file.inc 91 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639
  1. <?php
  2. /**
  3. * @file
  4. * API for handling file uploads and server file management.
  5. */
  6. /**
  7. * Manually include stream wrapper code.
  8. *
  9. * Stream wrapper code is included here because there are cases where
  10. * File API is needed before a bootstrap, or in an alternate order (e.g.
  11. * maintenance theme).
  12. */
  13. require_once DRUPAL_ROOT . '/includes/stream_wrappers.inc';
  14. /**
  15. * @defgroup file File interface
  16. * @{
  17. * Common file handling functions.
  18. *
  19. * Fields on the file object:
  20. * - fid: File ID
  21. * - uid: The {users}.uid of the user who is associated with the file.
  22. * - filename: Name of the file with no path components. This may differ from
  23. * the basename of the filepath if the file is renamed to avoid overwriting
  24. * an existing file.
  25. * - uri: URI of the file.
  26. * - filemime: The file's MIME type.
  27. * - filesize: The size of the file in bytes.
  28. * - status: A bitmapped field indicating the status of the file. The first 8
  29. * bits are reserved for Drupal core. The least significant bit indicates
  30. * temporary (0) or permanent (1). Temporary files older than
  31. * DRUPAL_MAXIMUM_TEMP_FILE_AGE will be removed during cron runs.
  32. * - timestamp: UNIX timestamp for the date the file was added to the database.
  33. */
  34. /**
  35. * Flag used by file_prepare_directory() -- create directory if not present.
  36. */
  37. define('FILE_CREATE_DIRECTORY', 1);
  38. /**
  39. * Flag used by file_prepare_directory() -- file permissions may be changed.
  40. */
  41. define('FILE_MODIFY_PERMISSIONS', 2);
  42. /**
  43. * Flag for dealing with existing files: Appends number until name is unique.
  44. */
  45. define('FILE_EXISTS_RENAME', 0);
  46. /**
  47. * Flag for dealing with existing files: Replace the existing file.
  48. */
  49. define('FILE_EXISTS_REPLACE', 1);
  50. /**
  51. * Flag for dealing with existing files: Do nothing and return FALSE.
  52. */
  53. define('FILE_EXISTS_ERROR', 2);
  54. /**
  55. * Indicates that the file is permanent and should not be deleted.
  56. *
  57. * Temporary files older than DRUPAL_MAXIMUM_TEMP_FILE_AGE will be removed
  58. * during cron runs, but permanent files will not be removed during the file
  59. * garbage collection process.
  60. */
  61. define('FILE_STATUS_PERMANENT', 1);
  62. /**
  63. * Provides Drupal stream wrapper registry.
  64. *
  65. * A stream wrapper is an abstraction of a file system that allows Drupal to
  66. * use the same set of methods to access both local files and remote resources.
  67. *
  68. * Provide a facility for managing and querying user-defined stream wrappers
  69. * in PHP. PHP's internal stream_get_wrappers() doesn't return the class
  70. * registered to handle a stream, which we need to be able to find the handler
  71. * for class instantiation.
  72. *
  73. * If a module registers a scheme that is already registered with PHP, the
  74. * existing scheme will be unregistered and replaced with the specified class.
  75. *
  76. * A stream is referenced as "scheme://target".
  77. *
  78. * The optional $filter parameter can be used to retrieve only the stream
  79. * wrappers that are appropriate for particular usage. For example, this returns
  80. * only stream wrappers that use local file storage:
  81. * @code
  82. * $local_stream_wrappers = file_get_stream_wrappers(STREAM_WRAPPERS_LOCAL);
  83. * @endcode
  84. *
  85. * The $filter parameter can only filter to types containing a particular flag.
  86. * In some cases, you may want to filter to types that do not contain a
  87. * particular flag. For example, you may want to retrieve all stream wrappers
  88. * that are not writable, or all stream wrappers that are not local. PHP's
  89. * array_diff_key() function can be used to help with this. For example, this
  90. * returns only stream wrappers that do not use local file storage:
  91. * @code
  92. * $remote_stream_wrappers = array_diff_key(file_get_stream_wrappers(STREAM_WRAPPERS_ALL), file_get_stream_wrappers(STREAM_WRAPPERS_LOCAL));
  93. * @endcode
  94. *
  95. * @param $filter
  96. * (Optional) Filters out all types except those with an on bit for each on
  97. * bit in $filter. For example, if $filter is STREAM_WRAPPERS_WRITE_VISIBLE,
  98. * which is equal to (STREAM_WRAPPERS_READ | STREAM_WRAPPERS_WRITE |
  99. * STREAM_WRAPPERS_VISIBLE), then only stream wrappers with all three of these
  100. * bits set are returned. Defaults to STREAM_WRAPPERS_ALL, which returns all
  101. * registered stream wrappers.
  102. *
  103. * @return
  104. * An array keyed by scheme, with values containing an array of information
  105. * about the stream wrapper, as returned by hook_stream_wrappers(). If $filter
  106. * is omitted or set to STREAM_WRAPPERS_ALL, the entire Drupal stream wrapper
  107. * registry is returned. Otherwise only the stream wrappers whose 'type'
  108. * bitmask has an on bit for each bit specified in $filter are returned.
  109. *
  110. * @see hook_stream_wrappers()
  111. * @see hook_stream_wrappers_alter()
  112. */
  113. function file_get_stream_wrappers($filter = STREAM_WRAPPERS_ALL) {
  114. $wrappers_storage = &drupal_static(__FUNCTION__);
  115. if (!isset($wrappers_storage)) {
  116. $wrappers = module_invoke_all('stream_wrappers');
  117. foreach ($wrappers as $scheme => $info) {
  118. // Add defaults.
  119. $wrappers[$scheme] += array('type' => STREAM_WRAPPERS_NORMAL);
  120. }
  121. drupal_alter('stream_wrappers', $wrappers);
  122. $existing = stream_get_wrappers();
  123. foreach ($wrappers as $scheme => $info) {
  124. // We only register classes that implement our interface.
  125. if (in_array('DrupalStreamWrapperInterface', class_implements($info['class']), TRUE)) {
  126. // Record whether we are overriding an existing scheme.
  127. if (in_array($scheme, $existing, TRUE)) {
  128. $wrappers[$scheme]['override'] = TRUE;
  129. stream_wrapper_unregister($scheme);
  130. }
  131. else {
  132. $wrappers[$scheme]['override'] = FALSE;
  133. }
  134. if (($info['type'] & STREAM_WRAPPERS_LOCAL) == STREAM_WRAPPERS_LOCAL) {
  135. stream_wrapper_register($scheme, $info['class']);
  136. }
  137. else {
  138. stream_wrapper_register($scheme, $info['class'], STREAM_IS_URL);
  139. }
  140. }
  141. // Pre-populate the static cache with the filters most typically used.
  142. $wrappers_storage[STREAM_WRAPPERS_ALL][$scheme] = $wrappers[$scheme];
  143. if (($info['type'] & STREAM_WRAPPERS_WRITE_VISIBLE) == STREAM_WRAPPERS_WRITE_VISIBLE) {
  144. $wrappers_storage[STREAM_WRAPPERS_WRITE_VISIBLE][$scheme] = $wrappers[$scheme];
  145. }
  146. }
  147. }
  148. if (!isset($wrappers_storage[$filter])) {
  149. $wrappers_storage[$filter] = array();
  150. foreach ($wrappers_storage[STREAM_WRAPPERS_ALL] as $scheme => $info) {
  151. // Bit-wise filter.
  152. if (($info['type'] & $filter) == $filter) {
  153. $wrappers_storage[$filter][$scheme] = $info;
  154. }
  155. }
  156. }
  157. return $wrappers_storage[$filter];
  158. }
  159. /**
  160. * Returns the stream wrapper class name for a given scheme.
  161. *
  162. * @param $scheme
  163. * Stream scheme.
  164. *
  165. * @return
  166. * Return string if a scheme has a registered handler, or FALSE.
  167. */
  168. function file_stream_wrapper_get_class($scheme) {
  169. $wrappers = file_get_stream_wrappers();
  170. return empty($wrappers[$scheme]) ? FALSE : $wrappers[$scheme]['class'];
  171. }
  172. /**
  173. * Returns the scheme of a URI (e.g. a stream).
  174. *
  175. * @param $uri
  176. * A stream, referenced as "scheme://target".
  177. *
  178. * @return
  179. * A string containing the name of the scheme, or FALSE if none. For example,
  180. * the URI "public://example.txt" would return "public".
  181. *
  182. * @see file_uri_target()
  183. */
  184. function file_uri_scheme($uri) {
  185. $position = strpos($uri, '://');
  186. return $position ? substr($uri, 0, $position) : FALSE;
  187. }
  188. /**
  189. * Checks that the scheme of a stream URI is valid.
  190. *
  191. * Confirms that there is a registered stream handler for the provided scheme
  192. * and that it is callable. This is useful if you want to confirm a valid
  193. * scheme without creating a new instance of the registered handler.
  194. *
  195. * @param $scheme
  196. * A URI scheme, a stream is referenced as "scheme://target".
  197. *
  198. * @return
  199. * Returns TRUE if the string is the name of a validated stream,
  200. * or FALSE if the scheme does not have a registered handler.
  201. */
  202. function file_stream_wrapper_valid_scheme($scheme) {
  203. // Does the scheme have a registered handler that is callable?
  204. $class = file_stream_wrapper_get_class($scheme);
  205. if (class_exists($class)) {
  206. return TRUE;
  207. }
  208. else {
  209. return FALSE;
  210. }
  211. }
  212. /**
  213. * Returns the part of a URI after the schema.
  214. *
  215. * @param $uri
  216. * A stream, referenced as "scheme://target".
  217. *
  218. * @return
  219. * A string containing the target (path), or FALSE if none.
  220. * For example, the URI "public://sample/test.txt" would return
  221. * "sample/test.txt".
  222. *
  223. * @see file_uri_scheme()
  224. */
  225. function file_uri_target($uri) {
  226. $data = explode('://', $uri, 2);
  227. // Remove erroneous leading or trailing, forward-slashes and backslashes.
  228. return count($data) == 2 ? trim($data[1], '\/') : FALSE;
  229. }
  230. /**
  231. * Gets the default file stream implementation.
  232. *
  233. * @return
  234. * 'public', 'private' or any other file scheme defined as the default.
  235. */
  236. function file_default_scheme() {
  237. return variable_get('file_default_scheme', 'public');
  238. }
  239. /**
  240. * Normalizes a URI by making it syntactically correct.
  241. *
  242. * A stream is referenced as "scheme://target".
  243. *
  244. * The following actions are taken:
  245. * - Remove trailing slashes from target
  246. * - Trim erroneous leading slashes from target. e.g. ":///" becomes "://".
  247. *
  248. * @param $uri
  249. * String reference containing the URI to normalize.
  250. *
  251. * @return
  252. * The normalized URI.
  253. */
  254. function file_stream_wrapper_uri_normalize($uri) {
  255. // Inline file_uri_scheme() function call for performance reasons.
  256. $position = strpos($uri, '://');
  257. $scheme = $position ? substr($uri, 0, $position) : FALSE;
  258. if ($scheme && file_stream_wrapper_valid_scheme($scheme)) {
  259. $target = file_uri_target($uri);
  260. if ($target !== FALSE) {
  261. $uri = $scheme . '://' . $target;
  262. }
  263. }
  264. return $uri;
  265. }
  266. /**
  267. * Returns a reference to the stream wrapper class responsible for a given URI.
  268. *
  269. * The scheme determines the stream wrapper class that should be
  270. * used by consulting the stream wrapper registry.
  271. *
  272. * @param $uri
  273. * A stream, referenced as "scheme://target".
  274. *
  275. * @return
  276. * Returns a new stream wrapper object appropriate for the given URI or FALSE
  277. * if no registered handler could be found. For example, a URI of
  278. * "private://example.txt" would return a new private stream wrapper object
  279. * (DrupalPrivateStreamWrapper).
  280. */
  281. function file_stream_wrapper_get_instance_by_uri($uri) {
  282. $scheme = file_uri_scheme($uri);
  283. $class = file_stream_wrapper_get_class($scheme);
  284. if (class_exists($class)) {
  285. $instance = new $class();
  286. $instance->setUri($uri);
  287. return $instance;
  288. }
  289. else {
  290. return FALSE;
  291. }
  292. }
  293. /**
  294. * Returns a reference to the stream wrapper class responsible for a scheme.
  295. *
  296. * This helper method returns a stream instance using a scheme. That is, the
  297. * passed string does not contain a "://". For example, "public" is a scheme
  298. * but "public://" is a URI (stream). This is because the later contains both
  299. * a scheme and target despite target being empty.
  300. *
  301. * Note: the instance URI will be initialized to "scheme://" so that you can
  302. * make the customary method calls as if you had retrieved an instance by URI.
  303. *
  304. * @param $scheme
  305. * If the stream was "public://target", "public" would be the scheme.
  306. *
  307. * @return
  308. * Returns a new stream wrapper object appropriate for the given $scheme.
  309. * For example, for the public scheme a stream wrapper object
  310. * (DrupalPublicStreamWrapper).
  311. * FALSE is returned if no registered handler could be found.
  312. */
  313. function file_stream_wrapper_get_instance_by_scheme($scheme) {
  314. $class = file_stream_wrapper_get_class($scheme);
  315. if (class_exists($class)) {
  316. $instance = new $class();
  317. $instance->setUri($scheme . '://');
  318. return $instance;
  319. }
  320. else {
  321. return FALSE;
  322. }
  323. }
  324. /**
  325. * Creates a web-accessible URL for a stream to an external or local file.
  326. *
  327. * Compatibility: normal paths and stream wrappers.
  328. *
  329. * There are two kinds of local files:
  330. * - "managed files", i.e. those stored by a Drupal-compatible stream wrapper.
  331. * These are files that have either been uploaded by users or were generated
  332. * automatically (for example through CSS aggregation).
  333. * - "shipped files", i.e. those outside of the files directory, which ship as
  334. * part of Drupal core or contributed modules or themes.
  335. *
  336. * @param $uri
  337. * The URI to a file for which we need an external URL, or the path to a
  338. * shipped file.
  339. *
  340. * @return
  341. * A string containing a URL that may be used to access the file.
  342. * If the provided string already contains a preceding 'http', 'https', or
  343. * '/', nothing is done and the same string is returned. If a stream wrapper
  344. * could not be found to generate an external URL, then FALSE is returned.
  345. *
  346. * @see http://drupal.org/node/515192
  347. */
  348. function file_create_url($uri) {
  349. // Allow the URI to be altered, e.g. to serve a file from a CDN or static
  350. // file server.
  351. drupal_alter('file_url', $uri);
  352. $scheme = file_uri_scheme($uri);
  353. if (!$scheme) {
  354. // Allow for:
  355. // - root-relative URIs (e.g. /foo.jpg in http://example.com/foo.jpg)
  356. // - protocol-relative URIs (e.g. //bar.jpg, which is expanded to
  357. // http://example.com/bar.jpg by the browser when viewing a page over
  358. // HTTP and to https://example.com/bar.jpg when viewing a HTTPS page)
  359. // Both types of relative URIs are characterized by a leading slash, hence
  360. // we can use a single check.
  361. if (drupal_substr($uri, 0, 1) == '/') {
  362. return $uri;
  363. }
  364. else {
  365. // If this is not a properly formatted stream, then it is a shipped file.
  366. // Therefore, return the urlencoded URI with the base URL prepended.
  367. return $GLOBALS['base_url'] . '/' . drupal_encode_path($uri);
  368. }
  369. }
  370. elseif ($scheme == 'http' || $scheme == 'https') {
  371. // Check for HTTP so that we don't have to implement getExternalUrl() for
  372. // the HTTP wrapper.
  373. return $uri;
  374. }
  375. else {
  376. // Attempt to return an external URL using the appropriate wrapper.
  377. if ($wrapper = file_stream_wrapper_get_instance_by_uri($uri)) {
  378. return $wrapper->getExternalUrl();
  379. }
  380. else {
  381. return FALSE;
  382. }
  383. }
  384. }
  385. /**
  386. * Checks that the directory exists and is writable.
  387. *
  388. * Directories need to have execute permissions to be considered a directory by
  389. * FTP servers, etc.
  390. *
  391. * @param $directory
  392. * A string reference containing the name of a directory path or URI. A
  393. * trailing slash will be trimmed from a path.
  394. * @param $options
  395. * A bitmask to indicate if the directory should be created if it does
  396. * not exist (FILE_CREATE_DIRECTORY) or made writable if it is read-only
  397. * (FILE_MODIFY_PERMISSIONS).
  398. *
  399. * @return
  400. * TRUE if the directory exists (or was created) and is writable. FALSE
  401. * otherwise.
  402. */
  403. function file_prepare_directory(&$directory, $options = FILE_MODIFY_PERMISSIONS) {
  404. if (!file_stream_wrapper_valid_scheme(file_uri_scheme($directory))) {
  405. // Only trim if we're not dealing with a stream.
  406. $directory = rtrim($directory, '/\\');
  407. }
  408. // Check if directory exists.
  409. if (!is_dir($directory)) {
  410. // Let mkdir() recursively create directories and use the default directory
  411. // permissions.
  412. if (($options & FILE_CREATE_DIRECTORY) && @drupal_mkdir($directory, NULL, TRUE)) {
  413. return drupal_chmod($directory);
  414. }
  415. return FALSE;
  416. }
  417. // The directory exists, so check to see if it is writable.
  418. $writable = is_writable($directory);
  419. if (!$writable && ($options & FILE_MODIFY_PERMISSIONS)) {
  420. return drupal_chmod($directory);
  421. }
  422. return $writable;
  423. }
  424. /**
  425. * Creates a .htaccess file in each Drupal files directory if it is missing.
  426. */
  427. function file_ensure_htaccess() {
  428. file_create_htaccess('public://', FALSE);
  429. if (variable_get('file_private_path', FALSE)) {
  430. file_create_htaccess('private://', TRUE);
  431. }
  432. file_create_htaccess('temporary://', TRUE);
  433. }
  434. /**
  435. * Creates a .htaccess file in the given directory.
  436. *
  437. * @param $directory
  438. * The directory.
  439. * @param $private
  440. * FALSE indicates that $directory should be an open and public directory.
  441. * The default is TRUE which indicates a private and protected directory.
  442. * @param $force_overwrite
  443. * Set to TRUE to attempt to overwrite the existing .htaccess file if one is
  444. * already present. Defaults to FALSE.
  445. */
  446. function file_create_htaccess($directory, $private = TRUE, $force_overwrite = FALSE) {
  447. if (file_uri_scheme($directory)) {
  448. $directory = file_stream_wrapper_uri_normalize($directory);
  449. }
  450. else {
  451. $directory = rtrim($directory, '/\\');
  452. }
  453. $htaccess_path = $directory . '/.htaccess';
  454. if (file_exists($htaccess_path) && !$force_overwrite) {
  455. // Short circuit if the .htaccess file already exists.
  456. return;
  457. }
  458. $htaccess_lines = file_htaccess_lines($private);
  459. // Write the .htaccess file.
  460. if (file_put_contents($htaccess_path, $htaccess_lines)) {
  461. drupal_chmod($htaccess_path, 0444);
  462. }
  463. else {
  464. $variables = array('%directory' => $directory, '!htaccess' => '<br />' . nl2br(check_plain($htaccess_lines)));
  465. watchdog('security', "Security warning: Couldn't write .htaccess file. Please create a .htaccess file in your %directory directory which contains the following lines: <code>!htaccess</code>", $variables, WATCHDOG_ERROR);
  466. }
  467. }
  468. /**
  469. * Returns the standard .htaccess lines that Drupal writes to file directories.
  470. *
  471. * @param $private
  472. * (Optional) Set to FALSE to return the .htaccess lines for an open and
  473. * public directory. The default is TRUE, which returns the .htaccess lines
  474. * for a private and protected directory.
  475. *
  476. * @return
  477. * A string representing the desired contents of the .htaccess file.
  478. *
  479. * @see file_create_htaccess()
  480. */
  481. function file_htaccess_lines($private = TRUE) {
  482. $lines = <<<EOF
  483. # Turn off all options we don't need.
  484. Options None
  485. Options +FollowSymLinks
  486. # Set the catch-all handler to prevent scripts from being executed.
  487. SetHandler Drupal_Security_Do_Not_Remove_See_SA_2006_006
  488. <Files *>
  489. # Override the handler again if we're run later in the evaluation list.
  490. SetHandler Drupal_Security_Do_Not_Remove_See_SA_2013_003
  491. </Files>
  492. # If we know how to do it safely, disable the PHP engine entirely.
  493. <IfModule mod_php5.c>
  494. php_flag engine off
  495. </IfModule>
  496. <IfModule mod_php7.c>
  497. php_flag engine off
  498. </IfModule>
  499. EOF;
  500. if ($private) {
  501. $lines = <<<EOF
  502. # Deny all requests from Apache 2.4+.
  503. <IfModule mod_authz_core.c>
  504. Require all denied
  505. </IfModule>
  506. # Deny all requests from Apache 2.0-2.2.
  507. <IfModule !mod_authz_core.c>
  508. Deny from all
  509. </IfModule>
  510. EOF
  511. . "\n\n" . $lines;
  512. }
  513. return $lines;
  514. }
  515. /**
  516. * Loads file objects from the database.
  517. *
  518. * @param $fids
  519. * An array of file IDs.
  520. * @param $conditions
  521. * (deprecated) An associative array of conditions on the {file_managed}
  522. * table, where the keys are the database fields and the values are the
  523. * values those fields must have. Instead, it is preferable to use
  524. * EntityFieldQuery to retrieve a list of entity IDs loadable by
  525. * this function.
  526. *
  527. * @return
  528. * An array of file objects, indexed by fid.
  529. *
  530. * @todo Remove $conditions in Drupal 8.
  531. *
  532. * @see hook_file_load()
  533. * @see file_load()
  534. * @see entity_load()
  535. * @see EntityFieldQuery
  536. */
  537. function file_load_multiple($fids = array(), $conditions = array()) {
  538. return entity_load('file', $fids, $conditions);
  539. }
  540. /**
  541. * Loads a single file object from the database.
  542. *
  543. * @param $fid
  544. * A file ID.
  545. *
  546. * @return
  547. * An object representing the file, or FALSE if the file was not found.
  548. *
  549. * @see hook_file_load()
  550. * @see file_load_multiple()
  551. */
  552. function file_load($fid) {
  553. $files = file_load_multiple(array($fid), array());
  554. return reset($files);
  555. }
  556. /**
  557. * Saves a file object to the database.
  558. *
  559. * If the $file->fid is not set a new record will be added.
  560. *
  561. * @param $file
  562. * A file object returned by file_load().
  563. *
  564. * @return
  565. * The updated file object.
  566. *
  567. * @see hook_file_insert()
  568. * @see hook_file_update()
  569. */
  570. function file_save(stdClass $file) {
  571. $file->timestamp = REQUEST_TIME;
  572. $file->filesize = filesize($file->uri);
  573. // Load the stored entity, if any.
  574. if (!empty($file->fid) && !isset($file->original)) {
  575. $file->original = entity_load_unchanged('file', $file->fid);
  576. }
  577. module_invoke_all('file_presave', $file);
  578. module_invoke_all('entity_presave', $file, 'file');
  579. if (empty($file->fid)) {
  580. drupal_write_record('file_managed', $file);
  581. // Inform modules about the newly added file.
  582. module_invoke_all('file_insert', $file);
  583. module_invoke_all('entity_insert', $file, 'file');
  584. }
  585. else {
  586. drupal_write_record('file_managed', $file, 'fid');
  587. // Inform modules that the file has been updated.
  588. module_invoke_all('file_update', $file);
  589. module_invoke_all('entity_update', $file, 'file');
  590. }
  591. // Clear internal properties.
  592. unset($file->original);
  593. // Clear the static loading cache.
  594. entity_get_controller('file')->resetCache(array($file->fid));
  595. return $file;
  596. }
  597. /**
  598. * Determines where a file is used.
  599. *
  600. * @param $file
  601. * A file object.
  602. *
  603. * @return
  604. * A nested array with usage data. The first level is keyed by module name,
  605. * the second by object type and the third by the object id. The value
  606. * of the third level contains the usage count.
  607. *
  608. * @see file_usage_add()
  609. * @see file_usage_delete()
  610. */
  611. function file_usage_list(stdClass $file) {
  612. $result = db_select('file_usage', 'f')
  613. ->fields('f', array('module', 'type', 'id', 'count'))
  614. ->condition('fid', $file->fid)
  615. ->condition('count', 0, '>')
  616. ->execute();
  617. $references = array();
  618. foreach ($result as $usage) {
  619. $references[$usage->module][$usage->type][$usage->id] = $usage->count;
  620. }
  621. return $references;
  622. }
  623. /**
  624. * Records that a module is using a file.
  625. *
  626. * This usage information will be queried during file_delete() to ensure that
  627. * a file is not in use before it is physically removed from disk.
  628. *
  629. * Examples:
  630. * - A module that associates files with nodes, so $type would be
  631. * 'node' and $id would be the node's nid. Files for all revisions are stored
  632. * within a single nid.
  633. * - The User module associates an image with a user, so $type would be 'user'
  634. * and the $id would be the user's uid.
  635. *
  636. * @param $file
  637. * A file object.
  638. * @param $module
  639. * The name of the module using the file.
  640. * @param $type
  641. * The type of the object that contains the referenced file.
  642. * @param $id
  643. * The unique, numeric ID of the object containing the referenced file.
  644. * @param $count
  645. * (optional) The number of references to add to the object. Defaults to 1.
  646. *
  647. * @see file_usage_list()
  648. * @see file_usage_delete()
  649. */
  650. function file_usage_add(stdClass $file, $module, $type, $id, $count = 1) {
  651. db_merge('file_usage')
  652. ->key(array(
  653. 'fid' => $file->fid,
  654. 'module' => $module,
  655. 'type' => $type,
  656. 'id' => $id,
  657. ))
  658. ->fields(array('count' => $count))
  659. ->expression('count', 'count + :count', array(':count' => $count))
  660. ->execute();
  661. }
  662. /**
  663. * Removes a record to indicate that a module is no longer using a file.
  664. *
  665. * The file_delete() function is typically called after removing a file usage
  666. * to remove the record from the file_managed table and delete the file itself.
  667. *
  668. * @param $file
  669. * A file object.
  670. * @param $module
  671. * The name of the module using the file.
  672. * @param $type
  673. * (optional) The type of the object that contains the referenced file. May
  674. * be omitted if all module references to a file are being deleted.
  675. * @param $id
  676. * (optional) The unique, numeric ID of the object containing the referenced
  677. * file. May be omitted if all module references to a file are being deleted.
  678. * @param $count
  679. * (optional) The number of references to delete from the object. Defaults to
  680. * 1. 0 may be specified to delete all references to the file within a
  681. * specific object.
  682. *
  683. * @see file_usage_add()
  684. * @see file_usage_list()
  685. * @see file_delete()
  686. */
  687. function file_usage_delete(stdClass $file, $module, $type = NULL, $id = NULL, $count = 1) {
  688. // Delete rows that have a exact or less value to prevent empty rows.
  689. $query = db_delete('file_usage')
  690. ->condition('module', $module)
  691. ->condition('fid', $file->fid);
  692. if ($type && $id) {
  693. $query
  694. ->condition('type', $type)
  695. ->condition('id', $id);
  696. }
  697. if ($count) {
  698. $query->condition('count', $count, '<=');
  699. }
  700. $result = $query->execute();
  701. // If the row has more than the specified count decrement it by that number.
  702. if (!$result && $count > 0) {
  703. $query = db_update('file_usage')
  704. ->condition('module', $module)
  705. ->condition('fid', $file->fid);
  706. if ($type && $id) {
  707. $query
  708. ->condition('type', $type)
  709. ->condition('id', $id);
  710. }
  711. $query->expression('count', 'count - :count', array(':count' => $count));
  712. $query->execute();
  713. }
  714. }
  715. /**
  716. * Copies a file to a new location and adds a file record to the database.
  717. *
  718. * This function should be used when manipulating files that have records
  719. * stored in the database. This is a powerful function that in many ways
  720. * performs like an advanced version of copy().
  721. * - Checks if $source and $destination are valid and readable/writable.
  722. * - If file already exists in $destination either the call will error out,
  723. * replace the file or rename the file based on the $replace parameter.
  724. * - If the $source and $destination are equal, the behavior depends on the
  725. * $replace parameter. FILE_EXISTS_REPLACE will error out. FILE_EXISTS_RENAME
  726. * will rename the file until the $destination is unique.
  727. * - Adds the new file to the files database. If the source file is a
  728. * temporary file, the resulting file will also be a temporary file. See
  729. * file_save_upload() for details on temporary files.
  730. *
  731. * @param $source
  732. * A file object.
  733. * @param $destination
  734. * A string containing the destination that $source should be copied to.
  735. * This must be a stream wrapper URI.
  736. * @param $replace
  737. * Replace behavior when the destination file already exists:
  738. * - FILE_EXISTS_REPLACE - Replace the existing file. If a managed file with
  739. * the destination name exists then its database entry will be updated. If
  740. * no database entry is found then a new one will be created.
  741. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  742. * unique.
  743. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  744. *
  745. * @return
  746. * File object if the copy is successful, or FALSE in the event of an error.
  747. *
  748. * @see file_unmanaged_copy()
  749. * @see hook_file_copy()
  750. */
  751. function file_copy(stdClass $source, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  752. if (!file_valid_uri($destination)) {
  753. if (($realpath = drupal_realpath($source->uri)) !== FALSE) {
  754. watchdog('file', 'File %file (%realpath) could not be copied, because the destination %destination is invalid. This is often caused by improper use of file_copy() or a missing stream wrapper.', array('%file' => $source->uri, '%realpath' => $realpath, '%destination' => $destination));
  755. }
  756. else {
  757. watchdog('file', 'File %file could not be copied, because the destination %destination is invalid. This is often caused by improper use of file_copy() or a missing stream wrapper.', array('%file' => $source->uri, '%destination' => $destination));
  758. }
  759. drupal_set_message(t('The specified file %file could not be copied, because the destination is invalid. More information is available in the system log.', array('%file' => $source->uri)), 'error');
  760. return FALSE;
  761. }
  762. if ($uri = file_unmanaged_copy($source->uri, $destination, $replace)) {
  763. $file = clone $source;
  764. $file->fid = NULL;
  765. $file->uri = $uri;
  766. $file->filename = drupal_basename($uri);
  767. // If we are replacing an existing file re-use its database record.
  768. if ($replace == FILE_EXISTS_REPLACE) {
  769. $existing_files = file_load_multiple(array(), array('uri' => $uri));
  770. if (count($existing_files)) {
  771. $existing = reset($existing_files);
  772. $file->fid = $existing->fid;
  773. $file->filename = $existing->filename;
  774. }
  775. }
  776. // If we are renaming around an existing file (rather than a directory),
  777. // use its basename for the filename.
  778. elseif ($replace == FILE_EXISTS_RENAME && is_file($destination)) {
  779. $file->filename = drupal_basename($destination);
  780. }
  781. $file = file_save($file);
  782. // Inform modules that the file has been copied.
  783. module_invoke_all('file_copy', $file, $source);
  784. return $file;
  785. }
  786. return FALSE;
  787. }
  788. /**
  789. * Determines whether the URI has a valid scheme for file API operations.
  790. *
  791. * There must be a scheme and it must be a Drupal-provided scheme like
  792. * 'public', 'private', 'temporary', or an extension provided with
  793. * hook_stream_wrappers().
  794. *
  795. * @param $uri
  796. * The URI to be tested.
  797. *
  798. * @return
  799. * TRUE if the URI is allowed.
  800. */
  801. function file_valid_uri($uri) {
  802. // Assert that the URI has an allowed scheme. Barepaths are not allowed.
  803. $uri_scheme = file_uri_scheme($uri);
  804. if (empty($uri_scheme) || !file_stream_wrapper_valid_scheme($uri_scheme)) {
  805. return FALSE;
  806. }
  807. return TRUE;
  808. }
  809. /**
  810. * Copies a file to a new location without invoking the file API.
  811. *
  812. * This is a powerful function that in many ways performs like an advanced
  813. * version of copy().
  814. * - Checks if $source and $destination are valid and readable/writable.
  815. * - If file already exists in $destination either the call will error out,
  816. * replace the file or rename the file based on the $replace parameter.
  817. * - If the $source and $destination are equal, the behavior depends on the
  818. * $replace parameter. FILE_EXISTS_REPLACE will error out. FILE_EXISTS_RENAME
  819. * will rename the file until the $destination is unique.
  820. * - Provides a fallback using realpaths if the move fails using stream
  821. * wrappers. This can occur because PHP's copy() function does not properly
  822. * support streams if safe_mode or open_basedir are enabled. See
  823. * https://bugs.php.net/bug.php?id=60456
  824. *
  825. * @param $source
  826. * A string specifying the filepath or URI of the source file.
  827. * @param $destination
  828. * A URI containing the destination that $source should be copied to. The
  829. * URI may be a bare filepath (without a scheme). If this value is omitted,
  830. * Drupal's default files scheme will be used, usually "public://".
  831. * @param $replace
  832. * Replace behavior when the destination file already exists:
  833. * - FILE_EXISTS_REPLACE - Replace the existing file.
  834. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  835. * unique.
  836. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  837. *
  838. * @return
  839. * The path to the new file, or FALSE in the event of an error.
  840. *
  841. * @see file_copy()
  842. */
  843. function file_unmanaged_copy($source, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  844. $original_source = $source;
  845. // Assert that the source file actually exists.
  846. if (!file_exists($source)) {
  847. // @todo Replace drupal_set_message() calls with exceptions instead.
  848. drupal_set_message(t('The specified file %file could not be copied, because no file by that name exists. Please check that you supplied the correct filename.', array('%file' => $original_source)), 'error');
  849. if (($realpath = drupal_realpath($original_source)) !== FALSE) {
  850. watchdog('file', 'File %file (%realpath) could not be copied because it does not exist.', array('%file' => $original_source, '%realpath' => $realpath));
  851. }
  852. else {
  853. watchdog('file', 'File %file could not be copied because it does not exist.', array('%file' => $original_source));
  854. }
  855. return FALSE;
  856. }
  857. // Build a destination URI if necessary.
  858. if (!isset($destination)) {
  859. $destination = file_build_uri(drupal_basename($source));
  860. }
  861. // Prepare the destination directory.
  862. if (file_prepare_directory($destination)) {
  863. // The destination is already a directory, so append the source basename.
  864. $destination = file_stream_wrapper_uri_normalize($destination . '/' . drupal_basename($source));
  865. }
  866. else {
  867. // Perhaps $destination is a dir/file?
  868. $dirname = drupal_dirname($destination);
  869. if (!file_prepare_directory($dirname)) {
  870. // The destination is not valid.
  871. watchdog('file', 'File %file could not be copied, because the destination directory %destination is not configured correctly.', array('%file' => $original_source, '%destination' => $dirname));
  872. drupal_set_message(t('The specified file %file could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.', array('%file' => $original_source)), 'error');
  873. return FALSE;
  874. }
  875. }
  876. // Determine whether we can perform this operation based on overwrite rules.
  877. $destination = file_destination($destination, $replace);
  878. if ($destination === FALSE) {
  879. drupal_set_message(t('The file %file could not be copied because a file by that name already exists in the destination directory.', array('%file' => $original_source)), 'error');
  880. watchdog('file', 'File %file could not be copied because a file by that name already exists in the destination directory (%directory)', array('%file' => $original_source, '%directory' => $destination));
  881. return FALSE;
  882. }
  883. // Assert that the source and destination filenames are not the same.
  884. $real_source = drupal_realpath($source);
  885. $real_destination = drupal_realpath($destination);
  886. if ($source == $destination || ($real_source !== FALSE) && ($real_source == $real_destination)) {
  887. drupal_set_message(t('The specified file %file was not copied because it would overwrite itself.', array('%file' => $source)), 'error');
  888. watchdog('file', 'File %file could not be copied because it would overwrite itself.', array('%file' => $source));
  889. return FALSE;
  890. }
  891. // Make sure the .htaccess files are present.
  892. file_ensure_htaccess();
  893. // Perform the copy operation.
  894. if (!@copy($source, $destination)) {
  895. // If the copy failed and realpaths exist, retry the operation using them
  896. // instead.
  897. if ($real_source === FALSE || $real_destination === FALSE || !@copy($real_source, $real_destination)) {
  898. watchdog('file', 'The specified file %file could not be copied to %destination.', array('%file' => $source, '%destination' => $destination), WATCHDOG_ERROR);
  899. return FALSE;
  900. }
  901. }
  902. // Set the permissions on the new file.
  903. drupal_chmod($destination);
  904. return $destination;
  905. }
  906. /**
  907. * Constructs a URI to Drupal's default files location given a relative path.
  908. */
  909. function file_build_uri($path) {
  910. $uri = file_default_scheme() . '://' . $path;
  911. return file_stream_wrapper_uri_normalize($uri);
  912. }
  913. /**
  914. * Determines the destination path for a file.
  915. *
  916. * @param $destination
  917. * A string specifying the desired final URI or filepath.
  918. * @param $replace
  919. * Replace behavior when the destination file already exists.
  920. * - FILE_EXISTS_REPLACE - Replace the existing file.
  921. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  922. * unique.
  923. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  924. *
  925. * @return
  926. * The destination filepath, or FALSE if the file already exists
  927. * and FILE_EXISTS_ERROR is specified.
  928. *
  929. * @throws RuntimeException
  930. * Thrown if the filename contains invalid UTF-8.
  931. */
  932. function file_destination($destination, $replace) {
  933. $basename = drupal_basename($destination);
  934. if (!drupal_validate_utf8($basename)) {
  935. throw new RuntimeException(sprintf("Invalid filename '%s'", $basename));
  936. }
  937. if (file_exists($destination)) {
  938. switch ($replace) {
  939. case FILE_EXISTS_REPLACE:
  940. // Do nothing here, we want to overwrite the existing file.
  941. break;
  942. case FILE_EXISTS_RENAME:
  943. $directory = drupal_dirname($destination);
  944. $destination = file_create_filename($basename, $directory);
  945. break;
  946. case FILE_EXISTS_ERROR:
  947. // Error reporting handled by calling function.
  948. return FALSE;
  949. }
  950. }
  951. return $destination;
  952. }
  953. /**
  954. * Moves a file to a new location and update the file's database entry.
  955. *
  956. * Moving a file is performed by copying the file to the new location and then
  957. * deleting the original.
  958. * - Checks if $source and $destination are valid and readable/writable.
  959. * - Performs a file move if $source is not equal to $destination.
  960. * - If file already exists in $destination either the call will error out,
  961. * replace the file or rename the file based on the $replace parameter.
  962. * - Adds the new file to the files database.
  963. *
  964. * @param $source
  965. * A file object.
  966. * @param $destination
  967. * A string containing the destination that $source should be moved to.
  968. * This must be a stream wrapper URI.
  969. * @param $replace
  970. * Replace behavior when the destination file already exists:
  971. * - FILE_EXISTS_REPLACE - Replace the existing file. If a managed file with
  972. * the destination name exists then its database entry will be updated and
  973. * file_delete() called on the source file after hook_file_move is called.
  974. * If no database entry is found then the source files record will be
  975. * updated.
  976. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  977. * unique.
  978. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  979. *
  980. * @return
  981. * Resulting file object for success, or FALSE in the event of an error.
  982. *
  983. * @see file_unmanaged_move()
  984. * @see hook_file_move()
  985. */
  986. function file_move(stdClass $source, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  987. if (!file_valid_uri($destination)) {
  988. if (($realpath = drupal_realpath($source->uri)) !== FALSE) {
  989. watchdog('file', 'File %file (%realpath) could not be moved, because the destination %destination is invalid. This may be caused by improper use of file_move() or a missing stream wrapper.', array('%file' => $source->uri, '%realpath' => $realpath, '%destination' => $destination));
  990. }
  991. else {
  992. watchdog('file', 'File %file could not be moved, because the destination %destination is invalid. This may be caused by improper use of file_move() or a missing stream wrapper.', array('%file' => $source->uri, '%destination' => $destination));
  993. }
  994. drupal_set_message(t('The specified file %file could not be moved, because the destination is invalid. More information is available in the system log.', array('%file' => $source->uri)), 'error');
  995. return FALSE;
  996. }
  997. if ($uri = file_unmanaged_move($source->uri, $destination, $replace)) {
  998. $delete_source = FALSE;
  999. $file = clone $source;
  1000. $file->uri = $uri;
  1001. // If we are replacing an existing file re-use its database record.
  1002. if ($replace == FILE_EXISTS_REPLACE) {
  1003. $existing_files = file_load_multiple(array(), array('uri' => $uri));
  1004. if (count($existing_files)) {
  1005. $existing = reset($existing_files);
  1006. $delete_source = TRUE;
  1007. $file->fid = $existing->fid;
  1008. }
  1009. }
  1010. // If we are renaming around an existing file (rather than a directory),
  1011. // use its basename for the filename.
  1012. elseif ($replace == FILE_EXISTS_RENAME && is_file($destination)) {
  1013. $file->filename = drupal_basename($destination);
  1014. }
  1015. $file = file_save($file);
  1016. // Inform modules that the file has been moved.
  1017. module_invoke_all('file_move', $file, $source);
  1018. if ($delete_source) {
  1019. // Try a soft delete to remove original if it's not in use elsewhere.
  1020. file_delete($source);
  1021. }
  1022. return $file;
  1023. }
  1024. return FALSE;
  1025. }
  1026. /**
  1027. * Moves a file to a new location without database changes or hook invocation.
  1028. *
  1029. * @param $source
  1030. * A string specifying the filepath or URI of the original file.
  1031. * @param $destination
  1032. * A string containing the destination that $source should be moved to.
  1033. * This must be a stream wrapper URI. If this value is omitted, Drupal's
  1034. * default files scheme will be used, usually "public://".
  1035. * @param $replace
  1036. * Replace behavior when the destination file already exists:
  1037. * - FILE_EXISTS_REPLACE - Replace the existing file.
  1038. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  1039. * unique.
  1040. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  1041. *
  1042. * @return
  1043. * The URI of the moved file, or FALSE in the event of an error.
  1044. *
  1045. * @see file_move()
  1046. */
  1047. function file_unmanaged_move($source, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  1048. $filepath = file_unmanaged_copy($source, $destination, $replace);
  1049. if ($filepath == FALSE || file_unmanaged_delete($source) == FALSE) {
  1050. return FALSE;
  1051. }
  1052. return $filepath;
  1053. }
  1054. /**
  1055. * Modifies a filename as needed for security purposes.
  1056. *
  1057. * Munging a file name prevents unknown file extensions from masking exploit
  1058. * files. When web servers such as Apache decide how to process a URL request,
  1059. * they use the file extension. If the extension is not recognized, Apache
  1060. * skips that extension and uses the previous file extension. For example, if
  1061. * the file being requested is exploit.php.pps, and Apache does not recognize
  1062. * the '.pps' extension, it treats the file as PHP and executes it. To make
  1063. * this file name safe for Apache and prevent it from executing as PHP, the
  1064. * .php extension is "munged" into .php_, making the safe file name
  1065. * exploit.php_.pps.
  1066. *
  1067. * Specifically, this function adds an underscore to all extensions that are
  1068. * between 2 and 5 characters in length, internal to the file name, and not
  1069. * included in $extensions.
  1070. *
  1071. * Function behavior is also controlled by the Drupal variable
  1072. * 'allow_insecure_uploads'. If 'allow_insecure_uploads' evaluates to TRUE, no
  1073. * alterations will be made, if it evaluates to FALSE, the filename is 'munged'.
  1074. *
  1075. * @param $filename
  1076. * File name to modify.
  1077. * @param $extensions
  1078. * A space-separated list of extensions that should not be altered.
  1079. * @param $alerts
  1080. * If TRUE, drupal_set_message() will be called to display a message if the
  1081. * file name was changed.
  1082. *
  1083. * @return
  1084. * The potentially modified $filename.
  1085. */
  1086. function file_munge_filename($filename, $extensions, $alerts = TRUE) {
  1087. $original = $filename;
  1088. // Allow potentially insecure uploads for very savvy users and admin
  1089. if (!variable_get('allow_insecure_uploads', 0)) {
  1090. // Remove any null bytes. See http://php.net/manual/security.filesystem.nullbytes.php
  1091. $filename = str_replace(chr(0), '', $filename);
  1092. $whitelist = array_unique(explode(' ', strtolower(trim($extensions))));
  1093. // Split the filename up by periods. The first part becomes the basename
  1094. // the last part the final extension.
  1095. $filename_parts = explode('.', $filename);
  1096. $new_filename = array_shift($filename_parts); // Remove file basename.
  1097. $final_extension = array_pop($filename_parts); // Remove final extension.
  1098. // Loop through the middle parts of the name and add an underscore to the
  1099. // end of each section that could be a file extension but isn't in the list
  1100. // of allowed extensions.
  1101. foreach ($filename_parts as $filename_part) {
  1102. $new_filename .= '.' . $filename_part;
  1103. if (!in_array(strtolower($filename_part), $whitelist) && preg_match("/^[a-zA-Z]{2,5}\d?$/", $filename_part)) {
  1104. $new_filename .= '_';
  1105. }
  1106. }
  1107. $filename = $new_filename . '.' . $final_extension;
  1108. if ($alerts && $original != $filename) {
  1109. drupal_set_message(t('For security reasons, your upload has been renamed to %filename.', array('%filename' => $filename)));
  1110. }
  1111. }
  1112. return $filename;
  1113. }
  1114. /**
  1115. * Undoes the effect of file_munge_filename().
  1116. *
  1117. * @param $filename
  1118. * String with the filename to be unmunged.
  1119. *
  1120. * @return
  1121. * An unmunged filename string.
  1122. */
  1123. function file_unmunge_filename($filename) {
  1124. return str_replace('_.', '.', $filename);
  1125. }
  1126. /**
  1127. * Creates a full file path from a directory and filename.
  1128. *
  1129. * If a file with the specified name already exists, an alternative will be
  1130. * used.
  1131. *
  1132. * @param $basename
  1133. * String filename
  1134. * @param $directory
  1135. * String containing the directory or parent URI.
  1136. *
  1137. * @return
  1138. * File path consisting of $directory and a unique filename based off
  1139. * of $basename.
  1140. *
  1141. * @throws RuntimeException
  1142. * Thrown if the $basename is not valid UTF-8 or another error occurs
  1143. * stripping control characters.
  1144. */
  1145. function file_create_filename($basename, $directory) {
  1146. $original = $basename;
  1147. // Strip control characters (ASCII value < 32). Though these are allowed in
  1148. // some filesystems, not many applications handle them well.
  1149. $basename = preg_replace('/[\x00-\x1F]/u', '_', $basename);
  1150. if (preg_last_error() !== PREG_NO_ERROR) {
  1151. throw new RuntimeException(sprintf("Invalid filename '%s'", $original));
  1152. }
  1153. if (substr(PHP_OS, 0, 3) == 'WIN') {
  1154. // These characters are not allowed in Windows filenames
  1155. $basename = str_replace(array(':', '*', '?', '"', '<', '>', '|'), '_', $basename);
  1156. }
  1157. // A URI or path may already have a trailing slash or look like "public://".
  1158. if (substr($directory, -1) == '/') {
  1159. $separator = '';
  1160. }
  1161. else {
  1162. $separator = '/';
  1163. }
  1164. $destination = $directory . $separator . $basename;
  1165. if (file_exists($destination)) {
  1166. // Destination file already exists, generate an alternative.
  1167. $pos = strrpos($basename, '.');
  1168. if ($pos !== FALSE) {
  1169. $name = substr($basename, 0, $pos);
  1170. $ext = substr($basename, $pos);
  1171. }
  1172. else {
  1173. $name = $basename;
  1174. $ext = '';
  1175. }
  1176. $counter = 0;
  1177. do {
  1178. $destination = $directory . $separator . $name . '_' . $counter++ . $ext;
  1179. } while (file_exists($destination));
  1180. }
  1181. return $destination;
  1182. }
  1183. /**
  1184. * Deletes a file and its database record.
  1185. *
  1186. * If the $force parameter is not TRUE, file_usage_list() will be called to
  1187. * determine if the file is being used by any modules. If the file is being
  1188. * used the delete will be canceled.
  1189. *
  1190. * @param $file
  1191. * A file object.
  1192. * @param $force
  1193. * Boolean indicating that the file should be deleted even if the file is
  1194. * reported as in use by the file_usage table.
  1195. *
  1196. * @return mixed
  1197. * TRUE for success, FALSE in the event of an error, or an array if the file
  1198. * is being used by any modules.
  1199. *
  1200. * @see file_unmanaged_delete()
  1201. * @see file_usage_list()
  1202. * @see file_usage_delete()
  1203. * @see hook_file_delete()
  1204. */
  1205. function file_delete(stdClass $file, $force = FALSE) {
  1206. if (!file_valid_uri($file->uri)) {
  1207. if (($realpath = drupal_realpath($file->uri)) !== FALSE) {
  1208. watchdog('file', 'File %file (%realpath) could not be deleted because it is not a valid URI. This may be caused by improper use of file_delete() or a missing stream wrapper.', array('%file' => $file->uri, '%realpath' => $realpath));
  1209. }
  1210. else {
  1211. watchdog('file', 'File %file could not be deleted because it is not a valid URI. This may be caused by improper use of file_delete() or a missing stream wrapper.', array('%file' => $file->uri));
  1212. }
  1213. drupal_set_message(t('The specified file %file could not be deleted, because it is not a valid URI. More information is available in the system log.', array('%file' => $file->uri)), 'error');
  1214. return FALSE;
  1215. }
  1216. // If any module still has a usage entry in the file_usage table, the file
  1217. // will not be deleted, but file_delete() will return a populated array
  1218. // that tests as TRUE.
  1219. if (!$force && ($references = file_usage_list($file))) {
  1220. return $references;
  1221. }
  1222. // Let other modules clean up any references to the deleted file.
  1223. module_invoke_all('file_delete', $file);
  1224. module_invoke_all('entity_delete', $file, 'file');
  1225. // Make sure the file is deleted before removing its row from the
  1226. // database, so UIs can still find the file in the database.
  1227. if (file_unmanaged_delete($file->uri)) {
  1228. db_delete('file_managed')->condition('fid', $file->fid)->execute();
  1229. db_delete('file_usage')->condition('fid', $file->fid)->execute();
  1230. entity_get_controller('file')->resetCache();
  1231. return TRUE;
  1232. }
  1233. return FALSE;
  1234. }
  1235. /**
  1236. * Deletes a file without database changes or hook invocations.
  1237. *
  1238. * This function should be used when the file to be deleted does not have an
  1239. * entry recorded in the files table.
  1240. *
  1241. * @param $path
  1242. * A string containing a file path or (streamwrapper) URI.
  1243. *
  1244. * @return
  1245. * TRUE for success or path does not exist, or FALSE in the event of an
  1246. * error.
  1247. *
  1248. * @see file_delete()
  1249. * @see file_unmanaged_delete_recursive()
  1250. */
  1251. function file_unmanaged_delete($path) {
  1252. if (is_dir($path)) {
  1253. watchdog('file', '%path is a directory and cannot be removed using file_unmanaged_delete().', array('%path' => $path), WATCHDOG_ERROR);
  1254. return FALSE;
  1255. }
  1256. if (is_file($path)) {
  1257. return drupal_unlink($path);
  1258. }
  1259. // Return TRUE for non-existent file, but log that nothing was actually
  1260. // deleted, as the current state is the intended result.
  1261. if (!file_exists($path)) {
  1262. watchdog('file', 'The file %path was not deleted, because it does not exist.', array('%path' => $path), WATCHDOG_NOTICE);
  1263. return TRUE;
  1264. }
  1265. // We cannot handle anything other than files and directories. Log an error
  1266. // for everything else (sockets, symbolic links, etc).
  1267. watchdog('file', 'The file %path is not of a recognized type so it was not deleted.', array('%path' => $path), WATCHDOG_ERROR);
  1268. return FALSE;
  1269. }
  1270. /**
  1271. * Deletes all files and directories in the specified filepath recursively.
  1272. *
  1273. * If the specified path is a directory then the function will call itself
  1274. * recursively to process the contents. Once the contents have been removed the
  1275. * directory will also be removed.
  1276. *
  1277. * If the specified path is a file then it will be passed to
  1278. * file_unmanaged_delete().
  1279. *
  1280. * Note that this only deletes visible files with write permission.
  1281. *
  1282. * @param $path
  1283. * A string containing either an URI or a file or directory path.
  1284. *
  1285. * @return
  1286. * TRUE for success or if path does not exist, FALSE in the event of an
  1287. * error.
  1288. *
  1289. * @see file_unmanaged_delete()
  1290. */
  1291. function file_unmanaged_delete_recursive($path) {
  1292. if (is_dir($path)) {
  1293. $dir = dir($path);
  1294. while (($entry = $dir->read()) !== FALSE) {
  1295. if ($entry == '.' || $entry == '..') {
  1296. continue;
  1297. }
  1298. $entry_path = $path . '/' . $entry;
  1299. file_unmanaged_delete_recursive($entry_path);
  1300. }
  1301. $dir->close();
  1302. return drupal_rmdir($path);
  1303. }
  1304. return file_unmanaged_delete($path);
  1305. }
  1306. /**
  1307. * Determines total disk space used by a single user or the whole filesystem.
  1308. *
  1309. * @param $uid
  1310. * Optional. A user id, specifying NULL returns the total space used by all
  1311. * non-temporary files.
  1312. * @param $status
  1313. * Optional. The file status to consider. The default is to only
  1314. * consider files in status FILE_STATUS_PERMANENT.
  1315. *
  1316. * @return
  1317. * An integer containing the number of bytes used.
  1318. */
  1319. function file_space_used($uid = NULL, $status = FILE_STATUS_PERMANENT) {
  1320. $query = db_select('file_managed', 'f');
  1321. $query->condition('f.status', $status);
  1322. $query->addExpression('SUM(f.filesize)', 'filesize');
  1323. if (isset($uid)) {
  1324. $query->condition('f.uid', $uid);
  1325. }
  1326. return $query->execute()->fetchField();
  1327. }
  1328. /**
  1329. * Saves a file upload to a new location.
  1330. *
  1331. * The file will be added to the {file_managed} table as a temporary file.
  1332. * Temporary files are periodically cleaned. To make the file a permanent file,
  1333. * assign the status and use file_save() to save the changes.
  1334. *
  1335. * @param $form_field_name
  1336. * A string that is the associative array key of the upload form element in
  1337. * the form array.
  1338. * @param $validators
  1339. * An optional, associative array of callback functions used to validate the
  1340. * file. See file_validate() for a full discussion of the array format.
  1341. * If no extension validator is provided it will default to a limited safe
  1342. * list of extensions which is as follows: "jpg jpeg gif png txt
  1343. * doc xls pdf ppt pps odt ods odp". To allow all extensions you must
  1344. * explicitly set the 'file_validate_extensions' validator to an empty array
  1345. * (Beware: this is not safe and should only be allowed for trusted users, if
  1346. * at all).
  1347. * @param $destination
  1348. * A string containing the URI that the file should be copied to. This must
  1349. * be a stream wrapper URI. If this value is omitted, Drupal's temporary
  1350. * files scheme will be used ("temporary://").
  1351. * @param $replace
  1352. * Replace behavior when the destination file already exists:
  1353. * - FILE_EXISTS_REPLACE: Replace the existing file.
  1354. * - FILE_EXISTS_RENAME: Append _{incrementing number} until the filename is
  1355. * unique.
  1356. * - FILE_EXISTS_ERROR: Do nothing and return FALSE.
  1357. *
  1358. * @return
  1359. * An object containing the file information if the upload succeeded, FALSE
  1360. * in the event of an error, or NULL if no file was uploaded. The
  1361. * documentation for the "File interface" group, which you can find under
  1362. * Related topics, or the header at the top of this file, documents the
  1363. * components of a file object. In addition to the standard components,
  1364. * this function adds:
  1365. * - source: Path to the file before it is moved.
  1366. * - destination: Path to the file after it is moved (same as 'uri').
  1367. */
  1368. function file_save_upload($form_field_name, $validators = array(), $destination = FALSE, $replace = FILE_EXISTS_RENAME) {
  1369. global $user;
  1370. static $upload_cache;
  1371. // Return cached objects without processing since the file will have
  1372. // already been processed and the paths in _FILES will be invalid.
  1373. if (isset($upload_cache[$form_field_name])) {
  1374. return $upload_cache[$form_field_name];
  1375. }
  1376. // Make sure there's an upload to process.
  1377. if (empty($_FILES['files']['name'][$form_field_name])) {
  1378. return NULL;
  1379. }
  1380. // Check for file upload errors and return FALSE if a lower level system
  1381. // error occurred. For a complete list of errors:
  1382. // See http://php.net/manual/features.file-upload.errors.php.
  1383. switch ($_FILES['files']['error'][$form_field_name]) {
  1384. case UPLOAD_ERR_INI_SIZE:
  1385. case UPLOAD_ERR_FORM_SIZE:
  1386. drupal_set_message(t('The file %file could not be saved, because it exceeds %maxsize, the maximum allowed size for uploads.', array('%file' => $_FILES['files']['name'][$form_field_name], '%maxsize' => format_size(file_upload_max_size()))), 'error');
  1387. return FALSE;
  1388. case UPLOAD_ERR_PARTIAL:
  1389. case UPLOAD_ERR_NO_FILE:
  1390. drupal_set_message(t('The file %file could not be saved, because the upload did not complete.', array('%file' => $_FILES['files']['name'][$form_field_name])), 'error');
  1391. return FALSE;
  1392. case UPLOAD_ERR_OK:
  1393. // Final check that this is a valid upload, if it isn't, use the
  1394. // default error handler.
  1395. if (is_uploaded_file($_FILES['files']['tmp_name'][$form_field_name])) {
  1396. break;
  1397. }
  1398. // Unknown error
  1399. default:
  1400. drupal_set_message(t('The file %file could not be saved. An unknown error has occurred.', array('%file' => $_FILES['files']['name'][$form_field_name])), 'error');
  1401. return FALSE;
  1402. }
  1403. // Begin building file object.
  1404. $file = new stdClass();
  1405. $file->uid = $user->uid;
  1406. $file->status = 0;
  1407. $file->filename = trim(drupal_basename($_FILES['files']['name'][$form_field_name]), '.');
  1408. $file->uri = $_FILES['files']['tmp_name'][$form_field_name];
  1409. $file->filemime = file_get_mimetype($file->filename);
  1410. $file->filesize = $_FILES['files']['size'][$form_field_name];
  1411. $extensions = '';
  1412. if (isset($validators['file_validate_extensions'])) {
  1413. if (isset($validators['file_validate_extensions'][0])) {
  1414. // Build the list of non-munged extensions if the caller provided them.
  1415. $extensions = $validators['file_validate_extensions'][0];
  1416. }
  1417. else {
  1418. // If 'file_validate_extensions' is set and the list is empty then the
  1419. // caller wants to allow any extension. In this case we have to remove the
  1420. // validator or else it will reject all extensions.
  1421. unset($validators['file_validate_extensions']);
  1422. }
  1423. }
  1424. else {
  1425. // No validator was provided, so add one using the default list.
  1426. // Build a default non-munged safe list for file_munge_filename().
  1427. $extensions = 'jpg jpeg gif png txt doc xls pdf ppt pps odt ods odp';
  1428. $validators['file_validate_extensions'] = array();
  1429. $validators['file_validate_extensions'][0] = $extensions;
  1430. }
  1431. if (!empty($extensions)) {
  1432. // Munge the filename to protect against possible malicious extension hiding
  1433. // within an unknown file type (ie: filename.html.foo).
  1434. $file->filename = file_munge_filename($file->filename, $extensions);
  1435. }
  1436. // Rename potentially executable files, to help prevent exploits (i.e. will
  1437. // rename filename.php.foo and filename.php to filename.php.foo.txt and
  1438. // filename.php.txt, respectively). Don't rename if 'allow_insecure_uploads'
  1439. // evaluates to TRUE.
  1440. if (!variable_get('allow_insecure_uploads', 0) && preg_match('/\.(php|phar|pl|py|cgi|asp|js)(\.|$)/i', $file->filename) && (substr($file->filename, -4) != '.txt')) {
  1441. $file->filemime = 'text/plain';
  1442. // The destination filename will also later be used to create the URI.
  1443. $file->filename .= '.txt';
  1444. // The .txt extension may not be in the allowed list of extensions. We have
  1445. // to add it here or else the file upload will fail.
  1446. if (!empty($extensions)) {
  1447. $validators['file_validate_extensions'][0] .= ' txt';
  1448. drupal_set_message(t('For security reasons, your upload has been renamed to %filename.', array('%filename' => $file->filename)));
  1449. }
  1450. }
  1451. // If the destination is not provided, use the temporary directory.
  1452. if (empty($destination)) {
  1453. $destination = 'temporary://';
  1454. }
  1455. // Assert that the destination contains a valid stream.
  1456. $destination_scheme = file_uri_scheme($destination);
  1457. if (!$destination_scheme || !file_stream_wrapper_valid_scheme($destination_scheme)) {
  1458. drupal_set_message(t('The file could not be uploaded, because the destination %destination is invalid.', array('%destination' => $destination)), 'error');
  1459. return FALSE;
  1460. }
  1461. $file->source = $form_field_name;
  1462. // A URI may already have a trailing slash or look like "public://".
  1463. if (substr($destination, -1) != '/') {
  1464. $destination .= '/';
  1465. }
  1466. try {
  1467. $file->destination = file_destination($destination . $file->filename, $replace);
  1468. }
  1469. catch (RuntimeException $e) {
  1470. drupal_set_message(t('The file %source could not be uploaded because the name is invalid.', array('%source' => $form_field_name)), 'error');
  1471. return FALSE;
  1472. }
  1473. // If file_destination() returns FALSE then $replace == FILE_EXISTS_ERROR and
  1474. // there's an existing file so we need to bail.
  1475. if ($file->destination === FALSE) {
  1476. drupal_set_message(t('The file %source could not be uploaded because a file by that name already exists in the destination %directory.', array('%source' => $form_field_name, '%directory' => $destination)), 'error');
  1477. return FALSE;
  1478. }
  1479. // Add in our check of the file name length.
  1480. $validators['file_validate_name_length'] = array();
  1481. // Call the validation functions specified by this function's caller.
  1482. $errors = file_validate($file, $validators);
  1483. // Check for errors.
  1484. if (!empty($errors)) {
  1485. $message = t('The specified file %name could not be uploaded.', array('%name' => $file->filename));
  1486. if (count($errors) > 1) {
  1487. $message .= theme('item_list', array('items' => $errors));
  1488. }
  1489. else {
  1490. $message .= ' ' . array_pop($errors);
  1491. }
  1492. form_set_error($form_field_name, $message);
  1493. return FALSE;
  1494. }
  1495. // Move uploaded files from PHP's upload_tmp_dir to Drupal's temporary
  1496. // directory. This overcomes open_basedir restrictions for future file
  1497. // operations.
  1498. $file->uri = $file->destination;
  1499. if (!drupal_move_uploaded_file($_FILES['files']['tmp_name'][$form_field_name], $file->uri)) {
  1500. form_set_error($form_field_name, t('File upload error. Could not move uploaded file.'));
  1501. watchdog('file', 'Upload error. Could not move uploaded file %file to destination %destination.', array('%file' => $file->filename, '%destination' => $file->uri));
  1502. return FALSE;
  1503. }
  1504. // Set the permissions on the new file.
  1505. drupal_chmod($file->uri);
  1506. // If we are replacing an existing file re-use its database record.
  1507. if ($replace == FILE_EXISTS_REPLACE) {
  1508. $existing_files = file_load_multiple(array(), array('uri' => $file->uri));
  1509. if (count($existing_files)) {
  1510. $existing = reset($existing_files);
  1511. $file->fid = $existing->fid;
  1512. }
  1513. }
  1514. // If we made it this far it's safe to record this file in the database.
  1515. if ($file = file_save($file)) {
  1516. // Track non-public files in the session if they were uploaded by an
  1517. // anonymous user. This allows modules such as the File module to only
  1518. // grant view access to the specific anonymous user who uploaded the file.
  1519. // See file_file_download().
  1520. // The 'file_public_schema' variable is used to allow other publicly
  1521. // accessible file schemes to be treated the same as the public:// scheme
  1522. // provided by Drupal core and to avoid adding unnecessary data to the
  1523. // session (and the resulting bypass of the page cache) in those cases. For
  1524. // security reasons, only schemes that are completely publicly accessible,
  1525. // with no download restrictions, should be added to this variable. See
  1526. // file_managed_file_value().
  1527. if (!$user->uid && !in_array($destination_scheme, variable_get('file_public_schema', array('public')))) {
  1528. $_SESSION['anonymous_allowed_file_ids'][$file->fid] = $file->fid;
  1529. }
  1530. // Add file to the cache.
  1531. $upload_cache[$form_field_name] = $file;
  1532. return $file;
  1533. }
  1534. return FALSE;
  1535. }
  1536. /**
  1537. * Moves an uploaded file to a new location.
  1538. *
  1539. * PHP's move_uploaded_file() does not properly support streams if safe_mode
  1540. * or open_basedir are enabled, so this function fills that gap.
  1541. *
  1542. * Compatibility: normal paths and stream wrappers.
  1543. *
  1544. * @param $filename
  1545. * The filename of the uploaded file.
  1546. * @param $uri
  1547. * A string containing the destination URI of the file.
  1548. *
  1549. * @return
  1550. * TRUE on success, or FALSE on failure.
  1551. *
  1552. * @see move_uploaded_file()
  1553. * @see http://drupal.org/node/515192
  1554. * @ingroup php_wrappers
  1555. */
  1556. function drupal_move_uploaded_file($filename, $uri) {
  1557. $result = @move_uploaded_file($filename, $uri);
  1558. // PHP's move_uploaded_file() does not properly support streams if safe_mode
  1559. // or open_basedir are enabled so if the move failed, try finding a real path
  1560. // and retry the move operation.
  1561. if (!$result) {
  1562. if ($realpath = drupal_realpath($uri)) {
  1563. $result = move_uploaded_file($filename, $realpath);
  1564. }
  1565. else {
  1566. $result = move_uploaded_file($filename, $uri);
  1567. }
  1568. }
  1569. return $result;
  1570. }
  1571. /**
  1572. * Checks that a file meets the criteria specified by the validators.
  1573. *
  1574. * After executing the validator callbacks specified hook_file_validate() will
  1575. * also be called to allow other modules to report errors about the file.
  1576. *
  1577. * @param $file
  1578. * A Drupal file object.
  1579. * @param $validators
  1580. * An optional, associative array of callback functions used to validate the
  1581. * file. The keys are function names and the values arrays of callback
  1582. * parameters which will be passed in after the file object. The
  1583. * functions should return an array of error messages; an empty array
  1584. * indicates that the file passed validation. The functions will be called in
  1585. * the order specified.
  1586. *
  1587. * @return
  1588. * An array containing validation error messages.
  1589. *
  1590. * @see hook_file_validate()
  1591. */
  1592. function file_validate(stdClass &$file, $validators = array()) {
  1593. // Call the validation functions specified by this function's caller.
  1594. $errors = array();
  1595. foreach ($validators as $function => $args) {
  1596. if (function_exists($function)) {
  1597. array_unshift($args, $file);
  1598. $errors = array_merge($errors, call_user_func_array($function, $args));
  1599. }
  1600. }
  1601. // Let other modules perform validation on the new file.
  1602. return array_merge($errors, module_invoke_all('file_validate', $file));
  1603. }
  1604. /**
  1605. * Checks for files with names longer than we can store in the database.
  1606. *
  1607. * @param $file
  1608. * A Drupal file object.
  1609. *
  1610. * @return
  1611. * An array. If the file name is too long, it will contain an error message.
  1612. */
  1613. function file_validate_name_length(stdClass $file) {
  1614. $errors = array();
  1615. if (empty($file->filename)) {
  1616. $errors[] = t("The file's name is empty. Please give a name to the file.");
  1617. }
  1618. if (strlen($file->filename) > 240) {
  1619. $errors[] = t("The file's name exceeds the 240 characters limit. Please rename the file and try again.");
  1620. }
  1621. return $errors;
  1622. }
  1623. /**
  1624. * Checks that the filename ends with an allowed extension.
  1625. *
  1626. * @param $file
  1627. * A Drupal file object.
  1628. * @param $extensions
  1629. * A string with a space separated list of allowed extensions.
  1630. *
  1631. * @return
  1632. * An array. If the file extension is not allowed, it will contain an error
  1633. * message.
  1634. *
  1635. * @see hook_file_validate()
  1636. */
  1637. function file_validate_extensions(stdClass $file, $extensions) {
  1638. $errors = array();
  1639. $regex = '/\.(' . preg_replace('/ +/', '|', preg_quote($extensions)) . ')$/i';
  1640. if (!preg_match($regex, $file->filename)) {
  1641. $errors[] = t('Only files with the following extensions are allowed: %files-allowed.', array('%files-allowed' => $extensions));
  1642. }
  1643. return $errors;
  1644. }
  1645. /**
  1646. * Checks that the file's size is below certain limits.
  1647. *
  1648. * @param $file
  1649. * A Drupal file object.
  1650. * @param $file_limit
  1651. * An integer specifying the maximum file size in bytes. Zero indicates that
  1652. * no limit should be enforced.
  1653. * @param $user_limit
  1654. * An integer specifying the maximum number of bytes the user is allowed.
  1655. * Zero indicates that no limit should be enforced.
  1656. *
  1657. * @return
  1658. * An array. If the file size exceeds limits, it will contain an error
  1659. * message.
  1660. *
  1661. * @see hook_file_validate()
  1662. */
  1663. function file_validate_size(stdClass $file, $file_limit = 0, $user_limit = 0) {
  1664. global $user;
  1665. $errors = array();
  1666. if ($file_limit && $file->filesize > $file_limit) {
  1667. $errors[] = t('The file is %filesize exceeding the maximum file size of %maxsize.', array('%filesize' => format_size($file->filesize), '%maxsize' => format_size($file_limit)));
  1668. }
  1669. // Save a query by only calling file_space_used() when a limit is provided.
  1670. if ($user_limit && (file_space_used($user->uid) + $file->filesize) > $user_limit) {
  1671. $errors[] = t('The file is %filesize which would exceed your disk quota of %quota.', array('%filesize' => format_size($file->filesize), '%quota' => format_size($user_limit)));
  1672. }
  1673. return $errors;
  1674. }
  1675. /**
  1676. * Checks that the file is recognized by image_get_info() as an image.
  1677. *
  1678. * @param $file
  1679. * A Drupal file object.
  1680. *
  1681. * @return
  1682. * An array. If the file is not an image, it will contain an error message.
  1683. *
  1684. * @see hook_file_validate()
  1685. */
  1686. function file_validate_is_image(stdClass $file) {
  1687. $errors = array();
  1688. $info = image_get_info($file->uri);
  1689. if (!$info || empty($info['extension'])) {
  1690. $errors[] = t('Only JPEG, PNG and GIF images are allowed.');
  1691. }
  1692. return $errors;
  1693. }
  1694. /**
  1695. * Verifies that image dimensions are within the specified maximum and minimum.
  1696. *
  1697. * Non-image files will be ignored. If an image toolkit is available the image
  1698. * will be scaled to fit within the desired maximum dimensions.
  1699. *
  1700. * @param $file
  1701. * A Drupal file object. This function may resize the file affecting its
  1702. * size.
  1703. * @param $maximum_dimensions
  1704. * An optional string in the form WIDTHxHEIGHT e.g. '640x480' or '85x85'. If
  1705. * an image toolkit is installed the image will be resized down to these
  1706. * dimensions. A value of 0 indicates no restriction on size, so resizing
  1707. * will be attempted.
  1708. * @param $minimum_dimensions
  1709. * An optional string in the form WIDTHxHEIGHT. This will check that the
  1710. * image meets a minimum size. A value of 0 indicates no restriction.
  1711. *
  1712. * @return
  1713. * An array. If the file is an image and did not meet the requirements, it
  1714. * will contain an error message.
  1715. *
  1716. * @see hook_file_validate()
  1717. */
  1718. function file_validate_image_resolution(stdClass $file, $maximum_dimensions = 0, $minimum_dimensions = 0) {
  1719. $errors = array();
  1720. // Check first that the file is an image.
  1721. if ($info = image_get_info($file->uri)) {
  1722. if ($maximum_dimensions) {
  1723. // Check that it is smaller than the given dimensions.
  1724. list($width, $height) = explode('x', $maximum_dimensions);
  1725. if ($info['width'] > $width || $info['height'] > $height) {
  1726. // Try to resize the image to fit the dimensions.
  1727. if ($image = image_load($file->uri)) {
  1728. image_scale($image, $width, $height);
  1729. image_save($image);
  1730. $file->filesize = $image->info['file_size'];
  1731. drupal_set_message(t('The image was resized to fit within the maximum allowed dimensions of %dimensions pixels.', array('%dimensions' => $maximum_dimensions)));
  1732. }
  1733. else {
  1734. $errors[] = t('The image is too large; the maximum dimensions are %dimensions pixels.', array('%dimensions' => $maximum_dimensions));
  1735. }
  1736. }
  1737. }
  1738. if ($minimum_dimensions) {
  1739. // Check that it is larger than the given dimensions.
  1740. list($width, $height) = explode('x', $minimum_dimensions);
  1741. if ($info['width'] < $width || $info['height'] < $height) {
  1742. $errors[] = t('The image is too small; the minimum dimensions are %dimensions pixels.', array('%dimensions' => $minimum_dimensions));
  1743. }
  1744. }
  1745. }
  1746. return $errors;
  1747. }
  1748. /**
  1749. * Saves a file to the specified destination and creates a database entry.
  1750. *
  1751. * @param $data
  1752. * A string containing the contents of the file.
  1753. * @param $destination
  1754. * A string containing the destination URI. This must be a stream wrapper URI.
  1755. * If no value is provided, a randomized name will be generated and the file
  1756. * will be saved using Drupal's default files scheme, usually "public://".
  1757. * @param $replace
  1758. * Replace behavior when the destination file already exists:
  1759. * - FILE_EXISTS_REPLACE - Replace the existing file. If a managed file with
  1760. * the destination name exists then its database entry will be updated. If
  1761. * no database entry is found then a new one will be created.
  1762. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  1763. * unique.
  1764. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  1765. *
  1766. * @return
  1767. * A file object, or FALSE on error.
  1768. *
  1769. * @see file_unmanaged_save_data()
  1770. */
  1771. function file_save_data($data, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  1772. global $user;
  1773. if (empty($destination)) {
  1774. $destination = file_default_scheme() . '://';
  1775. }
  1776. if (!file_valid_uri($destination)) {
  1777. watchdog('file', 'The data could not be saved because the destination %destination is invalid. This may be caused by improper use of file_save_data() or a missing stream wrapper.', array('%destination' => $destination));
  1778. drupal_set_message(t('The data could not be saved, because the destination is invalid. More information is available in the system log.'), 'error');
  1779. return FALSE;
  1780. }
  1781. if ($uri = file_unmanaged_save_data($data, $destination, $replace)) {
  1782. // Create a file object.
  1783. $file = new stdClass();
  1784. $file->fid = NULL;
  1785. $file->uri = $uri;
  1786. $file->filename = drupal_basename($uri);
  1787. $file->filemime = file_get_mimetype($file->uri);
  1788. $file->uid = $user->uid;
  1789. $file->status = FILE_STATUS_PERMANENT;
  1790. // If we are replacing an existing file re-use its database record.
  1791. if ($replace == FILE_EXISTS_REPLACE) {
  1792. $existing_files = file_load_multiple(array(), array('uri' => $uri));
  1793. if (count($existing_files)) {
  1794. $existing = reset($existing_files);
  1795. $file->fid = $existing->fid;
  1796. $file->filename = $existing->filename;
  1797. }
  1798. }
  1799. // If we are renaming around an existing file (rather than a directory),
  1800. // use its basename for the filename.
  1801. elseif ($replace == FILE_EXISTS_RENAME && is_file($destination)) {
  1802. $file->filename = drupal_basename($destination);
  1803. }
  1804. return file_save($file);
  1805. }
  1806. return FALSE;
  1807. }
  1808. /**
  1809. * Saves a string to the specified destination without invoking file API.
  1810. *
  1811. * This function is identical to file_save_data() except the file will not be
  1812. * saved to the {file_managed} table and none of the file_* hooks will be
  1813. * called.
  1814. *
  1815. * @param $data
  1816. * A string containing the contents of the file.
  1817. * @param $destination
  1818. * A string containing the destination location. This must be a stream wrapper
  1819. * URI. If no value is provided, a randomized name will be generated and the
  1820. * file will be saved using Drupal's default files scheme, usually
  1821. * "public://".
  1822. * @param $replace
  1823. * Replace behavior when the destination file already exists:
  1824. * - FILE_EXISTS_REPLACE - Replace the existing file.
  1825. * - FILE_EXISTS_RENAME - Append _{incrementing number} until the filename is
  1826. * unique.
  1827. * - FILE_EXISTS_ERROR - Do nothing and return FALSE.
  1828. *
  1829. * @return
  1830. * A string with the path of the resulting file, or FALSE on error.
  1831. *
  1832. * @see file_save_data()
  1833. */
  1834. function file_unmanaged_save_data($data, $destination = NULL, $replace = FILE_EXISTS_RENAME) {
  1835. // Write the data to a temporary file.
  1836. $temp_name = drupal_tempnam('temporary://', 'file');
  1837. if (file_put_contents($temp_name, $data) === FALSE) {
  1838. drupal_set_message(t('The file could not be created.'), 'error');
  1839. return FALSE;
  1840. }
  1841. // Move the file to its final destination.
  1842. return file_unmanaged_move($temp_name, $destination, $replace);
  1843. }
  1844. /**
  1845. * Transfers a file to the client using HTTP.
  1846. *
  1847. * Pipes a file through Drupal to the client.
  1848. *
  1849. * @param $uri
  1850. * String specifying the file URI to transfer.
  1851. * @param $headers
  1852. * An array of HTTP headers to send along with file.
  1853. */
  1854. function file_transfer($uri, $headers) {
  1855. if (ob_get_level()) {
  1856. ob_end_clean();
  1857. }
  1858. foreach ($headers as $name => $value) {
  1859. drupal_add_http_header($name, $value);
  1860. }
  1861. drupal_send_headers();
  1862. $scheme = file_uri_scheme($uri);
  1863. // Transfer file in 1024 byte chunks to save memory usage.
  1864. if ($scheme && file_stream_wrapper_valid_scheme($scheme) && $fd = fopen($uri, 'rb')) {
  1865. while (!feof($fd)) {
  1866. print fread($fd, 1024);
  1867. }
  1868. fclose($fd);
  1869. }
  1870. else {
  1871. drupal_not_found();
  1872. }
  1873. drupal_exit();
  1874. }
  1875. /**
  1876. * Menu handler for private file transfers.
  1877. *
  1878. * Call modules that implement hook_file_download() to find out if a file is
  1879. * accessible and what headers it should be transferred with. If one or more
  1880. * modules returned headers the download will start with the returned headers.
  1881. * If a module returns -1 drupal_access_denied() will be returned. If the file
  1882. * exists but no modules responded drupal_access_denied() will be returned.
  1883. * If the file does not exist drupal_not_found() will be returned.
  1884. *
  1885. * @see system_menu()
  1886. */
  1887. function file_download() {
  1888. // Merge remainder of arguments from GET['q'], into relative file path.
  1889. $args = func_get_args();
  1890. $scheme = array_shift($args);
  1891. $target = implode('/', $args);
  1892. $uri = $scheme . '://' . $target;
  1893. if (file_stream_wrapper_valid_scheme($scheme) && file_exists($uri)) {
  1894. $headers = file_download_headers($uri);
  1895. if (count($headers)) {
  1896. file_transfer($uri, $headers);
  1897. }
  1898. drupal_access_denied();
  1899. }
  1900. else {
  1901. drupal_not_found();
  1902. }
  1903. drupal_exit();
  1904. }
  1905. /**
  1906. * Retrieves headers for a private file download.
  1907. *
  1908. * Calls all module implementations of hook_file_download() to retrieve headers
  1909. * for files by the module that originally provided the file. The presence of
  1910. * returned headers indicates the current user has access to the file.
  1911. *
  1912. * @param $uri
  1913. * The URI for the file whose headers should be retrieved.
  1914. *
  1915. * @return
  1916. * If access is allowed, headers for the file, suitable for passing to
  1917. * file_transfer(). If access is not allowed, an empty array will be returned.
  1918. *
  1919. * @see file_transfer()
  1920. * @see file_download_access()
  1921. * @see hook_file_download()
  1922. */
  1923. function file_download_headers($uri) {
  1924. // Let other modules provide headers and control access to the file.
  1925. // module_invoke_all() uses array_merge_recursive() which merges header
  1926. // values into a new array. To avoid that and allow modules to override
  1927. // headers instead, use array_merge() to merge the returned arrays.
  1928. $headers = array();
  1929. foreach (module_implements('file_download') as $module) {
  1930. $function = $module . '_file_download';
  1931. $result = $function($uri);
  1932. if ($result == -1) {
  1933. // Throw away the headers received so far.
  1934. $headers = array();
  1935. break;
  1936. }
  1937. if (isset($result) && is_array($result)) {
  1938. $headers = array_merge($headers, $result);
  1939. }
  1940. }
  1941. return $headers;
  1942. }
  1943. /**
  1944. * Checks that the current user has access to a particular file.
  1945. *
  1946. * The return value of this function hinges on the return value from
  1947. * file_download_headers(), which is the function responsible for collecting
  1948. * access information through hook_file_download().
  1949. *
  1950. * If immediately transferring the file to the browser and the headers will
  1951. * need to be retrieved, the return value of file_download_headers() should be
  1952. * used to determine access directly, so that access checks will not be run
  1953. * twice.
  1954. *
  1955. * @param $uri
  1956. * The URI for the file whose access should be retrieved.
  1957. *
  1958. * @return
  1959. * Boolean TRUE if access is allowed. FALSE if access is not allowed.
  1960. *
  1961. * @see file_download_headers()
  1962. * @see hook_file_download()
  1963. */
  1964. function file_download_access($uri) {
  1965. return count(file_download_headers($uri)) > 0;
  1966. }
  1967. /**
  1968. * Finds all files that match a given mask in a given directory.
  1969. *
  1970. * Directories and files beginning with a period are excluded; this
  1971. * prevents hidden files and directories (such as SVN working directories)
  1972. * from being scanned.
  1973. *
  1974. * @param $dir
  1975. * The base directory or URI to scan, without trailing slash.
  1976. * @param $mask
  1977. * The preg_match() regular expression of the files to find.
  1978. * @param $options
  1979. * An associative array of additional options, with the following elements:
  1980. * - 'nomask': The preg_match() regular expression of the files to ignore.
  1981. * Defaults to '/(\.\.?|CVS)$/'.
  1982. * - 'callback': The callback function to call for each match. There is no
  1983. * default callback.
  1984. * - 'recurse': When TRUE, the directory scan will recurse the entire tree
  1985. * starting at the provided directory. Defaults to TRUE.
  1986. * - 'key': The key to be used for the returned associative array of files.
  1987. * Possible values are 'uri', for the file's URI; 'filename', for the
  1988. * basename of the file; and 'name' for the name of the file without the
  1989. * extension. Defaults to 'uri'.
  1990. * - 'min_depth': Minimum depth of directories to return files from. Defaults
  1991. * to 0.
  1992. * @param $depth
  1993. * Current depth of recursion. This parameter is only used internally and
  1994. * should not be passed in.
  1995. *
  1996. * @return
  1997. * An associative array (keyed on the chosen key) of objects with 'uri',
  1998. * 'filename', and 'name' members corresponding to the matching files.
  1999. */
  2000. function file_scan_directory($dir, $mask, $options = array(), $depth = 0) {
  2001. // Default nomask option.
  2002. $nomask = '/(\.\.?|CVS)$/';
  2003. // Overrides the $nomask variable accordingly if $options['nomask'] is set.
  2004. //
  2005. // Allow directories specified in settings.php to be ignored. You can use this
  2006. // to not check for files in common special-purpose directories. For example,
  2007. // node_modules and bower_components. Ignoring irrelevant directories is a
  2008. // performance boost.
  2009. if (!isset($options['nomask'])) {
  2010. $ignore_directories = variable_get(
  2011. 'file_scan_ignore_directories',
  2012. array()
  2013. );
  2014. foreach ($ignore_directories as $index => $ignore_directory) {
  2015. $ignore_directories[$index] = preg_quote($ignore_directory, '/');
  2016. }
  2017. if (!empty($ignore_directories)) {
  2018. $nomask = '/^(\.\.?)|CVS|' . implode('|', $ignore_directories) . '$/';
  2019. }
  2020. }
  2021. // Merge in defaults.
  2022. $options += array(
  2023. 'nomask' => $nomask,
  2024. 'callback' => 0,
  2025. 'recurse' => TRUE,
  2026. 'key' => 'uri',
  2027. 'min_depth' => 0,
  2028. );
  2029. $options['key'] = in_array($options['key'], array('uri', 'filename', 'name')) ? $options['key'] : 'uri';
  2030. $files = array();
  2031. if (is_dir($dir) && $handle = opendir($dir)) {
  2032. while (FALSE !== ($filename = readdir($handle))) {
  2033. if (!preg_match($options['nomask'], $filename) && $filename[0] != '.') {
  2034. $uri = "$dir/$filename";
  2035. $uri = file_stream_wrapper_uri_normalize($uri);
  2036. if (is_dir($uri) && $options['recurse']) {
  2037. // Give priority to files in this folder by merging them in after any subdirectory files.
  2038. $files = array_merge(file_scan_directory($uri, $mask, $options, $depth + 1), $files);
  2039. }
  2040. elseif ($depth >= $options['min_depth'] && preg_match($mask, $filename)) {
  2041. // Always use this match over anything already set in $files with the
  2042. // same $$options['key'].
  2043. $file = new stdClass();
  2044. $file->uri = $uri;
  2045. $file->filename = $filename;
  2046. $file->name = pathinfo($filename, PATHINFO_FILENAME);
  2047. $key = $options['key'];
  2048. $files[$file->$key] = $file;
  2049. if ($options['callback']) {
  2050. $options['callback']($uri);
  2051. }
  2052. }
  2053. }
  2054. }
  2055. closedir($handle);
  2056. }
  2057. return $files;
  2058. }
  2059. /**
  2060. * Determines the maximum file upload size by querying the PHP settings.
  2061. *
  2062. * @return
  2063. * A file size limit in bytes based on the PHP upload_max_filesize and
  2064. * post_max_size
  2065. */
  2066. function file_upload_max_size() {
  2067. static $max_size = -1;
  2068. if ($max_size < 0) {
  2069. // Start with post_max_size.
  2070. $max_size = parse_size(ini_get('post_max_size'));
  2071. // If upload_max_size is less, then reduce. Except if upload_max_size is
  2072. // zero, which indicates no limit.
  2073. $upload_max = parse_size(ini_get('upload_max_filesize'));
  2074. if ($upload_max > 0 && $upload_max < $max_size) {
  2075. $max_size = $upload_max;
  2076. }
  2077. }
  2078. return $max_size;
  2079. }
  2080. /**
  2081. * Determines an Internet Media Type or MIME type from a filename.
  2082. *
  2083. * @param $uri
  2084. * A string containing the URI, path, or filename.
  2085. * @param $mapping
  2086. * An optional map of extensions to their mimetypes, in the form:
  2087. * - 'mimetypes': a list of mimetypes, keyed by an identifier,
  2088. * - 'extensions': the mapping itself, an associative array in which
  2089. * the key is the extension (lowercase) and the value is the mimetype
  2090. * identifier. If $mapping is NULL file_mimetype_mapping() is called.
  2091. *
  2092. * @return
  2093. * The internet media type registered for the extension or
  2094. * application/octet-stream for unknown extensions.
  2095. *
  2096. * @see file_default_mimetype_mapping()
  2097. */
  2098. function file_get_mimetype($uri, $mapping = NULL) {
  2099. if ($wrapper = file_stream_wrapper_get_instance_by_uri($uri)) {
  2100. return $wrapper->getMimeType($uri, $mapping);
  2101. }
  2102. else {
  2103. // getMimeType() is not implementation specific, so we can directly
  2104. // call it without an instance.
  2105. return DrupalLocalStreamWrapper::getMimeType($uri, $mapping);
  2106. }
  2107. }
  2108. /**
  2109. * Sets the permissions on a file or directory.
  2110. *
  2111. * This function will use the 'file_chmod_directory' and 'file_chmod_file'
  2112. * variables for the default modes for directories and uploaded/generated
  2113. * files. By default these will give everyone read access so that users
  2114. * accessing the files with a user account without the webserver group (e.g.
  2115. * via FTP) can read these files, and give group write permissions so webserver
  2116. * group members (e.g. a vhost account) can alter files uploaded and owned by
  2117. * the webserver.
  2118. *
  2119. * PHP's chmod does not support stream wrappers so we use our wrapper
  2120. * implementation which interfaces with chmod() by default. Contrib wrappers
  2121. * may override this behavior in their implementations as needed.
  2122. *
  2123. * @param $uri
  2124. * A string containing a URI file, or directory path.
  2125. * @param $mode
  2126. * Integer value for the permissions. Consult PHP chmod() documentation for
  2127. * more information.
  2128. *
  2129. * @return
  2130. * TRUE for success, FALSE in the event of an error.
  2131. *
  2132. * @ingroup php_wrappers
  2133. */
  2134. function drupal_chmod($uri, $mode = NULL) {
  2135. if (!isset($mode)) {
  2136. if (is_dir($uri)) {
  2137. $mode = variable_get('file_chmod_directory', 0775);
  2138. }
  2139. else {
  2140. $mode = variable_get('file_chmod_file', 0664);
  2141. }
  2142. }
  2143. // If this URI is a stream, pass it off to the appropriate stream wrapper.
  2144. // Otherwise, attempt PHP's chmod. This allows use of drupal_chmod even
  2145. // for unmanaged files outside of the stream wrapper interface.
  2146. if ($wrapper = file_stream_wrapper_get_instance_by_uri($uri)) {
  2147. if ($wrapper->chmod($mode)) {
  2148. return TRUE;
  2149. }
  2150. }
  2151. else {
  2152. if (@chmod($uri, $mode)) {
  2153. return TRUE;
  2154. }
  2155. }
  2156. watchdog('file', 'The file permissions could not be set on %uri.', array('%uri' => $uri), WATCHDOG_ERROR);
  2157. return FALSE;
  2158. }
  2159. /**
  2160. * Deletes a file.
  2161. *
  2162. * PHP's unlink() is broken on Windows, as it can fail to remove a file
  2163. * when it has a read-only flag set.
  2164. *
  2165. * @param $uri
  2166. * A URI or pathname.
  2167. * @param $context
  2168. * Refer to http://php.net/manual/ref.stream.php
  2169. *
  2170. * @return
  2171. * Boolean TRUE on success, or FALSE on failure.
  2172. *
  2173. * @see unlink()
  2174. * @ingroup php_wrappers
  2175. */
  2176. function drupal_unlink($uri, $context = NULL) {
  2177. $scheme = file_uri_scheme($uri);
  2178. if ((!$scheme || !file_stream_wrapper_valid_scheme($scheme)) && (substr(PHP_OS, 0, 3) == 'WIN')) {
  2179. chmod($uri, 0600);
  2180. }
  2181. if ($context) {
  2182. return unlink($uri, $context);
  2183. }
  2184. else {
  2185. return unlink($uri);
  2186. }
  2187. }
  2188. /**
  2189. * Resolves the absolute filepath of a local URI or filepath.
  2190. *
  2191. * The use of drupal_realpath() is discouraged, because it does not work for
  2192. * remote URIs. Except in rare cases, URIs should not be manually resolved.
  2193. *
  2194. * Only use this function if you know that the stream wrapper in the URI uses
  2195. * the local file system, and you need to pass an absolute path to a function
  2196. * that is incompatible with stream URIs.
  2197. *
  2198. * @param string $uri
  2199. * A stream wrapper URI or a filepath, possibly including one or more symbolic
  2200. * links.
  2201. *
  2202. * @return string|false
  2203. * The absolute local filepath (with no symbolic links), or FALSE on failure.
  2204. *
  2205. * @see DrupalStreamWrapperInterface::realpath()
  2206. * @see http://php.net/manual/function.realpath.php
  2207. * @ingroup php_wrappers
  2208. */
  2209. function drupal_realpath($uri) {
  2210. // If this URI is a stream, pass it off to the appropriate stream wrapper.
  2211. // Otherwise, attempt PHP's realpath. This allows use of drupal_realpath even
  2212. // for unmanaged files outside of the stream wrapper interface.
  2213. if ($wrapper = file_stream_wrapper_get_instance_by_uri($uri)) {
  2214. return $wrapper->realpath();
  2215. }
  2216. // Check that the URI has a value. There is a bug in PHP 5.2 on *BSD systems
  2217. // that makes realpath not return FALSE as expected when passing an empty
  2218. // variable.
  2219. // @todo Remove when Drupal drops support for PHP 5.2.
  2220. elseif (!empty($uri)) {
  2221. return realpath($uri);
  2222. }
  2223. return FALSE;
  2224. }
  2225. /**
  2226. * Gets the name of the directory from a given path.
  2227. *
  2228. * PHP's dirname() does not properly pass streams, so this function fills
  2229. * that gap. It is backwards compatible with normal paths and will use
  2230. * PHP's dirname() as a fallback.
  2231. *
  2232. * Compatibility: normal paths and stream wrappers.
  2233. *
  2234. * @param $uri
  2235. * A URI or path.
  2236. *
  2237. * @return
  2238. * A string containing the directory name.
  2239. *
  2240. * @see dirname()
  2241. * @see http://drupal.org/node/515192
  2242. * @ingroup php_wrappers
  2243. */
  2244. function drupal_dirname($uri) {
  2245. $scheme = file_uri_scheme($uri);
  2246. if ($scheme && file_stream_wrapper_valid_scheme($scheme)) {
  2247. return file_stream_wrapper_get_instance_by_scheme($scheme)->dirname($uri);
  2248. }
  2249. else {
  2250. return dirname($uri);
  2251. }
  2252. }
  2253. /**
  2254. * Gets the filename from a given path.
  2255. *
  2256. * PHP's basename() does not properly support streams or filenames beginning
  2257. * with a non-US-ASCII character.
  2258. *
  2259. * @see http://bugs.php.net/bug.php?id=37738
  2260. * @see basename()
  2261. *
  2262. * @ingroup php_wrappers
  2263. */
  2264. function drupal_basename($uri, $suffix = NULL) {
  2265. $separators = '/';
  2266. if (DIRECTORY_SEPARATOR != '/') {
  2267. // For Windows OS add special separator.
  2268. $separators .= DIRECTORY_SEPARATOR;
  2269. }
  2270. // Remove right-most slashes when $uri points to directory.
  2271. $uri = rtrim($uri, $separators);
  2272. // Returns the trailing part of the $uri starting after one of the directory
  2273. // separators.
  2274. $filename = preg_match('@[^' . preg_quote($separators, '@') . ']+$@', $uri, $matches) ? $matches[0] : '';
  2275. // Cuts off a suffix from the filename.
  2276. if ($suffix) {
  2277. $filename = preg_replace('@' . preg_quote($suffix, '@') . '$@', '', $filename);
  2278. }
  2279. return $filename;
  2280. }
  2281. /**
  2282. * Creates a directory using Drupal's default mode.
  2283. *
  2284. * PHP's mkdir() does not respect Drupal's default permissions mode. If a mode
  2285. * is not provided, this function will make sure that Drupal's is used.
  2286. *
  2287. * Compatibility: normal paths and stream wrappers.
  2288. *
  2289. * @param $uri
  2290. * A URI or pathname.
  2291. * @param $mode
  2292. * By default the Drupal mode is used.
  2293. * @param $recursive
  2294. * Default to FALSE.
  2295. * @param $context
  2296. * Refer to http://php.net/manual/ref.stream.php
  2297. *
  2298. * @return
  2299. * Boolean TRUE on success, or FALSE on failure.
  2300. *
  2301. * @see mkdir()
  2302. * @see http://drupal.org/node/515192
  2303. * @ingroup php_wrappers
  2304. */
  2305. function drupal_mkdir($uri, $mode = NULL, $recursive = FALSE, $context = NULL) {
  2306. if (!isset($mode)) {
  2307. $mode = variable_get('file_chmod_directory', 0775);
  2308. }
  2309. if (!isset($context)) {
  2310. return mkdir($uri, $mode, $recursive);
  2311. }
  2312. else {
  2313. return mkdir($uri, $mode, $recursive, $context);
  2314. }
  2315. }
  2316. /**
  2317. * Removes a directory.
  2318. *
  2319. * PHP's rmdir() is broken on Windows, as it can fail to remove a directory
  2320. * when it has a read-only flag set.
  2321. *
  2322. * @param $uri
  2323. * A URI or pathname.
  2324. * @param $context
  2325. * Refer to http://php.net/manual/ref.stream.php
  2326. *
  2327. * @return
  2328. * Boolean TRUE on success, or FALSE on failure.
  2329. *
  2330. * @see rmdir()
  2331. * @ingroup php_wrappers
  2332. */
  2333. function drupal_rmdir($uri, $context = NULL) {
  2334. $scheme = file_uri_scheme($uri);
  2335. if ((!$scheme || !file_stream_wrapper_valid_scheme($scheme)) && (substr(PHP_OS, 0, 3) == 'WIN')) {
  2336. chmod($uri, 0700);
  2337. }
  2338. if ($context) {
  2339. return rmdir($uri, $context);
  2340. }
  2341. else {
  2342. return rmdir($uri);
  2343. }
  2344. }
  2345. /**
  2346. * Creates a file with a unique filename in the specified directory.
  2347. *
  2348. * PHP's tempnam() does not return a URI like we want. This function
  2349. * will return a URI if given a URI, or it will return a filepath if
  2350. * given a filepath.
  2351. *
  2352. * Compatibility: normal paths and stream wrappers.
  2353. *
  2354. * @param $directory
  2355. * The directory where the temporary filename will be created.
  2356. * @param $prefix
  2357. * The prefix of the generated temporary filename.
  2358. * Note: Windows uses only the first three characters of prefix.
  2359. *
  2360. * @return
  2361. * The new temporary filename, or FALSE on failure.
  2362. *
  2363. * @see tempnam()
  2364. * @see http://drupal.org/node/515192
  2365. * @ingroup php_wrappers
  2366. */
  2367. function drupal_tempnam($directory, $prefix) {
  2368. $scheme = file_uri_scheme($directory);
  2369. if ($scheme && file_stream_wrapper_valid_scheme($scheme)) {
  2370. $wrapper = file_stream_wrapper_get_instance_by_scheme($scheme);
  2371. if ($filename = tempnam($wrapper->getDirectoryPath(), $prefix)) {
  2372. return $scheme . '://' . drupal_basename($filename);
  2373. }
  2374. else {
  2375. return FALSE;
  2376. }
  2377. }
  2378. else {
  2379. // Handle as a normal tempnam() call.
  2380. return tempnam($directory, $prefix);
  2381. }
  2382. }
  2383. /**
  2384. * Gets the path of system-appropriate temporary directory.
  2385. */
  2386. function file_directory_temp() {
  2387. $temporary_directory = variable_get('file_temporary_path', NULL);
  2388. if (empty($temporary_directory)) {
  2389. $directories = array();
  2390. // Has PHP been set with an upload_tmp_dir?
  2391. if (ini_get('upload_tmp_dir')) {
  2392. $directories[] = ini_get('upload_tmp_dir');
  2393. }
  2394. // Operating system specific dirs.
  2395. if (substr(PHP_OS, 0, 3) == 'WIN') {
  2396. $directories[] = 'c:\\windows\\temp';
  2397. $directories[] = 'c:\\winnt\\temp';
  2398. }
  2399. else {
  2400. $directories[] = '/tmp';
  2401. }
  2402. // PHP may be able to find an alternative tmp directory.
  2403. // This function exists in PHP 5 >= 5.2.1, but Drupal
  2404. // requires PHP 5 >= 5.2.0, so we check for it.
  2405. if (function_exists('sys_get_temp_dir')) {
  2406. $directories[] = sys_get_temp_dir();
  2407. }
  2408. foreach ($directories as $directory) {
  2409. if (is_dir($directory) && is_writable($directory)) {
  2410. $temporary_directory = $directory;
  2411. break;
  2412. }
  2413. }
  2414. if (empty($temporary_directory)) {
  2415. // If no directory has been found default to 'files/tmp'.
  2416. $temporary_directory = variable_get('file_public_path', conf_path() . '/files') . '/tmp';
  2417. // Windows accepts paths with either slash (/) or backslash (\), but will
  2418. // not accept a path which contains both a slash and a backslash. Since
  2419. // the 'file_public_path' variable may have either format, we sanitize
  2420. // everything to use slash which is supported on all platforms.
  2421. $temporary_directory = str_replace('\\', '/', $temporary_directory);
  2422. }
  2423. // Save the path of the discovered directory.
  2424. variable_set('file_temporary_path', $temporary_directory);
  2425. }
  2426. return $temporary_directory;
  2427. }
  2428. /**
  2429. * Examines a file object and returns appropriate content headers for download.
  2430. *
  2431. * @param $file
  2432. * A file object.
  2433. *
  2434. * @return
  2435. * An associative array of headers, as expected by file_transfer().
  2436. */
  2437. function file_get_content_headers($file) {
  2438. $type = mime_header_encode($file->filemime);
  2439. return array(
  2440. 'Content-Type' => $type,
  2441. 'Content-Length' => $file->filesize,
  2442. 'Cache-Control' => 'private',
  2443. );
  2444. }
  2445. /**
  2446. * @} End of "defgroup file".
  2447. */