123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315 |
- <?php
- declare(strict_types=1);
- /**
- * @copyright Copyright (c) 2016, Roeland Jago Douma <roeland@famdouma.nl>
- *
- * @author Abijeet <abijeetpatro@gmail.com>
- * @author Arthur Schiwon <blizzz@arthur-schiwon.de>
- * @author Bjoern Schiessle <bjoern@schiessle.org>
- * @author Christoph Wurst <christoph@winzerhof-wurst.at>
- * @author Joas Schilling <coding@schilljs.com>
- * @author Julius Härtl <jus@bitgrid.net>
- * @author Morris Jobke <hey@morrisjobke.de>
- * @author Robin Appelman <robin@icewind.nl>
- * @author Roeland Jago Douma <roeland@famdouma.nl>
- * @author Vincent Petry <vincent@nextcloud.com>
- *
- * @license GNU AGPL version 3 or any later version
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License as
- * published by the Free Software Foundation, either version 3 of the
- * License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- */
- namespace OC\Template;
- use bantu\IniGetWrapper\IniGetWrapper;
- use OC\Authentication\Token\IProvider;
- use OC\CapabilitiesManager;
- use OC\Share\Share;
- use OCP\App\AppPathNotFoundException;
- use OCP\App\IAppManager;
- use OCP\Authentication\Exceptions\ExpiredTokenException;
- use OCP\Authentication\Exceptions\InvalidTokenException;
- use OCP\Authentication\Exceptions\WipeTokenException;
- use OCP\Constants;
- use OCP\Defaults;
- use OCP\Files\FileInfo;
- use OCP\IConfig;
- use OCP\IGroupManager;
- use OCP\IInitialStateService;
- use OCP\IL10N;
- use OCP\ILogger;
- use OCP\ISession;
- use OCP\IURLGenerator;
- use OCP\IUser;
- use OCP\Session\Exceptions\SessionNotAvailableException;
- use OCP\User\Backend\IPasswordConfirmationBackend;
- use OCP\Util;
- class JSConfigHelper {
- /** @var array user back-ends excluded from password verification */
- private $excludedUserBackEnds = ['user_saml' => true, 'user_globalsiteselector' => true];
- public function __construct(
- protected IL10N $l,
- protected Defaults $defaults,
- protected IAppManager $appManager,
- protected ISession $session,
- protected ?IUser $currentUser,
- protected IConfig $config,
- protected IGroupManager $groupManager,
- protected IniGetWrapper $iniWrapper,
- protected IURLGenerator $urlGenerator,
- protected CapabilitiesManager $capabilitiesManager,
- protected IInitialStateService $initialStateService,
- protected IProvider $tokenProvider,
- ) {
- }
- public function getConfig(): string {
- $userBackendAllowsPasswordConfirmation = true;
- if ($this->currentUser !== null) {
- $uid = $this->currentUser->getUID();
- $backend = $this->currentUser->getBackend();
- if ($backend instanceof IPasswordConfirmationBackend) {
- $userBackendAllowsPasswordConfirmation = $backend->canConfirmPassword($uid);
- } elseif (isset($this->excludedUserBackEnds[$this->currentUser->getBackendClassName()])) {
- $userBackendAllowsPasswordConfirmation = false;
- }
- } else {
- $uid = null;
- }
- // Get the config
- $apps_paths = [];
- if ($this->currentUser === null) {
- $apps = $this->appManager->getInstalledApps();
- } else {
- $apps = $this->appManager->getEnabledAppsForUser($this->currentUser);
- }
- foreach ($apps as $app) {
- try {
- $apps_paths[$app] = $this->appManager->getAppWebPath($app);
- } catch (AppPathNotFoundException $e) {
- $apps_paths[$app] = false;
- }
- }
- $enableLinkPasswordByDefault = $this->config->getAppValue('core', 'shareapi_enable_link_password_by_default', 'no');
- $enableLinkPasswordByDefault = $enableLinkPasswordByDefault === 'yes';
- $defaultExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
- $defaultExpireDate = $enforceDefaultExpireDate = null;
- if ($defaultExpireDateEnabled) {
- $defaultExpireDate = (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
- $enforceDefaultExpireDate = $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
- }
- $outgoingServer2serverShareEnabled = $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes';
- $defaultInternalExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_internal_expire_date', 'no') === 'yes';
- $defaultInternalExpireDate = $defaultInternalExpireDateEnforced = null;
- if ($defaultInternalExpireDateEnabled) {
- $defaultInternalExpireDate = (int)$this->config->getAppValue('core', 'shareapi_internal_expire_after_n_days', '7');
- $defaultInternalExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_internal_expire_date', 'no') === 'yes';
- }
- $defaultRemoteExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_remote_expire_date', 'no') === 'yes';
- $defaultRemoteExpireDate = $defaultRemoteExpireDateEnforced = null;
- if ($defaultRemoteExpireDateEnabled) {
- $defaultRemoteExpireDate = (int)$this->config->getAppValue('core', 'shareapi_remote_expire_after_n_days', '7');
- $defaultRemoteExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_remote_expire_date', 'no') === 'yes';
- }
- $countOfDataLocation = 0;
- $dataLocation = str_replace(\OC::$SERVERROOT . '/', '', $this->config->getSystemValue('datadirectory', ''), $countOfDataLocation);
- if ($countOfDataLocation !== 1 || $uid === null || !$this->groupManager->isAdmin($uid)) {
- $dataLocation = false;
- }
- if ($this->currentUser instanceof IUser) {
- if ($this->canUserValidatePassword()) {
- $lastConfirmTimestamp = $this->session->get('last-password-confirm');
- if (!is_int($lastConfirmTimestamp)) {
- $lastConfirmTimestamp = 0;
- }
- } else {
- $lastConfirmTimestamp = PHP_INT_MAX;
- }
- } else {
- $lastConfirmTimestamp = 0;
- }
- $capabilities = $this->capabilitiesManager->getCapabilities(false, true);
- $config = [
- 'auto_logout' => $this->config->getSystemValue('auto_logout', false),
- 'blacklist_files_regex' => FileInfo::BLACKLIST_FILES_REGEX,
- 'loglevel' => $this->config->getSystemValue('loglevel_frontend',
- $this->config->getSystemValue('loglevel', ILogger::WARN)
- ),
- 'lost_password_link' => $this->config->getSystemValue('lost_password_link', null),
- 'modRewriteWorking' => $this->config->getSystemValue('htaccess.IgnoreFrontController', false) === true || getenv('front_controller_active') === 'true',
- 'no_unsupported_browser_warning' => $this->config->getSystemValue('no_unsupported_browser_warning', false),
- 'session_keepalive' => $this->config->getSystemValue('session_keepalive', true),
- 'session_lifetime' => min($this->config->getSystemValue('session_lifetime', $this->iniWrapper->getNumeric('session.gc_maxlifetime')), $this->iniWrapper->getNumeric('session.gc_maxlifetime')),
- 'sharing.maxAutocompleteResults' => max(0, $this->config->getSystemValueInt('sharing.maxAutocompleteResults', Constants::SHARING_MAX_AUTOCOMPLETE_RESULTS_DEFAULT)),
- 'sharing.minSearchStringLength' => $this->config->getSystemValueInt('sharing.minSearchStringLength', 0),
- 'version' => implode('.', Util::getVersion()),
- 'versionstring' => \OC_Util::getVersionString(),
- 'enable_non-accessible_features' => $this->config->getSystemValueBool('enable_non-accessible_features', true),
- ];
- $array = [
- "_oc_debug" => $this->config->getSystemValue('debug', false) ? 'true' : 'false',
- "_oc_isadmin" => $uid !== null && $this->groupManager->isAdmin($uid) ? 'true' : 'false',
- "backendAllowsPasswordConfirmation" => $userBackendAllowsPasswordConfirmation ? 'true' : 'false',
- "oc_dataURL" => is_string($dataLocation) ? "\"" . $dataLocation . "\"" : 'false',
- "_oc_webroot" => "\"" . \OC::$WEBROOT . "\"",
- "_oc_appswebroots" => str_replace('\\/', '/', json_encode($apps_paths)), // Ugly unescape slashes waiting for better solution
- "datepickerFormatDate" => json_encode($this->l->l('jsdate', null)),
- 'nc_lastLogin' => $lastConfirmTimestamp,
- 'nc_pageLoad' => time(),
- "dayNames" => json_encode([
- $this->l->t('Sunday'),
- $this->l->t('Monday'),
- $this->l->t('Tuesday'),
- $this->l->t('Wednesday'),
- $this->l->t('Thursday'),
- $this->l->t('Friday'),
- $this->l->t('Saturday')
- ]),
- "dayNamesShort" => json_encode([
- $this->l->t('Sun.'),
- $this->l->t('Mon.'),
- $this->l->t('Tue.'),
- $this->l->t('Wed.'),
- $this->l->t('Thu.'),
- $this->l->t('Fri.'),
- $this->l->t('Sat.')
- ]),
- "dayNamesMin" => json_encode([
- $this->l->t('Su'),
- $this->l->t('Mo'),
- $this->l->t('Tu'),
- $this->l->t('We'),
- $this->l->t('Th'),
- $this->l->t('Fr'),
- $this->l->t('Sa')
- ]),
- "monthNames" => json_encode([
- $this->l->t('January'),
- $this->l->t('February'),
- $this->l->t('March'),
- $this->l->t('April'),
- $this->l->t('May'),
- $this->l->t('June'),
- $this->l->t('July'),
- $this->l->t('August'),
- $this->l->t('September'),
- $this->l->t('October'),
- $this->l->t('November'),
- $this->l->t('December')
- ]),
- "monthNamesShort" => json_encode([
- $this->l->t('Jan.'),
- $this->l->t('Feb.'),
- $this->l->t('Mar.'),
- $this->l->t('Apr.'),
- $this->l->t('May.'),
- $this->l->t('Jun.'),
- $this->l->t('Jul.'),
- $this->l->t('Aug.'),
- $this->l->t('Sep.'),
- $this->l->t('Oct.'),
- $this->l->t('Nov.'),
- $this->l->t('Dec.')
- ]),
- "firstDay" => json_encode($this->l->l('firstday', null)),
- "_oc_config" => json_encode($config),
- "oc_appconfig" => json_encode([
- 'core' => [
- 'defaultExpireDateEnabled' => $defaultExpireDateEnabled,
- 'defaultExpireDate' => $defaultExpireDate,
- 'defaultExpireDateEnforced' => $enforceDefaultExpireDate,
- 'enforcePasswordForPublicLink' => Util::isPublicLinkPasswordRequired(),
- 'enableLinkPasswordByDefault' => $enableLinkPasswordByDefault,
- 'sharingDisabledForUser' => Util::isSharingDisabledForUser(),
- 'resharingAllowed' => Share::isResharingAllowed(),
- 'remoteShareAllowed' => $outgoingServer2serverShareEnabled,
- 'federatedCloudShareDoc' => $this->urlGenerator->linkToDocs('user-sharing-federated'),
- 'allowGroupSharing' => \OC::$server->getShareManager()->allowGroupSharing(),
- 'defaultInternalExpireDateEnabled' => $defaultInternalExpireDateEnabled,
- 'defaultInternalExpireDate' => $defaultInternalExpireDate,
- 'defaultInternalExpireDateEnforced' => $defaultInternalExpireDateEnforced,
- 'defaultRemoteExpireDateEnabled' => $defaultRemoteExpireDateEnabled,
- 'defaultRemoteExpireDate' => $defaultRemoteExpireDate,
- 'defaultRemoteExpireDateEnforced' => $defaultRemoteExpireDateEnforced,
- ]
- ]),
- "_theme" => json_encode([
- 'entity' => $this->defaults->getEntity(),
- 'name' => $this->defaults->getName(),
- 'productName' => $this->defaults->getProductName(),
- 'title' => $this->defaults->getTitle(),
- 'baseUrl' => $this->defaults->getBaseUrl(),
- 'syncClientUrl' => $this->defaults->getSyncClientUrl(),
- 'docBaseUrl' => $this->defaults->getDocBaseUrl(),
- 'docPlaceholderUrl' => $this->defaults->buildDocLinkToKey('PLACEHOLDER'),
- 'slogan' => $this->defaults->getSlogan(),
- 'logoClaim' => '',
- 'folder' => \OC_Util::getTheme(),
- ]),
- ];
- if ($this->currentUser !== null) {
- $array['oc_userconfig'] = json_encode([
- 'avatar' => [
- 'version' => (int)$this->config->getUserValue($uid, 'avatar', 'version', 0),
- 'generated' => $this->config->getUserValue($uid, 'avatar', 'generated', 'true') === 'true',
- ]
- ]);
- }
- $this->initialStateService->provideInitialState('core', 'projects_enabled', $this->config->getSystemValueBool('projects.enabled', false));
- $this->initialStateService->provideInitialState('core', 'config', $config);
- $this->initialStateService->provideInitialState('core', 'capabilities', $capabilities);
- // Allow hooks to modify the output values
- \OC_Hook::emit('\OCP\Config', 'js', ['array' => &$array]);
- $result = '';
- // Echo it
- foreach ($array as $setting => $value) {
- $result .= 'var '. $setting . '='. $value . ';' . PHP_EOL;
- }
- return $result;
- }
- protected function canUserValidatePassword(): bool {
- try {
- $token = $this->tokenProvider->getToken($this->session->getId());
- } catch (ExpiredTokenException|WipeTokenException|InvalidTokenException|SessionNotAvailableException) {
- // actually we do not know, so we fall back to this statement
- return true;
- }
- $scope = $token->getScopeAsArray();
- return !isset($scope['password-unconfirmable']) || $scope['password-unconfirmable'] === false;
- }
- }
|