| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714 | // Copyright 2014 The Go Authors. All rights reserved.// Use of this source code is governed by a BSD-style// license that can be found in the LICENSE file.// Package webdav provides a WebDAV server implementation.package webdav // import "golang.org/x/net/webdav"import (	"errors"	"fmt"	"io"	"net/http"	"net/url"	"os"	"path"	"path/filepath"	"strings"	"time")type Handler struct {	// Prefix is the URL path prefix to strip from WebDAV resource paths.	Prefix string	// FileSystem is the virtual file system.	FileSystem FileSystem	// LockSystem is the lock management system.	LockSystem LockSystem	// Logger is an optional error logger. If non-nil, it will be called	// for all HTTP requests.	Logger func(*http.Request, error)}func (h *Handler) stripPrefix(p string) (string, int, error) {	if h.Prefix == "" {		return p, http.StatusOK, nil	}	if r := strings.TrimPrefix(p, h.Prefix); len(r) < len(p) {		return r, http.StatusOK, nil	}	return p, http.StatusNotFound, errPrefixMismatch}func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {	status, err := http.StatusBadRequest, errUnsupportedMethod	if h.FileSystem == nil {		status, err = http.StatusInternalServerError, errNoFileSystem	} else if h.LockSystem == nil {		status, err = http.StatusInternalServerError, errNoLockSystem	} else {		switch r.Method {		case "OPTIONS":			status, err = h.handleOptions(w, r)		case "GET", "HEAD", "POST":			status, err = h.handleGetHeadPost(w, r)		case "DELETE":			status, err = h.handleDelete(w, r)		case "PUT":			status, err = h.handlePut(w, r)		case "MKCOL":			status, err = h.handleMkcol(w, r)		case "COPY", "MOVE":			status, err = h.handleCopyMove(w, r)		case "LOCK":			status, err = h.handleLock(w, r)		case "UNLOCK":			status, err = h.handleUnlock(w, r)		case "PROPFIND":			status, err = h.handlePropfind(w, r)		case "PROPPATCH":			status, err = h.handleProppatch(w, r)		}	}	if status != 0 {		w.WriteHeader(status)		if status != http.StatusNoContent {			w.Write([]byte(StatusText(status)))		}	}	if h.Logger != nil {		h.Logger(r, err)	}}func (h *Handler) lock(now time.Time, root string) (token string, status int, err error) {	token, err = h.LockSystem.Create(now, LockDetails{		Root:      root,		Duration:  infiniteTimeout,		ZeroDepth: true,	})	if err != nil {		if err == ErrLocked {			return "", StatusLocked, err		}		return "", http.StatusInternalServerError, err	}	return token, 0, nil}func (h *Handler) confirmLocks(r *http.Request, src, dst string) (release func(), status int, err error) {	hdr := r.Header.Get("If")	if hdr == "" {		// An empty If header means that the client hasn't previously created locks.		// Even if this client doesn't care about locks, we still need to check that		// the resources aren't locked by another client, so we create temporary		// locks that would conflict with another client's locks. These temporary		// locks are unlocked at the end of the HTTP request.		now, srcToken, dstToken := time.Now(), "", ""		if src != "" {			srcToken, status, err = h.lock(now, src)			if err != nil {				return nil, status, err			}		}		if dst != "" {			dstToken, status, err = h.lock(now, dst)			if err != nil {				if srcToken != "" {					h.LockSystem.Unlock(now, srcToken)				}				return nil, status, err			}		}		return func() {			if dstToken != "" {				h.LockSystem.Unlock(now, dstToken)			}			if srcToken != "" {				h.LockSystem.Unlock(now, srcToken)			}		}, 0, nil	}	ih, ok := parseIfHeader(hdr)	if !ok {		return nil, http.StatusBadRequest, errInvalidIfHeader	}	// ih is a disjunction (OR) of ifLists, so any ifList will do.	for _, l := range ih.lists {		lsrc := l.resourceTag		if lsrc == "" {			lsrc = src		} else {			u, err := url.Parse(lsrc)			if err != nil {				continue			}			if u.Host != r.Host {				continue			}			lsrc, status, err = h.stripPrefix(u.Path)			if err != nil {				return nil, status, err			}		}		release, err = h.LockSystem.Confirm(time.Now(), lsrc, dst, l.conditions...)		if err == ErrConfirmationFailed {			continue		}		if err != nil {			return nil, http.StatusInternalServerError, err		}		return release, 0, nil	}	// Section 10.4.1 says that "If this header is evaluated and all state lists	// fail, then the request must fail with a 412 (Precondition Failed) status."	// We follow the spec even though the cond_put_corrupt_token test case from	// the litmus test warns on seeing a 412 instead of a 423 (Locked).	return nil, http.StatusPreconditionFailed, ErrLocked}func (h *Handler) handleOptions(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	ctx := r.Context()	allow := "OPTIONS, LOCK, PUT, MKCOL"	if fi, err := h.FileSystem.Stat(ctx, reqPath); err == nil {		if fi.IsDir() {			allow = "OPTIONS, LOCK, DELETE, PROPPATCH, COPY, MOVE, UNLOCK, PROPFIND"		} else {			allow = "OPTIONS, LOCK, GET, HEAD, POST, DELETE, PROPPATCH, COPY, MOVE, UNLOCK, PROPFIND, PUT"		}	}	w.Header().Set("Allow", allow)	// http://www.webdav.org/specs/rfc4918.html#dav.compliance.classes	w.Header().Set("DAV", "1, 2")	// http://msdn.microsoft.com/en-au/library/cc250217.aspx	w.Header().Set("MS-Author-Via", "DAV")	return 0, nil}func (h *Handler) handleGetHeadPost(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	// TODO: check locks for read-only access??	ctx := r.Context()	f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDONLY, 0)	if err != nil {		return http.StatusNotFound, err	}	defer f.Close()	fi, err := f.Stat()	if err != nil {		return http.StatusNotFound, err	}	if fi.IsDir() {		return http.StatusMethodNotAllowed, nil	}	etag, err := findETag(ctx, h.FileSystem, h.LockSystem, reqPath, fi)	if err != nil {		return http.StatusInternalServerError, err	}	w.Header().Set("ETag", etag)	// Let ServeContent determine the Content-Type header.	http.ServeContent(w, r, reqPath, fi.ModTime(), f)	return 0, nil}func (h *Handler) handleDelete(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	release, status, err := h.confirmLocks(r, reqPath, "")	if err != nil {		return status, err	}	defer release()	ctx := r.Context()	// TODO: return MultiStatus where appropriate.	// "godoc os RemoveAll" says that "If the path does not exist, RemoveAll	// returns nil (no error)." WebDAV semantics are that it should return a	// "404 Not Found". We therefore have to Stat before we RemoveAll.	if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {		if os.IsNotExist(err) {			return http.StatusNotFound, err		}		return http.StatusMethodNotAllowed, err	}	if err := h.FileSystem.RemoveAll(ctx, reqPath); err != nil {		return http.StatusMethodNotAllowed, err	}	return http.StatusNoContent, nil}func (h *Handler) handlePut(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	release, status, err := h.confirmLocks(r, reqPath, "")	if err != nil {		return status, err	}	defer release()	// TODO(rost): Support the If-Match, If-None-Match headers? See bradfitz'	// comments in http.checkEtag.	ctx := r.Context()	f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0666)	if err != nil {		return http.StatusNotFound, err	}	_, copyErr := io.Copy(f, r.Body)	fi, statErr := f.Stat()	closeErr := f.Close()	// TODO(rost): Returning 405 Method Not Allowed might not be appropriate.	if copyErr != nil {		return http.StatusMethodNotAllowed, copyErr	}	if statErr != nil {		return http.StatusMethodNotAllowed, statErr	}	if closeErr != nil {		return http.StatusMethodNotAllowed, closeErr	}	etag, err := findETag(ctx, h.FileSystem, h.LockSystem, reqPath, fi)	if err != nil {		return http.StatusInternalServerError, err	}	w.Header().Set("ETag", etag)	return http.StatusCreated, nil}func (h *Handler) handleMkcol(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	release, status, err := h.confirmLocks(r, reqPath, "")	if err != nil {		return status, err	}	defer release()	ctx := r.Context()	if r.ContentLength > 0 {		return http.StatusUnsupportedMediaType, nil	}	if err := h.FileSystem.Mkdir(ctx, reqPath, 0777); err != nil {		if os.IsNotExist(err) {			return http.StatusConflict, err		}		return http.StatusMethodNotAllowed, err	}	return http.StatusCreated, nil}func (h *Handler) handleCopyMove(w http.ResponseWriter, r *http.Request) (status int, err error) {	hdr := r.Header.Get("Destination")	if hdr == "" {		return http.StatusBadRequest, errInvalidDestination	}	u, err := url.Parse(hdr)	if err != nil {		return http.StatusBadRequest, errInvalidDestination	}	if u.Host != "" && u.Host != r.Host {		return http.StatusBadGateway, errInvalidDestination	}	src, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	dst, status, err := h.stripPrefix(u.Path)	if err != nil {		return status, err	}	if dst == "" {		return http.StatusBadGateway, errInvalidDestination	}	if dst == src {		return http.StatusForbidden, errDestinationEqualsSource	}	ctx := r.Context()	if r.Method == "COPY" {		// Section 7.5.1 says that a COPY only needs to lock the destination,		// not both destination and source. Strictly speaking, this is racy,		// even though a COPY doesn't modify the source, if a concurrent		// operation modifies the source. However, the litmus test explicitly		// checks that COPYing a locked-by-another source is OK.		release, status, err := h.confirmLocks(r, "", dst)		if err != nil {			return status, err		}		defer release()		// Section 9.8.3 says that "The COPY method on a collection without a Depth		// header must act as if a Depth header with value "infinity" was included".		depth := infiniteDepth		if hdr := r.Header.Get("Depth"); hdr != "" {			depth = parseDepth(hdr)			if depth != 0 && depth != infiniteDepth {				// Section 9.8.3 says that "A client may submit a Depth header on a				// COPY on a collection with a value of "0" or "infinity"."				return http.StatusBadRequest, errInvalidDepth			}		}		return copyFiles(ctx, h.FileSystem, src, dst, r.Header.Get("Overwrite") != "F", depth, 0)	}	release, status, err := h.confirmLocks(r, src, dst)	if err != nil {		return status, err	}	defer release()	// Section 9.9.2 says that "The MOVE method on a collection must act as if	// a "Depth: infinity" header was used on it. A client must not submit a	// Depth header on a MOVE on a collection with any value but "infinity"."	if hdr := r.Header.Get("Depth"); hdr != "" {		if parseDepth(hdr) != infiniteDepth {			return http.StatusBadRequest, errInvalidDepth		}	}	return moveFiles(ctx, h.FileSystem, src, dst, r.Header.Get("Overwrite") == "T")}func (h *Handler) handleLock(w http.ResponseWriter, r *http.Request) (retStatus int, retErr error) {	duration, err := parseTimeout(r.Header.Get("Timeout"))	if err != nil {		return http.StatusBadRequest, err	}	li, status, err := readLockInfo(r.Body)	if err != nil {		return status, err	}	ctx := r.Context()	token, ld, now, created := "", LockDetails{}, time.Now(), false	if li == (lockInfo{}) {		// An empty lockInfo means to refresh the lock.		ih, ok := parseIfHeader(r.Header.Get("If"))		if !ok {			return http.StatusBadRequest, errInvalidIfHeader		}		if len(ih.lists) == 1 && len(ih.lists[0].conditions) == 1 {			token = ih.lists[0].conditions[0].Token		}		if token == "" {			return http.StatusBadRequest, errInvalidLockToken		}		ld, err = h.LockSystem.Refresh(now, token, duration)		if err != nil {			if err == ErrNoSuchLock {				return http.StatusPreconditionFailed, err			}			return http.StatusInternalServerError, err		}	} else {		// Section 9.10.3 says that "If no Depth header is submitted on a LOCK request,		// then the request MUST act as if a "Depth:infinity" had been submitted."		depth := infiniteDepth		if hdr := r.Header.Get("Depth"); hdr != "" {			depth = parseDepth(hdr)			if depth != 0 && depth != infiniteDepth {				// Section 9.10.3 says that "Values other than 0 or infinity must not be				// used with the Depth header on a LOCK method".				return http.StatusBadRequest, errInvalidDepth			}		}		reqPath, status, err := h.stripPrefix(r.URL.Path)		if err != nil {			return status, err		}		ld = LockDetails{			Root:      reqPath,			Duration:  duration,			OwnerXML:  li.Owner.InnerXML,			ZeroDepth: depth == 0,		}		token, err = h.LockSystem.Create(now, ld)		if err != nil {			if err == ErrLocked {				return StatusLocked, err			}			return http.StatusInternalServerError, err		}		defer func() {			if retErr != nil {				h.LockSystem.Unlock(now, token)			}		}()		// Create the resource if it didn't previously exist.		if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {			f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0666)			if err != nil {				// TODO: detect missing intermediate dirs and return http.StatusConflict?				return http.StatusInternalServerError, err			}			f.Close()			created = true		}		// http://www.webdav.org/specs/rfc4918.html#HEADER_Lock-Token says that the		// Lock-Token value is a Coded-URL. We add angle brackets.		w.Header().Set("Lock-Token", "<"+token+">")	}	w.Header().Set("Content-Type", "application/xml; charset=utf-8")	if created {		// This is "w.WriteHeader(http.StatusCreated)" and not "return		// http.StatusCreated, nil" because we write our own (XML) response to w		// and Handler.ServeHTTP would otherwise write "Created".		w.WriteHeader(http.StatusCreated)	}	writeLockInfo(w, token, ld)	return 0, nil}func (h *Handler) handleUnlock(w http.ResponseWriter, r *http.Request) (status int, err error) {	// http://www.webdav.org/specs/rfc4918.html#HEADER_Lock-Token says that the	// Lock-Token value is a Coded-URL. We strip its angle brackets.	t := r.Header.Get("Lock-Token")	if len(t) < 2 || t[0] != '<' || t[len(t)-1] != '>' {		return http.StatusBadRequest, errInvalidLockToken	}	t = t[1 : len(t)-1]	switch err = h.LockSystem.Unlock(time.Now(), t); err {	case nil:		return http.StatusNoContent, err	case ErrForbidden:		return http.StatusForbidden, err	case ErrLocked:		return StatusLocked, err	case ErrNoSuchLock:		return http.StatusConflict, err	default:		return http.StatusInternalServerError, err	}}func (h *Handler) handlePropfind(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	ctx := r.Context()	fi, err := h.FileSystem.Stat(ctx, reqPath)	if err != nil {		if os.IsNotExist(err) {			return http.StatusNotFound, err		}		return http.StatusMethodNotAllowed, err	}	depth := infiniteDepth	if hdr := r.Header.Get("Depth"); hdr != "" {		depth = parseDepth(hdr)		if depth == invalidDepth {			return http.StatusBadRequest, errInvalidDepth		}	}	pf, status, err := readPropfind(r.Body)	if err != nil {		return status, err	}	mw := multistatusWriter{w: w}	walkFn := func(reqPath string, info os.FileInfo, err error) error {		if err != nil {			return nil		}		//Arozos custom properties		if len(reqPath) > 1 && filepath.Base(reqPath)[:1] == "." {			//Hidden file. Do not show			return nil		}		var pstats []Propstat		if pf.Propname != nil {			pnames, err := propnames(ctx, h.FileSystem, h.LockSystem, reqPath)			if err != nil {				return nil			}			pstat := Propstat{Status: http.StatusOK}			for _, xmlname := range pnames {				pstat.Props = append(pstat.Props, Property{XMLName: xmlname})			}			pstats = append(pstats, pstat)		} else if pf.Allprop != nil {			pstats, err = allprop(ctx, h.FileSystem, h.LockSystem, reqPath, pf.Prop)		} else {			pstats, err = props(ctx, h.FileSystem, h.LockSystem, reqPath, pf.Prop)		}		if err != nil {			return nil		}		href := path.Join(h.Prefix, reqPath)		if href != "/" && info.IsDir() {			href += "/"		}		return mw.write(makePropstatResponse(href, pstats))	}	walkErr := walkFS(ctx, h.FileSystem, depth, reqPath, fi, walkFn)	closeErr := mw.close()	if walkErr != nil {		return http.StatusInternalServerError, walkErr	}	if closeErr != nil {		return http.StatusInternalServerError, closeErr	}	return 0, nil}func (h *Handler) handleProppatch(w http.ResponseWriter, r *http.Request) (status int, err error) {	reqPath, status, err := h.stripPrefix(r.URL.Path)	if err != nil {		return status, err	}	release, status, err := h.confirmLocks(r, reqPath, "")	if err != nil {		return status, err	}	defer release()	ctx := r.Context()	if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {		if os.IsNotExist(err) {			return http.StatusNotFound, err		}		return http.StatusMethodNotAllowed, err	}	patches, status, err := readProppatch(r.Body)	if err != nil {		return status, err	}	pstats, err := patch(ctx, h.FileSystem, h.LockSystem, reqPath, patches)	if err != nil {		return http.StatusInternalServerError, err	}	mw := multistatusWriter{w: w}	writeErr := mw.write(makePropstatResponse(r.URL.Path, pstats))	closeErr := mw.close()	if writeErr != nil {		return http.StatusInternalServerError, writeErr	}	if closeErr != nil {		return http.StatusInternalServerError, closeErr	}	return 0, nil}func makePropstatResponse(href string, pstats []Propstat) *response {	resp := response{		Href:     []string{(&url.URL{Path: href}).EscapedPath()},		Propstat: make([]propstat, 0, len(pstats)),	}	for _, p := range pstats {		var xmlErr *xmlError		if p.XMLError != "" {			xmlErr = &xmlError{InnerXML: []byte(p.XMLError)}		}		resp.Propstat = append(resp.Propstat, propstat{			Status:              fmt.Sprintf("HTTP/1.1 %d %s", p.Status, StatusText(p.Status)),			Prop:                p.Props,			ResponseDescription: p.ResponseDescription,			Error:               xmlErr,		})	}	return &resp}const (	infiniteDepth = -1	invalidDepth  = -2)// parseDepth maps the strings "0", "1" and "infinity" to 0, 1 and// infiniteDepth. Parsing any other string returns invalidDepth.//// Different WebDAV methods have further constraints on valid depths://	- PROPFIND has no further restrictions, as per section 9.1.//	- COPY accepts only "0" or "infinity", as per section 9.8.3.//	- MOVE accepts only "infinity", as per section 9.9.2.//	- LOCK accepts only "0" or "infinity", as per section 9.10.3.// These constraints are enforced by the handleXxx methods.func parseDepth(s string) int {	switch s {	case "0":		return 0	case "1":		return 1	case "infinity":		return infiniteDepth	}	return invalidDepth}// http://www.webdav.org/specs/rfc4918.html#status.code.extensions.to.http11const (	StatusMulti               = 207	StatusUnprocessableEntity = 422	StatusLocked              = 423	StatusFailedDependency    = 424	StatusInsufficientStorage = 507)func StatusText(code int) string {	switch code {	case StatusMulti:		return "Multi-Status"	case StatusUnprocessableEntity:		return "Unprocessable Entity"	case StatusLocked:		return "Locked"	case StatusFailedDependency:		return "Failed Dependency"	case StatusInsufficientStorage:		return "Insufficient Storage"	}	return http.StatusText(code)}var (	errDestinationEqualsSource = errors.New("webdav: destination equals source")	errDirectoryNotEmpty       = errors.New("webdav: directory not empty")	errInvalidDepth            = errors.New("webdav: invalid depth")	errInvalidDestination      = errors.New("webdav: invalid destination")	errInvalidIfHeader         = errors.New("webdav: invalid If header")	errInvalidLockInfo         = errors.New("webdav: invalid lock info")	errInvalidLockToken        = errors.New("webdav: invalid lock token")	errInvalidPropfind         = errors.New("webdav: invalid propfind")	errInvalidProppatch        = errors.New("webdav: invalid proppatch")	errInvalidResponse         = errors.New("webdav: invalid response")	errInvalidTimeout          = errors.New("webdav: invalid timeout")	errNoFileSystem            = errors.New("webdav: no file system")	errNoLockSystem            = errors.New("webdav: no lock system")	errNotADirectory           = errors.New("webdav: not a directory")	errPrefixMismatch          = errors.New("webdav: prefix mismatch")	errRecursionTooDeep        = errors.New("webdav: recursion too deep")	errUnsupportedLockInfo     = errors.New("webdav: unsupported lock info")	errUnsupportedMethod       = errors.New("webdav: unsupported method"))
 |