api_shares.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "net/http"
  20. "net/url"
  21. "os"
  22. "path"
  23. "slices"
  24. "strings"
  25. "time"
  26. "github.com/go-chi/jwtauth/v5"
  27. "github.com/go-chi/render"
  28. "github.com/rs/xid"
  29. "github.com/sftpgo/sdk"
  30. "github.com/drakkan/sftpgo/v2/internal/common"
  31. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  32. "github.com/drakkan/sftpgo/v2/internal/logger"
  33. "github.com/drakkan/sftpgo/v2/internal/util"
  34. )
  35. func getShares(w http.ResponseWriter, r *http.Request) {
  36. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  37. claims, err := getTokenClaims(r)
  38. if err != nil || claims.Username == "" {
  39. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  40. return
  41. }
  42. limit, offset, order, err := getSearchFilters(w, r)
  43. if err != nil {
  44. return
  45. }
  46. shares, err := dataprovider.GetShares(limit, offset, order, claims.Username)
  47. if err != nil {
  48. sendAPIResponse(w, r, err, "", getRespStatus(err))
  49. return
  50. }
  51. render.JSON(w, r, shares)
  52. }
  53. func getShareByID(w http.ResponseWriter, r *http.Request) {
  54. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  55. claims, err := getTokenClaims(r)
  56. if err != nil || claims.Username == "" {
  57. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  58. return
  59. }
  60. shareID := getURLParam(r, "id")
  61. share, err := dataprovider.ShareExists(shareID, claims.Username)
  62. if err != nil {
  63. sendAPIResponse(w, r, err, "", getRespStatus(err))
  64. return
  65. }
  66. share.HideConfidentialData()
  67. render.JSON(w, r, share)
  68. }
  69. func addShare(w http.ResponseWriter, r *http.Request) {
  70. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  71. claims, err := getTokenClaims(r)
  72. if err != nil || claims.Username == "" {
  73. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  74. return
  75. }
  76. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  77. if err != nil {
  78. sendAPIResponse(w, r, err, "Unable to retrieve your user", getRespStatus(err))
  79. return
  80. }
  81. var share dataprovider.Share
  82. if user.Filters.DefaultSharesExpiration > 0 {
  83. share.ExpiresAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(24 * time.Hour * time.Duration(user.Filters.DefaultSharesExpiration)))
  84. }
  85. err = render.DecodeJSON(r.Body, &share)
  86. if err != nil {
  87. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  88. return
  89. }
  90. if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(share.ExpiresAt)); err != nil {
  91. sendAPIResponse(w, r, err, "", getRespStatus(err))
  92. return
  93. }
  94. share.ID = 0
  95. share.ShareID = util.GenerateUniqueID()
  96. share.LastUseAt = 0
  97. share.Username = claims.Username
  98. if share.Name == "" {
  99. share.Name = share.ShareID
  100. }
  101. if share.Password == "" {
  102. if slices.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
  103. sendAPIResponse(w, r, nil, "You are not authorized to share files/folders without a password",
  104. http.StatusForbidden)
  105. return
  106. }
  107. }
  108. err = dataprovider.AddShare(&share, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  109. if err != nil {
  110. sendAPIResponse(w, r, err, "", getRespStatus(err))
  111. return
  112. }
  113. w.Header().Add("Location", fmt.Sprintf("%s/%s", userSharesPath, url.PathEscape(share.ShareID)))
  114. w.Header().Add("X-Object-ID", share.ShareID)
  115. sendAPIResponse(w, r, nil, "Share created", http.StatusCreated)
  116. }
  117. func updateShare(w http.ResponseWriter, r *http.Request) {
  118. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  119. claims, err := getTokenClaims(r)
  120. if err != nil || claims.Username == "" {
  121. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  122. return
  123. }
  124. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  125. if err != nil {
  126. sendAPIResponse(w, r, err, "Unable to retrieve your user", getRespStatus(err))
  127. return
  128. }
  129. shareID := getURLParam(r, "id")
  130. share, err := dataprovider.ShareExists(shareID, claims.Username)
  131. if err != nil {
  132. sendAPIResponse(w, r, err, "", getRespStatus(err))
  133. return
  134. }
  135. var updatedShare dataprovider.Share
  136. err = render.DecodeJSON(r.Body, &updatedShare)
  137. if err != nil {
  138. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  139. return
  140. }
  141. updatedShare.ShareID = shareID
  142. updatedShare.Username = claims.Username
  143. if updatedShare.Password == redactedSecret {
  144. updatedShare.Password = share.Password
  145. }
  146. if updatedShare.Password == "" {
  147. if slices.Contains(claims.Permissions, sdk.WebClientShareNoPasswordDisabled) {
  148. sendAPIResponse(w, r, nil, "You are not authorized to share files/folders without a password",
  149. http.StatusForbidden)
  150. return
  151. }
  152. }
  153. if err := user.CheckMaxShareExpiration(util.GetTimeFromMsecSinceEpoch(updatedShare.ExpiresAt)); err != nil {
  154. sendAPIResponse(w, r, err, "", getRespStatus(err))
  155. return
  156. }
  157. err = dataprovider.UpdateShare(&updatedShare, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  158. if err != nil {
  159. sendAPIResponse(w, r, err, "", getRespStatus(err))
  160. return
  161. }
  162. sendAPIResponse(w, r, nil, "Share updated", http.StatusOK)
  163. }
  164. func deleteShare(w http.ResponseWriter, r *http.Request) {
  165. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  166. shareID := getURLParam(r, "id")
  167. claims, err := getTokenClaims(r)
  168. if err != nil || claims.Username == "" {
  169. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  170. return
  171. }
  172. err = dataprovider.DeleteShare(shareID, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  173. if err != nil {
  174. sendAPIResponse(w, r, err, "", getRespStatus(err))
  175. return
  176. }
  177. sendAPIResponse(w, r, err, "Share deleted", http.StatusOK)
  178. }
  179. func (s *httpdServer) readBrowsableShareContents(w http.ResponseWriter, r *http.Request) {
  180. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  181. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  182. share, connection, err := s.checkPublicShare(w, r, validScopes)
  183. if err != nil {
  184. return
  185. }
  186. if err := validateBrowsableShare(share, connection); err != nil {
  187. sendAPIResponse(w, r, err, "", getRespStatus(err))
  188. return
  189. }
  190. name, err := getBrowsableSharedPath(share.Paths[0], r)
  191. if err != nil {
  192. sendAPIResponse(w, r, err, "", getRespStatus(err))
  193. return
  194. }
  195. if err = common.Connections.Add(connection); err != nil {
  196. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  197. return
  198. }
  199. defer common.Connections.Remove(connection.GetID())
  200. lister, err := connection.ReadDir(name)
  201. if err != nil {
  202. sendAPIResponse(w, r, err, "Unable to get directory lister", getMappedStatusCode(err))
  203. return
  204. }
  205. renderAPIDirContents(w, lister, true)
  206. }
  207. func (s *httpdServer) downloadBrowsableSharedFile(w http.ResponseWriter, r *http.Request) {
  208. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  209. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  210. share, connection, err := s.checkPublicShare(w, r, validScopes)
  211. if err != nil {
  212. return
  213. }
  214. if err := validateBrowsableShare(share, connection); err != nil {
  215. sendAPIResponse(w, r, err, "", getRespStatus(err))
  216. return
  217. }
  218. name, err := getBrowsableSharedPath(share.Paths[0], r)
  219. if err != nil {
  220. sendAPIResponse(w, r, err, "", getRespStatus(err))
  221. return
  222. }
  223. if err = common.Connections.Add(connection); err != nil {
  224. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  225. return
  226. }
  227. defer common.Connections.Remove(connection.GetID())
  228. info, err := connection.Stat(name, 1)
  229. if err != nil {
  230. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  231. return
  232. }
  233. if info.IsDir() {
  234. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %q is a directory", name),
  235. http.StatusBadRequest)
  236. return
  237. }
  238. inline := r.URL.Query().Get("inline") != ""
  239. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  240. if status, err := downloadFile(w, r, connection, name, info, inline, &share); err != nil {
  241. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  242. resp := apiResponse{
  243. Error: err.Error(),
  244. Message: http.StatusText(status),
  245. }
  246. ctx := r.Context()
  247. if status != 0 {
  248. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  249. }
  250. render.JSON(w, r.WithContext(ctx), resp)
  251. }
  252. }
  253. func (s *httpdServer) downloadFromShare(w http.ResponseWriter, r *http.Request) {
  254. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  255. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeRead, dataprovider.ShareScopeReadWrite}
  256. share, connection, err := s.checkPublicShare(w, r, validScopes)
  257. if err != nil {
  258. return
  259. }
  260. if err = common.Connections.Add(connection); err != nil {
  261. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  262. return
  263. }
  264. defer common.Connections.Remove(connection.GetID())
  265. compress := true
  266. var info os.FileInfo
  267. if len(share.Paths) == 1 {
  268. info, err = connection.Stat(share.Paths[0], 1)
  269. if err != nil {
  270. sendAPIResponse(w, r, err, "", getRespStatus(err))
  271. return
  272. }
  273. if info.Mode().IsRegular() && r.URL.Query().Get("compress") == "false" {
  274. compress = false
  275. }
  276. }
  277. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  278. if compress {
  279. transferQuota := connection.GetTransferQuota()
  280. if !transferQuota.HasDownloadSpace() {
  281. err = connection.GetReadQuotaExceededError()
  282. connection.Log(logger.LevelInfo, "denying share read due to quota limits")
  283. sendAPIResponse(w, r, err, "", getMappedStatusCode(err))
  284. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  285. return
  286. }
  287. baseDir := "/"
  288. if info != nil && info.IsDir() {
  289. baseDir = share.Paths[0]
  290. share.Paths[0] = "/"
  291. }
  292. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"share-%v.zip\"", share.Name))
  293. renderCompressedFiles(w, connection, baseDir, share.Paths, &share)
  294. return
  295. }
  296. if status, err := downloadFile(w, r, connection, share.Paths[0], info, false, &share); err != nil {
  297. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  298. resp := apiResponse{
  299. Error: err.Error(),
  300. Message: http.StatusText(status),
  301. }
  302. ctx := r.Context()
  303. if status != 0 {
  304. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  305. }
  306. render.JSON(w, r.WithContext(ctx), resp)
  307. }
  308. }
  309. func (s *httpdServer) uploadFileToShare(w http.ResponseWriter, r *http.Request) {
  310. if maxUploadFileSize > 0 {
  311. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  312. }
  313. name := getURLParam(r, "name")
  314. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeWrite, dataprovider.ShareScopeReadWrite}
  315. share, connection, err := s.checkPublicShare(w, r, validScopes)
  316. if err != nil {
  317. return
  318. }
  319. filePath := util.CleanPath(path.Join(share.Paths[0], name))
  320. expectedPrefix := share.Paths[0]
  321. if !strings.HasSuffix(expectedPrefix, "/") {
  322. expectedPrefix += "/"
  323. }
  324. if !strings.HasPrefix(filePath, expectedPrefix) {
  325. sendAPIResponse(w, r, err, "Uploading outside the share is not allowed", http.StatusForbidden)
  326. return
  327. }
  328. dataprovider.UpdateShareLastUse(&share, 1) //nolint:errcheck
  329. if err = common.Connections.Add(connection); err != nil {
  330. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  331. return
  332. }
  333. defer common.Connections.Remove(connection.GetID())
  334. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  335. if getBoolQueryParam(r, "mkdir_parents") {
  336. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  337. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  338. return
  339. }
  340. }
  341. if err := doUploadFile(w, r, connection, filePath); err != nil {
  342. dataprovider.UpdateShareLastUse(&share, -1) //nolint:errcheck
  343. }
  344. }
  345. func (s *httpdServer) uploadFilesToShare(w http.ResponseWriter, r *http.Request) {
  346. if maxUploadFileSize > 0 {
  347. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  348. }
  349. validScopes := []dataprovider.ShareScope{dataprovider.ShareScopeWrite, dataprovider.ShareScopeReadWrite}
  350. share, connection, err := s.checkPublicShare(w, r, validScopes)
  351. if err != nil {
  352. return
  353. }
  354. if err := common.Connections.IsNewTransferAllowed(connection.User.Username); err != nil {
  355. connection.Log(logger.LevelInfo, "denying file write due to number of transfer limits")
  356. sendAPIResponse(w, r, err, "Denying file write due to transfer count limits",
  357. http.StatusConflict)
  358. return
  359. }
  360. transferQuota := connection.GetTransferQuota()
  361. if !transferQuota.HasUploadSpace() {
  362. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  363. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  364. http.StatusRequestEntityTooLarge)
  365. return
  366. }
  367. if err = common.Connections.Add(connection); err != nil {
  368. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  369. return
  370. }
  371. defer common.Connections.Remove(connection.GetID())
  372. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  373. r.Body = t
  374. err = r.ParseMultipartForm(maxMultipartMem)
  375. if err != nil {
  376. connection.RemoveTransfer(t)
  377. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  378. return
  379. }
  380. connection.RemoveTransfer(t)
  381. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  382. files := r.MultipartForm.File["filenames"]
  383. if len(files) == 0 {
  384. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  385. return
  386. }
  387. if share.MaxTokens > 0 {
  388. if len(files) > (share.MaxTokens - share.UsedTokens) {
  389. sendAPIResponse(w, r, nil, "Allowed usage exceeded", http.StatusBadRequest)
  390. return
  391. }
  392. }
  393. dataprovider.UpdateShareLastUse(&share, len(files)) //nolint:errcheck
  394. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  395. numUploads := doUploadFiles(w, r, connection, share.Paths[0], files)
  396. if numUploads != len(files) {
  397. dataprovider.UpdateShareLastUse(&share, numUploads-len(files)) //nolint:errcheck
  398. }
  399. }
  400. func (s *httpdServer) getShareClaims(r *http.Request, shareID string) (*jwtTokenClaims, error) {
  401. token, err := jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  402. if err != nil || token == nil {
  403. return nil, errInvalidToken
  404. }
  405. tokenString := jwtauth.TokenFromCookie(r)
  406. if tokenString == "" || invalidatedJWTTokens.Get(tokenString) {
  407. return nil, errInvalidToken
  408. }
  409. if !slices.Contains(token.Audience(), tokenAudienceWebShare) {
  410. logger.Debug(logSender, "", "invalid token audience for share %q", shareID)
  411. return nil, errInvalidToken
  412. }
  413. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  414. if err := validateIPForToken(token, ipAddr); err != nil {
  415. logger.Debug(logSender, "", "token for share %q is not valid for the ip address %q", shareID, ipAddr)
  416. return nil, err
  417. }
  418. ctx := jwtauth.NewContext(r.Context(), token, nil)
  419. claims, err := getTokenClaims(r.WithContext(ctx))
  420. if err != nil || claims.Username != shareID {
  421. logger.Debug(logSender, "", "token not valid for share %q", shareID)
  422. return nil, errInvalidToken
  423. }
  424. return &claims, nil
  425. }
  426. func (s *httpdServer) checkWebClientShareCredentials(w http.ResponseWriter, r *http.Request, share *dataprovider.Share) error {
  427. doRedirect := func() {
  428. redirectURL := path.Join(webClientPubSharesPath, share.ShareID, fmt.Sprintf("login?next=%s", url.QueryEscape(r.RequestURI)))
  429. http.Redirect(w, r, redirectURL, http.StatusFound)
  430. }
  431. if _, err := s.getShareClaims(r, share.ShareID); err != nil {
  432. doRedirect()
  433. return err
  434. }
  435. return nil
  436. }
  437. func (s *httpdServer) checkPublicShare(w http.ResponseWriter, r *http.Request, validScopes []dataprovider.ShareScope,
  438. ) (dataprovider.Share, *Connection, error) {
  439. isWebClient := isWebClientRequest(r)
  440. renderError := func(err error, message string, statusCode int) {
  441. if isWebClient {
  442. s.renderClientMessagePage(w, r, util.I18nShareAccessErrorTitle, statusCode, err, message)
  443. } else {
  444. sendAPIResponse(w, r, err, message, statusCode)
  445. }
  446. }
  447. shareID := getURLParam(r, "id")
  448. share, err := dataprovider.ShareExists(shareID, "")
  449. if err != nil {
  450. statusCode := getRespStatus(err)
  451. if statusCode == http.StatusNotFound {
  452. err = util.NewI18nError(errors.New("share does not exist"), util.I18nError404Message)
  453. }
  454. renderError(err, "", statusCode)
  455. return share, nil, err
  456. }
  457. if !slices.Contains(validScopes, share.Scope) {
  458. err := errors.New("invalid share scope")
  459. renderError(util.NewI18nError(err, util.I18nErrorShareScope), "", http.StatusForbidden)
  460. return share, nil, err
  461. }
  462. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  463. ok, err := share.IsUsable(ipAddr)
  464. if !ok || err != nil {
  465. renderError(err, "", getRespStatus(err))
  466. return share, nil, err
  467. }
  468. if share.Password != "" {
  469. if isWebClient {
  470. if err := s.checkWebClientShareCredentials(w, r, &share); err != nil {
  471. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  472. return share, nil, dataprovider.ErrInvalidCredentials
  473. }
  474. } else {
  475. _, password, ok := r.BasicAuth()
  476. if !ok {
  477. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  478. renderError(dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  479. return share, nil, dataprovider.ErrInvalidCredentials
  480. }
  481. match, err := share.CheckCredentials(password)
  482. if !match || err != nil {
  483. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  484. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  485. renderError(dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  486. return share, nil, dataprovider.ErrInvalidCredentials
  487. }
  488. }
  489. common.DelayLogin(nil)
  490. }
  491. user, err := getUserForShare(share)
  492. if err != nil {
  493. renderError(err, "", getRespStatus(err))
  494. return share, nil, err
  495. }
  496. connID := xid.New().String()
  497. connection := &Connection{
  498. BaseConnection: common.NewBaseConnection(connID, common.ProtocolHTTPShare, util.GetHTTPLocalAddress(r),
  499. r.RemoteAddr, user),
  500. request: r,
  501. }
  502. return share, connection, nil
  503. }
  504. func getUserForShare(share dataprovider.Share) (dataprovider.User, error) {
  505. user, err := dataprovider.GetUserWithGroupSettings(share.Username, "")
  506. if err != nil {
  507. return user, err
  508. }
  509. if !user.CanManageShares() {
  510. return user, util.NewI18nError(util.NewRecordNotFoundError("this share does not exist"), util.I18nError404Message)
  511. }
  512. if share.Password == "" && slices.Contains(user.Filters.WebClient, sdk.WebClientShareNoPasswordDisabled) {
  513. return user, util.NewI18nError(
  514. fmt.Errorf("sharing without a password was disabled: %w", os.ErrPermission),
  515. util.I18nError403Message,
  516. )
  517. }
  518. if user.MustSetSecondFactorForProtocol(common.ProtocolHTTP) {
  519. return user, util.NewI18nError(
  520. util.NewMethodDisabledError("two-factor authentication requirements not met"),
  521. util.I18nError403Message,
  522. )
  523. }
  524. return user, nil
  525. }
  526. func validateBrowsableShare(share dataprovider.Share, connection *Connection) error {
  527. if len(share.Paths) != 1 {
  528. return util.NewI18nError(
  529. util.NewValidationError("a share with multiple paths is not browsable"),
  530. util.I18nErrorShareBrowsePaths,
  531. )
  532. }
  533. basePath := share.Paths[0]
  534. info, err := connection.Stat(basePath, 0)
  535. if err != nil {
  536. return util.NewI18nError(
  537. fmt.Errorf("unable to check the share directory: %w", err),
  538. util.I18nErrorShareInvalidPath,
  539. )
  540. }
  541. if !info.IsDir() {
  542. return util.NewI18nError(
  543. util.NewValidationError("the shared object is not a directory and so it is not browsable"),
  544. util.I18nErrorShareBrowseNoDir,
  545. )
  546. }
  547. return nil
  548. }
  549. func getBrowsableSharedPath(shareBasePath string, r *http.Request) (string, error) {
  550. name := util.CleanPath(path.Join(shareBasePath, r.URL.Query().Get("path")))
  551. if shareBasePath == "/" {
  552. return name, nil
  553. }
  554. if name != shareBasePath && !strings.HasPrefix(name, shareBasePath+"/") {
  555. return "", util.NewI18nError(
  556. util.NewValidationError(fmt.Sprintf("Invalid path %q", r.URL.Query().Get("path"))),
  557. util.I18nErrorPathInvalid,
  558. )
  559. }
  560. return name, nil
  561. }