2011-07-27 21:52:24 +04:00
|
|
|
<?php
|
2012-09-07 20:30:48 +04:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author aler9 <46489434+aler9@users.noreply.github.com>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Boris Rybalkin <ribalkin@gmail.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Brice Maron <brice@bmaron.net>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2020-08-24 15:54:25 +03:00
|
|
|
* @author J0WI <J0WI@users.noreply.github.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Jakob Sack <mail@jakobsack.de>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Klaas Freitag <freitag@owncloud.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Michael Gapczynski <GapczynskiM@gmail.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Sjors van der Pluijm <sjors@desjors.nl>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Stefan Weil <sw@weilnetz.de>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Tigran Mkrtchyan <tigran.mkrtchyan@desy.de>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2012-09-07 20:30:48 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2012-09-07 20:30:48 +04:00
|
|
|
namespace OC\Files\Storage;
|
2016-05-30 16:44:19 +03:00
|
|
|
|
2019-06-27 12:10:08 +03:00
|
|
|
use OC\Files\Filesystem;
|
2017-04-12 15:56:51 +03:00
|
|
|
use OC\Files\Storage\Wrapper\Jail;
|
2020-02-15 00:07:09 +03:00
|
|
|
use OCP\Constants;
|
2016-05-30 16:44:19 +03:00
|
|
|
use OCP\Files\ForbiddenException;
|
2020-07-01 16:37:47 +03:00
|
|
|
use OCP\Files\GenericFileException;
|
2017-07-19 20:44:10 +03:00
|
|
|
use OCP\Files\Storage\IStorage;
|
2018-04-25 16:22:28 +03:00
|
|
|
use OCP\ILogger;
|
2016-05-30 16:44:19 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* for local filestore, we only have to map the paths
|
|
|
|
*/
|
|
|
|
class Local extends \OC\Files\Storage\Common {
|
|
|
|
protected $datadir;
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2016-05-30 16:44:19 +03:00
|
|
|
protected $dataDirLength;
|
|
|
|
|
|
|
|
protected $realDataDir;
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function __construct($arguments) {
|
2016-04-25 15:36:53 +03:00
|
|
|
if (!isset($arguments['datadir']) || !is_string($arguments['datadir'])) {
|
|
|
|
throw new \InvalidArgumentException('No data directory set for local storage');
|
|
|
|
}
|
2018-01-15 01:44:59 +03:00
|
|
|
$this->datadir = str_replace('//', '/', $arguments['datadir']);
|
2016-09-08 13:11:53 +03:00
|
|
|
// some crazy code uses a local storage on root...
|
|
|
|
if ($this->datadir === '/') {
|
|
|
|
$this->realDataDir = $this->datadir;
|
|
|
|
} else {
|
2018-01-15 01:44:59 +03:00
|
|
|
$realPath = realpath($this->datadir) ?: $this->datadir;
|
|
|
|
$this->realDataDir = rtrim($realPath, '/') . '/';
|
2016-09-08 13:11:53 +03:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
if (substr($this->datadir, -1) !== '/') {
|
|
|
|
$this->datadir .= '/';
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
2016-05-30 16:44:19 +03:00
|
|
|
$this->dataDirLength = strlen($this->realDataDir);
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function __destruct() {
|
|
|
|
}
|
2013-01-03 03:35:57 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function getId() {
|
|
|
|
return 'local::' . $this->datadir;
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function mkdir($path) {
|
2021-01-20 19:15:57 +03:00
|
|
|
$sourcePath = $this->getSourcePath($path);
|
|
|
|
$result = @mkdir($sourcePath, 0777, true);
|
|
|
|
chmod($sourcePath, 0755);
|
|
|
|
return $result;
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function rmdir($path) {
|
|
|
|
if (!$this->isDeletable($path)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
$it = new \RecursiveIteratorIterator(
|
|
|
|
new \RecursiveDirectoryIterator($this->getSourcePath($path)),
|
|
|
|
\RecursiveIteratorIterator::CHILD_FIRST
|
|
|
|
);
|
|
|
|
/**
|
|
|
|
* RecursiveDirectoryIterator on an NFS path isn't iterable with foreach
|
|
|
|
* This bug is fixed in PHP 5.5.9 or before
|
|
|
|
* See #8376
|
|
|
|
*/
|
|
|
|
$it->rewind();
|
|
|
|
while ($it->valid()) {
|
2014-04-28 21:32:25 +04:00
|
|
|
/**
|
2015-07-03 16:41:29 +03:00
|
|
|
* @var \SplFileInfo $file
|
2014-04-28 21:32:25 +04:00
|
|
|
*/
|
2015-07-03 16:41:29 +03:00
|
|
|
$file = $it->current();
|
2020-07-03 23:42:27 +03:00
|
|
|
clearstatcache(true, $this->getSourcePath($file));
|
2020-03-26 11:30:18 +03:00
|
|
|
if (in_array($file->getBasename(), ['.', '..'])) {
|
2014-04-28 12:20:24 +04:00
|
|
|
$it->next();
|
2015-07-03 16:41:29 +03:00
|
|
|
continue;
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($file->isDir()) {
|
2015-07-03 16:41:29 +03:00
|
|
|
rmdir($file->getPathname());
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($file->isFile() || $file->isLink()) {
|
2015-07-03 16:41:29 +03:00
|
|
|
unlink($file->getPathname());
|
2013-06-06 22:47:20 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
$it->next();
|
2013-06-06 22:47:20 +04:00
|
|
|
}
|
2020-07-03 23:42:27 +03:00
|
|
|
clearstatcache(true, $this->getSourcePath($path));
|
2015-07-03 16:41:29 +03:00
|
|
|
return rmdir($this->getSourcePath($path));
|
|
|
|
} catch (\UnexpectedValueException $e) {
|
|
|
|
return false;
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function opendir($path) {
|
|
|
|
return opendir($this->getSourcePath($path));
|
|
|
|
}
|
2013-01-05 02:03:26 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function is_dir($path) {
|
|
|
|
if (substr($path, -1) == '/') {
|
|
|
|
$path = substr($path, 0, -1);
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return is_dir($this->getSourcePath($path));
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function is_file($path) {
|
|
|
|
return is_file($this->getSourcePath($path));
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function stat($path) {
|
|
|
|
$fullPath = $this->getSourcePath($path);
|
2020-07-03 23:44:31 +03:00
|
|
|
clearstatcache(true, $fullPath);
|
2020-10-07 14:50:29 +03:00
|
|
|
$statResult = @stat($fullPath);
|
|
|
|
if (PHP_INT_SIZE === 4 && $statResult && !$this->is_dir($path)) {
|
2015-07-03 16:41:29 +03:00
|
|
|
$filesize = $this->filesize($path);
|
|
|
|
$statResult['size'] = $filesize;
|
|
|
|
$statResult[7] = $filesize;
|
2012-03-01 02:42:40 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return $statResult;
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2020-02-15 00:07:09 +03:00
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
|
|
|
public function getMetaData($path) {
|
2020-10-07 14:50:29 +03:00
|
|
|
$stat = $this->stat($path);
|
2020-02-15 00:07:09 +03:00
|
|
|
if (!$stat) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
$permissions = Constants::PERMISSION_SHARE;
|
|
|
|
$statPermissions = $stat['mode'];
|
|
|
|
$isDir = ($statPermissions & 0x4000) === 0x4000;
|
|
|
|
if ($statPermissions & 0x0100) {
|
|
|
|
$permissions += Constants::PERMISSION_READ;
|
|
|
|
}
|
|
|
|
if ($statPermissions & 0x0080) {
|
|
|
|
$permissions += Constants::PERMISSION_UPDATE;
|
|
|
|
if ($isDir) {
|
|
|
|
$permissions += Constants::PERMISSION_CREATE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!($path === '' || $path === '/')) { // deletable depends on the parents unix permissions
|
2020-10-07 14:50:29 +03:00
|
|
|
$fullPath = $this->getSourcePath($path);
|
2020-02-15 00:07:09 +03:00
|
|
|
$parent = dirname($fullPath);
|
|
|
|
if (is_writable($parent)) {
|
|
|
|
$permissions += Constants::PERMISSION_DELETE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$data = [];
|
|
|
|
$data['mimetype'] = $isDir ? 'httpd/unix-directory' : \OC::$server->getMimeTypeDetector()->detectPath($path);
|
|
|
|
$data['mtime'] = $stat['mtime'];
|
|
|
|
if ($data['mtime'] === false) {
|
|
|
|
$data['mtime'] = time();
|
|
|
|
}
|
|
|
|
if ($isDir) {
|
|
|
|
$data['size'] = -1; //unknown
|
|
|
|
} else {
|
|
|
|
$data['size'] = $stat['size'];
|
|
|
|
}
|
|
|
|
$data['etag'] = $this->calculateEtag($path, $stat);
|
|
|
|
$data['storage_mtime'] = $data['mtime'];
|
|
|
|
$data['permissions'] = $permissions;
|
2020-03-27 19:47:20 +03:00
|
|
|
$data['name'] = basename($path);
|
2020-02-15 00:07:09 +03:00
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function filetype($path) {
|
|
|
|
$filetype = filetype($this->getSourcePath($path));
|
|
|
|
if ($filetype == 'link') {
|
|
|
|
$filetype = filetype(realpath($this->getSourcePath($path)));
|
2012-02-14 12:59:54 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return $filetype;
|
|
|
|
}
|
2012-08-29 10:38:33 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function filesize($path) {
|
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
return 0;
|
2012-04-01 21:30:41 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
$fullPath = $this->getSourcePath($path);
|
|
|
|
if (PHP_INT_SIZE === 4) {
|
|
|
|
$helper = new \OC\LargeFileHelper;
|
2016-10-25 12:37:16 +03:00
|
|
|
return $helper->getFileSize($fullPath);
|
2011-11-02 01:35:13 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return filesize($fullPath);
|
|
|
|
}
|
2011-11-02 01:35:13 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function isReadable($path) {
|
|
|
|
return is_readable($this->getSourcePath($path));
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function isUpdatable($path) {
|
|
|
|
return is_writable($this->getSourcePath($path));
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function file_exists($path) {
|
|
|
|
return file_exists($this->getSourcePath($path));
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function filemtime($path) {
|
2016-09-29 12:10:35 +03:00
|
|
|
$fullPath = $this->getSourcePath($path);
|
2018-01-12 15:59:58 +03:00
|
|
|
clearstatcache(true, $fullPath);
|
2016-09-29 12:10:35 +03:00
|
|
|
if (!$this->file_exists($path)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (PHP_INT_SIZE === 4) {
|
2016-10-25 12:42:16 +03:00
|
|
|
$helper = new \OC\LargeFileHelper();
|
|
|
|
return $helper->getFileMtime($fullPath);
|
2016-09-29 12:10:35 +03:00
|
|
|
}
|
|
|
|
return filemtime($fullPath);
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function touch($path, $mtime = null) {
|
|
|
|
// sets the modification time of the file to the given value.
|
|
|
|
// If mtime is nil the current time is set.
|
|
|
|
// note that the access time of the file always changes to the current time.
|
|
|
|
if ($this->file_exists($path) and !$this->isUpdatable($path)) {
|
|
|
|
return false;
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
if (!is_null($mtime)) {
|
2019-07-26 18:26:59 +03:00
|
|
|
$result = @touch($this->getSourcePath($path), $mtime);
|
2015-07-03 16:41:29 +03:00
|
|
|
} else {
|
2019-07-26 18:26:59 +03:00
|
|
|
$result = @touch($this->getSourcePath($path));
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
if ($result) {
|
|
|
|
clearstatcache(true, $this->getSourcePath($path));
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
return $result;
|
|
|
|
}
|
2014-07-10 12:54:26 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function file_get_contents($path) {
|
2017-01-12 18:07:41 +03:00
|
|
|
return file_get_contents($this->getSourcePath($path));
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2014-07-10 12:54:26 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function file_put_contents($path, $data) {
|
|
|
|
return file_put_contents($this->getSourcePath($path), $data);
|
|
|
|
}
|
2014-07-10 12:54:26 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function unlink($path) {
|
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
return $this->rmdir($path);
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($this->is_file($path)) {
|
2015-07-03 16:41:29 +03:00
|
|
|
return unlink($this->getSourcePath($path));
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2013-07-01 19:45:01 +04:00
|
|
|
|
2020-06-19 15:57:58 +03:00
|
|
|
private function checkTreeForForbiddenItems(string $path) {
|
2019-06-27 12:10:08 +03:00
|
|
|
$iterator = new \RecursiveIteratorIterator(new \RecursiveDirectoryIterator($path));
|
|
|
|
foreach ($iterator as $file) {
|
|
|
|
/** @var \SplFileInfo $file */
|
|
|
|
if (Filesystem::isFileBlacklisted($file->getBasename())) {
|
2020-06-19 15:57:58 +03:00
|
|
|
throw new ForbiddenException('Invalid path: ' . $file->getPathname(), false);
|
2019-06-27 12:10:08 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function rename($path1, $path2) {
|
|
|
|
$srcParent = dirname($path1);
|
|
|
|
$dstParent = dirname($path2);
|
2015-03-31 14:47:06 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
if (!$this->isUpdatable($srcParent)) {
|
2018-04-25 16:22:28 +03:00
|
|
|
\OCP\Util::writeLog('core', 'unable to rename, source directory is not writable : ' . $srcParent, ILogger::ERROR);
|
2015-07-03 16:41:29 +03:00
|
|
|
return false;
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
if (!$this->isUpdatable($dstParent)) {
|
2018-04-25 16:22:28 +03:00
|
|
|
\OCP\Util::writeLog('core', 'unable to rename, destination directory is not writable : ' . $dstParent, ILogger::ERROR);
|
2015-07-03 16:41:29 +03:00
|
|
|
return false;
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
if (!$this->file_exists($path1)) {
|
2018-04-25 16:22:28 +03:00
|
|
|
\OCP\Util::writeLog('core', 'unable to rename, file does not exists : ' . $path1, ILogger::ERROR);
|
2015-07-03 16:41:29 +03:00
|
|
|
return false;
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
if ($this->is_dir($path2)) {
|
|
|
|
$this->rmdir($path2);
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($this->is_file($path2)) {
|
2015-07-03 16:41:29 +03:00
|
|
|
$this->unlink($path2);
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2013-01-05 02:03:26 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
if ($this->is_dir($path1)) {
|
2016-04-07 20:51:27 +03:00
|
|
|
// we can't move folders across devices, use copy instead
|
2015-07-03 16:41:29 +03:00
|
|
|
$stat1 = stat(dirname($this->getSourcePath($path1)));
|
|
|
|
$stat2 = stat(dirname($this->getSourcePath($path2)));
|
|
|
|
if ($stat1['dev'] !== $stat2['dev']) {
|
|
|
|
$result = $this->copy($path1, $path2);
|
|
|
|
if ($result) {
|
|
|
|
$result &= $this->rmdir($path1);
|
|
|
|
}
|
|
|
|
return $result;
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2019-06-27 12:10:08 +03:00
|
|
|
|
2020-06-19 15:57:58 +03:00
|
|
|
$this->checkTreeForForbiddenItems($this->getSourcePath($path1));
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2011-07-27 21:52:24 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
return rename($this->getSourcePath($path1), $this->getSourcePath($path2));
|
|
|
|
}
|
2011-07-27 21:52:24 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function copy($path1, $path2) {
|
|
|
|
if ($this->is_dir($path1)) {
|
|
|
|
return parent::copy($path1, $path2);
|
|
|
|
} else {
|
|
|
|
return copy($this->getSourcePath($path1), $this->getSourcePath($path2));
|
2013-04-26 19:30:55 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2011-07-27 21:52:24 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function fopen($path, $mode) {
|
|
|
|
return fopen($this->getSourcePath($path), $mode);
|
|
|
|
}
|
2013-04-26 19:30:55 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function hash($type, $path, $raw = false) {
|
|
|
|
return hash_file($type, $this->getSourcePath($path), $raw);
|
|
|
|
}
|
2014-11-26 18:58:25 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function free_space($path) {
|
2016-03-07 12:58:24 +03:00
|
|
|
$sourcePath = $this->getSourcePath($path);
|
|
|
|
// using !is_dir because $sourcePath might be a part file or
|
|
|
|
// non-existing file, so we'd still want to use the parent dir
|
|
|
|
// in such cases
|
|
|
|
if (!is_dir($sourcePath)) {
|
|
|
|
// disk_free_space doesn't work on files
|
|
|
|
$sourcePath = dirname($sourcePath);
|
|
|
|
}
|
|
|
|
$space = @disk_free_space($sourcePath);
|
2015-07-03 16:41:29 +03:00
|
|
|
if ($space === false || is_null($space)) {
|
|
|
|
return \OCP\Files\FileInfo::SPACE_UNKNOWN;
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return $space;
|
|
|
|
}
|
2011-07-27 21:52:24 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
public function search($query) {
|
|
|
|
return $this->searchInDir($query);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getLocalFile($path) {
|
|
|
|
return $this->getSourcePath($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function getLocalFolder($path) {
|
|
|
|
return $this->getSourcePath($path);
|
|
|
|
}
|
2014-02-04 22:58:49 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* @param string $query
|
|
|
|
* @param string $dir
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function searchInDir($query, $dir = '') {
|
2020-03-26 11:30:18 +03:00
|
|
|
$files = [];
|
2015-07-03 16:41:29 +03:00
|
|
|
$physicalDir = $this->getSourcePath($dir);
|
|
|
|
foreach (scandir($physicalDir) as $item) {
|
2020-04-10 15:19:56 +03:00
|
|
|
if (\OC\Files\Filesystem::isIgnoredDir($item)) {
|
2015-07-03 16:41:29 +03:00
|
|
|
continue;
|
2020-04-10 15:19:56 +03:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
$physicalItem = $physicalDir . '/' . $item;
|
|
|
|
|
|
|
|
if (strstr(strtolower($item), strtolower($query)) !== false) {
|
|
|
|
$files[] = $dir . '/' . $item;
|
|
|
|
}
|
|
|
|
if (is_dir($physicalItem)) {
|
|
|
|
$files = array_merge($files, $this->searchInDir($query, $dir . '/' . $item));
|
|
|
|
}
|
2014-11-26 18:58:25 +03:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
return $files;
|
|
|
|
}
|
2014-11-26 18:58:25 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param int $time
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function hasUpdated($path, $time) {
|
|
|
|
if ($this->file_exists($path)) {
|
|
|
|
return $this->filemtime($path) > $time;
|
|
|
|
} else {
|
2014-02-04 22:58:49 +04:00
|
|
|
return true;
|
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2014-10-24 18:07:45 +04:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* Get the source path (on disk) of a given path
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
2016-05-30 16:44:19 +03:00
|
|
|
* @throws ForbiddenException
|
2015-07-03 16:41:29 +03:00
|
|
|
*/
|
|
|
|
public function getSourcePath($path) {
|
2019-06-27 12:10:08 +03:00
|
|
|
if (Filesystem::isFileBlacklisted($path)) {
|
2020-06-19 15:57:58 +03:00
|
|
|
throw new ForbiddenException('Invalid path: ' . $path, false);
|
2019-06-27 12:10:08 +03:00
|
|
|
}
|
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
$fullPath = $this->datadir . $path;
|
2018-01-15 01:44:59 +03:00
|
|
|
$currentPath = $path;
|
2020-12-08 17:12:04 +03:00
|
|
|
$allowSymlinks = \OC::$server->getConfig()->getSystemValue('localstorage.allowsymlinks', false);
|
|
|
|
if ($allowSymlinks || $currentPath === '') {
|
2016-05-30 16:44:19 +03:00
|
|
|
return $fullPath;
|
|
|
|
}
|
|
|
|
$pathToResolve = $fullPath;
|
|
|
|
$realPath = realpath($pathToResolve);
|
|
|
|
while ($realPath === false) { // for non existing files check the parent directory
|
2018-01-15 01:44:59 +03:00
|
|
|
$currentPath = dirname($currentPath);
|
|
|
|
if ($currentPath === '' || $currentPath === '.') {
|
|
|
|
return $fullPath;
|
|
|
|
}
|
|
|
|
$realPath = realpath($this->datadir . $currentPath);
|
2016-05-30 16:44:19 +03:00
|
|
|
}
|
|
|
|
if ($realPath) {
|
|
|
|
$realPath = $realPath . '/';
|
|
|
|
}
|
|
|
|
if (substr($realPath, 0, $this->dataDirLength) === $this->realDataDir) {
|
|
|
|
return $fullPath;
|
|
|
|
}
|
2017-03-29 01:34:33 +03:00
|
|
|
|
2018-04-25 16:22:28 +03:00
|
|
|
\OCP\Util::writeLog('core', "Following symlinks is not allowed ('$fullPath' -> '$realPath' not inside '{$this->realDataDir}')", ILogger::ERROR);
|
2017-03-29 01:34:33 +03:00
|
|
|
throw new ForbiddenException('Following symlinks is not allowed', false);
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* {@inheritdoc}
|
|
|
|
*/
|
|
|
|
public function isLocal() {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get the ETag for a file or folder
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getETag($path) {
|
2020-02-15 00:07:09 +03:00
|
|
|
return $this->calculateEtag($path, $this->stat($path));
|
|
|
|
}
|
2019-11-23 16:14:41 +03:00
|
|
|
|
2020-02-15 00:07:09 +03:00
|
|
|
private function calculateEtag(string $path, array $stat): string {
|
|
|
|
if ($stat['mode'] & 0x4000) { // is_dir
|
|
|
|
return parent::getETag($path);
|
|
|
|
} else {
|
2019-11-23 16:14:41 +03:00
|
|
|
if ($stat === false) {
|
|
|
|
return md5('');
|
|
|
|
}
|
|
|
|
|
|
|
|
$toHash = '';
|
|
|
|
if (isset($stat['mtime'])) {
|
|
|
|
$toHash .= $stat['mtime'];
|
|
|
|
}
|
|
|
|
if (isset($stat['ino'])) {
|
|
|
|
$toHash .= $stat['ino'];
|
|
|
|
}
|
|
|
|
if (isset($stat['dev'])) {
|
|
|
|
$toHash .= $stat['dev'];
|
|
|
|
}
|
|
|
|
if (isset($stat['size'])) {
|
|
|
|
$toHash .= $stat['size'];
|
|
|
|
}
|
|
|
|
|
|
|
|
return md5($toHash);
|
2014-10-24 18:07:45 +04:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2015-01-16 15:33:17 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param IStorage $sourceStorage
|
2015-07-03 16:41:29 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
2017-10-28 12:49:01 +03:00
|
|
|
* @param bool $preserveMtime
|
2015-07-03 16:41:29 +03:00
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 20:44:10 +03:00
|
|
|
public function copyFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false) {
|
2017-10-28 12:49:01 +03:00
|
|
|
if ($sourceStorage->instanceOfStorage(Local::class)) {
|
2017-08-09 12:56:31 +03:00
|
|
|
if ($sourceStorage->instanceOfStorage(Jail::class)) {
|
|
|
|
/**
|
|
|
|
* @var \OC\Files\Storage\Wrapper\Jail $sourceStorage
|
|
|
|
*/
|
|
|
|
$sourceInternalPath = $sourceStorage->getUnjailedPath($sourceInternalPath);
|
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* @var \OC\Files\Storage\Local $sourceStorage
|
|
|
|
*/
|
|
|
|
$rootStorage = new Local(['datadir' => '/']);
|
|
|
|
return $rootStorage->copy($sourceStorage->getSourcePath($sourceInternalPath), $this->getSourcePath($targetInternalPath));
|
|
|
|
} else {
|
|
|
|
return parent::copyFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath);
|
2015-01-16 15:33:17 +03:00
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
}
|
2015-01-16 15:33:17 +03:00
|
|
|
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
2017-07-19 20:44:10 +03:00
|
|
|
* @param IStorage $sourceStorage
|
2015-07-03 16:41:29 +03:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 20:44:10 +03:00
|
|
|
public function moveFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath) {
|
2017-04-12 15:56:51 +03:00
|
|
|
if ($sourceStorage->instanceOfStorage(Local::class)) {
|
|
|
|
if ($sourceStorage->instanceOfStorage(Jail::class)) {
|
|
|
|
/**
|
|
|
|
* @var \OC\Files\Storage\Wrapper\Jail $sourceStorage
|
|
|
|
*/
|
|
|
|
$sourceInternalPath = $sourceStorage->getUnjailedPath($sourceInternalPath);
|
|
|
|
}
|
2015-07-03 16:41:29 +03:00
|
|
|
/**
|
|
|
|
* @var \OC\Files\Storage\Local $sourceStorage
|
|
|
|
*/
|
|
|
|
$rootStorage = new Local(['datadir' => '/']);
|
|
|
|
return $rootStorage->rename($sourceStorage->getSourcePath($sourceInternalPath), $this->getSourcePath($targetInternalPath));
|
|
|
|
} else {
|
|
|
|
return parent::moveFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath);
|
2015-01-16 15:33:17 +03:00
|
|
|
}
|
2012-06-15 18:43:24 +04:00
|
|
|
}
|
2018-10-26 20:15:23 +03:00
|
|
|
|
|
|
|
public function writeStream(string $path, $stream, int $size = null): int {
|
2020-12-07 19:57:07 +03:00
|
|
|
$result = $this->file_put_contents($path, $stream);
|
2020-07-01 16:37:47 +03:00
|
|
|
if ($result === false) {
|
|
|
|
throw new GenericFileException("Failed write steam to $path");
|
|
|
|
} else {
|
|
|
|
return $result;
|
|
|
|
}
|
2018-10-26 20:15:23 +03:00
|
|
|
}
|
2011-07-27 21:52:24 +04:00
|
|
|
}
|