aboutsummaryrefslogtreecommitdiffstats
path: root/apps/federation/lib/BackgroundJob/GetSharedSecret.php
diff options
context:
space:
mode:
Diffstat (limited to 'apps/federation/lib/BackgroundJob/GetSharedSecret.php')
-rw-r--r--apps/federation/lib/BackgroundJob/GetSharedSecret.php176
1 files changed, 176 insertions, 0 deletions
diff --git a/apps/federation/lib/BackgroundJob/GetSharedSecret.php b/apps/federation/lib/BackgroundJob/GetSharedSecret.php
new file mode 100644
index 00000000000..dc57db9fd62
--- /dev/null
+++ b/apps/federation/lib/BackgroundJob/GetSharedSecret.php
@@ -0,0 +1,176 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2017-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+namespace OCA\Federation\BackgroundJob;
+
+use GuzzleHttp\Exception\ClientException;
+use GuzzleHttp\Exception\RequestException;
+use OCA\Federation\TrustedServers;
+use OCP\AppFramework\Http;
+use OCP\AppFramework\Utility\ITimeFactory;
+use OCP\BackgroundJob\IJobList;
+use OCP\BackgroundJob\Job;
+use OCP\Http\Client\IClient;
+use OCP\Http\Client\IClientService;
+use OCP\Http\Client\IResponse;
+use OCP\IConfig;
+use OCP\IURLGenerator;
+use OCP\OCS\IDiscoveryService;
+use Psr\Log\LoggerInterface;
+
+/**
+ * Class GetSharedSecret
+ *
+ * Request shared secret from remote Nextcloud
+ *
+ * @package OCA\Federation\Backgroundjob
+ */
+class GetSharedSecret extends Job {
+ private IClient $httpClient;
+ protected bool $retainJob = false;
+ private string $defaultEndPoint = '/ocs/v2.php/apps/federation/api/v1/shared-secret';
+ /** 30 day = 2592000sec */
+ private int $maxLifespan = 2592000;
+
+ public function __construct(
+ IClientService $httpClientService,
+ private IURLGenerator $urlGenerator,
+ private IJobList $jobList,
+ private TrustedServers $trustedServers,
+ private LoggerInterface $logger,
+ private IDiscoveryService $ocsDiscoveryService,
+ ITimeFactory $timeFactory,
+ private IConfig $config,
+ ) {
+ parent::__construct($timeFactory);
+ $this->httpClient = $httpClientService->newClient();
+ }
+
+ /**
+ * Run the job, then remove it from the joblist
+ */
+ public function start(IJobList $jobList): void {
+ $target = $this->argument['url'];
+ // only execute if target is still in the list of trusted domains
+ if ($this->trustedServers->isTrustedServer($target)) {
+ $this->parentStart($jobList);
+ }
+
+ $jobList->remove($this, $this->argument);
+
+ if ($this->retainJob) {
+ $this->reAddJob($this->argument);
+ }
+ }
+
+ protected function parentStart(IJobList $jobList): void {
+ parent::start($jobList);
+ }
+
+ protected function run($argument) {
+ $target = $argument['url'];
+ $created = isset($argument['created']) ? (int)$argument['created'] : $this->time->getTime();
+ $currentTime = $this->time->getTime();
+ $source = $this->urlGenerator->getAbsoluteURL('/');
+ $source = rtrim($source, '/');
+ $token = $argument['token'];
+
+ // kill job after 30 days of trying
+ $deadline = $currentTime - $this->maxLifespan;
+ if ($created < $deadline) {
+ $this->logger->warning("The job to get the shared secret job is too old and gets stopped now without retention. Setting server status of '{$target}' to failure.");
+ $this->retainJob = false;
+ $this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
+ return;
+ }
+
+ $endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
+ $endPoint = $endPoints['shared-secret'] ?? $this->defaultEndPoint;
+
+ // make sure that we have a well formatted url
+ $url = rtrim($target, '/') . '/' . trim($endPoint, '/');
+
+ $result = null;
+ try {
+ $result = $this->httpClient->get(
+ $url,
+ [
+ 'query' => [
+ 'url' => $source,
+ 'token' => $token,
+ 'format' => 'json',
+ ],
+ 'timeout' => 3,
+ 'connect_timeout' => 3,
+ 'verify' => !$this->config->getSystemValue('sharing.federation.allowSelfSignedCertificates', false),
+ ]
+ );
+
+ $status = $result->getStatusCode();
+ } catch (ClientException $e) {
+ $status = $e->getCode();
+ if ($status === Http::STATUS_FORBIDDEN) {
+ $this->logger->info($target . ' refused to exchange a shared secret with you.');
+ } else {
+ $this->logger->info($target . ' responded with a ' . $status . ' containing: ' . $e->getMessage());
+ }
+ } catch (RequestException $e) {
+ $status = -1; // There is no status code if we could not connect
+ $this->logger->info('Could not connect to ' . $target, [
+ 'exception' => $e,
+ ]);
+ } catch (\Throwable $e) {
+ $status = Http::STATUS_INTERNAL_SERVER_ERROR;
+ $this->logger->error($e->getMessage(), [
+ 'exception' => $e,
+ ]);
+ }
+
+ // if we received a unexpected response we try again later
+ if (
+ $status !== Http::STATUS_OK
+ && $status !== Http::STATUS_FORBIDDEN
+ ) {
+ $this->retainJob = true;
+ }
+
+ if ($status === Http::STATUS_OK && $result instanceof IResponse) {
+ $body = $result->getBody();
+ $result = json_decode($body, true);
+ if (isset($result['ocs']['data']['sharedSecret'])) {
+ $this->trustedServers->addSharedSecret(
+ $target,
+ $result['ocs']['data']['sharedSecret']
+ );
+ } else {
+ $this->logger->error(
+ 'remote server "' . $target . '"" does not return a valid shared secret. Received data: ' . $body
+ );
+ $this->trustedServers->setServerStatus($target, TrustedServers::STATUS_FAILURE);
+ }
+ }
+ }
+
+ /**
+ * Re-add background job
+ *
+ * @param array $argument
+ */
+ protected function reAddJob(array $argument): void {
+ $url = $argument['url'];
+ $created = $argument['created'] ?? $this->time->getTime();
+ $token = $argument['token'];
+ $this->jobList->add(
+ GetSharedSecret::class,
+ [
+ 'url' => $url,
+ 'token' => $token,
+ 'created' => $created
+ ]
+ );
+ }
+}