sqlcommon.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300
  1. package dataprovider
  2. import (
  3. "database/sql"
  4. "encoding/json"
  5. "errors"
  6. "strings"
  7. "time"
  8. "golang.org/x/crypto/ssh"
  9. "github.com/alexedwards/argon2id"
  10. "golang.org/x/crypto/bcrypt"
  11. "github.com/drakkan/sftpgo/logger"
  12. "github.com/drakkan/sftpgo/utils"
  13. )
  14. func getUserByUsername(username string) (User, error) {
  15. var user User
  16. q := getUserByUsernameQuery()
  17. stmt, err := dbHandle.Prepare(q)
  18. if err != nil {
  19. logger.Debug(logSender, "error preparing database query %v: %v", q, err)
  20. return user, err
  21. }
  22. defer stmt.Close()
  23. row := stmt.QueryRow(username)
  24. return getUserFromDbRow(row, nil)
  25. }
  26. func sqlCommonValidateUserAndPass(username string, password string) (User, error) {
  27. var user User
  28. if len(password) == 0 {
  29. return user, errors.New("Credentials cannot be null or empty")
  30. }
  31. user, err := getUserByUsername(username)
  32. if err != nil {
  33. logger.Warn(logSender, "error authenticating user: %v, error: %v", username, err)
  34. } else {
  35. // even if the password is empty inside the database an empty user password
  36. // will be refused anyway so it cannot match, additional check to be paranoid
  37. if len(user.Password) == 0 {
  38. return user, errors.New("Credentials cannot be null or empty")
  39. }
  40. var match bool
  41. if strings.HasPrefix(user.Password, argonPwdPrefix) {
  42. match, err = argon2id.ComparePasswordAndHash(password, user.Password)
  43. if err != nil {
  44. logger.Warn(logSender, "error comparing password with argon hash: %v", err)
  45. return user, err
  46. }
  47. } else if strings.HasPrefix(user.Password, bcryptPwdPrefix) {
  48. if err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)); err != nil {
  49. logger.Warn(logSender, "error comparing password with bcrypt hash: %v", err)
  50. return user, err
  51. }
  52. match = true
  53. } else {
  54. // clear text password match
  55. match = (user.Password == password)
  56. }
  57. if !match {
  58. err = errors.New("Invalid credentials")
  59. }
  60. }
  61. return user, err
  62. }
  63. func sqlCommonValidateUserAndPubKey(username string, pubKey string) (User, error) {
  64. var user User
  65. if len(pubKey) == 0 {
  66. return user, errors.New("Credentials cannot be null or empty")
  67. }
  68. user, err := getUserByUsername(username)
  69. if err != nil {
  70. logger.Warn(logSender, "error authenticating user: %v, error: %v", username, err)
  71. return user, err
  72. }
  73. if len(user.PublicKey) == 0 {
  74. return user, errors.New("Invalid credentials")
  75. }
  76. for i, k := range user.PublicKey {
  77. storedPubKey, _, _, _, err := ssh.ParseAuthorizedKey([]byte(k))
  78. if err != nil {
  79. logger.Warn(logSender, "error parsing stored public key %d for user %v: %v", i, username, err)
  80. return user, err
  81. }
  82. if string(storedPubKey.Marshal()) == pubKey {
  83. return user, nil
  84. }
  85. }
  86. return user, errors.New("Invalid credentials")
  87. }
  88. func sqlCommonGetUserByID(ID int64) (User, error) {
  89. var user User
  90. q := getUserByIDQuery()
  91. stmt, err := dbHandle.Prepare(q)
  92. if err != nil {
  93. logger.Debug(logSender, "error preparing database query %v: %v", q, err)
  94. return user, err
  95. }
  96. defer stmt.Close()
  97. row := stmt.QueryRow(ID)
  98. return getUserFromDbRow(row, nil)
  99. }
  100. func sqlCommonUpdateQuota(username string, filesAdd int, sizeAdd int64, reset bool, p Provider) error {
  101. q := getUpdateQuotaQuery(reset)
  102. stmt, err := dbHandle.Prepare(q)
  103. if err != nil {
  104. logger.Debug(logSender, "error preparing database query %v: %v", q, err)
  105. return err
  106. }
  107. defer stmt.Close()
  108. _, err = stmt.Exec(sizeAdd, filesAdd, utils.GetTimeAsMsSinceEpoch(time.Now()), username)
  109. if err == nil {
  110. logger.Debug(logSender, "quota updated for user %v, files increment: %v size increment: %v is reset? %v",
  111. username, filesAdd, sizeAdd, reset)
  112. } else {
  113. logger.Warn(logSender, "error updating quota for username %v: %v", username, err)
  114. }
  115. return err
  116. }
  117. func sqlCommonGetUsedQuota(username string) (int, int64, error) {
  118. q := getQuotaQuery()
  119. stmt, err := dbHandle.Prepare(q)
  120. if err != nil {
  121. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  122. return 0, 0, err
  123. }
  124. defer stmt.Close()
  125. var usedFiles int
  126. var usedSize int64
  127. err = stmt.QueryRow(username).Scan(&usedSize, &usedFiles)
  128. if err != nil {
  129. logger.Warn(logSender, "error getting user quota: %v, error: %v", username, err)
  130. return 0, 0, err
  131. }
  132. return usedFiles, usedSize, err
  133. }
  134. func sqlCommonCheckUserExists(username string) (User, error) {
  135. var user User
  136. q := getUserByUsernameQuery()
  137. stmt, err := dbHandle.Prepare(q)
  138. if err != nil {
  139. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  140. return user, err
  141. }
  142. defer stmt.Close()
  143. row := stmt.QueryRow(username)
  144. return getUserFromDbRow(row, nil)
  145. }
  146. func sqlCommonAddUser(user User) error {
  147. err := validateUser(&user)
  148. if err != nil {
  149. return err
  150. }
  151. q := getAddUserQuery()
  152. stmt, err := dbHandle.Prepare(q)
  153. if err != nil {
  154. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  155. return err
  156. }
  157. defer stmt.Close()
  158. permissions, err := user.GetPermissionsAsJSON()
  159. if err != nil {
  160. return err
  161. }
  162. publicKeys, err := user.GetPublicKeysAsJSON()
  163. if err != nil {
  164. return err
  165. }
  166. _, err = stmt.Exec(user.Username, user.Password, string(publicKeys), user.HomeDir, user.UID, user.GID, user.MaxSessions, user.QuotaSize,
  167. user.QuotaFiles, string(permissions), user.UploadBandwidth, user.DownloadBandwidth)
  168. return err
  169. }
  170. func sqlCommonUpdateUser(user User) error {
  171. err := validateUser(&user)
  172. if err != nil {
  173. return err
  174. }
  175. q := getUpdateUserQuery()
  176. stmt, err := dbHandle.Prepare(q)
  177. if err != nil {
  178. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  179. return err
  180. }
  181. defer stmt.Close()
  182. permissions, err := user.GetPermissionsAsJSON()
  183. if err != nil {
  184. return err
  185. }
  186. publicKeys, err := user.GetPublicKeysAsJSON()
  187. if err != nil {
  188. return err
  189. }
  190. _, err = stmt.Exec(user.Password, string(publicKeys), user.HomeDir, user.UID, user.GID, user.MaxSessions, user.QuotaSize,
  191. user.QuotaFiles, string(permissions), user.UploadBandwidth, user.DownloadBandwidth, user.ID)
  192. return err
  193. }
  194. func sqlCommonDeleteUser(user User) error {
  195. q := getDeleteUserQuery()
  196. stmt, err := dbHandle.Prepare(q)
  197. if err != nil {
  198. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  199. return err
  200. }
  201. defer stmt.Close()
  202. _, err = stmt.Exec(user.ID)
  203. return err
  204. }
  205. func sqlCommonGetUsers(limit int, offset int, order string, username string) ([]User, error) {
  206. users := []User{}
  207. q := getUsersQuery(order, username)
  208. stmt, err := dbHandle.Prepare(q)
  209. if err != nil {
  210. logger.Warn(logSender, "error preparing database query %v: %v", q, err)
  211. return nil, err
  212. }
  213. defer stmt.Close()
  214. var rows *sql.Rows
  215. if len(username) > 0 {
  216. rows, err = stmt.Query(username, limit, offset)
  217. } else {
  218. rows, err = stmt.Query(limit, offset)
  219. }
  220. if err == nil {
  221. defer rows.Close()
  222. for rows.Next() {
  223. u, err := getUserFromDbRow(nil, rows)
  224. // hide password and public key
  225. u.Password = ""
  226. u.PublicKey = []string{}
  227. if err == nil {
  228. users = append(users, u)
  229. } else {
  230. break
  231. }
  232. }
  233. }
  234. return users, err
  235. }
  236. func getUserFromDbRow(row *sql.Row, rows *sql.Rows) (User, error) {
  237. var user User
  238. var permissions sql.NullString
  239. var password sql.NullString
  240. var publicKey sql.NullString
  241. var err error
  242. if row != nil {
  243. err = row.Scan(&user.ID, &user.Username, &password, &publicKey, &user.HomeDir, &user.UID, &user.GID, &user.MaxSessions,
  244. &user.QuotaSize, &user.QuotaFiles, &permissions, &user.UsedQuotaSize, &user.UsedQuotaFiles, &user.LastQuotaUpdate,
  245. &user.UploadBandwidth, &user.DownloadBandwidth)
  246. } else {
  247. err = rows.Scan(&user.ID, &user.Username, &password, &publicKey, &user.HomeDir, &user.UID, &user.GID, &user.MaxSessions,
  248. &user.QuotaSize, &user.QuotaFiles, &permissions, &user.UsedQuotaSize, &user.UsedQuotaFiles, &user.LastQuotaUpdate,
  249. &user.UploadBandwidth, &user.DownloadBandwidth)
  250. }
  251. if err != nil {
  252. return user, err
  253. }
  254. if password.Valid {
  255. user.Password = password.String
  256. }
  257. if publicKey.Valid {
  258. var list []string
  259. err = json.Unmarshal([]byte(publicKey.String), &list)
  260. if err == nil {
  261. user.PublicKey = list
  262. } else {
  263. // compatibility layer: initially we store public keys as string newline delimited
  264. // we need to remove this code in future
  265. user.PublicKey = strings.Split(publicKey.String, "\n")
  266. logger.Warn(logSender, "public keys loaded using compatibility mode, this will not work in future versions! "+
  267. "Number of public keys loaded: %v, username: %v", len(user.PublicKey), user.Username)
  268. }
  269. }
  270. if permissions.Valid {
  271. var list []string
  272. err = json.Unmarshal([]byte(permissions.String), &list)
  273. if err == nil {
  274. user.Permissions = list
  275. }
  276. }
  277. return user, err
  278. }