| package server | |
| import ( | |
| "context" | |
| "crypto/subtle" | |
| "net/http" | |
| "path" | |
| "strings" | |
| "github.com/alist-org/alist/v3/internal/conf" | |
| "github.com/alist-org/alist/v3/internal/model" | |
| "github.com/alist-org/alist/v3/internal/op" | |
| "github.com/alist-org/alist/v3/internal/setting" | |
| "github.com/alist-org/alist/v3/pkg/utils" | |
| "github.com/alist-org/alist/v3/server/webdav" | |
| "github.com/gin-gonic/gin" | |
| log "github.com/sirupsen/logrus" | |
| ) | |
| var handler *webdav.Handler | |
| func WebDav(dav *gin.RouterGroup) { | |
| handler = &webdav.Handler{ | |
| Prefix: path.Join(conf.URL.Path, "/dav"), | |
| LockSystem: webdav.NewMemLS(), | |
| Logger: func(request *http.Request, err error) { | |
| log.Errorf("%s %s %+v", request.Method, request.URL.Path, err) | |
| }, | |
| } | |
| dav.Use(WebDAVAuth) | |
| dav.Any("/*path", ServeWebDAV) | |
| dav.Any("", ServeWebDAV) | |
| dav.Handle("PROPFIND", "/*path", ServeWebDAV) | |
| dav.Handle("PROPFIND", "", ServeWebDAV) | |
| dav.Handle("MKCOL", "/*path", ServeWebDAV) | |
| dav.Handle("LOCK", "/*path", ServeWebDAV) | |
| dav.Handle("UNLOCK", "/*path", ServeWebDAV) | |
| dav.Handle("PROPPATCH", "/*path", ServeWebDAV) | |
| dav.Handle("COPY", "/*path", ServeWebDAV) | |
| dav.Handle("MOVE", "/*path", ServeWebDAV) | |
| } | |
| func ServeWebDAV(c *gin.Context) { | |
| user := c.MustGet("user").(*model.User) | |
| ctx := context.WithValue(c.Request.Context(), "user", user) | |
| handler.ServeHTTP(c.Writer, c.Request.WithContext(ctx)) | |
| } | |
| func WebDAVAuth(c *gin.Context) { | |
| guest, _ := op.GetGuest() | |
| username, password, ok := c.Request.BasicAuth() | |
| if !ok { | |
| bt := c.GetHeader("Authorization") | |
| log.Debugf("[webdav auth] token: %s", bt) | |
| if strings.HasPrefix(bt, "Bearer") { | |
| bt = strings.TrimPrefix(bt, "Bearer ") | |
| token := setting.GetStr(conf.Token) | |
| if token != "" && subtle.ConstantTimeCompare([]byte(bt), []byte(token)) == 1 { | |
| admin, err := op.GetAdmin() | |
| if err != nil { | |
| log.Errorf("[webdav auth] failed get admin user: %+v", err) | |
| c.Status(http.StatusInternalServerError) | |
| c.Abort() | |
| return | |
| } | |
| c.Set("user", admin) | |
| c.Next() | |
| return | |
| } | |
| } | |
| if c.Request.Method == "OPTIONS" { | |
| c.Set("user", guest) | |
| c.Next() | |
| return | |
| } | |
| c.Writer.Header()["WWW-Authenticate"] = []string{`Basic realm="alist"`} | |
| c.Status(http.StatusUnauthorized) | |
| c.Abort() | |
| return | |
| } | |
| user, err := op.GetUserByName(username) | |
| if err != nil || user.ValidateRawPassword(password) != nil { | |
| if c.Request.Method == "OPTIONS" { | |
| c.Set("user", guest) | |
| c.Next() | |
| return | |
| } | |
| c.Status(http.StatusUnauthorized) | |
| c.Abort() | |
| return | |
| } | |
| if user.Disabled || !user.CanWebdavRead() { | |
| if c.Request.Method == "OPTIONS" { | |
| c.Set("user", guest) | |
| c.Next() | |
| return | |
| } | |
| c.Status(http.StatusForbidden) | |
| c.Abort() | |
| return | |
| } | |
| if !user.CanWebdavManage() && utils.SliceContains([]string{"PUT", "DELETE", "PROPPATCH", "MKCOL", "COPY", "MOVE"}, c.Request.Method) { | |
| if c.Request.Method == "OPTIONS" { | |
| c.Set("user", guest) | |
| c.Next() | |
| return | |
| } | |
| c.Status(http.StatusForbidden) | |
| c.Abort() | |
| return | |
| } | |
| c.Set("user", user) | |
| c.Next() | |
| } | |