123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633 |
- <?php
- /**
- * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- namespace OCA\DAV\Connector\Sabre;
- use Icewind\Streams\CallbackWrapper;
- use OC\AppFramework\Http\Request;
- use OC\Files\Filesystem;
- use OC\Files\Stream\HashWrapper;
- use OC\Files\View;
- use OCA\DAV\AppInfo\Application;
- use OCA\DAV\Connector\Sabre\Exception\BadGateway;
- use OCA\DAV\Connector\Sabre\Exception\EntityTooLarge;
- use OCA\DAV\Connector\Sabre\Exception\FileLocked;
- use OCA\DAV\Connector\Sabre\Exception\Forbidden as DAVForbiddenException;
- use OCA\DAV\Connector\Sabre\Exception\UnsupportedMediaType;
- use OCP\App\IAppManager;
- use OCP\Encryption\Exceptions\GenericEncryptionException;
- use OCP\Files\EntityTooLargeException;
- use OCP\Files\FileInfo;
- use OCP\Files\ForbiddenException;
- use OCP\Files\GenericFileException;
- use OCP\Files\InvalidContentException;
- use OCP\Files\InvalidPathException;
- use OCP\Files\LockNotAcquiredException;
- use OCP\Files\NotFoundException;
- use OCP\Files\NotPermittedException;
- use OCP\Files\Storage\IWriteStreamStorage;
- use OCP\Files\StorageNotAvailableException;
- use OCP\IL10N;
- use OCP\IRequest;
- use OCP\L10N\IFactory as IL10NFactory;
- use OCP\Lock\ILockingProvider;
- use OCP\Lock\LockedException;
- use OCP\Server;
- use OCP\Share\IManager;
- use Psr\Log\LoggerInterface;
- use Sabre\DAV\Exception;
- use Sabre\DAV\Exception\BadRequest;
- use Sabre\DAV\Exception\Forbidden;
- use Sabre\DAV\Exception\NotFound;
- use Sabre\DAV\Exception\ServiceUnavailable;
- use Sabre\DAV\IFile;
- class File extends Node implements IFile {
- protected IRequest $request;
- protected IL10N $l10n;
- /**
- * Sets up the node, expects a full path name
- *
- * @param View $view
- * @param FileInfo $info
- * @param ?\OCP\Share\IManager $shareManager
- * @param ?IRequest $request
- * @param ?IL10N $l10n
- */
- public function __construct(View $view, FileInfo $info, ?IManager $shareManager = null, ?IRequest $request = null, ?IL10N $l10n = null) {
- parent::__construct($view, $info, $shareManager);
- if ($l10n) {
- $this->l10n = $l10n;
- } else {
- // Querying IL10N directly results in a dependency loop
- /** @var IL10NFactory $l10nFactory */
- $l10nFactory = \OC::$server->get(IL10NFactory::class);
- $this->l10n = $l10nFactory->get(Application::APP_ID);
- }
- if (isset($request)) {
- $this->request = $request;
- } else {
- $this->request = \OC::$server->get(IRequest::class);
- }
- }
- /**
- * Updates the data
- *
- * The data argument is a readable stream resource.
- *
- * After a successful put operation, you may choose to return an ETag. The
- * etag must always be surrounded by double-quotes. These quotes must
- * appear in the actual string you're returning.
- *
- * Clients may use the ETag from a PUT request to later on make sure that
- * when they update the file, the contents haven't changed in the mean
- * time.
- *
- * If you don't plan to store the file byte-by-byte, and you return a
- * different object on a subsequent GET you are strongly recommended to not
- * return an ETag, and just return null.
- *
- * @param resource|string $data
- *
- * @throws Forbidden
- * @throws UnsupportedMediaType
- * @throws BadRequest
- * @throws Exception
- * @throws EntityTooLarge
- * @throws ServiceUnavailable
- * @throws FileLocked
- * @return string|null
- */
- public function put($data) {
- try {
- $exists = $this->fileView->file_exists($this->path);
- if ($exists && !$this->info->isUpdateable()) {
- throw new Forbidden();
- }
- } catch (StorageNotAvailableException $e) {
- throw new ServiceUnavailable($this->l10n->t('File is not updatable: %1$s', [$e->getMessage()]));
- }
- // verify path of the target
- $this->verifyPath();
- [$partStorage] = $this->fileView->resolvePath($this->path);
- if ($partStorage === null) {
- throw new ServiceUnavailable($this->l10n->t('Failed to get storage for file'));
- }
- $needsPartFile = $partStorage->needsPartFile() && (strlen($this->path) > 1);
- $view = Filesystem::getView();
- if ($needsPartFile) {
- // mark file as partial while uploading (ignored by the scanner)
- $partFilePath = $this->getPartFileBasePath($this->path) . '.ocTransferId' . rand() . '.part';
- if (!$view->isCreatable($partFilePath) && $view->isUpdatable($this->path)) {
- $needsPartFile = false;
- }
- }
- if (!$needsPartFile) {
- // upload file directly as the final path
- $partFilePath = $this->path;
- if ($view && !$this->emitPreHooks($exists)) {
- throw new Exception($this->l10n->t('Could not write to final file, canceled by hook'));
- }
- }
- // the part file and target file might be on a different storage in case of a single file storage (e.g. single file share)
- [$partStorage, $internalPartPath] = $this->fileView->resolvePath($partFilePath);
- [$storage, $internalPath] = $this->fileView->resolvePath($this->path);
- if ($partStorage === null || $storage === null) {
- throw new ServiceUnavailable($this->l10n->t('Failed to get storage for file'));
- }
- try {
- if (!$needsPartFile) {
- try {
- $this->changeLock(ILockingProvider::LOCK_EXCLUSIVE);
- } catch (LockedException $e) {
- // during very large uploads, the shared lock we got at the start might have been expired
- // meaning that the above lock can fail not just only because somebody else got a shared lock
- // or because there is no existing shared lock to make exclusive
- //
- // Thus we try to get a new exclusive lock, if the original lock failed because of a different shared
- // lock this will still fail, if our original shared lock expired the new lock will be successful and
- // the entire operation will be safe
- try {
- $this->acquireLock(ILockingProvider::LOCK_EXCLUSIVE);
- } catch (LockedException $ex) {
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- }
- }
- if (!is_resource($data)) {
- $tmpData = fopen('php://temp', 'r+');
- if ($data !== null) {
- fwrite($tmpData, $data);
- rewind($tmpData);
- }
- $data = $tmpData;
- }
- if ($this->request->getHeader('X-HASH') !== '') {
- $hash = $this->request->getHeader('X-HASH');
- if ($hash === 'all' || $hash === 'md5') {
- $data = HashWrapper::wrap($data, 'md5', function ($hash): void {
- $this->header('X-Hash-MD5: ' . $hash);
- });
- }
- if ($hash === 'all' || $hash === 'sha1') {
- $data = HashWrapper::wrap($data, 'sha1', function ($hash): void {
- $this->header('X-Hash-SHA1: ' . $hash);
- });
- }
- if ($hash === 'all' || $hash === 'sha256') {
- $data = HashWrapper::wrap($data, 'sha256', function ($hash): void {
- $this->header('X-Hash-SHA256: ' . $hash);
- });
- }
- }
- if ($partStorage->instanceOfStorage(IWriteStreamStorage::class)) {
- $isEOF = false;
- $wrappedData = CallbackWrapper::wrap($data, null, null, null, null, function ($stream) use (&$isEOF): void {
- $isEOF = feof($stream);
- });
- $result = true;
- $count = -1;
- try {
- $count = $partStorage->writeStream($internalPartPath, $wrappedData);
- } catch (GenericFileException $e) {
- $result = false;
- } catch (BadGateway $e) {
- throw $e;
- }
- if ($result === false) {
- $result = $isEOF;
- if (is_resource($wrappedData)) {
- $result = feof($wrappedData);
- }
- }
- } else {
- $target = $partStorage->fopen($internalPartPath, 'wb');
- if ($target === false) {
- \OC::$server->get(LoggerInterface::class)->error('\OC\Files\Filesystem::fopen() failed', ['app' => 'webdav']);
- // because we have no clue about the cause we can only throw back a 500/Internal Server Error
- throw new Exception($this->l10n->t('Could not write file contents'));
- }
- [$count, $result] = \OC_Helper::streamCopy($data, $target);
- fclose($target);
- }
- if ($result === false) {
- $expected = -1;
- $lengthHeader = $this->request->getHeader('content-length');
- if ($lengthHeader) {
- $expected = (int)$lengthHeader;
- }
- if ($expected !== 0) {
- throw new Exception(
- $this->l10n->t(
- 'Error while copying file to target location (copied: %1$s, expected filesize: %2$s)',
- [
- $this->l10n->n('%n byte', '%n bytes', $count),
- $this->l10n->n('%n byte', '%n bytes', $expected),
- ],
- )
- );
- }
- }
- // if content length is sent by client:
- // double check if the file was fully received
- // compare expected and actual size
- $lengthHeader = $this->request->getHeader('content-length');
- if ($lengthHeader && $this->request->getMethod() === 'PUT') {
- $expected = (int)$lengthHeader;
- if ($count !== $expected) {
- throw new BadRequest(
- $this->l10n->t(
- 'Expected filesize of %1$s but read (from Nextcloud client) and wrote (to Nextcloud storage) %2$s. Could either be a network problem on the sending side or a problem writing to the storage on the server side.',
- [
- $this->l10n->n('%n byte', '%n bytes', $expected),
- $this->l10n->n('%n byte', '%n bytes', $count),
- ],
- )
- );
- }
- }
- } catch (\Exception $e) {
- if ($e instanceof LockedException) {
- \OC::$server->get(LoggerInterface::class)->debug($e->getMessage(), ['exception' => $e]);
- } else {
- \OC::$server->get(LoggerInterface::class)->error($e->getMessage(), ['exception' => $e]);
- }
- if ($needsPartFile) {
- $partStorage->unlink($internalPartPath);
- }
- $this->convertToSabreException($e);
- }
- try {
- if ($needsPartFile) {
- if ($view && !$this->emitPreHooks($exists)) {
- $partStorage->unlink($internalPartPath);
- throw new Exception($this->l10n->t('Could not rename part file to final file, canceled by hook'));
- }
- try {
- $this->changeLock(ILockingProvider::LOCK_EXCLUSIVE);
- } catch (LockedException $e) {
- // during very large uploads, the shared lock we got at the start might have been expired
- // meaning that the above lock can fail not just only because somebody else got a shared lock
- // or because there is no existing shared lock to make exclusive
- //
- // Thus we try to get a new exclusive lock, if the original lock failed because of a different shared
- // lock this will still fail, if our original shared lock expired the new lock will be successful and
- // the entire operation will be safe
- try {
- $this->acquireLock(ILockingProvider::LOCK_EXCLUSIVE);
- } catch (LockedException $ex) {
- if ($needsPartFile) {
- $partStorage->unlink($internalPartPath);
- }
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- }
- // rename to correct path
- try {
- $renameOkay = $storage->moveFromStorage($partStorage, $internalPartPath, $internalPath);
- $fileExists = $storage->file_exists($internalPath);
- if ($renameOkay === false || $fileExists === false) {
- \OC::$server->get(LoggerInterface::class)->error('renaming part file to final file failed $renameOkay: ' . ($renameOkay ? 'true' : 'false') . ', $fileExists: ' . ($fileExists ? 'true' : 'false') . ')', ['app' => 'webdav']);
- throw new Exception($this->l10n->t('Could not rename part file to final file'));
- }
- } catch (ForbiddenException $ex) {
- if (!$ex->getRetry()) {
- $partStorage->unlink($internalPartPath);
- }
- throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
- } catch (\Exception $e) {
- $partStorage->unlink($internalPartPath);
- $this->convertToSabreException($e);
- }
- }
- // since we skipped the view we need to scan and emit the hooks ourselves
- $storage->getUpdater()->update($internalPath);
- try {
- $this->changeLock(ILockingProvider::LOCK_SHARED);
- } catch (LockedException $e) {
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- // allow sync clients to send the mtime along in a header
- $mtimeHeader = $this->request->getHeader('x-oc-mtime');
- if ($mtimeHeader !== '') {
- $mtime = $this->sanitizeMtime($mtimeHeader);
- if ($this->fileView->touch($this->path, $mtime)) {
- $this->header('X-OC-MTime: accepted');
- }
- }
- $fileInfoUpdate = [
- 'upload_time' => time()
- ];
- // allow sync clients to send the creation time along in a header
- $ctimeHeader = $this->request->getHeader('x-oc-ctime');
- if ($ctimeHeader) {
- $ctime = $this->sanitizeMtime($ctimeHeader);
- $fileInfoUpdate['creation_time'] = $ctime;
- $this->header('X-OC-CTime: accepted');
- }
- $this->fileView->putFileInfo($this->path, $fileInfoUpdate);
- if ($view) {
- $this->emitPostHooks($exists);
- }
- $this->refreshInfo();
- $checksumHeader = $this->request->getHeader('oc-checksum');
- if ($checksumHeader) {
- $checksum = trim($checksumHeader);
- $this->setChecksum($checksum);
- } elseif ($this->getChecksum() !== null && $this->getChecksum() !== '') {
- $this->setChecksum('');
- }
- } catch (StorageNotAvailableException $e) {
- throw new ServiceUnavailable($this->l10n->t('Failed to check file size: %1$s', [$e->getMessage()]), 0, $e);
- }
- return '"' . $this->info->getEtag() . '"';
- }
- private function getPartFileBasePath($path) {
- $partFileInStorage = \OC::$server->getConfig()->getSystemValue('part_file_in_storage', true);
- if ($partFileInStorage) {
- return $path;
- } else {
- return md5($path); // will place it in the root of the view with a unique name
- }
- }
- private function emitPreHooks(bool $exists, ?string $path = null): bool {
- if (is_null($path)) {
- $path = $this->path;
- }
- $hookPath = Filesystem::getView()->getRelativePath($this->fileView->getAbsolutePath($path));
- if ($hookPath === null) {
- // We only trigger hooks from inside default view
- return true;
- }
- $run = true;
- if (!$exists) {
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_create, [
- Filesystem::signal_param_path => $hookPath,
- Filesystem::signal_param_run => &$run,
- ]);
- } else {
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_update, [
- Filesystem::signal_param_path => $hookPath,
- Filesystem::signal_param_run => &$run,
- ]);
- }
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_write, [
- Filesystem::signal_param_path => $hookPath,
- Filesystem::signal_param_run => &$run,
- ]);
- return $run;
- }
- private function emitPostHooks(bool $exists, ?string $path = null): void {
- if (is_null($path)) {
- $path = $this->path;
- }
- $hookPath = Filesystem::getView()->getRelativePath($this->fileView->getAbsolutePath($path));
- if ($hookPath === null) {
- // We only trigger hooks from inside default view
- return;
- }
- if (!$exists) {
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_post_create, [
- Filesystem::signal_param_path => $hookPath
- ]);
- } else {
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_post_update, [
- Filesystem::signal_param_path => $hookPath
- ]);
- }
- \OC_Hook::emit(Filesystem::CLASSNAME, Filesystem::signal_post_write, [
- Filesystem::signal_param_path => $hookPath
- ]);
- }
- /**
- * Returns the data
- *
- * @return resource
- * @throws Forbidden
- * @throws ServiceUnavailable
- */
- public function get() {
- //throw exception if encryption is disabled but files are still encrypted
- try {
- if (!$this->info->isReadable()) {
- // do a if the file did not exist
- throw new NotFound();
- }
- $path = ltrim($this->path, '/');
- try {
- $res = $this->fileView->fopen($path, 'rb');
- } catch (\Exception $e) {
- $this->convertToSabreException($e);
- }
- if ($res === false) {
- if ($this->fileView->file_exists($path)) {
- throw new ServiceUnavailable($this->l10n->t('Could not open file: %1$s, file does seem to exist', [$path]));
- } else {
- throw new ServiceUnavailable($this->l10n->t('Could not open file: %1$s, file doesn\'t seem to exist', [$path]));
- }
- }
- // comparing current file size with the one in DB
- // if different, fix DB and refresh cache.
- if ($this->getSize() !== $this->fileView->filesize($this->getPath())) {
- $logger = \OC::$server->get(LoggerInterface::class);
- $logger->warning('fixing cached size of file id=' . $this->getId());
- $this->getFileInfo()->getStorage()->getUpdater()->update($this->getFileInfo()->getInternalPath());
- $this->refreshInfo();
- }
- return $res;
- } catch (GenericEncryptionException $e) {
- // returning 503 will allow retry of the operation at a later point in time
- throw new ServiceUnavailable($this->l10n->t('Encryption not ready: %1$s', [$e->getMessage()]));
- } catch (StorageNotAvailableException $e) {
- throw new ServiceUnavailable($this->l10n->t('Failed to open file: %1$s', [$e->getMessage()]));
- } catch (ForbiddenException $ex) {
- throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
- } catch (LockedException $e) {
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- }
- /**
- * Delete the current file
- *
- * @throws Forbidden
- * @throws ServiceUnavailable
- */
- public function delete() {
- if (!$this->info->isDeletable()) {
- throw new Forbidden();
- }
- try {
- if (!$this->fileView->unlink($this->path)) {
- // assume it wasn't possible to delete due to permissions
- throw new Forbidden();
- }
- } catch (StorageNotAvailableException $e) {
- throw new ServiceUnavailable($this->l10n->t('Failed to unlink: %1$s', [$e->getMessage()]));
- } catch (ForbiddenException $ex) {
- throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
- } catch (LockedException $e) {
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- }
- /**
- * Returns the mime-type for a file
- *
- * If null is returned, we'll assume application/octet-stream
- *
- * @return string
- */
- public function getContentType() {
- $mimeType = $this->info->getMimetype();
- // PROPFIND needs to return the correct mime type, for consistency with the web UI
- if ($this->request->getMethod() === 'PROPFIND') {
- return $mimeType;
- }
- return \OC::$server->getMimeTypeDetector()->getSecureMimeType($mimeType);
- }
- /**
- * @return array|bool
- */
- public function getDirectDownload() {
- if (Server::get(IAppManager::class)->isEnabledForUser('encryption')) {
- return [];
- }
- [$storage, $internalPath] = $this->fileView->resolvePath($this->path);
- if (is_null($storage)) {
- return [];
- }
- return $storage->getDirectDownload($internalPath);
- }
- /**
- * Convert the given exception to a SabreException instance
- *
- * @param \Exception $e
- *
- * @throws \Sabre\DAV\Exception
- */
- private function convertToSabreException(\Exception $e) {
- if ($e instanceof \Sabre\DAV\Exception) {
- throw $e;
- }
- if ($e instanceof NotPermittedException) {
- // a more general case - due to whatever reason the content could not be written
- throw new Forbidden($e->getMessage(), 0, $e);
- }
- if ($e instanceof ForbiddenException) {
- // the path for the file was forbidden
- throw new DAVForbiddenException($e->getMessage(), $e->getRetry(), $e);
- }
- if ($e instanceof EntityTooLargeException) {
- // the file is too big to be stored
- throw new EntityTooLarge($e->getMessage(), 0, $e);
- }
- if ($e instanceof InvalidContentException) {
- // the file content is not permitted
- throw new UnsupportedMediaType($e->getMessage(), 0, $e);
- }
- if ($e instanceof InvalidPathException) {
- // the path for the file was not valid
- // TODO: find proper http status code for this case
- throw new Forbidden($e->getMessage(), 0, $e);
- }
- if ($e instanceof LockedException || $e instanceof LockNotAcquiredException) {
- // the file is currently being written to by another process
- throw new FileLocked($e->getMessage(), $e->getCode(), $e);
- }
- if ($e instanceof GenericEncryptionException) {
- // returning 503 will allow retry of the operation at a later point in time
- throw new ServiceUnavailable($this->l10n->t('Encryption not ready: %1$s', [$e->getMessage()]), 0, $e);
- }
- if ($e instanceof StorageNotAvailableException) {
- throw new ServiceUnavailable($this->l10n->t('Failed to write file contents: %1$s', [$e->getMessage()]), 0, $e);
- }
- if ($e instanceof NotFoundException) {
- throw new NotFound($this->l10n->t('File not found: %1$s', [$e->getMessage()]), 0, $e);
- }
- throw new \Sabre\DAV\Exception($e->getMessage(), 0, $e);
- }
- /**
- * Get the checksum for this file
- *
- * @return string|null
- */
- public function getChecksum() {
- return $this->info->getChecksum();
- }
- public function setChecksum(string $checksum) {
- $this->fileView->putFileInfo($this->path, ['checksum' => $checksum]);
- $this->refreshInfo();
- }
- protected function header($string) {
- if (!\OC::$CLI) {
- \header($string);
- }
- }
- public function hash(string $type) {
- return $this->fileView->hash($type, $this->path);
- }
- public function getNode(): \OCP\Files\File {
- return $this->node;
- }
- }
|