aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/Template/JSConfigHelper.php
diff options
context:
space:
mode:
Diffstat (limited to 'lib/private/Template/JSConfigHelper.php')
-rw-r--r--lib/private/Template/JSConfigHelper.php310
1 files changed, 310 insertions, 0 deletions
diff --git a/lib/private/Template/JSConfigHelper.php b/lib/private/Template/JSConfigHelper.php
new file mode 100644
index 00000000000..044fa8147a0
--- /dev/null
+++ b/lib/private/Template/JSConfigHelper.php
@@ -0,0 +1,310 @@
+<?php
+
+declare(strict_types=1);
+/**
+ * SPDX-FileCopyrightText: 2016 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-License-Identifier: AGPL-3.0-or-later
+ */
+namespace OC\Template;
+
+use bantu\IniGetWrapper\IniGetWrapper;
+use OC\Authentication\Token\IProvider;
+use OC\CapabilitiesManager;
+use OC\Core\AppInfo\ConfigLexicon;
+use OC\Files\FilenameValidator;
+use OC\Share\Share;
+use OCA\Provisioning_API\Controller\AUserDataOCSController;
+use OCP\App\AppPathNotFoundException;
+use OCP\App\IAppManager;
+use OCP\Authentication\Exceptions\ExpiredTokenException;
+use OCP\Authentication\Exceptions\InvalidTokenException;
+use OCP\Authentication\Exceptions\WipeTokenException;
+use OCP\Authentication\Token\IToken;
+use OCP\Constants;
+use OCP\Defaults;
+use OCP\Files\FileInfo;
+use OCP\IAppConfig;
+use OCP\IConfig;
+use OCP\IGroupManager;
+use OCP\IInitialStateService;
+use OCP\IL10N;
+use OCP\ILogger;
+use OCP\ISession;
+use OCP\IURLGenerator;
+use OCP\IUser;
+use OCP\Server;
+use OCP\ServerVersion;
+use OCP\Session\Exceptions\SessionNotAvailableException;
+use OCP\Share\IManager as IShareManager;
+use OCP\User\Backend\IPasswordConfirmationBackend;
+use OCP\Util;
+
+class JSConfigHelper {
+
+ /** @var array user back-ends excluded from password verification */
+ private $excludedUserBackEnds = ['user_saml' => true, 'user_globalsiteselector' => true];
+
+ public function __construct(
+ protected ServerVersion $serverVersion,
+ protected IL10N $l,
+ protected Defaults $defaults,
+ protected IAppManager $appManager,
+ protected ISession $session,
+ protected ?IUser $currentUser,
+ protected IConfig $config,
+ protected readonly IAppConfig $appConfig,
+ protected IGroupManager $groupManager,
+ protected IniGetWrapper $iniWrapper,
+ protected IURLGenerator $urlGenerator,
+ protected CapabilitiesManager $capabilitiesManager,
+ protected IInitialStateService $initialStateService,
+ protected IProvider $tokenProvider,
+ protected FilenameValidator $filenameValidator,
+ ) {
+ }
+
+ public function getConfig(): string {
+ $userBackendAllowsPasswordConfirmation = true;
+ if ($this->currentUser !== null) {
+ $uid = $this->currentUser->getUID();
+
+ $backend = $this->currentUser->getBackend();
+ if ($backend instanceof IPasswordConfirmationBackend) {
+ $userBackendAllowsPasswordConfirmation = $backend->canConfirmPassword($uid) && $this->canUserValidatePassword();
+ } elseif (isset($this->excludedUserBackEnds[$this->currentUser->getBackendClassName()])) {
+ $userBackendAllowsPasswordConfirmation = false;
+ } else {
+ $userBackendAllowsPasswordConfirmation = $this->canUserValidatePassword();
+ }
+ } else {
+ $uid = null;
+ }
+
+ // Get the config
+ $apps_paths = [];
+
+ if ($this->currentUser === null) {
+ $apps = $this->appManager->getEnabledApps();
+ } else {
+ $apps = $this->appManager->getEnabledAppsForUser($this->currentUser);
+ }
+
+ foreach ($apps as $app) {
+ try {
+ $apps_paths[$app] = $this->appManager->getAppWebPath($app);
+ } catch (AppPathNotFoundException $e) {
+ $apps_paths[$app] = false;
+ }
+ }
+
+ $enableLinkPasswordByDefault = $this->appConfig->getValueBool('core', ConfigLexicon::SHARE_LINK_PASSWORD_DEFAULT);
+ $defaultExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_expire_date', 'no') === 'yes';
+ $defaultExpireDate = $enforceDefaultExpireDate = null;
+ if ($defaultExpireDateEnabled) {
+ $defaultExpireDate = (int)$this->config->getAppValue('core', 'shareapi_expire_after_n_days', '7');
+ $enforceDefaultExpireDate = $this->config->getAppValue('core', 'shareapi_enforce_expire_date', 'no') === 'yes';
+ }
+ $outgoingServer2serverShareEnabled = $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'yes';
+
+ $defaultInternalExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_internal_expire_date', 'no') === 'yes';
+ $defaultInternalExpireDate = $defaultInternalExpireDateEnforced = null;
+ if ($defaultInternalExpireDateEnabled) {
+ $defaultInternalExpireDate = (int)$this->config->getAppValue('core', 'shareapi_internal_expire_after_n_days', '7');
+ $defaultInternalExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_internal_expire_date', 'no') === 'yes';
+ }
+
+ $defaultRemoteExpireDateEnabled = $this->config->getAppValue('core', 'shareapi_default_remote_expire_date', 'no') === 'yes';
+ $defaultRemoteExpireDate = $defaultRemoteExpireDateEnforced = null;
+ if ($defaultRemoteExpireDateEnabled) {
+ $defaultRemoteExpireDate = (int)$this->config->getAppValue('core', 'shareapi_remote_expire_after_n_days', '7');
+ $defaultRemoteExpireDateEnforced = $this->config->getAppValue('core', 'shareapi_enforce_remote_expire_date', 'no') === 'yes';
+ }
+
+ $countOfDataLocation = 0;
+ $dataLocation = str_replace(\OC::$SERVERROOT . '/', '', $this->config->getSystemValue('datadirectory', ''), $countOfDataLocation);
+ if ($countOfDataLocation !== 1 || $uid === null || !$this->groupManager->isAdmin($uid)) {
+ $dataLocation = false;
+ }
+
+ if ($this->currentUser instanceof IUser) {
+ if ($this->canUserValidatePassword()) {
+ $lastConfirmTimestamp = $this->session->get('last-password-confirm');
+ if (!is_int($lastConfirmTimestamp)) {
+ $lastConfirmTimestamp = 0;
+ }
+ } else {
+ $lastConfirmTimestamp = PHP_INT_MAX;
+ }
+ } else {
+ $lastConfirmTimestamp = 0;
+ }
+
+ $capabilities = $this->capabilitiesManager->getCapabilities(false, true);
+
+ $userFirstDay = $this->config->getUserValue($uid, 'core', AUserDataOCSController::USER_FIELD_FIRST_DAY_OF_WEEK, null);
+ $firstDay = (int)($userFirstDay ?? $this->l->l('firstday', null));
+
+ $config = [
+ /** @deprecated 30.0.0 - use files capabilities instead */
+ 'blacklist_files_regex' => FileInfo::BLACKLIST_FILES_REGEX,
+ /** @deprecated 30.0.0 - use files capabilities instead */
+ 'forbidden_filename_characters' => $this->filenameValidator->getForbiddenCharacters(),
+
+ 'auto_logout' => $this->config->getSystemValue('auto_logout', false),
+ 'loglevel' => $this->config->getSystemValue('loglevel_frontend',
+ $this->config->getSystemValue('loglevel', ILogger::WARN)
+ ),
+ 'lost_password_link' => $this->config->getSystemValue('lost_password_link', null),
+ 'modRewriteWorking' => $this->config->getSystemValue('htaccess.IgnoreFrontController', false) === true || getenv('front_controller_active') === 'true',
+ 'no_unsupported_browser_warning' => $this->config->getSystemValue('no_unsupported_browser_warning', false),
+ 'session_keepalive' => $this->config->getSystemValue('session_keepalive', true),
+ 'session_lifetime' => min($this->config->getSystemValue('session_lifetime', $this->iniWrapper->getNumeric('session.gc_maxlifetime')), $this->iniWrapper->getNumeric('session.gc_maxlifetime')),
+ 'sharing.maxAutocompleteResults' => max(0, $this->config->getSystemValueInt('sharing.maxAutocompleteResults', Constants::SHARING_MAX_AUTOCOMPLETE_RESULTS_DEFAULT)),
+ 'sharing.minSearchStringLength' => $this->config->getSystemValueInt('sharing.minSearchStringLength', 0),
+ 'version' => implode('.', $this->serverVersion->getVersion()),
+ 'versionstring' => $this->serverVersion->getVersionString(),
+ 'enable_non-accessible_features' => $this->config->getSystemValueBool('enable_non-accessible_features', true),
+ ];
+
+ $shareManager = Server::get(IShareManager::class);
+
+ $array = [
+ '_oc_debug' => $this->config->getSystemValue('debug', false) ? 'true' : 'false',
+ '_oc_isadmin' => $uid !== null && $this->groupManager->isAdmin($uid) ? 'true' : 'false',
+ 'backendAllowsPasswordConfirmation' => $userBackendAllowsPasswordConfirmation ? 'true' : 'false',
+ 'oc_dataURL' => is_string($dataLocation) ? '"' . $dataLocation . '"' : 'false',
+ '_oc_webroot' => '"' . \OC::$WEBROOT . '"',
+ '_oc_appswebroots' => str_replace('\\/', '/', json_encode($apps_paths)), // Ugly unescape slashes waiting for better solution
+ 'datepickerFormatDate' => json_encode($this->l->l('jsdate', null)),
+ 'nc_lastLogin' => $lastConfirmTimestamp,
+ 'nc_pageLoad' => time(),
+ 'dayNames' => json_encode([
+ $this->l->t('Sunday'),
+ $this->l->t('Monday'),
+ $this->l->t('Tuesday'),
+ $this->l->t('Wednesday'),
+ $this->l->t('Thursday'),
+ $this->l->t('Friday'),
+ $this->l->t('Saturday')
+ ]),
+ 'dayNamesShort' => json_encode([
+ $this->l->t('Sun.'),
+ $this->l->t('Mon.'),
+ $this->l->t('Tue.'),
+ $this->l->t('Wed.'),
+ $this->l->t('Thu.'),
+ $this->l->t('Fri.'),
+ $this->l->t('Sat.')
+ ]),
+ 'dayNamesMin' => json_encode([
+ $this->l->t('Su'),
+ $this->l->t('Mo'),
+ $this->l->t('Tu'),
+ $this->l->t('We'),
+ $this->l->t('Th'),
+ $this->l->t('Fr'),
+ $this->l->t('Sa')
+ ]),
+ 'monthNames' => json_encode([
+ $this->l->t('January'),
+ $this->l->t('February'),
+ $this->l->t('March'),
+ $this->l->t('April'),
+ $this->l->t('May'),
+ $this->l->t('June'),
+ $this->l->t('July'),
+ $this->l->t('August'),
+ $this->l->t('September'),
+ $this->l->t('October'),
+ $this->l->t('November'),
+ $this->l->t('December')
+ ]),
+ 'monthNamesShort' => json_encode([
+ $this->l->t('Jan.'),
+ $this->l->t('Feb.'),
+ $this->l->t('Mar.'),
+ $this->l->t('Apr.'),
+ $this->l->t('May.'),
+ $this->l->t('Jun.'),
+ $this->l->t('Jul.'),
+ $this->l->t('Aug.'),
+ $this->l->t('Sep.'),
+ $this->l->t('Oct.'),
+ $this->l->t('Nov.'),
+ $this->l->t('Dec.')
+ ]),
+ 'firstDay' => json_encode($firstDay),
+ '_oc_config' => json_encode($config),
+ 'oc_appconfig' => json_encode([
+ 'core' => [
+ 'defaultExpireDateEnabled' => $defaultExpireDateEnabled,
+ 'defaultExpireDate' => $defaultExpireDate,
+ 'defaultExpireDateEnforced' => $enforceDefaultExpireDate,
+ 'enforcePasswordForPublicLink' => Util::isPublicLinkPasswordRequired(),
+ 'enableLinkPasswordByDefault' => $enableLinkPasswordByDefault,
+ 'sharingDisabledForUser' => $shareManager->sharingDisabledForUser($uid),
+ 'resharingAllowed' => Share::isResharingAllowed(),
+ 'remoteShareAllowed' => $outgoingServer2serverShareEnabled,
+ 'federatedCloudShareDoc' => $this->urlGenerator->linkToDocs('user-sharing-federated'),
+ 'allowGroupSharing' => $shareManager->allowGroupSharing(),
+ 'defaultInternalExpireDateEnabled' => $defaultInternalExpireDateEnabled,
+ 'defaultInternalExpireDate' => $defaultInternalExpireDate,
+ 'defaultInternalExpireDateEnforced' => $defaultInternalExpireDateEnforced,
+ 'defaultRemoteExpireDateEnabled' => $defaultRemoteExpireDateEnabled,
+ 'defaultRemoteExpireDate' => $defaultRemoteExpireDate,
+ 'defaultRemoteExpireDateEnforced' => $defaultRemoteExpireDateEnforced,
+ ]
+ ]),
+ '_theme' => json_encode([
+ 'entity' => $this->defaults->getEntity(),
+ 'name' => $this->defaults->getName(),
+ 'productName' => $this->defaults->getProductName(),
+ 'title' => $this->defaults->getTitle(),
+ 'baseUrl' => $this->defaults->getBaseUrl(),
+ 'syncClientUrl' => $this->defaults->getSyncClientUrl(),
+ 'docBaseUrl' => $this->defaults->getDocBaseUrl(),
+ 'docPlaceholderUrl' => $this->defaults->buildDocLinkToKey('PLACEHOLDER'),
+ 'slogan' => $this->defaults->getSlogan(),
+ 'logoClaim' => '',
+ 'folder' => \OC_Util::getTheme(),
+ ]),
+ ];
+
+ if ($this->currentUser !== null) {
+ $array['oc_userconfig'] = json_encode([
+ 'avatar' => [
+ 'version' => (int)$this->config->getUserValue($uid, 'avatar', 'version', 0),
+ 'generated' => $this->config->getUserValue($uid, 'avatar', 'generated', 'true') === 'true',
+ ]
+ ]);
+ }
+
+ $this->initialStateService->provideInitialState('core', 'projects_enabled', $this->config->getSystemValueBool('projects.enabled', false));
+
+ $this->initialStateService->provideInitialState('core', 'config', $config);
+ $this->initialStateService->provideInitialState('core', 'capabilities', $capabilities);
+
+ // Allow hooks to modify the output values
+ \OC_Hook::emit('\OCP\Config', 'js', ['array' => &$array]);
+
+ $result = '';
+
+ // Echo it
+ foreach ($array as $setting => $value) {
+ $result .= 'var ' . $setting . '=' . $value . ';' . PHP_EOL;
+ }
+
+ return $result;
+ }
+
+ protected function canUserValidatePassword(): bool {
+ try {
+ $token = $this->tokenProvider->getToken($this->session->getId());
+ } catch (ExpiredTokenException|WipeTokenException|InvalidTokenException|SessionNotAvailableException) {
+ // actually we do not know, so we fall back to this statement
+ return true;
+ }
+ $scope = $token->getScopeAsArray();
+ return !isset($scope[IToken::SCOPE_SKIP_PASSWORD_VALIDATION]) || $scope[IToken::SCOPE_SKIP_PASSWORD_VALIDATION] === false;
+ }
+}