custom actions: add env vars

action parameters can now be readed from env vars too.
Added a timeout for the command execution
This commit is contained in:
Nicola Murino 2020-01-09 12:00:37 +01:00
parent 37c602a477
commit eec60d6309
9 changed files with 169 additions and 73 deletions

110
README.md
View file

@ -24,7 +24,7 @@ Full featured and highly configurable SFTP server
- Prometheus metrics are exposed. - Prometheus metrics are exposed.
- REST API for users management, backup, restore and real time reports of the active connections with possibility of forcibly closing a connection. - REST API for users management, backup, restore and real time reports of the active connections with possibility of forcibly closing a connection.
- Web based interface to easily manage users and connections. - Web based interface to easily manage users and connections.
- Easy migration from Unix system user accounts. - Easy migration from Linux system user accounts.
- Portable mode: a convenient way to share a single directory on demand. - Portable mode: a convenient way to share a single directory on demand.
- Configuration is a your choice: JSON, TOML, YAML, HCL, envfile are supported. - Configuration is a your choice: JSON, TOML, YAML, HCL, envfile are supported.
- Log files are accurate and they are saved in the easily parsable JSON format. - Log files are accurate and they are saved in the easily parsable JSON format.
@ -138,20 +138,10 @@ The `sftpgo` configuration file contains the following sections:
- `umask`, string. Umask for the new files and directories. This setting has no effect on Windows. Default: "0022" - `umask`, string. Umask for the new files and directories. This setting has no effect on Windows. Default: "0022"
- `banner`, string. Identification string used by the server. Leave empty to use the default banner. Default "SFTPGo_version" - `banner`, string. Identification string used by the server. Leave empty to use the default banner. Default "SFTPGo_version"
- `upload_mode` integer. 0 means standard, the files are uploaded directly to the requested path. 1 means atomic: files are uploaded to a temporary path and renamed to the requested path when the client ends the upload. Atomic mode avoids problems such as a web server that serves partial files when the files are being uploaded. In atomic mode if there is an upload error the temporary file is deleted and so the requested upload path will not contain a partial file. 2 means atomic with resume support: as atomic but if there is an upload error the temporary file is renamed to the requested path and not deleted, this way a client can reconnect and resume the upload. - `upload_mode` integer. 0 means standard, the files are uploaded directly to the requested path. 1 means atomic: files are uploaded to a temporary path and renamed to the requested path when the client ends the upload. Atomic mode avoids problems such as a web server that serves partial files when the files are being uploaded. In atomic mode if there is an upload error the temporary file is deleted and so the requested upload path will not contain a partial file. 2 means atomic with resume support: as atomic but if there is an upload error the temporary file is renamed to the requested path and not deleted, this way a client can reconnect and resume the upload.
- `actions`, struct. It contains the command to execute and/or the HTTP URL to notify and the trigger conditions - `actions`, struct. It contains the command to execute and/or the HTTP URL to notify and the trigger conditions. See the "Custom Actions" paragraph for more details
- `execute_on`, list of strings. Valid values are `download`, `upload`, `delete`, `rename`, `ssh_cmd`. Actions will not be executed if an error is detected and so a partial file is uploaded or downloaded or an SSH command is not successfully completed. The `upload` condition includes both uploads to new files and overwrite of existing files. The `ssh_cmd` condition will be triggered after a command is successfully executed via SSH. `scp` will trigger the `download` and `upload` conditions and not `ssh_cmd`. Leave empty to disable actions. - `execute_on`, list of strings. Valid values are `download`, `upload`, `delete`, `rename`, `ssh_cmd`. Leave empty to disable actions.
- `command`, string. Absolute path to the command to execute. Leave empty to disable. The command is invoked with the following arguments: - `command`, string. Absolute path to the command to execute. Leave empty to disable.
- `action`, any valid `execute_on` string - `http_notification_url`, a valid URL. An HTTP GET request will be executed to this URL. Leave empty to disable.
- `username`, user who did the action
- `path` to the affected file. For `rename` action this is the old file name
- `target_path`, non empty for `rename` action, this is the new file name
- `ssh_cmd`, non empty for `ssh_cmd` action
- `http_notification_url`, a valid URL. An HTTP GET request will be executed to this URL. Leave empty to disable. The query string will contain the following parameters that have the same meaning of the command's arguments:
- `action`
- `username`
- `path`
- `target_path`, added for `rename` action only
- `ssh_cmd`, added for `ssh_cmd` action only
- `keys`, struct array. It contains the daemon's private keys. If empty or missing the daemon will search or try to generate `id_rsa` in the configuration directory. - `keys`, struct array. It contains the daemon's private keys. If empty or missing the daemon will search or try to generate `id_rsa` in the configuration directory.
- `private_key`, path to the private key file. It can be a path relative to the config dir or an absolute one. - `private_key`, path to the private key file. It can be a path relative to the config dir or an absolute one.
- `enable_scp`, boolean. Default disabled. Set to `true` to enable the experimental SCP support. This setting is deprecated and will be removed in future versions, please add `scp` to the `enabled_ssh_commands` list to enable it - `enable_scp`, boolean. Default disabled. Set to `true` to enable the experimental SCP support. This setting is deprecated and will be removed in future versions, please add `scp` to the `enabled_ssh_commands` list to enable it
@ -183,18 +173,10 @@ The `sftpgo` configuration file contains the following sections:
- 2, quota is updated each time a user upload or delete a file but only for users with quota restrictions. With this configuration the "quota scan" REST API can still be used to periodically update space usage for users without quota restrictions - 2, quota is updated each time a user upload or delete a file but only for users with quota restrictions. With this configuration the "quota scan" REST API can still be used to periodically update space usage for users without quota restrictions
- `pool_size`, integer. Sets the maximum number of open connections for `mysql` and `postgresql` driver. Default 0 (unlimited) - `pool_size`, integer. Sets the maximum number of open connections for `mysql` and `postgresql` driver. Default 0 (unlimited)
- `users_base_dir`, string. Users' default base directory. If no home dir is defined while adding a new user, and this value is a valid absolute path, then the user home dir will be automatically defined as the path obtained joining the base dir and the username - `users_base_dir`, string. Users' default base directory. If no home dir is defined while adding a new user, and this value is a valid absolute path, then the user home dir will be automatically defined as the path obtained joining the base dir and the username
- `actions`, struct. It contains the command to execute and/or the HTTP URL to notify and the trigger conditions - `actions`, struct. It contains the command to execute and/or the HTTP URL to notify and the trigger conditions. See the "Custom Actions" paragraph for more details
- `execute_on`, list of strings. Valid values are `add`, `update`, `delete`. `update` action will not be fired for internal updates such as the last login or the user quota fields. - `execute_on`, list of strings. Valid values are `add`, `update`, `delete`. `update` action will not be fired for internal updates such as the last login or the user quota fields.
- `command`, string. Absolute path to the command to execute. Leave empty to disable. The command is invoked with the following arguments that identify the user added, updated or deleted: - `command`, string. Absolute path to the command to execute. Leave empty to disable.
- `action`, any valid `execute_on` string - `http_notification_url`, a valid URL. Leave empty to disable.
- `username`
- `ID`
- `status`
- `expiration_date`, as unix timestamp in milliseconds
- `home_dir`
- `uid`
- `gid`
- `http_notification_url`, a valid URL. The action is added to the query string. For example `<http_notification_url>?action=update`. An HTTP POST request will be executed to this URL. The user is sent serialized as json inside the POST body. Leave empty to disable.
- `external_auth_program`, string. Absolute path to an external program to use for users authentication. See the "External Authentication" paragraph for more details. - `external_auth_program`, string. Absolute path to an external program to use for users authentication. See the "External Authentication" paragraph for more details.
- `external_auth_scope`, integer. 0 means all supported authetication scopes (passwords and public keys). 1 means passwords only. 2 means public keys only - `external_auth_scope`, integer. 0 means all supported authetication scopes (passwords and public keys). 1 means passwords only. 2 means public keys only
- **"httpd"**, the configuration for the HTTP server used to serve REST API - **"httpd"**, the configuration for the HTTP server used to serve REST API
@ -336,7 +318,7 @@ The external program can read the following environment variables to get info ab
- `SFTPGO_AUTHD_PASSWORD`, not empty for password authentication - `SFTPGO_AUTHD_PASSWORD`, not empty for password authentication
- `SFTPGO_AUTHD_PUBLIC_KEY`, not empty for public key authentication - `SFTPGO_AUTHD_PUBLIC_KEY`, not empty for public key authentication
The content of these variables is _not_ quoted. They may contain special characters. They are under the control of a possibly malicious remote user. Previous global environment variables aren't cleared when the script is called. The content of these variables is _not_ quoted. They may contain special characters. They are under the control of a possibly malicious remote user.
The program must respond on the standard output with a valid SFTPGo user serialized as json if the authentication succeed or an user with an empty username if the authentication fails. The program must respond on the standard output with a valid SFTPGo user serialized as json if the authentication succeed or an user with an empty username if the authentication fails.
If the authentication succeed the user will be automatically added/updated inside the defined data provider. Actions defined for user added/updated will not be executed in this case. If the authentication succeed the user will be automatically added/updated inside the defined data provider. Actions defined for user added/updated will not be executed in this case.
The external program should check authentication only, if there are login restrictions such as user disabled, expired, login allowed only from specific IP addresses it is enough to populate the matching user fields and these conditions will be checked in the same way as for built-in users. The external program should check authentication only, if there are login restrictions such as user disabled, expired, login allowed only from specific IP addresses it is enough to populate the matching user fields and these conditions will be checked in the same way as for built-in users.
@ -362,6 +344,78 @@ fi
If you have an external authentication program that could be useful for others too, for example LDAP/Active Directory authentication, please let us know and/or send a pull request. If you have an external authentication program that could be useful for others too, for example LDAP/Active Directory authentication, please let us know and/or send a pull request.
## Custom Actions
SFTPGo allows to configure custom commands and/or HTTP notifications on file upload, download, delete, rename, on SSH commands and on user add, update and delete.
The `actions` struct inside the "sftpd" configuration section allows to configure actions on file upload, download, delete, rename and on SSH commands.
Actions will not be executed if an error is detected and so a partial file is uploaded or downloaded or an SSH command is not successfully completed. The `upload` condition includes both uploads to new files and overwrite of existing files. The `ssh_cmd` condition will be triggered after a command is successfully executed via SSH. `scp` will trigger the `download` and `upload` conditions and not `ssh_cmd`.
The `command`, if defined, is invoked with the following arguments:
- `action`, string, possibile values are: `download`, `upload`, `delete`, `rename`, `ssh_cmd`
- `username`
- `path` is the full filesystem path, can be empty for some ssh commands
- `target_path`, non empty for `rename` action
- `ssh_cmd`, non empty for `ssh_cmd` action
The `command` can also read the following environment variables:
- `SFTPGO_ACTION`
- `SFTPGO_ACTION_USERNAME`
- `SFTPGO_ACTION_PATH`
- `SFTPGO_ACTION_TARGET`, non empty for `rename` `SFTPGO_ACTION`
- `SFTPGO_ACTION_SSH_CMD`, non empty for `ssh_cmd` `SFTPGO_ACTION`
- `SFTPGO_ACTION_FILE_SIZE`, non empty for `upload`, `download` and `delete` `SFTPGO_ACTION`
Previous global environment variables aren't cleared when the script is called.
The `command` must finish within 30 seconds.
The `http_notification_url`, if defined, will contain the following, percent encoded, query string parameters:
- `action`
- `username`
- `path`
- `target_path`, added for `rename` action
- `ssh_cmd`, added for `ssh_cmd` action
- `file_size`, added for `upload`, `download`, `delete` actions
The HTTP request has a 15 seconds timeout.
The `actions` struct inside the "data_provider" configuration section allows to configure actions on user add, update, delete.
Actions will not be fired for internal updates such as the last login or the user quota fields or after external authentication.
The `command`, if defined, is invoked with the following arguments:
- `action`, string, possibile values are: `add`, `update`, `delete`
- `username`
- `ID`
- `status`
- `expiration_date`
- `home_dir`
- `uid`
- `gid`
The `command` can also read the following environment variables:
- `SFTPGO_USER_ACTION`
- `SFTPGO_USER_USERNAME`
- `SFTPGO_USER_ID`
- `SFTPGO_USER_STATUS`
- `SFTPGO_USER_EXPIRATION_DATE`
- `SFTPGO_USER_HOME_DIR`
- `SFTPGO_USER_UID`
- `SFTPGO_USER_GID`
Previous global environment variables aren't cleared when the script is called.
The `command` must finish within 15 seconds.
The `http_notification_url`, if defined, will be called invoked as http POST. The action is added to the query string, for example `<http_notification_url>?action=update` and the user is sent serialized as json inside the POST body
The HTTP request has a 15 seconds timeout.
## Portable mode ## Portable mode
SFTPGo allows to share a single directory on demand using the `portable` subcommand: SFTPGo allows to share a single directory on demand using the `portable` subcommand:
@ -440,7 +494,7 @@ These properties are stored inside the data provider.
If you want to use your existing accounts you have these options: If you want to use your existing accounts you have these options:
- If your accounts are aleady stored inside a supported database, you can create a database view. Since a view is read only, you have to disable user management and quota tracking so SFTPGo will never try to write to the view - If your accounts are aleady stored inside a supported database, you can create a database view. Since a view is read only, you have to disable user management and quota tracking so SFTPGo will never try to write to the view
- you can import your users inside SFTPGo. Take a look at [sftpgo_api_cli.py](./scripts/README.md "sftpgo_api_cli script"), it can convert and import users from Unix system users and Pure-FTPd/ProFTPD virtual users - you can import your users inside SFTPGo. Take a look at [sftpgo_api_cli.py](./scripts/README.md "sftpgo_api_cli script"), it can convert and import users from Linux system users and Pure-FTPd/ProFTPD virtual users
- you can use an external authentication program - you can use an external authentication program
## REST API ## REST API

View file

@ -697,12 +697,6 @@ func doExternalAuth(username, password, pubKey string) (User, error) {
var user User var user User
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second) ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second)
defer cancel() defer cancel()
cmd := exec.CommandContext(ctx, config.ExternalAuthProgram)
cmd.Env = os.Environ()
cmd.Env = append(cmd.Env, fmt.Sprintf("SFTPGO_AUTHD_USERNAME=%v", username))
if len(password) > 0 {
cmd.Env = append(cmd.Env, fmt.Sprintf("SFTPGO_AUTHD_PASSWORD=%v", password))
}
pkey := "" pkey := ""
if len(pubKey) > 0 { if len(pubKey) > 0 {
k, err := ssh.ParsePublicKey([]byte(pubKey)) k, err := ssh.ParsePublicKey([]byte(pubKey))
@ -710,8 +704,12 @@ func doExternalAuth(username, password, pubKey string) (User, error) {
return user, err return user, err
} }
pkey = string(ssh.MarshalAuthorizedKey(k)) pkey = string(ssh.MarshalAuthorizedKey(k))
cmd.Env = append(cmd.Env, fmt.Sprintf("SFTPGO_AUTHD_PUBLIC_KEY=%v", pkey))
} }
cmd := exec.CommandContext(ctx, config.ExternalAuthProgram)
cmd.Env = append(os.Environ(),
fmt.Sprintf("SFTPGO_AUTHD_USERNAME=%v", username),
fmt.Sprintf("SFTPGO_AUTHD_PASSWORD=%v", password),
fmt.Sprintf("SFTPGO_AUTHD_PUBLIC_KEY=%v", pkey))
out, err := cmd.Output() out, err := cmd.Output()
if err != nil { if err != nil {
return user, fmt.Errorf("External auth error: %v env: %+v", err, cmd.Env) return user, fmt.Errorf("External auth error: %v env: %+v", err, cmd.Env)
@ -748,6 +746,19 @@ func providerLog(level logger.LogLevel, format string, v ...interface{}) {
logger.Log(level, logSender, "", format, v...) logger.Log(level, logSender, "", format, v...)
} }
func executeNotificationCommand(operation string, user *User) error {
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second)
defer cancel()
commandArgs := user.getNotificationFieldsAsSlice(operation)
cmd := exec.CommandContext(ctx, config.Actions.Command, commandArgs...)
cmd.Env = append(os.Environ(), user.getNotificationFieldsAsEnvVars(operation)...)
startTime := time.Now()
err := cmd.Run()
providerLog(logger.LevelDebug, "executed command %#v with arguments: %+v, elapsed: %v, error: %v",
config.Actions.Command, commandArgs, time.Since(startTime), err)
return err
}
// executed in a goroutine // executed in a goroutine
func executeAction(operation string, user User) { func executeAction(operation string, user User) {
if !utils.IsStringInSlice(operation, config.Actions.ExecuteOn) { if !utils.IsStringInSlice(operation, config.Actions.ExecuteOn) {
@ -764,20 +775,12 @@ func executeAction(operation string, user User) {
// hide the hashed password // hide the hashed password
user.Password = "" user.Password = ""
if len(config.Actions.Command) > 0 && filepath.IsAbs(config.Actions.Command) { if len(config.Actions.Command) > 0 && filepath.IsAbs(config.Actions.Command) {
if _, err := os.Stat(config.Actions.Command); err == nil { // we are in a goroutine but if we have to send an HTTP notification we don't want to wait for the
commandArgs := []string{operation} // end of the command
commandArgs = append(commandArgs, user.getNotificationFieldsAsSlice()...) if len(config.Actions.HTTPNotificationURL) > 0 {
command := exec.Command(config.Actions.Command, commandArgs...) go executeNotificationCommand(operation, &user)
err = command.Start()
providerLog(logger.LevelDebug, "start command %#v with arguments: %+v, error: %v",
config.Actions.Command, commandArgs, err)
if err == nil {
// we are in a goroutine but we don't want to block here, this way we can send the
// HTTP notification, if configured, without waiting for the end of the command
go command.Wait()
}
} else { } else {
providerLog(logger.LevelWarn, "Invalid action command %#v for operation %#v: %v", config.Actions.Command, operation, err) executeNotificationCommand(operation, &user)
} }
} }
if len(config.Actions.HTTPNotificationURL) > 0 { if len(config.Actions.HTTPNotificationURL) > 0 {

View file

@ -412,8 +412,8 @@ func (u *User) getACopy() User {
} }
} }
func (u *User) getNotificationFieldsAsSlice() []string { func (u *User) getNotificationFieldsAsSlice(action string) []string {
return []string{u.Username, return []string{action, u.Username,
strconv.FormatInt(u.ID, 10), strconv.FormatInt(u.ID, 10),
strconv.FormatInt(int64(u.Status), 10), strconv.FormatInt(int64(u.Status), 10),
strconv.FormatInt(int64(u.ExpirationDate), 10), strconv.FormatInt(int64(u.ExpirationDate), 10),
@ -422,3 +422,14 @@ func (u *User) getNotificationFieldsAsSlice() []string {
strconv.FormatInt(int64(u.GID), 10), strconv.FormatInt(int64(u.GID), 10),
} }
} }
func (u *User) getNotificationFieldsAsEnvVars(action string) []string {
return []string{fmt.Sprintf("SFTPGO_USER_ACTION=%v", action),
fmt.Sprintf("SFTPGO_USER_USERNAME=%v", u.Username),
fmt.Sprintf("SFTPGO_USER_ID=%v", u.ID),
fmt.Sprintf("SFTPGO_USER_STATUS=%v", u.Status),
fmt.Sprintf("SFTPGO_USER_EXPIRATION_DATE=%v", u.ExpirationDate),
fmt.Sprintf("SFTPGO_USER_HOME_DIR=%v", u.HomeDir),
fmt.Sprintf("SFTPGO_USER_UID=%v", u.UID),
fmt.Sprintf("SFTPGO_USER_GID=%v", u.GID)}
}

View file

@ -379,7 +379,7 @@ Output:
You can convert users to the SFTPGo format from the following users stores: You can convert users to the SFTPGo format from the following users stores:
- Linux/Unix users stored in `shadow`/`passwd` files - Linux users stored in `shadow`/`passwd` files
- Pure-FTPd virtual users generated using `pure-pw` CLI - Pure-FTPd virtual users generated using `pure-pw` CLI
- ProFTPD users generated using `ftpasswd` CLI - ProFTPD users generated using `ftpasswd` CLI

View file

@ -324,7 +324,7 @@ func (c Connection) handleSFTPRename(sourcePath string, targetPath string, reque
return getSFTPErrorFromOSError(err) return getSFTPErrorFromOSError(err)
} }
logger.CommandLog(renameLogSender, sourcePath, targetPath, c.User.Username, "", c.ID, c.protocol, -1, -1, "", "", "") logger.CommandLog(renameLogSender, sourcePath, targetPath, c.User.Username, "", c.ID, c.protocol, -1, -1, "", "", "")
go executeAction(operationRename, c.User.Username, sourcePath, targetPath, "") go executeAction(operationRename, c.User.Username, sourcePath, targetPath, "", 0)
return nil return nil
} }
@ -414,7 +414,7 @@ func (c Connection) handleSFTPRemove(filePath string, request *sftp.Request) err
if fi.Mode()&os.ModeSymlink != os.ModeSymlink { if fi.Mode()&os.ModeSymlink != os.ModeSymlink {
dataprovider.UpdateUserQuota(dataProvider, c.User, -1, -size, false) dataprovider.UpdateUserQuota(dataProvider, c.User, -1, -size, false)
} }
go executeAction(operationDelete, c.User.Username, filePath, "", "") go executeAction(operationDelete, c.User.Username, filePath, "", "", fi.Size())
return sftp.ErrSSHFxOk return sftp.ErrSSHFxOk
} }

View file

@ -69,17 +69,17 @@ func TestWrongActions(t *testing.T) {
Command: badCommand, Command: badCommand,
HTTPNotificationURL: "", HTTPNotificationURL: "",
} }
err := executeAction(operationDownload, "username", "path", "", "") err := executeAction(operationDownload, "username", "path", "", "", 0)
if err == nil { if err == nil {
t.Errorf("action with bad command must fail") t.Errorf("action with bad command must fail")
} }
err = executeAction(operationDelete, "username", "path", "", "") err = executeAction(operationDelete, "username", "path", "", "", 0)
if err != nil { if err != nil {
t.Errorf("action not configured must silently fail") t.Errorf("action not configured must silently fail")
} }
actions.Command = "" actions.Command = ""
actions.HTTPNotificationURL = "http://foo\x7f.com/" actions.HTTPNotificationURL = "http://foo\x7f.com/"
err = executeAction(operationDownload, "username", "path", "", "") err = executeAction(operationDownload, "username", "path", "", "", 0)
if err == nil { if err == nil {
t.Errorf("action with bad url must fail") t.Errorf("action with bad url must fail")
} }

View file

@ -4,6 +4,7 @@
package sftpd package sftpd
import ( import (
"context"
"fmt" "fmt"
"net/http" "net/http"
"net/url" "net/url"
@ -414,25 +415,42 @@ func isAtomicUploadEnabled() bool {
return uploadMode == uploadModeAtomic || uploadMode == uploadModeAtomicWithResume return uploadMode == uploadModeAtomic || uploadMode == uploadModeAtomicWithResume
} }
func executeNotificationCommand(operation, username, path, target, sshCmd, fileSize string) error {
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
defer cancel()
cmd := exec.CommandContext(ctx, actions.Command, operation, username, path, target, sshCmd)
cmd.Env = append(os.Environ(),
fmt.Sprintf("SFTPGO_ACTION=%v", operation),
fmt.Sprintf("SFTPGO_ACTION_USERNAME=%v", username),
fmt.Sprintf("SFTPGO_ACTION_PATH=%v", path),
fmt.Sprintf("SFTPGO_ACTION_TARGET=%v", target),
fmt.Sprintf("SFTPGO_ACTION_SSH_CMD=%v", sshCmd),
fmt.Sprintf("SFTPGO_ACTION_FILE_SIZE=%v", fileSize),
)
startTime := time.Now()
err := cmd.Run()
logger.Debug(logSender, "", "executed command %#v with arguments: %#v, %#v, %#v, %#v, %#v, elapsed: %v, error: %v",
actions.Command, operation, username, path, target, sshCmd, time.Since(startTime), err)
return err
}
// executed in a goroutine // executed in a goroutine
func executeAction(operation, username, path, target, sshCmd string) error { func executeAction(operation, username, path, target, sshCmd string, fileSize int64) error {
if !utils.IsStringInSlice(operation, actions.ExecuteOn) { if !utils.IsStringInSlice(operation, actions.ExecuteOn) {
return nil return nil
} }
var err error var err error
size := ""
if fileSize > 0 {
size = fmt.Sprintf("%v", fileSize)
}
if len(actions.Command) > 0 && filepath.IsAbs(actions.Command) { if len(actions.Command) > 0 && filepath.IsAbs(actions.Command) {
if _, err = os.Stat(actions.Command); err == nil { // we are in a goroutine but if we have to send an HTTP notification we don't want to wait for the
command := exec.Command(actions.Command, operation, username, path, target, sshCmd) // end of the command
err = command.Start() if len(actions.HTTPNotificationURL) > 0 {
logger.Debug(logSender, "", "start command %#v with arguments: %#v, %#v, %#v, %#v, %#v, error: %v", go executeNotificationCommand(operation, username, path, target, sshCmd, size)
actions.Command, operation, username, path, target, sshCmd, err)
if err == nil {
// we are in a goroutine but we don't want to block here, this way we can send the
// HTTP notification, if configured, without waiting for the end of the command
go command.Wait()
}
} else { } else {
logger.Warn(logSender, "", "Invalid action command %#v for operation %#v: %v", actions.Command, operation, err) err = executeNotificationCommand(operation, username, path, target, sshCmd, size)
} }
} }
if len(actions.HTTPNotificationURL) > 0 { if len(actions.HTTPNotificationURL) > 0 {
@ -449,6 +467,9 @@ func executeAction(operation, username, path, target, sshCmd string) error {
if len(sshCmd) > 0 { if len(sshCmd) > 0 {
q.Add("ssh_cmd", sshCmd) q.Add("ssh_cmd", sshCmd)
} }
if len(size) > 0 {
q.Add("file_size", size)
}
url.RawQuery = q.Encode() url.RawQuery = q.Encode()
startTime := time.Now() startTime := time.Now()
httpClient := &http.Client{ httpClient := &http.Client{

View file

@ -384,7 +384,14 @@ func (c *sshCommand) sendExitStatus(err error) {
metrics.SSHCommandCompleted(err) metrics.SSHCommandCompleted(err)
// for scp we notify single uploads/downloads // for scp we notify single uploads/downloads
if err == nil && c.command != "scp" { if err == nil && c.command != "scp" {
go executeAction(operationSSHCmd, c.connection.User.Username, c.getDestPath(), "", c.command) realPath := c.getDestPath()
if len(realPath) > 0 {
p, err := c.connection.buildPath(realPath)
if err == nil {
realPath = p
}
}
go executeAction(operationSSHCmd, c.connection.User.Username, realPath, "", c.command, 0)
} }
} }

View file

@ -69,8 +69,8 @@ func (t *Transfer) WriteAt(p []byte, off int64) (n int, err error) {
} }
// Close it is called when the transfer is completed. // Close it is called when the transfer is completed.
// It closes the underlying file, log the transfer info, update the user quota (for uploads) // It closes the underlying file, logs the transfer info, updates the user quota (for uploads)
// and execute any defined actions. // and executes any defined action.
// If there is an error no action will be executed and, in atomic mode, we try to delete // If there is an error no action will be executed and, in atomic mode, we try to delete
// the temporary file // the temporary file
func (t *Transfer) Close() error { func (t *Transfer) Close() error {
@ -102,10 +102,10 @@ func (t *Transfer) Close() error {
elapsed := time.Since(t.start).Nanoseconds() / 1000000 elapsed := time.Since(t.start).Nanoseconds() / 1000000
if t.transferType == transferDownload { if t.transferType == transferDownload {
logger.TransferLog(downloadLogSender, t.path, elapsed, t.bytesSent, t.user.Username, t.connectionID, t.protocol) logger.TransferLog(downloadLogSender, t.path, elapsed, t.bytesSent, t.user.Username, t.connectionID, t.protocol)
go executeAction(operationDownload, t.user.Username, t.path, "", "") go executeAction(operationDownload, t.user.Username, t.path, "", "", t.bytesSent)
} else { } else {
logger.TransferLog(uploadLogSender, t.path, elapsed, t.bytesReceived, t.user.Username, t.connectionID, t.protocol) logger.TransferLog(uploadLogSender, t.path, elapsed, t.bytesReceived, t.user.Username, t.connectionID, t.protocol)
go executeAction(operationUpload, t.user.Username, t.path, "", "") go executeAction(operationUpload, t.user.Username, t.path, "", "", t.bytesReceived+t.minWriteOffset)
} }
} }
metrics.TransferCompleted(t.bytesSent, t.bytesReceived, t.transferType, t.transferError) metrics.TransferCompleted(t.bytesSent, t.bytesReceived, t.transferType, t.transferError)