user.go 60 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package dataprovider
  15. import (
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "math"
  20. "net"
  21. "os"
  22. "path"
  23. "strconv"
  24. "strings"
  25. "time"
  26. "github.com/rs/xid"
  27. "github.com/sftpgo/sdk"
  28. "github.com/drakkan/sftpgo/v2/internal/kms"
  29. "github.com/drakkan/sftpgo/v2/internal/logger"
  30. "github.com/drakkan/sftpgo/v2/internal/mfa"
  31. "github.com/drakkan/sftpgo/v2/internal/plugin"
  32. "github.com/drakkan/sftpgo/v2/internal/util"
  33. "github.com/drakkan/sftpgo/v2/internal/vfs"
  34. )
  35. // Available permissions for SFTPGo users
  36. const (
  37. // All permissions are granted
  38. PermAny = "*"
  39. // List items such as files and directories is allowed
  40. PermListItems = "list"
  41. // download files is allowed
  42. PermDownload = "download"
  43. // upload files is allowed
  44. PermUpload = "upload"
  45. // overwrite an existing file, while uploading, is allowed
  46. // upload permission is required to allow file overwrite
  47. PermOverwrite = "overwrite"
  48. // delete files or directories is allowed
  49. PermDelete = "delete"
  50. // delete files is allowed
  51. PermDeleteFiles = "delete_files"
  52. // delete directories is allowed
  53. PermDeleteDirs = "delete_dirs"
  54. // rename files or directories is allowed
  55. PermRename = "rename"
  56. // rename files is allowed
  57. PermRenameFiles = "rename_files"
  58. // rename directories is allowed
  59. PermRenameDirs = "rename_dirs"
  60. // create directories is allowed
  61. PermCreateDirs = "create_dirs"
  62. // create symbolic links is allowed
  63. PermCreateSymlinks = "create_symlinks"
  64. // changing file or directory permissions is allowed
  65. PermChmod = "chmod"
  66. // changing file or directory owner and group is allowed
  67. PermChown = "chown"
  68. // changing file or directory access and modification time is allowed
  69. PermChtimes = "chtimes"
  70. )
  71. // Available login methods
  72. const (
  73. LoginMethodNoAuthTryed = "no_auth_tryed"
  74. LoginMethodPassword = "password"
  75. SSHLoginMethodPassword = "password-over-SSH"
  76. SSHLoginMethodPublicKey = "publickey"
  77. SSHLoginMethodKeyboardInteractive = "keyboard-interactive"
  78. SSHLoginMethodKeyAndPassword = "publickey+password"
  79. SSHLoginMethodKeyAndKeyboardInt = "publickey+keyboard-interactive"
  80. LoginMethodTLSCertificate = "TLSCertificate"
  81. LoginMethodTLSCertificateAndPwd = "TLSCertificate+password"
  82. LoginMethodIDP = "IDP"
  83. )
  84. var (
  85. errNoMatchingVirtualFolder = errors.New("no matching virtual folder found")
  86. permsRenameAny = []string{PermRename, PermRenameDirs, PermRenameFiles}
  87. permsDeleteAny = []string{PermDelete, PermDeleteDirs, PermDeleteFiles}
  88. )
  89. // RecoveryCode defines a 2FA recovery code
  90. type RecoveryCode struct {
  91. Secret *kms.Secret `json:"secret"`
  92. Used bool `json:"used,omitempty"`
  93. }
  94. // UserTOTPConfig defines the time-based one time password configuration
  95. type UserTOTPConfig struct {
  96. Enabled bool `json:"enabled,omitempty"`
  97. ConfigName string `json:"config_name,omitempty"`
  98. Secret *kms.Secret `json:"secret,omitempty"`
  99. // TOTP will be required for the specified protocols.
  100. // SSH protocol (SFTP/SCP/SSH commands) will ask for the TOTP passcode if the client uses keyboard interactive
  101. // authentication.
  102. // FTP have no standard way to support two factor authentication, if you
  103. // enable the support for this protocol you have to add the TOTP passcode after the password.
  104. // For example if your password is "password" and your one time passcode is
  105. // "123456" you have to use "password123456" as password.
  106. Protocols []string `json:"protocols,omitempty"`
  107. }
  108. // UserFilters defines additional restrictions for a user
  109. // TODO: rename to UserOptions in v3
  110. type UserFilters struct {
  111. sdk.BaseUserFilters
  112. // User must change password from WebClient/REST API at next login.
  113. RequirePasswordChange bool `json:"require_password_change,omitempty"`
  114. // Time-based one time passwords configuration
  115. TOTPConfig UserTOTPConfig `json:"totp_config,omitempty"`
  116. // Recovery codes to use if the user loses access to their second factor auth device.
  117. // Each code can only be used once, you should use these codes to login and disable or
  118. // reset 2FA for your account
  119. RecoveryCodes []RecoveryCode `json:"recovery_codes,omitempty"`
  120. }
  121. // User defines a SFTPGo user
  122. type User struct {
  123. sdk.BaseUser
  124. // Additional restrictions
  125. Filters UserFilters `json:"filters"`
  126. // Mapping between virtual paths and virtual folders
  127. VirtualFolders []vfs.VirtualFolder `json:"virtual_folders,omitempty"`
  128. // Filesystem configuration details
  129. FsConfig vfs.Filesystem `json:"filesystem"`
  130. // groups associated with this user
  131. Groups []sdk.GroupMapping `json:"groups,omitempty"`
  132. // we store the filesystem here using the base path as key.
  133. fsCache map[string]vfs.Fs `json:"-"`
  134. // true if group settings are already applied for this user
  135. groupSettingsApplied bool `json:"-"`
  136. // in multi node setups we mark the user as deleted to be able to update the webdav cache
  137. DeletedAt int64 `json:"-"`
  138. }
  139. // GetFilesystem returns the base filesystem for this user
  140. func (u *User) GetFilesystem(connectionID string) (fs vfs.Fs, err error) {
  141. return u.GetFilesystemForPath("/", connectionID)
  142. }
  143. func (u *User) getRootFs(connectionID string) (fs vfs.Fs, err error) {
  144. switch u.FsConfig.Provider {
  145. case sdk.S3FilesystemProvider:
  146. return vfs.NewS3Fs(connectionID, u.GetHomeDir(), "", u.FsConfig.S3Config)
  147. case sdk.GCSFilesystemProvider:
  148. return vfs.NewGCSFs(connectionID, u.GetHomeDir(), "", u.FsConfig.GCSConfig)
  149. case sdk.AzureBlobFilesystemProvider:
  150. return vfs.NewAzBlobFs(connectionID, u.GetHomeDir(), "", u.FsConfig.AzBlobConfig)
  151. case sdk.CryptedFilesystemProvider:
  152. return vfs.NewCryptFs(connectionID, u.GetHomeDir(), "", u.FsConfig.CryptConfig)
  153. case sdk.SFTPFilesystemProvider:
  154. forbiddenSelfUsers, err := u.getForbiddenSFTPSelfUsers(u.FsConfig.SFTPConfig.Username)
  155. if err != nil {
  156. return nil, err
  157. }
  158. forbiddenSelfUsers = append(forbiddenSelfUsers, u.Username)
  159. return vfs.NewSFTPFs(connectionID, "", u.GetHomeDir(), forbiddenSelfUsers, u.FsConfig.SFTPConfig)
  160. case sdk.HTTPFilesystemProvider:
  161. return vfs.NewHTTPFs(connectionID, u.GetHomeDir(), "", u.FsConfig.HTTPConfig)
  162. default:
  163. return vfs.NewOsFs(connectionID, u.GetHomeDir(), ""), nil
  164. }
  165. }
  166. func (u *User) checkDirWithParents(virtualDirPath, connectionID string) error {
  167. dirs := util.GetDirsForVirtualPath(virtualDirPath)
  168. for idx := len(dirs) - 1; idx >= 0; idx-- {
  169. vPath := dirs[idx]
  170. if vPath == "/" {
  171. continue
  172. }
  173. fs, err := u.GetFilesystemForPath(vPath, connectionID)
  174. if err != nil {
  175. return fmt.Errorf("unable to get fs for path %#v: %w", vPath, err)
  176. }
  177. if fs.HasVirtualFolders() {
  178. continue
  179. }
  180. fsPath, err := fs.ResolvePath(vPath)
  181. if err != nil {
  182. return fmt.Errorf("unable to resolve path %#v: %w", vPath, err)
  183. }
  184. _, err = fs.Stat(fsPath)
  185. if err == nil {
  186. continue
  187. }
  188. if fs.IsNotExist(err) {
  189. err = fs.Mkdir(fsPath)
  190. if err != nil {
  191. return err
  192. }
  193. vfs.SetPathPermissions(fs, fsPath, u.GetUID(), u.GetGID())
  194. } else {
  195. return fmt.Errorf("unable to stat path %#v: %w", vPath, err)
  196. }
  197. }
  198. return nil
  199. }
  200. func (u *User) checkLocalHomeDir(connectionID string) {
  201. switch u.FsConfig.Provider {
  202. case sdk.LocalFilesystemProvider, sdk.CryptedFilesystemProvider:
  203. return
  204. default:
  205. osFs := vfs.NewOsFs(connectionID, u.GetHomeDir(), "")
  206. osFs.CheckRootPath(u.Username, u.GetUID(), u.GetGID())
  207. }
  208. }
  209. func (u *User) checkRootPath(connectionID string) error {
  210. fs, err := u.GetFilesystemForPath("/", connectionID)
  211. if err != nil {
  212. logger.Warn(logSender, connectionID, "could not create main filesystem for user %q err: %v", u.Username, err)
  213. return fmt.Errorf("could not create root filesystem: %w", err)
  214. }
  215. fs.CheckRootPath(u.Username, u.GetUID(), u.GetGID())
  216. return nil
  217. }
  218. // CheckFsRoot check the root directory for the main fs and the virtual folders.
  219. // It returns an error if the main filesystem cannot be created
  220. func (u *User) CheckFsRoot(connectionID string) error {
  221. if u.Filters.DisableFsChecks {
  222. return nil
  223. }
  224. delay := lastLoginMinDelay
  225. if u.Filters.ExternalAuthCacheTime > 0 {
  226. cacheTime := time.Duration(u.Filters.ExternalAuthCacheTime) * time.Second
  227. if cacheTime > delay {
  228. delay = cacheTime
  229. }
  230. }
  231. if isLastActivityRecent(u.LastLogin, delay) {
  232. if u.LastLogin > u.UpdatedAt {
  233. if config.IsShared == 1 {
  234. u.checkLocalHomeDir(connectionID)
  235. }
  236. return nil
  237. }
  238. }
  239. err := u.checkRootPath(connectionID)
  240. if err != nil {
  241. return err
  242. }
  243. if u.Filters.StartDirectory != "" {
  244. err = u.checkDirWithParents(u.Filters.StartDirectory, connectionID)
  245. if err != nil {
  246. logger.Warn(logSender, connectionID, "could not create start directory %#v, err: %v",
  247. u.Filters.StartDirectory, err)
  248. }
  249. }
  250. for idx := range u.VirtualFolders {
  251. v := &u.VirtualFolders[idx]
  252. fs, err := u.GetFilesystemForPath(v.VirtualPath, connectionID)
  253. if err == nil {
  254. fs.CheckRootPath(u.Username, u.GetUID(), u.GetGID())
  255. }
  256. // now check intermediary folders
  257. err = u.checkDirWithParents(path.Dir(v.VirtualPath), connectionID)
  258. if err != nil {
  259. logger.Warn(logSender, connectionID, "could not create intermediary dir to %#v, err: %v", v.VirtualPath, err)
  260. }
  261. }
  262. return nil
  263. }
  264. // GetCleanedPath returns a clean POSIX absolute path using the user start directory as base
  265. // if the provided rawVirtualPath is relative
  266. func (u *User) GetCleanedPath(rawVirtualPath string) string {
  267. if u.Filters.StartDirectory != "" {
  268. if !path.IsAbs(rawVirtualPath) {
  269. var b strings.Builder
  270. b.Grow(len(u.Filters.StartDirectory) + 1 + len(rawVirtualPath))
  271. b.WriteString(u.Filters.StartDirectory)
  272. b.WriteString("/")
  273. b.WriteString(rawVirtualPath)
  274. return util.CleanPath(b.String())
  275. }
  276. }
  277. return util.CleanPath(rawVirtualPath)
  278. }
  279. // isFsEqual returns true if the filesystem configurations are the same
  280. func (u *User) isFsEqual(other *User) bool {
  281. if u.FsConfig.Provider == sdk.LocalFilesystemProvider && u.GetHomeDir() != other.GetHomeDir() {
  282. return false
  283. }
  284. if !u.FsConfig.IsEqual(other.FsConfig) {
  285. return false
  286. }
  287. if u.Filters.StartDirectory != other.Filters.StartDirectory {
  288. return false
  289. }
  290. if len(u.VirtualFolders) != len(other.VirtualFolders) {
  291. return false
  292. }
  293. for idx := range u.VirtualFolders {
  294. f := &u.VirtualFolders[idx]
  295. found := false
  296. for idx1 := range other.VirtualFolders {
  297. f1 := &other.VirtualFolders[idx1]
  298. if f.VirtualPath == f1.VirtualPath {
  299. found = true
  300. if f.FsConfig.Provider == sdk.LocalFilesystemProvider && f.MappedPath != f1.MappedPath {
  301. return false
  302. }
  303. if !f.FsConfig.IsEqual(f1.FsConfig) {
  304. return false
  305. }
  306. }
  307. }
  308. if !found {
  309. return false
  310. }
  311. }
  312. return true
  313. }
  314. // CheckLoginConditions checks if the user is active and not expired
  315. func (u *User) CheckLoginConditions() error {
  316. if u.Status < 1 {
  317. return fmt.Errorf("user %#v is disabled", u.Username)
  318. }
  319. if u.ExpirationDate > 0 && u.ExpirationDate < util.GetTimeAsMsSinceEpoch(time.Now()) {
  320. return fmt.Errorf("user %#v is expired, expiration timestamp: %v current timestamp: %v", u.Username,
  321. u.ExpirationDate, util.GetTimeAsMsSinceEpoch(time.Now()))
  322. }
  323. return nil
  324. }
  325. // hideConfidentialData hides user confidential data
  326. func (u *User) hideConfidentialData() {
  327. u.Password = ""
  328. u.FsConfig.HideConfidentialData()
  329. if u.Filters.TOTPConfig.Secret != nil {
  330. u.Filters.TOTPConfig.Secret.Hide()
  331. }
  332. for _, code := range u.Filters.RecoveryCodes {
  333. if code.Secret != nil {
  334. code.Secret.Hide()
  335. }
  336. }
  337. }
  338. // GetSubDirPermissions returns permissions for sub directories
  339. func (u *User) GetSubDirPermissions() []sdk.DirectoryPermissions {
  340. var result []sdk.DirectoryPermissions
  341. for k, v := range u.Permissions {
  342. if k == "/" {
  343. continue
  344. }
  345. dirPerms := sdk.DirectoryPermissions{
  346. Path: k,
  347. Permissions: v,
  348. }
  349. result = append(result, dirPerms)
  350. }
  351. return result
  352. }
  353. func (u *User) setAnonymousSettings() {
  354. for k := range u.Permissions {
  355. u.Permissions[k] = []string{PermListItems, PermDownload}
  356. }
  357. u.Filters.DeniedProtocols = append(u.Filters.DeniedProtocols, protocolSSH, protocolHTTP)
  358. u.Filters.DeniedProtocols = util.RemoveDuplicates(u.Filters.DeniedProtocols, false)
  359. for _, method := range ValidLoginMethods {
  360. if method != LoginMethodPassword {
  361. u.Filters.DeniedLoginMethods = append(u.Filters.DeniedLoginMethods, method)
  362. }
  363. }
  364. u.Filters.DeniedLoginMethods = util.RemoveDuplicates(u.Filters.DeniedLoginMethods, false)
  365. }
  366. // RenderAsJSON implements the renderer interface used within plugins
  367. func (u *User) RenderAsJSON(reload bool) ([]byte, error) {
  368. if reload {
  369. user, err := provider.userExists(u.Username, "")
  370. if err != nil {
  371. providerLog(logger.LevelError, "unable to reload user before rendering as json: %v", err)
  372. return nil, err
  373. }
  374. user.PrepareForRendering()
  375. return json.Marshal(user)
  376. }
  377. u.PrepareForRendering()
  378. return json.Marshal(u)
  379. }
  380. // PrepareForRendering prepares a user for rendering.
  381. // It hides confidential data and set to nil the empty secrets
  382. // so they are not serialized
  383. func (u *User) PrepareForRendering() {
  384. u.hideConfidentialData()
  385. u.FsConfig.SetNilSecretsIfEmpty()
  386. for idx := range u.VirtualFolders {
  387. folder := &u.VirtualFolders[idx]
  388. folder.PrepareForRendering()
  389. }
  390. }
  391. // HasRedactedSecret returns true if the user has a redacted secret
  392. func (u *User) hasRedactedSecret() bool {
  393. if u.FsConfig.HasRedactedSecret() {
  394. return true
  395. }
  396. for idx := range u.VirtualFolders {
  397. folder := &u.VirtualFolders[idx]
  398. if folder.HasRedactedSecret() {
  399. return true
  400. }
  401. }
  402. return u.Filters.TOTPConfig.Secret.IsRedacted()
  403. }
  404. // CloseFs closes the underlying filesystems
  405. func (u *User) CloseFs() error {
  406. if u.fsCache == nil {
  407. return nil
  408. }
  409. var err error
  410. for _, fs := range u.fsCache {
  411. errClose := fs.Close()
  412. if err == nil {
  413. err = errClose
  414. }
  415. }
  416. return err
  417. }
  418. // IsPasswordHashed returns true if the password is hashed
  419. func (u *User) IsPasswordHashed() bool {
  420. return util.IsStringPrefixInSlice(u.Password, hashPwdPrefixes)
  421. }
  422. // IsTLSUsernameVerificationEnabled returns true if we need to extract the username
  423. // from the client TLS certificate
  424. func (u *User) IsTLSUsernameVerificationEnabled() bool {
  425. if u.Filters.TLSUsername != "" {
  426. return u.Filters.TLSUsername != sdk.TLSUsernameNone
  427. }
  428. return false
  429. }
  430. // SetEmptySecrets sets to empty any user secret
  431. func (u *User) SetEmptySecrets() {
  432. u.FsConfig.SetEmptySecrets()
  433. for idx := range u.VirtualFolders {
  434. folder := &u.VirtualFolders[idx]
  435. folder.FsConfig.SetEmptySecrets()
  436. }
  437. u.Filters.TOTPConfig.Secret = kms.NewEmptySecret()
  438. }
  439. // GetPermissionsForPath returns the permissions for the given path.
  440. // The path must be a SFTPGo exposed path
  441. func (u *User) GetPermissionsForPath(p string) []string {
  442. permissions := []string{}
  443. if perms, ok := u.Permissions["/"]; ok {
  444. // if only root permissions are defined returns them unconditionally
  445. if len(u.Permissions) == 1 {
  446. return perms
  447. }
  448. // fallback permissions
  449. permissions = perms
  450. }
  451. dirsForPath := util.GetDirsForVirtualPath(p)
  452. // dirsForPath contains all the dirs for a given path in reverse order
  453. // for example if the path is: /1/2/3/4 it contains:
  454. // [ "/1/2/3/4", "/1/2/3", "/1/2", "/1", "/" ]
  455. // so the first match is the one we are interested to
  456. for idx := range dirsForPath {
  457. if perms, ok := u.Permissions[dirsForPath[idx]]; ok {
  458. return perms
  459. }
  460. for dir, perms := range u.Permissions {
  461. if match, err := path.Match(dir, dirsForPath[idx]); err == nil && match {
  462. return perms
  463. }
  464. }
  465. }
  466. return permissions
  467. }
  468. func (u *User) getForbiddenSFTPSelfUsers(username string) ([]string, error) {
  469. if allowSelfConnections == 0 {
  470. return nil, nil
  471. }
  472. sftpUser, err := UserExists(username, "")
  473. if err == nil {
  474. err = sftpUser.LoadAndApplyGroupSettings()
  475. }
  476. if err == nil {
  477. // we don't allow local nested SFTP folders
  478. var forbiddens []string
  479. if sftpUser.FsConfig.Provider == sdk.SFTPFilesystemProvider {
  480. forbiddens = append(forbiddens, sftpUser.Username)
  481. return forbiddens, nil
  482. }
  483. for idx := range sftpUser.VirtualFolders {
  484. v := &sftpUser.VirtualFolders[idx]
  485. if v.FsConfig.Provider == sdk.SFTPFilesystemProvider {
  486. forbiddens = append(forbiddens, sftpUser.Username)
  487. return forbiddens, nil
  488. }
  489. }
  490. return forbiddens, nil
  491. }
  492. if _, ok := err.(*util.RecordNotFoundError); !ok {
  493. return nil, err
  494. }
  495. return nil, nil
  496. }
  497. // GetFsConfigForPath returns the file system configuration for the specified virtual path
  498. func (u *User) GetFsConfigForPath(virtualPath string) vfs.Filesystem {
  499. if virtualPath != "" && virtualPath != "/" && len(u.VirtualFolders) > 0 {
  500. folder, err := u.GetVirtualFolderForPath(virtualPath)
  501. if err == nil {
  502. return folder.FsConfig
  503. }
  504. }
  505. return u.FsConfig
  506. }
  507. // GetFilesystemForPath returns the filesystem for the given path
  508. func (u *User) GetFilesystemForPath(virtualPath, connectionID string) (vfs.Fs, error) {
  509. if u.fsCache == nil {
  510. u.fsCache = make(map[string]vfs.Fs)
  511. }
  512. // allow to override the `/` path with a virtual folder
  513. if len(u.VirtualFolders) > 0 {
  514. folder, err := u.GetVirtualFolderForPath(virtualPath)
  515. if err == nil {
  516. if fs, ok := u.fsCache[folder.VirtualPath]; ok {
  517. return fs, nil
  518. }
  519. forbiddenSelfUsers := []string{u.Username}
  520. if folder.FsConfig.Provider == sdk.SFTPFilesystemProvider {
  521. forbiddens, err := u.getForbiddenSFTPSelfUsers(folder.FsConfig.SFTPConfig.Username)
  522. if err != nil {
  523. return nil, err
  524. }
  525. forbiddenSelfUsers = append(forbiddenSelfUsers, forbiddens...)
  526. }
  527. fs, err := folder.GetFilesystem(connectionID, forbiddenSelfUsers)
  528. if err == nil {
  529. u.fsCache[folder.VirtualPath] = fs
  530. }
  531. return fs, err
  532. }
  533. }
  534. if val, ok := u.fsCache["/"]; ok {
  535. return val, nil
  536. }
  537. fs, err := u.getRootFs(connectionID)
  538. if err != nil {
  539. return fs, err
  540. }
  541. u.fsCache["/"] = fs
  542. return fs, err
  543. }
  544. // GetVirtualFolderForPath returns the virtual folder containing the specified virtual path.
  545. // If the path is not inside a virtual folder an error is returned
  546. func (u *User) GetVirtualFolderForPath(virtualPath string) (vfs.VirtualFolder, error) {
  547. var folder vfs.VirtualFolder
  548. if len(u.VirtualFolders) == 0 {
  549. return folder, errNoMatchingVirtualFolder
  550. }
  551. dirsForPath := util.GetDirsForVirtualPath(virtualPath)
  552. for index := range dirsForPath {
  553. for idx := range u.VirtualFolders {
  554. v := &u.VirtualFolders[idx]
  555. if v.VirtualPath == dirsForPath[index] {
  556. return *v, nil
  557. }
  558. }
  559. }
  560. return folder, errNoMatchingVirtualFolder
  561. }
  562. // CheckMetadataConsistency checks the consistency between the metadata stored
  563. // in the configured metadata plugin and the filesystem
  564. func (u *User) CheckMetadataConsistency() error {
  565. fs, err := u.getRootFs(xid.New().String())
  566. if err != nil {
  567. return err
  568. }
  569. defer fs.Close()
  570. if err = fs.CheckMetadata(); err != nil {
  571. return err
  572. }
  573. for idx := range u.VirtualFolders {
  574. v := &u.VirtualFolders[idx]
  575. if err = v.CheckMetadataConsistency(); err != nil {
  576. return err
  577. }
  578. }
  579. return nil
  580. }
  581. // ScanQuota scans the user home dir and virtual folders, included in its quota,
  582. // and returns the number of files and their size
  583. func (u *User) ScanQuota() (int, int64, error) {
  584. fs, err := u.getRootFs(xid.New().String())
  585. if err != nil {
  586. return 0, 0, err
  587. }
  588. defer fs.Close()
  589. numFiles, size, err := fs.ScanRootDirContents()
  590. if err != nil {
  591. return numFiles, size, err
  592. }
  593. for idx := range u.VirtualFolders {
  594. v := &u.VirtualFolders[idx]
  595. if !v.IsIncludedInUserQuota() {
  596. continue
  597. }
  598. num, s, err := v.ScanQuota()
  599. if err != nil {
  600. return numFiles, size, err
  601. }
  602. numFiles += num
  603. size += s
  604. }
  605. return numFiles, size, nil
  606. }
  607. // GetVirtualFoldersInPath returns the virtual folders inside virtualPath including
  608. // any parents
  609. func (u *User) GetVirtualFoldersInPath(virtualPath string) map[string]bool {
  610. result := make(map[string]bool)
  611. for idx := range u.VirtualFolders {
  612. v := &u.VirtualFolders[idx]
  613. dirsForPath := util.GetDirsForVirtualPath(v.VirtualPath)
  614. for index := range dirsForPath {
  615. d := dirsForPath[index]
  616. if d == "/" {
  617. continue
  618. }
  619. if path.Dir(d) == virtualPath {
  620. result[d] = true
  621. }
  622. }
  623. }
  624. if u.Filters.StartDirectory != "" {
  625. dirsForPath := util.GetDirsForVirtualPath(u.Filters.StartDirectory)
  626. for index := range dirsForPath {
  627. d := dirsForPath[index]
  628. if d == "/" {
  629. continue
  630. }
  631. if path.Dir(d) == virtualPath {
  632. result[d] = true
  633. }
  634. }
  635. }
  636. return result
  637. }
  638. func (u *User) hasVirtualDirs() bool {
  639. if u.Filters.StartDirectory != "" {
  640. return true
  641. }
  642. numFolders := len(u.VirtualFolders)
  643. if numFolders == 1 {
  644. return u.VirtualFolders[0].VirtualPath != "/"
  645. }
  646. return numFolders > 0
  647. }
  648. // FilterListDir adds virtual folders and remove hidden items from the given files list
  649. func (u *User) FilterListDir(dirContents []os.FileInfo, virtualPath string) []os.FileInfo {
  650. filter := u.getPatternsFilterForPath(virtualPath)
  651. if !u.hasVirtualDirs() && filter.DenyPolicy != sdk.DenyPolicyHide {
  652. return dirContents
  653. }
  654. vdirs := make(map[string]bool)
  655. for dir := range u.GetVirtualFoldersInPath(virtualPath) {
  656. dirName := path.Base(dir)
  657. if filter.DenyPolicy == sdk.DenyPolicyHide {
  658. if !filter.CheckAllowed(dirName) {
  659. continue
  660. }
  661. }
  662. vdirs[dirName] = true
  663. }
  664. validIdx := 0
  665. for index, fi := range dirContents {
  666. for dir := range vdirs {
  667. if fi.Name() == dir {
  668. if !fi.IsDir() {
  669. fi = vfs.NewFileInfo(dir, true, 0, time.Unix(0, 0), false)
  670. dirContents[index] = fi
  671. }
  672. delete(vdirs, dir)
  673. }
  674. }
  675. if filter.DenyPolicy == sdk.DenyPolicyHide {
  676. if filter.CheckAllowed(fi.Name()) {
  677. dirContents[validIdx] = fi
  678. validIdx++
  679. }
  680. }
  681. }
  682. if filter.DenyPolicy == sdk.DenyPolicyHide {
  683. for idx := validIdx; idx < len(dirContents); idx++ {
  684. dirContents[idx] = nil
  685. }
  686. dirContents = dirContents[:validIdx]
  687. }
  688. for dir := range vdirs {
  689. fi := vfs.NewFileInfo(dir, true, 0, time.Unix(0, 0), false)
  690. dirContents = append(dirContents, fi)
  691. }
  692. return dirContents
  693. }
  694. // IsMappedPath returns true if the specified filesystem path has a virtual folder mapping.
  695. // The filesystem path must be cleaned before calling this method
  696. func (u *User) IsMappedPath(fsPath string) bool {
  697. for idx := range u.VirtualFolders {
  698. v := &u.VirtualFolders[idx]
  699. if fsPath == v.MappedPath {
  700. return true
  701. }
  702. }
  703. return false
  704. }
  705. // IsVirtualFolder returns true if the specified virtual path is a virtual folder
  706. func (u *User) IsVirtualFolder(virtualPath string) bool {
  707. for idx := range u.VirtualFolders {
  708. v := &u.VirtualFolders[idx]
  709. if virtualPath == v.VirtualPath {
  710. return true
  711. }
  712. }
  713. return false
  714. }
  715. // HasVirtualFoldersInside returns true if there are virtual folders inside the
  716. // specified virtual path. We assume that path are cleaned
  717. func (u *User) HasVirtualFoldersInside(virtualPath string) bool {
  718. if virtualPath == "/" && len(u.VirtualFolders) > 0 {
  719. return true
  720. }
  721. for idx := range u.VirtualFolders {
  722. v := &u.VirtualFolders[idx]
  723. if len(v.VirtualPath) > len(virtualPath) {
  724. if strings.HasPrefix(v.VirtualPath, virtualPath+"/") {
  725. return true
  726. }
  727. }
  728. }
  729. return false
  730. }
  731. // HasPermissionsInside returns true if the specified virtualPath has no permissions itself and
  732. // no subdirs with defined permissions
  733. func (u *User) HasPermissionsInside(virtualPath string) bool {
  734. for dir, perms := range u.Permissions {
  735. if len(perms) == 1 && perms[0] == PermAny {
  736. continue
  737. }
  738. if dir == virtualPath {
  739. return true
  740. } else if len(dir) > len(virtualPath) {
  741. if strings.HasPrefix(dir, virtualPath+"/") {
  742. return true
  743. }
  744. }
  745. }
  746. return false
  747. }
  748. // HasPerm returns true if the user has the given permission or any permission
  749. func (u *User) HasPerm(permission, path string) bool {
  750. perms := u.GetPermissionsForPath(path)
  751. if util.Contains(perms, PermAny) {
  752. return true
  753. }
  754. return util.Contains(perms, permission)
  755. }
  756. // HasAnyPerm returns true if the user has at least one of the given permissions
  757. func (u *User) HasAnyPerm(permissions []string, path string) bool {
  758. perms := u.GetPermissionsForPath(path)
  759. if util.Contains(perms, PermAny) {
  760. return true
  761. }
  762. for _, permission := range permissions {
  763. if util.Contains(perms, permission) {
  764. return true
  765. }
  766. }
  767. return false
  768. }
  769. // HasPerms returns true if the user has all the given permissions
  770. func (u *User) HasPerms(permissions []string, path string) bool {
  771. perms := u.GetPermissionsForPath(path)
  772. if util.Contains(perms, PermAny) {
  773. return true
  774. }
  775. for _, permission := range permissions {
  776. if !util.Contains(perms, permission) {
  777. return false
  778. }
  779. }
  780. return true
  781. }
  782. // HasPermsDeleteAll returns true if the user can delete both files and directories
  783. // for the given path
  784. func (u *User) HasPermsDeleteAll(path string) bool {
  785. perms := u.GetPermissionsForPath(path)
  786. canDeleteFiles := false
  787. canDeleteDirs := false
  788. for _, permission := range perms {
  789. if permission == PermAny || permission == PermDelete {
  790. return true
  791. }
  792. if permission == PermDeleteFiles {
  793. canDeleteFiles = true
  794. }
  795. if permission == PermDeleteDirs {
  796. canDeleteDirs = true
  797. }
  798. }
  799. return canDeleteFiles && canDeleteDirs
  800. }
  801. // HasPermsRenameAll returns true if the user can rename both files and directories
  802. // for the given path
  803. func (u *User) HasPermsRenameAll(path string) bool {
  804. perms := u.GetPermissionsForPath(path)
  805. canRenameFiles := false
  806. canRenameDirs := false
  807. for _, permission := range perms {
  808. if permission == PermAny || permission == PermRename {
  809. return true
  810. }
  811. if permission == PermRenameFiles {
  812. canRenameFiles = true
  813. }
  814. if permission == PermRenameDirs {
  815. canRenameDirs = true
  816. }
  817. }
  818. return canRenameFiles && canRenameDirs
  819. }
  820. // HasNoQuotaRestrictions returns true if no quota restrictions need to be applyed
  821. func (u *User) HasNoQuotaRestrictions(checkFiles bool) bool {
  822. if u.QuotaSize == 0 && (!checkFiles || u.QuotaFiles == 0) {
  823. return true
  824. }
  825. return false
  826. }
  827. // IsLoginMethodAllowed returns true if the specified login method is allowed
  828. func (u *User) IsLoginMethodAllowed(loginMethod, protocol string, partialSuccessMethods []string) bool {
  829. if len(u.Filters.DeniedLoginMethods) == 0 {
  830. return true
  831. }
  832. if len(partialSuccessMethods) == 1 {
  833. for _, method := range u.GetNextAuthMethods(partialSuccessMethods, true) {
  834. if method == loginMethod {
  835. return true
  836. }
  837. }
  838. }
  839. if util.Contains(u.Filters.DeniedLoginMethods, loginMethod) {
  840. return false
  841. }
  842. if protocol == protocolSSH && loginMethod == LoginMethodPassword {
  843. if util.Contains(u.Filters.DeniedLoginMethods, SSHLoginMethodPassword) {
  844. return false
  845. }
  846. }
  847. return true
  848. }
  849. // GetNextAuthMethods returns the list of authentications methods that
  850. // can continue for multi-step authentication
  851. func (u *User) GetNextAuthMethods(partialSuccessMethods []string, isPasswordAuthEnabled bool) []string {
  852. var methods []string
  853. if len(partialSuccessMethods) != 1 {
  854. return methods
  855. }
  856. if partialSuccessMethods[0] != SSHLoginMethodPublicKey {
  857. return methods
  858. }
  859. for _, method := range u.GetAllowedLoginMethods() {
  860. if method == SSHLoginMethodKeyAndPassword && isPasswordAuthEnabled {
  861. methods = append(methods, LoginMethodPassword)
  862. }
  863. if method == SSHLoginMethodKeyAndKeyboardInt {
  864. methods = append(methods, SSHLoginMethodKeyboardInteractive)
  865. }
  866. }
  867. return methods
  868. }
  869. // IsPartialAuth returns true if the specified login method is a step for
  870. // a multi-step Authentication.
  871. // We support publickey+password and publickey+keyboard-interactive, so
  872. // only publickey can returns partial success.
  873. // We can have partial success if only multi-step Auth methods are enabled
  874. func (u *User) IsPartialAuth(loginMethod string) bool {
  875. if loginMethod != SSHLoginMethodPublicKey {
  876. return false
  877. }
  878. for _, method := range u.GetAllowedLoginMethods() {
  879. if method == LoginMethodTLSCertificate || method == LoginMethodTLSCertificateAndPwd ||
  880. method == SSHLoginMethodPassword {
  881. continue
  882. }
  883. if method == LoginMethodPassword && util.Contains(u.Filters.DeniedLoginMethods, SSHLoginMethodPassword) {
  884. continue
  885. }
  886. if !util.Contains(SSHMultiStepsLoginMethods, method) {
  887. return false
  888. }
  889. }
  890. return true
  891. }
  892. // GetAllowedLoginMethods returns the allowed login methods
  893. func (u *User) GetAllowedLoginMethods() []string {
  894. var allowedMethods []string
  895. for _, method := range ValidLoginMethods {
  896. if method == SSHLoginMethodPassword {
  897. continue
  898. }
  899. if !util.Contains(u.Filters.DeniedLoginMethods, method) {
  900. allowedMethods = append(allowedMethods, method)
  901. }
  902. }
  903. return allowedMethods
  904. }
  905. func (u *User) getPatternsFilterForPath(virtualPath string) sdk.PatternsFilter {
  906. var filter sdk.PatternsFilter
  907. if len(u.Filters.FilePatterns) == 0 {
  908. return filter
  909. }
  910. dirsForPath := util.GetDirsForVirtualPath(virtualPath)
  911. for _, dir := range dirsForPath {
  912. for _, f := range u.Filters.FilePatterns {
  913. if f.Path == dir {
  914. filter = f
  915. break
  916. }
  917. }
  918. if filter.Path != "" {
  919. break
  920. }
  921. }
  922. return filter
  923. }
  924. func (u *User) isDirHidden(virtualPath string) bool {
  925. if len(u.Filters.FilePatterns) == 0 {
  926. return false
  927. }
  928. for _, dirPath := range util.GetDirsForVirtualPath(virtualPath) {
  929. if dirPath == "/" {
  930. return false
  931. }
  932. filter := u.getPatternsFilterForPath(dirPath)
  933. if filter.DenyPolicy == sdk.DenyPolicyHide {
  934. if !filter.CheckAllowed(path.Base(dirPath)) {
  935. return true
  936. }
  937. }
  938. }
  939. return false
  940. }
  941. // IsFileAllowed returns true if the specified file is allowed by the file restrictions filters.
  942. // The second parameter returned is the deny policy
  943. func (u *User) IsFileAllowed(virtualPath string) (bool, int) {
  944. dirPath := path.Dir(virtualPath)
  945. if u.isDirHidden(dirPath) {
  946. return false, sdk.DenyPolicyHide
  947. }
  948. filter := u.getPatternsFilterForPath(dirPath)
  949. return filter.CheckAllowed(path.Base(virtualPath)), filter.DenyPolicy
  950. }
  951. // CanManageMFA returns true if the user can add a multi-factor authentication configuration
  952. func (u *User) CanManageMFA() bool {
  953. if util.Contains(u.Filters.WebClient, sdk.WebClientMFADisabled) {
  954. return false
  955. }
  956. return len(mfa.GetAvailableTOTPConfigs()) > 0
  957. }
  958. func (u *User) isExternalAuthCached() bool {
  959. if u.ID <= 0 {
  960. return false
  961. }
  962. if u.Filters.ExternalAuthCacheTime <= 0 {
  963. return false
  964. }
  965. return isLastActivityRecent(u.LastLogin, time.Duration(u.Filters.ExternalAuthCacheTime)*time.Second)
  966. }
  967. // CanManageShares returns true if the user can add, update and list shares
  968. func (u *User) CanManageShares() bool {
  969. return !util.Contains(u.Filters.WebClient, sdk.WebClientSharesDisabled)
  970. }
  971. // CanResetPassword returns true if this user is allowed to reset its password
  972. func (u *User) CanResetPassword() bool {
  973. return !util.Contains(u.Filters.WebClient, sdk.WebClientPasswordResetDisabled)
  974. }
  975. // CanChangePassword returns true if this user is allowed to change its password
  976. func (u *User) CanChangePassword() bool {
  977. return !util.Contains(u.Filters.WebClient, sdk.WebClientPasswordChangeDisabled)
  978. }
  979. // CanChangeAPIKeyAuth returns true if this user is allowed to enable/disable API key authentication
  980. func (u *User) CanChangeAPIKeyAuth() bool {
  981. return !util.Contains(u.Filters.WebClient, sdk.WebClientAPIKeyAuthChangeDisabled)
  982. }
  983. // CanChangeInfo returns true if this user is allowed to change its info such as email and description
  984. func (u *User) CanChangeInfo() bool {
  985. return !util.Contains(u.Filters.WebClient, sdk.WebClientInfoChangeDisabled)
  986. }
  987. // CanManagePublicKeys returns true if this user is allowed to manage public keys
  988. // from the web client. Used in web client UI
  989. func (u *User) CanManagePublicKeys() bool {
  990. return !util.Contains(u.Filters.WebClient, sdk.WebClientPubKeyChangeDisabled)
  991. }
  992. // CanAddFilesFromWeb returns true if the client can add files from the web UI.
  993. // The specified target is the directory where the files must be uploaded
  994. func (u *User) CanAddFilesFromWeb(target string) bool {
  995. if util.Contains(u.Filters.WebClient, sdk.WebClientWriteDisabled) {
  996. return false
  997. }
  998. return u.HasPerm(PermUpload, target) || u.HasPerm(PermOverwrite, target)
  999. }
  1000. // CanAddDirsFromWeb returns true if the client can add directories from the web UI.
  1001. // The specified target is the directory where the new directory must be created
  1002. func (u *User) CanAddDirsFromWeb(target string) bool {
  1003. if util.Contains(u.Filters.WebClient, sdk.WebClientWriteDisabled) {
  1004. return false
  1005. }
  1006. return u.HasPerm(PermCreateDirs, target)
  1007. }
  1008. // CanRenameFromWeb returns true if the client can rename objects from the web UI.
  1009. // The specified src and dest are the source and target directories for the rename.
  1010. func (u *User) CanRenameFromWeb(src, dest string) bool {
  1011. if util.Contains(u.Filters.WebClient, sdk.WebClientWriteDisabled) {
  1012. return false
  1013. }
  1014. return u.HasAnyPerm(permsRenameAny, src) && u.HasAnyPerm(permsRenameAny, dest)
  1015. }
  1016. // CanDeleteFromWeb returns true if the client can delete objects from the web UI.
  1017. // The specified target is the parent directory for the object to delete
  1018. func (u *User) CanDeleteFromWeb(target string) bool {
  1019. if util.Contains(u.Filters.WebClient, sdk.WebClientWriteDisabled) {
  1020. return false
  1021. }
  1022. return u.HasAnyPerm(permsDeleteAny, target)
  1023. }
  1024. // PasswordExpiresIn returns the number of days before the password expires.
  1025. // The returned value is negative if the password is expired.
  1026. // The caller must ensure that a PasswordExpiration is set
  1027. func (u *User) PasswordExpiresIn() int {
  1028. lastPwdChange := util.GetTimeFromMsecSinceEpoch(u.LastPasswordChange)
  1029. pwdExpiration := lastPwdChange.Add(time.Duration(u.Filters.PasswordExpiration) * 24 * time.Hour)
  1030. res := int(math.Round(float64(time.Until(pwdExpiration)) / float64(24*time.Hour)))
  1031. if res == 0 && pwdExpiration.After(time.Now()) {
  1032. res = 1
  1033. }
  1034. return res
  1035. }
  1036. // MustChangePassword returns true if the user must change the password
  1037. func (u *User) MustChangePassword() bool {
  1038. if u.Filters.RequirePasswordChange {
  1039. return true
  1040. }
  1041. if u.Filters.PasswordExpiration == 0 {
  1042. return false
  1043. }
  1044. lastPwdChange := util.GetTimeFromMsecSinceEpoch(u.LastPasswordChange)
  1045. return lastPwdChange.Add(time.Duration(u.Filters.PasswordExpiration) * 24 * time.Hour).Before(time.Now())
  1046. }
  1047. // MustSetSecondFactor returns true if the user must set a second factor authentication
  1048. func (u *User) MustSetSecondFactor() bool {
  1049. if len(u.Filters.TwoFactorAuthProtocols) > 0 {
  1050. if !u.Filters.TOTPConfig.Enabled {
  1051. return true
  1052. }
  1053. for _, p := range u.Filters.TwoFactorAuthProtocols {
  1054. if !util.Contains(u.Filters.TOTPConfig.Protocols, p) {
  1055. return true
  1056. }
  1057. }
  1058. }
  1059. return false
  1060. }
  1061. // MustSetSecondFactorForProtocol returns true if the user must set a second factor authentication
  1062. // for the specified protocol
  1063. func (u *User) MustSetSecondFactorForProtocol(protocol string) bool {
  1064. if util.Contains(u.Filters.TwoFactorAuthProtocols, protocol) {
  1065. if !u.Filters.TOTPConfig.Enabled {
  1066. return true
  1067. }
  1068. if !util.Contains(u.Filters.TOTPConfig.Protocols, protocol) {
  1069. return true
  1070. }
  1071. }
  1072. return false
  1073. }
  1074. // GetSignature returns a signature for this admin.
  1075. // It will change after an update
  1076. func (u *User) GetSignature() string {
  1077. return strconv.FormatInt(u.UpdatedAt, 10)
  1078. }
  1079. // GetBandwidthForIP returns the upload and download bandwidth for the specified IP
  1080. func (u *User) GetBandwidthForIP(clientIP, connectionID string) (int64, int64) {
  1081. if len(u.Filters.BandwidthLimits) > 0 {
  1082. ip := net.ParseIP(clientIP)
  1083. if ip != nil {
  1084. for _, bwLimit := range u.Filters.BandwidthLimits {
  1085. for _, source := range bwLimit.Sources {
  1086. _, ipNet, err := net.ParseCIDR(source)
  1087. if err == nil {
  1088. if ipNet.Contains(ip) {
  1089. logger.Debug(logSender, connectionID, "override bandwidth limit for ip %#v, upload limit: %v KB/s, download limit: %v KB/s",
  1090. clientIP, bwLimit.UploadBandwidth, bwLimit.DownloadBandwidth)
  1091. return bwLimit.UploadBandwidth, bwLimit.DownloadBandwidth
  1092. }
  1093. }
  1094. }
  1095. }
  1096. }
  1097. }
  1098. return u.UploadBandwidth, u.DownloadBandwidth
  1099. }
  1100. // IsLoginFromAddrAllowed returns true if the login is allowed from the specified remoteAddr.
  1101. // If AllowedIP is defined only the specified IP/Mask can login.
  1102. // If DeniedIP is defined the specified IP/Mask cannot login.
  1103. // If an IP is both allowed and denied then login will be allowed
  1104. func (u *User) IsLoginFromAddrAllowed(remoteAddr string) bool {
  1105. if len(u.Filters.AllowedIP) == 0 && len(u.Filters.DeniedIP) == 0 {
  1106. return true
  1107. }
  1108. remoteIP := net.ParseIP(util.GetIPFromRemoteAddress(remoteAddr))
  1109. // if remoteIP is invalid we allow login, this should never happen
  1110. if remoteIP == nil {
  1111. logger.Warn(logSender, "", "login allowed for invalid IP. remote address: %#v", remoteAddr)
  1112. return true
  1113. }
  1114. for _, IPMask := range u.Filters.AllowedIP {
  1115. _, IPNet, err := net.ParseCIDR(IPMask)
  1116. if err != nil {
  1117. return false
  1118. }
  1119. if IPNet.Contains(remoteIP) {
  1120. return true
  1121. }
  1122. }
  1123. for _, IPMask := range u.Filters.DeniedIP {
  1124. _, IPNet, err := net.ParseCIDR(IPMask)
  1125. if err != nil {
  1126. return false
  1127. }
  1128. if IPNet.Contains(remoteIP) {
  1129. return false
  1130. }
  1131. }
  1132. return len(u.Filters.AllowedIP) == 0
  1133. }
  1134. // GetPermissionsAsJSON returns the permissions as json byte array
  1135. func (u *User) GetPermissionsAsJSON() ([]byte, error) {
  1136. return json.Marshal(u.Permissions)
  1137. }
  1138. // GetPublicKeysAsJSON returns the public keys as json byte array
  1139. func (u *User) GetPublicKeysAsJSON() ([]byte, error) {
  1140. return json.Marshal(u.PublicKeys)
  1141. }
  1142. // GetFiltersAsJSON returns the filters as json byte array
  1143. func (u *User) GetFiltersAsJSON() ([]byte, error) {
  1144. return json.Marshal(u.Filters)
  1145. }
  1146. // GetFsConfigAsJSON returns the filesystem config as json byte array
  1147. func (u *User) GetFsConfigAsJSON() ([]byte, error) {
  1148. return json.Marshal(u.FsConfig)
  1149. }
  1150. // GetUID returns a validate uid, suitable for use with os.Chown
  1151. func (u *User) GetUID() int {
  1152. if u.UID <= 0 || u.UID > math.MaxInt32 {
  1153. return -1
  1154. }
  1155. return u.UID
  1156. }
  1157. // GetGID returns a validate gid, suitable for use with os.Chown
  1158. func (u *User) GetGID() int {
  1159. if u.GID <= 0 || u.GID > math.MaxInt32 {
  1160. return -1
  1161. }
  1162. return u.GID
  1163. }
  1164. // GetHomeDir returns the shortest path name equivalent to the user's home directory
  1165. func (u *User) GetHomeDir() string {
  1166. return u.HomeDir
  1167. }
  1168. // HasRecentActivity returns true if the last user login is recent and so we can skip some expensive checks
  1169. func (u *User) HasRecentActivity() bool {
  1170. return isLastActivityRecent(u.LastLogin, lastLoginMinDelay)
  1171. }
  1172. // HasQuotaRestrictions returns true if there are any disk quota restrictions
  1173. func (u *User) HasQuotaRestrictions() bool {
  1174. return u.QuotaFiles > 0 || u.QuotaSize > 0
  1175. }
  1176. // HasTransferQuotaRestrictions returns true if there are any data transfer restrictions
  1177. func (u *User) HasTransferQuotaRestrictions() bool {
  1178. if len(u.Filters.DataTransferLimits) > 0 {
  1179. return true
  1180. }
  1181. return u.UploadDataTransfer > 0 || u.TotalDataTransfer > 0 || u.DownloadDataTransfer > 0
  1182. }
  1183. // GetDataTransferLimits returns upload, download and total data transfer limits
  1184. func (u *User) GetDataTransferLimits(clientIP string) (int64, int64, int64) {
  1185. var total, ul, dl int64
  1186. if len(u.Filters.DataTransferLimits) > 0 {
  1187. ip := net.ParseIP(clientIP)
  1188. if ip != nil {
  1189. for _, limit := range u.Filters.DataTransferLimits {
  1190. for _, source := range limit.Sources {
  1191. _, ipNet, err := net.ParseCIDR(source)
  1192. if err == nil {
  1193. if ipNet.Contains(ip) {
  1194. if limit.TotalDataTransfer > 0 {
  1195. total = limit.TotalDataTransfer * 1048576
  1196. }
  1197. if limit.DownloadDataTransfer > 0 {
  1198. dl = limit.DownloadDataTransfer * 1048576
  1199. }
  1200. if limit.UploadDataTransfer > 0 {
  1201. ul = limit.UploadDataTransfer * 1048576
  1202. }
  1203. return ul, dl, total
  1204. }
  1205. }
  1206. }
  1207. }
  1208. }
  1209. }
  1210. if u.TotalDataTransfer > 0 {
  1211. total = u.TotalDataTransfer * 1048576
  1212. }
  1213. if u.DownloadDataTransfer > 0 {
  1214. dl = u.DownloadDataTransfer * 1048576
  1215. }
  1216. if u.UploadDataTransfer > 0 {
  1217. ul = u.UploadDataTransfer * 1048576
  1218. }
  1219. return ul, dl, total
  1220. }
  1221. // GetQuotaSummary returns used quota and limits if defined
  1222. func (u *User) GetQuotaSummary() string {
  1223. var sb strings.Builder
  1224. addSection := func() {
  1225. if sb.Len() > 0 {
  1226. sb.WriteString(". ")
  1227. }
  1228. }
  1229. if u.UsedQuotaFiles > 0 || u.QuotaFiles > 0 {
  1230. sb.WriteString(fmt.Sprintf("Files: %v", u.UsedQuotaFiles))
  1231. if u.QuotaFiles > 0 {
  1232. sb.WriteString(fmt.Sprintf("/%v", u.QuotaFiles))
  1233. }
  1234. }
  1235. if u.UsedQuotaSize > 0 || u.QuotaSize > 0 {
  1236. addSection()
  1237. sb.WriteString(fmt.Sprintf("Size: %v", util.ByteCountIEC(u.UsedQuotaSize)))
  1238. if u.QuotaSize > 0 {
  1239. sb.WriteString(fmt.Sprintf("/%v", util.ByteCountIEC(u.QuotaSize)))
  1240. }
  1241. }
  1242. if u.TotalDataTransfer > 0 {
  1243. addSection()
  1244. total := u.UsedDownloadDataTransfer + u.UsedUploadDataTransfer
  1245. sb.WriteString(fmt.Sprintf("Transfer: %v/%v", util.ByteCountIEC(total),
  1246. util.ByteCountIEC(u.TotalDataTransfer*1048576)))
  1247. }
  1248. if u.UploadDataTransfer > 0 {
  1249. addSection()
  1250. sb.WriteString(fmt.Sprintf("UL: %v/%v", util.ByteCountIEC(u.UsedUploadDataTransfer),
  1251. util.ByteCountIEC(u.UploadDataTransfer*1048576)))
  1252. }
  1253. if u.DownloadDataTransfer > 0 {
  1254. addSection()
  1255. sb.WriteString(fmt.Sprintf("DL: %v/%v", util.ByteCountIEC(u.UsedDownloadDataTransfer),
  1256. util.ByteCountIEC(u.DownloadDataTransfer*1048576)))
  1257. }
  1258. return sb.String()
  1259. }
  1260. // GetPermissionsAsString returns the user's permissions as comma separated string
  1261. func (u *User) GetPermissionsAsString() string {
  1262. result := ""
  1263. for dir, perms := range u.Permissions {
  1264. dirPerms := strings.Join(perms, ", ")
  1265. dp := fmt.Sprintf("%#v: %#v", dir, dirPerms)
  1266. if dir == "/" {
  1267. if result != "" {
  1268. result = dp + ", " + result
  1269. } else {
  1270. result = dp
  1271. }
  1272. } else {
  1273. if result != "" {
  1274. result += ", "
  1275. }
  1276. result += dp
  1277. }
  1278. }
  1279. return result
  1280. }
  1281. // GetBandwidthAsString returns bandwidth limits if defines
  1282. func (u *User) GetBandwidthAsString() string {
  1283. var sb strings.Builder
  1284. sb.WriteString("DL: ")
  1285. if u.DownloadBandwidth > 0 {
  1286. sb.WriteString(util.ByteCountIEC(u.DownloadBandwidth*1000) + "/s.")
  1287. } else {
  1288. sb.WriteString("unlimited.")
  1289. }
  1290. sb.WriteString(" UL: ")
  1291. if u.UploadBandwidth > 0 {
  1292. sb.WriteString(util.ByteCountIEC(u.UploadBandwidth*1000) + "/s.")
  1293. } else {
  1294. sb.WriteString("unlimited.")
  1295. }
  1296. return sb.String()
  1297. }
  1298. // GetMFAStatusAsString returns MFA status
  1299. func (u *User) GetMFAStatusAsString() string {
  1300. if u.Filters.TOTPConfig.Enabled {
  1301. return strings.Join(u.Filters.TOTPConfig.Protocols, ", ")
  1302. }
  1303. return "Disabled"
  1304. }
  1305. // GetLastLoginAsString returns the last login as string
  1306. func (u *User) GetLastLoginAsString() string {
  1307. if u.LastLogin > 0 {
  1308. return util.GetTimeFromMsecSinceEpoch(u.LastLogin).UTC().Format(iso8601UTCFormat)
  1309. }
  1310. return ""
  1311. }
  1312. // GetLastQuotaUpdateAsString returns the last quota update as string
  1313. func (u *User) GetLastQuotaUpdateAsString() string {
  1314. if u.LastQuotaUpdate > 0 {
  1315. return util.GetTimeFromMsecSinceEpoch(u.LastQuotaUpdate).UTC().Format(iso8601UTCFormat)
  1316. }
  1317. return ""
  1318. }
  1319. // GetStorageDescrition returns the storage description
  1320. func (u *User) GetStorageDescrition() string {
  1321. switch u.FsConfig.Provider {
  1322. case sdk.LocalFilesystemProvider:
  1323. return fmt.Sprintf("Local: %v", u.GetHomeDir())
  1324. case sdk.S3FilesystemProvider:
  1325. return fmt.Sprintf("S3: %v", u.FsConfig.S3Config.Bucket)
  1326. case sdk.GCSFilesystemProvider:
  1327. return fmt.Sprintf("GCS: %v", u.FsConfig.GCSConfig.Bucket)
  1328. case sdk.AzureBlobFilesystemProvider:
  1329. return fmt.Sprintf("AzBlob: %v", u.FsConfig.AzBlobConfig.Container)
  1330. case sdk.CryptedFilesystemProvider:
  1331. return fmt.Sprintf("Encrypted: %v", u.GetHomeDir())
  1332. case sdk.SFTPFilesystemProvider:
  1333. return fmt.Sprintf("SFTP: %v", u.FsConfig.SFTPConfig.Endpoint)
  1334. case sdk.HTTPFilesystemProvider:
  1335. return fmt.Sprintf("HTTP: %v", u.FsConfig.HTTPConfig.Endpoint)
  1336. default:
  1337. return ""
  1338. }
  1339. }
  1340. // GetGroupsAsString returns the user's groups as a string
  1341. func (u *User) GetGroupsAsString() string {
  1342. if len(u.Groups) == 0 {
  1343. return ""
  1344. }
  1345. var groups []string
  1346. for _, g := range u.Groups {
  1347. if g.Type == sdk.GroupTypePrimary {
  1348. groups = append(groups, "")
  1349. copy(groups[1:], groups)
  1350. groups[0] = g.Name
  1351. } else {
  1352. groups = append(groups, g.Name)
  1353. }
  1354. }
  1355. return strings.Join(groups, ",")
  1356. }
  1357. // GetInfoString returns user's info as string.
  1358. // Storage provider, number of public keys, max sessions, uid,
  1359. // gid, denied and allowed IP/Mask are returned
  1360. func (u *User) GetInfoString() string {
  1361. var result strings.Builder
  1362. if len(u.PublicKeys) > 0 {
  1363. result.WriteString(fmt.Sprintf("Public keys: %v. ", len(u.PublicKeys)))
  1364. }
  1365. if u.MaxSessions > 0 {
  1366. result.WriteString(fmt.Sprintf("Max sessions: %v. ", u.MaxSessions))
  1367. }
  1368. if u.UID > 0 {
  1369. result.WriteString(fmt.Sprintf("UID: %v. ", u.UID))
  1370. }
  1371. if u.GID > 0 {
  1372. result.WriteString(fmt.Sprintf("GID: %v. ", u.GID))
  1373. }
  1374. if len(u.Filters.DeniedLoginMethods) > 0 {
  1375. result.WriteString(fmt.Sprintf("Denied login methods: %v. ", strings.Join(u.Filters.DeniedLoginMethods, ",")))
  1376. }
  1377. if len(u.Filters.DeniedProtocols) > 0 {
  1378. result.WriteString(fmt.Sprintf("Denied protocols: %v. ", strings.Join(u.Filters.DeniedProtocols, ",")))
  1379. }
  1380. if len(u.Filters.DeniedIP) > 0 {
  1381. result.WriteString(fmt.Sprintf("Denied IP/Mask: %v. ", len(u.Filters.DeniedIP)))
  1382. }
  1383. if len(u.Filters.AllowedIP) > 0 {
  1384. result.WriteString(fmt.Sprintf("Allowed IP/Mask: %v", len(u.Filters.AllowedIP)))
  1385. }
  1386. return result.String()
  1387. }
  1388. // GetStatusAsString returns the user status as a string
  1389. func (u *User) GetStatusAsString() string {
  1390. if u.ExpirationDate > 0 && u.ExpirationDate < util.GetTimeAsMsSinceEpoch(time.Now()) {
  1391. return "Expired"
  1392. }
  1393. if u.Status == 1 {
  1394. return "Active"
  1395. }
  1396. return "Inactive"
  1397. }
  1398. // GetExpirationDateAsString returns expiration date formatted as YYYY-MM-DD
  1399. func (u *User) GetExpirationDateAsString() string {
  1400. if u.ExpirationDate > 0 {
  1401. t := util.GetTimeFromMsecSinceEpoch(u.ExpirationDate)
  1402. return t.Format("2006-01-02")
  1403. }
  1404. return ""
  1405. }
  1406. // GetAllowedIPAsString returns the allowed IP as comma separated string
  1407. func (u *User) GetAllowedIPAsString() string {
  1408. return strings.Join(u.Filters.AllowedIP, ",")
  1409. }
  1410. // GetDeniedIPAsString returns the denied IP as comma separated string
  1411. func (u *User) GetDeniedIPAsString() string {
  1412. return strings.Join(u.Filters.DeniedIP, ",")
  1413. }
  1414. // HasExternalAuth returns true if the external authentication is globally enabled
  1415. // and it is not disabled for this user
  1416. func (u *User) HasExternalAuth() bool {
  1417. if u.Filters.Hooks.ExternalAuthDisabled {
  1418. return false
  1419. }
  1420. if config.ExternalAuthHook != "" {
  1421. return true
  1422. }
  1423. return plugin.Handler.HasAuthenticators()
  1424. }
  1425. // CountUnusedRecoveryCodes returns the number of unused recovery codes
  1426. func (u *User) CountUnusedRecoveryCodes() int {
  1427. unused := 0
  1428. for _, code := range u.Filters.RecoveryCodes {
  1429. if !code.Used {
  1430. unused++
  1431. }
  1432. }
  1433. return unused
  1434. }
  1435. // SetEmptySecretsIfNil sets the secrets to empty if nil
  1436. func (u *User) SetEmptySecretsIfNil() {
  1437. u.FsConfig.SetEmptySecretsIfNil()
  1438. for idx := range u.VirtualFolders {
  1439. vfolder := &u.VirtualFolders[idx]
  1440. vfolder.FsConfig.SetEmptySecretsIfNil()
  1441. }
  1442. if u.Filters.TOTPConfig.Secret == nil {
  1443. u.Filters.TOTPConfig.Secret = kms.NewEmptySecret()
  1444. }
  1445. }
  1446. func (u *User) hasMainDataTransferLimits() bool {
  1447. return u.UploadDataTransfer > 0 || u.DownloadDataTransfer > 0 || u.TotalDataTransfer > 0
  1448. }
  1449. // HasPrimaryGroup returns true if the user has the specified primary group
  1450. func (u *User) HasPrimaryGroup(name string) bool {
  1451. for _, g := range u.Groups {
  1452. if g.Name == name {
  1453. return g.Type == sdk.GroupTypePrimary
  1454. }
  1455. }
  1456. return false
  1457. }
  1458. // HasSecondaryGroup returns true if the user has the specified secondary group
  1459. func (u *User) HasSecondaryGroup(name string) bool {
  1460. for _, g := range u.Groups {
  1461. if g.Name == name {
  1462. return g.Type == sdk.GroupTypeSecondary
  1463. }
  1464. }
  1465. return false
  1466. }
  1467. // HasMembershipGroup returns true if the user has the specified membership group
  1468. func (u *User) HasMembershipGroup(name string) bool {
  1469. for _, g := range u.Groups {
  1470. if g.Name == name {
  1471. return g.Type == sdk.GroupTypeMembership
  1472. }
  1473. }
  1474. return false
  1475. }
  1476. func (u *User) hasSettingsFromGroups() bool {
  1477. for _, g := range u.Groups {
  1478. if g.Type != sdk.GroupTypeMembership {
  1479. return true
  1480. }
  1481. }
  1482. return false
  1483. }
  1484. func (u *User) applyGroupSettings(groupsMapping map[string]Group) {
  1485. if !u.hasSettingsFromGroups() {
  1486. return
  1487. }
  1488. if u.groupSettingsApplied {
  1489. return
  1490. }
  1491. replacer := u.getGroupPlacehodersReplacer()
  1492. for _, g := range u.Groups {
  1493. if g.Type == sdk.GroupTypePrimary {
  1494. if group, ok := groupsMapping[g.Name]; ok {
  1495. u.mergeWithPrimaryGroup(group, replacer)
  1496. } else {
  1497. providerLog(logger.LevelError, "mapping not found for user %s, group %s", u.Username, g.Name)
  1498. }
  1499. break
  1500. }
  1501. }
  1502. for _, g := range u.Groups {
  1503. if g.Type == sdk.GroupTypeSecondary {
  1504. if group, ok := groupsMapping[g.Name]; ok {
  1505. u.mergeAdditiveProperties(group, sdk.GroupTypeSecondary, replacer)
  1506. } else {
  1507. providerLog(logger.LevelError, "mapping not found for user %s, group %s", u.Username, g.Name)
  1508. }
  1509. }
  1510. }
  1511. u.removeDuplicatesAfterGroupMerge()
  1512. }
  1513. // LoadAndApplyGroupSettings update the user by loading and applying the group settings
  1514. func (u *User) LoadAndApplyGroupSettings() error {
  1515. if !u.hasSettingsFromGroups() {
  1516. return nil
  1517. }
  1518. if u.groupSettingsApplied {
  1519. return nil
  1520. }
  1521. names := make([]string, 0, len(u.Groups))
  1522. var primaryGroupName string
  1523. for _, g := range u.Groups {
  1524. if g.Type == sdk.GroupTypePrimary {
  1525. primaryGroupName = g.Name
  1526. }
  1527. if g.Type != sdk.GroupTypeMembership {
  1528. names = append(names, g.Name)
  1529. }
  1530. }
  1531. groups, err := provider.getGroupsWithNames(names)
  1532. if err != nil {
  1533. return fmt.Errorf("unable to get groups: %w", err)
  1534. }
  1535. replacer := u.getGroupPlacehodersReplacer()
  1536. // make sure to always merge with the primary group first
  1537. for idx, g := range groups {
  1538. if g.Name == primaryGroupName {
  1539. u.mergeWithPrimaryGroup(g, replacer)
  1540. lastIdx := len(groups) - 1
  1541. groups[idx] = groups[lastIdx]
  1542. groups = groups[:lastIdx]
  1543. break
  1544. }
  1545. }
  1546. for _, g := range groups {
  1547. u.mergeAdditiveProperties(g, sdk.GroupTypeSecondary, replacer)
  1548. }
  1549. u.removeDuplicatesAfterGroupMerge()
  1550. return nil
  1551. }
  1552. func (u *User) getGroupPlacehodersReplacer() *strings.Replacer {
  1553. return strings.NewReplacer("%username%", u.Username)
  1554. }
  1555. func (u *User) replacePlaceholder(value string, replacer *strings.Replacer) string {
  1556. if value == "" {
  1557. return value
  1558. }
  1559. return replacer.Replace(value)
  1560. }
  1561. func (u *User) replaceFsConfigPlaceholders(fsConfig vfs.Filesystem, replacer *strings.Replacer) vfs.Filesystem {
  1562. switch fsConfig.Provider {
  1563. case sdk.S3FilesystemProvider:
  1564. fsConfig.S3Config.KeyPrefix = u.replacePlaceholder(fsConfig.S3Config.KeyPrefix, replacer)
  1565. case sdk.GCSFilesystemProvider:
  1566. fsConfig.GCSConfig.KeyPrefix = u.replacePlaceholder(fsConfig.GCSConfig.KeyPrefix, replacer)
  1567. case sdk.AzureBlobFilesystemProvider:
  1568. fsConfig.AzBlobConfig.KeyPrefix = u.replacePlaceholder(fsConfig.AzBlobConfig.KeyPrefix, replacer)
  1569. case sdk.SFTPFilesystemProvider:
  1570. fsConfig.SFTPConfig.Username = u.replacePlaceholder(fsConfig.SFTPConfig.Username, replacer)
  1571. fsConfig.SFTPConfig.Prefix = u.replacePlaceholder(fsConfig.SFTPConfig.Prefix, replacer)
  1572. case sdk.HTTPFilesystemProvider:
  1573. fsConfig.HTTPConfig.Username = u.replacePlaceholder(fsConfig.HTTPConfig.Username, replacer)
  1574. }
  1575. return fsConfig
  1576. }
  1577. func (u *User) mergeWithPrimaryGroup(group Group, replacer *strings.Replacer) {
  1578. if group.UserSettings.HomeDir != "" {
  1579. u.HomeDir = u.replacePlaceholder(group.UserSettings.HomeDir, replacer)
  1580. }
  1581. if group.UserSettings.FsConfig.Provider != 0 {
  1582. u.FsConfig = u.replaceFsConfigPlaceholders(group.UserSettings.FsConfig, replacer)
  1583. }
  1584. if u.MaxSessions == 0 {
  1585. u.MaxSessions = group.UserSettings.MaxSessions
  1586. }
  1587. if u.QuotaSize == 0 {
  1588. u.QuotaSize = group.UserSettings.QuotaSize
  1589. }
  1590. if u.QuotaFiles == 0 {
  1591. u.QuotaFiles = group.UserSettings.QuotaFiles
  1592. }
  1593. if u.UploadBandwidth == 0 {
  1594. u.UploadBandwidth = group.UserSettings.UploadBandwidth
  1595. }
  1596. if u.DownloadBandwidth == 0 {
  1597. u.DownloadBandwidth = group.UserSettings.DownloadBandwidth
  1598. }
  1599. if !u.hasMainDataTransferLimits() {
  1600. u.UploadDataTransfer = group.UserSettings.UploadDataTransfer
  1601. u.DownloadDataTransfer = group.UserSettings.DownloadDataTransfer
  1602. u.TotalDataTransfer = group.UserSettings.TotalDataTransfer
  1603. }
  1604. u.mergePrimaryGroupFilters(group.UserSettings.Filters, replacer)
  1605. u.mergeAdditiveProperties(group, sdk.GroupTypePrimary, replacer)
  1606. }
  1607. func (u *User) mergePrimaryGroupFilters(filters sdk.BaseUserFilters, replacer *strings.Replacer) {
  1608. if u.Filters.MaxUploadFileSize == 0 {
  1609. u.Filters.MaxUploadFileSize = filters.MaxUploadFileSize
  1610. }
  1611. if u.Filters.TLSUsername == "" || u.Filters.TLSUsername == sdk.TLSUsernameNone {
  1612. u.Filters.TLSUsername = filters.TLSUsername
  1613. }
  1614. if !u.Filters.Hooks.CheckPasswordDisabled {
  1615. u.Filters.Hooks.CheckPasswordDisabled = filters.Hooks.CheckPasswordDisabled
  1616. }
  1617. if !u.Filters.Hooks.PreLoginDisabled {
  1618. u.Filters.Hooks.PreLoginDisabled = filters.Hooks.PreLoginDisabled
  1619. }
  1620. if !u.Filters.Hooks.ExternalAuthDisabled {
  1621. u.Filters.Hooks.ExternalAuthDisabled = filters.Hooks.ExternalAuthDisabled
  1622. }
  1623. if !u.Filters.DisableFsChecks {
  1624. u.Filters.DisableFsChecks = filters.DisableFsChecks
  1625. }
  1626. if !u.Filters.AllowAPIKeyAuth {
  1627. u.Filters.AllowAPIKeyAuth = filters.AllowAPIKeyAuth
  1628. }
  1629. if !u.Filters.IsAnonymous {
  1630. u.Filters.IsAnonymous = filters.IsAnonymous
  1631. }
  1632. if u.Filters.ExternalAuthCacheTime == 0 {
  1633. u.Filters.ExternalAuthCacheTime = filters.ExternalAuthCacheTime
  1634. }
  1635. if u.Filters.FTPSecurity == 0 {
  1636. u.Filters.FTPSecurity = filters.FTPSecurity
  1637. }
  1638. if u.Filters.StartDirectory == "" {
  1639. u.Filters.StartDirectory = u.replacePlaceholder(filters.StartDirectory, replacer)
  1640. }
  1641. if u.Filters.DefaultSharesExpiration == 0 {
  1642. u.Filters.DefaultSharesExpiration = filters.DefaultSharesExpiration
  1643. }
  1644. if u.Filters.PasswordExpiration == 0 {
  1645. u.Filters.PasswordExpiration = filters.PasswordExpiration
  1646. }
  1647. }
  1648. func (u *User) mergeAdditiveProperties(group Group, groupType int, replacer *strings.Replacer) {
  1649. u.mergeVirtualFolders(group, groupType, replacer)
  1650. u.mergePermissions(group, groupType, replacer)
  1651. u.mergeFilePatterns(group, groupType, replacer)
  1652. u.Filters.BandwidthLimits = append(u.Filters.BandwidthLimits, group.UserSettings.Filters.BandwidthLimits...)
  1653. u.Filters.DataTransferLimits = append(u.Filters.DataTransferLimits, group.UserSettings.Filters.DataTransferLimits...)
  1654. u.Filters.AllowedIP = append(u.Filters.AllowedIP, group.UserSettings.Filters.AllowedIP...)
  1655. u.Filters.DeniedIP = append(u.Filters.DeniedIP, group.UserSettings.Filters.DeniedIP...)
  1656. u.Filters.DeniedLoginMethods = append(u.Filters.DeniedLoginMethods, group.UserSettings.Filters.DeniedLoginMethods...)
  1657. u.Filters.DeniedProtocols = append(u.Filters.DeniedProtocols, group.UserSettings.Filters.DeniedProtocols...)
  1658. u.Filters.WebClient = append(u.Filters.WebClient, group.UserSettings.Filters.WebClient...)
  1659. u.Filters.TwoFactorAuthProtocols = append(u.Filters.TwoFactorAuthProtocols, group.UserSettings.Filters.TwoFactorAuthProtocols...)
  1660. }
  1661. func (u *User) mergeVirtualFolders(group Group, groupType int, replacer *strings.Replacer) {
  1662. if len(group.VirtualFolders) > 0 {
  1663. folderPaths := make(map[string]bool)
  1664. for _, folder := range u.VirtualFolders {
  1665. folderPaths[folder.VirtualPath] = true
  1666. }
  1667. for _, folder := range group.VirtualFolders {
  1668. if folder.VirtualPath == "/" && groupType != sdk.GroupTypePrimary {
  1669. continue
  1670. }
  1671. folder.VirtualPath = u.replacePlaceholder(folder.VirtualPath, replacer)
  1672. if _, ok := folderPaths[folder.VirtualPath]; !ok {
  1673. folder.MappedPath = u.replacePlaceholder(folder.MappedPath, replacer)
  1674. folder.FsConfig = u.replaceFsConfigPlaceholders(folder.FsConfig, replacer)
  1675. u.VirtualFolders = append(u.VirtualFolders, folder)
  1676. }
  1677. }
  1678. }
  1679. }
  1680. func (u *User) mergePermissions(group Group, groupType int, replacer *strings.Replacer) {
  1681. for k, v := range group.UserSettings.Permissions {
  1682. if k == "/" {
  1683. if groupType == sdk.GroupTypePrimary {
  1684. u.Permissions[k] = v
  1685. } else {
  1686. continue
  1687. }
  1688. }
  1689. k = u.replacePlaceholder(k, replacer)
  1690. if _, ok := u.Permissions[k]; !ok {
  1691. u.Permissions[k] = v
  1692. }
  1693. }
  1694. }
  1695. func (u *User) mergeFilePatterns(group Group, groupType int, replacer *strings.Replacer) {
  1696. if len(group.UserSettings.Filters.FilePatterns) > 0 {
  1697. patternPaths := make(map[string]bool)
  1698. for _, pattern := range u.Filters.FilePatterns {
  1699. patternPaths[pattern.Path] = true
  1700. }
  1701. for _, pattern := range group.UserSettings.Filters.FilePatterns {
  1702. if pattern.Path == "/" && groupType != sdk.GroupTypePrimary {
  1703. continue
  1704. }
  1705. pattern.Path = u.replacePlaceholder(pattern.Path, replacer)
  1706. if _, ok := patternPaths[pattern.Path]; !ok {
  1707. u.Filters.FilePatterns = append(u.Filters.FilePatterns, pattern)
  1708. }
  1709. }
  1710. }
  1711. }
  1712. func (u *User) removeDuplicatesAfterGroupMerge() {
  1713. u.Filters.AllowedIP = util.RemoveDuplicates(u.Filters.AllowedIP, false)
  1714. u.Filters.DeniedIP = util.RemoveDuplicates(u.Filters.DeniedIP, false)
  1715. u.Filters.DeniedLoginMethods = util.RemoveDuplicates(u.Filters.DeniedLoginMethods, false)
  1716. u.Filters.DeniedProtocols = util.RemoveDuplicates(u.Filters.DeniedProtocols, false)
  1717. u.Filters.WebClient = util.RemoveDuplicates(u.Filters.WebClient, false)
  1718. u.Filters.TwoFactorAuthProtocols = util.RemoveDuplicates(u.Filters.TwoFactorAuthProtocols, false)
  1719. u.SetEmptySecretsIfNil()
  1720. u.groupSettingsApplied = true
  1721. }
  1722. func (u *User) hasRole(role string) bool {
  1723. if role == "" {
  1724. return true
  1725. }
  1726. return role == u.Role
  1727. }
  1728. func (u *User) getACopy() User {
  1729. u.SetEmptySecretsIfNil()
  1730. pubKeys := make([]string, len(u.PublicKeys))
  1731. copy(pubKeys, u.PublicKeys)
  1732. virtualFolders := make([]vfs.VirtualFolder, 0, len(u.VirtualFolders))
  1733. for idx := range u.VirtualFolders {
  1734. vfolder := u.VirtualFolders[idx].GetACopy()
  1735. virtualFolders = append(virtualFolders, vfolder)
  1736. }
  1737. groups := make([]sdk.GroupMapping, 0, len(u.Groups))
  1738. for _, g := range u.Groups {
  1739. groups = append(groups, sdk.GroupMapping{
  1740. Name: g.Name,
  1741. Type: g.Type,
  1742. })
  1743. }
  1744. permissions := make(map[string][]string)
  1745. for k, v := range u.Permissions {
  1746. perms := make([]string, len(v))
  1747. copy(perms, v)
  1748. permissions[k] = perms
  1749. }
  1750. filters := UserFilters{
  1751. BaseUserFilters: copyBaseUserFilters(u.Filters.BaseUserFilters),
  1752. }
  1753. filters.RequirePasswordChange = u.Filters.RequirePasswordChange
  1754. filters.TOTPConfig.Enabled = u.Filters.TOTPConfig.Enabled
  1755. filters.TOTPConfig.ConfigName = u.Filters.TOTPConfig.ConfigName
  1756. filters.TOTPConfig.Secret = u.Filters.TOTPConfig.Secret.Clone()
  1757. filters.TOTPConfig.Protocols = make([]string, len(u.Filters.TOTPConfig.Protocols))
  1758. copy(filters.TOTPConfig.Protocols, u.Filters.TOTPConfig.Protocols)
  1759. filters.RecoveryCodes = make([]RecoveryCode, 0, len(u.Filters.RecoveryCodes))
  1760. for _, code := range u.Filters.RecoveryCodes {
  1761. if code.Secret == nil {
  1762. code.Secret = kms.NewEmptySecret()
  1763. }
  1764. filters.RecoveryCodes = append(filters.RecoveryCodes, RecoveryCode{
  1765. Secret: code.Secret.Clone(),
  1766. Used: code.Used,
  1767. })
  1768. }
  1769. return User{
  1770. BaseUser: sdk.BaseUser{
  1771. ID: u.ID,
  1772. Username: u.Username,
  1773. Email: u.Email,
  1774. Password: u.Password,
  1775. PublicKeys: pubKeys,
  1776. HomeDir: u.HomeDir,
  1777. UID: u.UID,
  1778. GID: u.GID,
  1779. MaxSessions: u.MaxSessions,
  1780. QuotaSize: u.QuotaSize,
  1781. QuotaFiles: u.QuotaFiles,
  1782. Permissions: permissions,
  1783. UsedQuotaSize: u.UsedQuotaSize,
  1784. UsedQuotaFiles: u.UsedQuotaFiles,
  1785. LastQuotaUpdate: u.LastQuotaUpdate,
  1786. UploadBandwidth: u.UploadBandwidth,
  1787. DownloadBandwidth: u.DownloadBandwidth,
  1788. UploadDataTransfer: u.UploadDataTransfer,
  1789. DownloadDataTransfer: u.DownloadDataTransfer,
  1790. TotalDataTransfer: u.TotalDataTransfer,
  1791. UsedUploadDataTransfer: u.UsedUploadDataTransfer,
  1792. UsedDownloadDataTransfer: u.UsedDownloadDataTransfer,
  1793. Status: u.Status,
  1794. ExpirationDate: u.ExpirationDate,
  1795. LastLogin: u.LastLogin,
  1796. FirstDownload: u.FirstDownload,
  1797. FirstUpload: u.FirstUpload,
  1798. LastPasswordChange: u.LastPasswordChange,
  1799. AdditionalInfo: u.AdditionalInfo,
  1800. Description: u.Description,
  1801. CreatedAt: u.CreatedAt,
  1802. UpdatedAt: u.UpdatedAt,
  1803. Role: u.Role,
  1804. },
  1805. Filters: filters,
  1806. VirtualFolders: virtualFolders,
  1807. Groups: groups,
  1808. FsConfig: u.FsConfig.GetACopy(),
  1809. groupSettingsApplied: u.groupSettingsApplied,
  1810. }
  1811. }
  1812. // GetEncryptionAdditionalData returns the additional data to use for AEAD
  1813. func (u *User) GetEncryptionAdditionalData() string {
  1814. return u.Username
  1815. }