2014-04-29 17:14:48 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2015-02-26 13:37:37 +03:00
|
|
|
* Copyright (c) 2014 Robin Appelman <icewind@owncloud.com>
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
2014-04-29 17:14:48 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
namespace OCA\Files_Sharing\External;
|
|
|
|
|
|
|
|
use OC\Files\Filesystem;
|
2014-06-12 18:14:43 +04:00
|
|
|
use OC\Files\Storage\DAV;
|
2014-07-01 16:35:44 +04:00
|
|
|
use OC\ForbiddenException;
|
2014-04-29 17:14:48 +04:00
|
|
|
use OCA\Files_Sharing\ISharedStorage;
|
2014-07-01 16:35:44 +04:00
|
|
|
use OCP\Files\NotFoundException;
|
|
|
|
use OCP\Files\StorageInvalidException;
|
|
|
|
use OCP\Files\StorageNotAvailableException;
|
2014-04-29 17:14:48 +04:00
|
|
|
|
2014-06-12 18:14:43 +04:00
|
|
|
class Storage extends DAV implements ISharedStorage {
|
2014-04-29 17:14:48 +04:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $remoteUser;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $remote;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $mountPoint;
|
|
|
|
|
2014-05-19 18:39:57 +04:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $token;
|
|
|
|
|
2014-08-14 16:24:56 +04:00
|
|
|
/**
|
|
|
|
* @var \OCP\ICertificateManager
|
|
|
|
*/
|
|
|
|
private $certificateManager;
|
|
|
|
|
2014-06-27 19:27:47 +04:00
|
|
|
private $updateChecked = false;
|
|
|
|
|
2014-07-01 16:58:07 +04:00
|
|
|
/**
|
|
|
|
* @var \OCA\Files_Sharing\External\Manager
|
|
|
|
*/
|
|
|
|
private $manager;
|
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
public function __construct($options) {
|
2014-07-01 16:58:07 +04:00
|
|
|
$this->manager = $options['manager'];
|
2014-08-14 16:24:56 +04:00
|
|
|
$this->certificateManager = $options['certificateManager'];
|
2014-04-29 17:14:48 +04:00
|
|
|
$this->remote = $options['remote'];
|
|
|
|
$this->remoteUser = $options['owner'];
|
|
|
|
list($protocol, $remote) = explode('://', $this->remote);
|
2014-07-23 15:45:56 +04:00
|
|
|
if (strpos($remote, '/')) {
|
|
|
|
list($host, $root) = explode('/', $remote, 2);
|
|
|
|
} else {
|
|
|
|
$host = $remote;
|
|
|
|
$root = '';
|
|
|
|
}
|
2014-04-29 17:14:48 +04:00
|
|
|
$secure = $protocol === 'https';
|
2014-06-25 16:53:31 +04:00
|
|
|
$root = rtrim($root, '/') . '/public.php/webdav';
|
2014-04-29 17:14:48 +04:00
|
|
|
$this->mountPoint = $options['mountpoint'];
|
2014-05-19 18:39:57 +04:00
|
|
|
$this->token = $options['token'];
|
2014-04-29 17:14:48 +04:00
|
|
|
parent::__construct(array(
|
|
|
|
'secure' => $secure,
|
|
|
|
'host' => $host,
|
|
|
|
'root' => $root,
|
|
|
|
'user' => $options['token'],
|
2015-02-26 15:48:53 +03:00
|
|
|
'password' => (string)$options['password']
|
2014-04-29 17:14:48 +04:00
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getRemoteUser() {
|
|
|
|
return $this->remoteUser;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getRemote() {
|
|
|
|
return $this->remote;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getMountPoint() {
|
|
|
|
return $this->mountPoint;
|
|
|
|
}
|
|
|
|
|
2014-05-19 18:39:57 +04:00
|
|
|
public function getToken() {
|
|
|
|
return $this->token;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getPassword() {
|
|
|
|
return $this->password;
|
|
|
|
}
|
|
|
|
|
2014-04-29 17:14:48 +04:00
|
|
|
/**
|
|
|
|
* @brief get id of the mount point
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getId() {
|
2014-06-12 18:15:01 +04:00
|
|
|
return 'shared::' . md5($this->token . '@' . $this->remote);
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|
|
|
|
|
2014-06-12 19:23:34 +04:00
|
|
|
public function getCache($path = '', $storage = null) {
|
2015-01-20 14:38:54 +03:00
|
|
|
if (is_null($this->cache)) {
|
2014-04-29 17:14:48 +04:00
|
|
|
$this->cache = new Cache($this, $this->remote, $this->remoteUser);
|
|
|
|
}
|
|
|
|
return $this->cache;
|
|
|
|
}
|
|
|
|
|
2014-05-19 18:39:57 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
2014-06-12 19:23:34 +04:00
|
|
|
* @param \OC\Files\Storage\Storage $storage
|
2014-05-19 18:39:57 +04:00
|
|
|
* @return \OCA\Files_Sharing\External\Scanner
|
|
|
|
*/
|
2014-06-12 19:23:34 +04:00
|
|
|
public function getScanner($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2014-05-19 18:39:57 +04:00
|
|
|
if (!isset($this->scanner)) {
|
2014-06-12 19:23:34 +04:00
|
|
|
$this->scanner = new Scanner($storage);
|
2014-05-19 18:39:57 +04:00
|
|
|
}
|
|
|
|
return $this->scanner;
|
|
|
|
}
|
2014-06-27 19:27:47 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param int $time
|
2014-07-01 16:35:44 +04:00
|
|
|
* @throws \OCP\Files\StorageNotAvailableException
|
|
|
|
* @throws \OCP\Files\StorageInvalidException
|
2014-06-27 19:27:47 +04:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function hasUpdated($path, $time) {
|
2014-06-27 19:31:51 +04:00
|
|
|
// since for owncloud webdav servers we can rely on etag propagation we only need to check the root of the storage
|
|
|
|
// because of that we only do one check for the entire storage per request
|
2014-06-27 19:27:47 +04:00
|
|
|
if ($this->updateChecked) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$this->updateChecked = true;
|
2014-07-01 16:35:44 +04:00
|
|
|
try {
|
|
|
|
return parent::hasUpdated('', $time);
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (StorageInvalidException $e) {
|
|
|
|
// check if it needs to be removed
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
2014-07-01 16:35:44 +04:00
|
|
|
} catch (StorageNotAvailableException $e) {
|
2015-01-20 21:45:32 +03:00
|
|
|
// check if it needs to be removed or just temp unavailable
|
|
|
|
$this->checkStorageAvailability();
|
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check whether this storage is permanently or temporarily
|
|
|
|
* unavailable
|
|
|
|
*
|
|
|
|
* @throws \OCP\Files\StorageNotAvailableException
|
|
|
|
* @throws \OCP\Files\StorageInvalidException
|
|
|
|
*/
|
|
|
|
public function checkStorageAvailability() {
|
|
|
|
// see if we can find out why the share is unavailable
|
|
|
|
try {
|
|
|
|
$this->getShareInfo();
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
// a 404 can either mean that the share no longer exists or there is no ownCloud on the remote
|
|
|
|
if ($this->testRemote()) {
|
|
|
|
// valid ownCloud instance means that the public share no longer exists
|
|
|
|
// since this is permanent (re-sharing the file will create a new token)
|
|
|
|
// we remove the invalid storage
|
|
|
|
$this->manager->removeShare($this->mountPoint);
|
|
|
|
$this->manager->getMountManager()->removeMount($this->mountPoint);
|
|
|
|
throw new StorageInvalidException();
|
|
|
|
} else {
|
|
|
|
// ownCloud instance is gone, likely to be a temporary server configuration error
|
2014-07-01 16:35:44 +04:00
|
|
|
throw $e;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
// auth error, remove share for now (provide a dialog in the future)
|
|
|
|
$this->manager->removeShare($this->mountPoint);
|
|
|
|
$this->manager->getMountManager()->removeMount($this->mountPoint);
|
|
|
|
throw new StorageInvalidException();
|
|
|
|
} catch (\Exception $e) {
|
2014-07-01 16:35:44 +04:00
|
|
|
throw $e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-17 18:09:41 +03:00
|
|
|
public function file_exists($path) {
|
|
|
|
if ($path === '') {
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return parent::file_exists($path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-01 16:35:44 +04:00
|
|
|
/**
|
|
|
|
* check if the configured remote is a valid ownCloud instance
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function testRemote() {
|
|
|
|
try {
|
|
|
|
$result = file_get_contents($this->remote . '/status.php');
|
|
|
|
$data = json_decode($result);
|
|
|
|
return is_object($data) and !empty($data->version);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getShareInfo() {
|
|
|
|
$remote = $this->getRemote();
|
|
|
|
$token = $this->getToken();
|
|
|
|
$password = $this->getPassword();
|
2015-01-26 18:19:38 +03:00
|
|
|
$url = rtrim($remote, '/') . '/index.php/apps/files_sharing/shareinfo?t=' . $token;
|
2014-07-01 16:35:44 +04:00
|
|
|
|
|
|
|
$ch = curl_init();
|
|
|
|
|
|
|
|
curl_setopt($ch, CURLOPT_URL, $url);
|
|
|
|
curl_setopt($ch, CURLOPT_POST, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
|
|
|
http_build_query(array('password' => $password)));
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
|
|
|
|
2014-08-14 16:24:56 +04:00
|
|
|
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, true);
|
|
|
|
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
|
2014-11-04 18:44:42 +03:00
|
|
|
$path = $this->certificateManager->getCertificateBundle();
|
|
|
|
if (is_readable($path)) {
|
|
|
|
curl_setopt($ch, CURLOPT_CAINFO, $path);
|
|
|
|
}
|
2014-08-14 16:24:56 +04:00
|
|
|
|
2014-08-14 17:49:31 +04:00
|
|
|
$result = curl_exec($ch);
|
2014-07-01 16:35:44 +04:00
|
|
|
|
|
|
|
$status = curl_getinfo($ch, CURLINFO_HTTP_CODE);
|
2014-11-04 19:37:15 +03:00
|
|
|
$errorMessage = curl_error($ch);
|
2014-07-01 16:35:44 +04:00
|
|
|
curl_close($ch);
|
2014-11-04 19:37:15 +03:00
|
|
|
if (!empty($errorMessage)) {
|
2014-11-04 18:44:42 +03:00
|
|
|
throw new \Exception($errorMessage);
|
|
|
|
}
|
2014-07-01 16:35:44 +04:00
|
|
|
|
|
|
|
switch ($status) {
|
|
|
|
case 401:
|
|
|
|
case 403:
|
|
|
|
throw new ForbiddenException();
|
|
|
|
case 404:
|
|
|
|
throw new NotFoundException();
|
|
|
|
case 500:
|
|
|
|
throw new \Exception();
|
|
|
|
}
|
|
|
|
|
|
|
|
return json_decode($result, true);
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
2014-04-29 17:14:48 +04:00
|
|
|
}
|