2013-09-24 17:44:02 +04:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Copyright (c) 2013 Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*/
|
|
|
|
|
2015-02-18 20:28:24 +03:00
|
|
|
namespace Test\Connector\Sabre;
|
|
|
|
|
2015-05-12 20:08:04 +03:00
|
|
|
use Test\HookHelper;
|
|
|
|
use OC\Files\Filesystem;
|
2015-06-26 11:38:59 +03:00
|
|
|
use OCP\Lock\ILockingProvider;
|
2015-05-12 20:08:04 +03:00
|
|
|
|
2015-02-18 20:28:24 +03:00
|
|
|
class File extends \Test\TestCase {
|
2013-09-24 17:44:02 +04:00
|
|
|
|
2015-05-12 20:08:04 +03:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $user;
|
|
|
|
|
|
|
|
public function setUp() {
|
|
|
|
parent::setUp();
|
|
|
|
|
|
|
|
\OC_Hook::clear();
|
|
|
|
|
|
|
|
$this->user = $this->getUniqueID('user_');
|
|
|
|
$userManager = \OC::$server->getUserManager();
|
|
|
|
$userManager->createUser($this->user, 'pass');
|
|
|
|
|
|
|
|
$this->loginAsUser($this->user);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function tearDown() {
|
|
|
|
$userManager = \OC::$server->getUserManager();
|
|
|
|
$userManager->get($this->user)->delete();
|
2015-06-26 11:38:59 +03:00
|
|
|
unset($_SERVER['HTTP_OC_CHUNKED']);
|
2015-05-12 20:08:04 +03:00
|
|
|
|
|
|
|
parent::tearDown();
|
|
|
|
}
|
|
|
|
|
2015-04-14 16:25:52 +03:00
|
|
|
private function getStream($string) {
|
|
|
|
$stream = fopen('php://temp', 'r+');
|
|
|
|
fwrite($stream, $string);
|
|
|
|
fseek($stream, 0);
|
|
|
|
return $stream;
|
|
|
|
}
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
|
|
|
|
public function fopenFailuresProvider() {
|
|
|
|
return [
|
|
|
|
[
|
|
|
|
// return false
|
|
|
|
null,
|
|
|
|
'\Sabre\Dav\Exception',
|
|
|
|
false
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\NotPermittedException(),
|
|
|
|
'Sabre\DAV\Exception\Forbidden'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\EntityTooLargeException(),
|
|
|
|
'OC\Connector\Sabre\Exception\EntityTooLarge'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\InvalidContentException(),
|
|
|
|
'OC\Connector\Sabre\Exception\UnsupportedMediaType'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\InvalidPathException(),
|
|
|
|
'Sabre\DAV\Exception\Forbidden'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\LockNotAcquiredException('/test.txt', 1),
|
|
|
|
'OC\Connector\Sabre\Exception\FileLocked'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Lock\LockedException('/test.txt'),
|
|
|
|
'OC\Connector\Sabre\Exception\FileLocked'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Encryption\Exceptions\GenericEncryptionException(),
|
|
|
|
'Sabre\DAV\Exception\ServiceUnavailable'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \OCP\Files\StorageNotAvailableException(),
|
|
|
|
'Sabre\DAV\Exception\ServiceUnavailable'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \Sabre\DAV\Exception('Generic sabre exception'),
|
|
|
|
'Sabre\DAV\Exception',
|
|
|
|
false
|
|
|
|
],
|
|
|
|
[
|
|
|
|
new \Exception('Generic exception'),
|
|
|
|
'Sabre\DAV\Exception'
|
|
|
|
],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
2013-09-24 17:44:02 +04:00
|
|
|
/**
|
2015-06-26 11:38:59 +03:00
|
|
|
* @dataProvider fopenFailuresProvider
|
2013-09-24 17:44:02 +04:00
|
|
|
*/
|
2015-06-26 11:38:59 +03:00
|
|
|
public function testSimplePutFails($thrownException, $expectedException, $checkPreviousClass = true) {
|
2013-09-24 17:44:02 +04:00
|
|
|
// setup
|
2015-06-26 11:38:59 +03:00
|
|
|
$storage = $this->getMock(
|
|
|
|
'\OC\Files\Storage\Local',
|
|
|
|
['fopen'],
|
|
|
|
[['datadir' => \OC::$server->getTempManager()->getTemporaryFolder()]]
|
|
|
|
);
|
|
|
|
\OC\Files\Filesystem::mount($storage, [], $this->user . '/');
|
2015-05-12 20:08:04 +03:00
|
|
|
$view = $this->getMock('\OC\Files\View', array('getRelativePath', 'resolvePath'), array());
|
2015-06-26 11:38:59 +03:00
|
|
|
$view->expects($this->atLeastOnce())
|
2015-04-09 15:46:25 +03:00
|
|
|
->method('resolvePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnCallback(
|
2015-07-24 15:12:50 +03:00
|
|
|
function ($path) use ($storage) {
|
2015-06-26 11:38:59 +03:00
|
|
|
return [$storage, $path];
|
|
|
|
}
|
|
|
|
));
|
|
|
|
|
|
|
|
if ($thrownException !== null) {
|
|
|
|
$storage->expects($this->once())
|
|
|
|
->method('fopen')
|
|
|
|
->will($this->throwException($thrownException));
|
|
|
|
} else {
|
|
|
|
$storage->expects($this->once())
|
|
|
|
->method('fopen')
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
}
|
2014-03-03 17:27:24 +04:00
|
|
|
|
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnArgument(0));
|
2014-03-03 17:27:24 +04:00
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
2015-04-14 16:25:52 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-03-03 17:27:24 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2013-09-24 17:44:02 +04:00
|
|
|
|
|
|
|
// action
|
2015-06-26 11:38:59 +03:00
|
|
|
$caughtException = null;
|
|
|
|
try {
|
|
|
|
$file->put('test data');
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
$caughtException = $e;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertInstanceOf($expectedException, $caughtException);
|
|
|
|
if ($checkPreviousClass) {
|
|
|
|
$this->assertInstanceOf(get_class($thrownException), $caughtException->getPrevious());
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
2013-09-24 17:44:02 +04:00
|
|
|
}
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
/**
|
|
|
|
* Test putting a file using chunking
|
|
|
|
*
|
|
|
|
* @dataProvider fopenFailuresProvider
|
|
|
|
*/
|
|
|
|
public function testChunkedPutFails($thrownException, $expectedException, $checkPreviousClass = false) {
|
|
|
|
// setup
|
|
|
|
$storage = $this->getMock(
|
|
|
|
'\OC\Files\Storage\Local',
|
|
|
|
['fopen'],
|
|
|
|
[['datadir' => \OC::$server->getTempManager()->getTemporaryFolder()]]
|
|
|
|
);
|
|
|
|
\OC\Files\Filesystem::mount($storage, [], $this->user . '/');
|
|
|
|
$view = $this->getMock('\OC\Files\View', ['getRelativePath', 'resolvePath'], []);
|
|
|
|
$view->expects($this->atLeastOnce())
|
|
|
|
->method('resolvePath')
|
|
|
|
->will($this->returnCallback(
|
2015-07-24 15:12:50 +03:00
|
|
|
function ($path) use ($storage) {
|
2015-06-26 11:38:59 +03:00
|
|
|
return [$storage, $path];
|
|
|
|
}
|
|
|
|
));
|
|
|
|
|
|
|
|
if ($thrownException !== null) {
|
|
|
|
$storage->expects($this->once())
|
|
|
|
->method('fopen')
|
|
|
|
->will($this->throwException($thrownException));
|
|
|
|
} else {
|
|
|
|
$storage->expects($this->once())
|
|
|
|
->method('fopen')
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
}
|
|
|
|
|
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
|
|
|
->will($this->returnArgument(0));
|
|
|
|
|
|
|
|
$_SERVER['HTTP_OC_CHUNKED'] = true;
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt-chunking-12345-2-0', null, null, [
|
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
|
|
|
], null);
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
|
|
|
|
// put first chunk
|
|
|
|
$this->assertNull($file->put('test data one'));
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt-chunking-12345-2-1', null, null, [
|
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
|
|
|
], null);
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
|
|
|
|
// action
|
|
|
|
$caughtException = null;
|
|
|
|
try {
|
|
|
|
// last chunk
|
2015-08-12 17:44:43 +03:00
|
|
|
$file->acquireLock(ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
$file->put('test data two');
|
2015-08-12 17:44:43 +03:00
|
|
|
$file->releaseLock(ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
} catch (\Exception $e) {
|
|
|
|
$caughtException = $e;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertInstanceOf($expectedException, $caughtException);
|
|
|
|
if ($checkPreviousClass) {
|
|
|
|
$this->assertInstanceOf(get_class($thrownException), $caughtException->getPrevious());
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Simulate putting a file to the given path.
|
|
|
|
*
|
|
|
|
* @param string $path path to put the file into
|
|
|
|
* @param string $viewRoot root to use for the view
|
|
|
|
*
|
|
|
|
* @return result of the PUT operaiton which is usually the etag
|
|
|
|
*/
|
2015-05-12 20:08:04 +03:00
|
|
|
private function doPut($path, $viewRoot = null) {
|
|
|
|
$view = \OC\Files\Filesystem::getView();
|
|
|
|
if (!is_null($viewRoot)) {
|
|
|
|
$view = new \OC\Files\View($viewRoot);
|
|
|
|
} else {
|
|
|
|
$viewRoot = '/' . $this->user . '/files';
|
|
|
|
}
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo(
|
|
|
|
$viewRoot . '/' . ltrim($path, '/'),
|
|
|
|
null,
|
|
|
|
null,
|
|
|
|
['permissions' => \OCP\Constants::PERMISSION_ALL],
|
|
|
|
null
|
|
|
|
);
|
2015-01-26 19:48:28 +03:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2015-01-26 19:48:28 +03:00
|
|
|
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile($path, ILockingProvider::LOCK_SHARED);
|
|
|
|
|
|
|
|
$result = $file->put($this->getStream('test data'));
|
|
|
|
|
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile($path, ILockingProvider::LOCK_SHARED);
|
|
|
|
|
|
|
|
return $result;
|
2015-01-26 19:48:28 +03:00
|
|
|
}
|
|
|
|
|
2015-05-12 20:08:04 +03:00
|
|
|
/**
|
|
|
|
* Test putting a single file
|
|
|
|
*/
|
|
|
|
public function testPutSingleFile() {
|
2015-06-26 11:38:59 +03:00
|
|
|
$this->assertNotEmpty($this->doPut('/foo.txt'));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test putting a file using chunking
|
|
|
|
*/
|
|
|
|
public function testChunkedPut() {
|
|
|
|
$_SERVER['HTTP_OC_CHUNKED'] = true;
|
|
|
|
$this->assertNull($this->doPut('/test.txt-chunking-12345-2-0'));
|
|
|
|
$this->assertNotEmpty($this->doPut('/test.txt-chunking-12345-2-1'));
|
2015-05-12 20:08:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that putting a file triggers create hooks
|
|
|
|
*/
|
|
|
|
public function testPutSingleFileTriggersHooks() {
|
|
|
|
HookHelper::setUpHooks();
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$this->assertNotEmpty($this->doPut('/foo.txt'));
|
2015-05-12 20:08:04 +03:00
|
|
|
|
|
|
|
$this->assertCount(4, HookHelper::$hookCalls);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[0],
|
|
|
|
Filesystem::signal_create,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[1],
|
|
|
|
Filesystem::signal_write,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[2],
|
|
|
|
Filesystem::signal_post_create,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[3],
|
|
|
|
Filesystem::signal_post_write,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that putting a file triggers update hooks
|
|
|
|
*/
|
|
|
|
public function testPutOverwriteFileTriggersHooks() {
|
|
|
|
$view = \OC\Files\Filesystem::getView();
|
|
|
|
$view->file_put_contents('/foo.txt', 'some content that will be replaced');
|
|
|
|
|
|
|
|
HookHelper::setUpHooks();
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$this->assertNotEmpty($this->doPut('/foo.txt'));
|
2015-05-12 20:08:04 +03:00
|
|
|
|
|
|
|
$this->assertCount(4, HookHelper::$hookCalls);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[0],
|
|
|
|
Filesystem::signal_update,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[1],
|
|
|
|
Filesystem::signal_write,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[2],
|
|
|
|
Filesystem::signal_post_update,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[3],
|
|
|
|
Filesystem::signal_post_write,
|
|
|
|
'/foo.txt'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that putting a file triggers hooks with the correct path
|
|
|
|
* if the passed view was chrooted (can happen with public webdav
|
|
|
|
* where the root is the share root)
|
|
|
|
*/
|
|
|
|
public function testPutSingleFileTriggersHooksDifferentRoot() {
|
|
|
|
$view = \OC\Files\Filesystem::getView();
|
|
|
|
$view->mkdir('noderoot');
|
|
|
|
|
|
|
|
HookHelper::setUpHooks();
|
|
|
|
|
|
|
|
// happens with public webdav where the view root is the share root
|
2015-06-26 11:38:59 +03:00
|
|
|
$this->assertNotEmpty($this->doPut('/foo.txt', '/' . $this->user . '/files/noderoot'));
|
2015-05-12 20:08:04 +03:00
|
|
|
|
|
|
|
$this->assertCount(4, HookHelper::$hookCalls);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[0],
|
|
|
|
Filesystem::signal_create,
|
|
|
|
'/noderoot/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[1],
|
|
|
|
Filesystem::signal_write,
|
|
|
|
'/noderoot/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[2],
|
|
|
|
Filesystem::signal_post_create,
|
|
|
|
'/noderoot/foo.txt'
|
|
|
|
);
|
|
|
|
$this->assertHookCall(
|
|
|
|
HookHelper::$hookCalls[3],
|
|
|
|
Filesystem::signal_post_write,
|
|
|
|
'/noderoot/foo.txt'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public static function cancellingHook($params) {
|
|
|
|
self::$hookCalls[] = array(
|
|
|
|
'signal' => Filesystem::signal_post_create,
|
|
|
|
'params' => $params
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test put file with cancelled hook
|
|
|
|
*/
|
|
|
|
public function testPutSingleFileCancelPreHook() {
|
|
|
|
\OCP\Util::connectHook(
|
|
|
|
Filesystem::CLASSNAME,
|
|
|
|
Filesystem::signal_create,
|
|
|
|
'\Test\HookHelper',
|
|
|
|
'cancellingCallback'
|
|
|
|
);
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
// action
|
|
|
|
$thrown = false;
|
|
|
|
try {
|
|
|
|
$this->doPut('/foo.txt');
|
|
|
|
} catch (\Sabre\DAV\Exception $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles(), 'No stray part files');
|
2015-05-12 20:08:04 +03:00
|
|
|
}
|
|
|
|
|
2013-09-30 13:30:34 +04:00
|
|
|
/**
|
2015-06-26 11:38:59 +03:00
|
|
|
* Test exception when the uploaded size did not match
|
2013-09-30 13:30:34 +04:00
|
|
|
*/
|
2015-06-26 11:38:59 +03:00
|
|
|
public function testSimplePutFailsSizeCheck() {
|
2013-09-30 13:30:34 +04:00
|
|
|
// setup
|
2014-07-08 11:44:46 +04:00
|
|
|
$view = $this->getMock('\OC\Files\View',
|
2015-05-12 20:08:04 +03:00
|
|
|
array('rename', 'getRelativePath', 'filesize'));
|
2014-03-03 17:27:24 +04:00
|
|
|
$view->expects($this->any())
|
|
|
|
->method('rename')
|
|
|
|
->withAnyParameters()
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnArgument(0));
|
|
|
|
|
2014-07-08 11:44:46 +04:00
|
|
|
$view->expects($this->any())
|
|
|
|
->method('filesize')
|
|
|
|
->will($this->returnValue(123456));
|
|
|
|
|
|
|
|
$_SERVER['CONTENT_LENGTH'] = 123456;
|
2014-09-13 00:02:42 +04:00
|
|
|
$_SERVER['REQUEST_METHOD'] = 'PUT';
|
2014-03-03 17:27:24 +04:00
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-03-03 17:27:24 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2013-09-30 13:30:34 +04:00
|
|
|
|
|
|
|
// action
|
2015-06-26 11:38:59 +03:00
|
|
|
$thrown = false;
|
|
|
|
try {
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile('/test.txt', ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$file->put($this->getStream('test data'));
|
2015-07-24 15:12:50 +03:00
|
|
|
|
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile('/test.txt', ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
} catch (\Sabre\DAV\Exception\BadRequest $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
2013-09-30 13:30:34 +04:00
|
|
|
}
|
|
|
|
|
2014-01-13 16:14:05 +04:00
|
|
|
/**
|
2015-06-26 11:38:59 +03:00
|
|
|
* Test exception during final rename in simple upload mode
|
|
|
|
*/
|
|
|
|
public function testSimplePutFailsMoveFromStorage() {
|
|
|
|
$view = new \OC\Files\View('/' . $this->user . '/files');
|
|
|
|
|
|
|
|
// simulate situation where the target file is locked
|
|
|
|
$view->lockFile('/test.txt', ILockingProvider::LOCK_EXCLUSIVE);
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/' . $this->user . '/files/test.txt', null, null, array(
|
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
|
|
|
), null);
|
|
|
|
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
|
|
|
|
// action
|
|
|
|
$thrown = false;
|
|
|
|
try {
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$file->put($this->getStream('test data'));
|
2015-07-24 15:12:50 +03:00
|
|
|
|
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
} catch (\OC\Connector\Sabre\Exception\FileLocked $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test exception during final rename in chunk upload mode
|
|
|
|
*/
|
|
|
|
public function testChunkedPutFailsFinalRename() {
|
|
|
|
$view = new \OC\Files\View('/' . $this->user . '/files');
|
|
|
|
|
|
|
|
// simulate situation where the target file is locked
|
|
|
|
$view->lockFile('/test.txt', ILockingProvider::LOCK_EXCLUSIVE);
|
|
|
|
|
|
|
|
$_SERVER['HTTP_OC_CHUNKED'] = true;
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/' . $this->user . '/files/test.txt-chunking-12345-2-0', null, null, [
|
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
|
|
|
], null);
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
$this->assertNull($file->put('test data one'));
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/' . $this->user . '/files/test.txt-chunking-12345-2-1', null, null, [
|
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
|
|
|
], null);
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
|
|
|
|
// action
|
|
|
|
$thrown = false;
|
|
|
|
try {
|
|
|
|
$file->put($this->getStream('test data'));
|
|
|
|
} catch (\OC\Connector\Sabre\Exception\FileLocked $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test put file with invalid chars
|
2014-01-13 16:14:05 +04:00
|
|
|
*/
|
|
|
|
public function testSimplePutInvalidChars() {
|
|
|
|
// setup
|
2015-05-12 20:08:04 +03:00
|
|
|
$view = $this->getMock('\OC\Files\View', array('getRelativePath'));
|
2014-03-03 17:27:24 +04:00
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnArgument(0));
|
2014-03-03 17:27:24 +04:00
|
|
|
|
2015-02-18 20:28:24 +03:00
|
|
|
$info = new \OC\Files\FileInfo('/*', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-01-13 16:14:05 +04:00
|
|
|
|
|
|
|
// action
|
2015-06-26 11:38:59 +03:00
|
|
|
$thrown = false;
|
|
|
|
try {
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$file->put($this->getStream('test data'));
|
2015-07-24 15:12:50 +03:00
|
|
|
|
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
} catch (\OC\Connector\Sabre\Exception\InvalidPath $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
2014-01-13 16:14:05 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test setting name with setName() with invalid chars
|
2015-04-14 16:25:52 +03:00
|
|
|
*
|
2015-02-18 20:28:24 +03:00
|
|
|
* @expectedException \OC\Connector\Sabre\Exception\InvalidPath
|
2014-01-13 16:14:05 +04:00
|
|
|
*/
|
|
|
|
public function testSetNameInvalidChars() {
|
|
|
|
// setup
|
2014-08-04 18:17:11 +04:00
|
|
|
$view = $this->getMock('\OC\Files\View', array('getRelativePath'));
|
2014-03-03 17:27:24 +04:00
|
|
|
|
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnArgument(0));
|
2014-03-03 17:27:24 +04:00
|
|
|
|
2015-02-18 20:28:24 +03:00
|
|
|
$info = new \OC\Files\FileInfo('/*', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-01-13 16:14:05 +04:00
|
|
|
$file->setName('/super*star.txt');
|
|
|
|
}
|
2014-07-08 11:44:46 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
*/
|
|
|
|
public function testUploadAbort() {
|
|
|
|
// setup
|
|
|
|
$view = $this->getMock('\OC\Files\View',
|
2015-05-12 20:08:04 +03:00
|
|
|
array('rename', 'getRelativePath', 'filesize'));
|
2014-07-08 11:44:46 +04:00
|
|
|
$view->expects($this->any())
|
|
|
|
->method('rename')
|
|
|
|
->withAnyParameters()
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
$view->expects($this->any())
|
|
|
|
->method('getRelativePath')
|
2015-06-26 11:38:59 +03:00
|
|
|
->will($this->returnArgument(0));
|
2014-07-08 11:44:46 +04:00
|
|
|
$view->expects($this->any())
|
|
|
|
->method('filesize')
|
|
|
|
->will($this->returnValue(123456));
|
|
|
|
|
|
|
|
$_SERVER['CONTENT_LENGTH'] = 12345;
|
2014-09-13 00:02:42 +04:00
|
|
|
$_SERVER['REQUEST_METHOD'] = 'PUT';
|
2014-07-08 11:44:46 +04:00
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-07-08 11:44:46 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-07-08 11:44:46 +04:00
|
|
|
|
|
|
|
// action
|
2015-06-26 11:38:59 +03:00
|
|
|
$thrown = false;
|
|
|
|
try {
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
$file->put($this->getStream('test data'));
|
2015-07-24 15:12:50 +03:00
|
|
|
|
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile($info->getPath(), ILockingProvider::LOCK_SHARED);
|
2015-06-26 11:38:59 +03:00
|
|
|
} catch (\Sabre\DAV\Exception\BadRequest $e) {
|
|
|
|
$thrown = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->assertTrue($thrown);
|
|
|
|
$this->assertEmpty($this->listPartFiles($view, ''), 'No stray part files');
|
2014-07-08 11:44:46 +04:00
|
|
|
}
|
2014-09-22 14:19:34 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
public function testDeleteWhenAllowed() {
|
|
|
|
// setup
|
|
|
|
$view = $this->getMock('\OC\Files\View',
|
|
|
|
array());
|
|
|
|
|
|
|
|
$view->expects($this->once())
|
|
|
|
->method('unlink')
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
|
|
|
// action
|
|
|
|
$file->delete();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @expectedException \Sabre\DAV\Exception\Forbidden
|
|
|
|
*/
|
|
|
|
public function testDeleteThrowsWhenDeletionNotAllowed() {
|
|
|
|
// setup
|
|
|
|
$view = $this->getMock('\OC\Files\View',
|
|
|
|
array());
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
|
|
|
'permissions' => 0
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
|
|
|
// action
|
|
|
|
$file->delete();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @expectedException \Sabre\DAV\Exception\Forbidden
|
|
|
|
*/
|
|
|
|
public function testDeleteThrowsWhenDeletionFailed() {
|
|
|
|
// setup
|
|
|
|
$view = $this->getMock('\OC\Files\View',
|
|
|
|
array());
|
|
|
|
|
|
|
|
// but fails
|
|
|
|
$view->expects($this->once())
|
|
|
|
->method('unlink')
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
|
|
|
|
$info = new \OC\Files\FileInfo('/test.txt', null, null, array(
|
2014-11-25 18:28:41 +03:00
|
|
|
'permissions' => \OCP\Constants::PERMISSION_ALL
|
2014-12-16 16:24:48 +03:00
|
|
|
), null);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
2015-02-12 14:29:01 +03:00
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
2014-09-22 14:19:34 +04:00
|
|
|
|
|
|
|
// action
|
|
|
|
$file->delete();
|
|
|
|
}
|
2015-05-12 20:08:04 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Asserts hook call
|
|
|
|
*
|
|
|
|
* @param array $callData hook call data to check
|
|
|
|
* @param string $signal signal name
|
|
|
|
* @param string $hookPath hook path
|
|
|
|
*/
|
|
|
|
protected function assertHookCall($callData, $signal, $hookPath) {
|
|
|
|
$this->assertEquals($signal, $callData['signal']);
|
|
|
|
$params = $callData['params'];
|
|
|
|
$this->assertEquals(
|
|
|
|
$hookPath,
|
|
|
|
$params[Filesystem::signal_param_path]
|
|
|
|
);
|
|
|
|
}
|
2015-06-12 19:50:49 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Test whether locks are set before and after the operation
|
|
|
|
*/
|
|
|
|
public function testPutLocking() {
|
|
|
|
$view = new \OC\Files\View('/' . $this->user . '/files/');
|
|
|
|
|
|
|
|
$path = 'test-locking.txt';
|
|
|
|
$info = new \OC\Files\FileInfo(
|
|
|
|
'/' . $this->user . '/files/' . $path,
|
|
|
|
null,
|
|
|
|
null,
|
|
|
|
['permissions' => \OCP\Constants::PERMISSION_ALL],
|
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$file = new \OC\Connector\Sabre\File($view, $info);
|
|
|
|
|
|
|
|
$this->assertFalse(
|
|
|
|
$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_SHARED),
|
|
|
|
'File unlocked before put'
|
|
|
|
);
|
|
|
|
$this->assertFalse(
|
|
|
|
$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE),
|
|
|
|
'File unlocked before put'
|
|
|
|
);
|
|
|
|
|
|
|
|
$wasLockedPre = false;
|
|
|
|
$wasLockedPost = false;
|
|
|
|
$eventHandler = $this->getMockBuilder('\stdclass')
|
|
|
|
->setMethods(['writeCallback', 'postWriteCallback'])
|
|
|
|
->getMock();
|
|
|
|
|
|
|
|
// both pre and post hooks might need access to the file,
|
|
|
|
// so only shared lock is acceptable
|
|
|
|
$eventHandler->expects($this->once())
|
|
|
|
->method('writeCallback')
|
|
|
|
->will($this->returnCallback(
|
2015-07-24 15:12:50 +03:00
|
|
|
function () use ($view, $path, &$wasLockedPre) {
|
2015-06-12 19:50:49 +03:00
|
|
|
$wasLockedPre = $this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_SHARED);
|
|
|
|
$wasLockedPre = $wasLockedPre && !$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE);
|
|
|
|
}
|
|
|
|
));
|
|
|
|
$eventHandler->expects($this->once())
|
|
|
|
->method('postWriteCallback')
|
|
|
|
->will($this->returnCallback(
|
2015-07-24 15:12:50 +03:00
|
|
|
function () use ($view, $path, &$wasLockedPost) {
|
2015-06-12 19:50:49 +03:00
|
|
|
$wasLockedPost = $this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_SHARED);
|
|
|
|
$wasLockedPost = $wasLockedPost && !$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE);
|
|
|
|
}
|
|
|
|
));
|
|
|
|
|
|
|
|
\OCP\Util::connectHook(
|
|
|
|
Filesystem::CLASSNAME,
|
|
|
|
Filesystem::signal_write,
|
|
|
|
$eventHandler,
|
|
|
|
'writeCallback'
|
|
|
|
);
|
|
|
|
\OCP\Util::connectHook(
|
|
|
|
Filesystem::CLASSNAME,
|
|
|
|
Filesystem::signal_post_write,
|
|
|
|
$eventHandler,
|
|
|
|
'postWriteCallback'
|
|
|
|
);
|
|
|
|
|
2015-07-24 15:12:50 +03:00
|
|
|
// beforeMethod locks
|
|
|
|
$view->lockFile($path, ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-12 19:50:49 +03:00
|
|
|
$this->assertNotEmpty($file->put($this->getStream('test data')));
|
|
|
|
|
2015-07-24 15:12:50 +03:00
|
|
|
// afterMethod unlocks
|
|
|
|
$view->unlockFile($path, ILockingProvider::LOCK_SHARED);
|
|
|
|
|
2015-06-12 19:50:49 +03:00
|
|
|
$this->assertTrue($wasLockedPre, 'File was locked during pre-hooks');
|
|
|
|
$this->assertTrue($wasLockedPost, 'File was locked during post-hooks');
|
|
|
|
|
|
|
|
$this->assertFalse(
|
|
|
|
$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_SHARED),
|
|
|
|
'File unlocked after put'
|
|
|
|
);
|
|
|
|
$this->assertFalse(
|
|
|
|
$this->isFileLocked($view, $path, \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE),
|
|
|
|
'File unlocked after put'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-06-26 11:38:59 +03:00
|
|
|
/**
|
|
|
|
* Returns part files in the given path
|
|
|
|
*
|
|
|
|
* @param \OC\Files\View view which root is the current user's "files" folder
|
|
|
|
* @param string $path path for which to list part files
|
|
|
|
*
|
|
|
|
* @return array list of part files
|
|
|
|
*/
|
|
|
|
private function listPartFiles(\OC\Files\View $userView = null, $path = '') {
|
|
|
|
if ($userView === null) {
|
|
|
|
$userView = \OC\Files\Filesystem::getView();
|
|
|
|
}
|
|
|
|
$files = [];
|
|
|
|
list($storage, $internalPath) = $userView->resolvePath($path);
|
|
|
|
$realPath = $storage->getSourcePath($internalPath);
|
|
|
|
$dh = opendir($realPath);
|
|
|
|
while (($file = readdir($dh)) !== false) {
|
|
|
|
if (substr($file, strlen($file) - 5, 5) === '.part') {
|
|
|
|
$files[] = $file;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir($dh);
|
|
|
|
return $files;
|
|
|
|
}
|
|
|
|
|
2013-09-24 17:44:02 +04:00
|
|
|
}
|