nextcloud/apps/files_sharing/lib/external/storage.php

269 lines
7.3 KiB
PHP
Raw Normal View History

2014-04-29 17:14:48 +04:00
<?php
/**
2015-03-26 13:44:34 +03:00
* @author Lukas Reschke <lukas@owncloud.com>
* @author Morris Jobke <hey@morrisjobke.de>
* @author Robin Appelman <icewind@owncloud.com>
* @author Thomas Müller <thomas.mueller@tmit.eu>
* @author Vincent Petry <pvince81@owncloud.com>
*
* @copyright Copyright (c) 2015, ownCloud, Inc.
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
2014-04-29 17:14:48 +04:00
*/
2014-04-29 17:14:48 +04:00
namespace OCA\Files_Sharing\External;
use OC\Files\Storage\DAV;
2014-07-01 16:35:44 +04:00
use OC\ForbiddenException;
2014-04-29 17:14:48 +04:00
use OCA\Files_Sharing\ISharedStorage;
2014-07-01 16:35:44 +04:00
use OCP\Files\NotFoundException;
use OCP\Files\StorageInvalidException;
use OCP\Files\StorageNotAvailableException;
2014-04-29 17:14:48 +04:00
class Storage extends DAV implements ISharedStorage {
2014-04-29 17:14:48 +04:00
/**
* @var string
*/
private $remoteUser;
/**
* @var string
*/
private $remote;
/**
* @var string
*/
private $mountPoint;
/**
* @var string
*/
private $token;
/**
* @var \OCP\ICertificateManager
*/
private $certificateManager;
private $updateChecked = false;
/**
* @var \OCA\Files_Sharing\External\Manager
*/
private $manager;
2014-04-29 17:14:48 +04:00
public function __construct($options) {
$this->manager = $options['manager'];
$this->certificateManager = $options['certificateManager'];
2014-04-29 17:14:48 +04:00
$this->remote = $options['remote'];
$this->remoteUser = $options['owner'];
list($protocol, $remote) = explode('://', $this->remote);
if (strpos($remote, '/')) {
list($host, $root) = explode('/', $remote, 2);
} else {
$host = $remote;
$root = '';
}
2014-04-29 17:14:48 +04:00
$secure = $protocol === 'https';
$root = rtrim($root, '/') . '/public.php/webdav';
2014-04-29 17:14:48 +04:00
$this->mountPoint = $options['mountpoint'];
$this->token = $options['token'];
2014-04-29 17:14:48 +04:00
parent::__construct(array(
'secure' => $secure,
'host' => $host,
'root' => $root,
'user' => $options['token'],
'password' => (string)$options['password']
2014-04-29 17:14:48 +04:00
));
$this->getWatcher()->setPolicy(\OC\Files\Cache\Watcher::CHECK_ONCE);
2014-04-29 17:14:48 +04:00
}
public function getRemoteUser() {
return $this->remoteUser;
}
public function getRemote() {
return $this->remote;
}
public function getMountPoint() {
return $this->mountPoint;
}
public function getToken() {
return $this->token;
}
public function getPassword() {
return $this->password;
}
2014-04-29 17:14:48 +04:00
/**
* @brief get id of the mount point
* @return string
*/
public function getId() {
2014-06-12 18:15:01 +04:00
return 'shared::' . md5($this->token . '@' . $this->remote);
2014-04-29 17:14:48 +04:00
}
public function getCache($path = '', $storage = null) {
if (is_null($this->cache)) {
2014-04-29 17:14:48 +04:00
$this->cache = new Cache($this, $this->remote, $this->remoteUser);
}
return $this->cache;
}
/**
* @param string $path
* @param \OC\Files\Storage\Storage $storage
* @return \OCA\Files_Sharing\External\Scanner
*/
public function getScanner($path = '', $storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($this->scanner)) {
$this->scanner = new Scanner($storage);
}
return $this->scanner;
}
/**
* check if a file or folder has been updated since $time
*
* @param string $path
* @param int $time
2014-07-01 16:35:44 +04:00
* @throws \OCP\Files\StorageNotAvailableException
* @throws \OCP\Files\StorageInvalidException
* @return bool
*/
public function hasUpdated($path, $time) {
2014-06-27 19:31:51 +04:00
// since for owncloud webdav servers we can rely on etag propagation we only need to check the root of the storage
// because of that we only do one check for the entire storage per request
if ($this->updateChecked) {
return false;
}
$this->updateChecked = true;
2014-07-01 16:35:44 +04:00
try {
return parent::hasUpdated('', $time);
} catch (StorageInvalidException $e) {
// check if it needs to be removed
$this->checkStorageAvailability();
throw $e;
2014-07-01 16:35:44 +04:00
} catch (StorageNotAvailableException $e) {
// check if it needs to be removed or just temp unavailable
$this->checkStorageAvailability();
throw $e;
}
}
/**
* Check whether this storage is permanently or temporarily
* unavailable
*
* @throws \OCP\Files\StorageNotAvailableException
* @throws \OCP\Files\StorageInvalidException
*/
public function checkStorageAvailability() {
// see if we can find out why the share is unavailable
try {
$this->getShareInfo();
} catch (NotFoundException $e) {
// a 404 can either mean that the share no longer exists or there is no ownCloud on the remote
if ($this->testRemote()) {
// valid ownCloud instance means that the public share no longer exists
// since this is permanent (re-sharing the file will create a new token)
// we remove the invalid storage
$this->manager->removeShare($this->mountPoint);
$this->manager->getMountManager()->removeMount($this->mountPoint);
throw new StorageInvalidException();
} else {
// ownCloud instance is gone, likely to be a temporary server configuration error
throw new StorageNotAvailableException();
2014-07-01 16:35:44 +04:00
}
} catch (ForbiddenException $e) {
// auth error, remove share for now (provide a dialog in the future)
$this->manager->removeShare($this->mountPoint);
$this->manager->getMountManager()->removeMount($this->mountPoint);
throw new StorageInvalidException();
} catch (\GuzzleHttp\Exception\ConnectException $e) {
throw new StorageNotAvailableException();
} catch (\GuzzleHttp\Exception\RequestException $e) {
throw new StorageNotAvailableException();
} catch (\Exception $e) {
2014-07-01 16:35:44 +04:00
throw $e;
}
}
2014-12-17 18:09:41 +03:00
public function file_exists($path) {
if ($path === '') {
return true;
} else {
return parent::file_exists($path);
}
}
2014-07-01 16:35:44 +04:00
/**
* check if the configured remote is a valid ownCloud instance
*
* @return bool
*/
protected function testRemote() {
try {
$result = file_get_contents($this->remote . '/status.php');
$data = json_decode($result);
return is_object($data) and !empty($data->version);
} catch (\Exception $e) {
return false;
}
}
2015-03-16 13:28:23 +03:00
/**
* @return mixed
* @throws ForbiddenException
* @throws NotFoundException
* @throws \Exception
*/
2014-07-01 16:35:44 +04:00
public function getShareInfo() {
$remote = $this->getRemote();
$token = $this->getToken();
$password = $this->getPassword();
$url = rtrim($remote, '/') . '/index.php/apps/files_sharing/shareinfo?t=' . $token;
2014-07-01 16:35:44 +04:00
2015-03-16 13:28:23 +03:00
// TODO: DI
$client = \OC::$server->getHTTPClientService()->newClient();
try {
$response = $client->post($url, ['body' => ['password' => $password]]);
} catch (\GuzzleHttp\Exception\RequestException $e) {
if ($e->getCode() === 401 || $e->getCode() === 403) {
throw new ForbiddenException();
}
// throw this to be on the safe side: the share will still be visible
// in the UI in case the failure is intermittent, and the user will
// be able to decide whether to remove it if it's really gone
throw new StorageNotAvailableException();
2014-07-01 16:35:44 +04:00
}
2015-03-16 13:28:23 +03:00
return json_decode($response->getBody(), true);
}
public function getOwner($path) {
list(, $remote) = explode('://', $this->remote, 2);
return $this->remoteUser . '@' . $remote;
}
2014-04-29 17:14:48 +04:00
}