memory.go 66 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541
  1. package dataprovider
  2. import (
  3. "crypto/x509"
  4. "errors"
  5. "fmt"
  6. "os"
  7. "path/filepath"
  8. "sort"
  9. "sync"
  10. "time"
  11. "github.com/drakkan/sftpgo/v2/logger"
  12. "github.com/drakkan/sftpgo/v2/util"
  13. "github.com/drakkan/sftpgo/v2/vfs"
  14. )
  15. var (
  16. errMemoryProviderClosed = errors.New("memory provider is closed")
  17. )
  18. type memoryProviderHandle struct {
  19. // configuration file to use for loading users
  20. configFile string
  21. sync.Mutex
  22. isClosed bool
  23. // slice with ordered usernames
  24. usernames []string
  25. // map for users, username is the key
  26. users map[string]User
  27. // slice with ordered group names
  28. groupnames []string
  29. // map for group, group name is the key
  30. groups map[string]Group
  31. // map for virtual folders, folder name is the key
  32. vfolders map[string]vfs.BaseVirtualFolder
  33. // slice with ordered folder names
  34. vfoldersNames []string
  35. // map for admins, username is the key
  36. admins map[string]Admin
  37. // slice with ordered admins
  38. adminsUsernames []string
  39. // map for API keys, keyID is the key
  40. apiKeys map[string]APIKey
  41. // slice with ordered API keys KeyID
  42. apiKeysIDs []string
  43. // map for shares, shareID is the key
  44. shares map[string]Share
  45. // slice with ordered shares shareID
  46. sharesIDs []string
  47. // map for event actions, name is the key
  48. actions map[string]BaseEventAction
  49. // slice with ordered actions
  50. actionsNames []string
  51. // map for event actions, name is the key
  52. rules map[string]EventRule
  53. // slice with ordered rules
  54. rulesNames []string
  55. }
  56. // MemoryProvider defines the auth provider for a memory store
  57. type MemoryProvider struct {
  58. dbHandle *memoryProviderHandle
  59. }
  60. func initializeMemoryProvider(basePath string) {
  61. configFile := ""
  62. if util.IsFileInputValid(config.Name) {
  63. configFile = config.Name
  64. if !filepath.IsAbs(configFile) {
  65. configFile = filepath.Join(basePath, configFile)
  66. }
  67. }
  68. provider = &MemoryProvider{
  69. dbHandle: &memoryProviderHandle{
  70. isClosed: false,
  71. usernames: []string{},
  72. users: make(map[string]User),
  73. groupnames: []string{},
  74. groups: make(map[string]Group),
  75. vfolders: make(map[string]vfs.BaseVirtualFolder),
  76. vfoldersNames: []string{},
  77. admins: make(map[string]Admin),
  78. adminsUsernames: []string{},
  79. apiKeys: make(map[string]APIKey),
  80. apiKeysIDs: []string{},
  81. shares: make(map[string]Share),
  82. sharesIDs: []string{},
  83. actions: make(map[string]BaseEventAction),
  84. actionsNames: []string{},
  85. rules: make(map[string]EventRule),
  86. rulesNames: []string{},
  87. configFile: configFile,
  88. },
  89. }
  90. if err := provider.reloadConfig(); err != nil {
  91. logger.Error(logSender, "", "unable to load initial data: %v", err)
  92. logger.ErrorToConsole("unable to load initial data: %v", err)
  93. }
  94. }
  95. func (p *MemoryProvider) checkAvailability() error {
  96. p.dbHandle.Lock()
  97. defer p.dbHandle.Unlock()
  98. if p.dbHandle.isClosed {
  99. return errMemoryProviderClosed
  100. }
  101. return nil
  102. }
  103. func (p *MemoryProvider) close() error {
  104. p.dbHandle.Lock()
  105. defer p.dbHandle.Unlock()
  106. if p.dbHandle.isClosed {
  107. return errMemoryProviderClosed
  108. }
  109. p.dbHandle.isClosed = true
  110. return nil
  111. }
  112. func (p *MemoryProvider) validateUserAndTLSCert(username, protocol string, tlsCert *x509.Certificate) (User, error) {
  113. var user User
  114. if tlsCert == nil {
  115. return user, errors.New("TLS certificate cannot be null or empty")
  116. }
  117. user, err := p.userExists(username)
  118. if err != nil {
  119. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  120. return user, err
  121. }
  122. return checkUserAndTLSCertificate(&user, protocol, tlsCert)
  123. }
  124. func (p *MemoryProvider) validateUserAndPass(username, password, ip, protocol string) (User, error) {
  125. var user User
  126. if password == "" {
  127. return user, errors.New("credentials cannot be null or empty")
  128. }
  129. user, err := p.userExists(username)
  130. if err != nil {
  131. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  132. return user, err
  133. }
  134. return checkUserAndPass(&user, password, ip, protocol)
  135. }
  136. func (p *MemoryProvider) validateUserAndPubKey(username string, pubKey []byte, isSSHCert bool) (User, string, error) {
  137. var user User
  138. if len(pubKey) == 0 {
  139. return user, "", errors.New("credentials cannot be null or empty")
  140. }
  141. user, err := p.userExists(username)
  142. if err != nil {
  143. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  144. return user, "", err
  145. }
  146. return checkUserAndPubKey(&user, pubKey, isSSHCert)
  147. }
  148. func (p *MemoryProvider) validateAdminAndPass(username, password, ip string) (Admin, error) {
  149. admin, err := p.adminExists(username)
  150. if err != nil {
  151. providerLog(logger.LevelWarn, "error authenticating admin %#v: %v", username, err)
  152. return admin, ErrInvalidCredentials
  153. }
  154. err = admin.checkUserAndPass(password, ip)
  155. return admin, err
  156. }
  157. func (p *MemoryProvider) updateAPIKeyLastUse(keyID string) error {
  158. p.dbHandle.Lock()
  159. defer p.dbHandle.Unlock()
  160. if p.dbHandle.isClosed {
  161. return errMemoryProviderClosed
  162. }
  163. apiKey, err := p.apiKeyExistsInternal(keyID)
  164. if err != nil {
  165. return err
  166. }
  167. apiKey.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  168. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey
  169. return nil
  170. }
  171. func (p *MemoryProvider) setUpdatedAt(username string) {
  172. p.dbHandle.Lock()
  173. defer p.dbHandle.Unlock()
  174. if p.dbHandle.isClosed {
  175. return
  176. }
  177. user, err := p.userExistsInternal(username)
  178. if err != nil {
  179. return
  180. }
  181. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  182. p.dbHandle.users[user.Username] = user
  183. setLastUserUpdate()
  184. }
  185. func (p *MemoryProvider) updateLastLogin(username string) error {
  186. p.dbHandle.Lock()
  187. defer p.dbHandle.Unlock()
  188. if p.dbHandle.isClosed {
  189. return errMemoryProviderClosed
  190. }
  191. user, err := p.userExistsInternal(username)
  192. if err != nil {
  193. return err
  194. }
  195. user.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  196. p.dbHandle.users[user.Username] = user
  197. return nil
  198. }
  199. func (p *MemoryProvider) updateAdminLastLogin(username string) error {
  200. p.dbHandle.Lock()
  201. defer p.dbHandle.Unlock()
  202. if p.dbHandle.isClosed {
  203. return errMemoryProviderClosed
  204. }
  205. admin, err := p.adminExistsInternal(username)
  206. if err != nil {
  207. return err
  208. }
  209. admin.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  210. p.dbHandle.admins[admin.Username] = admin
  211. return nil
  212. }
  213. func (p *MemoryProvider) updateTransferQuota(username string, uploadSize, downloadSize int64, reset bool) error {
  214. p.dbHandle.Lock()
  215. defer p.dbHandle.Unlock()
  216. if p.dbHandle.isClosed {
  217. return errMemoryProviderClosed
  218. }
  219. user, err := p.userExistsInternal(username)
  220. if err != nil {
  221. providerLog(logger.LevelError, "unable to update transfer quota for user %#v error: %v", username, err)
  222. return err
  223. }
  224. if reset {
  225. user.UsedUploadDataTransfer = uploadSize
  226. user.UsedDownloadDataTransfer = downloadSize
  227. } else {
  228. user.UsedUploadDataTransfer += uploadSize
  229. user.UsedDownloadDataTransfer += downloadSize
  230. }
  231. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  232. providerLog(logger.LevelDebug, "transfer quota updated for user %#v, ul increment: %v dl increment: %v is reset? %v",
  233. username, uploadSize, downloadSize, reset)
  234. p.dbHandle.users[user.Username] = user
  235. return nil
  236. }
  237. func (p *MemoryProvider) updateQuota(username string, filesAdd int, sizeAdd int64, reset bool) error {
  238. p.dbHandle.Lock()
  239. defer p.dbHandle.Unlock()
  240. if p.dbHandle.isClosed {
  241. return errMemoryProviderClosed
  242. }
  243. user, err := p.userExistsInternal(username)
  244. if err != nil {
  245. providerLog(logger.LevelError, "unable to update quota for user %#v error: %v", username, err)
  246. return err
  247. }
  248. if reset {
  249. user.UsedQuotaSize = sizeAdd
  250. user.UsedQuotaFiles = filesAdd
  251. } else {
  252. user.UsedQuotaSize += sizeAdd
  253. user.UsedQuotaFiles += filesAdd
  254. }
  255. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  256. providerLog(logger.LevelDebug, "quota updated for user %#v, files increment: %v size increment: %v is reset? %v",
  257. username, filesAdd, sizeAdd, reset)
  258. p.dbHandle.users[user.Username] = user
  259. return nil
  260. }
  261. func (p *MemoryProvider) getUsedQuota(username string) (int, int64, int64, int64, error) {
  262. p.dbHandle.Lock()
  263. defer p.dbHandle.Unlock()
  264. if p.dbHandle.isClosed {
  265. return 0, 0, 0, 0, errMemoryProviderClosed
  266. }
  267. user, err := p.userExistsInternal(username)
  268. if err != nil {
  269. providerLog(logger.LevelError, "unable to get quota for user %#v error: %v", username, err)
  270. return 0, 0, 0, 0, err
  271. }
  272. return user.UsedQuotaFiles, user.UsedQuotaSize, user.UsedUploadDataTransfer, user.UsedDownloadDataTransfer, err
  273. }
  274. func (p *MemoryProvider) addUser(user *User) error {
  275. // we can query virtual folder while validating a user
  276. // so we have to check without holding the lock
  277. err := ValidateUser(user)
  278. if err != nil {
  279. return err
  280. }
  281. p.dbHandle.Lock()
  282. defer p.dbHandle.Unlock()
  283. if p.dbHandle.isClosed {
  284. return errMemoryProviderClosed
  285. }
  286. _, err = p.userExistsInternal(user.Username)
  287. if err == nil {
  288. return fmt.Errorf("username %#v already exists", user.Username)
  289. }
  290. user.ID = p.getNextID()
  291. user.LastQuotaUpdate = 0
  292. user.UsedQuotaSize = 0
  293. user.UsedQuotaFiles = 0
  294. user.UsedUploadDataTransfer = 0
  295. user.UsedDownloadDataTransfer = 0
  296. user.LastLogin = 0
  297. user.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  298. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  299. user.VirtualFolders = p.joinUserVirtualFoldersFields(user)
  300. for idx := range user.Groups {
  301. if err = p.addUserFromGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  302. return err
  303. }
  304. }
  305. p.dbHandle.users[user.Username] = user.getACopy()
  306. p.dbHandle.usernames = append(p.dbHandle.usernames, user.Username)
  307. sort.Strings(p.dbHandle.usernames)
  308. return nil
  309. }
  310. func (p *MemoryProvider) updateUser(user *User) error {
  311. // we can query virtual folder while validating a user
  312. // so we have to check without holding the lock
  313. err := ValidateUser(user)
  314. if err != nil {
  315. return err
  316. }
  317. p.dbHandle.Lock()
  318. defer p.dbHandle.Unlock()
  319. if p.dbHandle.isClosed {
  320. return errMemoryProviderClosed
  321. }
  322. u, err := p.userExistsInternal(user.Username)
  323. if err != nil {
  324. return err
  325. }
  326. for _, oldFolder := range u.VirtualFolders {
  327. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  328. }
  329. for idx := range u.Groups {
  330. if err = p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name); err != nil {
  331. return err
  332. }
  333. }
  334. user.VirtualFolders = p.joinUserVirtualFoldersFields(user)
  335. for idx := range user.Groups {
  336. if err = p.addUserFromGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  337. return err
  338. }
  339. }
  340. user.LastQuotaUpdate = u.LastQuotaUpdate
  341. user.UsedQuotaSize = u.UsedQuotaSize
  342. user.UsedQuotaFiles = u.UsedQuotaFiles
  343. user.UsedUploadDataTransfer = u.UsedUploadDataTransfer
  344. user.UsedDownloadDataTransfer = u.UsedDownloadDataTransfer
  345. user.LastLogin = u.LastLogin
  346. user.CreatedAt = u.CreatedAt
  347. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  348. user.ID = u.ID
  349. // pre-login and external auth hook will use the passed *user so save a copy
  350. p.dbHandle.users[user.Username] = user.getACopy()
  351. setLastUserUpdate()
  352. return nil
  353. }
  354. func (p *MemoryProvider) deleteUser(user User) error {
  355. p.dbHandle.Lock()
  356. defer p.dbHandle.Unlock()
  357. if p.dbHandle.isClosed {
  358. return errMemoryProviderClosed
  359. }
  360. u, err := p.userExistsInternal(user.Username)
  361. if err != nil {
  362. return err
  363. }
  364. for _, oldFolder := range u.VirtualFolders {
  365. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  366. }
  367. for idx := range u.Groups {
  368. if err = p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name); err != nil {
  369. return err
  370. }
  371. }
  372. delete(p.dbHandle.users, user.Username)
  373. // this could be more efficient
  374. p.dbHandle.usernames = make([]string, 0, len(p.dbHandle.users))
  375. for username := range p.dbHandle.users {
  376. p.dbHandle.usernames = append(p.dbHandle.usernames, username)
  377. }
  378. sort.Strings(p.dbHandle.usernames)
  379. p.deleteAPIKeysWithUser(user.Username)
  380. p.deleteSharesWithUser(user.Username)
  381. return nil
  382. }
  383. func (p *MemoryProvider) updateUserPassword(username, password string) error {
  384. p.dbHandle.Lock()
  385. defer p.dbHandle.Unlock()
  386. if p.dbHandle.isClosed {
  387. return errMemoryProviderClosed
  388. }
  389. user, err := p.userExistsInternal(username)
  390. if err != nil {
  391. return err
  392. }
  393. user.Password = password
  394. p.dbHandle.users[username] = user
  395. return nil
  396. }
  397. func (p *MemoryProvider) dumpUsers() ([]User, error) {
  398. p.dbHandle.Lock()
  399. defer p.dbHandle.Unlock()
  400. users := make([]User, 0, len(p.dbHandle.usernames))
  401. var err error
  402. if p.dbHandle.isClosed {
  403. return users, errMemoryProviderClosed
  404. }
  405. for _, username := range p.dbHandle.usernames {
  406. u := p.dbHandle.users[username]
  407. user := u.getACopy()
  408. p.addVirtualFoldersToUser(&user)
  409. users = append(users, user)
  410. }
  411. return users, err
  412. }
  413. func (p *MemoryProvider) dumpFolders() ([]vfs.BaseVirtualFolder, error) {
  414. p.dbHandle.Lock()
  415. defer p.dbHandle.Unlock()
  416. folders := make([]vfs.BaseVirtualFolder, 0, len(p.dbHandle.vfoldersNames))
  417. if p.dbHandle.isClosed {
  418. return folders, errMemoryProviderClosed
  419. }
  420. for _, f := range p.dbHandle.vfolders {
  421. folders = append(folders, f)
  422. }
  423. return folders, nil
  424. }
  425. func (p *MemoryProvider) getRecentlyUpdatedUsers(after int64) ([]User, error) {
  426. if getLastUserUpdate() < after {
  427. return nil, nil
  428. }
  429. p.dbHandle.Lock()
  430. defer p.dbHandle.Unlock()
  431. if p.dbHandle.isClosed {
  432. return nil, errMemoryProviderClosed
  433. }
  434. users := make([]User, 0, 10)
  435. for _, username := range p.dbHandle.usernames {
  436. u := p.dbHandle.users[username]
  437. if u.UpdatedAt < after {
  438. continue
  439. }
  440. user := u.getACopy()
  441. p.addVirtualFoldersToUser(&user)
  442. if len(user.Groups) > 0 {
  443. groupMapping := make(map[string]Group)
  444. for idx := range user.Groups {
  445. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  446. if err != nil {
  447. continue
  448. }
  449. groupMapping[group.Name] = group
  450. }
  451. user.applyGroupSettings(groupMapping)
  452. }
  453. user.SetEmptySecretsIfNil()
  454. users = append(users, user)
  455. }
  456. return users, nil
  457. }
  458. func (p *MemoryProvider) getUsersForQuotaCheck(toFetch map[string]bool) ([]User, error) {
  459. users := make([]User, 0, 30)
  460. p.dbHandle.Lock()
  461. defer p.dbHandle.Unlock()
  462. if p.dbHandle.isClosed {
  463. return users, errMemoryProviderClosed
  464. }
  465. for _, username := range p.dbHandle.usernames {
  466. if needFolders, ok := toFetch[username]; ok {
  467. u := p.dbHandle.users[username]
  468. user := u.getACopy()
  469. if needFolders {
  470. p.addVirtualFoldersToUser(&user)
  471. }
  472. if len(user.Groups) > 0 {
  473. groupMapping := make(map[string]Group)
  474. for idx := range user.Groups {
  475. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  476. if err != nil {
  477. continue
  478. }
  479. groupMapping[group.Name] = group
  480. }
  481. user.applyGroupSettings(groupMapping)
  482. }
  483. user.SetEmptySecretsIfNil()
  484. user.PrepareForRendering()
  485. users = append(users, user)
  486. }
  487. }
  488. return users, nil
  489. }
  490. func (p *MemoryProvider) getUsers(limit int, offset int, order string) ([]User, error) {
  491. users := make([]User, 0, limit)
  492. var err error
  493. p.dbHandle.Lock()
  494. defer p.dbHandle.Unlock()
  495. if p.dbHandle.isClosed {
  496. return users, errMemoryProviderClosed
  497. }
  498. if limit <= 0 {
  499. return users, err
  500. }
  501. itNum := 0
  502. if order == OrderASC {
  503. for _, username := range p.dbHandle.usernames {
  504. itNum++
  505. if itNum <= offset {
  506. continue
  507. }
  508. u := p.dbHandle.users[username]
  509. user := u.getACopy()
  510. p.addVirtualFoldersToUser(&user)
  511. user.PrepareForRendering()
  512. users = append(users, user)
  513. if len(users) >= limit {
  514. break
  515. }
  516. }
  517. } else {
  518. for i := len(p.dbHandle.usernames) - 1; i >= 0; i-- {
  519. itNum++
  520. if itNum <= offset {
  521. continue
  522. }
  523. username := p.dbHandle.usernames[i]
  524. u := p.dbHandle.users[username]
  525. user := u.getACopy()
  526. p.addVirtualFoldersToUser(&user)
  527. user.PrepareForRendering()
  528. users = append(users, user)
  529. if len(users) >= limit {
  530. break
  531. }
  532. }
  533. }
  534. return users, err
  535. }
  536. func (p *MemoryProvider) userExists(username string) (User, error) {
  537. p.dbHandle.Lock()
  538. defer p.dbHandle.Unlock()
  539. if p.dbHandle.isClosed {
  540. return User{}, errMemoryProviderClosed
  541. }
  542. user, err := p.userExistsInternal(username)
  543. if err != nil {
  544. return user, err
  545. }
  546. p.addVirtualFoldersToUser(&user)
  547. return user, nil
  548. }
  549. func (p *MemoryProvider) userExistsInternal(username string) (User, error) {
  550. if val, ok := p.dbHandle.users[username]; ok {
  551. return val.getACopy(), nil
  552. }
  553. return User{}, util.NewRecordNotFoundError(fmt.Sprintf("username %q does not exist", username))
  554. }
  555. func (p *MemoryProvider) groupExistsInternal(name string) (Group, error) {
  556. if val, ok := p.dbHandle.groups[name]; ok {
  557. return val.getACopy(), nil
  558. }
  559. return Group{}, util.NewRecordNotFoundError(fmt.Sprintf("group %q does not exist", name))
  560. }
  561. func (p *MemoryProvider) actionExistsInternal(name string) (BaseEventAction, error) {
  562. if val, ok := p.dbHandle.actions[name]; ok {
  563. return val.getACopy(), nil
  564. }
  565. return BaseEventAction{}, util.NewRecordNotFoundError(fmt.Sprintf("event action %q does not exist", name))
  566. }
  567. func (p *MemoryProvider) ruleExistsInternal(name string) (EventRule, error) {
  568. if val, ok := p.dbHandle.rules[name]; ok {
  569. return val.getACopy(), nil
  570. }
  571. return EventRule{}, util.NewRecordNotFoundError(fmt.Sprintf("event rule %q does not exist", name))
  572. }
  573. func (p *MemoryProvider) addAdmin(admin *Admin) error {
  574. p.dbHandle.Lock()
  575. defer p.dbHandle.Unlock()
  576. if p.dbHandle.isClosed {
  577. return errMemoryProviderClosed
  578. }
  579. err := admin.validate()
  580. if err != nil {
  581. return err
  582. }
  583. _, err = p.adminExistsInternal(admin.Username)
  584. if err == nil {
  585. return fmt.Errorf("admin %#v already exists", admin.Username)
  586. }
  587. admin.ID = p.getNextAdminID()
  588. admin.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  589. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  590. admin.LastLogin = 0
  591. p.dbHandle.admins[admin.Username] = admin.getACopy()
  592. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, admin.Username)
  593. sort.Strings(p.dbHandle.adminsUsernames)
  594. return nil
  595. }
  596. func (p *MemoryProvider) updateAdmin(admin *Admin) error {
  597. p.dbHandle.Lock()
  598. defer p.dbHandle.Unlock()
  599. if p.dbHandle.isClosed {
  600. return errMemoryProviderClosed
  601. }
  602. err := admin.validate()
  603. if err != nil {
  604. return err
  605. }
  606. a, err := p.adminExistsInternal(admin.Username)
  607. if err != nil {
  608. return err
  609. }
  610. admin.ID = a.ID
  611. admin.CreatedAt = a.CreatedAt
  612. admin.LastLogin = a.LastLogin
  613. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  614. p.dbHandle.admins[admin.Username] = admin.getACopy()
  615. return nil
  616. }
  617. func (p *MemoryProvider) deleteAdmin(admin Admin) error {
  618. p.dbHandle.Lock()
  619. defer p.dbHandle.Unlock()
  620. if p.dbHandle.isClosed {
  621. return errMemoryProviderClosed
  622. }
  623. _, err := p.adminExistsInternal(admin.Username)
  624. if err != nil {
  625. return err
  626. }
  627. delete(p.dbHandle.admins, admin.Username)
  628. // this could be more efficient
  629. p.dbHandle.adminsUsernames = make([]string, 0, len(p.dbHandle.admins))
  630. for username := range p.dbHandle.admins {
  631. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, username)
  632. }
  633. sort.Strings(p.dbHandle.adminsUsernames)
  634. p.deleteAPIKeysWithAdmin(admin.Username)
  635. return nil
  636. }
  637. func (p *MemoryProvider) adminExists(username string) (Admin, error) {
  638. p.dbHandle.Lock()
  639. defer p.dbHandle.Unlock()
  640. if p.dbHandle.isClosed {
  641. return Admin{}, errMemoryProviderClosed
  642. }
  643. return p.adminExistsInternal(username)
  644. }
  645. func (p *MemoryProvider) adminExistsInternal(username string) (Admin, error) {
  646. if val, ok := p.dbHandle.admins[username]; ok {
  647. return val.getACopy(), nil
  648. }
  649. return Admin{}, util.NewRecordNotFoundError(fmt.Sprintf("admin %#v does not exist", username))
  650. }
  651. func (p *MemoryProvider) dumpAdmins() ([]Admin, error) {
  652. p.dbHandle.Lock()
  653. defer p.dbHandle.Unlock()
  654. admins := make([]Admin, 0, len(p.dbHandle.admins))
  655. if p.dbHandle.isClosed {
  656. return admins, errMemoryProviderClosed
  657. }
  658. for _, admin := range p.dbHandle.admins {
  659. admins = append(admins, admin)
  660. }
  661. return admins, nil
  662. }
  663. func (p *MemoryProvider) getAdmins(limit int, offset int, order string) ([]Admin, error) {
  664. admins := make([]Admin, 0, limit)
  665. p.dbHandle.Lock()
  666. defer p.dbHandle.Unlock()
  667. if p.dbHandle.isClosed {
  668. return admins, errMemoryProviderClosed
  669. }
  670. if limit <= 0 {
  671. return admins, nil
  672. }
  673. itNum := 0
  674. if order == OrderASC {
  675. for _, username := range p.dbHandle.adminsUsernames {
  676. itNum++
  677. if itNum <= offset {
  678. continue
  679. }
  680. a := p.dbHandle.admins[username]
  681. admin := a.getACopy()
  682. admin.HideConfidentialData()
  683. admins = append(admins, admin)
  684. if len(admins) >= limit {
  685. break
  686. }
  687. }
  688. } else {
  689. for i := len(p.dbHandle.adminsUsernames) - 1; i >= 0; i-- {
  690. itNum++
  691. if itNum <= offset {
  692. continue
  693. }
  694. username := p.dbHandle.adminsUsernames[i]
  695. a := p.dbHandle.admins[username]
  696. admin := a.getACopy()
  697. admin.HideConfidentialData()
  698. admins = append(admins, admin)
  699. if len(admins) >= limit {
  700. break
  701. }
  702. }
  703. }
  704. return admins, nil
  705. }
  706. func (p *MemoryProvider) updateFolderQuota(name string, filesAdd int, sizeAdd int64, reset bool) error {
  707. p.dbHandle.Lock()
  708. defer p.dbHandle.Unlock()
  709. if p.dbHandle.isClosed {
  710. return errMemoryProviderClosed
  711. }
  712. folder, err := p.folderExistsInternal(name)
  713. if err != nil {
  714. providerLog(logger.LevelError, "unable to update quota for folder %#v error: %v", name, err)
  715. return err
  716. }
  717. if reset {
  718. folder.UsedQuotaSize = sizeAdd
  719. folder.UsedQuotaFiles = filesAdd
  720. } else {
  721. folder.UsedQuotaSize += sizeAdd
  722. folder.UsedQuotaFiles += filesAdd
  723. }
  724. folder.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  725. p.dbHandle.vfolders[name] = folder
  726. return nil
  727. }
  728. func (p *MemoryProvider) getGroups(limit, offset int, order string, minimal bool) ([]Group, error) {
  729. p.dbHandle.Lock()
  730. defer p.dbHandle.Unlock()
  731. if p.dbHandle.isClosed {
  732. return nil, errMemoryProviderClosed
  733. }
  734. if limit <= 0 {
  735. return nil, nil
  736. }
  737. groups := make([]Group, 0, limit)
  738. itNum := 0
  739. if order == OrderASC {
  740. for _, name := range p.dbHandle.groupnames {
  741. itNum++
  742. if itNum <= offset {
  743. continue
  744. }
  745. g := p.dbHandle.groups[name]
  746. group := g.getACopy()
  747. p.addVirtualFoldersToGroup(&group)
  748. group.PrepareForRendering()
  749. groups = append(groups, group)
  750. if len(groups) >= limit {
  751. break
  752. }
  753. }
  754. } else {
  755. for i := len(p.dbHandle.groupnames) - 1; i >= 0; i-- {
  756. itNum++
  757. if itNum <= offset {
  758. continue
  759. }
  760. name := p.dbHandle.groupnames[i]
  761. g := p.dbHandle.groups[name]
  762. group := g.getACopy()
  763. p.addVirtualFoldersToGroup(&group)
  764. group.PrepareForRendering()
  765. groups = append(groups, group)
  766. if len(groups) >= limit {
  767. break
  768. }
  769. }
  770. }
  771. return groups, nil
  772. }
  773. func (p *MemoryProvider) getGroupsWithNames(names []string) ([]Group, error) {
  774. p.dbHandle.Lock()
  775. defer p.dbHandle.Unlock()
  776. if p.dbHandle.isClosed {
  777. return nil, errMemoryProviderClosed
  778. }
  779. groups := make([]Group, 0, len(names))
  780. for _, name := range names {
  781. if val, ok := p.dbHandle.groups[name]; ok {
  782. group := val.getACopy()
  783. p.addVirtualFoldersToGroup(&group)
  784. groups = append(groups, group)
  785. }
  786. }
  787. return groups, nil
  788. }
  789. func (p *MemoryProvider) getUsersInGroups(names []string) ([]string, error) {
  790. p.dbHandle.Lock()
  791. defer p.dbHandle.Unlock()
  792. if p.dbHandle.isClosed {
  793. return nil, errMemoryProviderClosed
  794. }
  795. var users []string
  796. for _, name := range names {
  797. if val, ok := p.dbHandle.groups[name]; ok {
  798. group := val.getACopy()
  799. users = append(users, group.Users...)
  800. }
  801. }
  802. return users, nil
  803. }
  804. func (p *MemoryProvider) groupExists(name string) (Group, error) {
  805. p.dbHandle.Lock()
  806. defer p.dbHandle.Unlock()
  807. if p.dbHandle.isClosed {
  808. return Group{}, errMemoryProviderClosed
  809. }
  810. group, err := p.groupExistsInternal(name)
  811. if err != nil {
  812. return group, err
  813. }
  814. p.addVirtualFoldersToGroup(&group)
  815. return group, nil
  816. }
  817. func (p *MemoryProvider) addGroup(group *Group) error {
  818. if err := group.validate(); err != nil {
  819. return err
  820. }
  821. p.dbHandle.Lock()
  822. defer p.dbHandle.Unlock()
  823. if p.dbHandle.isClosed {
  824. return errMemoryProviderClosed
  825. }
  826. _, err := p.groupExistsInternal(group.Name)
  827. if err == nil {
  828. return fmt.Errorf("group %#v already exists", group.Name)
  829. }
  830. group.ID = p.getNextGroupID()
  831. group.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  832. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  833. group.VirtualFolders = p.joinGroupVirtualFoldersFields(group)
  834. p.dbHandle.groups[group.Name] = group.getACopy()
  835. p.dbHandle.groupnames = append(p.dbHandle.groupnames, group.Name)
  836. sort.Strings(p.dbHandle.groupnames)
  837. return nil
  838. }
  839. func (p *MemoryProvider) updateGroup(group *Group) error {
  840. if err := group.validate(); err != nil {
  841. return err
  842. }
  843. p.dbHandle.Lock()
  844. defer p.dbHandle.Unlock()
  845. if p.dbHandle.isClosed {
  846. return errMemoryProviderClosed
  847. }
  848. g, err := p.groupExistsInternal(group.Name)
  849. if err != nil {
  850. return err
  851. }
  852. for _, oldFolder := range g.VirtualFolders {
  853. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  854. }
  855. group.VirtualFolders = p.joinGroupVirtualFoldersFields(group)
  856. group.CreatedAt = g.CreatedAt
  857. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  858. group.ID = g.ID
  859. p.dbHandle.groups[group.Name] = group.getACopy()
  860. return nil
  861. }
  862. func (p *MemoryProvider) deleteGroup(group Group) error {
  863. p.dbHandle.Lock()
  864. defer p.dbHandle.Unlock()
  865. if p.dbHandle.isClosed {
  866. return errMemoryProviderClosed
  867. }
  868. g, err := p.groupExistsInternal(group.Name)
  869. if err != nil {
  870. return err
  871. }
  872. if len(g.Users) > 0 {
  873. return util.NewValidationError(fmt.Sprintf("the group %#v is referenced, it cannot be removed", group.Name))
  874. }
  875. for _, oldFolder := range g.VirtualFolders {
  876. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  877. }
  878. delete(p.dbHandle.groups, group.Name)
  879. // this could be more efficient
  880. p.dbHandle.groupnames = make([]string, 0, len(p.dbHandle.groups))
  881. for name := range p.dbHandle.groups {
  882. p.dbHandle.groupnames = append(p.dbHandle.groupnames, name)
  883. }
  884. sort.Strings(p.dbHandle.groupnames)
  885. return nil
  886. }
  887. func (p *MemoryProvider) dumpGroups() ([]Group, error) {
  888. p.dbHandle.Lock()
  889. defer p.dbHandle.Unlock()
  890. groups := make([]Group, 0, len(p.dbHandle.groups))
  891. var err error
  892. if p.dbHandle.isClosed {
  893. return groups, errMemoryProviderClosed
  894. }
  895. for _, name := range p.dbHandle.groupnames {
  896. g := p.dbHandle.groups[name]
  897. group := g.getACopy()
  898. p.addVirtualFoldersToGroup(&group)
  899. groups = append(groups, group)
  900. }
  901. return groups, err
  902. }
  903. func (p *MemoryProvider) getUsedFolderQuota(name string) (int, int64, error) {
  904. p.dbHandle.Lock()
  905. defer p.dbHandle.Unlock()
  906. if p.dbHandle.isClosed {
  907. return 0, 0, errMemoryProviderClosed
  908. }
  909. folder, err := p.folderExistsInternal(name)
  910. if err != nil {
  911. providerLog(logger.LevelError, "unable to get quota for folder %#v error: %v", name, err)
  912. return 0, 0, err
  913. }
  914. return folder.UsedQuotaFiles, folder.UsedQuotaSize, err
  915. }
  916. func (p *MemoryProvider) joinGroupVirtualFoldersFields(group *Group) []vfs.VirtualFolder {
  917. var folders []vfs.VirtualFolder
  918. for idx := range group.VirtualFolders {
  919. folder := &group.VirtualFolders[idx]
  920. f, err := p.addOrUpdateFolderInternal(&folder.BaseVirtualFolder, "", group.Name, 0, 0, 0)
  921. if err == nil {
  922. folder.BaseVirtualFolder = f
  923. folders = append(folders, *folder)
  924. }
  925. }
  926. return folders
  927. }
  928. func (p *MemoryProvider) addVirtualFoldersToGroup(group *Group) {
  929. if len(group.VirtualFolders) > 0 {
  930. var folders []vfs.VirtualFolder
  931. for idx := range group.VirtualFolders {
  932. folder := &group.VirtualFolders[idx]
  933. baseFolder, err := p.folderExistsInternal(folder.Name)
  934. if err != nil {
  935. continue
  936. }
  937. folder.BaseVirtualFolder = baseFolder.GetACopy()
  938. folders = append(folders, *folder)
  939. }
  940. group.VirtualFolders = folders
  941. }
  942. }
  943. func (p *MemoryProvider) addActionsToRule(rule *EventRule) {
  944. var actions []EventAction
  945. for idx := range rule.Actions {
  946. action := &rule.Actions[idx]
  947. baseAction, err := p.actionExistsInternal(action.Name)
  948. if err != nil {
  949. continue
  950. }
  951. baseAction.Options.SetEmptySecretsIfNil()
  952. action.BaseEventAction = baseAction
  953. actions = append(actions, *action)
  954. }
  955. rule.Actions = actions
  956. }
  957. func (p *MemoryProvider) addRuleToActionMapping(ruleName, actionName string) error {
  958. a, err := p.actionExistsInternal(actionName)
  959. if err != nil {
  960. return util.NewGenericError(fmt.Sprintf("action %q does not exist", actionName))
  961. }
  962. if !util.Contains(a.Rules, ruleName) {
  963. a.Rules = append(a.Rules, ruleName)
  964. p.dbHandle.actions[actionName] = a
  965. }
  966. return nil
  967. }
  968. func (p *MemoryProvider) removeRuleFromActionMapping(ruleName, actionName string) error {
  969. a, err := p.actionExistsInternal(actionName)
  970. if err != nil {
  971. providerLog(logger.LevelWarn, "action %q does not exist, cannot remove from mapping", actionName)
  972. return nil
  973. }
  974. if util.Contains(a.Rules, ruleName) {
  975. var rules []string
  976. for _, r := range a.Rules {
  977. if r != ruleName {
  978. rules = append(rules, r)
  979. }
  980. }
  981. a.Rules = rules
  982. p.dbHandle.actions[actionName] = a
  983. }
  984. return nil
  985. }
  986. func (p *MemoryProvider) addUserFromGroupMapping(username, groupname string) error {
  987. g, err := p.groupExistsInternal(groupname)
  988. if err != nil {
  989. return err
  990. }
  991. if !util.Contains(g.Users, username) {
  992. g.Users = append(g.Users, username)
  993. p.dbHandle.groups[groupname] = g
  994. }
  995. return nil
  996. }
  997. func (p *MemoryProvider) removeUserFromGroupMapping(username, groupname string) error {
  998. g, err := p.groupExistsInternal(groupname)
  999. if err != nil {
  1000. return err
  1001. }
  1002. if util.Contains(g.Users, username) {
  1003. var users []string
  1004. for _, u := range g.Users {
  1005. if u != username {
  1006. users = append(users, u)
  1007. }
  1008. }
  1009. g.Users = users
  1010. p.dbHandle.groups[groupname] = g
  1011. }
  1012. return nil
  1013. }
  1014. func (p *MemoryProvider) joinUserVirtualFoldersFields(user *User) []vfs.VirtualFolder {
  1015. var folders []vfs.VirtualFolder
  1016. for idx := range user.VirtualFolders {
  1017. folder := &user.VirtualFolders[idx]
  1018. f, err := p.addOrUpdateFolderInternal(&folder.BaseVirtualFolder, user.Username, "", 0, 0, 0)
  1019. if err == nil {
  1020. folder.BaseVirtualFolder = f
  1021. folders = append(folders, *folder)
  1022. }
  1023. }
  1024. return folders
  1025. }
  1026. func (p *MemoryProvider) addVirtualFoldersToUser(user *User) {
  1027. if len(user.VirtualFolders) > 0 {
  1028. var folders []vfs.VirtualFolder
  1029. for idx := range user.VirtualFolders {
  1030. folder := &user.VirtualFolders[idx]
  1031. baseFolder, err := p.folderExistsInternal(folder.Name)
  1032. if err != nil {
  1033. continue
  1034. }
  1035. folder.BaseVirtualFolder = baseFolder.GetACopy()
  1036. folders = append(folders, *folder)
  1037. }
  1038. user.VirtualFolders = folders
  1039. }
  1040. }
  1041. func (p *MemoryProvider) removeRelationFromFolderMapping(folderName, username, groupname string) {
  1042. folder, err := p.folderExistsInternal(folderName)
  1043. if err == nil {
  1044. if username != "" {
  1045. var usernames []string
  1046. for _, user := range folder.Users {
  1047. if user != username {
  1048. usernames = append(usernames, user)
  1049. }
  1050. }
  1051. folder.Users = usernames
  1052. }
  1053. if groupname != "" {
  1054. var groups []string
  1055. for _, group := range folder.Groups {
  1056. if group != groupname {
  1057. groups = append(groups, group)
  1058. }
  1059. }
  1060. folder.Groups = groups
  1061. }
  1062. p.dbHandle.vfolders[folder.Name] = folder
  1063. }
  1064. }
  1065. func (p *MemoryProvider) updateFoldersMappingInternal(folder vfs.BaseVirtualFolder) {
  1066. p.dbHandle.vfolders[folder.Name] = folder
  1067. if !util.Contains(p.dbHandle.vfoldersNames, folder.Name) {
  1068. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, folder.Name)
  1069. sort.Strings(p.dbHandle.vfoldersNames)
  1070. }
  1071. }
  1072. func (p *MemoryProvider) addOrUpdateFolderInternal(baseFolder *vfs.BaseVirtualFolder, username, groupname string,
  1073. usedQuotaSize int64, usedQuotaFiles int, lastQuotaUpdate int64,
  1074. ) (vfs.BaseVirtualFolder, error) {
  1075. folder, err := p.folderExistsInternal(baseFolder.Name)
  1076. if err == nil {
  1077. // exists
  1078. folder.MappedPath = baseFolder.MappedPath
  1079. folder.Description = baseFolder.Description
  1080. folder.FsConfig = baseFolder.FsConfig.GetACopy()
  1081. if username != "" && !util.Contains(folder.Users, username) {
  1082. folder.Users = append(folder.Users, username)
  1083. }
  1084. if groupname != "" && !util.Contains(folder.Groups, groupname) {
  1085. folder.Groups = append(folder.Groups, groupname)
  1086. }
  1087. p.updateFoldersMappingInternal(folder)
  1088. return folder, nil
  1089. }
  1090. if _, ok := err.(*util.RecordNotFoundError); ok {
  1091. folder = baseFolder.GetACopy()
  1092. folder.ID = p.getNextFolderID()
  1093. folder.UsedQuotaSize = usedQuotaSize
  1094. folder.UsedQuotaFiles = usedQuotaFiles
  1095. folder.LastQuotaUpdate = lastQuotaUpdate
  1096. if username != "" {
  1097. folder.Users = []string{username}
  1098. }
  1099. if groupname != "" {
  1100. folder.Groups = []string{groupname}
  1101. }
  1102. p.updateFoldersMappingInternal(folder)
  1103. return folder, nil
  1104. }
  1105. return folder, err
  1106. }
  1107. func (p *MemoryProvider) folderExistsInternal(name string) (vfs.BaseVirtualFolder, error) {
  1108. if val, ok := p.dbHandle.vfolders[name]; ok {
  1109. return val, nil
  1110. }
  1111. return vfs.BaseVirtualFolder{}, util.NewRecordNotFoundError(fmt.Sprintf("folder %#v does not exist", name))
  1112. }
  1113. func (p *MemoryProvider) getFolders(limit, offset int, order string, minimal bool) ([]vfs.BaseVirtualFolder, error) {
  1114. folders := make([]vfs.BaseVirtualFolder, 0, limit)
  1115. var err error
  1116. p.dbHandle.Lock()
  1117. defer p.dbHandle.Unlock()
  1118. if p.dbHandle.isClosed {
  1119. return folders, errMemoryProviderClosed
  1120. }
  1121. if limit <= 0 {
  1122. return folders, err
  1123. }
  1124. itNum := 0
  1125. if order == OrderASC {
  1126. for _, name := range p.dbHandle.vfoldersNames {
  1127. itNum++
  1128. if itNum <= offset {
  1129. continue
  1130. }
  1131. f := p.dbHandle.vfolders[name]
  1132. folder := f.GetACopy()
  1133. folder.PrepareForRendering()
  1134. folders = append(folders, folder)
  1135. if len(folders) >= limit {
  1136. break
  1137. }
  1138. }
  1139. } else {
  1140. for i := len(p.dbHandle.vfoldersNames) - 1; i >= 0; i-- {
  1141. itNum++
  1142. if itNum <= offset {
  1143. continue
  1144. }
  1145. name := p.dbHandle.vfoldersNames[i]
  1146. f := p.dbHandle.vfolders[name]
  1147. folder := f.GetACopy()
  1148. folder.PrepareForRendering()
  1149. folders = append(folders, folder)
  1150. if len(folders) >= limit {
  1151. break
  1152. }
  1153. }
  1154. }
  1155. return folders, err
  1156. }
  1157. func (p *MemoryProvider) getFolderByName(name string) (vfs.BaseVirtualFolder, error) {
  1158. p.dbHandle.Lock()
  1159. defer p.dbHandle.Unlock()
  1160. if p.dbHandle.isClosed {
  1161. return vfs.BaseVirtualFolder{}, errMemoryProviderClosed
  1162. }
  1163. folder, err := p.folderExistsInternal(name)
  1164. if err != nil {
  1165. return vfs.BaseVirtualFolder{}, err
  1166. }
  1167. return folder.GetACopy(), nil
  1168. }
  1169. func (p *MemoryProvider) addFolder(folder *vfs.BaseVirtualFolder) error {
  1170. err := ValidateFolder(folder)
  1171. if err != nil {
  1172. return err
  1173. }
  1174. p.dbHandle.Lock()
  1175. defer p.dbHandle.Unlock()
  1176. if p.dbHandle.isClosed {
  1177. return errMemoryProviderClosed
  1178. }
  1179. _, err = p.folderExistsInternal(folder.Name)
  1180. if err == nil {
  1181. return fmt.Errorf("folder %#v already exists", folder.Name)
  1182. }
  1183. folder.ID = p.getNextFolderID()
  1184. folder.Users = nil
  1185. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1186. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, folder.Name)
  1187. sort.Strings(p.dbHandle.vfoldersNames)
  1188. return nil
  1189. }
  1190. func (p *MemoryProvider) updateFolder(folder *vfs.BaseVirtualFolder) error {
  1191. err := ValidateFolder(folder)
  1192. if err != nil {
  1193. return err
  1194. }
  1195. p.dbHandle.Lock()
  1196. defer p.dbHandle.Unlock()
  1197. if p.dbHandle.isClosed {
  1198. return errMemoryProviderClosed
  1199. }
  1200. f, err := p.folderExistsInternal(folder.Name)
  1201. if err != nil {
  1202. return err
  1203. }
  1204. folder.ID = f.ID
  1205. folder.LastQuotaUpdate = f.LastQuotaUpdate
  1206. folder.UsedQuotaFiles = f.UsedQuotaFiles
  1207. folder.UsedQuotaSize = f.UsedQuotaSize
  1208. folder.Users = f.Users
  1209. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1210. // now update the related users
  1211. for _, username := range folder.Users {
  1212. user, err := p.userExistsInternal(username)
  1213. if err == nil {
  1214. var folders []vfs.VirtualFolder
  1215. for idx := range user.VirtualFolders {
  1216. userFolder := &user.VirtualFolders[idx]
  1217. if folder.Name == userFolder.Name {
  1218. userFolder.BaseVirtualFolder = folder.GetACopy()
  1219. }
  1220. folders = append(folders, *userFolder)
  1221. }
  1222. user.VirtualFolders = folders
  1223. p.dbHandle.users[user.Username] = user
  1224. }
  1225. }
  1226. return nil
  1227. }
  1228. func (p *MemoryProvider) deleteFolder(folder vfs.BaseVirtualFolder) error {
  1229. p.dbHandle.Lock()
  1230. defer p.dbHandle.Unlock()
  1231. if p.dbHandle.isClosed {
  1232. return errMemoryProviderClosed
  1233. }
  1234. _, err := p.folderExistsInternal(folder.Name)
  1235. if err != nil {
  1236. return err
  1237. }
  1238. for _, username := range folder.Users {
  1239. user, err := p.userExistsInternal(username)
  1240. if err == nil {
  1241. var folders []vfs.VirtualFolder
  1242. for idx := range user.VirtualFolders {
  1243. userFolder := &user.VirtualFolders[idx]
  1244. if folder.Name != userFolder.Name {
  1245. folders = append(folders, *userFolder)
  1246. }
  1247. }
  1248. user.VirtualFolders = folders
  1249. p.dbHandle.users[user.Username] = user
  1250. }
  1251. }
  1252. for _, groupname := range folder.Groups {
  1253. group, err := p.groupExistsInternal(groupname)
  1254. if err == nil {
  1255. var folders []vfs.VirtualFolder
  1256. for idx := range group.VirtualFolders {
  1257. groupFolder := &group.VirtualFolders[idx]
  1258. if folder.Name != groupFolder.Name {
  1259. folders = append(folders, *groupFolder)
  1260. }
  1261. }
  1262. group.VirtualFolders = folders
  1263. p.dbHandle.groups[group.Name] = group
  1264. }
  1265. }
  1266. delete(p.dbHandle.vfolders, folder.Name)
  1267. p.dbHandle.vfoldersNames = []string{}
  1268. for name := range p.dbHandle.vfolders {
  1269. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, name)
  1270. }
  1271. sort.Strings(p.dbHandle.vfoldersNames)
  1272. return nil
  1273. }
  1274. func (p *MemoryProvider) apiKeyExistsInternal(keyID string) (APIKey, error) {
  1275. if val, ok := p.dbHandle.apiKeys[keyID]; ok {
  1276. return val.getACopy(), nil
  1277. }
  1278. return APIKey{}, util.NewRecordNotFoundError(fmt.Sprintf("API key %#v does not exist", keyID))
  1279. }
  1280. func (p *MemoryProvider) apiKeyExists(keyID string) (APIKey, error) {
  1281. p.dbHandle.Lock()
  1282. defer p.dbHandle.Unlock()
  1283. if p.dbHandle.isClosed {
  1284. return APIKey{}, errMemoryProviderClosed
  1285. }
  1286. return p.apiKeyExistsInternal(keyID)
  1287. }
  1288. func (p *MemoryProvider) addAPIKey(apiKey *APIKey) error {
  1289. err := apiKey.validate()
  1290. if err != nil {
  1291. return err
  1292. }
  1293. p.dbHandle.Lock()
  1294. defer p.dbHandle.Unlock()
  1295. if p.dbHandle.isClosed {
  1296. return errMemoryProviderClosed
  1297. }
  1298. _, err = p.apiKeyExistsInternal(apiKey.KeyID)
  1299. if err == nil {
  1300. return fmt.Errorf("API key %#v already exists", apiKey.KeyID)
  1301. }
  1302. if apiKey.User != "" {
  1303. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1304. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", apiKey.User))
  1305. }
  1306. }
  1307. if apiKey.Admin != "" {
  1308. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1309. return util.NewValidationError(fmt.Sprintf("related admin %#v does not exists", apiKey.User))
  1310. }
  1311. }
  1312. apiKey.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1313. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1314. apiKey.LastUseAt = 0
  1315. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1316. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, apiKey.KeyID)
  1317. sort.Strings(p.dbHandle.apiKeysIDs)
  1318. return nil
  1319. }
  1320. func (p *MemoryProvider) updateAPIKey(apiKey *APIKey) error {
  1321. err := apiKey.validate()
  1322. if err != nil {
  1323. return err
  1324. }
  1325. p.dbHandle.Lock()
  1326. defer p.dbHandle.Unlock()
  1327. if p.dbHandle.isClosed {
  1328. return errMemoryProviderClosed
  1329. }
  1330. k, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1331. if err != nil {
  1332. return err
  1333. }
  1334. if apiKey.User != "" {
  1335. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1336. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", apiKey.User))
  1337. }
  1338. }
  1339. if apiKey.Admin != "" {
  1340. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1341. return util.NewValidationError(fmt.Sprintf("related admin %#v does not exists", apiKey.User))
  1342. }
  1343. }
  1344. apiKey.ID = k.ID
  1345. apiKey.KeyID = k.KeyID
  1346. apiKey.Key = k.Key
  1347. apiKey.CreatedAt = k.CreatedAt
  1348. apiKey.LastUseAt = k.LastUseAt
  1349. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1350. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1351. return nil
  1352. }
  1353. func (p *MemoryProvider) deleteAPIKey(apiKey APIKey) error {
  1354. p.dbHandle.Lock()
  1355. defer p.dbHandle.Unlock()
  1356. if p.dbHandle.isClosed {
  1357. return errMemoryProviderClosed
  1358. }
  1359. _, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1360. if err != nil {
  1361. return err
  1362. }
  1363. delete(p.dbHandle.apiKeys, apiKey.KeyID)
  1364. p.updateAPIKeysOrdering()
  1365. return nil
  1366. }
  1367. func (p *MemoryProvider) getAPIKeys(limit int, offset int, order string) ([]APIKey, error) {
  1368. apiKeys := make([]APIKey, 0, limit)
  1369. p.dbHandle.Lock()
  1370. defer p.dbHandle.Unlock()
  1371. if p.dbHandle.isClosed {
  1372. return apiKeys, errMemoryProviderClosed
  1373. }
  1374. if limit <= 0 {
  1375. return apiKeys, nil
  1376. }
  1377. itNum := 0
  1378. if order == OrderDESC {
  1379. for i := len(p.dbHandle.apiKeysIDs) - 1; i >= 0; i-- {
  1380. itNum++
  1381. if itNum <= offset {
  1382. continue
  1383. }
  1384. keyID := p.dbHandle.apiKeysIDs[i]
  1385. k := p.dbHandle.apiKeys[keyID]
  1386. apiKey := k.getACopy()
  1387. apiKey.HideConfidentialData()
  1388. apiKeys = append(apiKeys, apiKey)
  1389. if len(apiKeys) >= limit {
  1390. break
  1391. }
  1392. }
  1393. } else {
  1394. for _, keyID := range p.dbHandle.apiKeysIDs {
  1395. itNum++
  1396. if itNum <= offset {
  1397. continue
  1398. }
  1399. k := p.dbHandle.apiKeys[keyID]
  1400. apiKey := k.getACopy()
  1401. apiKey.HideConfidentialData()
  1402. apiKeys = append(apiKeys, apiKey)
  1403. if len(apiKeys) >= limit {
  1404. break
  1405. }
  1406. }
  1407. }
  1408. return apiKeys, nil
  1409. }
  1410. func (p *MemoryProvider) dumpAPIKeys() ([]APIKey, error) {
  1411. p.dbHandle.Lock()
  1412. defer p.dbHandle.Unlock()
  1413. apiKeys := make([]APIKey, 0, len(p.dbHandle.apiKeys))
  1414. if p.dbHandle.isClosed {
  1415. return apiKeys, errMemoryProviderClosed
  1416. }
  1417. for _, k := range p.dbHandle.apiKeys {
  1418. apiKeys = append(apiKeys, k)
  1419. }
  1420. return apiKeys, nil
  1421. }
  1422. func (p *MemoryProvider) deleteAPIKeysWithUser(username string) {
  1423. found := false
  1424. for k, v := range p.dbHandle.apiKeys {
  1425. if v.User == username {
  1426. delete(p.dbHandle.apiKeys, k)
  1427. found = true
  1428. }
  1429. }
  1430. if found {
  1431. p.updateAPIKeysOrdering()
  1432. }
  1433. }
  1434. func (p *MemoryProvider) deleteAPIKeysWithAdmin(username string) {
  1435. found := false
  1436. for k, v := range p.dbHandle.apiKeys {
  1437. if v.Admin == username {
  1438. delete(p.dbHandle.apiKeys, k)
  1439. found = true
  1440. }
  1441. }
  1442. if found {
  1443. p.updateAPIKeysOrdering()
  1444. }
  1445. }
  1446. func (p *MemoryProvider) deleteSharesWithUser(username string) {
  1447. found := false
  1448. for k, v := range p.dbHandle.shares {
  1449. if v.Username == username {
  1450. delete(p.dbHandle.shares, k)
  1451. found = true
  1452. }
  1453. }
  1454. if found {
  1455. p.updateSharesOrdering()
  1456. }
  1457. }
  1458. func (p *MemoryProvider) updateAPIKeysOrdering() {
  1459. // this could be more efficient
  1460. p.dbHandle.apiKeysIDs = make([]string, 0, len(p.dbHandle.apiKeys))
  1461. for keyID := range p.dbHandle.apiKeys {
  1462. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, keyID)
  1463. }
  1464. sort.Strings(p.dbHandle.apiKeysIDs)
  1465. }
  1466. func (p *MemoryProvider) updateSharesOrdering() {
  1467. // this could be more efficient
  1468. p.dbHandle.sharesIDs = make([]string, 0, len(p.dbHandle.shares))
  1469. for shareID := range p.dbHandle.shares {
  1470. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, shareID)
  1471. }
  1472. sort.Strings(p.dbHandle.sharesIDs)
  1473. }
  1474. func (p *MemoryProvider) shareExistsInternal(shareID, username string) (Share, error) {
  1475. if val, ok := p.dbHandle.shares[shareID]; ok {
  1476. if username != "" && val.Username != username {
  1477. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %#v does not exist", shareID))
  1478. }
  1479. return val.getACopy(), nil
  1480. }
  1481. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %#v does not exist", shareID))
  1482. }
  1483. func (p *MemoryProvider) shareExists(shareID, username string) (Share, error) {
  1484. p.dbHandle.Lock()
  1485. defer p.dbHandle.Unlock()
  1486. if p.dbHandle.isClosed {
  1487. return Share{}, errMemoryProviderClosed
  1488. }
  1489. return p.shareExistsInternal(shareID, username)
  1490. }
  1491. func (p *MemoryProvider) addShare(share *Share) error {
  1492. err := share.validate()
  1493. if err != nil {
  1494. return err
  1495. }
  1496. p.dbHandle.Lock()
  1497. defer p.dbHandle.Unlock()
  1498. if p.dbHandle.isClosed {
  1499. return errMemoryProviderClosed
  1500. }
  1501. _, err = p.shareExistsInternal(share.ShareID, share.Username)
  1502. if err == nil {
  1503. return fmt.Errorf("share %#v already exists", share.ShareID)
  1504. }
  1505. if _, err := p.userExistsInternal(share.Username); err != nil {
  1506. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", share.Username))
  1507. }
  1508. if !share.IsRestore {
  1509. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1510. share.UpdatedAt = share.CreatedAt
  1511. share.LastUseAt = 0
  1512. share.UsedTokens = 0
  1513. }
  1514. if share.CreatedAt == 0 {
  1515. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1516. }
  1517. if share.UpdatedAt == 0 {
  1518. share.UpdatedAt = share.CreatedAt
  1519. }
  1520. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1521. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, share.ShareID)
  1522. sort.Strings(p.dbHandle.sharesIDs)
  1523. return nil
  1524. }
  1525. func (p *MemoryProvider) updateShare(share *Share) error {
  1526. err := share.validate()
  1527. if err != nil {
  1528. return err
  1529. }
  1530. p.dbHandle.Lock()
  1531. defer p.dbHandle.Unlock()
  1532. if p.dbHandle.isClosed {
  1533. return errMemoryProviderClosed
  1534. }
  1535. s, err := p.shareExistsInternal(share.ShareID, share.Username)
  1536. if err != nil {
  1537. return err
  1538. }
  1539. if _, err := p.userExistsInternal(share.Username); err != nil {
  1540. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", share.Username))
  1541. }
  1542. share.ID = s.ID
  1543. share.ShareID = s.ShareID
  1544. if !share.IsRestore {
  1545. share.UsedTokens = s.UsedTokens
  1546. share.CreatedAt = s.CreatedAt
  1547. share.LastUseAt = s.LastUseAt
  1548. share.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1549. }
  1550. if share.CreatedAt == 0 {
  1551. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1552. }
  1553. if share.UpdatedAt == 0 {
  1554. share.UpdatedAt = share.CreatedAt
  1555. }
  1556. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1557. return nil
  1558. }
  1559. func (p *MemoryProvider) deleteShare(share Share) error {
  1560. p.dbHandle.Lock()
  1561. defer p.dbHandle.Unlock()
  1562. if p.dbHandle.isClosed {
  1563. return errMemoryProviderClosed
  1564. }
  1565. _, err := p.shareExistsInternal(share.ShareID, share.Username)
  1566. if err != nil {
  1567. return err
  1568. }
  1569. delete(p.dbHandle.shares, share.ShareID)
  1570. p.updateSharesOrdering()
  1571. return nil
  1572. }
  1573. func (p *MemoryProvider) getShares(limit int, offset int, order, username string) ([]Share, error) {
  1574. p.dbHandle.Lock()
  1575. defer p.dbHandle.Unlock()
  1576. if p.dbHandle.isClosed {
  1577. return []Share{}, errMemoryProviderClosed
  1578. }
  1579. if limit <= 0 {
  1580. return []Share{}, nil
  1581. }
  1582. shares := make([]Share, 0, limit)
  1583. itNum := 0
  1584. if order == OrderDESC {
  1585. for i := len(p.dbHandle.sharesIDs) - 1; i >= 0; i-- {
  1586. shareID := p.dbHandle.sharesIDs[i]
  1587. s := p.dbHandle.shares[shareID]
  1588. if s.Username != username {
  1589. continue
  1590. }
  1591. itNum++
  1592. if itNum <= offset {
  1593. continue
  1594. }
  1595. share := s.getACopy()
  1596. share.HideConfidentialData()
  1597. shares = append(shares, share)
  1598. if len(shares) >= limit {
  1599. break
  1600. }
  1601. }
  1602. } else {
  1603. for _, shareID := range p.dbHandle.sharesIDs {
  1604. s := p.dbHandle.shares[shareID]
  1605. if s.Username != username {
  1606. continue
  1607. }
  1608. itNum++
  1609. if itNum <= offset {
  1610. continue
  1611. }
  1612. share := s.getACopy()
  1613. share.HideConfidentialData()
  1614. shares = append(shares, share)
  1615. if len(shares) >= limit {
  1616. break
  1617. }
  1618. }
  1619. }
  1620. return shares, nil
  1621. }
  1622. func (p *MemoryProvider) dumpShares() ([]Share, error) {
  1623. p.dbHandle.Lock()
  1624. defer p.dbHandle.Unlock()
  1625. shares := make([]Share, 0, len(p.dbHandle.shares))
  1626. if p.dbHandle.isClosed {
  1627. return shares, errMemoryProviderClosed
  1628. }
  1629. for _, s := range p.dbHandle.shares {
  1630. shares = append(shares, s)
  1631. }
  1632. return shares, nil
  1633. }
  1634. func (p *MemoryProvider) updateShareLastUse(shareID string, numTokens int) error {
  1635. p.dbHandle.Lock()
  1636. defer p.dbHandle.Unlock()
  1637. if p.dbHandle.isClosed {
  1638. return errMemoryProviderClosed
  1639. }
  1640. share, err := p.shareExistsInternal(shareID, "")
  1641. if err != nil {
  1642. return err
  1643. }
  1644. share.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1645. share.UsedTokens += numTokens
  1646. p.dbHandle.shares[share.ShareID] = share
  1647. return nil
  1648. }
  1649. func (p *MemoryProvider) getDefenderHosts(from int64, limit int) ([]DefenderEntry, error) {
  1650. return nil, ErrNotImplemented
  1651. }
  1652. func (p *MemoryProvider) getDefenderHostByIP(ip string, from int64) (DefenderEntry, error) {
  1653. return DefenderEntry{}, ErrNotImplemented
  1654. }
  1655. func (p *MemoryProvider) isDefenderHostBanned(ip string) (DefenderEntry, error) {
  1656. return DefenderEntry{}, ErrNotImplemented
  1657. }
  1658. func (p *MemoryProvider) updateDefenderBanTime(ip string, minutes int) error {
  1659. return ErrNotImplemented
  1660. }
  1661. func (p *MemoryProvider) deleteDefenderHost(ip string) error {
  1662. return ErrNotImplemented
  1663. }
  1664. func (p *MemoryProvider) addDefenderEvent(ip string, score int) error {
  1665. return ErrNotImplemented
  1666. }
  1667. func (p *MemoryProvider) setDefenderBanTime(ip string, banTime int64) error {
  1668. return ErrNotImplemented
  1669. }
  1670. func (p *MemoryProvider) cleanupDefender(from int64) error {
  1671. return ErrNotImplemented
  1672. }
  1673. func (p *MemoryProvider) addActiveTransfer(transfer ActiveTransfer) error {
  1674. return ErrNotImplemented
  1675. }
  1676. func (p *MemoryProvider) updateActiveTransferSizes(ulSize, dlSize, transferID int64, connectionID string) error {
  1677. return ErrNotImplemented
  1678. }
  1679. func (p *MemoryProvider) removeActiveTransfer(transferID int64, connectionID string) error {
  1680. return ErrNotImplemented
  1681. }
  1682. func (p *MemoryProvider) cleanupActiveTransfers(before time.Time) error {
  1683. return ErrNotImplemented
  1684. }
  1685. func (p *MemoryProvider) getActiveTransfers(from time.Time) ([]ActiveTransfer, error) {
  1686. return nil, ErrNotImplemented
  1687. }
  1688. func (p *MemoryProvider) addSharedSession(session Session) error {
  1689. return ErrNotImplemented
  1690. }
  1691. func (p *MemoryProvider) deleteSharedSession(key string) error {
  1692. return ErrNotImplemented
  1693. }
  1694. func (p *MemoryProvider) getSharedSession(key string) (Session, error) {
  1695. return Session{}, ErrNotImplemented
  1696. }
  1697. func (p *MemoryProvider) cleanupSharedSessions(sessionType SessionType, before int64) error {
  1698. return ErrNotImplemented
  1699. }
  1700. func (p *MemoryProvider) getEventActions(limit, offset int, order string, minimal bool) ([]BaseEventAction, error) {
  1701. p.dbHandle.Lock()
  1702. defer p.dbHandle.Unlock()
  1703. if p.dbHandle.isClosed {
  1704. return nil, errMemoryProviderClosed
  1705. }
  1706. if limit <= 0 {
  1707. return nil, nil
  1708. }
  1709. actions := make([]BaseEventAction, 0, limit)
  1710. itNum := 0
  1711. if order == OrderASC {
  1712. for _, name := range p.dbHandle.actionsNames {
  1713. itNum++
  1714. if itNum <= offset {
  1715. continue
  1716. }
  1717. a := p.dbHandle.actions[name]
  1718. action := a.getACopy()
  1719. action.PrepareForRendering()
  1720. actions = append(actions, action)
  1721. if len(actions) >= limit {
  1722. break
  1723. }
  1724. }
  1725. } else {
  1726. for i := len(p.dbHandle.actionsNames) - 1; i >= 0; i-- {
  1727. itNum++
  1728. if itNum <= offset {
  1729. continue
  1730. }
  1731. name := p.dbHandle.actionsNames[i]
  1732. a := p.dbHandle.actions[name]
  1733. action := a.getACopy()
  1734. action.PrepareForRendering()
  1735. actions = append(actions, action)
  1736. if len(actions) >= limit {
  1737. break
  1738. }
  1739. }
  1740. }
  1741. return actions, nil
  1742. }
  1743. func (p *MemoryProvider) dumpEventActions() ([]BaseEventAction, error) {
  1744. p.dbHandle.Lock()
  1745. defer p.dbHandle.Unlock()
  1746. if p.dbHandle.isClosed {
  1747. return nil, errMemoryProviderClosed
  1748. }
  1749. actions := make([]BaseEventAction, 0, len(p.dbHandle.actions))
  1750. for _, name := range p.dbHandle.actionsNames {
  1751. a := p.dbHandle.actions[name]
  1752. action := a.getACopy()
  1753. actions = append(actions, action)
  1754. }
  1755. return actions, nil
  1756. }
  1757. func (p *MemoryProvider) eventActionExists(name string) (BaseEventAction, error) {
  1758. p.dbHandle.Lock()
  1759. defer p.dbHandle.Unlock()
  1760. if p.dbHandle.isClosed {
  1761. return BaseEventAction{}, errMemoryProviderClosed
  1762. }
  1763. return p.actionExistsInternal(name)
  1764. }
  1765. func (p *MemoryProvider) addEventAction(action *BaseEventAction) error {
  1766. err := action.validate()
  1767. if err != nil {
  1768. return err
  1769. }
  1770. p.dbHandle.Lock()
  1771. defer p.dbHandle.Unlock()
  1772. if p.dbHandle.isClosed {
  1773. return errMemoryProviderClosed
  1774. }
  1775. _, err = p.actionExistsInternal(action.Name)
  1776. if err == nil {
  1777. return fmt.Errorf("event action %q already exists", action.Name)
  1778. }
  1779. action.ID = p.getNextActionID()
  1780. action.Rules = nil
  1781. p.dbHandle.actions[action.Name] = action.getACopy()
  1782. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, action.Name)
  1783. sort.Strings(p.dbHandle.actionsNames)
  1784. return nil
  1785. }
  1786. func (p *MemoryProvider) updateEventAction(action *BaseEventAction) error {
  1787. err := action.validate()
  1788. if err != nil {
  1789. return err
  1790. }
  1791. p.dbHandle.Lock()
  1792. defer p.dbHandle.Unlock()
  1793. if p.dbHandle.isClosed {
  1794. return errMemoryProviderClosed
  1795. }
  1796. oldAction, err := p.actionExistsInternal(action.Name)
  1797. if err != nil {
  1798. return fmt.Errorf("event action %s does not exist", action.Name)
  1799. }
  1800. action.ID = oldAction.ID
  1801. action.Name = oldAction.Name
  1802. action.Rules = nil
  1803. if len(oldAction.Rules) > 0 {
  1804. var relatedRules []string
  1805. for _, ruleName := range oldAction.Rules {
  1806. rule, err := p.ruleExistsInternal(ruleName)
  1807. if err == nil {
  1808. relatedRules = append(relatedRules, ruleName)
  1809. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1810. p.dbHandle.rules[ruleName] = rule
  1811. setLastRuleUpdate()
  1812. }
  1813. }
  1814. action.Rules = relatedRules
  1815. }
  1816. p.dbHandle.actions[action.Name] = action.getACopy()
  1817. return nil
  1818. }
  1819. func (p *MemoryProvider) deleteEventAction(action BaseEventAction) error {
  1820. p.dbHandle.Lock()
  1821. defer p.dbHandle.Unlock()
  1822. if p.dbHandle.isClosed {
  1823. return errMemoryProviderClosed
  1824. }
  1825. oldAction, err := p.actionExistsInternal(action.Name)
  1826. if err != nil {
  1827. return fmt.Errorf("event action %s does not exist", action.Name)
  1828. }
  1829. if len(oldAction.Rules) > 0 {
  1830. return util.NewValidationError(fmt.Sprintf("action %s is referenced, it cannot be removed", oldAction.Name))
  1831. }
  1832. delete(p.dbHandle.actions, action.Name)
  1833. // this could be more efficient
  1834. p.dbHandle.actionsNames = make([]string, 0, len(p.dbHandle.actions))
  1835. for name := range p.dbHandle.actions {
  1836. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, name)
  1837. }
  1838. sort.Strings(p.dbHandle.actionsNames)
  1839. return nil
  1840. }
  1841. func (p *MemoryProvider) getEventRules(limit, offset int, order string) ([]EventRule, error) {
  1842. p.dbHandle.Lock()
  1843. defer p.dbHandle.Unlock()
  1844. if p.dbHandle.isClosed {
  1845. return nil, errMemoryProviderClosed
  1846. }
  1847. if limit <= 0 {
  1848. return nil, nil
  1849. }
  1850. itNum := 0
  1851. rules := make([]EventRule, 0, limit)
  1852. if order == OrderASC {
  1853. for _, name := range p.dbHandle.rulesNames {
  1854. itNum++
  1855. if itNum <= offset {
  1856. continue
  1857. }
  1858. r := p.dbHandle.rules[name]
  1859. rule := r.getACopy()
  1860. p.addActionsToRule(&rule)
  1861. rule.PrepareForRendering()
  1862. rules = append(rules, rule)
  1863. if len(rules) >= limit {
  1864. break
  1865. }
  1866. }
  1867. } else {
  1868. for i := len(p.dbHandle.rulesNames) - 1; i >= 0; i-- {
  1869. itNum++
  1870. if itNum <= offset {
  1871. continue
  1872. }
  1873. name := p.dbHandle.rulesNames[i]
  1874. r := p.dbHandle.rules[name]
  1875. rule := r.getACopy()
  1876. p.addActionsToRule(&rule)
  1877. rule.PrepareForRendering()
  1878. rules = append(rules, rule)
  1879. if len(rules) >= limit {
  1880. break
  1881. }
  1882. }
  1883. }
  1884. return rules, nil
  1885. }
  1886. func (p *MemoryProvider) dumpEventRules() ([]EventRule, error) {
  1887. p.dbHandle.Lock()
  1888. defer p.dbHandle.Unlock()
  1889. if p.dbHandle.isClosed {
  1890. return nil, errMemoryProviderClosed
  1891. }
  1892. rules := make([]EventRule, 0, len(p.dbHandle.rules))
  1893. for _, name := range p.dbHandle.rulesNames {
  1894. r := p.dbHandle.rules[name]
  1895. rule := r.getACopy()
  1896. p.addActionsToRule(&rule)
  1897. rules = append(rules, rule)
  1898. }
  1899. return rules, nil
  1900. }
  1901. func (p *MemoryProvider) getRecentlyUpdatedRules(after int64) ([]EventRule, error) {
  1902. if getLastRuleUpdate() < after {
  1903. return nil, nil
  1904. }
  1905. p.dbHandle.Lock()
  1906. defer p.dbHandle.Unlock()
  1907. if p.dbHandle.isClosed {
  1908. return nil, errMemoryProviderClosed
  1909. }
  1910. rules := make([]EventRule, 0, 10)
  1911. for _, name := range p.dbHandle.rulesNames {
  1912. r := p.dbHandle.rules[name]
  1913. if r.UpdatedAt < after {
  1914. continue
  1915. }
  1916. rule := r.getACopy()
  1917. p.addActionsToRule(&rule)
  1918. rules = append(rules, rule)
  1919. }
  1920. return rules, nil
  1921. }
  1922. func (p *MemoryProvider) eventRuleExists(name string) (EventRule, error) {
  1923. p.dbHandle.Lock()
  1924. defer p.dbHandle.Unlock()
  1925. if p.dbHandle.isClosed {
  1926. return EventRule{}, errMemoryProviderClosed
  1927. }
  1928. rule, err := p.ruleExistsInternal(name)
  1929. if err != nil {
  1930. return rule, err
  1931. }
  1932. p.addActionsToRule(&rule)
  1933. return rule, nil
  1934. }
  1935. func (p *MemoryProvider) addEventRule(rule *EventRule) error {
  1936. if err := rule.validate(); err != nil {
  1937. return err
  1938. }
  1939. p.dbHandle.Lock()
  1940. defer p.dbHandle.Unlock()
  1941. if p.dbHandle.isClosed {
  1942. return errMemoryProviderClosed
  1943. }
  1944. _, err := p.ruleExistsInternal(rule.Name)
  1945. if err == nil {
  1946. return fmt.Errorf("event rule %q already exists", rule.Name)
  1947. }
  1948. rule.ID = p.getNextRuleID()
  1949. rule.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1950. rule.UpdatedAt = rule.CreatedAt
  1951. for idx := range rule.Actions {
  1952. if err := p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  1953. return err
  1954. }
  1955. }
  1956. sort.Slice(rule.Actions, func(i, j int) bool {
  1957. return rule.Actions[i].Order < rule.Actions[j].Order
  1958. })
  1959. p.dbHandle.rules[rule.Name] = rule.getACopy()
  1960. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, rule.Name)
  1961. sort.Strings(p.dbHandle.rulesNames)
  1962. setLastRuleUpdate()
  1963. return nil
  1964. }
  1965. func (p *MemoryProvider) updateEventRule(rule *EventRule) error {
  1966. if err := rule.validate(); err != nil {
  1967. return err
  1968. }
  1969. p.dbHandle.Lock()
  1970. defer p.dbHandle.Unlock()
  1971. if p.dbHandle.isClosed {
  1972. return errMemoryProviderClosed
  1973. }
  1974. oldRule, err := p.ruleExistsInternal(rule.Name)
  1975. if err != nil {
  1976. return err
  1977. }
  1978. for idx := range oldRule.Actions {
  1979. if err = p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name); err != nil {
  1980. return err
  1981. }
  1982. }
  1983. for idx := range rule.Actions {
  1984. if err = p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  1985. return err
  1986. }
  1987. }
  1988. rule.ID = oldRule.ID
  1989. rule.CreatedAt = oldRule.CreatedAt
  1990. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1991. sort.Slice(rule.Actions, func(i, j int) bool {
  1992. return rule.Actions[i].Order < rule.Actions[j].Order
  1993. })
  1994. p.dbHandle.rules[rule.Name] = rule.getACopy()
  1995. setLastRuleUpdate()
  1996. return nil
  1997. }
  1998. func (p *MemoryProvider) deleteEventRule(rule EventRule, softDelete bool) error {
  1999. p.dbHandle.Lock()
  2000. defer p.dbHandle.Unlock()
  2001. if p.dbHandle.isClosed {
  2002. return errMemoryProviderClosed
  2003. }
  2004. oldRule, err := p.ruleExistsInternal(rule.Name)
  2005. if err != nil {
  2006. return err
  2007. }
  2008. if len(oldRule.Actions) > 0 {
  2009. for idx := range oldRule.Actions {
  2010. if err = p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name); err != nil {
  2011. return err
  2012. }
  2013. }
  2014. }
  2015. delete(p.dbHandle.rules, rule.Name)
  2016. p.dbHandle.rulesNames = make([]string, 0, len(p.dbHandle.rules))
  2017. for name := range p.dbHandle.rules {
  2018. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, name)
  2019. }
  2020. sort.Strings(p.dbHandle.rulesNames)
  2021. setLastRuleUpdate()
  2022. return nil
  2023. }
  2024. func (p *MemoryProvider) getTaskByName(name string) (Task, error) {
  2025. return Task{}, ErrNotImplemented
  2026. }
  2027. func (p *MemoryProvider) addTask(name string) error {
  2028. return ErrNotImplemented
  2029. }
  2030. func (p *MemoryProvider) updateTask(name string, version int64) error {
  2031. return ErrNotImplemented
  2032. }
  2033. func (p *MemoryProvider) updateTaskTimestamp(name string) error {
  2034. return ErrNotImplemented
  2035. }
  2036. func (p *MemoryProvider) getNextID() int64 {
  2037. nextID := int64(1)
  2038. for _, v := range p.dbHandle.users {
  2039. if v.ID >= nextID {
  2040. nextID = v.ID + 1
  2041. }
  2042. }
  2043. return nextID
  2044. }
  2045. func (p *MemoryProvider) getNextFolderID() int64 {
  2046. nextID := int64(1)
  2047. for _, v := range p.dbHandle.vfolders {
  2048. if v.ID >= nextID {
  2049. nextID = v.ID + 1
  2050. }
  2051. }
  2052. return nextID
  2053. }
  2054. func (p *MemoryProvider) getNextAdminID() int64 {
  2055. nextID := int64(1)
  2056. for _, a := range p.dbHandle.admins {
  2057. if a.ID >= nextID {
  2058. nextID = a.ID + 1
  2059. }
  2060. }
  2061. return nextID
  2062. }
  2063. func (p *MemoryProvider) getNextGroupID() int64 {
  2064. nextID := int64(1)
  2065. for _, g := range p.dbHandle.groups {
  2066. if g.ID >= nextID {
  2067. nextID = g.ID + 1
  2068. }
  2069. }
  2070. return nextID
  2071. }
  2072. func (p *MemoryProvider) getNextActionID() int64 {
  2073. nextID := int64(1)
  2074. for _, a := range p.dbHandle.actions {
  2075. if a.ID >= nextID {
  2076. nextID = a.ID + 1
  2077. }
  2078. }
  2079. return nextID
  2080. }
  2081. func (p *MemoryProvider) getNextRuleID() int64 {
  2082. nextID := int64(1)
  2083. for _, r := range p.dbHandle.rules {
  2084. if r.ID >= nextID {
  2085. nextID = r.ID + 1
  2086. }
  2087. }
  2088. return nextID
  2089. }
  2090. func (p *MemoryProvider) clear() {
  2091. p.dbHandle.Lock()
  2092. defer p.dbHandle.Unlock()
  2093. p.dbHandle.usernames = []string{}
  2094. p.dbHandle.users = make(map[string]User)
  2095. p.dbHandle.vfoldersNames = []string{}
  2096. p.dbHandle.vfolders = make(map[string]vfs.BaseVirtualFolder)
  2097. p.dbHandle.admins = make(map[string]Admin)
  2098. p.dbHandle.adminsUsernames = []string{}
  2099. p.dbHandle.apiKeys = make(map[string]APIKey)
  2100. p.dbHandle.apiKeysIDs = []string{}
  2101. p.dbHandle.shares = make(map[string]Share)
  2102. p.dbHandle.sharesIDs = []string{}
  2103. }
  2104. func (p *MemoryProvider) reloadConfig() error {
  2105. if p.dbHandle.configFile == "" {
  2106. providerLog(logger.LevelDebug, "no dump configuration file defined")
  2107. return nil
  2108. }
  2109. providerLog(logger.LevelDebug, "loading dump from file: %#v", p.dbHandle.configFile)
  2110. fi, err := os.Stat(p.dbHandle.configFile)
  2111. if err != nil {
  2112. providerLog(logger.LevelError, "error loading dump: %v", err)
  2113. return err
  2114. }
  2115. if fi.Size() == 0 {
  2116. err = errors.New("dump configuration file is invalid, its size must be > 0")
  2117. providerLog(logger.LevelError, "error loading dump: %v", err)
  2118. return err
  2119. }
  2120. if fi.Size() > 10485760 {
  2121. err = errors.New("dump configuration file is invalid, its size must be <= 10485760 bytes")
  2122. providerLog(logger.LevelError, "error loading dump: %v", err)
  2123. return err
  2124. }
  2125. content, err := os.ReadFile(p.dbHandle.configFile)
  2126. if err != nil {
  2127. providerLog(logger.LevelError, "error loading dump: %v", err)
  2128. return err
  2129. }
  2130. dump, err := ParseDumpData(content)
  2131. if err != nil {
  2132. providerLog(logger.LevelError, "error loading dump: %v", err)
  2133. return err
  2134. }
  2135. p.clear()
  2136. if err := p.restoreFolders(dump); err != nil {
  2137. return err
  2138. }
  2139. if err := p.restoreGroups(dump); err != nil {
  2140. return err
  2141. }
  2142. if err := p.restoreUsers(dump); err != nil {
  2143. return err
  2144. }
  2145. if err := p.restoreAdmins(dump); err != nil {
  2146. return err
  2147. }
  2148. if err := p.restoreAPIKeys(dump); err != nil {
  2149. return err
  2150. }
  2151. if err := p.restoreShares(dump); err != nil {
  2152. return err
  2153. }
  2154. if err := p.restoreEventActions(dump); err != nil {
  2155. return err
  2156. }
  2157. if err := p.restoreEventRules(dump); err != nil {
  2158. return err
  2159. }
  2160. providerLog(logger.LevelDebug, "config loaded from file: %#v", p.dbHandle.configFile)
  2161. return nil
  2162. }
  2163. func (p *MemoryProvider) restoreEventActions(dump BackupData) error {
  2164. for _, action := range dump.EventActions {
  2165. a, err := p.eventActionExists(action.Name)
  2166. action := action // pin
  2167. if err == nil {
  2168. action.ID = a.ID
  2169. err = UpdateEventAction(&action, ActionExecutorSystem, "")
  2170. if err != nil {
  2171. providerLog(logger.LevelError, "error updating event action %q: %v", action.Name, err)
  2172. return err
  2173. }
  2174. } else {
  2175. err = AddEventAction(&action, ActionExecutorSystem, "")
  2176. if err != nil {
  2177. providerLog(logger.LevelError, "error adding event action %q: %v", action.Name, err)
  2178. return err
  2179. }
  2180. }
  2181. }
  2182. return nil
  2183. }
  2184. func (p *MemoryProvider) restoreEventRules(dump BackupData) error {
  2185. for _, rule := range dump.EventRules {
  2186. r, err := p.eventRuleExists(rule.Name)
  2187. rule := rule // pin
  2188. if err == nil {
  2189. rule.ID = r.ID
  2190. err = UpdateEventRule(&rule, ActionExecutorSystem, "")
  2191. if err != nil {
  2192. providerLog(logger.LevelError, "error updating event rule %q: %v", rule.Name, err)
  2193. return err
  2194. }
  2195. } else {
  2196. err = AddEventRule(&rule, ActionExecutorSystem, "")
  2197. if err != nil {
  2198. providerLog(logger.LevelError, "error adding event rule %q: %v", rule.Name, err)
  2199. return err
  2200. }
  2201. }
  2202. }
  2203. return nil
  2204. }
  2205. func (p *MemoryProvider) restoreShares(dump BackupData) error {
  2206. for _, share := range dump.Shares {
  2207. s, err := p.shareExists(share.ShareID, "")
  2208. share := share // pin
  2209. share.IsRestore = true
  2210. if err == nil {
  2211. share.ID = s.ID
  2212. err = UpdateShare(&share, ActionExecutorSystem, "")
  2213. if err != nil {
  2214. providerLog(logger.LevelError, "error updating share %#v: %v", share.ShareID, err)
  2215. return err
  2216. }
  2217. } else {
  2218. err = AddShare(&share, ActionExecutorSystem, "")
  2219. if err != nil {
  2220. providerLog(logger.LevelError, "error adding share %#v: %v", share.ShareID, err)
  2221. return err
  2222. }
  2223. }
  2224. }
  2225. return nil
  2226. }
  2227. func (p *MemoryProvider) restoreAPIKeys(dump BackupData) error {
  2228. for _, apiKey := range dump.APIKeys {
  2229. if apiKey.Key == "" {
  2230. return fmt.Errorf("cannot restore an empty API key: %+v", apiKey)
  2231. }
  2232. k, err := p.apiKeyExists(apiKey.KeyID)
  2233. apiKey := apiKey // pin
  2234. if err == nil {
  2235. apiKey.ID = k.ID
  2236. err = UpdateAPIKey(&apiKey, ActionExecutorSystem, "")
  2237. if err != nil {
  2238. providerLog(logger.LevelError, "error updating API key %#v: %v", apiKey.KeyID, err)
  2239. return err
  2240. }
  2241. } else {
  2242. err = AddAPIKey(&apiKey, ActionExecutorSystem, "")
  2243. if err != nil {
  2244. providerLog(logger.LevelError, "error adding API key %#v: %v", apiKey.KeyID, err)
  2245. return err
  2246. }
  2247. }
  2248. }
  2249. return nil
  2250. }
  2251. func (p *MemoryProvider) restoreAdmins(dump BackupData) error {
  2252. for _, admin := range dump.Admins {
  2253. admin := admin // pin
  2254. admin.Username = config.convertName(admin.Username)
  2255. a, err := p.adminExists(admin.Username)
  2256. if err == nil {
  2257. admin.ID = a.ID
  2258. err = UpdateAdmin(&admin, ActionExecutorSystem, "")
  2259. if err != nil {
  2260. providerLog(logger.LevelError, "error updating admin %#v: %v", admin.Username, err)
  2261. return err
  2262. }
  2263. } else {
  2264. err = AddAdmin(&admin, ActionExecutorSystem, "")
  2265. if err != nil {
  2266. providerLog(logger.LevelError, "error adding admin %#v: %v", admin.Username, err)
  2267. return err
  2268. }
  2269. }
  2270. }
  2271. return nil
  2272. }
  2273. func (p *MemoryProvider) restoreGroups(dump BackupData) error {
  2274. for _, group := range dump.Groups {
  2275. group := group // pin
  2276. group.Name = config.convertName(group.Name)
  2277. g, err := p.groupExists(group.Name)
  2278. if err == nil {
  2279. group.ID = g.ID
  2280. err = UpdateGroup(&group, g.Users, ActionExecutorSystem, "")
  2281. if err != nil {
  2282. providerLog(logger.LevelError, "error updating group %#v: %v", group.Name, err)
  2283. return err
  2284. }
  2285. } else {
  2286. group.Users = nil
  2287. err = AddGroup(&group, ActionExecutorSystem, "")
  2288. if err != nil {
  2289. providerLog(logger.LevelError, "error adding group %#v: %v", group.Name, err)
  2290. return err
  2291. }
  2292. }
  2293. }
  2294. return nil
  2295. }
  2296. func (p *MemoryProvider) restoreFolders(dump BackupData) error {
  2297. for _, folder := range dump.Folders {
  2298. folder := folder // pin
  2299. folder.Name = config.convertName(folder.Name)
  2300. f, err := p.getFolderByName(folder.Name)
  2301. if err == nil {
  2302. folder.ID = f.ID
  2303. err = UpdateFolder(&folder, f.Users, f.Groups, ActionExecutorSystem, "")
  2304. if err != nil {
  2305. providerLog(logger.LevelError, "error updating folder %#v: %v", folder.Name, err)
  2306. return err
  2307. }
  2308. } else {
  2309. folder.Users = nil
  2310. err = AddFolder(&folder)
  2311. if err != nil {
  2312. providerLog(logger.LevelError, "error adding folder %#v: %v", folder.Name, err)
  2313. return err
  2314. }
  2315. }
  2316. }
  2317. return nil
  2318. }
  2319. func (p *MemoryProvider) restoreUsers(dump BackupData) error {
  2320. for _, user := range dump.Users {
  2321. user := user // pin
  2322. user.Username = config.convertName(user.Username)
  2323. u, err := p.userExists(user.Username)
  2324. if err == nil {
  2325. user.ID = u.ID
  2326. err = UpdateUser(&user, ActionExecutorSystem, "")
  2327. if err != nil {
  2328. providerLog(logger.LevelError, "error updating user %#v: %v", user.Username, err)
  2329. return err
  2330. }
  2331. } else {
  2332. err = AddUser(&user, ActionExecutorSystem, "")
  2333. if err != nil {
  2334. providerLog(logger.LevelError, "error adding user %#v: %v", user.Username, err)
  2335. return err
  2336. }
  2337. }
  2338. }
  2339. return nil
  2340. }
  2341. // initializeDatabase does nothing, no initilization is needed for memory provider
  2342. func (p *MemoryProvider) initializeDatabase() error {
  2343. return ErrNoInitRequired
  2344. }
  2345. func (p *MemoryProvider) migrateDatabase() error {
  2346. return ErrNoInitRequired
  2347. }
  2348. func (p *MemoryProvider) revertDatabase(targetVersion int) error {
  2349. return errors.New("memory provider does not store data, revert not possible")
  2350. }
  2351. func (p *MemoryProvider) resetDatabase() error {
  2352. return errors.New("memory provider does not store data, reset not possible")
  2353. }