api_http_user.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595
  1. package httpd
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "io"
  7. "mime/multipart"
  8. "net/http"
  9. "os"
  10. "path"
  11. "strconv"
  12. "time"
  13. "github.com/go-chi/render"
  14. "github.com/rs/xid"
  15. "github.com/drakkan/sftpgo/v2/common"
  16. "github.com/drakkan/sftpgo/v2/dataprovider"
  17. "github.com/drakkan/sftpgo/v2/logger"
  18. "github.com/drakkan/sftpgo/v2/util"
  19. )
  20. func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
  21. claims, err := getTokenClaims(r)
  22. if err != nil || claims.Username == "" {
  23. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  24. return nil, fmt.Errorf("invalid token claims %w", err)
  25. }
  26. user, err := dataprovider.UserExists(claims.Username)
  27. if err != nil {
  28. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  29. return nil, err
  30. }
  31. connID := xid.New().String()
  32. connectionID := fmt.Sprintf("%v_%v", common.ProtocolHTTP, connID)
  33. if err := checkHTTPClientUser(&user, r, connectionID); err != nil {
  34. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  35. return nil, err
  36. }
  37. connection := &Connection{
  38. BaseConnection: common.NewBaseConnection(connID, common.ProtocolHTTP, util.GetHTTPLocalAddress(r),
  39. r.RemoteAddr, user),
  40. request: r,
  41. }
  42. return connection, nil
  43. }
  44. func readUserFolder(w http.ResponseWriter, r *http.Request) {
  45. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  46. connection, err := getUserConnection(w, r)
  47. if err != nil {
  48. return
  49. }
  50. common.Connections.Add(connection)
  51. defer common.Connections.Remove(connection.GetID())
  52. name := util.CleanPath(r.URL.Query().Get("path"))
  53. contents, err := connection.ReadDir(name)
  54. if err != nil {
  55. sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
  56. return
  57. }
  58. results := make([]map[string]interface{}, 0, len(contents))
  59. for _, info := range contents {
  60. res := make(map[string]interface{})
  61. res["name"] = info.Name()
  62. if info.Mode().IsRegular() {
  63. res["size"] = info.Size()
  64. }
  65. res["mode"] = info.Mode()
  66. res["last_modified"] = info.ModTime().UTC().Format(time.RFC3339)
  67. results = append(results, res)
  68. }
  69. render.JSON(w, r, results)
  70. }
  71. func createUserDir(w http.ResponseWriter, r *http.Request) {
  72. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  73. connection, err := getUserConnection(w, r)
  74. if err != nil {
  75. return
  76. }
  77. common.Connections.Add(connection)
  78. defer common.Connections.Remove(connection.GetID())
  79. name := util.CleanPath(r.URL.Query().Get("path"))
  80. if getBoolQueryParam(r, "mkdir_parents") {
  81. if err = connection.CheckParentDirs(path.Dir(name)); err != nil {
  82. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  83. return
  84. }
  85. }
  86. err = connection.CreateDir(name, true)
  87. if err != nil {
  88. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %#v", name), getMappedStatusCode(err))
  89. return
  90. }
  91. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v created", name), http.StatusCreated)
  92. }
  93. func renameUserDir(w http.ResponseWriter, r *http.Request) {
  94. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  95. connection, err := getUserConnection(w, r)
  96. if err != nil {
  97. return
  98. }
  99. common.Connections.Add(connection)
  100. defer common.Connections.Remove(connection.GetID())
  101. oldName := util.CleanPath(r.URL.Query().Get("path"))
  102. newName := util.CleanPath(r.URL.Query().Get("target"))
  103. err = connection.Rename(oldName, newName)
  104. if err != nil {
  105. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename directory %#v to %#v", oldName, newName),
  106. getMappedStatusCode(err))
  107. return
  108. }
  109. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v renamed to %#v", oldName, newName), http.StatusOK)
  110. }
  111. func deleteUserDir(w http.ResponseWriter, r *http.Request) {
  112. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  113. connection, err := getUserConnection(w, r)
  114. if err != nil {
  115. return
  116. }
  117. common.Connections.Add(connection)
  118. defer common.Connections.Remove(connection.GetID())
  119. name := util.CleanPath(r.URL.Query().Get("path"))
  120. err = connection.RemoveDir(name)
  121. if err != nil {
  122. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %#v", name), getMappedStatusCode(err))
  123. return
  124. }
  125. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v deleted", name), http.StatusOK)
  126. }
  127. func getUserFile(w http.ResponseWriter, r *http.Request) {
  128. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  129. connection, err := getUserConnection(w, r)
  130. if err != nil {
  131. return
  132. }
  133. common.Connections.Add(connection)
  134. defer common.Connections.Remove(connection.GetID())
  135. name := util.CleanPath(r.URL.Query().Get("path"))
  136. if name == "/" {
  137. sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
  138. return
  139. }
  140. info, err := connection.Stat(name, 0)
  141. if err != nil {
  142. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  143. return
  144. }
  145. if info.IsDir() {
  146. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %#v is a directory", name), http.StatusBadRequest)
  147. return
  148. }
  149. inline := r.URL.Query().Get("inline") != ""
  150. if status, err := downloadFile(w, r, connection, name, info, inline); err != nil {
  151. resp := apiResponse{
  152. Error: err.Error(),
  153. Message: http.StatusText(status),
  154. }
  155. ctx := r.Context()
  156. if status != 0 {
  157. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  158. }
  159. render.JSON(w, r.WithContext(ctx), resp)
  160. }
  161. }
  162. func setFileDirMetadata(w http.ResponseWriter, r *http.Request) {
  163. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  164. metadata := make(map[string]int64)
  165. err := render.DecodeJSON(r.Body, &metadata)
  166. if err != nil {
  167. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  168. return
  169. }
  170. mTime, ok := metadata["modification_time"]
  171. if !ok || !r.URL.Query().Has("path") {
  172. sendAPIResponse(w, r, errors.New("please set a modification_time and a path"), "", http.StatusBadRequest)
  173. return
  174. }
  175. connection, err := getUserConnection(w, r)
  176. if err != nil {
  177. return
  178. }
  179. common.Connections.Add(connection)
  180. defer common.Connections.Remove(connection.GetID())
  181. name := util.CleanPath(r.URL.Query().Get("path"))
  182. attrs := common.StatAttributes{
  183. Flags: common.StatAttrTimes,
  184. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  185. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  186. }
  187. err = connection.SetStat(name, &attrs)
  188. if err != nil {
  189. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to set metadata for path %#v", name), getMappedStatusCode(err))
  190. return
  191. }
  192. sendAPIResponse(w, r, nil, "OK", http.StatusOK)
  193. }
  194. func uploadUserFile(w http.ResponseWriter, r *http.Request) {
  195. if maxUploadFileSize > 0 {
  196. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  197. }
  198. if !r.URL.Query().Has("path") {
  199. sendAPIResponse(w, r, errors.New("please set a file path"), "", http.StatusBadRequest)
  200. return
  201. }
  202. connection, err := getUserConnection(w, r)
  203. if err != nil {
  204. return
  205. }
  206. common.Connections.Add(connection)
  207. defer common.Connections.Remove(connection.GetID())
  208. filePath := util.CleanPath(r.URL.Query().Get("path"))
  209. if getBoolQueryParam(r, "mkdir_parents") {
  210. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  211. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  212. return
  213. }
  214. }
  215. doUploadFile(w, r, connection, filePath) //nolint:errcheck
  216. }
  217. func doUploadFile(w http.ResponseWriter, r *http.Request, connection *Connection, filePath string) error {
  218. writer, err := connection.getFileWriter(filePath)
  219. if err != nil {
  220. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", filePath), getMappedStatusCode(err))
  221. return err
  222. }
  223. _, err = io.Copy(writer, r.Body)
  224. if err != nil {
  225. writer.Close() //nolint:errcheck
  226. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", filePath), getMappedStatusCode(err))
  227. return err
  228. }
  229. err = writer.Close()
  230. if err != nil {
  231. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", filePath), getMappedStatusCode(err))
  232. return err
  233. }
  234. setModificationTimeFromHeader(r, connection, filePath)
  235. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  236. return nil
  237. }
  238. func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
  239. if maxUploadFileSize > 0 {
  240. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  241. }
  242. connection, err := getUserConnection(w, r)
  243. if err != nil {
  244. return
  245. }
  246. transferQuota := connection.GetTransferQuota()
  247. if !transferQuota.HasUploadSpace() {
  248. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  249. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  250. http.StatusRequestEntityTooLarge)
  251. return
  252. }
  253. common.Connections.Add(connection)
  254. defer common.Connections.Remove(connection.GetID())
  255. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  256. r.Body = t
  257. err = r.ParseMultipartForm(maxMultipartMem)
  258. if err != nil {
  259. connection.RemoveTransfer(t)
  260. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  261. return
  262. }
  263. connection.RemoveTransfer(t)
  264. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  265. parentDir := util.CleanPath(r.URL.Query().Get("path"))
  266. files := r.MultipartForm.File["filenames"]
  267. if len(files) == 0 {
  268. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  269. return
  270. }
  271. if getBoolQueryParam(r, "mkdir_parents") {
  272. if err = connection.CheckParentDirs(parentDir); err != nil {
  273. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  274. return
  275. }
  276. }
  277. doUploadFiles(w, r, connection, parentDir, files)
  278. }
  279. func doUploadFiles(w http.ResponseWriter, r *http.Request, connection *Connection, parentDir string,
  280. files []*multipart.FileHeader,
  281. ) int {
  282. uploaded := 0
  283. connection.User.UploadBandwidth = 0
  284. for _, f := range files {
  285. file, err := f.Open()
  286. if err != nil {
  287. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %#v", f.Filename), getMappedStatusCode(err))
  288. return uploaded
  289. }
  290. defer file.Close()
  291. filePath := path.Join(parentDir, f.Filename)
  292. writer, err := connection.getFileWriter(filePath)
  293. if err != nil {
  294. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", f.Filename), getMappedStatusCode(err))
  295. return uploaded
  296. }
  297. _, err = io.Copy(writer, file)
  298. if err != nil {
  299. writer.Close() //nolint:errcheck
  300. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", f.Filename), getMappedStatusCode(err))
  301. return uploaded
  302. }
  303. err = writer.Close()
  304. if err != nil {
  305. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", f.Filename), getMappedStatusCode(err))
  306. return uploaded
  307. }
  308. uploaded++
  309. }
  310. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  311. return uploaded
  312. }
  313. func renameUserFile(w http.ResponseWriter, r *http.Request) {
  314. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  315. connection, err := getUserConnection(w, r)
  316. if err != nil {
  317. return
  318. }
  319. common.Connections.Add(connection)
  320. defer common.Connections.Remove(connection.GetID())
  321. oldName := util.CleanPath(r.URL.Query().Get("path"))
  322. newName := util.CleanPath(r.URL.Query().Get("target"))
  323. err = connection.Rename(oldName, newName)
  324. if err != nil {
  325. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename file %#v to %#v", oldName, newName),
  326. getMappedStatusCode(err))
  327. return
  328. }
  329. sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v renamed to %#v", oldName, newName), http.StatusOK)
  330. }
  331. func deleteUserFile(w http.ResponseWriter, r *http.Request) {
  332. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  333. connection, err := getUserConnection(w, r)
  334. if err != nil {
  335. return
  336. }
  337. common.Connections.Add(connection)
  338. defer common.Connections.Remove(connection.GetID())
  339. name := util.CleanPath(r.URL.Query().Get("path"))
  340. fs, p, err := connection.GetFsAndResolvedPath(name)
  341. if err != nil {
  342. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  343. return
  344. }
  345. var fi os.FileInfo
  346. if fi, err = fs.Lstat(p); err != nil {
  347. connection.Log(logger.LevelError, "failed to remove file %#v: stat error: %+v", p, err)
  348. err = connection.GetFsError(fs, err)
  349. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  350. return
  351. }
  352. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  353. connection.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  354. sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %#v, it is not a file/symlink", name), http.StatusBadRequest)
  355. return
  356. }
  357. err = connection.RemoveFile(fs, p, name, fi)
  358. if err != nil {
  359. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  360. return
  361. }
  362. sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v deleted", name), http.StatusOK)
  363. }
  364. func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
  365. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  366. connection, err := getUserConnection(w, r)
  367. if err != nil {
  368. return
  369. }
  370. common.Connections.Add(connection)
  371. defer common.Connections.Remove(connection.GetID())
  372. var filesList []string
  373. err = render.DecodeJSON(r.Body, &filesList)
  374. if err != nil {
  375. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  376. return
  377. }
  378. baseDir := "/"
  379. for idx := range filesList {
  380. filesList[idx] = util.CleanPath(filesList[idx])
  381. }
  382. filesList = util.RemoveDuplicates(filesList)
  383. w.Header().Set("Content-Disposition", "attachment; filename=\"sftpgo-download.zip\"")
  384. renderCompressedFiles(w, connection, baseDir, filesList, nil)
  385. }
  386. func getUserPublicKeys(w http.ResponseWriter, r *http.Request) {
  387. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  388. claims, err := getTokenClaims(r)
  389. if err != nil || claims.Username == "" {
  390. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  391. return
  392. }
  393. user, err := dataprovider.UserExists(claims.Username)
  394. if err != nil {
  395. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  396. return
  397. }
  398. render.JSON(w, r, user.PublicKeys)
  399. }
  400. func setUserPublicKeys(w http.ResponseWriter, r *http.Request) {
  401. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  402. claims, err := getTokenClaims(r)
  403. if err != nil || claims.Username == "" {
  404. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  405. return
  406. }
  407. user, err := dataprovider.UserExists(claims.Username)
  408. if err != nil {
  409. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  410. return
  411. }
  412. var publicKeys []string
  413. err = render.DecodeJSON(r.Body, &publicKeys)
  414. if err != nil {
  415. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  416. return
  417. }
  418. user.PublicKeys = publicKeys
  419. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  420. if err != nil {
  421. sendAPIResponse(w, r, err, "", getRespStatus(err))
  422. return
  423. }
  424. sendAPIResponse(w, r, err, "Public keys updated", http.StatusOK)
  425. }
  426. func getUserProfile(w http.ResponseWriter, r *http.Request) {
  427. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  428. claims, err := getTokenClaims(r)
  429. if err != nil || claims.Username == "" {
  430. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  431. return
  432. }
  433. user, err := dataprovider.UserExists(claims.Username)
  434. if err != nil {
  435. sendAPIResponse(w, r, err, "", getRespStatus(err))
  436. return
  437. }
  438. resp := userProfile{
  439. baseProfile: baseProfile{
  440. Email: user.Email,
  441. Description: user.Description,
  442. AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
  443. },
  444. PublicKeys: user.PublicKeys,
  445. }
  446. render.JSON(w, r, resp)
  447. }
  448. func updateUserProfile(w http.ResponseWriter, r *http.Request) {
  449. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  450. claims, err := getTokenClaims(r)
  451. if err != nil || claims.Username == "" {
  452. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  453. return
  454. }
  455. var req userProfile
  456. err = render.DecodeJSON(r.Body, &req)
  457. if err != nil {
  458. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  459. return
  460. }
  461. user, err := dataprovider.UserExists(claims.Username)
  462. if err != nil {
  463. sendAPIResponse(w, r, err, "", getRespStatus(err))
  464. return
  465. }
  466. if !user.CanManagePublicKeys() && !user.CanChangeAPIKeyAuth() && !user.CanChangeInfo() {
  467. sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
  468. return
  469. }
  470. if user.CanManagePublicKeys() {
  471. user.PublicKeys = req.PublicKeys
  472. }
  473. if user.CanChangeAPIKeyAuth() {
  474. user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
  475. }
  476. if user.CanChangeInfo() {
  477. user.Email = req.Email
  478. user.Description = req.Description
  479. }
  480. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  481. sendAPIResponse(w, r, err, "", getRespStatus(err))
  482. return
  483. }
  484. sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
  485. }
  486. func changeUserPassword(w http.ResponseWriter, r *http.Request) {
  487. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  488. var pwd pwdChange
  489. err := render.DecodeJSON(r.Body, &pwd)
  490. if err != nil {
  491. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  492. return
  493. }
  494. err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  495. if err != nil {
  496. sendAPIResponse(w, r, err, "", getRespStatus(err))
  497. return
  498. }
  499. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  500. }
  501. func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  502. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  503. return util.NewValidationError("please provide the current password and the new one two times")
  504. }
  505. if newPassword != confirmNewPassword {
  506. return util.NewValidationError("the two password fields do not match")
  507. }
  508. if currentPassword == newPassword {
  509. return util.NewValidationError("the new password must be different from the current one")
  510. }
  511. claims, err := getTokenClaims(r)
  512. if err != nil || claims.Username == "" {
  513. return errors.New("invalid token claims")
  514. }
  515. user, err := dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
  516. common.ProtocolHTTP)
  517. if err != nil {
  518. return util.NewValidationError("current password does not match")
  519. }
  520. user.Password = newPassword
  521. return dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  522. }
  523. func setModificationTimeFromHeader(r *http.Request, c *Connection, filePath string) {
  524. mTimeString := r.Header.Get(mTimeHeader)
  525. if mTimeString != "" {
  526. // we don't return an error here if we fail to set the modification time
  527. mTime, err := strconv.ParseInt(mTimeString, 10, 64)
  528. if err == nil {
  529. attrs := common.StatAttributes{
  530. Flags: common.StatAttrTimes,
  531. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  532. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  533. }
  534. err = c.SetStat(filePath, &attrs)
  535. c.Log(logger.LevelDebug, "requested modification time %v for file %#v, error: %v",
  536. attrs.Mtime, filePath, err)
  537. } else {
  538. c.Log(logger.LevelInfo, "invalid modification time header was ignored: %v", mTimeString)
  539. }
  540. }
  541. }