chore (maintenance): os.FileInfo implementation

This commit is contained in:
MickaelK 2025-10-09 16:22:45 +11:00
parent 84c87dd15f
commit 95c878f671
2 changed files with 12 additions and 11 deletions

View file

@ -121,7 +121,7 @@ func (f File) Mode() os.FileMode {
if f.IsDir() { if f.IsDir() {
return os.ModeDir return os.ModeDir
} }
return 0 return os.FileMode(0664)
} }
func (f File) ModTime() time.Time { func (f File) ModTime() time.Time {
if f.FTime == 0 { if f.FTime == 0 {

View file

@ -59,8 +59,8 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
backend, err := model.NewBackend(ctx, session) backend, err := model.NewBackend(ctx, session)
if err != nil { if err != nil {
Log.Debug("session::auth 'NewBackend' %+v", err) Log.Debug("[auth] action=authenticate::newBackend err=%s", ferror(err))
Log.Info("[auth] status=failed user=%s backend=%s::%s ip=%s err=%s", username(session), session["type"], backendID(session), ip(req), ferror(err)) Log.Stdout("AUDIT action[fail] backend[%s] user[%s] target[%s]", session["type"], backendID(session), ip(req))
SendErrorResult(res, err) SendErrorResult(res, err)
return return
} }
@ -70,15 +70,15 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
}); ok { }); ok {
err := obj.OAuthToken(&ctx.Body) err := obj.OAuthToken(&ctx.Body)
if err != nil { if err != nil {
Log.Debug("session::auth 'OAuthToken' %+v", err) Log.Debug("[auth] action=authenticate::oauthtoken err=%s", ferror(err))
SendErrorResult(res, NewError("Can't authenticate (OAuth error)", 401)) SendErrorResult(res, NewError("Can't authenticate (OAuth error)", 401))
return return
} }
session = model.MapStringInterfaceToMapStringString(ctx.Body) session = model.MapStringInterfaceToMapStringString(ctx.Body)
backend, err = model.NewBackend(ctx, session) backend, err = model.NewBackend(ctx, session)
if err != nil { if err != nil {
Log.Debug("session::auth 'OAuthToken::NewBackend' %+v", err) Log.Debug("[auth] action=authenticate::oauth::newBackend err=%s", ferror(err))
Log.Info("[auth] status=failed user=%s backend=%s::%s ip=%s err=%s", username(session), session["type"], backendID(session), ip(req), ferror(err)) Log.Stdout("AUDIT action[fail] backend[%s] user[%s] target[%s]", session["type"], username(session), ip(req))
SendErrorResult(res, NewError("Can't authenticate", 401)) SendErrorResult(res, NewError("Can't authenticate", 401))
return return
} }
@ -86,20 +86,20 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
home, err := model.GetHome(backend, session["path"]) home, err := model.GetHome(backend, session["path"])
if err != nil { if err != nil {
Log.Debug("session::auth 'GetHome' %+v", err) Log.Debug("[auth] action=authenticate::getHome err=%s", ferror(err))
SendErrorResult(res, ErrAuthenticationFailed) SendErrorResult(res, ErrAuthenticationFailed)
return return
} }
s, err := json.Marshal(session) s, err := json.Marshal(session)
if err != nil { if err != nil {
Log.Debug("session::auth 'Marshal' %+v", err) Log.Debug("[auth] action=authenticate::marshall err=%s", ferror(err))
SendErrorResult(res, NewError(err.Error(), 500)) SendErrorResult(res, NewError(err.Error(), 500))
return return
} }
obfuscate, err := EncryptString(SECRET_KEY_DERIVATE_FOR_USER, string(s)) obfuscate, err := EncryptString(SECRET_KEY_DERIVATE_FOR_USER, string(s))
if err != nil { if err != nil {
Log.Debug("session::auth 'Encryption' %+v", err) Log.Debug("[auth] action=authenticate::encrypt err=%s", ferror(err))
SendErrorResult(res, NewError(err.Error(), 500)) SendErrorResult(res, NewError(err.Error(), 500))
return return
} }
@ -122,14 +122,14 @@ func SessionAuthenticate(ctx *App, res http.ResponseWriter, req *http.Request) {
if end == len(obfuscate) { if end == len(obfuscate) {
break break
} else { } else {
Log.Debug("session::auth obfuscate index: %d length: %d total: %d", index, len(obfuscate[index*value_limit:end]), len(obfuscate)) Log.Debug("[auth] action=authenticate::obfuscate index=%d length=%d total=%d", index, len(obfuscate[index*value_limit:end]), len(obfuscate))
index++ index++
} }
} }
if Config.Get("features.protection.iframe").String() != "" { if Config.Get("features.protection.iframe").String() != "" {
res.Header().Set("bearer", obfuscate) res.Header().Set("bearer", obfuscate)
} }
Log.Info("[auth] status=success user=%s backend=%s::%s ip=%s", username(session), session["type"], backendID(session), ip(req)) Log.Stdout("AUDIT action[login] backend[%s] user[%s] target[%s]", session["type"], username(session), ip(req))
SendSuccessResult(res, Session{ SendSuccessResult(res, Session{
IsAuth: true, IsAuth: true,
Home: NewString(home), Home: NewString(home),
@ -180,6 +180,7 @@ func SessionLogout(ctx *App, res http.ResponseWriter, req *http.Request) {
MaxAge: -1, MaxAge: -1,
Path: COOKIE_PATH, Path: COOKIE_PATH,
}) })
Log.Stdout("AUDIT action[logout] backend[%s] user[%s] target[%s]", ctx.Session["type"], username(ctx.Session), ip(req))
SendSuccessResult(res, nil) SendSuccessResult(res, nil)
} }