sftpgo-mirror/internal/dataprovider/eventrule.go

1215 lines
37 KiB
Go
Raw Normal View History

// Copyright (C) 2019-2022 Nicola Murino
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published
// by the Free Software Foundation, version 3.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
package dataprovider
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"net/http"
"path"
"path/filepath"
"strings"
"time"
"github.com/robfig/cron/v3"
"github.com/drakkan/sftpgo/v2/internal/kms"
"github.com/drakkan/sftpgo/v2/internal/logger"
"github.com/drakkan/sftpgo/v2/internal/util"
)
// Supported event actions
const (
ActionTypeHTTP = iota + 1
ActionTypeCommand
ActionTypeEmail
ActionTypeBackup
ActionTypeUserQuotaReset
ActionTypeFolderQuotaReset
ActionTypeTransferQuotaReset
ActionTypeDataRetentionCheck
ActionTypeFilesystem
)
var (
supportedEventActions = []int{ActionTypeHTTP, ActionTypeCommand, ActionTypeEmail, ActionTypeBackup,
ActionTypeUserQuotaReset, ActionTypeFolderQuotaReset, ActionTypeTransferQuotaReset,
ActionTypeDataRetentionCheck, ActionTypeFilesystem}
)
func isActionTypeValid(action int) bool {
return util.Contains(supportedEventActions, action)
}
func getActionTypeAsString(action int) string {
switch action {
case ActionTypeHTTP:
return "HTTP"
case ActionTypeEmail:
return "Email"
case ActionTypeBackup:
return "Backup"
case ActionTypeUserQuotaReset:
return "User quota reset"
case ActionTypeFolderQuotaReset:
return "Folder quota reset"
case ActionTypeTransferQuotaReset:
return "Transfer quota reset"
case ActionTypeDataRetentionCheck:
return "Data retention check"
case ActionTypeFilesystem:
return "Filesystem"
default:
return "Command"
}
}
// Supported event triggers
const (
// Filesystem events such as upload, download, mkdir ...
EventTriggerFsEvent = iota + 1
// Provider events such as add, update, delete
EventTriggerProviderEvent
EventTriggerSchedule
EventTriggerIPBlocked
EventTriggerCertificate
)
var (
supportedEventTriggers = []int{EventTriggerFsEvent, EventTriggerProviderEvent, EventTriggerSchedule,
EventTriggerIPBlocked, EventTriggerCertificate}
)
func isEventTriggerValid(trigger int) bool {
return util.Contains(supportedEventTriggers, trigger)
}
func getTriggerTypeAsString(trigger int) string {
switch trigger {
case EventTriggerFsEvent:
return "Filesystem event"
case EventTriggerProviderEvent:
return "Provider event"
case EventTriggerIPBlocked:
return "IP blocked"
case EventTriggerCertificate:
return "Certificate renewal"
default:
return "Schedule"
}
}
// Supported filesystem actions
const (
FilesystemActionRename = iota + 1
FilesystemActionDelete
FilesystemActionMkdirs
FilesystemActionExist
)
var (
supportedFsActions = []int{FilesystemActionRename, FilesystemActionDelete, FilesystemActionMkdirs,
FilesystemActionExist}
)
func isFilesystemActionValid(value int) bool {
return util.Contains(supportedFsActions, value)
}
func getFsActionTypeAsString(value int) string {
switch value {
case FilesystemActionRename:
return "Rename"
case FilesystemActionDelete:
return "Delete"
case FilesystemActionExist:
return "Paths exist"
default:
return "Create directories"
}
}
// TODO: replace the copied strings with shared constants
var (
// SupportedFsEvents defines the supported filesystem events
SupportedFsEvents = []string{"upload", "first-upload", "download", "first-download", "delete", "rename",
"mkdir", "rmdir", "ssh_cmd"}
// SupportedProviderEvents defines the supported provider events
SupportedProviderEvents = []string{operationAdd, operationUpdate, operationDelete}
// SupportedRuleConditionProtocols defines the supported protcols for rule conditions
SupportedRuleConditionProtocols = []string{"SFTP", "SCP", "SSH", "FTP", "DAV", "HTTP", "HTTPShare",
"OIDC"}
// SupporteRuleConditionProviderObjects defines the supported provider objects for rule conditions
SupporteRuleConditionProviderObjects = []string{actionObjectUser, actionObjectFolder, actionObjectGroup,
actionObjectAdmin, actionObjectAPIKey, actionObjectShare, actionObjectEventRule, actionObjectEventAction}
// SupportedHTTPActionMethods defines the supported methods for HTTP actions
SupportedHTTPActionMethods = []string{http.MethodPost, http.MethodGet, http.MethodPut}
)
// enum mappings
var (
EventActionTypes []EnumMapping
EventTriggerTypes []EnumMapping
FsActionTypes []EnumMapping
)
func init() {
for _, t := range supportedEventActions {
EventActionTypes = append(EventActionTypes, EnumMapping{
Value: t,
Name: getActionTypeAsString(t),
})
}
for _, t := range supportedEventTriggers {
EventTriggerTypes = append(EventTriggerTypes, EnumMapping{
Value: t,
Name: getTriggerTypeAsString(t),
})
}
for _, t := range supportedFsActions {
FsActionTypes = append(FsActionTypes, EnumMapping{
Value: t,
Name: getFsActionTypeAsString(t),
})
}
}
// EnumMapping defines a mapping between enum values and names
type EnumMapping struct {
Name string
Value int
}
// KeyValue defines a key/value pair
type KeyValue struct {
Key string `json:"key"`
Value string `json:"value"`
}
// EventActionHTTPConfig defines the configuration for an HTTP event target
type EventActionHTTPConfig struct {
Endpoint string `json:"endpoint,omitempty"`
Username string `json:"username,omitempty"`
Password *kms.Secret `json:"password,omitempty"`
Headers []KeyValue `json:"headers,omitempty"`
Timeout int `json:"timeout,omitempty"`
SkipTLSVerify bool `json:"skip_tls_verify,omitempty"`
Method string `json:"method,omitempty"`
QueryParameters []KeyValue `json:"query_parameters,omitempty"`
Body string `json:"post_body,omitempty"`
}
func (c *EventActionHTTPConfig) validate(additionalData string) error {
if c.Endpoint == "" {
return util.NewValidationError("HTTP endpoint is required")
}
if !util.IsStringPrefixInSlice(c.Endpoint, []string{"http://", "https://"}) {
return util.NewValidationError("invalid HTTP endpoint schema: http and https are supported")
}
if c.Timeout < 1 || c.Timeout > 120 {
return util.NewValidationError(fmt.Sprintf("invalid HTTP timeout %d", c.Timeout))
}
for _, kv := range c.Headers {
if kv.Key == "" || kv.Value == "" {
return util.NewValidationError("invalid HTTP headers")
}
}
if c.Password.IsRedacted() {
return util.NewValidationError("cannot save HTTP configuration with a redacted secret")
}
if c.Password.IsPlain() {
c.Password.SetAdditionalData(additionalData)
err := c.Password.Encrypt()
if err != nil {
return util.NewValidationError(fmt.Sprintf("could not encrypt HTTP password: %v", err))
}
}
if !util.Contains(SupportedHTTPActionMethods, c.Method) {
return util.NewValidationError(fmt.Sprintf("unsupported HTTP method: %s", c.Method))
}
for _, kv := range c.QueryParameters {
if kv.Key == "" || kv.Value == "" {
return util.NewValidationError("invalid HTTP query parameters")
}
}
return nil
}
// GetHTTPClient returns an HTTP client based on the config
func (c *EventActionHTTPConfig) GetHTTPClient() *http.Client {
client := &http.Client{
Timeout: time.Duration(c.Timeout) * time.Second,
}
if c.SkipTLSVerify {
transport := http.DefaultTransport.(*http.Transport).Clone()
if transport.TLSClientConfig != nil {
transport.TLSClientConfig.InsecureSkipVerify = true
} else {
transport.TLSClientConfig = &tls.Config{
NextProtos: []string{"http/1.1", "h2"},
InsecureSkipVerify: true,
}
}
client.Transport = transport
}
return client
}
// EventActionCommandConfig defines the configuration for a command event target
type EventActionCommandConfig struct {
Cmd string `json:"cmd,omitempty"`
Timeout int `json:"timeout,omitempty"`
EnvVars []KeyValue `json:"env_vars,omitempty"`
}
func (c *EventActionCommandConfig) validate() error {
if c.Cmd == "" {
return util.NewValidationError("command is required")
}
if !filepath.IsAbs(c.Cmd) {
return util.NewValidationError("invalid command, it must be an absolute path")
}
if c.Timeout < 1 || c.Timeout > 120 {
return util.NewValidationError(fmt.Sprintf("invalid command action timeout %d", c.Timeout))
}
for _, kv := range c.EnvVars {
if kv.Key == "" || kv.Value == "" {
return util.NewValidationError("invalid command env vars")
}
}
return nil
}
// EventActionEmailConfig defines the configuration options for SMTP event actions
type EventActionEmailConfig struct {
Recipients []string `json:"recipients,omitempty"`
Subject string `json:"subject,omitempty"`
Body string `json:"body,omitempty"`
Attachments []string `json:"attachments,omitempty"`
}
// GetRecipientsAsString returns the list of recipients as comma separated string
func (c EventActionEmailConfig) GetRecipientsAsString() string {
return strings.Join(c.Recipients, ",")
}
// GetAttachmentsAsString returns the list of attachments as comma separated string
func (c EventActionEmailConfig) GetAttachmentsAsString() string {
return strings.Join(c.Attachments, ",")
}
func (c *EventActionEmailConfig) validate() error {
if len(c.Recipients) == 0 {
return util.NewValidationError("at least one email recipient is required")
}
c.Recipients = util.RemoveDuplicates(c.Recipients, false)
for _, r := range c.Recipients {
if r == "" {
return util.NewValidationError("invalid email recipients")
}
}
if c.Subject == "" {
return util.NewValidationError("email subject is required")
}
if c.Body == "" {
return util.NewValidationError("email body is required")
}
for idx, val := range c.Attachments {
val = strings.TrimSpace(val)
if val == "" {
return util.NewValidationError("invalid path to attach")
}
c.Attachments[idx] = util.CleanPath(val)
}
c.Attachments = util.RemoveDuplicates(c.Attachments, false)
return nil
}
// FolderRetention defines a folder retention configuration
type FolderRetention struct {
// Path is the exposed virtual directory path, if no other specific retention is defined,
// the retention applies for sub directories too. For example if retention is defined
// for the paths "/" and "/sub" then the retention for "/" is applied for any file outside
// the "/sub" directory
Path string `json:"path"`
// Retention time in hours. 0 means exclude this path
Retention int `json:"retention"`
// DeleteEmptyDirs defines if empty directories will be deleted.
// The user need the delete permission
DeleteEmptyDirs bool `json:"delete_empty_dirs,omitempty"`
// IgnoreUserPermissions defines whether to delete files even if the user does not have the delete permission.
// The default is "false" which means that files will be skipped if the user does not have the permission
// to delete them. This applies to sub directories too.
IgnoreUserPermissions bool `json:"ignore_user_permissions,omitempty"`
}
// Validate returns an error if the configuration is not valid
func (f *FolderRetention) Validate() error {
f.Path = util.CleanPath(f.Path)
if f.Retention < 0 {
return util.NewValidationError(fmt.Sprintf("invalid folder retention %v, it must be greater or equal to zero",
f.Retention))
}
return nil
}
// EventActionDataRetentionConfig defines the configuration for a data retention check
type EventActionDataRetentionConfig struct {
Folders []FolderRetention `json:"folders,omitempty"`
}
func (c *EventActionDataRetentionConfig) validate() error {
folderPaths := make(map[string]bool)
nothingToDo := true
for idx := range c.Folders {
f := &c.Folders[idx]
if err := f.Validate(); err != nil {
return err
}
if f.Retention > 0 {
nothingToDo = false
}
if _, ok := folderPaths[f.Path]; ok {
return util.NewValidationError(fmt.Sprintf("duplicated folder path %#v", f.Path))
}
folderPaths[f.Path] = true
}
if nothingToDo {
return util.NewValidationError("nothing to delete!")
}
return nil
}
// EventActionFilesystemConfig defines the configuration for filesystem actions
type EventActionFilesystemConfig struct {
// Filesystem actions, see the above enum
Type int `json:"type,omitempty"`
// files/dirs to rename, key is the source and target the value
Renames []KeyValue `json:"renames,omitempty"`
// directories to create
MkDirs []string `json:"mkdirs,omitempty"`
// files/dirs to delete
Deletes []string `json:"deletes,omitempty"`
// file/dirs to check for existence
Exist []string `json:"exist,omitempty"`
}
// GetDeletesAsString returns the list of items to delete as comma separated string.
// Using a pointer receiver will not work in web templates
func (c EventActionFilesystemConfig) GetDeletesAsString() string {
return strings.Join(c.Deletes, ",")
}
// GetMkDirsAsString returns the list of directories to create as comma separated string.
// Using a pointer receiver will not work in web templates
func (c EventActionFilesystemConfig) GetMkDirsAsString() string {
return strings.Join(c.MkDirs, ",")
}
// GetExistAsString returns the list of items to check for existence as comma separated string.
// Using a pointer receiver will not work in web templates
func (c EventActionFilesystemConfig) GetExistAsString() string {
return strings.Join(c.Exist, ",")
}
func (c *EventActionFilesystemConfig) validateRenames() error {
if len(c.Renames) == 0 {
return util.NewValidationError("no path to rename specified")
}
for idx, kv := range c.Renames {
key := strings.TrimSpace(kv.Key)
value := strings.TrimSpace(kv.Value)
if key == "" || value == "" {
return util.NewValidationError("invalid paths to rename")
}
key = util.CleanPath(key)
value = util.CleanPath(value)
if key == value {
return util.NewValidationError("rename source and target cannot be equal")
}
if key == "/" || value == "/" {
return util.NewValidationError("renaming the root directory is not allowed")
}
c.Renames[idx] = KeyValue{
Key: key,
Value: value,
}
}
return nil
}
func (c *EventActionFilesystemConfig) validateDeletes() error {
if len(c.Deletes) == 0 {
return util.NewValidationError("no path to delete specified")
}
for idx, val := range c.Deletes {
val = strings.TrimSpace(val)
if val == "" {
return util.NewValidationError("invalid path to delete")
}
c.Deletes[idx] = util.CleanPath(val)
}
c.Deletes = util.RemoveDuplicates(c.Deletes, false)
return nil
}
func (c *EventActionFilesystemConfig) validateMkdirs() error {
if len(c.MkDirs) == 0 {
return util.NewValidationError("no directory to create specified")
}
for idx, val := range c.MkDirs {
val = strings.TrimSpace(val)
if val == "" {
return util.NewValidationError("invalid directory to create")
}
c.MkDirs[idx] = util.CleanPath(val)
}
c.MkDirs = util.RemoveDuplicates(c.MkDirs, false)
return nil
}
func (c *EventActionFilesystemConfig) validateExist() error {
if len(c.Exist) == 0 {
return util.NewValidationError("no path to check for existence specified")
}
for idx, val := range c.Exist {
val = strings.TrimSpace(val)
if val == "" {
return util.NewValidationError("invalid path to check for existence")
}
c.Exist[idx] = util.CleanPath(val)
}
c.Exist = util.RemoveDuplicates(c.Exist, false)
return nil
}
func (c *EventActionFilesystemConfig) validate() error {
if !isFilesystemActionValid(c.Type) {
return util.NewValidationError(fmt.Sprintf("invalid filesystem action type: %d", c.Type))
}
switch c.Type {
case FilesystemActionRename:
c.MkDirs = nil
c.Deletes = nil
c.Exist = nil
if err := c.validateRenames(); err != nil {
return err
}
case FilesystemActionDelete:
c.Renames = nil
c.MkDirs = nil
c.Exist = nil
if err := c.validateDeletes(); err != nil {
return err
}
case FilesystemActionMkdirs:
c.Renames = nil
c.Deletes = nil
c.Exist = nil
if err := c.validateMkdirs(); err != nil {
return err
}
case FilesystemActionExist:
c.Renames = nil
c.Deletes = nil
c.MkDirs = nil
if err := c.validateExist(); err != nil {
return err
}
}
return nil
}
func (c *EventActionFilesystemConfig) getACopy() EventActionFilesystemConfig {
mkdirs := make([]string, len(c.MkDirs))
copy(mkdirs, c.MkDirs)
deletes := make([]string, len(c.Deletes))
copy(deletes, c.Deletes)
exist := make([]string, len(c.Exist))
copy(exist, c.Exist)
return EventActionFilesystemConfig{
Type: c.Type,
Renames: cloneKeyValues(c.Renames),
MkDirs: mkdirs,
Deletes: deletes,
Exist: exist,
}
}
// BaseEventActionOptions defines the supported configuration options for a base event actions
type BaseEventActionOptions struct {
HTTPConfig EventActionHTTPConfig `json:"http_config"`
CmdConfig EventActionCommandConfig `json:"cmd_config"`
EmailConfig EventActionEmailConfig `json:"email_config"`
RetentionConfig EventActionDataRetentionConfig `json:"retention_config"`
FsConfig EventActionFilesystemConfig `json:"fs_config"`
}
func (o *BaseEventActionOptions) getACopy() BaseEventActionOptions {
o.SetEmptySecretsIfNil()
emailRecipients := make([]string, len(o.EmailConfig.Recipients))
copy(emailRecipients, o.EmailConfig.Recipients)
emailAttachments := make([]string, len(o.EmailConfig.Attachments))
copy(emailAttachments, o.EmailConfig.Attachments)
folders := make([]FolderRetention, 0, len(o.RetentionConfig.Folders))
for _, folder := range o.RetentionConfig.Folders {
folders = append(folders, FolderRetention{
Path: folder.Path,
Retention: folder.Retention,
DeleteEmptyDirs: folder.DeleteEmptyDirs,
IgnoreUserPermissions: folder.IgnoreUserPermissions,
})
}
return BaseEventActionOptions{
HTTPConfig: EventActionHTTPConfig{
Endpoint: o.HTTPConfig.Endpoint,
Username: o.HTTPConfig.Username,
Password: o.HTTPConfig.Password.Clone(),
Headers: cloneKeyValues(o.HTTPConfig.Headers),
Timeout: o.HTTPConfig.Timeout,
SkipTLSVerify: o.HTTPConfig.SkipTLSVerify,
Method: o.HTTPConfig.Method,
QueryParameters: cloneKeyValues(o.HTTPConfig.QueryParameters),
Body: o.HTTPConfig.Body,
},
CmdConfig: EventActionCommandConfig{
Cmd: o.CmdConfig.Cmd,
Timeout: o.CmdConfig.Timeout,
EnvVars: cloneKeyValues(o.CmdConfig.EnvVars),
},
EmailConfig: EventActionEmailConfig{
Recipients: emailRecipients,
Subject: o.EmailConfig.Subject,
Body: o.EmailConfig.Body,
Attachments: emailAttachments,
},
RetentionConfig: EventActionDataRetentionConfig{
Folders: folders,
},
FsConfig: o.FsConfig.getACopy(),
}
}
// SetEmptySecretsIfNil sets the secrets to empty if nil
func (o *BaseEventActionOptions) SetEmptySecretsIfNil() {
if o.HTTPConfig.Password == nil {
o.HTTPConfig.Password = kms.NewEmptySecret()
}
}
func (o *BaseEventActionOptions) setNilSecretsIfEmpty() {
if o.HTTPConfig.Password != nil && o.HTTPConfig.Password.IsEmpty() {
o.HTTPConfig.Password = nil
}
}
func (o *BaseEventActionOptions) hideConfidentialData() {
if o.HTTPConfig.Password != nil {
o.HTTPConfig.Password.Hide()
}
}
func (o *BaseEventActionOptions) validate(action int, name string) error {
o.SetEmptySecretsIfNil()
switch action {
case ActionTypeHTTP:
o.CmdConfig = EventActionCommandConfig{}
o.EmailConfig = EventActionEmailConfig{}
o.RetentionConfig = EventActionDataRetentionConfig{}
o.FsConfig = EventActionFilesystemConfig{}
return o.HTTPConfig.validate(name)
case ActionTypeCommand:
o.HTTPConfig = EventActionHTTPConfig{}
o.EmailConfig = EventActionEmailConfig{}
o.RetentionConfig = EventActionDataRetentionConfig{}
o.FsConfig = EventActionFilesystemConfig{}
return o.CmdConfig.validate()
case ActionTypeEmail:
o.HTTPConfig = EventActionHTTPConfig{}
o.CmdConfig = EventActionCommandConfig{}
o.RetentionConfig = EventActionDataRetentionConfig{}
o.FsConfig = EventActionFilesystemConfig{}
return o.EmailConfig.validate()
case ActionTypeDataRetentionCheck:
o.HTTPConfig = EventActionHTTPConfig{}
o.CmdConfig = EventActionCommandConfig{}
o.EmailConfig = EventActionEmailConfig{}
o.FsConfig = EventActionFilesystemConfig{}
return o.RetentionConfig.validate()
case ActionTypeFilesystem:
o.HTTPConfig = EventActionHTTPConfig{}
o.CmdConfig = EventActionCommandConfig{}
o.EmailConfig = EventActionEmailConfig{}
o.RetentionConfig = EventActionDataRetentionConfig{}
return o.FsConfig.validate()
default:
o.HTTPConfig = EventActionHTTPConfig{}
o.CmdConfig = EventActionCommandConfig{}
o.EmailConfig = EventActionEmailConfig{}
o.RetentionConfig = EventActionDataRetentionConfig{}
o.FsConfig = EventActionFilesystemConfig{}
}
return nil
}
// BaseEventAction defines the common fields for an event action
type BaseEventAction struct {
// Data provider unique identifier
ID int64 `json:"id"`
// Action name
Name string `json:"name"`
// optional description
Description string `json:"description,omitempty"`
// ActionType, see the above enum
Type int `json:"type"`
// Configuration options specific for the action type
Options BaseEventActionOptions `json:"options"`
// list of rule names associated with this event action
Rules []string `json:"rules,omitempty"`
}
func (a *BaseEventAction) getACopy() BaseEventAction {
rules := make([]string, len(a.Rules))
copy(rules, a.Rules)
return BaseEventAction{
ID: a.ID,
Name: a.Name,
Description: a.Description,
Type: a.Type,
Options: a.Options.getACopy(),
Rules: rules,
}
}
// GetTypeAsString returns the action type as string
func (a *BaseEventAction) GetTypeAsString() string {
return getActionTypeAsString(a.Type)
}
// GetRulesAsString returns the list of rules as comma separated string
func (a *BaseEventAction) GetRulesAsString() string {
return strings.Join(a.Rules, ",")
}
// PrepareForRendering prepares a BaseEventAction for rendering.
// It hides confidential data and set to nil the empty secrets
// so they are not serialized
func (a *BaseEventAction) PrepareForRendering() {
a.Options.setNilSecretsIfEmpty()
a.Options.hideConfidentialData()
}
// RenderAsJSON implements the renderer interface used within plugins
func (a *BaseEventAction) RenderAsJSON(reload bool) ([]byte, error) {
if reload {
action, err := provider.eventActionExists(a.Name)
if err != nil {
providerLog(logger.LevelError, "unable to reload event action before rendering as json: %v", err)
return nil, err
}
action.PrepareForRendering()
return json.Marshal(action)
}
a.PrepareForRendering()
return json.Marshal(a)
}
func (a *BaseEventAction) validate() error {
if a.Name == "" {
return util.NewValidationError("name is mandatory")
}
if !isActionTypeValid(a.Type) {
return util.NewValidationError(fmt.Sprintf("invalid action type: %d", a.Type))
}
return a.Options.validate(a.Type, a.Name)
}
// EventActionOptions defines the supported configuration options for an event action
type EventActionOptions struct {
IsFailureAction bool `json:"is_failure_action"`
StopOnFailure bool `json:"stop_on_failure"`
ExecuteSync bool `json:"execute_sync"`
}
// EventAction defines an event action
type EventAction struct {
BaseEventAction
// Order defines the execution order
Order int `json:"order,omitempty"`
Options EventActionOptions `json:"relation_options"`
}
func (a *EventAction) getACopy() EventAction {
return EventAction{
BaseEventAction: a.BaseEventAction.getACopy(),
Order: a.Order,
Options: EventActionOptions{
IsFailureAction: a.Options.IsFailureAction,
StopOnFailure: a.Options.StopOnFailure,
ExecuteSync: a.Options.ExecuteSync,
},
}
}
func (a *EventAction) validateAssociation(trigger int, fsEvents []string) error {
if a.Options.IsFailureAction {
if a.Options.ExecuteSync {
return util.NewValidationError("sync execution is not supported for failure actions")
}
}
if trigger != EventTriggerFsEvent || !util.Contains(fsEvents, "upload") {
if a.Options.ExecuteSync {
return util.NewValidationError("sync execution is only supported for upload event")
}
}
return nil
}
// ConditionPattern defines a pattern for condition filters
type ConditionPattern struct {
Pattern string `json:"pattern,omitempty"`
InverseMatch bool `json:"inverse_match,omitempty"`
}
func (p *ConditionPattern) validate() error {
if p.Pattern == "" {
return util.NewValidationError("empty condition pattern not allowed")
}
_, err := path.Match(p.Pattern, "abc")
if err != nil {
return util.NewValidationError(fmt.Sprintf("invalid condition pattern %q", p.Pattern))
}
return nil
}
// ConditionOptions defines options for event conditions
type ConditionOptions struct {
// Usernames or folder names
Names []ConditionPattern `json:"names,omitempty"`
// Virtual paths
FsPaths []ConditionPattern `json:"fs_paths,omitempty"`
Protocols []string `json:"protocols,omitempty"`
ProviderObjects []string `json:"provider_objects,omitempty"`
MinFileSize int64 `json:"min_size,omitempty"`
MaxFileSize int64 `json:"max_size,omitempty"`
// allow to execute scheduled tasks concurrently from multiple instances
ConcurrentExecution bool `json:"concurrent_execution,omitempty"`
}
func (f *ConditionOptions) getACopy() ConditionOptions {
protocols := make([]string, len(f.Protocols))
copy(protocols, f.Protocols)
providerObjects := make([]string, len(f.ProviderObjects))
copy(providerObjects, f.ProviderObjects)
return ConditionOptions{
Names: cloneConditionPatterns(f.Names),
FsPaths: cloneConditionPatterns(f.FsPaths),
Protocols: protocols,
ProviderObjects: providerObjects,
MinFileSize: f.MinFileSize,
MaxFileSize: f.MaxFileSize,
ConcurrentExecution: f.ConcurrentExecution,
}
}
func (f *ConditionOptions) validate() error {
for _, name := range f.Names {
if err := name.validate(); err != nil {
return err
}
}
for _, fsPath := range f.FsPaths {
if err := fsPath.validate(); err != nil {
return err
}
}
for _, p := range f.Protocols {
if !util.Contains(SupportedRuleConditionProtocols, p) {
return util.NewValidationError(fmt.Sprintf("unsupported rule condition protocol: %q", p))
}
}
for _, p := range f.ProviderObjects {
if !util.Contains(SupporteRuleConditionProviderObjects, p) {
return util.NewValidationError(fmt.Sprintf("unsupported provider object: %q", p))
}
}
if f.MinFileSize > 0 && f.MaxFileSize > 0 {
if f.MaxFileSize <= f.MinFileSize {
return util.NewValidationError(fmt.Sprintf("invalid max file size %d, it is lesser or equal than min file size %d",
f.MaxFileSize, f.MinFileSize))
}
}
if config.IsShared == 0 {
f.ConcurrentExecution = false
}
return nil
}
// Schedule defines an event schedule
type Schedule struct {
Hours string `json:"hour"`
DayOfWeek string `json:"day_of_week"`
DayOfMonth string `json:"day_of_month"`
Month string `json:"month"`
}
// GetCronSpec returns the cron compatible schedule string
func (s *Schedule) GetCronSpec() string {
return fmt.Sprintf("0 %s %s %s %s", s.Hours, s.DayOfMonth, s.Month, s.DayOfWeek)
}
func (s *Schedule) validate() error {
_, err := cron.ParseStandard(s.GetCronSpec())
if err != nil {
return util.NewValidationError(fmt.Sprintf("invalid schedule, hour: %q, day of month: %q, month: %q, day of week: %q",
s.Hours, s.DayOfMonth, s.Month, s.DayOfWeek))
}
return nil
}
// EventConditions defines the conditions for an event rule
type EventConditions struct {
// Only one between FsEvents, ProviderEvents and Schedule is allowed
FsEvents []string `json:"fs_events,omitempty"`
ProviderEvents []string `json:"provider_events,omitempty"`
Schedules []Schedule `json:"schedules,omitempty"`
Options ConditionOptions `json:"options"`
}
func (c *EventConditions) getACopy() EventConditions {
fsEvents := make([]string, len(c.FsEvents))
copy(fsEvents, c.FsEvents)
providerEvents := make([]string, len(c.ProviderEvents))
copy(providerEvents, c.ProviderEvents)
schedules := make([]Schedule, 0, len(c.Schedules))
for _, schedule := range c.Schedules {
schedules = append(schedules, Schedule{
Hours: schedule.Hours,
DayOfWeek: schedule.DayOfWeek,
DayOfMonth: schedule.DayOfMonth,
Month: schedule.Month,
})
}
return EventConditions{
FsEvents: fsEvents,
ProviderEvents: providerEvents,
Schedules: schedules,
Options: c.Options.getACopy(),
}
}
func (c *EventConditions) validate(trigger int) error {
switch trigger {
case EventTriggerFsEvent:
c.ProviderEvents = nil
c.Schedules = nil
c.Options.ProviderObjects = nil
if len(c.FsEvents) == 0 {
return util.NewValidationError("at least one filesystem event is required")
}
for _, ev := range c.FsEvents {
if !util.Contains(SupportedFsEvents, ev) {
return util.NewValidationError(fmt.Sprintf("unsupported fs event: %q", ev))
}
}
case EventTriggerProviderEvent:
c.FsEvents = nil
c.Schedules = nil
c.Options.FsPaths = nil
c.Options.Protocols = nil
c.Options.MinFileSize = 0
c.Options.MaxFileSize = 0
if len(c.ProviderEvents) == 0 {
return util.NewValidationError("at least one provider event is required")
}
for _, ev := range c.ProviderEvents {
if !util.Contains(SupportedProviderEvents, ev) {
return util.NewValidationError(fmt.Sprintf("unsupported provider event: %q", ev))
}
}
case EventTriggerSchedule:
c.FsEvents = nil
c.ProviderEvents = nil
c.Options.FsPaths = nil
c.Options.Protocols = nil
c.Options.MinFileSize = 0
c.Options.MaxFileSize = 0
c.Options.ProviderObjects = nil
if len(c.Schedules) == 0 {
return util.NewValidationError("at least one schedule is required")
}
for _, schedule := range c.Schedules {
if err := schedule.validate(); err != nil {
return err
}
}
case EventTriggerIPBlocked, EventTriggerCertificate:
c.FsEvents = nil
c.ProviderEvents = nil
c.Options.Names = nil
c.Options.FsPaths = nil
c.Options.Protocols = nil
c.Options.MinFileSize = 0
c.Options.MaxFileSize = 0
c.Schedules = nil
default:
c.FsEvents = nil
c.ProviderEvents = nil
c.Options.FsPaths = nil
c.Options.Protocols = nil
c.Options.MinFileSize = 0
c.Options.MaxFileSize = 0
c.Schedules = nil
}
return c.Options.validate()
}
// EventRule defines the trigger, conditions and actions for an event
type EventRule struct {
// Data provider unique identifier
ID int64 `json:"id"`
// Rule name
Name string `json:"name"`
// optional description
Description string `json:"description,omitempty"`
// Creation time as unix timestamp in milliseconds
CreatedAt int64 `json:"created_at"`
// last update time as unix timestamp in milliseconds
UpdatedAt int64 `json:"updated_at"`
// Event trigger
Trigger int `json:"trigger"`
// Event conditions
Conditions EventConditions `json:"conditions"`
// actions to execute
Actions []EventAction `json:"actions"`
// in multi node setups we mark the rule as deleted to be able to update the cache
DeletedAt int64 `json:"-"`
}
func (r *EventRule) getACopy() EventRule {
actions := make([]EventAction, 0, len(r.Actions))
for _, action := range r.Actions {
actions = append(actions, action.getACopy())
}
return EventRule{
ID: r.ID,
Name: r.Name,
Description: r.Description,
CreatedAt: r.CreatedAt,
UpdatedAt: r.UpdatedAt,
Trigger: r.Trigger,
Conditions: r.Conditions.getACopy(),
Actions: actions,
DeletedAt: r.DeletedAt,
}
}
// GuardFromConcurrentExecution returns true if the rule cannot be executed concurrently
// from multiple instances
func (r *EventRule) GuardFromConcurrentExecution() bool {
if config.IsShared == 0 {
return false
}
return !r.Conditions.Options.ConcurrentExecution
}
// GetTriggerAsString returns the rule trigger as string
func (r *EventRule) GetTriggerAsString() string {
return getTriggerTypeAsString(r.Trigger)
}
// GetActionsAsString returns the list of action names as comma separated string
func (r *EventRule) GetActionsAsString() string {
actions := make([]string, 0, len(r.Actions))
for _, action := range r.Actions {
actions = append(actions, action.Name)
}
return strings.Join(actions, ",")
}
func (r *EventRule) validate() error {
if r.Name == "" {
return util.NewValidationError("name is mandatory")
}
if !isEventTriggerValid(r.Trigger) {
return util.NewValidationError(fmt.Sprintf("invalid event rule trigger: %d", r.Trigger))
}
if err := r.Conditions.validate(r.Trigger); err != nil {
return err
}
if len(r.Actions) == 0 {
return util.NewValidationError("at least one action is required")
}
actionNames := make(map[string]bool)
actionOrders := make(map[int]bool)
failureActions := 0
for idx := range r.Actions {
if r.Actions[idx].Name == "" {
return util.NewValidationError(fmt.Sprintf("invalid action at position %d, name not specified", idx))
}
if actionNames[r.Actions[idx].Name] {
return util.NewValidationError(fmt.Sprintf("duplicated action %q", r.Actions[idx].Name))
}
if actionOrders[r.Actions[idx].Order] {
return util.NewValidationError(fmt.Sprintf("duplicated order %d for action %q",
r.Actions[idx].Order, r.Actions[idx].Name))
}
if err := r.Actions[idx].validateAssociation(r.Trigger, r.Conditions.FsEvents); err != nil {
return err
}
if r.Actions[idx].Options.IsFailureAction {
failureActions++
}
actionNames[r.Actions[idx].Name] = true
actionOrders[r.Actions[idx].Order] = true
}
if len(r.Actions) == failureActions {
return util.NewValidationError("at least a non-failure action is required")
}
return nil
}
func (r *EventRule) checkIPBlockedAndCertificateActions() error {
unavailableActions := []int{ActionTypeUserQuotaReset, ActionTypeFolderQuotaReset, ActionTypeTransferQuotaReset,
ActionTypeDataRetentionCheck, ActionTypeFilesystem}
for _, action := range r.Actions {
if util.Contains(unavailableActions, action.Type) {
return fmt.Errorf("action %q, type %q is not supported for event trigger %q",
action.Name, getActionTypeAsString(action.Type), getTriggerTypeAsString(r.Trigger))
}
}
return nil
}
func (r *EventRule) checkProviderEventActions(providerObjectType string) error {
// user quota reset, transfer quota reset, data retention check and filesystem actions
// can be executed only if we modify a user. They will be executed for the
// affected user. Folder quota reset can be executed only for folders.
userSpecificActions := []int{ActionTypeUserQuotaReset, ActionTypeTransferQuotaReset,
ActionTypeDataRetentionCheck, ActionTypeFilesystem}
for _, action := range r.Actions {
if util.Contains(userSpecificActions, action.Type) && providerObjectType != actionObjectUser {
return fmt.Errorf("action %q, type %q is only supported for provider user events",
action.Name, getActionTypeAsString(action.Type))
}
if action.Type == ActionTypeFolderQuotaReset && providerObjectType != actionObjectFolder {
return fmt.Errorf("action %q, type %q is only supported for provider folder events",
action.Name, getActionTypeAsString(action.Type))
}
}
return nil
}
func (r *EventRule) hasUserAssociated(providerObjectType string) bool {
switch r.Trigger {
case EventTriggerProviderEvent:
return providerObjectType == actionObjectUser
case EventTriggerFsEvent:
return true
}
return false
}
// CheckActionsConsistency returns an error if the actions cannot be executed
func (r *EventRule) CheckActionsConsistency(providerObjectType string) error {
switch r.Trigger {
case EventTriggerProviderEvent:
if err := r.checkProviderEventActions(providerObjectType); err != nil {
return err
}
case EventTriggerFsEvent:
// folder quota reset cannot be executed
for _, action := range r.Actions {
if action.Type == ActionTypeFolderQuotaReset {
return fmt.Errorf("action %q, type %q is not supported for filesystem events",
action.Name, getActionTypeAsString(action.Type))
}
}
case EventTriggerIPBlocked, EventTriggerCertificate:
if err := r.checkIPBlockedAndCertificateActions(); err != nil {
return err
}
}
for _, action := range r.Actions {
if action.Type == ActionTypeEmail && len(action.BaseEventAction.Options.EmailConfig.Attachments) > 0 {
if !r.hasUserAssociated(providerObjectType) {
return errors.New("cannot send an email with attachments for a rule with no user associated")
}
}
}
return nil
}
// PrepareForRendering prepares an EventRule for rendering.
// It hides confidential data and set to nil the empty secrets
// so they are not serialized
func (r *EventRule) PrepareForRendering() {
for idx := range r.Actions {
r.Actions[idx].PrepareForRendering()
}
}
// RenderAsJSON implements the renderer interface used within plugins
func (r *EventRule) RenderAsJSON(reload bool) ([]byte, error) {
if reload {
rule, err := provider.eventRuleExists(r.Name)
if err != nil {
providerLog(logger.LevelError, "unable to reload event rule before rendering as json: %v", err)
return nil, err
}
rule.PrepareForRendering()
return json.Marshal(rule)
}
r.PrepareForRendering()
return json.Marshal(r)
}
func cloneKeyValues(keyVals []KeyValue) []KeyValue {
res := make([]KeyValue, 0, len(keyVals))
for _, kv := range keyVals {
res = append(res, KeyValue{
Key: kv.Key,
Value: kv.Value,
})
}
return res
}
func cloneConditionPatterns(patterns []ConditionPattern) []ConditionPattern {
res := make([]ConditionPattern, 0, len(patterns))
for _, p := range patterns {
res = append(res, ConditionPattern{
Pattern: p.Pattern,
InverseMatch: p.InverseMatch,
})
}
return res
}
// Task stores the state for a scheduled task
type Task struct {
Name string `json:"name"`
UpdateAt int64 `json:"updated_at"`
Version int64 `json:"version"`
}