2003-12-26 23:03:21 +00:00
< ? php
2003-12-27 21:29:20 +00:00
2004-08-21 06:42:38 +00:00
/**
* @ file
* API for handling file uploads and server file management .
*/
2012-11-29 20:55:21 +00:00
use Drupal\Core\StreamWrapper\LocalStream ;
use Drupal\Component\PhpStorage\MTimeProtectedFastFileStorage ;
2012-04-01 19:51:43 +00:00
use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException ;
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException ;
use Symfony\Component\HttpFoundation\StreamedResponse ;
2012-11-29 20:55:21 +00:00
2009-07-27 19:53:18 +00:00
/**
2012-03-10 20:20:23 +00:00
* Stream wrapper bit flags that are the basis for composite types .
2009-12-30 08:16:55 +00:00
*
2012-03-10 20:20:23 +00:00
* Note that 0x0002 is skipped , because it was the value of a constant that has
* since been removed .
*/
/**
* Stream wrapper bit flag -- a filter that matches all wrappers .
*/
const STREAM_WRAPPERS_ALL = 0x0000 ;
/**
* Stream wrapper bit flag -- refers to a local file system location .
*/
const STREAM_WRAPPERS_LOCAL = 0x0001 ;
/**
* Stream wrapper bit flag -- wrapper is readable ( almost always true ) .
*/
const STREAM_WRAPPERS_READ = 0x0004 ;
/**
* Stream wrapper bit flag -- wrapper is writeable .
*/
const STREAM_WRAPPERS_WRITE = 0x0008 ;
/**
* Stream wrapper bit flag -- exposed in the UI and potentially web accessible .
*/
const STREAM_WRAPPERS_VISIBLE = 0x0010 ;
/**
* Composite stream wrapper bit flags that are usually used as the types .
*/
/**
* Stream wrapper type flag -- not visible in the UI or accessible via web ,
* but readable and writable . E . g . the temporary directory for uploads .
*/
define ( 'STREAM_WRAPPERS_HIDDEN' , STREAM_WRAPPERS_READ | STREAM_WRAPPERS_WRITE );
/**
* Stream wrapper type flag -- hidden , readable and writeable using local files .
*/
define ( 'STREAM_WRAPPERS_LOCAL_HIDDEN' , STREAM_WRAPPERS_LOCAL | STREAM_WRAPPERS_HIDDEN );
/**
* Stream wrapper type flag -- visible , readable and writeable .
*/
define ( 'STREAM_WRAPPERS_WRITE_VISIBLE' , STREAM_WRAPPERS_READ | STREAM_WRAPPERS_WRITE | STREAM_WRAPPERS_VISIBLE );
/**
* Stream wrapper type flag -- visible and read - only .
*/
define ( 'STREAM_WRAPPERS_READ_VISIBLE' , STREAM_WRAPPERS_READ | STREAM_WRAPPERS_VISIBLE );
/**
* Stream wrapper type flag -- the default when 'type' is omitted from
* hook_stream_wrappers () . This does not include STREAM_WRAPPERS_LOCAL ,
* because PHP grants a greater trust level to local files ( for example , they
* can be used in an " include " statement , regardless of the " allow_url_include "
* setting ), so stream wrappers need to explicitly opt - in to this .
*/
define ( 'STREAM_WRAPPERS_NORMAL' , STREAM_WRAPPERS_WRITE_VISIBLE );
/**
* Stream wrapper type flag -- visible , readable and writeable using local files .
2009-07-27 19:53:18 +00:00
*/
2012-03-10 20:20:23 +00:00
define ( 'STREAM_WRAPPERS_LOCAL_NORMAL' , STREAM_WRAPPERS_LOCAL | STREAM_WRAPPERS_NORMAL );
2009-07-27 19:53:18 +00:00
2003-12-27 21:29:20 +00:00
/**
2004-01-06 19:52:14 +00:00
* @ defgroup file File interface
2003-12-27 21:29:20 +00:00
* @ {
2004-09-09 05:51:08 +00:00
* Common file handling functions .
2008-09-15 09:28:50 +00:00
*
2012-06-03 11:25:35 +00:00
* Fields on the file entity :
2009-10-13 15:46:03 +00:00
* - fid : File ID
* - uid : The { users } . uid of the user who is associated with the file .
* - filename : Name of the file with no path components . This may differ from
2008-10-09 20:07:00 +00:00
* the basename of the filepath if the file is renamed to avoid overwriting
* an existing file .
2009-10-13 15:46:03 +00:00
* - uri : URI of the file .
* - filemime : The file ' s MIME type .
* - filesize : The size of the file in bytes .
* - status : A bitmapped field indicating the status of the file . The first 8
2010-01-25 10:38:35 +00:00
* bits are reserved for Drupal core . The least significant bit indicates
2009-01-02 21:45:11 +00:00
* temporary ( 0 ) or permanent ( 1 ) . Temporary files older than
* DRUPAL_MAXIMUM_TEMP_FILE_AGE will be removed during cron runs .
2009-10-13 15:46:03 +00:00
* - timestamp : UNIX timestamp for the date the file was added to the database .
2003-12-26 23:03:21 +00:00
*/
2008-05-26 17:12:55 +00:00
/**
2009-08-17 19:14:42 +00:00
* Flag used by file_prepare_directory () -- create directory if not present .
2008-05-26 17:12:55 +00:00
*/
2011-11-29 09:56:53 +00:00
const FILE_CREATE_DIRECTORY = 1 ;
2008-05-26 17:12:55 +00:00
/**
2009-08-17 19:14:42 +00:00
* Flag used by file_prepare_directory () -- file permissions may be changed .
2008-05-26 17:12:55 +00:00
*/
2011-11-29 09:56:53 +00:00
const FILE_MODIFY_PERMISSIONS = 2 ;
2008-05-26 17:12:55 +00:00
/**
2008-09-15 09:28:50 +00:00
* Flag for dealing with existing files : Appends number until name is unique .
2008-05-26 17:12:55 +00:00
*/
2011-11-29 09:56:53 +00:00
const FILE_EXISTS_RENAME = 0 ;
2008-05-26 17:12:55 +00:00
/**
* Flag for dealing with existing files : Replace the existing file .
*/
2011-11-29 09:56:53 +00:00
const FILE_EXISTS_REPLACE = 1 ;
2008-05-26 17:12:55 +00:00
/**
* Flag for dealing with existing files : Do nothing and return FALSE .
*/
2011-11-29 09:56:53 +00:00
const FILE_EXISTS_ERROR = 2 ;
2003-12-26 23:03:21 +00:00
2007-05-30 08:08:59 +00:00
/**
2009-12-30 08:16:55 +00:00
* Indicates that the file is permanent and should not be deleted .
*
* Temporary files older than DRUPAL_MAXIMUM_TEMP_FILE_AGE will be removed
* during cron runs , but permanent files will not be removed during the file
* garbage collection process .
2008-05-26 17:12:55 +00:00
*/
2011-11-29 09:56:53 +00:00
const FILE_STATUS_PERMANENT = 1 ;
2007-05-30 08:08:59 +00:00
2009-07-27 19:53:18 +00:00
/**
2012-02-19 03:41:24 +00:00
* Provides Drupal stream wrapper registry .
2009-07-27 19:53:18 +00:00
*
* A stream wrapper is an abstraction of a file system that allows Drupal to
* use the same set of methods to access both local files and remote resources .
*
* Provide a facility for managing and querying user - defined stream wrappers
* in PHP . PHP 's internal stream_get_wrappers() doesn' t return the class
* registered to handle a stream , which we need to be able to find the handler
* for class instantiation .
*
* If a module registers a scheme that is already registered with PHP , the
* existing scheme will be unregistered and replaced with the specified class .
*
* A stream is referenced as " scheme://target " .
*
2010-10-21 12:09:41 +00:00
* The optional $filter parameter can be used to retrieve only the stream
* wrappers that are appropriate for particular usage . For example , this returns
* only stream wrappers that use local file storage :
* @ code
2012-12-27 02:55:58 +00:00
* $local_stream_wrappers = file_get_stream_wrappers ( STREAM_WRAPPERS_LOCAL );
2010-10-21 12:09:41 +00:00
* @ endcode
*
* The $filter parameter can only filter to types containing a particular flag .
* In some cases , you may want to filter to types that do not contain a
* particular flag . For example , you may want to retrieve all stream wrappers
* that are not writable , or all stream wrappers that are not local . PHP ' s
* array_diff_key () function can be used to help with this . For example , this
* returns only stream wrappers that do not use local file storage :
* @ code
2012-12-27 02:55:58 +00:00
* $remote_stream_wrappers = array_diff_key ( file_get_stream_wrappers ( STREAM_WRAPPERS_ALL ), file_get_stream_wrappers ( STREAM_WRAPPERS_LOCAL ));
2010-10-21 12:09:41 +00:00
* @ endcode
*
2010-01-26 08:29:25 +00:00
* @ param $filter
2010-10-21 12:09:41 +00:00
* ( Optional ) Filters out all types except those with an on bit for each on
* bit in $filter . For example , if $filter is STREAM_WRAPPERS_WRITE_VISIBLE ,
* which is equal to ( STREAM_WRAPPERS_READ | STREAM_WRAPPERS_WRITE |
* STREAM_WRAPPERS_VISIBLE ), then only stream wrappers with all three of these
* bits set are returned . Defaults to STREAM_WRAPPERS_ALL , which returns all
* registered stream wrappers .
2010-01-26 08:29:25 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
2010-10-21 12:09:41 +00:00
* An array keyed by scheme , with values containing an array of information
* about the stream wrapper , as returned by hook_stream_wrappers () . If $filter
* is omitted or set to STREAM_WRAPPERS_ALL , the entire Drupal stream wrapper
* registry is returned . Otherwise only the stream wrappers whose 'type'
* bitmask has an on bit for each bit specified in $filter are returned .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ see hook_stream_wrappers ()
* @ see hook_stream_wrappers_alter ()
*/
2010-01-26 08:29:25 +00:00
function file_get_stream_wrappers ( $filter = STREAM_WRAPPERS_ALL ) {
$wrappers_storage = & drupal_static ( __FUNCTION__ );
2009-07-27 19:53:18 +00:00
2010-01-26 08:29:25 +00:00
if ( ! isset ( $wrappers_storage )) {
2009-07-27 19:53:18 +00:00
$wrappers = module_invoke_all ( 'stream_wrappers' );
2010-01-26 08:29:25 +00:00
foreach ( $wrappers as $scheme => $info ) {
// Add defaults.
$wrappers [ $scheme ] += array ( 'type' => STREAM_WRAPPERS_NORMAL );
}
2009-07-27 19:53:18 +00:00
drupal_alter ( 'stream_wrappers' , $wrappers );
$existing = stream_get_wrappers ();
foreach ( $wrappers as $scheme => $info ) {
// We only register classes that implement our interface.
2012-03-10 20:20:23 +00:00
if ( in_array ( 'Drupal\Core\StreamWrapper\StreamWrapperInterface' , class_implements ( $info [ 'class' ]), TRUE )) {
2009-07-27 19:53:18 +00:00
// Record whether we are overriding an existing scheme.
if ( in_array ( $scheme , $existing , TRUE )) {
$wrappers [ $scheme ][ 'override' ] = TRUE ;
stream_wrapper_unregister ( $scheme );
}
else {
$wrappers [ $scheme ][ 'override' ] = FALSE ;
}
2010-10-21 12:09:41 +00:00
if (( $info [ 'type' ] & STREAM_WRAPPERS_LOCAL ) == STREAM_WRAPPERS_LOCAL ) {
stream_wrapper_register ( $scheme , $info [ 'class' ]);
2010-10-12 03:10:03 +00:00
}
else {
2010-10-21 12:09:41 +00:00
stream_wrapper_register ( $scheme , $info [ 'class' ], STREAM_IS_URL );
2010-10-12 03:10:03 +00:00
}
2009-07-27 19:53:18 +00:00
}
2010-01-26 08:29:25 +00:00
// Pre-populate the static cache with the filters most typically used.
$wrappers_storage [ STREAM_WRAPPERS_ALL ][ $scheme ] = $wrappers [ $scheme ];
if (( $info [ 'type' ] & STREAM_WRAPPERS_WRITE_VISIBLE ) == STREAM_WRAPPERS_WRITE_VISIBLE ) {
$wrappers_storage [ STREAM_WRAPPERS_WRITE_VISIBLE ][ $scheme ] = $wrappers [ $scheme ];
}
2009-07-27 19:53:18 +00:00
}
}
2010-01-26 08:29:25 +00:00
if ( ! isset ( $wrappers_storage [ $filter ])) {
$wrappers_storage [ $filter ] = array ();
foreach ( $wrappers_storage [ STREAM_WRAPPERS_ALL ] as $scheme => $info ) {
// Bit-wise filter.
2010-10-21 12:09:41 +00:00
if (( $info [ 'type' ] & $filter ) == $filter ) {
2010-01-26 08:29:25 +00:00
$wrappers_storage [ $filter ][ $scheme ] = $info ;
}
}
}
return $wrappers_storage [ $filter ];
2009-07-27 19:53:18 +00:00
}
/**
* Returns the stream wrapper class name for a given scheme .
*
* @ param $scheme
* Stream scheme .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* Return string if a scheme has a registered handler , or FALSE .
*/
function file_stream_wrapper_get_class ( $scheme ) {
$wrappers = file_get_stream_wrappers ();
return empty ( $wrappers [ $scheme ]) ? FALSE : $wrappers [ $scheme ][ 'class' ];
}
/**
* Returns the scheme of a URI ( e . g . a stream ) .
*
* @ param $uri
* A stream , referenced as " scheme://target " .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* A string containing the name of the scheme , or FALSE if none . For example ,
* the URI " public://example.txt " would return " public " .
2010-06-02 13:09:34 +00:00
*
* @ see file_uri_target ()
2009-07-27 19:53:18 +00:00
*/
function file_uri_scheme ( $uri ) {
2011-02-23 20:28:40 +00:00
$position = strpos ( $uri , '://' );
return $position ? substr ( $uri , 0 , $position ) : FALSE ;
2009-07-27 19:53:18 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Checks that the scheme of a stream URI is valid .
2009-07-27 19:53:18 +00:00
*
* Confirms that there is a registered stream handler for the provided scheme
* and that it is callable . This is useful if you want to confirm a valid
* scheme without creating a new instance of the registered handler .
*
* @ param $scheme
* A URI scheme , a stream is referenced as " scheme://target " .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* Returns TRUE if the string is the name of a validated stream ,
* or FALSE if the scheme does not have a registered handler .
*/
function file_stream_wrapper_valid_scheme ( $scheme ) {
2012-12-29 22:38:51 +00:00
return $scheme && class_exists ( file_stream_wrapper_get_class ( $scheme ));
2009-07-27 19:53:18 +00:00
}
2010-09-11 21:14:32 +00:00
2009-07-27 19:53:18 +00:00
/**
2012-02-19 03:41:24 +00:00
* Returns the part of a URI after the schema .
2009-07-27 19:53:18 +00:00
*
* @ param $uri
* A stream , referenced as " scheme://target " .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* A string containing the target ( path ), or FALSE if none .
* For example , the URI " public://sample/test.txt " would return
* " sample/test.txt " .
2010-06-02 13:09:34 +00:00
*
* @ see file_uri_scheme ()
2009-07-27 19:53:18 +00:00
*/
function file_uri_target ( $uri ) {
2010-08-17 16:29:16 +00:00
$data = explode ( '://' , $uri , 2 );
// Remove erroneous leading or trailing, forward-slashes and backslashes.
return count ( $data ) == 2 ? trim ( $data [ 1 ], '\/' ) : FALSE ;
2009-07-27 19:53:18 +00:00
}
2010-09-01 20:08:17 +00:00
/**
2012-02-19 03:41:24 +00:00
* Gets the default file stream implementation .
2010-09-01 20:08:17 +00:00
*
* @ return
* 'public' , 'private' or any other file scheme defined as the default .
*/
function file_default_scheme () {
return variable_get ( 'file_default_scheme' , 'public' );
}
2009-07-27 19:53:18 +00:00
/**
* Normalizes a URI by making it syntactically correct .
*
* A stream is referenced as " scheme://target " .
*
* The following actions are taken :
* - Remove trailing slashes from target
* - Trim erroneous leading slashes from target . e . g . " :/// " becomes " :// " .
*
* @ param $uri
* String reference containing the URI to normalize .
2010-07-07 01:10:35 +00:00
*
2009-08-17 19:14:42 +00:00
* @ return
* The normalized URI .
2009-07-27 19:53:18 +00:00
*/
function file_stream_wrapper_uri_normalize ( $uri ) {
$scheme = file_uri_scheme ( $uri );
2012-12-29 22:38:51 +00:00
if ( file_stream_wrapper_valid_scheme ( $scheme )) {
2009-07-27 19:53:18 +00:00
$target = file_uri_target ( $uri );
2010-06-02 13:09:34 +00:00
if ( $target !== FALSE ) {
$uri = $scheme . '://' . $target ;
}
2009-07-27 19:53:18 +00:00
}
2010-09-11 21:14:32 +00:00
else {
// The default scheme is file://
$url = 'file://' . $uri ;
}
2009-07-27 19:53:18 +00:00
return $uri ;
}
/**
2009-12-30 08:16:55 +00:00
* Returns a reference to the stream wrapper class responsible for a given URI .
2009-07-27 19:53:18 +00:00
*
* The scheme determines the stream wrapper class that should be
* used by consulting the stream wrapper registry .
*
* @ param $uri
* A stream , referenced as " scheme://target " .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* Returns a new stream wrapper object appropriate for the given URI or FALSE
* if no registered handler could be found . For example , a URI of
* " private://example.txt " would return a new private stream wrapper object
2012-03-10 20:20:23 +00:00
* ( Drupal\Core\StreamWrapper\PrivateStream ) .
2009-07-27 19:53:18 +00:00
*/
function file_stream_wrapper_get_instance_by_uri ( $uri ) {
2013-01-02 15:13:29 +00:00
if ( $scheme = file_uri_scheme ( $uri )) {
$class = file_stream_wrapper_get_class ( $scheme );
if ( class_exists ( $class )) {
$instance = new $class ();
$instance -> setUri ( $uri );
return $instance ;
}
2009-07-27 19:53:18 +00:00
}
2013-01-02 15:13:29 +00:00
return FALSE ;
2009-07-27 19:53:18 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Returns a reference to the stream wrapper class responsible for a scheme .
2009-07-27 19:53:18 +00:00
*
* This helper method returns a stream instance using a scheme . That is , the
* passed string does not contain a " :// " . For example , " public " is a scheme
* but " public:// " is a URI ( stream ) . This is because the later contains both
* a scheme and target despite target being empty .
*
* Note : the instance URI will be initialized to " scheme:// " so that you can
* make the customary method calls as if you had retrieved an instance by URI .
*
* @ param $scheme
* If the stream was " public://target " , " public " would be the scheme .
2010-07-07 01:10:35 +00:00
*
2009-07-27 19:53:18 +00:00
* @ return
* Returns a new stream wrapper object appropriate for the given $scheme .
* For example , for the public scheme a stream wrapper object
2012-03-10 20:20:23 +00:00
* ( Drupal\Core\StreamWrapper\PublicStream ) .
2009-07-27 19:53:18 +00:00
* FALSE is returned if no registered handler could be found .
*/
function file_stream_wrapper_get_instance_by_scheme ( $scheme ) {
$class = file_stream_wrapper_get_class ( $scheme );
if ( class_exists ( $class )) {
2010-06-17 13:16:57 +00:00
$instance = new $class ();
2009-07-27 19:53:18 +00:00
$instance -> setUri ( $scheme . '://' );
return $instance ;
}
else {
return FALSE ;
}
}
2003-12-26 23:03:21 +00:00
/**
2009-08-29 06:57:27 +00:00
* Creates a web - accessible URL for a stream to an external or local file .
2004-09-17 18:18:04 +00:00
*
2009-08-17 19:14:42 +00:00
* Compatibility : normal paths and stream wrappers .
2004-09-17 18:18:04 +00:00
*
2009-08-29 06:57:27 +00:00
* There are two kinds of local files :
2010-09-01 20:08:17 +00:00
* - " managed files " , i . e . those stored by a Drupal - compatible stream wrapper .
* These are files that have either been uploaded by users or were generated
* automatically ( for example through CSS aggregation ) .
2009-08-29 06:57:27 +00:00
* - " shipped files " , i . e . those outside of the files directory , which ship as
* part of Drupal core or contributed modules or themes .
*
2009-08-17 19:14:42 +00:00
* @ param $uri
2009-08-29 06:57:27 +00:00
* The URI to a file for which we need an external URL , or the path to a
* shipped file .
2010-07-07 01:10:35 +00:00
*
2008-10-09 20:07:00 +00:00
* @ return
2009-08-17 19:14:42 +00:00
* A string containing a URL that may be used to access the file .
2010-08-17 21:31:13 +00:00
* If the provided string already contains a preceding 'http' , 'https' , or
* '/' , nothing is done and the same string is returned . If a stream wrapper
* could not be found to generate an external URL , then FALSE is returned .
2012-02-19 03:41:24 +00:00
*
* @ see http :// drupal . org / node / 515192
2003-12-26 23:03:21 +00:00
*/
2009-08-17 19:14:42 +00:00
function file_create_url ( $uri ) {
2009-08-29 06:57:27 +00:00
// Allow the URI to be altered, e.g. to serve a file from a CDN or static
// file server.
drupal_alter ( 'file_url' , $uri );
2009-09-28 22:22:54 +00:00
2009-08-17 19:14:42 +00:00
$scheme = file_uri_scheme ( $uri );
if ( ! $scheme ) {
2010-05-11 10:56:04 +00:00
// Allow for:
// - root-relative URIs (e.g. /foo.jpg in http://example.com/foo.jpg)
// - protocol-relative URIs (e.g. //bar.jpg, which is expanded to
// http://example.com/bar.jpg by the browser when viewing a page over
// HTTP and to https://example.com/bar.jpg when viewing a HTTPS page)
// Both types of relative URIs are characterized by a leading slash, hence
// we can use a single check.
if ( drupal_substr ( $uri , 0 , 1 ) == '/' ) {
return $uri ;
}
else {
// If this is not a properly formatted stream, then it is a shipped file.
2010-08-17 21:31:13 +00:00
// Therefore, return the urlencoded URI with the base URL prepended.
return $GLOBALS [ 'base_url' ] . '/' . drupal_encode_path ( $uri );
2010-05-11 10:56:04 +00:00
}
2009-08-17 19:14:42 +00:00
}
elseif ( $scheme == 'http' || $scheme == 'https' ) {
2012-09-02 04:50:06 +00:00
// Check for HTTP so that we don't have to implement getExternalUrl() for
// the HTTP wrapper.
2009-08-17 19:14:42 +00:00
return $uri ;
}
else {
// Attempt to return an external URL using the appropriate wrapper.
if ( $wrapper = file_stream_wrapper_get_instance_by_uri ( $uri )) {
return $wrapper -> getExternalUrl ();
}
else {
return FALSE ;
}
}
2003-12-26 23:03:21 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Checks that the directory exists and is writable .
2008-10-09 20:07:00 +00:00
*
* Directories need to have execute permissions to be considered a directory by
* FTP servers , etc .
*
2011-05-08 19:50:38 +00:00
* @ param $directory
2009-08-17 19:14:42 +00:00
* A string reference containing the name of a directory path or URI . A
* trailing slash will be trimmed from a path .
* @ param $options
2008-10-19 20:18:58 +00:00
* A bitmask to indicate if the directory should be created if it does
* not exist ( FILE_CREATE_DIRECTORY ) or made writable if it is read - only
* ( FILE_MODIFY_PERMISSIONS ) .
2010-07-07 01:10:35 +00:00
*
2008-10-09 20:07:00 +00:00
* @ return
2009-08-17 19:14:42 +00:00
* TRUE if the directory exists ( or was created ) and is writable . FALSE
* otherwise .
2003-12-26 23:03:21 +00:00
*/
2009-08-17 19:14:42 +00:00
function file_prepare_directory ( & $directory , $options = FILE_MODIFY_PERMISSIONS ) {
if ( ! file_stream_wrapper_valid_scheme ( file_uri_scheme ( $directory ))) {
// Only trim if we're not dealing with a stream.
$directory = rtrim ( $directory , '/\\' );
}
2004-08-17 21:35:26 +00:00
// Check if directory exists.
if ( ! is_dir ( $directory )) {
2009-07-10 03:46:33 +00:00
// Let mkdir() recursively create directories and use the default directory
// permissions.
2009-08-17 19:14:42 +00:00
if (( $options & FILE_CREATE_DIRECTORY ) && @ drupal_mkdir ( $directory , NULL , TRUE )) {
return drupal_chmod ( $directory );
2004-08-17 21:35:26 +00:00
}
2009-08-17 19:14:42 +00:00
return FALSE ;
2004-08-17 21:35:26 +00:00
}
2009-08-17 19:14:42 +00:00
// The directory exists, so check to see if it is writable.
$writable = is_writable ( $directory );
if ( ! $writable && ( $options & FILE_MODIFY_PERMISSIONS )) {
return drupal_chmod ( $directory );
2004-08-17 21:35:26 +00:00
}
2009-08-17 19:14:42 +00:00
return $writable ;
2003-12-26 23:03:21 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Creates a . htaccess file in each Drupal files directory if it is missing .
2003-12-26 23:03:21 +00:00
*/
2009-08-17 19:14:42 +00:00
function file_ensure_htaccess () {
2011-08-02 00:58:40 +00:00
file_save_htaccess ( 'public://' , FALSE );
2010-04-30 01:33:17 +00:00
if ( variable_get ( 'file_private_path' , FALSE )) {
2011-08-02 00:58:40 +00:00
file_save_htaccess ( 'private://' , TRUE );
2010-04-30 01:33:17 +00:00
}
2011-08-02 00:58:40 +00:00
file_save_htaccess ( 'temporary://' , TRUE );
2012-02-13 23:11:17 +00:00
file_save_htaccess ( config_get_config_directory (), TRUE );
2003-12-26 23:03:21 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Creates a . htaccess file in the given directory .
2003-12-26 23:03:21 +00:00
*
2008-10-09 20:07:00 +00:00
* @ param $directory
2009-08-17 19:14:42 +00:00
* The directory .
* @ param $private
* FALSE indicates that $directory should be an open and public directory .
* The default is TRUE which indicates a private and protected directory .
2003-12-26 23:03:21 +00:00
*/
2011-08-02 00:58:40 +00:00
function file_save_htaccess ( $directory , $private = TRUE ) {
2009-08-17 19:14:42 +00:00
if ( file_uri_scheme ( $directory )) {
$directory = file_stream_wrapper_uri_normalize ( $directory );
2005-05-17 20:49:54 +00:00
}
else {
2009-08-17 19:14:42 +00:00
$directory = rtrim ( $directory , '/\\' );
2005-05-17 20:49:54 +00:00
}
2009-08-17 19:14:42 +00:00
$htaccess_path = $directory . '/.htaccess' ;
if ( file_exists ( $htaccess_path )) {
// Short circuit if the .htaccess file already exists.
return ;
}
if ( $private ) {
// Private .htaccess file.
2012-11-29 20:55:21 +00:00
$htaccess_lines = MTimeProtectedFastFileStorage :: HTACCESS ;
2009-08-17 19:14:42 +00:00
}
else {
// Public .htaccess file.
$htaccess_lines = " SetHandler Drupal_Security_Do_Not_Remove_See_SA_2006_006 \n Options None \n Options +FollowSymLinks " ;
}
// Write the .htaccess file.
if ( file_put_contents ( $htaccess_path , $htaccess_lines )) {
drupal_chmod ( $htaccess_path , 0444 );
}
else {
$variables = array ( '%directory' => $directory , '!htaccess' => '<br />' . nl2br ( check_plain ( $htaccess_lines )));
2011-07-04 16:58:33 +00:00
watchdog ( 'security' , " Security warning: Couldn't write .htaccess file. Please create a .htaccess file in your %directory directory which contains the following lines: <code>!htaccess</code> " , $variables , WATCHDOG_ERROR );
2003-12-26 23:03:21 +00:00
}
}
2010-09-11 21:14:32 +00:00
/**
2012-02-19 03:41:24 +00:00
* Determines whether the URI has a valid scheme for file API operations .
2010-09-11 21:14:32 +00:00
*
* There must be a scheme and it must be a Drupal - provided scheme like
* 'public' , 'private' , 'temporary' , or an extension provided with
* hook_stream_wrappers () .
*
* @ param $uri
* The URI to be tested .
*
* @ return
* TRUE if the URI is allowed .
*/
function file_valid_uri ( $uri ) {
// Assert that the URI has an allowed scheme. Barepaths are not allowed.
$uri_scheme = file_uri_scheme ( $uri );
2012-12-29 22:38:51 +00:00
if ( ! file_stream_wrapper_valid_scheme ( $uri_scheme )) {
2010-09-11 21:14:32 +00:00
return FALSE ;
}
return TRUE ;
}
2008-10-09 00:02:29 +00:00
/**
2010-08-22 13:52:59 +00:00
* Copies a file to a new location without invoking the file API .
2003-12-26 23:03:21 +00:00
*
2008-09-15 09:28:50 +00:00
* This is a powerful function that in many ways performs like an advanced
* version of copy () .
* - Checks if $source and $destination are valid and readable / writable .
* - Checks that $source is not equal to $destination ; if they are an error
* is reported .
* - If file already exists in $destination either the call will error out ,
* replace the file or rename the file based on the $replace parameter .
2011-12-20 05:50:23 +00:00
* - Provides a fallback using realpaths if the move fails using stream
* wrappers . This can occur because PHP ' s copy () function does not properly
* support streams if safe_mode or open_basedir are enabled . See
* https :// bugs . php . net / bug . php ? id = 60456
2008-09-15 09:28:50 +00:00
*
* @ param $source
2010-09-11 21:14:32 +00:00
* A string specifying the filepath or URI of the source file .
2008-09-15 09:28:50 +00:00
* @ param $destination
2010-09-11 21:14:32 +00:00
* A URI containing the destination that $source should be copied to . The
* URI may be a bare filepath ( without a scheme ) and in that case the default
* scheme ( file :// ) will be used . If this value is omitted , Drupal ' s default
* files scheme will be used , usually " public:// " .
2008-09-15 09:28:50 +00:00
* @ param $replace
* Replace behavior when the destination file already exists :
* - FILE_EXISTS_REPLACE - Replace the existing file .
* - FILE_EXISTS_RENAME - Append _ { incrementing number } until the filename is
2009-01-10 06:09:54 +00:00
* unique .
2006-07-05 11:45:51 +00:00
* - FILE_EXISTS_ERROR - Do nothing and return FALSE .
2010-07-07 01:10:35 +00:00
*
2008-09-15 09:28:50 +00:00
* @ return
* The path to the new file , or FALSE in the event of an error .
2008-10-09 20:07:00 +00:00
*
2008-10-09 00:02:29 +00:00
* @ see file_copy ()
2003-12-26 23:03:21 +00:00
*/
2008-10-09 00:02:29 +00:00
function file_unmanaged_copy ( $source , $destination = NULL , $replace = FILE_EXISTS_RENAME ) {
2009-07-07 08:59:07 +00:00
$original_source = $source ;
$original_destination = $destination ;
2009-08-17 19:14:42 +00:00
// Assert that the source file actually exists.
2008-09-15 09:28:50 +00:00
if ( ! file_exists ( $source )) {
2009-08-17 19:14:42 +00:00
// @todo Replace drupal_set_message() calls with exceptions instead.
2011-10-01 19:47:01 +00:00
drupal_set_message ( t ( 'The specified file %file could not be copied because no file by that name exists. Please check that you supplied the correct filename.' , array ( '%file' => $original_source )), 'error' );
2011-06-30 05:31:12 +00:00
if (( $realpath = drupal_realpath ( $original_source )) !== FALSE ) {
watchdog ( 'file' , 'File %file (%realpath) could not be copied because it does not exist.' , array ( '%file' => $original_source , '%realpath' => $realpath ));
}
else {
watchdog ( 'file' , 'File %file could not be copied because it does not exist.' , array ( '%file' => $original_source ));
}
2008-09-15 09:28:50 +00:00
return FALSE ;
}
2003-12-26 23:03:21 +00:00
2009-08-17 19:14:42 +00:00
// Build a destination URI if necessary.
if ( ! isset ( $destination )) {
2012-01-18 04:10:02 +00:00
$destination = file_build_uri ( drupal_basename ( $source ));
2009-08-17 19:14:42 +00:00
}
2003-12-26 23:03:21 +00:00
2009-08-17 19:14:42 +00:00
// Prepare the destination directory.
if ( file_prepare_directory ( $destination )) {
// The destination is already a directory, so append the source basename.
2012-01-18 04:10:02 +00:00
$destination = file_stream_wrapper_uri_normalize ( $destination . '/' . drupal_basename ( $source ));
2009-08-17 19:14:42 +00:00
}
else {
// Perhaps $destination is a dir/file?
$dirname = drupal_dirname ( $destination );
if ( ! file_prepare_directory ( $dirname )) {
// The destination is not valid.
2011-10-01 19:47:01 +00:00
watchdog ( 'file' , 'File %file could not be copied because the destination directory %destination is not configured correctly.' , array ( '%file' => $original_source , '%destination' => $dirname ));
drupal_set_message ( t ( 'The specified file %file could not be copied because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.' , array ( '%file' => $original_source )), 'error' );
2009-08-17 19:14:42 +00:00
return FALSE ;
}
}
2005-11-04 20:19:14 +00:00
2009-08-17 19:14:42 +00:00
// Determine whether we can perform this operation based on overwrite rules.
$destination = file_destination ( $destination , $replace );
2008-09-15 09:28:50 +00:00
if ( $destination === FALSE ) {
2010-09-11 21:14:32 +00:00
drupal_set_message ( t ( 'The file %file could not be copied because a file by that name already exists in the destination directory.' , array ( '%file' => $original_source )), 'error' );
2012-12-13 12:07:13 +00:00
watchdog ( 'file' , 'File %file could not be copied because a file by that name already exists in the destination directory (%destination)' , array ( '%file' => $original_source , '%destination' => $destination ));
2008-09-15 09:28:50 +00:00
return FALSE ;
2003-12-26 23:03:21 +00:00
}
2009-08-17 19:14:42 +00:00
// Assert that the source and destination filenames are not the same.
2011-06-30 05:31:12 +00:00
$real_source = drupal_realpath ( $source );
$real_destination = drupal_realpath ( $destination );
if ( $source == $destination || ( $real_source !== FALSE ) && ( $real_source == $real_destination )) {
2008-09-15 09:28:50 +00:00
drupal_set_message ( t ( 'The specified file %file was not copied because it would overwrite itself.' , array ( '%file' => $source )), 'error' );
2010-09-11 21:14:32 +00:00
watchdog ( 'file' , 'File %file could not be copied because it would overwrite itself.' , array ( '%file' => $source ));
2008-09-15 09:28:50 +00:00
return FALSE ;
2003-12-26 23:03:21 +00:00
}
2009-08-17 19:14:42 +00:00
// Make sure the .htaccess files are present.
file_ensure_htaccess ();
// Perform the copy operation.
2008-09-15 09:28:50 +00:00
if ( !@ copy ( $source , $destination )) {
2011-12-20 05:50:23 +00:00
// If the copy failed and realpaths exist, retry the operation using them
// instead.
if ( $real_source === FALSE || $real_destination === FALSE || !@ copy ( $real_source , $real_destination )) {
watchdog ( 'file' , 'The specified file %file could not be copied to %destination.' , array ( '%file' => $source , '%destination' => $destination ), WATCHDOG_ERROR );
return FALSE ;
}
2003-12-26 23:03:21 +00:00
}
2004-08-17 21:35:26 +00:00
2009-04-20 20:02:31 +00:00
// Set the permissions on the new file.
drupal_chmod ( $destination );
2008-09-15 09:28:50 +00:00
return $destination ;
2003-12-26 23:03:21 +00:00
}
2009-08-17 19:14:42 +00:00
/**
2012-02-19 03:41:24 +00:00
* Constructs a URI to Drupal ' s default files location given a relative path .
2009-08-17 19:14:42 +00:00
*/
function file_build_uri ( $path ) {
2010-09-01 20:08:17 +00:00
$uri = file_default_scheme () . '://' . $path ;
2009-08-17 19:14:42 +00:00
return file_stream_wrapper_uri_normalize ( $uri );
}
2007-05-30 08:08:59 +00:00
/**
2012-02-19 03:41:24 +00:00
* Determines the destination path for a file .
2007-05-30 08:08:59 +00:00
*
2008-10-09 20:07:00 +00:00
* @ param $destination
2009-08-17 19:14:42 +00:00
* A string specifying the desired final URI or filepath .
2008-10-09 20:07:00 +00:00
* @ param $replace
* Replace behavior when the destination file already exists .
2008-09-15 09:28:50 +00:00
* - FILE_EXISTS_REPLACE - Replace the existing file .
2007-05-30 08:08:59 +00:00
* - FILE_EXISTS_RENAME - Append _ { incrementing number } until the filename is
2009-01-10 06:09:54 +00:00
* unique .
2007-05-30 08:08:59 +00:00
* - FILE_EXISTS_ERROR - Do nothing and return FALSE .
2010-07-07 01:10:35 +00:00
*
2008-10-09 20:07:00 +00:00
* @ return
2009-08-17 19:14:42 +00:00
* The destination filepath , or FALSE if the file already exists
* and FILE_EXISTS_ERROR is specified .
2007-05-30 08:08:59 +00:00
*/
function file_destination ( $destination , $replace ) {
if ( file_exists ( $destination )) {
switch ( $replace ) {
2008-09-15 09:28:50 +00:00
case FILE_EXISTS_REPLACE :
// Do nothing here, we want to overwrite the existing file.
break ;
2007-05-30 08:08:59 +00:00
case FILE_EXISTS_RENAME :
2012-01-18 04:10:02 +00:00
$basename = drupal_basename ( $destination );
2009-08-17 19:14:42 +00:00
$directory = drupal_dirname ( $destination );
2007-05-30 08:08:59 +00:00
$destination = file_create_filename ( $basename , $directory );
break ;
case FILE_EXISTS_ERROR :
2009-08-11 04:50:36 +00:00
// Error reporting handled by calling function.
2007-05-30 08:08:59 +00:00
return FALSE ;
}
}
return $destination ;
}
2008-10-09 00:02:29 +00:00
/**
2012-02-19 03:41:24 +00:00
* Moves a file to a new location without database changes or hook invocation .
2004-09-17 18:18:04 +00:00
*
2008-09-15 09:28:50 +00:00
* @ param $source
2009-08-17 19:14:42 +00:00
* A string specifying the filepath or URI of the original file .
2008-09-15 09:28:50 +00:00
* @ param $destination
2010-06-20 23:53:52 +00:00
* A string containing the destination that $source should be moved to .
* This must be a stream wrapper URI . If this value is omitted , Drupal ' s
* default files scheme will be used , usually " public:// " .
2008-09-15 09:28:50 +00:00
* @ param $replace
* Replace behavior when the destination file already exists :
* - FILE_EXISTS_REPLACE - Replace the existing file .
* - FILE_EXISTS_RENAME - Append _ { incrementing number } until the filename is
2009-01-10 06:09:54 +00:00
* unique .
2006-07-05 11:45:51 +00:00
* - FILE_EXISTS_ERROR - Do nothing and return FALSE .
2010-07-07 01:10:35 +00:00
*
2008-09-15 09:28:50 +00:00
* @ return
2009-08-17 19:14:42 +00:00
* The URI of the moved file , or FALSE in the event of an error .
2008-10-09 20:07:00 +00:00
*
2008-10-09 00:02:29 +00:00
* @ see file_move ()
2004-09-17 18:18:04 +00:00
*/
2008-10-09 00:02:29 +00:00
function file_unmanaged_move ( $source , $destination = NULL , $replace = FILE_EXISTS_RENAME ) {
$filepath = file_unmanaged_copy ( $source , $destination , $replace );
if ( $filepath == FALSE || file_unmanaged_delete ( $source ) == FALSE ) {
2008-09-15 09:28:50 +00:00
return FALSE ;
2003-12-26 23:03:21 +00:00
}
2008-09-15 09:28:50 +00:00
return $filepath ;
2003-12-26 23:03:21 +00:00
}
2007-05-30 08:08:59 +00:00
/**
2012-02-19 03:41:24 +00:00
* Modifies a filename as needed for security purposes .
2008-10-09 20:07:00 +00:00
*
2010-08-08 01:37:34 +00:00
* Munging a file name prevents unknown file extensions from masking exploit
* files . When web servers such as Apache decide how to process a URL request ,
* they use the file extension . If the extension is not recognized , Apache
* skips that extension and uses the previous file extension . For example , if
* the file being requested is exploit . php . pps , and Apache does not recognize
* the '.pps' extension , it treats the file as PHP and executes it . To make
* this file name safe for Apache and prevent it from executing as PHP , the
* . php extension is " munged " into . php_ , making the safe file name
* exploit . php_ . pps .
*
* Specifically , this function adds an underscore to all extensions that are
2009-10-18 18:36:24 +00:00
* between 2 and 5 characters in length , internal to the file name , and not
2010-08-08 01:37:34 +00:00
* included in $extensions .
*
* Function behavior is also controlled by the Drupal variable
* 'allow_insecure_uploads' . If 'allow_insecure_uploads' evaluates to TRUE , no
* alterations will be made , if it evaluates to FALSE , the filename is 'munged' .
2008-10-09 20:07:00 +00:00
*
* @ param $filename
2009-10-18 18:36:24 +00:00
* File name to modify .
2008-10-09 20:07:00 +00:00
* @ param $extensions
2009-10-18 18:36:24 +00:00
* A space - separated list of extensions that should not be altered .
2008-10-09 20:07:00 +00:00
* @ param $alerts
2009-10-18 18:36:24 +00:00
* If TRUE , drupal_set_message () will be called to display a message if the
* file name was changed .
*
2008-10-09 20:07:00 +00:00
* @ return
2009-10-18 18:36:24 +00:00
* The potentially modified $filename .
2007-05-30 08:08:59 +00:00
*/
function file_munge_filename ( $filename , $extensions , $alerts = TRUE ) {
$original = $filename ;
// Allow potentially insecure uploads for very savvy users and admin
if ( ! variable_get ( 'allow_insecure_uploads' , 0 )) {
2012-12-27 02:27:47 +00:00
// Remove any null bytes. See http://php.net/manual/en/security.filesystem.nullbytes.php
$filename = str_replace ( chr ( 0 ), '' , $filename );
2007-05-30 08:08:59 +00:00
$whitelist = array_unique ( explode ( ' ' , trim ( $extensions )));
// Split the filename up by periods. The first part becomes the basename
// the last part the final extension.
$filename_parts = explode ( '.' , $filename );
$new_filename = array_shift ( $filename_parts ); // Remove file basename.
$final_extension = array_pop ( $filename_parts ); // Remove final extension.
// Loop through the middle parts of the name and add an underscore to the
// end of each section that could be a file extension but isn't in the list
// of allowed extensions.
foreach ( $filename_parts as $filename_part ) {
2008-04-14 17:48:46 +00:00
$new_filename .= '.' . $filename_part ;
2007-05-30 08:08:59 +00:00
if ( ! in_array ( $filename_part , $whitelist ) && preg_match ( " /^[a-zA-Z] { 2,5} \ d? $ / " , $filename_part )) {
$new_filename .= '_' ;
}
}
2008-04-14 17:48:46 +00:00
$filename = $new_filename . '.' . $final_extension ;
2007-05-30 08:08:59 +00:00
if ( $alerts && $original != $filename ) {
drupal_set_message ( t ( 'For security reasons, your upload has been renamed to %filename.' , array ( '%filename' => $filename )));
}
}
return $filename ;
}
/**
2012-02-19 03:41:24 +00:00
* Undoes the effect of file_munge_filename () .
2007-05-30 08:08:59 +00:00
*
2008-10-09 20:07:00 +00:00
* @ param $filename
* String with the filename to be unmunged .
2010-07-07 01:10:35 +00:00
*
2008-10-09 20:07:00 +00:00
* @ return
* An unmunged filename string .
2007-05-30 08:08:59 +00:00
*/
function file_unmunge_filename ( $filename ) {
return str_replace ( '_.' , '.' , $filename );
}
2006-03-08 23:42:55 +00:00
/**
2012-02-19 03:41:24 +00:00
* Creates a full file path from a directory and filename .
2008-10-09 20:07:00 +00:00
*
* If a file with the specified name already exists , an alternative will be
* used .
2006-03-08 23:42:55 +00:00
*
2008-10-09 20:07:00 +00:00
* @ param $basename
* String filename
* @ param $directory
2009-08-17 19:14:42 +00:00
* String containing the directory or parent URI .
2010-07-07 01:10:35 +00:00
*
2006-03-08 23:42:55 +00:00
* @ return
2008-10-09 20:07:00 +00:00
* File path consisting of $directory and a unique filename based off
* of $basename .
2006-03-08 23:42:55 +00:00
*/
2004-08-17 21:35:26 +00:00
function file_create_filename ( $basename , $directory ) {
2010-01-29 22:40:41 +00:00
// Strip control characters (ASCII value < 32). Though these are allowed in
// some filesystems, not many applications handle them well.
$basename = preg_replace ( '/[\x00-\x1F]/u' , '_' , $basename );
2010-08-17 22:05:22 +00:00
if ( substr ( PHP_OS , 0 , 3 ) == 'WIN' ) {
// These characters are not allowed in Windows filenames
$basename = str_replace ( array ( ':' , '*' , '?' , '"' , '<' , '>' , '|' ), '_' , $basename );
}
2010-01-29 22:40:41 +00:00
2009-08-17 19:14:42 +00:00
// A URI or path may already have a trailing slash or look like "public://".
if ( substr ( $directory , - 1 ) == '/' ) {
$separator = '' ;
}
else {
$separator = '/' ;
}
$destination = $directory . $separator . $basename ;
2004-08-17 21:35:26 +00:00
2008-09-15 09:28:50 +00:00
if ( file_exists ( $destination )) {
2004-08-17 21:35:26 +00:00
// Destination file already exists, generate an alternative.
2008-09-15 09:28:50 +00:00
$pos = strrpos ( $basename , '.' );
if ( $pos !== FALSE ) {
2004-08-17 21:35:26 +00:00
$name = substr ( $basename , 0 , $pos );
$ext = substr ( $basename , $pos );
}
else {
$name = $basename ;
2008-09-15 09:28:50 +00:00
$ext = '' ;
2004-08-17 21:35:26 +00:00
}
$counter = 0 ;
do {
2009-08-17 19:14:42 +00:00
$destination = $directory . $separator . $name . '_' . $counter ++ . $ext ;
2008-09-15 09:28:50 +00:00
} while ( file_exists ( $destination ));
2004-08-17 21:35:26 +00:00
}
2008-09-15 09:28:50 +00:00
return $destination ;
2004-08-17 21:35:26 +00:00
}
2006-03-08 23:42:55 +00:00
/**
2012-02-19 03:41:24 +00:00
* Deletes a file and its database record .
2008-10-09 00:02:29 +00:00
*
2012-05-22 05:28:30 +00:00
* Instead of directly deleting a file , it is strongly recommended to delete
* file usages instead . That will automatically mark the file as temporary and
* remove it during cleanup .
2008-10-09 00:02:29 +00:00
*
2012-06-03 11:25:35 +00:00
* @ param $fid
* The file id .
2008-10-09 20:07:00 +00:00
*
2008-10-09 00:02:29 +00:00
* @ see file_unmanaged_delete ()
2012-10-14 08:19:55 +00:00
* @ see file_usage () -> listUsage ()
2008-10-09 00:02:29 +00:00
*/
2012-06-03 11:25:35 +00:00
function file_delete ( $fid ) {
return file_delete_multiple ( array ( $fid ));
}
2011-12-17 12:43:37 +00:00
2012-06-03 11:25:35 +00:00
/**
* Deletes files .
*
* Instead of directly deleting a file , it is strongly recommended to delete
* file usages instead . That will automatically mark the file as temporary and
* remove it during cleanup .
*
* @ param $fid
* The file id .
*
* @ see file_unmanaged_delete ()
2012-10-14 08:19:55 +00:00
* @ see file_usage () -> listUsage ()
2012-06-03 11:25:35 +00:00
*/
function file_delete_multiple ( array $fids ) {
entity_delete_multiple ( 'file' , $fids );
2008-10-09 00:02:29 +00:00
}
/**
2012-02-19 03:41:24 +00:00
* Deletes a file without database changes or hook invocations .
2008-10-09 00:02:29 +00:00
*
* This function should be used when the file to be deleted does not have an
* entry recorded in the files table .
2006-03-08 23:42:55 +00:00
*
2008-09-15 09:28:50 +00:00
* @ param $path
2009-10-09 18:38:52 +00:00
* A string containing a file path or ( streamwrapper ) URI .
2010-07-07 01:10:35 +00:00
*
2008-09-15 09:28:50 +00:00
* @ return
* TRUE for success or path does not exist , or FALSE in the event of an
* error .
2008-10-09 20:07:00 +00:00
*
2008-10-09 00:02:29 +00:00
* @ see file_delete ()
2009-02-13 00:39:01 +00:00
* @ see file_unmanaged_delete_recursive ()
2006-03-08 23:42:55 +00:00
*/
2008-10-09 00:02:29 +00:00
function file_unmanaged_delete ( $path ) {
2008-09-15 09:28:50 +00:00
if ( is_dir ( $path )) {
2011-07-04 16:58:33 +00:00
watchdog ( 'file' , '%path is a directory and cannot be removed using file_unmanaged_delete().' , array ( '%path' => $path ), WATCHDOG_ERROR );
2008-09-15 09:28:50 +00:00
return FALSE ;
}
2003-12-27 19:21:48 +00:00
if ( is_file ( $path )) {
2010-08-17 22:05:22 +00:00
return drupal_unlink ( $path );
2003-12-27 19:21:48 +00:00
}
2008-12-30 16:43:20 +00:00
// Return TRUE for non-existent file, but log that nothing was actually
2010-01-25 10:38:35 +00:00
// deleted, as the current state is the intended result.
2008-09-15 09:28:50 +00:00
if ( ! file_exists ( $path )) {
2011-10-01 19:47:01 +00:00
watchdog ( 'file' , 'The file %path was not deleted because it does not exist.' , array ( '%path' => $path ), WATCHDOG_NOTICE );
2008-09-15 09:28:50 +00:00
return TRUE ;
}
2009-02-13 00:39:01 +00:00
// We cannot handle anything other than files and directories. Log an error
// for everything else (sockets, symbolic links, etc).
2011-07-04 16:58:33 +00:00
watchdog ( 'file' , 'The file %path is not of a recognized type so it was not deleted.' , array ( '%path' => $path ), WATCHDOG_ERROR );
2008-09-15 09:28:50 +00:00
return FALSE ;
2003-12-26 23:03:21 +00:00
}
2009-02-13 00:39:01 +00:00
/**
2012-02-19 03:41:24 +00:00
* Deletes all files and directories in the specified filepath recursively .
2009-02-13 00:39:01 +00:00
*
* If the specified path is a directory then the function will call itself
* recursively to process the contents . Once the contents have been removed the
* directory will also be removed .
*
* If the specified path is a file then it will be passed to
* file_unmanaged_delete () .
*
* Note that this only deletes visible files with write permission .
*
* @ param $path
2010-01-25 10:38:35 +00:00
* A string containing either an URI or a file or directory path .
2012-08-23 11:52:46 +00:00
* @ param $callback
* ( optional ) Callback function to run on each file prior to deleting it and
* on each directory prior to traversing it . For example , can be used to
* modify permissions .
2010-07-07 01:10:35 +00:00
*
2009-02-13 00:39:01 +00:00
* @ return
2009-10-09 18:38:52 +00:00
* TRUE for success or if path does not exist , FALSE in the event of an
2009-02-13 00:39:01 +00:00
* error .
*
* @ see file_unmanaged_delete ()
*/
2012-08-23 11:52:46 +00:00
function file_unmanaged_delete_recursive ( $path , $callback = NULL ) {
if ( isset ( $callback )) {
call_user_func ( $callback , $path );
}
2009-02-13 00:39:01 +00:00
if ( is_dir ( $path )) {
$dir = dir ( $path );
while (( $entry = $dir -> read ()) !== FALSE ) {
if ( $entry == '.' || $entry == '..' ) {
continue ;
}
$entry_path = $path . '/' . $entry ;
2012-08-23 11:52:46 +00:00
file_unmanaged_delete_recursive ( $entry_path , $callback );
2009-02-13 00:39:01 +00:00
}
2009-03-10 09:47:42 +00:00
$dir -> close ();
2010-08-17 22:05:22 +00:00
return drupal_rmdir ( $path );
2009-02-13 00:39:01 +00:00
}
return file_unmanaged_delete ( $path );
}
2003-12-26 23:03:21 +00:00
/**
2008-10-09 20:07:00 +00:00
* Saves a file upload to a new location .
2003-12-26 23:03:21 +00:00
*
2010-04-10 17:30:15 +00:00
* The file will be added to the { file_managed } table as a temporary file .
2012-10-14 08:19:55 +00:00
* Temporary files are periodically cleaned . Use file_usage () -> add () to register
2012-05-22 05:28:30 +00:00
* the usage of the file which will automatically mark it as permanent .
2007-05-30 08:08:59 +00:00
*
* @ param $source
2009-08-19 08:38:09 +00:00
* A string specifying the filepath or URI of the uploaded file to save .
2007-05-30 08:08:59 +00:00
* @ param $validators
* An optional , associative array of callback functions used to validate the
2009-04-13 19:06:32 +00:00
* file . See file_validate () for a full discussion of the array format .
2010-06-26 19:55:47 +00:00
* If no extension validator is provided it will default to a limited safe
* list of extensions which is as follows : " jpg jpeg gif png txt
* doc xls pdf ppt pps odt ods odp " . To allow all extensions you must
* explicitly set the 'file_validate_extensions' validator to an empty array
* ( Beware : this is not safe and should only be allowed for trusted users , if
* at all ) .
2008-09-15 09:28:50 +00:00
* @ param $destination
2010-06-20 23:53:52 +00:00
* A string containing the URI $source should be copied to .
* This must be a stream wrapper URI . If this value is omitted , Drupal ' s
* temporary files scheme will be used ( " temporary:// " ) .
2007-05-30 08:08:59 +00:00
* @ param $replace
2009-08-02 05:43:54 +00:00
* Replace behavior when the destination file already exists :
* - FILE_EXISTS_REPLACE : Replace the existing file .
* - FILE_EXISTS_RENAME : Append _ { incrementing number } until the filename is
* unique .
* - FILE_EXISTS_ERROR : Do nothing and return FALSE .
2010-07-07 01:10:35 +00:00
*
2007-05-30 08:08:59 +00:00
* @ return
2009-01-20 02:56:05 +00:00
* An object containing the file information if the upload succeeded , FALSE
2009-10-13 15:46:03 +00:00
* in the event of an error , or NULL if no file was uploaded . The
* documentation for the " File interface " group , which you can find under
* Related topics , or the header at the top of this file , documents the
2012-06-03 11:25:35 +00:00
* components of a file entity . In addition to the standard components ,
2009-10-13 15:46:03 +00:00
* this function adds :
* - source : Path to the file before it is moved .
* - destination : Path to the file after it is moved ( same as 'uri' ) .
2003-12-26 23:03:21 +00:00
*/
2008-09-15 09:28:50 +00:00
function file_save_upload ( $source , $validators = array (), $destination = FALSE , $replace = FILE_EXISTS_RENAME ) {
2007-05-30 08:08:59 +00:00
global $user ;
static $upload_cache ;
// Return cached objects without processing since the file will have
// already been processed and the paths in _FILES will be invalid.
if ( isset ( $upload_cache [ $source ])) {
return $upload_cache [ $source ];
}
2009-01-05 04:26:54 +00:00
// Make sure there's an upload to process.
2009-01-20 02:56:05 +00:00
if ( empty ( $_FILES [ 'files' ][ 'name' ][ $source ])) {
return NULL ;
2009-01-05 04:26:54 +00:00
}
2008-09-15 09:28:50 +00:00
2009-01-05 04:26:54 +00:00
// Check for file upload errors and return FALSE if a lower level system
// error occurred. For a complete list of errors:
2012-03-24 06:14:35 +00:00
// See http://php.net/manual/features.file-upload.errors.php.
2009-01-05 04:26:54 +00:00
switch ( $_FILES [ 'files' ][ 'error' ][ $source ]) {
case UPLOAD_ERR_INI_SIZE :
case UPLOAD_ERR_FORM_SIZE :
2011-10-01 19:47:01 +00:00
drupal_set_message ( t ( 'The file %file could not be saved because it exceeds %maxsize, the maximum allowed size for uploads.' , array ( '%file' => $_FILES [ 'files' ][ 'name' ][ $source ], '%maxsize' => format_size ( file_upload_max_size ()))), 'error' );
2009-01-05 04:26:54 +00:00
return FALSE ;
2008-09-15 09:28:50 +00:00
2009-01-05 04:26:54 +00:00
case UPLOAD_ERR_PARTIAL :
case UPLOAD_ERR_NO_FILE :
2011-10-01 19:47:01 +00:00
drupal_set_message ( t ( 'The file %file could not be saved because the upload did not complete.' , array ( '%file' => $_FILES [ 'files' ][ 'name' ][ $source ])), 'error' );
2009-01-05 04:26:54 +00:00
return FALSE ;
2007-05-30 08:08:59 +00:00
2009-01-05 04:26:54 +00:00
case UPLOAD_ERR_OK :
// Final check that this is a valid upload, if it isn't, use the
// default error handler.
if ( is_uploaded_file ( $_FILES [ 'files' ][ 'tmp_name' ][ $source ])) {
2009-05-24 17:39:35 +00:00
break ;
2009-01-05 04:26:54 +00:00
}
2007-05-30 08:08:59 +00:00
2009-01-05 04:26:54 +00:00
// Unknown error
default :
2009-01-21 02:07:10 +00:00
drupal_set_message ( t ( 'The file %file could not be saved. An unknown error has occurred.' , array ( '%file' => $_FILES [ 'files' ][ 'name' ][ $source ])), 'error' );
2009-01-05 04:26:54 +00:00
return FALSE ;
}
2012-06-03 11:25:35 +00:00
// Begin building file entity.
$values = array (
'uid' => $user -> uid ,
'status' => 0 ,
'filename' => trim ( drupal_basename ( $_FILES [ 'files' ][ 'name' ][ $source ]), '.' ),
'uri' => $_FILES [ 'files' ][ 'tmp_name' ][ $source ],
'filesize' => $_FILES [ 'files' ][ 'size' ][ $source ],
);
$values [ 'filemime' ] = file_get_mimetype ( $values [ 'filename' ]);
$file = entity_create ( 'file' , $values );
2006-03-07 19:14:30 +00:00
2010-06-26 19:55:47 +00:00
$extensions = '' ;
if ( isset ( $validators [ 'file_validate_extensions' ])) {
if ( isset ( $validators [ 'file_validate_extensions' ][ 0 ])) {
// Build the list of non-munged extensions if the caller provided them.
$extensions = $validators [ 'file_validate_extensions' ][ 0 ];
}
else {
// If 'file_validate_extensions' is set and the list is empty then the
// caller wants to allow any extension. In this case we have to remove the
// validator or else it will reject all extensions.
unset ( $validators [ 'file_validate_extensions' ]);
}
}
else {
// No validator was provided, so add one using the default list.
// Build a default non-munged safe list for file_munge_filename().
$extensions = 'jpg jpeg gif png txt doc xls pdf ppt pps odt ods odp' ;
$validators [ 'file_validate_extensions' ] = array ();
$validators [ 'file_validate_extensions' ][ 0 ] = $extensions ;
}
if ( ! empty ( $extensions )) {
// Munge the filename to protect against possible malicious extension hiding
// within an unknown file type (ie: filename.html.foo).
$file -> filename = file_munge_filename ( $file -> filename , $extensions );
}
// Rename potentially executable files, to help prevent exploits (i.e. will
// rename filename.php.foo and filename.php to filename.php.foo.txt and
// filename.php.txt, respectively). Don't rename if 'allow_insecure_uploads'
// evaluates to TRUE.
if ( ! variable_get ( 'allow_insecure_uploads' , 0 ) && preg_match ( '/\.(php|pl|py|cgi|asp|js)(\.|$)/i' , $file -> filename ) && ( substr ( $file -> filename , - 4 ) != '.txt' )) {
2009-01-05 04:26:54 +00:00
$file -> filemime = 'text/plain' ;
2009-08-17 19:14:42 +00:00
$file -> uri .= '.txt' ;
2009-01-05 04:26:54 +00:00
$file -> filename .= '.txt' ;
2010-06-26 19:55:47 +00:00
// The .txt extension may not be in the allowed list of extensions. We have
// to add it here or else the file upload will fail.
if ( ! empty ( $extensions )) {
$validators [ 'file_validate_extensions' ][ 0 ] .= ' txt' ;
drupal_set_message ( t ( 'For security reasons, your upload has been renamed to %filename.' , array ( '%filename' => $file -> filename )));
}
2009-01-05 04:26:54 +00:00
}
2007-05-30 08:08:59 +00:00
2009-08-17 19:14:42 +00:00
// If the destination is not provided, use the temporary directory.
if ( empty ( $destination )) {
$destination = 'temporary://' ;
}
// Assert that the destination contains a valid stream.
$destination_scheme = file_uri_scheme ( $destination );
2012-12-29 22:38:51 +00:00
if ( ! file_stream_wrapper_valid_scheme ( $destination_scheme )) {
2011-10-01 19:47:01 +00:00
drupal_set_message ( t ( 'The file could not be uploaded because the destination %destination is invalid.' , array ( '%destination' => $destination )), 'error' );
2009-08-17 19:14:42 +00:00
return FALSE ;
2009-01-05 04:26:54 +00:00
}
2007-10-25 09:05:45 +00:00
2009-01-05 04:26:54 +00:00
$file -> source = $source ;
2009-08-19 08:38:09 +00:00
// A URI may already have a trailing slash or look like "public://".
if ( substr ( $destination , - 1 ) != '/' ) {
$destination .= '/' ;
}
2009-08-17 19:14:42 +00:00
$file -> destination = file_destination ( $destination . $file -> filename , $replace );
2009-01-10 06:09:54 +00:00
// If file_destination() returns FALSE then $replace == FILE_EXISTS_ERROR and
// there's an existing file so we need to bail.
if ( $file -> destination === FALSE ) {
2009-08-11 04:50:36 +00:00
drupal_set_message ( t ( 'The file %source could not be uploaded because a file by that name already exists in the destination %directory.' , array ( '%source' => $source , '%directory' => $destination )), 'error' );
2009-01-10 06:09:54 +00:00
return FALSE ;
}
2007-05-30 08:08:59 +00:00
2009-01-05 04:26:54 +00:00
// Add in our check of the the file name length.
$validators [ 'file_validate_name_length' ] = array ();
2003-12-26 23:03:21 +00:00
2009-01-05 04:26:54 +00:00
// Call the validation functions specified by this function's caller.
$errors = file_validate ( $file , $validators );
2007-05-30 08:08:59 +00:00
2009-01-05 04:26:54 +00:00
// Check for errors.
if ( ! empty ( $errors )) {
$message = t ( 'The specified file %name could not be uploaded.' , array ( '%name' => $file -> filename ));
if ( count ( $errors ) > 1 ) {
2009-10-09 01:00:08 +00:00
$message .= theme ( 'item_list' , array ( 'items' => $errors ));
2007-05-30 08:08:59 +00:00
}
2009-01-05 04:26:54 +00:00
else {
$message .= ' ' . array_pop ( $errors );
2008-10-09 00:02:29 +00:00
}
2009-01-05 04:26:54 +00:00
form_set_error ( $source , $message );
return FALSE ;
}
// Move uploaded files from PHP's upload_tmp_dir to Drupal's temporary
// directory. This overcomes open_basedir restrictions for future file
// operations.
2009-08-17 19:14:42 +00:00
$file -> uri = $file -> destination ;
2011-08-30 07:35:47 +00:00
if ( ! drupal_move_uploaded_file ( $_FILES [ 'files' ][ 'tmp_name' ][ $source ], $file -> uri )) {
2009-01-05 04:26:54 +00:00
form_set_error ( $source , t ( 'File upload error. Could not move uploaded file.' ));
2009-08-17 19:14:42 +00:00
watchdog ( 'file' , 'Upload error. Could not move uploaded file %file to destination %destination.' , array ( '%file' => $file -> filename , '%destination' => $file -> uri ));
2009-01-05 04:26:54 +00:00
return FALSE ;
}
2009-04-20 20:02:31 +00:00
// Set the permissions on the new file.
2009-08-17 19:14:42 +00:00
drupal_chmod ( $file -> uri );
2009-04-20 20:02:31 +00:00
2009-01-10 06:09:54 +00:00
// If we are replacing an existing file re-use its database record.
if ( $replace == FILE_EXISTS_REPLACE ) {
2012-08-21 15:38:04 +00:00
$existing_files = entity_load_multiple_by_properties ( 'file' , array ( 'uri' => $file -> uri ));
2009-01-10 06:09:54 +00:00
if ( count ( $existing_files )) {
$existing = reset ( $existing_files );
$file -> fid = $existing -> fid ;
}
}
2009-01-05 04:26:54 +00:00
// If we made it this far it's safe to record this file in the database.
2012-06-03 11:25:35 +00:00
$file -> save ();
// Add file to the cache.
$upload_cache [ $source ] = $file ;
return $file ;
2003-12-26 23:03:21 +00:00
}
2011-08-30 07:35:47 +00:00
/**
* Moves an uploaded file to a new location .
*
* PHP ' s move_uploaded_file () does not properly support streams if safe_mode
* or open_basedir are enabled , so this function fills that gap .
*
* Compatibility : normal paths and stream wrappers .
*
* @ param $filename
* The filename of the uploaded file .
* @ param $uri
* A string containing the destination URI of the file .
*
* @ return
* TRUE on success , or FALSE on failure .
*
* @ see move_uploaded_file ()
2012-02-19 03:41:24 +00:00
* @ see http :// drupal . org / node / 515192
2011-08-30 07:35:47 +00:00
* @ ingroup php_wrappers
*/
function drupal_move_uploaded_file ( $filename , $uri ) {
$result = @ move_uploaded_file ( $filename , $uri );
// PHP's move_uploaded_file() does not properly support streams if safe_mode
// or open_basedir are enabled so if the move failed, try finding a real path
// and retry the move operation.
if ( ! $result ) {
if ( $realpath = drupal_realpath ( $uri )) {
$result = move_uploaded_file ( $filename , $realpath );
}
else {
$result = move_uploaded_file ( $filename , $uri );
}
}
return $result ;
}
2008-09-15 09:28:50 +00:00
2008-10-09 00:02:29 +00:00
/**
2012-02-19 03:41:24 +00:00
* Saves a file to the specified destination without invoking file API .
2008-10-09 00:02:29 +00:00
*
* This function is identical to file_save_data () except the file will not be
2010-04-10 17:30:15 +00:00
* saved to the { file_managed } table and none of the file_ * hooks will be
* called .
2008-10-09 00:02:29 +00:00
*
* @ param $data
* A string containing the contents of the file .
* @ param $destination
2011-06-23 00:56:03 +00:00
* A string containing the destination location . This must be a stream wrapper
* URI . If no value is provided , a randomized name will be generated and the
2012-02-19 03:41:24 +00:00
* file will be saved using Drupal ' s default files scheme , usually
* " public:// " .
2008-10-09 00:02:29 +00:00
* @ param $replace
* Replace behavior when the destination file already exists :
* - FILE_EXISTS_REPLACE - Replace the existing file .
* - FILE_EXISTS_RENAME - Append _ { incrementing number } until the filename is
* unique .
* - FILE_EXISTS_ERROR - Do nothing and return FALSE .
2010-07-07 01:10:35 +00:00
*
2008-10-09 00:02:29 +00:00
* @ return
* A string with the path of the resulting file , or FALSE on error .
2008-10-09 20:07:00 +00:00
*
2008-10-09 00:02:29 +00:00
* @ see file_save_data ()
*/
function file_unmanaged_save_data ( $data , $destination = NULL , $replace = FILE_EXISTS_RENAME ) {
2008-09-15 09:28:50 +00:00
// Write the data to a temporary file.
2009-08-17 19:14:42 +00:00
$temp_name = drupal_tempnam ( 'temporary://' , 'file' );
2008-09-15 09:28:50 +00:00
if ( file_put_contents ( $temp_name , $data ) === FALSE ) {
2005-05-05 22:22:46 +00:00
drupal_set_message ( t ( 'The file could not be created.' ), 'error' );
2008-06-18 03:36:24 +00:00
return FALSE ;
2004-06-04 18:00:48 +00:00
}
2008-09-15 09:28:50 +00:00
// Move the file to its final destination.
2008-10-09 00:02:29 +00:00
return file_unmanaged_move ( $temp_name , $destination , $replace );
2004-06-04 18:00:48 +00:00
}
2012-05-26 18:18:48 +00:00
/**
* Transfers a file to the client using HTTP .
*
* Pipes a file through Drupal to the client .
*
* @ param $uri
* String specifying the file URI to transfer .
* @ param $headers
* An array of HTTP headers to send along with file .
*/
function file_transfer ( $uri , $headers ) {
return new StreamedResponse ( function () use ( $uri ) {
// Transfer file in 1024 byte chunks to save memory usage.
if ( file_exists ( $uri ) && $fd = fopen ( $uri , 'rb' )) {
while ( ! feof ( $fd )) {
print fread ( $fd , 1024 );
}
fclose ( $fd );
}
}, 200 , $headers );
}
2003-12-26 23:03:21 +00:00
/**
2012-02-19 03:41:24 +00:00
* Page callback : Handles private file transfers .
2008-09-15 09:28:50 +00:00
*
2006-03-08 23:42:55 +00:00
* Call modules that implement hook_file_download () to find out if a file is
2011-08-02 00:25:32 +00:00
* accessible and what headers it should be transferred with . If one or more
* modules returned headers the download will start with the returned headers .
2012-06-04 12:06:09 +00:00
* If a module returns - 1 an AccessDeniedHttpException will be thrown .
* If the file exists but no modules responded an AccessDeniedHttpException will
* be thrown . If the file does not exist a NotFoundHttpException will be thrown .
2008-10-09 00:02:29 +00:00
*
* @ see hook_file_download ()
2012-02-19 03:41:24 +00:00
* @ see system_menu ()
2003-12-26 23:03:21 +00:00
*/
function file_download () {
2012-04-29 15:16:27 +00:00
// Merge remaining path arguments into relative file path.
2006-03-29 06:49:25 +00:00
$args = func_get_args ();
2009-08-17 19:14:42 +00:00
$scheme = array_shift ( $args );
$target = implode ( '/' , $args );
$uri = $scheme . '://' . $target ;
2010-04-30 01:33:17 +00:00
if ( file_stream_wrapper_valid_scheme ( $scheme ) && file_exists ( $uri )) {
2008-09-15 09:28:50 +00:00
// Let other modules provide headers and controls access to the file.
2013-01-09 23:58:39 +00:00
$headers = module_invoke_all ( 'file_download' , $uri );
foreach ( $headers as $result ) {
2010-09-11 05:07:22 +00:00
if ( $result == - 1 ) {
2012-04-01 19:51:43 +00:00
throw new AccessDeniedHttpException ();
2010-09-11 05:07:22 +00:00
}
2006-03-10 19:02:06 +00:00
}
if ( count ( $headers )) {
2012-05-26 18:18:48 +00:00
return file_transfer ( $uri , $headers );
2003-12-26 23:03:21 +00:00
}
2012-04-01 19:51:43 +00:00
throw new AccessDeniedHttpException ();
2003-12-26 23:03:21 +00:00
}
2012-04-01 19:51:43 +00:00
throw new NotFoundHttpException ();
2003-12-26 23:03:21 +00:00
}
2006-03-10 19:02:06 +00:00
2003-12-26 23:03:21 +00:00
/**
2006-12-11 16:45:17 +00:00
* Finds all files that match a given mask in a given directory .
2008-10-09 20:07:00 +00:00
*
2006-12-11 16:45:17 +00:00
* Directories and files beginning with a period are excluded ; this
* prevents hidden files and directories ( such as SVN working directories )
* from being scanned .
2004-09-17 18:18:04 +00:00
*
2004-11-24 22:44:01 +00:00
* @ param $dir
2009-11-05 03:37:08 +00:00
* The base directory or URI to scan , without trailing slash .
2004-11-24 22:44:01 +00:00
* @ param $mask
2008-09-20 03:49:24 +00:00
* The preg_match () regular expression of the files to find .
2009-02-18 15:07:27 +00:00
* @ param $options
2009-11-05 03:37:08 +00:00
* An associative array of additional options , with the following elements :
* - 'nomask' : The preg_match () regular expression of the files to ignore .
* Defaults to '/(\.\.?|CVS)$/' .
* - 'callback' : The callback function to call for each match . There is no
* default callback .
* - 'recurse' : When TRUE , the directory scan will recurse the entire tree
* starting at the provided directory . Defaults to TRUE .
* - 'key' : The key to be used for the returned associative array of files .
* Possible values are 'uri' , for the file 's URI; ' filename ' , for the
* basename of the file ; and 'name' for the name of the file without the
* extension . Defaults to 'uri' .
* - 'min_depth' : Minimum depth of directories to return files from . Defaults
* to 0.
2005-03-08 22:06:11 +00:00
* @ param $depth
2008-09-15 09:28:50 +00:00
* Current depth of recursion . This parameter is only used internally and
2009-11-05 03:37:08 +00:00
* should not be passed in .
*
2004-11-24 22:44:01 +00:00
* @ return
2009-11-05 03:37:08 +00:00
* An associative array ( keyed on the chosen key ) of objects with 'uri' ,
* 'filename' , and 'name' members corresponding to the matching files .
2003-12-26 23:03:21 +00:00
*/
2009-02-18 15:07:27 +00:00
function file_scan_directory ( $dir , $mask , $options = array (), $depth = 0 ) {
// Merge in defaults.
$options += array (
2012-11-06 08:51:18 +00:00
'nomask' => '/^CVS$/' ,
2009-02-18 15:07:27 +00:00
'callback' => 0 ,
'recurse' => TRUE ,
2009-08-17 19:14:42 +00:00
'key' => 'uri' ,
2009-02-18 15:07:27 +00:00
'min_depth' => 0 ,
);
2012-11-06 08:51:18 +00:00
// Normalize $dir only once.
if ( $depth == 0 ) {
$dir = file_stream_wrapper_uri_normalize ( $dir );
$dir_has_slash = ( substr ( $dir , - 1 ) === '/' );
}
2009-02-18 15:07:27 +00:00
2009-08-17 19:14:42 +00:00
$options [ 'key' ] = in_array ( $options [ 'key' ], array ( 'uri' , 'filename' , 'name' )) ? $options [ 'key' ] : 'uri' ;
2003-12-26 23:03:21 +00:00
$files = array ();
2012-10-22 09:14:49 +00:00
// Avoid warnings when opendir does not have the permissions to open a
// directory.
if ( is_dir ( $dir )) {
if ( $handle = @ opendir ( $dir )) {
while ( FALSE !== ( $filename = readdir ( $handle ))) {
2012-11-06 08:51:18 +00:00
// Skip this file if it matches the nomask or starts with a dot.
if ( $filename [ 0 ] != '.' && ! preg_match ( $options [ 'nomask' ], $filename )) {
if ( $depth == 0 && $dir_has_slash ) {
$uri = " $dir $filename " ;
}
else {
$uri = " $dir / $filename " ;
}
if ( $options [ 'recurse' ] && is_dir ( $uri )) {
2012-10-22 09:14:49 +00:00
// Give priority to files in this folder by merging them in after
// any subdirectory files.
$files = array_merge ( file_scan_directory ( $uri , $mask , $options , $depth + 1 ), $files );
}
elseif ( $depth >= $options [ 'min_depth' ] && preg_match ( $mask , $filename )) {
// Always use this match over anything already set in $files with
// the same $options['key'].
$file = new stdClass ();
$file -> uri = $uri ;
$file -> filename = $filename ;
$file -> name = pathinfo ( $filename , PATHINFO_FILENAME );
$key = $options [ 'key' ];
$files [ $file -> $key ] = $file ;
if ( $options [ 'callback' ]) {
$options [ 'callback' ]( $uri );
}
2003-12-26 23:03:21 +00:00
}
}
}
2004-11-24 22:44:01 +00:00
2012-10-22 09:14:49 +00:00
closedir ( $handle );
}
else {
watchdog ( 'file' , '@dir can not be opened' , array ( '@dir' => $dir ), WATCHDOG_ERROR );
}
2003-12-26 23:03:21 +00:00
}
2004-11-24 22:44:01 +00:00
2003-12-26 23:03:21 +00:00
return $files ;
}
2006-08-06 22:49:27 +00:00
/**
2012-02-19 03:41:24 +00:00
* Determines the maximum file upload size by querying the PHP settings .
2006-08-06 22:49:27 +00:00
*
* @ return
2008-09-15 09:28:50 +00:00
* A file size limit in bytes based on the PHP upload_max_filesize and
* post_max_size
2006-08-06 22:49:27 +00:00
*/
function file_upload_max_size () {
static $max_size = - 1 ;
2005-08-25 21:14:17 +00:00
2006-08-06 22:49:27 +00:00
if ( $max_size < 0 ) {
2010-08-01 01:33:42 +00:00
// Start with post_max_size.
$max_size = parse_size ( ini_get ( 'post_max_size' ));
// If upload_max_size is less, then reduce. Except if upload_max_size is
// zero, which indicates no limit.
2006-12-07 17:02:25 +00:00
$upload_max = parse_size ( ini_get ( 'upload_max_filesize' ));
2010-08-01 01:33:42 +00:00
if ( $upload_max > 0 && $upload_max < $max_size ) {
$max_size = $upload_max ;
}
2006-08-06 22:49:27 +00:00
}
return $max_size ;
}
2008-01-28 16:05:17 +00:00
2008-08-14 12:10:47 +00:00
/**
2012-02-19 03:41:24 +00:00
* Determines an Internet Media Type or MIME type from a filename .
2008-08-14 12:10:47 +00:00
*
2009-08-17 19:14:42 +00:00
* @ param $uri
* A string containing the URI , path , or filename .
2008-08-14 12:10:47 +00:00
* @ param $mapping
2009-06-02 13:42:40 +00:00
* An optional map of extensions to their mimetypes , in the form :
* - 'mimetypes' : a list of mimetypes , keyed by an identifier ,
* - 'extensions' : the mapping itself , an associative array in which
2009-08-31 05:47:34 +00:00
* the key is the extension ( lowercase ) and the value is the mimetype
* identifier . If $mapping is NULL file_mimetype_mapping () is called .
2008-08-14 12:10:47 +00:00
*
* @ return
2009-08-31 05:47:34 +00:00
* The internet media type registered for the extension or
* application / octet - stream for unknown extensions .
2010-03-26 17:14:46 +00:00
*
* @ see file_default_mimetype_mapping ()
2008-08-14 12:10:47 +00:00
*/
2009-08-17 19:14:42 +00:00
function file_get_mimetype ( $uri , $mapping = NULL ) {
if ( $wrapper = file_stream_wrapper_get_instance_by_uri ( $uri )) {
return $wrapper -> getMimeType ( $uri , $mapping );
2009-06-02 13:42:40 +00:00
}
2009-08-17 19:14:42 +00:00
else {
// getMimeType() is not implementation specific, so we can directly
// call it without an instance.
2012-03-10 20:20:23 +00:00
return LocalStream :: getMimeType ( $uri , $mapping );
2008-08-14 12:10:47 +00:00
}
}
2009-04-20 20:02:31 +00:00
2008-01-28 16:05:17 +00:00
/**
2012-02-19 03:41:24 +00:00
* Sets the permissions on a file or directory .
2009-04-20 20:02:31 +00:00
*
* This function will use the 'file_chmod_directory' and 'file_chmod_file'
2009-12-30 08:16:55 +00:00
* variables for the default modes for directories and uploaded / generated
* files . By default these will give everyone read access so that users
* accessing the files with a user account without the webserver group ( e . g .
* via FTP ) can read these files , and give group write permissions so webserver
* group members ( e . g . a vhost account ) can alter files uploaded and owned by
* the webserver .
2009-04-20 20:02:31 +00:00
*
2009-12-30 08:16:55 +00:00
* PHP ' s chmod does not support stream wrappers so we use our wrapper
* implementation which interfaces with chmod () by default . Contrib wrappers
2010-01-25 10:38:35 +00:00
* may override this behavior in their implementations as needed .
2009-08-17 19:14:42 +00:00
*
* @ param $uri
* A string containing a URI file , or directory path .
2009-04-20 20:02:31 +00:00
* @ param $mode
* Integer value for the permissions . Consult PHP chmod () documentation for
* more information .
2010-07-07 01:10:35 +00:00
*
2009-04-20 20:02:31 +00:00
* @ return
* TRUE for success , FALSE in the event of an error .
2009-09-28 22:22:54 +00:00
*
* @ ingroup php_wrappers
2008-01-28 16:05:17 +00:00
*/
2009-08-17 19:14:42 +00:00
function drupal_chmod ( $uri , $mode = NULL ) {
2009-04-20 20:02:31 +00:00
if ( ! isset ( $mode )) {
2009-08-17 19:14:42 +00:00
if ( is_dir ( $uri )) {
2009-04-20 20:02:31 +00:00
$mode = variable_get ( 'file_chmod_directory' , 0775 );
}
else {
$mode = variable_get ( 'file_chmod_file' , 0664 );
}
}
2009-08-17 19:14:42 +00:00
// If this URI is a stream, pass it off to the appropriate stream wrapper.
// Otherwise, attempt PHP's chmod. This allows use of drupal_chmod even
// for unmanaged files outside of the stream wrapper interface.
if ( $wrapper = file_stream_wrapper_get_instance_by_uri ( $uri )) {
if ( $wrapper -> chmod ( $mode )) {
return TRUE ;
}
}
else {
if ( @ chmod ( $uri , $mode )) {
return TRUE ;
}
2009-04-20 20:02:31 +00:00
}
2011-07-04 16:58:33 +00:00
watchdog ( 'file' , 'The file permissions could not be set on %uri.' , array ( '%uri' => $uri ), WATCHDOG_ERROR );
2009-04-20 20:02:31 +00:00
return FALSE ;
}
2010-08-17 22:05:22 +00:00
/**
* Deletes a file .
*
* PHP ' s unlink () is broken on Windows , as it can fail to remove a file
* when it has a read - only flag set .
*
* @ param $uri
* A URI or pathname .
* @ param $context
2012-03-24 06:14:35 +00:00
* Refer to http :// php . net / manual / ref . stream . php
2010-08-17 22:05:22 +00:00
*
* @ return
* Boolean TRUE on success , or FALSE on failure .
*
* @ see unlink ()
* @ ingroup php_wrappers
*/
function drupal_unlink ( $uri , $context = NULL ) {
$scheme = file_uri_scheme ( $uri );
2012-12-29 22:38:51 +00:00
if ( ! file_stream_wrapper_valid_scheme ( $scheme ) && ( substr ( PHP_OS , 0 , 3 ) == 'WIN' )) {
2010-08-17 22:05:22 +00:00
chmod ( $uri , 0600 );
}
if ( $context ) {
return unlink ( $uri , $context );
}
else {
return unlink ( $uri );
}
}
2009-08-17 19:14:42 +00:00
/**
2011-09-25 09:45:29 +00:00
* Returns the absolute local filesystem path of a stream URI .
2009-08-17 19:14:42 +00:00
*
2011-09-25 09:45:29 +00:00
* This function was originally written to ease the conversion of 6. x code to
* use 7. x stream wrappers . However , it assumes that every URI may be resolved
* to an absolute local filesystem path , and this assumption fails when stream
* wrappers are used to support remote file storage . Remote stream wrappers
* may implement the realpath method by always returning FALSE . The use of
* drupal_realpath () is discouraged , and is slowly being removed from core
* functions where possible .
2009-08-17 19:14:42 +00:00
*
2011-09-25 09:45:29 +00:00
* Only use this function if you know that the stream wrapper in the URI uses
* the local file system , and you need to pass an absolute path to a function
* that is incompatible with stream URIs .
2009-08-17 19:14:42 +00:00
*
* @ param $uri
2011-09-25 09:45:29 +00:00
* A stream wrapper URI or a filesystem path , possibly including one or more
* symbolic links .
2010-03-26 17:14:46 +00:00
*
2009-08-17 19:14:42 +00:00
* @ return
2011-09-25 09:45:29 +00:00
* The absolute local filesystem path ( with no symbolic links ), or FALSE on
* failure .
2009-08-17 19:14:42 +00:00
*
2012-02-19 03:41:24 +00:00
* @ todo This function is deprecated , and should be removed wherever possible .
*
2012-03-10 20:20:23 +00:00
* @ see Drupal\Core\StreamWrapper\StreamWrapperInterface :: realpath ()
2011-09-25 09:45:29 +00:00
* @ see http :// php . net / manual / function . realpath . php
2009-09-28 22:22:54 +00:00
* @ ingroup php_wrappers
2009-08-17 19:14:42 +00:00
*/
function drupal_realpath ( $uri ) {
// If this URI is a stream, pass it off to the appropriate stream wrapper.
// Otherwise, attempt PHP's realpath. This allows use of drupal_realpath even
// for unmanaged files outside of the stream wrapper interface.
if ( $wrapper = file_stream_wrapper_get_instance_by_uri ( $uri )) {
return $wrapper -> realpath ();
}
2011-06-11 23:33:58 +00:00
return realpath ( $uri );
2009-08-17 19:14:42 +00:00
}
/**
* Gets the name of the directory from a given path .
*
* PHP ' s dirname () does not properly pass streams , so this function fills
* that gap . It is backwards compatible with normal paths and will use
* PHP ' s dirname () as a fallback .
*
* Compatibility : normal paths and stream wrappers .
*
* @ param $uri
* A URI or path .
2010-03-26 17:14:46 +00:00
*
2009-08-17 19:14:42 +00:00
* @ return
* A string containing the directory name .
*
* @ see dirname ()
2012-02-19 03:41:24 +00:00
* @ see http :// drupal . org / node / 515192
2009-09-28 22:22:54 +00:00
* @ ingroup php_wrappers
2009-08-17 19:14:42 +00:00
*/
function drupal_dirname ( $uri ) {
2009-12-30 08:16:55 +00:00
$scheme = file_uri_scheme ( $uri );
2009-08-17 19:14:42 +00:00
2012-12-29 22:38:51 +00:00
if ( file_stream_wrapper_valid_scheme ( $scheme )) {
2010-06-02 13:09:34 +00:00
return file_stream_wrapper_get_instance_by_scheme ( $scheme ) -> dirname ( $uri );
2009-08-17 19:14:42 +00:00
}
else {
return dirname ( $uri );
}
}
2012-01-18 04:10:02 +00:00
/**
* Gets the filename from a given path .
*
* PHP ' s basename () does not properly support streams or filenames beginning
* with a non - US - ASCII character .
*
* @ see http :// bugs . php . net / bug . php ? id = 37738
* @ see basename ()
*
* @ ingroup php_wrappers
*/
function drupal_basename ( $uri , $suffix = NULL ) {
$separators = '/' ;
if ( DIRECTORY_SEPARATOR != '/' ) {
// For Windows OS add special separator.
$separators .= DIRECTORY_SEPARATOR ;
}
// Remove right-most slashes when $uri points to directory.
$uri = rtrim ( $uri , $separators );
// Returns the trailing part of the $uri starting after one of the directory
// separators.
$filename = preg_match ( '@[^' . preg_quote ( $separators , '@' ) . ']+$@' , $uri , $matches ) ? $matches [ 0 ] : '' ;
// Cuts off a suffix from the filename.
if ( $suffix ) {
$filename = preg_replace ( '@' . preg_quote ( $suffix , '@' ) . '$@' , '' , $filename );
}
return $filename ;
}
2009-08-17 19:14:42 +00:00
/**
* Creates a directory using Drupal ' s default mode .
*
* PHP 's mkdir() does not respect Drupal' s default permissions mode . If a mode
* is not provided , this function will make sure that Drupal ' s is used .
*
* Compatibility : normal paths and stream wrappers .
*
* @ param $uri
* A URI or pathname .
* @ param $mode
* By default the Drupal mode is used .
* @ param $recursive
* Default to FALSE .
* @ param $context
2012-03-24 06:14:35 +00:00
* Refer to http :// php . net / manual / ref . stream . php
2010-03-26 17:14:46 +00:00
*
2009-08-17 19:14:42 +00:00
* @ return
* Boolean TRUE on success , or FALSE on failure .
*
* @ see mkdir ()
2012-02-19 03:41:24 +00:00
* @ see http :// drupal . org / node / 515192
2009-09-28 22:22:54 +00:00
* @ ingroup php_wrappers
2009-08-17 19:14:42 +00:00
*/
function drupal_mkdir ( $uri , $mode = NULL , $recursive = FALSE , $context = NULL ) {
2010-09-26 23:31:36 +00:00
if ( ! isset ( $mode )) {
2009-08-17 19:14:42 +00:00
$mode = variable_get ( 'file_chmod_directory' , 0775 );
}
2010-09-26 23:31:36 +00:00
if ( ! isset ( $context )) {
2009-08-17 19:14:42 +00:00
return mkdir ( $uri , $mode , $recursive );
}
else {
return mkdir ( $uri , $mode , $recursive , $context );
}
}
2010-08-17 22:05:22 +00:00
/**
2012-02-19 03:41:24 +00:00
* Removes a directory .
2010-08-17 22:05:22 +00:00
*
* PHP ' s rmdir () is broken on Windows , as it can fail to remove a directory
* when it has a read - only flag set .
*
* @ param $uri
* A URI or pathname .
* @ param $context
2012-03-24 06:14:35 +00:00
* Refer to http :// php . net / manual / ref . stream . php
2010-08-17 22:05:22 +00:00
*
* @ return
* Boolean TRUE on success , or FALSE on failure .
*
* @ see rmdir ()
* @ ingroup php_wrappers
*/
function drupal_rmdir ( $uri , $context = NULL ) {
$scheme = file_uri_scheme ( $uri );
2012-12-29 22:38:51 +00:00
if ( ! file_stream_wrapper_valid_scheme ( $scheme ) && ( substr ( PHP_OS , 0 , 3 ) == 'WIN' )) {
2010-08-17 22:05:22 +00:00
chmod ( $uri , 0700 );
}
if ( $context ) {
return rmdir ( $uri , $context );
}
else {
return rmdir ( $uri );
}
}
2009-08-17 19:14:42 +00:00
/**
* Creates a file with a unique filename in the specified directory .
*
* PHP ' s tempnam () does not return a URI like we want . This function
* will return a URI if given a URI , or it will return a filepath if
* given a filepath .
*
* Compatibility : normal paths and stream wrappers .
*
* @ param $directory
* The directory where the temporary filename will be created .
* @ param $prefix
* The prefix of the generated temporary filename .
* Note : Windows uses only the first three characters of prefix .
2010-03-26 17:14:46 +00:00
*
2009-08-17 19:14:42 +00:00
* @ return
2010-01-25 10:38:35 +00:00
* The new temporary filename , or FALSE on failure .
2009-08-17 19:14:42 +00:00
*
* @ see tempnam ()
2012-02-19 03:41:24 +00:00
* @ see http :// drupal . org / node / 515192
2009-09-28 22:22:54 +00:00
* @ ingroup php_wrappers
2009-08-17 19:14:42 +00:00
*/
function drupal_tempnam ( $directory , $prefix ) {
2009-12-30 08:16:55 +00:00
$scheme = file_uri_scheme ( $directory );
2009-08-17 19:14:42 +00:00
2012-12-29 22:38:51 +00:00
if ( file_stream_wrapper_valid_scheme ( $scheme )) {
2009-08-17 19:14:42 +00:00
$wrapper = file_stream_wrapper_get_instance_by_scheme ( $scheme );
if ( $filename = tempnam ( $wrapper -> getDirectoryPath (), $prefix )) {
2012-01-18 04:10:02 +00:00
return $scheme . '://' . drupal_basename ( $filename );
2009-08-17 19:14:42 +00:00
}
else {
return FALSE ;
}
}
else {
// Handle as a normal tempnam() call.
return tempnam ( $directory , $prefix );
}
}
2010-06-12 08:15:15 +00:00
/**
2012-02-19 03:41:24 +00:00
* Gets the path of system - appropriate temporary directory .
2010-06-12 08:15:15 +00:00
*/
function file_directory_temp () {
2010-10-05 06:23:18 +00:00
$temporary_directory = variable_get ( 'file_temporary_path' , NULL );
2010-06-12 08:15:15 +00:00
2010-10-05 06:23:18 +00:00
if ( empty ( $temporary_directory )) {
2010-06-12 08:15:15 +00:00
$directories = array ();
// Has PHP been set with an upload_tmp_dir?
if ( ini_get ( 'upload_tmp_dir' )) {
$directories [] = ini_get ( 'upload_tmp_dir' );
}
// Operating system specific dirs.
if ( substr ( PHP_OS , 0 , 3 ) == 'WIN' ) {
$directories [] = 'c:\\windows\\temp' ;
$directories [] = 'c:\\winnt\\temp' ;
}
else {
$directories [] = '/tmp' ;
}
// PHP may be able to find an alternative tmp directory.
2011-06-11 23:33:58 +00:00
$directories [] = sys_get_temp_dir ();
2010-06-12 08:15:15 +00:00
foreach ( $directories as $directory ) {
if ( is_dir ( $directory ) && is_writable ( $directory )) {
$temporary_directory = $directory ;
break ;
}
}
if ( empty ( $temporary_directory )) {
2011-07-14 03:05:21 +00:00
// If no directory has been found default to 'files/tmp'.
$temporary_directory = variable_get ( 'file_public_path' , conf_path () . '/files' ) . '/tmp' ;
// Windows accepts paths with either slash (/) or backslash (\), but will
// not accept a path which contains both a slash and a backslash. Since
// the 'file_public_path' variable may have either format, we sanitize
// everything to use slash which is supported on all platforms.
$temporary_directory = str_replace ( '\\' , '/' , $temporary_directory );
2010-06-12 08:15:15 +00:00
}
// Save the path of the discovered directory.
2010-10-05 06:23:18 +00:00
variable_set ( 'file_temporary_path' , $temporary_directory );
2010-06-12 08:15:15 +00:00
}
return $temporary_directory ;
}
2009-04-20 20:02:31 +00:00
/**
* @ } End of " defgroup file " .
2009-06-09 21:33:12 +00:00
*/