mirror of
https://github.com/nextcloud/server.git
synced 2024-12-29 00:18:42 +00:00
bb598c8451
Bumps [nextcloud/coding-standard](https://github.com/nextcloud/coding-standard) from 1.3.1 to 1.3.2. - [Release notes](https://github.com/nextcloud/coding-standard/releases) - [Changelog](https://github.com/nextcloud/coding-standard/blob/master/CHANGELOG.md) - [Commits](https://github.com/nextcloud/coding-standard/compare/v1.3.1...v1.3.2) --- updated-dependencies: - dependency-name: nextcloud/coding-standard dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: provokateurin <kate@provokateurin.de>
304 lines
12 KiB
PHP
304 lines
12 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
/**
|
|
* SPDX-FileCopyrightText: 2016 Nextcloud GmbH and Nextcloud contributors
|
|
* SPDX-License-Identifier: AGPL-3.0-or-later
|
|
*/
|
|
namespace OC\Template;
|
|
|
|
use bantu\IniGetWrapper\IniGetWrapper;
|
|
use OC\Authentication\Token\IProvider;
|
|
use OC\CapabilitiesManager;
|
|
use OC\Files\FilenameValidator;
|
|
use OC\Share\Share;
|
|
use OCA\Provisioning_API\Controller\AUserData;
|
|
use OCP\App\AppPathNotFoundException;
|
|
use OCP\App\IAppManager;
|
|
use OCP\Authentication\Exceptions\ExpiredTokenException;
|
|
use OCP\Authentication\Exceptions\InvalidTokenException;
|
|
use OCP\Authentication\Exceptions\WipeTokenException;
|
|
use OCP\Authentication\Token\IToken;
|
|
use OCP\Constants;
|
|
use OCP\Defaults;
|
|
use OCP\Files\FileInfo;
|
|
use OCP\IConfig;
|
|
use OCP\IGroupManager;
|
|
use OCP\IInitialStateService;
|
|
use OCP\IL10N;
|
|
use OCP\ILogger;
|
|
use OCP\ISession;
|
|
use OCP\IURLGenerator;
|
|
use OCP\IUser;
|
|
use OCP\ServerVersion;
|
|
use OCP\Session\Exceptions\SessionNotAvailableException;
|
|
use OCP\Share\IManager as IShareManager;
|
|
use OCP\User\Backend\IPasswordConfirmationBackend;
|
|
use OCP\Util;
|
|
|
|
class JSConfigHelper {
|
|
|
|
/** @var array user back-ends excluded from password verification */
|
|
private $excludedUserBackEnds = ['user_saml' => true, 'user_globalsiteselector' => true];
|
|
|
|
public function __construct(
|
|
protected ServerVersion $serverVersion,
|
|
protected IL10N $l,
|
|
protected Defaults $defaults,
|
|
protected IAppManager $appManager,
|
|
protected ISession $session,
|
|
protected ?IUser $currentUser,
|
|
protected IConfig $config,
|
|
protected IGroupManager $groupManager,
|
|
protected IniGetWrapper $iniWrapper,
|
|
protected IURLGenerator $urlGenerator,
|
|
protected CapabilitiesManager $capabilitiesManager,
|
|
protected IInitialStateService $initialStateService,
|
|
protected IProvider $tokenProvider,
|
|
protected FilenameValidator $filenameValidator,
|
|
) {
|
|
}
|
|
|
|
public function getConfig(): string {
|
|
$userBackendAllowsPasswordConfirmation = true;
|
|
if ($this->currentUser !== null) {
|
|
$uid = $this->currentUser->getUID();
|
|
|
|
$backend = $this->currentUser->getBackend();
|
|
if ($backend instanceof IPasswordConfirmationBackend) {
|
|
$userBackendAllowsPasswordConfirmation = $backend->canConfirmPassword($uid);
|
|
} elseif (isset($this->excludedUserBackEnds[$this->currentUser->getBackendClassName()])) {
|
|
$userBackendAllowsPasswordConfirmation = false;
|
|
}
|
|
} else {
|
|
$uid = null;
|
|
}
|
|
|
|
// Get the config
|
|
$apps_paths = [];
|
|
|
|
if ($this->currentUser === null) {
|
|
$apps = $this->appManager->getInstalledApps();
|
|
} else {
|
|
$apps = $this->appManager->getEnabledAppsForUser($this->currentUser);
|
|
}
|
|
|
|
foreach ($apps as $app) {
|
|
try {
|
|
$apps_paths[$app] = $this->appManager->getAppWebPath($app);
|
|
} catch (AppPathNotFoundException $e) {
|
|
$apps_paths[$app] = false;
|
|
}
|
|
}
|
|
|
|
$enableLinkPasswordByDefault = $this->config->getAppValue('core', 'shareapi_enable_link_password_by_default', 'no');
|
|
$enableLinkPasswordByDefault = $enableLinkPasswordByDefault === 'yes';
|
|
$defaultExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
|
|
$defaultExpireDate = $enforceDefaultExpireDate = null;
|
|
if ($defaultExpireDateEnabled) {
|
|
$defaultExpireDate = (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
|
|
$enforceDefaultExpireDate = $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
|
|
}
|
|
$outgoingServer2serverShareEnabled = $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes';
|
|
|
|
$defaultInternalExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_internal_expire_date', 'no') === 'yes';
|
|
$defaultInternalExpireDate = $defaultInternalExpireDateEnforced = null;
|
|
if ($defaultInternalExpireDateEnabled) {
|
|
$defaultInternalExpireDate = (int)$this->config->getAppValue('core', 'shareapi_internal_expire_after_n_days', '7');
|
|
$defaultInternalExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_internal_expire_date', 'no') === 'yes';
|
|
}
|
|
|
|
$defaultRemoteExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_remote_expire_date', 'no') === 'yes';
|
|
$defaultRemoteExpireDate = $defaultRemoteExpireDateEnforced = null;
|
|
if ($defaultRemoteExpireDateEnabled) {
|
|
$defaultRemoteExpireDate = (int)$this->config->getAppValue('core', 'shareapi_remote_expire_after_n_days', '7');
|
|
$defaultRemoteExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_remote_expire_date', 'no') === 'yes';
|
|
}
|
|
|
|
$countOfDataLocation = 0;
|
|
$dataLocation = str_replace(\OC::$SERVERROOT . '/', '', $this->config->getSystemValue('datadirectory', ''), $countOfDataLocation);
|
|
if ($countOfDataLocation !== 1 || $uid === null || !$this->groupManager->isAdmin($uid)) {
|
|
$dataLocation = false;
|
|
}
|
|
|
|
if ($this->currentUser instanceof IUser) {
|
|
if ($this->canUserValidatePassword()) {
|
|
$lastConfirmTimestamp = $this->session->get('last-password-confirm');
|
|
if (!is_int($lastConfirmTimestamp)) {
|
|
$lastConfirmTimestamp = 0;
|
|
}
|
|
} else {
|
|
$lastConfirmTimestamp = PHP_INT_MAX;
|
|
}
|
|
} else {
|
|
$lastConfirmTimestamp = 0;
|
|
}
|
|
|
|
$capabilities = $this->capabilitiesManager->getCapabilities(false, true);
|
|
|
|
$userFirstDay = $this->config->getUserValue($uid, 'core', AUserData::USER_FIELD_FIRST_DAY_OF_WEEK, null);
|
|
$firstDay = (int)($userFirstDay ?? $this->l->l('firstday', null));
|
|
|
|
$config = [
|
|
/** @deprecated 30.0.0 - use files capabilities instead */
|
|
'blacklist_files_regex' => FileInfo::BLACKLIST_FILES_REGEX,
|
|
/** @deprecated 30.0.0 - use files capabilities instead */
|
|
'forbidden_filename_characters' => $this->filenameValidator->getForbiddenCharacters(),
|
|
|
|
'auto_logout' => $this->config->getSystemValue('auto_logout', false),
|
|
'loglevel' => $this->config->getSystemValue('loglevel_frontend',
|
|
$this->config->getSystemValue('loglevel', ILogger::WARN)
|
|
),
|
|
'lost_password_link' => $this->config->getSystemValue('lost_password_link', null),
|
|
'modRewriteWorking' => $this->config->getSystemValue('htaccess.IgnoreFrontController', false) === true || getenv('front_controller_active') === 'true',
|
|
'no_unsupported_browser_warning' => $this->config->getSystemValue('no_unsupported_browser_warning', false),
|
|
'session_keepalive' => $this->config->getSystemValue('session_keepalive', true),
|
|
'session_lifetime' => min($this->config->getSystemValue('session_lifetime', $this->iniWrapper->getNumeric('session.gc_maxlifetime')), $this->iniWrapper->getNumeric('session.gc_maxlifetime')),
|
|
'sharing.maxAutocompleteResults' => max(0, $this->config->getSystemValueInt('sharing.maxAutocompleteResults', Constants::SHARING_MAX_AUTOCOMPLETE_RESULTS_DEFAULT)),
|
|
'sharing.minSearchStringLength' => $this->config->getSystemValueInt('sharing.minSearchStringLength', 0),
|
|
'version' => implode('.', $this->serverVersion->getVersion()),
|
|
'versionstring' => $this->serverVersion->getVersionString(),
|
|
'enable_non-accessible_features' => $this->config->getSystemValueBool('enable_non-accessible_features', true),
|
|
];
|
|
|
|
$array = [
|
|
'_oc_debug' => $this->config->getSystemValue('debug', false) ? 'true' : 'false',
|
|
'_oc_isadmin' => $uid !== null && $this->groupManager->isAdmin($uid) ? 'true' : 'false',
|
|
'backendAllowsPasswordConfirmation' => $userBackendAllowsPasswordConfirmation ? 'true' : 'false',
|
|
'oc_dataURL' => is_string($dataLocation) ? '"' . $dataLocation . '"' : 'false',
|
|
'_oc_webroot' => '"' . \OC::$WEBROOT . '"',
|
|
'_oc_appswebroots' => str_replace('\\/', '/', json_encode($apps_paths)), // Ugly unescape slashes waiting for better solution
|
|
'datepickerFormatDate' => json_encode($this->l->l('jsdate', null)),
|
|
'nc_lastLogin' => $lastConfirmTimestamp,
|
|
'nc_pageLoad' => time(),
|
|
'dayNames' => json_encode([
|
|
$this->l->t('Sunday'),
|
|
$this->l->t('Monday'),
|
|
$this->l->t('Tuesday'),
|
|
$this->l->t('Wednesday'),
|
|
$this->l->t('Thursday'),
|
|
$this->l->t('Friday'),
|
|
$this->l->t('Saturday')
|
|
]),
|
|
'dayNamesShort' => json_encode([
|
|
$this->l->t('Sun.'),
|
|
$this->l->t('Mon.'),
|
|
$this->l->t('Tue.'),
|
|
$this->l->t('Wed.'),
|
|
$this->l->t('Thu.'),
|
|
$this->l->t('Fri.'),
|
|
$this->l->t('Sat.')
|
|
]),
|
|
'dayNamesMin' => json_encode([
|
|
$this->l->t('Su'),
|
|
$this->l->t('Mo'),
|
|
$this->l->t('Tu'),
|
|
$this->l->t('We'),
|
|
$this->l->t('Th'),
|
|
$this->l->t('Fr'),
|
|
$this->l->t('Sa')
|
|
]),
|
|
'monthNames' => json_encode([
|
|
$this->l->t('January'),
|
|
$this->l->t('February'),
|
|
$this->l->t('March'),
|
|
$this->l->t('April'),
|
|
$this->l->t('May'),
|
|
$this->l->t('June'),
|
|
$this->l->t('July'),
|
|
$this->l->t('August'),
|
|
$this->l->t('September'),
|
|
$this->l->t('October'),
|
|
$this->l->t('November'),
|
|
$this->l->t('December')
|
|
]),
|
|
'monthNamesShort' => json_encode([
|
|
$this->l->t('Jan.'),
|
|
$this->l->t('Feb.'),
|
|
$this->l->t('Mar.'),
|
|
$this->l->t('Apr.'),
|
|
$this->l->t('May.'),
|
|
$this->l->t('Jun.'),
|
|
$this->l->t('Jul.'),
|
|
$this->l->t('Aug.'),
|
|
$this->l->t('Sep.'),
|
|
$this->l->t('Oct.'),
|
|
$this->l->t('Nov.'),
|
|
$this->l->t('Dec.')
|
|
]),
|
|
'firstDay' => json_encode($firstDay),
|
|
'_oc_config' => json_encode($config),
|
|
'oc_appconfig' => json_encode([
|
|
'core' => [
|
|
'defaultExpireDateEnabled' => $defaultExpireDateEnabled,
|
|
'defaultExpireDate' => $defaultExpireDate,
|
|
'defaultExpireDateEnforced' => $enforceDefaultExpireDate,
|
|
'enforcePasswordForPublicLink' => Util::isPublicLinkPasswordRequired(),
|
|
'enableLinkPasswordByDefault' => $enableLinkPasswordByDefault,
|
|
'sharingDisabledForUser' => Util::isSharingDisabledForUser(),
|
|
'resharingAllowed' => Share::isResharingAllowed(),
|
|
'remoteShareAllowed' => $outgoingServer2serverShareEnabled,
|
|
'federatedCloudShareDoc' => $this->urlGenerator->linkToDocs('user-sharing-federated'),
|
|
'allowGroupSharing' => \OC::$server->get(IShareManager::class)->allowGroupSharing(),
|
|
'defaultInternalExpireDateEnabled' => $defaultInternalExpireDateEnabled,
|
|
'defaultInternalExpireDate' => $defaultInternalExpireDate,
|
|
'defaultInternalExpireDateEnforced' => $defaultInternalExpireDateEnforced,
|
|
'defaultRemoteExpireDateEnabled' => $defaultRemoteExpireDateEnabled,
|
|
'defaultRemoteExpireDate' => $defaultRemoteExpireDate,
|
|
'defaultRemoteExpireDateEnforced' => $defaultRemoteExpireDateEnforced,
|
|
]
|
|
]),
|
|
'_theme' => json_encode([
|
|
'entity' => $this->defaults->getEntity(),
|
|
'name' => $this->defaults->getName(),
|
|
'productName' => $this->defaults->getProductName(),
|
|
'title' => $this->defaults->getTitle(),
|
|
'baseUrl' => $this->defaults->getBaseUrl(),
|
|
'syncClientUrl' => $this->defaults->getSyncClientUrl(),
|
|
'docBaseUrl' => $this->defaults->getDocBaseUrl(),
|
|
'docPlaceholderUrl' => $this->defaults->buildDocLinkToKey('PLACEHOLDER'),
|
|
'slogan' => $this->defaults->getSlogan(),
|
|
'logoClaim' => '',
|
|
'folder' => \OC_Util::getTheme(),
|
|
]),
|
|
];
|
|
|
|
if ($this->currentUser !== null) {
|
|
$array['oc_userconfig'] = json_encode([
|
|
'avatar' => [
|
|
'version' => (int)$this->config->getUserValue($uid, 'avatar', 'version', 0),
|
|
'generated' => $this->config->getUserValue($uid, 'avatar', 'generated', 'true') === 'true',
|
|
]
|
|
]);
|
|
}
|
|
|
|
$this->initialStateService->provideInitialState('core', 'projects_enabled', $this->config->getSystemValueBool('projects.enabled', false));
|
|
|
|
$this->initialStateService->provideInitialState('core', 'config', $config);
|
|
$this->initialStateService->provideInitialState('core', 'capabilities', $capabilities);
|
|
|
|
// Allow hooks to modify the output values
|
|
\OC_Hook::emit('\OCP\Config', 'js', ['array' => &$array]);
|
|
|
|
$result = '';
|
|
|
|
// Echo it
|
|
foreach ($array as $setting => $value) {
|
|
$result .= 'var ' . $setting . '=' . $value . ';' . PHP_EOL;
|
|
}
|
|
|
|
return $result;
|
|
}
|
|
|
|
protected function canUserValidatePassword(): bool {
|
|
try {
|
|
$token = $this->tokenProvider->getToken($this->session->getId());
|
|
} catch (ExpiredTokenException|WipeTokenException|InvalidTokenException|SessionNotAvailableException) {
|
|
// actually we do not know, so we fall back to this statement
|
|
return true;
|
|
}
|
|
$scope = $token->getScopeAsArray();
|
|
return !isset($scope[IToken::SCOPE_SKIP_PASSWORD_VALIDATION]) || $scope[IToken::SCOPE_SKIP_PASSWORD_VALIDATION] === false;
|
|
}
|
|
}
|