2011-07-20 17:53:34 +04:00
|
|
|
<?php
|
2012-05-05 20:13:40 +04:00
|
|
|
|
2011-07-20 17:53:34 +04:00
|
|
|
/**
|
2012-05-05 20:13:40 +04:00
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Jakob Sack
|
|
|
|
* @copyright 2011 Jakob Sack kde@jakobsack.de
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
2011-07-20 17:53:34 +04:00
|
|
|
*/
|
2012-05-05 20:13:40 +04:00
|
|
|
|
2011-07-22 16:38:42 +04:00
|
|
|
class OC_Connector_Sabre_File extends OC_Connector_Sabre_Node implements Sabre_DAV_IFile {
|
2011-07-20 17:53:34 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Updates the data
|
|
|
|
*
|
2012-07-21 01:52:47 +04:00
|
|
|
* The data argument is a readable stream resource.
|
|
|
|
*
|
2013-09-30 12:46:50 +04:00
|
|
|
* After a successful put operation, you may choose to return an ETag. The
|
2012-07-21 01:52:47 +04:00
|
|
|
* etag must always be surrounded by double-quotes. These quotes must
|
|
|
|
* appear in the actual string you're returning.
|
|
|
|
*
|
|
|
|
* Clients may use the ETag from a PUT request to later on make sure that
|
|
|
|
* when they update the file, the contents haven't changed in the mean
|
|
|
|
* time.
|
|
|
|
*
|
|
|
|
* If you don't plan to store the file byte-by-byte, and you return a
|
|
|
|
* different object on a subsequent GET you are strongly recommended to not
|
|
|
|
* return an ETag, and just return null.
|
|
|
|
*
|
2011-07-20 17:53:34 +04:00
|
|
|
* @param resource $data
|
2013-06-25 19:04:25 +04:00
|
|
|
* @throws Sabre_DAV_Exception_Forbidden
|
2012-07-21 01:52:47 +04:00
|
|
|
* @return string|null
|
2011-07-20 17:53:34 +04:00
|
|
|
*/
|
|
|
|
public function put($data) {
|
2013-10-08 13:26:49 +04:00
|
|
|
|
2013-09-24 17:35:21 +04:00
|
|
|
$fs = $this->getFS();
|
2013-10-08 13:26:49 +04:00
|
|
|
|
2013-09-24 17:35:21 +04:00
|
|
|
if ($fs->file_exists($this->path) &&
|
|
|
|
!$fs->isUpdatable($this->path)) {
|
2013-06-25 19:04:25 +04:00
|
|
|
throw new \Sabre_DAV_Exception_Forbidden();
|
|
|
|
}
|
|
|
|
|
2013-08-14 11:44:29 +04:00
|
|
|
// throw an exception if encryption was disabled but the files are still encrypted
|
|
|
|
if (\OC_Util::encryptedFiles()) {
|
|
|
|
throw new \Sabre_DAV_Exception_ServiceUnavailable();
|
|
|
|
}
|
2013-09-24 17:14:42 +04:00
|
|
|
|
|
|
|
// chunked handling
|
|
|
|
if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
|
2013-10-07 19:49:21 +04:00
|
|
|
return $this->createFileChunked($data);
|
2013-09-24 17:14:42 +04:00
|
|
|
}
|
|
|
|
|
2013-02-10 17:16:45 +04:00
|
|
|
// mark file as partial while uploading (ignored by the scanner)
|
2014-01-07 14:53:33 +04:00
|
|
|
$partpath = $this->path . '.ocTransferId' . rand() . '.part';
|
2013-02-22 20:21:57 +04:00
|
|
|
|
2013-10-08 13:26:49 +04:00
|
|
|
// if file is located in /Shared we write the part file to the users
|
|
|
|
// root folder because we can't create new files in /shared
|
|
|
|
// we extend the name with a random number to avoid overwriting a existing file
|
|
|
|
if (dirname($partpath) === 'Shared') {
|
2013-10-08 14:00:32 +04:00
|
|
|
$partpath = pathinfo($partpath, PATHINFO_FILENAME) . rand() . '.part';
|
2013-10-08 13:26:49 +04:00
|
|
|
}
|
|
|
|
|
2013-09-26 13:50:46 +04:00
|
|
|
try {
|
|
|
|
$putOkay = $fs->file_put_contents($partpath, $data);
|
|
|
|
if ($putOkay === false) {
|
|
|
|
\OC_Log::write('webdav', '\OC\Files\Filesystem::file_put_contents() failed', \OC_Log::ERROR);
|
|
|
|
$fs->unlink($partpath);
|
|
|
|
// because we have no clue about the cause we can only throw back a 500/Internal Server Error
|
|
|
|
throw new Sabre_DAV_Exception();
|
|
|
|
}
|
|
|
|
} catch (\OCP\Files\NotPermittedException $e) {
|
2013-10-08 17:04:31 +04:00
|
|
|
// a more general case - due to whatever reason the content could not be written
|
|
|
|
throw new Sabre_DAV_Exception_Forbidden($e->getMessage());
|
|
|
|
|
2013-10-07 17:11:47 +04:00
|
|
|
} catch (\OCP\Files\EntityTooLargeException $e) {
|
2013-10-08 17:04:31 +04:00
|
|
|
// the file is too big to be stored
|
|
|
|
throw new OC_Connector_Sabre_Exception_EntityTooLarge($e->getMessage());
|
|
|
|
|
2013-10-07 17:11:47 +04:00
|
|
|
} catch (\OCP\Files\InvalidContentException $e) {
|
2013-10-08 17:04:31 +04:00
|
|
|
// the file content is not permitted
|
|
|
|
throw new OC_Connector_Sabre_Exception_UnsupportedMediaType($e->getMessage());
|
|
|
|
|
2013-10-07 17:11:47 +04:00
|
|
|
} catch (\OCP\Files\InvalidPathException $e) {
|
2013-10-08 17:04:31 +04:00
|
|
|
// the path for the file was not valid
|
|
|
|
// TODO: find proper http status code for this case
|
|
|
|
throw new Sabre_DAV_Exception_Forbidden($e->getMessage());
|
2013-09-24 16:25:56 +04:00
|
|
|
}
|
2013-02-22 20:21:57 +04:00
|
|
|
|
2013-02-10 17:16:45 +04:00
|
|
|
// rename to correct path
|
2013-09-30 12:46:50 +04:00
|
|
|
$renameOkay = $fs->rename($partpath, $this->path);
|
|
|
|
$fileExists = $fs->file_exists($this->path);
|
2013-09-24 15:54:18 +04:00
|
|
|
if ($renameOkay === false || $fileExists === false) {
|
|
|
|
\OC_Log::write('webdav', '\OC\Files\Filesystem::rename() failed', \OC_Log::ERROR);
|
2013-09-30 12:46:50 +04:00
|
|
|
$fs->unlink($partpath);
|
2013-09-24 15:54:18 +04:00
|
|
|
throw new Sabre_DAV_Exception();
|
|
|
|
}
|
2013-02-22 20:21:57 +04:00
|
|
|
|
2013-09-24 17:14:42 +04:00
|
|
|
// allow sync clients to send the mtime along in a header
|
2013-02-10 14:05:43 +04:00
|
|
|
$mtime = OC_Request::hasModificationTime();
|
|
|
|
if ($mtime !== false) {
|
2013-09-24 17:35:21 +04:00
|
|
|
if($fs->touch($this->path, $mtime)) {
|
2013-02-10 14:44:34 +04:00
|
|
|
header('X-OC-MTime: accepted');
|
|
|
|
}
|
2013-02-10 14:05:43 +04:00
|
|
|
}
|
2011-07-20 17:53:34 +04:00
|
|
|
|
2013-09-24 17:35:21 +04:00
|
|
|
return $this->getETagPropertyForPath($this->path);
|
2011-07-20 17:53:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the data
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function get() {
|
|
|
|
|
2013-09-24 17:14:42 +04:00
|
|
|
//throw exception if encryption is disabled but files are still encrypted
|
2013-08-14 11:44:29 +04:00
|
|
|
if (\OC_Util::encryptedFiles()) {
|
|
|
|
throw new \Sabre_DAV_Exception_ServiceUnavailable();
|
|
|
|
} else {
|
|
|
|
return \OC\Files\Filesystem::fopen($this->path, 'rb');
|
|
|
|
}
|
2011-07-20 17:53:34 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Delete the current file
|
|
|
|
*
|
|
|
|
* @return void
|
2013-06-25 19:04:25 +04:00
|
|
|
* @throws Sabre_DAV_Exception_Forbidden
|
2011-07-20 17:53:34 +04:00
|
|
|
*/
|
|
|
|
public function delete() {
|
|
|
|
|
2013-10-22 13:10:07 +04:00
|
|
|
if ($this->path === 'Shared') {
|
|
|
|
throw new \Sabre_DAV_Exception_Forbidden();
|
|
|
|
}
|
|
|
|
|
2013-06-25 19:04:25 +04:00
|
|
|
if (!\OC\Files\Filesystem::isDeletable($this->path)) {
|
|
|
|
throw new \Sabre_DAV_Exception_Forbidden();
|
|
|
|
}
|
2012-10-10 15:18:36 +04:00
|
|
|
\OC\Files\Filesystem::unlink($this->path);
|
2011-07-20 17:53:34 +04:00
|
|
|
|
2013-10-22 21:41:26 +04:00
|
|
|
// remove properties
|
|
|
|
$this->removeProperties();
|
|
|
|
|
2011-07-20 17:53:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the size of the node, in bytes
|
|
|
|
*
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
public function getSize() {
|
2012-06-15 18:04:01 +04:00
|
|
|
$this->getFileinfoCache();
|
2013-05-27 19:35:31 +04:00
|
|
|
if ($this->fileinfo_cache['size'] > -1) {
|
|
|
|
return $this->fileinfo_cache['size'];
|
|
|
|
} else {
|
|
|
|
return null;
|
|
|
|
}
|
2011-07-20 17:53:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the ETag for a file
|
|
|
|
*
|
2013-02-11 20:44:02 +04:00
|
|
|
* An ETag is a unique identifier representing the current version of the
|
|
|
|
* file. If the file changes, the ETag MUST change. The ETag is an
|
2013-09-30 13:36:08 +04:00
|
|
|
* arbitrary string, but MUST be surrounded by double-quotes.
|
2011-07-20 17:53:34 +04:00
|
|
|
*
|
|
|
|
* Return null if the ETag can not effectively be determined
|
|
|
|
*
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function getETag() {
|
2012-07-21 01:52:47 +04:00
|
|
|
$properties = $this->getProperties(array(self::GETETAG_PROPERTYNAME));
|
|
|
|
if (isset($properties[self::GETETAG_PROPERTYNAME])) {
|
|
|
|
return $properties[self::GETETAG_PROPERTYNAME];
|
|
|
|
}
|
2013-01-12 06:09:01 +04:00
|
|
|
return null;
|
2011-07-20 17:53:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the mime-type for a file
|
|
|
|
*
|
|
|
|
* If null is returned, we'll assume application/octet-stream
|
|
|
|
*
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function getContentType() {
|
2012-06-15 18:04:01 +04:00
|
|
|
if (isset($this->fileinfo_cache['mimetype'])) {
|
|
|
|
return $this->fileinfo_cache['mimetype'];
|
|
|
|
}
|
2011-07-20 17:53:34 +04:00
|
|
|
|
2012-10-10 15:18:36 +04:00
|
|
|
return \OC\Files\Filesystem::getMimeType($this->path);
|
2011-07-20 17:53:34 +04:00
|
|
|
|
|
|
|
}
|
2013-10-07 19:49:21 +04:00
|
|
|
|
|
|
|
private function createFileChunked($data)
|
|
|
|
{
|
|
|
|
list($path, $name) = \Sabre_DAV_URLUtil::splitPath($this->path);
|
|
|
|
|
|
|
|
$info = OC_FileChunking::decodeName($name);
|
|
|
|
if (empty($info)) {
|
|
|
|
throw new Sabre_DAV_Exception_NotImplemented();
|
|
|
|
}
|
|
|
|
$chunk_handler = new OC_FileChunking($info);
|
|
|
|
$bytesWritten = $chunk_handler->store($info['index'], $data);
|
|
|
|
|
|
|
|
//detect aborted upload
|
|
|
|
if (isset ($_SERVER['REQUEST_METHOD']) && $_SERVER['REQUEST_METHOD'] === 'PUT' ) {
|
|
|
|
if (isset($_SERVER['CONTENT_LENGTH'])) {
|
|
|
|
$expected = $_SERVER['CONTENT_LENGTH'];
|
|
|
|
if ($bytesWritten != $expected) {
|
2013-10-17 22:20:13 +04:00
|
|
|
$chunk_handler->remove($info['index']);
|
2013-10-07 19:49:21 +04:00
|
|
|
throw new Sabre_DAV_Exception_BadRequest(
|
|
|
|
'expected filesize ' . $expected . ' got ' . $bytesWritten);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($chunk_handler->isComplete()) {
|
2013-10-21 15:21:39 +04:00
|
|
|
|
|
|
|
// we first assembly the target file as a part file
|
2013-11-11 20:47:46 +04:00
|
|
|
$partFile = $path . '/' . $info['name'] . '.ocTransferId' . $info['transferid'] . '.part';
|
2013-10-21 15:21:39 +04:00
|
|
|
$chunk_handler->file_assemble($partFile);
|
|
|
|
|
|
|
|
// here is the final atomic rename
|
|
|
|
$fs = $this->getFS();
|
|
|
|
$targetPath = $path . '/' . $info['name'];
|
|
|
|
$renameOkay = $fs->rename($partFile, $targetPath);
|
|
|
|
$fileExists = $fs->file_exists($targetPath);
|
|
|
|
if ($renameOkay === false || $fileExists === false) {
|
|
|
|
\OC_Log::write('webdav', '\OC\Files\Filesystem::rename() failed', \OC_Log::ERROR);
|
2014-01-08 21:43:20 +04:00
|
|
|
// only delete if an error occurred and the target file was already created
|
|
|
|
if ($fileExists) {
|
|
|
|
$fs->unlink($targetPath);
|
|
|
|
}
|
2013-10-21 15:21:39 +04:00
|
|
|
throw new Sabre_DAV_Exception();
|
|
|
|
}
|
2013-10-21 17:00:28 +04:00
|
|
|
|
|
|
|
// allow sync clients to send the mtime along in a header
|
|
|
|
$mtime = OC_Request::hasModificationTime();
|
|
|
|
if ($mtime !== false) {
|
2013-11-29 19:28:42 +04:00
|
|
|
if($fs->touch($targetPath, $mtime)) {
|
2013-10-21 17:00:28 +04:00
|
|
|
header('X-OC-MTime: accepted');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-21 15:21:39 +04:00
|
|
|
return OC_Connector_Sabre_Node::getETagPropertyForPath($targetPath);
|
2013-10-07 19:49:21 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2011-07-20 17:53:34 +04:00
|
|
|
}
|