123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577 |
- <?php
- declare(strict_types=1);
- /**
- * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- namespace OC;
- use bantu\IniGetWrapper\IniGetWrapper;
- use Exception;
- use InvalidArgumentException;
- use OC\Authentication\Token\PublicKeyTokenProvider;
- use OC\Authentication\Token\TokenCleanupJob;
- use OC\Log\Rotate;
- use OC\Preview\BackgroundCleanupJob;
- use OC\TextProcessing\RemoveOldTasksBackgroundJob;
- use OCP\AppFramework\Utility\ITimeFactory;
- use OCP\BackgroundJob\IJobList;
- use OCP\Defaults;
- use OCP\IAppConfig;
- use OCP\IConfig;
- use OCP\IGroup;
- use OCP\IGroupManager;
- use OCP\IL10N;
- use OCP\IRequest;
- use OCP\IUserManager;
- use OCP\IUserSession;
- use OCP\L10N\IFactory as IL10NFactory;
- use OCP\Migration\IOutput;
- use OCP\Security\ISecureRandom;
- use OCP\Server;
- use OCP\ServerVersion;
- use Psr\Log\LoggerInterface;
- class Setup {
- protected IL10N $l10n;
- public function __construct(
- protected SystemConfig $config,
- protected IniGetWrapper $iniWrapper,
- IL10NFactory $l10nFactory,
- protected Defaults $defaults,
- protected LoggerInterface $logger,
- protected ISecureRandom $random,
- protected Installer $installer,
- ) {
- $this->l10n = $l10nFactory->get('lib');
- }
- protected static array $dbSetupClasses = [
- 'mysql' => \OC\Setup\MySQL::class,
- 'pgsql' => \OC\Setup\PostgreSQL::class,
- 'oci' => \OC\Setup\OCI::class,
- 'sqlite' => \OC\Setup\Sqlite::class,
- 'sqlite3' => \OC\Setup\Sqlite::class,
- ];
- /**
- * Wrapper around the "class_exists" PHP function to be able to mock it
- */
- protected function class_exists(string $name): bool {
- return class_exists($name);
- }
- /**
- * Wrapper around the "is_callable" PHP function to be able to mock it
- */
- protected function is_callable(string $name): bool {
- return is_callable($name);
- }
- /**
- * Wrapper around \PDO::getAvailableDrivers
- */
- protected function getAvailableDbDriversForPdo(): array {
- if (class_exists(\PDO::class)) {
- return \PDO::getAvailableDrivers();
- }
- return [];
- }
- /**
- * Get the available and supported databases of this instance
- *
- * @return array
- * @throws Exception
- */
- public function getSupportedDatabases(bool $allowAllDatabases = false): array {
- $availableDatabases = [
- 'sqlite' => [
- 'type' => 'pdo',
- 'call' => 'sqlite',
- 'name' => 'SQLite',
- ],
- 'mysql' => [
- 'type' => 'pdo',
- 'call' => 'mysql',
- 'name' => 'MySQL/MariaDB',
- ],
- 'pgsql' => [
- 'type' => 'pdo',
- 'call' => 'pgsql',
- 'name' => 'PostgreSQL',
- ],
- 'oci' => [
- 'type' => 'function',
- 'call' => 'oci_connect',
- 'name' => 'Oracle',
- ],
- ];
- if ($allowAllDatabases) {
- $configuredDatabases = array_keys($availableDatabases);
- } else {
- $configuredDatabases = $this->config->getValue('supportedDatabases',
- ['sqlite', 'mysql', 'pgsql']);
- }
- if (!is_array($configuredDatabases)) {
- throw new Exception('Supported databases are not properly configured.');
- }
- $supportedDatabases = [];
- foreach ($configuredDatabases as $database) {
- if (array_key_exists($database, $availableDatabases)) {
- $working = false;
- $type = $availableDatabases[$database]['type'];
- $call = $availableDatabases[$database]['call'];
- if ($type === 'function') {
- $working = $this->is_callable($call);
- } elseif ($type === 'pdo') {
- $working = in_array($call, $this->getAvailableDbDriversForPdo(), true);
- }
- if ($working) {
- $supportedDatabases[$database] = $availableDatabases[$database]['name'];
- }
- }
- }
- return $supportedDatabases;
- }
- /**
- * Gathers system information like database type and does
- * a few system checks.
- *
- * @return array of system info, including an "errors" value
- * in case of errors/warnings
- */
- public function getSystemInfo(bool $allowAllDatabases = false): array {
- $databases = $this->getSupportedDatabases($allowAllDatabases);
- $dataDir = $this->config->getValue('datadirectory', \OC::$SERVERROOT . '/data');
- $errors = [];
- // Create data directory to test whether the .htaccess works
- // Notice that this is not necessarily the same data directory as the one
- // that will effectively be used.
- if (!file_exists($dataDir)) {
- @mkdir($dataDir);
- }
- $htAccessWorking = true;
- if (is_dir($dataDir) && is_writable($dataDir)) {
- // Protect data directory here, so we can test if the protection is working
- self::protectDataDirectory();
- try {
- $util = new \OC_Util();
- $htAccessWorking = $util->isHtaccessWorking(Server::get(IConfig::class));
- } catch (\OCP\HintException $e) {
- $errors[] = [
- 'error' => $e->getMessage(),
- 'exception' => $e,
- 'hint' => $e->getHint(),
- ];
- $htAccessWorking = false;
- }
- }
- if (\OC_Util::runningOnMac()) {
- $errors[] = [
- 'error' => $this->l10n->t(
- 'Mac OS X is not supported and %s will not work properly on this platform. ' .
- 'Use it at your own risk! ',
- [$this->defaults->getProductName()]
- ),
- 'hint' => $this->l10n->t('For the best results, please consider using a GNU/Linux server instead.'),
- ];
- }
- if ($this->iniWrapper->getString('open_basedir') !== '' && PHP_INT_SIZE === 4) {
- $errors[] = [
- 'error' => $this->l10n->t(
- 'It seems that this %s instance is running on a 32-bit PHP environment and the open_basedir has been configured in php.ini. ' .
- 'This will lead to problems with files over 4 GB and is highly discouraged.',
- [$this->defaults->getProductName()]
- ),
- 'hint' => $this->l10n->t('Please remove the open_basedir setting within your php.ini or switch to 64-bit PHP.'),
- ];
- }
- return [
- 'hasSQLite' => isset($databases['sqlite']),
- 'hasMySQL' => isset($databases['mysql']),
- 'hasPostgreSQL' => isset($databases['pgsql']),
- 'hasOracle' => isset($databases['oci']),
- 'databases' => $databases,
- 'directory' => $dataDir,
- 'htaccessWorking' => $htAccessWorking,
- 'errors' => $errors,
- ];
- }
- /**
- * @return array<string|array> errors
- */
- public function install(array $options, ?IOutput $output = null): array {
- $l = $this->l10n;
- $error = [];
- $dbType = $options['dbtype'];
- if (empty($options['adminlogin'])) {
- $error[] = $l->t('Set an admin Login.');
- }
- if (empty($options['adminpass'])) {
- $error[] = $l->t('Set an admin password.');
- }
- if (empty($options['directory'])) {
- $options['directory'] = \OC::$SERVERROOT . '/data';
- }
- if (!isset(self::$dbSetupClasses[$dbType])) {
- $dbType = 'sqlite';
- }
- $username = htmlspecialchars_decode($options['adminlogin']);
- $password = htmlspecialchars_decode($options['adminpass']);
- $dataDir = htmlspecialchars_decode($options['directory']);
- $class = self::$dbSetupClasses[$dbType];
- /** @var \OC\Setup\AbstractDatabase $dbSetup */
- $dbSetup = new $class($l, $this->config, $this->logger, $this->random);
- $error = array_merge($error, $dbSetup->validate($options));
- // validate the data directory
- if ((!is_dir($dataDir) && !mkdir($dataDir)) || !is_writable($dataDir)) {
- $error[] = $l->t('Cannot create or write into the data directory %s', [$dataDir]);
- }
- if (!empty($error)) {
- return $error;
- }
- $request = Server::get(IRequest::class);
- //no errors, good
- if (isset($options['trusted_domains'])
- && is_array($options['trusted_domains'])) {
- $trustedDomains = $options['trusted_domains'];
- } else {
- $trustedDomains = [$request->getInsecureServerHost()];
- }
- //use sqlite3 when available, otherwise sqlite2 will be used.
- if ($dbType === 'sqlite' && class_exists('SQLite3')) {
- $dbType = 'sqlite3';
- }
- //generate a random salt that is used to salt the local passwords
- $salt = $this->random->generate(30);
- // generate a secret
- $secret = $this->random->generate(48);
- //write the config file
- $newConfigValues = [
- 'passwordsalt' => $salt,
- 'secret' => $secret,
- 'trusted_domains' => $trustedDomains,
- 'datadirectory' => $dataDir,
- 'dbtype' => $dbType,
- 'version' => implode('.', \OCP\Util::getVersion()),
- ];
- if ($this->config->getValue('overwrite.cli.url', null) === null) {
- $newConfigValues['overwrite.cli.url'] = $request->getServerProtocol() . '://' . $request->getInsecureServerHost() . \OC::$WEBROOT;
- }
- $this->config->setValues($newConfigValues);
- $this->outputDebug($output, 'Configuring database');
- $dbSetup->initialize($options);
- try {
- $dbSetup->setupDatabase($username);
- } catch (\OC\DatabaseSetupException $e) {
- $error[] = [
- 'error' => $e->getMessage(),
- 'exception' => $e,
- 'hint' => $e->getHint(),
- ];
- return $error;
- } catch (Exception $e) {
- $error[] = [
- 'error' => 'Error while trying to create admin account: ' . $e->getMessage(),
- 'exception' => $e,
- 'hint' => '',
- ];
- return $error;
- }
- $this->outputDebug($output, 'Run server migrations');
- try {
- // apply necessary migrations
- $dbSetup->runMigrations($output);
- } catch (Exception $e) {
- $error[] = [
- 'error' => 'Error while trying to initialise the database: ' . $e->getMessage(),
- 'exception' => $e,
- 'hint' => '',
- ];
- return $error;
- }
- $this->outputDebug($output, 'Create admin account');
- // create the admin account and group
- $user = null;
- try {
- $user = Server::get(IUserManager::class)->createUser($username, $password);
- if (!$user) {
- $error[] = "Account <$username> could not be created.";
- return $error;
- }
- } catch (Exception $exception) {
- $error[] = $exception->getMessage();
- return $error;
- }
- $config = Server::get(IConfig::class);
- $config->setAppValue('core', 'installedat', (string)microtime(true));
- $appConfig = Server::get(IAppConfig::class);
- $appConfig->setValueInt('core', 'lastupdatedat', time());
- $vendorData = $this->getVendorData();
- $config->setAppValue('core', 'vendor', $vendorData['vendor']);
- if ($vendorData['channel'] !== 'stable') {
- $config->setSystemValue('updater.release.channel', $vendorData['channel']);
- }
- $group = Server::get(IGroupManager::class)->createGroup('admin');
- if ($group instanceof IGroup) {
- $group->addUser($user);
- }
- // Install shipped apps and specified app bundles
- $this->outputDebug($output, 'Install default apps');
- Installer::installShippedApps(false, $output);
- // create empty file in data dir, so we can later find
- // out that this is indeed a Nextcloud data directory
- $this->outputDebug($output, 'Setup data directory');
- file_put_contents(
- $config->getSystemValueString('datadirectory', \OC::$SERVERROOT . '/data') . '/.ncdata',
- "# Nextcloud data directory\n# Do not change this file",
- );
- // Update .htaccess files
- self::updateHtaccess();
- self::protectDataDirectory();
- $this->outputDebug($output, 'Install background jobs');
- self::installBackgroundJobs();
- //and we are done
- $config->setSystemValue('installed', true);
- if (self::shouldRemoveCanInstallFile()) {
- unlink(\OC::$configDir . '/CAN_INSTALL');
- }
- $bootstrapCoordinator = Server::get(\OC\AppFramework\Bootstrap\Coordinator::class);
- $bootstrapCoordinator->runInitialRegistration();
- // Create a session token for the newly created user
- // The token provider requires a working db, so it's not injected on setup
- /** @var \OC\User\Session $userSession */
- $userSession = Server::get(IUserSession::class);
- $provider = Server::get(PublicKeyTokenProvider::class);
- $userSession->setTokenProvider($provider);
- $userSession->login($username, $password);
- $user = $userSession->getUser();
- if (!$user) {
- $error[] = 'No account found in session.';
- return $error;
- }
- $userSession->createSessionToken($request, $user->getUID(), $username, $password);
- $session = $userSession->getSession();
- $session->set('last-password-confirm', Server::get(ITimeFactory::class)->getTime());
- // Set email for admin
- if (!empty($options['adminemail'])) {
- $user->setSystemEMailAddress($options['adminemail']);
- }
- return $error;
- }
- public static function installBackgroundJobs(): void {
- $jobList = Server::get(IJobList::class);
- $jobList->add(TokenCleanupJob::class);
- $jobList->add(Rotate::class);
- $jobList->add(BackgroundCleanupJob::class);
- $jobList->add(RemoveOldTasksBackgroundJob::class);
- }
- /**
- * @return string Absolute path to htaccess
- */
- private function pathToHtaccess(): string {
- return \OC::$SERVERROOT . '/.htaccess';
- }
- /**
- * Find webroot from config
- *
- * @throws InvalidArgumentException when invalid value for overwrite.cli.url
- */
- private static function findWebRoot(SystemConfig $config): string {
- // For CLI read the value from overwrite.cli.url
- if (\OC::$CLI) {
- $webRoot = $config->getValue('overwrite.cli.url', '');
- if ($webRoot === '') {
- throw new InvalidArgumentException('overwrite.cli.url is empty');
- }
- if (!filter_var($webRoot, FILTER_VALIDATE_URL)) {
- throw new InvalidArgumentException('invalid value for overwrite.cli.url');
- }
- $webRoot = rtrim((parse_url($webRoot, PHP_URL_PATH) ?? ''), '/');
- } else {
- $webRoot = !empty(\OC::$WEBROOT) ? \OC::$WEBROOT : '/';
- }
- return $webRoot;
- }
- /**
- * Append the correct ErrorDocument path for Apache hosts
- *
- * @return bool True when success, False otherwise
- * @throws \OCP\AppFramework\QueryException
- */
- public static function updateHtaccess(): bool {
- $config = Server::get(SystemConfig::class);
- try {
- $webRoot = self::findWebRoot($config);
- } catch (InvalidArgumentException $e) {
- return false;
- }
- $setupHelper = Server::get(\OC\Setup::class);
- if (!is_writable($setupHelper->pathToHtaccess())) {
- return false;
- }
- $htaccessContent = file_get_contents($setupHelper->pathToHtaccess());
- $content = "#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####\n";
- $htaccessContent = explode($content, $htaccessContent, 2)[0];
- //custom 403 error page
- $content .= "\nErrorDocument 403 " . $webRoot . '/index.php/error/403';
- //custom 404 error page
- $content .= "\nErrorDocument 404 " . $webRoot . '/index.php/error/404';
- // Add rewrite rules if the RewriteBase is configured
- $rewriteBase = $config->getValue('htaccess.RewriteBase', '');
- if ($rewriteBase !== '') {
- $content .= "\n<IfModule mod_rewrite.c>";
- $content .= "\n Options -MultiViews";
- $content .= "\n RewriteRule ^core/js/oc.js$ index.php [PT,E=PATH_INFO:$1]";
- $content .= "\n RewriteRule ^core/preview.png$ index.php [PT,E=PATH_INFO:$1]";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !\\.(css|js|mjs|svg|gif|ico|jpg|jpeg|png|webp|html|otf|ttf|woff2?|map|webm|mp4|mp3|ogg|wav|flac|wasm|tflite)$";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/core/ajax/update\\.php";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/core/img/(favicon\\.ico|manifest\\.json)$";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/(cron|public|remote|status)\\.php";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/ocs/v(1|2)\\.php";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/robots\\.txt";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/(ocs-provider|updater)/";
- $content .= "\n RewriteCond %{REQUEST_URI} !^/\\.well-known/(acme-challenge|pki-validation)/.*";
- $content .= "\n RewriteCond %{REQUEST_FILENAME} !/richdocumentscode(_arm64)?/proxy.php$";
- $content .= "\n RewriteRule . index.php [PT,E=PATH_INFO:$1]";
- $content .= "\n RewriteBase " . $rewriteBase;
- $content .= "\n <IfModule mod_env.c>";
- $content .= "\n SetEnv front_controller_active true";
- $content .= "\n <IfModule mod_dir.c>";
- $content .= "\n DirectorySlash off";
- $content .= "\n </IfModule>";
- $content .= "\n </IfModule>";
- $content .= "\n</IfModule>";
- }
- // Never write file back if disk space should be too low
- if (function_exists('disk_free_space')) {
- $df = disk_free_space(\OC::$SERVERROOT);
- $size = strlen($content) + 10240;
- if ($df !== false && $df < (float)$size) {
- throw new \Exception(\OC::$SERVERROOT . ' does not have enough space for writing the htaccess file! Not writing it back!');
- }
- }
- //suppress errors in case we don't have permissions for it
- return (bool)@file_put_contents($setupHelper->pathToHtaccess(), $htaccessContent . $content . "\n");
- }
- public static function protectDataDirectory(): void {
- //Require all denied
- $now = date('Y-m-d H:i:s');
- $content = "# Generated by Nextcloud on $now\n";
- $content .= "# Section for Apache 2.4 to 2.6\n";
- $content .= "<IfModule mod_authz_core.c>\n";
- $content .= " Require all denied\n";
- $content .= "</IfModule>\n";
- $content .= "<IfModule mod_access_compat.c>\n";
- $content .= " Order Allow,Deny\n";
- $content .= " Deny from all\n";
- $content .= " Satisfy All\n";
- $content .= "</IfModule>\n\n";
- $content .= "# Section for Apache 2.2\n";
- $content .= "<IfModule !mod_authz_core.c>\n";
- $content .= " <IfModule !mod_access_compat.c>\n";
- $content .= " <IfModule mod_authz_host.c>\n";
- $content .= " Order Allow,Deny\n";
- $content .= " Deny from all\n";
- $content .= " </IfModule>\n";
- $content .= " Satisfy All\n";
- $content .= " </IfModule>\n";
- $content .= "</IfModule>\n\n";
- $content .= "# Section for Apache 2.2 to 2.6\n";
- $content .= "<IfModule mod_autoindex.c>\n";
- $content .= " IndexIgnore *\n";
- $content .= '</IfModule>';
- $baseDir = Server::get(IConfig::class)->getSystemValueString('datadirectory', \OC::$SERVERROOT . '/data');
- file_put_contents($baseDir . '/.htaccess', $content);
- file_put_contents($baseDir . '/index.html', '');
- }
- private function getVendorData(): array {
- // this should really be a JSON file
- require \OC::$SERVERROOT . '/version.php';
- /** @var mixed $vendor */
- /** @var mixed $OC_Channel */
- return [
- 'vendor' => (string)$vendor,
- 'channel' => (string)$OC_Channel,
- ];
- }
- public function shouldRemoveCanInstallFile(): bool {
- return Server::get(ServerVersion::class)->getChannel() !== 'git' && is_file(\OC::$configDir . '/CAN_INSTALL');
- }
- public function canInstallFileExists(): bool {
- return is_file(\OC::$configDir . '/CAN_INSTALL');
- }
- protected function outputDebug(?IOutput $output, string $message): void {
- if ($output instanceof IOutput) {
- $output->debug($message);
- }
- }
- }
|