aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/legacy/OC_JSON.php
diff options
context:
space:
mode:
Diffstat (limited to 'lib/private/legacy/OC_JSON.php')
-rw-r--r--lib/private/legacy/OC_JSON.php105
1 files changed, 105 insertions, 0 deletions
diff --git a/lib/private/legacy/OC_JSON.php b/lib/private/legacy/OC_JSON.php
new file mode 100644
index 00000000000..6daef18dd61
--- /dev/null
+++ b/lib/private/legacy/OC_JSON.php
@@ -0,0 +1,105 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+use OC\Authentication\TwoFactorAuth\Manager as TwoFactorAuthManager;
+
+class OC_JSON {
+ /**
+ * Check if the app is enabled, send json error msg if not
+ * @param string $app
+ * @deprecated 12.0.0 Use the AppFramework instead. It will automatically check if the app is enabled.
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function checkAppEnabled($app) {
+ if (!\OC::$server->getAppManager()->isEnabledForUser($app)) {
+ $l = \OC::$server->getL10N('lib');
+ self::error([ 'data' => [ 'message' => $l->t('Application is not enabled'), 'error' => 'application_not_enabled' ]]);
+ exit();
+ }
+ }
+
+ /**
+ * Check if the user is logged in, send json error msg if not
+ * @deprecated 12.0.0 Use annotation based ACLs from the AppFramework instead
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function checkLoggedIn() {
+ $twoFactorAuthManger = \OC::$server->get(TwoFactorAuthManager::class);
+ if (!\OC::$server->getUserSession()->isLoggedIn()
+ || $twoFactorAuthManger->needsSecondFactor(\OC::$server->getUserSession()->getUser())) {
+ $l = \OC::$server->getL10N('lib');
+ http_response_code(\OCP\AppFramework\Http::STATUS_UNAUTHORIZED);
+ self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]);
+ exit();
+ }
+ }
+
+ /**
+ * Check an ajax get/post call if the request token is valid, send json error msg if not.
+ * @deprecated 12.0.0 Use annotation based CSRF checks from the AppFramework instead
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function callCheck() {
+ if (!\OC::$server->getRequest()->passesStrictCookieCheck()) {
+ header('Location: ' . \OC::$WEBROOT);
+ exit();
+ }
+
+ if (!\OC::$server->getRequest()->passesCSRFCheck()) {
+ $l = \OC::$server->getL10N('lib');
+ self::error([ 'data' => [ 'message' => $l->t('Token expired. Please reload page.'), 'error' => 'token_expired' ]]);
+ exit();
+ }
+ }
+
+ /**
+ * Check if the user is a admin, send json error msg if not.
+ * @deprecated 12.0.0 Use annotation based ACLs from the AppFramework instead
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function checkAdminUser() {
+ if (!OC_User::isAdminUser(OC_User::getUser())) {
+ $l = \OC::$server->getL10N('lib');
+ self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]);
+ exit();
+ }
+ }
+
+ /**
+ * Send json error msg
+ * @deprecated 12.0.0 Use a AppFramework JSONResponse instead
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function error($data = []) {
+ $data['status'] = 'error';
+ header('Content-Type: application/json; charset=utf-8');
+ echo self::encode($data);
+ }
+
+ /**
+ * Send json success msg
+ * @deprecated 12.0.0 Use a AppFramework JSONResponse instead
+ * @suppress PhanDeprecatedFunction
+ */
+ public static function success($data = []) {
+ $data['status'] = 'success';
+ header('Content-Type: application/json; charset=utf-8');
+ echo self::encode($data);
+ }
+
+ /**
+ * Encode JSON
+ * @deprecated 12.0.0 Use a AppFramework JSONResponse instead
+ *
+ * @psalm-taint-escape has_quotes
+ * @psalm-taint-escape html
+ */
+ private static function encode($data) {
+ return json_encode($data, JSON_HEX_TAG);
+ }
+}