handler.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429
  1. package ftpd
  2. import (
  3. "errors"
  4. "io"
  5. "os"
  6. "path"
  7. "time"
  8. ftpserver "github.com/fclairamb/ftpserverlib"
  9. "github.com/spf13/afero"
  10. "github.com/drakkan/sftpgo/common"
  11. "github.com/drakkan/sftpgo/dataprovider"
  12. "github.com/drakkan/sftpgo/logger"
  13. "github.com/drakkan/sftpgo/vfs"
  14. )
  15. var (
  16. errNotImplemented = errors.New("Not implemented")
  17. )
  18. // Connection details for an FTP connection.
  19. // It implements common.ActiveConnection and ftpserver.ClientDriver interfaces
  20. type Connection struct {
  21. *common.BaseConnection
  22. clientContext ftpserver.ClientContext
  23. }
  24. // GetClientVersion returns the connected client's version.
  25. // It returns "Unknown" if the client does not advertise its
  26. // version
  27. func (c *Connection) GetClientVersion() string {
  28. version := c.clientContext.GetClientVersion()
  29. if len(version) > 0 {
  30. return version
  31. }
  32. return "Unknown"
  33. }
  34. // GetRemoteAddress return the connected client's address
  35. func (c *Connection) GetRemoteAddress() string {
  36. return c.clientContext.RemoteAddr().String()
  37. }
  38. // Disconnect disconnects the client
  39. func (c *Connection) Disconnect() error {
  40. return c.clientContext.Close(ftpserver.StatusServiceNotAvailable, "connection closed")
  41. }
  42. // GetCommand returns an empty string
  43. func (c *Connection) GetCommand() string {
  44. return ""
  45. }
  46. // Create is not implemented we use ClientDriverExtentionFileTransfer
  47. func (c *Connection) Create(name string) (afero.File, error) {
  48. return nil, errNotImplemented
  49. }
  50. // Mkdir creates a directory using the connection filesystem
  51. func (c *Connection) Mkdir(name string, perm os.FileMode) error {
  52. c.UpdateLastActivity()
  53. p, err := c.Fs.ResolvePath(name)
  54. if err != nil {
  55. return c.GetFsError(err)
  56. }
  57. return c.CreateDir(p, name)
  58. }
  59. // MkdirAll is not implemented, we don't need it
  60. func (c *Connection) MkdirAll(path string, perm os.FileMode) error {
  61. return errNotImplemented
  62. }
  63. // Open is not implemented we use ClientDriverExtentionFileTransfer and ClientDriverExtensionFileList
  64. func (c *Connection) Open(name string) (afero.File, error) {
  65. return nil, errNotImplemented
  66. }
  67. // OpenFile is not implemented we use ClientDriverExtentionFileTransfer
  68. func (c *Connection) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {
  69. return nil, errNotImplemented
  70. }
  71. // Remove removes a file.
  72. // We implements ClientDriverExtensionRemoveDir for directories
  73. func (c *Connection) Remove(name string) error {
  74. c.UpdateLastActivity()
  75. p, err := c.Fs.ResolvePath(name)
  76. if err != nil {
  77. return c.GetFsError(err)
  78. }
  79. var fi os.FileInfo
  80. if fi, err = c.Fs.Lstat(p); err != nil {
  81. c.Log(logger.LevelWarn, "failed to remove a file %#v: stat error: %+v", p, err)
  82. return c.GetFsError(err)
  83. }
  84. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  85. c.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  86. return c.GetGenericError(nil)
  87. }
  88. return c.RemoveFile(p, name, fi)
  89. }
  90. // RemoveAll is not implemented, we don't need it
  91. func (c *Connection) RemoveAll(path string) error {
  92. return errNotImplemented
  93. }
  94. // Rename renames a file or a directory
  95. func (c *Connection) Rename(oldname, newname string) error {
  96. c.UpdateLastActivity()
  97. p, err := c.Fs.ResolvePath(oldname)
  98. if err != nil {
  99. return c.GetFsError(err)
  100. }
  101. t, err := c.Fs.ResolvePath(newname)
  102. if err != nil {
  103. return c.GetFsError(err)
  104. }
  105. if err = c.BaseConnection.Rename(p, t, oldname, newname); err != nil {
  106. return err
  107. }
  108. vfs.SetPathPermissions(c.Fs, t, c.User.GetUID(), c.User.GetGID())
  109. return nil
  110. }
  111. // Stat returns a FileInfo describing the named file/directory, or an error,
  112. // if any happens
  113. func (c *Connection) Stat(name string) (os.FileInfo, error) {
  114. c.UpdateLastActivity()
  115. if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) {
  116. return nil, c.GetPermissionDeniedError()
  117. }
  118. p, err := c.Fs.ResolvePath(name)
  119. if err != nil {
  120. return nil, c.GetFsError(err)
  121. }
  122. fi, err := c.DoStat(p, 0)
  123. if err != nil {
  124. c.Log(logger.LevelDebug, "error running stat on path %#v: %+v", p, err)
  125. return nil, c.GetFsError(err)
  126. }
  127. return fi, nil
  128. }
  129. // Name returns the name of this connection
  130. func (c *Connection) Name() string {
  131. return c.GetID()
  132. }
  133. // Chmod changes the mode of the named file/directory
  134. func (c *Connection) Chmod(name string, mode os.FileMode) error {
  135. c.UpdateLastActivity()
  136. p, err := c.Fs.ResolvePath(name)
  137. if err != nil {
  138. return c.GetFsError(err)
  139. }
  140. attrs := common.StatAttributes{
  141. Flags: common.StatAttrPerms,
  142. Mode: mode,
  143. }
  144. return c.SetStat(p, name, &attrs)
  145. }
  146. // Chtimes changes the access and modification times of the named file
  147. func (c *Connection) Chtimes(name string, atime time.Time, mtime time.Time) error {
  148. c.UpdateLastActivity()
  149. p, err := c.Fs.ResolvePath(name)
  150. if err != nil {
  151. return c.GetFsError(err)
  152. }
  153. attrs := common.StatAttributes{
  154. Flags: common.StatAttrTimes,
  155. Atime: atime,
  156. Mtime: mtime,
  157. }
  158. return c.SetStat(p, name, &attrs)
  159. }
  160. // AllocateSpace implements ClientDriverExtensionAllocate
  161. func (c *Connection) AllocateSpace(size int) error {
  162. c.UpdateLastActivity()
  163. // check the max allowed file size first
  164. if c.User.Filters.MaxUploadFileSize > 0 && int64(size) > c.User.Filters.MaxUploadFileSize {
  165. return common.ErrQuotaExceeded
  166. }
  167. // we don't have a path here so we check home dir and any virtual folders
  168. // we return no error if there is space in any folder
  169. folders := []string{"/"}
  170. for _, v := range c.User.VirtualFolders {
  171. // the space is checked for the parent folder
  172. folders = append(folders, path.Join(v.VirtualPath, "fakefile.txt"))
  173. }
  174. for _, f := range folders {
  175. quotaResult := c.HasSpace(false, f)
  176. if quotaResult.HasSpace {
  177. if quotaResult.QuotaSize == 0 {
  178. // unlimited size is allowed
  179. return nil
  180. }
  181. if quotaResult.GetRemainingSize() > int64(size) {
  182. return nil
  183. }
  184. }
  185. }
  186. return common.ErrQuotaExceeded
  187. }
  188. // RemoveDir implements ClientDriverExtensionRemoveDir
  189. func (c *Connection) RemoveDir(name string) error {
  190. c.UpdateLastActivity()
  191. p, err := c.Fs.ResolvePath(name)
  192. if err != nil {
  193. return c.GetFsError(err)
  194. }
  195. return c.BaseConnection.RemoveDir(p, name)
  196. }
  197. // Symlink implements ClientDriverExtensionSymlink
  198. func (c *Connection) Symlink(oldname, newname string) error {
  199. c.UpdateLastActivity()
  200. p, err := c.Fs.ResolvePath(oldname)
  201. if err != nil {
  202. return c.GetFsError(err)
  203. }
  204. t, err := c.Fs.ResolvePath(newname)
  205. if err != nil {
  206. return c.GetFsError(err)
  207. }
  208. return c.BaseConnection.CreateSymlink(p, t, oldname, newname)
  209. }
  210. // ReadDir implements ClientDriverExtensionFilelist
  211. func (c *Connection) ReadDir(name string) ([]os.FileInfo, error) {
  212. c.UpdateLastActivity()
  213. p, err := c.Fs.ResolvePath(name)
  214. if err != nil {
  215. return nil, c.GetFsError(err)
  216. }
  217. return c.ListDir(p, name)
  218. }
  219. // GetHandle implements ClientDriverExtentionFileTransfer
  220. func (c *Connection) GetHandle(name string, flags int, offset int64) (ftpserver.FileTransfer, error) {
  221. c.UpdateLastActivity()
  222. p, err := c.Fs.ResolvePath(name)
  223. if err != nil {
  224. return nil, c.GetFsError(err)
  225. }
  226. if flags&os.O_WRONLY != 0 {
  227. return c.uploadFile(p, name, flags)
  228. }
  229. return c.downloadFile(p, name, offset)
  230. }
  231. func (c *Connection) downloadFile(fsPath, ftpPath string, offset int64) (ftpserver.FileTransfer, error) {
  232. if !c.User.HasPerm(dataprovider.PermDownload, path.Dir(ftpPath)) {
  233. return nil, c.GetPermissionDeniedError()
  234. }
  235. if !c.User.IsFileAllowed(ftpPath) {
  236. c.Log(logger.LevelWarn, "reading file %#v is not allowed", ftpPath)
  237. return nil, c.GetPermissionDeniedError()
  238. }
  239. file, r, cancelFn, err := c.Fs.Open(fsPath, offset)
  240. if err != nil {
  241. c.Log(logger.LevelWarn, "could not open file %#v for reading: %+v", fsPath, err)
  242. return nil, c.GetFsError(err)
  243. }
  244. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, ftpPath, common.TransferDownload,
  245. 0, 0, 0, false, c.Fs)
  246. t := newTransfer(baseTransfer, nil, r, offset)
  247. return t, nil
  248. }
  249. func (c *Connection) uploadFile(fsPath, ftpPath string, flags int) (ftpserver.FileTransfer, error) {
  250. if !c.User.IsFileAllowed(ftpPath) {
  251. c.Log(logger.LevelWarn, "writing file %#v is not allowed", ftpPath)
  252. return nil, c.GetPermissionDeniedError()
  253. }
  254. filePath := fsPath
  255. if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() {
  256. filePath = c.Fs.GetAtomicUploadPath(fsPath)
  257. }
  258. stat, statErr := c.Fs.Lstat(fsPath)
  259. if (statErr == nil && stat.Mode()&os.ModeSymlink != 0) || c.Fs.IsNotExist(statErr) {
  260. if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(ftpPath)) {
  261. return nil, c.GetPermissionDeniedError()
  262. }
  263. return c.handleFTPUploadToNewFile(fsPath, filePath, ftpPath)
  264. }
  265. if statErr != nil {
  266. c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr)
  267. return nil, c.GetFsError(statErr)
  268. }
  269. // This happen if we upload a file that has the same name of an existing directory
  270. if stat.IsDir() {
  271. c.Log(logger.LevelWarn, "attempted to open a directory for writing to: %#v", fsPath)
  272. return nil, c.GetOpUnsupportedError()
  273. }
  274. if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(ftpPath)) {
  275. return nil, c.GetPermissionDeniedError()
  276. }
  277. return c.handleFTPUploadToExistingFile(flags, fsPath, filePath, stat.Size(), ftpPath)
  278. }
  279. func (c *Connection) handleFTPUploadToNewFile(resolvedPath, filePath, requestPath string) (ftpserver.FileTransfer, error) {
  280. quotaResult := c.HasSpace(true, requestPath)
  281. if !quotaResult.HasSpace {
  282. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  283. return nil, common.ErrQuotaExceeded
  284. }
  285. file, w, cancelFn, err := c.Fs.Create(filePath, 0)
  286. if err != nil {
  287. c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err)
  288. return nil, c.GetFsError(err)
  289. }
  290. vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID())
  291. // we can get an error only for resume
  292. maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, 0)
  293. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  294. common.TransferUpload, 0, 0, maxWriteSize, true, c.Fs)
  295. t := newTransfer(baseTransfer, w, nil, 0)
  296. return t, nil
  297. }
  298. func (c *Connection) handleFTPUploadToExistingFile(flags int, resolvedPath, filePath string, fileSize int64,
  299. requestPath string) (ftpserver.FileTransfer, error) {
  300. var err error
  301. quotaResult := c.HasSpace(false, requestPath)
  302. if !quotaResult.HasSpace {
  303. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  304. return nil, common.ErrQuotaExceeded
  305. }
  306. minWriteOffset := int64(0)
  307. // ftpserverlib set os.O_WRONLY | os.O_APPEND for APPE
  308. // and os.O_WRONLY | os.O_CREATE for REST. If is not APPE
  309. // and REST = 0 then os.O_WRONLY | os.O_CREATE | os.O_TRUNC
  310. // so if we don't have O_TRUC is a resume
  311. isResume := flags&os.O_TRUNC == 0
  312. // if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace
  313. // will return false in this case and we deny the upload before
  314. maxWriteSize, err := c.GetMaxWriteSize(quotaResult, isResume, fileSize)
  315. if err != nil {
  316. c.Log(logger.LevelDebug, "unable to get max write size: %v", err)
  317. return nil, err
  318. }
  319. if common.Config.IsAtomicUploadEnabled() && c.Fs.IsAtomicUploadSupported() {
  320. err = c.Fs.Rename(resolvedPath, filePath)
  321. if err != nil {
  322. c.Log(logger.LevelWarn, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v",
  323. resolvedPath, filePath, err)
  324. return nil, c.GetFsError(err)
  325. }
  326. }
  327. file, w, cancelFn, err := c.Fs.Create(filePath, flags)
  328. if err != nil {
  329. c.Log(logger.LevelWarn, "error opening existing file, flags: %v, source: %#v, err: %+v", flags, filePath, err)
  330. return nil, c.GetFsError(err)
  331. }
  332. initialSize := int64(0)
  333. if isResume {
  334. c.Log(logger.LevelDebug, "upload resume requested, file path: %#v initial size: %v", filePath, fileSize)
  335. minWriteOffset = fileSize
  336. initialSize = fileSize
  337. if vfs.IsSFTPFs(c.Fs) {
  338. // we need this since we don't allow resume with wrong offset, we should fix this in pkg/sftp
  339. file.Seek(initialSize, io.SeekStart) //nolint:errcheck // for sftp seek cannot file, it simply set the offset
  340. }
  341. } else {
  342. if vfs.IsLocalOrSFTPFs(c.Fs) {
  343. vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath))
  344. if err == nil {
  345. dataprovider.UpdateVirtualFolderQuota(vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck
  346. if vfolder.IsIncludedInUserQuota() {
  347. dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck
  348. }
  349. } else {
  350. dataprovider.UpdateUserQuota(c.User, 0, -fileSize, false) //nolint:errcheck
  351. }
  352. } else {
  353. initialSize = fileSize
  354. }
  355. }
  356. vfs.SetPathPermissions(c.Fs, filePath, c.User.GetUID(), c.User.GetGID())
  357. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  358. common.TransferUpload, minWriteOffset, initialSize, maxWriteSize, false, c.Fs)
  359. t := newTransfer(baseTransfer, w, nil, 0)
  360. return t, nil
  361. }