2014-05-09 15:06:08 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
2015-10-05 18:54:56 +00:00
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
2015-10-26 12:54:55 +00:00
|
|
|
* @author Roeland Jago Douma <rullzer@owncloud.com>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
|
|
|
*
|
2016-01-12 14:02:16 +00:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-03-26 10:44:34 +00:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
2014-05-09 15:06:08 +00:00
|
|
|
*/
|
2015-02-26 10:37:37 +00:00
|
|
|
|
2014-05-09 15:06:08 +00:00
|
|
|
OCP\JSON::callCheck();
|
|
|
|
OCP\JSON::checkLoggedIn();
|
2014-06-16 10:42:28 +00:00
|
|
|
OCP\JSON::checkAppEnabled('files_sharing');
|
2014-05-09 15:06:08 +00:00
|
|
|
|
2014-08-31 08:05:59 +00:00
|
|
|
$l = \OC::$server->getL10N('files_sharing');
|
2014-06-12 17:49:52 +00:00
|
|
|
|
|
|
|
// check if server admin allows to mount public links from other servers
|
2014-06-30 10:34:49 +00:00
|
|
|
if (OCA\Files_Sharing\Helper::isIncomingServer2serverShareEnabled() === false) {
|
2014-06-12 17:49:52 +00:00
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Server to server sharing is not enabled on this server'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2014-05-09 15:06:08 +00:00
|
|
|
$token = $_POST['token'];
|
|
|
|
$remote = $_POST['remote'];
|
|
|
|
$owner = $_POST['owner'];
|
2015-12-14 15:04:05 +00:00
|
|
|
$ownerDisplayName = $_POST['ownerDisplayName'];
|
2014-05-09 15:06:08 +00:00
|
|
|
$name = $_POST['name'];
|
|
|
|
$password = $_POST['password'];
|
|
|
|
|
2014-09-23 17:30:32 +00:00
|
|
|
// Check for invalid name
|
|
|
|
if(!\OCP\Util::isValidFileName($name)) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('The mountpoint name contains invalid characters.'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2015-12-09 11:00:00 +00:00
|
|
|
$currentUser = \OC::$server->getUserSession()->getUser()->getUID();
|
|
|
|
$currentServer = \OC::$server->getURLGenerator()->getAbsoluteURL('/');
|
|
|
|
if (\OC\Share\Helper::isSameUserOnSameServer($owner, $remote, $currentUser, $currentServer )) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Not allowed to create a federated share with the same user server'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
|
2016-02-25 19:46:01 +00:00
|
|
|
$discoveryManager = new \OCA\FederatedFileSharing\DiscoveryManager(
|
|
|
|
\OC::$server->getMemCacheFactory(),
|
|
|
|
\OC::$server->getHTTPClientService()
|
|
|
|
);
|
2014-05-09 15:06:08 +00:00
|
|
|
$externalManager = new \OCA\Files_Sharing\External\Manager(
|
2014-12-04 18:51:04 +00:00
|
|
|
\OC::$server->getDatabaseConnection(),
|
|
|
|
\OC\Files\Filesystem::getMountManager(),
|
|
|
|
\OC\Files\Filesystem::getLoader(),
|
2015-01-19 23:35:47 +00:00
|
|
|
\OC::$server->getHTTPHelper(),
|
2015-09-01 16:56:09 +00:00
|
|
|
\OC::$server->getNotificationManager(),
|
2016-02-29 21:44:40 +00:00
|
|
|
$discoveryManager,
|
2015-01-19 23:35:47 +00:00
|
|
|
\OC::$server->getUserSession()->getUser()->getUID()
|
2014-05-09 15:06:08 +00:00
|
|
|
);
|
|
|
|
|
2014-08-13 14:46:04 +00:00
|
|
|
// check for ssl cert
|
2015-04-02 14:59:47 +00:00
|
|
|
if (substr($remote, 0, 5) === 'https') {
|
|
|
|
try {
|
|
|
|
\OC::$server->getHTTPClientService()->newClient()->get($remote)->getBody();
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Invalid or untrusted SSL certificate'))));
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-14 15:04:05 +00:00
|
|
|
$mount = $externalManager->addShare($remote, $token, $password, $name, $ownerDisplayName, true);
|
2015-01-20 18:45:32 +00:00
|
|
|
|
2015-04-02 14:59:47 +00:00
|
|
|
/**
|
|
|
|
* @var \OCA\Files_Sharing\External\Storage $storage
|
|
|
|
*/
|
|
|
|
$storage = $mount->getStorage();
|
|
|
|
try {
|
|
|
|
// check if storage exists
|
|
|
|
$storage->checkStorageAvailability();
|
|
|
|
} catch (\OCP\Files\StorageInvalidException $e) {
|
|
|
|
// note: checkStorageAvailability will already remove the invalid share
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(
|
|
|
|
array(
|
|
|
|
'data' => array(
|
|
|
|
'message' => $l->t('Could not authenticate to remote share, password might be wrong')
|
|
|
|
)
|
|
|
|
)
|
|
|
|
);
|
|
|
|
exit();
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Storage not valid'))));
|
|
|
|
exit();
|
|
|
|
}
|
|
|
|
$result = $storage->file_exists('');
|
|
|
|
if ($result) {
|
2015-01-20 18:45:32 +00:00
|
|
|
try {
|
2015-04-02 14:59:47 +00:00
|
|
|
$storage->getScanner()->scanAll();
|
|
|
|
\OCP\JSON::success();
|
2015-01-20 18:45:32 +00:00
|
|
|
} catch (\OCP\Files\StorageInvalidException $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
2015-04-02 14:59:47 +00:00
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Storage not valid'))));
|
2015-01-20 18:45:32 +00:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Invalid remote storage: ' . get_class($e) . ': ' . $e->getMessage(),
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Couldn\'t add remote share'))));
|
2014-08-13 14:46:04 +00:00
|
|
|
}
|
2015-04-02 14:59:47 +00:00
|
|
|
} else {
|
|
|
|
$externalManager->removeShare($mount->getMountPoint());
|
|
|
|
\OCP\Util::writeLog(
|
|
|
|
'files_sharing',
|
|
|
|
'Couldn\'t add remote share',
|
|
|
|
\OCP\Util::DEBUG
|
|
|
|
);
|
|
|
|
\OCP\JSON::error(array('data' => array('message' => $l->t('Couldn\'t add remote share'))));
|
2014-05-19 14:39:57 +00:00
|
|
|
}
|
2015-04-02 14:59:47 +00:00
|
|
|
|