mirror of
https://github.com/mickael-kerjean/filestash
synced 2025-12-06 08:22:24 +01:00
chore (maintenance): os.FileInfo implementation
This commit is contained in:
parent
84c87dd15f
commit
95c878f671
2 changed files with 12 additions and 11 deletions
|
|
@ -121,7 +121,7 @@ func (f File) Mode() os.FileMode {
|
||||||
if f.IsDir() {
|
if f.IsDir() {
|
||||||
return os.ModeDir
|
return os.ModeDir
|
||||||
}
|
}
|
||||||
return 0
|
return os.FileMode(0664)
|
||||||
}
|
}
|
||||||
func (f File) ModTime() time.Time {
|
func (f File) ModTime() time.Time {
|
||||||
if f.FTime == 0 {
|
if f.FTime == 0 {
|
||||||
|
|
|
||||||
|
|
@ -59,8 +59,8 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
|
||||||
|
|
||||||
backend, err := model.NewBackend(ctx, session)
|
backend, err := model.NewBackend(ctx, session)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'NewBackend' %+v", err)
|
Log.Debug("[auth] action=authenticate::newBackend err=%s", ferror(err))
|
||||||
Log.Info("[auth] status=failed user=%s backend=%s::%s ip=%s err=%s", username(session), session["type"], backendID(session), ip(req), ferror(err))
|
Log.Stdout("AUDIT action[fail] backend[%s] user[%s] target[%s]", session["type"], backendID(session), ip(req))
|
||||||
SendErrorResult(res, err)
|
SendErrorResult(res, err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
@ -70,15 +70,15 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
|
||||||
}); ok {
|
}); ok {
|
||||||
err := obj.OAuthToken(&ctx.Body)
|
err := obj.OAuthToken(&ctx.Body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'OAuthToken' %+v", err)
|
Log.Debug("[auth] action=authenticate::oauthtoken err=%s", ferror(err))
|
||||||
SendErrorResult(res, NewError("Can't authenticate (OAuth error)", 401))
|
SendErrorResult(res, NewError("Can't authenticate (OAuth error)", 401))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
session = model.MapStringInterfaceToMapStringString(ctx.Body)
|
session = model.MapStringInterfaceToMapStringString(ctx.Body)
|
||||||
backend, err = model.NewBackend(ctx, session)
|
backend, err = model.NewBackend(ctx, session)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'OAuthToken::NewBackend' %+v", err)
|
Log.Debug("[auth] action=authenticate::oauth::newBackend err=%s", ferror(err))
|
||||||
Log.Info("[auth] status=failed user=%s backend=%s::%s ip=%s err=%s", username(session), session["type"], backendID(session), ip(req), ferror(err))
|
Log.Stdout("AUDIT action[fail] backend[%s] user[%s] target[%s]", session["type"], username(session), ip(req))
|
||||||
SendErrorResult(res, NewError("Can't authenticate", 401))
|
SendErrorResult(res, NewError("Can't authenticate", 401))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
@ -86,20 +86,20 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
|
||||||
|
|
||||||
home, err := model.GetHome(backend, session["path"])
|
home, err := model.GetHome(backend, session["path"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'GetHome' %+v", err)
|
Log.Debug("[auth] action=authenticate::getHome err=%s", ferror(err))
|
||||||
SendErrorResult(res, ErrAuthenticationFailed)
|
SendErrorResult(res, ErrAuthenticationFailed)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
s, err := json.Marshal(session)
|
s, err := json.Marshal(session)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'Marshal' %+v", err)
|
Log.Debug("[auth] action=authenticate::marshall err=%s", ferror(err))
|
||||||
SendErrorResult(res, NewError(err.Error(), 500))
|
SendErrorResult(res, NewError(err.Error(), 500))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
obfuscate, err := EncryptString(SECRET_KEY_DERIVATE_FOR_USER, string(s))
|
obfuscate, err := EncryptString(SECRET_KEY_DERIVATE_FOR_USER, string(s))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Log.Debug("session::auth 'Encryption' %+v", err)
|
Log.Debug("[auth] action=authenticate::encrypt err=%s", ferror(err))
|
||||||
SendErrorResult(res, NewError(err.Error(), 500))
|
SendErrorResult(res, NewError(err.Error(), 500))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
@ -122,14 +122,14 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
|
||||||
if end == len(obfuscate) {
|
if end == len(obfuscate) {
|
||||||
break
|
break
|
||||||
} else {
|
} else {
|
||||||
Log.Debug("session::auth obfuscate index: %d length: %d total: %d", index, len(obfuscate[index*value_limit:end]), len(obfuscate))
|
Log.Debug("[auth] action=authenticate::obfuscate index=%d length=%d total=%d", index, len(obfuscate[index*value_limit:end]), len(obfuscate))
|
||||||
index++
|
index++
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if Config.Get("features.protection.iframe").String() != "" {
|
if Config.Get("features.protection.iframe").String() != "" {
|
||||||
res.Header().Set("bearer", obfuscate)
|
res.Header().Set("bearer", obfuscate)
|
||||||
}
|
}
|
||||||
Log.Info("[auth] status=success user=%s backend=%s::%s ip=%s", username(session), session["type"], backendID(session), ip(req))
|
Log.Stdout("AUDIT action[login] backend[%s] user[%s] target[%s]", session["type"], username(session), ip(req))
|
||||||
SendSuccessResult(res, Session{
|
SendSuccessResult(res, Session{
|
||||||
IsAuth: true,
|
IsAuth: true,
|
||||||
Home: NewString(home),
|
Home: NewString(home),
|
||||||
|
|
@ -180,6 +180,7 @@ func SessionLogout(ctx *App, res http.ResponseWriter, req *http.Request) {
|
||||||
MaxAge: -1,
|
MaxAge: -1,
|
||||||
Path: COOKIE_PATH,
|
Path: COOKIE_PATH,
|
||||||
})
|
})
|
||||||
|
Log.Stdout("AUDIT action[logout] backend[%s] user[%s] target[%s]", ctx.Session["type"], username(ctx.Session), ip(req))
|
||||||
SendSuccessResult(res, nil)
|
SendSuccessResult(res, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue