2021-03-14 23:35:55 +01:00
|
|
|
use std::{io::Read, path::Path};
|
|
|
|
|
|
|
|
use chrono::{DateTime, Duration, Utc};
|
|
|
|
use multipart::server::{save::SavedData, Multipart, SaveResult};
|
2021-06-25 20:33:51 +02:00
|
|
|
use rocket::{http::ContentType, response::NamedFile, Data};
|
2021-03-14 23:35:55 +01:00
|
|
|
use rocket_contrib::json::Json;
|
|
|
|
use serde_json::Value;
|
|
|
|
|
|
|
|
use crate::{
|
2021-12-31 15:59:58 +01:00
|
|
|
api::{ApiResult, EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, UpdateType},
|
2021-03-14 23:35:55 +01:00
|
|
|
auth::{Headers, Host},
|
2021-04-03 05:16:49 +02:00
|
|
|
db::{models::*, DbConn, DbPool},
|
2021-07-15 19:15:55 +02:00
|
|
|
util::SafeString,
|
2021-03-14 23:35:55 +01:00
|
|
|
CONFIG,
|
|
|
|
};
|
|
|
|
|
2021-03-25 12:40:32 +01:00
|
|
|
const SEND_INACCESSIBLE_MSG: &str = "Send does not exist or is no longer available";
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
pub fn routes() -> Vec<rocket::Route> {
|
2021-06-25 20:33:51 +02:00
|
|
|
routes![
|
2021-08-03 17:33:59 +02:00
|
|
|
get_sends,
|
|
|
|
get_send,
|
2021-06-25 20:33:51 +02:00
|
|
|
post_send,
|
|
|
|
post_send_file,
|
|
|
|
post_access,
|
|
|
|
post_access_file,
|
|
|
|
put_send,
|
|
|
|
delete_send,
|
|
|
|
put_remove_password,
|
|
|
|
download_send
|
|
|
|
]
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
2021-04-03 05:16:49 +02:00
|
|
|
pub fn purge_sends(pool: DbPool) {
|
|
|
|
debug!("Purging sends");
|
|
|
|
if let Ok(conn) = pool.get() {
|
|
|
|
Send::purge(&conn);
|
|
|
|
} else {
|
|
|
|
error!("Failed to get DB connection while purging sends")
|
|
|
|
}
|
2021-03-22 19:57:35 +01:00
|
|
|
}
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
2021-12-31 15:59:58 +01:00
|
|
|
struct SendData {
|
|
|
|
Type: i32,
|
|
|
|
Key: String,
|
|
|
|
Password: Option<String>,
|
|
|
|
MaxAccessCount: Option<NumberOrString>,
|
|
|
|
ExpirationDate: Option<DateTime<Utc>>,
|
|
|
|
DeletionDate: DateTime<Utc>,
|
|
|
|
Disabled: bool,
|
|
|
|
HideEmail: Option<bool>,
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
// Data field
|
2021-12-31 15:59:58 +01:00
|
|
|
Name: String,
|
|
|
|
Notes: Option<String>,
|
|
|
|
Text: Option<Value>,
|
|
|
|
File: Option<Value>,
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
2021-03-16 10:07:45 +01:00
|
|
|
/// Enforces the `Disable Send` policy. A non-owner/admin user belonging to
|
|
|
|
/// an org with this policy enabled isn't allowed to create new Sends or
|
|
|
|
/// modify existing ones, but is allowed to delete them.
|
|
|
|
///
|
|
|
|
/// Ref: https://bitwarden.com/help/article/policies/#disable-send
|
2021-05-12 05:07:32 +02:00
|
|
|
///
|
|
|
|
/// There is also a Vaultwarden-specific `sends_allowed` config setting that
|
|
|
|
/// controls this policy globally.
|
2021-03-17 19:39:48 +01:00
|
|
|
fn enforce_disable_send_policy(headers: &Headers, conn: &DbConn) -> EmptyResult {
|
2021-03-16 10:07:45 +01:00
|
|
|
let user_uuid = &headers.user.uuid;
|
|
|
|
let policy_type = OrgPolicyType::DisableSend;
|
2021-05-12 05:07:32 +02:00
|
|
|
if !CONFIG.sends_allowed() || OrgPolicy::is_applicable_to_user(user_uuid, policy_type, conn) {
|
2021-03-16 10:07:45 +01:00
|
|
|
err!("Due to an Enterprise Policy, you are only able to delete an existing Send.")
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-05-12 09:54:28 +02:00
|
|
|
/// Enforces the `DisableHideEmail` option of the `Send Options` policy.
|
|
|
|
/// A non-owner/admin user belonging to an org with this option enabled isn't
|
|
|
|
/// allowed to hide their email address from the recipient of a Bitwarden Send,
|
|
|
|
/// but is allowed to remove this option from an existing Send.
|
|
|
|
///
|
|
|
|
/// Ref: https://bitwarden.com/help/article/policies/#send-options
|
|
|
|
fn enforce_disable_hide_email_policy(data: &SendData, headers: &Headers, conn: &DbConn) -> EmptyResult {
|
|
|
|
let user_uuid = &headers.user.uuid;
|
|
|
|
let hide_email = data.HideEmail.unwrap_or(false);
|
|
|
|
if hide_email && OrgPolicy::is_hide_email_disabled(user_uuid, conn) {
|
|
|
|
err!(
|
|
|
|
"Due to an Enterprise Policy, you are not allowed to hide your email address \
|
|
|
|
from recipients when creating or editing a Send."
|
|
|
|
)
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
fn create_send(data: SendData, user_uuid: String) -> ApiResult<Send> {
|
|
|
|
let data_val = if data.Type == SendType::Text as i32 {
|
|
|
|
data.Text
|
|
|
|
} else if data.Type == SendType::File as i32 {
|
|
|
|
data.File
|
|
|
|
} else {
|
|
|
|
err!("Invalid Send type")
|
|
|
|
};
|
|
|
|
|
|
|
|
let data_str = if let Some(mut d) = data_val {
|
|
|
|
d.as_object_mut().and_then(|o| o.remove("Response"));
|
|
|
|
serde_json::to_string(&d)?
|
|
|
|
} else {
|
|
|
|
err!("Send data not provided");
|
|
|
|
};
|
|
|
|
|
|
|
|
if data.DeletionDate > Utc::now() + Duration::days(31) {
|
|
|
|
err!(
|
|
|
|
"You cannot have a Send with a deletion date that far into the future. Adjust the Deletion Date to a value less than 31 days from now and try again."
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut send = Send::new(data.Type, data.Name, data_str, data.Key, data.DeletionDate.naive_utc());
|
|
|
|
send.user_uuid = Some(user_uuid);
|
|
|
|
send.notes = data.Notes;
|
2021-12-31 15:59:58 +01:00
|
|
|
send.max_access_count = match data.MaxAccessCount {
|
|
|
|
Some(m) => Some(m.into_i32()?),
|
|
|
|
_ => None,
|
|
|
|
};
|
2021-03-14 23:35:55 +01:00
|
|
|
send.expiration_date = data.ExpirationDate.map(|d| d.naive_utc());
|
|
|
|
send.disabled = data.Disabled;
|
2021-05-12 07:51:12 +02:00
|
|
|
send.hide_email = data.HideEmail;
|
2021-03-14 23:35:55 +01:00
|
|
|
send.atype = data.Type;
|
|
|
|
|
|
|
|
send.set_password(data.Password.as_deref());
|
|
|
|
|
|
|
|
Ok(send)
|
|
|
|
}
|
|
|
|
|
2021-08-03 17:33:59 +02:00
|
|
|
#[get("/sends")]
|
|
|
|
fn get_sends(headers: Headers, conn: DbConn) -> Json<Value> {
|
|
|
|
let sends = Send::find_by_user(&headers.user.uuid, &conn);
|
|
|
|
let sends_json: Vec<Value> = sends.iter().map(|s| s.to_json()).collect();
|
|
|
|
|
|
|
|
Json(json!({
|
|
|
|
"Data": sends_json,
|
|
|
|
"Object": "list",
|
|
|
|
"ContinuationToken": null
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/sends/<uuid>")]
|
|
|
|
fn get_send(uuid: String, headers: Headers, conn: DbConn) -> JsonResult {
|
|
|
|
let send = match Send::find_by_uuid(&uuid, &conn) {
|
|
|
|
Some(send) => send,
|
|
|
|
None => err!("Send not found"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if send.user_uuid.as_ref() != Some(&headers.user.uuid) {
|
|
|
|
err!("Send is not owned by user")
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(Json(send.to_json()))
|
|
|
|
}
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
#[post("/sends", data = "<data>")]
|
|
|
|
fn post_send(data: JsonUpcase<SendData>, headers: Headers, conn: DbConn, nt: Notify) -> JsonResult {
|
2021-03-16 10:07:45 +01:00
|
|
|
enforce_disable_send_policy(&headers, &conn)?;
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
let data: SendData = data.into_inner().data;
|
2021-05-12 09:54:28 +02:00
|
|
|
enforce_disable_hide_email_policy(&data, &headers, &conn)?;
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
if data.Type == SendType::File as i32 {
|
|
|
|
err!("File sends should use /api/sends/file")
|
|
|
|
}
|
|
|
|
|
2021-08-04 13:25:41 +02:00
|
|
|
let mut send = create_send(data, headers.user.uuid)?;
|
2021-03-14 23:35:55 +01:00
|
|
|
send.save(&conn)?;
|
2021-08-03 17:33:59 +02:00
|
|
|
nt.send_send_update(UpdateType::SyncSendCreate, &send, &send.update_users_revision(&conn));
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
Ok(Json(send.to_json()))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/sends/file", format = "multipart/form-data", data = "<data>")]
|
|
|
|
fn post_send_file(data: Data, content_type: &ContentType, headers: Headers, conn: DbConn, nt: Notify) -> JsonResult {
|
2021-03-16 10:07:45 +01:00
|
|
|
enforce_disable_send_policy(&headers, &conn)?;
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
let boundary = content_type.params().next().expect("No boundary provided").1;
|
|
|
|
|
|
|
|
let mut mpart = Multipart::with_body(data.open(), boundary);
|
|
|
|
|
|
|
|
// First entry is the SendData JSON
|
|
|
|
let mut model_entry = match mpart.read_entry()? {
|
|
|
|
Some(e) if &*e.headers.name == "model" => e,
|
|
|
|
Some(_) => err!("Invalid entry name"),
|
|
|
|
None => err!("No model entry present"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut buf = String::new();
|
|
|
|
model_entry.data.read_to_string(&mut buf)?;
|
|
|
|
let data = serde_json::from_str::<crate::util::UpCase<SendData>>(&buf)?;
|
2021-05-12 09:54:28 +02:00
|
|
|
enforce_disable_hide_email_policy(&data.data, &headers, &conn)?;
|
2021-03-14 23:35:55 +01:00
|
|
|
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 23:02:56 +02:00
|
|
|
// Get the file length and add an extra 5% to avoid issues
|
|
|
|
const SIZE_525_MB: u64 = 550_502_400;
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
let size_limit = match CONFIG.user_attachment_limit() {
|
|
|
|
Some(0) => err!("File uploads are disabled"),
|
|
|
|
Some(limit_kb) => {
|
|
|
|
let left = (limit_kb * 1024) - Attachment::size_by_user(&headers.user.uuid, &conn);
|
|
|
|
if left <= 0 {
|
2021-07-13 15:17:03 +02:00
|
|
|
err!("Attachment storage limit reached! Delete some attachments to free up space")
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 23:02:56 +02:00
|
|
|
std::cmp::Ord::max(left as u64, SIZE_525_MB)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
Added web-vault v2.21.x support + some misc fixes
- The new web-vault v2.21.0+ has support for Master Password Reset. For
this to work it generates a public/private key-pair which needs to be
stored in the database. Currently the Master Password Reset is not
fixed, but there are endpoints which are needed even if we do not
support this feature (yet). This PR fixes those endpoints, and stores
the keys already in the database.
- There was an issue when you want to do a key-rotate when you change
your password, it also called an Emergency Access endpoint, which we do
not yet support. Because this endpoint failed to reply correctly
produced some errors, and also prevent the user from being forced to
logout. This resolves #1826 by adding at least that endpoint.
Because of that extra endpoint check to Emergency Access is done using
an old user stamp, i also modified the stamp exception to allow multiple
rocket routes to be called, and added an expiration timestamp to it.
During these tests i stumbled upon an issue that after my key-change was
done, it triggered the websockets to try and reload my ciphers, because
they were updated. This shouldn't happen when rotating they keys, since
all access should be invalided. Now there will be no websocket
notification for this, which also prevents error toasts.
- Increased Send Size limit to 500MB (with a litle overhead)
As a side note, i tested these changes on both v2.20.4 and v2.21.1 web-vault versions, all keeps working.
2021-07-04 23:02:56 +02:00
|
|
|
None => SIZE_525_MB,
|
2021-03-14 23:35:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
// Create the Send
|
2021-08-04 13:25:41 +02:00
|
|
|
let mut send = create_send(data.data, headers.user.uuid)?;
|
2021-05-26 08:15:24 +02:00
|
|
|
let file_id = crate::crypto::generate_send_id();
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
if send.atype != SendType::File as i32 {
|
|
|
|
err!("Send content is not a file");
|
|
|
|
}
|
|
|
|
|
|
|
|
let file_path = Path::new(&CONFIG.sends_folder()).join(&send.uuid).join(&file_id);
|
|
|
|
|
|
|
|
// Read the data entry and save the file
|
|
|
|
let mut data_entry = match mpart.read_entry()? {
|
|
|
|
Some(e) if &*e.headers.name == "data" => e,
|
|
|
|
Some(_) => err!("Invalid entry name"),
|
|
|
|
None => err!("No model entry present"),
|
|
|
|
};
|
|
|
|
|
2021-04-06 22:54:42 +02:00
|
|
|
let size = match data_entry.data.save().memory_threshold(0).size_limit(size_limit).with_path(&file_path) {
|
2021-03-14 23:35:55 +01:00
|
|
|
SaveResult::Full(SavedData::File(_, size)) => size as i32,
|
|
|
|
SaveResult::Full(other) => {
|
|
|
|
std::fs::remove_file(&file_path).ok();
|
|
|
|
err!(format!("Attachment is not a file: {:?}", other));
|
|
|
|
}
|
|
|
|
SaveResult::Partial(_, reason) => {
|
|
|
|
std::fs::remove_file(&file_path).ok();
|
2021-07-13 15:17:03 +02:00
|
|
|
err!(format!("Attachment storage limit exceeded with this file: {:?}", reason));
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
SaveResult::Error(e) => {
|
|
|
|
std::fs::remove_file(&file_path).ok();
|
|
|
|
err!(format!("Error: {:?}", e));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// Set ID and sizes
|
|
|
|
let mut data_value: Value = serde_json::from_str(&send.data)?;
|
|
|
|
if let Some(o) = data_value.as_object_mut() {
|
|
|
|
o.insert(String::from("Id"), Value::String(file_id));
|
|
|
|
o.insert(String::from("Size"), Value::Number(size.into()));
|
2021-04-06 22:54:42 +02:00
|
|
|
o.insert(String::from("SizeName"), Value::String(crate::util::get_display_size(size)));
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
send.data = serde_json::to_string(&data_value)?;
|
|
|
|
|
|
|
|
// Save the changes in the database
|
|
|
|
send.save(&conn)?;
|
2021-08-03 17:33:59 +02:00
|
|
|
nt.send_send_update(UpdateType::SyncSendUpdate, &send, &send.update_users_revision(&conn));
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
Ok(Json(send.to_json()))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
pub struct SendAccessData {
|
|
|
|
pub Password: Option<String>,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/sends/access/<access_id>", data = "<data>")]
|
|
|
|
fn post_access(access_id: String, data: JsonUpcase<SendAccessData>, conn: DbConn) -> JsonResult {
|
|
|
|
let mut send = match Send::find_by_access_id(&access_id, &conn) {
|
|
|
|
Some(s) => s,
|
2021-03-25 12:40:32 +01:00
|
|
|
None => err_code!(SEND_INACCESSIBLE_MSG, 404),
|
2021-03-14 23:35:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
if let Some(max_access_count) = send.max_access_count {
|
2021-03-15 07:20:49 +01:00
|
|
|
if send.access_count >= max_access_count {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404);
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(expiration) = send.expiration_date {
|
2021-03-15 07:20:49 +01:00
|
|
|
if Utc::now().naive_utc() >= expiration {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-15 07:20:49 +01:00
|
|
|
if Utc::now().naive_utc() >= send.deletion_date {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if send.disabled {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if send.password_hash.is_some() {
|
|
|
|
match data.into_inner().data.Password {
|
|
|
|
Some(ref p) if send.check_password(p) => { /* Nothing to do here */ }
|
|
|
|
Some(_) => err!("Invalid password."),
|
|
|
|
None => err_code!("Password not provided", 401),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Files are incremented during the download
|
|
|
|
if send.atype == SendType::Text as i32 {
|
|
|
|
send.access_count += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
send.save(&conn)?;
|
|
|
|
|
2021-05-12 07:51:12 +02:00
|
|
|
Ok(Json(send.to_json_access(&conn)))
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/sends/<send_id>/access/file/<file_id>", data = "<data>")]
|
|
|
|
fn post_access_file(
|
|
|
|
send_id: String,
|
|
|
|
file_id: String,
|
|
|
|
data: JsonUpcase<SendAccessData>,
|
|
|
|
host: Host,
|
|
|
|
conn: DbConn,
|
|
|
|
) -> JsonResult {
|
|
|
|
let mut send = match Send::find_by_uuid(&send_id, &conn) {
|
|
|
|
Some(s) => s,
|
2021-03-25 12:40:32 +01:00
|
|
|
None => err_code!(SEND_INACCESSIBLE_MSG, 404),
|
2021-03-14 23:35:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
if let Some(max_access_count) = send.max_access_count {
|
2021-03-15 07:20:49 +01:00
|
|
|
if send.access_count >= max_access_count {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(expiration) = send.expiration_date {
|
2021-03-15 07:20:49 +01:00
|
|
|
if Utc::now().naive_utc() >= expiration {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-15 07:20:49 +01:00
|
|
|
if Utc::now().naive_utc() >= send.deletion_date {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if send.disabled {
|
2021-03-25 12:40:32 +01:00
|
|
|
err_code!(SEND_INACCESSIBLE_MSG, 404)
|
2021-03-14 23:35:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if send.password_hash.is_some() {
|
|
|
|
match data.into_inner().data.Password {
|
|
|
|
Some(ref p) if send.check_password(p) => { /* Nothing to do here */ }
|
|
|
|
Some(_) => err!("Invalid password."),
|
|
|
|
None => err_code!("Password not provided", 401),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
send.access_count += 1;
|
|
|
|
|
|
|
|
send.save(&conn)?;
|
|
|
|
|
2021-06-25 20:33:51 +02:00
|
|
|
let token_claims = crate::auth::generate_send_claims(&send_id, &file_id);
|
|
|
|
let token = crate::auth::encode_jwt(&token_claims);
|
2021-03-14 23:35:55 +01:00
|
|
|
Ok(Json(json!({
|
|
|
|
"Object": "send-fileDownload",
|
|
|
|
"Id": file_id,
|
2021-06-25 20:33:51 +02:00
|
|
|
"Url": format!("{}/api/sends/{}/{}?t={}", &host.host, send_id, file_id, token)
|
2021-03-14 23:35:55 +01:00
|
|
|
})))
|
|
|
|
}
|
|
|
|
|
2021-06-25 20:33:51 +02:00
|
|
|
#[get("/sends/<send_id>/<file_id>?<t>")]
|
2021-07-15 19:15:55 +02:00
|
|
|
fn download_send(send_id: SafeString, file_id: SafeString, t: String) -> Option<NamedFile> {
|
2021-06-25 20:33:51 +02:00
|
|
|
if let Ok(claims) = crate::auth::decode_send(&t) {
|
|
|
|
if claims.sub == format!("{}/{}", send_id, file_id) {
|
|
|
|
return NamedFile::open(Path::new(&CONFIG.sends_folder()).join(send_id).join(file_id)).ok();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
#[put("/sends/<id>", data = "<data>")]
|
|
|
|
fn put_send(id: String, data: JsonUpcase<SendData>, headers: Headers, conn: DbConn, nt: Notify) -> JsonResult {
|
2021-03-16 10:07:45 +01:00
|
|
|
enforce_disable_send_policy(&headers, &conn)?;
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
let data: SendData = data.into_inner().data;
|
2021-05-12 09:54:28 +02:00
|
|
|
enforce_disable_hide_email_policy(&data, &headers, &conn)?;
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
let mut send = match Send::find_by_uuid(&id, &conn) {
|
|
|
|
Some(s) => s,
|
|
|
|
None => err!("Send not found"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if send.user_uuid.as_ref() != Some(&headers.user.uuid) {
|
|
|
|
err!("Send is not owned by user")
|
|
|
|
}
|
|
|
|
|
|
|
|
if send.atype != data.Type {
|
|
|
|
err!("Sends can't change type")
|
|
|
|
}
|
|
|
|
|
2021-03-17 19:39:48 +01:00
|
|
|
// When updating a file Send, we receive nulls in the File field, as it's immutable,
|
|
|
|
// so we only need to update the data field in the Text case
|
|
|
|
if data.Type == SendType::Text as i32 {
|
|
|
|
let data_str = if let Some(mut d) = data.Text {
|
|
|
|
d.as_object_mut().and_then(|d| d.remove("Response"));
|
|
|
|
serde_json::to_string(&d)?
|
|
|
|
} else {
|
|
|
|
err!("Send data not provided");
|
|
|
|
};
|
|
|
|
send.data = data_str;
|
|
|
|
}
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
if data.DeletionDate > Utc::now() + Duration::days(31) {
|
|
|
|
err!(
|
|
|
|
"You cannot have a Send with a deletion date that far into the future. Adjust the Deletion Date to a value less than 31 days from now and try again."
|
|
|
|
);
|
|
|
|
}
|
|
|
|
send.name = data.Name;
|
2021-03-15 16:42:20 +01:00
|
|
|
send.akey = data.Key;
|
2021-03-14 23:35:55 +01:00
|
|
|
send.deletion_date = data.DeletionDate.naive_utc();
|
|
|
|
send.notes = data.Notes;
|
2021-12-31 15:59:58 +01:00
|
|
|
send.max_access_count = match data.MaxAccessCount {
|
|
|
|
Some(m) => Some(m.into_i32()?),
|
|
|
|
_ => None,
|
|
|
|
};
|
2021-03-14 23:35:55 +01:00
|
|
|
send.expiration_date = data.ExpirationDate.map(|d| d.naive_utc());
|
2021-05-12 07:51:12 +02:00
|
|
|
send.hide_email = data.HideEmail;
|
2021-03-14 23:35:55 +01:00
|
|
|
send.disabled = data.Disabled;
|
|
|
|
|
|
|
|
// Only change the value if it's present
|
|
|
|
if let Some(password) = data.Password {
|
|
|
|
send.set_password(Some(&password));
|
|
|
|
}
|
|
|
|
|
|
|
|
send.save(&conn)?;
|
2021-08-03 17:33:59 +02:00
|
|
|
nt.send_send_update(UpdateType::SyncSendUpdate, &send, &send.update_users_revision(&conn));
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
Ok(Json(send.to_json()))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[delete("/sends/<id>")]
|
|
|
|
fn delete_send(id: String, headers: Headers, conn: DbConn, nt: Notify) -> EmptyResult {
|
|
|
|
let send = match Send::find_by_uuid(&id, &conn) {
|
|
|
|
Some(s) => s,
|
|
|
|
None => err!("Send not found"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if send.user_uuid.as_ref() != Some(&headers.user.uuid) {
|
|
|
|
err!("Send is not owned by user")
|
|
|
|
}
|
|
|
|
|
|
|
|
send.delete(&conn)?;
|
2021-08-03 17:33:59 +02:00
|
|
|
nt.send_send_update(UpdateType::SyncSendDelete, &send, &send.update_users_revision(&conn));
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[put("/sends/<id>/remove-password")]
|
|
|
|
fn put_remove_password(id: String, headers: Headers, conn: DbConn, nt: Notify) -> JsonResult {
|
2021-03-16 10:07:45 +01:00
|
|
|
enforce_disable_send_policy(&headers, &conn)?;
|
|
|
|
|
2021-03-14 23:35:55 +01:00
|
|
|
let mut send = match Send::find_by_uuid(&id, &conn) {
|
|
|
|
Some(s) => s,
|
|
|
|
None => err!("Send not found"),
|
|
|
|
};
|
|
|
|
|
|
|
|
if send.user_uuid.as_ref() != Some(&headers.user.uuid) {
|
|
|
|
err!("Send is not owned by user")
|
|
|
|
}
|
|
|
|
|
|
|
|
send.set_password(None);
|
|
|
|
send.save(&conn)?;
|
2021-08-03 17:33:59 +02:00
|
|
|
nt.send_send_update(UpdateType::SyncSendUpdate, &send, &send.update_users_revision(&conn));
|
2021-03-14 23:35:55 +01:00
|
|
|
|
|
|
|
Ok(Json(send.to_json()))
|
|
|
|
}
|