2020-09-18 13:11:21 +02:00
|
|
|
package webserver
|
2020-05-31 16:46:41 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
2020-09-12 12:42:48 +02:00
|
|
|
"context"
|
2021-02-24 20:01:48 +01:00
|
|
|
"crypto/tls"
|
2020-05-31 16:46:41 +02:00
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"html"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2020-05-31 20:03:22 +02:00
|
|
|
"net/url"
|
2020-05-31 16:46:41 +02:00
|
|
|
"os"
|
2020-05-31 20:03:22 +02:00
|
|
|
"path"
|
2020-05-31 16:46:41 +02:00
|
|
|
"path/filepath"
|
2020-10-08 13:32:50 +02:00
|
|
|
"sort"
|
2020-05-31 16:46:41 +02:00
|
|
|
"strings"
|
2020-10-01 19:47:04 +02:00
|
|
|
"sync/atomic"
|
2020-05-31 16:46:41 +02:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/gorilla/websocket"
|
2020-09-13 11:56:35 +02:00
|
|
|
|
2020-12-19 17:37:48 +01:00
|
|
|
"github.com/jech/galene/diskwriter"
|
|
|
|
"github.com/jech/galene/group"
|
|
|
|
"github.com/jech/galene/rtpconn"
|
|
|
|
"github.com/jech/galene/stats"
|
2020-05-31 16:46:41 +02:00
|
|
|
)
|
|
|
|
|
2020-10-01 19:47:04 +02:00
|
|
|
var server atomic.Value
|
2020-09-12 12:42:48 +02:00
|
|
|
|
2020-09-18 13:11:21 +02:00
|
|
|
var StaticRoot string
|
|
|
|
|
2020-12-07 02:43:51 +01:00
|
|
|
var Redirect string
|
|
|
|
|
2020-12-24 14:44:16 +01:00
|
|
|
var Insecure bool
|
|
|
|
|
2020-09-18 14:14:26 +02:00
|
|
|
func Serve(address string, dataDir string) error {
|
2020-09-18 13:12:39 +02:00
|
|
|
http.Handle("/", &fileHandler{http.Dir(StaticRoot)})
|
2020-09-10 13:39:38 +02:00
|
|
|
http.HandleFunc("/group/", groupHandler)
|
2020-05-31 20:03:22 +02:00
|
|
|
http.HandleFunc("/recordings",
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
http.Redirect(w, r,
|
|
|
|
"/recordings/", http.StatusPermanentRedirect)
|
|
|
|
})
|
|
|
|
http.HandleFunc("/recordings/", recordingsHandler)
|
2020-05-31 16:46:41 +02:00
|
|
|
http.HandleFunc("/ws", wsHandler)
|
|
|
|
http.HandleFunc("/public-groups.json", publicHandler)
|
2021-04-30 19:50:42 +02:00
|
|
|
http.HandleFunc("/stats.json",
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
statsHandler(w, r, dataDir)
|
|
|
|
})
|
2020-05-31 16:46:41 +02:00
|
|
|
|
2020-10-01 19:47:04 +02:00
|
|
|
s := &http.Server{
|
2020-09-18 13:11:21 +02:00
|
|
|
Addr: address,
|
2020-09-12 21:19:40 +02:00
|
|
|
ReadHeaderTimeout: 60 * time.Second,
|
|
|
|
IdleTimeout: 120 * time.Second,
|
|
|
|
}
|
2021-02-24 20:01:48 +01:00
|
|
|
if !Insecure {
|
|
|
|
s.TLSConfig = &tls.Config{
|
|
|
|
GetCertificate: func(hello *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
|
|
return getCertificate(dataDir)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
2020-10-01 19:47:04 +02:00
|
|
|
s.RegisterOnShutdown(func() {
|
2020-09-18 10:14:57 +02:00
|
|
|
group.Range(func(g *group.Group) bool {
|
2020-09-13 11:56:35 +02:00
|
|
|
go g.Shutdown("server is shutting down")
|
2020-09-13 12:24:06 +02:00
|
|
|
return true
|
|
|
|
})
|
2020-09-12 21:19:40 +02:00
|
|
|
})
|
2020-09-18 14:14:26 +02:00
|
|
|
|
2020-10-01 19:47:04 +02:00
|
|
|
server.Store(s)
|
|
|
|
|
2020-12-24 14:44:16 +01:00
|
|
|
var err error
|
|
|
|
|
|
|
|
if !Insecure {
|
2021-02-24 20:01:48 +01:00
|
|
|
err = s.ListenAndServeTLS("", "")
|
2020-12-24 14:44:16 +01:00
|
|
|
} else {
|
|
|
|
err = s.ListenAndServe()
|
|
|
|
}
|
|
|
|
|
2020-09-18 14:14:26 +02:00
|
|
|
if err == http.ErrServerClosed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return err
|
2020-05-31 16:46:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func mungeHeader(w http.ResponseWriter) {
|
|
|
|
w.Header().Add("Content-Security-Policy",
|
2020-11-24 19:22:38 +01:00
|
|
|
"connect-src ws: wss: 'self'; img-src data: 'self'; media-src blob: 'self'; default-src 'self'")
|
2020-05-31 16:46:41 +02:00
|
|
|
}
|
|
|
|
|
2020-09-11 17:37:35 +02:00
|
|
|
func notFound(w http.ResponseWriter) {
|
|
|
|
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
|
|
|
w.WriteHeader(http.StatusNotFound)
|
|
|
|
|
2020-09-18 13:11:21 +02:00
|
|
|
f, err := os.Open(path.Join(StaticRoot, "404.html"))
|
2020-09-11 17:37:35 +02:00
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintln(w, "<p>Not found</p>")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
io.Copy(w, f)
|
|
|
|
}
|
|
|
|
|
2020-09-18 13:12:39 +02:00
|
|
|
var ErrIsDirectory = errors.New("is a directory")
|
|
|
|
|
|
|
|
func httpError(w http.ResponseWriter, err error) {
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
notFound(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if os.IsPermission(err) {
|
|
|
|
http.Error(w, "403 forbidden", http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
http.Error(w, "500 Internal Server Error",
|
|
|
|
http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-18 13:43:30 +02:00
|
|
|
const (
|
|
|
|
normalCacheControl = "max-age=1800"
|
|
|
|
veryCachableCacheControl = "max-age=86400"
|
|
|
|
)
|
|
|
|
|
2020-12-07 02:43:51 +01:00
|
|
|
func redirect(w http.ResponseWriter, r *http.Request) bool {
|
|
|
|
if Redirect == "" || strings.EqualFold(r.Host, Redirect) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
u := url.URL{
|
|
|
|
Scheme: "https",
|
|
|
|
Host: Redirect,
|
|
|
|
Path: r.URL.Path,
|
|
|
|
}
|
|
|
|
http.Redirect(w, r, u.String(), http.StatusMovedPermanently)
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
func makeCachable(w http.ResponseWriter, p string, fi os.FileInfo, cachable bool) {
|
|
|
|
etag := fmt.Sprintf("\"%v-%v\"", fi.Size(), fi.ModTime().UnixNano())
|
|
|
|
w.Header().Set("ETag", etag)
|
|
|
|
if !cachable {
|
|
|
|
w.Header().Set("cache-control", "no-cache")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cc := normalCacheControl
|
|
|
|
if strings.HasPrefix(p, "/fonts/") ||
|
2020-09-18 13:43:30 +02:00
|
|
|
strings.HasPrefix(p, "/scripts/") ||
|
2020-09-19 11:39:03 +02:00
|
|
|
strings.HasPrefix(p, "/css/") {
|
|
|
|
cc = veryCachableCacheControl
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Cache-Control", cc)
|
|
|
|
}
|
|
|
|
|
|
|
|
// fileHandler is our custom reimplementation of http.FileServer
|
|
|
|
type fileHandler struct {
|
|
|
|
root http.FileSystem
|
2020-09-18 13:43:30 +02:00
|
|
|
}
|
|
|
|
|
2020-09-18 13:12:39 +02:00
|
|
|
func (fh *fileHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
2020-12-07 02:43:51 +01:00
|
|
|
if redirect(w, r) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-31 16:46:41 +02:00
|
|
|
mungeHeader(w)
|
2020-09-18 13:12:39 +02:00
|
|
|
p := r.URL.Path
|
|
|
|
// this ensures any leading .. are removed by path.Clean below
|
|
|
|
if !strings.HasPrefix(p, "/") {
|
|
|
|
p = "/" + p
|
|
|
|
r.URL.Path = p
|
|
|
|
}
|
|
|
|
p = path.Clean(p)
|
|
|
|
|
|
|
|
f, err := fh.root.Open(p)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2020-09-19 11:39:03 +02:00
|
|
|
fi, err := f.Stat()
|
2020-09-18 13:12:39 +02:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
if fi.IsDir() {
|
2020-09-18 13:12:39 +02:00
|
|
|
u := r.URL.Path
|
|
|
|
if u[len(u)-1] != '/' {
|
|
|
|
http.Redirect(w, r, u+"/", http.StatusPermanentRedirect)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
index := path.Join(p, "index.html")
|
|
|
|
ff, err := fh.root.Open(index)
|
|
|
|
if err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
err = os.ErrPermission
|
|
|
|
}
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer ff.Close()
|
|
|
|
dd, err := ff.Stat()
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if dd.IsDir() {
|
|
|
|
httpError(w, ErrIsDirectory)
|
|
|
|
return
|
|
|
|
}
|
2020-09-19 11:39:03 +02:00
|
|
|
f, fi = ff, dd
|
2020-09-18 13:12:39 +02:00
|
|
|
p = index
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
makeCachable(w, p, fi, true)
|
|
|
|
http.ServeContent(w, r, fi.Name(), fi.ModTime(), f)
|
2020-09-18 13:43:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// serveFile is similar to http.ServeFile, except that it doesn't check
|
|
|
|
// for .. and adds cachability headers.
|
|
|
|
func serveFile(w http.ResponseWriter, r *http.Request, p string) {
|
|
|
|
f, err := os.Open(p)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2020-09-19 11:39:03 +02:00
|
|
|
fi, err := f.Stat()
|
2020-09-18 13:43:30 +02:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
if fi.IsDir() {
|
2020-09-18 13:43:30 +02:00
|
|
|
httpError(w, ErrIsDirectory)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
makeCachable(w, p, fi, true)
|
|
|
|
http.ServeContent(w, r, fi.Name(), fi.ModTime(), f)
|
2020-05-31 16:46:41 +02:00
|
|
|
}
|
|
|
|
|
2021-02-07 01:42:31 +01:00
|
|
|
func parseGroupName(prefix string, p string) string {
|
|
|
|
if !strings.HasPrefix(p, prefix) {
|
2020-09-10 13:39:38 +02:00
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2021-02-07 01:42:31 +01:00
|
|
|
name := p[len("/group/"):]
|
2020-09-10 13:39:38 +02:00
|
|
|
if name == "" {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2021-02-07 01:42:31 +01:00
|
|
|
if filepath.Separator != '/' &&
|
|
|
|
strings.ContainsRune(name, filepath.Separator) {
|
|
|
|
return ""
|
2020-09-10 13:39:38 +02:00
|
|
|
}
|
2021-02-07 01:42:31 +01:00
|
|
|
|
|
|
|
name = path.Clean("/" + name)
|
|
|
|
return name[1:]
|
2020-09-10 13:39:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func groupHandler(w http.ResponseWriter, r *http.Request) {
|
2020-12-07 02:43:51 +01:00
|
|
|
if redirect(w, r) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-10 13:39:38 +02:00
|
|
|
mungeHeader(w)
|
2021-02-07 01:42:31 +01:00
|
|
|
name := parseGroupName("/group/", r.URL.Path)
|
2020-09-10 13:39:38 +02:00
|
|
|
if name == "" {
|
2020-09-11 17:37:35 +02:00
|
|
|
notFound(w)
|
2020-09-10 13:39:38 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-02-24 20:01:48 +01:00
|
|
|
if r.URL.Path != "/group/"+name {
|
|
|
|
http.Redirect(w, r, "/group/"+name,
|
2020-12-04 22:42:20 +01:00
|
|
|
http.StatusPermanentRedirect)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-13 11:56:35 +02:00
|
|
|
g, err := group.Add(name, nil)
|
2020-09-10 13:39:38 +02:00
|
|
|
if err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
2020-09-11 17:37:35 +02:00
|
|
|
notFound(w)
|
2020-09-10 13:39:38 +02:00
|
|
|
} else {
|
2020-09-14 15:48:16 +02:00
|
|
|
log.Printf("addGroup: %v", err)
|
2020-09-10 13:39:38 +02:00
|
|
|
http.Error(w, "Internal server error",
|
|
|
|
http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2020-09-10 13:55:57 +02:00
|
|
|
|
2020-09-13 13:24:05 +02:00
|
|
|
if redirect := g.Redirect(); redirect != "" {
|
|
|
|
http.Redirect(w, r, redirect,
|
2020-09-10 13:55:57 +02:00
|
|
|
http.StatusPermanentRedirect)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-06 19:43:17 +01:00
|
|
|
serveFile(w, r, filepath.Join(StaticRoot, "galene.html"))
|
2020-09-10 13:39:38 +02:00
|
|
|
}
|
|
|
|
|
2020-05-31 16:46:41 +02:00
|
|
|
func publicHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("content-type", "application/json")
|
|
|
|
w.Header().Set("cache-control", "no-cache")
|
|
|
|
|
|
|
|
if r.Method == "HEAD" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-13 11:56:35 +02:00
|
|
|
g := group.GetPublic()
|
2020-05-31 16:46:41 +02:00
|
|
|
e := json.NewEncoder(w)
|
|
|
|
e.Encode(g)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-18 13:11:21 +02:00
|
|
|
func getPassword(dataDir string) (string, string, error) {
|
2020-05-31 16:46:41 +02:00
|
|
|
f, err := os.Open(filepath.Join(dataDir, "passwd"))
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
r := bufio.NewReader(f)
|
|
|
|
|
|
|
|
s, err := r.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
l := strings.SplitN(strings.TrimSpace(s), ":", 2)
|
|
|
|
if len(l) != 2 {
|
|
|
|
return "", "", errors.New("couldn't parse passwords")
|
|
|
|
}
|
|
|
|
|
|
|
|
return l[0], l[1], nil
|
|
|
|
}
|
|
|
|
|
2020-05-31 20:03:22 +02:00
|
|
|
func failAuthentication(w http.ResponseWriter, realm string) {
|
|
|
|
w.Header().Set("www-authenticate",
|
|
|
|
fmt.Sprintf("basic realm=\"%v\"", realm))
|
|
|
|
http.Error(w, "Haha!", http.StatusUnauthorized)
|
|
|
|
}
|
2020-05-31 16:46:41 +02:00
|
|
|
|
2020-09-18 13:11:21 +02:00
|
|
|
func statsHandler(w http.ResponseWriter, r *http.Request, dataDir string) {
|
|
|
|
u, p, err := getPassword(dataDir)
|
2020-05-31 16:46:41 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Passwd: %v", err)
|
2020-05-31 20:03:22 +02:00
|
|
|
failAuthentication(w, "stats")
|
2020-05-31 16:46:41 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
username, password, ok := r.BasicAuth()
|
|
|
|
if !ok || username != u || password != p {
|
2020-05-31 20:03:22 +02:00
|
|
|
failAuthentication(w, "stats")
|
2020-05-31 16:46:41 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-30 19:50:42 +02:00
|
|
|
w.Header().Set("content-type", "application/json")
|
2020-05-31 16:46:41 +02:00
|
|
|
w.Header().Set("cache-control", "no-cache")
|
|
|
|
if r.Method == "HEAD" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-18 10:14:57 +02:00
|
|
|
ss := stats.GetGroups()
|
2021-04-30 19:50:42 +02:00
|
|
|
e := json.NewEncoder(w)
|
|
|
|
e.Encode(ss)
|
|
|
|
return
|
2020-05-31 16:46:41 +02:00
|
|
|
}
|
|
|
|
|
2021-02-24 20:01:48 +01:00
|
|
|
var wsUpgrader = websocket.Upgrader{
|
2021-01-04 18:02:50 +01:00
|
|
|
HandshakeTimeout: 30 * time.Second,
|
|
|
|
}
|
2020-05-31 16:46:41 +02:00
|
|
|
|
|
|
|
func wsHandler(w http.ResponseWriter, r *http.Request) {
|
2021-01-04 18:02:50 +01:00
|
|
|
conn, err := wsUpgrader.Upgrade(w, r, nil)
|
2020-05-31 16:46:41 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Websocket upgrade: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
go func() {
|
2020-09-18 10:28:05 +02:00
|
|
|
err := rtpconn.StartClient(conn)
|
2020-05-31 16:46:41 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("client: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
2020-05-31 20:03:22 +02:00
|
|
|
|
|
|
|
func recordingsHandler(w http.ResponseWriter, r *http.Request) {
|
2020-12-07 02:43:51 +01:00
|
|
|
if redirect(w, r) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-31 20:03:22 +02:00
|
|
|
if len(r.URL.Path) < 12 || r.URL.Path[:12] != "/recordings/" {
|
|
|
|
http.Error(w, "server error", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
p := "/" + r.URL.Path[12:]
|
|
|
|
|
|
|
|
if filepath.Separator != '/' &&
|
|
|
|
strings.ContainsRune(p, filepath.Separator) {
|
|
|
|
http.Error(w, "bad character in filename",
|
|
|
|
http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
2020-05-31 20:03:22 +02:00
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
if p == "/" {
|
|
|
|
http.Error(w, "nothing to see", http.StatusForbidden)
|
2020-05-31 20:03:22 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
p = path.Clean(p)
|
|
|
|
|
2020-10-04 19:01:06 +02:00
|
|
|
f, err := os.Open(filepath.Join(diskwriter.Directory, p))
|
2020-05-31 20:03:22 +02:00
|
|
|
if err != nil {
|
2020-09-19 11:39:03 +02:00
|
|
|
httpError(w, err)
|
2020-05-31 20:03:22 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
fi, err := f.Stat()
|
|
|
|
if err != nil {
|
2020-09-19 11:39:03 +02:00
|
|
|
httpError(w, err)
|
2020-05-31 20:03:22 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-19 11:39:03 +02:00
|
|
|
group := path.Dir(p[1:])
|
2020-05-31 20:03:22 +02:00
|
|
|
if fi.IsDir() {
|
2020-09-19 11:39:03 +02:00
|
|
|
u := r.URL.Path
|
|
|
|
if u[len(u)-1] != '/' {
|
|
|
|
http.Redirect(w, r, u+"/", http.StatusPermanentRedirect)
|
2020-05-31 20:03:22 +02:00
|
|
|
return
|
|
|
|
}
|
2020-09-19 11:39:03 +02:00
|
|
|
group = p[1:]
|
|
|
|
}
|
|
|
|
|
|
|
|
ok := checkGroupPermissions(w, r, group)
|
|
|
|
if !ok {
|
|
|
|
failAuthentication(w, "recordings/"+group)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if fi.IsDir() {
|
2020-05-31 20:03:22 +02:00
|
|
|
if r.Method == "POST" {
|
2020-09-19 11:39:03 +02:00
|
|
|
handleGroupAction(w, r, group)
|
2020-05-31 20:03:22 +02:00
|
|
|
} else {
|
2020-09-19 11:39:03 +02:00
|
|
|
serveGroupRecordings(w, r, f, group)
|
2020-05-31 20:03:22 +02:00
|
|
|
}
|
2020-09-19 11:39:03 +02:00
|
|
|
return
|
2020-05-31 20:03:22 +02:00
|
|
|
}
|
2020-09-19 11:39:03 +02:00
|
|
|
|
|
|
|
// Ensure the file is uncachable if it's still recording
|
|
|
|
cachable := time.Since(fi.ModTime()) > time.Minute
|
|
|
|
makeCachable(w, path.Join("/recordings/", p), fi, cachable)
|
|
|
|
http.ServeContent(w, r, fi.Name(), fi.ModTime(), f)
|
2020-05-31 20:03:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func handleGroupAction(w http.ResponseWriter, r *http.Request, group string) {
|
|
|
|
if r.Method != "POST" {
|
|
|
|
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err := r.ParseForm()
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, "couldn't parse request", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
q := r.Form.Get("q")
|
|
|
|
|
|
|
|
switch q {
|
|
|
|
case "delete":
|
|
|
|
filename := r.Form.Get("filename")
|
|
|
|
if group == "" || filename == "" {
|
|
|
|
http.Error(w, "no filename provided",
|
|
|
|
http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
2020-09-19 11:39:03 +02:00
|
|
|
if strings.ContainsRune(filename, '/') ||
|
|
|
|
strings.ContainsRune(filename, filepath.Separator) {
|
|
|
|
http.Error(w, "bad character in filename",
|
|
|
|
http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
2020-05-31 20:03:22 +02:00
|
|
|
err := os.Remove(
|
2020-10-04 19:01:06 +02:00
|
|
|
filepath.Join(diskwriter.Directory,
|
2020-09-19 11:39:03 +02:00
|
|
|
filepath.Join(group,
|
|
|
|
path.Clean("/"+filename),
|
|
|
|
),
|
|
|
|
),
|
2020-05-31 20:03:22 +02:00
|
|
|
)
|
|
|
|
if err != nil {
|
2020-09-19 11:39:03 +02:00
|
|
|
httpError(w, err)
|
2020-05-31 20:03:22 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
http.Redirect(w, r, "/recordings/"+group+"/",
|
|
|
|
http.StatusSeeOther)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
http.Error(w, "unknown query", http.StatusBadRequest)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-29 14:26:42 +01:00
|
|
|
type httpClient struct {
|
|
|
|
username string
|
|
|
|
password string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c httpClient) Username() string {
|
|
|
|
return c.username
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c httpClient) Challenge(group string, creds group.ClientCredentials) bool {
|
|
|
|
if creds.Password == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
m, err := creds.Password.Match(c.password)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Password match: %v", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return m
|
|
|
|
}
|
|
|
|
|
2020-09-13 11:56:35 +02:00
|
|
|
func checkGroupPermissions(w http.ResponseWriter, r *http.Request, groupname string) bool {
|
|
|
|
desc, err := group.GetDescription(groupname)
|
2020-05-31 20:03:22 +02:00
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
user, pass, ok := r.BasicAuth()
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-11-29 14:26:42 +01:00
|
|
|
p, err := desc.GetPermission(groupname, httpClient{user, pass})
|
2020-05-31 20:03:22 +02:00
|
|
|
if err != nil || !p.Record {
|
2020-12-02 00:07:31 +01:00
|
|
|
if err == group.ErrNotAuthorised {
|
|
|
|
time.Sleep(200 * time.Millisecond)
|
|
|
|
}
|
2020-05-31 20:03:22 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func serveGroupRecordings(w http.ResponseWriter, r *http.Request, f *os.File, group string) {
|
|
|
|
fis, err := f.Readdir(-1)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, "server error", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-10-08 13:32:50 +02:00
|
|
|
sort.Slice(fis, func(i, j int) bool {
|
|
|
|
return fis[i].Name() < fis[j].Name()
|
|
|
|
})
|
|
|
|
|
2020-05-31 20:03:22 +02:00
|
|
|
w.Header().Set("content-type", "text/html; charset=utf-8")
|
|
|
|
w.Header().Set("cache-control", "no-cache")
|
|
|
|
|
|
|
|
if r.Method == "HEAD" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprintf(w, "<!DOCTYPE html>\n<html><head>\n")
|
|
|
|
fmt.Fprintf(w, "<title>Recordings for group %v</title>\n", group)
|
|
|
|
fmt.Fprintf(w, "<link rel=\"stylesheet\" type=\"text/css\" href=\"/common.css\"/>")
|
2020-09-19 11:39:03 +02:00
|
|
|
fmt.Fprintf(w, "</head><body>\n")
|
2020-05-31 20:03:22 +02:00
|
|
|
|
|
|
|
fmt.Fprintf(w, "<table>\n")
|
|
|
|
for _, fi := range fis {
|
|
|
|
if fi.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
2020-09-21 23:03:03 +02:00
|
|
|
fmt.Fprintf(w, "<tr><td><a href=\"./%v\">%v</a></td><td>%d</td>",
|
2020-05-31 20:03:22 +02:00
|
|
|
html.EscapeString(fi.Name()),
|
|
|
|
html.EscapeString(fi.Name()),
|
|
|
|
fi.Size(),
|
|
|
|
)
|
|
|
|
fmt.Fprintf(w,
|
2020-09-19 11:39:03 +02:00
|
|
|
"<td><form action=\"/recordings/%v/\" method=\"post\">"+
|
|
|
|
"<input type=\"hidden\" name=\"filename\" value=\"%v\">"+
|
|
|
|
"<button type=\"submit\" name=\"q\" value=\"delete\">Delete</button>"+
|
2020-05-31 20:03:22 +02:00
|
|
|
"</form></td></tr>\n",
|
|
|
|
url.PathEscape(group), fi.Name())
|
|
|
|
}
|
|
|
|
fmt.Fprintf(w, "</table>\n")
|
|
|
|
fmt.Fprintf(w, "</body></html>\n")
|
|
|
|
}
|
2020-09-12 12:42:48 +02:00
|
|
|
|
2020-09-18 13:11:21 +02:00
|
|
|
func Shutdown() {
|
2020-10-01 19:47:04 +02:00
|
|
|
v := server.Load()
|
|
|
|
if v == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s := v.(*http.Server)
|
2020-09-18 10:36:05 +02:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
defer cancel()
|
2020-10-01 19:47:04 +02:00
|
|
|
s.Shutdown(ctx)
|
2020-09-12 12:42:48 +02:00
|
|
|
}
|