diff options
Diffstat (limited to 'lib/private/legacy/OC_JSON.php')
-rw-r--r-- | lib/private/legacy/OC_JSON.php | 105 |
1 files changed, 105 insertions, 0 deletions
diff --git a/lib/private/legacy/OC_JSON.php b/lib/private/legacy/OC_JSON.php new file mode 100644 index 00000000000..6daef18dd61 --- /dev/null +++ b/lib/private/legacy/OC_JSON.php @@ -0,0 +1,105 @@ +<?php + +/** + * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors + * SPDX-FileCopyrightText: 2016 ownCloud, Inc. + * SPDX-License-Identifier: AGPL-3.0-only + */ + +use OC\Authentication\TwoFactorAuth\Manager as TwoFactorAuthManager; + +class OC_JSON { + /** + * Check if the app is enabled, send json error msg if not + * @param string $app + * @deprecated 12.0.0 Use the AppFramework instead. It will automatically check if the app is enabled. + * @suppress PhanDeprecatedFunction + */ + public static function checkAppEnabled($app) { + if (!\OC::$server->getAppManager()->isEnabledForUser($app)) { + $l = \OC::$server->getL10N('lib'); + self::error([ 'data' => [ 'message' => $l->t('Application is not enabled'), 'error' => 'application_not_enabled' ]]); + exit(); + } + } + + /** + * Check if the user is logged in, send json error msg if not + * @deprecated 12.0.0 Use annotation based ACLs from the AppFramework instead + * @suppress PhanDeprecatedFunction + */ + public static function checkLoggedIn() { + $twoFactorAuthManger = \OC::$server->get(TwoFactorAuthManager::class); + if (!\OC::$server->getUserSession()->isLoggedIn() + || $twoFactorAuthManger->needsSecondFactor(\OC::$server->getUserSession()->getUser())) { + $l = \OC::$server->getL10N('lib'); + http_response_code(\OCP\AppFramework\Http::STATUS_UNAUTHORIZED); + self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]); + exit(); + } + } + + /** + * Check an ajax get/post call if the request token is valid, send json error msg if not. + * @deprecated 12.0.0 Use annotation based CSRF checks from the AppFramework instead + * @suppress PhanDeprecatedFunction + */ + public static function callCheck() { + if (!\OC::$server->getRequest()->passesStrictCookieCheck()) { + header('Location: ' . \OC::$WEBROOT); + exit(); + } + + if (!\OC::$server->getRequest()->passesCSRFCheck()) { + $l = \OC::$server->getL10N('lib'); + self::error([ 'data' => [ 'message' => $l->t('Token expired. Please reload page.'), 'error' => 'token_expired' ]]); + exit(); + } + } + + /** + * Check if the user is a admin, send json error msg if not. + * @deprecated 12.0.0 Use annotation based ACLs from the AppFramework instead + * @suppress PhanDeprecatedFunction + */ + public static function checkAdminUser() { + if (!OC_User::isAdminUser(OC_User::getUser())) { + $l = \OC::$server->getL10N('lib'); + self::error([ 'data' => [ 'message' => $l->t('Authentication error'), 'error' => 'authentication_error' ]]); + exit(); + } + } + + /** + * Send json error msg + * @deprecated 12.0.0 Use a AppFramework JSONResponse instead + * @suppress PhanDeprecatedFunction + */ + public static function error($data = []) { + $data['status'] = 'error'; + header('Content-Type: application/json; charset=utf-8'); + echo self::encode($data); + } + + /** + * Send json success msg + * @deprecated 12.0.0 Use a AppFramework JSONResponse instead + * @suppress PhanDeprecatedFunction + */ + public static function success($data = []) { + $data['status'] = 'success'; + header('Content-Type: application/json; charset=utf-8'); + echo self::encode($data); + } + + /** + * Encode JSON + * @deprecated 12.0.0 Use a AppFramework JSONResponse instead + * + * @psalm-taint-escape has_quotes + * @psalm-taint-escape html + */ + private static function encode($data) { + return json_encode($data, JSON_HEX_TAG); + } +} |