sftpgo-mirror/dataprovider/dataprovider.go

269 lines
9.4 KiB
Go
Raw Normal View History

2019-07-30 18:51:29 +00:00
// Package dataprovider provides data access.
// It abstract different data providers and exposes a common API.
// Currently the supported data providers are: PostreSQL (9+), MySQL (4.1+) and SQLite 3.x
2019-07-20 10:26:52 +00:00
package dataprovider
import (
"database/sql"
"fmt"
"path/filepath"
"strings"
"github.com/alexedwards/argon2id"
"golang.org/x/crypto/ssh"
"github.com/drakkan/sftpgo/utils"
)
const (
// SQLiteDataProviderName name for sqlite db provider
SQLiteDataProviderName = "sqlite"
// PGSSQLDataProviderName name for postgresql db provider
PGSSQLDataProviderName = "postgresql"
// MySQLDataProviderName name for mysql db provider
MySQLDataProviderName = "mysql"
logSender = "dataProvider"
argonPwdPrefix = "$argon2id$"
2019-07-26 06:00:14 +00:00
bcryptPwdPrefix = "$2a$"
2019-07-20 10:26:52 +00:00
manageUsersDisabledError = "please set manage_users to 1 in sftpgo.conf to enable this method"
trackQuotaDisabledError = "please enable track_quota in sftpgo.conf to use this method"
2019-07-20 10:26:52 +00:00
)
var (
2019-07-30 18:51:29 +00:00
// SupportedProviders data provider configured in the sftpgo.conf file must match of these strings
2019-07-20 10:26:52 +00:00
SupportedProviders = []string{SQLiteDataProviderName, PGSSQLDataProviderName, MySQLDataProviderName}
dbHandle *sql.DB
config Config
provider Provider
sqlPlaceholders []string
validPerms = []string{PermAny, PermListItems, PermDownload, PermUpload, PermDelete, PermRename,
PermCreateDirs, PermCreateSymlinks}
)
// Config provider configuration
type Config struct {
2019-07-30 18:51:29 +00:00
// Driver name, must be one of the SupportedProviders
Driver string `json:"driver"`
// Database name
Name string `json:"name"`
// Database host
Host string `json:"host"`
// Database port
Port int `json:"port"`
// Database username
Username string `json:"username"`
// Database password
Password string `json:"password"`
// Used for drivers mysql and postgresql.
// 0 disable SSL/TLS connections.
// 1 require ssl.
// 2 set ssl mode to verify-ca for driver postgresql and skip-verify for driver mysql.
// 3 set ssl mode to verify-full for driver postgresql and preferred for driver mysql.
SSLMode int `json:"sslmode"`
// Custom database connection string.
// If not empty this connection string will be used instead of build one using the previous parameters
2019-07-20 10:26:52 +00:00
ConnectionString string `json:"connection_string"`
2019-07-30 18:51:29 +00:00
// Database table for SFTP users
UsersTable string `json:"users_table"`
// Set to 0 to disable users management, 1 to enable
ManageUsers int `json:"manage_users"`
// Set the preferred way to track users quota between the following choices:
// 0, disable quota tracking. REST API to scan user dir and update quota will do nothing
// 1, quota is updated each time a user upload or delete a file even if the user has no quota restrictions
// 2, quota is updated each time a user upload or delete a file but only for users with quota restrictions.
// With this configuration the "quota scan" REST API can still be used to periodically update space usage
// for users without quota restrictions
TrackQuota int `json:"track_quota"`
2019-07-20 10:26:52 +00:00
}
// ValidationError raised if input data is not valid
type ValidationError struct {
err string
}
2019-07-30 18:51:29 +00:00
// Validation error details
2019-07-20 10:26:52 +00:00
func (e *ValidationError) Error() string {
return fmt.Sprintf("Validation error: %s", e.err)
}
2019-07-30 18:51:29 +00:00
// MethodDisabledError raised if a method is disabled in config file.
// For example, if user management is disabled, this error is raised
// every time an user operation is done using the REST API
2019-07-20 10:26:52 +00:00
type MethodDisabledError struct {
err string
}
2019-07-30 18:51:29 +00:00
// Method disabled error details
2019-07-20 10:26:52 +00:00
func (e *MethodDisabledError) Error() string {
return fmt.Sprintf("Method disabled error: %s", e.err)
}
2019-07-30 18:51:29 +00:00
// GetProvider returns the configured provider
2019-07-20 10:26:52 +00:00
func GetProvider() Provider {
return provider
}
2019-07-30 18:51:29 +00:00
// Provider interface that data providers must implement.
2019-07-20 10:26:52 +00:00
type Provider interface {
validateUserAndPass(username string, password string) (User, error)
validateUserAndPubKey(username string, pubKey string) (User, error)
updateQuota(username string, filesAdd int, sizeAdd int64, reset bool) error
getUsedQuota(username string) (int, int64, error)
userExists(username string) (User, error)
addUser(user User) error
updateUser(user User) error
deleteUser(user User) error
getUsers(limit int, offset int, order string, username string) ([]User, error)
getUserByID(ID int64) (User, error)
}
2019-07-30 18:51:29 +00:00
// Initialize the data provider.
// An error is returned if the configured driver is invalid or if the data provider cannot be initialized
2019-07-20 10:26:52 +00:00
func Initialize(cnf Config, basePath string) error {
config = cnf
sqlPlaceholders = getSQLPlaceholders()
if config.Driver == SQLiteDataProviderName {
provider = SQLiteProvider{}
return initializeSQLiteProvider(basePath)
} else if config.Driver == PGSSQLDataProviderName {
provider = PGSQLProvider{}
return initializePGSQLProvider()
} else if config.Driver == MySQLDataProviderName {
provider = MySQLProvider{}
2019-07-20 10:26:52 +00:00
return initializeMySQLProvider()
}
return fmt.Errorf("Unsupported data provider: %v", config.Driver)
}
2019-07-30 18:51:29 +00:00
// CheckUserAndPass retrieves the SFTP user with the given username and password if a match is found or an error
2019-07-20 10:26:52 +00:00
func CheckUserAndPass(p Provider, username string, password string) (User, error) {
return p.validateUserAndPass(username, password)
}
2019-07-30 18:51:29 +00:00
// CheckUserAndPubKey retrieves the SFTP user with the given username and public key if a match is found or an error
2019-07-20 10:26:52 +00:00
func CheckUserAndPubKey(p Provider, username string, pubKey string) (User, error) {
return p.validateUserAndPubKey(username, pubKey)
}
2019-07-30 18:51:29 +00:00
// UpdateUserQuota updates the quota for the given SFTP user adding filesAdd and sizeAdd.
// If reset is true filesAdd and sizeAdd indicates the total files and the total size instead of the difference.
func UpdateUserQuota(p Provider, user User, filesAdd int, sizeAdd int64, reset bool) error {
2019-07-20 10:26:52 +00:00
if config.TrackQuota == 0 {
return &MethodDisabledError{err: trackQuotaDisabledError}
} else if config.TrackQuota == 2 && !reset && !user.HasQuotaRestrictions() {
return nil
2019-07-20 10:26:52 +00:00
}
return p.updateQuota(user.Username, filesAdd, sizeAdd, reset)
2019-07-20 10:26:52 +00:00
}
2019-07-30 18:51:29 +00:00
// GetUsedQuota returns the used quota for the given SFTP user.
// TrackQuota must be >=1 to enable this method
2019-07-20 10:26:52 +00:00
func GetUsedQuota(p Provider, username string) (int, int64, error) {
if config.TrackQuota == 0 {
return 0, 0, &MethodDisabledError{err: trackQuotaDisabledError}
}
return p.getUsedQuota(username)
}
2019-07-30 18:51:29 +00:00
// UserExists checks if the given SFTP username exists, returns an error if no match is found
2019-07-20 10:26:52 +00:00
func UserExists(p Provider, username string) (User, error) {
return p.userExists(username)
}
2019-07-30 18:51:29 +00:00
// AddUser adds a new SFTP user.
// ManageUsers configuration must be set to 1 to enable this method
2019-07-20 10:26:52 +00:00
func AddUser(p Provider, user User) error {
if config.ManageUsers == 0 {
return &MethodDisabledError{err: manageUsersDisabledError}
}
return p.addUser(user)
}
2019-07-30 18:51:29 +00:00
// UpdateUser updates an existing SFTP user.
// ManageUsers configuration must be set to 1 to enable this method
2019-07-20 10:26:52 +00:00
func UpdateUser(p Provider, user User) error {
if config.ManageUsers == 0 {
return &MethodDisabledError{err: manageUsersDisabledError}
}
return p.updateUser(user)
}
2019-07-30 18:51:29 +00:00
// DeleteUser deletes an existing SFTP user.
// ManageUsers configuration must be set to 1 to enable this method
2019-07-20 10:26:52 +00:00
func DeleteUser(p Provider, user User) error {
if config.ManageUsers == 0 {
return &MethodDisabledError{err: manageUsersDisabledError}
}
return p.deleteUser(user)
}
2019-07-30 18:51:29 +00:00
// GetUsers returns an array of users respecting limit and offset and filtered by username exact match if not empty
2019-07-20 10:26:52 +00:00
func GetUsers(p Provider, limit int, offset int, order string, username string) ([]User, error) {
return p.getUsers(limit, offset, order, username)
}
2019-07-30 18:51:29 +00:00
// GetUserByID returns the user with the given database ID if a match is found or an error
2019-07-20 10:26:52 +00:00
func GetUserByID(p Provider, ID int64) (User, error) {
return p.getUserByID(ID)
}
func validateUser(user *User) error {
if len(user.Username) == 0 || len(user.HomeDir) == 0 {
return &ValidationError{err: "Mandatory parameters missing"}
}
if len(user.Password) == 0 && len(user.PublicKey) == 0 {
return &ValidationError{err: "Please set password or public_key"}
}
if len(user.Permissions) == 0 {
return &ValidationError{err: "Please grant some permissions to this user"}
}
if !filepath.IsAbs(user.HomeDir) {
return &ValidationError{err: fmt.Sprintf("home_dir must be an absolute path, actual value: %v", user.HomeDir)}
}
for _, p := range user.Permissions {
if !utils.IsStringInSlice(p, validPerms) {
return &ValidationError{err: fmt.Sprintf("Invalid permission: %v", p)}
}
}
if len(user.Password) > 0 && !strings.HasPrefix(user.Password, argonPwdPrefix) {
2019-07-20 10:26:52 +00:00
pwd, err := argon2id.CreateHash(user.Password, argon2id.DefaultParams)
if err != nil {
return err
}
user.Password = pwd
}
for i, k := range user.PublicKey {
_, _, _, _, err := ssh.ParseAuthorizedKey([]byte(k))
if err != nil {
return &ValidationError{err: fmt.Sprintf("Could not parse key nr. %d: %s", i, err)}
2019-07-20 10:26:52 +00:00
}
}
return nil
}
func getSSLMode() string {
if config.Driver == PGSSQLDataProviderName {
if config.SSLMode == 0 {
return "disable"
} else if config.SSLMode == 1 {
return "require"
} else if config.SSLMode == 2 {
return "verify-ca"
} else if config.SSLMode == 3 {
return "verify-full"
}
} else if config.Driver == MySQLDataProviderName {
if config.SSLMode == 0 {
return "false"
} else if config.SSLMode == 1 {
return "true"
} else if config.SSLMode == 2 {
return "skip-verify"
} else if config.SSLMode == 3 {
return "preferred"
}
}
return ""
}