Files
filestash/server/ctrl/files.go
2024-12-04 16:05:28 +11:00

993 lines
27 KiB
Go

package ctrl
import (
"archive/zip"
"context"
"encoding/base64"
"fmt"
"hash/fnv"
"io"
"net/http"
"net/url"
"os"
"path/filepath"
"strconv"
"strings"
"sync"
"time"
. "github.com/mickael-kerjean/filestash/server/common"
"github.com/mickael-kerjean/filestash/server/model"
)
type FileInfo struct {
Name string `json:"name"`
Type string `json:"type"`
Size int64 `json:"size"`
Time int64 `json:"time"`
}
var (
file_cache AppCache
zip_timeout func() int
disable_csp func() bool
)
func init() {
zip_timeout = func() int {
return Config.Get("features.protection.zip_timeout").Schema(func(f *FormElement) *FormElement {
if f == nil {
f = &FormElement{}
}
f.Default = 60
f.Name = "zip_timeout"
f.Type = "number"
f.Description = "Timeout when user wants to download or extract a zip"
f.Placeholder = "Default: 60seconds"
return f
}).Int()
}
disable_csp = func() bool {
return Config.Get("features.protection.disable_csp").Schema(func(f *FormElement) *FormElement {
if f == nil {
f = &FormElement{}
}
f.Default = false
f.Name = "disable_csp"
f.Type = "boolean"
f.Description = "Disable the content security policy. Unless you 100% trust the content in your storage and want to execute code running from that storage, you shouldn't have this option checked"
return f
}).Bool()
}
file_cache = NewAppCache()
file_cache.OnEvict(func(key string, value interface{}) {
os.RemoveAll(filepath.Join(GetAbsolutePath(TMP_PATH), key))
})
Hooks.Register.Onload(func() {
zip_timeout()
disable_csp()
})
initChunkedUploader()
}
func FileLs(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanRead(ctx) == false {
if model.CanUpload(ctx) == false {
Log.Debug("ls::permission 'permission denied'")
SendErrorResult(res, ErrPermissionDenied)
return
}
SendSuccessResults(res, make([]FileInfo, 0))
return
}
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("ls::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
var perms Metadata = Metadata{}
if obj, ok := ctx.Backend.(interface{ Meta(path string) Metadata }); ok {
perms = obj.Meta(path)
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Ls(ctx, path); err != nil {
Log.Info("ls::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
ctx.Context = context.WithValue(ctx.Context, "AUDIT", false)
if err = auth.Mkdir(ctx, path); err != nil {
perms.CanCreateDirectory = NewBool(false)
}
if err = auth.Touch(ctx, path); err != nil {
perms.CanCreateFile = NewBool(false)
}
if err = auth.Mv(ctx, path, path); err != nil {
perms.CanRename = NewBool(false)
}
if err = auth.Save(ctx, path); err != nil {
perms.CanUpload = NewBool(false)
}
if err = auth.Rm(ctx, path); err != nil {
perms.CanDelete = NewBool(false)
}
if err = auth.Cat(ctx, path); err != nil {
perms.CanSee = NewBool(false)
}
}
if model.CanEdit(ctx) == false {
perms.CanCreateFile = NewBool(false)
perms.CanCreateDirectory = NewBool(false)
perms.CanRename = NewBool(false)
perms.CanMove = NewBool(false)
perms.CanDelete = NewBool(false)
}
if model.CanUpload(ctx) == false {
perms.CanCreateDirectory = NewBool(false)
perms.CanRename = NewBool(false)
perms.CanMove = NewBool(false)
perms.CanDelete = NewBool(false)
}
if model.CanShare(ctx) == false {
perms.CanShare = NewBool(false)
}
entries, err := ctx.Backend.Ls(path)
if err != nil {
Log.Debug("ls::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
files := make([]FileInfo, len(entries))
etagger := fnv.New32()
etagger.Write([]byte(path + strconv.Itoa(len(entries))))
for i := 0; i < len(entries); i++ {
name := entries[i].Name()
files[i] = FileInfo{
Name: name,
Size: entries[i].Size(),
Time: func(mt time.Time) (modTime int64) {
if mt.IsZero() == false {
modTime = mt.UnixNano() / int64(time.Millisecond)
}
if i < 200 { // etag is generated from a few values to avoid large memory usage
etagger.Write([]byte(name + strconv.Itoa(int(modTime))))
}
return modTime
}(entries[i].ModTime()),
Type: func(mode os.FileMode) string {
if mode.IsRegular() {
return "file"
}
return "directory"
}(entries[i].Mode()),
}
}
etagValue := base64.StdEncoding.EncodeToString(etagger.Sum(nil))
res.Header().Set("Etag", etagValue)
if etagValue != "" && req.Header.Get("If-None-Match") == etagValue {
res.WriteHeader(http.StatusNotModified)
return
}
SendSuccessResultsWithMetadata(res, files, perms)
}
func FileCat(ctx *App, res http.ResponseWriter, req *http.Request) {
var (
file io.ReadCloser
contentLength int64 = -1
needToCreateCache bool = false
query url.Values = req.URL.Query()
header http.Header = res.Header()
)
http.SetCookie(res, &http.Cookie{
Name: "download",
Value: "",
MaxAge: -1,
Path: "/",
})
if model.CanRead(ctx) == false {
Log.Debug("cat::permission 'permission denied'")
SendErrorResult(res, ErrPermissionDenied)
return
}
path, err := PathBuilder(ctx, query.Get("path"))
if err != nil {
Log.Debug("cat::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Cat(ctx, path); err != nil {
Log.Info("cat::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
// use our cache if necessary (range request) when possible
if req.Header.Get("range") != "" {
ctx.Session["fullpath"] = path
if p := file_cache.Get(ctx.Session); p != nil {
f, err := os.OpenFile(p.(string), os.O_RDONLY, os.ModePerm)
if err == nil {
file = f
if fi, err := f.Stat(); err == nil {
contentLength = fi.Size()
}
}
}
}
// perform the actual `cat` if needed
mType := GetMimeType(query.Get("path"))
if file == nil {
if file, err = ctx.Backend.Cat(path); err != nil {
Log.Debug("cat::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
if mType == "application/javascript" {
mType = "text/plain"
}
header.Set("Content-Type", mType)
if req.Header.Get("range") != "" {
needToCreateCache = true
}
}
// plugin hooks
if thumb := query.Get("thumbnail"); thumb == "true" {
for plgMType, plgHandler := range Hooks.Get.Thumbnailer() {
if plgMType != mType {
continue
}
file, err = plgHandler.Generate(file, ctx, &res, req)
if err != nil {
if req.Context().Err() == nil {
Log.Debug("cat::thumbnailer '%s'", err.Error())
}
SendErrorResult(res, err)
return
}
break
}
}
for _, obj := range Hooks.Get.ProcessFileContentBeforeSend() {
if file, err = obj(file, ctx, &res, req); err != nil {
Log.Debug("cat::hooks '%s'", err.Error())
SendErrorResult(res, err)
return
}
}
// The extra complexity is to support: https://en.wikipedia.org/wiki/Progressive_download
// => range request requires a seeker to work, some backend support it, some don't. 2 strategies:
// 1. backend support Seek: use what the current backend gives us
// 2. backend doesn't support Seek: build up a cache so that subsequent call don't trigger multiple downloads
if req.Header.Get("range") != "" && needToCreateCache == true {
if obj, ok := file.(io.Seeker); ok == true {
if size, err := obj.Seek(0, io.SeekEnd); err == nil {
if _, err = obj.Seek(0, io.SeekStart); err == nil {
contentLength = size
}
}
} else {
tmpPath := GetAbsolutePath(TMP_PATH, "file_"+QuickString(20)+".dat")
f, err := os.OpenFile(tmpPath, os.O_RDWR|os.O_CREATE, os.ModePerm)
if err != nil {
Log.Debug("cat::range0 '%s'", err.Error())
SendErrorResult(res, err)
return
}
file_cache.Set(ctx.Session, tmpPath)
if _, err = io.Copy(f, file); err != nil {
f.Close()
file.Close()
Log.Debug("cat::range1 '%s'", err.Error())
SendErrorResult(res, err)
return
}
if err = f.Sync(); err != nil {
f.Close()
file.Close()
Log.Debug("cat::range2 '%s'", err.Error())
SendErrorResult(res, err)
return
}
f.Close()
file.Close()
if f, err = os.OpenFile(tmpPath, os.O_RDONLY, os.ModePerm); err != nil {
Log.Debug("cat::range3 '%s'", err.Error())
SendErrorResult(res, err)
return
}
if fi, err := f.Stat(); err == nil {
contentLength = fi.Size()
}
file = f
}
}
// Range request: find how much data we need to send
var ranges [][]int64
if req.Header.Get("range") != "" {
ranges = make([][]int64, 0)
for _, r := range strings.Split(strings.TrimPrefix(req.Header.Get("range"), "bytes="), ",") {
r = strings.TrimSpace(r)
if r == "" {
continue
}
var start int64 = -1
var end int64 = -1
sides := strings.Split(r, "-")
if len(sides) == 2 {
if start, err = strconv.ParseInt(sides[0], 10, 64); err != nil || start < 0 {
start = 0
}
if end, err = strconv.ParseInt(sides[1], 10, 64); err != nil || end < start {
end = contentLength - 1
}
}
if start != -1 && end != -1 && end-start >= 0 {
ranges = append(ranges, []int64{start, end})
}
}
}
// publish headers
if contentLength >= 0 {
header.Set("Content-Length", fmt.Sprintf("%d", contentLength))
}
if disable_csp() == false {
header.Set("Content-Security-Policy", "default-src 'none'; img-src 'self'; media-src 'self'; style-src 'unsafe-inline'; font-src data:; script-src-elem 'self'")
}
if fname := query.Get("name"); fname != "" {
header.Set("Content-Disposition", "attachment; filename=\""+fname+"\"")
}
header.Set("Accept-Ranges", "bytes")
// Send data to the client
if req.Method != "HEAD" {
if f, ok := file.(io.ReadSeeker); ok && len(ranges) > 0 {
if _, err = f.Seek(ranges[0][0], io.SeekStart); err == nil {
header.Set("Content-Range", fmt.Sprintf("bytes %d-%d/%d", ranges[0][0], ranges[0][1], contentLength))
header.Set("Content-Length", fmt.Sprintf("%d", ranges[0][1]-ranges[0][0]+1))
res.WriteHeader(http.StatusPartialContent)
io.CopyN(res, f, ranges[0][1]-ranges[0][0]+1)
} else {
res.WriteHeader(http.StatusRequestedRangeNotSatisfiable)
}
} else {
io.Copy(res, file)
}
}
file.Close()
}
func FileAccess(ctx *App, res http.ResponseWriter, req *http.Request) {
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("access::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
var perms Metadata = Metadata{}
if obj, ok := ctx.Backend.(interface{ Meta(path string) Metadata }); ok {
perms = obj.Meta(path)
}
allowed := []string{}
if model.CanRead(ctx) {
if perms.CanSee == nil || *perms.CanSee == true {
allowed = append(allowed, "GET")
}
}
if model.CanEdit(ctx) {
if (perms.CanCreateFile == nil || *perms.CanCreateFile == true) &&
(perms.CanCreateDirectory == nil || *perms.CanCreateDirectory == true) {
allowed = append(allowed, "PUT")
}
}
if model.CanUpload(ctx) {
if perms.CanUpload == nil || *perms.CanUpload == true {
allowed = append(allowed, "POST")
}
}
header := res.Header()
header.Set("Allow", strings.Join(allowed, ", "))
SendSuccessResult(res, nil)
}
var chunkedUploadCache AppCache
func FileSave(ctx *App, res http.ResponseWriter, req *http.Request) {
h := res.Header()
h.Set("Cache-Control", "no-store")
h.Set("Pragma", "no-cache")
h.Set("Connection", "Close")
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("files::save action=path_builder err=%s", err.Error())
SendErrorResult(res, err)
return
}
if model.CanEdit(ctx) == false {
if model.CanUpload(ctx) == false {
Log.Debug("files::save action=permission_upload err=permission_denied")
SendErrorResult(res, ErrPermissionDenied)
return
}
// for user who cannot edit but can upload => we want to ensure there
// won't be any overwritten data
root, filename := SplitPath(path)
entries, err := ctx.Backend.Ls(root)
if err != nil {
Log.Debug("files::save action=permission_ls err=%s", err.Error())
SendErrorResult(res, ErrPermissionDenied)
return
}
for i := 0; i < len(entries); i++ {
if entries[i].Name() == filename {
Log.Debug("files::save action=permission_ls err=already_exist")
SendErrorResult(res, ErrConflict)
return
}
}
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Save(ctx, path); err != nil {
Log.Info("files::save action=middleware err=%s", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
// There is 2 ways to save something:
// - case1: regular upload, we just insert the file in the pipe
proto := req.URL.Query().Get("proto")
if proto == "" && req.Method == http.MethodPost {
err = ctx.Backend.Save(path, req.Body)
req.Body.Close()
if err != nil {
Log.Debug("files::save action=backend_save err=%s", err.Error())
SendErrorResult(res, NewError(err.Error(), 403))
return
}
SendSuccessResult(res, nil)
return
}
// - case2: chunked upload which implements the TUS protocol:
// https://www.ietf.org/archive/id/draft-tus-httpbis-resumable-uploads-protocol-00.html
cacheKey := map[string]string{
"path": path,
"session": GenerateID(ctx.Session),
}
if proto == "tus" && req.Method == http.MethodPost {
if c := chunkedUploadCache.Get(cacheKey); c != nil {
chunkedUploadCache.Del(cacheKey)
}
size, err := strconv.ParseUint(req.Header.Get("Upload-Length"), 10, 0)
if err != nil {
SendErrorResult(res, ErrNotValid)
return
}
uploader := createChunkedUploader(ctx.Backend.Save, path, size)
chunkedUploadCache.Set(cacheKey, uploader)
h.Set("Content-Length", "0")
h.Set("Location", req.URL.String())
res.WriteHeader(http.StatusCreated)
return
}
if proto == "tus" && req.Method == http.MethodHead {
c := chunkedUploadCache.Get(cacheKey)
if c == nil {
SendErrorResult(res, ErrNotFound)
return
}
offset, length := c.(*chunkedUpload).Meta()
h.Set("Upload-Offset", fmt.Sprintf("%d", offset))
h.Set("Upload-Length", fmt.Sprintf("%d", length))
res.WriteHeader(http.StatusOK)
return
}
if proto == "tus" && req.Method == http.MethodPatch {
requestOffset, err := strconv.ParseUint(req.Header.Get("Upload-Offset"), 10, 0)
if err != nil {
SendErrorResult(res, ErrNotValid)
return
}
c := chunkedUploadCache.Get(cacheKey)
if c == nil {
SendErrorResult(res, ErrNotFound)
return
}
uploader := c.(*chunkedUpload)
initialOffset, totalSize := uploader.Meta()
if initialOffset != requestOffset {
Log.Debug("files::save::tus action=uploader.next path=%s err=offset_missmatch", path)
SendErrorResult(res, ErrNotValid)
return
} else if err := uploader.Next(req.Body); err != nil {
Log.Debug("files::save::tus action=uploader.next path=%s err=%s", path, err.Error())
SendErrorResult(res, NewError(err.Error(), 403))
return
}
newOffset, _ := uploader.Meta()
if newOffset > totalSize {
uploader.Close()
chunkedUploadCache.Del(cacheKey)
Log.Warning("files::save::tus path=%s err=assert_offset size=%d old_offset=%d new_offset=%d", path, totalSize, initialOffset, newOffset)
SendErrorResult(res, NewError("aborted - offset larger than total size", 403))
return
} else if newOffset == totalSize {
if err := uploader.Close(); err != nil {
Log.Debug("files::save::tus action=uploader.close err=%s", err.Error())
SendErrorResult(res, ErrNotValid)
return
}
chunkedUploadCache.Del(cacheKey)
}
h.Set("Upload-Offset", fmt.Sprintf("%d", newOffset))
res.WriteHeader(http.StatusNoContent)
return
}
SendErrorResult(res, ErrNotImplemented)
}
func createChunkedUploader(save func(path string, file io.Reader) error, path string, size uint64) *chunkedUpload {
r, w := io.Pipe()
done := make(chan error, 1)
go func() {
done <- save(path, r)
}()
return &chunkedUpload{
fn: save,
stream: w,
done: done,
offset: 0,
size: size,
}
}
func initChunkedUploader() {
chunkedUploadCache = NewAppCache(60*24, 1)
chunkedUploadCache.OnEvict(func(key string, value interface{}) {
c := value.(*chunkedUpload)
if c == nil {
Log.Warning("ctrl::files::chunked::cleanup nil on close")
return
}
if err := c.Close(); err != nil {
Log.Warning("ctrl::files::chunked::cleanup action=close err=%s", err.Error())
return
}
})
}
type chunkedUpload struct {
fn func(path string, file io.Reader) error
stream *io.PipeWriter
offset uint64
size uint64
done chan error
once sync.Once
mu sync.Mutex
}
func (this *chunkedUpload) Next(body io.ReadCloser) error {
n, err := io.Copy(this.stream, body)
body.Close()
this.mu.Lock()
this.offset += uint64(n)
this.mu.Unlock()
return err
}
func (this *chunkedUpload) Close() error {
this.stream.Close()
err := <-this.done
this.once.Do(func() {
close(this.done)
})
return err
}
func (this *chunkedUpload) Meta() (uint64, uint64) {
this.mu.Lock()
defer this.mu.Unlock()
return this.offset, this.size
}
func FileMv(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanEdit(ctx) == false {
Log.Debug("mv::permission 'permission denied'")
SendErrorResult(res, NewError("Permission denied", 403))
return
}
from, err := PathBuilder(ctx, req.URL.Query().Get("from"))
if err != nil {
Log.Debug("mv::path::from '%s'", err.Error())
SendErrorResult(res, err)
return
}
to, err := PathBuilder(ctx, req.URL.Query().Get("to"))
if err != nil {
Log.Debug("mv::path::to '%s'", err.Error())
SendErrorResult(res, err)
return
}
if from == "" || to == "" {
Log.Debug("mv::params 'missing path parameter'")
SendErrorResult(res, NewError("missing path parameter", 400))
return
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Mv(ctx, from, to); err != nil {
Log.Info("mv::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
err = ctx.Backend.Mv(from, to)
if err != nil {
Log.Debug("mv::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
SendSuccessResult(res, nil)
}
func FileRm(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanEdit(ctx) == false {
Log.Debug("rm::permission 'permission denied'")
SendErrorResult(res, NewError("Permission denied", 403))
return
}
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("rm::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Rm(ctx, path); err != nil {
Log.Info("rm::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
err = ctx.Backend.Rm(path)
if err != nil {
Log.Debug("rm::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
SendSuccessResult(res, nil)
}
func FileMkdir(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanUpload(ctx) == false {
Log.Debug("mkdir::permission 'permission denied'")
SendErrorResult(res, NewError("Permission denied", 403))
return
}
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("mkdir::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Mkdir(ctx, path); err != nil {
Log.Info("mkdir::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
err = ctx.Backend.Mkdir(path)
if err != nil {
Log.Debug("mkdir::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
SendSuccessResult(res, nil)
}
func FileTouch(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanUpload(ctx) == false {
Log.Debug("touch::permission 'permission denied'")
SendErrorResult(res, NewError("Permission denied", 403))
return
}
path, err := PathBuilder(ctx, req.URL.Query().Get("path"))
if err != nil {
Log.Debug("touch::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Touch(ctx, path); err != nil {
Log.Info("touch::auth '%s'", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
err = ctx.Backend.Touch(path)
if err != nil {
Log.Debug("touch::backend '%s'", err.Error())
SendErrorResult(res, err)
return
}
SendSuccessResult(res, nil)
}
func FileDownloader(ctx *App, res http.ResponseWriter, req *http.Request) {
var err error
if model.CanRead(ctx) == false {
Log.Debug("downloader::permission 'permission denied'")
SendErrorResult(res, ErrPermissionDenied)
return
}
paths := req.URL.Query()["path"]
for i := 0; i < len(paths); i++ {
if paths[i], err = PathBuilder(ctx, paths[i]); err != nil {
Log.Debug("downloader::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
}
resHeader := res.Header()
resHeader.Set("Content-Type", "application/zip")
filename := "download"
if len(paths) == 1 {
filename = filepath.Base(paths[0])
}
resHeader.Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s.zip\"", filename))
start := time.Now()
var addToZipRecursive func(*App, *zip.Writer, string, string, *[]string) error
addToZipRecursive = func(c *App, zw *zip.Writer, backendPath string, zipRoot string, errList *[]string) (err error) {
if time.Now().Sub(start) > time.Duration(zip_timeout())*time.Second {
Log.Debug("downloader::timeout zip not completed due to timeout")
return ErrTimeout
}
if strings.HasSuffix(backendPath, "/") == false {
// Process File
zipPath := strings.TrimPrefix(backendPath, zipRoot)
zipFile, err := zw.Create(zipPath)
if err != nil {
*errList = append(*errList, fmt.Sprintf("downloader::create %s %s\n", zipPath, err.Error()))
Log.Debug("downloader::create backendPath['%s'] zipPath['%s'] error['%s']", backendPath, zipPath, err.Error())
return err
}
file, err := ctx.Backend.Cat(backendPath)
if err != nil {
*errList = append(*errList, fmt.Sprintf("downloader::cat %s %s\n", zipPath, err.Error()))
Log.Debug("downloader::cat backendPath['%s'] zipPath['%s'] error['%s']", backendPath, zipPath, err.Error())
io.Copy(zipFile, strings.NewReader(""))
return err
}
if _, err = io.Copy(zipFile, file); err != nil {
*errList = append(*errList, fmt.Sprintf("downloader::copy %s %s\n", zipPath, err.Error()))
Log.Debug("downloader::copy backendPath['%s'] zipPath['%s'] error['%s']", backendPath, zipPath, err.Error())
io.Copy(zipFile, strings.NewReader(""))
return err
}
file.Close()
return nil
}
// Process Folder
entries, err := c.Backend.Ls(backendPath)
if err != nil {
*errList = append(*errList, fmt.Sprintf("downloader::ls %s\n", err.Error()))
Log.Debug("downloader::ls path['%s'] error['%s']", backendPath, err.Error())
return err
}
for i := 0; i < len(entries); i++ {
newBackendPath := backendPath + entries[i].Name()
if entries[i].IsDir() {
newBackendPath += "/"
}
if err = addToZipRecursive(ctx, zw, newBackendPath, zipRoot, errList); err != nil {
*errList = append(*errList, fmt.Sprintf("downloader::recursive %s\n", err.Error()))
Log.Debug("downloader::recursive path['%s'] error['%s']", newBackendPath, err.Error())
return err
}
}
return nil
}
zipWriter := zip.NewWriter(res)
defer zipWriter.Close()
errList := []string{}
for i := 0; i < len(paths); i++ {
zipRoot := ""
if strings.HasSuffix(paths[i], "/") {
zipRoot = strings.TrimSuffix(paths[i], filepath.Base(paths[i])+"/")
} else {
zipRoot = strings.TrimSuffix(paths[i], filepath.Base(paths[i]))
}
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
if err = auth.Ls(ctx, paths[i]); err != nil {
Log.Info("downloader::ls::auth path['%s'] => '%s'", paths[i], err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
if err = auth.Cat(ctx, paths[i]); err != nil {
Log.Info("downloader::cat::auth path['%s'] => '%s'", paths[i], err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
addToZipRecursive(ctx, zipWriter, paths[i], zipRoot, &errList)
}
if len(errList) > 0 {
if errorWriter, err := zipWriter.Create("error.log"); err == nil {
for _, e := range errList {
io.Copy(errorWriter, strings.NewReader(e))
}
}
}
}
func FileExtract(ctx *App, res http.ResponseWriter, req *http.Request) {
if model.CanRead(ctx) == false {
Log.Debug("extract::permission 'permission denied'")
SendErrorResult(res, ErrPermissionDenied)
return
}
paths := req.URL.Query()["path"]
for _, auth := range Hooks.Get.AuthorisationMiddleware() {
for i := 0; i < len(paths); i++ {
if err := auth.Mkdir(ctx, paths[i]); err != nil {
Log.Debug("extract::permission::mkdir %s", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
} else if err := auth.Save(ctx, paths[i]); err != nil {
Log.Debug("extract::permission::Save %s", err.Error())
SendErrorResult(res, ErrNotAuthorized)
return
}
}
}
c, cancel := context.WithTimeout(ctx.Context, time.Duration(zip_timeout())*time.Second)
extractPath := func(base string, path string) (string, error) {
base = filepath.Dir(base)
path = filepath.Join(base, path)
if strings.HasPrefix(path, base) == false {
return "", ErrFilesystemError
}
return path, nil
}
extractZip := func(path string) (err error) {
if err = c.Err(); err != nil {
cancel()
return ErrTimeout
}
zipFile, err := ctx.Backend.Cat(path)
if err != nil {
return err
}
defer zipFile.Close()
f, err := os.CreateTemp("", "tmpzip.*.zip")
if err != nil {
Log.Debug("extract::create_temp '%s'", err.Error())
return nil
}
defer os.Remove(f.Name())
io.Copy(f, zipFile)
s, err := f.Stat()
if err != nil {
return err
}
r, err := zip.NewReader(f, s.Size())
if err != nil {
return err
}
isFolderAlreadyCreated := map[string]bool{
fmt.Sprintf("%s/", filepath.Dir(path)): true,
}
for _, f := range r.File {
time.Sleep(2 * time.Millisecond)
if err = c.Err(); err != nil {
cancel()
return ErrTimeout
}
// STEP1: ensure the underlying folders exists
spl := strings.Split(f.Name, "/")
for i, p := range spl {
if p == "" {
continue
}
p = strings.Join(spl[0:i], "/")
p, err = extractPath(path, p)
if strings.HasSuffix(p, "/") == false {
p += "/"
}
if isFolderAlreadyCreated[p] {
continue
}
isFolderAlreadyCreated[p] = true
if err := ctx.Backend.Mkdir(p); err != nil {
Log.Debug("extract::mkdir err %s", err.Error())
}
}
// STEP2: create the file
if f.FileInfo().IsDir() == false {
p, err := extractPath(path, f.Name)
if err != nil {
Log.Debug("extract::chroot %s", err.Error())
return err
}
rc, err := f.Open()
if err != nil {
Log.Debug("extract::fopen %s", err.Error())
return err
}
err = ctx.Backend.Save(p, rc)
rc.Close()
if err != nil {
Log.Debug("extract::save err %s", err.Error())
}
}
}
return nil
}
var err error
for i := 0; i < len(paths); i++ {
if paths[i], err = PathBuilder(ctx, paths[i]); err != nil {
Log.Debug("extract::path '%s'", err.Error())
SendErrorResult(res, err)
return
}
if err = extractZip(paths[i]); err != nil {
SendErrorResult(res, err)
return
}
}
SendSuccessResult(res, nil)
}
func PathBuilder(ctx *App, path string) (string, error) {
if path == "" {
return "", NewError("No path available", 400)
}
sessionPath := ctx.Session["path"]
basePath := filepath.ToSlash(filepath.Join(sessionPath, path))
if path[len(path)-1:] == "/" && basePath != "/" {
basePath += "/"
}
if strings.HasPrefix(basePath, ctx.Session["path"]) == false {
return "", ErrFilesystemError
}
return basePath, nil
}