apps/dav/lib/Connector/Sabre/File.php
<?php
/**
* @author Bart Visscher <bartv@thisnet.nl>
* @author Björn Schießle <bjoern@schiessle.org>
* @author Jakob Sack <mail@jakobsack.de>
* @author Joas Schilling <coding@schilljs.com>
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
* @author Lukas Reschke <lukas@statuscode.ch>
* @author Morris Jobke <hey@morrisjobke.de>
* @author Owen Winkler <a_github@midnightcircus.com>
* @author Robin Appelman <icewind@owncloud.com>
* @author Roeland Jago Douma <rullzer@owncloud.com>
* @author Semih Serhat Karakaya <karakayasemi@itu.edu.tr>
* @author Thomas Müller <thomas.mueller@tmit.eu>
* @author Vincent Petry <pvince81@owncloud.com>
*
* @copyright Copyright (c) 2018, ownCloud GmbH
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
*/
namespace OCA\DAV\Connector\Sabre;
use OC\AppFramework\Http\Request;
use OC\Files\Filesystem;
use OC\Files\Storage\Storage;
use OCA\DAV\Connector\Sabre\Exception\EntityTooLarge;
use OCA\DAV\Connector\Sabre\Exception\FileLocked;
use OCA\DAV\Connector\Sabre\Exception\FileNameTooLong;
use OCA\DAV\Connector\Sabre\Exception\Forbidden as DAVForbiddenException;
use OCA\DAV\Connector\Sabre\Exception\UnsupportedMediaType;
use OCA\DAV\Files\IFileNode;
use OCP\Encryption\Exceptions\GenericEncryptionException;
use OCP\Events\EventEmitterTrait;
use OCP\Files\EntityTooLargeException;
use OCP\Files\FileContentNotAllowedException;
use OCP\Files\FileNameTooLongException;
use OCP\Files\ForbiddenException;
use OCP\Files\InvalidContentException;
use OCP\Files\InvalidPathException;
use OCP\Files\LockNotAcquiredException;
use OCP\Files\NotPermittedException;
use OCP\Files\StorageNotAvailableException;
use OCP\Lock\ILockingProvider;
use OCP\Lock\LockedException;
use Sabre\DAV\Exception;
use Sabre\DAV\Exception\BadRequest;
use Sabre\DAV\Exception\Forbidden;
use Sabre\DAV\Exception\NotFound;
use Sabre\DAV\Exception\NotImplemented;
use Sabre\DAV\Exception\ServiceUnavailable;
use Sabre\DAV\IFile;
use Symfony\Component\EventDispatcher\GenericEvent;
class File extends Node implements IFile, IFileNode {
use EventEmitterTrait;
protected $request;
/**
* Sets up the node, expects a full path name
*
* @param \OC\Files\View $view
* @param \OCP\Files\FileInfo $info
* @param \OCP\Share\IManager $shareManager
*/
public function __construct($view, $info, $shareManager = null, Request $request = null) {
if (isset($request)) {
$this->request = $request;
} else {
$this->request = \OC::$server->getRequest();
}
parent::__construct($view, $info, $shareManager);
}
/**
* Handles metadata updates for the target storage (mtime, propagation)
*
* @param Storage $targetStorage
* @param $targetInternalPath
*/
private function handleMetadataUpdate(\OC\Files\Storage\Storage $targetStorage, $targetInternalPath) {
// since we skipped the view we need to scan and emit the hooks ourselves
// allow sync clients to send the mtime along in a header
if (isset($this->request->server['HTTP_X_OC_MTIME'])) {
$mtime = $this->sanitizeMtime(
$this->request->server ['HTTP_X_OC_MTIME']
);
if ($targetStorage->touch($targetInternalPath, $mtime)) {
$this->header('X-OC-MTime: accepted');
}
$targetStorage->getUpdater()->update($targetInternalPath, $mtime);
} else {
$targetStorage->getUpdater()->update($targetInternalPath);
}
}
/**
* Updates the data
*
* The data argument is a readable stream resource.
*
* After a successful put operation, you may choose to return an ETag. The
* etag must always be surrounded by double-quotes. These quotes must
* appear in the actual string you're returning.
*
* Clients may use the ETag from a PUT request to later on make sure that
* when they update the file, the contents haven't changed in the mean
* time.
*
* If you don't plan to store the file byte-by-byte, and you return a
* different object on a subsequent GET you are strongly recommended to not
* return an ETag, and just return null.
*
* @param resource|string $data
*
* @throws Forbidden
* @throws UnsupportedMediaType
* @throws BadRequest
* @throws Exception
* @throws EntityTooLarge
* @throws ServiceUnavailable
* @throws FileLocked
* @return string|null
*/
public function put($data) {
try {
$exists = $this->fileView->file_exists($this->path);
if ($this->info && $exists && !$this->info->isUpdateable()) {
throw new Forbidden();
}
} catch (StorageNotAvailableException $e) {
throw new ServiceUnavailable("File is not updatable: " . $e->getMessage());
}
// verify path of the target
$this->verifyPath();
// chunked handling
if (\OC_FileChunking::isWebdavChunk()) {
try {
return $this->createFileChunked($data);
} catch (\Exception $e) {
$this->convertToSabreException($e);
}
}
$newFile = false;
$path = $this->fileView->getAbsolutePath($this->path);
$beforeEvent = new GenericEvent(null, ['path' => $path]);
if (!$this->fileView->file_exists($this->path)) {
\OC::$server->getEventDispatcher()->dispatch($beforeEvent, 'file.beforecreate');
$newFile = true;
} else {
\OC::$server->getEventDispatcher()->dispatch($beforeEvent, 'file.beforeupdate');
}
list($partStorage) = $this->fileView->resolvePath($this->path);
$usePartFile = $this->usePartFile($partStorage) && (\strlen($this->path) > 1);
if ($usePartFile) {
// mark file as partial while uploading (ignored by the scanner)
$partFilePath = $this->getPartFileBasePath($this->path) . '.ocTransferId' . \rand() . '.part';
} else {
// upload file directly as the final path
$partFilePath = $this->path;
}
// the part file and target file might be on a different storage in case of a single file storage (e.g. single file share)
/** @var \OC\Files\Storage\Storage $partStorage */
list($partStorage, $internalPartPath) = $this->fileView->resolvePath($partFilePath);
/** @var \OC\Files\Storage\Storage $storage */
list($storage, $internalPath) = $this->fileView->resolvePath($this->path);
try {
try {
$this->changeLock(ILockingProvider::LOCK_EXCLUSIVE);
} catch (LockedException $e) {
$this->cleanFailedUpload($partStorage, $internalPartPath);
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
// check if the part file name is too long
if ($usePartFile) {
$partStorage->verifyPath($internalPartPath, \basename($internalPartPath));
}
$target = $partStorage->fopen($internalPartPath, 'wb');
if (!\is_resource($target)) {
\OCP\Util::writeLog('webdav', '\OC\Files\Filesystem::fopen() failed', \OCP\Util::ERROR);
// because we have no clue about the cause we can only throw back a 500/Internal Server Error
throw new Exception('Could not write file contents');
}
list($count, $result) = \OC_Helper::streamCopy($data, $target);
\fclose($target);
try {
$this->changeLock(ILockingProvider::LOCK_SHARED);
} catch (LockedException $e) {
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
if (!self::isChecksumValid($this->request, $partStorage, $internalPartPath)) {
$partStorage->unlink($internalPartPath); // remove the uploaded file on checksum error
throw new BadRequest('The computed checksum does not match the one received from the client.');
}
if ($result === false) {
$expected = $this->getExpectedContentLength($data);
throw new Exception('Error while copying file to target location (copied bytes: ' . $count . ', expected filesize: ' . $expected . ' )');
}
// if content length is sent by client:
// double check if the file was fully received
// compare expected and actual size
if (isset($_SERVER['CONTENT_LENGTH']) && $_SERVER['REQUEST_METHOD'] === 'PUT') {
$expected = $_SERVER['CONTENT_LENGTH'];
if ($count != $expected) {
throw new BadRequest('expected filesize ' . $expected . ' got ' . $count);
}
}
} catch (\Exception $e) {
$this->cleanFailedUpload($partStorage, $internalPartPath);
$this->convertToSabreException($e);
}
try {
$view = \OC\Files\Filesystem::getView();
if ($view) {
$run = $this->emitPreHooks($exists);
if ($run === false) {
$view->unlockFile($this->path, ILockingProvider::LOCK_SHARED);
return null;
}
} else {
$run = true;
}
try {
$this->changeLock(ILockingProvider::LOCK_EXCLUSIVE);
} catch (LockedException $e) {
$this->cleanFailedUpload($partStorage, $internalPartPath);
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
if ($usePartFile) {
// rename to correct path
try {
if ($run) {
$renameOkay = $storage->moveFromStorage($partStorage, $internalPartPath, $internalPath);
$fileExists = $storage->file_exists($internalPath);
}
if (!$run || $renameOkay === false || $fileExists === false) {
\OCP\Util::writeLog('webdav', 'renaming part file to final file failed', \OCP\Util::ERROR);
throw new Exception('Could not rename part file to final file');
}
} catch (ForbiddenException $ex) {
// try to revert the lock state so it can be cleanup properly
try {
$this->changeLock(ILockingProvider::LOCK_SHARED);
} catch (LockedException $e) {
$this->convertToSabreException($e);
}
throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
} catch (\Exception $e) {
$partStorage->unlink($internalPartPath);
// try to revert the lock state so it can be cleanup properly
try {
$this->changeLock(ILockingProvider::LOCK_SHARED);
} catch (LockedException $e) {
$this->convertToSabreException($e);
}
$this->convertToSabreException($e);
}
}
$this->handleMetadataUpdate($storage, $internalPath);
try {
$this->changeLock(ILockingProvider::LOCK_SHARED);
} catch (LockedException $e) {
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
if ($view) {
$this->emitPostHooks($exists);
}
$this->refreshInfo();
} catch (StorageNotAvailableException $e) {
throw new ServiceUnavailable("Failed to check file size: " . $e->getMessage());
}
$afterEvent = new GenericEvent(null, ['path' => $path]);
if ($newFile === true) {
\OC::$server->getEventDispatcher()->dispatch($afterEvent, 'file.aftercreate');
} else {
\OC::$server->getEventDispatcher()->dispatch($afterEvent, 'file.afterupdate');
}
return '"' . $this->info->getEtag() . '"';
}
/**
* Figure out the content length for the data. The data could be a resource or a string.
* The $_SERVER['CONTENT_LENGTH'] variable will be prioritized over anything if it's set
* Return -1 if we can't figure out the content length
*/
private function getExpectedContentLength($data) {
$expected = -1;
if (isset($_SERVER['CONTENT_LENGTH'])) {
$expected = $_SERVER['CONTENT_LENGTH'];
} elseif (\is_resource($data)) {
$stat = \fstat($data);
if ($stat !== false) {
$expected = $stat['size'];
}
} elseif (\is_string($data)) {
$expected = \strlen($data);
}
return $expected;
}
private function getPartFileBasePath($path) {
$partFileInStorage = \OC::$server->getConfig()->getSystemValue('part_file_in_storage', true);
if ($partFileInStorage) {
return $path;
} else {
return \md5($path); // will place it in the root of the view with a unique name
}
}
/**
* @param string $path
*/
private function emitPreHooks($exists, $path = null) {
if ($path === null) {
$path = $this->path;
}
$hookPath = Filesystem::getView()->getRelativePath($this->fileView->getAbsolutePath($path));
$run = true;
$event = new GenericEvent(null);
if (!$exists) {
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_create, [
\OC\Files\Filesystem::signal_param_path => $hookPath,
\OC\Files\Filesystem::signal_param_run => &$run,
]);
if ($run) {
$event->setArgument('run', $run);
\OC::$server->getEventDispatcher()->dispatch($event, 'file.beforeCreate');
$run = $event->getArgument('run');
}
} else {
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_update, [
\OC\Files\Filesystem::signal_param_path => $hookPath,
\OC\Files\Filesystem::signal_param_run => &$run,
]);
if ($run) {
$event->setArgument('run', $run);
\OC::$server->getEventDispatcher()->dispatch($event, 'file.beforeUpdate');
$run = $event->getArgument('run');
}
}
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_write, [
\OC\Files\Filesystem::signal_param_path => $hookPath,
\OC\Files\Filesystem::signal_param_run => &$run,
]);
if ($run) {
$event->setArgument('run', $run);
\OC::$server->getEventDispatcher()->dispatch($event, 'file.beforeWrite');
$run = $event->getArgument('run');
}
return $run;
}
/**
* @param string $path
*/
private function emitPostHooks($exists, $path = null) {
if ($path === null) {
$path = $this->path;
}
$hookPath = Filesystem::getView()->getRelativePath($this->fileView->getAbsolutePath($path));
if (!$exists) {
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_post_create, [
\OC\Files\Filesystem::signal_param_path => $hookPath
]);
} else {
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_post_update, [
\OC\Files\Filesystem::signal_param_path => $hookPath
]);
}
\OC_Hook::emit(\OC\Files\Filesystem::CLASSNAME, \OC\Files\Filesystem::signal_post_write, [
\OC\Files\Filesystem::signal_param_path => $hookPath
]);
}
/**
* Returns the data
*
* @return resource
* @throws Forbidden
* @throws ServiceUnavailable
*/
public function get() {
//throw exception if encryption is disabled but files are still encrypted
try {
$viewPath = \ltrim($this->path, '/');
if (!$this->info->isReadable() || !$this->fileView->file_exists($viewPath)) {
// do a if the file did not exist
throw new NotFound();
}
$res = $this->fileView->fopen($viewPath, 'rb');
if ($res === false) {
throw new ServiceUnavailable("Could not open file");
}
return $res;
} catch (GenericEncryptionException $e) {
// returning 403 because some apps stops syncing if 503 is returned.
throw new Forbidden("Encryption not ready: " . $e->getMessage());
} catch (StorageNotAvailableException $e) {
throw new ServiceUnavailable("Failed to open file: " . $e->getMessage());
} catch (ForbiddenException $ex) {
throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
} catch (LockedException $e) {
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
}
/**
* Delete the current file
*
* @throws Forbidden
* @throws ServiceUnavailable
*/
public function delete() {
if (!$this->info->isDeletable()) {
throw new Forbidden();
}
try {
if (!$this->fileView->unlink($this->path)) {
// assume it wasn't possible to delete due to permissions
throw new Forbidden();
}
} catch (StorageNotAvailableException $e) {
throw new ServiceUnavailable("Failed to unlink: " . $e->getMessage());
} catch (ForbiddenException $ex) {
throw new DAVForbiddenException($ex->getMessage(), $ex->getRetry());
} catch (LockedException $e) {
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
}
/**
* Returns the mime-type for a file
*
* If null is returned, we'll assume application/octet-stream
*
* @return string
*/
public function getContentType() {
$mimeType = $this->info->getMimetype();
// PROPFIND needs to return the correct mime type, for consistency with the web UI
if (isset($_SERVER['REQUEST_METHOD']) && $_SERVER['REQUEST_METHOD'] === 'PROPFIND') {
return $mimeType;
}
return \OC::$server->getMimeTypeDetector()->getSecureMimeType($mimeType);
}
/**
* @return array|false
*/
public function getDirectDownload() {
if (\OCP\App::isEnabled('encryption')) {
return [];
}
/** @var \OCP\Files\Storage $storage */
list($storage, $internalPath) = $this->fileView->resolvePath($this->path);
if ($storage === null) {
return [];
}
return $storage->getDirectDownload($internalPath);
}
/**
* @param resource $data
* @return null|string
* @throws Exception
* @throws BadRequest
* @throws NotImplemented
* @throws ServiceUnavailable
*/
private function createFileChunked($data) {
list($path, $name) = \Sabre\Uri\split($this->path);
$info = \OC_FileChunking::decodeName($name);
if (empty($info)) {
throw new NotImplemented('Invalid chunk name');
}
$chunk_handler = new \OC_FileChunking($info);
$bytesWritten = $chunk_handler->store($info['index'], $data);
//detect aborted upload
if (isset($_SERVER['REQUEST_METHOD']) && $_SERVER['REQUEST_METHOD'] === 'PUT') {
if (isset($_SERVER['CONTENT_LENGTH'])) {
$expected = $_SERVER['CONTENT_LENGTH'];
if ($bytesWritten != $expected) {
$chunk_handler->remove($info['index']);
throw new BadRequest(
'expected filesize ' . $expected . ' got ' . $bytesWritten
);
}
}
}
if ($chunk_handler->isComplete()) {
list($storage, ) = $this->fileView->resolvePath($path);
$usePartFile = $this->usePartFile($storage);
$partFile = null;
$targetPath = $path . '/' . $info['name'];
$absPath = $this->fileView->getAbsolutePath($targetPath);
$beforeEvent = new GenericEvent(null, ['path' => $absPath]);
$newFile = false;
if (!$this->fileView->file_exists($targetPath)) {
\OC::$server->getEventDispatcher()->dispatch($beforeEvent, 'file.beforecreate');
$newFile = true;
} else {
\OC::$server->getEventDispatcher()->dispatch($beforeEvent, 'file.beforeupdate');
}
/** @var \OC\Files\Storage\Storage $targetStorage */
list($targetStorage, $targetInternalPath) = $this->fileView->resolvePath($targetPath);
$exists = $this->fileView->file_exists($targetPath);
try {
$this->fileView->lockFile($targetPath, ILockingProvider::LOCK_SHARED);
$this->emitPreHooks($exists, $targetPath);
$this->fileView->changeLock($targetPath, ILockingProvider::LOCK_EXCLUSIVE);
/** @var \OC\Files\Storage\Storage $targetStorage */
list($targetStorage, $targetInternalPath) = $this->fileView->resolvePath($targetPath);
if ($usePartFile) {
// we first assembly the target file as a part file
$partFile = $this->getPartFileBasePath($path . '/' . $info['name']) . '.ocTransferId' . $info['transferid'] . '.part';
/** @var \OC\Files\Storage\Storage $targetStorage */
list($partStorage, $partInternalPath) = $this->fileView->resolvePath($partFile);
$chunk_handler->file_assemble($partStorage, $partInternalPath);
if (!self::isChecksumValid($this->request, $partStorage, $partInternalPath)) {
$partStorage->unlink($partInternalPath); // remove the uploaded file on checksum error
throw new BadRequest('The computed checksum does not match the one received from the client.');
}
// here is the final atomic rename
$renameOkay = $targetStorage->moveFromStorage($partStorage, $partInternalPath, $targetInternalPath);
$fileExists = $targetStorage->file_exists($targetInternalPath);
if ($renameOkay === false || $fileExists === false) {
\OCP\Util::writeLog('webdav', '\OC\Files\Filesystem::rename() failed', \OCP\Util::ERROR);
// only delete if an error occurred and the target file was already created
if ($fileExists) {
// set to null to avoid double-deletion when handling exception
// stray part file
$partFile = null;
$targetStorage->unlink($targetInternalPath);
}
$this->fileView->changeLock($targetPath, ILockingProvider::LOCK_SHARED);
throw new Exception('Could not rename part file assembled from chunks');
}
} else {
// assemble directly into the final file
$chunk_handler->file_assemble($targetStorage, $targetInternalPath);
}
$this->handleMetadataUpdate($targetStorage, $targetInternalPath);
$this->fileView->changeLock($targetPath, ILockingProvider::LOCK_SHARED);
$this->emitPostHooks($exists, $targetPath);
// FIXME: should call refreshInfo but can't because $this->path is not the of the final file
$info = $this->fileView->getFileInfo($targetPath);
if (isset($partStorage, $partInternalPath)) {
$metadata = $partStorage->getMetaData($partInternalPath);
} else {
$metadata = $targetStorage->getMetaData($targetInternalPath);
}
$checksums = (isset($metadata['checksum'])) ? $metadata['checksum'] : null;
$this->fileView->putFileInfo(
$targetPath,
['checksum' => $checksums]
);
$this->refreshInfo();
$this->fileView->unlockFile($targetPath, ILockingProvider::LOCK_SHARED);
$etag = $info->getEtag();
if ($etag !== null) {
$afterEvent = new GenericEvent(null, ['path' => $absPath]);
if ($newFile === true) {
\OC::$server->getEventDispatcher()->dispatch($afterEvent, 'file.aftercreate');
} else {
\OC::$server->getEventDispatcher()->dispatch($afterEvent, 'file.afterupdate');
}
}
return $etag;
} catch (\Exception $e) {
$this->cleanFailedUpload($targetStorage, $targetInternalPath);
$this->convertToSabreException($e);
}
}
return null;
}
/**
* will return true if checksum was not provided in request
*
* @param Storage $storage
* @param $path
* @return bool
*/
private static function isChecksumValid(Request $request, Storage $storage, $path) {
$meta = $storage->getMetaData($path);
if (!isset($request->server['HTTP_OC_CHECKSUM']) || !isset($meta['checksum'])) {
// No comparison possible, skip the check
return true;
}
$expectedChecksum = \trim($request->server['HTTP_OC_CHECKSUM']);
$computedChecksums = $meta['checksum'];
return \strpos($computedChecksums, $expectedChecksum) !== false;
}
/**
* Returns whether a part file is needed for the given storage
* or whether the file can be assembled/uploaded directly on the
* target storage.
*
* @param \OCP\Files\Storage $storage
* @return bool true if the storage uses part file handling
*/
private function usePartFile($storage) {
// TODO: in the future use ChunkHandler provided by storage
return $storage->usePartFile();
}
/**
* Convert the given exception to a SabreException instance
*
* @param \Exception $e
*
* @throws \Sabre\DAV\Exception
*/
private function convertToSabreException(\Exception $e) {
if ($e instanceof FileContentNotAllowedException) {
// the file content is not permitted
throw new DAVForbiddenException($e->getMessage(), $e->getRetry(), $e);
}
if ($e instanceof \Sabre\DAV\Exception) {
throw $e;
}
if ($e instanceof NotPermittedException) {
// a more general case - due to whatever reason the content could not be written
throw new Forbidden($e->getMessage(), 0, $e);
}
if ($e instanceof ForbiddenException) {
// the path for the file was forbidden
throw new DAVForbiddenException($e->getMessage(), $e->getRetry(), $e);
}
if ($e instanceof EntityTooLargeException) {
// the file is too big to be stored
throw new EntityTooLarge($e->getMessage(), 0, $e);
}
if ($e instanceof InvalidContentException) {
// the file content is not permitted
throw new UnsupportedMediaType($e->getMessage(), 0, $e);
}
if ($e instanceof FileNameTooLongException) {
throw new FileNameTooLong($e->getMessage(), 0, $e);
}
if ($e instanceof InvalidPathException) {
// the path for the file was not valid
// TODO: find proper http status code for this case
throw new Forbidden($e->getMessage(), 0, $e);
}
if ($e instanceof LockedException || $e instanceof LockNotAcquiredException) {
// the file is currently being written to by another process
throw new FileLocked($e->getMessage(), $e->getCode(), $e);
}
if ($e instanceof GenericEncryptionException) {
// returning 503 will allow retry of the operation at a later point in time
throw new ServiceUnavailable('Encryption not ready: ' . $e->getMessage(), 0, $e);
}
if ($e instanceof StorageNotAvailableException) {
throw new ServiceUnavailable('Failed to write file contents: ' . $e->getMessage(), 0, $e);
}
throw new \Sabre\DAV\Exception($e->getMessage(), 0, $e);
}
/**
* Set $algo to get a specific checksum, leave null to get all checksums
* (space separated)
* @param null $algo
* @return string
*/
public function getChecksum($algo = null) {
$allChecksums = $this->info->getChecksum();
if (!$algo) {
return $allChecksums;
}
$checksums = \explode(' ', $allChecksums);
$algoPrefix = \strtoupper($algo) . ':';
foreach ($checksums as $checksum) {
// starts with $algoPrefix
if (\substr($checksum, 0, \strlen($algoPrefix)) === $algoPrefix) {
return $checksum;
}
}
return '';
}
protected function header($string) {
\header($string);
}
/**
* @return \OCP\Files\Node
*/
public function getNode() {
return \OC::$server->getRootFolder()->get($this->getFileInfo()->getPath());
}
private function cleanFailedUpload(Storage $partStorage, $internalPartPath): void {
if ($partStorage->file_exists($internalPartPath)) {
try {
# broken/uncompleted uploaded files shall not go into trash-bin
if (class_exists(\OCA\Files_Trashbin\Storage::class)) {
\OCA\Files_Trashbin\Storage::$disableTrash = true;
}
# delete file from storage
$partStorage->unlink($internalPartPath);
# delete file from cache
$partStorage->getCache()->remove($internalPartPath);
} finally {
if (class_exists(\OCA\Files_Trashbin\Storage::class)) {
\OCA\Files_Trashbin\Storage::$disableTrash = false;
}
}
}
}
}