2012-01-27 15:03:50 +00:00
|
|
|
<?php
|
2019-04-14 02:35:00 +00:00
|
|
|
/**
|
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
|
*
|
|
|
|
|
* @file
|
|
|
|
|
* @ingroup FileBackend
|
|
|
|
|
*/
|
|
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
/**
|
2012-05-07 07:11:33 +00:00
|
|
|
* File system based backend.
|
|
|
|
|
*
|
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
|
*
|
2011-12-20 03:52:06 +00:00
|
|
|
* @file
|
|
|
|
|
* @ingroup FileBackend
|
|
|
|
|
*/
|
2019-09-07 05:58:29 +00:00
|
|
|
use Wikimedia\AtEase\AtEase;
|
2016-10-02 04:51:51 +00:00
|
|
|
use Wikimedia\Timestamp\ConvertibleTimestamp;
|
2011-12-20 03:52:06 +00:00
|
|
|
|
|
|
|
|
/**
|
2012-03-03 19:14:50 +00:00
|
|
|
* @brief Class for a file system (FS) based file backend.
|
2012-04-05 05:56:08 +00:00
|
|
|
*
|
2012-01-12 18:44:00 +00:00
|
|
|
* All "containers" each map to a directory under the backend's base directory.
|
|
|
|
|
* For backwards-compatibility, some container paths can be set to custom paths.
|
2016-09-21 22:36:16 +00:00
|
|
|
* The domain ID will not be used in any custom paths, so this should be avoided.
|
2012-04-05 05:56:08 +00:00
|
|
|
*
|
2012-01-12 19:20:58 +00:00
|
|
|
* Having directories with thousands of files will diminish performance.
|
2012-01-12 18:44:00 +00:00
|
|
|
* Sharding can be accomplished by using FileRepo-style hash paths.
|
2012-01-04 01:08:33 +00:00
|
|
|
*
|
2016-09-16 22:55:40 +00:00
|
|
|
* StatusValue messages should avoid mentioning the internal FS paths.
|
2012-02-24 20:10:36 +00:00
|
|
|
* PHP warnings are assumed to be logged rather than output.
|
2011-12-20 03:52:06 +00:00
|
|
|
*
|
|
|
|
|
* @ingroup FileBackend
|
2012-01-13 23:30:46 +00:00
|
|
|
* @since 1.19
|
2011-12-20 03:52:06 +00:00
|
|
|
*/
|
2012-01-29 22:22:28 +00:00
|
|
|
class FSFileBackend extends FileBackendStore {
|
2013-11-23 18:23:32 +00:00
|
|
|
/** @var string Directory holding the container directories */
|
|
|
|
|
protected $basePath;
|
|
|
|
|
|
|
|
|
|
/** @var array Map of container names to root paths for custom container paths */
|
2019-09-07 05:58:29 +00:00
|
|
|
protected $containerPaths;
|
2013-11-23 18:23:32 +00:00
|
|
|
|
2019-09-07 06:21:48 +00:00
|
|
|
/** @var int Directory permission mode */
|
|
|
|
|
protected $dirMode;
|
2013-11-23 18:23:32 +00:00
|
|
|
/** @var int File permission mode */
|
|
|
|
|
protected $fileMode;
|
|
|
|
|
/** @var string Required OS username to own files */
|
|
|
|
|
protected $fileOwner;
|
|
|
|
|
|
2019-09-12 19:45:18 +00:00
|
|
|
/** @var bool Whether the OS is Windows (otherwise assumed Unix-like) */
|
2016-09-21 22:34:46 +00:00
|
|
|
protected $isWindows;
|
2013-11-23 18:23:32 +00:00
|
|
|
/** @var string OS username running this script */
|
|
|
|
|
protected $currentUser;
|
|
|
|
|
|
2019-09-07 06:21:48 +00:00
|
|
|
/** @var bool[] Map of (stack index => whether a warning happened) */
|
|
|
|
|
private $warningTrapStack = [];
|
2012-01-28 17:05:20 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
/**
|
2012-01-29 22:22:28 +00:00
|
|
|
* @see FileBackendStore::__construct()
|
2011-12-20 03:52:06 +00:00
|
|
|
* Additional $config params include:
|
2012-07-18 19:08:30 +00:00
|
|
|
* - basePath : File system directory that holds containers.
|
|
|
|
|
* - containerPaths : Map of container names to custom file system directories.
|
|
|
|
|
* This should only be used for backwards-compatibility.
|
|
|
|
|
* - fileMode : Octal UNIX file permissions to use on files stored.
|
2016-09-21 22:34:46 +00:00
|
|
|
* - directoryMode : Octal UNIX file permissions to use on directories created.
|
2015-12-29 09:46:05 +00:00
|
|
|
* @param array $config
|
2011-12-20 03:52:06 +00:00
|
|
|
*/
|
2012-01-04 01:08:33 +00:00
|
|
|
public function __construct( array $config ) {
|
2011-12-20 03:52:06 +00:00
|
|
|
parent::__construct( $config );
|
2012-02-08 09:16:19 +00:00
|
|
|
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->isWindows = ( strtoupper( substr( PHP_OS, 0, 3 ) ) === 'WIN' );
|
2012-02-08 09:16:19 +00:00
|
|
|
// Remove any possible trailing slash from directories
|
2012-01-12 18:44:00 +00:00
|
|
|
if ( isset( $config['basePath'] ) ) {
|
2012-02-08 09:54:44 +00:00
|
|
|
$this->basePath = rtrim( $config['basePath'], '/' ); // remove trailing slash
|
2012-01-12 18:44:00 +00:00
|
|
|
} else {
|
|
|
|
|
$this->basePath = null; // none; containers must have explicit paths
|
|
|
|
|
}
|
2012-02-08 09:16:19 +00:00
|
|
|
|
2019-09-07 05:58:29 +00:00
|
|
|
$this->containerPaths = [];
|
|
|
|
|
foreach ( ( $config['containerPaths'] ?? [] ) as $container => $path ) {
|
|
|
|
|
$this->containerPaths[$container] = rtrim( $path, '/' ); // remove trailing slash
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
2012-02-08 09:21:19 +00:00
|
|
|
|
2017-10-06 22:17:58 +00:00
|
|
|
$this->fileMode = $config['fileMode'] ?? 0644;
|
|
|
|
|
$this->dirMode = $config['directoryMode'] ?? 0777;
|
2012-08-20 20:03:50 +00:00
|
|
|
if ( isset( $config['fileOwner'] ) && function_exists( 'posix_getuid' ) ) {
|
|
|
|
|
$this->fileOwner = $config['fileOwner'];
|
2016-02-17 19:54:59 +00:00
|
|
|
// cache this, assuming it doesn't change
|
|
|
|
|
$this->currentUser = posix_getpwuid( posix_getuid() )['name'];
|
2012-08-20 20:03:50 +00:00
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2014-04-12 06:50:58 +00:00
|
|
|
public function getFeatures() {
|
2017-10-03 22:15:15 +00:00
|
|
|
if ( $this->isWindows && version_compare( PHP_VERSION, '7.1', 'lt' ) ) {
|
|
|
|
|
// PHP before 7.1 used 8-bit code page for filesystem paths on Windows;
|
2019-04-12 04:41:14 +00:00
|
|
|
// See https://www.php.net/manual/en/migration71.windows-support.php
|
2017-10-03 22:15:15 +00:00
|
|
|
return 0;
|
|
|
|
|
} else {
|
2019-09-08 06:33:49 +00:00
|
|
|
return self::ATTR_UNICODE_PATHS;
|
2017-10-03 22:15:15 +00:00
|
|
|
}
|
2014-04-12 06:50:58 +00:00
|
|
|
}
|
|
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
protected function resolveContainerPath( $container, $relStoragePath ) {
|
2012-02-08 09:00:31 +00:00
|
|
|
// Check that container has a root directory
|
2012-01-12 18:44:00 +00:00
|
|
|
if ( isset( $this->containerPaths[$container] ) || isset( $this->basePath ) ) {
|
2012-02-08 09:00:31 +00:00
|
|
|
// Check for sane relative paths (assume the base paths are OK)
|
|
|
|
|
if ( $this->isLegalRelPath( $relStoragePath ) ) {
|
|
|
|
|
return $relStoragePath;
|
|
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return null; // invalid
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-02-08 09:00:31 +00:00
|
|
|
/**
|
|
|
|
|
* Sanity check a relative file system path for validity
|
2012-04-05 05:56:08 +00:00
|
|
|
*
|
2013-03-11 17:15:01 +00:00
|
|
|
* @param string $path Normalized relative path
|
2012-02-09 00:24:11 +00:00
|
|
|
* @return bool
|
2012-02-08 09:00:31 +00:00
|
|
|
*/
|
|
|
|
|
protected function isLegalRelPath( $path ) {
|
|
|
|
|
// Check for file names longer than 255 chars
|
|
|
|
|
if ( preg_match( '![^/]{256}!', $path ) ) { // ext3/NTFS
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $this->isWindows ) { // NTFS
|
2012-02-09 00:24:11 +00:00
|
|
|
return !preg_match( '![:*?"<>|]!', $path );
|
2012-02-08 09:00:31 +00:00
|
|
|
} else {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
/**
|
|
|
|
|
* Given the short (unresolved) and full (resolved) name of
|
|
|
|
|
* a container, return the file system path of the container.
|
2012-04-05 05:56:08 +00:00
|
|
|
*
|
2013-06-13 18:18:52 +00:00
|
|
|
* @param string $shortCont
|
|
|
|
|
* @param string $fullCont
|
2012-04-05 05:56:08 +00:00
|
|
|
* @return string|null
|
2012-01-12 18:44:00 +00:00
|
|
|
*/
|
|
|
|
|
protected function containerFSRoot( $shortCont, $fullCont ) {
|
|
|
|
|
if ( isset( $this->containerPaths[$shortCont] ) ) {
|
2012-04-05 05:56:08 +00:00
|
|
|
return $this->containerPaths[$shortCont];
|
2012-01-12 18:44:00 +00:00
|
|
|
} elseif ( isset( $this->basePath ) ) {
|
|
|
|
|
return "{$this->basePath}/{$fullCont}";
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
return null; // no container base path defined
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Get the absolute file system path for a storage path
|
2012-04-05 05:56:08 +00:00
|
|
|
*
|
2013-03-11 17:15:01 +00:00
|
|
|
* @param string $storagePath Storage path
|
2012-01-12 18:44:00 +00:00
|
|
|
* @return string|null
|
|
|
|
|
*/
|
|
|
|
|
protected function resolveToFSPath( $storagePath ) {
|
|
|
|
|
list( $fullCont, $relPath ) = $this->resolveStoragePathReal( $storagePath );
|
|
|
|
|
if ( $relPath === null ) {
|
|
|
|
|
return null; // invalid
|
|
|
|
|
}
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $storagePath );
|
2012-01-12 18:44:00 +00:00
|
|
|
$fsPath = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
if ( $relPath != '' ) {
|
|
|
|
|
$fsPath .= "/{$relPath}";
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
return $fsPath;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-19 23:18:03 +00:00
|
|
|
public function isPathUsableInternal( $storagePath ) {
|
|
|
|
|
$fsPath = $this->resolveToFSPath( $storagePath );
|
|
|
|
|
if ( $fsPath === null ) {
|
|
|
|
|
return false; // invalid
|
|
|
|
|
}
|
|
|
|
|
$parentDir = dirname( $fsPath );
|
|
|
|
|
|
|
|
|
|
if ( file_exists( $fsPath ) ) {
|
|
|
|
|
$ok = is_file( $fsPath ) && is_writable( $fsPath );
|
|
|
|
|
} else {
|
|
|
|
|
$ok = is_dir( $parentDir ) && is_writable( $parentDir );
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-20 20:03:50 +00:00
|
|
|
if ( $this->fileOwner !== null && $this->currentUser !== $this->fileOwner ) {
|
|
|
|
|
$ok = false;
|
|
|
|
|
trigger_error( __METHOD__ . ": PHP process owner is not '{$this->fileOwner}'." );
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-19 23:18:03 +00:00
|
|
|
return $ok;
|
|
|
|
|
}
|
|
|
|
|
|
2012-11-08 17:50:00 +00:00
|
|
|
protected function doCreateInternal( array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2012-11-08 17:50:00 +00:00
|
|
|
|
|
|
|
|
$dest = $this->resolveToFSPath( $params['dst'] );
|
|
|
|
|
if ( $dest === null ) {
|
|
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-11-08 17:50:00 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ( !empty( $params['async'] ) ) { // deferred
|
2019-09-07 05:58:29 +00:00
|
|
|
$tempFile = $this->stageContentAsTempFile( $params );
|
2012-11-08 17:50:00 +00:00
|
|
|
if ( !$tempFile ) {
|
|
|
|
|
$status->fatal( 'backend-fail-create', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-11-08 17:50:00 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
2016-02-17 09:09:32 +00:00
|
|
|
$cmd = implode( ' ', [
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->isWindows ? 'COPY /B /Y' : 'cp', // (binary, overwrite)
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $tempFile->getPath() ) ),
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $dest ) )
|
2016-02-17 09:09:32 +00:00
|
|
|
] );
|
2016-09-16 22:55:40 +00:00
|
|
|
$handler = function ( $errors, StatusValue $status, array $params, $cmd ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $errors !== '' && !( $this->isWindows && $errors[0] === " " ) ) {
|
2014-06-12 20:40:03 +00:00
|
|
|
$status->fatal( 'backend-fail-create', $params['dst'] );
|
|
|
|
|
trigger_error( "$cmd\n$errors", E_USER_WARNING ); // command output
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
$status->value = new FSFileOpHandle( $this, $params, $handler, $cmd, $dest );
|
2012-11-08 17:50:00 +00:00
|
|
|
$tempFile->bind( $status->value );
|
|
|
|
|
} else { // immediate write
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->trapWarnings();
|
2012-11-08 17:50:00 +00:00
|
|
|
$bytes = file_put_contents( $dest, $params['content'] );
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->untrapWarnings();
|
2012-11-08 17:50:00 +00:00
|
|
|
if ( $bytes === false ) {
|
|
|
|
|
$status->fatal( 'backend-fail-create', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-11-08 17:50:00 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
$this->chmod( $dest );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2011-12-21 09:16:28 +00:00
|
|
|
protected function doStoreInternal( array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
$dest = $this->resolveToFSPath( $params['dst'] );
|
2011-12-20 03:52:06 +00:00
|
|
|
if ( $dest === null ) {
|
|
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
2012-01-12 18:44:00 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
if ( !empty( $params['async'] ) ) { // deferred
|
2016-02-17 09:09:32 +00:00
|
|
|
$cmd = implode( ' ', [
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->isWindows ? 'COPY /B /Y' : 'cp', // (binary, overwrite)
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $params['src'] ) ),
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $dest ) )
|
2016-02-17 09:09:32 +00:00
|
|
|
] );
|
2016-09-16 22:55:40 +00:00
|
|
|
$handler = function ( $errors, StatusValue $status, array $params, $cmd ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $errors !== '' && !( $this->isWindows && $errors[0] === " " ) ) {
|
2014-06-12 20:40:03 +00:00
|
|
|
$status->fatal( 'backend-fail-store', $params['src'], $params['dst'] );
|
|
|
|
|
trigger_error( "$cmd\n$errors", E_USER_WARNING ); // command output
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
$status->value = new FSFileOpHandle( $this, $params, $handler, $cmd, $dest );
|
2012-04-11 17:51:02 +00:00
|
|
|
} else { // immediate write
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->trapWarnings();
|
2012-04-11 17:51:02 +00:00
|
|
|
$ok = copy( $params['src'], $dest );
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->untrapWarnings();
|
2012-04-11 17:51:02 +00:00
|
|
|
// In some cases (at least over NFS), copy() returns true when it fails
|
|
|
|
|
if ( !$ok || ( filesize( $params['src'] ) !== filesize( $dest ) ) ) {
|
|
|
|
|
if ( $ok ) { // PHP bug
|
|
|
|
|
unlink( $dest ); // remove broken file
|
|
|
|
|
trigger_error( __METHOD__ . ": copy() failed but returned true." );
|
|
|
|
|
}
|
|
|
|
|
$status->fatal( 'backend-fail-store', $params['src'], $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
return $status;
|
2012-05-04 22:23:57 +00:00
|
|
|
}
|
2012-04-11 17:51:02 +00:00
|
|
|
$this->chmod( $dest );
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2011-12-21 09:16:28 +00:00
|
|
|
protected function doCopyInternal( array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
$source = $this->resolveToFSPath( $params['src'] );
|
2011-12-20 03:52:06 +00:00
|
|
|
if ( $source === null ) {
|
|
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['src'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
$dest = $this->resolveToFSPath( $params['dst'] );
|
2011-12-20 03:52:06 +00:00
|
|
|
if ( $dest === null ) {
|
|
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2012-10-29 19:57:04 +00:00
|
|
|
if ( !is_file( $source ) ) {
|
|
|
|
|
if ( empty( $params['ignoreMissingSource'] ) ) {
|
|
|
|
|
$status->fatal( 'backend-fail-copy', $params['src'] );
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-10-29 19:57:04 +00:00
|
|
|
return $status; // do nothing; either OK or bad status
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
if ( !empty( $params['async'] ) ) { // deferred
|
2016-02-17 09:09:32 +00:00
|
|
|
$cmd = implode( ' ', [
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->isWindows ? 'COPY /B /Y' : 'cp', // (binary, overwrite)
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $source ) ),
|
|
|
|
|
escapeshellarg( $this->cleanPathSlashes( $dest ) )
|
2016-02-17 09:09:32 +00:00
|
|
|
] );
|
2016-09-16 22:55:40 +00:00
|
|
|
$handler = function ( $errors, StatusValue $status, array $params, $cmd ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $errors !== '' && !( $this->isWindows && $errors[0] === " " ) ) {
|
2014-06-12 20:40:03 +00:00
|
|
|
$status->fatal( 'backend-fail-copy', $params['src'], $params['dst'] );
|
|
|
|
|
trigger_error( "$cmd\n$errors", E_USER_WARNING ); // command output
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
$status->value = new FSFileOpHandle( $this, $params, $handler, $cmd, $dest );
|
2012-04-11 17:51:02 +00:00
|
|
|
} else { // immediate write
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->trapWarnings();
|
2013-03-20 23:25:05 +00:00
|
|
|
$ok = ( $source === $dest ) ? true : copy( $source, $dest );
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->untrapWarnings();
|
2012-04-11 17:51:02 +00:00
|
|
|
// In some cases (at least over NFS), copy() returns true when it fails
|
|
|
|
|
if ( !$ok || ( filesize( $source ) !== filesize( $dest ) ) ) {
|
|
|
|
|
if ( $ok ) { // PHP bug
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->trapWarnings();
|
2012-04-11 17:51:02 +00:00
|
|
|
unlink( $dest ); // remove broken file
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->untrapWarnings();
|
2012-04-11 17:51:02 +00:00
|
|
|
trigger_error( __METHOD__ . ": copy() failed but returned true." );
|
|
|
|
|
}
|
|
|
|
|
$status->fatal( 'backend-fail-copy', $params['src'], $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
return $status;
|
2012-05-04 22:23:57 +00:00
|
|
|
}
|
2012-04-11 17:51:02 +00:00
|
|
|
$this->chmod( $dest );
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2011-12-21 09:16:28 +00:00
|
|
|
protected function doMoveInternal( array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2019-09-07 08:25:19 +00:00
|
|
|
$fsSrcPath = $this->resolveToFSPath( $params['src'] );
|
|
|
|
|
if ( $fsSrcPath === null ) {
|
2011-12-20 03:52:06 +00:00
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['src'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
2012-01-12 18:44:00 +00:00
|
|
|
|
2019-09-07 08:25:19 +00:00
|
|
|
$fsDstPath = $this->resolveToFSPath( $params['dst'] );
|
|
|
|
|
if ( $fsDstPath === null ) {
|
2011-12-20 03:52:06 +00:00
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-07 08:25:19 +00:00
|
|
|
if ( $fsSrcPath === $fsDstPath ) {
|
|
|
|
|
return $status; // no-op
|
2012-10-29 19:57:04 +00:00
|
|
|
}
|
|
|
|
|
|
2019-09-07 08:25:19 +00:00
|
|
|
$ignoreMissing = !empty( $params['ignoreMissingSource'] );
|
|
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
if ( !empty( $params['async'] ) ) { // deferred
|
2019-09-07 08:25:19 +00:00
|
|
|
// https://manpages.debian.org/buster/coreutils/mv.1.en.html
|
|
|
|
|
// https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/move
|
|
|
|
|
$encSrc = escapeshellarg( $this->cleanPathSlashes( $fsSrcPath ) );
|
|
|
|
|
$encDst = escapeshellarg( $this->cleanPathSlashes( $fsDstPath ) );
|
|
|
|
|
if ( $this->isWindows ) {
|
|
|
|
|
$writeCmd = "MOVE /Y $encSrc $encDst";
|
|
|
|
|
$cmd = $ignoreMissing ? "IF EXIST $encSrc $writeCmd" : $writeCmd;
|
|
|
|
|
} else {
|
|
|
|
|
$writeCmd = "mv -f $encSrc $encDst";
|
|
|
|
|
$cmd = $ignoreMissing ? "test -f $encSrc && $writeCmd" : $writeCmd;
|
|
|
|
|
}
|
2016-09-16 22:55:40 +00:00
|
|
|
$handler = function ( $errors, StatusValue $status, array $params, $cmd ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $errors !== '' && !( $this->isWindows && $errors[0] === " " ) ) {
|
2014-06-12 20:40:03 +00:00
|
|
|
$status->fatal( 'backend-fail-move', $params['src'], $params['dst'] );
|
|
|
|
|
trigger_error( "$cmd\n$errors", E_USER_WARNING ); // command output
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
$status->value = new FSFileOpHandle( $this, $params, $handler, $cmd );
|
2012-04-11 17:51:02 +00:00
|
|
|
} else { // immediate write
|
2019-09-07 08:25:19 +00:00
|
|
|
// Use rename() here since (a) this clears xattrs, (b) any threads still reading the
|
|
|
|
|
// old inode are unaffected since it writes to a new inode, and (c) this is fast and
|
|
|
|
|
// atomic within a file system volume (as is normally the case)
|
|
|
|
|
$this->trapWarnings( '/: No such file or directory$/' );
|
|
|
|
|
$moved = rename( $fsSrcPath, $fsDstPath );
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
|
|
|
|
if ( $hadError || ( !$moved && !$ignoreMissing ) ) {
|
2012-04-11 17:51:02 +00:00
|
|
|
$status->fatal( 'backend-fail-move', $params['src'], $params['dst'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2011-12-21 09:16:28 +00:00
|
|
|
protected function doDeleteInternal( array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2019-09-07 06:21:48 +00:00
|
|
|
$fsSrcPath = $this->resolveToFSPath( $params['src'] );
|
|
|
|
|
if ( $fsSrcPath === null ) {
|
2011-12-20 03:52:06 +00:00
|
|
|
$status->fatal( 'backend-fail-invalidpath', $params['src'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-07 06:21:48 +00:00
|
|
|
$ignoreMissing = !empty( $params['ignoreMissingSource'] );
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
if ( !empty( $params['async'] ) ) { // deferred
|
2019-09-07 06:21:48 +00:00
|
|
|
// https://manpages.debian.org/buster/coreutils/rm.1.en.html
|
|
|
|
|
// https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/del
|
|
|
|
|
$encSrc = escapeshellarg( $this->cleanPathSlashes( $fsSrcPath ) );
|
|
|
|
|
if ( $this->isWindows ) {
|
|
|
|
|
$writeCmd = "DEL /Q $encSrc";
|
|
|
|
|
$cmd = $ignoreMissing ? "IF EXIST $encSrc $writeCmd" : $writeCmd;
|
|
|
|
|
} else {
|
|
|
|
|
$cmd = $ignoreMissing ? "rm -f $encSrc" : "rm $encSrc";
|
|
|
|
|
}
|
2016-09-16 22:55:40 +00:00
|
|
|
$handler = function ( $errors, StatusValue $status, array $params, $cmd ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( $errors !== '' && !( $this->isWindows && $errors[0] === " " ) ) {
|
2014-06-12 20:40:03 +00:00
|
|
|
$status->fatal( 'backend-fail-delete', $params['src'] );
|
|
|
|
|
trigger_error( "$cmd\n$errors", E_USER_WARNING ); // command output
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
$status->value = new FSFileOpHandle( $this, $params, $handler, $cmd );
|
2012-04-11 17:51:02 +00:00
|
|
|
} else { // immediate write
|
2019-09-07 06:21:48 +00:00
|
|
|
$this->trapWarnings( '/: No such file or directory$/' );
|
|
|
|
|
$deleted = unlink( $fsSrcPath );
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
|
|
|
|
if ( $hadError || ( !$deleted && !$ignoreMissing ) ) {
|
2012-04-11 17:51:02 +00:00
|
|
|
$status->fatal( 'backend-fail-delete', $params['src'] );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2013-11-23 18:23:32 +00:00
|
|
|
/**
|
|
|
|
|
* @param string $fullCont
|
2014-04-19 15:19:17 +00:00
|
|
|
* @param string $dirRel
|
2013-11-23 18:23:32 +00:00
|
|
|
* @param array $params
|
2016-09-16 22:55:40 +00:00
|
|
|
* @return StatusValue
|
2013-11-23 18:23:32 +00:00
|
|
|
*/
|
2012-01-12 18:44:00 +00:00
|
|
|
protected function doPrepareInternal( $fullCont, $dirRel, array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-01-12 18:44:00 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
2012-05-21 22:19:06 +00:00
|
|
|
$existed = is_dir( $dir ); // already there?
|
2012-12-31 19:16:05 +00:00
|
|
|
// Create the directory and its parents as needed...
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::suppressWarnings();
|
2016-09-21 22:34:46 +00:00
|
|
|
if ( !$existed && !mkdir( $dir, $this->dirMode, true ) && !is_dir( $dir ) ) {
|
|
|
|
|
$this->logger->error( __METHOD__ . ": cannot create directory $dir" );
|
2012-05-21 22:19:06 +00:00
|
|
|
$status->fatal( 'directorycreateerror', $params['dir'] ); // fails on races
|
2011-12-20 03:52:06 +00:00
|
|
|
} elseif ( !is_writable( $dir ) ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->logger->error( __METHOD__ . ": directory $dir is read-only" );
|
2011-12-20 03:52:06 +00:00
|
|
|
$status->fatal( 'directoryreadonlyerror', $params['dir'] );
|
|
|
|
|
} elseif ( !is_readable( $dir ) ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
$this->logger->error( __METHOD__ . ": directory $dir is not readable" );
|
2011-12-20 03:52:06 +00:00
|
|
|
$status->fatal( 'directorynotreadableerror', $params['dir'] );
|
|
|
|
|
}
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::restoreWarnings();
|
2012-12-31 19:16:05 +00:00
|
|
|
// Respect any 'noAccess' or 'noListing' flags...
|
2012-05-21 22:19:06 +00:00
|
|
|
if ( is_dir( $dir ) && !$existed ) {
|
|
|
|
|
$status->merge( $this->doSecureInternal( $fullCont, $dirRel, $params ) );
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
protected function doSecureInternal( $fullCont, $dirRel, array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-01-12 18:44:00 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
2012-01-04 01:08:33 +00:00
|
|
|
// Seed new directories with a blank index.html, to prevent crawling...
|
|
|
|
|
if ( !empty( $params['noListing'] ) && !file_exists( "{$dir}/index.html" ) ) {
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->trapWarnings();
|
2012-05-21 22:19:06 +00:00
|
|
|
$bytes = file_put_contents( "{$dir}/index.html", $this->indexHtmlPrivate() );
|
2012-12-31 19:16:05 +00:00
|
|
|
$this->untrapWarnings();
|
2012-05-21 22:19:06 +00:00
|
|
|
if ( $bytes === false ) {
|
2012-01-04 01:08:33 +00:00
|
|
|
$status->fatal( 'backend-fail-create', $params['dir'] . '/index.html' );
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
}
|
2012-01-04 01:08:33 +00:00
|
|
|
// Add a .htaccess file to the root of the container...
|
2012-05-21 22:19:06 +00:00
|
|
|
if ( !empty( $params['noAccess'] ) && !file_exists( "{$contRoot}/.htaccess" ) ) {
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::suppressWarnings();
|
2012-05-21 22:19:06 +00:00
|
|
|
$bytes = file_put_contents( "{$contRoot}/.htaccess", $this->htaccessPrivate() );
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::restoreWarnings();
|
2012-05-21 22:19:06 +00:00
|
|
|
if ( $bytes === false ) {
|
|
|
|
|
$storeDir = "mwstore://{$this->name}/{$shortCont}";
|
|
|
|
|
$status->fatal( 'backend-fail-create', "{$storeDir}/.htaccess" );
|
|
|
|
|
}
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2012-05-21 22:19:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protected function doPublishInternal( $fullCont, $dirRel, array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-05-21 22:19:06 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
|
|
|
|
// Unseed new directories with a blank index.html, to allow crawling...
|
|
|
|
|
if ( !empty( $params['listing'] ) && is_file( "{$dir}/index.html" ) ) {
|
|
|
|
|
$exists = ( file_get_contents( "{$dir}/index.html" ) === $this->indexHtmlPrivate() );
|
2019-09-07 05:58:29 +00:00
|
|
|
if ( $exists && !$this->unlink( "{$dir}/index.html" ) ) { // reverse secure()
|
2012-05-21 22:19:06 +00:00
|
|
|
$status->fatal( 'backend-fail-delete', $params['dir'] . '/index.html' );
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Remove the .htaccess file from the root of the container...
|
|
|
|
|
if ( !empty( $params['access'] ) && is_file( "{$contRoot}/.htaccess" ) ) {
|
|
|
|
|
$exists = ( file_get_contents( "{$contRoot}/.htaccess" ) === $this->htaccessPrivate() );
|
2019-09-07 05:58:29 +00:00
|
|
|
if ( $exists && !$this->unlink( "{$contRoot}/.htaccess" ) ) { // reverse secure()
|
2012-05-21 22:19:06 +00:00
|
|
|
$storeDir = "mwstore://{$this->name}/{$shortCont}";
|
|
|
|
|
$status->fatal( 'backend-fail-delete', "{$storeDir}/.htaccess" );
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
}
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-12 18:44:00 +00:00
|
|
|
protected function doCleanInternal( $fullCont, $dirRel, array $params ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-01-12 18:44:00 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::suppressWarnings();
|
2019-09-08 21:39:52 +00:00
|
|
|
rmdir( $dir ); // remove directory if empty
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::restoreWarnings();
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
return $status;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-08 08:40:00 +00:00
|
|
|
protected function doGetFileStat( array $params ) {
|
2012-01-12 18:44:00 +00:00
|
|
|
$source = $this->resolveToFSPath( $params['src'] );
|
2011-12-20 03:52:06 +00:00
|
|
|
if ( $source === null ) {
|
2019-08-30 07:01:29 +00:00
|
|
|
return self::$RES_ERROR; // invalid storage path
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
2012-01-08 08:40:00 +00:00
|
|
|
|
2012-02-24 20:10:36 +00:00
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
2012-01-12 18:44:00 +00:00
|
|
|
$stat = is_file( $source ) ? stat( $source ) : false; // regular files only
|
2012-01-13 04:32:28 +00:00
|
|
|
$hadError = $this->untrapWarnings();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
if ( is_array( $stat ) ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
$ct = new ConvertibleTimestamp( $stat['mtime'] );
|
|
|
|
|
|
2016-02-17 09:09:32 +00:00
|
|
|
return [
|
2016-09-21 22:34:46 +00:00
|
|
|
'mtime' => $ct->getTimestamp( TS_MW ),
|
2013-04-20 17:18:13 +00:00
|
|
|
'size' => $stat['size']
|
2016-02-17 09:09:32 +00:00
|
|
|
];
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
2019-08-30 07:01:29 +00:00
|
|
|
|
|
|
|
|
return $hadError ? self::$RES_ERROR : self::$RES_ABSENT;
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-01-20 21:55:15 +00:00
|
|
|
protected function doClearCache( array $paths = null ) {
|
|
|
|
|
clearstatcache(); // clear the PHP file stat cache
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-05 05:56:08 +00:00
|
|
|
protected function doDirectoryExists( $fullCont, $dirRel, array $params ) {
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-04-05 05:56:08 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
|
|
|
|
|
|
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
|
|
|
|
$exists = is_dir( $dir );
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
|
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return $hadError ? self::$RES_ERROR : $exists;
|
2012-04-05 05:56:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @see FileBackendStore::getDirectoryListInternal()
|
2013-11-23 18:23:32 +00:00
|
|
|
* @param string $fullCont
|
|
|
|
|
* @param string $dirRel
|
|
|
|
|
* @param array $params
|
2016-09-24 10:34:14 +00:00
|
|
|
* @return array|FSFileBackendDirList|null
|
2012-04-05 05:56:08 +00:00
|
|
|
*/
|
|
|
|
|
public function getDirectoryListInternal( $fullCont, $dirRel, array $params ) {
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-04-05 05:56:08 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
2019-08-30 07:01:29 +00:00
|
|
|
|
|
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
2012-04-05 05:56:08 +00:00
|
|
|
$exists = is_dir( $dir );
|
2019-08-30 07:01:29 +00:00
|
|
|
$isReadable = $exists ? is_readable( $dir ) : false;
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
if ( $isReadable ) {
|
|
|
|
|
return new FSFileBackendDirList( $dir, $params );
|
|
|
|
|
} elseif ( $exists ) {
|
|
|
|
|
$this->logger->warning( __METHOD__ . ": given directory is unreadable: '$dir'" );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return self::$RES_ERROR; // bad permissions?
|
|
|
|
|
} elseif ( $hadError ) {
|
|
|
|
|
$this->logger->warning( __METHOD__ . ": given directory was unreachable: '$dir'" );
|
|
|
|
|
|
|
|
|
|
return self::$RES_ERROR;
|
|
|
|
|
} else {
|
|
|
|
|
$this->logger->info( __METHOD__ . ": given directory does not exist: '$dir'" );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return []; // nothing under this dir
|
|
|
|
|
}
|
2012-04-05 05:56:08 +00:00
|
|
|
}
|
|
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
/**
|
2012-01-29 22:22:28 +00:00
|
|
|
* @see FileBackendStore::getFileListInternal()
|
2013-11-23 18:23:32 +00:00
|
|
|
* @param string $fullCont
|
|
|
|
|
* @param string $dirRel
|
|
|
|
|
* @param array $params
|
|
|
|
|
* @return array|FSFileBackendFileList|null
|
2011-12-20 03:52:06 +00:00
|
|
|
*/
|
2012-01-12 18:44:00 +00:00
|
|
|
public function getFileListInternal( $fullCont, $dirRel, array $params ) {
|
2012-12-09 03:27:02 +00:00
|
|
|
list( , $shortCont, ) = FileBackend::splitStoragePath( $params['dir'] );
|
2012-01-12 18:44:00 +00:00
|
|
|
$contRoot = $this->containerFSRoot( $shortCont, $fullCont ); // must be valid
|
|
|
|
|
$dir = ( $dirRel != '' ) ? "{$contRoot}/{$dirRel}" : $contRoot;
|
2019-08-30 07:01:29 +00:00
|
|
|
|
|
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
2011-12-20 03:52:06 +00:00
|
|
|
$exists = is_dir( $dir );
|
2019-08-30 07:01:29 +00:00
|
|
|
$isReadable = $exists ? is_readable( $dir ) : false;
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
if ( $exists && $isReadable ) {
|
|
|
|
|
return new FSFileBackendFileList( $dir, $params );
|
|
|
|
|
} elseif ( $exists ) {
|
|
|
|
|
$this->logger->warning( __METHOD__ . ": given directory is unreadable: '$dir'\n" );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return self::$RES_ERROR; // bad permissions?
|
|
|
|
|
} elseif ( $hadError ) {
|
|
|
|
|
$this->logger->warning( __METHOD__ . ": given directory was unreachable: '$dir'\n" );
|
2013-11-22 21:17:15 +00:00
|
|
|
|
2019-08-30 07:01:29 +00:00
|
|
|
return self::$RES_ERROR;
|
|
|
|
|
} else {
|
|
|
|
|
$this->logger->info( __METHOD__ . ": given directory does not exist: '$dir'\n" );
|
|
|
|
|
|
|
|
|
|
return []; // nothing under this dir
|
|
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-09-18 18:21:30 +00:00
|
|
|
protected function doGetLocalReferenceMulti( array $params ) {
|
2016-02-17 09:09:32 +00:00
|
|
|
$fsFiles = []; // (path => FSFile)
|
2012-09-18 18:21:30 +00:00
|
|
|
|
|
|
|
|
foreach ( $params['srcs'] as $src ) {
|
|
|
|
|
$source = $this->resolveToFSPath( $src );
|
2019-08-30 07:01:29 +00:00
|
|
|
if ( $source === null ) {
|
|
|
|
|
$fsFiles[$src] = self::$RES_ERROR; // invalid path
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
|
|
|
|
$isFile = is_file( $source ); // regular files only
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
|
|
|
|
|
|
|
|
|
if ( $isFile ) {
|
2012-09-18 18:21:30 +00:00
|
|
|
$fsFiles[$src] = new FSFile( $source );
|
2019-08-30 07:01:29 +00:00
|
|
|
} elseif ( $hadError ) {
|
|
|
|
|
$fsFiles[$src] = self::$RES_ERROR;
|
|
|
|
|
} else {
|
|
|
|
|
$fsFiles[$src] = self::$RES_ABSENT;
|
2012-09-18 18:21:30 +00:00
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
2012-09-18 18:21:30 +00:00
|
|
|
|
|
|
|
|
return $fsFiles;
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-09-18 18:21:30 +00:00
|
|
|
protected function doGetLocalCopyMulti( array $params ) {
|
2016-02-17 09:09:32 +00:00
|
|
|
$tmpFiles = []; // (path => TempFSFile)
|
2011-12-20 03:52:06 +00:00
|
|
|
|
2012-09-18 18:21:30 +00:00
|
|
|
foreach ( $params['srcs'] as $src ) {
|
|
|
|
|
$source = $this->resolveToFSPath( $src );
|
|
|
|
|
if ( $source === null ) {
|
2019-08-30 07:01:29 +00:00
|
|
|
$tmpFiles[$src] = self::$RES_ERROR; // invalid path
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
// Create a new temporary file with the same extension...
|
|
|
|
|
$ext = FileBackend::extensionFromPath( $src );
|
|
|
|
|
$tmpFile = $this->tmpFileFactory->newTempFSFile( 'localcopy_', $ext );
|
|
|
|
|
if ( !$tmpFile ) {
|
|
|
|
|
$tmpFiles[$src] = self::$RES_ERROR;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$tmpPath = $tmpFile->getPath();
|
|
|
|
|
// Copy the source file over the temp file
|
2019-09-07 06:21:48 +00:00
|
|
|
$this->trapWarnings(); // don't trust 'false' if there were errors
|
2019-08-30 07:01:29 +00:00
|
|
|
$isFile = is_file( $source ); // regular files only
|
|
|
|
|
$copySuccess = $isFile ? copy( $source, $tmpPath ) : false;
|
|
|
|
|
$hadError = $this->untrapWarnings();
|
|
|
|
|
|
|
|
|
|
if ( $copySuccess ) {
|
|
|
|
|
$this->chmod( $tmpPath );
|
|
|
|
|
$tmpFiles[$src] = $tmpFile;
|
|
|
|
|
} elseif ( $hadError ) {
|
|
|
|
|
$tmpFiles[$src] = self::$RES_ERROR; // copy failed
|
2012-09-18 18:21:30 +00:00
|
|
|
} else {
|
2019-08-30 07:01:29 +00:00
|
|
|
$tmpFiles[$src] = self::$RES_ABSENT;
|
2012-09-18 18:21:30 +00:00
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-09-18 18:21:30 +00:00
|
|
|
return $tmpFiles;
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|
|
|
|
|
|
2012-04-26 18:40:47 +00:00
|
|
|
protected function directoriesAreVirtual() {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2015-03-18 16:22:52 +00:00
|
|
|
/**
|
2015-12-29 09:46:05 +00:00
|
|
|
* @param FSFileOpHandle[] $fileOpHandles
|
2015-03-18 16:22:52 +00:00
|
|
|
*
|
2016-09-16 22:55:40 +00:00
|
|
|
* @return StatusValue[]
|
2015-03-18 16:22:52 +00:00
|
|
|
*/
|
2012-04-11 17:51:02 +00:00
|
|
|
protected function doExecuteOpHandlesInternal( array $fileOpHandles ) {
|
2016-02-17 09:09:32 +00:00
|
|
|
$statuses = [];
|
2012-04-11 17:51:02 +00:00
|
|
|
|
2016-02-17 09:09:32 +00:00
|
|
|
$pipes = [];
|
2019-09-07 05:58:29 +00:00
|
|
|
$octalPermissions = '0' . decoct( $this->fileMode );
|
2012-04-11 17:51:02 +00:00
|
|
|
foreach ( $fileOpHandles as $index => $fileOpHandle ) {
|
2019-09-07 05:58:29 +00:00
|
|
|
$cmd = "{$fileOpHandle->cmd} 2>&1";
|
|
|
|
|
// Add a post-operation chmod command for permissions cleanup if applicable
|
|
|
|
|
if (
|
|
|
|
|
!$this->isWindows &&
|
|
|
|
|
$fileOpHandle->chmodPath !== null &&
|
|
|
|
|
strlen( $octalPermissions ) == 4
|
|
|
|
|
) {
|
|
|
|
|
$encPath = escapeshellarg( $fileOpHandle->chmodPath );
|
|
|
|
|
$cmd .= " && chmod $octalPermissions $encPath 2>/dev/null";
|
|
|
|
|
}
|
|
|
|
|
$pipes[$index] = popen( $cmd, 'r' );
|
2012-04-11 17:51:02 +00:00
|
|
|
}
|
|
|
|
|
|
2016-02-17 09:09:32 +00:00
|
|
|
$errs = [];
|
2012-04-11 17:51:02 +00:00
|
|
|
foreach ( $pipes as $index => $pipe ) {
|
|
|
|
|
// Result will be empty on success in *NIX. On Windows,
|
|
|
|
|
// it may be something like " 1 file(s) [copied|moved].".
|
|
|
|
|
$errs[$index] = stream_get_contents( $pipe );
|
|
|
|
|
fclose( $pipe );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
foreach ( $fileOpHandles as $index => $fileOpHandle ) {
|
2016-09-16 22:55:40 +00:00
|
|
|
$status = $this->newStatus();
|
2014-06-12 20:40:03 +00:00
|
|
|
$function = $fileOpHandle->call;
|
|
|
|
|
$function( $errs[$index], $status, $fileOpHandle->params, $fileOpHandle->cmd );
|
2012-04-11 17:51:02 +00:00
|
|
|
$statuses[$index] = $status;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
clearstatcache(); // files changed
|
2019-09-07 05:58:29 +00:00
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
return $statuses;
|
|
|
|
|
}
|
|
|
|
|
|
2011-12-20 03:52:06 +00:00
|
|
|
/**
|
|
|
|
|
* Chmod a file, suppressing the warnings
|
|
|
|
|
*
|
2013-03-11 17:15:01 +00:00
|
|
|
* @param string $path Absolute file system path
|
2011-12-20 03:52:06 +00:00
|
|
|
* @return bool Success
|
|
|
|
|
*/
|
|
|
|
|
protected function chmod( $path ) {
|
2019-09-07 05:58:29 +00:00
|
|
|
if ( $this->isWindows ) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
AtEase::suppressWarnings();
|
2011-12-20 03:52:06 +00:00
|
|
|
$ok = chmod( $path, $this->fileMode );
|
2019-09-07 05:58:29 +00:00
|
|
|
AtEase::restoreWarnings();
|
2011-12-20 03:52:06 +00:00
|
|
|
|
|
|
|
|
return $ok;
|
|
|
|
|
}
|
2012-01-13 04:32:28 +00:00
|
|
|
|
2019-09-07 05:58:29 +00:00
|
|
|
/**
|
|
|
|
|
* Unlink a file, suppressing the warnings
|
|
|
|
|
*
|
|
|
|
|
* @param string $path Absolute file system path
|
|
|
|
|
* @return bool Success
|
|
|
|
|
*/
|
|
|
|
|
protected function unlink( $path ) {
|
|
|
|
|
AtEase::suppressWarnings();
|
|
|
|
|
$ok = unlink( $path );
|
|
|
|
|
AtEase::restoreWarnings();
|
|
|
|
|
|
|
|
|
|
return $ok;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @param array $params Operation parameters with 'content' and 'headers' fields
|
|
|
|
|
* @return TempFSFile|null
|
|
|
|
|
*/
|
|
|
|
|
protected function stageContentAsTempFile( array $params ) {
|
|
|
|
|
$content = $params['content'];
|
|
|
|
|
$tempFile = $this->tmpFileFactory->newTempFSFile( 'create_', 'tmp' );
|
|
|
|
|
if ( !$tempFile ) {
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
AtEase::suppressWarnings();
|
|
|
|
|
$tmpPath = $tempFile->getPath();
|
|
|
|
|
if ( file_put_contents( $tmpPath, $content ) === false ) {
|
|
|
|
|
$tempFile = null;
|
|
|
|
|
}
|
|
|
|
|
AtEase::restoreWarnings();
|
|
|
|
|
|
|
|
|
|
return $tempFile;
|
|
|
|
|
}
|
|
|
|
|
|
2012-05-21 22:19:06 +00:00
|
|
|
/**
|
|
|
|
|
* Return the text of an index.html file to hide directory listings
|
|
|
|
|
*
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
protected function indexHtmlPrivate() {
|
|
|
|
|
return '';
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Return the text of a .htaccess file to make a directory private
|
|
|
|
|
*
|
|
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
protected function htaccessPrivate() {
|
|
|
|
|
return "Deny from all\n";
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-11 17:51:02 +00:00
|
|
|
/**
|
|
|
|
|
* Clean up directory separators for the given OS
|
|
|
|
|
*
|
2013-03-11 17:15:01 +00:00
|
|
|
* @param string $path FS path
|
2012-04-11 17:51:02 +00:00
|
|
|
* @return string
|
|
|
|
|
*/
|
|
|
|
|
protected function cleanPathSlashes( $path ) {
|
2016-09-21 22:34:46 +00:00
|
|
|
return $this->isWindows ? strtr( $path, '/', '\\' ) : $path;
|
2012-04-11 17:51:02 +00:00
|
|
|
}
|
|
|
|
|
|
2012-01-13 04:32:28 +00:00
|
|
|
/**
|
2019-09-07 06:21:48 +00:00
|
|
|
* Listen for E_WARNING errors and track whether any that happen
|
|
|
|
|
*
|
|
|
|
|
* @param string|null $regexIgnore Optional regex of errors to ignore
|
2012-01-13 04:32:28 +00:00
|
|
|
*/
|
2019-09-07 06:21:48 +00:00
|
|
|
protected function trapWarnings( $regexIgnore = null ) {
|
|
|
|
|
$this->warningTrapStack[] = false;
|
|
|
|
|
set_error_handler( function ( $errno, $errstr ) use ( $regexIgnore ) {
|
|
|
|
|
if ( $regexIgnore === null || !preg_match( $regexIgnore, $errstr ) ) {
|
|
|
|
|
$this->logger->error( $errstr );
|
|
|
|
|
$this->warningTrapStack[count( $this->warningTrapStack ) - 1] = true;
|
|
|
|
|
}
|
|
|
|
|
return true; // suppress from PHP handler
|
2019-08-23 13:15:33 +00:00
|
|
|
}, E_WARNING );
|
2012-01-13 04:32:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-09-07 06:21:48 +00:00
|
|
|
* Stop listening for E_WARNING errors and get whether any happened
|
2012-01-13 04:32:28 +00:00
|
|
|
*
|
2019-09-07 06:21:48 +00:00
|
|
|
* @return bool Whether any warnings happened
|
2012-01-13 04:32:28 +00:00
|
|
|
*/
|
|
|
|
|
protected function untrapWarnings() {
|
2019-08-23 13:15:33 +00:00
|
|
|
restore_error_handler();
|
2019-09-07 06:21:48 +00:00
|
|
|
|
|
|
|
|
return array_pop( $this->warningTrapStack );
|
2012-01-13 04:32:28 +00:00
|
|
|
}
|
2011-12-20 03:52:06 +00:00
|
|
|
}
|