2012-02-27 11:04:04 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 15:07:57 +00:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 17:56:05 +00:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Bart Visscher <bartv@thisnet.nl>
|
2016-05-26 17:56:05 +00:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author hkjolhede <hkjolhede@gmail.com>
|
2016-07-21 15:07:57 +00:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2016-05-26 17:56:05 +00:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-10-05 18:54:56 +00:00
|
|
|
* @author Martin Mattel <martin.mattel@diemattels.at>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Michael Gapczynski <GapczynskiM@gmail.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 16:13:36 +00:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 14:02:16 +00:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2016-07-21 15:07:57 +00:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Sam Tuke <mail@samtuke.com>
|
|
|
|
* @author scambra <sergio@entrecables.com>
|
2016-05-26 17:56:05 +00:00
|
|
|
* @author Stefan Weil <sw@weilnetz.de>
|
2015-03-26 10:44:34 +00:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2017-11-06 14:56:42 +00:00
|
|
|
* @author Vinicius Cubas Brand <vinicius@eita.org.br>
|
2015-03-26 10:44:34 +00:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
2012-09-07 16:30:48 +00:00
|
|
|
*/
|
2015-02-26 10:37:37 +00:00
|
|
|
|
2012-09-07 16:30:48 +00:00
|
|
|
namespace OC\Files\Storage;
|
2014-05-29 11:45:50 +00:00
|
|
|
|
2015-02-18 16:44:13 +00:00
|
|
|
use OC\Files\Cache\Cache;
|
2015-11-10 15:14:08 +00:00
|
|
|
use OC\Files\Cache\Propagator;
|
2015-02-18 16:44:13 +00:00
|
|
|
use OC\Files\Cache\Scanner;
|
2015-11-25 12:53:31 +00:00
|
|
|
use OC\Files\Cache\Updater;
|
2014-05-23 10:46:12 +00:00
|
|
|
use OC\Files\Filesystem;
|
2014-05-22 11:45:55 +00:00
|
|
|
use OC\Files\Cache\Watcher;
|
2016-11-09 09:58:11 +00:00
|
|
|
use OCP\Files\EmptyFileNameException;
|
2015-03-10 12:08:22 +00:00
|
|
|
use OCP\Files\FileNameTooLongException;
|
2015-03-04 13:03:47 +00:00
|
|
|
use OCP\Files\InvalidCharacterInPathException;
|
2016-11-09 09:58:11 +00:00
|
|
|
use OCP\Files\InvalidDirectoryException;
|
2015-02-18 16:44:13 +00:00
|
|
|
use OCP\Files\InvalidPathException;
|
2015-03-04 13:03:47 +00:00
|
|
|
use OCP\Files\ReservedWordException;
|
2016-01-04 13:07:03 +00:00
|
|
|
use OCP\Files\Storage\ILockingStorage;
|
2017-07-19 17:44:10 +00:00
|
|
|
use OCP\Files\Storage\IStorage;
|
2018-04-25 13:22:28 +00:00
|
|
|
use OCP\ILogger;
|
2015-05-04 12:21:34 +00:00
|
|
|
use OCP\Lock\ILockingProvider;
|
2017-02-13 14:03:46 +00:00
|
|
|
use OCP\Lock\LockedException;
|
2012-02-27 11:04:04 +00:00
|
|
|
|
2012-06-21 17:07:21 +00:00
|
|
|
/**
|
2012-08-29 06:38:33 +00:00
|
|
|
* Storage backend class for providing common filesystem operation methods
|
2012-06-21 17:07:21 +00:00
|
|
|
* which are not storage-backend specific.
|
|
|
|
*
|
2012-09-07 16:30:48 +00:00
|
|
|
* \OC\Files\Storage\Common is never used directly; it is extended by all other
|
2012-08-29 06:38:33 +00:00
|
|
|
* storage backends, where its methods may be overridden, and additional
|
2012-06-21 17:07:21 +00:00
|
|
|
* (backend-specific) methods are defined.
|
|
|
|
*
|
2012-09-07 16:30:48 +00:00
|
|
|
* Some \OC\Files\Storage\Common methods call functions which are first defined
|
2012-06-21 17:07:21 +00:00
|
|
|
* in classes which extend it, e.g. $this->stat() .
|
|
|
|
*/
|
2016-01-04 13:07:03 +00:00
|
|
|
abstract class Common implements Storage, ILockingStorage {
|
2015-04-02 12:44:25 +00:00
|
|
|
|
|
|
|
use LocalTempFileTrait;
|
|
|
|
|
2013-11-08 11:57:28 +00:00
|
|
|
protected $cache;
|
|
|
|
protected $scanner;
|
|
|
|
protected $watcher;
|
2015-11-10 15:14:08 +00:00
|
|
|
protected $propagator;
|
2013-11-08 11:57:28 +00:00
|
|
|
protected $storageCache;
|
2015-11-25 12:53:31 +00:00
|
|
|
protected $updater;
|
2012-02-27 11:04:04 +00:00
|
|
|
|
2015-03-05 16:22:48 +00:00
|
|
|
protected $mountOptions = [];
|
2016-02-18 09:12:23 +00:00
|
|
|
protected $owner = null;
|
2015-03-05 16:22:48 +00:00
|
|
|
|
2017-02-13 14:03:46 +00:00
|
|
|
private $shouldLogLocks = null;
|
|
|
|
private $logger;
|
|
|
|
|
2013-02-26 01:51:57 +00:00
|
|
|
public function __construct($parameters) {
|
|
|
|
}
|
|
|
|
|
2014-05-23 10:46:12 +00:00
|
|
|
/**
|
2014-09-29 19:42:03 +00:00
|
|
|
* Remove a file or folder
|
2014-05-23 10:46:12 +00:00
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
protected function remove($path) {
|
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
return $this->rmdir($path);
|
2014-05-29 11:45:50 +00:00
|
|
|
} else if ($this->is_file($path)) {
|
2014-05-23 10:46:12 +00:00
|
|
|
return $this->unlink($path);
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-07 13:22:01 +00:00
|
|
|
public function is_dir($path) {
|
2014-10-01 11:14:08 +00:00
|
|
|
return $this->filetype($path) === 'dir';
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-09-07 13:22:01 +00:00
|
|
|
public function is_file($path) {
|
2014-10-01 11:14:08 +00:00
|
|
|
return $this->filetype($path) === 'file';
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-02-27 11:04:04 +00:00
|
|
|
public function filesize($path) {
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->is_dir($path)) {
|
|
|
|
return 0; //by definition
|
|
|
|
} else {
|
2012-02-27 11:04:04 +00:00
|
|
|
$stat = $this->stat($path);
|
2013-02-26 01:53:02 +00:00
|
|
|
if (isset($stat['size'])) {
|
|
|
|
return $stat['size'];
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2013-11-22 14:24:23 +00:00
|
|
|
public function isReadable($path) {
|
|
|
|
// at least check whether it exists
|
|
|
|
// subclasses might want to implement this more thoroughly
|
|
|
|
return $this->file_exists($path);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function isUpdatable($path) {
|
|
|
|
// at least check whether it exists
|
|
|
|
// subclasses might want to implement this more thoroughly
|
|
|
|
// a non-existing file/folder isn't updatable
|
|
|
|
return $this->file_exists($path);
|
|
|
|
}
|
|
|
|
|
2012-07-24 21:42:07 +00:00
|
|
|
public function isCreatable($path) {
|
2012-12-26 20:36:50 +00:00
|
|
|
if ($this->is_dir($path) && $this->isUpdatable($path)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
2012-07-24 21:42:07 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-07-24 21:42:07 +00:00
|
|
|
public function isDeletable($path) {
|
2014-08-25 12:28:35 +00:00
|
|
|
if ($path === '' || $path === '/') {
|
2014-08-25 12:06:27 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$parent = dirname($path);
|
2014-09-17 09:36:08 +00:00
|
|
|
return $this->isUpdatable($parent) && $this->isUpdatable($path);
|
2012-07-24 21:42:07 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-07-24 21:42:07 +00:00
|
|
|
public function isSharable($path) {
|
|
|
|
return $this->isReadable($path);
|
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
|
|
|
public function getPermissions($path) {
|
2012-09-12 21:25:57 +00:00
|
|
|
$permissions = 0;
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->isCreatable($path)) {
|
2014-11-25 15:28:41 +00:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_CREATE;
|
2012-09-12 21:25:57 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->isReadable($path)) {
|
2014-11-25 15:28:41 +00:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_READ;
|
2012-09-12 21:25:57 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->isUpdatable($path)) {
|
2014-11-25 15:28:41 +00:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_UPDATE;
|
2012-09-12 21:25:57 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->isDeletable($path)) {
|
2014-11-25 15:28:41 +00:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_DELETE;
|
2012-09-12 21:25:57 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->isSharable($path)) {
|
2014-11-25 15:28:41 +00:00
|
|
|
$permissions |= \OCP\Constants::PERMISSION_SHARE;
|
2012-09-12 21:25:57 +00:00
|
|
|
}
|
|
|
|
return $permissions;
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-02-27 11:04:04 +00:00
|
|
|
public function filemtime($path) {
|
|
|
|
$stat = $this->stat($path);
|
2014-12-05 13:54:43 +00:00
|
|
|
if (isset($stat['mtime']) && $stat['mtime'] > 0) {
|
2013-02-26 01:53:02 +00:00
|
|
|
return $stat['mtime'];
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-02-27 11:04:04 +00:00
|
|
|
public function file_get_contents($path) {
|
|
|
|
$handle = $this->fopen($path, "r");
|
2013-02-26 01:51:57 +00:00
|
|
|
if (!$handle) {
|
2012-03-02 23:55:17 +00:00
|
|
|
return false;
|
|
|
|
}
|
2014-03-31 16:36:52 +00:00
|
|
|
$data = stream_get_contents($handle);
|
2014-03-31 16:37:52 +00:00
|
|
|
fclose($handle);
|
2014-03-31 16:36:52 +00:00
|
|
|
return $data;
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2013-02-09 16:35:47 +00:00
|
|
|
public function file_put_contents($path, $data) {
|
2012-02-27 11:04:04 +00:00
|
|
|
$handle = $this->fopen($path, "w");
|
2014-03-04 14:44:58 +00:00
|
|
|
$this->removeCachedFile($path);
|
2014-03-31 16:37:52 +00:00
|
|
|
$count = fwrite($handle, $data);
|
|
|
|
fclose($handle);
|
|
|
|
return $count;
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2013-02-09 16:35:47 +00:00
|
|
|
public function rename($path1, $path2) {
|
2014-05-23 10:46:12 +00:00
|
|
|
$this->remove($path2);
|
2013-07-01 16:11:05 +00:00
|
|
|
|
|
|
|
$this->removeCachedFile($path1);
|
2014-05-23 10:46:12 +00:00
|
|
|
return $this->copy($path1, $path2) and $this->remove($path1);
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2013-02-09 16:35:47 +00:00
|
|
|
public function copy($path1, $path2) {
|
2013-07-01 16:11:05 +00:00
|
|
|
if ($this->is_dir($path1)) {
|
2014-05-23 10:46:12 +00:00
|
|
|
$this->remove($path2);
|
2013-07-01 16:11:05 +00:00
|
|
|
$dir = $this->opendir($path1);
|
|
|
|
$this->mkdir($path2);
|
|
|
|
while ($file = readdir($dir)) {
|
2014-05-23 10:46:12 +00:00
|
|
|
if (!Filesystem::isIgnoredDir($file)) {
|
2013-07-01 16:11:05 +00:00
|
|
|
if (!$this->copy($path1 . '/' . $file, $path2 . '/' . $file)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir($dir);
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$source = $this->fopen($path1, 'r');
|
|
|
|
$target = $this->fopen($path2, 'w');
|
|
|
|
list(, $result) = \OC_Helper::streamCopy($source, $target);
|
2017-12-18 12:59:58 +00:00
|
|
|
if (!$result) {
|
|
|
|
\OC::$server->getLogger()->warning("Failed to write data while copying $path1 to $path2");
|
|
|
|
}
|
2013-07-01 16:11:05 +00:00
|
|
|
$this->removeCachedFile($path2);
|
|
|
|
return $result;
|
|
|
|
}
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2012-06-21 17:07:21 +00:00
|
|
|
|
2012-09-07 13:22:01 +00:00
|
|
|
public function getMimeType($path) {
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->is_dir($path)) {
|
2012-02-27 11:04:04 +00:00
|
|
|
return 'httpd/unix-directory';
|
2013-11-20 14:25:29 +00:00
|
|
|
} elseif ($this->file_exists($path)) {
|
2015-12-17 16:07:48 +00:00
|
|
|
return \OC::$server->getMimeTypeDetector()->detectPath($path);
|
2013-02-26 01:51:57 +00:00
|
|
|
} else {
|
2013-11-20 14:25:29 +00:00
|
|
|
return false;
|
2012-03-03 17:24:10 +00:00
|
|
|
}
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2013-02-09 16:35:47 +00:00
|
|
|
public function hash($type, $path, $raw = false) {
|
2014-03-20 15:45:24 +00:00
|
|
|
$fh = $this->fopen($path, 'rb');
|
2014-03-20 14:35:01 +00:00
|
|
|
$ctx = hash_init($type);
|
|
|
|
hash_update_stream($ctx, $fh);
|
|
|
|
fclose($fh);
|
|
|
|
return hash_final($ctx, $raw);
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-09-07 13:22:01 +00:00
|
|
|
public function search($query) {
|
2012-03-02 17:42:04 +00:00
|
|
|
return $this->searchInDir($query);
|
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2012-09-07 13:22:01 +00:00
|
|
|
public function getLocalFile($path) {
|
2014-03-04 14:44:58 +00:00
|
|
|
return $this->getCachedFile($path);
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
|
2014-02-06 15:30:58 +00:00
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param string $target
|
|
|
|
*/
|
2013-02-09 16:35:47 +00:00
|
|
|
private function addLocalFolder($path, $target) {
|
2013-09-04 11:06:04 +00:00
|
|
|
$dh = $this->opendir($path);
|
2013-11-20 14:25:29 +00:00
|
|
|
if (is_resource($dh)) {
|
2013-08-19 10:04:53 +00:00
|
|
|
while (($file = readdir($dh)) !== false) {
|
2015-09-21 12:09:28 +00:00
|
|
|
if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->is_dir($path . '/' . $file)) {
|
|
|
|
mkdir($target . '/' . $file);
|
|
|
|
$this->addLocalFolder($path . '/' . $file, $target . '/' . $file);
|
|
|
|
} else {
|
|
|
|
$tmp = $this->toTmpFile($path . '/' . $file);
|
|
|
|
rename($tmp, $target . '/' . $file);
|
2012-08-19 00:30:33 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-03-02 17:42:04 +00:00
|
|
|
|
2014-02-06 15:30:58 +00:00
|
|
|
/**
|
|
|
|
* @param string $query
|
2015-05-21 22:17:38 +00:00
|
|
|
* @param string $dir
|
|
|
|
* @return array
|
2014-02-06 15:30:58 +00:00
|
|
|
*/
|
2013-02-26 01:51:57 +00:00
|
|
|
protected function searchInDir($query, $dir = '') {
|
|
|
|
$files = array();
|
|
|
|
$dh = $this->opendir($dir);
|
2013-09-04 11:06:04 +00:00
|
|
|
if (is_resource($dh)) {
|
2013-08-19 10:04:53 +00:00
|
|
|
while (($item = readdir($dh)) !== false) {
|
2015-09-21 12:09:28 +00:00
|
|
|
if (\OC\Files\Filesystem::isIgnoredDir($item)) continue;
|
2013-02-26 01:51:57 +00:00
|
|
|
if (strstr(strtolower($item), strtolower($query)) !== false) {
|
|
|
|
$files[] = $dir . '/' . $item;
|
2012-03-02 17:42:04 +00:00
|
|
|
}
|
2013-02-26 01:51:57 +00:00
|
|
|
if ($this->is_dir($dir . '/' . $item)) {
|
|
|
|
$files = array_merge($files, $this->searchInDir($query, $dir . '/' . $item));
|
2012-03-02 17:42:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-12-11 11:58:22 +00:00
|
|
|
closedir($dh);
|
2012-03-02 17:42:04 +00:00
|
|
|
return $files;
|
|
|
|
}
|
2012-06-15 14:43:24 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* check if a file or folder has been updated since $time
|
2013-02-26 01:51:57 +00:00
|
|
|
*
|
2014-06-27 10:14:31 +00:00
|
|
|
* The method is only used to check if the cache needs to be updated. Storage backends that don't support checking
|
|
|
|
* the mtime should always return false here. As a result storage implementations that always return false expect
|
|
|
|
* exclusive access to the backend and will not pick up files that have been added in a way that circumvents
|
|
|
|
* ownClouds filesystem.
|
|
|
|
*
|
2012-10-23 14:16:46 +00:00
|
|
|
* @param string $path
|
2012-06-15 14:43:24 +00:00
|
|
|
* @param int $time
|
|
|
|
* @return bool
|
|
|
|
*/
|
2013-02-09 16:35:47 +00:00
|
|
|
public function hasUpdated($path, $time) {
|
2013-02-26 01:51:57 +00:00
|
|
|
return $this->filemtime($path) > $time;
|
2012-06-15 14:43:24 +00:00
|
|
|
}
|
2012-07-06 10:22:21 +00:00
|
|
|
|
2014-06-12 15:23:34 +00:00
|
|
|
public function getCache($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
if (!isset($storage->cache)) {
|
|
|
|
$storage->cache = new Cache($storage);
|
2013-04-05 15:20:08 +00:00
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
return $storage->cache;
|
2012-10-20 22:31:32 +00:00
|
|
|
}
|
|
|
|
|
2014-06-12 15:23:34 +00:00
|
|
|
public function getScanner($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
if (!isset($storage->scanner)) {
|
|
|
|
$storage->scanner = new Scanner($storage);
|
2013-04-05 15:20:08 +00:00
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
return $storage->scanner;
|
2012-10-20 22:31:32 +00:00
|
|
|
}
|
2012-10-23 14:16:46 +00:00
|
|
|
|
2014-06-12 15:23:34 +00:00
|
|
|
public function getWatcher($path = '', $storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2013-04-05 15:20:08 +00:00
|
|
|
if (!isset($this->watcher)) {
|
2015-02-18 16:44:13 +00:00
|
|
|
$this->watcher = new Watcher($storage);
|
2015-07-29 10:01:12 +00:00
|
|
|
$globalPolicy = \OC::$server->getConfig()->getSystemValue('filesystem_check_changes', Watcher::CHECK_NEVER);
|
2015-03-26 18:24:37 +00:00
|
|
|
$this->watcher->setPolicy((int)$this->getMountOption('filesystem_check_changes', $globalPolicy));
|
2013-04-05 15:20:08 +00:00
|
|
|
}
|
|
|
|
return $this->watcher;
|
2013-01-01 17:04:29 +00:00
|
|
|
}
|
|
|
|
|
2015-11-10 15:14:08 +00:00
|
|
|
/**
|
|
|
|
* get a propagator instance for the cache
|
|
|
|
*
|
|
|
|
* @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher
|
|
|
|
* @return \OC\Files\Cache\Propagator
|
|
|
|
*/
|
|
|
|
public function getPropagator($storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
if (!isset($storage->propagator)) {
|
2016-02-25 12:14:20 +00:00
|
|
|
$storage->propagator = new Propagator($storage, \OC::$server->getDatabaseConnection());
|
2015-11-10 15:14:08 +00:00
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
return $storage->propagator;
|
2015-11-10 15:14:08 +00:00
|
|
|
}
|
|
|
|
|
2015-11-25 12:53:31 +00:00
|
|
|
public function getUpdater($storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
if (!isset($storage->updater)) {
|
|
|
|
$storage->updater = new Updater($storage);
|
2015-11-25 12:53:31 +00:00
|
|
|
}
|
2016-04-13 13:23:37 +00:00
|
|
|
return $storage->updater;
|
2015-11-25 12:53:31 +00:00
|
|
|
}
|
|
|
|
|
2014-06-12 15:23:34 +00:00
|
|
|
public function getStorageCache($storage = null) {
|
|
|
|
if (!$storage) {
|
|
|
|
$storage = $this;
|
|
|
|
}
|
2013-04-25 22:00:18 +00:00
|
|
|
if (!isset($this->storageCache)) {
|
2015-03-26 18:24:49 +00:00
|
|
|
$this->storageCache = new \OC\Files\Cache\Storage($storage);
|
2013-04-25 22:00:18 +00:00
|
|
|
}
|
|
|
|
return $this->storageCache;
|
|
|
|
}
|
|
|
|
|
2012-07-06 10:22:21 +00:00
|
|
|
/**
|
|
|
|
* get the owner of a path
|
2013-02-26 01:51:57 +00:00
|
|
|
*
|
2012-10-23 14:16:46 +00:00
|
|
|
* @param string $path The path to get the owner
|
2015-01-16 18:31:15 +00:00
|
|
|
* @return string|false uid or false
|
2012-07-06 10:22:21 +00:00
|
|
|
*/
|
|
|
|
public function getOwner($path) {
|
2016-02-18 09:12:23 +00:00
|
|
|
if ($this->owner === null) {
|
|
|
|
$this->owner = \OC_User::getUser();
|
2016-02-17 18:14:46 +00:00
|
|
|
}
|
|
|
|
|
2016-02-18 09:12:23 +00:00
|
|
|
return $this->owner;
|
2012-07-06 10:22:21 +00:00
|
|
|
}
|
2012-11-08 16:47:00 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* get the ETag for a file or folder
|
|
|
|
*
|
|
|
|
* @param string $path
|
2016-02-05 09:38:43 +00:00
|
|
|
* @return string
|
2012-11-08 16:47:00 +00:00
|
|
|
*/
|
2013-02-26 01:51:57 +00:00
|
|
|
public function getETag($path) {
|
2015-10-14 12:39:25 +00:00
|
|
|
return uniqid();
|
2012-07-06 10:22:21 +00:00
|
|
|
}
|
2013-02-22 16:21:57 +00:00
|
|
|
|
2013-01-26 18:44:09 +00:00
|
|
|
/**
|
|
|
|
* clean a path, i.e. remove all redundant '.' and '..'
|
|
|
|
* making sure that it can't point to higher than '/'
|
2013-02-26 01:51:57 +00:00
|
|
|
*
|
2014-05-11 20:51:30 +00:00
|
|
|
* @param string $path The path to clean
|
2013-01-26 18:44:09 +00:00
|
|
|
* @return string cleaned path
|
|
|
|
*/
|
|
|
|
public function cleanPath($path) {
|
|
|
|
if (strlen($path) == 0 or $path[0] != '/') {
|
|
|
|
$path = '/' . $path;
|
|
|
|
}
|
2013-02-22 16:21:57 +00:00
|
|
|
|
2013-01-26 18:44:09 +00:00
|
|
|
$output = array();
|
2013-01-27 15:07:21 +00:00
|
|
|
foreach (explode('/', $path) as $chunk) {
|
2013-01-26 18:44:09 +00:00
|
|
|
if ($chunk == '..') {
|
|
|
|
array_pop($output);
|
|
|
|
} else if ($chunk == '.') {
|
|
|
|
} else {
|
|
|
|
$output[] = $chunk;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return implode('/', $output);
|
|
|
|
}
|
2013-02-16 02:27:50 +00:00
|
|
|
|
2015-01-23 21:53:21 +00:00
|
|
|
/**
|
|
|
|
* Test a storage for availability
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
2012-12-28 17:00:48 +00:00
|
|
|
public function test() {
|
2017-01-24 15:56:24 +00:00
|
|
|
try {
|
|
|
|
if ($this->stat('')) {
|
|
|
|
return true;
|
|
|
|
}
|
2018-02-09 16:30:27 +00:00
|
|
|
\OC::$server->getLogger()->info("External storage not available: stat() failed");
|
2017-01-24 15:56:24 +00:00
|
|
|
return false;
|
|
|
|
} catch (\Exception $e) {
|
2018-02-09 16:30:27 +00:00
|
|
|
\OC::$server->getLogger()->info("External storage not available: " . $e->getMessage());
|
2018-04-25 13:22:28 +00:00
|
|
|
\OC::$server->getLogger()->logException($e, ['level' => ILogger::DEBUG]);
|
2017-01-24 15:56:24 +00:00
|
|
|
return false;
|
2012-12-28 17:00:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-16 02:27:50 +00:00
|
|
|
/**
|
|
|
|
* get the free space in the storage
|
2013-02-26 01:51:57 +00:00
|
|
|
*
|
2014-05-11 20:51:30 +00:00
|
|
|
* @param string $path
|
2015-01-16 18:31:15 +00:00
|
|
|
* @return int|false
|
2013-02-16 02:27:50 +00:00
|
|
|
*/
|
2013-02-26 01:51:57 +00:00
|
|
|
public function free_space($path) {
|
2014-08-19 12:05:08 +00:00
|
|
|
return \OCP\Files\FileInfo::SPACE_UNKNOWN;
|
2013-02-16 02:27:50 +00:00
|
|
|
}
|
2014-02-04 18:58:49 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* {@inheritdoc}
|
|
|
|
*/
|
|
|
|
public function isLocal() {
|
|
|
|
// the common implementation returns a temporary file by
|
|
|
|
// default, which is not local
|
|
|
|
return false;
|
|
|
|
}
|
2014-03-04 14:44:58 +00:00
|
|
|
|
2014-05-29 11:45:50 +00:00
|
|
|
/**
|
|
|
|
* Check if the storage is an instance of $class or is a wrapper for a storage that is an instance of $class
|
|
|
|
*
|
|
|
|
* @param string $class
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function instanceOfStorage($class) {
|
2016-06-01 12:29:31 +00:00
|
|
|
if (ltrim($class, '\\') === 'OC\Files\Storage\Shared') {
|
|
|
|
// FIXME Temporary fix to keep existing checks working
|
|
|
|
$class = '\OCA\Files_Sharing\SharedStorage';
|
|
|
|
}
|
2014-05-29 11:45:50 +00:00
|
|
|
return is_a($this, $class);
|
|
|
|
}
|
2014-12-15 14:20:24 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* A custom storage implementation can return an url for direct download of a give file.
|
|
|
|
*
|
|
|
|
* For now the returned array can hold the parameter url - in future more attributes might follow.
|
|
|
|
*
|
|
|
|
* @param string $path
|
2015-01-16 18:31:15 +00:00
|
|
|
* @return array|false
|
2014-12-15 14:20:24 +00:00
|
|
|
*/
|
|
|
|
public function getDirectDownload($path) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
2015-02-18 16:44:13 +00:00
|
|
|
/**
|
|
|
|
* @inheritdoc
|
2016-11-09 09:58:11 +00:00
|
|
|
* @throws InvalidPathException
|
2015-02-18 16:44:13 +00:00
|
|
|
*/
|
|
|
|
public function verifyPath($path, $fileName) {
|
2016-11-09 09:58:11 +00:00
|
|
|
|
|
|
|
// verify empty and dot files
|
|
|
|
$trimmed = trim($fileName);
|
|
|
|
if ($trimmed === '') {
|
|
|
|
throw new EmptyFileNameException();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (\OC\Files\Filesystem::isIgnoredDir($trimmed)) {
|
|
|
|
throw new InvalidDirectoryException();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!\OC::$server->getDatabaseConnection()->supports4ByteText()) {
|
|
|
|
// verify database - e.g. mysql only 3-byte chars
|
|
|
|
if (preg_match('%(?:
|
|
|
|
\xF0[\x90-\xBF][\x80-\xBF]{2} # planes 1-3
|
|
|
|
| [\xF1-\xF3][\x80-\xBF]{3} # planes 4-15
|
|
|
|
| \xF4[\x80-\x8F][\x80-\xBF]{2} # plane 16
|
|
|
|
)%xs', $fileName)) {
|
|
|
|
throw new InvalidCharacterInPathException();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-10 12:08:22 +00:00
|
|
|
if (isset($fileName[255])) {
|
|
|
|
throw new FileNameTooLongException();
|
|
|
|
}
|
|
|
|
|
2015-02-18 16:44:13 +00:00
|
|
|
// NOTE: $path will remain unverified for now
|
2016-07-08 13:55:17 +00:00
|
|
|
$this->verifyPosixPath($fileName);
|
2015-02-18 16:44:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $fileName
|
|
|
|
* @throws InvalidPathException
|
|
|
|
*/
|
2015-02-24 16:20:59 +00:00
|
|
|
protected function verifyPosixPath($fileName) {
|
2015-02-18 16:44:13 +00:00
|
|
|
$fileName = trim($fileName);
|
|
|
|
$this->scanForInvalidCharacters($fileName, "\\/");
|
|
|
|
$reservedNames = ['*'];
|
|
|
|
if (in_array($fileName, $reservedNames)) {
|
2015-03-04 13:03:47 +00:00
|
|
|
throw new ReservedWordException();
|
2015-02-18 16:44:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-02-20 17:19:14 +00:00
|
|
|
* @param string $fileName
|
|
|
|
* @param string $invalidChars
|
2015-02-18 16:44:13 +00:00
|
|
|
* @throws InvalidPathException
|
|
|
|
*/
|
|
|
|
private function scanForInvalidCharacters($fileName, $invalidChars) {
|
2015-05-19 12:21:58 +00:00
|
|
|
foreach (str_split($invalidChars) as $char) {
|
2015-02-20 17:19:14 +00:00
|
|
|
if (strpos($fileName, $char) !== false) {
|
2015-03-04 13:03:47 +00:00
|
|
|
throw new InvalidCharacterInPathException();
|
2015-02-18 16:44:13 +00:00
|
|
|
}
|
|
|
|
}
|
2015-02-20 17:19:14 +00:00
|
|
|
|
2015-03-17 20:56:16 +00:00
|
|
|
$sanitizedFileName = filter_var($fileName, FILTER_UNSAFE_RAW, FILTER_FLAG_STRIP_LOW);
|
2015-05-19 12:21:58 +00:00
|
|
|
if ($sanitizedFileName !== $fileName) {
|
2015-03-04 13:03:47 +00:00
|
|
|
throw new InvalidCharacterInPathException();
|
2015-02-20 17:19:14 +00:00
|
|
|
}
|
2015-02-18 16:44:13 +00:00
|
|
|
}
|
2015-05-19 12:21:58 +00:00
|
|
|
|
2015-03-05 16:22:48 +00:00
|
|
|
/**
|
|
|
|
* @param array $options
|
|
|
|
*/
|
|
|
|
public function setMountOptions(array $options) {
|
|
|
|
$this->mountOptions = $options;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $name
|
|
|
|
* @param mixed $default
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function getMountOption($name, $default = null) {
|
|
|
|
return isset($this->mountOptions[$name]) ? $this->mountOptions[$name] : $default;
|
|
|
|
}
|
2015-05-19 12:21:58 +00:00
|
|
|
|
2015-01-16 12:32:42 +00:00
|
|
|
/**
|
2017-07-19 17:44:10 +00:00
|
|
|
* @param IStorage $sourceStorage
|
2015-01-16 12:32:42 +00:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @param bool $preserveMtime
|
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 17:44:10 +00:00
|
|
|
public function copyFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath, $preserveMtime = false) {
|
2015-05-19 12:21:58 +00:00
|
|
|
if ($sourceStorage === $this) {
|
|
|
|
return $this->copy($sourceInternalPath, $targetInternalPath);
|
|
|
|
}
|
|
|
|
|
2015-01-16 12:32:42 +00:00
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
|
|
|
$dh = $sourceStorage->opendir($sourceInternalPath);
|
|
|
|
$result = $this->mkdir($targetInternalPath);
|
|
|
|
if (is_resource($dh)) {
|
2015-03-05 10:49:31 +00:00
|
|
|
while ($result and ($file = readdir($dh)) !== false) {
|
2015-01-16 12:32:42 +00:00
|
|
|
if (!Filesystem::isIgnoredDir($file)) {
|
|
|
|
$result &= $this->copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$source = $sourceStorage->fopen($sourceInternalPath, 'r');
|
2015-04-30 12:30:02 +00:00
|
|
|
// TODO: call fopen in a way that we execute again all storage wrappers
|
|
|
|
// to avoid that we bypass storage wrappers which perform important actions
|
|
|
|
// for this operation. Same is true for all other operations which
|
|
|
|
// are not the same as the original one.Once this is fixed we also
|
|
|
|
// need to adjust the encryption wrapper.
|
2015-01-16 12:32:42 +00:00
|
|
|
$target = $this->fopen($targetInternalPath, 'w');
|
|
|
|
list(, $result) = \OC_Helper::streamCopy($source, $target);
|
2015-03-05 10:49:31 +00:00
|
|
|
if ($result and $preserveMtime) {
|
2015-01-16 12:32:42 +00:00
|
|
|
$this->touch($targetInternalPath, $sourceStorage->filemtime($sourceInternalPath));
|
|
|
|
}
|
|
|
|
fclose($source);
|
|
|
|
fclose($target);
|
2015-03-05 10:49:31 +00:00
|
|
|
|
|
|
|
if (!$result) {
|
|
|
|
// delete partially written target file
|
|
|
|
$this->unlink($targetInternalPath);
|
|
|
|
// delete cache entry that was created by fopen
|
|
|
|
$this->getCache()->remove($targetInternalPath);
|
|
|
|
}
|
2015-01-16 12:32:42 +00:00
|
|
|
}
|
2015-03-05 10:49:31 +00:00
|
|
|
return (bool)$result;
|
2015-01-16 12:32:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-07-19 17:44:10 +00:00
|
|
|
* @param IStorage $sourceStorage
|
2015-01-16 12:32:42 +00:00
|
|
|
* @param string $sourceInternalPath
|
|
|
|
* @param string $targetInternalPath
|
|
|
|
* @return bool
|
|
|
|
*/
|
2017-07-19 17:44:10 +00:00
|
|
|
public function moveFromStorage(IStorage $sourceStorage, $sourceInternalPath, $targetInternalPath) {
|
2015-05-19 12:21:58 +00:00
|
|
|
if ($sourceStorage === $this) {
|
|
|
|
return $this->rename($sourceInternalPath, $targetInternalPath);
|
|
|
|
}
|
|
|
|
|
2016-02-19 11:59:10 +00:00
|
|
|
if (!$sourceStorage->isDeletable($sourceInternalPath)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-01-16 12:32:42 +00:00
|
|
|
$result = $this->copyFromStorage($sourceStorage, $sourceInternalPath, $targetInternalPath, true);
|
|
|
|
if ($result) {
|
|
|
|
if ($sourceStorage->is_dir($sourceInternalPath)) {
|
2015-02-09 14:15:03 +00:00
|
|
|
$result &= $sourceStorage->rmdir($sourceInternalPath);
|
2015-01-16 12:32:42 +00:00
|
|
|
} else {
|
2015-02-09 14:15:03 +00:00
|
|
|
$result &= $sourceStorage->unlink($sourceInternalPath);
|
2015-01-16 12:32:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
2015-04-20 12:25:39 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @inheritdoc
|
|
|
|
*/
|
2015-04-20 12:54:54 +00:00
|
|
|
public function getMetaData($path) {
|
2015-04-20 14:50:12 +00:00
|
|
|
$permissions = $this->getPermissions($path);
|
|
|
|
if (!$permissions & \OCP\Constants::PERMISSION_READ) {
|
2016-04-07 17:51:27 +00:00
|
|
|
//can't read, nothing we can do
|
2015-04-20 14:50:12 +00:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2015-04-20 12:25:39 +00:00
|
|
|
$data = [];
|
|
|
|
$data['mimetype'] = $this->getMimeType($path);
|
|
|
|
$data['mtime'] = $this->filemtime($path);
|
2016-06-07 15:09:24 +00:00
|
|
|
if ($data['mtime'] === false) {
|
|
|
|
$data['mtime'] = time();
|
|
|
|
}
|
2015-04-20 12:25:39 +00:00
|
|
|
if ($data['mimetype'] == 'httpd/unix-directory') {
|
|
|
|
$data['size'] = -1; //unknown
|
|
|
|
} else {
|
|
|
|
$data['size'] = $this->filesize($path);
|
|
|
|
}
|
|
|
|
$data['etag'] = $this->getETag($path);
|
|
|
|
$data['storage_mtime'] = $data['mtime'];
|
2016-04-12 07:45:59 +00:00
|
|
|
$data['permissions'] = $permissions;
|
2015-04-20 14:50:12 +00:00
|
|
|
|
2015-04-20 12:25:39 +00:00
|
|
|
return $data;
|
|
|
|
}
|
2015-05-04 12:21:34 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
|
|
|
|
* @param \OCP\Lock\ILockingProvider $provider
|
|
|
|
* @throws \OCP\Lock\LockedException
|
|
|
|
*/
|
|
|
|
public function acquireLock($path, $type, ILockingProvider $provider) {
|
2017-02-13 14:03:46 +00:00
|
|
|
$logger = $this->getLockLogger();
|
|
|
|
if ($logger) {
|
|
|
|
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
|
2017-02-13 21:49:44 +00:00
|
|
|
$logger->info(
|
|
|
|
sprintf(
|
|
|
|
'acquire %s lock on "%s" on storage "%s"',
|
|
|
|
$typeString,
|
|
|
|
$path,
|
|
|
|
$this->getId()
|
|
|
|
),
|
|
|
|
[
|
|
|
|
'app' => 'locking',
|
|
|
|
]
|
|
|
|
);
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
|
|
|
try {
|
|
|
|
$provider->acquireLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
|
|
|
|
} catch (LockedException $e) {
|
|
|
|
if ($logger) {
|
|
|
|
$logger->logException($e);
|
|
|
|
}
|
2017-02-14 00:03:35 +00:00
|
|
|
throw $e;
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
2015-05-04 12:21:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
|
|
|
|
* @param \OCP\Lock\ILockingProvider $provider
|
2017-02-14 00:03:35 +00:00
|
|
|
* @throws \OCP\Lock\LockedException
|
2015-05-04 12:21:34 +00:00
|
|
|
*/
|
|
|
|
public function releaseLock($path, $type, ILockingProvider $provider) {
|
2017-02-13 14:03:46 +00:00
|
|
|
$logger = $this->getLockLogger();
|
|
|
|
if ($logger) {
|
|
|
|
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
|
2017-02-13 21:49:44 +00:00
|
|
|
$logger->info(
|
|
|
|
sprintf(
|
|
|
|
'release %s lock on "%s" on storage "%s"',
|
|
|
|
$typeString,
|
|
|
|
$path,
|
|
|
|
$this->getId()
|
|
|
|
),
|
|
|
|
[
|
|
|
|
'app' => 'locking',
|
|
|
|
]
|
|
|
|
);
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
|
|
|
try {
|
|
|
|
$provider->releaseLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
|
|
|
|
} catch (LockedException $e) {
|
|
|
|
if ($logger) {
|
|
|
|
$logger->logException($e);
|
|
|
|
}
|
2017-02-14 00:03:35 +00:00
|
|
|
throw $e;
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
2015-05-04 12:21:34 +00:00
|
|
|
}
|
2015-05-29 12:40:06 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE
|
|
|
|
* @param \OCP\Lock\ILockingProvider $provider
|
2017-02-14 00:03:35 +00:00
|
|
|
* @throws \OCP\Lock\LockedException
|
2015-05-29 12:40:06 +00:00
|
|
|
*/
|
|
|
|
public function changeLock($path, $type, ILockingProvider $provider) {
|
2017-02-13 14:03:46 +00:00
|
|
|
$logger = $this->getLockLogger();
|
|
|
|
if ($logger) {
|
|
|
|
$typeString = ($type === ILockingProvider::LOCK_SHARED) ? 'shared' : 'exclusive';
|
2017-02-13 21:49:44 +00:00
|
|
|
$logger->info(
|
|
|
|
sprintf(
|
|
|
|
'change lock on "%s" to %s on storage "%s"',
|
|
|
|
$path,
|
|
|
|
$typeString,
|
|
|
|
$this->getId()
|
|
|
|
),
|
|
|
|
[
|
|
|
|
'app' => 'locking',
|
|
|
|
]
|
|
|
|
);
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
|
|
|
try {
|
|
|
|
$provider->changeLock('files/' . md5($this->getId() . '::' . trim($path, '/')), $type);
|
|
|
|
} catch (LockedException $e) {
|
2018-05-04 11:30:43 +00:00
|
|
|
\OC::$server->getLogger()->logException($e);
|
2017-02-14 00:03:35 +00:00
|
|
|
throw $e;
|
2017-02-13 14:03:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private function getLockLogger() {
|
|
|
|
if (is_null($this->shouldLogLocks)) {
|
|
|
|
$this->shouldLogLocks = \OC::$server->getConfig()->getSystemValue('filelocking.debug', false);
|
|
|
|
$this->logger = $this->shouldLogLocks ? \OC::$server->getLogger() : null;
|
|
|
|
}
|
|
|
|
return $this->logger;
|
2015-05-29 12:40:06 +00:00
|
|
|
}
|
2015-01-23 21:53:21 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return array [ available, last_checked ]
|
|
|
|
*/
|
|
|
|
public function getAvailability() {
|
|
|
|
return $this->getStorageCache()->getAvailability();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param bool $isAvailable
|
|
|
|
*/
|
|
|
|
public function setAvailability($isAvailable) {
|
|
|
|
$this->getStorageCache()->setAvailability($isAvailable);
|
|
|
|
}
|
2017-02-23 16:32:16 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function needsPartFile() {
|
|
|
|
return true;
|
|
|
|
}
|
2012-02-27 11:04:04 +00:00
|
|
|
}
|