api_http_user.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "io"
  20. "mime/multipart"
  21. "net/http"
  22. "os"
  23. "path"
  24. "strconv"
  25. "strings"
  26. "github.com/go-chi/render"
  27. "github.com/rs/xid"
  28. "github.com/drakkan/sftpgo/v2/internal/common"
  29. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  30. "github.com/drakkan/sftpgo/v2/internal/logger"
  31. "github.com/drakkan/sftpgo/v2/internal/util"
  32. )
  33. func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
  34. claims, err := getTokenClaims(r)
  35. if err != nil || claims.Username == "" {
  36. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  37. return nil, fmt.Errorf("invalid token claims %w", err)
  38. }
  39. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  40. if err != nil {
  41. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  42. return nil, err
  43. }
  44. connID := xid.New().String()
  45. protocol := getProtocolFromRequest(r)
  46. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  47. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  48. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  49. return nil, err
  50. }
  51. connection := &Connection{
  52. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  53. r.RemoteAddr, user),
  54. request: r,
  55. }
  56. if err = common.Connections.Add(connection); err != nil {
  57. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  58. return connection, err
  59. }
  60. return connection, nil
  61. }
  62. func readUserFolder(w http.ResponseWriter, r *http.Request) {
  63. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  64. connection, err := getUserConnection(w, r)
  65. if err != nil {
  66. return
  67. }
  68. defer common.Connections.Remove(connection.GetID())
  69. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  70. contents, err := connection.ReadDir(name)
  71. if err != nil {
  72. sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
  73. return
  74. }
  75. renderAPIDirContents(w, r, contents, false)
  76. }
  77. func createUserDir(w http.ResponseWriter, r *http.Request) {
  78. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  79. connection, err := getUserConnection(w, r)
  80. if err != nil {
  81. return
  82. }
  83. defer common.Connections.Remove(connection.GetID())
  84. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  85. if getBoolQueryParam(r, "mkdir_parents") {
  86. if err = connection.CheckParentDirs(path.Dir(name)); err != nil {
  87. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  88. return
  89. }
  90. }
  91. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  92. err = connection.CreateDir(name, true)
  93. if err != nil {
  94. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %q", name), getMappedStatusCode(err))
  95. return
  96. }
  97. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %q created", name), http.StatusCreated)
  98. }
  99. func deleteUserDir(w http.ResponseWriter, r *http.Request) {
  100. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  101. connection, err := getUserConnection(w, r)
  102. if err != nil {
  103. return
  104. }
  105. defer common.Connections.Remove(connection.GetID())
  106. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  107. err = connection.RemoveAll(name)
  108. if err != nil {
  109. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %q", name), getMappedStatusCode(err))
  110. return
  111. }
  112. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %q deleted", name), http.StatusOK)
  113. }
  114. func renameUserFsEntry(w http.ResponseWriter, r *http.Request) {
  115. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  116. connection, err := getUserConnection(w, r)
  117. if err != nil {
  118. return
  119. }
  120. defer common.Connections.Remove(connection.GetID())
  121. oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  122. newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
  123. if !connection.IsSameResource(oldName, newName) {
  124. if err := connection.Copy(oldName, newName); err != nil {
  125. sendAPIResponse(w, r, err, fmt.Sprintf("Cannot perform copy step to rename %q -> %q", oldName, newName),
  126. getMappedStatusCode(err))
  127. return
  128. }
  129. if err := connection.RemoveAll(oldName); err != nil {
  130. sendAPIResponse(w, r, err, fmt.Sprintf("Cannot perform remove step to rename %q -> %q", oldName, newName),
  131. getMappedStatusCode(err))
  132. return
  133. }
  134. } else {
  135. if err := connection.Rename(oldName, newName); err != nil {
  136. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename %q => %q", oldName, newName),
  137. getMappedStatusCode(err))
  138. return
  139. }
  140. }
  141. sendAPIResponse(w, r, nil, fmt.Sprintf("%q renamed to %q", oldName, newName), http.StatusOK)
  142. }
  143. func copyUserFsEntry(w http.ResponseWriter, r *http.Request) {
  144. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  145. connection, err := getUserConnection(w, r)
  146. if err != nil {
  147. return
  148. }
  149. defer common.Connections.Remove(connection.GetID())
  150. source := r.URL.Query().Get("path")
  151. target := r.URL.Query().Get("target")
  152. copyFromSource := strings.HasSuffix(source, "/")
  153. copyInTarget := strings.HasSuffix(target, "/")
  154. source = connection.User.GetCleanedPath(source)
  155. target = connection.User.GetCleanedPath(target)
  156. if copyFromSource {
  157. source += "/"
  158. }
  159. if copyInTarget {
  160. target += "/"
  161. }
  162. err = connection.Copy(source, target)
  163. if err != nil {
  164. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to copy %q => %q", source, target),
  165. getMappedStatusCode(err))
  166. return
  167. }
  168. sendAPIResponse(w, r, nil, fmt.Sprintf("%q copied to %q", source, target), http.StatusOK)
  169. }
  170. func getUserFile(w http.ResponseWriter, r *http.Request) {
  171. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  172. connection, err := getUserConnection(w, r)
  173. if err != nil {
  174. return
  175. }
  176. defer common.Connections.Remove(connection.GetID())
  177. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  178. if name == "/" {
  179. sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
  180. return
  181. }
  182. info, err := connection.Stat(name, 0)
  183. if err != nil {
  184. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  185. return
  186. }
  187. if info.IsDir() {
  188. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %q is a directory", name), http.StatusBadRequest)
  189. return
  190. }
  191. inline := r.URL.Query().Get("inline") != ""
  192. if status, err := downloadFile(w, r, connection, name, info, inline, nil); err != nil {
  193. resp := apiResponse{
  194. Error: err.Error(),
  195. Message: http.StatusText(status),
  196. }
  197. ctx := r.Context()
  198. if status != 0 {
  199. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  200. }
  201. render.JSON(w, r.WithContext(ctx), resp)
  202. }
  203. }
  204. func setFileDirMetadata(w http.ResponseWriter, r *http.Request) {
  205. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  206. metadata := make(map[string]int64)
  207. err := render.DecodeJSON(r.Body, &metadata)
  208. if err != nil {
  209. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  210. return
  211. }
  212. mTime, ok := metadata["modification_time"]
  213. if !ok || !r.URL.Query().Has("path") {
  214. sendAPIResponse(w, r, errors.New("please set a modification_time and a path"), "", http.StatusBadRequest)
  215. return
  216. }
  217. connection, err := getUserConnection(w, r)
  218. if err != nil {
  219. return
  220. }
  221. defer common.Connections.Remove(connection.GetID())
  222. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  223. attrs := common.StatAttributes{
  224. Flags: common.StatAttrTimes,
  225. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  226. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  227. }
  228. err = connection.SetStat(name, &attrs)
  229. if err != nil {
  230. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to set metadata for path %q", name), getMappedStatusCode(err))
  231. return
  232. }
  233. sendAPIResponse(w, r, nil, "OK", http.StatusOK)
  234. }
  235. func uploadUserFile(w http.ResponseWriter, r *http.Request) {
  236. if maxUploadFileSize > 0 {
  237. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  238. }
  239. if !r.URL.Query().Has("path") {
  240. sendAPIResponse(w, r, errors.New("please set a file path"), "", http.StatusBadRequest)
  241. return
  242. }
  243. connection, err := getUserConnection(w, r)
  244. if err != nil {
  245. return
  246. }
  247. defer common.Connections.Remove(connection.GetID())
  248. filePath := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  249. if getBoolQueryParam(r, "mkdir_parents") {
  250. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  251. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  252. return
  253. }
  254. }
  255. doUploadFile(w, r, connection, filePath) //nolint:errcheck
  256. }
  257. func doUploadFile(w http.ResponseWriter, r *http.Request, connection *Connection, filePath string) error {
  258. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  259. writer, err := connection.getFileWriter(filePath)
  260. if err != nil {
  261. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %q", filePath), getMappedStatusCode(err))
  262. return err
  263. }
  264. _, err = io.Copy(writer, r.Body)
  265. if err != nil {
  266. writer.Close() //nolint:errcheck
  267. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %q", filePath), getMappedStatusCode(err))
  268. return err
  269. }
  270. err = writer.Close()
  271. if err != nil {
  272. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %q", filePath), getMappedStatusCode(err))
  273. return err
  274. }
  275. setModificationTimeFromHeader(r, connection, filePath)
  276. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  277. return nil
  278. }
  279. func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
  280. if maxUploadFileSize > 0 {
  281. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  282. }
  283. connection, err := getUserConnection(w, r)
  284. if err != nil {
  285. return
  286. }
  287. defer common.Connections.Remove(connection.GetID())
  288. transferQuota := connection.GetTransferQuota()
  289. if !transferQuota.HasUploadSpace() {
  290. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  291. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  292. http.StatusRequestEntityTooLarge)
  293. return
  294. }
  295. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  296. r.Body = t
  297. err = r.ParseMultipartForm(maxMultipartMem)
  298. if err != nil {
  299. connection.RemoveTransfer(t)
  300. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  301. return
  302. }
  303. connection.RemoveTransfer(t)
  304. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  305. parentDir := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  306. files := r.MultipartForm.File["filenames"]
  307. if len(files) == 0 {
  308. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  309. return
  310. }
  311. if getBoolQueryParam(r, "mkdir_parents") {
  312. if err = connection.CheckParentDirs(parentDir); err != nil {
  313. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  314. return
  315. }
  316. }
  317. doUploadFiles(w, r, connection, parentDir, files)
  318. }
  319. func doUploadFiles(w http.ResponseWriter, r *http.Request, connection *Connection, parentDir string,
  320. files []*multipart.FileHeader,
  321. ) int {
  322. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  323. uploaded := 0
  324. connection.User.UploadBandwidth = 0
  325. for _, f := range files {
  326. file, err := f.Open()
  327. if err != nil {
  328. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %q", f.Filename), getMappedStatusCode(err))
  329. return uploaded
  330. }
  331. defer file.Close()
  332. filePath := path.Join(parentDir, path.Base(util.CleanPath(f.Filename)))
  333. writer, err := connection.getFileWriter(filePath)
  334. if err != nil {
  335. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %q", f.Filename), getMappedStatusCode(err))
  336. return uploaded
  337. }
  338. _, err = io.Copy(writer, file)
  339. if err != nil {
  340. writer.Close() //nolint:errcheck
  341. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %q", f.Filename), getMappedStatusCode(err))
  342. return uploaded
  343. }
  344. err = writer.Close()
  345. if err != nil {
  346. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %q", f.Filename), getMappedStatusCode(err))
  347. return uploaded
  348. }
  349. uploaded++
  350. }
  351. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  352. return uploaded
  353. }
  354. func deleteUserFile(w http.ResponseWriter, r *http.Request) {
  355. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  356. connection, err := getUserConnection(w, r)
  357. if err != nil {
  358. return
  359. }
  360. defer common.Connections.Remove(connection.GetID())
  361. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  362. fs, p, err := connection.GetFsAndResolvedPath(name)
  363. if err != nil {
  364. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  365. return
  366. }
  367. var fi os.FileInfo
  368. if fi, err = fs.Lstat(p); err != nil {
  369. connection.Log(logger.LevelError, "failed to remove file %q: stat error: %+v", p, err)
  370. err = connection.GetFsError(fs, err)
  371. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  372. return
  373. }
  374. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  375. connection.Log(logger.LevelDebug, "cannot remove %q is not a file/symlink", p)
  376. sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %q, it is not a file/symlink", name), http.StatusBadRequest)
  377. return
  378. }
  379. err = connection.RemoveFile(fs, p, name, fi)
  380. if err != nil {
  381. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  382. return
  383. }
  384. sendAPIResponse(w, r, nil, fmt.Sprintf("File %q deleted", name), http.StatusOK)
  385. }
  386. func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
  387. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  388. connection, err := getUserConnection(w, r)
  389. if err != nil {
  390. return
  391. }
  392. defer common.Connections.Remove(connection.GetID())
  393. var filesList []string
  394. err = render.DecodeJSON(r.Body, &filesList)
  395. if err != nil {
  396. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  397. return
  398. }
  399. baseDir := "/"
  400. for idx := range filesList {
  401. filesList[idx] = util.CleanPath(filesList[idx])
  402. }
  403. filesList = util.RemoveDuplicates(filesList, false)
  404. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
  405. getCompressedFileName(connection.GetUsername(), filesList)))
  406. renderCompressedFiles(w, connection, baseDir, filesList, nil)
  407. }
  408. func getUserProfile(w http.ResponseWriter, r *http.Request) {
  409. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  410. claims, err := getTokenClaims(r)
  411. if err != nil || claims.Username == "" {
  412. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  413. return
  414. }
  415. user, err := dataprovider.UserExists(claims.Username, "")
  416. if err != nil {
  417. sendAPIResponse(w, r, err, "", getRespStatus(err))
  418. return
  419. }
  420. resp := userProfile{
  421. baseProfile: baseProfile{
  422. Email: user.Email,
  423. Description: user.Description,
  424. AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
  425. },
  426. PublicKeys: user.PublicKeys,
  427. }
  428. render.JSON(w, r, resp)
  429. }
  430. func updateUserProfile(w http.ResponseWriter, r *http.Request) {
  431. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  432. claims, err := getTokenClaims(r)
  433. if err != nil || claims.Username == "" {
  434. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  435. return
  436. }
  437. var req userProfile
  438. err = render.DecodeJSON(r.Body, &req)
  439. if err != nil {
  440. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  441. return
  442. }
  443. user, userMerged, err := dataprovider.GetUserVariants(claims.Username, "")
  444. if err != nil {
  445. sendAPIResponse(w, r, err, "", getRespStatus(err))
  446. return
  447. }
  448. if !userMerged.CanManagePublicKeys() && !userMerged.CanChangeAPIKeyAuth() && !userMerged.CanChangeInfo() {
  449. sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
  450. return
  451. }
  452. if userMerged.CanManagePublicKeys() {
  453. user.PublicKeys = req.PublicKeys
  454. }
  455. if userMerged.CanChangeAPIKeyAuth() {
  456. user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
  457. }
  458. if userMerged.CanChangeInfo() {
  459. user.Email = req.Email
  460. user.Description = req.Description
  461. }
  462. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), user.Role); err != nil {
  463. sendAPIResponse(w, r, err, "", getRespStatus(err))
  464. return
  465. }
  466. sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
  467. }
  468. func changeUserPassword(w http.ResponseWriter, r *http.Request) {
  469. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  470. var pwd pwdChange
  471. err := render.DecodeJSON(r.Body, &pwd)
  472. if err != nil {
  473. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  474. return
  475. }
  476. err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  477. if err != nil {
  478. sendAPIResponse(w, r, err, "", getRespStatus(err))
  479. return
  480. }
  481. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  482. }
  483. func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  484. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  485. return util.NewValidationError("please provide the current password and the new one two times")
  486. }
  487. if newPassword != confirmNewPassword {
  488. return util.NewValidationError("the two password fields do not match")
  489. }
  490. if currentPassword == newPassword {
  491. return util.NewValidationError("the new password must be different from the current one")
  492. }
  493. claims, err := getTokenClaims(r)
  494. if err != nil || claims.Username == "" {
  495. return errors.New("invalid token claims")
  496. }
  497. _, err = dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
  498. getProtocolFromRequest(r))
  499. if err != nil {
  500. return util.NewValidationError("current password does not match")
  501. }
  502. return dataprovider.UpdateUserPassword(claims.Username, newPassword, dataprovider.ActionExecutorSelf,
  503. util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  504. }
  505. func setModificationTimeFromHeader(r *http.Request, c *Connection, filePath string) {
  506. mTimeString := r.Header.Get(mTimeHeader)
  507. if mTimeString != "" {
  508. // we don't return an error here if we fail to set the modification time
  509. mTime, err := strconv.ParseInt(mTimeString, 10, 64)
  510. if err == nil {
  511. attrs := common.StatAttributes{
  512. Flags: common.StatAttrTimes,
  513. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  514. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  515. }
  516. err = c.SetStat(filePath, &attrs)
  517. c.Log(logger.LevelDebug, "requested modification time %v for file %q, error: %v",
  518. attrs.Mtime, filePath, err)
  519. } else {
  520. c.Log(logger.LevelInfo, "invalid modification time header was ignored: %v", mTimeString)
  521. }
  522. }
  523. }