12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231 |
- // Copyright (C) 2019 Nicola Murino
- //
- // This program is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Affero General Public License as published
- // by the Free Software Foundation, version 3.
- //
- // This program is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Affero General Public License for more details.
- //
- // You should have received a copy of the GNU Affero General Public License
- // along with this program. If not, see <https://www.gnu.org/licenses/>.
- package httpd
- import (
- "bytes"
- "encoding/json"
- "errors"
- "fmt"
- "html/template"
- "io"
- "math"
- "net/http"
- "net/url"
- "os"
- "path"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- "github.com/go-chi/render"
- "github.com/rs/xid"
- "github.com/sftpgo/sdk"
- "github.com/drakkan/sftpgo/v2/internal/common"
- "github.com/drakkan/sftpgo/v2/internal/dataprovider"
- "github.com/drakkan/sftpgo/v2/internal/logger"
- "github.com/drakkan/sftpgo/v2/internal/mfa"
- "github.com/drakkan/sftpgo/v2/internal/smtp"
- "github.com/drakkan/sftpgo/v2/internal/util"
- "github.com/drakkan/sftpgo/v2/internal/vfs"
- )
- const (
- templateClientDir = "webclient"
- templateClientBase = "base.html"
- templateClientFiles = "files.html"
- templateClientProfile = "profile.html"
- templateClientMFA = "mfa.html"
- templateClientEditFile = "editfile.html"
- templateClientShare = "share.html"
- templateClientShares = "shares.html"
- templateClientViewPDF = "viewpdf.html"
- templateShareLogin = "sharelogin.html"
- templateShareDownload = "sharedownload.html"
- templateUploadToShare = "shareupload.html"
- )
- // condResult is the result of an HTTP request precondition check.
- // See https://tools.ietf.org/html/rfc7232 section 3.
- type condResult int
- const (
- condNone condResult = iota
- condTrue
- condFalse
- )
- var (
- clientTemplates = make(map[string]*template.Template)
- unixEpochTime = time.Unix(0, 0)
- )
- // isZeroTime reports whether t is obviously unspecified (either zero or Unix()=0).
- func isZeroTime(t time.Time) bool {
- return t.IsZero() || t.Equal(unixEpochTime)
- }
- type baseClientPage struct {
- commonBasePage
- Title string
- CurrentURL string
- FilesURL string
- SharesURL string
- ShareURL string
- ProfileURL string
- PingURL string
- ChangePwdURL string
- LogoutURL string
- LoginURL string
- EditURL string
- MFAURL string
- CSRFToken string
- LoggedUser *dataprovider.User
- Branding UIBranding
- }
- type dirMapping struct {
- DirName string
- Href string
- }
- type viewPDFPage struct {
- commonBasePage
- Title string
- URL string
- Branding UIBranding
- }
- type editFilePage struct {
- baseClientPage
- CurrentDir string
- FileURL string
- Path string
- Name string
- ReadOnly bool
- Data string
- }
- type filesPage struct {
- baseClientPage
- CurrentDir string
- DirsURL string
- FileActionsURL string
- CheckExistURL string
- DownloadURL string
- ViewPDFURL string
- FileURL string
- TasksURL string
- CanAddFiles bool
- CanCreateDirs bool
- CanRename bool
- CanDelete bool
- CanDownload bool
- CanShare bool
- CanCopy bool
- ShareUploadBaseURL string
- Error *util.I18nError
- Paths []dirMapping
- QuotaUsage *userQuotaUsage
- }
- type shareLoginPage struct {
- commonBasePage
- CurrentURL string
- Error *util.I18nError
- CSRFToken string
- Title string
- Branding UIBranding
- }
- type shareDownloadPage struct {
- baseClientPage
- DownloadLink string
- }
- type shareUploadPage struct {
- baseClientPage
- Share *dataprovider.Share
- UploadBasePath string
- }
- type clientMessagePage struct {
- baseClientPage
- Error *util.I18nError
- Success string
- Text string
- }
- type clientProfilePage struct {
- baseClientPage
- PublicKeys []string
- TLSCerts []string
- CanSubmit bool
- AllowAPIKeyAuth bool
- Email string
- Description string
- Error *util.I18nError
- }
- type changeClientPasswordPage struct {
- baseClientPage
- Error *util.I18nError
- }
- type clientMFAPage struct {
- baseClientPage
- TOTPConfigs []string
- TOTPConfig dataprovider.UserTOTPConfig
- GenerateTOTPURL string
- ValidateTOTPURL string
- SaveTOTPURL string
- RecCodesURL string
- Protocols []string
- RequiredProtocols []string
- }
- type clientSharesPage struct {
- baseClientPage
- BasePublicSharesURL string
- }
- type clientSharePage struct {
- baseClientPage
- Share *dataprovider.Share
- Error *util.I18nError
- IsAdd bool
- }
- type userQuotaUsage struct {
- QuotaSize int64
- QuotaFiles int
- UsedQuotaSize int64
- UsedQuotaFiles int
- UploadDataTransfer int64
- DownloadDataTransfer int64
- TotalDataTransfer int64
- UsedUploadDataTransfer int64
- UsedDownloadDataTransfer int64
- }
- func (u *userQuotaUsage) HasQuotaInfo() bool {
- if dataprovider.GetQuotaTracking() == 0 {
- return false
- }
- if u.HasDiskQuota() {
- return true
- }
- return u.HasTranferQuota()
- }
- func (u *userQuotaUsage) HasDiskQuota() bool {
- if u.QuotaSize > 0 || u.UsedQuotaSize > 0 {
- return true
- }
- return u.QuotaFiles > 0 || u.UsedQuotaFiles > 0
- }
- func (u *userQuotaUsage) HasTranferQuota() bool {
- if u.TotalDataTransfer > 0 || u.UploadDataTransfer > 0 || u.DownloadDataTransfer > 0 {
- return true
- }
- return u.UsedDownloadDataTransfer > 0 || u.UsedUploadDataTransfer > 0
- }
- func (u *userQuotaUsage) GetQuotaSize() string {
- if u.QuotaSize > 0 {
- return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedQuotaSize), util.ByteCountIEC(u.QuotaSize))
- }
- if u.UsedQuotaSize > 0 {
- return util.ByteCountIEC(u.UsedQuotaSize)
- }
- return ""
- }
- func (u *userQuotaUsage) GetQuotaFiles() string {
- if u.QuotaFiles > 0 {
- return fmt.Sprintf("%d/%d", u.UsedQuotaFiles, u.QuotaFiles)
- }
- if u.UsedQuotaFiles > 0 {
- return strconv.FormatInt(int64(u.UsedQuotaFiles), 10)
- }
- return ""
- }
- func (u *userQuotaUsage) GetQuotaSizePercentage() int {
- if u.QuotaSize > 0 {
- return int(math.Round(100 * float64(u.UsedQuotaSize) / float64(u.QuotaSize)))
- }
- return 0
- }
- func (u *userQuotaUsage) GetQuotaFilesPercentage() int {
- if u.QuotaFiles > 0 {
- return int(math.Round(100 * float64(u.UsedQuotaFiles) / float64(u.QuotaFiles)))
- }
- return 0
- }
- func (u *userQuotaUsage) IsQuotaSizeLow() bool {
- return u.GetQuotaSizePercentage() > 85
- }
- func (u *userQuotaUsage) IsQuotaFilesLow() bool {
- return u.GetQuotaFilesPercentage() > 85
- }
- func (u *userQuotaUsage) IsDiskQuotaLow() bool {
- return u.IsQuotaSizeLow() || u.IsQuotaFilesLow()
- }
- func (u *userQuotaUsage) GetTotalTransferQuota() string {
- total := u.UsedUploadDataTransfer + u.UsedDownloadDataTransfer
- if u.TotalDataTransfer > 0 {
- return fmt.Sprintf("%s/%s", util.ByteCountIEC(total), util.ByteCountIEC(u.TotalDataTransfer*1048576))
- }
- if total > 0 {
- return util.ByteCountIEC(total)
- }
- return ""
- }
- func (u *userQuotaUsage) GetUploadTransferQuota() string {
- if u.UploadDataTransfer > 0 {
- return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedUploadDataTransfer),
- util.ByteCountIEC(u.UploadDataTransfer*1048576))
- }
- if u.UsedUploadDataTransfer > 0 {
- return util.ByteCountIEC(u.UsedUploadDataTransfer)
- }
- return ""
- }
- func (u *userQuotaUsage) GetDownloadTransferQuota() string {
- if u.DownloadDataTransfer > 0 {
- return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedDownloadDataTransfer),
- util.ByteCountIEC(u.DownloadDataTransfer*1048576))
- }
- if u.UsedDownloadDataTransfer > 0 {
- return util.ByteCountIEC(u.UsedDownloadDataTransfer)
- }
- return ""
- }
- func (u *userQuotaUsage) GetTotalTransferQuotaPercentage() int {
- if u.TotalDataTransfer > 0 {
- return int(math.Round(100 * float64(u.UsedDownloadDataTransfer+u.UsedUploadDataTransfer) / float64(u.TotalDataTransfer*1048576)))
- }
- return 0
- }
- func (u *userQuotaUsage) GetUploadTransferQuotaPercentage() int {
- if u.UploadDataTransfer > 0 {
- return int(math.Round(100 * float64(u.UsedUploadDataTransfer) / float64(u.UploadDataTransfer*1048576)))
- }
- return 0
- }
- func (u *userQuotaUsage) GetDownloadTransferQuotaPercentage() int {
- if u.DownloadDataTransfer > 0 {
- return int(math.Round(100 * float64(u.UsedDownloadDataTransfer) / float64(u.DownloadDataTransfer*1048576)))
- }
- return 0
- }
- func (u *userQuotaUsage) IsTotalTransferQuotaLow() bool {
- if u.TotalDataTransfer > 0 {
- return u.GetTotalTransferQuotaPercentage() > 85
- }
- return false
- }
- func (u *userQuotaUsage) IsUploadTransferQuotaLow() bool {
- if u.UploadDataTransfer > 0 {
- return u.GetUploadTransferQuotaPercentage() > 85
- }
- return false
- }
- func (u *userQuotaUsage) IsDownloadTransferQuotaLow() bool {
- if u.DownloadDataTransfer > 0 {
- return u.GetDownloadTransferQuotaPercentage() > 85
- }
- return false
- }
- func (u *userQuotaUsage) IsTransferQuotaLow() bool {
- return u.IsTotalTransferQuotaLow() || u.IsUploadTransferQuotaLow() || u.IsDownloadTransferQuotaLow()
- }
- func (u *userQuotaUsage) IsQuotaLow() bool {
- return u.IsDiskQuotaLow() || u.IsTransferQuotaLow()
- }
- func newUserQuotaUsage(u *dataprovider.User) *userQuotaUsage {
- return &userQuotaUsage{
- QuotaSize: u.QuotaSize,
- QuotaFiles: u.QuotaFiles,
- UsedQuotaSize: u.UsedQuotaSize,
- UsedQuotaFiles: u.UsedQuotaFiles,
- TotalDataTransfer: u.TotalDataTransfer,
- UploadDataTransfer: u.UploadDataTransfer,
- DownloadDataTransfer: u.DownloadDataTransfer,
- UsedUploadDataTransfer: u.UsedUploadDataTransfer,
- UsedDownloadDataTransfer: u.UsedDownloadDataTransfer,
- }
- }
- func getFileObjectURL(baseDir, name, baseWebPath string) string {
- return fmt.Sprintf("%v?path=%v&_=%v", baseWebPath, url.QueryEscape(path.Join(baseDir, name)), time.Now().UTC().Unix())
- }
- func getFileObjectModTime(t time.Time) int64 {
- if isZeroTime(t) {
- return 0
- }
- return t.UnixMilli()
- }
- func loadClientTemplates(templatesPath string) {
- filesPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientFiles),
- }
- editFilePath := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientEditFile),
- }
- sharesPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientShares),
- }
- sharePaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientShare),
- }
- profilePaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientProfile),
- }
- changePwdPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateCommonDir, templateChangePwd),
- }
- loginPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateCommonDir, templateCommonLogin),
- }
- messagePaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateCommonDir, templateMessage),
- }
- mfaPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateClientMFA),
- }
- twoFactorPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateCommonDir, templateTwoFactor),
- }
- twoFactorRecoveryPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateCommonDir, templateTwoFactorRecovery),
- }
- forgotPwdPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateCommonDir, templateForgotPassword),
- }
- resetPwdPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateCommonDir, templateResetPassword),
- }
- viewPDFPaths := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientViewPDF),
- }
- shareLoginPath := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
- filepath.Join(templatesPath, templateClientDir, templateShareLogin),
- }
- shareUploadPath := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateUploadToShare),
- }
- shareDownloadPath := []string{
- filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
- filepath.Join(templatesPath, templateClientDir, templateClientBase),
- filepath.Join(templatesPath, templateClientDir, templateShareDownload),
- }
- filesTmpl := util.LoadTemplate(nil, filesPaths...)
- profileTmpl := util.LoadTemplate(nil, profilePaths...)
- changePwdTmpl := util.LoadTemplate(nil, changePwdPaths...)
- loginTmpl := util.LoadTemplate(nil, loginPaths...)
- messageTmpl := util.LoadTemplate(nil, messagePaths...)
- mfaTmpl := util.LoadTemplate(nil, mfaPaths...)
- twoFactorTmpl := util.LoadTemplate(nil, twoFactorPaths...)
- twoFactorRecoveryTmpl := util.LoadTemplate(nil, twoFactorRecoveryPaths...)
- editFileTmpl := util.LoadTemplate(nil, editFilePath...)
- shareLoginTmpl := util.LoadTemplate(nil, shareLoginPath...)
- sharesTmpl := util.LoadTemplate(nil, sharesPaths...)
- shareTmpl := util.LoadTemplate(nil, sharePaths...)
- forgotPwdTmpl := util.LoadTemplate(nil, forgotPwdPaths...)
- resetPwdTmpl := util.LoadTemplate(nil, resetPwdPaths...)
- viewPDFTmpl := util.LoadTemplate(nil, viewPDFPaths...)
- shareUploadTmpl := util.LoadTemplate(nil, shareUploadPath...)
- shareDownloadTmpl := util.LoadTemplate(nil, shareDownloadPath...)
- clientTemplates[templateClientFiles] = filesTmpl
- clientTemplates[templateClientProfile] = profileTmpl
- clientTemplates[templateChangePwd] = changePwdTmpl
- clientTemplates[templateCommonLogin] = loginTmpl
- clientTemplates[templateMessage] = messageTmpl
- clientTemplates[templateClientMFA] = mfaTmpl
- clientTemplates[templateTwoFactor] = twoFactorTmpl
- clientTemplates[templateTwoFactorRecovery] = twoFactorRecoveryTmpl
- clientTemplates[templateClientEditFile] = editFileTmpl
- clientTemplates[templateClientShares] = sharesTmpl
- clientTemplates[templateClientShare] = shareTmpl
- clientTemplates[templateForgotPassword] = forgotPwdTmpl
- clientTemplates[templateResetPassword] = resetPwdTmpl
- clientTemplates[templateClientViewPDF] = viewPDFTmpl
- clientTemplates[templateShareLogin] = shareLoginTmpl
- clientTemplates[templateUploadToShare] = shareUploadTmpl
- clientTemplates[templateShareDownload] = shareDownloadTmpl
- }
- func (s *httpdServer) getBaseClientPageData(title, currentURL string, r *http.Request) baseClientPage {
- var csrfToken string
- if currentURL != "" {
- csrfToken = createCSRFToken(util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- data := baseClientPage{
- commonBasePage: getCommonBasePage(r),
- Title: title,
- CurrentURL: currentURL,
- FilesURL: webClientFilesPath,
- SharesURL: webClientSharesPath,
- ShareURL: webClientSharePath,
- ProfileURL: webClientProfilePath,
- PingURL: webClientPingPath,
- ChangePwdURL: webChangeClientPwdPath,
- LogoutURL: webClientLogoutPath,
- EditURL: webClientEditFilePath,
- MFAURL: webClientMFAPath,
- CSRFToken: csrfToken,
- LoggedUser: getUserFromToken(r),
- Branding: s.binding.Branding.WebClient,
- }
- if !strings.HasPrefix(r.RequestURI, webClientPubSharesPath) {
- data.LoginURL = webClientLoginPath
- }
- return data
- }
- func (s *httpdServer) renderClientForgotPwdPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
- data := forgotPwdPage{
- commonBasePage: getCommonBasePage(r),
- CurrentURL: webClientForgotPwdPath,
- Error: err,
- CSRFToken: createCSRFToken(ip),
- LoginURL: webClientLoginPath,
- Title: util.I18nForgotPwdTitle,
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateForgotPassword, data)
- }
- func (s *httpdServer) renderClientResetPwdPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
- data := resetPwdPage{
- commonBasePage: getCommonBasePage(r),
- CurrentURL: webClientResetPwdPath,
- Error: err,
- CSRFToken: createCSRFToken(ip),
- LoginURL: webClientLoginPath,
- Title: util.I18nResetPwdTitle,
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateResetPassword, data)
- }
- func (s *httpdServer) renderShareLoginPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
- data := shareLoginPage{
- commonBasePage: getCommonBasePage(r),
- Title: util.I18nShareLoginTitle,
- CurrentURL: r.RequestURI,
- Error: err,
- CSRFToken: createCSRFToken(ip),
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateShareLogin, data)
- }
- func renderClientTemplate(w http.ResponseWriter, tmplName string, data any) {
- err := clientTemplates[tmplName].ExecuteTemplate(w, tmplName, data)
- if err != nil {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- }
- }
- func (s *httpdServer) renderClientMessagePage(w http.ResponseWriter, r *http.Request, title string, statusCode int, err error, message string) {
- data := clientMessagePage{
- baseClientPage: s.getBaseClientPageData(title, "", r),
- Error: getI18nError(err),
- Success: message,
- }
- w.WriteHeader(statusCode)
- renderClientTemplate(w, templateMessage, data)
- }
- func (s *httpdServer) renderClientInternalServerErrorPage(w http.ResponseWriter, r *http.Request, err error) {
- s.renderClientMessagePage(w, r, util.I18nError500Title, http.StatusInternalServerError,
- util.NewI18nError(err, util.I18nError500Message), "")
- }
- func (s *httpdServer) renderClientBadRequestPage(w http.ResponseWriter, r *http.Request, err error) {
- s.renderClientMessagePage(w, r, util.I18nError400Title, http.StatusBadRequest,
- util.NewI18nError(err, util.I18nError400Message), "")
- }
- func (s *httpdServer) renderClientForbiddenPage(w http.ResponseWriter, r *http.Request, err error) {
- s.renderClientMessagePage(w, r, util.I18nError403Title, http.StatusForbidden,
- util.NewI18nError(err, util.I18nError403Message), "")
- }
- func (s *httpdServer) renderClientNotFoundPage(w http.ResponseWriter, r *http.Request, err error) {
- s.renderClientMessagePage(w, r, util.I18nError404Title, http.StatusNotFound,
- util.NewI18nError(err, util.I18nError404Message), "")
- }
- func (s *httpdServer) renderClientTwoFactorPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
- data := twoFactorPage{
- commonBasePage: getCommonBasePage(r),
- Title: pageTwoFactorTitle,
- CurrentURL: webClientTwoFactorPath,
- Error: err,
- CSRFToken: createCSRFToken(ip),
- RecoveryURL: webClientTwoFactorRecoveryPath,
- Branding: s.binding.Branding.WebClient,
- }
- if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
- data.CurrentURL += "?next=" + url.QueryEscape(next)
- }
- renderClientTemplate(w, templateTwoFactor, data)
- }
- func (s *httpdServer) renderClientTwoFactorRecoveryPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
- data := twoFactorPage{
- commonBasePage: getCommonBasePage(r),
- Title: pageTwoFactorRecoveryTitle,
- CurrentURL: webClientTwoFactorRecoveryPath,
- Error: err,
- CSRFToken: createCSRFToken(ip),
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateTwoFactorRecovery, data)
- }
- func (s *httpdServer) renderClientMFAPage(w http.ResponseWriter, r *http.Request) {
- data := clientMFAPage{
- baseClientPage: s.getBaseClientPageData(util.I18n2FATitle, webClientMFAPath, r),
- TOTPConfigs: mfa.GetAvailableTOTPConfigNames(),
- GenerateTOTPURL: webClientTOTPGeneratePath,
- ValidateTOTPURL: webClientTOTPValidatePath,
- SaveTOTPURL: webClientTOTPSavePath,
- RecCodesURL: webClientRecoveryCodesPath,
- Protocols: dataprovider.MFAProtocols,
- }
- user, err := dataprovider.GetUserWithGroupSettings(data.LoggedUser.Username, "")
- if err != nil {
- s.renderClientInternalServerErrorPage(w, r, err)
- return
- }
- data.TOTPConfig = user.Filters.TOTPConfig
- data.RequiredProtocols = user.Filters.TwoFactorAuthProtocols
- renderClientTemplate(w, templateClientMFA, data)
- }
- func (s *httpdServer) renderEditFilePage(w http.ResponseWriter, r *http.Request, fileName, fileData string, readOnly bool) {
- title := util.I18nViewFileTitle
- if !readOnly {
- title = util.I18nEditFileTitle
- }
- data := editFilePage{
- baseClientPage: s.getBaseClientPageData(title, webClientEditFilePath, r),
- Path: fileName,
- Name: path.Base(fileName),
- CurrentDir: path.Dir(fileName),
- FileURL: webClientFilePath,
- ReadOnly: readOnly,
- Data: fileData,
- }
- renderClientTemplate(w, templateClientEditFile, data)
- }
- func (s *httpdServer) renderAddUpdateSharePage(w http.ResponseWriter, r *http.Request, share *dataprovider.Share,
- err *util.I18nError, isAdd bool) {
- currentURL := webClientSharePath
- title := util.I18nShareAddTitle
- if !isAdd {
- currentURL = fmt.Sprintf("%v/%v", webClientSharePath, url.PathEscape(share.ShareID))
- title = util.I18nShareUpdateTitle
- }
- data := clientSharePage{
- baseClientPage: s.getBaseClientPageData(title, currentURL, r),
- Share: share,
- Error: err,
- IsAdd: isAdd,
- }
- renderClientTemplate(w, templateClientShare, data)
- }
- func getDirMapping(dirName, baseWebPath string) []dirMapping {
- paths := []dirMapping{}
- if dirName != "/" {
- paths = append(paths, dirMapping{
- DirName: path.Base(dirName),
- Href: getFileObjectURL("/", dirName, baseWebPath),
- })
- for {
- dirName = path.Dir(dirName)
- if dirName == "/" || dirName == "." {
- break
- }
- paths = append([]dirMapping{{
- DirName: path.Base(dirName),
- Href: getFileObjectURL("/", dirName, baseWebPath)},
- }, paths...)
- }
- }
- return paths
- }
- func (s *httpdServer) renderSharedFilesPage(w http.ResponseWriter, r *http.Request, dirName string,
- err *util.I18nError, share dataprovider.Share,
- ) {
- currentURL := path.Join(webClientPubSharesPath, share.ShareID, "browse")
- baseData := s.getBaseClientPageData(util.I18nSharedFilesTitle, currentURL, r)
- baseData.FilesURL = currentURL
- baseSharePath := path.Join(webClientPubSharesPath, share.ShareID)
- data := filesPage{
- baseClientPage: baseData,
- Error: err,
- CurrentDir: url.QueryEscape(dirName),
- DownloadURL: path.Join(baseSharePath, "partial"),
- // dirName must be escaped because the router expects the full path as single argument
- ShareUploadBaseURL: path.Join(baseSharePath, url.PathEscape(dirName)),
- ViewPDFURL: path.Join(baseSharePath, "viewpdf"),
- DirsURL: path.Join(baseSharePath, "dirs"),
- FileURL: "",
- FileActionsURL: "",
- CheckExistURL: path.Join(baseSharePath, "browse", "exist"),
- TasksURL: "",
- CanAddFiles: share.Scope == dataprovider.ShareScopeReadWrite,
- CanCreateDirs: false,
- CanRename: false,
- CanDelete: false,
- CanDownload: share.Scope != dataprovider.ShareScopeWrite,
- CanShare: false,
- CanCopy: false,
- Paths: getDirMapping(dirName, currentURL),
- QuotaUsage: newUserQuotaUsage(&dataprovider.User{}),
- }
- renderClientTemplate(w, templateClientFiles, data)
- }
- func (s *httpdServer) renderShareDownloadPage(w http.ResponseWriter, r *http.Request, downloadLink string) {
- data := shareDownloadPage{
- baseClientPage: s.getBaseClientPageData(util.I18nShareDownloadTitle, "", r),
- DownloadLink: downloadLink,
- }
- renderClientTemplate(w, templateShareDownload, data)
- }
- func (s *httpdServer) renderUploadToSharePage(w http.ResponseWriter, r *http.Request, share dataprovider.Share) {
- currentURL := path.Join(webClientPubSharesPath, share.ShareID, "upload")
- data := shareUploadPage{
- baseClientPage: s.getBaseClientPageData(util.I18nShareUploadTitle, currentURL, r),
- Share: &share,
- UploadBasePath: path.Join(webClientPubSharesPath, share.ShareID),
- }
- renderClientTemplate(w, templateUploadToShare, data)
- }
- func (s *httpdServer) renderFilesPage(w http.ResponseWriter, r *http.Request, dirName string,
- err *util.I18nError, user *dataprovider.User) {
- data := filesPage{
- baseClientPage: s.getBaseClientPageData(util.I18nFilesTitle, webClientFilesPath, r),
- Error: err,
- CurrentDir: url.QueryEscape(dirName),
- DownloadURL: webClientDownloadZipPath,
- ViewPDFURL: webClientViewPDFPath,
- DirsURL: webClientDirsPath,
- FileURL: webClientFilePath,
- FileActionsURL: webClientFileActionsPath,
- CheckExistURL: webClientExistPath,
- TasksURL: webClientTasksPath,
- CanAddFiles: user.CanAddFilesFromWeb(dirName),
- CanCreateDirs: user.CanAddDirsFromWeb(dirName),
- CanRename: user.CanRenameFromWeb(dirName, dirName),
- CanDelete: user.CanDeleteFromWeb(dirName),
- CanDownload: user.HasPerm(dataprovider.PermDownload, dirName),
- CanShare: user.CanManageShares(),
- CanCopy: user.CanCopyFromWeb(dirName, dirName),
- ShareUploadBaseURL: "",
- Paths: getDirMapping(dirName, webClientFilesPath),
- QuotaUsage: newUserQuotaUsage(user),
- }
- renderClientTemplate(w, templateClientFiles, data)
- }
- func (s *httpdServer) renderClientProfilePage(w http.ResponseWriter, r *http.Request, err *util.I18nError) {
- data := clientProfilePage{
- baseClientPage: s.getBaseClientPageData(util.I18nProfileTitle, webClientProfilePath, r),
- Error: err,
- }
- user, userMerged, errUser := dataprovider.GetUserVariants(data.LoggedUser.Username, "")
- if errUser != nil {
- s.renderClientInternalServerErrorPage(w, r, errUser)
- return
- }
- data.PublicKeys = user.PublicKeys
- data.TLSCerts = user.Filters.TLSCerts
- data.AllowAPIKeyAuth = user.Filters.AllowAPIKeyAuth
- data.Email = user.Email
- data.Description = user.Description
- data.CanSubmit = userMerged.CanUpdateProfile()
- renderClientTemplate(w, templateClientProfile, data)
- }
- func (s *httpdServer) renderClientChangePasswordPage(w http.ResponseWriter, r *http.Request, err *util.I18nError) {
- data := changeClientPasswordPage{
- baseClientPage: s.getBaseClientPageData(util.I18nChangePwdTitle, webChangeClientPwdPath, r),
- Error: err,
- }
- renderClientTemplate(w, templateChangePwd, data)
- }
- func (s *httpdServer) handleWebClientDownloadZip(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxMultipartMem)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- if err := r.ParseForm(); err != nil {
- s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorGetUser), "")
- return
- }
- connID := xid.New().String()
- protocol := getProtocolFromRequest(r)
- connectionID := fmt.Sprintf("%v_%v", protocol, connID)
- if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
- s.renderClientForbiddenPage(w, r, err)
- return
- }
- connection := &Connection{
- BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
- r.RemoteAddr, user),
- request: r,
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- files := r.Form.Get("files")
- var filesList []string
- err = json.Unmarshal([]byte(files), &filesList)
- if err != nil {
- s.renderClientBadRequestPage(w, r, err)
- return
- }
- w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
- getCompressedFileName(connection.GetUsername(), filesList)))
- renderCompressedFiles(w, connection, name, filesList, nil)
- }
- func (s *httpdServer) handleClientSharePartialDownload(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxMultipartMem)
- if err := r.ParseForm(); err != nil {
- s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
- return
- }
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
- share, connection, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if err := validateBrowsableShare(share, connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- name, err := getBrowsableSharedPath(share.Paths[0], r)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- transferQuota := connection.GetTransferQuota()
- if !transferQuota.HasDownloadSpace() {
- err = util.NewI18nError(connection.GetReadQuotaExceededError(), util.I18nErrorQuotaRead)
- connection.Log(logger.LevelInfo, "denying share read due to quota limits")
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getMappedStatusCode(err), err, "")
- return
- }
- files := r.Form.Get("files")
- var filesList []string
- err = json.Unmarshal([]byte(files), &filesList)
- if err != nil {
- s.renderClientBadRequestPage(w, r, err)
- return
- }
- dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
- w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
- getCompressedFileName(fmt.Sprintf("share-%s", share.Name), filesList)))
- renderCompressedFiles(w, connection, name, filesList, &share)
- }
- func (s *httpdServer) handleShareGetDirContents(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
- share, connection, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if err := validateBrowsableShare(share, connection); err != nil {
- sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError500Message), getRespStatus(err))
- return
- }
- name, err := getBrowsableSharedPath(share.Paths[0], r)
- if err != nil {
- sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError500Message), getRespStatus(err))
- return
- }
- if err = common.Connections.Add(connection); err != nil {
- sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError429Message), http.StatusTooManyRequests)
- return
- }
- defer common.Connections.Remove(connection.GetID())
- lister, err := connection.ReadDir(name)
- if err != nil {
- sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nErrorDirListGeneric), getMappedStatusCode(err))
- return
- }
- defer lister.Close()
- dataGetter := func(limit, _ int) ([]byte, int, error) {
- contents, err := lister.Next(limit)
- if errors.Is(err, io.EOF) {
- err = nil
- }
- if err != nil {
- return nil, 0, err
- }
- results := make([]map[string]any, 0, len(contents))
- for _, info := range contents {
- if !info.Mode().IsDir() && !info.Mode().IsRegular() {
- continue
- }
- res := make(map[string]any)
- if info.IsDir() {
- res["type"] = "1"
- res["size"] = ""
- } else {
- res["type"] = "2"
- res["size"] = info.Size()
- }
- res["meta"] = fmt.Sprintf("%v_%v", res["type"], info.Name())
- res["name"] = info.Name()
- res["url"] = getFileObjectURL(share.GetRelativePath(name), info.Name(),
- path.Join(webClientPubSharesPath, share.ShareID, "browse"))
- res["last_modified"] = getFileObjectModTime(info.ModTime())
- results = append(results, res)
- }
- data, err := json.Marshal(results)
- count := limit
- if len(results) == 0 {
- count = 0
- }
- return data, count, err
- }
- streamJSONArray(w, defaultQueryLimit, dataGetter)
- }
- func (s *httpdServer) handleClientUploadToShare(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeWrite, dataprovider.ShareScopeReadWrite}
- share, _, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if share.Scope == dataprovider.ShareScopeReadWrite {
- http.Redirect(w, r, path.Join(webClientPubSharesPath, share.ShareID, "browse"), http.StatusFound)
- return
- }
- s.renderUploadToSharePage(w, r, share)
- }
- func (s *httpdServer) handleShareGetFiles(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
- share, connection, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if err := validateBrowsableShare(share, connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- name, err := getBrowsableSharedPath(share.Paths[0], r)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
- util.NewI18nError(err, util.I18nError429Message), share)
- return
- }
- defer common.Connections.Remove(connection.GetID())
- var info os.FileInfo
- if name == "/" {
- info = vfs.NewFileInfo(name, true, 0, time.Unix(0, 0), false)
- } else {
- info, err = connection.Stat(name, 1)
- }
- if err != nil {
- s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
- util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), share)
- return
- }
- if info.IsDir() {
- s.renderSharedFilesPage(w, r, share.GetRelativePath(name), nil, share)
- return
- }
- dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
- if status, err := downloadFile(w, r, connection, name, info, false, &share); err != nil {
- dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
- if status > 0 {
- s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
- util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), share)
- }
- }
- }
- func (s *httpdServer) handleShareViewPDF(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
- share, _, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- name := util.CleanPath(r.URL.Query().Get("path"))
- data := viewPDFPage{
- commonBasePage: getCommonBasePage(r),
- Title: path.Base(name),
- URL: fmt.Sprintf("%s?path=%s&_=%d", path.Join(webClientPubSharesPath, share.ShareID, "getpdf"),
- url.QueryEscape(name), time.Now().UTC().Unix()),
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateClientViewPDF, data)
- }
- func (s *httpdServer) handleShareGetPDF(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
- share, connection, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if err := validateBrowsableShare(share, connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- name, err := getBrowsableSharedPath(share.Paths[0], r)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
- return
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- info, err := connection.Stat(name, 1)
- if err != nil {
- status := getRespStatus(err)
- s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, status,
- util.NewI18nError(err, i18nFsMsg(status)), "")
- return
- }
- if info.IsDir() {
- s.renderClientBadRequestPage(w, r, util.NewI18nError(fmt.Errorf("%q is not a file", name), util.I18nErrorPDFMessage))
- return
- }
- connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
- if err := s.ensurePDF(w, r, name, connection); err != nil {
- return
- }
- dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
- if _, err := downloadFile(w, r, connection, name, info, true, &share); err != nil {
- dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
- }
- }
- func (s *httpdServer) handleClientGetDirContents(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- sendAPIResponse(w, r, nil, util.I18nErrorDirList403, http.StatusForbidden)
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- sendAPIResponse(w, r, nil, util.I18nErrorDirListUser, getRespStatus(err))
- return
- }
- connID := xid.New().String()
- protocol := getProtocolFromRequest(r)
- connectionID := fmt.Sprintf("%s_%s", protocol, connID)
- if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
- sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nErrorDirList403), http.StatusForbidden)
- return
- }
- connection := &Connection{
- BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
- r.RemoteAddr, user),
- request: r,
- }
- if err = common.Connections.Add(connection); err != nil {
- sendAPIResponse(w, r, err, util.I18nErrorDirList429, http.StatusTooManyRequests)
- return
- }
- defer common.Connections.Remove(connection.GetID())
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- lister, err := connection.ReadDir(name)
- if err != nil {
- statusCode := getMappedStatusCode(err)
- sendAPIResponse(w, r, err, i18nListDirMsg(statusCode), statusCode)
- return
- }
- defer lister.Close()
- dirTree := r.URL.Query().Get("dirtree") == "1"
- dataGetter := func(limit, _ int) ([]byte, int, error) {
- contents, err := lister.Next(limit)
- if errors.Is(err, io.EOF) {
- err = nil
- }
- if err != nil {
- return nil, 0, err
- }
- results := make([]map[string]any, 0, len(contents))
- for _, info := range contents {
- res := make(map[string]any)
- res["url"] = getFileObjectURL(name, info.Name(), webClientFilesPath)
- if info.IsDir() {
- res["type"] = "1"
- res["size"] = ""
- res["dir_path"] = url.QueryEscape(path.Join(name, info.Name()))
- } else {
- if dirTree {
- continue
- }
- res["type"] = "2"
- if info.Mode()&os.ModeSymlink != 0 {
- res["size"] = ""
- } else {
- res["size"] = info.Size()
- if info.Size() < httpdMaxEditFileSize {
- res["edit_url"] = strings.Replace(res["url"].(string), webClientFilesPath, webClientEditFilePath, 1)
- }
- }
- }
- res["meta"] = fmt.Sprintf("%v_%v", res["type"], info.Name())
- res["name"] = info.Name()
- res["last_modified"] = getFileObjectModTime(info.ModTime())
- results = append(results, res)
- }
- data, err := json.Marshal(results)
- count := limit
- if len(results) == 0 {
- count = 0
- }
- return data, count, err
- }
- streamJSONArray(w, defaultQueryLimit, dataGetter)
- }
- func (s *httpdServer) handleClientGetFiles(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorGetUser), "")
- return
- }
- connID := xid.New().String()
- protocol := getProtocolFromRequest(r)
- connectionID := fmt.Sprintf("%v_%v", protocol, connID)
- if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
- s.renderClientForbiddenPage(w, r, err)
- return
- }
- connection := &Connection{
- BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
- r.RemoteAddr, user),
- request: r,
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- var info os.FileInfo
- if name == "/" {
- info = vfs.NewFileInfo(name, true, 0, time.Unix(0, 0), false)
- } else {
- info, err = connection.Stat(name, 0)
- }
- if err != nil {
- s.renderFilesPage(w, r, path.Dir(name), util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), &user)
- return
- }
- if info.IsDir() {
- s.renderFilesPage(w, r, name, nil, &user)
- return
- }
- if status, err := downloadFile(w, r, connection, name, info, false, nil); err != nil && status != 0 {
- if status > 0 {
- if status == http.StatusRequestedRangeNotSatisfiable {
- s.renderClientMessagePage(w, r, util.I18nError416Title, status,
- util.NewI18nError(err, util.I18nError416Message), "")
- return
- }
- s.renderFilesPage(w, r, path.Dir(name), util.NewI18nError(err, i18nFsMsg(status)), &user)
- }
- }
- }
- func (s *httpdServer) handleClientEditFile(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorGetUser), "")
- return
- }
- connID := xid.New().String()
- protocol := getProtocolFromRequest(r)
- connectionID := fmt.Sprintf("%v_%v", protocol, connID)
- if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
- s.renderClientForbiddenPage(w, r, err)
- return
- }
- connection := &Connection{
- BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
- r.RemoteAddr, user),
- request: r,
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- info, err := connection.Stat(name, 0)
- if err != nil {
- status := getRespStatus(err)
- s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, status, util.NewI18nError(err, i18nFsMsg(status)), "")
- return
- }
- if info.IsDir() {
- s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, http.StatusBadRequest,
- util.NewI18nError(
- util.NewValidationError(fmt.Sprintf("The path %q does not point to a file", name)),
- util.I18nErrorEditDir,
- ), "")
- return
- }
- if info.Size() > httpdMaxEditFileSize {
- s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, http.StatusBadRequest,
- util.NewI18nError(
- util.NewValidationError(fmt.Sprintf("The file size %v for %q exceeds the maximum allowed size",
- util.ByteCountIEC(info.Size()), name)),
- util.I18nErrorEditSize,
- ), "")
- return
- }
- connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
- reader, err := connection.getFileReader(name, 0, r.Method)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, getRespStatus(err),
- util.NewI18nError(err, util.I18nError500Message), "")
- return
- }
- defer reader.Close()
- var b bytes.Buffer
- _, err = io.Copy(&b, reader)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, getRespStatus(err),
- util.NewI18nError(err, util.I18nError500Message), "")
- return
- }
- s.renderEditFilePage(w, r, name, b.String(), !user.CanAddFilesFromWeb(path.Dir(name)))
- }
- func (s *httpdServer) handleClientAddShareGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorGetUser), "")
- return
- }
- share := &dataprovider.Share{Scope: dataprovider.ShareScopeRead}
- if user.Filters.DefaultSharesExpiration > 0 {
- share.ExpiresAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(24 * time.Hour * time.Duration(user.Filters.DefaultSharesExpiration)))
- } else if user.Filters.MaxSharesExpiration > 0 {
- share.ExpiresAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration)))
- }
- dirName := "/"
- if _, ok := r.URL.Query()["path"]; ok {
- dirName = util.CleanPath(r.URL.Query().Get("path"))
- }
- if _, ok := r.URL.Query()["files"]; ok {
- files := r.URL.Query().Get("files")
- var filesList []string
- err := json.Unmarshal([]byte(files), &filesList)
- if err != nil {
- s.renderClientBadRequestPage(w, r, err)
- return
- }
- for _, f := range filesList {
- if f != "" {
- share.Paths = append(share.Paths, path.Join(dirName, f))
- }
- }
- }
- s.renderAddUpdateSharePage(w, r, share, nil, true)
- }
- func (s *httpdServer) handleClientUpdateShareGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- shareID := getURLParam(r, "id")
- share, err := dataprovider.ShareExists(shareID, claims.Username)
- if err == nil {
- share.HideConfidentialData()
- s.renderAddUpdateSharePage(w, r, &share, nil, false)
- } else if errors.Is(err, util.ErrNotFound) {
- s.renderClientNotFoundPage(w, r, err)
- } else {
- s.renderClientInternalServerErrorPage(w, r, err)
- }
- }
- func (s *httpdServer) handleClientAddSharePost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- share, err := getShareFromPostFields(r)
- if err != nil {
- s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nError500Message), true)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- share.ID = 0
- share.ShareID = util.GenerateUniqueID()
- share.LastUseAt = 0
- share.Username = claims.Username
- if share.Password == "" {
- if util.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
- s.renderAddUpdateSharePage(w, r, share,
- util.NewI18nError(util.NewValidationError("You are not allowed to share files/folders without password"), util.I18nErrorShareNoPwd),
- true)
- return
- }
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nErrorGetUser), true)
- return
- }
- if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(share.ExpiresAt)); err != nil {
- s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(
- err,
- util.I18nErrorShareExpirationOutOfRange,
- util.I18nErrorArgs(
- map[string]any{
- "val": time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration+1)).UnixMilli(),
- "formatParams": map[string]string{
- "year": "numeric",
- "month": "numeric",
- "day": "numeric",
- },
- },
- ),
- ), true)
- return
- }
- err = dataprovider.AddShare(share, claims.Username, ipAddr, claims.Role)
- if err == nil {
- http.Redirect(w, r, webClientSharesPath, http.StatusSeeOther)
- } else {
- s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nErrorShareGeneric), true)
- }
- }
- func (s *httpdServer) handleClientUpdateSharePost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- shareID := getURLParam(r, "id")
- share, err := dataprovider.ShareExists(shareID, claims.Username)
- if errors.Is(err, util.ErrNotFound) {
- s.renderClientNotFoundPage(w, r, err)
- return
- } else if err != nil {
- s.renderClientInternalServerErrorPage(w, r, err)
- return
- }
- updatedShare, err := getShareFromPostFields(r)
- if err != nil {
- s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nError500Message), false)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- updatedShare.ShareID = shareID
- updatedShare.Username = claims.Username
- if updatedShare.Password == redactedSecret {
- updatedShare.Password = share.Password
- }
- if updatedShare.Password == "" {
- if util.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
- s.renderAddUpdateSharePage(w, r, updatedShare,
- util.NewI18nError(util.NewValidationError("You are not allowed to share files/folders without password"), util.I18nErrorShareNoPwd),
- false)
- return
- }
- }
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nErrorGetUser), false)
- return
- }
- if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(updatedShare.ExpiresAt)); err != nil {
- s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(
- err,
- util.I18nErrorShareExpirationOutOfRange,
- util.I18nErrorArgs(
- map[string]any{
- "val": time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration+1)).UnixMilli(),
- "formatParams": map[string]string{
- "year": "numeric",
- "month": "numeric",
- "day": "numeric",
- },
- },
- ),
- ), false)
- return
- }
- err = dataprovider.UpdateShare(updatedShare, claims.Username, ipAddr, claims.Role)
- if err == nil {
- http.Redirect(w, r, webClientSharesPath, http.StatusSeeOther)
- } else {
- s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nErrorShareGeneric), false)
- }
- }
- func getAllShares(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- sendAPIResponse(w, r, nil, util.I18nErrorInvalidToken, http.StatusForbidden)
- return
- }
- dataGetter := func(limit, offset int) ([]byte, int, error) {
- shares, err := dataprovider.GetShares(limit, offset, dataprovider.OrderASC, claims.Username)
- if err != nil {
- return nil, 0, err
- }
- data, err := json.Marshal(shares)
- return data, len(shares), err
- }
- streamJSONArray(w, defaultQueryLimit, dataGetter)
- }
- func (s *httpdServer) handleClientGetShares(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- data := clientSharesPage{
- baseClientPage: s.getBaseClientPageData(util.I18nSharesTitle, webClientSharesPath, r),
- BasePublicSharesURL: webClientPubSharesPath,
- }
- renderClientTemplate(w, templateClientShares, data)
- }
- func (s *httpdServer) handleClientGetProfile(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.renderClientProfilePage(w, r, nil)
- }
- func (s *httpdServer) handleWebClientChangePwd(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.renderClientChangePasswordPage(w, r, nil)
- }
- func (s *httpdServer) handleWebClientProfilePost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- err := r.ParseForm()
- if err != nil {
- s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- user, userMerged, err := dataprovider.GetUserVariants(claims.Username, "")
- if err != nil {
- s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nErrorGetUser))
- return
- }
- if !userMerged.CanUpdateProfile() {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(
- errors.New("you are not allowed to change anything"),
- util.I18nErrorNoPermissions,
- ))
- return
- }
- if userMerged.CanManagePublicKeys() {
- for k := range r.Form {
- if hasPrefixAndSuffix(k, "public_keys[", "][public_key]") {
- r.Form.Add("public_keys", r.Form.Get(k))
- }
- }
- user.PublicKeys = r.Form["public_keys"]
- }
- if userMerged.CanManageTLSCerts() {
- for k := range r.Form {
- if hasPrefixAndSuffix(k, "tls_certs[", "][tls_cert]") {
- r.Form.Add("tls_certs", r.Form.Get(k))
- }
- }
- user.Filters.TLSCerts = r.Form["tls_certs"]
- }
- if userMerged.CanChangeAPIKeyAuth() {
- user.Filters.AllowAPIKeyAuth = r.Form.Get("allow_api_key_auth") != ""
- }
- if userMerged.CanChangeInfo() {
- user.Email = strings.TrimSpace(r.Form.Get("email"))
- user.Description = r.Form.Get("description")
- }
- err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
- if err != nil {
- s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nError500Message))
- return
- }
- s.renderClientMessagePage(w, r, util.I18nProfileTitle, http.StatusOK, nil, util.I18nProfileUpdated)
- }
- func (s *httpdServer) handleWebClientMFA(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.renderClientMFAPage(w, r)
- }
- func (s *httpdServer) handleWebClientTwoFactor(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.renderClientTwoFactorPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleWebClientTwoFactorRecovery(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.renderClientTwoFactorRecoveryPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func getShareFromPostFields(r *http.Request) (*dataprovider.Share, error) {
- share := &dataprovider.Share{}
- if err := r.ParseForm(); err != nil {
- return share, util.NewI18nError(err, util.I18nErrorInvalidForm)
- }
- for k := range r.Form {
- if hasPrefixAndSuffix(k, "paths[", "][path]") {
- r.Form.Add("paths", r.Form.Get(k))
- }
- }
- share.Name = strings.TrimSpace(r.Form.Get("name"))
- share.Description = r.Form.Get("description")
- for _, p := range r.Form["paths"] {
- if strings.TrimSpace(p) != "" {
- share.Paths = append(share.Paths, p)
- }
- }
- share.Password = strings.TrimSpace(r.Form.Get("password"))
- share.AllowFrom = getSliceFromDelimitedValues(r.Form.Get("allowed_ip"), ",")
- scope, err := strconv.Atoi(r.Form.Get("scope"))
- if err != nil {
- return share, util.NewI18nError(err, util.I18nErrorShareScope)
- }
- share.Scope = dataprovider.ShareScope(scope)
- maxTokens, err := strconv.Atoi(r.Form.Get("max_tokens"))
- if err != nil {
- return share, util.NewI18nError(err, util.I18nErrorShareMaxTokens)
- }
- share.MaxTokens = maxTokens
- expirationDateMillis := int64(0)
- expirationDateString := strings.TrimSpace(r.Form.Get("expiration_date"))
- if expirationDateString != "" {
- expirationDate, err := time.Parse(webDateTimeFormat, expirationDateString)
- if err != nil {
- return share, util.NewI18nError(err, util.I18nErrorShareExpiration)
- }
- expirationDateMillis = util.GetTimeAsMsSinceEpoch(expirationDate)
- }
- share.ExpiresAt = expirationDateMillis
- return share, nil
- }
- func (s *httpdServer) handleWebClientForgotPwd(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if !smtp.IsEnabled() {
- s.renderClientNotFoundPage(w, r, errors.New("this page does not exist"))
- return
- }
- s.renderClientForgotPwdPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleWebClientForgotPwdPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- err := r.ParseForm()
- if err != nil {
- s.renderClientForgotPwdPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- username := strings.TrimSpace(r.Form.Get("username"))
- err = handleForgotPassword(r, username, false)
- if err != nil {
- s.renderClientForgotPwdPage(w, r, util.NewI18nError(err, util.I18nErrorPwdResetGeneric), ipAddr)
- return
- }
- http.Redirect(w, r, webClientResetPwdPath, http.StatusFound)
- }
- func (s *httpdServer) handleWebClientPasswordReset(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- if !smtp.IsEnabled() {
- s.renderClientNotFoundPage(w, r, errors.New("this page does not exist"))
- return
- }
- s.renderClientResetPwdPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleClientViewPDF(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- name := r.URL.Query().Get("path")
- if name == "" {
- s.renderClientBadRequestPage(w, r, errors.New("no file specified"))
- return
- }
- name = util.CleanPath(name)
- data := viewPDFPage{
- commonBasePage: getCommonBasePage(r),
- Title: path.Base(name),
- URL: fmt.Sprintf("%s?path=%s&_=%d", webClientGetPDFPath, url.QueryEscape(name), time.Now().UTC().Unix()),
- Branding: s.binding.Branding.WebClient,
- }
- renderClientTemplate(w, templateClientViewPDF, data)
- }
- func (s *httpdServer) handleClientGetPDF(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
- return
- }
- name := r.URL.Query().Get("path")
- if name == "" {
- s.renderClientBadRequestPage(w, r, util.NewI18nError(errors.New("no file specified"), util.I18nError400Message))
- return
- }
- name = util.CleanPath(name)
- user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorGetUser), "")
- return
- }
- connID := xid.New().String()
- protocol := getProtocolFromRequest(r)
- connectionID := fmt.Sprintf("%v_%v", protocol, connID)
- if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
- s.renderClientForbiddenPage(w, r, err)
- return
- }
- connection := &Connection{
- BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
- r.RemoteAddr, user),
- request: r,
- }
- if err = common.Connections.Add(connection); err != nil {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(err, util.I18nError429Message), "")
- return
- }
- defer common.Connections.Remove(connection.GetID())
- info, err := connection.Stat(name, 0)
- if err != nil {
- status := getRespStatus(err)
- s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle, status, util.NewI18nError(err, i18nFsMsg(status)), "")
- return
- }
- if info.IsDir() {
- s.renderClientBadRequestPage(w, r, util.NewI18nError(fmt.Errorf("%q is not a file", name), util.I18nErrorPDFMessage))
- return
- }
- connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
- if err := s.ensurePDF(w, r, name, connection); err != nil {
- return
- }
- downloadFile(w, r, connection, name, info, true, nil) //nolint:errcheck
- }
- func (s *httpdServer) ensurePDF(w http.ResponseWriter, r *http.Request, name string, connection *Connection) error {
- reader, err := connection.getFileReader(name, 0, r.Method)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle,
- getRespStatus(err), util.NewI18nError(err, util.I18nError500Message), "")
- return err
- }
- defer reader.Close()
- var b bytes.Buffer
- _, err = io.CopyN(&b, reader, 128)
- if err != nil {
- s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle, getRespStatus(err),
- util.NewI18nError(err, util.I18nErrorPDFMessage), "")
- return err
- }
- if ctype := http.DetectContentType(b.Bytes()); ctype != "application/pdf" {
- connection.Log(logger.LevelDebug, "detected %q content type, expected PDF, file %q", ctype, name)
- err := fmt.Errorf("the file %q does not look like a PDF", name)
- s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorPDFMessage))
- return err
- }
- return nil
- }
- func (s *httpdServer) handleClientShareLoginGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- s.renderShareLoginPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleClientShareLoginPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF), ipAddr)
- return
- }
- shareID := getURLParam(r, "id")
- share, err := dataprovider.ShareExists(shareID, "")
- if err != nil {
- s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCredentials), ipAddr)
- return
- }
- match, err := share.CheckCredentials(strings.TrimSpace(r.Form.Get("share_password")))
- if !match || err != nil {
- s.renderShareLoginPage(w, r, util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials),
- ipAddr)
- return
- }
- c := jwtTokenClaims{
- Username: shareID,
- }
- err = c.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebShare, ipAddr)
- if err != nil {
- s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nError500Message), ipAddr)
- return
- }
- next := path.Clean(r.URL.Query().Get("next"))
- baseShareURL := path.Join(webClientPubSharesPath, share.ShareID)
- isRedirect, redirectTo := checkShareRedirectURL(next, baseShareURL)
- if isRedirect {
- http.Redirect(w, r, redirectTo, http.StatusFound)
- return
- }
- s.renderClientMessagePage(w, r, util.I18nSharedFilesTitle, http.StatusOK, nil, util.I18nShareLoginOK)
- }
- func (s *httpdServer) handleClientSharedFile(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead}
- share, _, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- query := ""
- if r.URL.RawQuery != "" {
- query = "?" + r.URL.RawQuery
- }
- s.renderShareDownloadPage(w, r, path.Join(webClientPubSharesPath, share.ShareID)+query)
- }
- func (s *httpdServer) handleClientCheckExist(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- connection, err := getUserConnection(w, r)
- if err != nil {
- return
- }
- defer common.Connections.Remove(connection.GetID())
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- doCheckExist(w, r, connection, name)
- }
- func (s *httpdServer) handleClientShareCheckExist(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeReadWrite}
- share, connection, err := s.checkPublicShare(w, r, validScopes)
- if err != nil {
- return
- }
- if err := validateBrowsableShare(share, connection); err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- name, err := getBrowsableSharedPath(share.Paths[0], r)
- if err != nil {
- sendAPIResponse(w, r, err, "", http.StatusBadRequest)
- return
- }
- if err = common.Connections.Add(connection); err != nil {
- sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
- return
- }
- defer common.Connections.Remove(connection.GetID())
- doCheckExist(w, r, connection, name)
- }
- type filesToCheck struct {
- Files []string `json:"files"`
- }
- func doCheckExist(w http.ResponseWriter, r *http.Request, connection *Connection, name string) {
- var filesList filesToCheck
- err := render.DecodeJSON(r.Body, &filesList)
- if err != nil {
- sendAPIResponse(w, r, err, "", http.StatusBadRequest)
- return
- }
- if len(filesList.Files) == 0 {
- sendAPIResponse(w, r, errors.New("files to be checked are mandatory"), "", http.StatusBadRequest)
- return
- }
- lister, err := connection.ListDir(name)
- if err != nil {
- sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
- return
- }
- defer lister.Close()
- dataGetter := func(limit, _ int) ([]byte, int, error) {
- contents, err := lister.Next(limit)
- if errors.Is(err, io.EOF) {
- err = nil
- }
- if err != nil {
- return nil, 0, err
- }
- existing := make([]map[string]any, 0)
- for _, info := range contents {
- if util.Contains(filesList.Files, info.Name()) {
- res := make(map[string]any)
- res["name"] = info.Name()
- if info.IsDir() {
- res["type"] = "1"
- res["size"] = ""
- } else {
- res["type"] = "2"
- res["size"] = info.Size()
- }
- existing = append(existing, res)
- }
- }
- data, err := json.Marshal(existing)
- count := limit
- if len(existing) == 0 {
- count = 0
- }
- return data, count, err
- }
- streamJSONArray(w, defaultQueryLimit, dataGetter)
- }
- func checkShareRedirectURL(next, base string) (bool, string) {
- if !strings.HasPrefix(next, base) {
- return false, ""
- }
- if next == base {
- return true, path.Join(next, "download")
- }
- baseURL, err := url.Parse(base)
- if err != nil {
- return false, ""
- }
- nextURL, err := url.Parse(next)
- if err != nil {
- return false, ""
- }
- if nextURL.Path == baseURL.Path {
- redirectURL := nextURL.JoinPath("download")
- return true, redirectURL.String()
- }
- return true, next
- }
- func getWebTask(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
- return
- }
- taskID := getURLParam(r, "id")
- task, err := webTaskMgr.Get(taskID)
- if err != nil {
- sendAPIResponse(w, r, err, "Unable to get task", getMappedStatusCode(err))
- return
- }
- if task.User != claims.Username {
- sendAPIResponse(w, r, nil, http.StatusText(http.StatusForbidden), http.StatusForbidden)
- return
- }
- render.JSON(w, r, task)
- }
- func taskDeleteDir(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- connection, err := getUserConnection(w, r)
- if err != nil {
- return
- }
- name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- task := webTaskData{
- ID: connection.GetID(),
- User: connection.GetUsername(),
- Path: name,
- Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
- Status: 0,
- }
- if err := webTaskMgr.Add(task); err != nil {
- common.Connections.Remove(connection.GetID())
- sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
- return
- }
- go executeDeleteTask(connection, task)
- sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
- }
- func taskRenameFsEntry(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- connection, err := getUserConnection(w, r)
- if err != nil {
- return
- }
- oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
- newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
- task := webTaskData{
- ID: connection.GetID(),
- User: connection.GetUsername(),
- Path: oldName,
- Target: newName,
- Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
- Status: 0,
- }
- if err := webTaskMgr.Add(task); err != nil {
- common.Connections.Remove(connection.GetID())
- sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
- return
- }
- go executeRenameTask(connection, task)
- sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
- }
- func taskCopyFsEntry(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- connection, err := getUserConnection(w, r)
- if err != nil {
- return
- }
- source := r.URL.Query().Get("path")
- target := r.URL.Query().Get("target")
- copyFromSource := strings.HasSuffix(source, "/")
- copyInTarget := strings.HasSuffix(target, "/")
- source = connection.User.GetCleanedPath(source)
- target = connection.User.GetCleanedPath(target)
- if copyFromSource {
- source += "/"
- }
- if copyInTarget {
- target += "/"
- }
- task := webTaskData{
- ID: connection.GetID(),
- User: connection.GetUsername(),
- Path: source,
- Target: target,
- Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
- Status: 0,
- }
- if err := webTaskMgr.Add(task); err != nil {
- common.Connections.Remove(connection.GetID())
- sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
- return
- }
- go executeCopyTask(connection, task)
- sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
- }
- func executeDeleteTask(conn *Connection, task webTaskData) {
- done := make(chan bool)
- defer func() {
- close(done)
- common.Connections.Remove(conn.GetID())
- }()
- go keepAliveTask(task, done, 2*time.Minute)
- status := http.StatusOK
- if err := conn.RemoveAll(task.Path); err != nil {
- status = getMappedStatusCode(err)
- }
- task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
- task.Status = status
- err := webTaskMgr.Add(task)
- conn.Log(logger.LevelDebug, "delete task finished, status: %d, update task err: %v", status, err)
- }
- func executeRenameTask(conn *Connection, task webTaskData) {
- done := make(chan bool)
- defer func() {
- close(done)
- common.Connections.Remove(conn.GetID())
- }()
- go keepAliveTask(task, done, 2*time.Minute)
- status := http.StatusOK
- if !conn.IsSameResource(task.Path, task.Target) {
- if err := conn.Copy(task.Path, task.Target); err != nil {
- status = getMappedStatusCode(err)
- task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
- task.Status = status
- err = webTaskMgr.Add(task)
- conn.Log(logger.LevelDebug, "copy step for rename task finished, status: %d, update task err: %v", status, err)
- return
- }
- if err := conn.RemoveAll(task.Path); err != nil {
- status = getMappedStatusCode(err)
- }
- } else {
- if err := conn.Rename(task.Path, task.Target); err != nil {
- status = getMappedStatusCode(err)
- }
- }
- task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
- task.Status = status
- err := webTaskMgr.Add(task)
- conn.Log(logger.LevelDebug, "rename task finished, status: %d, update task err: %v", status, err)
- }
- func executeCopyTask(conn *Connection, task webTaskData) {
- done := make(chan bool)
- defer func() {
- close(done)
- common.Connections.Remove(conn.GetID())
- }()
- go keepAliveTask(task, done, 2*time.Minute)
- status := http.StatusOK
- if err := conn.Copy(task.Path, task.Target); err != nil {
- status = getMappedStatusCode(err)
- }
- task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
- task.Status = status
- err := webTaskMgr.Add(task)
- conn.Log(logger.LevelDebug, "copy task finished, status: %d, update task err: %v", status, err)
- }
- func keepAliveTask(task webTaskData, done chan bool, interval time.Duration) {
- ticker := time.NewTicker(interval)
- defer func() {
- ticker.Stop()
- }()
- for {
- select {
- case <-done:
- return
- case <-ticker.C:
- task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
- err := webTaskMgr.Add(task)
- logger.Debug(logSender, task.ID, "task timestamp updated, err: %v", err)
- }
- }
- }
|