@@ -13,958 +13,958 @@ discard block |
||
| 13 | 13 | */ |
| 14 | 14 | class RequestCore |
| 15 | 15 | { |
| 16 | - /** |
|
| 17 | - * The URL being requested. |
|
| 18 | - */ |
|
| 19 | - public $request_url; |
|
| 20 | - |
|
| 21 | - /** |
|
| 22 | - * The headers being sent in the request. |
|
| 23 | - */ |
|
| 24 | - public $request_headers; |
|
| 25 | - |
|
| 26 | - /** |
|
| 27 | - * The body being sent in the request. |
|
| 28 | - */ |
|
| 29 | - public $request_body; |
|
| 30 | - |
|
| 31 | - /** |
|
| 32 | - * The response returned by the request. |
|
| 33 | - */ |
|
| 34 | - public $response; |
|
| 35 | - |
|
| 36 | - /** |
|
| 37 | - * The headers returned by the request. |
|
| 38 | - */ |
|
| 39 | - public $response_headers; |
|
| 40 | - |
|
| 41 | - /** |
|
| 42 | - * The body returned by the request. |
|
| 43 | - */ |
|
| 44 | - public $response_body; |
|
| 45 | - |
|
| 46 | - /** |
|
| 47 | - * The HTTP status code returned by the request. |
|
| 48 | - */ |
|
| 49 | - public $response_code; |
|
| 50 | - |
|
| 51 | - /** |
|
| 52 | - * Additional response data. |
|
| 53 | - */ |
|
| 54 | - public $response_info; |
|
| 55 | - |
|
| 56 | - /** |
|
| 57 | - * The handle for the cURL object. |
|
| 58 | - */ |
|
| 59 | - public $curl_handle; |
|
| 60 | - |
|
| 61 | - /** |
|
| 62 | - * The method by which the request is being made. |
|
| 63 | - */ |
|
| 64 | - public $method; |
|
| 65 | - |
|
| 66 | - /** |
|
| 67 | - * Stores the proxy settings to use for the request. |
|
| 68 | - */ |
|
| 69 | - public $proxy = null; |
|
| 70 | - |
|
| 71 | - /** |
|
| 72 | - * The username to use for the request. |
|
| 73 | - */ |
|
| 74 | - public $username = null; |
|
| 75 | - |
|
| 76 | - /** |
|
| 77 | - * The password to use for the request. |
|
| 78 | - */ |
|
| 79 | - public $password = null; |
|
| 80 | - |
|
| 81 | - /** |
|
| 82 | - * Custom CURLOPT settings. |
|
| 83 | - */ |
|
| 84 | - public $curlopts = null; |
|
| 85 | - |
|
| 86 | - /** |
|
| 87 | - * The state of debug mode. |
|
| 88 | - */ |
|
| 89 | - public $debug_mode = false; |
|
| 90 | - |
|
| 91 | - /** |
|
| 92 | - * The default class to use for HTTP Requests (defaults to <RequestCore>). |
|
| 93 | - */ |
|
| 94 | - public $request_class = 'RequestCore'; |
|
| 95 | - |
|
| 96 | - /** |
|
| 97 | - * The default class to use for HTTP Responses (defaults to <ResponseCore>). |
|
| 98 | - */ |
|
| 99 | - public $response_class = 'ResponseCore'; |
|
| 100 | - |
|
| 101 | - /** |
|
| 102 | - * Default useragent string to use. |
|
| 103 | - */ |
|
| 104 | - public $useragent = 'RequestCore/1.4.3'; |
|
| 105 | - |
|
| 106 | - /** |
|
| 107 | - * File to read from while streaming up. |
|
| 108 | - */ |
|
| 109 | - public $read_file = null; |
|
| 110 | - |
|
| 111 | - /** |
|
| 112 | - * The resource to read from while streaming up. |
|
| 113 | - */ |
|
| 114 | - public $read_stream = null; |
|
| 115 | - |
|
| 116 | - /** |
|
| 117 | - * The size of the stream to read from. |
|
| 118 | - */ |
|
| 119 | - public $read_stream_size = null; |
|
| 120 | - |
|
| 121 | - /** |
|
| 122 | - * The length already read from the stream. |
|
| 123 | - */ |
|
| 124 | - public $read_stream_read = 0; |
|
| 125 | - |
|
| 126 | - /** |
|
| 127 | - * File to write to while streaming down. |
|
| 128 | - */ |
|
| 129 | - public $write_file = null; |
|
| 130 | - |
|
| 131 | - /** |
|
| 132 | - * The resource to write to while streaming down. |
|
| 133 | - */ |
|
| 134 | - public $write_stream = null; |
|
| 135 | - |
|
| 136 | - /** |
|
| 137 | - * Stores the intended starting seek position. |
|
| 138 | - */ |
|
| 139 | - public $seek_position = null; |
|
| 140 | - |
|
| 141 | - /** |
|
| 142 | - * The location of the cacert.pem file to use. |
|
| 143 | - */ |
|
| 144 | - public $cacert_location = false; |
|
| 145 | - |
|
| 146 | - /** |
|
| 147 | - * The state of SSL certificate verification. |
|
| 148 | - */ |
|
| 149 | - public $ssl_verification = true; |
|
| 150 | - |
|
| 151 | - /** |
|
| 152 | - * The user-defined callback function to call when a stream is read from. |
|
| 153 | - */ |
|
| 154 | - public $registered_streaming_read_callback = null; |
|
| 155 | - |
|
| 156 | - /** |
|
| 157 | - * The user-defined callback function to call when a stream is written to. |
|
| 158 | - */ |
|
| 159 | - public $registered_streaming_write_callback = null; |
|
| 160 | - |
|
| 161 | - /*%******************************************************************************************%*/ |
|
| 162 | - // CONSTANTS |
|
| 163 | - |
|
| 164 | - /** |
|
| 165 | - * GET HTTP Method |
|
| 166 | - */ |
|
| 167 | - const HTTP_GET = 'GET'; |
|
| 168 | - |
|
| 169 | - /** |
|
| 170 | - * POST HTTP Method |
|
| 171 | - */ |
|
| 172 | - const HTTP_POST = 'POST'; |
|
| 173 | - |
|
| 174 | - /** |
|
| 175 | - * PUT HTTP Method |
|
| 176 | - */ |
|
| 177 | - const HTTP_PUT = 'PUT'; |
|
| 178 | - |
|
| 179 | - /** |
|
| 180 | - * DELETE HTTP Method |
|
| 181 | - */ |
|
| 182 | - const HTTP_DELETE = 'DELETE'; |
|
| 183 | - |
|
| 184 | - /** |
|
| 185 | - * HEAD HTTP Method |
|
| 186 | - */ |
|
| 187 | - const HTTP_HEAD = 'HEAD'; |
|
| 188 | - |
|
| 189 | - |
|
| 190 | - /*%******************************************************************************************%*/ |
|
| 191 | - // CONSTRUCTOR/DESTRUCTOR |
|
| 192 | - |
|
| 193 | - /** |
|
| 194 | - * Constructs a new instance of this class. |
|
| 195 | - * |
|
| 196 | - * @param string $url (Optional) The URL to request or service endpoint to query. |
|
| 197 | - * @param string $proxy (Optional) The faux-url to use for proxy settings. Takes the following format: `proxy://user:pass@hostname:port` |
|
| 198 | - * @param array $helpers (Optional) An associative array of classnames to use for request, and response functionality. Gets passed in automatically by the calling class. |
|
| 199 | - * @return $this A reference to the current instance. |
|
| 200 | - */ |
|
| 201 | - public function __construct($url = null, $proxy = null, $helpers = null) |
|
| 202 | - { |
|
| 203 | - // Set some default values. |
|
| 204 | - $this->request_url = $url; |
|
| 205 | - $this->method = self::HTTP_GET; |
|
| 206 | - $this->request_headers = array(); |
|
| 207 | - $this->request_body = ''; |
|
| 208 | - |
|
| 209 | - // Set a new Request class if one was set. |
|
| 210 | - if (isset($helpers['request']) && !empty($helpers['request'])) |
|
| 211 | - { |
|
| 212 | - $this->request_class = $helpers['request']; |
|
| 213 | - } |
|
| 214 | - |
|
| 215 | - // Set a new Request class if one was set. |
|
| 216 | - if (isset($helpers['response']) && !empty($helpers['response'])) |
|
| 217 | - { |
|
| 218 | - $this->response_class = $helpers['response']; |
|
| 219 | - } |
|
| 220 | - |
|
| 221 | - if ($proxy) |
|
| 222 | - { |
|
| 223 | - $this->set_proxy($proxy); |
|
| 224 | - } |
|
| 225 | - |
|
| 226 | - return $this; |
|
| 227 | - } |
|
| 228 | - |
|
| 229 | - /** |
|
| 230 | - * Destructs the instance. Closes opened file handles. |
|
| 231 | - * |
|
| 232 | - * @return $this A reference to the current instance. |
|
| 233 | - */ |
|
| 234 | - public function __destruct() |
|
| 235 | - { |
|
| 236 | - if (isset($this->read_file) && isset($this->read_stream)) |
|
| 237 | - { |
|
| 238 | - fclose($this->read_stream); |
|
| 239 | - } |
|
| 240 | - |
|
| 241 | - if (isset($this->write_file) && isset($this->write_stream)) |
|
| 242 | - { |
|
| 243 | - fclose($this->write_stream); |
|
| 244 | - } |
|
| 245 | - |
|
| 246 | - return $this; |
|
| 247 | - } |
|
| 248 | - |
|
| 249 | - |
|
| 250 | - /*%******************************************************************************************%*/ |
|
| 251 | - // REQUEST METHODS |
|
| 252 | - |
|
| 253 | - /** |
|
| 254 | - * Sets the credentials to use for authentication. |
|
| 255 | - * |
|
| 256 | - * @param string $user (Required) The username to authenticate with. |
|
| 257 | - * @param string $pass (Required) The password to authenticate with. |
|
| 258 | - * @return $this A reference to the current instance. |
|
| 259 | - */ |
|
| 260 | - public function set_credentials($user, $pass) |
|
| 261 | - { |
|
| 262 | - $this->username = $user; |
|
| 263 | - $this->password = $pass; |
|
| 264 | - return $this; |
|
| 265 | - } |
|
| 266 | - |
|
| 267 | - /** |
|
| 268 | - * Adds a custom HTTP header to the cURL request. |
|
| 269 | - * |
|
| 270 | - * @param string $key (Required) The custom HTTP header to set. |
|
| 271 | - * @param mixed $value (Required) The value to assign to the custom HTTP header. |
|
| 272 | - * @return $this A reference to the current instance. |
|
| 273 | - */ |
|
| 274 | - public function add_header($key, $value) |
|
| 275 | - { |
|
| 276 | - $this->request_headers[$key] = $value; |
|
| 277 | - return $this; |
|
| 278 | - } |
|
| 279 | - |
|
| 280 | - /** |
|
| 281 | - * Removes an HTTP header from the cURL request. |
|
| 282 | - * |
|
| 283 | - * @param string $key (Required) The custom HTTP header to set. |
|
| 284 | - * @return $this A reference to the current instance. |
|
| 285 | - */ |
|
| 286 | - public function remove_header($key) |
|
| 287 | - { |
|
| 288 | - if (isset($this->request_headers[$key])) |
|
| 289 | - { |
|
| 290 | - unset($this->request_headers[$key]); |
|
| 291 | - } |
|
| 292 | - return $this; |
|
| 293 | - } |
|
| 294 | - |
|
| 295 | - /** |
|
| 296 | - * Set the method type for the request. |
|
| 297 | - * |
|
| 298 | - * @param string $method (Required) One of the following constants: <HTTP_GET>, <HTTP_POST>, <HTTP_PUT>, <HTTP_HEAD>, <HTTP_DELETE>. |
|
| 299 | - * @return $this A reference to the current instance. |
|
| 300 | - */ |
|
| 301 | - public function set_method($method) |
|
| 302 | - { |
|
| 303 | - $this->method = strtoupper($method); |
|
| 304 | - return $this; |
|
| 305 | - } |
|
| 306 | - |
|
| 307 | - /** |
|
| 308 | - * Sets a custom useragent string for the class. |
|
| 309 | - * |
|
| 310 | - * @param string $ua (Required) The useragent string to use. |
|
| 311 | - * @return $this A reference to the current instance. |
|
| 312 | - */ |
|
| 313 | - public function set_useragent($ua) |
|
| 314 | - { |
|
| 315 | - $this->useragent = $ua; |
|
| 316 | - return $this; |
|
| 317 | - } |
|
| 318 | - |
|
| 319 | - /** |
|
| 320 | - * Set the body to send in the request. |
|
| 321 | - * |
|
| 322 | - * @param string $body (Required) The textual content to send along in the body of the request. |
|
| 323 | - * @return $this A reference to the current instance. |
|
| 324 | - */ |
|
| 325 | - public function set_body($body) |
|
| 326 | - { |
|
| 327 | - $this->request_body = $body; |
|
| 328 | - return $this; |
|
| 329 | - } |
|
| 330 | - |
|
| 331 | - /** |
|
| 332 | - * Set the URL to make the request to. |
|
| 333 | - * |
|
| 334 | - * @param string $url (Required) The URL to make the request to. |
|
| 335 | - * @return $this A reference to the current instance. |
|
| 336 | - */ |
|
| 337 | - public function set_request_url($url) |
|
| 338 | - { |
|
| 339 | - $this->request_url = $url; |
|
| 340 | - return $this; |
|
| 341 | - } |
|
| 342 | - |
|
| 343 | - /** |
|
| 344 | - * Set additional CURLOPT settings. These will merge with the default settings, and override if |
|
| 345 | - * there is a duplicate. |
|
| 346 | - * |
|
| 347 | - * @param array $curlopts (Optional) A set of key-value pairs that set `CURLOPT` options. These will merge with the existing CURLOPTs, and ones passed here will override the defaults. Keys should be the `CURLOPT_*` constants, not strings. |
|
| 348 | - * @return $this A reference to the current instance. |
|
| 349 | - */ |
|
| 350 | - public function set_curlopts($curlopts) |
|
| 351 | - { |
|
| 352 | - $this->curlopts = $curlopts; |
|
| 353 | - return $this; |
|
| 354 | - } |
|
| 355 | - |
|
| 356 | - /** |
|
| 357 | - * Sets the length in bytes to read from the stream while streaming up. |
|
| 358 | - * |
|
| 359 | - * @param integer $size (Required) The length in bytes to read from the stream. |
|
| 360 | - * @return $this A reference to the current instance. |
|
| 361 | - */ |
|
| 362 | - public function set_read_stream_size($size) |
|
| 363 | - { |
|
| 364 | - $this->read_stream_size = $size; |
|
| 365 | - |
|
| 366 | - return $this; |
|
| 367 | - } |
|
| 368 | - |
|
| 369 | - /** |
|
| 370 | - * Sets the resource to read from while streaming up. Reads the stream from its current position until |
|
| 371 | - * EOF or `$size` bytes have been read. If `$size` is not given it will be determined by <php:fstat()> and |
|
| 372 | - * <php:ftell()>. |
|
| 373 | - * |
|
| 374 | - * @param resource $resource (Required) The readable resource to read from. |
|
| 375 | - * @param integer $size (Optional) The size of the stream to read. |
|
| 376 | - * @return $this A reference to the current instance. |
|
| 377 | - */ |
|
| 378 | - public function set_read_stream($resource, $size = null) |
|
| 379 | - { |
|
| 380 | - if (!isset($size) || $size < 0) |
|
| 381 | - { |
|
| 382 | - $stats = fstat($resource); |
|
| 383 | - |
|
| 384 | - if ($stats && $stats['size'] >= 0) |
|
| 385 | - { |
|
| 386 | - $position = ftell($resource); |
|
| 387 | - |
|
| 388 | - if ($position !== false && $position >= 0) |
|
| 389 | - { |
|
| 390 | - $size = $stats['size'] - $position; |
|
| 391 | - } |
|
| 392 | - } |
|
| 393 | - } |
|
| 394 | - |
|
| 395 | - $this->read_stream = $resource; |
|
| 396 | - |
|
| 397 | - return $this->set_read_stream_size($size); |
|
| 398 | - } |
|
| 399 | - |
|
| 400 | - /** |
|
| 401 | - * Sets the file to read from while streaming up. |
|
| 402 | - * |
|
| 403 | - * @param string $location (Required) The readable location to read from. |
|
| 404 | - * @return $this A reference to the current instance. |
|
| 405 | - */ |
|
| 406 | - public function set_read_file($location) |
|
| 407 | - { |
|
| 408 | - $this->read_file = $location; |
|
| 409 | - $read_file_handle = fopen($location, 'r'); |
|
| 410 | - |
|
| 411 | - return $this->set_read_stream($read_file_handle); |
|
| 412 | - } |
|
| 413 | - |
|
| 414 | - /** |
|
| 415 | - * Sets the resource to write to while streaming down. |
|
| 416 | - * |
|
| 417 | - * @param resource $resource (Required) The writeable resource to write to. |
|
| 418 | - * @return $this A reference to the current instance. |
|
| 419 | - */ |
|
| 420 | - public function set_write_stream($resource) |
|
| 421 | - { |
|
| 422 | - $this->write_stream = $resource; |
|
| 423 | - |
|
| 424 | - return $this; |
|
| 425 | - } |
|
| 426 | - |
|
| 427 | - /** |
|
| 428 | - * Sets the file to write to while streaming down. |
|
| 429 | - * |
|
| 430 | - * @param string $location (Required) The writeable location to write to. |
|
| 431 | - * @return $this A reference to the current instance. |
|
| 432 | - */ |
|
| 433 | - public function set_write_file($location) |
|
| 434 | - { |
|
| 435 | - $this->write_file = $location; |
|
| 436 | - $write_file_handle = fopen($location, 'w'); |
|
| 437 | - |
|
| 438 | - return $this->set_write_stream($write_file_handle); |
|
| 439 | - } |
|
| 440 | - |
|
| 441 | - /** |
|
| 442 | - * Set the proxy to use for making requests. |
|
| 443 | - * |
|
| 444 | - * @param string $proxy (Required) The faux-url to use for proxy settings. Takes the following format: `proxy://user:pass@hostname:port` |
|
| 445 | - * @return $this A reference to the current instance. |
|
| 446 | - */ |
|
| 447 | - public function set_proxy($proxy) |
|
| 448 | - { |
|
| 449 | - $proxy = parse_url($proxy); |
|
| 450 | - $proxy['user'] = isset($proxy['user']) ? $proxy['user'] : null; |
|
| 451 | - $proxy['pass'] = isset($proxy['pass']) ? $proxy['pass'] : null; |
|
| 452 | - $proxy['port'] = isset($proxy['port']) ? $proxy['port'] : null; |
|
| 453 | - $this->proxy = $proxy; |
|
| 454 | - return $this; |
|
| 455 | - } |
|
| 456 | - |
|
| 457 | - /** |
|
| 458 | - * Set the intended starting seek position. |
|
| 459 | - * |
|
| 460 | - * @param integer $position (Required) The byte-position of the stream to begin reading from. |
|
| 461 | - * @return $this A reference to the current instance. |
|
| 462 | - */ |
|
| 463 | - public function set_seek_position($position) |
|
| 464 | - { |
|
| 465 | - $this->seek_position = isset($position) ? (integer) $position : null; |
|
| 466 | - |
|
| 467 | - return $this; |
|
| 468 | - } |
|
| 469 | - |
|
| 470 | - /** |
|
| 471 | - * Register a callback function to execute whenever a data stream is read from using |
|
| 472 | - * <CFRequest::streaming_read_callback()>. |
|
| 473 | - * |
|
| 474 | - * The user-defined callback function should accept three arguments: |
|
| 475 | - * |
|
| 476 | - * <ul> |
|
| 477 | - * <li><code>$curl_handle</code> - <code>resource</code> - Required - The cURL handle resource that represents the in-progress transfer.</li> |
|
| 478 | - * <li><code>$file_handle</code> - <code>resource</code> - Required - The file handle resource that represents the file on the local file system.</li> |
|
| 479 | - * <li><code>$length</code> - <code>integer</code> - Required - The length in kilobytes of the data chunk that was transferred.</li> |
|
| 480 | - * </ul> |
|
| 481 | - * |
|
| 482 | - * @param string|array|function $callback (Required) The callback function is called by <php:call_user_func()>, so you can pass the following values: <ul> |
|
| 483 | - * <li>The name of a global function to execute, passed as a string.</li> |
|
| 484 | - * <li>A method to execute, passed as <code>array('ClassName', 'MethodName')</code>.</li> |
|
| 485 | - * <li>An anonymous function (PHP 5.3+).</li></ul> |
|
| 486 | - * @return $this A reference to the current instance. |
|
| 487 | - */ |
|
| 488 | - public function register_streaming_read_callback($callback) |
|
| 489 | - { |
|
| 490 | - $this->registered_streaming_read_callback = $callback; |
|
| 491 | - |
|
| 492 | - return $this; |
|
| 493 | - } |
|
| 494 | - |
|
| 495 | - /** |
|
| 496 | - * Register a callback function to execute whenever a data stream is written to using |
|
| 497 | - * <CFRequest::streaming_write_callback()>. |
|
| 498 | - * |
|
| 499 | - * The user-defined callback function should accept two arguments: |
|
| 500 | - * |
|
| 501 | - * <ul> |
|
| 502 | - * <li><code>$curl_handle</code> - <code>resource</code> - Required - The cURL handle resource that represents the in-progress transfer.</li> |
|
| 503 | - * <li><code>$length</code> - <code>integer</code> - Required - The length in kilobytes of the data chunk that was transferred.</li> |
|
| 504 | - * </ul> |
|
| 505 | - * |
|
| 506 | - * @param string|array|function $callback (Required) The callback function is called by <php:call_user_func()>, so you can pass the following values: <ul> |
|
| 507 | - * <li>The name of a global function to execute, passed as a string.</li> |
|
| 508 | - * <li>A method to execute, passed as <code>array('ClassName', 'MethodName')</code>.</li> |
|
| 509 | - * <li>An anonymous function (PHP 5.3+).</li></ul> |
|
| 510 | - * @return $this A reference to the current instance. |
|
| 511 | - */ |
|
| 512 | - public function register_streaming_write_callback($callback) |
|
| 513 | - { |
|
| 514 | - $this->registered_streaming_write_callback = $callback; |
|
| 515 | - |
|
| 516 | - return $this; |
|
| 517 | - } |
|
| 518 | - |
|
| 519 | - |
|
| 520 | - /*%******************************************************************************************%*/ |
|
| 521 | - // PREPARE, SEND, AND PROCESS REQUEST |
|
| 522 | - |
|
| 523 | - /** |
|
| 524 | - * A callback function that is invoked by cURL for streaming up. |
|
| 525 | - * |
|
| 526 | - * @param resource $curl_handle (Required) The cURL handle for the request. |
|
| 527 | - * @param resource $file_handle (Required) The open file handle resource. |
|
| 528 | - * @param integer $length (Required) The maximum number of bytes to read. |
|
| 529 | - * @return binary Binary data from a stream. |
|
| 530 | - */ |
|
| 531 | - public function streaming_read_callback($curl_handle, $file_handle, $length) |
|
| 532 | - { |
|
| 533 | - // Execute callback function |
|
| 534 | - if ($this->registered_streaming_read_callback) |
|
| 535 | - { |
|
| 536 | - return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length,$this->read_stream,$this->seek_position); |
|
| 537 | - } |
|
| 538 | - // Once we've sent as much as we're supposed to send... |
|
| 539 | - if ($this->read_stream_read >= $this->read_stream_size) |
|
| 540 | - { |
|
| 541 | - // Send EOF |
|
| 542 | - return ''; |
|
| 543 | - } |
|
| 544 | - |
|
| 545 | - // If we're at the beginning of an upload and need to seek... |
|
| 546 | - if ($this->read_stream_read == 0 && isset($this->seek_position) && $this->seek_position !== ftell($this->read_stream)) |
|
| 547 | - { |
|
| 548 | - if (fseek($this->read_stream, $this->seek_position) !== 0) |
|
| 549 | - { |
|
| 550 | - throw new RequestCore_Exception('The stream does not support seeking and is either not at the requested position or the position is unknown.'); |
|
| 551 | - } |
|
| 552 | - } |
|
| 553 | - |
|
| 554 | - $read = fread($this->read_stream, min($this->read_stream_size - $this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
| 555 | - $this->read_stream_read += strlen($read); |
|
| 556 | - |
|
| 557 | - $out = $read === false ? '' : $read; |
|
| 558 | - |
|
| 559 | - return $out; |
|
| 560 | - } |
|
| 561 | - |
|
| 562 | - /** |
|
| 563 | - * A callback function that is invoked by cURL for streaming down. |
|
| 564 | - * |
|
| 565 | - * @param resource $curl_handle (Required) The cURL handle for the request. |
|
| 566 | - * @param binary $data (Required) The data to write. |
|
| 567 | - * @return integer The number of bytes written. |
|
| 568 | - */ |
|
| 569 | - public function streaming_write_callback($curl_handle, $data) |
|
| 570 | - { |
|
| 571 | - if ($this->registered_streaming_write_callback){ |
|
| 572 | - return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle,$data,$this->write_stream); |
|
| 573 | - } |
|
| 574 | - $length = strlen($data); |
|
| 575 | - $written_total = 0; |
|
| 576 | - $written_last = 0; |
|
| 577 | - |
|
| 578 | - while ($written_total < $length) |
|
| 579 | - { |
|
| 580 | - $written_last = fwrite($this->write_stream, substr($data, $written_total)); |
|
| 581 | - |
|
| 582 | - if ($written_last === false) |
|
| 583 | - { |
|
| 584 | - return $written_total; |
|
| 585 | - } |
|
| 586 | - |
|
| 587 | - $written_total += $written_last; |
|
| 588 | - } |
|
| 589 | - |
|
| 590 | - return $written_total; |
|
| 591 | - } |
|
| 592 | - |
|
| 593 | - /** |
|
| 594 | - * Prepares and adds the details of the cURL request. This can be passed along to a <php:curl_multi_exec()> |
|
| 595 | - * function. |
|
| 596 | - * |
|
| 597 | - * @return resource The handle for the cURL object. |
|
| 598 | - */ |
|
| 599 | - public function prep_request() |
|
| 600 | - { |
|
| 601 | - $curl_handle = curl_init(); |
|
| 602 | - |
|
| 603 | - // Set default options. |
|
| 604 | - curl_setopt($curl_handle, CURLOPT_URL, $this->request_url); |
|
| 605 | - curl_setopt($curl_handle, CURLOPT_FILETIME, true); |
|
| 606 | - curl_setopt($curl_handle, CURLOPT_FRESH_CONNECT, false); |
|
| 607 | - //为了兼容PHP 5.6,PHP 5.6把 CURLOPT_CLOSEPOLICY 这个变量删除了 |
|
| 608 | - //curl_setopt($curl_handle, CURLOPT_CLOSEPOLICY, CURLCLOSEPOLICY_LEAST_RECENTLY_USED); |
|
| 609 | - curl_setopt($curl_handle, CURLOPT_MAXREDIRS, 5); |
|
| 610 | - curl_setopt($curl_handle, CURLOPT_HEADER, true); |
|
| 611 | - curl_setopt($curl_handle, CURLOPT_RETURNTRANSFER, true); |
|
| 612 | - curl_setopt($curl_handle, CURLOPT_TIMEOUT, 5184000); |
|
| 613 | - curl_setopt($curl_handle, CURLOPT_CONNECTTIMEOUT, 120); |
|
| 614 | - curl_setopt($curl_handle, CURLOPT_NOSIGNAL, true); |
|
| 615 | - curl_setopt($curl_handle, CURLOPT_REFERER, $this->request_url); |
|
| 616 | - curl_setopt($curl_handle, CURLOPT_USERAGENT, $this->useragent); |
|
| 617 | - curl_setopt($curl_handle, CURLOPT_READFUNCTION, array($this, 'streaming_read_callback')); |
|
| 618 | - |
|
| 619 | - // Verification of the SSL cert |
|
| 620 | - if ($this->ssl_verification) |
|
| 621 | - { |
|
| 622 | - curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, true); |
|
| 623 | - curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, 2); |
|
| 624 | - } |
|
| 625 | - else |
|
| 626 | - { |
|
| 627 | - curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, false); |
|
| 628 | - curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, false); |
|
| 629 | - } |
|
| 630 | - |
|
| 631 | - // chmod the file as 0755 |
|
| 632 | - if ($this->cacert_location === true) |
|
| 633 | - { |
|
| 634 | - curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__) . '/cacert.pem'); |
|
| 635 | - } |
|
| 636 | - elseif (is_string($this->cacert_location)) |
|
| 637 | - { |
|
| 638 | - curl_setopt($curl_handle, CURLOPT_CAINFO, $this->cacert_location); |
|
| 639 | - } |
|
| 640 | - |
|
| 641 | - // Debug mode |
|
| 642 | - if ($this->debug_mode) |
|
| 643 | - { |
|
| 644 | - curl_setopt($curl_handle, CURLOPT_VERBOSE, true); |
|
| 645 | - } |
|
| 646 | - |
|
| 647 | - // Handle open_basedir & safe mode |
|
| 648 | - if (!ini_get('safe_mode') && !ini_get('open_basedir')) |
|
| 649 | - { |
|
| 650 | - curl_setopt($curl_handle, CURLOPT_FOLLOWLOCATION, FALSE); |
|
| 651 | - } |
|
| 652 | - |
|
| 653 | - // Enable a proxy connection if requested. |
|
| 654 | - if ($this->proxy) |
|
| 655 | - { |
|
| 656 | - curl_setopt($curl_handle, CURLOPT_HTTPPROXYTUNNEL, true); |
|
| 657 | - |
|
| 658 | - $host = $this->proxy['host']; |
|
| 659 | - $host .= ($this->proxy['port']) ? ':' . $this->proxy['port'] : ''; |
|
| 660 | - curl_setopt($curl_handle, CURLOPT_PROXY, $host); |
|
| 661 | - |
|
| 662 | - if (isset($this->proxy['user']) && isset($this->proxy['pass'])) |
|
| 663 | - { |
|
| 664 | - curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'] . ':' . $this->proxy['pass']); |
|
| 665 | - } |
|
| 666 | - } |
|
| 667 | - |
|
| 668 | - // Set credentials for HTTP Basic/Digest Authentication. |
|
| 669 | - if ($this->username && $this->password) |
|
| 670 | - { |
|
| 671 | - curl_setopt($curl_handle, CURLOPT_HTTPAUTH, CURLAUTH_ANY); |
|
| 672 | - curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username . ':' . $this->password); |
|
| 673 | - } |
|
| 674 | - |
|
| 675 | - // Handle the encoding if we can. |
|
| 676 | - if (extension_loaded('zlib')) |
|
| 677 | - { |
|
| 678 | - curl_setopt($curl_handle, CURLOPT_ENCODING, ''); |
|
| 679 | - } |
|
| 680 | - |
|
| 681 | - // Process custom headers |
|
| 682 | - if (isset($this->request_headers) && count($this->request_headers)) |
|
| 683 | - { |
|
| 684 | - $temp_headers = array(); |
|
| 685 | - |
|
| 686 | - foreach ($this->request_headers as $k => $v) |
|
| 687 | - { |
|
| 688 | - $temp_headers[] = $k . ': ' . $v; |
|
| 689 | - } |
|
| 690 | - |
|
| 691 | - curl_setopt($curl_handle, CURLOPT_HTTPHEADER, $temp_headers); |
|
| 692 | - } |
|
| 693 | - |
|
| 694 | - switch ($this->method) |
|
| 695 | - { |
|
| 696 | - case self::HTTP_PUT: |
|
| 697 | - //unset($this->read_stream); |
|
| 698 | - curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, 'PUT'); |
|
| 699 | - if (isset($this->read_stream)) |
|
| 700 | - { |
|
| 701 | - if (!isset($this->read_stream_size) || $this->read_stream_size < 0) |
|
| 702 | - { |
|
| 703 | - throw new RequestCore_Exception('The stream size for the streaming upload cannot be determined.'); |
|
| 704 | - } |
|
| 705 | - |
|
| 706 | - curl_setopt($curl_handle, CURLOPT_INFILESIZE, $this->read_stream_size); |
|
| 707 | - curl_setopt($curl_handle, CURLOPT_UPLOAD, true); |
|
| 708 | - } |
|
| 709 | - else |
|
| 710 | - { |
|
| 711 | - curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 712 | - } |
|
| 713 | - break; |
|
| 714 | - |
|
| 715 | - case self::HTTP_POST: |
|
| 716 | - curl_setopt($curl_handle, CURLOPT_POST, true); |
|
| 717 | - curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 718 | - break; |
|
| 719 | - |
|
| 720 | - case self::HTTP_HEAD: |
|
| 721 | - curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, self::HTTP_HEAD); |
|
| 722 | - curl_setopt($curl_handle, CURLOPT_NOBODY, 1); |
|
| 723 | - break; |
|
| 724 | - |
|
| 725 | - default: // Assumed GET |
|
| 726 | - curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, $this->method); |
|
| 727 | - if (isset($this->write_stream)) |
|
| 728 | - { |
|
| 729 | - curl_setopt($curl_handle, CURLOPT_WRITEFUNCTION, array($this, 'streaming_write_callback')); |
|
| 730 | - curl_setopt($curl_handle, CURLOPT_HEADER, false); |
|
| 731 | - } |
|
| 732 | - else |
|
| 733 | - { |
|
| 734 | - curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 735 | - } |
|
| 736 | - break; |
|
| 737 | - } |
|
| 738 | - |
|
| 739 | - // Merge in the CURLOPTs |
|
| 740 | - if (isset($this->curlopts) && sizeof($this->curlopts) > 0) |
|
| 741 | - { |
|
| 742 | - foreach ($this->curlopts as $k => $v) |
|
| 743 | - { |
|
| 744 | - curl_setopt($curl_handle, $k, $v); |
|
| 745 | - } |
|
| 746 | - } |
|
| 747 | - |
|
| 748 | - return $curl_handle; |
|
| 749 | - } |
|
| 750 | - |
|
| 751 | - /** |
|
| 752 | - * Take the post-processed cURL data and break it down into useful header/body/info chunks. Uses the |
|
| 753 | - * data stored in the `curl_handle` and `response` properties unless replacement data is passed in via |
|
| 754 | - * parameters. |
|
| 755 | - * |
|
| 756 | - * @param resource $curl_handle (Optional) The reference to the already executed cURL request. |
|
| 757 | - * @param string $response (Optional) The actual response content itself that needs to be parsed. |
|
| 758 | - * @return ResponseCore A <ResponseCore> object containing a parsed HTTP response. |
|
| 759 | - */ |
|
| 760 | - public function process_response($curl_handle = null, $response = null) |
|
| 761 | - { |
|
| 762 | - // Accept a custom one if it's passed. |
|
| 763 | - if ($curl_handle && $response) |
|
| 764 | - { |
|
| 765 | - $this->curl_handle = $curl_handle; |
|
| 766 | - $this->response = $response; |
|
| 767 | - } |
|
| 768 | - |
|
| 769 | - // As long as this came back as a valid resource... |
|
| 770 | - if (is_resource($this->curl_handle)) |
|
| 771 | - { |
|
| 772 | - // Determine what's what. |
|
| 773 | - $header_size = curl_getinfo($this->curl_handle, CURLINFO_HEADER_SIZE); |
|
| 774 | - $this->response_headers = substr($this->response, 0, $header_size); |
|
| 775 | - $this->response_body = substr($this->response, $header_size); |
|
| 776 | - $this->response_code = curl_getinfo($this->curl_handle, CURLINFO_HTTP_CODE); |
|
| 777 | - $this->response_info = curl_getinfo($this->curl_handle); |
|
| 778 | - |
|
| 779 | - // Parse out the headers |
|
| 780 | - $this->response_headers = explode("\r\n\r\n", trim($this->response_headers)); |
|
| 781 | - $this->response_headers = array_pop($this->response_headers); |
|
| 782 | - $this->response_headers = explode("\r\n", $this->response_headers); |
|
| 783 | - array_shift($this->response_headers); |
|
| 784 | - |
|
| 785 | - // Loop through and split up the headers. |
|
| 786 | - $header_assoc = array(); |
|
| 787 | - foreach ($this->response_headers as $header) |
|
| 788 | - { |
|
| 789 | - $kv = explode(': ', $header); |
|
| 790 | - $header_assoc[strtolower($kv[0])] = isset($kv[1])?$kv[1]:''; |
|
| 791 | - } |
|
| 792 | - |
|
| 793 | - // Reset the headers to the appropriate property. |
|
| 794 | - $this->response_headers = $header_assoc; |
|
| 795 | - $this->response_headers['_info'] = $this->response_info; |
|
| 796 | - $this->response_headers['_info']['method'] = $this->method; |
|
| 797 | - |
|
| 798 | - if ($curl_handle && $response) |
|
| 799 | - { |
|
| 800 | - return new $this->response_class($this->response_headers, $this->response_body, $this->response_code, $this->curl_handle); |
|
| 801 | - } |
|
| 802 | - } |
|
| 803 | - |
|
| 804 | - // Return false |
|
| 805 | - return false; |
|
| 806 | - } |
|
| 807 | - |
|
| 808 | - /** |
|
| 809 | - * Sends the request, calling necessary utility functions to update built-in properties. |
|
| 810 | - * |
|
| 811 | - * @param boolean $parse (Optional) Whether to parse the response with ResponseCore or not. |
|
| 812 | - * @return string The resulting unparsed data from the request. |
|
| 813 | - */ |
|
| 814 | - public function send_request($parse = false) |
|
| 815 | - { |
|
| 816 | - set_time_limit(0); |
|
| 817 | - |
|
| 818 | - $curl_handle = $this->prep_request(); |
|
| 819 | - $this->response = curl_exec($curl_handle); |
|
| 820 | - |
|
| 821 | - if ($this->response === false) |
|
| 822 | - { |
|
| 823 | - throw new RequestCore_Exception('cURL resource: ' . (string) $curl_handle . '; cURL error: ' . curl_error($curl_handle) . ' (' . curl_errno($curl_handle) . ')'); |
|
| 824 | - } |
|
| 825 | - |
|
| 826 | - $parsed_response = $this->process_response($curl_handle, $this->response); |
|
| 827 | - |
|
| 828 | - curl_close($curl_handle); |
|
| 829 | - |
|
| 830 | - if ($parse) |
|
| 831 | - { |
|
| 832 | - return $parsed_response; |
|
| 833 | - } |
|
| 834 | - |
|
| 835 | - return $this->response; |
|
| 836 | - } |
|
| 837 | - |
|
| 838 | - /** |
|
| 839 | - * Sends the request using <php:curl_multi_exec()>, enabling parallel requests. Uses the "rolling" method. |
|
| 840 | - * |
|
| 841 | - * @param array $handles (Required) An indexed array of cURL handles to process simultaneously. |
|
| 842 | - * @param array $opt (Optional) An associative array of parameters that can have the following keys: <ul> |
|
| 843 | - * <li><code>callback</code> - <code>string|array</code> - Optional - The string name of a function to pass the response data to. If this is a method, pass an array where the <code>[0]</code> index is the class and the <code>[1]</code> index is the method name.</li> |
|
| 844 | - * <li><code>limit</code> - <code>integer</code> - Optional - The number of simultaneous requests to make. This can be useful for scaling around slow server responses. Defaults to trusting cURLs judgement as to how many to use.</li></ul> |
|
| 845 | - * @return array Post-processed cURL responses. |
|
| 846 | - */ |
|
| 847 | - public function send_multi_request($handles, $opt = null) |
|
| 848 | - { |
|
| 849 | - set_time_limit(0); |
|
| 850 | - |
|
| 851 | - // Skip everything if there are no handles to process. |
|
| 852 | - if (count($handles) === 0) return array(); |
|
| 853 | - |
|
| 854 | - if (!$opt) $opt = array(); |
|
| 855 | - |
|
| 856 | - // Initialize any missing options |
|
| 857 | - $limit = isset($opt['limit']) ? $opt['limit'] : -1; |
|
| 858 | - |
|
| 859 | - // Initialize |
|
| 860 | - $handle_list = $handles; |
|
| 861 | - $http = new $this->request_class(); |
|
| 862 | - $multi_handle = curl_multi_init(); |
|
| 863 | - $handles_post = array(); |
|
| 864 | - $added = count($handles); |
|
| 865 | - $last_handle = null; |
|
| 866 | - $count = 0; |
|
| 867 | - $i = 0; |
|
| 868 | - |
|
| 869 | - // Loop through the cURL handles and add as many as it set by the limit parameter. |
|
| 870 | - while ($i < $added) |
|
| 871 | - { |
|
| 872 | - if ($limit > 0 && $i >= $limit) break; |
|
| 873 | - curl_multi_add_handle($multi_handle, array_shift($handles)); |
|
| 874 | - $i++; |
|
| 875 | - } |
|
| 876 | - |
|
| 877 | - do |
|
| 878 | - { |
|
| 879 | - $active = false; |
|
| 880 | - |
|
| 881 | - // Start executing and wait for a response. |
|
| 882 | - while (($status = curl_multi_exec($multi_handle, $active)) === CURLM_CALL_MULTI_PERFORM) |
|
| 883 | - { |
|
| 884 | - // Start looking for possible responses immediately when we have to add more handles |
|
| 885 | - if (count($handles) > 0) break; |
|
| 886 | - } |
|
| 887 | - |
|
| 888 | - // Figure out which requests finished. |
|
| 889 | - $to_process = array(); |
|
| 890 | - |
|
| 891 | - while ($done = curl_multi_info_read($multi_handle)) |
|
| 892 | - { |
|
| 893 | - // Since curl_errno() isn't reliable for handles that were in multirequests, we check the 'result' of the info read, which contains the curl error number, (listed here http://curl.haxx.se/libcurl/c/libcurl-errors.html ) |
|
| 894 | - if ($done['result'] > 0) |
|
| 895 | - { |
|
| 896 | - throw new RequestCore_Exception('cURL resource: ' . (string) $done['handle'] . '; cURL error: ' . curl_error($done['handle']) . ' (' . $done['result'] . ')'); |
|
| 897 | - } |
|
| 898 | - |
|
| 899 | - // Because curl_multi_info_read() might return more than one message about a request, we check to see if this request is already in our array of completed requests |
|
| 900 | - elseif (!isset($to_process[(int) $done['handle']])) |
|
| 901 | - { |
|
| 902 | - $to_process[(int) $done['handle']] = $done; |
|
| 903 | - } |
|
| 904 | - } |
|
| 905 | - |
|
| 906 | - // Actually deal with the request |
|
| 907 | - foreach ($to_process as $pkey => $done) |
|
| 908 | - { |
|
| 909 | - $response = $http->process_response($done['handle'], curl_multi_getcontent($done['handle'])); |
|
| 910 | - $key = array_search($done['handle'], $handle_list, true); |
|
| 911 | - $handles_post[$key] = $response; |
|
| 912 | - |
|
| 913 | - if (count($handles) > 0) |
|
| 914 | - { |
|
| 915 | - curl_multi_add_handle($multi_handle, array_shift($handles)); |
|
| 916 | - } |
|
| 917 | - |
|
| 918 | - curl_multi_remove_handle($multi_handle, $done['handle']); |
|
| 919 | - curl_close($done['handle']); |
|
| 920 | - } |
|
| 921 | - } |
|
| 922 | - while ($active || count($handles_post) < $added); |
|
| 923 | - |
|
| 924 | - curl_multi_close($multi_handle); |
|
| 925 | - |
|
| 926 | - ksort($handles_post, SORT_NUMERIC); |
|
| 927 | - return $handles_post; |
|
| 928 | - } |
|
| 929 | - |
|
| 930 | - |
|
| 931 | - /*%******************************************************************************************%*/ |
|
| 932 | - // RESPONSE METHODS |
|
| 933 | - |
|
| 934 | - /** |
|
| 935 | - * Get the HTTP response headers from the request. |
|
| 936 | - * |
|
| 937 | - * @param string $header (Optional) A specific header value to return. Defaults to all headers. |
|
| 938 | - * @return string|array All or selected header values. |
|
| 939 | - */ |
|
| 940 | - public function get_response_header($header = null) |
|
| 941 | - { |
|
| 942 | - if ($header) |
|
| 943 | - { |
|
| 944 | - return $this->response_headers[strtolower($header)]; |
|
| 945 | - } |
|
| 946 | - return $this->response_headers; |
|
| 947 | - } |
|
| 948 | - |
|
| 949 | - /** |
|
| 950 | - * Get the HTTP response body from the request. |
|
| 951 | - * |
|
| 952 | - * @return string The response body. |
|
| 953 | - */ |
|
| 954 | - public function get_response_body() |
|
| 955 | - { |
|
| 956 | - return $this->response_body; |
|
| 957 | - } |
|
| 958 | - |
|
| 959 | - /** |
|
| 960 | - * Get the HTTP response code from the request. |
|
| 961 | - * |
|
| 962 | - * @return string The HTTP response code. |
|
| 963 | - */ |
|
| 964 | - public function get_response_code() |
|
| 965 | - { |
|
| 966 | - return $this->response_code; |
|
| 967 | - } |
|
| 16 | + /** |
|
| 17 | + * The URL being requested. |
|
| 18 | + */ |
|
| 19 | + public $request_url; |
|
| 20 | + |
|
| 21 | + /** |
|
| 22 | + * The headers being sent in the request. |
|
| 23 | + */ |
|
| 24 | + public $request_headers; |
|
| 25 | + |
|
| 26 | + /** |
|
| 27 | + * The body being sent in the request. |
|
| 28 | + */ |
|
| 29 | + public $request_body; |
|
| 30 | + |
|
| 31 | + /** |
|
| 32 | + * The response returned by the request. |
|
| 33 | + */ |
|
| 34 | + public $response; |
|
| 35 | + |
|
| 36 | + /** |
|
| 37 | + * The headers returned by the request. |
|
| 38 | + */ |
|
| 39 | + public $response_headers; |
|
| 40 | + |
|
| 41 | + /** |
|
| 42 | + * The body returned by the request. |
|
| 43 | + */ |
|
| 44 | + public $response_body; |
|
| 45 | + |
|
| 46 | + /** |
|
| 47 | + * The HTTP status code returned by the request. |
|
| 48 | + */ |
|
| 49 | + public $response_code; |
|
| 50 | + |
|
| 51 | + /** |
|
| 52 | + * Additional response data. |
|
| 53 | + */ |
|
| 54 | + public $response_info; |
|
| 55 | + |
|
| 56 | + /** |
|
| 57 | + * The handle for the cURL object. |
|
| 58 | + */ |
|
| 59 | + public $curl_handle; |
|
| 60 | + |
|
| 61 | + /** |
|
| 62 | + * The method by which the request is being made. |
|
| 63 | + */ |
|
| 64 | + public $method; |
|
| 65 | + |
|
| 66 | + /** |
|
| 67 | + * Stores the proxy settings to use for the request. |
|
| 68 | + */ |
|
| 69 | + public $proxy = null; |
|
| 70 | + |
|
| 71 | + /** |
|
| 72 | + * The username to use for the request. |
|
| 73 | + */ |
|
| 74 | + public $username = null; |
|
| 75 | + |
|
| 76 | + /** |
|
| 77 | + * The password to use for the request. |
|
| 78 | + */ |
|
| 79 | + public $password = null; |
|
| 80 | + |
|
| 81 | + /** |
|
| 82 | + * Custom CURLOPT settings. |
|
| 83 | + */ |
|
| 84 | + public $curlopts = null; |
|
| 85 | + |
|
| 86 | + /** |
|
| 87 | + * The state of debug mode. |
|
| 88 | + */ |
|
| 89 | + public $debug_mode = false; |
|
| 90 | + |
|
| 91 | + /** |
|
| 92 | + * The default class to use for HTTP Requests (defaults to <RequestCore>). |
|
| 93 | + */ |
|
| 94 | + public $request_class = 'RequestCore'; |
|
| 95 | + |
|
| 96 | + /** |
|
| 97 | + * The default class to use for HTTP Responses (defaults to <ResponseCore>). |
|
| 98 | + */ |
|
| 99 | + public $response_class = 'ResponseCore'; |
|
| 100 | + |
|
| 101 | + /** |
|
| 102 | + * Default useragent string to use. |
|
| 103 | + */ |
|
| 104 | + public $useragent = 'RequestCore/1.4.3'; |
|
| 105 | + |
|
| 106 | + /** |
|
| 107 | + * File to read from while streaming up. |
|
| 108 | + */ |
|
| 109 | + public $read_file = null; |
|
| 110 | + |
|
| 111 | + /** |
|
| 112 | + * The resource to read from while streaming up. |
|
| 113 | + */ |
|
| 114 | + public $read_stream = null; |
|
| 115 | + |
|
| 116 | + /** |
|
| 117 | + * The size of the stream to read from. |
|
| 118 | + */ |
|
| 119 | + public $read_stream_size = null; |
|
| 120 | + |
|
| 121 | + /** |
|
| 122 | + * The length already read from the stream. |
|
| 123 | + */ |
|
| 124 | + public $read_stream_read = 0; |
|
| 125 | + |
|
| 126 | + /** |
|
| 127 | + * File to write to while streaming down. |
|
| 128 | + */ |
|
| 129 | + public $write_file = null; |
|
| 130 | + |
|
| 131 | + /** |
|
| 132 | + * The resource to write to while streaming down. |
|
| 133 | + */ |
|
| 134 | + public $write_stream = null; |
|
| 135 | + |
|
| 136 | + /** |
|
| 137 | + * Stores the intended starting seek position. |
|
| 138 | + */ |
|
| 139 | + public $seek_position = null; |
|
| 140 | + |
|
| 141 | + /** |
|
| 142 | + * The location of the cacert.pem file to use. |
|
| 143 | + */ |
|
| 144 | + public $cacert_location = false; |
|
| 145 | + |
|
| 146 | + /** |
|
| 147 | + * The state of SSL certificate verification. |
|
| 148 | + */ |
|
| 149 | + public $ssl_verification = true; |
|
| 150 | + |
|
| 151 | + /** |
|
| 152 | + * The user-defined callback function to call when a stream is read from. |
|
| 153 | + */ |
|
| 154 | + public $registered_streaming_read_callback = null; |
|
| 155 | + |
|
| 156 | + /** |
|
| 157 | + * The user-defined callback function to call when a stream is written to. |
|
| 158 | + */ |
|
| 159 | + public $registered_streaming_write_callback = null; |
|
| 160 | + |
|
| 161 | + /*%******************************************************************************************%*/ |
|
| 162 | + // CONSTANTS |
|
| 163 | + |
|
| 164 | + /** |
|
| 165 | + * GET HTTP Method |
|
| 166 | + */ |
|
| 167 | + const HTTP_GET = 'GET'; |
|
| 168 | + |
|
| 169 | + /** |
|
| 170 | + * POST HTTP Method |
|
| 171 | + */ |
|
| 172 | + const HTTP_POST = 'POST'; |
|
| 173 | + |
|
| 174 | + /** |
|
| 175 | + * PUT HTTP Method |
|
| 176 | + */ |
|
| 177 | + const HTTP_PUT = 'PUT'; |
|
| 178 | + |
|
| 179 | + /** |
|
| 180 | + * DELETE HTTP Method |
|
| 181 | + */ |
|
| 182 | + const HTTP_DELETE = 'DELETE'; |
|
| 183 | + |
|
| 184 | + /** |
|
| 185 | + * HEAD HTTP Method |
|
| 186 | + */ |
|
| 187 | + const HTTP_HEAD = 'HEAD'; |
|
| 188 | + |
|
| 189 | + |
|
| 190 | + /*%******************************************************************************************%*/ |
|
| 191 | + // CONSTRUCTOR/DESTRUCTOR |
|
| 192 | + |
|
| 193 | + /** |
|
| 194 | + * Constructs a new instance of this class. |
|
| 195 | + * |
|
| 196 | + * @param string $url (Optional) The URL to request or service endpoint to query. |
|
| 197 | + * @param string $proxy (Optional) The faux-url to use for proxy settings. Takes the following format: `proxy://user:pass@hostname:port` |
|
| 198 | + * @param array $helpers (Optional) An associative array of classnames to use for request, and response functionality. Gets passed in automatically by the calling class. |
|
| 199 | + * @return $this A reference to the current instance. |
|
| 200 | + */ |
|
| 201 | + public function __construct($url = null, $proxy = null, $helpers = null) |
|
| 202 | + { |
|
| 203 | + // Set some default values. |
|
| 204 | + $this->request_url = $url; |
|
| 205 | + $this->method = self::HTTP_GET; |
|
| 206 | + $this->request_headers = array(); |
|
| 207 | + $this->request_body = ''; |
|
| 208 | + |
|
| 209 | + // Set a new Request class if one was set. |
|
| 210 | + if (isset($helpers['request']) && !empty($helpers['request'])) |
|
| 211 | + { |
|
| 212 | + $this->request_class = $helpers['request']; |
|
| 213 | + } |
|
| 214 | + |
|
| 215 | + // Set a new Request class if one was set. |
|
| 216 | + if (isset($helpers['response']) && !empty($helpers['response'])) |
|
| 217 | + { |
|
| 218 | + $this->response_class = $helpers['response']; |
|
| 219 | + } |
|
| 220 | + |
|
| 221 | + if ($proxy) |
|
| 222 | + { |
|
| 223 | + $this->set_proxy($proxy); |
|
| 224 | + } |
|
| 225 | + |
|
| 226 | + return $this; |
|
| 227 | + } |
|
| 228 | + |
|
| 229 | + /** |
|
| 230 | + * Destructs the instance. Closes opened file handles. |
|
| 231 | + * |
|
| 232 | + * @return $this A reference to the current instance. |
|
| 233 | + */ |
|
| 234 | + public function __destruct() |
|
| 235 | + { |
|
| 236 | + if (isset($this->read_file) && isset($this->read_stream)) |
|
| 237 | + { |
|
| 238 | + fclose($this->read_stream); |
|
| 239 | + } |
|
| 240 | + |
|
| 241 | + if (isset($this->write_file) && isset($this->write_stream)) |
|
| 242 | + { |
|
| 243 | + fclose($this->write_stream); |
|
| 244 | + } |
|
| 245 | + |
|
| 246 | + return $this; |
|
| 247 | + } |
|
| 248 | + |
|
| 249 | + |
|
| 250 | + /*%******************************************************************************************%*/ |
|
| 251 | + // REQUEST METHODS |
|
| 252 | + |
|
| 253 | + /** |
|
| 254 | + * Sets the credentials to use for authentication. |
|
| 255 | + * |
|
| 256 | + * @param string $user (Required) The username to authenticate with. |
|
| 257 | + * @param string $pass (Required) The password to authenticate with. |
|
| 258 | + * @return $this A reference to the current instance. |
|
| 259 | + */ |
|
| 260 | + public function set_credentials($user, $pass) |
|
| 261 | + { |
|
| 262 | + $this->username = $user; |
|
| 263 | + $this->password = $pass; |
|
| 264 | + return $this; |
|
| 265 | + } |
|
| 266 | + |
|
| 267 | + /** |
|
| 268 | + * Adds a custom HTTP header to the cURL request. |
|
| 269 | + * |
|
| 270 | + * @param string $key (Required) The custom HTTP header to set. |
|
| 271 | + * @param mixed $value (Required) The value to assign to the custom HTTP header. |
|
| 272 | + * @return $this A reference to the current instance. |
|
| 273 | + */ |
|
| 274 | + public function add_header($key, $value) |
|
| 275 | + { |
|
| 276 | + $this->request_headers[$key] = $value; |
|
| 277 | + return $this; |
|
| 278 | + } |
|
| 279 | + |
|
| 280 | + /** |
|
| 281 | + * Removes an HTTP header from the cURL request. |
|
| 282 | + * |
|
| 283 | + * @param string $key (Required) The custom HTTP header to set. |
|
| 284 | + * @return $this A reference to the current instance. |
|
| 285 | + */ |
|
| 286 | + public function remove_header($key) |
|
| 287 | + { |
|
| 288 | + if (isset($this->request_headers[$key])) |
|
| 289 | + { |
|
| 290 | + unset($this->request_headers[$key]); |
|
| 291 | + } |
|
| 292 | + return $this; |
|
| 293 | + } |
|
| 294 | + |
|
| 295 | + /** |
|
| 296 | + * Set the method type for the request. |
|
| 297 | + * |
|
| 298 | + * @param string $method (Required) One of the following constants: <HTTP_GET>, <HTTP_POST>, <HTTP_PUT>, <HTTP_HEAD>, <HTTP_DELETE>. |
|
| 299 | + * @return $this A reference to the current instance. |
|
| 300 | + */ |
|
| 301 | + public function set_method($method) |
|
| 302 | + { |
|
| 303 | + $this->method = strtoupper($method); |
|
| 304 | + return $this; |
|
| 305 | + } |
|
| 306 | + |
|
| 307 | + /** |
|
| 308 | + * Sets a custom useragent string for the class. |
|
| 309 | + * |
|
| 310 | + * @param string $ua (Required) The useragent string to use. |
|
| 311 | + * @return $this A reference to the current instance. |
|
| 312 | + */ |
|
| 313 | + public function set_useragent($ua) |
|
| 314 | + { |
|
| 315 | + $this->useragent = $ua; |
|
| 316 | + return $this; |
|
| 317 | + } |
|
| 318 | + |
|
| 319 | + /** |
|
| 320 | + * Set the body to send in the request. |
|
| 321 | + * |
|
| 322 | + * @param string $body (Required) The textual content to send along in the body of the request. |
|
| 323 | + * @return $this A reference to the current instance. |
|
| 324 | + */ |
|
| 325 | + public function set_body($body) |
|
| 326 | + { |
|
| 327 | + $this->request_body = $body; |
|
| 328 | + return $this; |
|
| 329 | + } |
|
| 330 | + |
|
| 331 | + /** |
|
| 332 | + * Set the URL to make the request to. |
|
| 333 | + * |
|
| 334 | + * @param string $url (Required) The URL to make the request to. |
|
| 335 | + * @return $this A reference to the current instance. |
|
| 336 | + */ |
|
| 337 | + public function set_request_url($url) |
|
| 338 | + { |
|
| 339 | + $this->request_url = $url; |
|
| 340 | + return $this; |
|
| 341 | + } |
|
| 342 | + |
|
| 343 | + /** |
|
| 344 | + * Set additional CURLOPT settings. These will merge with the default settings, and override if |
|
| 345 | + * there is a duplicate. |
|
| 346 | + * |
|
| 347 | + * @param array $curlopts (Optional) A set of key-value pairs that set `CURLOPT` options. These will merge with the existing CURLOPTs, and ones passed here will override the defaults. Keys should be the `CURLOPT_*` constants, not strings. |
|
| 348 | + * @return $this A reference to the current instance. |
|
| 349 | + */ |
|
| 350 | + public function set_curlopts($curlopts) |
|
| 351 | + { |
|
| 352 | + $this->curlopts = $curlopts; |
|
| 353 | + return $this; |
|
| 354 | + } |
|
| 355 | + |
|
| 356 | + /** |
|
| 357 | + * Sets the length in bytes to read from the stream while streaming up. |
|
| 358 | + * |
|
| 359 | + * @param integer $size (Required) The length in bytes to read from the stream. |
|
| 360 | + * @return $this A reference to the current instance. |
|
| 361 | + */ |
|
| 362 | + public function set_read_stream_size($size) |
|
| 363 | + { |
|
| 364 | + $this->read_stream_size = $size; |
|
| 365 | + |
|
| 366 | + return $this; |
|
| 367 | + } |
|
| 368 | + |
|
| 369 | + /** |
|
| 370 | + * Sets the resource to read from while streaming up. Reads the stream from its current position until |
|
| 371 | + * EOF or `$size` bytes have been read. If `$size` is not given it will be determined by <php:fstat()> and |
|
| 372 | + * <php:ftell()>. |
|
| 373 | + * |
|
| 374 | + * @param resource $resource (Required) The readable resource to read from. |
|
| 375 | + * @param integer $size (Optional) The size of the stream to read. |
|
| 376 | + * @return $this A reference to the current instance. |
|
| 377 | + */ |
|
| 378 | + public function set_read_stream($resource, $size = null) |
|
| 379 | + { |
|
| 380 | + if (!isset($size) || $size < 0) |
|
| 381 | + { |
|
| 382 | + $stats = fstat($resource); |
|
| 383 | + |
|
| 384 | + if ($stats && $stats['size'] >= 0) |
|
| 385 | + { |
|
| 386 | + $position = ftell($resource); |
|
| 387 | + |
|
| 388 | + if ($position !== false && $position >= 0) |
|
| 389 | + { |
|
| 390 | + $size = $stats['size'] - $position; |
|
| 391 | + } |
|
| 392 | + } |
|
| 393 | + } |
|
| 394 | + |
|
| 395 | + $this->read_stream = $resource; |
|
| 396 | + |
|
| 397 | + return $this->set_read_stream_size($size); |
|
| 398 | + } |
|
| 399 | + |
|
| 400 | + /** |
|
| 401 | + * Sets the file to read from while streaming up. |
|
| 402 | + * |
|
| 403 | + * @param string $location (Required) The readable location to read from. |
|
| 404 | + * @return $this A reference to the current instance. |
|
| 405 | + */ |
|
| 406 | + public function set_read_file($location) |
|
| 407 | + { |
|
| 408 | + $this->read_file = $location; |
|
| 409 | + $read_file_handle = fopen($location, 'r'); |
|
| 410 | + |
|
| 411 | + return $this->set_read_stream($read_file_handle); |
|
| 412 | + } |
|
| 413 | + |
|
| 414 | + /** |
|
| 415 | + * Sets the resource to write to while streaming down. |
|
| 416 | + * |
|
| 417 | + * @param resource $resource (Required) The writeable resource to write to. |
|
| 418 | + * @return $this A reference to the current instance. |
|
| 419 | + */ |
|
| 420 | + public function set_write_stream($resource) |
|
| 421 | + { |
|
| 422 | + $this->write_stream = $resource; |
|
| 423 | + |
|
| 424 | + return $this; |
|
| 425 | + } |
|
| 426 | + |
|
| 427 | + /** |
|
| 428 | + * Sets the file to write to while streaming down. |
|
| 429 | + * |
|
| 430 | + * @param string $location (Required) The writeable location to write to. |
|
| 431 | + * @return $this A reference to the current instance. |
|
| 432 | + */ |
|
| 433 | + public function set_write_file($location) |
|
| 434 | + { |
|
| 435 | + $this->write_file = $location; |
|
| 436 | + $write_file_handle = fopen($location, 'w'); |
|
| 437 | + |
|
| 438 | + return $this->set_write_stream($write_file_handle); |
|
| 439 | + } |
|
| 440 | + |
|
| 441 | + /** |
|
| 442 | + * Set the proxy to use for making requests. |
|
| 443 | + * |
|
| 444 | + * @param string $proxy (Required) The faux-url to use for proxy settings. Takes the following format: `proxy://user:pass@hostname:port` |
|
| 445 | + * @return $this A reference to the current instance. |
|
| 446 | + */ |
|
| 447 | + public function set_proxy($proxy) |
|
| 448 | + { |
|
| 449 | + $proxy = parse_url($proxy); |
|
| 450 | + $proxy['user'] = isset($proxy['user']) ? $proxy['user'] : null; |
|
| 451 | + $proxy['pass'] = isset($proxy['pass']) ? $proxy['pass'] : null; |
|
| 452 | + $proxy['port'] = isset($proxy['port']) ? $proxy['port'] : null; |
|
| 453 | + $this->proxy = $proxy; |
|
| 454 | + return $this; |
|
| 455 | + } |
|
| 456 | + |
|
| 457 | + /** |
|
| 458 | + * Set the intended starting seek position. |
|
| 459 | + * |
|
| 460 | + * @param integer $position (Required) The byte-position of the stream to begin reading from. |
|
| 461 | + * @return $this A reference to the current instance. |
|
| 462 | + */ |
|
| 463 | + public function set_seek_position($position) |
|
| 464 | + { |
|
| 465 | + $this->seek_position = isset($position) ? (integer) $position : null; |
|
| 466 | + |
|
| 467 | + return $this; |
|
| 468 | + } |
|
| 469 | + |
|
| 470 | + /** |
|
| 471 | + * Register a callback function to execute whenever a data stream is read from using |
|
| 472 | + * <CFRequest::streaming_read_callback()>. |
|
| 473 | + * |
|
| 474 | + * The user-defined callback function should accept three arguments: |
|
| 475 | + * |
|
| 476 | + * <ul> |
|
| 477 | + * <li><code>$curl_handle</code> - <code>resource</code> - Required - The cURL handle resource that represents the in-progress transfer.</li> |
|
| 478 | + * <li><code>$file_handle</code> - <code>resource</code> - Required - The file handle resource that represents the file on the local file system.</li> |
|
| 479 | + * <li><code>$length</code> - <code>integer</code> - Required - The length in kilobytes of the data chunk that was transferred.</li> |
|
| 480 | + * </ul> |
|
| 481 | + * |
|
| 482 | + * @param string|array|function $callback (Required) The callback function is called by <php:call_user_func()>, so you can pass the following values: <ul> |
|
| 483 | + * <li>The name of a global function to execute, passed as a string.</li> |
|
| 484 | + * <li>A method to execute, passed as <code>array('ClassName', 'MethodName')</code>.</li> |
|
| 485 | + * <li>An anonymous function (PHP 5.3+).</li></ul> |
|
| 486 | + * @return $this A reference to the current instance. |
|
| 487 | + */ |
|
| 488 | + public function register_streaming_read_callback($callback) |
|
| 489 | + { |
|
| 490 | + $this->registered_streaming_read_callback = $callback; |
|
| 491 | + |
|
| 492 | + return $this; |
|
| 493 | + } |
|
| 494 | + |
|
| 495 | + /** |
|
| 496 | + * Register a callback function to execute whenever a data stream is written to using |
|
| 497 | + * <CFRequest::streaming_write_callback()>. |
|
| 498 | + * |
|
| 499 | + * The user-defined callback function should accept two arguments: |
|
| 500 | + * |
|
| 501 | + * <ul> |
|
| 502 | + * <li><code>$curl_handle</code> - <code>resource</code> - Required - The cURL handle resource that represents the in-progress transfer.</li> |
|
| 503 | + * <li><code>$length</code> - <code>integer</code> - Required - The length in kilobytes of the data chunk that was transferred.</li> |
|
| 504 | + * </ul> |
|
| 505 | + * |
|
| 506 | + * @param string|array|function $callback (Required) The callback function is called by <php:call_user_func()>, so you can pass the following values: <ul> |
|
| 507 | + * <li>The name of a global function to execute, passed as a string.</li> |
|
| 508 | + * <li>A method to execute, passed as <code>array('ClassName', 'MethodName')</code>.</li> |
|
| 509 | + * <li>An anonymous function (PHP 5.3+).</li></ul> |
|
| 510 | + * @return $this A reference to the current instance. |
|
| 511 | + */ |
|
| 512 | + public function register_streaming_write_callback($callback) |
|
| 513 | + { |
|
| 514 | + $this->registered_streaming_write_callback = $callback; |
|
| 515 | + |
|
| 516 | + return $this; |
|
| 517 | + } |
|
| 518 | + |
|
| 519 | + |
|
| 520 | + /*%******************************************************************************************%*/ |
|
| 521 | + // PREPARE, SEND, AND PROCESS REQUEST |
|
| 522 | + |
|
| 523 | + /** |
|
| 524 | + * A callback function that is invoked by cURL for streaming up. |
|
| 525 | + * |
|
| 526 | + * @param resource $curl_handle (Required) The cURL handle for the request. |
|
| 527 | + * @param resource $file_handle (Required) The open file handle resource. |
|
| 528 | + * @param integer $length (Required) The maximum number of bytes to read. |
|
| 529 | + * @return binary Binary data from a stream. |
|
| 530 | + */ |
|
| 531 | + public function streaming_read_callback($curl_handle, $file_handle, $length) |
|
| 532 | + { |
|
| 533 | + // Execute callback function |
|
| 534 | + if ($this->registered_streaming_read_callback) |
|
| 535 | + { |
|
| 536 | + return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length,$this->read_stream,$this->seek_position); |
|
| 537 | + } |
|
| 538 | + // Once we've sent as much as we're supposed to send... |
|
| 539 | + if ($this->read_stream_read >= $this->read_stream_size) |
|
| 540 | + { |
|
| 541 | + // Send EOF |
|
| 542 | + return ''; |
|
| 543 | + } |
|
| 544 | + |
|
| 545 | + // If we're at the beginning of an upload and need to seek... |
|
| 546 | + if ($this->read_stream_read == 0 && isset($this->seek_position) && $this->seek_position !== ftell($this->read_stream)) |
|
| 547 | + { |
|
| 548 | + if (fseek($this->read_stream, $this->seek_position) !== 0) |
|
| 549 | + { |
|
| 550 | + throw new RequestCore_Exception('The stream does not support seeking and is either not at the requested position or the position is unknown.'); |
|
| 551 | + } |
|
| 552 | + } |
|
| 553 | + |
|
| 554 | + $read = fread($this->read_stream, min($this->read_stream_size - $this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
| 555 | + $this->read_stream_read += strlen($read); |
|
| 556 | + |
|
| 557 | + $out = $read === false ? '' : $read; |
|
| 558 | + |
|
| 559 | + return $out; |
|
| 560 | + } |
|
| 561 | + |
|
| 562 | + /** |
|
| 563 | + * A callback function that is invoked by cURL for streaming down. |
|
| 564 | + * |
|
| 565 | + * @param resource $curl_handle (Required) The cURL handle for the request. |
|
| 566 | + * @param binary $data (Required) The data to write. |
|
| 567 | + * @return integer The number of bytes written. |
|
| 568 | + */ |
|
| 569 | + public function streaming_write_callback($curl_handle, $data) |
|
| 570 | + { |
|
| 571 | + if ($this->registered_streaming_write_callback){ |
|
| 572 | + return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle,$data,$this->write_stream); |
|
| 573 | + } |
|
| 574 | + $length = strlen($data); |
|
| 575 | + $written_total = 0; |
|
| 576 | + $written_last = 0; |
|
| 577 | + |
|
| 578 | + while ($written_total < $length) |
|
| 579 | + { |
|
| 580 | + $written_last = fwrite($this->write_stream, substr($data, $written_total)); |
|
| 581 | + |
|
| 582 | + if ($written_last === false) |
|
| 583 | + { |
|
| 584 | + return $written_total; |
|
| 585 | + } |
|
| 586 | + |
|
| 587 | + $written_total += $written_last; |
|
| 588 | + } |
|
| 589 | + |
|
| 590 | + return $written_total; |
|
| 591 | + } |
|
| 592 | + |
|
| 593 | + /** |
|
| 594 | + * Prepares and adds the details of the cURL request. This can be passed along to a <php:curl_multi_exec()> |
|
| 595 | + * function. |
|
| 596 | + * |
|
| 597 | + * @return resource The handle for the cURL object. |
|
| 598 | + */ |
|
| 599 | + public function prep_request() |
|
| 600 | + { |
|
| 601 | + $curl_handle = curl_init(); |
|
| 602 | + |
|
| 603 | + // Set default options. |
|
| 604 | + curl_setopt($curl_handle, CURLOPT_URL, $this->request_url); |
|
| 605 | + curl_setopt($curl_handle, CURLOPT_FILETIME, true); |
|
| 606 | + curl_setopt($curl_handle, CURLOPT_FRESH_CONNECT, false); |
|
| 607 | + //为了兼容PHP 5.6,PHP 5.6把 CURLOPT_CLOSEPOLICY 这个变量删除了 |
|
| 608 | + //curl_setopt($curl_handle, CURLOPT_CLOSEPOLICY, CURLCLOSEPOLICY_LEAST_RECENTLY_USED); |
|
| 609 | + curl_setopt($curl_handle, CURLOPT_MAXREDIRS, 5); |
|
| 610 | + curl_setopt($curl_handle, CURLOPT_HEADER, true); |
|
| 611 | + curl_setopt($curl_handle, CURLOPT_RETURNTRANSFER, true); |
|
| 612 | + curl_setopt($curl_handle, CURLOPT_TIMEOUT, 5184000); |
|
| 613 | + curl_setopt($curl_handle, CURLOPT_CONNECTTIMEOUT, 120); |
|
| 614 | + curl_setopt($curl_handle, CURLOPT_NOSIGNAL, true); |
|
| 615 | + curl_setopt($curl_handle, CURLOPT_REFERER, $this->request_url); |
|
| 616 | + curl_setopt($curl_handle, CURLOPT_USERAGENT, $this->useragent); |
|
| 617 | + curl_setopt($curl_handle, CURLOPT_READFUNCTION, array($this, 'streaming_read_callback')); |
|
| 618 | + |
|
| 619 | + // Verification of the SSL cert |
|
| 620 | + if ($this->ssl_verification) |
|
| 621 | + { |
|
| 622 | + curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, true); |
|
| 623 | + curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, 2); |
|
| 624 | + } |
|
| 625 | + else |
|
| 626 | + { |
|
| 627 | + curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, false); |
|
| 628 | + curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, false); |
|
| 629 | + } |
|
| 630 | + |
|
| 631 | + // chmod the file as 0755 |
|
| 632 | + if ($this->cacert_location === true) |
|
| 633 | + { |
|
| 634 | + curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__) . '/cacert.pem'); |
|
| 635 | + } |
|
| 636 | + elseif (is_string($this->cacert_location)) |
|
| 637 | + { |
|
| 638 | + curl_setopt($curl_handle, CURLOPT_CAINFO, $this->cacert_location); |
|
| 639 | + } |
|
| 640 | + |
|
| 641 | + // Debug mode |
|
| 642 | + if ($this->debug_mode) |
|
| 643 | + { |
|
| 644 | + curl_setopt($curl_handle, CURLOPT_VERBOSE, true); |
|
| 645 | + } |
|
| 646 | + |
|
| 647 | + // Handle open_basedir & safe mode |
|
| 648 | + if (!ini_get('safe_mode') && !ini_get('open_basedir')) |
|
| 649 | + { |
|
| 650 | + curl_setopt($curl_handle, CURLOPT_FOLLOWLOCATION, FALSE); |
|
| 651 | + } |
|
| 652 | + |
|
| 653 | + // Enable a proxy connection if requested. |
|
| 654 | + if ($this->proxy) |
|
| 655 | + { |
|
| 656 | + curl_setopt($curl_handle, CURLOPT_HTTPPROXYTUNNEL, true); |
|
| 657 | + |
|
| 658 | + $host = $this->proxy['host']; |
|
| 659 | + $host .= ($this->proxy['port']) ? ':' . $this->proxy['port'] : ''; |
|
| 660 | + curl_setopt($curl_handle, CURLOPT_PROXY, $host); |
|
| 661 | + |
|
| 662 | + if (isset($this->proxy['user']) && isset($this->proxy['pass'])) |
|
| 663 | + { |
|
| 664 | + curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'] . ':' . $this->proxy['pass']); |
|
| 665 | + } |
|
| 666 | + } |
|
| 667 | + |
|
| 668 | + // Set credentials for HTTP Basic/Digest Authentication. |
|
| 669 | + if ($this->username && $this->password) |
|
| 670 | + { |
|
| 671 | + curl_setopt($curl_handle, CURLOPT_HTTPAUTH, CURLAUTH_ANY); |
|
| 672 | + curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username . ':' . $this->password); |
|
| 673 | + } |
|
| 674 | + |
|
| 675 | + // Handle the encoding if we can. |
|
| 676 | + if (extension_loaded('zlib')) |
|
| 677 | + { |
|
| 678 | + curl_setopt($curl_handle, CURLOPT_ENCODING, ''); |
|
| 679 | + } |
|
| 680 | + |
|
| 681 | + // Process custom headers |
|
| 682 | + if (isset($this->request_headers) && count($this->request_headers)) |
|
| 683 | + { |
|
| 684 | + $temp_headers = array(); |
|
| 685 | + |
|
| 686 | + foreach ($this->request_headers as $k => $v) |
|
| 687 | + { |
|
| 688 | + $temp_headers[] = $k . ': ' . $v; |
|
| 689 | + } |
|
| 690 | + |
|
| 691 | + curl_setopt($curl_handle, CURLOPT_HTTPHEADER, $temp_headers); |
|
| 692 | + } |
|
| 693 | + |
|
| 694 | + switch ($this->method) |
|
| 695 | + { |
|
| 696 | + case self::HTTP_PUT: |
|
| 697 | + //unset($this->read_stream); |
|
| 698 | + curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, 'PUT'); |
|
| 699 | + if (isset($this->read_stream)) |
|
| 700 | + { |
|
| 701 | + if (!isset($this->read_stream_size) || $this->read_stream_size < 0) |
|
| 702 | + { |
|
| 703 | + throw new RequestCore_Exception('The stream size for the streaming upload cannot be determined.'); |
|
| 704 | + } |
|
| 705 | + |
|
| 706 | + curl_setopt($curl_handle, CURLOPT_INFILESIZE, $this->read_stream_size); |
|
| 707 | + curl_setopt($curl_handle, CURLOPT_UPLOAD, true); |
|
| 708 | + } |
|
| 709 | + else |
|
| 710 | + { |
|
| 711 | + curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 712 | + } |
|
| 713 | + break; |
|
| 714 | + |
|
| 715 | + case self::HTTP_POST: |
|
| 716 | + curl_setopt($curl_handle, CURLOPT_POST, true); |
|
| 717 | + curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 718 | + break; |
|
| 719 | + |
|
| 720 | + case self::HTTP_HEAD: |
|
| 721 | + curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, self::HTTP_HEAD); |
|
| 722 | + curl_setopt($curl_handle, CURLOPT_NOBODY, 1); |
|
| 723 | + break; |
|
| 724 | + |
|
| 725 | + default: // Assumed GET |
|
| 726 | + curl_setopt($curl_handle, CURLOPT_CUSTOMREQUEST, $this->method); |
|
| 727 | + if (isset($this->write_stream)) |
|
| 728 | + { |
|
| 729 | + curl_setopt($curl_handle, CURLOPT_WRITEFUNCTION, array($this, 'streaming_write_callback')); |
|
| 730 | + curl_setopt($curl_handle, CURLOPT_HEADER, false); |
|
| 731 | + } |
|
| 732 | + else |
|
| 733 | + { |
|
| 734 | + curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
|
| 735 | + } |
|
| 736 | + break; |
|
| 737 | + } |
|
| 738 | + |
|
| 739 | + // Merge in the CURLOPTs |
|
| 740 | + if (isset($this->curlopts) && sizeof($this->curlopts) > 0) |
|
| 741 | + { |
|
| 742 | + foreach ($this->curlopts as $k => $v) |
|
| 743 | + { |
|
| 744 | + curl_setopt($curl_handle, $k, $v); |
|
| 745 | + } |
|
| 746 | + } |
|
| 747 | + |
|
| 748 | + return $curl_handle; |
|
| 749 | + } |
|
| 750 | + |
|
| 751 | + /** |
|
| 752 | + * Take the post-processed cURL data and break it down into useful header/body/info chunks. Uses the |
|
| 753 | + * data stored in the `curl_handle` and `response` properties unless replacement data is passed in via |
|
| 754 | + * parameters. |
|
| 755 | + * |
|
| 756 | + * @param resource $curl_handle (Optional) The reference to the already executed cURL request. |
|
| 757 | + * @param string $response (Optional) The actual response content itself that needs to be parsed. |
|
| 758 | + * @return ResponseCore A <ResponseCore> object containing a parsed HTTP response. |
|
| 759 | + */ |
|
| 760 | + public function process_response($curl_handle = null, $response = null) |
|
| 761 | + { |
|
| 762 | + // Accept a custom one if it's passed. |
|
| 763 | + if ($curl_handle && $response) |
|
| 764 | + { |
|
| 765 | + $this->curl_handle = $curl_handle; |
|
| 766 | + $this->response = $response; |
|
| 767 | + } |
|
| 768 | + |
|
| 769 | + // As long as this came back as a valid resource... |
|
| 770 | + if (is_resource($this->curl_handle)) |
|
| 771 | + { |
|
| 772 | + // Determine what's what. |
|
| 773 | + $header_size = curl_getinfo($this->curl_handle, CURLINFO_HEADER_SIZE); |
|
| 774 | + $this->response_headers = substr($this->response, 0, $header_size); |
|
| 775 | + $this->response_body = substr($this->response, $header_size); |
|
| 776 | + $this->response_code = curl_getinfo($this->curl_handle, CURLINFO_HTTP_CODE); |
|
| 777 | + $this->response_info = curl_getinfo($this->curl_handle); |
|
| 778 | + |
|
| 779 | + // Parse out the headers |
|
| 780 | + $this->response_headers = explode("\r\n\r\n", trim($this->response_headers)); |
|
| 781 | + $this->response_headers = array_pop($this->response_headers); |
|
| 782 | + $this->response_headers = explode("\r\n", $this->response_headers); |
|
| 783 | + array_shift($this->response_headers); |
|
| 784 | + |
|
| 785 | + // Loop through and split up the headers. |
|
| 786 | + $header_assoc = array(); |
|
| 787 | + foreach ($this->response_headers as $header) |
|
| 788 | + { |
|
| 789 | + $kv = explode(': ', $header); |
|
| 790 | + $header_assoc[strtolower($kv[0])] = isset($kv[1])?$kv[1]:''; |
|
| 791 | + } |
|
| 792 | + |
|
| 793 | + // Reset the headers to the appropriate property. |
|
| 794 | + $this->response_headers = $header_assoc; |
|
| 795 | + $this->response_headers['_info'] = $this->response_info; |
|
| 796 | + $this->response_headers['_info']['method'] = $this->method; |
|
| 797 | + |
|
| 798 | + if ($curl_handle && $response) |
|
| 799 | + { |
|
| 800 | + return new $this->response_class($this->response_headers, $this->response_body, $this->response_code, $this->curl_handle); |
|
| 801 | + } |
|
| 802 | + } |
|
| 803 | + |
|
| 804 | + // Return false |
|
| 805 | + return false; |
|
| 806 | + } |
|
| 807 | + |
|
| 808 | + /** |
|
| 809 | + * Sends the request, calling necessary utility functions to update built-in properties. |
|
| 810 | + * |
|
| 811 | + * @param boolean $parse (Optional) Whether to parse the response with ResponseCore or not. |
|
| 812 | + * @return string The resulting unparsed data from the request. |
|
| 813 | + */ |
|
| 814 | + public function send_request($parse = false) |
|
| 815 | + { |
|
| 816 | + set_time_limit(0); |
|
| 817 | + |
|
| 818 | + $curl_handle = $this->prep_request(); |
|
| 819 | + $this->response = curl_exec($curl_handle); |
|
| 820 | + |
|
| 821 | + if ($this->response === false) |
|
| 822 | + { |
|
| 823 | + throw new RequestCore_Exception('cURL resource: ' . (string) $curl_handle . '; cURL error: ' . curl_error($curl_handle) . ' (' . curl_errno($curl_handle) . ')'); |
|
| 824 | + } |
|
| 825 | + |
|
| 826 | + $parsed_response = $this->process_response($curl_handle, $this->response); |
|
| 827 | + |
|
| 828 | + curl_close($curl_handle); |
|
| 829 | + |
|
| 830 | + if ($parse) |
|
| 831 | + { |
|
| 832 | + return $parsed_response; |
|
| 833 | + } |
|
| 834 | + |
|
| 835 | + return $this->response; |
|
| 836 | + } |
|
| 837 | + |
|
| 838 | + /** |
|
| 839 | + * Sends the request using <php:curl_multi_exec()>, enabling parallel requests. Uses the "rolling" method. |
|
| 840 | + * |
|
| 841 | + * @param array $handles (Required) An indexed array of cURL handles to process simultaneously. |
|
| 842 | + * @param array $opt (Optional) An associative array of parameters that can have the following keys: <ul> |
|
| 843 | + * <li><code>callback</code> - <code>string|array</code> - Optional - The string name of a function to pass the response data to. If this is a method, pass an array where the <code>[0]</code> index is the class and the <code>[1]</code> index is the method name.</li> |
|
| 844 | + * <li><code>limit</code> - <code>integer</code> - Optional - The number of simultaneous requests to make. This can be useful for scaling around slow server responses. Defaults to trusting cURLs judgement as to how many to use.</li></ul> |
|
| 845 | + * @return array Post-processed cURL responses. |
|
| 846 | + */ |
|
| 847 | + public function send_multi_request($handles, $opt = null) |
|
| 848 | + { |
|
| 849 | + set_time_limit(0); |
|
| 850 | + |
|
| 851 | + // Skip everything if there are no handles to process. |
|
| 852 | + if (count($handles) === 0) return array(); |
|
| 853 | + |
|
| 854 | + if (!$opt) $opt = array(); |
|
| 855 | + |
|
| 856 | + // Initialize any missing options |
|
| 857 | + $limit = isset($opt['limit']) ? $opt['limit'] : -1; |
|
| 858 | + |
|
| 859 | + // Initialize |
|
| 860 | + $handle_list = $handles; |
|
| 861 | + $http = new $this->request_class(); |
|
| 862 | + $multi_handle = curl_multi_init(); |
|
| 863 | + $handles_post = array(); |
|
| 864 | + $added = count($handles); |
|
| 865 | + $last_handle = null; |
|
| 866 | + $count = 0; |
|
| 867 | + $i = 0; |
|
| 868 | + |
|
| 869 | + // Loop through the cURL handles and add as many as it set by the limit parameter. |
|
| 870 | + while ($i < $added) |
|
| 871 | + { |
|
| 872 | + if ($limit > 0 && $i >= $limit) break; |
|
| 873 | + curl_multi_add_handle($multi_handle, array_shift($handles)); |
|
| 874 | + $i++; |
|
| 875 | + } |
|
| 876 | + |
|
| 877 | + do |
|
| 878 | + { |
|
| 879 | + $active = false; |
|
| 880 | + |
|
| 881 | + // Start executing and wait for a response. |
|
| 882 | + while (($status = curl_multi_exec($multi_handle, $active)) === CURLM_CALL_MULTI_PERFORM) |
|
| 883 | + { |
|
| 884 | + // Start looking for possible responses immediately when we have to add more handles |
|
| 885 | + if (count($handles) > 0) break; |
|
| 886 | + } |
|
| 887 | + |
|
| 888 | + // Figure out which requests finished. |
|
| 889 | + $to_process = array(); |
|
| 890 | + |
|
| 891 | + while ($done = curl_multi_info_read($multi_handle)) |
|
| 892 | + { |
|
| 893 | + // Since curl_errno() isn't reliable for handles that were in multirequests, we check the 'result' of the info read, which contains the curl error number, (listed here http://curl.haxx.se/libcurl/c/libcurl-errors.html ) |
|
| 894 | + if ($done['result'] > 0) |
|
| 895 | + { |
|
| 896 | + throw new RequestCore_Exception('cURL resource: ' . (string) $done['handle'] . '; cURL error: ' . curl_error($done['handle']) . ' (' . $done['result'] . ')'); |
|
| 897 | + } |
|
| 898 | + |
|
| 899 | + // Because curl_multi_info_read() might return more than one message about a request, we check to see if this request is already in our array of completed requests |
|
| 900 | + elseif (!isset($to_process[(int) $done['handle']])) |
|
| 901 | + { |
|
| 902 | + $to_process[(int) $done['handle']] = $done; |
|
| 903 | + } |
|
| 904 | + } |
|
| 905 | + |
|
| 906 | + // Actually deal with the request |
|
| 907 | + foreach ($to_process as $pkey => $done) |
|
| 908 | + { |
|
| 909 | + $response = $http->process_response($done['handle'], curl_multi_getcontent($done['handle'])); |
|
| 910 | + $key = array_search($done['handle'], $handle_list, true); |
|
| 911 | + $handles_post[$key] = $response; |
|
| 912 | + |
|
| 913 | + if (count($handles) > 0) |
|
| 914 | + { |
|
| 915 | + curl_multi_add_handle($multi_handle, array_shift($handles)); |
|
| 916 | + } |
|
| 917 | + |
|
| 918 | + curl_multi_remove_handle($multi_handle, $done['handle']); |
|
| 919 | + curl_close($done['handle']); |
|
| 920 | + } |
|
| 921 | + } |
|
| 922 | + while ($active || count($handles_post) < $added); |
|
| 923 | + |
|
| 924 | + curl_multi_close($multi_handle); |
|
| 925 | + |
|
| 926 | + ksort($handles_post, SORT_NUMERIC); |
|
| 927 | + return $handles_post; |
|
| 928 | + } |
|
| 929 | + |
|
| 930 | + |
|
| 931 | + /*%******************************************************************************************%*/ |
|
| 932 | + // RESPONSE METHODS |
|
| 933 | + |
|
| 934 | + /** |
|
| 935 | + * Get the HTTP response headers from the request. |
|
| 936 | + * |
|
| 937 | + * @param string $header (Optional) A specific header value to return. Defaults to all headers. |
|
| 938 | + * @return string|array All or selected header values. |
|
| 939 | + */ |
|
| 940 | + public function get_response_header($header = null) |
|
| 941 | + { |
|
| 942 | + if ($header) |
|
| 943 | + { |
|
| 944 | + return $this->response_headers[strtolower($header)]; |
|
| 945 | + } |
|
| 946 | + return $this->response_headers; |
|
| 947 | + } |
|
| 948 | + |
|
| 949 | + /** |
|
| 950 | + * Get the HTTP response body from the request. |
|
| 951 | + * |
|
| 952 | + * @return string The response body. |
|
| 953 | + */ |
|
| 954 | + public function get_response_body() |
|
| 955 | + { |
|
| 956 | + return $this->response_body; |
|
| 957 | + } |
|
| 958 | + |
|
| 959 | + /** |
|
| 960 | + * Get the HTTP response code from the request. |
|
| 961 | + * |
|
| 962 | + * @return string The HTTP response code. |
|
| 963 | + */ |
|
| 964 | + public function get_response_code() |
|
| 965 | + { |
|
| 966 | + return $this->response_code; |
|
| 967 | + } |
|
| 968 | 968 | } |
| 969 | 969 | |
| 970 | 970 | |
@@ -973,53 +973,53 @@ discard block |
||
| 973 | 973 | */ |
| 974 | 974 | class ResponseCore |
| 975 | 975 | { |
| 976 | - /** |
|
| 977 | - * Stores the HTTP header information. |
|
| 978 | - */ |
|
| 979 | - public $header; |
|
| 980 | - |
|
| 981 | - /** |
|
| 982 | - * Stores the SimpleXML response. |
|
| 983 | - */ |
|
| 984 | - public $body; |
|
| 985 | - |
|
| 986 | - /** |
|
| 987 | - * Stores the HTTP response code. |
|
| 988 | - */ |
|
| 989 | - public $status; |
|
| 990 | - |
|
| 991 | - /** |
|
| 992 | - * Constructs a new instance of this class. |
|
| 993 | - * |
|
| 994 | - * @param array $header (Required) Associative array of HTTP headers (typically returned by <RequestCore::get_response_header()>). |
|
| 995 | - * @param string $body (Required) XML-formatted response from AWS. |
|
| 996 | - * @param integer $status (Optional) HTTP response status code from the request. |
|
| 997 | - * @return object Contains an <php:array> `header` property (HTTP headers as an associative array), a <php:SimpleXMLElement> or <php:string> `body` property, and an <php:integer> `status` code. |
|
| 998 | - */ |
|
| 999 | - public function __construct($header, $body, $status = null) |
|
| 1000 | - { |
|
| 1001 | - $this->header = $header; |
|
| 1002 | - $this->body = $body; |
|
| 1003 | - $this->status = $status; |
|
| 1004 | - |
|
| 1005 | - return $this; |
|
| 1006 | - } |
|
| 1007 | - |
|
| 1008 | - /** |
|
| 1009 | - * Did we receive the status code we expected? |
|
| 1010 | - * |
|
| 1011 | - * @param integer|array $codes (Optional) The status code(s) to expect. Pass an <php:integer> for a single acceptable value, or an <php:array> of integers for multiple acceptable values. |
|
| 1012 | - * @return boolean Whether we received the expected status code or not. |
|
| 1013 | - */ |
|
| 1014 | - public function isOK($codes = array(200, 201, 204, 206)) |
|
| 1015 | - { |
|
| 1016 | - if (is_array($codes)) |
|
| 1017 | - { |
|
| 1018 | - return in_array($this->status, $codes); |
|
| 1019 | - } |
|
| 1020 | - |
|
| 1021 | - return $this->status === $codes; |
|
| 1022 | - } |
|
| 976 | + /** |
|
| 977 | + * Stores the HTTP header information. |
|
| 978 | + */ |
|
| 979 | + public $header; |
|
| 980 | + |
|
| 981 | + /** |
|
| 982 | + * Stores the SimpleXML response. |
|
| 983 | + */ |
|
| 984 | + public $body; |
|
| 985 | + |
|
| 986 | + /** |
|
| 987 | + * Stores the HTTP response code. |
|
| 988 | + */ |
|
| 989 | + public $status; |
|
| 990 | + |
|
| 991 | + /** |
|
| 992 | + * Constructs a new instance of this class. |
|
| 993 | + * |
|
| 994 | + * @param array $header (Required) Associative array of HTTP headers (typically returned by <RequestCore::get_response_header()>). |
|
| 995 | + * @param string $body (Required) XML-formatted response from AWS. |
|
| 996 | + * @param integer $status (Optional) HTTP response status code from the request. |
|
| 997 | + * @return object Contains an <php:array> `header` property (HTTP headers as an associative array), a <php:SimpleXMLElement> or <php:string> `body` property, and an <php:integer> `status` code. |
|
| 998 | + */ |
|
| 999 | + public function __construct($header, $body, $status = null) |
|
| 1000 | + { |
|
| 1001 | + $this->header = $header; |
|
| 1002 | + $this->body = $body; |
|
| 1003 | + $this->status = $status; |
|
| 1004 | + |
|
| 1005 | + return $this; |
|
| 1006 | + } |
|
| 1007 | + |
|
| 1008 | + /** |
|
| 1009 | + * Did we receive the status code we expected? |
|
| 1010 | + * |
|
| 1011 | + * @param integer|array $codes (Optional) The status code(s) to expect. Pass an <php:integer> for a single acceptable value, or an <php:array> of integers for multiple acceptable values. |
|
| 1012 | + * @return boolean Whether we received the expected status code or not. |
|
| 1013 | + */ |
|
| 1014 | + public function isOK($codes = array(200, 201, 204, 206)) |
|
| 1015 | + { |
|
| 1016 | + if (is_array($codes)) |
|
| 1017 | + { |
|
| 1018 | + return in_array($this->status, $codes); |
|
| 1019 | + } |
|
| 1020 | + |
|
| 1021 | + return $this->status === $codes; |
|
| 1022 | + } |
|
| 1023 | 1023 | } |
| 1024 | 1024 | |
| 1025 | 1025 | /** |
@@ -387,7 +387,7 @@ discard block |
||
| 387 | 387 | |
| 388 | 388 | if ($position !== false && $position >= 0) |
| 389 | 389 | { |
| 390 | - $size = $stats['size'] - $position; |
|
| 390 | + $size = $stats['size']-$position; |
|
| 391 | 391 | } |
| 392 | 392 | } |
| 393 | 393 | } |
@@ -462,7 +462,7 @@ discard block |
||
| 462 | 462 | */ |
| 463 | 463 | public function set_seek_position($position) |
| 464 | 464 | { |
| 465 | - $this->seek_position = isset($position) ? (integer) $position : null; |
|
| 465 | + $this->seek_position = isset($position) ? (integer)$position : null; |
|
| 466 | 466 | |
| 467 | 467 | return $this; |
| 468 | 468 | } |
@@ -533,7 +533,7 @@ discard block |
||
| 533 | 533 | // Execute callback function |
| 534 | 534 | if ($this->registered_streaming_read_callback) |
| 535 | 535 | { |
| 536 | - return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length,$this->read_stream,$this->seek_position); |
|
| 536 | + return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length, $this->read_stream, $this->seek_position); |
|
| 537 | 537 | } |
| 538 | 538 | // Once we've sent as much as we're supposed to send... |
| 539 | 539 | if ($this->read_stream_read >= $this->read_stream_size) |
@@ -551,7 +551,7 @@ discard block |
||
| 551 | 551 | } |
| 552 | 552 | } |
| 553 | 553 | |
| 554 | - $read = fread($this->read_stream, min($this->read_stream_size - $this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
| 554 | + $read = fread($this->read_stream, min($this->read_stream_size-$this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
| 555 | 555 | $this->read_stream_read += strlen($read); |
| 556 | 556 | |
| 557 | 557 | $out = $read === false ? '' : $read; |
@@ -568,8 +568,8 @@ discard block |
||
| 568 | 568 | */ |
| 569 | 569 | public function streaming_write_callback($curl_handle, $data) |
| 570 | 570 | { |
| 571 | - if ($this->registered_streaming_write_callback){ |
|
| 572 | - return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle,$data,$this->write_stream); |
|
| 571 | + if ($this->registered_streaming_write_callback) { |
|
| 572 | + return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle, $data, $this->write_stream); |
|
| 573 | 573 | } |
| 574 | 574 | $length = strlen($data); |
| 575 | 575 | $written_total = 0; |
@@ -631,7 +631,7 @@ discard block |
||
| 631 | 631 | // chmod the file as 0755 |
| 632 | 632 | if ($this->cacert_location === true) |
| 633 | 633 | { |
| 634 | - curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__) . '/cacert.pem'); |
|
| 634 | + curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__).'/cacert.pem'); |
|
| 635 | 635 | } |
| 636 | 636 | elseif (is_string($this->cacert_location)) |
| 637 | 637 | { |
@@ -656,12 +656,12 @@ discard block |
||
| 656 | 656 | curl_setopt($curl_handle, CURLOPT_HTTPPROXYTUNNEL, true); |
| 657 | 657 | |
| 658 | 658 | $host = $this->proxy['host']; |
| 659 | - $host .= ($this->proxy['port']) ? ':' . $this->proxy['port'] : ''; |
|
| 659 | + $host .= ($this->proxy['port']) ? ':'.$this->proxy['port'] : ''; |
|
| 660 | 660 | curl_setopt($curl_handle, CURLOPT_PROXY, $host); |
| 661 | 661 | |
| 662 | 662 | if (isset($this->proxy['user']) && isset($this->proxy['pass'])) |
| 663 | 663 | { |
| 664 | - curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'] . ':' . $this->proxy['pass']); |
|
| 664 | + curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'].':'.$this->proxy['pass']); |
|
| 665 | 665 | } |
| 666 | 666 | } |
| 667 | 667 | |
@@ -669,7 +669,7 @@ discard block |
||
| 669 | 669 | if ($this->username && $this->password) |
| 670 | 670 | { |
| 671 | 671 | curl_setopt($curl_handle, CURLOPT_HTTPAUTH, CURLAUTH_ANY); |
| 672 | - curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username . ':' . $this->password); |
|
| 672 | + curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username.':'.$this->password); |
|
| 673 | 673 | } |
| 674 | 674 | |
| 675 | 675 | // Handle the encoding if we can. |
@@ -685,7 +685,7 @@ discard block |
||
| 685 | 685 | |
| 686 | 686 | foreach ($this->request_headers as $k => $v) |
| 687 | 687 | { |
| 688 | - $temp_headers[] = $k . ': ' . $v; |
|
| 688 | + $temp_headers[] = $k.': '.$v; |
|
| 689 | 689 | } |
| 690 | 690 | |
| 691 | 691 | curl_setopt($curl_handle, CURLOPT_HTTPHEADER, $temp_headers); |
@@ -787,7 +787,7 @@ discard block |
||
| 787 | 787 | foreach ($this->response_headers as $header) |
| 788 | 788 | { |
| 789 | 789 | $kv = explode(': ', $header); |
| 790 | - $header_assoc[strtolower($kv[0])] = isset($kv[1])?$kv[1]:''; |
|
| 790 | + $header_assoc[strtolower($kv[0])] = isset($kv[1]) ? $kv[1] : ''; |
|
| 791 | 791 | } |
| 792 | 792 | |
| 793 | 793 | // Reset the headers to the appropriate property. |
@@ -820,7 +820,7 @@ discard block |
||
| 820 | 820 | |
| 821 | 821 | if ($this->response === false) |
| 822 | 822 | { |
| 823 | - throw new RequestCore_Exception('cURL resource: ' . (string) $curl_handle . '; cURL error: ' . curl_error($curl_handle) . ' (' . curl_errno($curl_handle) . ')'); |
|
| 823 | + throw new RequestCore_Exception('cURL resource: '.(string)$curl_handle.'; cURL error: '.curl_error($curl_handle).' ('.curl_errno($curl_handle).')'); |
|
| 824 | 824 | } |
| 825 | 825 | |
| 826 | 826 | $parsed_response = $this->process_response($curl_handle, $this->response); |
@@ -893,13 +893,13 @@ discard block |
||
| 893 | 893 | // Since curl_errno() isn't reliable for handles that were in multirequests, we check the 'result' of the info read, which contains the curl error number, (listed here http://curl.haxx.se/libcurl/c/libcurl-errors.html ) |
| 894 | 894 | if ($done['result'] > 0) |
| 895 | 895 | { |
| 896 | - throw new RequestCore_Exception('cURL resource: ' . (string) $done['handle'] . '; cURL error: ' . curl_error($done['handle']) . ' (' . $done['result'] . ')'); |
|
| 896 | + throw new RequestCore_Exception('cURL resource: '.(string)$done['handle'].'; cURL error: '.curl_error($done['handle']).' ('.$done['result'].')'); |
|
| 897 | 897 | } |
| 898 | 898 | |
| 899 | 899 | // Because curl_multi_info_read() might return more than one message about a request, we check to see if this request is already in our array of completed requests |
| 900 | - elseif (!isset($to_process[(int) $done['handle']])) |
|
| 900 | + elseif (!isset($to_process[(int)$done['handle']])) |
|
| 901 | 901 | { |
| 902 | - $to_process[(int) $done['handle']] = $done; |
|
| 902 | + $to_process[(int)$done['handle']] = $done; |
|
| 903 | 903 | } |
| 904 | 904 | } |
| 905 | 905 | |
@@ -621,8 +621,7 @@ discard block |
||
| 621 | 621 | { |
| 622 | 622 | curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, true); |
| 623 | 623 | curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, 2); |
| 624 | - } |
|
| 625 | - else |
|
| 624 | + } else |
|
| 626 | 625 | { |
| 627 | 626 | curl_setopt($curl_handle, CURLOPT_SSL_VERIFYPEER, false); |
| 628 | 627 | curl_setopt($curl_handle, CURLOPT_SSL_VERIFYHOST, false); |
@@ -632,8 +631,7 @@ discard block |
||
| 632 | 631 | if ($this->cacert_location === true) |
| 633 | 632 | { |
| 634 | 633 | curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__) . '/cacert.pem'); |
| 635 | - } |
|
| 636 | - elseif (is_string($this->cacert_location)) |
|
| 634 | + } elseif (is_string($this->cacert_location)) |
|
| 637 | 635 | { |
| 638 | 636 | curl_setopt($curl_handle, CURLOPT_CAINFO, $this->cacert_location); |
| 639 | 637 | } |
@@ -705,8 +703,7 @@ discard block |
||
| 705 | 703 | |
| 706 | 704 | curl_setopt($curl_handle, CURLOPT_INFILESIZE, $this->read_stream_size); |
| 707 | 705 | curl_setopt($curl_handle, CURLOPT_UPLOAD, true); |
| 708 | - } |
|
| 709 | - else |
|
| 706 | + } else |
|
| 710 | 707 | { |
| 711 | 708 | curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
| 712 | 709 | } |
@@ -728,8 +725,7 @@ discard block |
||
| 728 | 725 | { |
| 729 | 726 | curl_setopt($curl_handle, CURLOPT_WRITEFUNCTION, array($this, 'streaming_write_callback')); |
| 730 | 727 | curl_setopt($curl_handle, CURLOPT_HEADER, false); |
| 731 | - } |
|
| 732 | - else |
|
| 728 | + } else |
|
| 733 | 729 | { |
| 734 | 730 | curl_setopt($curl_handle, CURLOPT_POSTFIELDS, $this->request_body); |
| 735 | 731 | } |
@@ -849,9 +845,13 @@ discard block |
||
| 849 | 845 | set_time_limit(0); |
| 850 | 846 | |
| 851 | 847 | // Skip everything if there are no handles to process. |
| 852 | - if (count($handles) === 0) return array(); |
|
| 848 | + if (count($handles) === 0) { |
|
| 849 | + return array(); |
|
| 850 | + } |
|
| 853 | 851 | |
| 854 | - if (!$opt) $opt = array(); |
|
| 852 | + if (!$opt) { |
|
| 853 | + $opt = array(); |
|
| 854 | + } |
|
| 855 | 855 | |
| 856 | 856 | // Initialize any missing options |
| 857 | 857 | $limit = isset($opt['limit']) ? $opt['limit'] : -1; |
@@ -869,7 +869,9 @@ discard block |
||
| 869 | 869 | // Loop through the cURL handles and add as many as it set by the limit parameter. |
| 870 | 870 | while ($i < $added) |
| 871 | 871 | { |
| 872 | - if ($limit > 0 && $i >= $limit) break; |
|
| 872 | + if ($limit > 0 && $i >= $limit) { |
|
| 873 | + break; |
|
| 874 | + } |
|
| 873 | 875 | curl_multi_add_handle($multi_handle, array_shift($handles)); |
| 874 | 876 | $i++; |
| 875 | 877 | } |
@@ -882,7 +884,9 @@ discard block |
||
| 882 | 884 | while (($status = curl_multi_exec($multi_handle, $active)) === CURLM_CALL_MULTI_PERFORM) |
| 883 | 885 | { |
| 884 | 886 | // Start looking for possible responses immediately when we have to add more handles |
| 885 | - if (count($handles) > 0) break; |
|
| 887 | + if (count($handles) > 0) { |
|
| 888 | + break; |
|
| 889 | + } |
|
| 886 | 890 | } |
| 887 | 891 | |
| 888 | 892 | // Figure out which requests finished. |
@@ -19,111 +19,111 @@ |
||
| 19 | 19 | |
| 20 | 20 | |
| 21 | 21 | if(function_exists('get_loaded_extensions')){ |
| 22 | - //检测mcrypt,openssl扩展 |
|
| 23 | - $extensions = get_loaded_extensions(); |
|
| 24 | - if($extensions){ |
|
| 25 | - if(!in_array('mcrypt', $extensions)){ |
|
| 26 | - throw new Ks3ClientException("please install mcrypt extension"); |
|
| 27 | - } |
|
| 28 | - if(!in_array('openssl', $extensions)){ |
|
| 29 | - throw new Ks3ClientException("please install openssl extension"); |
|
| 30 | - } |
|
| 31 | - }else{ |
|
| 32 | - throw new Ks3ClientException("please install extensions"); |
|
| 33 | - } |
|
| 22 | + //检测mcrypt,openssl扩展 |
|
| 23 | + $extensions = get_loaded_extensions(); |
|
| 24 | + if($extensions){ |
|
| 25 | + if(!in_array('mcrypt', $extensions)){ |
|
| 26 | + throw new Ks3ClientException("please install mcrypt extension"); |
|
| 27 | + } |
|
| 28 | + if(!in_array('openssl', $extensions)){ |
|
| 29 | + throw new Ks3ClientException("please install openssl extension"); |
|
| 30 | + } |
|
| 31 | + }else{ |
|
| 32 | + throw new Ks3ClientException("please install extensions"); |
|
| 33 | + } |
|
| 34 | 34 | }else{ |
| 35 | - throw new Ks3ClientException(); |
|
| 35 | + throw new Ks3ClientException(); |
|
| 36 | 36 | } |
| 37 | 37 | class Ks3EncryptionClient extends Ks3Client{ |
| 38 | - private $encryptionHandler = NULL; |
|
| 39 | - //用户提供的主密钥,可以是对称秘钥或非对称秘钥(array,分别是公钥和私钥) |
|
| 40 | - private $encryptionMaterials = NULL; |
|
| 38 | + private $encryptionHandler = NULL; |
|
| 39 | + //用户提供的主密钥,可以是对称秘钥或非对称秘钥(array,分别是公钥和私钥) |
|
| 40 | + private $encryptionMaterials = NULL; |
|
| 41 | 41 | |
| 42 | - public function __construct($accessKey, $secretKey,$encryptionMaterials, $endpoint = NULL ){ |
|
| 43 | - parent::__construct($accessKey,$secretKey,$endpoint); |
|
| 44 | - if(is_array($encryptionMaterials)){ |
|
| 45 | - if(count($encryptionMaterials)==2){ |
|
| 46 | - $pk = openssl_pkey_get_public($encryptionMaterials[0]); |
|
| 47 | - $sk = openssl_pkey_get_private($encryptionMaterials[1]); |
|
| 48 | - if(!$pk) |
|
| 49 | - throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
|
| 50 | - if(!$sk) |
|
| 51 | - throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
|
| 52 | - $encryptionMaterials = array($pk,$sk); |
|
| 53 | - }else{ |
|
| 54 | - throw new Ks3ClientException("encryptionMaterials should be string or an array of size 2"); |
|
| 55 | - } |
|
| 56 | - } |
|
| 57 | - $ks3client = new Ks3Client($accessKey,$secretKey,$endpoint); |
|
| 58 | - $this->encryptionMaterials = $encryptionMaterials; |
|
| 59 | - if(ENCRYPTPTION_MODE == "EO"){ |
|
| 60 | - $this->encryptionHandler = new EncryptionEO($ks3client,$encryptionMaterials); |
|
| 61 | - }elseif (ENCRYPTPTION_MODE == "AE") { |
|
| 62 | - throw new Ks3ClientException("Authenticated encryption will be supported in the futher"); |
|
| 63 | - } |
|
| 64 | - else{ |
|
| 65 | - throw new Ks3ClientException("unsupported encryption mode :".ENCRYPTPTION_MODE); |
|
| 66 | - } |
|
| 67 | - if(ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata"&&ENCRYPTPTION_STORAGE_MODE!="InstructionFile"){ |
|
| 68 | - throw new Ks3ClientException("unsupported encryption storage mode :".ENCRYPTPTION_STORAGE_MODE); |
|
| 69 | - } |
|
| 70 | - } |
|
| 42 | + public function __construct($accessKey, $secretKey,$encryptionMaterials, $endpoint = NULL ){ |
|
| 43 | + parent::__construct($accessKey,$secretKey,$endpoint); |
|
| 44 | + if(is_array($encryptionMaterials)){ |
|
| 45 | + if(count($encryptionMaterials)==2){ |
|
| 46 | + $pk = openssl_pkey_get_public($encryptionMaterials[0]); |
|
| 47 | + $sk = openssl_pkey_get_private($encryptionMaterials[1]); |
|
| 48 | + if(!$pk) |
|
| 49 | + throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
|
| 50 | + if(!$sk) |
|
| 51 | + throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
|
| 52 | + $encryptionMaterials = array($pk,$sk); |
|
| 53 | + }else{ |
|
| 54 | + throw new Ks3ClientException("encryptionMaterials should be string or an array of size 2"); |
|
| 55 | + } |
|
| 56 | + } |
|
| 57 | + $ks3client = new Ks3Client($accessKey,$secretKey,$endpoint); |
|
| 58 | + $this->encryptionMaterials = $encryptionMaterials; |
|
| 59 | + if(ENCRYPTPTION_MODE == "EO"){ |
|
| 60 | + $this->encryptionHandler = new EncryptionEO($ks3client,$encryptionMaterials); |
|
| 61 | + }elseif (ENCRYPTPTION_MODE == "AE") { |
|
| 62 | + throw new Ks3ClientException("Authenticated encryption will be supported in the futher"); |
|
| 63 | + } |
|
| 64 | + else{ |
|
| 65 | + throw new Ks3ClientException("unsupported encryption mode :".ENCRYPTPTION_MODE); |
|
| 66 | + } |
|
| 67 | + if(ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata"&&ENCRYPTPTION_STORAGE_MODE!="InstructionFile"){ |
|
| 68 | + throw new Ks3ClientException("unsupported encryption storage mode :".ENCRYPTPTION_STORAGE_MODE); |
|
| 69 | + } |
|
| 70 | + } |
|
| 71 | 71 | |
| 72 | - public function putObjectByContent($args=array()){ |
|
| 73 | - return $this->encryptionHandler->putObjectByContentSecurely($args); |
|
| 74 | - } |
|
| 75 | - public function putObjectByFile($args=array()){ |
|
| 76 | - return $this->encryptionHandler->putObjectByFileSecurely($args); |
|
| 77 | - } |
|
| 78 | - public function getObject($args=array()){ |
|
| 79 | - return $this->encryptionHandler->getObjectSecurely($args); |
|
| 80 | - } |
|
| 81 | - public function initMultipartUpload($args=array()){ |
|
| 82 | - return $this->encryptionHandler->initMultipartUploadSecurely($args); |
|
| 83 | - } |
|
| 84 | - public function uploadPart($args=array()){ |
|
| 85 | - return $this->encryptionHandler->uploadPartSecurely($args); |
|
| 86 | - } |
|
| 87 | - public function abortMultipartUpload($args=array()){ |
|
| 88 | - return $this->encryptionHandler->abortMultipartUploadSecurely($args); |
|
| 89 | - } |
|
| 90 | - public function completeMultipartUpload($args=array()){ |
|
| 91 | - return $this->encryptionHandler->completeMultipartUploadSecurely($args); |
|
| 92 | - } |
|
| 93 | - public function deleteObject($args=array()){ |
|
| 94 | - $result = parent::deleteObject($args); |
|
| 95 | - $args["Key"] = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 96 | - try { |
|
| 97 | - parent::deleteObject($args); |
|
| 98 | - } catch (Exception $e) { |
|
| 99 | - //do nothing |
|
| 100 | - } |
|
| 101 | - return $result; |
|
| 102 | - } |
|
| 103 | - public function copyObject($args=array()){ |
|
| 104 | - if(parent::objectExists(array( |
|
| 105 | - "Bucket"=>$args["Bucket"], |
|
| 106 | - "Key"=>$args["Key"] |
|
| 107 | - ))){ |
|
| 108 | - throw new Ks3ClientException("copy object faild,destination object exists"); |
|
| 109 | - } |
|
| 110 | - if(parent::objectExists(array( |
|
| 111 | - "Bucket"=>$args["CopySource"]["Bucket"], |
|
| 112 | - "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
|
| 113 | - ))){ |
|
| 114 | - parent::copyObject( |
|
| 115 | - array( |
|
| 116 | - "Bucket"=>$args["Bucket"], |
|
| 117 | - "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX, |
|
| 118 | - "CopySource"=>array( |
|
| 119 | - "Bucket"=>$args["CopySource"]["Bucket"], |
|
| 120 | - "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
|
| 121 | - ) |
|
| 122 | - ) |
|
| 123 | - ); |
|
| 124 | - } |
|
| 125 | - return parent::copyObject($args); |
|
| 126 | - } |
|
| 72 | + public function putObjectByContent($args=array()){ |
|
| 73 | + return $this->encryptionHandler->putObjectByContentSecurely($args); |
|
| 74 | + } |
|
| 75 | + public function putObjectByFile($args=array()){ |
|
| 76 | + return $this->encryptionHandler->putObjectByFileSecurely($args); |
|
| 77 | + } |
|
| 78 | + public function getObject($args=array()){ |
|
| 79 | + return $this->encryptionHandler->getObjectSecurely($args); |
|
| 80 | + } |
|
| 81 | + public function initMultipartUpload($args=array()){ |
|
| 82 | + return $this->encryptionHandler->initMultipartUploadSecurely($args); |
|
| 83 | + } |
|
| 84 | + public function uploadPart($args=array()){ |
|
| 85 | + return $this->encryptionHandler->uploadPartSecurely($args); |
|
| 86 | + } |
|
| 87 | + public function abortMultipartUpload($args=array()){ |
|
| 88 | + return $this->encryptionHandler->abortMultipartUploadSecurely($args); |
|
| 89 | + } |
|
| 90 | + public function completeMultipartUpload($args=array()){ |
|
| 91 | + return $this->encryptionHandler->completeMultipartUploadSecurely($args); |
|
| 92 | + } |
|
| 93 | + public function deleteObject($args=array()){ |
|
| 94 | + $result = parent::deleteObject($args); |
|
| 95 | + $args["Key"] = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 96 | + try { |
|
| 97 | + parent::deleteObject($args); |
|
| 98 | + } catch (Exception $e) { |
|
| 99 | + //do nothing |
|
| 100 | + } |
|
| 101 | + return $result; |
|
| 102 | + } |
|
| 103 | + public function copyObject($args=array()){ |
|
| 104 | + if(parent::objectExists(array( |
|
| 105 | + "Bucket"=>$args["Bucket"], |
|
| 106 | + "Key"=>$args["Key"] |
|
| 107 | + ))){ |
|
| 108 | + throw new Ks3ClientException("copy object faild,destination object exists"); |
|
| 109 | + } |
|
| 110 | + if(parent::objectExists(array( |
|
| 111 | + "Bucket"=>$args["CopySource"]["Bucket"], |
|
| 112 | + "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
|
| 113 | + ))){ |
|
| 114 | + parent::copyObject( |
|
| 115 | + array( |
|
| 116 | + "Bucket"=>$args["Bucket"], |
|
| 117 | + "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX, |
|
| 118 | + "CopySource"=>array( |
|
| 119 | + "Bucket"=>$args["CopySource"]["Bucket"], |
|
| 120 | + "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
|
| 121 | + ) |
|
| 122 | + ) |
|
| 123 | + ); |
|
| 124 | + } |
|
| 125 | + return parent::copyObject($args); |
|
| 126 | + } |
|
| 127 | 127 | } |
| 128 | 128 | |
| 129 | 129 | ?> |
| 130 | 130 | \ No newline at end of file |
@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | //使用客户端加密的方式上传下载文件 |
| 3 | 3 | //检测API路径 |
| 4 | -if(!defined('KS3_API_PATH')) |
|
| 4 | +if (!defined('KS3_API_PATH')) |
|
| 5 | 5 | define('KS3_API_PATH', dirname(__FILE__)); |
| 6 | 6 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."Ks3Client.class.php"; |
| 7 | 7 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
@@ -9,88 +9,88 @@ discard block |
||
| 9 | 9 | |
| 10 | 10 | //加密模式 |
| 11 | 11 | //暂时仅支持EO,使用AES/CBC/PKCS5Padding算法对数据进行加密 |
| 12 | -if(!defined("ENCRYPTPTION_MODE")) |
|
| 13 | -define("ENCRYPTPTION_MODE","EO"); |
|
| 12 | +if (!defined("ENCRYPTPTION_MODE")) |
|
| 13 | +define("ENCRYPTPTION_MODE", "EO"); |
|
| 14 | 14 | //加密信息存储模式,暂时支持 ObjectMetadata和InstructionFile |
| 15 | 15 | //ObjectMetadata:存在用户元数据中 |
| 16 | 16 | //InstructionFile:存在一个.instruction文件中 |
| 17 | -if(!defined("ENCRYPTPTION_STORAGE_MODE")) |
|
| 18 | -define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
| 17 | +if (!defined("ENCRYPTPTION_STORAGE_MODE")) |
|
| 18 | +define("ENCRYPTPTION_STORAGE_MODE", "ObjectMetadata"); |
|
| 19 | 19 | |
| 20 | 20 | |
| 21 | -if(function_exists('get_loaded_extensions')){ |
|
| 21 | +if (function_exists('get_loaded_extensions')) { |
|
| 22 | 22 | //检测mcrypt,openssl扩展 |
| 23 | 23 | $extensions = get_loaded_extensions(); |
| 24 | - if($extensions){ |
|
| 25 | - if(!in_array('mcrypt', $extensions)){ |
|
| 24 | + if ($extensions) { |
|
| 25 | + if (!in_array('mcrypt', $extensions)) { |
|
| 26 | 26 | throw new Ks3ClientException("please install mcrypt extension"); |
| 27 | 27 | } |
| 28 | - if(!in_array('openssl', $extensions)){ |
|
| 28 | + if (!in_array('openssl', $extensions)) { |
|
| 29 | 29 | throw new Ks3ClientException("please install openssl extension"); |
| 30 | 30 | } |
| 31 | - }else{ |
|
| 31 | + }else { |
|
| 32 | 32 | throw new Ks3ClientException("please install extensions"); |
| 33 | 33 | } |
| 34 | -}else{ |
|
| 34 | +}else { |
|
| 35 | 35 | throw new Ks3ClientException(); |
| 36 | 36 | } |
| 37 | -class Ks3EncryptionClient extends Ks3Client{ |
|
| 37 | +class Ks3EncryptionClient extends Ks3Client { |
|
| 38 | 38 | private $encryptionHandler = NULL; |
| 39 | 39 | //用户提供的主密钥,可以是对称秘钥或非对称秘钥(array,分别是公钥和私钥) |
| 40 | 40 | private $encryptionMaterials = NULL; |
| 41 | 41 | |
| 42 | - public function __construct($accessKey, $secretKey,$encryptionMaterials, $endpoint = NULL ){ |
|
| 43 | - parent::__construct($accessKey,$secretKey,$endpoint); |
|
| 44 | - if(is_array($encryptionMaterials)){ |
|
| 45 | - if(count($encryptionMaterials)==2){ |
|
| 42 | + public function __construct($accessKey, $secretKey, $encryptionMaterials, $endpoint = NULL) { |
|
| 43 | + parent::__construct($accessKey, $secretKey, $endpoint); |
|
| 44 | + if (is_array($encryptionMaterials)) { |
|
| 45 | + if (count($encryptionMaterials) == 2) { |
|
| 46 | 46 | $pk = openssl_pkey_get_public($encryptionMaterials[0]); |
| 47 | 47 | $sk = openssl_pkey_get_private($encryptionMaterials[1]); |
| 48 | - if(!$pk) |
|
| 48 | + if (!$pk) |
|
| 49 | 49 | throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
| 50 | - if(!$sk) |
|
| 50 | + if (!$sk) |
|
| 51 | 51 | throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
| 52 | - $encryptionMaterials = array($pk,$sk); |
|
| 53 | - }else{ |
|
| 52 | + $encryptionMaterials = array($pk, $sk); |
|
| 53 | + }else { |
|
| 54 | 54 | throw new Ks3ClientException("encryptionMaterials should be string or an array of size 2"); |
| 55 | 55 | } |
| 56 | 56 | } |
| 57 | - $ks3client = new Ks3Client($accessKey,$secretKey,$endpoint); |
|
| 57 | + $ks3client = new Ks3Client($accessKey, $secretKey, $endpoint); |
|
| 58 | 58 | $this->encryptionMaterials = $encryptionMaterials; |
| 59 | - if(ENCRYPTPTION_MODE == "EO"){ |
|
| 60 | - $this->encryptionHandler = new EncryptionEO($ks3client,$encryptionMaterials); |
|
| 59 | + if (ENCRYPTPTION_MODE == "EO") { |
|
| 60 | + $this->encryptionHandler = new EncryptionEO($ks3client, $encryptionMaterials); |
|
| 61 | 61 | }elseif (ENCRYPTPTION_MODE == "AE") { |
| 62 | 62 | throw new Ks3ClientException("Authenticated encryption will be supported in the futher"); |
| 63 | 63 | } |
| 64 | - else{ |
|
| 64 | + else { |
|
| 65 | 65 | throw new Ks3ClientException("unsupported encryption mode :".ENCRYPTPTION_MODE); |
| 66 | 66 | } |
| 67 | - if(ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata"&&ENCRYPTPTION_STORAGE_MODE!="InstructionFile"){ |
|
| 67 | + if (ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata" && ENCRYPTPTION_STORAGE_MODE != "InstructionFile") { |
|
| 68 | 68 | throw new Ks3ClientException("unsupported encryption storage mode :".ENCRYPTPTION_STORAGE_MODE); |
| 69 | 69 | } |
| 70 | 70 | } |
| 71 | 71 | |
| 72 | - public function putObjectByContent($args=array()){ |
|
| 72 | + public function putObjectByContent($args = array()) { |
|
| 73 | 73 | return $this->encryptionHandler->putObjectByContentSecurely($args); |
| 74 | 74 | } |
| 75 | - public function putObjectByFile($args=array()){ |
|
| 75 | + public function putObjectByFile($args = array()) { |
|
| 76 | 76 | return $this->encryptionHandler->putObjectByFileSecurely($args); |
| 77 | 77 | } |
| 78 | - public function getObject($args=array()){ |
|
| 78 | + public function getObject($args = array()) { |
|
| 79 | 79 | return $this->encryptionHandler->getObjectSecurely($args); |
| 80 | 80 | } |
| 81 | - public function initMultipartUpload($args=array()){ |
|
| 81 | + public function initMultipartUpload($args = array()) { |
|
| 82 | 82 | return $this->encryptionHandler->initMultipartUploadSecurely($args); |
| 83 | 83 | } |
| 84 | - public function uploadPart($args=array()){ |
|
| 84 | + public function uploadPart($args = array()) { |
|
| 85 | 85 | return $this->encryptionHandler->uploadPartSecurely($args); |
| 86 | 86 | } |
| 87 | - public function abortMultipartUpload($args=array()){ |
|
| 87 | + public function abortMultipartUpload($args = array()) { |
|
| 88 | 88 | return $this->encryptionHandler->abortMultipartUploadSecurely($args); |
| 89 | 89 | } |
| 90 | - public function completeMultipartUpload($args=array()){ |
|
| 90 | + public function completeMultipartUpload($args = array()) { |
|
| 91 | 91 | return $this->encryptionHandler->completeMultipartUploadSecurely($args); |
| 92 | 92 | } |
| 93 | - public function deleteObject($args=array()){ |
|
| 93 | + public function deleteObject($args = array()) { |
|
| 94 | 94 | $result = parent::deleteObject($args); |
| 95 | 95 | $args["Key"] = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
| 96 | 96 | try { |
@@ -100,17 +100,17 @@ discard block |
||
| 100 | 100 | } |
| 101 | 101 | return $result; |
| 102 | 102 | } |
| 103 | - public function copyObject($args=array()){ |
|
| 104 | - if(parent::objectExists(array( |
|
| 103 | + public function copyObject($args = array()) { |
|
| 104 | + if (parent::objectExists(array( |
|
| 105 | 105 | "Bucket"=>$args["Bucket"], |
| 106 | 106 | "Key"=>$args["Key"] |
| 107 | - ))){ |
|
| 107 | + ))) { |
|
| 108 | 108 | throw new Ks3ClientException("copy object faild,destination object exists"); |
| 109 | 109 | } |
| 110 | - if(parent::objectExists(array( |
|
| 110 | + if (parent::objectExists(array( |
|
| 111 | 111 | "Bucket"=>$args["CopySource"]["Bucket"], |
| 112 | 112 | "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
| 113 | - ))){ |
|
| 113 | + ))) { |
|
| 114 | 114 | parent::copyObject( |
| 115 | 115 | array( |
| 116 | 116 | "Bucket"=>$args["Bucket"], |
@@ -1,21 +1,24 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | //使用客户端加密的方式上传下载文件 |
| 3 | 3 | //检测API路径 |
| 4 | -if(!defined('KS3_API_PATH')) |
|
| 5 | -define('KS3_API_PATH', dirname(__FILE__)); |
|
| 4 | +if(!defined('KS3_API_PATH')) { |
|
| 5 | + define('KS3_API_PATH', dirname(__FILE__)); |
|
| 6 | +} |
|
| 6 | 7 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."Ks3Client.class.php"; |
| 7 | 8 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
| 8 | 9 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionHandlers.php"; |
| 9 | 10 | |
| 10 | 11 | //加密模式 |
| 11 | 12 | //暂时仅支持EO,使用AES/CBC/PKCS5Padding算法对数据进行加密 |
| 12 | -if(!defined("ENCRYPTPTION_MODE")) |
|
| 13 | -define("ENCRYPTPTION_MODE","EO"); |
|
| 13 | +if(!defined("ENCRYPTPTION_MODE")) { |
|
| 14 | + define("ENCRYPTPTION_MODE","EO"); |
|
| 15 | +} |
|
| 14 | 16 | //加密信息存储模式,暂时支持 ObjectMetadata和InstructionFile |
| 15 | 17 | //ObjectMetadata:存在用户元数据中 |
| 16 | 18 | //InstructionFile:存在一个.instruction文件中 |
| 17 | -if(!defined("ENCRYPTPTION_STORAGE_MODE")) |
|
| 18 | -define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
| 19 | +if(!defined("ENCRYPTPTION_STORAGE_MODE")) { |
|
| 20 | + define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
| 21 | +} |
|
| 19 | 22 | |
| 20 | 23 | |
| 21 | 24 | if(function_exists('get_loaded_extensions')){ |
@@ -28,10 +31,10 @@ discard block |
||
| 28 | 31 | if(!in_array('openssl', $extensions)){ |
| 29 | 32 | throw new Ks3ClientException("please install openssl extension"); |
| 30 | 33 | } |
| 31 | - }else{ |
|
| 34 | + } else{ |
|
| 32 | 35 | throw new Ks3ClientException("please install extensions"); |
| 33 | 36 | } |
| 34 | -}else{ |
|
| 37 | +} else{ |
|
| 35 | 38 | throw new Ks3ClientException(); |
| 36 | 39 | } |
| 37 | 40 | class Ks3EncryptionClient extends Ks3Client{ |
@@ -45,12 +48,14 @@ discard block |
||
| 45 | 48 | if(count($encryptionMaterials)==2){ |
| 46 | 49 | $pk = openssl_pkey_get_public($encryptionMaterials[0]); |
| 47 | 50 | $sk = openssl_pkey_get_private($encryptionMaterials[1]); |
| 48 | - if(!$pk) |
|
| 49 | - throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
|
| 50 | - if(!$sk) |
|
| 51 | - throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
|
| 51 | + if(!$pk) { |
|
| 52 | + throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
|
| 53 | + } |
|
| 54 | + if(!$sk) { |
|
| 55 | + throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
|
| 56 | + } |
|
| 52 | 57 | $encryptionMaterials = array($pk,$sk); |
| 53 | - }else{ |
|
| 58 | + } else{ |
|
| 54 | 59 | throw new Ks3ClientException("encryptionMaterials should be string or an array of size 2"); |
| 55 | 60 | } |
| 56 | 61 | } |
@@ -58,10 +63,9 @@ discard block |
||
| 58 | 63 | $this->encryptionMaterials = $encryptionMaterials; |
| 59 | 64 | if(ENCRYPTPTION_MODE == "EO"){ |
| 60 | 65 | $this->encryptionHandler = new EncryptionEO($ks3client,$encryptionMaterials); |
| 61 | - }elseif (ENCRYPTPTION_MODE == "AE") { |
|
| 66 | + } elseif (ENCRYPTPTION_MODE == "AE") { |
|
| 62 | 67 | throw new Ks3ClientException("Authenticated encryption will be supported in the futher"); |
| 63 | - } |
|
| 64 | - else{ |
|
| 68 | + } else{ |
|
| 65 | 69 | throw new Ks3ClientException("unsupported encryption mode :".ENCRYPTPTION_MODE); |
| 66 | 70 | } |
| 67 | 71 | if(ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata"&&ENCRYPTPTION_STORAGE_MODE!="InstructionFile"){ |
@@ -16,14 +16,14 @@ |
||
| 16 | 16 | |
| 17 | 17 | //将所有能确定值的表单项都放在该数组中 |
| 18 | 18 | $postData = array( |
| 19 | - "key"=>$key, |
|
| 20 | - "success_action_redirect"=>$redirect, |
|
| 21 | - "Content-Type"=>"text/html", |
|
| 22 | - ); |
|
| 19 | + "key"=>$key, |
|
| 20 | + "success_action_redirect"=>$redirect, |
|
| 21 | + "Content-Type"=>"text/html", |
|
| 22 | + ); |
|
| 23 | 23 | //将不能确定值的表单项都放在该数组中 |
| 24 | 24 | $unknowData = array( |
| 25 | - "random" |
|
| 26 | - ); |
|
| 25 | + "random" |
|
| 26 | + ); |
|
| 27 | 27 | $result = $client->postObject($bucket_name,$postData,$unknowData); |
| 28 | 28 | print_r($result); |
| 29 | 29 | |
@@ -2,9 +2,9 @@ discard block |
||
| 2 | 2 | //更加详细的表单上传请参考js sdk |
| 3 | 3 | require_once "../Ks3Client.class.php"; |
| 4 | 4 | |
| 5 | -$client = new Ks3Client("",""); |
|
| 5 | +$client = new Ks3Client("", ""); |
|
| 6 | 6 | $bucket_name = "phpsdktestlijunwei"; |
| 7 | -if(!$client->bucketExists(array("Bucket"=>$bucket_name))){ |
|
| 7 | +if (!$client->bucketExists(array("Bucket"=>$bucket_name))) { |
|
| 8 | 8 | $client->createBucket(array("Bucket"=>$bucket_name)); |
| 9 | 9 | } |
| 10 | 10 | |
@@ -24,7 +24,7 @@ discard block |
||
| 24 | 24 | $unknowData = array( |
| 25 | 25 | "random" |
| 26 | 26 | ); |
| 27 | -$result = $client->postObject($bucket_name,$postData,$unknowData); |
|
| 27 | +$result = $client->postObject($bucket_name, $postData, $unknowData); |
|
| 28 | 28 | print_r($result); |
| 29 | 29 | |
| 30 | 30 | ?> |
@@ -33,14 +33,14 @@ discard block |
||
| 33 | 33 | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> |
| 34 | 34 | </head> |
| 35 | 35 | <body> |
| 36 | -<form action="<?php echo $host_uri;?>" method="post" enctype="multipart/form-data"> |
|
| 37 | -Key to upload: <input type="input" name="key" value="<?php echo $key;?>" /><br /> |
|
| 38 | -<input type="hidden" name="success_action_redirect" value="<?php echo $redirect;?>" /> |
|
| 36 | +<form action="<?php echo $host_uri; ?>" method="post" enctype="multipart/form-data"> |
|
| 37 | +Key to upload: <input type="input" name="key" value="<?php echo $key; ?>" /><br /> |
|
| 38 | +<input type="hidden" name="success_action_redirect" value="<?php echo $redirect; ?>" /> |
|
| 39 | 39 | <input type="hidden" name="Content-Type" value="text/html" /> |
| 40 | 40 | <input type="hidden" name="random" value="vfegf34egf3" /> |
| 41 | -<input type="hidden" name="KSSAccessKeyId" value="<?php echo $result["KSSAccessKeyId"];?>" /> |
|
| 42 | -<input type="hidden" name="Policy" value="<?php echo $result["Policy"];?>" /> |
|
| 43 | -<input type="hidden" name="Signature" value="<?php echo $result["Signature"];?>" /> |
|
| 41 | +<input type="hidden" name="KSSAccessKeyId" value="<?php echo $result["KSSAccessKeyId"]; ?>" /> |
|
| 42 | +<input type="hidden" name="Policy" value="<?php echo $result["Policy"]; ?>" /> |
|
| 43 | +<input type="hidden" name="Signature" value="<?php echo $result["Signature"]; ?>" /> |
|
| 44 | 44 | File: <input type="file" name="file" /> <br /> |
| 45 | 45 | <!-- The elements after this will be ignored --> |
| 46 | 46 | <input type="submit" name="submit" value="Upload to KSS S3" /> |
@@ -16,37 +16,37 @@ discard block |
||
| 16 | 16 | multipartUpload($client,$bucket,$keyprefix); |
| 17 | 17 | |
| 18 | 18 | function putObjectByContentAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
| 19 | - for($i = 45 ;$i < 60;$i++){ |
|
| 19 | + for($i = 45 ;$i < 60;$i++){ |
|
| 20 | 20 | |
| 21 | - $content = EncryptionUtil::genereateOnceUsedKey($i); |
|
| 21 | + $content = EncryptionUtil::genereateOnceUsedKey($i); |
|
| 22 | 22 | |
| 23 | - $args = array( |
|
| 24 | - "Bucket"=>$bucket, |
|
| 25 | - "Key"=>$keyprefix."EOMeta", |
|
| 26 | - "ACL"=>"public-read", |
|
| 27 | - "Content"=>$content |
|
| 28 | - ); |
|
| 29 | - $client->putObjectByContent($args); |
|
| 30 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 31 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 32 | - } |
|
| 23 | + $args = array( |
|
| 24 | + "Bucket"=>$bucket, |
|
| 25 | + "Key"=>$keyprefix."EOMeta", |
|
| 26 | + "ACL"=>"public-read", |
|
| 27 | + "Content"=>$content |
|
| 28 | + ); |
|
| 29 | + $client->putObjectByContent($args); |
|
| 30 | + rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 31 | + "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 32 | + } |
|
| 33 | 33 | } |
| 34 | 34 | function putObjectByFileAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
| 35 | 35 | |
| 36 | - $args = array( |
|
| 37 | - "Bucket"=>$bucket, |
|
| 38 | - "Key"=>$keyprefix."EOMeta", |
|
| 39 | - "ACL"=>"public-read", |
|
| 40 | - "Content"=>array( |
|
| 41 | - "content"=>"D://IMG.jpg" |
|
| 42 | - ) |
|
| 43 | - ); |
|
| 44 | - $client->putObjectByFile($args); |
|
| 45 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 46 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 36 | + $args = array( |
|
| 37 | + "Bucket"=>$bucket, |
|
| 38 | + "Key"=>$keyprefix."EOMeta", |
|
| 39 | + "ACL"=>"public-read", |
|
| 40 | + "Content"=>array( |
|
| 41 | + "content"=>"D://IMG.jpg" |
|
| 42 | + ) |
|
| 43 | + ); |
|
| 44 | + $client->putObjectByFile($args); |
|
| 45 | + rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 46 | + "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 47 | 47 | } |
| 48 | 48 | function multipartUpload($client,$bucket,$keyprefix){ |
| 49 | - //初始化分开上传,获取uploadid |
|
| 49 | + //初始化分开上传,获取uploadid |
|
| 50 | 50 | $args = array( |
| 51 | 51 | "Bucket"=>$bucket, |
| 52 | 52 | "Key"=>$keyprefix."EOMeta", |
@@ -67,8 +67,8 @@ discard block |
||
| 67 | 67 | echo "upload".$i."\r\n"; |
| 68 | 68 | $args=array( |
| 69 | 69 | "Bucket"=>$bucket, |
| 70 | - "Key"=>$keyprefix."EOMeta", |
|
| 71 | - "LastPart"=>($i===$count-1), |
|
| 70 | + "Key"=>$keyprefix."EOMeta", |
|
| 71 | + "LastPart"=>($i===$count-1), |
|
| 72 | 72 | "Options"=>array( |
| 73 | 73 | "partNumber"=>$i+1, |
| 74 | 74 | "uploadId"=>$uploadid |
@@ -95,42 +95,42 @@ discard block |
||
| 95 | 95 | $result = $client->completeMultipartUpload($args); |
| 96 | 96 | |
| 97 | 97 | rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
| 98 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 98 | + "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 99 | 99 | } |
| 100 | 100 | function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
| 101 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 102 | - $meta = $client->getObjectMeta($args); |
|
| 103 | - $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 101 | + $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 102 | + $meta = $client->getObjectMeta($args); |
|
| 103 | + $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 104 | 104 | |
| 105 | - $filelist = array(); |
|
| 105 | + $filelist = array(); |
|
| 106 | 106 | |
| 107 | - for($begin = 0;$begin <$contentlength;){ |
|
| 108 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 109 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 110 | - $destFile = $file.$begin."-".($begin+$index); |
|
| 111 | - array_push($filelist,$destFile); |
|
| 112 | - $begin += ($index+1); |
|
| 113 | - $args = array( |
|
| 114 | - "Bucket"=>$bucket, |
|
| 115 | - "Key"=>$key, |
|
| 116 | - "Range"=>$range, |
|
| 117 | - "WriteTo"=>$destFile |
|
| 118 | - ); |
|
| 119 | - $client->getObject($args); |
|
| 120 | - } |
|
| 107 | + for($begin = 0;$begin <$contentlength;){ |
|
| 108 | + $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 109 | + $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 110 | + $destFile = $file.$begin."-".($begin+$index); |
|
| 111 | + array_push($filelist,$destFile); |
|
| 112 | + $begin += ($index+1); |
|
| 113 | + $args = array( |
|
| 114 | + "Bucket"=>$bucket, |
|
| 115 | + "Key"=>$key, |
|
| 116 | + "Range"=>$range, |
|
| 117 | + "WriteTo"=>$destFile |
|
| 118 | + ); |
|
| 119 | + $client->getObject($args); |
|
| 120 | + } |
|
| 121 | 121 | |
| 122 | - foreach ($filelist as $key => $value) { |
|
| 123 | - $handle = fopen($value,"r"); |
|
| 124 | - $size = filesize($value); |
|
| 125 | - if($size > 0){ |
|
| 126 | - $content = fread($handle,$size); |
|
| 127 | - file_put_contents($file,$content,FILE_APPEND); |
|
| 128 | - } |
|
| 129 | - fclose($handle); |
|
| 130 | - @unlink($value); |
|
| 131 | - } |
|
| 132 | - $md5 = base64_encode(md5_file($file)); |
|
| 133 | - if($md5 != $expectedMd5) |
|
| 134 | - throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 135 | - @unlink($file); |
|
| 122 | + foreach ($filelist as $key => $value) { |
|
| 123 | + $handle = fopen($value,"r"); |
|
| 124 | + $size = filesize($value); |
|
| 125 | + if($size > 0){ |
|
| 126 | + $content = fread($handle,$size); |
|
| 127 | + file_put_contents($file,$content,FILE_APPEND); |
|
| 128 | + } |
|
| 129 | + fclose($handle); |
|
| 130 | + @unlink($value); |
|
| 131 | + } |
|
| 132 | + $md5 = base64_encode(md5_file($file)); |
|
| 133 | + if($md5 != $expectedMd5) |
|
| 134 | + throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 135 | + @unlink($file); |
|
| 136 | 136 | } |
@@ -1,5 +1,5 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | -define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
| 2 | +define("ENCRYPTPTION_STORAGE_MODE", "ObjectMetadata"); |
|
| 3 | 3 | require_once "../Ks3EncryptionClient.class.php"; |
| 4 | 4 | require_once "../Ks3Client.class.php"; |
| 5 | 5 | $bucket = "test-encryption"; |
@@ -7,16 +7,16 @@ discard block |
||
| 7 | 7 | |
| 8 | 8 | $filename = "secret.key"; |
| 9 | 9 | $handle = fopen($filename, "r"); |
| 10 | -$contents = fread($handle, filesize ($filename)); |
|
| 10 | +$contents = fread($handle, filesize($filename)); |
|
| 11 | 11 | fclose($handle); |
| 12 | 12 | |
| 13 | -$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x","D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I",$contents); |
|
| 14 | -putObjectByContentAndGetObjectUsingMeta($client,$bucket,$keyprefix); |
|
| 15 | -putObjectByFileAndGetObjectUsingMeta($client,$bucket,$keyprefix); |
|
| 16 | -multipartUpload($client,$bucket,$keyprefix); |
|
| 13 | +$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x", "D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I", $contents); |
|
| 14 | +putObjectByContentAndGetObjectUsingMeta($client, $bucket, $keyprefix); |
|
| 15 | +putObjectByFileAndGetObjectUsingMeta($client, $bucket, $keyprefix); |
|
| 16 | +multipartUpload($client, $bucket, $keyprefix); |
|
| 17 | 17 | |
| 18 | -function putObjectByContentAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
|
| 19 | - for($i = 45 ;$i < 60;$i++){ |
|
| 18 | +function putObjectByContentAndGetObjectUsingMeta($client, $bucket, $keyprefix) { |
|
| 19 | + for ($i = 45; $i < 60; $i++) { |
|
| 20 | 20 | |
| 21 | 21 | $content = EncryptionUtil::genereateOnceUsedKey($i); |
| 22 | 22 | |
@@ -27,11 +27,11 @@ discard block |
||
| 27 | 27 | "Content"=>$content |
| 28 | 28 | ); |
| 29 | 29 | $client->putObjectByContent($args); |
| 30 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 31 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 30 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
| 31 | + "D://testdown/down", base64_encode(md5($args["Content"]))); |
|
| 32 | 32 | } |
| 33 | 33 | } |
| 34 | -function putObjectByFileAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
|
| 34 | +function putObjectByFileAndGetObjectUsingMeta($client, $bucket, $keyprefix) { |
|
| 35 | 35 | |
| 36 | 36 | $args = array( |
| 37 | 37 | "Bucket"=>$bucket, |
@@ -42,39 +42,39 @@ discard block |
||
| 42 | 42 | ) |
| 43 | 43 | ); |
| 44 | 44 | $client->putObjectByFile($args); |
| 45 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 46 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 45 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
| 46 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
| 47 | 47 | } |
| 48 | -function multipartUpload($client,$bucket,$keyprefix){ |
|
| 48 | +function multipartUpload($client, $bucket, $keyprefix) { |
|
| 49 | 49 | //初始化分开上传,获取uploadid |
| 50 | 50 | $args = array( |
| 51 | 51 | "Bucket"=>$bucket, |
| 52 | 52 | "Key"=>$keyprefix."EOMeta", |
| 53 | 53 | ); |
| 54 | 54 | $uploadid = $client->initMultipartUpload($args); |
| 55 | - $uploadid = $uploadid["UploadId"];//获取到uploadid |
|
| 55 | + $uploadid = $uploadid["UploadId"]; //获取到uploadid |
|
| 56 | 56 | //开始上传 |
| 57 | 57 | |
| 58 | - $file = "D://IMG.jpg";//要上传的文件 |
|
| 58 | + $file = "D://IMG.jpg"; //要上传的文件 |
|
| 59 | 59 | $partsize = 1024*100; |
| 60 | - $resource = fopen($file,"r"); |
|
| 60 | + $resource = fopen($file, "r"); |
|
| 61 | 61 | $stat = fstat($resource); |
| 62 | - $total = $stat["size"];//获取文件的总大小 |
|
| 62 | + $total = $stat["size"]; //获取文件的总大小 |
|
| 63 | 63 | fclose($resource); |
| 64 | - $count = (int)(($total-1)/$partsize)+1;//计算文件需要分几块上传 |
|
| 65 | - for($i = 0;$i < $count;$i++){ |
|
| 64 | + $count = (int)(($total-1)/$partsize)+1; //计算文件需要分几块上传 |
|
| 65 | + for ($i = 0; $i < $count; $i++) { |
|
| 66 | 66 | //依次上传每一块 |
| 67 | 67 | echo "upload".$i."\r\n"; |
| 68 | - $args=array( |
|
| 68 | + $args = array( |
|
| 69 | 69 | "Bucket"=>$bucket, |
| 70 | 70 | "Key"=>$keyprefix."EOMeta", |
| 71 | - "LastPart"=>($i===$count-1), |
|
| 71 | + "LastPart"=>($i === $count-1), |
|
| 72 | 72 | "Options"=>array( |
| 73 | 73 | "partNumber"=>$i+1, |
| 74 | 74 | "uploadId"=>$uploadid |
| 75 | 75 | ), |
| 76 | 76 | "ObjectMeta"=>array( |
| 77 | - "Content-Length"=>min($partsize,$total-$partsize*$i)//每次上传$partsize大小 |
|
| 77 | + "Content-Length"=>min($partsize, $total-$partsize*$i)//每次上传$partsize大小 |
|
| 78 | 78 | ), |
| 79 | 79 | "Content"=>array( |
| 80 | 80 | "content"=>$file, |
@@ -84,9 +84,9 @@ discard block |
||
| 84 | 84 | $etag = $client->uploadPart($args); |
| 85 | 85 | $etag = $etag["ETag"]; |
| 86 | 86 | } |
| 87 | - $parts = $client->listParts(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOMeta","Options"=>array("uploadId"=>$uploadid))); |
|
| 87 | + $parts = $client->listParts(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOMeta", "Options"=>array("uploadId"=>$uploadid))); |
|
| 88 | 88 | //结束上传 |
| 89 | - $args=array( |
|
| 89 | + $args = array( |
|
| 90 | 90 | "Bucket"=>$bucket, |
| 91 | 91 | "Key"=>$keyprefix."EOMeta", |
| 92 | 92 | "Options"=>array("uploadId"=>$uploadid), |
@@ -94,21 +94,21 @@ discard block |
||
| 94 | 94 | ); |
| 95 | 95 | $result = $client->completeMultipartUpload($args); |
| 96 | 96 | |
| 97 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
| 98 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 97 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
| 98 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
| 99 | 99 | } |
| 100 | -function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
|
| 101 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 100 | +function rangeGetAndCheckMd5($client, $bucket, $key, $file, $expectedMd5) { |
|
| 101 | + $args = array("Bucket"=>$bucket, "Key"=>$key); |
|
| 102 | 102 | $meta = $client->getObjectMeta($args); |
| 103 | 103 | $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
| 104 | 104 | |
| 105 | 105 | $filelist = array(); |
| 106 | 106 | |
| 107 | - for($begin = 0;$begin <$contentlength;){ |
|
| 108 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 109 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 107 | + for ($begin = 0; $begin < $contentlength;) { |
|
| 108 | + $index = rand((int)($contentlength/20), (int)($contentlength/10)); |
|
| 109 | + $range = array("start"=>$begin, "end"=>$begin+$index); |
|
| 110 | 110 | $destFile = $file.$begin."-".($begin+$index); |
| 111 | - array_push($filelist,$destFile); |
|
| 111 | + array_push($filelist, $destFile); |
|
| 112 | 112 | $begin += ($index+1); |
| 113 | 113 | $args = array( |
| 114 | 114 | "Bucket"=>$bucket, |
@@ -120,17 +120,17 @@ discard block |
||
| 120 | 120 | } |
| 121 | 121 | |
| 122 | 122 | foreach ($filelist as $key => $value) { |
| 123 | - $handle = fopen($value,"r"); |
|
| 123 | + $handle = fopen($value, "r"); |
|
| 124 | 124 | $size = filesize($value); |
| 125 | - if($size > 0){ |
|
| 126 | - $content = fread($handle,$size); |
|
| 127 | - file_put_contents($file,$content,FILE_APPEND); |
|
| 125 | + if ($size > 0) { |
|
| 126 | + $content = fread($handle, $size); |
|
| 127 | + file_put_contents($file, $content, FILE_APPEND); |
|
| 128 | 128 | } |
| 129 | 129 | fclose($handle); |
| 130 | 130 | @unlink($value); |
| 131 | 131 | } |
| 132 | 132 | $md5 = base64_encode(md5_file($file)); |
| 133 | - if($md5 != $expectedMd5) |
|
| 133 | + if ($md5 != $expectedMd5) |
|
| 134 | 134 | throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
| 135 | 135 | @unlink($file); |
| 136 | 136 | } |
@@ -130,7 +130,8 @@ |
||
| 130 | 130 | @unlink($value); |
| 131 | 131 | } |
| 132 | 132 | $md5 = base64_encode(md5_file($file)); |
| 133 | - if($md5 != $expectedMd5) |
|
| 134 | - throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 133 | + if($md5 != $expectedMd5) { |
|
| 134 | + throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 135 | + } |
|
| 135 | 136 | @unlink($file); |
| 136 | 137 | } |
@@ -17,33 +17,33 @@ discard block |
||
| 17 | 17 | copyAnddeleteObject($client,$bucket,$keyprefix); |
| 18 | 18 | |
| 19 | 19 | function putObjectByContentAndGetObjectUsingInstruction($client,$bucket,$keyprefix){ |
| 20 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 21 | - $args = array( |
|
| 22 | - "Bucket"=>$bucket, |
|
| 23 | - "Key"=>$keyprefix."EOFile", |
|
| 24 | - "ACL"=>"public-read", |
|
| 25 | - "Content"=>$content |
|
| 26 | - ); |
|
| 27 | - $client->putObjectByContent($args); |
|
| 28 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 29 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 20 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 21 | + $args = array( |
|
| 22 | + "Bucket"=>$bucket, |
|
| 23 | + "Key"=>$keyprefix."EOFile", |
|
| 24 | + "ACL"=>"public-read", |
|
| 25 | + "Content"=>$content |
|
| 26 | + ); |
|
| 27 | + $client->putObjectByContent($args); |
|
| 28 | + rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 29 | + "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 30 | 30 | } |
| 31 | 31 | function putObjectByFileAndGetObjectUsingFile($client,$bucket,$keyprefix){ |
| 32 | 32 | |
| 33 | - $args = array( |
|
| 34 | - "Bucket"=>$bucket, |
|
| 35 | - "Key"=>$keyprefix."EOFile", |
|
| 36 | - "ACL"=>"public-read", |
|
| 37 | - "Content"=>array( |
|
| 38 | - "content"=>"D://IMG.jpg" |
|
| 39 | - ) |
|
| 40 | - ); |
|
| 41 | - $client->putObjectByFile($args); |
|
| 42 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 43 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 33 | + $args = array( |
|
| 34 | + "Bucket"=>$bucket, |
|
| 35 | + "Key"=>$keyprefix."EOFile", |
|
| 36 | + "ACL"=>"public-read", |
|
| 37 | + "Content"=>array( |
|
| 38 | + "content"=>"D://IMG.jpg" |
|
| 39 | + ) |
|
| 40 | + ); |
|
| 41 | + $client->putObjectByFile($args); |
|
| 42 | + rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 43 | + "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 44 | 44 | } |
| 45 | 45 | function multipartUpload($client,$bucket,$keyprefix){ |
| 46 | - //初始化分开上传,获取uploadid |
|
| 46 | + //初始化分开上传,获取uploadid |
|
| 47 | 47 | $args = array( |
| 48 | 48 | "Bucket"=>$bucket, |
| 49 | 49 | "Key"=>$keyprefix."EOFile", |
@@ -64,8 +64,8 @@ discard block |
||
| 64 | 64 | echo "upload".$i."\r\n"; |
| 65 | 65 | $args=array( |
| 66 | 66 | "Bucket"=>$bucket, |
| 67 | - "Key"=>$keyprefix."EOFile", |
|
| 68 | - "LastPart"=>($i===$count-1), |
|
| 67 | + "Key"=>$keyprefix."EOFile", |
|
| 68 | + "LastPart"=>($i===$count-1), |
|
| 69 | 69 | "Options"=>array( |
| 70 | 70 | "partNumber"=>$i+1, |
| 71 | 71 | "uploadId"=>$uploadid |
@@ -92,79 +92,79 @@ discard block |
||
| 92 | 92 | $result = $client->completeMultipartUpload($args); |
| 93 | 93 | |
| 94 | 94 | rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
| 95 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 95 | + "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 96 | 96 | } |
| 97 | 97 | function copyAnddeleteObject($client,$bucket,$keyprefix){ |
| 98 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 99 | - $args = array( |
|
| 100 | - "Bucket"=>$bucket, |
|
| 101 | - "Key"=>$keyprefix."EOFile", |
|
| 102 | - "ACL"=>"public-read", |
|
| 103 | - "Content"=>$content |
|
| 104 | - ); |
|
| 105 | - $client->putObjectByContent($args); |
|
| 98 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 99 | + $args = array( |
|
| 100 | + "Bucket"=>$bucket, |
|
| 101 | + "Key"=>$keyprefix."EOFile", |
|
| 102 | + "ACL"=>"public-read", |
|
| 103 | + "Content"=>$content |
|
| 104 | + ); |
|
| 105 | + $client->putObjectByContent($args); |
|
| 106 | 106 | |
| 107 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 108 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 110 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 107 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 108 | + $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 110 | + $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 111 | 111 | |
| 112 | - $copyReq = array( |
|
| 113 | - "Bucket"=>$bucket, |
|
| 114 | - "Key"=>$keyprefix."EOFileCopy", |
|
| 115 | - "CopySource"=>array( |
|
| 116 | - "Bucket"=>$bucket, |
|
| 117 | - "Key"=>$keyprefix."EOFile" |
|
| 118 | - ) |
|
| 119 | - ); |
|
| 120 | - $client->copyObject($copyReq); |
|
| 112 | + $copyReq = array( |
|
| 113 | + "Bucket"=>$bucket, |
|
| 114 | + "Key"=>$keyprefix."EOFileCopy", |
|
| 115 | + "CopySource"=>array( |
|
| 116 | + "Bucket"=>$bucket, |
|
| 117 | + "Key"=>$keyprefix."EOFile" |
|
| 118 | + ) |
|
| 119 | + ); |
|
| 120 | + $client->copyObject($copyReq); |
|
| 121 | 121 | |
| 122 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 123 | - throw new Exception("not found ".$keyprefix."EOFileCopy"); |
|
| 124 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 125 | - throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
|
| 122 | + if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 123 | + throw new Exception("not found ".$keyprefix."EOFileCopy"); |
|
| 124 | + if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 125 | + throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
|
| 126 | 126 | |
| 127 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 127 | + $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 128 | 128 | |
| 129 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 130 | - throw new Exception("found ".$keyprefix."EOFileCopy"); |
|
| 131 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 132 | - throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
|
| 129 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 130 | + throw new Exception("found ".$keyprefix."EOFileCopy"); |
|
| 131 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 132 | + throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
|
| 133 | 133 | } |
| 134 | 134 | function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
| 135 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 136 | - $meta = $client->getObjectMeta($args); |
|
| 137 | - $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 135 | + $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 136 | + $meta = $client->getObjectMeta($args); |
|
| 137 | + $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 138 | 138 | |
| 139 | - $filelist = array(); |
|
| 139 | + $filelist = array(); |
|
| 140 | 140 | |
| 141 | - for($begin = 0;$begin <$contentlength;){ |
|
| 142 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 143 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 144 | - $destFile = $file.$begin."-".($begin+$index); |
|
| 145 | - array_push($filelist,$destFile); |
|
| 146 | - $begin += ($index+1); |
|
| 147 | - $args = array( |
|
| 148 | - "Bucket"=>$bucket, |
|
| 149 | - "Key"=>$key, |
|
| 150 | - "Range"=>$range, |
|
| 151 | - "WriteTo"=>$destFile |
|
| 152 | - ); |
|
| 153 | - $client->getObject($args); |
|
| 154 | - } |
|
| 141 | + for($begin = 0;$begin <$contentlength;){ |
|
| 142 | + $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 143 | + $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 144 | + $destFile = $file.$begin."-".($begin+$index); |
|
| 145 | + array_push($filelist,$destFile); |
|
| 146 | + $begin += ($index+1); |
|
| 147 | + $args = array( |
|
| 148 | + "Bucket"=>$bucket, |
|
| 149 | + "Key"=>$key, |
|
| 150 | + "Range"=>$range, |
|
| 151 | + "WriteTo"=>$destFile |
|
| 152 | + ); |
|
| 153 | + $client->getObject($args); |
|
| 154 | + } |
|
| 155 | 155 | |
| 156 | - foreach ($filelist as $key => $value) { |
|
| 157 | - $handle = fopen($value,"r"); |
|
| 158 | - $size = filesize($value); |
|
| 159 | - if($size > 0){ |
|
| 160 | - $content = fread($handle,$size); |
|
| 161 | - file_put_contents($file,$content,FILE_APPEND); |
|
| 162 | - } |
|
| 163 | - fclose($handle); |
|
| 164 | - @unlink($value); |
|
| 165 | - } |
|
| 166 | - $md5 = base64_encode(md5_file($file)); |
|
| 167 | - if($md5 != $expectedMd5) |
|
| 168 | - throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 169 | - @unlink($file); |
|
| 156 | + foreach ($filelist as $key => $value) { |
|
| 157 | + $handle = fopen($value,"r"); |
|
| 158 | + $size = filesize($value); |
|
| 159 | + if($size > 0){ |
|
| 160 | + $content = fread($handle,$size); |
|
| 161 | + file_put_contents($file,$content,FILE_APPEND); |
|
| 162 | + } |
|
| 163 | + fclose($handle); |
|
| 164 | + @unlink($value); |
|
| 165 | + } |
|
| 166 | + $md5 = base64_encode(md5_file($file)); |
|
| 167 | + if($md5 != $expectedMd5) |
|
| 168 | + throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 169 | + @unlink($file); |
|
| 170 | 170 | } |
@@ -1,5 +1,5 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | -define("ENCRYPTPTION_STORAGE_MODE","InstructionFile"); |
|
| 2 | +define("ENCRYPTPTION_STORAGE_MODE", "InstructionFile"); |
|
| 3 | 3 | require_once "../Ks3EncryptionClient.class.php"; |
| 4 | 4 | require_once "../Ks3Client.class.php"; |
| 5 | 5 | $bucket = "test-encryption"; |
@@ -7,17 +7,17 @@ discard block |
||
| 7 | 7 | |
| 8 | 8 | $filename = "secret.key"; |
| 9 | 9 | $handle = fopen($filename, "r"); |
| 10 | -$contents = fread($handle, filesize ($filename)); |
|
| 10 | +$contents = fread($handle, filesize($filename)); |
|
| 11 | 11 | fclose($handle); |
| 12 | 12 | |
| 13 | -$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x","D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I",$contents); |
|
| 14 | -putObjectByContentAndGetObjectUsingInstruction($client,$bucket,$keyprefix); |
|
| 15 | -putObjectByFileAndGetObjectUsingFile($client,$bucket,$keyprefix); |
|
| 16 | -multipartUpload($client,$bucket,$keyprefix); |
|
| 17 | -copyAnddeleteObject($client,$bucket,$keyprefix); |
|
| 13 | +$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x", "D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I", $contents); |
|
| 14 | +putObjectByContentAndGetObjectUsingInstruction($client, $bucket, $keyprefix); |
|
| 15 | +putObjectByFileAndGetObjectUsingFile($client, $bucket, $keyprefix); |
|
| 16 | +multipartUpload($client, $bucket, $keyprefix); |
|
| 17 | +copyAnddeleteObject($client, $bucket, $keyprefix); |
|
| 18 | 18 | |
| 19 | -function putObjectByContentAndGetObjectUsingInstruction($client,$bucket,$keyprefix){ |
|
| 20 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 19 | +function putObjectByContentAndGetObjectUsingInstruction($client, $bucket, $keyprefix) { |
|
| 20 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100, 1000)); |
|
| 21 | 21 | $args = array( |
| 22 | 22 | "Bucket"=>$bucket, |
| 23 | 23 | "Key"=>$keyprefix."EOFile", |
@@ -25,10 +25,10 @@ discard block |
||
| 25 | 25 | "Content"=>$content |
| 26 | 26 | ); |
| 27 | 27 | $client->putObjectByContent($args); |
| 28 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 29 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
| 28 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
| 29 | + "D://testdown/down", base64_encode(md5($args["Content"]))); |
|
| 30 | 30 | } |
| 31 | -function putObjectByFileAndGetObjectUsingFile($client,$bucket,$keyprefix){ |
|
| 31 | +function putObjectByFileAndGetObjectUsingFile($client, $bucket, $keyprefix) { |
|
| 32 | 32 | |
| 33 | 33 | $args = array( |
| 34 | 34 | "Bucket"=>$bucket, |
@@ -39,39 +39,39 @@ discard block |
||
| 39 | 39 | ) |
| 40 | 40 | ); |
| 41 | 41 | $client->putObjectByFile($args); |
| 42 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 43 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 42 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
| 43 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
| 44 | 44 | } |
| 45 | -function multipartUpload($client,$bucket,$keyprefix){ |
|
| 45 | +function multipartUpload($client, $bucket, $keyprefix) { |
|
| 46 | 46 | //初始化分开上传,获取uploadid |
| 47 | 47 | $args = array( |
| 48 | 48 | "Bucket"=>$bucket, |
| 49 | 49 | "Key"=>$keyprefix."EOFile", |
| 50 | 50 | ); |
| 51 | 51 | $uploadid = $client->initMultipartUpload($args); |
| 52 | - $uploadid = $uploadid["UploadId"];//获取到uploadid |
|
| 52 | + $uploadid = $uploadid["UploadId"]; //获取到uploadid |
|
| 53 | 53 | //开始上传 |
| 54 | 54 | |
| 55 | - $file = "D://IMG.jpg";//要上传的文件 |
|
| 55 | + $file = "D://IMG.jpg"; //要上传的文件 |
|
| 56 | 56 | $partsize = 1024*100; |
| 57 | - $resource = fopen($file,"r"); |
|
| 57 | + $resource = fopen($file, "r"); |
|
| 58 | 58 | $stat = fstat($resource); |
| 59 | - $total = $stat["size"];//获取文件的总大小 |
|
| 59 | + $total = $stat["size"]; //获取文件的总大小 |
|
| 60 | 60 | fclose($resource); |
| 61 | - $count = (int)(($total-1)/$partsize)+1;//计算文件需要分几块上传 |
|
| 62 | - for($i = 0;$i < $count;$i++){ |
|
| 61 | + $count = (int)(($total-1)/$partsize)+1; //计算文件需要分几块上传 |
|
| 62 | + for ($i = 0; $i < $count; $i++) { |
|
| 63 | 63 | //依次上传每一块 |
| 64 | 64 | echo "upload".$i."\r\n"; |
| 65 | - $args=array( |
|
| 65 | + $args = array( |
|
| 66 | 66 | "Bucket"=>$bucket, |
| 67 | 67 | "Key"=>$keyprefix."EOFile", |
| 68 | - "LastPart"=>($i===$count-1), |
|
| 68 | + "LastPart"=>($i === $count-1), |
|
| 69 | 69 | "Options"=>array( |
| 70 | 70 | "partNumber"=>$i+1, |
| 71 | 71 | "uploadId"=>$uploadid |
| 72 | 72 | ), |
| 73 | 73 | "ObjectMeta"=>array( |
| 74 | - "Content-Length"=>min($partsize,$total-$partsize*$i)//每次上传$partsize大小 |
|
| 74 | + "Content-Length"=>min($partsize, $total-$partsize*$i)//每次上传$partsize大小 |
|
| 75 | 75 | ), |
| 76 | 76 | "Content"=>array( |
| 77 | 77 | "content"=>$file, |
@@ -81,9 +81,9 @@ discard block |
||
| 81 | 81 | $etag = $client->uploadPart($args); |
| 82 | 82 | $etag = $etag["ETag"]; |
| 83 | 83 | } |
| 84 | - $parts = $client->listParts(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFile","Options"=>array("uploadId"=>$uploadid))); |
|
| 84 | + $parts = $client->listParts(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFile", "Options"=>array("uploadId"=>$uploadid))); |
|
| 85 | 85 | //结束上传 |
| 86 | - $args=array( |
|
| 86 | + $args = array( |
|
| 87 | 87 | "Bucket"=>$bucket, |
| 88 | 88 | "Key"=>$keyprefix."EOFile", |
| 89 | 89 | "Options"=>array("uploadId"=>$uploadid), |
@@ -91,11 +91,11 @@ discard block |
||
| 91 | 91 | ); |
| 92 | 92 | $result = $client->completeMultipartUpload($args); |
| 93 | 93 | |
| 94 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
| 95 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
| 94 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
| 95 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
| 96 | 96 | } |
| 97 | -function copyAnddeleteObject($client,$bucket,$keyprefix){ |
|
| 98 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
| 97 | +function copyAnddeleteObject($client, $bucket, $keyprefix) { |
|
| 98 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100, 1000)); |
|
| 99 | 99 | $args = array( |
| 100 | 100 | "Bucket"=>$bucket, |
| 101 | 101 | "Key"=>$keyprefix."EOFile", |
@@ -104,10 +104,10 @@ discard block |
||
| 104 | 104 | ); |
| 105 | 105 | $client->putObjectByContent($args); |
| 106 | 106 | |
| 107 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 108 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 110 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 107 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
| 108 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 110 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 111 | 111 | |
| 112 | 112 | $copyReq = array( |
| 113 | 113 | "Bucket"=>$bucket, |
@@ -119,30 +119,30 @@ discard block |
||
| 119 | 119 | ); |
| 120 | 120 | $client->copyObject($copyReq); |
| 121 | 121 | |
| 122 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 122 | + if (!$client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
| 123 | 123 | throw new Exception("not found ".$keyprefix."EOFileCopy"); |
| 124 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 124 | + if (!$client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 125 | 125 | throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
| 126 | 126 | |
| 127 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 127 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy")); |
|
| 128 | 128 | |
| 129 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 129 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
| 130 | 130 | throw new Exception("found ".$keyprefix."EOFileCopy"); |
| 131 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 131 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 132 | 132 | throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
| 133 | 133 | } |
| 134 | -function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
|
| 135 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
| 134 | +function rangeGetAndCheckMd5($client, $bucket, $key, $file, $expectedMd5) { |
|
| 135 | + $args = array("Bucket"=>$bucket, "Key"=>$key); |
|
| 136 | 136 | $meta = $client->getObjectMeta($args); |
| 137 | 137 | $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
| 138 | 138 | |
| 139 | 139 | $filelist = array(); |
| 140 | 140 | |
| 141 | - for($begin = 0;$begin <$contentlength;){ |
|
| 142 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
| 143 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
| 141 | + for ($begin = 0; $begin < $contentlength;) { |
|
| 142 | + $index = rand((int)($contentlength/20), (int)($contentlength/10)); |
|
| 143 | + $range = array("start"=>$begin, "end"=>$begin+$index); |
|
| 144 | 144 | $destFile = $file.$begin."-".($begin+$index); |
| 145 | - array_push($filelist,$destFile); |
|
| 145 | + array_push($filelist, $destFile); |
|
| 146 | 146 | $begin += ($index+1); |
| 147 | 147 | $args = array( |
| 148 | 148 | "Bucket"=>$bucket, |
@@ -154,17 +154,17 @@ discard block |
||
| 154 | 154 | } |
| 155 | 155 | |
| 156 | 156 | foreach ($filelist as $key => $value) { |
| 157 | - $handle = fopen($value,"r"); |
|
| 157 | + $handle = fopen($value, "r"); |
|
| 158 | 158 | $size = filesize($value); |
| 159 | - if($size > 0){ |
|
| 160 | - $content = fread($handle,$size); |
|
| 161 | - file_put_contents($file,$content,FILE_APPEND); |
|
| 159 | + if ($size > 0) { |
|
| 160 | + $content = fread($handle, $size); |
|
| 161 | + file_put_contents($file, $content, FILE_APPEND); |
|
| 162 | 162 | } |
| 163 | 163 | fclose($handle); |
| 164 | 164 | @unlink($value); |
| 165 | 165 | } |
| 166 | 166 | $md5 = base64_encode(md5_file($file)); |
| 167 | - if($md5 != $expectedMd5) |
|
| 167 | + if ($md5 != $expectedMd5) |
|
| 168 | 168 | throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
| 169 | 169 | @unlink($file); |
| 170 | 170 | } |
@@ -104,10 +104,12 @@ discard block |
||
| 104 | 104 | ); |
| 105 | 105 | $client->putObjectByContent($args); |
| 106 | 106 | |
| 107 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 108 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 110 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 107 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) { |
|
| 108 | + $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
| 109 | + } |
|
| 110 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) { |
|
| 111 | + $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
| 112 | + } |
|
| 111 | 113 | |
| 112 | 114 | $copyReq = array( |
| 113 | 115 | "Bucket"=>$bucket, |
@@ -119,18 +121,22 @@ discard block |
||
| 119 | 121 | ); |
| 120 | 122 | $client->copyObject($copyReq); |
| 121 | 123 | |
| 122 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 123 | - throw new Exception("not found ".$keyprefix."EOFileCopy"); |
|
| 124 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 125 | - throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
|
| 124 | + if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) { |
|
| 125 | + throw new Exception("not found ".$keyprefix."EOFileCopy"); |
|
| 126 | + } |
|
| 127 | + if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) { |
|
| 128 | + throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
|
| 129 | + } |
|
| 126 | 130 | |
| 127 | 131 | $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
| 128 | 132 | |
| 129 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
| 130 | - throw new Exception("found ".$keyprefix."EOFileCopy"); |
|
| 131 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
| 132 | - throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
|
| 133 | -} |
|
| 133 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) { |
|
| 134 | + throw new Exception("found ".$keyprefix."EOFileCopy"); |
|
| 135 | + } |
|
| 136 | + if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) { |
|
| 137 | + throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
|
| 138 | + } |
|
| 139 | + } |
|
| 134 | 140 | function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
| 135 | 141 | $args = array("Bucket"=>$bucket,"Key"=>$key); |
| 136 | 142 | $meta = $client->getObjectMeta($args); |
@@ -164,7 +170,8 @@ discard block |
||
| 164 | 170 | @unlink($value); |
| 165 | 171 | } |
| 166 | 172 | $md5 = base64_encode(md5_file($file)); |
| 167 | - if($md5 != $expectedMd5) |
|
| 168 | - throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 173 | + if($md5 != $expectedMd5) { |
|
| 174 | + throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
|
| 175 | + } |
|
| 169 | 176 | @unlink($file); |
| 170 | 177 | } |
@@ -33,381 +33,381 @@ |
||
| 33 | 33 | //print_r(putAdp($client)); |
| 34 | 34 | //print_r(postObject($client)); |
| 35 | 35 | function listBuckets($client){ |
| 36 | - return $client->listBuckets(); |
|
| 36 | + return $client->listBuckets(); |
|
| 37 | 37 | } |
| 38 | 38 | function deleteBucket($client){ |
| 39 | - return $client->deleteBucket(array("Bucket"=>"ksc-scm")); |
|
| 39 | + return $client->deleteBucket(array("Bucket"=>"ksc-scm")); |
|
| 40 | 40 | } |
| 41 | 41 | function deleteBucketCORS($client){ |
| 42 | - return $client->deleteBucketCORS(array("Bucket"=>"ksc-scm")); |
|
| 42 | + return $client->deleteBucketCORS(array("Bucket"=>"ksc-scm")); |
|
| 43 | 43 | } |
| 44 | 44 | function listObjects($client){ |
| 45 | - $args = array( |
|
| 46 | - "Bucket"=>"lijunwei.test", |
|
| 47 | - "Options"=>array( |
|
| 48 | - //"prefix"=>"dir/", |
|
| 49 | - "max-keys"=>4, |
|
| 50 | - //"marker"=>"123.pdf", |
|
| 51 | - "delimiter"=>"/" |
|
| 52 | - ) |
|
| 53 | - ); |
|
| 54 | - return $client->listObjects($args); |
|
| 45 | + $args = array( |
|
| 46 | + "Bucket"=>"lijunwei.test", |
|
| 47 | + "Options"=>array( |
|
| 48 | + //"prefix"=>"dir/", |
|
| 49 | + "max-keys"=>4, |
|
| 50 | + //"marker"=>"123.pdf", |
|
| 51 | + "delimiter"=>"/" |
|
| 52 | + ) |
|
| 53 | + ); |
|
| 54 | + return $client->listObjects($args); |
|
| 55 | 55 | } |
| 56 | 56 | function getBucketAcl($client){ |
| 57 | - return $client->getBucketAcl(array("Bucket"=>"aaphp")); |
|
| 57 | + return $client->getBucketAcl(array("Bucket"=>"aaphp")); |
|
| 58 | 58 | } |
| 59 | 59 | function getBucketCORS($client){ |
| 60 | - return $client->getBucketCORS(array("Bucket"=>"ksc-scm")); |
|
| 60 | + return $client->getBucketCORS(array("Bucket"=>"ksc-scm")); |
|
| 61 | 61 | } |
| 62 | 62 | function getBucketLocation($client){ |
| 63 | - return $client->getBucketLocation(array("Bucket"=>"ksc-scm")); |
|
| 63 | + return $client->getBucketLocation(array("Bucket"=>"ksc-scm")); |
|
| 64 | 64 | } |
| 65 | 65 | function getBucketLogging($client){ |
| 66 | - return $client->getBucketLogging(array("Bucket"=>"ksc-scm")); |
|
| 66 | + return $client->getBucketLogging(array("Bucket"=>"ksc-scm")); |
|
| 67 | 67 | } |
| 68 | 68 | function bucketExists($client){ |
| 69 | - $args = array("Bucket"=>"ksc-scm"); |
|
| 70 | - return $client->bucketExists($args); |
|
| 69 | + $args = array("Bucket"=>"ksc-scm"); |
|
| 70 | + return $client->bucketExists($args); |
|
| 71 | 71 | } |
| 72 | 72 | function createBucket($client){ |
| 73 | - $args = array( |
|
| 74 | - "Bucket"=>"ksc-scm", |
|
| 75 | - "ACL"=>"private" |
|
| 76 | - ); |
|
| 77 | - return $client->createBucket($args); |
|
| 73 | + $args = array( |
|
| 74 | + "Bucket"=>"ksc-scm", |
|
| 75 | + "ACL"=>"private" |
|
| 76 | + ); |
|
| 77 | + return $client->createBucket($args); |
|
| 78 | 78 | } |
| 79 | 79 | function setBucketAcl($client){ |
| 80 | - $args = array( |
|
| 81 | - "Bucket"=>"ksc-scm", |
|
| 82 | - "ACL"=>"private" |
|
| 83 | - ); |
|
| 84 | - return $client->setBucketAcl($args); |
|
| 80 | + $args = array( |
|
| 81 | + "Bucket"=>"ksc-scm", |
|
| 82 | + "ACL"=>"private" |
|
| 83 | + ); |
|
| 84 | + return $client->setBucketAcl($args); |
|
| 85 | 85 | } |
| 86 | 86 | function setBucketCORS($client){ |
| 87 | - $args = array( |
|
| 88 | - "Bucket"=>"ksc-scm", |
|
| 89 | - "CORS"=>array( |
|
| 90 | - array( |
|
| 91 | - "AllowedMethod"=>array("GET","PUT"), |
|
| 92 | - "AllowedOrigin"=>array("http://www.kingsoft.com"), |
|
| 93 | - "AllowedHeader"=>array("*"), |
|
| 94 | - "ExposeHeader"=>array("*"), |
|
| 95 | - "MaxAgeSeconds"=>10 |
|
| 96 | - ), |
|
| 97 | - array( |
|
| 98 | - "AllowedMethod"=>array("GET","PUT"), |
|
| 99 | - "AllowedOrigin"=>array("*"), |
|
| 100 | - "AllowedHeader"=>array("*"), |
|
| 101 | - "ExposeHeader"=>array("*"), |
|
| 102 | - "MaxAgeSeconds"=>10 |
|
| 103 | - ) |
|
| 104 | - ) |
|
| 105 | - ); |
|
| 106 | - return $client->setBucketCORS($args); |
|
| 87 | + $args = array( |
|
| 88 | + "Bucket"=>"ksc-scm", |
|
| 89 | + "CORS"=>array( |
|
| 90 | + array( |
|
| 91 | + "AllowedMethod"=>array("GET","PUT"), |
|
| 92 | + "AllowedOrigin"=>array("http://www.kingsoft.com"), |
|
| 93 | + "AllowedHeader"=>array("*"), |
|
| 94 | + "ExposeHeader"=>array("*"), |
|
| 95 | + "MaxAgeSeconds"=>10 |
|
| 96 | + ), |
|
| 97 | + array( |
|
| 98 | + "AllowedMethod"=>array("GET","PUT"), |
|
| 99 | + "AllowedOrigin"=>array("*"), |
|
| 100 | + "AllowedHeader"=>array("*"), |
|
| 101 | + "ExposeHeader"=>array("*"), |
|
| 102 | + "MaxAgeSeconds"=>10 |
|
| 103 | + ) |
|
| 104 | + ) |
|
| 105 | + ); |
|
| 106 | + return $client->setBucketCORS($args); |
|
| 107 | 107 | } |
| 108 | 108 | function setBucketLogging($client){ |
| 109 | - $args = array( |
|
| 110 | - "Bucket"=>"ksc-scm", |
|
| 111 | - "BucketLogging"=>array( |
|
| 112 | - "Enable"=>TRUE, |
|
| 113 | - "TargetBucket"=>"ksc-scm", |
|
| 114 | - "TargetPrefix"=>"X-KSS" |
|
| 115 | - ) |
|
| 116 | - ); |
|
| 117 | - return $client->setBucketLogging($args); |
|
| 109 | + $args = array( |
|
| 110 | + "Bucket"=>"ksc-scm", |
|
| 111 | + "BucketLogging"=>array( |
|
| 112 | + "Enable"=>TRUE, |
|
| 113 | + "TargetBucket"=>"ksc-scm", |
|
| 114 | + "TargetPrefix"=>"X-KSS" |
|
| 115 | + ) |
|
| 116 | + ); |
|
| 117 | + return $client->setBucketLogging($args); |
|
| 118 | 118 | } |
| 119 | 119 | function deleteObject($client){ |
| 120 | - $args = array( |
|
| 121 | - "Bucket"=>"ksc-scm", |
|
| 122 | - "Key"=>"123.pdf" |
|
| 123 | - ); |
|
| 124 | - return $client->deleteObject($args); |
|
| 120 | + $args = array( |
|
| 121 | + "Bucket"=>"ksc-scm", |
|
| 122 | + "Key"=>"123.pdf" |
|
| 123 | + ); |
|
| 124 | + return $client->deleteObject($args); |
|
| 125 | 125 | } |
| 126 | 126 | function deleteObjects($client){ |
| 127 | - $args = array( |
|
| 128 | - "Bucket"=>"ksc-scm", |
|
| 129 | - "DeleteKeys"=>array("copy/test.zip","copy/123.doc") |
|
| 130 | - ); |
|
| 131 | - return $client->deleteObjects($args); |
|
| 127 | + $args = array( |
|
| 128 | + "Bucket"=>"ksc-scm", |
|
| 129 | + "DeleteKeys"=>array("copy/test.zip","copy/123.doc") |
|
| 130 | + ); |
|
| 131 | + return $client->deleteObjects($args); |
|
| 132 | 132 | } |
| 133 | 133 | function getObject($client){ |
| 134 | - $args = array( |
|
| 135 | - "Bucket"=>"aaphp", |
|
| 136 | - "Key"=>"multi.exe", |
|
| 137 | - "Range"=>array( |
|
| 138 | - "start"=>NULL, |
|
| 139 | - "end"=>4, |
|
| 140 | - ), |
|
| 141 | - "WriteTo"=>"D://test.zip" |
|
| 142 | - ); |
|
| 143 | - return $client->getObject($args); |
|
| 134 | + $args = array( |
|
| 135 | + "Bucket"=>"aaphp", |
|
| 136 | + "Key"=>"multi.exe", |
|
| 137 | + "Range"=>array( |
|
| 138 | + "start"=>NULL, |
|
| 139 | + "end"=>4, |
|
| 140 | + ), |
|
| 141 | + "WriteTo"=>"D://test.zip" |
|
| 142 | + ); |
|
| 143 | + return $client->getObject($args); |
|
| 144 | 144 | } |
| 145 | 145 | function getObjectAcl($client){ |
| 146 | - $args = array( |
|
| 147 | - "Bucket"=>"aaphp", |
|
| 148 | - "Key"=>"multi.exe" |
|
| 149 | - ); |
|
| 150 | - return $client->getObjectAcl($args); |
|
| 146 | + $args = array( |
|
| 147 | + "Bucket"=>"aaphp", |
|
| 148 | + "Key"=>"multi.exe" |
|
| 149 | + ); |
|
| 150 | + return $client->getObjectAcl($args); |
|
| 151 | 151 | } |
| 152 | 152 | function objectExists($client){ |
| 153 | - $args = array( |
|
| 154 | - "Bucket"=>"ksc-scm", |
|
| 155 | - "Key"=>"123.pdf" |
|
| 156 | - ); |
|
| 157 | - return $client->objectExists($args); |
|
| 153 | + $args = array( |
|
| 154 | + "Bucket"=>"ksc-scm", |
|
| 155 | + "Key"=>"123.pdf" |
|
| 156 | + ); |
|
| 157 | + return $client->objectExists($args); |
|
| 158 | 158 | } |
| 159 | 159 | function getObjectMeta($client){ |
| 160 | - $args = array( |
|
| 161 | - "Bucket"=>"aaphp", |
|
| 162 | - "Key"=>"test.zip" |
|
| 163 | - ); |
|
| 164 | - return $client->getObjectMeta($args); |
|
| 160 | + $args = array( |
|
| 161 | + "Bucket"=>"aaphp", |
|
| 162 | + "Key"=>"test.zip" |
|
| 163 | + ); |
|
| 164 | + return $client->getObjectMeta($args); |
|
| 165 | 165 | } |
| 166 | 166 | function setObjectAcl($client){ |
| 167 | - $args = array( |
|
| 168 | - "Bucket"=>"aaphp", |
|
| 169 | - "Key"=>"test.zip", |
|
| 170 | - "ACL"=>"private" |
|
| 171 | - ); |
|
| 172 | - return $client->setObjectAcl($args); |
|
| 167 | + $args = array( |
|
| 168 | + "Bucket"=>"aaphp", |
|
| 169 | + "Key"=>"test.zip", |
|
| 170 | + "ACL"=>"private" |
|
| 171 | + ); |
|
| 172 | + return $client->setObjectAcl($args); |
|
| 173 | 173 | } |
| 174 | 174 | function copyObject($client){ |
| 175 | - $args = array( |
|
| 176 | - "Bucket"=>"aaphp", |
|
| 177 | - "Key"=>"copy/test.zip", |
|
| 178 | - "CopySource"=>array( |
|
| 179 | - "Bucket"=>"aaphp", |
|
| 180 | - "Key"=>"test.zip" |
|
| 181 | - ) |
|
| 182 | - ); |
|
| 183 | - return $client->copyObject($args); |
|
| 175 | + $args = array( |
|
| 176 | + "Bucket"=>"aaphp", |
|
| 177 | + "Key"=>"copy/test.zip", |
|
| 178 | + "CopySource"=>array( |
|
| 179 | + "Bucket"=>"aaphp", |
|
| 180 | + "Key"=>"test.zip" |
|
| 181 | + ) |
|
| 182 | + ); |
|
| 183 | + return $client->copyObject($args); |
|
| 184 | 184 | } |
| 185 | 185 | function putObjectByFile($client){ |
| 186 | - $file = "D://phpput"; |
|
| 187 | - if(Utils::chk_chinese($file)){ |
|
| 188 | - $file = iconv('utf-8','gbk',$file); |
|
| 189 | - } |
|
| 190 | - $content = $file; |
|
| 191 | - $args = array( |
|
| 192 | - "Bucket"=>"aaphp", |
|
| 193 | - "Key"=>"stream_upload1.txt", |
|
| 194 | - "ACL"=>"public-read", |
|
| 195 | - "ObjectMeta"=>array( |
|
| 196 | - "Content-Type"=>"image/jpg",//只传0-10字节, |
|
| 197 | - ), |
|
| 198 | - "Content"=>array( |
|
| 199 | - "content"=>$file, |
|
| 200 | - "seek_position"=>0 |
|
| 201 | - ), |
|
| 202 | - ); |
|
| 203 | - return $client->putObjectByFile($args); |
|
| 186 | + $file = "D://phpput"; |
|
| 187 | + if(Utils::chk_chinese($file)){ |
|
| 188 | + $file = iconv('utf-8','gbk',$file); |
|
| 189 | + } |
|
| 190 | + $content = $file; |
|
| 191 | + $args = array( |
|
| 192 | + "Bucket"=>"aaphp", |
|
| 193 | + "Key"=>"stream_upload1.txt", |
|
| 194 | + "ACL"=>"public-read", |
|
| 195 | + "ObjectMeta"=>array( |
|
| 196 | + "Content-Type"=>"image/jpg",//只传0-10字节, |
|
| 197 | + ), |
|
| 198 | + "Content"=>array( |
|
| 199 | + "content"=>$file, |
|
| 200 | + "seek_position"=>0 |
|
| 201 | + ), |
|
| 202 | + ); |
|
| 203 | + return $client->putObjectByFile($args); |
|
| 204 | 204 | } |
| 205 | 205 | function multipartUpload($client){ |
| 206 | - $args = array( |
|
| 207 | - "Bucket"=>"aaphp", |
|
| 208 | - "Key"=>"multi.zip", |
|
| 209 | - "UserMeta"=>array( |
|
| 210 | - "x-kss-meta-test"=>"example" |
|
| 211 | - ), |
|
| 212 | - "ObjectMeta"=>array( |
|
| 213 | - "Content-Type"=>"text/plain" |
|
| 214 | - ) |
|
| 215 | - ); |
|
| 216 | - $uploadid = $client->initMultipartUpload($args); |
|
| 217 | - print_r($uploadid); |
|
| 218 | - $uploadid = $uploadid["UploadId"]; |
|
| 219 | - echo $uploadid."\r\n"; |
|
| 220 | - //开始上传 |
|
| 206 | + $args = array( |
|
| 207 | + "Bucket"=>"aaphp", |
|
| 208 | + "Key"=>"multi.zip", |
|
| 209 | + "UserMeta"=>array( |
|
| 210 | + "x-kss-meta-test"=>"example" |
|
| 211 | + ), |
|
| 212 | + "ObjectMeta"=>array( |
|
| 213 | + "Content-Type"=>"text/plain" |
|
| 214 | + ) |
|
| 215 | + ); |
|
| 216 | + $uploadid = $client->initMultipartUpload($args); |
|
| 217 | + print_r($uploadid); |
|
| 218 | + $uploadid = $uploadid["UploadId"]; |
|
| 219 | + echo $uploadid."\r\n"; |
|
| 220 | + //开始上传 |
|
| 221 | 221 | |
| 222 | - $file = "D://新建文件夹.rar"; |
|
| 223 | - if(Utils::chk_chinese($file)){ |
|
| 224 | - $file = iconv('utf-8','gbk',$file); |
|
| 225 | - } |
|
| 226 | - $total = Utils::getFileSize($file); |
|
| 227 | - $partsize = 1024*1024*5; |
|
| 228 | - $count = (int)(($total-1)/$partsize)+1; |
|
| 229 | - echo $count."\r\n"; |
|
| 230 | - for($i = 0;$i < $count;$i++){ |
|
| 231 | - echo "upload".$i."\r\n"; |
|
| 232 | - $args=array( |
|
| 233 | - "Bucket"=>"aaphp", |
|
| 234 | - "Key"=>"multi.zip", |
|
| 235 | - "Options"=>array( |
|
| 236 | - "partNumber"=>$i+1, |
|
| 237 | - "uploadId"=>$uploadid |
|
| 238 | - ), |
|
| 239 | - "ObjectMeta"=>array( |
|
| 240 | - "Content-Length"=>$partsize |
|
| 241 | - ), |
|
| 242 | - "Content"=>array( |
|
| 243 | - "content"=>$file, |
|
| 244 | - "seek_position"=>$partsize*$i |
|
| 245 | - ) |
|
| 246 | - ); |
|
| 247 | - $etag = $client->uploadPart($args); |
|
| 248 | - print_r($etag); |
|
| 249 | - $etag = $etag["ETag"]; |
|
| 250 | - } |
|
| 251 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 252 | - print_r($parts); |
|
| 253 | - //结束上传 |
|
| 254 | - $args=array( |
|
| 255 | - "Bucket"=>"aaphp", |
|
| 256 | - "Key"=>"multi.zip", |
|
| 257 | - "Options"=>array("uploadId"=>$uploadid), |
|
| 258 | - "Parts"=>$parts["Parts"] |
|
| 259 | - ); |
|
| 260 | - $result = $client->completeMultipartUpload($args); |
|
| 261 | - print_r($result); |
|
| 222 | + $file = "D://新建文件夹.rar"; |
|
| 223 | + if(Utils::chk_chinese($file)){ |
|
| 224 | + $file = iconv('utf-8','gbk',$file); |
|
| 225 | + } |
|
| 226 | + $total = Utils::getFileSize($file); |
|
| 227 | + $partsize = 1024*1024*5; |
|
| 228 | + $count = (int)(($total-1)/$partsize)+1; |
|
| 229 | + echo $count."\r\n"; |
|
| 230 | + for($i = 0;$i < $count;$i++){ |
|
| 231 | + echo "upload".$i."\r\n"; |
|
| 232 | + $args=array( |
|
| 233 | + "Bucket"=>"aaphp", |
|
| 234 | + "Key"=>"multi.zip", |
|
| 235 | + "Options"=>array( |
|
| 236 | + "partNumber"=>$i+1, |
|
| 237 | + "uploadId"=>$uploadid |
|
| 238 | + ), |
|
| 239 | + "ObjectMeta"=>array( |
|
| 240 | + "Content-Length"=>$partsize |
|
| 241 | + ), |
|
| 242 | + "Content"=>array( |
|
| 243 | + "content"=>$file, |
|
| 244 | + "seek_position"=>$partsize*$i |
|
| 245 | + ) |
|
| 246 | + ); |
|
| 247 | + $etag = $client->uploadPart($args); |
|
| 248 | + print_r($etag); |
|
| 249 | + $etag = $etag["ETag"]; |
|
| 250 | + } |
|
| 251 | + $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 252 | + print_r($parts); |
|
| 253 | + //结束上传 |
|
| 254 | + $args=array( |
|
| 255 | + "Bucket"=>"aaphp", |
|
| 256 | + "Key"=>"multi.zip", |
|
| 257 | + "Options"=>array("uploadId"=>$uploadid), |
|
| 258 | + "Parts"=>$parts["Parts"] |
|
| 259 | + ); |
|
| 260 | + $result = $client->completeMultipartUpload($args); |
|
| 261 | + print_r($result); |
|
| 262 | 262 | } |
| 263 | 263 | function abortMultipartUpload($client){ |
| 264 | - $args=array( |
|
| 265 | - "Bucket"=>"aaphp", |
|
| 266 | - "Key"=>"multi.zip", |
|
| 267 | - "Options"=>array("uploadId"=>"1234") |
|
| 268 | - ); |
|
| 269 | - return $client->abortMultipartUpload($args); |
|
| 264 | + $args=array( |
|
| 265 | + "Bucket"=>"aaphp", |
|
| 266 | + "Key"=>"multi.zip", |
|
| 267 | + "Options"=>array("uploadId"=>"1234") |
|
| 268 | + ); |
|
| 269 | + return $client->abortMultipartUpload($args); |
|
| 270 | 270 | } |
| 271 | 271 | function generatePresignedUrl($client){ |
| 272 | - $args=array( |
|
| 273 | - "Bucket"=>"aaphp", |
|
| 274 | - "Key"=>"multi.zip", |
|
| 275 | - "Options"=>array( |
|
| 276 | - "Expires"=>60*60*24*10, |
|
| 277 | - "response-content-type"=>"application/xml" |
|
| 278 | - ) |
|
| 279 | - ); |
|
| 280 | - return $client->generatePresignedUrl($args); |
|
| 272 | + $args=array( |
|
| 273 | + "Bucket"=>"aaphp", |
|
| 274 | + "Key"=>"multi.zip", |
|
| 275 | + "Options"=>array( |
|
| 276 | + "Expires"=>60*60*24*10, |
|
| 277 | + "response-content-type"=>"application/xml" |
|
| 278 | + ) |
|
| 279 | + ); |
|
| 280 | + return $client->generatePresignedUrl($args); |
|
| 281 | 281 | } |
| 282 | 282 | function putObjectWithAdpAndCallBack($client){ |
| 283 | - $content = "D://野生动物.3gp"; |
|
| 284 | - $args = array( |
|
| 285 | - "Bucket"=>"aaphp", |
|
| 286 | - "Key"=>"野生动物.3gp", |
|
| 287 | - "ACL"=>"public-read", |
|
| 288 | - "Content"=>array( |
|
| 289 | - "content"=>$content |
|
| 290 | - ), |
|
| 291 | - "Adp"=>array( |
|
| 292 | - "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 293 | - "Adps"=>array( |
|
| 294 | - array( |
|
| 295 | - "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 296 | - "Key"=>"野生动物-转码.3gp" |
|
| 297 | - ) |
|
| 298 | - ) |
|
| 299 | - ), |
|
| 300 | - "CallBack"=>array( |
|
| 301 | - "Url"=>"http://10.4.2.38:19090/", |
|
| 302 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 303 | - "BodyVariables"=>array("name"=>"lijunwei") |
|
| 304 | - ) |
|
| 305 | - ); |
|
| 306 | - return $client->putObjectByFile($args); |
|
| 283 | + $content = "D://野生动物.3gp"; |
|
| 284 | + $args = array( |
|
| 285 | + "Bucket"=>"aaphp", |
|
| 286 | + "Key"=>"野生动物.3gp", |
|
| 287 | + "ACL"=>"public-read", |
|
| 288 | + "Content"=>array( |
|
| 289 | + "content"=>$content |
|
| 290 | + ), |
|
| 291 | + "Adp"=>array( |
|
| 292 | + "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 293 | + "Adps"=>array( |
|
| 294 | + array( |
|
| 295 | + "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 296 | + "Key"=>"野生动物-转码.3gp" |
|
| 297 | + ) |
|
| 298 | + ) |
|
| 299 | + ), |
|
| 300 | + "CallBack"=>array( |
|
| 301 | + "Url"=>"http://10.4.2.38:19090/", |
|
| 302 | + "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 303 | + "BodyVariables"=>array("name"=>"lijunwei") |
|
| 304 | + ) |
|
| 305 | + ); |
|
| 306 | + return $client->putObjectByFile($args); |
|
| 307 | 307 | } |
| 308 | 308 | function multipartUploadWithAdpAndCallBack($client){ |
| 309 | - $args = array( |
|
| 310 | - "Bucket"=>"aaphp", |
|
| 311 | - "Key"=>"multi.zip", |
|
| 312 | - "UserMeta"=>array( |
|
| 313 | - "x-kss-meta-test"=>"example" |
|
| 314 | - ), |
|
| 315 | - "ObjectMeta"=>array( |
|
| 316 | - "Content-Type"=>"text/plain" |
|
| 317 | - ) |
|
| 318 | - ); |
|
| 319 | - $uploadid = $client->initMultipartUpload($args); |
|
| 320 | - print_r($uploadid); |
|
| 321 | - $uploadid = $uploadid["UploadId"]; |
|
| 322 | - echo $uploadid."\r\n"; |
|
| 323 | - //开始上传 |
|
| 309 | + $args = array( |
|
| 310 | + "Bucket"=>"aaphp", |
|
| 311 | + "Key"=>"multi.zip", |
|
| 312 | + "UserMeta"=>array( |
|
| 313 | + "x-kss-meta-test"=>"example" |
|
| 314 | + ), |
|
| 315 | + "ObjectMeta"=>array( |
|
| 316 | + "Content-Type"=>"text/plain" |
|
| 317 | + ) |
|
| 318 | + ); |
|
| 319 | + $uploadid = $client->initMultipartUpload($args); |
|
| 320 | + print_r($uploadid); |
|
| 321 | + $uploadid = $uploadid["UploadId"]; |
|
| 322 | + echo $uploadid."\r\n"; |
|
| 323 | + //开始上传 |
|
| 324 | 324 | |
| 325 | - $file = "D://野生动物.3gp"; |
|
| 326 | - if(Utils::chk_chinese($file)){ |
|
| 327 | - $file = iconv('utf-8','gbk',$file); |
|
| 328 | - } |
|
| 329 | - $partsize = 1024*1024*5; |
|
| 330 | - $total = Utils::getFileSize($file); |
|
| 331 | - $count = (int)(($total-1)/$partsize)+1; |
|
| 332 | - echo $count."\r\n"; |
|
| 333 | - for($i = 0;$i < $count;$i++){ |
|
| 334 | - echo "upload".$i."\r\n"; |
|
| 335 | - $args=array( |
|
| 336 | - "Bucket"=>"aaphp", |
|
| 337 | - "Key"=>"multi.zip", |
|
| 338 | - "Options"=>array( |
|
| 339 | - "partNumber"=>$i+1, |
|
| 340 | - "uploadId"=>$uploadid |
|
| 341 | - ), |
|
| 342 | - "ObjectMeta"=>array( |
|
| 343 | - "Content-Length"=>$partsize |
|
| 344 | - ), |
|
| 345 | - "Content"=>array( |
|
| 346 | - "content"=>$file, |
|
| 347 | - "seek_position"=>$partsize*$i |
|
| 348 | - ) |
|
| 349 | - ); |
|
| 350 | - $etag = $client->uploadPart($args); |
|
| 351 | - print_r($etag); |
|
| 352 | - $etag = $etag["ETag"]; |
|
| 353 | - } |
|
| 354 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 355 | - print_r($parts); |
|
| 356 | - //结束上传 |
|
| 357 | - $args=array( |
|
| 358 | - "Bucket"=>"aaphp", |
|
| 359 | - "Key"=>"multi.zip", |
|
| 360 | - "Options"=>array("uploadId"=>$uploadid), |
|
| 361 | - "Parts"=>$parts["Parts"], |
|
| 362 | - "Adp"=>array( |
|
| 363 | - "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 364 | - "Adps"=>array( |
|
| 365 | - array( |
|
| 366 | - "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 367 | - "Key"=>"野生动物-转码.3gp" |
|
| 368 | - ) |
|
| 369 | - ) |
|
| 370 | - ), |
|
| 371 | - "CallBack"=>array( |
|
| 372 | - "Url"=>"http://10.4.2.38:19090/", |
|
| 373 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 374 | - "BodyVariables"=>array("name"=>"lijunwei") |
|
| 375 | - ) |
|
| 376 | - ); |
|
| 377 | - $result = $client->completeMultipartUpload($args); |
|
| 378 | - print_r($result); |
|
| 379 | - $taskid = $result["TaskID"]; |
|
| 380 | - $task = $client->getAdp(array("TaskID"=>$taskid)); |
|
| 381 | - print_r($task); |
|
| 325 | + $file = "D://野生动物.3gp"; |
|
| 326 | + if(Utils::chk_chinese($file)){ |
|
| 327 | + $file = iconv('utf-8','gbk',$file); |
|
| 328 | + } |
|
| 329 | + $partsize = 1024*1024*5; |
|
| 330 | + $total = Utils::getFileSize($file); |
|
| 331 | + $count = (int)(($total-1)/$partsize)+1; |
|
| 332 | + echo $count."\r\n"; |
|
| 333 | + for($i = 0;$i < $count;$i++){ |
|
| 334 | + echo "upload".$i."\r\n"; |
|
| 335 | + $args=array( |
|
| 336 | + "Bucket"=>"aaphp", |
|
| 337 | + "Key"=>"multi.zip", |
|
| 338 | + "Options"=>array( |
|
| 339 | + "partNumber"=>$i+1, |
|
| 340 | + "uploadId"=>$uploadid |
|
| 341 | + ), |
|
| 342 | + "ObjectMeta"=>array( |
|
| 343 | + "Content-Length"=>$partsize |
|
| 344 | + ), |
|
| 345 | + "Content"=>array( |
|
| 346 | + "content"=>$file, |
|
| 347 | + "seek_position"=>$partsize*$i |
|
| 348 | + ) |
|
| 349 | + ); |
|
| 350 | + $etag = $client->uploadPart($args); |
|
| 351 | + print_r($etag); |
|
| 352 | + $etag = $etag["ETag"]; |
|
| 353 | + } |
|
| 354 | + $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 355 | + print_r($parts); |
|
| 356 | + //结束上传 |
|
| 357 | + $args=array( |
|
| 358 | + "Bucket"=>"aaphp", |
|
| 359 | + "Key"=>"multi.zip", |
|
| 360 | + "Options"=>array("uploadId"=>$uploadid), |
|
| 361 | + "Parts"=>$parts["Parts"], |
|
| 362 | + "Adp"=>array( |
|
| 363 | + "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 364 | + "Adps"=>array( |
|
| 365 | + array( |
|
| 366 | + "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 367 | + "Key"=>"野生动物-转码.3gp" |
|
| 368 | + ) |
|
| 369 | + ) |
|
| 370 | + ), |
|
| 371 | + "CallBack"=>array( |
|
| 372 | + "Url"=>"http://10.4.2.38:19090/", |
|
| 373 | + "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 374 | + "BodyVariables"=>array("name"=>"lijunwei") |
|
| 375 | + ) |
|
| 376 | + ); |
|
| 377 | + $result = $client->completeMultipartUpload($args); |
|
| 378 | + print_r($result); |
|
| 379 | + $taskid = $result["TaskID"]; |
|
| 380 | + $task = $client->getAdp(array("TaskID"=>$taskid)); |
|
| 381 | + print_r($task); |
|
| 382 | 382 | } |
| 383 | 383 | function putAdp($client){ |
| 384 | - $args=array( |
|
| 385 | - "Bucket"=>"aaphp", |
|
| 386 | - "Key"=>"multi.zip", |
|
| 387 | - "Adp"=>array( |
|
| 388 | - "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 389 | - "Adps"=>array( |
|
| 390 | - array( |
|
| 391 | - "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 392 | - "Key"=>"野生动物-转码.3gp" |
|
| 393 | - ) |
|
| 394 | - ) |
|
| 395 | - ) |
|
| 396 | - ); |
|
| 397 | - $result = $client->putAdp($args); |
|
| 398 | - print_r($result); |
|
| 399 | - $taskid = $result["TaskID"]; |
|
| 400 | - $task = $client->getAdp(array("TaskID"=>$taskid)); |
|
| 401 | - print_r($task); |
|
| 384 | + $args=array( |
|
| 385 | + "Bucket"=>"aaphp", |
|
| 386 | + "Key"=>"multi.zip", |
|
| 387 | + "Adp"=>array( |
|
| 388 | + "NotifyURL"=>"http://10.4.2.38:19090/", |
|
| 389 | + "Adps"=>array( |
|
| 390 | + array( |
|
| 391 | + "Command"=>"tag=avop&f=mp4&res=1280x720&vbr=1000k&abr=128k", |
|
| 392 | + "Key"=>"野生动物-转码.3gp" |
|
| 393 | + ) |
|
| 394 | + ) |
|
| 395 | + ) |
|
| 396 | + ); |
|
| 397 | + $result = $client->putAdp($args); |
|
| 398 | + print_r($result); |
|
| 399 | + $taskid = $result["TaskID"]; |
|
| 400 | + $task = $client->getAdp(array("TaskID"=>$taskid)); |
|
| 401 | + print_r($task); |
|
| 402 | 402 | } |
| 403 | 403 | function postObject($client){ |
| 404 | 404 | |
| 405 | - $postData = array( |
|
| 406 | - "key"=>"~!@\\#$\%^&*()_+-=qw", |
|
| 407 | - "acl"=>"public-read" |
|
| 408 | - ); |
|
| 409 | - $unKnowData=array("122","334"); |
|
| 405 | + $postData = array( |
|
| 406 | + "key"=>"~!@\\#$\%^&*()_+-=qw", |
|
| 407 | + "acl"=>"public-read" |
|
| 408 | + ); |
|
| 409 | + $unKnowData=array("122","334"); |
|
| 410 | 410 | |
| 411 | - print_r($client->postObject("ksc-scm",$postData,$unKnowData)); |
|
| 411 | + print_r($client->postObject("ksc-scm",$postData,$unKnowData)); |
|
| 412 | 412 | } |
| 413 | 413 | ?> |
@@ -2,7 +2,7 @@ discard block |
||
| 2 | 2 | require_once "../Ks3Client.class.php"; |
| 3 | 3 | require_once "../core/Utils.class.php"; |
| 4 | 4 | |
| 5 | -$client = new Ks3Client("","","kss.ksyun.com");//!!第三个参数endpoint需要对应bucket所在region!! 详见http://ks3.ksyun.com/doc/api/index.html Region(区域)一节 |
|
| 5 | +$client = new Ks3Client("", "", "kss.ksyun.com"); //!!第三个参数endpoint需要对应bucket所在region!! 详见http://ks3.ksyun.com/doc/api/index.html Region(区域)一节 |
|
| 6 | 6 | //print_r(listBuckets($client)); |
| 7 | 7 | //print_r(deleteBucket($client)); |
| 8 | 8 | //print_r(deleteBucketCORS($client)); |
@@ -32,16 +32,16 @@ discard block |
||
| 32 | 32 | //print_r(multipartUploadWithAdpAndCallBack($client)); |
| 33 | 33 | //print_r(putAdp($client)); |
| 34 | 34 | //print_r(postObject($client)); |
| 35 | -function listBuckets($client){ |
|
| 35 | +function listBuckets($client) { |
|
| 36 | 36 | return $client->listBuckets(); |
| 37 | 37 | } |
| 38 | -function deleteBucket($client){ |
|
| 38 | +function deleteBucket($client) { |
|
| 39 | 39 | return $client->deleteBucket(array("Bucket"=>"ksc-scm")); |
| 40 | 40 | } |
| 41 | -function deleteBucketCORS($client){ |
|
| 41 | +function deleteBucketCORS($client) { |
|
| 42 | 42 | return $client->deleteBucketCORS(array("Bucket"=>"ksc-scm")); |
| 43 | 43 | } |
| 44 | -function listObjects($client){ |
|
| 44 | +function listObjects($client) { |
|
| 45 | 45 | $args = array( |
| 46 | 46 | "Bucket"=>"lijunwei.test", |
| 47 | 47 | "Options"=>array( |
@@ -53,49 +53,49 @@ discard block |
||
| 53 | 53 | ); |
| 54 | 54 | return $client->listObjects($args); |
| 55 | 55 | } |
| 56 | -function getBucketAcl($client){ |
|
| 56 | +function getBucketAcl($client) { |
|
| 57 | 57 | return $client->getBucketAcl(array("Bucket"=>"aaphp")); |
| 58 | 58 | } |
| 59 | -function getBucketCORS($client){ |
|
| 59 | +function getBucketCORS($client) { |
|
| 60 | 60 | return $client->getBucketCORS(array("Bucket"=>"ksc-scm")); |
| 61 | 61 | } |
| 62 | -function getBucketLocation($client){ |
|
| 62 | +function getBucketLocation($client) { |
|
| 63 | 63 | return $client->getBucketLocation(array("Bucket"=>"ksc-scm")); |
| 64 | 64 | } |
| 65 | -function getBucketLogging($client){ |
|
| 65 | +function getBucketLogging($client) { |
|
| 66 | 66 | return $client->getBucketLogging(array("Bucket"=>"ksc-scm")); |
| 67 | 67 | } |
| 68 | -function bucketExists($client){ |
|
| 68 | +function bucketExists($client) { |
|
| 69 | 69 | $args = array("Bucket"=>"ksc-scm"); |
| 70 | 70 | return $client->bucketExists($args); |
| 71 | 71 | } |
| 72 | -function createBucket($client){ |
|
| 72 | +function createBucket($client) { |
|
| 73 | 73 | $args = array( |
| 74 | 74 | "Bucket"=>"ksc-scm", |
| 75 | 75 | "ACL"=>"private" |
| 76 | 76 | ); |
| 77 | 77 | return $client->createBucket($args); |
| 78 | 78 | } |
| 79 | -function setBucketAcl($client){ |
|
| 79 | +function setBucketAcl($client) { |
|
| 80 | 80 | $args = array( |
| 81 | 81 | "Bucket"=>"ksc-scm", |
| 82 | 82 | "ACL"=>"private" |
| 83 | 83 | ); |
| 84 | 84 | return $client->setBucketAcl($args); |
| 85 | 85 | } |
| 86 | -function setBucketCORS($client){ |
|
| 86 | +function setBucketCORS($client) { |
|
| 87 | 87 | $args = array( |
| 88 | 88 | "Bucket"=>"ksc-scm", |
| 89 | 89 | "CORS"=>array( |
| 90 | 90 | array( |
| 91 | - "AllowedMethod"=>array("GET","PUT"), |
|
| 91 | + "AllowedMethod"=>array("GET", "PUT"), |
|
| 92 | 92 | "AllowedOrigin"=>array("http://www.kingsoft.com"), |
| 93 | 93 | "AllowedHeader"=>array("*"), |
| 94 | 94 | "ExposeHeader"=>array("*"), |
| 95 | 95 | "MaxAgeSeconds"=>10 |
| 96 | 96 | ), |
| 97 | 97 | array( |
| 98 | - "AllowedMethod"=>array("GET","PUT"), |
|
| 98 | + "AllowedMethod"=>array("GET", "PUT"), |
|
| 99 | 99 | "AllowedOrigin"=>array("*"), |
| 100 | 100 | "AllowedHeader"=>array("*"), |
| 101 | 101 | "ExposeHeader"=>array("*"), |
@@ -105,7 +105,7 @@ discard block |
||
| 105 | 105 | ); |
| 106 | 106 | return $client->setBucketCORS($args); |
| 107 | 107 | } |
| 108 | -function setBucketLogging($client){ |
|
| 108 | +function setBucketLogging($client) { |
|
| 109 | 109 | $args = array( |
| 110 | 110 | "Bucket"=>"ksc-scm", |
| 111 | 111 | "BucketLogging"=>array( |
@@ -116,21 +116,21 @@ discard block |
||
| 116 | 116 | ); |
| 117 | 117 | return $client->setBucketLogging($args); |
| 118 | 118 | } |
| 119 | -function deleteObject($client){ |
|
| 119 | +function deleteObject($client) { |
|
| 120 | 120 | $args = array( |
| 121 | 121 | "Bucket"=>"ksc-scm", |
| 122 | 122 | "Key"=>"123.pdf" |
| 123 | 123 | ); |
| 124 | 124 | return $client->deleteObject($args); |
| 125 | 125 | } |
| 126 | -function deleteObjects($client){ |
|
| 126 | +function deleteObjects($client) { |
|
| 127 | 127 | $args = array( |
| 128 | 128 | "Bucket"=>"ksc-scm", |
| 129 | - "DeleteKeys"=>array("copy/test.zip","copy/123.doc") |
|
| 129 | + "DeleteKeys"=>array("copy/test.zip", "copy/123.doc") |
|
| 130 | 130 | ); |
| 131 | 131 | return $client->deleteObjects($args); |
| 132 | 132 | } |
| 133 | -function getObject($client){ |
|
| 133 | +function getObject($client) { |
|
| 134 | 134 | $args = array( |
| 135 | 135 | "Bucket"=>"aaphp", |
| 136 | 136 | "Key"=>"multi.exe", |
@@ -142,28 +142,28 @@ discard block |
||
| 142 | 142 | ); |
| 143 | 143 | return $client->getObject($args); |
| 144 | 144 | } |
| 145 | -function getObjectAcl($client){ |
|
| 145 | +function getObjectAcl($client) { |
|
| 146 | 146 | $args = array( |
| 147 | 147 | "Bucket"=>"aaphp", |
| 148 | 148 | "Key"=>"multi.exe" |
| 149 | 149 | ); |
| 150 | 150 | return $client->getObjectAcl($args); |
| 151 | 151 | } |
| 152 | -function objectExists($client){ |
|
| 152 | +function objectExists($client) { |
|
| 153 | 153 | $args = array( |
| 154 | 154 | "Bucket"=>"ksc-scm", |
| 155 | 155 | "Key"=>"123.pdf" |
| 156 | 156 | ); |
| 157 | 157 | return $client->objectExists($args); |
| 158 | 158 | } |
| 159 | -function getObjectMeta($client){ |
|
| 159 | +function getObjectMeta($client) { |
|
| 160 | 160 | $args = array( |
| 161 | 161 | "Bucket"=>"aaphp", |
| 162 | 162 | "Key"=>"test.zip" |
| 163 | 163 | ); |
| 164 | 164 | return $client->getObjectMeta($args); |
| 165 | 165 | } |
| 166 | -function setObjectAcl($client){ |
|
| 166 | +function setObjectAcl($client) { |
|
| 167 | 167 | $args = array( |
| 168 | 168 | "Bucket"=>"aaphp", |
| 169 | 169 | "Key"=>"test.zip", |
@@ -171,7 +171,7 @@ discard block |
||
| 171 | 171 | ); |
| 172 | 172 | return $client->setObjectAcl($args); |
| 173 | 173 | } |
| 174 | -function copyObject($client){ |
|
| 174 | +function copyObject($client) { |
|
| 175 | 175 | $args = array( |
| 176 | 176 | "Bucket"=>"aaphp", |
| 177 | 177 | "Key"=>"copy/test.zip", |
@@ -182,10 +182,10 @@ discard block |
||
| 182 | 182 | ); |
| 183 | 183 | return $client->copyObject($args); |
| 184 | 184 | } |
| 185 | -function putObjectByFile($client){ |
|
| 185 | +function putObjectByFile($client) { |
|
| 186 | 186 | $file = "D://phpput"; |
| 187 | - if(Utils::chk_chinese($file)){ |
|
| 188 | - $file = iconv('utf-8','gbk',$file); |
|
| 187 | + if (Utils::chk_chinese($file)) { |
|
| 188 | + $file = iconv('utf-8', 'gbk', $file); |
|
| 189 | 189 | } |
| 190 | 190 | $content = $file; |
| 191 | 191 | $args = array( |
@@ -193,7 +193,7 @@ discard block |
||
| 193 | 193 | "Key"=>"stream_upload1.txt", |
| 194 | 194 | "ACL"=>"public-read", |
| 195 | 195 | "ObjectMeta"=>array( |
| 196 | - "Content-Type"=>"image/jpg",//只传0-10字节, |
|
| 196 | + "Content-Type"=>"image/jpg", //只传0-10字节, |
|
| 197 | 197 | ), |
| 198 | 198 | "Content"=>array( |
| 199 | 199 | "content"=>$file, |
@@ -202,7 +202,7 @@ discard block |
||
| 202 | 202 | ); |
| 203 | 203 | return $client->putObjectByFile($args); |
| 204 | 204 | } |
| 205 | -function multipartUpload($client){ |
|
| 205 | +function multipartUpload($client) { |
|
| 206 | 206 | $args = array( |
| 207 | 207 | "Bucket"=>"aaphp", |
| 208 | 208 | "Key"=>"multi.zip", |
@@ -220,16 +220,16 @@ discard block |
||
| 220 | 220 | //开始上传 |
| 221 | 221 | |
| 222 | 222 | $file = "D://新建文件夹.rar"; |
| 223 | - if(Utils::chk_chinese($file)){ |
|
| 224 | - $file = iconv('utf-8','gbk',$file); |
|
| 223 | + if (Utils::chk_chinese($file)) { |
|
| 224 | + $file = iconv('utf-8', 'gbk', $file); |
|
| 225 | 225 | } |
| 226 | 226 | $total = Utils::getFileSize($file); |
| 227 | 227 | $partsize = 1024*1024*5; |
| 228 | 228 | $count = (int)(($total-1)/$partsize)+1; |
| 229 | 229 | echo $count."\r\n"; |
| 230 | - for($i = 0;$i < $count;$i++){ |
|
| 230 | + for ($i = 0; $i < $count; $i++) { |
|
| 231 | 231 | echo "upload".$i."\r\n"; |
| 232 | - $args=array( |
|
| 232 | + $args = array( |
|
| 233 | 233 | "Bucket"=>"aaphp", |
| 234 | 234 | "Key"=>"multi.zip", |
| 235 | 235 | "Options"=>array( |
@@ -248,10 +248,10 @@ discard block |
||
| 248 | 248 | print_r($etag); |
| 249 | 249 | $etag = $etag["ETag"]; |
| 250 | 250 | } |
| 251 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 251 | + $parts = $client->listParts(array("Bucket"=>"aaphp", "Key"=>"multi.zip", "Options"=>array("uploadId"=>$uploadid))); |
|
| 252 | 252 | print_r($parts); |
| 253 | 253 | //结束上传 |
| 254 | - $args=array( |
|
| 254 | + $args = array( |
|
| 255 | 255 | "Bucket"=>"aaphp", |
| 256 | 256 | "Key"=>"multi.zip", |
| 257 | 257 | "Options"=>array("uploadId"=>$uploadid), |
@@ -260,16 +260,16 @@ discard block |
||
| 260 | 260 | $result = $client->completeMultipartUpload($args); |
| 261 | 261 | print_r($result); |
| 262 | 262 | } |
| 263 | -function abortMultipartUpload($client){ |
|
| 264 | - $args=array( |
|
| 263 | +function abortMultipartUpload($client) { |
|
| 264 | + $args = array( |
|
| 265 | 265 | "Bucket"=>"aaphp", |
| 266 | 266 | "Key"=>"multi.zip", |
| 267 | 267 | "Options"=>array("uploadId"=>"1234") |
| 268 | 268 | ); |
| 269 | 269 | return $client->abortMultipartUpload($args); |
| 270 | 270 | } |
| 271 | -function generatePresignedUrl($client){ |
|
| 272 | - $args=array( |
|
| 271 | +function generatePresignedUrl($client) { |
|
| 272 | + $args = array( |
|
| 273 | 273 | "Bucket"=>"aaphp", |
| 274 | 274 | "Key"=>"multi.zip", |
| 275 | 275 | "Options"=>array( |
@@ -279,7 +279,7 @@ discard block |
||
| 279 | 279 | ); |
| 280 | 280 | return $client->generatePresignedUrl($args); |
| 281 | 281 | } |
| 282 | -function putObjectWithAdpAndCallBack($client){ |
|
| 282 | +function putObjectWithAdpAndCallBack($client) { |
|
| 283 | 283 | $content = "D://野生动物.3gp"; |
| 284 | 284 | $args = array( |
| 285 | 285 | "Bucket"=>"aaphp", |
@@ -299,13 +299,13 @@ discard block |
||
| 299 | 299 | ), |
| 300 | 300 | "CallBack"=>array( |
| 301 | 301 | "Url"=>"http://10.4.2.38:19090/", |
| 302 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 302 | + "BodyMagicVariables"=>array("bucket"=>"bucket", "key"=>"key"), |
|
| 303 | 303 | "BodyVariables"=>array("name"=>"lijunwei") |
| 304 | 304 | ) |
| 305 | 305 | ); |
| 306 | 306 | return $client->putObjectByFile($args); |
| 307 | 307 | } |
| 308 | -function multipartUploadWithAdpAndCallBack($client){ |
|
| 308 | +function multipartUploadWithAdpAndCallBack($client) { |
|
| 309 | 309 | $args = array( |
| 310 | 310 | "Bucket"=>"aaphp", |
| 311 | 311 | "Key"=>"multi.zip", |
@@ -323,16 +323,16 @@ discard block |
||
| 323 | 323 | //开始上传 |
| 324 | 324 | |
| 325 | 325 | $file = "D://野生动物.3gp"; |
| 326 | - if(Utils::chk_chinese($file)){ |
|
| 327 | - $file = iconv('utf-8','gbk',$file); |
|
| 326 | + if (Utils::chk_chinese($file)) { |
|
| 327 | + $file = iconv('utf-8', 'gbk', $file); |
|
| 328 | 328 | } |
| 329 | 329 | $partsize = 1024*1024*5; |
| 330 | 330 | $total = Utils::getFileSize($file); |
| 331 | 331 | $count = (int)(($total-1)/$partsize)+1; |
| 332 | 332 | echo $count."\r\n"; |
| 333 | - for($i = 0;$i < $count;$i++){ |
|
| 333 | + for ($i = 0; $i < $count; $i++) { |
|
| 334 | 334 | echo "upload".$i."\r\n"; |
| 335 | - $args=array( |
|
| 335 | + $args = array( |
|
| 336 | 336 | "Bucket"=>"aaphp", |
| 337 | 337 | "Key"=>"multi.zip", |
| 338 | 338 | "Options"=>array( |
@@ -351,10 +351,10 @@ discard block |
||
| 351 | 351 | print_r($etag); |
| 352 | 352 | $etag = $etag["ETag"]; |
| 353 | 353 | } |
| 354 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
| 354 | + $parts = $client->listParts(array("Bucket"=>"aaphp", "Key"=>"multi.zip", "Options"=>array("uploadId"=>$uploadid))); |
|
| 355 | 355 | print_r($parts); |
| 356 | 356 | //结束上传 |
| 357 | - $args=array( |
|
| 357 | + $args = array( |
|
| 358 | 358 | "Bucket"=>"aaphp", |
| 359 | 359 | "Key"=>"multi.zip", |
| 360 | 360 | "Options"=>array("uploadId"=>$uploadid), |
@@ -370,7 +370,7 @@ discard block |
||
| 370 | 370 | ), |
| 371 | 371 | "CallBack"=>array( |
| 372 | 372 | "Url"=>"http://10.4.2.38:19090/", |
| 373 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
| 373 | + "BodyMagicVariables"=>array("bucket"=>"bucket", "key"=>"key"), |
|
| 374 | 374 | "BodyVariables"=>array("name"=>"lijunwei") |
| 375 | 375 | ) |
| 376 | 376 | ); |
@@ -380,8 +380,8 @@ discard block |
||
| 380 | 380 | $task = $client->getAdp(array("TaskID"=>$taskid)); |
| 381 | 381 | print_r($task); |
| 382 | 382 | } |
| 383 | -function putAdp($client){ |
|
| 384 | - $args=array( |
|
| 383 | +function putAdp($client) { |
|
| 384 | + $args = array( |
|
| 385 | 385 | "Bucket"=>"aaphp", |
| 386 | 386 | "Key"=>"multi.zip", |
| 387 | 387 | "Adp"=>array( |
@@ -400,14 +400,14 @@ discard block |
||
| 400 | 400 | $task = $client->getAdp(array("TaskID"=>$taskid)); |
| 401 | 401 | print_r($task); |
| 402 | 402 | } |
| 403 | -function postObject($client){ |
|
| 403 | +function postObject($client) { |
|
| 404 | 404 | |
| 405 | 405 | $postData = array( |
| 406 | 406 | "key"=>"~!@\\#$\%^&*()_+-=qw", |
| 407 | 407 | "acl"=>"public-read" |
| 408 | 408 | ); |
| 409 | - $unKnowData=array("122","334"); |
|
| 409 | + $unKnowData = array("122", "334"); |
|
| 410 | 410 | |
| 411 | - print_r($client->postObject("ksc-scm",$postData,$unKnowData)); |
|
| 411 | + print_r($client->postObject("ksc-scm", $postData, $unKnowData)); |
|
| 412 | 412 | } |
| 413 | 413 | ?> |
@@ -1,279 +1,279 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | class EncryptionUtil{ |
| 3 | - public static $INSTRUCTION_SUFFIX = ".instruction"; |
|
| 4 | - public static function genereateOnceUsedKey($length=32){ |
|
| 5 | - $randpwd = ""; |
|
| 6 | - for ($i = 0; $i < $length; $i++) |
|
| 7 | - { |
|
| 8 | - $randpwd .= chr(mt_rand(33, 126)); |
|
| 9 | - } |
|
| 10 | - return $randpwd; |
|
| 11 | - } |
|
| 12 | - public static function encode_AES_ECB($data,$secret_key){ |
|
| 13 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 3 | + public static $INSTRUCTION_SUFFIX = ".instruction"; |
|
| 4 | + public static function genereateOnceUsedKey($length=32){ |
|
| 5 | + $randpwd = ""; |
|
| 6 | + for ($i = 0; $i < $length; $i++) |
|
| 7 | + { |
|
| 8 | + $randpwd .= chr(mt_rand(33, 126)); |
|
| 9 | + } |
|
| 10 | + return $randpwd; |
|
| 11 | + } |
|
| 12 | + public static function encode_AES_ECB($data,$secret_key){ |
|
| 13 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 14 | 14 | |
| 15 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 16 | - $pad = $blocksize - (strlen($data) % $blocksize); |
|
| 17 | - $data = $data . str_repeat(chr($pad), $pad); |
|
| 15 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 16 | + $pad = $blocksize - (strlen($data) % $blocksize); |
|
| 17 | + $data = $data . str_repeat(chr($pad), $pad); |
|
| 18 | 18 | |
| 19 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 20 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
| 21 | - $encrypted = mcrypt_generic($td,$data); |
|
| 22 | - mcrypt_generic_deinit($td); |
|
| 23 | - return $encrypted; |
|
| 24 | - } |
|
| 25 | - public static function decode_AES_ECB($data,$secret_key){ |
|
| 26 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 27 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 28 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
| 29 | - $data = mdecrypt_generic($td,$data); |
|
| 30 | - mcrypt_generic_deinit($td); |
|
| 31 | - mcrypt_module_close($td); |
|
| 19 | + $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 20 | + mcrypt_generic_init($td,$secret_key,$iv); |
|
| 21 | + $encrypted = mcrypt_generic($td,$data); |
|
| 22 | + mcrypt_generic_deinit($td); |
|
| 23 | + return $encrypted; |
|
| 24 | + } |
|
| 25 | + public static function decode_AES_ECB($data,$secret_key){ |
|
| 26 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 27 | + $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 28 | + mcrypt_generic_init($td,$secret_key,$iv); |
|
| 29 | + $data = mdecrypt_generic($td,$data); |
|
| 30 | + mcrypt_generic_deinit($td); |
|
| 31 | + mcrypt_module_close($td); |
|
| 32 | 32 | |
| 33 | - $dec_s = strlen($data); |
|
| 34 | - $padding = ord($data[$dec_s-1]); |
|
| 35 | - $data = substr($data, 0, -$padding); |
|
| 33 | + $dec_s = strlen($data); |
|
| 34 | + $padding = ord($data[$dec_s-1]); |
|
| 35 | + $data = substr($data, 0, -$padding); |
|
| 36 | 36 | |
| 37 | - return trim($data); |
|
| 38 | - } |
|
| 39 | - public static function getKeyEncryptionAlgm($encryptionMaterials){ |
|
| 40 | - if(is_array($encryptionMaterials)){ |
|
| 41 | - return "RSA"; |
|
| 42 | - }else{ |
|
| 43 | - return "AES"; |
|
| 44 | - } |
|
| 45 | - } |
|
| 46 | - public static function getAdjustedRange($range,$blocksize){ |
|
| 47 | - $a = $range["start"]; |
|
| 48 | - $b = $range["end"]; |
|
| 49 | - $a = $a - ($a%$blocksize)-$blocksize; |
|
| 50 | - if($a < 0) |
|
| 51 | - $a = 0; |
|
| 37 | + return trim($data); |
|
| 38 | + } |
|
| 39 | + public static function getKeyEncryptionAlgm($encryptionMaterials){ |
|
| 40 | + if(is_array($encryptionMaterials)){ |
|
| 41 | + return "RSA"; |
|
| 42 | + }else{ |
|
| 43 | + return "AES"; |
|
| 44 | + } |
|
| 45 | + } |
|
| 46 | + public static function getAdjustedRange($range,$blocksize){ |
|
| 47 | + $a = $range["start"]; |
|
| 48 | + $b = $range["end"]; |
|
| 49 | + $a = $a - ($a%$blocksize)-$blocksize; |
|
| 50 | + if($a < 0) |
|
| 51 | + $a = 0; |
|
| 52 | 52 | |
| 53 | - $b = $b+$blocksize-$b%$blocksize+$blocksize; |
|
| 53 | + $b = $b+$blocksize-$b%$blocksize+$blocksize; |
|
| 54 | 54 | |
| 55 | - return array("start"=>$a,"end"=>$b); |
|
| 56 | - } |
|
| 57 | - public static function encodeCek($encryptionMaterials,$cek){ |
|
| 58 | - $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
|
| 59 | - if($encrypKeyAlg === "AES"){ |
|
| 60 | - $secretKey = $encryptionMaterials; |
|
| 61 | - $encryptedSek = EncryptionUtil::encode_AES_ECB($cek,$secretKey); |
|
| 62 | - if(empty($encryptedSek)) |
|
| 63 | - throw new Ks3ClientException("can not encode cek useing AES"); |
|
| 64 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 65 | - $encryptedSek = ""; |
|
| 66 | - openssl_public_encrypt($cek,$encryptedSek, $encryptionMaterials[0]); |
|
| 67 | - if(empty($encryptedSek)) |
|
| 68 | - throw new Ks3ClientException("can not encode cek useing RSA"); |
|
| 69 | - } |
|
| 70 | - return $encryptedSek; |
|
| 71 | - } |
|
| 72 | - public static function decodeCek($encryptionMaterials,$cekEncrypted){ |
|
| 73 | - $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
|
| 74 | - if($encrypKeyAlg === "AES"){ |
|
| 75 | - $secretKey = $encryptionMaterials; |
|
| 76 | - $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted,$secretKey); |
|
| 77 | - if(empty($cek)) |
|
| 78 | - throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
|
| 79 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 80 | - $cek = ""; |
|
| 81 | - openssl_private_decrypt($cekEncrypted,$cek, $encryptionMaterials[1]); |
|
| 82 | - if(empty($cek)) |
|
| 83 | - throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
|
| 84 | - } |
|
| 85 | - return $cek; |
|
| 86 | - } |
|
| 87 | - public static function getPKCS5EncrypedLength($length,$blocksize){ |
|
| 88 | - $pad = $blocksize - $length%$blocksize; |
|
| 89 | - return $length+$pad; |
|
| 90 | - } |
|
| 91 | - //pkcs5填充 |
|
| 92 | - public static function PKCS5Padding($data,$blocksize){ |
|
| 93 | - $pad = $blocksize - strlen($data)%$blocksize; |
|
| 94 | - for($i = 0;$i < $pad;$i++){ |
|
| 95 | - $data.= chr($pad); |
|
| 96 | - } |
|
| 97 | - return $data; |
|
| 98 | - } |
|
| 99 | - public static function updateContentMD5Header($req){ |
|
| 100 | - if(!is_array($req)) |
|
| 101 | - return $req; |
|
| 102 | - if(isset($req["ObjectMeta"])){ |
|
| 103 | - $meta = $req["ObjectMeta"]; |
|
| 104 | - }else{ |
|
| 105 | - return $req; |
|
| 106 | - } |
|
| 107 | - if(is_array($meta) && isset($meta["Content-MD5"])){ |
|
| 108 | - $md5 = $meta["Content-MD5"]; |
|
| 109 | - }else{ |
|
| 110 | - return $req; |
|
| 111 | - } |
|
| 112 | - if(empty($md5)){ |
|
| 113 | - return $req; |
|
| 114 | - }else{ |
|
| 115 | - $req["ObjectMeta"]["Content-MD5"] = NULL; |
|
| 116 | - $req["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-md5"] = $md5; |
|
| 117 | - } |
|
| 118 | - return $req; |
|
| 119 | - } |
|
| 120 | - public static function metaTextLength($req){ |
|
| 121 | - if(!is_array($req)) |
|
| 122 | - return -1; |
|
| 123 | - if(isset($req["ObjectMeta"])){ |
|
| 124 | - $meta = $req["ObjectMeta"]; |
|
| 125 | - }else{ |
|
| 126 | - return -1; |
|
| 127 | - } |
|
| 128 | - if(is_array($meta) && isset($meta["Content-Length"])){ |
|
| 129 | - $length = $meta["Content-Length"]; |
|
| 130 | - return $length; |
|
| 131 | - }else |
|
| 132 | - return -1; |
|
| 133 | - } |
|
| 134 | - public static function plainTextLength($args){ |
|
| 135 | - if(isset($args["Content"])){ |
|
| 136 | - if(is_array($args["Content"])){ |
|
| 137 | - $content = $args["Content"]["content"]; |
|
| 138 | - $seek_position = 0; |
|
| 139 | - $resourceLength = 0; |
|
| 140 | - $length = -1; |
|
| 141 | - $isFile = FALSE; |
|
| 55 | + return array("start"=>$a,"end"=>$b); |
|
| 56 | + } |
|
| 57 | + public static function encodeCek($encryptionMaterials,$cek){ |
|
| 58 | + $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
|
| 59 | + if($encrypKeyAlg === "AES"){ |
|
| 60 | + $secretKey = $encryptionMaterials; |
|
| 61 | + $encryptedSek = EncryptionUtil::encode_AES_ECB($cek,$secretKey); |
|
| 62 | + if(empty($encryptedSek)) |
|
| 63 | + throw new Ks3ClientException("can not encode cek useing AES"); |
|
| 64 | + }else if($encrypKeyAlg === "RSA"){ |
|
| 65 | + $encryptedSek = ""; |
|
| 66 | + openssl_public_encrypt($cek,$encryptedSek, $encryptionMaterials[0]); |
|
| 67 | + if(empty($encryptedSek)) |
|
| 68 | + throw new Ks3ClientException("can not encode cek useing RSA"); |
|
| 69 | + } |
|
| 70 | + return $encryptedSek; |
|
| 71 | + } |
|
| 72 | + public static function decodeCek($encryptionMaterials,$cekEncrypted){ |
|
| 73 | + $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
|
| 74 | + if($encrypKeyAlg === "AES"){ |
|
| 75 | + $secretKey = $encryptionMaterials; |
|
| 76 | + $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted,$secretKey); |
|
| 77 | + if(empty($cek)) |
|
| 78 | + throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
|
| 79 | + }else if($encrypKeyAlg === "RSA"){ |
|
| 80 | + $cek = ""; |
|
| 81 | + openssl_private_decrypt($cekEncrypted,$cek, $encryptionMaterials[1]); |
|
| 82 | + if(empty($cek)) |
|
| 83 | + throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
|
| 84 | + } |
|
| 85 | + return $cek; |
|
| 86 | + } |
|
| 87 | + public static function getPKCS5EncrypedLength($length,$blocksize){ |
|
| 88 | + $pad = $blocksize - $length%$blocksize; |
|
| 89 | + return $length+$pad; |
|
| 90 | + } |
|
| 91 | + //pkcs5填充 |
|
| 92 | + public static function PKCS5Padding($data,$blocksize){ |
|
| 93 | + $pad = $blocksize - strlen($data)%$blocksize; |
|
| 94 | + for($i = 0;$i < $pad;$i++){ |
|
| 95 | + $data.= chr($pad); |
|
| 96 | + } |
|
| 97 | + return $data; |
|
| 98 | + } |
|
| 99 | + public static function updateContentMD5Header($req){ |
|
| 100 | + if(!is_array($req)) |
|
| 101 | + return $req; |
|
| 102 | + if(isset($req["ObjectMeta"])){ |
|
| 103 | + $meta = $req["ObjectMeta"]; |
|
| 104 | + }else{ |
|
| 105 | + return $req; |
|
| 106 | + } |
|
| 107 | + if(is_array($meta) && isset($meta["Content-MD5"])){ |
|
| 108 | + $md5 = $meta["Content-MD5"]; |
|
| 109 | + }else{ |
|
| 110 | + return $req; |
|
| 111 | + } |
|
| 112 | + if(empty($md5)){ |
|
| 113 | + return $req; |
|
| 114 | + }else{ |
|
| 115 | + $req["ObjectMeta"]["Content-MD5"] = NULL; |
|
| 116 | + $req["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-md5"] = $md5; |
|
| 117 | + } |
|
| 118 | + return $req; |
|
| 119 | + } |
|
| 120 | + public static function metaTextLength($req){ |
|
| 121 | + if(!is_array($req)) |
|
| 122 | + return -1; |
|
| 123 | + if(isset($req["ObjectMeta"])){ |
|
| 124 | + $meta = $req["ObjectMeta"]; |
|
| 125 | + }else{ |
|
| 126 | + return -1; |
|
| 127 | + } |
|
| 128 | + if(is_array($meta) && isset($meta["Content-Length"])){ |
|
| 129 | + $length = $meta["Content-Length"]; |
|
| 130 | + return $length; |
|
| 131 | + }else |
|
| 132 | + return -1; |
|
| 133 | + } |
|
| 134 | + public static function plainTextLength($args){ |
|
| 135 | + if(isset($args["Content"])){ |
|
| 136 | + if(is_array($args["Content"])){ |
|
| 137 | + $content = $args["Content"]["content"]; |
|
| 138 | + $seek_position = 0; |
|
| 139 | + $resourceLength = 0; |
|
| 140 | + $length = -1; |
|
| 141 | + $isFile = FALSE; |
|
| 142 | 142 | |
| 143 | - if (!is_resource($content)){ |
|
| 144 | - $isFile = TRUE; |
|
| 145 | - //如果之前用户已经转化为GBK则不转换 |
|
| 146 | - if(Utils::chk_chinese($content)&&!Utils::check_char($content)){ |
|
| 147 | - $content = iconv('utf-8','gbk',$content); |
|
| 148 | - } |
|
| 149 | - if(!file_exists($content)) |
|
| 150 | - throw new Ks3ClientException("the specified file does not exist "); |
|
| 151 | - $length = Utils::getFileSize($content); |
|
| 152 | - $content = fopen($content,"r"); |
|
| 153 | - }else{ |
|
| 154 | - $stats = fstat($content); |
|
| 155 | - if ($stats && $stats["size"] >= 0){ |
|
| 156 | - $length = $stats["size"]; |
|
| 157 | - } |
|
| 158 | - } |
|
| 159 | - $resourceLength = $length; |
|
| 160 | - //优先取用户设置seek_position,没有的话取ftell |
|
| 161 | - if(isset($args["Content"]["seek_position"])&&$args["Content"]["seek_position"]>0){ |
|
| 162 | - $seek_position = $args["Content"]["seek_position"]; |
|
| 163 | - }else if(!$isFile){ |
|
| 164 | - $seek_position = ftell($content); |
|
| 165 | - if($seek_position<0) |
|
| 166 | - $seek_position = 0; |
|
| 167 | - fseek($content,0); |
|
| 168 | - } |
|
| 143 | + if (!is_resource($content)){ |
|
| 144 | + $isFile = TRUE; |
|
| 145 | + //如果之前用户已经转化为GBK则不转换 |
|
| 146 | + if(Utils::chk_chinese($content)&&!Utils::check_char($content)){ |
|
| 147 | + $content = iconv('utf-8','gbk',$content); |
|
| 148 | + } |
|
| 149 | + if(!file_exists($content)) |
|
| 150 | + throw new Ks3ClientException("the specified file does not exist "); |
|
| 151 | + $length = Utils::getFileSize($content); |
|
| 152 | + $content = fopen($content,"r"); |
|
| 153 | + }else{ |
|
| 154 | + $stats = fstat($content); |
|
| 155 | + if ($stats && $stats["size"] >= 0){ |
|
| 156 | + $length = $stats["size"]; |
|
| 157 | + } |
|
| 158 | + } |
|
| 159 | + $resourceLength = $length; |
|
| 160 | + //优先取用户设置seek_position,没有的话取ftell |
|
| 161 | + if(isset($args["Content"]["seek_position"])&&$args["Content"]["seek_position"]>0){ |
|
| 162 | + $seek_position = $args["Content"]["seek_position"]; |
|
| 163 | + }else if(!$isFile){ |
|
| 164 | + $seek_position = ftell($content); |
|
| 165 | + if($seek_position<0) |
|
| 166 | + $seek_position = 0; |
|
| 167 | + fseek($content,0); |
|
| 168 | + } |
|
| 169 | 169 | |
| 170 | - $lengthInMeta = -1; |
|
| 171 | - if(isset($args["ObjectMeta"]["Content-Length"])){ |
|
| 172 | - $lengthInMeta = $args["ObjectMeta"]["Content-Length"]; |
|
| 173 | - } |
|
| 174 | - if($lengthInMeta > 0){ |
|
| 175 | - $length = $lengthInMeta; |
|
| 176 | - }else if($resourceLength > 0){ |
|
| 177 | - //根据seek_position计算实际长度 |
|
| 178 | - $length = $resourceLength - $seek_position; |
|
| 179 | - } |
|
| 180 | - if($length <= 0) |
|
| 181 | - throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
|
| 182 | - return $length; |
|
| 183 | - }else{ |
|
| 184 | - $content = $args["Content"]; |
|
| 185 | - $lengthInMeta = EncryptionUtil::metaTextLength($args); |
|
| 186 | - $length = strlen($content); |
|
| 187 | - if($length<$lengthInMeta||$lengthInMeta <= 0) |
|
| 188 | - return $length; |
|
| 189 | - else |
|
| 190 | - return $lengthInMeta; |
|
| 191 | - } |
|
| 192 | - } |
|
| 193 | - return -1; |
|
| 194 | - } |
|
| 195 | - public static function initMultipartUploadContext($initResult,$iv,$cek,$encryptedCek,$matdesc="{}"){ |
|
| 196 | - $cacheDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR; |
|
| 197 | - $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 198 | - if(!is_dir($cacheDir)) |
|
| 199 | - mkdir($cacheDir); |
|
| 200 | - if(!is_dir($encryptionDir)) |
|
| 201 | - mkdir($encryptionDir); |
|
| 202 | - if(is_array($matdesc)){ |
|
| 203 | - $matdesc = json_encode($matdesc); |
|
| 204 | - } |
|
| 205 | - $initResult["firstIv"] = base64_encode($iv); |
|
| 206 | - $initResult["nextIv"] = base64_encode($iv); |
|
| 207 | - $initResult["cek"] = base64_encode($cek); |
|
| 208 | - $initResult["encryptedCek"] = base64_encode($encryptedCek); |
|
| 209 | - $initResult["lastPart"] = FALSE; |
|
| 210 | - $initResult["matdesc"] = $matdesc; |
|
| 211 | - $json = json_encode($initResult); |
|
| 212 | - $file = EncryptionUtil::openfile($encryptionDir.$initResult["UploadId"], "w"); |
|
| 213 | - fwrite($file, $json); |
|
| 214 | - fclose($file); |
|
| 215 | - } |
|
| 216 | - public static function updateMultipartUploadContext($UploadId,$iv,$lastPart = FALSE){ |
|
| 217 | - $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 218 | - $content = EncryptionUtil::getMultipartUploadContext($UploadId); |
|
| 219 | - $content["nextIv"] = base64_encode($iv); |
|
| 220 | - $content["lastPart"] = $lastPart; |
|
| 221 | - $json = json_encode($content); |
|
| 222 | - $file = EncryptionUtil::openfile($encryptionDir.$UploadId, "w"); |
|
| 223 | - fwrite($file, $json); |
|
| 224 | - fclose($file); |
|
| 225 | - } |
|
| 226 | - public static function getMultipartUploadContext($UploadId){ |
|
| 227 | - $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 228 | - if(!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
| 229 | - throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
|
| 230 | - $jsonString = file_get_contents($encryptionDir.$UploadId); |
|
| 231 | - $arry = json_decode($jsonString,TRUE); |
|
| 232 | - return $arry; |
|
| 233 | - } |
|
| 234 | - public static function deleteMultipartUploadContext($UploadId){ |
|
| 235 | - $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 236 | - @unlink($encryptionDir.$UploadId); |
|
| 237 | - } |
|
| 238 | - public static function multipartUploadContextExists($UploadId){ |
|
| 239 | - $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 240 | - return file_exists($encryptionDir.$UploadId); |
|
| 241 | - } |
|
| 242 | - public static function openfile($path,$mode){ |
|
| 243 | - $file = fopen($path, $mode); |
|
| 244 | - if($file) |
|
| 245 | - return $file; |
|
| 246 | - else |
|
| 247 | - throw new Ks3ClientException("open file ".$path." error"); |
|
| 248 | - } |
|
| 249 | - //matdesc为字符串或array数据类型。 |
|
| 250 | - public static function createInstructionFile($bucket,$key,$cek,$iv,$matdesc="{}"){ |
|
| 251 | - if(is_array($matdesc)){ |
|
| 252 | - $matdesc = json_encode($matdesc); |
|
| 253 | - } |
|
| 254 | - $key = $key.EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 170 | + $lengthInMeta = -1; |
|
| 171 | + if(isset($args["ObjectMeta"]["Content-Length"])){ |
|
| 172 | + $lengthInMeta = $args["ObjectMeta"]["Content-Length"]; |
|
| 173 | + } |
|
| 174 | + if($lengthInMeta > 0){ |
|
| 175 | + $length = $lengthInMeta; |
|
| 176 | + }else if($resourceLength > 0){ |
|
| 177 | + //根据seek_position计算实际长度 |
|
| 178 | + $length = $resourceLength - $seek_position; |
|
| 179 | + } |
|
| 180 | + if($length <= 0) |
|
| 181 | + throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
|
| 182 | + return $length; |
|
| 183 | + }else{ |
|
| 184 | + $content = $args["Content"]; |
|
| 185 | + $lengthInMeta = EncryptionUtil::metaTextLength($args); |
|
| 186 | + $length = strlen($content); |
|
| 187 | + if($length<$lengthInMeta||$lengthInMeta <= 0) |
|
| 188 | + return $length; |
|
| 189 | + else |
|
| 190 | + return $lengthInMeta; |
|
| 191 | + } |
|
| 192 | + } |
|
| 193 | + return -1; |
|
| 194 | + } |
|
| 195 | + public static function initMultipartUploadContext($initResult,$iv,$cek,$encryptedCek,$matdesc="{}"){ |
|
| 196 | + $cacheDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR; |
|
| 197 | + $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 198 | + if(!is_dir($cacheDir)) |
|
| 199 | + mkdir($cacheDir); |
|
| 200 | + if(!is_dir($encryptionDir)) |
|
| 201 | + mkdir($encryptionDir); |
|
| 202 | + if(is_array($matdesc)){ |
|
| 203 | + $matdesc = json_encode($matdesc); |
|
| 204 | + } |
|
| 205 | + $initResult["firstIv"] = base64_encode($iv); |
|
| 206 | + $initResult["nextIv"] = base64_encode($iv); |
|
| 207 | + $initResult["cek"] = base64_encode($cek); |
|
| 208 | + $initResult["encryptedCek"] = base64_encode($encryptedCek); |
|
| 209 | + $initResult["lastPart"] = FALSE; |
|
| 210 | + $initResult["matdesc"] = $matdesc; |
|
| 211 | + $json = json_encode($initResult); |
|
| 212 | + $file = EncryptionUtil::openfile($encryptionDir.$initResult["UploadId"], "w"); |
|
| 213 | + fwrite($file, $json); |
|
| 214 | + fclose($file); |
|
| 215 | + } |
|
| 216 | + public static function updateMultipartUploadContext($UploadId,$iv,$lastPart = FALSE){ |
|
| 217 | + $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 218 | + $content = EncryptionUtil::getMultipartUploadContext($UploadId); |
|
| 219 | + $content["nextIv"] = base64_encode($iv); |
|
| 220 | + $content["lastPart"] = $lastPart; |
|
| 221 | + $json = json_encode($content); |
|
| 222 | + $file = EncryptionUtil::openfile($encryptionDir.$UploadId, "w"); |
|
| 223 | + fwrite($file, $json); |
|
| 224 | + fclose($file); |
|
| 225 | + } |
|
| 226 | + public static function getMultipartUploadContext($UploadId){ |
|
| 227 | + $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 228 | + if(!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
| 229 | + throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
|
| 230 | + $jsonString = file_get_contents($encryptionDir.$UploadId); |
|
| 231 | + $arry = json_decode($jsonString,TRUE); |
|
| 232 | + return $arry; |
|
| 233 | + } |
|
| 234 | + public static function deleteMultipartUploadContext($UploadId){ |
|
| 235 | + $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 236 | + @unlink($encryptionDir.$UploadId); |
|
| 237 | + } |
|
| 238 | + public static function multipartUploadContextExists($UploadId){ |
|
| 239 | + $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
|
| 240 | + return file_exists($encryptionDir.$UploadId); |
|
| 241 | + } |
|
| 242 | + public static function openfile($path,$mode){ |
|
| 243 | + $file = fopen($path, $mode); |
|
| 244 | + if($file) |
|
| 245 | + return $file; |
|
| 246 | + else |
|
| 247 | + throw new Ks3ClientException("open file ".$path." error"); |
|
| 248 | + } |
|
| 249 | + //matdesc为字符串或array数据类型。 |
|
| 250 | + public static function createInstructionFile($bucket,$key,$cek,$iv,$matdesc="{}"){ |
|
| 251 | + if(is_array($matdesc)){ |
|
| 252 | + $matdesc = json_encode($matdesc); |
|
| 253 | + } |
|
| 254 | + $key = $key.EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 255 | 255 | |
| 256 | - $instruction = json_encode(array( |
|
| 257 | - "x-kss-key"=>$cek, |
|
| 258 | - "x-kss-iv"=>$iv, |
|
| 259 | - "x-kss-matdesc"=>$matdesc |
|
| 260 | - )); |
|
| 256 | + $instruction = json_encode(array( |
|
| 257 | + "x-kss-key"=>$cek, |
|
| 258 | + "x-kss-iv"=>$iv, |
|
| 259 | + "x-kss-matdesc"=>$matdesc |
|
| 260 | + )); |
|
| 261 | 261 | |
| 262 | - $req = array( |
|
| 263 | - "Bucket"=>$bucket, |
|
| 264 | - "Key"=>$key, |
|
| 265 | - "Content"=>$instruction, |
|
| 266 | - "UserMeta"=>array( |
|
| 267 | - "x-kss-meta-x-kss-crypto-instr-file"=>base64_encode($key) |
|
| 268 | - ) |
|
| 269 | - ); |
|
| 270 | - return $req; |
|
| 271 | - } |
|
| 272 | - public static function isInstructionFile($s3Object){ |
|
| 273 | - $meta = $s3Object["Meta"]; |
|
| 274 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
| 275 | - return TRUE; |
|
| 276 | - return FALSE; |
|
| 277 | - } |
|
| 262 | + $req = array( |
|
| 263 | + "Bucket"=>$bucket, |
|
| 264 | + "Key"=>$key, |
|
| 265 | + "Content"=>$instruction, |
|
| 266 | + "UserMeta"=>array( |
|
| 267 | + "x-kss-meta-x-kss-crypto-instr-file"=>base64_encode($key) |
|
| 268 | + ) |
|
| 269 | + ); |
|
| 270 | + return $req; |
|
| 271 | + } |
|
| 272 | + public static function isInstructionFile($s3Object){ |
|
| 273 | + $meta = $s3Object["Meta"]; |
|
| 274 | + if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
| 275 | + return TRUE; |
|
| 276 | + return FALSE; |
|
| 277 | + } |
|
| 278 | 278 | } |
| 279 | 279 | ?> |
| 280 | 280 | \ No newline at end of file |
@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | -class EncryptionUtil{ |
|
| 2 | +class EncryptionUtil { |
|
| 3 | 3 | public static $INSTRUCTION_SUFFIX = ".instruction"; |
| 4 | - public static function genereateOnceUsedKey($length=32){ |
|
| 4 | + public static function genereateOnceUsedKey($length = 32) { |
|
| 5 | 5 | $randpwd = ""; |
| 6 | 6 | for ($i = 0; $i < $length; $i++) |
| 7 | 7 | { |
@@ -9,24 +9,24 @@ discard block |
||
| 9 | 9 | } |
| 10 | 10 | return $randpwd; |
| 11 | 11 | } |
| 12 | - public static function encode_AES_ECB($data,$secret_key){ |
|
| 13 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 12 | + public static function encode_AES_ECB($data, $secret_key) { |
|
| 13 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_ECB, ''); |
|
| 14 | 14 | |
| 15 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 16 | - $pad = $blocksize - (strlen($data) % $blocksize); |
|
| 17 | - $data = $data . str_repeat(chr($pad), $pad); |
|
| 15 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_ECB); |
|
| 16 | + $pad = $blocksize-(strlen($data)%$blocksize); |
|
| 17 | + $data = $data.str_repeat(chr($pad), $pad); |
|
| 18 | 18 | |
| 19 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 20 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
| 21 | - $encrypted = mcrypt_generic($td,$data); |
|
| 19 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 20 | + mcrypt_generic_init($td, $secret_key, $iv); |
|
| 21 | + $encrypted = mcrypt_generic($td, $data); |
|
| 22 | 22 | mcrypt_generic_deinit($td); |
| 23 | 23 | return $encrypted; |
| 24 | 24 | } |
| 25 | - public static function decode_AES_ECB($data,$secret_key){ |
|
| 26 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
| 27 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 28 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
| 29 | - $data = mdecrypt_generic($td,$data); |
|
| 25 | + public static function decode_AES_ECB($data, $secret_key) { |
|
| 26 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_ECB, ''); |
|
| 27 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 28 | + mcrypt_generic_init($td, $secret_key, $iv); |
|
| 29 | + $data = mdecrypt_generic($td, $data); |
|
| 30 | 30 | mcrypt_generic_deinit($td); |
| 31 | 31 | mcrypt_module_close($td); |
| 32 | 32 | |
@@ -36,155 +36,155 @@ discard block |
||
| 36 | 36 | |
| 37 | 37 | return trim($data); |
| 38 | 38 | } |
| 39 | - public static function getKeyEncryptionAlgm($encryptionMaterials){ |
|
| 40 | - if(is_array($encryptionMaterials)){ |
|
| 39 | + public static function getKeyEncryptionAlgm($encryptionMaterials) { |
|
| 40 | + if (is_array($encryptionMaterials)) { |
|
| 41 | 41 | return "RSA"; |
| 42 | - }else{ |
|
| 42 | + }else { |
|
| 43 | 43 | return "AES"; |
| 44 | 44 | } |
| 45 | 45 | } |
| 46 | - public static function getAdjustedRange($range,$blocksize){ |
|
| 46 | + public static function getAdjustedRange($range, $blocksize) { |
|
| 47 | 47 | $a = $range["start"]; |
| 48 | 48 | $b = $range["end"]; |
| 49 | - $a = $a - ($a%$blocksize)-$blocksize; |
|
| 50 | - if($a < 0) |
|
| 49 | + $a = $a-($a%$blocksize)-$blocksize; |
|
| 50 | + if ($a < 0) |
|
| 51 | 51 | $a = 0; |
| 52 | 52 | |
| 53 | 53 | $b = $b+$blocksize-$b%$blocksize+$blocksize; |
| 54 | 54 | |
| 55 | - return array("start"=>$a,"end"=>$b); |
|
| 55 | + return array("start"=>$a, "end"=>$b); |
|
| 56 | 56 | } |
| 57 | - public static function encodeCek($encryptionMaterials,$cek){ |
|
| 57 | + public static function encodeCek($encryptionMaterials, $cek) { |
|
| 58 | 58 | $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
| 59 | - if($encrypKeyAlg === "AES"){ |
|
| 59 | + if ($encrypKeyAlg === "AES") { |
|
| 60 | 60 | $secretKey = $encryptionMaterials; |
| 61 | - $encryptedSek = EncryptionUtil::encode_AES_ECB($cek,$secretKey); |
|
| 62 | - if(empty($encryptedSek)) |
|
| 61 | + $encryptedSek = EncryptionUtil::encode_AES_ECB($cek, $secretKey); |
|
| 62 | + if (empty($encryptedSek)) |
|
| 63 | 63 | throw new Ks3ClientException("can not encode cek useing AES"); |
| 64 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 64 | + }else if ($encrypKeyAlg === "RSA") { |
|
| 65 | 65 | $encryptedSek = ""; |
| 66 | - openssl_public_encrypt($cek,$encryptedSek, $encryptionMaterials[0]); |
|
| 67 | - if(empty($encryptedSek)) |
|
| 66 | + openssl_public_encrypt($cek, $encryptedSek, $encryptionMaterials[0]); |
|
| 67 | + if (empty($encryptedSek)) |
|
| 68 | 68 | throw new Ks3ClientException("can not encode cek useing RSA"); |
| 69 | 69 | } |
| 70 | 70 | return $encryptedSek; |
| 71 | 71 | } |
| 72 | - public static function decodeCek($encryptionMaterials,$cekEncrypted){ |
|
| 72 | + public static function decodeCek($encryptionMaterials, $cekEncrypted) { |
|
| 73 | 73 | $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
| 74 | - if($encrypKeyAlg === "AES"){ |
|
| 74 | + if ($encrypKeyAlg === "AES") { |
|
| 75 | 75 | $secretKey = $encryptionMaterials; |
| 76 | - $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted,$secretKey); |
|
| 77 | - if(empty($cek)) |
|
| 76 | + $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted, $secretKey); |
|
| 77 | + if (empty($cek)) |
|
| 78 | 78 | throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
| 79 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 79 | + }else if ($encrypKeyAlg === "RSA") { |
|
| 80 | 80 | $cek = ""; |
| 81 | - openssl_private_decrypt($cekEncrypted,$cek, $encryptionMaterials[1]); |
|
| 82 | - if(empty($cek)) |
|
| 81 | + openssl_private_decrypt($cekEncrypted, $cek, $encryptionMaterials[1]); |
|
| 82 | + if (empty($cek)) |
|
| 83 | 83 | throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
| 84 | 84 | } |
| 85 | 85 | return $cek; |
| 86 | 86 | } |
| 87 | - public static function getPKCS5EncrypedLength($length,$blocksize){ |
|
| 88 | - $pad = $blocksize - $length%$blocksize; |
|
| 87 | + public static function getPKCS5EncrypedLength($length, $blocksize) { |
|
| 88 | + $pad = $blocksize-$length%$blocksize; |
|
| 89 | 89 | return $length+$pad; |
| 90 | 90 | } |
| 91 | 91 | //pkcs5填充 |
| 92 | - public static function PKCS5Padding($data,$blocksize){ |
|
| 93 | - $pad = $blocksize - strlen($data)%$blocksize; |
|
| 94 | - for($i = 0;$i < $pad;$i++){ |
|
| 95 | - $data.= chr($pad); |
|
| 92 | + public static function PKCS5Padding($data, $blocksize) { |
|
| 93 | + $pad = $blocksize-strlen($data)%$blocksize; |
|
| 94 | + for ($i = 0; $i < $pad; $i++) { |
|
| 95 | + $data .= chr($pad); |
|
| 96 | 96 | } |
| 97 | 97 | return $data; |
| 98 | 98 | } |
| 99 | - public static function updateContentMD5Header($req){ |
|
| 100 | - if(!is_array($req)) |
|
| 99 | + public static function updateContentMD5Header($req) { |
|
| 100 | + if (!is_array($req)) |
|
| 101 | 101 | return $req; |
| 102 | - if(isset($req["ObjectMeta"])){ |
|
| 102 | + if (isset($req["ObjectMeta"])) { |
|
| 103 | 103 | $meta = $req["ObjectMeta"]; |
| 104 | - }else{ |
|
| 104 | + }else { |
|
| 105 | 105 | return $req; |
| 106 | 106 | } |
| 107 | - if(is_array($meta) && isset($meta["Content-MD5"])){ |
|
| 107 | + if (is_array($meta) && isset($meta["Content-MD5"])) { |
|
| 108 | 108 | $md5 = $meta["Content-MD5"]; |
| 109 | - }else{ |
|
| 109 | + }else { |
|
| 110 | 110 | return $req; |
| 111 | 111 | } |
| 112 | - if(empty($md5)){ |
|
| 112 | + if (empty($md5)) { |
|
| 113 | 113 | return $req; |
| 114 | - }else{ |
|
| 114 | + }else { |
|
| 115 | 115 | $req["ObjectMeta"]["Content-MD5"] = NULL; |
| 116 | 116 | $req["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-md5"] = $md5; |
| 117 | 117 | } |
| 118 | 118 | return $req; |
| 119 | 119 | } |
| 120 | - public static function metaTextLength($req){ |
|
| 121 | - if(!is_array($req)) |
|
| 120 | + public static function metaTextLength($req) { |
|
| 121 | + if (!is_array($req)) |
|
| 122 | 122 | return -1; |
| 123 | - if(isset($req["ObjectMeta"])){ |
|
| 123 | + if (isset($req["ObjectMeta"])) { |
|
| 124 | 124 | $meta = $req["ObjectMeta"]; |
| 125 | - }else{ |
|
| 125 | + }else { |
|
| 126 | 126 | return -1; |
| 127 | 127 | } |
| 128 | - if(is_array($meta) && isset($meta["Content-Length"])){ |
|
| 128 | + if (is_array($meta) && isset($meta["Content-Length"])) { |
|
| 129 | 129 | $length = $meta["Content-Length"]; |
| 130 | 130 | return $length; |
| 131 | 131 | }else |
| 132 | 132 | return -1; |
| 133 | 133 | } |
| 134 | - public static function plainTextLength($args){ |
|
| 135 | - if(isset($args["Content"])){ |
|
| 136 | - if(is_array($args["Content"])){ |
|
| 134 | + public static function plainTextLength($args) { |
|
| 135 | + if (isset($args["Content"])) { |
|
| 136 | + if (is_array($args["Content"])) { |
|
| 137 | 137 | $content = $args["Content"]["content"]; |
| 138 | 138 | $seek_position = 0; |
| 139 | 139 | $resourceLength = 0; |
| 140 | 140 | $length = -1; |
| 141 | 141 | $isFile = FALSE; |
| 142 | 142 | |
| 143 | - if (!is_resource($content)){ |
|
| 143 | + if (!is_resource($content)) { |
|
| 144 | 144 | $isFile = TRUE; |
| 145 | 145 | //如果之前用户已经转化为GBK则不转换 |
| 146 | - if(Utils::chk_chinese($content)&&!Utils::check_char($content)){ |
|
| 147 | - $content = iconv('utf-8','gbk',$content); |
|
| 146 | + if (Utils::chk_chinese($content) && !Utils::check_char($content)) { |
|
| 147 | + $content = iconv('utf-8', 'gbk', $content); |
|
| 148 | 148 | } |
| 149 | - if(!file_exists($content)) |
|
| 149 | + if (!file_exists($content)) |
|
| 150 | 150 | throw new Ks3ClientException("the specified file does not exist "); |
| 151 | 151 | $length = Utils::getFileSize($content); |
| 152 | - $content = fopen($content,"r"); |
|
| 153 | - }else{ |
|
| 152 | + $content = fopen($content, "r"); |
|
| 153 | + }else { |
|
| 154 | 154 | $stats = fstat($content); |
| 155 | - if ($stats && $stats["size"] >= 0){ |
|
| 155 | + if ($stats && $stats["size"] >= 0) { |
|
| 156 | 156 | $length = $stats["size"]; |
| 157 | 157 | } |
| 158 | 158 | } |
| 159 | 159 | $resourceLength = $length; |
| 160 | 160 | //优先取用户设置seek_position,没有的话取ftell |
| 161 | - if(isset($args["Content"]["seek_position"])&&$args["Content"]["seek_position"]>0){ |
|
| 161 | + if (isset($args["Content"]["seek_position"]) && $args["Content"]["seek_position"] > 0) { |
|
| 162 | 162 | $seek_position = $args["Content"]["seek_position"]; |
| 163 | - }else if(!$isFile){ |
|
| 163 | + }else if (!$isFile) { |
|
| 164 | 164 | $seek_position = ftell($content); |
| 165 | - if($seek_position<0) |
|
| 165 | + if ($seek_position < 0) |
|
| 166 | 166 | $seek_position = 0; |
| 167 | - fseek($content,0); |
|
| 167 | + fseek($content, 0); |
|
| 168 | 168 | } |
| 169 | 169 | |
| 170 | 170 | $lengthInMeta = -1; |
| 171 | - if(isset($args["ObjectMeta"]["Content-Length"])){ |
|
| 171 | + if (isset($args["ObjectMeta"]["Content-Length"])) { |
|
| 172 | 172 | $lengthInMeta = $args["ObjectMeta"]["Content-Length"]; |
| 173 | 173 | } |
| 174 | - if($lengthInMeta > 0){ |
|
| 174 | + if ($lengthInMeta > 0) { |
|
| 175 | 175 | $length = $lengthInMeta; |
| 176 | - }else if($resourceLength > 0){ |
|
| 176 | + }else if ($resourceLength > 0) { |
|
| 177 | 177 | //根据seek_position计算实际长度 |
| 178 | - $length = $resourceLength - $seek_position; |
|
| 178 | + $length = $resourceLength-$seek_position; |
|
| 179 | 179 | } |
| 180 | - if($length <= 0) |
|
| 180 | + if ($length <= 0) |
|
| 181 | 181 | throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
| 182 | 182 | return $length; |
| 183 | - }else{ |
|
| 183 | + }else { |
|
| 184 | 184 | $content = $args["Content"]; |
| 185 | 185 | $lengthInMeta = EncryptionUtil::metaTextLength($args); |
| 186 | 186 | $length = strlen($content); |
| 187 | - if($length<$lengthInMeta||$lengthInMeta <= 0) |
|
| 187 | + if ($length < $lengthInMeta || $lengthInMeta <= 0) |
|
| 188 | 188 | return $length; |
| 189 | 189 | else |
| 190 | 190 | return $lengthInMeta; |
@@ -192,14 +192,14 @@ discard block |
||
| 192 | 192 | } |
| 193 | 193 | return -1; |
| 194 | 194 | } |
| 195 | - public static function initMultipartUploadContext($initResult,$iv,$cek,$encryptedCek,$matdesc="{}"){ |
|
| 195 | + public static function initMultipartUploadContext($initResult, $iv, $cek, $encryptedCek, $matdesc = "{}") { |
|
| 196 | 196 | $cacheDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR; |
| 197 | 197 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 198 | - if(!is_dir($cacheDir)) |
|
| 198 | + if (!is_dir($cacheDir)) |
|
| 199 | 199 | mkdir($cacheDir); |
| 200 | - if(!is_dir($encryptionDir)) |
|
| 200 | + if (!is_dir($encryptionDir)) |
|
| 201 | 201 | mkdir($encryptionDir); |
| 202 | - if(is_array($matdesc)){ |
|
| 202 | + if (is_array($matdesc)) { |
|
| 203 | 203 | $matdesc = json_encode($matdesc); |
| 204 | 204 | } |
| 205 | 205 | $initResult["firstIv"] = base64_encode($iv); |
@@ -213,7 +213,7 @@ discard block |
||
| 213 | 213 | fwrite($file, $json); |
| 214 | 214 | fclose($file); |
| 215 | 215 | } |
| 216 | - public static function updateMultipartUploadContext($UploadId,$iv,$lastPart = FALSE){ |
|
| 216 | + public static function updateMultipartUploadContext($UploadId, $iv, $lastPart = FALSE) { |
|
| 217 | 217 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 218 | 218 | $content = EncryptionUtil::getMultipartUploadContext($UploadId); |
| 219 | 219 | $content["nextIv"] = base64_encode($iv); |
@@ -223,32 +223,32 @@ discard block |
||
| 223 | 223 | fwrite($file, $json); |
| 224 | 224 | fclose($file); |
| 225 | 225 | } |
| 226 | - public static function getMultipartUploadContext($UploadId){ |
|
| 226 | + public static function getMultipartUploadContext($UploadId) { |
|
| 227 | 227 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 228 | - if(!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
| 228 | + if (!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
| 229 | 229 | throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
| 230 | 230 | $jsonString = file_get_contents($encryptionDir.$UploadId); |
| 231 | - $arry = json_decode($jsonString,TRUE); |
|
| 231 | + $arry = json_decode($jsonString, TRUE); |
|
| 232 | 232 | return $arry; |
| 233 | 233 | } |
| 234 | - public static function deleteMultipartUploadContext($UploadId){ |
|
| 234 | + public static function deleteMultipartUploadContext($UploadId) { |
|
| 235 | 235 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 236 | 236 | @unlink($encryptionDir.$UploadId); |
| 237 | 237 | } |
| 238 | - public static function multipartUploadContextExists($UploadId){ |
|
| 238 | + public static function multipartUploadContextExists($UploadId) { |
|
| 239 | 239 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 240 | 240 | return file_exists($encryptionDir.$UploadId); |
| 241 | 241 | } |
| 242 | - public static function openfile($path,$mode){ |
|
| 242 | + public static function openfile($path, $mode) { |
|
| 243 | 243 | $file = fopen($path, $mode); |
| 244 | - if($file) |
|
| 244 | + if ($file) |
|
| 245 | 245 | return $file; |
| 246 | 246 | else |
| 247 | 247 | throw new Ks3ClientException("open file ".$path." error"); |
| 248 | 248 | } |
| 249 | 249 | //matdesc为字符串或array数据类型。 |
| 250 | - public static function createInstructionFile($bucket,$key,$cek,$iv,$matdesc="{}"){ |
|
| 251 | - if(is_array($matdesc)){ |
|
| 250 | + public static function createInstructionFile($bucket, $key, $cek, $iv, $matdesc = "{}") { |
|
| 251 | + if (is_array($matdesc)) { |
|
| 252 | 252 | $matdesc = json_encode($matdesc); |
| 253 | 253 | } |
| 254 | 254 | $key = $key.EncryptionUtil::$INSTRUCTION_SUFFIX; |
@@ -269,9 +269,9 @@ discard block |
||
| 269 | 269 | ); |
| 270 | 270 | return $req; |
| 271 | 271 | } |
| 272 | - public static function isInstructionFile($s3Object){ |
|
| 272 | + public static function isInstructionFile($s3Object) { |
|
| 273 | 273 | $meta = $s3Object["Meta"]; |
| 274 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
| 274 | + if (isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
| 275 | 275 | return TRUE; |
| 276 | 276 | return FALSE; |
| 277 | 277 | } |
@@ -39,7 +39,7 @@ discard block |
||
| 39 | 39 | public static function getKeyEncryptionAlgm($encryptionMaterials){ |
| 40 | 40 | if(is_array($encryptionMaterials)){ |
| 41 | 41 | return "RSA"; |
| 42 | - }else{ |
|
| 42 | + } else{ |
|
| 43 | 43 | return "AES"; |
| 44 | 44 | } |
| 45 | 45 | } |
@@ -47,8 +47,9 @@ discard block |
||
| 47 | 47 | $a = $range["start"]; |
| 48 | 48 | $b = $range["end"]; |
| 49 | 49 | $a = $a - ($a%$blocksize)-$blocksize; |
| 50 | - if($a < 0) |
|
| 51 | - $a = 0; |
|
| 50 | + if($a < 0) { |
|
| 51 | + $a = 0; |
|
| 52 | + } |
|
| 52 | 53 | |
| 53 | 54 | $b = $b+$blocksize-$b%$blocksize+$blocksize; |
| 54 | 55 | |
@@ -59,13 +60,15 @@ discard block |
||
| 59 | 60 | if($encrypKeyAlg === "AES"){ |
| 60 | 61 | $secretKey = $encryptionMaterials; |
| 61 | 62 | $encryptedSek = EncryptionUtil::encode_AES_ECB($cek,$secretKey); |
| 62 | - if(empty($encryptedSek)) |
|
| 63 | - throw new Ks3ClientException("can not encode cek useing AES"); |
|
| 64 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 63 | + if(empty($encryptedSek)) { |
|
| 64 | + throw new Ks3ClientException("can not encode cek useing AES"); |
|
| 65 | + } |
|
| 66 | + } else if($encrypKeyAlg === "RSA"){ |
|
| 65 | 67 | $encryptedSek = ""; |
| 66 | 68 | openssl_public_encrypt($cek,$encryptedSek, $encryptionMaterials[0]); |
| 67 | - if(empty($encryptedSek)) |
|
| 68 | - throw new Ks3ClientException("can not encode cek useing RSA"); |
|
| 69 | + if(empty($encryptedSek)) { |
|
| 70 | + throw new Ks3ClientException("can not encode cek useing RSA"); |
|
| 71 | + } |
|
| 69 | 72 | } |
| 70 | 73 | return $encryptedSek; |
| 71 | 74 | } |
@@ -74,13 +77,15 @@ discard block |
||
| 74 | 77 | if($encrypKeyAlg === "AES"){ |
| 75 | 78 | $secretKey = $encryptionMaterials; |
| 76 | 79 | $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted,$secretKey); |
| 77 | - if(empty($cek)) |
|
| 78 | - throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
|
| 79 | - }else if($encrypKeyAlg === "RSA"){ |
|
| 80 | + if(empty($cek)) { |
|
| 81 | + throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
|
| 82 | + } |
|
| 83 | + } else if($encrypKeyAlg === "RSA"){ |
|
| 80 | 84 | $cek = ""; |
| 81 | 85 | openssl_private_decrypt($cekEncrypted,$cek, $encryptionMaterials[1]); |
| 82 | - if(empty($cek)) |
|
| 83 | - throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
|
| 86 | + if(empty($cek)) { |
|
| 87 | + throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
|
| 88 | + } |
|
| 84 | 89 | } |
| 85 | 90 | return $cek; |
| 86 | 91 | } |
@@ -97,39 +102,42 @@ discard block |
||
| 97 | 102 | return $data; |
| 98 | 103 | } |
| 99 | 104 | public static function updateContentMD5Header($req){ |
| 100 | - if(!is_array($req)) |
|
| 101 | - return $req; |
|
| 105 | + if(!is_array($req)) { |
|
| 106 | + return $req; |
|
| 107 | + } |
|
| 102 | 108 | if(isset($req["ObjectMeta"])){ |
| 103 | 109 | $meta = $req["ObjectMeta"]; |
| 104 | - }else{ |
|
| 110 | + } else{ |
|
| 105 | 111 | return $req; |
| 106 | 112 | } |
| 107 | 113 | if(is_array($meta) && isset($meta["Content-MD5"])){ |
| 108 | 114 | $md5 = $meta["Content-MD5"]; |
| 109 | - }else{ |
|
| 115 | + } else{ |
|
| 110 | 116 | return $req; |
| 111 | 117 | } |
| 112 | 118 | if(empty($md5)){ |
| 113 | 119 | return $req; |
| 114 | - }else{ |
|
| 120 | + } else{ |
|
| 115 | 121 | $req["ObjectMeta"]["Content-MD5"] = NULL; |
| 116 | 122 | $req["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-md5"] = $md5; |
| 117 | 123 | } |
| 118 | 124 | return $req; |
| 119 | 125 | } |
| 120 | 126 | public static function metaTextLength($req){ |
| 121 | - if(!is_array($req)) |
|
| 122 | - return -1; |
|
| 127 | + if(!is_array($req)) { |
|
| 128 | + return -1; |
|
| 129 | + } |
|
| 123 | 130 | if(isset($req["ObjectMeta"])){ |
| 124 | 131 | $meta = $req["ObjectMeta"]; |
| 125 | - }else{ |
|
| 132 | + } else{ |
|
| 126 | 133 | return -1; |
| 127 | 134 | } |
| 128 | 135 | if(is_array($meta) && isset($meta["Content-Length"])){ |
| 129 | 136 | $length = $meta["Content-Length"]; |
| 130 | 137 | return $length; |
| 131 | - }else |
|
| 132 | - return -1; |
|
| 138 | + } else { |
|
| 139 | + return -1; |
|
| 140 | + } |
|
| 133 | 141 | } |
| 134 | 142 | public static function plainTextLength($args){ |
| 135 | 143 | if(isset($args["Content"])){ |
@@ -146,11 +154,12 @@ discard block |
||
| 146 | 154 | if(Utils::chk_chinese($content)&&!Utils::check_char($content)){ |
| 147 | 155 | $content = iconv('utf-8','gbk',$content); |
| 148 | 156 | } |
| 149 | - if(!file_exists($content)) |
|
| 150 | - throw new Ks3ClientException("the specified file does not exist "); |
|
| 157 | + if(!file_exists($content)) { |
|
| 158 | + throw new Ks3ClientException("the specified file does not exist "); |
|
| 159 | + } |
|
| 151 | 160 | $length = Utils::getFileSize($content); |
| 152 | 161 | $content = fopen($content,"r"); |
| 153 | - }else{ |
|
| 162 | + } else{ |
|
| 154 | 163 | $stats = fstat($content); |
| 155 | 164 | if ($stats && $stats["size"] >= 0){ |
| 156 | 165 | $length = $stats["size"]; |
@@ -160,10 +169,11 @@ discard block |
||
| 160 | 169 | //优先取用户设置seek_position,没有的话取ftell |
| 161 | 170 | if(isset($args["Content"]["seek_position"])&&$args["Content"]["seek_position"]>0){ |
| 162 | 171 | $seek_position = $args["Content"]["seek_position"]; |
| 163 | - }else if(!$isFile){ |
|
| 172 | + } else if(!$isFile){ |
|
| 164 | 173 | $seek_position = ftell($content); |
| 165 | - if($seek_position<0) |
|
| 166 | - $seek_position = 0; |
|
| 174 | + if($seek_position<0) { |
|
| 175 | + $seek_position = 0; |
|
| 176 | + } |
|
| 167 | 177 | fseek($content,0); |
| 168 | 178 | } |
| 169 | 179 | |
@@ -173,21 +183,23 @@ discard block |
||
| 173 | 183 | } |
| 174 | 184 | if($lengthInMeta > 0){ |
| 175 | 185 | $length = $lengthInMeta; |
| 176 | - }else if($resourceLength > 0){ |
|
| 186 | + } else if($resourceLength > 0){ |
|
| 177 | 187 | //根据seek_position计算实际长度 |
| 178 | 188 | $length = $resourceLength - $seek_position; |
| 179 | 189 | } |
| 180 | - if($length <= 0) |
|
| 181 | - throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
|
| 190 | + if($length <= 0) { |
|
| 191 | + throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
|
| 192 | + } |
|
| 182 | 193 | return $length; |
| 183 | - }else{ |
|
| 194 | + } else{ |
|
| 184 | 195 | $content = $args["Content"]; |
| 185 | 196 | $lengthInMeta = EncryptionUtil::metaTextLength($args); |
| 186 | 197 | $length = strlen($content); |
| 187 | - if($length<$lengthInMeta||$lengthInMeta <= 0) |
|
| 188 | - return $length; |
|
| 189 | - else |
|
| 190 | - return $lengthInMeta; |
|
| 198 | + if($length<$lengthInMeta||$lengthInMeta <= 0) { |
|
| 199 | + return $length; |
|
| 200 | + } else { |
|
| 201 | + return $lengthInMeta; |
|
| 202 | + } |
|
| 191 | 203 | } |
| 192 | 204 | } |
| 193 | 205 | return -1; |
@@ -195,10 +207,12 @@ discard block |
||
| 195 | 207 | public static function initMultipartUploadContext($initResult,$iv,$cek,$encryptedCek,$matdesc="{}"){ |
| 196 | 208 | $cacheDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR; |
| 197 | 209 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 198 | - if(!is_dir($cacheDir)) |
|
| 199 | - mkdir($cacheDir); |
|
| 200 | - if(!is_dir($encryptionDir)) |
|
| 201 | - mkdir($encryptionDir); |
|
| 210 | + if(!is_dir($cacheDir)) { |
|
| 211 | + mkdir($cacheDir); |
|
| 212 | + } |
|
| 213 | + if(!is_dir($encryptionDir)) { |
|
| 214 | + mkdir($encryptionDir); |
|
| 215 | + } |
|
| 202 | 216 | if(is_array($matdesc)){ |
| 203 | 217 | $matdesc = json_encode($matdesc); |
| 204 | 218 | } |
@@ -225,8 +239,9 @@ discard block |
||
| 225 | 239 | } |
| 226 | 240 | public static function getMultipartUploadContext($UploadId){ |
| 227 | 241 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
| 228 | - if(!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
| 229 | - throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
|
| 242 | + if(!EncryptionUtil::multipartUploadContextExists($UploadId)) { |
|
| 243 | + throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
|
| 244 | + } |
|
| 230 | 245 | $jsonString = file_get_contents($encryptionDir.$UploadId); |
| 231 | 246 | $arry = json_decode($jsonString,TRUE); |
| 232 | 247 | return $arry; |
@@ -241,10 +256,11 @@ discard block |
||
| 241 | 256 | } |
| 242 | 257 | public static function openfile($path,$mode){ |
| 243 | 258 | $file = fopen($path, $mode); |
| 244 | - if($file) |
|
| 245 | - return $file; |
|
| 246 | - else |
|
| 247 | - throw new Ks3ClientException("open file ".$path." error"); |
|
| 259 | + if($file) { |
|
| 260 | + return $file; |
|
| 261 | + } else { |
|
| 262 | + throw new Ks3ClientException("open file ".$path." error"); |
|
| 263 | + } |
|
| 248 | 264 | } |
| 249 | 265 | //matdesc为字符串或array数据类型。 |
| 250 | 266 | public static function createInstructionFile($bucket,$key,$cek,$iv,$matdesc="{}"){ |
@@ -271,8 +287,9 @@ discard block |
||
| 271 | 287 | } |
| 272 | 288 | public static function isInstructionFile($s3Object){ |
| 273 | 289 | $meta = $s3Object["Meta"]; |
| 274 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
| 275 | - return TRUE; |
|
| 290 | + if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) { |
|
| 291 | + return TRUE; |
|
| 292 | + } |
|
| 276 | 293 | return FALSE; |
| 277 | 294 | } |
| 278 | 295 | } |
@@ -3,356 +3,356 @@ |
||
| 3 | 3 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionCallBack.php"; |
| 4 | 4 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."exceptions".DIRECTORY_SEPARATOR."Exceptions.php"; |
| 5 | 5 | interface EncryptionHandler{ |
| 6 | - public function putObjectByContentSecurely($args=array()); |
|
| 7 | - public function putObjectByFileSecurely($args=array()); |
|
| 8 | - public function getObjectSecurely($args=array()); |
|
| 9 | - public function initMultipartUploadSecurely($args=array()); |
|
| 10 | - public function uploadPartSecurely($args=array()); |
|
| 11 | - public function abortMultipartUploadSecurely($args=array()); |
|
| 12 | - public function completeMultipartUploadSecurely($args=array()); |
|
| 6 | + public function putObjectByContentSecurely($args=array()); |
|
| 7 | + public function putObjectByFileSecurely($args=array()); |
|
| 8 | + public function getObjectSecurely($args=array()); |
|
| 9 | + public function initMultipartUploadSecurely($args=array()); |
|
| 10 | + public function uploadPartSecurely($args=array()); |
|
| 11 | + public function abortMultipartUploadSecurely($args=array()); |
|
| 12 | + public function completeMultipartUploadSecurely($args=array()); |
|
| 13 | 13 | } |
| 14 | 14 | class EncryptionEO implements EncryptionHandler{ |
| 15 | - private $encryptionMaterials = NULL; |
|
| 16 | - private $ks3client = NULL; |
|
| 17 | - public function __construct($ks3client,$encryptionMaterials){ |
|
| 18 | - $this->encryptionMaterials = $encryptionMaterials; |
|
| 19 | - $this->ks3client = $ks3client; |
|
| 20 | - } |
|
| 21 | - public function putObjectByContentSecurely($args=array()){ |
|
| 22 | - $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 23 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 24 | - $content = $args["Content"]; |
|
| 25 | - if(empty($content)) |
|
| 26 | - throw new Ks3ClientException("please specifie Content in request args"); |
|
| 27 | - $metaContentLength = EncryptionUtil::metaTextLength($args); |
|
| 28 | - $plainTextLength = strlen($content); |
|
| 29 | - if($metaContentLength > 0 && $metaContentLength < $plainTextLength){ |
|
| 30 | - $plainTextLength = $metaContentLength; |
|
| 31 | - } |
|
| 32 | - if($plainTextLength > 0) |
|
| 33 | - $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 34 | - else |
|
| 35 | - throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
|
| 15 | + private $encryptionMaterials = NULL; |
|
| 16 | + private $ks3client = NULL; |
|
| 17 | + public function __construct($ks3client,$encryptionMaterials){ |
|
| 18 | + $this->encryptionMaterials = $encryptionMaterials; |
|
| 19 | + $this->ks3client = $ks3client; |
|
| 20 | + } |
|
| 21 | + public function putObjectByContentSecurely($args=array()){ |
|
| 22 | + $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 23 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 24 | + $content = $args["Content"]; |
|
| 25 | + if(empty($content)) |
|
| 26 | + throw new Ks3ClientException("please specifie Content in request args"); |
|
| 27 | + $metaContentLength = EncryptionUtil::metaTextLength($args); |
|
| 28 | + $plainTextLength = strlen($content); |
|
| 29 | + if($metaContentLength > 0 && $metaContentLength < $plainTextLength){ |
|
| 30 | + $plainTextLength = $metaContentLength; |
|
| 31 | + } |
|
| 32 | + if($plainTextLength > 0) |
|
| 33 | + $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 34 | + else |
|
| 35 | + throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
|
| 36 | 36 | |
| 37 | - $content = substr($content, 0,$plainTextLength); |
|
| 37 | + $content = substr($content, 0,$plainTextLength); |
|
| 38 | 38 | |
| 39 | 39 | |
| 40 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 41 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 42 | - mcrypt_generic_init($td,$sek,$iv); |
|
| 43 | - //对content进行pkcs5填充 |
|
| 44 | - $content = EncryptionUtil::PKCS5Padding($content,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 45 | - $encrypted = mcrypt_generic($td,$content); |
|
| 46 | - mcrypt_generic_deinit($td); |
|
| 40 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 41 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 42 | + mcrypt_generic_init($td,$sek,$iv); |
|
| 43 | + //对content进行pkcs5填充 |
|
| 44 | + $content = EncryptionUtil::PKCS5Padding($content,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 45 | + $encrypted = mcrypt_generic($td,$content); |
|
| 46 | + mcrypt_generic_deinit($td); |
|
| 47 | 47 | |
| 48 | - $args["ObjectMeta"]["Content-Length"] = strlen($encrypted); |
|
| 49 | - $args["Content"] = $encrypted; |
|
| 48 | + $args["ObjectMeta"]["Content-Length"] = strlen($encrypted); |
|
| 49 | + $args["Content"] = $encrypted; |
|
| 50 | 50 | |
| 51 | - $args = EncryptionUtil::updateContentMD5Header($args); |
|
| 51 | + $args = EncryptionUtil::updateContentMD5Header($args); |
|
| 52 | 52 | |
| 53 | - //TODO |
|
| 54 | - $matdesc = "{}"; |
|
| 55 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 56 | - $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 57 | - $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 58 | - $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 59 | - } |
|
| 53 | + //TODO |
|
| 54 | + $matdesc = "{}"; |
|
| 55 | + if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 56 | + $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 57 | + $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 58 | + $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 59 | + } |
|
| 60 | 60 | |
| 61 | - $result = $this->ks3client->putObjectByContent($args); |
|
| 61 | + $result = $this->ks3client->putObjectByContent($args); |
|
| 62 | 62 | |
| 63 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 64 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 65 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 66 | - $this->ks3client->putObjectByContent($req); |
|
| 67 | - } |
|
| 63 | + if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 64 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 65 | + base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 66 | + $this->ks3client->putObjectByContent($req); |
|
| 67 | + } |
|
| 68 | 68 | |
| 69 | - return $result; |
|
| 70 | - } |
|
| 71 | - public function putObjectByFileSecurely($args=array()){ |
|
| 72 | - $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 73 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 74 | - if(!isset($args["Content"])||!is_array($args["Content"]) |
|
| 75 | - ||!isset($args["Content"]["content"]) |
|
| 76 | - ||empty($args["Content"]["content"])) |
|
| 77 | - throw new Ks3ClientException("please specifie file content in request args"); |
|
| 78 | - $content = $args["Content"]; |
|
| 79 | - $plainTextLength = EncryptionUtil::plainTextLength($args); |
|
| 80 | - if($plainTextLength <= 0){ |
|
| 81 | - throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
|
| 82 | - } |
|
| 83 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 84 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 69 | + return $result; |
|
| 70 | + } |
|
| 71 | + public function putObjectByFileSecurely($args=array()){ |
|
| 72 | + $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 73 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 74 | + if(!isset($args["Content"])||!is_array($args["Content"]) |
|
| 75 | + ||!isset($args["Content"]["content"]) |
|
| 76 | + ||empty($args["Content"]["content"])) |
|
| 77 | + throw new Ks3ClientException("please specifie file content in request args"); |
|
| 78 | + $content = $args["Content"]; |
|
| 79 | + $plainTextLength = EncryptionUtil::plainTextLength($args); |
|
| 80 | + if($plainTextLength <= 0){ |
|
| 81 | + throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
|
| 82 | + } |
|
| 83 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 84 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 85 | 85 | |
| 86 | - $args = EncryptionUtil::updateContentMD5Header($args); |
|
| 87 | - $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 86 | + $args = EncryptionUtil::updateContentMD5Header($args); |
|
| 87 | + $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 88 | 88 | |
| 89 | - $args["ObjectMeta"]["Content-Length"] = $encryptedLength; |
|
| 90 | - $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 89 | + $args["ObjectMeta"]["Content-Length"] = $encryptedLength; |
|
| 90 | + $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 91 | 91 | |
| 92 | - $readCallBack = new AESCBCStreamReadCallBack(); |
|
| 93 | - $readCallBack->iv = $iv; |
|
| 94 | - $readCallBack->cek = $sek; |
|
| 95 | - $readCallBack->contentLength = $plainTextLength; |
|
| 96 | - $args["readCallBack"] = $readCallBack; |
|
| 92 | + $readCallBack = new AESCBCStreamReadCallBack(); |
|
| 93 | + $readCallBack->iv = $iv; |
|
| 94 | + $readCallBack->cek = $sek; |
|
| 95 | + $readCallBack->contentLength = $plainTextLength; |
|
| 96 | + $args["readCallBack"] = $readCallBack; |
|
| 97 | 97 | |
| 98 | - //TODO |
|
| 99 | - $matdesc = "{}"; |
|
| 100 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 101 | - $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 102 | - $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 103 | - $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 104 | - } |
|
| 98 | + //TODO |
|
| 99 | + $matdesc = "{}"; |
|
| 100 | + if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 101 | + $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 102 | + $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 103 | + $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 104 | + } |
|
| 105 | 105 | |
| 106 | - $result = $this->ks3client->putObjectByFile($args); |
|
| 106 | + $result = $this->ks3client->putObjectByFile($args); |
|
| 107 | 107 | |
| 108 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 109 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 110 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 111 | - $this->ks3client->putObjectByContent($req); |
|
| 112 | - } |
|
| 108 | + if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 109 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 110 | + base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 111 | + $this->ks3client->putObjectByContent($req); |
|
| 112 | + } |
|
| 113 | 113 | |
| 114 | - return $result; |
|
| 115 | - } |
|
| 116 | - public function getObjectSecurely($args=array()){ |
|
| 117 | - $meta = $this->ks3client->getObjectMeta($args); |
|
| 118 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-key"])&&isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])){ |
|
| 119 | - $encryptedInMeta = TRUE; |
|
| 120 | - }else{ |
|
| 121 | - $encryptedInMeta = FALSE; |
|
| 122 | - } |
|
| 123 | - $encrypted = TRUE; |
|
| 124 | - $encryptionInfo = array(); |
|
| 125 | - if($encryptedInMeta){ |
|
| 126 | - $encryptionInfo["iv"] = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-iv"]); |
|
| 127 | - $matdesc =$meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
| 128 | - $encryptionInfo["matdesc"] = $matdesc; |
|
| 129 | - $cekEncrypted = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-key"]); |
|
| 130 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 131 | - }else{ |
|
| 132 | - if($this->ks3client->objectExists(array( |
|
| 133 | - "Bucket"=>$args["Bucket"], |
|
| 134 | - "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX) |
|
| 135 | - ) |
|
| 136 | - ){ |
|
| 137 | - $insKey = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 138 | - $getIns = array( |
|
| 139 | - "Bucket"=>$args["Bucket"], |
|
| 140 | - "Key"=>$insKey, |
|
| 141 | - ); |
|
| 142 | - $s3Object = $this->ks3client->getObject($getIns); |
|
| 143 | - if(!EncryptionUtil::isInstructionFile($s3Object)) |
|
| 144 | - throw new Ks3ClientException($insKey." is not an InstructionFile"); |
|
| 114 | + return $result; |
|
| 115 | + } |
|
| 116 | + public function getObjectSecurely($args=array()){ |
|
| 117 | + $meta = $this->ks3client->getObjectMeta($args); |
|
| 118 | + if(isset($meta["UserMeta"]["x-kss-meta-x-kss-key"])&&isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])){ |
|
| 119 | + $encryptedInMeta = TRUE; |
|
| 120 | + }else{ |
|
| 121 | + $encryptedInMeta = FALSE; |
|
| 122 | + } |
|
| 123 | + $encrypted = TRUE; |
|
| 124 | + $encryptionInfo = array(); |
|
| 125 | + if($encryptedInMeta){ |
|
| 126 | + $encryptionInfo["iv"] = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-iv"]); |
|
| 127 | + $matdesc =$meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
| 128 | + $encryptionInfo["matdesc"] = $matdesc; |
|
| 129 | + $cekEncrypted = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-key"]); |
|
| 130 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 131 | + }else{ |
|
| 132 | + if($this->ks3client->objectExists(array( |
|
| 133 | + "Bucket"=>$args["Bucket"], |
|
| 134 | + "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX) |
|
| 135 | + ) |
|
| 136 | + ){ |
|
| 137 | + $insKey = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
|
| 138 | + $getIns = array( |
|
| 139 | + "Bucket"=>$args["Bucket"], |
|
| 140 | + "Key"=>$insKey, |
|
| 141 | + ); |
|
| 142 | + $s3Object = $this->ks3client->getObject($getIns); |
|
| 143 | + if(!EncryptionUtil::isInstructionFile($s3Object)) |
|
| 144 | + throw new Ks3ClientException($insKey." is not an InstructionFile"); |
|
| 145 | 145 | |
| 146 | - $content = $s3Object["Content"]; |
|
| 147 | - $content = json_decode($content,TRUE); |
|
| 148 | - $encryptionInfo["iv"] = base64_decode($content["x-kss-iv"]); |
|
| 149 | - $matdesc =$content["x-kss-matdesc"]; |
|
| 150 | - $encryptionInfo["matdesc"] = $matdesc; |
|
| 151 | - $cekEncrypted = base64_decode($content["x-kss-key"]); |
|
| 152 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 153 | - }else{ |
|
| 154 | - $encrypted =FALSE; |
|
| 155 | - } |
|
| 156 | - } |
|
| 157 | - //是否为下载到文件中 |
|
| 158 | - $isWriteToFile=FALSE; |
|
| 159 | - if($encrypted) |
|
| 160 | - { |
|
| 161 | - $iv = $encryptionInfo["iv"]; |
|
| 162 | - $cek = $encryptionInfo["cek"]; |
|
| 146 | + $content = $s3Object["Content"]; |
|
| 147 | + $content = json_decode($content,TRUE); |
|
| 148 | + $encryptionInfo["iv"] = base64_decode($content["x-kss-iv"]); |
|
| 149 | + $matdesc =$content["x-kss-matdesc"]; |
|
| 150 | + $encryptionInfo["matdesc"] = $matdesc; |
|
| 151 | + $cekEncrypted = base64_decode($content["x-kss-key"]); |
|
| 152 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 153 | + }else{ |
|
| 154 | + $encrypted =FALSE; |
|
| 155 | + } |
|
| 156 | + } |
|
| 157 | + //是否为下载到文件中 |
|
| 158 | + $isWriteToFile=FALSE; |
|
| 159 | + if($encrypted) |
|
| 160 | + { |
|
| 161 | + $iv = $encryptionInfo["iv"]; |
|
| 162 | + $cek = $encryptionInfo["cek"]; |
|
| 163 | 163 | |
| 164 | - if(empty($iv)) |
|
| 165 | - throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
|
| 166 | - if(empty($cek)) |
|
| 167 | - throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
|
| 164 | + if(empty($iv)) |
|
| 165 | + throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
|
| 166 | + if(empty($cek)) |
|
| 167 | + throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
|
| 168 | 168 | |
| 169 | - if(isset($args["Range"])){ |
|
| 170 | - $range = $args["Range"]; |
|
| 171 | - if(!is_array($range)){ |
|
| 172 | - if(preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)){ |
|
| 173 | - $ranges = explode("-",substr($range,strlen("bytes="))); |
|
| 174 | - $a = $ranges[0]; |
|
| 175 | - $b = $ranges[1]; |
|
| 176 | - if($a > $b){ |
|
| 177 | - throw new Ks3ClientException("Invalid range ".$range); |
|
| 178 | - } |
|
| 179 | - $range = array("start"=>$a,"end"=>$b); |
|
| 180 | - }else{ |
|
| 181 | - throw new Ks3ClientException("Invalid range ".$range); |
|
| 182 | - } |
|
| 183 | - }else{ |
|
| 184 | - if(!isset($range["start"])||!isset($range["end"])){ |
|
| 185 | - throw new Ks3ClientException("Invalid range ".serialize($range)); |
|
| 186 | - } |
|
| 187 | - if($range["start"] > $range["end"]){ |
|
| 188 | - throw new Ks3ClientException("Invalid range ".serialize($range)); |
|
| 189 | - } |
|
| 190 | - } |
|
| 191 | - } |
|
| 169 | + if(isset($args["Range"])){ |
|
| 170 | + $range = $args["Range"]; |
|
| 171 | + if(!is_array($range)){ |
|
| 172 | + if(preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)){ |
|
| 173 | + $ranges = explode("-",substr($range,strlen("bytes="))); |
|
| 174 | + $a = $ranges[0]; |
|
| 175 | + $b = $ranges[1]; |
|
| 176 | + if($a > $b){ |
|
| 177 | + throw new Ks3ClientException("Invalid range ".$range); |
|
| 178 | + } |
|
| 179 | + $range = array("start"=>$a,"end"=>$b); |
|
| 180 | + }else{ |
|
| 181 | + throw new Ks3ClientException("Invalid range ".$range); |
|
| 182 | + } |
|
| 183 | + }else{ |
|
| 184 | + if(!isset($range["start"])||!isset($range["end"])){ |
|
| 185 | + throw new Ks3ClientException("Invalid range ".serialize($range)); |
|
| 186 | + } |
|
| 187 | + if($range["start"] > $range["end"]){ |
|
| 188 | + throw new Ks3ClientException("Invalid range ".serialize($range)); |
|
| 189 | + } |
|
| 190 | + } |
|
| 191 | + } |
|
| 192 | 192 | |
| 193 | - $isWriteToFile = isset($args["WriteTo"]); |
|
| 194 | - $contentLength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 195 | - if($isWriteToFile){ |
|
| 196 | - $writeCallBack = new AESCBCStreamWriteCallBack(); |
|
| 197 | - $writeCallBack->iv=$iv; |
|
| 198 | - $writeCallBack->cek=$cek; |
|
| 199 | - $writeCallBack->contentLength = $contentLength; |
|
| 200 | - if(isset($range)){ |
|
| 201 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 202 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 203 | - $writeCallBack->expectedRange = $range; |
|
| 204 | - $writeCallBack->adjustedRange = $adjustedRange; |
|
| 205 | - $args["Range"]=$adjustedRange; |
|
| 206 | - } |
|
| 207 | - $args["writeCallBack"] = $writeCallBack; |
|
| 208 | - return $this->ks3client->getObject($args); |
|
| 209 | - }else{ |
|
| 210 | - $offset = 0; |
|
| 211 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 212 | - if(isset($range)){ |
|
| 213 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 214 | - $args["Range"]=$adjustedRange; |
|
| 215 | - } |
|
| 216 | - $s3Object = $this->ks3client->getObject($args); |
|
| 217 | - $content = $s3Object["Content"]; |
|
| 193 | + $isWriteToFile = isset($args["WriteTo"]); |
|
| 194 | + $contentLength = $meta["ObjectMeta"]["Content-Length"]; |
|
| 195 | + if($isWriteToFile){ |
|
| 196 | + $writeCallBack = new AESCBCStreamWriteCallBack(); |
|
| 197 | + $writeCallBack->iv=$iv; |
|
| 198 | + $writeCallBack->cek=$cek; |
|
| 199 | + $writeCallBack->contentLength = $contentLength; |
|
| 200 | + if(isset($range)){ |
|
| 201 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 202 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 203 | + $writeCallBack->expectedRange = $range; |
|
| 204 | + $writeCallBack->adjustedRange = $adjustedRange; |
|
| 205 | + $args["Range"]=$adjustedRange; |
|
| 206 | + } |
|
| 207 | + $args["writeCallBack"] = $writeCallBack; |
|
| 208 | + return $this->ks3client->getObject($args); |
|
| 209 | + }else{ |
|
| 210 | + $offset = 0; |
|
| 211 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 212 | + if(isset($range)){ |
|
| 213 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 214 | + $args["Range"]=$adjustedRange; |
|
| 215 | + } |
|
| 216 | + $s3Object = $this->ks3client->getObject($args); |
|
| 217 | + $content = $s3Object["Content"]; |
|
| 218 | 218 | |
| 219 | - if(isset($range)){ |
|
| 220 | - if($adjustedRange["start"] > 0){ |
|
| 221 | - $iv = substr($content,0,$blocksize); |
|
| 222 | - $content = substr($content,$blocksize); |
|
| 223 | - $offset = $blocksize+$adjustedRange["start"]; |
|
| 224 | - } |
|
| 225 | - } |
|
| 226 | - if(!empty($content)){ |
|
| 227 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 228 | - mcrypt_generic_init($td,$cek,$iv); |
|
| 229 | - $decoded = mdecrypt_generic($td,$content); |
|
| 230 | - mcrypt_generic_deinit($td); |
|
| 231 | - mcrypt_module_close($td); |
|
| 232 | - }else{ |
|
| 233 | - $decoded = ""; |
|
| 234 | - } |
|
| 219 | + if(isset($range)){ |
|
| 220 | + if($adjustedRange["start"] > 0){ |
|
| 221 | + $iv = substr($content,0,$blocksize); |
|
| 222 | + $content = substr($content,$blocksize); |
|
| 223 | + $offset = $blocksize+$adjustedRange["start"]; |
|
| 224 | + } |
|
| 225 | + } |
|
| 226 | + if(!empty($content)){ |
|
| 227 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 228 | + mcrypt_generic_init($td,$cek,$iv); |
|
| 229 | + $decoded = mdecrypt_generic($td,$content); |
|
| 230 | + mcrypt_generic_deinit($td); |
|
| 231 | + mcrypt_module_close($td); |
|
| 232 | + }else{ |
|
| 233 | + $decoded = ""; |
|
| 234 | + } |
|
| 235 | 235 | |
| 236 | - //判断是否需要删除最后填充的字符,以及获取填充的字符 |
|
| 237 | - $needRemovePad = FALSE; |
|
| 238 | - $pad = NULL; |
|
| 239 | - if($offset+strlen($decoded) >=$contentLength){ |
|
| 240 | - $needRemovePad = TRUE; |
|
| 241 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 242 | - if($pad<=0||$pad>$blocksize) |
|
| 243 | - { |
|
| 244 | - //invalid pad |
|
| 245 | - $needRemovePad = FALSE; |
|
| 246 | - } |
|
| 247 | - } |
|
| 248 | - $endOffset = 0; |
|
| 249 | - if(isset($range)){ |
|
| 250 | - if($offset+strlen($decoded)>$range["end"]){ |
|
| 251 | - $preLength = strlen($decoded); |
|
| 252 | - $decoded = substr($decoded, 0,$range["end"]-$offset+1); |
|
| 253 | - $endOffset = $preLength-strlen($decoded); |
|
| 254 | - } |
|
| 255 | - if($offset<$range["start"]){ |
|
| 256 | - $decoded = substr($decoded,$range["start"] - $offset); |
|
| 257 | - } |
|
| 258 | - } |
|
| 259 | - //再次根据截取的长度判断是否需要删除最后填充的字符 |
|
| 260 | - if($needRemovePad&&$endOffset > $pad){ |
|
| 261 | - $needRemovePad = FALSE; |
|
| 262 | - } |
|
| 263 | - if($needRemovePad){ |
|
| 264 | - $padOffset = $pad-$endOffset; |
|
| 265 | - $actualWriteCount = strlen($decoded)-$padOffset; |
|
| 266 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 267 | - $decoded = ""; |
|
| 268 | - else |
|
| 269 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 270 | - } |
|
| 271 | - $s3Object["Content"] = $decoded; |
|
| 272 | - return $s3Object; |
|
| 273 | - } |
|
| 274 | - }else{ |
|
| 275 | - return $this->ks3client->getObject($args); |
|
| 276 | - } |
|
| 277 | - } |
|
| 278 | - public function initMultipartUploadSecurely($args=array()){ |
|
| 279 | - $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 280 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 281 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 282 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 236 | + //判断是否需要删除最后填充的字符,以及获取填充的字符 |
|
| 237 | + $needRemovePad = FALSE; |
|
| 238 | + $pad = NULL; |
|
| 239 | + if($offset+strlen($decoded) >=$contentLength){ |
|
| 240 | + $needRemovePad = TRUE; |
|
| 241 | + $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 242 | + if($pad<=0||$pad>$blocksize) |
|
| 243 | + { |
|
| 244 | + //invalid pad |
|
| 245 | + $needRemovePad = FALSE; |
|
| 246 | + } |
|
| 247 | + } |
|
| 248 | + $endOffset = 0; |
|
| 249 | + if(isset($range)){ |
|
| 250 | + if($offset+strlen($decoded)>$range["end"]){ |
|
| 251 | + $preLength = strlen($decoded); |
|
| 252 | + $decoded = substr($decoded, 0,$range["end"]-$offset+1); |
|
| 253 | + $endOffset = $preLength-strlen($decoded); |
|
| 254 | + } |
|
| 255 | + if($offset<$range["start"]){ |
|
| 256 | + $decoded = substr($decoded,$range["start"] - $offset); |
|
| 257 | + } |
|
| 258 | + } |
|
| 259 | + //再次根据截取的长度判断是否需要删除最后填充的字符 |
|
| 260 | + if($needRemovePad&&$endOffset > $pad){ |
|
| 261 | + $needRemovePad = FALSE; |
|
| 262 | + } |
|
| 263 | + if($needRemovePad){ |
|
| 264 | + $padOffset = $pad-$endOffset; |
|
| 265 | + $actualWriteCount = strlen($decoded)-$padOffset; |
|
| 266 | + if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 267 | + $decoded = ""; |
|
| 268 | + else |
|
| 269 | + $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 270 | + } |
|
| 271 | + $s3Object["Content"] = $decoded; |
|
| 272 | + return $s3Object; |
|
| 273 | + } |
|
| 274 | + }else{ |
|
| 275 | + return $this->ks3client->getObject($args); |
|
| 276 | + } |
|
| 277 | + } |
|
| 278 | + public function initMultipartUploadSecurely($args=array()){ |
|
| 279 | + $sek = EncryptionUtil::genereateOnceUsedKey(); |
|
| 280 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 281 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 282 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 283 | 283 | |
| 284 | - $matdesc = "{}"; |
|
| 285 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 286 | - $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 287 | - $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 288 | - $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 289 | - } |
|
| 284 | + $matdesc = "{}"; |
|
| 285 | + if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 286 | + $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
|
| 287 | + $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
|
| 288 | + $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
|
| 289 | + } |
|
| 290 | 290 | |
| 291 | - $initResult = $this->ks3client->initMultipartUpload($args); |
|
| 291 | + $initResult = $this->ks3client->initMultipartUpload($args); |
|
| 292 | 292 | |
| 293 | - EncryptionUtil::initMultipartUploadContext($initResult,$iv,$sek,$encryptedSek,$matdesc); |
|
| 293 | + EncryptionUtil::initMultipartUploadContext($initResult,$iv,$sek,$encryptedSek,$matdesc); |
|
| 294 | 294 | |
| 295 | - return $initResult; |
|
| 296 | - } |
|
| 297 | - public function uploadPartSecurely($args=array()){ |
|
| 298 | - $uploadId = $args["Options"]["uploadId"]; |
|
| 299 | - $isLastPart = FALSE; |
|
| 300 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 301 | - if(isset($args["LastPart"])) |
|
| 302 | - $isLastPart = $args["LastPart"]; |
|
| 303 | - $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
|
| 304 | - if(!$exists){ |
|
| 305 | - throw new Ks3ClientException("no such upload in cache/encryption/"); |
|
| 306 | - } |
|
| 307 | - $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
|
| 308 | - if($context["lastPart"]){ |
|
| 309 | - throw new Ks3ClientException("this upload with uploadId ".$uploadId," has been upload last part"); |
|
| 310 | - } |
|
| 311 | - $plainTextLength = EncryptionUtil::plainTextLength($args); |
|
| 312 | - if($plainTextLength <= 0){ |
|
| 313 | - throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
|
| 314 | - } |
|
| 315 | - if(!$isLastPart){ |
|
| 316 | - if($plainTextLength % $blocksize != 0) |
|
| 317 | - throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
|
| 318 | - }else{ |
|
| 319 | - $args["ObjectMeta"]["Content-Length"] = $plainTextLength + ($blocksize - $plainTextLength%$blocksize); |
|
| 320 | - } |
|
| 321 | - $readCallBack = new AESCBCStreamReadCallBack(); |
|
| 322 | - $readCallBack->iv = base64_decode($context["nextIv"]); |
|
| 323 | - $readCallBack->cek = base64_decode($context["cek"]); |
|
| 324 | - $readCallBack->contentLength = $plainTextLength; |
|
| 325 | - $readCallBack->mutipartUpload = TRUE; |
|
| 326 | - $readCallBack->isLastPart = $isLastPart; |
|
| 327 | - $args["readCallBack"] = $readCallBack; |
|
| 295 | + return $initResult; |
|
| 296 | + } |
|
| 297 | + public function uploadPartSecurely($args=array()){ |
|
| 298 | + $uploadId = $args["Options"]["uploadId"]; |
|
| 299 | + $isLastPart = FALSE; |
|
| 300 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 301 | + if(isset($args["LastPart"])) |
|
| 302 | + $isLastPart = $args["LastPart"]; |
|
| 303 | + $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
|
| 304 | + if(!$exists){ |
|
| 305 | + throw new Ks3ClientException("no such upload in cache/encryption/"); |
|
| 306 | + } |
|
| 307 | + $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
|
| 308 | + if($context["lastPart"]){ |
|
| 309 | + throw new Ks3ClientException("this upload with uploadId ".$uploadId," has been upload last part"); |
|
| 310 | + } |
|
| 311 | + $plainTextLength = EncryptionUtil::plainTextLength($args); |
|
| 312 | + if($plainTextLength <= 0){ |
|
| 313 | + throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
|
| 314 | + } |
|
| 315 | + if(!$isLastPart){ |
|
| 316 | + if($plainTextLength % $blocksize != 0) |
|
| 317 | + throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
|
| 318 | + }else{ |
|
| 319 | + $args["ObjectMeta"]["Content-Length"] = $plainTextLength + ($blocksize - $plainTextLength%$blocksize); |
|
| 320 | + } |
|
| 321 | + $readCallBack = new AESCBCStreamReadCallBack(); |
|
| 322 | + $readCallBack->iv = base64_decode($context["nextIv"]); |
|
| 323 | + $readCallBack->cek = base64_decode($context["cek"]); |
|
| 324 | + $readCallBack->contentLength = $plainTextLength; |
|
| 325 | + $readCallBack->mutipartUpload = TRUE; |
|
| 326 | + $readCallBack->isLastPart = $isLastPart; |
|
| 327 | + $args["readCallBack"] = $readCallBack; |
|
| 328 | 328 | |
| 329 | - $upResult = $this->ks3client->uploadPart($args); |
|
| 330 | - EncryptionUtil::updateMultipartUploadContext($uploadId,$readCallBack->iv,$isLastPart); |
|
| 331 | - return $upResult; |
|
| 332 | - } |
|
| 333 | - public function abortMultipartUploadSecurely($args=array()){ |
|
| 334 | - $uploadId = $args["Options"]["uploadId"]; |
|
| 335 | - EncryptionUtil::deleteMultipartUploadContext($uploadId); |
|
| 336 | - return $this->ks3client->abortMultipartUpload($args); |
|
| 337 | - } |
|
| 338 | - public function completeMultipartUploadSecurely($args=array()){ |
|
| 339 | - $uploadId = $args["Options"]["uploadId"]; |
|
| 340 | - $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
|
| 341 | - if(!$exists){ |
|
| 342 | - throw new Ks3ClientException("no such upload in cache/encryption/"); |
|
| 343 | - } |
|
| 344 | - $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
|
| 345 | - if(!$context["lastPart"]){ |
|
| 346 | - throw new Ks3ClientException("Unable to complete an encrypted multipart upload without being told which part was the last. when upload part you can add item in args like args[\"LastPart\"]=TRUE"); |
|
| 347 | - } |
|
| 348 | - $result = $this->ks3client->completeMultipartUpload($args); |
|
| 349 | - if(ENCRYPTPTION_STORAGE_MODE=="InstructionFile"){ |
|
| 350 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 351 | - $context["encryptedCek"],$context["firstIv"],$context["matdesc"]); |
|
| 352 | - $this->ks3client->putObjectByContent($req); |
|
| 353 | - } |
|
| 354 | - EncryptionUtil::deleteMultipartUploadContext($uploadId); |
|
| 355 | - return $result; |
|
| 356 | - } |
|
| 329 | + $upResult = $this->ks3client->uploadPart($args); |
|
| 330 | + EncryptionUtil::updateMultipartUploadContext($uploadId,$readCallBack->iv,$isLastPart); |
|
| 331 | + return $upResult; |
|
| 332 | + } |
|
| 333 | + public function abortMultipartUploadSecurely($args=array()){ |
|
| 334 | + $uploadId = $args["Options"]["uploadId"]; |
|
| 335 | + EncryptionUtil::deleteMultipartUploadContext($uploadId); |
|
| 336 | + return $this->ks3client->abortMultipartUpload($args); |
|
| 337 | + } |
|
| 338 | + public function completeMultipartUploadSecurely($args=array()){ |
|
| 339 | + $uploadId = $args["Options"]["uploadId"]; |
|
| 340 | + $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
|
| 341 | + if(!$exists){ |
|
| 342 | + throw new Ks3ClientException("no such upload in cache/encryption/"); |
|
| 343 | + } |
|
| 344 | + $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
|
| 345 | + if(!$context["lastPart"]){ |
|
| 346 | + throw new Ks3ClientException("Unable to complete an encrypted multipart upload without being told which part was the last. when upload part you can add item in args like args[\"LastPart\"]=TRUE"); |
|
| 347 | + } |
|
| 348 | + $result = $this->ks3client->completeMultipartUpload($args); |
|
| 349 | + if(ENCRYPTPTION_STORAGE_MODE=="InstructionFile"){ |
|
| 350 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 351 | + $context["encryptedCek"],$context["firstIv"],$context["matdesc"]); |
|
| 352 | + $this->ks3client->putObjectByContent($req); |
|
| 353 | + } |
|
| 354 | + EncryptionUtil::deleteMultipartUploadContext($uploadId); |
|
| 355 | + return $result; |
|
| 356 | + } |
|
| 357 | 357 | } |
| 358 | 358 | ?> |
| 359 | 359 | \ No newline at end of file |
@@ -2,47 +2,47 @@ discard block |
||
| 2 | 2 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
| 3 | 3 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionCallBack.php"; |
| 4 | 4 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."exceptions".DIRECTORY_SEPARATOR."Exceptions.php"; |
| 5 | -interface EncryptionHandler{ |
|
| 6 | - public function putObjectByContentSecurely($args=array()); |
|
| 7 | - public function putObjectByFileSecurely($args=array()); |
|
| 8 | - public function getObjectSecurely($args=array()); |
|
| 9 | - public function initMultipartUploadSecurely($args=array()); |
|
| 10 | - public function uploadPartSecurely($args=array()); |
|
| 11 | - public function abortMultipartUploadSecurely($args=array()); |
|
| 12 | - public function completeMultipartUploadSecurely($args=array()); |
|
| 5 | +interface EncryptionHandler { |
|
| 6 | + public function putObjectByContentSecurely($args = array()); |
|
| 7 | + public function putObjectByFileSecurely($args = array()); |
|
| 8 | + public function getObjectSecurely($args = array()); |
|
| 9 | + public function initMultipartUploadSecurely($args = array()); |
|
| 10 | + public function uploadPartSecurely($args = array()); |
|
| 11 | + public function abortMultipartUploadSecurely($args = array()); |
|
| 12 | + public function completeMultipartUploadSecurely($args = array()); |
|
| 13 | 13 | } |
| 14 | -class EncryptionEO implements EncryptionHandler{ |
|
| 14 | +class EncryptionEO implements EncryptionHandler { |
|
| 15 | 15 | private $encryptionMaterials = NULL; |
| 16 | 16 | private $ks3client = NULL; |
| 17 | - public function __construct($ks3client,$encryptionMaterials){ |
|
| 17 | + public function __construct($ks3client, $encryptionMaterials) { |
|
| 18 | 18 | $this->encryptionMaterials = $encryptionMaterials; |
| 19 | 19 | $this->ks3client = $ks3client; |
| 20 | 20 | } |
| 21 | - public function putObjectByContentSecurely($args=array()){ |
|
| 21 | + public function putObjectByContentSecurely($args = array()) { |
|
| 22 | 22 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
| 23 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 23 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
| 24 | 24 | $content = $args["Content"]; |
| 25 | - if(empty($content)) |
|
| 25 | + if (empty($content)) |
|
| 26 | 26 | throw new Ks3ClientException("please specifie Content in request args"); |
| 27 | 27 | $metaContentLength = EncryptionUtil::metaTextLength($args); |
| 28 | 28 | $plainTextLength = strlen($content); |
| 29 | - if($metaContentLength > 0 && $metaContentLength < $plainTextLength){ |
|
| 29 | + if ($metaContentLength > 0 && $metaContentLength < $plainTextLength) { |
|
| 30 | 30 | $plainTextLength = $metaContentLength; |
| 31 | 31 | } |
| 32 | - if($plainTextLength > 0) |
|
| 32 | + if ($plainTextLength > 0) |
|
| 33 | 33 | $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
| 34 | 34 | else |
| 35 | 35 | throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
| 36 | 36 | |
| 37 | - $content = substr($content, 0,$plainTextLength); |
|
| 37 | + $content = substr($content, 0, $plainTextLength); |
|
| 38 | 38 | |
| 39 | 39 | |
| 40 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 41 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 42 | - mcrypt_generic_init($td,$sek,$iv); |
|
| 40 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 41 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 42 | + mcrypt_generic_init($td, $sek, $iv); |
|
| 43 | 43 | //对content进行pkcs5填充 |
| 44 | - $content = EncryptionUtil::PKCS5Padding($content,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 45 | - $encrypted = mcrypt_generic($td,$content); |
|
| 44 | + $content = EncryptionUtil::PKCS5Padding($content, mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC)); |
|
| 45 | + $encrypted = mcrypt_generic($td, $content); |
|
| 46 | 46 | mcrypt_generic_deinit($td); |
| 47 | 47 | |
| 48 | 48 | $args["ObjectMeta"]["Content-Length"] = strlen($encrypted); |
@@ -52,7 +52,7 @@ discard block |
||
| 52 | 52 | |
| 53 | 53 | //TODO |
| 54 | 54 | $matdesc = "{}"; |
| 55 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 55 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
| 56 | 56 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
| 57 | 57 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
| 58 | 58 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -60,31 +60,31 @@ discard block |
||
| 60 | 60 | |
| 61 | 61 | $result = $this->ks3client->putObjectByContent($args); |
| 62 | 62 | |
| 63 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 64 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 65 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 63 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
| 64 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
| 65 | + base64_encode($encryptedSek), base64_encode($iv), $matdesc); |
|
| 66 | 66 | $this->ks3client->putObjectByContent($req); |
| 67 | 67 | } |
| 68 | 68 | |
| 69 | 69 | return $result; |
| 70 | 70 | } |
| 71 | - public function putObjectByFileSecurely($args=array()){ |
|
| 71 | + public function putObjectByFileSecurely($args = array()) { |
|
| 72 | 72 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
| 73 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 74 | - if(!isset($args["Content"])||!is_array($args["Content"]) |
|
| 73 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
| 74 | + if (!isset($args["Content"]) || !is_array($args["Content"]) |
|
| 75 | 75 | ||!isset($args["Content"]["content"]) |
| 76 | 76 | ||empty($args["Content"]["content"])) |
| 77 | 77 | throw new Ks3ClientException("please specifie file content in request args"); |
| 78 | 78 | $content = $args["Content"]; |
| 79 | 79 | $plainTextLength = EncryptionUtil::plainTextLength($args); |
| 80 | - if($plainTextLength <= 0){ |
|
| 80 | + if ($plainTextLength <= 0) { |
|
| 81 | 81 | throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
| 82 | 82 | } |
| 83 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 84 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 83 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 84 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 85 | 85 | |
| 86 | 86 | $args = EncryptionUtil::updateContentMD5Header($args); |
| 87 | - $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
| 87 | + $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength, mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC)); |
|
| 88 | 88 | |
| 89 | 89 | $args["ObjectMeta"]["Content-Length"] = $encryptedLength; |
| 90 | 90 | $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
@@ -97,7 +97,7 @@ discard block |
||
| 97 | 97 | |
| 98 | 98 | //TODO |
| 99 | 99 | $matdesc = "{}"; |
| 100 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 100 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
| 101 | 101 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
| 102 | 102 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
| 103 | 103 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -105,86 +105,86 @@ discard block |
||
| 105 | 105 | |
| 106 | 106 | $result = $this->ks3client->putObjectByFile($args); |
| 107 | 107 | |
| 108 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
| 109 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 110 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
| 108 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
| 109 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
| 110 | + base64_encode($encryptedSek), base64_encode($iv), $matdesc); |
|
| 111 | 111 | $this->ks3client->putObjectByContent($req); |
| 112 | 112 | } |
| 113 | 113 | |
| 114 | 114 | return $result; |
| 115 | 115 | } |
| 116 | - public function getObjectSecurely($args=array()){ |
|
| 116 | + public function getObjectSecurely($args = array()) { |
|
| 117 | 117 | $meta = $this->ks3client->getObjectMeta($args); |
| 118 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-key"])&&isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])){ |
|
| 118 | + if (isset($meta["UserMeta"]["x-kss-meta-x-kss-key"]) && isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])) { |
|
| 119 | 119 | $encryptedInMeta = TRUE; |
| 120 | - }else{ |
|
| 120 | + }else { |
|
| 121 | 121 | $encryptedInMeta = FALSE; |
| 122 | 122 | } |
| 123 | 123 | $encrypted = TRUE; |
| 124 | 124 | $encryptionInfo = array(); |
| 125 | - if($encryptedInMeta){ |
|
| 125 | + if ($encryptedInMeta) { |
|
| 126 | 126 | $encryptionInfo["iv"] = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-iv"]); |
| 127 | - $matdesc =$meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
| 127 | + $matdesc = $meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
| 128 | 128 | $encryptionInfo["matdesc"] = $matdesc; |
| 129 | 129 | $cekEncrypted = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-key"]); |
| 130 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 131 | - }else{ |
|
| 132 | - if($this->ks3client->objectExists(array( |
|
| 130 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials, $cekEncrypted); |
|
| 131 | + }else { |
|
| 132 | + if ($this->ks3client->objectExists(array( |
|
| 133 | 133 | "Bucket"=>$args["Bucket"], |
| 134 | 134 | "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX) |
| 135 | 135 | ) |
| 136 | - ){ |
|
| 136 | + ) { |
|
| 137 | 137 | $insKey = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
| 138 | 138 | $getIns = array( |
| 139 | 139 | "Bucket"=>$args["Bucket"], |
| 140 | 140 | "Key"=>$insKey, |
| 141 | 141 | ); |
| 142 | 142 | $s3Object = $this->ks3client->getObject($getIns); |
| 143 | - if(!EncryptionUtil::isInstructionFile($s3Object)) |
|
| 143 | + if (!EncryptionUtil::isInstructionFile($s3Object)) |
|
| 144 | 144 | throw new Ks3ClientException($insKey." is not an InstructionFile"); |
| 145 | 145 | |
| 146 | 146 | $content = $s3Object["Content"]; |
| 147 | - $content = json_decode($content,TRUE); |
|
| 147 | + $content = json_decode($content, TRUE); |
|
| 148 | 148 | $encryptionInfo["iv"] = base64_decode($content["x-kss-iv"]); |
| 149 | - $matdesc =$content["x-kss-matdesc"]; |
|
| 149 | + $matdesc = $content["x-kss-matdesc"]; |
|
| 150 | 150 | $encryptionInfo["matdesc"] = $matdesc; |
| 151 | 151 | $cekEncrypted = base64_decode($content["x-kss-key"]); |
| 152 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
| 153 | - }else{ |
|
| 154 | - $encrypted =FALSE; |
|
| 152 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials, $cekEncrypted); |
|
| 153 | + }else { |
|
| 154 | + $encrypted = FALSE; |
|
| 155 | 155 | } |
| 156 | 156 | } |
| 157 | 157 | //是否为下载到文件中 |
| 158 | - $isWriteToFile=FALSE; |
|
| 159 | - if($encrypted) |
|
| 158 | + $isWriteToFile = FALSE; |
|
| 159 | + if ($encrypted) |
|
| 160 | 160 | { |
| 161 | 161 | $iv = $encryptionInfo["iv"]; |
| 162 | 162 | $cek = $encryptionInfo["cek"]; |
| 163 | 163 | |
| 164 | - if(empty($iv)) |
|
| 164 | + if (empty($iv)) |
|
| 165 | 165 | throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
| 166 | - if(empty($cek)) |
|
| 166 | + if (empty($cek)) |
|
| 167 | 167 | throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
| 168 | 168 | |
| 169 | - if(isset($args["Range"])){ |
|
| 169 | + if (isset($args["Range"])) { |
|
| 170 | 170 | $range = $args["Range"]; |
| 171 | - if(!is_array($range)){ |
|
| 172 | - if(preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)){ |
|
| 173 | - $ranges = explode("-",substr($range,strlen("bytes="))); |
|
| 171 | + if (!is_array($range)) { |
|
| 172 | + if (preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)) { |
|
| 173 | + $ranges = explode("-", substr($range, strlen("bytes="))); |
|
| 174 | 174 | $a = $ranges[0]; |
| 175 | 175 | $b = $ranges[1]; |
| 176 | - if($a > $b){ |
|
| 176 | + if ($a > $b) { |
|
| 177 | 177 | throw new Ks3ClientException("Invalid range ".$range); |
| 178 | 178 | } |
| 179 | - $range = array("start"=>$a,"end"=>$b); |
|
| 180 | - }else{ |
|
| 179 | + $range = array("start"=>$a, "end"=>$b); |
|
| 180 | + }else { |
|
| 181 | 181 | throw new Ks3ClientException("Invalid range ".$range); |
| 182 | 182 | } |
| 183 | - }else{ |
|
| 184 | - if(!isset($range["start"])||!isset($range["end"])){ |
|
| 183 | + }else { |
|
| 184 | + if (!isset($range["start"]) || !isset($range["end"])) { |
|
| 185 | 185 | throw new Ks3ClientException("Invalid range ".serialize($range)); |
| 186 | 186 | } |
| 187 | - if($range["start"] > $range["end"]){ |
|
| 187 | + if ($range["start"] > $range["end"]) { |
|
| 188 | 188 | throw new Ks3ClientException("Invalid range ".serialize($range)); |
| 189 | 189 | } |
| 190 | 190 | } |
@@ -192,97 +192,97 @@ discard block |
||
| 192 | 192 | |
| 193 | 193 | $isWriteToFile = isset($args["WriteTo"]); |
| 194 | 194 | $contentLength = $meta["ObjectMeta"]["Content-Length"]; |
| 195 | - if($isWriteToFile){ |
|
| 195 | + if ($isWriteToFile) { |
|
| 196 | 196 | $writeCallBack = new AESCBCStreamWriteCallBack(); |
| 197 | - $writeCallBack->iv=$iv; |
|
| 198 | - $writeCallBack->cek=$cek; |
|
| 197 | + $writeCallBack->iv = $iv; |
|
| 198 | + $writeCallBack->cek = $cek; |
|
| 199 | 199 | $writeCallBack->contentLength = $contentLength; |
| 200 | - if(isset($range)){ |
|
| 201 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 202 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 200 | + if (isset($range)) { |
|
| 201 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
| 202 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range, $blocksize); |
|
| 203 | 203 | $writeCallBack->expectedRange = $range; |
| 204 | 204 | $writeCallBack->adjustedRange = $adjustedRange; |
| 205 | - $args["Range"]=$adjustedRange; |
|
| 205 | + $args["Range"] = $adjustedRange; |
|
| 206 | 206 | } |
| 207 | 207 | $args["writeCallBack"] = $writeCallBack; |
| 208 | 208 | return $this->ks3client->getObject($args); |
| 209 | - }else{ |
|
| 209 | + }else { |
|
| 210 | 210 | $offset = 0; |
| 211 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 212 | - if(isset($range)){ |
|
| 213 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
| 214 | - $args["Range"]=$adjustedRange; |
|
| 211 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
| 212 | + if (isset($range)) { |
|
| 213 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range, $blocksize); |
|
| 214 | + $args["Range"] = $adjustedRange; |
|
| 215 | 215 | } |
| 216 | 216 | $s3Object = $this->ks3client->getObject($args); |
| 217 | 217 | $content = $s3Object["Content"]; |
| 218 | 218 | |
| 219 | - if(isset($range)){ |
|
| 220 | - if($adjustedRange["start"] > 0){ |
|
| 221 | - $iv = substr($content,0,$blocksize); |
|
| 222 | - $content = substr($content,$blocksize); |
|
| 219 | + if (isset($range)) { |
|
| 220 | + if ($adjustedRange["start"] > 0) { |
|
| 221 | + $iv = substr($content, 0, $blocksize); |
|
| 222 | + $content = substr($content, $blocksize); |
|
| 223 | 223 | $offset = $blocksize+$adjustedRange["start"]; |
| 224 | 224 | } |
| 225 | 225 | } |
| 226 | - if(!empty($content)){ |
|
| 227 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 228 | - mcrypt_generic_init($td,$cek,$iv); |
|
| 229 | - $decoded = mdecrypt_generic($td,$content); |
|
| 226 | + if (!empty($content)) { |
|
| 227 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 228 | + mcrypt_generic_init($td, $cek, $iv); |
|
| 229 | + $decoded = mdecrypt_generic($td, $content); |
|
| 230 | 230 | mcrypt_generic_deinit($td); |
| 231 | 231 | mcrypt_module_close($td); |
| 232 | - }else{ |
|
| 232 | + }else { |
|
| 233 | 233 | $decoded = ""; |
| 234 | 234 | } |
| 235 | 235 | |
| 236 | 236 | //判断是否需要删除最后填充的字符,以及获取填充的字符 |
| 237 | 237 | $needRemovePad = FALSE; |
| 238 | 238 | $pad = NULL; |
| 239 | - if($offset+strlen($decoded) >=$contentLength){ |
|
| 239 | + if ($offset+strlen($decoded) >= $contentLength) { |
|
| 240 | 240 | $needRemovePad = TRUE; |
| 241 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 242 | - if($pad<=0||$pad>$blocksize) |
|
| 241 | + $pad = ord(substr($decoded, strlen($decoded)-1, 1)); |
|
| 242 | + if ($pad <= 0 || $pad > $blocksize) |
|
| 243 | 243 | { |
| 244 | 244 | //invalid pad |
| 245 | 245 | $needRemovePad = FALSE; |
| 246 | 246 | } |
| 247 | 247 | } |
| 248 | 248 | $endOffset = 0; |
| 249 | - if(isset($range)){ |
|
| 250 | - if($offset+strlen($decoded)>$range["end"]){ |
|
| 249 | + if (isset($range)) { |
|
| 250 | + if ($offset+strlen($decoded) > $range["end"]) { |
|
| 251 | 251 | $preLength = strlen($decoded); |
| 252 | - $decoded = substr($decoded, 0,$range["end"]-$offset+1); |
|
| 252 | + $decoded = substr($decoded, 0, $range["end"]-$offset+1); |
|
| 253 | 253 | $endOffset = $preLength-strlen($decoded); |
| 254 | 254 | } |
| 255 | - if($offset<$range["start"]){ |
|
| 256 | - $decoded = substr($decoded,$range["start"] - $offset); |
|
| 255 | + if ($offset < $range["start"]) { |
|
| 256 | + $decoded = substr($decoded, $range["start"]-$offset); |
|
| 257 | 257 | } |
| 258 | 258 | } |
| 259 | 259 | //再次根据截取的长度判断是否需要删除最后填充的字符 |
| 260 | - if($needRemovePad&&$endOffset > $pad){ |
|
| 260 | + if ($needRemovePad && $endOffset > $pad) { |
|
| 261 | 261 | $needRemovePad = FALSE; |
| 262 | 262 | } |
| 263 | - if($needRemovePad){ |
|
| 263 | + if ($needRemovePad) { |
|
| 264 | 264 | $padOffset = $pad-$endOffset; |
| 265 | 265 | $actualWriteCount = strlen($decoded)-$padOffset; |
| 266 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 266 | + if ($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 267 | 267 | $decoded = ""; |
| 268 | 268 | else |
| 269 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 269 | + $decoded = substr($decoded, 0, strlen($decoded)-$padOffset); |
|
| 270 | 270 | } |
| 271 | 271 | $s3Object["Content"] = $decoded; |
| 272 | 272 | return $s3Object; |
| 273 | 273 | } |
| 274 | - }else{ |
|
| 274 | + }else { |
|
| 275 | 275 | return $this->ks3client->getObject($args); |
| 276 | 276 | } |
| 277 | 277 | } |
| 278 | - public function initMultipartUploadSecurely($args=array()){ |
|
| 278 | + public function initMultipartUploadSecurely($args = array()) { |
|
| 279 | 279 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
| 280 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
| 281 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 282 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
| 280 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
| 281 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 282 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
| 283 | 283 | |
| 284 | 284 | $matdesc = "{}"; |
| 285 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
| 285 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
| 286 | 286 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
| 287 | 287 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
| 288 | 288 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -290,33 +290,33 @@ discard block |
||
| 290 | 290 | |
| 291 | 291 | $initResult = $this->ks3client->initMultipartUpload($args); |
| 292 | 292 | |
| 293 | - EncryptionUtil::initMultipartUploadContext($initResult,$iv,$sek,$encryptedSek,$matdesc); |
|
| 293 | + EncryptionUtil::initMultipartUploadContext($initResult, $iv, $sek, $encryptedSek, $matdesc); |
|
| 294 | 294 | |
| 295 | 295 | return $initResult; |
| 296 | 296 | } |
| 297 | - public function uploadPartSecurely($args=array()){ |
|
| 297 | + public function uploadPartSecurely($args = array()) { |
|
| 298 | 298 | $uploadId = $args["Options"]["uploadId"]; |
| 299 | 299 | $isLastPart = FALSE; |
| 300 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 301 | - if(isset($args["LastPart"])) |
|
| 300 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
| 301 | + if (isset($args["LastPart"])) |
|
| 302 | 302 | $isLastPart = $args["LastPart"]; |
| 303 | 303 | $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
| 304 | - if(!$exists){ |
|
| 304 | + if (!$exists) { |
|
| 305 | 305 | throw new Ks3ClientException("no such upload in cache/encryption/"); |
| 306 | 306 | } |
| 307 | 307 | $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
| 308 | - if($context["lastPart"]){ |
|
| 309 | - throw new Ks3ClientException("this upload with uploadId ".$uploadId," has been upload last part"); |
|
| 308 | + if ($context["lastPart"]) { |
|
| 309 | + throw new Ks3ClientException("this upload with uploadId ".$uploadId, " has been upload last part"); |
|
| 310 | 310 | } |
| 311 | 311 | $plainTextLength = EncryptionUtil::plainTextLength($args); |
| 312 | - if($plainTextLength <= 0){ |
|
| 312 | + if ($plainTextLength <= 0) { |
|
| 313 | 313 | throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
| 314 | 314 | } |
| 315 | - if(!$isLastPart){ |
|
| 316 | - if($plainTextLength % $blocksize != 0) |
|
| 315 | + if (!$isLastPart) { |
|
| 316 | + if ($plainTextLength%$blocksize != 0) |
|
| 317 | 317 | throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
| 318 | - }else{ |
|
| 319 | - $args["ObjectMeta"]["Content-Length"] = $plainTextLength + ($blocksize - $plainTextLength%$blocksize); |
|
| 318 | + }else { |
|
| 319 | + $args["ObjectMeta"]["Content-Length"] = $plainTextLength+($blocksize-$plainTextLength%$blocksize); |
|
| 320 | 320 | } |
| 321 | 321 | $readCallBack = new AESCBCStreamReadCallBack(); |
| 322 | 322 | $readCallBack->iv = base64_decode($context["nextIv"]); |
@@ -327,28 +327,28 @@ discard block |
||
| 327 | 327 | $args["readCallBack"] = $readCallBack; |
| 328 | 328 | |
| 329 | 329 | $upResult = $this->ks3client->uploadPart($args); |
| 330 | - EncryptionUtil::updateMultipartUploadContext($uploadId,$readCallBack->iv,$isLastPart); |
|
| 330 | + EncryptionUtil::updateMultipartUploadContext($uploadId, $readCallBack->iv, $isLastPart); |
|
| 331 | 331 | return $upResult; |
| 332 | 332 | } |
| 333 | - public function abortMultipartUploadSecurely($args=array()){ |
|
| 333 | + public function abortMultipartUploadSecurely($args = array()) { |
|
| 334 | 334 | $uploadId = $args["Options"]["uploadId"]; |
| 335 | 335 | EncryptionUtil::deleteMultipartUploadContext($uploadId); |
| 336 | 336 | return $this->ks3client->abortMultipartUpload($args); |
| 337 | 337 | } |
| 338 | - public function completeMultipartUploadSecurely($args=array()){ |
|
| 338 | + public function completeMultipartUploadSecurely($args = array()) { |
|
| 339 | 339 | $uploadId = $args["Options"]["uploadId"]; |
| 340 | 340 | $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
| 341 | - if(!$exists){ |
|
| 341 | + if (!$exists) { |
|
| 342 | 342 | throw new Ks3ClientException("no such upload in cache/encryption/"); |
| 343 | 343 | } |
| 344 | 344 | $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
| 345 | - if(!$context["lastPart"]){ |
|
| 345 | + if (!$context["lastPart"]) { |
|
| 346 | 346 | throw new Ks3ClientException("Unable to complete an encrypted multipart upload without being told which part was the last. when upload part you can add item in args like args[\"LastPart\"]=TRUE"); |
| 347 | 347 | } |
| 348 | 348 | $result = $this->ks3client->completeMultipartUpload($args); |
| 349 | - if(ENCRYPTPTION_STORAGE_MODE=="InstructionFile"){ |
|
| 350 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
| 351 | - $context["encryptedCek"],$context["firstIv"],$context["matdesc"]); |
|
| 349 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
| 350 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
| 351 | + $context["encryptedCek"], $context["firstIv"], $context["matdesc"]); |
|
| 352 | 352 | $this->ks3client->putObjectByContent($req); |
| 353 | 353 | } |
| 354 | 354 | EncryptionUtil::deleteMultipartUploadContext($uploadId); |
@@ -22,17 +22,19 @@ discard block |
||
| 22 | 22 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
| 23 | 23 | $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
| 24 | 24 | $content = $args["Content"]; |
| 25 | - if(empty($content)) |
|
| 26 | - throw new Ks3ClientException("please specifie Content in request args"); |
|
| 25 | + if(empty($content)) { |
|
| 26 | + throw new Ks3ClientException("please specifie Content in request args"); |
|
| 27 | + } |
|
| 27 | 28 | $metaContentLength = EncryptionUtil::metaTextLength($args); |
| 28 | 29 | $plainTextLength = strlen($content); |
| 29 | 30 | if($metaContentLength > 0 && $metaContentLength < $plainTextLength){ |
| 30 | 31 | $plainTextLength = $metaContentLength; |
| 31 | 32 | } |
| 32 | - if($plainTextLength > 0) |
|
| 33 | - $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 34 | - else |
|
| 35 | - throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
|
| 33 | + if($plainTextLength > 0) { |
|
| 34 | + $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
|
| 35 | + } else { |
|
| 36 | + throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
|
| 37 | + } |
|
| 36 | 38 | |
| 37 | 39 | $content = substr($content, 0,$plainTextLength); |
| 38 | 40 | |
@@ -73,8 +75,9 @@ discard block |
||
| 73 | 75 | $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
| 74 | 76 | if(!isset($args["Content"])||!is_array($args["Content"]) |
| 75 | 77 | ||!isset($args["Content"]["content"]) |
| 76 | - ||empty($args["Content"]["content"])) |
|
| 77 | - throw new Ks3ClientException("please specifie file content in request args"); |
|
| 78 | + ||empty($args["Content"]["content"])) { |
|
| 79 | + throw new Ks3ClientException("please specifie file content in request args"); |
|
| 80 | + } |
|
| 78 | 81 | $content = $args["Content"]; |
| 79 | 82 | $plainTextLength = EncryptionUtil::plainTextLength($args); |
| 80 | 83 | if($plainTextLength <= 0){ |
@@ -117,7 +120,7 @@ discard block |
||
| 117 | 120 | $meta = $this->ks3client->getObjectMeta($args); |
| 118 | 121 | if(isset($meta["UserMeta"]["x-kss-meta-x-kss-key"])&&isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])){ |
| 119 | 122 | $encryptedInMeta = TRUE; |
| 120 | - }else{ |
|
| 123 | + } else{ |
|
| 121 | 124 | $encryptedInMeta = FALSE; |
| 122 | 125 | } |
| 123 | 126 | $encrypted = TRUE; |
@@ -128,7 +131,7 @@ discard block |
||
| 128 | 131 | $encryptionInfo["matdesc"] = $matdesc; |
| 129 | 132 | $cekEncrypted = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-key"]); |
| 130 | 133 | $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
| 131 | - }else{ |
|
| 134 | + } else{ |
|
| 132 | 135 | if($this->ks3client->objectExists(array( |
| 133 | 136 | "Bucket"=>$args["Bucket"], |
| 134 | 137 | "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX) |
@@ -140,8 +143,9 @@ discard block |
||
| 140 | 143 | "Key"=>$insKey, |
| 141 | 144 | ); |
| 142 | 145 | $s3Object = $this->ks3client->getObject($getIns); |
| 143 | - if(!EncryptionUtil::isInstructionFile($s3Object)) |
|
| 144 | - throw new Ks3ClientException($insKey." is not an InstructionFile"); |
|
| 146 | + if(!EncryptionUtil::isInstructionFile($s3Object)) { |
|
| 147 | + throw new Ks3ClientException($insKey." is not an InstructionFile"); |
|
| 148 | + } |
|
| 145 | 149 | |
| 146 | 150 | $content = $s3Object["Content"]; |
| 147 | 151 | $content = json_decode($content,TRUE); |
@@ -150,7 +154,7 @@ discard block |
||
| 150 | 154 | $encryptionInfo["matdesc"] = $matdesc; |
| 151 | 155 | $cekEncrypted = base64_decode($content["x-kss-key"]); |
| 152 | 156 | $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
| 153 | - }else{ |
|
| 157 | + } else{ |
|
| 154 | 158 | $encrypted =FALSE; |
| 155 | 159 | } |
| 156 | 160 | } |
@@ -161,10 +165,12 @@ discard block |
||
| 161 | 165 | $iv = $encryptionInfo["iv"]; |
| 162 | 166 | $cek = $encryptionInfo["cek"]; |
| 163 | 167 | |
| 164 | - if(empty($iv)) |
|
| 165 | - throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
|
| 166 | - if(empty($cek)) |
|
| 167 | - throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
|
| 168 | + if(empty($iv)) { |
|
| 169 | + throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
|
| 170 | + } |
|
| 171 | + if(empty($cek)) { |
|
| 172 | + throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
|
| 173 | + } |
|
| 168 | 174 | |
| 169 | 175 | if(isset($args["Range"])){ |
| 170 | 176 | $range = $args["Range"]; |
@@ -177,10 +183,10 @@ discard block |
||
| 177 | 183 | throw new Ks3ClientException("Invalid range ".$range); |
| 178 | 184 | } |
| 179 | 185 | $range = array("start"=>$a,"end"=>$b); |
| 180 | - }else{ |
|
| 186 | + } else{ |
|
| 181 | 187 | throw new Ks3ClientException("Invalid range ".$range); |
| 182 | 188 | } |
| 183 | - }else{ |
|
| 189 | + } else{ |
|
| 184 | 190 | if(!isset($range["start"])||!isset($range["end"])){ |
| 185 | 191 | throw new Ks3ClientException("Invalid range ".serialize($range)); |
| 186 | 192 | } |
@@ -206,7 +212,7 @@ discard block |
||
| 206 | 212 | } |
| 207 | 213 | $args["writeCallBack"] = $writeCallBack; |
| 208 | 214 | return $this->ks3client->getObject($args); |
| 209 | - }else{ |
|
| 215 | + } else{ |
|
| 210 | 216 | $offset = 0; |
| 211 | 217 | $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
| 212 | 218 | if(isset($range)){ |
@@ -229,7 +235,7 @@ discard block |
||
| 229 | 235 | $decoded = mdecrypt_generic($td,$content); |
| 230 | 236 | mcrypt_generic_deinit($td); |
| 231 | 237 | mcrypt_module_close($td); |
| 232 | - }else{ |
|
| 238 | + } else{ |
|
| 233 | 239 | $decoded = ""; |
| 234 | 240 | } |
| 235 | 241 | |
@@ -263,15 +269,17 @@ discard block |
||
| 263 | 269 | if($needRemovePad){ |
| 264 | 270 | $padOffset = $pad-$endOffset; |
| 265 | 271 | $actualWriteCount = strlen($decoded)-$padOffset; |
| 266 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 272 | + if($actualWriteCount <= 0) { |
|
| 273 | + //负数的情况就是用户期望的range里全是填充的 |
|
| 267 | 274 | $decoded = ""; |
| 268 | - else |
|
| 269 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 275 | + } else { |
|
| 276 | + $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 277 | + } |
|
| 270 | 278 | } |
| 271 | 279 | $s3Object["Content"] = $decoded; |
| 272 | 280 | return $s3Object; |
| 273 | 281 | } |
| 274 | - }else{ |
|
| 282 | + } else{ |
|
| 275 | 283 | return $this->ks3client->getObject($args); |
| 276 | 284 | } |
| 277 | 285 | } |
@@ -298,8 +306,9 @@ discard block |
||
| 298 | 306 | $uploadId = $args["Options"]["uploadId"]; |
| 299 | 307 | $isLastPart = FALSE; |
| 300 | 308 | $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
| 301 | - if(isset($args["LastPart"])) |
|
| 302 | - $isLastPart = $args["LastPart"]; |
|
| 309 | + if(isset($args["LastPart"])) { |
|
| 310 | + $isLastPart = $args["LastPart"]; |
|
| 311 | + } |
|
| 303 | 312 | $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
| 304 | 313 | if(!$exists){ |
| 305 | 314 | throw new Ks3ClientException("no such upload in cache/encryption/"); |
@@ -313,9 +322,10 @@ discard block |
||
| 313 | 322 | throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
| 314 | 323 | } |
| 315 | 324 | if(!$isLastPart){ |
| 316 | - if($plainTextLength % $blocksize != 0) |
|
| 317 | - throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
|
| 318 | - }else{ |
|
| 325 | + if($plainTextLength % $blocksize != 0) { |
|
| 326 | + throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
|
| 327 | + } |
|
| 328 | + } else{ |
|
| 319 | 329 | $args["ObjectMeta"]["Content-Length"] = $plainTextLength + ($blocksize - $plainTextLength%$blocksize); |
| 320 | 330 | } |
| 321 | 331 | $readCallBack = new AESCBCStreamReadCallBack(); |
@@ -2,226 +2,226 @@ |
||
| 2 | 2 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
| 3 | 3 | //下载 |
| 4 | 4 | class AESCBCStreamWriteCallBack{ |
| 5 | - private $iv; |
|
| 6 | - private $cek; |
|
| 7 | - private $contentLength; |
|
| 8 | - //数组,分别为上限和下限 |
|
| 9 | - private $expectedRange; |
|
| 10 | - //经过调整后的range |
|
| 11 | - private $adjustedRange; |
|
| 12 | - //当前指针位置 |
|
| 13 | - private $currentIndex; |
|
| 14 | - private $buffer;//上一次调用streaming_write_callback后,未解码的数据 |
|
| 15 | - private $firstWrite = TRUE; |
|
| 16 | - public function __set($property_name, $value){ |
|
| 17 | - $this->$property_name=$value; |
|
| 18 | - } |
|
| 19 | - public function __get($property_name){ |
|
| 20 | - if(isset($this->$property_name)) |
|
| 21 | - { |
|
| 22 | - return($this->$property_name); |
|
| 23 | - }else |
|
| 24 | - { |
|
| 25 | - return(NULL); |
|
| 26 | - } |
|
| 27 | - } |
|
| 28 | - //最后的数据大小肯定是blocksize的倍数,所以最后buffer中不会有未解密的内容。否则可以认为该文件是错误的 |
|
| 29 | - public function streaming_write_callback($curl_handle,$data,$write_stream){ |
|
| 30 | - $data = $this->buffer.$data; |
|
| 5 | + private $iv; |
|
| 6 | + private $cek; |
|
| 7 | + private $contentLength; |
|
| 8 | + //数组,分别为上限和下限 |
|
| 9 | + private $expectedRange; |
|
| 10 | + //经过调整后的range |
|
| 11 | + private $adjustedRange; |
|
| 12 | + //当前指针位置 |
|
| 13 | + private $currentIndex; |
|
| 14 | + private $buffer;//上一次调用streaming_write_callback后,未解码的数据 |
|
| 15 | + private $firstWrite = TRUE; |
|
| 16 | + public function __set($property_name, $value){ |
|
| 17 | + $this->$property_name=$value; |
|
| 18 | + } |
|
| 19 | + public function __get($property_name){ |
|
| 20 | + if(isset($this->$property_name)) |
|
| 21 | + { |
|
| 22 | + return($this->$property_name); |
|
| 23 | + }else |
|
| 24 | + { |
|
| 25 | + return(NULL); |
|
| 26 | + } |
|
| 27 | + } |
|
| 28 | + //最后的数据大小肯定是blocksize的倍数,所以最后buffer中不会有未解密的内容。否则可以认为该文件是错误的 |
|
| 29 | + public function streaming_write_callback($curl_handle,$data,$write_stream){ |
|
| 30 | + $data = $this->buffer.$data; |
|
| 31 | 31 | |
| 32 | - $length = strlen($data); |
|
| 33 | - //不能把上次的没读完的长度算在这次里,应该算在上次 |
|
| 34 | - $written_total = 0-strlen($this->buffer); |
|
| 35 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 36 | - if($length<$blocksize) |
|
| 37 | - $this->buffer = $data; |
|
| 38 | - else{ |
|
| 39 | - //如果期望的范围之后还有数据,则认为数据已经接收完毕。不做任何处理 |
|
| 40 | - if($this->expectedRange["end"] < $this->expectedRange["start"]){ |
|
| 41 | - return $written_total+strlen($data); |
|
| 42 | - } |
|
| 43 | - $this->buffer = substr($data,$length - $length%$blocksize); |
|
| 44 | - $data = substr($data,0,$length - $length%$blocksize); |
|
| 32 | + $length = strlen($data); |
|
| 33 | + //不能把上次的没读完的长度算在这次里,应该算在上次 |
|
| 34 | + $written_total = 0-strlen($this->buffer); |
|
| 35 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 36 | + if($length<$blocksize) |
|
| 37 | + $this->buffer = $data; |
|
| 38 | + else{ |
|
| 39 | + //如果期望的范围之后还有数据,则认为数据已经接收完毕。不做任何处理 |
|
| 40 | + if($this->expectedRange["end"] < $this->expectedRange["start"]){ |
|
| 41 | + return $written_total+strlen($data); |
|
| 42 | + } |
|
| 43 | + $this->buffer = substr($data,$length - $length%$blocksize); |
|
| 44 | + $data = substr($data,0,$length - $length%$blocksize); |
|
| 45 | 45 | |
| 46 | - $ivoffset = 0; |
|
| 47 | - //range get时,如果不是从刚开始,则应该取加密后数据的前16个字节作为之后解密的iv |
|
| 48 | - if($this->firstWrite){ |
|
| 49 | - $this->firstWrite = FALSE; |
|
| 50 | - if(!$this->isBegin()){ |
|
| 51 | - $this->iv = substr($data,0,$blocksize); |
|
| 52 | - $data = substr($data,$blocksize); |
|
| 53 | - $ivoffset = $blocksize; |
|
| 54 | - } |
|
| 55 | - //初始化当前位置 |
|
| 56 | - if(isset($this->adjustedRange)) |
|
| 57 | - $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
|
| 58 | - else |
|
| 59 | - $this->currentIndex = $ivoffset; |
|
| 60 | - } |
|
| 61 | - $written_total+=$ivoffset; |
|
| 62 | - if(strlen($data) == 0){ |
|
| 63 | - $decoded = ""; |
|
| 64 | - return $written_total; |
|
| 65 | - }else{ |
|
| 66 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 67 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 68 | - $decoded = mdecrypt_generic($td,$data); |
|
| 69 | - mcrypt_generic_deinit($td); |
|
| 70 | - mcrypt_module_close($td); |
|
| 71 | - } |
|
| 46 | + $ivoffset = 0; |
|
| 47 | + //range get时,如果不是从刚开始,则应该取加密后数据的前16个字节作为之后解密的iv |
|
| 48 | + if($this->firstWrite){ |
|
| 49 | + $this->firstWrite = FALSE; |
|
| 50 | + if(!$this->isBegin()){ |
|
| 51 | + $this->iv = substr($data,0,$blocksize); |
|
| 52 | + $data = substr($data,$blocksize); |
|
| 53 | + $ivoffset = $blocksize; |
|
| 54 | + } |
|
| 55 | + //初始化当前位置 |
|
| 56 | + if(isset($this->adjustedRange)) |
|
| 57 | + $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
|
| 58 | + else |
|
| 59 | + $this->currentIndex = $ivoffset; |
|
| 60 | + } |
|
| 61 | + $written_total+=$ivoffset; |
|
| 62 | + if(strlen($data) == 0){ |
|
| 63 | + $decoded = ""; |
|
| 64 | + return $written_total; |
|
| 65 | + }else{ |
|
| 66 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 67 | + mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 68 | + $decoded = mdecrypt_generic($td,$data); |
|
| 69 | + mcrypt_generic_deinit($td); |
|
| 70 | + mcrypt_module_close($td); |
|
| 71 | + } |
|
| 72 | 72 | |
| 73 | - $this->iv = substr($data,strlen($data)-$blocksize); |
|
| 74 | - //判断是否需要删除最后填充的字符,以及获取填充的字符 |
|
| 75 | - $needRemovePad = FALSE; |
|
| 76 | - $pad = NULL; |
|
| 73 | + $this->iv = substr($data,strlen($data)-$blocksize); |
|
| 74 | + //判断是否需要删除最后填充的字符,以及获取填充的字符 |
|
| 75 | + $needRemovePad = FALSE; |
|
| 76 | + $pad = NULL; |
|
| 77 | 77 | |
| 78 | - if($this->currentIndex+strlen($decoded) >=$this->contentLength){ |
|
| 79 | - $needRemovePad = TRUE; |
|
| 80 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 81 | - if($pad<=0||$pad>$blocksize) |
|
| 82 | - { |
|
| 83 | - //invalid pad |
|
| 84 | - $needRemovePad = FALSE; |
|
| 85 | - } |
|
| 86 | - } |
|
| 78 | + if($this->currentIndex+strlen($decoded) >=$this->contentLength){ |
|
| 79 | + $needRemovePad = TRUE; |
|
| 80 | + $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 81 | + if($pad<=0||$pad>$blocksize) |
|
| 82 | + { |
|
| 83 | + //invalid pad |
|
| 84 | + $needRemovePad = FALSE; |
|
| 85 | + } |
|
| 86 | + } |
|
| 87 | 87 | |
| 88 | - //将解密后的数据截取到期望的长度 |
|
| 89 | - $startOffset = 0; |
|
| 90 | - $endOffset = 0; |
|
| 91 | - if(isset($this->expectedRange)){ |
|
| 92 | - $trueEnd = $expectedEnd = $this->expectedRange["end"]; |
|
| 88 | + //将解密后的数据截取到期望的长度 |
|
| 89 | + $startOffset = 0; |
|
| 90 | + $endOffset = 0; |
|
| 91 | + if(isset($this->expectedRange)){ |
|
| 92 | + $trueEnd = $expectedEnd = $this->expectedRange["end"]; |
|
| 93 | 93 | |
| 94 | - if($this->currentIndex+strlen($decoded)>$expectedEnd){ |
|
| 95 | - $preLength = strlen($decoded); |
|
| 96 | - $decoded = substr($decoded, 0,$expectedEnd-$this->currentIndex+1); |
|
| 97 | - $endOffset = $preLength-strlen($decoded); |
|
| 98 | - }else{ |
|
| 99 | - //因为range是开始结束都计算的,range=1-2。currentIndex=1,长度是2,end=currentIndex+2-1 |
|
| 100 | - $trueEnd = $this->currentIndex+strlen($decoded)-1; |
|
| 101 | - } |
|
| 102 | - $expectedStart = $this->expectedRange["start"]; |
|
| 103 | - if($this->currentIndex<$expectedStart){ |
|
| 104 | - $decoded = substr($decoded,$expectedStart - $this->currentIndex); |
|
| 105 | - $startOffset = $expectedStart - $this->currentIndex; |
|
| 106 | - } |
|
| 107 | - //调整下次期望的开始 |
|
| 108 | - $this->expectedRange["start"] = $trueEnd+1; |
|
| 109 | - } |
|
| 94 | + if($this->currentIndex+strlen($decoded)>$expectedEnd){ |
|
| 95 | + $preLength = strlen($decoded); |
|
| 96 | + $decoded = substr($decoded, 0,$expectedEnd-$this->currentIndex+1); |
|
| 97 | + $endOffset = $preLength-strlen($decoded); |
|
| 98 | + }else{ |
|
| 99 | + //因为range是开始结束都计算的,range=1-2。currentIndex=1,长度是2,end=currentIndex+2-1 |
|
| 100 | + $trueEnd = $this->currentIndex+strlen($decoded)-1; |
|
| 101 | + } |
|
| 102 | + $expectedStart = $this->expectedRange["start"]; |
|
| 103 | + if($this->currentIndex<$expectedStart){ |
|
| 104 | + $decoded = substr($decoded,$expectedStart - $this->currentIndex); |
|
| 105 | + $startOffset = $expectedStart - $this->currentIndex; |
|
| 106 | + } |
|
| 107 | + //调整下次期望的开始 |
|
| 108 | + $this->expectedRange["start"] = $trueEnd+1; |
|
| 109 | + } |
|
| 110 | 110 | |
| 111 | - $padOffset = 0; |
|
| 112 | - //再次根据截取的长度判断是否需要删除最后填充的字符 |
|
| 113 | - if($needRemovePad&&$endOffset > $pad){ |
|
| 114 | - $needRemovePad = FALSE; |
|
| 115 | - } |
|
| 116 | - $actualWriteCount = 0; |
|
| 117 | - if($needRemovePad){ |
|
| 118 | - $padOffset = $pad-$endOffset; |
|
| 119 | - $actualWriteCount = strlen($decoded)-$padOffset; |
|
| 120 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 121 | - $decoded = ""; |
|
| 122 | - else |
|
| 123 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 124 | - } |
|
| 125 | - $count = fwrite($write_stream, $decoded); |
|
| 126 | - if($count == 0) |
|
| 127 | - $count = $actualWriteCount; |
|
| 128 | - $count += $padOffset; |
|
| 129 | - $count += $startOffset; |
|
| 130 | - $count += $endOffset; |
|
| 131 | - $this->currentIndex += $count; |
|
| 132 | - $written_total+=$count; |
|
| 133 | - } |
|
| 134 | - //否则curl框架会报错 |
|
| 135 | - $written_total+=strlen($this->buffer); |
|
| 136 | - return $written_total; |
|
| 137 | - } |
|
| 138 | - //是的话则使用初始化IV |
|
| 139 | - private function isBegin(){ |
|
| 140 | - $beginIndex = 0; |
|
| 141 | - if(isset($this->adjustedRange["start"])) |
|
| 142 | - $beginIndex = $this->adjustedRange["start"]; |
|
| 143 | - if($beginIndex == 0) |
|
| 144 | - return TRUE; |
|
| 145 | - else |
|
| 146 | - return FALSE; |
|
| 147 | - } |
|
| 111 | + $padOffset = 0; |
|
| 112 | + //再次根据截取的长度判断是否需要删除最后填充的字符 |
|
| 113 | + if($needRemovePad&&$endOffset > $pad){ |
|
| 114 | + $needRemovePad = FALSE; |
|
| 115 | + } |
|
| 116 | + $actualWriteCount = 0; |
|
| 117 | + if($needRemovePad){ |
|
| 118 | + $padOffset = $pad-$endOffset; |
|
| 119 | + $actualWriteCount = strlen($decoded)-$padOffset; |
|
| 120 | + if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 121 | + $decoded = ""; |
|
| 122 | + else |
|
| 123 | + $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 124 | + } |
|
| 125 | + $count = fwrite($write_stream, $decoded); |
|
| 126 | + if($count == 0) |
|
| 127 | + $count = $actualWriteCount; |
|
| 128 | + $count += $padOffset; |
|
| 129 | + $count += $startOffset; |
|
| 130 | + $count += $endOffset; |
|
| 131 | + $this->currentIndex += $count; |
|
| 132 | + $written_total+=$count; |
|
| 133 | + } |
|
| 134 | + //否则curl框架会报错 |
|
| 135 | + $written_total+=strlen($this->buffer); |
|
| 136 | + return $written_total; |
|
| 137 | + } |
|
| 138 | + //是的话则使用初始化IV |
|
| 139 | + private function isBegin(){ |
|
| 140 | + $beginIndex = 0; |
|
| 141 | + if(isset($this->adjustedRange["start"])) |
|
| 142 | + $beginIndex = $this->adjustedRange["start"]; |
|
| 143 | + if($beginIndex == 0) |
|
| 144 | + return TRUE; |
|
| 145 | + else |
|
| 146 | + return FALSE; |
|
| 147 | + } |
|
| 148 | 148 | } |
| 149 | 149 | //上传 |
| 150 | 150 | class AESCBCStreamReadCallBack{ |
| 151 | - private $iv; |
|
| 152 | - private $cek; |
|
| 153 | - private $contentLength; |
|
| 154 | - private $buffer; |
|
| 155 | - private $hasread = 0; |
|
| 156 | - private $mutipartUpload =FALSE; |
|
| 157 | - private $isLastPart = FALSE; |
|
| 158 | - public function __set($property_name, $value){ |
|
| 159 | - $this->$property_name=$value; |
|
| 160 | - } |
|
| 161 | - public function __get($property_name){ |
|
| 162 | - if(isset($this->$property_name)) |
|
| 163 | - { |
|
| 164 | - return($this->$property_name); |
|
| 165 | - }else |
|
| 166 | - { |
|
| 167 | - return(NULL); |
|
| 168 | - } |
|
| 169 | - } |
|
| 170 | - public function streaming_read_callback($curl_handle,$file_handle,$length,$read_stream,$seek_position){ |
|
| 171 | - // Once we've sent as much as we're supposed to send... |
|
| 172 | - if ($this->hasread >= $this->contentLength) |
|
| 173 | - { |
|
| 174 | - // Send EOF |
|
| 175 | - return ''; |
|
| 176 | - } |
|
| 177 | - // If we're at the beginning of an upload and need to seek... |
|
| 178 | - if ($this->hasread == 0 && $seek_position>0 && $seek_position !== ftell($read_stream)) |
|
| 179 | - { |
|
| 180 | - if (fseek($read_stream, $seek_position) !== 0) |
|
| 181 | - { |
|
| 182 | - throw new RequestCore_Exception('The stream does not support seeking and is either not at the requested position or the position is unknown.'); |
|
| 183 | - } |
|
| 184 | - } |
|
| 151 | + private $iv; |
|
| 152 | + private $cek; |
|
| 153 | + private $contentLength; |
|
| 154 | + private $buffer; |
|
| 155 | + private $hasread = 0; |
|
| 156 | + private $mutipartUpload =FALSE; |
|
| 157 | + private $isLastPart = FALSE; |
|
| 158 | + public function __set($property_name, $value){ |
|
| 159 | + $this->$property_name=$value; |
|
| 160 | + } |
|
| 161 | + public function __get($property_name){ |
|
| 162 | + if(isset($this->$property_name)) |
|
| 163 | + { |
|
| 164 | + return($this->$property_name); |
|
| 165 | + }else |
|
| 166 | + { |
|
| 167 | + return(NULL); |
|
| 168 | + } |
|
| 169 | + } |
|
| 170 | + public function streaming_read_callback($curl_handle,$file_handle,$length,$read_stream,$seek_position){ |
|
| 171 | + // Once we've sent as much as we're supposed to send... |
|
| 172 | + if ($this->hasread >= $this->contentLength) |
|
| 173 | + { |
|
| 174 | + // Send EOF |
|
| 175 | + return ''; |
|
| 176 | + } |
|
| 177 | + // If we're at the beginning of an upload and need to seek... |
|
| 178 | + if ($this->hasread == 0 && $seek_position>0 && $seek_position !== ftell($read_stream)) |
|
| 179 | + { |
|
| 180 | + if (fseek($read_stream, $seek_position) !== 0) |
|
| 181 | + { |
|
| 182 | + throw new RequestCore_Exception('The stream does not support seeking and is either not at the requested position or the position is unknown.'); |
|
| 183 | + } |
|
| 184 | + } |
|
| 185 | 185 | |
| 186 | 186 | |
| 187 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 188 | - $needRead = min($this->contentLength - $this->hasread,$length); |
|
| 189 | - $read = fread($read_stream,$needRead); |
|
| 190 | - $this->hasread += strlen($read); |
|
| 191 | - $isLast = FALSE; |
|
| 192 | - if($this->hasread >= $this->contentLength){ |
|
| 193 | - $isLast = TRUE; |
|
| 194 | - } |
|
| 195 | - $data = $this->buffer.$read; |
|
| 187 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 188 | + $needRead = min($this->contentLength - $this->hasread,$length); |
|
| 189 | + $read = fread($read_stream,$needRead); |
|
| 190 | + $this->hasread += strlen($read); |
|
| 191 | + $isLast = FALSE; |
|
| 192 | + if($this->hasread >= $this->contentLength){ |
|
| 193 | + $isLast = TRUE; |
|
| 194 | + } |
|
| 195 | + $data = $this->buffer.$read; |
|
| 196 | 196 | |
| 197 | - $dataLength = strlen($data); |
|
| 197 | + $dataLength = strlen($data); |
|
| 198 | 198 | |
| 199 | - if(!$isLast){ |
|
| 200 | - $this->buffer = substr($data,$dataLength-$dataLength%$blocksize); |
|
| 201 | - $data = substr($data, 0,$dataLength-$dataLength%$blocksize); |
|
| 202 | - }else{ |
|
| 203 | - //分块上传除最后一块外肯定是blocksize大小的倍数,所以不需要填充。 |
|
| 204 | - if($this->mutipartUpload){ |
|
| 205 | - if($this->isLastPart){ |
|
| 206 | - $this->buffer = NULL; |
|
| 207 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 208 | - }else{ |
|
| 209 | - //donothing |
|
| 210 | - } |
|
| 211 | - }else{ |
|
| 212 | - $this->buffer = NULL; |
|
| 213 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 214 | - } |
|
| 215 | - } |
|
| 216 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 217 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 218 | - $encrypted = mcrypt_generic($td,$data); |
|
| 219 | - mcrypt_generic_deinit($td); |
|
| 220 | - //去除自动填充的16个字节//php的当恰好为16的倍数时竟然不填充? |
|
| 221 | - //$encrypted = substr($encrypted,0,strlen($encrypted)-$blocksize); |
|
| 222 | - //取最后一个block作为下一次的iv |
|
| 223 | - $this->iv = substr($encrypted, strlen($encrypted)-$blocksize); |
|
| 224 | - return $encrypted; |
|
| 225 | - } |
|
| 199 | + if(!$isLast){ |
|
| 200 | + $this->buffer = substr($data,$dataLength-$dataLength%$blocksize); |
|
| 201 | + $data = substr($data, 0,$dataLength-$dataLength%$blocksize); |
|
| 202 | + }else{ |
|
| 203 | + //分块上传除最后一块外肯定是blocksize大小的倍数,所以不需要填充。 |
|
| 204 | + if($this->mutipartUpload){ |
|
| 205 | + if($this->isLastPart){ |
|
| 206 | + $this->buffer = NULL; |
|
| 207 | + $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 208 | + }else{ |
|
| 209 | + //donothing |
|
| 210 | + } |
|
| 211 | + }else{ |
|
| 212 | + $this->buffer = NULL; |
|
| 213 | + $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 214 | + } |
|
| 215 | + } |
|
| 216 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 217 | + mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 218 | + $encrypted = mcrypt_generic($td,$data); |
|
| 219 | + mcrypt_generic_deinit($td); |
|
| 220 | + //去除自动填充的16个字节//php的当恰好为16的倍数时竟然不填充? |
|
| 221 | + //$encrypted = substr($encrypted,0,strlen($encrypted)-$blocksize); |
|
| 222 | + //取最后一个block作为下一次的iv |
|
| 223 | + $this->iv = substr($encrypted, strlen($encrypted)-$blocksize); |
|
| 224 | + return $encrypted; |
|
| 225 | + } |
|
| 226 | 226 | } |
| 227 | 227 | ?> |
| 228 | 228 | \ No newline at end of file |
@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
| 3 | 3 | //下载 |
| 4 | -class AESCBCStreamWriteCallBack{ |
|
| 4 | +class AESCBCStreamWriteCallBack { |
|
| 5 | 5 | private $iv; |
| 6 | 6 | private $cek; |
| 7 | 7 | private $contentLength; |
@@ -11,13 +11,13 @@ discard block |
||
| 11 | 11 | private $adjustedRange; |
| 12 | 12 | //当前指针位置 |
| 13 | 13 | private $currentIndex; |
| 14 | - private $buffer;//上一次调用streaming_write_callback后,未解码的数据 |
|
| 14 | + private $buffer; //上一次调用streaming_write_callback后,未解码的数据 |
|
| 15 | 15 | private $firstWrite = TRUE; |
| 16 | - public function __set($property_name, $value){ |
|
| 17 | - $this->$property_name=$value; |
|
| 16 | + public function __set($property_name, $value) { |
|
| 17 | + $this->$property_name = $value; |
|
| 18 | 18 | } |
| 19 | - public function __get($property_name){ |
|
| 20 | - if(isset($this->$property_name)) |
|
| 19 | + public function __get($property_name) { |
|
| 20 | + if (isset($this->$property_name)) |
|
| 21 | 21 | { |
| 22 | 22 | return($this->$property_name); |
| 23 | 23 | }else |
@@ -26,59 +26,59 @@ discard block |
||
| 26 | 26 | } |
| 27 | 27 | } |
| 28 | 28 | //最后的数据大小肯定是blocksize的倍数,所以最后buffer中不会有未解密的内容。否则可以认为该文件是错误的 |
| 29 | - public function streaming_write_callback($curl_handle,$data,$write_stream){ |
|
| 29 | + public function streaming_write_callback($curl_handle, $data, $write_stream) { |
|
| 30 | 30 | $data = $this->buffer.$data; |
| 31 | 31 | |
| 32 | 32 | $length = strlen($data); |
| 33 | 33 | //不能把上次的没读完的长度算在这次里,应该算在上次 |
| 34 | 34 | $written_total = 0-strlen($this->buffer); |
| 35 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
| 36 | - if($length<$blocksize) |
|
| 35 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
| 36 | + if ($length < $blocksize) |
|
| 37 | 37 | $this->buffer = $data; |
| 38 | - else{ |
|
| 38 | + else { |
|
| 39 | 39 | //如果期望的范围之后还有数据,则认为数据已经接收完毕。不做任何处理 |
| 40 | - if($this->expectedRange["end"] < $this->expectedRange["start"]){ |
|
| 40 | + if ($this->expectedRange["end"] < $this->expectedRange["start"]) { |
|
| 41 | 41 | return $written_total+strlen($data); |
| 42 | 42 | } |
| 43 | - $this->buffer = substr($data,$length - $length%$blocksize); |
|
| 44 | - $data = substr($data,0,$length - $length%$blocksize); |
|
| 43 | + $this->buffer = substr($data, $length-$length%$blocksize); |
|
| 44 | + $data = substr($data, 0, $length-$length%$blocksize); |
|
| 45 | 45 | |
| 46 | 46 | $ivoffset = 0; |
| 47 | 47 | //range get时,如果不是从刚开始,则应该取加密后数据的前16个字节作为之后解密的iv |
| 48 | - if($this->firstWrite){ |
|
| 48 | + if ($this->firstWrite) { |
|
| 49 | 49 | $this->firstWrite = FALSE; |
| 50 | - if(!$this->isBegin()){ |
|
| 51 | - $this->iv = substr($data,0,$blocksize); |
|
| 52 | - $data = substr($data,$blocksize); |
|
| 50 | + if (!$this->isBegin()) { |
|
| 51 | + $this->iv = substr($data, 0, $blocksize); |
|
| 52 | + $data = substr($data, $blocksize); |
|
| 53 | 53 | $ivoffset = $blocksize; |
| 54 | 54 | } |
| 55 | 55 | //初始化当前位置 |
| 56 | - if(isset($this->adjustedRange)) |
|
| 56 | + if (isset($this->adjustedRange)) |
|
| 57 | 57 | $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
| 58 | 58 | else |
| 59 | 59 | $this->currentIndex = $ivoffset; |
| 60 | 60 | } |
| 61 | - $written_total+=$ivoffset; |
|
| 62 | - if(strlen($data) == 0){ |
|
| 61 | + $written_total += $ivoffset; |
|
| 62 | + if (strlen($data) == 0) { |
|
| 63 | 63 | $decoded = ""; |
| 64 | 64 | return $written_total; |
| 65 | - }else{ |
|
| 66 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 67 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 68 | - $decoded = mdecrypt_generic($td,$data); |
|
| 65 | + }else { |
|
| 66 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 67 | + mcrypt_generic_init($td, $this->cek, $this->iv); |
|
| 68 | + $decoded = mdecrypt_generic($td, $data); |
|
| 69 | 69 | mcrypt_generic_deinit($td); |
| 70 | 70 | mcrypt_module_close($td); |
| 71 | 71 | } |
| 72 | 72 | |
| 73 | - $this->iv = substr($data,strlen($data)-$blocksize); |
|
| 73 | + $this->iv = substr($data, strlen($data)-$blocksize); |
|
| 74 | 74 | //判断是否需要删除最后填充的字符,以及获取填充的字符 |
| 75 | 75 | $needRemovePad = FALSE; |
| 76 | 76 | $pad = NULL; |
| 77 | 77 | |
| 78 | - if($this->currentIndex+strlen($decoded) >=$this->contentLength){ |
|
| 78 | + if ($this->currentIndex+strlen($decoded) >= $this->contentLength) { |
|
| 79 | 79 | $needRemovePad = TRUE; |
| 80 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
| 81 | - if($pad<=0||$pad>$blocksize) |
|
| 80 | + $pad = ord(substr($decoded, strlen($decoded)-1, 1)); |
|
| 81 | + if ($pad <= 0 || $pad > $blocksize) |
|
| 82 | 82 | { |
| 83 | 83 | //invalid pad |
| 84 | 84 | $needRemovePad = FALSE; |
@@ -88,21 +88,21 @@ discard block |
||
| 88 | 88 | //将解密后的数据截取到期望的长度 |
| 89 | 89 | $startOffset = 0; |
| 90 | 90 | $endOffset = 0; |
| 91 | - if(isset($this->expectedRange)){ |
|
| 91 | + if (isset($this->expectedRange)) { |
|
| 92 | 92 | $trueEnd = $expectedEnd = $this->expectedRange["end"]; |
| 93 | 93 | |
| 94 | - if($this->currentIndex+strlen($decoded)>$expectedEnd){ |
|
| 94 | + if ($this->currentIndex+strlen($decoded) > $expectedEnd) { |
|
| 95 | 95 | $preLength = strlen($decoded); |
| 96 | - $decoded = substr($decoded, 0,$expectedEnd-$this->currentIndex+1); |
|
| 96 | + $decoded = substr($decoded, 0, $expectedEnd-$this->currentIndex+1); |
|
| 97 | 97 | $endOffset = $preLength-strlen($decoded); |
| 98 | - }else{ |
|
| 98 | + }else { |
|
| 99 | 99 | //因为range是开始结束都计算的,range=1-2。currentIndex=1,长度是2,end=currentIndex+2-1 |
| 100 | 100 | $trueEnd = $this->currentIndex+strlen($decoded)-1; |
| 101 | 101 | } |
| 102 | 102 | $expectedStart = $this->expectedRange["start"]; |
| 103 | - if($this->currentIndex<$expectedStart){ |
|
| 104 | - $decoded = substr($decoded,$expectedStart - $this->currentIndex); |
|
| 105 | - $startOffset = $expectedStart - $this->currentIndex; |
|
| 103 | + if ($this->currentIndex < $expectedStart) { |
|
| 104 | + $decoded = substr($decoded, $expectedStart-$this->currentIndex); |
|
| 105 | + $startOffset = $expectedStart-$this->currentIndex; |
|
| 106 | 106 | } |
| 107 | 107 | //调整下次期望的开始 |
| 108 | 108 | $this->expectedRange["start"] = $trueEnd+1; |
@@ -110,56 +110,56 @@ discard block |
||
| 110 | 110 | |
| 111 | 111 | $padOffset = 0; |
| 112 | 112 | //再次根据截取的长度判断是否需要删除最后填充的字符 |
| 113 | - if($needRemovePad&&$endOffset > $pad){ |
|
| 113 | + if ($needRemovePad && $endOffset > $pad) { |
|
| 114 | 114 | $needRemovePad = FALSE; |
| 115 | 115 | } |
| 116 | 116 | $actualWriteCount = 0; |
| 117 | - if($needRemovePad){ |
|
| 117 | + if ($needRemovePad) { |
|
| 118 | 118 | $padOffset = $pad-$endOffset; |
| 119 | 119 | $actualWriteCount = strlen($decoded)-$padOffset; |
| 120 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 120 | + if ($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 121 | 121 | $decoded = ""; |
| 122 | 122 | else |
| 123 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 123 | + $decoded = substr($decoded, 0, strlen($decoded)-$padOffset); |
|
| 124 | 124 | } |
| 125 | 125 | $count = fwrite($write_stream, $decoded); |
| 126 | - if($count == 0) |
|
| 126 | + if ($count == 0) |
|
| 127 | 127 | $count = $actualWriteCount; |
| 128 | 128 | $count += $padOffset; |
| 129 | 129 | $count += $startOffset; |
| 130 | 130 | $count += $endOffset; |
| 131 | 131 | $this->currentIndex += $count; |
| 132 | - $written_total+=$count; |
|
| 132 | + $written_total += $count; |
|
| 133 | 133 | } |
| 134 | 134 | //否则curl框架会报错 |
| 135 | - $written_total+=strlen($this->buffer); |
|
| 135 | + $written_total += strlen($this->buffer); |
|
| 136 | 136 | return $written_total; |
| 137 | 137 | } |
| 138 | 138 | //是的话则使用初始化IV |
| 139 | - private function isBegin(){ |
|
| 139 | + private function isBegin() { |
|
| 140 | 140 | $beginIndex = 0; |
| 141 | - if(isset($this->adjustedRange["start"])) |
|
| 141 | + if (isset($this->adjustedRange["start"])) |
|
| 142 | 142 | $beginIndex = $this->adjustedRange["start"]; |
| 143 | - if($beginIndex == 0) |
|
| 143 | + if ($beginIndex == 0) |
|
| 144 | 144 | return TRUE; |
| 145 | 145 | else |
| 146 | 146 | return FALSE; |
| 147 | 147 | } |
| 148 | 148 | } |
| 149 | 149 | //上传 |
| 150 | -class AESCBCStreamReadCallBack{ |
|
| 150 | +class AESCBCStreamReadCallBack { |
|
| 151 | 151 | private $iv; |
| 152 | 152 | private $cek; |
| 153 | 153 | private $contentLength; |
| 154 | 154 | private $buffer; |
| 155 | 155 | private $hasread = 0; |
| 156 | - private $mutipartUpload =FALSE; |
|
| 156 | + private $mutipartUpload = FALSE; |
|
| 157 | 157 | private $isLastPart = FALSE; |
| 158 | - public function __set($property_name, $value){ |
|
| 159 | - $this->$property_name=$value; |
|
| 158 | + public function __set($property_name, $value) { |
|
| 159 | + $this->$property_name = $value; |
|
| 160 | 160 | } |
| 161 | - public function __get($property_name){ |
|
| 162 | - if(isset($this->$property_name)) |
|
| 161 | + public function __get($property_name) { |
|
| 162 | + if (isset($this->$property_name)) |
|
| 163 | 163 | { |
| 164 | 164 | return($this->$property_name); |
| 165 | 165 | }else |
@@ -167,7 +167,7 @@ discard block |
||
| 167 | 167 | return(NULL); |
| 168 | 168 | } |
| 169 | 169 | } |
| 170 | - public function streaming_read_callback($curl_handle,$file_handle,$length,$read_stream,$seek_position){ |
|
| 170 | + public function streaming_read_callback($curl_handle, $file_handle, $length, $read_stream, $seek_position) { |
|
| 171 | 171 | // Once we've sent as much as we're supposed to send... |
| 172 | 172 | if ($this->hasread >= $this->contentLength) |
| 173 | 173 | { |
@@ -175,7 +175,7 @@ discard block |
||
| 175 | 175 | return ''; |
| 176 | 176 | } |
| 177 | 177 | // If we're at the beginning of an upload and need to seek... |
| 178 | - if ($this->hasread == 0 && $seek_position>0 && $seek_position !== ftell($read_stream)) |
|
| 178 | + if ($this->hasread == 0 && $seek_position > 0 && $seek_position !== ftell($read_stream)) |
|
| 179 | 179 | { |
| 180 | 180 | if (fseek($read_stream, $seek_position) !== 0) |
| 181 | 181 | { |
@@ -184,38 +184,38 @@ discard block |
||
| 184 | 184 | } |
| 185 | 185 | |
| 186 | 186 | |
| 187 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
| 188 | - $needRead = min($this->contentLength - $this->hasread,$length); |
|
| 189 | - $read = fread($read_stream,$needRead); |
|
| 187 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_ECB); |
|
| 188 | + $needRead = min($this->contentLength-$this->hasread, $length); |
|
| 189 | + $read = fread($read_stream, $needRead); |
|
| 190 | 190 | $this->hasread += strlen($read); |
| 191 | 191 | $isLast = FALSE; |
| 192 | - if($this->hasread >= $this->contentLength){ |
|
| 192 | + if ($this->hasread >= $this->contentLength) { |
|
| 193 | 193 | $isLast = TRUE; |
| 194 | 194 | } |
| 195 | 195 | $data = $this->buffer.$read; |
| 196 | 196 | |
| 197 | 197 | $dataLength = strlen($data); |
| 198 | 198 | |
| 199 | - if(!$isLast){ |
|
| 200 | - $this->buffer = substr($data,$dataLength-$dataLength%$blocksize); |
|
| 201 | - $data = substr($data, 0,$dataLength-$dataLength%$blocksize); |
|
| 202 | - }else{ |
|
| 199 | + if (!$isLast) { |
|
| 200 | + $this->buffer = substr($data, $dataLength-$dataLength%$blocksize); |
|
| 201 | + $data = substr($data, 0, $dataLength-$dataLength%$blocksize); |
|
| 202 | + }else { |
|
| 203 | 203 | //分块上传除最后一块外肯定是blocksize大小的倍数,所以不需要填充。 |
| 204 | - if($this->mutipartUpload){ |
|
| 205 | - if($this->isLastPart){ |
|
| 204 | + if ($this->mutipartUpload) { |
|
| 205 | + if ($this->isLastPart) { |
|
| 206 | 206 | $this->buffer = NULL; |
| 207 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 208 | - }else{ |
|
| 207 | + $data = EncryptionUtil::PKCS5Padding($data, $blocksize); |
|
| 208 | + }else { |
|
| 209 | 209 | //donothing |
| 210 | 210 | } |
| 211 | - }else{ |
|
| 211 | + }else { |
|
| 212 | 212 | $this->buffer = NULL; |
| 213 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
| 213 | + $data = EncryptionUtil::PKCS5Padding($data, $blocksize); |
|
| 214 | 214 | } |
| 215 | 215 | } |
| 216 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
| 217 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
| 218 | - $encrypted = mcrypt_generic($td,$data); |
|
| 216 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
| 217 | + mcrypt_generic_init($td, $this->cek, $this->iv); |
|
| 218 | + $encrypted = mcrypt_generic($td, $data); |
|
| 219 | 219 | mcrypt_generic_deinit($td); |
| 220 | 220 | //去除自动填充的16个字节//php的当恰好为16的倍数时竟然不填充? |
| 221 | 221 | //$encrypted = substr($encrypted,0,strlen($encrypted)-$blocksize); |
@@ -20,7 +20,7 @@ discard block |
||
| 20 | 20 | if(isset($this->$property_name)) |
| 21 | 21 | { |
| 22 | 22 | return($this->$property_name); |
| 23 | - }else |
|
| 23 | + } else |
|
| 24 | 24 | { |
| 25 | 25 | return(NULL); |
| 26 | 26 | } |
@@ -33,9 +33,9 @@ discard block |
||
| 33 | 33 | //不能把上次的没读完的长度算在这次里,应该算在上次 |
| 34 | 34 | $written_total = 0-strlen($this->buffer); |
| 35 | 35 | $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
| 36 | - if($length<$blocksize) |
|
| 37 | - $this->buffer = $data; |
|
| 38 | - else{ |
|
| 36 | + if($length<$blocksize) { |
|
| 37 | + $this->buffer = $data; |
|
| 38 | + } else{ |
|
| 39 | 39 | //如果期望的范围之后还有数据,则认为数据已经接收完毕。不做任何处理 |
| 40 | 40 | if($this->expectedRange["end"] < $this->expectedRange["start"]){ |
| 41 | 41 | return $written_total+strlen($data); |
@@ -53,16 +53,17 @@ discard block |
||
| 53 | 53 | $ivoffset = $blocksize; |
| 54 | 54 | } |
| 55 | 55 | //初始化当前位置 |
| 56 | - if(isset($this->adjustedRange)) |
|
| 57 | - $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
|
| 58 | - else |
|
| 59 | - $this->currentIndex = $ivoffset; |
|
| 56 | + if(isset($this->adjustedRange)) { |
|
| 57 | + $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
|
| 58 | + } else { |
|
| 59 | + $this->currentIndex = $ivoffset; |
|
| 60 | + } |
|
| 60 | 61 | } |
| 61 | 62 | $written_total+=$ivoffset; |
| 62 | 63 | if(strlen($data) == 0){ |
| 63 | 64 | $decoded = ""; |
| 64 | 65 | return $written_total; |
| 65 | - }else{ |
|
| 66 | + } else{ |
|
| 66 | 67 | $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
| 67 | 68 | mcrypt_generic_init($td,$this->cek,$this->iv); |
| 68 | 69 | $decoded = mdecrypt_generic($td,$data); |
@@ -95,7 +96,7 @@ discard block |
||
| 95 | 96 | $preLength = strlen($decoded); |
| 96 | 97 | $decoded = substr($decoded, 0,$expectedEnd-$this->currentIndex+1); |
| 97 | 98 | $endOffset = $preLength-strlen($decoded); |
| 98 | - }else{ |
|
| 99 | + } else{ |
|
| 99 | 100 | //因为range是开始结束都计算的,range=1-2。currentIndex=1,长度是2,end=currentIndex+2-1 |
| 100 | 101 | $trueEnd = $this->currentIndex+strlen($decoded)-1; |
| 101 | 102 | } |
@@ -117,14 +118,17 @@ discard block |
||
| 117 | 118 | if($needRemovePad){ |
| 118 | 119 | $padOffset = $pad-$endOffset; |
| 119 | 120 | $actualWriteCount = strlen($decoded)-$padOffset; |
| 120 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
| 121 | + if($actualWriteCount <= 0) { |
|
| 122 | + //负数的情况就是用户期望的range里全是填充的 |
|
| 121 | 123 | $decoded = ""; |
| 122 | - else |
|
| 123 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 124 | + } else { |
|
| 125 | + $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
| 126 | + } |
|
| 124 | 127 | } |
| 125 | 128 | $count = fwrite($write_stream, $decoded); |
| 126 | - if($count == 0) |
|
| 127 | - $count = $actualWriteCount; |
|
| 129 | + if($count == 0) { |
|
| 130 | + $count = $actualWriteCount; |
|
| 131 | + } |
|
| 128 | 132 | $count += $padOffset; |
| 129 | 133 | $count += $startOffset; |
| 130 | 134 | $count += $endOffset; |
@@ -138,12 +142,14 @@ discard block |
||
| 138 | 142 | //是的话则使用初始化IV |
| 139 | 143 | private function isBegin(){ |
| 140 | 144 | $beginIndex = 0; |
| 141 | - if(isset($this->adjustedRange["start"])) |
|
| 142 | - $beginIndex = $this->adjustedRange["start"]; |
|
| 143 | - if($beginIndex == 0) |
|
| 144 | - return TRUE; |
|
| 145 | - else |
|
| 146 | - return FALSE; |
|
| 145 | + if(isset($this->adjustedRange["start"])) { |
|
| 146 | + $beginIndex = $this->adjustedRange["start"]; |
|
| 147 | + } |
|
| 148 | + if($beginIndex == 0) { |
|
| 149 | + return TRUE; |
|
| 150 | + } else { |
|
| 151 | + return FALSE; |
|
| 152 | + } |
|
| 147 | 153 | } |
| 148 | 154 | } |
| 149 | 155 | //上传 |
@@ -162,7 +168,7 @@ discard block |
||
| 162 | 168 | if(isset($this->$property_name)) |
| 163 | 169 | { |
| 164 | 170 | return($this->$property_name); |
| 165 | - }else |
|
| 171 | + } else |
|
| 166 | 172 | { |
| 167 | 173 | return(NULL); |
| 168 | 174 | } |
@@ -199,16 +205,16 @@ discard block |
||
| 199 | 205 | if(!$isLast){ |
| 200 | 206 | $this->buffer = substr($data,$dataLength-$dataLength%$blocksize); |
| 201 | 207 | $data = substr($data, 0,$dataLength-$dataLength%$blocksize); |
| 202 | - }else{ |
|
| 208 | + } else{ |
|
| 203 | 209 | //分块上传除最后一块外肯定是blocksize大小的倍数,所以不需要填充。 |
| 204 | 210 | if($this->mutipartUpload){ |
| 205 | 211 | if($this->isLastPart){ |
| 206 | 212 | $this->buffer = NULL; |
| 207 | 213 | $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
| 208 | - }else{ |
|
| 214 | + } else{ |
|
| 209 | 215 | //donothing |
| 210 | 216 | } |
| 211 | - }else{ |
|
| 217 | + } else{ |
|
| 212 | 218 | $this->buffer = NULL; |
| 213 | 219 | $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
| 214 | 220 | } |