UNPKG

smc-hub

Version:

CoCalc: Backend webserver component

179 lines 9.73 kB
"use strict"; /* * This file is part of CoCalc: Copyright © 2020 Sagemath, Inc. * License: AGPLv3 s.t. "Commons Clause" – see LICENSE.md for details */ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; var __generator = (this && this.__generator) || function (thisArg, body) { var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g; function verb(n) { return function (v) { return step([n, v]); }; } function step(op) { if (f) throw new TypeError("Generator is already executing."); while (_) try { if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t; if (y = 0, t) op = [op[0] & 2, t.value]; switch (op[0]) { case 0: case 1: t = op; break; case 4: _.label++; return { value: op[1], done: false }; case 5: _.label++; y = op[1]; op = [0]; continue; case 7: op = _.ops.pop(); _.trys.pop(); continue; default: if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; } if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; } if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; } if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; } if (t[2]) _.ops.pop(); _.trys.pop(); continue; } op = body.call(thisArg, _); } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; } if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true }; } }; Object.defineProperty(exports, "__esModule", { value: true }); exports.handle_path_request = void 0; var misc_1 = require("smc-util/misc"); var file_contents_1 = require("smc-webapp/share/file-contents"); var render_public_path_1 = require("./render-public-path"); var render_static_path_1 = require("./render-static-path"); var react_viewer_1 = require("./react-viewer"); function handle_path_request(opts) { return __awaiter(this, void 0, void 0, function () { var public_paths, author_info, settings_dao, req, res, path_to_files, viewer, info, project_id, id, path, token, public_path, description, dir, ext, _a, filename, authors, settings, views; return __generator(this, function (_b) { switch (_b.label) { case 0: public_paths = opts.public_paths, author_info = opts.author_info, settings_dao = opts.settings_dao, req = opts.req, res = opts.res, path_to_files = opts.path_to_files; viewer = opts.viewer; if (misc_1.is_valid_uuid_string(req.params.id)) { // explicit project_id specified instead of sha1 hash id of share. info = undefined; project_id = req.params.id; } else { id = req.params.id; if (id == null || public_paths == null) { res.sendStatus(404); return [2 /*return*/]; } info = public_paths.get(id); if (info == null || info.get("auth")) { // TODO: For now, /share server does NOT make vhost visible at all if there is any auth info.. res.sendStatus(404); return [2 /*return*/]; } project_id = info.get("project_id"); } path = req.params[0]; if (path == null) { res.sendStatus(404); return [2 /*return*/]; } // Check that the requested path is definitely contained // in a current valid non-disabled public path. This is important so: // (a) if access is via public_path id and that path just got // revoked, but share server hasn't caught up and removed target, // then we want request to still be denied. // (b) when accessing by project_id, the only restriction would be // by what happens to be in the path to files. So share server not having // updated yet is a problem, but ALSO, in some cases (dev server, docker personal) // that path is just to the live files in the project, so very dangerous. if (viewer == null) { // if it is not explicitly specified, take if from query param. viewer = req.query.viewer; } token = req.query.token; if (viewer != null && viewer != "share" && viewer != "embed" && viewer != "raw" && viewer != "download") { viewer = "share"; } if (public_paths == null) { res.sendStatus(404); return [2 /*return*/]; } public_path = public_paths.public_path(project_id, path); if (public_path == null || !public_paths.is_access_allowed(project_id, public_path, token)) { res.sendStatus(404); return [2 /*return*/]; } if (info == null) { info = public_paths.get_info(project_id, public_path); if (info == null) { res.sendStatus(404); return [2 /*return*/]; } } description = info.get("description"); dir = path_to_files(project_id); if (viewer == null) { ext = misc_1.filename_extension(path); if (!file_contents_1.default_to_raw(ext) && file_contents_1.has_special_viewer(ext)) { viewer = "share"; } else { viewer = "raw"; } } _a = viewer; switch (_a) { case "raw": return [3 /*break*/, 1]; case "download": return [3 /*break*/, 2]; } return [3 /*break*/, 3]; case 1: render_static_path_1.render_static_path({ req: req, res: res, dir: dir, path: path, }); return [3 /*break*/, 6]; case 2: filename = misc_1.path_split(path).tail; res.download(dir + "/" + path, filename); return [3 /*break*/, 6]; case 3: return [4 /*yield*/, author_info.get_authors(project_id, path)]; case 4: authors = _b.sent(); return [4 /*yield*/, settings_dao.get()]; case 5: settings = _b.sent(); public_paths.increment_view_counter(project_id, public_path); views = undefined; if (path == public_path || path == public_path + "/") { views = public_paths.get_views(project_id, public_path); } render_public_path_1.render_public_path({ req: req, res: res, info: info, dir: dir, path: path, react: react_viewer_1.react_viewer("/" + req.params.id + "/" + path, project_id, false, viewer, public_paths.is_public, settings, description, "/" + info.get("id") + "/" + path), viewer: viewer, hidden: req.query.hidden, sort: req.query.sort != null ? req.query.sort : "name", authors: authors, views: views, }); _b.label = 6; case 6: return [2 /*return*/]; } }); }); } exports.handle_path_request = handle_path_request; //# sourceMappingURL=handle-path-request.js.map