From 9a8b51c6c2468162ee9748514141a94d24e5f663 Mon Sep 17 00:00:00 2001 From: Tom Clegg Date: Fri, 6 Apr 2018 16:08:35 -0400 Subject: [PATCH] 13111: Redirect /dir to /dir/ at siteFS paths. Arvados-DCO-1.1-Signed-off-by: Tom Clegg --- services/keep-web/handler.go | 20 ++++++++----- services/keep-web/handler_test.go | 50 +++++++++++++++++++++++-------- 2 files changed, 50 insertions(+), 20 deletions(-) diff --git a/services/keep-web/handler.go b/services/keep-web/handler.go index 446eeb4a0e..5e14cb4008 100644 --- a/services/keep-web/handler.go +++ b/services/keep-web/handler.go @@ -329,7 +329,7 @@ func (h *handler) ServeHTTP(wOrig http.ResponseWriter, r *http.Request) { } if useSiteFS { - h.serveSiteFS(w, r, tokens) + h.serveSiteFS(w, r, tokens, credentialsOK) return } @@ -499,7 +499,7 @@ func (h *handler) ServeHTTP(wOrig http.ResponseWriter, r *http.Request) { } } -func (h *handler) serveSiteFS(w http.ResponseWriter, r *http.Request, tokens []string) { +func (h *handler) serveSiteFS(w http.ResponseWriter, r *http.Request, tokens []string, credentialsOK bool) { if len(tokens) == 0 { w.Header().Add("WWW-Authenticate", "Basic realm=\"collections\"") http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized) @@ -528,18 +528,22 @@ func (h *handler) serveSiteFS(w http.ResponseWriter, r *http.Request, tokens []s Insecure: arv.ApiInsecure, } fs := client.SiteFileSystem(kc) - if f, err := fs.Open(r.URL.Path); os.IsNotExist(err) { + f, err := fs.Open(r.URL.Path) + if os.IsNotExist(err) { http.Error(w, err.Error(), http.StatusNotFound) return } else if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return - } else if fi, err := f.Stat(); err == nil && fi.IsDir() && r.Method == "GET" { - - h.serveDirectory(w, r, fi.Name(), fs, r.URL.Path, false) + } + defer f.Close() + if fi, err := f.Stat(); err == nil && fi.IsDir() && r.Method == "GET" { + if !strings.HasSuffix(r.URL.Path, "/") { + h.seeOtherWithCookie(w, r, r.URL.Path+"/", credentialsOK) + } else { + h.serveDirectory(w, r, fi.Name(), fs, r.URL.Path, false) + } return - } else { - f.Close() } wh := webdav.Handler{ Prefix: "/", diff --git a/services/keep-web/handler_test.go b/services/keep-web/handler_test.go index 7fed6fbd62..15f32f1be4 100644 --- a/services/keep-web/handler_test.go +++ b/services/keep-web/handler_test.go @@ -493,10 +493,11 @@ func (s *IntegrationSuite) TestDirectoryListing(c *check.C) { "Authorization": {"OAuth2 " + arvadostest.ActiveToken}, } for _, trial := range []struct { - uri string - header http.Header - expect []string - cutDirs int + uri string + header http.Header + expect []string + redirect string + cutDirs int }{ { uri: strings.Replace(arvadostest.FooAndBarFilesInDirPDH, "+", "-", -1) + ".example.com/", @@ -528,12 +529,32 @@ func (s *IntegrationSuite) TestDirectoryListing(c *check.C) { expect: []string{"bar"}, cutDirs: 4, }, + { + uri: "download.example.com/", + header: authHeader, + expect: []string{"users/"}, + cutDirs: 0, + }, + { + uri: "download.example.com/users", + header: authHeader, + redirect: "/users/", + expect: []string{"active/"}, + cutDirs: 1, + }, { uri: "download.example.com/users/", header: authHeader, expect: []string{"active/"}, cutDirs: 1, }, + { + uri: "download.example.com/users/active", + header: authHeader, + redirect: "/users/active/", + expect: []string{"foo_file_in_dir/"}, + cutDirs: 2, + }, { uri: "download.example.com/users/active/", header: authHeader, @@ -565,10 +586,11 @@ func (s *IntegrationSuite) TestDirectoryListing(c *check.C) { cutDirs: 1, }, { - uri: "download.example.com/c=" + arvadostest.FooAndBarFilesInDirUUID + "/dir1/", - header: authHeader, - expect: []string{"foo", "bar"}, - cutDirs: 2, + uri: "download.example.com/c=" + arvadostest.FooAndBarFilesInDirUUID + "/dir1", + header: authHeader, + redirect: "/c=" + arvadostest.FooAndBarFilesInDirUUID + "/dir1/", + expect: []string{"foo", "bar"}, + cutDirs: 2, }, { uri: "download.example.com/c=" + arvadostest.FooAndBarFilesInDirUUID + "/_/dir1/", @@ -577,10 +599,11 @@ func (s *IntegrationSuite) TestDirectoryListing(c *check.C) { cutDirs: 3, }, { - uri: arvadostest.FooAndBarFilesInDirUUID + ".example.com/dir1?api_token=" + arvadostest.ActiveToken, - header: authHeader, - expect: []string{"foo", "bar"}, - cutDirs: 1, + uri: arvadostest.FooAndBarFilesInDirUUID + ".example.com/dir1?api_token=" + arvadostest.ActiveToken, + header: authHeader, + redirect: "/dir1/", + expect: []string{"foo", "bar"}, + cutDirs: 1, }, { uri: "collections.example.com/c=" + arvadostest.FooAndBarFilesInDirUUID + "/theperthcountyconspiracydoesnotexist/", @@ -616,6 +639,9 @@ func (s *IntegrationSuite) TestDirectoryListing(c *check.C) { resp = httptest.NewRecorder() s.testServer.Handler.ServeHTTP(resp, req) } + if trial.redirect != "" { + c.Check(req.URL.Path, check.Equals, trial.redirect) + } if trial.expect == nil { c.Check(resp.Code, check.Equals, http.StatusNotFound) } else { -- 2.30.2