123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264 |
- <?php
- /**
- * @author Lukas Reschke <lukas@owncloud.com>
- * @author Morris Jobke <hey@morrisjobke.de>
- * @author Robin Appelman <icewind@owncloud.com>
- * @author Thomas Müller <thomas.mueller@tmit.eu>
- * @author Vincent Petry <pvince81@owncloud.com>
- *
- * @copyright Copyright (c) 2015, ownCloud, Inc.
- * @license AGPL-3.0
- *
- * This code is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License, version 3,
- * as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License, version 3,
- * along with this program. If not, see <http://www.gnu.org/licenses/>
- *
- */
- namespace OCA\Files_Sharing\External;
- use OC\Files\Storage\DAV;
- use OC\ForbiddenException;
- use OCA\Files_Sharing\ISharedStorage;
- use OCP\Files\NotFoundException;
- use OCP\Files\StorageInvalidException;
- use OCP\Files\StorageNotAvailableException;
- class Storage extends DAV implements ISharedStorage {
- /**
- * @var string
- */
- private $remoteUser;
- /**
- * @var string
- */
- private $remote;
- /**
- * @var string
- */
- private $mountPoint;
- /**
- * @var string
- */
- private $token;
- /**
- * @var \OCP\ICertificateManager
- */
- private $certificateManager;
- private $updateChecked = false;
- /**
- * @var \OCA\Files_Sharing\External\Manager
- */
- private $manager;
- public function __construct($options) {
- $this->manager = $options['manager'];
- $this->certificateManager = $options['certificateManager'];
- $this->remote = $options['remote'];
- $this->remoteUser = $options['owner'];
- list($protocol, $remote) = explode('://', $this->remote);
- if (strpos($remote, '/')) {
- list($host, $root) = explode('/', $remote, 2);
- } else {
- $host = $remote;
- $root = '';
- }
- $secure = $protocol === 'https';
- $root = rtrim($root, '/') . '/public.php/webdav';
- $this->mountPoint = $options['mountpoint'];
- $this->token = $options['token'];
- parent::__construct(array(
- 'secure' => $secure,
- 'host' => $host,
- 'root' => $root,
- 'user' => $options['token'],
- 'password' => (string)$options['password']
- ));
- $this->getWatcher()->setPolicy(\OC\Files\Cache\Watcher::CHECK_ONCE);
- }
- public function getRemoteUser() {
- return $this->remoteUser;
- }
- public function getRemote() {
- return $this->remote;
- }
- public function getMountPoint() {
- return $this->mountPoint;
- }
- public function getToken() {
- return $this->token;
- }
- public function getPassword() {
- return $this->password;
- }
- /**
- * @brief get id of the mount point
- * @return string
- */
- public function getId() {
- return 'shared::' . md5($this->token . '@' . $this->remote);
- }
- public function getCache($path = '', $storage = null) {
- if (is_null($this->cache)) {
- $this->cache = new Cache($this, $this->remote, $this->remoteUser);
- }
- return $this->cache;
- }
- /**
- * @param string $path
- * @param \OC\Files\Storage\Storage $storage
- * @return \OCA\Files_Sharing\External\Scanner
- */
- public function getScanner($path = '', $storage = null) {
- if (!$storage) {
- $storage = $this;
- }
- if (!isset($this->scanner)) {
- $this->scanner = new Scanner($storage);
- }
- return $this->scanner;
- }
- /**
- * check if a file or folder has been updated since $time
- *
- * @param string $path
- * @param int $time
- * @throws \OCP\Files\StorageNotAvailableException
- * @throws \OCP\Files\StorageInvalidException
- * @return bool
- */
- public function hasUpdated($path, $time) {
- // since for owncloud webdav servers we can rely on etag propagation we only need to check the root of the storage
- // because of that we only do one check for the entire storage per request
- if ($this->updateChecked) {
- return false;
- }
- $this->updateChecked = true;
- try {
- return parent::hasUpdated('', $time);
- } catch (StorageInvalidException $e) {
- // check if it needs to be removed
- $this->checkStorageAvailability();
- throw $e;
- } catch (StorageNotAvailableException $e) {
- // check if it needs to be removed or just temp unavailable
- $this->checkStorageAvailability();
- throw $e;
- }
- }
- /**
- * Check whether this storage is permanently or temporarily
- * unavailable
- *
- * @throws \OCP\Files\StorageNotAvailableException
- * @throws \OCP\Files\StorageInvalidException
- */
- public function checkStorageAvailability() {
- // see if we can find out why the share is unavailable
- try {
- $this->getShareInfo();
- } catch (NotFoundException $e) {
- // a 404 can either mean that the share no longer exists or there is no ownCloud on the remote
- if ($this->testRemote()) {
- // valid ownCloud instance means that the public share no longer exists
- // since this is permanent (re-sharing the file will create a new token)
- // we remove the invalid storage
- $this->manager->removeShare($this->mountPoint);
- $this->manager->getMountManager()->removeMount($this->mountPoint);
- throw new StorageInvalidException();
- } else {
- // ownCloud instance is gone, likely to be a temporary server configuration error
- throw new StorageNotAvailableException();
- }
- } catch (ForbiddenException $e) {
- // auth error, remove share for now (provide a dialog in the future)
- $this->manager->removeShare($this->mountPoint);
- $this->manager->getMountManager()->removeMount($this->mountPoint);
- throw new StorageInvalidException();
- } catch (\GuzzleHttp\Exception\ConnectException $e) {
- throw new StorageNotAvailableException();
- } catch (\GuzzleHttp\Exception\RequestException $e) {
- throw new StorageNotAvailableException();
- } catch (\Exception $e) {
- throw $e;
- }
- }
- public function file_exists($path) {
- if ($path === '') {
- return true;
- } else {
- return parent::file_exists($path);
- }
- }
- /**
- * check if the configured remote is a valid ownCloud instance
- *
- * @return bool
- */
- protected function testRemote() {
- try {
- $result = file_get_contents($this->remote . '/status.php');
- $data = json_decode($result);
- return is_object($data) and !empty($data->version);
- } catch (\Exception $e) {
- return false;
- }
- }
- /**
- * @return mixed
- * @throws ForbiddenException
- * @throws NotFoundException
- * @throws \Exception
- */
- public function getShareInfo() {
- $remote = $this->getRemote();
- $token = $this->getToken();
- $password = $this->getPassword();
- $url = rtrim($remote, '/') . '/index.php/apps/files_sharing/shareinfo?t=' . $token;
- // TODO: DI
- $client = \OC::$server->getHTTPClientService()->newClient();
- try {
- $response = $client->post($url, ['body' => ['password' => $password]]);
- } catch (\GuzzleHttp\Exception\RequestException $e) {
- if ($e->getCode() === 401 || $e->getCode() === 403) {
- throw new ForbiddenException();
- }
- // throw this to be on the safe side: the share will still be visible
- // in the UI in case the failure is intermittent, and the user will
- // be able to decide whether to remove it if it's really gone
- throw new StorageNotAvailableException();
- }
- return json_decode($response->getBody(), true);
- }
- }
|