mirror of
https://github.com/drakkan/sftpgo.git
synced 2024-11-22 15:40:23 +00:00
7ab30099dd
Signed-off-by: Nicola Murino <nicola.murino@gmail.com>
386 lines
12 KiB
Go
386 lines
12 KiB
Go
package webdavd
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
|
|
"github.com/eikenb/pipeat"
|
|
"golang.org/x/net/webdav"
|
|
|
|
"github.com/drakkan/sftpgo/v2/common"
|
|
"github.com/drakkan/sftpgo/v2/dataprovider"
|
|
"github.com/drakkan/sftpgo/v2/logger"
|
|
"github.com/drakkan/sftpgo/v2/util"
|
|
"github.com/drakkan/sftpgo/v2/vfs"
|
|
)
|
|
|
|
// Connection details for a WebDav connection.
|
|
type Connection struct {
|
|
*common.BaseConnection
|
|
request *http.Request
|
|
}
|
|
|
|
// GetClientVersion returns the connected client's version.
|
|
func (c *Connection) GetClientVersion() string {
|
|
if c.request != nil {
|
|
return c.request.UserAgent()
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// GetLocalAddress returns local connection address
|
|
func (c *Connection) GetLocalAddress() string {
|
|
return util.GetHTTPLocalAddress(c.request)
|
|
}
|
|
|
|
// GetRemoteAddress returns the connected client's address
|
|
func (c *Connection) GetRemoteAddress() string {
|
|
if c.request != nil {
|
|
return c.request.RemoteAddr
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// Disconnect closes the active transfer
|
|
func (c *Connection) Disconnect() error {
|
|
return c.SignalTransfersAbort()
|
|
}
|
|
|
|
// GetCommand returns the request method
|
|
func (c *Connection) GetCommand() string {
|
|
if c.request != nil {
|
|
return strings.ToUpper(c.request.Method)
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// Mkdir creates a directory using the connection filesystem
|
|
func (c *Connection) Mkdir(ctx context.Context, name string, perm os.FileMode) error {
|
|
c.UpdateLastActivity()
|
|
|
|
name = util.CleanPath(name)
|
|
return c.CreateDir(name, true)
|
|
}
|
|
|
|
// Rename renames a file or a directory
|
|
func (c *Connection) Rename(ctx context.Context, oldName, newName string) error {
|
|
c.UpdateLastActivity()
|
|
|
|
oldName = util.CleanPath(oldName)
|
|
newName = util.CleanPath(newName)
|
|
|
|
return c.BaseConnection.Rename(oldName, newName)
|
|
}
|
|
|
|
// Stat returns a FileInfo describing the named file/directory, or an error,
|
|
// if any happens
|
|
func (c *Connection) Stat(ctx context.Context, name string) (os.FileInfo, error) {
|
|
c.UpdateLastActivity()
|
|
|
|
name = util.CleanPath(name)
|
|
if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) {
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
|
|
fi, err := c.DoStat(name, 0, true)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return fi, err
|
|
}
|
|
|
|
// RemoveAll removes path and any children it contains.
|
|
// If the path does not exist, RemoveAll returns nil (no error).
|
|
func (c *Connection) RemoveAll(ctx context.Context, name string) error {
|
|
c.UpdateLastActivity()
|
|
|
|
name = util.CleanPath(name)
|
|
fs, p, err := c.GetFsAndResolvedPath(name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var fi os.FileInfo
|
|
if fi, err = fs.Lstat(p); err != nil {
|
|
c.Log(logger.LevelDebug, "failed to remove file %#v: stat error: %+v", p, err)
|
|
return c.GetFsError(fs, err)
|
|
}
|
|
|
|
if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
|
|
return c.removeDirTree(fs, p, name)
|
|
}
|
|
return c.RemoveFile(fs, p, name, fi)
|
|
}
|
|
|
|
// OpenFile opens the named file with specified flag.
|
|
// This method is used for uploads and downloads but also for Stat and Readdir
|
|
func (c *Connection) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (webdav.File, error) {
|
|
c.UpdateLastActivity()
|
|
|
|
name = util.CleanPath(name)
|
|
fs, p, err := c.GetFsAndResolvedPath(name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if flag == os.O_RDONLY || c.request.Method == "PROPPATCH" {
|
|
// Download, Stat, Readdir or simply open/close
|
|
return c.getFile(fs, p, name)
|
|
}
|
|
return c.putFile(fs, p, name)
|
|
}
|
|
|
|
func (c *Connection) getFile(fs vfs.Fs, fsPath, virtualPath string) (webdav.File, error) {
|
|
var err error
|
|
var file vfs.File
|
|
var r *pipeat.PipeReaderAt
|
|
var cancelFn func()
|
|
|
|
// for cloud fs we open the file when we receive the first read to avoid to download the first part of
|
|
// the file if it was opened only to do a stat or a readdir and so it is not a real download
|
|
if vfs.IsLocalOrUnbufferedSFTPFs(fs) {
|
|
file, r, cancelFn, err = fs.Open(fsPath, 0)
|
|
if err != nil {
|
|
c.Log(logger.LevelError, "could not open file %#v for reading: %+v", fsPath, err)
|
|
return nil, c.GetFsError(fs, err)
|
|
}
|
|
}
|
|
|
|
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, fsPath, virtualPath,
|
|
common.TransferDownload, 0, 0, 0, 0, false, fs, c.GetTransferQuota())
|
|
|
|
return newWebDavFile(baseTransfer, nil, r), nil
|
|
}
|
|
|
|
func (c *Connection) putFile(fs vfs.Fs, fsPath, virtualPath string) (webdav.File, error) {
|
|
if ok, _ := c.User.IsFileAllowed(virtualPath); !ok {
|
|
c.Log(logger.LevelWarn, "writing file %#v is not allowed", virtualPath)
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
|
|
filePath := fsPath
|
|
if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
|
|
filePath = fs.GetAtomicUploadPath(fsPath)
|
|
}
|
|
|
|
stat, statErr := fs.Lstat(fsPath)
|
|
if (statErr == nil && stat.Mode()&os.ModeSymlink != 0) || fs.IsNotExist(statErr) {
|
|
if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(virtualPath)) {
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
return c.handleUploadToNewFile(fs, fsPath, filePath, virtualPath)
|
|
}
|
|
|
|
if statErr != nil {
|
|
c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr)
|
|
return nil, c.GetFsError(fs, statErr)
|
|
}
|
|
|
|
// This happen if we upload a file that has the same name of an existing directory
|
|
if stat.IsDir() {
|
|
c.Log(logger.LevelError, "attempted to open a directory for writing to: %#v", fsPath)
|
|
return nil, c.GetOpUnsupportedError()
|
|
}
|
|
|
|
if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(virtualPath)) {
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
|
|
return c.handleUploadToExistingFile(fs, fsPath, filePath, stat.Size(), virtualPath)
|
|
}
|
|
|
|
func (c *Connection) handleUploadToNewFile(fs vfs.Fs, resolvedPath, filePath, requestPath string) (webdav.File, error) {
|
|
diskQuota, transferQuota := c.HasSpace(true, false, requestPath)
|
|
if !diskQuota.HasSpace || !transferQuota.HasUploadSpace() {
|
|
c.Log(logger.LevelInfo, "denying file write due to quota limits")
|
|
return nil, common.ErrQuotaExceeded
|
|
}
|
|
if err := common.ExecutePreAction(c.BaseConnection, common.OperationPreUpload, resolvedPath, requestPath, 0, 0); err != nil {
|
|
c.Log(logger.LevelDebug, "upload for file %#v denied by pre action: %v", requestPath, err)
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
file, w, cancelFn, err := fs.Create(filePath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC)
|
|
if err != nil {
|
|
c.Log(logger.LevelError, "error creating file %#v: %+v", resolvedPath, err)
|
|
return nil, c.GetFsError(fs, err)
|
|
}
|
|
|
|
vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
|
|
|
|
// we can get an error only for resume
|
|
maxWriteSize, _ := c.GetMaxWriteSize(diskQuota, false, 0, fs.IsUploadResumeSupported())
|
|
|
|
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, filePath, requestPath,
|
|
common.TransferUpload, 0, 0, maxWriteSize, 0, true, fs, transferQuota)
|
|
|
|
return newWebDavFile(baseTransfer, w, nil), nil
|
|
}
|
|
|
|
func (c *Connection) handleUploadToExistingFile(fs vfs.Fs, resolvedPath, filePath string, fileSize int64,
|
|
requestPath string,
|
|
) (webdav.File, error) {
|
|
var err error
|
|
diskQuota, transferQuota := c.HasSpace(false, false, requestPath)
|
|
if !diskQuota.HasSpace || !transferQuota.HasUploadSpace() {
|
|
c.Log(logger.LevelInfo, "denying file write due to quota limits")
|
|
return nil, common.ErrQuotaExceeded
|
|
}
|
|
if err := common.ExecutePreAction(c.BaseConnection, common.OperationPreUpload, resolvedPath, requestPath,
|
|
fileSize, os.O_TRUNC); err != nil {
|
|
c.Log(logger.LevelDebug, "upload for file %#v denied by pre action: %v", requestPath, err)
|
|
return nil, c.GetPermissionDeniedError()
|
|
}
|
|
|
|
// if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace
|
|
// will return false in this case and we deny the upload before
|
|
maxWriteSize, _ := c.GetMaxWriteSize(diskQuota, false, fileSize, fs.IsUploadResumeSupported())
|
|
|
|
if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
|
|
err = fs.Rename(resolvedPath, filePath)
|
|
if err != nil {
|
|
c.Log(logger.LevelError, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v",
|
|
resolvedPath, filePath, err)
|
|
return nil, c.GetFsError(fs, err)
|
|
}
|
|
}
|
|
|
|
file, w, cancelFn, err := fs.Create(filePath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC)
|
|
if err != nil {
|
|
c.Log(logger.LevelError, "error creating file %#v: %+v", resolvedPath, err)
|
|
return nil, c.GetFsError(fs, err)
|
|
}
|
|
initialSize := int64(0)
|
|
truncatedSize := int64(0) // bytes truncated and not included in quota
|
|
if vfs.HasTruncateSupport(fs) {
|
|
vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath))
|
|
if err == nil {
|
|
dataprovider.UpdateVirtualFolderQuota(&vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck
|
|
if vfolder.IsIncludedInUserQuota() {
|
|
dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
|
|
}
|
|
} else {
|
|
dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
|
|
}
|
|
} else {
|
|
initialSize = fileSize
|
|
truncatedSize = fileSize
|
|
}
|
|
|
|
vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
|
|
|
|
baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, filePath, requestPath,
|
|
common.TransferUpload, 0, initialSize, maxWriteSize, truncatedSize, false, fs, transferQuota)
|
|
|
|
return newWebDavFile(baseTransfer, w, nil), nil
|
|
}
|
|
|
|
type objectMapping struct {
|
|
fsPath string
|
|
virtualPath string
|
|
info os.FileInfo
|
|
}
|
|
|
|
func (c *Connection) removeDirTree(fs vfs.Fs, fsPath, virtualPath string) error {
|
|
var dirsToRemove []objectMapping
|
|
var filesToRemove []objectMapping
|
|
|
|
err := fs.Walk(fsPath, func(walkedPath string, info os.FileInfo, err error) error {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
obj := objectMapping{
|
|
fsPath: walkedPath,
|
|
virtualPath: fs.GetRelativePath(walkedPath),
|
|
info: info,
|
|
}
|
|
if info.IsDir() {
|
|
err = c.IsRemoveDirAllowed(fs, obj.fsPath, obj.virtualPath)
|
|
isDuplicated := false
|
|
for _, d := range dirsToRemove {
|
|
if d.fsPath == obj.fsPath {
|
|
isDuplicated = true
|
|
break
|
|
}
|
|
}
|
|
if !isDuplicated {
|
|
dirsToRemove = append(dirsToRemove, obj)
|
|
}
|
|
} else {
|
|
err = c.IsRemoveFileAllowed(obj.virtualPath)
|
|
filesToRemove = append(filesToRemove, obj)
|
|
}
|
|
if err != nil {
|
|
c.Log(logger.LevelDebug, "unable to remove dir tree, object %#v->%#v cannot be removed: %v",
|
|
virtualPath, fsPath, err)
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
c.Log(logger.LevelError, "failed to remove dir tree %#v->%#v: error: %+v", virtualPath, fsPath, err)
|
|
return err
|
|
}
|
|
|
|
for _, fileObj := range filesToRemove {
|
|
err = c.RemoveFile(fs, fileObj.fsPath, fileObj.virtualPath, fileObj.info)
|
|
if err != nil {
|
|
c.Log(logger.LevelDebug, "unable to remove dir tree, error removing file %#v->%#v: %v",
|
|
fileObj.virtualPath, fileObj.fsPath, err)
|
|
return err
|
|
}
|
|
}
|
|
|
|
for _, dirObj := range c.orderDirsToRemove(fs, dirsToRemove) {
|
|
err = c.RemoveDir(dirObj.virtualPath)
|
|
if err != nil {
|
|
c.Log(logger.LevelDebug, "unable to remove dir tree, error removing directory %#v->%#v: %v",
|
|
dirObj.virtualPath, dirObj.fsPath, err)
|
|
return err
|
|
}
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// order directories so that the empty ones will be at slice start
|
|
func (c *Connection) orderDirsToRemove(fs vfs.Fs, dirsToRemove []objectMapping) []objectMapping {
|
|
orderedDirs := make([]objectMapping, 0, len(dirsToRemove))
|
|
removedDirs := make([]string, 0, len(dirsToRemove))
|
|
|
|
pathSeparator := "/"
|
|
if vfs.IsLocalOsFs(fs) {
|
|
pathSeparator = string(os.PathSeparator)
|
|
}
|
|
|
|
for len(orderedDirs) < len(dirsToRemove) {
|
|
for idx, d := range dirsToRemove {
|
|
if util.Contains(removedDirs, d.fsPath) {
|
|
continue
|
|
}
|
|
isEmpty := true
|
|
for idx1, d1 := range dirsToRemove {
|
|
if idx == idx1 {
|
|
continue
|
|
}
|
|
if util.Contains(removedDirs, d1.fsPath) {
|
|
continue
|
|
}
|
|
if strings.HasPrefix(d1.fsPath, d.fsPath+pathSeparator) {
|
|
isEmpty = false
|
|
break
|
|
}
|
|
}
|
|
if isEmpty {
|
|
orderedDirs = append(orderedDirs, d)
|
|
removedDirs = append(removedDirs, d.fsPath)
|
|
}
|
|
}
|
|
}
|
|
|
|
return orderedDirs
|
|
}
|