All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.catalina.servlets.WebdavServlet Maven / Gradle / Ivy

The newest version!
/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.catalina.servlets;

import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.Serializable;
import java.io.StringReader;
import java.io.StringWriter;
import java.io.Writer;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.ArrayDeque;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Date;
import java.util.Deque;
import java.util.Enumeration;
import java.util.Iterator;
import java.util.LinkedHashMap;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import java.util.TimeZone;
import java.util.UUID;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.CopyOnWriteArrayList;

import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.ParserConfigurationException;

import jakarta.servlet.DispatcherType;
import jakarta.servlet.RequestDispatcher;
import jakarta.servlet.ServletContext;
import jakarta.servlet.ServletException;
import jakarta.servlet.ServletRegistration;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;

import org.apache.catalina.WebResource;
import org.apache.catalina.connector.RequestFacade;
import org.apache.catalina.util.DOMWriter;
import org.apache.catalina.util.XMLWriter;
import org.apache.tomcat.PeriodicEventListener;
import org.apache.tomcat.util.IntrospectionUtils;
import org.apache.tomcat.util.http.ConcurrentDateFormat;
import org.apache.tomcat.util.http.FastHttpDateFormat;
import org.apache.tomcat.util.http.RequestUtil;
import org.apache.tomcat.util.http.WebdavIfHeader;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.Node;
import org.w3c.dom.NodeList;
import org.xml.sax.EntityResolver;
import org.xml.sax.InputSource;
import org.xml.sax.SAXException;

/**
 * Servlet which adds support for WebDAV
 * level 3. All the basic HTTP requests are handled by the
 * DefaultServlet. The WebDAVServlet must not be used as the default servlet (ie mapped to '/') as it will not work in
 * this configuration.
 * 

* Mapping a subpath (e.g. /webdav/* to this servlet has the effect of re-mounting the entire web * application under that sub-path, with WebDAV access to all the resources. The WEB-INF and * META-INF directories are protected in this re-mounted resource tree. *

* To enable WebDAV for a context add the following to web.xml: * *

 * <servlet>
 *  <servlet-name>webdav</servlet-name>
 *  <servlet-class>org.apache.catalina.servlets.WebdavServlet</servlet-class>
 *    <init-param>
 *      <param-name>debug</param-name>
 *      <param-value>0</param-value>
 *    </init-param>
 *    <init-param>
 *      <param-name>listings</param-name>
 *      <param-value>false</param-value>
 *    </init-param>
 *  </servlet>
 *  <servlet-mapping>
 *    <servlet-name>webdav</servlet-name>
 *    <url-pattern>/*</url-pattern>
 *  </servlet-mapping>
 * 
* * This will enable read only access. To enable read-write access add: * *
 *  <init-param>
 *    <param-name>readonly</param-name>
 *    <param-value>false</param-value>
 *  </init-param>
 * 
* * To make the content editable via a different URL, use the following mapping: * *
 *  <servlet-mapping>
 *    <servlet-name>webdav</servlet-name>
 *    <url-pattern>/webdavedit/*</url-pattern>
 *  </servlet-mapping>
 * 
* * By default access to /WEB-INF and META-INF are not available via WebDAV. To enable access to these URLs, use add: * *
 *  <init-param>
 *    <param-name>allowSpecialPaths</param-name>
 *    <param-value>true</param-value>
 *  </init-param>
 * 
* * Don't forget to secure access appropriately to the editing URLs, especially if allowSpecialPaths is used. With the * mapping configuration above, the context will be accessible to normal users as before. Those users with the necessary * access will be able to edit content available via http://host:port/context/content using * http://host:port/context/webdavedit/content *

* The Servlet provides support for arbitrary dead properties on all resources (dead properties are properties * whose values are not protected by the server, such as the content length of a resource). By default the Servlet * will use non persistent memory storage for them. Persistence can be achieved by implementing * the PropertyStore interface and configuring the Servlet to use that store. * The propertyStore init-param allows configuring the classname of the store to use, while the * parameters in the form of store.xxx will be set on the store object as bean properties. * For example, this would configure a store with class com.MyPropertyStore, and set its field * myName to value myValue: * *

 *  <init-param>
 *    <param-name>propertyStore</param-name>
 *    <param-value>com.MyPropertyStore</param-value>
 *  </init-param>
 *  <init-param>
 *    <param-name>store.myName</param-name>
 *    <param-value>myValue</param-value>
 *  </init-param>
 * 
*

* * @see RFC 4918 */ public class WebdavServlet extends DefaultServlet implements PeriodicEventListener { private static final long serialVersionUID = 1L; // -------------------------------------------------------------- Constants private static final String METHOD_PROPFIND = "PROPFIND"; private static final String METHOD_PROPPATCH = "PROPPATCH"; private static final String METHOD_MKCOL = "MKCOL"; private static final String METHOD_COPY = "COPY"; private static final String METHOD_MOVE = "MOVE"; private static final String METHOD_LOCK = "LOCK"; private static final String METHOD_UNLOCK = "UNLOCK"; /** * Default lock timeout value. */ private static final int DEFAULT_TIMEOUT = 3600; /** * Maximum lock timeout. */ private static final int MAX_TIMEOUT = 604800; /** * Default maximum depth. */ private static final int MAX_DEPTH = 3; /** * Default namespace. */ protected static final String DEFAULT_NAMESPACE = "DAV:"; /** * Pre generated raw XML for supported locks. */ protected static final String SUPPORTED_LOCKS = "\n \n" + " \n"; /** * Simple date format for the creation date ISO representation (partial). */ protected static final ConcurrentDateFormat creationDateFormat = new ConcurrentDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'", Locale.US, TimeZone.getTimeZone("GMT")); /** * Lock scheme used. */ protected static final String LOCK_SCHEME = "urn:uuid:"; // ----------------------------------------------------- Instance Variables /** * Repository of all locks, keyed by path. */ private final ConcurrentHashMap resourceLocks = new ConcurrentHashMap<>(); /** * Map of all shared locks, keyed by lock token. */ private final ConcurrentHashMap sharedLocks = new ConcurrentHashMap<>(); /** * Default depth in spec is infinite. */ private int maxDepth = MAX_DEPTH; /** * Is access allowed via WebDAV to the special paths (/WEB-INF and /META-INF)? */ private boolean allowSpecialPaths = false; /** * Is the if header processing strict. */ private boolean strictIfProcessing = true; /** * Property store used for storage of dead properties. */ private PropertyStore store = null; // --------------------------------------------------------- Public Methods @Override public void init() throws ServletException { super.init(); // Validate that the Servlet is only mapped to wildcard mappings String servletName = getServletConfig().getServletName(); ServletRegistration servletRegistration = getServletConfig().getServletContext().getServletRegistration(servletName); Collection servletMappings = servletRegistration.getMappings(); for (String mapping : servletMappings) { if (!mapping.endsWith("/*")) { log(sm.getString("webdavservlet.nonWildcardMapping", mapping)); } } if (getServletConfig().getInitParameter("maxDepth") != null) { maxDepth = Integer.parseInt(getServletConfig().getInitParameter("maxDepth")); } if (getServletConfig().getInitParameter("allowSpecialPaths") != null) { allowSpecialPaths = Boolean.parseBoolean(getServletConfig().getInitParameter("allowSpecialPaths")); } if (getServletConfig().getInitParameter("strictIfProcessing") != null) { strictIfProcessing = Boolean.parseBoolean(getServletConfig().getInitParameter("strictIfProcessing")); } String propertyStore = getServletConfig().getInitParameter("propertyStore"); if (propertyStore != null) { try { Class clazz = Thread.currentThread().getContextClassLoader().loadClass(propertyStore); store = (PropertyStore) clazz.getConstructor().newInstance(); // Set init parameters as properties on the store Enumeration parameterNames = getServletConfig().getInitParameterNames(); while (parameterNames.hasMoreElements()) { String parameterName = parameterNames.nextElement(); if (parameterName.startsWith("store.")) { StringBuilder actualMethod = new StringBuilder(); String parameterValue = getServletConfig().getInitParameter(parameterName); parameterName = parameterName.substring("store.".length()); if (!IntrospectionUtils.setProperty(store, parameterName, parameterValue, true, actualMethod)) { log(sm.getString("webdavservlet.noStoreParameter", parameterName, parameterValue)); } } } } catch (Exception e) { log(sm.getString("webdavservlet.storeError"), e); } } if (store == null) { log(sm.getString("webdavservlet.memorystore")); store = new MemoryPropertyStore(); } store.init(); } @Override public void destroy() { store.destroy(); } @Override public void periodicEvent() { // Check expiration of all locks for (LockInfo currentLock : sharedLocks.values()) { if (currentLock.hasExpired()) { sharedLocks.remove(currentLock.path); } } for (LockInfo currentLock : resourceLocks.values()) { if (currentLock.isExclusive()) { if (currentLock.hasExpired()) { resourceLocks.remove(currentLock.path); } } else { for (String token : currentLock.sharedTokens) { if (sharedLocks.get(token) == null) { currentLock.sharedTokens.remove(token); } } if (currentLock.sharedTokens.isEmpty()) { resourceLocks.remove(currentLock.path); } } } store.periodicEvent(); } // ------------------------------------------------ PropertyStore Interface /** * Handling of dead properties on resources. This interface allows * providing storage for dead properties. Store configuration is done * through the propertyStore init parameter of the WebDAV * Servlet, which should contain the class name of the store. */ public interface PropertyStore { /** * Initialize the store. This is tied to the Servlet lifecycle and is called by its init method. */ void init(); /** * Destroy the store. This is tied to the Servlet lifecycle and is called by its destroy method. */ void destroy(); /** * Periodic event for maintenance tasks. */ void periodicEvent(); /** * Copy resource. Dead properties should be copied to the destination path. * * @param source the copy source path * @param destination the copy destination path */ void copy(String source, String destination); /** * Delete specified resource. Dead properties on a deleted resource should be deleted. * * @param resource the path of the resource to delete */ void delete(String resource); /** * Generate propfind XML fragments for dead properties. * * @param resource the resource path * @param property the dead property, if null then all dead properties must be written * @param nameOnly true if only the property name element should be generated * @param generatedXML the current generated XML for the PROPFIND response * @return true if a property was specified and a corresponding dead property was found on the resource, * false otherwise */ boolean propfind(String resource, Node property, boolean nameOnly, XMLWriter generatedXML); /** * Apply proppatch to the specified resource. * * @param resource the resource path on which to apply the proppatch * @param operations the set and remove to apply, the final status codes of the result should be set on each * operation */ void proppatch(String resource, ArrayList operations); } // ----------------------------------------- ProppatchOperation Inner Class /** * Represents a PROPPATCH sub operation to be performed. */ public static class ProppatchOperation { private final PropertyUpdateType updateType; private final Node propertyNode; private final boolean protectedProperty; private int statusCode = HttpServletResponse.SC_OK; /** * PROPPATCH operation constructor. * @param updateType the update type, either SET or REMOVE * @param propertyNode the XML node that contains the property name (and value if SET) */ public ProppatchOperation(PropertyUpdateType updateType, Node propertyNode) { this.updateType = updateType; this.propertyNode = propertyNode; String davName = getDAVNode(propertyNode); // displayname and getcontentlanguage are the DAV: properties that should not be protected protectedProperty = davName != null && (!(davName.equals("displayname") || davName.equals("getcontentlanguage"))); } /** * @return the updateType for this operation */ public PropertyUpdateType getUpdateType() { return this.updateType; } /** * @return the propertyNode the XML node that contains the property name (and value if SET) */ public Node getPropertyNode() { return this.propertyNode; } /** * @return the statusCode the statusCode to set as a result of the operation */ public int getStatusCode() { return this.statusCode; } /** * @param statusCode the statusCode to set as a result of the operation */ public void setStatusCode(int statusCode) { this.statusCode = statusCode; } /** * @return true if the property is protected */ public boolean getProtectedProperty() { return this.protectedProperty; } } /** * Type of PROPFIND request. */ enum PropfindType { FIND_BY_PROPERTY, FIND_ALL_PROP, FIND_PROPERTY_NAMES } /** * Type of property update in a PROPPATCH. */ enum PropertyUpdateType { SET, REMOVE } // ------------------------------------------------------ Protected Methods /** * Return JAXP document builder instance. * * @return the document builder * * @throws ServletException document builder creation failed (wrapped ParserConfigurationException * exception) */ protected DocumentBuilder getDocumentBuilder() throws ServletException { DocumentBuilder documentBuilder = null; DocumentBuilderFactory documentBuilderFactory = null; try { documentBuilderFactory = DocumentBuilderFactory.newInstance(); documentBuilderFactory.setNamespaceAware(true); documentBuilderFactory.setExpandEntityReferences(false); documentBuilder = documentBuilderFactory.newDocumentBuilder(); documentBuilder.setEntityResolver(new WebdavResolver(this.getServletContext())); } catch (ParserConfigurationException e) { throw new ServletException(sm.getString("webdavservlet.jaxpfailed")); } return documentBuilder; } @Override protected void service(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { final String path = getRelativePath(req); // Error page check needs to come before special path check since // custom error pages are often located below WEB-INF so they are // not directly accessible. if (req.getDispatcherType() == DispatcherType.ERROR) { doGet(req, resp); return; } // Block access to special subdirectories. // DefaultServlet assumes it services resources from the root of the web app // and doesn't add any special path protection // WebdavServlet remounts the webapp under a new path, so this check is // necessary on all methods (including GET). if (isSpecialPath(path)) { resp.sendError(WebdavStatus.SC_NOT_FOUND); return; } final String method = req.getMethod(); if (debug > 0) { log("[" + method + "] " + path); } if (method.equals(METHOD_PROPFIND)) { doPropfind(req, resp); } else if (method.equals(METHOD_PROPPATCH)) { doProppatch(req, resp); } else if (method.equals(METHOD_MKCOL)) { doMkcol(req, resp); } else if (method.equals(METHOD_COPY)) { doCopy(req, resp); } else if (method.equals(METHOD_MOVE)) { doMove(req, resp); } else if (method.equals(METHOD_LOCK)) { doLock(req, resp); } else if (method.equals(METHOD_UNLOCK)) { doUnlock(req, resp); } else { // DefaultServlet processing super.service(req, resp); } } @Override protected boolean checkIfHeaders(HttpServletRequest request, HttpServletResponse response, WebResource resource) throws IOException { // Skip regular HTTP evaluation for a null resource if (resource != null && !super.checkIfHeaders(request, response, resource)) { return false; } // Process the WebDAV If header using Apache Jackrabbit code String ifHeaderValue = request.getHeader("If"); if (ifHeaderValue != null) { WebdavIfHeader ifHeader = new WebdavIfHeader(getUriPrefix(request), ifHeaderValue); if (!ifHeader.hasValue()) { // Allow bad if syntax, will only be used for lock tokens return !strictIfProcessing; } String path = getRelativePath(request); // Get all hrefs from the if header Iterator hrefs = ifHeader.getResources(); String currentPath = null; String currentHref = null; WebResource currentWebResource = null; if (hrefs.hasNext()) { currentHref = hrefs.next(); currentPath = getPathFromHref(currentHref, request); currentWebResource = resources.getResource(currentPath); } else { currentPath = path; currentHref = getEncodedPath(path, resource, request); currentWebResource = resource; } // Iterate over all resources do { boolean exists = currentWebResource != null && currentWebResource.exists(); String eTag = exists ? generateETag(currentWebResource) : ""; // Collect all locks active on resource ArrayList lockTokens = new ArrayList<>(); // No lock evaluation for non existing paths in strict mode // Problem: when doing a put with a locked parent folder, need to submit a tagged production with // the parent path and the token, simply submitting the token in the if would fail the precondition. if (!strictIfProcessing || exists) { String parentPath = currentPath; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else { if ((parentPath != currentPath && parentLock.depth > 0) || parentPath == currentPath) { if (parentLock.isExclusive()) { lockTokens.add(LOCK_SCHEME + parentLock.token); } else { for (String token : parentLock.sharedTokens) { if (sharedLocks.get(token) == null) { parentLock.sharedTokens.remove(token); } } if (parentLock.sharedTokens.isEmpty()) { resourceLocks.remove(parentLock.path); } for (String token : parentLock.sharedTokens) { LockInfo sharedLock = sharedLocks.get(token); if (sharedLock != null) { if ((parentPath != currentPath && sharedLock.depth > 0) || parentPath == currentPath) { lockTokens.add(LOCK_SCHEME + token); } } } } } } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); } // Evaluation if (ifHeader.matches(currentHref, lockTokens, eTag)) { return true; } if (hrefs.hasNext()) { currentHref = hrefs.next(); currentPath = getPathFromHref(currentHref, request); currentWebResource = resources.getResource(currentPath); } else { break; } } while (true); return false; } return true; } /** * Override the DefaultServlet implementation and only use the PathInfo. If the ServletPath is non-null, it will be * because the WebDAV servlet has been mapped to a url other than /* to configure editing at different url than * normal viewing. * * @param request The servlet request we are processing * @param allowEmptyPath Used only to identify a call from DefaultServlet, to avoid removing the trailing slash * * @return the relative path */ @Override protected String getRelativePath(HttpServletRequest request, boolean allowEmptyPath) { String pathInfo; if (request.getAttribute(RequestDispatcher.INCLUDE_REQUEST_URI) != null) { // For includes, get the info from the attributes pathInfo = (String) request.getAttribute(RequestDispatcher.INCLUDE_PATH_INFO); } else { pathInfo = request.getPathInfo(); } StringBuilder result = new StringBuilder(); if (pathInfo != null) { result.append(pathInfo); } if (result.length() == 0) { result.append('/'); } String resultString = result.toString(); if (!allowEmptyPath && resultString.length() > 1 && resultString.endsWith("/")) { resultString = resultString.substring(0, resultString.length() - 1); } return resultString; } @Override protected String getPathPrefix(final HttpServletRequest request) { // Repeat the servlet path (e.g. /webdav/) in the listing path String contextPath = request.getContextPath(); if (request.getServletPath() != null) { contextPath = contextPath + request.getServletPath(); } return contextPath; } @Override protected String determineMethodsAllowed(HttpServletRequest req) { WebResource resource = resources.getResource(getRelativePath(req)); // These methods are always allowed. They may return a 404 (not a 405) // if the resource does not exist. StringBuilder methodsAllowed = new StringBuilder("OPTIONS, GET, POST, HEAD"); if (!readOnly) { methodsAllowed.append(", DELETE"); if (!resource.isDirectory()) { methodsAllowed.append(", PUT"); } } // Trace - assume disabled unless we can prove otherwise if (req instanceof RequestFacade && ((RequestFacade) req).getAllowTrace()) { methodsAllowed.append(", TRACE"); } methodsAllowed.append(", LOCK, UNLOCK, PROPPATCH, COPY, MOVE"); if (listings) { methodsAllowed.append(", PROPFIND"); } if (!resource.exists()) { methodsAllowed.append(", MKCOL"); } return methodsAllowed.toString(); } @Override protected void doOptions(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { resp.addHeader("DAV", "1,2,3"); resp.addHeader("Allow", determineMethodsAllowed(req)); resp.addHeader("MS-Author-Via", "DAV"); } /** * PROPFIND Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws ServletException If an error occurs * @throws IOException If an IO error occurs */ protected void doPropfind(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { if (!listings) { sendNotAllowed(req, resp); return; } String path = getRelativePath(req); // Exclude any resource in the /WEB-INF and /META-INF subdirectories if (isSpecialPath(path)) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } // Properties which are to be displayed. List properties = new ArrayList<>(); // Propfind depth int depth = maxDepth; // Propfind type PropfindType type = null; String depthStr = req.getHeader("Depth"); if (depthStr == null) { depth = maxDepth; } else { if (depthStr.equals("0")) { depth = 0; } else if (depthStr.equals("1")) { depth = 1; } else if (depthStr.equals("infinity")) { depth = maxDepth; } else { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } if (req.getContentLengthLong() > 0 || "chunked".equalsIgnoreCase(req.getHeader("Transfer-Encoding"))) { DocumentBuilder documentBuilder = getDocumentBuilder(); try { Document document = documentBuilder.parse(new InputSource(req.getInputStream())); // Get the root element of the document Element rootElement = document.getDocumentElement(); if (!"propfind".equals(getDAVNode(rootElement))) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } NodeList childList = rootElement.getChildNodes(); for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: String nodeName = getDAVNode(currentNode); if ("prop".equals(nodeName)) { if (type != null) { // Another was already defined resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } type = PropfindType.FIND_BY_PROPERTY; NodeList propChildList = currentNode.getChildNodes(); for (int j = 0; j < propChildList.getLength(); j++) { Node currentNode2 = propChildList.item(j); switch (currentNode2.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: properties.add(currentNode2); break; } } } if ("propname".equals(nodeName)) { if (type != null) { // Another was already defined resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } type = PropfindType.FIND_PROPERTY_NAMES; } if ("allprop".equals(nodeName)) { if (type != null) { // Another was already defined resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } type = PropfindType.FIND_ALL_PROP; } break; } } } catch (SAXException | IOException e) { // Something went wrong - bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } if (type == null) { // Nothing meaningful in the propfind element resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } else { type = PropfindType.FIND_ALL_PROP; } WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } if (!resource.exists()) { resp.sendError(HttpServletResponse.SC_NOT_FOUND); return; } resp.setStatus(WebdavStatus.SC_MULTI_STATUS); resp.setContentType("text/xml; charset=UTF-8"); // Create multistatus object XMLWriter generatedXML = new XMLWriter(resp.getWriter()); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "multistatus", XMLWriter.OPENING); if (depth == 0) { propfindResource(generatedXML, getEncodedPath(path, resource, req), path, type, properties, resource.isFile(), resource.getCreation(), resource.getLastModified(), resource.getContentLength(), getServletContext().getMimeType(resource.getName()), generateETag(resource)); } else { // The stack always contains the object of the current level Deque stack = new ArrayDeque<>(); stack.addFirst(path); // Stack of the objects one level below Deque stackBelow = new ArrayDeque<>(); while ((!stack.isEmpty()) && (depth >= 0)) { String currentPath = stack.remove(); // Exclude any resource in the /WEB-INF and /META-INF subdirectories if (isSpecialPath(currentPath)) { continue; } resource = resources.getResource(currentPath); // File is in directory listing but doesn't appear to exist // Broken symlink or odd permission settings? if (resource.exists()) { propfindResource(generatedXML, getEncodedPath(currentPath, resource, req), currentPath, type, properties, resource.isFile(), resource.getCreation(), resource.getLastModified(), resource.getContentLength(), getServletContext().getMimeType(resource.getName()), generateETag(resource)); } if (resource.isDirectory() && (depth > 0)) { String[] entries = resources.list(currentPath); for (String entry : entries) { String newPath = currentPath; if (!(newPath.endsWith("/"))) { newPath += "/"; } newPath += entry; stackBelow.addFirst(newPath); } } if (stack.isEmpty()) { depth--; stack = stackBelow; stackBelow = new ArrayDeque<>(); } generatedXML.sendData(); } } generatedXML.writeElement("D", "multistatus", XMLWriter.CLOSING); generatedXML.sendData(); } /** * PROPPATCH Method. Dead properties support is a SHOULD in the specification and are not implemented. * * @param req The Servlet request * @param resp The Servlet response * * @throws ServletException If an error occurs * @throws IOException If an IO error occurs */ protected void doProppatch(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { String path = getRelativePath(req); WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } if (!resource.exists()) { resp.sendError(HttpServletResponse.SC_NOT_FOUND); return; } if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } if (isLocked(path, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return; } DocumentBuilder documentBuilder = getDocumentBuilder(); ArrayList operations = new ArrayList<>(); try { Document document = documentBuilder.parse(new InputSource(req.getInputStream())); // Get the root element of the document Element rootElement = document.getDocumentElement(); if (!"propertyupdate".equals(getDAVNode(rootElement))) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } NodeList childList = rootElement.getChildNodes(); for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: String nodeName = getDAVNode(currentNode); if ("set".equals(nodeName)) { NodeList setChildList = currentNode.getChildNodes(); for (int j = 0; j < setChildList.getLength(); j++) { Node currentNode2 = setChildList.item(j); switch (currentNode2.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: if ("prop".equals(getDAVNode(currentNode2))) { NodeList propChildList = currentNode2.getChildNodes(); Node property = null; for (int k = 0; k < propChildList.getLength(); k++) { Node currentNode3 = propChildList.item(k); switch (currentNode3.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: property = currentNode3; break; } } if (property != null) { operations .add(new ProppatchOperation(PropertyUpdateType.SET, property)); } else { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } break; } } } if ("remove".equals(nodeName)) { NodeList removeChildList = currentNode.getChildNodes(); for (int j = 0; j < removeChildList.getLength(); j++) { Node currentNode2 = removeChildList.item(j); switch (currentNode2.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: if ("prop".equals(getDAVNode(currentNode2))) { NodeList propChildList = currentNode2.getChildNodes(); Node property = null; for (int k = 0; k < propChildList.getLength(); k++) { Node currentNode3 = propChildList.item(k); switch (currentNode3.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: property = currentNode3; break; } } if (property != null) { operations.add( new ProppatchOperation(PropertyUpdateType.REMOVE, property)); } else { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } break; } } } break; } } } catch (SAXException | IOException e) { // Something went wrong - bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } store.proppatch(path, operations); resp.setStatus(WebdavStatus.SC_MULTI_STATUS); resp.setContentType("text/xml; charset=UTF-8"); // Create multistatus object XMLWriter generatedXML = new XMLWriter(resp.getWriter()); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "multistatus", XMLWriter.OPENING); generatedXML.writeElement("D", "response", XMLWriter.OPENING); // Generating href element generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(getEncodedPath(path, resource, req)); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); for (ProppatchOperation operation : operations) { generatedXML.writeElement("D", "propstat", XMLWriter.OPENING); generatedXML.writeElement("D", "prop", XMLWriter.OPENING); generatedXML.writeElement(operation.propertyNode.getPrefix(), operation.propertyNode.getNamespaceURI(), operation.propertyNode.getLocalName(), XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText("HTTP/1.1 " + String.valueOf(operation.getStatusCode()) + " "); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); if (operation.getProtectedProperty() && operation.getStatusCode() == HttpServletResponse.SC_FORBIDDEN) { generatedXML.writeElement("D", "error", XMLWriter.OPENING); generatedXML.writeElement("D", "cannot-modify-protected-property", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "error", XMLWriter.CLOSING); } generatedXML.writeElement("D", "propstat", XMLWriter.CLOSING); } generatedXML.writeElement("D", "response", XMLWriter.CLOSING); generatedXML.writeElement("D", "multistatus", XMLWriter.CLOSING); generatedXML.sendData(); } /** * MKCOL Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws ServletException If an error occurs * @throws IOException If an IO error occurs */ protected void doMkcol(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { String path = getRelativePath(req); // Exclude any resource in the /WEB-INF and /META-INF subdirectories if (isSpecialPath(path)) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } // Can't create a collection if a resource already exists at the given // path if (resource.exists()) { sendNotAllowed(req, resp); return; } if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } if (isLocked(path, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return; } if (req.getContentLengthLong() > 0) { // No support for MKCOL bodies, which are non standard resp.sendError(WebdavStatus.SC_UNSUPPORTED_MEDIA_TYPE); return; } if (resources.mkdir(path)) { resp.setStatus(WebdavStatus.SC_CREATED); } else { resp.sendError(WebdavStatus.SC_CONFLICT); } } @Override protected void doDelete(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { if (readOnly) { sendNotAllowed(req, resp); return; } String path = getRelativePath(req); deleteResource(path, req, resp); } @Override protected void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { String path = getRelativePath(req); WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } if (isLocked(path, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return; } if (resource.isDirectory()) { sendNotAllowed(req, resp); return; } super.doPut(req, resp); } /** * COPY Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws IOException If an IO error occurs */ protected void doCopy(HttpServletRequest req, HttpServletResponse resp) throws IOException { if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } String path = getRelativePath(req); copyResource(path, req, resp); } /** * MOVE Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws IOException If an IO error occurs */ protected void doMove(HttpServletRequest req, HttpServletResponse resp) throws IOException { if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } String path = getRelativePath(req); if (isLocked(path, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return; } if (copyResource(path, req, resp)) { deleteResource(path, req, resp, false); } } /** * LOCK Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws ServletException If an error occurs * @throws IOException If an IO error occurs */ protected void doLock(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } String path = getRelativePath(req); WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } LockInfo lock = new LockInfo(maxDepth); lock.principal = req.getRemoteUser(); // Parsing lock request // Parsing depth header String depthStr = req.getHeader("Depth"); if (depthStr == null) { lock.depth = maxDepth; } else { if (depthStr.equals("0")) { lock.depth = 0; } else if (depthStr.equals("infinity")) { lock.depth = maxDepth; } else { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } // Parsing timeout header int lockDuration = DEFAULT_TIMEOUT; String lockDurationStr = req.getHeader("Timeout"); if (lockDurationStr != null) { if (lockDurationStr.startsWith("Second-")) { try { lockDuration = Integer.parseInt(lockDurationStr.substring("Second-".length())); } catch (NumberFormatException e) { // Ignore } } else if (lockDurationStr.equals("Infinite")) { lockDuration = MAX_TIMEOUT; } if (lockDuration == 0) { lockDuration = DEFAULT_TIMEOUT; } if (lockDuration > MAX_TIMEOUT) { lockDuration = MAX_TIMEOUT; } } lock.expiresAt = System.currentTimeMillis() + (lockDuration * 1000); boolean lockCreation = false; Node lockInfoNode = null; if (req.getContentLengthLong() > 0 || "chunked".equalsIgnoreCase(req.getHeader("Transfer-Encoding"))) { DocumentBuilder documentBuilder = getDocumentBuilder(); try { Document document = documentBuilder.parse(new InputSource(req.getInputStream())); // Get the root element of the document Element rootElement = document.getDocumentElement(); if (!"lockinfo".equals(getDAVNode(rootElement))) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } lockInfoNode = rootElement; lockCreation = true; } catch (IOException | SAXException e) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } if (lockInfoNode != null) { // Reading lock information NodeList childList = lockInfoNode.getChildNodes(); StringWriter strWriter = null; DOMWriter domWriter = null; Node lockScopeNode = null; Node lockTypeNode = null; Node lockOwnerNode = null; for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: if ("lockscope".equals(getDAVNode(currentNode))) { lockScopeNode = currentNode; } if ("locktype".equals(getDAVNode(currentNode))) { lockTypeNode = currentNode; } if ("owner".equals(getDAVNode(currentNode))) { lockOwnerNode = currentNode; } break; } } if (lockScopeNode != null) { childList = lockScopeNode.getChildNodes(); for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: lock.scope = getDAVNode(currentNode); break; } } if (lock.scope == null) { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } else { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } if (lockTypeNode != null) { childList = lockTypeNode.getChildNodes(); for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: break; case Node.ELEMENT_NODE: lock.type = getDAVNode(currentNode); break; } } if (lock.type == null) { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } else { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } if (lockOwnerNode != null) { childList = lockOwnerNode.getChildNodes(); for (int i = 0; i < childList.getLength(); i++) { Node currentNode = childList.item(i); switch (currentNode.getNodeType()) { case Node.TEXT_NODE: lock.owner += currentNode.getNodeValue(); break; case Node.ELEMENT_NODE: strWriter = new StringWriter(); domWriter = new DOMWriter(strWriter); domWriter.print(currentNode); lock.owner += strWriter.toString(); break; } } if (lock.owner == null) { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } } else { lock.owner = ""; } } lock.path = path; if (lockCreation) { // Check if the resource or a parent is already locked String parentPath = path; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else if (parentLock.isExclusive() || lock.isExclusive()) { // A parent collection of this collection is locked resp.setStatus(WebdavStatus.SC_LOCKED); return; } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); // Generating lock id lock.token = UUID.randomUUID().toString(); if (resource.isDirectory() && lock.depth == maxDepth) { // Locking a collection (and all its member resources) // Checking if a child resource of this collection is // already locked // Note: it is likely faster in many cases to go over the full lock list than trying to go over all the // children (recursively) List lockPaths = new ArrayList<>(); for (LockInfo currentLock : resourceLocks.values()) { if (currentLock.hasExpired()) { resourceLocks.remove(currentLock.path); continue; } if ((currentLock.isExclusive() || lock.isExclusive()) && currentLock.path.startsWith(lock.path + "/")) { // A child resource of this collection is locked lockPaths.add(currentLock.lockroot); } } if (!lockPaths.isEmpty()) { // One of the child paths was locked // We generate a multistatus error report resp.setStatus(WebdavStatus.SC_MULTI_STATUS); XMLWriter generatedXML = new XMLWriter(); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "multistatus", XMLWriter.OPENING); generatedXML.writeElement("D", "response", XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(getEncodedPath(path, resource, req)); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText("HTTP/1.1 " + WebdavStatus.SC_FAILED_DEPENDENCY + " "); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "response", XMLWriter.CLOSING); for (String lockPath : lockPaths) { generatedXML.writeElement("D", "response", XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(lockPath); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText("HTTP/1.1 " + WebdavStatus.SC_LOCKED + " "); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "response", XMLWriter.CLOSING); } generatedXML.writeElement("D", "multistatus", XMLWriter.CLOSING); Writer writer = resp.getWriter(); writer.write(generatedXML.toString()); writer.close(); return; } } else { // Locking a single resource // Checking if a resource exists at this path if (!resource.exists()) { // RFC 4918 removes lock null, instead an empty file is created if (!resources.write(path, new ByteArrayInputStream(new byte[0]), false)) { resp.sendError(WebdavStatus.SC_CONFLICT); return; } else { resp.setStatus(HttpServletResponse.SC_CREATED); } } } lock.lockroot = getEncodedPath(lock.path, resource, req); if (lock.isExclusive()) { resourceLocks.put(path, lock); } else { // Checking if there is already a shared lock on this path LockInfo sharedLock = resourceLocks.get(path); if (sharedLock == null) { sharedLock = new LockInfo(maxDepth); sharedLock.scope = "shared"; sharedLock.path = path; sharedLock.lockroot = lock.lockroot; sharedLock.depth = maxDepth; resourceLocks.put(path, sharedLock); } sharedLock.sharedTokens.add(lock.token); sharedLocks.put(lock.token, lock); } // Add the Lock-Token header as by RFC 2518 8.10.1 resp.addHeader("Lock-Token", "<" + LOCK_SCHEME + lock.token + ">"); } if (!lockCreation) { String ifHeader = req.getHeader("If"); if (ifHeader == null) { // Bad request resp.sendError(WebdavStatus.SC_BAD_REQUEST); return; } LockInfo toRenew = null; String parentPath = path; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else { if ((parentPath != path && parentLock.depth > 0) || parentPath == path) { if (parentLock.isExclusive()) { if (ifHeader.contains(":" + parentLock.token + ">") && (parentLock.principal == null || parentLock.principal.equals(req.getRemoteUser()))) { toRenew = parentLock; break; } } else { for (String token : parentLock.sharedTokens) { if (ifHeader.contains(":" + token + ">")) { LockInfo sharedLock = sharedLocks.get(token); if (sharedLock != null && (sharedLock.principal == null || sharedLock.principal.equals(req.getRemoteUser()))) { if ((parentPath != path && sharedLock.depth > 0) || parentPath == path) { toRenew = sharedLock; break; } } } } } } } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); if (toRenew != null) { if (!toRenew.hasExpired()) { toRenew.expiresAt = lock.expiresAt; } else { toRenew = null; } } lock = toRenew; } // Set the status, then generate the XML response containing // the lock information XMLWriter generatedXML = new XMLWriter(); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "prop", XMLWriter.OPENING); generatedXML.writeElement("D", "lockdiscovery", XMLWriter.OPENING); if (lock != null) { lock.toXML(generatedXML); } generatedXML.writeElement("D", "lockdiscovery", XMLWriter.CLOSING); generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); resp.setContentType("text/xml; charset=UTF-8"); Writer writer = resp.getWriter(); writer.write(generatedXML.toString()); writer.close(); } /** * UNLOCK Method. * * @param req The Servlet request * @param resp The Servlet response * * @throws IOException If an IO error occurs */ protected void doUnlock(HttpServletRequest req, HttpServletResponse resp) throws IOException { if (readOnly) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return; } String path = getRelativePath(req); WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return; } String lockTokenHeader = req.getHeader("Lock-Token"); if (lockTokenHeader == null) { resp.sendError(HttpServletResponse.SC_BAD_REQUEST); return; } boolean unlocked = false; String parentPath = path; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else { if ((parentPath != path && parentLock.depth > 0) || parentPath == path) { if (parentLock.isExclusive()) { if (lockTokenHeader.contains(":" + parentLock.token + ">") && (parentLock.principal == null || parentLock.principal.equals(req.getRemoteUser()))) { resourceLocks.remove(parentPath); unlocked = true; break; } else { // No parent exclusive lock will be found unlocked = false; break; } } else { for (String token : parentLock.sharedTokens) { if (lockTokenHeader.contains(":" + token + ">")) { LockInfo lock = sharedLocks.get(token); if (lock == null) { parentLock.sharedTokens.remove(token); } else if (lock.principal == null || lock.principal.equals(req.getRemoteUser())) { // The shared lock might not have the same depth if ((parentPath != path && lock.depth > 0) || parentPath == path) { parentLock.sharedTokens.remove(token); sharedLocks.remove(token); unlocked = true; } } // Unlike the if header, this can only match one token break; } } if (parentLock.sharedTokens.isEmpty()) { resourceLocks.remove(parentPath); } } } } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); if (unlocked) { resp.setStatus(WebdavStatus.SC_NO_CONTENT); } else { sendReport(req, resp, parentPath, WebdavStatus.SC_CONFLICT, "lock-token-matches-request-uri"); } } // -------------------------------------------------------- Private Methods /** * Checks whether a given path refers to a resource under WEB-INF or META-INF. * * @param path the full path of the resource being accessed * * @return true if the resource specified is under a special path */ private boolean isSpecialPath(final String path) { return !allowSpecialPaths && (path.toUpperCase(Locale.ENGLISH).startsWith("/WEB-INF") || path.toUpperCase(Locale.ENGLISH).startsWith("/META-INF")); } private String getEncodedPath(String path, WebResource resource, HttpServletRequest request) { String href = getPathPrefix(request); if ((href.endsWith("/")) && (path.startsWith("/"))) { href += path.substring(1); } else { href += path; } if (resource != null && resource.isDirectory() && (!href.endsWith("/"))) { href += "/"; } return rewriteUrl(href); } private String getUriPrefix(HttpServletRequest request) { return request.getScheme() + "://" + request.getServerName(); } private String getPathFromHref(String href, HttpServletRequest req) { if (href == null || href.isEmpty()) { return null; } URI hrefUri; try { hrefUri = new URI(href); } catch (URISyntaxException e) { return null; } String hrefPath = hrefUri.getPath(); // Avoid path traversals if (!hrefPath.equals(RequestUtil.normalize(hrefPath))) { return null; } if (hrefUri.isAbsolute()) { if (!req.getServerName().equals(hrefUri.getHost())) { return null; } } if (hrefPath.length() > 1 && hrefPath.endsWith("/")) { hrefPath = hrefPath.substring(0, hrefPath.length() - 1); } // Verify context path String reqContextPath = getPathPrefix(req); if (!hrefPath.startsWith(reqContextPath + "/")) { return null; } // Remove context path & servlet path hrefPath = hrefPath.substring(reqContextPath.length()); if (debug > 0) { log(href + " Href path: " + hrefPath); } // Protect special subdirectories if (isSpecialPath(hrefPath)) { return null; } return hrefPath; } /** * Check to see if a resource is currently write locked. The method will look at the "If" header to make sure the * client has demonstrated knowledge of the appropriate lock tokens. * * @param path The relative path * @param req Servlet request * * @return true if the resource is locked (and no appropriate lock token has been found for at least * one of the non-shared locks which are present on the resource). */ private boolean isLocked(String path, HttpServletRequest req) { if (path == null) { path = getRelativePath(req); } String ifHeader = req.getHeader("If"); if (ifHeader == null) { ifHeader = ""; } return isLocked(path, req.getRemoteUser(), ifHeader); } /** * Check to see if a resource is currently write locked. * * @param path Path of the resource * @param principal The authenticated principal name * @param ifHeader "If" HTTP header which was included in the request * * @return true if the resource is locked (and no appropriate lock token has been found for at least * one of the non-shared locks which are present on the resource). */ private boolean isLocked(String path, String principal, String ifHeader) { boolean unmatchedSharedLock = false; // Check if the resource or a parent is already locked String parentPath = path; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else { if ((parentPath != path && parentLock.depth > 0) || parentPath == path) { if (parentLock.isExclusive()) { if (ifHeader.contains(":" + parentLock.token + ">") && (parentLock.principal == null || parentLock.principal.equals(principal))) { return false; } return true; } else { for (String token : parentLock.sharedTokens) { LockInfo lock = sharedLocks.get(token); if (lock != null) { // The shared lock might not have the same depth if ((parentPath != path && lock.depth > 0) || parentPath == path) { if (ifHeader.contains(":" + token + ">") && (lock.principal == null || lock.principal.equals(principal))) { return false; } // Since it is a shared lock, continue to look up the tree but note that there was a lock unmatchedSharedLock = true; } } } } } } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); return unmatchedSharedLock; } /** * Copy a resource. * * @param path Path of the resource to copy * @param req Servlet request * @param resp Servlet response * * @return boolean true if the copy is successful * * @throws IOException If an IO error occurs */ private boolean copyResource(String path, HttpServletRequest req, HttpServletResponse resp) throws IOException { // Check the source exists WebResource source = resources.getResource(path); if (!source.exists()) { resp.sendError(WebdavStatus.SC_NOT_FOUND); return false; } if (!checkIfHeaders(req, resp, source)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return false; } // Parsing destination header // See RFC 4918 String destinationHeader = req.getHeader("Destination"); if (destinationHeader == null || destinationHeader.isEmpty()) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return false; } URI destinationUri; try { destinationUri = new URI(destinationHeader); } catch (URISyntaxException e) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return false; } String destinationPath = destinationUri.getPath(); // Destination isn't allowed to use '.' or '..' segments if (!destinationPath.equals(RequestUtil.normalize(destinationPath))) { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return false; } if (destinationUri.isAbsolute()) { // Scheme and host need to match if (!req.getScheme().equals(destinationUri.getScheme()) || !req.getServerName().equals(destinationUri.getHost())) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } // Port needs to match too but handled separately as the logic is a // little more complicated if (req.getServerPort() != destinationUri.getPort()) { if (destinationUri.getPort() == -1 && ("http".equals(req.getScheme()) && req.getServerPort() == 80 || "https".equals(req.getScheme()) && req.getServerPort() == 443)) { // All good. } else { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } } } if (destinationPath.length() > 1 && destinationPath.endsWith("/")) { destinationPath = destinationPath.substring(0, destinationPath.length() - 1); } // Cross-context operations aren't supported String reqContextPath = getPathPrefix(req); if (!destinationPath.startsWith(reqContextPath + "/")) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } // Remove context path & servlet path destinationPath = destinationPath.substring(reqContextPath.length()); if (debug > 0) { log("Dest path: " + destinationPath); } // Check destination path to protect special subdirectories if (isSpecialPath(destinationPath)) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } if (destinationPath.equals(path)) { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } // Check src / dest are not sub-dirs of each other if (destinationPath.startsWith(path) && destinationPath.charAt(path.length()) == '/' || path.startsWith(destinationPath) && path.charAt(destinationPath.length()) == '/') { resp.sendError(WebdavStatus.SC_FORBIDDEN); return false; } // Check if destination is locked if (isLocked(destinationPath, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return false; } boolean overwrite = true; String overwriteHeader = req.getHeader("Overwrite"); if (overwriteHeader != null) { if (overwriteHeader.equalsIgnoreCase("T")) { overwrite = true; } else { overwrite = false; } } // Overwriting the destination WebResource destination = resources.getResource(destinationPath); if (overwrite) { // Delete destination resource, if it exists if (destination.exists()) { if (!deleteResource(destinationPath, req, resp, true)) { return false; } } else { resp.setStatus(WebdavStatus.SC_CREATED); } } else { // If the destination exists, then it's a conflict if (destination.exists()) { resp.sendError(WebdavStatus.SC_PRECONDITION_FAILED); return false; } } // Copying source to destination Map errorList = new LinkedHashMap<>(); boolean infiniteCopy = true; String depthHeader = req.getHeader("Depth"); if (depthHeader != null) { if (depthHeader.equals("infinity")) { // NO-OP - this is the default } else if (depthHeader.equals("0")) { infiniteCopy = false; } else { resp.sendError(WebdavStatus.SC_BAD_REQUEST); return false; } } boolean result = copyResource(errorList, path, destinationPath, infiniteCopy); if ((!result) || (!errorList.isEmpty())) { if (errorList.size() == 1) { resp.sendError(errorList.values().iterator().next().intValue()); } else { sendReport(req, resp, errorList); } return false; } // Copy was successful if (destination.exists()) { resp.setStatus(WebdavStatus.SC_NO_CONTENT); } else { resp.setStatus(WebdavStatus.SC_CREATED); } return true; } /** * Copy a collection. * * @param errorList Map containing the list of errors which occurred during the copy operation * @param source Path of the resource to be copied * @param dest Destination path * @param infiniteCopy {@code true} if this copy is to be an infinite copy, otherwise {@code false} for a shallow * copy * * @return true if the copy was successful */ private boolean copyResource(Map errorList, String source, String dest, boolean infiniteCopy) { if (debug > 1) { log("Copy: " + source + " To: " + dest + " Infinite: " + infiniteCopy); } WebResource sourceResource = resources.getResource(source); if (sourceResource.isDirectory()) { if (!resources.mkdir(dest)) { WebResource destResource = resources.getResource(dest); if (!destResource.isDirectory()) { errorList.put(dest, Integer.valueOf(WebdavStatus.SC_CONFLICT)); return false; } } else { store.copy(source, dest); } if (infiniteCopy) { String[] entries = resources.list(source); for (String entry : entries) { String childDest = dest; if (!childDest.equals("/")) { childDest += "/"; } childDest += entry; String childSrc = source; if (!childSrc.equals("/")) { childSrc += "/"; } childSrc += entry; copyResource(errorList, childSrc, childDest, true); } } } else if (sourceResource.isFile()) { WebResource destResource = resources.getResource(dest); if (!destResource.exists() && !destResource.getWebappPath().endsWith("/")) { int lastSlash = destResource.getWebappPath().lastIndexOf('/'); if (lastSlash > 0) { String parent = destResource.getWebappPath().substring(0, lastSlash); WebResource parentResource = resources.getResource(parent); if (!parentResource.isDirectory()) { errorList.put(source, Integer.valueOf(WebdavStatus.SC_CONFLICT)); return false; } } } // WebDAV Litmus test attempts to copy/move a file over a collection // Need to remove trailing / from destination to enable test to pass if (!destResource.exists() && dest.endsWith("/") && dest.length() > 1) { // Convert destination name from collection (with trailing '/') // to file (without trailing '/') dest = dest.substring(0, dest.length() - 1); } try (InputStream is = sourceResource.getInputStream()) { if (!resources.write(dest, is, false)) { errorList.put(source, Integer.valueOf(WebdavStatus.SC_INTERNAL_SERVER_ERROR)); return false; } else { store.copy(source, dest); } } catch (IOException e) { log(sm.getString("webdavservlet.inputstreamclosefail", source), e); } } else { errorList.put(source, Integer.valueOf(WebdavStatus.SC_INTERNAL_SERVER_ERROR)); return false; } return true; } /** * Delete a resource. * * @param path Path of the resource which is to be deleted * @param req Servlet request * @param resp Servlet response * * @return true if the delete is successful * * @throws IOException If an IO error occurs */ private boolean deleteResource(String path, HttpServletRequest req, HttpServletResponse resp) throws IOException { WebResource resource = resources.getResource(path); if (!checkIfHeaders(req, resp, resource)) { resp.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED); return false; } return deleteResource(path, req, resp, true); } /** * Delete a resource. * * @param path Path of the resource which is to be deleted * @param req Servlet request * @param resp Servlet response * @param setStatus Should the response status be set on successful completion * * @return true if the delete is successful * * @throws IOException If an IO error occurs */ private boolean deleteResource(String path, HttpServletRequest req, HttpServletResponse resp, boolean setStatus) throws IOException { if (isLocked(path, req)) { resp.sendError(WebdavStatus.SC_LOCKED); return false; } WebResource resource = resources.getResource(path); if (!resource.exists()) { resp.sendError(WebdavStatus.SC_NOT_FOUND); return false; } if (!resource.isDirectory()) { if (!resource.delete()) { sendNotAllowed(req, resp); return false; } deletedResource(path); } else { Map errorList = new LinkedHashMap<>(); deleteCollection(req, path, errorList); if (!resource.delete()) { /* * See RFC 4918, section 9.6.1, last paragraph. * * If a child resource can't be deleted then the parent resource SHOULD NOT be included in the * multi-status response since the notice of the failure to delete the child implies that all parent * resources could also not be deleted. */ if (resources.list(path).length == 0) { /* * The resource could not be deleted. If the resource is a directory and it has no children (or all * those children have been successfully deleted) then it should be listed in the multi-status * response. */ errorList.put(path, Integer.valueOf(WebdavStatus.SC_METHOD_NOT_ALLOWED)); } } else { deletedResource(path); } if (!errorList.isEmpty()) { sendReport(req, resp, errorList); return false; } } if (setStatus) { resp.setStatus(WebdavStatus.SC_NO_CONTENT); } return true; } /** * Deletes a collection. * * @param req The Servlet request * @param path Path to the collection to be deleted * @param errorList Contains the list of the errors which occurred */ private void deleteCollection(HttpServletRequest req, String path, Map errorList) { if (debug > 1) { log("Delete collection: " + path); } // Prevent deletion of special subdirectories if (isSpecialPath(path)) { errorList.put(path, Integer.valueOf(WebdavStatus.SC_FORBIDDEN)); return; } String ifHeader = req.getHeader("If"); if (ifHeader == null) { ifHeader = ""; } String[] entries = resources.list(path); for (String entry : entries) { String childName = path; if (!childName.equals("/")) { childName += "/"; } childName += entry; if (isLocked(childName, req.getRemoteUser(), ifHeader)) { errorList.put(childName, Integer.valueOf(WebdavStatus.SC_LOCKED)); } else { WebResource childResource = resources.getResource(childName); if (childResource.isDirectory()) { deleteCollection(req, childName, errorList); } if (!childResource.delete()) { /* * See RFC 4918, section 9.6.1, last paragraph. * * If a child resource can't be deleted then the parent resource SHOULD NOT be included in the * multi-status response since the notice of the failure to delete the child implies that all parent * resources could also not be deleted. */ if (!childResource.isDirectory() || resources.list(childName).length == 0) { /* * The resource could not be deleted. If the resource is not a directory or if the resource is a * directory and it has no children (or all those children have been successfully deleted) then * it should be listed in the multi-status response. */ errorList.put(childName, Integer.valueOf(WebdavStatus.SC_METHOD_NOT_ALLOWED)); } } else { deletedResource(childName); } } } } private void deletedResource(String path) { LockInfo lock = resourceLocks.remove(path); if (lock != null && !lock.isExclusive()) { for (String token : lock.sharedTokens) { sharedLocks.remove(token); } } store.delete(path); } /** * Send a multistatus element containing a complete error report to the client. * * @param req Servlet request * @param resp Servlet response * @param errorList List of error to be displayed * * @throws IOException If an IO error occurs */ private void sendReport(HttpServletRequest req, HttpServletResponse resp, Map errorList) throws IOException { resp.setStatus(WebdavStatus.SC_MULTI_STATUS); XMLWriter generatedXML = new XMLWriter(); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "multistatus", XMLWriter.OPENING); for (Map.Entry errorEntry : errorList.entrySet()) { String errorPath = errorEntry.getKey(); int errorCode = errorEntry.getValue().intValue(); generatedXML.writeElement("D", "response", XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(getEncodedPath(errorPath, null, req)); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText("HTTP/1.1 " + errorCode + " "); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "response", XMLWriter.CLOSING); } generatedXML.writeElement("D", "multistatus", XMLWriter.CLOSING); Writer writer = resp.getWriter(); writer.write(generatedXML.toString()); writer.close(); } private void sendReport(HttpServletRequest req, HttpServletResponse resp, String errorPath, int errorCode, String error) throws IOException { resp.setStatus(errorCode); XMLWriter generatedXML = new XMLWriter(); generatedXML.writeXMLHeader(); generatedXML.writeElement("D", DEFAULT_NAMESPACE, "error", XMLWriter.OPENING); if (errorPath != null && errorPath.length() > 0) { generatedXML.writeElement("D", error, XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(getEncodedPath(errorPath, null, req)); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", error, XMLWriter.CLOSING); } else { generatedXML.writeElement("D", error, XMLWriter.NO_CONTENT); } generatedXML.writeElement("D", "error", XMLWriter.CLOSING); Writer writer = resp.getWriter(); writer.write(generatedXML.toString()); writer.close(); } private void propfindResource(XMLWriter generatedXML, String rewrittenUrl, String path, PropfindType propFindType, List properties, boolean isFile, long created, long lastModified, long contentLength, String contentType, String eTag) { generatedXML.writeElement("D", "response", XMLWriter.OPENING); String status = "HTTP/1.1 " + WebdavStatus.SC_OK + " "; // Generating href element generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(rewrittenUrl); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); String resourceName = path; int lastSlash = path.lastIndexOf('/'); if (lastSlash != -1) { resourceName = resourceName.substring(lastSlash + 1); } switch (propFindType) { case FIND_ALL_PROP: generatedXML.writeElement("D", "propstat", XMLWriter.OPENING); generatedXML.writeElement("D", "prop", XMLWriter.OPENING); generatedXML.writeProperty("D", "creationdate", getISOCreationDate(created)); generatedXML.writeProperty("D", "getlastmodified", FastHttpDateFormat.formatDate(lastModified)); if (isFile) { generatedXML.writeProperty("D", "getcontentlength", Long.toString(contentLength)); if (contentType != null) { generatedXML.writeProperty("D", "getcontenttype", contentType); } generatedXML.writeProperty("D", "getetag", eTag); generatedXML.writeElement("D", "resourcetype", XMLWriter.NO_CONTENT); } else { generatedXML.writeElement("D", "resourcetype", XMLWriter.OPENING); generatedXML.writeElement("D", "collection", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "resourcetype", XMLWriter.CLOSING); } store.propfind(path, null, false, generatedXML); generatedXML.writeElement("D", "supportedlock", XMLWriter.OPENING); generatedXML.writeRaw(SUPPORTED_LOCKS); generatedXML.writeElement("D", "supportedlock", XMLWriter.CLOSING); generateLockDiscovery(path, generatedXML); generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText(status); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "propstat", XMLWriter.CLOSING); break; case FIND_PROPERTY_NAMES: generatedXML.writeElement("D", "propstat", XMLWriter.OPENING); generatedXML.writeElement("D", "prop", XMLWriter.OPENING); generatedXML.writeElement("D", "creationdate", XMLWriter.NO_CONTENT); if (isFile) { generatedXML.writeElement("D", "getcontentlength", XMLWriter.NO_CONTENT); if (contentType != null) { generatedXML.writeElement("D", "getcontenttype", XMLWriter.NO_CONTENT); } generatedXML.writeElement("D", "getetag", XMLWriter.NO_CONTENT); } generatedXML.writeElement("D", "getlastmodified", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "resourcetype", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "lockdiscovery", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "supportedlock", XMLWriter.NO_CONTENT); store.propfind(path, null, true, generatedXML); generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText(status); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "propstat", XMLWriter.CLOSING); break; case FIND_BY_PROPERTY: List propertiesNotFound = new ArrayList<>(); // Parse the list of properties generatedXML.writeElement("D", "propstat", XMLWriter.OPENING); generatedXML.writeElement("D", "prop", XMLWriter.OPENING); for (Node propertyNode : properties) { String property = getDAVNode(propertyNode); boolean protectedProperty = property != null && (!(property.equals("displayname") || property.equals("getcontentlanguage"))); if (property == null || !protectedProperty) { if (!store.propfind(path, propertyNode, false, generatedXML)) { propertiesNotFound.add(propertyNode); } } else if (property.equals("creationdate")) { generatedXML.writeProperty("D", "creationdate", getISOCreationDate(created)); } else if (property.equals("getcontentlength")) { if (isFile) { generatedXML.writeProperty("D", "getcontentlength", Long.toString(contentLength)); } else { propertiesNotFound.add(propertyNode); } } else if (property.equals("getcontenttype")) { if (isFile && contentType != null) { generatedXML.writeProperty("D", "getcontenttype", contentType); } else { propertiesNotFound.add(propertyNode); } } else if (property.equals("getetag")) { if (isFile) { generatedXML.writeProperty("D", "getetag", eTag); } else { propertiesNotFound.add(propertyNode); } } else if (property.equals("getlastmodified")) { generatedXML.writeProperty("D", "getlastmodified", FastHttpDateFormat.formatDate(lastModified)); } else if (property.equals("resourcetype")) { if (isFile) { generatedXML.writeElement("D", "resourcetype", XMLWriter.NO_CONTENT); } else { generatedXML.writeElement("D", "resourcetype", XMLWriter.OPENING); generatedXML.writeElement("D", "collection", XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "resourcetype", XMLWriter.CLOSING); } } else if (property.equals("supportedlock")) { generatedXML.writeElement("D", "supportedlock", XMLWriter.OPENING); generatedXML.writeRaw(SUPPORTED_LOCKS); generatedXML.writeElement("D", "supportedlock", XMLWriter.CLOSING); } else if (property.equals("lockdiscovery")) { generateLockDiscovery(path, generatedXML); } else { propertiesNotFound.add(propertyNode); } } generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText(status); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "propstat", XMLWriter.CLOSING); if (!propertiesNotFound.isEmpty()) { status = "HTTP/1.1 " + WebdavStatus.SC_NOT_FOUND + " "; generatedXML.writeElement("D", "propstat", XMLWriter.OPENING); generatedXML.writeElement("D", "prop", XMLWriter.OPENING); for (Node propertyNotFoundNode : propertiesNotFound) { String propertyNotFound = getDAVNode(propertyNotFoundNode); if (propertyNotFound != null) { generatedXML.writeElement("D", propertyNotFound, XMLWriter.NO_CONTENT); } else { generatedXML.writeElement(null, propertyNotFoundNode.getNamespaceURI(), propertyNotFoundNode.getLocalName(), XMLWriter.NO_CONTENT); } } generatedXML.writeElement("D", "prop", XMLWriter.CLOSING); generatedXML.writeElement("D", "status", XMLWriter.OPENING); generatedXML.writeText(status); generatedXML.writeElement("D", "status", XMLWriter.CLOSING); generatedXML.writeElement("D", "propstat", XMLWriter.CLOSING); } break; } generatedXML.writeElement("D", "response", XMLWriter.CLOSING); } /** * Print the lock discovery information associated with a path. * * @param path Path * @param generatedXML XML data to which the locks info will be appended */ private void generateLockDiscovery(String path, XMLWriter generatedXML) { generatedXML.writeElement("D", "lockdiscovery", XMLWriter.OPENING); String parentPath = path; do { LockInfo parentLock = resourceLocks.get(parentPath); if (parentLock != null) { if (parentLock.hasExpired()) { resourceLocks.remove(parentPath); } else { if ((parentPath != path && parentLock.depth > 0) || parentPath == path) { if (parentLock.isExclusive()) { parentLock.toXML(generatedXML); } else { for (String lockToken : parentLock.sharedTokens) { LockInfo sharedLock = sharedLocks.get(lockToken); if (sharedLock != null) { if (sharedLock.hasExpired()) { sharedLocks.remove(lockToken); } else { if ((parentPath != path && sharedLock.depth > 0) || parentPath == path) { sharedLock.toXML(generatedXML); } } } } } } } } int slash = parentPath.lastIndexOf('/'); if (slash < 0) { break; } parentPath = parentPath.substring(0, slash); } while (true); generatedXML.writeElement("D", "lockdiscovery", XMLWriter.CLOSING); } /** * Get creation date in ISO format. * * @return the formatted creation date */ private static String getISOCreationDate(long creationDate) { return creationDateFormat.format(new Date(creationDate)); } private static String getDAVNode(Node node) { if (DEFAULT_NAMESPACE.equals(node.getNamespaceURI())) { return node.getLocalName(); } return null; } private static boolean propertyEquals(Node node1, Node node2) { if (node1.getLocalName().equals(node2.getLocalName()) && ((node1.getNamespaceURI() == null && node2.getNamespaceURI() == null) || (node1.getNamespaceURI() != null && node1.getNamespaceURI().equals(node2.getNamespaceURI())))) { return true; } return false; } // -------------------------------------------------- LockInfo Inner Class /** * Holds a lock information. */ private static class LockInfo implements Serializable { private static final long serialVersionUID = 1L; LockInfo(int maxDepth) { this.maxDepth = maxDepth; } // ------------------------------------------------- Instance Variables private final int maxDepth; String path = "/"; String lockroot = "/"; String type = "write"; String scope = "exclusive"; int depth = 0; String owner = ""; String token = ""; List sharedTokens = new CopyOnWriteArrayList<>(); long expiresAt = 0; String principal = null; // ----------------------------------------------------- Public Methods @Override public String toString() { StringBuilder result = new StringBuilder("Type:"); result.append(type); result.append("\nScope:"); result.append(scope); result.append("\nDepth:"); result.append(depth); result.append("\nOwner:"); result.append(owner); result.append("\nExpiration:"); result.append(FastHttpDateFormat.formatDate(expiresAt)); result.append("\nToken:"); result.append(token); result.append("\n"); return result.toString(); } /** * @return true if the lock has expired. */ public boolean hasExpired() { return sharedTokens.size() == 0 && System.currentTimeMillis() > expiresAt; } /** * @return true if the lock is exclusive. */ public boolean isExclusive() { return scope.equals("exclusive"); } /** * Get an XML representation of this lock token. * * @param generatedXML The XML write to which the fragment will be appended */ public void toXML(XMLWriter generatedXML) { generatedXML.writeElement("D", "activelock", XMLWriter.OPENING); generatedXML.writeElement("D", "locktype", XMLWriter.OPENING); generatedXML.writeElement("D", type, XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "locktype", XMLWriter.CLOSING); generatedXML.writeElement("D", "lockscope", XMLWriter.OPENING); generatedXML.writeElement("D", scope, XMLWriter.NO_CONTENT); generatedXML.writeElement("D", "lockscope", XMLWriter.CLOSING); generatedXML.writeElement("D", "depth", XMLWriter.OPENING); if (depth == maxDepth) { generatedXML.writeText("Infinity"); } else { generatedXML.writeText("0"); } generatedXML.writeElement("D", "depth", XMLWriter.CLOSING); generatedXML.writeElement("D", "owner", XMLWriter.OPENING); generatedXML.writeText(owner); generatedXML.writeElement("D", "owner", XMLWriter.CLOSING); generatedXML.writeElement("D", "timeout", XMLWriter.OPENING); long timeout = (expiresAt - System.currentTimeMillis()) / 1000; generatedXML.writeText("Second-" + timeout); generatedXML.writeElement("D", "timeout", XMLWriter.CLOSING); generatedXML.writeElement("D", "lockroot", XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(lockroot); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", "lockroot", XMLWriter.CLOSING); generatedXML.writeElement("D", "locktoken", XMLWriter.OPENING); generatedXML.writeElement("D", "href", XMLWriter.OPENING); generatedXML.writeText(LOCK_SCHEME + token); generatedXML.writeElement("D", "href", XMLWriter.CLOSING); generatedXML.writeElement("D", "locktoken", XMLWriter.CLOSING); generatedXML.writeElement("D", "activelock", XMLWriter.CLOSING); } } // --------------------------------------------- WebdavResolver Inner Class /** * Work around for XML parsers that don't fully respect * {@link DocumentBuilderFactory#setExpandEntityReferences(boolean)} when called with false. External * references are filtered out for security reasons. See CVE-2007-5461. */ private static class WebdavResolver implements EntityResolver { private ServletContext context; WebdavResolver(ServletContext theContext) { context = theContext; } @Override public InputSource resolveEntity(String publicId, String systemId) { context.log(sm.getString("webdavservlet.externalEntityIgnored", publicId, systemId)); return new InputSource(new StringReader("Ignored external entity")); } } // ------------------------------------- TransientPropertyStore Inner Class /** * Default property store, which provides memory storage without persistence. */ private class MemoryPropertyStore implements PropertyStore { private final ConcurrentHashMap> deadProperties = new ConcurrentHashMap<>(); @Override public void init() { } @Override public void destroy() { } @Override public void periodicEvent() { } @Override public void copy(String source, String destination) { ArrayList properties = deadProperties.get(source); ArrayList propertiesDest = deadProperties.get(destination); if (properties != null) { if (propertiesDest == null) { propertiesDest = new ArrayList<>(); deadProperties.put(destination, propertiesDest); } synchronized (properties) { synchronized (propertiesDest) { for (Node node : properties) { node = node.cloneNode(true); boolean found = false; for (int i = 0; i < propertiesDest.size(); i++) { Node propertyNode = propertiesDest.get(i); if (propertyEquals(node, propertyNode)) { found = true; propertiesDest.set(i, node); break; } } if (!found) { propertiesDest.add(node); } } } } } } @Override public void delete(String resource) { deadProperties.remove(resource); } @Override public boolean propfind(String resource, Node property, boolean nameOnly, XMLWriter generatedXML) { ArrayList properties = deadProperties.get(resource); if (properties != null) { synchronized (properties) { if (nameOnly) { // Add the names of all properties for (Node node : properties) { generatedXML.writeElement(null, node.getNamespaceURI(), node.getLocalName(), XMLWriter.NO_CONTENT); } } else if (property != null) { // Add a single property Node foundNode = null; for (Node node : properties) { if (propertyEquals(node, property)) { foundNode = node; } } if (foundNode != null) { StringWriter strWriter = new StringWriter(); DOMWriter domWriter = new DOMWriter(strWriter); domWriter.print(foundNode); generatedXML.writeRaw(strWriter.toString()); return true; } } else { StringWriter strWriter = new StringWriter(); DOMWriter domWriter = new DOMWriter(strWriter); // Add all properties for (Node node : properties) { domWriter.print(node); } generatedXML.writeRaw(strWriter.toString()); } } } return false; } @Override public void proppatch(String resource, ArrayList operations) { boolean protectedProperty = false; // Check for the protected properties for (ProppatchOperation operation : operations) { if (operation.getProtectedProperty()) { protectedProperty = true; operation.setStatusCode(HttpServletResponse.SC_FORBIDDEN); } } if (protectedProperty) { for (ProppatchOperation operation : operations) { if (!operation.getProtectedProperty()) { operation.setStatusCode(WebdavStatus.SC_FAILED_DEPENDENCY); } } } else { ArrayList properties = deadProperties.get(resource); if (properties == null) { properties = new ArrayList<>(); deadProperties.put(resource, properties); } synchronized (properties) { for (ProppatchOperation operation : operations) { if (operation.getUpdateType() == PropertyUpdateType.SET) { Node node = operation.getPropertyNode().cloneNode(true); boolean found = false; for (int i = 0; i < properties.size(); i++) { Node propertyNode = properties.get(i); if (propertyEquals(node, propertyNode)) { found = true; properties.set(i, node); break; } } if (!found) { properties.add(node); } } if (operation.getUpdateType() == PropertyUpdateType.REMOVE) { Node node = operation.getPropertyNode(); for (int i = 0; i < properties.size(); i++) { Node propertyNode = properties.get(i); if (propertyEquals(node, propertyNode)) { properties.remove(i); break; } } } } } } } } } // -------------------------------------------------------- WebdavStatus Class /** * Wraps the HttpServletResponse class to abstract the specific protocol used. To support other protocols we would only * need to modify this class and the WebDavRetCode classes. * * @author Marc Eaddy */ class WebdavStatus { // ------------------------------------------------------ HTTP Status Codes /** * Status code (200) indicating the request succeeded normally. */ public static final int SC_OK = HttpServletResponse.SC_OK; /** * Status code (201) indicating the request succeeded and created a new resource on the server. */ public static final int SC_CREATED = HttpServletResponse.SC_CREATED; /** * Status code (202) indicating that a request was accepted for processing, but was not completed. */ public static final int SC_ACCEPTED = HttpServletResponse.SC_ACCEPTED; /** * Status code (204) indicating that the request succeeded but that there was no new information to return. */ public static final int SC_NO_CONTENT = HttpServletResponse.SC_NO_CONTENT; /** * Status code (301) indicating that the resource has permanently moved to a new location, and that future * references should use a new URI with their requests. */ public static final int SC_MOVED_PERMANENTLY = HttpServletResponse.SC_MOVED_PERMANENTLY; /** * Status code (302) indicating that the resource has temporarily moved to another location, but that future * references should still use the original URI to access the resource. */ public static final int SC_MOVED_TEMPORARILY = HttpServletResponse.SC_MOVED_TEMPORARILY; /** * Status code (304) indicating that a conditional GET operation found that the resource was available and not * modified. */ public static final int SC_NOT_MODIFIED = HttpServletResponse.SC_NOT_MODIFIED; /** * Status code (400) indicating the request sent by the client was syntactically incorrect. */ public static final int SC_BAD_REQUEST = HttpServletResponse.SC_BAD_REQUEST; /** * Status code (401) indicating that the request requires HTTP authentication. */ public static final int SC_UNAUTHORIZED = HttpServletResponse.SC_UNAUTHORIZED; /** * Status code (403) indicating the server understood the request but refused to fulfill it. */ public static final int SC_FORBIDDEN = HttpServletResponse.SC_FORBIDDEN; /** * Status code (404) indicating that the requested resource is not available. */ public static final int SC_NOT_FOUND = HttpServletResponse.SC_NOT_FOUND; /** * Status code (500) indicating an error inside the HTTP service which prevented it from fulfilling the request. */ public static final int SC_INTERNAL_SERVER_ERROR = HttpServletResponse.SC_INTERNAL_SERVER_ERROR; /** * Status code (501) indicating the HTTP service does not support the functionality needed to fulfill the request. */ public static final int SC_NOT_IMPLEMENTED = HttpServletResponse.SC_NOT_IMPLEMENTED; /** * Status code (502) indicating that the HTTP server received an invalid response from a server it consulted when * acting as a proxy or gateway. */ public static final int SC_BAD_GATEWAY = HttpServletResponse.SC_BAD_GATEWAY; /** * Status code (503) indicating that the HTTP service is temporarily overloaded, and unable to handle the request. */ public static final int SC_SERVICE_UNAVAILABLE = HttpServletResponse.SC_SERVICE_UNAVAILABLE; /** * Status code (100) indicating the client may continue with its request. This interim response is used to inform * the client that the initial part of the request has been received and has not yet been rejected by the server. */ public static final int SC_CONTINUE = HttpServletResponse.SC_CONTINUE; /** * Status code (405) indicating the method specified is not allowed for the resource. */ public static final int SC_METHOD_NOT_ALLOWED = HttpServletResponse.SC_METHOD_NOT_ALLOWED; /** * Status code (409) indicating that the request could not be completed due to a conflict with the current state of * the resource. */ public static final int SC_CONFLICT = HttpServletResponse.SC_CONFLICT; /** * Status code (412) indicating the precondition given in one or more of the request-header fields evaluated to * false when it was tested on the server. */ public static final int SC_PRECONDITION_FAILED = HttpServletResponse.SC_PRECONDITION_FAILED; /** * Status code (413) indicating the server is refusing to process a request because the request entity is larger * than the server is willing or able to process. */ public static final int SC_REQUEST_TOO_LONG = HttpServletResponse.SC_REQUEST_ENTITY_TOO_LARGE; /** * Status code (415) indicating the server is refusing to service the request because the entity of the request is * in a format not supported by the requested resource for the requested method. */ public static final int SC_UNSUPPORTED_MEDIA_TYPE = HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE; // -------------------------------------------- Extended WebDav status code /** * Status code (207) indicating that the response requires providing status for multiple independent operations. */ public static final int SC_MULTI_STATUS = 207; /** * Status code (422) indicating that the server understands the content type of the request but is unable to process * the contained instructions. */ public static final int SC_UNPROCESSABLE_CONTENT = HttpServletResponse.SC_UNPROCESSABLE_CONTENT; /** * Status code (420) indicating the method was not executed on a particular resource within its scope because some * part of the method's execution failed causing the entire method to be aborted. */ public static final int SC_METHOD_FAILURE = 420; /** * Status code (423) indicating the destination resource of a method is locked, and either the request did not * contain a valid Lock-Info header, or the Lock-Info header identifies a lock held by another principal. */ public static final int SC_LOCKED = 423; /** * Status code (424) indicating that another dependent operation failed. */ public static final int SC_FAILED_DEPENDENCY = 424; /** * Status code (507) indicating that the server does not have enough storage to complete the operation. */ public static final int SC_INSUFFICIENT_STORAGE = 507; }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy