-
Notifications
You must be signed in to change notification settings - Fork 13
/
Copy pathapp.py
412 lines (358 loc) · 16.5 KB
/
app.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
import os
import logging
from flask import Flask, render_template, request, jsonify, send_file, Response, abort, redirect, url_for, session, g, make_response
from werkzeug.utils import secure_filename
from storage_providers import get_storage_provider
import mimetypes
import boto3
from botocore.exceptions import ClientError
from functools import wraps
import secrets
import json
from flask_wtf.csrf import CSRFProtect, generate_csrf
import re
logging.basicConfig(
level=logging.DEBUG,
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
app = Flask(__name__)
app.config['MAX_CONTENT_LENGTH'] = 1024 * 1024 * 1024 * 1024 # 1 TB
app.secret_key = os.environ.get('FLASK_SECRET_KEY', secrets.token_hex(32))
app.config['WTF_CSRF_TIME_LIMIT'] = None # No time limit for CSRF tokens
app.config['WTF_CSRF_SSL_STRICT'] = False # Disable SSL-only for CSRF cookies
app.config['WTF_CSRF_ENABLED'] = True
app.config['WTF_CSRF_METHODS'] = ['POST', 'PUT', 'PATCH', 'DELETE']
app.config['WTF_CSRF_CHECK_DEFAULT'] = False # Disable default CSRF checking
# Initialize CSRF protection
csrf = CSRFProtect()
csrf.init_app(app)
@app.before_request
def before_request():
if not request.is_secure and not app.debug:
url = request.url.replace('http://', 'https://', 1)
code = 301
return redirect(url, code=code)
@app.after_request
def after_request(response):
# Ensure CSRF token is set in cookie and header
if not request.path.startswith('/static/'):
csrf_token = generate_csrf()
response.set_cookie('csrf_token', csrf_token, samesite='Strict')
response.headers['X-CSRF-Token'] = csrf_token
return response
@app.route('/get-csrf-token')
def get_csrf_token():
token = generate_csrf()
response = make_response(jsonify({'csrf_token': token}))
response.set_cookie('csrf_token', token, samesite='Strict')
return response
# Set up logging
logger = logging.getLogger(__name__)
CHUNK_SIZE = 100 * 1024 * 1024 # 100 MB chunks
# Update MIME type detection
mimetypes.init()
mimetypes.add_type('image/webp', '.webp')
mimetypes.add_type('image/heic', '.heic')
mimetypes.add_type('image/heif', '.heif')
def login_required(f):
@wraps(f)
def decorated_function(*args, **kwargs):
if 'authenticated' not in session:
return redirect(url_for('configure_storage'))
return f(*args, **kwargs)
return decorated_function
def get_current_provider():
"""Get the current storage provider based on session configuration"""
if 'provider_type' not in session:
return None
try:
return get_storage_provider(
session['provider_type'],
**session['provider_config']
)
except Exception as e:
logger.error(f"Error creating storage provider: {str(e)}")
return None
@app.route('/')
@login_required
def index():
provider = get_current_provider()
if not provider:
return redirect(url_for('configure_storage'))
return render_template('index.html')
@csrf.exempt
@app.route('/configure', methods=['GET', 'POST'])
def configure_storage():
if request.method == 'POST':
# Verify CSRF token manually
token = request.form.get('csrf_token')
if not token or token != request.cookies.get('csrf_token'):
logger.error(f"CSRF token mismatch. Form token: {token}, Cookie token: {request.cookies.get('csrf_token')}")
return jsonify({'error': 'Invalid CSRF token'}), 400
provider_type = request.form.get('provider_type')
logger.debug(f"Received configuration request for provider: {provider_type}")
logger.debug(f"Form data: {request.form}")
try:
if provider_type == 'cloudflare':
account_id = request.form.get('account_id', '').strip()
access_key = request.form.get('access_key', '').strip()
secret_key = request.form.get('secret_key', '').strip()
bucket = request.form.get('bucket', '').strip()
logger.debug(f"Cloudflare configuration - Account ID: {account_id}, Bucket: {bucket}")
if not account_id:
return jsonify({'error': 'Account ID is required'}), 400
if not access_key:
return jsonify({'error': 'Access Key ID is required'}), 400
if not secret_key:
return jsonify({'error': 'Secret Access Key is required'}), 400
if not bucket:
return jsonify({'error': 'Bucket name is required'}), 400
if not re.match(r'^[a-zA-Z0-9.\-_]{3,63}$', bucket):
return jsonify({'error': 'Invalid bucket name format'}), 400
credentials = {
'account_id': account_id,
'access_key': access_key,
'secret_key': secret_key,
'bucket': bucket
}
elif provider_type in ['aws', 'wasabi']:
credentials = {
'access_key': request.form.get('access_key'),
'secret_key': request.form.get('secret_key'),
'bucket': request.form.get('bucket'),
'region': request.form.get('region', 'us-east-1')
}
elif provider_type == 'backblaze':
key_id = request.form.get('key_id', '').strip()
application_key = request.form.get('application_key', '').strip()
bucket_name = request.form.get('bucket_name', '').strip()
if not key_id:
return jsonify({'error': 'Application Key ID is required'}), 400
if not application_key:
return jsonify({'error': 'Application Key is required'}), 400
if not bucket_name:
return jsonify({'error': 'Bucket name is required'}), 400
if not re.match(r'^[a-z0-9-]{6,50}$', bucket_name):
return jsonify({'error': 'Invalid bucket name format for Backblaze B2'}), 400
credentials = {
'application_key_id': key_id,
'application_key': application_key,
'bucket_name': bucket_name
}
elif provider_type == 'wasabi':
access_key = request.form.get('access_key', '').strip()
secret_key = request.form.get('secret_key', '').strip()
bucket = request.form.get('bucket', '').strip()
region = request.form.get('region', '').strip()
if not access_key:
return jsonify({'error': 'Access Key is required'}), 400
if not secret_key:
return jsonify({'error': 'Secret Key is required'}), 400
if not bucket:
return jsonify({'error': 'Bucket name is required'}), 400
if not region:
return jsonify({'error': 'Region is required'}), 400
if not re.match(r'^[a-z0-9][a-z0-9.-]{1,61}[a-z0-9]$', bucket):
return jsonify({'error': 'Invalid bucket name format for Wasabi'}), 400
credentials = {
'access_key': access_key,
'secret_key': secret_key,
'bucket': bucket,
'region': region
}
elif provider_type == 'gcs':
credentials_json = request.form.get('credentials_json', '').strip()
if not credentials_json:
return jsonify({'error': 'Service account JSON is required'}), 400
try:
# Validate JSON format
json.loads(credentials_json)
project_id = request.form.get('project_id', '').strip()
bucket_name = request.form.get('bucket_name', '').strip()
if not project_id:
return jsonify({'error': 'Project ID is required'}), 400
if not bucket_name:
return jsonify({'error': 'Bucket name is required'}), 400
credentials = {
'project_id': project_id,
'bucket_name': bucket_name,
'credentials_json': credentials_json
}
except json.JSONDecodeError as e:
return jsonify({'error': f'Invalid service account JSON format: {str(e)}'}), 400
elif provider_type == 'digitalocean':
access_key = request.form.get('access_key', '').strip()
secret_key = request.form.get('secret_key', '').strip()
bucket = request.form.get('bucket', '').strip()
region = request.form.get('region', '').strip()
if not access_key:
return jsonify({'error': 'Access Key is required'}), 400
if not secret_key:
return jsonify({'error': 'Secret Key is required'}), 400
if not bucket:
return jsonify({'error': 'Bucket name is required'}), 400
if not region:
return jsonify({'error': 'Region is required'}), 400
if not re.match(r'^[a-z0-9][a-z0-9.-]{2,62}[a-z0-9]$', bucket):
return jsonify({'error': 'Invalid bucket name format for DigitalOcean Spaces'}), 400
if region not in ['nyc3', 'ams3', 'sgp1', 'fra1', 'sfo3']:
return jsonify({'error': 'Invalid region for DigitalOcean Spaces'}), 400
credentials = {
'access_key': access_key,
'secret_key': secret_key,
'bucket': bucket,
'region': region
}
elif provider_type == 'hetzner':
access_key = request.form.get('access_key', '').strip()
secret_key = request.form.get('secret_key', '').strip()
bucket = request.form.get('bucket', '').strip()
region = request.form.get('region', '').strip()
if not access_key:
return jsonify({'error': 'Access Key is required'}), 400
if not secret_key:
return jsonify({'error': 'Secret Key is required'}), 400
if not bucket:
return jsonify({'error': 'Bucket name is required'}), 400
if not region:
return jsonify({'error': 'Region is required'}), 400
if not re.match(r'^[a-z0-9][a-z0-9.-]{2,62}[a-z0-9]$', bucket):
return jsonify({'error': 'Invalid bucket name format for Hetzner Storage'}), 400
if region not in ['nbg1', 'fsn1', 'hel1', 'ash', 'hil', 'sin']:
return jsonify({'error': 'Invalid region for Hetzner Storage'}), 400
credentials = {
'access_key': access_key,
'secret_key': secret_key,
'bucket': bucket,
'region': region
}
else:
return jsonify({'error': 'Invalid storage provider selected'}), 400
# Validate credentials by creating a provider instance
logger.debug(f"Attempting to create provider instance for {provider_type}")
provider = get_storage_provider(provider_type, **credentials)
# Test provider by listing files
logger.debug("Testing provider connection by listing files")
provider.list_files()
# Store configuration in session
session['authenticated'] = True
session['provider_type'] = provider_type
session['provider_config'] = credentials
# Set bucket name based on provider type
if provider_type == 'gcs':
session['bucket'] = credentials.get('bucket_name')
else:
session['bucket'] = credentials.get('bucket')
logger.info(f"Successfully configured {provider_type} provider with bucket: {session['bucket']}")
return jsonify({'message': 'Configuration updated successfully'}), 200
except Exception as e:
logger.error(f"Error configuring storage: {str(e)}", exc_info=True)
return jsonify({'error': str(e)}), 400
return render_template('configure.html')
@app.route('/upload', methods=['POST'])
@login_required
def upload():
if 'file' not in request.files:
return jsonify({'error': 'No file part'}), 400
file = request.files['file']
if file.filename == '':
return jsonify({'error': 'No selected file'}), 400
provider = get_current_provider()
if not provider:
return jsonify({'error': 'Storage not configured'}), 400
if file:
filename = secure_filename(file.filename)
folder = request.form.get('folder', '')
if folder:
filename = f"{folder.rstrip('/')}/{filename}"
try:
provider.upload_file(file, filename)
return jsonify({'message': 'File uploaded successfully'}), 200
except Exception as e:
logger.error(f"Error uploading file: {str(e)}")
return jsonify({'error': str(e)}), 500
@app.route('/download/<path:filename>')
@login_required
def download(filename):
provider = get_current_provider()
if not provider:
return jsonify({'error': 'Storage not configured'}), 400
try:
file_obj = provider.download_file(filename)
return send_file(
file_obj,
download_name=os.path.basename(filename),
as_attachment=True
)
except Exception as e:
logger.error(f"Error downloading file: {str(e)}")
return jsonify({'error': str(e)}), 500
@app.route('/list')
@login_required
def list_files():
provider = get_current_provider()
if not provider:
return jsonify({
'files': [],
'message': 'Storage not configured'
}), 200
try:
prefix = request.args.get('prefix', '')
files = provider.list_files(prefix)
file_data = []
for file in files:
try:
mime_type, _ = mimetypes.guess_type(file['name'])
preview_url = None
if mime_type and (mime_type.startswith('image/') or
mime_type == 'application/pdf' or
mime_type.startswith('video/')):
preview_url = provider.get_file_url(file['name'])
file_data.append({
'name': file['name'],
'size': file['size'],
'preview_url': preview_url,
'mime_type': mime_type,
'type': 'file'
})
except Exception as e:
logger.warning(f"Error processing file {file['name']}: {str(e)}")
continue
return jsonify({'files': file_data}), 200
except Exception as e:
logger.error(f"Error listing files: {str(e)}")
return jsonify({
'error': 'An unexpected error occurred',
'details': str(e)
}), 500
@app.route('/delete/<path:filename>', methods=['DELETE'])
@login_required
def delete(filename):
provider = get_current_provider()
if not provider:
return jsonify({'error': 'Storage not configured'}), 400
try:
provider.delete_file(filename)
return jsonify({'message': 'File deleted successfully'}), 200
except Exception as e:
logger.error(f"Error deleting file: {str(e)}")
return jsonify({'error': str(e)}), 500
@app.route('/logout')
def logout():
session.clear()
return redirect(url_for('configure_storage'))
@app.route('/share/<path:filename>')
@login_required
def share_file(filename):
provider = get_current_provider()
if not provider:
return jsonify({'error': 'Storage not configured'}), 400
try:
# Generate a URL that expires in 7 days (604800 seconds)
url = provider.get_file_url(filename, expires_in=604800)
return jsonify({'url': url}), 200
except Exception as e:
logger.error(f"Error generating share link: {str(e)}")
return jsonify({'error': str(e)}), 500
if __name__ == '__main__':
app.run(debug=True, port=5001)