123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529 |
- <?php
- /**
- * @author Clark Tomlinson <fallen013@gmail.com>
- * @author Lukas Reschke <lukas@owncloud.com>
- * @author Morris Jobke <hey@morrisjobke.de>
- * @author Robin Appelman <icewind@owncloud.com>
- * @author Thomas Müller <thomas.mueller@tmit.eu>
- *
- * @copyright Copyright (c) 2015, ownCloud, Inc.
- * @license AGPL-3.0
- *
- * This code is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License, version 3,
- * as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License, version 3,
- * along with this program. If not, see <http://www.gnu.org/licenses/>
- *
- */
- namespace OC\Settings\Controller;
- use OC\AppFramework\Http;
- use OC\Settings\Factory\SubAdminFactory;
- use OC\User\User;
- use OCP\App\IAppManager;
- use OCP\AppFramework\Controller;
- use OCP\AppFramework\Http\DataResponse;
- use OCP\AppFramework\Http\TemplateResponse;
- use OCP\IConfig;
- use OCP\IGroupManager;
- use OCP\IL10N;
- use OCP\ILogger;
- use OCP\IRequest;
- use OCP\IURLGenerator;
- use OCP\IUser;
- use OCP\IUserManager;
- use OCP\IUserSession;
- use OCP\Mail\IMailer;
- /**
- * @package OC\Settings\Controller
- */
- class UsersController extends Controller {
- /** @var IL10N */
- private $l10n;
- /** @var IUserSession */
- private $userSession;
- /** @var bool */
- private $isAdmin;
- /** @var IUserManager */
- private $userManager;
- /** @var IGroupManager */
- private $groupManager;
- /** @var IConfig */
- private $config;
- /** @var ILogger */
- private $log;
- /** @var \OC_Defaults */
- private $defaults;
- /** @var IMailer */
- private $mailer;
- /** @var string */
- private $fromMailAddress;
- /** @var IURLGenerator */
- private $urlGenerator;
- /** @var bool contains the state of the encryption app */
- private $isEncryptionAppEnabled;
- /** @var bool contains the state of the admin recovery setting */
- private $isRestoreEnabled = false;
- /** @var SubAdminFactory */
- private $subAdminFactory;
- /**
- * @param string $appName
- * @param IRequest $request
- * @param IUserManager $userManager
- * @param IGroupManager $groupManager
- * @param IUserSession $userSession
- * @param IConfig $config
- * @param bool $isAdmin
- * @param IL10N $l10n
- * @param ILogger $log
- * @param \OC_Defaults $defaults
- * @param IMailer $mailer
- * @param string $fromMailAddress
- * @param IURLGenerator $urlGenerator
- * @param IAppManager $appManager
- * @param SubAdminFactory $subAdminFactory
- */
- public function __construct($appName,
- IRequest $request,
- IUserManager $userManager,
- IGroupManager $groupManager,
- IUserSession $userSession,
- IConfig $config,
- $isAdmin,
- IL10N $l10n,
- ILogger $log,
- \OC_Defaults $defaults,
- IMailer $mailer,
- $fromMailAddress,
- IURLGenerator $urlGenerator,
- IAppManager $appManager,
- SubAdminFactory $subAdminFactory) {
- parent::__construct($appName, $request);
- $this->userManager = $userManager;
- $this->groupManager = $groupManager;
- $this->userSession = $userSession;
- $this->config = $config;
- $this->isAdmin = $isAdmin;
- $this->l10n = $l10n;
- $this->log = $log;
- $this->defaults = $defaults;
- $this->mailer = $mailer;
- $this->fromMailAddress = $fromMailAddress;
- $this->urlGenerator = $urlGenerator;
- $this->subAdminFactory = $subAdminFactory;
- // check for encryption state - TODO see formatUserForIndex
- $this->isEncryptionAppEnabled = $appManager->isEnabledForUser('encryption');
- if($this->isEncryptionAppEnabled) {
- // putting this directly in empty is possible in PHP 5.5+
- $result = $config->getAppValue('encryption', 'recoveryAdminEnabled', 0);
- $this->isRestoreEnabled = !empty($result);
- }
- }
- /**
- * @param IUser $user
- * @param array $userGroups
- * @return array
- */
- private function formatUserForIndex(IUser $user, array $userGroups = null) {
- // TODO: eliminate this encryption specific code below and somehow
- // hook in additional user info from other apps
- // recovery isn't possible if admin or user has it disabled and encryption
- // is enabled - so we eliminate the else paths in the conditional tree
- // below
- $restorePossible = false;
- if ($this->isEncryptionAppEnabled) {
- if ($this->isRestoreEnabled) {
- // check for the users recovery setting
- $recoveryMode = $this->config->getUserValue($user->getUID(), 'encryption', 'recoveryEnabled', '0');
- // method call inside empty is possible with PHP 5.5+
- $recoveryModeEnabled = !empty($recoveryMode);
- if ($recoveryModeEnabled) {
- // user also has recovery mode enabled
- $restorePossible = true;
- }
- }
- } else {
- // recovery is possible if encryption is disabled (plain files are
- // available)
- $restorePossible = true;
- }
- return [
- 'name' => $user->getUID(),
- 'displayname' => $user->getDisplayName(),
- 'groups' => (empty($userGroups)) ? $this->groupManager->getUserGroupIds($user) : $userGroups,
- 'subadmin' => \OC_SubAdmin::getSubAdminsGroups($user->getUID()),
- 'quota' => $this->config->getUserValue($user->getUID(), 'files', 'quota', 'default'),
- 'storageLocation' => $user->getHome(),
- 'lastLogin' => $user->getLastLogin() * 1000,
- 'backend' => $user->getBackendClassName(),
- 'email' => $this->config->getUserValue($user->getUID(), 'settings', 'email', ''),
- 'isRestoreDisabled' => !$restorePossible,
- ];
- }
- /**
- * @param array $userIDs Array with schema [$uid => $displayName]
- * @return IUser[]
- */
- private function getUsersForUID(array $userIDs) {
- $users = [];
- foreach ($userIDs as $uid => $displayName) {
- $users[$uid] = $this->userManager->get($uid);
- }
- return $users;
- }
- /**
- * @NoAdminRequired
- *
- * @param int $offset
- * @param int $limit
- * @param string $gid GID to filter for
- * @param string $pattern Pattern to search for in the username
- * @param string $backend Backend to filter for (class-name)
- * @return DataResponse
- *
- * TODO: Tidy up and write unit tests - code is mainly static method calls
- */
- public function index($offset = 0, $limit = 10, $gid = '', $pattern = '', $backend = '') {
- // FIXME: The JS sends the group '_everyone' instead of no GID for the "all users" group.
- if($gid === '_everyone') {
- $gid = '';
- }
- // Remove backends
- if(!empty($backend)) {
- $activeBackends = $this->userManager->getBackends();
- $this->userManager->clearBackends();
- foreach($activeBackends as $singleActiveBackend) {
- if($backend === get_class($singleActiveBackend)) {
- $this->userManager->registerBackend($singleActiveBackend);
- break;
- }
- }
- }
- $users = [];
- if ($this->isAdmin) {
- if($gid !== '') {
- $batch = $this->getUsersForUID($this->groupManager->displayNamesInGroup($gid, $pattern, $limit, $offset));
- } else {
- $batch = $this->userManager->search($pattern, $limit, $offset);
- }
- foreach ($batch as $user) {
- $users[] = $this->formatUserForIndex($user);
- }
- } else {
- $subAdminOfGroups = $this->subAdminFactory->getSubAdminsOfGroups(
- $this->userSession->getUser()->getUID()
- );
- // Set the $gid parameter to an empty value if the subadmin has no rights to access a specific group
- if($gid !== '' && !in_array($gid, $subAdminOfGroups)) {
- $gid = '';
- }
- // Batch all groups the user is subadmin of when a group is specified
- $batch = [];
- if($gid === '') {
- foreach($subAdminOfGroups as $group) {
- $groupUsers = $this->groupManager->displayNamesInGroup($group, $pattern, $limit, $offset);
- foreach($groupUsers as $uid => $displayName) {
- $batch[$uid] = $displayName;
- }
- }
- } else {
- $batch = $this->groupManager->displayNamesInGroup($gid, $pattern, $limit, $offset);
- }
- $batch = $this->getUsersForUID($batch);
- foreach ($batch as $user) {
- // Only add the groups, this user is a subadmin of
- $userGroups = array_values(array_intersect(
- $this->groupManager->getUserGroupIds($user),
- $subAdminOfGroups
- ));
- $users[] = $this->formatUserForIndex($user, $userGroups);
- }
- }
- return new DataResponse($users);
- }
- /**
- * @NoAdminRequired
- *
- * @param string $username
- * @param string $password
- * @param array $groups
- * @param string $email
- * @return DataResponse
- */
- public function create($username, $password, array $groups=array(), $email='') {
- if($email !== '' && !$this->mailer->validateMailAddress($email)) {
- return new DataResponse(
- array(
- 'message' => (string)$this->l10n->t('Invalid mail address')
- ),
- Http::STATUS_UNPROCESSABLE_ENTITY
- );
- }
- if (!$this->isAdmin) {
- $userId = $this->userSession->getUser()->getUID();
- if (!empty($groups)) {
- foreach ($groups as $key => $group) {
- if (!$this->subAdminFactory->isGroupAccessible($userId, $group)) {
- unset($groups[$key]);
- }
- }
- }
- if (empty($groups)) {
- $groups = $this->subAdminFactory->getSubAdminsOfGroups($userId);
- }
- }
- if ($this->userManager->userExists($username)) {
- return new DataResponse(
- array(
- 'message' => (string)$this->l10n->t('A user with that name already exists.')
- ),
- Http::STATUS_CONFLICT
- );
- }
- try {
- $user = $this->userManager->createUser($username, $password);
- } catch (\Exception $exception) {
- return new DataResponse(
- array(
- 'message' => (string)$this->l10n->t('Unable to create user.')
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- if($user instanceof User) {
- if($groups !== null) {
- foreach($groups as $groupName) {
- $group = $this->groupManager->get($groupName);
- if(empty($group)) {
- $group = $this->groupManager->createGroup($groupName);
- }
- $group->addUser($user);
- }
- }
- /**
- * Send new user mail only if a mail is set
- */
- if($email !== '') {
- $this->config->setUserValue($username, 'settings', 'email', $email);
- // data for the mail template
- $mailData = array(
- 'username' => $username,
- 'url' => $this->urlGenerator->getAbsoluteURL('/')
- );
- $mail = new TemplateResponse('settings', 'email.new_user', $mailData, 'blank');
- $mailContent = $mail->render();
- $mail = new TemplateResponse('settings', 'email.new_user_plain_text', $mailData, 'blank');
- $plainTextMailContent = $mail->render();
- $subject = $this->l10n->t('Your %s account was created', [$this->defaults->getName()]);
- try {
- $message = $this->mailer->createMessage();
- $message->setTo([$email => $username]);
- $message->setSubject($subject);
- $message->setHtmlBody($mailContent);
- $message->setPlainBody($plainTextMailContent);
- $message->setFrom([$this->fromMailAddress => $this->defaults->getName()]);
- $this->mailer->send($message);
- } catch(\Exception $e) {
- $this->log->error("Can't send new user mail to $email: " . $e->getMessage(), array('app' => 'settings'));
- }
- }
- // fetch users groups
- $userGroups = $this->groupManager->getUserGroupIds($user);
- return new DataResponse(
- $this->formatUserForIndex($user, $userGroups),
- Http::STATUS_CREATED
- );
- }
- return new DataResponse(
- array(
- 'message' => (string)$this->l10n->t('Unable to create user.')
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- /**
- * @NoAdminRequired
- *
- * @param string $id
- * @return DataResponse
- */
- public function destroy($id) {
- $userId = $this->userSession->getUser()->getUID();
- if($userId === $id) {
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Unable to delete user.')
- )
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- if(!$this->isAdmin && !$this->subAdminFactory->isUserAccessible($userId, $id)) {
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Authentication error')
- )
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- $user = $this->userManager->get($id);
- if($user) {
- if($user->delete()) {
- return new DataResponse(
- array(
- 'status' => 'success',
- 'data' => array(
- 'username' => $id
- )
- ),
- Http::STATUS_NO_CONTENT
- );
- }
- }
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Unable to delete user.')
- )
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- /**
- * Set the mail address of a user
- *
- * @NoAdminRequired
- * @NoSubadminRequired
- *
- * @param string $id
- * @param string $mailAddress
- * @return DataResponse
- */
- public function setMailAddress($id, $mailAddress) {
- $userId = $this->userSession->getUser()->getUID();
- if($userId !== $id
- && !$this->isAdmin
- && !$this->subAdminFactory->isUserAccessible($userId, $id)) {
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Forbidden')
- )
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- if($mailAddress !== '' && !$this->mailer->validateMailAddress($mailAddress)) {
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Invalid mail address')
- )
- ),
- Http::STATUS_UNPROCESSABLE_ENTITY
- );
- }
- $user = $this->userManager->get($id);
- if(!$user){
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Invalid user')
- )
- ),
- Http::STATUS_UNPROCESSABLE_ENTITY
- );
- }
- // this is the only permission a backend provides and is also used
- // for the permission of setting a email address
- if(!$user->canChangeDisplayName()){
- return new DataResponse(
- array(
- 'status' => 'error',
- 'data' => array(
- 'message' => (string)$this->l10n->t('Unable to change mail address')
- )
- ),
- Http::STATUS_FORBIDDEN
- );
- }
- // delete user value if email address is empty
- if($mailAddress === '') {
- $this->config->deleteUserValue($id, 'settings', 'email');
- } else {
- $this->config->setUserValue($id, 'settings', 'email', $mailAddress);
- }
- return new DataResponse(
- array(
- 'status' => 'success',
- 'data' => array(
- 'username' => $id,
- 'mailAddress' => $mailAddress,
- 'message' => (string)$this->l10n->t('Email saved')
- )
- ),
- Http::STATUS_OK
- );
- }
- }
|