service_portable.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. //go:build !noportable
  15. // +build !noportable
  16. package service
  17. import (
  18. "fmt"
  19. "math/rand"
  20. "strings"
  21. "time"
  22. "github.com/sftpgo/sdk"
  23. "github.com/drakkan/sftpgo/v2/internal/config"
  24. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  25. "github.com/drakkan/sftpgo/v2/internal/ftpd"
  26. "github.com/drakkan/sftpgo/v2/internal/kms"
  27. "github.com/drakkan/sftpgo/v2/internal/logger"
  28. "github.com/drakkan/sftpgo/v2/internal/sftpd"
  29. "github.com/drakkan/sftpgo/v2/internal/util"
  30. "github.com/drakkan/sftpgo/v2/internal/version"
  31. "github.com/drakkan/sftpgo/v2/internal/webdavd"
  32. )
  33. // StartPortableMode starts the service in portable mode
  34. func (s *Service) StartPortableMode(sftpdPort, ftpPort, webdavPort int, enabledSSHCommands []string,
  35. ftpsCert, ftpsKey, webDavCert, webDavKey string) error {
  36. if s.PortableMode != 1 {
  37. return fmt.Errorf("service is not configured for portable mode")
  38. }
  39. rand.Seed(time.Now().UnixNano())
  40. err := config.LoadConfig(s.ConfigDir, s.ConfigFile)
  41. if err != nil {
  42. fmt.Printf("error loading configuration file: %v using defaults\n", err)
  43. }
  44. kmsConfig := config.GetKMSConfig()
  45. err = kmsConfig.Initialize()
  46. if err != nil {
  47. return err
  48. }
  49. printablePassword := s.configurePortableUser()
  50. dataProviderConf := config.GetProviderConf()
  51. dataProviderConf.Driver = dataprovider.MemoryDataProviderName
  52. dataProviderConf.Name = ""
  53. config.SetProviderConf(dataProviderConf)
  54. httpdConf := config.GetHTTPDConfig()
  55. httpdConf.Bindings = nil
  56. config.SetHTTPDConfig(httpdConf)
  57. telemetryConf := config.GetTelemetryConfig()
  58. telemetryConf.BindPort = 0
  59. config.SetTelemetryConfig(telemetryConf)
  60. sftpdConf := config.GetSFTPDConfig()
  61. sftpdConf.MaxAuthTries = 12
  62. sftpdConf.Bindings = []sftpd.Binding{
  63. {
  64. Port: sftpdPort,
  65. },
  66. }
  67. if sftpdPort >= 0 {
  68. if sftpdPort > 0 {
  69. sftpdConf.Bindings[0].Port = sftpdPort
  70. } else {
  71. // dynamic ports starts from 49152
  72. sftpdConf.Bindings[0].Port = 49152 + rand.Intn(15000)
  73. }
  74. if util.Contains(enabledSSHCommands, "*") {
  75. sftpdConf.EnabledSSHCommands = sftpd.GetSupportedSSHCommands()
  76. } else {
  77. sftpdConf.EnabledSSHCommands = enabledSSHCommands
  78. }
  79. }
  80. config.SetSFTPDConfig(sftpdConf)
  81. if ftpPort >= 0 {
  82. ftpConf := config.GetFTPDConfig()
  83. binding := ftpd.Binding{}
  84. if ftpPort > 0 {
  85. binding.Port = ftpPort
  86. } else {
  87. binding.Port = 49152 + rand.Intn(15000)
  88. }
  89. ftpConf.Bindings = []ftpd.Binding{binding}
  90. ftpConf.Banner = fmt.Sprintf("SFTPGo portable %v ready", version.Get().Version)
  91. ftpConf.CertificateFile = ftpsCert
  92. ftpConf.CertificateKeyFile = ftpsKey
  93. config.SetFTPDConfig(ftpConf)
  94. }
  95. if webdavPort >= 0 {
  96. webDavConf := config.GetWebDAVDConfig()
  97. binding := webdavd.Binding{}
  98. if webdavPort > 0 {
  99. binding.Port = webdavPort
  100. } else {
  101. binding.Port = 49152 + rand.Intn(15000)
  102. }
  103. webDavConf.Bindings = []webdavd.Binding{binding}
  104. webDavConf.CertificateFile = webDavCert
  105. webDavConf.CertificateKeyFile = webDavKey
  106. config.SetWebDAVDConfig(webDavConf)
  107. }
  108. err = s.Start(true)
  109. if err != nil {
  110. return err
  111. }
  112. logger.InfoToConsole("Portable mode ready, user: %#v, password: %#v, public keys: %v, directory: %#v, "+
  113. "permissions: %+v, enabled ssh commands: %v file patterns filters: %+v %v", s.PortableUser.Username,
  114. printablePassword, s.PortableUser.PublicKeys, s.getPortableDirToServe(), s.PortableUser.Permissions,
  115. sftpdConf.EnabledSSHCommands, s.PortableUser.Filters.FilePatterns, s.getServiceOptionalInfoString())
  116. return nil
  117. }
  118. func (s *Service) getServiceOptionalInfoString() string {
  119. var info strings.Builder
  120. if config.GetSFTPDConfig().Bindings[0].IsValid() {
  121. info.WriteString(fmt.Sprintf("SFTP port: %v ", config.GetSFTPDConfig().Bindings[0].Port))
  122. }
  123. if config.GetFTPDConfig().Bindings[0].IsValid() {
  124. info.WriteString(fmt.Sprintf("FTP port: %v ", config.GetFTPDConfig().Bindings[0].Port))
  125. }
  126. if config.GetWebDAVDConfig().Bindings[0].IsValid() {
  127. scheme := "http"
  128. if config.GetWebDAVDConfig().CertificateFile != "" && config.GetWebDAVDConfig().CertificateKeyFile != "" {
  129. scheme = "https"
  130. }
  131. info.WriteString(fmt.Sprintf("WebDAV URL: %v://<your IP>:%v/", scheme, config.GetWebDAVDConfig().Bindings[0].Port))
  132. }
  133. return info.String()
  134. }
  135. func (s *Service) getPortableDirToServe() string {
  136. switch s.PortableUser.FsConfig.Provider {
  137. case sdk.S3FilesystemProvider:
  138. return s.PortableUser.FsConfig.S3Config.KeyPrefix
  139. case sdk.GCSFilesystemProvider:
  140. return s.PortableUser.FsConfig.GCSConfig.KeyPrefix
  141. case sdk.AzureBlobFilesystemProvider:
  142. return s.PortableUser.FsConfig.AzBlobConfig.KeyPrefix
  143. case sdk.SFTPFilesystemProvider:
  144. return s.PortableUser.FsConfig.SFTPConfig.Prefix
  145. case sdk.HTTPFilesystemProvider:
  146. return "/"
  147. default:
  148. return s.PortableUser.HomeDir
  149. }
  150. }
  151. // configures the portable user and return the printable password if any
  152. func (s *Service) configurePortableUser() string {
  153. if s.PortableUser.Username == "" {
  154. s.PortableUser.Username = "user"
  155. }
  156. printablePassword := ""
  157. if s.PortableUser.Password != "" {
  158. printablePassword = "[redacted]"
  159. }
  160. if len(s.PortableUser.PublicKeys) == 0 && s.PortableUser.Password == "" {
  161. var b strings.Builder
  162. for i := 0; i < 8; i++ {
  163. b.WriteRune(chars[rand.Intn(len(chars))])
  164. }
  165. s.PortableUser.Password = b.String()
  166. printablePassword = s.PortableUser.Password
  167. }
  168. s.configurePortableSecrets()
  169. return printablePassword
  170. }
  171. func (s *Service) configurePortableSecrets() {
  172. // we created the user before to initialize the KMS so we need to create the secret here
  173. switch s.PortableUser.FsConfig.Provider {
  174. case sdk.S3FilesystemProvider:
  175. payload := s.PortableUser.FsConfig.S3Config.AccessSecret.GetPayload()
  176. s.PortableUser.FsConfig.S3Config.AccessSecret = getSecretFromString(payload)
  177. case sdk.GCSFilesystemProvider:
  178. payload := s.PortableUser.FsConfig.GCSConfig.Credentials.GetPayload()
  179. s.PortableUser.FsConfig.GCSConfig.Credentials = getSecretFromString(payload)
  180. case sdk.AzureBlobFilesystemProvider:
  181. payload := s.PortableUser.FsConfig.AzBlobConfig.AccountKey.GetPayload()
  182. s.PortableUser.FsConfig.AzBlobConfig.AccountKey = getSecretFromString(payload)
  183. payload = s.PortableUser.FsConfig.AzBlobConfig.SASURL.GetPayload()
  184. s.PortableUser.FsConfig.AzBlobConfig.SASURL = getSecretFromString(payload)
  185. case sdk.CryptedFilesystemProvider:
  186. payload := s.PortableUser.FsConfig.CryptConfig.Passphrase.GetPayload()
  187. s.PortableUser.FsConfig.CryptConfig.Passphrase = getSecretFromString(payload)
  188. case sdk.SFTPFilesystemProvider:
  189. payload := s.PortableUser.FsConfig.SFTPConfig.Password.GetPayload()
  190. s.PortableUser.FsConfig.SFTPConfig.Password = getSecretFromString(payload)
  191. payload = s.PortableUser.FsConfig.SFTPConfig.PrivateKey.GetPayload()
  192. s.PortableUser.FsConfig.SFTPConfig.PrivateKey = getSecretFromString(payload)
  193. payload = s.PortableUser.FsConfig.SFTPConfig.KeyPassphrase.GetPayload()
  194. s.PortableUser.FsConfig.SFTPConfig.KeyPassphrase = getSecretFromString(payload)
  195. case sdk.HTTPFilesystemProvider:
  196. payload := s.PortableUser.FsConfig.HTTPConfig.Password.GetPayload()
  197. s.PortableUser.FsConfig.HTTPConfig.Password = getSecretFromString(payload)
  198. payload = s.PortableUser.FsConfig.HTTPConfig.APIKey.GetPayload()
  199. s.PortableUser.FsConfig.HTTPConfig.APIKey = getSecretFromString(payload)
  200. }
  201. }
  202. func getSecretFromString(payload string) *kms.Secret {
  203. if payload != "" {
  204. return kms.NewPlainSecret(payload)
  205. }
  206. return kms.NewEmptySecret()
  207. }