| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812 | 
							- package sftpd
 
- import (
 
- 	"crypto/md5"
 
- 	"crypto/sha1"
 
- 	"crypto/sha256"
 
- 	"crypto/sha512"
 
- 	"errors"
 
- 	"fmt"
 
- 	"hash"
 
- 	"io"
 
- 	"os"
 
- 	"os/exec"
 
- 	"path"
 
- 	"runtime/debug"
 
- 	"strings"
 
- 	"sync"
 
- 	"github.com/google/shlex"
 
- 	fscopy "github.com/otiai10/copy"
 
- 	"github.com/sftpgo/sdk"
 
- 	"golang.org/x/crypto/ssh"
 
- 	"github.com/drakkan/sftpgo/v2/common"
 
- 	"github.com/drakkan/sftpgo/v2/dataprovider"
 
- 	"github.com/drakkan/sftpgo/v2/logger"
 
- 	"github.com/drakkan/sftpgo/v2/metric"
 
- 	"github.com/drakkan/sftpgo/v2/util"
 
- 	"github.com/drakkan/sftpgo/v2/vfs"
 
- )
 
- const (
 
- 	scpCmdName          = "scp"
 
- 	sshCommandLogSender = "SSHCommand"
 
- )
 
- var (
 
- 	errUnsupportedConfig = errors.New("command unsupported for this configuration")
 
- )
 
- type sshCommand struct {
 
- 	command    string
 
- 	args       []string
 
- 	connection *Connection
 
- }
 
- type systemCommand struct {
 
- 	cmd            *exec.Cmd
 
- 	fsPath         string
 
- 	quotaCheckPath string
 
- 	fs             vfs.Fs
 
- }
 
- func (c *systemCommand) GetSTDs() (io.WriteCloser, io.ReadCloser, io.ReadCloser, error) {
 
- 	stdin, err := c.cmd.StdinPipe()
 
- 	if err != nil {
 
- 		return nil, nil, nil, err
 
- 	}
 
- 	stdout, err := c.cmd.StdoutPipe()
 
- 	if err != nil {
 
- 		stdin.Close()
 
- 		return nil, nil, nil, err
 
- 	}
 
- 	stderr, err := c.cmd.StderrPipe()
 
- 	if err != nil {
 
- 		stdin.Close()
 
- 		stdout.Close()
 
- 		return nil, nil, nil, err
 
- 	}
 
- 	return stdin, stdout, stderr, nil
 
- }
 
- func processSSHCommand(payload []byte, connection *Connection, enabledSSHCommands []string) bool {
 
- 	var msg sshSubsystemExecMsg
 
- 	if err := ssh.Unmarshal(payload, &msg); err == nil {
 
- 		name, args, err := parseCommandPayload(msg.Command)
 
- 		connection.Log(logger.LevelDebug, "new ssh command: %#v args: %v num args: %v user: %v, error: %v",
 
- 			name, args, len(args), connection.User.Username, err)
 
- 		if err == nil && util.Contains(enabledSSHCommands, name) {
 
- 			connection.command = msg.Command
 
- 			if name == scpCmdName && len(args) >= 2 {
 
- 				connection.SetProtocol(common.ProtocolSCP)
 
- 				scpCommand := scpCommand{
 
- 					sshCommand: sshCommand{
 
- 						command:    name,
 
- 						connection: connection,
 
- 						args:       args},
 
- 				}
 
- 				go scpCommand.handle() //nolint:errcheck
 
- 				return true
 
- 			}
 
- 			if name != scpCmdName {
 
- 				connection.SetProtocol(common.ProtocolSSH)
 
- 				sshCommand := sshCommand{
 
- 					command:    name,
 
- 					connection: connection,
 
- 					args:       args,
 
- 				}
 
- 				go sshCommand.handle() //nolint:errcheck
 
- 				return true
 
- 			}
 
- 		} else {
 
- 			connection.Log(logger.LevelInfo, "ssh command not enabled/supported: %#v", name)
 
- 		}
 
- 	}
 
- 	err := connection.CloseFS()
 
- 	connection.Log(logger.LevelError, "unable to unmarshal ssh command, close fs, err: %v", err)
 
- 	return false
 
- }
 
- func (c *sshCommand) handle() (err error) {
 
- 	defer func() {
 
- 		if r := recover(); r != nil {
 
- 			logger.Error(logSender, "", "panic in handle ssh command: %#v stack trace: %v", r, string(debug.Stack()))
 
- 			err = common.ErrGenericFailure
 
- 		}
 
- 	}()
 
- 	if err := common.Connections.Add(c.connection); err != nil {
 
- 		logger.Info(logSender, "", "unable to add SSH command connection: %v", err)
 
- 		return err
 
- 	}
 
- 	defer common.Connections.Remove(c.connection.GetID())
 
- 	c.connection.UpdateLastActivity()
 
- 	if util.Contains(sshHashCommands, c.command) {
 
- 		return c.handleHashCommands()
 
- 	} else if util.Contains(systemCommands, c.command) {
 
- 		command, err := c.getSystemCommand()
 
- 		if err != nil {
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		return c.executeSystemCommand(command)
 
- 	} else if c.command == "cd" {
 
- 		c.sendExitStatus(nil)
 
- 	} else if c.command == "pwd" {
 
- 		// hard coded response to "/"
 
- 		c.connection.channel.Write([]byte(util.CleanPath(c.connection.User.Filters.StartDirectory) + "\n")) //nolint:errcheck
 
- 		c.sendExitStatus(nil)
 
- 	} else if c.command == "sftpgo-copy" {
 
- 		return c.handleSFTPGoCopy()
 
- 	} else if c.command == "sftpgo-remove" {
 
- 		return c.handleSFTPGoRemove()
 
- 	}
 
- 	return
 
- }
 
- func (c *sshCommand) handleSFTPGoCopy() error {
 
- 	fsSrc, fsDst, sshSourcePath, sshDestPath, fsSourcePath, fsDestPath, err := c.getFsAndCopyPaths()
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	if !c.isLocalCopy(sshSourcePath, sshDestPath) {
 
- 		return c.sendErrorResponse(errUnsupportedConfig)
 
- 	}
 
- 	if err := c.checkCopyDestination(fsDst, fsDestPath); err != nil {
 
- 		return c.sendErrorResponse(c.connection.GetFsError(fsDst, err))
 
- 	}
 
- 	c.connection.Log(logger.LevelDebug, "requested copy %#v -> %#v sftp paths %#v -> %#v",
 
- 		fsSourcePath, fsDestPath, sshSourcePath, sshDestPath)
 
- 	fi, err := fsSrc.Lstat(fsSourcePath)
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(c.connection.GetFsError(fsSrc, err))
 
- 	}
 
- 	if err := c.checkCopyPermissions(fsSrc, fsDst, fsSourcePath, fsDestPath, sshSourcePath, sshDestPath, fi); err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	filesNum := 0
 
- 	filesSize := int64(0)
 
- 	if fi.IsDir() {
 
- 		filesNum, filesSize, err = fsSrc.GetDirSize(fsSourcePath)
 
- 		if err != nil {
 
- 			return c.sendErrorResponse(c.connection.GetFsError(fsSrc, err))
 
- 		}
 
- 		if c.connection.User.HasVirtualFoldersInside(sshSourcePath) {
 
- 			err := errors.New("unsupported copy source: the source directory contains virtual folders")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		if c.connection.User.HasVirtualFoldersInside(sshDestPath) {
 
- 			err := errors.New("unsupported copy source: the destination directory contains virtual folders")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 	} else if fi.Mode().IsRegular() {
 
- 		if ok, _ := c.connection.User.IsFileAllowed(sshDestPath); !ok {
 
- 			err := errors.New("unsupported copy destination: this file is not allowed")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		filesNum = 1
 
- 		filesSize = fi.Size()
 
- 	} else {
 
- 		err := errors.New("unsupported copy source: only files and directories are supported")
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	if err := c.checkCopyQuota(filesNum, filesSize, sshDestPath); err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	c.connection.Log(logger.LevelDebug, "start copy %#v -> %#v", fsSourcePath, fsDestPath)
 
- 	err = fscopy.Copy(fsSourcePath, fsDestPath, fscopy.Options{
 
- 		OnSymlink: func(src string) fscopy.SymlinkAction {
 
- 			return fscopy.Skip
 
- 		},
 
- 	})
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(c.connection.GetFsError(fsSrc, err))
 
- 	}
 
- 	c.updateQuota(sshDestPath, filesNum, filesSize)
 
- 	c.connection.channel.Write([]byte("OK\n")) //nolint:errcheck
 
- 	c.sendExitStatus(nil)
 
- 	return nil
 
- }
 
- func (c *sshCommand) handleSFTPGoRemove() error {
 
- 	sshDestPath, err := c.getRemovePath()
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	if !c.connection.User.HasPerm(dataprovider.PermDelete, path.Dir(sshDestPath)) {
 
- 		return c.sendErrorResponse(common.ErrPermissionDenied)
 
- 	}
 
- 	fs, fsDestPath, err := c.connection.GetFsAndResolvedPath(sshDestPath)
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	if !vfs.IsLocalOrCryptoFs(fs) {
 
- 		return c.sendErrorResponse(errUnsupportedConfig)
 
- 	}
 
- 	fi, err := fs.Lstat(fsDestPath)
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(c.connection.GetFsError(fs, err))
 
- 	}
 
- 	filesNum := 0
 
- 	filesSize := int64(0)
 
- 	if fi.IsDir() {
 
- 		filesNum, filesSize, err = fs.GetDirSize(fsDestPath)
 
- 		if err != nil {
 
- 			return c.sendErrorResponse(c.connection.GetFsError(fs, err))
 
- 		}
 
- 		if sshDestPath == "/" {
 
- 			err := errors.New("removing root dir is not allowed")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		if c.connection.User.HasVirtualFoldersInside(sshDestPath) {
 
- 			err := errors.New("unsupported remove source: this directory contains virtual folders")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		if c.connection.User.IsVirtualFolder(sshDestPath) {
 
- 			err := errors.New("unsupported remove source: this directory is a virtual folder")
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 	} else if fi.Mode().IsRegular() {
 
- 		filesNum = 1
 
- 		filesSize = fi.Size()
 
- 	} else {
 
- 		err := errors.New("unsupported remove source: only files and directories are supported")
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	err = os.RemoveAll(fsDestPath)
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	c.updateQuota(sshDestPath, -filesNum, -filesSize)
 
- 	c.connection.channel.Write([]byte("OK\n")) //nolint:errcheck
 
- 	c.sendExitStatus(nil)
 
- 	return nil
 
- }
 
- func (c *sshCommand) updateQuota(sshDestPath string, filesNum int, filesSize int64) {
 
- 	vfolder, err := c.connection.User.GetVirtualFolderForPath(sshDestPath)
 
- 	if err == nil {
 
- 		dataprovider.UpdateVirtualFolderQuota(&vfolder.BaseVirtualFolder, filesNum, filesSize, false) //nolint:errcheck
 
- 		if vfolder.IsIncludedInUserQuota() {
 
- 			dataprovider.UpdateUserQuota(&c.connection.User, filesNum, filesSize, false) //nolint:errcheck
 
- 		}
 
- 	} else {
 
- 		dataprovider.UpdateUserQuota(&c.connection.User, filesNum, filesSize, false) //nolint:errcheck
 
- 	}
 
- }
 
- func (c *sshCommand) handleHashCommands() error {
 
- 	var h hash.Hash
 
- 	if c.command == "md5sum" {
 
- 		h = md5.New()
 
- 	} else if c.command == "sha1sum" {
 
- 		h = sha1.New()
 
- 	} else if c.command == "sha256sum" {
 
- 		h = sha256.New()
 
- 	} else if c.command == "sha384sum" {
 
- 		h = sha512.New384()
 
- 	} else {
 
- 		h = sha512.New()
 
- 	}
 
- 	var response string
 
- 	if len(c.args) == 0 {
 
- 		// without args we need to read the string to hash from stdin
 
- 		buf := make([]byte, 4096)
 
- 		n, err := c.connection.channel.Read(buf)
 
- 		if err != nil && err != io.EOF {
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		h.Write(buf[:n]) //nolint:errcheck
 
- 		response = fmt.Sprintf("%x  -\n", h.Sum(nil))
 
- 	} else {
 
- 		sshPath := c.getDestPath()
 
- 		if ok, policy := c.connection.User.IsFileAllowed(sshPath); !ok {
 
- 			c.connection.Log(logger.LevelInfo, "hash not allowed for file %#v", sshPath)
 
- 			return c.sendErrorResponse(c.connection.GetErrorForDeniedFile(policy))
 
- 		}
 
- 		fs, fsPath, err := c.connection.GetFsAndResolvedPath(sshPath)
 
- 		if err != nil {
 
- 			return c.sendErrorResponse(err)
 
- 		}
 
- 		if !c.connection.User.HasPerm(dataprovider.PermListItems, sshPath) {
 
- 			return c.sendErrorResponse(c.connection.GetPermissionDeniedError())
 
- 		}
 
- 		hash, err := c.computeHashForFile(fs, h, fsPath)
 
- 		if err != nil {
 
- 			return c.sendErrorResponse(c.connection.GetFsError(fs, err))
 
- 		}
 
- 		response = fmt.Sprintf("%v  %v\n", hash, sshPath)
 
- 	}
 
- 	c.connection.channel.Write([]byte(response)) //nolint:errcheck
 
- 	c.sendExitStatus(nil)
 
- 	return nil
 
- }
 
- func (c *sshCommand) executeSystemCommand(command systemCommand) error {
 
- 	sshDestPath := c.getDestPath()
 
- 	if !c.isLocalPath(sshDestPath) {
 
- 		return c.sendErrorResponse(errUnsupportedConfig)
 
- 	}
 
- 	diskQuota, transferQuota := c.connection.HasSpace(true, false, command.quotaCheckPath)
 
- 	if !diskQuota.HasSpace || !transferQuota.HasUploadSpace() || !transferQuota.HasDownloadSpace() {
 
- 		return c.sendErrorResponse(common.ErrQuotaExceeded)
 
- 	}
 
- 	perms := []string{dataprovider.PermDownload, dataprovider.PermUpload, dataprovider.PermCreateDirs, dataprovider.PermListItems,
 
- 		dataprovider.PermOverwrite, dataprovider.PermDelete}
 
- 	if !c.connection.User.HasPerms(perms, sshDestPath) {
 
- 		return c.sendErrorResponse(c.connection.GetPermissionDeniedError())
 
- 	}
 
- 	initialFiles, initialSize, err := c.getSizeForPath(command.fs, command.fsPath)
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	stdin, stdout, stderr, err := command.GetSTDs()
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	err = command.cmd.Start()
 
- 	if err != nil {
 
- 		return c.sendErrorResponse(err)
 
- 	}
 
- 	closeCmdOnError := func() {
 
- 		c.connection.Log(logger.LevelDebug, "kill cmd: %#v and close ssh channel after read or write error",
 
- 			c.connection.command)
 
- 		killerr := command.cmd.Process.Kill()
 
- 		closerr := c.connection.channel.Close()
 
- 		c.connection.Log(logger.LevelDebug, "kill cmd error: %v close channel error: %v", killerr, closerr)
 
- 	}
 
- 	var once sync.Once
 
- 	commandResponse := make(chan bool)
 
- 	remainingQuotaSize := diskQuota.GetRemainingSize()
 
- 	go func() {
 
- 		defer stdin.Close()
 
- 		baseTransfer := common.NewBaseTransfer(nil, c.connection.BaseConnection, nil, command.fsPath, command.fsPath, sshDestPath,
 
- 			common.TransferUpload, 0, 0, remainingQuotaSize, 0, false, command.fs, transferQuota)
 
- 		transfer := newTransfer(baseTransfer, nil, nil, nil)
 
- 		w, e := transfer.copyFromReaderToWriter(stdin, c.connection.channel)
 
- 		c.connection.Log(logger.LevelDebug, "command: %#v, copy from remote command to sdtin ended, written: %v, "+
 
- 			"initial remaining quota: %v, err: %v", c.connection.command, w, remainingQuotaSize, e)
 
- 		if e != nil {
 
- 			once.Do(closeCmdOnError)
 
- 		}
 
- 	}()
 
- 	go func() {
 
- 		baseTransfer := common.NewBaseTransfer(nil, c.connection.BaseConnection, nil, command.fsPath, command.fsPath, sshDestPath,
 
- 			common.TransferDownload, 0, 0, 0, 0, false, command.fs, transferQuota)
 
- 		transfer := newTransfer(baseTransfer, nil, nil, nil)
 
- 		w, e := transfer.copyFromReaderToWriter(c.connection.channel, stdout)
 
- 		c.connection.Log(logger.LevelDebug, "command: %#v, copy from sdtout to remote command ended, written: %v err: %v",
 
- 			c.connection.command, w, e)
 
- 		if e != nil {
 
- 			once.Do(closeCmdOnError)
 
- 		}
 
- 		commandResponse <- true
 
- 	}()
 
- 	go func() {
 
- 		baseTransfer := common.NewBaseTransfer(nil, c.connection.BaseConnection, nil, command.fsPath, command.fsPath, sshDestPath,
 
- 			common.TransferDownload, 0, 0, 0, 0, false, command.fs, transferQuota)
 
- 		transfer := newTransfer(baseTransfer, nil, nil, nil)
 
- 		w, e := transfer.copyFromReaderToWriter(c.connection.channel.(ssh.Channel).Stderr(), stderr)
 
- 		c.connection.Log(logger.LevelDebug, "command: %#v, copy from sdterr to remote command ended, written: %v err: %v",
 
- 			c.connection.command, w, e)
 
- 		// os.ErrClosed means that the command is finished so we don't need to do anything
 
- 		if (e != nil && !errors.Is(e, os.ErrClosed)) || w > 0 {
 
- 			once.Do(closeCmdOnError)
 
- 		}
 
- 	}()
 
- 	<-commandResponse
 
- 	err = command.cmd.Wait()
 
- 	c.sendExitStatus(err)
 
- 	numFiles, dirSize, errSize := c.getSizeForPath(command.fs, command.fsPath)
 
- 	if errSize == nil {
 
- 		c.updateQuota(sshDestPath, numFiles-initialFiles, dirSize-initialSize)
 
- 	}
 
- 	c.connection.Log(logger.LevelDebug, "command %#v finished for path %#v, initial files %v initial size %v "+
 
- 		"current files %v current size %v size err: %v", c.connection.command, command.fsPath, initialFiles, initialSize,
 
- 		numFiles, dirSize, errSize)
 
- 	return c.connection.GetFsError(command.fs, err)
 
- }
 
- func (c *sshCommand) isSystemCommandAllowed() error {
 
- 	sshDestPath := c.getDestPath()
 
- 	if c.connection.User.IsVirtualFolder(sshDestPath) {
 
- 		// overlapped virtual path are not allowed
 
- 		return nil
 
- 	}
 
- 	if c.connection.User.HasVirtualFoldersInside(sshDestPath) {
 
- 		c.connection.Log(logger.LevelDebug, "command %#v is not allowed, path %#v has virtual folders inside it, user %#v",
 
- 			c.command, sshDestPath, c.connection.User.Username)
 
- 		return errUnsupportedConfig
 
- 	}
 
- 	for _, f := range c.connection.User.Filters.FilePatterns {
 
- 		if f.Path == sshDestPath {
 
- 			c.connection.Log(logger.LevelDebug,
 
- 				"command %#v is not allowed inside folders with file patterns filters %#v user %#v",
 
- 				c.command, sshDestPath, c.connection.User.Username)
 
- 			return errUnsupportedConfig
 
- 		}
 
- 		if len(sshDestPath) > len(f.Path) {
 
- 			if strings.HasPrefix(sshDestPath, f.Path+"/") || f.Path == "/" {
 
- 				c.connection.Log(logger.LevelDebug,
 
- 					"command %#v is not allowed it includes folders with file patterns filters %#v user %#v",
 
- 					c.command, sshDestPath, c.connection.User.Username)
 
- 				return errUnsupportedConfig
 
- 			}
 
- 		}
 
- 		if len(sshDestPath) < len(f.Path) {
 
- 			if strings.HasPrefix(sshDestPath+"/", f.Path) || sshDestPath == "/" {
 
- 				c.connection.Log(logger.LevelDebug,
 
- 					"command %#v is not allowed inside folder with file patterns filters %#v user %#v",
 
- 					c.command, sshDestPath, c.connection.User.Username)
 
- 				return errUnsupportedConfig
 
- 			}
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- func (c *sshCommand) getSystemCommand() (systemCommand, error) {
 
- 	command := systemCommand{
 
- 		cmd:            nil,
 
- 		fs:             nil,
 
- 		fsPath:         "",
 
- 		quotaCheckPath: "",
 
- 	}
 
- 	args := make([]string, len(c.args))
 
- 	copy(args, c.args)
 
- 	var fsPath, quotaPath string
 
- 	sshPath := c.getDestPath()
 
- 	fs, err := c.connection.User.GetFilesystemForPath(sshPath, c.connection.ID)
 
- 	if err != nil {
 
- 		return command, err
 
- 	}
 
- 	if len(c.args) > 0 {
 
- 		var err error
 
- 		fsPath, err = fs.ResolvePath(sshPath)
 
- 		if err != nil {
 
- 			return command, c.connection.GetFsError(fs, err)
 
- 		}
 
- 		quotaPath = sshPath
 
- 		fi, err := fs.Stat(fsPath)
 
- 		if err == nil && fi.IsDir() {
 
- 			// if the target is an existing dir the command will write inside this dir
 
- 			// so we need to check the quota for this directory and not its parent dir
 
- 			quotaPath = path.Join(sshPath, "fakecontent")
 
- 		}
 
- 		if strings.HasSuffix(sshPath, "/") && !strings.HasSuffix(fsPath, string(os.PathSeparator)) {
 
- 			fsPath += string(os.PathSeparator)
 
- 			c.connection.Log(logger.LevelDebug, "path separator added to fsPath %#v", fsPath)
 
- 		}
 
- 		args = args[:len(args)-1]
 
- 		args = append(args, fsPath)
 
- 	}
 
- 	if err := c.isSystemCommandAllowed(); err != nil {
 
- 		return command, errUnsupportedConfig
 
- 	}
 
- 	if c.command == "rsync" {
 
- 		// we cannot avoid that rsync creates symlinks so if the user has the permission
 
- 		// to create symlinks we add the option --safe-links to the received rsync command if
 
- 		// it is not already set. This should prevent to create symlinks that point outside
 
- 		// the home dir.
 
- 		// If the user cannot create symlinks we add the option --munge-links, if it is not
 
- 		// already set. This should make symlinks unusable (but manually recoverable)
 
- 		if c.connection.User.HasPerm(dataprovider.PermCreateSymlinks, c.getDestPath()) {
 
- 			if !util.Contains(args, "--safe-links") {
 
- 				args = append([]string{"--safe-links"}, args...)
 
- 			}
 
- 		} else {
 
- 			if !util.Contains(args, "--munge-links") {
 
- 				args = append([]string{"--munge-links"}, args...)
 
- 			}
 
- 		}
 
- 	}
 
- 	c.connection.Log(logger.LevelDebug, "new system command %#v, with args: %+v fs path %#v quota check path %#v",
 
- 		c.command, args, fsPath, quotaPath)
 
- 	cmd := exec.Command(c.command, args...)
 
- 	uid := c.connection.User.GetUID()
 
- 	gid := c.connection.User.GetGID()
 
- 	cmd = wrapCmd(cmd, uid, gid)
 
- 	command.cmd = cmd
 
- 	command.fsPath = fsPath
 
- 	command.quotaCheckPath = quotaPath
 
- 	command.fs = fs
 
- 	return command, nil
 
- }
 
- // for the supported commands, the destination path, if any, is the last argument
 
- func (c *sshCommand) getDestPath() string {
 
- 	if len(c.args) == 0 {
 
- 		return ""
 
- 	}
 
- 	return c.cleanCommandPath(c.args[len(c.args)-1])
 
- }
 
- // for the supported commands, the destination path, if any, is the second-last argument
 
- func (c *sshCommand) getSourcePath() string {
 
- 	if len(c.args) < 2 {
 
- 		return ""
 
- 	}
 
- 	return c.cleanCommandPath(c.args[len(c.args)-2])
 
- }
 
- func (c *sshCommand) cleanCommandPath(name string) string {
 
- 	name = strings.Trim(name, "'")
 
- 	name = strings.Trim(name, "\"")
 
- 	result := c.connection.User.GetCleanedPath(name)
 
- 	if strings.HasSuffix(name, "/") && !strings.HasSuffix(result, "/") {
 
- 		result += "/"
 
- 	}
 
- 	return result
 
- }
 
- func (c *sshCommand) getFsAndCopyPaths() (vfs.Fs, vfs.Fs, string, string, string, string, error) {
 
- 	sshSourcePath := strings.TrimSuffix(c.getSourcePath(), "/")
 
- 	sshDestPath := c.getDestPath()
 
- 	if strings.HasSuffix(sshDestPath, "/") {
 
- 		sshDestPath = path.Join(sshDestPath, path.Base(sshSourcePath))
 
- 	}
 
- 	if sshSourcePath == "" || sshDestPath == "" || len(c.args) != 2 {
 
- 		err := errors.New("usage sftpgo-copy <source dir path> <destination dir path>")
 
- 		return nil, nil, "", "", "", "", err
 
- 	}
 
- 	fsSrc, fsSourcePath, err := c.connection.GetFsAndResolvedPath(sshSourcePath)
 
- 	if err != nil {
 
- 		return nil, nil, "", "", "", "", err
 
- 	}
 
- 	fsDst, fsDestPath, err := c.connection.GetFsAndResolvedPath(sshDestPath)
 
- 	if err != nil {
 
- 		return nil, nil, "", "", "", "", err
 
- 	}
 
- 	return fsSrc, fsDst, sshSourcePath, sshDestPath, fsSourcePath, fsDestPath, nil
 
- }
 
- func (c *sshCommand) hasCopyPermissions(sshSourcePath, sshDestPath string, srcInfo os.FileInfo) bool {
 
- 	if !c.connection.User.HasPerm(dataprovider.PermListItems, path.Dir(sshSourcePath)) {
 
- 		return false
 
- 	}
 
- 	if srcInfo.IsDir() {
 
- 		return c.connection.User.HasPerm(dataprovider.PermCreateDirs, path.Dir(sshDestPath))
 
- 	} else if srcInfo.Mode()&os.ModeSymlink != 0 {
 
- 		return c.connection.User.HasPerm(dataprovider.PermCreateSymlinks, path.Dir(sshDestPath))
 
- 	}
 
- 	return c.connection.User.HasPerm(dataprovider.PermUpload, path.Dir(sshDestPath))
 
- }
 
- // fsSourcePath must be a directory
 
- func (c *sshCommand) checkRecursiveCopyPermissions(fsSrc vfs.Fs, fsDst vfs.Fs, fsSourcePath, fsDestPath,
 
- 	sshSourcePath, sshDestPath string,
 
- ) error {
 
- 	if !c.connection.User.HasPerm(dataprovider.PermCreateDirs, path.Dir(sshDestPath)) {
 
- 		return common.ErrPermissionDenied
 
- 	}
 
- 	if !c.connection.User.HasPermissionsInside(sshSourcePath) &&
 
- 		!c.connection.User.HasPermissionsInside(sshDestPath) {
 
- 		// if there are no subdirs with defined permissions we can just check source and destination paths
 
- 		dstPerms := []string{
 
- 			dataprovider.PermCreateDirs,
 
- 			dataprovider.PermCreateSymlinks,
 
- 			dataprovider.PermUpload,
 
- 		}
 
- 		if c.connection.User.HasPerm(dataprovider.PermListItems, sshSourcePath) &&
 
- 			c.connection.User.HasPerms(dstPerms, sshDestPath) {
 
- 			return nil
 
- 		}
 
- 		// we don't return an error here because we checked all the required permissions above
 
- 		// for example the directory could not have symlinks inside, so we have to walk to check
 
- 		// permissions for each item
 
- 	}
 
- 	return fsSrc.Walk(fsSourcePath, func(walkedPath string, info os.FileInfo, err error) error {
 
- 		if err != nil {
 
- 			return c.connection.GetFsError(fsSrc, err)
 
- 		}
 
- 		fsDstSubPath := strings.Replace(walkedPath, fsSourcePath, fsDestPath, 1)
 
- 		sshSrcSubPath := fsSrc.GetRelativePath(walkedPath)
 
- 		sshDstSubPath := fsDst.GetRelativePath(fsDstSubPath)
 
- 		if !c.hasCopyPermissions(sshSrcSubPath, sshDstSubPath, info) {
 
- 			return common.ErrPermissionDenied
 
- 		}
 
- 		return nil
 
- 	})
 
- }
 
- func (c *sshCommand) checkCopyPermissions(fsSrc vfs.Fs, fsDst vfs.Fs, fsSourcePath, fsDestPath, sshSourcePath,
 
- 	sshDestPath string, info os.FileInfo,
 
- ) error {
 
- 	if info.IsDir() {
 
- 		return c.checkRecursiveCopyPermissions(fsSrc, fsDst, fsSourcePath, fsDestPath, sshSourcePath, sshDestPath)
 
- 	}
 
- 	if !c.hasCopyPermissions(sshSourcePath, sshDestPath, info) {
 
- 		return c.connection.GetPermissionDeniedError()
 
- 	}
 
- 	return nil
 
- }
 
- func (c *sshCommand) getRemovePath() (string, error) {
 
- 	sshDestPath := c.getDestPath()
 
- 	if sshDestPath == "" || len(c.args) != 1 {
 
- 		err := errors.New("usage sftpgo-remove <destination path>")
 
- 		return "", err
 
- 	}
 
- 	if len(sshDestPath) > 1 {
 
- 		sshDestPath = strings.TrimSuffix(sshDestPath, "/")
 
- 	}
 
- 	return sshDestPath, nil
 
- }
 
- func (c *sshCommand) isLocalPath(virtualPath string) bool {
 
- 	folder, err := c.connection.User.GetVirtualFolderForPath(virtualPath)
 
- 	if err != nil {
 
- 		return c.connection.User.FsConfig.Provider == sdk.LocalFilesystemProvider
 
- 	}
 
- 	return folder.FsConfig.Provider == sdk.LocalFilesystemProvider
 
- }
 
- func (c *sshCommand) isLocalCopy(virtualSourcePath, virtualTargetPath string) bool {
 
- 	if !c.isLocalPath(virtualSourcePath) {
 
- 		return false
 
- 	}
 
- 	return c.isLocalPath(virtualTargetPath)
 
- }
 
- func (c *sshCommand) checkCopyDestination(fs vfs.Fs, fsDestPath string) error {
 
- 	_, err := fs.Lstat(fsDestPath)
 
- 	if err == nil {
 
- 		err := errors.New("invalid copy destination: cannot overwrite an existing file or directory")
 
- 		return err
 
- 	} else if !fs.IsNotExist(err) {
 
- 		return err
 
- 	}
 
- 	return nil
 
- }
 
- func (c *sshCommand) checkCopyQuota(numFiles int, filesSize int64, requestPath string) error {
 
- 	quotaResult, _ := c.connection.HasSpace(true, false, requestPath)
 
- 	if !quotaResult.HasSpace {
 
- 		return common.ErrQuotaExceeded
 
- 	}
 
- 	if quotaResult.QuotaFiles > 0 {
 
- 		remainingFiles := quotaResult.GetRemainingFiles()
 
- 		if remainingFiles < numFiles {
 
- 			c.connection.Log(logger.LevelDebug, "copy not allowed, file limit will be exceeded, "+
 
- 				"remaining files: %v to copy: %v", remainingFiles, numFiles)
 
- 			return common.ErrQuotaExceeded
 
- 		}
 
- 	}
 
- 	if quotaResult.QuotaSize > 0 {
 
- 		remainingSize := quotaResult.GetRemainingSize()
 
- 		if remainingSize < filesSize {
 
- 			c.connection.Log(logger.LevelDebug, "copy not allowed, size limit will be exceeded, "+
 
- 				"remaining size: %v to copy: %v", remainingSize, filesSize)
 
- 			return common.ErrQuotaExceeded
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- func (c *sshCommand) getSizeForPath(fs vfs.Fs, name string) (int, int64, error) {
 
- 	if dataprovider.GetQuotaTracking() > 0 {
 
- 		fi, err := fs.Lstat(name)
 
- 		if err != nil {
 
- 			if fs.IsNotExist(err) {
 
- 				return 0, 0, nil
 
- 			}
 
- 			c.connection.Log(logger.LevelDebug, "unable to stat %#v error: %v", name, err)
 
- 			return 0, 0, err
 
- 		}
 
- 		if fi.IsDir() {
 
- 			files, size, err := fs.GetDirSize(name)
 
- 			if err != nil {
 
- 				c.connection.Log(logger.LevelDebug, "unable to get size for dir %#v error: %v", name, err)
 
- 			}
 
- 			return files, size, err
 
- 		} else if fi.Mode().IsRegular() {
 
- 			return 1, fi.Size(), nil
 
- 		}
 
- 	}
 
- 	return 0, 0, nil
 
- }
 
- func (c *sshCommand) sendErrorResponse(err error) error {
 
- 	errorString := fmt.Sprintf("%v: %v %v\n", c.command, c.getDestPath(), err)
 
- 	c.connection.channel.Write([]byte(errorString)) //nolint:errcheck
 
- 	c.sendExitStatus(err)
 
- 	return err
 
- }
 
- func (c *sshCommand) sendExitStatus(err error) {
 
- 	status := uint32(0)
 
- 	vCmdPath := c.getDestPath()
 
- 	cmdPath := ""
 
- 	targetPath := ""
 
- 	vTargetPath := ""
 
- 	if c.command == "sftpgo-copy" {
 
- 		vTargetPath = vCmdPath
 
- 		vCmdPath = c.getSourcePath()
 
- 	}
 
- 	if err != nil {
 
- 		status = uint32(1)
 
- 		c.connection.Log(logger.LevelError, "command failed: %#v args: %v user: %v err: %v",
 
- 			c.command, c.args, c.connection.User.Username, err)
 
- 	}
 
- 	exitStatus := sshSubsystemExitStatus{
 
- 		Status: status,
 
- 	}
 
- 	_, errClose := c.connection.channel.(ssh.Channel).SendRequest("exit-status", false, ssh.Marshal(&exitStatus))
 
- 	c.connection.Log(logger.LevelDebug, "exit status sent, error: %v", errClose)
 
- 	c.connection.channel.Close()
 
- 	// for scp we notify single uploads/downloads
 
- 	if c.command != scpCmdName {
 
- 		metric.SSHCommandCompleted(err)
 
- 		if vCmdPath != "" {
 
- 			_, p, errFs := c.connection.GetFsAndResolvedPath(vCmdPath)
 
- 			if errFs == nil {
 
- 				cmdPath = p
 
- 			}
 
- 		}
 
- 		if vTargetPath != "" {
 
- 			_, p, errFs := c.connection.GetFsAndResolvedPath(vTargetPath)
 
- 			if errFs == nil {
 
- 				targetPath = p
 
- 			}
 
- 		}
 
- 		common.ExecuteActionNotification(c.connection.BaseConnection, common.OperationSSHCmd, cmdPath, vCmdPath, targetPath,
 
- 			vTargetPath, c.command, 0, err)
 
- 		if err == nil {
 
- 			logger.CommandLog(sshCommandLogSender, cmdPath, targetPath, c.connection.User.Username, "", c.connection.ID,
 
- 				common.ProtocolSSH, -1, -1, "", "", c.connection.command, -1, c.connection.GetLocalAddress(),
 
- 				c.connection.GetRemoteAddress())
 
- 		}
 
- 	}
 
- }
 
- func (c *sshCommand) computeHashForFile(fs vfs.Fs, hasher hash.Hash, path string) (string, error) {
 
- 	hash := ""
 
- 	f, r, _, err := fs.Open(path, 0)
 
- 	if err != nil {
 
- 		return hash, err
 
- 	}
 
- 	var reader io.ReadCloser
 
- 	if f != nil {
 
- 		reader = f
 
- 	} else {
 
- 		reader = r
 
- 	}
 
- 	defer reader.Close()
 
- 	_, err = io.Copy(hasher, reader)
 
- 	if err == nil {
 
- 		hash = fmt.Sprintf("%x", hasher.Sum(nil))
 
- 	}
 
- 	return hash, err
 
- }
 
- func parseCommandPayload(command string) (string, []string, error) {
 
- 	parts, err := shlex.Split(command)
 
- 	if err == nil && len(parts) == 0 {
 
- 		err = fmt.Errorf("invalid command: %#v", command)
 
- 	}
 
- 	if err != nil {
 
- 		return "", []string{}, err
 
- 	}
 
- 	if len(parts) < 2 {
 
- 		return parts[0], []string{}, nil
 
- 	}
 
- 	return parts[0], parts[1:], nil
 
- }
 
 
  |