diff options
Diffstat (limited to 'apps/dav/lib/BundleUpload/BundledFile.php')
-rw-r--r-- | apps/dav/lib/BundleUpload/BundledFile.php | 214 |
1 files changed, 214 insertions, 0 deletions
diff --git a/apps/dav/lib/BundleUpload/BundledFile.php b/apps/dav/lib/BundleUpload/BundledFile.php new file mode 100644 index 00000000000..db9b5bbd3fe --- /dev/null +++ b/apps/dav/lib/BundleUpload/BundledFile.php @@ -0,0 +1,214 @@ +<?php +/** + * @author Piotr Mrowczynski <Piotr.Mrowczynski@owncloud.com> + * @author Louis Chemineau <louis@chmn.me> + * + * @copyright Copyright (c) 2016, ownCloud GmbH. + * @license AGPL-3.0 + * + * This code is free software: you can redistribute it and/or modify + * it under the terms of the GNU Affero General Public License, version 3, + * as published by the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU Affero General Public License for more details. + * + * You should have received a copy of the GNU Affero General Public License, version 3, + * along with this program. If not, see <http://www.gnu.org/licenses/> + * + */ + +namespace OCA\DAV\BundleUpload; + +use OCA\DAV\Connector\Sabre\Exception\FileLocked; +use OCP\Files\StorageNotAvailableException; +use OCP\Lock\ILockingProvider; +use OCP\Lock\LockedException; +use Sabre\DAV\Exception; +use Sabre\DAV\Exception\Forbidden; +use Sabre\DAV\Exception\ServiceUnavailable; +use OCA\DAV\Connector\Sabre\File; +use OCA\DAV\Connector\Sabre\Exception\EntityTooLarge; +use OCA\DAV\Connector\Sabre\Exception\Forbidden as DAVForbiddenException; +use OCA\DAV\Connector\Sabre\Exception\UnsupportedMediaType; +use OCP\Files\ForbiddenException; +use Sabre\DAV\Exception\BadRequest; + +class BundledFile extends File { + + + /** + * This class is a wrapper around the bundled request body and provides access to its contents + * + * @var \OCA\DAV\BundleUpload\MultipartContentsParser + * + */ + private $contentHandler; + + public function __construct($view, $info, $contentHandler){ + $this->contentHandler = $contentHandler; + parent::__construct($view, $info); + } + /** + * Updates the data + * + * The $data['data] argument is a readable stream resource. + * The other $data key-values should be header fields in form of string + * + * After a successful put operation, you may choose to return an ETag. The + * ETag must always be surrounded by double-quotes. These quotes must + * appear in the actual string you're returning. + * + * Clients may use the ETag from a PUT request to later on make sure that + * when they update the file, the contents haven't changed in the mean + * time. + * + * If you don't plan to store the file byte-by-byte, and you return a + * different object on a subsequent GET you are strongly recommended to not + * return an ETag, and just return null. + * + * @param array $data + * + * @throws Forbidden + * @throws UnsupportedMediaType + * @throws BadRequest + * @throws Exception + * @throws EntityTooLarge + * @throws ServiceUnavailable + * @throws FileLocked + * @return array $properties + */ + public function putFile($data) { + $properties = array(); + + if (!isset($data['oc-total-length'])) { + //this should not happen, since upper layer takes care of that + //Thus, return Forbidden as sign of code inconsistency + throw new Forbidden('File requires oc-total-length header to be read'); + } + + try { + $exists = $this->fileView->file_exists($this->path); + if ($this->info && $exists) { + $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']); + throw new Forbidden('Bundling not supported for already existing files'); + } + } catch (StorageNotAvailableException $e) { + $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']); + throw new ServiceUnavailable("StorageNotAvailableException raised"); + } + + // verify path of the target + $this->verifyPath(); + + $partFilePath = $this->getPartFileBasePath($this->path) . '.ocTransferId' . rand(); + + // the part file and target file might be on a different storage in case of a single file storage (e.g. single file share) + /** @var \OC\Files\Storage\Storage $partStorage */ + list($partStorage, $internalPartPath) = $this->fileView->resolvePath($partFilePath); + /** @var \OC\Files\Storage\Storage $storage */ + list($storage, $internalPath) = $this->fileView->resolvePath($this->path); + try { + $target = $partStorage->fopen($internalPartPath, 'wb'); + if ($target === false || $target === null) { + \OCP\Util::writeLog('webdav', '\OC\Files\Filesystem::fopen() failed', \OCP\Util::ERROR); + // because we have no clue about the cause we can only throw back a 500/Internal Server Error + $this->contentHandler->multipartContentSeekToContentLength($data['oc-total-length']); + throw new Exception('Could not write file contents'); + } + + $result = $this->contentHandler->streamReadToStream($target, $data['oc-total-length']); + + if ($result === false) { + throw new Exception('Error while copying file to target location (expected filesize: ' . $data['oc-total-length'] . ' )'); + } + + } catch (\Exception $e) { + $partStorage->unlink($internalPartPath); + $this->convertToSabreException($e); + } + + try { + $view = \OC\Files\Filesystem::getView(); + if ($view) { + $run = $this->emitPreHooks($exists); + } else { + $run = true; + } + + try { + $this->changeLock(ILockingProvider::LOCK_EXCLUSIVE); + } catch (LockedException $e) { + $partStorage->unlink($internalPartPath); + throw new FileLocked($e->getMessage(), $e->getCode(), $e); + } + + try { + if ($run) { + $renameOkay = $storage->moveFromStorage($partStorage, $internalPartPath, $internalPath); + $fileExists = $storage->file_exists($internalPath); + } + if (!$run || $renameOkay === false || $fileExists === false) { + \OCP\Util::writeLog('webdav', 'renaming part file to final file failed', \OCP\Util::ERROR); + throw new Exception('Could not rename part file to final file'); + } + } catch (ForbiddenException $ex) { + throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry()); + } catch (\Exception $e) { + $partStorage->unlink($internalPartPath); + $this->convertToSabreException($e); + } + + // since we skipped the view we need to scan and emit the hooks ourselves + $storage->getUpdater()->update($internalPath); + + try { + $this->changeLock(ILockingProvider::LOCK_SHARED); + } catch (LockedException $e) { + throw new FileLocked($e->getMessage(), $e->getCode(), $e); + } + + if ($view) { + $this->emitPostHooks($exists); + } + + // allow sync clients to send the mtime along in a header + if (isset($data['oc-mtime'])) { + if ($this->fileView->touch($this->path, $data['oc-mtime'])) { + $properties['{DAV:}oc-mtime'] = 'accepted'; + } + } + + $this->refreshInfo(); + + if (isset($data['oc-checksum'])) { + $checksum = trim($data['oc-checksum']); + $this->fileView->putFileInfo($this->path, ['checksum' => $checksum]); + $this->refreshInfo(); + } else if ($this->getChecksum() !== null && $this->getChecksum() !== '') { + $this->fileView->putFileInfo($this->path, ['checksum' => '']); + $this->refreshInfo(); + } + + } catch (StorageNotAvailableException $e) { + throw new ServiceUnavailable("Failed to check file size: " . $e->getMessage()); + } + + $etag = $this->getEtag(); + $properties['{DAV:}etag'] = $etag; + $properties['{DAV:}oc-etag'] = $etag; + $properties['{DAV:}oc-fileid'] = $this->getFileId(); + return $properties; + } + + /* + * @param resource $data + * + * @throws Forbidden + */ + public function put($data) { + throw new Forbidden('PUT method not supported for bundling'); + } +}
\ No newline at end of file |