123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104 |
- <?php
- /**
- * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- use OC\Authentication\TwoFactorAuth\Manager as TwoFactorAuthManager;
- class OC_JSON {
- /**
- * Check if the app is enabled, send json error msg if not
- * @param string $app
- * @deprecated Use the AppFramework instead. It will automatically check if the app is enabled.
- * @suppress PhanDeprecatedFunction
- */
- public static function checkAppEnabled($app) {
- if (!\OC::$server->getAppManager()->isEnabledForUser($app)) {
- $l = \OC::$server->getL10N('lib');
- self::error([ 'data' => [ 'message' => $l->t('Application is not enabled'), 'error' => 'application_not_enabled' ]]);
- exit();
- }
- }
- /**
- * Check if the user is logged in, send json error msg if not
- * @deprecated Use annotation based ACLs from the AppFramework instead
- * @suppress PhanDeprecatedFunction
- */
- public static function checkLoggedIn() {
- $twoFactorAuthManger = \OC::$server->get(TwoFactorAuthManager::class);
- if (!\OC::$server->getUserSession()->isLoggedIn()
- || $twoFactorAuthManger->needsSecondFactor(\OC::$server->getUserSession()->getUser())) {
- $l = \OC::$server->getL10N('lib');
- http_response_code(\OCP\AppFramework\Http::STATUS_UNAUTHORIZED);
- self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]);
- exit();
- }
- }
- /**
- * Check an ajax get/post call if the request token is valid, send json error msg if not.
- * @deprecated Use annotation based CSRF checks from the AppFramework instead
- * @suppress PhanDeprecatedFunction
- */
- public static function callCheck() {
- if (!\OC::$server->getRequest()->passesStrictCookieCheck()) {
- header('Location: '.\OC::$WEBROOT);
- exit();
- }
- if (!\OC::$server->getRequest()->passesCSRFCheck()) {
- $l = \OC::$server->getL10N('lib');
- self::error([ 'data' => [ 'message' => $l->t('Token expired. Please reload page.'), 'error' => 'token_expired' ]]);
- exit();
- }
- }
- /**
- * Check if the user is a admin, send json error msg if not.
- * @deprecated Use annotation based ACLs from the AppFramework instead
- * @suppress PhanDeprecatedFunction
- */
- public static function checkAdminUser() {
- if (!OC_User::isAdminUser(OC_User::getUser())) {
- $l = \OC::$server->getL10N('lib');
- self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]);
- exit();
- }
- }
- /**
- * Send json error msg
- * @deprecated Use a AppFramework JSONResponse instead
- * @suppress PhanDeprecatedFunction
- * @psalm-taint-escape html
- */
- public static function error($data = []) {
- $data['status'] = 'error';
- header('Content-Type: application/json; charset=utf-8');
- echo self::encode($data);
- }
- /**
- * Send json success msg
- * @deprecated Use a AppFramework JSONResponse instead
- * @suppress PhanDeprecatedFunction
- * @psalm-taint-escape html
- */
- public static function success($data = []) {
- $data['status'] = 'success';
- header('Content-Type: application/json; charset=utf-8');
- echo self::encode($data);
- }
- /**
- * Encode JSON
- * @deprecated Use a AppFramework JSONResponse instead
- */
- private static function encode($data) {
- return json_encode($data, JSON_HEX_TAG);
- }
- }
|