703 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			703 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2014 The Go Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a BSD-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
// Package webdav provides a WebDAV server implementation.
 | 
						|
package webdav // import "golang.org/x/net/webdav"
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"path"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
)
 | 
						|
 | 
						|
type Handler struct {
 | 
						|
	// Prefix is the URL path prefix to strip from WebDAV resource paths.
 | 
						|
	Prefix string
 | 
						|
	// FileSystem is the virtual file system.
 | 
						|
	FileSystem FileSystem
 | 
						|
	// LockSystem is the lock management system.
 | 
						|
	LockSystem LockSystem
 | 
						|
	// Logger is an optional error logger. If non-nil, it will be called
 | 
						|
	// for all HTTP requests.
 | 
						|
	Logger func(*http.Request, error)
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) stripPrefix(p string) (string, int, error) {
 | 
						|
	if h.Prefix == "" {
 | 
						|
		return p, http.StatusOK, nil
 | 
						|
	}
 | 
						|
	if r := strings.TrimPrefix(p, h.Prefix); len(r) < len(p) {
 | 
						|
		return r, http.StatusOK, nil
 | 
						|
	}
 | 
						|
	return p, http.StatusNotFound, errPrefixMismatch
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
 | 
						|
	status, err := http.StatusBadRequest, errUnsupportedMethod
 | 
						|
	if h.FileSystem == nil {
 | 
						|
		status, err = http.StatusInternalServerError, errNoFileSystem
 | 
						|
	} else if h.LockSystem == nil {
 | 
						|
		status, err = http.StatusInternalServerError, errNoLockSystem
 | 
						|
	} else {
 | 
						|
		switch r.Method {
 | 
						|
		case "OPTIONS":
 | 
						|
			status, err = h.handleOptions(w, r)
 | 
						|
		case "GET", "HEAD", "POST":
 | 
						|
			status, err = h.handleGetHeadPost(w, r)
 | 
						|
		case "DELETE":
 | 
						|
			status, err = h.handleDelete(w, r)
 | 
						|
		case "PUT":
 | 
						|
			status, err = h.handlePut(w, r)
 | 
						|
		case "MKCOL":
 | 
						|
			status, err = h.handleMkcol(w, r)
 | 
						|
		case "COPY", "MOVE":
 | 
						|
			status, err = h.handleCopyMove(w, r)
 | 
						|
		case "LOCK":
 | 
						|
			status, err = h.handleLock(w, r)
 | 
						|
		case "UNLOCK":
 | 
						|
			status, err = h.handleUnlock(w, r)
 | 
						|
		case "PROPFIND":
 | 
						|
			status, err = h.handlePropfind(w, r)
 | 
						|
		case "PROPPATCH":
 | 
						|
			status, err = h.handleProppatch(w, r)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if status != 0 {
 | 
						|
		w.WriteHeader(status)
 | 
						|
		if status != http.StatusNoContent {
 | 
						|
			w.Write([]byte(StatusText(status)))
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if h.Logger != nil {
 | 
						|
		h.Logger(r, err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) lock(now time.Time, root string) (token string, status int, err error) {
 | 
						|
	token, err = h.LockSystem.Create(now, LockDetails{
 | 
						|
		Root:      root,
 | 
						|
		Duration:  infiniteTimeout,
 | 
						|
		ZeroDepth: true,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		if err == ErrLocked {
 | 
						|
			return "", StatusLocked, err
 | 
						|
		}
 | 
						|
		return "", http.StatusInternalServerError, err
 | 
						|
	}
 | 
						|
	return token, 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) confirmLocks(r *http.Request, src, dst string) (release func(), status int, err error) {
 | 
						|
	hdr := r.Header.Get("If")
 | 
						|
	if hdr == "" {
 | 
						|
		// An empty If header means that the client hasn't previously created locks.
 | 
						|
		// Even if this client doesn't care about locks, we still need to check that
 | 
						|
		// the resources aren't locked by another client, so we create temporary
 | 
						|
		// locks that would conflict with another client's locks. These temporary
 | 
						|
		// locks are unlocked at the end of the HTTP request.
 | 
						|
		now, srcToken, dstToken := time.Now(), "", ""
 | 
						|
		if src != "" {
 | 
						|
			srcToken, status, err = h.lock(now, src)
 | 
						|
			if err != nil {
 | 
						|
				return nil, status, err
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if dst != "" {
 | 
						|
			dstToken, status, err = h.lock(now, dst)
 | 
						|
			if err != nil {
 | 
						|
				if srcToken != "" {
 | 
						|
					h.LockSystem.Unlock(now, srcToken)
 | 
						|
				}
 | 
						|
				return nil, status, err
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return func() {
 | 
						|
			if dstToken != "" {
 | 
						|
				h.LockSystem.Unlock(now, dstToken)
 | 
						|
			}
 | 
						|
			if srcToken != "" {
 | 
						|
				h.LockSystem.Unlock(now, srcToken)
 | 
						|
			}
 | 
						|
		}, 0, nil
 | 
						|
	}
 | 
						|
 | 
						|
	ih, ok := parseIfHeader(hdr)
 | 
						|
	if !ok {
 | 
						|
		return nil, http.StatusBadRequest, errInvalidIfHeader
 | 
						|
	}
 | 
						|
	// ih is a disjunction (OR) of ifLists, so any ifList will do.
 | 
						|
	for _, l := range ih.lists {
 | 
						|
		lsrc := l.resourceTag
 | 
						|
		if lsrc == "" {
 | 
						|
			lsrc = src
 | 
						|
		} else {
 | 
						|
			u, err := url.Parse(lsrc)
 | 
						|
			if err != nil {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
			if u.Host != r.Host {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
			lsrc, status, err = h.stripPrefix(u.Path)
 | 
						|
			if err != nil {
 | 
						|
				return nil, status, err
 | 
						|
			}
 | 
						|
		}
 | 
						|
		release, err = h.LockSystem.Confirm(time.Now(), lsrc, dst, l.conditions...)
 | 
						|
		if err == ErrConfirmationFailed {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		if err != nil {
 | 
						|
			return nil, http.StatusInternalServerError, err
 | 
						|
		}
 | 
						|
		return release, 0, nil
 | 
						|
	}
 | 
						|
	// Section 10.4.1 says that "If this header is evaluated and all state lists
 | 
						|
	// fail, then the request must fail with a 412 (Precondition Failed) status."
 | 
						|
	// We follow the spec even though the cond_put_corrupt_token test case from
 | 
						|
	// the litmus test warns on seeing a 412 instead of a 423 (Locked).
 | 
						|
	return nil, http.StatusPreconditionFailed, ErrLocked
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleOptions(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	ctx := getContext(r)
 | 
						|
	allow := "OPTIONS, LOCK, PUT, MKCOL"
 | 
						|
	if fi, err := h.FileSystem.Stat(ctx, reqPath); err == nil {
 | 
						|
		if fi.IsDir() {
 | 
						|
			allow = "OPTIONS, LOCK, DELETE, PROPPATCH, COPY, MOVE, UNLOCK, PROPFIND"
 | 
						|
		} else {
 | 
						|
			allow = "OPTIONS, LOCK, GET, HEAD, POST, DELETE, PROPPATCH, COPY, MOVE, UNLOCK, PROPFIND, PUT"
 | 
						|
		}
 | 
						|
	}
 | 
						|
	w.Header().Set("Allow", allow)
 | 
						|
	// http://www.webdav.org/specs/rfc4918.html#dav.compliance.classes
 | 
						|
	w.Header().Set("DAV", "1, 2")
 | 
						|
	// http://msdn.microsoft.com/en-au/library/cc250217.aspx
 | 
						|
	w.Header().Set("MS-Author-Via", "DAV")
 | 
						|
	return 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleGetHeadPost(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	// TODO: check locks for read-only access??
 | 
						|
	ctx := getContext(r)
 | 
						|
	f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDONLY, 0)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusNotFound, err
 | 
						|
	}
 | 
						|
	defer f.Close()
 | 
						|
	fi, err := f.Stat()
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusNotFound, err
 | 
						|
	}
 | 
						|
	if fi.IsDir() {
 | 
						|
		return http.StatusMethodNotAllowed, nil
 | 
						|
	}
 | 
						|
	etag, err := findETag(ctx, h.FileSystem, h.LockSystem, reqPath, fi)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusInternalServerError, err
 | 
						|
	}
 | 
						|
	w.Header().Set("ETag", etag)
 | 
						|
	// Let ServeContent determine the Content-Type header.
 | 
						|
	http.ServeContent(w, r, reqPath, fi.ModTime(), f)
 | 
						|
	return 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleDelete(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	release, status, err := h.confirmLocks(r, reqPath, "")
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	defer release()
 | 
						|
 | 
						|
	ctx := getContext(r)
 | 
						|
 | 
						|
	// TODO: return MultiStatus where appropriate.
 | 
						|
 | 
						|
	// "godoc os RemoveAll" says that "If the path does not exist, RemoveAll
 | 
						|
	// returns nil (no error)." WebDAV semantics are that it should return a
 | 
						|
	// "404 Not Found". We therefore have to Stat before we RemoveAll.
 | 
						|
	if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {
 | 
						|
		if os.IsNotExist(err) {
 | 
						|
			return http.StatusNotFound, err
 | 
						|
		}
 | 
						|
		return http.StatusMethodNotAllowed, err
 | 
						|
	}
 | 
						|
	if err := h.FileSystem.RemoveAll(ctx, reqPath); err != nil {
 | 
						|
		return http.StatusMethodNotAllowed, err
 | 
						|
	}
 | 
						|
	return http.StatusNoContent, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handlePut(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	release, status, err := h.confirmLocks(r, reqPath, "")
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	defer release()
 | 
						|
	// TODO(rost): Support the If-Match, If-None-Match headers? See bradfitz'
 | 
						|
	// comments in http.checkEtag.
 | 
						|
	ctx := getContext(r)
 | 
						|
 | 
						|
	f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0666)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusNotFound, err
 | 
						|
	}
 | 
						|
	_, copyErr := io.Copy(f, r.Body)
 | 
						|
	fi, statErr := f.Stat()
 | 
						|
	closeErr := f.Close()
 | 
						|
	// TODO(rost): Returning 405 Method Not Allowed might not be appropriate.
 | 
						|
	if copyErr != nil {
 | 
						|
		return http.StatusMethodNotAllowed, copyErr
 | 
						|
	}
 | 
						|
	if statErr != nil {
 | 
						|
		return http.StatusMethodNotAllowed, statErr
 | 
						|
	}
 | 
						|
	if closeErr != nil {
 | 
						|
		return http.StatusMethodNotAllowed, closeErr
 | 
						|
	}
 | 
						|
	etag, err := findETag(ctx, h.FileSystem, h.LockSystem, reqPath, fi)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusInternalServerError, err
 | 
						|
	}
 | 
						|
	w.Header().Set("ETag", etag)
 | 
						|
	return http.StatusCreated, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleMkcol(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	release, status, err := h.confirmLocks(r, reqPath, "")
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	defer release()
 | 
						|
 | 
						|
	ctx := getContext(r)
 | 
						|
 | 
						|
	if r.ContentLength > 0 {
 | 
						|
		return http.StatusUnsupportedMediaType, nil
 | 
						|
	}
 | 
						|
	if err := h.FileSystem.Mkdir(ctx, reqPath, 0777); err != nil {
 | 
						|
		if os.IsNotExist(err) {
 | 
						|
			return http.StatusConflict, err
 | 
						|
		}
 | 
						|
		return http.StatusMethodNotAllowed, err
 | 
						|
	}
 | 
						|
	return http.StatusCreated, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleCopyMove(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	hdr := r.Header.Get("Destination")
 | 
						|
	if hdr == "" {
 | 
						|
		return http.StatusBadRequest, errInvalidDestination
 | 
						|
	}
 | 
						|
	u, err := url.Parse(hdr)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusBadRequest, errInvalidDestination
 | 
						|
	}
 | 
						|
	if u.Host != r.Host {
 | 
						|
		return http.StatusBadGateway, errInvalidDestination
 | 
						|
	}
 | 
						|
 | 
						|
	src, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
 | 
						|
	dst, status, err := h.stripPrefix(u.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
 | 
						|
	if dst == "" {
 | 
						|
		return http.StatusBadGateway, errInvalidDestination
 | 
						|
	}
 | 
						|
	if dst == src {
 | 
						|
		return http.StatusForbidden, errDestinationEqualsSource
 | 
						|
	}
 | 
						|
 | 
						|
	ctx := getContext(r)
 | 
						|
 | 
						|
	if r.Method == "COPY" {
 | 
						|
		// Section 7.5.1 says that a COPY only needs to lock the destination,
 | 
						|
		// not both destination and source. Strictly speaking, this is racy,
 | 
						|
		// even though a COPY doesn't modify the source, if a concurrent
 | 
						|
		// operation modifies the source. However, the litmus test explicitly
 | 
						|
		// checks that COPYing a locked-by-another source is OK.
 | 
						|
		release, status, err := h.confirmLocks(r, "", dst)
 | 
						|
		if err != nil {
 | 
						|
			return status, err
 | 
						|
		}
 | 
						|
		defer release()
 | 
						|
 | 
						|
		// Section 9.8.3 says that "The COPY method on a collection without a Depth
 | 
						|
		// header must act as if a Depth header with value "infinity" was included".
 | 
						|
		depth := infiniteDepth
 | 
						|
		if hdr := r.Header.Get("Depth"); hdr != "" {
 | 
						|
			depth = parseDepth(hdr)
 | 
						|
			if depth != 0 && depth != infiniteDepth {
 | 
						|
				// Section 9.8.3 says that "A client may submit a Depth header on a
 | 
						|
				// COPY on a collection with a value of "0" or "infinity"."
 | 
						|
				return http.StatusBadRequest, errInvalidDepth
 | 
						|
			}
 | 
						|
		}
 | 
						|
		return copyFiles(ctx, h.FileSystem, src, dst, r.Header.Get("Overwrite") != "F", depth, 0)
 | 
						|
	}
 | 
						|
 | 
						|
	release, status, err := h.confirmLocks(r, src, dst)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	defer release()
 | 
						|
 | 
						|
	// Section 9.9.2 says that "The MOVE method on a collection must act as if
 | 
						|
	// a "Depth: infinity" header was used on it. A client must not submit a
 | 
						|
	// Depth header on a MOVE on a collection with any value but "infinity"."
 | 
						|
	if hdr := r.Header.Get("Depth"); hdr != "" {
 | 
						|
		if parseDepth(hdr) != infiniteDepth {
 | 
						|
			return http.StatusBadRequest, errInvalidDepth
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return moveFiles(ctx, h.FileSystem, src, dst, r.Header.Get("Overwrite") == "T")
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleLock(w http.ResponseWriter, r *http.Request) (retStatus int, retErr error) {
 | 
						|
	duration, err := parseTimeout(r.Header.Get("Timeout"))
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusBadRequest, err
 | 
						|
	}
 | 
						|
	li, status, err := readLockInfo(r.Body)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
 | 
						|
	ctx := getContext(r)
 | 
						|
	token, ld, now, created := "", LockDetails{}, time.Now(), false
 | 
						|
	if li == (lockInfo{}) {
 | 
						|
		// An empty lockInfo means to refresh the lock.
 | 
						|
		ih, ok := parseIfHeader(r.Header.Get("If"))
 | 
						|
		if !ok {
 | 
						|
			return http.StatusBadRequest, errInvalidIfHeader
 | 
						|
		}
 | 
						|
		if len(ih.lists) == 1 && len(ih.lists[0].conditions) == 1 {
 | 
						|
			token = ih.lists[0].conditions[0].Token
 | 
						|
		}
 | 
						|
		if token == "" {
 | 
						|
			return http.StatusBadRequest, errInvalidLockToken
 | 
						|
		}
 | 
						|
		ld, err = h.LockSystem.Refresh(now, token, duration)
 | 
						|
		if err != nil {
 | 
						|
			if err == ErrNoSuchLock {
 | 
						|
				return http.StatusPreconditionFailed, err
 | 
						|
			}
 | 
						|
			return http.StatusInternalServerError, err
 | 
						|
		}
 | 
						|
 | 
						|
	} else {
 | 
						|
		// Section 9.10.3 says that "If no Depth header is submitted on a LOCK request,
 | 
						|
		// then the request MUST act as if a "Depth:infinity" had been submitted."
 | 
						|
		depth := infiniteDepth
 | 
						|
		if hdr := r.Header.Get("Depth"); hdr != "" {
 | 
						|
			depth = parseDepth(hdr)
 | 
						|
			if depth != 0 && depth != infiniteDepth {
 | 
						|
				// Section 9.10.3 says that "Values other than 0 or infinity must not be
 | 
						|
				// used with the Depth header on a LOCK method".
 | 
						|
				return http.StatusBadRequest, errInvalidDepth
 | 
						|
			}
 | 
						|
		}
 | 
						|
		reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
		if err != nil {
 | 
						|
			return status, err
 | 
						|
		}
 | 
						|
		ld = LockDetails{
 | 
						|
			Root:      reqPath,
 | 
						|
			Duration:  duration,
 | 
						|
			OwnerXML:  li.Owner.InnerXML,
 | 
						|
			ZeroDepth: depth == 0,
 | 
						|
		}
 | 
						|
		token, err = h.LockSystem.Create(now, ld)
 | 
						|
		if err != nil {
 | 
						|
			if err == ErrLocked {
 | 
						|
				return StatusLocked, err
 | 
						|
			}
 | 
						|
			return http.StatusInternalServerError, err
 | 
						|
		}
 | 
						|
		defer func() {
 | 
						|
			if retErr != nil {
 | 
						|
				h.LockSystem.Unlock(now, token)
 | 
						|
			}
 | 
						|
		}()
 | 
						|
 | 
						|
		// Create the resource if it didn't previously exist.
 | 
						|
		if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {
 | 
						|
			f, err := h.FileSystem.OpenFile(ctx, reqPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0666)
 | 
						|
			if err != nil {
 | 
						|
				// TODO: detect missing intermediate dirs and return http.StatusConflict?
 | 
						|
				return http.StatusInternalServerError, err
 | 
						|
			}
 | 
						|
			f.Close()
 | 
						|
			created = true
 | 
						|
		}
 | 
						|
 | 
						|
		// http://www.webdav.org/specs/rfc4918.html#HEADER_Lock-Token says that the
 | 
						|
		// Lock-Token value is a Coded-URL. We add angle brackets.
 | 
						|
		w.Header().Set("Lock-Token", "<"+token+">")
 | 
						|
	}
 | 
						|
 | 
						|
	w.Header().Set("Content-Type", "application/xml; charset=utf-8")
 | 
						|
	if created {
 | 
						|
		// This is "w.WriteHeader(http.StatusCreated)" and not "return
 | 
						|
		// http.StatusCreated, nil" because we write our own (XML) response to w
 | 
						|
		// and Handler.ServeHTTP would otherwise write "Created".
 | 
						|
		w.WriteHeader(http.StatusCreated)
 | 
						|
	}
 | 
						|
	writeLockInfo(w, token, ld)
 | 
						|
	return 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleUnlock(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	// http://www.webdav.org/specs/rfc4918.html#HEADER_Lock-Token says that the
 | 
						|
	// Lock-Token value is a Coded-URL. We strip its angle brackets.
 | 
						|
	t := r.Header.Get("Lock-Token")
 | 
						|
	if len(t) < 2 || t[0] != '<' || t[len(t)-1] != '>' {
 | 
						|
		return http.StatusBadRequest, errInvalidLockToken
 | 
						|
	}
 | 
						|
	t = t[1 : len(t)-1]
 | 
						|
 | 
						|
	switch err = h.LockSystem.Unlock(time.Now(), t); err {
 | 
						|
	case nil:
 | 
						|
		return http.StatusNoContent, err
 | 
						|
	case ErrForbidden:
 | 
						|
		return http.StatusForbidden, err
 | 
						|
	case ErrLocked:
 | 
						|
		return StatusLocked, err
 | 
						|
	case ErrNoSuchLock:
 | 
						|
		return http.StatusConflict, err
 | 
						|
	default:
 | 
						|
		return http.StatusInternalServerError, err
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handlePropfind(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	ctx := getContext(r)
 | 
						|
	fi, err := h.FileSystem.Stat(ctx, reqPath)
 | 
						|
	if err != nil {
 | 
						|
		if os.IsNotExist(err) {
 | 
						|
			return http.StatusNotFound, err
 | 
						|
		}
 | 
						|
		return http.StatusMethodNotAllowed, err
 | 
						|
	}
 | 
						|
	depth := infiniteDepth
 | 
						|
	if hdr := r.Header.Get("Depth"); hdr != "" {
 | 
						|
		depth = parseDepth(hdr)
 | 
						|
		if depth == invalidDepth {
 | 
						|
			return http.StatusBadRequest, errInvalidDepth
 | 
						|
		}
 | 
						|
	}
 | 
						|
	pf, status, err := readPropfind(r.Body)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
 | 
						|
	mw := multistatusWriter{w: w}
 | 
						|
 | 
						|
	walkFn := func(reqPath string, info os.FileInfo, err error) error {
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		var pstats []Propstat
 | 
						|
		if pf.Propname != nil {
 | 
						|
			pnames, err := propnames(ctx, h.FileSystem, h.LockSystem, reqPath)
 | 
						|
			if err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
			pstat := Propstat{Status: http.StatusOK}
 | 
						|
			for _, xmlname := range pnames {
 | 
						|
				pstat.Props = append(pstat.Props, Property{XMLName: xmlname})
 | 
						|
			}
 | 
						|
			pstats = append(pstats, pstat)
 | 
						|
		} else if pf.Allprop != nil {
 | 
						|
			pstats, err = allprop(ctx, h.FileSystem, h.LockSystem, reqPath, pf.Prop)
 | 
						|
		} else {
 | 
						|
			pstats, err = props(ctx, h.FileSystem, h.LockSystem, reqPath, pf.Prop)
 | 
						|
		}
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		return mw.write(makePropstatResponse(path.Join(h.Prefix, reqPath), pstats))
 | 
						|
	}
 | 
						|
 | 
						|
	walkErr := walkFS(ctx, h.FileSystem, depth, reqPath, fi, walkFn)
 | 
						|
	closeErr := mw.close()
 | 
						|
	if walkErr != nil {
 | 
						|
		return http.StatusInternalServerError, walkErr
 | 
						|
	}
 | 
						|
	if closeErr != nil {
 | 
						|
		return http.StatusInternalServerError, closeErr
 | 
						|
	}
 | 
						|
	return 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *Handler) handleProppatch(w http.ResponseWriter, r *http.Request) (status int, err error) {
 | 
						|
	reqPath, status, err := h.stripPrefix(r.URL.Path)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	release, status, err := h.confirmLocks(r, reqPath, "")
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	defer release()
 | 
						|
 | 
						|
	ctx := getContext(r)
 | 
						|
 | 
						|
	if _, err := h.FileSystem.Stat(ctx, reqPath); err != nil {
 | 
						|
		if os.IsNotExist(err) {
 | 
						|
			return http.StatusNotFound, err
 | 
						|
		}
 | 
						|
		return http.StatusMethodNotAllowed, err
 | 
						|
	}
 | 
						|
	patches, status, err := readProppatch(r.Body)
 | 
						|
	if err != nil {
 | 
						|
		return status, err
 | 
						|
	}
 | 
						|
	pstats, err := patch(ctx, h.FileSystem, h.LockSystem, reqPath, patches)
 | 
						|
	if err != nil {
 | 
						|
		return http.StatusInternalServerError, err
 | 
						|
	}
 | 
						|
	mw := multistatusWriter{w: w}
 | 
						|
	writeErr := mw.write(makePropstatResponse(r.URL.Path, pstats))
 | 
						|
	closeErr := mw.close()
 | 
						|
	if writeErr != nil {
 | 
						|
		return http.StatusInternalServerError, writeErr
 | 
						|
	}
 | 
						|
	if closeErr != nil {
 | 
						|
		return http.StatusInternalServerError, closeErr
 | 
						|
	}
 | 
						|
	return 0, nil
 | 
						|
}
 | 
						|
 | 
						|
func makePropstatResponse(href string, pstats []Propstat) *response {
 | 
						|
	resp := response{
 | 
						|
		Href:     []string{(&url.URL{Path: href}).EscapedPath()},
 | 
						|
		Propstat: make([]propstat, 0, len(pstats)),
 | 
						|
	}
 | 
						|
	for _, p := range pstats {
 | 
						|
		var xmlErr *xmlError
 | 
						|
		if p.XMLError != "" {
 | 
						|
			xmlErr = &xmlError{InnerXML: []byte(p.XMLError)}
 | 
						|
		}
 | 
						|
		resp.Propstat = append(resp.Propstat, propstat{
 | 
						|
			Status:              fmt.Sprintf("HTTP/1.1 %d %s", p.Status, StatusText(p.Status)),
 | 
						|
			Prop:                p.Props,
 | 
						|
			ResponseDescription: p.ResponseDescription,
 | 
						|
			Error:               xmlErr,
 | 
						|
		})
 | 
						|
	}
 | 
						|
	return &resp
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	infiniteDepth = -1
 | 
						|
	invalidDepth  = -2
 | 
						|
)
 | 
						|
 | 
						|
// parseDepth maps the strings "0", "1" and "infinity" to 0, 1 and
 | 
						|
// infiniteDepth. Parsing any other string returns invalidDepth.
 | 
						|
//
 | 
						|
// Different WebDAV methods have further constraints on valid depths:
 | 
						|
//	- PROPFIND has no further restrictions, as per section 9.1.
 | 
						|
//	- COPY accepts only "0" or "infinity", as per section 9.8.3.
 | 
						|
//	- MOVE accepts only "infinity", as per section 9.9.2.
 | 
						|
//	- LOCK accepts only "0" or "infinity", as per section 9.10.3.
 | 
						|
// These constraints are enforced by the handleXxx methods.
 | 
						|
func parseDepth(s string) int {
 | 
						|
	switch s {
 | 
						|
	case "0":
 | 
						|
		return 0
 | 
						|
	case "1":
 | 
						|
		return 1
 | 
						|
	case "infinity":
 | 
						|
		return infiniteDepth
 | 
						|
	}
 | 
						|
	return invalidDepth
 | 
						|
}
 | 
						|
 | 
						|
// http://www.webdav.org/specs/rfc4918.html#status.code.extensions.to.http11
 | 
						|
const (
 | 
						|
	StatusMulti               = 207
 | 
						|
	StatusUnprocessableEntity = 422
 | 
						|
	StatusLocked              = 423
 | 
						|
	StatusFailedDependency    = 424
 | 
						|
	StatusInsufficientStorage = 507
 | 
						|
)
 | 
						|
 | 
						|
func StatusText(code int) string {
 | 
						|
	switch code {
 | 
						|
	case StatusMulti:
 | 
						|
		return "Multi-Status"
 | 
						|
	case StatusUnprocessableEntity:
 | 
						|
		return "Unprocessable Entity"
 | 
						|
	case StatusLocked:
 | 
						|
		return "Locked"
 | 
						|
	case StatusFailedDependency:
 | 
						|
		return "Failed Dependency"
 | 
						|
	case StatusInsufficientStorage:
 | 
						|
		return "Insufficient Storage"
 | 
						|
	}
 | 
						|
	return http.StatusText(code)
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	errDestinationEqualsSource = errors.New("webdav: destination equals source")
 | 
						|
	errDirectoryNotEmpty       = errors.New("webdav: directory not empty")
 | 
						|
	errInvalidDepth            = errors.New("webdav: invalid depth")
 | 
						|
	errInvalidDestination      = errors.New("webdav: invalid destination")
 | 
						|
	errInvalidIfHeader         = errors.New("webdav: invalid If header")
 | 
						|
	errInvalidLockInfo         = errors.New("webdav: invalid lock info")
 | 
						|
	errInvalidLockToken        = errors.New("webdav: invalid lock token")
 | 
						|
	errInvalidPropfind         = errors.New("webdav: invalid propfind")
 | 
						|
	errInvalidProppatch        = errors.New("webdav: invalid proppatch")
 | 
						|
	errInvalidResponse         = errors.New("webdav: invalid response")
 | 
						|
	errInvalidTimeout          = errors.New("webdav: invalid timeout")
 | 
						|
	errNoFileSystem            = errors.New("webdav: no file system")
 | 
						|
	errNoLockSystem            = errors.New("webdav: no lock system")
 | 
						|
	errNotADirectory           = errors.New("webdav: not a directory")
 | 
						|
	errPrefixMismatch          = errors.New("webdav: prefix mismatch")
 | 
						|
	errRecursionTooDeep        = errors.New("webdav: recursion too deep")
 | 
						|
	errUnsupportedLockInfo     = errors.New("webdav: unsupported lock info")
 | 
						|
	errUnsupportedMethod       = errors.New("webdav: unsupported method")
 | 
						|
)
 |