2010-03-10 12:03:40 +00:00
< ? php
/**
2016-07-21 15:07:57 +00:00
* @ copyright Copyright ( c ) 2016 , ownCloud , Inc .
*
2015-03-26 10:44:34 +00:00
* @ author Adam Williamson < awilliam @ redhat . com >
* @ author Andreas Fischer < bantu @ owncloud . com >
2016-05-26 17:56:05 +00:00
* @ author Arthur Schiwon < blizzz @ arthur - schiwon . de >
2015-03-26 10:44:34 +00:00
* @ author Bart Visscher < bartv @ thisnet . nl >
* @ author Bernhard Posselt < dev @ bernhard - posselt . com >
2017-11-06 14:56:42 +00:00
* @ author Bjoern Schiessle < bjoern @ schiessle . org >
2016-05-26 17:56:05 +00:00
* @ author Björn Schießle < bjoern @ schiessle . org >
* @ author Christoph Wurst < christoph @ owncloud . com >
2017-11-06 14:56:42 +00:00
* @ author Damjan Georgievski < gdamjan @ gmail . com >
2015-03-26 10:44:34 +00:00
* @ author davidgumberg < davidnoizgumberg @ gmail . com >
* @ author Florin Peter < github @ florin - peter . de >
2015-10-05 18:54:56 +00:00
* @ author Individual IT Services < info @ individual - it . net >
2015-03-26 10:44:34 +00:00
* @ author Jakob Sack < mail @ jakobsack . de >
2017-11-06 14:56:42 +00:00
* @ author Jan - Christoph Borchardt < hey @ jancborchardt . net >
2016-07-21 15:07:57 +00:00
* @ author Joachim Sokolowski < github @ sokolowski . org >
* @ author Joas Schilling < coding @ schilljs . com >
2017-11-06 14:56:42 +00:00
* @ author John Molakvoæ ( skjnldsv ) < skjnldsv @ protonmail . com >
* @ author Juan Pablo Villafáñez < jvillafanez @ solidgear . es >
2015-03-26 10:44:34 +00:00
* @ author Jörn Friedrich Dreyer < jfd @ butonic . de >
2017-11-06 14:56:42 +00:00
* @ author Ko - < k . stoffelen @ cs . ru . nl >
2016-05-26 17:56:05 +00:00
* @ author Lukas Reschke < lukas @ statuscode . ch >
2015-03-26 10:44:34 +00:00
* @ author Michael Gapczynski < GapczynskiM @ gmail . com >
* @ author Morris Jobke < hey @ morrisjobke . de >
* @ author Owen Winkler < a_github @ midnightcircus . com >
2015-10-05 18:54:56 +00:00
* @ author Phil Davis < phil . davis @ inf . org >
2015-03-26 10:44:34 +00:00
* @ author Ramiro Aparicio < rapariciog @ gmail . com >
2016-07-21 16:13:36 +00:00
* @ author Robin Appelman < robin @ icewind . nl >
2016-01-12 14:02:16 +00:00
* @ author Robin McCorkell < robin @ mccorkell . me . uk >
2016-07-21 15:07:57 +00:00
* @ author Roeland Jago Douma < roeland @ famdouma . nl >
2017-11-06 14:56:42 +00:00
* @ author Sebastian Wessalowski < sebastian @ wessalowski . org >
2016-05-26 17:56:05 +00:00
* @ author Stefan Weil < sw @ weilnetz . de >
2015-03-26 10:44:34 +00:00
* @ author Thomas Müller < thomas . mueller @ tmit . eu >
* @ author Thomas Tanghus < thomas @ tanghus . net >
* @ author Vincent Petry < pvince81 @ owncloud . com >
* @ author Volkan Gezer < volkangezer @ gmail . com >
2011-04-15 17:24:23 +00:00
*
2015-03-26 10:44:34 +00:00
* @ license AGPL - 3.0
2011-04-15 17:24:23 +00:00
*
2015-03-26 10:44:34 +00:00
* This code is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License , version 3 ,
* as published by the Free Software Foundation .
2011-04-15 17:24:23 +00:00
*
2015-03-26 10:44:34 +00:00
* This program is distributed in the hope that it will be useful ,
2011-04-15 17:24:23 +00:00
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
2015-03-26 10:44:34 +00:00
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
2014-04-27 14:41:09 +00:00
*
2015-03-26 10:44:34 +00:00
* You should have received a copy of the GNU Affero General Public License , version 3 ,
* along with this program . If not , see < http :// www . gnu . org / licenses />
2011-04-15 17:24:23 +00:00
*
*/
2015-02-26 10:37:37 +00:00
2018-04-25 13:22:28 +00:00
use OCP\ILogger ;
2018-01-25 22:16:13 +00:00
use OCP\Share ;
use OC\Encryption\HookManager ;
use OC\Files\Filesystem ;
use OC\Share20\Hooks ;
2016-05-19 06:00:09 +00:00
require_once 'public/Constants.php' ;
2012-11-11 14:52:23 +00:00
2011-08-02 16:31:42 +00:00
/**
* Class that is a namespace for all global OC variables
2011-08-06 09:36:56 +00:00
* No , we can not put this class in its own file because it is used by
* OC_autoload !
2011-08-02 16:31:42 +00:00
*/
2013-01-30 21:55:33 +00:00
class OC {
2013-01-14 19:30:28 +00:00
/**
2013-01-18 18:52:29 +00:00
* Associative array for autoloading . classname => filename
2013-01-14 19:30:28 +00:00
*/
public static $CLASSPATH = array ();
/**
2016-06-22 06:41:10 +00:00
* The installation path for Nextcloud on the server ( e . g . / srv / http / nextcloud )
2013-01-14 19:30:28 +00:00
*/
public static $SERVERROOT = '' ;
/**
2016-06-22 06:41:10 +00:00
* the current request path relative to the Nextcloud root ( e . g . files / index . php )
2013-01-14 19:30:28 +00:00
*/
private static $SUBURI = '' ;
/**
2016-06-22 06:41:10 +00:00
* the Nextcloud root path for http requests ( e . g . nextcloud / )
2013-01-14 19:30:28 +00:00
*/
public static $WEBROOT = '' ;
/**
2016-06-22 06:41:10 +00:00
* The installation path array of the apps folder on the server ( e . g . / srv / http / nextcloud ) 'path' and
2013-01-14 19:30:28 +00:00
* web path in 'url'
*/
public static $APPSROOTS = array ();
2014-01-17 13:40:48 +00:00
2016-04-14 15:59:49 +00:00
/**
* @ var string
*/
2014-01-17 13:40:48 +00:00
public static $configDir ;
2014-05-10 12:00:22 +00:00
/**
2013-01-14 19:30:28 +00:00
* requested app
*/
public static $REQUESTEDAPP = '' ;
2014-05-10 12:00:22 +00:00
2013-01-14 19:30:28 +00:00
/**
2016-06-22 06:41:10 +00:00
* check if Nextcloud runs in cli mode
2013-01-14 19:30:28 +00:00
*/
public static $CLI = false ;
2013-10-06 22:32:08 +00:00
2013-01-14 19:30:28 +00:00
/**
2013-05-07 20:16:02 +00:00
* @ var \OC\Autoloader $loader
2013-01-14 19:30:28 +00:00
*/
2013-05-07 20:16:02 +00:00
public static $loader = null ;
2013-01-14 19:30:28 +00:00
2016-05-02 12:10:53 +00:00
/** @var \Composer\Autoload\ClassLoader $composerAutoloader */
public static $composerAutoloader = null ;
2013-08-20 22:58:15 +00:00
/**
* @ var \OC\Server
*/
public static $server = null ;
2015-12-18 09:33:30 +00:00
/**
* @ var \OC\Config
*/
2015-12-18 10:42:09 +00:00
private static $config = null ;
2015-12-18 09:33:30 +00:00
2015-03-18 10:48:51 +00:00
/**
* @ throws \RuntimeException when the 3 rdparty directory is missing or
* the app path list is empty or contains an invalid path
*/
2013-01-30 21:55:33 +00:00
public static function initPaths () {
2014-03-13 12:33:09 +00:00
if ( defined ( 'PHPUNIT_CONFIG_DIR' )) {
self :: $configDir = OC :: $SERVERROOT . '/' . PHPUNIT_CONFIG_DIR . '/' ;
} elseif ( defined ( 'PHPUNIT_RUN' ) and PHPUNIT_RUN and is_dir ( OC :: $SERVERROOT . '/tests/config/' )) {
2014-01-20 12:41:52 +00:00
self :: $configDir = OC :: $SERVERROOT . '/tests/config/' ;
2016-07-29 15:47:39 +00:00
} elseif ( $dir = getenv ( 'NEXTCLOUD_CONFIG_DIR' )) {
self :: $configDir = rtrim ( $dir , '/' ) . '/' ;
2014-01-17 13:40:48 +00:00
} else {
self :: $configDir = OC :: $SERVERROOT . '/config/' ;
}
2015-12-18 09:33:30 +00:00
self :: $config = new \OC\Config ( self :: $configDir );
2014-01-17 13:40:48 +00:00
2013-01-14 19:30:28 +00:00
OC :: $SUBURI = str_replace ( " \\ " , " / " , substr ( realpath ( $_SERVER [ " SCRIPT_FILENAME " ]), strlen ( OC :: $SERVERROOT )));
2015-10-21 15:33:49 +00:00
/**
2017-05-15 12:33:27 +00:00
* FIXME : The following lines are required because we can ' t yet instantiate
2015-10-21 15:33:49 +00:00
* \OC :: $server -> getRequest () since \OC :: $server does not yet exist .
*/
$params = [
'server' => [
'SCRIPT_NAME' => $_SERVER [ 'SCRIPT_NAME' ],
'SCRIPT_FILENAME' => $_SERVER [ 'SCRIPT_FILENAME' ],
],
];
2015-12-18 10:24:15 +00:00
$fakeRequest = new \OC\AppFramework\Http\Request ( $params , null , new \OC\AllConfig ( new \OC\SystemConfig ( self :: $config )));
2015-10-21 15:33:49 +00:00
$scriptName = $fakeRequest -> getScriptName ();
2013-01-14 19:30:28 +00:00
if ( substr ( $scriptName , - 1 ) == '/' ) {
$scriptName .= 'index.php' ;
//make sure suburi follows the same rules as scriptName
if ( substr ( OC :: $SUBURI , - 9 ) != 'index.php' ) {
if ( substr ( OC :: $SUBURI , - 1 ) != '/' ) {
OC :: $SUBURI = OC :: $SUBURI . '/' ;
}
OC :: $SUBURI = OC :: $SUBURI . 'index.php' ;
}
}
2015-10-21 15:33:49 +00:00
2015-02-23 20:49:35 +00:00
if ( OC :: $CLI ) {
2015-12-18 10:42:09 +00:00
OC :: $WEBROOT = self :: $config -> getValue ( 'overwritewebroot' , '' );
2015-02-23 20:49:35 +00:00
} else {
if ( substr ( $scriptName , 0 - strlen ( OC :: $SUBURI )) === OC :: $SUBURI ) {
OC :: $WEBROOT = substr ( $scriptName , 0 , 0 - strlen ( OC :: $SUBURI ));
2013-01-14 19:30:28 +00:00
2015-02-23 20:49:35 +00:00
if ( OC :: $WEBROOT != '' && OC :: $WEBROOT [ 0 ] !== '/' ) {
OC :: $WEBROOT = '/' . OC :: $WEBROOT ;
}
} else {
// The scriptName is not ending with OC::$SUBURI
// This most likely means that we are calling from CLI.
// However some cron jobs still need to generate
// a web URL, so we use overwritewebroot as a fallback.
2015-12-18 10:42:09 +00:00
OC :: $WEBROOT = self :: $config -> getValue ( 'overwritewebroot' , '' );
2014-07-07 13:01:02 +00:00
}
2013-01-14 19:30:28 +00:00
2016-06-22 06:41:10 +00:00
// Resolve /nextcloud to /nextcloud/ to ensure to always have a trailing
2015-12-02 10:49:33 +00:00
// slash which is required by URL generation.
2017-05-15 12:33:27 +00:00
if ( isset ( $_SERVER [ 'REQUEST_URI' ]) && $_SERVER [ 'REQUEST_URI' ] === \OC :: $WEBROOT &&
2015-12-02 10:49:33 +00:00
substr ( $_SERVER [ 'REQUEST_URI' ], - 1 ) !== '/' ) {
header ( 'Location: ' . \OC :: $WEBROOT . '/' );
exit ();
}
2015-12-02 10:26:41 +00:00
}
2013-01-14 19:30:28 +00:00
// search the apps folder
2015-12-18 10:42:09 +00:00
$config_paths = self :: $config -> getValue ( 'apps_paths' , array ());
2013-01-14 19:30:28 +00:00
if ( ! empty ( $config_paths )) {
foreach ( $config_paths as $paths ) {
if ( isset ( $paths [ 'url' ]) && isset ( $paths [ 'path' ])) {
$paths [ 'url' ] = rtrim ( $paths [ 'url' ], '/' );
$paths [ 'path' ] = rtrim ( $paths [ 'path' ], '/' );
OC :: $APPSROOTS [] = $paths ;
}
}
} elseif ( file_exists ( OC :: $SERVERROOT . '/apps' )) {
OC :: $APPSROOTS [] = array ( 'path' => OC :: $SERVERROOT . '/apps' , 'url' => '/apps' , 'writable' => true );
} elseif ( file_exists ( OC :: $SERVERROOT . '/../apps' )) {
2013-02-11 16:44:02 +00:00
OC :: $APPSROOTS [] = array (
'path' => rtrim ( dirname ( OC :: $SERVERROOT ), '/' ) . '/apps' ,
'url' => '/apps' ,
'writable' => true
);
2013-01-14 19:30:28 +00:00
}
if ( empty ( OC :: $APPSROOTS )) {
2016-06-22 06:41:10 +00:00
throw new \RuntimeException ( 'apps directory not found! Please put the Nextcloud apps folder in the Nextcloud folder'
2013-12-13 12:30:29 +00:00
. ' or the folder above. You can also configure the location in the config.php file.' );
2013-01-14 19:30:28 +00:00
}
$paths = array ();
2013-01-30 21:55:33 +00:00
foreach ( OC :: $APPSROOTS as $path ) {
2013-01-14 19:30:28 +00:00
$paths [] = $path [ 'path' ];
2015-03-18 10:48:51 +00:00
if ( ! is_dir ( $path [ 'path' ])) {
2016-06-22 06:41:10 +00:00
throw new \RuntimeException ( sprintf ( 'App directory "%s" not found! Please put the Nextcloud apps folder in the'
. ' Nextcloud folder or the folder above. You can also configure the location in the'
2015-03-18 10:48:51 +00:00
. ' config.php file.' , $path [ 'path' ]));
}
2013-01-30 21:55:33 +00:00
}
2013-01-14 19:30:28 +00:00
// set the right include path
set_include_path (
2016-10-24 21:37:05 +00:00
implode ( PATH_SEPARATOR , $paths )
2013-01-14 19:30:28 +00:00
);
}
2012-12-20 10:10:45 +00:00
2013-01-03 19:11:00 +00:00
public static function checkConfig () {
2014-08-31 08:05:59 +00:00
$l = \OC :: $server -> getL10N ( 'lib' );
2014-12-05 16:32:19 +00:00
2015-09-21 17:19:25 +00:00
// Create config if it does not already exist
2014-12-05 16:32:19 +00:00
$configFilePath = self :: $configDir . '/config.php' ;
if ( ! file_exists ( $configFilePath )) {
@ touch ( $configFilePath );
}
// Check if config is writable
$configFileWritable = is_writable ( $configFilePath );
2014-11-25 15:12:12 +00:00
if ( ! $configFileWritable && ! OC_Helper :: isReadOnlyConfigEnabled ()
2017-11-30 15:00:19 +00:00
|| ! $configFileWritable && \OCP\Util :: needUpgrade ()) {
2015-11-26 09:48:08 +00:00
$urlGenerator = \OC :: $server -> getURLGenerator ();
2013-11-25 12:04:23 +00:00
if ( self :: $CLI ) {
2014-05-28 23:21:54 +00:00
echo $l -> t ( 'Cannot write into "config" directory!' ) . " \n " ;
echo $l -> t ( 'This can usually be fixed by giving the webserver write access to the config directory' ) . " \n " ;
2015-11-26 09:48:08 +00:00
echo $l -> t ( 'See %s' , [ $urlGenerator -> linkToDocs ( 'admin-dir_permissions' ) ]) . " \n " ;
2017-10-27 22:54:25 +00:00
echo " \n " ;
echo $l -> t ( 'Or, if you prefer to keep config.php file read only, set the option "config_is_read_only" to true in it.' ) . " \n " ;
echo $l -> t ( 'See %s' , [ $urlGenerator -> linkToDocs ( 'admin-config' ) ]) . " \n " ;
2013-11-25 12:04:23 +00:00
exit ;
} else {
OC_Template :: printErrorPage (
2014-05-28 23:21:54 +00:00
$l -> t ( 'Cannot write into "config" directory!' ),
2017-05-09 02:16:08 +00:00
$l -> t ( 'This can usually be fixed by giving the webserver write access to the config directory. See %s' ,
2017-10-27 22:54:25 +00:00
[ $urlGenerator -> linkToDocs ( 'admin-dir_permissions' ) ]) . '. '
. $l -> t ( 'Or, if you prefer to keep config.php file read only, set the option "config_is_read_only" to true in it. See %s' ,
2018-06-26 07:17:37 +00:00
[ $urlGenerator -> linkToDocs ( 'admin-config' ) ] ),
2018-07-05 15:09:38 +00:00
503
2013-11-25 12:04:23 +00:00
);
}
2013-01-03 19:11:00 +00:00
}
}
2013-01-30 21:55:33 +00:00
public static function checkInstalled () {
2015-02-21 19:52:32 +00:00
if ( defined ( 'OC_CONSOLE' )) {
return ;
}
2013-01-14 19:30:28 +00:00
// Redirect to installer if not installed
2016-09-06 11:59:45 +00:00
if ( ! \OC :: $server -> getSystemConfig () -> getValue ( 'installed' , false ) && OC :: $SUBURI !== '/index.php' && OC :: $SUBURI !== '/status.php' ) {
2014-07-25 17:39:29 +00:00
if ( OC :: $CLI ) {
throw new Exception ( 'Not installed' );
2014-07-24 11:45:06 +00:00
} else {
2016-08-25 12:27:58 +00:00
$url = OC :: $WEBROOT . '/index.php' ;
2014-07-25 17:39:29 +00:00
header ( 'Location: ' . $url );
2013-01-14 19:30:28 +00:00
}
exit ();
}
}
2016-07-07 10:14:45 +00:00
public static function checkMaintenanceMode () {
2013-01-04 02:32:33 +00:00
// Allow ajax update script to execute without being stopped
2019-02-06 16:08:41 +00:00
if ((( bool ) \OC :: $server -> getSystemConfig () -> getValue ( 'maintenance' , false )) && OC :: $SUBURI != '/core/ajax/update.php' ) {
2013-01-14 20:39:55 +00:00
// send http status 503
2018-06-26 08:32:50 +00:00
http_response_code ( 503 );
2013-01-14 20:39:55 +00:00
header ( 'Retry-After: 120' );
// render error page
2015-04-09 21:47:24 +00:00
$template = new OC_Template ( '' , 'update.user' , 'guest' );
2019-05-16 14:40:02 +00:00
OC_Util :: addScript ( 'dist/maintenance' );
2017-06-13 21:43:25 +00:00
OC_Util :: addStyle ( 'core' , 'guest' );
2015-04-09 21:47:24 +00:00
$template -> printPage ();
2013-10-24 15:46:52 +00:00
die ();
2013-01-03 19:11:00 +00:00
}
}
2015-07-07 10:12:54 +00:00
/**
* Prints the upgrade page
2017-11-30 15:01:42 +00:00
*
* @ param \OC\SystemConfig $systemConfig
2015-07-07 10:12:54 +00:00
*/
2017-11-30 15:01:42 +00:00
private static function printUpgradePage ( \OC\SystemConfig $systemConfig ) {
2016-04-11 14:58:08 +00:00
$disableWebUpdater = $systemConfig -> getValue ( 'upgrade.disable-web' , false );
$tooBig = false ;
if ( ! $disableWebUpdater ) {
2016-04-22 13:52:18 +00:00
$apps = \OC :: $server -> getAppManager ();
2017-05-11 02:39:09 +00:00
if ( $apps -> isInstalled ( 'user_ldap' )) {
$qb = \OC :: $server -> getDatabaseConnection () -> getQueryBuilder ();
2018-10-19 14:44:28 +00:00
$result = $qb -> select ( $qb -> func () -> count ( '*' , 'user_count' ))
2017-05-11 02:39:09 +00:00
-> from ( 'ldap_user_mapping' )
-> execute ();
$row = $result -> fetch ();
$result -> closeCursor ();
$tooBig = ( $row [ 'user_count' ] > 50 );
}
if ( ! $tooBig && $apps -> isInstalled ( 'user_saml' )) {
$qb = \OC :: $server -> getDatabaseConnection () -> getQueryBuilder ();
2018-10-19 14:44:28 +00:00
$result = $qb -> select ( $qb -> func () -> count ( '*' , 'user_count' ))
2017-05-11 02:39:09 +00:00
-> from ( 'user_saml_users' )
-> execute ();
$row = $result -> fetch ();
$result -> closeCursor ();
$tooBig = ( $row [ 'user_count' ] > 50 );
}
2016-04-22 13:52:18 +00:00
if ( ! $tooBig ) {
// count users
$stats = \OC :: $server -> getUserManager () -> countUsers ();
$totalUsers = array_sum ( $stats );
$tooBig = ( $totalUsers > 50 );
}
2016-04-11 14:58:08 +00:00
}
2017-05-11 03:26:51 +00:00
$ignoreTooBigWarning = isset ( $_GET [ 'IKnowThatThisIsABigInstanceAndTheUpdateRequestCouldRunIntoATimeoutAndHowToRestoreABackup' ]) &&
$_GET [ 'IKnowThatThisIsABigInstanceAndTheUpdateRequestCouldRunIntoATimeoutAndHowToRestoreABackup' ] === 'IAmSuperSureToDoThis' ;
if ( $disableWebUpdater || ( $tooBig && ! $ignoreTooBigWarning )) {
2016-04-11 14:58:08 +00:00
// send http status 503
2018-06-26 08:32:50 +00:00
http_response_code ( 503 );
2016-04-11 14:58:08 +00:00
header ( 'Retry-After: 120' );
// render error page
$template = new OC_Template ( '' , 'update.use-cli' , 'guest' );
2016-08-04 10:48:25 +00:00
$template -> assign ( 'productName' , 'nextcloud' ); // for now
2016-04-11 14:58:08 +00:00
$template -> assign ( 'version' , OC_Util :: getVersionString ());
$template -> assign ( 'tooBig' , $tooBig );
$template -> printPage ();
die ();
}
// check whether this is a core update or apps update
$installedVersion = $systemConfig -> getValue ( 'version' , '0.0.0' );
$currentVersion = implode ( '.' , \OCP\Util :: getVersion ());
// if not a core upgrade, then it's apps upgrade
2018-01-26 22:46:40 +00:00
$isAppsOnlyUpgrade = version_compare ( $currentVersion , $installedVersion , '=' );
2016-04-11 14:58:08 +00:00
2015-07-07 10:12:54 +00:00
$oldTheme = $systemConfig -> getValue ( 'theme' );
$systemConfig -> setValue ( 'theme' , '' );
2017-01-10 16:44:39 +00:00
OC_Util :: addScript ( 'config' ); // needed for web root
OC_Util :: addScript ( 'update' );
2015-07-07 10:12:54 +00:00
2016-11-16 11:27:22 +00:00
/** @var \OC\App\AppManager $appManager */
2015-07-07 10:12:54 +00:00
$appManager = \OC :: $server -> getAppManager ();
$tmpl = new OC_Template ( '' , 'update.admin' , 'guest' );
$tmpl -> assign ( 'version' , OC_Util :: getVersionString ());
2016-04-11 14:58:08 +00:00
$tmpl -> assign ( 'isAppsOnlyUpgrade' , $isAppsOnlyUpgrade );
2015-08-20 09:14:30 +00:00
// get third party apps
2015-12-18 14:26:54 +00:00
$ocVersion = \OCP\Util :: getVersion ();
2018-02-21 12:00:41 +00:00
$ocVersion = implode ( '.' , $ocVersion );
2016-11-02 08:40:10 +00:00
$incompatibleApps = $appManager -> getIncompatibleApps ( $ocVersion );
2016-11-16 11:27:22 +00:00
$incompatibleShippedApps = [];
2016-11-02 08:40:10 +00:00
foreach ( $incompatibleApps as $appInfo ) {
if ( $appManager -> isShipped ( $appInfo [ 'id' ])) {
2016-11-16 11:27:22 +00:00
$incompatibleShippedApps [] = $appInfo [ 'name' ] . ' (' . $appInfo [ 'id' ] . ')' ;
2016-11-02 08:40:10 +00:00
}
}
2016-11-16 11:27:22 +00:00
if ( ! empty ( $incompatibleShippedApps )) {
$l = \OC :: $server -> getL10N ( 'core' );
2019-03-25 15:04:39 +00:00
$hint = $l -> t ( 'The files of the app %1$s were not replaced correctly. Make sure it is a version compatible with the server.' , [ implode ( ', ' , $incompatibleShippedApps )]);
2016-11-16 11:27:22 +00:00
throw new \OC\HintException ( 'The files of the app ' . implode ( ', ' , $incompatibleShippedApps ) . ' were not replaced correctly. Make sure it is a version compatible with the server.' , $hint );
}
2015-08-20 09:14:30 +00:00
$tmpl -> assign ( 'appsToUpgrade' , $appManager -> getAppsNeedingUpgrade ( $ocVersion ));
2016-11-02 08:40:10 +00:00
$tmpl -> assign ( 'incompatibleAppsList' , $incompatibleApps );
2016-08-04 10:48:25 +00:00
$tmpl -> assign ( 'productName' , 'Nextcloud' ); // for now
2015-07-07 10:12:54 +00:00
$tmpl -> assign ( 'oldTheme' , $oldTheme );
$tmpl -> printPage ();
}
2013-01-30 21:55:33 +00:00
public static function initSession () {
2017-12-12 13:33:30 +00:00
if ( self :: $server -> getRequest () -> getServerProtocol () === 'https' ) {
ini_set ( 'session.cookie_secure' , true );
}
2013-01-14 19:30:28 +00:00
// prevents javascript from accessing php session cookies
2017-12-04 22:20:48 +00:00
ini_set ( 'session.cookie_httponly' , 'true' );
2013-01-14 19:30:28 +00:00
2016-06-22 06:41:10 +00:00
// set the cookie path to the Nextcloud directory
2013-07-02 15:45:34 +00:00
$cookie_path = OC :: $WEBROOT ? : '/' ;
2013-04-18 19:11:55 +00:00
ini_set ( 'session.cookie_path' , $cookie_path );
2013-04-05 22:16:52 +00:00
2014-05-12 15:08:28 +00:00
// Let the session name be changed in the initSession Hook
$sessionName = OC_Util :: getInstanceId ();
2013-07-02 15:45:34 +00:00
try {
2014-05-12 15:08:28 +00:00
// Allow session apps to create a custom session object
$useCustomSession = false ;
2014-07-16 17:40:22 +00:00
$session = self :: $server -> getSession ();
OC_Hook :: emit ( 'OC' , 'initSession' , array ( 'session' => & $session , 'sessionName' => & $sessionName , 'useCustomSession' => & $useCustomSession ));
2015-07-20 10:59:04 +00:00
if ( ! $useCustomSession ) {
2014-05-12 15:08:28 +00:00
// set the session name to the instance id - which is unique
2015-07-20 10:59:04 +00:00
$session = new \OC\Session\Internal ( $sessionName );
2014-05-12 15:08:28 +00:00
}
2015-07-20 10:59:04 +00:00
$cryptoWrapper = \OC :: $server -> getSessionCryptoWrapper ();
$session = $cryptoWrapper -> wrapSession ( $session );
self :: $server -> setSession ( $session );
2016-04-07 17:51:27 +00:00
// if session can't be started break with http 500 error
2013-07-02 15:45:34 +00:00
} catch ( Exception $e ) {
2018-03-12 17:10:59 +00:00
\OC :: $server -> getLogger () -> logException ( $e , [ 'app' => 'base' ]);
2013-11-04 20:55:55 +00:00
//show the user a detailed error page
2018-06-26 10:15:09 +00:00
OC_Template :: printExceptionErrorPage ( $e , 500 );
2016-01-09 22:56:28 +00:00
die ();
2013-02-25 17:37:05 +00:00
}
2013-01-14 19:30:28 +00:00
2013-06-26 07:19:19 +00:00
$sessionLifeTime = self :: getSessionLifeTime ();
2013-01-14 19:30:28 +00:00
// session timeout
2014-07-16 17:40:22 +00:00
if ( $session -> exists ( 'LAST_ACTIVITY' ) && ( time () - $session -> get ( 'LAST_ACTIVITY' ) > $sessionLifeTime )) {
2013-01-14 19:30:28 +00:00
if ( isset ( $_COOKIE [ session_name ()])) {
2018-09-06 18:34:16 +00:00
setcookie ( session_name (), '' , - 1 , self :: $WEBROOT ? : '/' );
2013-01-14 19:30:28 +00:00
}
2016-05-12 10:09:13 +00:00
\OC :: $server -> getUserSession () -> logout ();
2013-01-14 19:30:28 +00:00
}
2013-05-27 23:04:09 +00:00
2014-07-16 17:40:22 +00:00
$session -> set ( 'LAST_ACTIVITY' , time ());
2013-01-14 19:30:28 +00:00
}
2013-06-26 07:19:19 +00:00
/**
2014-02-06 15:30:58 +00:00
* @ return string
2013-06-26 07:19:19 +00:00
*/
private static function getSessionLifeTime () {
2014-11-19 12:06:22 +00:00
return \OC :: $server -> getConfig () -> getSystemValue ( 'session_lifetime' , 60 * 60 * 24 );
2013-06-26 07:19:19 +00:00
}
2015-05-03 11:23:29 +00:00
/**
2016-06-22 06:41:10 +00:00
* Try to set some values to the required Nextcloud default
2015-05-03 11:23:29 +00:00
*/
public static function setRequiredIniValues () {
@ ini_set ( 'default_charset' , 'UTF-8' );
2017-12-04 22:20:48 +00:00
@ ini_set ( 'gd.jpeg_ignore_warning' , '1' );
2015-05-03 11:23:29 +00:00
}
2013-01-17 20:42:33 +00:00
2016-07-20 15:37:30 +00:00
/**
* Send the same site cookies
*/
private static function sendSameSiteCookies () {
$cookieParams = session_get_cookie_params ();
$secureCookie = ( $cookieParams [ 'secure' ] === true ) ? 'secure; ' : '' ;
$policies = [
'lax' ,
'strict' ,
];
2016-11-23 11:53:44 +00:00
// Append __Host to the cookie if it meets the requirements
$cookiePrefix = '' ;
if ( $cookieParams [ 'secure' ] === true && $cookieParams [ 'path' ] === '/' ) {
$cookiePrefix = '__Host-' ;
}
2016-07-20 15:37:30 +00:00
foreach ( $policies as $policy ) {
header (
sprintf (
2016-11-23 11:53:44 +00:00
'Set-Cookie: %snc_sameSiteCookie%s=true; path=%s; httponly;' . $secureCookie . 'expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=%s' ,
$cookiePrefix ,
2016-07-20 15:37:30 +00:00
$policy ,
$cookieParams [ 'path' ],
$policy
),
false
);
}
}
/**
* Same Site cookie to further mitigate CSRF attacks . This cookie has to
* be set in every request if cookies are sent to add a second level of
* defense against CSRF .
*
* If the cookie is not sent this will set the cookie and reload the page .
* We use an additional cookie since we want to protect logout CSRF and
* also we can 't directly interfere with PHP' s session mechanism .
*/
private static function performSameSiteCookieProtection () {
2016-09-08 15:14:32 +00:00
$request = \OC :: $server -> getRequest ();
// Some user agents are notorious and don't really properly follow HTTP
// specifications. For those, have an automated opt-out. Since the protection
// for remote.php is applied in base.php as starting point we need to opt out
// here.
2018-01-31 13:17:56 +00:00
$incompatibleUserAgents = \OC :: $server -> getConfig () -> getSystemValue ( 'csrf.optout' );
// Fallback, if csrf.optout is unset
if ( ! is_array ( $incompatibleUserAgents )) {
$incompatibleUserAgents = [
// OS X Finder
'/^WebDAVFS/' ,
// Windows webdav drive
'/^Microsoft-WebDAV-MiniRedir/' ,
];
}
2016-09-08 15:14:32 +00:00
if ( $request -> isUserAgent ( $incompatibleUserAgents )) {
return ;
}
2016-07-20 15:37:30 +00:00
if ( count ( $_COOKIE ) > 0 ) {
$requestUri = $request -> getScriptName ();
$processingScript = explode ( '/' , $requestUri );
$processingScript = $processingScript [ count ( $processingScript ) - 1 ];
2017-09-27 06:28:09 +00:00
2017-09-22 10:21:44 +00:00
// index.php routes are handled in the middleware
2016-07-20 15:37:30 +00:00
if ( $processingScript === 'index.php' ) {
2017-09-22 10:21:44 +00:00
return ;
}
// All other endpoints require the lax and the strict cookie
if ( ! $request -> passesStrictCookieCheck ()) {
self :: sendSameSiteCookies ();
// Debug mode gets access to the resources without strict cookie
// due to the fact that the SabreDAV browser also lives there.
if ( ! \OC :: $server -> getConfig () -> getSystemValue ( 'debug' , false )) {
http_response_code ( \OCP\AppFramework\Http :: STATUS_SERVICE_UNAVAILABLE );
2016-07-20 15:37:30 +00:00
exit ();
}
}
} elseif ( ! isset ( $_COOKIE [ 'nc_sameSiteCookielax' ]) || ! isset ( $_COOKIE [ 'nc_sameSiteCookiestrict' ])) {
self :: sendSameSiteCookies ();
}
}
2013-01-30 21:55:33 +00:00
public static function init () {
2015-08-18 13:35:02 +00:00
// calculate the root directories
OC :: $SERVERROOT = str_replace ( " \\ " , '/' , substr ( __DIR__ , 0 , - 4 ));
2013-01-14 19:30:28 +00:00
// register autoloader
2014-10-15 11:53:19 +00:00
$loaderStart = microtime ( true );
2013-05-07 20:53:07 +00:00
require_once __DIR__ . '/autoloader.php' ;
2015-08-18 13:35:02 +00:00
self :: $loader = new \OC\Autoloader ([
2016-05-19 13:32:20 +00:00
OC :: $SERVERROOT . '/lib/private/legacy' ,
2015-08-18 13:35:02 +00:00
]);
2016-01-10 20:36:14 +00:00
if ( defined ( 'PHPUNIT_RUN' )) {
self :: $loader -> addValidRoot ( OC :: $SERVERROOT . '/tests' );
}
2013-05-07 20:16:02 +00:00
spl_autoload_register ( array ( self :: $loader , 'load' ));
2014-10-15 11:53:19 +00:00
$loaderEnd = microtime ( true );
2013-01-14 19:30:28 +00:00
2015-02-23 20:49:35 +00:00
self :: $CLI = ( php_sapi_name () == 'cli' );
2016-04-22 13:28:09 +00:00
// Add default composer PSR-4 autoloader
2016-05-02 12:10:53 +00:00
self :: $composerAutoloader = require_once OC :: $SERVERROOT . '/lib/composer/autoload.php' ;
2016-04-22 13:28:09 +00:00
2015-03-18 10:48:51 +00:00
try {
self :: initPaths ();
// setup 3rdparty autoloader
2016-04-14 15:59:49 +00:00
$vendorAutoLoad = OC :: $SERVERROOT . '/3rdparty/autoload.php' ;
2015-03-18 10:48:51 +00:00
if ( ! file_exists ( $vendorAutoLoad )) {
2015-09-03 12:55:26 +00:00
throw new \RuntimeException ( 'Composer autoloader not found, unable to continue. Check the folder "3rdparty". Running "git submodule update --init" will initialize the git submodule that handles the subfolder "3rdparty".' );
2015-03-18 10:48:51 +00:00
}
2014-11-17 12:10:15 +00:00
require_once $vendorAutoLoad ;
2015-03-18 10:48:51 +00:00
} catch ( \RuntimeException $e ) {
2016-03-09 14:40:34 +00:00
if ( ! self :: $CLI ) {
2018-06-26 08:32:50 +00:00
http_response_code ( 503 );
2016-03-09 14:40:34 +00:00
}
2015-01-31 15:04:24 +00:00
// we can't use the template error page here, because this needs the
// DI container which isn't available yet
2015-03-18 10:48:51 +00:00
print ( $e -> getMessage ());
2015-01-31 15:04:24 +00:00
exit ();
2014-07-29 01:48:17 +00:00
}
// setup the basic server
2015-12-18 10:24:15 +00:00
self :: $server = new \OC\Server ( \OC :: $WEBROOT , self :: $config );
2014-10-15 11:53:19 +00:00
\OC :: $server -> getEventLogger () -> log ( 'autoloader' , 'Autoloader' , $loaderStart , $loaderEnd );
2014-10-03 20:13:55 +00:00
\OC :: $server -> getEventLogger () -> start ( 'boot' , 'Initialize' );
2013-01-14 19:30:28 +00:00
2015-05-05 10:34:22 +00:00
// Don't display errors and log them
2013-01-14 19:30:28 +00:00
error_reporting ( E_ALL | E_STRICT );
2017-12-04 22:20:48 +00:00
@ ini_set ( 'display_errors' , '0' );
@ ini_set ( 'log_errors' , '1' );
2013-01-14 19:30:28 +00:00
2016-10-14 06:41:52 +00:00
if ( ! date_default_timezone_set ( 'UTC' )) {
2016-10-24 13:03:18 +00:00
throw new \RuntimeException ( 'Could not set timezone to UTC' );
2018-01-26 22:46:40 +00:00
}
2013-01-14 19:30:28 +00:00
//try to configure php to enable big file uploads.
//this doesn´ t work always depending on the webserver and php configuration.
2015-09-21 17:19:25 +00:00
//Let´ s try to overwrite some defaults anyway
2013-01-14 19:30:28 +00:00
//try to set the maximum execution time to 60min
2017-03-11 16:04:21 +00:00
if ( strpos ( @ ini_get ( 'disable_functions' ), 'set_time_limit' ) === false ) {
@ set_time_limit ( 3600 );
}
2017-12-04 22:20:48 +00:00
@ ini_set ( 'max_execution_time' , '3600' );
@ ini_set ( 'max_input_time' , '3600' );
2013-01-14 19:30:28 +00:00
//try to set the maximum filesize to 10G
@ ini_set ( 'upload_max_filesize' , '10G' );
@ ini_set ( 'post_max_size' , '10G' );
@ ini_set ( 'file_uploads' , '50' );
2015-05-03 11:23:29 +00:00
self :: setRequiredIniValues ();
2014-07-19 00:16:28 +00:00
self :: handleAuthHeaders ();
2014-07-29 09:18:40 +00:00
self :: registerAutoloaderCache ();
2014-07-29 09:14:36 +00:00
2014-09-09 12:41:45 +00:00
// initialize intl fallback is necessary
\Patchwork\Utf8\Bootup :: initIntl ();
2014-07-29 01:48:17 +00:00
OC_Util :: isSetLocaleWorking ();
2014-09-09 12:41:45 +00:00
2013-07-21 20:40:35 +00:00
if ( ! defined ( 'PHPUNIT_RUN' )) {
2016-04-18 20:30:01 +00:00
OC\Log\ErrorHandler :: setLogger ( \OC :: $server -> getLogger ());
$debug = \OC :: $server -> getConfig () -> getSystemValue ( 'debug' , false );
OC\Log\ErrorHandler :: register ( $debug );
2013-02-15 02:15:09 +00:00
}
2014-10-03 20:13:55 +00:00
\OC :: $server -> getEventLogger () -> start ( 'init_session' , 'Initialize session' );
2014-05-12 15:08:28 +00:00
OC_App :: loadApps ( array ( 'session' ));
2014-11-26 12:16:22 +00:00
if ( ! self :: $CLI ) {
2014-07-25 17:39:29 +00:00
self :: initSession ();
2013-04-19 13:18:27 +00:00
}
2014-10-03 20:13:55 +00:00
\OC :: $server -> getEventLogger () -> end ( 'init_session' );
2013-05-31 15:31:52 +00:00
self :: checkConfig ();
self :: checkInstalled ();
2015-01-19 10:56:04 +00:00
2014-05-12 13:14:01 +00:00
OC_Response :: addSecurityHeaders ();
2013-01-14 19:30:28 +00:00
2016-07-20 15:37:30 +00:00
self :: performSameSiteCookieProtection ();
2015-04-07 22:19:23 +00:00
if ( ! defined ( 'OC_CONSOLE' )) {
2017-03-17 22:37:48 +00:00
$errors = OC_Util :: checkServer ( \OC :: $server -> getSystemConfig ());
2015-04-07 22:19:23 +00:00
if ( count ( $errors ) > 0 ) {
2019-09-16 17:38:13 +00:00
if ( ! self :: $CLI ) {
http_response_code ( 503 );
OC_Util :: addStyle ( 'guest' );
2015-04-07 22:19:23 +00:00
try {
2019-09-16 17:38:13 +00:00
OC_Template :: printGuestPage ( '' , 'error' , array ( 'errors' => $errors ));
exit ;
2015-04-07 22:19:23 +00:00
} catch ( \Exception $e ) {
2019-09-16 17:38:13 +00:00
// In case any error happens when showing the error page, we simply fall back to posting the text.
// This might be the case when e.g. the data directory is broken and we can not load/write SCSS to/from it.
2015-04-07 22:19:23 +00:00
}
2015-02-27 19:04:52 +00:00
}
2019-09-16 17:38:13 +00:00
// Convert l10n string into regular string for usage in database
$staticErrors = [];
foreach ( $errors as $error ) {
echo $error [ 'error' ] . " \n " ;
echo $error [ 'hint' ] . " \n \n " ;
$staticErrors [] = [
'error' => ( string ) $error [ 'error' ],
'hint' => ( string ) $error [ 'hint' ],
];
}
try {
\OC :: $server -> getConfig () -> setAppValue ( 'core' , 'cronErrors' , json_encode ( $staticErrors ));
} catch ( \Exception $e ) {
echo ( 'Writing to database failed' );
}
exit ( 1 );
2015-04-07 22:19:23 +00:00
} elseif ( self :: $CLI && \OC :: $server -> getConfig () -> getSystemValue ( 'installed' , false )) {
2015-02-27 19:04:52 +00:00
\OC :: $server -> getConfig () -> deleteAppValue ( 'core' , 'cronErrors' );
2015-04-07 22:19:23 +00:00
}
2013-01-14 19:30:28 +00:00
}
2013-06-26 07:19:19 +00:00
//try to set the session lifetime
$sessionLifeTime = self :: getSessionLifeTime ();
@ ini_set ( 'gc_maxlifetime' , ( string ) $sessionLifeTime );
2014-11-28 17:52:09 +00:00
$systemConfig = \OC :: $server -> getSystemConfig ();
2014-11-19 12:06:22 +00:00
2013-01-14 19:30:28 +00:00
// User and Groups
2014-11-28 17:52:09 +00:00
if ( ! $systemConfig -> getValue ( " installed " , false )) {
2014-07-16 17:40:22 +00:00
self :: $server -> getSession () -> set ( 'user_id' , '' );
2013-01-14 19:30:28 +00:00
}
2016-05-04 06:34:39 +00:00
OC_User :: useBackend ( new \OC\User\Database ());
2017-03-03 07:24:27 +00:00
\OC :: $server -> getGroupManager () -> addBackend ( new \OC\Group\Database ());
2013-12-11 13:01:48 +00:00
2015-10-05 09:50:36 +00:00
// Subscribe to the hook
\OCP\Util :: connectHook (
'\OCA\Files_Sharing\API\Server2Server' ,
'preLoginNameUsedAsUserName' ,
2016-05-24 08:42:11 +00:00
'\OC\User\Database' ,
2015-10-05 09:50:36 +00:00
'preLoginNameUsedAsUserName'
);
2013-01-14 19:30:28 +00:00
//setup extra user backends
2017-11-30 15:00:19 +00:00
if ( ! \OCP\Util :: needUpgrade ()) {
2014-09-08 10:30:04 +00:00
OC_User :: setupBackends ();
2016-05-12 09:56:58 +00:00
} else {
// Run upgrades in incognito mode
OC_User :: setIncognitoMode ( true );
2014-09-08 10:30:04 +00:00
}
2013-01-14 19:30:28 +00:00
2017-11-23 12:37:50 +00:00
self :: registerCleanupHooks ();
2013-01-14 19:30:28 +00:00
self :: registerFilesystemHooks ();
self :: registerShareHooks ();
2015-01-14 19:39:23 +00:00
self :: registerEncryptionWrapper ();
self :: registerEncryptionHooks ();
2016-11-23 20:19:06 +00:00
self :: registerAccountHooks ();
2019-02-22 14:04:59 +00:00
self :: registerResourceCollectionHooks ();
2019-06-25 13:20:06 +00:00
self :: registerAppRestrictionsHooks ();
2013-01-14 19:30:28 +00:00
2018-01-29 12:15:05 +00:00
// Make sure that the application class is not loaded before the database is setup
if ( $systemConfig -> getValue ( " installed " , false )) {
2019-09-17 14:33:27 +00:00
OC_App :: loadApp ( 'settings' );
2019-10-11 06:21:24 +00:00
$settings = \OC :: $server -> query ( \OCA\Settings\AppInfo\Application :: class );
2018-01-29 12:15:05 +00:00
$settings -> register ();
}
2017-04-12 13:19:45 +00:00
2013-01-14 19:30:28 +00:00
//make sure temporary files are cleaned up
2014-10-22 15:36:52 +00:00
$tmpManager = \OC :: $server -> getTempManager ();
register_shutdown_function ( array ( $tmpManager , 'clean' ));
2015-05-19 15:12:09 +00:00
$lockProvider = \OC :: $server -> getLockingProvider ();
register_shutdown_function ( array ( $lockProvider , 'releaseAll' ));
2013-01-14 19:30:28 +00:00
2014-08-13 22:06:19 +00:00
// Check whether the sample configuration has been copied
2014-11-28 17:52:09 +00:00
if ( $systemConfig -> getValue ( 'copied_sample_config' , false )) {
2014-08-31 08:05:59 +00:00
$l = \OC :: $server -> getL10N ( 'lib' );
2014-08-13 22:06:19 +00:00
OC_Template :: printErrorPage (
$l -> t ( 'Sample configuration detected' ),
2018-06-26 07:17:37 +00:00
$l -> t ( 'It has been detected that the sample configuration has been copied. This can break your installation and is unsupported. Please read the documentation before performing changes on config.php' ),
2018-07-05 15:09:38 +00:00
503
2014-08-13 22:06:19 +00:00
);
return ;
}
2014-09-05 12:10:35 +00:00
2015-02-10 12:02:48 +00:00
$request = \OC :: $server -> getRequest ();
$host = $request -> getInsecureServerHost ();
/**
* if the host passed in headers isn ' t trusted
* FIXME : Should not be in here at all : see_no_evil :
*/
2014-09-05 12:10:35 +00:00
if ( ! OC :: $CLI
2015-02-10 12:02:48 +00:00
// overwritehost is always trusted, workaround to not have to make
// \OC\AppFramework\Http\Request::getOverwriteHost public
&& self :: $server -> getConfig () -> getSystemValue ( 'overwritehost' ) === ''
2015-02-16 21:12:47 +00:00
&& ! \OC :: $server -> getTrustedDomainHelper () -> isTrustedDomain ( $host )
2015-02-18 12:06:46 +00:00
&& self :: $server -> getConfig () -> getSystemValue ( 'installed' , false )
2014-09-05 12:10:35 +00:00
) {
2017-01-09 11:52:43 +00:00
// Allow access to CSS resources
$isScssRequest = false ;
if ( strpos ( $request -> getPathInfo (), '/css/' ) === 0 ) {
$isScssRequest = true ;
}
2018-01-22 14:58:57 +00:00
if ( substr ( $request -> getRequestUri (), - 11 ) === '/status.php' ) {
2018-06-26 08:32:50 +00:00
http_response_code ( 400 );
2018-01-22 14:58:57 +00:00
header ( 'Content-Type: application/json' );
echo '{"error": "Trusted domain error.", "code": 15}' ;
exit ();
}
2017-01-09 11:52:43 +00:00
if ( ! $isScssRequest ) {
2018-06-26 08:32:50 +00:00
http_response_code ( 400 );
2014-09-08 14:15:31 +00:00
2018-04-17 15:47:11 +00:00
\OC :: $server -> getLogger () -> info (
2015-11-10 10:13:25 +00:00
'Trusted domain error. "{remoteAddress}" tried to access using "{host}" as host.' ,
[
'app' => 'core' ,
'remoteAddress' => $request -> getRemoteAddress (),
'host' => $host ,
]
2017-01-09 11:52:43 +00:00
);
2015-11-10 10:13:25 +00:00
2017-01-09 11:52:43 +00:00
$tmpl = new OCP\Template ( 'core' , 'untrustedDomain' , 'guest' );
2018-04-17 15:47:11 +00:00
$tmpl -> assign ( 'docUrl' , \OC :: $server -> getURLGenerator () -> linkToDocs ( 'admin-trusted-domains' ));
2017-01-09 11:52:43 +00:00
$tmpl -> printPage ();
2014-09-08 14:15:31 +00:00
2017-01-09 11:52:43 +00:00
exit ();
}
2014-09-05 12:10:35 +00:00
}
2014-10-03 20:13:55 +00:00
\OC :: $server -> getEventLogger () -> end ( 'boot' );
2013-01-14 19:30:28 +00:00
}
2015-06-05 12:21:17 +00:00
/**
2017-11-23 12:37:50 +00:00
* register hooks for the cleanup of cache and bruteforce protection
2015-06-05 12:21:17 +00:00
*/
2017-11-23 12:37:50 +00:00
public static function registerCleanupHooks () {
2015-06-05 12:21:17 +00:00
//don't try to do this before we are properly setup
2017-11-30 15:00:19 +00:00
if ( \OC :: $server -> getSystemConfig () -> getValue ( 'installed' , false ) && ! \OCP\Util :: needUpgrade ()) {
2015-06-05 12:21:17 +00:00
// NOTE: This will be replaced to use OCP
$userSession = self :: $server -> getUserSession ();
2017-11-23 12:37:50 +00:00
$userSession -> listen ( '\OC\User' , 'postLogin' , function () use ( $userSession ) {
if ( ! defined ( 'PHPUNIT_RUN' )) {
// reset brute force delay for this IP address and username
$uid = \OC :: $server -> getUserSession () -> getUser () -> getUID ();
$request = \OC :: $server -> getRequest ();
$throttler = \OC :: $server -> getBruteForceThrottler ();
$throttler -> resetDelay ( $request -> getRemoteAddress (), 'login' , [ 'user' => $uid ]);
}
2015-06-30 15:36:55 +00:00
try {
$cache = new \OC\Cache\File ();
$cache -> gc ();
2016-03-03 00:15:36 +00:00
} catch ( \OC\ServerNotAvailableException $e ) {
// not a GC exception, pass it on
throw $e ;
2017-04-27 19:48:06 +00:00
} catch ( \OC\ForbiddenException $e ) {
// filesystem blocked for this request, ignore
2015-06-30 15:36:55 +00:00
} catch ( \Exception $e ) {
// a GC exception should not prevent users from using OC,
// so log the exception
2018-01-17 14:21:56 +00:00
\OC :: $server -> getLogger () -> logException ( $e , [
'message' => 'Exception when running cache gc.' ,
2018-04-25 13:22:28 +00:00
'level' => ILogger :: WARN ,
2018-01-17 14:21:56 +00:00
'app' => 'core' ,
]);
2015-06-30 15:36:55 +00:00
}
2015-06-08 12:13:38 +00:00
});
2015-06-05 12:21:17 +00:00
}
}
2015-01-14 19:39:23 +00:00
private static function registerEncryptionWrapper () {
2016-03-30 21:20:37 +00:00
$manager = self :: $server -> getEncryptionManager ();
\OCP\Util :: connectHook ( 'OC_Filesystem' , 'preSetup' , $manager , 'setupStorage' );
2015-01-14 19:39:23 +00:00
}
private static function registerEncryptionHooks () {
$enabled = self :: $server -> getEncryptionManager () -> isEnabled ();
if ( $enabled ) {
2018-01-25 22:16:13 +00:00
\OCP\Util :: connectHook ( Share :: class , 'post_shared' , HookManager :: class , 'postShared' );
\OCP\Util :: connectHook ( Share :: class , 'post_unshare' , HookManager :: class , 'postUnshared' );
\OCP\Util :: connectHook ( 'OC_Filesystem' , 'post_rename' , HookManager :: class , 'postRename' );
\OCP\Util :: connectHook ( '\OCA\Files_Trashbin\Trashbin' , 'post_restore' , HookManager :: class , 'postRestore' );
2015-01-14 19:39:23 +00:00
}
}
2016-11-23 20:19:06 +00:00
private static function registerAccountHooks () {
2016-11-23 22:57:20 +00:00
$hookHandler = new \OC\Accounts\Hooks ( \OC :: $server -> getLogger ());
2016-11-23 20:19:06 +00:00
\OCP\Util :: connectHook ( 'OC_User' , 'changeUser' , $hookHandler , 'changeUserHook' );
}
2019-06-25 13:20:06 +00:00
private static function registerAppRestrictionsHooks () {
$groupManager = self :: $server -> query ( \OCP\IGroupManager :: class );
$groupManager -> listen ( '\OC\Group' , 'postDelete' , function ( \OCP\IGroup $group ) {
$appManager = self :: $server -> getAppManager ();
$apps = $appManager -> getEnabledAppsForGroup ( $group );
foreach ( $apps as $appId ) {
$restrictions = $appManager -> getAppRestriction ( $appId );
if ( empty ( $restrictions )) {
continue ;
}
$key = array_search ( $group -> getGID (), $restrictions );
unset ( $restrictions [ $key ]);
$restrictions = array_values ( $restrictions );
if ( empty ( $restrictions )) {
$appManager -> disableApp ( $appId );
}
else {
$appManager -> enableAppForGroups ( $appId , $restrictions );
}
}
});
}
2019-02-22 14:04:59 +00:00
private static function registerResourceCollectionHooks () {
\OC\Collaboration\Resources\Listener :: register ( \OC :: $server -> getEventDispatcher ());
}
2013-01-14 19:30:28 +00:00
/**
* register hooks for the filesystem
*/
2013-01-30 21:55:33 +00:00
public static function registerFilesystemHooks () {
2013-01-14 19:30:28 +00:00
// Check for blacklisted files
2018-01-25 22:16:13 +00:00
OC_Hook :: connect ( 'OC_Filesystem' , 'write' , Filesystem :: class , 'isBlacklisted' );
OC_Hook :: connect ( 'OC_Filesystem' , 'rename' , Filesystem :: class , 'isBlacklisted' );
2013-01-14 19:30:28 +00:00
}
/**
* register hooks for sharing
*/
2013-01-30 21:55:33 +00:00
public static function registerShareHooks () {
2014-11-28 17:52:09 +00:00
if ( \OC :: $server -> getSystemConfig () -> getValue ( 'installed' )) {
2018-01-25 22:16:13 +00:00
OC_Hook :: connect ( 'OC_User' , 'post_deleteUser' , Hooks :: class , 'post_deleteUser' );
OC_Hook :: connect ( 'OC_User' , 'post_removeFromGroup' , Hooks :: class , 'post_removeFromGroup' );
OC_Hook :: connect ( 'OC_User' , 'post_deleteGroup' , Hooks :: class , 'post_deleteGroup' );
2013-05-16 23:20:02 +00:00
}
2013-01-14 19:30:28 +00:00
}
2014-07-29 09:18:40 +00:00
protected static function registerAutoloaderCache () {
// The class loader takes an optional low-latency cache, which MUST be
// namespaced. The instanceid is used for namespacing, but might be
2016-04-07 17:51:27 +00:00
// unavailable at this point. Furthermore, it might not be possible to
2014-07-29 09:18:40 +00:00
// generate an instanceid via \OC_Util::getInstanceId() because the
// config file may not be writable. As such, we only register a class
// loader cache if instanceid is available without trying to create one.
2014-11-28 17:52:09 +00:00
$instanceId = \OC :: $server -> getSystemConfig () -> getValue ( 'instanceid' , null );
2014-07-29 09:18:40 +00:00
if ( $instanceId ) {
try {
2015-01-14 18:25:00 +00:00
$memcacheFactory = \OC :: $server -> getMemCacheFactory ();
self :: $loader -> setMemoryCache ( $memcacheFactory -> createLocal ( 'Autoloader' ));
2014-07-29 09:18:40 +00:00
} catch ( \Exception $ex ) {
}
}
}
2013-01-14 19:30:28 +00:00
/**
2014-05-19 15:50:53 +00:00
* Handle the request
2013-01-14 19:30:28 +00:00
*/
2013-01-30 21:55:33 +00:00
public static function handleRequest () {
2015-02-10 12:02:48 +00:00
2014-10-03 20:13:55 +00:00
\OC :: $server -> getEventLogger () -> start ( 'handle_request' , 'Handle request' );
2014-11-28 17:52:09 +00:00
$systemConfig = \OC :: $server -> getSystemConfig ();
2013-01-17 20:42:33 +00:00
2016-06-22 06:41:10 +00:00
// Check if Nextcloud is installed or in maintenance (update) mode
2014-11-28 17:52:09 +00:00
if ( ! $systemConfig -> getValue ( 'installed' , false )) {
2014-10-31 10:21:00 +00:00
\OC :: $server -> getSession () -> clear ();
2017-11-24 09:27:58 +00:00
$setupHelper = new OC\Setup (
2017-11-30 15:01:42 +00:00
$systemConfig ,
2017-11-24 09:27:58 +00:00
\OC :: $server -> getIniWrapper (),
\OC :: $server -> getL10N ( 'lib' ),
\OC :: $server -> query ( \OCP\Defaults :: class ),
\OC :: $server -> getLogger (),
\OC :: $server -> getSecureRandom (),
\OC :: $server -> query ( \OC\Installer :: class )
);
2016-01-20 09:20:36 +00:00
$controller = new OC\Core\Controller\SetupController ( $setupHelper );
2013-09-10 18:19:42 +00:00
$controller -> run ( $_POST );
2013-01-30 21:55:33 +00:00
exit ();
}
2013-02-05 22:33:44 +00:00
2015-07-07 15:29:54 +00:00
$request = \OC :: $server -> getRequest ();
2016-03-17 16:32:38 +00:00
$requestPath = $request -> getRawPathInfo ();
2016-08-30 13:44:00 +00:00
if ( $requestPath === '/heartbeat' ) {
return ;
}
2015-07-07 15:29:54 +00:00
if ( substr ( $requestPath , - 3 ) !== '.js' ) { // we need these files during the upgrade
2016-07-07 10:14:45 +00:00
self :: checkMaintenanceMode ();
2017-11-30 15:00:19 +00:00
if ( \OCP\Util :: needUpgrade ()) {
if ( function_exists ( 'opcache_reset' )) {
opcache_reset ();
}
2019-02-06 16:08:41 +00:00
if ( ! (( bool ) $systemConfig -> getValue ( 'maintenance' , false ))) {
2017-11-30 15:01:42 +00:00
self :: printUpgradePage ( $systemConfig );
2017-11-30 15:00:19 +00:00
exit ();
}
}
2013-01-30 22:05:44 +00:00
}
2013-01-30 21:55:33 +00:00
2015-07-07 15:29:54 +00:00
// emergency app disabling
if ( $requestPath === '/disableapp'
&& $request -> getMethod () === 'POST'
2017-04-25 19:19:49 +00:00
&& (( array ) $request -> getParam ( 'appid' )) !== ''
2015-07-07 15:29:54 +00:00
) {
2018-03-22 12:19:29 +00:00
\OC_JSON :: callCheck ();
\OC_JSON :: checkAdminUser ();
2017-04-25 19:19:49 +00:00
$appIds = ( array ) $request -> getParam ( 'appid' );
foreach ( $appIds as $appId ) {
$appId = \OC_App :: cleanAppId ( $appId );
2018-02-13 07:03:06 +00:00
\OC :: $server -> getAppManager () -> disableApp ( $appId );
2017-04-25 19:19:49 +00:00
}
2015-07-07 15:29:54 +00:00
\OC_JSON :: success ();
exit ();
}
2016-07-07 10:14:39 +00:00
// Always load authentication apps
OC_App :: loadApps ([ 'authentication' ]);
2015-02-24 17:00:26 +00:00
2015-01-09 19:59:23 +00:00
// Load minimum set of apps
2017-11-30 15:00:19 +00:00
if ( ! \OCP\Util :: needUpgrade ()
2019-02-06 16:08:41 +00:00
&& ! (( bool ) $systemConfig -> getValue ( 'maintenance' , false ))) {
2015-01-09 19:59:23 +00:00
// For logged-in users: Load everything
2017-03-02 15:52:05 +00:00
if ( \OC :: $server -> getUserSession () -> isLoggedIn ()) {
2015-01-09 19:59:23 +00:00
OC_App :: loadApps ();
} else {
2015-02-24 17:00:26 +00:00
// For guests: Load only filesystem and logging
2015-01-09 19:59:23 +00:00
OC_App :: loadApps ( array ( 'filesystem' , 'logging' ));
2016-04-29 07:40:33 +00:00
self :: handleLogin ( $request );
2015-01-09 19:59:23 +00:00
}
}
2016-04-18 10:14:07 +00:00
if ( ! self :: $CLI ) {
2013-02-07 16:53:38 +00:00
try {
2019-02-06 16:08:41 +00:00
if ( ! (( bool ) $systemConfig -> getValue ( 'maintenance' , false )) && ! \OCP\Util :: needUpgrade ()) {
2014-06-16 11:12:21 +00:00
OC_App :: loadApps ( array ( 'filesystem' , 'logging' ));
2014-06-24 15:37:58 +00:00
OC_App :: loadApps ();
2013-03-03 22:03:47 +00:00
}
2014-08-28 15:58:23 +00:00
OC_Util :: setupFS ();
2015-02-10 12:02:48 +00:00
OC :: $server -> getRouter () -> match ( \OC :: $server -> getRequest () -> getRawPathInfo ());
2013-02-07 16:53:38 +00:00
return ;
} catch ( Symfony\Component\Routing\Exception\ResourceNotFoundException $e ) {
//header('HTTP/1.0 404 Not Found');
} catch ( Symfony\Component\Routing\Exception\MethodNotAllowedException $e ) {
2018-06-26 08:32:50 +00:00
http_response_code ( 405 );
2013-02-07 16:53:38 +00:00
return ;
}
2013-01-14 19:30:28 +00:00
}
2013-01-30 22:05:44 +00:00
2013-01-25 13:57:52 +00:00
// Handle WebDAV
2017-05-15 12:33:27 +00:00
if ( isset ( $_SERVER [ 'REQUEST_METHOD' ]) && $_SERVER [ 'REQUEST_METHOD' ] === 'PROPFIND' ) {
2013-10-24 08:34:09 +00:00
// not allowed any more to prevent people
// mounting this root directly.
// Users need to mount remote.php/webdav instead.
2018-06-26 08:32:50 +00:00
http_response_code ( 405 );
2013-01-25 13:57:52 +00:00
return ;
}
2014-05-10 12:00:22 +00:00
// Someone is logged in
2017-03-02 15:52:05 +00:00
if ( \OC :: $server -> getUserSession () -> isLoggedIn ()) {
2013-01-14 19:30:28 +00:00
OC_App :: loadApps ();
OC_User :: setupBackends ();
2014-08-28 14:59:56 +00:00
OC_Util :: setupFS ();
2016-04-25 12:10:55 +00:00
// FIXME
2016-04-18 10:14:07 +00:00
// Redirect to default application
OC_Util :: redirectToDefaultPage ();
2014-05-10 12:00:22 +00:00
} else {
// Not handled and not logged in
2016-04-25 12:10:55 +00:00
header ( 'Location: ' . \OC :: $server -> getURLGenerator () -> linkToRouteAbsolute ( 'core.login.showLoginForm' ));
2013-01-14 19:30:28 +00:00
}
}
2016-04-29 07:40:33 +00:00
/**
* Check login : apache auth , auth token , basic auth
*
* @ param OCP\IRequest $request
* @ return boolean
*/
2016-05-17 08:13:02 +00:00
static function handleLogin ( OCP\IRequest $request ) {
2016-04-29 07:40:33 +00:00
$userSession = self :: $server -> getUserSession ();
if ( OC_User :: handleApacheAuth ()) {
return true ;
}
if ( $userSession -> tryTokenLogin ( $request )) {
return true ;
}
2016-09-06 19:41:15 +00:00
if ( isset ( $_COOKIE [ 'nc_username' ])
&& isset ( $_COOKIE [ 'nc_token' ])
&& isset ( $_COOKIE [ 'nc_session_id' ])
&& $userSession -> loginWithCookie ( $_COOKIE [ 'nc_username' ], $_COOKIE [ 'nc_token' ], $_COOKIE [ 'nc_session_id' ])) {
return true ;
}
2016-07-20 16:36:15 +00:00
if ( $userSession -> tryBasicAuthLogin ( $request , \OC :: $server -> getBruteForceThrottler ())) {
2016-04-29 07:40:33 +00:00
return true ;
}
return false ;
}
2014-07-19 00:16:28 +00:00
protected static function handleAuthHeaders () {
//copy http auth headers for apache+php-fcgid work around
if ( isset ( $_SERVER [ 'HTTP_XAUTHORIZATION' ]) && ! isset ( $_SERVER [ 'HTTP_AUTHORIZATION' ])) {
$_SERVER [ 'HTTP_AUTHORIZATION' ] = $_SERVER [ 'HTTP_XAUTHORIZATION' ];
}
// Extract PHP_AUTH_USER/PHP_AUTH_PW from other headers if necessary.
$vars = array (
'HTTP_AUTHORIZATION' , // apache+php-cgi work around
'REDIRECT_HTTP_AUTHORIZATION' , // apache+php-cgi alternative
);
foreach ( $vars as $var ) {
if ( isset ( $_SERVER [ $var ]) && preg_match ( '/Basic\s+(.*)$/i' , $_SERVER [ $var ], $matches )) {
list ( $name , $password ) = explode ( ':' , base64_decode ( $matches [ 1 ]), 2 );
2014-07-19 08:17:24 +00:00
$_SERVER [ 'PHP_AUTH_USER' ] = $name ;
$_SERVER [ 'PHP_AUTH_PW' ] = $password ;
2014-07-19 00:16:28 +00:00
break ;
}
}
}
2011-07-29 19:03:53 +00:00
}
2011-11-13 15:16:21 +00:00
OC :: init ();