handler.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
  1. package ftpd
  2. import (
  3. "errors"
  4. "os"
  5. "path"
  6. "time"
  7. ftpserver "github.com/fclairamb/ftpserverlib"
  8. "github.com/spf13/afero"
  9. "github.com/drakkan/sftpgo/common"
  10. "github.com/drakkan/sftpgo/dataprovider"
  11. "github.com/drakkan/sftpgo/logger"
  12. "github.com/drakkan/sftpgo/vfs"
  13. )
  14. var (
  15. errNotImplemented = errors.New("Not implemented")
  16. )
  17. // Connection details for an FTP connection.
  18. // It implements common.ActiveConnection and ftpserver.ClientDriver interfaces
  19. type Connection struct {
  20. *common.BaseConnection
  21. clientContext ftpserver.ClientContext
  22. }
  23. // GetClientVersion returns the connected client's version.
  24. // It returns "Unknown" if the client does not advertise its
  25. // version
  26. func (c *Connection) GetClientVersion() string {
  27. version := c.clientContext.GetClientVersion()
  28. if len(version) > 0 {
  29. return version
  30. }
  31. return "Unknown"
  32. }
  33. // GetRemoteAddress return the connected client's address
  34. func (c *Connection) GetRemoteAddress() string {
  35. return c.clientContext.RemoteAddr().String()
  36. }
  37. // Disconnect disconnects the client
  38. func (c *Connection) Disconnect() error {
  39. return c.clientContext.Close(ftpserver.StatusServiceNotAvailable, "connection closed")
  40. }
  41. // GetCommand returns an empty string
  42. func (c *Connection) GetCommand() string {
  43. return ""
  44. }
  45. // Create is not implemented we use ClientDriverExtentionFileTransfer
  46. func (c *Connection) Create(name string) (afero.File, error) {
  47. return nil, errNotImplemented
  48. }
  49. // Mkdir creates a directory using the connection filesystem
  50. func (c *Connection) Mkdir(name string, perm os.FileMode) error {
  51. c.UpdateLastActivity()
  52. p, err := c.Fs.ResolvePath(name)
  53. if err != nil {
  54. return c.GetFsError(err)
  55. }
  56. return c.CreateDir(p, name)
  57. }
  58. // MkdirAll is not implemented, we don't need it
  59. func (c *Connection) MkdirAll(path string, perm os.FileMode) error {
  60. return errNotImplemented
  61. }
  62. // Open is not implemented we use ClientDriverExtentionFileTransfer and ClientDriverExtensionFileList
  63. func (c *Connection) Open(name string) (afero.File, error) {
  64. return nil, errNotImplemented
  65. }
  66. // OpenFile is not implemented we use ClientDriverExtentionFileTransfer
  67. func (c *Connection) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {
  68. return nil, errNotImplemented
  69. }
  70. // Remove removes a file.
  71. // We implements ClientDriverExtensionRemoveDir for directories
  72. func (c *Connection) Remove(name string) error {
  73. c.UpdateLastActivity()
  74. p, err := c.Fs.ResolvePath(name)
  75. if err != nil {
  76. return c.GetFsError(err)
  77. }
  78. var fi os.FileInfo
  79. if fi, err = c.Fs.Lstat(p); err != nil {
  80. c.Log(logger.LevelWarn, "failed to remove a file %#v: stat error: %+v", p, err)
  81. return c.GetFsError(err)
  82. }
  83. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  84. c.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  85. return c.GetGenericError(nil)
  86. }
  87. return c.RemoveFile(p, name, fi)
  88. }
  89. // RemoveAll is not implemented, we don't need it
  90. func (c *Connection) RemoveAll(path string) error {
  91. return errNotImplemented
  92. }
  93. // Rename renames a file or a directory
  94. func (c *Connection) Rename(oldname, newname string) error {
  95. c.UpdateLastActivity()
  96. p, err := c.Fs.ResolvePath(oldname)
  97. if err != nil {
  98. return c.GetFsError(err)
  99. }
  100. t, err := c.Fs.ResolvePath(newname)
  101. if err != nil {
  102. return c.GetFsError(err)
  103. }
  104. if err = c.BaseConnection.Rename(p, t, oldname, newname); err != nil {
  105. return err
  106. }
  107. vfs.SetPathPermissions(c.Fs, t, c.User.GetUID(), c.User.GetGID())
  108. return nil
  109. }
  110. // Stat returns a FileInfo describing the named file/directory, or an error,
  111. // if any happens
  112. func (c *Connection) Stat(name string) (os.FileInfo, error) {
  113. c.UpdateLastActivity()
  114. if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) {
  115. return nil, c.GetPermissionDeniedError()
  116. }
  117. p, err := c.Fs.ResolvePath(name)
  118. if err != nil {
  119. return nil, c.GetFsError(err)
  120. }
  121. fi, err := c.DoStat(p, 0)
  122. if err != nil {
  123. c.Log(logger.LevelDebug, "error running stat on path %#v: %+v", p, err)
  124. return nil, c.GetFsError(err)
  125. }
  126. return fi, nil
  127. }
  128. // Name returns the name of this connection
  129. func (c *Connection) Name() string {
  130. return c.GetID()
  131. }
  132. // Chmod changes the mode of the named file/directory
  133. func (c *Connection) Chmod(name string, mode os.FileMode) error {
  134. c.UpdateLastActivity()
  135. p, err := c.Fs.ResolvePath(name)
  136. if err != nil {
  137. return c.GetFsError(err)
  138. }
  139. attrs := common.StatAttributes{
  140. Flags: common.StatAttrPerms,
  141. Mode: mode,
  142. }
  143. return c.SetStat(p, name, &attrs)
  144. }
  145. // Chtimes changes the access and modification times of the named file
  146. func (c *Connection) Chtimes(name string, atime time.Time, mtime time.Time) error {
  147. c.UpdateLastActivity()
  148. p, err := c.Fs.ResolvePath(name)
  149. if err != nil {
  150. return c.GetFsError(err)
  151. }
  152. attrs := common.StatAttributes{
  153. Flags: common.StatAttrTimes,
  154. Atime: atime,
  155. Mtime: mtime,
  156. }
  157. return c.SetStat(p, name, &attrs)
  158. }
  159. // AllocateSpace implements ClientDriverExtensionAllocate
  160. func (c *Connection) AllocateSpace(size int) error {
  161. c.UpdateLastActivity()
  162. // check the max allowed file size first
  163. if c.User.Filters.MaxUploadFileSize > 0 && int64(size) > c.User.Filters.MaxUploadFileSize {
  164. return common.ErrQuotaExceeded
  165. }
  166. // we don't have a path here so we check home dir and any virtual folders
  167. // we return no error if there is space in any folder
  168. folders := []string{"/"}
  169. for _, v := range c.User.VirtualFolders {
  170. // the space is checked for the parent folder
  171. folders = append(folders, path.Join(v.VirtualPath, "fakefile.txt"))
  172. }
  173. for _, f := range folders {
  174. quotaResult := c.HasSpace(false, f)
  175. if quotaResult.HasSpace {
  176. if quotaResult.QuotaSize == 0 {
  177. // unlimited size is allowed
  178. return nil
  179. }
  180. if quotaResult.GetRemainingSize() > int64(size) {
  181. return nil
  182. }
  183. }
  184. }
  185. return common.ErrQuotaExceeded
  186. }
  187. // RemoveDir implements ClientDriverExtensionRemoveDir
  188. func (c *Connection) RemoveDir(name string) error {
  189. c.UpdateLastActivity()
  190. p, err := c.Fs.ResolvePath(name)
  191. if err != nil {
  192. return c.GetFsError(err)
  193. }
  194. return c.BaseConnection.RemoveDir(p, name)
  195. }
  196. // Symlink implements ClientDriverExtensionSymlink
  197. func (c *Connection) Symlink(oldname, newname string) error {
  198. c.UpdateLastActivity()
  199. p, err := c.Fs.ResolvePath(oldname)
  200. if err != nil {
  201. return c.GetFsError(err)
  202. }
  203. t, err := c.Fs.ResolvePath(newname)
  204. if err != nil {
  205. return c.GetFsError(err)
  206. }
  207. return c.BaseConnection.CreateSymlink(p, t, oldname, newname)
  208. }
  209. // ReadDir implements ClientDriverExtensionFilelist
  210. func (c *Connection) ReadDir(name string) ([]os.FileInfo, error) {
  211. c.UpdateLastActivity()
  212. p, err := c.Fs.ResolvePath(name)
  213. if err != nil {
  214. return nil, c.GetFsError(err)
  215. }
  216. return c.ListDir(p, name)
  217. }
  218. // GetHandle implements ClientDriverExtentionFileTransfer
  219. func (c *Connection) GetHandle(name string, flags int, offset int64) (ftpserver.FileTransfer, error) {
  220. c.UpdateLastActivity()
  221. p, err := c.Fs.ResolvePath(name)
  222. if err != nil {
  223. return nil, c.GetFsError(err)
  224. }
  225. if flags&os.O_WRONLY != 0 {
  226. return c.uploadFile(p, name, flags)
  227. }
  228. return c.downloadFile(p, name, offset)
  229. }
  230. func (c *Connection) downloadFile(fsPath, ftpPath string, offset int64) (ftpserver.FileTransfer, error) {
  231. if !c.User.HasPerm(dataprovider.PermDownload, path.Dir(ftpPath)) {
  232. return nil, c.GetPermissionDeniedError()
  233. }
  234. if !c.User.IsFileAllowed(ftpPath) {
  235. c.Log(logger.LevelWarn, "reading file %#v is not allowed", ftpPath)
  236. return nil, c.GetPermissionDeniedError()
  237. }
  238. file, r, cancelFn, err := c.Fs.Open(fsPath, offset)
  239. if err != nil {
  240. c.Log(logger.LevelWarn, "could not open file %#v for reading: %+v", fsPath, err)
  241. return nil, c.GetFsError(err)
  242. }
  243. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, ftpPath, common.TransferDownload,
  244. 0, 0, 0, false, c.Fs)
  245. t := newTransfer(baseTransfer, nil, r, offset)
  246. return t, nil
  247. }
  248. func (c *Connection) uploadFile(fsPath, ftpPath string, flags int) (ftpserver.FileTransfer, error) {
  249. if !c.User.IsFileAllowed(ftpPath) {
  250. c.Log(logger.LevelWarn, "writing file %#v is not allowed", ftpPath)
  251. return nil, c.GetPermissionDeniedError()
  252. }
  253. filePath := fsPath
  254. if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() {
  255. filePath = c.Fs.GetAtomicUploadPath(fsPath)
  256. }
  257. stat, statErr := c.Fs.Lstat(fsPath)
  258. if (statErr == nil && stat.Mode()&os.ModeSymlink != 0) || c.Fs.IsNotExist(statErr) {
  259. if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(ftpPath)) {
  260. return nil, c.GetPermissionDeniedError()
  261. }
  262. return c.handleFTPUploadToNewFile(fsPath, filePath, ftpPath)
  263. }
  264. if statErr != nil {
  265. c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr)
  266. return nil, c.GetFsError(statErr)
  267. }
  268. // This happen if we upload a file that has the same name of an existing directory
  269. if stat.IsDir() {
  270. c.Log(logger.LevelWarn, "attempted to open a directory for writing to: %#v", fsPath)
  271. return nil, c.GetOpUnsupportedError()
  272. }
  273. if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(ftpPath)) {
  274. return nil, c.GetPermissionDeniedError()
  275. }
  276. return c.handleFTPUploadToExistingFile(flags, fsPath, filePath, stat.Size(), ftpPath)
  277. }
  278. func (c *Connection) handleFTPUploadToNewFile(resolvedPath, filePath, requestPath string) (ftpserver.FileTransfer, error) {
  279. quotaResult := c.HasSpace(true, requestPath)
  280. if !quotaResult.HasSpace {
  281. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  282. return nil, common.ErrQuotaExceeded
  283. }
  284. file, w, cancelFn, err := c.Fs.Create(filePath, 0)
  285. if err != nil {
  286. c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err)
  287. return nil, c.GetFsError(err)
  288. }
  289. vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID())
  290. // we can get an error only for resume
  291. maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, 0)
  292. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  293. common.TransferUpload, 0, 0, maxWriteSize, true, c.Fs)
  294. t := newTransfer(baseTransfer, w, nil, 0)
  295. return t, nil
  296. }
  297. func (c *Connection) handleFTPUploadToExistingFile(flags int, resolvedPath, filePath string, fileSize int64,
  298. requestPath string) (ftpserver.FileTransfer, error) {
  299. var err error
  300. quotaResult := c.HasSpace(false, requestPath)
  301. if !quotaResult.HasSpace {
  302. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  303. return nil, common.ErrQuotaExceeded
  304. }
  305. minWriteOffset := int64(0)
  306. isResume := flags&os.O_APPEND != 0 && flags&os.O_TRUNC == 0
  307. // if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace
  308. // will return false in this case and we deny the upload before
  309. maxWriteSize, err := c.GetMaxWriteSize(quotaResult, isResume, fileSize)
  310. if err != nil {
  311. c.Log(logger.LevelDebug, "unable to get max write size: %v", err)
  312. return nil, err
  313. }
  314. if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() {
  315. err = c.Fs.Rename(resolvedPath, filePath)
  316. if err != nil {
  317. c.Log(logger.LevelWarn, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v",
  318. resolvedPath, filePath, err)
  319. return nil, c.GetFsError(err)
  320. }
  321. }
  322. file, w, cancelFn, err := c.Fs.Create(filePath, flags)
  323. if err != nil {
  324. c.Log(logger.LevelWarn, "error opening existing file, flags: %v, source: %#v, err: %+v", flags, filePath, err)
  325. return nil, c.GetFsError(err)
  326. }
  327. initialSize := int64(0)
  328. if isResume {
  329. c.Log(logger.LevelDebug, "upload resume requested, file path: %#v initial size: %v", filePath, fileSize)
  330. minWriteOffset = fileSize
  331. initialSize = fileSize
  332. } else {
  333. if vfs.IsLocalOsFs(c.Fs) {
  334. vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath))
  335. if err == nil {
  336. dataprovider.UpdateVirtualFolderQuota(vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck
  337. if vfolder.IsIncludedInUserQuota() {
  338. dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck
  339. }
  340. } else {
  341. dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck
  342. }
  343. } else {
  344. initialSize = fileSize
  345. }
  346. }
  347. vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID())
  348. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  349. common.TransferUpload, minWriteOffset, initialSize, maxWriteSize, false, c.Fs)
  350. t := newTransfer(baseTransfer, w, nil, 0)
  351. return t, nil
  352. }