summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMorris Jobke <hey@morrisjobke.de>2019-02-20 15:32:38 +0100
committerGitHub <noreply@github.com>2019-02-20 15:32:38 +0100
commitbeba18224898777b559f3a657d890c0e9bdd7864 (patch)
tree6172de82eb66d11bfa10cd5da1204391b11d2dff
parent0becd88feb63de6ac02b495ad1440d8bd7cdcbd2 (diff)
parentfaef05730a2fca6ca019f645685ad6a08839d71c (diff)
downloadnextcloud-server-beba18224898777b559f3a657d890c0e9bdd7864.tar.gz
nextcloud-server-beba18224898777b559f3a657d890c0e9bdd7864.zip
Merge pull request #14255 from nextcloud/fix-ocm-discovery
Fix ocm end-point discovery discovery
-rw-r--r--apps/cloud_federation_api/lib/Capabilities.php3
-rw-r--r--core/js/setupchecks.js40
-rw-r--r--core/js/tests/specs/setupchecksSpec.js36
-rw-r--r--lib/private/Setup.php1
-rw-r--r--settings/js/admin.js6
5 files changed, 83 insertions, 3 deletions
diff --git a/apps/cloud_federation_api/lib/Capabilities.php b/apps/cloud_federation_api/lib/Capabilities.php
index a3db8530ef0..d614d7d4730 100644
--- a/apps/cloud_federation_api/lib/Capabilities.php
+++ b/apps/cloud_federation_api/lib/Capabilities.php
@@ -48,9 +48,10 @@ class Capabilities implements ICapability {
'enabled' => true,
'apiVersion' => '1.0-proposal1',
'endPoint' => substr($url, 0, strrpos($url, '/')),
- 'shareTypes' => [
+ 'resourceTypes' => [
[
'name' => 'file',
+ 'shareTypes' => ['user', 'group'],
'protocols' => [
'webdav' => '/public.php/webdav/',
]
diff --git a/core/js/setupchecks.js b/core/js/setupchecks.js
index 4aa60912c37..7582b062d52 100644
--- a/core/js/setupchecks.js
+++ b/core/js/setupchecks.js
@@ -91,6 +91,46 @@
return deferred.promise();
},
+
+ /**
+ * Check whether the .well-known URLs works.
+ *
+ * @param url the URL to test
+ * @param placeholderUrl the placeholder URL - can be found at oc_defaults.docPlaceholderUrl
+ * @param {boolean} runCheck if this is set to false the check is skipped and no error is returned
+ *
+ * @return $.Deferred object resolved with an array of error messages
+ */
+ checkProviderUrl: function(url, placeholderUrl, runCheck) {
+ var expectedStatus = [200];
+ var deferred = $.Deferred();
+
+ if(runCheck === false) {
+ deferred.resolve([]);
+ return deferred.promise();
+ }
+ var afterCall = function(xhr) {
+ var messages = [];
+ if (expectedStatus.indexOf(xhr.status) === -1) {
+ var docUrl = placeholderUrl.replace('PLACEHOLDER', 'admin-nginx');
+ messages.push({
+ msg: t('core', 'Your web server is not properly set up to resolve "{url}". This is most likely related to a web server configuration that was not updated to deliver this folder directly. Please compare your configuration against the shipped rewrite rules in ".htaccess" for Apache or the provided one in the documentation for Nginx at it\'s <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation page</a>. On Nginx those are typically the lines starting with "location ~" that need an update.', { docLink: docUrl, url: url }),
+ type: OC.SetupChecks.MESSAGE_TYPE_WARNING
+ });
+ }
+ deferred.resolve(messages);
+ };
+
+ $.ajax({
+ type: 'GET',
+ url: url,
+ complete: afterCall,
+ allowAuthErrors: true
+ });
+ return deferred.promise();
+ },
+
+
/**
* Check whether the WOFF2 URLs works.
*
diff --git a/core/js/tests/specs/setupchecksSpec.js b/core/js/tests/specs/setupchecksSpec.js
index 6ea7d812d9a..e2c0053aa71 100644
--- a/core/js/tests/specs/setupchecksSpec.js
+++ b/core/js/tests/specs/setupchecksSpec.js
@@ -107,6 +107,42 @@ describe('OC.SetupChecks tests', function() {
});
});
+ describe('checkProviderUrl', function() {
+ it('should fail with another response status code than the expected one', function(done) {
+ var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', true);
+
+ suite.server.requests[0].respond(302);
+
+ async.done(function( data, s, x ){
+ expect(data).toEqual([{
+ msg: 'Your web server is not properly set up to resolve "/ocm-provider/". This is most likely related to a web server configuration that was not updated to deliver this folder directly. Please compare your configuration against the shipped rewrite rules in ".htaccess" for Apache or the provided one in the documentation for Nginx at it\'s <a href="http://example.org/admin-nginx" rel="noreferrer noopener">documentation page</a>. On Nginx those are typically the lines starting with "location ~" that need an update.',
+ type: OC.SetupChecks.MESSAGE_TYPE_WARNING
+ }]);
+ done();
+ });
+ });
+
+ it('should return no error with the expected response status code', function(done) {
+ var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', true);
+
+ suite.server.requests[0].respond(200);
+
+ async.done(function( data, s, x ){
+ expect(data).toEqual([]);
+ done();
+ });
+ });
+
+ it('should return no error when no check should be run', function(done) {
+ var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', false);
+
+ async.done(function( data, s, x ){
+ expect(data).toEqual([]);
+ done();
+ });
+ });
+ });
+
describe('checkWOFF2Loading', function() {
it('should fail with another response status code than the expected one', function(done) {
var async = OC.SetupChecks.checkWOFF2Loading(OC.filePath('core', '', 'fonts/Nunito-Regular.woff2'), 'http://example.org/PLACEHOLDER');
diff --git a/lib/private/Setup.php b/lib/private/Setup.php
index 0278191587a..5b2f71e69c5 100644
--- a/lib/private/Setup.php
+++ b/lib/private/Setup.php
@@ -517,6 +517,7 @@ class Setup {
$content .= "\n RewriteCond %{REQUEST_FILENAME} !/robots.txt";
$content .= "\n RewriteCond %{REQUEST_FILENAME} !/updater/";
$content .= "\n RewriteCond %{REQUEST_FILENAME} !/ocs-provider/";
+ $content .= "\n RewriteCond %{REQUEST_FILENAME} !/ocm-provider/";
$content .= "\n RewriteCond %{REQUEST_URI} !^/\\.well-known/(acme-challenge|pki-validation)/.*";
$content .= "\n RewriteRule . index.php [PT,E=PATH_INFO:$1]";
$content .= "\n RewriteBase " . $rewriteBase;
diff --git a/settings/js/admin.js b/settings/js/admin.js
index 1c9b5460eab..0ca9b6162e2 100644
--- a/settings/js/admin.js
+++ b/settings/js/admin.js
@@ -251,12 +251,14 @@ $(document).ready(function(){
OC.SetupChecks.checkWellKnownUrl('/.well-known/webfinger', oc_defaults.docPlaceholderUrl, $('#postsetupchecks').data('check-wellknown') === true && !!oc_appconfig.core.public_webfinger, [200, 501]),
OC.SetupChecks.checkWellKnownUrl('/.well-known/caldav', oc_defaults.docPlaceholderUrl, $('#postsetupchecks').data('check-wellknown') === true),
OC.SetupChecks.checkWellKnownUrl('/.well-known/carddav', oc_defaults.docPlaceholderUrl, $('#postsetupchecks').data('check-wellknown') === true),
+ OC.SetupChecks.checkProviderUrl('/ocm-provider/', oc_defaults.docPlaceholderUrl, $('#postsetupchecks').data('check-wellknown') === true),
+ OC.SetupChecks.checkProviderUrl('/ocs-provider/', oc_defaults.docPlaceholderUrl, $('#postsetupchecks').data('check-wellknown') === true),
OC.SetupChecks.checkSetup(),
OC.SetupChecks.checkGeneric(),
OC.SetupChecks.checkWOFF2Loading(OC.filePath('core', '', 'fonts/Nunito-Regular.woff2'), oc_defaults.docPlaceholderUrl),
OC.SetupChecks.checkDataProtected()
- ).then(function (check1, check2, check3, check4, check5, check6, check7, check8) {
- var messages = [].concat(check1, check2, check3, check4, check5, check6, check7, check8);
+ ).then(function (check1, check2, check3, check4, check5, check6, check7, check8, check9, check10) {
+ var messages = [].concat(check1, check2, check3, check4, check5, check6, check7, check8, check9, check10);
var $el = $('#postsetupchecks');
$('#security-warning-state-loading').addClass('hidden');