2012-05-07 09:39:17 -04:00
|
|
|
<?php
|
2024-05-24 13:43:47 -04:00
|
|
|
|
2025-02-24 10:46:09 -05:00
|
|
|
declare(strict_types=1);
|
|
|
|
|
|
2025-05-14 18:39:44 -04:00
|
|
|
use OC\ServiceUnavailableException;
|
|
|
|
|
|
2015-03-26 06:44:34 -04:00
|
|
|
/**
|
2024-05-24 13:43:47 -04:00
|
|
|
* SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
|
|
|
|
|
* SPDX-FileCopyrightText: 2016 ownCloud, Inc.
|
|
|
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
2015-03-26 06:44:34 -04:00
|
|
|
*/
|
2025-02-24 10:46:09 -05:00
|
|
|
|
2017-10-13 15:30:29 -04:00
|
|
|
require_once __DIR__ . '/lib/versioncheck.php';
|
|
|
|
|
|
2025-02-24 10:46:09 -05:00
|
|
|
use OCP\App\IAppManager;
|
|
|
|
|
use OCP\IConfig;
|
|
|
|
|
use OCP\IRequest;
|
|
|
|
|
use OCP\Server;
|
2025-02-27 05:59:44 -05:00
|
|
|
use OCP\Template\ITemplateManager;
|
2025-02-24 10:46:09 -05:00
|
|
|
use OCP\Util;
|
2024-02-08 09:47:39 -05:00
|
|
|
use Psr\Log\LoggerInterface;
|
|
|
|
|
|
2023-12-29 04:16:08 -05:00
|
|
|
function resolveService(string $service): string {
|
2022-05-15 04:38:55 -04:00
|
|
|
$services = [
|
|
|
|
|
'webdav' => 'dav/appinfo/v1/publicwebdav.php',
|
|
|
|
|
'dav' => 'dav/appinfo/v2/publicremote.php',
|
|
|
|
|
];
|
|
|
|
|
if (isset($services[$service])) {
|
|
|
|
|
return $services[$service];
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-24 10:46:09 -05:00
|
|
|
return Server::get(IConfig::class)->getAppValue('core', 'remote_' . $service);
|
2022-05-15 04:38:55 -04:00
|
|
|
}
|
|
|
|
|
|
2013-06-10 07:45:19 -04:00
|
|
|
try {
|
2016-10-06 06:13:02 -04:00
|
|
|
require_once __DIR__ . '/lib/base.php';
|
2022-05-15 04:38:55 -04:00
|
|
|
|
|
|
|
|
// All resources served via the DAV endpoint should have the strictest possible
|
|
|
|
|
// policy. Exempted from this is the SabreDAV browser plugin which overwrites
|
|
|
|
|
// this policy with a softer one if debug mode is enabled.
|
|
|
|
|
header("Content-Security-Policy: default-src 'none';");
|
|
|
|
|
|
2024-07-16 02:29:44 -04:00
|
|
|
// Check if Nextcloud is in maintenance mode
|
2025-02-24 10:46:09 -05:00
|
|
|
if (Util::needUpgrade()) {
|
2014-06-30 08:48:03 -04:00
|
|
|
// since the behavior of apps or remotes are unpredictable during
|
|
|
|
|
// an upgrade, return a 503 directly
|
2024-07-16 02:29:44 -04:00
|
|
|
throw new \Exception('Service unavailable', 503);
|
2014-06-30 08:48:03 -04:00
|
|
|
}
|
|
|
|
|
|
2025-02-24 10:46:09 -05:00
|
|
|
$request = Server::get(IRequest::class);
|
2015-02-10 07:02:48 -05:00
|
|
|
$pathInfo = $request->getPathInfo();
|
2022-05-15 04:38:55 -04:00
|
|
|
if ($pathInfo === false || $pathInfo === '') {
|
2024-07-16 02:29:44 -04:00
|
|
|
throw new \Exception('Path not found', 404);
|
2013-06-10 07:45:19 -04:00
|
|
|
}
|
2024-07-16 02:29:44 -04:00
|
|
|
|
|
|
|
|
// Extract the service from the path
|
2022-05-15 04:38:55 -04:00
|
|
|
if (!$pos = strpos($pathInfo, '/', 1)) {
|
|
|
|
|
$pos = strlen($pathInfo);
|
2013-06-10 07:45:19 -04:00
|
|
|
}
|
2022-05-15 04:38:55 -04:00
|
|
|
$service = substr($pathInfo, 1, $pos - 1);
|
|
|
|
|
|
2024-07-16 02:29:44 -04:00
|
|
|
// Resolve the service to a file
|
2022-05-15 04:38:55 -04:00
|
|
|
$file = resolveService($service);
|
2023-12-29 04:16:08 -05:00
|
|
|
if (!$file) {
|
2024-07-16 02:29:44 -04:00
|
|
|
throw new \Exception('Path not found', 404);
|
2022-05-15 04:38:55 -04:00
|
|
|
}
|
|
|
|
|
|
2024-07-16 02:29:44 -04:00
|
|
|
// Extract the app from the service file
|
2022-05-15 04:38:55 -04:00
|
|
|
$file = ltrim($file, '/');
|
2014-03-06 10:01:13 -05:00
|
|
|
$parts = explode('/', $file, 2);
|
|
|
|
|
$app = $parts[0];
|
2013-06-10 07:45:19 -04:00
|
|
|
|
2014-05-10 08:00:22 -04:00
|
|
|
// Load all required applications
|
2025-02-24 10:46:09 -05:00
|
|
|
$appManager = Server::get(IAppManager::class);
|
2014-05-10 08:00:22 -04:00
|
|
|
\OC::$REQUESTEDAPP = $app;
|
2025-02-24 10:46:09 -05:00
|
|
|
$appManager->loadApps(['authentication']);
|
|
|
|
|
$appManager->loadApps(['extended_authentication']);
|
|
|
|
|
$appManager->loadApps(['filesystem', 'logging']);
|
2014-05-10 08:00:22 -04:00
|
|
|
|
2024-07-16 02:29:44 -04:00
|
|
|
// Check if the app is enabled
|
2025-02-24 10:46:09 -05:00
|
|
|
if (!$appManager->isEnabledForUser($app)) {
|
2024-07-16 02:29:44 -04:00
|
|
|
throw new \Exception('App not installed: ' . $app);
|
2014-09-04 09:23:55 -04:00
|
|
|
}
|
2024-07-16 02:29:44 -04:00
|
|
|
|
|
|
|
|
// Load the app
|
2025-02-24 10:46:09 -05:00
|
|
|
$appManager->loadApp($app);
|
2013-11-22 08:00:08 -05:00
|
|
|
OC_User::setIncognitoMode(true);
|
2013-06-10 07:45:19 -04:00
|
|
|
|
2024-09-19 05:10:31 -04:00
|
|
|
$baseuri = OC::$WEBROOT . '/public.php/' . $service . '/';
|
2022-05-15 04:38:55 -04:00
|
|
|
require_once $file;
|
2016-04-20 12:01:47 -04:00
|
|
|
} catch (Exception $ex) {
|
2018-06-26 06:15:09 -04:00
|
|
|
$status = 500;
|
2025-05-14 18:39:44 -04:00
|
|
|
if ($ex instanceof ServiceUnavailableException) {
|
2018-06-26 06:15:09 -04:00
|
|
|
$status = 503;
|
2016-04-20 12:01:47 -04:00
|
|
|
}
|
2014-07-24 11:18:10 -04:00
|
|
|
//show the user a detailed error page
|
2025-02-24 10:46:09 -05:00
|
|
|
Server::get(LoggerInterface::class)->error($ex->getMessage(), ['app' => 'public', 'exception' => $ex]);
|
2025-02-27 05:59:44 -05:00
|
|
|
Server::get(ITemplateManager::class)->printExceptionErrorPage($ex, $status);
|
2016-04-20 12:01:47 -04:00
|
|
|
} catch (Error $ex) {
|
2013-06-10 07:45:19 -04:00
|
|
|
//show the user a detailed error page
|
2025-02-24 10:46:09 -05:00
|
|
|
Server::get(LoggerInterface::class)->error($ex->getMessage(), ['app' => 'public', 'exception' => $ex]);
|
2025-02-27 05:59:44 -05:00
|
|
|
Server::get(ITemplateManager::class)->printExceptionErrorPage($ex, 500);
|
2013-08-18 05:02:08 -04:00
|
|
|
}
|