add support for custom actions

Configurable custom commands and/or HTTP notifications on SFTP upload, download, delete or rename
This commit is contained in:
Nicola Murino 2019-07-27 09:38:09 +02:00
parent 70ae68a7c4
commit 48451a9924
12 changed files with 219 additions and 69 deletions

View file

@ -14,6 +14,7 @@ Full featured and highly configurable SFTP server software
- Per user maximum concurrent sessions - Per user maximum concurrent sessions
- Per user permissions: list directories content, upload, download, delete, rename, create directories, create symlinks can be enabled or disabled - Per user permissions: list directories content, upload, download, delete, rename, create directories, create symlinks can be enabled or disabled
- Per user files/folders ownership: you can map all the users to the system account that runs SFTPGo (all platforms are supported) or you can run SFTPGo as root user and map each user or group of users to a different system account (*NIX only) - Per user files/folders ownership: you can map all the users to the system account that runs SFTPGo (all platforms are supported) or you can run SFTPGo as root user and map each user or group of users to a different system account (*NIX only)
- Configurable custom commands and/or HTTP notifications on SFTP upload, download, delete or rename
- REST API for users and quota management and real time reports for the active connections with possibility of forcibly closing a connection - REST API for users and quota management and real time reports for the active connections with possibility of forcibly closing a connection
- Log files are accurate and they are saved in the easily parsable JSON format - Log files are accurate and they are saved in the easily parsable JSON format
- Automatically terminating idle connections - Automatically terminating idle connections
@ -63,6 +64,18 @@ The `sftpgo.conf` configuration file contains the following sections:
- `idle_timeout`, integer. Time in minutes after which an idle client will be disconnected. Default: 15 - `idle_timeout`, integer. Time in minutes after which an idle client will be disconnected. Default: 15
- `max_auth_tries` integer. Maximum number of authentication attempts permitted per connection. If set to a negative number, the number of attempts are unlimited. If set to zero, the number of attempts are limited to 6. - `max_auth_tries` integer. Maximum number of authentication attempts permitted per connection. If set to a negative number, the number of attempts are unlimited. If set to zero, the number of attempts are limited to 6.
- `umask`, string. Umask for the new files and directories. This setting has no effect on Windows. Default: "0022" - `umask`, string. Umask for the new files and directories. This setting has no effect on Windows. Default: "0022"
- `actions`, struct. It contains the command to execute and/or the HTTP URL to notify and the trigger conditions
- `execute_on`, list of strings. Valid values are `download`, `upload`, `delete`, `rename`. Leave empty to disable actions.
- `command`, string. Absolute path to the command to execute. Leave empty to disable. The command is invoked with the following arguments:
- `action`, any valid `execute_on` string
- `username`, user who did the action
- `path` to the affected file. For `rename` action this is the old file name
- `target_path`, non empty for `rename` action, this is the new file name
- `http_notification_url`, a valid URL. An HTTP GET request will be executed to this URL. Leave empty to disable. The query string will contain the following parameters that have the same meaning of the command's arguments:
- `action`
- `username`
- `path`
- `target_path`, added for `rename` action only
- **"data_provider"**, the configuration for the data provider - **"data_provider"**, the configuration for the data provider
- `driver`, string. Supported drivers are `sqlite`, `mysql`, `postgresql` - `driver`, string. Supported drivers are `sqlite`, `mysql`, `postgresql`
- `name`, string. Database name - `name`, string. Database name
@ -83,28 +96,34 @@ Here is a full example showing the default config:
```{ ```{
"sftpd":{ "sftpd":{
"bind_port":2022, "bind_port":2022,
"bind_address": "", "bind_address":"",
"idle_timeout": 15, "idle_timeout":15,
"umask": "0022" "max_auth_tries":0,
"umask":"0022",
"actions":{
"execute_on":["upload"],
"command":"/usr/bin/uploadscript",
"http_notification_url":""
}
}, },
"data_provider": { "data_provider":{
"driver": "sqlite", "driver":"sqlite",
"name": "sftpgo.db", "name":"sftpgo.db",
"host": "", "host":"",
"port": 5432, "port":5432,
"username": "", "username":"",
"password": "", "password":"",
"sslmode": 0, "sslmode":0,
"connection_string": "", "connection_string":"",
"users_table": "users", "users_table":"users",
"manage_users": 1, "manage_users":1,
"track_quota": 1 "track_quota":1
}, },
"httpd":{ "httpd":{
"bind_port":8080, "bind_port":8080,
"bind_address": "127.0.0.1" "bind_address":"127.0.0.1"
} }
} }
``` ```

View file

@ -29,7 +29,7 @@ func startQuotaScan(w http.ResponseWriter, r *http.Request) {
if sftpd.AddQuotaScan(user.Username) { if sftpd.AddQuotaScan(user.Username) {
sendAPIResponse(w, r, err, "Scan started", http.StatusCreated) sendAPIResponse(w, r, err, "Scan started", http.StatusCreated)
go func() { go func() {
numFiles, size, err := utils.ScanDirContents(user.HomeDir) numFiles, size, _, err := utils.ScanDirContents(user.HomeDir)
if err != nil { if err != nil {
logger.Warn(logSender, "error scanning user home dir %v: %v", user.HomeDir, err) logger.Warn(logSender, "error scanning user home dir %v: %v", user.HomeDir, err)
} else { } else {

View file

@ -33,6 +33,11 @@ func init() {
IdleTimeout: 15, IdleTimeout: 15,
MaxAuthTries: 0, MaxAuthTries: 0,
Umask: "0022", Umask: "0022",
Actions: sftpd.Actions{
ExecuteOn: []string{},
Command: "",
HTTPNotificationURL: "",
},
}, },
ProviderConf: dataprovider.Config{ ProviderConf: dataprovider.Config{
Driver: "sqlite", Driver: "sqlite",

View file

@ -29,7 +29,7 @@ func TestLoadConfigTest(t *testing.T) {
t.Errorf("error loading provider conf") t.Errorf("error loading provider conf")
} }
emptySFTPDConf := sftpd.Configuration{} emptySFTPDConf := sftpd.Configuration{}
if config.GetSFTPDConfig() == emptySFTPDConf { if config.GetSFTPDConfig().BindPort == emptySFTPDConf.BindPort {
t.Errorf("error loading SFTPD conf") t.Errorf("error loading SFTPD conf")
} }
confName = "sftpgo.conf.missing" confName = "sftpgo.conf.missing"

View file

@ -322,6 +322,7 @@ func (c Connection) handleSFTPRename(sourcePath string, targetPath string) error
return sftp.ErrSshFxFailure return sftp.ErrSshFxFailure
} }
logger.CommandLog(sftpdRenameLogSender, sourcePath, targetPath, c.User.Username, c.ID) logger.CommandLog(sftpdRenameLogSender, sourcePath, targetPath, c.User.Username, c.ID)
executeAction(operationRename, c.User.Username, sourcePath, targetPath)
return nil return nil
} }
@ -330,7 +331,7 @@ func (c Connection) handleSFTPRmdir(path string) error {
return sftp.ErrSshFxPermissionDenied return sftp.ErrSshFxPermissionDenied
} }
numFiles, size, err := utils.ScanDirContents(path) numFiles, size, fileList, err := utils.ScanDirContents(path)
if err != nil { if err != nil {
logger.Error(logSender, "failed to remove directory %v, scanning error: %v", path, err) logger.Error(logSender, "failed to remove directory %v, scanning error: %v", path, err)
return sftp.ErrSshFxFailure return sftp.ErrSshFxFailure
@ -342,7 +343,9 @@ func (c Connection) handleSFTPRmdir(path string) error {
logger.CommandLog(sftpdRmdirLogSender, path, "", c.User.Username, c.ID) logger.CommandLog(sftpdRmdirLogSender, path, "", c.User.Username, c.ID)
dataprovider.UpdateUserQuota(dataProvider, c.User.Username, -numFiles, -size, false) dataprovider.UpdateUserQuota(dataProvider, c.User.Username, -numFiles, -size, false)
for _, p := range fileList {
executeAction(operationDelete, c.User.Username, p, "")
}
return sftp.ErrSshFxOk return sftp.ErrSshFxOk
} }
@ -394,6 +397,7 @@ func (c Connection) handleSFTPRemove(path string) error {
if fi.Mode()&os.ModeSymlink != os.ModeSymlink { if fi.Mode()&os.ModeSymlink != os.ModeSymlink {
dataprovider.UpdateUserQuota(dataProvider, c.User.Username, -1, -size, false) dataprovider.UpdateUserQuota(dataProvider, c.User.Username, -1, -size, false)
} }
executeAction(operationDelete, c.User.Username, path, "")
return sftp.ErrSshFxOk return sftp.ErrSshFxOk
} }

40
sftpd/internal_test.go Normal file
View file

@ -0,0 +1,40 @@
package sftpd
import (
"testing"
)
func TestWrongActions(t *testing.T) {
actionsCopy := actions
actions = Actions{
ExecuteOn: []string{operationDownload},
Command: "/bad/command",
HTTPNotificationURL: "",
}
err := executeAction(operationDownload, "username", "path", "")
if err == nil {
t.Errorf("action with bad command must fail")
}
actions.Command = ""
actions.HTTPNotificationURL = "http://foo\x7f.com/"
err = executeAction(operationDownload, "username", "path", "")
if err == nil {
t.Errorf("action with bad url must fail")
}
actions = actionsCopy
}
func TestRemoveNonexistentTransfer(t *testing.T) {
transfer := Transfer{}
err := removeTransfer(&transfer)
if err == nil {
t.Errorf("remove nonexistent transfer must fail")
}
}
func TestRemoveNonexistentQuotaScan(t *testing.T) {
err := RemoveQuotaScan("username")
if err == nil {
t.Errorf("remove nonexistent transfer must fail")
}
}

View file

@ -27,11 +27,12 @@ import (
// Configuration server configuration // Configuration server configuration
type Configuration struct { type Configuration struct {
BindPort int `json:"bind_port"` BindPort int `json:"bind_port"`
BindAddress string `json:"bind_address"` BindAddress string `json:"bind_address"`
IdleTimeout int `json:"idle_timeout"` IdleTimeout int `json:"idle_timeout"`
MaxAuthTries int `json:"max_auth_tries"` MaxAuthTries int `json:"max_auth_tries"`
Umask string `json:"umask"` Umask string `json:"umask"`
Actions Actions `json:"actions"`
} }
// Initialize the SFTP server and add a persistent listener to handle inbound SFTP connections. // Initialize the SFTP server and add a persistent listener to handle inbound SFTP connections.
@ -42,6 +43,7 @@ func (c Configuration) Initialize(configDir string) error {
} else { } else {
logger.Warn(logSender, "error reading umask, please fix your config file: %v", err) logger.Warn(logSender, "error reading umask, please fix your config file: %v", err)
} }
actions = c.Actions
serverConfig := &ssh.ServerConfig{ serverConfig := &ssh.ServerConfig{
NoClientAuth: false, NoClientAuth: false,
MaxAuthTries: c.MaxAuthTries, MaxAuthTries: c.MaxAuthTries,

View file

@ -1,6 +1,11 @@
package sftpd package sftpd
import ( import (
"fmt"
"net/http"
"os"
"os/exec"
"path/filepath"
"sync" "sync"
"time" "time"
@ -20,6 +25,8 @@ const (
sftpdRemoveLogSender = "SFTPRemove" sftpdRemoveLogSender = "SFTPRemove"
operationDownload = "download" operationDownload = "download"
operationUpload = "upload" operationUpload = "upload"
operationDelete = "delete"
operationRename = "rename"
) )
var ( var (
@ -30,6 +37,7 @@ var (
idleTimeout time.Duration idleTimeout time.Duration
activeQuotaScans []ActiveQuotaScan activeQuotaScans []ActiveQuotaScan
dataProvider dataprovider.Provider dataProvider dataprovider.Provider
actions Actions
) )
type connectionTransfer struct { type connectionTransfer struct {
@ -45,6 +53,14 @@ type ActiveQuotaScan struct {
StartTime int64 `json:"start_time"` StartTime int64 `json:"start_time"`
} }
// Actions configuration for external script to execute on create, download, delete.
// A rename trigger delete script for the old file and create script for the new one
type Actions struct {
ExecuteOn []string `json:"execute_on"`
Command string `json:"command"`
HTTPNotificationURL string `json:"http_notification_url"`
}
// ConnectionStatus status for an active connection // ConnectionStatus status for an active connection
type ConnectionStatus struct { type ConnectionStatus struct {
Username string `json:"username"` Username string `json:"username"`
@ -58,6 +74,7 @@ type ConnectionStatus struct {
func init() { func init() {
openConnections = make(map[string]Connection) openConnections = make(map[string]Connection)
idleConnectionTicker = time.NewTicker(5 * time.Minute)
} }
// SetDataProvider sets the data provider // SetDataProvider sets the data provider
@ -104,9 +121,10 @@ func AddQuotaScan(username string) bool {
} }
// RemoveQuotaScan remove and user from the ones with active quota scans // RemoveQuotaScan remove and user from the ones with active quota scans
func RemoveQuotaScan(username string) { func RemoveQuotaScan(username string) error {
mutex.Lock() mutex.Lock()
defer mutex.Unlock() defer mutex.Unlock()
var err error
indexToRemove := -1 indexToRemove := -1
for i, s := range activeQuotaScans { for i, s := range activeQuotaScans {
if s.Username == username { if s.Username == username {
@ -117,7 +135,11 @@ func RemoveQuotaScan(username string) {
if indexToRemove >= 0 { if indexToRemove >= 0 {
activeQuotaScans[indexToRemove] = activeQuotaScans[len(activeQuotaScans)-1] activeQuotaScans[indexToRemove] = activeQuotaScans[len(activeQuotaScans)-1]
activeQuotaScans = activeQuotaScans[:len(activeQuotaScans)-1] activeQuotaScans = activeQuotaScans[:len(activeQuotaScans)-1]
} else {
logger.Warn(logSender, "quota scan to remove not found for user: %v", username)
err = fmt.Errorf("quota scan to remove not found for user: %v", username)
} }
return err
} }
// CloseActiveConnection close an active SFTP connection, returns true on success // CloseActiveConnection close an active SFTP connection, returns true on success
@ -180,7 +202,6 @@ func GetConnectionsStats() []ConnectionStatus {
} }
func startIdleTimer(maxIdleTime time.Duration) { func startIdleTimer(maxIdleTime time.Duration) {
idleConnectionTicker = time.NewTicker(5 * time.Minute)
idleTimeout = maxIdleTime idleTimeout = maxIdleTime
go func() { go func() {
for t := range idleConnectionTicker.C { for t := range idleConnectionTicker.C {
@ -237,9 +258,10 @@ func addTransfer(transfer *Transfer) {
activeTransfers = append(activeTransfers, transfer) activeTransfers = append(activeTransfers, transfer)
} }
func removeTransfer(transfer *Transfer) { func removeTransfer(transfer *Transfer) error {
mutex.Lock() mutex.Lock()
defer mutex.Unlock() defer mutex.Unlock()
var err error
indexToRemove := -1 indexToRemove := -1
for i, v := range activeTransfers { for i, v := range activeTransfers {
if v == transfer { if v == transfer {
@ -252,7 +274,9 @@ func removeTransfer(transfer *Transfer) {
activeTransfers = activeTransfers[:len(activeTransfers)-1] activeTransfers = activeTransfers[:len(activeTransfers)-1]
} else { } else {
logger.Warn(logSender, "transfer to remove not found!") logger.Warn(logSender, "transfer to remove not found!")
err = fmt.Errorf("transfer to remove not found")
} }
return err
} }
func updateConnectionActivity(id string) { func updateConnectionActivity(id string) {
@ -263,3 +287,44 @@ func updateConnectionActivity(id string) {
openConnections[id] = c openConnections[id] = c
} }
} }
func executeAction(operation string, username string, path string, target string) error {
if !utils.IsStringInSlice(operation, actions.ExecuteOn) {
return nil
}
var err error
if len(actions.Command) > 0 && filepath.IsAbs(actions.Command) {
if _, err = os.Stat(actions.Command); err == nil {
command := exec.Command(actions.Command, operation, username, path, target)
err = command.Start()
logger.Debug(logSender, "executed command \"%v\" with arguments: %v, %v, %v, error: %v",
actions.Command, operation, path, target, err)
} else {
logger.Warn(logSender, "Invalid action command \"%v\" : %v", actions.Command, err)
}
}
if len(actions.HTTPNotificationURL) > 0 {
var req *http.Request
req, err = http.NewRequest(http.MethodGet, actions.HTTPNotificationURL, nil)
if err == nil {
q := req.URL.Query()
q.Add("action", operation)
q.Add("username", username)
q.Add("path", path)
if len(target) > 0 {
q.Add("target_path", target)
}
req.URL.RawQuery = q.Encode()
resp, err := http.DefaultClient.Do(req)
respCode := 0
if err == nil {
respCode = resp.StatusCode
resp.Body.Close()
}
logger.Debug(logSender, "notified action to URL: %v status code: %v err: %v", req.URL.RequestURI(), respCode, err)
} else {
logger.Warn(logSender, "Invalid http_notification_url \"%v\" : %v", actions.HTTPNotificationURL, err)
}
}
return err
}

View file

@ -80,11 +80,6 @@ var (
) )
func TestMain(m *testing.M) { func TestMain(m *testing.M) {
if runtime.GOOS == "windows" {
homeBasePath = "C:\\"
} else {
homeBasePath = "/tmp"
}
configDir := ".." configDir := ".."
logfilePath := filepath.Join(configDir, "sftpgo_sftpd_test.log") logfilePath := filepath.Join(configDir, "sftpgo_sftpd_test.log")
confName := "sftpgo.conf" confName := "sftpgo.conf"
@ -102,6 +97,14 @@ func TestMain(m *testing.M) {
sftpdConf := config.GetSFTPDConfig() sftpdConf := config.GetSFTPDConfig()
httpdConf := config.GetHTTPDConfig() httpdConf := config.GetHTTPDConfig()
router := api.GetHTTPRouter() router := api.GetHTTPRouter()
if runtime.GOOS == "windows" {
homeBasePath = "C:\\"
} else {
homeBasePath = "/tmp"
sftpdConf.Actions.ExecuteOn = []string{"download", "upload", "delete"}
sftpdConf.Actions.Command = "/bin/true"
sftpdConf.Actions.HTTPNotificationURL = "http://127.0.0.1:8080/"
}
sftpd.SetDataProvider(dataProvider) sftpd.SetDataProvider(dataProvider)
api.SetDataProvider(dataProvider) api.SetDataProvider(dataProvider)
@ -721,6 +724,10 @@ func TestBandwidthAndConnections(t *testing.T) {
localDownloadPath := filepath.Join(homeBasePath, "test_download.dat") localDownloadPath := filepath.Join(homeBasePath, "test_download.dat")
c := sftpDownloadNonBlocking(testFileName, localDownloadPath, testFileSize, client) c := sftpDownloadNonBlocking(testFileName, localDownloadPath, testFileSize, client)
waitForActiveTransfer() waitForActiveTransfer()
// wait some additional arbitrary time to wait for transfer activity to happen
// it is need to reach all the code in CheckIdleConnections
time.Sleep(100 * time.Millisecond)
sftpd.CheckIdleConnections()
err = <-c err = <-c
if err != nil { if err != nil {
t.Errorf("file download error: %v", err) t.Errorf("file download error: %v", err)
@ -732,6 +739,7 @@ func TestBandwidthAndConnections(t *testing.T) {
// test disconnection // test disconnection
c = sftpUploadNonBlocking(testFilePath, testFileName, testFileSize, client) c = sftpUploadNonBlocking(testFilePath, testFileName, testFileSize, client)
waitForActiveTransfer() waitForActiveTransfer()
time.Sleep(100 * time.Millisecond)
sftpd.CheckIdleConnections() sftpd.CheckIdleConnections()
stats := sftpd.GetConnectionsStats() stats := sftpd.GetConnectionsStats()
for _, stat := range stats { for _, stat := range stats {

View file

@ -29,18 +29,18 @@ type Transfer struct {
// ReadAt update sent bytes // ReadAt update sent bytes
func (t *Transfer) ReadAt(p []byte, off int64) (n int, err error) { func (t *Transfer) ReadAt(p []byte, off int64) (n int, err error) {
t.lastActivity = time.Now()
readed, e := t.file.ReadAt(p, off) readed, e := t.file.ReadAt(p, off)
t.bytesSent += int64(readed) t.bytesSent += int64(readed)
t.lastActivity = time.Now()
t.handleThrottle() t.handleThrottle()
return readed, e return readed, e
} }
// WriteAt update received bytes // WriteAt update received bytes
func (t *Transfer) WriteAt(p []byte, off int64) (n int, err error) { func (t *Transfer) WriteAt(p []byte, off int64) (n int, err error) {
t.lastActivity = time.Now()
written, e := t.file.WriteAt(p, off) written, e := t.file.WriteAt(p, off)
t.bytesReceived += int64(written) t.bytesReceived += int64(written)
t.lastActivity = time.Now()
t.handleThrottle() t.handleThrottle()
return written, e return written, e
} }
@ -50,15 +50,15 @@ func (t *Transfer) Close() error {
elapsed := time.Since(t.start).Nanoseconds() / 1000000 elapsed := time.Since(t.start).Nanoseconds() / 1000000
if t.transferType == transferDownload { if t.transferType == transferDownload {
logger.TransferLog(sftpdDownloadLogSender, t.path, elapsed, t.bytesSent, t.user.Username, t.connectionID) logger.TransferLog(sftpdDownloadLogSender, t.path, elapsed, t.bytesSent, t.user.Username, t.connectionID)
executeAction(operationDownload, t.user.Username, t.path, "")
} else { } else {
logger.TransferLog(sftpUploadLogSender, t.path, elapsed, t.bytesReceived, t.user.Username, t.connectionID) logger.TransferLog(sftpUploadLogSender, t.path, elapsed, t.bytesReceived, t.user.Username, t.connectionID)
executeAction(operationUpload, t.user.Username, t.path, "")
} }
removeTransfer(t) removeTransfer(t)
if t.transferType == transferUpload && t.bytesReceived > 0 { if t.transferType == transferUpload && t.bytesReceived > 0 && t.isNewFile {
numFiles := 0 numFiles := 0
if t.isNewFile { numFiles++
numFiles++
}
dataprovider.UpdateUserQuota(dataProvider, t.user.Username, numFiles, t.bytesReceived, false) dataprovider.UpdateUserQuota(dataProvider, t.user.Username, numFiles, t.bytesReceived, false)
} }
return t.file.Close() return t.file.Close()
@ -77,6 +77,7 @@ func (t *Transfer) handleThrottle() {
if wantedBandwidth > 0 { if wantedBandwidth > 0 {
// real and wanted elapsed as milliseconds, bytes as kilobytes // real and wanted elapsed as milliseconds, bytes as kilobytes
realElapsed := time.Since(t.start).Nanoseconds() / 1000000 realElapsed := time.Since(t.start).Nanoseconds() / 1000000
// trasferredBytes / 1000 = KB/s, we multiply for 1000 to get milliseconds
wantedElapsed := 1000 * (trasferredBytes / 1000) / wantedBandwidth wantedElapsed := 1000 * (trasferredBytes / 1000) / wantedBandwidth
if wantedElapsed > realElapsed { if wantedElapsed > realElapsed {
toSleep := time.Duration(wantedElapsed - realElapsed) toSleep := time.Duration(wantedElapsed - realElapsed)

View file

@ -1,26 +1,31 @@
{ {
"sftpd":{ "sftpd":{
"bind_port":2022, "bind_port":2022,
"bind_address": "", "bind_address":"",
"idle_timeout": 15, "idle_timeout":15,
"max_auth_tries": 0, "max_auth_tries":0,
"umask": "0022" "umask":"0022",
"actions":{
"execute_on":[],
"command":"",
"http_notification_url":""
}
}, },
"data_provider": { "data_provider":{
"driver": "sqlite", "driver":"sqlite",
"name": "sftpgo.db", "name":"sftpgo.db",
"host": "", "host":"",
"port": 5432, "port":5432,
"username": "", "username":"",
"password": "", "password":"",
"sslmode": 0, "sslmode":0,
"connection_string": "", "connection_string":"",
"users_table": "users", "users_table":"users",
"manage_users": 1, "manage_users":1,
"track_quota": 1 "track_quota":1
}, },
"httpd":{ "httpd":{
"bind_port":8080, "bind_port":8080,
"bind_address": "127.0.0.1" "bind_address":"127.0.0.1"
} }
} }

View file

@ -27,9 +27,10 @@ func GetTimeAsMsSinceEpoch(t time.Time) int64 {
} }
// ScanDirContents returns the number of files contained in a directory and their size // ScanDirContents returns the number of files contained in a directory and their size
func ScanDirContents(path string) (int, int64, error) { func ScanDirContents(path string) (int, int64, []string, error) {
var numFiles int var numFiles int
var size int64 var size int64
var fileList []string
var err error var err error
numFiles = 0 numFiles = 0
size = 0 size = 0
@ -42,13 +43,13 @@ func ScanDirContents(path string) (int, int64, error) {
if info != nil && info.Mode().IsRegular() { if info != nil && info.Mode().IsRegular() {
size += info.Size() size += info.Size()
numFiles++ numFiles++
fileList = append(fileList, path)
} }
return err return err
}) })
} }
return numFiles, size, err return numFiles, size, fileList, err
} }
func isDirectory(path string) (bool, error) { func isDirectory(path string) (bool, error) {