You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

base.php 38KB

13 years ago
13 years ago
13 years ago
13 years ago
13 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
10 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
10 years ago
9 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
9 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
10 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
Squashed commit of the following: commit ae1f68ac54cf2878d265b2bbce13bd600d2d0719 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Thu Aug 22 11:45:27 2013 +0200 fixing undefined variable commit 982f327ca10eea0a2222eae3e74210648591fd8a Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 12:00:14 2013 +0200 adding login.php as alternative for index.php/login commit da0d7e1d096fb80789524b01f0f96fe08d147943 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 11:36:12 2013 +0200 adding a route for web login commit 8e2a01160485cf7e9a2eb8bf46f06fae73956e8e Author: Karl Beecher <karl@endocode.com> Date: Tue Aug 6 17:00:28 2013 +0200 Login attempt returns true instead of exiting immediately commit fd89d55de9e71e986e03a0de9aad9407b632e22f Author: Karl Beecher <karl@endocode.com> Date: Mon Aug 5 15:31:30 2013 +0200 Further abstraction. This change introduces the ApacheBackend interface for backends that depend on Apache authentication and session management. There are no longer references to specific backends in OC_User. commit 469cfd98aea5a37985722cf5f9e00ece0ce38178 Author: Karl Beecher <karl@endocode.com> Date: Thu Aug 1 15:46:36 2013 +0200 Make login attempt function protected. commit d803515f19ff086e2028fcaa51afae579685e596 Author: Karl Beecher <karl@endocode.com> Date: Wed Jul 31 16:00:22 2013 +0200 Amends the login link When using a Shibboleth login, clicking logout displays a message to the user instead of ending the session. commit aa8c1fcea05c8268f26a10b21c4e0bc547c3414f Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 13:15:59 2013 +0200 Abstract Shibboleth authentication into an Apache authentication method commit 69082f2ebcab267f6e8eceb1a252f84c52236546 Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 11:22:26 2013 +0200 Convert spaces -> tabs commit 5a80861d86855eec5906fd5e235ac4ff12efb0f2 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:40:48 2013 +0200 Separate the authentication methods SABRE authentication and base authentication have slightly different workings right now. They should be refactored into a common method later, but time pressure requires us to reinvent the wheel slightly. commit dc20a9f8764b103b7d8c5b713f2bcdae18708b65 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:07:07 2013 +0200 Authenicate calls to WebDAV against Shibboleth. When using WebDAV, the OC_Connector_Sabre_Auth::authenticate method is normally called without trying the Shibboleth authentication... thus the session is not established. The method now tries Shib authentication, setting up a session if the user has already authenticated. commit 091e4861b2246c4084c9b30e232289fde4ba1abf Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 14:04:54 2013 +0200 Sets up the Shibboleth login attempt. commit bae710ec0579ef99b23022cc12f6876c5fe6b0d5 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 12:36:44 2013 +0200 Add a method for attempting shibboleth login. If the PHP_AUTH_USER and EPPN environment variables are set, attempt a Shibboleth (passwordless) login. commit 667d0710a7854e58fb109201d9cee6ec064e793a Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:38:04 2013 +0200 Revert "Adds the apps2 folder with user_shibboleth backend." This reverts commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef. commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:28:06 2013 +0200 Adds the apps2 folder with user_shibboleth backend. Conflicts: core/templates/layout.user.php lib/base.php
10 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
Squashed commit of the following: commit ae1f68ac54cf2878d265b2bbce13bd600d2d0719 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Thu Aug 22 11:45:27 2013 +0200 fixing undefined variable commit 982f327ca10eea0a2222eae3e74210648591fd8a Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 12:00:14 2013 +0200 adding login.php as alternative for index.php/login commit da0d7e1d096fb80789524b01f0f96fe08d147943 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 11:36:12 2013 +0200 adding a route for web login commit 8e2a01160485cf7e9a2eb8bf46f06fae73956e8e Author: Karl Beecher <karl@endocode.com> Date: Tue Aug 6 17:00:28 2013 +0200 Login attempt returns true instead of exiting immediately commit fd89d55de9e71e986e03a0de9aad9407b632e22f Author: Karl Beecher <karl@endocode.com> Date: Mon Aug 5 15:31:30 2013 +0200 Further abstraction. This change introduces the ApacheBackend interface for backends that depend on Apache authentication and session management. There are no longer references to specific backends in OC_User. commit 469cfd98aea5a37985722cf5f9e00ece0ce38178 Author: Karl Beecher <karl@endocode.com> Date: Thu Aug 1 15:46:36 2013 +0200 Make login attempt function protected. commit d803515f19ff086e2028fcaa51afae579685e596 Author: Karl Beecher <karl@endocode.com> Date: Wed Jul 31 16:00:22 2013 +0200 Amends the login link When using a Shibboleth login, clicking logout displays a message to the user instead of ending the session. commit aa8c1fcea05c8268f26a10b21c4e0bc547c3414f Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 13:15:59 2013 +0200 Abstract Shibboleth authentication into an Apache authentication method commit 69082f2ebcab267f6e8eceb1a252f84c52236546 Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 11:22:26 2013 +0200 Convert spaces -> tabs commit 5a80861d86855eec5906fd5e235ac4ff12efb0f2 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:40:48 2013 +0200 Separate the authentication methods SABRE authentication and base authentication have slightly different workings right now. They should be refactored into a common method later, but time pressure requires us to reinvent the wheel slightly. commit dc20a9f8764b103b7d8c5b713f2bcdae18708b65 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:07:07 2013 +0200 Authenicate calls to WebDAV against Shibboleth. When using WebDAV, the OC_Connector_Sabre_Auth::authenticate method is normally called without trying the Shibboleth authentication... thus the session is not established. The method now tries Shib authentication, setting up a session if the user has already authenticated. commit 091e4861b2246c4084c9b30e232289fde4ba1abf Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 14:04:54 2013 +0200 Sets up the Shibboleth login attempt. commit bae710ec0579ef99b23022cc12f6876c5fe6b0d5 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 12:36:44 2013 +0200 Add a method for attempting shibboleth login. If the PHP_AUTH_USER and EPPN environment variables are set, attempt a Shibboleth (passwordless) login. commit 667d0710a7854e58fb109201d9cee6ec064e793a Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:38:04 2013 +0200 Revert "Adds the apps2 folder with user_shibboleth backend." This reverts commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef. commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:28:06 2013 +0200 Adds the apps2 folder with user_shibboleth backend. Conflicts: core/templates/layout.user.php lib/base.php
10 years ago
Squashed commit of the following: commit ae1f68ac54cf2878d265b2bbce13bd600d2d0719 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Thu Aug 22 11:45:27 2013 +0200 fixing undefined variable commit 982f327ca10eea0a2222eae3e74210648591fd8a Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 12:00:14 2013 +0200 adding login.php as alternative for index.php/login commit da0d7e1d096fb80789524b01f0f96fe08d147943 Author: Thomas Müller <thomas.mueller@tmit.eu> Date: Wed Aug 7 11:36:12 2013 +0200 adding a route for web login commit 8e2a01160485cf7e9a2eb8bf46f06fae73956e8e Author: Karl Beecher <karl@endocode.com> Date: Tue Aug 6 17:00:28 2013 +0200 Login attempt returns true instead of exiting immediately commit fd89d55de9e71e986e03a0de9aad9407b632e22f Author: Karl Beecher <karl@endocode.com> Date: Mon Aug 5 15:31:30 2013 +0200 Further abstraction. This change introduces the ApacheBackend interface for backends that depend on Apache authentication and session management. There are no longer references to specific backends in OC_User. commit 469cfd98aea5a37985722cf5f9e00ece0ce38178 Author: Karl Beecher <karl@endocode.com> Date: Thu Aug 1 15:46:36 2013 +0200 Make login attempt function protected. commit d803515f19ff086e2028fcaa51afae579685e596 Author: Karl Beecher <karl@endocode.com> Date: Wed Jul 31 16:00:22 2013 +0200 Amends the login link When using a Shibboleth login, clicking logout displays a message to the user instead of ending the session. commit aa8c1fcea05c8268f26a10b21c4e0bc547c3414f Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 13:15:59 2013 +0200 Abstract Shibboleth authentication into an Apache authentication method commit 69082f2ebcab267f6e8eceb1a252f84c52236546 Author: Karl Beecher <karl@endocode.com> Date: Tue Jul 30 11:22:26 2013 +0200 Convert spaces -> tabs commit 5a80861d86855eec5906fd5e235ac4ff12efb0f2 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:40:48 2013 +0200 Separate the authentication methods SABRE authentication and base authentication have slightly different workings right now. They should be refactored into a common method later, but time pressure requires us to reinvent the wheel slightly. commit dc20a9f8764b103b7d8c5b713f2bcdae18708b65 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 17:07:07 2013 +0200 Authenicate calls to WebDAV against Shibboleth. When using WebDAV, the OC_Connector_Sabre_Auth::authenticate method is normally called without trying the Shibboleth authentication... thus the session is not established. The method now tries Shib authentication, setting up a session if the user has already authenticated. commit 091e4861b2246c4084c9b30e232289fde4ba1abf Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 14:04:54 2013 +0200 Sets up the Shibboleth login attempt. commit bae710ec0579ef99b23022cc12f6876c5fe6b0d5 Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 12:36:44 2013 +0200 Add a method for attempting shibboleth login. If the PHP_AUTH_USER and EPPN environment variables are set, attempt a Shibboleth (passwordless) login. commit 667d0710a7854e58fb109201d9cee6ec064e793a Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:38:04 2013 +0200 Revert "Adds the apps2 folder with user_shibboleth backend." This reverts commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef. commit 7abbdb64676d667b0c69aca37becdc47e56dc7ef Author: Karl Beecher <karl@endocode.com> Date: Mon Jul 29 11:28:06 2013 +0200 Adds the apps2 folder with user_shibboleth backend. Conflicts: core/templates/layout.user.php lib/base.php
10 years ago
11 years ago
11 years ago
9 years ago
11 years ago
11 years ago
10 years ago
11 years ago
9 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141
  1. <?php
  2. /**
  3. * @author Adam Williamson <awilliam@redhat.com>
  4. * @author Andreas Fischer <bantu@owncloud.com>
  5. * @author Arthur Schiwon <blizzz@owncloud.com>
  6. * @author Bart Visscher <bartv@thisnet.nl>
  7. * @author Bernhard Posselt <dev@bernhard-posselt.com>
  8. * @author Björn Schießle <schiessle@owncloud.com>
  9. * @author Christopher Schäpers <kondou@ts.unde.re>
  10. * @author davidgumberg <davidnoizgumberg@gmail.com>
  11. * @author Florian Scholz <FlorianScholz@bgstyle.de>
  12. * @author Florin Peter <github@florin-peter.de>
  13. * @author Frank Karlitschek <frank@owncloud.org>
  14. * @author Georg Ehrke <georg@owncloud.com>
  15. * @author Hugo Gonzalez Labrador <hglavra@gmail.com>
  16. * @author Jakob Sack <mail@jakobsack.de>
  17. * @author Jan-Christoph Borchardt <hey@jancborchardt.net>
  18. * @author Joas Schilling <nickvergessen@owncloud.com>
  19. * @author Jörn Friedrich Dreyer <jfd@butonic.de>
  20. * @author Lukas Reschke <lukas@owncloud.com>
  21. * @author marc0s <marcos@tenak.net>
  22. * @author Michael Gapczynski <GapczynskiM@gmail.com>
  23. * @author Morris Jobke <hey@morrisjobke.de>
  24. * @author Owen Winkler <a_github@midnightcircus.com>
  25. * @author Ramiro Aparicio <rapariciog@gmail.com>
  26. * @author Robin Appelman <icewind@owncloud.com>
  27. * @author Robin McCorkell <rmccorkell@karoshi.org.uk>
  28. * @author scolebrook <scolebrook@mac.com>
  29. * @author Stefan Herbrechtsmeier <stefan@herbrechtsmeier.net>
  30. * @author Thomas Müller <thomas.mueller@tmit.eu>
  31. * @author Thomas Tanghus <thomas@tanghus.net>
  32. * @author Victor Dubiniuk <dubiniuk@owncloud.com>
  33. * @author Vincent Petry <pvince81@owncloud.com>
  34. * @author Volkan Gezer <volkangezer@gmail.com>
  35. *
  36. * @copyright Copyright (c) 2015, ownCloud, Inc.
  37. * @license AGPL-3.0
  38. *
  39. * This code is free software: you can redistribute it and/or modify
  40. * it under the terms of the GNU Affero General Public License, version 3,
  41. * as published by the Free Software Foundation.
  42. *
  43. * This program is distributed in the hope that it will be useful,
  44. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  45. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  46. * GNU Affero General Public License for more details.
  47. *
  48. * You should have received a copy of the GNU Affero General Public License, version 3,
  49. * along with this program. If not, see <http://www.gnu.org/licenses/>
  50. *
  51. */
  52. require_once 'public/constants.php';
  53. /**
  54. * Class that is a namespace for all global OC variables
  55. * No, we can not put this class in its own file because it is used by
  56. * OC_autoload!
  57. */
  58. class OC {
  59. /**
  60. * Associative array for autoloading. classname => filename
  61. */
  62. public static $CLASSPATH = array();
  63. /**
  64. * The installation path for owncloud on the server (e.g. /srv/http/owncloud)
  65. */
  66. public static $SERVERROOT = '';
  67. /**
  68. * the current request path relative to the owncloud root (e.g. files/index.php)
  69. */
  70. private static $SUBURI = '';
  71. /**
  72. * the owncloud root path for http requests (e.g. owncloud/)
  73. */
  74. public static $WEBROOT = '';
  75. /**
  76. * The installation path of the 3rdparty folder on the server (e.g. /srv/http/owncloud/3rdparty)
  77. */
  78. public static $THIRDPARTYROOT = '';
  79. /**
  80. * the root path of the 3rdparty folder for http requests (e.g. owncloud/3rdparty)
  81. */
  82. public static $THIRDPARTYWEBROOT = '';
  83. /**
  84. * The installation path array of the apps folder on the server (e.g. /srv/http/owncloud) 'path' and
  85. * web path in 'url'
  86. */
  87. public static $APPSROOTS = array();
  88. public static $configDir;
  89. /**
  90. * requested app
  91. */
  92. public static $REQUESTEDAPP = '';
  93. /**
  94. * check if ownCloud runs in cli mode
  95. */
  96. public static $CLI = false;
  97. /**
  98. * @var \OC\Autoloader $loader
  99. */
  100. public static $loader = null;
  101. /**
  102. * @var \OC\Server
  103. */
  104. public static $server = null;
  105. /**
  106. * @throws \RuntimeException when the 3rdparty directory is missing or
  107. * the app path list is empty or contains an invalid path
  108. */
  109. public static function initPaths() {
  110. // ensure we can find OC_Config
  111. set_include_path(
  112. OC::$SERVERROOT . '/lib' . PATH_SEPARATOR .
  113. get_include_path()
  114. );
  115. if(defined('PHPUNIT_CONFIG_DIR')) {
  116. self::$configDir = OC::$SERVERROOT . '/' . PHPUNIT_CONFIG_DIR . '/';
  117. } elseif(defined('PHPUNIT_RUN') and PHPUNIT_RUN and is_dir(OC::$SERVERROOT . '/tests/config/')) {
  118. self::$configDir = OC::$SERVERROOT . '/tests/config/';
  119. } else {
  120. self::$configDir = OC::$SERVERROOT . '/config/';
  121. }
  122. OC_Config::$object = new \OC\Config(self::$configDir);
  123. OC::$SUBURI = str_replace("\\", "/", substr(realpath($_SERVER["SCRIPT_FILENAME"]), strlen(OC::$SERVERROOT)));
  124. $scriptName = $_SERVER['SCRIPT_NAME'];
  125. if (substr($scriptName, -1) == '/') {
  126. $scriptName .= 'index.php';
  127. //make sure suburi follows the same rules as scriptName
  128. if (substr(OC::$SUBURI, -9) != 'index.php') {
  129. if (substr(OC::$SUBURI, -1) != '/') {
  130. OC::$SUBURI = OC::$SUBURI . '/';
  131. }
  132. OC::$SUBURI = OC::$SUBURI . 'index.php';
  133. }
  134. }
  135. if (OC::$CLI) {
  136. OC::$WEBROOT = OC_Config::getValue('overwritewebroot', '');
  137. } else {
  138. if (substr($scriptName, 0 - strlen(OC::$SUBURI)) === OC::$SUBURI) {
  139. OC::$WEBROOT = substr($scriptName, 0, 0 - strlen(OC::$SUBURI));
  140. if (OC::$WEBROOT != '' && OC::$WEBROOT[0] !== '/') {
  141. OC::$WEBROOT = '/' . OC::$WEBROOT;
  142. }
  143. } else {
  144. // The scriptName is not ending with OC::$SUBURI
  145. // This most likely means that we are calling from CLI.
  146. // However some cron jobs still need to generate
  147. // a web URL, so we use overwritewebroot as a fallback.
  148. OC::$WEBROOT = OC_Config::getValue('overwritewebroot', '');
  149. }
  150. }
  151. // search the 3rdparty folder
  152. OC::$THIRDPARTYROOT = OC_Config::getValue('3rdpartyroot', null);
  153. OC::$THIRDPARTYWEBROOT = OC_Config::getValue('3rdpartyurl', null);
  154. if (empty(OC::$THIRDPARTYROOT) && empty(OC::$THIRDPARTYWEBROOT)) {
  155. if (file_exists(OC::$SERVERROOT . '/3rdparty')) {
  156. OC::$THIRDPARTYROOT = OC::$SERVERROOT;
  157. OC::$THIRDPARTYWEBROOT = OC::$WEBROOT;
  158. } elseif (file_exists(OC::$SERVERROOT . '/../3rdparty')) {
  159. OC::$THIRDPARTYWEBROOT = rtrim(dirname(OC::$WEBROOT), '/');
  160. OC::$THIRDPARTYROOT = rtrim(dirname(OC::$SERVERROOT), '/');
  161. }
  162. }
  163. if (empty(OC::$THIRDPARTYROOT) || !file_exists(OC::$THIRDPARTYROOT)) {
  164. throw new \RuntimeException('3rdparty directory not found! Please put the ownCloud 3rdparty'
  165. . ' folder in the ownCloud folder or the folder above.'
  166. . ' You can also configure the location in the config.php file.');
  167. }
  168. // search the apps folder
  169. $config_paths = OC_Config::getValue('apps_paths', array());
  170. if (!empty($config_paths)) {
  171. foreach ($config_paths as $paths) {
  172. if (isset($paths['url']) && isset($paths['path'])) {
  173. $paths['url'] = rtrim($paths['url'], '/');
  174. $paths['path'] = rtrim($paths['path'], '/');
  175. OC::$APPSROOTS[] = $paths;
  176. }
  177. }
  178. } elseif (file_exists(OC::$SERVERROOT . '/apps')) {
  179. OC::$APPSROOTS[] = array('path' => OC::$SERVERROOT . '/apps', 'url' => '/apps', 'writable' => true);
  180. } elseif (file_exists(OC::$SERVERROOT . '/../apps')) {
  181. OC::$APPSROOTS[] = array(
  182. 'path' => rtrim(dirname(OC::$SERVERROOT), '/') . '/apps',
  183. 'url' => '/apps',
  184. 'writable' => true
  185. );
  186. }
  187. if (empty(OC::$APPSROOTS)) {
  188. throw new \RuntimeException('apps directory not found! Please put the ownCloud apps folder in the ownCloud folder'
  189. . ' or the folder above. You can also configure the location in the config.php file.');
  190. }
  191. $paths = array();
  192. foreach (OC::$APPSROOTS as $path) {
  193. $paths[] = $path['path'];
  194. if (!is_dir($path['path'])) {
  195. throw new \RuntimeException(sprintf('App directory "%s" not found! Please put the ownCloud apps folder in the'
  196. . ' ownCloud folder or the folder above. You can also configure the location in the'
  197. . ' config.php file.', $path['path']));
  198. }
  199. }
  200. // set the right include path
  201. set_include_path(
  202. OC::$SERVERROOT . '/lib/private' . PATH_SEPARATOR .
  203. OC::$SERVERROOT . '/config' . PATH_SEPARATOR .
  204. OC::$THIRDPARTYROOT . '/3rdparty' . PATH_SEPARATOR .
  205. implode(PATH_SEPARATOR, $paths) . PATH_SEPARATOR .
  206. get_include_path() . PATH_SEPARATOR .
  207. OC::$SERVERROOT
  208. );
  209. }
  210. public static function checkConfig() {
  211. $l = \OC::$server->getL10N('lib');
  212. // Create config in case it does not already exists
  213. $configFilePath = self::$configDir .'/config.php';
  214. if(!file_exists($configFilePath)) {
  215. @touch($configFilePath);
  216. }
  217. // Check if config is writable
  218. $configFileWritable = is_writable($configFilePath);
  219. if (!$configFileWritable && !OC_Helper::isReadOnlyConfigEnabled()
  220. || !$configFileWritable && \OCP\Util::needUpgrade()) {
  221. if (self::$CLI) {
  222. echo $l->t('Cannot write into "config" directory!')."\n";
  223. echo $l->t('This can usually be fixed by giving the webserver write access to the config directory')."\n";
  224. echo "\n";
  225. echo $l->t('See %s', array(\OC_Helper::linkToDocs('admin-dir_permissions')))."\n";
  226. exit;
  227. } else {
  228. OC_Template::printErrorPage(
  229. $l->t('Cannot write into "config" directory!'),
  230. $l->t('This can usually be fixed by '
  231. . '%sgiving the webserver write access to the config directory%s.',
  232. array('<a href="'.\OC_Helper::linkToDocs('admin-dir_permissions').'" target="_blank">', '</a>'))
  233. );
  234. }
  235. }
  236. }
  237. public static function checkInstalled() {
  238. if (defined('OC_CONSOLE')) {
  239. return;
  240. }
  241. // Redirect to installer if not installed
  242. if (!\OC::$server->getSystemConfig()->getValue('installed', false) && OC::$SUBURI != '/index.php') {
  243. if (OC::$CLI) {
  244. throw new Exception('Not installed');
  245. } else {
  246. $url = 'http://' . $_SERVER['SERVER_NAME'] . OC::$WEBROOT . '/index.php';
  247. header('Location: ' . $url);
  248. }
  249. exit();
  250. }
  251. }
  252. public static function checkMaintenanceMode() {
  253. // Allow ajax update script to execute without being stopped
  254. if (\OC::$server->getSystemConfig()->getValue('maintenance', false) && OC::$SUBURI != '/core/ajax/update.php') {
  255. // send http status 503
  256. header('HTTP/1.1 503 Service Temporarily Unavailable');
  257. header('Status: 503 Service Temporarily Unavailable');
  258. header('Retry-After: 120');
  259. // render error page
  260. $template = new OC_Template('', 'update.user', 'guest');
  261. OC_Util::addscript('maintenance-check');
  262. $template->printPage();
  263. die();
  264. }
  265. }
  266. public static function checkSingleUserMode($lockIfNoUserLoggedIn = false) {
  267. if (!\OC::$server->getSystemConfig()->getValue('singleuser', false)) {
  268. return;
  269. }
  270. $user = OC_User::getUserSession()->getUser();
  271. if ($user) {
  272. $group = \OC::$server->getGroupManager()->get('admin');
  273. if ($group->inGroup($user)) {
  274. return;
  275. }
  276. } else {
  277. if(!$lockIfNoUserLoggedIn) {
  278. return;
  279. }
  280. }
  281. // send http status 503
  282. header('HTTP/1.1 503 Service Temporarily Unavailable');
  283. header('Status: 503 Service Temporarily Unavailable');
  284. header('Retry-After: 120');
  285. // render error page
  286. $template = new OC_Template('', 'singleuser.user', 'guest');
  287. $template->printPage();
  288. die();
  289. }
  290. /**
  291. * check if the instance needs to preform an upgrade
  292. *
  293. * @return bool
  294. * @deprecated use \OCP\Util::needUpgrade() instead
  295. */
  296. public static function needUpgrade() {
  297. return \OCP\Util::needUpgrade();
  298. }
  299. /**
  300. * Checks if the version requires an update and shows
  301. * @param bool $showTemplate Whether an update screen should get shown
  302. * @return bool|void
  303. */
  304. public static function checkUpgrade($showTemplate = true) {
  305. if (\OCP\Util::needUpgrade()) {
  306. $systemConfig = \OC::$server->getSystemConfig();
  307. if ($showTemplate && !$systemConfig->getValue('maintenance', false)) {
  308. self::printUpgradePage();
  309. exit();
  310. } else {
  311. return true;
  312. }
  313. }
  314. return false;
  315. }
  316. /**
  317. * Prints the upgrade page
  318. */
  319. private static function printUpgradePage() {
  320. $systemConfig = \OC::$server->getSystemConfig();
  321. $oldTheme = $systemConfig->getValue('theme');
  322. $systemConfig->setValue('theme', '');
  323. \OCP\Util::addScript('config'); // needed for web root
  324. \OCP\Util::addScript('update');
  325. // check whether this is a core update or apps update
  326. $installedVersion = $systemConfig->getValue('version', '0.0.0');
  327. $currentVersion = implode('.', OC_Util::getVersion());
  328. $appManager = \OC::$server->getAppManager();
  329. $tmpl = new OC_Template('', 'update.admin', 'guest');
  330. $tmpl->assign('version', OC_Util::getVersionString());
  331. // if not a core upgrade, then it's apps upgrade
  332. if (version_compare($currentVersion, $installedVersion, '=')) {
  333. $tmpl->assign('isAppsOnlyUpgrade', true);
  334. } else {
  335. $tmpl->assign('isAppsOnlyUpgrade', false);
  336. }
  337. // get third party apps
  338. $ocVersion = OC_Util::getVersion();
  339. $tmpl->assign('appsToUpgrade', $appManager->getAppsNeedingUpgrade($ocVersion));
  340. $tmpl->assign('incompatibleAppsList', $appManager->getIncompatibleApps($ocVersion));
  341. $tmpl->assign('productName', 'ownCloud'); // for now
  342. $tmpl->assign('oldTheme', $oldTheme);
  343. $tmpl->printPage();
  344. }
  345. public static function initTemplateEngine() {
  346. // Add the stuff we need always
  347. // following logic will import all vendor libraries that are
  348. // specified in core/js/core.json
  349. $fileContent = file_get_contents(OC::$SERVERROOT . '/core/js/core.json');
  350. if($fileContent !== false) {
  351. $coreDependencies = json_decode($fileContent, true);
  352. foreach($coreDependencies['vendor'] as $vendorLibrary) {
  353. // remove trailing ".js" as addVendorScript will append it
  354. OC_Util::addVendorScript(
  355. substr($vendorLibrary, 0, strlen($vendorLibrary) - 3));
  356. }
  357. } else {
  358. throw new \Exception('Cannot read core/js/core.json');
  359. }
  360. OC_Util::addScript("placeholders");
  361. OC_Util::addScript("compatibility");
  362. OC_Util::addScript("jquery.ocdialog");
  363. OC_Util::addScript("oc-dialogs");
  364. OC_Util::addScript("js");
  365. OC_Util::addScript("l10n");
  366. OC_Util::addTranslations("core");
  367. OC_Util::addScript("octemplate");
  368. OC_Util::addScript("eventsource");
  369. OC_Util::addScript("config");
  370. OC_Util::addScript('search', 'search');
  371. OC_Util::addScript("oc-requesttoken");
  372. OC_Util::addScript("apps");
  373. OC_Util::addScript('mimetype');
  374. OC_Util::addScript('mimetypelist');
  375. OC_Util::addVendorScript('snapjs/dist/latest/snap');
  376. OC_Util::addVendorScript('core', 'backbone/backbone');
  377. OC_Util::addScript('oc-backbone');
  378. // avatars
  379. if (\OC::$server->getSystemConfig()->getValue('enable_avatars', true) === true) {
  380. \OC_Util::addScript('placeholder');
  381. \OC_Util::addVendorScript('blueimp-md5/js/md5');
  382. \OC_Util::addScript('jquery.avatar');
  383. \OC_Util::addScript('avatar');
  384. }
  385. OC_Util::addStyle("styles");
  386. OC_Util::addStyle("header");
  387. OC_Util::addStyle("mobile");
  388. OC_Util::addStyle("icons");
  389. OC_Util::addStyle("fonts");
  390. OC_Util::addStyle("apps");
  391. OC_Util::addStyle("fixes");
  392. OC_Util::addStyle("multiselect");
  393. OC_Util::addVendorStyle('jquery-ui/themes/base/jquery-ui');
  394. OC_Util::addStyle('jquery-ui-fixes');
  395. OC_Util::addStyle("tooltip");
  396. OC_Util::addStyle("jquery.ocdialog");
  397. }
  398. public static function initSession() {
  399. // prevents javascript from accessing php session cookies
  400. ini_set('session.cookie_httponly', true);
  401. // set the cookie path to the ownCloud directory
  402. $cookie_path = OC::$WEBROOT ? : '/';
  403. ini_set('session.cookie_path', $cookie_path);
  404. // Let the session name be changed in the initSession Hook
  405. $sessionName = OC_Util::getInstanceId();
  406. try {
  407. // Allow session apps to create a custom session object
  408. $useCustomSession = false;
  409. $session = self::$server->getSession();
  410. OC_Hook::emit('OC', 'initSession', array('session' => &$session, 'sessionName' => &$sessionName, 'useCustomSession' => &$useCustomSession));
  411. if (!$useCustomSession) {
  412. // set the session name to the instance id - which is unique
  413. $session = new \OC\Session\Internal($sessionName);
  414. }
  415. $cryptoWrapper = \OC::$server->getSessionCryptoWrapper();
  416. $session = $cryptoWrapper->wrapSession($session);
  417. self::$server->setSession($session);
  418. // if session cant be started break with http 500 error
  419. } catch (Exception $e) {
  420. \OCP\Util::logException('base', $e);
  421. //show the user a detailed error page
  422. OC_Response::setStatus(OC_Response::STATUS_INTERNAL_SERVER_ERROR);
  423. OC_Template::printExceptionErrorPage($e);
  424. }
  425. $sessionLifeTime = self::getSessionLifeTime();
  426. // regenerate session id periodically to avoid session fixation
  427. /**
  428. * @var \OCP\ISession $session
  429. */
  430. $session = self::$server->getSession();
  431. if (!$session->exists('SID_CREATED')) {
  432. $session->set('SID_CREATED', time());
  433. } else if (time() - $session->get('SID_CREATED') > $sessionLifeTime / 2) {
  434. session_regenerate_id(true);
  435. $session->set('SID_CREATED', time());
  436. }
  437. // session timeout
  438. if ($session->exists('LAST_ACTIVITY') && (time() - $session->get('LAST_ACTIVITY') > $sessionLifeTime)) {
  439. if (isset($_COOKIE[session_name()])) {
  440. setcookie(session_name(), '', time() - 42000, $cookie_path);
  441. }
  442. session_unset();
  443. session_destroy();
  444. session_start();
  445. }
  446. $session->set('LAST_ACTIVITY', time());
  447. }
  448. /**
  449. * @return string
  450. */
  451. private static function getSessionLifeTime() {
  452. return \OC::$server->getConfig()->getSystemValue('session_lifetime', 60 * 60 * 24);
  453. }
  454. public static function loadAppClassPaths() {
  455. foreach (OC_APP::getEnabledApps() as $app) {
  456. $file = OC_App::getAppPath($app) . '/appinfo/classpath.php';
  457. if (file_exists($file)) {
  458. require_once $file;
  459. }
  460. }
  461. }
  462. /**
  463. * Try to set some values to the required ownCloud default
  464. */
  465. public static function setRequiredIniValues() {
  466. @ini_set('default_charset', 'UTF-8');
  467. }
  468. public static function init() {
  469. // calculate the root directories
  470. OC::$SERVERROOT = str_replace("\\", '/', substr(__DIR__, 0, -4));
  471. // register autoloader
  472. $loaderStart = microtime(true);
  473. require_once __DIR__ . '/autoloader.php';
  474. self::$loader = new \OC\Autoloader([
  475. OC::$SERVERROOT . '/lib',
  476. OC::$SERVERROOT . '/core',
  477. OC::$SERVERROOT . '/settings',
  478. OC::$SERVERROOT . '/ocs',
  479. OC::$SERVERROOT . '/ocs-provider',
  480. OC::$SERVERROOT . '/3rdparty'
  481. ]);
  482. spl_autoload_register(array(self::$loader, 'load'));
  483. $loaderEnd = microtime(true);
  484. self::$CLI = (php_sapi_name() == 'cli');
  485. try {
  486. self::initPaths();
  487. // setup 3rdparty autoloader
  488. $vendorAutoLoad = OC::$THIRDPARTYROOT . '/3rdparty/autoload.php';
  489. if (!file_exists($vendorAutoLoad)) {
  490. throw new \RuntimeException('Composer autoloader not found, unable to continue. Check the folder "3rdparty". Running "git submodule update --init" will initialize the git submodule that handles the subfolder "3rdparty".');
  491. }
  492. require_once $vendorAutoLoad;
  493. } catch (\RuntimeException $e) {
  494. OC_Response::setStatus(OC_Response::STATUS_SERVICE_UNAVAILABLE);
  495. // we can't use the template error page here, because this needs the
  496. // DI container which isn't available yet
  497. print($e->getMessage());
  498. exit();
  499. }
  500. // setup the basic server
  501. self::$server = new \OC\Server(\OC::$WEBROOT);
  502. \OC::$server->getEventLogger()->log('autoloader', 'Autoloader', $loaderStart, $loaderEnd);
  503. \OC::$server->getEventLogger()->start('boot', 'Initialize');
  504. // Don't display errors and log them
  505. error_reporting(E_ALL | E_STRICT);
  506. @ini_set('display_errors', 0);
  507. @ini_set('log_errors', 1);
  508. date_default_timezone_set('UTC');
  509. //try to configure php to enable big file uploads.
  510. //this doesn´t work always depending on the webserver and php configuration.
  511. //Let´s try to overwrite some defaults anyways
  512. //try to set the maximum execution time to 60min
  513. @set_time_limit(3600);
  514. @ini_set('max_execution_time', 3600);
  515. @ini_set('max_input_time', 3600);
  516. //try to set the maximum filesize to 10G
  517. @ini_set('upload_max_filesize', '10G');
  518. @ini_set('post_max_size', '10G');
  519. @ini_set('file_uploads', '50');
  520. self::setRequiredIniValues();
  521. self::handleAuthHeaders();
  522. self::registerAutoloaderCache();
  523. // initialize intl fallback is necessary
  524. \Patchwork\Utf8\Bootup::initIntl();
  525. OC_Util::isSetLocaleWorking();
  526. if (!defined('PHPUNIT_RUN')) {
  527. $logger = \OC::$server->getLogger();
  528. OC\Log\ErrorHandler::setLogger($logger);
  529. if (\OC::$server->getConfig()->getSystemValue('debug', false)) {
  530. OC\Log\ErrorHandler::register(true);
  531. set_exception_handler(array('OC_Template', 'printExceptionErrorPage'));
  532. } else {
  533. OC\Log\ErrorHandler::register();
  534. }
  535. }
  536. // register the stream wrappers
  537. stream_wrapper_register('fakedir', 'OC\Files\Stream\Dir');
  538. stream_wrapper_register('static', 'OC\Files\Stream\StaticStream');
  539. stream_wrapper_register('close', 'OC\Files\Stream\Close');
  540. stream_wrapper_register('quota', 'OC\Files\Stream\Quota');
  541. stream_wrapper_register('oc', 'OC\Files\Stream\OC');
  542. \OC::$server->getEventLogger()->start('init_session', 'Initialize session');
  543. OC_App::loadApps(array('session'));
  544. if (!self::$CLI) {
  545. self::initSession();
  546. }
  547. \OC::$server->getEventLogger()->end('init_session');
  548. self::initTemplateEngine();
  549. self::checkConfig();
  550. self::checkInstalled();
  551. OC_Response::addSecurityHeaders();
  552. if(self::$server->getRequest()->getServerProtocol() === 'https') {
  553. ini_set('session.cookie_secure', true);
  554. }
  555. if (!defined('OC_CONSOLE')) {
  556. $errors = OC_Util::checkServer(\OC::$server->getConfig());
  557. if (count($errors) > 0) {
  558. if (self::$CLI) {
  559. // Convert l10n string into regular string for usage in database
  560. $staticErrors = [];
  561. foreach ($errors as $error) {
  562. echo $error['error'] . "\n";
  563. echo $error['hint'] . "\n\n";
  564. $staticErrors[] = [
  565. 'error' => (string)$error['error'],
  566. 'hint' => (string)$error['hint'],
  567. ];
  568. }
  569. try {
  570. \OC::$server->getConfig()->setAppValue('core', 'cronErrors', json_encode($staticErrors));
  571. } catch (\Exception $e) {
  572. echo('Writing to database failed');
  573. }
  574. exit(1);
  575. } else {
  576. OC_Response::setStatus(OC_Response::STATUS_SERVICE_UNAVAILABLE);
  577. OC_Template::printGuestPage('', 'error', array('errors' => $errors));
  578. exit;
  579. }
  580. } elseif (self::$CLI && \OC::$server->getConfig()->getSystemValue('installed', false)) {
  581. \OC::$server->getConfig()->deleteAppValue('core', 'cronErrors');
  582. }
  583. }
  584. //try to set the session lifetime
  585. $sessionLifeTime = self::getSessionLifeTime();
  586. @ini_set('gc_maxlifetime', (string)$sessionLifeTime);
  587. $systemConfig = \OC::$server->getSystemConfig();
  588. // User and Groups
  589. if (!$systemConfig->getValue("installed", false)) {
  590. self::$server->getSession()->set('user_id', '');
  591. }
  592. OC_User::useBackend(new OC_User_Database());
  593. OC_Group::useBackend(new OC_Group_Database());
  594. //setup extra user backends
  595. if (!self::checkUpgrade(false)) {
  596. OC_User::setupBackends();
  597. }
  598. self::registerCacheHooks();
  599. self::registerFilesystemHooks();
  600. if ($systemConfig->getValue('enable_previews', true)) {
  601. self::registerPreviewHooks();
  602. }
  603. self::registerShareHooks();
  604. self::registerLogRotate();
  605. self::registerLocalAddressBook();
  606. self::registerEncryptionWrapper();
  607. self::registerEncryptionHooks();
  608. //make sure temporary files are cleaned up
  609. $tmpManager = \OC::$server->getTempManager();
  610. register_shutdown_function(array($tmpManager, 'clean'));
  611. $lockProvider = \OC::$server->getLockingProvider();
  612. register_shutdown_function(array($lockProvider, 'releaseAll'));
  613. if ($systemConfig->getValue('installed', false) && !self::checkUpgrade(false)) {
  614. if (\OC::$server->getConfig()->getAppValue('core', 'backgroundjobs_mode', 'ajax') == 'ajax') {
  615. OC_Util::addScript('backgroundjobs');
  616. }
  617. }
  618. // Check whether the sample configuration has been copied
  619. if($systemConfig->getValue('copied_sample_config', false)) {
  620. $l = \OC::$server->getL10N('lib');
  621. header('HTTP/1.1 503 Service Temporarily Unavailable');
  622. header('Status: 503 Service Temporarily Unavailable');
  623. OC_Template::printErrorPage(
  624. $l->t('Sample configuration detected'),
  625. $l->t('It has been detected that the sample configuration has been copied. This can break your installation and is unsupported. Please read the documentation before performing changes on config.php')
  626. );
  627. return;
  628. }
  629. $request = \OC::$server->getRequest();
  630. $host = $request->getInsecureServerHost();
  631. /**
  632. * if the host passed in headers isn't trusted
  633. * FIXME: Should not be in here at all :see_no_evil:
  634. */
  635. if (!OC::$CLI
  636. // overwritehost is always trusted, workaround to not have to make
  637. // \OC\AppFramework\Http\Request::getOverwriteHost public
  638. && self::$server->getConfig()->getSystemValue('overwritehost') === ''
  639. && !\OC::$server->getTrustedDomainHelper()->isTrustedDomain($host)
  640. && self::$server->getConfig()->getSystemValue('installed', false)
  641. ) {
  642. header('HTTP/1.1 400 Bad Request');
  643. header('Status: 400 Bad Request');
  644. $tmpl = new OCP\Template('core', 'untrustedDomain', 'guest');
  645. $tmpl->assign('domain', $request->server['SERVER_NAME']);
  646. $tmpl->printPage();
  647. exit();
  648. }
  649. \OC::$server->getEventLogger()->end('boot');
  650. }
  651. private static function registerLocalAddressBook() {
  652. self::$server->getContactsManager()->register(function() {
  653. $userManager = \OC::$server->getUserManager();
  654. \OC::$server->getContactsManager()->registerAddressBook(
  655. new \OC\Contacts\LocalAddressBook($userManager));
  656. });
  657. }
  658. /**
  659. * register hooks for the cache
  660. */
  661. public static function registerCacheHooks() {
  662. //don't try to do this before we are properly setup
  663. if (\OC::$server->getSystemConfig()->getValue('installed', false) && !\OCP\Util::needUpgrade()) {
  664. // NOTE: This will be replaced to use OCP
  665. $userSession = self::$server->getUserSession();
  666. $userSession->listen('\OC\User', 'postLogin', function () {
  667. try {
  668. $cache = new \OC\Cache\File();
  669. $cache->gc();
  670. } catch (\Exception $e) {
  671. // a GC exception should not prevent users from using OC,
  672. // so log the exception
  673. \OC::$server->getLogger()->warning('Exception when running cache gc: ' . $e->getMessage(), array('app' => 'core'));
  674. }
  675. });
  676. }
  677. }
  678. private static function registerEncryptionWrapper() {
  679. \OCP\Util::connectHook('OC_Filesystem', 'preSetup', 'OC\Encryption\Manager', 'setupStorage');
  680. }
  681. private static function registerEncryptionHooks() {
  682. $enabled = self::$server->getEncryptionManager()->isEnabled();
  683. if ($enabled) {
  684. \OCP\Util::connectHook('OCP\Share', 'post_shared', 'OC\Encryption\HookManager', 'postShared');
  685. \OCP\Util::connectHook('OCP\Share', 'post_unshare', 'OC\Encryption\HookManager', 'postUnshared');
  686. \OCP\Util::connectHook('OC_Filesystem', 'post_rename', 'OC\Encryption\HookManager', 'postRename');
  687. \OCP\Util::connectHook('\OCA\Files_Trashbin\Trashbin', 'post_restore', 'OC\Encryption\HookManager', 'postRestore');
  688. }
  689. }
  690. /**
  691. * register hooks for the cache
  692. */
  693. public static function registerLogRotate() {
  694. $systemConfig = \OC::$server->getSystemConfig();
  695. if ($systemConfig->getValue('installed', false) && $systemConfig->getValue('log_rotate_size', false) && !\OCP\Util::needUpgrade()) {
  696. //don't try to do this before we are properly setup
  697. //use custom logfile path if defined, otherwise use default of owncloud.log in data directory
  698. \OCP\BackgroundJob::registerJob('OC\Log\Rotate', $systemConfig->getValue('logfile', $systemConfig->getValue('datadirectory', OC::$SERVERROOT . '/data') . '/owncloud.log'));
  699. }
  700. }
  701. /**
  702. * register hooks for the filesystem
  703. */
  704. public static function registerFilesystemHooks() {
  705. // Check for blacklisted files
  706. OC_Hook::connect('OC_Filesystem', 'write', 'OC\Files\Filesystem', 'isBlacklisted');
  707. OC_Hook::connect('OC_Filesystem', 'rename', 'OC\Files\Filesystem', 'isBlacklisted');
  708. }
  709. /**
  710. * register hooks for previews
  711. */
  712. public static function registerPreviewHooks() {
  713. OC_Hook::connect('OC_Filesystem', 'post_write', 'OC\Preview', 'post_write');
  714. OC_Hook::connect('OC_Filesystem', 'delete', 'OC\Preview', 'prepare_delete_files');
  715. OC_Hook::connect('\OCP\Versions', 'preDelete', 'OC\Preview', 'prepare_delete');
  716. OC_Hook::connect('\OCP\Trashbin', 'preDelete', 'OC\Preview', 'prepare_delete');
  717. OC_Hook::connect('OC_Filesystem', 'post_delete', 'OC\Preview', 'post_delete_files');
  718. OC_Hook::connect('\OCP\Versions', 'delete', 'OC\Preview', 'post_delete');
  719. OC_Hook::connect('\OCP\Trashbin', 'delete', 'OC\Preview', 'post_delete');
  720. }
  721. /**
  722. * register hooks for sharing
  723. */
  724. public static function registerShareHooks() {
  725. if (\OC::$server->getSystemConfig()->getValue('installed')) {
  726. OC_Hook::connect('OC_User', 'post_deleteUser', 'OC\Share\Hooks', 'post_deleteUser');
  727. OC_Hook::connect('OC_User', 'post_addToGroup', 'OC\Share\Hooks', 'post_addToGroup');
  728. OC_Hook::connect('OC_Group', 'pre_addToGroup', 'OC\Share\Hooks', 'pre_addToGroup');
  729. OC_Hook::connect('OC_User', 'post_removeFromGroup', 'OC\Share\Hooks', 'post_removeFromGroup');
  730. OC_Hook::connect('OC_User', 'post_deleteGroup', 'OC\Share\Hooks', 'post_deleteGroup');
  731. }
  732. }
  733. protected static function registerAutoloaderCache() {
  734. // The class loader takes an optional low-latency cache, which MUST be
  735. // namespaced. The instanceid is used for namespacing, but might be
  736. // unavailable at this point. Futhermore, it might not be possible to
  737. // generate an instanceid via \OC_Util::getInstanceId() because the
  738. // config file may not be writable. As such, we only register a class
  739. // loader cache if instanceid is available without trying to create one.
  740. $instanceId = \OC::$server->getSystemConfig()->getValue('instanceid', null);
  741. if ($instanceId) {
  742. try {
  743. $memcacheFactory = \OC::$server->getMemCacheFactory();
  744. self::$loader->setMemoryCache($memcacheFactory->createLocal('Autoloader'));
  745. } catch (\Exception $ex) {
  746. }
  747. }
  748. }
  749. /**
  750. * Handle the request
  751. */
  752. public static function handleRequest() {
  753. \OC::$server->getEventLogger()->start('handle_request', 'Handle request');
  754. $systemConfig = \OC::$server->getSystemConfig();
  755. // load all the classpaths from the enabled apps so they are available
  756. // in the routing files of each app
  757. OC::loadAppClassPaths();
  758. // Check if ownCloud is installed or in maintenance (update) mode
  759. if (!$systemConfig->getValue('installed', false)) {
  760. \OC::$server->getSession()->clear();
  761. $setupHelper = new OC\Setup(\OC::$server->getConfig(), \OC::$server->getIniWrapper(),
  762. \OC::$server->getL10N('lib'), new \OC_Defaults(), \OC::$server->getLogger(),
  763. \OC::$server->getSecureRandom());
  764. $controller = new OC\Core\Setup\Controller($setupHelper);
  765. $controller->run($_POST);
  766. exit();
  767. }
  768. $request = \OC::$server->getRequest()->getPathInfo();
  769. if (substr($request, -3) !== '.js') { // we need these files during the upgrade
  770. self::checkMaintenanceMode();
  771. self::checkUpgrade();
  772. }
  773. // Always load authentication apps
  774. OC_App::loadApps(['authentication']);
  775. // Load minimum set of apps
  776. if (!self::checkUpgrade(false)
  777. && !$systemConfig->getValue('maintenance', false)
  778. && !\OCP\Util::needUpgrade()) {
  779. // For logged-in users: Load everything
  780. if(OC_User::isLoggedIn()) {
  781. OC_App::loadApps();
  782. } else {
  783. // For guests: Load only filesystem and logging
  784. OC_App::loadApps(array('filesystem', 'logging'));
  785. \OC_User::tryBasicAuthLogin();
  786. }
  787. }
  788. if (!self::$CLI and (!isset($_GET["logout"]) or ($_GET["logout"] !== 'true'))) {
  789. try {
  790. if (!$systemConfig->getValue('maintenance', false) && !\OCP\Util::needUpgrade()) {
  791. OC_App::loadApps(array('filesystem', 'logging'));
  792. OC_App::loadApps();
  793. }
  794. self::checkSingleUserMode();
  795. OC_Util::setupFS();
  796. OC::$server->getRouter()->match(\OC::$server->getRequest()->getRawPathInfo());
  797. return;
  798. } catch (Symfony\Component\Routing\Exception\ResourceNotFoundException $e) {
  799. //header('HTTP/1.0 404 Not Found');
  800. } catch (Symfony\Component\Routing\Exception\MethodNotAllowedException $e) {
  801. OC_Response::setStatus(405);
  802. return;
  803. }
  804. }
  805. // Handle redirect URL for logged in users
  806. if (isset($_REQUEST['redirect_url']) && OC_User::isLoggedIn()) {
  807. $location = OC_Helper::makeURLAbsolute(urldecode($_REQUEST['redirect_url']));
  808. // Deny the redirect if the URL contains a @
  809. // This prevents unvalidated redirects like ?redirect_url=:user@domain.com
  810. if (strpos($location, '@') === false) {
  811. header('Location: ' . $location);
  812. return;
  813. }
  814. }
  815. // Handle WebDAV
  816. if ($_SERVER['REQUEST_METHOD'] == 'PROPFIND') {
  817. // not allowed any more to prevent people
  818. // mounting this root directly.
  819. // Users need to mount remote.php/webdav instead.
  820. header('HTTP/1.1 405 Method Not Allowed');
  821. header('Status: 405 Method Not Allowed');
  822. return;
  823. }
  824. // Redirect to index if the logout link is accessed without valid session
  825. // this is needed to prevent "Token expired" messages while login if a session is expired
  826. // @see https://github.com/owncloud/core/pull/8443#issuecomment-42425583
  827. if(isset($_GET['logout']) && !OC_User::isLoggedIn()) {
  828. header("Location: " . OC::$WEBROOT.(empty(OC::$WEBROOT) ? '/' : ''));
  829. return;
  830. }
  831. // Someone is logged in
  832. if (OC_User::isLoggedIn()) {
  833. OC_App::loadApps();
  834. OC_User::setupBackends();
  835. OC_Util::setupFS();
  836. if (isset($_GET["logout"]) and ($_GET["logout"])) {
  837. OC_JSON::callCheck();
  838. if (isset($_COOKIE['oc_token'])) {
  839. \OC::$server->getConfig()->deleteUserValue(OC_User::getUser(), 'login_token', $_COOKIE['oc_token']);
  840. }
  841. OC_User::logout();
  842. // redirect to webroot and add slash if webroot is empty
  843. header("Location: " . OC::$WEBROOT.(empty(OC::$WEBROOT) ? '/' : ''));
  844. } else {
  845. // Redirect to default application
  846. OC_Util::redirectToDefaultPage();
  847. }
  848. } else {
  849. // Not handled and not logged in
  850. self::handleLogin();
  851. }
  852. }
  853. protected static function handleAuthHeaders() {
  854. //copy http auth headers for apache+php-fcgid work around
  855. if (isset($_SERVER['HTTP_XAUTHORIZATION']) && !isset($_SERVER['HTTP_AUTHORIZATION'])) {
  856. $_SERVER['HTTP_AUTHORIZATION'] = $_SERVER['HTTP_XAUTHORIZATION'];
  857. }
  858. // Extract PHP_AUTH_USER/PHP_AUTH_PW from other headers if necessary.
  859. $vars = array(
  860. 'HTTP_AUTHORIZATION', // apache+php-cgi work around
  861. 'REDIRECT_HTTP_AUTHORIZATION', // apache+php-cgi alternative
  862. );
  863. foreach ($vars as $var) {
  864. if (isset($_SERVER[$var]) && preg_match('/Basic\s+(.*)$/i', $_SERVER[$var], $matches)) {
  865. list($name, $password) = explode(':', base64_decode($matches[1]), 2);
  866. $_SERVER['PHP_AUTH_USER'] = $name;
  867. $_SERVER['PHP_AUTH_PW'] = $password;
  868. break;
  869. }
  870. }
  871. }
  872. protected static function handleLogin() {
  873. OC_App::loadApps(array('prelogin'));
  874. $error = array();
  875. $messages = [];
  876. try {
  877. // auth possible via apache module?
  878. if (OC::tryApacheAuth()) {
  879. $error[] = 'apacheauthfailed';
  880. } // remember was checked after last login
  881. elseif (OC::tryRememberLogin()) {
  882. $error[] = 'invalidcookie';
  883. } // logon via web form
  884. elseif (OC::tryFormLogin()) {
  885. $error[] = 'invalidpassword';
  886. }
  887. } catch (\OC\User\LoginException $e) {
  888. $messages[] = $e->getMessage();
  889. } catch (\Exception $ex) {
  890. \OCP\Util::logException('handleLogin', $ex);
  891. // do not disclose information. show generic error
  892. $error[] = 'internalexception';
  893. }
  894. OC_Util::displayLoginPage(array_unique($error), $messages);
  895. }
  896. /**
  897. * Remove outdated and therefore invalid tokens for a user
  898. * @param string $user
  899. */
  900. protected static function cleanupLoginTokens($user) {
  901. $config = \OC::$server->getConfig();
  902. $cutoff = time() - $config->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15);
  903. $tokens = $config->getUserKeys($user, 'login_token');
  904. foreach ($tokens as $token) {
  905. $time = $config->getUserValue($user, 'login_token', $token);
  906. if ($time < $cutoff) {
  907. $config->deleteUserValue($user, 'login_token', $token);
  908. }
  909. }
  910. }
  911. /**
  912. * Try to login a user via HTTP authentication
  913. * @return bool|void
  914. */
  915. protected static function tryApacheAuth() {
  916. $return = OC_User::handleApacheAuth();
  917. // if return is true we are logged in -> redirect to the default page
  918. if ($return === true) {
  919. $_REQUEST['redirect_url'] = \OC::$server->getRequest()->getRequestUri();
  920. OC_Util::redirectToDefaultPage();
  921. exit;
  922. }
  923. // in case $return is null apache based auth is not enabled
  924. return is_null($return) ? false : true;
  925. }
  926. /**
  927. * Try to login a user using the remember me cookie.
  928. * @return bool Whether the provided cookie was valid
  929. */
  930. protected static function tryRememberLogin() {
  931. if (!isset($_COOKIE["oc_remember_login"])
  932. || !isset($_COOKIE["oc_token"])
  933. || !isset($_COOKIE["oc_username"])
  934. || !$_COOKIE["oc_remember_login"]
  935. || !OC_Util::rememberLoginAllowed()
  936. ) {
  937. return false;
  938. }
  939. if (\OC::$server->getConfig()->getSystemValue('debug', false)) {
  940. \OCP\Util::writeLog('core', 'Trying to login from cookie', \OCP\Util::DEBUG);
  941. }
  942. if(OC_User::userExists($_COOKIE['oc_username'])) {
  943. self::cleanupLoginTokens($_COOKIE['oc_username']);
  944. // verify whether the supplied "remember me" token was valid
  945. $granted = OC_User::loginWithCookie(
  946. $_COOKIE['oc_username'], $_COOKIE['oc_token']);
  947. if($granted === true) {
  948. OC_Util::redirectToDefaultPage();
  949. // doesn't return
  950. }
  951. \OCP\Util::writeLog('core', 'Authentication cookie rejected for user ' .
  952. $_COOKIE['oc_username'], \OCP\Util::WARN);
  953. // if you reach this point you have changed your password
  954. // or you are an attacker
  955. // we can not delete tokens here because users may reach
  956. // this point multiple times after a password change
  957. }
  958. OC_User::unsetMagicInCookie();
  959. return true;
  960. }
  961. /**
  962. * Tries to login a user using the form based authentication
  963. * @return bool|void
  964. */
  965. protected static function tryFormLogin() {
  966. if (!isset($_POST["user"]) || !isset($_POST['password'])) {
  967. return false;
  968. }
  969. if(!OC_Util::isCallRegistered()) {
  970. return false;
  971. }
  972. OC_App::loadApps();
  973. //setup extra user backends
  974. OC_User::setupBackends();
  975. if (OC_User::login((string)$_POST["user"], (string)$_POST["password"])) {
  976. $userId = OC_User::getUser();
  977. // setting up the time zone
  978. if (isset($_POST['timezone-offset'])) {
  979. self::$server->getSession()->set('timezone', (string)$_POST['timezone-offset']);
  980. self::$server->getConfig()->setUserValue($userId, 'core', 'timezone', (string)$_POST['timezone']);
  981. }
  982. self::cleanupLoginTokens($userId);
  983. if (!empty($_POST["remember_login"])) {
  984. $config = self::$server->getConfig();
  985. if ($config->getSystemValue('debug', false)) {
  986. self::$server->getLogger()->debug('Setting remember login to cookie', array('app' => 'core'));
  987. }
  988. $token = \OC::$server->getSecureRandom()->getMediumStrengthGenerator()->generate(32);
  989. $config->setUserValue($userId, 'login_token', $token, time());
  990. OC_User::setMagicInCookie($userId, $token);
  991. } else {
  992. OC_User::unsetMagicInCookie();
  993. }
  994. OC_Util::redirectToDefaultPage();
  995. exit();
  996. }
  997. return true;
  998. }
  999. }
  1000. if (!function_exists('get_temp_dir')) {
  1001. /**
  1002. * Get the temporary dir to store uploaded data
  1003. * @return null|string Path to the temporary directory or null
  1004. */
  1005. function get_temp_dir() {
  1006. if ($temp = ini_get('upload_tmp_dir')) return $temp;
  1007. if ($temp = getenv('TMP')) return $temp;
  1008. if ($temp = getenv('TEMP')) return $temp;
  1009. if ($temp = getenv('TMPDIR')) return $temp;
  1010. $temp = tempnam(__FILE__, '');
  1011. if (file_exists($temp)) {
  1012. unlink($temp);
  1013. return dirname($temp);
  1014. }
  1015. if ($temp = sys_get_temp_dir()) return $temp;
  1016. return null;
  1017. }
  1018. }
  1019. OC::init();