2023-03-22 18:24:15 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
declare(strict_types=1);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @copyright Copyright (c) 2023 Varun Patil <radialapps@gmail.com>
|
|
|
|
* @author Varun Patil <radialapps@gmail.com>
|
|
|
|
* @license AGPL-3.0-or-later
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2023-03-24 04:57:54 +00:00
|
|
|
namespace OCA\Memories\Db;
|
2023-03-22 18:24:15 +00:00
|
|
|
|
2023-08-20 16:42:04 +00:00
|
|
|
use OC\Files\Search\SearchBinaryOperator;
|
2023-04-14 22:26:20 +00:00
|
|
|
use OC\Files\Search\SearchComparison;
|
|
|
|
use OC\Files\Search\SearchQuery;
|
2023-03-24 00:19:05 +00:00
|
|
|
use OCA\Memories\Exceptions;
|
2023-03-22 18:24:15 +00:00
|
|
|
use OCA\Memories\Util;
|
|
|
|
use OCP\Files\File;
|
|
|
|
use OCP\Files\Folder;
|
|
|
|
use OCP\Files\IRootFolder;
|
2023-04-19 16:47:57 +00:00
|
|
|
use OCP\Files\Node;
|
2023-08-20 16:42:04 +00:00
|
|
|
use OCP\Files\Search\ISearchBinaryOperator;
|
2023-04-14 22:26:20 +00:00
|
|
|
use OCP\Files\Search\ISearchComparison;
|
|
|
|
use OCP\ICache;
|
|
|
|
use OCP\ICacheFactory;
|
2023-03-22 18:24:15 +00:00
|
|
|
use OCP\IConfig;
|
2023-03-23 21:45:56 +00:00
|
|
|
use OCP\IRequest;
|
|
|
|
use OCP\IUserManager;
|
2023-03-22 18:24:15 +00:00
|
|
|
use OCP\IUserSession;
|
2023-03-23 21:45:56 +00:00
|
|
|
use OCP\Share\IShare;
|
2023-03-22 18:24:15 +00:00
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
class FsManager
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
protected IConfig $config;
|
|
|
|
protected IUserSession $userSession;
|
|
|
|
protected IRootFolder $rootFolder;
|
2023-03-23 23:58:49 +00:00
|
|
|
protected AlbumsQuery $albumsQuery;
|
2023-03-23 21:45:56 +00:00
|
|
|
protected IRequest $request;
|
2023-04-14 22:26:20 +00:00
|
|
|
protected ICache $nomediaCache;
|
2023-03-23 21:45:56 +00:00
|
|
|
|
|
|
|
public function __construct(
|
|
|
|
IConfig $config,
|
|
|
|
IUserSession $userSession,
|
|
|
|
IRootFolder $rootFolder,
|
2023-03-23 23:58:49 +00:00
|
|
|
AlbumsQuery $albumsQuery,
|
2023-04-14 22:26:20 +00:00
|
|
|
IRequest $request,
|
|
|
|
ICacheFactory $cacheFactory
|
2023-03-23 21:45:56 +00:00
|
|
|
) {
|
|
|
|
$this->config = $config;
|
|
|
|
$this->userSession = $userSession;
|
|
|
|
$this->rootFolder = $rootFolder;
|
2023-03-23 23:58:49 +00:00
|
|
|
$this->albumsQuery = $albumsQuery;
|
2023-03-23 21:45:56 +00:00
|
|
|
$this->request = $request;
|
2023-04-14 22:26:20 +00:00
|
|
|
$this->nomediaCache = $cacheFactory->createLocal('memories:nomedia');
|
2023-03-23 21:45:56 +00:00
|
|
|
}
|
2023-03-22 18:24:15 +00:00
|
|
|
|
|
|
|
/** Get the TimelineRoot object relevant to the request */
|
2023-03-23 21:45:56 +00:00
|
|
|
public function populateRoot(TimelineRoot &$root)
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
|
|
|
|
// Albums have no folder
|
2023-05-23 04:06:22 +00:00
|
|
|
if ($this->hasAlbumToken() && Util::albumsIsEnabled()) {
|
2023-03-22 18:24:15 +00:00
|
|
|
if (null !== $user) {
|
|
|
|
return $root;
|
|
|
|
}
|
2023-03-23 23:58:49 +00:00
|
|
|
if (($token = $this->getShareToken()) && $this->albumsQuery->getAlbumByLink($token)) {
|
2023-03-22 18:24:15 +00:00
|
|
|
return $root;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Public shared folder
|
|
|
|
if ($share = $this->getShareNode()) { // can throw
|
|
|
|
if (!$share instanceof Folder) {
|
|
|
|
throw new \Exception('Share is not a folder');
|
|
|
|
}
|
|
|
|
|
|
|
|
$root->addFolder($share);
|
|
|
|
|
|
|
|
return $root;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Anything else needs a user
|
|
|
|
if (null === $user) {
|
2023-03-24 04:16:53 +00:00
|
|
|
throw Exceptions::NotLoggedIn();
|
2023-03-22 18:24:15 +00:00
|
|
|
}
|
|
|
|
$uid = $user->getUID();
|
|
|
|
|
|
|
|
$folder = null;
|
|
|
|
$folderPath = $this->request->getParam('folder');
|
|
|
|
$userFolder = $this->rootFolder->getUserFolder($uid);
|
|
|
|
|
|
|
|
try {
|
|
|
|
if (null !== $folderPath) {
|
2023-04-16 23:03:59 +00:00
|
|
|
$folder = $userFolder->get(Util::sanitizePath($folderPath));
|
2023-03-22 18:24:15 +00:00
|
|
|
$root->addFolder($folder);
|
|
|
|
} else {
|
2023-04-14 22:26:20 +00:00
|
|
|
// Get timeline paths
|
2023-04-16 23:03:59 +00:00
|
|
|
$paths = Util::getTimelinePaths($uid);
|
2023-04-14 02:43:13 +00:00
|
|
|
if ($path = $this->request->getParam('timelinePath', null)) {
|
2023-04-16 23:03:59 +00:00
|
|
|
$paths = [Util::sanitizePath($path)];
|
2023-04-14 02:43:13 +00:00
|
|
|
}
|
2023-03-22 18:24:15 +00:00
|
|
|
|
2023-04-14 22:26:20 +00:00
|
|
|
// Combined etag, for cache invalidation.
|
|
|
|
// This is cheaper and more sensible than the root etag.
|
|
|
|
// The only time this breaks down is if the user places a .nomedia
|
|
|
|
// outside the timeline path; rely on expiration for that.
|
2023-04-21 08:10:28 +00:00
|
|
|
$etag = $uid;
|
2023-04-14 22:26:20 +00:00
|
|
|
|
2023-03-22 18:24:15 +00:00
|
|
|
// Multiple timeline path support
|
2023-04-14 02:43:13 +00:00
|
|
|
foreach ($paths as $path) {
|
2023-04-14 22:26:20 +00:00
|
|
|
$node = $userFolder->get($path);
|
|
|
|
$root->addFolder($node);
|
2023-04-21 08:10:28 +00:00
|
|
|
$etag .= $node->getEtag();
|
2023-03-22 18:24:15 +00:00
|
|
|
}
|
2023-04-14 22:26:20 +00:00
|
|
|
|
|
|
|
// Add shares or external stores inside the current folders
|
2023-03-22 18:24:15 +00:00
|
|
|
$root->addMountPoints();
|
2023-04-14 22:26:20 +00:00
|
|
|
|
|
|
|
// Exclude .nomedia folders
|
2023-08-20 17:38:17 +00:00
|
|
|
//
|
|
|
|
// This is needed to be done despite the exlusion in the CTE to account
|
|
|
|
// for mount points inside folders with a .nomedia file. For example:
|
|
|
|
// /user/files/timeline-path/
|
|
|
|
// => subfolder1
|
|
|
|
// => photo1
|
|
|
|
// => subfolder2
|
|
|
|
// => .nomedia
|
|
|
|
// => external-mount <-- this is a separate topFolder in the CTE
|
|
|
|
// => photo2 <-- this should be excluded, but CTE cannot find this
|
2023-04-21 08:10:28 +00:00
|
|
|
$root->excludePaths($this->getNoMediaFolders($userFolder, md5($etag)));
|
2023-03-22 18:24:15 +00:00
|
|
|
}
|
|
|
|
} catch (\OCP\Files\NotFoundException $e) {
|
|
|
|
$msg = $e->getMessage();
|
|
|
|
|
|
|
|
throw new \Exception("Folder not found: {$msg}");
|
|
|
|
}
|
|
|
|
|
|
|
|
return $root;
|
|
|
|
}
|
|
|
|
|
2023-04-14 22:26:20 +00:00
|
|
|
/**
|
|
|
|
* Get list of folders with .nomedia file.
|
|
|
|
*
|
|
|
|
* @param Folder $root root folder
|
2023-04-21 08:10:28 +00:00
|
|
|
* @param string $key cache key
|
2023-04-14 22:26:20 +00:00
|
|
|
*/
|
|
|
|
public function getNoMediaFolders(Folder $root, string $key): array
|
|
|
|
{
|
|
|
|
if (null !== ($paths = $this->nomediaCache->get($key))) {
|
|
|
|
return $paths;
|
|
|
|
}
|
|
|
|
|
2023-08-20 16:42:04 +00:00
|
|
|
$comp = new SearchBinaryOperator(ISearchBinaryOperator::OPERATOR_OR, [
|
|
|
|
new SearchComparison(ISearchComparison::COMPARE_EQUAL, 'name', '.nomedia'),
|
|
|
|
new SearchComparison(ISearchComparison::COMPARE_EQUAL, 'name', '.nomemories'),
|
|
|
|
]);
|
2023-04-14 22:26:20 +00:00
|
|
|
$search = $root->search(new SearchQuery($comp, 0, 0, [], Util::getUser()));
|
|
|
|
|
2023-08-30 18:10:08 +00:00
|
|
|
$paths = array_unique(array_map(static fn (Node $node) => \dirname($node->getPath()), $search));
|
2023-04-14 22:26:20 +00:00
|
|
|
$this->nomediaCache->set($key, $paths, 60 * 60); // 1 hour
|
|
|
|
|
|
|
|
return $paths;
|
|
|
|
}
|
|
|
|
|
2023-03-22 18:24:15 +00:00
|
|
|
/**
|
|
|
|
* Get a file with ID for the current user.
|
2023-03-24 00:19:05 +00:00
|
|
|
*
|
|
|
|
* @throws Exceptions\NotFoundFile
|
2023-03-22 18:24:15 +00:00
|
|
|
*/
|
2023-03-24 00:19:05 +00:00
|
|
|
public function getUserFile(int $fileId): File
|
|
|
|
{
|
|
|
|
$file = $this->getUserFileOrNull($fileId);
|
|
|
|
if (null === $file) {
|
|
|
|
throw Exceptions::NotFoundFile($fileId);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $file;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a file with ID for the current user.
|
|
|
|
*/
|
|
|
|
public function getUserFileOrNull(int $fileId): ?File
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
// Don't check self for share token
|
|
|
|
if ($this->getShareToken()) {
|
|
|
|
return $this->getShareFile($fileId);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check both user folder and album
|
|
|
|
return $this->getUserFolderFile($fileId) ??
|
|
|
|
$this->getAlbumFile($fileId);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a file with ID from user's folder.
|
|
|
|
*/
|
2023-03-23 21:45:56 +00:00
|
|
|
public function getUserFolderFile(int $id): ?File
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
if (null === $user) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
$userFolder = $this->rootFolder->getUserFolder($user->getUID());
|
|
|
|
|
|
|
|
// No need to force permissions when reading
|
|
|
|
// from the user's own folder. This includes shared
|
|
|
|
// folders and files from other users.
|
|
|
|
return $this->getOneFileFromFolder($userFolder, $id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a file with ID from an album.
|
2023-03-23 21:45:56 +00:00
|
|
|
*
|
|
|
|
* @param int $id FileID
|
2023-03-22 18:24:15 +00:00
|
|
|
*/
|
2023-03-23 21:45:56 +00:00
|
|
|
public function getAlbumFile(int $id): ?File
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
$user = $this->userSession->getUser();
|
|
|
|
if (null === $user) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
$uid = $user->getUID();
|
|
|
|
|
2023-03-23 23:58:49 +00:00
|
|
|
$owner = $this->albumsQuery->userHasFile($uid, $id);
|
2023-03-22 18:24:15 +00:00
|
|
|
if (!$owner) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$folder = $this->rootFolder->getUserFolder($owner);
|
|
|
|
|
|
|
|
// Album files are always read-only
|
|
|
|
// Note that albums have lowest priority, so it means the
|
|
|
|
// user doesn't have access to the file in their own folder.
|
|
|
|
return $this->getOneFileFromFolder($folder, $id, \OCP\Constants::PERMISSION_READ);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a file with ID from a public share.
|
|
|
|
*
|
2023-03-23 21:45:56 +00:00
|
|
|
* @param int $id FileID
|
2023-03-22 18:24:15 +00:00
|
|
|
*/
|
2023-03-23 21:45:56 +00:00
|
|
|
public function getShareFile(int $id): ?File
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
try {
|
|
|
|
// Album share
|
2023-05-23 04:06:22 +00:00
|
|
|
if ($this->hasAlbumToken()) {
|
2023-03-23 23:58:49 +00:00
|
|
|
$album = $this->albumsQuery->getAlbumByLink($this->getShareToken());
|
2023-03-22 18:24:15 +00:00
|
|
|
if (null === $album) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2023-03-23 23:58:49 +00:00
|
|
|
$owner = $this->albumsQuery->hasFile((int) $album['album_id'], $id);
|
2023-03-22 18:24:15 +00:00
|
|
|
if (!$owner) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$folder = $this->rootFolder->getUserFolder($owner);
|
|
|
|
|
|
|
|
// Public albums are always read-only
|
|
|
|
return $this->getOneFileFromFolder($folder, $id, \OCP\Constants::PERMISSION_READ);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Folder share
|
|
|
|
if ($share = $this->getShareNode()) {
|
|
|
|
// Public shares may allow editing
|
|
|
|
// Just use the same permissions as the share
|
|
|
|
if ($share instanceof File) {
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
if ($share instanceof Folder) {
|
|
|
|
return $this->getOneFileFromFolder($share, $id, $share->getPermissions());
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
public function getShareObject()
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
// Get token from request
|
|
|
|
$token = $this->getShareToken();
|
|
|
|
if (null === $token) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get share by token
|
|
|
|
$share = \OC::$server->get(\OCP\Share\IManager::class)->getShareByToken($token);
|
2023-03-23 21:45:56 +00:00
|
|
|
if (!self::validateShare($share)) {
|
2023-03-22 18:24:15 +00:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if share is password protected
|
|
|
|
if (($password = $share->getPassword()) !== null) {
|
|
|
|
$session = \OC::$server->get(\OCP\ISession::class);
|
|
|
|
|
|
|
|
// https://github.com/nextcloud/server/blob/0447b53bda9fe95ea0cbed765aa332584605d652/lib/public/AppFramework/PublicShareController.php#L119
|
|
|
|
if (
|
|
|
|
$session->get('public_link_authenticated_token') !== $token
|
|
|
|
|| $session->get('public_link_authenticated_password_hash') !== $password
|
|
|
|
) {
|
|
|
|
throw new \Exception('Share is password protected and user is not authenticated');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $share;
|
|
|
|
}
|
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
public function getShareNode()
|
2023-03-22 18:24:15 +00:00
|
|
|
{
|
|
|
|
$share = $this->getShareObject();
|
|
|
|
if (null === $share) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
// Get node from share
|
2023-03-22 18:24:15 +00:00
|
|
|
$node = $share->getNode(); // throws exception if not found
|
|
|
|
if (!$node->isReadable() || !$node->isShareable()) {
|
|
|
|
throw new \Exception('Share not found or invalid');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Force permissions from the share onto the node
|
|
|
|
Util::forcePermissions($node, $share->getPermissions());
|
|
|
|
|
|
|
|
return $node;
|
|
|
|
}
|
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
/**
|
|
|
|
* Validate the permissions of the share.
|
|
|
|
*/
|
|
|
|
public static function validateShare(?IShare $share): bool
|
|
|
|
{
|
|
|
|
if (null === $share) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get user manager
|
|
|
|
$userManager = \OC::$server->get(IUserManager::class);
|
|
|
|
|
|
|
|
// Check if share read is allowed
|
|
|
|
if (!($share->getPermissions() & \OCP\Constants::PERMISSION_READ)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the owner is disabled no access to the linke is granted
|
|
|
|
$owner = $userManager->get($share->getShareOwner());
|
|
|
|
if (null === $owner || !$owner->isEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the initiator of the share is disabled no access is granted
|
|
|
|
$initiator = $userManager->get($share->getSharedBy());
|
|
|
|
if (null === $initiator || !$initiator->isEnabled()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $share->getNode()->isReadable() && $share->getNode()->isShareable();
|
|
|
|
}
|
|
|
|
|
2023-03-22 18:24:15 +00:00
|
|
|
/**
|
|
|
|
* Helper to get one file or null from a fiolder.
|
|
|
|
*
|
|
|
|
* @param Folder $folder Folder to search in
|
|
|
|
* @param int $id Id of the file
|
|
|
|
* @param int $perm Permissions to force on the file
|
|
|
|
*/
|
|
|
|
private function getOneFileFromFolder(Folder $folder, int $id, int $perm = -1): ?File
|
|
|
|
{
|
|
|
|
// Check for permissions and get numeric Id
|
|
|
|
$file = $folder->getById($id);
|
|
|
|
if (0 === \count($file)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
$file = $file[0];
|
|
|
|
|
|
|
|
// Check if node is a file
|
|
|
|
if (!$file instanceof File) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check read permission
|
|
|
|
if (!$file->isReadable()) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Force file permissions if required
|
|
|
|
if ($perm >= 0) {
|
|
|
|
Util::forcePermissions($file, $perm);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $file;
|
|
|
|
}
|
2023-03-23 21:45:56 +00:00
|
|
|
|
2023-05-23 04:06:22 +00:00
|
|
|
private function hasAlbumToken(): bool
|
|
|
|
{
|
|
|
|
return null !== $this->request->getParam(\OCA\Memories\ClustersBackend\AlbumsBackend::clusterType(), null);
|
|
|
|
}
|
|
|
|
|
2023-03-23 21:45:56 +00:00
|
|
|
private function getShareToken()
|
|
|
|
{
|
|
|
|
return $this->request->getParam('token');
|
|
|
|
}
|
2023-03-22 18:24:15 +00:00
|
|
|
}
|