nextcloud/lib/private/connector/sabre/file.php

264 lines
8.2 KiB
PHP
Raw Normal View History

2011-07-20 17:53:34 +04:00
<?php
2012-05-05 20:13:40 +04:00
2011-07-20 17:53:34 +04:00
/**
2012-05-05 20:13:40 +04:00
* ownCloud
*
* @author Jakob Sack
* @copyright 2011 Jakob Sack kde@jakobsack.de
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation; either
* version 3 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU Affero General Public
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
*
2011-07-20 17:53:34 +04:00
*/
2012-05-05 20:13:40 +04:00
class OC_Connector_Sabre_File extends OC_Connector_Sabre_Node implements \Sabre\DAV\IFile {
2011-07-20 17:53:34 +04:00
/**
* Updates the data
*
* The data argument is a readable stream resource.
*
* After a successful put operation, you may choose to return an ETag. The
* etag must always be surrounded by double-quotes. These quotes must
* appear in the actual string you're returning.
*
* Clients may use the ETag from a PUT request to later on make sure that
* when they update the file, the contents haven't changed in the mean
* time.
*
* If you don't plan to store the file byte-by-byte, and you return a
* different object on a subsequent GET you are strongly recommended to not
* return an ETag, and just return null.
*
2011-07-20 17:53:34 +04:00
* @param resource $data
* @throws \Sabre\DAV\Exception\Forbidden
2014-04-23 17:34:04 +04:00
* @throws OC_Connector_Sabre_Exception_UnsupportedMediaType
* @throws \Sabre\DAV\Exception\BadRequest
* @throws \Sabre\DAV\Exception
2014-04-23 17:34:04 +04:00
* @throws OC_Connector_Sabre_Exception_EntityTooLarge
* @throws \Sabre\DAV\Exception\ServiceUnavailable
* @return string|null
2011-07-20 17:53:34 +04:00
*/
public function put($data) {
if ($this->info && $this->fileView->file_exists($this->path) &&
!$this->info->isUpdateable()) {
throw new \Sabre\DAV\Exception\Forbidden();
}
// throw an exception if encryption was disabled but the files are still encrypted
if (\OC_Util::encryptedFiles()) {
throw new \Sabre\DAV\Exception\ServiceUnavailable();
}
2013-09-24 17:14:42 +04:00
$fileName = basename($this->path);
if (!\OCP\Util::isValidFileName($fileName)) {
throw new \Sabre\DAV\Exception\BadRequest();
}
2013-09-24 17:14:42 +04:00
// chunked handling
if (isset($_SERVER['HTTP_OC_CHUNKED'])) {
return $this->createFileChunked($data);
2013-09-24 17:14:42 +04:00
}
2013-02-10 17:16:45 +04:00
// mark file as partial while uploading (ignored by the scanner)
$partpath = $this->path . '.ocTransferId' . rand() . '.part';
2013-02-22 20:21:57 +04:00
try {
$putOkay = $this->fileView->file_put_contents($partpath, $data);
if ($putOkay === false) {
\OC_Log::write('webdav', '\OC\Files\Filesystem::file_put_contents() failed', \OC_Log::ERROR);
$this->fileView->unlink($partpath);
// because we have no clue about the cause we can only throw back a 500/Internal Server Error
throw new \Sabre\DAV\Exception('Could not write file contents');
}
} catch (\OCP\Files\NotPermittedException $e) {
// a more general case - due to whatever reason the content could not be written
throw new \Sabre\DAV\Exception\Forbidden($e->getMessage());
} catch (\OCP\Files\EntityTooLargeException $e) {
// the file is too big to be stored
throw new OC_Connector_Sabre_Exception_EntityTooLarge($e->getMessage());
} catch (\OCP\Files\InvalidContentException $e) {
// the file content is not permitted
throw new OC_Connector_Sabre_Exception_UnsupportedMediaType($e->getMessage());
} catch (\OCP\Files\InvalidPathException $e) {
// the path for the file was not valid
// TODO: find proper http status code for this case
throw new \Sabre\DAV\Exception\Forbidden($e->getMessage());
} catch (\OCP\Files\LockNotAcquiredException $e) {
// the file is currently being written to by another process
2014-05-30 16:10:48 +04:00
throw new OC_Connector_Sabre_Exception_FileLocked($e->getMessage(), $e->getCode(), $e);
}
2013-02-22 20:21:57 +04:00
2013-02-10 17:16:45 +04:00
// rename to correct path
try {
$renameOkay = $this->fileView->rename($partpath, $this->path);
$fileExists = $this->fileView->file_exists($this->path);
if ($renameOkay === false || $fileExists === false) {
\OC_Log::write('webdav', '\OC\Files\Filesystem::rename() failed', \OC_Log::ERROR);
$this->fileView->unlink($partpath);
throw new \Sabre\DAV\Exception('Could not rename part file to final file');
}
}
catch (\OCP\Files\LockNotAcquiredException $e) {
// the file is currently being written to by another process
throw new OC_Connector_Sabre_Exception_FileLocked($e->getMessage(), $e->getCode(), $e);
}
2013-02-22 20:21:57 +04:00
2013-09-24 17:14:42 +04:00
// allow sync clients to send the mtime along in a header
$mtime = OC_Request::hasModificationTime();
if ($mtime !== false) {
if($this->fileView->touch($this->path, $mtime)) {
header('X-OC-MTime: accepted');
}
}
$this->refreshInfo();
2011-07-20 17:53:34 +04:00
return '"' . $this->info->getEtag() . '"';
2011-07-20 17:53:34 +04:00
}
/**
* Returns the data
*
2014-05-11 21:28:45 +04:00
* @return string|resource
2011-07-20 17:53:34 +04:00
*/
public function get() {
2013-09-24 17:14:42 +04:00
//throw exception if encryption is disabled but files are still encrypted
if (\OC_Util::encryptedFiles()) {
throw new \Sabre\DAV\Exception\ServiceUnavailable();
} else {
2014-05-15 01:08:45 +04:00
return $this->fileView->fopen(ltrim($this->path, '/'), 'rb');
}
2011-07-20 17:53:34 +04:00
}
/**
* Delete the current file
*
* @return void
* @throws \Sabre\DAV\Exception\Forbidden
2011-07-20 17:53:34 +04:00
*/
public function delete() {
if (!$this->info->isDeletable()) {
throw new \Sabre\DAV\Exception\Forbidden();
}
$this->fileView->unlink($this->path);
2011-07-20 17:53:34 +04:00
// remove properties
$this->removeProperties();
2011-07-20 17:53:34 +04:00
}
/**
* Returns the size of the node, in bytes
*
* @return int|float
2011-07-20 17:53:34 +04:00
*/
public function getSize() {
return $this->info->getSize();
2011-07-20 17:53:34 +04:00
}
/**
* Returns the ETag for a file
*
2013-02-11 20:44:02 +04:00
* An ETag is a unique identifier representing the current version of the
* file. If the file changes, the ETag MUST change. The ETag is an
* arbitrary string, but MUST be surrounded by double-quotes.
2011-07-20 17:53:34 +04:00
*
* Return null if the ETag can not effectively be determined
*
* @return mixed
*/
public function getETag() {
2014-04-24 13:10:46 +04:00
return '"' . $this->info->getEtag() . '"';
2011-07-20 17:53:34 +04:00
}
/**
* Returns the mime-type for a file
*
* If null is returned, we'll assume application/octet-stream
*
* @return mixed
*/
public function getContentType() {
2014-04-15 22:05:43 +04:00
$mimeType = $this->info->getMimetype();
2011-07-20 17:53:34 +04:00
return \OC_Helper::getSecureMimeType($mimeType);
2011-07-20 17:53:34 +04:00
}
/**
* @param resource $data
2014-04-23 17:34:04 +04:00
* @return null|string
*/
private function createFileChunked($data)
{
list($path, $name) = \Sabre\DAV\URLUtil::splitPath($this->path);
$info = OC_FileChunking::decodeName($name);
if (empty($info)) {
throw new \Sabre\DAV\Exception\NotImplemented();
}
$chunk_handler = new OC_FileChunking($info);
$bytesWritten = $chunk_handler->store($info['index'], $data);
//detect aborted upload
if (isset ($_SERVER['REQUEST_METHOD']) && $_SERVER['REQUEST_METHOD'] === 'PUT' ) {
if (isset($_SERVER['CONTENT_LENGTH'])) {
$expected = $_SERVER['CONTENT_LENGTH'];
if ($bytesWritten != $expected) {
2013-10-17 22:20:13 +04:00
$chunk_handler->remove($info['index']);
throw new \Sabre\DAV\Exception\BadRequest(
'expected filesize ' . $expected . ' got ' . $bytesWritten);
}
}
}
if ($chunk_handler->isComplete()) {
// we first assembly the target file as a part file
$partFile = $path . '/' . $info['name'] . '.ocTransferId' . $info['transferid'] . '.part';
$chunk_handler->file_assemble($partFile);
// here is the final atomic rename
$targetPath = $path . '/' . $info['name'];
$renameOkay = $this->fileView->rename($partFile, $targetPath);
$fileExists = $this->fileView->file_exists($targetPath);
if ($renameOkay === false || $fileExists === false) {
\OC_Log::write('webdav', '\OC\Files\Filesystem::rename() failed', \OC_Log::ERROR);
// only delete if an error occurred and the target file was already created
if ($fileExists) {
$this->fileView->unlink($targetPath);
}
throw new \Sabre\DAV\Exception('Could not rename part file assembled from chunks');
}
// allow sync clients to send the mtime along in a header
$mtime = OC_Request::hasModificationTime();
if ($mtime !== false) {
if($this->fileView->touch($targetPath, $mtime)) {
header('X-OC-MTime: accepted');
}
}
$info = $this->fileView->getFileInfo($targetPath);
return $info->getEtag();
}
return null;
}
2011-07-20 17:53:34 +04:00
}