api_http_user.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "io"
  20. "mime/multipart"
  21. "net/http"
  22. "os"
  23. "path"
  24. "strconv"
  25. "strings"
  26. "github.com/go-chi/render"
  27. "github.com/rs/xid"
  28. "github.com/drakkan/sftpgo/v2/internal/common"
  29. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  30. "github.com/drakkan/sftpgo/v2/internal/logger"
  31. "github.com/drakkan/sftpgo/v2/internal/util"
  32. )
  33. func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
  34. claims, err := getTokenClaims(r)
  35. if err != nil || claims.Username == "" {
  36. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  37. return nil, fmt.Errorf("invalid token claims %w", err)
  38. }
  39. user, err := dataprovider.GetUserWithGroupSettings(claims.Username, "")
  40. if err != nil {
  41. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  42. return nil, err
  43. }
  44. connID := xid.New().String()
  45. protocol := getProtocolFromRequest(r)
  46. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  47. if err := checkHTTPClientUser(&user, r, connectionID, false, false); err != nil {
  48. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  49. return nil, err
  50. }
  51. baseConn := common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r), r.RemoteAddr, user)
  52. connection := newConnection(baseConn, w, r)
  53. if err = common.Connections.Add(connection); err != nil {
  54. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  55. return connection, err
  56. }
  57. return connection, nil
  58. }
  59. func readUserFolder(w http.ResponseWriter, r *http.Request) {
  60. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  61. connection, err := getUserConnection(w, r)
  62. if err != nil {
  63. return
  64. }
  65. defer common.Connections.Remove(connection.GetID())
  66. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  67. lister, err := connection.ReadDir(name)
  68. if err != nil {
  69. sendAPIResponse(w, r, err, "Unable to get directory lister", getMappedStatusCode(err))
  70. return
  71. }
  72. renderAPIDirContents(w, lister, false)
  73. }
  74. func createUserDir(w http.ResponseWriter, r *http.Request) {
  75. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  76. connection, err := getUserConnection(w, r)
  77. if err != nil {
  78. return
  79. }
  80. defer common.Connections.Remove(connection.GetID())
  81. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  82. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  83. if getBoolQueryParam(r, "mkdir_parents") {
  84. if err = connection.CheckParentDirs(path.Dir(name)); err != nil {
  85. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  86. return
  87. }
  88. }
  89. err = connection.CreateDir(name, true)
  90. if err != nil {
  91. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %q", name), getMappedStatusCode(err))
  92. return
  93. }
  94. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %q created", name), http.StatusCreated)
  95. }
  96. func deleteUserDir(w http.ResponseWriter, r *http.Request) {
  97. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  98. connection, err := getUserConnection(w, r)
  99. if err != nil {
  100. return
  101. }
  102. defer common.Connections.Remove(connection.GetID())
  103. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  104. err = connection.RemoveAll(name)
  105. if err != nil {
  106. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %q", name), getMappedStatusCode(err))
  107. return
  108. }
  109. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %q deleted", name), http.StatusOK)
  110. }
  111. func renameUserFsEntry(w http.ResponseWriter, r *http.Request) {
  112. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  113. connection, err := getUserConnection(w, r)
  114. if err != nil {
  115. return
  116. }
  117. defer common.Connections.Remove(connection.GetID())
  118. oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  119. newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
  120. if !connection.IsSameResource(oldName, newName) {
  121. if err := connection.Copy(oldName, newName); err != nil {
  122. sendAPIResponse(w, r, err, fmt.Sprintf("Cannot perform copy step to rename %q -> %q", oldName, newName),
  123. getMappedStatusCode(err))
  124. return
  125. }
  126. if err := connection.RemoveAll(oldName); err != nil {
  127. sendAPIResponse(w, r, err, fmt.Sprintf("Cannot perform remove step to rename %q -> %q", oldName, newName),
  128. getMappedStatusCode(err))
  129. return
  130. }
  131. } else {
  132. if err := connection.Rename(oldName, newName); err != nil {
  133. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename %q => %q", oldName, newName),
  134. getMappedStatusCode(err))
  135. return
  136. }
  137. }
  138. sendAPIResponse(w, r, nil, fmt.Sprintf("%q renamed to %q", oldName, newName), http.StatusOK)
  139. }
  140. func copyUserFsEntry(w http.ResponseWriter, r *http.Request) {
  141. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  142. connection, err := getUserConnection(w, r)
  143. if err != nil {
  144. return
  145. }
  146. defer common.Connections.Remove(connection.GetID())
  147. source := r.URL.Query().Get("path")
  148. target := r.URL.Query().Get("target")
  149. copyFromSource := strings.HasSuffix(source, "/")
  150. copyInTarget := strings.HasSuffix(target, "/")
  151. source = connection.User.GetCleanedPath(source)
  152. target = connection.User.GetCleanedPath(target)
  153. if copyFromSource {
  154. source += "/"
  155. }
  156. if copyInTarget {
  157. target += "/"
  158. }
  159. err = connection.Copy(source, target)
  160. if err != nil {
  161. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to copy %q => %q", source, target),
  162. getMappedStatusCode(err))
  163. return
  164. }
  165. sendAPIResponse(w, r, nil, fmt.Sprintf("%q copied to %q", source, target), http.StatusOK)
  166. }
  167. func getUserFile(w http.ResponseWriter, r *http.Request) {
  168. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  169. connection, err := getUserConnection(w, r)
  170. if err != nil {
  171. return
  172. }
  173. defer common.Connections.Remove(connection.GetID())
  174. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  175. if name == "/" {
  176. sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
  177. return
  178. }
  179. info, err := connection.Stat(name, 0)
  180. if err != nil {
  181. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  182. return
  183. }
  184. if info.IsDir() {
  185. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %q is a directory", name), http.StatusBadRequest)
  186. return
  187. }
  188. inline := r.URL.Query().Get("inline") != ""
  189. if status, err := downloadFile(w, r, connection, name, info, inline, nil); err != nil {
  190. resp := apiResponse{
  191. Error: err.Error(),
  192. Message: http.StatusText(status),
  193. }
  194. ctx := r.Context()
  195. if status != 0 {
  196. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  197. }
  198. render.JSON(w, r.WithContext(ctx), resp)
  199. }
  200. }
  201. func setFileDirMetadata(w http.ResponseWriter, r *http.Request) {
  202. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  203. metadata := make(map[string]int64)
  204. err := render.DecodeJSON(r.Body, &metadata)
  205. if err != nil {
  206. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  207. return
  208. }
  209. mTime, ok := metadata["modification_time"]
  210. if !ok || !r.URL.Query().Has("path") {
  211. sendAPIResponse(w, r, errors.New("please set a modification_time and a path"), "", http.StatusBadRequest)
  212. return
  213. }
  214. connection, err := getUserConnection(w, r)
  215. if err != nil {
  216. return
  217. }
  218. defer common.Connections.Remove(connection.GetID())
  219. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  220. attrs := common.StatAttributes{
  221. Flags: common.StatAttrTimes,
  222. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  223. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  224. }
  225. err = connection.SetStat(name, &attrs)
  226. if err != nil {
  227. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to set metadata for path %q", name), getMappedStatusCode(err))
  228. return
  229. }
  230. sendAPIResponse(w, r, nil, "OK", http.StatusOK)
  231. }
  232. func uploadUserFile(w http.ResponseWriter, r *http.Request) {
  233. if maxUploadFileSize > 0 {
  234. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  235. }
  236. if !r.URL.Query().Has("path") {
  237. sendAPIResponse(w, r, errors.New("please set a file path"), "", http.StatusBadRequest)
  238. return
  239. }
  240. connection, err := getUserConnection(w, r)
  241. if err != nil {
  242. return
  243. }
  244. defer common.Connections.Remove(connection.GetID())
  245. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  246. filePath := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  247. if getBoolQueryParam(r, "mkdir_parents") {
  248. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  249. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  250. return
  251. }
  252. }
  253. doUploadFile(w, r, connection, filePath) //nolint:errcheck
  254. }
  255. func doUploadFile(w http.ResponseWriter, r *http.Request, connection *Connection, filePath string) error {
  256. writer, err := connection.getFileWriter(filePath)
  257. if err != nil {
  258. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %q", filePath), getMappedStatusCode(err))
  259. return err
  260. }
  261. _, err = io.Copy(writer, r.Body)
  262. if err != nil {
  263. writer.Close() //nolint:errcheck
  264. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %q", filePath), getMappedStatusCode(err))
  265. return err
  266. }
  267. err = writer.Close()
  268. if err != nil {
  269. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %q", filePath), getMappedStatusCode(err))
  270. return err
  271. }
  272. setModificationTimeFromHeader(r, connection, filePath)
  273. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  274. return nil
  275. }
  276. func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
  277. if maxUploadFileSize > 0 {
  278. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  279. }
  280. connection, err := getUserConnection(w, r)
  281. if err != nil {
  282. return
  283. }
  284. defer common.Connections.Remove(connection.GetID())
  285. if err := common.Connections.IsNewTransferAllowed(connection.User.Username); err != nil {
  286. connection.Log(logger.LevelInfo, "denying file write due to number of transfer limits")
  287. sendAPIResponse(w, r, err, "Denying file write due to transfer count limits",
  288. http.StatusConflict)
  289. return
  290. }
  291. transferQuota := connection.GetTransferQuota()
  292. if !transferQuota.HasUploadSpace() {
  293. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  294. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  295. http.StatusRequestEntityTooLarge)
  296. return
  297. }
  298. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  299. r.Body = t
  300. err = r.ParseMultipartForm(maxMultipartMem)
  301. if err != nil {
  302. connection.RemoveTransfer(t)
  303. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  304. return
  305. }
  306. connection.RemoveTransfer(t)
  307. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  308. parentDir := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  309. files := r.MultipartForm.File["filenames"]
  310. if len(files) == 0 {
  311. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  312. return
  313. }
  314. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  315. if getBoolQueryParam(r, "mkdir_parents") {
  316. if err = connection.CheckParentDirs(parentDir); err != nil {
  317. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  318. return
  319. }
  320. }
  321. doUploadFiles(w, r, connection, parentDir, files)
  322. }
  323. func doUploadFiles(w http.ResponseWriter, r *http.Request, connection *Connection, parentDir string,
  324. files []*multipart.FileHeader,
  325. ) int {
  326. uploaded := 0
  327. connection.User.UploadBandwidth = 0
  328. for _, f := range files {
  329. file, err := f.Open()
  330. if err != nil {
  331. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %q", f.Filename), getMappedStatusCode(err))
  332. return uploaded
  333. }
  334. defer file.Close()
  335. filePath := path.Join(parentDir, path.Base(util.CleanPath(f.Filename)))
  336. writer, err := connection.getFileWriter(filePath)
  337. if err != nil {
  338. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %q", f.Filename), getMappedStatusCode(err))
  339. return uploaded
  340. }
  341. _, err = io.Copy(writer, file)
  342. if err != nil {
  343. writer.Close() //nolint:errcheck
  344. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %q", f.Filename), getMappedStatusCode(err))
  345. return uploaded
  346. }
  347. err = writer.Close()
  348. if err != nil {
  349. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %q", f.Filename), getMappedStatusCode(err))
  350. return uploaded
  351. }
  352. uploaded++
  353. }
  354. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  355. return uploaded
  356. }
  357. func deleteUserFile(w http.ResponseWriter, r *http.Request) {
  358. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  359. connection, err := getUserConnection(w, r)
  360. if err != nil {
  361. return
  362. }
  363. defer common.Connections.Remove(connection.GetID())
  364. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  365. fs, p, err := connection.GetFsAndResolvedPath(name)
  366. if err != nil {
  367. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  368. return
  369. }
  370. var fi os.FileInfo
  371. if fi, err = fs.Lstat(p); err != nil {
  372. connection.Log(logger.LevelError, "failed to remove file %q: stat error: %+v", p, err)
  373. err = connection.GetFsError(fs, err)
  374. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  375. return
  376. }
  377. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  378. connection.Log(logger.LevelDebug, "cannot remove %q is not a file/symlink", p)
  379. sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %q, it is not a file/symlink", name), http.StatusBadRequest)
  380. return
  381. }
  382. err = connection.RemoveFile(fs, p, name, fi)
  383. if err != nil {
  384. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %q", name), getMappedStatusCode(err))
  385. return
  386. }
  387. sendAPIResponse(w, r, nil, fmt.Sprintf("File %q deleted", name), http.StatusOK)
  388. }
  389. func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
  390. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  391. connection, err := getUserConnection(w, r)
  392. if err != nil {
  393. return
  394. }
  395. defer common.Connections.Remove(connection.GetID())
  396. var filesList []string
  397. err = render.DecodeJSON(r.Body, &filesList)
  398. if err != nil {
  399. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  400. return
  401. }
  402. baseDir := "/"
  403. for idx := range filesList {
  404. filesList[idx] = util.CleanPath(filesList[idx])
  405. }
  406. filesList = util.RemoveDuplicates(filesList, false)
  407. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
  408. getCompressedFileName(connection.GetUsername(), filesList)))
  409. renderCompressedFiles(w, connection, baseDir, filesList, nil)
  410. }
  411. func getUserProfile(w http.ResponseWriter, r *http.Request) {
  412. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  413. claims, err := getTokenClaims(r)
  414. if err != nil || claims.Username == "" {
  415. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  416. return
  417. }
  418. user, err := dataprovider.UserExists(claims.Username, "")
  419. if err != nil {
  420. sendAPIResponse(w, r, err, "", getRespStatus(err))
  421. return
  422. }
  423. resp := userProfile{
  424. baseProfile: baseProfile{
  425. Email: user.Email,
  426. Description: user.Description,
  427. AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
  428. },
  429. AdditionalEmails: user.Filters.AdditionalEmails,
  430. PublicKeys: user.PublicKeys,
  431. TLSCerts: user.Filters.TLSCerts,
  432. }
  433. render.JSON(w, r, resp)
  434. }
  435. func updateUserProfile(w http.ResponseWriter, r *http.Request) {
  436. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  437. claims, err := getTokenClaims(r)
  438. if err != nil || claims.Username == "" {
  439. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  440. return
  441. }
  442. var req userProfile
  443. err = render.DecodeJSON(r.Body, &req)
  444. if err != nil {
  445. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  446. return
  447. }
  448. user, userMerged, err := dataprovider.GetUserVariants(claims.Username, "")
  449. if err != nil {
  450. sendAPIResponse(w, r, err, "", getRespStatus(err))
  451. return
  452. }
  453. if !userMerged.CanUpdateProfile() {
  454. sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
  455. return
  456. }
  457. if userMerged.CanManagePublicKeys() {
  458. user.PublicKeys = req.PublicKeys
  459. }
  460. if userMerged.CanManageTLSCerts() {
  461. user.Filters.TLSCerts = req.TLSCerts
  462. }
  463. if userMerged.CanChangeAPIKeyAuth() {
  464. user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
  465. }
  466. if userMerged.CanChangeInfo() {
  467. user.Email = req.Email
  468. user.Filters.AdditionalEmails = req.AdditionalEmails
  469. user.Description = req.Description
  470. }
  471. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), user.Role); err != nil {
  472. sendAPIResponse(w, r, err, "", getRespStatus(err))
  473. return
  474. }
  475. sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
  476. }
  477. func changeUserPassword(w http.ResponseWriter, r *http.Request) {
  478. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  479. var pwd pwdChange
  480. err := render.DecodeJSON(r.Body, &pwd)
  481. if err != nil {
  482. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  483. return
  484. }
  485. err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  486. if err != nil {
  487. sendAPIResponse(w, r, err, "", getRespStatus(err))
  488. return
  489. }
  490. invalidateToken(r)
  491. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  492. }
  493. func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  494. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  495. return util.NewI18nError(
  496. util.NewValidationError("please provide the current password and the new one two times"),
  497. util.I18nErrorChangePwdRequiredFields,
  498. )
  499. }
  500. if newPassword != confirmNewPassword {
  501. return util.NewI18nError(util.NewValidationError("the two password fields do not match"), util.I18nErrorChangePwdNoMatch)
  502. }
  503. if currentPassword == newPassword {
  504. return util.NewI18nError(
  505. util.NewValidationError("the new password must be different from the current one"),
  506. util.I18nErrorChangePwdNoDifferent,
  507. )
  508. }
  509. claims, err := getTokenClaims(r)
  510. if err != nil || claims.Username == "" {
  511. return util.NewI18nError(errInvalidTokenClaims, util.I18nErrorInvalidToken)
  512. }
  513. _, err = dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
  514. getProtocolFromRequest(r))
  515. if err != nil {
  516. return util.NewI18nError(util.NewValidationError("current password does not match"), util.I18nErrorChangePwdCurrentNoMatch)
  517. }
  518. return dataprovider.UpdateUserPassword(claims.Username, newPassword, dataprovider.ActionExecutorSelf,
  519. util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  520. }
  521. func setModificationTimeFromHeader(r *http.Request, c *Connection, filePath string) {
  522. mTimeString := r.Header.Get(mTimeHeader)
  523. if mTimeString != "" {
  524. // we don't return an error here if we fail to set the modification time
  525. mTime, err := strconv.ParseInt(mTimeString, 10, 64)
  526. if err == nil {
  527. attrs := common.StatAttributes{
  528. Flags: common.StatAttrTimes,
  529. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  530. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  531. }
  532. err = c.SetStat(filePath, &attrs)
  533. c.Log(logger.LevelDebug, "requested modification time %v for file %q, error: %v",
  534. attrs.Mtime, filePath, err)
  535. } else {
  536. c.Log(logger.LevelInfo, "invalid modification time header was ignored: %v", mTimeString)
  537. }
  538. }
  539. }