aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Calviño Sánchez <danxuliu@gmail.com>2021-01-26 10:26:10 +0100
committerDaniel Calviño Sánchez <danxuliu@gmail.com>2021-01-28 21:42:31 +0100
commit9ccabff6ba9a0e89d7128fbdd43d48fe7a68b11e (patch)
treeded13369f045d936bc2d471799a77b400ac3babc
parent3aba5b27be3808107c2090a34c614ca11837aeac (diff)
downloadnextcloud-server-9ccabff6ba9a0e89d7128fbdd43d48fe7a68b11e.tar.gz
nextcloud-server-9ccabff6ba9a0e89d7128fbdd43d48fe7a68b11e.zip
Fix valid storages removed when cleaning remote storages
The remote URL of a share is always stored in the database with a trailing slash. However, when a cloud ID is generated trailing slashes are removed. The ID of a remote storage is generated from the cloud ID, but the "cleanup-remote-storage" command directly used the remote URL stored in the database. Due to this, even if the remote storage was valid, its ID did not match the ID of the remote share generated by the command and ended being removed. Now the command generates the ID of remote shares using the cloud ID instead, just like done by the remote storage, so there is no longer a mismatch. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
-rw-r--r--apps/files_sharing/lib/Command/CleanupRemoteStorages.php16
-rw-r--r--apps/files_sharing/tests/Command/CleanupRemoteStoragesTest.php27
2 files changed, 39 insertions, 4 deletions
diff --git a/apps/files_sharing/lib/Command/CleanupRemoteStorages.php b/apps/files_sharing/lib/Command/CleanupRemoteStorages.php
index db18e7d2499..cf0550aef7f 100644
--- a/apps/files_sharing/lib/Command/CleanupRemoteStorages.php
+++ b/apps/files_sharing/lib/Command/CleanupRemoteStorages.php
@@ -25,6 +25,7 @@
namespace OCA\Files_Sharing\Command;
use OCP\DB\QueryBuilder\IQueryBuilder;
+use OCP\Federation\ICloudIdManager;
use OCP\IDBConnection;
use Symfony\Component\Console\Command\Command;
use Symfony\Component\Console\Input\InputInterface;
@@ -42,8 +43,14 @@ class CleanupRemoteStorages extends Command {
*/
protected $connection;
- public function __construct(IDBConnection $connection) {
+ /**
+ * @var ICloudIdManager
+ */
+ private $cloudIdManager;
+
+ public function __construct(IDBConnection $connection, ICloudIdManager $cloudIdManager) {
$this->connection = $connection;
+ $this->cloudIdManager = $cloudIdManager;
parent::__construct();
}
@@ -166,14 +173,17 @@ class CleanupRemoteStorages extends Command {
public function getRemoteShareIds() {
$queryBuilder = $this->connection->getQueryBuilder();
- $queryBuilder->select(['id', 'share_token', 'remote'])
+ $queryBuilder->select(['id', 'share_token', 'owner', 'remote'])
->from('share_external');
$query = $queryBuilder->execute();
$remoteShareIds = [];
while ($row = $query->fetch()) {
- $remoteShareIds[$row['id']] = 'shared::' . md5($row['share_token'] . '@' . $row['remote']);
+ $cloudId = $this->cloudIdManager->getCloudId($row['owner'], $row['remote']);
+ $remote = $cloudId->getRemote();
+
+ $remoteShareIds[$row['id']] = 'shared::' . md5($row['share_token'] . '@' . $remote);
}
return $remoteShareIds;
diff --git a/apps/files_sharing/tests/Command/CleanupRemoteStoragesTest.php b/apps/files_sharing/tests/Command/CleanupRemoteStoragesTest.php
index 3176163c442..ba4b1d05499 100644
--- a/apps/files_sharing/tests/Command/CleanupRemoteStoragesTest.php
+++ b/apps/files_sharing/tests/Command/CleanupRemoteStoragesTest.php
@@ -26,6 +26,8 @@
namespace OCA\Files_Sharing\Tests\Command;
use OCA\Files_Sharing\Command\CleanupRemoteStorages;
+use OCP\Federation\ICloudId;
+use OCP\Federation\ICloudIdManager;
use Symfony\Component\Console\Input\InputInterface;
use Symfony\Component\Console\Output\OutputInterface;
use Test\TestCase;
@@ -49,6 +51,11 @@ class CleanupRemoteStoragesTest extends TestCase {
*/
private $connection;
+ /**
+ * @var ICloudIdManager|\PHPUnit\Framework\MockObject\MockObject
+ */
+ private $cloudIdManager;
+
private $storages = [
['id' => 'shared::7b4a322b22f9d0047c38d77d471ce3cf', 'share_token' => 'f2c69dad1dc0649f26976fd210fc62e1', 'remote' => 'https://hostname.tld/owncloud1', 'user' => 'user1'],
['id' => 'shared::efe3b456112c3780da6155d3a9b9141c', 'share_token' => 'f2c69dad1dc0649f26976fd210fc62e2', 'remote' => 'https://hostname.tld/owncloud2', 'user' => 'user2'],
@@ -109,7 +116,9 @@ class CleanupRemoteStoragesTest extends TestCase {
}
}
- $this->command = new CleanupRemoteStorages($this->connection);
+ $this->cloudIdManager = $this->createMock(ICloudIdManager::class);
+
+ $this->command = new CleanupRemoteStorages($this->connection, $this->cloudIdManager);
}
protected function tearDown(): void {
@@ -191,6 +200,22 @@ class CleanupRemoteStoragesTest extends TestCase {
->method('writeln')
->with('5 remote share(s) exist');
+ $this->cloudIdManager
+ ->expects($this->any())
+ ->method('getCloudId')
+ ->will($this->returnCallback(function (string $user, string $remote) {
+ $cloudIdMock = $this->createMock(ICloudId::class);
+
+ // The remotes are already sanitized in the original data, so
+ // they can be directly returned.
+ $cloudIdMock
+ ->expects($this->any())
+ ->method('getRemote')
+ ->willReturn($remote);
+
+ return $cloudIdMock;
+ }));
+
$this->command->execute($input, $output);
$this->assertTrue($this->doesStorageExist($this->storages[0]['numeric_id']));