filebrowser/filemanager.go

204 lines
5.4 KiB
Go
Raw Normal View History

//go:generate go get github.com/jteeuwen/go-bindata
//go:generate go install github.com/jteeuwen/go-bindata/go-bindata
2016-10-22 11:11:08 +00:00
//go:generate go-bindata -pkg assets -ignore .jsbeautifyrc -prefix "_embed" -o assets/binary.go _embed/...
// Package filemanager provides middleware for managing files in a directory
// when directory path is requested instead of a specific file. Based on browse
// middleware.
2016-06-10 13:36:43 +00:00
package filemanager
import (
2016-10-18 16:56:35 +00:00
e "errors"
2016-06-10 13:36:43 +00:00
"net/http"
"strings"
2016-06-10 13:36:43 +00:00
2016-06-28 09:24:02 +00:00
"github.com/hacdias/caddy-filemanager/assets"
"github.com/hacdias/caddy-filemanager/config"
2016-10-18 20:49:46 +00:00
"github.com/hacdias/caddy-filemanager/file"
2016-10-22 10:47:49 +00:00
"github.com/hacdias/caddy-filemanager/handlers"
2016-10-18 20:30:10 +00:00
"github.com/hacdias/caddy-filemanager/page"
2016-06-10 13:36:43 +00:00
"github.com/mholt/caddy/caddyhttp/httpserver"
)
// FileManager is an http.Handler that can show a file listing when
// directories in the given paths are specified.
2016-06-10 13:36:43 +00:00
type FileManager struct {
2016-06-11 20:20:47 +00:00
Next httpserver.Handler
2016-06-25 20:57:10 +00:00
Configs []config.Config
}
// ServeHTTP determines if the request is for this plugin, and if all prerequisites are met.
func (f FileManager) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
2016-06-11 20:20:47 +00:00
var (
2016-10-18 16:56:35 +00:00
c *config.Config
2016-10-18 20:49:46 +00:00
fi *file.Info
2016-10-18 16:56:35 +00:00
code int
err error
user *config.User
2016-06-11 20:20:47 +00:00
)
2016-06-10 21:44:33 +00:00
for i := range f.Configs {
2016-10-18 21:00:26 +00:00
// Checks if this Path should be handled by File Manager.
if !httpserver.Path(r.URL.Path).Matches(f.Configs[i].BaseURL) {
return f.Next.ServeHTTP(w, r)
}
w.Header().Set("x-frame-options", "SAMEORIGIN")
w.Header().Set("x-content-type", "nosniff")
w.Header().Set("x-xss-protection", "1; mode=block")
2016-10-18 21:00:26 +00:00
c = &f.Configs[i]
2016-10-18 16:56:35 +00:00
2016-10-18 21:00:26 +00:00
// Checks if the URL matches the Assets URL. Returns the asset if the
// method is GET and Status Forbidden otherwise.
if httpserver.Path(r.URL.Path).Matches(c.BaseURL + assets.BaseURL) {
if r.Method == http.MethodGet {
2016-10-18 16:56:35 +00:00
return assets.Serve(w, r, c)
}
2016-10-18 21:00:26 +00:00
return http.StatusForbidden, nil
}
// Obtains the user
username, _, _ := r.BasicAuth()
if _, ok := c.Users[username]; ok {
user = c.Users[username]
} else {
user = c.User
}
2016-08-21 18:44:09 +00:00
2016-10-18 21:00:26 +00:00
// Checks if the request URL is for the WebDav server
if strings.HasPrefix(r.URL.Path, c.WebDavURL) {
// if !c.CheckToken(r) {
// return http.StatusForbidden, nil
// }
2016-10-18 21:00:26 +00:00
// Checks for user permissions relatively to this PATH
if !user.Allowed(strings.TrimPrefix(r.URL.Path, c.WebDavURL)) {
return http.StatusForbidden, nil
2016-08-21 18:44:09 +00:00
}
2016-10-18 21:00:26 +00:00
switch r.Method {
case "PROPPATCH", "MOVE", "PATCH", "PUT", "DELETE":
if !user.AllowEdit {
2016-10-18 15:42:48 +00:00
return http.StatusForbidden, nil
}
2016-10-18 21:00:26 +00:00
case "MKCOL", "COPY":
if !user.AllowNew {
return http.StatusForbidden, nil
2016-10-18 15:42:48 +00:00
}
2016-10-18 21:00:26 +00:00
}
2016-10-18 15:42:48 +00:00
2016-10-18 21:00:26 +00:00
// Preprocess the PUT request if it's the case
if r.Method == http.MethodPut {
2016-10-22 11:00:45 +00:00
if handlers.PreProccessPUT(w, r, c, user, fi) != nil {
2016-10-18 21:00:26 +00:00
return http.StatusInternalServerError, err
2016-10-18 15:17:01 +00:00
}
2016-10-18 21:00:26 +00:00
}
2016-10-18 15:17:01 +00:00
2016-10-18 21:00:26 +00:00
c.Handler.ServeHTTP(w, r)
return 0, nil
}
// Checks if the User is allowed to access this file
if !user.Allowed(strings.TrimPrefix(r.URL.Path, c.BaseURL)) {
if r.Method == http.MethodGet {
return page.PrintErrorHTML(
w, http.StatusForbidden,
e.New("You don't have permission to access this page."),
)
2016-10-17 20:05:52 +00:00
}
2016-10-18 21:00:26 +00:00
return http.StatusForbidden, nil
}
if r.Method == http.MethodGet {
// Generate anti security token.
/* c.GenerateToken()
http.SetCookie(w, &http.Cookie{
Name: "token",
Value: c.Token,
Path: "/",
HttpOnly: true,
})
co, err := r.Cookie("token")
fmt.Println(co.Value) */
/* Name string
Value string
Path string // optional
Domain string // optional
Expires time.Time // optional
RawExpires string // for reading cookies only
// MaxAge=0 means no 'Max-Age' attribute specified.
// MaxAge<0 means delete cookie now, equivalently 'Max-Age: 0'
// MaxAge>0 means Max-Age attribute present and given in seconds
MaxAge int
Secure bool
HttpOnly bool
Raw string
Unparsed []string // Raw text of unparsed attribute-value pairs*/
2016-10-18 21:00:26 +00:00
// Gets the information of the directory/file
fi, code, err = file.GetInfo(r.URL, c, user)
if err != nil {
2016-10-18 16:56:35 +00:00
if r.Method == http.MethodGet {
2016-10-18 21:00:26 +00:00
return page.PrintErrorHTML(w, code, err)
2016-10-18 16:56:35 +00:00
}
2016-10-18 21:00:26 +00:00
return code, err
}
2016-10-18 16:56:35 +00:00
2016-10-18 21:00:26 +00:00
// If it's a dir and the path doesn't end with a trailing slash,
// redirect the user.
if fi.IsDir() && !strings.HasSuffix(r.URL.Path, "/") {
http.Redirect(w, r, c.AddrPath+r.URL.Path+"/", http.StatusTemporaryRedirect)
return 0, nil
2016-08-22 10:37:56 +00:00
}
2016-10-22 10:47:49 +00:00
switch {
case r.URL.Query().Get("download") != "":
code, err = handlers.Download(w, r, c, fi)
case r.URL.Query().Get("raw") == "true" && !fi.IsDir():
http.ServeFile(w, r, fi.Path)
code, err = 0, nil
case fi.IsDir():
code, err = handlers.ServeListing(w, r, c, user, fi)
default:
code, err = handlers.ServeSingle(w, r, c, user, fi)
}
2016-10-18 21:00:26 +00:00
if err != nil {
2016-10-22 10:47:49 +00:00
code, err = page.PrintErrorHTML(w, code, err)
2016-10-18 21:00:26 +00:00
}
2016-10-22 10:47:49 +00:00
2016-10-18 21:00:26 +00:00
return code, err
}
2016-10-18 21:00:26 +00:00
if r.Method == http.MethodPost {
// TODO: This anti CSCF measure is not being applied to requests
// to the WebDav URL namespace. Anyone has ideas?
// if !c.CheckToken(r) {
// return http.StatusForbidden, nil
// }
2016-08-21 18:21:09 +00:00
2016-10-18 21:00:26 +00:00
// VCS commands.
if r.Header.Get("Command") != "" {
if !user.AllowCommands {
return http.StatusUnauthorized, nil
2016-06-26 15:52:15 +00:00
}
2016-10-18 15:42:48 +00:00
2016-10-22 10:47:49 +00:00
return handlers.Command(w, r, c, user)
2016-10-18 21:00:26 +00:00
}
2016-06-10 19:54:19 +00:00
}
2016-10-18 21:00:26 +00:00
return http.StatusNotImplemented, nil
}
2016-06-11 20:20:47 +00:00
2016-06-10 19:54:19 +00:00
return f.Next.ServeHTTP(w, r)
}