Replace CLI/env based setup with web UI setup, add OAuth2 (#33)

* Initial commit websetup

* Added writing cloudstorage credentials

* Clean up old configuration generation

* Added Oauth2 OpenID Connect support

* Bugfixes and fixed tests

* Refactoring

* Refactoring, added first tests

* Added documentation

* Refactoring, updated docs

* Added tests

* Added option to reshow setup for reconfiguring Gokapi instance

* Added docs and tests
This commit is contained in:
Marc Ole Bulling
2021-12-31 01:40:10 +01:00
committed by GitHub
parent 1b300a6691
commit 3595a18dbd
66 changed files with 15912 additions and 874 deletions

View File

@@ -5,14 +5,25 @@ go 1.17
require (
github.com/aws/aws-sdk-go v1.42.22
github.com/johannesboyne/gofakes3 v0.0.0-20210415062230-4b6b67a85d38
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211
gopkg.in/yaml.v2 v2.4.0
)
require (
github.com/golang/protobuf v1.4.2 // indirect
github.com/jmespath/go-jmespath v0.4.0 // indirect
github.com/ryszard/goskiplist v0.0.0-20150312221310-2dfbae5fcf46 // indirect
github.com/shabbyrobe/gocovmerge v0.0.0-20180507124511-f6ea450bfb63 // indirect
golang.org/x/sys v0.0.0-20211210111614-af8b64212486 // indirect
golang.org/x/tools v0.0.0-20190308174544-00c44ba9c14f // indirect
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 // indirect
golang.org/x/net v0.0.0-20210614182718-04defd469f4e // indirect
golang.org/x/tools v0.0.0-20190328211700-ab21143f2384 // indirect
google.golang.org/appengine v1.6.6 // indirect
google.golang.org/protobuf v1.23.0 // indirect
gopkg.in/square/go-jose.v2 v2.5.1 // indirect
)
require (
github.com/coreos/go-oidc/v3 v3.1.0
golang.org/x/sys v0.0.0-20211210111614-af8b64212486 // indirect
)

View File

@@ -7,12 +7,14 @@ Main routine
import (
"Gokapi/internal/configuration"
"Gokapi/internal/configuration/cloudconfig"
"Gokapi/internal/configuration/setup"
"Gokapi/internal/environment"
"Gokapi/internal/helper"
"Gokapi/internal/logging"
"Gokapi/internal/storage"
"Gokapi/internal/storage/cloudstorage/aws"
"Gokapi/internal/webserver"
"Gokapi/internal/webserver/authentication"
"Gokapi/internal/webserver/ssl"
"flag"
"fmt"
@@ -23,9 +25,9 @@ import (
// Version is the current version in readable form.
// The go generate call below needs to be modified as well
const Version = "1.3.2"
const Version = "1.5.0"
//go:generate sh "../../build/setVersionTemplate.sh" "1.3.2"
//go:generate sh "../../build/setVersionTemplate.sh" "1.5.0"
// Main routine that is called on startup
func main() {
@@ -34,8 +36,12 @@ func main() {
rand.Seed(time.Now().UnixNano())
fmt.Println(logo)
fmt.Println("Gokapi v" + Version + " starting")
setup.RunIfFirstStart()
configuration.Load()
resetPassword(passedFlags)
settings := configuration.GetServerSettingsReadOnly()
authentication.Init(settings.Authentication)
configuration.ReleaseReadOnly()
reonfigureServer(passedFlags)
createSsl(passedFlags)
cConfig, ok := cloudconfig.Load()
@@ -64,24 +70,21 @@ func parseFlags() flags {
passedFlags := flag.FlagSet{}
versionShortFlag := passedFlags.Bool("v", false, "Show version info")
versionLongFlag := passedFlags.Bool("version", false, "Show version info")
resetPwFlag := passedFlags.Bool("reset-pw", false, "Show prompt to reset admin password")
reconfigureFlag := passedFlags.Bool("reconfigure", false, "Runs setup again to change Gokapi configuration / passwords")
createSslFlag := passedFlags.Bool("create-ssl", false, "Creates a new SSL certificate valid for 365 days")
err := passedFlags.Parse(os.Args[1:])
helper.Check(err)
return flags{
showVersion: *versionShortFlag || *versionLongFlag,
resetPw: *resetPwFlag,
reconfigure: *reconfigureFlag,
createSsl: *createSslFlag,
}
}
// Checks for command line arguments that have to be parsed after loading the configuration
func resetPassword(passedFlags flags) {
if passedFlags.resetPw {
fmt.Println("Password change requested")
configuration.DisplayPasswordReset()
fmt.Println("Password has been changed!")
osExit(0)
func reonfigureServer(passedFlags flags) {
if passedFlags.reconfigure {
setup.RunConfigModification()
}
}
@@ -95,7 +98,7 @@ func createSsl(passedFlags flags) {
type flags struct {
showVersion bool
resetPw bool
reconfigure bool
createSsl bool
}

View File

@@ -18,15 +18,15 @@ func TestMain(m *testing.M) {
}
func TestParseFlags(t *testing.T) {
os.Args = []string{"gokapi", "--version", "--reset-pw", "-create-ssl"}
os.Args = []string{"gokapi", "--version", "--reconfigure", "-create-ssl"}
flags := parseFlags()
test.IsEqualBool(t, flags.showVersion, true)
test.IsEqualBool(t, flags.resetPw, true)
test.IsEqualBool(t, flags.reconfigure, true)
test.IsEqualBool(t, flags.createSsl, true)
os.Args = []string{"gokapi", "--reset-pw", "-create-ssl"}
os.Args = []string{"gokapi", "--reconfigure", "-create-ssl"}
flags = parseFlags()
test.IsEqualBool(t, flags.showVersion, false)
test.IsEqualBool(t, flags.resetPw, true)
test.IsEqualBool(t, flags.reconfigure, true)
test.IsEqualBool(t, flags.createSsl, true)
}
@@ -37,7 +37,7 @@ func TestShowVersion(t *testing.T) {
}
func TestNoResetPw(t *testing.T) {
resetPassword(flags{})
reonfigureServer(flags{})
}
func TestCreateSsl(t *testing.T) {

View File

@@ -56,51 +56,24 @@ For Windows environments, you need to run ``setx`` first, e.g.:
Available environment variables
==================================
General
--------
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| Name | Action | Persistent* | Default | Required for unattended setup |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_CONFIG_DIR | Sets the directory for the config file | No | config | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_CONFIG_FILE | Sets the name of the config file | No | config.json | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_DATA_DIR | Sets the directory for the data | Yes | data | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_USERNAME | Sets the admin username | Yes | unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_PASSWORD | Sets the admin password | Yes | unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_PORT | Sets the server port | Yes | 53842 | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_EXTERNAL_URL | Sets the external URL where Gokapi can be reached | Yes | unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_REDIRECT_URL | Sets the external URL where Gokapi will redirect to the index page is accesses | Yes | unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_LOCALHOST | Bind server to localhost. Expects true/false/yes/no, always false for Docker images | Yes | false for Docker, otherwise unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_SALT_FILES | Sets the salt for the file password hashes | Yes | random salt | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_USE_SSL | Serve all content through HTTPS and generate certificates. Expects true/false/yes/no | Yes | unset | Yes |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_SALT_ADMIN | Sets the salt for the admin password hash | Yes | random salt | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_SALT_FILES | Sets the salt for the file password hashes | Yes | random salt | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_LENGTH_ID | Sets the length of the download IDs. Value needs to be 5 or more | Yes | 15 | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_MAX_FILESIZE | Sets the maximum allowed file size in MB | Yes | 102400 (100GB) | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
| GOKAPI_DISABLE_LOGIN | Disables login for admin menu. DO NOT USE unless you have a 3rd party authentication! ** | Yes | false | No |
+----------------------+------------------------------------------------------------------------------------------+-------------+-----------------------------------+-------------------------------+
+---------------------+------------------------------------------------------------------+-------------+----------------+
| Name | Action | Persistent* | Default |
+=====================+==================================================================+=============+================+
| GOKAPI_CONFIG_DIR | Sets the directory for the config file | No | config |
+---------------------+------------------------------------------------------------------+-------------+----------------+
| GOKAPI_CONFIG_FILE | Sets the name of the config file | No | config.json |
+---------------------+------------------------------------------------------------------+-------------+----------------+
| GOKAPI_DATA_DIR | Sets the directory for the data | Yes | data |
+---------------------+------------------------------------------------------------------+-------------+----------------+
| GOKAPI_LENGTH_ID | Sets the length of the download IDs. Value needs to be 5 or more | Yes | 15 |
+---------------------+------------------------------------------------------------------+-------------+----------------+
| GOKAPI_MAX_FILESIZE | Sets the maximum allowed file size in MB | Yes | 102400 (100GB) |
+---------------------+------------------------------------------------------------------+-------------+----------------+
\* Variables that are persistent must be submitted during the first start when Gokapi creates a new config file. They can be omitted afterwards. Non-persistent variables need to be set on every start.
\*\* Refer to :ref:`extauth`
Cloudstorage
-------------
All values that are described in :ref:`cloudstorage` can be passed as environment variables as well. No values are persistent, therefore need to be set on every start.
@@ -118,24 +91,8 @@ All values that are described in :ref:`cloudstorage` can be passed as environmen
| GOKAPI_AWS_ENDPOINT | Sets the endpoint |
+-----------------------+-------------------------+
.. _extauth:
********************************
External Authentication
********************************
In order to use external authentication (eg. services like Authelia or Authentik), set the environment variable ``GOKAPI_DISABLE_LOGIN`` to ``true`` on the first start. **Warning:** This will diasable authentication for the admin menu, which can be dangerous if not set up correctly!
**Refer to the documention of your reverse proxy on how to protect the following URLs:**
* ``/admin``
* ``/apiDelete``
* ``/apiKeys``
* ``/apiNew``
* ``/delete``
* ``/upload``
.. _api:
********************************
API

View File

@@ -52,7 +52,7 @@ If you don't want to download the prebuilt image, you can find the Dockerfile on
First Start
**************
During the first start you will be asked several questions for the inital setup. To automate the setup, all questions can be preset with environment variables as well, see :ref:`envvar`
After the first start you will be redirected to a setup webpage. To change the port for the setup please set the GOKAPI_PORT env variable, see :ref:`envvar`
Starting Gokapi
@@ -69,9 +69,7 @@ Docker
To start the container, run the following command: ::
docker run -it -v gokapi-data:/app/data -v gokapi-config:/app/config -p 127.0.0.1:53842:53842 f0rc3/gokapi:latest
Please note the ``-it`` flag, which is needed if you are not populating all setup questions with environment variables.
docker run -v gokapi-data:/app/data -v gokapi-config:/app/config -p 127.0.0.1:53842:53842 f0rc3/gokapi:latest
With the argument ``-p 127.0.0.1:53842:53842`` the service will only be accessible from the machine it is running on. In most usecases you will use a reverse proxy for SSL - if you want to make the service available to other computers in the network without a reverse proxy, replace the argument with ``-p 53842:53842``. Please note, unless you select SSL during the setup, the traffic will not be encrypted that way and data like passwords and transferred files can easily be read by 3rd parties!
@@ -79,59 +77,109 @@ With the argument ``-p 127.0.0.1:53842:53842`` the service will only be accessib
Initial Setup
^^^^^^^^^^^^^^^
During the first start, a new configuration file will be created. You will be asked questions for all required values that have not been populated with environment variables, see :ref:`envvar`
During the first start, a new configuration file will be created and you will be asked for several inputs.
The following values are required:
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| Question | Expected Entry | Expected format | Default |
+=============================+=============================================================================================================+========================================+===================================+
| Username | Username used for admin login (only user that can upload files) | string, min 4 characters | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| Password | Password used for admin login | string, min 6 characters | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| Server Port | The port Gokapi listens on | int, 0-65353, >1024 recommended | 53842 |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| External | The URL that will be used for generating Gokapi download links. | url, starting with http:// or https:// | http://127.0.0.1:53842/ |
| Server URL | Use an URL that users from an external network can use to reach Gokapi. | | |
| | For testing purposes you can use the default value | | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| URL that the index | By default Gokapi redirects to another URL instead of showing a generic page if no download link was passed | url, starting with http:// or https:// | https://github.com/Forceu/Gokapi/ |
| gets redirected to | | | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| Bind port to localhost only | If bound to localhost, Gokapi can only be accessed from the machine it runs on. | "y"/"yes" or "n"/"no" | Yes |
| | Recommended to set to "yes" if you use a reverse proxy or run Gokapi for testing purposes. | | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
| Use SSL | If set to "yes", Gokapi will serve the content on the port with HTTPS. | "y"/"yes" or "n"/"no" | No |
| | If no valid certificate is present in the config folder, a new one will be generated. | | |
+-----------------------------+-------------------------------------------------------------------------------------------------------------+----------------------------------------+-----------------------------------+
Webserver
""""""""""""""
The following configuration can be set:
- **Bind to localhost** Only allow the server to be accessed from the machine it is running on. Select this if you are running Gokapi behind a reverse proxy or for testing purposes
- **Use SSL** Generates a self-signed SSL certificate (which can be replaced with a valid one). Select this if you are not running Gokapi behind a reverse proxy
- **Webserver Port** Set the port that Gokapi can be accessed on
- **Public Facing URL** Enter the URL where users from an external network can use to reach Gokapi. The URL will be used for generating download links
- **Redirection URL** By default Gokapi redirects to this URL instead of showing a generic page if no download link was passed
Authentication
""""""""""""""
This menu guides you through the authentication setup, where you select how an admin user logs in (only user that can upload files)
Username / Password
*********************
The default authentication method. A single admin user will be generated that authenticates with a password
OAuth2 OpenID Connect
************************
Use this to authenticate with an OIDC server, eg. Google, Github or an internal server. *Note:* If a user is revoked on the OIDC server, it might take several days to affect the Gokapi session.
+---------------+---------------------------------------------------------------------------------+---------------------------------------------+
| Option | Expected Entry | Example |
+===============+=================================================================================+=============================================+
| Provider URL | The URL to connect to the OIDC server | https://accounts.google.com |
+---------------+---------------------------------------------------------------------------------+---------------------------------------------+
| Client ID | Client ID provided by the OIDC server | [random String] |
+---------------+---------------------------------------------------------------------------------+---------------------------------------------+
| Client Secret | Client secret provided by the OIDC server | [random String] |
+---------------+---------------------------------------------------------------------------------+---------------------------------------------+
| Allowed users | List of users that is allowed to log in as an admin. | gokapiuser@gmail.com;companyadmin@gmail.com |
| | Separate users with a semicolon or leave blank to allow any authenticated user | |
+---------------+---------------------------------------------------------------------------------+---------------------------------------------+
When creating an OIDC client on the server, you will need to provide a **redirection URL**. Enter http(s)://[gokapi URL]/oauth-callback
You can find a guide on how to create an OIDC client with Github at `Setting up GitHub OAuth 2.0 <https://docs.readme.com/docs/setting-up-github-oauth>`_ and a guide for Google at `Setting up OAuth 2.0 <https://support.google.com/cloud/answer/6158849>`_.
Header Authentication
************************
Only use this if you are running Gokapi behind a reverse proxy that is capable of authenticating users, e.g. by using Authelia or Authentik.
Enter the key of the header that returns the username. For Authelia this would be ``Remote-User`` and for Authentik `` X-authentik-username``.
Separate users with a semicolon or leave blank to allow any authenticated user, e.g. ``gokapiuser@gmail.com;companyadmin@gmail.com``
Access Restriction
************************
Only use this if you are running Gokapi behind a reverse proxy that is capable of authenticating users, e.g. by using Authelia or Authentik.
This option disables Gokapis internal authentication completely, except for API calls. The following URLs need to be restricted by the reverse proxy:
- ``/admin``
- ``/apiDelete``
- ``/apiKeys``
- ``/apiNew``
- ``/delete``
- ``/upload``
**Warning:** This option has potential to be dangerous, only proceed if you know what you are doing!
Storage
""""""""""""""
Here you can choose where uploaded files shall be stored
Local Storage
*********************
Stores files locally in the subdirectory ``data`` by default.
.. _cloudstorage:
********************
Cloudstorage Setup
********************
Cloudstorage
""""""""""""""
By default Gokapi uses local storage. You can also use external cloud storage providers for file storage. Please note that currently no native encryption is available for Gokapi, therefore all files will be stored in plain text on the cloud server.
Stores files remotely on an S3 compatible server, e.g. Amazon AWS S3 or Backblaze B2. Please note that currently no native encryption is available for Gokapi, therefore all files will be stored in plain text on the cloud server.
AWS S3 / Backblaze B2
^^^^^^^^^^^^^^^^^^^^^^
Provider setup
""""""""""""""""""
It is highly recommended to create a new bucket for Gokapi and set it to "private", so that no file can be downloaded externally. For each download request Gokapi will create a public URL that is only valid for a couple of seconds, so that the file can be downloaded from the external server directly instead of routing it through the local server.
You then need to create an app key with read-/write-access to this bucket.
Local setup
""""""""""""
The following data needs to be provided:
It is recommended to pass the credentials as environment variables to Gokapi, see :ref:`envvar`. They can however also be loaded from a configuration file. You can find an example file `here <https://github.com/Forceu/Gokapi/blob/master/example/cloudconfig.yml>`_. Modify the values and copy it as ``cloudconfig.yml`` into your ``config`` folder.
The following values can be parsed:
+-----------+-----------------------------------------------+-----------------------+-----------------------------------+
| Key | Description | Required | Example |
@@ -148,3 +196,9 @@ The following values can be parsed:
+-----------+-----------------------------------------------+-----------------------+-----------------------------------+
************************
Changing Configuration
************************
To change any settings set in the initial setup (e.g. your password or storage location), run Gokapi with the parameter ``--reconfigure`` and follow the instructions. A random username and password will be generated and displayed in the programm output to access the configuration webpage, as all entered information can be read in plain text (except the user password).

View File

@@ -1,9 +0,0 @@
##
## Example AWS S3 config. Modify this file and save it to config/cloudconfig.yml
##
aws:
Bucket: "gokapi"
Region: "eu-central-1"
Endpoint: ""
KeyId: "keyname"
KeySecret: "secret"

15
go.mod
View File

@@ -5,14 +5,25 @@ go 1.17
require (
github.com/aws/aws-sdk-go v1.42.22
github.com/johannesboyne/gofakes3 v0.0.0-20210415062230-4b6b67a85d38
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211
gopkg.in/yaml.v2 v2.4.0
)
require (
github.com/golang/protobuf v1.4.2 // indirect
github.com/jmespath/go-jmespath v0.4.0 // indirect
github.com/ryszard/goskiplist v0.0.0-20150312221310-2dfbae5fcf46 // indirect
github.com/shabbyrobe/gocovmerge v0.0.0-20180507124511-f6ea450bfb63 // indirect
golang.org/x/sys v0.0.0-20211210111614-af8b64212486 // indirect
golang.org/x/tools v0.0.0-20190308174544-00c44ba9c14f // indirect
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 // indirect
golang.org/x/net v0.0.0-20210614182718-04defd469f4e // indirect
golang.org/x/tools v0.0.0-20190328211700-ab21143f2384 // indirect
google.golang.org/appengine v1.6.6 // indirect
google.golang.org/protobuf v1.23.0 // indirect
gopkg.in/square/go-jose.v2 v2.5.1 // indirect
)
require (
github.com/coreos/go-oidc/v3 v3.1.0
golang.org/x/sys v0.0.0-20211210111614-af8b64212486 // indirect
)

52
go.sum
View File

@@ -1,8 +1,24 @@
cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
github.com/aws/aws-sdk-go v1.17.4/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
github.com/aws/aws-sdk-go v1.42.22 h1:EwcM7/+Ytg6xK+jbeM2+f9OELHqPiEiEKetT/GgAr7I=
github.com/aws/aws-sdk-go v1.42.22/go.mod h1:585smgzpB/KqRA+K3y/NL/oYRqQvpNJYvLm+LY1U59Q=
github.com/coreos/go-oidc/v3 v3.1.0 h1:6avEvcdvTa1qYsOZ6I5PRkSYHzpTNWgKYmaJfaYbrRw=
github.com/coreos/go-oidc/v3 v3.1.0/go.mod h1:rEJ/idjfUyfkBit1eI1fvyr+64/g9dcKpAm8MJMesvo=
github.com/davecgh/go-spew v1.1.0 h1:ZDRjVQ15GmhC3fiQ8ni8+OwkZQO4DARzQgrnXU1Liz8=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
github.com/golang/protobuf v1.4.2 h1:+Z5KGCizgyZCbGh1KZqA0fcLLkwbsjIzS4aV2v7wJX0=
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.4.0 h1:xsAVV57WRhGj6kEIi8ReJzQlHHqcBYCElAvkovg3B/4=
github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k=
github.com/jmespath/go-jmespath v0.4.0 h1:BEgLn5cpjn8UN1mAw4NjwDrS35OdebyEtFe+9YPoQUg=
github.com/jmespath/go-jmespath v0.4.0/go.mod h1:T8mJZnbsbmF+m6zOOFylbeCJqk5+pHWvzYPziyZiYoo=
@@ -19,14 +35,30 @@ github.com/shabbyrobe/gocovmerge v0.0.0-20180507124511-f6ea450bfb63 h1:J6qvD6rbm
github.com/shabbyrobe/gocovmerge v0.0.0-20180507124511-f6ea450bfb63/go.mod h1:n+VKSARF5y/tS9XFSP7vWDfS+GUC5vs/YT7M5XDTUEM=
github.com/spf13/afero v1.2.1/go.mod h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/testify v1.3.0 h1:TivCn/peBQ7UY8ooIcPgZFpTNSz0Q2U6UrFlUfqbe0Q=
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
github.com/stretchr/testify v1.5.1 h1:nOGnQDM7FYENwehXlg/kFVnos3rEvtKTjRvOWSzb6H4=
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
go.etcd.io/bbolt v1.3.5/go.mod h1:G5EMThwa9y8QZGBClrRx5EY+Yw9kAhnjy3bSjsnlVTQ=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 h1:psW17arqaxU48Z5kZ0CQnkZWQJsqcURM6tKiBApRjXI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190310074541-c10a0554eabf/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
golang.org/x/net v0.0.0-20200505041828-1ed23360d12c/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
golang.org/x/net v0.0.0-20210614182718-04defd469f4e h1:XpT3nA5TvE525Ne3hInMh6+GETgn27Zfm9dxsThnX2Q=
golang.org/x/net v0.0.0-20210614182718-04defd469f4e/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d h1:TzXSXBo42m9gQenoE3b9BGiEpg5IG2JkU5FkPIawgtw=
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
@@ -36,14 +68,30 @@ golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9sn
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211 h1:JGgROgKl9N8DuW20oFS5gxc+lE67/N3FcwmBPMe7ArY=
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.3.6 h1:aRYxNxv6iGQlyVaZmk6ZgYEDa+Jg18DxebPSrd6bg1M=
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20190308174544-00c44ba9c14f h1:SUQ6L9W8e5xt2GFO9s+i18JGITAfem+a0AQuFU8Ls74=
golang.org/x/tools v0.0.0-20190308174544-00c44ba9c14f/go.mod h1:25r3+/G6/xytQM8iWZKq3Hn0kr0rgFKPUNVEL/dr3z4=
golang.org/x/tools v0.0.0-20190328211700-ab21143f2384 h1:TFlARGu6Czu1z7q93HTxcP1P+/ZFC/IKythI5RzrnRg=
golang.org/x/tools v0.0.0-20190328211700-ab21143f2384/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
google.golang.org/appengine v1.6.6 h1:lMO5rYAqUxkmaj76jAkRUvt5JZgFymx/+Q5Mzfivuhc=
google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
google.golang.org/protobuf v1.23.0 h1:4MY060fB1DLGMB/7MBTLnwQUY6+F09GEiz6SsrNqyzM=
google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/mgo.v2 v2.0.0-20180705113604-9856a29383ce/go.mod h1:yeKp02qBN3iKW1OzL3MGk2IdtZzaj7SFntXj72NppTA=
gopkg.in/square/go-jose.v2 v2.5.1 h1:7odma5RETjNHWJnR32wx8t+Io4djHE1PqxCFx3iiZ2w=
gopkg.in/square/go-jose.v2 v2.5.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=

View File

@@ -5,6 +5,8 @@ Loading and saving of the persistent configuration
*/
import (
"Gokapi/internal/configuration/cloudconfig"
"Gokapi/internal/configuration/configUpgrade"
"Gokapi/internal/environment"
"Gokapi/internal/helper"
log "Gokapi/internal/logging"
@@ -12,78 +14,44 @@ import (
"crypto/sha1"
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"os"
"strconv"
"strings"
"sync"
"unicode/utf8"
)
// Default port that the program runs on
const defaultPort = "53842"
// Min length of admin password in characters
const minLengthPassword = 6
// Min length of admin username in characters
const minLengthUsername = 3
// Environment is an object containing the environment variables
var Environment environment.Environment
// ServerSettings is an object containing the server configuration
var serverSettings Configuration
// Version of the configuration structure. Used for upgrading
const currentConfigVersion = 9
var serverSettings models.Configuration
// For locking this object to prevent race conditions
var mutex sync.RWMutex
// Configuration is a struct that contains the global configuration
type Configuration struct {
Port string `json:"Port"`
AdminName string `json:"AdminName"`
AdminPassword string `json:"AdminPassword"`
ServerUrl string `json:"ServerUrl"`
DefaultDownloads int `json:"DefaultDownloads"`
DefaultExpiry int `json:"DefaultExpiry"`
DefaultPassword string `json:"DefaultPassword"`
RedirectUrl string `json:"RedirectUrl"`
Sessions map[string]models.Session `json:"Sessions"`
Files map[string]models.File `json:"Files"`
Hotlinks map[string]models.Hotlink `json:"Hotlinks"`
DownloadStatus map[string]models.DownloadStatus `json:"DownloadStatus"`
ApiKeys map[string]models.ApiKey `json:"ApiKeys"`
ConfigVersion int `json:"ConfigVersion"`
SaltAdmin string `json:"SaltAdmin"`
SaltFiles string `json:"SaltFiles"`
LengthId int `json:"LengthId"`
DataDir string `json:"DataDir"`
MaxMemory int `json:"MaxMemory"`
UseSsl bool `json:"UseSsl"`
MaxFileSizeMB int `json:"MaxFileSizeMB"`
DisableLogin bool `json:"DisableLogin"`
LoginHeaderKey string `json:"LoginHeaderKey"`
LoginHeaderForceUsername bool `json:"LoginHeaderForceUsername"`
func Exists() bool {
configPath, _, _, _ := environment.GetConfigPaths()
return helper.FileExists(configPath)
}
// Load loads the configuration or creates the folder structure and a default configuration
func Load() {
Environment = environment.New()
helper.CreateDir(Environment.ConfigDir)
if !helper.FileExists(Environment.ConfigPath) {
generateDefaultConfig()
}
// No check if file exists, as this was checked earlier
file, err := os.Open(Environment.ConfigPath)
helper.Check(err)
defer file.Close()
decoder := json.NewDecoder(file)
serverSettings = Configuration{}
serverSettings = models.Configuration{}
err = decoder.Decode(&serverSettings)
helper.Check(err)
updateConfig()
file.Close()
if configUpgrade.DoUpgrade(&serverSettings, &Environment) {
save()
}
serverSettings.MaxMemory = Environment.MaxMemory
helper.CreateDir(serverSettings.DataDir)
log.Init(Environment.ConfigDir)
@@ -107,14 +75,14 @@ func Release() {
// GetServerSettings locks the settings returns a pointer to the configuration for Read/Write access
// Release needs to be called when finished with the operation!
func GetServerSettings() *Configuration {
func GetServerSettings() *models.Configuration {
mutex.Lock()
return &serverSettings
}
// GetServerSettingsReadOnly locks the settings for read-only access and returns a copy of the configuration
// ReleaseReadOnly needs to be called when finished with the operation!
func GetServerSettingsReadOnly() *Configuration {
func GetServerSettingsReadOnly() *models.Configuration {
mutex.RLock()
return &serverSettings
}
@@ -124,106 +92,6 @@ func ReleaseReadOnly() {
mutex.RUnlock()
}
// Upgrades the ServerSettings if saved with a previous version
func updateConfig() {
// < v1.1.2
if serverSettings.ConfigVersion < 3 {
serverSettings.SaltAdmin = "eefwkjqweduiotbrkl##$2342brerlk2321"
serverSettings.SaltFiles = "P1UI5sRNDwuBgOvOYhNsmucZ2pqo4KEvOoqqbpdu"
serverSettings.LengthId = 15
serverSettings.DataDir = Environment.DataDir
}
// < v1.1.3
if serverSettings.ConfigVersion < 4 {
serverSettings.Hotlinks = make(map[string]models.Hotlink)
}
// < v1.1.4
if serverSettings.ConfigVersion < 5 {
serverSettings.LengthId = 15
serverSettings.DownloadStatus = make(map[string]models.DownloadStatus)
for _, file := range serverSettings.Files {
file.ContentType = "application/octet-stream"
serverSettings.Files[file.Id] = file
}
}
// < v1.2.0
if serverSettings.ConfigVersion < 6 {
serverSettings.ApiKeys = make(map[string]models.ApiKey)
}
// < v1.3.0
if serverSettings.ConfigVersion < 7 {
if Environment.UseSsl == environment.IsTrue {
serverSettings.UseSsl = true
}
}
// < v1.3.1
if serverSettings.ConfigVersion < 8 {
serverSettings.MaxFileSizeMB = Environment.MaxFileSize
}
// < v1.3.2
if serverSettings.ConfigVersion < 9 {
serverSettings.DisableLogin = environment.ToBool(Environment.DisableLogin)
serverSettings.LoginHeaderForceUsername = environment.ToBool(Environment.LoginHeaderForceUser)
serverSettings.LoginHeaderKey = Environment.LoginHeaderKey
}
if serverSettings.ConfigVersion < currentConfigVersion {
fmt.Println("Successfully upgraded database")
serverSettings.ConfigVersion = currentConfigVersion
save()
}
}
// Creates a default configuration and asks for items like username/password etc.
func generateDefaultConfig() {
fmt.Println("First start, creating new admin account")
saltAdmin := Environment.SaltAdmin
if saltAdmin == "" {
saltAdmin = helper.GenerateRandomString(30)
}
serverSettings = Configuration{
SaltAdmin: saltAdmin,
}
username := askForUsername(1)
password := askForPassword()
port := askForPort()
url := askForUrl(port)
redirect := askForRedirect()
localOnly := askForLocalOnly()
bindAddress := "127.0.0.1:" + port
if localOnly == environment.IsFalse {
bindAddress = ":" + port
}
useSsl := askForSsl()
saltFiles := Environment.SaltFiles
if saltFiles == "" {
saltFiles = helper.GenerateRandomString(30)
}
serverSettings = Configuration{
Port: bindAddress,
AdminName: username,
AdminPassword: HashPassword(password, false),
ServerUrl: url,
DefaultDownloads: 1,
DefaultExpiry: 14,
RedirectUrl: redirect,
Files: make(map[string]models.File),
Sessions: make(map[string]models.Session),
Hotlinks: make(map[string]models.Hotlink),
ApiKeys: make(map[string]models.ApiKey),
DownloadStatus: make(map[string]models.DownloadStatus),
ConfigVersion: currentConfigVersion,
SaltAdmin: saltAdmin,
SaltFiles: saltFiles,
DataDir: Environment.DataDir,
LengthId: Environment.LengthId,
UseSsl: useSsl,
MaxFileSizeMB: Environment.MaxFileSize,
}
save()
}
// Save the configuration as a json file
func save() {
file, err := os.OpenFile(Environment.ConfigPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
@@ -240,216 +108,59 @@ func save() {
}
}
// Asks for username or loads it from env and returns input as string if valid
func askForUsername(try int) string {
if try > 5 {
fmt.Println("Too many invalid entries! If you are running the setup with Docker, make sure to start the container with the -it flag.")
osExit(1)
// Return needs to be called, if osExit is replaced turing testing
return ""
func LoadFromSetup(config models.Configuration, cloudConfig *cloudconfig.CloudConfig, isInitialConfig bool) {
Environment = environment.New()
if !isInitialConfig {
Load()
config.DefaultDownloads = serverSettings.DefaultDownloads
config.DefaultExpiry = serverSettings.DefaultExpiry
config.DefaultPassword = serverSettings.DefaultPassword
config.Files = serverSettings.Files
config.Hotlinks = serverSettings.Hotlinks
config.ApiKeys = serverSettings.ApiKeys
}
fmt.Print("Username: ")
envUsername := Environment.AdminName
if envUsername != "" {
fmt.Println(envUsername)
return envUsername
}
username := helper.ReadLine()
if utf8.RuneCountInString(username) >= minLengthUsername {
return username
}
fmt.Println("Username needs to be at least " + strconv.Itoa(minLengthUsername) + " characters long")
return askForUsername(try + 1)
}
// Asks for password or loads it from env and returns input as string if valid
func askForPassword() string {
fmt.Print("Password: ")
envPassword := Environment.AdminPassword
if envPassword != "" {
fmt.Println("*******************")
if utf8.RuneCountInString(envPassword) < minLengthPassword {
fmt.Println("\nPassword needs to be at least " + strconv.Itoa(minLengthPassword) + " characters long")
serverSettings = config
if cloudConfig != nil {
err := cloudconfig.Write(*cloudConfig)
if err != nil {
fmt.Println("Error writing cloud configuration:", err)
osExit(1)
}
return envPassword
}
password1 := helper.ReadPassword()
if utf8.RuneCountInString(password1) < minLengthPassword {
fmt.Println("\nPassword needs to be at least " + strconv.Itoa(minLengthPassword) + " characters long")
return askForPassword()
}
fmt.Print("\nPassword (repeat): ")
password2 := helper.ReadPassword()
if password1 != password2 {
fmt.Println("\nPasswords dont match")
return askForPassword()
}
fmt.Println()
return password1
}
// Asks if the server shall be bound to 127.0.0.1 or loads it from env and returns result as bool
// Always returns environment.IsFalse for Docker environment
func askForLocalOnly() string {
if environment.IsDocker != "false" {
return environment.IsFalse
}
fmt.Print("Bind port to localhost only? [Y/n]: ")
envLocalhost := Environment.WebserverLocalhost
if envLocalhost != "" {
fmt.Println(envLocalhost)
return envLocalhost
}
input := strings.ToLower(helper.ReadLine())
if input == "n" || input == "no" {
return environment.IsFalse
}
return environment.IsTrue
}
// Asks if the server shall use SSL instead of plain text HTTP
func askForSsl() bool {
fmt.Print("Use SSL? [y/N]: ")
useSsl := Environment.UseSsl
if useSsl != "" {
fmt.Println(useSsl)
return useSsl == environment.IsTrue
}
input := strings.ToLower(helper.ReadLine())
if input == "y" || input == "yes" {
return true
}
return false
}
// Asks for server port or loads it from env and returns input as string if valid
func askForPort() string {
fmt.Print("Server Port [" + defaultPort + "]: ")
envPort := Environment.WebserverPort
if envPort != "" {
fmt.Println(envPort)
return envPort
}
port := helper.ReadLine()
if port == "" {
return defaultPort
}
if !isValidPortNumber(port) {
return askForPort()
}
return port
}
// Asks for server URL or loads it from env and returns input as string if valid
func askForUrl(port string) string {
fmt.Print("External Server URL [http://127.0.0.1:" + port + "/]: ")
envUrl := Environment.ExternalUrl
if envUrl != "" {
fmt.Println(envUrl)
if !isValidUrl(envUrl) {
} else {
err := cloudconfig.Delete()
if err != nil {
fmt.Println("Error deleting cloud configuration:", err)
osExit(1)
}
return addTrailingSlash(envUrl)
}
url := helper.ReadLine()
if url == "" {
return "http://127.0.0.1:" + port + "/"
}
if !isValidUrl(url) {
return askForUrl(port)
}
return addTrailingSlash(url)
}
// Asks for redirect URL or loads it from env and returns input as string if valid
func askForRedirect() string {
fmt.Print("URL that the index gets redirected to [https://github.com/Forceu/Gokapi/]: ")
envRedirect := Environment.RedirectUrl
if envRedirect != "" {
fmt.Println(envRedirect)
if !isValidUrl(envRedirect) {
osExit(1)
}
return envRedirect
}
url := helper.ReadLine()
if url == "" {
return "https://github.com/Forceu/Gokapi/"
}
if !isValidUrl(url) {
return askForRedirect()
}
return url
}
// Returns true if URL starts with http:// or https://
func isValidUrl(url string) bool {
if !strings.HasPrefix(url, "http://") && !strings.HasPrefix(url, "https://") {
fmt.Println("URL needs to start with http:// or https://")
return false
}
postfix := strings.Replace(url, "http://", "", -1)
postfix = strings.Replace(postfix, "https://", "", -1)
return len(postfix) > 0
}
// Checks if the string is a valid port number
func isValidPortNumber(input string) bool {
port, err := strconv.Atoi(input)
if err != nil {
fmt.Println("Input needs to be a number")
return false
}
if port < 0 || port > 65353 {
fmt.Println("Port needs to be between 0-65353")
return false
}
return true
}
// Adds a / character to the end of an URL if it does not exist
func addTrailingSlash(url string) string {
if !strings.HasSuffix(url, "/") {
return url + "/"
}
return url
}
// DisplayPasswordReset shows a password prompt in the CLI and saves the new password
func DisplayPasswordReset() {
serverSettings.AdminPassword = HashPassword(askForPassword(), false)
// Log out all sessions
serverSettings.Sessions = make(map[string]models.Session)
save()
}
// HashPassword hashes a string with SHA256 and a salt
func HashPassword(password string, useFileSalt bool) string {
if password == "" {
return ""
}
salt := serverSettings.SaltAdmin
if useFileSalt {
salt = serverSettings.SaltFiles
}
bytes := []byte(password + salt)
hash := sha1.New()
hash.Write(bytes)
return hex.EncodeToString(hash.Sum(nil))
}
// GetLengthId returns the length of the file IDs to be generated
func GetLengthId() int {
return serverSettings.LengthId
}
func IsLoginDisabled() bool {
return serverSettings.DisableLogin
// HashPassword hashes a string with SHA256 and a salt
func HashPassword(password string, useFileSalt bool) string {
if useFileSalt {
return HashPasswordCustomSalt(password, serverSettings.Authentication.SaltFiles)
}
return HashPasswordCustomSalt(password, serverSettings.Authentication.SaltAdmin)
}
func IsLogoutAvailable() bool {
return !serverSettings.DisableLogin && serverSettings.LoginHeaderKey == ""
func HashPasswordCustomSalt(password, salt string) string {
if password == "" {
return ""
}
if salt == "" {
panic(errors.New("no salt provided"))
}
bytes := []byte(password + salt)
hash := sha1.New()
hash.Write(bytes)
return hex.EncodeToString(hash.Sum(nil))
}
var osExit = os.Exit

View File

@@ -4,7 +4,9 @@
package configuration
import (
"Gokapi/internal/environment"
"Gokapi/internal/configuration/cloudconfig"
"Gokapi/internal/configuration/configUpgrade"
"Gokapi/internal/models"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"os"
@@ -20,12 +22,13 @@ func TestMain(m *testing.M) {
}
func TestLoad(t *testing.T) {
test.IsEqualBool(t, Exists(), true)
Load()
test.IsEqualString(t, Environment.ConfigDir, "test")
test.IsEqualString(t, serverSettings.Port, "127.0.0.1:53843")
test.IsEqualString(t, serverSettings.AdminName, "test")
test.IsEqualString(t, serverSettings.Authentication.Username, "test")
test.IsEqualString(t, serverSettings.ServerUrl, "http://127.0.0.1:53843/")
test.IsEqualString(t, serverSettings.AdminPassword, "10340aece68aa4fb14507ae45b05506026f276cf")
test.IsEqualString(t, serverSettings.Authentication.Password, "10340aece68aa4fb14507ae45b05506026f276cf")
test.IsEqualString(t, HashPassword("testtest", false), "10340aece68aa4fb14507ae45b05506026f276cf")
test.IsEqualBool(t, serverSettings.UseSsl, false)
test.IsEqualInt(t, GetLengthId(), 20)
@@ -52,183 +55,75 @@ func TestMutexSession(t *testing.T) {
test.IsEqualInt(t, serverSettings.ConfigVersion, -9)
Release()
<-finished
}
func TestCreateNewConfig(t *testing.T) {
os.Remove("test/config.json")
os.Setenv("GOKAPI_USERNAME", "test2")
os.Setenv("GOKAPI_PASSWORD", "testtest2")
os.Setenv("GOKAPI_PORT", "1234")
os.Setenv("GOKAPI_EXTERNAL_URL", "http://test.com")
os.Setenv("GOKAPI_REDIRECT_URL", "http://test2.com")
os.Setenv("GOKAPI_SALT_ADMIN", "salt123")
os.Setenv("GOKAPI_LOCALHOST", "false")
os.Setenv("GOKAPI_USE_SSL", "false")
Load()
test.IsEqualString(t, Environment.ConfigDir, "test")
test.IsEqualString(t, serverSettings.Port, ":1234")
test.IsEqualString(t, serverSettings.AdminName, "test2")
test.IsEqualString(t, serverSettings.ServerUrl, "http://test.com/")
test.IsEqualString(t, serverSettings.RedirectUrl, "http://test2.com")
test.IsEqualString(t, serverSettings.AdminPassword, "5bbf5684437a4c658d2e0890d784694afb63f715")
test.IsEqualString(t, HashPassword("testtest2", false), "5bbf5684437a4c658d2e0890d784694afb63f715")
test.IsEqualInt(t, serverSettings.LengthId, 15)
test.IsEqualBool(t, serverSettings.UseSsl, false)
os.Remove("test/config.json")
os.Unsetenv("GOKAPI_SALT_ADMIN")
Load()
test.IsEqualInt(t, len(serverSettings.SaltAdmin), 30)
test.IsEqualInt(t, serverSettings.MaxMemory, 20)
test.IsNotEqualString(t, serverSettings.SaltAdmin, "eefwkjqweduiotbrkl##$2342brerlk2321")
test.IsEqualInt(t, serverSettings.MaxFileSizeMB, 102400)
test.IsEqualBool(t, serverSettings.DisableLogin, false)
os.Unsetenv("GOKAPI_USERNAME")
os.Unsetenv("GOKAPI_PASSWORD")
os.Unsetenv("GOKAPI_PORT")
os.Unsetenv("GOKAPI_EXTERNAL_URL")
os.Unsetenv("GOKAPI_REDIRECT_URL")
os.Unsetenv("GOKAPI_LOCALHOST")
os.Unsetenv("GOKAPI_USE_SSL")
GetServerSettingsReadOnly()
ReleaseReadOnly()
}
func TestUpgradeDb(t *testing.T) {
testconfiguration.WriteUpgradeConfigFile()
testconfiguration.WriteUpgradeConfigFileV0()
os.Setenv("GOKAPI_USE_SSL", "true")
os.Setenv("GOKAPI_DISABLE_LOGIN", "true")
os.Setenv("GOKAPI_MAX_FILESIZE", "5")
Load()
test.IsEqualString(t, serverSettings.SaltAdmin, "eefwkjqweduiotbrkl##$2342brerlk2321")
test.IsEqualString(t, serverSettings.SaltFiles, "P1UI5sRNDwuBgOvOYhNsmucZ2pqo4KEvOoqqbpdu")
test.IsEqualString(t, serverSettings.Authentication.SaltAdmin, "eefwkjqweduiotbrkl##$2342brerlk2321")
test.IsEqualString(t, serverSettings.Authentication.SaltFiles, "P1UI5sRNDwuBgOvOYhNsmucZ2pqo4KEvOoqqbpdu")
test.IsEqualString(t, serverSettings.DataDir, Environment.DataDir)
test.IsEqualInt(t, serverSettings.LengthId, 15)
test.IsEqualBool(t, serverSettings.Hotlinks == nil, false)
test.IsEqualBool(t, serverSettings.Sessions == nil, false)
test.IsEqualBool(t, serverSettings.DownloadStatus == nil, false)
test.IsEqualString(t, serverSettings.Files["MgXJLe4XLfpXcL12ec4i"].ContentType, "application/octet-stream")
test.IsEqualInt(t, serverSettings.ConfigVersion, currentConfigVersion)
test.IsEqualBool(t, serverSettings.UseSsl, true)
test.IsEqualInt(t, serverSettings.ConfigVersion, configUpgrade.CurrentConfigVersion)
test.IsEqualBool(t, serverSettings.UseSsl, false)
test.IsEqualInt(t, serverSettings.MaxFileSizeMB, 5)
test.IsEqualBool(t, serverSettings.DisableLogin, true)
os.Unsetenv("GOKAPI_USE_SSL")
os.Unsetenv("GOKAPI_MAX_FILESIZE")
os.Unsetenv("GOKAPI_DISABLE_LOGIN")
testconfiguration.Create(false)
Load()
}
func TestAskForUsername(t *testing.T) {
original := test.StartMockInputStdin("admin")
output := askForUsername(1)
test.StopMockInputStdin(original)
test.IsEqualString(t, output, "admin")
osExit = test.ExitCode(t, 1)
askForUsername(6)
osExit = os.Exit
}
func TestIsValidPortNumber(t *testing.T) {
test.IsEqualBool(t, isValidPortNumber("invalid"), false)
test.IsEqualBool(t, isValidPortNumber("-1"), false)
test.IsEqualBool(t, isValidPortNumber("0"), true)
test.IsEqualBool(t, isValidPortNumber("100"), true)
test.IsEqualBool(t, isValidPortNumber("65353"), true)
test.IsEqualBool(t, isValidPortNumber("65354"), false)
}
func TestHashPassword(t *testing.T) {
test.IsEqualString(t, HashPassword("123", false), "423b63a68c68bd7e07b14590927c1e9a473fe035")
test.IsEqualString(t, HashPassword("", false), "")
test.IsEqualString(t, HashPassword("123", true), "7b30508aa9b233ab4b8a11b2af5816bdb58ca3e7")
}
func TestIsValidUrl(t *testing.T) {
test.IsEqualBool(t, isValidUrl("http://"), false)
test.IsEqualBool(t, isValidUrl("https://"), false)
test.IsEqualBool(t, isValidUrl("invalid"), false)
test.IsEqualBool(t, isValidUrl("http://abc"), true)
test.IsEqualBool(t, isValidUrl("https://abc"), true)
func TestHashPasswordCustomSalt(t *testing.T) {
test.IsEmpty(t, HashPasswordCustomSalt("", "123"))
test.IsEqualString(t, HashPasswordCustomSalt("test", "salt"), "f438229716cab43569496f3a3630b3727524b81b")
defer test.ExpectPanic(t)
HashPasswordCustomSalt("1234", "")
}
func TestAddTrailingSlash(t *testing.T) {
test.IsEqualString(t, addTrailingSlash("abc"), "abc/")
test.IsEqualString(t, addTrailingSlash("abc/"), "abc/")
test.IsEqualString(t, addTrailingSlash("/"), "/")
test.IsEqualString(t, addTrailingSlash(""), "/")
}
func TestLoadFromSetup(t *testing.T) {
newConfig := models.Configuration{
Authentication: models.AuthenticationConfig{},
Port: "localhost:123",
ServerUrl: "serverurl",
RedirectUrl: "redirect",
ConfigVersion: configUpgrade.CurrentConfigVersion,
LengthId: 10,
DataDir: "test",
MaxMemory: 10,
UseSsl: true,
MaxFileSizeMB: 199,
}
newCloudConfig := cloudconfig.CloudConfig{Aws: models.AwsConfig{
Bucket: "bucket",
Region: "region",
KeyId: "keyid",
KeySecret: "secret",
Endpoint: "",
}}
func TestAskForRedirect(t *testing.T) {
original := test.StartMockInputStdin("")
url := askForRedirect()
test.StopMockInputStdin(original)
test.IsEqualString(t, url, "https://github.com/Forceu/Gokapi/")
original = test.StartMockInputStdin("https://test.com")
url = askForRedirect()
test.StopMockInputStdin(original)
test.IsEqualString(t, url, "https://test.com")
}
testconfiguration.WriteCloudConfigFile(true)
LoadFromSetup(newConfig, nil, false)
test.FileDoesNotExist(t, "test/cloudconfig.yml")
test.IsEqualBool(t, serverSettings.Files != nil, true)
test.IsEqualString(t, serverSettings.RedirectUrl, "redirect")
func TestAskForLocalOnly(t *testing.T) {
environment.IsDocker = "true"
test.IsEqualString(t, askForLocalOnly(), environment.IsFalse)
environment.IsDocker = "false"
original := test.StartMockInputStdin("")
test.IsEqualString(t, askForLocalOnly(), environment.IsTrue)
test.StopMockInputStdin(original)
original = test.StartMockInputStdin("no")
test.IsEqualString(t, askForLocalOnly(), environment.IsFalse)
test.StopMockInputStdin(original)
original = test.StartMockInputStdin("yes")
test.IsEqualString(t, askForLocalOnly(), environment.IsTrue)
test.StopMockInputStdin(original)
original = test.StartMockInputStdin("n")
test.IsEqualString(t, askForLocalOnly(), environment.IsFalse)
test.StopMockInputStdin(original)
}
func TestAskForPort(t *testing.T) {
original := test.StartMockInputStdin("8000")
test.IsEqualString(t, askForPort(), "8000")
test.StopMockInputStdin(original)
original = test.StartMockInputStdin("")
test.IsEqualString(t, askForPort(), defaultPort)
test.StopMockInputStdin(original)
}
func TestAskForUrl(t *testing.T) {
original := test.StartMockInputStdin("https://test.com")
test.IsEqualString(t, askForUrl("1234"), "https://test.com/")
test.StopMockInputStdin(original)
original = test.StartMockInputStdin("")
test.IsEqualString(t, askForUrl("1234"), "http://127.0.0.1:1234/")
test.StopMockInputStdin(original)
}
func TestAskForPassword(t *testing.T) {
os.Setenv("GOKAPI_PASSWORD", "not_short")
Load()
test.IsEqualString(t, askForPassword(), "not_short")
}
func TestAskForSsl(t *testing.T) {
original := test.StartMockInputStdin("y")
test.IsEqualBool(t, askForSsl(), true)
test.StartMockInputStdin("n")
test.IsEqualBool(t, askForSsl(), false)
test.StartMockInputStdin("")
test.IsEqualBool(t, askForSsl(), false)
test.StopMockInputStdin(original)
}
func TestExitValues(t *testing.T) {
os.Setenv("GOKAPI_PASSWORD", "short")
os.Setenv("GOKAPI_EXTERNAL_URL", "invalid")
os.Setenv("GOKAPI_REDIRECT_URL", "invalid")
Environment = environment.New()
osExit = test.ExitCode(t, 1)
askForPassword()
osExit = test.ExitCode(t, 1)
askForUrl("123")
osExit = test.ExitCode(t, 1)
askForRedirect()
osExit = os.Exit
LoadFromSetup(newConfig, &newCloudConfig, true)
test.FileExists(t, "test/cloudconfig.yml")
config, ok := cloudconfig.Load()
test.IsEqualBool(t, ok, true)
test.IsEqualString(t, config.Aws.KeyId, "keyid")
test.IsEqualString(t, serverSettings.ServerUrl, "serverurl")
}

View File

@@ -7,6 +7,7 @@ import (
"fmt"
"gopkg.in/yaml.v2"
"io/ioutil"
"os"
)
// CloudConfig contains all configuration values / credentials for cloud storage
@@ -27,6 +28,34 @@ func Load() (CloudConfig, bool) {
return CloudConfig{}, false
}
func Write(config CloudConfig) error {
_, configDir, _, awsConfigPath := environment.GetConfigPaths()
helper.CreateDir(configDir)
file, err := os.OpenFile(awsConfigPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
return err
}
defer file.Close()
encoder := yaml.NewEncoder(file)
err = encoder.Encode(config)
if err != nil {
return err
}
return nil
}
func Delete() error {
_, _, _, awsConfigPath := environment.GetConfigPaths()
if helper.FileExists(awsConfigPath) {
err := os.Remove(awsConfigPath)
if err != nil {
return err
}
}
return nil
}
func loadFromEnv(env *environment.Environment) CloudConfig {
return CloudConfig{Aws: models.AwsConfig{
Bucket: env.AwsBucket,

View File

@@ -19,12 +19,17 @@ func TestMain(m *testing.M) {
}
func TestLoad(t *testing.T) {
os.Unsetenv("GOKAPI_AWS_REGION")
os.Unsetenv("GOKAPI_AWS_KEY")
os.Unsetenv("GOKAPI_AWS_KEY_SECRET")
config, ok := Load()
test.IsEqualBool(t, ok, false)
testconfiguration.WriteCloudConfigFile(true)
os.Setenv("GOKAPI_AWS_BUCKET", "test")
os.Setenv("GOKAPI_AWS_REGION", "test")
os.Setenv("GOKAPI_AWS_KEY", "test")
os.Setenv("GOKAPI_AWS_KEY_SECRET", "test")
config, ok := Load()
config, ok = Load()
test.IsEqualBool(t, ok, true)
test.IsEqualBool(t, config.Aws == models.AwsConfig{
Bucket: "test",
@@ -59,3 +64,29 @@ func TestLoad(t *testing.T) {
test.IsEqualBool(t, ok, false)
test.IsEqualBool(t, config.Aws == models.AwsConfig{}, true)
}
func TestWrite(t *testing.T) {
os.Remove("test/cloudconfig.yml")
test.FileDoesNotExist(t, "test/cloudconfig.yml")
config := CloudConfig{Aws: models.AwsConfig{
Bucket: "test1",
Region: "test2",
Endpoint: "test3",
KeyId: "test4",
KeySecret: "test5",
}}
Write(config)
test.FileExists(t, "test/cloudconfig.yml")
newConfig, ok := Load()
test.IsEqualBool(t, ok, true)
test.IsEqualBool(t, newConfig.Aws == config.Aws, true)
}
func TestDelete(t *testing.T) {
test.FileExists(t, "test/cloudconfig.yml")
err := Delete()
test.IsNil(t, err)
test.FileDoesNotExist(t, "test/cloudconfig.yml")
_, result := loadFromFile("test/cloudconfig.yml")
test.IsEqualBool(t, result, false)
}

View File

@@ -0,0 +1,94 @@
package configUpgrade
import (
"Gokapi/internal/environment"
"Gokapi/internal/helper"
"Gokapi/internal/models"
"encoding/json"
"fmt"
"os"
)
// CurrentConfigVersion is the version of the configuration structure. Used for upgrading
const CurrentConfigVersion = 10
func DoUpgrade(settings *models.Configuration, env *environment.Environment) bool {
if settings.ConfigVersion < CurrentConfigVersion {
updateConfig(settings, env)
fmt.Println("Successfully upgraded database")
settings.ConfigVersion = CurrentConfigVersion
return true
}
return false
}
// Upgrades the settings if saved with a previous version
func updateConfig(settings *models.Configuration, env *environment.Environment) {
// < v1.1.2
if settings.ConfigVersion < 3 {
settings.Authentication.SaltAdmin = "eefwkjqweduiotbrkl##$2342brerlk2321"
settings.Authentication.SaltFiles = "P1UI5sRNDwuBgOvOYhNsmucZ2pqo4KEvOoqqbpdu"
settings.LengthId = 15
settings.DataDir = env.DataDir
}
// < v1.1.3
if settings.ConfigVersion < 4 {
settings.Hotlinks = make(map[string]models.Hotlink)
}
// < v1.1.4
if settings.ConfigVersion < 5 {
settings.LengthId = 15
settings.DownloadStatus = make(map[string]models.DownloadStatus)
for _, file := range settings.Files {
file.ContentType = "application/octet-stream"
settings.Files[file.Id] = file
}
}
// < v1.2.0
if settings.ConfigVersion < 6 {
settings.ApiKeys = make(map[string]models.ApiKey)
}
// < v1.3.0
if settings.ConfigVersion < 7 {
settings.UseSsl = false
}
// < v1.3.1
if settings.ConfigVersion < 8 {
settings.MaxFileSizeMB = env.MaxFileSize
}
// < v1.5.0
if settings.ConfigVersion < 10 {
settings.Authentication.Method = 0 // authentication.AuthenticationInternal
settings.Authentication.HeaderUsers = []string{}
settings.Authentication.OauthUsers = []string{}
legacyConfig := loadLegacyConfig(env)
settings.Authentication.Username = legacyConfig.AdminName
settings.Authentication.Password = legacyConfig.AdminPassword
if legacyConfig.SaltAdmin != "" {
settings.Authentication.SaltAdmin = legacyConfig.SaltAdmin
}
if legacyConfig.SaltFiles != "" {
settings.Authentication.SaltFiles = legacyConfig.SaltFiles
}
}
}
func loadLegacyConfig(env *environment.Environment) configurationLegacy {
file, err := os.Open(env.ConfigPath)
defer file.Close()
helper.Check(err)
decoder := json.NewDecoder(file)
result := configurationLegacy{}
err = decoder.Decode(&result)
helper.Check(err)
return result
}
// configurationLegacy is a struct that contains missing values for the global configuration when loading pre v1.5 format
type configurationLegacy struct {
AdminName string `json:"AdminName"`
AdminPassword string `json:"AdminPassword"`
SaltAdmin string `json:"SaltAdmin"`
SaltFiles string `json:"SaltFiles"`
}

View File

@@ -0,0 +1,73 @@
package configUpgrade
import (
"Gokapi/internal/environment"
"Gokapi/internal/models"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"os"
"testing"
)
var oldConfigFile = models.Configuration{
Authentication: models.AuthenticationConfig{},
Port: "127.0.0.1:53844",
ServerUrl: "https://gokapi.url/",
DefaultDownloads: 1,
DefaultExpiry: 14,
DefaultPassword: "123",
RedirectUrl: "https://github.com/Forceu/Gokapi/",
Sessions: make(map[string]models.Session),
Files: make(map[string]models.File),
}
func TestMain(m *testing.M) {
testconfiguration.Create(false)
exitVal := m.Run()
testconfiguration.Delete()
os.Exit(exitVal)
}
func TestUpgradeDb(t *testing.T) {
testconfiguration.WriteUpgradeConfigFileV0()
os.Setenv("GOKAPI_MAX_FILESIZE", "5")
oldConfigFile.Files["MgXJLe4XLfpXcL12ec4i"] = models.File{
Id: "MgXJLe4XLfpXcL12ec4i",
}
env := environment.New()
bufferConfig := oldConfigFile
upgradeDone := DoUpgrade(&bufferConfig, &env)
test.IsEqualBool(t, upgradeDone, true)
upgradeDone = DoUpgrade(&bufferConfig, &env)
test.IsEqualBool(t, upgradeDone, false)
firstUpgrade := oldConfigFile
upgradeDone = DoUpgrade(&firstUpgrade, &env)
test.IsEqualBool(t, upgradeDone, true)
test.IsEqualString(t, firstUpgrade.Authentication.SaltAdmin, "eefwkjqweduiotbrkl##$2342brerlk2321")
test.IsEqualString(t, firstUpgrade.Authentication.SaltFiles, "P1UI5sRNDwuBgOvOYhNsmucZ2pqo4KEvOoqqbpdu")
test.IsEqualString(t, firstUpgrade.DataDir, env.DataDir)
test.IsEqualInt(t, firstUpgrade.LengthId, 15)
test.IsEqualBool(t, firstUpgrade.Hotlinks == nil, false)
test.IsEqualBool(t, firstUpgrade.Sessions == nil, false)
test.IsEqualBool(t, firstUpgrade.DownloadStatus == nil, false)
test.IsEqualString(t, firstUpgrade.Files["MgXJLe4XLfpXcL12ec4i"].ContentType, "application/octet-stream")
test.IsEqualInt(t, firstUpgrade.ConfigVersion, CurrentConfigVersion)
test.IsEqualInt(t, firstUpgrade.MaxFileSizeMB, 5)
test.IsEqualInt(t, firstUpgrade.Authentication.Method, 0)
test.IsEqualBool(t, firstUpgrade.Authentication.HeaderUsers == nil, false)
test.IsEqualBool(t, firstUpgrade.Authentication.OauthUsers == nil, false)
test.IsEqualString(t, firstUpgrade.Authentication.Username, "admin")
test.IsEqualString(t, firstUpgrade.Authentication.Password, "7450c2403ab85f0e8d5436818b66b99fdd287ac6")
oldConfigFile.ConfigVersion = 8
testconfiguration.WriteUpgradeConfigFileV8()
upgradeDone = DoUpgrade(&oldConfigFile, &env)
test.IsEqualBool(t, upgradeDone, true)
test.IsEqualString(t, oldConfigFile.Authentication.SaltAdmin, "LW6fW4Pjv8GtdWVLSZD66gYEev6NAaXxOVBw7C")
test.IsEqualString(t, oldConfigFile.Authentication.SaltFiles, "lL5wMTtnVCn5TPbpRaSe4vAQodWW0hgk00WCZE")
os.Unsetenv("GOKAPI_MAX_FILESIZE")
}

View File

@@ -46,7 +46,7 @@ func newDownloadStatus(file models.File) models.DownloadStatus {
}
// IsCurrentlyDownloading returns true if file is currently being downloaded
func IsCurrentlyDownloading(file models.File, settings *configuration.Configuration) bool {
func IsCurrentlyDownloading(file models.File, settings *models.Configuration) bool {
for _, status := range settings.DownloadStatus {
if status.FileId == file.Id {
if status.ExpireAt > time.Now().Unix() {

View File

@@ -0,0 +1,464 @@
package setup
import (
"Gokapi/internal/configuration"
"Gokapi/internal/configuration/cloudconfig"
"Gokapi/internal/configuration/configUpgrade"
"Gokapi/internal/environment"
"Gokapi/internal/helper"
"Gokapi/internal/models"
"Gokapi/internal/webserver/authentication"
"context"
"embed"
"encoding/json"
"errors"
"fmt"
"html/template"
"io"
"io/fs"
"log"
"net"
"net/http"
"strconv"
"strings"
"time"
)
// webserverDir is the embedded version of the "static" folder
// This contains JS files, CSS, images etc for the setup
//go:embed static
var webserverDirEmb embed.FS
// templateFolderEmbedded is the embedded version of the "templates" folder
// This contains templates that Gokapi uses for creating the HTML output
//go:embed templates
var templateFolderEmbedded embed.FS
var srv http.Server
var isInitialSetup = true
var username string
var password string
// TODO more validation client side, change extUrl on port change / https
func RunIfFirstStart() {
if !configuration.Exists() {
isInitialSetup = true
startSetupWebserver()
}
}
func RunConfigModification() {
isInitialSetup = false
username = helper.GenerateRandomString(6)
password = helper.GenerateRandomString(10)
fmt.Println()
fmt.Println("###################################################################")
fmt.Println("Use the following credentials for modifying the configuration:")
fmt.Println("Username: " + username)
fmt.Println("Password: " + password)
fmt.Println("###################################################################")
fmt.Println()
startSetupWebserver()
}
func basicAuth(next http.HandlerFunc) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
// No auth required on initial setup
if isInitialSetup {
next.ServeHTTP(w, r)
return
}
enteredUser, enteredPw, ok := r.BasicAuth()
if ok {
usernameMatch := authentication.IsEqualStringConstantTime(enteredUser, username)
passwordMatch := authentication.IsEqualStringConstantTime(enteredPw, password)
if usernameMatch && passwordMatch {
next.ServeHTTP(w, r)
return
}
}
time.Sleep(time.Second)
w.Header().Set("WWW-Authenticate", `Basic realm="restricted", charset="UTF-8"`)
http.Error(w, "Unauthorized", http.StatusUnauthorized)
}
}
func startSetupWebserver() {
port := environment.GetPort()
webserverDir, _ := fs.Sub(webserverDirEmb, "static")
mux := http.NewServeMux()
mux.HandleFunc("/", handleShowMaintenance)
mux.Handle("/setup/", http.FileServer(http.FS(webserverDir)))
mux.HandleFunc("/setup/start", basicAuth(handleShowSetup))
mux.HandleFunc("/setup/setupResult", basicAuth(handleResult))
srv = http.Server{
Addr: ":" + port,
ReadTimeout: 2 * time.Minute,
WriteTimeout: 2 * time.Minute,
Handler: mux,
}
fmt.Println("Please open http://" + resolveHostIp() + ":" + port + "/setup to setup Gokapi.")
// always returns error. ErrServerClosed on graceful close
if err := srv.ListenAndServe(); err != http.ErrServerClosed {
log.Fatalf("ListenAndServe(): %v", err)
}
}
func resolveHostIp() string {
netInterfaceAddresses, err := net.InterfaceAddrs()
if err != nil {
return "[your server IP]"
}
for _, netInterfaceAddress := range netInterfaceAddresses {
networkIp, ok := netInterfaceAddress.(*net.IPNet)
if ok && !networkIp.IP.IsLoopback() && networkIp.IP.To4() != nil {
ip := networkIp.IP.String()
return ip
}
}
return "[your server IP]"
}
type jsonFormObject struct {
Name string `json:"name"`
Value string `json:"value"`
}
func getFormValueString(formObjects *[]jsonFormObject, key string) (string, error) {
for _, formObject := range *formObjects {
if formObject.Name == key {
return formObject.Value, nil
}
}
return "", errors.New("missing value in submitted setup: " + key)
}
func getFormValueBool(formObjects *[]jsonFormObject, key string) (bool, error) {
value, err := getFormValueString(formObjects, key)
if err != nil {
return false, err
}
if value == "0" {
return false, nil
}
if value == "1" {
return true, nil
}
return false, errors.New("could not convert " + key + " to bool, got: " + value)
}
func getFormValueInt(formObjects *[]jsonFormObject, key string) (int, error) {
value, err := getFormValueString(formObjects, key)
if err != nil {
return 0, err
}
result, err := strconv.Atoi(value)
if err != nil {
return 0, errors.New("could not convert " + key + " to int, got: " + value)
}
return result, nil
}
func toConfiguration(formObjects *[]jsonFormObject) (models.Configuration, *cloudconfig.CloudConfig, error) {
var err error
parsedEnv := environment.New()
result := models.Configuration{
DefaultDownloads: 1,
DefaultExpiry: 14,
MaxFileSizeMB: parsedEnv.MaxFileSize,
LengthId: parsedEnv.LengthId,
MaxMemory: parsedEnv.MaxMemory,
DataDir: parsedEnv.DataDir,
Sessions: make(map[string]models.Session),
Files: make(map[string]models.File),
Hotlinks: make(map[string]models.Hotlink),
DownloadStatus: make(map[string]models.DownloadStatus),
ApiKeys: make(map[string]models.ApiKey),
ConfigVersion: configUpgrade.CurrentConfigVersion,
Authentication: models.AuthenticationConfig{
SaltAdmin: helper.GenerateRandomString(30),
SaltFiles: helper.GenerateRandomString(30),
},
}
err = parseBasicAuthSettings(&result, formObjects)
if err != nil {
return models.Configuration{}, nil, err
}
err = parseOAuthSettings(&result, formObjects)
if err != nil {
return models.Configuration{}, nil, err
}
err = parseHeaderAuthSettings(&result, formObjects)
if err != nil {
return models.Configuration{}, nil, err
}
err = parseServerSettings(&result, formObjects)
if err != nil {
return models.Configuration{}, nil, err
}
var cloudSettings *cloudconfig.CloudConfig
cloudSettings, err = parseCloudSettings(formObjects)
if err != nil {
return models.Configuration{}, nil, err
}
return result, cloudSettings, nil
}
func parseBasicAuthSettings(result *models.Configuration, formObjects *[]jsonFormObject) error {
var err error
result.Authentication.Username, err = getFormValueString(formObjects, "auth_username")
if err != nil {
return err
}
pw, err := getFormValueString(formObjects, "auth_pw")
if err != nil {
return err
}
// Password is not displayed in reconf setup, but a placeholder "unc". If this is submitted as a password, the
// old password is kept
if isInitialSetup || pw != "unc" {
result.Authentication.Password = configuration.HashPasswordCustomSalt(pw, result.Authentication.SaltAdmin)
}
return nil
}
func parseOAuthSettings(result *models.Configuration, formObjects *[]jsonFormObject) error {
var err error
result.Authentication.OauthProvider, err = getFormValueString(formObjects, "oauth_provider")
if err != nil {
return err
}
result.Authentication.OAuthClientId, err = getFormValueString(formObjects, "oauth_id")
if err != nil {
return err
}
result.Authentication.OAuthClientSecret, err = getFormValueString(formObjects, "oauth_secret")
if err != nil {
return err
}
oauthAllowedUsers, err := getFormValueString(formObjects, "oauth_header_users")
if err != nil {
return err
}
result.Authentication.OauthUsers = splitAndTrim(oauthAllowedUsers)
return nil
}
func parseHeaderAuthSettings(result *models.Configuration, formObjects *[]jsonFormObject) error {
var err error
result.Authentication.HeaderKey, err = getFormValueString(formObjects, "auth_headerkey")
if err != nil {
return err
}
headerAllowedUsers, err := getFormValueString(formObjects, "auth_header_users")
if err != nil {
return err
}
result.Authentication.HeaderUsers = splitAndTrim(headerAllowedUsers)
return nil
}
func parseServerSettings(result *models.Configuration, formObjects *[]jsonFormObject) error {
var err error
port, err := getFormValueInt(formObjects, "port")
if err != nil {
return err
}
port = verifyPortNumber(port)
bindLocalhost, err := getFormValueBool(formObjects, "localhost_sel")
if err != nil {
return err
}
if bindLocalhost {
result.Port = "127.0.0.1:" + strconv.Itoa(port)
} else {
result.Port = ":" + strconv.Itoa(port)
}
result.ServerUrl, err = getFormValueString(formObjects, "url")
if err != nil {
return err
}
result.RedirectUrl, err = getFormValueString(formObjects, "url_redirection")
if err != nil {
return err
}
result.UseSsl, err = getFormValueBool(formObjects, "ssl_sel")
if err != nil {
return err
}
result.Authentication.Method, err = getFormValueInt(formObjects, "authentication_sel")
if err != nil {
return err
}
result.ServerUrl = addTrailingSlash(result.ServerUrl)
return nil
}
func parseCloudSettings(formObjects *[]jsonFormObject) (*cloudconfig.CloudConfig, error) {
useCloud, err := getFormValueString(formObjects, "storage_sel")
if err != nil {
return nil, err
}
if useCloud == "cloud" {
return getCloudConfig(formObjects)
} else {
return nil, nil
}
}
func getCloudConfig(formObjects *[]jsonFormObject) (*cloudconfig.CloudConfig, error) {
var err error
awsConfig := cloudconfig.CloudConfig{}
awsConfig.Aws.Bucket, err = getFormValueString(formObjects, "s3_bucket")
if err != nil {
return nil, err
}
awsConfig.Aws.Region, err = getFormValueString(formObjects, "s3_region")
if err != nil {
return nil, err
}
awsConfig.Aws.KeyId, err = getFormValueString(formObjects, "s3_api")
if err != nil {
return nil, err
}
awsConfig.Aws.KeySecret, err = getFormValueString(formObjects, "s3_secret")
if err != nil {
return nil, err
}
awsConfig.Aws.Endpoint, err = getFormValueString(formObjects, "s3_endpoint")
if err != nil {
return nil, err
}
return &awsConfig, nil
}
func inputToJsonForm(r *http.Request) ([]jsonFormObject, error) {
reader, _ := io.ReadAll(r.Body)
var setupResult []jsonFormObject
err := json.Unmarshal(reader, &setupResult)
if err != nil {
return nil, err
}
return setupResult, nil
}
func splitAndTrim(input string) []string {
arr := strings.Split(input, ";")
for i := range arr {
arr[i] = strings.TrimSpace(arr[i])
}
return arr
}
type setupView struct {
IsInitialSetup bool
LocalhostOnly bool
Port int
OAuthUsers string
HeaderUsers string
Auth models.AuthenticationConfig
Settings models.Configuration
CloudSettings cloudconfig.CloudConfig
}
func (v *setupView) loadFromConfig() {
v.IsInitialSetup = isInitialSetup
if isInitialSetup {
return
}
configuration.Load()
settings := configuration.GetServerSettingsReadOnly()
v.Settings = *settings
v.Auth = settings.Authentication
v.CloudSettings, _ = cloudconfig.Load()
v.OAuthUsers = strings.Join(settings.Authentication.OauthUsers, ";")
v.HeaderUsers = strings.Join(settings.Authentication.HeaderUsers, ";")
if strings.Contains(settings.Port, "localhost") || strings.Contains(settings.Port, "127.0.0.1") {
v.LocalhostOnly = true
}
portArray := strings.SplitAfter(settings.Port, ":")
port, err := strconv.Atoi(portArray[len(portArray)-1])
if err == nil {
v.Port = port
} else {
v.Port = environment.DefaultPort
}
configuration.ReleaseReadOnly()
}
// Handling of /start
func handleShowSetup(w http.ResponseWriter, r *http.Request) {
templateFolder, err := template.ParseFS(templateFolderEmbedded, "templates/*.tmpl")
helper.Check(err)
view := setupView{}
view.loadFromConfig()
err = templateFolder.ExecuteTemplate(w, "setup", view)
helper.Check(err)
}
func handleShowMaintenance(w http.ResponseWriter, r *http.Request) {
w.Write([]byte("Server is in maintenance mode, please try again in a few minutes."))
}
// Handling of /setupResult
func handleResult(w http.ResponseWriter, r *http.Request) {
setupResult, err := inputToJsonForm(r)
if err != nil {
outputError(w, err)
return
}
newConfig, cloudSettings, err := toConfiguration(&setupResult)
if err != nil {
outputError(w, err)
return
}
configuration.LoadFromSetup(newConfig, cloudSettings, isInitialSetup)
w.WriteHeader(200)
w.Write([]byte("{ \"result\": \"OK\"}"))
go func() {
time.Sleep(1 * time.Second)
srv.Shutdown(context.Background())
}()
}
func outputError(w http.ResponseWriter, err error) {
w.WriteHeader(500)
w.Write([]byte("{ \"result\": \"Error\", \"error\": \"" + err.Error() + "\"}"))
}
// Adds a / character to the end of an URL if it does not exist
func addTrailingSlash(url string) string {
if !strings.HasSuffix(url, "/") {
return url + "/"
}
return url
}
func verifyPortNumber(port int) int {
if port < 0 || port > 65535 {
return environment.DefaultPort
}
return port
}

View File

@@ -0,0 +1,69 @@
package setup
import (
"Gokapi/internal/models"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"Gokapi/internal/webserver/authentication"
"bytes"
"os"
"testing"
)
var jsonForms []jsonFormObject
func TestMain(m *testing.M) {
testconfiguration.SetDirEnv()
exitVal := m.Run()
testconfiguration.Delete()
os.Exit(exitVal)
}
func TestInputToJson(t *testing.T) {
buf := bytes.NewBufferString(testInputBasicAuth)
var err error
_, r := test.GetRecorder("POST", "/setupResult", nil, nil, buf)
jsonForms, err = inputToJsonForm(r)
test.IsNil(t, err)
for _, item := range jsonForms {
if item.Name == "auth_username" {
test.IsEqualString(t, item.Value, "admin")
}
}
}
var config = models.Configuration{
Authentication: models.AuthenticationConfig{},
Port: "",
ServerUrl: "",
DefaultDownloads: 0,
DefaultExpiry: 0,
DefaultPassword: "",
RedirectUrl: "",
Sessions: nil,
Files: nil,
Hotlinks: nil,
DownloadStatus: nil,
ApiKeys: nil,
ConfigVersion: 0,
LengthId: 0,
DataDir: "",
MaxMemory: 0,
UseSsl: false,
MaxFileSizeMB: 0,
}
func TestToConfiguration(t *testing.T) {
output, cloudConfig, err := toConfiguration(&jsonForms)
test.IsNil(t, err)
test.IsEqualInt(t, output.Authentication.Method, authentication.Internal)
test.IsEqualString(t, cloudConfig.Aws.KeyId, "testapi")
test.IsEqualString(t, output.Authentication.Username, "admin")
test.IsNotEqualString(t, output.Authentication.Password, "adminadmin")
test.IsNotEqualString(t, output.Authentication.Password, "")
test.IsEqualString(t, output.RedirectUrl, "https://github.com/Forceu/Gokapi/")
}
var testInputBasicAuth = "[{\"name\":\"authentication_sel\",\"value\":\"0\"},{\"name\":\"auth_username\",\"value\":\"admin\"},{\"name\":\"auth_pw\",\"value\":\"adminadmin\"},{\"name\":\"auth_pw2\",\"value\":\"adminadmin\"},{\"name\":\"oauth_provider\",\"value\":\"\"},{\"name\":\"oauth_id\",\"value\":\"\"},{\"name\":\"oauth_secret\",\"value\":\"\"},{\"name\":\"oauth_header_users\",\"value\":\"\"},{\"name\":\"auth_headerkey\",\"value\":\"\"},{\"name\":\"auth_header_users\",\"value\":\"\"},{\"name\":\"storage_sel\",\"value\":\"cloud\"},{\"name\":\"s3_bucket\",\"value\":\"testbucket\"},{\"name\":\"s3_region\",\"value\":\"testregion\"},{\"name\":\"s3_api\",\"value\":\"testapi\"},{\"name\":\"s3_secret\",\"value\":\"testsecret\"},{\"name\":\"s3_endpoint\",\"value\":\"testendpoint\"},{\"name\":\"localhost_sel\",\"value\":\"0\"},{\"name\":\"ssl_sel\",\"value\":\"0\"},{\"name\":\"port\",\"value\":\"53842\"},{\"name\":\"url\",\"value\":\"http://127.0.0.1:53842/\"},{\"name\":\"url_redirection\",\"value\":\"https://github.com/Forceu/Gokapi/\"}]\n"

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

Binary file not shown.

After

Width:  |  Height:  |  Size: 646 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 872 B

View File

@@ -0,0 +1,413 @@
/* @group Base */
.chzn-container {
font-size: 13px;
position: relative;
display: inline-block;
zoom: 1;
*display: inline;
}
.chzn-container .chzn-drop {
background: #fff;
border: 1px solid #aaa;
border-top: 0;
position: absolute;
top: 29px;
left: 0;
-webkit-box-shadow: 0 4px 5px rgba(0,0,0,.15);
-moz-box-shadow : 0 4px 5px rgba(0,0,0,.15);
box-shadow : 0 4px 5px rgba(0,0,0,.15);
z-index: 1010;
}
/* @end */
/* @group Single Chosen */
.chzn-container-single .chzn-single {
background-color: #ffffff;
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#ffffff', endColorstr='#eeeeee', GradientType=0 );
background-image: -webkit-gradient(linear, 0 0, 0 100%, color-stop(20%, #ffffff), color-stop(50%, #f6f6f6), color-stop(52%, #eeeeee), color-stop(100%, #f4f4f4));
background-image: -webkit-linear-gradient(top, #ffffff 20%, #f6f6f6 50%, #eeeeee 52%, #f4f4f4 100%);
background-image: -moz-linear-gradient(top, #ffffff 20%, #f6f6f6 50%, #eeeeee 52%, #f4f4f4 100%);
background-image: -o-linear-gradient(top, #ffffff 20%, #f6f6f6 50%, #eeeeee 52%, #f4f4f4 100%);
background-image: linear-gradient(#ffffff 20%, #f6f6f6 50%, #eeeeee 52%, #f4f4f4 100%);
-webkit-border-radius: 5px;
-moz-border-radius : 5px;
border-radius : 5px;
-moz-background-clip : padding;
-webkit-background-clip: padding-box;
background-clip : padding-box;
border: 1px solid #aaaaaa;
-webkit-box-shadow: 0 0 3px #ffffff inset, 0 1px 1px rgba(0,0,0,0.1);
-moz-box-shadow : 0 0 3px #ffffff inset, 0 1px 1px rgba(0,0,0,0.1);
box-shadow : 0 0 3px #ffffff inset, 0 1px 1px rgba(0,0,0,0.1);
display: block;
overflow: hidden;
white-space: nowrap;
position: relative;
height: 23px;
line-height: 24px;
padding: 0 0 0 8px;
color: #444444;
text-decoration: none;
}
.chzn-container-single .chzn-default {
color: #999;
}
.chzn-container-single .chzn-single span {
margin-right: 26px;
display: block;
overflow: hidden;
white-space: nowrap;
-o-text-overflow: ellipsis;
-ms-text-overflow: ellipsis;
text-overflow: ellipsis;
}
.chzn-container-single .chzn-single abbr {
display: block;
position: absolute;
right: 26px;
top: 6px;
width: 12px;
height: 12px;
font-size: 1px;
background: url('chosen-sprite.png') -42px 1px no-repeat;
}
.chzn-container-single .chzn-single abbr:hover {
background-position: -42px -10px;
}
.chzn-container-single.chzn-disabled .chzn-single abbr:hover {
background-position: -42px -10px;
}
.chzn-container-single .chzn-single div {
position: absolute;
right: 0;
top: 0;
display: block;
height: 100%;
width: 18px;
}
.chzn-container-single .chzn-single div b {
background: url('chosen-sprite.png') no-repeat 0px 2px;
display: block;
width: 100%;
height: 100%;
}
.chzn-container-single .chzn-search {
padding: 3px 4px;
position: relative;
margin: 0;
white-space: nowrap;
z-index: 1010;
}
.chzn-container-single .chzn-search input {
background: #fff url('chosen-sprite.png') no-repeat 100% -20px;
background: url('chosen-sprite.png') no-repeat 100% -20px, -webkit-gradient(linear, 0 0, 0 100%, color-stop(1%, #eeeeee), color-stop(15%, #ffffff));
background: url('chosen-sprite.png') no-repeat 100% -20px, -webkit-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat 100% -20px, -moz-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat 100% -20px, -o-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat 100% -20px, linear-gradient(#eeeeee 1%, #ffffff 15%);
margin: 1px 0;
padding: 4px 20px 4px 5px;
outline: 0;
border: 1px solid #aaa;
font-family: sans-serif;
font-size: 1em;
}
.chzn-container-single .chzn-drop {
-webkit-border-radius: 0 0 4px 4px;
-moz-border-radius : 0 0 4px 4px;
border-radius : 0 0 4px 4px;
-moz-background-clip : padding;
-webkit-background-clip: padding-box;
background-clip : padding-box;
}
/* @end */
.chzn-container-single-nosearch .chzn-search input {
position: absolute;
left: -9000px;
}
/* @group Multi Chosen */
.chzn-container-multi .chzn-choices {
background-color: #fff;
background-image: -webkit-gradient(linear, 0 0, 0 100%, color-stop(1%, #eeeeee), color-stop(15%, #ffffff));
background-image: -webkit-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background-image: -moz-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background-image: -o-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background-image: linear-gradient(#eeeeee 1%, #ffffff 15%);
border: 1px solid #aaa;
margin: 0;
padding: 0;
cursor: text;
overflow: hidden;
height: auto !important;
height: 1%;
position: relative;
}
.chzn-container-multi .chzn-choices li {
float: left;
list-style: none;
}
.chzn-container-multi .chzn-choices .search-field {
white-space: nowrap;
margin: 0;
padding: 0;
}
.chzn-container-multi .chzn-choices .search-field input {
color: #666;
background: transparent !important;
border: 0 !important;
font-family: sans-serif;
font-size: 100%;
height: 15px;
padding: 5px;
margin: 1px 0;
outline: 0;
-webkit-box-shadow: none;
-moz-box-shadow : none;
box-shadow : none;
}
.chzn-container-multi .chzn-choices .search-field .default {
color: #999;
}
.chzn-container-multi .chzn-choices .search-choice {
-webkit-border-radius: 3px;
-moz-border-radius : 3px;
border-radius : 3px;
-moz-background-clip : padding;
-webkit-background-clip: padding-box;
background-clip : padding-box;
background-color: #e4e4e4;
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#f4f4f4', endColorstr='#eeeeee', GradientType=0 );
background-image: -webkit-gradient(linear, 0 0, 0 100%, color-stop(20%, #f4f4f4), color-stop(50%, #f0f0f0), color-stop(52%, #e8e8e8), color-stop(100%, #eeeeee));
background-image: -webkit-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: -moz-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: -o-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: linear-gradient(#f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
-webkit-box-shadow: 0 0 2px #ffffff inset, 0 1px 0 rgba(0,0,0,0.05);
-moz-box-shadow : 0 0 2px #ffffff inset, 0 1px 0 rgba(0,0,0,0.05);
box-shadow : 0 0 2px #ffffff inset, 0 1px 0 rgba(0,0,0,0.05);
color: #333;
border: 1px solid #aaaaaa;
line-height: 13px;
padding: 3px 20px 3px 5px;
margin: 3px 0 3px 5px;
position: relative;
cursor: default;
}
.chzn-container-multi .chzn-choices .search-choice.search-choice-disabled {
background-color: #e4e4e4;
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#f4f4f4', endColorstr='#eeeeee', GradientType=0 );
background-image: -webkit-gradient(linear, 0% 0%, 0% 100%, color-stop(20%, #f4f4f4), color-stop(50%, #f0f0f0), color-stop(52%, #e8e8e8), color-stop(100%, #eeeeee));
background-image: -webkit-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: -moz-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: -o-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: -ms-linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
background-image: linear-gradient(top, #f4f4f4 20%, #f0f0f0 50%, #e8e8e8 52%, #eeeeee 100%);
color: #666;
border: 1px solid #cccccc;
padding-right: 5px;
}
.chzn-container-multi .chzn-choices .search-choice-focus {
background: #d4d4d4;
}
.chzn-container-multi .chzn-choices .search-choice .search-choice-close {
display: block;
position: absolute;
right: 3px;
top: 4px;
width: 12px;
height: 12px;
font-size: 1px;
background: url('chosen-sprite.png') -42px 1px no-repeat;
}
.chzn-container-multi .chzn-choices .search-choice .search-choice-close:hover {
background-position: -42px -10px;
}
.chzn-container-multi .chzn-choices .search-choice-focus .search-choice-close {
background-position: -42px -10px;
}
/* @end */
/* @group Results */
.chzn-container .chzn-results {
margin: 0 4px 4px 0;
max-height: 240px;
padding: 0 0 0 4px;
position: relative;
overflow-x: hidden;
overflow-y: auto;
-webkit-overflow-scrolling: touch;
}
.chzn-container-multi .chzn-results {
margin: -1px 0 0;
padding: 0;
}
.chzn-container .chzn-results li {
display: none;
line-height: 15px;
padding: 5px 6px;
margin: 0;
list-style: none;
}
.chzn-container .chzn-results .active-result {
cursor: pointer;
display: list-item;
}
.chzn-container .chzn-results .highlighted {
background-color: #3875d7;
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#3875d7', endColorstr='#2a62bc', GradientType=0 );
background-image: -webkit-gradient(linear, 0 0, 0 100%, color-stop(20%, #3875d7), color-stop(90%, #2a62bc));
background-image: -webkit-linear-gradient(top, #3875d7 20%, #2a62bc 90%);
background-image: -moz-linear-gradient(top, #3875d7 20%, #2a62bc 90%);
background-image: -o-linear-gradient(top, #3875d7 20%, #2a62bc 90%);
background-image: linear-gradient(#3875d7 20%, #2a62bc 90%);
color: #fff;
}
.chzn-container .chzn-results li em {
background: #feffde;
font-style: normal;
}
.chzn-container .chzn-results .highlighted em {
background: transparent;
}
.chzn-container .chzn-results .no-results {
background: #f4f4f4;
display: list-item;
}
.chzn-container .chzn-results .group-result {
cursor: default;
color: #999;
font-weight: bold;
}
.chzn-container .chzn-results .group-option {
padding-left: 15px;
}
.chzn-container-multi .chzn-drop .result-selected {
display: none;
}
.chzn-container .chzn-results-scroll {
background: white;
margin: 0 4px;
position: absolute;
text-align: center;
width: 321px; /* This should by dynamic with js */
z-index: 1;
}
.chzn-container .chzn-results-scroll span {
display: inline-block;
height: 17px;
text-indent: -5000px;
width: 9px;
}
.chzn-container .chzn-results-scroll-down {
bottom: 0;
}
.chzn-container .chzn-results-scroll-down span {
background: url('chosen-sprite.png') no-repeat -4px -3px;
}
.chzn-container .chzn-results-scroll-up span {
background: url('chosen-sprite.png') no-repeat -22px -3px;
}
/* @end */
/* @group Active */
.chzn-container-active .chzn-single {
-webkit-box-shadow: 0 0 5px rgba(0,0,0,.3);
-moz-box-shadow : 0 0 5px rgba(0,0,0,.3);
box-shadow : 0 0 5px rgba(0,0,0,.3);
border: 1px solid #5897fb;
}
.chzn-container-active .chzn-single-with-drop {
border: 1px solid #aaa;
-webkit-box-shadow: 0 1px 0 #fff inset;
-moz-box-shadow : 0 1px 0 #fff inset;
box-shadow : 0 1px 0 #fff inset;
background-color: #eee;
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#eeeeee', endColorstr='#ffffff', GradientType=0 );
background-image: -webkit-gradient(linear, 0 0, 0 100%, color-stop(20%, #eeeeee), color-stop(80%, #ffffff));
background-image: -webkit-linear-gradient(top, #eeeeee 20%, #ffffff 80%);
background-image: -moz-linear-gradient(top, #eeeeee 20%, #ffffff 80%);
background-image: -o-linear-gradient(top, #eeeeee 20%, #ffffff 80%);
background-image: linear-gradient(#eeeeee 20%, #ffffff 80%);
-webkit-border-bottom-left-radius : 0;
-webkit-border-bottom-right-radius: 0;
-moz-border-radius-bottomleft : 0;
-moz-border-radius-bottomright: 0;
border-bottom-left-radius : 0;
border-bottom-right-radius: 0;
}
.chzn-container-active .chzn-single-with-drop div {
background: transparent;
border-left: none;
}
.chzn-container-active .chzn-single-with-drop div b {
background-position: -18px 2px;
}
.chzn-container-active .chzn-choices {
-webkit-box-shadow: 0 0 5px rgba(0,0,0,.3);
-moz-box-shadow : 0 0 5px rgba(0,0,0,.3);
box-shadow : 0 0 5px rgba(0,0,0,.3);
border: 1px solid #5897fb;
}
.chzn-container-active .chzn-choices .search-field input {
color: #111 !important;
}
/* @end */
/* @group Disabled Support */
.chzn-disabled {
cursor: default;
opacity:0.5 !important;
}
.chzn-disabled .chzn-single {
cursor: default;
}
.chzn-disabled .chzn-choices .search-choice .search-choice-close {
cursor: default;
}
/* @group Right to Left */
.chzn-rtl { text-align: right; }
.chzn-rtl .chzn-single { padding: 0 8px 0 0; overflow: visible; }
.chzn-rtl .chzn-single span { margin-left: 26px; margin-right: 0; direction: rtl; }
.chzn-rtl .chzn-single div { left: 3px; right: auto; }
.chzn-rtl .chzn-single abbr {
left: 26px;
right: auto;
}
.chzn-rtl .chzn-choices .search-field input { direction: rtl; }
.chzn-rtl .chzn-choices li { float: right; }
.chzn-rtl .chzn-choices .search-choice { padding: 3px 5px 3px 19px; margin: 3px 5px 3px 0; }
.chzn-rtl .chzn-choices .search-choice .search-choice-close { left: 4px; right: auto; }
.chzn-rtl.chzn-container-single .chzn-results { margin: 0 0 4px 4px; padding: 0 4px 0 0; }
.chzn-rtl .chzn-results .group-option { padding-left: 0; padding-right: 15px; }
.chzn-rtl.chzn-container-active .chzn-single-with-drop div { border-right: none; }
.chzn-rtl .chzn-search input {
background: #fff url('chosen-sprite.png') no-repeat -30px -20px;
background: url('chosen-sprite.png') no-repeat -30px -20px, -webkit-gradient(linear, 0 0, 0 100%, color-stop(1%, #eeeeee), color-stop(15%, #ffffff));
background: url('chosen-sprite.png') no-repeat -30px -20px, -webkit-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat -30px -20px, -moz-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat -30px -20px, -o-linear-gradient(top, #eeeeee 1%, #ffffff 15%);
background: url('chosen-sprite.png') no-repeat -30px -20px, linear-gradient(#eeeeee 1%, #ffffff 15%);
padding: 4px 5px 4px 20px;
direction: rtl;
}
.chzn-container-single.chzn-rtl .chzn-single div b {
background-position: 6px 2px;
}
.chzn-container-single.chzn-rtl .chzn-single-with-drop div b {
background-position: -12px 2px;
}
/* @end */
/* @group Retina compatibility */
@media only screen and (-webkit-min-device-pixel-ratio: 2), only screen and (min-resolution: 144dpi) {
.chzn-rtl .chzn-search input, .chzn-container-single .chzn-single abbr, .chzn-container-single .chzn-single div b, .chzn-container-single .chzn-search input, .chzn-container-multi .chzn-choices .search-choice .search-choice-close, .chzn-container .chzn-results-scroll-down span, .chzn-container .chzn-results-scroll-up span {
background-image: url('chosen-sprite@2x.png') !important;
background-repeat: no-repeat !important;
background-size: 52px 37px !important;
}
}
/* @end */

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,229 @@
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd" >
<svg xmlns="http://www.w3.org/2000/svg">
<metadata></metadata>
<defs>
<font id="glyphicons_halflingsregular" horiz-adv-x="1200" >
<font-face units-per-em="1200" ascent="960" descent="-240" />
<missing-glyph horiz-adv-x="500" />
<glyph />
<glyph />
<glyph unicode="&#xd;" />
<glyph unicode=" " />
<glyph unicode="*" d="M100 500v200h259l-183 183l141 141l183 -183v259h200v-259l183 183l141 -141l-183 -183h259v-200h-259l183 -183l-141 -141l-183 183v-259h-200v259l-183 -183l-141 141l183 183h-259z" />
<glyph unicode="+" d="M0 400v300h400v400h300v-400h400v-300h-400v-400h-300v400h-400z" />
<glyph unicode="&#xa0;" />
<glyph unicode="&#x2000;" horiz-adv-x="652" />
<glyph unicode="&#x2001;" horiz-adv-x="1304" />
<glyph unicode="&#x2002;" horiz-adv-x="652" />
<glyph unicode="&#x2003;" horiz-adv-x="1304" />
<glyph unicode="&#x2004;" horiz-adv-x="434" />
<glyph unicode="&#x2005;" horiz-adv-x="326" />
<glyph unicode="&#x2006;" horiz-adv-x="217" />
<glyph unicode="&#x2007;" horiz-adv-x="217" />
<glyph unicode="&#x2008;" horiz-adv-x="163" />
<glyph unicode="&#x2009;" horiz-adv-x="260" />
<glyph unicode="&#x200a;" horiz-adv-x="72" />
<glyph unicode="&#x202f;" horiz-adv-x="260" />
<glyph unicode="&#x205f;" horiz-adv-x="326" />
<glyph unicode="&#x20ac;" d="M100 500l100 100h113q0 47 5 100h-218l100 100h135q37 167 112 257q117 141 297 141q242 0 354 -189q60 -103 66 -209h-181q0 55 -25.5 99t-63.5 68t-75 36.5t-67 12.5q-24 0 -52.5 -10t-62.5 -32t-65.5 -67t-50.5 -107h379l-100 -100h-300q-6 -46 -6 -100h406l-100 -100 h-300q9 -74 33 -132t52.5 -91t62 -54.5t59 -29t46.5 -7.5q29 0 66 13t75 37t63.5 67.5t25.5 96.5h174q-31 -172 -128 -278q-107 -117 -274 -117q-205 0 -324 158q-36 46 -69 131.5t-45 205.5h-217z" />
<glyph unicode="&#x2212;" d="M200 400h900v300h-900v-300z" />
<glyph unicode="&#x2601;" d="M-14 494q0 -80 56.5 -137t135.5 -57h750q120 0 205 86t85 208q0 120 -85 206.5t-205 86.5q-46 0 -90 -14q-44 97 -134.5 156.5t-200.5 59.5q-152 0 -260 -107.5t-108 -260.5q0 -25 2 -37q-66 -14 -108.5 -67.5t-42.5 -122.5z" />
<glyph unicode="&#x2709;" d="M0 100l400 400l200 -200l200 200l400 -400h-1200zM0 300v600l300 -300zM0 1100l600 -603l600 603h-1200zM900 600l300 300v-600z" />
<glyph unicode="&#x270f;" d="M-13 -13l333 112l-223 223zM187 403l214 -214l614 614l-214 214zM887 1103l214 -214l99 92q13 13 13 32.5t-13 33.5l-153 153q-15 13 -33 13t-33 -13z" />
<glyph unicode="&#xe000;" horiz-adv-x="500" d="M0 0z" />
<glyph unicode="&#xe001;" d="M0 1200h1200l-500 -550v-550h300v-100h-800v100h300v550z" />
<glyph unicode="&#xe002;" d="M14 84q18 -55 86 -75.5t147 5.5q65 21 109 69t44 90v606l600 155v-521q-64 16 -138 -7q-79 -26 -122.5 -83t-25.5 -111q17 -55 85.5 -75.5t147.5 4.5q70 23 111.5 63.5t41.5 95.5v881q0 10 -7 15.5t-17 2.5l-752 -193q-10 -3 -17 -12.5t-7 -19.5v-689q-64 17 -138 -7 q-79 -25 -122.5 -82t-25.5 -112z" />
<glyph unicode="&#xe003;" d="M23 693q0 200 142 342t342 142t342 -142t142 -342q0 -142 -78 -261l300 -300q7 -8 7 -18t-7 -18l-109 -109q-8 -7 -18 -7t-18 7l-300 300q-119 -78 -261 -78q-200 0 -342 142t-142 342zM176 693q0 -136 97 -233t234 -97t233.5 96.5t96.5 233.5t-96.5 233.5t-233.5 96.5 t-234 -97t-97 -233z" />
<glyph unicode="&#xe005;" d="M100 784q0 64 28 123t73 100.5t104.5 64t119 20.5t120 -38.5t104.5 -104.5q48 69 109.5 105t121.5 38t118.5 -20.5t102.5 -64t71 -100.5t27 -123q0 -57 -33.5 -117.5t-94 -124.5t-126.5 -127.5t-150 -152.5t-146 -174q-62 85 -145.5 174t-149.5 152.5t-126.5 127.5 t-94 124.5t-33.5 117.5z" />
<glyph unicode="&#xe006;" d="M-72 800h479l146 400h2l146 -400h472l-382 -278l145 -449l-384 275l-382 -275l146 447zM168 71l2 1z" />
<glyph unicode="&#xe007;" d="M-72 800h479l146 400h2l146 -400h472l-382 -278l145 -449l-384 275l-382 -275l146 447zM168 71l2 1zM237 700l196 -142l-73 -226l192 140l195 -141l-74 229l193 140h-235l-77 211l-78 -211h-239z" />
<glyph unicode="&#xe008;" d="M0 0v143l400 257v100q-37 0 -68.5 74.5t-31.5 125.5v200q0 124 88 212t212 88t212 -88t88 -212v-200q0 -51 -31.5 -125.5t-68.5 -74.5v-100l400 -257v-143h-1200z" />
<glyph unicode="&#xe009;" d="M0 0v1100h1200v-1100h-1200zM100 100h100v100h-100v-100zM100 300h100v100h-100v-100zM100 500h100v100h-100v-100zM100 700h100v100h-100v-100zM100 900h100v100h-100v-100zM300 100h600v400h-600v-400zM300 600h600v400h-600v-400zM1000 100h100v100h-100v-100z M1000 300h100v100h-100v-100zM1000 500h100v100h-100v-100zM1000 700h100v100h-100v-100zM1000 900h100v100h-100v-100z" />
<glyph unicode="&#xe010;" d="M0 50v400q0 21 14.5 35.5t35.5 14.5h400q21 0 35.5 -14.5t14.5 -35.5v-400q0 -21 -14.5 -35.5t-35.5 -14.5h-400q-21 0 -35.5 14.5t-14.5 35.5zM0 650v400q0 21 14.5 35.5t35.5 14.5h400q21 0 35.5 -14.5t14.5 -35.5v-400q0 -21 -14.5 -35.5t-35.5 -14.5h-400 q-21 0 -35.5 14.5t-14.5 35.5zM600 50v400q0 21 14.5 35.5t35.5 14.5h400q21 0 35.5 -14.5t14.5 -35.5v-400q0 -21 -14.5 -35.5t-35.5 -14.5h-400q-21 0 -35.5 14.5t-14.5 35.5zM600 650v400q0 21 14.5 35.5t35.5 14.5h400q21 0 35.5 -14.5t14.5 -35.5v-400 q0 -21 -14.5 -35.5t-35.5 -14.5h-400q-21 0 -35.5 14.5t-14.5 35.5z" />
<glyph unicode="&#xe011;" d="M0 50v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM0 450v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200 q-21 0 -35.5 14.5t-14.5 35.5zM0 850v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM400 50v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5 t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM400 450v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM400 850v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5 v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM800 50v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM800 450v200q0 21 14.5 35.5t35.5 14.5h200 q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM800 850v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5z" />
<glyph unicode="&#xe012;" d="M0 50v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM0 450q0 -21 14.5 -35.5t35.5 -14.5h200q21 0 35.5 14.5t14.5 35.5v200q0 21 -14.5 35.5t-35.5 14.5h-200q-21 0 -35.5 -14.5 t-14.5 -35.5v-200zM0 850v200q0 21 14.5 35.5t35.5 14.5h200q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5zM400 50v200q0 21 14.5 35.5t35.5 14.5h700q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5 t-35.5 -14.5h-700q-21 0 -35.5 14.5t-14.5 35.5zM400 450v200q0 21 14.5 35.5t35.5 14.5h700q21 0 35.5 -14.5t14.5 -35.5v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-700q-21 0 -35.5 14.5t-14.5 35.5zM400 850v200q0 21 14.5 35.5t35.5 14.5h700q21 0 35.5 -14.5t14.5 -35.5 v-200q0 -21 -14.5 -35.5t-35.5 -14.5h-700q-21 0 -35.5 14.5t-14.5 35.5z" />
<glyph unicode="&#xe013;" d="M29 454l419 -420l818 820l-212 212l-607 -607l-206 207z" />
<glyph unicode="&#xe014;" d="M106 318l282 282l-282 282l212 212l282 -282l282 282l212 -212l-282 -282l282 -282l-212 -212l-282 282l-282 -282z" />
<glyph unicode="&#xe015;" d="M23 693q0 200 142 342t342 142t342 -142t142 -342q0 -142 -78 -261l300 -300q7 -8 7 -18t-7 -18l-109 -109q-8 -7 -18 -7t-18 7l-300 300q-119 -78 -261 -78q-200 0 -342 142t-142 342zM176 693q0 -136 97 -233t234 -97t233.5 96.5t96.5 233.5t-96.5 233.5t-233.5 96.5 t-234 -97t-97 -233zM300 600v200h100v100h200v-100h100v-200h-100v-100h-200v100h-100z" />
<glyph unicode="&#xe016;" d="M23 694q0 200 142 342t342 142t342 -142t142 -342q0 -141 -78 -262l300 -299q7 -7 7 -18t-7 -18l-109 -109q-8 -8 -18 -8t-18 8l-300 299q-120 -77 -261 -77q-200 0 -342 142t-142 342zM176 694q0 -136 97 -233t234 -97t233.5 97t96.5 233t-96.5 233t-233.5 97t-234 -97 t-97 -233zM300 601h400v200h-400v-200z" />
<glyph unicode="&#xe017;" d="M23 600q0 183 105 331t272 210v-166q-103 -55 -165 -155t-62 -220q0 -177 125 -302t302 -125t302 125t125 302q0 120 -62 220t-165 155v166q167 -62 272 -210t105 -331q0 -118 -45.5 -224.5t-123 -184t-184 -123t-224.5 -45.5t-224.5 45.5t-184 123t-123 184t-45.5 224.5 zM500 750q0 -21 14.5 -35.5t35.5 -14.5h100q21 0 35.5 14.5t14.5 35.5v400q0 21 -14.5 35.5t-35.5 14.5h-100q-21 0 -35.5 -14.5t-14.5 -35.5v-400z" />
<glyph unicode="&#xe018;" d="M100 1h200v300h-200v-300zM400 1v500h200v-500h-200zM700 1v800h200v-800h-200zM1000 1v1200h200v-1200h-200z" />
<glyph unicode="&#xe019;" d="M26 601q0 -33 6 -74l151 -38l2 -6q14 -49 38 -93l3 -5l-80 -134q45 -59 105 -105l133 81l5 -3q45 -26 94 -39l5 -2l38 -151q40 -5 74 -5q27 0 74 5l38 151l6 2q46 13 93 39l5 3l134 -81q56 44 104 105l-80 134l3 5q24 44 39 93l1 6l152 38q5 40 5 74q0 28 -5 73l-152 38 l-1 6q-16 51 -39 93l-3 5l80 134q-44 58 -104 105l-134 -81l-5 3q-45 25 -93 39l-6 1l-38 152q-40 5 -74 5q-27 0 -74 -5l-38 -152l-5 -1q-50 -14 -94 -39l-5 -3l-133 81q-59 -47 -105 -105l80 -134l-3 -5q-25 -47 -38 -93l-2 -6l-151 -38q-6 -48 -6 -73zM385 601 q0 88 63 151t152 63t152 -63t63 -151q0 -89 -63 -152t-152 -63t-152 63t-63 152z" />
<glyph unicode="&#xe020;" d="M100 1025v50q0 10 7.5 17.5t17.5 7.5h275v100q0 41 29.5 70.5t70.5 29.5h300q41 0 70.5 -29.5t29.5 -70.5v-100h275q10 0 17.5 -7.5t7.5 -17.5v-50q0 -11 -7 -18t-18 -7h-1050q-11 0 -18 7t-7 18zM200 100v800h900v-800q0 -41 -29.5 -71t-70.5 -30h-700q-41 0 -70.5 30 t-29.5 71zM300 100h100v700h-100v-700zM500 100h100v700h-100v-700zM500 1100h300v100h-300v-100zM700 100h100v700h-100v-700zM900 100h100v700h-100v-700z" />
<glyph unicode="&#xe021;" d="M1 601l656 644l644 -644h-200v-600h-300v400h-300v-400h-300v600h-200z" />
<glyph unicode="&#xe022;" d="M100 25v1150q0 11 7 18t18 7h475v-500h400v-675q0 -11 -7 -18t-18 -7h-850q-11 0 -18 7t-7 18zM700 800v300l300 -300h-300z" />
<glyph unicode="&#xe023;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM500 500v400h100 v-300h200v-100h-300z" />
<glyph unicode="&#xe024;" d="M-100 0l431 1200h209l-21 -300h162l-20 300h208l431 -1200h-538l-41 400h-242l-40 -400h-539zM488 500h224l-27 300h-170z" />
<glyph unicode="&#xe025;" d="M0 0v400h490l-290 300h200v500h300v-500h200l-290 -300h490v-400h-1100zM813 200h175v100h-175v-100z" />
<glyph unicode="&#xe026;" d="M1 600q0 122 47.5 233t127.5 191t191 127.5t233 47.5t233 -47.5t191 -127.5t127.5 -191t47.5 -233t-47.5 -233t-127.5 -191t-191 -127.5t-233 -47.5t-233 47.5t-191 127.5t-127.5 191t-47.5 233zM188 600q0 -170 121 -291t291 -121t291 121t121 291t-121 291t-291 121 t-291 -121t-121 -291zM350 600h150v300h200v-300h150l-250 -300z" />
<glyph unicode="&#xe027;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM350 600l250 300 l250 -300h-150v-300h-200v300h-150z" />
<glyph unicode="&#xe028;" d="M0 25v475l200 700h800q199 -700 200 -700v-475q0 -11 -7 -18t-18 -7h-1150q-11 0 -18 7t-7 18zM200 500h200l50 -200h300l50 200h200l-97 500h-606z" />
<glyph unicode="&#xe029;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -172 121.5 -293t292.5 -121t292.5 121t121.5 293q0 171 -121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM500 397v401 l297 -200z" />
<glyph unicode="&#xe030;" d="M23 600q0 -118 45.5 -224.5t123 -184t184 -123t224.5 -45.5t224.5 45.5t184 123t123 184t45.5 224.5h-150q0 -177 -125 -302t-302 -125t-302 125t-125 302t125 302t302 125q136 0 246 -81l-146 -146h400v400l-145 -145q-157 122 -355 122q-118 0 -224.5 -45.5t-184 -123 t-123 -184t-45.5 -224.5z" />
<glyph unicode="&#xe031;" d="M23 600q0 118 45.5 224.5t123 184t184 123t224.5 45.5q198 0 355 -122l145 145v-400h-400l147 147q-112 80 -247 80q-177 0 -302 -125t-125 -302h-150zM100 0v400h400l-147 -147q112 -80 247 -80q177 0 302 125t125 302h150q0 -118 -45.5 -224.5t-123 -184t-184 -123 t-224.5 -45.5q-198 0 -355 122z" />
<glyph unicode="&#xe032;" d="M100 0h1100v1200h-1100v-1200zM200 100v900h900v-900h-900zM300 200v100h100v-100h-100zM300 400v100h100v-100h-100zM300 600v100h100v-100h-100zM300 800v100h100v-100h-100zM500 200h500v100h-500v-100zM500 400v100h500v-100h-500zM500 600v100h500v-100h-500z M500 800v100h500v-100h-500z" />
<glyph unicode="&#xe033;" d="M0 100v600q0 41 29.5 70.5t70.5 29.5h100v200q0 82 59 141t141 59h300q82 0 141 -59t59 -141v-200h100q41 0 70.5 -29.5t29.5 -70.5v-600q0 -41 -29.5 -70.5t-70.5 -29.5h-900q-41 0 -70.5 29.5t-29.5 70.5zM400 800h300v150q0 21 -14.5 35.5t-35.5 14.5h-200 q-21 0 -35.5 -14.5t-14.5 -35.5v-150z" />
<glyph unicode="&#xe034;" d="M100 0v1100h100v-1100h-100zM300 400q60 60 127.5 84t127.5 17.5t122 -23t119 -30t110 -11t103 42t91 120.5v500q-40 -81 -101.5 -115.5t-127.5 -29.5t-138 25t-139.5 40t-125.5 25t-103 -29.5t-65 -115.5v-500z" />
<glyph unicode="&#xe035;" d="M0 275q0 -11 7 -18t18 -7h50q11 0 18 7t7 18v300q0 127 70.5 231.5t184.5 161.5t245 57t245 -57t184.5 -161.5t70.5 -231.5v-300q0 -11 7 -18t18 -7h50q11 0 18 7t7 18v300q0 116 -49.5 227t-131 192.5t-192.5 131t-227 49.5t-227 -49.5t-192.5 -131t-131 -192.5 t-49.5 -227v-300zM200 20v460q0 8 6 14t14 6h160q8 0 14 -6t6 -14v-460q0 -8 -6 -14t-14 -6h-160q-8 0 -14 6t-6 14zM800 20v460q0 8 6 14t14 6h160q8 0 14 -6t6 -14v-460q0 -8 -6 -14t-14 -6h-160q-8 0 -14 6t-6 14z" />
<glyph unicode="&#xe036;" d="M0 400h300l300 -200v800l-300 -200h-300v-400zM688 459l141 141l-141 141l71 71l141 -141l141 141l71 -71l-141 -141l141 -141l-71 -71l-141 141l-141 -141z" />
<glyph unicode="&#xe037;" d="M0 400h300l300 -200v800l-300 -200h-300v-400zM700 857l69 53q111 -135 111 -310q0 -169 -106 -302l-67 54q86 110 86 248q0 146 -93 257z" />
<glyph unicode="&#xe038;" d="M0 401v400h300l300 200v-800l-300 200h-300zM702 858l69 53q111 -135 111 -310q0 -170 -106 -303l-67 55q86 110 86 248q0 145 -93 257zM889 951l7 -8q123 -151 123 -344q0 -189 -119 -339l-7 -8l81 -66l6 8q142 178 142 405q0 230 -144 408l-6 8z" />
<glyph unicode="&#xe039;" d="M0 0h500v500h-200v100h-100v-100h-200v-500zM0 600h100v100h400v100h100v100h-100v300h-500v-600zM100 100v300h300v-300h-300zM100 800v300h300v-300h-300zM200 200v100h100v-100h-100zM200 900h100v100h-100v-100zM500 500v100h300v-300h200v-100h-100v-100h-200v100 h-100v100h100v200h-200zM600 0v100h100v-100h-100zM600 1000h100v-300h200v-300h300v200h-200v100h200v500h-600v-200zM800 800v300h300v-300h-300zM900 0v100h300v-100h-300zM900 900v100h100v-100h-100zM1100 200v100h100v-100h-100z" />
<glyph unicode="&#xe040;" d="M0 200h100v1000h-100v-1000zM100 0v100h300v-100h-300zM200 200v1000h100v-1000h-100zM500 0v91h100v-91h-100zM500 200v1000h200v-1000h-200zM700 0v91h100v-91h-100zM800 200v1000h100v-1000h-100zM900 0v91h200v-91h-200zM1000 200v1000h200v-1000h-200z" />
<glyph unicode="&#xe041;" d="M1 700v475q0 10 7.5 17.5t17.5 7.5h474l700 -700l-500 -500zM148 953q0 -42 29 -71q30 -30 71.5 -30t71.5 30q29 29 29 71t-29 71q-30 30 -71.5 30t-71.5 -30q-29 -29 -29 -71z" />
<glyph unicode="&#xe042;" d="M2 700v475q0 11 7 18t18 7h474l700 -700l-500 -500zM148 953q0 -42 30 -71q29 -30 71 -30t71 30q30 29 30 71t-30 71q-29 30 -71 30t-71 -30q-30 -29 -30 -71zM701 1200h100l700 -700l-500 -500l-50 50l450 450z" />
<glyph unicode="&#xe043;" d="M100 0v1025l175 175h925v-1000l-100 -100v1000h-750l-100 -100h750v-1000h-900z" />
<glyph unicode="&#xe044;" d="M200 0l450 444l450 -443v1150q0 20 -14.5 35t-35.5 15h-800q-21 0 -35.5 -15t-14.5 -35v-1151z" />
<glyph unicode="&#xe045;" d="M0 100v700h200l100 -200h600l100 200h200v-700h-200v200h-800v-200h-200zM253 829l40 -124h592l62 124l-94 346q-2 11 -10 18t-18 7h-450q-10 0 -18 -7t-10 -18zM281 24l38 152q2 10 11.5 17t19.5 7h500q10 0 19.5 -7t11.5 -17l38 -152q2 -10 -3.5 -17t-15.5 -7h-600 q-10 0 -15.5 7t-3.5 17z" />
<glyph unicode="&#xe046;" d="M0 200q0 -41 29.5 -70.5t70.5 -29.5h1000q41 0 70.5 29.5t29.5 70.5v600q0 41 -29.5 70.5t-70.5 29.5h-150q-4 8 -11.5 21.5t-33 48t-53 61t-69 48t-83.5 21.5h-200q-41 0 -82 -20.5t-70 -50t-52 -59t-34 -50.5l-12 -20h-150q-41 0 -70.5 -29.5t-29.5 -70.5v-600z M356 500q0 100 72 172t172 72t172 -72t72 -172t-72 -172t-172 -72t-172 72t-72 172zM494 500q0 -44 31 -75t75 -31t75 31t31 75t-31 75t-75 31t-75 -31t-31 -75zM900 700v100h100v-100h-100z" />
<glyph unicode="&#xe047;" d="M53 0h365v66q-41 0 -72 11t-49 38t1 71l92 234h391l82 -222q16 -45 -5.5 -88.5t-74.5 -43.5v-66h417v66q-34 1 -74 43q-18 19 -33 42t-21 37l-6 13l-385 998h-93l-399 -1006q-24 -48 -52 -75q-12 -12 -33 -25t-36 -20l-15 -7v-66zM416 521l178 457l46 -140l116 -317h-340 z" />
<glyph unicode="&#xe048;" d="M100 0v89q41 7 70.5 32.5t29.5 65.5v827q0 28 -1 39.5t-5.5 26t-15.5 21t-29 14t-49 14.5v70h471q120 0 213 -88t93 -228q0 -55 -11.5 -101.5t-28 -74t-33.5 -47.5t-28 -28l-12 -7q8 -3 21.5 -9t48 -31.5t60.5 -58t47.5 -91.5t21.5 -129q0 -84 -59 -156.5t-142 -111 t-162 -38.5h-500zM400 200h161q89 0 153 48.5t64 132.5q0 90 -62.5 154.5t-156.5 64.5h-159v-400zM400 700h139q76 0 130 61.5t54 138.5q0 82 -84 130.5t-239 48.5v-379z" />
<glyph unicode="&#xe049;" d="M200 0v57q77 7 134.5 40.5t65.5 80.5l173 849q10 56 -10 74t-91 37q-6 1 -10.5 2.5t-9.5 2.5v57h425l2 -57q-33 -8 -62 -25.5t-46 -37t-29.5 -38t-17.5 -30.5l-5 -12l-128 -825q-10 -52 14 -82t95 -36v-57h-500z" />
<glyph unicode="&#xe050;" d="M-75 200h75v800h-75l125 167l125 -167h-75v-800h75l-125 -167zM300 900v300h150h700h150v-300h-50q0 29 -8 48.5t-18.5 30t-33.5 15t-39.5 5.5t-50.5 1h-200v-850l100 -50v-100h-400v100l100 50v850h-200q-34 0 -50.5 -1t-40 -5.5t-33.5 -15t-18.5 -30t-8.5 -48.5h-49z " />
<glyph unicode="&#xe051;" d="M33 51l167 125v-75h800v75l167 -125l-167 -125v75h-800v-75zM100 901v300h150h700h150v-300h-50q0 29 -8 48.5t-18 30t-33.5 15t-40 5.5t-50.5 1h-200v-650l100 -50v-100h-400v100l100 50v650h-200q-34 0 -50.5 -1t-39.5 -5.5t-33.5 -15t-18.5 -30t-8 -48.5h-50z" />
<glyph unicode="&#xe052;" d="M0 50q0 -20 14.5 -35t35.5 -15h1100q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-1100q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM0 350q0 -20 14.5 -35t35.5 -15h800q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-800q-21 0 -35.5 -14.5t-14.5 -35.5 v-100zM0 650q0 -20 14.5 -35t35.5 -15h1000q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-1000q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM0 950q0 -20 14.5 -35t35.5 -15h600q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-600q-21 0 -35.5 -14.5 t-14.5 -35.5v-100z" />
<glyph unicode="&#xe053;" d="M0 50q0 -20 14.5 -35t35.5 -15h1100q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-1100q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM0 650q0 -20 14.5 -35t35.5 -15h1100q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-1100q-21 0 -35.5 -14.5t-14.5 -35.5 v-100zM200 350q0 -20 14.5 -35t35.5 -15h700q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-700q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM200 950q0 -20 14.5 -35t35.5 -15h700q21 0 35.5 15t14.5 35v100q0 21 -14.5 35.5t-35.5 14.5h-700q-21 0 -35.5 -14.5 t-14.5 -35.5v-100z" />
<glyph unicode="&#xe054;" d="M0 50v100q0 21 14.5 35.5t35.5 14.5h1100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1100q-21 0 -35.5 15t-14.5 35zM100 650v100q0 21 14.5 35.5t35.5 14.5h1000q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1000q-21 0 -35.5 15 t-14.5 35zM300 350v100q0 21 14.5 35.5t35.5 14.5h800q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-800q-21 0 -35.5 15t-14.5 35zM500 950v100q0 21 14.5 35.5t35.5 14.5h600q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-600 q-21 0 -35.5 15t-14.5 35z" />
<glyph unicode="&#xe055;" d="M0 50v100q0 21 14.5 35.5t35.5 14.5h1100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1100q-21 0 -35.5 15t-14.5 35zM0 350v100q0 21 14.5 35.5t35.5 14.5h1100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1100q-21 0 -35.5 15 t-14.5 35zM0 650v100q0 21 14.5 35.5t35.5 14.5h1100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1100q-21 0 -35.5 15t-14.5 35zM0 950v100q0 21 14.5 35.5t35.5 14.5h1100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-1100 q-21 0 -35.5 15t-14.5 35z" />
<glyph unicode="&#xe056;" d="M0 50v100q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-100q-21 0 -35.5 15t-14.5 35zM0 350v100q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-100q-21 0 -35.5 15 t-14.5 35zM0 650v100q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-100q-21 0 -35.5 15t-14.5 35zM0 950v100q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-100q-21 0 -35.5 15 t-14.5 35zM300 50v100q0 21 14.5 35.5t35.5 14.5h800q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-800q-21 0 -35.5 15t-14.5 35zM300 350v100q0 21 14.5 35.5t35.5 14.5h800q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-800 q-21 0 -35.5 15t-14.5 35zM300 650v100q0 21 14.5 35.5t35.5 14.5h800q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15h-800q-21 0 -35.5 15t-14.5 35zM300 950v100q0 21 14.5 35.5t35.5 14.5h800q21 0 35.5 -14.5t14.5 -35.5v-100q0 -20 -14.5 -35t-35.5 -15 h-800q-21 0 -35.5 15t-14.5 35z" />
<glyph unicode="&#xe057;" d="M-101 500v100h201v75l166 -125l-166 -125v75h-201zM300 0h100v1100h-100v-1100zM500 50q0 -20 14.5 -35t35.5 -15h600q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-600q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM500 350q0 -20 14.5 -35t35.5 -15h300q20 0 35 15t15 35 v100q0 21 -15 35.5t-35 14.5h-300q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM500 650q0 -20 14.5 -35t35.5 -15h500q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-500q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM500 950q0 -20 14.5 -35t35.5 -15h100q20 0 35 15t15 35v100 q0 21 -15 35.5t-35 14.5h-100q-21 0 -35.5 -14.5t-14.5 -35.5v-100z" />
<glyph unicode="&#xe058;" d="M1 50q0 -20 14.5 -35t35.5 -15h600q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-600q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM1 350q0 -20 14.5 -35t35.5 -15h300q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-300q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM1 650 q0 -20 14.5 -35t35.5 -15h500q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-500q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM1 950q0 -20 14.5 -35t35.5 -15h100q20 0 35 15t15 35v100q0 21 -15 35.5t-35 14.5h-100q-21 0 -35.5 -14.5t-14.5 -35.5v-100zM801 0v1100h100v-1100 h-100zM934 550l167 -125v75h200v100h-200v75z" />
<glyph unicode="&#xe059;" d="M0 275v650q0 31 22 53t53 22h750q31 0 53 -22t22 -53v-650q0 -31 -22 -53t-53 -22h-750q-31 0 -53 22t-22 53zM900 600l300 300v-600z" />
<glyph unicode="&#xe060;" d="M0 44v1012q0 18 13 31t31 13h1112q19 0 31.5 -13t12.5 -31v-1012q0 -18 -12.5 -31t-31.5 -13h-1112q-18 0 -31 13t-13 31zM100 263l247 182l298 -131l-74 156l293 318l236 -288v500h-1000v-737zM208 750q0 56 39 95t95 39t95 -39t39 -95t-39 -95t-95 -39t-95 39t-39 95z " />
<glyph unicode="&#xe062;" d="M148 745q0 124 60.5 231.5t165 172t226.5 64.5q123 0 227 -63t164.5 -169.5t60.5 -229.5t-73 -272q-73 -114 -166.5 -237t-150.5 -189l-57 -66q-10 9 -27 26t-66.5 70.5t-96 109t-104 135.5t-100.5 155q-63 139 -63 262zM342 772q0 -107 75.5 -182.5t181.5 -75.5 q107 0 182.5 75.5t75.5 182.5t-75.5 182t-182.5 75t-182 -75.5t-75 -181.5z" />
<glyph unicode="&#xe063;" d="M1 600q0 122 47.5 233t127.5 191t191 127.5t233 47.5t233 -47.5t191 -127.5t127.5 -191t47.5 -233t-47.5 -233t-127.5 -191t-191 -127.5t-233 -47.5t-233 47.5t-191 127.5t-127.5 191t-47.5 233zM173 600q0 -177 125.5 -302t301.5 -125v854q-176 0 -301.5 -125 t-125.5 -302z" />
<glyph unicode="&#xe064;" d="M117 406q0 94 34 186t88.5 172.5t112 159t115 177t87.5 194.5q21 -71 57.5 -142.5t76 -130.5t83 -118.5t82 -117t70 -116t50 -125.5t18.5 -136q0 -89 -39 -165.5t-102 -126.5t-140 -79.5t-156 -33.5q-114 6 -211.5 53t-161.5 138.5t-64 210.5zM243 414q14 -82 59.5 -136 t136.5 -80l16 98q-7 6 -18 17t-34 48t-33 77q-15 73 -14 143.5t10 122.5l9 51q-92 -110 -119.5 -185t-12.5 -156z" />
<glyph unicode="&#xe065;" d="M0 400v300q0 165 117.5 282.5t282.5 117.5q366 -6 397 -14l-186 -186h-311q-41 0 -70.5 -29.5t-29.5 -70.5v-500q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v125l200 200v-225q0 -165 -117.5 -282.5t-282.5 -117.5h-300q-165 0 -282.5 117.5 t-117.5 282.5zM436 341l161 50l412 412l-114 113l-405 -405zM995 1015l113 -113l113 113l-21 85l-92 28z" />
<glyph unicode="&#xe066;" d="M0 400v300q0 165 117.5 282.5t282.5 117.5h261l2 -80q-133 -32 -218 -120h-145q-41 0 -70.5 -29.5t-29.5 -70.5v-500q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5l200 153v-53q0 -165 -117.5 -282.5t-282.5 -117.5h-300q-165 0 -282.5 117.5t-117.5 282.5 zM423 524q30 38 81.5 64t103 35.5t99 14t77.5 3.5l29 -1v-209l360 324l-359 318v-216q-7 0 -19 -1t-48 -8t-69.5 -18.5t-76.5 -37t-76.5 -59t-62 -88t-39.5 -121.5z" />
<glyph unicode="&#xe067;" d="M0 400v300q0 165 117.5 282.5t282.5 117.5h300q60 0 127 -23l-178 -177h-349q-41 0 -70.5 -29.5t-29.5 -70.5v-500q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v69l200 200v-169q0 -165 -117.5 -282.5t-282.5 -117.5h-300q-165 0 -282.5 117.5 t-117.5 282.5zM342 632l283 -284l566 567l-136 137l-430 -431l-147 147z" />
<glyph unicode="&#xe068;" d="M0 603l300 296v-198h200v200h-200l300 300l295 -300h-195v-200h200v198l300 -296l-300 -300v198h-200v-200h195l-295 -300l-300 300h200v200h-200v-198z" />
<glyph unicode="&#xe069;" d="M200 50v1000q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-437l500 487v-1100l-500 488v-438q0 -21 -14.5 -35.5t-35.5 -14.5h-100q-21 0 -35.5 14.5t-14.5 35.5z" />
<glyph unicode="&#xe070;" d="M0 50v1000q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-437l500 487v-487l500 487v-1100l-500 488v-488l-500 488v-438q0 -21 -14.5 -35.5t-35.5 -14.5h-100q-21 0 -35.5 14.5t-14.5 35.5z" />
<glyph unicode="&#xe071;" d="M136 550l564 550v-487l500 487v-1100l-500 488v-488z" />
<glyph unicode="&#xe072;" d="M200 0l900 550l-900 550v-1100z" />
<glyph unicode="&#xe073;" d="M200 150q0 -21 14.5 -35.5t35.5 -14.5h200q21 0 35.5 14.5t14.5 35.5v800q0 21 -14.5 35.5t-35.5 14.5h-200q-21 0 -35.5 -14.5t-14.5 -35.5v-800zM600 150q0 -21 14.5 -35.5t35.5 -14.5h200q21 0 35.5 14.5t14.5 35.5v800q0 21 -14.5 35.5t-35.5 14.5h-200 q-21 0 -35.5 -14.5t-14.5 -35.5v-800z" />
<glyph unicode="&#xe074;" d="M200 150q0 -20 14.5 -35t35.5 -15h800q21 0 35.5 15t14.5 35v800q0 21 -14.5 35.5t-35.5 14.5h-800q-21 0 -35.5 -14.5t-14.5 -35.5v-800z" />
<glyph unicode="&#xe075;" d="M0 0v1100l500 -487v487l564 -550l-564 -550v488z" />
<glyph unicode="&#xe076;" d="M0 0v1100l500 -487v487l500 -487v437q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-1000q0 -21 -14.5 -35.5t-35.5 -14.5h-100q-21 0 -35.5 14.5t-14.5 35.5v438l-500 -488v488z" />
<glyph unicode="&#xe077;" d="M300 0v1100l500 -487v437q0 21 14.5 35.5t35.5 14.5h100q21 0 35.5 -14.5t14.5 -35.5v-1000q0 -21 -14.5 -35.5t-35.5 -14.5h-100q-21 0 -35.5 14.5t-14.5 35.5v438z" />
<glyph unicode="&#xe078;" d="M100 250v100q0 21 14.5 35.5t35.5 14.5h1000q21 0 35.5 -14.5t14.5 -35.5v-100q0 -21 -14.5 -35.5t-35.5 -14.5h-1000q-21 0 -35.5 14.5t-14.5 35.5zM100 500h1100l-550 564z" />
<glyph unicode="&#xe079;" d="M185 599l592 -592l240 240l-353 353l353 353l-240 240z" />
<glyph unicode="&#xe080;" d="M272 194l353 353l-353 353l241 240l572 -571l21 -22l-1 -1v-1l-592 -591z" />
<glyph unicode="&#xe081;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -300t-217.5 -218t-299.5 -80t-299.5 80t-217.5 218t-80 300zM300 500h200v-200h200v200h200v200h-200v200h-200v-200h-200v-200z" />
<glyph unicode="&#xe082;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -300t-217.5 -218t-299.5 -80t-299.5 80t-217.5 218t-80 300zM300 500h600v200h-600v-200z" />
<glyph unicode="&#xe083;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -300t-217.5 -218t-299.5 -80t-299.5 80t-217.5 218t-80 300zM246 459l213 -213l141 142l141 -142l213 213l-142 141l142 141l-213 212l-141 -141l-141 142l-212 -213l141 -141z" />
<glyph unicode="&#xe084;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -299.5t-217.5 -217.5t-299.5 -80t-299.5 80t-217.5 217.5t-80 299.5zM270 551l276 -277l411 411l-175 174l-236 -236l-102 102z" />
<glyph unicode="&#xe085;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -300t-217.5 -218t-299.5 -80t-299.5 80t-217.5 218t-80 300zM363 700h144q4 0 11.5 -1t11 -1t6.5 3t3 9t1 11t3.5 8.5t3.5 6t5.5 4t6.5 2.5t9 1.5t9 0.5h11.5h12.5q19 0 30 -10t11 -26 q0 -22 -4 -28t-27 -22q-5 -1 -12.5 -3t-27 -13.5t-34 -27t-26.5 -46t-11 -68.5h200q5 3 14 8t31.5 25.5t39.5 45.5t31 69t14 94q0 51 -17.5 89t-42 58t-58.5 32t-58.5 15t-51.5 3q-105 0 -172 -56t-67 -183zM500 300h200v100h-200v-100z" />
<glyph unicode="&#xe086;" d="M3 600q0 162 80 299.5t217.5 217.5t299.5 80t299.5 -80t217.5 -217.5t80 -299.5t-80 -300t-217.5 -218t-299.5 -80t-299.5 80t-217.5 218t-80 300zM400 300h400v100h-100v300h-300v-100h100v-200h-100v-100zM500 800h200v100h-200v-100z" />
<glyph unicode="&#xe087;" d="M0 500v200h194q15 60 36 104.5t55.5 86t88 69t126.5 40.5v200h200v-200q54 -20 113 -60t112.5 -105.5t71.5 -134.5h203v-200h-203q-25 -102 -116.5 -186t-180.5 -117v-197h-200v197q-140 27 -208 102.5t-98 200.5h-194zM290 500q24 -73 79.5 -127.5t130.5 -78.5v206h200 v-206q149 48 201 206h-201v200h200q-25 74 -76 127.5t-124 76.5v-204h-200v203q-75 -24 -130 -77.5t-79 -125.5h209v-200h-210z" />
<glyph unicode="&#xe088;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM356 465l135 135 l-135 135l109 109l135 -135l135 135l109 -109l-135 -135l135 -135l-109 -109l-135 135l-135 -135z" />
<glyph unicode="&#xe089;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM322 537l141 141 l87 -87l204 205l142 -142l-346 -345z" />
<glyph unicode="&#xe090;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -115 62 -215l568 567q-100 62 -216 62q-171 0 -292.5 -121.5t-121.5 -292.5zM391 245q97 -59 209 -59q171 0 292.5 121.5t121.5 292.5 q0 112 -59 209z" />
<glyph unicode="&#xe091;" d="M0 547l600 453v-300h600v-300h-600v-301z" />
<glyph unicode="&#xe092;" d="M0 400v300h600v300l600 -453l-600 -448v301h-600z" />
<glyph unicode="&#xe093;" d="M204 600l450 600l444 -600h-298v-600h-300v600h-296z" />
<glyph unicode="&#xe094;" d="M104 600h296v600h300v-600h298l-449 -600z" />
<glyph unicode="&#xe095;" d="M0 200q6 132 41 238.5t103.5 193t184 138t271.5 59.5v271l600 -453l-600 -448v301q-95 -2 -183 -20t-170 -52t-147 -92.5t-100 -135.5z" />
<glyph unicode="&#xe096;" d="M0 0v400l129 -129l294 294l142 -142l-294 -294l129 -129h-400zM635 777l142 -142l294 294l129 -129v400h-400l129 -129z" />
<glyph unicode="&#xe097;" d="M34 176l295 295l-129 129h400v-400l-129 130l-295 -295zM600 600v400l129 -129l295 295l142 -141l-295 -295l129 -130h-400z" />
<glyph unicode="&#xe101;" d="M23 600q0 118 45.5 224.5t123 184t184 123t224.5 45.5t224.5 -45.5t184 -123t123 -184t45.5 -224.5t-45.5 -224.5t-123 -184t-184 -123t-224.5 -45.5t-224.5 45.5t-184 123t-123 184t-45.5 224.5zM456 851l58 -302q4 -20 21.5 -34.5t37.5 -14.5h54q20 0 37.5 14.5 t21.5 34.5l58 302q4 20 -8 34.5t-33 14.5h-207q-20 0 -32 -14.5t-8 -34.5zM500 300h200v100h-200v-100z" />
<glyph unicode="&#xe102;" d="M0 800h100v-200h400v300h200v-300h400v200h100v100h-111v6t-1 15t-3 18l-34 172q-11 39 -41.5 63t-69.5 24q-32 0 -61 -17l-239 -144q-22 -13 -40 -35q-19 24 -40 36l-238 144q-33 18 -62 18q-39 0 -69.5 -23t-40.5 -61l-35 -177q-2 -8 -3 -18t-1 -15v-6h-111v-100z M100 0h400v400h-400v-400zM200 900q-3 0 14 48t35 96l18 47l214 -191h-281zM700 0v400h400v-400h-400zM731 900l202 197q5 -12 12 -32.5t23 -64t25 -72t7 -28.5h-269z" />
<glyph unicode="&#xe103;" d="M0 -22v143l216 193q-9 53 -13 83t-5.5 94t9 113t38.5 114t74 124q47 60 99.5 102.5t103 68t127.5 48t145.5 37.5t184.5 43.5t220 58.5q0 -189 -22 -343t-59 -258t-89 -181.5t-108.5 -120t-122 -68t-125.5 -30t-121.5 -1.5t-107.5 12.5t-87.5 17t-56.5 7.5l-99 -55z M238.5 300.5q19.5 -6.5 86.5 76.5q55 66 367 234q70 38 118.5 69.5t102 79t99 111.5t86.5 148q22 50 24 60t-6 19q-7 5 -17 5t-26.5 -14.5t-33.5 -39.5q-35 -51 -113.5 -108.5t-139.5 -89.5l-61 -32q-369 -197 -458 -401q-48 -111 -28.5 -117.5z" />
<glyph unicode="&#xe104;" d="M111 408q0 -33 5 -63q9 -56 44 -119.5t105 -108.5q31 -21 64 -16t62 23.5t57 49.5t48 61.5t35 60.5q32 66 39 184.5t-13 157.5q79 -80 122 -164t26 -184q-5 -33 -20.5 -69.5t-37.5 -80.5q-10 -19 -14.5 -29t-12 -26t-9 -23.5t-3 -19t2.5 -15.5t11 -9.5t19.5 -5t30.5 2.5 t42 8q57 20 91 34t87.5 44.5t87 64t65.5 88.5t47 122q38 172 -44.5 341.5t-246.5 278.5q22 -44 43 -129q39 -159 -32 -154q-15 2 -33 9q-79 33 -120.5 100t-44 175.5t48.5 257.5q-13 -8 -34 -23.5t-72.5 -66.5t-88.5 -105.5t-60 -138t-8 -166.5q2 -12 8 -41.5t8 -43t6 -39.5 t3.5 -39.5t-1 -33.5t-6 -31.5t-13.5 -24t-21 -20.5t-31 -12q-38 -10 -67 13t-40.5 61.5t-15 81.5t10.5 75q-52 -46 -83.5 -101t-39 -107t-7.5 -85z" />
<glyph unicode="&#xe105;" d="M-61 600l26 40q6 10 20 30t49 63.5t74.5 85.5t97 90t116.5 83.5t132.5 59t145.5 23.5t145.5 -23.5t132.5 -59t116.5 -83.5t97 -90t74.5 -85.5t49 -63.5t20 -30l26 -40l-26 -40q-6 -10 -20 -30t-49 -63.5t-74.5 -85.5t-97 -90t-116.5 -83.5t-132.5 -59t-145.5 -23.5 t-145.5 23.5t-132.5 59t-116.5 83.5t-97 90t-74.5 85.5t-49 63.5t-20 30zM120 600q7 -10 40.5 -58t56 -78.5t68 -77.5t87.5 -75t103 -49.5t125 -21.5t123.5 20t100.5 45.5t85.5 71.5t66.5 75.5t58 81.5t47 66q-1 1 -28.5 37.5t-42 55t-43.5 53t-57.5 63.5t-58.5 54 q49 -74 49 -163q0 -124 -88 -212t-212 -88t-212 88t-88 212q0 85 46 158q-102 -87 -226 -258zM377 656q49 -124 154 -191l105 105q-37 24 -75 72t-57 84l-20 36z" />
<glyph unicode="&#xe106;" d="M-61 600l26 40q6 10 20 30t49 63.5t74.5 85.5t97 90t116.5 83.5t132.5 59t145.5 23.5q61 0 121 -17l37 142h148l-314 -1200h-148l37 143q-82 21 -165 71.5t-140 102t-109.5 112t-72 88.5t-29.5 43zM120 600q210 -282 393 -336l37 141q-107 18 -178.5 101.5t-71.5 193.5 q0 85 46 158q-102 -87 -226 -258zM377 656q49 -124 154 -191l47 47l23 87q-30 28 -59 69t-44 68l-14 26zM780 161l38 145q22 15 44.5 34t46 44t40.5 44t41 50.5t33.5 43.5t33 44t24.5 34q-97 127 -140 175l39 146q67 -54 131.5 -125.5t87.5 -103.5t36 -52l26 -40l-26 -40 q-7 -12 -25.5 -38t-63.5 -79.5t-95.5 -102.5t-124 -100t-146.5 -79z" />
<glyph unicode="&#xe107;" d="M-97.5 34q13.5 -34 50.5 -34h1294q37 0 50.5 35.5t-7.5 67.5l-642 1056q-20 33 -48 36t-48 -29l-642 -1066q-21 -32 -7.5 -66zM155 200l445 723l445 -723h-345v100h-200v-100h-345zM500 600l100 -300l100 300v100h-200v-100z" />
<glyph unicode="&#xe108;" d="M100 262v41q0 20 11 44.5t26 38.5l363 325v339q0 62 44 106t106 44t106 -44t44 -106v-339l363 -325q15 -14 26 -38.5t11 -44.5v-41q0 -20 -12 -26.5t-29 5.5l-359 249v-263q100 -91 100 -113v-64q0 -21 -13 -29t-32 1l-94 78h-222l-94 -78q-19 -9 -32 -1t-13 29v64 q0 22 100 113v263l-359 -249q-17 -12 -29 -5.5t-12 26.5z" />
<glyph unicode="&#xe109;" d="M0 50q0 -20 14.5 -35t35.5 -15h1000q21 0 35.5 15t14.5 35v750h-1100v-750zM0 900h1100v150q0 21 -14.5 35.5t-35.5 14.5h-150v100h-100v-100h-500v100h-100v-100h-150q-21 0 -35.5 -14.5t-14.5 -35.5v-150zM100 100v100h100v-100h-100zM100 300v100h100v-100h-100z M100 500v100h100v-100h-100zM300 100v100h100v-100h-100zM300 300v100h100v-100h-100zM300 500v100h100v-100h-100zM500 100v100h100v-100h-100zM500 300v100h100v-100h-100zM500 500v100h100v-100h-100zM700 100v100h100v-100h-100zM700 300v100h100v-100h-100zM700 500 v100h100v-100h-100zM900 100v100h100v-100h-100zM900 300v100h100v-100h-100zM900 500v100h100v-100h-100z" />
<glyph unicode="&#xe110;" d="M0 200v200h259l600 600h241v198l300 -295l-300 -300v197h-159l-600 -600h-341zM0 800h259l122 -122l141 142l-181 180h-341v-200zM678 381l141 142l122 -123h159v198l300 -295l-300 -300v197h-241z" />
<glyph unicode="&#xe111;" d="M0 400v600q0 41 29.5 70.5t70.5 29.5h1000q41 0 70.5 -29.5t29.5 -70.5v-600q0 -41 -29.5 -70.5t-70.5 -29.5h-596l-304 -300v300h-100q-41 0 -70.5 29.5t-29.5 70.5z" />
<glyph unicode="&#xe112;" d="M100 600v200h300v-250q0 -113 6 -145q17 -92 102 -117q39 -11 92 -11q37 0 66.5 5.5t50 15.5t36 24t24 31.5t14 37.5t7 42t2.5 45t0 47v25v250h300v-200q0 -42 -3 -83t-15 -104t-31.5 -116t-58 -109.5t-89 -96.5t-129 -65.5t-174.5 -25.5t-174.5 25.5t-129 65.5t-89 96.5 t-58 109.5t-31.5 116t-15 104t-3 83zM100 900v300h300v-300h-300zM800 900v300h300v-300h-300z" />
<glyph unicode="&#xe113;" d="M-30 411l227 -227l352 353l353 -353l226 227l-578 579z" />
<glyph unicode="&#xe114;" d="M70 797l580 -579l578 579l-226 227l-353 -353l-352 353z" />
<glyph unicode="&#xe115;" d="M-198 700l299 283l300 -283h-203v-400h385l215 -200h-800v600h-196zM402 1000l215 -200h381v-400h-198l299 -283l299 283h-200v600h-796z" />
<glyph unicode="&#xe116;" d="M18 939q-5 24 10 42q14 19 39 19h896l38 162q5 17 18.5 27.5t30.5 10.5h94q20 0 35 -14.5t15 -35.5t-15 -35.5t-35 -14.5h-54l-201 -961q-2 -4 -6 -10.5t-19 -17.5t-33 -11h-31v-50q0 -20 -14.5 -35t-35.5 -15t-35.5 15t-14.5 35v50h-300v-50q0 -20 -14.5 -35t-35.5 -15 t-35.5 15t-14.5 35v50h-50q-21 0 -35.5 15t-14.5 35q0 21 14.5 35.5t35.5 14.5h535l48 200h-633q-32 0 -54.5 21t-27.5 43z" />
<glyph unicode="&#xe117;" d="M0 0v800h1200v-800h-1200zM0 900v100h200q0 41 29.5 70.5t70.5 29.5h300q41 0 70.5 -29.5t29.5 -70.5h500v-100h-1200z" />
<glyph unicode="&#xe118;" d="M1 0l300 700h1200l-300 -700h-1200zM1 400v600h200q0 41 29.5 70.5t70.5 29.5h300q41 0 70.5 -29.5t29.5 -70.5h500v-200h-1000z" />
<glyph unicode="&#xe119;" d="M302 300h198v600h-198l298 300l298 -300h-198v-600h198l-298 -300z" />
<glyph unicode="&#xe120;" d="M0 600l300 298v-198h600v198l300 -298l-300 -297v197h-600v-197z" />
<glyph unicode="&#xe121;" d="M0 100v100q0 41 29.5 70.5t70.5 29.5h1000q41 0 70.5 -29.5t29.5 -70.5v-100q0 -41 -29.5 -70.5t-70.5 -29.5h-1000q-41 0 -70.5 29.5t-29.5 70.5zM31 400l172 739q5 22 23 41.5t38 19.5h672q19 0 37.5 -22.5t23.5 -45.5l172 -732h-1138zM800 100h100v100h-100v-100z M1000 100h100v100h-100v-100z" />
<glyph unicode="&#xe122;" d="M-101 600v50q0 24 25 49t50 38l25 13v-250l-11 5.5t-24 14t-30 21.5t-24 27.5t-11 31.5zM99 500v250v5q0 13 0.5 18.5t2.5 13t8 10.5t15 3h200l675 250v-850l-675 200h-38l47 -276q2 -12 -3 -17.5t-11 -6t-21 -0.5h-8h-83q-20 0 -34.5 14t-18.5 35q-56 337 -56 351z M1100 200v850q0 21 14.5 35.5t35.5 14.5q20 0 35 -14.5t15 -35.5v-850q0 -20 -15 -35t-35 -15q-21 0 -35.5 15t-14.5 35z" />
<glyph unicode="&#xe123;" d="M74 350q0 21 13.5 35.5t33.5 14.5h17l118 173l63 327q15 77 76 140t144 83l-18 32q-6 19 3 32t29 13h94q20 0 29 -10.5t3 -29.5l-18 -37q83 -19 144 -82.5t76 -140.5l63 -327l118 -173h17q20 0 33.5 -14.5t13.5 -35.5q0 -20 -13 -40t-31 -27q-22 -9 -63 -23t-167.5 -37 t-251.5 -23t-245.5 20.5t-178.5 41.5l-58 20q-18 7 -31 27.5t-13 40.5zM497 110q12 -49 40 -79.5t63 -30.5t63 30.5t39 79.5q-48 -6 -102 -6t-103 6z" />
<glyph unicode="&#xe124;" d="M21 445l233 -45l-78 -224l224 78l45 -233l155 179l155 -179l45 233l224 -78l-78 224l234 45l-180 155l180 156l-234 44l78 225l-224 -78l-45 233l-155 -180l-155 180l-45 -233l-224 78l78 -225l-233 -44l179 -156z" />
<glyph unicode="&#xe125;" d="M0 200h200v600h-200v-600zM300 275q0 -75 100 -75h61q123 -100 139 -100h250q46 0 83 57l238 344q29 31 29 74v100q0 44 -30.5 84.5t-69.5 40.5h-328q28 118 28 125v150q0 44 -30.5 84.5t-69.5 40.5h-50q-27 0 -51 -20t-38 -48l-96 -198l-145 -196q-20 -26 -20 -63v-400z M400 300v375l150 212l100 213h50v-175l-50 -225h450v-125l-250 -375h-214l-136 100h-100z" />
<glyph unicode="&#xe126;" d="M0 400v600h200v-600h-200zM300 525v400q0 75 100 75h61q123 100 139 100h250q46 0 83 -57l238 -344q29 -31 29 -74v-100q0 -44 -30.5 -84.5t-69.5 -40.5h-328q28 -118 28 -125v-150q0 -44 -30.5 -84.5t-69.5 -40.5h-50q-27 0 -51 20t-38 48l-96 198l-145 196 q-20 26 -20 63zM400 525l150 -212l100 -213h50v175l-50 225h450v125l-250 375h-214l-136 -100h-100v-375z" />
<glyph unicode="&#xe127;" d="M8 200v600h200v-600h-200zM308 275v525q0 17 14 35.5t28 28.5l14 9l362 230q14 6 25 6q17 0 29 -12l109 -112q14 -14 14 -34q0 -18 -11 -32l-85 -121h302q85 0 138.5 -38t53.5 -110t-54.5 -111t-138.5 -39h-107l-130 -339q-7 -22 -20.5 -41.5t-28.5 -19.5h-341 q-7 0 -90 81t-83 94zM408 289l100 -89h293l131 339q6 21 19.5 41t28.5 20h203q16 0 25 15t9 36q0 20 -9 34.5t-25 14.5h-457h-6.5h-7.5t-6.5 0.5t-6 1t-5 1.5t-5.5 2.5t-4 4t-4 5.5q-5 12 -5 20q0 14 10 27l147 183l-86 83l-339 -236v-503z" />
<glyph unicode="&#xe128;" d="M-101 651q0 72 54 110t139 37h302l-85 121q-11 16 -11 32q0 21 14 34l109 113q13 12 29 12q11 0 25 -6l365 -230q7 -4 16.5 -10.5t26 -26t16.5 -36.5v-526q0 -13 -85.5 -93.5t-93.5 -80.5h-342q-15 0 -28.5 20t-19.5 41l-131 339h-106q-84 0 -139 39t-55 111zM-1 601h222 q15 0 28.5 -20.5t19.5 -40.5l131 -339h293l106 89v502l-342 237l-87 -83l145 -184q10 -11 10 -26q0 -11 -5 -20q-1 -3 -3.5 -5.5l-4 -4t-5 -2.5t-5.5 -1.5t-6.5 -1t-6.5 -0.5h-7.5h-6.5h-476v-100zM999 201v600h200v-600h-200z" />
<glyph unicode="&#xe129;" d="M97 719l230 -363q4 -6 10.5 -15.5t26 -25t36.5 -15.5h525q13 0 94 83t81 90v342q0 15 -20 28.5t-41 19.5l-339 131v106q0 84 -39 139t-111 55t-110 -53.5t-38 -138.5v-302l-121 84q-15 12 -33.5 11.5t-32.5 -13.5l-112 -110q-22 -22 -6 -53zM172 739l83 86l183 -146 q22 -18 47 -5q3 1 5.5 3.5l4 4t2.5 5t1.5 5.5t1 6.5t0.5 6v7.5v7v456q0 22 25 31t50 -0.5t25 -30.5v-202q0 -16 20 -29.5t41 -19.5l339 -130v-294l-89 -100h-503zM400 0v200h600v-200h-600z" />
<glyph unicode="&#xe130;" d="M1 585q-15 -31 7 -53l112 -110q13 -13 32 -13.5t34 10.5l121 85l-1 -302q0 -84 38.5 -138t110.5 -54t111 55t39 139v106l339 131q20 6 40.5 19.5t20.5 28.5v342q0 7 -81 90t-94 83h-525q-17 0 -35.5 -14t-28.5 -28l-10 -15zM76 565l237 339h503l89 -100v-294l-340 -130 q-20 -6 -40 -20t-20 -29v-202q0 -22 -25 -31t-50 0t-25 31v456v14.5t-1.5 11.5t-5 12t-9.5 7q-24 13 -46 -5l-184 -146zM305 1104v200h600v-200h-600z" />
<glyph unicode="&#xe131;" d="M5 597q0 122 47.5 232.5t127.5 190.5t190.5 127.5t232.5 47.5q162 0 299.5 -80t217.5 -218t80 -300t-80 -299.5t-217.5 -217.5t-299.5 -80t-300 80t-218 217.5t-80 299.5zM300 500h300l-2 -194l402 294l-402 298v-197h-298v-201z" />
<glyph unicode="&#xe132;" d="M0 597q0 122 47.5 232.5t127.5 190.5t190.5 127.5t231.5 47.5q122 0 232.5 -47.5t190.5 -127.5t127.5 -190.5t47.5 -232.5q0 -162 -80 -299.5t-218 -217.5t-300 -80t-299.5 80t-217.5 217.5t-80 299.5zM200 600l400 -294v194h302v201h-300v197z" />
<glyph unicode="&#xe133;" d="M5 597q0 122 47.5 232.5t127.5 190.5t190.5 127.5t232.5 47.5q121 0 231.5 -47.5t190.5 -127.5t127.5 -190.5t47.5 -232.5q0 -162 -80 -299.5t-217.5 -217.5t-299.5 -80t-300 80t-218 217.5t-80 299.5zM300 600h200v-300h200v300h200l-300 400z" />
<glyph unicode="&#xe134;" d="M5 597q0 122 47.5 232.5t127.5 190.5t190.5 127.5t232.5 47.5q121 0 231.5 -47.5t190.5 -127.5t127.5 -190.5t47.5 -232.5q0 -162 -80 -299.5t-217.5 -217.5t-299.5 -80t-300 80t-218 217.5t-80 299.5zM300 600l300 -400l300 400h-200v300h-200v-300h-200z" />
<glyph unicode="&#xe135;" d="M5 597q0 122 47.5 232.5t127.5 190.5t190.5 127.5t232.5 47.5q121 0 231.5 -47.5t190.5 -127.5t127.5 -190.5t47.5 -232.5q0 -162 -80 -299.5t-217.5 -217.5t-299.5 -80t-300 80t-218 217.5t-80 299.5zM254 780q-8 -34 5.5 -93t7.5 -87q0 -9 17 -44t16 -60q12 0 23 -5.5 t23 -15t20 -13.5q20 -10 108 -42q22 -8 53 -31.5t59.5 -38.5t57.5 -11q8 -18 -15 -55.5t-20 -57.5q12 -21 22.5 -34.5t28 -27t36.5 -17.5q0 -6 -3 -15.5t-3.5 -14.5t4.5 -17q101 -2 221 111q31 30 47 48t34 49t21 62q-14 9 -37.5 9.5t-35.5 7.5q-14 7 -49 15t-52 19 q-9 0 -39.5 -0.5t-46.5 -1.5t-39 -6.5t-39 -16.5q-50 -35 -66 -12q-4 2 -3.5 25.5t0.5 25.5q-6 13 -26.5 17t-24.5 7q2 22 -2 41t-16.5 28t-38.5 -20q-23 -25 -42 4q-19 28 -8 58q8 16 22 22q6 -1 26 -1.5t33.5 -4.5t19.5 -13q12 -19 32 -37.5t34 -27.5l14 -8q0 3 9.5 39.5 t5.5 57.5q-4 23 14.5 44.5t22.5 31.5q5 14 10 35t8.5 31t15.5 22.5t34 21.5q-6 18 10 37q8 0 23.5 -1.5t24.5 -1.5t20.5 4.5t20.5 15.5q-10 23 -30.5 42.5t-38 30t-49 26.5t-43.5 23q11 41 1 44q31 -13 58.5 -14.5t39.5 3.5l11 4q6 36 -17 53.5t-64 28.5t-56 23 q-19 -3 -37 0q-15 -12 -36.5 -21t-34.5 -12t-44 -8t-39 -6q-15 -3 -46 0t-45 -3q-20 -6 -51.5 -25.5t-34.5 -34.5q-3 -11 6.5 -22.5t8.5 -18.5q-3 -34 -27.5 -91t-29.5 -79zM518 915q3 12 16 30.5t16 25.5q10 -10 18.5 -10t14 6t14.5 14.5t16 12.5q0 -18 8 -42.5t16.5 -44 t9.5 -23.5q-6 1 -39 5t-53.5 10t-36.5 16z" />
<glyph unicode="&#xe136;" d="M0 164.5q0 21.5 15 37.5l600 599q-33 101 6 201.5t135 154.5q164 92 306 -9l-259 -138l145 -232l251 126q13 -175 -151 -267q-123 -70 -253 -23l-596 -596q-15 -16 -36.5 -16t-36.5 16l-111 110q-15 15 -15 36.5z" />
<glyph unicode="&#xe137;" horiz-adv-x="1220" d="M0 196v100q0 41 29.5 70.5t70.5 29.5h1000q41 0 70.5 -29.5t29.5 -70.5v-100q0 -41 -29.5 -70.5t-70.5 -29.5h-1000q-41 0 -70.5 29.5t-29.5 70.5zM0 596v100q0 41 29.5 70.5t70.5 29.5h1000q41 0 70.5 -29.5t29.5 -70.5v-100q0 -41 -29.5 -70.5t-70.5 -29.5h-1000 q-41 0 -70.5 29.5t-29.5 70.5zM0 996v100q0 41 29.5 70.5t70.5 29.5h1000q41 0 70.5 -29.5t29.5 -70.5v-100q0 -41 -29.5 -70.5t-70.5 -29.5h-1000q-41 0 -70.5 29.5t-29.5 70.5zM600 596h500v100h-500v-100zM800 196h300v100h-300v-100zM900 996h200v100h-200v-100z" />
<glyph unicode="&#xe138;" d="M100 1100v100h1000v-100h-1000zM150 1000h900l-350 -500v-300l-200 -200v500z" />
<glyph unicode="&#xe139;" d="M0 200v200h1200v-200q0 -41 -29.5 -70.5t-70.5 -29.5h-1000q-41 0 -70.5 29.5t-29.5 70.5zM0 500v400q0 41 29.5 70.5t70.5 29.5h300v100q0 41 29.5 70.5t70.5 29.5h200q41 0 70.5 -29.5t29.5 -70.5v-100h300q41 0 70.5 -29.5t29.5 -70.5v-400h-500v100h-200v-100h-500z M500 1000h200v100h-200v-100z" />
<glyph unicode="&#xe140;" d="M0 0v400l129 -129l200 200l142 -142l-200 -200l129 -129h-400zM0 800l129 129l200 -200l142 142l-200 200l129 129h-400v-400zM729 329l142 142l200 -200l129 129v-400h-400l129 129zM729 871l200 200l-129 129h400v-400l-129 129l-200 -200z" />
<glyph unicode="&#xe141;" d="M0 596q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM182 596q0 -172 121.5 -293t292.5 -121t292.5 121t121.5 293q0 171 -121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM291 655 q0 23 15.5 38.5t38.5 15.5t39 -16t16 -38q0 -23 -16 -39t-39 -16q-22 0 -38 16t-16 39zM400 850q0 22 16 38.5t39 16.5q22 0 38 -16t16 -39t-16 -39t-38 -16q-23 0 -39 16.5t-16 38.5zM513 609q0 32 21 56.5t52 29.5l122 126l1 1q-9 14 -9 28q0 22 16 38.5t39 16.5 q22 0 38 -16t16 -39t-16 -39t-38 -16q-16 0 -29 10l-55 -145q17 -22 17 -51q0 -36 -25.5 -61.5t-61.5 -25.5q-37 0 -62.5 25.5t-25.5 61.5zM800 655q0 22 16 38t39 16t38.5 -15.5t15.5 -38.5t-16 -39t-38 -16q-23 0 -39 16t-16 39z" />
<glyph unicode="&#xe142;" d="M-40 375q-13 -95 35 -173q35 -57 94 -89t129 -32q63 0 119 28q33 16 65 40.5t52.5 45.5t59.5 64q40 44 57 61l394 394q35 35 47 84t-3 96q-27 87 -117 104q-20 2 -29 2q-46 0 -79.5 -17t-67.5 -51l-388 -396l-7 -7l69 -67l377 373q20 22 39 38q23 23 50 23q38 0 53 -36 q16 -39 -20 -75l-547 -547q-52 -52 -125 -52q-55 0 -100 33t-54 96q-5 35 2.5 66t31.5 63t42 50t56 54q24 21 44 41l348 348q52 52 82.5 79.5t84 54t107.5 26.5q25 0 48 -4q95 -17 154 -94.5t51 -175.5q-7 -101 -98 -192l-252 -249l-253 -256l7 -7l69 -60l517 511 q67 67 95 157t11 183q-16 87 -67 154t-130 103q-69 33 -152 33q-107 0 -197 -55q-40 -24 -111 -95l-512 -512q-68 -68 -81 -163z" />
<glyph unicode="&#xe143;" d="M79 784q0 131 99 229.5t230 98.5q144 0 242 -129q103 129 245 129q130 0 227 -98.5t97 -229.5q0 -46 -17.5 -91t-61 -99t-77 -89.5t-104.5 -105.5q-197 -191 -293 -322l-17 -23l-16 23q-43 58 -100 122.5t-92 99.5t-101 100l-84.5 84.5t-68 74t-60 78t-33.5 70.5t-15 78z M250 784q0 -27 30.5 -70t61.5 -75.5t95 -94.5l22 -22q93 -90 190 -201q82 92 195 203l12 12q64 62 97.5 97t64.5 79t31 72q0 71 -48 119.5t-106 48.5q-73 0 -131 -83l-118 -171l-114 174q-51 80 -124 80q-59 0 -108.5 -49.5t-49.5 -118.5z" />
<glyph unicode="&#xe144;" d="M57 353q0 -94 66 -160l141 -141q66 -66 159 -66q95 0 159 66l283 283q66 66 66 159t-66 159l-141 141q-12 12 -19 17l-105 -105l212 -212l-389 -389l-247 248l95 95l-18 18q-46 45 -75 101l-55 -55q-66 -66 -66 -159zM269 706q0 -93 66 -159l141 -141l19 -17l105 105 l-212 212l389 389l247 -247l-95 -96l18 -18q46 -46 77 -99l29 29q35 35 62.5 88t27.5 96q0 93 -66 159l-141 141q-66 66 -159 66q-95 0 -159 -66l-283 -283q-66 -64 -66 -159z" />
<glyph unicode="&#xe145;" d="M200 100v953q0 21 30 46t81 48t129 38t163 15t162 -15t127 -38t79 -48t29 -46v-953q0 -41 -29.5 -70.5t-70.5 -29.5h-600q-41 0 -70.5 29.5t-29.5 70.5zM300 300h600v700h-600v-700zM496 150q0 -43 30.5 -73.5t73.5 -30.5t73.5 30.5t30.5 73.5t-30.5 73.5t-73.5 30.5 t-73.5 -30.5t-30.5 -73.5z" />
<glyph unicode="&#xe146;" d="M0 0l303 380l207 208l-210 212h300l267 279l-35 36q-15 14 -15 35t15 35q14 15 35 15t35 -15l283 -282q15 -15 15 -36t-15 -35q-14 -15 -35 -15t-35 15l-36 35l-279 -267v-300l-212 210l-208 -207z" />
<glyph unicode="&#xe148;" d="M295 433h139q5 -77 48.5 -126.5t117.5 -64.5v335l-27 7q-46 14 -79 26.5t-72 36t-62.5 52t-40 72.5t-16.5 99q0 92 44 159.5t109 101t144 40.5v78h100v-79q38 -4 72.5 -13.5t75.5 -31.5t71 -53.5t51.5 -84t24.5 -118.5h-159q-8 72 -35 109.5t-101 50.5v-307l64 -14 q34 -7 64 -16.5t70 -31.5t67.5 -52t47.5 -80.5t20 -112.5q0 -139 -89 -224t-244 -96v-77h-100v78q-152 17 -237 104q-40 40 -52.5 93.5t-15.5 139.5zM466 889q0 -29 8 -51t16.5 -34t29.5 -22.5t31 -13.5t38 -10q7 -2 11 -3v274q-61 -8 -97.5 -37.5t-36.5 -102.5zM700 237 q170 18 170 151q0 64 -44 99.5t-126 60.5v-311z" />
<glyph unicode="&#xe149;" d="M100 600v100h166q-24 49 -44 104q-10 26 -14.5 55.5t-3 72.5t25 90t68.5 87q97 88 263 88q129 0 230 -89t101 -208h-153q0 52 -34 89.5t-74 51.5t-76 14q-37 0 -79 -14.5t-62 -35.5q-41 -44 -41 -101q0 -11 2.5 -24.5t5.5 -24t9.5 -26.5t10.5 -25t14 -27.5t14 -25.5 t15.5 -27t13.5 -24h242v-100h-197q8 -50 -2.5 -115t-31.5 -94q-41 -59 -99 -113q35 11 84 18t70 7q32 1 102 -16t104 -17q76 0 136 30l50 -147q-41 -25 -80.5 -36.5t-59 -13t-61.5 -1.5q-23 0 -128 33t-155 29q-39 -4 -82 -17t-66 -25l-24 -11l-55 145l16.5 11t15.5 10 t13.5 9.5t14.5 12t14.5 14t17.5 18.5q48 55 54 126.5t-30 142.5h-221z" />
<glyph unicode="&#xe150;" d="M2 300l298 -300l298 300h-198v900h-200v-900h-198zM602 900l298 300l298 -300h-198v-900h-200v900h-198z" />
<glyph unicode="&#xe151;" d="M2 300h198v900h200v-900h198l-298 -300zM700 0v200h100v-100h200v-100h-300zM700 400v100h300v-200h-99v-100h-100v100h99v100h-200zM700 700v500h300v-500h-100v100h-100v-100h-100zM801 900h100v200h-100v-200z" />
<glyph unicode="&#xe152;" d="M2 300h198v900h200v-900h198l-298 -300zM700 0v500h300v-500h-100v100h-100v-100h-100zM700 700v200h100v-100h200v-100h-300zM700 1100v100h300v-200h-99v-100h-100v100h99v100h-200zM801 200h100v200h-100v-200z" />
<glyph unicode="&#xe153;" d="M2 300l298 -300l298 300h-198v900h-200v-900h-198zM800 100v400h300v-500h-100v100h-200zM800 1100v100h200v-500h-100v400h-100zM901 200h100v200h-100v-200z" />
<glyph unicode="&#xe154;" d="M2 300l298 -300l298 300h-198v900h-200v-900h-198zM800 400v100h200v-500h-100v400h-100zM800 800v400h300v-500h-100v100h-200zM901 900h100v200h-100v-200z" />
<glyph unicode="&#xe155;" d="M2 300l298 -300l298 300h-198v900h-200v-900h-198zM700 100v200h500v-200h-500zM700 400v200h400v-200h-400zM700 700v200h300v-200h-300zM700 1000v200h200v-200h-200z" />
<glyph unicode="&#xe156;" d="M2 300l298 -300l298 300h-198v900h-200v-900h-198zM700 100v200h200v-200h-200zM700 400v200h300v-200h-300zM700 700v200h400v-200h-400zM700 1000v200h500v-200h-500z" />
<glyph unicode="&#xe157;" d="M0 400v300q0 165 117.5 282.5t282.5 117.5h300q162 0 281 -118.5t119 -281.5v-300q0 -165 -118.5 -282.5t-281.5 -117.5h-300q-165 0 -282.5 117.5t-117.5 282.5zM200 300q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5 h-500q-41 0 -70.5 -29.5t-29.5 -70.5v-500z" />
<glyph unicode="&#xe158;" d="M0 400v300q0 163 119 281.5t281 118.5h300q165 0 282.5 -117.5t117.5 -282.5v-300q0 -165 -117.5 -282.5t-282.5 -117.5h-300q-163 0 -281.5 117.5t-118.5 282.5zM200 300q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5 h-500q-41 0 -70.5 -29.5t-29.5 -70.5v-500zM400 300l333 250l-333 250v-500z" />
<glyph unicode="&#xe159;" d="M0 400v300q0 163 117.5 281.5t282.5 118.5h300q163 0 281.5 -119t118.5 -281v-300q0 -165 -117.5 -282.5t-282.5 -117.5h-300q-165 0 -282.5 117.5t-117.5 282.5zM200 300q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5 h-500q-41 0 -70.5 -29.5t-29.5 -70.5v-500zM300 700l250 -333l250 333h-500z" />
<glyph unicode="&#xe160;" d="M0 400v300q0 165 117.5 282.5t282.5 117.5h300q165 0 282.5 -117.5t117.5 -282.5v-300q0 -162 -118.5 -281t-281.5 -119h-300q-165 0 -282.5 118.5t-117.5 281.5zM200 300q0 -41 29.5 -70.5t70.5 -29.5h500q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5 h-500q-41 0 -70.5 -29.5t-29.5 -70.5v-500zM300 400h500l-250 333z" />
<glyph unicode="&#xe161;" d="M0 400v300h300v200l400 -350l-400 -350v200h-300zM500 0v200h500q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5h-500v200h400q165 0 282.5 -117.5t117.5 -282.5v-300q0 -165 -117.5 -282.5t-282.5 -117.5h-400z" />
<glyph unicode="&#xe162;" d="M216 519q10 -19 32 -19h302q-155 -438 -160 -458q-5 -21 4 -32l9 -8l9 -1q13 0 26 16l538 630q15 19 6 36q-8 18 -32 16h-300q1 4 78 219.5t79 227.5q2 17 -6 27l-8 8h-9q-16 0 -25 -15q-4 -5 -98.5 -111.5t-228 -257t-209.5 -238.5q-17 -19 -7 -40z" />
<glyph unicode="&#xe163;" d="M0 400q0 -165 117.5 -282.5t282.5 -117.5h300q47 0 100 15v185h-500q-41 0 -70.5 29.5t-29.5 70.5v500q0 41 29.5 70.5t70.5 29.5h500v185q-14 4 -114 7.5t-193 5.5l-93 2q-165 0 -282.5 -117.5t-117.5 -282.5v-300zM600 400v300h300v200l400 -350l-400 -350v200h-300z " />
<glyph unicode="&#xe164;" d="M0 400q0 -165 117.5 -282.5t282.5 -117.5h300q163 0 281.5 117.5t118.5 282.5v98l-78 73l-122 -123v-148q0 -41 -29.5 -70.5t-70.5 -29.5h-500q-41 0 -70.5 29.5t-29.5 70.5v500q0 41 29.5 70.5t70.5 29.5h156l118 122l-74 78h-100q-165 0 -282.5 -117.5t-117.5 -282.5 v-300zM496 709l353 342l-149 149h500v-500l-149 149l-342 -353z" />
<glyph unicode="&#xe165;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM406 600 q0 80 57 137t137 57t137 -57t57 -137t-57 -137t-137 -57t-137 57t-57 137z" />
<glyph unicode="&#xe166;" d="M0 0v275q0 11 7 18t18 7h1048q11 0 19 -7.5t8 -17.5v-275h-1100zM100 800l445 -500l450 500h-295v400h-300v-400h-300zM900 150h100v50h-100v-50z" />
<glyph unicode="&#xe167;" d="M0 0v275q0 11 7 18t18 7h1048q11 0 19 -7.5t8 -17.5v-275h-1100zM100 700h300v-300h300v300h295l-445 500zM900 150h100v50h-100v-50z" />
<glyph unicode="&#xe168;" d="M0 0v275q0 11 7 18t18 7h1048q11 0 19 -7.5t8 -17.5v-275h-1100zM100 705l305 -305l596 596l-154 155l-442 -442l-150 151zM900 150h100v50h-100v-50z" />
<glyph unicode="&#xe169;" d="M0 0v275q0 11 7 18t18 7h1048q11 0 19 -7.5t8 -17.5v-275h-1100zM100 988l97 -98l212 213l-97 97zM200 401h700v699l-250 -239l-149 149l-212 -212l149 -149zM900 150h100v50h-100v-50z" />
<glyph unicode="&#xe170;" d="M0 0v275q0 11 7 18t18 7h1048q11 0 19 -7.5t8 -17.5v-275h-1100zM200 612l212 -212l98 97l-213 212zM300 1200l239 -250l-149 -149l212 -212l149 148l248 -237v700h-699zM900 150h100v50h-100v-50z" />
<glyph unicode="&#xe171;" d="M23 415l1177 784v-1079l-475 272l-310 -393v416h-392zM494 210l672 938l-672 -712v-226z" />
<glyph unicode="&#xe172;" d="M0 150v1000q0 20 14.5 35t35.5 15h250v-300h500v300h100l200 -200v-850q0 -21 -15 -35.5t-35 -14.5h-150v400h-700v-400h-150q-21 0 -35.5 14.5t-14.5 35.5zM600 1000h100v200h-100v-200z" />
<glyph unicode="&#xe173;" d="M0 150v1000q0 20 14.5 35t35.5 15h250v-300h500v300h100l200 -200v-218l-276 -275l-120 120l-126 -127h-378v-400h-150q-21 0 -35.5 14.5t-14.5 35.5zM581 306l123 123l120 -120l353 352l123 -123l-475 -476zM600 1000h100v200h-100v-200z" />
<glyph unicode="&#xe174;" d="M0 150v1000q0 20 14.5 35t35.5 15h250v-300h500v300h100l200 -200v-269l-103 -103l-170 170l-298 -298h-329v-400h-150q-21 0 -35.5 14.5t-14.5 35.5zM600 1000h100v200h-100v-200zM700 133l170 170l-170 170l127 127l170 -170l170 170l127 -128l-170 -169l170 -170 l-127 -127l-170 170l-170 -170z" />
<glyph unicode="&#xe175;" d="M0 150v1000q0 20 14.5 35t35.5 15h250v-300h500v300h100l200 -200v-300h-400v-200h-500v-400h-150q-21 0 -35.5 14.5t-14.5 35.5zM600 300l300 -300l300 300h-200v300h-200v-300h-200zM600 1000v200h100v-200h-100z" />
<glyph unicode="&#xe176;" d="M0 150v1000q0 20 14.5 35t35.5 15h250v-300h500v300h100l200 -200v-402l-200 200l-298 -298h-402v-400h-150q-21 0 -35.5 14.5t-14.5 35.5zM600 300h200v-300h200v300h200l-300 300zM600 1000v200h100v-200h-100z" />
<glyph unicode="&#xe177;" d="M0 250q0 -21 14.5 -35.5t35.5 -14.5h1100q21 0 35.5 14.5t14.5 35.5v550h-1200v-550zM0 900h1200v150q0 21 -14.5 35.5t-35.5 14.5h-1100q-21 0 -35.5 -14.5t-14.5 -35.5v-150zM100 300v200h400v-200h-400z" />
<glyph unicode="&#xe178;" d="M0 400l300 298v-198h400v-200h-400v-198zM100 800v200h100v-200h-100zM300 800v200h100v-200h-100zM500 800v200h400v198l300 -298l-300 -298v198h-400zM800 300v200h100v-200h-100zM1000 300h100v200h-100v-200z" />
<glyph unicode="&#xe179;" d="M100 700v400l50 100l50 -100v-300h100v300l50 100l50 -100v-300h100v300l50 100l50 -100v-400l-100 -203v-447q0 -21 -14.5 -35.5t-35.5 -14.5h-200q-21 0 -35.5 14.5t-14.5 35.5v447zM800 597q0 -29 10.5 -55.5t25 -43t29 -28.5t25.5 -18l10 -5v-397q0 -21 14.5 -35.5 t35.5 -14.5h200q21 0 35.5 14.5t14.5 35.5v1106q0 31 -18 40.5t-44 -7.5l-276 -117q-25 -16 -43.5 -50.5t-18.5 -65.5v-359z" />
<glyph unicode="&#xe180;" d="M100 0h400v56q-75 0 -87.5 6t-12.5 44v394h500v-394q0 -38 -12.5 -44t-87.5 -6v-56h400v56q-4 0 -11 0.5t-24 3t-30 7t-24 15t-11 24.5v888q0 22 25 34.5t50 13.5l25 2v56h-400v-56q75 0 87.5 -6t12.5 -44v-394h-500v394q0 38 12.5 44t87.5 6v56h-400v-56q4 0 11 -0.5 t24 -3t30 -7t24 -15t11 -24.5v-888q0 -22 -25 -34.5t-50 -13.5l-25 -2v-56z" />
<glyph unicode="&#xe181;" d="M0 300q0 -41 29.5 -70.5t70.5 -29.5h300q41 0 70.5 29.5t29.5 70.5v500q0 41 -29.5 70.5t-70.5 29.5h-300q-41 0 -70.5 -29.5t-29.5 -70.5v-500zM100 100h400l200 200h105l295 98v-298h-425l-100 -100h-375zM100 300v200h300v-200h-300zM100 600v200h300v-200h-300z M100 1000h400l200 -200v-98l295 98h105v200h-425l-100 100h-375zM700 402v163l400 133v-163z" />
<glyph unicode="&#xe182;" d="M16.5 974.5q0.5 -21.5 16 -90t46.5 -140t104 -177.5t175 -208q103 -103 207.5 -176t180 -103.5t137 -47t92.5 -16.5l31 1l163 162q16 17 13 40.5t-22 37.5l-192 136q-19 14 -45 12t-42 -19l-119 -118q-143 103 -267 227q-126 126 -227 268l118 118q17 17 20 41.5 t-11 44.5l-139 194q-14 19 -36.5 22t-40.5 -14l-162 -162q-1 -11 -0.5 -32.5z" />
<glyph unicode="&#xe183;" d="M0 50v212q0 20 10.5 45.5t24.5 39.5l365 303v50q0 4 1 10.5t12 22.5t30 28.5t60 23t97 10.5t97 -10t60 -23.5t30 -27.5t12 -24l1 -10v-50l365 -303q14 -14 24.5 -39.5t10.5 -45.5v-212q0 -21 -15 -35.5t-35 -14.5h-1100q-21 0 -35.5 14.5t-14.5 35.5zM0 712 q0 -21 14.5 -33.5t34.5 -8.5l202 33q20 4 34.5 21t14.5 38v146q141 24 300 24t300 -24v-146q0 -21 14.5 -38t34.5 -21l202 -33q20 -4 34.5 8.5t14.5 33.5v200q-6 8 -19 20.5t-63 45t-112 57t-171 45t-235 20.5q-92 0 -175 -10.5t-141.5 -27t-108.5 -36.5t-81.5 -40 t-53.5 -36.5t-31 -27.5l-9 -10v-200z" />
<glyph unicode="&#xe184;" d="M100 0v100h1100v-100h-1100zM175 200h950l-125 150v250l100 100v400h-100v-200h-100v200h-200v-200h-100v200h-200v-200h-100v200h-100v-400l100 -100v-250z" />
<glyph unicode="&#xe185;" d="M100 0h300v400q0 41 -29.5 70.5t-70.5 29.5h-100q-41 0 -70.5 -29.5t-29.5 -70.5v-400zM500 0v1000q0 41 29.5 70.5t70.5 29.5h100q41 0 70.5 -29.5t29.5 -70.5v-1000h-300zM900 0v700q0 41 29.5 70.5t70.5 29.5h100q41 0 70.5 -29.5t29.5 -70.5v-700h-300z" />
<glyph unicode="&#xe186;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300h300v300h-200v100h200v100h-300v-300h200v-100h-200v-100zM600 300h200v100h100v300h-100v100h-200v-500 zM700 400v300h100v-300h-100z" />
<glyph unicode="&#xe187;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300h100v200h100v-200h100v500h-100v-200h-100v200h-100v-500zM600 300h200v100h100v300h-100v100h-200v-500 zM700 400v300h100v-300h-100z" />
<glyph unicode="&#xe188;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300h300v100h-200v300h200v100h-300v-500zM600 300h300v100h-200v300h200v100h-300v-500z" />
<glyph unicode="&#xe189;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 550l300 -150v300zM600 400l300 150l-300 150v-300z" />
<glyph unicode="&#xe190;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300v500h700v-500h-700zM300 400h130q41 0 68 42t27 107t-28.5 108t-66.5 43h-130v-300zM575 549 q0 -65 27 -107t68 -42h130v300h-130q-38 0 -66.5 -43t-28.5 -108z" />
<glyph unicode="&#xe191;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300h300v300h-200v100h200v100h-300v-300h200v-100h-200v-100zM601 300h100v100h-100v-100zM700 700h100 v-400h100v500h-200v-100z" />
<glyph unicode="&#xe192;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 300h300v400h-200v100h-100v-500zM301 400v200h100v-200h-100zM601 300h100v100h-100v-100zM700 700h100 v-400h100v500h-200v-100z" />
<glyph unicode="&#xe193;" d="M-100 300v500q0 124 88 212t212 88h700q124 0 212 -88t88 -212v-500q0 -124 -88 -212t-212 -88h-700q-124 0 -212 88t-88 212zM100 200h900v700h-900v-700zM200 700v100h300v-300h-99v-100h-100v100h99v200h-200zM201 300v100h100v-100h-100zM601 300v100h100v-100h-100z M700 700v100h200v-500h-100v400h-100z" />
<glyph unicode="&#xe194;" d="M4 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM186 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM400 500v200 l100 100h300v-100h-300v-200h300v-100h-300z" />
<glyph unicode="&#xe195;" d="M0 600q0 162 80 299t217 217t299 80t299 -80t217 -217t80 -299t-80 -299t-217 -217t-299 -80t-299 80t-217 217t-80 299zM182 600q0 -171 121.5 -292.5t292.5 -121.5t292.5 121.5t121.5 292.5t-121.5 292.5t-292.5 121.5t-292.5 -121.5t-121.5 -292.5zM400 400v400h300 l100 -100v-100h-100v100h-200v-100h200v-100h-200v-100h-100zM700 400v100h100v-100h-100z" />
<glyph unicode="&#xe197;" d="M-14 494q0 -80 56.5 -137t135.5 -57h222v300h400v-300h128q120 0 205 86t85 208q0 120 -85 206.5t-205 86.5q-46 0 -90 -14q-44 97 -134.5 156.5t-200.5 59.5q-152 0 -260 -107.5t-108 -260.5q0 -25 2 -37q-66 -14 -108.5 -67.5t-42.5 -122.5zM300 200h200v300h200v-300 h200l-300 -300z" />
<glyph unicode="&#xe198;" d="M-14 494q0 -80 56.5 -137t135.5 -57h8l414 414l403 -403q94 26 154.5 104t60.5 178q0 121 -85 207.5t-205 86.5q-46 0 -90 -14q-44 97 -134.5 156.5t-200.5 59.5q-152 0 -260 -107.5t-108 -260.5q0 -25 2 -37q-66 -14 -108.5 -67.5t-42.5 -122.5zM300 200l300 300 l300 -300h-200v-300h-200v300h-200z" />
<glyph unicode="&#xe199;" d="M100 200h400v-155l-75 -45h350l-75 45v155h400l-270 300h170l-270 300h170l-300 333l-300 -333h170l-270 -300h170z" />
<glyph unicode="&#xe200;" d="M121 700q0 -53 28.5 -97t75.5 -65q-4 -16 -4 -38q0 -74 52.5 -126.5t126.5 -52.5q56 0 100 30v-306l-75 -45h350l-75 45v306q46 -30 100 -30q74 0 126.5 52.5t52.5 126.5q0 24 -9 55q50 32 79.5 83t29.5 112q0 90 -61.5 155.5t-150.5 71.5q-26 89 -99.5 145.5 t-167.5 56.5q-116 0 -197.5 -81.5t-81.5 -197.5q0 -4 1 -12t1 -11q-14 2 -23 2q-74 0 -126.5 -52.5t-52.5 -126.5z" />
</font>
</defs></svg>

After

Width:  |  Height:  |  Size: 61 KiB

View File

@@ -0,0 +1 @@
<meta http-equiv="Refresh" content="0; url='./start'" />

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,8 @@
/*
HTML5 Shiv v3.7.0 | @afarkas @jdalton @jon_neal @rem | MIT/GPL2 Licensed
*/
(function(l,f){function m(){var a=e.elements;return"string"==typeof a?a.split(" "):a}function i(a){var b=n[a[o]];b||(b={},h++,a[o]=h,n[h]=b);return b}function p(a,b,c){b||(b=f);if(g)return b.createElement(a);c||(c=i(b));b=c.cache[a]?c.cache[a].cloneNode():r.test(a)?(c.cache[a]=c.createElem(a)).cloneNode():c.createElem(a);return b.canHaveChildren&&!s.test(a)?c.frag.appendChild(b):b}function t(a,b){if(!b.cache)b.cache={},b.createElem=a.createElement,b.createFrag=a.createDocumentFragment,b.frag=b.createFrag();
a.createElement=function(c){return!e.shivMethods?b.createElem(c):p(c,a,b)};a.createDocumentFragment=Function("h,f","return function(){var n=f.cloneNode(),c=n.createElement;h.shivMethods&&("+m().join().replace(/[\w\-]+/g,function(a){b.createElem(a);b.frag.createElement(a);return'c("'+a+'")'})+");return n}")(e,b.frag)}function q(a){a||(a=f);var b=i(a);if(e.shivCSS&&!j&&!b.hasCSS){var c,d=a;c=d.createElement("p");d=d.getElementsByTagName("head")[0]||d.documentElement;c.innerHTML="x<style>article,aside,dialog,figcaption,figure,footer,header,hgroup,main,nav,section{display:block}mark{background:#FF0;color:#000}template{display:none}</style>";
c=d.insertBefore(c.lastChild,d.firstChild);b.hasCSS=!!c}g||t(a,b);return a}var k=l.html5||{},s=/^<|^(?:button|map|select|textarea|object|iframe|option|optgroup)$/i,r=/^(?:a|b|code|div|fieldset|h1|h2|h3|h4|h5|h6|i|label|li|ol|p|q|span|strong|style|table|tbody|td|th|tr|ul)$/i,j,o="_html5shiv",h=0,n={},g;(function(){try{var a=f.createElement("a");a.innerHTML="<xyz></xyz>";j="hidden"in a;var b;if(!(b=1==a.childNodes.length)){f.createElement("a");var c=f.createDocumentFragment();b="undefined"==typeof c.cloneNode||
"undefined"==typeof c.createDocumentFragment||"undefined"==typeof c.createElement}g=b}catch(d){g=j=!0}})();var e={elements:k.elements||"abbr article aside audio bdi canvas data datalist details dialog figcaption figure footer header hgroup main mark meter nav output progress section summary template time video",version:"3.7.0",shivCSS:!1!==k.shivCSS,supportsUnknownElements:g,shivMethods:!1!==k.shivMethods,type:"default",shivDocument:q,createElement:p,createDocumentFragment:function(a,b){a||(a=f);
if(g)return a.createDocumentFragment();for(var b=b||i(a),c=b.frag.cloneNode(),d=0,e=m(),h=e.length;d<h;d++)c.createElement(e[d]);return c}};l.html5=e;q(f)})(this,document);

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,28 @@
var q=null;window.PR_SHOULD_USE_CONTINUATION=!0;
(function(){function L(a){function m(a){var f=a.charCodeAt(0);if(f!==92)return f;var b=a.charAt(1);return(f=r[b])?f:"0"<=b&&b<="7"?parseInt(a.substring(1),8):b==="u"||b==="x"?parseInt(a.substring(2),16):a.charCodeAt(1)}function e(a){if(a<32)return(a<16?"\\x0":"\\x")+a.toString(16);a=String.fromCharCode(a);if(a==="\\"||a==="-"||a==="["||a==="]")a="\\"+a;return a}function h(a){for(var f=a.substring(1,a.length-1).match(/\\u[\dA-Fa-f]{4}|\\x[\dA-Fa-f]{2}|\\[0-3][0-7]{0,2}|\\[0-7]{1,2}|\\[\S\s]|[^\\]/g),a=
[],b=[],o=f[0]==="^",c=o?1:0,i=f.length;c<i;++c){var j=f[c];if(/\\[bdsw]/i.test(j))a.push(j);else{var j=m(j),d;c+2<i&&"-"===f[c+1]?(d=m(f[c+2]),c+=2):d=j;b.push([j,d]);d<65||j>122||(d<65||j>90||b.push([Math.max(65,j)|32,Math.min(d,90)|32]),d<97||j>122||b.push([Math.max(97,j)&-33,Math.min(d,122)&-33]))}}b.sort(function(a,f){return a[0]-f[0]||f[1]-a[1]});f=[];j=[NaN,NaN];for(c=0;c<b.length;++c)i=b[c],i[0]<=j[1]+1?j[1]=Math.max(j[1],i[1]):f.push(j=i);b=["["];o&&b.push("^");b.push.apply(b,a);for(c=0;c<
f.length;++c)i=f[c],b.push(e(i[0])),i[1]>i[0]&&(i[1]+1>i[0]&&b.push("-"),b.push(e(i[1])));b.push("]");return b.join("")}function y(a){for(var f=a.source.match(/\[(?:[^\\\]]|\\[\S\s])*]|\\u[\dA-Fa-f]{4}|\\x[\dA-Fa-f]{2}|\\\d+|\\[^\dux]|\(\?[!:=]|[()^]|[^()[\\^]+/g),b=f.length,d=[],c=0,i=0;c<b;++c){var j=f[c];j==="("?++i:"\\"===j.charAt(0)&&(j=+j.substring(1))&&j<=i&&(d[j]=-1)}for(c=1;c<d.length;++c)-1===d[c]&&(d[c]=++t);for(i=c=0;c<b;++c)j=f[c],j==="("?(++i,d[i]===void 0&&(f[c]="(?:")):"\\"===j.charAt(0)&&
(j=+j.substring(1))&&j<=i&&(f[c]="\\"+d[i]);for(i=c=0;c<b;++c)"^"===f[c]&&"^"!==f[c+1]&&(f[c]="");if(a.ignoreCase&&s)for(c=0;c<b;++c)j=f[c],a=j.charAt(0),j.length>=2&&a==="["?f[c]=h(j):a!=="\\"&&(f[c]=j.replace(/[A-Za-z]/g,function(a){a=a.charCodeAt(0);return"["+String.fromCharCode(a&-33,a|32)+"]"}));return f.join("")}for(var t=0,s=!1,l=!1,p=0,d=a.length;p<d;++p){var g=a[p];if(g.ignoreCase)l=!0;else if(/[a-z]/i.test(g.source.replace(/\\u[\da-f]{4}|\\x[\da-f]{2}|\\[^UXux]/gi,""))){s=!0;l=!1;break}}for(var r=
{b:8,t:9,n:10,v:11,f:12,r:13},n=[],p=0,d=a.length;p<d;++p){g=a[p];if(g.global||g.multiline)throw Error(""+g);n.push("(?:"+y(g)+")")}return RegExp(n.join("|"),l?"gi":"g")}function M(a){function m(a){switch(a.nodeType){case 1:if(e.test(a.className))break;for(var g=a.firstChild;g;g=g.nextSibling)m(g);g=a.nodeName;if("BR"===g||"LI"===g)h[s]="\n",t[s<<1]=y++,t[s++<<1|1]=a;break;case 3:case 4:g=a.nodeValue,g.length&&(g=p?g.replace(/\r\n?/g,"\n"):g.replace(/[\t\n\r ]+/g," "),h[s]=g,t[s<<1]=y,y+=g.length,
t[s++<<1|1]=a)}}var e=/(?:^|\s)nocode(?:\s|$)/,h=[],y=0,t=[],s=0,l;a.currentStyle?l=a.currentStyle.whiteSpace:window.getComputedStyle&&(l=document.defaultView.getComputedStyle(a,q).getPropertyValue("white-space"));var p=l&&"pre"===l.substring(0,3);m(a);return{a:h.join("").replace(/\n$/,""),c:t}}function B(a,m,e,h){m&&(a={a:m,d:a},e(a),h.push.apply(h,a.e))}function x(a,m){function e(a){for(var l=a.d,p=[l,"pln"],d=0,g=a.a.match(y)||[],r={},n=0,z=g.length;n<z;++n){var f=g[n],b=r[f],o=void 0,c;if(typeof b===
"string")c=!1;else{var i=h[f.charAt(0)];if(i)o=f.match(i[1]),b=i[0];else{for(c=0;c<t;++c)if(i=m[c],o=f.match(i[1])){b=i[0];break}o||(b="pln")}if((c=b.length>=5&&"lang-"===b.substring(0,5))&&!(o&&typeof o[1]==="string"))c=!1,b="src";c||(r[f]=b)}i=d;d+=f.length;if(c){c=o[1];var j=f.indexOf(c),k=j+c.length;o[2]&&(k=f.length-o[2].length,j=k-c.length);b=b.substring(5);B(l+i,f.substring(0,j),e,p);B(l+i+j,c,C(b,c),p);B(l+i+k,f.substring(k),e,p)}else p.push(l+i,b)}a.e=p}var h={},y;(function(){for(var e=a.concat(m),
l=[],p={},d=0,g=e.length;d<g;++d){var r=e[d],n=r[3];if(n)for(var k=n.length;--k>=0;)h[n.charAt(k)]=r;r=r[1];n=""+r;p.hasOwnProperty(n)||(l.push(r),p[n]=q)}l.push(/[\S\s]/);y=L(l)})();var t=m.length;return e}function u(a){var m=[],e=[];a.tripleQuotedStrings?m.push(["str",/^(?:'''(?:[^'\\]|\\[\S\s]|''?(?=[^']))*(?:'''|$)|"""(?:[^"\\]|\\[\S\s]|""?(?=[^"]))*(?:"""|$)|'(?:[^'\\]|\\[\S\s])*(?:'|$)|"(?:[^"\\]|\\[\S\s])*(?:"|$))/,q,"'\""]):a.multiLineStrings?m.push(["str",/^(?:'(?:[^'\\]|\\[\S\s])*(?:'|$)|"(?:[^"\\]|\\[\S\s])*(?:"|$)|`(?:[^\\`]|\\[\S\s])*(?:`|$))/,
q,"'\"`"]):m.push(["str",/^(?:'(?:[^\n\r'\\]|\\.)*(?:'|$)|"(?:[^\n\r"\\]|\\.)*(?:"|$))/,q,"\"'"]);a.verbatimStrings&&e.push(["str",/^@"(?:[^"]|"")*(?:"|$)/,q]);var h=a.hashComments;h&&(a.cStyleComments?(h>1?m.push(["com",/^#(?:##(?:[^#]|#(?!##))*(?:###|$)|.*)/,q,"#"]):m.push(["com",/^#(?:(?:define|elif|else|endif|error|ifdef|include|ifndef|line|pragma|undef|warning)\b|[^\n\r]*)/,q,"#"]),e.push(["str",/^<(?:(?:(?:\.\.\/)*|\/?)(?:[\w-]+(?:\/[\w-]+)+)?[\w-]+\.h|[a-z]\w*)>/,q])):m.push(["com",/^#[^\n\r]*/,
q,"#"]));a.cStyleComments&&(e.push(["com",/^\/\/[^\n\r]*/,q]),e.push(["com",/^\/\*[\S\s]*?(?:\*\/|$)/,q]));a.regexLiterals&&e.push(["lang-regex",/^(?:^^\.?|[!+-]|!=|!==|#|%|%=|&|&&|&&=|&=|\(|\*|\*=|\+=|,|-=|->|\/|\/=|:|::|;|<|<<|<<=|<=|=|==|===|>|>=|>>|>>=|>>>|>>>=|[?@[^]|\^=|\^\^|\^\^=|{|\||\|=|\|\||\|\|=|~|break|case|continue|delete|do|else|finally|instanceof|return|throw|try|typeof)\s*(\/(?=[^*/])(?:[^/[\\]|\\[\S\s]|\[(?:[^\\\]]|\\[\S\s])*(?:]|$))+\/)/]);(h=a.types)&&e.push(["typ",h]);a=(""+a.keywords).replace(/^ | $/g,
"");a.length&&e.push(["kwd",RegExp("^(?:"+a.replace(/[\s,]+/g,"|")+")\\b"),q]);m.push(["pln",/^\s+/,q," \r\n\t\xa0"]);e.push(["lit",/^@[$_a-z][\w$@]*/i,q],["typ",/^(?:[@_]?[A-Z]+[a-z][\w$@]*|\w+_t\b)/,q],["pln",/^[$_a-z][\w$@]*/i,q],["lit",/^(?:0x[\da-f]+|(?:\d(?:_\d+)*\d*(?:\.\d*)?|\.\d\+)(?:e[+-]?\d+)?)[a-z]*/i,q,"0123456789"],["pln",/^\\[\S\s]?/,q],["pun",/^.[^\s\w"-$'./@\\`]*/,q]);return x(m,e)}function D(a,m){function e(a){switch(a.nodeType){case 1:if(k.test(a.className))break;if("BR"===a.nodeName)h(a),
a.parentNode&&a.parentNode.removeChild(a);else for(a=a.firstChild;a;a=a.nextSibling)e(a);break;case 3:case 4:if(p){var b=a.nodeValue,d=b.match(t);if(d){var c=b.substring(0,d.index);a.nodeValue=c;(b=b.substring(d.index+d[0].length))&&a.parentNode.insertBefore(s.createTextNode(b),a.nextSibling);h(a);c||a.parentNode.removeChild(a)}}}}function h(a){function b(a,d){var e=d?a.cloneNode(!1):a,f=a.parentNode;if(f){var f=b(f,1),g=a.nextSibling;f.appendChild(e);for(var h=g;h;h=g)g=h.nextSibling,f.appendChild(h)}return e}
for(;!a.nextSibling;)if(a=a.parentNode,!a)return;for(var a=b(a.nextSibling,0),e;(e=a.parentNode)&&e.nodeType===1;)a=e;d.push(a)}var k=/(?:^|\s)nocode(?:\s|$)/,t=/\r\n?|\n/,s=a.ownerDocument,l;a.currentStyle?l=a.currentStyle.whiteSpace:window.getComputedStyle&&(l=s.defaultView.getComputedStyle(a,q).getPropertyValue("white-space"));var p=l&&"pre"===l.substring(0,3);for(l=s.createElement("LI");a.firstChild;)l.appendChild(a.firstChild);for(var d=[l],g=0;g<d.length;++g)e(d[g]);m===(m|0)&&d[0].setAttribute("value",
m);var r=s.createElement("OL");r.className="linenums";for(var n=Math.max(0,m-1|0)||0,g=0,z=d.length;g<z;++g)l=d[g],l.className="L"+(g+n)%10,l.firstChild||l.appendChild(s.createTextNode("\xa0")),r.appendChild(l);a.appendChild(r)}function k(a,m){for(var e=m.length;--e>=0;){var h=m[e];A.hasOwnProperty(h)?window.console&&console.warn("cannot override language handler %s",h):A[h]=a}}function C(a,m){if(!a||!A.hasOwnProperty(a))a=/^\s*</.test(m)?"default-markup":"default-code";return A[a]}function E(a){var m=
a.g;try{var e=M(a.h),h=e.a;a.a=h;a.c=e.c;a.d=0;C(m,h)(a);var k=/\bMSIE\b/.test(navigator.userAgent),m=/\n/g,t=a.a,s=t.length,e=0,l=a.c,p=l.length,h=0,d=a.e,g=d.length,a=0;d[g]=s;var r,n;for(n=r=0;n<g;)d[n]!==d[n+2]?(d[r++]=d[n++],d[r++]=d[n++]):n+=2;g=r;for(n=r=0;n<g;){for(var z=d[n],f=d[n+1],b=n+2;b+2<=g&&d[b+1]===f;)b+=2;d[r++]=z;d[r++]=f;n=b}for(d.length=r;h<p;){var o=l[h+2]||s,c=d[a+2]||s,b=Math.min(o,c),i=l[h+1],j;if(i.nodeType!==1&&(j=t.substring(e,b))){k&&(j=j.replace(m,"\r"));i.nodeValue=
j;var u=i.ownerDocument,v=u.createElement("SPAN");v.className=d[a+1];var x=i.parentNode;x.replaceChild(v,i);v.appendChild(i);e<o&&(l[h+1]=i=u.createTextNode(t.substring(b,o)),x.insertBefore(i,v.nextSibling))}e=b;e>=o&&(h+=2);e>=c&&(a+=2)}}catch(w){"console"in window&&console.log(w&&w.stack?w.stack:w)}}var v=["break,continue,do,else,for,if,return,while"],w=[[v,"auto,case,char,const,default,double,enum,extern,float,goto,int,long,register,short,signed,sizeof,static,struct,switch,typedef,union,unsigned,void,volatile"],
"catch,class,delete,false,import,new,operator,private,protected,public,this,throw,true,try,typeof"],F=[w,"alignof,align_union,asm,axiom,bool,concept,concept_map,const_cast,constexpr,decltype,dynamic_cast,explicit,export,friend,inline,late_check,mutable,namespace,nullptr,reinterpret_cast,static_assert,static_cast,template,typeid,typename,using,virtual,where"],G=[w,"abstract,boolean,byte,extends,final,finally,implements,import,instanceof,null,native,package,strictfp,super,synchronized,throws,transient"],
H=[G,"as,base,by,checked,decimal,delegate,descending,dynamic,event,fixed,foreach,from,group,implicit,in,interface,internal,into,is,lock,object,out,override,orderby,params,partial,readonly,ref,sbyte,sealed,stackalloc,string,select,uint,ulong,unchecked,unsafe,ushort,var"],w=[w,"debugger,eval,export,function,get,null,set,undefined,var,with,Infinity,NaN"],I=[v,"and,as,assert,class,def,del,elif,except,exec,finally,from,global,import,in,is,lambda,nonlocal,not,or,pass,print,raise,try,with,yield,False,True,None"],
J=[v,"alias,and,begin,case,class,def,defined,elsif,end,ensure,false,in,module,next,nil,not,or,redo,rescue,retry,self,super,then,true,undef,unless,until,when,yield,BEGIN,END"],v=[v,"case,done,elif,esac,eval,fi,function,in,local,set,then,until"],K=/^(DIR|FILE|vector|(de|priority_)?queue|list|stack|(const_)?iterator|(multi)?(set|map)|bitset|u?(int|float)\d*)/,N=/\S/,O=u({keywords:[F,H,w,"caller,delete,die,do,dump,elsif,eval,exit,foreach,for,goto,if,import,last,local,my,next,no,our,print,package,redo,require,sub,undef,unless,until,use,wantarray,while,BEGIN,END"+
I,J,v],hashComments:!0,cStyleComments:!0,multiLineStrings:!0,regexLiterals:!0}),A={};k(O,["default-code"]);k(x([],[["pln",/^[^<?]+/],["dec",/^<!\w[^>]*(?:>|$)/],["com",/^<\!--[\S\s]*?(?:--\>|$)/],["lang-",/^<\?([\S\s]+?)(?:\?>|$)/],["lang-",/^<%([\S\s]+?)(?:%>|$)/],["pun",/^(?:<[%?]|[%?]>)/],["lang-",/^<xmp\b[^>]*>([\S\s]+?)<\/xmp\b[^>]*>/i],["lang-js",/^<script\b[^>]*>([\S\s]*?)(<\/script\b[^>]*>)/i],["lang-css",/^<style\b[^>]*>([\S\s]*?)(<\/style\b[^>]*>)/i],["lang-in.tag",/^(<\/?[a-z][^<>]*>)/i]]),
["default-markup","htm","html","mxml","xhtml","xml","xsl"]);k(x([["pln",/^\s+/,q," \t\r\n"],["atv",/^(?:"[^"]*"?|'[^']*'?)/,q,"\"'"]],[["tag",/^^<\/?[a-z](?:[\w-.:]*\w)?|\/?>$/i],["atn",/^(?!style[\s=]|on)[a-z](?:[\w:-]*\w)?/i],["lang-uq.val",/^=\s*([^\s"'>]*(?:[^\s"'/>]|\/(?=\s)))/],["pun",/^[/<->]+/],["lang-js",/^on\w+\s*=\s*"([^"]+)"/i],["lang-js",/^on\w+\s*=\s*'([^']+)'/i],["lang-js",/^on\w+\s*=\s*([^\s"'>]+)/i],["lang-css",/^style\s*=\s*"([^"]+)"/i],["lang-css",/^style\s*=\s*'([^']+)'/i],["lang-css",
/^style\s*=\s*([^\s"'>]+)/i]]),["in.tag"]);k(x([],[["atv",/^[\S\s]+/]]),["uq.val"]);k(u({keywords:F,hashComments:!0,cStyleComments:!0,types:K}),["c","cc","cpp","cxx","cyc","m"]);k(u({keywords:"null,true,false"}),["json"]);k(u({keywords:H,hashComments:!0,cStyleComments:!0,verbatimStrings:!0,types:K}),["cs"]);k(u({keywords:G,cStyleComments:!0}),["java"]);k(u({keywords:v,hashComments:!0,multiLineStrings:!0}),["bsh","csh","sh"]);k(u({keywords:I,hashComments:!0,multiLineStrings:!0,tripleQuotedStrings:!0}),
["cv","py"]);k(u({keywords:"caller,delete,die,do,dump,elsif,eval,exit,foreach,for,goto,if,import,last,local,my,next,no,our,print,package,redo,require,sub,undef,unless,until,use,wantarray,while,BEGIN,END",hashComments:!0,multiLineStrings:!0,regexLiterals:!0}),["perl","pl","pm"]);k(u({keywords:J,hashComments:!0,multiLineStrings:!0,regexLiterals:!0}),["rb"]);k(u({keywords:w,cStyleComments:!0,regexLiterals:!0}),["js"]);k(u({keywords:"all,and,by,catch,class,else,extends,false,finally,for,if,in,is,isnt,loop,new,no,not,null,of,off,on,or,return,super,then,true,try,unless,until,when,while,yes",
hashComments:3,cStyleComments:!0,multilineStrings:!0,tripleQuotedStrings:!0,regexLiterals:!0}),["coffee"]);k(x([],[["str",/^[\S\s]+/]]),["regex"]);window.prettyPrintOne=function(a,m,e){var h=document.createElement("PRE");h.innerHTML=a;e&&D(h,e);E({g:m,i:e,h:h});return h.innerHTML};window.prettyPrint=function(a){function m(){for(var e=window.PR_SHOULD_USE_CONTINUATION?l.now()+250:Infinity;p<h.length&&l.now()<e;p++){var n=h[p],k=n.className;if(k.indexOf("prettyprint")>=0){var k=k.match(g),f,b;if(b=
!k){b=n;for(var o=void 0,c=b.firstChild;c;c=c.nextSibling)var i=c.nodeType,o=i===1?o?b:c:i===3?N.test(c.nodeValue)?b:o:o;b=(f=o===b?void 0:o)&&"CODE"===f.tagName}b&&(k=f.className.match(g));k&&(k=k[1]);b=!1;for(o=n.parentNode;o;o=o.parentNode)if((o.tagName==="pre"||o.tagName==="code"||o.tagName==="xmp")&&o.className&&o.className.indexOf("prettyprint")>=0){b=!0;break}b||((b=(b=n.className.match(/\blinenums\b(?::(\d+))?/))?b[1]&&b[1].length?+b[1]:!0:!1)&&D(n,b),d={g:k,h:n,i:b},E(d))}}p<h.length?setTimeout(m,
250):a&&a()}for(var e=[document.getElementsByTagName("pre"),document.getElementsByTagName("code"),document.getElementsByTagName("xmp")],h=[],k=0;k<e.length;++k)for(var t=0,s=e[k].length;t<s;++t)h.push(e[k][t]);var e=q,l=Date;l.now||(l={now:function(){return+new Date}});var p=0,d,g=/\blang(?:uage)?-([\w.]+)(?!\S)/;m()};window.PR={createSimpleLexer:x,registerLangHandler:k,sourceDecorator:u,PR_ATTRIB_NAME:"atn",PR_ATTRIB_VALUE:"atv",PR_COMMENT:"com",PR_DECLARATION:"dec",PR_KEYWORD:"kwd",PR_LITERAL:"lit",
PR_NOCODE:"nocode",PR_PLAIN:"pln",PR_PUNCTUATION:"pun",PR_SOURCE:"src",PR_STRING:"str",PR_TAG:"tag",PR_TYPE:"typ"}})();

View File

@@ -0,0 +1,6 @@
/*! matchMedia() polyfill - Test a CSS media type/query in JS. Authors & copyright (c) 2012: Scott Jehl, Paul Irish, Nicholas Zakas. Dual MIT/BSD license */
/*! NOTE: If you're already including a window.matchMedia polyfill via Modernizr or otherwise, you don't need this part */
window.matchMedia=window.matchMedia||function(a){"use strict";var c,d=a.documentElement,e=d.firstElementChild||d.firstChild,f=a.createElement("body"),g=a.createElement("div");return g.id="mq-test-1",g.style.cssText="position:absolute;top:-100em",f.style.background="none",f.appendChild(g),function(a){return g.innerHTML='&shy;<style media="'+a+'"> #mq-test-1 { width: 42px; }</style>',d.insertBefore(f,e),c=42===g.offsetWidth,d.removeChild(f),{matches:c,media:a}}}(document);
/*! Respond.js v1.3.0: min/max-width media query polyfill. (c) Scott Jehl. MIT/GPLv2 Lic. j.mp/respondjs */
(function(a){"use strict";function x(){u(!0)}var b={};if(a.respond=b,b.update=function(){},b.mediaQueriesSupported=a.matchMedia&&a.matchMedia("only all").matches,!b.mediaQueriesSupported){var q,r,t,c=a.document,d=c.documentElement,e=[],f=[],g=[],h={},i=30,j=c.getElementsByTagName("head")[0]||d,k=c.getElementsByTagName("base")[0],l=j.getElementsByTagName("link"),m=[],n=function(){for(var b=0;l.length>b;b++){var c=l[b],d=c.href,e=c.media,f=c.rel&&"stylesheet"===c.rel.toLowerCase();d&&f&&!h[d]&&(c.styleSheet&&c.styleSheet.rawCssText?(p(c.styleSheet.rawCssText,d,e),h[d]=!0):(!/^([a-zA-Z:]*\/\/)/.test(d)&&!k||d.replace(RegExp.$1,"").split("/")[0]===a.location.host)&&m.push({href:d,media:e}))}o()},o=function(){if(m.length){var b=m.shift();v(b.href,function(c){p(c,b.href,b.media),h[b.href]=!0,a.setTimeout(function(){o()},0)})}},p=function(a,b,c){var d=a.match(/@media[^\{]+\{([^\{\}]*\{[^\}\{]*\})+/gi),g=d&&d.length||0;b=b.substring(0,b.lastIndexOf("/"));var h=function(a){return a.replace(/(url\()['"]?([^\/\)'"][^:\)'"]+)['"]?(\))/g,"$1"+b+"$2$3")},i=!g&&c;b.length&&(b+="/"),i&&(g=1);for(var j=0;g>j;j++){var k,l,m,n;i?(k=c,f.push(h(a))):(k=d[j].match(/@media *([^\{]+)\{([\S\s]+?)$/)&&RegExp.$1,f.push(RegExp.$2&&h(RegExp.$2))),m=k.split(","),n=m.length;for(var o=0;n>o;o++)l=m[o],e.push({media:l.split("(")[0].match(/(only\s+)?([a-zA-Z]+)\s?/)&&RegExp.$2||"all",rules:f.length-1,hasquery:l.indexOf("(")>-1,minw:l.match(/\(\s*min\-width\s*:\s*(\s*[0-9\.]+)(px|em)\s*\)/)&&parseFloat(RegExp.$1)+(RegExp.$2||""),maxw:l.match(/\(\s*max\-width\s*:\s*(\s*[0-9\.]+)(px|em)\s*\)/)&&parseFloat(RegExp.$1)+(RegExp.$2||"")})}u()},s=function(){var a,b=c.createElement("div"),e=c.body,f=!1;return b.style.cssText="position:absolute;font-size:1em;width:1em",e||(e=f=c.createElement("body"),e.style.background="none"),e.appendChild(b),d.insertBefore(e,d.firstChild),a=b.offsetWidth,f?d.removeChild(e):e.removeChild(b),a=t=parseFloat(a)},u=function(b){var h="clientWidth",k=d[h],m="CSS1Compat"===c.compatMode&&k||c.body[h]||k,n={},o=l[l.length-1],p=(new Date).getTime();if(b&&q&&i>p-q)return a.clearTimeout(r),r=a.setTimeout(u,i),void 0;q=p;for(var v in e)if(e.hasOwnProperty(v)){var w=e[v],x=w.minw,y=w.maxw,z=null===x,A=null===y,B="em";x&&(x=parseFloat(x)*(x.indexOf(B)>-1?t||s():1)),y&&(y=parseFloat(y)*(y.indexOf(B)>-1?t||s():1)),w.hasquery&&(z&&A||!(z||m>=x)||!(A||y>=m))||(n[w.media]||(n[w.media]=[]),n[w.media].push(f[w.rules]))}for(var C in g)g.hasOwnProperty(C)&&g[C]&&g[C].parentNode===j&&j.removeChild(g[C]);for(var D in n)if(n.hasOwnProperty(D)){var E=c.createElement("style"),F=n[D].join("\n");E.type="text/css",E.media=D,j.insertBefore(E,o.nextSibling),E.styleSheet?E.styleSheet.cssText=F:E.appendChild(c.createTextNode(F)),g.push(E)}},v=function(a,b){var c=w();c&&(c.open("GET",a,!0),c.onreadystatechange=function(){4!==c.readyState||200!==c.status&&304!==c.status||b(c.responseText)},4!==c.readyState&&c.send(null))},w=function(){var b=!1;try{b=new a.XMLHttpRequest}catch(c){b=new a.ActiveXObject("Microsoft.XMLHTTP")}return function(){return b}}();n(),b.update=n,a.addEventListener?a.addEventListener("resize",x,!1):a.attachEvent&&a.attachEvent("onresize",x)}})(this);

View File

@@ -0,0 +1,182 @@
/* WIZARD GENERAL */
.wizard {
display:none;
}
.wizard-dialog {}
.wizard-content {}
.wizard-body {
padding: 0;
margin: 0;
}
/* WIZARD HEADER */
.wizard-header {
padding: 9px 15px;
border-bottom: 0;
}
.wizard-header h3 {
margin: 0;
line-height: 35px;
display: inline;
font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif;
font-family: inherit;
font-weight: bold;
text-rendering: optimizelegibility;
color: rgb(51, 51, 51);
}
.wizard-subtitle {
font-weight:bold;
color:#AFAFAF;
padding-left:20px;
}
/* WIZARD NAVIGATION */
.wizard-steps {
width: 28%;
background-color: #f5f5f5;
border-bottom-left-radius: 6px;
position: relative;
}
.wizard-nav-container {
padding-bottom: 30px;
}
.wizard-nav-list {
margin-bottom: 0;
}
.wizard-nav-link .glyphicon-chevron-right {
float:right;
margin-top:12px;
margin-right:-6px;
opacity:.25;
}
li.wizard-nav-item.active .glyphicon-chevron-right {
opacity:1;
}
li.wizard-nav-item {
line-height:40px;
}
.wizard-nav-list > li > a {
background-color:#f5f5f5;
padding:3px 15px 3px 20px;
cursor:default;
color:#B4B4B4;
}
.wizard-nav-list > li > a:hover {
background-color: transparent;
}
.wizard-nav-list > li.already-visited > a.wizard-nav-link {
color:#08C;
cursor:pointer;
}
.wizard-nav-list > li.active > a.wizard-nav-link {
color:white;
}
.wizard-nav-item .already-visited .active {
background-color:#08C;
}
.wizard-nav-list li.active > a {
background-color:#08C;
}
/* WIZARD CONTENT */
.wizard-body form {
padding: 0;
margin: 0;
}
/* WIZARD PROGRESS BAR */
.wizard-progress-container {
margin-top: 20px;
padding: 15px;
width: 100%;
position: absolute;
bottom: 0;
}
.wizard-card-container {
margin-left: 28%;
}
/* WIZARD CARDS */
.wizard-error,
.wizard-failure,
.wizard-success,
.wizard-loading,
.wizard-card {
border-top: 1px solid #EEE;
display:none;
padding:35px;
padding-top:20px;
overflow-y:auto;
/*
position:relative;
height:300px;
margin-right: 5px;
*/
}
.wizard-card-overlay {
overflow-y: initial;
}
.wizard-card > h3 {
margin-top:0;
margin-bottom:20px;
font-size:21px;
line-height:40px;
font-weight:normal;
}
/* WIZARD FOOTER */
.wizard-footer {
padding:0;
}
.wizard-buttons-container {
padding:20px;
}
.wizard-cancel {
margin-left: 12px;
}
/* Inner Card */
.wizard-input-section {
margin-bottom:20px;
}
.wizard-dialog .popover.error-popover {
background-color:#F2DEDE;
color:#B94A48;
border-color:#953B39;
}
.wizard-dialog .popover.error-popover .arrow::after {
border-right-color:#F2DEDE;
}
.wizard-dialog .popover.error-popover .popover-title {
display:none;
}
.wizard-dialog .popover.error-popover .arrow {
border-right-color:#953B39;
}

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,21 @@
<link href="bootstrap-wizard.css" rel="stylesheet" />
<script src="bootstrap-wizard.js" type="text/javascript"></script>
<div class="wizard" id="some-wizard" data-title="Gokapi Setup">
<div class="wizard-card" data-cardname="card1">
<h3>Card 1</h3>
Some content
</div>
<div class="wizard-card" data-cardname="card2">
<h3>Card 2</h3>
Some content
</div>
</div>
<script src="jquery-2.0.3.min.js" type="text/javascript"></script>
<script>
$(function() {
var options = {};
var wizard = $("#some-wizard").wizard(options);
});
</script>

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,595 @@
{{define "setup"}}<!DOCTYPE html>
<html lang="en">
<head>
<title>Gokapi Setup</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link href="./bootstrap/bootstrap.min.css" rel="stylesheet" />
<link href="./src/bootstrap-wizard.css" rel="stylesheet" />
<link href="./chosen/chosen.css" rel="stylesheet" />
<style>
.wizard-modal p {
margin: 0 0 10px;
padding: 0;
}
#wizard-ns-detail-servers, .wizard-additional-servers {
font-size: 12px;
margin-top: 10px;
margin-left: 15px;
}
#wizard-ns-detail-servers > li, .wizard-additional-servers li {
line-height: 20px;
list-style-type: none;
}
#wizard-ns-detail-servers > li > img {
padding-right: 5px;
}
.wizard-modal .chzn-container .chzn-results {
max-height: 150px;
}
.wizard-addl-subsection {
margin-bottom: 40px;
}
.create-server-agent-key {
margin-left: 15px;
width: 90%;
}
</style>
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="js/html5shiv-3.7.0.js"></script>
<script src="js/respond-1.3.0.min.js"></script>
<![endif]-->
</head>
<body style="padding:30px;">
<div class="wizard" id="satellite-wizard" data-title="Gokapi Setup">
<!-- Step 0 Welcome -->
<div class="wizard-card wizard-card-overlay" data-cardname="Welcome">
<h3>Welcome</h3>
<div class="wizard-input-section">
{{ if .IsInitialSetup }}
<p>
Thank you for choosing Gokapi! This setup will guide you through the Gokapi installation. For further information please refer to the <a href="https://gokapi.readthedocs.io/en/stable/" title="Gokapi Documentation" target="_blank">documentation</a>.
</p>
{{ else }}
<p>
You can now change the Gokapi configuration. For further information please refer to the <a href="https://gokapi.readthedocs.io/en/stable/" title="Gokapi Documentation" target="_blank">documentation</a>.
</p>
{{end}}
</div>
</div>
<!-- Step 1 Webserver -->
<div class="wizard-card wizard-card-overlay" data-cardname="webserver1">
<h3>Webserver 1/2</h3>
<div class="wizard-input-section">
<p>
Make webserver only accessable on this machine (bind to localhost)
</p>
<select name="localhost_sel" id="localhost_sel" style="width:350px;" class="select form-control">
<option value="0" selected>No</option>
<option value="1">Yes</option>
</select><br><br>
<p>
Use SSL (a self-signed certificate will be generated that can be replaced)
</p>
<select name="ssl_sel" id="ssl_sel" style="width:350px;" class="select form-control">
<option value="0" selected>No</option>
<option value="1">Yes</option>
</select>
</div>
</div>
<!-- Step 2 Webserver 2 -->
<div class="wizard-card wizard-card-overlay" data-cardname="webserver2">
<h3>Webserver 2/2</h3>
<div class="wizard-input-section">
<p>
Webserver port
</p>
<div class="col-sm-8">
<input type="number" class="form-control" id="port" name="port" value="53842" min="1" max="65535" placeholder="Port number">
</div><br><br><br>
<p>
Public facing URL
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="url" name="url" value="http://127.0.0.1:53842/" onfocusout="extUrlChanged(this)" placeholder="Public URL">
</div><br><br><br>
<p>
Redirection URL for the index
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="url_redirection" name="url_redirection" value="https://github.com/Forceu/Gokapi/" placeholder="Redirection URL">
</div>
</div>
</div>
<!-- Step 3 Auth -->
<div class="wizard-card wizard-card-overlay" data-cardname="authentication">
<h3>Authentication</h3>
<div class="wizard-input-section">
<p>
Please select the method for logging in to the admin panel
</p>
<select name="authentication_sel" id="authentication_sel" style="width:350px;" class="select form-control" onchange="authSelectionChanged(this.value);">
<optgroup label="Standalone">
<option value="0" selected>Username / Password</option>
<option value="1" >OAuth2 OpenID Connect</option>
</optgroup>
<optgroup label="Reverse Proxy">
<option value="2">Header Authentication</option>
<option value="3">Access Restriction</option>
</optgroup>
</select>
</div>
</div>
<!-- Step 4 Credentials PW -->
<div class="wizard-card wizard-card-overlay" data-cardname="credentials">
<h3>Credentials</h3>
<div class="wizard-input-section">
<p>
Please enter a username and password for the admin user
</p>
<div class="wizard-input-section">
<div class="form-group">
<div class="col-sm-8">
<input type="text" class="form-control" id="auth_username" name="auth_username" placeholder="Username" data-min="3" required data-validate="validateMinLength">
</div><br><br>
<div class="col-sm-8">
<input type="password" autocomplete="new-password" class="form-control" id="auth_pw" name="auth_pw" placeholder="Password" data-min="8" required data-validate="validatePassword">
</div><br><br>
<div class="col-sm-8">
<input type="password" autocomplete="new-password" class="form-control" id="auth_pw2" name="auth_pw2" placeholder="Password (repeat)" data-min="8" required>
</div>
</div>
</div>
</div>
</div>
<!-- Step 4 Credentials Oauth -->
<div class="wizard-card wizard-card-overlay" data-cardname="credentials-oauth">
<h3>Credentials</h3>
<div class="wizard-input-section">
<p>
Please enter the OIDC client configuration. Add the allowed users to the list below (seperated by semicolon) or leave it blank if access is granted to all authenticated users.<br>
</p>
<div class="wizard-input-section">
<div class="form-group">
<p>
Provider URL
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="oauth_provider" name="oauth_provider" placeholder="Provider URL" data-min="1" required data-validate="validateMinLength">
</div><br><br>
<p>
Client ID
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="oauth_id" name="oauth_id" placeholder="Client ID" data-min="1" required data-validate="validateMinLength">
</div><br><br>
<p>
Client Secret
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="oauth_secret" name="oauth_secret" placeholder="Client Secret" data-min="1" required data-validate="validateMinLength">
</div><br><br>
<p>
Authorised users
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="oauth_header_users" name="oauth_header_users" placeholder="Authorised users">
</div><br><br><br>
{{ if .IsInitialSetup }}
<p><span style="font-weight:bold">Redirection URL: </span><span id="oauth_redir">http://127.0.0.1:53842/oauth-callback</span></p><br>
{{ else }}
<p><span style="font-weight:bold">Redirection URL: </span><span id="oauth_redir">{{ .Settings.ServerUrl }}oauth-callback</span></p><br>
{{ end }}
</div>
</div>
</div>
</div>
<!-- Step 4 Credentials Header -->
<div class="wizard-card wizard-card-overlay" data-cardname="credentials-header">
<h3>Credentials</h3>
<div class="wizard-input-section">
<p>
Enter the key of the header that will be provided from your reverse proxy containing the username.<br>Add the allowed users to the list below (seperated by semicolon) or leave it blank if access is granted to all authenticated users.<br><br>
</p>
<div class="wizard-input-section">
<div class="form-group">
<p>
Header Key
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="auth_headerkey" name="auth_headerkey" required placeholder="Header Key" data-validate="validateServerLabel">
</div><br><br>
<p>
Authorised users
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="auth_header_users" name="auth_header_users" placeholder="Authorised users">
</div>
</div>
</div>
</div>
</div>
<!-- Step 4 Credentials Disbabled -->
<div class="wizard-card wizard-card-overlay" data-cardname="credentials-disabled">
<h3>Credentials</h3>
<div class="wizard-input-section">
<p>
<span style="color:#FF0000;">Warning:</span> This setting will disable authentication completely! You will need to secure the following URLs with your reverse proxy:
<ul>
<li>/admin</li>
<li>/apiDelete</li>
<li>/apiKeys</li>
<li>/apiNew</li>
<li>/delete</li>
<li>/upload</li>
</ul>
Only proceed if you know what you are doing!
</p>
</div>
</div>
<!-- Step 5 Storage -->
<div class="wizard-card wizard-card-overlay" data-cardname="storage">
<h3>Storage</h3>
<div class="wizard-input-section">
<p>
Select if you want to store files locally or on an S3 compatible cloud infrastructure
</p>
<select name="storage_sel" id="storage_sel" style="width:350px;" class="select form-control" onchange="storageSelectionChanged(this.selectedIndex);">
<option value="local" selected>Local Storage</option>
<option value="cloud">Cloud Storage</option>
</select>
</div>
</div>
<!-- Step 6 S3 Credentials -->
<div class="wizard-card wizard-card-overlay" data-cardname="s3credentials">
<h3>S3 Credentials</h3>
<div class="wizard-input-section">
<p>
Bucket Name
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="s3_bucket" name="s3_bucket" placeholder="Bucket Name" required data-validate="validateServerLabel">
</div><br><br>
<p>
Region Name
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="s3_region" name="s3_region" placeholder="Region Name" required data-validate="validateServerLabel">
</div><br><br>
<p>
API Key
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="s3_api" name="s3_api" placeholder="API Key" required data-validate="validateServerLabel">
</div><br><br><p>
API Key Secret
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="s3_secret" name="s3_secret" placeholder="API Key Secret" required data-validate="validateServerLabel">
</div><br><br><p>
Endpoint
</p>
<div class="col-sm-8">
<input type="text" class="form-control" id="s3_endpoint" name="s3_endpoint" placeholder="Endpoint (leave blank if AWS S3)">
</div>
</div>
</div>
<!-- Step 7 Finish -->
<div class="wizard-card">
<h3>Finish</h3>
<div class="wizard-input-section">
<p>Gokapi has been fully set up. Click on Submit to save the configuration.
</p>
</div>
<div class="wizard-error">
<div class="alert alert-error">
<strong>There was a problem</strong> with your submission.
Please correct the errors and re-submit.
</div>
</div>
<div class="wizard-failure">
<div class="alert alert-error">
There was a problem submitting the configuration.<br><br>The following error was raised: <span style="font-weight:bold" id="errormessage"></span><br><br>The server responded with: <span style="font-weight:bold" id="errormessage_response"></span>
</div>
</div>
<div class="wizard-success">
<div class="alert alert-success">
<span class="create-server-name"></span>Gokapi has been set up <strong>successfully.</strong>
</div>
<a class="btn btn-success im-done">Continue</a>
</div>
</div>
</div>
<script src="./js/jquery-2.0.3.min.js"></script>
<script src="./chosen/chosen.jquery.js"></script>
<script src="./js/bootstrap.min.js" ></script>
<script src="./js/prettify.js"></script>
<script src="./src/bootstrap-wizard.js"></script>
<script>
var wizard;
$(document).ready(function() {
wizard = $('#satellite-wizard').wizard({
keyboard : false,
contentHeight : 500,
contentWidth : 800,
showClose : false,
submitUrl: "./setupResult",
backdrop: 'static'
});
wizard.el.find(".wizard-success .im-done").click(function() {
window.location.href = $("#url").val()+"admin";
});
wizard.cards["credentials-oauth"].disable(true);
wizard.cards["credentials-header"].disable(true);
wizard.cards["credentials-disabled"].disable(true);
wizard.cards["s3credentials"].disable(true);
{{ if not .IsInitialSetup }}
{{ if .LocalhostOnly }}
document.getElementById("localhost_sel").selectedIndex = 1;
{{ end }}
{{ if .Settings.UseSsl }}
document.getElementById("ssl_sel").selectedIndex = 1;
{{ end }}
document.getElementById("port").value = "{{ .Port }}";
document.getElementById("url").value = "{{ .Settings.ServerUrl }}";
document.getElementById("url_redirection").value = "{{ .Settings.RedirectUrl }}";
document.getElementById("authentication_sel").value = "{{ .Auth.Method }}";
authSelectionChanged("{{ .Auth.Method }}")
switch ({{ .Auth.Method }}) {
case 0:
document.getElementById("auth_username").value = "{{ .Auth.Username }}";
document.getElementById("auth_pw").value = "unc";
document.getElementById("auth_pw2").value = "unc";
break;
case 1:
document.getElementById("oauth_provider").value = "{{ .Auth.OauthProvider }}";
document.getElementById("oauth_id").value = "{{ .Auth.OAuthClientId }}";
document.getElementById("oauth_secret").value = "{{ .Auth.OAuthClientSecret }}";
document.getElementById("oauth_header_users").value = "{{ .OAuthUsers }}";
break;
case 2:
document.getElementById("auth_headerkey").value = "{{ .Auth.HeaderKey }}";
document.getElementById("auth_header_users").value = "{{ .HeaderUsers }}";
break;
}
{{ if .CloudSettings.Aws.Bucket }}
document.getElementById("storage_sel").value = "cloud";
storageSelectionChanged(1);
document.getElementById("s3_bucket").value = "{{ .CloudSettings.Aws.Bucket }}";
document.getElementById("s3_region").value = "{{ .CloudSettings.Aws.Region }}";
document.getElementById("s3_api").value = "{{ .CloudSettings.Aws.KeyId }}";
document.getElementById("s3_secret").value = "{{ .CloudSettings.Aws.KeySecret }}";
document.getElementById("s3_endpoint").value = "{{ .CloudSettings.Aws.Endpoint }}";
{{ end }}
{{ end }}
wizard.on("submit", function(wizard) {
$.ajax({
type: "POST",
url: wizard.args.submitUrl,
data: JSON.stringify(wizard.serializeArray()),
contentType: "application/json; charset=utf-8",
dataType: "json"
}).done(function(response) {
wizard.submitSuccess();
wizard.hideButtons();
wizard.updateProgressBar(0);
}).fail(function(xhr, textStatus, errorThrown) {
$('#errormessage').text(errorThrown);
$('#errormessage_response').text(xhr.responseText);
wizard.submitFailure();
wizard.hideButtons();
});
});
});
function validateServerLabel(el) {
var name = el.val();
var retValue = {};
if (name == "") {
retValue.status = false;
retValue.msg = "Please enter a value";
} else {
retValue.status = true;
}
return retValue;
};
function validateMinLength(el) {
var value = el.val();
var retValue = {};
if (value.length < el[0].dataset.min) {
retValue.status = false;
retValue.msg = "Needs to be at least "+el[0].dataset.min+" characters long";
} else {
retValue.status = true;
}
return retValue;
}
function validatePassword(el) {
{{ if not .IsInitialSetup }}
if (el.val() == "unc")
return true;
{{end}}
let minLenghtStatus = validateMinLength(el);
if (minLenghtStatus.status==false)
return minLenghtStatus;
var value = el.val();
var retValue = {};
if (el.val() != $('#auth_pw2').val()) {
retValue.status = false;
retValue.msg = "Passwords do not match";
} else {
retValue.status = true;
}
return retValue;
}
function storageSelectionChanged(index) {
let card = wizard.cards["s3credentials"];
if (index==0)
card.disable(true);
else
if (index==1)
card.enable();
}
$(function() {
wizard.show();
});
function extUrlChanged(el) {
var lastChar = el.value.substr(-1);
if (lastChar != '/')
el.value = (el.value + '/')
document.getElementById("oauth_redir").innerHTML = el.value + "oauth-callback";
}
function authSelectionChanged(value) {
wizard.cards["credentials"].disable(true);
wizard.cards["credentials-oauth"].disable(true);
wizard.cards["credentials-header"].disable(true);
wizard.cards["credentials-disabled"].disable(true);
switch (value) {
case '0':
wizard.cards["credentials"].enable();
break;
case '1':
wizard.cards["credentials-oauth"].enable();
break;
case '2':
wizard.cards["credentials-header"].enable();
break;
case '3':
wizard.cards["credentials-disabled"].enable();
break;
}
}
</script>
</body>
</html>
{{ end }}

View File

@@ -4,46 +4,56 @@ import (
"os"
"reflect"
"strconv"
"strings"
)
// IsTrue is a placeholder for yes
const IsTrue = "yes"
// IsFalse is a placeholder for no
const IsFalse = "no"
// DefaultPort for the webserver
const DefaultPort = 53842
// Environment is a struct containing available env variables
type Environment struct {
ConfigDir string
ConfigFile string
ConfigPath string
DataDir string
AdminName string
AdminPassword string
WebserverPort string
WebserverLocalhost string
ExternalUrl string
RedirectUrl string
SaltAdmin string
SaltFiles string
UseSsl string
AwsBucket string
AwsRegion string
AwsKeyId string
AwsKeySecret string
AwsEndpoint string
DisableLogin string
LoginHeaderKey string
LoginHeaderForceUser string
LengthId int
MaxMemory int
MaxFileSize int
ConfigDir string
ConfigFile string
ConfigPath string
DataDir string
WebserverPort string
LengthId int
MaxMemory int
MaxFileSize int
AwsBucket string
AwsRegion string
AwsKeyId string
AwsKeySecret string
AwsEndpoint string
}
// ToBool checks if a string output by the environment package is equal true or false
func ToBool(input string) bool {
return input == IsTrue
var defaultValues = defaultsEnvironment{
CONFIG_DIR: "config",
CONFIG_FILE: "config.json",
DATA_DIR: "data",
PORT: strconv.Itoa(DefaultPort),
LENGTH_ID: 15,
MAX_MEMORY_UPLOAD_MB: 20,
MAX_FILESIZE: 102400, // 100GB
}
// New parses the env variables
func New() Environment {
configPath, configDir, configFile, _ := GetConfigPaths()
return Environment{
ConfigDir: configDir,
ConfigFile: configFile,
ConfigPath: configPath,
WebserverPort: GetPort(),
DataDir: envString("DATA_DIR"),
LengthId: envInt("LENGTH_ID", 5),
MaxMemory: envInt("MAX_MEMORY_UPLOAD_MB", 5),
MaxFileSize: envInt("MAX_FILESIZE", 1),
AwsBucket: envString("AWS_BUCKET"),
AwsRegion: envString("AWS_REGION"),
AwsKeyId: envString("AWS_KEY"),
AwsKeySecret: envString("AWS_KEY_SECRET"),
AwsEndpoint: envString("AWS_ENDPOINT"),
}
}
// IsAwsProvided returns true if all required env variables have been set for using AWS S3 / Backblaze
@@ -54,49 +64,6 @@ func (e *Environment) IsAwsProvided() bool {
e.AwsKeySecret != ""
}
var defaultValues = defaultsEnvironment{
CONFIG_DIR: "config",
CONFIG_FILE: "config.json",
DATA_DIR: "data",
LENGTH_ID: 15,
MAX_MEMORY_UPLOAD_MB: 20,
MAX_FILESIZE: 102400, // 100GB
}
// New parses the env variables
func New() Environment {
configDir := envString("CONFIG_DIR")
configFile := envString("CONFIG_FILE")
configPath := configDir + "/" + configFile
return Environment{
ConfigDir: configDir,
ConfigFile: configFile,
ConfigPath: configPath,
DataDir: envString("DATA_DIR"),
AdminName: envString("USERNAME"),
AdminPassword: envString("PASSWORD"),
WebserverPort: envString("PORT"),
ExternalUrl: envString("EXTERNAL_URL"),
RedirectUrl: envString("REDIRECT_URL"),
SaltAdmin: envString("SALT_ADMIN"),
SaltFiles: envString("SALT_FILES"),
WebserverLocalhost: envBool("LOCALHOST"),
LengthId: envInt("LENGTH_ID", 5),
MaxMemory: envInt("MAX_MEMORY_UPLOAD_MB", 5),
UseSsl: envBool("USE_SSL"),
AwsBucket: envString("AWS_BUCKET"),
AwsRegion: envString("AWS_REGION"),
AwsKeyId: envString("AWS_KEY"),
AwsKeySecret: envString("AWS_KEY_SECRET"),
AwsEndpoint: envString("AWS_ENDPOINT"),
MaxFileSize: envInt("MAX_FILESIZE", 1),
DisableLogin: envBool("DISABLE_LOGIN"),
LoginHeaderKey: envString("LOGIN_HEADER_KEY"),
LoginHeaderForceUser: envBool("LOGIN_HEADER_FORCE_USER"),
}
}
// Looks up an environment variable or returns an empty string
func envString(key string) string {
val, ok := os.LookupEnv("GOKAPI_" + key)
@@ -106,22 +73,6 @@ func envString(key string) string {
return val
}
// Looks up a boolean environment variable, returns either IsFalse or IsTrue
func envBool(key string) string {
val, ok := os.LookupEnv("GOKAPI_" + key)
if !ok {
return ""
}
valLower := strings.ToLower(val)
if valLower == "true" || valLower == "yes" {
return IsTrue
}
if valLower == "false" || valLower == "no" {
return IsFalse
}
return ""
}
// Looks up an environment variable or returns an empty string
func envInt(key string, minValue int) int {
val, ok := os.LookupEnv("GOKAPI_" + key)
@@ -139,6 +90,18 @@ func envInt(key string, minValue int) int {
}
func GetConfigPaths() (string, string, string, string) {
configDir := envString("CONFIG_DIR")
configFile := envString("CONFIG_FILE")
configPath := configDir + "/" + configFile
awsConfigPAth := configDir + "/cloudconfig.yml"
return configPath, configDir, configFile, awsConfigPAth
}
func GetPort() string {
return envString("PORT")
}
// Gets the env variable or default value as string
func (structPointer *defaultsEnvironment) getString(name string) string {
field := reflect.ValueOf(structPointer).Elem().FieldByName(name)
@@ -161,8 +124,7 @@ type defaultsEnvironment struct {
CONFIG_DIR string
CONFIG_FILE string
DATA_DIR string
SALT_ADMIN string
SALT_FILES string
PORT string
LENGTH_ID int
MAX_MEMORY_UPLOAD_MB int
MAX_FILESIZE int

View File

@@ -12,26 +12,20 @@ import (
func TestEnvLoad(t *testing.T) {
os.Setenv("GOKAPI_CONFIG_DIR", "test")
os.Setenv("GOKAPI_CONFIG_FILE", "test2")
os.Setenv("GOKAPI_LOCALHOST", "yes")
os.Setenv("GOKAPI_LENGTH_ID", "7")
env := New()
test.IsEqualString(t, env.ConfigPath, "test/test2")
test.IsEqualString(t, env.WebserverLocalhost, IsTrue)
test.IsEqualInt(t, env.LengthId, 7)
os.Setenv("GOKAPI_LENGTH_ID", "3")
os.Setenv("GOKAPI_LOCALHOST", "false")
env = New()
test.IsEqualInt(t, env.LengthId, 5)
test.IsEqualString(t, env.WebserverLocalhost, IsFalse)
os.Unsetenv("GOKAPI_LOCALHOST")
os.Unsetenv("GOKAPI_LENGTH_ID")
env = New()
test.IsEqualString(t, env.WebserverLocalhost, "")
os.Setenv("GOKAPI_LENGTH_ID", "15")
os.Setenv("GOKAPI_LOCALHOST", "invalid")
os.Setenv("GOKAPI_LENGTH_ID", "invalid")
env = New()
test.IsEqualString(t, env.WebserverLocalhost, "")
test.IsEqualInt(t, env.LengthId, -1)
}
@@ -49,9 +43,3 @@ func TestIsAwsProvided(t *testing.T) {
env = New()
test.IsEqualBool(t, env.IsAwsProvided(), true)
}
func TestToBool(t *testing.T) {
test.IsEqualBool(t, ToBool(IsTrue), true)
test.IsEqualBool(t, ToBool(IsFalse), false)
test.IsEqualBool(t, ToBool("invalid"), false)
}

View File

@@ -5,6 +5,7 @@ package helper
import (
"Gokapi/internal/test"
"errors"
"io/ioutil"
"os"
"testing"
@@ -60,3 +61,11 @@ func TestGetFileSize(t *testing.T) {
test.IsEqualInt(t, int(size), 0)
os.Remove("testfile")
}
func TestCheck(t *testing.T) {
var err error
Check(err)
defer test.ExpectPanic(t)
err = errors.New("test")
Check(err)
}

View File

@@ -0,0 +1,15 @@
package models
type AuthenticationConfig struct {
Method int `json:"Method"`
SaltAdmin string `json:"SaltAdmin"`
SaltFiles string `json:"SaltFiles"`
Username string `json:"Username"`
Password string `json:"Password"`
HeaderKey string `json:"HeaderKey"`
OauthProvider string `json:"OauthProvider"`
OAuthClientId string `json:"OAuthClientId"`
OAuthClientSecret string `json:"OAuthClientSecret"`
HeaderUsers []string `json:"HeaderUsers"`
OauthUsers []string `json:"OauthUsers"`
}

View File

@@ -4,9 +4,9 @@ package models
type AwsConfig struct {
Bucket string `yaml:"Bucket"`
Region string `yaml:"Region"`
Endpoint string `yaml:"Endpoint"`
KeyId string `yaml:"KeyId"`
KeySecret string `yaml:"KeySecret"`
Endpoint string `yaml:"Endpoint"`
}
// IsAllProvided returns true if all required variables have been set for using AWS S3 / Backblaze

View File

@@ -0,0 +1,23 @@
package models
// Configuration is a struct that contains the global configuration
type Configuration struct {
Authentication AuthenticationConfig `json:"Authentication"`
Port string `json:"Port"`
ServerUrl string `json:"ServerUrl"`
DefaultDownloads int `json:"DefaultDownloads"`
DefaultExpiry int `json:"DefaultExpiry"`
DefaultPassword string `json:"DefaultPassword"`
RedirectUrl string `json:"RedirectUrl"`
Sessions map[string]Session `json:"Sessions"`
Files map[string]File `json:"Files"`
Hotlinks map[string]Hotlink `json:"Hotlinks"`
DownloadStatus map[string]DownloadStatus `json:"DownloadStatus"`
ApiKeys map[string]ApiKey `json:"ApiKeys"`
ConfigVersion int `json:"ConfigVersion"`
LengthId int `json:"LengthId"`
DataDir string `json:"DataDir"`
MaxMemory int `json:"MaxMemory"`
UseSsl bool `json:"UseSsl"`
MaxFileSizeMB int `json:"MaxFileSizeMB"`
}

View File

@@ -289,3 +289,30 @@ func HttpPostRequest(t MockT, config HttpTestConfig) {
}
}
}
func GetRecorder(method, target string, cookies []Cookie, headers []Header, body io.Reader) (*httptest.ResponseRecorder, *http.Request) {
w := httptest.NewRecorder()
r := httptest.NewRequest(method, target, body)
if cookies != nil {
for _, cookie := range cookies {
r.AddCookie(&http.Cookie{
Name: cookie.Name,
Value: cookie.Value,
Path: "/",
})
}
}
if headers != nil {
for _, header := range headers {
r.Header.Set(header.Name, header.Value)
}
}
return w, r
}
func ExpectPanic(t MockT) {
r := recover()
if r == nil {
t.Errorf("The code did not panic")
}
}

View File

@@ -43,6 +43,7 @@ func (t *MockTest) WantNoFail() {
func (t *MockTest) Check() {
if wantFail != isFailed {
t.reference.Helper()
t.reference.Error("Test failed")
}
}
@@ -222,3 +223,28 @@ func TestOsExit(t *testing.T) {
osExit(1)
mockT.Check()
}
func TestExpectPanic(t *testing.T) {
mockT := MockTest{reference: t}
mockT.WantFail()
ExpectPanic(mockT)
mockT.Check()
err := errors.New("test")
defer ExpectPanic(mockT)
panic(err)
}
func TestGetRecorder(t *testing.T) {
_, r := GetRecorder("GET", "/", []Cookie{{
Name: "test",
Value: "testvalue",
}}, []Header{{
Name: "testheader",
Value: "testheadervalue",
}}, nil)
cookie, err := r.Cookie("test")
IsNil(t, err)
IsEqualString(t, cookie.Value, "testvalue")
IsEqualString(t, r.Header.Get("testheader"), "testheadervalue")
}

View File

@@ -18,11 +18,16 @@ const (
configFile = dataDir + "/config.json"
)
// Create creates a configuration for unit testing
func Create(initFiles bool) {
func SetDirEnv() {
os.Setenv("GOKAPI_CONFIG_DIR", "test")
os.Setenv("GOKAPI_DATA_DIR", "test")
os.Mkdir(dataDir, 0777)
}
// Create creates a configuration for unit testing
func Create(initFiles bool) {
SetDirEnv()
os.WriteFile(configFile, configTestFile, 0777)
if initFiles {
os.Mkdir("test/data", 0777)
@@ -34,11 +39,16 @@ func Create(initFiles bool) {
}
}
// WriteUpgradeConfigFile writes a Gokapi v1.1.0 config file
func WriteUpgradeConfigFile() {
// WriteUpgradeConfigFileV0 writes a Gokapi v1.1.0 config file
func WriteUpgradeConfigFileV0() {
os.Mkdir(dataDir, 0777)
os.WriteFile(configFile, configUpgradeTestFile, 0777)
}
// WriteUpgradeConfigFileV8 writes a Gokapi v1.3 config file
func WriteUpgradeConfigFileV8() {
os.Mkdir(dataDir, 0777)
os.WriteFile(configFile, configTestFileV8, 0777)
}
// WriteSslCertificates writes a valid or invalid SSL certificate
func WriteSslCertificates(valid bool) {
@@ -298,6 +308,191 @@ var configTestFile = []byte(`{
"UseSsl":false,
"MaxFileSizeMB":25
}`)
var configTestFileV8 = []byte(`{
"Port":"127.0.0.1:53843",
"AdminName":"test",
"AdminPassword":"10340aece68aa4fb14507ae45b05506026f276cf",
"ServerUrl":"http://127.0.0.1:53843/",
"DefaultDownloads":3,
"DefaultExpiry":20,
"DefaultPassword":"123",
"RedirectUrl":"https://test.com/",
"Sessions":{
"validsession":{
"RenewAt":2147483645,
"ValidUntil":2147483646
},
"logoutsession":{
"RenewAt":2147483645,
"ValidUntil":2147483646
},
"needsRenewal":{
"RenewAt":0,
"ValidUntil":2147483646
},
"expiredsession":{
"RenewAt":0,
"ValidUntil":0
}
},
"Files":{
"Wzol7LyY2QVczXynJtVo":{
"Id":"Wzol7LyY2QVczXynJtVo",
"Name":"smallfile2",
"Size":"8 B",
"SHA256":"e017693e4a04a59d0b0f400fe98177fe7ee13cf7",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":1,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":""
},
"e4TjE7CokWK0giiLNxDL":{
"Id":"e4TjE7CokWK0giiLNxDL",
"Name":"smallfile2",
"Size":"8 B",
"SHA256":"e017693e4a04a59d0b0f400fe98177fe7ee13cf7",
"ExpireAt":2147483645,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":2,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":""
},
"wefffewhtrhhtrhtrhtr":{
"Id":"wefffewhtrhhtrhtrhtr",
"Name":"smallfile3",
"Size":"8 B",
"SHA256":"e017693e4a04a59d0b0f400fe98177fe7ee13cf7",
"ExpireAt":2147483645,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":1,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":""
},
"deletedfile123456789":{
"Id":"deletedfile123456789",
"Name":"DeletedFile",
"Size":"8 B",
"SHA256":"invalid",
"ExpireAt":2147483645,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":2,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":""
},
"jpLXGJKigM4hjtA6T6sN":{
"Id":"jpLXGJKigM4hjtA6T6sN",
"Name":"smallfile",
"Size":"7 B",
"SHA256":"c4f9375f9834b4e7f0a528cc65c055702bf5f24a",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:18",
"DownloadsRemaining":1,
"ContentType":"text/html",
"PasswordHash":"7b30508aa9b233ab4b8a11b2af5816bdb58ca3e7",
"HotlinkId":""
},
"jpLXGJKigM4hjtA6T6sN2":{
"Id":"jpLXGJKigM4hjtA6T6sN2",
"Name":"smallfile",
"Size":"7 B",
"SHA256":"c4f9375f9834b4e7f0a528cc65c055702bf5f24a",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:18",
"DownloadsRemaining":1,
"ContentType":"text/html",
"PasswordHash":"7b30508aa9b233ab4b8a11b2af5816bdb58ca3e7",
"HotlinkId":""
},
"n1tSTAGj8zan9KaT4u6p":{
"Id":"n1tSTAGj8zan9KaT4u6p",
"Name":"picture.jpg",
"Size":"4 B",
"SHA256":"a8fdc205a9f19cc1c7507a60c4f01b13d11d7fd0",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":1,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":"PhSs6mFtf8O5YGlLMfNw9rYXx9XRNkzCnJZpQBi7inunv3Z4A.jpg"
},
"cleanuptest123456789":{
"Id":"cleanuptest123456789",
"Name":"cleanup",
"Size":"4 B",
"SHA256":"2341354656543213246465465465432456898794",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":0,
"PasswordHash":"",
"ContentType":"text/html",
"HotlinkId":""
},
"awsTest1234567890123":{
"Id":"awsTest1234567890123",
"Name":"Aws Test File",
"Size":"20 MB",
"SHA256":"x341354656543213246465465465432456898794",
"ExpireAt":2147483646,
"ExpireAtString":"2021-05-04 15:19",
"DownloadsRemaining":4,
"PasswordHash":"",
"ContentType":"application/octet-stream",
"AwsBucket":"gokapi-test",
"HotlinkId":""
}
},
"Hotlinks":{
"PhSs6mFtf8O5YGlLMfNw9rYXx9XRNkzCnJZpQBi7inunv3Z4A.jpg":{
"Id":"PhSs6mFtf8O5YGlLMfNw9rYXx9XRNkzCnJZpQBi7inunv3Z4A.jpg",
"FileId":"n1tSTAGj8zan9KaT4u6p"
}
},
"DownloadStatus":{
"69JCbLVxx2KxfvB6FYkrDn3oCU7BWT":{
"Id":"69JCbLVxx2KxfvB6FYkrDn3oCU7BWT",
"FileId":"cleanuptest123456789",
"ExpireAt":2147483646
}
},
"ApiKeys":{
"validkey":{
"Id":"validkey",
"FriendlyName":"First Key",
"LastUsed":0,
"LastUsedString":""
},
"GAh1IhXDvYnqfYLazWBqMB9HSFmNPO":{
"Id":"GAh1IhXDvYnqfYLazWBqMB9HSFmNPO",
"FriendlyName":"Second Key",
"LastUsed":1620671580,
"LastUsedString":"used"
},
"jiREglQJW0bOqJakfjdVfe8T1EM8n8":{
"Id":"jiREglQJW0bOqJakfjdVfe8T1EM8n8",
"FriendlyName":"Unnamed Key",
"LastUsed":0,
"LastUsedString":""
},
"okeCMWqhVMZSpt5c1qpCWhKvJJPifb":{
"Id":"okeCMWqhVMZSpt5c1qpCWhKvJJPifb",
"FriendlyName":"Unnamed Key",
"LastUsed":0,
"LastUsedString":""
}
},
"ConfigVersion":8,
"SaltAdmin":"LW6fW4Pjv8GtdWVLSZD66gYEev6NAaXxOVBw7C",
"SaltFiles":"lL5wMTtnVCn5TPbpRaSe4vAQodWW0hgk00WCZE",
"LengthId":20,
"DataDir":"test/data",
"UseSsl":false,
"MaxFileSizeMB":25
}`)
var configUpgradeTestFile = []byte(`{
"Port":"127.0.0.1:53844",

View File

@@ -23,9 +23,15 @@ func TestDelete(t *testing.T) {
test.IsEqualBool(t, helper.FolderExists(dataDir), false)
}
func TestSetUpgradeConfigFile(t *testing.T) {
func TestSetUpgradeConfigFileV0(t *testing.T) {
os.Remove(configFile)
WriteUpgradeConfigFile()
WriteUpgradeConfigFileV0()
test.FileExists(t, configFile)
TestDelete(t)
}
func TestSetUpgradeConfigFileV8(t *testing.T) {
os.Remove(configFile)
WriteUpgradeConfigFileV0()
test.FileExists(t, configFile)
TestDelete(t)
}

View File

@@ -11,8 +11,9 @@ import (
"Gokapi/internal/storage"
"Gokapi/internal/webserver/api"
"Gokapi/internal/webserver/authentication"
"Gokapi/internal/webserver/authentication/oauth"
"Gokapi/internal/webserver/authentication/sessionmanager"
"Gokapi/internal/webserver/fileupload"
"Gokapi/internal/webserver/sessionmanager"
"Gokapi/internal/webserver/ssl"
"embed"
"fmt"
@@ -49,16 +50,17 @@ var imageExpiredPicture []byte
const expiredFile = "static/expired.png"
var (
webserverPort string
webserverExtUrl string
webserverRedirectUrl string
webserverMaxMemory int
webserverUseSsl bool
)
// Start the webserver on the port set in the config
func Start() {
initLocalVariables()
settings := configuration.GetServerSettingsReadOnly()
configuration.ReleaseReadOnly()
webserverRedirectUrl = settings.RedirectUrl
webserverMaxMemory = settings.MaxMemory
initTemplates(templateFolderEmbedded)
webserverDir, _ := fs.Sub(staticFolderEmbedded, "web/static")
var err error
@@ -72,37 +74,44 @@ func Start() {
imageExpiredPicture, err = fs.ReadFile(staticFolderEmbedded, "web/"+expiredFile)
helper.Check(err)
}
http.HandleFunc("/index", showIndex)
http.HandleFunc("/d", showDownload)
http.HandleFunc("/hotlink/", showHotlink)
http.HandleFunc("/error", showError)
http.HandleFunc("/login", showLogin)
http.HandleFunc("/logout", doLogout)
http.HandleFunc("/admin", showAdminMenu)
http.HandleFunc("/upload", uploadFile)
http.HandleFunc("/delete", deleteFile)
http.HandleFunc("/downloadFile", downloadFile)
http.HandleFunc("/forgotpw", forgotPassword)
http.HandleFunc("/api/", processApi)
http.HandleFunc("/apiDelete", deleteApiKey)
http.HandleFunc("/apiKeys", showApiAdmin)
http.HandleFunc("/apiNew", newApiKey)
http.HandleFunc("/apiDelete", deleteApiKey)
fmt.Println("Binding webserver to " + webserverPort)
http.HandleFunc("/d", showDownload)
http.HandleFunc("/delete", deleteFile)
http.HandleFunc("/downloadFile", downloadFile)
http.HandleFunc("/error", showError)
http.HandleFunc("/forgotpw", forgotPassword)
http.HandleFunc("/hotlink/", showHotlink)
http.HandleFunc("/index", showIndex)
http.HandleFunc("/login", showLogin)
http.HandleFunc("/logout", doLogout)
http.HandleFunc("/upload", uploadFile)
http.HandleFunc("/error-auth", showErrorAuth)
if settings.Authentication.Method == authentication.OAuth2 {
oauth.Init(settings.ServerUrl, settings.Authentication)
http.HandleFunc("/oauth-login", oauth.HandlerLogin)
http.HandleFunc("/oauth-callback", oauth.HandlerCallback)
}
fmt.Println("Binding webserver to " + settings.Port)
srv := &http.Server{
Addr: webserverPort,
Addr: settings.Port,
ReadTimeout: timeOutWebserver,
WriteTimeout: timeOutWebserver,
}
infoMessage := "Webserver can be accessed at " + webserverExtUrl + "admin"
if strings.Contains(webserverExtUrl, "127.0.0.1") {
if webserverUseSsl {
infoMessage := "Webserver can be accessed at " + settings.ServerUrl + "admin"
if strings.Contains(settings.ServerUrl, "127.0.0.1") {
if settings.UseSsl {
infoMessage = strings.Replace(infoMessage, "http://", "https://", 1)
} else {
infoMessage = strings.Replace(infoMessage, "https://", "http://", 1)
}
}
if webserverUseSsl {
ssl.GenerateIfInvalidCert(webserverExtUrl, false)
if settings.UseSsl {
ssl.GenerateIfInvalidCert(settings.ServerUrl, false)
fmt.Println(infoMessage)
log.Fatal(srv.ListenAndServeTLS(ssl.GetCertificateLocations()))
} else {
@@ -111,19 +120,9 @@ func Start() {
}
}
func initLocalVariables() {
settings := configuration.GetServerSettingsReadOnly()
webserverPort = settings.Port
webserverExtUrl = settings.ServerUrl
webserverRedirectUrl = settings.RedirectUrl
webserverMaxMemory = settings.MaxMemory
webserverUseSsl = settings.UseSsl
configuration.ReleaseReadOnly()
}
// Initialises the templateFolder variable by scanning through all the templates.
// If a folder "templates" exists in the main directory, it is used.
// Otherwise templateFolderEmbedded will be used.
// Otherwise, templateFolderEmbedded will be used.
func initTemplates(templateFolderEmbedded embed.FS) {
var err error
if helper.FolderExists("templates") {
@@ -143,8 +142,7 @@ func redirect(w http.ResponseWriter, url string) {
// Handling of /logout
func doLogout(w http.ResponseWriter, r *http.Request) {
sessionmanager.LogoutSession(w, r)
redirect(w, "login")
authentication.Logout(w, r)
}
// Handling of /index and redirecting to globalConfig.RedirectUrl
@@ -159,6 +157,12 @@ func showError(w http.ResponseWriter, r *http.Request) {
helper.Check(err)
}
// Handling of /error-auth
func showErrorAuth(w http.ResponseWriter, r *http.Request) {
err := templateFolder.ExecuteTemplate(w, "error_auth", genericView{})
helper.Check(err)
}
// Handling of /forgotpw
func forgotPassword(w http.ResponseWriter, r *http.Request) {
err := templateFolder.ExecuteTemplate(w, "forgotpw", genericView{})
@@ -205,13 +209,17 @@ func processApi(w http.ResponseWriter, r *http.Request) {
}
// Handling of /login
// Shows a login form. If username / pw combo is incorrect, client needs to wait for three seconds.
// Shows a login form. If not authenticated, client needs to wait for three seconds.
// If correct, a new session is created and the user is redirected to the admin menu
func showLogin(w http.ResponseWriter, r *http.Request) {
if authentication.IsAuthenticated(w, r) {
redirect(w, "admin")
return
}
if authentication.GetMethod() == authentication.OAuth2 {
redirect(w, "oauth-login")
return
}
err := r.ParseForm()
helper.Check(err)
user := r.Form.Get("username")
@@ -405,7 +413,7 @@ func (u *UploadView) convertGlobalConfig(isMainView bool) *UploadView {
u.IsAdminView = true
u.IsMainView = isMainView
u.MaxFileSize = settings.MaxFileSizeMB
u.IsLogoutAvailable = configuration.IsLogoutAvailable()
u.IsLogoutAvailable = authentication.IsLogoutAvailable()
configuration.ReleaseReadOnly()
return u
}

View File

@@ -7,7 +7,10 @@ import (
"Gokapi/internal/configuration"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"Gokapi/internal/webserver/authentication"
"errors"
"html/template"
"io"
"io/fs"
"os"
"strings"
@@ -173,7 +176,7 @@ func TestForgotPw(t *testing.T) {
t.Parallel()
test.HttpPageResult(t, test.HttpTestConfig{
Url: "http://localhost:53843/forgotpw",
RequiredContent: []string{"--reset-pw"},
RequiredContent: []string{"--reconfigure"},
IsHtml: true,
})
}
@@ -579,7 +582,8 @@ func TestDisableLogin(t *testing.T) {
}},
})
settings := configuration.GetServerSettings()
settings.DisableLogin = true
settings.Authentication.Method = authentication.Disabled
authentication.Init(settings.Authentication)
configuration.Release()
test.HttpPageResult(t, test.HttpTestConfig{
Url: "http://localhost:53843/admin",
@@ -591,6 +595,17 @@ func TestDisableLogin(t *testing.T) {
}},
})
settings = configuration.GetServerSettings()
settings.DisableLogin = false
settings.Authentication.Method = authentication.Internal
authentication.Init(settings.Authentication)
configuration.Release()
}
func TestResponseError(t *testing.T) {
w, _ := test.GetRecorder("GET", "/", nil, nil, nil)
err := errors.New("testerror")
defer test.ExpectPanic(t)
responseError(w, err)
output, err := io.ReadAll(w.Result().Body)
test.IsNil(t, err)
test.IsEqualString(t, string(output), "{\"Result\":\"error\",\"ErrorMessage\":\""+err.Error()+"\"}")
}

View File

@@ -5,8 +5,8 @@ import (
"Gokapi/internal/helper"
"Gokapi/internal/models"
"Gokapi/internal/storage"
"Gokapi/internal/webserver/authentication/sessionmanager"
"Gokapi/internal/webserver/fileupload"
"Gokapi/internal/webserver/sessionmanager"
"encoding/json"
"net/http"
"strings"

View File

@@ -8,11 +8,11 @@ import (
"Gokapi/internal/models"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"Gokapi/internal/webserver/authentication"
"bytes"
"encoding/json"
"io"
"mime/multipart"
"net/http"
"net/http/httptest"
"os"
"path/filepath"
@@ -61,19 +61,19 @@ func TestIsValidApiKey(t *testing.T) {
}
func TestProcess(t *testing.T) {
w, r := getRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
w, r := test.GetRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "{\"Result\":\"error\",\"ErrorMessage\":\"Unauthorized\"}")
w, r = getRecorder("GET", "/api/invalid", nil, nil, nil)
w, r = test.GetRecorder("GET", "/api/invalid", nil, nil, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "Unauthorized")
w, r = getRecorder("GET", "/api/invalid", nil, []test.Header{{
w, r = test.GetRecorder("GET", "/api/invalid", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "Invalid request")
w, r = getRecorder("GET", "/api/invalid", []test.Cookie{{
w, r = test.GetRecorder("GET", "/api/invalid", []test.Cookie{{
Name: "session_token",
Value: "validsession",
}}, nil, nil)
@@ -82,34 +82,34 @@ func TestProcess(t *testing.T) {
}
func TestAuthDisabledLogin(t *testing.T) {
w, r := getRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
w, r := test.GetRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "{\"Result\":\"error\",\"ErrorMessage\":\"Unauthorized\"}")
settings := configuration.GetServerSettings()
settings.DisableLogin = true
settings.Authentication.Method = authentication.Disabled
configuration.Release()
w, r = getRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
w, r = test.GetRecorder("GET", "/api/auth/friendlyname", nil, nil, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "{\"Result\":\"error\",\"ErrorMessage\":\"Unauthorized\"}")
settings.DisableLogin = false
settings.Authentication.Method = authentication.Internal
}
func TestChangeFriendlyName(t *testing.T) {
settings := configuration.GetServerSettings()
configuration.Release()
w, r := getRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
w, r := test.GetRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "Invalid api key provided.")
w, r = getRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
w, r = test.GetRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
Name: "apikey", Value: "validkey"}, {
Name: "apiKeyToModify", Value: "validkey"}}, nil)
Process(w, r, maxMemory)
test.IsEqualInt(t, w.Code, 200)
test.IsEqualString(t, settings.ApiKeys["validkey"].FriendlyName, "Unnamed key")
w, r = getRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
w, r = test.GetRecorder("GET", "/api/auth/friendlyname", nil, []test.Header{{
Name: "apikey", Value: "validkey"}, {
Name: "apiKeyToModify", Value: "validkey"}, {
Name: "friendlyName", Value: "NewName"}}, nil)
@@ -124,13 +124,13 @@ func TestChangeFriendlyName(t *testing.T) {
func TestDeleteFile(t *testing.T) {
settings := configuration.GetServerSettings()
configuration.Release()
w, r := getRecorder("GET", "/api/files/delete", nil, []test.Header{{
w, r := test.GetRecorder("GET", "/api/files/delete", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, nil)
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "Invalid id provided.")
w, r = getRecorder("GET", "/api/files/delete", nil, []test.Header{{
w, r = test.GetRecorder("GET", "/api/files/delete", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}, {
@@ -141,7 +141,7 @@ func TestDeleteFile(t *testing.T) {
Process(w, r, maxMemory)
test.ResponseBodyContains(t, w, "Invalid id provided.")
test.IsEqualString(t, settings.Files["jpLXGJKigM4hjtA6T6sN2"].Id, "jpLXGJKigM4hjtA6T6sN2")
w, r = getRecorder("GET", "/api/files/delete", nil, []test.Header{{
w, r = test.GetRecorder("GET", "/api/files/delete", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}, {
@@ -167,7 +167,7 @@ func TestUpload(t *testing.T) {
writer.WriteField("expiryDays", "10")
writer.WriteField("password", "12345")
writer.Close()
w, r := getRecorder("POST", "/api/files/add", nil, []test.Header{{
w, r := test.GetRecorder("POST", "/api/files/add", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, body)
@@ -184,7 +184,7 @@ func TestUpload(t *testing.T) {
test.IsEqualInt(t, result.FileInfo.DownloadsRemaining, 200)
test.IsNotEqualString(t, result.FileInfo.PasswordHash, "")
test.IsEqualString(t, result.Url, "http://127.0.0.1:53843/d?id=")
w, r = getRecorder("POST", "/api/files/add", nil, []test.Header{{
w, r = test.GetRecorder("POST", "/api/files/add", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, body)
@@ -194,7 +194,7 @@ func TestUpload(t *testing.T) {
}
func TestList(t *testing.T) {
w, r := getRecorder("GET", "/api/files/list", nil, []test.Header{{
w, r := test.GetRecorder("GET", "/api/files/list", nil, []test.Header{{
Name: "apikey",
Value: "validkey",
}}, nil)
@@ -202,23 +202,3 @@ func TestList(t *testing.T) {
test.IsEqualInt(t, w.Code, 200)
test.ResponseBodyContains(t, w, "picture.jpg")
}
func getRecorder(method, target string, cookies []test.Cookie, headers []test.Header, body io.Reader) (*httptest.ResponseRecorder, *http.Request) {
w := httptest.NewRecorder()
r := httptest.NewRequest(method, target, body)
if cookies != nil {
for _, cookie := range cookies {
r.AddCookie(&http.Cookie{
Name: cookie.Name,
Value: cookie.Value,
Path: "/",
})
}
}
if headers != nil {
for _, header := range headers {
r.Header.Set(header.Name, header.Value)
}
}
return w, r
}

View File

@@ -2,57 +2,121 @@ package authentication
import (
"Gokapi/internal/configuration"
"Gokapi/internal/webserver/sessionmanager"
"Gokapi/internal/models"
"Gokapi/internal/webserver/authentication/sessionmanager"
"crypto/subtle"
"github.com/coreos/go-oidc/v3/oidc"
"io"
"net/http"
"strings"
)
const CookieOauth = "state"
const Internal = 0
const OAuth2 = 1
const Header = 2
const Disabled = 3
var authSettings models.AuthenticationConfig
func Init(config models.AuthenticationConfig) {
authSettings = config
}
func IsAuthenticated(w http.ResponseWriter, r *http.Request) bool {
if byDisabledLogin() {
return true
}
if byHeader(r) {
return true
}
if byInternalSession(w, r) {
switch authSettings.Method {
case Internal:
return isGrantedSession(w, r)
case OAuth2:
return isGrantedSession(w, r)
case Header:
return isGrantedHeader(r)
case Disabled:
return true
}
return false
}
// byHeader returns true if the user was authenticated by a proxy header if enabled
func byHeader(r *http.Request) bool {
settings := configuration.GetServerSettingsReadOnly()
defer configuration.ReleaseReadOnly()
// isGrantedHeader returns true if the user was authenticated by a proxy header if enabled
func isGrantedHeader(r *http.Request) bool {
if settings.LoginHeaderKey == "" {
if authSettings.HeaderKey == "" {
return false
}
value := r.Header.Get(settings.LoginHeaderKey)
value := r.Header.Get(authSettings.HeaderKey)
if value == "" {
return false
}
if settings.LoginHeaderForceUsername {
return strings.ToLower(value) == strings.ToLower(settings.AdminName)
} else {
if len(authSettings.HeaderUsers) == 0 {
return true
}
return isUserInArray(value, authSettings.HeaderUsers)
}
// byDisabledLogin returns true if login has been disabled
func byDisabledLogin() bool {
return configuration.IsLoginDisabled()
func isUserInArray(userEntered string, strArray []string) bool {
for _, user := range strArray {
if strings.ToLower(user) == strings.ToLower(userEntered) {
return true
}
}
return false
}
// byInternalSession returns true if the user holds a valid internal session cookie
func byInternalSession(w http.ResponseWriter, r *http.Request) bool {
func CheckOauthUser(userInfo *oidc.UserInfo, w http.ResponseWriter) {
if isValidOauthUser(userInfo.Email) {
// TODO revoke session if oauth is not valid any more
sessionmanager.CreateSession(w, nil)
redirect(w, "admin")
return
}
redirect(w, "error-auth")
}
func isValidOauthUser(name string) bool {
if name == "" {
return false
}
if len(authSettings.OauthUsers) == 0 {
return true
}
return isUserInArray(name, authSettings.OauthUsers)
}
// isGrantedSession returns true if the user holds a valid internal session cookie
func isGrantedSession(w http.ResponseWriter, r *http.Request) bool {
return sessionmanager.IsValidSession(w, r)
}
// IsCorrectUsernameAndPassword checks if a provided username and password is correct
func IsCorrectUsernameAndPassword(username, password string) bool {
settings := configuration.GetServerSettingsReadOnly()
configuration.ReleaseReadOnly()
return strings.ToLower(username) == strings.ToLower(settings.AdminName) && configuration.HashPassword(password, false) == settings.AdminPassword
return IsEqualStringConstantTime(username, authSettings.Username) &&
IsEqualStringConstantTime(configuration.HashPasswordCustomSalt(password, authSettings.SaltAdmin), authSettings.Password)
}
// IsEqualStringConstantTime uses ConstantTimeCompare to prevent timing attack.
func IsEqualStringConstantTime(s1, s2 string) bool {
return subtle.ConstantTimeCompare(
[]byte(strings.ToLower(s1)),
[]byte(strings.ToLower(s2))) == 1
}
// Sends a redirect HTTP output to the client. Variable url is used to redirect to ./url
func redirect(w http.ResponseWriter, url string) {
_, _ = io.WriteString(w, "<html><head><meta http-equiv=\"Refresh\" content=\"0; URL=./"+url+"\"></head></html>")
}
func GetMethod() int {
return authSettings.Method
}
func Logout(w http.ResponseWriter, r *http.Request) {
if authSettings.Method == Internal || authSettings.Method == OAuth2 {
sessionmanager.LogoutSession(w, r)
}
redirect(w, "login")
}
func IsLogoutAvailable() bool {
return authSettings.Method == Internal || authSettings.Method == OAuth2
}

View File

@@ -0,0 +1,193 @@
package authentication
import (
"Gokapi/internal/configuration"
"Gokapi/internal/models"
"Gokapi/internal/test"
"Gokapi/internal/test/testconfiguration"
"github.com/coreos/go-oidc/v3/oidc"
"io"
"net/http/httptest"
"os"
"strings"
"testing"
)
func TestMain(m *testing.M) {
testconfiguration.Create(false)
configuration.Load()
exitVal := m.Run()
testconfiguration.Delete()
os.Exit(exitVal)
}
func TestInit(t *testing.T) {
Init(modelUserPW)
test.IsEqualInt(t, authSettings.Method, Internal)
test.IsEqualString(t, authSettings.Username, "admin")
}
func TestIsCorrectUsernameAndPassword(t *testing.T) {
test.IsEqualBool(t, IsCorrectUsernameAndPassword("admin", "adminadmin"), true)
test.IsEqualBool(t, IsCorrectUsernameAndPassword("admin", "wrong"), false)
}
func TestIsAuthenticated(t *testing.T) {
testAuthSession(t)
testAuthHeader(t)
testAuthDisabled(t)
w, r := test.GetRecorder("GET", "/", nil, nil, nil)
authSettings.Method = -1
test.IsEqualBool(t, IsAuthenticated(w, r), false)
}
func testAuthSession(t *testing.T) {
w, r := test.GetRecorder("GET", "/", nil, nil, nil)
Init(modelUserPW)
test.IsEqualBool(t, IsAuthenticated(w, r), false)
Init(modelOauth)
test.IsEqualBool(t, IsAuthenticated(w, r), false)
Init(modelUserPW)
w, r = test.GetRecorder("GET", "/", []test.Cookie{{
Name: "session_token",
Value: "validsession",
}}, nil, nil)
test.IsEqualBool(t, IsAuthenticated(w, r), true)
}
func testAuthHeader(t *testing.T) {
w, r := test.GetRecorder("GET", "/", nil, nil, nil)
Init(modelHeader)
test.IsEqualBool(t, IsAuthenticated(w, r), false)
w, r = test.GetRecorder("GET", "/", nil, []test.Header{{
Name: "testHeader",
Value: "testUser",
}}, nil)
test.IsEqualBool(t, IsAuthenticated(w, r), true)
authSettings.HeaderUsers = []string{"testUser"}
test.IsEqualBool(t, IsAuthenticated(w, r), true)
authSettings.HeaderUsers = []string{"otherUser"}
test.IsEqualBool(t, IsAuthenticated(w, r), false)
authSettings.HeaderKey = ""
authSettings.HeaderUsers = []string{}
test.IsEqualBool(t, IsAuthenticated(w, r), false)
}
func testAuthDisabled(t *testing.T) {
w, r := test.GetRecorder("GET", "/", nil, nil, nil)
Init(modelDisabled)
test.IsEqualBool(t, IsAuthenticated(w, r), true)
}
func TestIsLogoutAvailable(t *testing.T) {
authSettings.Method = Internal
test.IsEqualBool(t, IsLogoutAvailable(), true)
authSettings.Method = OAuth2
test.IsEqualBool(t, IsLogoutAvailable(), true)
authSettings.Method = Header
test.IsEqualBool(t, IsLogoutAvailable(), false)
authSettings.Method = Disabled
test.IsEqualBool(t, IsLogoutAvailable(), false)
}
func TestEqualString(t *testing.T) {
test.IsEqualBool(t, IsEqualStringConstantTime("yes", "no"), false)
test.IsEqualBool(t, IsEqualStringConstantTime("yes", "yes"), true)
}
func TestGetMethod(t *testing.T) {
test.IsEqualInt(t, GetMethod(), Disabled)
}
func TestRedirect(t *testing.T) {
w := httptest.NewRecorder()
redirect(w, "test")
output, err := io.ReadAll(w.Body)
test.IsNil(t, err)
test.IsEqualString(t, string(output), "<html><head><meta http-equiv=\"Refresh\" content=\"0; URL=./test\"></head></html>")
}
func TestIsValidOauthUser(t *testing.T) {
Init(modelOauth)
test.IsEqualBool(t, isValidOauthUser(""), false)
test.IsEqualBool(t, isValidOauthUser("user"), true)
authSettings.OauthUsers = []string{"otheruser"}
test.IsEqualBool(t, isValidOauthUser("user"), false)
}
func TestLogout(t *testing.T) {
Init(modelUserPW)
w, r := test.GetRecorder("GET", "/", nil, nil, nil)
Logout(w, r)
}
func TestCheckOauthUser(t *testing.T) {
info := oidc.UserInfo{}
test.IsEqualBool(t, strings.Contains(getOuthUserOutput(&info), "error-auth"), true)
info.Email = "test@test"
test.IsEqualBool(t, strings.Contains(getOuthUserOutput(&info), "admin"), true)
authSettings.OauthUsers = []string{"test@test"}
test.IsEqualBool(t, strings.Contains(getOuthUserOutput(&info), "admin"), true)
authSettings.OauthUsers = []string{"otheruser@test"}
test.IsEqualBool(t, strings.Contains(getOuthUserOutput(&info), "error-auth"), true)
}
func getOuthUserOutput(info *oidc.UserInfo) string {
w := httptest.NewRecorder()
CheckOauthUser(info, w)
output, _ := io.ReadAll(w.Result().Body)
return string(output)
}
var modelUserPW = models.AuthenticationConfig{
Method: Internal,
SaltAdmin: "1234",
SaltFiles: "1234",
Username: "admin",
Password: "7d23732d69c050bf7a2f5ab7d979f92f33bb585e",
HeaderKey: "",
OauthProvider: "",
OAuthClientId: "",
OAuthClientSecret: "",
HeaderUsers: nil,
OauthUsers: nil,
}
var modelOauth = models.AuthenticationConfig{
Method: OAuth2,
SaltAdmin: "1234",
SaltFiles: "1234",
Username: "",
Password: "",
HeaderKey: "",
OauthProvider: "test",
OAuthClientId: "test",
OAuthClientSecret: "test",
HeaderUsers: nil,
OauthUsers: nil,
}
var modelHeader = models.AuthenticationConfig{
Method: Header,
SaltAdmin: "1234",
SaltFiles: "1234",
Username: "",
Password: "",
HeaderKey: "testHeader",
OauthProvider: "",
OAuthClientId: "",
OAuthClientSecret: "",
HeaderUsers: nil,
OauthUsers: nil,
}
var modelDisabled = models.AuthenticationConfig{
Method: Disabled,
SaltAdmin: "1234",
SaltFiles: "1234",
Username: "",
Password: "",
HeaderKey: "",
OauthProvider: "",
OAuthClientId: "",
OAuthClientSecret: "",
HeaderUsers: nil,
OauthUsers: nil,
}

View File

@@ -0,0 +1,81 @@
package oauth
import (
"Gokapi/internal/helper"
"Gokapi/internal/models"
"Gokapi/internal/webserver/authentication"
"context"
"github.com/coreos/go-oidc/v3/oidc"
"golang.org/x/oauth2"
"log"
"net/http"
"time"
)
var config oauth2.Config
var ctx context.Context
var provider *oidc.Provider
func Init(baseUrl string, credentials models.AuthenticationConfig) {
var err error
ctx = context.Background()
provider, err = oidc.NewProvider(ctx, credentials.OauthProvider)
if err != nil {
log.Fatal(err)
}
config = oauth2.Config{
ClientID: credentials.OAuthClientId,
ClientSecret: credentials.OAuthClientSecret,
Endpoint: provider.Endpoint(),
RedirectURL: baseUrl + "oauth-callback",
Scopes: []string{oidc.ScopeOpenID, "profile", "email"},
}
}
func HandlerLogin(w http.ResponseWriter, r *http.Request) {
state := helper.GenerateRandomString(16)
setCallbackCookie(w, state)
http.Redirect(w, r, config.AuthCodeURL(state)+"&prompt=select_account", http.StatusFound)
}
func HandlerCallback(w http.ResponseWriter, r *http.Request) {
state, err := r.Cookie(authentication.CookieOauth)
if err != nil {
http.Error(w, "state not found", http.StatusBadRequest)
return
}
if r.URL.Query().Get("state") != state.Value {
http.Error(w, "state did not match", http.StatusBadRequest)
return
}
oauth2Token, err := config.Exchange(ctx, r.URL.Query().Get("code"))
if err != nil {
http.Error(w, "Failed to exchange token: "+err.Error(), http.StatusInternalServerError)
return
}
userInfo, err := provider.UserInfo(ctx, oauth2.StaticTokenSource(oauth2Token))
if err != nil {
http.Error(w, "Failed to get userinfo: "+err.Error(), http.StatusInternalServerError)
return
}
resp := struct {
OAuth2Token *oauth2.Token
UserInfo *oidc.UserInfo
}{oauth2Token, userInfo}
authentication.CheckOauthUser(resp.UserInfo, w)
}
func setCallbackCookie(w http.ResponseWriter, value string) {
c := &http.Cookie{
Name: authentication.CookieOauth,
Value: value,
MaxAge: int(time.Hour.Seconds()),
HttpOnly: true,
}
http.SetCookie(w, c)
}

View File

@@ -0,0 +1,17 @@
package oauth
import (
"Gokapi/internal/test"
"Gokapi/internal/webserver/authentication"
"testing"
)
func TestSetCallbackCookie(t *testing.T) {
w, _ := test.GetRecorder("GET", "/", nil, nil, nil)
setCallbackCookie(w, "test")
cookies := w.Result().Cookies()
test.IsEqualInt(t, len(cookies), 1)
test.IsEqualString(t, cookies[0].Name, authentication.CookieOauth)
value := cookies[0].Value
test.IsEqualString(t, value, "test")
}

View File

@@ -1,7 +1,7 @@
package sessionmanager
/**
Manages the sessions for the admin user or to access password protected files
Manages the sessions for the admin user or to access password-protected files
*/
import (
@@ -12,6 +12,8 @@ import (
"time"
)
// TODO add username to check for revokkation
// If no login occurred during this time, the admin session will be deleted. Default 30 days
const cookieLifeAdmin = 30 * 24 * time.Hour
@@ -52,6 +54,7 @@ func useSession(w http.ResponseWriter, sessionString string, sessions *map[strin
}
// CreateSession creates a new session - called after login with correct username / password
// If sessions parameter is nil, it will be loaded from config
func CreateSession(w http.ResponseWriter, sessions *map[string]models.Session) {
if sessions == nil {
settings := configuration.GetServerSettings()
@@ -79,9 +82,10 @@ func LogoutSession(w http.ResponseWriter, r *http.Request) {
// Writes session cookie to browser
func writeSessionCookie(w http.ResponseWriter, sessionString string, expiry time.Time) {
http.SetCookie(w, &http.Cookie{
c := &http.Cookie{
Name: "session_token",
Value: sessionString,
Expires: expiry,
})
}
http.SetCookie(w, c)
}

View File

@@ -24,18 +24,7 @@ func TestMain(m *testing.M) {
}
func getRecorder(cookies []test.Cookie) (*httptest.ResponseRecorder, *http.Request) {
w := httptest.NewRecorder()
r := httptest.NewRequest("GET", "/", nil)
if cookies != nil {
for _, cookie := range cookies {
r.AddCookie(&http.Cookie{
Name: cookie.Name,
Value: cookie.Value,
Path: "/",
})
}
}
return w, r
return test.GetRecorder("GET", "/", cookies, nil, nil)
}
func TestIsValidSession(t *testing.T) {

View File

@@ -0,0 +1,17 @@
{{define "error_auth"}}
{{template "header" .}}
<div class="row">
<div class="col">
<div class="card" style="width: 18rem;">
<div class="card-body">
<h2 class="card-title">Unauthorised user</h2>
<br>
<p class="card-text">Login with OAuth provider was sucessful, however this user is not authorised.</p><br><br>
<a href="./login" class="card-link">Log in as different user</a>
</div>
</div>
</div>
</div>
{{template "footer"}}
{{end}}

View File

@@ -7,21 +7,11 @@
<h3 class="card-title">Forgot password</h3>
<br>
<p class="card-text">
Please restart the server with the argument <code>--reset-pw</code> in order to change the password.
Please restart the server with the argument <code>--reconfigure</code> in order to change the password.
</p>
</div>
</div>
</div>
</div>
<script>
function submitForm(){
document.getElementById("username").disabled = true;
document.getElementById("password").disabled = true;
document.getElementById("uname_hidden").value = document.getElementById("username").value;
document.getElementById("pw_hidden").value = document.getElementById("password").value;
document.getElementById("submitbutton").disabled = true;
return true;
}
</script>
{{ template "footer" }}
{{end}}

View File

@@ -1,2 +1,2 @@
{{define "app_name"}}Gokapi{{end}}
{{define "version"}}1.3.2{{end}}
{{define "version"}}1.5.0{{end}}