This commit is contained in:
64
CHANGELOG.md
64
CHANGELOG.md
@@ -1,5 +1,69 @@
|
|||||||
# Changelog
|
# Changelog
|
||||||
|
|
||||||
|
## Changes 10/17/2025 (v1.5.0)
|
||||||
|
|
||||||
|
Security and permission model overhaul. Tightens access controls with explicit, server‑side ACL checks across controllers and WebDAV. Introduces `read_own` for own‑only visibility and separates view from write so uploaders can’t automatically see others’ files. Fixes session warnings and aligns the admin UI with the new capabilities.
|
||||||
|
|
||||||
|
> **Security note**
|
||||||
|
> This release contains security hardening based on a private report (tracked via a GitHub Security Advisory, CVE pending). For responsible disclosure, details will be published alongside the advisory once available. Users should upgrade promptly.
|
||||||
|
|
||||||
|
### Highlights
|
||||||
|
|
||||||
|
- **ACL**
|
||||||
|
- New `read_own` bucket (own‑only visibility) alongside `owners`, `read`, `write`, `share`.
|
||||||
|
- **Semantic change:** `write` no longer implies `read`.
|
||||||
|
- `ACL::applyUserGrantsAtomic()` to atomically set per‑folder grants (`view`, `viewOwn`, `upload`, `manage`, `share`).
|
||||||
|
- `ACL::purgeUser($username)` to remove a user from all buckets (used when deleting a user).
|
||||||
|
- Auto‑heal `folder_acl.json` (ensure `root` exists; add missing buckets; de‑dupe; normalize types).
|
||||||
|
- More robust admin detection (role flag or session/admin user).
|
||||||
|
|
||||||
|
- **Controllers**
|
||||||
|
- `FileController`: ACL + ownership enforcement for list, download, zip download, extract, move, copy, rename, create, save, tag edit, and share‑link creation. `getFileList()` now filters to the caller’s uploads when they only have `read_own` (no `read`).
|
||||||
|
- `UploadController`: requires `ACL::canWrite()` for the target folder; CSRF refresh path improved; admin bypass intact.
|
||||||
|
- `FolderController`: listing filtered by `ACL::canRead()`; optional parent filter preserved; removed name‑based ownership assumptions.
|
||||||
|
|
||||||
|
- **Admin UI**
|
||||||
|
- Folder Access grid now includes **View (own)**; bulk toolbar actions; column alignment fixes; more space for folder names; dark‑mode polish.
|
||||||
|
|
||||||
|
- **WebDAV**
|
||||||
|
- WebDAV now enforces ACL consistently: listing requires `read` (or `read_own` ⇒ shows only caller’s files); writes require `write`.
|
||||||
|
- Removed legacy “folderOnly” behavior — ACL is the single source of truth.
|
||||||
|
- Metadata/uploader is preserved through existing models.
|
||||||
|
|
||||||
|
### Behavior changes (⚠️ Breaking)
|
||||||
|
|
||||||
|
- **`write` no longer implies `read`.**
|
||||||
|
- If you want uploaders to see all files in a folder, also grant **View (all)** (`read`).
|
||||||
|
- If you want uploaders to see only their own files, grant **View (own)** (`read_own`).
|
||||||
|
|
||||||
|
- **Removed:** legacy `folderOnly` view logic in favor of ACL‑based access.
|
||||||
|
|
||||||
|
### Upgrade checklist
|
||||||
|
|
||||||
|
1. Review **Folder Access** in the admin UI and grant **View (all)** or **View (own)** where appropriate.
|
||||||
|
2. For users who previously had “upload but not view,” confirm they now have **Upload** + **View (own)** (or add **View (all)** if intended).
|
||||||
|
3. Verify WebDAV behavior for representative users:
|
||||||
|
- `read` shows full listings; `read_own` lists only the caller’s files.
|
||||||
|
- Writes only succeed where `write` is granted.
|
||||||
|
4. Confirm admin can upload/move/zip across all folders (regression tested).
|
||||||
|
|
||||||
|
### Affected areas
|
||||||
|
|
||||||
|
- `config/config.php` — session/cookie initialization ordering; proxy header handling.
|
||||||
|
- `src/lib/ACL.php` — new bucket, semantics, healing, purge, admin detection.
|
||||||
|
- `src/controllers/FileController.php` — ACL + ownership gates across operations.
|
||||||
|
- `src/controllers/UploadController.php` — write checks + CSRF refresh handling.
|
||||||
|
- `src/controllers/FolderController.php` — ACL‑filtered listing and parent scoping.
|
||||||
|
- `public/api/admin/acl/*.php` — includes `viewOwn` round‑trip and sanitization.
|
||||||
|
- `public/js/*` & CSS — folder access grid alignment and layout fixes.
|
||||||
|
- `src/webdav/*` & `public/webdav.php` — ACL‑aware WebDAV server.
|
||||||
|
|
||||||
|
### Credits
|
||||||
|
|
||||||
|
- Security report acknowledged privately and will be credited in the published advisory.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
## Changes 10/15/2025 (v1.4.0)
|
## Changes 10/15/2025 (v1.4.0)
|
||||||
|
|
||||||
feat(permissions)!: granular ACL (bypassOwnership/canShare/canZip/viewOwnOnly), admin panel v1.4.0 UI, and broad hardening across controllers/models/frontend
|
feat(permissions)!: granular ACL (bypassOwnership/canShare/canZip/viewOwnOnly), admin panel v1.4.0 UI, and broad hardening across controllers/models/frontend
|
||||||
|
|||||||
@@ -6,8 +6,8 @@ We provide security fixes for the latest minor release line.
|
|||||||
|
|
||||||
| Version | Supported |
|
| Version | Supported |
|
||||||
|------------|-----------|
|
|------------|-----------|
|
||||||
| v1.4.x | ✅ |
|
| v1.5.x | ✅ |
|
||||||
| < v1.4.0 | ❌ |
|
| < v1.5.0 | ❌ |
|
||||||
|
|
||||||
## Reporting a Vulnerability
|
## Reporting a Vulnerability
|
||||||
|
|
||||||
|
|||||||
@@ -35,13 +35,11 @@ define('REGEX_USER', '/^[\p{L}\p{N}_\- ]+$/u');
|
|||||||
|
|
||||||
date_default_timezone_set(TIMEZONE);
|
date_default_timezone_set(TIMEZONE);
|
||||||
|
|
||||||
|
|
||||||
if (!defined('DEFAULT_BYPASS_OWNERSHIP')) define('DEFAULT_BYPASS_OWNERSHIP', false);
|
if (!defined('DEFAULT_BYPASS_OWNERSHIP')) define('DEFAULT_BYPASS_OWNERSHIP', false);
|
||||||
if (!defined('DEFAULT_CAN_SHARE')) define('DEFAULT_CAN_SHARE', true);
|
if (!defined('DEFAULT_CAN_SHARE')) define('DEFAULT_CAN_SHARE', true);
|
||||||
if (!defined('DEFAULT_CAN_ZIP')) define('DEFAULT_CAN_ZIP', true);
|
if (!defined('DEFAULT_CAN_ZIP')) define('DEFAULT_CAN_ZIP', true);
|
||||||
if (!defined('DEFAULT_VIEW_OWN_ONLY')) define('DEFAULT_VIEW_OWN_ONLY', false);
|
if (!defined('DEFAULT_VIEW_OWN_ONLY')) define('DEFAULT_VIEW_OWN_ONLY', false);
|
||||||
|
define('FOLDER_OWNERS_FILE', META_DIR . 'folder_owners.json');
|
||||||
|
|
||||||
|
|
||||||
// Encryption helpers
|
// Encryption helpers
|
||||||
function encryptData($data, $encryptionKey)
|
function encryptData($data, $encryptionKey)
|
||||||
@@ -77,16 +75,27 @@ function loadUserPermissions($username)
|
|||||||
{
|
{
|
||||||
global $encryptionKey;
|
global $encryptionKey;
|
||||||
$permissionsFile = USERS_DIR . 'userPermissions.json';
|
$permissionsFile = USERS_DIR . 'userPermissions.json';
|
||||||
if (file_exists($permissionsFile)) {
|
if (!file_exists($permissionsFile)) {
|
||||||
$content = file_get_contents($permissionsFile);
|
return false;
|
||||||
$decrypted = decryptData($content, $encryptionKey);
|
|
||||||
$json = ($decrypted !== false) ? $decrypted : $content;
|
|
||||||
$perms = json_decode($json, true);
|
|
||||||
if (is_array($perms) && isset($perms[$username])) {
|
|
||||||
return !empty($perms[$username]) ? $perms[$username] : false;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return false;
|
|
||||||
|
$content = file_get_contents($permissionsFile);
|
||||||
|
$decrypted = decryptData($content, $encryptionKey);
|
||||||
|
$json = ($decrypted !== false) ? $decrypted : $content;
|
||||||
|
$permsAll = json_decode($json, true);
|
||||||
|
|
||||||
|
if (!is_array($permsAll)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try exact match first, then lowercase (since we store keys lowercase elsewhere)
|
||||||
|
$uExact = (string)$username;
|
||||||
|
$uLower = strtolower($uExact);
|
||||||
|
|
||||||
|
$row = $permsAll[$uExact] ?? $permsAll[$uLower] ?? null;
|
||||||
|
|
||||||
|
// Normalize: always return an array when found, else false (to preserve current callers’ behavior)
|
||||||
|
return is_array($row) ? $row : false;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Determine HTTPS usage
|
// Determine HTTPS usage
|
||||||
@@ -96,25 +105,39 @@ $secure = ($envSecure !== false)
|
|||||||
: (!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] !== 'off');
|
: (!empty($_SERVER['HTTPS']) && $_SERVER['HTTPS'] !== 'off');
|
||||||
|
|
||||||
// Choose session lifetime based on "remember me" cookie
|
// Choose session lifetime based on "remember me" cookie
|
||||||
$defaultSession = 7200; // 2 hours
|
$defaultSession = 7200; // 2 hours
|
||||||
$persistentDays = 30 * 24 * 60 * 60; // 30 days
|
$persistentDays = 30 * 24 * 60 * 60; // 30 days
|
||||||
$sessionLifetime = isset($_COOKIE['remember_me_token'])
|
$sessionLifetime = isset($_COOKIE['remember_me_token']) ? $persistentDays : $defaultSession;
|
||||||
? $persistentDays
|
|
||||||
: $defaultSession;
|
|
||||||
|
|
||||||
// Configure PHP session cookie and GC
|
|
||||||
session_set_cookie_params([
|
|
||||||
'lifetime' => $sessionLifetime,
|
|
||||||
'path' => '/',
|
|
||||||
'domain' => '', // adjust if you need a specific domain
|
|
||||||
'secure' => $secure,
|
|
||||||
'httponly' => true,
|
|
||||||
'samesite' => 'Lax'
|
|
||||||
]);
|
|
||||||
ini_set('session.gc_maxlifetime', (string)$sessionLifetime);
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Start session idempotently:
|
||||||
|
* - If no session: set cookie params + gc_maxlifetime, then session_start().
|
||||||
|
* - If session already active: DO NOT change ini/cookie params; optionally refresh cookie expiry.
|
||||||
|
*/
|
||||||
if (session_status() === PHP_SESSION_NONE) {
|
if (session_status() === PHP_SESSION_NONE) {
|
||||||
|
session_set_cookie_params([
|
||||||
|
'lifetime' => $sessionLifetime,
|
||||||
|
'path' => '/',
|
||||||
|
'domain' => '', // adjust if you need a specific domain
|
||||||
|
'secure' => $secure,
|
||||||
|
'httponly' => true,
|
||||||
|
'samesite' => 'Lax'
|
||||||
|
]);
|
||||||
|
ini_set('session.gc_maxlifetime', (string)$sessionLifetime);
|
||||||
session_start();
|
session_start();
|
||||||
|
} else {
|
||||||
|
// Optionally refresh the session cookie expiry to keep the user alive
|
||||||
|
$params = session_get_cookie_params();
|
||||||
|
if ($sessionLifetime > 0) {
|
||||||
|
setcookie(session_name(), session_id(), [
|
||||||
|
'expires' => time() + $sessionLifetime,
|
||||||
|
'path' => $params['path'] ?: '/',
|
||||||
|
'domain' => $params['domain'] ?? '',
|
||||||
|
'secure' => $secure,
|
||||||
|
'httponly' => true,
|
||||||
|
'samesite' => $params['samesite'] ?? 'Lax',
|
||||||
|
]);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// CSRF token
|
// CSRF token
|
||||||
@@ -122,8 +145,7 @@ if (empty($_SESSION['csrf_token'])) {
|
|||||||
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Auto-login via persistent token
|
||||||
// Auto‑login via persistent token
|
|
||||||
if (empty($_SESSION["authenticated"]) && !empty($_COOKIE['remember_me_token'])) {
|
if (empty($_SESSION["authenticated"]) && !empty($_COOKIE['remember_me_token'])) {
|
||||||
$tokFile = USERS_DIR . 'persistent_tokens.json';
|
$tokFile = USERS_DIR . 'persistent_tokens.json';
|
||||||
$tokens = [];
|
$tokens = [];
|
||||||
|
|||||||
79
public/api/admin/acl/getGrants.php
Normal file
79
public/api/admin/acl/getGrants.php
Normal file
@@ -0,0 +1,79 @@
|
|||||||
|
<?php
|
||||||
|
// public/api/admin/acl/getGrants.php
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
require_once __DIR__ . '/../../../../config/config.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/models/FolderModel.php';
|
||||||
|
|
||||||
|
if (session_status() !== PHP_SESSION_ACTIVE) session_start();
|
||||||
|
header('Content-Type: application/json');
|
||||||
|
|
||||||
|
// Admin only
|
||||||
|
if (empty($_SESSION['authenticated']) || empty($_SESSION['isAdmin'])) {
|
||||||
|
http_response_code(401); echo json_encode(['error'=>'Unauthorized']); exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
$user = trim((string)($_GET['user'] ?? ''));
|
||||||
|
if ($user === '' || !preg_match(REGEX_USER, $user)) {
|
||||||
|
http_response_code(400); echo json_encode(['error'=>'Invalid user']); exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build the folder list (admin sees all)
|
||||||
|
$folders = [];
|
||||||
|
try {
|
||||||
|
$rows = FolderModel::getFolderList();
|
||||||
|
if (is_array($rows)) {
|
||||||
|
foreach ($rows as $r) {
|
||||||
|
$f = is_array($r) ? ($r['folder'] ?? '') : (string)$r;
|
||||||
|
if ($f !== '') $folders[$f] = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (Throwable $e) { /* ignore */ }
|
||||||
|
|
||||||
|
if (empty($folders)) {
|
||||||
|
$aclPath = META_DIR . 'folder_acl.json';
|
||||||
|
if (is_file($aclPath)) {
|
||||||
|
$data = json_decode((string)@file_get_contents($aclPath), true);
|
||||||
|
if (is_array($data['folders'] ?? null)) {
|
||||||
|
foreach ($data['folders'] as $name => $_) $folders[$name] = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$folderList = array_keys($folders);
|
||||||
|
if (!in_array('root', $folderList, true)) array_unshift($folderList, 'root');
|
||||||
|
|
||||||
|
$has = function(array $arr, string $u): bool {
|
||||||
|
foreach ($arr as $x) if (strcasecmp((string)$x, $u) === 0) return true;
|
||||||
|
return false;
|
||||||
|
};
|
||||||
|
|
||||||
|
$out = [];
|
||||||
|
foreach ($folderList as $f) {
|
||||||
|
$rec = ACL::explicit($f); // owners, read, write, share, read_own
|
||||||
|
|
||||||
|
$isOwner = $has($rec['owners'], $user);
|
||||||
|
$canUpload = $isOwner || $has($rec['write'], $user);
|
||||||
|
|
||||||
|
// IMPORTANT: full view only if owner or explicit read
|
||||||
|
$canViewAll = $isOwner || $has($rec['read'], $user);
|
||||||
|
|
||||||
|
// own-only view reflects explicit read_own (we keep it separate even if they have full view)
|
||||||
|
$canViewOwn = $has($rec['read_own'], $user);
|
||||||
|
|
||||||
|
// Share only if owner or explicit share
|
||||||
|
$canShare = $isOwner || $has($rec['share'], $user);
|
||||||
|
|
||||||
|
if ($canViewAll || $canViewOwn || $canUpload || $isOwner || $canShare) {
|
||||||
|
$out[$f] = [
|
||||||
|
'view' => $canViewAll,
|
||||||
|
'viewOwn' => $canViewOwn,
|
||||||
|
'upload' => $canUpload,
|
||||||
|
'manage' => $isOwner,
|
||||||
|
'share' => $canShare,
|
||||||
|
];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
echo json_encode(['grants' => $out], JSON_UNESCAPED_SLASHES);
|
||||||
105
public/api/admin/acl/saveGrants.php
Normal file
105
public/api/admin/acl/saveGrants.php
Normal file
@@ -0,0 +1,105 @@
|
|||||||
|
<?php
|
||||||
|
// public/api/admin/acl/saveGrants.php
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
require_once __DIR__ . '/../../../../config/config.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
|
||||||
|
if (session_status() !== PHP_SESSION_ACTIVE) session_start();
|
||||||
|
header('Content-Type: application/json');
|
||||||
|
|
||||||
|
// ---- Auth + CSRF -----------------------------------------------------------
|
||||||
|
if (empty($_SESSION['authenticated']) || empty($_SESSION['isAdmin'])) {
|
||||||
|
http_response_code(401);
|
||||||
|
echo json_encode(['error' => 'Unauthorized']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
$headers = function_exists('getallheaders') ? array_change_key_case(getallheaders(), CASE_LOWER) : [];
|
||||||
|
$csrf = trim($headers['x-csrf-token'] ?? ($_POST['csrfToken'] ?? ''));
|
||||||
|
|
||||||
|
if (empty($_SESSION['csrf_token']) || $csrf !== $_SESSION['csrf_token']) {
|
||||||
|
http_response_code(403);
|
||||||
|
echo json_encode(['error' => 'Invalid CSRF token']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- Helpers ---------------------------------------------------------------
|
||||||
|
/**
|
||||||
|
* Sanitize a grants map to allowed flags only:
|
||||||
|
* view | viewOwn | upload | manage | share
|
||||||
|
*/
|
||||||
|
function sanitize_grants_map(array $grants): array {
|
||||||
|
$allowed = ['view','viewOwn','upload','manage','share'];
|
||||||
|
$out = [];
|
||||||
|
foreach ($grants as $folder => $caps) {
|
||||||
|
if (!is_string($folder)) $folder = (string)$folder;
|
||||||
|
if (!is_array($caps)) $caps = [];
|
||||||
|
$row = [];
|
||||||
|
foreach ($allowed as $k) {
|
||||||
|
$row[$k] = !empty($caps[$k]);
|
||||||
|
}
|
||||||
|
// include folder even if all false (signals "remove all for this user on this folder")
|
||||||
|
$out[$folder] = $row;
|
||||||
|
}
|
||||||
|
return $out;
|
||||||
|
}
|
||||||
|
|
||||||
|
function valid_user(string $u): bool {
|
||||||
|
return ($u !== '' && preg_match(REGEX_USER, $u));
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- Read JSON body --------------------------------------------------------
|
||||||
|
$raw = file_get_contents('php://input');
|
||||||
|
$in = json_decode((string)$raw, true);
|
||||||
|
if (!is_array($in)) {
|
||||||
|
http_response_code(400);
|
||||||
|
echo json_encode(['error' => 'Invalid JSON']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- Single user mode: { user, grants } ------------------------------------
|
||||||
|
if (isset($in['user']) && isset($in['grants']) && is_array($in['grants'])) {
|
||||||
|
$user = trim((string)$in['user']);
|
||||||
|
if (!valid_user($user)) {
|
||||||
|
http_response_code(400);
|
||||||
|
echo json_encode(['error' => 'Invalid user']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
$grants = sanitize_grants_map($in['grants']);
|
||||||
|
|
||||||
|
try {
|
||||||
|
$res = ACL::applyUserGrantsAtomic($user, $grants);
|
||||||
|
echo json_encode($res, JSON_UNESCAPED_SLASHES);
|
||||||
|
exit;
|
||||||
|
} catch (Throwable $e) {
|
||||||
|
http_response_code(500);
|
||||||
|
echo json_encode(['error' => 'Failed to save grants', 'detail' => $e->getMessage()]);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- Batch mode: { changes: [ { user, grants }, ... ] } --------------------
|
||||||
|
if (isset($in['changes']) && is_array($in['changes'])) {
|
||||||
|
$updated = [];
|
||||||
|
foreach ($in['changes'] as $chg) {
|
||||||
|
if (!is_array($chg)) continue;
|
||||||
|
$user = trim((string)($chg['user'] ?? ''));
|
||||||
|
$gr = $chg['grants'] ?? null;
|
||||||
|
if (!valid_user($user) || !is_array($gr)) continue;
|
||||||
|
|
||||||
|
try {
|
||||||
|
$res = ACL::applyUserGrantsAtomic($user, sanitize_grants_map($gr));
|
||||||
|
$updated[$user] = $res['updated'] ?? [];
|
||||||
|
} catch (Throwable $e) {
|
||||||
|
$updated[$user] = ['error' => $e->getMessage()];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
echo json_encode(['ok' => true, 'updated' => $updated], JSON_UNESCAPED_SLASHES);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- Fallback --------------------------------------------------------------
|
||||||
|
http_response_code(400);
|
||||||
|
echo json_encode(['error' => 'Invalid payload: expected {user,grants} or {changes:[{user,grants}]}']);
|
||||||
120
public/api/folder/capabilities.php
Normal file
120
public/api/folder/capabilities.php
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
<?php
|
||||||
|
// public/api/folder/capabilities.php
|
||||||
|
if (session_status() !== PHP_SESSION_ACTIVE) session_start();
|
||||||
|
|
||||||
|
require_once __DIR__ . '/../../../config/config.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/models/UserModel.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/models/FolderModel.php';
|
||||||
|
|
||||||
|
header('Content-Type: application/json');
|
||||||
|
|
||||||
|
// --- auth ---
|
||||||
|
$username = $_SESSION['username'] ?? '';
|
||||||
|
if ($username === '') {
|
||||||
|
http_response_code(401);
|
||||||
|
echo json_encode(['error' => 'Unauthorized']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- helpers ---
|
||||||
|
function loadPermsFor(string $u): array {
|
||||||
|
try {
|
||||||
|
if (function_exists('loadUserPermissions')) {
|
||||||
|
$p = loadUserPermissions($u);
|
||||||
|
return is_array($p) ? $p : [];
|
||||||
|
}
|
||||||
|
if (class_exists('userModel') && method_exists('userModel', 'getUserPermissions')) {
|
||||||
|
$all = userModel::getUserPermissions();
|
||||||
|
if (is_array($all)) {
|
||||||
|
if (isset($all[$u])) return (array)$all[$u];
|
||||||
|
$lk = strtolower($u);
|
||||||
|
if (isset($all[$lk])) return (array)$all[$lk];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (Throwable $e) {}
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
|
||||||
|
function isAdminUser(string $u, array $perms): bool {
|
||||||
|
if (!empty($perms['admin']) || !empty($perms['isAdmin'])) return true;
|
||||||
|
if (!empty($_SESSION['isAdmin']) && $_SESSION['isAdmin'] === true) return true;
|
||||||
|
$role = $_SESSION['role'] ?? null;
|
||||||
|
if ($role === 'admin' || $role === '1' || $role === 1) return true;
|
||||||
|
if ($u) {
|
||||||
|
$r = userModel::getUserRole($u);
|
||||||
|
if ($r === '1') return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
function inUserFolderScope(string $folder, string $u, array $perms, bool $isAdmin): bool {
|
||||||
|
if ($isAdmin) return true;
|
||||||
|
$folderOnly = !empty($perms['folderOnly']) || !empty($perms['userFolderOnly']) || !empty($perms['UserFolderOnly']);
|
||||||
|
if (!$folderOnly) return true;
|
||||||
|
$f = trim($folder);
|
||||||
|
if ($f === '' || strcasecmp($f, 'root') === 0) return false; // non-admin folderOnly: not root
|
||||||
|
return ($f === $u) || (strpos($f, $u . '/') === 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- inputs ---
|
||||||
|
$folder = isset($_GET['folder']) ? trim((string)$_GET['folder']) : 'root';
|
||||||
|
// validate folder path: allow "root" or nested segments matching REGEX_FOLDER_NAME
|
||||||
|
if ($folder !== 'root') {
|
||||||
|
$parts = array_filter(explode('/', trim($folder, "/\\ ")));
|
||||||
|
if (empty($parts)) {
|
||||||
|
http_response_code(400);
|
||||||
|
echo json_encode(['error' => 'Invalid folder name.']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
foreach ($parts as $seg) {
|
||||||
|
if (!preg_match(REGEX_FOLDER_NAME, $seg)) {
|
||||||
|
http_response_code(400);
|
||||||
|
echo json_encode(['error' => 'Invalid folder name.']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
$folder = implode('/', $parts);
|
||||||
|
}
|
||||||
|
|
||||||
|
$perms = loadPermsFor($username);
|
||||||
|
$isAdmin = isAdminUser($username, $perms);
|
||||||
|
|
||||||
|
// base permissions via ACL
|
||||||
|
$canRead = $isAdmin || ACL::canRead($username, $perms, $folder);
|
||||||
|
$canWrite = $isAdmin || ACL::canWrite($username, $perms, $folder);
|
||||||
|
$canShare = $isAdmin || ACL::canShare($username, $perms, $folder);
|
||||||
|
|
||||||
|
// scope + flags
|
||||||
|
$inScope = inUserFolderScope($folder, $username, $perms, $isAdmin);
|
||||||
|
$readOnly = !empty($perms['readOnly']);
|
||||||
|
$disableUpload = !empty($perms['disableUpload']);
|
||||||
|
|
||||||
|
$canUpload = $canWrite && !$readOnly && !$disableUpload && $inScope;
|
||||||
|
$canCreateFolder = $canWrite && !$readOnly && $inScope;
|
||||||
|
$canRename = $canWrite && !$readOnly && $inScope;
|
||||||
|
$canDelete = $canWrite && !$readOnly && $inScope;
|
||||||
|
$canMoveIn = $canWrite && !$readOnly && $inScope;
|
||||||
|
|
||||||
|
// (optional) owner info if you need it client-side
|
||||||
|
$owner = FolderModel::getOwnerFor($folder);
|
||||||
|
|
||||||
|
// output
|
||||||
|
echo json_encode([
|
||||||
|
'user' => $username,
|
||||||
|
'folder' => $folder,
|
||||||
|
'isAdmin' => $isAdmin,
|
||||||
|
'flags' => [
|
||||||
|
'folderOnly' => !empty($perms['folderOnly']) || !empty($perms['userFolderOnly']) || !empty($perms['UserFolderOnly']),
|
||||||
|
'readOnly' => $readOnly,
|
||||||
|
'disableUpload' => $disableUpload,
|
||||||
|
],
|
||||||
|
'owner' => $owner,
|
||||||
|
'canView' => $canRead,
|
||||||
|
'canUpload' => $canUpload,
|
||||||
|
'canCreate' => $canCreateFolder,
|
||||||
|
'canRename' => $canRename,
|
||||||
|
'canDelete' => $canDelete,
|
||||||
|
'canMoveIn' => $canMoveIn,
|
||||||
|
'canShare' => $canShare,
|
||||||
|
], JSON_UNESCAPED_UNICODE | JSON_UNESCAPED_SLASHES);
|
||||||
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@@ -7,6 +7,28 @@ import { openFolderShareModal } from './folderShareModal.js';
|
|||||||
import { fetchWithCsrf } from './auth.js';
|
import { fetchWithCsrf } from './auth.js';
|
||||||
import { loadCsrfToken } from './main.js';
|
import { loadCsrfToken } from './main.js';
|
||||||
|
|
||||||
|
/* ----------------------
|
||||||
|
Helpers: safe JSON + state
|
||||||
|
----------------------*/
|
||||||
|
|
||||||
|
// Robust JSON reader that surfaces server errors (with status)
|
||||||
|
async function safeJson(res) {
|
||||||
|
const text = await res.text();
|
||||||
|
let body = null;
|
||||||
|
try { body = text ? JSON.parse(text) : null; } catch { /* ignore */ }
|
||||||
|
|
||||||
|
if (!res.ok) {
|
||||||
|
const msg =
|
||||||
|
(body && (body.error || body.message)) ||
|
||||||
|
(text && text.trim()) ||
|
||||||
|
`HTTP ${res.status}`;
|
||||||
|
const err = new Error(msg);
|
||||||
|
err.status = res.status;
|
||||||
|
throw err;
|
||||||
|
}
|
||||||
|
return body ?? {};
|
||||||
|
}
|
||||||
|
|
||||||
/* ----------------------
|
/* ----------------------
|
||||||
Helper Functions (Data/State)
|
Helper Functions (Data/State)
|
||||||
----------------------*/
|
----------------------*/
|
||||||
@@ -15,7 +37,7 @@ import { loadCsrfToken } from './main.js';
|
|||||||
export function formatFolderName(folder) {
|
export function formatFolderName(folder) {
|
||||||
if (typeof folder !== "string") return "";
|
if (typeof folder !== "string") return "";
|
||||||
if (folder.indexOf("/") !== -1) {
|
if (folder.indexOf("/") !== -1) {
|
||||||
let parts = folder.split("/");
|
const parts = folder.split("/");
|
||||||
let indent = "";
|
let indent = "";
|
||||||
for (let i = 1; i < parts.length; i++) {
|
for (let i = 1; i < parts.length; i++) {
|
||||||
indent += "\u00A0\u00A0\u00A0\u00A0"; // 4 non-breaking spaces per level
|
indent += "\u00A0\u00A0\u00A0\u00A0"; // 4 non-breaking spaces per level
|
||||||
@@ -34,9 +56,7 @@ function buildFolderTree(folders) {
|
|||||||
const parts = folderPath.split('/');
|
const parts = folderPath.split('/');
|
||||||
let current = tree;
|
let current = tree;
|
||||||
parts.forEach(part => {
|
parts.forEach(part => {
|
||||||
if (!current[part]) {
|
if (!current[part]) current[part] = {};
|
||||||
current[part] = {};
|
|
||||||
}
|
|
||||||
current = current[part];
|
current = current[part];
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@@ -66,23 +86,29 @@ export function getParentFolder(folder) {
|
|||||||
Breadcrumb Functions
|
Breadcrumb Functions
|
||||||
----------------------*/
|
----------------------*/
|
||||||
|
|
||||||
function renderBreadcrumb(normalizedFolder) {
|
async function applyFolderCapabilities(folder) {
|
||||||
if (!normalizedFolder || normalizedFolder === "") return "";
|
try {
|
||||||
const parts = normalizedFolder.split("/");
|
const res = await fetch(`/api/folder/capabilities.php?folder=${encodeURIComponent(folder)}`, { credentials: 'include' });
|
||||||
let breadcrumbItems = [];
|
if (!res.ok) return;
|
||||||
// Use the first segment as the root.
|
const caps = await res.json();
|
||||||
breadcrumbItems.push(`<span class="breadcrumb-link" data-folder="${parts[0]}">${escapeHTML(parts[0])}</span>`);
|
|
||||||
let cumulative = parts[0];
|
// top buttons
|
||||||
parts.slice(1).forEach(part => {
|
const createBtn = document.getElementById('createFolderBtn');
|
||||||
cumulative += "/" + part;
|
const renameBtn = document.getElementById('renameFolderBtn');
|
||||||
breadcrumbItems.push(`<span class="breadcrumb-separator"> / </span>`);
|
const deleteBtn = document.getElementById('deleteFolderBtn');
|
||||||
breadcrumbItems.push(`<span class="breadcrumb-link" data-folder="${cumulative}">${escapeHTML(part)}</span>`);
|
const shareBtn = document.getElementById('shareFolderBtn');
|
||||||
});
|
|
||||||
return breadcrumbItems.join('');
|
if (createBtn) createBtn.disabled = !caps.canCreate;
|
||||||
|
if (renameBtn) renameBtn.disabled = !caps.canRename || folder === 'root';
|
||||||
|
if (deleteBtn) deleteBtn.disabled = !caps.canDelete || folder === 'root';
|
||||||
|
if (shareBtn) shareBtn.disabled = !caps.canShare || folder === 'root';
|
||||||
|
|
||||||
|
// keep for later if you want context menu to reflect caps
|
||||||
|
window.currentFolderCaps = caps;
|
||||||
|
} catch {}
|
||||||
}
|
}
|
||||||
|
|
||||||
// --- NEW: Breadcrumb Delegation Setup ---
|
// --- Breadcrumb Delegation Setup ---
|
||||||
// bindBreadcrumbEvents(); removed in favor of delegation
|
|
||||||
export function setupBreadcrumbDelegation() {
|
export function setupBreadcrumbDelegation() {
|
||||||
const container = document.getElementById("fileListTitle");
|
const container = document.getElementById("fileListTitle");
|
||||||
if (!container) {
|
if (!container) {
|
||||||
@@ -104,7 +130,6 @@ export function setupBreadcrumbDelegation() {
|
|||||||
|
|
||||||
// Click handler via delegation
|
// Click handler via delegation
|
||||||
function breadcrumbClickHandler(e) {
|
function breadcrumbClickHandler(e) {
|
||||||
// find the nearest .breadcrumb-link
|
|
||||||
const link = e.target.closest(".breadcrumb-link");
|
const link = e.target.closest(".breadcrumb-link");
|
||||||
if (!link) return;
|
if (!link) return;
|
||||||
|
|
||||||
@@ -115,12 +140,10 @@ function breadcrumbClickHandler(e) {
|
|||||||
window.currentFolder = folder;
|
window.currentFolder = folder;
|
||||||
localStorage.setItem("lastOpenedFolder", folder);
|
localStorage.setItem("lastOpenedFolder", folder);
|
||||||
|
|
||||||
// rebuild the title safely
|
|
||||||
updateBreadcrumbTitle(folder);
|
updateBreadcrumbTitle(folder);
|
||||||
|
applyFolderCapabilities(folder);
|
||||||
expandTreePath(folder);
|
expandTreePath(folder);
|
||||||
document.querySelectorAll(".folder-option").forEach(el =>
|
document.querySelectorAll(".folder-option").forEach(el => el.classList.remove("selected"));
|
||||||
el.classList.remove("selected")
|
|
||||||
);
|
|
||||||
const target = document.querySelector(`.folder-option[data-folder="${folder}"]`);
|
const target = document.querySelector(`.folder-option[data-folder="${folder}"]`);
|
||||||
if (target) target.classList.add("selected");
|
if (target) target.classList.add("selected");
|
||||||
|
|
||||||
@@ -158,20 +181,18 @@ function breadcrumbDropHandler(e) {
|
|||||||
}
|
}
|
||||||
const filesToMove = dragData.files ? dragData.files : (dragData.fileName ? [dragData.fileName] : []);
|
const filesToMove = dragData.files ? dragData.files : (dragData.fileName ? [dragData.fileName] : []);
|
||||||
if (filesToMove.length === 0) return;
|
if (filesToMove.length === 0) return;
|
||||||
fetch("/api/file/moveFiles.php", {
|
|
||||||
|
fetchWithCsrf("/api/file/moveFiles.php", {
|
||||||
method: "POST",
|
method: "POST",
|
||||||
|
headers: { "Content-Type": "application/json" },
|
||||||
credentials: "include",
|
credentials: "include",
|
||||||
headers: {
|
|
||||||
"Content-Type": "application/json",
|
|
||||||
"X-CSRF-Token": document.querySelector('meta[name="csrf-token"]').getAttribute("content")
|
|
||||||
},
|
|
||||||
body: JSON.stringify({
|
body: JSON.stringify({
|
||||||
source: dragData.sourceFolder,
|
source: dragData.sourceFolder,
|
||||||
files: filesToMove,
|
files: filesToMove,
|
||||||
destination: dropFolder
|
destination: dropFolder
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
.then(response => response.json())
|
.then(safeJson)
|
||||||
.then(data => {
|
.then(data => {
|
||||||
if (data.success) {
|
if (data.success) {
|
||||||
showToast(`File(s) moved successfully to ${dropFolder}!`);
|
showToast(`File(s) moved successfully to ${dropFolder}!`);
|
||||||
@@ -186,47 +207,39 @@ function breadcrumbDropHandler(e) {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* ----------------------
|
/* ----------------------
|
||||||
Check Current User's Folder-Only Permission
|
Check Current User's Folder-Only Permission
|
||||||
----------------------*/
|
----------------------*/
|
||||||
// This function uses localStorage values (set during login) to determine if the current user is restricted.
|
// Authoritatively determine from the server; still write to localStorage for UI,
|
||||||
// If folderOnly is "true", then the personal folder (i.e. username) is forced as the effective root.
|
// but ignore any preexisting localStorage override for security.
|
||||||
function checkUserFolderPermission() {
|
async function checkUserFolderPermission() {
|
||||||
const username = localStorage.getItem("username");
|
const username = localStorage.getItem("username") || "";
|
||||||
console.log("checkUserFolderPermission: username =", username);
|
try {
|
||||||
if (!username) {
|
const res = await fetchWithCsrf("/api/getUserPermissions.php", {
|
||||||
console.warn("No username in localStorage; skipping getUserPermissions fetch.");
|
method: "GET",
|
||||||
return Promise.resolve(false);
|
credentials: "include"
|
||||||
}
|
|
||||||
if (localStorage.getItem("folderOnly") === "true") {
|
|
||||||
window.userFolderOnly = true;
|
|
||||||
console.log("checkUserFolderPermission: using localStorage.folderOnly = true");
|
|
||||||
localStorage.setItem("lastOpenedFolder", username);
|
|
||||||
window.currentFolder = username;
|
|
||||||
return Promise.resolve(true);
|
|
||||||
}
|
|
||||||
return fetch("/api/getUserPermissions.php", { credentials: "include" })
|
|
||||||
.then(response => response.json())
|
|
||||||
.then(permissionsData => {
|
|
||||||
console.log("checkUserFolderPermission: permissionsData =", permissionsData);
|
|
||||||
if (permissionsData && permissionsData[username] && permissionsData[username].folderOnly) {
|
|
||||||
window.userFolderOnly = true;
|
|
||||||
localStorage.setItem("folderOnly", "true");
|
|
||||||
localStorage.setItem("lastOpenedFolder", username);
|
|
||||||
window.currentFolder = username;
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
window.userFolderOnly = false;
|
|
||||||
localStorage.setItem("folderOnly", "false");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.catch(err => {
|
|
||||||
console.error("Error fetching user permissions:", err);
|
|
||||||
window.userFolderOnly = false;
|
|
||||||
return false;
|
|
||||||
});
|
});
|
||||||
|
const permissionsData = await safeJson(res);
|
||||||
|
|
||||||
|
const isFolderOnly =
|
||||||
|
!!(permissionsData &&
|
||||||
|
permissionsData[username] &&
|
||||||
|
permissionsData[username].folderOnly);
|
||||||
|
|
||||||
|
window.userFolderOnly = isFolderOnly;
|
||||||
|
localStorage.setItem("folderOnly", isFolderOnly ? "true" : "false");
|
||||||
|
|
||||||
|
if (isFolderOnly && username) {
|
||||||
|
localStorage.setItem("lastOpenedFolder", username);
|
||||||
|
window.currentFolder = username;
|
||||||
|
}
|
||||||
|
return isFolderOnly;
|
||||||
|
} catch (err) {
|
||||||
|
console.error("Error fetching user permissions:", err);
|
||||||
|
window.userFolderOnly = false;
|
||||||
|
localStorage.setItem("folderOnly", "false");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ----------------------
|
/* ----------------------
|
||||||
@@ -273,7 +286,7 @@ function expandTreePath(path) {
|
|||||||
const toggle = li.querySelector(".folder-toggle");
|
const toggle = li.querySelector(".folder-toggle");
|
||||||
if (toggle) {
|
if (toggle) {
|
||||||
toggle.innerHTML = "[" + '<span class="custom-dash">-</span>' + "]";
|
toggle.innerHTML = "[" + '<span class="custom-dash">-</span>' + "]";
|
||||||
let state = loadFolderTreeState();
|
const state = loadFolderTreeState();
|
||||||
state[cumulative] = "block";
|
state[cumulative] = "block";
|
||||||
saveFolderTreeState(state);
|
saveFolderTreeState(state);
|
||||||
}
|
}
|
||||||
@@ -307,20 +320,18 @@ function folderDropHandler(event) {
|
|||||||
}
|
}
|
||||||
const filesToMove = dragData.files ? dragData.files : (dragData.fileName ? [dragData.fileName] : []);
|
const filesToMove = dragData.files ? dragData.files : (dragData.fileName ? [dragData.fileName] : []);
|
||||||
if (filesToMove.length === 0) return;
|
if (filesToMove.length === 0) return;
|
||||||
fetch("/api/file/moveFiles.php", {
|
|
||||||
|
fetchWithCsrf("/api/file/moveFiles.php", {
|
||||||
method: "POST",
|
method: "POST",
|
||||||
|
headers: { "Content-Type": "application/json" },
|
||||||
credentials: "include",
|
credentials: "include",
|
||||||
headers: {
|
|
||||||
"Content-Type": "application/json",
|
|
||||||
"X-CSRF-Token": document.querySelector('meta[name="csrf-token"]').getAttribute("content")
|
|
||||||
},
|
|
||||||
body: JSON.stringify({
|
body: JSON.stringify({
|
||||||
source: dragData.sourceFolder,
|
source: dragData.sourceFolder,
|
||||||
files: filesToMove,
|
files: filesToMove,
|
||||||
destination: dropFolder
|
destination: dropFolder
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
.then(response => response.json())
|
.then(safeJson)
|
||||||
.then(data => {
|
.then(data => {
|
||||||
if (data.success) {
|
if (data.success) {
|
||||||
showToast(`File(s) moved successfully to ${dropFolder}!`);
|
showToast(`File(s) moved successfully to ${dropFolder}!`);
|
||||||
@@ -338,7 +349,7 @@ function folderDropHandler(event) {
|
|||||||
/* ----------------------
|
/* ----------------------
|
||||||
Main Folder Tree Rendering and Event Binding
|
Main Folder Tree Rendering and Event Binding
|
||||||
----------------------*/
|
----------------------*/
|
||||||
// --- Helpers for safe breadcrumb rendering ---
|
// Safe breadcrumb DOM builder
|
||||||
function renderBreadcrumbFragment(folderPath) {
|
function renderBreadcrumbFragment(folderPath) {
|
||||||
const frag = document.createDocumentFragment();
|
const frag = document.createDocumentFragment();
|
||||||
const parts = folderPath.split("/");
|
const parts = folderPath.split("/");
|
||||||
@@ -363,49 +374,52 @@ function renderBreadcrumbFragment(folderPath) {
|
|||||||
|
|
||||||
export function updateBreadcrumbTitle(folder) {
|
export function updateBreadcrumbTitle(folder) {
|
||||||
const titleEl = document.getElementById("fileListTitle");
|
const titleEl = document.getElementById("fileListTitle");
|
||||||
|
if (!titleEl) return;
|
||||||
titleEl.textContent = "";
|
titleEl.textContent = "";
|
||||||
titleEl.appendChild(document.createTextNode(t("files_in") + " ("));
|
titleEl.appendChild(document.createTextNode(t("files_in") + " ("));
|
||||||
titleEl.appendChild(renderBreadcrumbFragment(folder));
|
titleEl.appendChild(renderBreadcrumbFragment(folder));
|
||||||
titleEl.appendChild(document.createTextNode(")"));
|
titleEl.appendChild(document.createTextNode(")"));
|
||||||
setupBreadcrumbDelegation();
|
setupBreadcrumbDelegation();
|
||||||
|
// Ensure context menu delegation is hooked to the dynamic breadcrumb container
|
||||||
|
bindFolderManagerContextMenu();
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function loadFolderTree(selectedFolder) {
|
export async function loadFolderTree(selectedFolder) {
|
||||||
try {
|
try {
|
||||||
// Check if the user has folder-only permission.
|
// Check if the user has folder-only permission (server-authoritative).
|
||||||
await checkUserFolderPermission();
|
await checkUserFolderPermission();
|
||||||
|
|
||||||
// Determine effective root folder.
|
// Determine effective root folder.
|
||||||
const username = localStorage.getItem("username") || "root";
|
const username = localStorage.getItem("username") || "root";
|
||||||
let effectiveRoot = "root";
|
let effectiveRoot = "root";
|
||||||
let effectiveLabel = "(Root)";
|
let effectiveLabel = "(Root)";
|
||||||
if (window.userFolderOnly) {
|
if (window.userFolderOnly && username) {
|
||||||
effectiveRoot = username; // Use the username as the personal root.
|
effectiveRoot = username; // personal root
|
||||||
effectiveLabel = `(Root)`;
|
effectiveLabel = `(Root)`;
|
||||||
// Force override of any saved folder.
|
|
||||||
localStorage.setItem("lastOpenedFolder", username);
|
localStorage.setItem("lastOpenedFolder", username);
|
||||||
window.currentFolder = username;
|
window.currentFolder = username;
|
||||||
} else {
|
} else {
|
||||||
window.currentFolder = localStorage.getItem("lastOpenedFolder") || "root";
|
window.currentFolder = localStorage.getItem("lastOpenedFolder") || "root";
|
||||||
}
|
}
|
||||||
|
|
||||||
// Build fetch URL.
|
// Fetch folder list from the server (server enforces scope).
|
||||||
let fetchUrl = '/api/folder/getFolderList.php';
|
const res = await fetchWithCsrf('/api/folder/getFolderList.php', {
|
||||||
if (window.userFolderOnly) {
|
method: 'GET',
|
||||||
fetchUrl += '?restricted=1';
|
credentials: 'include'
|
||||||
}
|
});
|
||||||
console.log("Fetching folder list from:", fetchUrl);
|
|
||||||
|
|
||||||
// Fetch folder list from the server.
|
if (res.status === 401) {
|
||||||
const response = await fetch(fetchUrl);
|
|
||||||
if (response.status === 401) {
|
|
||||||
console.error("Unauthorized: Please log in to view folders.");
|
|
||||||
showToast("Session expired. Please log in again.");
|
showToast("Session expired. Please log in again.");
|
||||||
window.location.href = "/api/auth/logout.php";
|
window.location.href = "/api/auth/logout.php";
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
let folderData = await response.json();
|
if (res.status === 403) {
|
||||||
console.log("Folder data received:", folderData);
|
showToast("You don't have permission to view folders.");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const folderData = await safeJson(res);
|
||||||
|
|
||||||
let folders = [];
|
let folders = [];
|
||||||
if (Array.isArray(folderData) && folderData.length && typeof folderData[0] === "object" && folderData[0].folder) {
|
if (Array.isArray(folderData) && folderData.length && typeof folderData[0] === "object" && folderData[0].folder) {
|
||||||
folders = folderData.map(item => item.folder);
|
folders = folderData.map(item => item.folder);
|
||||||
@@ -413,13 +427,12 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
folders = folderData;
|
folders = folderData;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Remove any global "root" entry.
|
// Remove any global "root" entry (server shouldn't return it, but be safe).
|
||||||
folders = folders.filter(folder => folder.toLowerCase() !== "root");
|
folders = folders.filter(folder => folder.toLowerCase() !== "root");
|
||||||
|
|
||||||
// If restricted, filter folders: keep only those that start with effectiveRoot + "/" (do not include effectiveRoot itself).
|
// If restricted, filter client-side view to subtree for UX (server still enforces).
|
||||||
if (window.userFolderOnly && effectiveRoot !== "root") {
|
if (window.userFolderOnly && effectiveRoot !== "root") {
|
||||||
folders = folders.filter(folder => folder.startsWith(effectiveRoot + "/"));
|
folders = folders.filter(folder => folder.startsWith(effectiveRoot + "/"));
|
||||||
// Force current folder to be the effective root.
|
|
||||||
localStorage.setItem("lastOpenedFolder", effectiveRoot);
|
localStorage.setItem("lastOpenedFolder", effectiveRoot);
|
||||||
window.currentFolder = effectiveRoot;
|
window.currentFolder = effectiveRoot;
|
||||||
}
|
}
|
||||||
@@ -455,8 +468,9 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
}
|
}
|
||||||
localStorage.setItem("lastOpenedFolder", window.currentFolder);
|
localStorage.setItem("lastOpenedFolder", window.currentFolder);
|
||||||
|
|
||||||
// Initial breadcrumb update
|
// Initial breadcrumb + file list
|
||||||
updateBreadcrumbTitle(window.currentFolder);
|
updateBreadcrumbTitle(window.currentFolder);
|
||||||
|
applyFolderCapabilities(window.currentFolder);
|
||||||
loadFileList(window.currentFolder);
|
loadFileList(window.currentFolder);
|
||||||
|
|
||||||
const folderState = loadFolderTreeState();
|
const folderState = loadFolderTreeState();
|
||||||
@@ -480,8 +494,8 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
window.currentFolder = selected;
|
window.currentFolder = selected;
|
||||||
localStorage.setItem("lastOpenedFolder", selected);
|
localStorage.setItem("lastOpenedFolder", selected);
|
||||||
|
|
||||||
// Safe breadcrumb update
|
|
||||||
updateBreadcrumbTitle(selected);
|
updateBreadcrumbTitle(selected);
|
||||||
|
applyFolderCapabilities(selected);
|
||||||
loadFileList(selected);
|
loadFileList(selected);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
@@ -493,7 +507,7 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
e.stopPropagation();
|
e.stopPropagation();
|
||||||
const nestedUl = container.querySelector("#rootRow + ul");
|
const nestedUl = container.querySelector("#rootRow + ul");
|
||||||
if (nestedUl) {
|
if (nestedUl) {
|
||||||
let state = loadFolderTreeState();
|
const state = loadFolderTreeState();
|
||||||
if (nestedUl.classList.contains("collapsed") || !nestedUl.classList.contains("expanded")) {
|
if (nestedUl.classList.contains("collapsed") || !nestedUl.classList.contains("expanded")) {
|
||||||
nestedUl.classList.remove("collapsed");
|
nestedUl.classList.remove("collapsed");
|
||||||
nestedUl.classList.add("expanded");
|
nestedUl.classList.add("expanded");
|
||||||
@@ -516,7 +530,7 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
e.stopPropagation();
|
e.stopPropagation();
|
||||||
const siblingUl = this.parentNode.querySelector("ul");
|
const siblingUl = this.parentNode.querySelector("ul");
|
||||||
const folderPath = this.getAttribute("data-folder");
|
const folderPath = this.getAttribute("data-folder");
|
||||||
let state = loadFolderTreeState();
|
const state = loadFolderTreeState();
|
||||||
if (siblingUl) {
|
if (siblingUl) {
|
||||||
if (siblingUl.classList.contains("collapsed") || !siblingUl.classList.contains("expanded")) {
|
if (siblingUl.classList.contains("collapsed") || !siblingUl.classList.contains("expanded")) {
|
||||||
siblingUl.classList.remove("collapsed");
|
siblingUl.classList.remove("collapsed");
|
||||||
@@ -536,10 +550,12 @@ export async function loadFolderTree(selectedFolder) {
|
|||||||
|
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error("Error loading folder tree:", error);
|
console.error("Error loading folder tree:", error);
|
||||||
|
if (error.status === 403) {
|
||||||
|
showToast("You don't have permission to view folders.");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// For backward compatibility.
|
// For backward compatibility.
|
||||||
export function loadFolderList(selectedFolder) {
|
export function loadFolderList(selectedFolder) {
|
||||||
loadFolderTree(selectedFolder);
|
loadFolderTree(selectedFolder);
|
||||||
@@ -548,8 +564,11 @@ export function loadFolderList(selectedFolder) {
|
|||||||
/* ----------------------
|
/* ----------------------
|
||||||
Folder Management (Rename, Delete, Create)
|
Folder Management (Rename, Delete, Create)
|
||||||
----------------------*/
|
----------------------*/
|
||||||
document.getElementById("renameFolderBtn").addEventListener("click", openRenameFolderModal);
|
const renameBtn = document.getElementById("renameFolderBtn");
|
||||||
document.getElementById("deleteFolderBtn").addEventListener("click", openDeleteFolderModal);
|
if (renameBtn) renameBtn.addEventListener("click", openRenameFolderModal);
|
||||||
|
|
||||||
|
const deleteBtn = document.getElementById("deleteFolderBtn");
|
||||||
|
if (deleteBtn) deleteBtn.addEventListener("click", openDeleteFolderModal);
|
||||||
|
|
||||||
export function openRenameFolderModal() {
|
export function openRenameFolderModal() {
|
||||||
const selectedFolder = window.currentFolder || "root";
|
const selectedFolder = window.currentFolder || "root";
|
||||||
@@ -558,61 +577,69 @@ export function openRenameFolderModal() {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
const parts = selectedFolder.split("/");
|
const parts = selectedFolder.split("/");
|
||||||
document.getElementById("newRenameFolderName").value = parts[parts.length - 1];
|
const input = document.getElementById("newRenameFolderName");
|
||||||
document.getElementById("renameFolderModal").style.display = "block";
|
const modal = document.getElementById("renameFolderModal");
|
||||||
|
if (!input || !modal) return;
|
||||||
|
input.value = parts[parts.length - 1];
|
||||||
|
modal.style.display = "block";
|
||||||
setTimeout(() => {
|
setTimeout(() => {
|
||||||
const input = document.getElementById("newRenameFolderName");
|
|
||||||
input.focus();
|
input.focus();
|
||||||
input.select();
|
input.select();
|
||||||
}, 100);
|
}, 100);
|
||||||
}
|
}
|
||||||
|
|
||||||
document.getElementById("cancelRenameFolder").addEventListener("click", function () {
|
const cancelRename = document.getElementById("cancelRenameFolder");
|
||||||
document.getElementById("renameFolderModal").style.display = "none";
|
if (cancelRename) {
|
||||||
document.getElementById("newRenameFolderName").value = "";
|
cancelRename.addEventListener("click", function () {
|
||||||
});
|
const modal = document.getElementById("renameFolderModal");
|
||||||
|
const input = document.getElementById("newRenameFolderName");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
if (input) input.value = "";
|
||||||
|
});
|
||||||
|
}
|
||||||
attachEnterKeyListener("renameFolderModal", "submitRenameFolder");
|
attachEnterKeyListener("renameFolderModal", "submitRenameFolder");
|
||||||
document.getElementById("submitRenameFolder").addEventListener("click", function (event) {
|
|
||||||
event.preventDefault();
|
const submitRename = document.getElementById("submitRenameFolder");
|
||||||
const selectedFolder = window.currentFolder || "root";
|
if (submitRename) {
|
||||||
const newNameBasename = document.getElementById("newRenameFolderName").value.trim();
|
submitRename.addEventListener("click", function (event) {
|
||||||
if (!newNameBasename || newNameBasename === selectedFolder.split("/").pop()) {
|
event.preventDefault();
|
||||||
showToast("Please enter a valid new folder name.");
|
const selectedFolder = window.currentFolder || "root";
|
||||||
return;
|
const input = document.getElementById("newRenameFolderName");
|
||||||
}
|
if (!input) return;
|
||||||
const parentPath = getParentFolder(selectedFolder);
|
const newNameBasename = input.value.trim();
|
||||||
const newFolderFull = parentPath === "root" ? newNameBasename : parentPath + "/" + newNameBasename;
|
if (!newNameBasename || newNameBasename === selectedFolder.split("/").pop()) {
|
||||||
const csrfToken = document.querySelector('meta[name="csrf-token"]').getAttribute('content');
|
showToast("Please enter a valid new folder name.");
|
||||||
if (!csrfToken) {
|
return;
|
||||||
showToast("CSRF token not loaded yet! Please try again.");
|
}
|
||||||
return;
|
const parentPath = getParentFolder(selectedFolder);
|
||||||
}
|
const newFolderFull = parentPath === "root" ? newNameBasename : parentPath + "/" + newNameBasename;
|
||||||
fetch("/api/folder/renameFolder.php", {
|
|
||||||
method: "POST",
|
fetchWithCsrf("/api/folder/renameFolder.php", {
|
||||||
credentials: "include",
|
method: "POST",
|
||||||
headers: {
|
headers: { "Content-Type": "application/json" },
|
||||||
"Content-Type": "application/json",
|
credentials: "include",
|
||||||
"X-CSRF-Token": csrfToken
|
body: JSON.stringify({ oldFolder: window.currentFolder, newFolder: newFolderFull })
|
||||||
},
|
|
||||||
body: JSON.stringify({ oldFolder: window.currentFolder, newFolder: newFolderFull })
|
|
||||||
})
|
|
||||||
.then(response => response.json())
|
|
||||||
.then(data => {
|
|
||||||
if (data.success) {
|
|
||||||
showToast("Folder renamed successfully!");
|
|
||||||
window.currentFolder = newFolderFull;
|
|
||||||
localStorage.setItem("lastOpenedFolder", newFolderFull);
|
|
||||||
loadFolderList(newFolderFull);
|
|
||||||
} else {
|
|
||||||
showToast("Error: " + (data.error || "Could not rename folder"));
|
|
||||||
}
|
|
||||||
})
|
})
|
||||||
.catch(error => console.error("Error renaming folder:", error))
|
.then(safeJson)
|
||||||
.finally(() => {
|
.then(data => {
|
||||||
document.getElementById("renameFolderModal").style.display = "none";
|
if (data.success) {
|
||||||
document.getElementById("newRenameFolderName").value = "";
|
showToast("Folder renamed successfully!");
|
||||||
});
|
window.currentFolder = newFolderFull;
|
||||||
});
|
localStorage.setItem("lastOpenedFolder", newFolderFull);
|
||||||
|
loadFolderList(newFolderFull);
|
||||||
|
} else {
|
||||||
|
showToast("Error: " + (data.error || "Could not rename folder"));
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.catch(error => console.error("Error renaming folder:", error))
|
||||||
|
.finally(() => {
|
||||||
|
const modal = document.getElementById("renameFolderModal");
|
||||||
|
const input2 = document.getElementById("newRenameFolderName");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
if (input2) input2.value = "";
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
export function openDeleteFolderModal() {
|
export function openDeleteFolderModal() {
|
||||||
const selectedFolder = window.currentFolder || "root";
|
const selectedFolder = window.currentFolder || "root";
|
||||||
@@ -620,102 +647,117 @@ export function openDeleteFolderModal() {
|
|||||||
showToast("Please select a valid folder to delete.");
|
showToast("Please select a valid folder to delete.");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
document.getElementById("deleteFolderMessage").textContent =
|
const msgEl = document.getElementById("deleteFolderMessage");
|
||||||
"Are you sure you want to delete folder " + selectedFolder + "?";
|
const modal = document.getElementById("deleteFolderModal");
|
||||||
document.getElementById("deleteFolderModal").style.display = "block";
|
if (!msgEl || !modal) return;
|
||||||
|
msgEl.textContent = "Are you sure you want to delete folder " + selectedFolder + "?";
|
||||||
|
modal.style.display = "block";
|
||||||
}
|
}
|
||||||
|
|
||||||
document.getElementById("cancelDeleteFolder").addEventListener("click", function () {
|
const cancelDelete = document.getElementById("cancelDeleteFolder");
|
||||||
document.getElementById("deleteFolderModal").style.display = "none";
|
if (cancelDelete) {
|
||||||
});
|
cancelDelete.addEventListener("click", function () {
|
||||||
|
const modal = document.getElementById("deleteFolderModal");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
});
|
||||||
|
}
|
||||||
attachEnterKeyListener("deleteFolderModal", "confirmDeleteFolder");
|
attachEnterKeyListener("deleteFolderModal", "confirmDeleteFolder");
|
||||||
document.getElementById("confirmDeleteFolder").addEventListener("click", function () {
|
|
||||||
const selectedFolder = window.currentFolder || "root";
|
const confirmDelete = document.getElementById("confirmDeleteFolder");
|
||||||
const csrfToken = document.querySelector('meta[name="csrf-token"]').getAttribute('content');
|
if (confirmDelete) {
|
||||||
fetch("/api/folder/deleteFolder.php", {
|
confirmDelete.addEventListener("click", function () {
|
||||||
method: "POST",
|
const selectedFolder = window.currentFolder || "root";
|
||||||
headers: {
|
|
||||||
"Content-Type": "application/json",
|
fetchWithCsrf("/api/folder/deleteFolder.php", {
|
||||||
"X-CSRF-Token": csrfToken
|
method: "POST",
|
||||||
},
|
headers: { "Content-Type": "application/json" },
|
||||||
body: JSON.stringify({ folder: selectedFolder })
|
credentials: "include",
|
||||||
})
|
body: JSON.stringify({ folder: selectedFolder })
|
||||||
.then(response => response.json())
|
|
||||||
.then(data => {
|
|
||||||
if (data.success) {
|
|
||||||
showToast("Folder deleted successfully!");
|
|
||||||
window.currentFolder = getParentFolder(selectedFolder);
|
|
||||||
localStorage.setItem("lastOpenedFolder", window.currentFolder);
|
|
||||||
loadFolderList(window.currentFolder);
|
|
||||||
} else {
|
|
||||||
showToast("Error: " + (data.error || "Could not delete folder"));
|
|
||||||
}
|
|
||||||
})
|
})
|
||||||
.catch(error => console.error("Error deleting folder:", error))
|
.then(safeJson)
|
||||||
.finally(() => {
|
.then(data => {
|
||||||
document.getElementById("deleteFolderModal").style.display = "none";
|
if (data.success) {
|
||||||
});
|
showToast("Folder deleted successfully!");
|
||||||
});
|
window.currentFolder = getParentFolder(selectedFolder);
|
||||||
|
localStorage.setItem("lastOpenedFolder", window.currentFolder);
|
||||||
document.getElementById("createFolderBtn").addEventListener("click", function () {
|
loadFolderList(window.currentFolder);
|
||||||
document.getElementById("createFolderModal").style.display = "block";
|
} else {
|
||||||
document.getElementById("newFolderName").focus();
|
showToast("Error: " + (data.error || "Could not delete folder"));
|
||||||
});
|
|
||||||
|
|
||||||
document.getElementById("cancelCreateFolder").addEventListener("click", function () {
|
|
||||||
document.getElementById("createFolderModal").style.display = "none";
|
|
||||||
document.getElementById("newFolderName").value = "";
|
|
||||||
});
|
|
||||||
attachEnterKeyListener("createFolderModal", "submitCreateFolder");
|
|
||||||
document.getElementById("submitCreateFolder").addEventListener("click", async () => {
|
|
||||||
const folderInput = document.getElementById("newFolderName").value.trim();
|
|
||||||
if (!folderInput) return showToast("Please enter a folder name.");
|
|
||||||
|
|
||||||
const selectedFolder = window.currentFolder || "root";
|
|
||||||
const parent = selectedFolder === "root" ? "" : selectedFolder;
|
|
||||||
|
|
||||||
// 1) Guarantee fresh CSRF
|
|
||||||
try {
|
|
||||||
await loadCsrfToken();
|
|
||||||
} catch {
|
|
||||||
return showToast("Could not refresh CSRF token. Please reload.");
|
|
||||||
}
|
|
||||||
|
|
||||||
// 2) Call with fetchWithCsrf
|
|
||||||
fetchWithCsrf("/api/folder/createFolder.php", {
|
|
||||||
method: "POST",
|
|
||||||
headers: { "Content-Type": "application/json" },
|
|
||||||
body: JSON.stringify({ folderName: folderInput, parent })
|
|
||||||
})
|
|
||||||
.then(async res => {
|
|
||||||
if (!res.ok) {
|
|
||||||
// pull out a JSON error, or fallback to status text
|
|
||||||
let err;
|
|
||||||
try {
|
|
||||||
const j = await res.json();
|
|
||||||
err = j.error || j.message || res.statusText;
|
|
||||||
} catch {
|
|
||||||
err = res.statusText;
|
|
||||||
}
|
}
|
||||||
throw new Error(err);
|
})
|
||||||
}
|
.catch(error => console.error("Error deleting folder:", error))
|
||||||
return res.json();
|
.finally(() => {
|
||||||
|
const modal = document.getElementById("deleteFolderModal");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
const createBtn = document.getElementById("createFolderBtn");
|
||||||
|
if (createBtn) {
|
||||||
|
createBtn.addEventListener("click", function () {
|
||||||
|
const modal = document.getElementById("createFolderModal");
|
||||||
|
const input = document.getElementById("newFolderName");
|
||||||
|
if (modal) modal.style.display = "block";
|
||||||
|
if (input) input.focus();
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
const cancelCreate = document.getElementById("cancelCreateFolder");
|
||||||
|
if (cancelCreate) {
|
||||||
|
cancelCreate.addEventListener("click", function () {
|
||||||
|
const modal = document.getElementById("createFolderModal");
|
||||||
|
const input = document.getElementById("newFolderName");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
if (input) input.value = "";
|
||||||
|
});
|
||||||
|
}
|
||||||
|
attachEnterKeyListener("createFolderModal", "submitCreateFolder");
|
||||||
|
|
||||||
|
const submitCreate = document.getElementById("submitCreateFolder");
|
||||||
|
if (submitCreate) {
|
||||||
|
submitCreate.addEventListener("click", async () => {
|
||||||
|
const input = document.getElementById("newFolderName");
|
||||||
|
const folderInput = input ? input.value.trim() : "";
|
||||||
|
if (!folderInput) return showToast("Please enter a folder name.");
|
||||||
|
|
||||||
|
const selectedFolder = window.currentFolder || "root";
|
||||||
|
const parent = selectedFolder === "root" ? "" : selectedFolder;
|
||||||
|
|
||||||
|
// 1) Guarantee fresh CSRF
|
||||||
|
try {
|
||||||
|
await loadCsrfToken();
|
||||||
|
} catch {
|
||||||
|
return showToast("Could not refresh CSRF token. Please reload.");
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2) Call with fetchWithCsrf
|
||||||
|
fetchWithCsrf("/api/folder/createFolder.php", {
|
||||||
|
method: "POST",
|
||||||
|
headers: { "Content-Type": "application/json" },
|
||||||
|
credentials: "include",
|
||||||
|
body: JSON.stringify({ folderName: folderInput, parent })
|
||||||
})
|
})
|
||||||
.then(data => {
|
.then(safeJson)
|
||||||
showToast("Folder created!");
|
.then(data => {
|
||||||
const full = parent ? `${parent}/${folderInput}` : folderInput;
|
if (!data.success) throw new Error(data.error || "Server rejected the request");
|
||||||
window.currentFolder = full;
|
showToast("Folder created!");
|
||||||
localStorage.setItem("lastOpenedFolder", full);
|
const full = parent ? `${parent}/${folderInput}` : folderInput;
|
||||||
loadFolderList(full);
|
window.currentFolder = full;
|
||||||
})
|
localStorage.setItem("lastOpenedFolder", full);
|
||||||
.catch(e => {
|
loadFolderList(full);
|
||||||
showToast("Error creating folder: " + e.message);
|
})
|
||||||
})
|
.catch(e => {
|
||||||
.finally(() => {
|
showToast("Error creating folder: " + e.message);
|
||||||
document.getElementById("createFolderModal").style.display = "none";
|
})
|
||||||
document.getElementById("newFolderName").value = "";
|
.finally(() => {
|
||||||
});
|
const modal = document.getElementById("createFolderModal");
|
||||||
});
|
const input2 = document.getElementById("newFolderName");
|
||||||
|
if (modal) modal.style.display = "none";
|
||||||
|
if (input2) input2.value = "";
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
// ---------- CONTEXT MENU SUPPORT FOR FOLDER MANAGER ----------
|
// ---------- CONTEXT MENU SUPPORT FOR FOLDER MANAGER ----------
|
||||||
export function showFolderManagerContextMenu(x, y, menuItems) {
|
export function showFolderManagerContextMenu(x, y, menuItems) {
|
||||||
@@ -773,21 +815,28 @@ export function hideFolderManagerContextMenu() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function folderManagerContextMenuHandler(e) {
|
function folderManagerContextMenuHandler(e) {
|
||||||
e.preventDefault();
|
|
||||||
e.stopPropagation();
|
|
||||||
const target = e.target.closest(".folder-option, .breadcrumb-link");
|
const target = e.target.closest(".folder-option, .breadcrumb-link");
|
||||||
if (!target) return;
|
if (!target) return;
|
||||||
|
|
||||||
|
e.preventDefault();
|
||||||
|
e.stopPropagation();
|
||||||
|
|
||||||
const folder = target.getAttribute("data-folder");
|
const folder = target.getAttribute("data-folder");
|
||||||
if (!folder) return;
|
if (!folder) return;
|
||||||
window.currentFolder = folder;
|
window.currentFolder = folder;
|
||||||
|
|
||||||
|
// Visual selection
|
||||||
document.querySelectorAll(".folder-option, .breadcrumb-link").forEach(el => el.classList.remove("selected"));
|
document.querySelectorAll(".folder-option, .breadcrumb-link").forEach(el => el.classList.remove("selected"));
|
||||||
target.classList.add("selected");
|
target.classList.add("selected");
|
||||||
|
|
||||||
const menuItems = [
|
const menuItems = [
|
||||||
{
|
{
|
||||||
label: t("create_folder"),
|
label: t("create_folder"),
|
||||||
action: () => {
|
action: () => {
|
||||||
document.getElementById("createFolderModal").style.display = "block";
|
const modal = document.getElementById("createFolderModal");
|
||||||
document.getElementById("newFolderName").focus();
|
const input = document.getElementById("newFolderName");
|
||||||
|
if (modal) modal.style.display = "block";
|
||||||
|
if (input) input.focus();
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@@ -806,17 +855,34 @@ function folderManagerContextMenuHandler(e) {
|
|||||||
showFolderManagerContextMenu(e.pageX, e.pageY, menuItems);
|
showFolderManagerContextMenu(e.pageX, e.pageY, menuItems);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Delegate contextmenu so it works with dynamically re-rendered breadcrumbs
|
||||||
function bindFolderManagerContextMenu() {
|
function bindFolderManagerContextMenu() {
|
||||||
const container = document.getElementById("folderTreeContainer");
|
const tree = document.getElementById("folderTreeContainer");
|
||||||
if (container) {
|
if (tree) {
|
||||||
container.removeEventListener("contextmenu", folderManagerContextMenuHandler);
|
// remove old bound handler if present
|
||||||
container.addEventListener("contextmenu", folderManagerContextMenuHandler, false);
|
if (tree._ctxHandler) {
|
||||||
|
tree.removeEventListener("contextmenu", tree._ctxHandler, false);
|
||||||
|
}
|
||||||
|
tree._ctxHandler = function (e) {
|
||||||
|
const onOption = e.target.closest(".folder-option");
|
||||||
|
if (!onOption) return;
|
||||||
|
folderManagerContextMenuHandler(e);
|
||||||
|
};
|
||||||
|
tree.addEventListener("contextmenu", tree._ctxHandler, false);
|
||||||
|
}
|
||||||
|
|
||||||
|
const title = document.getElementById("fileListTitle");
|
||||||
|
if (title) {
|
||||||
|
if (title._ctxHandler) {
|
||||||
|
title.removeEventListener("contextmenu", title._ctxHandler, false);
|
||||||
|
}
|
||||||
|
title._ctxHandler = function (e) {
|
||||||
|
const onCrumb = e.target.closest(".breadcrumb-link");
|
||||||
|
if (!onCrumb) return;
|
||||||
|
folderManagerContextMenuHandler(e);
|
||||||
|
};
|
||||||
|
title.addEventListener("contextmenu", title._ctxHandler, false);
|
||||||
}
|
}
|
||||||
const breadcrumbNodes = document.querySelectorAll(".breadcrumb-link");
|
|
||||||
breadcrumbNodes.forEach(node => {
|
|
||||||
node.removeEventListener("contextmenu", folderManagerContextMenuHandler);
|
|
||||||
node.addEventListener("contextmenu", folderManagerContextMenuHandler, false);
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
document.addEventListener("click", function () {
|
document.addEventListener("click", function () {
|
||||||
@@ -825,8 +891,8 @@ document.addEventListener("click", function () {
|
|||||||
|
|
||||||
document.addEventListener("DOMContentLoaded", function () {
|
document.addEventListener("DOMContentLoaded", function () {
|
||||||
document.addEventListener("keydown", function (e) {
|
document.addEventListener("keydown", function (e) {
|
||||||
const tag = e.target.tagName.toLowerCase();
|
const tag = e.target.tagName ? e.target.tagName.toLowerCase() : "";
|
||||||
if (tag === "input" || tag === "textarea" || e.target.isContentEditable) {
|
if (tag === "input" || tag === "textarea" || (e.target && e.target.isContentEditable)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
if (e.key === "Delete" || e.key === "Backspace" || e.keyCode === 46 || e.keyCode === 8) {
|
if (e.key === "Delete" || e.key === "Backspace" || e.keyCode === 46 || e.keyCode === 8) {
|
||||||
@@ -847,7 +913,6 @@ document.addEventListener("DOMContentLoaded", function () {
|
|||||||
showToast("Please select a valid folder to share.");
|
showToast("Please select a valid folder to share.");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// Call the folder share modal from the module.
|
|
||||||
openFolderShareModal(selectedFolder);
|
openFolderShareModal(selectedFolder);
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
@@ -855,4 +920,5 @@ document.addEventListener("DOMContentLoaded", function () {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Initial context menu delegation bind
|
||||||
bindFolderManagerContextMenu();
|
bindFolderManagerContextMenu();
|
||||||
@@ -51,6 +51,52 @@ async function fetchWithCsrfAndRefresh(input, init = {}) {
|
|||||||
// Replace global fetch with the wrapped version so *all* callers benefit.
|
// Replace global fetch with the wrapped version so *all* callers benefit.
|
||||||
window.fetch = fetchWithCsrfAndRefresh;
|
window.fetch = fetchWithCsrfAndRefresh;
|
||||||
|
|
||||||
|
/* =========================
|
||||||
|
SAFE API HELPERS
|
||||||
|
========================= */
|
||||||
|
export async function apiGETJSON(url, opts = {}) {
|
||||||
|
const res = await fetch(url, { credentials: "include", ...opts });
|
||||||
|
if (res.status === 401) throw new Error("auth");
|
||||||
|
if (res.status === 403) throw new Error("forbidden");
|
||||||
|
if (!res.ok) throw new Error(`http ${res.status}`);
|
||||||
|
try { return await res.json(); } catch { return {}; }
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function apiPOSTJSON(url, body, opts = {}) {
|
||||||
|
const headers = {
|
||||||
|
"Content-Type": "application/json",
|
||||||
|
"X-CSRF-Token": getCsrfToken(),
|
||||||
|
...(opts.headers || {})
|
||||||
|
};
|
||||||
|
const res = await fetch(url, {
|
||||||
|
method: "POST",
|
||||||
|
credentials: "include",
|
||||||
|
headers,
|
||||||
|
body: JSON.stringify(body ?? {}),
|
||||||
|
...opts
|
||||||
|
});
|
||||||
|
if (res.status === 401) throw new Error("auth");
|
||||||
|
if (res.status === 403) throw new Error("forbidden");
|
||||||
|
if (!res.ok) throw new Error(`http ${res.status}`);
|
||||||
|
try { return await res.json(); } catch { return {}; }
|
||||||
|
}
|
||||||
|
|
||||||
|
// Optional: expose on window for legacy callers
|
||||||
|
window.apiGETJSON = apiGETJSON;
|
||||||
|
window.apiPOSTJSON = apiPOSTJSON;
|
||||||
|
|
||||||
|
// Global handler to keep UX friendly if something forgets to catch
|
||||||
|
window.addEventListener("unhandledrejection", (ev) => {
|
||||||
|
const msg = (ev?.reason && ev.reason.message) || "";
|
||||||
|
if (msg === "auth") {
|
||||||
|
showToast(t("please_sign_in_again") || "Please sign in again.", "error");
|
||||||
|
ev.preventDefault();
|
||||||
|
} else if (msg === "forbidden") {
|
||||||
|
showToast(t("no_access_to_resource") || "You don’t have access to that.", "error");
|
||||||
|
ev.preventDefault();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
/* =========================
|
/* =========================
|
||||||
APP INIT
|
APP INIT
|
||||||
========================= */
|
========================= */
|
||||||
@@ -94,7 +140,7 @@ export function initializeApp() {
|
|||||||
initUpload();
|
initUpload();
|
||||||
loadFolderTree();
|
loadFolderTree();
|
||||||
setupTrashRestoreDelete();
|
setupTrashRestoreDelete();
|
||||||
loadAdminConfigFunc();
|
// NOTE: loadAdminConfigFunc() is called once in DOMContentLoaded; calling here would duplicate requests.
|
||||||
|
|
||||||
const helpBtn = document.getElementById("folderHelpBtn");
|
const helpBtn = document.getElementById("folderHelpBtn");
|
||||||
const helpTooltip = document.getElementById("folderHelpTooltip");
|
const helpTooltip = document.getElementById("folderHelpTooltip");
|
||||||
@@ -170,6 +216,7 @@ window.openDownloadModal = openDownloadModal;
|
|||||||
window.currentFolder = "root";
|
window.currentFolder = "root";
|
||||||
|
|
||||||
document.addEventListener("DOMContentLoaded", function () {
|
document.addEventListener("DOMContentLoaded", function () {
|
||||||
|
// Load admin config once here; non-admins may get 403, which is fine.
|
||||||
loadAdminConfigFunc();
|
loadAdminConfigFunc();
|
||||||
|
|
||||||
// i18n
|
// i18n
|
||||||
|
|||||||
@@ -13,56 +13,62 @@ if (
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ─── 1) Bootstrap & load models ─────────────────────────────────────────────
|
// ─── 1) Bootstrap & load models ─────────────────────────────────────────────
|
||||||
require_once __DIR__ . '/../config/config.php'; // UPLOAD_DIR, META_DIR, DATE_TIME_FORMAT
|
require_once __DIR__ . '/../config/config.php'; // UPLOAD_DIR, META_DIR, loadUserPermissions(), etc.
|
||||||
require_once __DIR__ . '/../vendor/autoload.php'; // Composer & SabreDAV
|
require_once __DIR__ . '/../vendor/autoload.php'; // Composer & SabreDAV
|
||||||
require_once __DIR__ . '/../src/models/AuthModel.php'; // AuthModel::authenticate(), getUserRole(), loadFolderPermission()
|
require_once __DIR__ . '/../src/models/AuthModel.php'; // AuthModel::authenticate(), getUserRole()
|
||||||
require_once __DIR__ . '/../src/models/AdminModel.php'; // AdminModel::getConfig()
|
require_once __DIR__ . '/../src/models/AdminModel.php';// AdminModel::getConfig()
|
||||||
|
require_once __DIR__ . '/../src/lib/ACL.php'; // ACL checks
|
||||||
|
require_once __DIR__ . '/../src/webdav/CurrentUser.php';
|
||||||
|
|
||||||
// ─── 1.1) Global WebDAV feature toggle ──────────────────────────────────────
|
// ─── 1.1) Global WebDAV feature toggle ──────────────────────────────────────
|
||||||
$adminConfig = AdminModel::getConfig();
|
$adminConfig = AdminModel::getConfig();
|
||||||
$enableWebDAV = isset($adminConfig['enableWebDAV']) && $adminConfig['enableWebDAV'];
|
$enableWebDAV = isset($adminConfig['enableWebDAV']) && $adminConfig['enableWebDAV'];
|
||||||
if (!$enableWebDAV) {
|
if (!$enableWebDAV) {
|
||||||
header('HTTP/1.1 403 Forbidden');
|
header('HTTP/1.1 403 Forbidden');
|
||||||
echo 'WebDAV access is currently disabled by administrator.';
|
echo 'WebDAV access is currently disabled by administrator.';
|
||||||
exit;
|
exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
// ─── 2) Load WebDAV directory implementation ──────────────────────────
|
// ─── 2) Load WebDAV directory implementation (ACL-aware) ────────────────────
|
||||||
require_once __DIR__ . '/../src/webdav/FileRiseDirectory.php';
|
require_once __DIR__ . '/../src/webdav/FileRiseDirectory.php';
|
||||||
|
|
||||||
use Sabre\DAV\Server;
|
use Sabre\DAV\Server;
|
||||||
use Sabre\DAV\Auth\Backend\BasicCallBack;
|
use Sabre\DAV\Auth\Backend\BasicCallBack;
|
||||||
use Sabre\DAV\Auth\Plugin as AuthPlugin;
|
use Sabre\DAV\Auth\Plugin as AuthPlugin;
|
||||||
use Sabre\DAV\Locks\Plugin as LocksPlugin;
|
use Sabre\DAV\Locks\Plugin as LocksPlugin;
|
||||||
use Sabre\DAV\Locks\Backend\File as LocksFileBackend;
|
use Sabre\DAV\Locks\Backend\File as LocksFileBackend;
|
||||||
use FileRise\WebDAV\FileRiseDirectory;
|
use FileRise\WebDAV\FileRiseDirectory;
|
||||||
|
use FileRise\WebDAV\CurrentUser;
|
||||||
|
|
||||||
// ─── 3) HTTP‑Basic backend ─────────────────────────────────────────────────
|
// ─── 3) HTTP-Basic backend (delegates to your AuthModel) ────────────────────
|
||||||
$authBackend = new BasicCallBack(function(string $user, string $pass) {
|
$authBackend = new BasicCallBack(function(string $user, string $pass) {
|
||||||
return \AuthModel::authenticate($user, $pass) !== false;
|
return \AuthModel::authenticate($user, $pass) !== false;
|
||||||
});
|
});
|
||||||
$authPlugin = new AuthPlugin($authBackend, 'FileRise');
|
$authPlugin = new AuthPlugin($authBackend, 'FileRise');
|
||||||
|
|
||||||
// ─── 4) Determine user scope ────────────────────────────────────────────────
|
// ─── 4) Resolve authenticated user + perms ──────────────────────────────────
|
||||||
$user = $_SERVER['PHP_AUTH_USER'] ?? '';
|
$user = $_SERVER['PHP_AUTH_USER'] ?? '';
|
||||||
$isAdmin = (\AuthModel::getUserRole($user) === '1');
|
if ($user === '') {
|
||||||
$folderOnly = (bool)\AuthModel::loadFolderPermission($user);
|
header('HTTP/1.1 401 Unauthorized');
|
||||||
|
header('WWW-Authenticate: Basic realm="FileRise"');
|
||||||
if ($isAdmin || !$folderOnly) {
|
echo 'Authentication required.';
|
||||||
// Admins (or users without folder-only restriction) see the full /uploads
|
exit;
|
||||||
$rootPath = rtrim(UPLOAD_DIR, '/\\');
|
|
||||||
} else {
|
|
||||||
// Folder‑only users see only /uploads/{username}
|
|
||||||
$rootPath = rtrim(UPLOAD_DIR, '/\\') . DIRECTORY_SEPARATOR . $user;
|
|
||||||
if (!is_dir($rootPath)) {
|
|
||||||
mkdir($rootPath, 0755, true);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ─── 5) Spin up SabreDAV ────────────────────────────────────────────────────
|
$perms = is_callable('loadUserPermissions') ? (loadUserPermissions($user) ?: []) : [];
|
||||||
|
$isAdmin = (\AuthModel::getUserRole($user) === '1');
|
||||||
|
|
||||||
|
// set for metadata attribution in WebDAV writes
|
||||||
|
CurrentUser::set($user);
|
||||||
|
|
||||||
|
// ─── 5) Mount the real uploads root; ACL filters everything at node level ───
|
||||||
|
$rootPath = rtrim(UPLOAD_DIR, '/\\');
|
||||||
|
|
||||||
$server = new Server([
|
$server = new Server([
|
||||||
new FileRiseDirectory($rootPath, $user, $folderOnly),
|
new FileRiseDirectory($rootPath, $user, $isAdmin, $perms),
|
||||||
]);
|
]);
|
||||||
|
|
||||||
|
// Auth + Locks
|
||||||
$server->addPlugin($authPlugin);
|
$server->addPlugin($authPlugin);
|
||||||
$server->addPlugin(
|
$server->addPlugin(
|
||||||
new LocksPlugin(
|
new LocksPlugin(
|
||||||
@@ -70,5 +76,8 @@ $server->addPlugin(
|
|||||||
)
|
)
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// Base URI (adjust if you serve from a subdir or rewrite rule)
|
||||||
$server->setBaseUri('/webdav.php/');
|
$server->setBaseUri('/webdav.php/');
|
||||||
|
|
||||||
|
// Execute
|
||||||
$server->exec();
|
$server->exec();
|
||||||
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@@ -2,6 +2,7 @@
|
|||||||
// src/controllers/UploadController.php
|
// src/controllers/UploadController.php
|
||||||
|
|
||||||
require_once __DIR__ . '/../../config/config.php';
|
require_once __DIR__ . '/../../config/config.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
require_once PROJECT_ROOT . '/src/models/UploadModel.php';
|
require_once PROJECT_ROOT . '/src/models/UploadModel.php';
|
||||||
|
|
||||||
class UploadController {
|
class UploadController {
|
||||||
@@ -72,69 +73,80 @@ class UploadController {
|
|||||||
*/
|
*/
|
||||||
public function handleUpload(): void {
|
public function handleUpload(): void {
|
||||||
header('Content-Type: application/json');
|
header('Content-Type: application/json');
|
||||||
|
|
||||||
//
|
// ---- 1) CSRF (header or form field) ----
|
||||||
// 1) CSRF – pull from header or POST fields
|
$headersArr = array_change_key_case(getallheaders() ?: [], CASE_LOWER);
|
||||||
//
|
|
||||||
$headersArr = array_change_key_case(getallheaders(), CASE_LOWER);
|
|
||||||
$received = '';
|
$received = '';
|
||||||
if (!empty($headersArr['x-csrf-token'])) {
|
if (!empty($headersArr['x-csrf-token'])) {
|
||||||
$received = trim($headersArr['x-csrf-token']);
|
$received = trim($headersArr['x-csrf-token']);
|
||||||
} elseif (!empty($_POST['csrf_token'])) {
|
} elseif (!empty($_POST['csrf_token'])) {
|
||||||
$received = trim($_POST['csrf_token']);
|
$received = trim($_POST['csrf_token']);
|
||||||
} elseif (!empty($_POST['upload_token'])) {
|
} elseif (!empty($_POST['upload_token'])) {
|
||||||
|
// legacy alias
|
||||||
$received = trim($_POST['upload_token']);
|
$received = trim($_POST['upload_token']);
|
||||||
}
|
}
|
||||||
|
|
||||||
// 1a) If it doesn’t match, soft-fail: send new token and let client retry
|
|
||||||
if (!isset($_SESSION['csrf_token']) || $received !== $_SESSION['csrf_token']) {
|
if (!isset($_SESSION['csrf_token']) || $received !== $_SESSION['csrf_token']) {
|
||||||
// regenerate
|
// Soft-fail so client can retry with refreshed token
|
||||||
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
||||||
// tell client “please retry with this new token”
|
|
||||||
http_response_code(200);
|
http_response_code(200);
|
||||||
echo json_encode([
|
echo json_encode([
|
||||||
'csrf_expired' => true,
|
'csrf_expired' => true,
|
||||||
'csrf_token' => $_SESSION['csrf_token']
|
'csrf_token' => $_SESSION['csrf_token']
|
||||||
]);
|
]);
|
||||||
exit;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
// ---- 2) Auth + account-level flags ----
|
||||||
// 2) Auth checks
|
if (empty($_SESSION['authenticated'])) {
|
||||||
//
|
|
||||||
if (empty($_SESSION['authenticated']) || $_SESSION['authenticated'] !== true) {
|
|
||||||
http_response_code(401);
|
http_response_code(401);
|
||||||
echo json_encode(["error" => "Unauthorized"]);
|
echo json_encode(['error' => 'Unauthorized']);
|
||||||
exit;
|
return;
|
||||||
}
|
|
||||||
$userPerms = loadUserPermissions($_SESSION['username']);
|
|
||||||
if (!empty($userPerms['disableUpload'])) {
|
|
||||||
http_response_code(403);
|
|
||||||
echo json_encode(["error" => "Upload disabled for this user."]);
|
|
||||||
exit;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
$username = (string)($_SESSION['username'] ?? '');
|
||||||
// 3) Delegate the actual file handling
|
$userPerms = loadUserPermissions($username) ?: [];
|
||||||
//
|
$isAdmin = ACL::isAdmin($userPerms);
|
||||||
|
|
||||||
|
// Admins should never be blocked by account-level "disableUpload"
|
||||||
|
if (!$isAdmin && !empty($userPerms['disableUpload'])) {
|
||||||
|
http_response_code(403);
|
||||||
|
echo json_encode(['error' => 'Upload disabled for this user.']);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- 3) Folder-level WRITE permission (ACL) ----
|
||||||
|
// Always require client to send the folder; fall back to GET if needed.
|
||||||
|
$folderParam = isset($_POST['folder']) ? (string)$_POST['folder'] : (isset($_GET['folder']) ? (string)$_GET['folder'] : 'root');
|
||||||
|
$targetFolder = ACL::normalizeFolder($folderParam);
|
||||||
|
|
||||||
|
// Admins bypass folder canWrite checks
|
||||||
|
if (!$isAdmin && !ACL::canWrite($username, $userPerms, $targetFolder)) {
|
||||||
|
http_response_code(403);
|
||||||
|
echo json_encode(['error' => 'Forbidden: no write access to folder "'.$targetFolder.'".']);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- 4) Delegate to model (actual file/chunk processing) ----
|
||||||
|
// (Optionally re-check in UploadModel before finalizing.)
|
||||||
$result = UploadModel::handleUpload($_POST, $_FILES);
|
$result = UploadModel::handleUpload($_POST, $_FILES);
|
||||||
|
|
||||||
//
|
// ---- 5) Response ----
|
||||||
// 4) Respond
|
|
||||||
//
|
|
||||||
if (isset($result['error'])) {
|
if (isset($result['error'])) {
|
||||||
http_response_code(400);
|
http_response_code(400);
|
||||||
echo json_encode($result);
|
echo json_encode($result);
|
||||||
exit;
|
return;
|
||||||
}
|
}
|
||||||
if (isset($result['status'])) {
|
if (isset($result['status'])) {
|
||||||
|
// e.g., {"status":"chunk uploaded"}
|
||||||
echo json_encode($result);
|
echo json_encode($result);
|
||||||
exit;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// full‐upload redirect
|
echo json_encode([
|
||||||
$_SESSION['upload_message'] = "File uploaded successfully.";
|
'success' => 'File uploaded successfully',
|
||||||
exit;
|
'newFilename' => $result['newFilename'] ?? null
|
||||||
|
]);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -175,25 +187,22 @@ class UploadController {
|
|||||||
*/
|
*/
|
||||||
public function removeChunks(): void {
|
public function removeChunks(): void {
|
||||||
header('Content-Type: application/json');
|
header('Content-Type: application/json');
|
||||||
|
|
||||||
// CSRF Protection: Validate token from POST data.
|
|
||||||
$receivedToken = isset($_POST['csrf_token']) ? trim($_POST['csrf_token']) : '';
|
$receivedToken = isset($_POST['csrf_token']) ? trim($_POST['csrf_token']) : '';
|
||||||
if ($receivedToken !== $_SESSION['csrf_token']) {
|
if ($receivedToken !== ($_SESSION['csrf_token'] ?? '')) {
|
||||||
http_response_code(403);
|
http_response_code(403);
|
||||||
echo json_encode(["error" => "Invalid CSRF token"]);
|
echo json_encode(['error' => 'Invalid CSRF token']);
|
||||||
exit;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check that the folder parameter is provided.
|
|
||||||
if (!isset($_POST['folder'])) {
|
if (!isset($_POST['folder'])) {
|
||||||
http_response_code(400);
|
http_response_code(400);
|
||||||
echo json_encode(["error" => "No folder specified"]);
|
echo json_encode(['error' => 'No folder specified']);
|
||||||
exit;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
$folder = $_POST['folder'];
|
$folder = (string)$_POST['folder'];
|
||||||
$result = UploadModel::removeChunks($folder);
|
$result = UploadModel::removeChunks($folder);
|
||||||
echo json_encode($result);
|
echo json_encode($result);
|
||||||
exit;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -60,16 +60,37 @@ class UserController
|
|||||||
|
|
||||||
/** Enforce admin (401). */
|
/** Enforce admin (401). */
|
||||||
private static function requireAdmin(): void
|
private static function requireAdmin(): void
|
||||||
{
|
{
|
||||||
self::requireAuth();
|
self::requireAuth();
|
||||||
if (empty($_SESSION['isAdmin']) || $_SESSION['isAdmin'] !== true) {
|
|
||||||
http_response_code(401);
|
// Prefer the session flag
|
||||||
header('Content-Type: application/json');
|
$isAdmin = (!empty($_SESSION['isAdmin']) && $_SESSION['isAdmin'] === true);
|
||||||
echo json_encode(['error' => 'Unauthorized']);
|
|
||||||
exit;
|
// Fallback: check the user’s role in storage (e.g., users.txt/DB)
|
||||||
|
if (!$isAdmin) {
|
||||||
|
$u = $_SESSION['username'] ?? '';
|
||||||
|
if ($u) {
|
||||||
|
try {
|
||||||
|
// UserModel::getUserRole($u) should return '1' for admins
|
||||||
|
$isAdmin = (UserModel::getUserRole($u) === '1');
|
||||||
|
if ($isAdmin) {
|
||||||
|
// Normalize session so downstream ACL checks see admin
|
||||||
|
$_SESSION['isAdmin'] = true;
|
||||||
|
}
|
||||||
|
} catch (\Throwable $e) {
|
||||||
|
// ignore and continue to deny
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!$isAdmin) {
|
||||||
|
http_response_code(403);
|
||||||
|
header('Content-Type: application/json');
|
||||||
|
echo json_encode(['error' => 'Admin privileges required.']);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/** Enforce CSRF using X-CSRF-Token header (or csrfToken param as fallback). */
|
/** Enforce CSRF using X-CSRF-Token header (or csrfToken param as fallback). */
|
||||||
private static function requireCsrf(): void
|
private static function requireCsrf(): void
|
||||||
{
|
{
|
||||||
|
|||||||
347
src/lib/ACL.php
Normal file
347
src/lib/ACL.php
Normal file
@@ -0,0 +1,347 @@
|
|||||||
|
<?php
|
||||||
|
// src/lib/ACL.php
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
require_once PROJECT_ROOT . '/config/config.php';
|
||||||
|
|
||||||
|
class ACL
|
||||||
|
{
|
||||||
|
/** In-memory cache of the ACL file. */
|
||||||
|
private static $cache = null;
|
||||||
|
/** Absolute path to folder_acl.json */
|
||||||
|
private static $path = null;
|
||||||
|
|
||||||
|
/** Capability buckets we store per folder. */
|
||||||
|
private const BUCKETS = ['owners','read','write','share','read_own']; // + read_own (view own only)
|
||||||
|
|
||||||
|
/** Compute/cache the ACL storage path. */
|
||||||
|
private static function path(): string {
|
||||||
|
if (!self::$path) {
|
||||||
|
self::$path = rtrim(META_DIR, '/\\') . DIRECTORY_SEPARATOR . 'folder_acl.json';
|
||||||
|
}
|
||||||
|
return self::$path;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Normalize folder names (slashes + root). */
|
||||||
|
public static function normalizeFolder(string $f): string {
|
||||||
|
$f = trim(str_replace('\\', '/', $f), "/ \t\r\n");
|
||||||
|
if ($f === '' || $f === 'root') return 'root';
|
||||||
|
return $f;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static function purgeUser(string $user): bool {
|
||||||
|
$user = (string)$user;
|
||||||
|
$acl = self::$cache ?? self::loadFresh();
|
||||||
|
$changed = false;
|
||||||
|
|
||||||
|
foreach ($acl['folders'] as $folder => &$rec) {
|
||||||
|
foreach (self::BUCKETS as $k) {
|
||||||
|
$before = $rec[$k] ?? [];
|
||||||
|
$rec[$k] = array_values(array_filter($before, fn($u) => strcasecmp((string)$u, $user) !== 0));
|
||||||
|
if ($rec[$k] !== $before) $changed = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
unset($rec);
|
||||||
|
|
||||||
|
return $changed ? self::save($acl) : true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Load ACL fresh from disk, create/heal if needed. */
|
||||||
|
private static function loadFresh(): array {
|
||||||
|
$path = self::path();
|
||||||
|
|
||||||
|
if (!is_file($path)) {
|
||||||
|
@mkdir(dirname($path), 0755, true);
|
||||||
|
$init = [
|
||||||
|
'folders' => [
|
||||||
|
'root' => [
|
||||||
|
'owners' => ['admin'],
|
||||||
|
'read' => ['admin'],
|
||||||
|
'write' => ['admin'],
|
||||||
|
'share' => ['admin'],
|
||||||
|
'read_own'=> [], // new bucket; empty by default
|
||||||
|
],
|
||||||
|
],
|
||||||
|
'groups' => [],
|
||||||
|
];
|
||||||
|
@file_put_contents($path, json_encode($init, JSON_PRETTY_PRINT | JSON_UNESCAPED_SLASHES), LOCK_EX);
|
||||||
|
}
|
||||||
|
|
||||||
|
$json = (string) @file_get_contents($path);
|
||||||
|
$data = json_decode($json, true);
|
||||||
|
if (!is_array($data)) $data = [];
|
||||||
|
|
||||||
|
// Normalize shape
|
||||||
|
$data['folders'] = isset($data['folders']) && is_array($data['folders']) ? $data['folders'] : [];
|
||||||
|
$data['groups'] = isset($data['groups']) && is_array($data['groups']) ? $data['groups'] : [];
|
||||||
|
|
||||||
|
// Ensure root exists and has all buckets
|
||||||
|
if (!isset($data['folders']['root']) || !is_array($data['folders']['root'])) {
|
||||||
|
$data['folders']['root'] = [
|
||||||
|
'owners' => ['admin'],
|
||||||
|
'read' => ['admin'],
|
||||||
|
'write' => ['admin'],
|
||||||
|
'share' => ['admin'],
|
||||||
|
'read_own' => [],
|
||||||
|
];
|
||||||
|
} else {
|
||||||
|
foreach (self::BUCKETS as $k) {
|
||||||
|
if (!isset($data['folders']['root'][$k]) || !is_array($data['folders']['root'][$k])) {
|
||||||
|
// sensible defaults: admin in the classic buckets, empty for read_own
|
||||||
|
$data['folders']['root'][$k] = ($k === 'read_own') ? [] : ['admin'];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Heal any folder records
|
||||||
|
$healed = false;
|
||||||
|
foreach ($data['folders'] as $folder => &$rec) {
|
||||||
|
if (!is_array($rec)) { $rec = []; $healed = true; }
|
||||||
|
foreach (self::BUCKETS as $k) {
|
||||||
|
$v = $rec[$k] ?? [];
|
||||||
|
if (!is_array($v)) { $v = []; $healed = true; }
|
||||||
|
$v = array_values(array_unique(array_map('strval', $v)));
|
||||||
|
if (($rec[$k] ?? null) !== $v) { $rec[$k] = $v; $healed = true; }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
unset($rec);
|
||||||
|
|
||||||
|
self::$cache = $data;
|
||||||
|
|
||||||
|
// Persist back if we healed anything
|
||||||
|
if ($healed) {
|
||||||
|
@file_put_contents($path, json_encode($data, JSON_PRETTY_PRINT | JSON_UNESCAPED_SLASHES), LOCK_EX);
|
||||||
|
}
|
||||||
|
|
||||||
|
return $data;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Persist ACL to disk and refresh cache. */
|
||||||
|
private static function save(array $acl): bool {
|
||||||
|
$ok = @file_put_contents(self::path(), json_encode($acl, JSON_PRETTY_PRINT | JSON_UNESCAPED_SLASHES), LOCK_EX) !== false;
|
||||||
|
if ($ok) self::$cache = $acl;
|
||||||
|
return $ok;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Get a bucket list (owners/read/write/share/read_own) for a folder (explicit only). */
|
||||||
|
private static function listFor(string $folder, string $key): array {
|
||||||
|
$acl = self::$cache ?? self::loadFresh();
|
||||||
|
$f = $acl['folders'][$folder] ?? null;
|
||||||
|
return is_array($f[$key] ?? null) ? $f[$key] : [];
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Ensure a folder record exists (giving an initial owner). */
|
||||||
|
public static function ensureFolderRecord(string $folder, string $owner = 'admin'): void {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
$acl = self::$cache ?? self::loadFresh();
|
||||||
|
if (!isset($acl['folders'][$folder])) {
|
||||||
|
$acl['folders'][$folder] = [
|
||||||
|
'owners' => [$owner],
|
||||||
|
'read' => [$owner],
|
||||||
|
'write' => [$owner],
|
||||||
|
'share' => [$owner],
|
||||||
|
'read_own' => [],
|
||||||
|
];
|
||||||
|
self::save($acl);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/** True if this request is admin. */
|
||||||
|
public static function isAdmin(array $perms = []): bool {
|
||||||
|
if (!empty($_SESSION['isAdmin'])) return true;
|
||||||
|
if (!empty($perms['admin']) || !empty($perms['isAdmin'])) return true;
|
||||||
|
if (isset($perms['role']) && (string)$perms['role'] === '1') return true;
|
||||||
|
if (!empty($_SESSION['role']) && (string)$_SESSION['role'] === '1') return true;
|
||||||
|
// Optional: if you configured DEFAULT_ADMIN_USER, treat that username as admin
|
||||||
|
if (defined('DEFAULT_ADMIN_USER') && !empty($_SESSION['username'])
|
||||||
|
&& strcasecmp((string)$_SESSION['username'], (string)DEFAULT_ADMIN_USER) === 0) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Case-insensitive membership in a capability bucket. $cap: owner|owners|read|write|share|read_own */
|
||||||
|
public static function hasGrant(string $user, string $folder, string $cap): bool {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
$capKey = ($cap === 'owner') ? 'owners' : $cap;
|
||||||
|
$arr = self::listFor($folder, $capKey);
|
||||||
|
foreach ($arr as $u) {
|
||||||
|
if (strcasecmp((string)$u, $user) === 0) return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** True if user is an explicit owner (or admin). */
|
||||||
|
public static function isOwner(string $user, array $perms, string $folder): bool {
|
||||||
|
if (self::isAdmin($perms)) return true;
|
||||||
|
return self::hasGrant($user, $folder, 'owners');
|
||||||
|
}
|
||||||
|
|
||||||
|
/** "Manage" in UI == owner. */
|
||||||
|
public static function canManage(string $user, array $perms, string $folder): bool {
|
||||||
|
return self::isOwner($user, $perms, $folder);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static function canRead(string $user, array $perms, string $folder): bool {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
if (self::isAdmin($perms)) return true;
|
||||||
|
// IMPORTANT: write no longer implies read
|
||||||
|
return self::hasGrant($user, $folder, 'owners')
|
||||||
|
|| self::hasGrant($user, $folder, 'read');
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Own-only view = read_own OR (any full view). */
|
||||||
|
public static function canReadOwn(string $user, array $perms, string $folder): bool {
|
||||||
|
// if they can full-view, this is trivially true
|
||||||
|
if (self::canRead($user, $perms, $folder)) return true;
|
||||||
|
return self::hasGrant($user, $folder, 'read_own');
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Upload = write OR owner. No bypassOwnership. */
|
||||||
|
public static function canWrite(string $user, array $perms, string $folder): bool {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
if (self::isAdmin($perms)) return true;
|
||||||
|
return self::hasGrant($user, $folder, 'owners')
|
||||||
|
|| self::hasGrant($user, $folder, 'write');
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Share = share OR owner. No bypassOwnership. */
|
||||||
|
public static function canShare(string $user, array $perms, string $folder): bool {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
if (self::isAdmin($perms)) return true;
|
||||||
|
return self::hasGrant($user, $folder, 'owners')
|
||||||
|
|| self::hasGrant($user, $folder, 'share');
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return explicit lists for a folder (no inheritance).
|
||||||
|
* Keys: owners, read, write, share, read_own (always arrays).
|
||||||
|
*/
|
||||||
|
public static function explicit(string $folder): array {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
$acl = self::$cache ?? self::loadFresh();
|
||||||
|
$rec = $acl['folders'][$folder] ?? [];
|
||||||
|
$norm = function ($v): array {
|
||||||
|
if (!is_array($v)) return [];
|
||||||
|
$v = array_map('strval', $v);
|
||||||
|
return array_values(array_unique($v));
|
||||||
|
};
|
||||||
|
return [
|
||||||
|
'owners' => $norm($rec['owners'] ?? []),
|
||||||
|
'read' => $norm($rec['read'] ?? []),
|
||||||
|
'write' => $norm($rec['write'] ?? []),
|
||||||
|
'share' => $norm($rec['share'] ?? []),
|
||||||
|
'read_own' => $norm($rec['read_own'] ?? []),
|
||||||
|
];
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Upsert a full explicit record for a folder.
|
||||||
|
* NOTE: preserves existing 'read_own' so older callers don't wipe it.
|
||||||
|
*/
|
||||||
|
public static function upsert(string $folder, array $owners, array $read, array $write, array $share): bool {
|
||||||
|
$folder = self::normalizeFolder($folder);
|
||||||
|
$acl = self::$cache ?? self::loadFresh();
|
||||||
|
$existing = $acl['folders'][$folder] ?? ['read_own' => []];
|
||||||
|
$fmt = function (array $arr): array {
|
||||||
|
return array_values(array_unique(array_map('strval', $arr)));
|
||||||
|
};
|
||||||
|
$acl['folders'][$folder] = [
|
||||||
|
'owners' => $fmt($owners),
|
||||||
|
'read' => $fmt($read),
|
||||||
|
'write' => $fmt($write),
|
||||||
|
'share' => $fmt($share),
|
||||||
|
// preserve any own-only grants unless caller explicitly manages them elsewhere
|
||||||
|
'read_own' => isset($existing['read_own']) && is_array($existing['read_own'])
|
||||||
|
? array_values(array_unique(array_map('strval', $existing['read_own'])))
|
||||||
|
: [],
|
||||||
|
];
|
||||||
|
return self::save($acl);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Atomic per-user update across many folders.
|
||||||
|
* $grants is like:
|
||||||
|
* [
|
||||||
|
* "folderA" => ["view"=>true, "viewOwn"=>false, "upload"=>true, "manage"=>false, "share"=>false],
|
||||||
|
* "folderB" => ["view"=>false, "viewOwn"=>true, "upload"=>false, "manage"=>false, "share"=>false],
|
||||||
|
* ]
|
||||||
|
* If a folder is INCLUDED with all false, the user is removed from all its buckets.
|
||||||
|
* (If the frontend omits a folder entirely, this method leaves that folder unchanged.)
|
||||||
|
*/
|
||||||
|
public static function applyUserGrantsAtomic(string $user, array $grants): array {
|
||||||
|
$user = (string)$user;
|
||||||
|
$path = self::path();
|
||||||
|
|
||||||
|
$fh = @fopen($path, 'c+');
|
||||||
|
if (!$fh) throw new RuntimeException('Cannot open ACL storage');
|
||||||
|
if (!flock($fh, LOCK_EX)) { fclose($fh); throw new RuntimeException('Cannot lock ACL storage'); }
|
||||||
|
|
||||||
|
try {
|
||||||
|
// Read current content
|
||||||
|
$raw = stream_get_contents($fh);
|
||||||
|
if ($raw === false) $raw = '';
|
||||||
|
$acl = json_decode($raw, true);
|
||||||
|
if (!is_array($acl)) $acl = ['folders'=>[], 'groups'=>[]];
|
||||||
|
if (!isset($acl['folders']) || !is_array($acl['folders'])) $acl['folders'] = [];
|
||||||
|
if (!isset($acl['groups']) || !is_array($acl['groups'])) $acl['groups'] = [];
|
||||||
|
|
||||||
|
$changed = [];
|
||||||
|
|
||||||
|
foreach ($grants as $folder => $caps) {
|
||||||
|
$ff = self::normalizeFolder((string)$folder);
|
||||||
|
if (!isset($acl['folders'][$ff]) || !is_array($acl['folders'][$ff])) {
|
||||||
|
$acl['folders'][$ff] = ['owners'=>[], 'read'=>[], 'write'=>[], 'share'=>[], 'read_own'=>[]];
|
||||||
|
}
|
||||||
|
$rec =& $acl['folders'][$ff];
|
||||||
|
|
||||||
|
// Remove user from all buckets first (idempotent)
|
||||||
|
foreach (self::BUCKETS as $k) {
|
||||||
|
$rec[$k] = array_values(array_filter(
|
||||||
|
array_map('strval', $rec[$k]),
|
||||||
|
fn($u) => strcasecmp($u, $user) !== 0
|
||||||
|
));
|
||||||
|
}
|
||||||
|
|
||||||
|
$v = !empty($caps['view']); // full view
|
||||||
|
$vo = !empty($caps['viewOwn']); // own-only view
|
||||||
|
$u = !empty($caps['upload']);
|
||||||
|
$m = !empty($caps['manage']);
|
||||||
|
$s = !empty($caps['share']);
|
||||||
|
|
||||||
|
// Implications
|
||||||
|
if ($m) { $v = true; $u = true; } // owner implies read+write
|
||||||
|
if ($u && !$v && !$vo) $vo = true; // upload needs at least own-only visibility
|
||||||
|
if ($s && !$v) $v = true; // sharing implies full read (can be relaxed if desired)
|
||||||
|
|
||||||
|
// Add back per caps
|
||||||
|
if ($m) $rec['owners'][] = $user;
|
||||||
|
if ($v) $rec['read'][] = $user;
|
||||||
|
if ($vo) $rec['read_own'][]= $user;
|
||||||
|
if ($u) $rec['write'][] = $user;
|
||||||
|
if ($s) $rec['share'][] = $user;
|
||||||
|
|
||||||
|
// De-dup
|
||||||
|
foreach (self::BUCKETS as $k) {
|
||||||
|
$rec[$k] = array_values(array_unique(array_map('strval', $rec[$k])));
|
||||||
|
}
|
||||||
|
|
||||||
|
$changed[] = $ff;
|
||||||
|
unset($rec);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write back atomically
|
||||||
|
ftruncate($fh, 0);
|
||||||
|
rewind($fh);
|
||||||
|
$ok = fwrite($fh, json_encode($acl, JSON_PRETTY_PRINT | JSON_UNESCAPED_SLASHES)) !== false;
|
||||||
|
if (!$ok) throw new RuntimeException('Write failed');
|
||||||
|
|
||||||
|
self::$cache = $acl;
|
||||||
|
return ['ok' => true, 'updated' => $changed];
|
||||||
|
} finally {
|
||||||
|
fflush($fh);
|
||||||
|
flock($fh, LOCK_UN);
|
||||||
|
fclose($fh);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,6 +2,7 @@
|
|||||||
// src/models/FileModel.php
|
// src/models/FileModel.php
|
||||||
|
|
||||||
require_once PROJECT_ROOT . '/config/config.php';
|
require_once PROJECT_ROOT . '/config/config.php';
|
||||||
|
require_once __DIR__ . '/../../src/lib/ACL.php';
|
||||||
|
|
||||||
class FileModel {
|
class FileModel {
|
||||||
|
|
||||||
|
|||||||
@@ -2,9 +2,99 @@
|
|||||||
// src/models/FolderModel.php
|
// src/models/FolderModel.php
|
||||||
|
|
||||||
require_once PROJECT_ROOT . '/config/config.php';
|
require_once PROJECT_ROOT . '/config/config.php';
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
|
||||||
class FolderModel
|
class FolderModel
|
||||||
{
|
{
|
||||||
|
/* ============================================================
|
||||||
|
* Ownership mapping helpers (stored in META_DIR/folder_owners.json)
|
||||||
|
* ============================================================ */
|
||||||
|
|
||||||
|
/** Load the folder → owner map. */
|
||||||
|
public static function getFolderOwners(): array
|
||||||
|
{
|
||||||
|
$f = FOLDER_OWNERS_FILE;
|
||||||
|
if (!file_exists($f)) return [];
|
||||||
|
$json = json_decode(@file_get_contents($f), true);
|
||||||
|
return is_array($json) ? $json : [];
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Persist the folder → owner map. */
|
||||||
|
public static function saveFolderOwners(array $map): bool
|
||||||
|
{
|
||||||
|
return (bool) @file_put_contents(FOLDER_OWNERS_FILE, json_encode($map, JSON_PRETTY_PRINT), LOCK_EX);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Set (or replace) the owner for a specific folder (relative path or 'root'). */
|
||||||
|
public static function setOwnerFor(string $folder, string $owner): void
|
||||||
|
{
|
||||||
|
$key = trim($folder, "/\\ ");
|
||||||
|
$key = ($key === '' ? 'root' : $key);
|
||||||
|
$owners = self::getFolderOwners();
|
||||||
|
$owners[$key] = $owner;
|
||||||
|
self::saveFolderOwners($owners);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Get the owner for a folder (relative path or 'root'); returns null if unmapped. */
|
||||||
|
public static function getOwnerFor(string $folder): ?string
|
||||||
|
{
|
||||||
|
$key = trim($folder, "/\\ ");
|
||||||
|
$key = ($key === '' ? 'root' : $key);
|
||||||
|
$owners = self::getFolderOwners();
|
||||||
|
return $owners[$key] ?? null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Rename a single ownership key (old → new). */
|
||||||
|
public static function renameOwnerKey(string $old, string $new): void
|
||||||
|
{
|
||||||
|
$old = trim($old, "/\\ ");
|
||||||
|
$new = trim($new, "/\\ ");
|
||||||
|
$owners = self::getFolderOwners();
|
||||||
|
if (isset($owners[$old])) {
|
||||||
|
$owners[$new] = $owners[$old];
|
||||||
|
unset($owners[$old]);
|
||||||
|
self::saveFolderOwners($owners);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Remove ownership for a folder and all its descendants. */
|
||||||
|
public static function removeOwnerForTree(string $folder): void
|
||||||
|
{
|
||||||
|
$folder = trim($folder, "/\\ ");
|
||||||
|
$owners = self::getFolderOwners();
|
||||||
|
foreach (array_keys($owners) as $k) {
|
||||||
|
if ($k === $folder || strpos($k, $folder . '/') === 0) {
|
||||||
|
unset($owners[$k]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
self::saveFolderOwners($owners);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Rename ownership keys for an entire subtree: old/... → new/... */
|
||||||
|
public static function renameOwnersForTree(string $oldFolder, string $newFolder): void
|
||||||
|
{
|
||||||
|
$old = trim($oldFolder, "/\\ ");
|
||||||
|
$new = trim($newFolder, "/\\ ");
|
||||||
|
$owners = self::getFolderOwners();
|
||||||
|
|
||||||
|
$rebased = [];
|
||||||
|
foreach ($owners as $k => $v) {
|
||||||
|
if ($k === $old || strpos($k, $old . '/') === 0) {
|
||||||
|
$suffix = substr($k, strlen($old));
|
||||||
|
// ensure no leading slash duplication
|
||||||
|
$suffix = ltrim($suffix, '/');
|
||||||
|
$rebased[$new . ($suffix !== '' ? '/' . $suffix : '')] = $v;
|
||||||
|
} else {
|
||||||
|
$rebased[$k] = $v;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
self::saveFolderOwners($rebased);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ============================================================
|
||||||
|
* Existing helpers
|
||||||
|
* ============================================================ */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Resolve a (possibly nested) relative folder like "invoices/2025" to a real path
|
* Resolve a (possibly nested) relative folder like "invoices/2025" to a real path
|
||||||
* under UPLOAD_DIR. Validates each path segment against REGEX_FOLDER_NAME, enforces
|
* under UPLOAD_DIR. Validates each path segment against REGEX_FOLDER_NAME, enforces
|
||||||
@@ -59,9 +149,7 @@ class FolderModel
|
|||||||
return [$real, $relative, null];
|
return [$real, $relative, null];
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/** Build metadata file path for a given (relative) folder. */
|
||||||
* Build metadata file path for a given (relative) folder.
|
|
||||||
*/
|
|
||||||
private static function getMetadataFilePath(string $folder): string
|
private static function getMetadataFilePath(string $folder): string
|
||||||
{
|
{
|
||||||
if (strtolower($folder) === 'root' || trim($folder) === '') {
|
if (strtolower($folder) === 'root' || trim($folder) === '') {
|
||||||
@@ -72,42 +160,67 @@ class FolderModel
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a folder under the specified parent (or in root) and creates an empty metadata file.
|
* Creates a folder under the specified parent (or in root) and creates an empty metadata file.
|
||||||
|
* Also records the creator as the owner (if a session user is available).
|
||||||
*/
|
*/
|
||||||
public static function createFolder(string $folderName, string $parent = ""): array
|
<?php
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
|
||||||
|
class FolderModel
|
||||||
|
{
|
||||||
|
/**
|
||||||
|
* Create a folder on disk and register it in ACL with the creator as owner.
|
||||||
|
* @param string $folderName leaf name
|
||||||
|
* @param string $parent 'root' or nested key (e.g. 'team/reports')
|
||||||
|
* @param string $creator username to set as initial owner (falls back to 'admin')
|
||||||
|
*/
|
||||||
|
public static function createFolder(string $folderName, string $parent = 'root', string $creator = 'admin'): array
|
||||||
{
|
{
|
||||||
$folderName = trim($folderName);
|
$folderName = trim($folderName);
|
||||||
$parent = trim($parent);
|
$parent = trim($parent);
|
||||||
|
|
||||||
if (!preg_match(REGEX_FOLDER_NAME, $folderName)) {
|
if ($folderName === '' || !preg_match(REGEX_FOLDER_NAME, $folderName)) {
|
||||||
return ["error" => "Invalid folder name."];
|
return ['success' => false, 'error' => 'Invalid folder name', 'code' => 400];
|
||||||
|
}
|
||||||
|
if ($parent !== '' && strcasecmp($parent, 'root') !== 0 && !preg_match(REGEX_FOLDER_NAME, $parent)) {
|
||||||
|
return ['success' => false, 'error' => 'Invalid parent folder', 'code' => 400];
|
||||||
}
|
}
|
||||||
|
|
||||||
// Resolve parent path (root ok; nested ok)
|
// Compute ACL key and filesystem path
|
||||||
[$parentReal, $parentRel, $err] = self::resolveFolderPath($parent === '' ? 'root' : $parent, true);
|
$aclKey = ($parent === '' || strcasecmp($parent, 'root') === 0) ? $folderName : ($parent . '/' . $folderName);
|
||||||
if ($err) return ["error" => $err];
|
|
||||||
|
|
||||||
$targetRel = ($parentRel === 'root') ? $folderName : ($parentRel . '/' . $folderName);
|
$base = rtrim(UPLOAD_DIR, '/\\');
|
||||||
$targetDir = $parentReal . DIRECTORY_SEPARATOR . $folderName;
|
$path = ($parent === '' || strcasecmp($parent, 'root') === 0)
|
||||||
|
? $base . DIRECTORY_SEPARATOR . $folderName
|
||||||
|
: $base . DIRECTORY_SEPARATOR . str_replace('/', DIRECTORY_SEPARATOR, $parent) . DIRECTORY_SEPARATOR . $folderName;
|
||||||
|
|
||||||
if (file_exists($targetDir)) {
|
// Safety: stay inside UPLOAD_DIR
|
||||||
return ["error" => "Folder already exists."];
|
$realBase = realpath($base);
|
||||||
|
$realPath = $path; // may not exist yet
|
||||||
|
$parentDir = dirname($path);
|
||||||
|
if (!is_dir($parentDir) && !@mkdir($parentDir, 0775, true)) {
|
||||||
|
return ['success' => false, 'error' => 'Failed to create parent path', 'code' => 500];
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!mkdir($targetDir, 0775, true)) {
|
if (is_dir($path)) {
|
||||||
return ["error" => "Failed to create folder."];
|
// Idempotent: still ensure ACL record exists
|
||||||
|
ACL::ensureFolderRecord($aclKey, $creator ?: 'admin');
|
||||||
|
return ['success' => true, 'folder' => $aclKey, 'alreadyExists' => true];
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create an empty metadata file for the new folder.
|
if (!@mkdir($path, 0775, true)) {
|
||||||
$metadataFile = self::getMetadataFilePath($targetRel);
|
return ['success' => false, 'error' => 'Failed to create folder', 'code' => 500];
|
||||||
if (file_put_contents($metadataFile, json_encode([], JSON_PRETTY_PRINT), LOCK_EX) === false) {
|
|
||||||
return ["error" => "Folder created but failed to create metadata file."];
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return ["success" => true];
|
// Seed ACL: owner/read/write/share -> creator; read_own empty
|
||||||
|
ACL::ensureFolderRecord($aclKey, $creator ?: 'admin');
|
||||||
|
|
||||||
|
return ['success' => true, 'folder' => $aclKey];
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Deletes a folder if it is empty and removes its corresponding metadata.
|
* Deletes a folder if it is empty and removes its corresponding metadata.
|
||||||
|
* Also removes ownership mappings for this folder and all its descendants.
|
||||||
*/
|
*/
|
||||||
public static function deleteFolder(string $folder): array
|
public static function deleteFolder(string $folder): array
|
||||||
{
|
{
|
||||||
@@ -119,12 +232,12 @@ class FolderModel
|
|||||||
if ($err) return ["error" => $err];
|
if ($err) return ["error" => $err];
|
||||||
|
|
||||||
// Prevent deletion if not empty.
|
// Prevent deletion if not empty.
|
||||||
$items = array_diff(scandir($real), array('.', '..'));
|
$items = array_diff(@scandir($real) ?: [], array('.', '..'));
|
||||||
if (count($items) > 0) {
|
if (count($items) > 0) {
|
||||||
return ["error" => "Folder is not empty."];
|
return ["error" => "Folder is not empty."];
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!rmdir($real)) {
|
if (!@rmdir($real)) {
|
||||||
return ["error" => "Failed to delete folder."];
|
return ["error" => "Failed to delete folder."];
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -134,11 +247,15 @@ class FolderModel
|
|||||||
@unlink($metadataFile);
|
@unlink($metadataFile);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Remove ownership mappings for the subtree.
|
||||||
|
self::removeOwnerForTree($relative);
|
||||||
|
|
||||||
return ["success" => true];
|
return ["success" => true];
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Renames a folder and updates related metadata files (by renaming their filenames).
|
* Renames a folder and updates related metadata files (by renaming their filenames).
|
||||||
|
* Also rewrites ownership keys for the whole subtree from old → new.
|
||||||
*/
|
*/
|
||||||
public static function renameFolder(string $oldFolder, string $newFolder): array
|
public static function renameFolder(string $oldFolder, string $newFolder): array
|
||||||
{
|
{
|
||||||
@@ -163,6 +280,7 @@ class FolderModel
|
|||||||
if ($base === false) return ["error" => "Uploads directory not configured correctly."];
|
if ($base === false) return ["error" => "Uploads directory not configured correctly."];
|
||||||
|
|
||||||
$newParts = array_filter(explode('/', $newFolder), fn($p) => $p!=='');
|
$newParts = array_filter(explode('/', $newFolder), fn($p) => $p!=='');
|
||||||
|
$newRel = implode('/', $newParts);
|
||||||
$newPath = $base . DIRECTORY_SEPARATOR . implode(DIRECTORY_SEPARATOR, $newParts);
|
$newPath = $base . DIRECTORY_SEPARATOR . implode(DIRECTORY_SEPARATOR, $newParts);
|
||||||
|
|
||||||
// Parent of new path must exist
|
// Parent of new path must exist
|
||||||
@@ -174,13 +292,13 @@ class FolderModel
|
|||||||
return ["error" => "New folder name already exists."];
|
return ["error" => "New folder name already exists."];
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!rename($oldReal, $newPath)) {
|
if (!@rename($oldReal, $newPath)) {
|
||||||
return ["error" => "Failed to rename folder."];
|
return ["error" => "Failed to rename folder."];
|
||||||
}
|
}
|
||||||
|
|
||||||
// Update metadata filenames (prefix-rename)
|
// Update metadata filenames (prefix-rename)
|
||||||
$oldPrefix = str_replace(['/', '\\', ' '], '-', $oldRel);
|
$oldPrefix = str_replace(['/', '\\', ' '], '-', $oldRel);
|
||||||
$newPrefix = str_replace(['/', '\\', ' '], '-', implode('/', $newParts));
|
$newPrefix = str_replace(['/', '\\', ' '], '-', $newRel);
|
||||||
$globPat = META_DIR . $oldPrefix . '*_metadata.json';
|
$globPat = META_DIR . $oldPrefix . '*_metadata.json';
|
||||||
$metadataFiles = glob($globPat) ?: [];
|
$metadataFiles = glob($globPat) ?: [];
|
||||||
|
|
||||||
@@ -191,6 +309,9 @@ class FolderModel
|
|||||||
@rename($oldMetaFile, $newMeta);
|
@rename($oldMetaFile, $newMeta);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Update ownership mapping for the entire subtree.
|
||||||
|
self::renameOwnersForTree($oldRel, $newRel);
|
||||||
|
|
||||||
return ["success" => true];
|
return ["success" => true];
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -217,8 +338,9 @@ class FolderModel
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves the list of folders (including "root") along with file count metadata.
|
* Retrieves the list of folders (including "root") along with file count metadata.
|
||||||
|
* (Ownership filtering is handled in the controller; this function remains unchanged.)
|
||||||
*/
|
*/
|
||||||
public static function getFolderList(): array
|
public static function getFolderList($ignoredParent = null, ?string $username = null, array $perms = []): array
|
||||||
{
|
{
|
||||||
$baseDir = realpath(UPLOAD_DIR);
|
$baseDir = realpath(UPLOAD_DIR);
|
||||||
if ($baseDir === false) {
|
if ($baseDir === false) {
|
||||||
@@ -256,6 +378,12 @@ class FolderModel
|
|||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if ($username !== null) {
|
||||||
|
$folderInfoList = array_values(array_filter(
|
||||||
|
$folderInfoList,
|
||||||
|
fn($row) => ACL::canRead($username, $perms, $row['folder'])
|
||||||
|
));
|
||||||
|
}
|
||||||
return $folderInfoList;
|
return $folderInfoList;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -81,63 +81,94 @@ class userModel
|
|||||||
* Remove a user and update encrypted userPermissions.json.
|
* Remove a user and update encrypted userPermissions.json.
|
||||||
*/
|
*/
|
||||||
public static function removeUser($usernameToRemove)
|
public static function removeUser($usernameToRemove)
|
||||||
{
|
{
|
||||||
global $encryptionKey;
|
global $encryptionKey;
|
||||||
|
|
||||||
if (!preg_match(REGEX_USER, $usernameToRemove)) {
|
if (!preg_match(REGEX_USER, $usernameToRemove)) {
|
||||||
return ["error" => "Invalid username"];
|
return ["error" => "Invalid username"];
|
||||||
}
|
|
||||||
|
|
||||||
$usersFile = USERS_DIR . USERS_FILE;
|
|
||||||
if (!file_exists($usersFile)) {
|
|
||||||
return ["error" => "Users file not found"];
|
|
||||||
}
|
|
||||||
|
|
||||||
$existingUsers = file($usersFile, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES) ?: [];
|
|
||||||
$newUsers = [];
|
|
||||||
$userFound = false;
|
|
||||||
|
|
||||||
foreach ($existingUsers as $line) {
|
|
||||||
$parts = explode(':', trim($line));
|
|
||||||
if (count($parts) < 3) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if ($parts[0] === $usernameToRemove) {
|
|
||||||
$userFound = true;
|
|
||||||
continue; // skip
|
|
||||||
}
|
|
||||||
$newUsers[] = $line;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$userFound) {
|
|
||||||
return ["error" => "User not found"];
|
|
||||||
}
|
|
||||||
|
|
||||||
$newContent = $newUsers ? (implode(PHP_EOL, $newUsers) . PHP_EOL) : '';
|
|
||||||
if (file_put_contents($usersFile, $newContent, LOCK_EX) === false) {
|
|
||||||
return ["error" => "Failed to update users file"];
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update *encrypted* userPermissions.json consistently
|
|
||||||
$permissionsFile = USERS_DIR . "userPermissions.json";
|
|
||||||
if (file_exists($permissionsFile)) {
|
|
||||||
$raw = file_get_contents($permissionsFile);
|
|
||||||
$decrypted = decryptData($raw, $encryptionKey);
|
|
||||||
$permissionsArray = $decrypted !== false
|
|
||||||
? json_decode($decrypted, true)
|
|
||||||
: (json_decode($raw, true) ?: []); // tolerate legacy plaintext
|
|
||||||
|
|
||||||
if (is_array($permissionsArray)) {
|
|
||||||
unset($permissionsArray[strtolower($usernameToRemove)]);
|
|
||||||
$plain = json_encode($permissionsArray, JSON_PRETTY_PRINT);
|
|
||||||
$enc = encryptData($plain, $encryptionKey);
|
|
||||||
file_put_contents($permissionsFile, $enc, LOCK_EX);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return ["success" => "User removed successfully"];
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$usersFile = USERS_DIR . USERS_FILE;
|
||||||
|
if (!file_exists($usersFile)) {
|
||||||
|
return ["error" => "Users file not found"];
|
||||||
|
}
|
||||||
|
|
||||||
|
$existingUsers = file($usersFile, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES) ?: [];
|
||||||
|
$newUsers = [];
|
||||||
|
$userFound = false;
|
||||||
|
|
||||||
|
foreach ($existingUsers as $line) {
|
||||||
|
$parts = explode(':', trim($line));
|
||||||
|
if (count($parts) < 3) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (strcasecmp($parts[0], $usernameToRemove) === 0) {
|
||||||
|
$userFound = true;
|
||||||
|
continue; // skip this user
|
||||||
|
}
|
||||||
|
$newUsers[] = $line;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!$userFound) {
|
||||||
|
return ["error" => "User not found"];
|
||||||
|
}
|
||||||
|
|
||||||
|
$newContent = $newUsers ? (implode(PHP_EOL, $newUsers) . PHP_EOL) : '';
|
||||||
|
if (file_put_contents($usersFile, $newContent, LOCK_EX) === false) {
|
||||||
|
return ["error" => "Failed to update users file"];
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update encrypted userPermissions.json — remove any key matching case-insensitively
|
||||||
|
$permissionsFile = USERS_DIR . "userPermissions.json";
|
||||||
|
if (file_exists($permissionsFile)) {
|
||||||
|
$raw = file_get_contents($permissionsFile);
|
||||||
|
$decrypted = decryptData($raw, $encryptionKey);
|
||||||
|
$permissionsArray = $decrypted !== false
|
||||||
|
? json_decode($decrypted, true)
|
||||||
|
: (json_decode($raw, true) ?: []); // tolerate legacy plaintext
|
||||||
|
|
||||||
|
if (is_array($permissionsArray)) {
|
||||||
|
foreach (array_keys($permissionsArray) as $k) {
|
||||||
|
if (strcasecmp($k, $usernameToRemove) === 0) {
|
||||||
|
unset($permissionsArray[$k]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
$plain = json_encode($permissionsArray, JSON_PRETTY_PRINT);
|
||||||
|
$enc = encryptData($plain, $encryptionKey);
|
||||||
|
file_put_contents($permissionsFile, $enc, LOCK_EX);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Purge from ACL (remove from every bucket in every folder)
|
||||||
|
require_once PROJECT_ROOT . '/src/lib/ACL.php';
|
||||||
|
if (method_exists('ACL', 'purgeUser')) {
|
||||||
|
ACL::purgeUser($usernameToRemove);
|
||||||
|
} else {
|
||||||
|
// Fallback inline purge if you haven't added ACL::purgeUser yet:
|
||||||
|
$aclPath = rtrim(META_DIR, '/\\') . DIRECTORY_SEPARATOR . 'folder_acl.json';
|
||||||
|
$acl = is_file($aclPath) ? json_decode((string)file_get_contents($aclPath), true) : [];
|
||||||
|
if (!is_array($acl)) $acl = ['folders' => [], 'groups' => []];
|
||||||
|
$buckets = ['owners','read','write','share','read_own'];
|
||||||
|
|
||||||
|
$changed = false;
|
||||||
|
foreach ($acl['folders'] ?? [] as $f => &$rec) {
|
||||||
|
foreach ($buckets as $b) {
|
||||||
|
if (!isset($rec[$b]) || !is_array($rec[$b])) { $rec[$b] = []; continue; }
|
||||||
|
$before = $rec[$b];
|
||||||
|
$rec[$b] = array_values(array_filter($rec[$b], fn($u) => strcasecmp((string)$u, $usernameToRemove) !== 0));
|
||||||
|
if ($rec[$b] !== $before) $changed = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
unset($rec);
|
||||||
|
|
||||||
|
if ($changed) {
|
||||||
|
@file_put_contents($aclPath, json_encode($acl, JSON_PRETTY_PRINT | JSON_UNESCAPED_SLASHES), LOCK_EX);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ["success" => "User removed successfully"];
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get permissions for current user (or all, if admin).
|
* Get permissions for current user (or all, if admin).
|
||||||
*/
|
*/
|
||||||
@@ -188,7 +219,7 @@ class userModel
|
|||||||
if (file_exists($permissionsFile)) {
|
if (file_exists($permissionsFile)) {
|
||||||
$encryptedContent = file_get_contents($permissionsFile);
|
$encryptedContent = file_get_contents($permissionsFile);
|
||||||
$json = decryptData($encryptedContent, $encryptionKey);
|
$json = decryptData($encryptedContent, $encryptionKey);
|
||||||
if ($json === false) $json = $encryptedContent; // plain JSON fallback
|
if ($json === false) $json = $encryptedContent; // legacy plaintext
|
||||||
$existingPermissions = json_decode($json, true) ?: [];
|
$existingPermissions = json_decode($json, true) ?: [];
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -209,22 +240,34 @@ class userModel
|
|||||||
'bypassOwnership','canShare','canZip','viewOwnOnly'
|
'bypassOwnership','canShare','canZip','viewOwnOnly'
|
||||||
];
|
];
|
||||||
|
|
||||||
|
// Build a map of lowercase->actual key to update existing entries case-insensitively
|
||||||
|
$lcIndex = [];
|
||||||
|
foreach ($existingPermissions as $k => $_) {
|
||||||
|
$lcIndex[strtolower($k)] = $k;
|
||||||
|
}
|
||||||
|
|
||||||
foreach ($permissions as $perm) {
|
foreach ($permissions as $perm) {
|
||||||
if (empty($perm['username'])) continue;
|
if (empty($perm['username'])) continue;
|
||||||
$uname = strtolower($perm['username']);
|
|
||||||
$role = $userRoles[$uname] ?? null;
|
$unameOrig = (string)$perm['username']; // preserve original case
|
||||||
|
$unameLc = strtolower($unameOrig);
|
||||||
|
$role = $userRoles[$unameLc] ?? null;
|
||||||
if ($role === "1") continue; // skip admins
|
if ($role === "1") continue; // skip admins
|
||||||
|
|
||||||
$current = $existingPermissions[$uname] ?? [];
|
// Find existing key case-insensitively; otherwise use original case as canonical
|
||||||
|
$storeKey = $lcIndex[$unameLc] ?? $unameOrig;
|
||||||
|
|
||||||
|
$current = $existingPermissions[$storeKey] ?? [];
|
||||||
foreach ($knownKeys as $k) {
|
foreach ($knownKeys as $k) {
|
||||||
if (array_key_exists($k, $perm)) {
|
if (array_key_exists($k, $perm)) {
|
||||||
$current[$k] = (bool)$perm[$k];
|
$current[$k] = (bool)$perm[$k];
|
||||||
} elseif (!isset($current[$k])) {
|
} elseif (!isset($current[$k])) {
|
||||||
// default missing keys to false (preserve existing if set)
|
|
||||||
$current[$k] = false;
|
$current[$k] = false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
$existingPermissions[$uname] = $current;
|
|
||||||
|
$existingPermissions[$storeKey] = $current;
|
||||||
|
$lcIndex[$unameLc] = $storeKey; // keep index up to date
|
||||||
}
|
}
|
||||||
|
|
||||||
$plain = json_encode($existingPermissions, JSON_PRETTY_PRINT);
|
$plain = json_encode($existingPermissions, JSON_PRETTY_PRINT);
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
<?php
|
<?php
|
||||||
namespace FileRise\WebDAV;
|
namespace FileRise\WebDAV;
|
||||||
|
|
||||||
// Bootstrap constants and models
|
require_once __DIR__ . '/../../config/config.php'; // constants + loadUserPermissions()
|
||||||
require_once __DIR__ . '/../../config/config.php'; // UPLOAD_DIR, META_DIR, DATE_TIME_FORMAT
|
|
||||||
require_once __DIR__ . '/../../vendor/autoload.php'; // SabreDAV
|
require_once __DIR__ . '/../../vendor/autoload.php'; // SabreDAV
|
||||||
|
require_once __DIR__ . '/../../src/lib/ACL.php';
|
||||||
require_once __DIR__ . '/../../src/models/FolderModel.php';
|
require_once __DIR__ . '/../../src/models/FolderModel.php';
|
||||||
require_once __DIR__ . '/../../src/models/FileModel.php';
|
require_once __DIR__ . '/../../src/models/FileModel.php';
|
||||||
require_once __DIR__ . '/FileRiseFile.php';
|
require_once __DIR__ . '/FileRiseFile.php';
|
||||||
@@ -12,24 +12,27 @@ use Sabre\DAV\ICollection;
|
|||||||
use Sabre\DAV\INode;
|
use Sabre\DAV\INode;
|
||||||
use Sabre\DAV\Exception\NotFound;
|
use Sabre\DAV\Exception\NotFound;
|
||||||
use Sabre\DAV\Exception\Forbidden;
|
use Sabre\DAV\Exception\Forbidden;
|
||||||
use FileRise\WebDAV\FileRiseFile;
|
|
||||||
use FolderModel;
|
|
||||||
use FileModel;
|
|
||||||
|
|
||||||
class FileRiseDirectory implements ICollection, INode {
|
class FileRiseDirectory implements ICollection, INode {
|
||||||
private string $path;
|
private string $path;
|
||||||
private string $user;
|
private string $user;
|
||||||
private bool $folderOnly;
|
private bool $isAdmin;
|
||||||
|
private array $perms;
|
||||||
|
|
||||||
|
/** cache of folder => metadata array */
|
||||||
|
private array $metaCache = [];
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param string $path Absolute filesystem path (no trailing slash)
|
* @param string $path Absolute filesystem path (no trailing slash)
|
||||||
* @param string $user Authenticated username
|
* @param string $user Authenticated username
|
||||||
* @param bool $folderOnly If true, non‑admins only see $path/{user}
|
* @param bool $isAdmin
|
||||||
|
* @param array $perms user-permissions map (readOnly, disableUpload, bypassOwnership, etc.)
|
||||||
*/
|
*/
|
||||||
public function __construct(string $path, string $user, bool $folderOnly) {
|
public function __construct(string $path, string $user, bool $isAdmin, array $perms) {
|
||||||
$this->path = rtrim($path, '/\\');
|
$this->path = rtrim($path, '/\\');
|
||||||
$this->user = $user;
|
$this->user = $user;
|
||||||
$this->folderOnly = $folderOnly;
|
$this->isAdmin = $isAdmin;
|
||||||
|
$this->perms = $perms;
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── INode ───────────────────────────────────────────
|
// ── INode ───────────────────────────────────────────
|
||||||
@@ -39,72 +42,185 @@ class FileRiseDirectory implements ICollection, INode {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public function getLastModified(): int {
|
public function getLastModified(): int {
|
||||||
return filemtime($this->path);
|
return @filemtime($this->path) ?: time();
|
||||||
}
|
}
|
||||||
|
|
||||||
public function delete(): void {
|
public function delete(): void {
|
||||||
throw new Forbidden('Cannot delete this node');
|
throw new Forbidden('Cannot delete directories via WebDAV');
|
||||||
}
|
}
|
||||||
|
|
||||||
public function setName($name): void {
|
public function setName($name): void {
|
||||||
throw new Forbidden('Renaming not supported');
|
throw new Forbidden('Renaming directories is not supported');
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── ICollection ────────────────────────────────────
|
// ── ICollection ────────────────────────────────────
|
||||||
|
|
||||||
public function getChildren(): array {
|
public function getChildren(): array {
|
||||||
|
// Determine “folder key” relative to UPLOAD_DIR for ACL checks
|
||||||
|
$folderKey = $this->folderKeyForPath($this->path);
|
||||||
|
|
||||||
|
// Check view permission on *this* directory
|
||||||
|
$canFull = \ACL::canRead($this->user, $this->perms, $folderKey);
|
||||||
|
$canOwn = \ACL::hasGrant($this->user, $folderKey, 'read_own');
|
||||||
|
if (!$this->isAdmin && !$canFull && !$canOwn) {
|
||||||
|
throw new Forbidden('No view access to this folder');
|
||||||
|
}
|
||||||
|
|
||||||
$nodes = [];
|
$nodes = [];
|
||||||
|
$hide = ['trash','profile_pics']; // internal dirs to hide
|
||||||
foreach (new \DirectoryIterator($this->path) as $item) {
|
foreach (new \DirectoryIterator($this->path) as $item) {
|
||||||
if ($item->isDot()) continue;
|
if ($item->isDot()) continue;
|
||||||
|
$name = $item->getFilename();
|
||||||
|
if (in_array(strtolower($name), $hide, true)) continue;
|
||||||
|
|
||||||
$full = $item->getPathname();
|
$full = $item->getPathname();
|
||||||
|
|
||||||
if ($item->isDir()) {
|
if ($item->isDir()) {
|
||||||
$nodes[] = new self($full, $this->user, $this->folderOnly);
|
// Decide if the *child folder* should be visible
|
||||||
} else {
|
$childKey = $this->folderKeyForPath($full);
|
||||||
$nodes[] = new FileRiseFile($full, $this->user);
|
$canChild = $this->isAdmin
|
||||||
|
|| \ACL::canRead($this->user, $this->perms, $childKey)
|
||||||
|
|| \ACL::hasGrant($this->user, $childKey, 'read_own');
|
||||||
|
|
||||||
|
if ($canChild) {
|
||||||
|
$nodes[] = new self($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
|
}
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
// File in this directory: only list if full-view OR (own-only AND owner)
|
||||||
|
if ($canFull || $this->fileIsOwnedByUser($folderKey, $name)) {
|
||||||
|
$nodes[] = new FileRiseFile($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Apply folder‑only at the top level
|
|
||||||
if (
|
|
||||||
$this->folderOnly
|
|
||||||
&& realpath($this->path) === realpath(rtrim(UPLOAD_DIR,'/\\'))
|
|
||||||
) {
|
|
||||||
$nodes = array_filter($nodes, fn(INode $n)=> $n->getName() === $this->user);
|
|
||||||
}
|
|
||||||
return array_values($nodes);
|
return array_values($nodes);
|
||||||
}
|
}
|
||||||
|
|
||||||
public function childExists($name): bool {
|
public function childExists($name): bool {
|
||||||
return file_exists($this->path . DIRECTORY_SEPARATOR . $name);
|
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
||||||
|
if (!file_exists($full)) return false;
|
||||||
|
|
||||||
|
$folderKey = $this->folderKeyForPath($this->path);
|
||||||
|
$isDir = is_dir($full);
|
||||||
|
|
||||||
|
if ($isDir) {
|
||||||
|
$childKey = $this->folderKeyForPath($full);
|
||||||
|
return $this->isAdmin
|
||||||
|
|| \ACL::canRead($this->user, $this->perms, $childKey)
|
||||||
|
|| \ACL::hasGrant($this->user, $childKey, 'read_own');
|
||||||
|
}
|
||||||
|
|
||||||
|
// file
|
||||||
|
$canFull = $this->isAdmin || \ACL::canRead($this->user, $this->perms, $folderKey);
|
||||||
|
if ($canFull) return true;
|
||||||
|
|
||||||
|
return \ACL::hasGrant($this->user, $folderKey, 'read_own')
|
||||||
|
&& $this->fileIsOwnedByUser($folderKey, $name);
|
||||||
}
|
}
|
||||||
|
|
||||||
public function getChild($name): INode {
|
public function getChild($name): INode {
|
||||||
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
||||||
if (!file_exists($full)) throw new NotFound("Not found: $name");
|
if (!file_exists($full)) throw new NotFound("Not found: $name");
|
||||||
return is_dir($full)
|
|
||||||
? new self($full, $this->user, $this->folderOnly)
|
$folderKey = $this->folderKeyForPath($this->path);
|
||||||
: new FileRiseFile($full, $this->user);
|
if (is_dir($full)) {
|
||||||
|
$childKey = $this->folderKeyForPath($full);
|
||||||
|
$canDir = $this->isAdmin
|
||||||
|
|| \ACL::canRead($this->user, $this->perms, $childKey)
|
||||||
|
|| \ACL::hasGrant($this->user, $childKey, 'read_own');
|
||||||
|
if (!$canDir) throw new Forbidden('No view access to requested folder');
|
||||||
|
return new self($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
|
}
|
||||||
|
|
||||||
|
// file
|
||||||
|
$canFull = $this->isAdmin || \ACL::canRead($this->user, $this->perms, $folderKey);
|
||||||
|
if (!$canFull) {
|
||||||
|
if (!\ACL::hasGrant($this->user, $folderKey, 'read_own') || !$this->fileIsOwnedByUser($folderKey, $name)) {
|
||||||
|
throw new Forbidden('No view access to requested file');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return new FileRiseFile($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
}
|
}
|
||||||
|
|
||||||
public function createFile($name, $data = null): INode {
|
public function createFile($name, $data = null): INode {
|
||||||
|
$folderKey = $this->folderKeyForPath($this->path);
|
||||||
|
|
||||||
|
if (!$this->isAdmin && !\ACL::canWrite($this->user, $this->perms, $folderKey)) {
|
||||||
|
throw new Forbidden('No write access to this folder');
|
||||||
|
}
|
||||||
|
if (!empty($this->perms['disableUpload']) && !$this->isAdmin) {
|
||||||
|
throw new Forbidden('Uploads are disabled for your account');
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write directly to FS, then ensure metadata via FileRiseFile::put()
|
||||||
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
||||||
$content = is_resource($data) ? stream_get_contents($data) : (string)$data;
|
$content = is_resource($data) ? stream_get_contents($data) : (string)$data;
|
||||||
|
|
||||||
// Compute folder‑key relative to UPLOAD_DIR
|
// Let FileRiseFile handle metadata & overwrite semantics
|
||||||
$rel = substr($full, strlen(rtrim(UPLOAD_DIR,'/\\'))+1);
|
$fileNode = new FileRiseFile($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
$parts = explode('/', str_replace('\\','/',$rel));
|
$fileNode->put($content);
|
||||||
$filename = array_pop($parts);
|
|
||||||
$folder = empty($parts) ? 'root' : implode('/', $parts);
|
|
||||||
|
|
||||||
FileModel::saveFile($folder, $filename, $content, $this->user);
|
return $fileNode;
|
||||||
return new FileRiseFile($full, $this->user);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public function createDirectory($name): INode {
|
public function createDirectory($name): INode {
|
||||||
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
$parentKey = $this->folderKeyForPath($this->path);
|
||||||
$rel = substr($full, strlen(rtrim(UPLOAD_DIR,'/\\'))+1);
|
if (!$this->isAdmin && !\ACL::canWrite($this->user, $this->perms, $parentKey)) {
|
||||||
|
throw new Forbidden('No permission to create subfolders here');
|
||||||
|
}
|
||||||
|
|
||||||
|
$full = $this->path . DIRECTORY_SEPARATOR . $name;
|
||||||
|
if (!is_dir($full)) {
|
||||||
|
@mkdir($full, 0755, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
// FileRise folder bookkeeping (owner = creator)
|
||||||
|
$rel = $this->relFromUploads($full);
|
||||||
$parent = dirname(str_replace('\\','/',$rel));
|
$parent = dirname(str_replace('\\','/',$rel));
|
||||||
if ($parent === '.' || $parent === '/') $parent = '';
|
if ($parent === '.' || $parent === '/') $parent = '';
|
||||||
FolderModel::createFolder($name, $parent, $this->user);
|
\FolderModel::createFolder($name, $parent, $this->user);
|
||||||
return new self($full, $this->user, $this->folderOnly);
|
|
||||||
|
return new self($full, $this->user, $this->isAdmin, $this->perms);
|
||||||
|
}
|
||||||
|
|
||||||
|
// ── helpers ──────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
private function folderKeyForPath(string $absPath): string {
|
||||||
|
$base = rtrim(UPLOAD_DIR, '/\\');
|
||||||
|
$realBase = realpath($base) ?: $base;
|
||||||
|
$real = realpath($absPath) ?: $absPath;
|
||||||
|
|
||||||
|
if (stripos($real, $realBase) !== 0) return 'root';
|
||||||
|
$rel = ltrim(str_replace('\\','/', substr($real, strlen($realBase))), '/');
|
||||||
|
return ($rel === '' ? 'root' : $rel);
|
||||||
|
}
|
||||||
|
|
||||||
|
private function relFromUploads(string $absPath): string {
|
||||||
|
$base = rtrim(UPLOAD_DIR, '/\\');
|
||||||
|
return ltrim(str_replace('\\','/', substr($absPath, strlen($base))), '/');
|
||||||
|
}
|
||||||
|
|
||||||
|
private function loadMeta(string $folderKey): array {
|
||||||
|
if (isset($this->metaCache[$folderKey])) return $this->metaCache[$folderKey];
|
||||||
|
|
||||||
|
$metaFile = META_DIR . (
|
||||||
|
$folderKey === 'root'
|
||||||
|
? 'root_metadata.json'
|
||||||
|
: str_replace(['/', '\\', ' '], '-', $folderKey) . '_metadata.json'
|
||||||
|
);
|
||||||
|
|
||||||
|
$data = [];
|
||||||
|
if (is_file($metaFile)) {
|
||||||
|
$decoded = json_decode(@file_get_contents($metaFile), true);
|
||||||
|
if (is_array($decoded)) $data = $decoded;
|
||||||
|
}
|
||||||
|
return $this->metaCache[$folderKey] = $data;
|
||||||
|
}
|
||||||
|
|
||||||
|
private function fileIsOwnedByUser(string $folderKey, string $fileName): bool {
|
||||||
|
$meta = $this->loadMeta($folderKey);
|
||||||
|
return isset($meta[$fileName]['uploader'])
|
||||||
|
&& strcasecmp((string)$meta[$fileName]['uploader'], $this->user) === 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -5,18 +5,25 @@ namespace FileRise\WebDAV;
|
|||||||
|
|
||||||
require_once __DIR__ . '/../../config/config.php';
|
require_once __DIR__ . '/../../config/config.php';
|
||||||
require_once __DIR__ . '/../../vendor/autoload.php';
|
require_once __DIR__ . '/../../vendor/autoload.php';
|
||||||
|
require_once __DIR__ . '/../../src/lib/ACL.php';
|
||||||
require_once __DIR__ . '/../../src/models/FileModel.php';
|
require_once __DIR__ . '/../../src/models/FileModel.php';
|
||||||
|
require_once __DIR__ . '/CurrentUser.php';
|
||||||
|
|
||||||
use Sabre\DAV\IFile;
|
use Sabre\DAV\IFile;
|
||||||
use Sabre\DAV\INode;
|
use Sabre\DAV\INode;
|
||||||
use Sabre\DAV\Exception\Forbidden;
|
use Sabre\DAV\Exception\Forbidden;
|
||||||
use FileModel;
|
|
||||||
|
|
||||||
class FileRiseFile implements IFile, INode {
|
class FileRiseFile implements IFile, INode {
|
||||||
private string $path;
|
private string $path;
|
||||||
|
private string $user;
|
||||||
|
private bool $isAdmin;
|
||||||
|
private array $perms;
|
||||||
|
|
||||||
public function __construct(string $path) {
|
public function __construct(string $path, string $user, bool $isAdmin, array $perms) {
|
||||||
$this->path = $path;
|
$this->path = $path;
|
||||||
|
$this->user = $user;
|
||||||
|
$this->isAdmin = $isAdmin;
|
||||||
|
$this->perms = $perms;
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── INode ───────────────────────────────────────────
|
// ── INode ───────────────────────────────────────────
|
||||||
@@ -26,90 +33,134 @@ class FileRiseFile implements IFile, INode {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public function getLastModified(): int {
|
public function getLastModified(): int {
|
||||||
return filemtime($this->path);
|
return @filemtime($this->path) ?: time();
|
||||||
}
|
}
|
||||||
|
|
||||||
public function delete(): void {
|
public function delete(): void {
|
||||||
$base = rtrim(UPLOAD_DIR, '/\\') . DIRECTORY_SEPARATOR;
|
[$folderKey, $fileName] = $this->split();
|
||||||
$rel = substr($this->path, strlen($base));
|
if (!$this->isAdmin && !\ACL::canWrite($this->user, $this->perms, $folderKey)) {
|
||||||
$parts = explode(DIRECTORY_SEPARATOR, $rel);
|
throw new Forbidden('No write access to delete this file');
|
||||||
$file = array_pop($parts);
|
}
|
||||||
$folder = empty($parts) ? 'root' : $parts[0];
|
if (!$this->canTouchOwnership($folderKey, $fileName)) {
|
||||||
FileModel::deleteFiles($folder, [$file]);
|
throw new Forbidden('You do not own this file');
|
||||||
|
}
|
||||||
|
\FileModel::deleteFiles($folderKey, [$fileName]);
|
||||||
}
|
}
|
||||||
|
|
||||||
public function setName($newName): void {
|
public function setName($newName): void {
|
||||||
throw new Forbidden('Renaming files not supported');
|
throw new Forbidden('Renaming files via WebDAV is not supported');
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── IFile ───────────────────────────────────────────
|
// ── IFile ───────────────────────────────────────────
|
||||||
|
|
||||||
public function get() {
|
public function get() {
|
||||||
|
[$folderKey, $fileName] = $this->split();
|
||||||
|
$canFull = $this->isAdmin || \ACL::canRead($this->user, $this->perms, $folderKey);
|
||||||
|
if (!$canFull) {
|
||||||
|
// own-only?
|
||||||
|
if (!\ACL::hasGrant($this->user, $folderKey, 'read_own') || !$this->isOwner($folderKey, $fileName)) {
|
||||||
|
throw new Forbidden('No view access to this file');
|
||||||
|
}
|
||||||
|
}
|
||||||
return fopen($this->path, 'rb');
|
return fopen($this->path, 'rb');
|
||||||
}
|
}
|
||||||
|
|
||||||
public function put($data): ?string {
|
public function put($data): ?string {
|
||||||
// 1) Save incoming data
|
[$folderKey, $fileName] = $this->split();
|
||||||
|
|
||||||
|
if (!$this->isAdmin && !\ACL::canWrite($this->user, $this->perms, $folderKey)) {
|
||||||
|
throw new Forbidden('No write access to this folder');
|
||||||
|
}
|
||||||
|
if (!empty($this->perms['disableUpload']) && !$this->isAdmin) {
|
||||||
|
throw new Forbidden('Uploads are disabled for your account');
|
||||||
|
}
|
||||||
|
|
||||||
|
// If overwriting existing file, enforce ownership for non-admin unless bypassOwnership
|
||||||
|
$exists = is_file($this->path);
|
||||||
|
$bypass = !empty($this->perms['bypassOwnership']);
|
||||||
|
if ($exists && !$this->isAdmin && !$bypass && !$this->isOwner($folderKey, $fileName)) {
|
||||||
|
throw new Forbidden('You do not own the target file');
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write data
|
||||||
file_put_contents(
|
file_put_contents(
|
||||||
$this->path,
|
$this->path,
|
||||||
is_resource($data) ? stream_get_contents($data) : (string)$data
|
is_resource($data) ? stream_get_contents($data) : (string)$data
|
||||||
);
|
);
|
||||||
|
|
||||||
// 2) Update metadata with CurrentUser
|
// Update metadata (uploader on first write; modified every write)
|
||||||
$this->updateMetadata();
|
$this->updateMetadata($folderKey, $fileName);
|
||||||
|
|
||||||
// 3) Flush to client fast
|
|
||||||
if (function_exists('fastcgi_finish_request')) {
|
if (function_exists('fastcgi_finish_request')) {
|
||||||
fastcgi_finish_request();
|
fastcgi_finish_request();
|
||||||
}
|
}
|
||||||
|
|
||||||
return null; // no ETag
|
return null; // no ETag
|
||||||
}
|
}
|
||||||
|
|
||||||
public function getSize(): int {
|
public function getSize(): int {
|
||||||
return filesize($this->path);
|
return @filesize($this->path) ?: 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
public function getETag(): string {
|
public function getETag(): string {
|
||||||
return '"' . md5($this->getLastModified() . $this->getSize()) . '"';
|
return '"' . md5(($this->getLastModified() ?: 0) . ':' . ($this->getSize() ?: 0)) . '"';
|
||||||
}
|
}
|
||||||
|
|
||||||
public function getContentType(): ?string {
|
public function getContentType(): ?string {
|
||||||
return mime_content_type($this->path) ?: null;
|
return @mime_content_type($this->path) ?: null;
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── Metadata helper ───────────────────────────────────
|
// ── helpers ──────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
private function updateMetadata(): void {
|
private function split(): array {
|
||||||
$base = rtrim(UPLOAD_DIR, '/\\') . DIRECTORY_SEPARATOR;
|
$base = rtrim(UPLOAD_DIR, '/\\') . DIRECTORY_SEPARATOR;
|
||||||
$rel = substr($this->path, strlen($base));
|
$rel = ltrim(str_replace('\\','/', substr($this->path, strlen($base))), '/');
|
||||||
$parts = explode(DIRECTORY_SEPARATOR, $rel);
|
$parts = explode('/', $rel);
|
||||||
$fileName = array_pop($parts);
|
$file = array_pop($parts);
|
||||||
$folder = empty($parts) ? 'root' : $parts[0];
|
$folder = empty($parts) ? 'root' : implode('/', $parts);
|
||||||
|
return [$folder, $file];
|
||||||
|
}
|
||||||
|
|
||||||
$metaFile = META_DIR
|
private function metaFile(string $folderKey): string {
|
||||||
. ($folder === 'root'
|
return META_DIR . (
|
||||||
? 'root_metadata.json'
|
$folderKey === 'root'
|
||||||
: str_replace(['/', '\\', ' '], '-', $folder) . '_metadata.json');
|
? 'root_metadata.json'
|
||||||
|
: str_replace(['/', '\\', ' '], '-', $folderKey) . '_metadata.json'
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
$metadata = [];
|
private function loadMeta(string $folderKey): array {
|
||||||
if (file_exists($metaFile)) {
|
$mf = $this->metaFile($folderKey);
|
||||||
$decoded = json_decode(file_get_contents($metaFile), true);
|
if (!is_file($mf)) return [];
|
||||||
if (is_array($decoded)) {
|
$d = json_decode(@file_get_contents($mf), true);
|
||||||
$metadata = $decoded;
|
return is_array($d) ? $d : [];
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
|
private function saveMeta(string $folderKey, array $meta): void {
|
||||||
|
@file_put_contents($this->metaFile($folderKey), json_encode($meta, JSON_PRETTY_PRINT));
|
||||||
|
}
|
||||||
|
|
||||||
|
private function isOwner(string $folderKey, string $fileName): bool {
|
||||||
|
$meta = $this->loadMeta($folderKey);
|
||||||
|
return isset($meta[$fileName]['uploader']) &&
|
||||||
|
strcasecmp((string)$meta[$fileName]['uploader'], $this->user) === 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
private function canTouchOwnership(string $folderKey, string $fileName): bool {
|
||||||
|
if ($this->isAdmin || !empty($this->perms['bypassOwnership'])) return true;
|
||||||
|
return $this->isOwner($folderKey, $fileName);
|
||||||
|
}
|
||||||
|
|
||||||
|
private function updateMetadata(string $folderKey, string $fileName): void {
|
||||||
|
$meta = $this->loadMeta($folderKey);
|
||||||
$now = date(DATE_TIME_FORMAT);
|
$now = date(DATE_TIME_FORMAT);
|
||||||
$uploaded = $metadata[$fileName]['uploaded'] ?? $now;
|
$uploaded = $meta[$fileName]['uploaded'] ?? $now;
|
||||||
$uploader = CurrentUser::get();
|
$uploader = CurrentUser::get() ?: $this->user;
|
||||||
|
|
||||||
$metadata[$fileName] = [
|
$meta[$fileName] = [
|
||||||
'uploaded' => $uploaded,
|
'uploaded' => $uploaded,
|
||||||
'modified' => $now,
|
'modified' => $now,
|
||||||
'uploader' => $uploader,
|
'uploader' => $uploader,
|
||||||
];
|
];
|
||||||
|
$this->saveMeta($folderKey, $meta);
|
||||||
file_put_contents($metaFile, json_encode($metadata, JSON_PRETTY_PRINT));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Reference in New Issue
Block a user