mirror of
https://github.com/nextcloud/desktop.git
synced 2024-12-14 01:34:22 +03:00
617949f2e1
It is disabled by default, but can be enabled by the library user on demand. We suggest to enable it for the first sync and when the local DB is small enough. It only gets used for the first PROPFIND. In case the server supports the Depth 'infinity', we keep the cache. In case the server does not support it (= reports only 1 level) we will still use the result by converting it to the legacy PROPFIND cache.
1953 lines
60 KiB
C
1953 lines
60 KiB
C
/*
|
|
* libcsync -- a library to sync a directory with another
|
|
*
|
|
* Copyright (c) 2011 by Andreas Schneider <asn@cryptomilk.org>
|
|
* Copyright (c) 2012 by Klaas Freitag <freitag@owncloud.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#include "csync_owncloud.h"
|
|
|
|
#include <inttypes.h>
|
|
|
|
/*
|
|
* free the fetchCtx
|
|
*/
|
|
static void free_fetchCtx( struct listdir_context *ctx )
|
|
{
|
|
struct resource *newres, *res;
|
|
if( ! ctx ) return;
|
|
newres = ctx->list;
|
|
res = newres;
|
|
|
|
ctx->ref--;
|
|
if (ctx->ref > 0) return;
|
|
|
|
SAFE_FREE(ctx->target);
|
|
|
|
while( res ) {
|
|
SAFE_FREE(res->uri);
|
|
SAFE_FREE(res->name);
|
|
SAFE_FREE(res->md5);
|
|
|
|
newres = res->next;
|
|
SAFE_FREE(res);
|
|
res = newres;
|
|
}
|
|
SAFE_FREE(ctx);
|
|
}
|
|
|
|
|
|
/*
|
|
* local variables.
|
|
*/
|
|
|
|
struct dav_session_s dav_session; /* The DAV Session, initialised in dav_connect */
|
|
int _connected = 0; /* flag to indicate if a connection exists, ie.
|
|
the dav_session is valid */
|
|
|
|
csync_auth_callback _authcb;
|
|
long long chunked_total_size = 0;
|
|
long long chunked_done = 0;
|
|
|
|
struct listdir_context *propfind_cache = 0;
|
|
|
|
bool is_first_propfind = true;
|
|
|
|
|
|
csync_vio_file_stat_t _stat_cache;
|
|
/* id cache, cache the ETag: header of a GET request */
|
|
struct { char *uri; char *id; } _id_cache = { NULL, NULL };
|
|
|
|
static void clean_caches() {
|
|
clear_propfind_recursive_cache();
|
|
|
|
free_fetchCtx(propfind_cache);
|
|
propfind_cache = NULL;
|
|
|
|
SAFE_FREE(_stat_cache.name);
|
|
SAFE_FREE(_stat_cache.md5 );
|
|
|
|
SAFE_FREE(_id_cache.uri);
|
|
SAFE_FREE(_id_cache.id);
|
|
}
|
|
|
|
|
|
|
|
#define PUT_BUFFER_SIZE 1024*5
|
|
|
|
char _buffer[PUT_BUFFER_SIZE];
|
|
|
|
|
|
/* Differance in usec between two time */
|
|
static int64_t _timediff(struct timeval x , struct timeval y)
|
|
{
|
|
return (y.tv_sec - x.tv_sec)*1000000 + (y.tv_usec - x.tv_usec);
|
|
}
|
|
|
|
/*
|
|
* helper method to build up a user text for SSL problems, called from the
|
|
* verify_sslcert callback.
|
|
*/
|
|
static void addSSLWarning( char *ptr, const char *warn, int len )
|
|
{
|
|
char *concatHere = ptr;
|
|
int remainingLen = 0;
|
|
|
|
if( ! (warn && ptr )) return;
|
|
remainingLen = len - strlen(ptr);
|
|
if( remainingLen <= 0 ) return;
|
|
concatHere = ptr + strlen(ptr); /* put the write pointer to the end. */
|
|
strncpy( concatHere, warn, remainingLen );
|
|
}
|
|
|
|
/*
|
|
* Callback to verify the SSL certificate, called from libneon.
|
|
* It analyzes the SSL problem, creates a user information text and passes
|
|
* it to the csync callback to ask the user.
|
|
*/
|
|
#define LEN 4096
|
|
static int verify_sslcert(void *userdata, int failures,
|
|
const ne_ssl_certificate *certificate)
|
|
{
|
|
char problem[LEN];
|
|
char buf[MAX(NE_SSL_DIGESTLEN, NE_ABUFSIZ)];
|
|
int ret = -1;
|
|
const ne_ssl_certificate *cert = certificate;
|
|
|
|
(void) userdata;
|
|
memset( problem, 0, LEN );
|
|
|
|
while( cert ) {
|
|
|
|
addSSLWarning( problem, "There are problems with the SSL certificate:\n", LEN );
|
|
if( failures & NE_SSL_NOTYETVALID ) {
|
|
addSSLWarning( problem, " * The certificate is not yet valid.\n", LEN );
|
|
}
|
|
if( failures & NE_SSL_EXPIRED ) {
|
|
addSSLWarning( problem, " * The certificate has expired.\n", LEN );
|
|
}
|
|
|
|
if( failures & NE_SSL_UNTRUSTED ) {
|
|
addSSLWarning( problem, " * The certificate is not trusted!\n", LEN );
|
|
}
|
|
if( failures & NE_SSL_IDMISMATCH ) {
|
|
addSSLWarning( problem, " * The hostname for which the certificate was "
|
|
"issued does not match the hostname of the server\n", LEN );
|
|
}
|
|
if( failures & NE_SSL_BADCHAIN ) {
|
|
addSSLWarning( problem, " * The certificate chain contained a certificate other than the server cert\n", LEN );
|
|
}
|
|
if( failures & NE_SSL_REVOKED ) {
|
|
addSSLWarning( problem, " * The server certificate has been revoked by the issuing authority.\n", LEN );
|
|
}
|
|
|
|
if (ne_ssl_cert_digest(cert, buf) == 0) {
|
|
addSSLWarning( problem, "Certificate fingerprint: ", LEN );
|
|
addSSLWarning( problem, buf, LEN );
|
|
addSSLWarning( problem, "\n", LEN );
|
|
}
|
|
cert = ne_ssl_cert_signedby( cert );
|
|
}
|
|
addSSLWarning( problem, "Do you want to accept the certificate chain anyway?\nAnswer yes to do so and take the risk: ", LEN );
|
|
|
|
if( _authcb ){
|
|
/* call the csync callback */
|
|
DEBUG_WEBDAV("Call the csync callback for SSL problems");
|
|
memset( buf, 0, NE_ABUFSIZ );
|
|
(*_authcb) ( problem, buf, NE_ABUFSIZ-1, 1, 0, NULL );
|
|
if( buf[0] == 'y' || buf[0] == 'Y') {
|
|
ret = 0;
|
|
} else {
|
|
DEBUG_WEBDAV("Authentication callback replied %s", buf );
|
|
|
|
}
|
|
}
|
|
DEBUG_WEBDAV("## VERIFY_SSL CERT: %d", ret );
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Authentication callback. Is set by ne_set_server_auth to be called
|
|
* from the neon lib to authenticate a request.
|
|
*/
|
|
static int ne_auth( void *userdata, const char *realm, int attempt,
|
|
char *username, char *password)
|
|
{
|
|
char buf[NE_ABUFSIZ];
|
|
|
|
(void) userdata;
|
|
(void) realm;
|
|
|
|
/* DEBUG_WEBDAV( "Authentication required %s", realm ); */
|
|
if( username && password ) {
|
|
DEBUG_WEBDAV( "Authentication required %s", username );
|
|
if( dav_session.user ) {
|
|
/* allow user without password */
|
|
if( strlen( dav_session.user ) < NE_ABUFSIZ ) {
|
|
strcpy( username, dav_session.user );
|
|
}
|
|
if( dav_session.pwd && strlen( dav_session.pwd ) < NE_ABUFSIZ ) {
|
|
strcpy( password, dav_session.pwd );
|
|
}
|
|
} else if( _authcb != NULL ){
|
|
/* call the csync callback */
|
|
DEBUG_WEBDAV("Call the csync callback for %s", realm );
|
|
memset( buf, 0, NE_ABUFSIZ );
|
|
(*_authcb) ("Enter your username: ", buf, NE_ABUFSIZ-1, 1, 0, NULL );
|
|
if( strlen(buf) < NE_ABUFSIZ ) {
|
|
strcpy( username, buf );
|
|
}
|
|
memset( buf, 0, NE_ABUFSIZ );
|
|
(*_authcb) ("Enter your password: ", buf, NE_ABUFSIZ-1, 0, 0, NULL );
|
|
if( strlen(buf) < NE_ABUFSIZ) {
|
|
strcpy( password, buf );
|
|
}
|
|
} else {
|
|
DEBUG_WEBDAV("I can not authenticate!");
|
|
}
|
|
}
|
|
return attempt;
|
|
}
|
|
|
|
/*
|
|
* Authentication callback. Is set by ne_set_proxy_auth to be called
|
|
* from the neon lib to authenticate against a proxy. The data to authenticate
|
|
* against comes from mirall throught vio_module_init function.
|
|
*/
|
|
static int ne_proxy_auth( void *userdata, const char *realm, int attempt,
|
|
char *username, char *password)
|
|
{
|
|
(void) userdata;
|
|
(void) realm;
|
|
if( dav_session.proxy_user && strlen( dav_session.proxy_user ) < NE_ABUFSIZ) {
|
|
strcpy( username, dav_session.proxy_user );
|
|
if( dav_session.proxy_pwd && strlen( dav_session.proxy_pwd ) < NE_ABUFSIZ) {
|
|
strcpy( password, dav_session.proxy_pwd );
|
|
}
|
|
}
|
|
/* NTLM needs several attempts */
|
|
return (attempt < 3) ? 0 : -1;
|
|
}
|
|
|
|
/* Configure the proxy depending on the variables */
|
|
static int configureProxy( ne_session *session )
|
|
{
|
|
int port = 8080;
|
|
int re = -1;
|
|
|
|
if( ! session ) return -1;
|
|
if( ! dav_session.proxy_type ) return 0; /* Go by NoProxy per default */
|
|
|
|
if( dav_session.proxy_port > 0 ) {
|
|
port = dav_session.proxy_port;
|
|
}
|
|
|
|
if( c_streq(dav_session.proxy_type, "NoProxy" )) {
|
|
DEBUG_WEBDAV("No proxy configured.");
|
|
re = 0;
|
|
} else if( c_streq(dav_session.proxy_type, "DefaultProxy") ||
|
|
c_streq(dav_session.proxy_type, "HttpProxy") ||
|
|
c_streq(dav_session.proxy_type, "HttpCachingProxy") ||
|
|
c_streq(dav_session.proxy_type, "Socks5Proxy")) {
|
|
|
|
if( dav_session.proxy_host ) {
|
|
DEBUG_WEBDAV("%s at %s:%d", dav_session.proxy_type, dav_session.proxy_host, port );
|
|
if (c_streq(dav_session.proxy_type, "Socks5Proxy")) {
|
|
ne_session_socks_proxy(session, NE_SOCK_SOCKSV5, dav_session.proxy_host, port,
|
|
dav_session.proxy_user, dav_session.proxy_pwd);
|
|
} else {
|
|
ne_session_proxy(session, dav_session.proxy_host, port );
|
|
}
|
|
re = 2;
|
|
} else {
|
|
DEBUG_WEBDAV("%s requested but no proxy host defined.", dav_session.proxy_type );
|
|
/* we used to try ne_system_session_proxy here, but we should rather err out
|
|
to behave exactly like the caller. */
|
|
}
|
|
} else {
|
|
DEBUG_WEBDAV( "Unsupported Proxy: %s", dav_session.proxy_type );
|
|
}
|
|
|
|
return re;
|
|
}
|
|
|
|
/*
|
|
* This hook is called for with the response of a request. Here its checked
|
|
* if a Set-Cookie header is there for the PHPSESSID. The key is stored into
|
|
* the webdav session to be added to subsequent requests.
|
|
*/
|
|
static void post_request_hook(ne_request *req, void *userdata, const ne_status *status)
|
|
{
|
|
const char *set_cookie_header = NULL;
|
|
const char *sc = NULL;
|
|
char *key = NULL;
|
|
|
|
(void) userdata;
|
|
|
|
if (dav_session.session_key)
|
|
return; /* We already have a session cookie, and we should ignore other ones */
|
|
|
|
if(!(status && req)) return;
|
|
if( status->klass == 2 || status->code == 401 ) {
|
|
/* successful request */
|
|
set_cookie_header = ne_get_response_header( req, "Set-Cookie" );
|
|
if( set_cookie_header ) {
|
|
DEBUG_WEBDAV(" Set-Cookie found: %s", set_cookie_header);
|
|
/* try to find a ', ' sequence which is the separator of neon if multiple Set-Cookie
|
|
* headers are there.
|
|
* The following code parses a string like this:
|
|
* Set-Cookie: 50ace6bd8a669=p537brtt048jh8srlp2tuep7em95nh9u98mj992fbqc47d1aecp1;
|
|
*/
|
|
sc = set_cookie_header;
|
|
while(sc) {
|
|
const char *sc_val = sc;
|
|
const char *sc_end = sc_val;
|
|
int cnt = 0;
|
|
int len = strlen(sc_val); /* The length of the rest of the header string. */
|
|
|
|
while( cnt < len && *sc_end != ';' && *sc_end != ',') {
|
|
cnt++;
|
|
sc_end++;
|
|
}
|
|
if( cnt == len ) {
|
|
/* exit: We are at the end. */
|
|
sc = NULL;
|
|
} else if( *sc_end == ';' ) {
|
|
/* We are at the end of the session key. */
|
|
int keylen = sc_end-sc_val;
|
|
if( key ) {
|
|
int oldlen = strlen(key);
|
|
key = c_realloc(key, oldlen + 2 + keylen+1);
|
|
strcpy(key + oldlen, "; ");
|
|
strncpy(key + oldlen + 2, sc_val, keylen);
|
|
key[oldlen + 2 + keylen] = '\0';
|
|
} else {
|
|
key = c_malloc(keylen+1);
|
|
strncpy( key, sc_val, keylen );
|
|
key[keylen] = '\0';
|
|
}
|
|
|
|
/* now search for a ',' to find a potential other header entry */
|
|
while(cnt < len && *sc_end != ',') {
|
|
cnt++;
|
|
sc_end++;
|
|
}
|
|
if( cnt < len )
|
|
sc = sc_end+2; /* mind the space after the comma */
|
|
else
|
|
sc = NULL;
|
|
} else if( *sc_end == ',' ) {
|
|
/* A new entry is to check. */
|
|
if( *(sc_end + 1) == ' ') {
|
|
sc = sc_end+2;
|
|
} else {
|
|
/* error condition */
|
|
sc = NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
DEBUG_WEBDAV("Request failed, don't take session header.");
|
|
}
|
|
if( key ) {
|
|
DEBUG_WEBDAV("----> Session-key: %s", key);
|
|
SAFE_FREE(dav_session.session_key);
|
|
dav_session.session_key = key;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* this hook is called just after a request has been created, before its sent.
|
|
* Here it is used to set the proxy connection header if available.
|
|
*/
|
|
static void request_created_hook(ne_request *req, void *userdata,
|
|
const char *method, const char *requri)
|
|
{
|
|
(void) userdata;
|
|
(void) method;
|
|
(void) requri;
|
|
|
|
if( !req ) return;
|
|
|
|
if(dav_session.proxy_type) {
|
|
/* required for NTLM */
|
|
ne_add_request_header(req, "Proxy-Connection", "Keep-Alive");
|
|
}
|
|
}
|
|
|
|
/*
|
|
* this hook is called just before a request has been sent.
|
|
* Here it is used to set the session cookie if available.
|
|
*/
|
|
static void pre_send_hook(ne_request *req, void *userdata,
|
|
ne_buffer *header)
|
|
{
|
|
(void) userdata;
|
|
|
|
if( !req ) return;
|
|
|
|
if(dav_session.session_key) {
|
|
ne_buffer_concat(header, "Cookie: ", dav_session.session_key, "\r\n", NULL);
|
|
}
|
|
}
|
|
|
|
static int post_send_hook(ne_request *req, void *userdata,
|
|
const ne_status *status)
|
|
{
|
|
const char *location;
|
|
|
|
(void) userdata;
|
|
(void) status;
|
|
|
|
location = ne_get_response_header(req, "Location");
|
|
|
|
if( !location ) return NE_OK;
|
|
|
|
if( dav_session.redir_callback ) {
|
|
if( dav_session.redir_callback( dav_session.csync_ctx, location ) ) {
|
|
return NE_REDIRECT;
|
|
} else {
|
|
return NE_RETRY;
|
|
}
|
|
}
|
|
|
|
return NE_REDIRECT;
|
|
}
|
|
|
|
/* called from neon */
|
|
static void ne_notify_status_cb (void *userdata, ne_session_status status,
|
|
const ne_session_status_info *info)
|
|
{
|
|
struct transfer_context *tc = (struct transfer_context*) userdata;
|
|
struct timeval now;
|
|
int bandwidth_limit = 0;
|
|
|
|
if ((status == ne_status_sending || status == ne_status_recving)) {
|
|
if (info->sr.total > 0) {
|
|
oc_notify_progress( tc->url, CSYNC_NOTIFY_PROGRESS,
|
|
chunked_done + info->sr.progress,
|
|
chunked_total_size ? chunked_total_size : info->sr.total );
|
|
}
|
|
if (chunked_total_size && info->sr.total > 0 && info->sr.total == info->sr.progress) {
|
|
chunked_done += info->sr.total;
|
|
DEBUG_WEBDAV("Chunk upload completed for '%s' (%lld bytes out of %lld)", tc->url , chunked_done, chunked_total_size);
|
|
}
|
|
}
|
|
|
|
/* throttle connection */
|
|
if (status == ne_status_sending) bandwidth_limit = dav_session.bandwidth_limit_upload;
|
|
if (status == ne_status_recving) bandwidth_limit = dav_session.bandwidth_limit_download;
|
|
if (bandwidth_limit > 0 && gettimeofday(&now, NULL) == 0) {
|
|
int64_t diff = _timediff(tc->last_time, now);
|
|
int64_t len = info->sr.progress - tc->last_progress;
|
|
if (len > 0 && diff > 0 && (1000000 * len / diff) > (int64_t)bandwidth_limit) {
|
|
int64_t wait_time = (1000000 * len / bandwidth_limit) - diff;
|
|
if (wait_time > 0) {
|
|
usleep(wait_time);
|
|
}
|
|
}
|
|
tc->last_progress = info->sr.progress;
|
|
gettimeofday(&tc->last_time, NULL);
|
|
} else if (bandwidth_limit < 0 && bandwidth_limit > -100 && gettimeofday(&now, NULL) == 0) {
|
|
int64_t diff = _timediff(tc->last_time, now);
|
|
if (diff > 0) {
|
|
// -bandwidth_limit is the % of bandwidth
|
|
int64_t wait_time = -diff * (1 + 100.0 / bandwidth_limit);
|
|
if (wait_time > 0) {
|
|
usleep(wait_time);
|
|
}
|
|
}
|
|
gettimeofday(&tc->last_time, NULL);
|
|
}
|
|
}
|
|
|
|
// as per http://sourceforge.net/p/predef/wiki/OperatingSystems/
|
|
// extend as required
|
|
static const char* get_platform() {
|
|
#if defined (_WIN32)
|
|
return "Windows";
|
|
#elif defined(__APPLE__)
|
|
return "Macintosh";
|
|
#elif defined(__gnu_linux__)
|
|
return "Linux";
|
|
#elif defined(__DragonFly__)
|
|
/* might also define __FreeBSD__ */
|
|
return "DragonFlyBSD";
|
|
#elif defined(__FreeBSD__)
|
|
return "FreeBSD";
|
|
#elif defined(__NetBSD__)
|
|
return "NetBSD";
|
|
#elif defined(__OpenBSD__)
|
|
return "OpenBSD";
|
|
#elif defined(sun) || defined(__sun)
|
|
return "Solaris";
|
|
#else
|
|
return "Unknown OS";
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* Connect to a DAV server
|
|
* This function sets the flag _connected if the connection is established
|
|
* and returns if the flag is set, so calling it frequently is save.
|
|
*/
|
|
static int dav_connect(const char *base_url) {
|
|
int useSSL = 0;
|
|
int rc;
|
|
char protocol[6] = {'\0'};
|
|
char uaBuf[256];
|
|
char *path = NULL;
|
|
char *scheme = NULL;
|
|
char *host = NULL;
|
|
unsigned int port = 0;
|
|
int proxystate = -1;
|
|
|
|
if (_connected) {
|
|
return 0;
|
|
}
|
|
|
|
rc = c_parse_uri( base_url, &scheme, &dav_session.user, &dav_session.pwd, &host, &port, &path );
|
|
if( rc < 0 ) {
|
|
DEBUG_WEBDAV("Failed to parse uri %s", base_url );
|
|
goto out;
|
|
}
|
|
|
|
DEBUG_WEBDAV("* scheme %s", scheme );
|
|
DEBUG_WEBDAV("* host %s", host );
|
|
DEBUG_WEBDAV("* port %u", port );
|
|
DEBUG_WEBDAV("* path %s", path );
|
|
|
|
if( strcmp( scheme, "owncloud" ) == 0 ) {
|
|
strcpy( protocol, "http");
|
|
} else if( strcmp( scheme, "ownclouds" ) == 0 ) {
|
|
strcpy( protocol, "https");
|
|
useSSL = 1;
|
|
} else {
|
|
DEBUG_WEBDAV("Invalid scheme %s, go outa here!", scheme );
|
|
rc = -1;
|
|
goto out;
|
|
}
|
|
|
|
DEBUG_WEBDAV("* user %s", dav_session.user ? dav_session.user : "");
|
|
|
|
if (port == 0) {
|
|
port = ne_uri_defaultport(protocol);
|
|
}
|
|
|
|
rc = ne_sock_init();
|
|
DEBUG_WEBDAV("ne_sock_init: %d", rc );
|
|
if (rc < 0) {
|
|
rc = -1;
|
|
goto out;
|
|
}
|
|
|
|
dav_session.ctx = ne_session_create( protocol, host, port);
|
|
|
|
if (dav_session.ctx == NULL) {
|
|
DEBUG_WEBDAV("Session create with protocol %s failed", protocol );
|
|
rc = -1;
|
|
goto out;
|
|
}
|
|
|
|
if (dav_session.read_timeout == 0)
|
|
dav_session.read_timeout = 300; // set 300 seconds as default.
|
|
|
|
ne_set_read_timeout(dav_session.ctx, dav_session.read_timeout);
|
|
|
|
snprintf( uaBuf, sizeof(uaBuf), "Mozilla/5.0 (%s) csyncoC/%s",
|
|
get_platform(), CSYNC_STRINGIFY( LIBCSYNC_VERSION ));
|
|
ne_set_useragent( dav_session.ctx, uaBuf);
|
|
ne_set_server_auth(dav_session.ctx, ne_auth, 0 );
|
|
|
|
if( useSSL ) {
|
|
if (!ne_has_support(NE_FEATURE_SSL)) {
|
|
DEBUG_WEBDAV("Error: SSL is not enabled.");
|
|
rc = -1;
|
|
goto out;
|
|
}
|
|
|
|
ne_ssl_trust_default_ca( dav_session.ctx );
|
|
ne_ssl_set_verify( dav_session.ctx, verify_sslcert, 0 );
|
|
}
|
|
|
|
/* Hook called when a request is created. It sets the proxy connection header. */
|
|
ne_hook_create_request( dav_session.ctx, request_created_hook, NULL );
|
|
/* Hook called after response headers are read. It gets the Session ID. */
|
|
ne_hook_post_headers( dav_session.ctx, post_request_hook, NULL );
|
|
/* Hook called before a request is sent. It sets the cookies. */
|
|
ne_hook_pre_send( dav_session.ctx, pre_send_hook, NULL );
|
|
/* Hook called after request is dispatched. Used for handling possible redirections. */
|
|
ne_hook_post_send( dav_session.ctx, post_send_hook, NULL );
|
|
|
|
/* Proxy support */
|
|
proxystate = configureProxy( dav_session.ctx );
|
|
if( proxystate < 0 ) {
|
|
DEBUG_WEBDAV("Error: Proxy-Configuration failed.");
|
|
} else if( proxystate > 0 ) {
|
|
ne_set_proxy_auth( dav_session.ctx, ne_proxy_auth, 0 );
|
|
}
|
|
|
|
_connected = 1;
|
|
rc = 0;
|
|
out:
|
|
SAFE_FREE(path);
|
|
SAFE_FREE(host);
|
|
SAFE_FREE(scheme);
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* result parsing list.
|
|
* This function is called to parse the result of the propfind request
|
|
* to list directories on the WebDAV server. I takes a single resource
|
|
* and fills a resource struct and stores it to the result list which
|
|
* is stored in the listdir_context.
|
|
*/
|
|
static void results(void *userdata,
|
|
const ne_uri *uri,
|
|
const ne_prop_result_set *set)
|
|
{
|
|
struct listdir_context *fetchCtx = userdata;
|
|
struct resource *newres = 0;
|
|
const char *clength, *modtime = NULL;
|
|
const char *resourcetype = NULL;
|
|
const char *md5sum = NULL;
|
|
const ne_status *status = NULL;
|
|
char *path = ne_path_unescape( uri->path );
|
|
|
|
(void) status;
|
|
if( ! fetchCtx ) {
|
|
DEBUG_WEBDAV("No valid fetchContext");
|
|
return;
|
|
}
|
|
|
|
if( ! fetchCtx->target ) {
|
|
DEBUG_WEBDAV("error: target must not be zero!" );
|
|
return;
|
|
}
|
|
|
|
/* Fill the resource structure with the data about the file */
|
|
newres = c_malloc(sizeof(struct resource));
|
|
newres->uri = path; /* no need to strdup because ne_path_unescape already allocates */
|
|
newres->name = c_basename( path );
|
|
|
|
modtime = ne_propset_value( set, &ls_props[0] );
|
|
clength = ne_propset_value( set, &ls_props[1] );
|
|
resourcetype = ne_propset_value( set, &ls_props[2] );
|
|
md5sum = ne_propset_value( set, &ls_props[3] );
|
|
|
|
newres->type = resr_normal;
|
|
if( clength == NULL && resourcetype && strncmp( resourcetype, "<DAV:collection>", 16 ) == 0) {
|
|
newres->type = resr_collection;
|
|
}
|
|
|
|
if (modtime) {
|
|
newres->modtime = oc_httpdate_parse(modtime);
|
|
}
|
|
|
|
/* DEBUG_WEBDAV("Parsing Modtime: %s -> %llu", modtime, (unsigned long long) newres->modtime ); */
|
|
|
|
if (clength) {
|
|
char *p;
|
|
|
|
newres->size = DAV_STRTOL(clength, &p, 10);
|
|
if (*p) {
|
|
newres->size = 0;
|
|
}
|
|
/* DEBUG_WEBDAV("Parsed File size for %s from %s: %lld", newres->name, clength, (long long)newres->size ); */
|
|
}
|
|
|
|
if( md5sum ) {
|
|
int len = strlen(md5sum)-2;
|
|
if( len > 0 ) {
|
|
/* Skip the " around the string coming back from the ne_propset_value call */
|
|
newres->md5 = c_malloc(len+1);
|
|
strncpy( newres->md5, md5sum+1, len );
|
|
newres->md5[len] = '\0';
|
|
}
|
|
}
|
|
|
|
/* prepend the new resource to the result list */
|
|
newres->next = fetchCtx->list;
|
|
fetchCtx->list = newres;
|
|
fetchCtx->result_count = fetchCtx->result_count + 1;
|
|
/* DEBUG_WEBDAV( "results for URI %s: %d %d", newres->name, (int)newres->size, (int)newres->type ); */
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* fetches a resource list from the WebDAV server. This is equivalent to list dir.
|
|
*/
|
|
static struct listdir_context *fetch_resource_list(const char *uri, int depth)
|
|
{
|
|
struct listdir_context *fetchCtx;
|
|
int ret = 0;
|
|
ne_propfind_handler *hdl = NULL;
|
|
ne_request *request = NULL;
|
|
const char *content_type = NULL;
|
|
char *curi = NULL;
|
|
const ne_status *req_status = NULL;
|
|
|
|
curi = _cleanPath( uri );
|
|
|
|
/* The old legacy one-level PROPFIND cache. Also gets filled
|
|
by the recursive cache if 'infinity' did not suceed. */
|
|
if (propfind_cache) {
|
|
if (c_streq(curi, propfind_cache->target)) {
|
|
DEBUG_WEBDAV("fetch_resource_list Using simple PROPFIND cache %s", curi);
|
|
propfind_cache->ref++;
|
|
SAFE_FREE(curi);
|
|
return propfind_cache;
|
|
}
|
|
}
|
|
|
|
fetchCtx = c_malloc( sizeof( struct listdir_context ));
|
|
if (!fetchCtx) {
|
|
errno = ENOMEM;
|
|
SAFE_FREE(curi);
|
|
return NULL;
|
|
}
|
|
fetchCtx->list = NULL;
|
|
fetchCtx->target = curi;
|
|
fetchCtx->currResource = NULL;
|
|
fetchCtx->ref = 1;
|
|
|
|
/* do a propfind request and parse the results in the results function, set as callback */
|
|
hdl = ne_propfind_create(dav_session.ctx, curi, depth);
|
|
|
|
if(hdl) {
|
|
ret = ne_propfind_named(hdl, ls_props, results, fetchCtx);
|
|
request = ne_propfind_get_request( hdl );
|
|
req_status = ne_get_status( request );
|
|
}
|
|
|
|
if( ret == NE_OK ) {
|
|
fetchCtx->currResource = fetchCtx->list;
|
|
/* Check the request status. */
|
|
if( req_status && req_status->klass != 2 ) {
|
|
set_errno_from_http_errcode(req_status->code);
|
|
DEBUG_WEBDAV("ERROR: Request failed: status %d (%s)", req_status->code,
|
|
req_status->reason_phrase);
|
|
ret = NE_CONNECT;
|
|
set_error_message(req_status->reason_phrase);
|
|
oc_notify_progress( uri, CSYNC_NOTIFY_ERROR,
|
|
req_status->code,
|
|
(intptr_t)(req_status->reason_phrase) );
|
|
}
|
|
DEBUG_WEBDAV("Simple propfind result code %d.", req_status->code);
|
|
} else {
|
|
if( ret == NE_ERROR && req_status->code == 404) {
|
|
errno = ENOENT;
|
|
} else {
|
|
set_errno_from_neon_errcode(ret);
|
|
}
|
|
}
|
|
|
|
if( ret == NE_OK ) {
|
|
/* Check the content type. If the server has a problem, ie. database is gone or such,
|
|
* the content type is not xml but a html error message. Stop on processing if it's
|
|
* not XML.
|
|
* FIXME: Generate user error message from the reply content.
|
|
*/
|
|
content_type = ne_get_response_header( request, "Content-Type" );
|
|
if( !(content_type && c_streq(content_type, "application/xml; charset=utf-8") ) ) {
|
|
DEBUG_WEBDAV("ERROR: Content type of propfind request not XML: %s.",
|
|
content_type ? content_type: "<empty>");
|
|
errno = ERRNO_WRONG_CONTENT;
|
|
set_error_message("Server error: PROPFIND reply is not XML formatted!");
|
|
ret = NE_CONNECT;
|
|
}
|
|
}
|
|
|
|
if( ret != NE_OK ) {
|
|
const char *err = NULL;
|
|
|
|
err = ne_get_error( dav_session.ctx );
|
|
DEBUG_WEBDAV("WRN: propfind named failed with %d, request error: %s", ret, err ? err : "<nil>");
|
|
}
|
|
|
|
if( hdl )
|
|
ne_propfind_destroy(hdl);
|
|
|
|
if( ret != NE_OK ) {
|
|
free_fetchCtx(fetchCtx);
|
|
return NULL;
|
|
}
|
|
|
|
free_fetchCtx(propfind_cache);
|
|
propfind_cache = fetchCtx;
|
|
propfind_cache->ref++;
|
|
return fetchCtx;
|
|
}
|
|
|
|
static struct listdir_context *fetch_resource_list_attempts(const char *uri, int depth)
|
|
{
|
|
int i;
|
|
|
|
struct listdir_context *fetchCtx = NULL;
|
|
for(i = 0; i < 10; ++i) {
|
|
fetchCtx = fetch_resource_list(uri, depth);
|
|
if(fetchCtx) break;
|
|
/* only loop in case the content is not XML formatted. Otherwise for every
|
|
* non successful stat (for non existing directories) its tried 10 times. */
|
|
if( errno != ERRNO_WRONG_CONTENT ) break;
|
|
|
|
DEBUG_WEBDAV("=> Errno after fetch resource list for %s: %d", uri, errno);
|
|
DEBUG_WEBDAV(" New attempt %i", i);
|
|
}
|
|
return fetchCtx;
|
|
}
|
|
|
|
static void fill_stat_cache( csync_vio_file_stat_t *lfs ) {
|
|
|
|
if( _stat_cache.name ) SAFE_FREE(_stat_cache.name);
|
|
if( _stat_cache.md5 ) SAFE_FREE(_stat_cache.md5 );
|
|
|
|
if( !lfs) return;
|
|
|
|
_stat_cache.name = c_strdup(lfs->name);
|
|
_stat_cache.mtime = lfs->mtime;
|
|
_stat_cache.fields = lfs->fields;
|
|
_stat_cache.type = lfs->type;
|
|
_stat_cache.size = lfs->size;
|
|
if( lfs->md5 ) {
|
|
_stat_cache.md5 = c_strdup(lfs->md5);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* file functions
|
|
*/
|
|
static int owncloud_stat(const char *uri, csync_vio_file_stat_t *buf) {
|
|
/* get props:
|
|
* modtime
|
|
* creattime
|
|
* size
|
|
*/
|
|
csync_vio_file_stat_t *lfs = NULL;
|
|
struct listdir_context *fetchCtx = NULL;
|
|
char *decodedUri = NULL;
|
|
int len = 0;
|
|
errno = 0;
|
|
|
|
DEBUG_WEBDAV("owncloud_stat %s called", uri );
|
|
|
|
buf->name = c_basename(uri);
|
|
|
|
if (buf->name == NULL) {
|
|
errno = ENOMEM;
|
|
return -1;
|
|
}
|
|
|
|
if( _stat_cache.name && strcmp( buf->name, _stat_cache.name ) == 0 ) {
|
|
buf->fields = CSYNC_VIO_FILE_STAT_FIELDS_NONE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_TYPE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_SIZE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_MTIME;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_PERMISSIONS;
|
|
|
|
buf->fields = _stat_cache.fields;
|
|
buf->type = _stat_cache.type;
|
|
buf->mtime = _stat_cache.mtime;
|
|
buf->size = _stat_cache.size;
|
|
buf->mode = _stat_perms( _stat_cache.type );
|
|
buf->md5 = NULL;
|
|
if( _stat_cache.md5 ) {
|
|
buf->md5 = c_strdup( _stat_cache.md5 );
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_MD5;
|
|
}
|
|
return 0;
|
|
}
|
|
DEBUG_WEBDAV("owncloud_stat => Could not find in stat cache %s", uri);
|
|
|
|
/* fetch data via a propfind call. */
|
|
/* fetchCtx = fetch_resource_list( uri, NE_DEPTH_ONE); */
|
|
fetchCtx = fetch_resource_list_attempts( uri, NE_DEPTH_ONE);
|
|
DEBUG_WEBDAV("=> Errno after fetch resource list for %s: %d", uri, errno);
|
|
if (!fetchCtx) {
|
|
return -1;
|
|
}
|
|
|
|
if( fetchCtx ) {
|
|
struct resource *res = fetchCtx->list;
|
|
while( res ) {
|
|
/* remove trailing slashes */
|
|
len = strlen(res->uri);
|
|
while( len > 0 && res->uri[len-1] == '/' ) --len;
|
|
decodedUri = ne_path_unescape( fetchCtx->target ); /* allocates memory */
|
|
|
|
/* Only do the comparaison of the part of the string without the trailing
|
|
slashes, and make sure decodedUri is not too large */
|
|
if( strncmp(res->uri, decodedUri, len ) == 0 && decodedUri[len] == '\0') {
|
|
SAFE_FREE( decodedUri );
|
|
break;
|
|
}
|
|
res = res->next;
|
|
SAFE_FREE( decodedUri );
|
|
}
|
|
if( res ) {
|
|
DEBUG_WEBDAV("Working on file %s", res->name );
|
|
} else {
|
|
DEBUG_WEBDAV("ERROR: Result struct not valid!");
|
|
}
|
|
|
|
lfs = resourceToFileStat( res );
|
|
if( lfs ) {
|
|
buf->fields = CSYNC_VIO_FILE_STAT_FIELDS_NONE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_TYPE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_SIZE;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_MTIME;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_PERMISSIONS;
|
|
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_MD5;
|
|
|
|
buf->fields = lfs->fields;
|
|
buf->type = lfs->type;
|
|
buf->mtime = lfs->mtime;
|
|
buf->size = lfs->size;
|
|
buf->mode = _stat_perms( lfs->type );
|
|
buf->md5 = NULL;
|
|
if( lfs->md5 ) {
|
|
buf->md5 = c_strdup( lfs->md5 );
|
|
}
|
|
|
|
/* fill the static stat buf as input for the stat function */
|
|
csync_vio_file_stat_destroy( lfs );
|
|
}
|
|
|
|
free_fetchCtx( fetchCtx );
|
|
}
|
|
DEBUG_WEBDAV("STAT result from propfind: %s, mtime: %llu", buf->name ? buf->name:"NULL",
|
|
(unsigned long long) buf->mtime );
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t owncloud_write(csync_vio_method_handle_t *fhandle, const void *buf, size_t count) {
|
|
(void) fhandle;
|
|
(void) buf;
|
|
(void) count;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int content_reader(void *userdata, const char *buf, size_t len)
|
|
{
|
|
struct transfer_context *writeCtx = userdata;
|
|
size_t written = 0;
|
|
|
|
if( buf && writeCtx->fd ) {
|
|
/* DEBUG_WEBDAV("Writing %scompressed %d bytes", (writeCtx->decompress ? "" : "NON "), len); */
|
|
written = write(writeCtx->fd, buf, len);
|
|
if( len != written ) {
|
|
DEBUG_WEBDAV("WRN: content_reader wrote wrong num of bytes: %zu, %zu %d %d", len, written, errno, writeCtx->fd);
|
|
}
|
|
writeCtx->get_size += len;
|
|
return NE_OK;
|
|
} else {
|
|
errno = EBADF;
|
|
}
|
|
return NE_ERROR;
|
|
}
|
|
|
|
/*
|
|
* This hook is called after the response is here from the server, but before
|
|
* the response body is parsed. It decides if the response is compressed and
|
|
* if it is it installs the compression reader accordingly.
|
|
* If the response is not compressed, the normal response body reader is installed.
|
|
*/
|
|
|
|
static void install_content_reader( ne_request *req, void *userdata, const ne_status *status )
|
|
{
|
|
const char *enc = NULL;
|
|
struct transfer_context *writeCtx = userdata;
|
|
|
|
(void) status;
|
|
|
|
if( !writeCtx ) {
|
|
DEBUG_WEBDAV("Error: install_content_reader called without valid write context!");
|
|
return;
|
|
}
|
|
|
|
enc = ne_get_response_header( req, "Content-Encoding" );
|
|
DEBUG_WEBDAV("Content encoding ist <%s> with status %d", enc ? enc : "empty",
|
|
status ? status->code : -1 );
|
|
|
|
if( enc && c_streq( enc, "gzip" )) {
|
|
writeCtx->decompress = ne_decompress_reader( req, ne_accept_2xx,
|
|
content_reader, /* reader callback */
|
|
(void*) writeCtx ); /* userdata */
|
|
} else {
|
|
ne_add_response_body_reader( req, ne_accept_2xx,
|
|
content_reader,
|
|
(void*) writeCtx );
|
|
writeCtx->decompress = NULL;
|
|
}
|
|
|
|
enc = ne_get_response_header( req, "ETag" );
|
|
if (enc && *enc) {
|
|
SAFE_FREE(_id_cache.uri);
|
|
SAFE_FREE(_id_cache.id);
|
|
_id_cache.uri = c_strdup(writeCtx->url);
|
|
_id_cache.id = c_strdup(enc);
|
|
}
|
|
}
|
|
|
|
static char*_lastDir = NULL;
|
|
|
|
/* capabilities are currently:
|
|
* bool atomar_copy_support - oC provides atomar copy
|
|
* bool do_post_copy_stat - oC does not want the post copy check
|
|
* bool time_sync_required - oC does not require the time sync
|
|
* int unix_extensions - oC supports unix extensions.
|
|
* bool propagate_on_fd - oC supports the send_file method.
|
|
*/
|
|
static csync_vio_capabilities_t _owncloud_capabilities = { true, false, false, 0, true, false, false };
|
|
|
|
static csync_vio_capabilities_t *owncloud_capabilities(void)
|
|
{
|
|
#ifdef _WIN32
|
|
_owncloud_capabilities.unix_extensions = 0;
|
|
#endif
|
|
return &_owncloud_capabilities;
|
|
}
|
|
|
|
static const char* owncloud_file_id( const char *path )
|
|
{
|
|
ne_request *req = NULL;
|
|
const char *header = NULL;
|
|
char *uri = _cleanPath(path);
|
|
char *buf = NULL;
|
|
const char *cbuf = NULL;
|
|
csync_vio_file_stat_t *fs = NULL;
|
|
bool doHeadRequest = false;
|
|
|
|
if (_id_cache.uri && c_streq(path, _id_cache.uri)) {
|
|
header = _id_cache.id;
|
|
}
|
|
|
|
doHeadRequest= false; /* ownCloud server doesn't have good support for HEAD yet */
|
|
|
|
if( !header && doHeadRequest ) {
|
|
int neon_stat;
|
|
/* Perform an HEAD request to the resource. HEAD delivers the
|
|
* ETag header back. */
|
|
req = ne_request_create(dav_session.ctx, "HEAD", uri);
|
|
neon_stat = ne_request_dispatch(req);
|
|
set_errno_from_neon_errcode( neon_stat );
|
|
|
|
header = ne_get_response_header(req, "etag");
|
|
}
|
|
/* If the request went wrong or the server did not respond correctly
|
|
* (that can happen for collections) a stat call is done which translates
|
|
* into a PROPFIND request.
|
|
*/
|
|
if( ! header ) {
|
|
/* ... and do a stat call. */
|
|
fs = csync_vio_file_stat_new();
|
|
if(fs == NULL) {
|
|
DEBUG_WEBDAV( "owncloud_file_id: memory fault.");
|
|
errno = ENOMEM;
|
|
return NULL;
|
|
}
|
|
if( owncloud_stat( path, fs ) == 0 ) {
|
|
header = fs->md5;
|
|
}
|
|
}
|
|
|
|
/* In case the result is surrounded by "" cut them away. */
|
|
if( header ) {
|
|
if( header [0] == '"' && header[ strlen(header)-1] == '"') {
|
|
int len = strlen( header )-2;
|
|
buf = c_malloc( len+1 );
|
|
strncpy( buf, header+1, len );
|
|
buf[len] = '\0';
|
|
cbuf = buf;
|
|
/* do not free header here, as it belongs to the request */
|
|
} else {
|
|
cbuf = c_strdup(header);
|
|
}
|
|
}
|
|
|
|
/* fix server problem: If we end up with an empty string, set something strange... */
|
|
if( c_streq(cbuf, "") || c_streq(cbuf, "\"\"") ) {
|
|
SAFE_FREE(cbuf);
|
|
cbuf = c_strdup("empty_etag");
|
|
}
|
|
|
|
DEBUG_WEBDAV("Get file ID for %s: %s", path, cbuf ? cbuf:"<null>");
|
|
if( fs ) csync_vio_file_stat_destroy(fs);
|
|
if( req ) ne_request_destroy(req);
|
|
SAFE_FREE(uri);
|
|
|
|
return cbuf;
|
|
}
|
|
|
|
static csync_vio_method_handle_t *owncloud_open(const char *durl,
|
|
int flags,
|
|
mode_t mode) {
|
|
char *uri = NULL;
|
|
char *dir = NULL;
|
|
int put = 0;
|
|
int rc = NE_OK;
|
|
|
|
struct transfer_context *writeCtx = NULL;
|
|
csync_vio_file_stat_t statBuf;
|
|
ZERO_STRUCT(statBuf);
|
|
|
|
(void) mode; /* unused on webdav server */
|
|
DEBUG_WEBDAV( "=> open called for %s", durl );
|
|
|
|
uri = _cleanPath( durl );
|
|
if( ! uri ) {
|
|
DEBUG_WEBDAV("Failed to clean path for %s", durl );
|
|
errno = EACCES;
|
|
rc = NE_ERROR;
|
|
}
|
|
|
|
if( rc == NE_OK )
|
|
dav_connect( durl );
|
|
|
|
if (flags & O_WRONLY) {
|
|
put = 1;
|
|
}
|
|
if (flags & O_RDWR) {
|
|
put = 1;
|
|
}
|
|
if (flags & O_CREAT) {
|
|
put = 1;
|
|
}
|
|
|
|
if( rc == NE_OK && put ) {
|
|
/* check if the dir name exists. Otherwise return ENOENT */
|
|
dir = c_dirname( durl );
|
|
if (dir == NULL) {
|
|
errno = ENOMEM;
|
|
SAFE_FREE(uri);
|
|
return NULL;
|
|
}
|
|
DEBUG_WEBDAV("Stating directory %s", dir );
|
|
if( c_streq( dir, _lastDir )) {
|
|
DEBUG_WEBDAV("Dir %s is there, we know it already.", dir);
|
|
} else {
|
|
if( owncloud_stat( dir, &statBuf ) == 0 ) {
|
|
SAFE_FREE(statBuf.name);
|
|
SAFE_FREE(statBuf.md5);
|
|
DEBUG_WEBDAV("Directory of file to open exists.");
|
|
SAFE_FREE( _lastDir );
|
|
_lastDir = c_strdup(dir);
|
|
|
|
} else {
|
|
DEBUG_WEBDAV("Directory %s of file to open does NOT exist.", dir );
|
|
/* the directory does not exist. That is an ENOENT */
|
|
errno = ENOENT;
|
|
SAFE_FREE(dir);
|
|
SAFE_FREE(uri);
|
|
SAFE_FREE(statBuf.name);
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
writeCtx = c_malloc( sizeof(struct transfer_context) );
|
|
writeCtx->url = c_strdup(durl);
|
|
writeCtx->req = NULL;
|
|
writeCtx->fd = -1;
|
|
|
|
if( rc == NE_OK && put) {
|
|
DEBUG_WEBDAV("PUT request on %s!", uri);
|
|
writeCtx->method = "PUT";
|
|
}
|
|
|
|
if( rc == NE_OK && ! put ) {
|
|
writeCtx->method = "GET";
|
|
DEBUG_WEBDAV("GET request on %s", uri );
|
|
}
|
|
|
|
if( rc != NE_OK ) {
|
|
SAFE_FREE( writeCtx );
|
|
}
|
|
|
|
SAFE_FREE( uri );
|
|
SAFE_FREE( dir );
|
|
|
|
return (csync_vio_method_handle_t *) writeCtx;
|
|
}
|
|
|
|
static csync_vio_method_handle_t *owncloud_creat(const char *durl, mode_t mode) {
|
|
|
|
csync_vio_method_handle_t *handle = owncloud_open(durl, O_CREAT|O_WRONLY|O_TRUNC, mode);
|
|
|
|
/* on create, the file needs to be created empty */
|
|
owncloud_write( handle, NULL, 0 );
|
|
|
|
return handle;
|
|
}
|
|
|
|
static int _user_want_abort()
|
|
{
|
|
return csync_abort_requested(dav_session.csync_ctx);
|
|
}
|
|
|
|
static void _log_callback(const char *func, const char *text)
|
|
{
|
|
csync_log(CSYNC_LOG_PRIORITY_TRACE, func, "%s", text);
|
|
}
|
|
|
|
static int owncloud_sendfile(csync_vio_method_handle_t *src, csync_vio_method_handle_t *hdl ) {
|
|
int rc = 0;
|
|
int neon_stat;
|
|
const ne_status *status;
|
|
struct transfer_context *write_ctx = (struct transfer_context*) hdl;
|
|
fhandle_t *fh = (fhandle_t *) src;
|
|
int fd;
|
|
int error_code = 0;
|
|
char *clean_uri = NULL;
|
|
int64_t file_size;
|
|
|
|
if( ! write_ctx ) {
|
|
errno = EINVAL;
|
|
return -1;
|
|
}
|
|
|
|
if( !fh ) {
|
|
errno = EINVAL;
|
|
return -1;
|
|
}
|
|
fd = fh->fd;
|
|
|
|
clean_uri = _cleanPath( write_ctx->url );
|
|
|
|
chunked_total_size = 0;
|
|
chunked_done = 0;
|
|
|
|
gettimeofday(&write_ctx->last_time, NULL);
|
|
|
|
DEBUG_WEBDAV("Sendfile handling request type %s. fd %d", write_ctx->method, fd);
|
|
|
|
/*
|
|
* Copy from the file descriptor if method == PUT
|
|
* Copy to the file descriptor if method == GET
|
|
*/
|
|
|
|
if( c_streq( write_ctx->method, "PUT") ) {
|
|
clear_propfind_recursive_cache();
|
|
|
|
bool finished = true;
|
|
int attempts = 0;
|
|
/*
|
|
* do ten tries to upload the file chunked. Check the file size and mtime
|
|
* before submitting a chunk and after having submitted the last one.
|
|
* If the file has changed, retry.
|
|
*/
|
|
do {
|
|
Hbf_State state = HBF_SUCCESS;
|
|
hbf_transfer_t *trans = hbf_init_transfer(clean_uri);
|
|
hbf_set_log_callback(trans, _log_callback);
|
|
if (dav_session.hbf_block_size > 0) {
|
|
trans->threshold = trans->block_size = dav_session.hbf_block_size;
|
|
}
|
|
if (dav_session.hbf_threshold > 0) {
|
|
trans->threshold = dav_session.hbf_threshold;
|
|
}
|
|
finished = true;
|
|
|
|
if (!trans) {
|
|
DEBUG_WEBDAV("hbf_init_transfer failed");
|
|
rc = 1;
|
|
} else {
|
|
state = hbf_splitlist(trans, fd);
|
|
file_size = trans->stat_size;
|
|
(void) file_size;
|
|
DEBUG_WEBDAV("about to send %d block", trans->block_cnt);
|
|
|
|
|
|
/* Reuse chunk info that was stored in database if existing. */
|
|
if (dav_session.chunk_info && dav_session.chunk_info->transfer_id) {
|
|
DEBUG_WEBDAV("Existing chunk info %d %d ", dav_session.chunk_info->start_id, dav_session.chunk_info->transfer_id);
|
|
trans->start_id = dav_session.chunk_info->start_id;
|
|
trans->transfer_id = dav_session.chunk_info->transfer_id;
|
|
}
|
|
|
|
if (state == HBF_SUCCESS) {
|
|
ne_set_notifier(dav_session.ctx, ne_notify_status_cb, write_ctx);
|
|
oc_notify_progress(write_ctx->url, CSYNC_NOTIFY_START_UPLOAD, 0, 0);
|
|
}
|
|
|
|
/* Register the abort callback */
|
|
hbf_set_abort_callback( trans, _user_want_abort );
|
|
|
|
if( state == HBF_SUCCESS ) {
|
|
chunked_total_size = trans->stat_size;
|
|
/* Transfer all the chunks through the HTTP session using PUT. */
|
|
state = hbf_transfer( dav_session.ctx, trans, "PUT" );
|
|
}
|
|
|
|
/* Handle errors. */
|
|
if ( state != HBF_SUCCESS ) {
|
|
|
|
if( state == HBF_USER_ABORTED ) {
|
|
DEBUG_WEBDAV("User Aborted file upload!");
|
|
errno = ERRNO_USER_ABORT;
|
|
rc = -1;
|
|
}
|
|
/* If the source file changed during submission, lets try again */
|
|
if( state == HBF_SOURCE_FILE_CHANGE ) {
|
|
if( attempts++ < 30 ) { /* FIXME: How often do we want to try? */
|
|
finished = false; /* make it try again from scratch. */
|
|
DEBUG_WEBDAV("SOURCE file has changed during upload, retry #%d in two seconds!", attempts);
|
|
sleep(2);
|
|
}
|
|
}
|
|
|
|
if( finished ) {
|
|
SAFE_FREE(dav_session.error_string);
|
|
dav_session.error_string = c_strdup(hbf_error_string(trans, state));
|
|
error_code = hbf_fail_http_code(trans);
|
|
set_errno_from_http_errcode(error_code);
|
|
|
|
rc = 1;
|
|
if (dav_session.chunk_info) {
|
|
dav_session.chunk_info->start_id = trans->start_id;
|
|
dav_session.chunk_info->transfer_id = trans->transfer_id;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
hbf_free_transfer(trans);
|
|
} while( !finished );
|
|
|
|
ne_set_notifier(dav_session.ctx, 0, 0);
|
|
if( rc == 0 ) {
|
|
DEBUG_WEBDAV(" * Upload finished %s", write_ctx->url);
|
|
} else {
|
|
oc_notify_progress(write_ctx->url, CSYNC_NOTIFY_ERROR, error_code, (intptr_t)(dav_session.error_string));
|
|
}
|
|
} else if( c_streq( write_ctx->method, "GET") ) {
|
|
/* GET a file to the file descriptor */
|
|
/* actually do the request */
|
|
int retry = 0;
|
|
DEBUG_WEBDAV(" -- GET on %s", write_ctx->url);
|
|
write_ctx->fd = fd;
|
|
ne_set_notifier(dav_session.ctx, ne_notify_status_cb, write_ctx);
|
|
oc_notify_progress(write_ctx->url, CSYNC_NOTIFY_START_DOWNLOAD, 0 , 0);
|
|
|
|
do {
|
|
csync_stat_t sb;
|
|
|
|
if (write_ctx->req)
|
|
ne_request_destroy( write_ctx->req );
|
|
|
|
if( _user_want_abort() ) {
|
|
errno = ERRNO_USER_ABORT;
|
|
break;
|
|
}
|
|
|
|
write_ctx->req = ne_request_create(dav_session.ctx, "GET", clean_uri);;
|
|
|
|
/* Allow compressed content by setting the header */
|
|
ne_add_request_header( write_ctx->req, "Accept-Encoding", "gzip" );
|
|
|
|
if (_tfstat(fd, &sb) >= 0 && sb.st_size > 0) {
|
|
char brange[64];
|
|
snprintf(brange, sizeof brange, "bytes=%"PRId64"-", (int64_t) sb.st_size);
|
|
ne_add_request_header(write_ctx->req, "Range", brange);
|
|
ne_add_request_header(write_ctx->req, "Accept-Ranges", "bytes");
|
|
DEBUG_WEBDAV("Retry with range %s fd %d", brange, fd);
|
|
}
|
|
|
|
/* hook called before the content is parsed to set the correct reader,
|
|
* either the compressed- or uncompressed reader.
|
|
*/
|
|
ne_hook_post_headers( dav_session.ctx, install_content_reader, write_ctx );
|
|
|
|
neon_stat = ne_request_dispatch(write_ctx->req );
|
|
|
|
/* delete the hook again, otherwise they get chained as they are with the session */
|
|
ne_unhook_post_headers( dav_session.ctx, install_content_reader, write_ctx );
|
|
|
|
/* if the compression handle is set through the post_header hook, delete it. */
|
|
if( write_ctx->decompress ) {
|
|
ne_decompress_destroy( write_ctx->decompress );
|
|
}
|
|
/* possible return codes are:
|
|
* NE_OK, NE_AUTH, NE_CONNECT, NE_TIMEOUT, NE_ERROR (from ne_request.h)
|
|
*/
|
|
|
|
status = ne_get_status( write_ctx->req );
|
|
|
|
if( neon_stat != NE_OK ) {
|
|
/* If a timeout happened try again for three times */
|
|
if (neon_stat == NE_TIMEOUT && (++retry) < 3) {
|
|
continue;
|
|
}
|
|
|
|
set_errno_from_neon_errcode(neon_stat);
|
|
DEBUG_WEBDAV("Error GET: Neon: %d, errno %d", neon_stat, errno);
|
|
error_code = errno;
|
|
if( status != NULL ) {
|
|
SAFE_FREE(dav_session.error_string);
|
|
dav_session.error_string = c_strdup(status->reason_phrase);
|
|
}
|
|
rc = 1;
|
|
} else {
|
|
if( status != NULL ) {
|
|
DEBUG_WEBDAV("GET http result %d (%s)", status->code, status->reason_phrase ? status->reason_phrase : "<empty");
|
|
if( status->klass != 2 ) {
|
|
DEBUG_WEBDAV("sendfile request failed with http status %d!", status->code);
|
|
set_errno_from_http_errcode( status->code );
|
|
/* decide if soft error or hard error that stops the whole sync. */
|
|
/* Currently all problems concerning one file are soft errors */
|
|
if( status->klass == 4 /* Forbidden and stuff, soft error */ ) {
|
|
rc = 1;
|
|
} else if( status->klass == 5 /* Server errors and such */ ) {
|
|
rc = 1; /* No Abort on individual file errors. */
|
|
} else {
|
|
rc = 1;
|
|
}
|
|
error_code = status->code;
|
|
SAFE_FREE(dav_session.error_string);
|
|
dav_session.error_string = c_strdup(status->reason_phrase);
|
|
} else {
|
|
DEBUG_WEBDAV("http request all cool, result code %d", status->code);
|
|
}
|
|
} else {
|
|
/* No status but still a problem */
|
|
DEBUG_WEBDAV("GET failed, but no neon status available.");
|
|
error_code = 400;
|
|
rc = 1;
|
|
}
|
|
}
|
|
|
|
break;
|
|
} while (1);
|
|
|
|
ne_set_notifier(dav_session.ctx, 0, 0);
|
|
if( rc == 0 ) {
|
|
DEBUG_WEBDAV(" ** Finished download %s", write_ctx->url);
|
|
} else {
|
|
oc_notify_progress( write_ctx->url, CSYNC_NOTIFY_ERROR, error_code , (intptr_t)(dav_session.error_string));
|
|
}
|
|
} else {
|
|
DEBUG_WEBDAV("Unknown method!");
|
|
errno = ERRNO_GENERAL_ERROR;
|
|
rc = -1;
|
|
}
|
|
|
|
chunked_total_size = 0;
|
|
chunked_done = 0;
|
|
|
|
SAFE_FREE(clean_uri);
|
|
return rc;
|
|
}
|
|
|
|
static int owncloud_close(csync_vio_method_handle_t *fhandle) {
|
|
struct transfer_context *writeCtx;
|
|
|
|
int ret = 0;
|
|
|
|
writeCtx = (struct transfer_context*) fhandle;
|
|
|
|
if (fhandle == NULL) {
|
|
DEBUG_WEBDAV("*** Close returns errno EBADF!");
|
|
errno = EBADF;
|
|
return -1;
|
|
}
|
|
|
|
if (writeCtx->req)
|
|
ne_request_destroy( writeCtx->req );
|
|
|
|
if( ret != -1 && strcmp( writeCtx->method, "PUT" ) == 0 ) {
|
|
// Clear the cache so get_id gets the updates
|
|
clean_caches();
|
|
}
|
|
|
|
/* free mem. Note that the request mem is freed by the ne_request_destroy call */
|
|
SAFE_FREE( writeCtx->url );
|
|
SAFE_FREE( writeCtx );
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t owncloud_read(csync_vio_method_handle_t *fhandle, void *buf, size_t count) {
|
|
size_t len = 0;
|
|
|
|
(void) fhandle;
|
|
(void) buf;
|
|
(void) count;
|
|
|
|
return len;
|
|
}
|
|
|
|
static int64_t owncloud_lseek(csync_vio_method_handle_t *fhandle, int64_t offset, int whence) {
|
|
(void) fhandle;
|
|
(void) offset;
|
|
(void) whence;
|
|
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* directory functions
|
|
*/
|
|
static csync_vio_method_handle_t *owncloud_opendir(const char *uri) {
|
|
struct listdir_context *fetchCtx = NULL;
|
|
char *curi = NULL;
|
|
|
|
DEBUG_WEBDAV("opendir method called on %s", uri );
|
|
|
|
dav_connect( uri );
|
|
|
|
curi = _cleanPath( uri );
|
|
if (is_first_propfind && !dav_session.no_recursive_propfind) {
|
|
is_first_propfind = false;
|
|
// Try to fill it
|
|
fill_recursive_propfind_cache(uri, curi);
|
|
}
|
|
if (propfind_recursive_cache) {
|
|
// Try to fetch from recursive cache (if we have one)
|
|
fetchCtx = get_listdir_context_from_recursive_cache(curi);
|
|
}
|
|
SAFE_FREE(curi);
|
|
is_first_propfind = false;
|
|
if (fetchCtx) {
|
|
return fetchCtx;
|
|
}
|
|
|
|
/* fetchCtx = fetch_resource_list( uri, NE_DEPTH_ONE ); */
|
|
fetchCtx = fetch_resource_list_attempts( uri, NE_DEPTH_ONE);
|
|
if( !fetchCtx ) {
|
|
/* errno is set properly in fetch_resource_list */
|
|
DEBUG_WEBDAV("Errno set to %d", errno);
|
|
return NULL;
|
|
} else {
|
|
fetchCtx->currResource = fetchCtx->list;
|
|
DEBUG_WEBDAV("opendir returning handle %p (count=%d)", (void*) fetchCtx, fetchCtx->result_count );
|
|
return fetchCtx;
|
|
}
|
|
/* no freeing of curi because its part of the fetchCtx and gets freed later */
|
|
}
|
|
|
|
static int owncloud_closedir(csync_vio_method_handle_t *dhandle) {
|
|
|
|
struct listdir_context *fetchCtx = dhandle;
|
|
|
|
DEBUG_WEBDAV("closedir method called %p!", dhandle);
|
|
|
|
free_fetchCtx(fetchCtx);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static csync_vio_file_stat_t *owncloud_readdir(csync_vio_method_handle_t *dhandle) {
|
|
|
|
struct listdir_context *fetchCtx = dhandle;
|
|
|
|
if( fetchCtx == NULL) {
|
|
/* DEBUG_WEBDAV("An empty dir or at end"); */
|
|
return NULL;
|
|
}
|
|
|
|
while( fetchCtx->currResource ) {
|
|
resource* currResource = fetchCtx->currResource;
|
|
char *escaped_path = NULL;
|
|
|
|
/* set pointer to next element */
|
|
fetchCtx->currResource = fetchCtx->currResource->next;
|
|
|
|
/* It seems strange: first uri->path is unescaped to escape it in the next step again.
|
|
* The reason is that uri->path is not completely escaped (ie. it seems only to have
|
|
* spaces escaped), while the fetchCtx->target is fully escaped.
|
|
* See http://bugs.owncloud.org/thebuggenie/owncloud/issues/oc-613
|
|
*/
|
|
escaped_path = ne_path_escape( currResource->uri );
|
|
if (ne_path_compare(fetchCtx->target, escaped_path) != 0) {
|
|
csync_vio_file_stat_t* lfs = resourceToFileStat(currResource);
|
|
fill_stat_cache(lfs);
|
|
SAFE_FREE( escaped_path );
|
|
return lfs;
|
|
}
|
|
|
|
/* This is the target URI */
|
|
SAFE_FREE( escaped_path );
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int owncloud_mkdir(const char *uri, mode_t mode) {
|
|
int rc = NE_OK;
|
|
int len = 0;
|
|
|
|
char *path = _cleanPath( uri );
|
|
(void) mode; /* unused */
|
|
|
|
clear_propfind_recursive_cache();
|
|
|
|
if( ! path ) {
|
|
errno = EINVAL;
|
|
rc = -1;
|
|
}
|
|
rc = dav_connect(uri);
|
|
if (rc < 0) {
|
|
errno = EINVAL;
|
|
}
|
|
|
|
/* the uri path is required to have a trailing slash */
|
|
if( rc >= 0 ) {
|
|
len = strlen( path );
|
|
if( path[len-1] != '/' ) {
|
|
path = c_realloc(path, len+2);
|
|
path[len]= '/';
|
|
path[len+1] = 0;
|
|
}
|
|
DEBUG_WEBDAV("MKdir on %s", path );
|
|
|
|
rc = ne_mkcol(dav_session.ctx, path );
|
|
set_errno_from_neon_errcode(rc);
|
|
/* Special for mkcol: it returns 405 if the directory already exists.
|
|
* To keep csync vio_mkdirs working errno EEXIST has to be returned. */
|
|
if (errno == EPERM && http_result_code_from_session() == 405) {
|
|
errno = EEXIST;
|
|
} else if (rc != NE_OK) {
|
|
oc_notify_progress(uri, CSYNC_NOTIFY_ERROR, http_result_code_from_session(),
|
|
(intptr_t)(dav_session.error_string) );
|
|
}
|
|
}
|
|
SAFE_FREE( path );
|
|
|
|
if( rc < 0 || rc != NE_OK ) {
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_rmdir(const char *uri) {
|
|
int rc = NE_OK;
|
|
char* curi = _cleanPath( uri );
|
|
|
|
if( curi == NULL ) {
|
|
DEBUG_WEBDAV("Can not clean path for %s, bailing out.", uri ? uri:"<empty>");
|
|
return -1;
|
|
}
|
|
rc = dav_connect(uri);
|
|
if (rc < 0) {
|
|
errno = EINVAL;
|
|
}
|
|
|
|
if( rc >= 0 ) {
|
|
rc = ne_delete(dav_session.ctx, curi);
|
|
set_errno_from_neon_errcode( rc );
|
|
}
|
|
SAFE_FREE( curi );
|
|
if( rc < 0 || rc != NE_OK ) {
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_rename(const char *olduri, const char *newuri) {
|
|
char *src = NULL;
|
|
char *target = NULL;
|
|
int rc = NE_OK;
|
|
|
|
clear_propfind_recursive_cache();
|
|
|
|
rc = dav_connect(olduri);
|
|
if (rc < 0) {
|
|
errno = EINVAL;
|
|
}
|
|
|
|
src = _cleanPath( olduri );
|
|
target = _cleanPath( newuri );
|
|
|
|
if( rc >= 0 ) {
|
|
DEBUG_WEBDAV("MOVE: %s => %s: %d", src, target, rc );
|
|
rc = ne_move(dav_session.ctx, 1, src, target );
|
|
if (rc == NE_ERROR && http_result_code_from_session() == 409) {
|
|
/* destination folder might not exist */
|
|
errno = ENOENT;
|
|
} else {
|
|
set_errno_from_neon_errcode(rc);
|
|
if (rc != NE_OK) {
|
|
oc_notify_progress(olduri, CSYNC_NOTIFY_ERROR, http_result_code_from_session(),
|
|
(intptr_t)(dav_session.error_string) );
|
|
}
|
|
}
|
|
}
|
|
SAFE_FREE( src );
|
|
SAFE_FREE( target );
|
|
|
|
if( rc != NE_OK )
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_unlink(const char *uri) {
|
|
int rc = NE_OK;
|
|
char *path = _cleanPath( uri );
|
|
|
|
clear_propfind_recursive_cache();
|
|
|
|
if( ! path ) {
|
|
rc = NE_ERROR;
|
|
errno = EINVAL;
|
|
}
|
|
if( rc == NE_OK ) {
|
|
rc = dav_connect(uri);
|
|
if (rc < 0) {
|
|
errno = EINVAL;
|
|
}
|
|
}
|
|
if( rc == NE_OK ) {
|
|
rc = ne_delete( dav_session.ctx, path );
|
|
set_errno_from_neon_errcode(rc);
|
|
}
|
|
SAFE_FREE( path );
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_chmod(const char *uri, mode_t mode) {
|
|
(void) uri;
|
|
(void) mode;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_chown(const char *uri, uid_t owner, gid_t group) {
|
|
(void) uri;
|
|
(void) owner;
|
|
(void) group;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static char *owncloud_error_string()
|
|
{
|
|
return dav_session.error_string;
|
|
}
|
|
|
|
static int owncloud_commit() {
|
|
|
|
SAFE_FREE( _lastDir );
|
|
|
|
clean_caches();
|
|
|
|
if( dav_session.ctx )
|
|
ne_session_destroy( dav_session.ctx );
|
|
/* DEBUG_WEBDAV( "********** vio_module_shutdown" ); */
|
|
|
|
dav_session.ctx = 0;
|
|
|
|
ne_sock_exit();
|
|
_connected = 0; /* triggers dav_connect to go through the whole neon setup */
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
static int owncloud_utimes(const char *uri, const struct timeval *times) {
|
|
|
|
ne_proppatch_operation ops[2];
|
|
ne_propname pname;
|
|
int rc = NE_OK;
|
|
char val[255];
|
|
char *curi = NULL;
|
|
const struct timeval *modtime = times+1;
|
|
long newmodtime;
|
|
|
|
curi = _cleanPath( uri );
|
|
|
|
if( ! uri ) {
|
|
errno = ENOENT;
|
|
return -1;
|
|
}
|
|
if( !times ) {
|
|
errno = EACCES;
|
|
return -1; /* FIXME: Find good errno */
|
|
}
|
|
pname.nspace = "DAV:";
|
|
pname.name = "lastmodified";
|
|
|
|
newmodtime = modtime->tv_sec;
|
|
|
|
snprintf( val, sizeof(val), "%ld", newmodtime );
|
|
DEBUG_WEBDAV("Setting LastModified of %s to %s", curi, val );
|
|
|
|
ops[0].name = &pname;
|
|
ops[0].type = ne_propset;
|
|
ops[0].value = val;
|
|
|
|
ops[1].name = NULL;
|
|
|
|
rc = ne_proppatch( dav_session.ctx, curi, ops );
|
|
SAFE_FREE(curi);
|
|
|
|
if( rc != NE_OK ) {
|
|
const char *err = ne_get_error(dav_session.ctx);
|
|
set_errno_from_neon_errcode(rc);
|
|
|
|
DEBUG_WEBDAV("Error in propatch: %s", err == NULL ? "<empty err msg.>" : err);
|
|
return -1;
|
|
}
|
|
|
|
clean_caches();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int owncloud_set_property(const char *key, void *data) {
|
|
#define READ_STRING_PROPERTY(P) \
|
|
if (c_streq(key, #P)) { \
|
|
SAFE_FREE(dav_session.P); \
|
|
dav_session.P = c_strdup((const char*)data); \
|
|
return 0; \
|
|
}
|
|
READ_STRING_PROPERTY(session_key)
|
|
READ_STRING_PROPERTY(proxy_type)
|
|
READ_STRING_PROPERTY(proxy_host)
|
|
READ_STRING_PROPERTY(proxy_user)
|
|
READ_STRING_PROPERTY(proxy_pwd)
|
|
#undef READ_STRING_PROPERTY
|
|
|
|
if (c_streq(key, "proxy_port")) {
|
|
dav_session.proxy_port = *(int*)(data);
|
|
return 0;
|
|
}
|
|
if (c_streq(key, "read_timeout") || c_streq(key, "timeout")) {
|
|
dav_session.read_timeout = *(int*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "csync_context")) {
|
|
dav_session.csync_ctx = data;
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "hbf_info")) {
|
|
dav_session.chunk_info = (csync_hbf_info_t *)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "get_dav_session")) {
|
|
/* Give the ne_session to the caller */
|
|
*(ne_session**)data = dav_session.ctx;
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "no_recursive_propfind")) {
|
|
dav_session.no_recursive_propfind = *(bool*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "hbf_block_size")) {
|
|
dav_session.hbf_block_size = *(int64_t*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "hbf_threshold")) {
|
|
dav_session.hbf_threshold = *(int64_t*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "bandwidth_limit_upload")) {
|
|
dav_session.bandwidth_limit_upload = *(int*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "bandwidth_limit_download")) {
|
|
dav_session.bandwidth_limit_download = *(int*)(data);
|
|
return 0;
|
|
}
|
|
if( c_streq(key, "overall_progress_data")) {
|
|
dav_session.overall_progress_data = (csync_overall_progress_t*)(data);
|
|
}
|
|
if( c_streq(key, "redirect_callback")) {
|
|
if (data) {
|
|
csync_owncloud_redirect_callback_t* cb_wrapper = data;
|
|
|
|
dav_session.redir_callback = *cb_wrapper;
|
|
} else {
|
|
dav_session.redir_callback = NULL;
|
|
}
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
csync_vio_method_t _method = {
|
|
.method_table_size = sizeof(csync_vio_method_t),
|
|
.get_capabilities = owncloud_capabilities,
|
|
.get_file_id = owncloud_file_id,
|
|
.open = owncloud_open,
|
|
.creat = owncloud_creat,
|
|
.close = owncloud_close,
|
|
.read = owncloud_read,
|
|
.write = owncloud_write,
|
|
.sendfile = owncloud_sendfile,
|
|
.lseek = owncloud_lseek,
|
|
.opendir = owncloud_opendir,
|
|
.closedir = owncloud_closedir,
|
|
.readdir = owncloud_readdir,
|
|
.mkdir = owncloud_mkdir,
|
|
.rmdir = owncloud_rmdir,
|
|
.stat = owncloud_stat,
|
|
.rename = owncloud_rename,
|
|
.unlink = owncloud_unlink,
|
|
.chmod = owncloud_chmod,
|
|
.chown = owncloud_chown,
|
|
.utimes = owncloud_utimes,
|
|
.set_property = owncloud_set_property,
|
|
.get_error_string = owncloud_error_string,
|
|
.commit = owncloud_commit
|
|
|
|
};
|
|
|
|
csync_vio_method_t *vio_module_init(const char *method_name, const char *args,
|
|
csync_auth_callback cb, void *userdata) {
|
|
(void) method_name;
|
|
(void) args;
|
|
(void) userdata;
|
|
|
|
_authcb = cb;
|
|
_connected = 0; /* triggers dav_connect to go through the whole neon setup */
|
|
|
|
memset(&dav_session, 0, sizeof(dav_session));
|
|
|
|
/* Disable it, Mirall can enable it for the first sync (= no DB)*/
|
|
dav_session.no_recursive_propfind = true;
|
|
|
|
return &_method;
|
|
}
|
|
|
|
void vio_module_shutdown(csync_vio_method_t *method) {
|
|
(void) method;
|
|
|
|
owncloud_commit();
|
|
|
|
SAFE_FREE( dav_session.user );
|
|
SAFE_FREE( dav_session.pwd );
|
|
|
|
SAFE_FREE( dav_session.proxy_type );
|
|
SAFE_FREE( dav_session.proxy_host );
|
|
SAFE_FREE( dav_session.proxy_user );
|
|
SAFE_FREE( dav_session.proxy_pwd );
|
|
SAFE_FREE( dav_session.session_key);
|
|
SAFE_FREE( dav_session.error_string );
|
|
|
|
/* DEBUG_WEBDAV( "********** vio_module_shutdown" ); */
|
|
}
|
|
|
|
/* vim: set ts=4 sw=4 et cindent: */
|