nextcloud/lib/private/Files/Storage/Common.php

813 lines
21 KiB
PHP
Raw Normal View History

<?php
/**
2016-07-21 18:07:57 +03:00
* @copyright Copyright (c) 2016, ownCloud, Inc.
*
2016-05-26 20:56:05 +03:00
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
2015-03-26 13:44:34 +03:00
* @author Bart Visscher <bartv@thisnet.nl>
2016-05-26 20:56:05 +03:00
* @author Björn Schießle <bjoern@schiessle.org>
2015-03-26 13:44:34 +03:00
* @author hkjolhede <hkjolhede@gmail.com>
2016-07-21 18:07:57 +03:00
* @author Joas Schilling <coding@schilljs.com>
2015-03-26 13:44:34 +03:00
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
2016-05-26 20:56:05 +03:00
* @author Lukas Reschke <lukas@statuscode.ch>
2015-10-05 21:54:56 +03:00
* @author Martin Mattel <martin.mattel@diemattels.at>
2015-03-26 13:44:34 +03:00
* @author Michael Gapczynski <GapczynskiM@gmail.com>
* @author Morris Jobke <hey@morrisjobke.de>
2016-07-21 19:13:36 +03:00
* @author Robin Appelman <robin@icewind.nl>
2016-01-12 17:02:16 +03:00
* @author Robin McCorkell <robin@mccorkell.me.uk>
2016-07-21 18:07:57 +03:00
* @author Roeland Jago Douma <roeland@famdouma.nl>
2015-03-26 13:44:34 +03:00
* @author Sam Tuke <mail@samtuke.com>
* @author scambra <sergio@entrecables.com>
2016-05-26 20:56:05 +03:00
* @author Stefan Weil <sw@weilnetz.de>
2015-03-26 13:44:34 +03:00
* @author Thomas Müller <thomas.mueller@tmit.eu>
* @author Vincent Petry <pvince81@owncloud.com>
* @author Vinicius Cubas Brand <vinicius@eita.org.br>
2015-03-26 13:44:34 +03:00
*
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
2012-09-07 20:30:48 +04:00
*/
2012-09-07 20:30:48 +04:00
namespace OC\Files\Storage;
use OC\Files\Cache\Cache;
use OC\Files\Cache\Propagator;
use OC\Files\Cache\Scanner;
2015-11-25 15:53:31 +03:00
use OC\Files\Cache\Updater;
2014-05-23 14:46:12 +04:00
use OC\Files\Filesystem;
use OC\Files\Cache\Watcher;
use OCP\Files\EmptyFileNameException;
use OCP\Files\FileNameTooLongException;
use OCP\Files\InvalidCharacterInPathException;
use OCP\Files\InvalidDirectoryException;
use OCP\Files\InvalidPathException;
use OCP\Files\ReservedWordException;
use OCP\Files\Storage\ILockingStorage;
use OCP\Files\Storage\IStorage;
use OCP\ILogger;
2015-05-04 15:21:34 +03:00
use OCP\Lock\ILockingProvider;
use OCP\Lock\LockedException;
/**
2012-08-29 10:38:33 +04:00
* Storage backend class for providing common filesystem operation methods
* which are not storage-backend specific.
*
2012-09-07 20:30:48 +04:00
* \OC\Files\Storage\Common is never used directly; it is extended by all other
2012-08-29 10:38:33 +04:00
* storage backends, where its methods may be overridden, and additional
* (backend-specific) methods are defined.
*
2012-09-07 20:30:48 +04:00
* Some \OC\Files\Storage\Common methods call functions which are first defined
* in classes which extend it, e.g. $this->stat() .
*/
abstract class Common implements Storage, ILockingStorage {
2015-04-02 15:44:25 +03:00
use LocalTempFileTrait;
protected $cache;
protected $scanner;
protected $watcher;
protected $propagator;
protected $storageCache;
2015-11-25 15:53:31 +03:00
protected $updater;
2015-03-05 19:22:48 +03:00
protected $mountOptions = [];
2016-02-18 12:12:23 +03:00
protected $owner = null;
2015-03-05 19:22:48 +03:00
private $shouldLogLocks = null;
private $logger;
2013-02-26 05:51:57 +04:00
public function __construct($parameters) {
}
2014-05-23 14:46:12 +04:00
/**
* Remove a file or folder
2014-05-23 14:46:12 +04:00
*
* @param string $path
* @return bool
*/
protected function remove($path) {
if ($this->is_dir($path)) {
return $this->rmdir($path);
} else if ($this->is_file($path)) {
2014-05-23 14:46:12 +04:00
return $this->unlink($path);
} else {
return false;
}
}
2012-09-07 17:22:01 +04:00
public function is_dir($path) {
2014-10-01 15:14:08 +04:00
return $this->filetype($path) === 'dir';
}
2013-02-26 05:51:57 +04:00
2012-09-07 17:22:01 +04:00
public function is_file($path) {
2014-10-01 15:14:08 +04:00
return $this->filetype($path) === 'file';
}
2013-02-26 05:51:57 +04:00
public function filesize($path) {
2013-02-26 05:51:57 +04:00
if ($this->is_dir($path)) {
return 0; //by definition
} else {
$stat = $this->stat($path);
if (isset($stat['size'])) {
return $stat['size'];
} else {
return 0;
}
}
}
2013-02-26 05:51:57 +04:00
public function isReadable($path) {
// at least check whether it exists
// subclasses might want to implement this more thoroughly
return $this->file_exists($path);
}
public function isUpdatable($path) {
// at least check whether it exists
// subclasses might want to implement this more thoroughly
// a non-existing file/folder isn't updatable
return $this->file_exists($path);
}
public function isCreatable($path) {
2012-12-27 00:36:50 +04:00
if ($this->is_dir($path) && $this->isUpdatable($path)) {
return true;
}
return false;
}
2013-02-26 05:51:57 +04:00
public function isDeletable($path) {
if ($path === '' || $path === '/') {
return false;
}
$parent = dirname($path);
2014-09-17 13:36:08 +04:00
return $this->isUpdatable($parent) && $this->isUpdatable($path);
}
2013-02-26 05:51:57 +04:00
public function isSharable($path) {
return $this->isReadable($path);
}
2013-02-26 05:51:57 +04:00
public function getPermissions($path) {
$permissions = 0;
2013-02-26 05:51:57 +04:00
if ($this->isCreatable($path)) {
$permissions |= \OCP\Constants::PERMISSION_CREATE;
}
2013-02-26 05:51:57 +04:00
if ($this->isReadable($path)) {
$permissions |= \OCP\Constants::PERMISSION_READ;
}
2013-02-26 05:51:57 +04:00
if ($this->isUpdatable($path)) {
$permissions |= \OCP\Constants::PERMISSION_UPDATE;
}
2013-02-26 05:51:57 +04:00
if ($this->isDeletable($path)) {
$permissions |= \OCP\Constants::PERMISSION_DELETE;
}
2013-02-26 05:51:57 +04:00
if ($this->isSharable($path)) {
$permissions |= \OCP\Constants::PERMISSION_SHARE;
}
return $permissions;
}
2013-02-26 05:51:57 +04:00
public function filemtime($path) {
$stat = $this->stat($path);
if (isset($stat['mtime']) && $stat['mtime'] > 0) {
return $stat['mtime'];
} else {
return 0;
}
}
2013-02-26 05:51:57 +04:00
public function file_get_contents($path) {
$handle = $this->fopen($path, "r");
2013-02-26 05:51:57 +04:00
if (!$handle) {
return false;
}
$data = stream_get_contents($handle);
fclose($handle);
return $data;
}
2013-02-26 05:51:57 +04:00
public function file_put_contents($path, $data) {
$handle = $this->fopen($path, "w");
$this->removeCachedFile($path);
$count = fwrite($handle, $data);
fclose($handle);
return $count;
}
2013-02-26 05:51:57 +04:00
public function rename($path1, $path2) {
2014-05-23 14:46:12 +04:00
$this->remove($path2);
$this->removeCachedFile($path1);
2014-05-23 14:46:12 +04:00
return $this->copy($path1, $path2) and $this->remove($path1);
}
2013-02-26 05:51:57 +04:00
public function copy($path1, $path2) {
if ($this->is_dir($path1)) {
2014-05-23 14:46:12 +04:00
$this->remove($path2);
$dir = $this->opendir($path1);
$this->mkdir($path2);
while ($file = readdir($dir)) {
2014-05-23 14:46:12 +04:00
if (!Filesystem::isIgnoredDir($file)) {
if (!$this->copy($path1 . '/' . $file, $path2 . '/' . $file)) {
return false;
}
}
}
closedir($dir);
return true;
} else {
$source = $this->fopen($path1, 'r');
$target = $this->fopen($path2, 'w');
list(, $result) = \OC_Helper::streamCopy($source, $target);
if (!$result) {
\OC::$server->getLogger()->warning("Failed to write data while copying $path1 to $path2");
}
$this->removeCachedFile($path2);
return $result;
}
}
2012-09-07 17:22:01 +04:00
public function getMimeType($path) {
2013-02-26 05:51:57 +04:00
if ($this->is_dir($path)) {
return 'httpd/unix-directory';
} elseif ($this->file_exists($path)) {
return \OC::$server->getMimeTypeDetector()->detectPath($path);
2013-02-26 05:51:57 +04:00
} else {
return false;
}
}
2013-02-26 05:51:57 +04:00
public function hash($type, $path, $raw = false) {
2014-03-20 19:45:24 +04:00
$fh = $this->fopen($path, 'rb');
$ctx = hash_init($type);
hash_update_stream($ctx, $fh);
fclose($fh);
return hash_final($ctx, $raw);
}
2013-02-26 05:51:57 +04:00
2012-09-07 17:22:01 +04:00
public function search($query) {
return $this->searchInDir($query);
}
2013-02-26 05:51:57 +04:00
2012-09-07 17:22:01 +04:00
public function getLocalFile($path) {
return $this->getCachedFile($path);
}
2013-02-26 05:51:57 +04:00
/**
* @param string $path
* @param string $target
*/
private function addLocalFolder($path, $target) {
$dh = $this->opendir($path);
if (is_resource($dh)) {
while (($file = readdir($dh)) !== false) {
if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
2013-02-26 05:51:57 +04:00
if ($this->is_dir($path . '/' . $file)) {
mkdir($target . '/' . $file);
$this->addLocalFolder($path . '/' . $file, $target . '/' . $file);
} else {
$tmp = $this->toTmpFile($path . '/' . $file);
rename($tmp, $target . '/' . $file);
2012-08-19 04:30:33 +04:00
}
}
}
}
}
/**
* @param string $query
2015-05-22 01:17:38 +03:00
* @param string $dir
* @return array
*/
2013-02-26 05:51:57 +04:00
protected function searchInDir($query, $dir = '') {
$files = array();
$dh = $this->opendir($dir);
if (is_resource($dh)) {
while (($item = readdir($dh)) !== false) {
if (\OC\Files\Filesystem::isIgnoredDir($item)) continue;
2013-02-26 05:51:57 +04:00
if (strstr(strtolower($item), strtolower($query)) !== false) {
$files[] = $dir . '/' . $item;
}
2013-02-26 05:51:57 +04:00
if ($this->is_dir($dir . '/' . $item)) {
$files = array_merge($files, $this->searchInDir($query, $dir . '/' . $item));
}
}
}
2014-12-11 14:58:22 +03:00
closedir($dh);
return $files;
}
2012-06-15 18:43:24 +04:00
/**
* check if a file or folder has been updated since $time
2013-02-26 05:51:57 +04:00
*
* The method is only used to check if the cache needs to be updated. Storage backends that don't support checking
* the mtime should always return false here. As a result storage implementations that always return false expect
* exclusive access to the backend and will not pick up files that have been added in a way that circumvents
* ownClouds filesystem.
*
2012-10-23 18:16:46 +04:00
* @param string $path
2012-06-15 18:43:24 +04:00
* @param int $time
* @return bool
*/
public function hasUpdated($path, $time) {
2013-02-26 05:51:57 +04:00
return $this->filemtime($path) > $time;
2012-06-15 18:43:24 +04:00
}
2012-07-06 14:22:21 +04:00
public function getCache($path = '', $storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($storage->cache)) {
$storage->cache = new Cache($storage);
}
return $storage->cache;
}
public function getScanner($path = '', $storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($storage->scanner)) {
$storage->scanner = new Scanner($storage);
}
return $storage->scanner;
}
2012-10-23 18:16:46 +04:00
public function getWatcher($path = '', $storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($this->watcher)) {
$this->watcher = new Watcher($storage);
$globalPolicy = \OC::$server->getConfig()->getSystemValue('filesystem_check_changes', Watcher::CHECK_NEVER);
$this->watcher->setPolicy((int)$this->getMountOption('filesystem_check_changes', $globalPolicy));
}
return $this->watcher;
}
/**
* get a propagator instance for the cache
*
* @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher
* @return \OC\Files\Cache\Propagator
*/
public function getPropagator($storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($storage->propagator)) {
2016-02-25 15:14:20 +03:00
$storage->propagator = new Propagator($storage, \OC::$server->getDatabaseConnection());
}
return $storage->propagator;
}
2015-11-25 15:53:31 +03:00
public function getUpdater($storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($storage->updater)) {
$storage->updater = new Updater($storage);
2015-11-25 15:53:31 +03:00
}
return $storage->updater;
2015-11-25 15:53:31 +03:00
}
public function getStorageCache($storage = null) {
if (!$storage) {
$storage = $this;
}
if (!isset($this->storageCache)) {
2015-03-26 21:24:49 +03:00
$this->storageCache = new \OC\Files\Cache\Storage($storage);
}
return $this->storageCache;
}
2012-07-06 14:22:21 +04:00
/**
* get the owner of a path
2013-02-26 05:51:57 +04:00
*
2012-10-23 18:16:46 +04:00
* @param string $path The path to get the owner
2015-01-16 21:31:15 +03:00
* @return string|false uid or false
2012-07-06 14:22:21 +04:00
*/
public function getOwner($path) {
2016-02-18 12:12:23 +03:00
if ($this->owner === null) {
$this->owner = \OC_User::getUser();
2016-02-17 21:14:46 +03:00
}
2016-02-18 12:12:23 +03:00
return $this->owner;
2012-07-06 14:22:21 +04:00
}
/**
* get the ETag for a file or folder
*
* @param string $path
* @return string
*/
2013-02-26 05:51:57 +04:00
public function getETag($path) {
return uniqid();
2012-07-06 14:22:21 +04:00
}
2013-02-22 20:21:57 +04:00
/**
* clean a path, i.e. remove all redundant '.' and '..'
* making sure that it can't point to higher than '/'
2013-02-26 05:51:57 +04:00
*
* @param string $path The path to clean
* @return string cleaned path
*/
public function cleanPath($path) {
if (strlen($path) == 0 or $path[0] != '/') {
$path = '/' . $path;
}
2013-02-22 20:21:57 +04:00
$output = array();
foreach (explode('/', $path) as $chunk) {
if ($chunk == '..') {
array_pop($output);
} else if ($chunk == '.') {
} else {
$output[] = $chunk;
}
}
return implode('/', $output);
}
/**
* Test a storage for availability
*
* @return bool
*/
public function test() {
try {
if ($this->stat('')) {
return true;
}
\OC::$server->getLogger()->info("External storage not available: stat() failed");
return false;
} catch (\Exception $e) {
\OC::$server->getLogger()->info("External storage not available: " . $e->getMessage());
\OC::$server->getLogger()->logException($e, ['level' => ILogger::DEBUG]);
return false;
}
}
/**
* get the free space in the storage
2013-02-26 05:51:57 +04:00
*
* @param string $path
2015-01-16 21:31:15 +03:00
* @return int|false
*/
2013-02-26 05:51:57 +04:00
public function free_space($path) {
2014-08-19 16:05:08 +04:00
return \OCP\Files\FileInfo::SPACE_UNKNOWN;
}
/**
* {@inheritdoc}
*/
public function isLocal() {
// the common implementation returns a temporary file by
// default, which is not local
return false;
}
/**
* Check if the storage is an instance of $class or is a wrapper for a storage that is an instance of $class
*
* @param string $class
* @return bool
*/
public function instanceOfStorage($class) {
if (ltrim($class, '\\') === 'OC\Files\Storage\Shared') {
// FIXME Temporary fix to keep existing checks working
$class = '\OCA\Files_Sharing\SharedStorage';
}
return is_a($this, $class);
}
/**
* A custom storage implementation can return an url for direct download of a give file.
*
* For now the returned array can hold the parameter url - in future more attributes might follow.
*
* @param string $path
2015-01-16 21:31:15 +03:00
* @return array|false
*/
public function getDirectDownload($path) {
return [];
}
/**
* @inheritdoc
* @throws InvalidPathException
*/
public function verifyPath($path, $fileName) {
// verify empty and dot files
$trimmed = trim($fileName);
if ($trimmed === '') {
throw new EmptyFileNameException();
}
if (\OC\Files\Filesystem::isIgnoredDir($trimmed)) {
throw new InvalidDirectoryException();
}
if (!\OC::$server->getDatabaseConnection()->supports4ByteText()) {
// verify database - e.g. mysql only 3-byte chars
if (preg_match('%(?:
\xF0[\x90-\xBF][\x80-\xBF]{2} # planes 1-3
| [\xF1-\xF3][\x80-\xBF]{3} # planes 4-15
| \xF4[\x80-\x8F][\x80-\xBF]{2} # plane 16
)%xs', $fileName)) {
throw new InvalidCharacterInPathException();
}
}
if (isset($fileName[255])) {
throw new FileNameTooLongException();
}
// NOTE: $path will remain unverified for now
$this->verifyPosixPath($fileName);
}
/**
* @param string $fileName
* @throws InvalidPathException
*/
2015-02-24 19:20:59 +03:00
protected function verifyPosixPath($fileName) {
$fileName = trim($fileName);
$this->scanForInvalidCharacters($fileName, "\\/");
$reservedNames = ['*'];
if (in_array($fileName, $reservedNames)) {
throw new ReservedWordException();
}
}
/**
2015-02-20 20:19:14 +03:00
* @param string $fileName
* @param string $invalidChars
* @throws InvalidPathException
*/
private function scanForInvalidCharacters($fileName, $invalidChars) {
foreach (str_split($invalidChars) as $char) {
2015-02-20 20:19:14 +03:00
if (strpos($fileName, $char) !== false) {
throw new InvalidCharacterInPathException();
}
}
2015-02-20 20:19:14 +03:00
$sanitizedFileName = filter_var($fileName, FILTER_UNSAFE_RAW, FILTER_FLAG_STRIP_LOW);
if ($sanitizedFileName !== $fileName) {
throw new InvalidCharacterInPathException();
2015-02-20 20:19:14 +03:00
}
}
2015-03-05 19:22:48 +03:00
/**
* @param array $options
*/
public function setMountOptions(array $options) {
$this->mountOptions = $options;
}
/**
* @param string $name
* @param mixed $default
* @return mixed
*/
public function getMountOption($name, $default = null) {
return isset($this->mountOptions[$name]) ? $this->mountOptions[$name] : $default;
}
/**
* @param IStorage $sourceStorage
* @param string $sourceInternalPath
* @param string $targetInternalPath
* @param bool $preserveMtime
* @return bool
*/
public function copyFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false) {
if ($sourceStorage === $this) {
return $this->copy($sourceInternalPath, $targetInternalPath);
}
if ($sourceStorage->is_dir($sourceInternalPath)) {
$dh = $sourceStorage->opendir($sourceInternalPath);
$result = $this->mkdir($targetInternalPath);
if (is_resource($dh)) {
while ($result and ($file = readdir($dh)) !== false) {
if (!Filesystem::isIgnoredDir($file)) {
$result &= $this->copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file);
}
}
}
} else {
$source = $sourceStorage->fopen($sourceInternalPath, 'r');
// TODO: call fopen in a way that we execute again all storage wrappers
// to avoid that we bypass storage wrappers which perform important actions
// for this operation. Same is true for all other operations which
// are not the same as the original one.Once this is fixed we also
// need to adjust the encryption wrapper.
$target = $this->fopen($targetInternalPath, 'w');
list(, $result) = \OC_Helper::streamCopy($source, $target);
if ($result and $preserveMtime) {
$this->touch($targetInternalPath, $sourceStorage->filemtime($sourceInternalPath));
}
fclose($source);
fclose($target);
if (!$result) {
// delete partially written target file
$this->unlink($targetInternalPath);
// delete cache entry that was created by fopen
$this->getCache()->remove($targetInternalPath);
}
}
return (bool)$result;
}
/**
* @param IStorage $sourceStorage
* @param string $sourceInternalPath
* @param string $targetInternalPath
* @return bool
*/
public function moveFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath) {
if ($sourceStorage === $this) {
return $this->rename($sourceInternalPath, $targetInternalPath);
}
if (!$sourceStorage->isDeletable($sourceInternalPath)) {
return false;
}
$result = $this->copyFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, true);
if ($result) {
if ($sourceStorage->is_dir($sourceInternalPath)) {
$result &= $sourceStorage->rmdir($sourceInternalPath);
} else {
$result &= $sourceStorage->unlink($sourceInternalPath);
}
}
return $result;
}
/**
* @inheritdoc
*/
public function getMetaData($path) {
$permissions = $this->getPermissions($path);
if (!$permissions & \OCP\Constants::PERMISSION_READ) {
//can't read, nothing we can do
return null;
}
$data = [];
$data['mimetype'] = $this->getMimeType($path);
$data['mtime'] = $this->filemtime($path);
if ($data['mtime'] === false) {
$data['mtime'] = time();
}
if ($data['mimetype'] == 'httpd/unix-directory') {
$data['size'] = -1; //unknown
} else {
$data['size'] = $this->filesize($path);
}
$data['etag'] = $this->getETag($path);
$data['storage_mtime'] = $data['mtime'];
$data['permissions'] = $permissions;
return $data;
}
2015-05-04 15:21:34 +03:00
/**
* @param string $path
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
* @param \OCP\Lock\ILockingProvider $provider
* @throws \OCP\Lock\LockedException
*/
public function acquireLock($path, $type, ILockingProvider $provider) {
$logger = $this->getLockLogger();
if ($logger) {
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
$logger->info(
sprintf(
'acquire %s lock on "%s" on storage "%s"',
$typeString,
$path,
$this->getId()
),
[
'app' => 'locking',
]
);
}
try {
$provider->acquireLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
} catch (LockedException $e) {
if ($logger) {
$logger->logException($e);
}
throw $e;
}
2015-05-04 15:21:34 +03:00
}
/**
* @param string $path
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
* @param \OCP\Lock\ILockingProvider $provider
* @throws \OCP\Lock\LockedException
2015-05-04 15:21:34 +03:00
*/
public function releaseLock($path, $type, ILockingProvider $provider) {
$logger = $this->getLockLogger();
if ($logger) {
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
$logger->info(
sprintf(
'release %s lock on "%s" on storage "%s"',
$typeString,
$path,
$this->getId()
),
[
'app' => 'locking',
]
);
}
try {
$provider->releaseLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
} catch (LockedException $e) {
if ($logger) {
$logger->logException($e);
}
throw $e;
}
2015-05-04 15:21:34 +03:00
}
2015-05-29 15:40:06 +03:00
/**
* @param string $path
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
* @param \OCP\Lock\ILockingProvider $provider
* @throws \OCP\Lock\LockedException
2015-05-29 15:40:06 +03:00
*/
public function changeLock($path, $type, ILockingProvider $provider) {
$logger = $this->getLockLogger();
if ($logger) {
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
$logger->info(
sprintf(
'change lock on "%s" to %s on storage "%s"',
$path,
$typeString,
$this->getId()
),
[
'app' => 'locking',
]
);
}
try {
$provider->changeLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
} catch (LockedException $e) {
\OC::$server->getLogger()->logException($e);
throw $e;
}
}
private function getLockLogger() {
if (is_null($this->shouldLogLocks)) {
$this->shouldLogLocks = \OC::$server->getConfig()->getSystemValue('filelocking.debug', false);
$this->logger = $this->shouldLogLocks ? \OC::$server->getLogger() : null;
}
return $this->logger;
2015-05-29 15:40:06 +03:00
}
/**
* @return array [ available, last_checked ]
*/
public function getAvailability() {
return $this->getStorageCache()->getAvailability();
}
/**
* @param bool $isAvailable
*/
public function setAvailability($isAvailable) {
$this->getStorageCache()->setAvailability($isAvailable);
}
/**
* @return bool
*/
public function needsPartFile() {
return true;
}
}