diff options
author | Antoni Sawicki <tenox@google.com> | 2022-05-25 02:38:30 -0700 |
---|---|---|
committer | Antoni Sawicki <tenox@google.com> | 2022-05-25 02:38:30 -0700 |
commit | c5ee80cffaa6d1f309e21d84763615a8c34049cc (patch) | |
tree | 86e5d082d0d1424f1df7f7bc3846338ca0c7d7fe | |
parent | 31a4d39d896040f691a42a0032cb6234edd6fe31 (diff) | |
download | wfm-c5ee80cffaa6d1f309e21d84763615a8c34049cc.tar.gz |
wfmRequest is a pointer
-rw-r--r-- | TODO.md | 2 | ||||
-rw-r--r-- | dialogs.go | 6 | ||||
-rw-r--r-- | dir.go | 2 | ||||
-rw-r--r-- | fileio.go | 20 |
4 files changed, 15 insertions, 15 deletions
@@ -32,7 +32,7 @@ https://github.com/crazcalm/go/commit/8b0b644cd02c59fe2461908304c44d64e8be431e * deniedPfx should be fired in handlers not in fileio??? this may be superseded by docker virtual path * file search function -* path prefix, required for docker +* path prefix, required for docker, afero? * path prefix per user * udf iso format https://github.com/mogaika/udf * zip/unzip archives @@ -10,7 +10,7 @@ import ( "github.com/dustin/go-humanize" ) -func (r wfmRequest) prompt(action string, mul []string) { +func (r *wfmRequest) prompt(action string, mul []string) { header(r.w, r.uDir, r.eSort, "") r.w.Write([]byte(` @@ -106,7 +106,7 @@ func (r wfmRequest) prompt(action string, mul []string) { footer(r.w) } -func (r wfmRequest) editText() { +func (r *wfmRequest) editText() { fi, err := os.Stat(r.uDir + "/" + r.uFbn) if err != nil { htErr(r.w, "Unable to get file attributes", err) @@ -140,7 +140,7 @@ func (r wfmRequest) editText() { footer(r.w) } -func (r wfmRequest) about(ua string) { +func (r *wfmRequest) about(ua string) { header(r.w, r.uDir, r.eSort, "") r.w.Write([]byte(` @@ -14,7 +14,7 @@ import ( "github.com/dustin/go-humanize" ) -func (r wfmRequest) listFiles(hi string) { +func (r *wfmRequest) listFiles(hi string) { if deniedPfx(r.uDir) { htErr(r.w, "access", fmt.Errorf("forbidden")) return @@ -26,7 +26,7 @@ func deniedPfx(pfx string) bool { return false } -func (r wfmRequest) dispFile() { +func (r *wfmRequest) dispFile() { fp := r.uDir + "/" + r.uFbn // TODO(tenox): deniedpfx should be in handlers??? if deniedPfx(fp) { @@ -53,7 +53,7 @@ func (r wfmRequest) dispFile() { } } -func (r wfmRequest) downFile() { +func (r *wfmRequest) downFile() { fp := r.uDir + "/" + r.uFbn if deniedPfx(fp) { htErr(r.w, "access", fmt.Errorf("forbidden")) @@ -133,7 +133,7 @@ func streamFile(w http.ResponseWriter, uFilePath string) { wb.Flush() } -func (r wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) { +func (r *wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -170,7 +170,7 @@ func (r wfmRequest) uploadFile(h *multipart.FileHeader, f multipart.File) { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(h.Filename)) } -func (r wfmRequest) saveText(uData string) { +func (r *wfmRequest) saveText(uData string) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -208,7 +208,7 @@ func (r wfmRequest) saveText(uData string) { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn)) } -func (r wfmRequest) mkdir() { +func (r *wfmRequest) mkdir() { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -231,7 +231,7 @@ func (r wfmRequest) mkdir() { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn)) } -func (r wfmRequest) mkfile() { +func (r *wfmRequest) mkfile() { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -254,7 +254,7 @@ func (r wfmRequest) mkfile() { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn)) } -func (r wfmRequest) mkurl(eUrl string) { +func (r *wfmRequest) mkurl(eUrl string) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -281,7 +281,7 @@ func (r wfmRequest) mkurl(eUrl string) { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(r.uFbn)) } -func (r wfmRequest) renFile(uNewf string) { +func (r *wfmRequest) renFile(uNewf string) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -307,7 +307,7 @@ func (r wfmRequest) renFile(uNewf string) { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(r.uDir)+"&sort="+r.eSort+"&hi="+url.QueryEscape(newB)) } -func (r wfmRequest) moveFiles(uFilePaths []string, uDst string) { +func (r *wfmRequest) moveFiles(uFilePaths []string, uDst string) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return @@ -335,7 +335,7 @@ func (r wfmRequest) moveFiles(uFilePaths []string, uDst string) { redirect(r.w, *wfmPfx+"?dir="+url.QueryEscape(uDst)+"&sort="+r.eSort+"&hi="+url.QueryEscape(lF)) } -func (r wfmRequest) deleteFiles(uFilePaths []string) { +func (r *wfmRequest) deleteFiles(uFilePaths []string) { if !r.rwAccess { htErr(r.w, "permission", fmt.Errorf("read only")) return |