api_http_user.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567
  1. package httpd
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "io"
  7. "mime/multipart"
  8. "net/http"
  9. "os"
  10. "path"
  11. "strconv"
  12. "github.com/go-chi/render"
  13. "github.com/rs/xid"
  14. "github.com/drakkan/sftpgo/v2/common"
  15. "github.com/drakkan/sftpgo/v2/dataprovider"
  16. "github.com/drakkan/sftpgo/v2/logger"
  17. "github.com/drakkan/sftpgo/v2/util"
  18. )
  19. func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
  20. claims, err := getTokenClaims(r)
  21. if err != nil || claims.Username == "" {
  22. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  23. return nil, fmt.Errorf("invalid token claims %w", err)
  24. }
  25. user, err := dataprovider.GetUserWithGroupSettings(claims.Username)
  26. if err != nil {
  27. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  28. return nil, err
  29. }
  30. connID := xid.New().String()
  31. protocol := getProtocolFromRequest(r)
  32. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  33. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  34. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  35. return nil, err
  36. }
  37. connection := &Connection{
  38. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  39. r.RemoteAddr, user),
  40. request: r,
  41. }
  42. if err = common.Connections.Add(connection); err != nil {
  43. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  44. return connection, err
  45. }
  46. return connection, nil
  47. }
  48. func readUserFolder(w http.ResponseWriter, r *http.Request) {
  49. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  50. connection, err := getUserConnection(w, r)
  51. if err != nil {
  52. return
  53. }
  54. defer common.Connections.Remove(connection.GetID())
  55. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  56. contents, err := connection.ReadDir(name)
  57. if err != nil {
  58. sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
  59. return
  60. }
  61. renderAPIDirContents(w, r, contents, false)
  62. }
  63. func createUserDir(w http.ResponseWriter, r *http.Request) {
  64. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  65. connection, err := getUserConnection(w, r)
  66. if err != nil {
  67. return
  68. }
  69. defer common.Connections.Remove(connection.GetID())
  70. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  71. if getBoolQueryParam(r, "mkdir_parents") {
  72. if err = connection.CheckParentDirs(path.Dir(name)); err != nil {
  73. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  74. return
  75. }
  76. }
  77. err = connection.CreateDir(name, true)
  78. if err != nil {
  79. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %#v", name), getMappedStatusCode(err))
  80. return
  81. }
  82. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v created", name), http.StatusCreated)
  83. }
  84. func renameUserDir(w http.ResponseWriter, r *http.Request) {
  85. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  86. renameItem(w, r)
  87. }
  88. func deleteUserDir(w http.ResponseWriter, r *http.Request) {
  89. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  90. connection, err := getUserConnection(w, r)
  91. if err != nil {
  92. return
  93. }
  94. defer common.Connections.Remove(connection.GetID())
  95. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  96. err = connection.RemoveDir(name)
  97. if err != nil {
  98. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %#v", name), getMappedStatusCode(err))
  99. return
  100. }
  101. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v deleted", name), http.StatusOK)
  102. }
  103. func getUserFile(w http.ResponseWriter, r *http.Request) {
  104. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  105. connection, err := getUserConnection(w, r)
  106. if err != nil {
  107. return
  108. }
  109. defer common.Connections.Remove(connection.GetID())
  110. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  111. if name == "/" {
  112. sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
  113. return
  114. }
  115. info, err := connection.Stat(name, 0)
  116. if err != nil {
  117. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  118. return
  119. }
  120. if info.IsDir() {
  121. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %#v is a directory", name), http.StatusBadRequest)
  122. return
  123. }
  124. inline := r.URL.Query().Get("inline") != ""
  125. if status, err := downloadFile(w, r, connection, name, info, inline, nil); err != nil {
  126. resp := apiResponse{
  127. Error: err.Error(),
  128. Message: http.StatusText(status),
  129. }
  130. ctx := r.Context()
  131. if status != 0 {
  132. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  133. }
  134. render.JSON(w, r.WithContext(ctx), resp)
  135. }
  136. }
  137. func setFileDirMetadata(w http.ResponseWriter, r *http.Request) {
  138. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  139. metadata := make(map[string]int64)
  140. err := render.DecodeJSON(r.Body, &metadata)
  141. if err != nil {
  142. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  143. return
  144. }
  145. mTime, ok := metadata["modification_time"]
  146. if !ok || !r.URL.Query().Has("path") {
  147. sendAPIResponse(w, r, errors.New("please set a modification_time and a path"), "", http.StatusBadRequest)
  148. return
  149. }
  150. connection, err := getUserConnection(w, r)
  151. if err != nil {
  152. return
  153. }
  154. defer common.Connections.Remove(connection.GetID())
  155. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  156. attrs := common.StatAttributes{
  157. Flags: common.StatAttrTimes,
  158. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  159. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  160. }
  161. err = connection.SetStat(name, &attrs)
  162. if err != nil {
  163. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to set metadata for path %#v", name), getMappedStatusCode(err))
  164. return
  165. }
  166. sendAPIResponse(w, r, nil, "OK", http.StatusOK)
  167. }
  168. func uploadUserFile(w http.ResponseWriter, r *http.Request) {
  169. if maxUploadFileSize > 0 {
  170. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  171. }
  172. if !r.URL.Query().Has("path") {
  173. sendAPIResponse(w, r, errors.New("please set a file path"), "", http.StatusBadRequest)
  174. return
  175. }
  176. connection, err := getUserConnection(w, r)
  177. if err != nil {
  178. return
  179. }
  180. defer common.Connections.Remove(connection.GetID())
  181. filePath := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  182. if getBoolQueryParam(r, "mkdir_parents") {
  183. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  184. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  185. return
  186. }
  187. }
  188. doUploadFile(w, r, connection, filePath) //nolint:errcheck
  189. }
  190. func doUploadFile(w http.ResponseWriter, r *http.Request, connection *Connection, filePath string) error {
  191. writer, err := connection.getFileWriter(filePath)
  192. if err != nil {
  193. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", filePath), getMappedStatusCode(err))
  194. return err
  195. }
  196. _, err = io.Copy(writer, r.Body)
  197. if err != nil {
  198. writer.Close() //nolint:errcheck
  199. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", filePath), getMappedStatusCode(err))
  200. return err
  201. }
  202. err = writer.Close()
  203. if err != nil {
  204. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", filePath), getMappedStatusCode(err))
  205. return err
  206. }
  207. setModificationTimeFromHeader(r, connection, filePath)
  208. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  209. return nil
  210. }
  211. func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
  212. if maxUploadFileSize > 0 {
  213. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  214. }
  215. connection, err := getUserConnection(w, r)
  216. if err != nil {
  217. return
  218. }
  219. defer common.Connections.Remove(connection.GetID())
  220. transferQuota := connection.GetTransferQuota()
  221. if !transferQuota.HasUploadSpace() {
  222. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  223. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  224. http.StatusRequestEntityTooLarge)
  225. return
  226. }
  227. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  228. r.Body = t
  229. err = r.ParseMultipartForm(maxMultipartMem)
  230. if err != nil {
  231. connection.RemoveTransfer(t)
  232. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  233. return
  234. }
  235. connection.RemoveTransfer(t)
  236. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  237. parentDir := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  238. files := r.MultipartForm.File["filenames"]
  239. if len(files) == 0 {
  240. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  241. return
  242. }
  243. if getBoolQueryParam(r, "mkdir_parents") {
  244. if err = connection.CheckParentDirs(parentDir); err != nil {
  245. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  246. return
  247. }
  248. }
  249. doUploadFiles(w, r, connection, parentDir, files)
  250. }
  251. func doUploadFiles(w http.ResponseWriter, r *http.Request, connection *Connection, parentDir string,
  252. files []*multipart.FileHeader,
  253. ) int {
  254. uploaded := 0
  255. connection.User.UploadBandwidth = 0
  256. for _, f := range files {
  257. file, err := f.Open()
  258. if err != nil {
  259. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %#v", f.Filename), getMappedStatusCode(err))
  260. return uploaded
  261. }
  262. defer file.Close()
  263. filePath := path.Join(parentDir, path.Base(util.CleanPath(f.Filename)))
  264. writer, err := connection.getFileWriter(filePath)
  265. if err != nil {
  266. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", f.Filename), getMappedStatusCode(err))
  267. return uploaded
  268. }
  269. _, err = io.Copy(writer, file)
  270. if err != nil {
  271. writer.Close() //nolint:errcheck
  272. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", f.Filename), getMappedStatusCode(err))
  273. return uploaded
  274. }
  275. err = writer.Close()
  276. if err != nil {
  277. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", f.Filename), getMappedStatusCode(err))
  278. return uploaded
  279. }
  280. uploaded++
  281. }
  282. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  283. return uploaded
  284. }
  285. func renameUserFile(w http.ResponseWriter, r *http.Request) {
  286. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  287. renameItem(w, r)
  288. }
  289. func deleteUserFile(w http.ResponseWriter, r *http.Request) {
  290. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  291. connection, err := getUserConnection(w, r)
  292. if err != nil {
  293. return
  294. }
  295. defer common.Connections.Remove(connection.GetID())
  296. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  297. fs, p, err := connection.GetFsAndResolvedPath(name)
  298. if err != nil {
  299. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  300. return
  301. }
  302. var fi os.FileInfo
  303. if fi, err = fs.Lstat(p); err != nil {
  304. connection.Log(logger.LevelError, "failed to remove file %#v: stat error: %+v", p, err)
  305. err = connection.GetFsError(fs, err)
  306. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  307. return
  308. }
  309. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  310. connection.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  311. sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %#v, it is not a file/symlink", name), http.StatusBadRequest)
  312. return
  313. }
  314. err = connection.RemoveFile(fs, p, name, fi)
  315. if err != nil {
  316. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  317. return
  318. }
  319. sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v deleted", name), http.StatusOK)
  320. }
  321. func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
  322. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  323. connection, err := getUserConnection(w, r)
  324. if err != nil {
  325. return
  326. }
  327. defer common.Connections.Remove(connection.GetID())
  328. var filesList []string
  329. err = render.DecodeJSON(r.Body, &filesList)
  330. if err != nil {
  331. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  332. return
  333. }
  334. baseDir := "/"
  335. for idx := range filesList {
  336. filesList[idx] = util.CleanPath(filesList[idx])
  337. }
  338. filesList = util.RemoveDuplicates(filesList, false)
  339. w.Header().Set("Content-Disposition", "attachment; filename=\"sftpgo-download.zip\"")
  340. renderCompressedFiles(w, connection, baseDir, filesList, nil)
  341. }
  342. func getUserPublicKeys(w http.ResponseWriter, r *http.Request) {
  343. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  344. claims, err := getTokenClaims(r)
  345. if err != nil || claims.Username == "" {
  346. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  347. return
  348. }
  349. user, err := dataprovider.UserExists(claims.Username)
  350. if err != nil {
  351. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  352. return
  353. }
  354. render.JSON(w, r, user.PublicKeys)
  355. }
  356. func setUserPublicKeys(w http.ResponseWriter, r *http.Request) {
  357. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  358. claims, err := getTokenClaims(r)
  359. if err != nil || claims.Username == "" {
  360. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  361. return
  362. }
  363. user, err := dataprovider.UserExists(claims.Username)
  364. if err != nil {
  365. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  366. return
  367. }
  368. var publicKeys []string
  369. err = render.DecodeJSON(r.Body, &publicKeys)
  370. if err != nil {
  371. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  372. return
  373. }
  374. user.PublicKeys = publicKeys
  375. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  376. if err != nil {
  377. sendAPIResponse(w, r, err, "", getRespStatus(err))
  378. return
  379. }
  380. sendAPIResponse(w, r, err, "Public keys updated", http.StatusOK)
  381. }
  382. func getUserProfile(w http.ResponseWriter, r *http.Request) {
  383. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  384. claims, err := getTokenClaims(r)
  385. if err != nil || claims.Username == "" {
  386. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  387. return
  388. }
  389. user, err := dataprovider.UserExists(claims.Username)
  390. if err != nil {
  391. sendAPIResponse(w, r, err, "", getRespStatus(err))
  392. return
  393. }
  394. resp := userProfile{
  395. baseProfile: baseProfile{
  396. Email: user.Email,
  397. Description: user.Description,
  398. AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
  399. },
  400. PublicKeys: user.PublicKeys,
  401. }
  402. render.JSON(w, r, resp)
  403. }
  404. func updateUserProfile(w http.ResponseWriter, r *http.Request) {
  405. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  406. claims, err := getTokenClaims(r)
  407. if err != nil || claims.Username == "" {
  408. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  409. return
  410. }
  411. var req userProfile
  412. err = render.DecodeJSON(r.Body, &req)
  413. if err != nil {
  414. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  415. return
  416. }
  417. user, userMerged, err := dataprovider.GetUserVariants(claims.Username)
  418. if err != nil {
  419. sendAPIResponse(w, r, err, "", getRespStatus(err))
  420. return
  421. }
  422. if !userMerged.CanManagePublicKeys() && !userMerged.CanChangeAPIKeyAuth() && !userMerged.CanChangeInfo() {
  423. sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
  424. return
  425. }
  426. if userMerged.CanManagePublicKeys() {
  427. user.PublicKeys = req.PublicKeys
  428. }
  429. if userMerged.CanChangeAPIKeyAuth() {
  430. user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
  431. }
  432. if userMerged.CanChangeInfo() {
  433. user.Email = req.Email
  434. user.Description = req.Description
  435. }
  436. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  437. sendAPIResponse(w, r, err, "", getRespStatus(err))
  438. return
  439. }
  440. sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
  441. }
  442. func changeUserPassword(w http.ResponseWriter, r *http.Request) {
  443. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  444. var pwd pwdChange
  445. err := render.DecodeJSON(r.Body, &pwd)
  446. if err != nil {
  447. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  448. return
  449. }
  450. err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  451. if err != nil {
  452. sendAPIResponse(w, r, err, "", getRespStatus(err))
  453. return
  454. }
  455. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  456. }
  457. func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  458. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  459. return util.NewValidationError("please provide the current password and the new one two times")
  460. }
  461. if newPassword != confirmNewPassword {
  462. return util.NewValidationError("the two password fields do not match")
  463. }
  464. if currentPassword == newPassword {
  465. return util.NewValidationError("the new password must be different from the current one")
  466. }
  467. claims, err := getTokenClaims(r)
  468. if err != nil || claims.Username == "" {
  469. return errors.New("invalid token claims")
  470. }
  471. _, err = dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
  472. getProtocolFromRequest(r))
  473. if err != nil {
  474. return util.NewValidationError("current password does not match")
  475. }
  476. return dataprovider.UpdateUserPassword(claims.Username, newPassword, dataprovider.ActionExecutorSelf,
  477. util.GetIPFromRemoteAddress(r.RemoteAddr))
  478. }
  479. func setModificationTimeFromHeader(r *http.Request, c *Connection, filePath string) {
  480. mTimeString := r.Header.Get(mTimeHeader)
  481. if mTimeString != "" {
  482. // we don't return an error here if we fail to set the modification time
  483. mTime, err := strconv.ParseInt(mTimeString, 10, 64)
  484. if err == nil {
  485. attrs := common.StatAttributes{
  486. Flags: common.StatAttrTimes,
  487. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  488. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  489. }
  490. err = c.SetStat(filePath, &attrs)
  491. c.Log(logger.LevelDebug, "requested modification time %v for file %#v, error: %v",
  492. attrs.Mtime, filePath, err)
  493. } else {
  494. c.Log(logger.LevelInfo, "invalid modification time header was ignored: %v", mTimeString)
  495. }
  496. }
  497. }
  498. func renameItem(w http.ResponseWriter, r *http.Request) {
  499. connection, err := getUserConnection(w, r)
  500. if err != nil {
  501. return
  502. }
  503. defer common.Connections.Remove(connection.GetID())
  504. oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  505. newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
  506. err = connection.Rename(oldName, newName)
  507. if err != nil {
  508. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename %#v -> %#v", oldName, newName),
  509. getMappedStatusCode(err))
  510. return
  511. }
  512. sendAPIResponse(w, r, nil, fmt.Sprintf("%#v renamed to %#v", oldName, newName), http.StatusOK)
  513. }