sftpgo-mirror/webdavd/handler.go

385 lines
11 KiB
Go
Raw Normal View History

2020-08-11 21:56:10 +00:00
package webdavd
import (
"context"
"net/http"
"os"
"path"
"strings"
"github.com/eikenb/pipeat"
"golang.org/x/net/webdav"
2021-06-26 05:31:41 +00:00
"github.com/drakkan/sftpgo/v2/common"
"github.com/drakkan/sftpgo/v2/dataprovider"
"github.com/drakkan/sftpgo/v2/logger"
2021-07-11 13:26:51 +00:00
"github.com/drakkan/sftpgo/v2/util"
2021-06-26 05:31:41 +00:00
"github.com/drakkan/sftpgo/v2/vfs"
2020-08-11 21:56:10 +00:00
)
// Connection details for a WebDav connection.
type Connection struct {
*common.BaseConnection
request *http.Request
}
// GetClientVersion returns the connected client's version.
func (c *Connection) GetClientVersion() string {
if c.request != nil {
return c.request.UserAgent()
}
return ""
}
2021-07-24 18:11:17 +00:00
// GetLocalAddress returns local connection address
func (c *Connection) GetLocalAddress() string {
return util.GetHTTPLocalAddress(c.request)
}
// GetRemoteAddress returns the connected client's address
2020-08-11 21:56:10 +00:00
func (c *Connection) GetRemoteAddress() string {
if c.request != nil {
return c.request.RemoteAddr
}
return ""
}
// Disconnect closes the active transfer
func (c *Connection) Disconnect() error {
return c.SignalTransfersAbort()
}
// GetCommand returns the request method
func (c *Connection) GetCommand() string {
if c.request != nil {
return strings.ToUpper(c.request.Method)
}
return ""
}
// Mkdir creates a directory using the connection filesystem
func (c *Connection) Mkdir(ctx context.Context, name string, perm os.FileMode) error {
c.UpdateLastActivity()
2021-07-11 13:26:51 +00:00
name = util.CleanPath(name)
return c.CreateDir(name)
2020-08-11 21:56:10 +00:00
}
// Rename renames a file or a directory
func (c *Connection) Rename(ctx context.Context, oldName, newName string) error {
c.UpdateLastActivity()
2021-07-11 13:26:51 +00:00
oldName = util.CleanPath(oldName)
newName = util.CleanPath(newName)
2020-08-11 21:56:10 +00:00
return c.BaseConnection.Rename(oldName, newName)
2020-08-11 21:56:10 +00:00
}
// Stat returns a FileInfo describing the named file/directory, or an error,
// if any happens
func (c *Connection) Stat(ctx context.Context, name string) (os.FileInfo, error) {
c.UpdateLastActivity()
2021-07-11 13:26:51 +00:00
name = util.CleanPath(name)
2020-08-11 21:56:10 +00:00
if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) {
return nil, c.GetPermissionDeniedError()
}
fi, err := c.DoStat(name, 0)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelDebug, "error running stat on path %#v: %+v", name, err)
return nil, err
2020-08-11 21:56:10 +00:00
}
return fi, err
}
// RemoveAll removes path and any children it contains.
// If the path does not exist, RemoveAll returns nil (no error).
func (c *Connection) RemoveAll(ctx context.Context, name string) error {
c.UpdateLastActivity()
2021-07-11 13:26:51 +00:00
name = util.CleanPath(name)
fs, p, err := c.GetFsAndResolvedPath(name)
2020-08-11 21:56:10 +00:00
if err != nil {
return err
2020-08-11 21:56:10 +00:00
}
var fi os.FileInfo
if fi, err = fs.Lstat(p); err != nil {
2021-12-16 17:18:36 +00:00
c.Log(logger.LevelDebug, "failed to remove file %#v: stat error: %+v", p, err)
return c.GetFsError(fs, err)
2020-08-11 21:56:10 +00:00
}
if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
return c.removeDirTree(fs, p, name)
2020-08-11 21:56:10 +00:00
}
return c.RemoveFile(fs, p, name, fi)
2020-08-11 21:56:10 +00:00
}
// OpenFile opens the named file with specified flag.
// This method is used for uploads and downloads but also for Stat and Readdir
func (c *Connection) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (webdav.File, error) {
c.UpdateLastActivity()
2021-07-11 13:26:51 +00:00
name = util.CleanPath(name)
fs, p, err := c.GetFsAndResolvedPath(name)
2020-08-11 21:56:10 +00:00
if err != nil {
return nil, err
2020-08-11 21:56:10 +00:00
}
if flag == os.O_RDONLY || c.request.Method == "PROPPATCH" {
// Download, Stat, Readdir or simply open/close
return c.getFile(fs, p, name)
2020-08-11 21:56:10 +00:00
}
return c.putFile(fs, p, name)
2020-08-11 21:56:10 +00:00
}
func (c *Connection) getFile(fs vfs.Fs, fsPath, virtualPath string) (webdav.File, error) {
2020-08-11 21:56:10 +00:00
var err error
var file vfs.File
2020-08-11 21:56:10 +00:00
var r *pipeat.PipeReaderAt
var cancelFn func()
// for cloud fs we open the file when we receive the first read to avoid to download the first part of
2020-12-05 12:48:13 +00:00
// the file if it was opened only to do a stat or a readdir and so it is not a real download
if vfs.IsLocalOrUnbufferedSFTPFs(fs) {
file, r, cancelFn, err = fs.Open(fsPath, 0)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelWarn, "could not open file %#v for reading: %+v", fsPath, err)
return nil, c.GetFsError(fs, err)
2020-08-11 21:56:10 +00:00
}
}
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, fsPath, virtualPath, common.TransferDownload,
0, 0, 0, false, fs)
2020-08-11 21:56:10 +00:00
return newWebDavFile(baseTransfer, nil, r), nil
2020-08-11 21:56:10 +00:00
}
func (c *Connection) putFile(fs vfs.Fs, fsPath, virtualPath string) (webdav.File, error) {
2020-08-11 21:56:10 +00:00
if !c.User.IsFileAllowed(virtualPath) {
c.Log(logger.LevelWarn, "writing file %#v is not allowed", virtualPath)
return nil, c.GetPermissionDeniedError()
}
filePath := fsPath
if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
filePath = fs.GetAtomicUploadPath(fsPath)
2020-08-11 21:56:10 +00:00
}
stat, statErr := fs.Lstat(fsPath)
if (statErr == nil && stat.Mode()&os.ModeSymlink != 0) || fs.IsNotExist(statErr) {
2020-08-11 21:56:10 +00:00
if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(virtualPath)) {
return nil, c.GetPermissionDeniedError()
}
return c.handleUploadToNewFile(fs, fsPath, filePath, virtualPath)
2020-08-11 21:56:10 +00:00
}
if statErr != nil {
c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr)
return nil, c.GetFsError(fs, statErr)
2020-08-11 21:56:10 +00:00
}
// This happen if we upload a file that has the same name of an existing directory
if stat.IsDir() {
c.Log(logger.LevelWarn, "attempted to open a directory for writing to: %#v", fsPath)
return nil, c.GetOpUnsupportedError()
}
if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(virtualPath)) {
return nil, c.GetPermissionDeniedError()
}
return c.handleUploadToExistingFile(fs, fsPath, filePath, stat.Size(), virtualPath)
2020-08-11 21:56:10 +00:00
}
func (c *Connection) handleUploadToNewFile(fs vfs.Fs, resolvedPath, filePath, requestPath string) (webdav.File, error) {
2021-02-11 18:45:52 +00:00
quotaResult := c.HasSpace(true, false, requestPath)
2020-08-11 21:56:10 +00:00
if !quotaResult.HasSpace {
c.Log(logger.LevelInfo, "denying file write due to quota limits")
return nil, common.ErrQuotaExceeded
}
if err := common.ExecutePreAction(c.BaseConnection, common.OperationPreUpload, resolvedPath, requestPath, 0, 0); err != nil {
c.Log(logger.LevelDebug, "upload for file %#v denied by pre action: %v", requestPath, err)
return nil, c.GetPermissionDeniedError()
}
file, w, cancelFn, err := fs.Create(filePath, 0)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err)
return nil, c.GetFsError(fs, err)
2020-08-11 21:56:10 +00:00
}
vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
2020-08-11 21:56:10 +00:00
// we can get an error only for resume
maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, 0, fs.IsUploadResumeSupported())
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, filePath, requestPath,
common.TransferUpload, 0, 0, maxWriteSize, true, fs)
2020-08-11 21:56:10 +00:00
return newWebDavFile(baseTransfer, w, nil), nil
2020-08-11 21:56:10 +00:00
}
func (c *Connection) handleUploadToExistingFile(fs vfs.Fs, resolvedPath, filePath string, fileSize int64,
2020-08-11 21:56:10 +00:00
requestPath string) (webdav.File, error) {
var err error
2021-02-11 18:45:52 +00:00
quotaResult := c.HasSpace(false, false, requestPath)
2020-08-11 21:56:10 +00:00
if !quotaResult.HasSpace {
c.Log(logger.LevelInfo, "denying file write due to quota limits")
return nil, common.ErrQuotaExceeded
}
if err := common.ExecutePreAction(c.BaseConnection, common.OperationPreUpload, resolvedPath, requestPath,
fileSize, os.O_TRUNC); err != nil {
c.Log(logger.LevelDebug, "upload for file %#v denied by pre action: %v", requestPath, err)
return nil, c.GetPermissionDeniedError()
}
2020-08-11 21:56:10 +00:00
// if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace
// will return false in this case and we deny the upload before
maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, fileSize, fs.IsUploadResumeSupported())
if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
err = fs.Rename(resolvedPath, filePath)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelWarn, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v",
resolvedPath, filePath, err)
return nil, c.GetFsError(fs, err)
2020-08-11 21:56:10 +00:00
}
}
file, w, cancelFn, err := fs.Create(filePath, 0)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err)
return nil, c.GetFsError(fs, err)
2020-08-11 21:56:10 +00:00
}
initialSize := int64(0)
if vfs.IsLocalOrSFTPFs(fs) {
2020-08-11 21:56:10 +00:00
vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath))
if err == nil {
dataprovider.UpdateVirtualFolderQuota(&vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck
2020-08-11 21:56:10 +00:00
if vfolder.IsIncludedInUserQuota() {
dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
2020-08-11 21:56:10 +00:00
}
} else {
dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
2020-08-11 21:56:10 +00:00
}
} else {
initialSize = fileSize
}
vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
2020-08-11 21:56:10 +00:00
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, filePath, requestPath,
common.TransferUpload, 0, initialSize, maxWriteSize, false, fs)
2020-08-11 21:56:10 +00:00
return newWebDavFile(baseTransfer, w, nil), nil
2020-08-11 21:56:10 +00:00
}
type objectMapping struct {
fsPath string
virtualPath string
info os.FileInfo
}
func (c *Connection) removeDirTree(fs vfs.Fs, fsPath, virtualPath string) error {
2020-08-11 21:56:10 +00:00
var dirsToRemove []objectMapping
var filesToRemove []objectMapping
err := fs.Walk(fsPath, func(walkedPath string, info os.FileInfo, err error) error {
2020-08-11 21:56:10 +00:00
if err != nil {
return err
}
obj := objectMapping{
fsPath: walkedPath,
virtualPath: fs.GetRelativePath(walkedPath),
2020-08-11 21:56:10 +00:00
info: info,
}
if info.IsDir() {
err = c.IsRemoveDirAllowed(fs, obj.fsPath, obj.virtualPath)
2020-08-11 21:56:10 +00:00
isDuplicated := false
for _, d := range dirsToRemove {
if d.fsPath == obj.fsPath {
isDuplicated = true
break
}
}
if !isDuplicated {
dirsToRemove = append(dirsToRemove, obj)
}
} else {
err = c.IsRemoveFileAllowed(obj.virtualPath)
2020-08-11 21:56:10 +00:00
filesToRemove = append(filesToRemove, obj)
}
if err != nil {
c.Log(logger.LevelDebug, "unable to remove dir tree, object %#v->%#v cannot be removed: %v",
virtualPath, fsPath, err)
return err
}
return nil
})
if err != nil {
c.Log(logger.LevelWarn, "failed to remove dir tree %#v->%#v: error: %+v", virtualPath, fsPath, err)
return err
}
for _, fileObj := range filesToRemove {
err = c.RemoveFile(fs, fileObj.fsPath, fileObj.virtualPath, fileObj.info)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelDebug, "unable to remove dir tree, error removing file %#v->%#v: %v",
fileObj.virtualPath, fileObj.fsPath, err)
return err
}
}
for _, dirObj := range c.orderDirsToRemove(fs, dirsToRemove) {
err = c.RemoveDir(dirObj.virtualPath)
2020-08-11 21:56:10 +00:00
if err != nil {
c.Log(logger.LevelDebug, "unable to remove dir tree, error removing directory %#v->%#v: %v",
dirObj.virtualPath, dirObj.fsPath, err)
return err
}
}
return err
}
// order directories so that the empty ones will be at slice start
func (c *Connection) orderDirsToRemove(fs vfs.Fs, dirsToRemove []objectMapping) []objectMapping {
2020-08-11 21:56:10 +00:00
orderedDirs := make([]objectMapping, 0, len(dirsToRemove))
removedDirs := make([]string, 0, len(dirsToRemove))
pathSeparator := "/"
if vfs.IsLocalOsFs(fs) {
2020-08-11 21:56:10 +00:00
pathSeparator = string(os.PathSeparator)
}
for len(orderedDirs) < len(dirsToRemove) {
for idx, d := range dirsToRemove {
2021-07-11 13:26:51 +00:00
if util.IsStringInSlice(d.fsPath, removedDirs) {
2020-08-11 21:56:10 +00:00
continue
}
isEmpty := true
for idx1, d1 := range dirsToRemove {
if idx == idx1 {
continue
}
2021-07-11 13:26:51 +00:00
if util.IsStringInSlice(d1.fsPath, removedDirs) {
2020-08-11 21:56:10 +00:00
continue
}
if strings.HasPrefix(d1.fsPath, d.fsPath+pathSeparator) {
isEmpty = false
break
}
}
if isEmpty {
orderedDirs = append(orderedDirs, d)
removedDirs = append(removedDirs, d.fsPath)
}
}
}
return orderedDirs
}