| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680 |
- package httpd
- import (
- "errors"
- "fmt"
- "html/template"
- "io"
- "net/http"
- "net/url"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- "github.com/go-chi/render"
- "github.com/drakkan/sftpgo/v2/common"
- "github.com/drakkan/sftpgo/v2/dataprovider"
- "github.com/drakkan/sftpgo/v2/kms"
- "github.com/drakkan/sftpgo/v2/sdk"
- "github.com/drakkan/sftpgo/v2/util"
- "github.com/drakkan/sftpgo/v2/version"
- "github.com/drakkan/sftpgo/v2/vfs"
- )
- type userPageMode int
- const (
- userPageModeAdd userPageMode = iota + 1
- userPageModeUpdate
- userPageModeTemplate
- )
- type folderPageMode int
- const (
- folderPageModeAdd folderPageMode = iota + 1
- folderPageModeUpdate
- folderPageModeTemplate
- )
- const (
- templateAdminDir = "webadmin"
- templateBase = "base.html"
- templateFsConfig = "fsconfig.html"
- templateUsers = "users.html"
- templateUser = "user.html"
- templateAdmins = "admins.html"
- templateAdmin = "admin.html"
- templateConnections = "connections.html"
- templateFolders = "folders.html"
- templateFolder = "folder.html"
- templateMessage = "message.html"
- templateStatus = "status.html"
- templateLogin = "login.html"
- templateDefender = "defender.html"
- templateCredentials = "credentials.html"
- templateMaintenance = "maintenance.html"
- templateSetup = "adminsetup.html"
- pageUsersTitle = "Users"
- pageAdminsTitle = "Admins"
- pageConnectionsTitle = "Connections"
- pageStatusTitle = "Status"
- pageFoldersTitle = "Folders"
- pageCredentialsTitle = "Manage credentials"
- pageMaintenanceTitle = "Maintenance"
- pageDefenderTitle = "Defender"
- pageSetupTitle = "Create first admin user"
- defaultQueryLimit = 500
- )
- var (
- adminTemplates = make(map[string]*template.Template)
- )
- type basePage struct {
- Title string
- CurrentURL string
- UsersURL string
- UserURL string
- UserTemplateURL string
- AdminsURL string
- AdminURL string
- QuotaScanURL string
- ConnectionsURL string
- FoldersURL string
- FolderURL string
- FolderTemplateURL string
- DefenderURL string
- LogoutURL string
- CredentialsURL string
- FolderQuotaScanURL string
- StatusURL string
- MaintenanceURL string
- StaticURL string
- UsersTitle string
- AdminsTitle string
- ConnectionsTitle string
- FoldersTitle string
- StatusTitle string
- MaintenanceTitle string
- DefenderTitle string
- Version string
- CSRFToken string
- HasDefender bool
- LoggedAdmin *dataprovider.Admin
- }
- type usersPage struct {
- basePage
- Users []dataprovider.User
- }
- type adminsPage struct {
- basePage
- Admins []dataprovider.Admin
- }
- type foldersPage struct {
- basePage
- Folders []vfs.BaseVirtualFolder
- }
- type connectionsPage struct {
- basePage
- Connections []*common.ConnectionStatus
- }
- type statusPage struct {
- basePage
- Status ServicesStatus
- }
- type userPage struct {
- basePage
- User *dataprovider.User
- RootPerms []string
- Error string
- ValidPerms []string
- ValidLoginMethods []string
- ValidProtocols []string
- WebClientOptions []string
- RootDirPerms []string
- RedactedSecret string
- Mode userPageMode
- VirtualFolders []vfs.BaseVirtualFolder
- }
- type adminPage struct {
- basePage
- Admin *dataprovider.Admin
- Error string
- IsAdd bool
- }
- type credentialsPage struct {
- basePage
- Error string
- AllowAPIKeyAuth bool
- ChangePwdURL string
- ManageAPIKeyURL string
- APIKeyError string
- }
- type maintenancePage struct {
- basePage
- BackupPath string
- RestorePath string
- Error string
- }
- type defenderHostsPage struct {
- basePage
- DefenderHostsURL string
- }
- type setupPage struct {
- basePage
- Username string
- Error string
- }
- type folderPage struct {
- basePage
- Folder vfs.BaseVirtualFolder
- Error string
- Mode folderPageMode
- }
- type messagePage struct {
- basePage
- Error string
- Success string
- }
- type userTemplateFields struct {
- Username string
- Password string
- PublicKey string
- }
- func loadAdminTemplates(templatesPath string) {
- usersPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateUsers),
- }
- userPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateFsConfig),
- filepath.Join(templatesPath, templateAdminDir, templateUser),
- }
- adminsPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateAdmins),
- }
- adminPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateAdmin),
- }
- credentialsPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateCredentials),
- }
- connectionsPaths := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateConnections),
- }
- messagePath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateMessage),
- }
- foldersPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateFolders),
- }
- folderPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateFsConfig),
- filepath.Join(templatesPath, templateAdminDir, templateFolder),
- }
- statusPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateStatus),
- }
- loginPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateLogin),
- }
- maintenancePath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateMaintenance),
- }
- defenderPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateBase),
- filepath.Join(templatesPath, templateAdminDir, templateDefender),
- }
- setupPath := []string{
- filepath.Join(templatesPath, templateAdminDir, templateSetup),
- }
- rootTpl := template.New("").Funcs(template.FuncMap{
- "ListFSProviders": sdk.ListProviders,
- })
- usersTmpl := util.LoadTemplate(rootTpl, usersPaths...)
- userTmpl := util.LoadTemplate(rootTpl, userPaths...)
- adminsTmpl := util.LoadTemplate(rootTpl, adminsPaths...)
- adminTmpl := util.LoadTemplate(rootTpl, adminPaths...)
- connectionsTmpl := util.LoadTemplate(rootTpl, connectionsPaths...)
- messageTmpl := util.LoadTemplate(rootTpl, messagePath...)
- foldersTmpl := util.LoadTemplate(rootTpl, foldersPath...)
- folderTmpl := util.LoadTemplate(rootTpl, folderPath...)
- statusTmpl := util.LoadTemplate(rootTpl, statusPath...)
- loginTmpl := util.LoadTemplate(rootTpl, loginPath...)
- credentialsTmpl := util.LoadTemplate(rootTpl, credentialsPaths...)
- maintenanceTmpl := util.LoadTemplate(rootTpl, maintenancePath...)
- defenderTmpl := util.LoadTemplate(rootTpl, defenderPath...)
- setupTmpl := util.LoadTemplate(rootTpl, setupPath...)
- adminTemplates[templateUsers] = usersTmpl
- adminTemplates[templateUser] = userTmpl
- adminTemplates[templateAdmins] = adminsTmpl
- adminTemplates[templateAdmin] = adminTmpl
- adminTemplates[templateConnections] = connectionsTmpl
- adminTemplates[templateMessage] = messageTmpl
- adminTemplates[templateFolders] = foldersTmpl
- adminTemplates[templateFolder] = folderTmpl
- adminTemplates[templateStatus] = statusTmpl
- adminTemplates[templateLogin] = loginTmpl
- adminTemplates[templateCredentials] = credentialsTmpl
- adminTemplates[templateMaintenance] = maintenanceTmpl
- adminTemplates[templateDefender] = defenderTmpl
- adminTemplates[templateSetup] = setupTmpl
- }
- func getBasePageData(title, currentURL string, r *http.Request) basePage {
- var csrfToken string
- if currentURL != "" {
- csrfToken = createCSRFToken()
- }
- return basePage{
- Title: title,
- CurrentURL: currentURL,
- UsersURL: webUsersPath,
- UserURL: webUserPath,
- UserTemplateURL: webTemplateUser,
- AdminsURL: webAdminsPath,
- AdminURL: webAdminPath,
- FoldersURL: webFoldersPath,
- FolderURL: webFolderPath,
- FolderTemplateURL: webTemplateFolder,
- DefenderURL: webDefenderPath,
- LogoutURL: webLogoutPath,
- CredentialsURL: webAdminCredentialsPath,
- QuotaScanURL: webQuotaScanPath,
- ConnectionsURL: webConnectionsPath,
- StatusURL: webStatusPath,
- FolderQuotaScanURL: webScanVFolderPath,
- MaintenanceURL: webMaintenancePath,
- StaticURL: webStaticFilesPath,
- UsersTitle: pageUsersTitle,
- AdminsTitle: pageAdminsTitle,
- ConnectionsTitle: pageConnectionsTitle,
- FoldersTitle: pageFoldersTitle,
- StatusTitle: pageStatusTitle,
- MaintenanceTitle: pageMaintenanceTitle,
- DefenderTitle: pageDefenderTitle,
- Version: version.GetAsString(),
- LoggedAdmin: getAdminFromToken(r),
- HasDefender: common.Config.DefenderConfig.Enabled,
- CSRFToken: csrfToken,
- }
- }
- func renderAdminTemplate(w http.ResponseWriter, tmplName string, data interface{}) {
- err := adminTemplates[tmplName].ExecuteTemplate(w, tmplName, data)
- if err != nil {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- }
- }
- func renderMessagePage(w http.ResponseWriter, r *http.Request, title, body string, statusCode int, err error, message string) {
- var errorString string
- if body != "" {
- errorString = body + " "
- }
- if err != nil {
- errorString += err.Error()
- }
- data := messagePage{
- basePage: getBasePageData(title, "", r),
- Error: errorString,
- Success: message,
- }
- w.WriteHeader(statusCode)
- renderAdminTemplate(w, templateMessage, data)
- }
- func renderInternalServerErrorPage(w http.ResponseWriter, r *http.Request, err error) {
- renderMessagePage(w, r, page500Title, page500Body, http.StatusInternalServerError, err, "")
- }
- func renderBadRequestPage(w http.ResponseWriter, r *http.Request, err error) {
- renderMessagePage(w, r, page400Title, "", http.StatusBadRequest, err, "")
- }
- func renderForbiddenPage(w http.ResponseWriter, r *http.Request, body string) {
- renderMessagePage(w, r, page403Title, "", http.StatusForbidden, nil, body)
- }
- func renderNotFoundPage(w http.ResponseWriter, r *http.Request, err error) {
- renderMessagePage(w, r, page404Title, page404Body, http.StatusNotFound, err, "")
- }
- func renderCredentialsPage(w http.ResponseWriter, r *http.Request, pwdError, apiKeyError string) {
- data := credentialsPage{
- basePage: getBasePageData(pageCredentialsTitle, webAdminCredentialsPath, r),
- ChangePwdURL: webChangeAdminPwdPath,
- ManageAPIKeyURL: webChangeAdminAPIKeyAccessPath,
- Error: pwdError,
- APIKeyError: apiKeyError,
- }
- admin, err := dataprovider.AdminExists(data.LoggedAdmin.Username)
- if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- data.AllowAPIKeyAuth = admin.Filters.AllowAPIKeyAuth
- renderAdminTemplate(w, templateCredentials, data)
- }
- func renderMaintenancePage(w http.ResponseWriter, r *http.Request, error string) {
- data := maintenancePage{
- basePage: getBasePageData(pageMaintenanceTitle, webMaintenancePath, r),
- BackupPath: webBackupPath,
- RestorePath: webRestorePath,
- Error: error,
- }
- renderAdminTemplate(w, templateMaintenance, data)
- }
- func renderAdminSetupPage(w http.ResponseWriter, r *http.Request, username, error string) {
- data := setupPage{
- basePage: getBasePageData(pageSetupTitle, webAdminSetupPath, r),
- Username: username,
- Error: error,
- }
- renderAdminTemplate(w, templateSetup, data)
- }
- func renderAddUpdateAdminPage(w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
- error string, isAdd bool) {
- currentURL := webAdminPath
- if !isAdd {
- currentURL = fmt.Sprintf("%v/%v", webAdminPath, url.PathEscape(admin.Username))
- }
- data := adminPage{
- basePage: getBasePageData("Add a new user", currentURL, r),
- Admin: admin,
- Error: error,
- IsAdd: isAdd,
- }
- renderAdminTemplate(w, templateAdmin, data)
- }
- func renderUserPage(w http.ResponseWriter, r *http.Request, user *dataprovider.User, mode userPageMode, error string) {
- folders, err := getWebVirtualFolders(w, r, defaultQueryLimit)
- if err != nil {
- return
- }
- user.SetEmptySecretsIfNil()
- var title, currentURL string
- switch mode {
- case userPageModeAdd:
- title = "Add a new user"
- currentURL = webUserPath
- case userPageModeUpdate:
- title = "Update user"
- currentURL = fmt.Sprintf("%v/%v", webUserPath, url.PathEscape(user.Username))
- case userPageModeTemplate:
- title = "User template"
- currentURL = webTemplateUser
- }
- if user.Password != "" && user.IsPasswordHashed() && mode == userPageModeUpdate {
- user.Password = redactedSecret
- }
- user.FsConfig.RedactedSecret = redactedSecret
- data := userPage{
- basePage: getBasePageData(title, currentURL, r),
- Mode: mode,
- Error: error,
- User: user,
- ValidPerms: dataprovider.ValidPerms,
- ValidLoginMethods: dataprovider.ValidLoginMethods,
- ValidProtocols: dataprovider.ValidProtocols,
- WebClientOptions: sdk.WebClientOptions,
- RootDirPerms: user.GetPermissionsForPath("/"),
- VirtualFolders: folders,
- }
- renderAdminTemplate(w, templateUser, data)
- }
- func renderFolderPage(w http.ResponseWriter, r *http.Request, folder vfs.BaseVirtualFolder, mode folderPageMode, error string) {
- var title, currentURL string
- switch mode {
- case folderPageModeAdd:
- title = "Add a new folder"
- currentURL = webFolderPath
- case folderPageModeUpdate:
- title = "Update folder"
- currentURL = fmt.Sprintf("%v/%v", webFolderPath, url.PathEscape(folder.Name))
- case folderPageModeTemplate:
- title = "Folder template"
- currentURL = webTemplateFolder
- }
- folder.FsConfig.RedactedSecret = redactedSecret
- folder.FsConfig.SetEmptySecretsIfNil()
- data := folderPage{
- basePage: getBasePageData(title, currentURL, r),
- Error: error,
- Folder: folder,
- Mode: mode,
- }
- renderAdminTemplate(w, templateFolder, data)
- }
- func getFoldersForTemplate(r *http.Request) []string {
- var res []string
- folderNames := r.Form["tpl_foldername"]
- folders := make(map[string]bool)
- for _, name := range folderNames {
- name = strings.TrimSpace(name)
- if name == "" {
- continue
- }
- if _, ok := folders[name]; ok {
- continue
- }
- folders[name] = true
- res = append(res, name)
- }
- return res
- }
- func getUsersForTemplate(r *http.Request) []userTemplateFields {
- var res []userTemplateFields
- tplUsernames := r.Form["tpl_username"]
- tplPasswords := r.Form["tpl_password"]
- tplPublicKeys := r.Form["tpl_public_keys"]
- users := make(map[string]bool)
- for idx, username := range tplUsernames {
- username = strings.TrimSpace(username)
- password := ""
- publicKey := ""
- if len(tplPasswords) > idx {
- password = strings.TrimSpace(tplPasswords[idx])
- }
- if len(tplPublicKeys) > idx {
- publicKey = strings.TrimSpace(tplPublicKeys[idx])
- }
- if username == "" || (password == "" && publicKey == "") {
- continue
- }
- if _, ok := users[username]; ok {
- continue
- }
- users[username] = true
- res = append(res, userTemplateFields{
- Username: username,
- Password: password,
- PublicKey: publicKey,
- })
- }
- return res
- }
- func getVirtualFoldersFromPostFields(r *http.Request) []vfs.VirtualFolder {
- var virtualFolders []vfs.VirtualFolder
- folderPaths := r.Form["vfolder_path"]
- folderNames := r.Form["vfolder_name"]
- folderQuotaSizes := r.Form["vfolder_quota_size"]
- folderQuotaFiles := r.Form["vfolder_quota_files"]
- for idx, p := range folderPaths {
- p = strings.TrimSpace(p)
- name := ""
- if len(folderNames) > idx {
- name = folderNames[idx]
- }
- if p != "" && name != "" {
- vfolder := vfs.VirtualFolder{
- BaseVirtualFolder: vfs.BaseVirtualFolder{
- Name: name,
- },
- VirtualPath: p,
- QuotaFiles: -1,
- QuotaSize: -1,
- }
- if len(folderQuotaSizes) > idx {
- quotaSize, err := strconv.ParseInt(strings.TrimSpace(folderQuotaSizes[idx]), 10, 64)
- if err == nil {
- vfolder.QuotaSize = quotaSize
- }
- }
- if len(folderQuotaFiles) > idx {
- quotaFiles, err := strconv.Atoi(strings.TrimSpace(folderQuotaFiles[idx]))
- if err == nil {
- vfolder.QuotaFiles = quotaFiles
- }
- }
- virtualFolders = append(virtualFolders, vfolder)
- }
- }
- return virtualFolders
- }
- func getUserPermissionsFromPostFields(r *http.Request) map[string][]string {
- permissions := make(map[string][]string)
- permissions["/"] = r.Form["permissions"]
- for k := range r.Form {
- if strings.HasPrefix(k, "sub_perm_path") {
- p := strings.TrimSpace(r.Form.Get(k))
- if p != "" {
- idx := strings.TrimPrefix(k, "sub_perm_path")
- permissions[p] = r.Form[fmt.Sprintf("sub_perm_permissions%v", idx)]
- }
- }
- }
- return permissions
- }
- func getFilePatternsFromPostField(r *http.Request) []sdk.PatternsFilter {
- var result []sdk.PatternsFilter
- allowedPatterns := make(map[string][]string)
- deniedPatterns := make(map[string][]string)
- for k := range r.Form {
- if strings.HasPrefix(k, "pattern_path") {
- p := strings.TrimSpace(r.Form.Get(k))
- idx := strings.TrimPrefix(k, "pattern_path")
- filters := strings.TrimSpace(r.Form.Get(fmt.Sprintf("patterns%v", idx)))
- filters = strings.ReplaceAll(filters, " ", "")
- patternType := r.Form.Get(fmt.Sprintf("pattern_type%v", idx))
- if p != "" && filters != "" {
- if patternType == "allowed" {
- allowedPatterns[p] = append(allowedPatterns[p], strings.Split(filters, ",")...)
- } else {
- deniedPatterns[p] = append(deniedPatterns[p], strings.Split(filters, ",")...)
- }
- }
- }
- }
- for dirAllowed, allowPatterns := range allowedPatterns {
- filter := sdk.PatternsFilter{
- Path: dirAllowed,
- AllowedPatterns: util.RemoveDuplicates(allowPatterns),
- }
- for dirDenied, denPatterns := range deniedPatterns {
- if dirAllowed == dirDenied {
- filter.DeniedPatterns = util.RemoveDuplicates(denPatterns)
- break
- }
- }
- result = append(result, filter)
- }
- for dirDenied, denPatterns := range deniedPatterns {
- found := false
- for _, res := range result {
- if res.Path == dirDenied {
- found = true
- break
- }
- }
- if !found {
- result = append(result, sdk.PatternsFilter{
- Path: dirDenied,
- DeniedPatterns: denPatterns,
- })
- }
- }
- return result
- }
- func getFiltersFromUserPostFields(r *http.Request) sdk.UserFilters {
- var filters sdk.UserFilters
- filters.AllowedIP = getSliceFromDelimitedValues(r.Form.Get("allowed_ip"), ",")
- filters.DeniedIP = getSliceFromDelimitedValues(r.Form.Get("denied_ip"), ",")
- filters.DeniedLoginMethods = r.Form["ssh_login_methods"]
- filters.DeniedProtocols = r.Form["denied_protocols"]
- filters.FilePatterns = getFilePatternsFromPostField(r)
- filters.TLSUsername = sdk.TLSUsername(r.Form.Get("tls_username"))
- filters.WebClient = r.Form["web_client_options"]
- hooks := r.Form["hooks"]
- if util.IsStringInSlice("external_auth_disabled", hooks) {
- filters.Hooks.ExternalAuthDisabled = true
- }
- if util.IsStringInSlice("pre_login_disabled", hooks) {
- filters.Hooks.PreLoginDisabled = true
- }
- if util.IsStringInSlice("check_password_disabled", hooks) {
- filters.Hooks.CheckPasswordDisabled = true
- }
- filters.DisableFsChecks = len(r.Form.Get("disable_fs_checks")) > 0
- filters.AllowAPIKeyAuth = len(r.Form.Get("allow_api_key_auth")) > 0
- return filters
- }
- func getSecretFromFormField(r *http.Request, field string) *kms.Secret {
- secret := kms.NewPlainSecret(r.Form.Get(field))
- if strings.TrimSpace(secret.GetPayload()) == redactedSecret {
- secret.SetStatus(kms.SecretStatusRedacted)
- }
- if strings.TrimSpace(secret.GetPayload()) == "" {
- secret.SetStatus("")
- }
- return secret
- }
- func getS3Config(r *http.Request) (vfs.S3FsConfig, error) {
- var err error
- config := vfs.S3FsConfig{}
- config.Bucket = r.Form.Get("s3_bucket")
- config.Region = r.Form.Get("s3_region")
- config.AccessKey = r.Form.Get("s3_access_key")
- config.AccessSecret = getSecretFromFormField(r, "s3_access_secret")
- config.Endpoint = r.Form.Get("s3_endpoint")
- config.StorageClass = r.Form.Get("s3_storage_class")
- config.KeyPrefix = r.Form.Get("s3_key_prefix")
- config.UploadPartSize, err = strconv.ParseInt(r.Form.Get("s3_upload_part_size"), 10, 64)
- if err != nil {
- return config, err
- }
- config.UploadConcurrency, err = strconv.Atoi(r.Form.Get("s3_upload_concurrency"))
- if err != nil {
- return config, err
- }
- config.DownloadPartSize, err = strconv.ParseInt(r.Form.Get("s3_download_part_size"), 10, 64)
- if err != nil {
- return config, err
- }
- config.DownloadConcurrency, err = strconv.Atoi(r.Form.Get("s3_download_concurrency"))
- if err != nil {
- return config, err
- }
- config.ForcePathStyle = r.Form.Get("s3_force_path_style") != ""
- config.DownloadPartMaxTime, err = strconv.Atoi(r.Form.Get("s3_download_part_max_time"))
- return config, err
- }
- func getGCSConfig(r *http.Request) (vfs.GCSFsConfig, error) {
- var err error
- config := vfs.GCSFsConfig{}
- config.Bucket = r.Form.Get("gcs_bucket")
- config.StorageClass = r.Form.Get("gcs_storage_class")
- config.KeyPrefix = r.Form.Get("gcs_key_prefix")
- autoCredentials := r.Form.Get("gcs_auto_credentials")
- if autoCredentials != "" {
- config.AutomaticCredentials = 1
- } else {
- config.AutomaticCredentials = 0
- }
- credentials, _, err := r.FormFile("gcs_credential_file")
- if err == http.ErrMissingFile {
- return config, nil
- }
- if err != nil {
- return config, err
- }
- defer credentials.Close()
- fileBytes, err := io.ReadAll(credentials)
- if err != nil || len(fileBytes) == 0 {
- if len(fileBytes) == 0 {
- err = errors.New("credentials file size must be greater than 0")
- }
- return config, err
- }
- config.Credentials = kms.NewPlainSecret(string(fileBytes))
- config.AutomaticCredentials = 0
- return config, err
- }
- func getSFTPConfig(r *http.Request) (vfs.SFTPFsConfig, error) {
- var err error
- config := vfs.SFTPFsConfig{}
- config.Endpoint = r.Form.Get("sftp_endpoint")
- config.Username = r.Form.Get("sftp_username")
- config.Password = getSecretFromFormField(r, "sftp_password")
- config.PrivateKey = getSecretFromFormField(r, "sftp_private_key")
- fingerprintsFormValue := r.Form.Get("sftp_fingerprints")
- config.Fingerprints = getSliceFromDelimitedValues(fingerprintsFormValue, "\n")
- config.Prefix = r.Form.Get("sftp_prefix")
- config.DisableCouncurrentReads = len(r.Form.Get("sftp_disable_concurrent_reads")) > 0
- config.BufferSize, err = strconv.ParseInt(r.Form.Get("sftp_buffer_size"), 10, 64)
- return config, err
- }
- func getAzureConfig(r *http.Request) (vfs.AzBlobFsConfig, error) {
- var err error
- config := vfs.AzBlobFsConfig{}
- config.Container = r.Form.Get("az_container")
- config.AccountName = r.Form.Get("az_account_name")
- config.AccountKey = getSecretFromFormField(r, "az_account_key")
- config.SASURL = getSecretFromFormField(r, "az_sas_url")
- config.Endpoint = r.Form.Get("az_endpoint")
- config.KeyPrefix = r.Form.Get("az_key_prefix")
- config.AccessTier = r.Form.Get("az_access_tier")
- config.UseEmulator = len(r.Form.Get("az_use_emulator")) > 0
- config.UploadPartSize, err = strconv.ParseInt(r.Form.Get("az_upload_part_size"), 10, 64)
- if err != nil {
- return config, err
- }
- config.UploadConcurrency, err = strconv.Atoi(r.Form.Get("az_upload_concurrency"))
- return config, err
- }
- func getFsConfigFromPostFields(r *http.Request) (vfs.Filesystem, error) {
- var fs vfs.Filesystem
- fs.Provider = sdk.GetProviderByName(r.Form.Get("fs_provider"))
- switch fs.Provider {
- case sdk.S3FilesystemProvider:
- config, err := getS3Config(r)
- if err != nil {
- return fs, err
- }
- fs.S3Config = config
- case sdk.AzureBlobFilesystemProvider:
- config, err := getAzureConfig(r)
- if err != nil {
- return fs, err
- }
- fs.AzBlobConfig = config
- case sdk.GCSFilesystemProvider:
- config, err := getGCSConfig(r)
- if err != nil {
- return fs, err
- }
- fs.GCSConfig = config
- case sdk.CryptedFilesystemProvider:
- fs.CryptConfig.Passphrase = getSecretFromFormField(r, "crypt_passphrase")
- case sdk.SFTPFilesystemProvider:
- config, err := getSFTPConfig(r)
- if err != nil {
- return fs, err
- }
- fs.SFTPConfig = config
- }
- return fs, nil
- }
- func getAdminFromPostFields(r *http.Request) (dataprovider.Admin, error) {
- var admin dataprovider.Admin
- err := r.ParseForm()
- if err != nil {
- return admin, err
- }
- status, err := strconv.Atoi(r.Form.Get("status"))
- if err != nil {
- return admin, err
- }
- admin.Username = r.Form.Get("username")
- admin.Password = r.Form.Get("password")
- admin.Permissions = r.Form["permissions"]
- admin.Email = r.Form.Get("email")
- admin.Status = status
- admin.Filters.AllowList = getSliceFromDelimitedValues(r.Form.Get("allowed_ip"), ",")
- admin.Filters.AllowAPIKeyAuth = len(r.Form.Get("allow_api_key_auth")) > 0
- admin.AdditionalInfo = r.Form.Get("additional_info")
- admin.Description = r.Form.Get("description")
- return admin, nil
- }
- func replacePlaceholders(field string, replacements map[string]string) string {
- for k, v := range replacements {
- field = strings.ReplaceAll(field, k, v)
- }
- return field
- }
- func getFolderFromTemplate(folder vfs.BaseVirtualFolder, name string) vfs.BaseVirtualFolder {
- folder.Name = name
- replacements := make(map[string]string)
- replacements["%name%"] = folder.Name
- folder.MappedPath = replacePlaceholders(folder.MappedPath, replacements)
- folder.Description = replacePlaceholders(folder.Description, replacements)
- switch folder.FsConfig.Provider {
- case sdk.CryptedFilesystemProvider:
- folder.FsConfig.CryptConfig = getCryptFsFromTemplate(folder.FsConfig.CryptConfig, replacements)
- case sdk.S3FilesystemProvider:
- folder.FsConfig.S3Config = getS3FsFromTemplate(folder.FsConfig.S3Config, replacements)
- case sdk.GCSFilesystemProvider:
- folder.FsConfig.GCSConfig = getGCSFsFromTemplate(folder.FsConfig.GCSConfig, replacements)
- case sdk.AzureBlobFilesystemProvider:
- folder.FsConfig.AzBlobConfig = getAzBlobFsFromTemplate(folder.FsConfig.AzBlobConfig, replacements)
- case sdk.SFTPFilesystemProvider:
- folder.FsConfig.SFTPConfig = getSFTPFsFromTemplate(folder.FsConfig.SFTPConfig, replacements)
- }
- return folder
- }
- func getCryptFsFromTemplate(fsConfig vfs.CryptFsConfig, replacements map[string]string) vfs.CryptFsConfig {
- if fsConfig.Passphrase != nil {
- if fsConfig.Passphrase.IsPlain() {
- payload := replacePlaceholders(fsConfig.Passphrase.GetPayload(), replacements)
- fsConfig.Passphrase = kms.NewPlainSecret(payload)
- }
- }
- return fsConfig
- }
- func getS3FsFromTemplate(fsConfig vfs.S3FsConfig, replacements map[string]string) vfs.S3FsConfig {
- fsConfig.KeyPrefix = replacePlaceholders(fsConfig.KeyPrefix, replacements)
- fsConfig.AccessKey = replacePlaceholders(fsConfig.AccessKey, replacements)
- if fsConfig.AccessSecret != nil && fsConfig.AccessSecret.IsPlain() {
- payload := replacePlaceholders(fsConfig.AccessSecret.GetPayload(), replacements)
- fsConfig.AccessSecret = kms.NewPlainSecret(payload)
- }
- return fsConfig
- }
- func getGCSFsFromTemplate(fsConfig vfs.GCSFsConfig, replacements map[string]string) vfs.GCSFsConfig {
- fsConfig.KeyPrefix = replacePlaceholders(fsConfig.KeyPrefix, replacements)
- return fsConfig
- }
- func getAzBlobFsFromTemplate(fsConfig vfs.AzBlobFsConfig, replacements map[string]string) vfs.AzBlobFsConfig {
- fsConfig.KeyPrefix = replacePlaceholders(fsConfig.KeyPrefix, replacements)
- fsConfig.AccountName = replacePlaceholders(fsConfig.AccountName, replacements)
- if fsConfig.AccountKey != nil && fsConfig.AccountKey.IsPlain() {
- payload := replacePlaceholders(fsConfig.AccountKey.GetPayload(), replacements)
- fsConfig.AccountKey = kms.NewPlainSecret(payload)
- }
- return fsConfig
- }
- func getSFTPFsFromTemplate(fsConfig vfs.SFTPFsConfig, replacements map[string]string) vfs.SFTPFsConfig {
- fsConfig.Prefix = replacePlaceholders(fsConfig.Prefix, replacements)
- fsConfig.Username = replacePlaceholders(fsConfig.Username, replacements)
- if fsConfig.Password != nil && fsConfig.Password.IsPlain() {
- payload := replacePlaceholders(fsConfig.Password.GetPayload(), replacements)
- fsConfig.Password = kms.NewPlainSecret(payload)
- }
- return fsConfig
- }
- func getUserFromTemplate(user dataprovider.User, template userTemplateFields) dataprovider.User {
- user.Username = template.Username
- user.Password = template.Password
- user.PublicKeys = nil
- if template.PublicKey != "" {
- user.PublicKeys = append(user.PublicKeys, template.PublicKey)
- }
- replacements := make(map[string]string)
- replacements["%username%"] = user.Username
- user.Password = replacePlaceholders(user.Password, replacements)
- replacements["%password%"] = user.Password
- user.HomeDir = replacePlaceholders(user.HomeDir, replacements)
- var vfolders []vfs.VirtualFolder
- for _, vfolder := range user.VirtualFolders {
- vfolder.Name = replacePlaceholders(vfolder.Name, replacements)
- vfolder.VirtualPath = replacePlaceholders(vfolder.VirtualPath, replacements)
- vfolders = append(vfolders, vfolder)
- }
- user.VirtualFolders = vfolders
- user.Description = replacePlaceholders(user.Description, replacements)
- user.AdditionalInfo = replacePlaceholders(user.AdditionalInfo, replacements)
- switch user.FsConfig.Provider {
- case sdk.CryptedFilesystemProvider:
- user.FsConfig.CryptConfig = getCryptFsFromTemplate(user.FsConfig.CryptConfig, replacements)
- case sdk.S3FilesystemProvider:
- user.FsConfig.S3Config = getS3FsFromTemplate(user.FsConfig.S3Config, replacements)
- case sdk.GCSFilesystemProvider:
- user.FsConfig.GCSConfig = getGCSFsFromTemplate(user.FsConfig.GCSConfig, replacements)
- case sdk.AzureBlobFilesystemProvider:
- user.FsConfig.AzBlobConfig = getAzBlobFsFromTemplate(user.FsConfig.AzBlobConfig, replacements)
- case sdk.SFTPFilesystemProvider:
- user.FsConfig.SFTPConfig = getSFTPFsFromTemplate(user.FsConfig.SFTPConfig, replacements)
- }
- return user
- }
- func getUserFromPostFields(r *http.Request) (dataprovider.User, error) {
- var user dataprovider.User
- err := r.ParseMultipartForm(maxRequestSize)
- if err != nil {
- return user, err
- }
- uid, err := strconv.Atoi(r.Form.Get("uid"))
- if err != nil {
- return user, err
- }
- gid, err := strconv.Atoi(r.Form.Get("gid"))
- if err != nil {
- return user, err
- }
- maxSessions, err := strconv.Atoi(r.Form.Get("max_sessions"))
- if err != nil {
- return user, err
- }
- quotaSize, err := strconv.ParseInt(r.Form.Get("quota_size"), 10, 64)
- if err != nil {
- return user, err
- }
- quotaFiles, err := strconv.Atoi(r.Form.Get("quota_files"))
- if err != nil {
- return user, err
- }
- bandwidthUL, err := strconv.ParseInt(r.Form.Get("upload_bandwidth"), 10, 64)
- if err != nil {
- return user, err
- }
- bandwidthDL, err := strconv.ParseInt(r.Form.Get("download_bandwidth"), 10, 64)
- if err != nil {
- return user, err
- }
- status, err := strconv.Atoi(r.Form.Get("status"))
- if err != nil {
- return user, err
- }
- expirationDateMillis := int64(0)
- expirationDateString := r.Form.Get("expiration_date")
- if len(strings.TrimSpace(expirationDateString)) > 0 {
- expirationDate, err := time.Parse(webDateTimeFormat, expirationDateString)
- if err != nil {
- return user, err
- }
- expirationDateMillis = util.GetTimeAsMsSinceEpoch(expirationDate)
- }
- fsConfig, err := getFsConfigFromPostFields(r)
- if err != nil {
- return user, err
- }
- user = dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: r.Form.Get("username"),
- Password: r.Form.Get("password"),
- PublicKeys: r.Form["public_keys"],
- HomeDir: r.Form.Get("home_dir"),
- UID: uid,
- GID: gid,
- Permissions: getUserPermissionsFromPostFields(r),
- MaxSessions: maxSessions,
- QuotaSize: quotaSize,
- QuotaFiles: quotaFiles,
- UploadBandwidth: bandwidthUL,
- DownloadBandwidth: bandwidthDL,
- Status: status,
- ExpirationDate: expirationDateMillis,
- Filters: getFiltersFromUserPostFields(r),
- AdditionalInfo: r.Form.Get("additional_info"),
- Description: r.Form.Get("description"),
- },
- VirtualFolders: getVirtualFoldersFromPostFields(r),
- FsConfig: fsConfig,
- }
- maxFileSize, err := strconv.ParseInt(r.Form.Get("max_upload_file_size"), 10, 64)
- user.Filters.MaxUploadFileSize = maxFileSize
- return user, err
- }
- func handleWebAdminCredentials(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- renderCredentialsPage(w, r, "", "")
- }
- func handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- err := r.ParseForm()
- if err != nil {
- renderCredentialsPage(w, r, err.Error(), "")
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- err = doChangeAdminPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
- r.Form.Get("new_password2"))
- if err != nil {
- renderCredentialsPage(w, r, err.Error(), "")
- return
- }
- handleWebLogout(w, r)
- }
- func handleWebAdminManageAPIKeyPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- err := r.ParseForm()
- if err != nil {
- renderCredentialsPage(w, r, err.Error(), "")
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- renderCredentialsPage(w, r, "", "Invalid token claims")
- return
- }
- admin, err := dataprovider.AdminExists(claims.Username)
- if err != nil {
- renderCredentialsPage(w, r, "", err.Error())
- return
- }
- admin.Filters.AllowAPIKeyAuth = len(r.Form.Get("allow_api_key_auth")) > 0
- err = dataprovider.UpdateAdmin(&admin)
- if err != nil {
- renderCredentialsPage(w, r, "", err.Error())
- return
- }
- renderMessagePage(w, r, "API key authentication updated", "", http.StatusOK, nil,
- "Your API key access permission has been successfully updated")
- }
- func handleWebLogout(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- c := jwtTokenClaims{}
- c.removeCookie(w, r, webBaseAdminPath)
- http.Redirect(w, r, webLoginPath, http.StatusFound)
- }
- func handleWebMaintenance(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- renderMaintenancePage(w, r, "")
- }
- func handleWebRestore(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, MaxRestoreSize)
- err := r.ParseMultipartForm(MaxRestoreSize)
- if err != nil {
- renderMaintenancePage(w, r, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- restoreMode, err := strconv.Atoi(r.Form.Get("mode"))
- if err != nil {
- renderMaintenancePage(w, r, err.Error())
- return
- }
- scanQuota, err := strconv.Atoi(r.Form.Get("quota"))
- if err != nil {
- renderMaintenancePage(w, r, err.Error())
- return
- }
- backupFile, _, err := r.FormFile("backup_file")
- if err != nil {
- renderMaintenancePage(w, r, err.Error())
- return
- }
- defer backupFile.Close()
- backupContent, err := io.ReadAll(backupFile)
- if err != nil || len(backupContent) == 0 {
- if len(backupContent) == 0 {
- err = errors.New("backup file size must be greater than 0")
- }
- renderMaintenancePage(w, r, err.Error())
- return
- }
- if err := restoreBackup(backupContent, "", scanQuota, restoreMode); err != nil {
- renderMaintenancePage(w, r, err.Error())
- return
- }
- renderMessagePage(w, r, "Data restored", "", http.StatusOK, nil, "Your backup was successfully restored")
- }
- func handleGetWebAdmins(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- limit := defaultQueryLimit
- if _, ok := r.URL.Query()["qlimit"]; ok {
- var err error
- limit, err = strconv.Atoi(r.URL.Query().Get("qlimit"))
- if err != nil {
- limit = defaultQueryLimit
- }
- }
- admins := make([]dataprovider.Admin, 0, limit)
- for {
- a, err := dataprovider.GetAdmins(limit, len(admins), dataprovider.OrderASC)
- if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- admins = append(admins, a...)
- if len(a) < limit {
- break
- }
- }
- data := adminsPage{
- basePage: getBasePageData(pageAdminsTitle, webAdminsPath, r),
- Admins: admins,
- }
- renderAdminTemplate(w, templateAdmins, data)
- }
- func handleWebAdminSetupGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- if dataprovider.HasAdmin() {
- http.Redirect(w, r, webLoginPath, http.StatusFound)
- return
- }
- renderAdminSetupPage(w, r, "", "")
- }
- func handleWebAddAdminGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- admin := &dataprovider.Admin{Status: 1}
- renderAddUpdateAdminPage(w, r, admin, "", true)
- }
- func handleWebUpdateAdminGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- username := getURLParam(r, "username")
- admin, err := dataprovider.AdminExists(username)
- if err == nil {
- renderAddUpdateAdminPage(w, r, &admin, "", false)
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- }
- func handleWebAddAdminPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- admin, err := getAdminFromPostFields(r)
- if err != nil {
- renderAddUpdateAdminPage(w, r, &admin, err.Error(), true)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- err = dataprovider.AddAdmin(&admin)
- if err != nil {
- renderAddUpdateAdminPage(w, r, &admin, err.Error(), true)
- return
- }
- http.Redirect(w, r, webAdminsPath, http.StatusSeeOther)
- }
- func handleWebUpdateAdminPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- username := getURLParam(r, "username")
- admin, err := dataprovider.AdminExists(username)
- if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- return
- } else if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- updatedAdmin, err := getAdminFromPostFields(r)
- if err != nil {
- renderAddUpdateAdminPage(w, r, &updatedAdmin, err.Error(), false)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- updatedAdmin.ID = admin.ID
- updatedAdmin.Username = admin.Username
- if updatedAdmin.Password == "" {
- updatedAdmin.Password = admin.Password
- }
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- renderAddUpdateAdminPage(w, r, &updatedAdmin, fmt.Sprintf("Invalid token claims: %v", err), false)
- return
- }
- if username == claims.Username {
- if claims.isCriticalPermRemoved(updatedAdmin.Permissions) {
- renderAddUpdateAdminPage(w, r, &updatedAdmin, "You cannot remove these permissions to yourself", false)
- return
- }
- if updatedAdmin.Status == 0 {
- renderAddUpdateAdminPage(w, r, &updatedAdmin, "You cannot disable yourself", false)
- return
- }
- }
- err = dataprovider.UpdateAdmin(&updatedAdmin)
- if err != nil {
- renderAddUpdateAdminPage(w, r, &admin, err.Error(), false)
- return
- }
- http.Redirect(w, r, webAdminsPath, http.StatusSeeOther)
- }
- func handleWebDefenderPage(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- data := defenderHostsPage{
- basePage: getBasePageData(pageDefenderTitle, webDefenderPath, r),
- DefenderHostsURL: webDefenderHostsPath,
- }
- renderAdminTemplate(w, templateDefender, data)
- }
- func handleGetWebUsers(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- limit := defaultQueryLimit
- if _, ok := r.URL.Query()["qlimit"]; ok {
- var err error
- limit, err = strconv.Atoi(r.URL.Query().Get("qlimit"))
- if err != nil {
- limit = defaultQueryLimit
- }
- }
- users := make([]dataprovider.User, 0, limit)
- for {
- u, err := dataprovider.GetUsers(limit, len(users), dataprovider.OrderASC)
- if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- users = append(users, u...)
- if len(u) < limit {
- break
- }
- }
- data := usersPage{
- basePage: getBasePageData(pageUsersTitle, webUsersPath, r),
- Users: users,
- }
- renderAdminTemplate(w, templateUsers, data)
- }
- func handleWebTemplateFolderGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if r.URL.Query().Get("from") != "" {
- name := r.URL.Query().Get("from")
- folder, err := dataprovider.GetFolderByName(name)
- if err == nil {
- renderFolderPage(w, r, folder, folderPageModeTemplate, "")
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- } else {
- folder := vfs.BaseVirtualFolder{}
- renderFolderPage(w, r, folder, folderPageModeTemplate, "")
- }
- }
- func handleWebTemplateFolderPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- templateFolder := vfs.BaseVirtualFolder{}
- err := r.ParseMultipartForm(maxRequestSize)
- if err != nil {
- renderMessagePage(w, r, "Error parsing folders fields", "", http.StatusBadRequest, err, "")
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- templateFolder.MappedPath = r.Form.Get("mapped_path")
- templateFolder.Description = r.Form.Get("description")
- fsConfig, err := getFsConfigFromPostFields(r)
- if err != nil {
- renderMessagePage(w, r, "Error parsing folders fields", "", http.StatusBadRequest, err, "")
- return
- }
- templateFolder.FsConfig = fsConfig
- var dump dataprovider.BackupData
- dump.Version = dataprovider.DumpVersion
- foldersFields := getFoldersForTemplate(r)
- for _, tmpl := range foldersFields {
- f := getFolderFromTemplate(templateFolder, tmpl)
- if err := dataprovider.ValidateFolder(&f); err != nil {
- renderMessagePage(w, r, fmt.Sprintf("Error validating folder %#v", f.Name), "", http.StatusBadRequest, err, "")
- return
- }
- dump.Folders = append(dump.Folders, f)
- }
- if len(dump.Folders) == 0 {
- renderMessagePage(w, r, "No folders to export", "No valid folders found, export is not possible", http.StatusBadRequest, nil, "")
- return
- }
- w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"sftpgo-%v-folders-from-template.json\"", len(dump.Folders)))
- render.JSON(w, r, dump)
- }
- func handleWebTemplateUserGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if r.URL.Query().Get("from") != "" {
- username := r.URL.Query().Get("from")
- user, err := dataprovider.UserExists(username)
- if err == nil {
- user.SetEmptySecrets()
- renderUserPage(w, r, &user, userPageModeTemplate, "")
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- } else {
- user := dataprovider.User{BaseUser: sdk.BaseUser{Status: 1}}
- renderUserPage(w, r, &user, userPageModeTemplate, "")
- }
- }
- func handleWebTemplateUserPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- templateUser, err := getUserFromPostFields(r)
- if err != nil {
- renderMessagePage(w, r, "Error parsing user fields", "", http.StatusBadRequest, err, "")
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- var dump dataprovider.BackupData
- dump.Version = dataprovider.DumpVersion
- userTmplFields := getUsersForTemplate(r)
- for _, tmpl := range userTmplFields {
- u := getUserFromTemplate(templateUser, tmpl)
- if err := dataprovider.ValidateUser(&u); err != nil {
- renderMessagePage(w, r, fmt.Sprintf("Error validating user %#v", u.Username), "", http.StatusBadRequest, err, "")
- return
- }
- dump.Users = append(dump.Users, u)
- for _, folder := range u.VirtualFolders {
- if !dump.HasFolder(folder.Name) {
- dump.Folders = append(dump.Folders, folder.BaseVirtualFolder)
- }
- }
- }
- if len(dump.Users) == 0 {
- renderMessagePage(w, r, "No users to export", "No valid users found, export is not possible", http.StatusBadRequest, nil, "")
- return
- }
- w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"sftpgo-%v-users-from-template.json\"", len(dump.Users)))
- render.JSON(w, r, dump)
- }
- func handleWebAddUserGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if r.URL.Query().Get("clone-from") != "" {
- username := r.URL.Query().Get("clone-from")
- user, err := dataprovider.UserExists(username)
- if err == nil {
- user.ID = 0
- user.Username = ""
- user.Password = ""
- user.SetEmptySecrets()
- renderUserPage(w, r, &user, userPageModeAdd, "")
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- } else {
- user := dataprovider.User{BaseUser: sdk.BaseUser{Status: 1}}
- renderUserPage(w, r, &user, userPageModeAdd, "")
- }
- }
- func handleWebUpdateUserGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- username := getURLParam(r, "username")
- user, err := dataprovider.UserExists(username)
- if err == nil {
- renderUserPage(w, r, &user, userPageModeUpdate, "")
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- }
- func handleWebAddUserPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- user, err := getUserFromPostFields(r)
- if err != nil {
- renderUserPage(w, r, &user, userPageModeAdd, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- err = dataprovider.AddUser(&user)
- if err == nil {
- http.Redirect(w, r, webUsersPath, http.StatusSeeOther)
- } else {
- renderUserPage(w, r, &user, userPageModeAdd, err.Error())
- }
- }
- func handleWebUpdateUserPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- username := getURLParam(r, "username")
- user, err := dataprovider.UserExists(username)
- if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- return
- } else if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- updatedUser, err := getUserFromPostFields(r)
- if err != nil {
- renderUserPage(w, r, &user, userPageModeUpdate, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- updatedUser.ID = user.ID
- updatedUser.Username = user.Username
- updatedUser.SetEmptySecretsIfNil()
- if updatedUser.Password == redactedSecret {
- updatedUser.Password = user.Password
- }
- updateEncryptedSecrets(&updatedUser.FsConfig, user.FsConfig.S3Config.AccessSecret, user.FsConfig.AzBlobConfig.AccountKey,
- user.FsConfig.AzBlobConfig.SASURL, user.FsConfig.GCSConfig.Credentials, user.FsConfig.CryptConfig.Passphrase,
- user.FsConfig.SFTPConfig.Password, user.FsConfig.SFTPConfig.PrivateKey)
- err = dataprovider.UpdateUser(&updatedUser)
- if err == nil {
- if len(r.Form.Get("disconnect")) > 0 {
- disconnectUser(user.Username)
- }
- http.Redirect(w, r, webUsersPath, http.StatusSeeOther)
- } else {
- renderUserPage(w, r, &user, userPageModeUpdate, err.Error())
- }
- }
- func handleWebGetStatus(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- data := statusPage{
- basePage: getBasePageData(pageStatusTitle, webStatusPath, r),
- Status: getServicesStatus(),
- }
- renderAdminTemplate(w, templateStatus, data)
- }
- func handleWebGetConnections(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- connectionStats := common.Connections.GetStats()
- data := connectionsPage{
- basePage: getBasePageData(pageConnectionsTitle, webConnectionsPath, r),
- Connections: connectionStats,
- }
- renderAdminTemplate(w, templateConnections, data)
- }
- func handleWebAddFolderGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- renderFolderPage(w, r, vfs.BaseVirtualFolder{}, folderPageModeAdd, "")
- }
- func handleWebAddFolderPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- folder := vfs.BaseVirtualFolder{}
- err := r.ParseMultipartForm(maxRequestSize)
- if err != nil {
- renderFolderPage(w, r, folder, folderPageModeAdd, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- folder.MappedPath = r.Form.Get("mapped_path")
- folder.Name = r.Form.Get("name")
- folder.Description = r.Form.Get("description")
- fsConfig, err := getFsConfigFromPostFields(r)
- if err != nil {
- renderFolderPage(w, r, folder, folderPageModeAdd, err.Error())
- return
- }
- folder.FsConfig = fsConfig
- err = dataprovider.AddFolder(&folder)
- if err == nil {
- http.Redirect(w, r, webFoldersPath, http.StatusSeeOther)
- } else {
- renderFolderPage(w, r, folder, folderPageModeAdd, err.Error())
- }
- }
- func handleWebUpdateFolderGet(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- name := getURLParam(r, "name")
- folder, err := dataprovider.GetFolderByName(name)
- if err == nil {
- renderFolderPage(w, r, folder, folderPageModeUpdate, "")
- } else if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- } else {
- renderInternalServerErrorPage(w, r, err)
- }
- }
- func handleWebUpdateFolderPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- name := getURLParam(r, "name")
- folder, err := dataprovider.GetFolderByName(name)
- if _, ok := err.(*util.RecordNotFoundError); ok {
- renderNotFoundPage(w, r, err)
- return
- } else if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return
- }
- err = r.ParseMultipartForm(maxRequestSize)
- if err != nil {
- renderFolderPage(w, r, folder, folderPageModeUpdate, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken)); err != nil {
- renderForbiddenPage(w, r, err.Error())
- return
- }
- fsConfig, err := getFsConfigFromPostFields(r)
- if err != nil {
- renderFolderPage(w, r, folder, folderPageModeUpdate, err.Error())
- return
- }
- updatedFolder := &vfs.BaseVirtualFolder{
- MappedPath: r.Form.Get("mapped_path"),
- Description: r.Form.Get("description"),
- }
- updatedFolder.ID = folder.ID
- updatedFolder.Name = folder.Name
- updatedFolder.FsConfig = fsConfig
- updatedFolder.FsConfig.SetEmptySecretsIfNil()
- updateEncryptedSecrets(&updatedFolder.FsConfig, folder.FsConfig.S3Config.AccessSecret, folder.FsConfig.AzBlobConfig.AccountKey,
- folder.FsConfig.AzBlobConfig.SASURL, folder.FsConfig.GCSConfig.Credentials, folder.FsConfig.CryptConfig.Passphrase,
- folder.FsConfig.SFTPConfig.Password, folder.FsConfig.SFTPConfig.PrivateKey)
- err = dataprovider.UpdateFolder(updatedFolder, folder.Users)
- if err != nil {
- renderFolderPage(w, r, folder, folderPageModeUpdate, err.Error())
- return
- }
- http.Redirect(w, r, webFoldersPath, http.StatusSeeOther)
- }
- func getWebVirtualFolders(w http.ResponseWriter, r *http.Request, limit int) ([]vfs.BaseVirtualFolder, error) {
- folders := make([]vfs.BaseVirtualFolder, 0, limit)
- for {
- f, err := dataprovider.GetFolders(limit, len(folders), dataprovider.OrderASC)
- if err != nil {
- renderInternalServerErrorPage(w, r, err)
- return folders, err
- }
- folders = append(folders, f...)
- if len(f) < limit {
- break
- }
- }
- return folders, nil
- }
- func handleWebGetFolders(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- limit := defaultQueryLimit
- if _, ok := r.URL.Query()["qlimit"]; ok {
- var err error
- limit, err = strconv.Atoi(r.URL.Query().Get("qlimit"))
- if err != nil {
- limit = defaultQueryLimit
- }
- }
- folders, err := getWebVirtualFolders(w, r, limit)
- if err != nil {
- return
- }
- data := foldersPage{
- basePage: getBasePageData(pageFoldersTitle, webFoldersPath, r),
- Folders: folders,
- }
- renderAdminTemplate(w, templateFolders, data)
- }
|