2013-10-23 18:03:57 +04:00
|
|
|
<?php
|
2015-02-26 13:37:37 +03:00
|
|
|
/**
|
2015-06-25 12:43:55 +03:00
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2015-06-25 12:43:55 +03:00
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
|
|
|
* @author Roeland Jago Douma <rullzer@owncloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
2016-01-12 17:02:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-02-26 13:37:37 +03:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
namespace OCA\DAV\Connector\Sabre;
|
2015-02-12 14:29:01 +03:00
|
|
|
|
2016-03-21 14:27:13 +03:00
|
|
|
use OC\Files\View;
|
|
|
|
use Sabre\DAV\Exception\Forbidden;
|
2016-02-28 21:41:46 +03:00
|
|
|
use Sabre\DAV\Exception\NotFound;
|
2015-02-25 13:45:44 +03:00
|
|
|
use Sabre\DAV\IFile;
|
2015-02-12 14:29:01 +03:00
|
|
|
use \Sabre\DAV\PropFind;
|
|
|
|
use \Sabre\DAV\PropPatch;
|
2016-03-21 14:27:13 +03:00
|
|
|
use Sabre\DAV\Tree;
|
2015-02-12 14:29:01 +03:00
|
|
|
use \Sabre\HTTP\RequestInterface;
|
|
|
|
use \Sabre\HTTP\ResponseInterface;
|
2015-12-09 19:31:14 +03:00
|
|
|
use OCP\Files\StorageNotAvailableException;
|
2015-02-12 14:29:01 +03:00
|
|
|
|
|
|
|
class FilesPlugin extends \Sabre\DAV\ServerPlugin {
|
2013-10-23 18:03:57 +04:00
|
|
|
|
|
|
|
// namespace
|
2013-10-24 16:40:43 +04:00
|
|
|
const NS_OWNCLOUD = 'http://owncloud.org/ns';
|
2015-02-12 14:29:01 +03:00
|
|
|
const FILEID_PROPERTYNAME = '{http://owncloud.org/ns}id';
|
2015-11-18 13:41:04 +03:00
|
|
|
const INTERNAL_FILEID_PROPERTYNAME = '{http://owncloud.org/ns}fileid';
|
2015-02-12 14:29:01 +03:00
|
|
|
const PERMISSIONS_PROPERTYNAME = '{http://owncloud.org/ns}permissions';
|
2016-03-03 22:58:18 +03:00
|
|
|
const SHARE_PERMISSIONS_PROPERTYNAME = '{http://owncloud.org/ns}share-permissions';
|
2015-02-12 14:29:01 +03:00
|
|
|
const DOWNLOADURL_PROPERTYNAME = '{http://owncloud.org/ns}downloadURL';
|
|
|
|
const SIZE_PROPERTYNAME = '{http://owncloud.org/ns}size';
|
|
|
|
const GETETAG_PROPERTYNAME = '{DAV:}getetag';
|
2015-10-13 13:51:21 +03:00
|
|
|
const LASTMODIFIED_PROPERTYNAME = '{DAV:}lastmodified';
|
2015-11-02 17:05:16 +03:00
|
|
|
const OWNER_ID_PROPERTYNAME = '{http://owncloud.org/ns}owner-id';
|
|
|
|
const OWNER_DISPLAY_NAME_PROPERTYNAME = '{http://owncloud.org/ns}owner-display-name';
|
2016-02-08 13:55:07 +03:00
|
|
|
const CHECKSUMS_PROPERTYNAME = '{http://owncloud.org/ns}checksums';
|
2013-10-23 18:03:57 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Reference to main server object
|
|
|
|
*
|
2014-01-09 17:25:48 +04:00
|
|
|
* @var \Sabre\DAV\Server
|
2013-10-23 18:03:57 +04:00
|
|
|
*/
|
|
|
|
private $server;
|
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
/**
|
2016-03-21 14:27:13 +03:00
|
|
|
* @var Tree
|
2015-02-12 14:29:01 +03:00
|
|
|
*/
|
|
|
|
private $tree;
|
|
|
|
|
2015-07-13 15:20:35 +03:00
|
|
|
/**
|
|
|
|
* Whether this is public webdav.
|
|
|
|
* If true, some returned information will be stripped off.
|
|
|
|
*
|
|
|
|
* @var bool
|
|
|
|
*/
|
|
|
|
private $isPublic;
|
|
|
|
|
2015-10-06 16:36:54 +03:00
|
|
|
/**
|
2016-03-21 14:27:13 +03:00
|
|
|
* @var View
|
2015-10-06 16:36:54 +03:00
|
|
|
*/
|
|
|
|
private $fileView;
|
|
|
|
|
2015-02-25 13:45:44 +03:00
|
|
|
/**
|
2016-03-21 14:27:13 +03:00
|
|
|
* @var bool
|
|
|
|
*/
|
|
|
|
private $downloadAttachment;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param Tree $tree
|
|
|
|
* @param View $view
|
2015-10-06 16:36:54 +03:00
|
|
|
* @param bool $isPublic
|
2016-03-21 14:27:13 +03:00
|
|
|
* @param bool $downloadAttachment
|
2015-02-25 13:45:44 +03:00
|
|
|
*/
|
2016-03-21 14:27:13 +03:00
|
|
|
public function __construct(Tree $tree,
|
|
|
|
View $view,
|
|
|
|
$isPublic = false,
|
|
|
|
$downloadAttachment = true) {
|
2015-02-12 14:29:01 +03:00
|
|
|
$this->tree = $tree;
|
2015-10-06 16:36:54 +03:00
|
|
|
$this->fileView = $view;
|
2015-07-13 15:20:35 +03:00
|
|
|
$this->isPublic = $isPublic;
|
2016-03-21 14:27:13 +03:00
|
|
|
$this->downloadAttachment = $downloadAttachment;
|
2015-02-12 14:29:01 +03:00
|
|
|
}
|
|
|
|
|
2013-10-23 18:03:57 +04:00
|
|
|
/**
|
|
|
|
* This initializes the plugin.
|
|
|
|
*
|
2014-01-09 17:25:48 +04:00
|
|
|
* This function is called by \Sabre\DAV\Server, after
|
2013-10-23 18:03:57 +04:00
|
|
|
* addPlugin is called.
|
|
|
|
*
|
|
|
|
* This method should set up the required event subscriptions.
|
|
|
|
*
|
2014-01-09 17:25:48 +04:00
|
|
|
* @param \Sabre\DAV\Server $server
|
2013-10-23 18:03:57 +04:00
|
|
|
* @return void
|
|
|
|
*/
|
2014-01-09 17:25:48 +04:00
|
|
|
public function initialize(\Sabre\DAV\Server $server) {
|
2013-10-23 18:03:57 +04:00
|
|
|
|
2015-12-03 17:55:10 +03:00
|
|
|
$server->xml->namespaceMap[self::NS_OWNCLOUD] = 'oc';
|
2015-02-12 14:29:01 +03:00
|
|
|
$server->protectedProperties[] = self::FILEID_PROPERTYNAME;
|
2015-11-18 13:41:04 +03:00
|
|
|
$server->protectedProperties[] = self::INTERNAL_FILEID_PROPERTYNAME;
|
2015-02-12 14:29:01 +03:00
|
|
|
$server->protectedProperties[] = self::PERMISSIONS_PROPERTYNAME;
|
2016-03-03 22:58:18 +03:00
|
|
|
$server->protectedProperties[] = self::SHARE_PERMISSIONS_PROPERTYNAME;
|
2015-02-12 14:29:01 +03:00
|
|
|
$server->protectedProperties[] = self::SIZE_PROPERTYNAME;
|
|
|
|
$server->protectedProperties[] = self::DOWNLOADURL_PROPERTYNAME;
|
2015-11-02 17:05:16 +03:00
|
|
|
$server->protectedProperties[] = self::OWNER_ID_PROPERTYNAME;
|
|
|
|
$server->protectedProperties[] = self::OWNER_DISPLAY_NAME_PROPERTYNAME;
|
2016-02-08 13:55:07 +03:00
|
|
|
$server->protectedProperties[] = self::CHECKSUMS_PROPERTYNAME;
|
2015-02-12 14:29:01 +03:00
|
|
|
|
|
|
|
// normally these cannot be changed (RFC4918), but we want them modifiable through PROPPATCH
|
2015-10-13 13:51:21 +03:00
|
|
|
$allowedProperties = ['{DAV:}getetag'];
|
2015-02-12 14:29:01 +03:00
|
|
|
$server->protectedProperties = array_diff($server->protectedProperties, $allowedProperties);
|
2013-10-23 18:03:57 +04:00
|
|
|
|
|
|
|
$this->server = $server;
|
2015-02-12 14:29:01 +03:00
|
|
|
$this->server->on('propFind', array($this, 'handleGetProperties'));
|
|
|
|
$this->server->on('propPatch', array($this, 'handleUpdateProperties'));
|
|
|
|
$this->server->on('afterBind', array($this, 'sendFileIdHeader'));
|
|
|
|
$this->server->on('afterWriteContent', array($this, 'sendFileIdHeader'));
|
2015-02-25 13:45:44 +03:00
|
|
|
$this->server->on('afterMethod:GET', [$this,'httpGet']);
|
2015-11-19 14:01:55 +03:00
|
|
|
$this->server->on('afterMethod:GET', array($this, 'handleDownloadToken'));
|
2015-05-21 18:52:13 +03:00
|
|
|
$this->server->on('afterResponse', function($request, ResponseInterface $response) {
|
|
|
|
$body = $response->getBody();
|
|
|
|
if (is_resource($body)) {
|
|
|
|
fclose($body);
|
|
|
|
}
|
|
|
|
});
|
2015-10-06 16:36:54 +03:00
|
|
|
$this->server->on('beforeMove', [$this, 'checkMove']);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Plugin that checks if a move can actually be performed.
|
|
|
|
* @param string $source source path
|
|
|
|
* @param string $destination destination path
|
2016-03-21 14:27:13 +03:00
|
|
|
* @throws Forbidden
|
2015-10-06 16:36:54 +03:00
|
|
|
*/
|
|
|
|
function checkMove($source, $destination) {
|
|
|
|
list($sourceDir,) = \Sabre\HTTP\URLUtil::splitPath($source);
|
|
|
|
list($destinationDir,) = \Sabre\HTTP\URLUtil::splitPath($destination);
|
|
|
|
|
|
|
|
if ($sourceDir !== $destinationDir) {
|
|
|
|
$sourceFileInfo = $this->fileView->getFileInfo($source);
|
|
|
|
|
2015-10-27 11:14:28 +03:00
|
|
|
if ($sourceFileInfo === false) {
|
2016-03-21 14:27:13 +03:00
|
|
|
throw new NotFound($source . ' does not exist');
|
2015-10-27 11:14:28 +03:00
|
|
|
}
|
|
|
|
|
2015-10-06 16:36:54 +03:00
|
|
|
if (!$sourceFileInfo->isDeletable()) {
|
2016-03-21 14:27:13 +03:00
|
|
|
throw new Forbidden($source . " cannot be deleted");
|
2015-10-06 16:36:54 +03:00
|
|
|
}
|
|
|
|
}
|
2015-02-25 13:45:44 +03:00
|
|
|
}
|
|
|
|
|
2015-11-19 14:01:55 +03:00
|
|
|
/**
|
|
|
|
* This sets a cookie to be able to recognize the start of the download
|
|
|
|
* the content must not be longer than 32 characters and must only contain
|
|
|
|
* alphanumeric characters
|
|
|
|
*
|
|
|
|
* @param RequestInterface $request
|
|
|
|
* @param ResponseInterface $response
|
|
|
|
*/
|
|
|
|
function handleDownloadToken(RequestInterface $request, ResponseInterface $response) {
|
|
|
|
$queryParams = $request->getQueryParameters();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* this sets a cookie to be able to recognize the start of the download
|
|
|
|
* the content must not be longer than 32 characters and must only contain
|
|
|
|
* alphanumeric characters
|
|
|
|
*/
|
|
|
|
if (isset($queryParams['downloadStartSecret'])) {
|
|
|
|
$token = $queryParams['downloadStartSecret'];
|
|
|
|
if (!isset($token[32])
|
|
|
|
&& preg_match('!^[a-zA-Z0-9]+$!', $token) === 1) {
|
|
|
|
// FIXME: use $response->setHeader() instead
|
|
|
|
setcookie('ocDownloadStarted', $token, time() + 20, '/');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-25 13:45:44 +03:00
|
|
|
/**
|
2016-01-29 23:50:48 +03:00
|
|
|
* Add headers to file download
|
|
|
|
*
|
2015-02-25 13:45:44 +03:00
|
|
|
* @param RequestInterface $request
|
|
|
|
* @param ResponseInterface $response
|
|
|
|
*/
|
|
|
|
function httpGet(RequestInterface $request, ResponseInterface $response) {
|
|
|
|
// Only handle valid files
|
2015-03-26 22:45:39 +03:00
|
|
|
$node = $this->tree->getNodeForPath($request->getPath());
|
2015-02-25 13:45:44 +03:00
|
|
|
if (!($node instanceof IFile)) return;
|
|
|
|
|
2016-01-29 23:50:48 +03:00
|
|
|
// adds a 'Content-Disposition: attachment' header
|
2016-03-21 14:27:13 +03:00
|
|
|
if ($this->downloadAttachment) {
|
|
|
|
$response->addHeader('Content-Disposition', 'attachment');
|
|
|
|
}
|
2016-01-29 23:50:48 +03:00
|
|
|
|
2016-02-19 12:56:43 +03:00
|
|
|
if ($node instanceof \OCA\DAV\Connector\Sabre\File) {
|
|
|
|
//Add OC-Checksum header
|
|
|
|
/** @var $node File */
|
|
|
|
$checksum = $node->getChecksum();
|
2016-02-28 21:41:46 +03:00
|
|
|
if ($checksum !== null && $checksum !== '') {
|
2016-02-19 12:56:43 +03:00
|
|
|
$response->addHeader('OC-Checksum', $checksum);
|
|
|
|
}
|
2016-01-29 23:50:48 +03:00
|
|
|
}
|
2013-10-23 18:03:57 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds all ownCloud-specific properties
|
|
|
|
*
|
2015-02-12 14:29:01 +03:00
|
|
|
* @param PropFind $propFind
|
2014-01-09 17:25:48 +04:00
|
|
|
* @param \Sabre\DAV\INode $node
|
2013-10-23 18:03:57 +04:00
|
|
|
* @return void
|
|
|
|
*/
|
2015-02-12 14:29:01 +03:00
|
|
|
public function handleGetProperties(PropFind $propFind, \Sabre\DAV\INode $node) {
|
2013-10-23 18:03:57 +04:00
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
if ($node instanceof \OCA\DAV\Connector\Sabre\Node) {
|
2013-10-23 18:03:57 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$propFind->handle(self::FILEID_PROPERTYNAME, function() use ($node) {
|
|
|
|
return $node->getFileId();
|
|
|
|
});
|
2013-10-23 18:03:57 +04:00
|
|
|
|
2015-11-18 13:41:04 +03:00
|
|
|
$propFind->handle(self::INTERNAL_FILEID_PROPERTYNAME, function() use ($node) {
|
|
|
|
return $node->getInternalFileId();
|
|
|
|
});
|
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$propFind->handle(self::PERMISSIONS_PROPERTYNAME, function() use ($node) {
|
2015-07-13 15:20:35 +03:00
|
|
|
$perms = $node->getDavPermissions();
|
|
|
|
if ($this->isPublic) {
|
|
|
|
// remove mount information
|
|
|
|
$perms = str_replace(['S', 'M'], '', $perms);
|
|
|
|
}
|
|
|
|
return $perms;
|
2015-02-12 14:29:01 +03:00
|
|
|
});
|
2014-05-02 19:37:16 +04:00
|
|
|
|
2016-03-03 22:58:18 +03:00
|
|
|
$propFind->handle(self::SHARE_PERMISSIONS_PROPERTYNAME, function() use ($node) {
|
|
|
|
return $node->getSharePermissions();
|
|
|
|
});
|
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$propFind->handle(self::GETETAG_PROPERTYNAME, function() use ($node) {
|
2016-03-21 14:27:13 +03:00
|
|
|
return $node->getETag();
|
2015-02-12 14:29:01 +03:00
|
|
|
});
|
2016-03-10 22:53:56 +03:00
|
|
|
|
|
|
|
$propFind->handle(self::OWNER_ID_PROPERTYNAME, function() use ($node) {
|
|
|
|
$owner = $node->getOwner();
|
|
|
|
return $owner->getUID();
|
|
|
|
});
|
|
|
|
$propFind->handle(self::OWNER_DISPLAY_NAME_PROPERTYNAME, function() use ($node) {
|
|
|
|
$owner = $node->getOwner();
|
|
|
|
$displayName = $owner->getDisplayName();
|
|
|
|
return $displayName;
|
|
|
|
});
|
2013-10-23 18:03:57 +04:00
|
|
|
}
|
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
if ($node instanceof \OCA\DAV\Connector\Sabre\File) {
|
2015-02-12 14:29:01 +03:00
|
|
|
$propFind->handle(self::DOWNLOADURL_PROPERTYNAME, function() use ($node) {
|
2015-08-30 20:13:01 +03:00
|
|
|
/** @var $node \OCA\DAV\Connector\Sabre\File */
|
2015-12-09 19:31:14 +03:00
|
|
|
try {
|
|
|
|
$directDownloadUrl = $node->getDirectDownload();
|
|
|
|
if (isset($directDownloadUrl['url'])) {
|
|
|
|
return $directDownloadUrl['url'];
|
|
|
|
}
|
|
|
|
} catch (StorageNotAvailableException $e) {
|
|
|
|
return false;
|
2015-02-12 14:29:01 +03:00
|
|
|
}
|
|
|
|
return false;
|
|
|
|
});
|
2016-01-29 23:50:48 +03:00
|
|
|
|
2016-02-08 13:55:07 +03:00
|
|
|
$propFind->handle(self::CHECKSUMS_PROPERTYNAME, function() use ($node) {
|
2016-01-29 23:50:48 +03:00
|
|
|
$checksum = $node->getChecksum();
|
2016-02-28 21:41:46 +03:00
|
|
|
if ($checksum === NULL || $checksum === '') {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2016-02-08 13:55:07 +03:00
|
|
|
return new ChecksumList($checksum);
|
2016-01-29 23:50:48 +03:00
|
|
|
});
|
|
|
|
|
2014-12-15 17:20:24 +03:00
|
|
|
}
|
|
|
|
|
2015-08-30 20:13:01 +03:00
|
|
|
if ($node instanceof \OCA\DAV\Connector\Sabre\Directory) {
|
2015-02-12 14:29:01 +03:00
|
|
|
$propFind->handle(self::SIZE_PROPERTYNAME, function() use ($node) {
|
|
|
|
return $node->getSize();
|
|
|
|
});
|
2014-08-29 13:39:02 +04:00
|
|
|
}
|
2013-10-23 18:03:57 +04:00
|
|
|
}
|
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
/**
|
|
|
|
* Update ownCloud-specific properties
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param PropPatch $propPatch
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
public function handleUpdateProperties($path, PropPatch $propPatch) {
|
2015-10-13 13:51:21 +03:00
|
|
|
$propPatch->handle(self::LASTMODIFIED_PROPERTYNAME, function($time) use ($path) {
|
2015-02-12 14:29:01 +03:00
|
|
|
if (empty($time)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$node = $this->tree->getNodeForPath($path);
|
|
|
|
if (is_null($node)) {
|
|
|
|
return 404;
|
|
|
|
}
|
|
|
|
$node->touch($time);
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
$propPatch->handle(self::GETETAG_PROPERTYNAME, function($etag) use ($path) {
|
|
|
|
if (empty($etag)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$node = $this->tree->getNodeForPath($path);
|
|
|
|
if (is_null($node)) {
|
|
|
|
return 404;
|
|
|
|
}
|
|
|
|
if ($node->setEtag($etag) !== -1) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2013-10-25 15:20:59 +04:00
|
|
|
/**
|
2014-05-12 00:51:30 +04:00
|
|
|
* @param string $filePath
|
2014-01-09 17:25:48 +04:00
|
|
|
* @param \Sabre\DAV\INode $node
|
|
|
|
* @throws \Sabre\DAV\Exception\BadRequest
|
2013-10-25 15:20:59 +04:00
|
|
|
*/
|
2014-01-09 17:25:48 +04:00
|
|
|
public function sendFileIdHeader($filePath, \Sabre\DAV\INode $node = null) {
|
2013-11-25 18:35:26 +04:00
|
|
|
// chunked upload handling
|
|
|
|
if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
|
2015-02-12 14:29:01 +03:00
|
|
|
list($path, $name) = \Sabre\HTTP\URLUtil::splitPath($filePath);
|
|
|
|
$info = \OC_FileChunking::decodeName($name);
|
2013-11-25 18:35:26 +04:00
|
|
|
if (!empty($info)) {
|
|
|
|
$filePath = $path . '/' . $info['name'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-20 19:14:08 +04:00
|
|
|
// we get the node for the given $filePath here because in case of afterCreateFile $node is the parent folder
|
2013-11-25 18:35:26 +04:00
|
|
|
if (!$this->server->tree->nodeExists($filePath)) {
|
|
|
|
return;
|
|
|
|
}
|
2013-11-20 19:14:08 +04:00
|
|
|
$node = $this->server->tree->getNodeForPath($filePath);
|
2015-08-30 20:13:01 +03:00
|
|
|
if ($node instanceof \OCA\DAV\Connector\Sabre\Node) {
|
2013-10-25 15:20:59 +04:00
|
|
|
$fileId = $node->getFileId();
|
|
|
|
if (!is_null($fileId)) {
|
|
|
|
$this->server->httpResponse->setHeader('OC-FileId', $fileId);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-23 18:03:57 +04:00
|
|
|
}
|