memory.go 88 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package dataprovider
  15. import (
  16. "bytes"
  17. "crypto/x509"
  18. "errors"
  19. "fmt"
  20. "net/netip"
  21. "os"
  22. "path/filepath"
  23. "slices"
  24. "sort"
  25. "strconv"
  26. "sync"
  27. "time"
  28. "github.com/drakkan/sftpgo/v2/internal/logger"
  29. "github.com/drakkan/sftpgo/v2/internal/util"
  30. "github.com/drakkan/sftpgo/v2/internal/vfs"
  31. )
  32. var (
  33. errMemoryProviderClosed = errors.New("memory provider is closed")
  34. )
  35. type memoryProviderHandle struct {
  36. // configuration file to use for loading users
  37. configFile string
  38. sync.Mutex
  39. isClosed bool
  40. // slice with ordered usernames
  41. usernames []string
  42. // map for users, username is the key
  43. users map[string]User
  44. // slice with ordered group names
  45. groupnames []string
  46. // map for group, group name is the key
  47. groups map[string]Group
  48. // map for virtual folders, folder name is the key
  49. vfolders map[string]vfs.BaseVirtualFolder
  50. // slice with ordered folder names
  51. vfoldersNames []string
  52. // map for admins, username is the key
  53. admins map[string]Admin
  54. // slice with ordered admins
  55. adminsUsernames []string
  56. // map for API keys, keyID is the key
  57. apiKeys map[string]APIKey
  58. // slice with ordered API keys KeyID
  59. apiKeysIDs []string
  60. // map for shares, shareID is the key
  61. shares map[string]Share
  62. // slice with ordered shares shareID
  63. sharesIDs []string
  64. // map for event actions, name is the key
  65. actions map[string]BaseEventAction
  66. // slice with ordered actions
  67. actionsNames []string
  68. // map for event actions, name is the key
  69. rules map[string]EventRule
  70. // slice with ordered rules
  71. rulesNames []string
  72. // map for roles, name is the key
  73. roles map[string]Role
  74. // slice with ordered roles
  75. roleNames []string
  76. // map for IP List entry
  77. ipListEntries map[string]IPListEntry
  78. // slice with ordered IP list entries
  79. ipListEntriesKeys []string
  80. // configurations
  81. configs Configs
  82. }
  83. // MemoryProvider defines the auth provider for a memory store
  84. type MemoryProvider struct {
  85. dbHandle *memoryProviderHandle
  86. }
  87. func initializeMemoryProvider(basePath string) error {
  88. configFile := ""
  89. if util.IsFileInputValid(config.Name) {
  90. configFile = config.Name
  91. if !filepath.IsAbs(configFile) {
  92. configFile = filepath.Join(basePath, configFile)
  93. }
  94. }
  95. provider = &MemoryProvider{
  96. dbHandle: &memoryProviderHandle{
  97. isClosed: false,
  98. usernames: []string{},
  99. users: make(map[string]User),
  100. groupnames: []string{},
  101. groups: make(map[string]Group),
  102. vfolders: make(map[string]vfs.BaseVirtualFolder),
  103. vfoldersNames: []string{},
  104. admins: make(map[string]Admin),
  105. adminsUsernames: []string{},
  106. apiKeys: make(map[string]APIKey),
  107. apiKeysIDs: []string{},
  108. shares: make(map[string]Share),
  109. sharesIDs: []string{},
  110. actions: make(map[string]BaseEventAction),
  111. actionsNames: []string{},
  112. rules: make(map[string]EventRule),
  113. rulesNames: []string{},
  114. roles: map[string]Role{},
  115. roleNames: []string{},
  116. ipListEntries: map[string]IPListEntry{},
  117. ipListEntriesKeys: []string{},
  118. configs: Configs{},
  119. configFile: configFile,
  120. },
  121. }
  122. return provider.reloadConfig()
  123. }
  124. func (p *MemoryProvider) checkAvailability() error {
  125. p.dbHandle.Lock()
  126. defer p.dbHandle.Unlock()
  127. if p.dbHandle.isClosed {
  128. return errMemoryProviderClosed
  129. }
  130. return nil
  131. }
  132. func (p *MemoryProvider) close() error {
  133. p.dbHandle.Lock()
  134. defer p.dbHandle.Unlock()
  135. if p.dbHandle.isClosed {
  136. return errMemoryProviderClosed
  137. }
  138. p.dbHandle.isClosed = true
  139. return nil
  140. }
  141. func (p *MemoryProvider) validateUserAndTLSCert(username, protocol string, tlsCert *x509.Certificate) (User, error) {
  142. var user User
  143. if tlsCert == nil {
  144. return user, errors.New("TLS certificate cannot be null or empty")
  145. }
  146. user, err := p.userExists(username, "")
  147. if err != nil {
  148. providerLog(logger.LevelWarn, "error authenticating user %q: %v", username, err)
  149. return user, err
  150. }
  151. return checkUserAndTLSCertificate(&user, protocol, tlsCert)
  152. }
  153. func (p *MemoryProvider) validateUserAndPass(username, password, ip, protocol string) (User, error) {
  154. user, err := p.userExists(username, "")
  155. if err != nil {
  156. providerLog(logger.LevelWarn, "error authenticating user %q: %v", username, err)
  157. return user, err
  158. }
  159. return checkUserAndPass(&user, password, ip, protocol)
  160. }
  161. func (p *MemoryProvider) validateUserAndPubKey(username string, pubKey []byte, isSSHCert bool) (User, string, error) {
  162. var user User
  163. if len(pubKey) == 0 {
  164. return user, "", errors.New("credentials cannot be null or empty")
  165. }
  166. user, err := p.userExists(username, "")
  167. if err != nil {
  168. providerLog(logger.LevelWarn, "error authenticating user %q: %v", username, err)
  169. return user, "", err
  170. }
  171. return checkUserAndPubKey(&user, pubKey, isSSHCert)
  172. }
  173. func (p *MemoryProvider) validateAdminAndPass(username, password, ip string) (Admin, error) {
  174. admin, err := p.adminExists(username)
  175. if err != nil {
  176. providerLog(logger.LevelWarn, "error authenticating admin %q: %v", username, err)
  177. return admin, err
  178. }
  179. err = admin.checkUserAndPass(password, ip)
  180. return admin, err
  181. }
  182. func (p *MemoryProvider) updateAPIKeyLastUse(keyID string) error {
  183. p.dbHandle.Lock()
  184. defer p.dbHandle.Unlock()
  185. if p.dbHandle.isClosed {
  186. return errMemoryProviderClosed
  187. }
  188. apiKey, err := p.apiKeyExistsInternal(keyID)
  189. if err != nil {
  190. return err
  191. }
  192. apiKey.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  193. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey
  194. return nil
  195. }
  196. func (p *MemoryProvider) getAdminSignature(username string) (string, error) {
  197. p.dbHandle.Lock()
  198. defer p.dbHandle.Unlock()
  199. if p.dbHandle.isClosed {
  200. return "", errMemoryProviderClosed
  201. }
  202. admin, err := p.adminExistsInternal(username)
  203. if err != nil {
  204. return "", err
  205. }
  206. return strconv.FormatInt(admin.UpdatedAt, 10), nil
  207. }
  208. func (p *MemoryProvider) getUserSignature(username string) (string, error) {
  209. p.dbHandle.Lock()
  210. defer p.dbHandle.Unlock()
  211. if p.dbHandle.isClosed {
  212. return "", errMemoryProviderClosed
  213. }
  214. user, err := p.userExistsInternal(username)
  215. if err != nil {
  216. return "", err
  217. }
  218. return strconv.FormatInt(user.UpdatedAt, 10), nil
  219. }
  220. func (p *MemoryProvider) setUpdatedAt(username string) {
  221. p.dbHandle.Lock()
  222. defer p.dbHandle.Unlock()
  223. if p.dbHandle.isClosed {
  224. return
  225. }
  226. user, err := p.userExistsInternal(username)
  227. if err != nil {
  228. return
  229. }
  230. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  231. p.dbHandle.users[user.Username] = user
  232. setLastUserUpdate()
  233. }
  234. func (p *MemoryProvider) updateLastLogin(username string) error {
  235. p.dbHandle.Lock()
  236. defer p.dbHandle.Unlock()
  237. if p.dbHandle.isClosed {
  238. return errMemoryProviderClosed
  239. }
  240. user, err := p.userExistsInternal(username)
  241. if err != nil {
  242. return err
  243. }
  244. user.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  245. p.dbHandle.users[user.Username] = user
  246. return nil
  247. }
  248. func (p *MemoryProvider) updateAdminLastLogin(username string) error {
  249. p.dbHandle.Lock()
  250. defer p.dbHandle.Unlock()
  251. if p.dbHandle.isClosed {
  252. return errMemoryProviderClosed
  253. }
  254. admin, err := p.adminExistsInternal(username)
  255. if err != nil {
  256. return err
  257. }
  258. admin.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  259. p.dbHandle.admins[admin.Username] = admin
  260. return nil
  261. }
  262. func (p *MemoryProvider) updateTransferQuota(username string, uploadSize, downloadSize int64, reset bool) error {
  263. p.dbHandle.Lock()
  264. defer p.dbHandle.Unlock()
  265. if p.dbHandle.isClosed {
  266. return errMemoryProviderClosed
  267. }
  268. user, err := p.userExistsInternal(username)
  269. if err != nil {
  270. providerLog(logger.LevelError, "unable to update transfer quota for user %q error: %v", username, err)
  271. return err
  272. }
  273. if reset {
  274. user.UsedUploadDataTransfer = uploadSize
  275. user.UsedDownloadDataTransfer = downloadSize
  276. } else {
  277. user.UsedUploadDataTransfer += uploadSize
  278. user.UsedDownloadDataTransfer += downloadSize
  279. }
  280. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  281. providerLog(logger.LevelDebug, "transfer quota updated for user %q, ul increment: %v dl increment: %v is reset? %v",
  282. username, uploadSize, downloadSize, reset)
  283. p.dbHandle.users[user.Username] = user
  284. return nil
  285. }
  286. func (p *MemoryProvider) updateQuota(username string, filesAdd int, sizeAdd int64, reset bool) error {
  287. p.dbHandle.Lock()
  288. defer p.dbHandle.Unlock()
  289. if p.dbHandle.isClosed {
  290. return errMemoryProviderClosed
  291. }
  292. user, err := p.userExistsInternal(username)
  293. if err != nil {
  294. providerLog(logger.LevelError, "unable to update quota for user %q error: %v", username, err)
  295. return err
  296. }
  297. if reset {
  298. user.UsedQuotaSize = sizeAdd
  299. user.UsedQuotaFiles = filesAdd
  300. } else {
  301. user.UsedQuotaSize += sizeAdd
  302. user.UsedQuotaFiles += filesAdd
  303. }
  304. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  305. providerLog(logger.LevelDebug, "quota updated for user %q, files increment: %v size increment: %v is reset? %v",
  306. username, filesAdd, sizeAdd, reset)
  307. p.dbHandle.users[user.Username] = user
  308. return nil
  309. }
  310. func (p *MemoryProvider) getUsedQuota(username string) (int, int64, int64, int64, error) {
  311. p.dbHandle.Lock()
  312. defer p.dbHandle.Unlock()
  313. if p.dbHandle.isClosed {
  314. return 0, 0, 0, 0, errMemoryProviderClosed
  315. }
  316. user, err := p.userExistsInternal(username)
  317. if err != nil {
  318. providerLog(logger.LevelError, "unable to get quota for user %q error: %v", username, err)
  319. return 0, 0, 0, 0, err
  320. }
  321. return user.UsedQuotaFiles, user.UsedQuotaSize, user.UsedUploadDataTransfer, user.UsedDownloadDataTransfer, err
  322. }
  323. func (p *MemoryProvider) addUser(user *User) error {
  324. err := ValidateUser(user)
  325. if err != nil {
  326. return err
  327. }
  328. p.dbHandle.Lock()
  329. defer p.dbHandle.Unlock()
  330. if p.dbHandle.isClosed {
  331. return errMemoryProviderClosed
  332. }
  333. _, err = p.userExistsInternal(user.Username)
  334. if err == nil {
  335. return util.NewI18nError(
  336. fmt.Errorf("%w: username %v already exists", ErrDuplicatedKey, user.Username),
  337. util.I18nErrorDuplicatedUsername,
  338. )
  339. }
  340. user.ID = p.getNextID()
  341. user.LastQuotaUpdate = 0
  342. user.UsedQuotaSize = 0
  343. user.UsedQuotaFiles = 0
  344. user.UsedUploadDataTransfer = 0
  345. user.UsedDownloadDataTransfer = 0
  346. user.LastLogin = 0
  347. user.FirstUpload = 0
  348. user.FirstDownload = 0
  349. user.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  350. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  351. if err := p.addUserToRole(user.Username, user.Role); err != nil {
  352. return err
  353. }
  354. sort.Slice(user.Groups, func(i, j int) bool {
  355. return user.Groups[i].Name < user.Groups[j].Name
  356. })
  357. var mappedGroups []string
  358. for idx := range user.Groups {
  359. if err = p.addUserToGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  360. // try to remove group mapping
  361. for _, g := range mappedGroups {
  362. p.removeUserFromGroupMapping(user.Username, g)
  363. }
  364. return err
  365. }
  366. mappedGroups = append(mappedGroups, user.Groups[idx].Name)
  367. }
  368. sort.Slice(user.VirtualFolders, func(i, j int) bool {
  369. return user.VirtualFolders[i].Name < user.VirtualFolders[j].Name
  370. })
  371. var mappedFolders []string
  372. for idx := range user.VirtualFolders {
  373. if err = p.addUserToFolderMapping(user.Username, user.VirtualFolders[idx].Name); err != nil {
  374. // try to remove folder mapping
  375. for _, f := range mappedFolders {
  376. p.removeRelationFromFolderMapping(f, user.Username, "")
  377. }
  378. return err
  379. }
  380. mappedFolders = append(mappedFolders, user.VirtualFolders[idx].Name)
  381. }
  382. p.dbHandle.users[user.Username] = user.getACopy()
  383. p.dbHandle.usernames = append(p.dbHandle.usernames, user.Username)
  384. sort.Strings(p.dbHandle.usernames)
  385. return nil
  386. }
  387. func (p *MemoryProvider) updateUser(user *User) error { //nolint:gocyclo
  388. err := ValidateUser(user)
  389. if err != nil {
  390. return err
  391. }
  392. p.dbHandle.Lock()
  393. defer p.dbHandle.Unlock()
  394. if p.dbHandle.isClosed {
  395. return errMemoryProviderClosed
  396. }
  397. u, err := p.userExistsInternal(user.Username)
  398. if err != nil {
  399. return err
  400. }
  401. p.removeUserFromRole(u.Username, u.Role)
  402. if err := p.addUserToRole(user.Username, user.Role); err != nil {
  403. // try ro add old role
  404. if errRollback := p.addUserToRole(u.Username, u.Role); errRollback != nil {
  405. providerLog(logger.LevelError, "unable to rollback old role %q for user %q, error: %v",
  406. u.Role, u.Username, errRollback)
  407. }
  408. return err
  409. }
  410. for idx := range u.Groups {
  411. p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name)
  412. }
  413. sort.Slice(user.Groups, func(i, j int) bool {
  414. return user.Groups[i].Name < user.Groups[j].Name
  415. })
  416. for idx := range user.Groups {
  417. if err = p.addUserToGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  418. // try to add old mapping
  419. for _, g := range u.Groups {
  420. if errRollback := p.addUserToGroupMapping(user.Username, g.Name); errRollback != nil {
  421. providerLog(logger.LevelError, "unable to rollback old group mapping %q for user %q, error: %v",
  422. g.Name, user.Username, errRollback)
  423. }
  424. }
  425. return err
  426. }
  427. }
  428. for _, oldFolder := range u.VirtualFolders {
  429. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  430. }
  431. sort.Slice(user.VirtualFolders, func(i, j int) bool {
  432. return user.VirtualFolders[i].Name < user.VirtualFolders[j].Name
  433. })
  434. for idx := range user.VirtualFolders {
  435. if err = p.addUserToFolderMapping(user.Username, user.VirtualFolders[idx].Name); err != nil {
  436. // try to add old mapping
  437. for _, f := range u.VirtualFolders {
  438. if errRollback := p.addUserToFolderMapping(user.Username, f.Name); errRollback != nil {
  439. providerLog(logger.LevelError, "unable to rollback old folder mapping %q for user %q, error: %v",
  440. f.Name, user.Username, errRollback)
  441. }
  442. }
  443. return err
  444. }
  445. }
  446. user.LastQuotaUpdate = u.LastQuotaUpdate
  447. user.UsedQuotaSize = u.UsedQuotaSize
  448. user.UsedQuotaFiles = u.UsedQuotaFiles
  449. user.UsedUploadDataTransfer = u.UsedUploadDataTransfer
  450. user.UsedDownloadDataTransfer = u.UsedDownloadDataTransfer
  451. user.LastLogin = u.LastLogin
  452. user.FirstDownload = u.FirstDownload
  453. user.FirstUpload = u.FirstUpload
  454. user.CreatedAt = u.CreatedAt
  455. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  456. user.ID = u.ID
  457. // pre-login and external auth hook will use the passed *user so save a copy
  458. p.dbHandle.users[user.Username] = user.getACopy()
  459. setLastUserUpdate()
  460. return nil
  461. }
  462. func (p *MemoryProvider) deleteUser(user User, _ bool) error {
  463. p.dbHandle.Lock()
  464. defer p.dbHandle.Unlock()
  465. if p.dbHandle.isClosed {
  466. return errMemoryProviderClosed
  467. }
  468. u, err := p.userExistsInternal(user.Username)
  469. if err != nil {
  470. return err
  471. }
  472. p.removeUserFromRole(u.Username, u.Role)
  473. for _, oldFolder := range u.VirtualFolders {
  474. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  475. }
  476. for idx := range u.Groups {
  477. p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name)
  478. }
  479. delete(p.dbHandle.users, user.Username)
  480. // this could be more efficient
  481. p.dbHandle.usernames = make([]string, 0, len(p.dbHandle.users))
  482. for username := range p.dbHandle.users {
  483. p.dbHandle.usernames = append(p.dbHandle.usernames, username)
  484. }
  485. sort.Strings(p.dbHandle.usernames)
  486. p.deleteAPIKeysWithUser(user.Username)
  487. p.deleteSharesWithUser(user.Username)
  488. return nil
  489. }
  490. func (p *MemoryProvider) updateUserPassword(username, password string) error {
  491. p.dbHandle.Lock()
  492. defer p.dbHandle.Unlock()
  493. if p.dbHandle.isClosed {
  494. return errMemoryProviderClosed
  495. }
  496. user, err := p.userExistsInternal(username)
  497. if err != nil {
  498. return err
  499. }
  500. user.Password = password
  501. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  502. p.dbHandle.users[username] = user
  503. return nil
  504. }
  505. func (p *MemoryProvider) dumpUsers() ([]User, error) {
  506. p.dbHandle.Lock()
  507. defer p.dbHandle.Unlock()
  508. users := make([]User, 0, len(p.dbHandle.usernames))
  509. var err error
  510. if p.dbHandle.isClosed {
  511. return users, errMemoryProviderClosed
  512. }
  513. for _, username := range p.dbHandle.usernames {
  514. u := p.dbHandle.users[username]
  515. user := u.getACopy()
  516. p.addVirtualFoldersToUser(&user)
  517. users = append(users, user)
  518. }
  519. return users, err
  520. }
  521. func (p *MemoryProvider) dumpFolders() ([]vfs.BaseVirtualFolder, error) {
  522. p.dbHandle.Lock()
  523. defer p.dbHandle.Unlock()
  524. folders := make([]vfs.BaseVirtualFolder, 0, len(p.dbHandle.vfoldersNames))
  525. if p.dbHandle.isClosed {
  526. return folders, errMemoryProviderClosed
  527. }
  528. for _, f := range p.dbHandle.vfolders {
  529. folders = append(folders, f)
  530. }
  531. return folders, nil
  532. }
  533. func (p *MemoryProvider) getRecentlyUpdatedUsers(after int64) ([]User, error) {
  534. if getLastUserUpdate() < after {
  535. return nil, nil
  536. }
  537. p.dbHandle.Lock()
  538. defer p.dbHandle.Unlock()
  539. if p.dbHandle.isClosed {
  540. return nil, errMemoryProviderClosed
  541. }
  542. users := make([]User, 0, 10)
  543. for _, username := range p.dbHandle.usernames {
  544. u := p.dbHandle.users[username]
  545. if u.UpdatedAt < after {
  546. continue
  547. }
  548. user := u.getACopy()
  549. p.addVirtualFoldersToUser(&user)
  550. if len(user.Groups) > 0 {
  551. groupMapping := make(map[string]Group)
  552. for idx := range user.Groups {
  553. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  554. if err != nil {
  555. continue
  556. }
  557. groupMapping[group.Name] = group
  558. }
  559. user.applyGroupSettings(groupMapping)
  560. }
  561. user.SetEmptySecretsIfNil()
  562. users = append(users, user)
  563. }
  564. return users, nil
  565. }
  566. func (p *MemoryProvider) getUsersForQuotaCheck(toFetch map[string]bool) ([]User, error) {
  567. users := make([]User, 0, 30)
  568. p.dbHandle.Lock()
  569. defer p.dbHandle.Unlock()
  570. if p.dbHandle.isClosed {
  571. return users, errMemoryProviderClosed
  572. }
  573. for _, username := range p.dbHandle.usernames {
  574. if needFolders, ok := toFetch[username]; ok {
  575. u := p.dbHandle.users[username]
  576. user := u.getACopy()
  577. if needFolders {
  578. p.addVirtualFoldersToUser(&user)
  579. }
  580. if len(user.Groups) > 0 {
  581. groupMapping := make(map[string]Group)
  582. for idx := range user.Groups {
  583. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  584. if err != nil {
  585. continue
  586. }
  587. groupMapping[group.Name] = group
  588. }
  589. user.applyGroupSettings(groupMapping)
  590. }
  591. user.SetEmptySecretsIfNil()
  592. user.PrepareForRendering()
  593. users = append(users, user)
  594. }
  595. }
  596. return users, nil
  597. }
  598. func (p *MemoryProvider) getUsers(limit int, offset int, order, role string) ([]User, error) {
  599. users := make([]User, 0, limit)
  600. var err error
  601. p.dbHandle.Lock()
  602. defer p.dbHandle.Unlock()
  603. if p.dbHandle.isClosed {
  604. return users, errMemoryProviderClosed
  605. }
  606. if limit <= 0 {
  607. return users, err
  608. }
  609. itNum := 0
  610. if order == OrderASC {
  611. for _, username := range p.dbHandle.usernames {
  612. itNum++
  613. if itNum <= offset {
  614. continue
  615. }
  616. u := p.dbHandle.users[username]
  617. user := u.getACopy()
  618. if !user.hasRole(role) {
  619. continue
  620. }
  621. p.addVirtualFoldersToUser(&user)
  622. user.PrepareForRendering()
  623. users = append(users, user)
  624. if len(users) >= limit {
  625. break
  626. }
  627. }
  628. } else {
  629. for i := len(p.dbHandle.usernames) - 1; i >= 0; i-- {
  630. itNum++
  631. if itNum <= offset {
  632. continue
  633. }
  634. username := p.dbHandle.usernames[i]
  635. u := p.dbHandle.users[username]
  636. user := u.getACopy()
  637. if !user.hasRole(role) {
  638. continue
  639. }
  640. p.addVirtualFoldersToUser(&user)
  641. user.PrepareForRendering()
  642. users = append(users, user)
  643. if len(users) >= limit {
  644. break
  645. }
  646. }
  647. }
  648. return users, err
  649. }
  650. func (p *MemoryProvider) userExists(username, role string) (User, error) {
  651. p.dbHandle.Lock()
  652. defer p.dbHandle.Unlock()
  653. if p.dbHandle.isClosed {
  654. return User{}, errMemoryProviderClosed
  655. }
  656. user, err := p.userExistsInternal(username)
  657. if err != nil {
  658. return user, err
  659. }
  660. if !user.hasRole(role) {
  661. return User{}, util.NewRecordNotFoundError(fmt.Sprintf("username %q does not exist", username))
  662. }
  663. p.addVirtualFoldersToUser(&user)
  664. return user, nil
  665. }
  666. func (p *MemoryProvider) userExistsInternal(username string) (User, error) {
  667. if val, ok := p.dbHandle.users[username]; ok {
  668. return val.getACopy(), nil
  669. }
  670. return User{}, util.NewRecordNotFoundError(fmt.Sprintf("username %q does not exist", username))
  671. }
  672. func (p *MemoryProvider) groupExistsInternal(name string) (Group, error) {
  673. if val, ok := p.dbHandle.groups[name]; ok {
  674. return val.getACopy(), nil
  675. }
  676. return Group{}, util.NewRecordNotFoundError(fmt.Sprintf("group %q does not exist", name))
  677. }
  678. func (p *MemoryProvider) actionExistsInternal(name string) (BaseEventAction, error) {
  679. if val, ok := p.dbHandle.actions[name]; ok {
  680. return val.getACopy(), nil
  681. }
  682. return BaseEventAction{}, util.NewRecordNotFoundError(fmt.Sprintf("event action %q does not exist", name))
  683. }
  684. func (p *MemoryProvider) ruleExistsInternal(name string) (EventRule, error) {
  685. if val, ok := p.dbHandle.rules[name]; ok {
  686. return val.getACopy(), nil
  687. }
  688. return EventRule{}, util.NewRecordNotFoundError(fmt.Sprintf("event rule %q does not exist", name))
  689. }
  690. func (p *MemoryProvider) roleExistsInternal(name string) (Role, error) {
  691. if val, ok := p.dbHandle.roles[name]; ok {
  692. return val.getACopy(), nil
  693. }
  694. return Role{}, util.NewRecordNotFoundError(fmt.Sprintf("role %q does not exist", name))
  695. }
  696. func (p *MemoryProvider) ipListEntryExistsInternal(entry *IPListEntry) (IPListEntry, error) {
  697. if val, ok := p.dbHandle.ipListEntries[entry.getKey()]; ok {
  698. return val.getACopy(), nil
  699. }
  700. return IPListEntry{}, util.NewRecordNotFoundError(fmt.Sprintf("IP list entry %q does not exist", entry.getName()))
  701. }
  702. func (p *MemoryProvider) addAdmin(admin *Admin) error {
  703. p.dbHandle.Lock()
  704. defer p.dbHandle.Unlock()
  705. if p.dbHandle.isClosed {
  706. return errMemoryProviderClosed
  707. }
  708. err := admin.validate()
  709. if err != nil {
  710. return err
  711. }
  712. _, err = p.adminExistsInternal(admin.Username)
  713. if err == nil {
  714. return util.NewI18nError(
  715. fmt.Errorf("%w: admin %q already exists", ErrDuplicatedKey, admin.Username),
  716. util.I18nErrorDuplicatedUsername,
  717. )
  718. }
  719. admin.ID = p.getNextAdminID()
  720. admin.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  721. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  722. admin.LastLogin = 0
  723. if err := p.addAdminToRole(admin.Username, admin.Role); err != nil {
  724. return err
  725. }
  726. var mappedAdmins []string
  727. sort.Slice(admin.Groups, func(i, j int) bool {
  728. return admin.Groups[i].Name < admin.Groups[j].Name
  729. })
  730. for idx := range admin.Groups {
  731. if err = p.addAdminToGroupMapping(admin.Username, admin.Groups[idx].Name); err != nil {
  732. // try to remove group mapping
  733. for _, g := range mappedAdmins {
  734. p.removeAdminFromGroupMapping(admin.Username, g)
  735. }
  736. return err
  737. }
  738. mappedAdmins = append(mappedAdmins, admin.Groups[idx].Name)
  739. }
  740. p.dbHandle.admins[admin.Username] = admin.getACopy()
  741. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, admin.Username)
  742. sort.Strings(p.dbHandle.adminsUsernames)
  743. return nil
  744. }
  745. func (p *MemoryProvider) updateAdmin(admin *Admin) error {
  746. p.dbHandle.Lock()
  747. defer p.dbHandle.Unlock()
  748. if p.dbHandle.isClosed {
  749. return errMemoryProviderClosed
  750. }
  751. err := admin.validate()
  752. if err != nil {
  753. return err
  754. }
  755. a, err := p.adminExistsInternal(admin.Username)
  756. if err != nil {
  757. return err
  758. }
  759. p.removeAdminFromRole(a.Username, a.Role)
  760. if err := p.addAdminToRole(admin.Username, admin.Role); err != nil {
  761. // try ro add old role
  762. if errRollback := p.addAdminToRole(a.Username, a.Role); errRollback != nil {
  763. providerLog(logger.LevelError, "unable to rollback old role %q for admin %q, error: %v",
  764. a.Role, a.Username, errRollback)
  765. }
  766. return err
  767. }
  768. for idx := range a.Groups {
  769. p.removeAdminFromGroupMapping(a.Username, a.Groups[idx].Name)
  770. }
  771. sort.Slice(admin.Groups, func(i, j int) bool {
  772. return admin.Groups[i].Name < admin.Groups[j].Name
  773. })
  774. for idx := range admin.Groups {
  775. if err = p.addAdminToGroupMapping(admin.Username, admin.Groups[idx].Name); err != nil {
  776. // try to add old mapping
  777. for _, oldGroup := range a.Groups {
  778. if errRollback := p.addAdminToGroupMapping(a.Username, oldGroup.Name); errRollback != nil {
  779. providerLog(logger.LevelError, "unable to rollback old group mapping %q for admin %q, error: %v",
  780. oldGroup.Name, a.Username, errRollback)
  781. }
  782. }
  783. return err
  784. }
  785. }
  786. admin.ID = a.ID
  787. admin.CreatedAt = a.CreatedAt
  788. admin.LastLogin = a.LastLogin
  789. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  790. p.dbHandle.admins[admin.Username] = admin.getACopy()
  791. return nil
  792. }
  793. func (p *MemoryProvider) deleteAdmin(admin Admin) error {
  794. p.dbHandle.Lock()
  795. defer p.dbHandle.Unlock()
  796. if p.dbHandle.isClosed {
  797. return errMemoryProviderClosed
  798. }
  799. a, err := p.adminExistsInternal(admin.Username)
  800. if err != nil {
  801. return err
  802. }
  803. p.removeAdminFromRole(a.Username, a.Role)
  804. for idx := range a.Groups {
  805. p.removeAdminFromGroupMapping(a.Username, a.Groups[idx].Name)
  806. }
  807. delete(p.dbHandle.admins, admin.Username)
  808. // this could be more efficient
  809. p.dbHandle.adminsUsernames = make([]string, 0, len(p.dbHandle.admins))
  810. for username := range p.dbHandle.admins {
  811. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, username)
  812. }
  813. sort.Strings(p.dbHandle.adminsUsernames)
  814. p.deleteAPIKeysWithAdmin(admin.Username)
  815. return nil
  816. }
  817. func (p *MemoryProvider) adminExists(username string) (Admin, error) {
  818. p.dbHandle.Lock()
  819. defer p.dbHandle.Unlock()
  820. if p.dbHandle.isClosed {
  821. return Admin{}, errMemoryProviderClosed
  822. }
  823. return p.adminExistsInternal(username)
  824. }
  825. func (p *MemoryProvider) adminExistsInternal(username string) (Admin, error) {
  826. if val, ok := p.dbHandle.admins[username]; ok {
  827. return val.getACopy(), nil
  828. }
  829. return Admin{}, util.NewRecordNotFoundError(fmt.Sprintf("admin %q does not exist", username))
  830. }
  831. func (p *MemoryProvider) dumpAdmins() ([]Admin, error) {
  832. p.dbHandle.Lock()
  833. defer p.dbHandle.Unlock()
  834. admins := make([]Admin, 0, len(p.dbHandle.admins))
  835. if p.dbHandle.isClosed {
  836. return admins, errMemoryProviderClosed
  837. }
  838. for _, admin := range p.dbHandle.admins {
  839. admins = append(admins, admin)
  840. }
  841. return admins, nil
  842. }
  843. func (p *MemoryProvider) getAdmins(limit int, offset int, order string) ([]Admin, error) {
  844. admins := make([]Admin, 0, limit)
  845. p.dbHandle.Lock()
  846. defer p.dbHandle.Unlock()
  847. if p.dbHandle.isClosed {
  848. return admins, errMemoryProviderClosed
  849. }
  850. if limit <= 0 {
  851. return admins, nil
  852. }
  853. itNum := 0
  854. if order == OrderASC {
  855. for _, username := range p.dbHandle.adminsUsernames {
  856. itNum++
  857. if itNum <= offset {
  858. continue
  859. }
  860. a := p.dbHandle.admins[username]
  861. admin := a.getACopy()
  862. admin.HideConfidentialData()
  863. admins = append(admins, admin)
  864. if len(admins) >= limit {
  865. break
  866. }
  867. }
  868. } else {
  869. for i := len(p.dbHandle.adminsUsernames) - 1; i >= 0; i-- {
  870. itNum++
  871. if itNum <= offset {
  872. continue
  873. }
  874. username := p.dbHandle.adminsUsernames[i]
  875. a := p.dbHandle.admins[username]
  876. admin := a.getACopy()
  877. admin.HideConfidentialData()
  878. admins = append(admins, admin)
  879. if len(admins) >= limit {
  880. break
  881. }
  882. }
  883. }
  884. return admins, nil
  885. }
  886. func (p *MemoryProvider) updateFolderQuota(name string, filesAdd int, sizeAdd int64, reset bool) error {
  887. p.dbHandle.Lock()
  888. defer p.dbHandle.Unlock()
  889. if p.dbHandle.isClosed {
  890. return errMemoryProviderClosed
  891. }
  892. folder, err := p.folderExistsInternal(name)
  893. if err != nil {
  894. providerLog(logger.LevelError, "unable to update quota for folder %q error: %v", name, err)
  895. return err
  896. }
  897. if reset {
  898. folder.UsedQuotaSize = sizeAdd
  899. folder.UsedQuotaFiles = filesAdd
  900. } else {
  901. folder.UsedQuotaSize += sizeAdd
  902. folder.UsedQuotaFiles += filesAdd
  903. }
  904. folder.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  905. p.dbHandle.vfolders[name] = folder
  906. return nil
  907. }
  908. func (p *MemoryProvider) getGroups(limit, offset int, order string, _ bool) ([]Group, error) {
  909. p.dbHandle.Lock()
  910. defer p.dbHandle.Unlock()
  911. if p.dbHandle.isClosed {
  912. return nil, errMemoryProviderClosed
  913. }
  914. if limit <= 0 {
  915. return nil, nil
  916. }
  917. groups := make([]Group, 0, limit)
  918. itNum := 0
  919. if order == OrderASC {
  920. for _, name := range p.dbHandle.groupnames {
  921. itNum++
  922. if itNum <= offset {
  923. continue
  924. }
  925. g := p.dbHandle.groups[name]
  926. group := g.getACopy()
  927. p.addVirtualFoldersToGroup(&group)
  928. group.PrepareForRendering()
  929. groups = append(groups, group)
  930. if len(groups) >= limit {
  931. break
  932. }
  933. }
  934. } else {
  935. for i := len(p.dbHandle.groupnames) - 1; i >= 0; i-- {
  936. itNum++
  937. if itNum <= offset {
  938. continue
  939. }
  940. name := p.dbHandle.groupnames[i]
  941. g := p.dbHandle.groups[name]
  942. group := g.getACopy()
  943. p.addVirtualFoldersToGroup(&group)
  944. group.PrepareForRendering()
  945. groups = append(groups, group)
  946. if len(groups) >= limit {
  947. break
  948. }
  949. }
  950. }
  951. return groups, nil
  952. }
  953. func (p *MemoryProvider) getGroupsWithNames(names []string) ([]Group, error) {
  954. p.dbHandle.Lock()
  955. defer p.dbHandle.Unlock()
  956. if p.dbHandle.isClosed {
  957. return nil, errMemoryProviderClosed
  958. }
  959. groups := make([]Group, 0, len(names))
  960. for _, name := range names {
  961. if val, ok := p.dbHandle.groups[name]; ok {
  962. group := val.getACopy()
  963. p.addVirtualFoldersToGroup(&group)
  964. groups = append(groups, group)
  965. }
  966. }
  967. return groups, nil
  968. }
  969. func (p *MemoryProvider) getUsersInGroups(names []string) ([]string, error) {
  970. p.dbHandle.Lock()
  971. defer p.dbHandle.Unlock()
  972. if p.dbHandle.isClosed {
  973. return nil, errMemoryProviderClosed
  974. }
  975. var users []string
  976. for _, name := range names {
  977. if val, ok := p.dbHandle.groups[name]; ok {
  978. group := val.getACopy()
  979. users = append(users, group.Users...)
  980. }
  981. }
  982. return users, nil
  983. }
  984. func (p *MemoryProvider) groupExists(name string) (Group, error) {
  985. p.dbHandle.Lock()
  986. defer p.dbHandle.Unlock()
  987. if p.dbHandle.isClosed {
  988. return Group{}, errMemoryProviderClosed
  989. }
  990. group, err := p.groupExistsInternal(name)
  991. if err != nil {
  992. return group, err
  993. }
  994. p.addVirtualFoldersToGroup(&group)
  995. return group, nil
  996. }
  997. func (p *MemoryProvider) addGroup(group *Group) error {
  998. if err := group.validate(); err != nil {
  999. return err
  1000. }
  1001. p.dbHandle.Lock()
  1002. defer p.dbHandle.Unlock()
  1003. if p.dbHandle.isClosed {
  1004. return errMemoryProviderClosed
  1005. }
  1006. _, err := p.groupExistsInternal(group.Name)
  1007. if err == nil {
  1008. return util.NewI18nError(
  1009. fmt.Errorf("%w: group %q already exists", ErrDuplicatedKey, group.Name),
  1010. util.I18nErrorDuplicatedUsername,
  1011. )
  1012. }
  1013. group.ID = p.getNextGroupID()
  1014. group.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1015. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1016. group.Users = nil
  1017. group.Admins = nil
  1018. sort.Slice(group.VirtualFolders, func(i, j int) bool {
  1019. return group.VirtualFolders[i].Name < group.VirtualFolders[j].Name
  1020. })
  1021. var mappedFolders []string
  1022. for idx := range group.VirtualFolders {
  1023. if err = p.addGroupToFolderMapping(group.Name, group.VirtualFolders[idx].Name); err != nil {
  1024. // try to remove folder mapping
  1025. for _, f := range mappedFolders {
  1026. p.removeRelationFromFolderMapping(f, "", group.Name)
  1027. }
  1028. return err
  1029. }
  1030. mappedFolders = append(mappedFolders, group.VirtualFolders[idx].Name)
  1031. }
  1032. p.dbHandle.groups[group.Name] = group.getACopy()
  1033. p.dbHandle.groupnames = append(p.dbHandle.groupnames, group.Name)
  1034. sort.Strings(p.dbHandle.groupnames)
  1035. return nil
  1036. }
  1037. func (p *MemoryProvider) updateGroup(group *Group) error {
  1038. if err := group.validate(); err != nil {
  1039. return err
  1040. }
  1041. p.dbHandle.Lock()
  1042. defer p.dbHandle.Unlock()
  1043. if p.dbHandle.isClosed {
  1044. return errMemoryProviderClosed
  1045. }
  1046. g, err := p.groupExistsInternal(group.Name)
  1047. if err != nil {
  1048. return err
  1049. }
  1050. for _, oldFolder := range g.VirtualFolders {
  1051. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  1052. }
  1053. sort.Slice(group.VirtualFolders, func(i, j int) bool {
  1054. return group.VirtualFolders[i].Name < group.VirtualFolders[j].Name
  1055. })
  1056. for idx := range group.VirtualFolders {
  1057. if err = p.addGroupToFolderMapping(group.Name, group.VirtualFolders[idx].Name); err != nil {
  1058. // try to add old mapping
  1059. for _, f := range g.VirtualFolders {
  1060. if errRollback := p.addGroupToFolderMapping(group.Name, f.Name); errRollback != nil {
  1061. providerLog(logger.LevelError, "unable to rollback old folder mapping %q for group %q, error: %v",
  1062. f.Name, group.Name, errRollback)
  1063. }
  1064. }
  1065. return err
  1066. }
  1067. }
  1068. group.CreatedAt = g.CreatedAt
  1069. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1070. group.ID = g.ID
  1071. group.Users = g.Users
  1072. group.Admins = g.Admins
  1073. p.dbHandle.groups[group.Name] = group.getACopy()
  1074. return nil
  1075. }
  1076. func (p *MemoryProvider) deleteGroup(group Group) error {
  1077. p.dbHandle.Lock()
  1078. defer p.dbHandle.Unlock()
  1079. if p.dbHandle.isClosed {
  1080. return errMemoryProviderClosed
  1081. }
  1082. g, err := p.groupExistsInternal(group.Name)
  1083. if err != nil {
  1084. return err
  1085. }
  1086. if len(g.Users) > 0 {
  1087. return util.NewValidationError(fmt.Sprintf("the group %q is referenced, it cannot be removed", group.Name))
  1088. }
  1089. for _, oldFolder := range g.VirtualFolders {
  1090. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  1091. }
  1092. for _, a := range g.Admins {
  1093. p.removeGroupFromAdminMapping(g.Name, a)
  1094. }
  1095. delete(p.dbHandle.groups, group.Name)
  1096. // this could be more efficient
  1097. p.dbHandle.groupnames = make([]string, 0, len(p.dbHandle.groups))
  1098. for name := range p.dbHandle.groups {
  1099. p.dbHandle.groupnames = append(p.dbHandle.groupnames, name)
  1100. }
  1101. sort.Strings(p.dbHandle.groupnames)
  1102. return nil
  1103. }
  1104. func (p *MemoryProvider) dumpGroups() ([]Group, error) {
  1105. p.dbHandle.Lock()
  1106. defer p.dbHandle.Unlock()
  1107. groups := make([]Group, 0, len(p.dbHandle.groups))
  1108. var err error
  1109. if p.dbHandle.isClosed {
  1110. return groups, errMemoryProviderClosed
  1111. }
  1112. for _, name := range p.dbHandle.groupnames {
  1113. g := p.dbHandle.groups[name]
  1114. group := g.getACopy()
  1115. p.addVirtualFoldersToGroup(&group)
  1116. groups = append(groups, group)
  1117. }
  1118. return groups, err
  1119. }
  1120. func (p *MemoryProvider) getUsedFolderQuota(name string) (int, int64, error) {
  1121. p.dbHandle.Lock()
  1122. defer p.dbHandle.Unlock()
  1123. if p.dbHandle.isClosed {
  1124. return 0, 0, errMemoryProviderClosed
  1125. }
  1126. folder, err := p.folderExistsInternal(name)
  1127. if err != nil {
  1128. providerLog(logger.LevelError, "unable to get quota for folder %q error: %v", name, err)
  1129. return 0, 0, err
  1130. }
  1131. return folder.UsedQuotaFiles, folder.UsedQuotaSize, err
  1132. }
  1133. func (p *MemoryProvider) addVirtualFoldersToGroup(group *Group) {
  1134. if len(group.VirtualFolders) > 0 {
  1135. var folders []vfs.VirtualFolder
  1136. for idx := range group.VirtualFolders {
  1137. folder := &group.VirtualFolders[idx]
  1138. baseFolder, err := p.folderExistsInternal(folder.Name)
  1139. if err != nil {
  1140. continue
  1141. }
  1142. folder.BaseVirtualFolder = baseFolder.GetACopy()
  1143. folders = append(folders, *folder)
  1144. }
  1145. group.VirtualFolders = folders
  1146. }
  1147. }
  1148. func (p *MemoryProvider) addActionsToRule(rule *EventRule) {
  1149. var actions []EventAction
  1150. for idx := range rule.Actions {
  1151. action := &rule.Actions[idx]
  1152. baseAction, err := p.actionExistsInternal(action.Name)
  1153. if err != nil {
  1154. continue
  1155. }
  1156. baseAction.Options.SetEmptySecretsIfNil()
  1157. action.BaseEventAction = baseAction
  1158. actions = append(actions, *action)
  1159. }
  1160. rule.Actions = actions
  1161. }
  1162. func (p *MemoryProvider) addRuleToActionMapping(ruleName, actionName string) error {
  1163. a, err := p.actionExistsInternal(actionName)
  1164. if err != nil {
  1165. return util.NewGenericError(fmt.Sprintf("action %q does not exist", actionName))
  1166. }
  1167. if !slices.Contains(a.Rules, ruleName) {
  1168. a.Rules = append(a.Rules, ruleName)
  1169. p.dbHandle.actions[actionName] = a
  1170. }
  1171. return nil
  1172. }
  1173. func (p *MemoryProvider) removeRuleFromActionMapping(ruleName, actionName string) {
  1174. a, err := p.actionExistsInternal(actionName)
  1175. if err != nil {
  1176. providerLog(logger.LevelWarn, "action %q does not exist, cannot remove from mapping", actionName)
  1177. return
  1178. }
  1179. if slices.Contains(a.Rules, ruleName) {
  1180. var rules []string
  1181. for _, r := range a.Rules {
  1182. if r != ruleName {
  1183. rules = append(rules, r)
  1184. }
  1185. }
  1186. a.Rules = rules
  1187. p.dbHandle.actions[actionName] = a
  1188. }
  1189. }
  1190. func (p *MemoryProvider) addAdminToGroupMapping(username, groupname string) error {
  1191. g, err := p.groupExistsInternal(groupname)
  1192. if err != nil {
  1193. return err
  1194. }
  1195. if !slices.Contains(g.Admins, username) {
  1196. g.Admins = append(g.Admins, username)
  1197. p.dbHandle.groups[groupname] = g
  1198. }
  1199. return nil
  1200. }
  1201. func (p *MemoryProvider) removeAdminFromGroupMapping(username, groupname string) {
  1202. g, err := p.groupExistsInternal(groupname)
  1203. if err != nil {
  1204. return
  1205. }
  1206. var admins []string
  1207. for _, a := range g.Admins {
  1208. if a != username {
  1209. admins = append(admins, a)
  1210. }
  1211. }
  1212. g.Admins = admins
  1213. p.dbHandle.groups[groupname] = g
  1214. }
  1215. func (p *MemoryProvider) removeGroupFromAdminMapping(groupname, username string) {
  1216. admin, err := p.adminExistsInternal(username)
  1217. if err != nil {
  1218. // the admin does not exist so there is no associated group
  1219. return
  1220. }
  1221. var newGroups []AdminGroupMapping
  1222. for _, g := range admin.Groups {
  1223. if g.Name != groupname {
  1224. newGroups = append(newGroups, g)
  1225. }
  1226. }
  1227. admin.Groups = newGroups
  1228. p.dbHandle.admins[admin.Username] = admin
  1229. }
  1230. func (p *MemoryProvider) addUserToGroupMapping(username, groupname string) error {
  1231. g, err := p.groupExistsInternal(groupname)
  1232. if err != nil {
  1233. return err
  1234. }
  1235. if !slices.Contains(g.Users, username) {
  1236. g.Users = append(g.Users, username)
  1237. p.dbHandle.groups[groupname] = g
  1238. }
  1239. return nil
  1240. }
  1241. func (p *MemoryProvider) removeUserFromGroupMapping(username, groupname string) {
  1242. g, err := p.groupExistsInternal(groupname)
  1243. if err != nil {
  1244. return
  1245. }
  1246. var users []string
  1247. for _, u := range g.Users {
  1248. if u != username {
  1249. users = append(users, u)
  1250. }
  1251. }
  1252. g.Users = users
  1253. p.dbHandle.groups[groupname] = g
  1254. }
  1255. func (p *MemoryProvider) addAdminToRole(username, role string) error {
  1256. if role == "" {
  1257. return nil
  1258. }
  1259. r, err := p.roleExistsInternal(role)
  1260. if err != nil {
  1261. return fmt.Errorf("%w: role %q does not exist", ErrForeignKeyViolated, role)
  1262. }
  1263. if !slices.Contains(r.Admins, username) {
  1264. r.Admins = append(r.Admins, username)
  1265. p.dbHandle.roles[role] = r
  1266. }
  1267. return nil
  1268. }
  1269. func (p *MemoryProvider) removeAdminFromRole(username, role string) {
  1270. if role == "" {
  1271. return
  1272. }
  1273. r, err := p.roleExistsInternal(role)
  1274. if err != nil {
  1275. providerLog(logger.LevelWarn, "role %q does not exist, cannot remove admin %q", role, username)
  1276. return
  1277. }
  1278. var admins []string
  1279. for _, a := range r.Admins {
  1280. if a != username {
  1281. admins = append(admins, a)
  1282. }
  1283. }
  1284. r.Admins = admins
  1285. p.dbHandle.roles[role] = r
  1286. }
  1287. func (p *MemoryProvider) addUserToRole(username, role string) error {
  1288. if role == "" {
  1289. return nil
  1290. }
  1291. r, err := p.roleExistsInternal(role)
  1292. if err != nil {
  1293. return fmt.Errorf("%w: role %q does not exist", ErrForeignKeyViolated, role)
  1294. }
  1295. if !slices.Contains(r.Users, username) {
  1296. r.Users = append(r.Users, username)
  1297. p.dbHandle.roles[role] = r
  1298. }
  1299. return nil
  1300. }
  1301. func (p *MemoryProvider) removeUserFromRole(username, role string) {
  1302. if role == "" {
  1303. return
  1304. }
  1305. r, err := p.roleExistsInternal(role)
  1306. if err != nil {
  1307. providerLog(logger.LevelWarn, "role %q does not exist, cannot remove user %q", role, username)
  1308. return
  1309. }
  1310. var users []string
  1311. for _, u := range r.Users {
  1312. if u != username {
  1313. users = append(users, u)
  1314. }
  1315. }
  1316. r.Users = users
  1317. p.dbHandle.roles[role] = r
  1318. }
  1319. func (p *MemoryProvider) addUserToFolderMapping(username, foldername string) error {
  1320. f, err := p.folderExistsInternal(foldername)
  1321. if err != nil {
  1322. return util.NewGenericError(fmt.Sprintf("unable to get folder %q: %v", foldername, err))
  1323. }
  1324. if !slices.Contains(f.Users, username) {
  1325. f.Users = append(f.Users, username)
  1326. p.dbHandle.vfolders[foldername] = f
  1327. }
  1328. return nil
  1329. }
  1330. func (p *MemoryProvider) addGroupToFolderMapping(name, foldername string) error {
  1331. f, err := p.folderExistsInternal(foldername)
  1332. if err != nil {
  1333. return util.NewGenericError(fmt.Sprintf("unable to get folder %q: %v", foldername, err))
  1334. }
  1335. if !slices.Contains(f.Groups, name) {
  1336. f.Groups = append(f.Groups, name)
  1337. p.dbHandle.vfolders[foldername] = f
  1338. }
  1339. return nil
  1340. }
  1341. func (p *MemoryProvider) addVirtualFoldersToUser(user *User) {
  1342. if len(user.VirtualFolders) > 0 {
  1343. var folders []vfs.VirtualFolder
  1344. for idx := range user.VirtualFolders {
  1345. folder := &user.VirtualFolders[idx]
  1346. baseFolder, err := p.folderExistsInternal(folder.Name)
  1347. if err != nil {
  1348. continue
  1349. }
  1350. folder.BaseVirtualFolder = baseFolder.GetACopy()
  1351. folders = append(folders, *folder)
  1352. }
  1353. user.VirtualFolders = folders
  1354. }
  1355. }
  1356. func (p *MemoryProvider) removeRelationFromFolderMapping(folderName, username, groupname string) {
  1357. folder, err := p.folderExistsInternal(folderName)
  1358. if err != nil {
  1359. return
  1360. }
  1361. if username != "" {
  1362. var usernames []string
  1363. for _, user := range folder.Users {
  1364. if user != username {
  1365. usernames = append(usernames, user)
  1366. }
  1367. }
  1368. folder.Users = usernames
  1369. }
  1370. if groupname != "" {
  1371. var groups []string
  1372. for _, group := range folder.Groups {
  1373. if group != groupname {
  1374. groups = append(groups, group)
  1375. }
  1376. }
  1377. folder.Groups = groups
  1378. }
  1379. p.dbHandle.vfolders[folder.Name] = folder
  1380. }
  1381. func (p *MemoryProvider) folderExistsInternal(name string) (vfs.BaseVirtualFolder, error) {
  1382. if val, ok := p.dbHandle.vfolders[name]; ok {
  1383. return val, nil
  1384. }
  1385. return vfs.BaseVirtualFolder{}, util.NewRecordNotFoundError(fmt.Sprintf("folder %q does not exist", name))
  1386. }
  1387. func (p *MemoryProvider) getFolders(limit, offset int, order string, _ bool) ([]vfs.BaseVirtualFolder, error) {
  1388. folders := make([]vfs.BaseVirtualFolder, 0, limit)
  1389. var err error
  1390. p.dbHandle.Lock()
  1391. defer p.dbHandle.Unlock()
  1392. if p.dbHandle.isClosed {
  1393. return folders, errMemoryProviderClosed
  1394. }
  1395. if limit <= 0 {
  1396. return folders, err
  1397. }
  1398. itNum := 0
  1399. if order == OrderASC {
  1400. for _, name := range p.dbHandle.vfoldersNames {
  1401. itNum++
  1402. if itNum <= offset {
  1403. continue
  1404. }
  1405. f := p.dbHandle.vfolders[name]
  1406. folder := f.GetACopy()
  1407. folder.PrepareForRendering()
  1408. folders = append(folders, folder)
  1409. if len(folders) >= limit {
  1410. break
  1411. }
  1412. }
  1413. } else {
  1414. for i := len(p.dbHandle.vfoldersNames) - 1; i >= 0; i-- {
  1415. itNum++
  1416. if itNum <= offset {
  1417. continue
  1418. }
  1419. name := p.dbHandle.vfoldersNames[i]
  1420. f := p.dbHandle.vfolders[name]
  1421. folder := f.GetACopy()
  1422. folder.PrepareForRendering()
  1423. folders = append(folders, folder)
  1424. if len(folders) >= limit {
  1425. break
  1426. }
  1427. }
  1428. }
  1429. return folders, err
  1430. }
  1431. func (p *MemoryProvider) getFolderByName(name string) (vfs.BaseVirtualFolder, error) {
  1432. p.dbHandle.Lock()
  1433. defer p.dbHandle.Unlock()
  1434. if p.dbHandle.isClosed {
  1435. return vfs.BaseVirtualFolder{}, errMemoryProviderClosed
  1436. }
  1437. folder, err := p.folderExistsInternal(name)
  1438. if err != nil {
  1439. return vfs.BaseVirtualFolder{}, err
  1440. }
  1441. return folder.GetACopy(), nil
  1442. }
  1443. func (p *MemoryProvider) addFolder(folder *vfs.BaseVirtualFolder) error {
  1444. err := ValidateFolder(folder)
  1445. if err != nil {
  1446. return err
  1447. }
  1448. p.dbHandle.Lock()
  1449. defer p.dbHandle.Unlock()
  1450. if p.dbHandle.isClosed {
  1451. return errMemoryProviderClosed
  1452. }
  1453. _, err = p.folderExistsInternal(folder.Name)
  1454. if err == nil {
  1455. return util.NewI18nError(
  1456. fmt.Errorf("%w: folder %q already exists", ErrDuplicatedKey, folder.Name),
  1457. util.I18nErrorDuplicatedUsername,
  1458. )
  1459. }
  1460. folder.ID = p.getNextFolderID()
  1461. folder.Users = nil
  1462. folder.Groups = nil
  1463. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1464. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, folder.Name)
  1465. sort.Strings(p.dbHandle.vfoldersNames)
  1466. return nil
  1467. }
  1468. func (p *MemoryProvider) updateFolder(folder *vfs.BaseVirtualFolder) error {
  1469. err := ValidateFolder(folder)
  1470. if err != nil {
  1471. return err
  1472. }
  1473. p.dbHandle.Lock()
  1474. defer p.dbHandle.Unlock()
  1475. if p.dbHandle.isClosed {
  1476. return errMemoryProviderClosed
  1477. }
  1478. f, err := p.folderExistsInternal(folder.Name)
  1479. if err != nil {
  1480. return err
  1481. }
  1482. folder.ID = f.ID
  1483. folder.LastQuotaUpdate = f.LastQuotaUpdate
  1484. folder.UsedQuotaFiles = f.UsedQuotaFiles
  1485. folder.UsedQuotaSize = f.UsedQuotaSize
  1486. folder.Users = f.Users
  1487. folder.Groups = f.Groups
  1488. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1489. // now update the related users
  1490. for _, username := range folder.Users {
  1491. user, err := p.userExistsInternal(username)
  1492. if err == nil {
  1493. var folders []vfs.VirtualFolder
  1494. for idx := range user.VirtualFolders {
  1495. userFolder := &user.VirtualFolders[idx]
  1496. if folder.Name == userFolder.Name {
  1497. userFolder.BaseVirtualFolder = folder.GetACopy()
  1498. }
  1499. folders = append(folders, *userFolder)
  1500. }
  1501. user.VirtualFolders = folders
  1502. p.dbHandle.users[user.Username] = user
  1503. }
  1504. }
  1505. return nil
  1506. }
  1507. func (p *MemoryProvider) deleteFolder(f vfs.BaseVirtualFolder) error {
  1508. p.dbHandle.Lock()
  1509. defer p.dbHandle.Unlock()
  1510. if p.dbHandle.isClosed {
  1511. return errMemoryProviderClosed
  1512. }
  1513. folder, err := p.folderExistsInternal(f.Name)
  1514. if err != nil {
  1515. return err
  1516. }
  1517. for _, username := range folder.Users {
  1518. user, err := p.userExistsInternal(username)
  1519. if err == nil {
  1520. var folders []vfs.VirtualFolder
  1521. for idx := range user.VirtualFolders {
  1522. userFolder := &user.VirtualFolders[idx]
  1523. if folder.Name != userFolder.Name {
  1524. folders = append(folders, *userFolder)
  1525. }
  1526. }
  1527. user.VirtualFolders = folders
  1528. p.dbHandle.users[user.Username] = user
  1529. }
  1530. }
  1531. for _, groupname := range folder.Groups {
  1532. group, err := p.groupExistsInternal(groupname)
  1533. if err == nil {
  1534. var folders []vfs.VirtualFolder
  1535. for idx := range group.VirtualFolders {
  1536. groupFolder := &group.VirtualFolders[idx]
  1537. if folder.Name != groupFolder.Name {
  1538. folders = append(folders, *groupFolder)
  1539. }
  1540. }
  1541. group.VirtualFolders = folders
  1542. p.dbHandle.groups[group.Name] = group
  1543. }
  1544. }
  1545. delete(p.dbHandle.vfolders, folder.Name)
  1546. p.dbHandle.vfoldersNames = []string{}
  1547. for name := range p.dbHandle.vfolders {
  1548. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, name)
  1549. }
  1550. sort.Strings(p.dbHandle.vfoldersNames)
  1551. return nil
  1552. }
  1553. func (p *MemoryProvider) apiKeyExistsInternal(keyID string) (APIKey, error) {
  1554. if val, ok := p.dbHandle.apiKeys[keyID]; ok {
  1555. return val.getACopy(), nil
  1556. }
  1557. return APIKey{}, util.NewRecordNotFoundError(fmt.Sprintf("API key %q does not exist", keyID))
  1558. }
  1559. func (p *MemoryProvider) apiKeyExists(keyID string) (APIKey, error) {
  1560. p.dbHandle.Lock()
  1561. defer p.dbHandle.Unlock()
  1562. if p.dbHandle.isClosed {
  1563. return APIKey{}, errMemoryProviderClosed
  1564. }
  1565. return p.apiKeyExistsInternal(keyID)
  1566. }
  1567. func (p *MemoryProvider) addAPIKey(apiKey *APIKey) error {
  1568. err := apiKey.validate()
  1569. if err != nil {
  1570. return err
  1571. }
  1572. p.dbHandle.Lock()
  1573. defer p.dbHandle.Unlock()
  1574. if p.dbHandle.isClosed {
  1575. return errMemoryProviderClosed
  1576. }
  1577. _, err = p.apiKeyExistsInternal(apiKey.KeyID)
  1578. if err == nil {
  1579. return fmt.Errorf("API key %q already exists", apiKey.KeyID)
  1580. }
  1581. if apiKey.User != "" {
  1582. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1583. return fmt.Errorf("%w: related user %q does not exists", ErrForeignKeyViolated, apiKey.User)
  1584. }
  1585. }
  1586. if apiKey.Admin != "" {
  1587. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1588. return fmt.Errorf("%w: related admin %q does not exists", ErrForeignKeyViolated, apiKey.Admin)
  1589. }
  1590. }
  1591. apiKey.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1592. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1593. apiKey.LastUseAt = 0
  1594. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1595. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, apiKey.KeyID)
  1596. sort.Strings(p.dbHandle.apiKeysIDs)
  1597. return nil
  1598. }
  1599. func (p *MemoryProvider) updateAPIKey(apiKey *APIKey) error {
  1600. err := apiKey.validate()
  1601. if err != nil {
  1602. return err
  1603. }
  1604. p.dbHandle.Lock()
  1605. defer p.dbHandle.Unlock()
  1606. if p.dbHandle.isClosed {
  1607. return errMemoryProviderClosed
  1608. }
  1609. k, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1610. if err != nil {
  1611. return err
  1612. }
  1613. if apiKey.User != "" {
  1614. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1615. return fmt.Errorf("%w: related user %q does not exists", ErrForeignKeyViolated, apiKey.User)
  1616. }
  1617. }
  1618. if apiKey.Admin != "" {
  1619. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1620. return fmt.Errorf("%w: related admin %q does not exists", ErrForeignKeyViolated, apiKey.Admin)
  1621. }
  1622. }
  1623. apiKey.ID = k.ID
  1624. apiKey.KeyID = k.KeyID
  1625. apiKey.Key = k.Key
  1626. apiKey.CreatedAt = k.CreatedAt
  1627. apiKey.LastUseAt = k.LastUseAt
  1628. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1629. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1630. return nil
  1631. }
  1632. func (p *MemoryProvider) deleteAPIKey(apiKey APIKey) error {
  1633. p.dbHandle.Lock()
  1634. defer p.dbHandle.Unlock()
  1635. if p.dbHandle.isClosed {
  1636. return errMemoryProviderClosed
  1637. }
  1638. _, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1639. if err != nil {
  1640. return err
  1641. }
  1642. delete(p.dbHandle.apiKeys, apiKey.KeyID)
  1643. p.updateAPIKeysOrdering()
  1644. return nil
  1645. }
  1646. func (p *MemoryProvider) getAPIKeys(limit int, offset int, order string) ([]APIKey, error) {
  1647. apiKeys := make([]APIKey, 0, limit)
  1648. p.dbHandle.Lock()
  1649. defer p.dbHandle.Unlock()
  1650. if p.dbHandle.isClosed {
  1651. return apiKeys, errMemoryProviderClosed
  1652. }
  1653. if limit <= 0 {
  1654. return apiKeys, nil
  1655. }
  1656. itNum := 0
  1657. if order == OrderDESC {
  1658. for i := len(p.dbHandle.apiKeysIDs) - 1; i >= 0; i-- {
  1659. itNum++
  1660. if itNum <= offset {
  1661. continue
  1662. }
  1663. keyID := p.dbHandle.apiKeysIDs[i]
  1664. k := p.dbHandle.apiKeys[keyID]
  1665. apiKey := k.getACopy()
  1666. apiKey.HideConfidentialData()
  1667. apiKeys = append(apiKeys, apiKey)
  1668. if len(apiKeys) >= limit {
  1669. break
  1670. }
  1671. }
  1672. } else {
  1673. for _, keyID := range p.dbHandle.apiKeysIDs {
  1674. itNum++
  1675. if itNum <= offset {
  1676. continue
  1677. }
  1678. k := p.dbHandle.apiKeys[keyID]
  1679. apiKey := k.getACopy()
  1680. apiKey.HideConfidentialData()
  1681. apiKeys = append(apiKeys, apiKey)
  1682. if len(apiKeys) >= limit {
  1683. break
  1684. }
  1685. }
  1686. }
  1687. return apiKeys, nil
  1688. }
  1689. func (p *MemoryProvider) dumpAPIKeys() ([]APIKey, error) {
  1690. p.dbHandle.Lock()
  1691. defer p.dbHandle.Unlock()
  1692. apiKeys := make([]APIKey, 0, len(p.dbHandle.apiKeys))
  1693. if p.dbHandle.isClosed {
  1694. return apiKeys, errMemoryProviderClosed
  1695. }
  1696. for _, k := range p.dbHandle.apiKeys {
  1697. apiKeys = append(apiKeys, k)
  1698. }
  1699. return apiKeys, nil
  1700. }
  1701. func (p *MemoryProvider) deleteAPIKeysWithUser(username string) {
  1702. found := false
  1703. for k, v := range p.dbHandle.apiKeys {
  1704. if v.User == username {
  1705. delete(p.dbHandle.apiKeys, k)
  1706. found = true
  1707. }
  1708. }
  1709. if found {
  1710. p.updateAPIKeysOrdering()
  1711. }
  1712. }
  1713. func (p *MemoryProvider) deleteAPIKeysWithAdmin(username string) {
  1714. found := false
  1715. for k, v := range p.dbHandle.apiKeys {
  1716. if v.Admin == username {
  1717. delete(p.dbHandle.apiKeys, k)
  1718. found = true
  1719. }
  1720. }
  1721. if found {
  1722. p.updateAPIKeysOrdering()
  1723. }
  1724. }
  1725. func (p *MemoryProvider) deleteSharesWithUser(username string) {
  1726. found := false
  1727. for k, v := range p.dbHandle.shares {
  1728. if v.Username == username {
  1729. delete(p.dbHandle.shares, k)
  1730. found = true
  1731. }
  1732. }
  1733. if found {
  1734. p.updateSharesOrdering()
  1735. }
  1736. }
  1737. func (p *MemoryProvider) updateAPIKeysOrdering() {
  1738. // this could be more efficient
  1739. p.dbHandle.apiKeysIDs = make([]string, 0, len(p.dbHandle.apiKeys))
  1740. for keyID := range p.dbHandle.apiKeys {
  1741. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, keyID)
  1742. }
  1743. sort.Strings(p.dbHandle.apiKeysIDs)
  1744. }
  1745. func (p *MemoryProvider) updateSharesOrdering() {
  1746. // this could be more efficient
  1747. p.dbHandle.sharesIDs = make([]string, 0, len(p.dbHandle.shares))
  1748. for shareID := range p.dbHandle.shares {
  1749. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, shareID)
  1750. }
  1751. sort.Strings(p.dbHandle.sharesIDs)
  1752. }
  1753. func (p *MemoryProvider) shareExistsInternal(shareID, username string) (Share, error) {
  1754. if val, ok := p.dbHandle.shares[shareID]; ok {
  1755. if username != "" && val.Username != username {
  1756. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %q does not exist", shareID))
  1757. }
  1758. return val.getACopy(), nil
  1759. }
  1760. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %q does not exist", shareID))
  1761. }
  1762. func (p *MemoryProvider) shareExists(shareID, username string) (Share, error) {
  1763. p.dbHandle.Lock()
  1764. defer p.dbHandle.Unlock()
  1765. if p.dbHandle.isClosed {
  1766. return Share{}, errMemoryProviderClosed
  1767. }
  1768. return p.shareExistsInternal(shareID, username)
  1769. }
  1770. func (p *MemoryProvider) addShare(share *Share) error {
  1771. err := share.validate()
  1772. if err != nil {
  1773. return err
  1774. }
  1775. p.dbHandle.Lock()
  1776. defer p.dbHandle.Unlock()
  1777. if p.dbHandle.isClosed {
  1778. return errMemoryProviderClosed
  1779. }
  1780. _, err = p.shareExistsInternal(share.ShareID, share.Username)
  1781. if err == nil {
  1782. return fmt.Errorf("share %q already exists", share.ShareID)
  1783. }
  1784. if _, err := p.userExistsInternal(share.Username); err != nil {
  1785. return util.NewValidationError(fmt.Sprintf("related user %q does not exists", share.Username))
  1786. }
  1787. if !share.IsRestore {
  1788. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1789. share.UpdatedAt = share.CreatedAt
  1790. share.LastUseAt = 0
  1791. share.UsedTokens = 0
  1792. }
  1793. if share.CreatedAt == 0 {
  1794. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1795. }
  1796. if share.UpdatedAt == 0 {
  1797. share.UpdatedAt = share.CreatedAt
  1798. }
  1799. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1800. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, share.ShareID)
  1801. sort.Strings(p.dbHandle.sharesIDs)
  1802. return nil
  1803. }
  1804. func (p *MemoryProvider) updateShare(share *Share) error {
  1805. err := share.validate()
  1806. if err != nil {
  1807. return err
  1808. }
  1809. p.dbHandle.Lock()
  1810. defer p.dbHandle.Unlock()
  1811. if p.dbHandle.isClosed {
  1812. return errMemoryProviderClosed
  1813. }
  1814. s, err := p.shareExistsInternal(share.ShareID, share.Username)
  1815. if err != nil {
  1816. return err
  1817. }
  1818. if _, err := p.userExistsInternal(share.Username); err != nil {
  1819. return util.NewValidationError(fmt.Sprintf("related user %q does not exists", share.Username))
  1820. }
  1821. share.ID = s.ID
  1822. share.ShareID = s.ShareID
  1823. if !share.IsRestore {
  1824. share.UsedTokens = s.UsedTokens
  1825. share.CreatedAt = s.CreatedAt
  1826. share.LastUseAt = s.LastUseAt
  1827. share.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1828. }
  1829. if share.CreatedAt == 0 {
  1830. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1831. }
  1832. if share.UpdatedAt == 0 {
  1833. share.UpdatedAt = share.CreatedAt
  1834. }
  1835. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1836. return nil
  1837. }
  1838. func (p *MemoryProvider) deleteShare(share Share) error {
  1839. p.dbHandle.Lock()
  1840. defer p.dbHandle.Unlock()
  1841. if p.dbHandle.isClosed {
  1842. return errMemoryProviderClosed
  1843. }
  1844. _, err := p.shareExistsInternal(share.ShareID, share.Username)
  1845. if err != nil {
  1846. return err
  1847. }
  1848. delete(p.dbHandle.shares, share.ShareID)
  1849. p.updateSharesOrdering()
  1850. return nil
  1851. }
  1852. func (p *MemoryProvider) getShares(limit int, offset int, order, username string) ([]Share, error) {
  1853. p.dbHandle.Lock()
  1854. defer p.dbHandle.Unlock()
  1855. if p.dbHandle.isClosed {
  1856. return []Share{}, errMemoryProviderClosed
  1857. }
  1858. if limit <= 0 {
  1859. return []Share{}, nil
  1860. }
  1861. shares := make([]Share, 0, limit)
  1862. itNum := 0
  1863. if order == OrderDESC {
  1864. for i := len(p.dbHandle.sharesIDs) - 1; i >= 0; i-- {
  1865. shareID := p.dbHandle.sharesIDs[i]
  1866. s := p.dbHandle.shares[shareID]
  1867. if s.Username != username {
  1868. continue
  1869. }
  1870. itNum++
  1871. if itNum <= offset {
  1872. continue
  1873. }
  1874. share := s.getACopy()
  1875. share.HideConfidentialData()
  1876. shares = append(shares, share)
  1877. if len(shares) >= limit {
  1878. break
  1879. }
  1880. }
  1881. } else {
  1882. for _, shareID := range p.dbHandle.sharesIDs {
  1883. s := p.dbHandle.shares[shareID]
  1884. if s.Username != username {
  1885. continue
  1886. }
  1887. itNum++
  1888. if itNum <= offset {
  1889. continue
  1890. }
  1891. share := s.getACopy()
  1892. share.HideConfidentialData()
  1893. shares = append(shares, share)
  1894. if len(shares) >= limit {
  1895. break
  1896. }
  1897. }
  1898. }
  1899. return shares, nil
  1900. }
  1901. func (p *MemoryProvider) dumpShares() ([]Share, error) {
  1902. p.dbHandle.Lock()
  1903. defer p.dbHandle.Unlock()
  1904. shares := make([]Share, 0, len(p.dbHandle.shares))
  1905. if p.dbHandle.isClosed {
  1906. return shares, errMemoryProviderClosed
  1907. }
  1908. for _, s := range p.dbHandle.shares {
  1909. shares = append(shares, s)
  1910. }
  1911. return shares, nil
  1912. }
  1913. func (p *MemoryProvider) updateShareLastUse(shareID string, numTokens int) error {
  1914. p.dbHandle.Lock()
  1915. defer p.dbHandle.Unlock()
  1916. if p.dbHandle.isClosed {
  1917. return errMemoryProviderClosed
  1918. }
  1919. share, err := p.shareExistsInternal(shareID, "")
  1920. if err != nil {
  1921. return err
  1922. }
  1923. share.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1924. share.UsedTokens += numTokens
  1925. p.dbHandle.shares[share.ShareID] = share
  1926. return nil
  1927. }
  1928. func (p *MemoryProvider) getDefenderHosts(_ int64, _ int) ([]DefenderEntry, error) {
  1929. return nil, ErrNotImplemented
  1930. }
  1931. func (p *MemoryProvider) getDefenderHostByIP(_ string, _ int64) (DefenderEntry, error) {
  1932. return DefenderEntry{}, ErrNotImplemented
  1933. }
  1934. func (p *MemoryProvider) isDefenderHostBanned(_ string) (DefenderEntry, error) {
  1935. return DefenderEntry{}, ErrNotImplemented
  1936. }
  1937. func (p *MemoryProvider) updateDefenderBanTime(_ string, _ int) error {
  1938. return ErrNotImplemented
  1939. }
  1940. func (p *MemoryProvider) deleteDefenderHost(_ string) error {
  1941. return ErrNotImplemented
  1942. }
  1943. func (p *MemoryProvider) addDefenderEvent(_ string, _ int) error {
  1944. return ErrNotImplemented
  1945. }
  1946. func (p *MemoryProvider) setDefenderBanTime(_ string, _ int64) error {
  1947. return ErrNotImplemented
  1948. }
  1949. func (p *MemoryProvider) cleanupDefender(_ int64) error {
  1950. return ErrNotImplemented
  1951. }
  1952. func (p *MemoryProvider) addActiveTransfer(_ ActiveTransfer) error {
  1953. return ErrNotImplemented
  1954. }
  1955. func (p *MemoryProvider) updateActiveTransferSizes(_, _, _ int64, _ string) error {
  1956. return ErrNotImplemented
  1957. }
  1958. func (p *MemoryProvider) removeActiveTransfer(_ int64, _ string) error {
  1959. return ErrNotImplemented
  1960. }
  1961. func (p *MemoryProvider) cleanupActiveTransfers(_ time.Time) error {
  1962. return ErrNotImplemented
  1963. }
  1964. func (p *MemoryProvider) getActiveTransfers(_ time.Time) ([]ActiveTransfer, error) {
  1965. return nil, ErrNotImplemented
  1966. }
  1967. func (p *MemoryProvider) addSharedSession(_ Session) error {
  1968. return ErrNotImplemented
  1969. }
  1970. func (p *MemoryProvider) deleteSharedSession(_ string) error {
  1971. return ErrNotImplemented
  1972. }
  1973. func (p *MemoryProvider) getSharedSession(_ string) (Session, error) {
  1974. return Session{}, ErrNotImplemented
  1975. }
  1976. func (p *MemoryProvider) cleanupSharedSessions(_ SessionType, _ int64) error {
  1977. return ErrNotImplemented
  1978. }
  1979. func (p *MemoryProvider) getEventActions(limit, offset int, order string, _ bool) ([]BaseEventAction, error) {
  1980. p.dbHandle.Lock()
  1981. defer p.dbHandle.Unlock()
  1982. if p.dbHandle.isClosed {
  1983. return nil, errMemoryProviderClosed
  1984. }
  1985. if limit <= 0 {
  1986. return nil, nil
  1987. }
  1988. actions := make([]BaseEventAction, 0, limit)
  1989. itNum := 0
  1990. if order == OrderASC {
  1991. for _, name := range p.dbHandle.actionsNames {
  1992. itNum++
  1993. if itNum <= offset {
  1994. continue
  1995. }
  1996. a := p.dbHandle.actions[name]
  1997. action := a.getACopy()
  1998. action.PrepareForRendering()
  1999. actions = append(actions, action)
  2000. if len(actions) >= limit {
  2001. break
  2002. }
  2003. }
  2004. } else {
  2005. for i := len(p.dbHandle.actionsNames) - 1; i >= 0; i-- {
  2006. itNum++
  2007. if itNum <= offset {
  2008. continue
  2009. }
  2010. name := p.dbHandle.actionsNames[i]
  2011. a := p.dbHandle.actions[name]
  2012. action := a.getACopy()
  2013. action.PrepareForRendering()
  2014. actions = append(actions, action)
  2015. if len(actions) >= limit {
  2016. break
  2017. }
  2018. }
  2019. }
  2020. return actions, nil
  2021. }
  2022. func (p *MemoryProvider) dumpEventActions() ([]BaseEventAction, error) {
  2023. p.dbHandle.Lock()
  2024. defer p.dbHandle.Unlock()
  2025. if p.dbHandle.isClosed {
  2026. return nil, errMemoryProviderClosed
  2027. }
  2028. actions := make([]BaseEventAction, 0, len(p.dbHandle.actions))
  2029. for _, name := range p.dbHandle.actionsNames {
  2030. a := p.dbHandle.actions[name]
  2031. action := a.getACopy()
  2032. actions = append(actions, action)
  2033. }
  2034. return actions, nil
  2035. }
  2036. func (p *MemoryProvider) eventActionExists(name string) (BaseEventAction, error) {
  2037. p.dbHandle.Lock()
  2038. defer p.dbHandle.Unlock()
  2039. if p.dbHandle.isClosed {
  2040. return BaseEventAction{}, errMemoryProviderClosed
  2041. }
  2042. return p.actionExistsInternal(name)
  2043. }
  2044. func (p *MemoryProvider) addEventAction(action *BaseEventAction) error {
  2045. err := action.validate()
  2046. if err != nil {
  2047. return err
  2048. }
  2049. p.dbHandle.Lock()
  2050. defer p.dbHandle.Unlock()
  2051. if p.dbHandle.isClosed {
  2052. return errMemoryProviderClosed
  2053. }
  2054. _, err = p.actionExistsInternal(action.Name)
  2055. if err == nil {
  2056. return util.NewI18nError(
  2057. fmt.Errorf("%w: event action %q already exists", ErrDuplicatedKey, action.Name),
  2058. util.I18nErrorDuplicatedName,
  2059. )
  2060. }
  2061. action.ID = p.getNextActionID()
  2062. action.Rules = nil
  2063. p.dbHandle.actions[action.Name] = action.getACopy()
  2064. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, action.Name)
  2065. sort.Strings(p.dbHandle.actionsNames)
  2066. return nil
  2067. }
  2068. func (p *MemoryProvider) updateEventAction(action *BaseEventAction) error {
  2069. err := action.validate()
  2070. if err != nil {
  2071. return err
  2072. }
  2073. p.dbHandle.Lock()
  2074. defer p.dbHandle.Unlock()
  2075. if p.dbHandle.isClosed {
  2076. return errMemoryProviderClosed
  2077. }
  2078. oldAction, err := p.actionExistsInternal(action.Name)
  2079. if err != nil {
  2080. return fmt.Errorf("event action %s does not exist", action.Name)
  2081. }
  2082. action.ID = oldAction.ID
  2083. action.Name = oldAction.Name
  2084. action.Rules = nil
  2085. if len(oldAction.Rules) > 0 {
  2086. var relatedRules []string
  2087. for _, ruleName := range oldAction.Rules {
  2088. rule, err := p.ruleExistsInternal(ruleName)
  2089. if err == nil {
  2090. relatedRules = append(relatedRules, ruleName)
  2091. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2092. p.dbHandle.rules[ruleName] = rule
  2093. setLastRuleUpdate()
  2094. }
  2095. }
  2096. action.Rules = relatedRules
  2097. }
  2098. p.dbHandle.actions[action.Name] = action.getACopy()
  2099. return nil
  2100. }
  2101. func (p *MemoryProvider) deleteEventAction(action BaseEventAction) error {
  2102. p.dbHandle.Lock()
  2103. defer p.dbHandle.Unlock()
  2104. if p.dbHandle.isClosed {
  2105. return errMemoryProviderClosed
  2106. }
  2107. oldAction, err := p.actionExistsInternal(action.Name)
  2108. if err != nil {
  2109. return fmt.Errorf("event action %s does not exist", action.Name)
  2110. }
  2111. if len(oldAction.Rules) > 0 {
  2112. return util.NewValidationError(fmt.Sprintf("action %s is referenced, it cannot be removed", oldAction.Name))
  2113. }
  2114. delete(p.dbHandle.actions, action.Name)
  2115. // this could be more efficient
  2116. p.dbHandle.actionsNames = make([]string, 0, len(p.dbHandle.actions))
  2117. for name := range p.dbHandle.actions {
  2118. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, name)
  2119. }
  2120. sort.Strings(p.dbHandle.actionsNames)
  2121. return nil
  2122. }
  2123. func (p *MemoryProvider) getEventRules(limit, offset int, order string) ([]EventRule, error) {
  2124. p.dbHandle.Lock()
  2125. defer p.dbHandle.Unlock()
  2126. if p.dbHandle.isClosed {
  2127. return nil, errMemoryProviderClosed
  2128. }
  2129. if limit <= 0 {
  2130. return nil, nil
  2131. }
  2132. itNum := 0
  2133. rules := make([]EventRule, 0, limit)
  2134. if order == OrderASC {
  2135. for _, name := range p.dbHandle.rulesNames {
  2136. itNum++
  2137. if itNum <= offset {
  2138. continue
  2139. }
  2140. r := p.dbHandle.rules[name]
  2141. rule := r.getACopy()
  2142. p.addActionsToRule(&rule)
  2143. rule.PrepareForRendering()
  2144. rules = append(rules, rule)
  2145. if len(rules) >= limit {
  2146. break
  2147. }
  2148. }
  2149. } else {
  2150. for i := len(p.dbHandle.rulesNames) - 1; i >= 0; i-- {
  2151. itNum++
  2152. if itNum <= offset {
  2153. continue
  2154. }
  2155. name := p.dbHandle.rulesNames[i]
  2156. r := p.dbHandle.rules[name]
  2157. rule := r.getACopy()
  2158. p.addActionsToRule(&rule)
  2159. rule.PrepareForRendering()
  2160. rules = append(rules, rule)
  2161. if len(rules) >= limit {
  2162. break
  2163. }
  2164. }
  2165. }
  2166. return rules, nil
  2167. }
  2168. func (p *MemoryProvider) dumpEventRules() ([]EventRule, error) {
  2169. p.dbHandle.Lock()
  2170. defer p.dbHandle.Unlock()
  2171. if p.dbHandle.isClosed {
  2172. return nil, errMemoryProviderClosed
  2173. }
  2174. rules := make([]EventRule, 0, len(p.dbHandle.rules))
  2175. for _, name := range p.dbHandle.rulesNames {
  2176. r := p.dbHandle.rules[name]
  2177. rule := r.getACopy()
  2178. p.addActionsToRule(&rule)
  2179. rules = append(rules, rule)
  2180. }
  2181. return rules, nil
  2182. }
  2183. func (p *MemoryProvider) getRecentlyUpdatedRules(after int64) ([]EventRule, error) {
  2184. if getLastRuleUpdate() < after {
  2185. return nil, nil
  2186. }
  2187. p.dbHandle.Lock()
  2188. defer p.dbHandle.Unlock()
  2189. if p.dbHandle.isClosed {
  2190. return nil, errMemoryProviderClosed
  2191. }
  2192. rules := make([]EventRule, 0, 10)
  2193. for _, name := range p.dbHandle.rulesNames {
  2194. r := p.dbHandle.rules[name]
  2195. if r.UpdatedAt < after {
  2196. continue
  2197. }
  2198. rule := r.getACopy()
  2199. p.addActionsToRule(&rule)
  2200. rules = append(rules, rule)
  2201. }
  2202. return rules, nil
  2203. }
  2204. func (p *MemoryProvider) eventRuleExists(name string) (EventRule, error) {
  2205. p.dbHandle.Lock()
  2206. defer p.dbHandle.Unlock()
  2207. if p.dbHandle.isClosed {
  2208. return EventRule{}, errMemoryProviderClosed
  2209. }
  2210. rule, err := p.ruleExistsInternal(name)
  2211. if err != nil {
  2212. return rule, err
  2213. }
  2214. p.addActionsToRule(&rule)
  2215. return rule, nil
  2216. }
  2217. func (p *MemoryProvider) addEventRule(rule *EventRule) error {
  2218. if err := rule.validate(); err != nil {
  2219. return err
  2220. }
  2221. p.dbHandle.Lock()
  2222. defer p.dbHandle.Unlock()
  2223. if p.dbHandle.isClosed {
  2224. return errMemoryProviderClosed
  2225. }
  2226. _, err := p.ruleExistsInternal(rule.Name)
  2227. if err == nil {
  2228. return util.NewI18nError(
  2229. fmt.Errorf("%w: event rule %q already exists", ErrDuplicatedKey, rule.Name),
  2230. util.I18nErrorDuplicatedName,
  2231. )
  2232. }
  2233. rule.ID = p.getNextRuleID()
  2234. rule.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2235. rule.UpdatedAt = rule.CreatedAt
  2236. var mappedActions []string
  2237. for idx := range rule.Actions {
  2238. if err := p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  2239. // try to remove action mapping
  2240. for _, a := range mappedActions {
  2241. p.removeRuleFromActionMapping(rule.Name, a)
  2242. }
  2243. return err
  2244. }
  2245. mappedActions = append(mappedActions, rule.Actions[idx].Name)
  2246. }
  2247. sort.Slice(rule.Actions, func(i, j int) bool {
  2248. return rule.Actions[i].Order < rule.Actions[j].Order
  2249. })
  2250. p.dbHandle.rules[rule.Name] = rule.getACopy()
  2251. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, rule.Name)
  2252. sort.Strings(p.dbHandle.rulesNames)
  2253. setLastRuleUpdate()
  2254. return nil
  2255. }
  2256. func (p *MemoryProvider) updateEventRule(rule *EventRule) error {
  2257. if err := rule.validate(); err != nil {
  2258. return err
  2259. }
  2260. p.dbHandle.Lock()
  2261. defer p.dbHandle.Unlock()
  2262. if p.dbHandle.isClosed {
  2263. return errMemoryProviderClosed
  2264. }
  2265. oldRule, err := p.ruleExistsInternal(rule.Name)
  2266. if err != nil {
  2267. return err
  2268. }
  2269. for idx := range oldRule.Actions {
  2270. p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name)
  2271. }
  2272. for idx := range rule.Actions {
  2273. if err = p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  2274. // try to add old mapping
  2275. for _, oldAction := range oldRule.Actions {
  2276. if errRollback := p.addRuleToActionMapping(oldRule.Name, oldAction.Name); errRollback != nil {
  2277. providerLog(logger.LevelError, "unable to rollback old action mapping %q for rule %q, error: %v",
  2278. oldAction.Name, oldRule.Name, errRollback)
  2279. }
  2280. }
  2281. return err
  2282. }
  2283. }
  2284. rule.ID = oldRule.ID
  2285. rule.CreatedAt = oldRule.CreatedAt
  2286. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2287. sort.Slice(rule.Actions, func(i, j int) bool {
  2288. return rule.Actions[i].Order < rule.Actions[j].Order
  2289. })
  2290. p.dbHandle.rules[rule.Name] = rule.getACopy()
  2291. setLastRuleUpdate()
  2292. return nil
  2293. }
  2294. func (p *MemoryProvider) deleteEventRule(rule EventRule, _ bool) error {
  2295. p.dbHandle.Lock()
  2296. defer p.dbHandle.Unlock()
  2297. if p.dbHandle.isClosed {
  2298. return errMemoryProviderClosed
  2299. }
  2300. oldRule, err := p.ruleExistsInternal(rule.Name)
  2301. if err != nil {
  2302. return err
  2303. }
  2304. if len(oldRule.Actions) > 0 {
  2305. for idx := range oldRule.Actions {
  2306. p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name)
  2307. }
  2308. }
  2309. delete(p.dbHandle.rules, rule.Name)
  2310. p.dbHandle.rulesNames = make([]string, 0, len(p.dbHandle.rules))
  2311. for name := range p.dbHandle.rules {
  2312. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, name)
  2313. }
  2314. sort.Strings(p.dbHandle.rulesNames)
  2315. setLastRuleUpdate()
  2316. return nil
  2317. }
  2318. func (*MemoryProvider) getTaskByName(_ string) (Task, error) {
  2319. return Task{}, ErrNotImplemented
  2320. }
  2321. func (*MemoryProvider) addTask(_ string) error {
  2322. return ErrNotImplemented
  2323. }
  2324. func (*MemoryProvider) updateTask(_ string, _ int64) error {
  2325. return ErrNotImplemented
  2326. }
  2327. func (*MemoryProvider) updateTaskTimestamp(_ string) error {
  2328. return ErrNotImplemented
  2329. }
  2330. func (*MemoryProvider) addNode() error {
  2331. return ErrNotImplemented
  2332. }
  2333. func (*MemoryProvider) getNodeByName(_ string) (Node, error) {
  2334. return Node{}, ErrNotImplemented
  2335. }
  2336. func (*MemoryProvider) getNodes() ([]Node, error) {
  2337. return nil, ErrNotImplemented
  2338. }
  2339. func (*MemoryProvider) updateNodeTimestamp() error {
  2340. return ErrNotImplemented
  2341. }
  2342. func (*MemoryProvider) cleanupNodes() error {
  2343. return ErrNotImplemented
  2344. }
  2345. func (p *MemoryProvider) roleExists(name string) (Role, error) {
  2346. p.dbHandle.Lock()
  2347. defer p.dbHandle.Unlock()
  2348. if p.dbHandle.isClosed {
  2349. return Role{}, errMemoryProviderClosed
  2350. }
  2351. role, err := p.roleExistsInternal(name)
  2352. if err != nil {
  2353. return role, err
  2354. }
  2355. return role, nil
  2356. }
  2357. func (p *MemoryProvider) addRole(role *Role) error {
  2358. if err := role.validate(); err != nil {
  2359. return err
  2360. }
  2361. p.dbHandle.Lock()
  2362. defer p.dbHandle.Unlock()
  2363. if p.dbHandle.isClosed {
  2364. return errMemoryProviderClosed
  2365. }
  2366. _, err := p.roleExistsInternal(role.Name)
  2367. if err == nil {
  2368. return util.NewI18nError(
  2369. fmt.Errorf("%w: role %q already exists", ErrDuplicatedKey, role.Name),
  2370. util.I18nErrorDuplicatedName,
  2371. )
  2372. }
  2373. role.ID = p.getNextRoleID()
  2374. role.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2375. role.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2376. role.Users = nil
  2377. role.Admins = nil
  2378. p.dbHandle.roles[role.Name] = role.getACopy()
  2379. p.dbHandle.roleNames = append(p.dbHandle.roleNames, role.Name)
  2380. sort.Strings(p.dbHandle.roleNames)
  2381. return nil
  2382. }
  2383. func (p *MemoryProvider) updateRole(role *Role) error {
  2384. if err := role.validate(); err != nil {
  2385. return err
  2386. }
  2387. p.dbHandle.Lock()
  2388. defer p.dbHandle.Unlock()
  2389. if p.dbHandle.isClosed {
  2390. return errMemoryProviderClosed
  2391. }
  2392. oldRole, err := p.roleExistsInternal(role.Name)
  2393. if err != nil {
  2394. return err
  2395. }
  2396. role.ID = oldRole.ID
  2397. role.CreatedAt = oldRole.CreatedAt
  2398. role.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2399. role.Users = oldRole.Users
  2400. role.Admins = oldRole.Admins
  2401. p.dbHandle.roles[role.Name] = role.getACopy()
  2402. return nil
  2403. }
  2404. func (p *MemoryProvider) deleteRole(role Role) error {
  2405. p.dbHandle.Lock()
  2406. defer p.dbHandle.Unlock()
  2407. if p.dbHandle.isClosed {
  2408. return errMemoryProviderClosed
  2409. }
  2410. oldRole, err := p.roleExistsInternal(role.Name)
  2411. if err != nil {
  2412. return err
  2413. }
  2414. if len(oldRole.Admins) > 0 {
  2415. return util.NewValidationError(fmt.Sprintf("the role %q is referenced, it cannot be removed", oldRole.Name))
  2416. }
  2417. for _, username := range oldRole.Users {
  2418. user, err := p.userExistsInternal(username)
  2419. if err != nil {
  2420. continue
  2421. }
  2422. if user.Role == role.Name {
  2423. user.Role = ""
  2424. p.dbHandle.users[username] = user
  2425. } else {
  2426. providerLog(logger.LevelError, "user %q does not have the expected role %q, actual %q", username, role.Name, user.Role)
  2427. }
  2428. }
  2429. delete(p.dbHandle.roles, role.Name)
  2430. p.dbHandle.roleNames = make([]string, 0, len(p.dbHandle.roles))
  2431. for name := range p.dbHandle.roles {
  2432. p.dbHandle.roleNames = append(p.dbHandle.roleNames, name)
  2433. }
  2434. sort.Strings(p.dbHandle.roleNames)
  2435. return nil
  2436. }
  2437. func (p *MemoryProvider) getRoles(limit int, offset int, order string, _ bool) ([]Role, error) {
  2438. p.dbHandle.Lock()
  2439. defer p.dbHandle.Unlock()
  2440. if p.dbHandle.isClosed {
  2441. return nil, errMemoryProviderClosed
  2442. }
  2443. if limit <= 0 {
  2444. return nil, nil
  2445. }
  2446. roles := make([]Role, 0, 10)
  2447. itNum := 0
  2448. if order == OrderASC {
  2449. for _, name := range p.dbHandle.roleNames {
  2450. itNum++
  2451. if itNum <= offset {
  2452. continue
  2453. }
  2454. r := p.dbHandle.roles[name]
  2455. role := r.getACopy()
  2456. roles = append(roles, role)
  2457. if len(roles) >= limit {
  2458. break
  2459. }
  2460. }
  2461. } else {
  2462. for i := len(p.dbHandle.roleNames) - 1; i >= 0; i-- {
  2463. itNum++
  2464. if itNum <= offset {
  2465. continue
  2466. }
  2467. name := p.dbHandle.roleNames[i]
  2468. r := p.dbHandle.roles[name]
  2469. role := r.getACopy()
  2470. roles = append(roles, role)
  2471. if len(roles) >= limit {
  2472. break
  2473. }
  2474. }
  2475. }
  2476. return roles, nil
  2477. }
  2478. func (p *MemoryProvider) dumpRoles() ([]Role, error) {
  2479. p.dbHandle.Lock()
  2480. defer p.dbHandle.Unlock()
  2481. if p.dbHandle.isClosed {
  2482. return nil, errMemoryProviderClosed
  2483. }
  2484. roles := make([]Role, 0, len(p.dbHandle.roles))
  2485. for _, name := range p.dbHandle.roleNames {
  2486. r := p.dbHandle.roles[name]
  2487. roles = append(roles, r.getACopy())
  2488. }
  2489. return roles, nil
  2490. }
  2491. func (p *MemoryProvider) ipListEntryExists(ipOrNet string, listType IPListType) (IPListEntry, error) {
  2492. p.dbHandle.Lock()
  2493. defer p.dbHandle.Unlock()
  2494. if p.dbHandle.isClosed {
  2495. return IPListEntry{}, errMemoryProviderClosed
  2496. }
  2497. entry, err := p.ipListEntryExistsInternal(&IPListEntry{IPOrNet: ipOrNet, Type: listType})
  2498. if err != nil {
  2499. return entry, err
  2500. }
  2501. entry.PrepareForRendering()
  2502. return entry, nil
  2503. }
  2504. func (p *MemoryProvider) addIPListEntry(entry *IPListEntry) error {
  2505. if err := entry.validate(); err != nil {
  2506. return err
  2507. }
  2508. p.dbHandle.Lock()
  2509. defer p.dbHandle.Unlock()
  2510. if p.dbHandle.isClosed {
  2511. return errMemoryProviderClosed
  2512. }
  2513. _, err := p.ipListEntryExistsInternal(entry)
  2514. if err == nil {
  2515. return util.NewI18nError(
  2516. fmt.Errorf("%w: entry %q already exists", ErrDuplicatedKey, entry.IPOrNet),
  2517. util.I18nErrorDuplicatedIPNet,
  2518. )
  2519. }
  2520. entry.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2521. entry.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2522. p.dbHandle.ipListEntries[entry.getKey()] = entry.getACopy()
  2523. p.dbHandle.ipListEntriesKeys = append(p.dbHandle.ipListEntriesKeys, entry.getKey())
  2524. sort.Strings(p.dbHandle.ipListEntriesKeys)
  2525. return nil
  2526. }
  2527. func (p *MemoryProvider) updateIPListEntry(entry *IPListEntry) error {
  2528. if err := entry.validate(); err != nil {
  2529. return err
  2530. }
  2531. p.dbHandle.Lock()
  2532. defer p.dbHandle.Unlock()
  2533. if p.dbHandle.isClosed {
  2534. return errMemoryProviderClosed
  2535. }
  2536. oldEntry, err := p.ipListEntryExistsInternal(entry)
  2537. if err != nil {
  2538. return err
  2539. }
  2540. entry.CreatedAt = oldEntry.CreatedAt
  2541. entry.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2542. p.dbHandle.ipListEntries[entry.getKey()] = entry.getACopy()
  2543. return nil
  2544. }
  2545. func (p *MemoryProvider) deleteIPListEntry(entry IPListEntry, _ bool) error {
  2546. if err := entry.validate(); err != nil {
  2547. return err
  2548. }
  2549. p.dbHandle.Lock()
  2550. defer p.dbHandle.Unlock()
  2551. if p.dbHandle.isClosed {
  2552. return errMemoryProviderClosed
  2553. }
  2554. _, err := p.ipListEntryExistsInternal(&entry)
  2555. if err != nil {
  2556. return err
  2557. }
  2558. delete(p.dbHandle.ipListEntries, entry.getKey())
  2559. p.dbHandle.ipListEntriesKeys = make([]string, 0, len(p.dbHandle.ipListEntries))
  2560. for k := range p.dbHandle.ipListEntries {
  2561. p.dbHandle.ipListEntriesKeys = append(p.dbHandle.ipListEntriesKeys, k)
  2562. }
  2563. sort.Strings(p.dbHandle.ipListEntriesKeys)
  2564. return nil
  2565. }
  2566. func (p *MemoryProvider) getIPListEntries(listType IPListType, filter, from, order string, limit int) ([]IPListEntry, error) {
  2567. p.dbHandle.Lock()
  2568. defer p.dbHandle.Unlock()
  2569. if p.dbHandle.isClosed {
  2570. return nil, errMemoryProviderClosed
  2571. }
  2572. entries := make([]IPListEntry, 0, 15)
  2573. if order == OrderASC {
  2574. for _, k := range p.dbHandle.ipListEntriesKeys {
  2575. e := p.dbHandle.ipListEntries[k]
  2576. if e.Type == listType && e.satisfySearchConstraints(filter, from, order) {
  2577. entry := e.getACopy()
  2578. entry.PrepareForRendering()
  2579. entries = append(entries, entry)
  2580. if limit > 0 && len(entries) >= limit {
  2581. break
  2582. }
  2583. }
  2584. }
  2585. } else {
  2586. for i := len(p.dbHandle.ipListEntriesKeys) - 1; i >= 0; i-- {
  2587. e := p.dbHandle.ipListEntries[p.dbHandle.ipListEntriesKeys[i]]
  2588. if e.Type == listType && e.satisfySearchConstraints(filter, from, order) {
  2589. entry := e.getACopy()
  2590. entry.PrepareForRendering()
  2591. entries = append(entries, entry)
  2592. if limit > 0 && len(entries) >= limit {
  2593. break
  2594. }
  2595. }
  2596. }
  2597. }
  2598. return entries, nil
  2599. }
  2600. func (p *MemoryProvider) getRecentlyUpdatedIPListEntries(_ int64) ([]IPListEntry, error) {
  2601. return nil, ErrNotImplemented
  2602. }
  2603. func (p *MemoryProvider) dumpIPListEntries() ([]IPListEntry, error) {
  2604. p.dbHandle.Lock()
  2605. defer p.dbHandle.Unlock()
  2606. if p.dbHandle.isClosed {
  2607. return nil, errMemoryProviderClosed
  2608. }
  2609. if count := len(p.dbHandle.ipListEntriesKeys); count > ipListMemoryLimit {
  2610. providerLog(logger.LevelInfo, "IP lists excluded from dump, too many entries: %d", count)
  2611. return nil, nil
  2612. }
  2613. entries := make([]IPListEntry, 0, len(p.dbHandle.ipListEntries))
  2614. for _, k := range p.dbHandle.ipListEntriesKeys {
  2615. e := p.dbHandle.ipListEntries[k]
  2616. entry := e.getACopy()
  2617. entry.PrepareForRendering()
  2618. entries = append(entries, entry)
  2619. }
  2620. return entries, nil
  2621. }
  2622. func (p *MemoryProvider) countIPListEntries(listType IPListType) (int64, error) {
  2623. p.dbHandle.Lock()
  2624. defer p.dbHandle.Unlock()
  2625. if p.dbHandle.isClosed {
  2626. return 0, errMemoryProviderClosed
  2627. }
  2628. if listType == 0 {
  2629. return int64(len(p.dbHandle.ipListEntriesKeys)), nil
  2630. }
  2631. var count int64
  2632. for _, k := range p.dbHandle.ipListEntriesKeys {
  2633. e := p.dbHandle.ipListEntries[k]
  2634. if e.Type == listType {
  2635. count++
  2636. }
  2637. }
  2638. return count, nil
  2639. }
  2640. func (p *MemoryProvider) getListEntriesForIP(ip string, listType IPListType) ([]IPListEntry, error) {
  2641. p.dbHandle.Lock()
  2642. defer p.dbHandle.Unlock()
  2643. if p.dbHandle.isClosed {
  2644. return nil, errMemoryProviderClosed
  2645. }
  2646. entries := make([]IPListEntry, 0, 3)
  2647. ipAddr, err := netip.ParseAddr(ip)
  2648. if err != nil {
  2649. return entries, fmt.Errorf("invalid ip address %s", ip)
  2650. }
  2651. var netType int
  2652. var ipBytes []byte
  2653. if ipAddr.Is4() || ipAddr.Is4In6() {
  2654. netType = ipTypeV4
  2655. as4 := ipAddr.As4()
  2656. ipBytes = as4[:]
  2657. } else {
  2658. netType = ipTypeV6
  2659. as16 := ipAddr.As16()
  2660. ipBytes = as16[:]
  2661. }
  2662. for _, k := range p.dbHandle.ipListEntriesKeys {
  2663. e := p.dbHandle.ipListEntries[k]
  2664. if e.Type == listType && e.IPType == netType && bytes.Compare(ipBytes, e.First) >= 0 && bytes.Compare(ipBytes, e.Last) <= 0 {
  2665. entry := e.getACopy()
  2666. entry.PrepareForRendering()
  2667. entries = append(entries, entry)
  2668. }
  2669. }
  2670. return entries, nil
  2671. }
  2672. func (p *MemoryProvider) getConfigs() (Configs, error) {
  2673. p.dbHandle.Lock()
  2674. defer p.dbHandle.Unlock()
  2675. if p.dbHandle.isClosed {
  2676. return Configs{}, errMemoryProviderClosed
  2677. }
  2678. return p.dbHandle.configs.getACopy(), nil
  2679. }
  2680. func (p *MemoryProvider) setConfigs(configs *Configs) error {
  2681. if err := configs.validate(); err != nil {
  2682. return err
  2683. }
  2684. p.dbHandle.Lock()
  2685. defer p.dbHandle.Unlock()
  2686. if p.dbHandle.isClosed {
  2687. return errMemoryProviderClosed
  2688. }
  2689. p.dbHandle.configs = configs.getACopy()
  2690. return nil
  2691. }
  2692. func (p *MemoryProvider) setFirstDownloadTimestamp(username string) error {
  2693. p.dbHandle.Lock()
  2694. defer p.dbHandle.Unlock()
  2695. if p.dbHandle.isClosed {
  2696. return errMemoryProviderClosed
  2697. }
  2698. user, err := p.userExistsInternal(username)
  2699. if err != nil {
  2700. return err
  2701. }
  2702. if user.FirstDownload > 0 {
  2703. return util.NewGenericError(fmt.Sprintf("first download already set to %s",
  2704. util.GetTimeFromMsecSinceEpoch(user.FirstDownload)))
  2705. }
  2706. user.FirstDownload = util.GetTimeAsMsSinceEpoch(time.Now())
  2707. p.dbHandle.users[user.Username] = user
  2708. return nil
  2709. }
  2710. func (p *MemoryProvider) setFirstUploadTimestamp(username string) error {
  2711. p.dbHandle.Lock()
  2712. defer p.dbHandle.Unlock()
  2713. if p.dbHandle.isClosed {
  2714. return errMemoryProviderClosed
  2715. }
  2716. user, err := p.userExistsInternal(username)
  2717. if err != nil {
  2718. return err
  2719. }
  2720. if user.FirstUpload > 0 {
  2721. return util.NewGenericError(fmt.Sprintf("first upload already set to %s",
  2722. util.GetTimeFromMsecSinceEpoch(user.FirstUpload)))
  2723. }
  2724. user.FirstUpload = util.GetTimeAsMsSinceEpoch(time.Now())
  2725. p.dbHandle.users[user.Username] = user
  2726. return nil
  2727. }
  2728. func (p *MemoryProvider) getNextID() int64 {
  2729. nextID := int64(1)
  2730. for _, v := range p.dbHandle.users {
  2731. if v.ID >= nextID {
  2732. nextID = v.ID + 1
  2733. }
  2734. }
  2735. return nextID
  2736. }
  2737. func (p *MemoryProvider) getNextFolderID() int64 {
  2738. nextID := int64(1)
  2739. for _, v := range p.dbHandle.vfolders {
  2740. if v.ID >= nextID {
  2741. nextID = v.ID + 1
  2742. }
  2743. }
  2744. return nextID
  2745. }
  2746. func (p *MemoryProvider) getNextAdminID() int64 {
  2747. nextID := int64(1)
  2748. for _, a := range p.dbHandle.admins {
  2749. if a.ID >= nextID {
  2750. nextID = a.ID + 1
  2751. }
  2752. }
  2753. return nextID
  2754. }
  2755. func (p *MemoryProvider) getNextGroupID() int64 {
  2756. nextID := int64(1)
  2757. for _, g := range p.dbHandle.groups {
  2758. if g.ID >= nextID {
  2759. nextID = g.ID + 1
  2760. }
  2761. }
  2762. return nextID
  2763. }
  2764. func (p *MemoryProvider) getNextActionID() int64 {
  2765. nextID := int64(1)
  2766. for _, a := range p.dbHandle.actions {
  2767. if a.ID >= nextID {
  2768. nextID = a.ID + 1
  2769. }
  2770. }
  2771. return nextID
  2772. }
  2773. func (p *MemoryProvider) getNextRuleID() int64 {
  2774. nextID := int64(1)
  2775. for _, r := range p.dbHandle.rules {
  2776. if r.ID >= nextID {
  2777. nextID = r.ID + 1
  2778. }
  2779. }
  2780. return nextID
  2781. }
  2782. func (p *MemoryProvider) getNextRoleID() int64 {
  2783. nextID := int64(1)
  2784. for _, r := range p.dbHandle.roles {
  2785. if r.ID >= nextID {
  2786. nextID = r.ID + 1
  2787. }
  2788. }
  2789. return nextID
  2790. }
  2791. func (p *MemoryProvider) clear() {
  2792. p.dbHandle.Lock()
  2793. defer p.dbHandle.Unlock()
  2794. p.dbHandle.usernames = []string{}
  2795. p.dbHandle.users = make(map[string]User)
  2796. p.dbHandle.groupnames = []string{}
  2797. p.dbHandle.groups = map[string]Group{}
  2798. p.dbHandle.vfoldersNames = []string{}
  2799. p.dbHandle.vfolders = make(map[string]vfs.BaseVirtualFolder)
  2800. p.dbHandle.admins = make(map[string]Admin)
  2801. p.dbHandle.adminsUsernames = []string{}
  2802. p.dbHandle.apiKeys = make(map[string]APIKey)
  2803. p.dbHandle.apiKeysIDs = []string{}
  2804. p.dbHandle.shares = make(map[string]Share)
  2805. p.dbHandle.sharesIDs = []string{}
  2806. p.dbHandle.actions = map[string]BaseEventAction{}
  2807. p.dbHandle.actionsNames = []string{}
  2808. p.dbHandle.rules = map[string]EventRule{}
  2809. p.dbHandle.rulesNames = []string{}
  2810. p.dbHandle.roles = map[string]Role{}
  2811. p.dbHandle.roleNames = []string{}
  2812. p.dbHandle.ipListEntries = map[string]IPListEntry{}
  2813. p.dbHandle.ipListEntriesKeys = []string{}
  2814. p.dbHandle.configs = Configs{}
  2815. }
  2816. func (p *MemoryProvider) reloadConfig() error {
  2817. if p.dbHandle.configFile == "" {
  2818. providerLog(logger.LevelDebug, "no dump configuration file defined")
  2819. return nil
  2820. }
  2821. providerLog(logger.LevelDebug, "loading dump from file: %q", p.dbHandle.configFile)
  2822. fi, err := os.Stat(p.dbHandle.configFile)
  2823. if err != nil {
  2824. providerLog(logger.LevelError, "error loading dump: %v", err)
  2825. return err
  2826. }
  2827. if fi.Size() == 0 {
  2828. err = errors.New("dump configuration file is invalid, its size must be > 0")
  2829. providerLog(logger.LevelError, "error loading dump: %v", err)
  2830. return err
  2831. }
  2832. if fi.Size() > 20971520 {
  2833. err = errors.New("dump configuration file is invalid, its size must be <= 20971520 bytes")
  2834. providerLog(logger.LevelError, "error loading dump: %v", err)
  2835. return err
  2836. }
  2837. content, err := os.ReadFile(p.dbHandle.configFile)
  2838. if err != nil {
  2839. providerLog(logger.LevelError, "error loading dump: %v", err)
  2840. return err
  2841. }
  2842. dump, err := ParseDumpData(content)
  2843. if err != nil {
  2844. providerLog(logger.LevelError, "error loading dump: %v", err)
  2845. return err
  2846. }
  2847. return p.restoreDump(&dump)
  2848. }
  2849. func (p *MemoryProvider) restoreDump(dump *BackupData) error {
  2850. p.clear()
  2851. if err := p.restoreConfigs(dump); err != nil {
  2852. return err
  2853. }
  2854. if err := p.restoreIPListEntries(dump); err != nil {
  2855. return err
  2856. }
  2857. if err := p.restoreRoles(dump); err != nil {
  2858. return err
  2859. }
  2860. if err := p.restoreFolders(dump); err != nil {
  2861. return err
  2862. }
  2863. if err := p.restoreGroups(dump); err != nil {
  2864. return err
  2865. }
  2866. if err := p.restoreUsers(dump); err != nil {
  2867. return err
  2868. }
  2869. if err := p.restoreAdmins(dump); err != nil {
  2870. return err
  2871. }
  2872. if err := p.restoreAPIKeys(dump); err != nil {
  2873. return err
  2874. }
  2875. if err := p.restoreShares(dump); err != nil {
  2876. return err
  2877. }
  2878. if err := p.restoreEventActions(dump); err != nil {
  2879. return err
  2880. }
  2881. if err := p.restoreEventRules(dump); err != nil {
  2882. return err
  2883. }
  2884. providerLog(logger.LevelDebug, "config loaded from file: %q", p.dbHandle.configFile)
  2885. return nil
  2886. }
  2887. func (p *MemoryProvider) restoreEventActions(dump *BackupData) error {
  2888. for idx := range dump.EventActions {
  2889. action := dump.EventActions[idx]
  2890. a, err := p.eventActionExists(action.Name)
  2891. if err == nil {
  2892. action.ID = a.ID
  2893. err = UpdateEventAction(&action, ActionExecutorSystem, "", "")
  2894. if err != nil {
  2895. providerLog(logger.LevelError, "error updating event action %q: %v", action.Name, err)
  2896. return err
  2897. }
  2898. } else {
  2899. err = AddEventAction(&action, ActionExecutorSystem, "", "")
  2900. if err != nil {
  2901. providerLog(logger.LevelError, "error adding event action %q: %v", action.Name, err)
  2902. return err
  2903. }
  2904. }
  2905. }
  2906. return nil
  2907. }
  2908. func (p *MemoryProvider) restoreEventRules(dump *BackupData) error {
  2909. for idx := range dump.EventRules {
  2910. rule := dump.EventRules[idx]
  2911. r, err := p.eventRuleExists(rule.Name)
  2912. if dump.Version < 15 {
  2913. rule.Status = 1
  2914. }
  2915. if err == nil {
  2916. rule.ID = r.ID
  2917. err = UpdateEventRule(&rule, ActionExecutorSystem, "", "")
  2918. if err != nil {
  2919. providerLog(logger.LevelError, "error updating event rule %q: %v", rule.Name, err)
  2920. return err
  2921. }
  2922. } else {
  2923. err = AddEventRule(&rule, ActionExecutorSystem, "", "")
  2924. if err != nil {
  2925. providerLog(logger.LevelError, "error adding event rule %q: %v", rule.Name, err)
  2926. return err
  2927. }
  2928. }
  2929. }
  2930. return nil
  2931. }
  2932. func (p *MemoryProvider) restoreShares(dump *BackupData) error {
  2933. for idx := range dump.Shares {
  2934. share := dump.Shares[idx]
  2935. s, err := p.shareExists(share.ShareID, "")
  2936. share.IsRestore = true
  2937. if err == nil {
  2938. share.ID = s.ID
  2939. err = UpdateShare(&share, ActionExecutorSystem, "", "")
  2940. if err != nil {
  2941. providerLog(logger.LevelError, "error updating share %q: %v", share.ShareID, err)
  2942. return err
  2943. }
  2944. } else {
  2945. err = AddShare(&share, ActionExecutorSystem, "", "")
  2946. if err != nil {
  2947. providerLog(logger.LevelError, "error adding share %q: %v", share.ShareID, err)
  2948. return err
  2949. }
  2950. }
  2951. }
  2952. return nil
  2953. }
  2954. func (p *MemoryProvider) restoreAPIKeys(dump *BackupData) error {
  2955. for idx := range dump.APIKeys {
  2956. apiKey := dump.APIKeys[idx]
  2957. if apiKey.Key == "" {
  2958. return fmt.Errorf("cannot restore an empty API key: %+v", apiKey)
  2959. }
  2960. k, err := p.apiKeyExists(apiKey.KeyID)
  2961. if err == nil {
  2962. apiKey.ID = k.ID
  2963. err = UpdateAPIKey(&apiKey, ActionExecutorSystem, "", "")
  2964. if err != nil {
  2965. providerLog(logger.LevelError, "error updating API key %q: %v", apiKey.KeyID, err)
  2966. return err
  2967. }
  2968. } else {
  2969. err = AddAPIKey(&apiKey, ActionExecutorSystem, "", "")
  2970. if err != nil {
  2971. providerLog(logger.LevelError, "error adding API key %q: %v", apiKey.KeyID, err)
  2972. return err
  2973. }
  2974. }
  2975. }
  2976. return nil
  2977. }
  2978. func (p *MemoryProvider) restoreAdmins(dump *BackupData) error {
  2979. for idx := range dump.Admins {
  2980. admin := dump.Admins[idx]
  2981. admin.Username = config.convertName(admin.Username)
  2982. a, err := p.adminExists(admin.Username)
  2983. if err == nil {
  2984. admin.ID = a.ID
  2985. err = UpdateAdmin(&admin, ActionExecutorSystem, "", "")
  2986. if err != nil {
  2987. providerLog(logger.LevelError, "error updating admin %q: %v", admin.Username, err)
  2988. return err
  2989. }
  2990. } else {
  2991. err = AddAdmin(&admin, ActionExecutorSystem, "", "")
  2992. if err != nil {
  2993. providerLog(logger.LevelError, "error adding admin %q: %v", admin.Username, err)
  2994. return err
  2995. }
  2996. }
  2997. }
  2998. return nil
  2999. }
  3000. func (p *MemoryProvider) restoreConfigs(dump *BackupData) error {
  3001. if dump.Configs != nil && dump.Configs.UpdatedAt > 0 {
  3002. return UpdateConfigs(dump.Configs, ActionExecutorSystem, "", "")
  3003. }
  3004. return nil
  3005. }
  3006. func (p *MemoryProvider) restoreIPListEntries(dump *BackupData) error {
  3007. for idx := range dump.IPLists {
  3008. entry := dump.IPLists[idx]
  3009. _, err := p.ipListEntryExists(entry.IPOrNet, entry.Type)
  3010. if err == nil {
  3011. err = UpdateIPListEntry(&entry, ActionExecutorSystem, "", "")
  3012. if err != nil {
  3013. providerLog(logger.LevelError, "error updating IP list entry %q: %v", entry.getName(), err)
  3014. return err
  3015. }
  3016. } else {
  3017. err = AddIPListEntry(&entry, ActionExecutorSystem, "", "")
  3018. if err != nil {
  3019. providerLog(logger.LevelError, "error adding IP list entry %q: %v", entry.getName(), err)
  3020. return err
  3021. }
  3022. }
  3023. }
  3024. return nil
  3025. }
  3026. func (p *MemoryProvider) restoreRoles(dump *BackupData) error {
  3027. for idx := range dump.Roles {
  3028. role := dump.Roles[idx]
  3029. role.Name = config.convertName(role.Name)
  3030. r, err := p.roleExists(role.Name)
  3031. if err == nil {
  3032. role.ID = r.ID
  3033. err = UpdateRole(&role, ActionExecutorSystem, "", "")
  3034. if err != nil {
  3035. providerLog(logger.LevelError, "error updating role %q: %v", role.Name, err)
  3036. return err
  3037. }
  3038. } else {
  3039. role.Admins = nil
  3040. role.Users = nil
  3041. err = AddRole(&role, ActionExecutorSystem, "", "")
  3042. if err != nil {
  3043. providerLog(logger.LevelError, "error adding role %q: %v", role.Name, err)
  3044. return err
  3045. }
  3046. }
  3047. }
  3048. return nil
  3049. }
  3050. func (p *MemoryProvider) restoreGroups(dump *BackupData) error {
  3051. for idx := range dump.Groups {
  3052. group := dump.Groups[idx]
  3053. group.Name = config.convertName(group.Name)
  3054. g, err := p.groupExists(group.Name)
  3055. if err == nil {
  3056. group.ID = g.ID
  3057. err = UpdateGroup(&group, g.Users, ActionExecutorSystem, "", "")
  3058. if err != nil {
  3059. providerLog(logger.LevelError, "error updating group %q: %v", group.Name, err)
  3060. return err
  3061. }
  3062. } else {
  3063. group.Users = nil
  3064. err = AddGroup(&group, ActionExecutorSystem, "", "")
  3065. if err != nil {
  3066. providerLog(logger.LevelError, "error adding group %q: %v", group.Name, err)
  3067. return err
  3068. }
  3069. }
  3070. }
  3071. return nil
  3072. }
  3073. func (p *MemoryProvider) restoreFolders(dump *BackupData) error {
  3074. for idx := range dump.Folders {
  3075. folder := dump.Folders[idx]
  3076. folder.Name = config.convertName(folder.Name)
  3077. f, err := p.getFolderByName(folder.Name)
  3078. if err == nil {
  3079. folder.ID = f.ID
  3080. err = UpdateFolder(&folder, f.Users, f.Groups, ActionExecutorSystem, "", "")
  3081. if err != nil {
  3082. providerLog(logger.LevelError, "error updating folder %q: %v", folder.Name, err)
  3083. return err
  3084. }
  3085. } else {
  3086. folder.Users = nil
  3087. err = AddFolder(&folder, ActionExecutorSystem, "", "")
  3088. if err != nil {
  3089. providerLog(logger.LevelError, "error adding folder %q: %v", folder.Name, err)
  3090. return err
  3091. }
  3092. }
  3093. }
  3094. return nil
  3095. }
  3096. func (p *MemoryProvider) restoreUsers(dump *BackupData) error {
  3097. for idx := range dump.Users {
  3098. user := dump.Users[idx]
  3099. user.Username = config.convertName(user.Username)
  3100. u, err := p.userExists(user.Username, "")
  3101. if err == nil {
  3102. user.ID = u.ID
  3103. err = UpdateUser(&user, ActionExecutorSystem, "", "")
  3104. if err != nil {
  3105. providerLog(logger.LevelError, "error updating user %q: %v", user.Username, err)
  3106. return err
  3107. }
  3108. } else {
  3109. err = AddUser(&user, ActionExecutorSystem, "", "")
  3110. if err != nil {
  3111. providerLog(logger.LevelError, "error adding user %q: %v", user.Username, err)
  3112. return err
  3113. }
  3114. }
  3115. }
  3116. return nil
  3117. }
  3118. // initializeDatabase does nothing, no initilization is needed for memory provider
  3119. func (p *MemoryProvider) initializeDatabase() error {
  3120. return ErrNoInitRequired
  3121. }
  3122. func (p *MemoryProvider) migrateDatabase() error {
  3123. return ErrNoInitRequired
  3124. }
  3125. func (p *MemoryProvider) revertDatabase(_ int) error {
  3126. return errors.New("memory provider does not store data, revert not possible")
  3127. }
  3128. func (p *MemoryProvider) resetDatabase() error {
  3129. return errors.New("memory provider does not store data, reset not possible")
  3130. }