mirror of
https://github.com/filebrowser/filebrowser.git
synced 2024-06-07 23:00:43 +00:00
258 lines
6.7 KiB
Go
258 lines
6.7 KiB
Go
//go:generate go get github.com/jteeuwen/go-bindata
|
|
//go:generate go install github.com/jteeuwen/go-bindata/go-bindata
|
|
//go:generate go-bindata -pkg assets -ignore .jsbeautifyrc -prefix "assets/embed" -o assets/binary.go assets/embed/...
|
|
|
|
// Package filemanager provides middleware for managing files in a directory
|
|
// when directory path is requested instead of a specific file. Based on browse
|
|
// middleware.
|
|
package filemanager
|
|
|
|
import (
|
|
e "errors"
|
|
"io"
|
|
"log"
|
|
"mime/multipart"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/hacdias/caddy-filemanager/assets"
|
|
"github.com/hacdias/caddy-filemanager/config"
|
|
"github.com/hacdias/caddy-filemanager/directory"
|
|
"github.com/hacdias/caddy-filemanager/errors"
|
|
"github.com/hacdias/caddy-filemanager/page"
|
|
"github.com/mholt/caddy/caddyhttp/httpserver"
|
|
)
|
|
|
|
// FileManager is an http.Handler that can show a file listing when
|
|
// directories in the given paths are specified.
|
|
type FileManager struct {
|
|
Next httpserver.Handler
|
|
Configs []config.Config
|
|
}
|
|
|
|
// ServeHTTP determines if the request is for this plugin, and if all prerequisites are met.
|
|
func (f FileManager) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
|
|
var (
|
|
c *config.Config
|
|
fi *directory.Info
|
|
code int
|
|
err error
|
|
serveAssets bool
|
|
user *config.User
|
|
)
|
|
|
|
for i := range f.Configs {
|
|
if httpserver.Path(r.URL.Path).Matches(f.Configs[i].BaseURL) {
|
|
c = &f.Configs[i]
|
|
serveAssets = httpserver.Path(r.URL.Path).Matches(c.BaseURL + assets.BaseURL)
|
|
username, _, _ := r.BasicAuth()
|
|
|
|
if _, ok := c.Users[username]; ok {
|
|
user = c.Users[username]
|
|
} else {
|
|
user = c.User
|
|
}
|
|
|
|
// TODO: make allow and block rules relative to baseurl and webdav
|
|
// Checks if the user has permission to access the current directory.
|
|
if !user.Allowed(r.URL.Path) {
|
|
if r.Method == http.MethodGet {
|
|
return errors.PrintHTML(w, http.StatusForbidden, e.New("You don't have permission to access this page."))
|
|
}
|
|
|
|
return http.StatusForbidden, nil
|
|
}
|
|
|
|
// Security measures against CSRF attacks.
|
|
if r.Method != http.MethodGet {
|
|
if !c.CheckToken(r) {
|
|
return http.StatusForbidden, nil
|
|
}
|
|
}
|
|
|
|
if strings.HasPrefix(r.URL.Path, c.WebDavURL) {
|
|
switch r.Method {
|
|
case "PROPPATCH", "MOVE", "PATCH", "PUT", "DELETE":
|
|
if !user.AllowEdit {
|
|
return http.StatusForbidden, nil
|
|
}
|
|
case "MKCOL", "COPY":
|
|
if !user.AllowNew {
|
|
return http.StatusForbidden, nil
|
|
}
|
|
}
|
|
|
|
if r.Method == http.MethodPut {
|
|
_, err = fi.Update(w, r, c, user)
|
|
if err != nil {
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
}
|
|
|
|
c.WebDavHandler.ServeHTTP(w, r)
|
|
return 0, nil
|
|
}
|
|
|
|
if r.Method == http.MethodGet && serveAssets {
|
|
return assets.Serve(w, r, c)
|
|
}
|
|
|
|
if r.Method == http.MethodGet {
|
|
// Gets the information of the directory/file
|
|
fi, code, err = directory.GetInfo(r.URL, c, user)
|
|
if err != nil {
|
|
if r.Method == http.MethodGet {
|
|
return errors.PrintHTML(w, code, err)
|
|
}
|
|
return code, err
|
|
}
|
|
|
|
// If it's a dir and the path doesn't end with a trailing slash,
|
|
// redirect the user.
|
|
if fi.IsDir && !strings.HasSuffix(r.URL.Path, "/") {
|
|
http.Redirect(w, r, c.AddrPath+r.URL.Path+"/", http.StatusTemporaryRedirect)
|
|
return 0, nil
|
|
}
|
|
|
|
// Generate anti security token.
|
|
c.GenerateToken()
|
|
|
|
if !fi.IsDir {
|
|
query := r.URL.Query()
|
|
if val, ok := query["raw"]; ok && val[0] == "true" {
|
|
r.URL.Path = strings.Replace(r.URL.Path, c.BaseURL, c.WebDavURL, 1)
|
|
c.WebDavHandler.ServeHTTP(w, r)
|
|
return 0, nil
|
|
}
|
|
|
|
if val, ok := query["download"]; ok && val[0] == "true" {
|
|
w.Header().Set("Content-Disposition", "attachment; filename="+fi.Name)
|
|
r.URL.Path = strings.Replace(r.URL.Path, c.BaseURL, c.WebDavURL, 1)
|
|
c.WebDavHandler.ServeHTTP(w, r)
|
|
return 0, nil
|
|
}
|
|
}
|
|
|
|
code, err := fi.ServeAsHTML(w, r, c, user)
|
|
if err != nil {
|
|
return errors.PrintHTML(w, code, err)
|
|
}
|
|
return code, err
|
|
}
|
|
|
|
if r.Method == http.MethodPost {
|
|
// Upload a new file.
|
|
if r.Header.Get("Upload") == "true" {
|
|
if !user.AllowNew {
|
|
return http.StatusUnauthorized, nil
|
|
}
|
|
|
|
return upload(w, r, c)
|
|
}
|
|
|
|
// Search and git commands.
|
|
if r.Header.Get("Search") == "true" {
|
|
// TODO: search commands. USE PROPFIND?
|
|
}
|
|
|
|
// VCS commands.
|
|
if r.Header.Get("Command") != "" {
|
|
if !user.AllowCommands {
|
|
return http.StatusUnauthorized, nil
|
|
}
|
|
|
|
return command(w, r, c, user)
|
|
}
|
|
}
|
|
|
|
return http.StatusNotImplemented, nil
|
|
}
|
|
}
|
|
|
|
return f.Next.ServeHTTP(w, r)
|
|
}
|
|
|
|
// upload is used to handle the upload requests to the server
|
|
func upload(w http.ResponseWriter, r *http.Request, c *config.Config) (int, error) {
|
|
// Parse the multipart form in the request
|
|
err := r.ParseMultipartForm(100000)
|
|
if err != nil {
|
|
log.Println(err)
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
|
|
// For each file header in the multipart form
|
|
for _, headers := range r.MultipartForm.File {
|
|
// Handle each file
|
|
for _, header := range headers {
|
|
// Open the first file
|
|
var src multipart.File
|
|
if src, err = header.Open(); nil != err {
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
|
|
filename := strings.Replace(r.URL.Path, c.BaseURL, c.PathScope, 1)
|
|
filename = filename + header.Filename
|
|
filename = filepath.Clean(filename)
|
|
|
|
// Create the file
|
|
var dst *os.File
|
|
if dst, err = os.Create(filename); nil != err {
|
|
if os.IsExist(err) {
|
|
return http.StatusConflict, err
|
|
}
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
|
|
// Copy the file content
|
|
if _, err = io.Copy(dst, src); nil != err {
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
|
|
defer dst.Close()
|
|
}
|
|
}
|
|
|
|
return http.StatusOK, nil
|
|
}
|
|
|
|
// command handles the requests for VCS related commands: git, svn and mercurial
|
|
func command(w http.ResponseWriter, r *http.Request, c *config.Config, u *config.User) (int, error) {
|
|
command := strings.Split(r.Header.Get("command"), " ")
|
|
|
|
// Check if the command is allowed
|
|
mayContinue := false
|
|
|
|
for _, cmd := range u.Commands {
|
|
if cmd == command[0] {
|
|
mayContinue = true
|
|
}
|
|
}
|
|
|
|
if !mayContinue {
|
|
return http.StatusForbidden, nil
|
|
}
|
|
|
|
// Check if the program is talled is installed on the computer
|
|
if _, err := exec.LookPath(command[0]); err != nil {
|
|
return http.StatusNotImplemented, nil
|
|
}
|
|
|
|
path := strings.Replace(r.URL.Path, c.BaseURL, c.PathScope, 1)
|
|
path = filepath.Clean(path)
|
|
|
|
cmd := exec.Command(command[0], command[1:len(command)]...)
|
|
cmd.Dir = path
|
|
output, err := cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
return http.StatusInternalServerError, err
|
|
}
|
|
|
|
page := &page.Page{Info: &page.Info{Data: string(output)}}
|
|
return page.PrintAsJSON(w)
|
|
}
|