//--------------------------------------------------------------------------- #include #pragma hdrstop #include #include #include #define NE_LFS #define WINSCP #include #include #include #include #include #include #include #include #include #include #include "WebDAVFileSystem.h" #include "Interface.h" #include "Common.h" #include "Exceptions.h" #include "Terminal.h" #include "TextsCore.h" #include "SecureShell.h" #include "HelpCore.h" #include "CoreMain.h" #include "Security.h" #include #include //--------------------------------------------------------------------------- #pragma package(smart_init) //--------------------------------------------------------------------------- #define FILE_OPERATION_LOOP_TERMINAL FTerminal //--------------------------------------------------------------------------- const int tfFirstLevel = 0x01; //--------------------------------------------------------------------------- struct TSinkFileParams { UnicodeString TargetDir; const TCopyParamType * CopyParam; int Params; TFileOperationProgressType * OperationProgress; bool Skipped; unsigned int Flags; }; //--------------------------------------------------------------------------- struct TWebDAVCertificateData { UnicodeString Subject; UnicodeString Issuer; TDateTime ValidFrom; TDateTime ValidUntil; UnicodeString Fingerprint; AnsiString AsciiCert; int Failures; }; //--------------------------------------------------------------------------- #define SESSION_FS_KEY "filesystem" #define MAX_REDIRECT_ATTEMPTS 3 static const char CertificateStorageKey[] = "HttpsCertificates"; static const UnicodeString CONST_WEBDAV_PROTOCOL_BASE_NAME = L"WebDAV"; //--------------------------------------------------------------------------- #define DAV_PROP_NAMESPACE "DAV:" #define PROP_CONTENT_LENGTH "getcontentlength" #define PROP_LAST_MODIFIED "getlastmodified" #define PROP_RESOURCE_TYPE "resourcetype" #define PROP_HIDDEN "ishidden" #define PROP_QUOTA_AVAILABLE "quota-available-bytes" #define PROP_QUOTA_USED "quota-used-bytes" //--------------------------------------------------------------------------- static std::unique_ptr DebugSection(new TCriticalSection); static std::set FileSystems; //--------------------------------------------------------------------------- extern "C" { void ne_debug(void * Context, int Channel, const char * Format, ...) { bool DoLog; if (FLAGSET(Channel, NE_DBG_SOCKET) || FLAGSET(Channel, NE_DBG_HTTP) || FLAGSET(Channel, NE_DBG_HTTPAUTH) || FLAGSET(Channel, NE_DBG_SSL)) { DoLog = true; } else if (FLAGSET(Channel, NE_DBG_XML) || FLAGSET(Channel, NE_DBG_WINSCP_HTTP_DETAIL)) { DoLog = (Configuration->ActualLogProtocol >= 1); } else if (FLAGSET(Channel, NE_DBG_LOCKS) || FLAGSET(Channel, NE_DBG_XMLPARSE) || FLAGSET(Channel, NE_DBG_HTTPBODY)) { DoLog = (Configuration->ActualLogProtocol >= 2); } else { DoLog = false; FAIL; } if (DoLog) { TWebDAVFileSystem * FileSystem = NULL; if (Context != NULL) { ne_session * Session = static_cast(Context); FileSystem = static_cast(ne_get_session_private(Session, SESSION_FS_KEY)); } else { TGuard Guard(DebugSection.get()); if (FileSystems.size() == 1) { FileSystem = *FileSystems.begin(); } } if (FileSystem != NULL) { va_list Args; va_start(Args, Format); UTF8String Message; Message.vprintf(Format, Args); FileSystem->NeonDebug(UnicodeString(Message)); va_end(Args); } } } void ne_init_ssl_session(struct ssl_st * Ssl, ne_session * Session) { TWebDAVFileSystem * FileSystem = static_cast(ne_get_session_private(Session, SESSION_FS_KEY)); FileSystem->InitSslSession(Ssl); } } // extern "C" //------------------------------------------------------------------------------ //--------------------------------------------------------------------------- // ne_path_escape returns 7-bit string, so it does not really matter if we use // AnsiString or UTF8String here, though UTF8String might be more safe static AnsiString PathEscape(const char * Path) { char * EscapedPath = ne_path_escape(Path); AnsiString Result = EscapedPath; ne_free(EscapedPath); return Result; } //--------------------------------------------------------------------------- static UTF8String PathUnescape(const char * Path) { char * UnescapedPath = ne_path_unescape(Path); UTF8String Result = UnescapedPath; ne_free(UnescapedPath); return Result; } //--------------------------------------------------------------------------- #define StrToNeon(S) UTF8String(S).c_str() #define StrFromNeon(S) UnicodeString(UTF8String(S)) #define AbsolutePathToNeon(P) PathEscape(StrToNeon(P)).c_str() #define PathToNeonStatic(THIS, P) AbsolutePathToNeon((THIS)->AbsolutePath(P, false)) #define PathToNeon(P) PathToNeonStatic(this, P) //--------------------------------------------------------------------------- //--------------------------------------------------------------------------- void __fastcall NeonInitialize() { // Even if this fails, we do not want to interrupt WinSCP starting for that. // We may possibly remember that and fail opening session later. // Anyway, it can hardly fail. // Though it fails on Wine on Debian VM. // Probably because of ne_sspi_init() as we get this message on stderr: // p11-kit: couldn't load module: /usr/lib/i386-linux-gnu/pkcs11/gnome-keyring-pkcs11.so: /usr/lib/i386-linux-gnu/pkcs11/gnome-keyring-pkcs11.so: cannot open shared object file: No such file or directory // err:winediag:SECUR32_initNTLMSP ntlm_auth was not found or is outdated. Make sure that ntlm_auth >= 3.0.25 is in your path. Usually, you can find it in the winbind package of your distribution. ALWAYS_TRUE(ne_sock_init() == 0); } //--------------------------------------------------------------------------- void __fastcall NeonFinalize() { ne_sock_exit(); } //--------------------------------------------------------------------------- UnicodeString __fastcall NeonVersion() { UnicodeString Str = StrFromNeon(ne_version_string()); CutToChar(Str, L' ', true); // "neon" UnicodeString Result = CutToChar(Str, L':', true); return Result; } //--------------------------------------------------------------------------- UnicodeString __fastcall ExpatVersion() { return FORMAT(L"%d.%d.%d", (XML_MAJOR_VERSION, XML_MINOR_VERSION, XML_MICRO_VERSION)); } //--------------------------------------------------------------------------- //--------------------------------------------------------------------------- TWebDAVFileSystem::TWebDAVFileSystem(TTerminal * ATerminal) : TCustomFileSystem(ATerminal), FActive(false), FHasTrailingSlash(false), FNeonSession(NULL), FUploading(false), FDownloading(false), FInitialHandshake(false), FIgnoreAuthenticationFailure(iafNo) { FFileSystemInfo.ProtocolBaseName = CONST_WEBDAV_PROTOCOL_BASE_NAME; FFileSystemInfo.ProtocolName = FFileSystemInfo.ProtocolBaseName; } //--------------------------------------------------------------------------- __fastcall TWebDAVFileSystem::~TWebDAVFileSystem() { UnregisterFromDebug(); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::Open() { RegisterForDebug(); FCurrentDirectory = L""; FHasTrailingSlash = true; FStoredPasswordTried = false; FTlsVersionStr = L""; TSessionData * Data = FTerminal->SessionData; FSessionInfo.LoginTime = Now(); bool Ssl = (FTerminal->SessionData->Ftps != ftpsNone); if (Ssl) { FSessionInfo.SecurityProtocolName = LoadStr(FTPS_IMPLICIT); } UnicodeString HostName = Data->HostNameExpanded; size_t Port = Data->PortNumber; UnicodeString ProtocolName = !Ssl ? WebDAVProtocol : WebDAVSProtocol; UnicodeString Path = Data->RemoteDirectory; // PathToNeon is not used as we cannot call AbsolutePath here UnicodeString EscapedPath = UnicodeString(UTF8String(PathEscape(StrToNeon(Path)).c_str())); UnicodeString Url = FORMAT(L"%s://%s:%d%s", (ProtocolName, HostName, Port, EscapedPath)); FTerminal->Information(LoadStr(STATUS_CONNECT), true); FActive = false; try { OpenUrl(Url); } catch (Exception & E) { CloseNeonSession(); FTerminal->Closed(); FTerminal->FatalError(&E, LoadStr(CONNECTION_FAILED)); } FActive = true; } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::ParsePathFromUrl(const UnicodeString & Url) { UnicodeString Result; ne_uri ParsedUri; if (ne_uri_parse(StrToNeon(Url), &ParsedUri) == 0) { Result = StrFromNeon(PathUnescape(ParsedUri.path)); ne_uri_free(&ParsedUri); } return Result; } //--------------------------------------------------------------------------- void TWebDAVFileSystem::OpenUrl(const UnicodeString & Url) { UnicodeString CorrectedUrl; NeonClientOpenSessionInternal(CorrectedUrl, Url); if (CorrectedUrl.IsEmpty()) { CorrectedUrl = Url; } AnsiString ParsedPath = ParsePathFromUrl(CorrectedUrl); if (!ParsedPath.IsEmpty()) { // this is most likely pointless as it get overwritten by // call to ChangeDirectory() from TTerminal::DoStartup FCurrentDirectory = ParsedPath; } } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonClientOpenSessionInternal(UnicodeString & CorrectedUrl, UnicodeString Url) { std::unique_ptr AttemptedUrls(CreateSortedStringList()); int AttemptsLeft = MAX_REDIRECT_ATTEMPTS; while (true) { CorrectedUrl = L""; NeonOpen(CorrectedUrl, Url); // No error and no corrected URL? We're done here. if (CorrectedUrl.IsEmpty()) { break; } if (AttemptsLeft == 0) { throw Exception(LoadStr(TOO_MANY_REDIRECTS)); } else { CloseNeonSession(); AttemptsLeft--; // Our caller will want to know what our final corrected URL was. // Make sure we've not attempted this URL before. if (AttemptedUrls->IndexOf(CorrectedUrl) >= 0) { throw Exception(LoadStr(REDIRECT_LOOP)); } AttemptedUrls->Add(CorrectedUrl); Url = CorrectedUrl; } } CorrectedUrl = Url; } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonOpen(UnicodeString & CorrectedUrl, const UnicodeString & Url) { ne_uri uri; if (ne_uri_parse(StrToNeon(Url), &uri) != 0) { // should never happen throw Exception(FMTLOAD(INVALID_URL, (Url))); } // Will never happen for initial URL, but may happen for redirect URLs if (uri.port == 0) { uri.port = ne_uri_defaultport(uri.scheme); } TSessionData * Data = FTerminal->SessionData; assert(FNeonSession == NULL); FNeonSession = ne_session_create(uri.scheme, uri.host, uri.port); UTF8String Path = uri.path; ne_uri_free(&uri); ne_set_session_private(FNeonSession, SESSION_FS_KEY, this); // Other flags: // NE_DBG_FLUSH - used only in native implementation of ne_debug // NE_DBG_HTTPPLAIN - log credentials in HTTP authentication ne_debug_mask = NE_DBG_SOCKET | NE_DBG_HTTP | NE_DBG_XML | // detail NE_DBG_HTTPAUTH | NE_DBG_LOCKS | // very details NE_DBG_XMLPARSE | // very details NE_DBG_HTTPBODY | // very details NE_DBG_SSL; if (Data->ProxyMethod != ::pmNone) { if ((Data->ProxyMethod == pmSocks4) || (Data->ProxyMethod == pmSocks5)) { enum ne_sock_sversion vers = (Data->ProxyMethod == pmSocks4) ? NE_SOCK_SOCKSV4A : NE_SOCK_SOCKSV5; ne_session_socks_proxy(FNeonSession, vers, StrToNeon(Data->ProxyHost), Data->ProxyPort, StrToNeon(Data->ProxyUsername), StrToNeon(Data->ProxyPassword)); } else if (!Data->ProxyHost.IsEmpty()) { ne_session_proxy(FNeonSession, StrToNeon(Data->ProxyHost), Data->ProxyPort); if (!Data->ProxyUsername.IsEmpty()) { ne_set_proxy_auth(FNeonSession, NeonProxyAuth, this); } else { // Enable (only) the Negotiate scheme for proxy // authentication, if no username/password is // configured. ne_add_proxy_auth(FNeonSession, NE_AUTH_NEGOTIATE, NULL, NULL); } } } ne_set_read_timeout(FNeonSession, Data->Timeout); ne_set_connect_timeout(FNeonSession, Data->Timeout); ne_redirect_register(FNeonSession); ne_set_useragent(FNeonSession, StrToNeon(FORMAT(L"%s/%s", (AppNameString(), Configuration->Version)))); unsigned int NeonAuthTypes = NE_AUTH_BASIC | NE_AUTH_DIGEST; if (Data->Ftps != ftpsNone) { NeonAuthTypes |= NE_AUTH_NEGOTIATE; } ne_add_server_auth(FNeonSession, NeonAuthTypes, NeonRequestAuth, this); if (Data->Ftps != ftpsNone) { // When the CA certificate or server certificate has // verification problems, neon will call our verify function before // outright rejection of the connection. ne_ssl_set_verify(FNeonSession, NeonServerSSLCallback, this); ne_ssl_trust_default_ca(FNeonSession); } ne_set_notifier(FNeonSession, NeonNotifier, this); ne_hook_create_request(FNeonSession, NeonCreateRequest, this); ne_hook_pre_send(FNeonSession, NeonPreSend, this); ne_hook_post_send(FNeonSession, NeonPostSend, this); TAutoFlag Flag(FInitialHandshake); ExchangeCapabilities(Path.c_str(), CorrectedUrl); } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::GetRedirectUrl() { const ne_uri * RedirectUri = ne_redirect_location(FNeonSession); char * RedirectUriStr = ne_uri_unparse(RedirectUri); UnicodeString Result = StrFromNeon(RedirectUriStr); ne_free(RedirectUriStr); FTerminal->LogEvent(FORMAT(L"Redirected to \"%s\".", (Result))); return Result; } //--------------------------------------------------------------------------- void TWebDAVFileSystem::ExchangeCapabilities(const char * Path, UnicodeString & CorrectedUrl) { unsigned int Capabilities = 0; ClearNeonError(); int NeonStatus = ne_options2(FNeonSession, Path, &Capabilities); if (NeonStatus == NE_REDIRECT) { CorrectedUrl = GetRedirectUrl(); } else if (NeonStatus == NE_OK) { if (Capabilities > 0) { UnicodeString Str; unsigned int Capability = 0x01; while (Capabilities > 0) { if (FLAGSET(Capabilities, Capability)) { AddToList(Str, StrFromNeon(ne_capability_name(Capability)), L", "); Capabilities -= Capability; } Capability <<= 1; } FTerminal->LogEvent(FORMAT(L"Server capabilities: %s", (Str))); FFileSystemInfo.AdditionalInfo += LoadStr(WEBDAV_EXTENSION_INFO) + sLineBreak + L" " + Str + sLineBreak; } } else { CheckStatus(NeonStatus); } FTerminal->SaveCapabilities(FFileSystemInfo); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CloseNeonSession() { if (FNeonSession != NULL) { ne_session_destroy(FNeonSession); FNeonSession = NULL; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::Close() { assert(FActive); CloseNeonSession(); FTerminal->Closed(); FActive = false; UnregisterFromDebug(); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::RegisterForDebug() { TGuard Guard(DebugSection.get()); FileSystems.insert(this); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::UnregisterFromDebug() { TGuard Guard(DebugSection.get()); FileSystems.erase(this); } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::GetActive() { return FActive; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CollectUsage() { if (!FTlsVersionStr.IsEmpty()) { FTerminal->CollectTlsUsage(FTlsVersionStr); } UnicodeString RemoteSystem = FFileSystemInfo.RemoteSystem; if (ContainsText(RemoteSystem, L"Microsoft-IIS")) { FTerminal->Configuration->Usage->Inc(L"OpenedSessionsWebDAVIIS"); } else if (ContainsText(RemoteSystem, L"IT Hit WebDAV Server")) { FTerminal->Configuration->Usage->Inc(L"OpenedSessionsWebDAVITHit"); } // e.g. brickftp.com else if (ContainsText(RemoteSystem, L"nginx")) { FTerminal->Configuration->Usage->Inc(L"OpenedSessionsWebDAVNginx"); } else { // We also know OpenDrive, Yandex, iFiles (iOS), Swapper (iOS), SafeSync FTerminal->Configuration->Usage->Inc(L"OpenedSessionsWebDAVOther"); } } //--------------------------------------------------------------------------- const TSessionInfo & __fastcall TWebDAVFileSystem::GetSessionInfo() { return FSessionInfo; } //--------------------------------------------------------------------------- const TFileSystemInfo & __fastcall TWebDAVFileSystem::GetFileSystemInfo(bool /*Retrieve*/) { return FFileSystemInfo; } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::TemporaryTransferFile(const UnicodeString & /*FileName*/) { return false; } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::GetStoredCredentialsTried() { return FStoredPasswordTried; } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::GetUserName() { return FUserName; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::Idle() { // noop } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::AbsolutePath(const UnicodeString Path, bool /*Local*/) { bool AddTrailingBackslash; if (Path == L"/") { // does not really matter as path "/" is still "/" when absolute, // no slash needed AddTrailingBackslash = FHasTrailingSlash; } else { AddTrailingBackslash = (Path[Path.Length()] == L'/'); } UnicodeString Result = ::AbsolutePath(GetCurrentDirectory(), Path); // We must preserve trailing slash, because particularly for mod_dav, // it really matters if the slash in there or not if (AddTrailingBackslash) { Result = UnixIncludeTrailingBackslash(Result); } return Result; } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::IsCapable(int Capability) const { assert(FTerminal); switch (Capability) { case fcRename: case fcRemoteMove: case fcMoveToQueue: case fcPreservingTimestampUpload: case fcCheckingSpaceAvailable: // Only to make double-click on file edit/open the file, // instead of trying to open it as directory case fcResolveSymlink: return true; case fcUserGroupListing: case fcModeChanging: case fcModeChangingUpload: case fcGroupChanging: case fcOwnerChanging: case fcAnyCommand: case fcShellAnyCommand: case fcHardLink: case fcSymbolicLink: case fcTextMode: case fcNativeTextMode: case fcNewerOnlyUpload: case fcTimestampChanging: case fcLoadingAdditionalProperties: case fcIgnorePermErrors: case fcCalculatingChecksum: case fcSecondaryShell: case fcGroupOwnerChangingByID: case fcRemoveCtrlZUpload: case fcRemoveBOMUpload: case fcRemoteCopy: return false; default: FAIL; return false; } } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::GetCurrentDirectory() { return FCurrentDirectory; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::DoStartup() { FTerminal->SetExceptionOnFail(true); // retrieve initialize working directory to save it as home directory ReadCurrentDirectory(); FTerminal->SetExceptionOnFail(false); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ClearNeonError() { FCancelled = false; FAuthenticationRequested = false; ne_set_error(FNeonSession, ""); } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::GetNeonError() { return StrFromNeon(ne_get_error(FNeonSession)); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CheckStatus(int NeonStatus) { if (NeonStatus == NE_OK) { // noop } else if ((NeonStatus == NE_ERROR) && FCancelled) { FCancelled = false; Abort(); } else { UnicodeString NeonError = GetNeonError(); UnicodeString Error; switch (NeonStatus) { case NE_ERROR: // noop assert(!NeonError.IsEmpty()); Error = NeonError; NeonError = L""; break; case NE_LOOKUP: Error = ReplaceStr(LoadStr(NET_TRANSL_HOST_NOT_EXIST2), L"%HOST%", FTerminal->SessionData->HostNameExpanded); break; case NE_AUTH: Error = LoadStr(AUTHENTICATION_FAILED); break; case NE_PROXYAUTH: Error = LoadStr(PROXY_AUTHENTICATION_FAILED); break; case NE_CONNECT: Error = LoadStr(CONNECTION_FAILED); break; case NE_TIMEOUT: Error = ReplaceStr(LoadStr(NET_TRANSL_TIMEOUT2), L"%HOST%", FTerminal->SessionData->HostNameExpanded); break; case NE_REDIRECT: { char * Uri = ne_uri_unparse(ne_redirect_location(FNeonSession)); Error = FMTLOAD(REQUEST_REDIRECTED, (Uri)); ne_free(Uri); } break; case NE_FAILED: // never used by neon as of 0.30.0 case NE_RETRY: // not sure if this is a public API default: FAIL; Error = FORMAT(L"Unexpected neon error %d", (NeonStatus)); break; } throw ExtException(Error, NeonError); } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::LookupUsersGroups() { FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ReadCurrentDirectory() { if (FCachedDirectoryChange.IsEmpty()) { FCurrentDirectory = FCurrentDirectory.IsEmpty() ? UnicodeString(L"/") : FCurrentDirectory; } else { FCurrentDirectory = FCachedDirectoryChange; FCachedDirectoryChange = L""; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::HomeDirectory() { ChangeDirectory(L"/"); } //--------------------------------------------------------------------------- UnicodeString __fastcall TWebDAVFileSystem::DirectoryPath(UnicodeString Path) { if (FHasTrailingSlash) { Path = ::UnixIncludeTrailingBackslash(Path); } return Path; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::TryOpenDirectory(UnicodeString Directory) { Directory = DirectoryPath(Directory); FTerminal->LogEvent(FORMAT(L"Trying to open directory \"%s\".", (Directory))); TRemoteFile * File; ReadFile(Directory, File); delete File; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::AnnounceFileListOperation() { // noop } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ChangeDirectory(const UnicodeString ADirectory) { UnicodeString Path = AbsolutePath(ADirectory, false); // to verify existence of directory try to open it TryOpenDirectory(Path); // if open dir did not fail, directory exists -> success. FCachedDirectoryChange = Path; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CachedChangeDirectory(const UnicodeString Directory) { FCachedDirectoryChange = UnixExcludeTrailingBackslash(Directory); } //--------------------------------------------------------------------------- struct TReadFileData { TWebDAVFileSystem * FileSystem; TRemoteFile * File; TRemoteFileList * FileList; }; //--------------------------------------------------------------------------- int __fastcall TWebDAVFileSystem::ReadDirectoryInternal( const UnicodeString & Path, TRemoteFileList * FileList) { TReadFileData Data; Data.FileSystem = this; Data.File = NULL; Data.FileList = FileList; ClearNeonError(); return ne_simple_propfind(FNeonSession, PathToNeon(Path), NE_DEPTH_ONE, NULL, NeonPropsResult, &Data); } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::IsValidRedirect(int NeonStatus, UnicodeString & Path) { bool Result = (NeonStatus == NE_REDIRECT); if (Result) { // What PathToNeon does UnicodeString OriginalPath = AbsolutePath(Path, false); // Handle one-step redirect // (for more steps we would have to implement loop detection). // This is mainly to handle "folder" => "folder/" redirects of Apache/mod_dav. UnicodeString RedirectUrl = GetRedirectUrl(); // We should test if the redirect is not for another server, // though not sure how to do this reliably (domain aliases, IP vs. domain, etc.) UnicodeString RedirectPath = ParsePathFromUrl(RedirectUrl); Result = !RedirectPath.IsEmpty() && (RedirectPath != OriginalPath); if (Result) { Path = RedirectPath; } } return Result; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ReadDirectory(TRemoteFileList * FileList) { UnicodeString Path = DirectoryPath(FileList->Directory); TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); int NeonStatus = ReadDirectoryInternal(Path, FileList); if (IsValidRedirect(NeonStatus, Path)) { NeonStatus = ReadDirectoryInternal(Path, FileList); } CheckStatus(NeonStatus); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ReadSymlink(TRemoteFile * /*SymlinkFile*/, TRemoteFile *& /*File*/) { // we never set SymLink flag, so we should never get here FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ReadFile(const UnicodeString FileName, TRemoteFile *& File) { CustomReadFile(FileName, File, NULL); } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonPropsResult( void * UserData, const ne_uri * Uri, const ne_prop_result_set * Results) { UTF8String UnescapedUri = PathUnescape(Uri->path).c_str(); UnicodeString Path = StrFromNeon(UnescapedUri); Path = UnixExcludeTrailingBackslash(Path); TReadFileData & Data = *static_cast(UserData); if (Data.FileList != NULL) { UnicodeString FileListPath = PathToNeonStatic(Data.FileSystem, Data.FileList->Directory); if (UnixSamePath(Path, FileListPath)) { Path = UnixIncludeTrailingBackslash(Path) + L".."; } std::unique_ptr File(new TRemoteFile(NULL)); File->Terminal = Data.FileSystem->FTerminal; Data.FileSystem->ParsePropResultSet(File.get(), Path, Results); Data.FileList->AddFile(File.release()); } else { Data.FileSystem->ParsePropResultSet(Data.File, Path, Results); } } //--------------------------------------------------------------------------- const char * __fastcall TWebDAVFileSystem::GetProp(const ne_prop_result_set * Results, const char * Name) { ne_propname Prop; Prop.nspace = DAV_PROP_NAMESPACE; Prop.name = Name; return ne_propset_value(Results, &Prop); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ParsePropResultSet(TRemoteFile * File, const UnicodeString & Path, const ne_prop_result_set * Results) { File->FullFileName = Path; File->FileName = UnixExtractFileName(File->FullFileName); const char * ContentLength = GetProp(Results, PROP_CONTENT_LENGTH); // some servers, for example iFiles, do not provide "getcontentlength" for folders if (ContentLength != NULL) { File->Size = StrToInt64Def(ContentLength, 0); } const char * LastModified = GetProp(Results, PROP_LAST_MODIFIED); if (ALWAYS_TRUE(LastModified != NULL)) { char WeekDay[4] = { L'\0' }; int Year = 0; char MonthStr[4] = { L'\0' }; int Day = 0; int Hour = 0; int Min = 0; int Sec = 0; #define RFC1123_FORMAT "%3s, %02d %3s %4d %02d:%02d:%02d GMT" int Filled = sscanf(LastModified, RFC1123_FORMAT, WeekDay, &Day, MonthStr, &Year, &Hour, &Min, &Sec); // we need at least a complete date if (Filled >= 4) { int Month = ParseShortEngMonthName(MonthStr); if (Month >= 1) { TDateTime Modification = EncodeDateVerbose((unsigned short)Year, (unsigned short)Month, (unsigned short)Day) + EncodeTimeVerbose((unsigned short)Hour, (unsigned short)Min, (unsigned short)Sec, 0); File->Modification = ConvertTimestampFromUTC(Modification); File->ModificationFmt = mfFull; } } } bool Collection = false; const char * ResourceType = GetProp(Results, PROP_RESOURCE_TYPE); if (ResourceType != NULL) { // property has XML value UnicodeString AResourceType = ResourceType; // this is very poor parsing if (ContainsText(ResourceType, L"Type = Collection ? FILETYPE_DIRECTORY : FILETYPE_DEFAULT; // this is MS extension (draft-hopmann-collection-props-00) const char * IsHidden = GetProp(Results, PROP_HIDDEN); if (IsHidden != NULL) { File->IsHidden = (StrToIntDef(IsHidden, 0) != 0); } } //--------------------------------------------------------------------------- int __fastcall TWebDAVFileSystem::CustomReadFileInternal(const UnicodeString FileName, TRemoteFile *& File, TRemoteFile * ALinkedByFile) { std::unique_ptr AFile(new TRemoteFile(ALinkedByFile)); TReadFileData Data; Data.FileSystem = this; Data.File = AFile.get(); Data.FileList = NULL; ClearNeonError(); int Result = ne_simple_propfind(FNeonSession, PathToNeon(FileName), NE_DEPTH_ZERO, NULL, NeonPropsResult, &Data); if (Result == NE_OK) { File = AFile.release(); } return Result; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CustomReadFile(UnicodeString FileName, TRemoteFile *& File, TRemoteFile * ALinkedByFile) { TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); int NeonStatus = CustomReadFileInternal(FileName, File, ALinkedByFile); if (IsValidRedirect(NeonStatus, FileName)) { NeonStatus = CustomReadFileInternal(FileName, File, ALinkedByFile); } CheckStatus(NeonStatus); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::DeleteFile(const UnicodeString FileName, const TRemoteFile * File, int /*Params*/, TRmSessionAction & Action) { Action.Recursive(); ClearNeonError(); TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); UnicodeString Path = File->FullFileName; if (File->IsDirectory) { Path = DirectoryPath(Path); } // WebDAV does not allow non-recursive delete: // RFC 4918, section 9.6.1: // "A client MUST NOT submit a Depth header with a DELETE on a collection with any value but infinity." // We should check that folder is empty when called with FLAGSET(Params, dfNoRecursive) CheckStatus(ne_delete(FNeonSession, PathToNeon(Path))); } //--------------------------------------------------------------------------- int __fastcall TWebDAVFileSystem::RenameFileInternal(const UnicodeString & FileName, const UnicodeString & NewName) { // 0 = no overwrite return ne_move(FNeonSession, 0, PathToNeon(FileName), PathToNeon(NewName)); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::RenameFile(const UnicodeString FileName, const UnicodeString NewName) { ClearNeonError(); TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); UnicodeString Path = FileName; int NeonStatus = RenameFileInternal(Path, NewName); if (IsValidRedirect(NeonStatus, Path)) { NeonStatus = RenameFileInternal(Path, NewName); } CheckStatus(NeonStatus); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CopyFile(const UnicodeString FileName, const UnicodeString NewName) { FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CreateDirectory(const UnicodeString DirName) { ClearNeonError(); TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); CheckStatus(ne_mkcol(FNeonSession, PathToNeon(DirName))); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CreateLink(const UnicodeString FileName, const UnicodeString PointTo, bool /*Symbolic*/) { FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ChangeFileProperties(const UnicodeString FileName, const TRemoteFile * /*File*/, const TRemoteProperties * /*Properties*/, TChmodSessionAction & /*Action*/) { FAIL; } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::LoadFilesProperties(TStrings * /*FileList*/) { FAIL; return false; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CalculateFilesChecksum(const UnicodeString & /*Alg*/, TStrings * /*FileList*/, TStrings * /*Checksums*/, TCalculatedChecksumEvent /*OnCalculatedChecksum*/) { FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::ConfirmOverwrite( const UnicodeString & SourceFullFileName, UnicodeString & TargetFileName, TFileOperationProgressType * OperationProgress, const TOverwriteFileParams * FileParams, const TCopyParamType * CopyParam, int Params) { // all = "yes to newer" int Answers = qaYes | qaNo | qaCancel | qaYesToAll | qaNoToAll | qaAll; TQueryButtonAlias Aliases[3]; Aliases[0].Button = qaAll; Aliases[0].Alias = LoadStr(YES_TO_NEWER_BUTTON); Aliases[0].GroupWith = qaYes; Aliases[0].GrouppedShiftState = TShiftState() << ssCtrl; Aliases[1].Button = qaYesToAll; Aliases[1].GroupWith = qaYes; Aliases[1].GrouppedShiftState = TShiftState() << ssShift; Aliases[2].Button = qaNoToAll; Aliases[2].GroupWith = qaNo; Aliases[2].GrouppedShiftState = TShiftState() << ssShift; TQueryParams QueryParams(qpNeverAskAgainCheck); QueryParams.Aliases = Aliases; QueryParams.AliasesCount = LENOF(Aliases); unsigned int Answer; { TSuspendFileOperationProgress Suspend(OperationProgress); Answer = FTerminal->ConfirmFileOverwrite( SourceFullFileName, TargetFileName, FileParams, Answers, &QueryParams, (OperationProgress->Side == osLocal) ? osRemote : osLocal, CopyParam, Params, OperationProgress); } switch (Answer) { case qaYes: // noop break; case qaNo: THROW_SKIP_FILE_NULL; default: FAIL; case qaCancel: if (!OperationProgress->Cancel) { OperationProgress->Cancel = csCancel; } Abort(); break; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CustomCommandOnFile(const UnicodeString FileName, const TRemoteFile * /*File*/, UnicodeString Command, int /*Params*/, TCaptureOutputEvent /*OutputEvent*/) { FAIL; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::AnyCommand(const UnicodeString Command, TCaptureOutputEvent /*OutputEvent*/) { FAIL; } //--------------------------------------------------------------------------- TStrings * __fastcall TWebDAVFileSystem::GetFixedPaths() { return NULL; } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonQuotaResult( void * UserData, const ne_uri * /*Uri*/, const ne_prop_result_set * Results) { TSpaceAvailable & SpaceAvailable = *static_cast(UserData); const char * Value = GetProp(Results, PROP_QUOTA_AVAILABLE); if (Value != NULL) { SpaceAvailable.UnusedBytesAvailableToUser = StrToInt64(StrFromNeon(Value)); const char * Value = GetProp(Results, PROP_QUOTA_USED); if (Value != NULL) { SpaceAvailable.BytesAvailableToUser = StrToInt64(StrFromNeon(Value)) + SpaceAvailable.UnusedBytesAvailableToUser; } } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::SpaceAvailable(const UnicodeString Path, TSpaceAvailable & ASpaceAvailable) { // RFC4331: http://tools.ietf.org/html/rfc4331 // This is known to be supported by: // OpenDrive: for a root drive only (and contrary to the spec, it sends the properties // unconditionally, even when not explicitly requested) // Server: Apache/2.2.17 (Fedora) // X-Powered-By: PHP/5.5.7 // X-DAV-Powered-By: OpenDrive // WWW-Authenticate: Basic realm="PHP WebDAV" // IT Hit WebDAV Server: // Server: Microsoft-HTTPAPI/1.0 // X-Engine: IT Hit WebDAV Server .Net v3.8.1877.0 (Evaluation License) // Yandex disk: // WWW-Authenticate: Basic realm="Yandex.Disk" // Server: MochiWeb/1.0 UnicodeString APath = DirectoryPath(Path); ne_propname QuotaProps[3]; memset(QuotaProps, 0, sizeof(QuotaProps)); QuotaProps[0].nspace = DAV_PROP_NAMESPACE; QuotaProps[0].name = PROP_QUOTA_AVAILABLE; QuotaProps[1].nspace = DAV_PROP_NAMESPACE; QuotaProps[1].name = PROP_QUOTA_USED; QuotaProps[2].nspace = NULL; QuotaProps[2].name = NULL; TOperationVisualizer Visualizer(FTerminal->UseBusyCursor); CheckStatus( ne_simple_propfind(FNeonSession, PathToNeon(APath), NE_DEPTH_ZERO, QuotaProps, NeonQuotaResult, &ASpaceAvailable)); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CopyToRemote(TStrings * FilesToCopy, const UnicodeString ATargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, TOnceDoneOperation & OnceDoneOperation) { assert((FilesToCopy != NULL) && (OperationProgress != NULL)); Params &= ~cpAppend; UnicodeString FileName, FileNameOnly; UnicodeString TargetDir = AbsolutePath(ATargetDir, false); UnicodeString FullTargetDir = UnixIncludeTrailingBackslash(TargetDir); intptr_t Index = 0; while ((Index < FilesToCopy->Count) && !OperationProgress->Cancel) { bool Success = false; FileName = FilesToCopy->Strings[Index]; FileNameOnly = ExtractFileName(FileName, false); try { try { if (FTerminal->SessionData->CacheDirectories) { FTerminal->DirectoryModified(TargetDir, false); if (::DirectoryExists(ApiPath(::ExtractFilePath(FileName)))) { FTerminal->DirectoryModified(FullTargetDir + FileNameOnly, true); } } SourceRobust(FileName, FullTargetDir, CopyParam, Params, OperationProgress, tfFirstLevel); Success = true; } catch (EScpSkipFile & E) { TSuspendFileOperationProgress Suspend(OperationProgress); if (!FTerminal->HandleException(&E)) { throw; } } } __finally { OperationProgress->Finish(FileName, Success, OnceDoneOperation); } Index++; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::SourceRobust(const UnicodeString FileName, const UnicodeString TargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, unsigned int Flags) { // the same in TSFTPFileSystem TUploadSessionAction Action(FTerminal->ActionLog); TRobustOperationLoop RobustLoop(FTerminal, OperationProgress); do { bool ChildError = false; try { Source(FileName, TargetDir, CopyParam, Params, OperationProgress, Flags, Action, ChildError); } catch (Exception & E) { if (!RobustLoop.TryReopen(E)) { if (!ChildError) { FTerminal->RollbackAction(Action, OperationProgress, &E); } throw; } } if (RobustLoop.ShouldRetry()) { OperationProgress->RollbackTransfer(); Action.Restart(); // prevent overwrite confirmations // (should not be set for directories!) Params |= cpNoConfirmation; } } while (RobustLoop.Retry()); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::Source(const UnicodeString FileName, const UnicodeString TargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, unsigned int Flags, TUploadSessionAction & Action, bool & ChildError) { Action.FileName(ExpandUNCFileName(FileName)); OperationProgress->SetFile(FileName, false); if (!FTerminal->AllowLocalFileTransfer(FileName, CopyParam, OperationProgress)) { THROW_SKIP_FILE_NULL; } HANDLE File; __int64 MTime; __int64 Size; int Attrs; FTerminal->OpenLocalFile(FileName, GENERIC_READ, &Attrs, &File, NULL, &MTime, NULL, &Size); bool Dir = FLAGSET(Attrs, faDirectory); int FD = -1; try { OperationProgress->SetFileInProgress(); if (Dir) { Action.Cancel(); DirectorySource(IncludeTrailingBackslash(FileName), TargetDir, Attrs, CopyParam, Params, OperationProgress, Flags); } else { UnicodeString DestFileName = CopyParam->ChangeFileName(ExtractFileName(FileName), osLocal, FLAGSET(Flags, tfFirstLevel)); FTerminal->LogEvent(FORMAT(L"Copying \"%s\" to remote directory started.", (FileName))); OperationProgress->SetLocalSize(Size); // Suppose same data size to transfer as to read // (not true with ASCII transfer) OperationProgress->SetTransferSize(OperationProgress->LocalSize); OperationProgress->TransferingFile = false; UnicodeString DestFullName = TargetDir + DestFileName; TRemoteFile * RemoteFile = NULL; try { TValueRestorer IgnoreAuthenticationFailureRestorer(FIgnoreAuthenticationFailure); FIgnoreAuthenticationFailure = iafWaiting; // this should not throw CustomReadFileInternal(DestFullName, RemoteFile, NULL); } catch (...) { if (!FTerminal->Active) { throw; } } TDateTime Modification = UnixToDateTime(MTime, FTerminal->SessionData->DSTMode); if (RemoteFile != NULL) { TOverwriteFileParams FileParams; FileParams.SourceSize = Size; FileParams.SourceTimestamp = Modification; FileParams.DestSize = RemoteFile->Size; FileParams.DestTimestamp = RemoteFile->Modification; delete RemoteFile; ConfirmOverwrite(FileName, DestFileName, OperationProgress, &FileParams, CopyParam, Params); } DestFullName = TargetDir + DestFileName; // only now, we know the final destination // (not really true as we do not support changing file name on overwrite dialog) Action.Destination(DestFullName); FILE_OPERATION_LOOP_BEGIN { SetFilePointer(File, 0, NULL, FILE_BEGIN); FD = _open_osfhandle((intptr_t)File, O_BINARY); if (FD < 0) { THROW_SKIP_FILE_NULL; } TAutoFlag UploadingFlag(FUploading); ClearNeonError(); CheckStatus(ne_put(FNeonSession, PathToNeon(DestFullName), FD)); } FILE_OPERATION_LOOP_END(FMTLOAD(TRANSFER_ERROR, (FileName))); if (CopyParam->PreserveTime) { FTerminal->LogEvent(FORMAT(L"Preserving timestamp [%s]", (StandardTimestamp(Modification)))); TTouchSessionAction TouchAction(FTerminal->ActionLog, DestFullName, Modification); try { TDateTime ModificationUTC = ConvertTimestampToUTC(Modification); TFormatSettings FormatSettings = GetEngFormatSettings(); UnicodeString LastModified = FormatDateTime(L"ddd, d mmm yyyy hh:nn:ss 'GMT'", ModificationUTC, FormatSettings); UTF8String NeonLastModified(LastModified); // second element is "NULL-terminating" ne_proppatch_operation Operations[2]; memset(Operations, 0, sizeof(Operations)); ne_propname LastModifiedProp; LastModifiedProp.nspace = DAV_PROP_NAMESPACE; LastModifiedProp.name = PROP_LAST_MODIFIED; Operations[0].name = &LastModifiedProp; Operations[0].type = ne_propset; Operations[0].value = NeonLastModified.c_str(); int Status = ne_proppatch(FNeonSession, PathToNeon(DestFullName), Operations); if (Status == NE_ERROR) { FTerminal->LogEvent(FORMAT(L"Preserving timestamp failed, ignoring: %s", (GetNeonError()))); // Ignore errors as major WebDAV servers (like IIS), do not support // changing getlastmodified. // The only server we found that supports this is TradeMicro SafeSync. // But it announces itself as "Server: Apache", // so it's not reliably autodetect the support. TouchAction.Cancel(); } else { CheckStatus(Status); } } catch (Exception & E) { TouchAction.Rollback(&E); ChildError = true; throw; } } FTerminal->LogFileDone(OperationProgress); } } __finally { if (FD >= 0) { // _close calls CloseHandle internally (even doc states, we should not call CloseHandle), // but it crashes code guard _close(FD); } else if (File != NULL) { CloseHandle(File); } } // TODO : Delete also read-only files. if (FLAGSET(Params, cpDelete)) { if (!Dir) { FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(::DeleteFile(ApiPath(FileName).c_str())); } FILE_OPERATION_LOOP_END(FMTLOAD(DELETE_LOCAL_FILE_ERROR, (FileName))); } } else if (CopyParam->ClearArchive && FLAGSET(Attrs, faArchive)) { FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(FileSetAttr(ApiPath(FileName), Attrs & ~faArchive) == 0); } FILE_OPERATION_LOOP_END(FMTLOAD(CANT_SET_ATTRS, (FileName))); } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::DirectorySource(const UnicodeString DirectoryName, const UnicodeString TargetDir, int Attrs, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, unsigned int Flags) { UnicodeString DestDirectoryName = CopyParam->ChangeFileName( ExtractFileName(ExcludeTrailingBackslash(DirectoryName)), osLocal, FLAGSET(Flags, tfFirstLevel)); UnicodeString DestFullName = UnixIncludeTrailingBackslash(TargetDir + DestDirectoryName); // create DestFullName if it does not exist if (!FTerminal->FileExists(DestFullName)) { TRemoteProperties Properties; if (CopyParam->PreserveRights) { Properties.Valid = TValidProperties() << vpRights; Properties.Rights = CopyParam->RemoteFileRights(Attrs); } FTerminal->CreateDirectory(DestFullName, &Properties); } OperationProgress->SetFile(DirectoryName); int FindAttrs = faReadOnly | faHidden | faSysFile | faDirectory | faArchive; TSearchRecChecked SearchRec; bool FindOK; FILE_OPERATION_LOOP_BEGIN { FindOK = (FindFirstChecked(DirectoryName + L"*.*", FindAttrs, SearchRec) == 0); } FILE_OPERATION_LOOP_END(FMTLOAD(LIST_DIR_ERROR, (DirectoryName))); try { while (FindOK && !OperationProgress->Cancel) { UnicodeString FileName = DirectoryName + SearchRec.Name; try { if ((SearchRec.Name != L".") && (SearchRec.Name != L"..")) { SourceRobust(FileName, DestFullName, CopyParam, Params, OperationProgress, Flags & ~(tfFirstLevel)); } } catch (EScpSkipFile & E) { // If ESkipFile occurs, just log it and continue with next file TSuspendFileOperationProgress Suspend(OperationProgress); // here a message to user was displayed, which was not appropriate // when user refused to overwrite the file in subdirectory. // hopefully it won't be missing in other situations. if (!FTerminal->HandleException(&E)) { throw; } } FILE_OPERATION_LOOP_BEGIN { FindOK = (FindNextChecked(SearchRec) == 0); } FILE_OPERATION_LOOP_END(FMTLOAD(LIST_DIR_ERROR, (DirectoryName))); } } __finally { FindClose(SearchRec); } // TODO : Delete also read-only directories. // TODO : Show error message on failure. if (!OperationProgress->Cancel) { if (FLAGSET(Params, cpDelete)) { RemoveDir(ApiPath(DirectoryName)); } else if (CopyParam->ClearArchive && FLAGSET(Attrs, faArchive)) { FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(FileSetAttr(ApiPath(DirectoryName), Attrs & ~faArchive) == 0); } FILE_OPERATION_LOOP_END(FMTLOAD(CANT_SET_ATTRS, (DirectoryName))); } } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::CopyToLocal(TStrings * FilesToCopy, const UnicodeString TargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, TOnceDoneOperation & OnceDoneOperation) { Params &= ~cpAppend; UnicodeString FullTargetDir = ::IncludeTrailingBackslash(TargetDir); int Index = 0; while (Index < FilesToCopy->Count && !OperationProgress->Cancel) { UnicodeString FileName = FilesToCopy->Strings[Index]; const TRemoteFile * File = dynamic_cast(FilesToCopy->Objects[Index]); bool Success = false; try { try { SinkRobust(AbsolutePath(FileName, false), File, FullTargetDir, CopyParam, Params, OperationProgress, tfFirstLevel); Success = true; } catch (EScpSkipFile & E) { TSuspendFileOperationProgress Suspend(OperationProgress); if (!FTerminal->HandleException(&E)) { throw; } } } __finally { OperationProgress->Finish(FileName, Success, OnceDoneOperation); } Index++; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::SinkRobust(const UnicodeString FileName, const TRemoteFile * File, const UnicodeString TargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, unsigned int Flags) { // the same in TSFTPFileSystem TDownloadSessionAction Action(FTerminal->ActionLog); TRobustOperationLoop RobustLoop(FTerminal, OperationProgress); do { bool ChildError = false; try { Sink(FileName, File, TargetDir, CopyParam, Params, OperationProgress, Flags, Action, ChildError); } catch (Exception & E) { if (!RobustLoop.TryReopen(E)) { if (!ChildError) { FTerminal->RollbackAction(Action, OperationProgress, &E); } throw; } } if (RobustLoop.ShouldRetry()) { OperationProgress->RollbackTransfer(); Action.Restart(); assert(File != NULL); if (!File->IsDirectory) { // prevent overwrite confirmations Params |= cpNoConfirmation; } } } while (RobustLoop.Retry()); } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonCreateRequest( ne_request * Request, void * UserData, const char * /*Method*/, const char * /*Uri*/) { TWebDAVFileSystem * FileSystem = static_cast(UserData); ne_set_request_private(Request, SESSION_FS_KEY, FileSystem); ne_add_response_body_reader(Request, NeonBodyAccepter, NeonBodyReader, Request); } //--------------------------------------------------------------------------- void TWebDAVFileSystem::NeonPreSend( ne_request * Request, void * UserData, ne_buffer * Header) { TWebDAVFileSystem * FileSystem = static_cast(UserData); if (FileSystem->FDownloading) { // Needed by IIS server to make it download source code, not code output, // and mainly to even allow downloading file with unregistered extensions. // Without it files like .001 return 404 (Not found) HTTP code. // http://msdn.microsoft.com/en-us/library/cc250098.aspx // http://msdn.microsoft.com/en-us/library/cc250216.aspx // http://lists.manyfish.co.uk/pipermail/neon/2012-April/001452.html // It's also supported by Oracle server: // https://docs.oracle.com/cd/E19146-01/821-1828/gczya/index.html // We do not know yet of any server that fails when the header is used, // so it's added unconditionally. ne_buffer_zappend(Header, "Translate: f\r\n"); } if (FileSystem->FTerminal->Log->Logging) { const char * Buffer; size_t Size; if (ne_get_request_body_buffer(Request, &Buffer, &Size)) { // all neon request types that use ne_add_request_header // use XML content-type, so it's text-based assert(ContainsStr(AnsiString(Header->data, Header->used), "Content-Type: " NE_XML_MEDIA_TYPE)); FileSystem->FTerminal->Log->Add(llInput, UnicodeString(UTF8String(Buffer, Size))); } } if (FileSystem->FUploading) { ne_set_request_body_provider_pre(Request, FileSystem->NeonUploadBodyProvider, FileSystem); } FileSystem->FResponse = L""; } //--------------------------------------------------------------------------- int TWebDAVFileSystem::NeonPostSend(ne_request * /*Req*/, void * UserData, const ne_status * /*Status*/) { TWebDAVFileSystem * FileSystem = static_cast(UserData); if (!FileSystem->FResponse.IsEmpty()) { FileSystem->FTerminal->Log->Add(llOutput, FileSystem->FResponse); } return NE_OK; } //--------------------------------------------------------------------------- ssize_t TWebDAVFileSystem::NeonUploadBodyProvider(void * UserData, char * /*Buffer*/, size_t /*BufLen*/) { TWebDAVFileSystem * FileSystem = static_cast(UserData); ssize_t Result; if (FileSystem->CancelTransfer()) { Result = -1; } else { Result = 1; } return Result; } //--------------------------------------------------------------------------- static void __fastcall AddHeaderValueToList(UnicodeString & List, ne_request * Request, const char * Name) { const char * Value; Value = ne_get_response_header(Request, Name); if (Value != NULL) { AddToList(List, StrFromNeon(Value), L"; "); } } //--------------------------------------------------------------------------- int TWebDAVFileSystem::NeonBodyAccepter(void * UserData, ne_request * Request, const ne_status * Status) { assert(UserData == Request); TWebDAVFileSystem * FileSystem = static_cast(ne_get_request_private(Request, SESSION_FS_KEY)); bool AuthenticationFailed = (Status->code == 401) && FileSystem->FAuthenticationRequested; bool AuthenticationNeeded = (Status->code == 401) && !FileSystem->FAuthenticationRequested; if (FileSystem->FInitialHandshake) { UnicodeString Line; if (AuthenticationNeeded) { Line = LoadStr(STATUS_AUTHENTICATE); } else if (AuthenticationFailed) { Line = LoadStr(FTP_ACCESS_DENIED); } else if (Status->klass == 2) { Line = LoadStr(STATUS_AUTHENTICATED); } if (!Line.IsEmpty()) { FileSystem->FTerminal->Information(Line, true); } UnicodeString RemoteSystem; // Used by IT Hit WebDAV Server: // Server: Microsoft-HTTPAPI/1.0 // X-Engine: IT Hit WebDAV Server .Net v3.8.1877.0 (Evaluation License) AddHeaderValueToList(RemoteSystem, Request, "X-Engine"); // Used by OpenDrive: // Server: Apache/2.2.17 (Fedora) // X-Powered-By: PHP/5.5.7 // X-DAV-Powered-By: OpenDrive AddHeaderValueToList(RemoteSystem, Request, "X-DAV-Powered-By"); // Used by IIS: // Server: Microsoft-IIS/8.5 AddHeaderValueToList(RemoteSystem, Request, "Server"); // Not really useful. // Can be e.g. "PleskLin" AddHeaderValueToList(RemoteSystem, Request, "X-Powered-By"); FileSystem->FFileSystemInfo.RemoteSystem = RemoteSystem; } // When we explicitly fail authentication of request // with FIgnoreAuthenticationFailure flag (after it failed with password), // neon resets its internal password store and tries the next request // without calling our authentication hook first // (note AuthenticationFailed vs. AuthenticationNeeded) // what likely fails, but we do not want to reset out password // (as it was not even tried yet for this request). if (AuthenticationFailed) { if (FileSystem->FIgnoreAuthenticationFailure == iafNo) { FileSystem->FPassword = RawByteString(); } else { FileSystem->FIgnoreAuthenticationFailure = iafPasswordFailed; } } return ne_accept_2xx(UserData, Request, Status); } //--------------------------------------------------------------------------- bool __fastcall TWebDAVFileSystem::CancelTransfer() { bool Result = false; if ((FUploading || FDownloading) && (FTerminal->OperationProgress != NULL) && (FTerminal->OperationProgress->Cancel != csContinue)) { FCancelled = true; Result = true; } return Result; } //--------------------------------------------------------------------------- int TWebDAVFileSystem::NeonBodyReader(void * UserData, const char * Buf, size_t Len) { ne_request * Request = static_cast(UserData); TWebDAVFileSystem * FileSystem = static_cast(ne_get_request_private(Request, SESSION_FS_KEY)); if (FileSystem->FTerminal->Log->Logging) { ne_content_type ContentType; if (ne_get_content_type(Request, &ContentType) == 0) { // The main point of the content-type check was to exclude // GET responses (with file contents). // But this won't work when downloading text files that have text // content type on their own, hence the additional not-downloading test. if (!FileSystem->FDownloading && ((ne_strcasecmp(ContentType.type, "text") == 0) || media_type_is_xml(&ContentType))) { UnicodeString Content = UnicodeString(UTF8String(Buf, Len)).Trim(); FileSystem->FResponse += Content; } ne_free(ContentType.value); } } int Result = FileSystem->CancelTransfer() ? 1 : 0; return Result; } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::Sink(const UnicodeString FileName, const TRemoteFile * File, const UnicodeString TargetDir, const TCopyParamType * CopyParam, int Params, TFileOperationProgressType * OperationProgress, unsigned int Flags, TDownloadSessionAction & Action, bool & ChildError) { UnicodeString FileNameOnly = UnixExtractFileName(FileName); Action.FileName(FileName); assert(File); TFileMasks::TParams MaskParams; MaskParams.Size = File->Size; if (!CopyParam->AllowTransfer(FileName, osRemote, File->IsDirectory, MaskParams)) { FTerminal->LogEvent(FORMAT(L"File \"%s\" excluded from transfer", (FileName))); THROW_SKIP_FILE_NULL; } if (CopyParam->SkipTransfer(FileName, File->IsDirectory)) { OperationProgress->AddSkippedFileSize(File->Size); THROW_SKIP_FILE_NULL; } FTerminal->LogFileDetails(FileName, TDateTime(), File->Size); OperationProgress->SetFile(FileName); UnicodeString DestFileName = CopyParam->ChangeFileName(FileNameOnly, osRemote, FLAGSET(Flags, tfFirstLevel)); UnicodeString DestFullName = TargetDir + DestFileName; if (File->IsDirectory) { Action.Cancel(); if (ALWAYS_TRUE(!File->IsSymLink)) { FILE_OPERATION_LOOP_BEGIN { int Attrs = FileGetAttr(ApiPath(DestFullName)); if (FLAGCLEAR(Attrs, faDirectory)) { EXCEPTION; } } FILE_OPERATION_LOOP_END(FMTLOAD(NOT_DIRECTORY_ERROR, (DestFullName))); FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(ForceDirectories(ApiPath(DestFullName))); } FILE_OPERATION_LOOP_END(FMTLOAD(CREATE_DIR_ERROR, (DestFullName))); TSinkFileParams SinkFileParams; SinkFileParams.TargetDir = IncludeTrailingBackslash(DestFullName); SinkFileParams.CopyParam = CopyParam; SinkFileParams.Params = Params; SinkFileParams.OperationProgress = OperationProgress; SinkFileParams.Skipped = false; SinkFileParams.Flags = Flags & ~tfFirstLevel; FTerminal->ProcessDirectory(FileName, SinkFile, &SinkFileParams); // Do not delete directory if some of its files were skip. // Throw "skip file" for the directory to avoid attempt to deletion // of any parent directory if (FLAGSET(Params, cpDelete) && SinkFileParams.Skipped) { THROW_SKIP_FILE_NULL; } } else { // file is symlink to directory, currently do nothing, but it should be // reported to user } } else { FTerminal->LogEvent(FORMAT(L"Copying \"%s\" to local directory started.", (FileName))); if (FileExists(ApiPath(DestFullName))) { __int64 Size; __int64 MTime; FTerminal->OpenLocalFile(DestFullName, GENERIC_READ, NULL, NULL, NULL, &MTime, NULL, &Size); TOverwriteFileParams FileParams; FileParams.SourceSize = File->Size; FileParams.SourceTimestamp = File->Modification; FileParams.DestSize = Size; FileParams.DestTimestamp = UnixToDateTime(MTime, FTerminal->SessionData->DSTMode); ConfirmOverwrite(FileName, DestFileName, OperationProgress, &FileParams, CopyParam, Params); } // Suppose same data size to transfer as to write OperationProgress->SetTransferSize(File->Size); OperationProgress->SetLocalSize(OperationProgress->TransferSize); int Attrs = -1; FILE_OPERATION_LOOP_BEGIN { Attrs = FileGetAttr(ApiPath(DestFullName)); if ((Attrs >= 0) && FLAGSET(Attrs, faDirectory)) { EXCEPTION; } } FILE_OPERATION_LOOP_END(FMTLOAD(NOT_FILE_ERROR, (DestFullName))); OperationProgress->TransferingFile = false; // not set with WebDAV protocol UnicodeString FilePath = ::UnixExtractFilePath(FileName); if (FilePath.IsEmpty()) { FilePath = L"/"; } Action.Destination(ExpandUNCFileName(DestFullName)); FILE_OPERATION_LOOP_BEGIN { HANDLE LocalHandle; if (!FTerminal->CreateLocalFile(DestFullName, OperationProgress, &LocalHandle, FLAGSET(Params, cpNoConfirmation))) { THROW_SKIP_FILE_NULL; } bool DeleteLocalFile = true; int FD = -1; try { FD = _open_osfhandle((intptr_t)LocalHandle, O_BINARY); if (FD < 0) { THROW_SKIP_FILE_NULL; } TAutoFlag DownloadingFlag(FDownloading); ClearNeonError(); CheckStatus(ne_get(FNeonSession, PathToNeon(FileName), FD)); DeleteLocalFile = false; if (CopyParam->PreserveTime) { TDateTime Modification = File->Modification; FILETIME WrTime = DateTimeToFileTime(Modification, FTerminal->SessionData->DSTMode); FTerminal->LogEvent(FORMAT(L"Preserving timestamp [%s]", (StandardTimestamp(Modification)))); SetFileTime(LocalHandle, NULL, NULL, &WrTime); } } __finally { if (FD >= 0) { // _close calls CloseHandle internally (even doc states, we should not call CloseHandle), // but it crashes code guard _close(FD); } else { CloseHandle(LocalHandle); } if (DeleteLocalFile) { FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(Sysutils::DeleteFile(ApiPath(DestFullName))); } FILE_OPERATION_LOOP_END(FMTLOAD(DELETE_LOCAL_FILE_ERROR, (DestFullName))); } } } FILE_OPERATION_LOOP_END(FMTLOAD(TRANSFER_ERROR, (FileName))); if (Attrs == -1) { Attrs = faArchive; } int NewAttrs = CopyParam->LocalFileAttrs(*File->Rights); if ((NewAttrs & Attrs) != NewAttrs) { FILE_OPERATION_LOOP_BEGIN { THROWOSIFFALSE(FileSetAttr(ApiPath(DestFullName), Attrs | NewAttrs) == 0); } FILE_OPERATION_LOOP_END(FMTLOAD(CANT_SET_ATTRS, (DestFullName))); } FTerminal->LogFileDone(OperationProgress); } if (FLAGSET(Params, cpDelete)) { ChildError = true; // If file is directory, do not delete it recursively, because it should be // empty already. If not, it should not be deleted (some files were // skipped or some new files were copied to it, while we were downloading) int Params = dfNoRecursive; FTerminal->DeleteFile(FileName, File, &Params); ChildError = false; } } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::SinkFile(const UnicodeString FileName, const TRemoteFile * File, void * Param) { TSinkFileParams * Params = static_cast(Param); assert(Params->OperationProgress); try { SinkRobust(FileName, File, Params->TargetDir, Params->CopyParam, Params->Params, Params->OperationProgress, Params->Flags); } catch (EScpSkipFile & E) { TFileOperationProgressType * OperationProgress = Params->OperationProgress; Params->Skipped = true; { TSuspendFileOperationProgress Suspend(OperationProgress); if (!FTerminal->HandleException(&E)) { throw; } } if (OperationProgress->Cancel) { Abort(); } } } //--------------------------------------------------------------------------- bool TWebDAVFileSystem::VerifyCertificate(const TWebDAVCertificateData & Data) { FTerminal->LogEvent( FORMAT(L"Verifying certificate for \"%s\" with fingerprint %s and %2.2X failures", (Data.Subject, Data.Fingerprint, Data.Failures))); int Failures = Data.Failures; // We can accept only unknown certificate authority. if (FLAGSET(Data.Failures, NE_SSL_UNTRUSTED)) { unsigned char * Certificate; size_t CertificateLen = ne_unbase64(Data.AsciiCert.c_str(), &Certificate); if (CertificateLen > 0) { if (WindowsValidateCertificate(Certificate, CertificateLen)) { FTerminal->LogEvent(L"Certificate verified against Windows certificate store"); Failures &= ~NE_SSL_UNTRUSTED; } ne_free(Certificate); } } UnicodeString Summary; if (Failures == 0) { Summary = LoadStr(CERT_OK); } else { int FailuresToList = Failures; if (FLAGSET(FailuresToList, NE_SSL_NOTYETVALID)) { AddToList(Summary, LoadStr(CERT_ERR_CERT_NOT_YET_VALID), L" "); FailuresToList &= ~NE_SSL_NOTYETVALID; } if (FLAGSET(FailuresToList, NE_SSL_EXPIRED)) { AddToList(Summary, LoadStr(CERT_ERR_CERT_HAS_EXPIRED), L" "); FailuresToList &= ~NE_SSL_EXPIRED; } // NEON checks certificate host name on its own if (FLAGSET(FailuresToList, NE_SSL_IDMISMATCH)) { AddToList(Summary, FMTLOAD(CERT_NAME_MISMATCH, (FTerminal->SessionData->HostNameExpanded)), L" "); FailuresToList &= ~NE_SSL_IDMISMATCH; } if (FLAGSET(FailuresToList, NE_SSL_UNTRUSTED)) { AddToList(Summary, LoadStr(CERT_ERR_CERT_UNTRUSTED), L" "); FailuresToList &= ~NE_SSL_UNTRUSTED; } if (FLAGSET(FailuresToList, NE_SSL_BADCHAIN)) { AddToList(Summary, LoadStr(CERT_ERR_BAD_CHAIN), L" "); FailuresToList &= ~NE_SSL_BADCHAIN; } // nb, NE_SSL_REVOKED is never used by OpenSSL implementation if (FailuresToList != 0) { AddToList(Summary, LoadStr(CERT_ERR_UNKNOWN), L" "); } } UnicodeString ValidityTimeFormat = L"ddddd tt"; FSessionInfo.CertificateFingerprint = Data.Fingerprint; FSessionInfo.Certificate = FMTLOAD(CERT_TEXT, ( Data.Issuer + L"\n", Data.Subject + L"\n", FormatDateTime(ValidityTimeFormat, Data.ValidFrom), FormatDateTime(ValidityTimeFormat, Data.ValidUntil), Data.Fingerprint, Summary)); bool Result = (Failures == 0); if (!Result) { if (!Result) { Result = FTerminal->VerifyCertificate( CertificateStorageKey, Data.Fingerprint, Data.Subject, Failures); } if (!Result) { TClipboardHandler ClipboardHandler; ClipboardHandler.Text = Data.Fingerprint; TQueryButtonAlias Aliases[1]; Aliases[0].Button = qaRetry; Aliases[0].Alias = LoadStr(COPY_KEY_BUTTON); Aliases[0].OnClick = &ClipboardHandler.Copy; TQueryParams Params; Params.HelpKeyword = HELP_VERIFY_CERTIFICATE; Params.NoBatchAnswers = qaYes | qaRetry; Params.Aliases = Aliases; Params.AliasesCount = LENOF(Aliases); unsigned int Answer = FTerminal->QueryUser( FMTLOAD(VERIFY_CERT_PROMPT3, (FSessionInfo.Certificate)), NULL, qaYes | qaNo | qaCancel | qaRetry, &Params, qtWarning); switch (Answer) { case qaYes: FTerminal->CacheCertificate(CertificateStorageKey, Data.Fingerprint, Failures); Result = true; break; case qaNo: Result = true; break; default: FAIL; case qaCancel: FTerminal->Configuration->Usage->Inc(L"HostNotVerified"); Result = false; break; } } } if (Result) { CollectTLSSessionInfo(); } return Result; } //------------------------------------------------------------------------------ void __fastcall TWebDAVFileSystem::CollectTLSSessionInfo() { // See also TFTPFileSystem::Open(). // Have to cache the value as the connection (the neon HTTP session, not "our" session) // can be closed as the time we need it in CollectUsage(). FTlsVersionStr = StrFromNeon(ne_ssl_get_version(FNeonSession)); AddToList(FSessionInfo.SecurityProtocolName, FTlsVersionStr, L", "); UnicodeString Cipher = StrFromNeon(ne_ssl_get_cipher(FNeonSession)); FSessionInfo.CSCipher = Cipher; FSessionInfo.SCCipher = Cipher; // see CAsyncSslSocketLayer::PrintSessionInfo() FTerminal->LogEvent(FORMAT(L"Using %s, cipher %s", (FTlsVersionStr, Cipher))); } //------------------------------------------------------------------------------ // A neon-session callback to validate the SSL certificate when the CA // is unknown (e.g. a self-signed cert), or there are other SSL // certificate problems. int TWebDAVFileSystem::NeonServerSSLCallback(void * UserData, int Failures, const ne_ssl_certificate * Certificate) { TWebDAVCertificateData Data; char Fingerprint[NE_SSL_DIGESTLEN] = {0}; if (ne_ssl_cert_digest(Certificate, Fingerprint) != 0) { strcpy(Fingerprint, ""); } Data.Fingerprint = StrFromNeon(Fingerprint); char * AsciiCert = ne_ssl_cert_export(Certificate); Data.AsciiCert = StrFromNeon(AsciiCert); ne_free(AsciiCert); char * Subject = ne_ssl_readable_dname(ne_ssl_cert_subject(Certificate)); Data.Subject = StrFromNeon(Subject); ne_free(Subject); char * Issuer = ne_ssl_readable_dname(ne_ssl_cert_issuer(Certificate)); Data.Issuer = StrFromNeon(Issuer); ne_free(Issuer); Data.Failures = Failures; time_t ValidFrom; time_t ValidUntil; ne_ssl_cert_validity_time(Certificate, &ValidFrom, &ValidUntil); Data.ValidFrom = UnixToDateTime(ValidFrom, dstmWin); Data.ValidUntil = UnixToDateTime(ValidUntil, dstmWin); TWebDAVFileSystem * FileSystem = static_cast(UserData); return FileSystem->VerifyCertificate(Data) ? NE_OK : NE_ERROR; } //------------------------------------------------------------------------------ int TWebDAVFileSystem::NeonRequestAuth( void * UserData, const char * /*Realm*/, int /*Attempt*/, char * UserName, char * Password) { TWebDAVFileSystem * FileSystem = static_cast(UserData); TTerminal * Terminal = FileSystem->FTerminal; TSessionData * SessionData = Terminal->SessionData; bool Result = true; // will ask for username only once if (FileSystem->FUserName.IsEmpty()) { if (!SessionData->UserName.IsEmpty()) { FileSystem->FUserName = SessionData->UserNameExpanded; } else { if (!Terminal->PromptUser(SessionData, pkUserName, LoadStr(USERNAME_TITLE), L"", LoadStr(USERNAME_PROMPT2), true, NE_ABUFSIZ, FileSystem->FUserName)) { // note that we never get here actually Result = false; } } } UnicodeString APassword; if (Result) { // Some servers (Gallery2 on https://g2.pixi.me/w/webdav/) // return authentication error (401) on PROPFIND request for // non-existing files. // When we already tried password before, do not try anymore. // When we did not try password before (possible only when // server does not require authentication for any previous request, // such as when read access is not authenticated), try it now, // but use special flag for the try, because when it fails // we still want to try password for future requests (such as PUT). if (!FileSystem->FPassword.IsEmpty()) { if (FileSystem->FIgnoreAuthenticationFailure == iafPasswordFailed) { // Fail PROPFIND /nonexising request... Result = false; } else { APassword = Terminal->DecryptPassword(FileSystem->FPassword); } } else { if (!SessionData->Password.IsEmpty() && !FileSystem->FStoredPasswordTried) { APassword = SessionData->Password; FileSystem->FStoredPasswordTried = true; } else { // Asking for password (or using configured password) the first time, // and asking for password. // Note that we never get false here actually Result = Terminal->PromptUser( SessionData, pkPassword, LoadStr(PASSWORD_TITLE), L"", LoadStr(PASSWORD_PROMPT), false, NE_ABUFSIZ, APassword); } if (Result) { // While neon remembers the password on its own, // we need to keep a copy in case neon store gets reset by // 401 response to PROPFIND /nonexisting on G2, see above. // Possibly we can do this for G2 servers only. FileSystem->FPassword = Terminal->EncryptPassword(APassword); } } } if (Result) { strncpy(UserName, StrToNeon(FileSystem->FUserName), NE_ABUFSIZ); strncpy(Password, StrToNeon(APassword), NE_ABUFSIZ); } FileSystem->FAuthenticationRequested = true; return Result ? 0 : -1; } //------------------------------------------------------------------------------ int TWebDAVFileSystem::NeonProxyAuth( void * UserData, const char * /*Realm*/, int Attempt, char * UserName, char * Password) { TWebDAVFileSystem * FileSystem = static_cast(UserData); TSessionData * SessionData = FileSystem->FTerminal->SessionData; int Result; // no point trying too many times as we always return the same credentials // (maybe just one would be enough) if (Attempt >= 2) { Result = 1; } else { strncpy(UserName, StrToNeon(SessionData->ProxyUsername), NE_ABUFSIZ); strncpy(Password, StrToNeon(SessionData->ProxyPassword), NE_ABUFSIZ); Result = 0; } return Result; } //------------------------------------------------------------------------------ void TWebDAVFileSystem::NeonNotifier(void * UserData, ne_session_status Status, const ne_session_status_info * StatusInfo) { TWebDAVFileSystem * FileSystem = static_cast(UserData); TFileOperationProgressType * OperationProgress = FileSystem->FTerminal->OperationProgress; // We particularly have to filter out response to "put" request, // handling that would reset the upload progress back to low number (response is small). if (((FileSystem->FUploading && (Status == ne_status_sending)) || (FileSystem->FDownloading && (Status == ne_status_recving))) && ALWAYS_TRUE(OperationProgress != NULL)) { __int64 Progress = StatusInfo->sr.progress; __int64 Diff = Progress - OperationProgress->TransferedSize; if (Diff > 0) { OperationProgress->ThrottleToCPSLimit(static_cast(Diff)); } __int64 Total = StatusInfo->sr.total; // Total size unknown if (Total < 0) { if (Diff >= 0) { OperationProgress->AddTransfered(Diff); } else { // Session total has been reset. A new stream started OperationProgress->AddTransfered(Progress); } } else { OperationProgress->SetTransferSize(Total); OperationProgress->AddTransfered(Diff); } } } //------------------------------------------------------------------------------ void __fastcall TWebDAVFileSystem::NeonDebug(const UnicodeString & Message) { FTerminal->LogEvent(Message); } //------------------------------------------------------------------------------ void __fastcall TWebDAVFileSystem::InitSslSession(ssl_st * Ssl) { // See also CAsyncSslSocketLayer::InitSSLConnection TSessionData * Data = FTerminal->SessionData; #define MASK_TLS_VERSION(VERSION, FLAG) ((Data->MinTlsVersion > VERSION) || (Data->MaxTlsVersion < VERSION) ? FLAG : 0) int Options = MASK_TLS_VERSION(ssl2, SSL_OP_NO_SSLv2) | MASK_TLS_VERSION(ssl3, SSL_OP_NO_SSLv3) | MASK_TLS_VERSION(tls10, SSL_OP_NO_TLSv1) | MASK_TLS_VERSION(tls11, SSL_OP_NO_TLSv1_1) | MASK_TLS_VERSION(tls12, SSL_OP_NO_TLSv1_2); // SSL_ctrl() with SSL_CTRL_OPTIONS adds flags (not sets) SSL_ctrl(Ssl, SSL_CTRL_OPTIONS, Options, NULL); } //--------------------------------------------------------------------------- void __fastcall TWebDAVFileSystem::GetSupportedChecksumAlgs(TStrings * /*Algs*/) { // NOOP } //------------------------------------------------------------------------------