aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAntoni Sawicki <tenox@google.com>2022-05-25 02:38:30 -0700
committerAntoni Sawicki <tenox@google.com>2022-05-25 02:38:30 -0700
commitc5ee80cffaa6d1f309e21d84763615a8c34049cc (patch)
tree86e5d082d0d1424f1df7f7bc3846338ca0c7d7fe
parent31a4d39d896040f691a42a0032cb6234edd6fe31 (diff)
downloadwfm-c5ee80cffaa6d1f309e21d84763615a8c34049cc.tar.gz
wfmRequest is a pointer
-rw-r--r--TODO.md2
-rw-r--r--dialogs.go6
-rw-r--r--dir.go2
-rw-r--r--fileio.go20
4 files changed, 15 insertions, 15 deletions
diff --git a/TODO.md b/TODO.md
index d0f2b2e..651fcd9 100644
--- a/TODO.md
+++ b/TODO.md
@@ -32,7 +32,7 @@ https://github.com/crazcalm/go/commit/8b0b644cd02c59fe2461908304c44d64e8be431e
* deniedPfx should be fired in handlers not in fileio???
this may be superseded by docker virtual path
* file search function
-* path prefix, required for docker
+* path prefix, required for docker, afero?
* path prefix per user
* udf iso format https://github.com/mogaika/udf
* zip/unzip archives
diff --git a/dialogs.go b/dialogs.go
index 265c0f8..70b843a 100644
--- a/dialogs.go
+++ b/dialogs.go
@@ -10,7 +10,7 @@ import (
"github.com/dustin/go-humanize"
)
-func (r wfmRequest) prompt(action string, mul []string) {
+func (r *wfmRequest) prompt(action string, mul []string) {
header(r.w, r.uDir, r.eSort, "")
r.w.Write([]byte(`
@@ -106,7 +106,7 @@ func (r wfmRequest) prompt(action string, mul []string) {
footer(r.w)
}
-func (r wfmRequest) editText() {
+func (r *wfmRequest) editText() {
fi, err := os.Stat(r.uDir + "/" + r.uFbn)
if err != nil {
htErr(r.w, "Unable to get file attributes", err)
@@ -140,7 +140,7 @@ func (r wfmRequest) editText() {
footer(r.w)
}
-func (r wfmRequest) about(ua string) {
+func (r *wfmRequest) about(ua string) {
header(r.w, r.uDir, r.eSort, "")
r.w.Write([]byte(`
diff --git a/dir.go b/dir.go
index bc5fd5c..88c4660 100644
--- a/dir.go
+++ b/dir.go
@@ -14,7 +14,7 @@ import (
"github.com/dustin/go-humanize"
)
-func (r wfmRequest) listFiles(hi string) {
+func (r *wfmRequest) listFiles(hi string) {
if deniedPfx(r.uDir) {
htErr(r.w, "access", fmt.Errorf("forbidden"))
return
diff --git a/fileio.go b/fileio.go
index 9b7aaf8..ed97987 100644
--- a/fileio.go
+++ b/fileio.go
@@ -26,7 +26,7 @@ func deniedPfx(pfx string) bool {
return false
}
-func (r wfmRequest) dispFile() {
+func (r *wfmRequest) dispFile() {
fp := r.uDir + "/" + r.uFbn
// TODO(tenox): deniedpfx should be in handlers???
if deniedPfx(fp) {
@@ -53,7 +53,7 @@ func (r wfmRequest) dispFile() {
}
}
-func (r wfmRequest) downFile() {
+func (r *wfmRequest) downFile() {
fp := r.uDir + "/" + r.uFbn
if deniedPfx(fp) {
htErr(r.w, "access", fmt.Errorf("forbidden"))
@@ -133,7 +133,7 @@ func streamFile(w http.ResponseWriter, uFilePath string) {
wb.Flush()
}
-func (r wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) {
+func (r *wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -170,7 +170,7 @@ func (r wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(h.Filename))
}
-func (r wfmRequest) saveText(uData string) {
+func (r *wfmRequest) saveText(uData string) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -208,7 +208,7 @@ func (r wfmRequest) saveText(uData string) {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn))
}
-func (r wfmRequest) mkdir() {
+func (r *wfmRequest) mkdir() {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -231,7 +231,7 @@ func (r wfmRequest) mkdir() {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn))
}
-func (r wfmRequest) mkfile() {
+func (r *wfmRequest) mkfile() {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -254,7 +254,7 @@ func (r wfmRequest) mkfile() {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn))
}
-func (r wfmRequest) mkurl(eUrl string) {
+func (r *wfmRequest) mkurl(eUrl string) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -281,7 +281,7 @@ func (r wfmRequest) mkurl(eUrl string) {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn))
}
-func (r wfmRequest) renFile(uNewf string) {
+func (r *wfmRequest) renFile(uNewf string) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -307,7 +307,7 @@ func (r wfmRequest) renFile(uNewf string) {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(newB))
}
-func (r wfmRequest) moveFiles(uFilePaths []string, uDst string) {
+func (r *wfmRequest) moveFiles(uFilePaths []string, uDst string) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return
@@ -335,7 +335,7 @@ func (r wfmRequest) moveFiles(uFilePaths []string, uDst string) {
redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(uDst)+"&sort="+r.eSort+"&hi="+url.QueryEscape(lF))
}
-func (r wfmRequest) deleteFiles(uFilePaths []string) {
+func (r *wfmRequest) deleteFiles(uFilePaths []string) {
if !r.rwAccess {
htErr(r.w, "permission", fmt.Errorf("read only"))
return