2012-05-24 20:22:33 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-03-01 19:25:15 +03:00
|
|
|
* @author Jesús Macias <jmacias@solidgear.es>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Juan Pablo Villafañez <jvillafanez@solidgear.es>
|
|
|
|
* @author Juan Pablo Villafáñez <jvillafanez@solidgear.es>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Michael Gapczynski <GapczynskiM@gmail.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Philipp Kapfer <philipp.kapfer@gmx.at>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
* @author Roland Tapken <roland@bitarbeiter.net>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2012-05-24 20:22:33 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2016-04-14 01:18:07 +03:00
|
|
|
namespace OCA\Files_External\Lib\Storage;
|
2012-09-07 20:30:48 +04:00
|
|
|
|
2020-02-10 18:36:03 +03:00
|
|
|
use Icewind\SMB\ACL;
|
2018-06-21 17:02:51 +03:00
|
|
|
use Icewind\SMB\BasicAuth;
|
2017-04-26 17:41:48 +03:00
|
|
|
use Icewind\SMB\Exception\AlreadyExistsException;
|
2016-03-16 15:15:54 +03:00
|
|
|
use Icewind\SMB\Exception\ConnectException;
|
2014-08-26 20:46:07 +04:00
|
|
|
use Icewind\SMB\Exception\Exception;
|
2016-02-10 18:41:58 +03:00
|
|
|
use Icewind\SMB\Exception\ForbiddenException;
|
2018-06-27 16:33:51 +03:00
|
|
|
use Icewind\SMB\Exception\InvalidArgumentException;
|
2014-08-26 20:46:07 +04:00
|
|
|
use Icewind\SMB\Exception\NotFoundException;
|
2020-09-17 18:23:33 +03:00
|
|
|
use Icewind\SMB\Exception\OutOfSpaceException;
|
2018-08-08 17:07:41 +03:00
|
|
|
use Icewind\SMB\Exception\TimedOutException;
|
2016-10-10 15:44:53 +03:00
|
|
|
use Icewind\SMB\IFileInfo;
|
2018-06-21 17:02:51 +03:00
|
|
|
use Icewind\SMB\Native\NativeServer;
|
2019-09-25 14:30:40 +03:00
|
|
|
use Icewind\SMB\Options;
|
2018-06-21 17:02:51 +03:00
|
|
|
use Icewind\SMB\ServerFactory;
|
|
|
|
use Icewind\SMB\System;
|
2015-12-15 16:20:16 +03:00
|
|
|
use Icewind\Streams\CallbackWrapper;
|
2014-08-26 20:46:07 +04:00
|
|
|
use Icewind\Streams\IteratorDirectory;
|
2016-01-12 15:14:04 +03:00
|
|
|
use OC\Cache\CappedMemoryCache;
|
2014-08-26 20:46:07 +04:00
|
|
|
use OC\Files\Filesystem;
|
2016-07-14 15:46:01 +03:00
|
|
|
use OC\Files\Storage\Common;
|
2017-01-06 17:39:01 +03:00
|
|
|
use OCA\Files_External\Lib\Notify\SMBNotifyHandler;
|
2020-03-27 19:47:20 +03:00
|
|
|
use OCP\Constants;
|
2020-09-17 18:23:33 +03:00
|
|
|
use OCP\Files\EntityTooLargeException;
|
2017-01-06 17:39:01 +03:00
|
|
|
use OCP\Files\Notify\IChange;
|
|
|
|
use OCP\Files\Notify\IRenameChange;
|
2021-01-29 13:26:19 +03:00
|
|
|
use OCP\Files\NotPermittedException;
|
2016-07-14 15:46:01 +03:00
|
|
|
use OCP\Files\Storage\INotifyStorage;
|
2019-08-22 13:19:51 +03:00
|
|
|
use OCP\Files\StorageAuthException;
|
2016-03-16 15:15:54 +03:00
|
|
|
use OCP\Files\StorageNotAvailableException;
|
2018-04-25 16:22:28 +03:00
|
|
|
use OCP\ILogger;
|
2012-05-24 20:22:33 +04:00
|
|
|
|
2016-07-14 15:46:01 +03:00
|
|
|
class SMB extends Common implements INotifyStorage {
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
2018-06-21 17:02:51 +03:00
|
|
|
* @var \Icewind\SMB\IServer
|
2014-08-26 20:46:07 +04:00
|
|
|
*/
|
|
|
|
protected $server;
|
|
|
|
|
|
|
|
/**
|
2018-06-21 17:02:51 +03:00
|
|
|
* @var \Icewind\SMB\IShare
|
2014-08-26 20:46:07 +04:00
|
|
|
*/
|
|
|
|
protected $share;
|
|
|
|
|
2016-01-12 15:14:04 +03:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
protected $root;
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
2018-06-21 17:02:51 +03:00
|
|
|
* @var \Icewind\SMB\IFileInfo[]
|
2014-08-26 20:46:07 +04:00
|
|
|
*/
|
2016-01-12 15:14:04 +03:00
|
|
|
protected $statCache;
|
2012-05-24 20:22:33 +04:00
|
|
|
|
2018-08-15 16:08:50 +03:00
|
|
|
/** @var ILogger */
|
|
|
|
protected $logger;
|
|
|
|
|
2019-05-23 22:23:56 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $showHidden;
|
|
|
|
|
2020-02-10 18:36:03 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $checkAcl;
|
|
|
|
|
2021-03-16 17:34:41 +03:00
|
|
|
/** @var bool */
|
|
|
|
protected $rootWritable;
|
|
|
|
|
2012-09-07 17:22:01 +04:00
|
|
|
public function __construct($params) {
|
2018-05-28 17:17:19 +03:00
|
|
|
if (!isset($params['host'])) {
|
|
|
|
throw new \Exception('Invalid configuration, no host provided');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isset($params['auth'])) {
|
|
|
|
$auth = $params['auth'];
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (isset($params['user']) && isset($params['password']) && isset($params['share'])) {
|
2020-03-27 19:47:20 +03:00
|
|
|
[$workgroup, $user] = $this->splitUser($params['user']);
|
2018-06-21 17:02:51 +03:00
|
|
|
$auth = new BasicAuth($user, $workgroup, $params['password']);
|
2012-12-24 22:45:52 +04:00
|
|
|
} else {
|
2018-05-28 17:17:19 +03:00
|
|
|
throw new \Exception('Invalid configuration, no credentials provided');
|
2012-06-08 03:29:46 +04:00
|
|
|
}
|
2018-05-28 17:17:19 +03:00
|
|
|
|
2018-08-15 16:08:50 +03:00
|
|
|
if (isset($params['logger'])) {
|
|
|
|
$this->logger = $params['logger'];
|
|
|
|
} else {
|
|
|
|
$this->logger = \OC::$server->getLogger();
|
|
|
|
}
|
|
|
|
|
2019-09-25 14:30:40 +03:00
|
|
|
$options = new Options();
|
|
|
|
if (isset($params['timeout'])) {
|
|
|
|
$timeout = (int)$params['timeout'];
|
|
|
|
if ($timeout > 0) {
|
|
|
|
$options->setTimeout($timeout);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$serverFactory = new ServerFactory($options);
|
2018-05-28 17:17:19 +03:00
|
|
|
$this->server = $serverFactory->createServer($params['host'], $auth);
|
|
|
|
$this->share = $this->server->getShare(trim($params['share'], '/'));
|
|
|
|
|
|
|
|
$this->root = $params['root'] ?? '/';
|
|
|
|
$this->root = '/' . ltrim($this->root, '/');
|
|
|
|
$this->root = rtrim($this->root, '/') . '/';
|
|
|
|
|
2019-05-23 22:23:56 +03:00
|
|
|
$this->showHidden = isset($params['show_hidden']) && $params['show_hidden'];
|
2020-02-10 18:36:03 +03:00
|
|
|
$this->checkAcl = isset($params['check_acl']) && $params['check_acl'];
|
2021-03-16 17:34:41 +03:00
|
|
|
$this->rootWritable = isset($params['root_force_writable']) && $params['root_force_writable'];
|
2019-05-23 22:23:56 +03:00
|
|
|
|
2016-01-12 15:14:04 +03:00
|
|
|
$this->statCache = new CappedMemoryCache();
|
2017-04-26 17:45:04 +03:00
|
|
|
parent::__construct($params);
|
2012-11-16 15:14:29 +04:00
|
|
|
}
|
2012-05-24 20:22:33 +04:00
|
|
|
|
2018-06-21 17:02:51 +03:00
|
|
|
private function splitUser($user) {
|
|
|
|
if (strpos($user, '/')) {
|
|
|
|
return explode('/', $user, 2);
|
|
|
|
} elseif (strpos($user, '\\')) {
|
|
|
|
return explode('\\', $user);
|
|
|
|
} else {
|
|
|
|
return [null, $user];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getId() {
|
2015-07-28 12:18:03 +03:00
|
|
|
// FIXME: double slash to keep compatible with the old storage ids,
|
|
|
|
// failure to do so will lead to creation of a new storage id and
|
|
|
|
// loss of shares from the storage
|
2018-06-21 17:02:51 +03:00
|
|
|
return 'smb::' . $this->server->getAuth()->getUsername() . '@' . $this->server->getHost() . '//' . $this->share->getName() . '/' . $this->root;
|
2012-05-24 20:22:33 +04:00
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
protected function buildPath($path) {
|
2016-04-29 12:19:00 +03:00
|
|
|
return Filesystem::normalizePath($this->root . '/' . $path, true, false, true);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
|
2016-07-14 15:46:01 +03:00
|
|
|
protected function relativePath($fullPath) {
|
|
|
|
if ($fullPath === $this->root) {
|
|
|
|
return '';
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif (substr($fullPath, 0, strlen($this->root)) === $this->root) {
|
2016-07-14 15:46:01 +03:00
|
|
|
return substr($fullPath, strlen($this->root));
|
|
|
|
} else {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @return \Icewind\SMB\IFileInfo
|
2019-08-22 13:19:51 +03:00
|
|
|
* @throws StorageAuthException
|
2014-08-26 20:46:07 +04:00
|
|
|
*/
|
|
|
|
protected function getFileInfo($path) {
|
2016-03-16 15:15:54 +03:00
|
|
|
try {
|
|
|
|
$path = $this->buildPath($path);
|
|
|
|
if (!isset($this->statCache[$path])) {
|
|
|
|
$this->statCache[$path] = $this->share->stat($path);
|
|
|
|
}
|
|
|
|
return $this->statCache[$path];
|
|
|
|
} catch (ConnectException $e) {
|
2019-08-22 13:19:51 +03:00
|
|
|
$this->throwUnavailable($e);
|
2019-08-22 12:12:43 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
// with php-smbclient, this exceptions is thrown when the provided password is invalid.
|
|
|
|
// Possible is also ForbiddenException with a different error code, so we check it.
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($e->getCode() === 1) {
|
2019-08-22 13:19:51 +03:00
|
|
|
$this->throwUnavailable($e);
|
2019-08-22 12:12:43 +03:00
|
|
|
}
|
|
|
|
throw $e;
|
2013-11-14 19:52:00 +04:00
|
|
|
}
|
2012-06-17 04:54:23 +04:00
|
|
|
}
|
|
|
|
|
2019-08-22 13:19:51 +03:00
|
|
|
/**
|
|
|
|
* @param \Exception $e
|
|
|
|
* @throws StorageAuthException
|
|
|
|
*/
|
|
|
|
protected function throwUnavailable(\Exception $e) {
|
|
|
|
$this->logger->logException($e, ['message' => 'Error while getting file info']);
|
|
|
|
throw new StorageAuthException($e->getMessage(), $e);
|
|
|
|
}
|
|
|
|
|
2020-02-10 18:36:03 +03:00
|
|
|
/**
|
|
|
|
* get the acl from fileinfo that is relevant for the configured user
|
|
|
|
*
|
|
|
|
* @param IFileInfo $file
|
|
|
|
* @return ACL|null
|
|
|
|
*/
|
|
|
|
private function getACL(IFileInfo $file): ?ACL {
|
|
|
|
$acls = $file->getAcls();
|
|
|
|
foreach ($acls as $user => $acl) {
|
|
|
|
[, $user] = explode('\\', $user); // strip domain
|
|
|
|
if ($user === $this->server->getAuth()->getUsername()) {
|
|
|
|
return $acl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @return \Icewind\SMB\IFileInfo[]
|
2016-03-16 15:15:54 +03:00
|
|
|
* @throws StorageNotAvailableException
|
2014-08-26 20:46:07 +04:00
|
|
|
*/
|
2020-03-27 19:47:20 +03:00
|
|
|
protected function getFolderContents($path): iterable {
|
2016-03-16 15:15:54 +03:00
|
|
|
try {
|
2020-03-27 19:04:53 +03:00
|
|
|
$path = ltrim($this->buildPath($path), '/');
|
2021-01-29 13:26:19 +03:00
|
|
|
try {
|
|
|
|
$files = $this->share->dir($path);
|
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
throw new NotPermittedException();
|
|
|
|
}
|
2016-03-16 15:15:54 +03:00
|
|
|
foreach ($files as $file) {
|
|
|
|
$this->statCache[$path . '/' . $file->getName()] = $file;
|
|
|
|
}
|
2020-03-27 19:47:20 +03:00
|
|
|
|
|
|
|
foreach ($files as $file) {
|
2018-02-09 19:40:00 +03:00
|
|
|
try {
|
2019-05-23 22:23:56 +03:00
|
|
|
// the isHidden check is done before checking the config boolean to ensure that the metadata is always fetch
|
|
|
|
// so we trigger the below exceptions where applicable
|
|
|
|
$hide = $file->isHidden() && !$this->showHidden;
|
2020-02-10 18:36:03 +03:00
|
|
|
|
|
|
|
if ($this->checkAcl && $acl = $this->getACL($file)) {
|
|
|
|
// if there is no explicit deny, we assume it's allowed
|
|
|
|
// this doesn't take inheritance fully into account but if read permissions is denied for a parent we wouldn't be in this folder
|
|
|
|
// additionally, it's better to have false negatives here then false positives
|
|
|
|
if ($acl->denies(ACL::MASK_READ) || $acl->denies(ACL::MASK_EXECUTE)) {
|
|
|
|
$this->logger->debug('Hiding non readable entry ' . $file->getName());
|
2021-04-20 18:03:20 +03:00
|
|
|
continue;
|
2020-02-10 18:36:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-23 22:23:56 +03:00
|
|
|
if ($hide) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->debug('hiding hidden file ' . $file->getName());
|
|
|
|
}
|
2020-03-27 19:47:20 +03:00
|
|
|
if (!$hide) {
|
|
|
|
yield $file;
|
|
|
|
}
|
2018-02-09 19:40:00 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['level' => ILogger::DEBUG, 'message' => 'Hiding forbidden entry ' . $file->getName()]);
|
2018-02-09 19:40:00 +03:00
|
|
|
} catch (NotFoundException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['level' => ILogger::DEBUG, 'message' => 'Hiding not found entry ' . $file->getName()]);
|
2018-02-09 19:40:00 +03:00
|
|
|
}
|
2020-03-27 19:47:20 +03:00
|
|
|
}
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while getting folder content']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
}
|
2013-06-01 02:06:23 +04:00
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
/**
|
|
|
|
* @param \Icewind\SMB\IFileInfo $info
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
protected function formatInfo($info) {
|
2017-03-27 09:50:03 +03:00
|
|
|
$result = [
|
2014-08-26 20:46:07 +04:00
|
|
|
'size' => $info->getSize(),
|
2017-03-27 09:50:03 +03:00
|
|
|
'mtime' => $info->getMTime(),
|
|
|
|
];
|
|
|
|
if ($info->isDirectory()) {
|
|
|
|
$result['type'] = 'dir';
|
|
|
|
} else {
|
|
|
|
$result['type'] = 'file';
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Rename the files. If the source or the target is the root, the rename won't happen.
|
|
|
|
*
|
|
|
|
* @param string $source the old name of the path
|
|
|
|
* @param string $target the new name of the path
|
|
|
|
* @return bool true if the rename is successful, false otherwise
|
|
|
|
*/
|
2018-06-27 16:33:51 +03:00
|
|
|
public function rename($source, $target, $retry = true) {
|
2017-03-27 09:50:03 +03:00
|
|
|
if ($this->isRootDir($source) || $this->isRootDir($target)) {
|
2017-04-26 17:41:48 +03:00
|
|
|
return false;
|
2017-03-27 09:50:03 +03:00
|
|
|
}
|
|
|
|
|
2017-04-26 17:45:04 +03:00
|
|
|
$absoluteSource = $this->buildPath($source);
|
|
|
|
$absoluteTarget = $this->buildPath($target);
|
2017-03-27 09:50:03 +03:00
|
|
|
try {
|
2017-04-26 17:45:04 +03:00
|
|
|
$result = $this->share->rename($absoluteSource, $absoluteTarget);
|
2017-03-27 09:50:03 +03:00
|
|
|
} catch (AlreadyExistsException $e) {
|
2018-06-27 16:33:51 +03:00
|
|
|
if ($retry) {
|
|
|
|
$this->remove($target);
|
|
|
|
$result = $this->share->rename($absoluteSource, $absoluteTarget, false);
|
|
|
|
} else {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['level' => ILogger::WARN]);
|
2018-06-27 16:33:51 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} catch (InvalidArgumentException $e) {
|
|
|
|
if ($retry) {
|
|
|
|
$this->remove($target);
|
|
|
|
$result = $this->share->rename($absoluteSource, $absoluteTarget, false);
|
|
|
|
} else {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['level' => ILogger::WARN]);
|
2018-06-27 16:33:51 +03:00
|
|
|
return false;
|
|
|
|
}
|
2017-03-27 09:50:03 +03:00
|
|
|
} catch (\Exception $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['level' => ILogger::WARN]);
|
2017-04-26 17:45:04 +03:00
|
|
|
return false;
|
2017-03-27 09:50:03 +03:00
|
|
|
}
|
2017-04-26 17:45:04 +03:00
|
|
|
unset($this->statCache[$absoluteSource], $this->statCache[$absoluteTarget]);
|
2017-04-26 17:41:48 +03:00
|
|
|
return $result;
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
2013-06-01 02:06:23 +04:00
|
|
|
|
2018-08-08 17:07:41 +03:00
|
|
|
public function stat($path, $retry = true) {
|
2017-12-18 17:55:46 +03:00
|
|
|
try {
|
|
|
|
$result = $this->formatInfo($this->getFileInfo($path));
|
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2018-08-08 17:07:41 +03:00
|
|
|
} catch (TimedOutException $e) {
|
|
|
|
if ($retry) {
|
|
|
|
return $this->stat($path, false);
|
|
|
|
} else {
|
|
|
|
throw $e;
|
|
|
|
}
|
2017-12-18 17:55:46 +03:00
|
|
|
}
|
2016-10-10 15:44:53 +03:00
|
|
|
if ($this->remoteIsShare() && $this->isRootDir($path)) {
|
|
|
|
$result['mtime'] = $this->shareMTime();
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get the best guess for the modification time of the share
|
|
|
|
*
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
private function shareMTime() {
|
|
|
|
$highestMTime = 0;
|
|
|
|
$files = $this->share->dir($this->root);
|
|
|
|
foreach ($files as $fileInfo) {
|
2018-02-09 19:40:00 +03:00
|
|
|
try {
|
|
|
|
if ($fileInfo->getMTime() > $highestMTime) {
|
|
|
|
$highestMTime = $fileInfo->getMTime();
|
|
|
|
}
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
// Ignore this, can happen on unavailable DFS shares
|
2019-07-02 14:53:44 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
// Ignore this too - it's a symlink
|
2016-10-10 15:44:53 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $highestMTime;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the path is our root dir (not the smb one)
|
|
|
|
*
|
|
|
|
* @param string $path the path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
private function isRootDir($path) {
|
|
|
|
return $path === '' || $path === '/' || $path === '.';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if our root points to a smb share
|
|
|
|
*
|
|
|
|
* @return bool true if our root points to a share false otherwise
|
|
|
|
*/
|
|
|
|
private function remoteIsShare() {
|
|
|
|
return $this->share->getName() && (!$this->root || $this->root === '/');
|
2012-06-17 04:54:23 +04:00
|
|
|
}
|
|
|
|
|
2013-11-14 21:39:39 +04:00
|
|
|
/**
|
2014-05-15 16:19:32 +04:00
|
|
|
* @param string $path
|
2014-08-26 20:46:07 +04:00
|
|
|
* @return bool
|
2013-11-14 21:39:39 +04:00
|
|
|
*/
|
|
|
|
public function unlink($path) {
|
2017-03-27 09:50:03 +03:00
|
|
|
if ($this->isRootDir($path)) {
|
2017-04-26 17:41:48 +03:00
|
|
|
return false;
|
2017-03-27 09:50:03 +03:00
|
|
|
}
|
|
|
|
|
2015-02-09 15:13:39 +03:00
|
|
|
try {
|
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
return $this->rmdir($path);
|
|
|
|
} else {
|
|
|
|
$path = $this->buildPath($path);
|
|
|
|
unset($this->statCache[$path]);
|
|
|
|
$this->share->del($path);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2016-02-10 18:41:58 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while deleting file']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2013-11-29 15:58:57 +04:00
|
|
|
}
|
2013-11-14 21:39:39 +04:00
|
|
|
}
|
2016-04-07 17:54:37 +03:00
|
|
|
|
2012-06-17 04:54:23 +04:00
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
2014-08-26 20:46:07 +04:00
|
|
|
*
|
2012-10-12 01:17:59 +04:00
|
|
|
* @param string $path
|
2012-06-17 04:54:23 +04:00
|
|
|
* @param int $time
|
|
|
|
* @return bool
|
|
|
|
*/
|
2014-08-26 20:46:07 +04:00
|
|
|
public function hasUpdated($path, $time) {
|
2017-04-26 17:41:48 +03:00
|
|
|
if (!$path and $this->root === '/') {
|
2012-11-30 19:27:11 +04:00
|
|
|
// mtime doesn't work for shares, but giving the nature of the backend,
|
|
|
|
// doing a full update is still just fast enough
|
2012-06-17 04:54:23 +04:00
|
|
|
return true;
|
2012-11-30 19:27:11 +04:00
|
|
|
} else {
|
2014-08-26 20:46:07 +04:00
|
|
|
$actualTime = $this->filemtime($path);
|
|
|
|
return $actualTime > $time;
|
2012-06-17 04:54:23 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-08-26 20:46:07 +04:00
|
|
|
* @param string $path
|
|
|
|
* @param string $mode
|
2016-07-06 00:18:41 +03:00
|
|
|
* @return resource|false
|
2012-06-17 04:54:23 +04:00
|
|
|
*/
|
2014-08-26 20:46:07 +04:00
|
|
|
public function fopen($path, $mode) {
|
|
|
|
$fullPath = $this->buildPath($path);
|
|
|
|
try {
|
|
|
|
switch ($mode) {
|
|
|
|
case 'r':
|
|
|
|
case 'rb':
|
|
|
|
if (!$this->file_exists($path)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return $this->share->read($fullPath);
|
|
|
|
case 'w':
|
|
|
|
case 'wb':
|
2015-12-15 16:20:16 +03:00
|
|
|
$source = $this->share->write($fullPath);
|
|
|
|
return CallBackWrapper::wrap($source, null, null, function () use ($fullPath) {
|
|
|
|
unset($this->statCache[$fullPath]);
|
|
|
|
});
|
2014-08-26 20:46:07 +04:00
|
|
|
case 'a':
|
|
|
|
case 'ab':
|
|
|
|
case 'r+':
|
|
|
|
case 'w+':
|
|
|
|
case 'wb+':
|
|
|
|
case 'a+':
|
|
|
|
case 'x':
|
|
|
|
case 'x+':
|
|
|
|
case 'c':
|
|
|
|
case 'c+':
|
|
|
|
//emulate these
|
|
|
|
if (strrpos($path, '.') !== false) {
|
|
|
|
$ext = substr($path, strrpos($path, '.'));
|
|
|
|
} else {
|
|
|
|
$ext = '';
|
2013-09-04 15:06:04 +04:00
|
|
|
}
|
2014-08-26 20:46:07 +04:00
|
|
|
if ($this->file_exists($path)) {
|
|
|
|
if (!$this->isUpdatable($path)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$tmpFile = $this->getCachedFile($path);
|
|
|
|
} else {
|
|
|
|
if (!$this->isCreatable(dirname($path))) {
|
|
|
|
return false;
|
|
|
|
}
|
2018-03-19 12:52:35 +03:00
|
|
|
$tmpFile = \OC::$server->getTempManager()->getTemporaryFile($ext);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
$source = fopen($tmpFile, $mode);
|
|
|
|
$share = $this->share;
|
2015-12-15 16:20:16 +03:00
|
|
|
return CallbackWrapper::wrap($source, null, null, function () use ($tmpFile, $fullPath, $share) {
|
|
|
|
unset($this->statCache[$fullPath]);
|
2014-08-26 20:46:07 +04:00
|
|
|
$share->put($tmpFile, $fullPath);
|
|
|
|
unlink($tmpFile);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2016-02-10 18:41:58 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
2020-09-17 18:23:33 +03:00
|
|
|
} catch (OutOfSpaceException $e) {
|
|
|
|
throw new EntityTooLargeException("not enough available space to create file", 0, $e);
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while opening file']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function rmdir($path) {
|
2017-03-27 09:50:03 +03:00
|
|
|
if ($this->isRootDir($path)) {
|
2017-04-26 17:41:48 +03:00
|
|
|
return false;
|
2017-03-27 09:50:03 +03:00
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
try {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->statCache = [];
|
2014-08-26 20:46:07 +04:00
|
|
|
$content = $this->share->dir($this->buildPath($path));
|
|
|
|
foreach ($content as $file) {
|
|
|
|
if ($file->isDirectory()) {
|
|
|
|
$this->rmdir($path . '/' . $file->getName());
|
|
|
|
} else {
|
|
|
|
$this->share->del($file->getPath());
|
2012-06-17 04:54:23 +04:00
|
|
|
}
|
|
|
|
}
|
2014-08-26 20:46:07 +04:00
|
|
|
$this->share->rmdir($this->buildPath($path));
|
|
|
|
return true;
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2016-02-10 18:41:58 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while removing folder']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function touch($path, $time = null) {
|
2016-03-16 15:15:54 +03:00
|
|
|
try {
|
|
|
|
if (!$this->file_exists($path)) {
|
|
|
|
$fh = $this->share->write($this->buildPath($path));
|
|
|
|
fclose($fh);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
2020-09-17 18:23:33 +03:00
|
|
|
} catch (OutOfSpaceException $e) {
|
|
|
|
throw new EntityTooLargeException("not enough available space to create file", 0, $e);
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while creating file']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
public function getMetaData($path) {
|
|
|
|
$fileInfo = $this->getFileInfo($path);
|
|
|
|
if (!$fileInfo) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $this->getMetaDataFromFileInfo($fileInfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function getMetaDataFromFileInfo(IFileInfo $fileInfo) {
|
|
|
|
$permissions = Constants::PERMISSION_READ + Constants::PERMISSION_SHARE;
|
|
|
|
|
2021-03-16 17:34:41 +03:00
|
|
|
if (
|
|
|
|
!$fileInfo->isReadOnly() || (
|
|
|
|
$this->rootWritable && $fileInfo->getPath() == $this->buildPath('')
|
|
|
|
)
|
|
|
|
) {
|
2020-03-27 19:47:20 +03:00
|
|
|
$permissions += Constants::PERMISSION_DELETE;
|
|
|
|
$permissions += Constants::PERMISSION_UPDATE;
|
|
|
|
if ($fileInfo->isDirectory()) {
|
|
|
|
$permissions += Constants::PERMISSION_CREATE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$data = [];
|
|
|
|
if ($fileInfo->isDirectory()) {
|
|
|
|
$data['mimetype'] = 'httpd/unix-directory';
|
|
|
|
} else {
|
|
|
|
$data['mimetype'] = \OC::$server->getMimeTypeDetector()->detectPath($fileInfo->getPath());
|
|
|
|
}
|
|
|
|
$data['mtime'] = $fileInfo->getMTime();
|
|
|
|
if ($fileInfo->isDirectory()) {
|
|
|
|
$data['size'] = -1; //unknown
|
|
|
|
} else {
|
|
|
|
$data['size'] = $fileInfo->getSize();
|
|
|
|
}
|
|
|
|
$data['etag'] = $this->getETag($fileInfo->getPath());
|
|
|
|
$data['storage_mtime'] = $data['mtime'];
|
|
|
|
$data['permissions'] = $permissions;
|
|
|
|
$data['name'] = $fileInfo->getName();
|
|
|
|
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
public function opendir($path) {
|
2016-02-10 18:41:58 +03:00
|
|
|
try {
|
|
|
|
$files = $this->getFolderContents($path);
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2021-01-29 13:26:19 +03:00
|
|
|
} catch (NotPermittedException $e) {
|
2016-02-10 18:41:58 +03:00
|
|
|
return false;
|
|
|
|
}
|
2014-08-26 20:46:07 +04:00
|
|
|
$names = array_map(function ($info) {
|
|
|
|
/** @var \Icewind\SMB\IFileInfo $info */
|
|
|
|
return $info->getName();
|
2020-03-27 19:47:20 +03:00
|
|
|
}, iterator_to_array($files));
|
2014-08-26 20:46:07 +04:00
|
|
|
return IteratorDirectory::wrap($names);
|
|
|
|
}
|
|
|
|
|
2020-03-27 19:47:20 +03:00
|
|
|
public function getDirectoryContent($directory): \Traversable {
|
|
|
|
$files = $this->getFolderContents($directory);
|
|
|
|
foreach ($files as $file) {
|
|
|
|
yield $this->getMetaDataFromFileInfo($file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-26 20:46:07 +04:00
|
|
|
public function filetype($path) {
|
|
|
|
try {
|
|
|
|
return $this->getFileInfo($path)->isDirectory() ? 'dir' : 'file';
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2016-02-10 18:41:58 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
2014-08-26 20:46:07 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function mkdir($path) {
|
|
|
|
$path = $this->buildPath($path);
|
|
|
|
try {
|
|
|
|
$this->share->mkdir($path);
|
|
|
|
return true;
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e, ['message' => 'Error while creating folder']);
|
2016-03-16 15:15:54 +03:00
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2014-08-26 20:46:07 +04:00
|
|
|
} catch (Exception $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function file_exists($path) {
|
|
|
|
try {
|
|
|
|
$this->getFileInfo($path);
|
|
|
|
return true;
|
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
2016-02-10 18:41:58 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
2016-03-16 15:15:54 +03:00
|
|
|
} catch (ConnectException $e) {
|
|
|
|
throw new StorageNotAvailableException($e->getMessage(), $e->getCode(), $e);
|
2012-06-17 04:54:23 +04:00
|
|
|
}
|
2012-05-24 20:22:33 +04:00
|
|
|
}
|
2013-08-02 17:44:56 +04:00
|
|
|
|
2016-03-21 16:35:41 +03:00
|
|
|
public function isReadable($path) {
|
|
|
|
try {
|
|
|
|
$info = $this->getFileInfo($path);
|
2019-05-23 22:23:56 +03:00
|
|
|
return $this->showHidden || !$info->isHidden();
|
2016-03-21 16:35:41 +03:00
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function isUpdatable($path) {
|
2016-07-20 15:22:04 +03:00
|
|
|
try {
|
|
|
|
$info = $this->getFileInfo($path);
|
|
|
|
// following windows behaviour for read-only folders: they can be written into
|
|
|
|
// (https://support.microsoft.com/en-us/kb/326549 - "cause" section)
|
2019-05-23 22:23:56 +03:00
|
|
|
return ($this->showHidden || !$info->isHidden()) && (!$info->isReadOnly() || $this->is_dir($path));
|
2016-07-20 15:22:04 +03:00
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function isDeletable($path) {
|
2016-03-21 16:35:41 +03:00
|
|
|
try {
|
|
|
|
$info = $this->getFileInfo($path);
|
2019-05-23 22:23:56 +03:00
|
|
|
return ($this->showHidden || !$info->isHidden()) && !$info->isReadOnly();
|
2016-03-21 16:35:41 +03:00
|
|
|
} catch (NotFoundException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (ForbiddenException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-02 17:44:56 +04:00
|
|
|
/**
|
|
|
|
* check if smbclient is installed
|
|
|
|
*/
|
|
|
|
public static function checkDependencies() {
|
2016-01-06 14:51:56 +03:00
|
|
|
return (
|
|
|
|
(bool)\OC_Helper::findBinaryPath('smbclient')
|
2018-06-21 17:02:51 +03:00
|
|
|
|| NativeServer::available(new System())
|
2016-01-06 14:51:56 +03:00
|
|
|
) ? true : ['smbclient'];
|
2013-08-02 17:44:56 +04:00
|
|
|
}
|
2015-12-03 14:28:52 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Test a storage for availability
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function test() {
|
|
|
|
try {
|
|
|
|
return parent::test();
|
|
|
|
} catch (Exception $e) {
|
2018-08-15 16:08:50 +03:00
|
|
|
$this->logger->logException($e);
|
2015-12-03 14:28:52 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2016-07-14 15:46:01 +03:00
|
|
|
|
|
|
|
public function listen($path, callable $callback) {
|
2017-01-06 17:39:01 +03:00
|
|
|
$this->notify($path)->listen(function (IChange $change) use ($callback) {
|
|
|
|
if ($change instanceof IRenameChange) {
|
|
|
|
return $callback($change->getType(), $change->getPath(), $change->getTargetPath());
|
2016-07-14 15:46:01 +03:00
|
|
|
} else {
|
2017-01-06 17:39:01 +03:00
|
|
|
return $callback($change->getType(), $change->getPath());
|
2016-07-14 15:46:01 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-01-06 17:39:01 +03:00
|
|
|
public function notify($path) {
|
2017-01-06 18:34:29 +03:00
|
|
|
$path = '/' . ltrim($path, '/');
|
2017-01-06 17:39:01 +03:00
|
|
|
$shareNotifyHandler = $this->share->notify($this->buildPath($path));
|
|
|
|
return new SMBNotifyHandler($shareNotifyHandler, $this->root);
|
2016-07-14 15:46:01 +03:00
|
|
|
}
|
2012-05-24 20:22:33 +04:00
|
|
|
}
|