api_maintenance.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373
  1. package httpd
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "io"
  7. "net/http"
  8. "os"
  9. "path/filepath"
  10. "strconv"
  11. "strings"
  12. "github.com/go-chi/render"
  13. "github.com/drakkan/sftpgo/v2/common"
  14. "github.com/drakkan/sftpgo/v2/dataprovider"
  15. "github.com/drakkan/sftpgo/v2/logger"
  16. "github.com/drakkan/sftpgo/v2/util"
  17. "github.com/drakkan/sftpgo/v2/vfs"
  18. )
  19. func validateBackupFile(outputFile string) (string, error) {
  20. if outputFile == "" {
  21. return "", errors.New("invalid or missing output-file")
  22. }
  23. if filepath.IsAbs(outputFile) {
  24. return "", fmt.Errorf("invalid output-file %#v: it must be a relative path", outputFile)
  25. }
  26. if strings.Contains(outputFile, "..") {
  27. return "", fmt.Errorf("invalid output-file %#v", outputFile)
  28. }
  29. outputFile = filepath.Join(backupsPath, outputFile)
  30. return outputFile, nil
  31. }
  32. func dumpData(w http.ResponseWriter, r *http.Request) {
  33. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  34. var outputFile, outputData, indent string
  35. if _, ok := r.URL.Query()["output-file"]; ok {
  36. outputFile = strings.TrimSpace(r.URL.Query().Get("output-file"))
  37. }
  38. if _, ok := r.URL.Query()["output-data"]; ok {
  39. outputData = strings.TrimSpace(r.URL.Query().Get("output-data"))
  40. }
  41. if _, ok := r.URL.Query()["indent"]; ok {
  42. indent = strings.TrimSpace(r.URL.Query().Get("indent"))
  43. }
  44. if outputData != "1" {
  45. var err error
  46. outputFile, err = validateBackupFile(outputFile)
  47. if err != nil {
  48. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  49. return
  50. }
  51. err = os.MkdirAll(filepath.Dir(outputFile), 0700)
  52. if err != nil {
  53. logger.Warn(logSender, "", "dumping data error: %v, output file: %#v", err, outputFile)
  54. sendAPIResponse(w, r, err, "", getRespStatus(err))
  55. return
  56. }
  57. logger.Debug(logSender, "", "dumping data to: %#v", outputFile)
  58. }
  59. backup, err := dataprovider.DumpData()
  60. if err != nil {
  61. logger.Warn(logSender, "", "dumping data error: %v, output file: %#v", err, outputFile)
  62. sendAPIResponse(w, r, err, "", getRespStatus(err))
  63. return
  64. }
  65. if outputData == "1" {
  66. w.Header().Set("Content-Disposition", "attachment; filename=\"sftpgo-backup.json\"")
  67. render.JSON(w, r, backup)
  68. return
  69. }
  70. var dump []byte
  71. if indent == "1" {
  72. dump, err = json.MarshalIndent(backup, "", " ")
  73. } else {
  74. dump, err = json.Marshal(backup)
  75. }
  76. if err == nil {
  77. err = os.WriteFile(outputFile, dump, 0600)
  78. }
  79. if err != nil {
  80. logger.Warn(logSender, "", "dumping data error: %v, output file: %#v", err, outputFile)
  81. sendAPIResponse(w, r, err, "", getRespStatus(err))
  82. return
  83. }
  84. logger.Debug(logSender, "", "dumping data completed, output file: %#v, error: %v", outputFile, err)
  85. sendAPIResponse(w, r, err, "Data saved", http.StatusOK)
  86. }
  87. func loadDataFromRequest(w http.ResponseWriter, r *http.Request) {
  88. r.Body = http.MaxBytesReader(w, r.Body, MaxRestoreSize)
  89. claims, err := getTokenClaims(r)
  90. if err != nil || claims.Username == "" {
  91. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  92. return
  93. }
  94. _, scanQuota, mode, err := getLoaddataOptions(r)
  95. if err != nil {
  96. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  97. return
  98. }
  99. content, err := io.ReadAll(r.Body)
  100. if err != nil || len(content) == 0 {
  101. if len(content) == 0 {
  102. err = util.NewValidationError("request body is required")
  103. }
  104. sendAPIResponse(w, r, err, "", getRespStatus(err))
  105. return
  106. }
  107. if err := restoreBackup(content, "", scanQuota, mode, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  108. sendAPIResponse(w, r, err, "", getRespStatus(err))
  109. }
  110. sendAPIResponse(w, r, err, "Data restored", http.StatusOK)
  111. }
  112. func loadData(w http.ResponseWriter, r *http.Request) {
  113. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  114. claims, err := getTokenClaims(r)
  115. if err != nil || claims.Username == "" {
  116. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  117. return
  118. }
  119. inputFile, scanQuota, mode, err := getLoaddataOptions(r)
  120. if err != nil {
  121. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  122. return
  123. }
  124. if !filepath.IsAbs(inputFile) {
  125. sendAPIResponse(w, r, fmt.Errorf("invalid input_file %#v: it must be an absolute path", inputFile), "", http.StatusBadRequest)
  126. return
  127. }
  128. fi, err := os.Stat(inputFile)
  129. if err != nil {
  130. sendAPIResponse(w, r, err, "", getRespStatus(err))
  131. return
  132. }
  133. if fi.Size() > MaxRestoreSize {
  134. sendAPIResponse(w, r, err, fmt.Sprintf("Unable to restore input file: %#v size too big: %v/%v bytes",
  135. inputFile, fi.Size(), MaxRestoreSize), http.StatusBadRequest)
  136. return
  137. }
  138. content, err := os.ReadFile(inputFile)
  139. if err != nil {
  140. sendAPIResponse(w, r, err, "", getRespStatus(err))
  141. return
  142. }
  143. if err := restoreBackup(content, inputFile, scanQuota, mode, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  144. sendAPIResponse(w, r, err, "", getRespStatus(err))
  145. }
  146. sendAPIResponse(w, r, err, "Data restored", http.StatusOK)
  147. }
  148. func restoreBackup(content []byte, inputFile string, scanQuota, mode int, executor, ipAddress string) error {
  149. dump, err := dataprovider.ParseDumpData(content)
  150. if err != nil {
  151. return util.NewValidationError(fmt.Sprintf("Unable to parse backup content: %v", err))
  152. }
  153. if err = RestoreFolders(dump.Folders, inputFile, mode, scanQuota, executor, ipAddress); err != nil {
  154. return err
  155. }
  156. if err = RestoreUsers(dump.Users, inputFile, mode, scanQuota, executor, ipAddress); err != nil {
  157. return err
  158. }
  159. if err = RestoreAdmins(dump.Admins, inputFile, mode, executor, ipAddress); err != nil {
  160. return err
  161. }
  162. if err = RestoreAPIKeys(dump.APIKeys, inputFile, mode, executor, ipAddress); err != nil {
  163. return err
  164. }
  165. if err = RestoreShares(dump.Shares, inputFile, mode, executor, ipAddress); err != nil {
  166. return err
  167. }
  168. logger.Debug(logSender, "", "backup restored, users: %v, folders: %v, admins: %vs",
  169. len(dump.Users), len(dump.Folders), len(dump.Admins))
  170. return nil
  171. }
  172. func getLoaddataOptions(r *http.Request) (string, int, int, error) {
  173. var inputFile string
  174. var err error
  175. scanQuota := 0
  176. restoreMode := 0
  177. if _, ok := r.URL.Query()["input-file"]; ok {
  178. inputFile = strings.TrimSpace(r.URL.Query().Get("input-file"))
  179. }
  180. if _, ok := r.URL.Query()["scan-quota"]; ok {
  181. scanQuota, err = strconv.Atoi(r.URL.Query().Get("scan-quota"))
  182. if err != nil {
  183. err = fmt.Errorf("invalid scan_quota: %v", err)
  184. return inputFile, scanQuota, restoreMode, err
  185. }
  186. }
  187. if _, ok := r.URL.Query()["mode"]; ok {
  188. restoreMode, err = strconv.Atoi(r.URL.Query().Get("mode"))
  189. if err != nil {
  190. err = fmt.Errorf("invalid mode: %v", err)
  191. return inputFile, scanQuota, restoreMode, err
  192. }
  193. }
  194. return inputFile, scanQuota, restoreMode, err
  195. }
  196. // RestoreFolders restores the specified folders
  197. func RestoreFolders(folders []vfs.BaseVirtualFolder, inputFile string, mode, scanQuota int, executor, ipAddress string) error {
  198. for _, folder := range folders {
  199. folder := folder // pin
  200. f, err := dataprovider.GetFolderByName(folder.Name)
  201. if err == nil {
  202. if mode == 1 {
  203. logger.Debug(logSender, "", "loaddata mode 1, existing folder %#v not updated", folder.Name)
  204. continue
  205. }
  206. folder.ID = f.ID
  207. folder.Name = f.Name
  208. err = dataprovider.UpdateFolder(&folder, f.Users, executor, ipAddress)
  209. logger.Debug(logSender, "", "restoring existing folder: %+v, dump file: %#v, error: %v", folder, inputFile, err)
  210. } else {
  211. folder.Users = nil
  212. err = dataprovider.AddFolder(&folder)
  213. logger.Debug(logSender, "", "adding new folder: %+v, dump file: %#v, error: %v", folder, inputFile, err)
  214. }
  215. if err != nil {
  216. return fmt.Errorf("unable to restore folder %#v: %w", folder.Name, err)
  217. }
  218. if scanQuota >= 1 {
  219. if common.QuotaScans.AddVFolderQuotaScan(folder.Name) {
  220. logger.Debug(logSender, "", "starting quota scan for restored folder: %#v", folder.Name)
  221. go doFolderQuotaScan(folder) //nolint:errcheck
  222. }
  223. }
  224. }
  225. return nil
  226. }
  227. // RestoreShares restores the specified shares
  228. func RestoreShares(shares []dataprovider.Share, inputFile string, mode int, executor,
  229. ipAddress string,
  230. ) error {
  231. for _, share := range shares {
  232. share := share // pin
  233. share.IsRestore = true
  234. s, err := dataprovider.ShareExists(share.ShareID, "")
  235. if err == nil {
  236. if mode == 1 {
  237. logger.Debug(logSender, "", "loaddata mode 1, existing share %#v not updated", share.ShareID)
  238. continue
  239. }
  240. share.ID = s.ID
  241. err = dataprovider.UpdateShare(&share, executor, ipAddress)
  242. share.Password = redactedSecret
  243. logger.Debug(logSender, "", "restoring existing share: %+v, dump file: %#v, error: %v", share, inputFile, err)
  244. } else {
  245. err = dataprovider.AddShare(&share, executor, ipAddress)
  246. share.Password = redactedSecret
  247. logger.Debug(logSender, "", "adding new share: %+v, dump file: %#v, error: %v", share, inputFile, err)
  248. }
  249. if err != nil {
  250. return fmt.Errorf("unable to restore share %#v: %w", share.ShareID, err)
  251. }
  252. }
  253. return nil
  254. }
  255. // RestoreAPIKeys restores the specified API keys
  256. func RestoreAPIKeys(apiKeys []dataprovider.APIKey, inputFile string, mode int, executor, ipAddress string) error {
  257. for _, apiKey := range apiKeys {
  258. apiKey := apiKey // pin
  259. if apiKey.Key == "" {
  260. logger.Warn(logSender, "", "cannot restore empty API key")
  261. return fmt.Errorf("cannot restore an empty API key: %+v", apiKey)
  262. }
  263. k, err := dataprovider.APIKeyExists(apiKey.KeyID)
  264. if err == nil {
  265. if mode == 1 {
  266. logger.Debug(logSender, "", "loaddata mode 1, existing API key %#v not updated", apiKey.KeyID)
  267. continue
  268. }
  269. apiKey.ID = k.ID
  270. err = dataprovider.UpdateAPIKey(&apiKey, executor, ipAddress)
  271. apiKey.Key = redactedSecret
  272. logger.Debug(logSender, "", "restoring existing API key: %+v, dump file: %#v, error: %v", apiKey, inputFile, err)
  273. } else {
  274. err = dataprovider.AddAPIKey(&apiKey, executor, ipAddress)
  275. apiKey.Key = redactedSecret
  276. logger.Debug(logSender, "", "adding new API key: %+v, dump file: %#v, error: %v", apiKey, inputFile, err)
  277. }
  278. if err != nil {
  279. return fmt.Errorf("unable to restore API key %#v: %w", apiKey.KeyID, err)
  280. }
  281. }
  282. return nil
  283. }
  284. // RestoreAdmins restores the specified admins
  285. func RestoreAdmins(admins []dataprovider.Admin, inputFile string, mode int, executor, ipAddress string) error {
  286. for _, admin := range admins {
  287. admin := admin // pin
  288. a, err := dataprovider.AdminExists(admin.Username)
  289. if err == nil {
  290. if mode == 1 {
  291. logger.Debug(logSender, "", "loaddata mode 1, existing admin %#v not updated", a.Username)
  292. continue
  293. }
  294. admin.ID = a.ID
  295. admin.Username = a.Username
  296. err = dataprovider.UpdateAdmin(&admin, executor, ipAddress)
  297. admin.Password = redactedSecret
  298. logger.Debug(logSender, "", "restoring existing admin: %+v, dump file: %#v, error: %v", admin, inputFile, err)
  299. } else {
  300. err = dataprovider.AddAdmin(&admin, executor, ipAddress)
  301. admin.Password = redactedSecret
  302. logger.Debug(logSender, "", "adding new admin: %+v, dump file: %#v, error: %v", admin, inputFile, err)
  303. }
  304. if err != nil {
  305. return fmt.Errorf("unable to restore admin %#v: %w", admin.Username, err)
  306. }
  307. }
  308. return nil
  309. }
  310. // RestoreUsers restores the specified users
  311. func RestoreUsers(users []dataprovider.User, inputFile string, mode, scanQuota int, executor, ipAddress string) error {
  312. for _, user := range users {
  313. user := user // pin
  314. u, err := dataprovider.UserExists(user.Username)
  315. if err == nil {
  316. if mode == 1 {
  317. logger.Debug(logSender, "", "loaddata mode 1, existing user %#v not updated", u.Username)
  318. continue
  319. }
  320. user.ID = u.ID
  321. user.Username = u.Username
  322. err = dataprovider.UpdateUser(&user, executor, ipAddress)
  323. user.Password = redactedSecret
  324. logger.Debug(logSender, "", "restoring existing user: %+v, dump file: %#v, error: %v", user, inputFile, err)
  325. if mode == 2 && err == nil {
  326. disconnectUser(user.Username)
  327. }
  328. } else {
  329. err = dataprovider.AddUser(&user, executor, ipAddress)
  330. user.Password = redactedSecret
  331. logger.Debug(logSender, "", "adding new user: %+v, dump file: %#v, error: %v", user, inputFile, err)
  332. }
  333. if err != nil {
  334. return fmt.Errorf("unable to restoreuser %#v: %w", user.Username, err)
  335. }
  336. if scanQuota == 1 || (scanQuota == 2 && user.HasQuotaRestrictions()) {
  337. if common.QuotaScans.AddUserQuotaScan(user.Username) {
  338. logger.Debug(logSender, "", "starting quota scan for restored user: %#v", user.Username)
  339. go doUserQuotaScan(user) //nolint:errcheck
  340. }
  341. }
  342. }
  343. return nil
  344. }