2023-01-09 01:22:54 +01:00
|
|
|
#ifndef PAGE_H
|
|
|
|
#define PAGE_H
|
|
|
|
|
2023-10-10 23:43:47 +02:00
|
|
|
#include <libweb/http.h>
|
2023-07-11 13:11:50 +02:00
|
|
|
#include <stdbool.h>
|
2023-06-06 03:49:36 +02:00
|
|
|
#include <stddef.h>
|
2023-01-09 01:22:54 +01:00
|
|
|
|
Implement user quota
This feature allows admins to set a specific quota for each user, in
MiB. This feature is particularly useful for shared instances, where
unlimited user storage might be unfeasible or even dangerous for the
server.
Also, a nice HTML5 <progress> element has been added to the site that
shows how much of the quota has been consumed.
If no quota is set, slcl falls back to the default behaviour i.e.,
assume unlimited storage.
Limitations:
- While HTTP does specify a Content-Length, which determines the length
of the whole request, it does not specify how many files are involved
or their individual sizes.
- Because of this, if multiple files are uploaded simultaneously, the
whole request would be dropped if user quota is exceeded, even if not
all files exceeded it.
- Also, Content-Length adds the length of some HTTP boilerplate
(e.g.: boundaries), but slcl must rely on this before accepting the
whole request. In other words, this means some requests might be
rejected by slcl because of the extra bytes caused by such boilerplate.
- When the quota is exceeded, slcl must close the connection so that
the rest of the transfer is cancelled. Unfortunately, this means no
HTML can be sent back to the customer to inform about the situation.
2023-03-06 05:09:56 +01:00
|
|
|
struct page_quota
|
|
|
|
{
|
|
|
|
unsigned long long cur, max;
|
|
|
|
};
|
|
|
|
|
2023-04-23 05:19:27 +02:00
|
|
|
struct page_resource
|
|
|
|
{
|
|
|
|
struct http_response *r;
|
|
|
|
const char *dir, *root, *res;
|
|
|
|
const struct page_quota *q;
|
|
|
|
const struct http_arg *args;
|
|
|
|
size_t n_args;
|
|
|
|
};
|
|
|
|
|
2023-06-06 03:49:36 +02:00
|
|
|
struct page_search
|
|
|
|
{
|
|
|
|
struct page_search_result
|
|
|
|
{
|
|
|
|
char *name;
|
|
|
|
} *results;
|
|
|
|
|
|
|
|
const char *root;
|
|
|
|
size_t n;
|
2023-07-11 13:11:50 +02:00
|
|
|
bool limit_exceeded;
|
2023-06-06 03:49:36 +02:00
|
|
|
};
|
|
|
|
|
2023-07-08 00:54:59 +02:00
|
|
|
struct page_rm
|
|
|
|
{
|
|
|
|
const char *dir, **items;
|
|
|
|
size_t n;
|
|
|
|
};
|
|
|
|
|
2023-01-09 01:22:54 +01:00
|
|
|
int page_login(struct http_response *r);
|
2023-07-11 01:20:39 +02:00
|
|
|
int page_style(struct http_response *r, const char *path);
|
2023-01-09 01:22:54 +01:00
|
|
|
int page_failed_login(struct http_response *r);
|
|
|
|
int page_forbidden(struct http_response *r);
|
|
|
|
int page_bad_request(struct http_response *r);
|
2023-04-23 05:19:27 +02:00
|
|
|
int page_resource(const struct page_resource *r);
|
2023-10-03 00:09:37 +02:00
|
|
|
int page_head_resource(struct http_response *r, const char *res);
|
2023-03-09 01:29:48 +01:00
|
|
|
int page_public(struct http_response *r, const char *res);
|
|
|
|
int page_share(struct http_response *r, const char *path);
|
2023-03-20 03:32:00 +01:00
|
|
|
int page_quota_exceeded(struct http_response *r, unsigned long long len,
|
|
|
|
unsigned long long quota);
|
2023-06-06 03:49:36 +02:00
|
|
|
int page_search(struct http_response *r, const struct page_search *s);
|
2023-07-08 00:54:59 +02:00
|
|
|
int page_rm(struct http_response *r, const struct page_rm *rm);
|
2023-01-09 01:22:54 +01:00
|
|
|
|
|
|
|
#endif /* PAGE_H */
|