summaryrefslogtreecommitdiffstats
path: root/apps/dav/lib/BundleUpload/BundledFile.php
diff options
context:
space:
mode:
Diffstat (limited to 'apps/dav/lib/BundleUpload/BundledFile.php')
-rw-r--r--apps/dav/lib/BundleUpload/BundledFile.php214
1 files changed, 214 insertions, 0 deletions
diff --git a/apps/dav/lib/BundleUpload/BundledFile.php b/apps/dav/lib/BundleUpload/BundledFile.php
new file mode 100644
index 00000000000..db9b5bbd3fe
--- /dev/null
+++ b/apps/dav/lib/BundleUpload/BundledFile.php
@@ -0,0 +1,214 @@
+<?php
+/**
+ * @author Piotr Mrowczynski <Piotr.Mrowczynski@owncloud.com>
+ * @author Louis Chemineau <louis@chmn.me>
+ *
+ * @copyright Copyright (c) 2016, ownCloud GmbH.
+ * @license AGPL-3.0
+ *
+ * This code is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License, version 3,
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License, version 3,
+ * along with this program. If not, see <http://www.gnu.org/licenses/>
+ *
+ */
+
+namespace OCA\DAV\BundleUpload;
+
+use OCA\DAV\Connector\Sabre\Exception\FileLocked;
+use OCP\Files\StorageNotAvailableException;
+use OCP\Lock\ILockingProvider;
+use OCP\Lock\LockedException;
+use Sabre\DAV\Exception;
+use Sabre\DAV\Exception\Forbidden;
+use Sabre\DAV\Exception\ServiceUnavailable;
+use OCA\DAV\Connector\Sabre\File;
+use OCA\DAV\Connector\Sabre\Exception\EntityTooLarge;
+use OCA\DAV\Connector\Sabre\Exception\Forbidden as DAVForbiddenException;
+use OCA\DAV\Connector\Sabre\Exception\UnsupportedMediaType;
+use OCP\Files\ForbiddenException;
+use Sabre\DAV\Exception\BadRequest;
+
+class BundledFile extends File {
+
+
+ /**
+ * This class is a wrapper around the bundled request body and provides access to its contents
+ *
+ * @var \OCA\DAV\BundleUpload\MultipartContentsParser
+ *
+ */
+ private $contentHandler;
+
+ public function __construct($view, $info, $contentHandler){
+ $this->contentHandler = $contentHandler;
+ parent::__construct($view, $info);
+ }
+ /**
+ * Updates the data
+ *
+ * The $data['data] argument is a readable stream resource.
+ * The other $data key-values should be header fields in form of string
+ *
+ * After a successful put operation, you may choose to return an ETag. The
+ * ETag must always be surrounded by double-quotes. These quotes must
+ * appear in the actual string you're returning.
+ *
+ * Clients may use the ETag from a PUT request to later on make sure that
+ * when they update the file, the contents haven't changed in the mean
+ * time.
+ *
+ * If you don't plan to store the file byte-by-byte, and you return a
+ * different object on a subsequent GET you are strongly recommended to not
+ * return an ETag, and just return null.
+ *
+ * @param array $data
+ *
+ * @throws Forbidden
+ * @throws UnsupportedMediaType
+ * @throws BadRequest
+ * @throws Exception
+ * @throws EntityTooLarge
+ * @throws ServiceUnavailable
+ * @throws FileLocked
+ * @return array $properties
+ */
+ public function putFile($data) {
+ $properties = array();
+
+ if (!isset($data['oc-total-length'])) {
+ //this should not happen, since upper layer takes care of that
+ //Thus, return Forbidden as sign of code inconsistency
+ throw new Forbidden('File requires oc-total-length header to be read');
+ }
+
+ try {
+ $exists = $this->fileView->file_exists($this->path);
+ if ($this->info && $exists) {
+ $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']);
+ throw new Forbidden('Bundling not supported for already existing files');
+ }
+ } catch (StorageNotAvailableException $e) {
+ $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']);
+ throw new ServiceUnavailable("StorageNotAvailableException raised");
+ }
+
+ // verify path of the target
+ $this->verifyPath();
+
+ $partFilePath = $this->getPartFileBasePath($this->path) . '.ocTransferId' . rand();
+
+ // the part file and target file might be on a different storage in case of a single file storage (e.g. single file share)
+ /** @var \OC\Files\Storage\Storage $partStorage */
+ list($partStorage, $internalPartPath) = $this->fileView->resolvePath($partFilePath);
+ /** @var \OC\Files\Storage\Storage $storage */
+ list($storage, $internalPath) = $this->fileView->resolvePath($this->path);
+ try {
+ $target = $partStorage->fopen($internalPartPath, 'wb');
+ if ($target === false || $target === null) {
+ \OCP\Util::writeLog('webdav', '\OC\Files\Filesystem::fopen() failed', \OCP\Util::ERROR);
+ // because we have no clue about the cause we can only throw back a 500/Internal Server Error
+ $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']);
+ throw new Exception('Could not write file contents');
+ }
+
+ $result = $this->contentHandler->streamReadToStream($target, $data['oc-total-length']);
+
+ if ($result === false) {
+ throw new Exception('Error while copying file to target location (expected filesize: ' . $data['oc-total-length'] . ' )');
+ }
+
+ } catch (\Exception $e) {
+ $partStorage->unlink($internalPartPath);
+ $this->convertToSabreException($e);
+ }
+
+ try {
+ $view = \OC\Files\Filesystem::getView();
+ if ($view) {
+ $run = $this->emitPreHooks($exists);
+ } else {
+ $run = true;
+ }
+
+ try {
+ $this->changeLock(ILockingProvider::LOCK_EXCLUSIVE);
+ } catch (LockedException $e) {
+ $partStorage->unlink($internalPartPath);
+ throw new FileLocked($e->getMessage(), $e->getCode(), $e);
+ }
+
+ try {
+ if ($run) {
+ $renameOkay = $storage->moveFromStorage($partStorage, $internalPartPath, $internalPath);
+ $fileExists = $storage->file_exists($internalPath);
+ }
+ if (!$run || $renameOkay === false || $fileExists === false) {
+ \OCP\Util::writeLog('webdav', 'renaming part file to final file failed', \OCP\Util::ERROR);
+ throw new Exception('Could not rename part file to final file');
+ }
+ } catch (ForbiddenException $ex) {
+ throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
+ } catch (\Exception $e) {
+ $partStorage->unlink($internalPartPath);
+ $this->convertToSabreException($e);
+ }
+
+ // since we skipped the view we need to scan and emit the hooks ourselves
+ $storage->getUpdater()->update($internalPath);
+
+ try {
+ $this->changeLock(ILockingProvider::LOCK_SHARED);
+ } catch (LockedException $e) {
+ throw new FileLocked($e->getMessage(), $e->getCode(), $e);
+ }
+
+ if ($view) {
+ $this->emitPostHooks($exists);
+ }
+
+ // allow sync clients to send the mtime along in a header
+ if (isset($data['oc-mtime'])) {
+ if ($this->fileView->touch($this->path, $data['oc-mtime'])) {
+ $properties['{DAV:}oc-mtime'] = 'accepted';
+ }
+ }
+
+ $this->refreshInfo();
+
+ if (isset($data['oc-checksum'])) {
+ $checksum = trim($data['oc-checksum']);
+ $this->fileView->putFileInfo($this->path, ['checksum' => $checksum]);
+ $this->refreshInfo();
+ } else if ($this->getChecksum() !== null && $this->getChecksum() !== '') {
+ $this->fileView->putFileInfo($this->path, ['checksum' => '']);
+ $this->refreshInfo();
+ }
+
+ } catch (StorageNotAvailableException $e) {
+ throw new ServiceUnavailable("Failed to check file size: " . $e->getMessage());
+ }
+
+ $etag = $this->getEtag();
+ $properties['{DAV:}etag'] = $etag;
+ $properties['{DAV:}oc-etag'] = $etag;
+ $properties['{DAV:}oc-fileid'] = $this->getFileId();
+ return $properties;
+ }
+
+ /*
+ * @param resource $data
+ *
+ * @throws Forbidden
+ */
+ public function put($data) {
+ throw new Forbidden('PUT method not supported for bundling');
+ }
+} \ No newline at end of file