2012-03-23 21:54:38 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Alexander Bogdanov <syn@li.ru>
|
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
|
|
|
* @author Carlos Cerrillo <ccerrillo@gmail.com>
|
|
|
|
* @author Felix Moeller <mail@felixmoeller.de>
|
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
|
|
* @author Michael Gapczynski <GapczynskiM@gmail.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Philippe Kueck <pk@plusline.de>
|
|
|
|
* @author Philipp Kapfer <philipp.kapfer@gmx.at>
|
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
|
|
|
* @author Scrutinizer Auto-Fixer <auto-fixer@scrutinizer-ci.com>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
|
|
|
*
|
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
2012-03-23 21:54:38 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2012-09-07 20:30:48 +04:00
|
|
|
namespace OC\Files\Storage;
|
|
|
|
|
2015-01-20 21:45:32 +03:00
|
|
|
use OCP\Files\StorageInvalidException;
|
2014-06-30 17:46:37 +04:00
|
|
|
use OCP\Files\StorageNotAvailableException;
|
2015-03-09 13:48:55 +03:00
|
|
|
use Sabre\HTTP\ClientHttpException;
|
2014-06-30 17:46:37 +04:00
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/**
|
|
|
|
* Class DAV
|
|
|
|
*
|
|
|
|
* @package OC\Files\Storage
|
|
|
|
*/
|
2014-03-04 18:44:58 +04:00
|
|
|
class DAV extends \OC\Files\Storage\Common {
|
2014-04-29 17:14:48 +04:00
|
|
|
protected $password;
|
|
|
|
protected $user;
|
|
|
|
protected $host;
|
|
|
|
protected $secure;
|
|
|
|
protected $root;
|
|
|
|
protected $certPath;
|
|
|
|
protected $ready;
|
2012-03-23 21:54:38 +04:00
|
|
|
/**
|
2014-01-09 17:25:48 +04:00
|
|
|
* @var \Sabre\DAV\Client
|
2012-03-23 21:54:38 +04:00
|
|
|
*/
|
|
|
|
private $client;
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** @var array */
|
|
|
|
private static $tempFiles = [];
|
2012-08-29 10:42:49 +04:00
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/**
|
|
|
|
* @param array $params
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2012-09-07 17:22:01 +04:00
|
|
|
public function __construct($params) {
|
2012-12-24 22:45:52 +04:00
|
|
|
if (isset($params['host']) && isset($params['user']) && isset($params['password'])) {
|
|
|
|
$host = $params['host'];
|
|
|
|
//remove leading http[s], will be generated in createBaseUri()
|
|
|
|
if (substr($host, 0, 8) == "https://") $host = substr($host, 8);
|
|
|
|
else if (substr($host, 0, 7) == "http://") $host = substr($host, 7);
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->host = $host;
|
|
|
|
$this->user = $params['user'];
|
|
|
|
$this->password = $params['password'];
|
2012-12-24 22:45:52 +04:00
|
|
|
if (isset($params['secure'])) {
|
|
|
|
if (is_string($params['secure'])) {
|
|
|
|
$this->secure = ($params['secure'] === 'true');
|
|
|
|
} else {
|
|
|
|
$this->secure = (bool)$params['secure'];
|
|
|
|
}
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2012-12-24 22:45:52 +04:00
|
|
|
$this->secure = false;
|
|
|
|
}
|
2013-12-15 20:22:52 +04:00
|
|
|
if ($this->secure === true) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$certPath = \OC_User::getHome(\OC_User::getUser()) . '/files_external/rootcerts.crt';
|
2013-12-15 20:22:52 +04:00
|
|
|
if (file_exists($certPath)) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->certPath = $certPath;
|
2013-12-15 20:22:52 +04:00
|
|
|
}
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->root = isset($params['root']) ? $params['root'] : '/';
|
|
|
|
if (!$this->root || $this->root[0] != '/') {
|
|
|
|
$this->root = '/' . $this->root;
|
2012-12-24 22:45:52 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
if (substr($this->root, -1, 1) != '/') {
|
|
|
|
$this->root .= '/';
|
2012-11-05 19:39:03 +04:00
|
|
|
}
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2014-10-13 19:15:58 +04:00
|
|
|
throw new \Exception('Invalid webdav storage configuration');
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2012-10-22 00:04:45 +04:00
|
|
|
}
|
|
|
|
|
2014-03-04 18:44:58 +04:00
|
|
|
private function init() {
|
|
|
|
if ($this->ready) {
|
2012-10-22 00:04:45 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
$this->ready = true;
|
2012-08-29 10:42:49 +04:00
|
|
|
|
2013-12-17 12:38:43 +04:00
|
|
|
$settings = array(
|
|
|
|
'baseUri' => $this->createBaseUri(),
|
|
|
|
'userName' => $this->user,
|
|
|
|
'password' => $this->password,
|
|
|
|
);
|
2012-03-23 21:54:38 +04:00
|
|
|
|
2014-01-09 17:25:48 +04:00
|
|
|
$this->client = new \Sabre\DAV\Client($settings);
|
2015-02-12 14:29:01 +03:00
|
|
|
$this->client->setThrowExceptions(true);
|
2012-08-29 10:42:49 +04:00
|
|
|
|
2013-12-17 12:38:43 +04:00
|
|
|
if ($this->secure === true && $this->certPath) {
|
2013-12-15 20:22:52 +04:00
|
|
|
$this->client->addTrustedCertificates($this->certPath);
|
2012-07-09 12:19:19 +04:00
|
|
|
}
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-03-04 18:44:58 +04:00
|
|
|
public function getId() {
|
2012-10-12 01:06:57 +04:00
|
|
|
return 'webdav::' . $this->user . '@' . $this->host . '/' . $this->root;
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-10-13 19:15:58 +04:00
|
|
|
public function createBaseUri() {
|
2014-03-04 18:44:58 +04:00
|
|
|
$baseUri = 'http';
|
2012-11-30 19:27:11 +04:00
|
|
|
if ($this->secure) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$baseUri .= 's';
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$baseUri .= '://' . $this->host . $this->root;
|
2012-03-23 21:54:38 +04:00
|
|
|
return $baseUri;
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function mkdir($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-10-29 02:58:08 +04:00
|
|
|
return $this->simpleResponse('MKCOL', $path, null, 201);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function rmdir($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path) . '/';
|
2014-01-31 19:06:11 +04:00
|
|
|
// FIXME: some WebDAV impl return 403 when trying to DELETE
|
|
|
|
// a non-empty folder
|
2012-10-29 02:58:08 +04:00
|
|
|
return $this->simpleResponse('DELETE', $path, null, 204);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function opendir($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array(), 1);
|
|
|
|
$id = md5('webdav' . $this->root . $path);
|
2013-01-28 18:34:15 +04:00
|
|
|
$content = array();
|
2014-03-04 18:44:58 +04:00
|
|
|
$files = array_keys($response);
|
|
|
|
array_shift($files); //the first entry is the current directory
|
2012-11-30 19:27:11 +04:00
|
|
|
foreach ($files as $file) {
|
2012-06-29 21:00:41 +04:00
|
|
|
$file = urldecode(basename($file));
|
2014-03-04 18:44:58 +04:00
|
|
|
$content[] = $file;
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2013-01-28 18:34:15 +04:00
|
|
|
\OC\Files\Stream\Dir::register($id, $content);
|
2014-03-04 18:44:58 +04:00
|
|
|
return opendir('fakedir://' . $id);
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function filetype($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array('{DAV:}resourcetype'));
|
2014-01-31 19:06:11 +04:00
|
|
|
$responseType = array();
|
|
|
|
if (isset($response["{DAV:}resourcetype"])) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$responseType = $response["{DAV:}resourcetype"]->resourceType;
|
2014-01-31 19:06:11 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
return (count($responseType) > 0 and $responseType[0] == "{DAV:}collection") ? 'dir' : 'file';
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function file_exists($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-01-31 19:06:11 +04:00
|
|
|
$this->client->propfind($this->encodePath($path), array('{DAV:}resourcetype'));
|
2014-03-04 18:44:58 +04:00
|
|
|
return true; //no 404 exception
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function unlink($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2013-02-09 20:35:47 +04:00
|
|
|
return $this->simpleResponse('DELETE', $path, null, 204);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2013-02-09 20:35:47 +04:00
|
|
|
public function fopen($path, $mode) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
|
|
|
switch ($mode) {
|
2012-03-23 21:54:38 +04:00
|
|
|
case 'r':
|
|
|
|
case 'rb':
|
2014-03-04 18:44:58 +04:00
|
|
|
if (!$this->file_exists($path)) {
|
2012-10-11 23:13:19 +04:00
|
|
|
return false;
|
|
|
|
}
|
2012-03-23 21:54:38 +04:00
|
|
|
//straight up curl instead of sabredav here, sabredav put's the entire get result in memory
|
|
|
|
$curl = curl_init();
|
|
|
|
$fp = fopen('php://temp', 'r+');
|
2014-03-04 18:44:58 +04:00
|
|
|
curl_setopt($curl, CURLOPT_USERPWD, $this->user . ':' . $this->password);
|
|
|
|
curl_setopt($curl, CURLOPT_URL, $this->createBaseUri() . $this->encodePath($path));
|
2012-03-23 21:54:38 +04:00
|
|
|
curl_setopt($curl, CURLOPT_FILE, $fp);
|
2013-08-02 23:18:29 +04:00
|
|
|
curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
|
2014-09-11 21:21:56 +04:00
|
|
|
curl_setopt($curl, CURLOPT_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS);
|
|
|
|
curl_setopt($curl, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS);
|
2013-12-17 12:38:43 +04:00
|
|
|
if ($this->secure === true) {
|
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, true);
|
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 2);
|
2014-03-04 18:44:58 +04:00
|
|
|
if ($this->certPath) {
|
2013-12-17 12:38:43 +04:00
|
|
|
curl_setopt($curl, CURLOPT_CAINFO, $this->certPath);
|
|
|
|
}
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
|
|
|
|
curl_exec($curl);
|
2014-01-31 19:06:11 +04:00
|
|
|
$statusCode = curl_getinfo($curl, CURLINFO_HTTP_CODE);
|
|
|
|
if ($statusCode !== 200) {
|
|
|
|
\OCP\Util::writeLog("webdav client", 'curl GET ' . curl_getinfo($curl, CURLINFO_EFFECTIVE_URL) . ' returned status code ' . $statusCode, \OCP\Util::ERROR);
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
curl_close($curl);
|
2012-03-23 21:54:38 +04:00
|
|
|
rewind($fp);
|
|
|
|
return $fp;
|
|
|
|
case 'w':
|
|
|
|
case 'wb':
|
|
|
|
case 'a':
|
|
|
|
case 'ab':
|
|
|
|
case 'r+':
|
|
|
|
case 'w+':
|
|
|
|
case 'wb+':
|
|
|
|
case 'a+':
|
|
|
|
case 'x':
|
|
|
|
case 'x+':
|
|
|
|
case 'c':
|
|
|
|
case 'c+':
|
|
|
|
//emulate these
|
2014-03-04 18:44:58 +04:00
|
|
|
if (strrpos($path, '.') !== false) {
|
|
|
|
$ext = substr($path, strrpos($path, '.'));
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2014-03-04 18:44:58 +04:00
|
|
|
$ext = '';
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
if ($this->file_exists($path)) {
|
2014-06-20 18:09:38 +04:00
|
|
|
if (!$this->isUpdatable($path)) {
|
|
|
|
return false;
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$tmpFile = $this->getCachedFile($path);
|
|
|
|
} else {
|
2014-06-20 18:09:38 +04:00
|
|
|
if (!$this->isCreatable(dirname($path))) {
|
|
|
|
return false;
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$tmpFile = \OCP\Files::tmpFile($ext);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
\OC\Files\Stream\Close::registerCallback($tmpFile, array($this, 'writeBack'));
|
|
|
|
self::$tempFiles[$tmpFile] = $path;
|
|
|
|
return fopen('close://' . $tmpFile, $mode);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/**
|
|
|
|
* @param string $tmpFile
|
|
|
|
*/
|
2012-09-07 17:22:01 +04:00
|
|
|
public function writeBack($tmpFile) {
|
2012-11-30 19:27:11 +04:00
|
|
|
if (isset(self::$tempFiles[$tmpFile])) {
|
2012-10-24 00:53:54 +04:00
|
|
|
$this->uploadFile($tmpFile, self::$tempFiles[$tmpFile]);
|
2012-03-23 21:54:38 +04:00
|
|
|
unlink($tmpFile);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function free_space($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array('{DAV:}quota-available-bytes'));
|
2012-11-30 19:27:11 +04:00
|
|
|
if (isset($response['{DAV:}quota-available-bytes'])) {
|
2012-03-23 21:54:38 +04:00
|
|
|
return (int)$response['{DAV:}quota-available-bytes'];
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2014-08-19 16:05:08 +04:00
|
|
|
return \OCP\Files\FileInfo::SPACE_UNKNOWN;
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-08-19 16:05:08 +04:00
|
|
|
return \OCP\Files\FileInfo::SPACE_UNKNOWN;
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-03-04 18:44:58 +04:00
|
|
|
public function touch($path, $mtime = null) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2012-11-30 19:27:11 +04:00
|
|
|
if (is_null($mtime)) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$mtime = time();
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2013-07-12 15:25:37 +04:00
|
|
|
|
|
|
|
// if file exists, update the mtime, else create a new empty file
|
|
|
|
if ($this->file_exists($path)) {
|
2014-01-31 19:06:11 +04:00
|
|
|
try {
|
|
|
|
$this->client->proppatch($this->encodePath($path), array('{DAV:}lastmodified' => $mtime));
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 501) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-12-04 00:20:00 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2014-01-31 19:06:11 +04:00
|
|
|
return false;
|
|
|
|
}
|
2013-07-12 15:25:37 +04:00
|
|
|
} else {
|
|
|
|
$this->file_put_contents($path, '');
|
|
|
|
}
|
2013-11-25 15:44:27 +04:00
|
|
|
return true;
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param string $target
|
|
|
|
*/
|
2014-03-04 18:44:58 +04:00
|
|
|
protected function uploadFile($path, $target) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$source = fopen($path, 'r');
|
2012-03-23 21:54:38 +04:00
|
|
|
|
|
|
|
$curl = curl_init();
|
2014-03-04 18:44:58 +04:00
|
|
|
curl_setopt($curl, CURLOPT_USERPWD, $this->user . ':' . $this->password);
|
2014-03-31 19:00:32 +04:00
|
|
|
curl_setopt($curl, CURLOPT_URL, $this->createBaseUri() . $this->encodePath($target));
|
2012-03-23 21:54:38 +04:00
|
|
|
curl_setopt($curl, CURLOPT_BINARYTRANSFER, true);
|
|
|
|
curl_setopt($curl, CURLOPT_INFILE, $source); // file pointer
|
|
|
|
curl_setopt($curl, CURLOPT_INFILESIZE, filesize($path));
|
|
|
|
curl_setopt($curl, CURLOPT_PUT, true);
|
2014-07-03 14:04:38 +04:00
|
|
|
curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
|
2014-09-11 21:21:56 +04:00
|
|
|
curl_setopt($curl, CURLOPT_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS);
|
|
|
|
curl_setopt($curl, CURLOPT_REDIR_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS);
|
2013-12-17 12:38:43 +04:00
|
|
|
if ($this->secure === true) {
|
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, true);
|
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 2);
|
2014-03-04 18:44:58 +04:00
|
|
|
if ($this->certPath) {
|
2013-12-17 12:38:43 +04:00
|
|
|
curl_setopt($curl, CURLOPT_CAINFO, $this->certPath);
|
|
|
|
}
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
curl_exec($curl);
|
2014-01-31 19:06:11 +04:00
|
|
|
$statusCode = curl_getinfo($curl, CURLINFO_HTTP_CODE);
|
|
|
|
if ($statusCode !== 200) {
|
|
|
|
\OCP\Util::writeLog("webdav client", 'curl GET ' . curl_getinfo($curl, CURLINFO_EFFECTIVE_URL) . ' returned status code ' . $statusCode, \OCP\Util::ERROR);
|
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
curl_close($curl);
|
2014-08-13 17:45:33 +04:00
|
|
|
fclose($source);
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->removeCachedFile($target);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2013-02-09 20:35:47 +04:00
|
|
|
public function rename($path1, $path2) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-01-31 19:06:11 +04:00
|
|
|
$path1 = $this->encodePath($this->cleanPath($path1));
|
2014-03-04 18:44:58 +04:00
|
|
|
$path2 = $this->createBaseUri() . $this->encodePath($this->cleanPath($path2));
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->client->request('MOVE', $path1, null, array('Destination' => $path2));
|
|
|
|
$this->removeCachedFile($path1);
|
|
|
|
$this->removeCachedFile($path2);
|
2012-03-23 21:54:38 +04:00
|
|
|
return true;
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2013-02-09 20:35:47 +04:00
|
|
|
public function copy($path1, $path2) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-01-31 19:06:11 +04:00
|
|
|
$path1 = $this->encodePath($this->cleanPath($path1));
|
2014-03-04 18:44:58 +04:00
|
|
|
$path2 = $this->createBaseUri() . $this->encodePath($this->cleanPath($path2));
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$this->client->request('COPY', $path1, null, array('Destination' => $path2));
|
|
|
|
$this->removeCachedFile($path2);
|
2012-03-23 21:54:38 +04:00
|
|
|
return true;
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function stat($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-01-31 19:06:11 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array('{DAV:}getlastmodified', '{DAV:}getcontentlength'));
|
2012-06-29 21:00:41 +04:00
|
|
|
return array(
|
2014-03-04 18:44:58 +04:00
|
|
|
'mtime' => strtotime($response['{DAV:}getlastmodified']),
|
|
|
|
'size' => (int)isset($response['{DAV:}getcontentlength']) ? $response['{DAV:}getcontentlength'] : 0,
|
2012-06-29 21:00:41 +04:00
|
|
|
);
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return array();
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-02-12 14:29:01 +03:00
|
|
|
return array();
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return array();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2012-09-07 17:22:01 +04:00
|
|
|
public function getMimeType($path) {
|
2012-10-22 00:04:45 +04:00
|
|
|
$this->init();
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array('{DAV:}getcontenttype', '{DAV:}resourcetype'));
|
2014-01-31 19:06:11 +04:00
|
|
|
$responseType = array();
|
|
|
|
if (isset($response["{DAV:}resourcetype"])) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$responseType = $response["{DAV:}resourcetype"]->resourceType;
|
2014-01-31 19:06:11 +04:00
|
|
|
}
|
2014-03-04 18:44:58 +04:00
|
|
|
$type = (count($responseType) > 0 and $responseType[0] == "{DAV:}collection") ? 'dir' : 'file';
|
|
|
|
if ($type == 'dir') {
|
2012-03-23 21:54:38 +04:00
|
|
|
return 'httpd/unix-directory';
|
2012-11-30 19:27:11 +04:00
|
|
|
} elseif (isset($response['{DAV:}getcontenttype'])) {
|
2012-03-23 21:54:38 +04:00
|
|
|
return $response['{DAV:}getcontenttype'];
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-19 12:31:54 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
2015-03-09 13:48:55 +03:00
|
|
|
* @return string
|
2014-02-19 12:31:54 +04:00
|
|
|
*/
|
2013-02-12 14:05:12 +04:00
|
|
|
public function cleanPath($path) {
|
2014-06-13 17:28:24 +04:00
|
|
|
if ($path === "") {
|
2014-05-16 14:30:08 +04:00
|
|
|
return $path;
|
|
|
|
}
|
2013-11-20 21:14:42 +04:00
|
|
|
$path = \OC\Files\Filesystem::normalizePath($path);
|
|
|
|
// remove leading slash
|
|
|
|
return substr($path, 1);
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
|
|
|
|
2014-01-31 19:06:11 +04:00
|
|
|
/**
|
|
|
|
* URL encodes the given path but keeps the slashes
|
2014-03-04 18:44:58 +04:00
|
|
|
*
|
2014-01-31 19:06:11 +04:00
|
|
|
* @param string $path to encode
|
|
|
|
* @return string encoded path
|
|
|
|
*/
|
|
|
|
private function encodePath($path) {
|
|
|
|
// slashes need to stay
|
|
|
|
return str_replace('%2F', '/', rawurlencode($path));
|
|
|
|
}
|
|
|
|
|
2014-02-06 19:30:58 +04:00
|
|
|
/**
|
|
|
|
* @param string $method
|
|
|
|
* @param string $path
|
2015-03-09 13:48:55 +03:00
|
|
|
* @param string|resource|null $body
|
|
|
|
* @param int $expected
|
|
|
|
* @return bool
|
|
|
|
* @throws StorageInvalidException
|
|
|
|
* @throws StorageNotAvailableException
|
2014-02-06 19:30:58 +04:00
|
|
|
*/
|
2013-02-09 20:35:47 +04:00
|
|
|
private function simpleResponse($method, $path, $body, $expected) {
|
2014-03-04 18:44:58 +04:00
|
|
|
$path = $this->cleanPath($path);
|
2012-11-30 19:27:11 +04:00
|
|
|
try {
|
2014-03-04 18:44:58 +04:00
|
|
|
$response = $this->client->request($method, $this->encodePath($path), $body);
|
|
|
|
return $response['statusCode'] == $expected;
|
2015-02-12 14:29:01 +03:00
|
|
|
} catch (ClientHttpException $e) {
|
|
|
|
if ($e->getHttpStatus() === 404 && $method === 'DELETE') {
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-03-04 18:44:58 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-12-04 00:20:00 +03:00
|
|
|
// TODO: log for now, but in the future need to wrap/rethrow exception
|
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2012-03-23 21:54:38 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2013-08-02 17:44:56 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if curl is installed
|
|
|
|
*/
|
|
|
|
public static function checkDependencies() {
|
2015-03-12 23:43:41 +03:00
|
|
|
return true;
|
2013-08-02 17:44:56 +04:00
|
|
|
}
|
2014-06-04 20:19:52 +04:00
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-06-13 17:28:24 +04:00
|
|
|
public function isUpdatable($path) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return (bool)($this->getPermissions($path) & \OCP\Constants::PERMISSION_UPDATE);
|
2014-06-13 17:28:24 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-06-13 17:28:24 +04:00
|
|
|
public function isCreatable($path) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return (bool)($this->getPermissions($path) & \OCP\Constants::PERMISSION_CREATE);
|
2014-06-13 17:28:24 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-06-13 17:28:24 +04:00
|
|
|
public function isSharable($path) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return (bool)($this->getPermissions($path) & \OCP\Constants::PERMISSION_SHARE);
|
2014-06-13 17:28:24 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-06-13 17:28:24 +04:00
|
|
|
public function isDeletable($path) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return (bool)($this->getPermissions($path) & \OCP\Constants::PERMISSION_DELETE);
|
2014-06-13 17:28:24 +04:00
|
|
|
}
|
|
|
|
|
2015-03-09 13:48:55 +03:00
|
|
|
/** {@inheritdoc} */
|
2014-06-04 20:19:52 +04:00
|
|
|
public function getPermissions($path) {
|
|
|
|
$this->init();
|
2014-11-11 17:20:36 +03:00
|
|
|
$path = $this->cleanPath($path);
|
2014-06-04 20:19:52 +04:00
|
|
|
$response = $this->client->propfind($this->encodePath($path), array('{http://owncloud.org/ns}permissions'));
|
|
|
|
if (isset($response['{http://owncloud.org/ns}permissions'])) {
|
2014-06-27 19:27:47 +04:00
|
|
|
return $this->parsePermissions($response['{http://owncloud.org/ns}permissions']);
|
2014-06-13 17:28:24 +04:00
|
|
|
} else if ($this->is_dir($path)) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return \OCP\Constants::PERMISSION_ALL;
|
2014-06-13 17:28:24 +04:00
|
|
|
} else if ($this->file_exists($path)) {
|
2014-11-25 18:28:41 +03:00
|
|
|
return \OCP\Constants::PERMISSION_ALL - \OCP\Constants::PERMISSION_CREATE;
|
2014-06-04 20:19:52 +04:00
|
|
|
} else {
|
2014-06-13 17:28:24 +04:00
|
|
|
return 0;
|
2014-06-04 20:19:52 +04:00
|
|
|
}
|
|
|
|
}
|
2014-06-27 19:10:46 +04:00
|
|
|
|
2014-06-27 19:27:47 +04:00
|
|
|
/**
|
|
|
|
* @param string $permissionsString
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
protected function parsePermissions($permissionsString) {
|
2014-11-25 18:28:41 +03:00
|
|
|
$permissions = \OCP\Constants::PERMISSION_READ;
|
2014-06-27 19:27:47 +04:00
|
|
|
if (strpos($permissionsString, 'R') !== false) {
|
2014-11-25 18:28:41 +03:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_SHARE;
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
|
|
|
if (strpos($permissionsString, 'D') !== false) {
|
2014-11-25 18:28:41 +03:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_DELETE;
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
|
|
|
if (strpos($permissionsString, 'W') !== false) {
|
2014-11-25 18:28:41 +03:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_UPDATE;
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
2014-06-27 19:28:56 +04:00
|
|
|
if (strpos($permissionsString, 'CK') !== false) {
|
2014-11-25 18:28:41 +03:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_CREATE;
|
|
|
|
$permissions |= \OCP\Constants::PERMISSION_UPDATE;
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
|
|
|
return $permissions;
|
|
|
|
}
|
|
|
|
|
2014-06-27 19:10:46 +04:00
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param int $time
|
2014-06-30 17:46:37 +04:00
|
|
|
* @throws \OCP\Files\StorageNotAvailableException
|
2014-06-27 19:10:46 +04:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function hasUpdated($path, $time) {
|
|
|
|
$this->init();
|
2014-11-11 17:20:36 +03:00
|
|
|
$path = $this->cleanPath($path);
|
2014-06-30 17:46:37 +04:00
|
|
|
try {
|
|
|
|
$response = $this->client->propfind($this->encodePath($path), array(
|
|
|
|
'{DAV:}getlastmodified',
|
|
|
|
'{DAV:}getetag',
|
|
|
|
'{http://owncloud.org/ns}permissions'
|
|
|
|
));
|
|
|
|
if (isset($response['{DAV:}getetag'])) {
|
|
|
|
$cachedData = $this->getCache()->get($path);
|
|
|
|
$etag = trim($response['{DAV:}getetag'], '"');
|
|
|
|
if ($cachedData['etag'] !== $etag) {
|
|
|
|
return true;
|
|
|
|
} else if (isset($response['{http://owncloud.org/ns}permissions'])) {
|
|
|
|
$permissions = $this->parsePermissions($response['{http://owncloud.org/ns}permissions']);
|
|
|
|
return $permissions !== $cachedData['permissions'];
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
2014-06-27 19:27:47 +04:00
|
|
|
} else {
|
2014-06-30 17:46:37 +04:00
|
|
|
$remoteMtime = strtotime($response['{DAV:}getlastmodified']);
|
|
|
|
return $remoteMtime > $time;
|
2014-06-27 19:27:47 +04:00
|
|
|
}
|
2015-03-09 13:48:55 +03:00
|
|
|
} catch (\Exception $e) {
|
2015-02-12 14:29:01 +03:00
|
|
|
if ($e->getHttpStatus() === 404) {
|
|
|
|
return false;
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
$this->convertSabreException($e);
|
2015-01-30 14:02:23 +03:00
|
|
|
return false;
|
2014-06-27 19:10:46 +04:00
|
|
|
}
|
|
|
|
}
|
2015-01-20 21:45:32 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert sabre DAV exception to a storage exception,
|
|
|
|
* then throw it
|
|
|
|
*
|
2015-03-09 13:48:55 +03:00
|
|
|
* @param ClientHttpException $e sabre exception
|
2015-01-20 21:45:32 +03:00
|
|
|
* @throws StorageInvalidException if the storage is invalid, for example
|
|
|
|
* when the authentication expired or is invalid
|
|
|
|
* @throws StorageNotAvailableException if the storage is not available,
|
|
|
|
* which might be temporary
|
|
|
|
*/
|
2015-03-09 13:48:55 +03:00
|
|
|
private function convertSabreException(ClientHttpException $e) {
|
2015-01-20 21:45:32 +03:00
|
|
|
\OCP\Util::writeLog('files_external', $e->getMessage(), \OCP\Util::ERROR);
|
2015-02-12 14:29:01 +03:00
|
|
|
if ($e->getHttpStatus() === 401) {
|
2015-01-20 21:45:32 +03:00
|
|
|
// either password was changed or was invalid all along
|
|
|
|
throw new StorageInvalidException(get_class($e).': '.$e->getMessage());
|
2015-02-12 14:29:01 +03:00
|
|
|
} else if ($e->getHttpStatus() === 405) {
|
|
|
|
// ignore exception for MethodNotAllowed, false will be returned
|
2015-01-30 14:02:23 +03:00
|
|
|
return;
|
2015-01-20 21:45:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
throw new StorageNotAvailableException(get_class($e).': '.$e->getMessage());
|
|
|
|
}
|
2012-03-23 21:54:38 +04:00
|
|
|
}
|
2013-12-15 20:22:52 +04:00
|
|
|
|