api_http_user.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "io"
  20. "mime/multipart"
  21. "net/http"
  22. "os"
  23. "path"
  24. "strconv"
  25. "github.com/go-chi/render"
  26. "github.com/rs/xid"
  27. "github.com/drakkan/sftpgo/v2/internal/common"
  28. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  29. "github.com/drakkan/sftpgo/v2/internal/logger"
  30. "github.com/drakkan/sftpgo/v2/internal/util"
  31. )
  32. func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
  33. claims, err := getTokenClaims(r)
  34. if err != nil || claims.Username == "" {
  35. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  36. return nil, fmt.Errorf("invalid token claims %w", err)
  37. }
  38. user, err := dataprovider.GetUserWithGroupSettings(claims.Username)
  39. if err != nil {
  40. sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
  41. return nil, err
  42. }
  43. connID := xid.New().String()
  44. protocol := getProtocolFromRequest(r)
  45. connectionID := fmt.Sprintf("%v_%v", protocol, connID)
  46. if err := checkHTTPClientUser(&user, r, connectionID, false); err != nil {
  47. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  48. return nil, err
  49. }
  50. connection := &Connection{
  51. BaseConnection: common.NewBaseConnection(connID, protocol, util.GetHTTPLocalAddress(r),
  52. r.RemoteAddr, user),
  53. request: r,
  54. }
  55. if err = common.Connections.Add(connection); err != nil {
  56. sendAPIResponse(w, r, err, "Unable to add connection", http.StatusTooManyRequests)
  57. return connection, err
  58. }
  59. return connection, nil
  60. }
  61. func readUserFolder(w http.ResponseWriter, r *http.Request) {
  62. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  63. connection, err := getUserConnection(w, r)
  64. if err != nil {
  65. return
  66. }
  67. defer common.Connections.Remove(connection.GetID())
  68. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  69. contents, err := connection.ReadDir(name)
  70. if err != nil {
  71. sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
  72. return
  73. }
  74. renderAPIDirContents(w, r, contents, false)
  75. }
  76. func createUserDir(w http.ResponseWriter, r *http.Request) {
  77. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  78. connection, err := getUserConnection(w, r)
  79. if err != nil {
  80. return
  81. }
  82. defer common.Connections.Remove(connection.GetID())
  83. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  84. if getBoolQueryParam(r, "mkdir_parents") {
  85. if err = connection.CheckParentDirs(path.Dir(name)); err != nil {
  86. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  87. return
  88. }
  89. }
  90. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  91. err = connection.CreateDir(name, true)
  92. if err != nil {
  93. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %#v", name), getMappedStatusCode(err))
  94. return
  95. }
  96. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v created", name), http.StatusCreated)
  97. }
  98. func renameUserDir(w http.ResponseWriter, r *http.Request) {
  99. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  100. renameItem(w, r)
  101. }
  102. func deleteUserDir(w http.ResponseWriter, r *http.Request) {
  103. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  104. connection, err := getUserConnection(w, r)
  105. if err != nil {
  106. return
  107. }
  108. defer common.Connections.Remove(connection.GetID())
  109. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  110. err = connection.RemoveAll(name)
  111. if err != nil {
  112. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %q", name), getMappedStatusCode(err))
  113. return
  114. }
  115. sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %q deleted", name), http.StatusOK)
  116. }
  117. func getUserFile(w http.ResponseWriter, r *http.Request) {
  118. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  119. connection, err := getUserConnection(w, r)
  120. if err != nil {
  121. return
  122. }
  123. defer common.Connections.Remove(connection.GetID())
  124. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  125. if name == "/" {
  126. sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
  127. return
  128. }
  129. info, err := connection.Stat(name, 0)
  130. if err != nil {
  131. sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
  132. return
  133. }
  134. if info.IsDir() {
  135. sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %#v is a directory", name), http.StatusBadRequest)
  136. return
  137. }
  138. inline := r.URL.Query().Get("inline") != ""
  139. if status, err := downloadFile(w, r, connection, name, info, inline, nil); err != nil {
  140. resp := apiResponse{
  141. Error: err.Error(),
  142. Message: http.StatusText(status),
  143. }
  144. ctx := r.Context()
  145. if status != 0 {
  146. ctx = context.WithValue(ctx, render.StatusCtxKey, status)
  147. }
  148. render.JSON(w, r.WithContext(ctx), resp)
  149. }
  150. }
  151. func setFileDirMetadata(w http.ResponseWriter, r *http.Request) {
  152. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  153. metadata := make(map[string]int64)
  154. err := render.DecodeJSON(r.Body, &metadata)
  155. if err != nil {
  156. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  157. return
  158. }
  159. mTime, ok := metadata["modification_time"]
  160. if !ok || !r.URL.Query().Has("path") {
  161. sendAPIResponse(w, r, errors.New("please set a modification_time and a path"), "", http.StatusBadRequest)
  162. return
  163. }
  164. connection, err := getUserConnection(w, r)
  165. if err != nil {
  166. return
  167. }
  168. defer common.Connections.Remove(connection.GetID())
  169. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  170. attrs := common.StatAttributes{
  171. Flags: common.StatAttrTimes,
  172. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  173. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  174. }
  175. err = connection.SetStat(name, &attrs)
  176. if err != nil {
  177. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to set metadata for path %#v", name), getMappedStatusCode(err))
  178. return
  179. }
  180. sendAPIResponse(w, r, nil, "OK", http.StatusOK)
  181. }
  182. func uploadUserFile(w http.ResponseWriter, r *http.Request) {
  183. if maxUploadFileSize > 0 {
  184. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  185. }
  186. if !r.URL.Query().Has("path") {
  187. sendAPIResponse(w, r, errors.New("please set a file path"), "", http.StatusBadRequest)
  188. return
  189. }
  190. connection, err := getUserConnection(w, r)
  191. if err != nil {
  192. return
  193. }
  194. defer common.Connections.Remove(connection.GetID())
  195. filePath := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  196. if getBoolQueryParam(r, "mkdir_parents") {
  197. if err = connection.CheckParentDirs(path.Dir(filePath)); err != nil {
  198. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  199. return
  200. }
  201. }
  202. doUploadFile(w, r, connection, filePath) //nolint:errcheck
  203. }
  204. func doUploadFile(w http.ResponseWriter, r *http.Request, connection *Connection, filePath string) error {
  205. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  206. writer, err := connection.getFileWriter(filePath)
  207. if err != nil {
  208. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", filePath), getMappedStatusCode(err))
  209. return err
  210. }
  211. _, err = io.Copy(writer, r.Body)
  212. if err != nil {
  213. writer.Close() //nolint:errcheck
  214. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", filePath), getMappedStatusCode(err))
  215. return err
  216. }
  217. err = writer.Close()
  218. if err != nil {
  219. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", filePath), getMappedStatusCode(err))
  220. return err
  221. }
  222. setModificationTimeFromHeader(r, connection, filePath)
  223. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  224. return nil
  225. }
  226. func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
  227. if maxUploadFileSize > 0 {
  228. r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
  229. }
  230. connection, err := getUserConnection(w, r)
  231. if err != nil {
  232. return
  233. }
  234. defer common.Connections.Remove(connection.GetID())
  235. transferQuota := connection.GetTransferQuota()
  236. if !transferQuota.HasUploadSpace() {
  237. connection.Log(logger.LevelInfo, "denying file write due to transfer quota limits")
  238. sendAPIResponse(w, r, common.ErrQuotaExceeded, "Denying file write due to transfer quota limits",
  239. http.StatusRequestEntityTooLarge)
  240. return
  241. }
  242. t := newThrottledReader(r.Body, connection.User.UploadBandwidth, connection)
  243. r.Body = t
  244. err = r.ParseMultipartForm(maxMultipartMem)
  245. if err != nil {
  246. connection.RemoveTransfer(t)
  247. sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
  248. return
  249. }
  250. connection.RemoveTransfer(t)
  251. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  252. parentDir := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  253. files := r.MultipartForm.File["filenames"]
  254. if len(files) == 0 {
  255. sendAPIResponse(w, r, nil, "No files uploaded!", http.StatusBadRequest)
  256. return
  257. }
  258. if getBoolQueryParam(r, "mkdir_parents") {
  259. if err = connection.CheckParentDirs(parentDir); err != nil {
  260. sendAPIResponse(w, r, err, "Error checking parent directories", getMappedStatusCode(err))
  261. return
  262. }
  263. }
  264. doUploadFiles(w, r, connection, parentDir, files)
  265. }
  266. func doUploadFiles(w http.ResponseWriter, r *http.Request, connection *Connection, parentDir string,
  267. files []*multipart.FileHeader,
  268. ) int {
  269. connection.User.CheckFsRoot(connection.ID) //nolint:errcheck
  270. uploaded := 0
  271. connection.User.UploadBandwidth = 0
  272. for _, f := range files {
  273. file, err := f.Open()
  274. if err != nil {
  275. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %#v", f.Filename), getMappedStatusCode(err))
  276. return uploaded
  277. }
  278. defer file.Close()
  279. filePath := path.Join(parentDir, path.Base(util.CleanPath(f.Filename)))
  280. writer, err := connection.getFileWriter(filePath)
  281. if err != nil {
  282. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", f.Filename), getMappedStatusCode(err))
  283. return uploaded
  284. }
  285. _, err = io.Copy(writer, file)
  286. if err != nil {
  287. writer.Close() //nolint:errcheck
  288. sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", f.Filename), getMappedStatusCode(err))
  289. return uploaded
  290. }
  291. err = writer.Close()
  292. if err != nil {
  293. sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", f.Filename), getMappedStatusCode(err))
  294. return uploaded
  295. }
  296. uploaded++
  297. }
  298. sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
  299. return uploaded
  300. }
  301. func renameUserFile(w http.ResponseWriter, r *http.Request) {
  302. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  303. renameItem(w, r)
  304. }
  305. func deleteUserFile(w http.ResponseWriter, r *http.Request) {
  306. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  307. connection, err := getUserConnection(w, r)
  308. if err != nil {
  309. return
  310. }
  311. defer common.Connections.Remove(connection.GetID())
  312. name := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  313. fs, p, err := connection.GetFsAndResolvedPath(name)
  314. if err != nil {
  315. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  316. return
  317. }
  318. var fi os.FileInfo
  319. if fi, err = fs.Lstat(p); err != nil {
  320. connection.Log(logger.LevelError, "failed to remove file %#v: stat error: %+v", p, err)
  321. err = connection.GetFsError(fs, err)
  322. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  323. return
  324. }
  325. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  326. connection.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  327. sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %#v, it is not a file/symlink", name), http.StatusBadRequest)
  328. return
  329. }
  330. err = connection.RemoveFile(fs, p, name, fi)
  331. if err != nil {
  332. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
  333. return
  334. }
  335. sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v deleted", name), http.StatusOK)
  336. }
  337. func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
  338. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  339. connection, err := getUserConnection(w, r)
  340. if err != nil {
  341. return
  342. }
  343. defer common.Connections.Remove(connection.GetID())
  344. var filesList []string
  345. err = render.DecodeJSON(r.Body, &filesList)
  346. if err != nil {
  347. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  348. return
  349. }
  350. baseDir := "/"
  351. for idx := range filesList {
  352. filesList[idx] = util.CleanPath(filesList[idx])
  353. }
  354. filesList = util.RemoveDuplicates(filesList, false)
  355. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"",
  356. getCompressedFileName(connection.GetUsername(), filesList)))
  357. renderCompressedFiles(w, connection, baseDir, filesList, nil)
  358. }
  359. func getUserProfile(w http.ResponseWriter, r *http.Request) {
  360. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  361. claims, err := getTokenClaims(r)
  362. if err != nil || claims.Username == "" {
  363. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  364. return
  365. }
  366. user, err := dataprovider.UserExists(claims.Username)
  367. if err != nil {
  368. sendAPIResponse(w, r, err, "", getRespStatus(err))
  369. return
  370. }
  371. resp := userProfile{
  372. baseProfile: baseProfile{
  373. Email: user.Email,
  374. Description: user.Description,
  375. AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
  376. },
  377. PublicKeys: user.PublicKeys,
  378. }
  379. render.JSON(w, r, resp)
  380. }
  381. func updateUserProfile(w http.ResponseWriter, r *http.Request) {
  382. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  383. claims, err := getTokenClaims(r)
  384. if err != nil || claims.Username == "" {
  385. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  386. return
  387. }
  388. var req userProfile
  389. err = render.DecodeJSON(r.Body, &req)
  390. if err != nil {
  391. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  392. return
  393. }
  394. user, userMerged, err := dataprovider.GetUserVariants(claims.Username)
  395. if err != nil {
  396. sendAPIResponse(w, r, err, "", getRespStatus(err))
  397. return
  398. }
  399. if !userMerged.CanManagePublicKeys() && !userMerged.CanChangeAPIKeyAuth() && !userMerged.CanChangeInfo() {
  400. sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
  401. return
  402. }
  403. if userMerged.CanManagePublicKeys() {
  404. user.PublicKeys = req.PublicKeys
  405. }
  406. if userMerged.CanChangeAPIKeyAuth() {
  407. user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
  408. }
  409. if userMerged.CanChangeInfo() {
  410. user.Email = req.Email
  411. user.Description = req.Description
  412. }
  413. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  414. sendAPIResponse(w, r, err, "", getRespStatus(err))
  415. return
  416. }
  417. sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
  418. }
  419. func changeUserPassword(w http.ResponseWriter, r *http.Request) {
  420. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  421. var pwd pwdChange
  422. err := render.DecodeJSON(r.Body, &pwd)
  423. if err != nil {
  424. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  425. return
  426. }
  427. err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  428. if err != nil {
  429. sendAPIResponse(w, r, err, "", getRespStatus(err))
  430. return
  431. }
  432. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  433. }
  434. func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  435. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  436. return util.NewValidationError("please provide the current password and the new one two times")
  437. }
  438. if newPassword != confirmNewPassword {
  439. return util.NewValidationError("the two password fields do not match")
  440. }
  441. if currentPassword == newPassword {
  442. return util.NewValidationError("the new password must be different from the current one")
  443. }
  444. claims, err := getTokenClaims(r)
  445. if err != nil || claims.Username == "" {
  446. return errors.New("invalid token claims")
  447. }
  448. _, err = dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
  449. getProtocolFromRequest(r))
  450. if err != nil {
  451. return util.NewValidationError("current password does not match")
  452. }
  453. return dataprovider.UpdateUserPassword(claims.Username, newPassword, dataprovider.ActionExecutorSelf,
  454. util.GetIPFromRemoteAddress(r.RemoteAddr))
  455. }
  456. func setModificationTimeFromHeader(r *http.Request, c *Connection, filePath string) {
  457. mTimeString := r.Header.Get(mTimeHeader)
  458. if mTimeString != "" {
  459. // we don't return an error here if we fail to set the modification time
  460. mTime, err := strconv.ParseInt(mTimeString, 10, 64)
  461. if err == nil {
  462. attrs := common.StatAttributes{
  463. Flags: common.StatAttrTimes,
  464. Atime: util.GetTimeFromMsecSinceEpoch(mTime),
  465. Mtime: util.GetTimeFromMsecSinceEpoch(mTime),
  466. }
  467. err = c.SetStat(filePath, &attrs)
  468. c.Log(logger.LevelDebug, "requested modification time %v for file %#v, error: %v",
  469. attrs.Mtime, filePath, err)
  470. } else {
  471. c.Log(logger.LevelInfo, "invalid modification time header was ignored: %v", mTimeString)
  472. }
  473. }
  474. }
  475. func renameItem(w http.ResponseWriter, r *http.Request) {
  476. connection, err := getUserConnection(w, r)
  477. if err != nil {
  478. return
  479. }
  480. defer common.Connections.Remove(connection.GetID())
  481. oldName := connection.User.GetCleanedPath(r.URL.Query().Get("path"))
  482. newName := connection.User.GetCleanedPath(r.URL.Query().Get("target"))
  483. err = connection.Rename(oldName, newName)
  484. if err != nil {
  485. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename %#v -> %#v", oldName, newName),
  486. getMappedStatusCode(err))
  487. return
  488. }
  489. sendAPIResponse(w, r, nil, fmt.Sprintf("%#v renamed to %#v", oldName, newName), http.StatusOK)
  490. }