webclient.go 74 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "bytes"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "html/template"
  21. "io"
  22. "math"
  23. "net/http"
  24. "net/url"
  25. "os"
  26. "path"
  27. "path/filepath"
  28. "strconv"
  29. "strings"
  30. "time"
  31. "github.com/go-chi/render"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. "github.com/drakkan/sftpgo/v2/internal/common"
  35. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  36. "github.com/drakkan/sftpgo/v2/internal/logger"
  37. "github.com/drakkan/sftpgo/v2/internal/mfa"
  38. "github.com/drakkan/sftpgo/v2/internal/smtp"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. const (
  43. templateClientDir = "webclient"
  44. templateClientBase = "base.html"
  45. templateClientFiles = "files.html"
  46. templateClientProfile = "profile.html"
  47. templateClientMFA = "mfa.html"
  48. templateClientEditFile = "editfile.html"
  49. templateClientShare = "share.html"
  50. templateClientShares = "shares.html"
  51. templateClientViewPDF = "viewpdf.html"
  52. templateShareLogin = "sharelogin.html"
  53. templateShareDownload = "sharedownload.html"
  54. templateUploadToShare = "shareupload.html"
  55. )
  56. // condResult is the result of an HTTP request precondition check.
  57. // See https://tools.ietf.org/html/rfc7232 section 3.
  58. type condResult int
  59. const (
  60. condNone condResult = iota
  61. condTrue
  62. condFalse
  63. )
  64. var (
  65. clientTemplates = make(map[string]*template.Template)
  66. unixEpochTime = time.Unix(0, 0)
  67. )
  68. // isZeroTime reports whether t is obviously unspecified (either zero or Unix()=0).
  69. func isZeroTime(t time.Time) bool {
  70. return t.IsZero() || t.Equal(unixEpochTime)
  71. }
  72. type baseClientPage struct {
  73. commonBasePage
  74. Title string
  75. CurrentURL string
  76. FilesURL string
  77. SharesURL string
  78. ShareURL string
  79. ProfileURL string
  80. PingURL string
  81. ChangePwdURL string
  82. LogoutURL string
  83. LoginURL string
  84. EditURL string
  85. MFAURL string
  86. CSRFToken string
  87. LoggedUser *dataprovider.User
  88. Branding UIBranding
  89. }
  90. type dirMapping struct {
  91. DirName string
  92. Href string
  93. }
  94. type viewPDFPage struct {
  95. commonBasePage
  96. Title string
  97. URL string
  98. Branding UIBranding
  99. }
  100. type editFilePage struct {
  101. baseClientPage
  102. CurrentDir string
  103. FileURL string
  104. Path string
  105. Name string
  106. ReadOnly bool
  107. Data string
  108. }
  109. type filesPage struct {
  110. baseClientPage
  111. CurrentDir string
  112. DirsURL string
  113. FileActionsURL string
  114. CheckExistURL string
  115. DownloadURL string
  116. ViewPDFURL string
  117. FileURL string
  118. TasksURL string
  119. CanAddFiles bool
  120. CanCreateDirs bool
  121. CanRename bool
  122. CanDelete bool
  123. CanDownload bool
  124. CanShare bool
  125. CanCopy bool
  126. ShareUploadBaseURL string
  127. Error *util.I18nError
  128. Paths []dirMapping
  129. QuotaUsage *userQuotaUsage
  130. }
  131. type shareLoginPage struct {
  132. commonBasePage
  133. CurrentURL string
  134. Error *util.I18nError
  135. CSRFToken string
  136. Title string
  137. Branding UIBranding
  138. }
  139. type shareDownloadPage struct {
  140. baseClientPage
  141. DownloadLink string
  142. }
  143. type shareUploadPage struct {
  144. baseClientPage
  145. Share *dataprovider.Share
  146. UploadBasePath string
  147. }
  148. type clientMessagePage struct {
  149. baseClientPage
  150. Error *util.I18nError
  151. Success string
  152. Text string
  153. }
  154. type clientProfilePage struct {
  155. baseClientPage
  156. PublicKeys []string
  157. TLSCerts []string
  158. CanSubmit bool
  159. AllowAPIKeyAuth bool
  160. Email string
  161. Description string
  162. Error *util.I18nError
  163. }
  164. type changeClientPasswordPage struct {
  165. baseClientPage
  166. Error *util.I18nError
  167. }
  168. type clientMFAPage struct {
  169. baseClientPage
  170. TOTPConfigs []string
  171. TOTPConfig dataprovider.UserTOTPConfig
  172. GenerateTOTPURL string
  173. ValidateTOTPURL string
  174. SaveTOTPURL string
  175. RecCodesURL string
  176. Protocols []string
  177. RequiredProtocols []string
  178. }
  179. type clientSharesPage struct {
  180. baseClientPage
  181. BasePublicSharesURL string
  182. }
  183. type clientSharePage struct {
  184. baseClientPage
  185. Share *dataprovider.Share
  186. Error *util.I18nError
  187. IsAdd bool
  188. }
  189. type userQuotaUsage struct {
  190. QuotaSize int64
  191. QuotaFiles int
  192. UsedQuotaSize int64
  193. UsedQuotaFiles int
  194. UploadDataTransfer int64
  195. DownloadDataTransfer int64
  196. TotalDataTransfer int64
  197. UsedUploadDataTransfer int64
  198. UsedDownloadDataTransfer int64
  199. }
  200. func (u *userQuotaUsage) HasQuotaInfo() bool {
  201. if dataprovider.GetQuotaTracking() == 0 {
  202. return false
  203. }
  204. if u.HasDiskQuota() {
  205. return true
  206. }
  207. return u.HasTranferQuota()
  208. }
  209. func (u *userQuotaUsage) HasDiskQuota() bool {
  210. if u.QuotaSize > 0 || u.UsedQuotaSize > 0 {
  211. return true
  212. }
  213. return u.QuotaFiles > 0 || u.UsedQuotaFiles > 0
  214. }
  215. func (u *userQuotaUsage) HasTranferQuota() bool {
  216. if u.TotalDataTransfer > 0 || u.UploadDataTransfer > 0 || u.DownloadDataTransfer > 0 {
  217. return true
  218. }
  219. return u.UsedDownloadDataTransfer > 0 || u.UsedUploadDataTransfer > 0
  220. }
  221. func (u *userQuotaUsage) GetQuotaSize() string {
  222. if u.QuotaSize > 0 {
  223. return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedQuotaSize), util.ByteCountIEC(u.QuotaSize))
  224. }
  225. if u.UsedQuotaSize > 0 {
  226. return util.ByteCountIEC(u.UsedQuotaSize)
  227. }
  228. return ""
  229. }
  230. func (u *userQuotaUsage) GetQuotaFiles() string {
  231. if u.QuotaFiles > 0 {
  232. return fmt.Sprintf("%d/%d", u.UsedQuotaFiles, u.QuotaFiles)
  233. }
  234. if u.UsedQuotaFiles > 0 {
  235. return strconv.FormatInt(int64(u.UsedQuotaFiles), 10)
  236. }
  237. return ""
  238. }
  239. func (u *userQuotaUsage) GetQuotaSizePercentage() int {
  240. if u.QuotaSize > 0 {
  241. return int(math.Round(100 * float64(u.UsedQuotaSize) / float64(u.QuotaSize)))
  242. }
  243. return 0
  244. }
  245. func (u *userQuotaUsage) GetQuotaFilesPercentage() int {
  246. if u.QuotaFiles > 0 {
  247. return int(math.Round(100 * float64(u.UsedQuotaFiles) / float64(u.QuotaFiles)))
  248. }
  249. return 0
  250. }
  251. func (u *userQuotaUsage) IsQuotaSizeLow() bool {
  252. return u.GetQuotaSizePercentage() > 85
  253. }
  254. func (u *userQuotaUsage) IsQuotaFilesLow() bool {
  255. return u.GetQuotaFilesPercentage() > 85
  256. }
  257. func (u *userQuotaUsage) IsDiskQuotaLow() bool {
  258. return u.IsQuotaSizeLow() || u.IsQuotaFilesLow()
  259. }
  260. func (u *userQuotaUsage) GetTotalTransferQuota() string {
  261. total := u.UsedUploadDataTransfer + u.UsedDownloadDataTransfer
  262. if u.TotalDataTransfer > 0 {
  263. return fmt.Sprintf("%s/%s", util.ByteCountIEC(total), util.ByteCountIEC(u.TotalDataTransfer*1048576))
  264. }
  265. if total > 0 {
  266. return util.ByteCountIEC(total)
  267. }
  268. return ""
  269. }
  270. func (u *userQuotaUsage) GetUploadTransferQuota() string {
  271. if u.UploadDataTransfer > 0 {
  272. return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedUploadDataTransfer),
  273. util.ByteCountIEC(u.UploadDataTransfer*1048576))
  274. }
  275. if u.UsedUploadDataTransfer > 0 {
  276. return util.ByteCountIEC(u.UsedUploadDataTransfer)
  277. }
  278. return ""
  279. }
  280. func (u *userQuotaUsage) GetDownloadTransferQuota() string {
  281. if u.DownloadDataTransfer > 0 {
  282. return fmt.Sprintf("%s/%s", util.ByteCountIEC(u.UsedDownloadDataTransfer),
  283. util.ByteCountIEC(u.DownloadDataTransfer*1048576))
  284. }
  285. if u.UsedDownloadDataTransfer > 0 {
  286. return util.ByteCountIEC(u.UsedDownloadDataTransfer)
  287. }
  288. return ""
  289. }
  290. func (u *userQuotaUsage) GetTotalTransferQuotaPercentage() int {
  291. if u.TotalDataTransfer > 0 {
  292. return int(math.Round(100 * float64(u.UsedDownloadDataTransfer+u.UsedUploadDataTransfer) / float64(u.TotalDataTransfer*1048576)))
  293. }
  294. return 0
  295. }
  296. func (u *userQuotaUsage) GetUploadTransferQuotaPercentage() int {
  297. if u.UploadDataTransfer > 0 {
  298. return int(math.Round(100 * float64(u.UsedUploadDataTransfer) / float64(u.UploadDataTransfer*1048576)))
  299. }
  300. return 0
  301. }
  302. func (u *userQuotaUsage) GetDownloadTransferQuotaPercentage() int {
  303. if u.DownloadDataTransfer > 0 {
  304. return int(math.Round(100 * float64(u.UsedDownloadDataTransfer) / float64(u.DownloadDataTransfer*1048576)))
  305. }
  306. return 0
  307. }
  308. func (u *userQuotaUsage) IsTotalTransferQuotaLow() bool {
  309. if u.TotalDataTransfer > 0 {
  310. return u.GetTotalTransferQuotaPercentage() > 85
  311. }
  312. return false
  313. }
  314. func (u *userQuotaUsage) IsUploadTransferQuotaLow() bool {
  315. if u.UploadDataTransfer > 0 {
  316. return u.GetUploadTransferQuotaPercentage() > 85
  317. }
  318. return false
  319. }
  320. func (u *userQuotaUsage) IsDownloadTransferQuotaLow() bool {
  321. if u.DownloadDataTransfer > 0 {
  322. return u.GetDownloadTransferQuotaPercentage() > 85
  323. }
  324. return false
  325. }
  326. func (u *userQuotaUsage) IsTransferQuotaLow() bool {
  327. return u.IsTotalTransferQuotaLow() || u.IsUploadTransferQuotaLow() || u.IsDownloadTransferQuotaLow()
  328. }
  329. func (u *userQuotaUsage) IsQuotaLow() bool {
  330. return u.IsDiskQuotaLow() || u.IsTransferQuotaLow()
  331. }
  332. func newUserQuotaUsage(u *dataprovider.User) *userQuotaUsage {
  333. return &userQuotaUsage{
  334. QuotaSize: u.QuotaSize,
  335. QuotaFiles: u.QuotaFiles,
  336. UsedQuotaSize: u.UsedQuotaSize,
  337. UsedQuotaFiles: u.UsedQuotaFiles,
  338. TotalDataTransfer: u.TotalDataTransfer,
  339. UploadDataTransfer: u.UploadDataTransfer,
  340. DownloadDataTransfer: u.DownloadDataTransfer,
  341. UsedUploadDataTransfer: u.UsedUploadDataTransfer,
  342. UsedDownloadDataTransfer: u.UsedDownloadDataTransfer,
  343. }
  344. }
  345. func getFileObjectURL(baseDir, name, baseWebPath string) string {
  346. return fmt.Sprintf("%v?path=%v&_=%v", baseWebPath, url.QueryEscape(path.Join(baseDir, name)), time.Now().UTC().Unix())
  347. }
  348. func getFileObjectModTime(t time.Time) int64 {
  349. if isZeroTime(t) {
  350. return 0
  351. }
  352. return t.UnixMilli()
  353. }
  354. func loadClientTemplates(templatesPath string) {
  355. filesPaths := []string{
  356. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  357. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  358. filepath.Join(templatesPath, templateClientDir, templateClientFiles),
  359. }
  360. editFilePath := []string{
  361. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  362. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  363. filepath.Join(templatesPath, templateClientDir, templateClientEditFile),
  364. }
  365. sharesPaths := []string{
  366. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  367. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  368. filepath.Join(templatesPath, templateClientDir, templateClientShares),
  369. }
  370. sharePaths := []string{
  371. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  372. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  373. filepath.Join(templatesPath, templateClientDir, templateClientShare),
  374. }
  375. profilePaths := []string{
  376. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  377. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  378. filepath.Join(templatesPath, templateClientDir, templateClientProfile),
  379. }
  380. changePwdPaths := []string{
  381. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  382. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  383. filepath.Join(templatesPath, templateCommonDir, templateChangePwd),
  384. }
  385. loginPaths := []string{
  386. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  387. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  388. filepath.Join(templatesPath, templateCommonDir, templateCommonLogin),
  389. }
  390. messagePaths := []string{
  391. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  392. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  393. filepath.Join(templatesPath, templateCommonDir, templateMessage),
  394. }
  395. mfaPaths := []string{
  396. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  397. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  398. filepath.Join(templatesPath, templateClientDir, templateClientMFA),
  399. }
  400. twoFactorPaths := []string{
  401. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  402. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  403. filepath.Join(templatesPath, templateCommonDir, templateTwoFactor),
  404. }
  405. twoFactorRecoveryPaths := []string{
  406. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  407. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  408. filepath.Join(templatesPath, templateCommonDir, templateTwoFactorRecovery),
  409. }
  410. forgotPwdPaths := []string{
  411. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  412. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  413. filepath.Join(templatesPath, templateCommonDir, templateForgotPassword),
  414. }
  415. resetPwdPaths := []string{
  416. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  417. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  418. filepath.Join(templatesPath, templateCommonDir, templateResetPassword),
  419. }
  420. viewPDFPaths := []string{
  421. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  422. filepath.Join(templatesPath, templateClientDir, templateClientViewPDF),
  423. }
  424. shareLoginPath := []string{
  425. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  426. filepath.Join(templatesPath, templateCommonDir, templateCommonBaseLogin),
  427. filepath.Join(templatesPath, templateClientDir, templateShareLogin),
  428. }
  429. shareUploadPath := []string{
  430. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  431. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  432. filepath.Join(templatesPath, templateClientDir, templateUploadToShare),
  433. }
  434. shareDownloadPath := []string{
  435. filepath.Join(templatesPath, templateCommonDir, templateCommonBase),
  436. filepath.Join(templatesPath, templateClientDir, templateClientBase),
  437. filepath.Join(templatesPath, templateClientDir, templateShareDownload),
  438. }
  439. filesTmpl := util.LoadTemplate(nil, filesPaths...)
  440. profileTmpl := util.LoadTemplate(nil, profilePaths...)
  441. changePwdTmpl := util.LoadTemplate(nil, changePwdPaths...)
  442. loginTmpl := util.LoadTemplate(nil, loginPaths...)
  443. messageTmpl := util.LoadTemplate(nil, messagePaths...)
  444. mfaTmpl := util.LoadTemplate(nil, mfaPaths...)
  445. twoFactorTmpl := util.LoadTemplate(nil, twoFactorPaths...)
  446. twoFactorRecoveryTmpl := util.LoadTemplate(nil, twoFactorRecoveryPaths...)
  447. editFileTmpl := util.LoadTemplate(nil, editFilePath...)
  448. shareLoginTmpl := util.LoadTemplate(nil, shareLoginPath...)
  449. sharesTmpl := util.LoadTemplate(nil, sharesPaths...)
  450. shareTmpl := util.LoadTemplate(nil, sharePaths...)
  451. forgotPwdTmpl := util.LoadTemplate(nil, forgotPwdPaths...)
  452. resetPwdTmpl := util.LoadTemplate(nil, resetPwdPaths...)
  453. viewPDFTmpl := util.LoadTemplate(nil, viewPDFPaths...)
  454. shareUploadTmpl := util.LoadTemplate(nil, shareUploadPath...)
  455. shareDownloadTmpl := util.LoadTemplate(nil, shareDownloadPath...)
  456. clientTemplates[templateClientFiles] = filesTmpl
  457. clientTemplates[templateClientProfile] = profileTmpl
  458. clientTemplates[templateChangePwd] = changePwdTmpl
  459. clientTemplates[templateCommonLogin] = loginTmpl
  460. clientTemplates[templateMessage] = messageTmpl
  461. clientTemplates[templateClientMFA] = mfaTmpl
  462. clientTemplates[templateTwoFactor] = twoFactorTmpl
  463. clientTemplates[templateTwoFactorRecovery] = twoFactorRecoveryTmpl
  464. clientTemplates[templateClientEditFile] = editFileTmpl
  465. clientTemplates[templateClientShares] = sharesTmpl
  466. clientTemplates[templateClientShare] = shareTmpl
  467. clientTemplates[templateForgotPassword] = forgotPwdTmpl
  468. clientTemplates[templateResetPassword] = resetPwdTmpl
  469. clientTemplates[templateClientViewPDF] = viewPDFTmpl
  470. clientTemplates[templateShareLogin] = shareLoginTmpl
  471. clientTemplates[templateUploadToShare] = shareUploadTmpl
  472. clientTemplates[templateShareDownload] = shareDownloadTmpl
  473. }
  474. func (s *httpdServer) getBaseClientPageData(title, currentURL string, r *http.Request) baseClientPage {
  475. var csrfToken string
  476. if currentURL != "" {
  477. csrfToken = createCSRFToken(util.GetIPFromRemoteAddress(r.RemoteAddr))
  478. }
  479. data := baseClientPage{
  480. commonBasePage: getCommonBasePage(r),
  481. Title: title,
  482. CurrentURL: currentURL,
  483. FilesURL: webClientFilesPath,
  484. SharesURL: webClientSharesPath,
  485. ShareURL: webClientSharePath,
  486. ProfileURL: webClientProfilePath,
  487. PingURL: webClientPingPath,
  488. ChangePwdURL: webChangeClientPwdPath,
  489. LogoutURL: webClientLogoutPath,
  490. EditURL: webClientEditFilePath,
  491. MFAURL: webClientMFAPath,
  492. CSRFToken: csrfToken,
  493. LoggedUser: getUserFromToken(r),
  494. Branding: s.binding.Branding.WebClient,
  495. }
  496. if !strings.HasPrefix(r.RequestURI, webClientPubSharesPath) {
  497. data.LoginURL = webClientLoginPath
  498. }
  499. return data
  500. }
  501. func (s *httpdServer) renderClientForgotPwdPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  502. data := forgotPwdPage{
  503. commonBasePage: getCommonBasePage(r),
  504. CurrentURL: webClientForgotPwdPath,
  505. Error: err,
  506. CSRFToken: createCSRFToken(ip),
  507. LoginURL: webClientLoginPath,
  508. Title: util.I18nForgotPwdTitle,
  509. Branding: s.binding.Branding.WebClient,
  510. }
  511. renderClientTemplate(w, templateForgotPassword, data)
  512. }
  513. func (s *httpdServer) renderClientResetPwdPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  514. data := resetPwdPage{
  515. commonBasePage: getCommonBasePage(r),
  516. CurrentURL: webClientResetPwdPath,
  517. Error: err,
  518. CSRFToken: createCSRFToken(ip),
  519. LoginURL: webClientLoginPath,
  520. Title: util.I18nResetPwdTitle,
  521. Branding: s.binding.Branding.WebClient,
  522. }
  523. renderClientTemplate(w, templateResetPassword, data)
  524. }
  525. func (s *httpdServer) renderShareLoginPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  526. data := shareLoginPage{
  527. commonBasePage: getCommonBasePage(r),
  528. Title: util.I18nShareLoginTitle,
  529. CurrentURL: r.RequestURI,
  530. Error: err,
  531. CSRFToken: createCSRFToken(ip),
  532. Branding: s.binding.Branding.WebClient,
  533. }
  534. renderClientTemplate(w, templateShareLogin, data)
  535. }
  536. func renderClientTemplate(w http.ResponseWriter, tmplName string, data any) {
  537. err := clientTemplates[tmplName].ExecuteTemplate(w, tmplName, data)
  538. if err != nil {
  539. http.Error(w, err.Error(), http.StatusInternalServerError)
  540. }
  541. }
  542. func (s *httpdServer) renderClientMessagePage(w http.ResponseWriter, r *http.Request, title string, statusCode int, err error, message string) {
  543. data := clientMessagePage{
  544. baseClientPage: s.getBaseClientPageData(title, "", r),
  545. Error: getI18nError(err),
  546. Success: message,
  547. }
  548. w.WriteHeader(statusCode)
  549. renderClientTemplate(w, templateMessage, data)
  550. }
  551. func (s *httpdServer) renderClientInternalServerErrorPage(w http.ResponseWriter, r *http.Request, err error) {
  552. s.renderClientMessagePage(w, r, util.I18nError500Title, http.StatusInternalServerError,
  553. util.NewI18nError(err, util.I18nError500Message), "")
  554. }
  555. func (s *httpdServer) renderClientBadRequestPage(w http.ResponseWriter, r *http.Request, err error) {
  556. s.renderClientMessagePage(w, r, util.I18nError400Title, http.StatusBadRequest,
  557. util.NewI18nError(err, util.I18nError400Message), "")
  558. }
  559. func (s *httpdServer) renderClientForbiddenPage(w http.ResponseWriter, r *http.Request, err error) {
  560. s.renderClientMessagePage(w, r, util.I18nError403Title, http.StatusForbidden,
  561. util.NewI18nError(err, util.I18nError403Message), "")
  562. }
  563. func (s *httpdServer) renderClientNotFoundPage(w http.ResponseWriter, r *http.Request, err error) {
  564. s.renderClientMessagePage(w, r, util.I18nError404Title, http.StatusNotFound,
  565. util.NewI18nError(err, util.I18nError404Message), "")
  566. }
  567. func (s *httpdServer) renderClientTwoFactorPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  568. data := twoFactorPage{
  569. commonBasePage: getCommonBasePage(r),
  570. Title: pageTwoFactorTitle,
  571. CurrentURL: webClientTwoFactorPath,
  572. Error: err,
  573. CSRFToken: createCSRFToken(ip),
  574. RecoveryURL: webClientTwoFactorRecoveryPath,
  575. Branding: s.binding.Branding.WebClient,
  576. }
  577. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  578. data.CurrentURL += "?next=" + url.QueryEscape(next)
  579. }
  580. renderClientTemplate(w, templateTwoFactor, data)
  581. }
  582. func (s *httpdServer) renderClientTwoFactorRecoveryPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  583. data := twoFactorPage{
  584. commonBasePage: getCommonBasePage(r),
  585. Title: pageTwoFactorRecoveryTitle,
  586. CurrentURL: webClientTwoFactorRecoveryPath,
  587. Error: err,
  588. CSRFToken: createCSRFToken(ip),
  589. Branding: s.binding.Branding.WebClient,
  590. }
  591. renderClientTemplate(w, templateTwoFactorRecovery, data)
  592. }
  593. func (s *httpdServer) renderClientMFAPage(w http.ResponseWriter, r *http.Request) {
  594. data := clientMFAPage{
  595. baseClientPage: s.getBaseClientPageData(util.I18n2FATitle, webClientMFAPath, r),
  596. TOTPConfigs: mfa.GetAvailableTOTPConfigNames(),
  597. GenerateTOTPURL: webClientTOTPGeneratePath,
  598. ValidateTOTPURL: webClientTOTPValidatePath,
  599. SaveTOTPURL: webClientTOTPSavePath,
  600. RecCodesURL: webClientRecoveryCodesPath,
  601. Protocols: dataprovider.MFAProtocols,
  602. }
  603. user, err := dataprovider.GetUserWithGroupSettings(data.LoggedUser.Username, "")
  604. if err != nil {
  605. s.renderClientInternalServerErrorPage(w, r, err)
  606. return
  607. }
  608. data.TOTPConfig = user.Filters.TOTPConfig
  609. data.RequiredProtocols = user.Filters.TwoFactorAuthProtocols
  610. renderClientTemplate(w, templateClientMFA, data)
  611. }
  612. func (s *httpdServer) renderEditFilePage(w http.ResponseWriter, r *http.Request, fileName, fileData string, readOnly bool) {
  613. title := util.I18nViewFileTitle
  614. if !readOnly {
  615. title = util.I18nEditFileTitle
  616. }
  617. data := editFilePage{
  618. baseClientPage: s.getBaseClientPageData(title, webClientEditFilePath, r),
  619. Path: fileName,
  620. Name: path.Base(fileName),
  621. CurrentDir: path.Dir(fileName),
  622. FileURL: webClientFilePath,
  623. ReadOnly: readOnly,
  624. Data: fileData,
  625. }
  626. renderClientTemplate(w, templateClientEditFile, data)
  627. }
  628. func (s *httpdServer) renderAddUpdateSharePage(w http.ResponseWriter, r *http.Request, share *dataprovider.Share,
  629. err *util.I18nError, isAdd bool) {
  630. currentURL := webClientSharePath
  631. title := util.I18nShareAddTitle
  632. if !isAdd {
  633. currentURL = fmt.Sprintf("%v/%v", webClientSharePath, url.PathEscape(share.ShareID))
  634. title = util.I18nShareUpdateTitle
  635. }
  636. data := clientSharePage{
  637. baseClientPage: s.getBaseClientPageData(title, currentURL, r),
  638. Share: share,
  639. Error: err,
  640. IsAdd: isAdd,
  641. }
  642. renderClientTemplate(w, templateClientShare, data)
  643. }
  644. func getDirMapping(dirName, baseWebPath string) []dirMapping {
  645. paths := []dirMapping{}
  646. if dirName != "/" {
  647. paths = append(paths, dirMapping{
  648. DirName: path.Base(dirName),
  649. Href: getFileObjectURL("/", dirName, baseWebPath),
  650. })
  651. for {
  652. dirName = path.Dir(dirName)
  653. if dirName == "/" || dirName == "." {
  654. break
  655. }
  656. paths = append([]dirMapping{{
  657. DirName: path.Base(dirName),
  658. Href: getFileObjectURL("/", dirName, baseWebPath)},
  659. }, paths...)
  660. }
  661. }
  662. return paths
  663. }
  664. func (s *httpdServer) renderSharedFilesPage(w http.ResponseWriter, r *http.Request, dirName string,
  665. err *util.I18nError, share dataprovider.Share,
  666. ) {
  667. currentURL := path.Join(webClientPubSharesPath, share.ShareID, "browse")
  668. baseData := s.getBaseClientPageData(util.I18nSharedFilesTitle, currentURL, r)
  669. baseData.FilesURL = currentURL
  670. baseSharePath := path.Join(webClientPubSharesPath, share.ShareID)
  671. data := filesPage{
  672. baseClientPage: baseData,
  673. Error: err,
  674. CurrentDir: url.QueryEscape(dirName),
  675. DownloadURL: path.Join(baseSharePath, "partial"),
  676. // dirName must be escaped because the router expects the full path as single argument
  677. ShareUploadBaseURL: path.Join(baseSharePath, url.PathEscape(dirName)),
  678. ViewPDFURL: path.Join(baseSharePath, "viewpdf"),
  679. DirsURL: path.Join(baseSharePath, "dirs"),
  680. FileURL: "",
  681. FileActionsURL: "",
  682. CheckExistURL: path.Join(baseSharePath, "browse", "exist"),
  683. TasksURL: "",
  684. CanAddFiles: share.Scope == dataprovider.ShareScopeReadWrite,
  685. CanCreateDirs: false,
  686. CanRename: false,
  687. CanDelete: false,
  688. CanDownload: share.Scope != dataprovider.ShareScopeWrite,
  689. CanShare: false,
  690. CanCopy: false,
  691. Paths: getDirMapping(dirName, currentURL),
  692. QuotaUsage: newUserQuotaUsage(&dataprovider.User{}),
  693. }
  694. renderClientTemplate(w, templateClientFiles, data)
  695. }
  696. func (s *httpdServer) renderShareDownloadPage(w http.ResponseWriter, r *http.Request, downloadLink string) {
  697. data := shareDownloadPage{
  698. baseClientPage: s.getBaseClientPageData(util.I18nShareDownloadTitle, "", r),
  699. DownloadLink: downloadLink,
  700. }
  701. renderClientTemplate(w, templateShareDownload, data)
  702. }
  703. func (s *httpdServer) renderUploadToSharePage(w http.ResponseWriter, r *http.Request, share dataprovider.Share) {
  704. currentURL := path.Join(webClientPubSharesPath, share.ShareID, "upload")
  705. data := shareUploadPage{
  706. baseClientPage: s.getBaseClientPageData(util.I18nShareUploadTitle, currentURL, r),
  707. Share: &share,
  708. UploadBasePath: path.Join(webClientPubSharesPath, share.ShareID),
  709. }
  710. renderClientTemplate(w, templateUploadToShare, data)
  711. }
  712. func (s *httpdServer) renderFilesPage(w http.ResponseWriter, r *http.Request, dirName string,
  713. err *util.I18nError, user *dataprovider.User) {
  714. data := filesPage{
  715. baseClientPage: s.getBaseClientPageData(util.I18nFilesTitle, webClientFilesPath, r),
  716. Error: err,
  717. CurrentDir: url.QueryEscape(dirName),
  718. DownloadURL: webClientDownloadZipPath,
  719. ViewPDFURL: webClientViewPDFPath,
  720. DirsURL: webClientDirsPath,
  721. FileURL: webClientFilePath,
  722. FileActionsURL: webClientFileActionsPath,
  723. CheckExistURL: webClientExistPath,
  724. TasksURL: webClientTasksPath,
  725. CanAddFiles: user.CanAddFilesFromWeb(dirName),
  726. CanCreateDirs: user.CanAddDirsFromWeb(dirName),
  727. CanRename: user.CanRenameFromWeb(dirName, dirName),
  728. CanDelete: user.CanDeleteFromWeb(dirName),
  729. CanDownload: user.HasPerm(dataprovider.PermDownload, dirName),
  730. CanShare: user.CanManageShares(),
  731. CanCopy: user.CanCopyFromWeb(dirName, dirName),
  732. ShareUploadBaseURL: "",
  733. Paths: getDirMapping(dirName, webClientFilesPath),
  734. QuotaUsage: newUserQuotaUsage(user),
  735. }
  736. renderClientTemplate(w, templateClientFiles, data)
  737. }
  738. func (s *httpdServer) renderClientProfilePage(w http.ResponseWriter, r *http.Request, err *util.I18nError) {
  739. data := clientProfilePage{
  740. baseClientPage: s.getBaseClientPageData(util.I18nProfileTitle, webClientProfilePath, r),
  741. Error: err,
  742. }
  743. user, userMerged, errUser := dataprovider.GetUserVariants(data.LoggedUser.Username, "")
  744. if errUser != nil {
  745. s.renderClientInternalServerErrorPage(w, r, errUser)
  746. return
  747. }
  748. data.PublicKeys = user.PublicKeys
  749. data.TLSCerts = user.Filters.TLSCerts
  750. data.AllowAPIKeyAuth = user.Filters.AllowAPIKeyAuth
  751. data.Email = user.Email
  752. data.Description = user.Description
  753. data.CanSubmit = userMerged.CanUpdateProfile()
  754. renderClientTemplate(w, templateClientProfile, data)
  755. }
  756. func (s *httpdServer) renderClientChangePasswordPage(w http.ResponseWriter, r *http.Request, err *util.I18nError) {
  757. data := changeClientPasswordPage{
  758. baseClientPage: s.getBaseClientPageData(util.I18nChangePwdTitle, webChangeClientPwdPath, r),
  759. Error: err,
  760. }
  761. renderClientTemplate(w, templateChangePwd, data)
  762. }
  763. func (s *httpdServer) handleWebClientDownloadZip(w http.ResponseWriter, r *http.Request) {
  764. r.Body = http.MaxBytesReader(w, r.Body, maxMultipartMem)
  765. claims, err := getTokenClaims(r)
  766. if err != nil || claims.Username == "" {
  767. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  768. return
  769. }
  770. if err := r.ParseForm(); err != nil {
  771. s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
  772. return
  773. }
  774. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  775. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  776. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  777. return
  778. }
  779. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  780. if err != nil {
  781. s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
  782. util.NewI18nError(err, util.I18nErrorGetUser), "")
  783. return
  784. }
  785. connID := xid.New().String()
  786. protocol := getProtocolFromRequest(r)
  787. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  788. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  789. s.renderClientForbiddenPage(w, r, err)
  790. return
  791. }
  792. connection := &Connection{
  793. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  794. r.RemoteAddr, user),
  795. request: r,
  796. }
  797. if err = common.Connections.Add(connection); err != nil {
  798. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  799. util.NewI18nError(err, util.I18nError429Message), "")
  800. return
  801. }
  802. defer common.Connections.Remove(connection.GetID())
  803. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  804. files := r.Form.Get("files")
  805. var filesList []string
  806. err = json.Unmarshal([]byte(files), &filesList)
  807. if err != nil {
  808. s.renderClientBadRequestPage(w, r, err)
  809. return
  810. }
  811. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
  812. getCompressedFileName(connection.GetUsername(), filesList)))
  813. renderCompressedFiles(w, connection, name, filesList, nil)
  814. }
  815. func (s *httpdServer) handleClientSharePartialDownload(w http.ResponseWriter, r *http.Request) {
  816. r.Body = http.MaxBytesReader(w, r.Body, maxMultipartMem)
  817. if err := r.ParseForm(); err != nil {
  818. s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
  819. return
  820. }
  821. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  822. share, connection, err := s.checkPublicShare(w, r, validScopes)
  823. if err != nil {
  824. return
  825. }
  826. if err := validateBrowsableShare(share, connection); err != nil {
  827. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  828. return
  829. }
  830. name, err := getBrowsableSharedPath(share.Paths[0], r)
  831. if err != nil {
  832. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  833. return
  834. }
  835. if err = common.Connections.Add(connection); err != nil {
  836. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  837. util.NewI18nError(err, util.I18nError429Message), "")
  838. return
  839. }
  840. defer common.Connections.Remove(connection.GetID())
  841. transferQuota := connection.GetTransferQuota()
  842. if !transferQuota.HasDownloadSpace() {
  843. err = util.NewI18nError(connection.GetReadQuotaExceededError(), util.I18nErrorQuotaRead)
  844. connection.Log(logger.LevelInfo, "denying share read due to quota limits")
  845. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getMappedStatusCode(err), err, "")
  846. return
  847. }
  848. files := r.Form.Get("files")
  849. var filesList []string
  850. err = json.Unmarshal([]byte(files), &filesList)
  851. if err != nil {
  852. s.renderClientBadRequestPage(w, r, err)
  853. return
  854. }
  855. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  856. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
  857. getCompressedFileName(fmt.Sprintf("share-%s", share.Name), filesList)))
  858. renderCompressedFiles(w, connection, name, filesList, &share)
  859. }
  860. func (s *httpdServer) handleShareGetDirContents(w http.ResponseWriter, r *http.Request) {
  861. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  862. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  863. share, connection, err := s.checkPublicShare(w, r, validScopes)
  864. if err != nil {
  865. return
  866. }
  867. if err := validateBrowsableShare(share, connection); err != nil {
  868. sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError500Message), getRespStatus(err))
  869. return
  870. }
  871. name, err := getBrowsableSharedPath(share.Paths[0], r)
  872. if err != nil {
  873. sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError500Message), getRespStatus(err))
  874. return
  875. }
  876. if err = common.Connections.Add(connection); err != nil {
  877. sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nError429Message), http.StatusTooManyRequests)
  878. return
  879. }
  880. defer common.Connections.Remove(connection.GetID())
  881. lister, err := connection.ReadDir(name)
  882. if err != nil {
  883. sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nErrorDirListGeneric), getMappedStatusCode(err))
  884. return
  885. }
  886. defer lister.Close()
  887. dataGetter := func(limit, _ int) ([]byte, int, error) {
  888. contents, err := lister.Next(limit)
  889. if errors.Is(err, io.EOF) {
  890. err = nil
  891. }
  892. if err != nil {
  893. return nil, 0, err
  894. }
  895. results := make([]map[string]any, 0, len(contents))
  896. for _, info := range contents {
  897. if !info.Mode().IsDir() && !info.Mode().IsRegular() {
  898. continue
  899. }
  900. res := make(map[string]any)
  901. if info.IsDir() {
  902. res["type"] = "1"
  903. res["size"] = ""
  904. } else {
  905. res["type"] = "2"
  906. res["size"] = info.Size()
  907. }
  908. res["meta"] = fmt.Sprintf("%v_%v", res["type"], info.Name())
  909. res["name"] = info.Name()
  910. res["url"] = getFileObjectURL(share.GetRelativePath(name), info.Name(),
  911. path.Join(webClientPubSharesPath, share.ShareID, "browse"))
  912. res["last_modified"] = getFileObjectModTime(info.ModTime())
  913. results = append(results, res)
  914. }
  915. data, err := json.Marshal(results)
  916. count := limit
  917. if len(results) == 0 {
  918. count = 0
  919. }
  920. return data, count, err
  921. }
  922. streamJSONArray(w, defaultQueryLimit, dataGetter)
  923. }
  924. func (s *httpdServer) handleClientUploadToShare(w http.ResponseWriter, r *http.Request) {
  925. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  926. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeWrite, dataprovider.ShareScopeReadWrite}
  927. share, _, err := s.checkPublicShare(w, r, validScopes)
  928. if err != nil {
  929. return
  930. }
  931. if share.Scope == dataprovider.ShareScopeReadWrite {
  932. http.Redirect(w, r, path.Join(webClientPubSharesPath, share.ShareID, "browse"), http.StatusFound)
  933. return
  934. }
  935. s.renderUploadToSharePage(w, r, share)
  936. }
  937. func (s *httpdServer) handleShareGetFiles(w http.ResponseWriter, r *http.Request) {
  938. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  939. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  940. share, connection, err := s.checkPublicShare(w, r, validScopes)
  941. if err != nil {
  942. return
  943. }
  944. if err := validateBrowsableShare(share, connection); err != nil {
  945. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  946. return
  947. }
  948. name, err := getBrowsableSharedPath(share.Paths[0], r)
  949. if err != nil {
  950. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  951. return
  952. }
  953. if err = common.Connections.Add(connection); err != nil {
  954. s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
  955. util.NewI18nError(err, util.I18nError429Message), share)
  956. return
  957. }
  958. defer common.Connections.Remove(connection.GetID())
  959. var info os.FileInfo
  960. if name == "/" {
  961. info = vfs.NewFileInfo(name, true, 0, time.Unix(0, 0), false)
  962. } else {
  963. info, err = connection.Stat(name, 1)
  964. }
  965. if err != nil {
  966. s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
  967. util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), share)
  968. return
  969. }
  970. if info.IsDir() {
  971. s.renderSharedFilesPage(w, r, share.GetRelativePath(name), nil, share)
  972. return
  973. }
  974. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  975. if status, err := downloadFile(w, r, connection, name, info, false, &share); err != nil {
  976. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  977. if status > 0 {
  978. s.renderSharedFilesPage(w, r, path.Dir(share.GetRelativePath(name)),
  979. util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), share)
  980. }
  981. }
  982. }
  983. func (s *httpdServer) handleShareViewPDF(w http.ResponseWriter, r *http.Request) {
  984. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  985. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  986. share, _, err := s.checkPublicShare(w, r, validScopes)
  987. if err != nil {
  988. return
  989. }
  990. name := util.CleanPath(r.URL.Query().Get("path"))
  991. data := viewPDFPage{
  992. commonBasePage: getCommonBasePage(r),
  993. Title: path.Base(name),
  994. URL: fmt.Sprintf("%s?path=%s&_=%d", path.Join(webClientPubSharesPath, share.ShareID, "getpdf"),
  995. url.QueryEscape(name), time.Now().UTC().Unix()),
  996. Branding: s.binding.Branding.WebClient,
  997. }
  998. renderClientTemplate(w, templateClientViewPDF, data)
  999. }
  1000. func (s *httpdServer) handleShareGetPDF(w http.ResponseWriter, r *http.Request) {
  1001. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1002. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  1003. share, connection, err := s.checkPublicShare(w, r, validScopes)
  1004. if err != nil {
  1005. return
  1006. }
  1007. if err := validateBrowsableShare(share, connection); err != nil {
  1008. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  1009. return
  1010. }
  1011. name, err := getBrowsableSharedPath(share.Paths[0], r)
  1012. if err != nil {
  1013. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, getRespStatus(err), err, "")
  1014. return
  1015. }
  1016. if err = common.Connections.Add(connection); err != nil {
  1017. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1018. util.NewI18nError(err, util.I18nError429Message), "")
  1019. return
  1020. }
  1021. defer common.Connections.Remove(connection.GetID())
  1022. info, err := connection.Stat(name, 1)
  1023. if err != nil {
  1024. status := getRespStatus(err)
  1025. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, status,
  1026. util.NewI18nError(err, i18nFsMsg(status)), "")
  1027. return
  1028. }
  1029. if info.IsDir() {
  1030. s.renderClientBadRequestPage(w, r, util.NewI18nError(fmt.Errorf("%q is not a file", name), util.I18nErrorPDFMessage))
  1031. return
  1032. }
  1033. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  1034. if err := s.ensurePDF(w, r, name, connection); err != nil {
  1035. return
  1036. }
  1037. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  1038. if _, err := downloadFile(w, r, connection, name, info, true, &share); err != nil {
  1039. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  1040. }
  1041. }
  1042. func (s *httpdServer) handleClientGetDirContents(w http.ResponseWriter, r *http.Request) {
  1043. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1044. claims, err := getTokenClaims(r)
  1045. if err != nil || claims.Username == "" {
  1046. sendAPIResponse(w, r, nil, util.I18nErrorDirList403, http.StatusForbidden)
  1047. return
  1048. }
  1049. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1050. if err != nil {
  1051. sendAPIResponse(w, r, nil, util.I18nErrorDirListUser, getRespStatus(err))
  1052. return
  1053. }
  1054. connID := xid.New().String()
  1055. protocol := getProtocolFromRequest(r)
  1056. connectionID := fmt.Sprintf("%s_%s", protocol, connID)
  1057. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  1058. sendAPIResponse(w, r, err, getI18NErrorString(err, util.I18nErrorDirList403), http.StatusForbidden)
  1059. return
  1060. }
  1061. connection := &Connection{
  1062. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  1063. r.RemoteAddr, user),
  1064. request: r,
  1065. }
  1066. if err = common.Connections.Add(connection); err != nil {
  1067. sendAPIResponse(w, r, err, util.I18nErrorDirList429, http.StatusTooManyRequests)
  1068. return
  1069. }
  1070. defer common.Connections.Remove(connection.GetID())
  1071. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1072. lister, err := connection.ReadDir(name)
  1073. if err != nil {
  1074. statusCode := getMappedStatusCode(err)
  1075. sendAPIResponse(w, r, err, i18nListDirMsg(statusCode), statusCode)
  1076. return
  1077. }
  1078. defer lister.Close()
  1079. dirTree := r.URL.Query().Get("dirtree") == "1"
  1080. dataGetter := func(limit, _ int) ([]byte, int, error) {
  1081. contents, err := lister.Next(limit)
  1082. if errors.Is(err, io.EOF) {
  1083. err = nil
  1084. }
  1085. if err != nil {
  1086. return nil, 0, err
  1087. }
  1088. results := make([]map[string]any, 0, len(contents))
  1089. for _, info := range contents {
  1090. res := make(map[string]any)
  1091. res["url"] = getFileObjectURL(name, info.Name(), webClientFilesPath)
  1092. if info.IsDir() {
  1093. res["type"] = "1"
  1094. res["size"] = ""
  1095. res["dir_path"] = url.QueryEscape(path.Join(name, info.Name()))
  1096. } else {
  1097. if dirTree {
  1098. continue
  1099. }
  1100. res["type"] = "2"
  1101. if info.Mode()&os.ModeSymlink != 0 {
  1102. res["size"] = ""
  1103. } else {
  1104. res["size"] = info.Size()
  1105. if info.Size() < httpdMaxEditFileSize {
  1106. res["edit_url"] = strings.Replace(res["url"].(string), webClientFilesPath, webClientEditFilePath, 1)
  1107. }
  1108. }
  1109. }
  1110. res["meta"] = fmt.Sprintf("%v_%v", res["type"], info.Name())
  1111. res["name"] = info.Name()
  1112. res["last_modified"] = getFileObjectModTime(info.ModTime())
  1113. results = append(results, res)
  1114. }
  1115. data, err := json.Marshal(results)
  1116. count := limit
  1117. if len(results) == 0 {
  1118. count = 0
  1119. }
  1120. return data, count, err
  1121. }
  1122. streamJSONArray(w, defaultQueryLimit, dataGetter)
  1123. }
  1124. func (s *httpdServer) handleClientGetFiles(w http.ResponseWriter, r *http.Request) {
  1125. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1126. claims, err := getTokenClaims(r)
  1127. if err != nil || claims.Username == "" {
  1128. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1129. return
  1130. }
  1131. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1132. if err != nil {
  1133. s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
  1134. util.NewI18nError(err, util.I18nErrorGetUser), "")
  1135. return
  1136. }
  1137. connID := xid.New().String()
  1138. protocol := getProtocolFromRequest(r)
  1139. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  1140. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  1141. s.renderClientForbiddenPage(w, r, err)
  1142. return
  1143. }
  1144. connection := &Connection{
  1145. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  1146. r.RemoteAddr, user),
  1147. request: r,
  1148. }
  1149. if err = common.Connections.Add(connection); err != nil {
  1150. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1151. util.NewI18nError(err, util.I18nError429Message), "")
  1152. return
  1153. }
  1154. defer common.Connections.Remove(connection.GetID())
  1155. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1156. var info os.FileInfo
  1157. if name == "/" {
  1158. info = vfs.NewFileInfo(name, true, 0, time.Unix(0, 0), false)
  1159. } else {
  1160. info, err = connection.Stat(name, 0)
  1161. }
  1162. if err != nil {
  1163. s.renderFilesPage(w, r, path.Dir(name), util.NewI18nError(err, i18nFsMsg(getRespStatus(err))), &user)
  1164. return
  1165. }
  1166. if info.IsDir() {
  1167. s.renderFilesPage(w, r, name, nil, &user)
  1168. return
  1169. }
  1170. if status, err := downloadFile(w, r, connection, name, info, false, nil); err != nil && status != 0 {
  1171. if status > 0 {
  1172. if status == http.StatusRequestedRangeNotSatisfiable {
  1173. s.renderClientMessagePage(w, r, util.I18nError416Title, status,
  1174. util.NewI18nError(err, util.I18nError416Message), "")
  1175. return
  1176. }
  1177. s.renderFilesPage(w, r, path.Dir(name), util.NewI18nError(err, i18nFsMsg(status)), &user)
  1178. }
  1179. }
  1180. }
  1181. func (s *httpdServer) handleClientEditFile(w http.ResponseWriter, r *http.Request) {
  1182. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1183. claims, err := getTokenClaims(r)
  1184. if err != nil || claims.Username == "" {
  1185. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1186. return
  1187. }
  1188. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1189. if err != nil {
  1190. s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
  1191. util.NewI18nError(err, util.I18nErrorGetUser), "")
  1192. return
  1193. }
  1194. connID := xid.New().String()
  1195. protocol := getProtocolFromRequest(r)
  1196. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  1197. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  1198. s.renderClientForbiddenPage(w, r, err)
  1199. return
  1200. }
  1201. connection := &Connection{
  1202. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  1203. r.RemoteAddr, user),
  1204. request: r,
  1205. }
  1206. if err = common.Connections.Add(connection); err != nil {
  1207. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1208. util.NewI18nError(err, util.I18nError429Message), "")
  1209. return
  1210. }
  1211. defer common.Connections.Remove(connection.GetID())
  1212. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1213. info, err := connection.Stat(name, 0)
  1214. if err != nil {
  1215. status := getRespStatus(err)
  1216. s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, status, util.NewI18nError(err, i18nFsMsg(status)), "")
  1217. return
  1218. }
  1219. if info.IsDir() {
  1220. s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, http.StatusBadRequest,
  1221. util.NewI18nError(
  1222. util.NewValidationError(fmt.Sprintf("The path %q does not point to a file", name)),
  1223. util.I18nErrorEditDir,
  1224. ), "")
  1225. return
  1226. }
  1227. if info.Size() > httpdMaxEditFileSize {
  1228. s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, http.StatusBadRequest,
  1229. util.NewI18nError(
  1230. util.NewValidationError(fmt.Sprintf("The file size %v for %q exceeds the maximum allowed size",
  1231. util.ByteCountIEC(info.Size()), name)),
  1232. util.I18nErrorEditSize,
  1233. ), "")
  1234. return
  1235. }
  1236. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  1237. reader, err := connection.getFileReader(name, 0, r.Method)
  1238. if err != nil {
  1239. s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, getRespStatus(err),
  1240. util.NewI18nError(err, util.I18nError500Message), "")
  1241. return
  1242. }
  1243. defer reader.Close()
  1244. var b bytes.Buffer
  1245. _, err = io.Copy(&b, reader)
  1246. if err != nil {
  1247. s.renderClientMessagePage(w, r, util.I18nErrorEditorTitle, getRespStatus(err),
  1248. util.NewI18nError(err, util.I18nError500Message), "")
  1249. return
  1250. }
  1251. s.renderEditFilePage(w, r, name, b.String(), !user.CanAddFilesFromWeb(path.Dir(name)))
  1252. }
  1253. func (s *httpdServer) handleClientAddShareGet(w http.ResponseWriter, r *http.Request) {
  1254. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1255. claims, err := getTokenClaims(r)
  1256. if err != nil || claims.Username == "" {
  1257. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1258. return
  1259. }
  1260. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1261. if err != nil {
  1262. s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
  1263. util.NewI18nError(err, util.I18nErrorGetUser), "")
  1264. return
  1265. }
  1266. share := &dataprovider.Share{Scope: dataprovider.ShareScopeRead}
  1267. if user.Filters.DefaultSharesExpiration > 0 {
  1268. share.ExpiresAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(24 * time.Hour * time.Duration(user.Filters.DefaultSharesExpiration)))
  1269. } else if user.Filters.MaxSharesExpiration > 0 {
  1270. share.ExpiresAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration)))
  1271. }
  1272. dirName := "/"
  1273. if _, ok := r.URL.Query()["path"]; ok {
  1274. dirName = util.CleanPath(r.URL.Query().Get("path"))
  1275. }
  1276. if _, ok := r.URL.Query()["files"]; ok {
  1277. files := r.URL.Query().Get("files")
  1278. var filesList []string
  1279. err := json.Unmarshal([]byte(files), &filesList)
  1280. if err != nil {
  1281. s.renderClientBadRequestPage(w, r, err)
  1282. return
  1283. }
  1284. for _, f := range filesList {
  1285. if f != "" {
  1286. share.Paths = append(share.Paths, path.Join(dirName, f))
  1287. }
  1288. }
  1289. }
  1290. s.renderAddUpdateSharePage(w, r, share, nil, true)
  1291. }
  1292. func (s *httpdServer) handleClientUpdateShareGet(w http.ResponseWriter, r *http.Request) {
  1293. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1294. claims, err := getTokenClaims(r)
  1295. if err != nil || claims.Username == "" {
  1296. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1297. return
  1298. }
  1299. shareID := getURLParam(r, "id")
  1300. share, err := dataprovider.ShareExists(shareID, claims.Username)
  1301. if err == nil {
  1302. share.HideConfidentialData()
  1303. s.renderAddUpdateSharePage(w, r, &share, nil, false)
  1304. } else if errors.Is(err, util.ErrNotFound) {
  1305. s.renderClientNotFoundPage(w, r, err)
  1306. } else {
  1307. s.renderClientInternalServerErrorPage(w, r, err)
  1308. }
  1309. }
  1310. func (s *httpdServer) handleClientAddSharePost(w http.ResponseWriter, r *http.Request) {
  1311. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1312. claims, err := getTokenClaims(r)
  1313. if err != nil || claims.Username == "" {
  1314. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1315. return
  1316. }
  1317. share, err := getShareFromPostFields(r)
  1318. if err != nil {
  1319. s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nError500Message), true)
  1320. return
  1321. }
  1322. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1323. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  1324. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  1325. return
  1326. }
  1327. share.ID = 0
  1328. share.ShareID = util.GenerateUniqueID()
  1329. share.LastUseAt = 0
  1330. share.Username = claims.Username
  1331. if share.Password == "" {
  1332. if util.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
  1333. s.renderAddUpdateSharePage(w, r, share,
  1334. util.NewI18nError(util.NewValidationError("You are not allowed to share files/folders without password"), util.I18nErrorShareNoPwd),
  1335. true)
  1336. return
  1337. }
  1338. }
  1339. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1340. if err != nil {
  1341. s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nErrorGetUser), true)
  1342. return
  1343. }
  1344. if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(share.ExpiresAt)); err != nil {
  1345. s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(
  1346. err,
  1347. util.I18nErrorShareExpirationOutOfRange,
  1348. util.I18nErrorArgs(
  1349. map[string]any{
  1350. "val": time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration+1)).UnixMilli(),
  1351. "formatParams": map[string]string{
  1352. "year": "numeric",
  1353. "month": "numeric",
  1354. "day": "numeric",
  1355. },
  1356. },
  1357. ),
  1358. ), true)
  1359. return
  1360. }
  1361. err = dataprovider.AddShare(share, claims.Username, ipAddr, claims.Role)
  1362. if err == nil {
  1363. http.Redirect(w, r, webClientSharesPath, http.StatusSeeOther)
  1364. } else {
  1365. s.renderAddUpdateSharePage(w, r, share, util.NewI18nError(err, util.I18nErrorShareGeneric), true)
  1366. }
  1367. }
  1368. func (s *httpdServer) handleClientUpdateSharePost(w http.ResponseWriter, r *http.Request) {
  1369. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1370. claims, err := getTokenClaims(r)
  1371. if err != nil || claims.Username == "" {
  1372. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1373. return
  1374. }
  1375. shareID := getURLParam(r, "id")
  1376. share, err := dataprovider.ShareExists(shareID, claims.Username)
  1377. if errors.Is(err, util.ErrNotFound) {
  1378. s.renderClientNotFoundPage(w, r, err)
  1379. return
  1380. } else if err != nil {
  1381. s.renderClientInternalServerErrorPage(w, r, err)
  1382. return
  1383. }
  1384. updatedShare, err := getShareFromPostFields(r)
  1385. if err != nil {
  1386. s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nError500Message), false)
  1387. return
  1388. }
  1389. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1390. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  1391. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  1392. return
  1393. }
  1394. updatedShare.ShareID = shareID
  1395. updatedShare.Username = claims.Username
  1396. if updatedShare.Password == redactedSecret {
  1397. updatedShare.Password = share.Password
  1398. }
  1399. if updatedShare.Password == "" {
  1400. if util.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
  1401. s.renderAddUpdateSharePage(w, r, updatedShare,
  1402. util.NewI18nError(util.NewValidationError("You are not allowed to share files/folders without password"), util.I18nErrorShareNoPwd),
  1403. false)
  1404. return
  1405. }
  1406. }
  1407. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1408. if err != nil {
  1409. s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nErrorGetUser), false)
  1410. return
  1411. }
  1412. if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(updatedShare.ExpiresAt)); err != nil {
  1413. s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(
  1414. err,
  1415. util.I18nErrorShareExpirationOutOfRange,
  1416. util.I18nErrorArgs(
  1417. map[string]any{
  1418. "val": time.Now().Add(24 * time.Hour * time.Duration(user.Filters.MaxSharesExpiration+1)).UnixMilli(),
  1419. "formatParams": map[string]string{
  1420. "year": "numeric",
  1421. "month": "numeric",
  1422. "day": "numeric",
  1423. },
  1424. },
  1425. ),
  1426. ), false)
  1427. return
  1428. }
  1429. err = dataprovider.UpdateShare(updatedShare, claims.Username, ipAddr, claims.Role)
  1430. if err == nil {
  1431. http.Redirect(w, r, webClientSharesPath, http.StatusSeeOther)
  1432. } else {
  1433. s.renderAddUpdateSharePage(w, r, updatedShare, util.NewI18nError(err, util.I18nErrorShareGeneric), false)
  1434. }
  1435. }
  1436. func getAllShares(w http.ResponseWriter, r *http.Request) {
  1437. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1438. claims, err := getTokenClaims(r)
  1439. if err != nil || claims.Username == "" {
  1440. sendAPIResponse(w, r, nil, util.I18nErrorInvalidToken, http.StatusForbidden)
  1441. return
  1442. }
  1443. dataGetter := func(limit, offset int) ([]byte, int, error) {
  1444. shares, err := dataprovider.GetShares(limit, offset, dataprovider.OrderASC, claims.Username)
  1445. if err != nil {
  1446. return nil, 0, err
  1447. }
  1448. data, err := json.Marshal(shares)
  1449. return data, len(shares), err
  1450. }
  1451. streamJSONArray(w, defaultQueryLimit, dataGetter)
  1452. }
  1453. func (s *httpdServer) handleClientGetShares(w http.ResponseWriter, r *http.Request) {
  1454. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1455. data := clientSharesPage{
  1456. baseClientPage: s.getBaseClientPageData(util.I18nSharesTitle, webClientSharesPath, r),
  1457. BasePublicSharesURL: webClientPubSharesPath,
  1458. }
  1459. renderClientTemplate(w, templateClientShares, data)
  1460. }
  1461. func (s *httpdServer) handleClientGetProfile(w http.ResponseWriter, r *http.Request) {
  1462. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1463. s.renderClientProfilePage(w, r, nil)
  1464. }
  1465. func (s *httpdServer) handleWebClientChangePwd(w http.ResponseWriter, r *http.Request) {
  1466. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1467. s.renderClientChangePasswordPage(w, r, nil)
  1468. }
  1469. func (s *httpdServer) handleWebClientProfilePost(w http.ResponseWriter, r *http.Request) {
  1470. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1471. err := r.ParseForm()
  1472. if err != nil {
  1473. s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
  1474. return
  1475. }
  1476. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1477. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  1478. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  1479. return
  1480. }
  1481. claims, err := getTokenClaims(r)
  1482. if err != nil || claims.Username == "" {
  1483. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1484. return
  1485. }
  1486. user, userMerged, err := dataprovider.GetUserVariants(claims.Username, "")
  1487. if err != nil {
  1488. s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nErrorGetUser))
  1489. return
  1490. }
  1491. if !userMerged.CanUpdateProfile() {
  1492. s.renderClientForbiddenPage(w, r, util.NewI18nError(
  1493. errors.New("you are not allowed to change anything"),
  1494. util.I18nErrorNoPermissions,
  1495. ))
  1496. return
  1497. }
  1498. if userMerged.CanManagePublicKeys() {
  1499. for k := range r.Form {
  1500. if hasPrefixAndSuffix(k, "public_keys[", "][public_key]") {
  1501. r.Form.Add("public_keys", r.Form.Get(k))
  1502. }
  1503. }
  1504. user.PublicKeys = r.Form["public_keys"]
  1505. }
  1506. if userMerged.CanManageTLSCerts() {
  1507. for k := range r.Form {
  1508. if hasPrefixAndSuffix(k, "tls_certs[", "][tls_cert]") {
  1509. r.Form.Add("tls_certs", r.Form.Get(k))
  1510. }
  1511. }
  1512. user.Filters.TLSCerts = r.Form["tls_certs"]
  1513. }
  1514. if userMerged.CanChangeAPIKeyAuth() {
  1515. user.Filters.AllowAPIKeyAuth = r.Form.Get("allow_api_key_auth") != ""
  1516. }
  1517. if userMerged.CanChangeInfo() {
  1518. user.Email = strings.TrimSpace(r.Form.Get("email"))
  1519. user.Description = r.Form.Get("description")
  1520. }
  1521. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
  1522. if err != nil {
  1523. s.renderClientProfilePage(w, r, util.NewI18nError(err, util.I18nError500Message))
  1524. return
  1525. }
  1526. s.renderClientMessagePage(w, r, util.I18nProfileTitle, http.StatusOK, nil, util.I18nProfileUpdated)
  1527. }
  1528. func (s *httpdServer) handleWebClientMFA(w http.ResponseWriter, r *http.Request) {
  1529. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1530. s.renderClientMFAPage(w, r)
  1531. }
  1532. func (s *httpdServer) handleWebClientTwoFactor(w http.ResponseWriter, r *http.Request) {
  1533. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1534. s.renderClientTwoFactorPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
  1535. }
  1536. func (s *httpdServer) handleWebClientTwoFactorRecovery(w http.ResponseWriter, r *http.Request) {
  1537. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1538. s.renderClientTwoFactorRecoveryPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
  1539. }
  1540. func getShareFromPostFields(r *http.Request) (*dataprovider.Share, error) {
  1541. share := &dataprovider.Share{}
  1542. if err := r.ParseForm(); err != nil {
  1543. return share, util.NewI18nError(err, util.I18nErrorInvalidForm)
  1544. }
  1545. for k := range r.Form {
  1546. if hasPrefixAndSuffix(k, "paths[", "][path]") {
  1547. r.Form.Add("paths", r.Form.Get(k))
  1548. }
  1549. }
  1550. share.Name = strings.TrimSpace(r.Form.Get("name"))
  1551. share.Description = r.Form.Get("description")
  1552. for _, p := range r.Form["paths"] {
  1553. if strings.TrimSpace(p) != "" {
  1554. share.Paths = append(share.Paths, p)
  1555. }
  1556. }
  1557. share.Password = strings.TrimSpace(r.Form.Get("password"))
  1558. share.AllowFrom = getSliceFromDelimitedValues(r.Form.Get("allowed_ip"), ",")
  1559. scope, err := strconv.Atoi(r.Form.Get("scope"))
  1560. if err != nil {
  1561. return share, util.NewI18nError(err, util.I18nErrorShareScope)
  1562. }
  1563. share.Scope = dataprovider.ShareScope(scope)
  1564. maxTokens, err := strconv.Atoi(r.Form.Get("max_tokens"))
  1565. if err != nil {
  1566. return share, util.NewI18nError(err, util.I18nErrorShareMaxTokens)
  1567. }
  1568. share.MaxTokens = maxTokens
  1569. expirationDateMillis := int64(0)
  1570. expirationDateString := strings.TrimSpace(r.Form.Get("expiration_date"))
  1571. if expirationDateString != "" {
  1572. expirationDate, err := time.Parse(webDateTimeFormat, expirationDateString)
  1573. if err != nil {
  1574. return share, util.NewI18nError(err, util.I18nErrorShareExpiration)
  1575. }
  1576. expirationDateMillis = util.GetTimeAsMsSinceEpoch(expirationDate)
  1577. }
  1578. share.ExpiresAt = expirationDateMillis
  1579. return share, nil
  1580. }
  1581. func (s *httpdServer) handleWebClientForgotPwd(w http.ResponseWriter, r *http.Request) {
  1582. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1583. if !smtp.IsEnabled() {
  1584. s.renderClientNotFoundPage(w, r, errors.New("this page does not exist"))
  1585. return
  1586. }
  1587. s.renderClientForgotPwdPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
  1588. }
  1589. func (s *httpdServer) handleWebClientForgotPwdPost(w http.ResponseWriter, r *http.Request) {
  1590. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1591. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1592. err := r.ParseForm()
  1593. if err != nil {
  1594. s.renderClientForgotPwdPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  1595. return
  1596. }
  1597. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  1598. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  1599. return
  1600. }
  1601. username := strings.TrimSpace(r.Form.Get("username"))
  1602. err = handleForgotPassword(r, username, false)
  1603. if err != nil {
  1604. s.renderClientForgotPwdPage(w, r, util.NewI18nError(err, util.I18nErrorPwdResetGeneric), ipAddr)
  1605. return
  1606. }
  1607. http.Redirect(w, r, webClientResetPwdPath, http.StatusFound)
  1608. }
  1609. func (s *httpdServer) handleWebClientPasswordReset(w http.ResponseWriter, r *http.Request) {
  1610. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1611. if !smtp.IsEnabled() {
  1612. s.renderClientNotFoundPage(w, r, errors.New("this page does not exist"))
  1613. return
  1614. }
  1615. s.renderClientResetPwdPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
  1616. }
  1617. func (s *httpdServer) handleClientViewPDF(w http.ResponseWriter, r *http.Request) {
  1618. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1619. name := r.URL.Query().Get("path")
  1620. if name == "" {
  1621. s.renderClientBadRequestPage(w, r, errors.New("no file specified"))
  1622. return
  1623. }
  1624. name = util.CleanPath(name)
  1625. data := viewPDFPage{
  1626. commonBasePage: getCommonBasePage(r),
  1627. Title: path.Base(name),
  1628. URL: fmt.Sprintf("%s?path=%s&_=%d", webClientGetPDFPath, url.QueryEscape(name), time.Now().UTC().Unix()),
  1629. Branding: s.binding.Branding.WebClient,
  1630. }
  1631. renderClientTemplate(w, templateClientViewPDF, data)
  1632. }
  1633. func (s *httpdServer) handleClientGetPDF(w http.ResponseWriter, r *http.Request) {
  1634. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1635. claims, err := getTokenClaims(r)
  1636. if err != nil || claims.Username == "" {
  1637. s.renderClientForbiddenPage(w, r, util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken))
  1638. return
  1639. }
  1640. name := r.URL.Query().Get("path")
  1641. if name == "" {
  1642. s.renderClientBadRequestPage(w, r, util.NewI18nError(errors.New("no file specified"), util.I18nError400Message))
  1643. return
  1644. }
  1645. name = util.CleanPath(name)
  1646. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  1647. if err != nil {
  1648. s.renderClientMessagePage(w, r, util.I18nError500Title, getRespStatus(err),
  1649. util.NewI18nError(err, util.I18nErrorGetUser), "")
  1650. return
  1651. }
  1652. connID := xid.New().String()
  1653. protocol := getProtocolFromRequest(r)
  1654. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  1655. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  1656. s.renderClientForbiddenPage(w, r, err)
  1657. return
  1658. }
  1659. connection := &Connection{
  1660. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  1661. r.RemoteAddr, user),
  1662. request: r,
  1663. }
  1664. if err = common.Connections.Add(connection); err != nil {
  1665. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1666. util.NewI18nError(err, util.I18nError429Message), "")
  1667. return
  1668. }
  1669. defer common.Connections.Remove(connection.GetID())
  1670. info, err := connection.Stat(name, 0)
  1671. if err != nil {
  1672. status := getRespStatus(err)
  1673. s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle, status, util.NewI18nError(err, i18nFsMsg(status)), "")
  1674. return
  1675. }
  1676. if info.IsDir() {
  1677. s.renderClientBadRequestPage(w, r, util.NewI18nError(fmt.Errorf("%q is not a file", name), util.I18nErrorPDFMessage))
  1678. return
  1679. }
  1680. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  1681. if err := s.ensurePDF(w, r, name, connection); err != nil {
  1682. return
  1683. }
  1684. downloadFile(w, r, connection, name, info, true, nil) //nolint:errcheck
  1685. }
  1686. func (s *httpdServer) ensurePDF(w http.ResponseWriter, r *http.Request, name string, connection *Connection) error {
  1687. reader, err := connection.getFileReader(name, 0, r.Method)
  1688. if err != nil {
  1689. s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle,
  1690. getRespStatus(err), util.NewI18nError(err, util.I18nError500Message), "")
  1691. return err
  1692. }
  1693. defer reader.Close()
  1694. var b bytes.Buffer
  1695. _, err = io.CopyN(&b, reader, 128)
  1696. if err != nil {
  1697. s.renderClientMessagePage(w, r, util.I18nErrorPDFTitle, getRespStatus(err),
  1698. util.NewI18nError(err, util.I18nErrorPDFMessage), "")
  1699. return err
  1700. }
  1701. if ctype := http.DetectContentType(b.Bytes()); ctype != "application/pdf" {
  1702. connection.Log(logger.LevelDebug, "detected %q content type, expected PDF, file %q", ctype, name)
  1703. err := fmt.Errorf("the file %q does not look like a PDF", name)
  1704. s.renderClientBadRequestPage(w, r, util.NewI18nError(err, util.I18nErrorPDFMessage))
  1705. return err
  1706. }
  1707. return nil
  1708. }
  1709. func (s *httpdServer) handleClientShareLoginGet(w http.ResponseWriter, r *http.Request) {
  1710. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1711. s.renderShareLoginPage(w, r, nil, util.GetIPFromRemoteAddress(r.RemoteAddr))
  1712. }
  1713. func (s *httpdServer) handleClientShareLoginPost(w http.ResponseWriter, r *http.Request) {
  1714. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1715. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1716. if err := r.ParseForm(); err != nil {
  1717. s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  1718. return
  1719. }
  1720. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  1721. s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF), ipAddr)
  1722. return
  1723. }
  1724. shareID := getURLParam(r, "id")
  1725. share, err := dataprovider.ShareExists(shareID, "")
  1726. if err != nil {
  1727. s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCredentials), ipAddr)
  1728. return
  1729. }
  1730. match, err := share.CheckCredentials(strings.TrimSpace(r.Form.Get("share_password")))
  1731. if !match || err != nil {
  1732. s.renderShareLoginPage(w, r, util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials),
  1733. ipAddr)
  1734. return
  1735. }
  1736. c := jwtTokenClaims{
  1737. Username: shareID,
  1738. }
  1739. err = c.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebShare, ipAddr)
  1740. if err != nil {
  1741. s.renderShareLoginPage(w, r, util.NewI18nError(err, util.I18nError500Message), ipAddr)
  1742. return
  1743. }
  1744. next := path.Clean(r.URL.Query().Get("next"))
  1745. baseShareURL := path.Join(webClientPubSharesPath, share.ShareID)
  1746. isRedirect, redirectTo := checkShareRedirectURL(next, baseShareURL)
  1747. if isRedirect {
  1748. http.Redirect(w, r, redirectTo, http.StatusFound)
  1749. return
  1750. }
  1751. s.renderClientMessagePage(w, r, util.I18nSharedFilesTitle, http.StatusOK, nil, util.I18nShareLoginOK)
  1752. }
  1753. func (s *httpdServer) handleClientSharedFile(w http.ResponseWriter, r *http.Request) {
  1754. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1755. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead}
  1756. share, _, err := s.checkPublicShare(w, r, validScopes)
  1757. if err != nil {
  1758. return
  1759. }
  1760. query := ""
  1761. if r.URL.RawQuery != "" {
  1762. query = "?" + r.URL.RawQuery
  1763. }
  1764. s.renderShareDownloadPage(w, r, path.Join(webClientPubSharesPath, share.ShareID)+query)
  1765. }
  1766. func (s *httpdServer) handleClientCheckExist(w http.ResponseWriter, r *http.Request) {
  1767. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1768. connection, err := getUserConnection(w, r)
  1769. if err != nil {
  1770. return
  1771. }
  1772. defer common.Connections.Remove(connection.GetID())
  1773. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1774. doCheckExist(w, r, connection, name)
  1775. }
  1776. func (s *httpdServer) handleClientShareCheckExist(w http.ResponseWriter, r *http.Request) {
  1777. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1778. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeReadWrite}
  1779. share, connection, err := s.checkPublicShare(w, r, validScopes)
  1780. if err != nil {
  1781. return
  1782. }
  1783. if err := validateBrowsableShare(share, connection); err != nil {
  1784. sendAPIResponse(w, r, err, "", getRespStatus(err))
  1785. return
  1786. }
  1787. name, err := getBrowsableSharedPath(share.Paths[0], r)
  1788. if err != nil {
  1789. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  1790. return
  1791. }
  1792. if err = common.Connections.Add(connection); err != nil {
  1793. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  1794. return
  1795. }
  1796. defer common.Connections.Remove(connection.GetID())
  1797. doCheckExist(w, r, connection, name)
  1798. }
  1799. type filesToCheck struct {
  1800. Files []string `json:"files"`
  1801. }
  1802. func doCheckExist(w http.ResponseWriter, r *http.Request, connection *Connection, name string) {
  1803. var filesList filesToCheck
  1804. err := render.DecodeJSON(r.Body, &filesList)
  1805. if err != nil {
  1806. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  1807. return
  1808. }
  1809. if len(filesList.Files) == 0 {
  1810. sendAPIResponse(w, r, errors.New("files to be checked are mandatory"), "", http.StatusBadRequest)
  1811. return
  1812. }
  1813. lister, err := connection.ListDir(name)
  1814. if err != nil {
  1815. sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
  1816. return
  1817. }
  1818. defer lister.Close()
  1819. dataGetter := func(limit, _ int) ([]byte, int, error) {
  1820. contents, err := lister.Next(limit)
  1821. if errors.Is(err, io.EOF) {
  1822. err = nil
  1823. }
  1824. if err != nil {
  1825. return nil, 0, err
  1826. }
  1827. existing := make([]map[string]any, 0)
  1828. for _, info := range contents {
  1829. if util.Contains(filesList.Files, info.Name()) {
  1830. res := make(map[string]any)
  1831. res["name"] = info.Name()
  1832. if info.IsDir() {
  1833. res["type"] = "1"
  1834. res["size"] = ""
  1835. } else {
  1836. res["type"] = "2"
  1837. res["size"] = info.Size()
  1838. }
  1839. existing = append(existing, res)
  1840. }
  1841. }
  1842. data, err := json.Marshal(existing)
  1843. count := limit
  1844. if len(existing) == 0 {
  1845. count = 0
  1846. }
  1847. return data, count, err
  1848. }
  1849. streamJSONArray(w, defaultQueryLimit, dataGetter)
  1850. }
  1851. func checkShareRedirectURL(next, base string) (bool, string) {
  1852. if !strings.HasPrefix(next, base) {
  1853. return false, ""
  1854. }
  1855. if next == base {
  1856. return true, path.Join(next, "download")
  1857. }
  1858. baseURL, err := url.Parse(base)
  1859. if err != nil {
  1860. return false, ""
  1861. }
  1862. nextURL, err := url.Parse(next)
  1863. if err != nil {
  1864. return false, ""
  1865. }
  1866. if nextURL.Path == baseURL.Path {
  1867. redirectURL := nextURL.JoinPath("download")
  1868. return true, redirectURL.String()
  1869. }
  1870. return true, next
  1871. }
  1872. func getWebTask(w http.ResponseWriter, r *http.Request) {
  1873. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1874. claims, err := getTokenClaims(r)
  1875. if err != nil || claims.Username == "" {
  1876. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  1877. return
  1878. }
  1879. taskID := getURLParam(r, "id")
  1880. task, err := webTaskMgr.Get(taskID)
  1881. if err != nil {
  1882. sendAPIResponse(w, r, err, "Unable to get task", getMappedStatusCode(err))
  1883. return
  1884. }
  1885. if task.User != claims.Username {
  1886. sendAPIResponse(w, r, nil, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  1887. return
  1888. }
  1889. render.JSON(w, r, task)
  1890. }
  1891. func taskDeleteDir(w http.ResponseWriter, r *http.Request) {
  1892. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1893. connection, err := getUserConnection(w, r)
  1894. if err != nil {
  1895. return
  1896. }
  1897. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1898. task := webTaskData{
  1899. ID: connection.GetID(),
  1900. User: connection.GetUsername(),
  1901. Path: name,
  1902. Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
  1903. Status: 0,
  1904. }
  1905. if err := webTaskMgr.Add(task); err != nil {
  1906. common.Connections.Remove(connection.GetID())
  1907. sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
  1908. return
  1909. }
  1910. go executeDeleteTask(connection, task)
  1911. sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
  1912. }
  1913. func taskRenameFsEntry(w http.ResponseWriter, r *http.Request) {
  1914. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1915. connection, err := getUserConnection(w, r)
  1916. if err != nil {
  1917. return
  1918. }
  1919. oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  1920. newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
  1921. task := webTaskData{
  1922. ID: connection.GetID(),
  1923. User: connection.GetUsername(),
  1924. Path: oldName,
  1925. Target: newName,
  1926. Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
  1927. Status: 0,
  1928. }
  1929. if err := webTaskMgr.Add(task); err != nil {
  1930. common.Connections.Remove(connection.GetID())
  1931. sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
  1932. return
  1933. }
  1934. go executeRenameTask(connection, task)
  1935. sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
  1936. }
  1937. func taskCopyFsEntry(w http.ResponseWriter, r *http.Request) {
  1938. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1939. connection, err := getUserConnection(w, r)
  1940. if err != nil {
  1941. return
  1942. }
  1943. source := r.URL.Query().Get("path")
  1944. target := r.URL.Query().Get("target")
  1945. copyFromSource := strings.HasSuffix(source, "/")
  1946. copyInTarget := strings.HasSuffix(target, "/")
  1947. source = connection.User.GetCleanedPath(source)
  1948. target = connection.User.GetCleanedPath(target)
  1949. if copyFromSource {
  1950. source += "/"
  1951. }
  1952. if copyInTarget {
  1953. target += "/"
  1954. }
  1955. task := webTaskData{
  1956. ID: connection.GetID(),
  1957. User: connection.GetUsername(),
  1958. Path: source,
  1959. Target: target,
  1960. Timestamp: util.GetTimeAsMsSinceEpoch(time.Now()),
  1961. Status: 0,
  1962. }
  1963. if err := webTaskMgr.Add(task); err != nil {
  1964. common.Connections.Remove(connection.GetID())
  1965. sendAPIResponse(w, r, nil, "Unable to create task", http.StatusInternalServerError)
  1966. return
  1967. }
  1968. go executeCopyTask(connection, task)
  1969. sendAPIResponse(w, r, nil, task.ID, http.StatusAccepted)
  1970. }
  1971. func executeDeleteTask(conn *Connection, task webTaskData) {
  1972. done := make(chan bool)
  1973. defer func() {
  1974. close(done)
  1975. common.Connections.Remove(conn.GetID())
  1976. }()
  1977. go keepAliveTask(task, done, 2*time.Minute)
  1978. status := http.StatusOK
  1979. if err := conn.RemoveAll(task.Path); err != nil {
  1980. status = getMappedStatusCode(err)
  1981. }
  1982. task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
  1983. task.Status = status
  1984. err := webTaskMgr.Add(task)
  1985. conn.Log(logger.LevelDebug, "delete task finished, status: %d, update task err: %v", status, err)
  1986. }
  1987. func executeRenameTask(conn *Connection, task webTaskData) {
  1988. done := make(chan bool)
  1989. defer func() {
  1990. close(done)
  1991. common.Connections.Remove(conn.GetID())
  1992. }()
  1993. go keepAliveTask(task, done, 2*time.Minute)
  1994. status := http.StatusOK
  1995. if !conn.IsSameResource(task.Path, task.Target) {
  1996. if err := conn.Copy(task.Path, task.Target); err != nil {
  1997. status = getMappedStatusCode(err)
  1998. task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
  1999. task.Status = status
  2000. err = webTaskMgr.Add(task)
  2001. conn.Log(logger.LevelDebug, "copy step for rename task finished, status: %d, update task err: %v", status, err)
  2002. return
  2003. }
  2004. if err := conn.RemoveAll(task.Path); err != nil {
  2005. status = getMappedStatusCode(err)
  2006. }
  2007. } else {
  2008. if err := conn.Rename(task.Path, task.Target); err != nil {
  2009. status = getMappedStatusCode(err)
  2010. }
  2011. }
  2012. task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
  2013. task.Status = status
  2014. err := webTaskMgr.Add(task)
  2015. conn.Log(logger.LevelDebug, "rename task finished, status: %d, update task err: %v", status, err)
  2016. }
  2017. func executeCopyTask(conn *Connection, task webTaskData) {
  2018. done := make(chan bool)
  2019. defer func() {
  2020. close(done)
  2021. common.Connections.Remove(conn.GetID())
  2022. }()
  2023. go keepAliveTask(task, done, 2*time.Minute)
  2024. status := http.StatusOK
  2025. if err := conn.Copy(task.Path, task.Target); err != nil {
  2026. status = getMappedStatusCode(err)
  2027. }
  2028. task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
  2029. task.Status = status
  2030. err := webTaskMgr.Add(task)
  2031. conn.Log(logger.LevelDebug, "copy task finished, status: %d, update task err: %v", status, err)
  2032. }
  2033. func keepAliveTask(task webTaskData, done chan bool, interval time.Duration) {
  2034. ticker := time.NewTicker(interval)
  2035. defer func() {
  2036. ticker.Stop()
  2037. }()
  2038. for {
  2039. select {
  2040. case <-done:
  2041. return
  2042. case <-ticker.C:
  2043. task.Timestamp = util.GetTimeAsMsSinceEpoch(time.Now())
  2044. err := webTaskMgr.Add(task)
  2045. logger.Debug(logSender, task.ID, "task timestamp updated, err: %v", err)
  2046. }
  2047. }
  2048. }