir($file)) { |
240
|
|
|
if (is_dir($source . '/' . $file)) { |
241
|
|
|
$child = $target->newFolder($file); |
242
|
|
|
self::copyr($source . '/' . $file, $child); |
243
|
|
|
} else { |
244
|
|
|
$child = $target->newFile($file); |
245
|
|
|
stream_copy_to_stream(fopen($source . '/' . $file,'r'), $child->fopen('w')); |
246
|
|
|
} |
247
|
|
|
} |
248
|
|
|
} |
249
|
|
|
closedir($dir); |
250
|
|
|
} |
251
|
|
|
|
252
|
|
|
/** |
253
|
|
|
* @return void |
254
|
|
|
*/ |
255
|
|
|
public static function tearDownFS() { |
256
|
|
|
\OC\Files\Filesystem::tearDown(); |
257
|
|
|
self::$fsSetup = false; |
258
|
|
|
self::$rootMounted = false; |
259
|
|
|
} |
260
|
|
|
|
261
|
|
|
/** |
262
|
|
|
* get the current installed version of ownCloud |
263
|
|
|
* |
264
|
|
|
* @return array |
265
|
|
|
*/ |
266
|
|
|
public static function getVersion() { |
267
|
|
|
OC_Util::loadVersion(); |
268
|
|
|
return \OC::$server->getSession()->get('OC_Version'); |
269
|
|
|
} |
270
|
|
|
|
271
|
|
|
/** |
272
|
|
|
* get the current installed version string of ownCloud |
273
|
|
|
* |
274
|
|
|
* @return string |
275
|
|
|
*/ |
276
|
|
|
public static function getVersionString() { |
277
|
|
|
OC_Util::loadVersion(); |
278
|
|
|
return \OC::$server->getSession()->get('OC_VersionString'); |
279
|
|
|
} |
280
|
|
|
|
281
|
|
|
/** |
282
|
|
|
* @description get the current installed edition of ownCloud. There is the community |
283
|
|
|
* edition that just returns an empty string and the enterprise edition |
284
|
|
|
* that returns "Enterprise". |
285
|
|
|
* @return string |
286
|
|
|
*/ |
287
|
|
|
public static function getEditionString() { |
288
|
|
|
if (OC_App::isEnabled('enterprise_key')) { |
289
|
|
|
return "Enterprise"; |
290
|
|
|
} else { |
291
|
|
|
return ""; |
292
|
|
|
} |
293
|
|
|
|
294
|
|
|
} |
295
|
|
|
|
296
|
|
|
/** |
297
|
|
|
* @description get the update channel of the current installed of ownCloud. |
298
|
|
|
* @return string |
299
|
|
|
*/ |
300
|
|
|
public static function getChannel() { |
301
|
|
|
OC_Util::loadVersion(); |
302
|
|
|
return \OC::$server->getSession()->get('OC_Channel'); |
303
|
|
|
} |
304
|
|
|
|
305
|
|
|
/** |
306
|
|
|
* @description get the build number of the current installed of ownCloud. |
307
|
|
|
* @return string |
308
|
|
|
*/ |
309
|
|
|
public static function getBuild() { |
310
|
|
|
OC_Util::loadVersion(); |
311
|
|
|
return \OC::$server->getSession()->get('OC_Build'); |
312
|
|
|
} |
313
|
|
|
|
314
|
|
|
/** |
315
|
|
|
* @description load the version.php into the session as cache |
316
|
|
|
*/ |
317
|
|
|
private static function loadVersion() { |
318
|
|
|
$timestamp = filemtime(OC::$SERVERROOT . '/version.php'); |
319
|
|
|
if (!\OC::$server->getSession()->exists('OC_Version') or OC::$server->getSession()->get('OC_Version_Timestamp') != $timestamp) { |
320
|
|
|
require OC::$SERVERROOT . '/version.php'; |
321
|
|
|
$session = \OC::$server->getSession(); |
322
|
|
|
/** @var $timestamp int */ |
323
|
|
|
$session->set('OC_Version_Timestamp', $timestamp); |
324
|
|
|
/** @var $OC_Version string */ |
325
|
|
|
$session->set('OC_Version', $OC_Version); |
|
|
|
|
326
|
|
|
/** @var $OC_VersionString string */ |
327
|
|
|
$session->set('OC_VersionString', $OC_VersionString); |
|
|
|
|
328
|
|
|
/** @var $OC_Channel string */ |
329
|
|
|
$session->set('OC_Channel', $OC_Channel); |
|
|
|
|
330
|
|
|
/** @var $OC_Build string */ |
331
|
|
|
$session->set('OC_Build', $OC_Build); |
|
|
|
|
332
|
|
|
} |
333
|
|
|
} |
334
|
|
|
|
335
|
|
|
/** |
336
|
|
|
* generates a path for JS/CSS files. If no application is provided it will create the path for core. |
337
|
|
|
* |
338
|
|
|
* @param string $application application to get the files from |
339
|
|
|
* @param string $directory directory withing this application (css, js, vendor, etc) |
340
|
|
|
* @param string $file the file inside of the above folder |
341
|
|
|
* @return string the path |
342
|
|
|
*/ |
343
|
|
|
private static function generatePath($application, $directory, $file) { |
344
|
|
|
if (is_null($file)) { |
345
|
|
|
$file = $application; |
346
|
|
|
$application = ""; |
347
|
|
|
} |
348
|
|
|
if (!empty($application)) { |
349
|
|
|
return "$application/$directory/$file"; |
350
|
|
|
} else { |
351
|
|
|
return "$directory/$file"; |
352
|
|
|
} |
353
|
|
|
} |
354
|
|
|
|
355
|
|
|
/** |
356
|
|
|
* add a javascript file |
357
|
|
|
* |
358
|
|
|
* @param string $application application id |
359
|
|
|
* @param string|null $file filename |
360
|
|
|
* @return void |
361
|
|
|
*/ |
362
|
|
|
public static function addScript($application, $file = null) { |
363
|
|
|
$path = OC_Util::generatePath($application, 'js', $file); |
364
|
|
|
if (!in_array($path, self::$scripts)) { |
365
|
|
|
// core js files need separate handling |
366
|
|
|
if ($application !== 'core' && $file !== null) { |
367
|
|
|
self::addTranslations($application); |
368
|
|
|
} |
369
|
|
|
self::$scripts[] = $path; |
370
|
|
|
} |
371
|
|
|
} |
372
|
|
|
|
373
|
|
|
/** |
374
|
|
|
* add a javascript file from the vendor sub folder |
375
|
|
|
* |
376
|
|
|
* @param string $application application id |
377
|
|
|
* @param string|null $file filename |
378
|
|
|
* @return void |
379
|
|
|
*/ |
380
|
|
|
public static function addVendorScript($application, $file = null) { |
381
|
|
|
$path = OC_Util::generatePath($application, 'vendor', $file); |
382
|
|
|
if (!in_array($path, self::$scripts)) { |
383
|
|
|
self::$scripts[] = $path; |
384
|
|
|
} |
385
|
|
|
} |
386
|
|
|
|
387
|
|
|
/** |
388
|
|
|
* add a translation JS file |
389
|
|
|
* |
390
|
|
|
* @param string $application application id |
391
|
|
|
* @param string $languageCode language code, defaults to the current language |
392
|
|
|
*/ |
393
|
|
|
public static function addTranslations($application, $languageCode = null) { |
394
|
|
|
if (is_null($languageCode)) { |
395
|
|
|
$l = new \OC_L10N($application); |
396
|
|
|
$languageCode = $l->getLanguageCode($application); |
397
|
|
|
} |
398
|
|
|
if (!empty($application)) { |
399
|
|
|
$path = "$application/l10n/$languageCode"; |
400
|
|
|
} else { |
401
|
|
|
$path = "l10n/$languageCode"; |
402
|
|
|
} |
403
|
|
|
if (!in_array($path, self::$scripts)) { |
404
|
|
|
self::$scripts[] = $path; |
405
|
|
|
} |
406
|
|
|
} |
407
|
|
|
|
408
|
|
|
/** |
409
|
|
|
* add a css file |
410
|
|
|
* |
411
|
|
|
* @param string $application application id |
412
|
|
|
* @param string|null $file filename |
413
|
|
|
* @return void |
414
|
|
|
*/ |
415
|
|
|
public static function addStyle($application, $file = null) { |
416
|
|
|
$path = OC_Util::generatePath($application, 'css', $file); |
417
|
|
|
if (!in_array($path, self::$styles)) { |
418
|
|
|
self::$styles[] = $path; |
419
|
|
|
} |
420
|
|
|
} |
421
|
|
|
|
422
|
|
|
/** |
423
|
|
|
* add a css file from the vendor sub folder |
424
|
|
|
* |
425
|
|
|
* @param string $application application id |
426
|
|
|
* @param string|null $file filename |
427
|
|
|
* @return void |
428
|
|
|
*/ |
429
|
|
|
public static function addVendorStyle($application, $file = null) { |
430
|
|
|
$path = OC_Util::generatePath($application, 'vendor', $file); |
431
|
|
|
if (!in_array($path, self::$styles)) { |
432
|
|
|
self::$styles[] = $path; |
433
|
|
|
} |
434
|
|
|
} |
435
|
|
|
|
436
|
|
|
/** |
437
|
|
|
* Add a custom element to the header |
438
|
|
|
* If $text is null then the element will be written as empty element. |
439
|
|
|
* So use "" to get a closing tag. |
440
|
|
|
* @param string $tag tag name of the element |
441
|
|
|
* @param array $attributes array of attributes for the element |
442
|
|
|
* @param string $text the text content for the element |
443
|
|
|
*/ |
444
|
|
View Code Duplication |
public static function addHeader($tag, $attributes, $text=null) { |
445
|
|
|
self::$headers[] = array( |
446
|
|
|
'tag' => $tag, |
447
|
|
|
'attributes' => $attributes, |
448
|
|
|
'text' => $text |
449
|
|
|
); |
450
|
|
|
} |
451
|
|
|
|
452
|
|
|
/** |
453
|
|
|
* formats a timestamp in the "right" way |
454
|
|
|
* |
455
|
|
|
* @param int $timestamp |
456
|
|
|
* @param bool $dateOnly option to omit time from the result |
457
|
|
|
* @param DateTimeZone|string $timeZone where the given timestamp shall be converted to |
458
|
|
|
* @return string timestamp |
459
|
|
|
* |
460
|
|
|
* @deprecated Use \OC::$server->query('DateTimeFormatter') instead |
461
|
|
|
*/ |
462
|
|
|
public static function formatDate($timestamp, $dateOnly = false, $timeZone = null) { |
463
|
|
|
if ($timeZone !== null && !$timeZone instanceof \DateTimeZone) { |
464
|
|
|
$timeZone = new \DateTimeZone($timeZone); |
465
|
|
|
} |
466
|
|
|
|
467
|
|
|
/** @var \OC\DateTimeFormatter $formatter */ |
468
|
|
|
$formatter = \OC::$server->query('DateTimeFormatter'); |
469
|
|
|
if ($dateOnly) { |
470
|
|
|
return $formatter->formatDate($timestamp, 'long', $timeZone); |
471
|
|
|
} |
472
|
|
|
return $formatter->formatDateTime($timestamp, 'long', 'long', $timeZone); |
473
|
|
|
} |
474
|
|
|
|
475
|
|
|
/** |
476
|
|
|
* check if the current server configuration is suitable for ownCloud |
477
|
|
|
* |
478
|
|
|
* @param \OCP\IConfig $config |
479
|
|
|
* @return array arrays with error messages and hints |
480
|
|
|
*/ |
481
|
|
|
public static function checkServer(\OCP\IConfig $config) { |
482
|
|
|
$l = \OC::$server->getL10N('lib'); |
483
|
|
|
$errors = array(); |
484
|
|
|
$CONFIG_DATADIRECTORY = $config->getSystemValue('datadirectory', OC::$SERVERROOT . '/data'); |
485
|
|
|
|
486
|
|
|
if (!self::needUpgrade($config) && $config->getSystemValue('installed', false)) { |
487
|
|
|
// this check needs to be done every time |
488
|
|
|
$errors = self::checkDataDirectoryValidity($CONFIG_DATADIRECTORY); |
489
|
|
|
} |
490
|
|
|
|
491
|
|
|
// Assume that if checkServer() succeeded before in this session, then all is fine. |
492
|
|
|
if (\OC::$server->getSession()->exists('checkServer_succeeded') && \OC::$server->getSession()->get('checkServer_succeeded')) { |
493
|
|
|
return $errors; |
494
|
|
|
} |
495
|
|
|
|
496
|
|
|
$webServerRestart = false; |
497
|
|
|
$setup = new OC_Setup($config); |
498
|
|
|
$availableDatabases = $setup->getSupportedDatabases(); |
499
|
|
View Code Duplication |
if (empty($availableDatabases)) { |
|
|
|
|
500
|
|
|
$errors[] = array( |
501
|
|
|
'error' => $l->t('No database drivers (sqlite, mysql, or postgresql) installed.'), |
502
|
|
|
'hint' => '' //TODO: sane hint |
503
|
|
|
); |
504
|
|
|
$webServerRestart = true; |
505
|
|
|
} |
506
|
|
|
|
507
|
|
|
// Check if config folder is writable. |
508
|
|
|
if (!is_writable(OC::$configDir) or !is_readable(OC::$configDir)) { |
509
|
|
|
$errors[] = array( |
510
|
|
|
'error' => $l->t('Cannot write into "config" directory'), |
511
|
|
|
'hint' => $l->t('This can usually be fixed by ' |
512
|
|
|
. '%sgiving the webserver write access to the config directory%s.', |
513
|
|
|
array('<a href="' . \OC_Helper::linkToDocs('admin-dir_permissions') . '" target="_blank">', '</a>')) |
514
|
|
|
); |
515
|
|
|
} |
516
|
|
|
|
517
|
|
|
// Check if there is a writable install folder. |
518
|
|
|
if ($config->getSystemValue('appstoreenabled', true)) { |
519
|
|
|
if (OC_App::getInstallPath() === null |
520
|
|
|
|| !is_writable(OC_App::getInstallPath()) |
521
|
|
|
|| !is_readable(OC_App::getInstallPath()) |
522
|
|
|
) { |
523
|
|
|
$errors[] = array( |
524
|
|
|
'error' => $l->t('Cannot write into "apps" directory'), |
525
|
|
|
'hint' => $l->t('This can usually be fixed by ' |
526
|
|
|
. '%sgiving the webserver write access to the apps directory%s' |
527
|
|
|
. ' or disabling the appstore in the config file.', |
528
|
|
|
array('<a href="' . \OC_Helper::linkToDocs('admin-dir_permissions') . '" target="_blank">', '</a>')) |
529
|
|
|
); |
530
|
|
|
} |
531
|
|
|
} |
532
|
|
|
// Create root dir. |
533
|
|
|
if ($config->getSystemValue('installed', false)) { |
534
|
|
|
if (!is_dir($CONFIG_DATADIRECTORY)) { |
535
|
|
|
$success = @mkdir($CONFIG_DATADIRECTORY); |
536
|
|
|
if ($success) { |
537
|
|
|
$errors = array_merge($errors, self::checkDataDirectoryPermissions($CONFIG_DATADIRECTORY)); |
538
|
|
|
} else { |
539
|
|
|
$errors[] = array( |
540
|
|
|
'error' => $l->t('Cannot create "data" directory (%s)', array($CONFIG_DATADIRECTORY)), |
541
|
|
|
'hint' => $l->t('This can usually be fixed by ' |
542
|
|
|
. '<a href="%s" target="_blank">giving the webserver write access to the root directory</a>.', |
543
|
|
|
array(OC_Helper::linkToDocs('admin-dir_permissions'))) |
544
|
|
|
); |
545
|
|
|
} |
546
|
|
|
} else if (!is_writable($CONFIG_DATADIRECTORY) or !is_readable($CONFIG_DATADIRECTORY)) { |
547
|
|
|
//common hint for all file permissions error messages |
548
|
|
|
$permissionsHint = $l->t('Permissions can usually be fixed by ' |
549
|
|
|
. '%sgiving the webserver write access to the root directory%s.', |
550
|
|
|
array('<a href="' . \OC_Helper::linkToDocs('admin-dir_permissions') . '" target="_blank">', '</a>')); |
551
|
|
|
$errors[] = array( |
552
|
|
|
'error' => 'Data directory (' . $CONFIG_DATADIRECTORY . ') not writable by ownCloud', |
553
|
|
|
'hint' => $permissionsHint |
554
|
|
|
); |
555
|
|
|
} else { |
556
|
|
|
$errors = array_merge($errors, self::checkDataDirectoryPermissions($CONFIG_DATADIRECTORY)); |
557
|
|
|
} |
558
|
|
|
} |
559
|
|
|
|
560
|
|
|
if (!OC_Util::isSetLocaleWorking()) { |
561
|
|
|
$errors[] = array( |
562
|
|
|
'error' => $l->t('Setting locale to %s failed', |
563
|
|
|
array('en_US.UTF-8/fr_FR.UTF-8/es_ES.UTF-8/de_DE.UTF-8/ru_RU.UTF-8/' |
564
|
|
|
. 'pt_BR.UTF-8/it_IT.UTF-8/ja_JP.UTF-8/zh_CN.UTF-8')), |
565
|
|
|
'hint' => $l->t('Please install one of these locales on your system and restart your webserver.') |
566
|
|
|
); |
567
|
|
|
} |
568
|
|
|
|
569
|
|
|
// Contains the dependencies that should be checked against |
570
|
|
|
// classes = class_exists |
571
|
|
|
// functions = function_exists |
572
|
|
|
// defined = defined |
573
|
|
|
// If the dependency is not found the missing module name is shown to the EndUser |
574
|
|
|
$dependencies = array( |
575
|
|
|
'classes' => array( |
576
|
|
|
'ZipArchive' => 'zip', |
577
|
|
|
'DOMDocument' => 'dom', |
578
|
|
|
'XMLWriter' => 'XMLWriter' |
579
|
|
|
), |
580
|
|
|
'functions' => [ |
581
|
|
|
'xml_parser_create' => 'libxml', |
582
|
|
|
'mb_detect_encoding' => 'mb multibyte', |
583
|
|
|
'ctype_digit' => 'ctype', |
584
|
|
|
'json_encode' => 'JSON', |
585
|
|
|
'gd_info' => 'GD', |
586
|
|
|
'gzencode' => 'zlib', |
587
|
|
|
'iconv' => 'iconv', |
588
|
|
|
'simplexml_load_string' => 'SimpleXML', |
589
|
|
|
'hash' => 'HASH Message Digest Framework', |
590
|
|
|
], |
591
|
|
|
'defined' => array( |
592
|
|
|
'PDO::ATTR_DRIVER_NAME' => 'PDO' |
593
|
|
|
) |
594
|
|
|
); |
595
|
|
|
$missingDependencies = array(); |
596
|
|
|
$moduleHint = $l->t('Please ask your server administrator to install the module.'); |
597
|
|
|
|
598
|
|
|
foreach ($dependencies['classes'] as $class => $module) { |
599
|
|
|
if (!class_exists($class)) { |
600
|
|
|
$missingDependencies[] = $module; |
601
|
|
|
} |
602
|
|
|
} |
603
|
|
|
foreach ($dependencies['functions'] as $function => $module) { |
604
|
|
|
if (!function_exists($function)) { |
605
|
|
|
$missingDependencies[] = $module; |
606
|
|
|
} |
607
|
|
|
} |
608
|
|
|
foreach ($dependencies['defined'] as $defined => $module) { |
609
|
|
|
if (!defined($defined)) { |
610
|
|
|
$missingDependencies[] = $module; |
611
|
|
|
} |
612
|
|
|
} |
613
|
|
|
|
614
|
|
|
foreach($missingDependencies as $missingDependency) { |
615
|
|
|
$errors[] = array( |
616
|
|
|
'error' => $l->t('PHP module %s not installed.', array($missingDependency)), |
617
|
|
|
'hint' => $moduleHint |
618
|
|
|
); |
619
|
|
|
$webServerRestart = true; |
620
|
|
|
} |
621
|
|
|
|
622
|
|
|
if (version_compare(phpversion(), '5.4.0', '<')) { |
623
|
|
|
$errors[] = array( |
624
|
|
|
'error' => $l->t('PHP %s or higher is required.', '5.4.0'), |
|
|
|
|
625
|
|
|
'hint' => $l->t('Please ask your server administrator to update PHP to the latest version.' |
626
|
|
|
. ' Your PHP version is no longer supported by ownCloud and the PHP community.') |
627
|
|
|
); |
628
|
|
|
$webServerRestart = true; |
629
|
|
|
} |
630
|
|
|
|
631
|
|
|
if (!self::isAnnotationsWorking()) { |
632
|
|
|
$errors[] = array( |
633
|
|
|
'error' => $l->t('PHP is apparently setup to strip inline doc blocks. This will make several core apps inaccessible.'), |
634
|
|
|
'hint' => $l->t('This is probably caused by a cache/accelerator such as Zend OPcache or eAccelerator.') |
635
|
|
|
); |
636
|
|
|
} |
637
|
|
|
|
638
|
|
View Code Duplication |
if ($webServerRestart) { |
|
|
|
|
639
|
|
|
$errors[] = array( |
640
|
|
|
'error' => $l->t('PHP modules have been installed, but they are still listed as missing?'), |
641
|
|
|
'hint' => $l->t('Please ask your server administrator to restart the web server.') |
642
|
|
|
); |
643
|
|
|
} |
644
|
|
|
|
645
|
|
|
$errors = array_merge($errors, self::checkDatabaseVersion()); |
646
|
|
|
|
647
|
|
|
// Cache the result of this function |
648
|
|
|
\OC::$server->getSession()->set('checkServer_succeeded', count($errors) == 0); |
649
|
|
|
|
650
|
|
|
return $errors; |
651
|
|
|
} |
652
|
|
|
|
653
|
|
|
/** |
654
|
|
|
* Check the database version |
655
|
|
|
* |
656
|
|
|
* @return array errors array |
657
|
|
|
*/ |
658
|
|
|
public static function checkDatabaseVersion() { |
659
|
|
|
$l = \OC::$server->getL10N('lib'); |
660
|
|
|
$errors = array(); |
661
|
|
|
$dbType = \OC_Config::getValue('dbtype', 'sqlite'); |
662
|
|
|
if ($dbType === 'pgsql') { |
663
|
|
|
// check PostgreSQL version |
664
|
|
|
try { |
665
|
|
|
$result = \OC_DB::executeAudited('SHOW SERVER_VERSION'); |
666
|
|
|
$data = $result->fetchRow(); |
667
|
|
|
if (isset($data['server_version'])) { |
668
|
|
|
$version = $data['server_version']; |
669
|
|
|
if (version_compare($version, '9.0.0', '<')) { |
670
|
|
|
$errors[] = array( |
671
|
|
|
'error' => $l->t('PostgreSQL >= 9 required'), |
672
|
|
|
'hint' => $l->t('Please upgrade your database version') |
673
|
|
|
); |
674
|
|
|
} |
675
|
|
|
} |
676
|
|
|
} catch (\Doctrine\DBAL\DBALException $e) { |
|
|
|
|
677
|
|
|
\OCP\Util::logException('core', $e); |
678
|
|
|
$errors[] = array( |
679
|
|
|
'error' => $l->t('Error occurred while checking PostgreSQL version'), |
680
|
|
|
'hint' => $l->t('Please make sure you have PostgreSQL >= 9 or' |
681
|
|
|
. ' check the logs for more information about the error') |
682
|
|
|
); |
683
|
|
|
} |
684
|
|
|
} |
685
|
|
|
return $errors; |
686
|
|
|
} |
687
|
|
|
|
688
|
|
|
|
689
|
|
|
/** |
690
|
|
|
* check if there are still some encrypted files stored |
691
|
|
|
* |
692
|
|
|
* @return boolean |
693
|
|
|
*/ |
694
|
|
View Code Duplication |
public static function encryptedFiles() { |
695
|
|
|
//check if encryption was enabled in the past |
696
|
|
|
$encryptedFiles = false; |
697
|
|
|
if (OC_App::isEnabled('files_encryption') === false) { |
698
|
|
|
$view = new OC\Files\View('/' . OCP\User::getUser()); |
699
|
|
|
$keysPath = '/files_encryption/keys'; |
700
|
|
|
if ($view->is_dir($keysPath)) { |
701
|
|
|
$dircontent = $view->getDirectoryContent($keysPath); |
702
|
|
|
if (!empty($dircontent)) { |
703
|
|
|
$encryptedFiles = true; |
704
|
|
|
} |
705
|
|
|
} |
706
|
|
|
} |
707
|
|
|
|
708
|
|
|
return $encryptedFiles; |
709
|
|
|
} |
710
|
|
|
|
711
|
|
|
/** |
712
|
|
|
* check if a backup from the encryption keys exists |
713
|
|
|
* |
714
|
|
|
* @return boolean |
715
|
|
|
*/ |
716
|
|
View Code Duplication |
public static function backupKeysExists() { |
717
|
|
|
//check if encryption was enabled in the past |
718
|
|
|
$backupExists = false; |
719
|
|
|
if (OC_App::isEnabled('files_encryption') === false) { |
720
|
|
|
$view = new OC\Files\View('/' . OCP\User::getUser()); |
721
|
|
|
$backupPath = '/files_encryption/backup.decryptAll'; |
722
|
|
|
if ($view->is_dir($backupPath)) { |
723
|
|
|
$dircontent = $view->getDirectoryContent($backupPath); |
724
|
|
|
if (!empty($dircontent)) { |
725
|
|
|
$backupExists = true; |
726
|
|
|
} |
727
|
|
|
} |
728
|
|
|
} |
729
|
|
|
|
730
|
|
|
return $backupExists; |
731
|
|
|
} |
732
|
|
|
|
733
|
|
|
/** |
734
|
|
|
* Check for correct file permissions of data directory |
735
|
|
|
* |
736
|
|
|
* @param string $dataDirectory |
737
|
|
|
* @return array arrays with error messages and hints |
738
|
|
|
*/ |
739
|
|
|
public static function checkDataDirectoryPermissions($dataDirectory) { |
740
|
|
|
$l = \OC::$server->getL10N('lib'); |
741
|
|
|
$errors = array(); |
742
|
|
|
if (self::runningOnWindows()) { |
743
|
|
|
//TODO: permissions checks for windows hosts |
744
|
|
|
} else { |
745
|
|
|
$permissionsModHint = $l->t('Please change the permissions to 0770 so that the directory' |
746
|
|
|
. ' cannot be listed by other users.'); |
747
|
|
|
$perms = substr(decoct(@fileperms($dataDirectory)), -3); |
748
|
|
|
if (substr($perms, -1) != '0') { |
749
|
|
|
chmod($dataDirectory, 0770); |
750
|
|
|
clearstatcache(); |
751
|
|
|
$perms = substr(decoct(@fileperms($dataDirectory)), -3); |
752
|
|
View Code Duplication |
if (substr($perms, 2, 1) != '0') { |
|
|
|
|
753
|
|
|
$errors[] = array( |
754
|
|
|
'error' => $l->t('Data directory (%s) is readable by other users', array($dataDirectory)), |
755
|
|
|
'hint' => $permissionsModHint |
756
|
|
|
); |
757
|
|
|
} |
758
|
|
|
} |
759
|
|
|
} |
760
|
|
|
return $errors; |
761
|
|
|
} |
762
|
|
|
|
763
|
|
|
/** |
764
|
|
|
* Check that the data directory exists and is valid by |
765
|
|
|
* checking the existence of the ".ocdata" file. |
766
|
|
|
* |
767
|
|
|
* @param string $dataDirectory data directory path |
768
|
|
|
* @return bool true if the data directory is valid, false otherwise |
769
|
|
|
*/ |
770
|
|
|
public static function checkDataDirectoryValidity($dataDirectory) { |
771
|
|
|
$l = \OC::$server->getL10N('lib'); |
772
|
|
|
$errors = array(); |
773
|
|
View Code Duplication |
if (!file_exists($dataDirectory . '/.ocdata')) { |
|
|
|
|
774
|
|
|
$errors[] = array( |
775
|
|
|
'error' => $l->t('Data directory (%s) is invalid', array($dataDirectory)), |
776
|
|
|
'hint' => $l->t('Please check that the data directory contains a file' . |
777
|
|
|
' ".ocdata" in its root.') |
778
|
|
|
); |
779
|
|
|
} |
780
|
|
|
return $errors; |
781
|
|
|
} |
782
|
|
|
|
783
|
|
|
/** |
784
|
|
|
* @param array $errors |
785
|
|
|
* @param string[] $messages |
786
|
|
|
*/ |
787
|
|
|
public static function displayLoginPage($errors = array(), $messages = []) { |
788
|
|
|
$parameters = array(); |
789
|
|
|
foreach ($errors as $value) { |
790
|
|
|
$parameters[$value] = true; |
791
|
|
|
} |
792
|
|
|
$parameters['messages'] = $messages; |
793
|
|
|
if (!empty($_REQUEST['user'])) { |
794
|
|
|
$parameters["username"] = $_REQUEST['user']; |
795
|
|
|
$parameters['user_autofocus'] = false; |
796
|
|
|
} else { |
797
|
|
|
$parameters["username"] = ''; |
798
|
|
|
$parameters['user_autofocus'] = true; |
799
|
|
|
} |
800
|
|
|
if (isset($_REQUEST['redirect_url'])) { |
801
|
|
|
$redirectUrl = $_REQUEST['redirect_url']; |
802
|
|
|
$parameters['redirect_url'] = urlencode($redirectUrl); |
803
|
|
|
} |
804
|
|
|
|
805
|
|
|
$parameters['alt_login'] = OC_App::getAlternativeLogIns(); |
806
|
|
|
$parameters['rememberLoginAllowed'] = self::rememberLoginAllowed(); |
807
|
|
|
OC_Template::printGuestPage("", "login", $parameters); |
808
|
|
|
} |
809
|
|
|
|
810
|
|
|
|
811
|
|
|
/** |
812
|
|
|
* Check if the app is enabled, redirects to home if not |
813
|
|
|
* |
814
|
|
|
* @param string $app |
815
|
|
|
* @return void |
816
|
|
|
*/ |
817
|
|
|
public static function checkAppEnabled($app) { |
818
|
|
|
if (!OC_App::isEnabled($app)) { |
819
|
|
|
header('Location: ' . OC_Helper::linkToAbsolute('', 'index.php')); |
820
|
|
|
exit(); |
821
|
|
|
} |
822
|
|
|
} |
823
|
|
|
|
824
|
|
|
/** |
825
|
|
|
* Check if the user is logged in, redirects to home if not. With |
826
|
|
|
* redirect URL parameter to the request URI. |
827
|
|
|
* |
828
|
|
|
* @return void |
829
|
|
|
*/ |
830
|
|
|
public static function checkLoggedIn() { |
831
|
|
|
// Check if we are a user |
832
|
|
|
if (!OC_User::isLoggedIn()) { |
833
|
|
|
header('Location: ' . OC_Helper::linkToAbsolute('', 'index.php', |
834
|
|
|
array('redirect_url' => OC_Request::requestUri()) |
835
|
|
|
)); |
836
|
|
|
exit(); |
837
|
|
|
} |
838
|
|
|
} |
839
|
|
|
|
840
|
|
|
/** |
841
|
|
|
* Check if the user is a admin, redirects to home if not |
842
|
|
|
* |
843
|
|
|
* @return void |
844
|
|
|
*/ |
845
|
|
View Code Duplication |
public static function checkAdminUser() { |
846
|
|
|
OC_Util::checkLoggedIn(); |
847
|
|
|
if (!OC_User::isAdminUser(OC_User::getUser())) { |
848
|
|
|
header('Location: ' . OC_Helper::linkToAbsolute('', 'index.php')); |
849
|
|
|
exit(); |
850
|
|
|
} |
851
|
|
|
} |
852
|
|
|
|
853
|
|
|
/** |
854
|
|
|
* Check if it is allowed to remember login. |
855
|
|
|
* |
856
|
|
|
* @note Every app can set 'rememberlogin' to 'false' to disable the remember login feature |
857
|
|
|
* |
858
|
|
|
* @return bool |
859
|
|
|
*/ |
860
|
|
|
public static function rememberLoginAllowed() { |
861
|
|
|
|
862
|
|
|
$apps = OC_App::getEnabledApps(); |
863
|
|
|
|
864
|
|
|
foreach ($apps as $app) { |
865
|
|
|
$appInfo = OC_App::getAppInfo($app); |
866
|
|
|
if (isset($appInfo['rememberlogin']) && $appInfo['rememberlogin'] === 'false') { |
867
|
|
|
return false; |
868
|
|
|
} |
869
|
|
|
|
870
|
|
|
} |
871
|
|
|
return true; |
872
|
|
|
} |
873
|
|
|
|
874
|
|
|
/** |
875
|
|
|
* Check if the user is a subadmin, redirects to home if not |
876
|
|
|
* |
877
|
|
|
* @return null|boolean $groups where the current user is subadmin |
878
|
|
|
*/ |
879
|
|
View Code Duplication |
public static function checkSubAdminUser() { |
880
|
|
|
OC_Util::checkLoggedIn(); |
881
|
|
|
if (!OC_SubAdmin::isSubAdmin(OC_User::getUser())) { |
882
|
|
|
header('Location: ' . OC_Helper::linkToAbsolute('', 'index.php')); |
883
|
|
|
exit(); |
884
|
|
|
} |
885
|
|
|
return true; |
886
|
|
|
} |
887
|
|
|
|
888
|
|
|
/** |
889
|
|
|
* Returns the URL of the default page |
890
|
|
|
* based on the system configuration and |
891
|
|
|
* the apps visible for the current user |
892
|
|
|
* |
893
|
|
|
* @return string URL |
894
|
|
|
*/ |
895
|
|
|
public static function getDefaultPageUrl() { |
896
|
|
|
$urlGenerator = \OC::$server->getURLGenerator(); |
897
|
|
|
// Deny the redirect if the URL contains a @ |
898
|
|
|
// This prevents unvalidated redirects like ?redirect_url=:[email protected] |
899
|
|
|
if (isset($_REQUEST['redirect_url']) && strpos($_REQUEST['redirect_url'], '@') === false) { |
900
|
|
|
$location = $urlGenerator->getAbsoluteURL(urldecode($_REQUEST['redirect_url'])); |
901
|
|
|
} else { |
902
|
|
|
$defaultPage = OC_Appconfig::getValue('core', 'defaultpage'); |
903
|
|
|
if ($defaultPage) { |
904
|
|
|
$location = $urlGenerator->getAbsoluteURL($defaultPage); |
905
|
|
|
} else { |
906
|
|
|
$appId = 'files'; |
907
|
|
|
$defaultApps = explode(',', \OCP\Config::getSystemValue('defaultapp', 'files')); |
908
|
|
|
// find the first app that is enabled for the current user |
909
|
|
|
foreach ($defaultApps as $defaultApp) { |
910
|
|
|
$defaultApp = OC_App::cleanAppId(strip_tags($defaultApp)); |
911
|
|
|
if (OC_App::isEnabled($defaultApp)) { |
912
|
|
|
$appId = $defaultApp; |
913
|
|
|
break; |
914
|
|
|
} |
915
|
|
|
} |
916
|
|
|
$location = $urlGenerator->getAbsoluteURL('/index.php/apps/' . $appId . '/'); |
917
|
|
|
} |
918
|
|
|
} |
919
|
|
|
return $location; |
920
|
|
|
} |
921
|
|
|
|
922
|
|
|
/** |
923
|
|
|
* Redirect to the user default page |
924
|
|
|
* |
925
|
|
|
* @return void |
926
|
|
|
*/ |
927
|
|
|
public static function redirectToDefaultPage() { |
928
|
|
|
$location = self::getDefaultPageUrl(); |
929
|
|
|
header('Location: ' . $location); |
930
|
|
|
exit(); |
931
|
|
|
} |
932
|
|
|
|
933
|
|
|
/** |
934
|
|
|
* get an id unique for this instance |
935
|
|
|
* |
936
|
|
|
* @return string |
937
|
|
|
*/ |
938
|
|
|
public static function getInstanceId() { |
939
|
|
|
$id = OC_Config::getValue('instanceid', null); |
940
|
|
|
if (is_null($id)) { |
941
|
|
|
// We need to guarantee at least one letter in instanceid so it can be used as the session_name |
942
|
|
|
$id = 'oc' . \OC::$server->getSecureRandom()->getLowStrengthGenerator()->generate(10, \OCP\Security\ISecureRandom::CHAR_LOWER.\OCP\Security\ISecureRandom::CHAR_DIGITS); |
943
|
|
|
OC_Config::$object->setValue('instanceid', $id); |
944
|
|
|
} |
945
|
|
|
return $id; |
946
|
|
|
} |
947
|
|
|
|
948
|
|
|
/** |
949
|
|
|
* Register an get/post call. Important to prevent CSRF attacks. |
950
|
|
|
* |
951
|
|
|
* @return string Generated token. |
952
|
|
|
* @description |
953
|
|
|
* Creates a 'request token' (random) and stores it inside the session. |
954
|
|
|
* Ever subsequent (ajax) request must use such a valid token to succeed, |
955
|
|
|
* otherwise the request will be denied as a protection against CSRF. |
956
|
|
|
* @see OC_Util::isCallRegistered() |
957
|
|
|
*/ |
958
|
|
|
public static function callRegister() { |
959
|
|
|
// Check if a token exists |
960
|
|
|
if (!\OC::$server->getSession()->exists('requesttoken')) { |
961
|
|
|
// No valid token found, generate a new one. |
962
|
|
|
$requestToken = \OC::$server->getSecureRandom()->getMediumStrengthGenerator()->generate(30); |
963
|
|
|
\OC::$server->getSession()->set('requesttoken', $requestToken); |
964
|
|
|
} else { |
965
|
|
|
// Valid token already exists, send it |
966
|
|
|
$requestToken = \OC::$server->getSession()->get('requesttoken'); |
967
|
|
|
} |
968
|
|
|
return ($requestToken); |
969
|
|
|
} |
970
|
|
|
|
971
|
|
|
/** |
972
|
|
|
* Check an ajax get/post call if the request token is valid. |
973
|
|
|
* |
974
|
|
|
* @return boolean False if request token is not set or is invalid. |
975
|
|
|
* @see OC_Util::callRegister() |
976
|
|
|
*/ |
977
|
|
|
public static function isCallRegistered() { |
978
|
|
|
return \OC::$server->getRequest()->passesCSRFCheck(); |
979
|
|
|
} |
980
|
|
|
|
981
|
|
|
/** |
982
|
|
|
* Check an ajax get/post call if the request token is valid. Exit if not. |
983
|
|
|
* |
984
|
|
|
* @return void |
985
|
|
|
*/ |
986
|
|
|
public static function callCheck() { |
987
|
|
|
if (!OC_Util::isCallRegistered()) { |
988
|
|
|
exit(); |
989
|
|
|
} |
990
|
|
|
} |
991
|
|
|
|
992
|
|
|
/** |
993
|
|
|
* Public function to sanitize HTML |
994
|
|
|
* |
995
|
|
|
* This function is used to sanitize HTML and should be applied on any |
996
|
|
|
* string or array of strings before displaying it on a web page. |
997
|
|
|
* |
998
|
|
|
* @param string|array &$value |
999
|
|
|
* @return string|array an array of sanitized strings or a single sanitized string, depends on the input parameter. |
1000
|
|
|
*/ |
1001
|
|
|
public static function sanitizeHTML(&$value) { |
1002
|
|
|
if (is_array($value)) { |
1003
|
|
|
array_walk_recursive($value, 'OC_Util::sanitizeHTML'); |
1004
|
|
|
} else { |
1005
|
|
|
//Specify encoding for PHP<5.4 |
1006
|
|
|
$value = htmlspecialchars((string)$value, ENT_QUOTES, 'UTF-8'); |
1007
|
|
|
} |
1008
|
|
|
return $value; |
1009
|
|
|
} |
1010
|
|
|
|
1011
|
|
|
/** |
1012
|
|
|
* Public function to encode url parameters |
1013
|
|
|
* |
1014
|
|
|
* This function is used to encode path to file before output. |
1015
|
|
|
* Encoding is done according to RFC 3986 with one exception: |
1016
|
|
|
* Character '/' is preserved as is. |
1017
|
|
|
* |
1018
|
|
|
* @param string $component part of URI to encode |
1019
|
|
|
* @return string |
1020
|
|
|
*/ |
1021
|
|
|
public static function encodePath($component) { |
1022
|
|
|
$encoded = rawurlencode($component); |
1023
|
|
|
$encoded = str_replace('%2F', '/', $encoded); |
1024
|
|
|
return $encoded; |
1025
|
|
|
} |
1026
|
|
|
|
1027
|
|
|
/** |
1028
|
|
|
* Check if the .htaccess file is working |
1029
|
|
|
* |
1030
|
|
|
* @throws OC\HintException If the testfile can't get written. |
1031
|
|
|
* @return bool |
1032
|
|
|
* @description Check if the .htaccess file is working by creating a test |
1033
|
|
|
* file in the data directory and trying to access via http |
1034
|
|
|
*/ |
1035
|
|
|
public static function isHtaccessWorking() { |
1036
|
|
|
if (\OC::$CLI || !OC::$server->getConfig()->getSystemValue('check_for_working_htaccess', true)) { |
1037
|
|
|
return true; |
1038
|
|
|
} |
1039
|
|
|
|
1040
|
|
|
// php dev server does not support htaccess |
1041
|
|
|
if (php_sapi_name() === 'cli-server') { |
1042
|
|
|
return false; |
1043
|
|
|
} |
1044
|
|
|
|
1045
|
|
|
// testdata |
1046
|
|
|
$fileName = '/htaccesstest.txt'; |
1047
|
|
|
$testContent = 'testcontent'; |
1048
|
|
|
|
1049
|
|
|
// creating a test file |
1050
|
|
|
$testFile = OC::$server->getConfig()->getSystemValue('datadirectory', OC::$SERVERROOT . '/data') . '/' . $fileName; |
1051
|
|
|
|
1052
|
|
|
if (file_exists($testFile)) {// already running this test, possible recursive call |
1053
|
|
|
return false; |
1054
|
|
|
} |
1055
|
|
|
|
1056
|
|
|
$fp = @fopen($testFile, 'w'); |
1057
|
|
|
if (!$fp) { |
1058
|
|
|
throw new OC\HintException('Can\'t create test file to check for working .htaccess file.', |
1059
|
|
|
'Make sure it is possible for the webserver to write to ' . $testFile); |
1060
|
|
|
} |
1061
|
|
|
fwrite($fp, $testContent); |
1062
|
|
|
fclose($fp); |
1063
|
|
|
|
1064
|
|
|
// accessing the file via http |
1065
|
|
|
$url = OC_Helper::makeURLAbsolute(OC::$WEBROOT . '/data' . $fileName); |
1066
|
|
|
$content = self::getUrlContent($url); |
1067
|
|
|
|
1068
|
|
|
// cleanup |
1069
|
|
|
@unlink($testFile); |
1070
|
|
|
|
1071
|
|
|
/* |
1072
|
|
|
* If the content is not equal to test content our .htaccess |
1073
|
|
|
* is working as required |
1074
|
|
|
*/ |
1075
|
|
|
return $content !== $testContent; |
1076
|
|
|
} |
1077
|
|
|
|
1078
|
|
|
/** |
1079
|
|
|
* Check if the setlocal call does not work. This can happen if the right |
1080
|
|
|
* local packages are not available on the server. |
1081
|
|
|
* |
1082
|
|
|
* @return bool |
1083
|
|
|
*/ |
1084
|
|
|
public static function isSetLocaleWorking() { |
1085
|
|
|
// setlocale test is pointless on Windows |
1086
|
|
|
if (OC_Util::runningOnWindows()) { |
1087
|
|
|
return true; |
1088
|
|
|
} |
1089
|
|
|
|
1090
|
|
|
\Patchwork\Utf8\Bootup::initLocale(); |
1091
|
|
|
if ('' === basename('§')) { |
1092
|
|
|
return false; |
1093
|
|
|
} |
1094
|
|
|
return true; |
1095
|
|
|
} |
1096
|
|
|
|
1097
|
|
|
/** |
1098
|
|
|
* Check if it's possible to get the inline annotations |
1099
|
|
|
* |
1100
|
|
|
* @return bool |
1101
|
|
|
*/ |
1102
|
|
|
public static function isAnnotationsWorking() { |
1103
|
|
|
$reflection = new \ReflectionMethod(__METHOD__); |
1104
|
|
|
$docs = $reflection->getDocComment(); |
1105
|
|
|
|
1106
|
|
|
return (is_string($docs) && strlen($docs) > 50); |
1107
|
|
|
} |
1108
|
|
|
|
1109
|
|
|
/** |
1110
|
|
|
* Check if the PHP module fileinfo is loaded. |
1111
|
|
|
* |
1112
|
|
|
* @return bool |
1113
|
|
|
*/ |
1114
|
|
|
public static function fileInfoLoaded() { |
1115
|
|
|
return function_exists('finfo_open'); |
1116
|
|
|
} |
1117
|
|
|
|
1118
|
|
|
/** |
1119
|
|
|
* Check if the ownCloud server can connect to the internet |
1120
|
|
|
* |
1121
|
|
|
* @return bool |
1122
|
|
|
*/ |
1123
|
|
|
public static function isInternetConnectionWorking() { |
1124
|
|
|
// in case there is no internet connection on purpose return false |
1125
|
|
|
if (self::isInternetConnectionEnabled() === false) { |
1126
|
|
|
return false; |
1127
|
|
|
} |
1128
|
|
|
|
1129
|
|
|
// in case the connection is via proxy return true to avoid connecting to owncloud.org |
1130
|
|
|
if (OC_Config::getValue('proxy', '') != '') { |
1131
|
|
|
return true; |
1132
|
|
|
} |
1133
|
|
|
|
1134
|
|
|
// try to connect to owncloud.org to see if http connections to the internet are possible. |
1135
|
|
|
$connected = @fsockopen("www.owncloud.org", 80); |
1136
|
|
|
if ($connected) { |
1137
|
|
|
fclose($connected); |
1138
|
|
|
return true; |
1139
|
|
|
} else { |
1140
|
|
|
// second try in case one server is down |
1141
|
|
|
$connected = @fsockopen("apps.owncloud.com", 80); |
1142
|
|
|
if ($connected) { |
1143
|
|
|
fclose($connected); |
1144
|
|
|
return true; |
1145
|
|
|
} else { |
1146
|
|
|
return false; |
1147
|
|
|
} |
1148
|
|
|
} |
1149
|
|
|
} |
1150
|
|
|
|
1151
|
|
|
/** |
1152
|
|
|
* Check if the connection to the internet is disabled on purpose |
1153
|
|
|
* |
1154
|
|
|
* @return string |
1155
|
|
|
*/ |
1156
|
|
|
public static function isInternetConnectionEnabled() { |
1157
|
|
|
return \OC_Config::getValue("has_internet_connection", true); |
1158
|
|
|
} |
1159
|
|
|
|
1160
|
|
|
/** |
1161
|
|
|
* clear all levels of output buffering |
1162
|
|
|
* |
1163
|
|
|
* @return void |
1164
|
|
|
*/ |
1165
|
|
|
public static function obEnd() { |
1166
|
|
|
while (ob_get_level()) { |
1167
|
|
|
ob_end_clean(); |
1168
|
|
|
} |
1169
|
|
|
} |
1170
|
|
|
|
1171
|
|
|
|
1172
|
|
|
/** |
1173
|
|
|
* Generates a cryptographic secure pseudo-random string |
1174
|
|
|
* |
1175
|
|
|
* @param int $length of the random string |
1176
|
|
|
* @return string |
1177
|
|
|
* @deprecated Use \OC::$server->getSecureRandom()->getMediumStrengthGenerator()->generate($length); instead |
1178
|
|
|
*/ |
1179
|
|
|
public static function generateRandomBytes($length = 30) { |
1180
|
|
|
return \OC::$server->getSecureRandom()->getMediumStrengthGenerator()->generate($length, \OCP\Security\ISecureRandom::CHAR_LOWER.\OCP\Security\ISecureRandom::CHAR_DIGITS); |
1181
|
|
|
} |
1182
|
|
|
|
1183
|
|
|
/** |
1184
|
|
|
* Checks if a secure random number generator is available |
1185
|
|
|
* |
1186
|
|
|
* @return true |
1187
|
|
|
* @deprecated Function will be removed in the future and does only return true. |
1188
|
|
|
*/ |
1189
|
|
|
public static function secureRNGAvailable() { |
1190
|
|
|
return true; |
1191
|
|
|
} |
1192
|
|
|
|
1193
|
|
|
/** |
1194
|
|
|
* Get URL content |
1195
|
|
|
* @param string $url Url to get content |
1196
|
|
|
* @deprecated Use \OC::$server->getHTTPHelper()->getUrlContent($url); |
1197
|
|
|
* @throws Exception If the URL does not start with http:// or https:// |
1198
|
|
|
* @return string of the response or false on error |
1199
|
|
|
* This function get the content of a page via curl, if curl is enabled. |
1200
|
|
|
* If not, file_get_contents is used. |
1201
|
|
|
*/ |
1202
|
|
|
public static function getUrlContent($url) { |
1203
|
|
|
try { |
1204
|
|
|
return \OC::$server->getHTTPHelper()->getUrlContent($url); |
1205
|
|
|
} catch (\Exception $e) { |
1206
|
|
|
throw $e; |
1207
|
|
|
} |
1208
|
|
|
} |
1209
|
|
|
|
1210
|
|
|
/** |
1211
|
|
|
* Checks whether the server is running on Windows |
1212
|
|
|
* |
1213
|
|
|
* @return bool true if running on Windows, false otherwise |
1214
|
|
|
*/ |
1215
|
|
|
public static function runningOnWindows() { |
1216
|
|
|
return (substr(PHP_OS, 0, 3) === "WIN"); |
1217
|
|
|
} |
1218
|
|
|
|
1219
|
|
|
/** |
1220
|
|
|
* Checks whether the server is running on Mac OS X |
1221
|
|
|
* |
1222
|
|
|
* @return bool true if running on Mac OS X, false otherwise |
1223
|
|
|
*/ |
1224
|
|
|
public static function runningOnMac() { |
1225
|
|
|
return (strtoupper(substr(PHP_OS, 0, 6)) === 'DARWIN'); |
1226
|
|
|
} |
1227
|
|
|
|
1228
|
|
|
/** |
1229
|
|
|
* Checks whether server is running on HHVM |
1230
|
|
|
* |
1231
|
|
|
* @return bool True if running on HHVM, false otherwise |
1232
|
|
|
*/ |
1233
|
|
|
public static function runningOnHhvm() { |
1234
|
|
|
return defined('HHVM_VERSION'); |
1235
|
|
|
} |
1236
|
|
|
|
1237
|
|
|
/** |
1238
|
|
|
* Handles the case that there may not be a theme, then check if a "default" |
1239
|
|
|
* theme exists and take that one |
1240
|
|
|
* |
1241
|
|
|
* @return string the theme |
1242
|
|
|
*/ |
1243
|
|
|
public static function getTheme() { |
1244
|
|
|
$theme = OC_Config::getValue("theme", ''); |
1245
|
|
|
|
1246
|
|
|
if ($theme === '') { |
1247
|
|
|
if (is_dir(OC::$SERVERROOT . '/themes/default')) { |
1248
|
|
|
$theme = 'default'; |
1249
|
|
|
} |
1250
|
|
|
} |
1251
|
|
|
|
1252
|
|
|
return $theme; |
1253
|
|
|
} |
1254
|
|
|
|
1255
|
|
|
/** |
1256
|
|
|
* Clear the opcode cache if one exists |
1257
|
|
|
* This is necessary for writing to the config file |
1258
|
|
|
* in case the opcode cache does not re-validate files |
1259
|
|
|
* |
1260
|
|
|
* @return void |
1261
|
|
|
*/ |
1262
|
|
|
public static function clearOpcodeCache() { |
1263
|
|
|
// APC |
1264
|
|
|
if (function_exists('apc_clear_cache')) { |
1265
|
|
|
apc_clear_cache(); |
1266
|
|
|
} |
1267
|
|
|
// Zend Opcache |
1268
|
|
|
if (function_exists('accelerator_reset')) { |
1269
|
|
|
accelerator_reset(); |
1270
|
|
|
} |
1271
|
|
|
// XCache |
1272
|
|
|
if (function_exists('xcache_clear_cache')) { |
1273
|
|
|
if (ini_get('xcache.admin.enable_auth')) { |
1274
|
|
|
OC_Log::write('core', 'XCache opcode cache will not be cleared because "xcache.admin.enable_auth" is enabled.', \OC_Log::WARN); |
1275
|
|
|
} else { |
1276
|
|
|
xcache_clear_cache(XC_TYPE_PHP, 0); |
1277
|
|
|
} |
1278
|
|
|
} |
1279
|
|
|
// Opcache (PHP >= 5.5) |
1280
|
|
|
if (function_exists('opcache_reset')) { |
1281
|
|
|
opcache_reset(); |
1282
|
|
|
} |
1283
|
|
|
} |
1284
|
|
|
|
1285
|
|
|
/** |
1286
|
|
|
* Normalize a unicode string |
1287
|
|
|
* |
1288
|
|
|
* @param string $value a not normalized string |
1289
|
|
|
* @return bool|string |
1290
|
|
|
*/ |
1291
|
|
|
public static function normalizeUnicode($value) { |
1292
|
|
|
if(Normalizer::isNormalized($value)) { |
1293
|
|
|
return $value; |
1294
|
|
|
} |
1295
|
|
|
|
1296
|
|
|
$normalizedValue = Normalizer::normalize($value); |
1297
|
|
|
if ($normalizedValue === null || $normalizedValue === false) { |
1298
|
|
|
\OC::$server->getLogger()->warning('normalizing failed for "' . $value . '"', ['app' => 'core']); |
1299
|
|
|
return $value; |
1300
|
|
|
} |
1301
|
|
|
|
1302
|
|
|
return $normalizedValue; |
1303
|
|
|
} |
1304
|
|
|
|
1305
|
|
|
/** |
1306
|
|
|
* @param boolean|string $file |
1307
|
|
|
* @return string |
1308
|
|
|
*/ |
1309
|
|
|
public static function basename($file) { |
1310
|
|
|
$file = rtrim($file, '/'); |
1311
|
|
|
$t = explode('/', $file); |
1312
|
|
|
return array_pop($t); |
1313
|
|
|
} |
1314
|
|
|
|
1315
|
|
|
/** |
1316
|
|
|
* A human readable string is generated based on version, channel and build number |
1317
|
|
|
* |
1318
|
|
|
* @return string |
1319
|
|
|
*/ |
1320
|
|
|
public static function getHumanVersion() { |
1321
|
|
|
$version = OC_Util::getVersionString() . ' (' . OC_Util::getChannel() . ')'; |
1322
|
|
|
$build = OC_Util::getBuild(); |
1323
|
|
|
if (!empty($build) and OC_Util::getChannel() === 'daily') { |
1324
|
|
|
$version .= ' Build:' . $build; |
1325
|
|
|
} |
1326
|
|
|
return $version; |
1327
|
|
|
} |
1328
|
|
|
|
1329
|
|
|
/** |
1330
|
|
|
* Returns whether the given file name is valid |
1331
|
|
|
* |
1332
|
|
|
* @param string $file file name to check |
1333
|
|
|
* @return bool true if the file name is valid, false otherwise |
1334
|
|
|
*/ |
1335
|
|
|
public static function isValidFileName($file) { |
1336
|
|
|
$trimmed = trim($file); |
1337
|
|
|
if ($trimmed === '') { |
1338
|
|
|
return false; |
1339
|
|
|
} |
1340
|
|
|
if ($trimmed === '.' || $trimmed === '..') { |
1341
|
|
|
return false; |
1342
|
|
|
} |
1343
|
|
|
foreach (str_split($trimmed) as $char) { |
1344
|
|
|
if (strpos(\OCP\Constants::FILENAME_INVALID_CHARS, $char) !== false) { |
1345
|
|
|
return false; |
1346
|
|
|
} |
1347
|
|
|
} |
1348
|
|
|
return true; |
1349
|
|
|
} |
1350
|
|
|
|
1351
|
|
|
/** |
1352
|
|
|
* Check whether the instance needs to perform an upgrade, |
1353
|
|
|
* either when the core version is higher or any app requires |
1354
|
|
|
* an upgrade. |
1355
|
|
|
* |
1356
|
|
|
* @param \OCP\IConfig $config |
1357
|
|
|
* @return bool whether the core or any app needs an upgrade |
1358
|
|
|
*/ |
1359
|
|
|
public static function needUpgrade(\OCP\IConfig $config) { |
1360
|
|
|
if ($config->getSystemValue('installed', false)) { |
1361
|
|
|
$installedVersion = $config->getSystemValue('version', '0.0.0'); |
1362
|
|
|
$currentVersion = implode('.', OC_Util::getVersion()); |
1363
|
|
|
if (version_compare($currentVersion, $installedVersion, '>')) { |
1364
|
|
|
return true; |
1365
|
|
|
} |
1366
|
|
|
|
1367
|
|
|
// also check for upgrades for apps (independently from the user) |
1368
|
|
|
$apps = \OC_App::getEnabledApps(false, true); |
1369
|
|
|
$shouldUpgrade = false; |
1370
|
|
|
foreach ($apps as $app) { |
1371
|
|
|
if (\OC_App::shouldUpgrade($app)) { |
1372
|
|
|
$shouldUpgrade = true; |
1373
|
|
|
break; |
1374
|
|
|
} |
1375
|
|
|
} |
1376
|
|
|
return $shouldUpgrade; |
1377
|
|
|
} else { |
1378
|
|
|
return false; |
1379
|
|
|
} |
1380
|
|
|
} |
1381
|
|
|
|
1382
|
|
|
/** |
1383
|
|
|
* Check if PhpCharset config is UTF-8 |
1384
|
|
|
* |
1385
|
|
|
* @return string |
1386
|
|
|
*/ |
1387
|
|
|
public static function isPhpCharSetUtf8() { |
1388
|
|
|
return strtoupper(ini_get('default_charset')) === 'UTF-8'; |
1389
|
|
|
} |
1390
|
|
|
|
1391
|
|
|
} |
1392
|
|
|
|
Let’s take a look at an example:
In the above example, the authenticate() method works fine as long as you just pass instances of MyUser. However, if you now also want to pass a different implementation of User which does not have a getDisplayName() method, the code will break.
Available Fixes
Change the type-hint for the parameter:
Add an additional type-check:
Add the method to the interface: