package webdavd import ( "context" "net/http" "os" "path" "strings" "github.com/eikenb/pipeat" "golang.org/x/net/webdav" "github.com/drakkan/sftpgo/common" "github.com/drakkan/sftpgo/dataprovider" "github.com/drakkan/sftpgo/logger" "github.com/drakkan/sftpgo/utils" "github.com/drakkan/sftpgo/vfs" ) // Connection details for a WebDav connection. type Connection struct { *common.BaseConnection request *http.Request } // GetClientVersion returns the connected client's version. func (c *Connection) GetClientVersion() string { if c.request != nil { return c.request.UserAgent() } return "" } // GetRemoteAddress return the connected client's address func (c *Connection) GetRemoteAddress() string { if c.request != nil { return c.request.RemoteAddr } return "" } // Disconnect closes the active transfer func (c *Connection) Disconnect() error { return c.SignalTransfersAbort() } // GetCommand returns the request method func (c *Connection) GetCommand() string { if c.request != nil { return strings.ToUpper(c.request.Method) } return "" } // Mkdir creates a directory using the connection filesystem func (c *Connection) Mkdir(ctx context.Context, name string, perm os.FileMode) error { c.UpdateLastActivity() name = utils.CleanPath(name) p, err := c.Fs.ResolvePath(name) if err != nil { return c.GetFsError(err) } return c.CreateDir(p, name) } // Rename renames a file or a directory func (c *Connection) Rename(ctx context.Context, oldName, newName string) error { c.UpdateLastActivity() oldName = utils.CleanPath(oldName) newName = utils.CleanPath(newName) p, err := c.Fs.ResolvePath(oldName) if err != nil { return c.GetFsError(err) } t, err := c.Fs.ResolvePath(newName) if err != nil { return c.GetFsError(err) } if err = c.BaseConnection.Rename(p, t, oldName, newName); err != nil { return err } vfs.SetPathPermissions(c.Fs, t, c.User.GetUID(), c.User.GetGID()) return nil } // Stat returns a FileInfo describing the named file/directory, or an error, // if any happens func (c *Connection) Stat(ctx context.Context, name string) (os.FileInfo, error) { c.UpdateLastActivity() name = utils.CleanPath(name) if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) { return nil, c.GetPermissionDeniedError() } p, err := c.Fs.ResolvePath(name) if err != nil { return nil, c.GetFsError(err) } fi, err := c.DoStat(p, 0) if err != nil { c.Log(logger.LevelDebug, "error running stat on path %#v: %+v", p, err) return nil, c.GetFsError(err) } return fi, err } // RemoveAll removes path and any children it contains. // If the path does not exist, RemoveAll returns nil (no error). func (c *Connection) RemoveAll(ctx context.Context, name string) error { c.UpdateLastActivity() name = utils.CleanPath(name) p, err := c.Fs.ResolvePath(name) if err != nil { return c.GetFsError(err) } var fi os.FileInfo if fi, err = c.Fs.Lstat(p); err != nil { c.Log(logger.LevelWarn, "failed to remove a file %#v: stat error: %+v", p, err) return c.GetFsError(err) } if fi.IsDir() && fi.Mode()&os.ModeSymlink != os.ModeSymlink { return c.removeDirTree(p, name) } return c.RemoveFile(p, name, fi) } // OpenFile opens the named file with specified flag. // This method is used for uploads and downloads but also for Stat and Readdir func (c *Connection) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (webdav.File, error) { c.UpdateLastActivity() name = utils.CleanPath(name) p, err := c.Fs.ResolvePath(name) if err != nil { return nil, c.GetFsError(err) } if flag == os.O_RDONLY { // Download, Stat or Readdir fi, err := c.Fs.Lstat(p) if err != nil { return nil, c.GetFsError(err) } return c.getFile(p, name, fi) } return c.putFile(p, name) } func (c *Connection) getFile(fsPath, virtualPath string, info os.FileInfo) (webdav.File, error) { var err error if info.IsDir() { if !c.User.HasPerm(dataprovider.PermListItems, virtualPath) { return nil, c.GetPermissionDeniedError() } var file *os.File if vfs.IsLocalOsFs(c.Fs) { file, _, _, err = c.Fs.Open(fsPath, 0) if err != nil { c.Log(logger.LevelWarn, "could not open directory %#v for reading: %+v", fsPath, err) return nil, c.GetFsError(err) } } baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, nil, fsPath, virtualPath, common.TransferDownload, 0, 0, 0, false, c.Fs) return newWebDavFile(baseTransfer, nil, nil, info), nil } // we don't know if the file will be downloaded or opened for get properties so we check both permissions if !c.User.HasPerms([]string{dataprovider.PermDownload, dataprovider.PermListItems}, path.Dir(virtualPath)) { return nil, c.GetPermissionDeniedError() } if !c.User.IsFileAllowed(virtualPath) { c.Log(logger.LevelWarn, "reading file %#v is not allowed", virtualPath) return nil, c.GetPermissionDeniedError() } var file *os.File var r *pipeat.PipeReaderAt var cancelFn func() // for cloud fs we open the file when we receive the first read to avoid to download the first part of // the file if it was opened to get stats and not for a real download if vfs.IsLocalOsFs(c.Fs) { file, r, cancelFn, err = c.Fs.Open(fsPath, 0) if err != nil { c.Log(logger.LevelWarn, "could not open file %#v for reading: %+v", fsPath, err) return nil, c.GetFsError(err) } } baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, virtualPath, common.TransferDownload, 0, 0, 0, false, c.Fs) return newWebDavFile(baseTransfer, nil, r, info), nil } func (c *Connection) putFile(fsPath, virtualPath string) (webdav.File, error) { if !c.User.IsFileAllowed(virtualPath) { c.Log(logger.LevelWarn, "writing file %#v is not allowed", virtualPath) return nil, c.GetPermissionDeniedError() } filePath := fsPath if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() { filePath = c.Fs.GetAtomicUploadPath(fsPath) } stat, statErr := c.Fs.Lstat(fsPath) if (statErr == nil && stat.Mode()&os.ModeSymlink == os.ModeSymlink) || c.Fs.IsNotExist(statErr) { if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(virtualPath)) { return nil, c.GetPermissionDeniedError() } return c.handleUploadToNewFile(fsPath, filePath, virtualPath) } if statErr != nil { c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr) return nil, c.GetFsError(statErr) } // This happen if we upload a file that has the same name of an existing directory if stat.IsDir() { c.Log(logger.LevelWarn, "attempted to open a directory for writing to: %#v", fsPath) return nil, c.GetOpUnsupportedError() } if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(virtualPath)) { return nil, c.GetPermissionDeniedError() } return c.handleUploadToExistingFile(fsPath, filePath, stat.Size(), virtualPath) } func (c *Connection) handleUploadToNewFile(resolvedPath, filePath, requestPath string) (webdav.File, error) { quotaResult := c.HasSpace(true, requestPath) if !quotaResult.HasSpace { c.Log(logger.LevelInfo, "denying file write due to quota limits") return nil, common.ErrQuotaExceeded } file, w, cancelFn, err := c.Fs.Create(filePath, 0) if err != nil { c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err) return nil, c.GetFsError(err) } vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID()) // we can get an error only for resume maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, 0) baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath, common.TransferUpload, 0, 0, maxWriteSize, true, c.Fs) return newWebDavFile(baseTransfer, w, nil, nil), nil } func (c *Connection) handleUploadToExistingFile(resolvedPath, filePath string, fileSize int64, requestPath string) (webdav.File, error) { var err error quotaResult := c.HasSpace(false, requestPath) if !quotaResult.HasSpace { c.Log(logger.LevelInfo, "denying file write due to quota limits") return nil, common.ErrQuotaExceeded } // if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace // will return false in this case and we deny the upload before maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, fileSize) if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() { err = c.Fs.Rename(resolvedPath, filePath) if err != nil { c.Log(logger.LevelWarn, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v", resolvedPath, filePath, err) return nil, c.GetFsError(err) } } file, w, cancelFn, err := c.Fs.Create(filePath, 0) if err != nil { c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err) return nil, c.GetFsError(err) } initialSize := int64(0) if vfs.IsLocalOsFs(c.Fs) { vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath)) if err == nil { dataprovider.UpdateVirtualFolderQuota(vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck if vfolder.IsIncludedInUserQuota() { dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck } } else { dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck } } else { initialSize = fileSize } vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID()) baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath, common.TransferUpload, 0, initialSize, maxWriteSize, false, c.Fs) return newWebDavFile(baseTransfer, w, nil, nil), nil } type objectMapping struct { fsPath string virtualPath string info os.FileInfo } func (c *Connection) removeDirTree(fsPath, virtualPath string) error { var dirsToRemove []objectMapping var filesToRemove []objectMapping err := c.Fs.Walk(fsPath, func(walkedPath string, info os.FileInfo, err error) error { if err != nil { return err } obj := objectMapping{ fsPath: walkedPath, virtualPath: c.Fs.GetRelativePath(walkedPath), info: info, } if info.IsDir() { err = c.IsRemoveDirAllowed(obj.fsPath, obj.virtualPath) isDuplicated := false for _, d := range dirsToRemove { if d.fsPath == obj.fsPath { isDuplicated = true break } } if !isDuplicated { dirsToRemove = append(dirsToRemove, obj) } } else { err = c.IsRemoveFileAllowed(obj.fsPath, obj.virtualPath) filesToRemove = append(filesToRemove, obj) } if err != nil { c.Log(logger.LevelDebug, "unable to remove dir tree, object %#v->%#v cannot be removed: %v", virtualPath, fsPath, err) return err } return nil }) if err != nil { c.Log(logger.LevelWarn, "failed to remove dir tree %#v->%#v: error: %+v", virtualPath, fsPath, err) return err } for _, fileObj := range filesToRemove { err = c.RemoveFile(fileObj.fsPath, fileObj.virtualPath, fileObj.info) if err != nil { c.Log(logger.LevelDebug, "unable to remove dir tree, error removing file %#v->%#v: %v", fileObj.virtualPath, fileObj.fsPath, err) return err } } for _, dirObj := range c.orderDirsToRemove(dirsToRemove) { err = c.RemoveDir(dirObj.fsPath, dirObj.virtualPath) if err != nil { c.Log(logger.LevelDebug, "unable to remove dir tree, error removing directory %#v->%#v: %v", dirObj.virtualPath, dirObj.fsPath, err) return err } } return err } // order directories so that the empty ones will be at slice start func (c *Connection) orderDirsToRemove(dirsToRemove []objectMapping) []objectMapping { orderedDirs := make([]objectMapping, 0, len(dirsToRemove)) removedDirs := make([]string, 0, len(dirsToRemove)) pathSeparator := "/" if vfs.IsLocalOsFs(c.Fs) { pathSeparator = string(os.PathSeparator) } for len(orderedDirs) < len(dirsToRemove) { for idx, d := range dirsToRemove { if utils.IsStringInSlice(d.fsPath, removedDirs) { continue } isEmpty := true for idx1, d1 := range dirsToRemove { if idx == idx1 { continue } if utils.IsStringInSlice(d1.fsPath, removedDirs) { continue } if strings.HasPrefix(d1.fsPath, d.fsPath+pathSeparator) { isEmpty = false break } } if isEmpty { orderedDirs = append(orderedDirs, d) removedDirs = append(removedDirs, d.fsPath) } } } return orderedDirs }