2014-12-04 13:15:55 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2015-02-26 10:37:37 +00:00
|
|
|
* @author Lukas Reschke
|
|
|
|
* @copyright 2014-2015 Lukas Reschke lukas@owncloud.com
|
2014-12-04 13:15:55 +00:00
|
|
|
*
|
2015-02-26 10:37:37 +00:00
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
2014-12-04 13:15:55 +00:00
|
|
|
*/
|
2015-02-26 10:37:37 +00:00
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
namespace OC\Settings\Controller;
|
|
|
|
|
2014-12-08 14:32:59 +00:00
|
|
|
use OC\AppFramework\Http;
|
2015-01-30 16:24:42 +00:00
|
|
|
use OC\Settings\Factory\SubAdminFactory;
|
2014-12-04 13:15:55 +00:00
|
|
|
use OC\User\User;
|
2015-01-23 16:45:45 +00:00
|
|
|
use OCP\App\IAppManager;
|
|
|
|
use OCP\AppFramework\Controller;
|
2014-12-04 13:15:55 +00:00
|
|
|
use OCP\AppFramework\Http\DataResponse;
|
2014-12-16 08:08:38 +00:00
|
|
|
use OCP\AppFramework\Http\TemplateResponse;
|
2014-12-04 13:15:55 +00:00
|
|
|
use OCP\IConfig;
|
|
|
|
use OCP\IGroupManager;
|
|
|
|
use OCP\IL10N;
|
2014-12-16 08:08:38 +00:00
|
|
|
use OCP\ILogger;
|
2014-12-04 13:15:55 +00:00
|
|
|
use OCP\IRequest;
|
2014-12-16 08:08:38 +00:00
|
|
|
use OCP\IURLGenerator;
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
use OCP\IUser;
|
2014-12-04 13:15:55 +00:00
|
|
|
use OCP\IUserManager;
|
|
|
|
use OCP\IUserSession;
|
2015-02-12 12:53:27 +00:00
|
|
|
use OCP\Mail\IMailer;
|
2014-12-04 13:15:55 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @package OC\Settings\Controller
|
|
|
|
*/
|
|
|
|
class UsersController extends Controller {
|
|
|
|
/** @var IL10N */
|
|
|
|
private $l10n;
|
|
|
|
/** @var IUserSession */
|
|
|
|
private $userSession;
|
|
|
|
/** @var bool */
|
|
|
|
private $isAdmin;
|
|
|
|
/** @var IUserManager */
|
|
|
|
private $userManager;
|
|
|
|
/** @var IGroupManager */
|
|
|
|
private $groupManager;
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
2014-12-16 08:08:38 +00:00
|
|
|
/** @var ILogger */
|
|
|
|
private $log;
|
|
|
|
/** @var \OC_Defaults */
|
|
|
|
private $defaults;
|
2015-02-12 12:53:27 +00:00
|
|
|
/** @var IMailer */
|
|
|
|
private $mailer;
|
2014-12-16 08:08:38 +00:00
|
|
|
/** @var string */
|
|
|
|
private $fromMailAddress;
|
|
|
|
/** @var IURLGenerator */
|
|
|
|
private $urlGenerator;
|
2015-01-23 16:45:45 +00:00
|
|
|
/** @var bool contains the state of the encryption app */
|
|
|
|
private $isEncryptionAppEnabled;
|
|
|
|
/** @var bool contains the state of the admin recovery setting */
|
|
|
|
private $isRestoreEnabled = false;
|
2015-01-30 16:24:42 +00:00
|
|
|
/** @var SubAdminFactory */
|
|
|
|
private $subAdminFactory;
|
2014-12-04 13:15:55 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
|
|
|
* @param IUserManager $userManager
|
|
|
|
* @param IGroupManager $groupManager
|
|
|
|
* @param IUserSession $userSession
|
|
|
|
* @param IConfig $config
|
|
|
|
* @param bool $isAdmin
|
|
|
|
* @param IL10N $l10n
|
2014-12-16 08:08:38 +00:00
|
|
|
* @param ILogger $log
|
|
|
|
* @param \OC_Defaults $defaults
|
2015-02-12 12:53:27 +00:00
|
|
|
* @param IMailer $mailer
|
2014-12-16 08:08:38 +00:00
|
|
|
* @param string $fromMailAddress
|
2015-01-30 13:16:16 +00:00
|
|
|
* @param IURLGenerator $urlGenerator
|
2015-01-23 16:45:45 +00:00
|
|
|
* @param IAppManager $appManager
|
2015-01-30 16:24:42 +00:00
|
|
|
* @param SubAdminFactory $subAdminFactory
|
2014-12-04 13:15:55 +00:00
|
|
|
*/
|
|
|
|
public function __construct($appName,
|
|
|
|
IRequest $request,
|
|
|
|
IUserManager $userManager,
|
|
|
|
IGroupManager $groupManager,
|
|
|
|
IUserSession $userSession,
|
|
|
|
IConfig $config,
|
|
|
|
$isAdmin,
|
2014-12-16 08:08:38 +00:00
|
|
|
IL10N $l10n,
|
|
|
|
ILogger $log,
|
|
|
|
\OC_Defaults $defaults,
|
2015-02-12 12:53:27 +00:00
|
|
|
IMailer $mailer,
|
2014-12-16 08:08:38 +00:00
|
|
|
$fromMailAddress,
|
2015-01-23 16:45:45 +00:00
|
|
|
IURLGenerator $urlGenerator,
|
2015-01-30 13:16:16 +00:00
|
|
|
IAppManager $appManager,
|
2015-01-30 16:24:42 +00:00
|
|
|
SubAdminFactory $subAdminFactory) {
|
2014-12-04 13:15:55 +00:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
$this->userManager = $userManager;
|
|
|
|
$this->groupManager = $groupManager;
|
|
|
|
$this->userSession = $userSession;
|
|
|
|
$this->config = $config;
|
|
|
|
$this->isAdmin = $isAdmin;
|
|
|
|
$this->l10n = $l10n;
|
2014-12-16 08:08:38 +00:00
|
|
|
$this->log = $log;
|
|
|
|
$this->defaults = $defaults;
|
2015-02-12 12:53:27 +00:00
|
|
|
$this->mailer = $mailer;
|
2014-12-16 08:08:38 +00:00
|
|
|
$this->fromMailAddress = $fromMailAddress;
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
2015-01-30 16:24:42 +00:00
|
|
|
$this->subAdminFactory = $subAdminFactory;
|
2015-01-23 16:45:45 +00:00
|
|
|
|
|
|
|
// check for encryption state - TODO see formatUserForIndex
|
|
|
|
$this->isEncryptionAppEnabled = $appManager->isEnabledForUser('files_encryption');
|
|
|
|
if($this->isEncryptionAppEnabled) {
|
|
|
|
// putting this directly in empty is possible in PHP 5.5+
|
|
|
|
$result = $config->getAppValue('files_encryption', 'recoveryAdminEnabled', 0);
|
|
|
|
$this->isRestoreEnabled = !empty($result);
|
|
|
|
}
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
/**
|
|
|
|
* @param IUser $user
|
|
|
|
* @param array $userGroups
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
private function formatUserForIndex(IUser $user, array $userGroups = null) {
|
2015-01-23 16:45:45 +00:00
|
|
|
|
|
|
|
// TODO: eliminate this encryption specific code below and somehow
|
|
|
|
// hook in additional user info from other apps
|
|
|
|
|
|
|
|
// recovery isn't possible if admin or user has it disabled and encryption
|
|
|
|
// is enabled - so we eliminate the else paths in the conditional tree
|
|
|
|
// below
|
|
|
|
$restorePossible = false;
|
|
|
|
|
|
|
|
if ($this->isEncryptionAppEnabled) {
|
|
|
|
if ($this->isRestoreEnabled) {
|
|
|
|
// check for the users recovery setting
|
|
|
|
$recoveryMode = $this->config->getUserValue($user->getUID(), 'files_encryption', 'recovery_enabled', '0');
|
|
|
|
// method call inside empty is possible with PHP 5.5+
|
|
|
|
$recoveryModeEnabled = !empty($recoveryMode);
|
|
|
|
if ($recoveryModeEnabled) {
|
|
|
|
// user also has recovery mode enabled
|
|
|
|
$restorePossible = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// recovery is possible if encryption is disabled (plain files are
|
|
|
|
// available)
|
|
|
|
$restorePossible = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return [
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
'name' => $user->getUID(),
|
|
|
|
'displayname' => $user->getDisplayName(),
|
|
|
|
'groups' => (empty($userGroups)) ? $this->groupManager->getUserGroupIds($user) : $userGroups,
|
|
|
|
'subadmin' => \OC_SubAdmin::getSubAdminsGroups($user->getUID()),
|
|
|
|
'quota' => $this->config->getUserValue($user->getUID(), 'files', 'quota', 'default'),
|
|
|
|
'storageLocation' => $user->getHome(),
|
2015-02-16 16:41:44 +00:00
|
|
|
'lastLogin' => $user->getLastLogin() * 1000,
|
2014-12-15 11:43:42 +00:00
|
|
|
'backend' => $user->getBackendClassName(),
|
2015-01-23 16:45:45 +00:00
|
|
|
'email' => $this->config->getUserValue($user->getUID(), 'settings', 'email', ''),
|
|
|
|
'isRestoreDisabled' => !$restorePossible,
|
|
|
|
];
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
}
|
|
|
|
|
2014-12-09 17:36:40 +00:00
|
|
|
/**
|
2014-12-12 15:50:14 +00:00
|
|
|
* @param array $userIDs Array with schema [$uid => $displayName]
|
2014-12-09 17:36:40 +00:00
|
|
|
* @return IUser[]
|
|
|
|
*/
|
|
|
|
private function getUsersForUID(array $userIDs) {
|
|
|
|
$users = [];
|
2014-12-12 15:42:25 +00:00
|
|
|
foreach ($userIDs as $uid => $displayName) {
|
2015-01-30 11:00:57 +00:00
|
|
|
$users[$uid] = $this->userManager->get($uid);
|
2014-12-09 17:36:40 +00:00
|
|
|
}
|
|
|
|
return $users;
|
|
|
|
}
|
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
*
|
2014-12-04 13:15:55 +00:00
|
|
|
* @param int $offset
|
|
|
|
* @param int $limit
|
2014-12-09 17:36:40 +00:00
|
|
|
* @param string $gid GID to filter for
|
|
|
|
* @param string $pattern Pattern to search for in the username
|
|
|
|
* @param string $backend Backend to filter for (class-name)
|
2014-12-04 13:15:55 +00:00
|
|
|
* @return DataResponse
|
|
|
|
*
|
|
|
|
* TODO: Tidy up and write unit tests - code is mainly static method calls
|
|
|
|
*/
|
2014-12-09 17:36:40 +00:00
|
|
|
public function index($offset = 0, $limit = 10, $gid = '', $pattern = '', $backend = '') {
|
2014-12-04 13:15:55 +00:00
|
|
|
// FIXME: The JS sends the group '_everyone' instead of no GID for the "all users" group.
|
|
|
|
if($gid === '_everyone') {
|
|
|
|
$gid = '';
|
|
|
|
}
|
2014-12-09 17:36:40 +00:00
|
|
|
|
|
|
|
// Remove backends
|
|
|
|
if(!empty($backend)) {
|
|
|
|
$activeBackends = $this->userManager->getBackends();
|
|
|
|
$this->userManager->clearBackends();
|
|
|
|
foreach($activeBackends as $singleActiveBackend) {
|
|
|
|
if($backend === get_class($singleActiveBackend)) {
|
|
|
|
$this->userManager->registerBackend($singleActiveBackend);
|
2014-12-11 11:29:53 +00:00
|
|
|
break;
|
2014-12-09 17:36:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-30 11:00:57 +00:00
|
|
|
$users = [];
|
2014-12-04 13:15:55 +00:00
|
|
|
if ($this->isAdmin) {
|
2014-12-09 17:36:40 +00:00
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
if($gid !== '') {
|
2014-12-09 17:36:40 +00:00
|
|
|
$batch = $this->getUsersForUID($this->groupManager->displayNamesInGroup($gid, $pattern, $limit, $offset));
|
2014-12-04 13:15:55 +00:00
|
|
|
} else {
|
2015-01-18 17:31:03 +00:00
|
|
|
$batch = $this->userManager->search($pattern, $limit, $offset);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
|
2014-12-09 17:36:40 +00:00
|
|
|
foreach ($batch as $user) {
|
|
|
|
$users[] = $this->formatUserForIndex($user);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
2014-12-09 17:36:40 +00:00
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
} else {
|
2015-01-30 16:24:42 +00:00
|
|
|
$subAdminOfGroups = $this->subAdminFactory->getSubAdminsOfGroups(
|
|
|
|
$this->userSession->getUser()->getUID()
|
|
|
|
);
|
2014-12-12 15:45:11 +00:00
|
|
|
// Set the $gid parameter to an empty value if the subadmin has no rights to access a specific group
|
2015-01-30 16:24:42 +00:00
|
|
|
if($gid !== '' && !in_array($gid, $subAdminOfGroups)) {
|
2014-12-09 17:36:40 +00:00
|
|
|
$gid = '';
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
|
2015-01-30 11:00:57 +00:00
|
|
|
// Batch all groups the user is subadmin of when a group is specified
|
|
|
|
$batch = [];
|
|
|
|
if($gid === '') {
|
2015-01-30 16:24:42 +00:00
|
|
|
foreach($subAdminOfGroups as $group) {
|
2015-01-30 11:00:57 +00:00
|
|
|
$groupUsers = $this->groupManager->displayNamesInGroup($group, $pattern, $limit, $offset);
|
|
|
|
foreach($groupUsers as $uid => $displayName) {
|
|
|
|
$batch[$uid] = $displayName;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$batch = $this->groupManager->displayNamesInGroup($gid, $pattern, $limit, $offset);
|
|
|
|
}
|
|
|
|
$batch = $this->getUsersForUID($batch);
|
|
|
|
|
2014-12-09 17:36:40 +00:00
|
|
|
foreach ($batch as $user) {
|
2014-12-04 13:15:55 +00:00
|
|
|
// Only add the groups, this user is a subadmin of
|
2015-01-30 13:16:16 +00:00
|
|
|
$userGroups = array_values(array_intersect(
|
|
|
|
$this->groupManager->getUserGroupIds($user),
|
2015-01-30 16:24:42 +00:00
|
|
|
$subAdminOfGroups
|
2015-01-30 13:16:16 +00:00
|
|
|
));
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
$users[] = $this->formatUserForIndex($user, $userGroups);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-08 21:38:54 +00:00
|
|
|
return new DataResponse($users);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
|
|
|
*
|
|
|
|
* @param string $username
|
|
|
|
* @param string $password
|
|
|
|
* @param array $groups
|
2014-12-16 08:08:38 +00:00
|
|
|
* @param string $email
|
2014-12-04 13:15:55 +00:00
|
|
|
* @return DataResponse
|
|
|
|
*/
|
2014-12-16 08:08:38 +00:00
|
|
|
public function create($username, $password, array $groups=array(), $email='') {
|
2015-02-19 17:55:27 +00:00
|
|
|
if($email !== '' && !$this->mailer->validateMailAddress($email)) {
|
2014-12-16 08:08:38 +00:00
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'message' => (string)$this->l10n->t('Invalid mail address')
|
|
|
|
),
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
if (!$this->isAdmin) {
|
2015-01-30 17:31:04 +00:00
|
|
|
$userId = $this->userSession->getUser()->getUID();
|
2014-12-04 13:15:55 +00:00
|
|
|
if (!empty($groups)) {
|
|
|
|
foreach ($groups as $key => $group) {
|
2015-01-30 17:31:04 +00:00
|
|
|
if (!$this->subAdminFactory->isGroupAccessible($userId, $group)) {
|
2014-12-04 13:15:55 +00:00
|
|
|
unset($groups[$key]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (empty($groups)) {
|
2015-01-30 17:31:04 +00:00
|
|
|
$groups = $this->subAdminFactory->getSubAdminsOfGroups($userId);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-20 03:24:50 +00:00
|
|
|
if ($this->userManager->userExists($username)) {
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'message' => (string)$this->l10n->t('A user with that name already exists.')
|
|
|
|
),
|
|
|
|
Http::STATUS_CONFLICT
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
try {
|
|
|
|
$user = $this->userManager->createUser($username, $password);
|
|
|
|
} catch (\Exception $exception) {
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
2014-12-08 15:35:13 +00:00
|
|
|
'message' => (string)$this->l10n->t('Unable to create user.')
|
2014-12-08 14:32:59 +00:00
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if($user instanceof User) {
|
2014-12-16 08:08:38 +00:00
|
|
|
if($groups !== null) {
|
2015-01-30 16:24:42 +00:00
|
|
|
foreach($groups as $groupName) {
|
2014-12-16 08:08:38 +00:00
|
|
|
$group = $this->groupManager->get($groupName);
|
|
|
|
|
|
|
|
if(empty($group)) {
|
|
|
|
$group = $this->groupManager->createGroup($groupName);
|
|
|
|
}
|
|
|
|
$group->addUser($user);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* Send new user mail only if a mail is set
|
|
|
|
*/
|
|
|
|
if($email !== '') {
|
|
|
|
$this->config->setUserValue($username, 'settings', 'email', $email);
|
|
|
|
|
|
|
|
// data for the mail template
|
|
|
|
$mailData = array(
|
|
|
|
'username' => $username,
|
|
|
|
'url' => $this->urlGenerator->getAbsoluteURL('/')
|
|
|
|
);
|
|
|
|
|
|
|
|
$mail = new TemplateResponse('settings', 'email.new_user', $mailData, 'blank');
|
|
|
|
$mailContent = $mail->render();
|
|
|
|
|
|
|
|
$mail = new TemplateResponse('settings', 'email.new_user_plain_text', $mailData, 'blank');
|
|
|
|
$plainTextMailContent = $mail->render();
|
|
|
|
|
|
|
|
$subject = $this->l10n->t('Your %s account was created', [$this->defaults->getName()]);
|
2014-12-04 13:15:55 +00:00
|
|
|
|
2014-12-16 08:08:38 +00:00
|
|
|
try {
|
2015-02-12 12:53:27 +00:00
|
|
|
$message = $this->mailer->createMessage();
|
|
|
|
$message->setTo([$email => $username]);
|
|
|
|
$message->setSubject($subject);
|
|
|
|
$message->setHtmlBody($mailContent);
|
|
|
|
$message->setPlainBody($plainTextMailContent);
|
|
|
|
$message->setFrom([$this->fromMailAddress => $this->defaults->getName()]);
|
|
|
|
$this->mailer->send($message);
|
2014-12-16 08:08:38 +00:00
|
|
|
} catch(\Exception $e) {
|
|
|
|
$this->log->error("Can't send new user mail to $email: " . $e->getMessage(), array('app' => 'settings'));
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
}
|
2014-12-15 11:43:42 +00:00
|
|
|
// fetch users groups
|
|
|
|
$userGroups = $this->groupManager->getUserGroupIds($user);
|
|
|
|
|
|
|
|
return new DataResponse(
|
|
|
|
$this->formatUserForIndex($user, $userGroups),
|
|
|
|
Http::STATUS_CREATED
|
|
|
|
);
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
2014-12-15 11:43:42 +00:00
|
|
|
'message' => (string)$this->l10n->t('Unable to create user.')
|
2014-12-08 14:32:59 +00:00
|
|
|
),
|
2014-12-15 11:43:42 +00:00
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @NoAdminRequired
|
|
|
|
*
|
|
|
|
* @param string $id
|
|
|
|
* @return DataResponse
|
|
|
|
*/
|
|
|
|
public function destroy($id) {
|
2015-01-30 17:31:04 +00:00
|
|
|
$userId = $this->userSession->getUser()->getUID();
|
|
|
|
if($userId === $id) {
|
2014-12-04 13:15:55 +00:00
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Unable to delete user.')
|
|
|
|
)
|
2014-12-08 14:32:59 +00:00
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-01-30 17:31:04 +00:00
|
|
|
if(!$this->isAdmin && !$this->subAdminFactory->isUserAccessible($userId, $id)) {
|
2014-12-04 13:15:55 +00:00
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
2014-12-08 14:32:59 +00:00
|
|
|
'message' => (string)$this->l10n->t('Authentication error')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
$user = $this->userManager->get($id);
|
|
|
|
if($user) {
|
|
|
|
if($user->delete()) {
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'success',
|
|
|
|
'data' => array(
|
|
|
|
'username' => $id
|
|
|
|
)
|
2014-12-08 14:32:59 +00:00
|
|
|
),
|
|
|
|
Http::STATUS_NO_CONTENT
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Unable to delete user.')
|
|
|
|
)
|
2014-12-08 14:32:59 +00:00
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 13:15:55 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2014-12-15 11:43:42 +00:00
|
|
|
/**
|
|
|
|
* Set the mail address of a user
|
|
|
|
*
|
|
|
|
* @NoAdminRequired
|
|
|
|
* @NoSubadminRequired
|
|
|
|
*
|
|
|
|
* @param string $id
|
|
|
|
* @param string $mailAddress
|
|
|
|
* @return DataResponse
|
|
|
|
*/
|
|
|
|
public function setMailAddress($id, $mailAddress) {
|
2015-01-30 17:31:04 +00:00
|
|
|
$userId = $this->userSession->getUser()->getUID();
|
|
|
|
if($userId !== $id
|
2014-12-15 11:43:42 +00:00
|
|
|
&& !$this->isAdmin
|
2015-01-30 17:31:04 +00:00
|
|
|
&& !$this->subAdminFactory->isUserAccessible($userId, $id)) {
|
2014-12-15 11:43:42 +00:00
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Forbidden')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-02-19 17:55:27 +00:00
|
|
|
if($mailAddress !== '' && !$this->mailer->validateMailAddress($mailAddress)) {
|
2014-12-15 11:43:42 +00:00
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Invalid mail address')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
$user = $this->userManager->get($id);
|
|
|
|
if(!$user){
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Invalid user')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
// this is the only permission a backend provides and is also used
|
|
|
|
// for the permission of setting a email address
|
|
|
|
if(!$user->canChangeDisplayName()){
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => (string)$this->l10n->t('Unable to change mail address')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->config->setUserValue($id, 'settings', 'email', $mailAddress);
|
|
|
|
|
|
|
|
return new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'success',
|
|
|
|
'data' => array(
|
|
|
|
'username' => $id,
|
|
|
|
'mailAddress' => $mailAddress,
|
|
|
|
'message' => (string)$this->l10n->t('Email saved')
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_OK
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2014-12-04 13:15:55 +00:00
|
|
|
}
|