sftpfs.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562
  1. package vfs
  2. import (
  3. "errors"
  4. "fmt"
  5. "io"
  6. "net"
  7. "net/http"
  8. "os"
  9. "path"
  10. "path/filepath"
  11. "strings"
  12. "time"
  13. "github.com/eikenb/pipeat"
  14. "github.com/pkg/sftp"
  15. "github.com/rs/xid"
  16. "golang.org/x/crypto/ssh"
  17. "github.com/drakkan/sftpgo/kms"
  18. "github.com/drakkan/sftpgo/logger"
  19. "github.com/drakkan/sftpgo/utils"
  20. "github.com/drakkan/sftpgo/version"
  21. )
  22. const (
  23. // osFsName is the name for the local Fs implementation
  24. sftpFsName = "sftpfs"
  25. )
  26. // SFTPFsConfig defines the configuration for SFTP based filesystem
  27. type SFTPFsConfig struct {
  28. Endpoint string `json:"endpoint,omitempty"`
  29. Username string `json:"username,omitempty"`
  30. Password *kms.Secret `json:"password,omitempty"`
  31. PrivateKey *kms.Secret `json:"private_key,omitempty"`
  32. Fingerprints []string `json:"fingerprints,omitempty"`
  33. // Prefix is the path prefix to strip from SFTP resource paths.
  34. Prefix string `json:"prefix,omitempty"`
  35. }
  36. func (c *SFTPFsConfig) setEmptyCredentialsIfNil() {
  37. if c.Password == nil {
  38. c.Password = kms.NewEmptySecret()
  39. }
  40. if c.PrivateKey == nil {
  41. c.PrivateKey = kms.NewEmptySecret()
  42. }
  43. }
  44. // Validate returns an error if the configuration is not valid
  45. func (c *SFTPFsConfig) Validate() error {
  46. c.setEmptyCredentialsIfNil()
  47. if c.Endpoint == "" {
  48. return errors.New("endpoint cannot be empty")
  49. }
  50. if c.Username == "" {
  51. return errors.New("username cannot be empty")
  52. }
  53. if c.Password.IsEmpty() && c.PrivateKey.IsEmpty() {
  54. return errors.New("credentials cannot be empty")
  55. }
  56. if c.Password.IsEncrypted() && !c.Password.IsValid() {
  57. return errors.New("invalid encrypted password")
  58. }
  59. if !c.Password.IsEmpty() && !c.Password.IsValidInput() {
  60. return errors.New("invalid password")
  61. }
  62. if c.PrivateKey.IsEncrypted() && !c.PrivateKey.IsValid() {
  63. return errors.New("invalid encrypted private key")
  64. }
  65. if !c.PrivateKey.IsEmpty() && !c.PrivateKey.IsValidInput() {
  66. return errors.New("invalid private key")
  67. }
  68. if c.Prefix != "" {
  69. c.Prefix = utils.CleanPath(c.Prefix)
  70. } else {
  71. c.Prefix = "/"
  72. }
  73. return nil
  74. }
  75. // EncryptCredentials encrypts password and/or private key if they are in plain text
  76. func (c *SFTPFsConfig) EncryptCredentials(additionalData string) error {
  77. if c.Password.IsPlain() {
  78. c.Password.SetAdditionalData(additionalData)
  79. if err := c.Password.Encrypt(); err != nil {
  80. return err
  81. }
  82. }
  83. if c.PrivateKey.IsPlain() {
  84. c.PrivateKey.SetAdditionalData(additionalData)
  85. if err := c.PrivateKey.Encrypt(); err != nil {
  86. return err
  87. }
  88. }
  89. return nil
  90. }
  91. // SFTPFs is a Fs implementation for SFTP backends
  92. type SFTPFs struct {
  93. connectionID string
  94. config *SFTPFsConfig
  95. sshClient *ssh.Client
  96. sftpClient *sftp.Client
  97. err chan error
  98. }
  99. // NewSFTPFs returns an SFTPFa object that allows to interact with an SFTP server
  100. func NewSFTPFs(connectionID string, config SFTPFsConfig) (Fs, error) {
  101. if err := config.Validate(); err != nil {
  102. return nil, err
  103. }
  104. if !config.Password.IsEmpty() && config.Password.IsEncrypted() {
  105. if err := config.Password.Decrypt(); err != nil {
  106. return nil, err
  107. }
  108. }
  109. if !config.PrivateKey.IsEmpty() && config.PrivateKey.IsEncrypted() {
  110. if err := config.PrivateKey.Decrypt(); err != nil {
  111. return nil, err
  112. }
  113. }
  114. sftpFs := &SFTPFs{
  115. connectionID: connectionID,
  116. config: &config,
  117. err: make(chan error, 1),
  118. }
  119. err := sftpFs.createConnection()
  120. return sftpFs, err
  121. }
  122. // Name returns the name for the Fs implementation
  123. func (fs *SFTPFs) Name() string {
  124. return fmt.Sprintf("%v %#v", sftpFsName, fs.config.Endpoint)
  125. }
  126. // ConnectionID returns the connection ID associated to this Fs implementation
  127. func (fs *SFTPFs) ConnectionID() string {
  128. return fs.connectionID
  129. }
  130. // Stat returns a FileInfo describing the named file
  131. func (fs *SFTPFs) Stat(name string) (os.FileInfo, error) {
  132. if err := fs.checkConnection(); err != nil {
  133. return nil, err
  134. }
  135. return fs.sftpClient.Stat(name)
  136. }
  137. // Lstat returns a FileInfo describing the named file
  138. func (fs *SFTPFs) Lstat(name string) (os.FileInfo, error) {
  139. if err := fs.checkConnection(); err != nil {
  140. return nil, err
  141. }
  142. return fs.sftpClient.Lstat(name)
  143. }
  144. // Open opens the named file for reading
  145. func (fs *SFTPFs) Open(name string, offset int64) (File, *pipeat.PipeReaderAt, func(), error) {
  146. if err := fs.checkConnection(); err != nil {
  147. return nil, nil, nil, err
  148. }
  149. f, err := fs.sftpClient.Open(name)
  150. return f, nil, nil, err
  151. }
  152. // Create creates or opens the named file for writing
  153. func (fs *SFTPFs) Create(name string, flag int) (File, *PipeWriter, func(), error) {
  154. err := fs.checkConnection()
  155. if err != nil {
  156. return nil, nil, nil, err
  157. }
  158. var f File
  159. if flag == 0 {
  160. f, err = fs.sftpClient.Create(name)
  161. } else {
  162. f, err = fs.sftpClient.OpenFile(name, flag)
  163. }
  164. return f, nil, nil, err
  165. }
  166. // Rename renames (moves) source to target.
  167. func (fs *SFTPFs) Rename(source, target string) error {
  168. if err := fs.checkConnection(); err != nil {
  169. return err
  170. }
  171. return fs.sftpClient.Rename(source, target)
  172. }
  173. // Remove removes the named file or (empty) directory.
  174. func (fs *SFTPFs) Remove(name string, isDir bool) error {
  175. if err := fs.checkConnection(); err != nil {
  176. return err
  177. }
  178. return fs.sftpClient.Remove(name)
  179. }
  180. // Mkdir creates a new directory with the specified name and default permissions
  181. func (fs *SFTPFs) Mkdir(name string) error {
  182. if err := fs.checkConnection(); err != nil {
  183. return err
  184. }
  185. return fs.sftpClient.Mkdir(name)
  186. }
  187. // Symlink creates source as a symbolic link to target.
  188. func (fs *SFTPFs) Symlink(source, target string) error {
  189. if err := fs.checkConnection(); err != nil {
  190. return err
  191. }
  192. return fs.sftpClient.Symlink(source, target)
  193. }
  194. // Readlink returns the destination of the named symbolic link
  195. func (fs *SFTPFs) Readlink(name string) (string, error) {
  196. if err := fs.checkConnection(); err != nil {
  197. return "", err
  198. }
  199. return fs.sftpClient.ReadLink(name)
  200. }
  201. // Chown changes the numeric uid and gid of the named file.
  202. func (fs *SFTPFs) Chown(name string, uid int, gid int) error {
  203. if err := fs.checkConnection(); err != nil {
  204. return err
  205. }
  206. return fs.sftpClient.Chown(name, uid, gid)
  207. }
  208. // Chmod changes the mode of the named file to mode.
  209. func (fs *SFTPFs) Chmod(name string, mode os.FileMode) error {
  210. if err := fs.checkConnection(); err != nil {
  211. return err
  212. }
  213. return fs.sftpClient.Chmod(name, mode)
  214. }
  215. // Chtimes changes the access and modification times of the named file.
  216. func (fs *SFTPFs) Chtimes(name string, atime, mtime time.Time) error {
  217. if err := fs.checkConnection(); err != nil {
  218. return err
  219. }
  220. return fs.sftpClient.Chtimes(name, atime, mtime)
  221. }
  222. // Truncate changes the size of the named file.
  223. func (fs *SFTPFs) Truncate(name string, size int64) error {
  224. if err := fs.checkConnection(); err != nil {
  225. return err
  226. }
  227. return fs.sftpClient.Truncate(name, size)
  228. }
  229. // ReadDir reads the directory named by dirname and returns
  230. // a list of directory entries.
  231. func (fs *SFTPFs) ReadDir(dirname string) ([]os.FileInfo, error) {
  232. if err := fs.checkConnection(); err != nil {
  233. return nil, err
  234. }
  235. return fs.sftpClient.ReadDir(dirname)
  236. }
  237. // IsUploadResumeSupported returns true if upload resume is supported.
  238. func (*SFTPFs) IsUploadResumeSupported() bool {
  239. return true
  240. }
  241. // IsAtomicUploadSupported returns true if atomic upload is supported.
  242. func (*SFTPFs) IsAtomicUploadSupported() bool {
  243. return true
  244. }
  245. // IsNotExist returns a boolean indicating whether the error is known to
  246. // report that a file or directory does not exist
  247. func (*SFTPFs) IsNotExist(err error) bool {
  248. return os.IsNotExist(err)
  249. }
  250. // IsPermission returns a boolean indicating whether the error is known to
  251. // report that permission is denied.
  252. func (*SFTPFs) IsPermission(err error) bool {
  253. return os.IsPermission(err)
  254. }
  255. // IsNotSupported returns true if the error indicate an unsupported operation
  256. func (*SFTPFs) IsNotSupported(err error) bool {
  257. if err == nil {
  258. return false
  259. }
  260. return err == ErrVfsUnsupported
  261. }
  262. // CheckRootPath creates the specified local root directory if it does not exists
  263. func (fs *SFTPFs) CheckRootPath(username string, uid int, gid int) bool {
  264. return true
  265. }
  266. // ScanRootDirContents returns the number of files contained in a directory and
  267. // their size
  268. func (fs *SFTPFs) ScanRootDirContents() (int, int64, error) {
  269. return fs.GetDirSize(fs.config.Prefix)
  270. }
  271. // GetAtomicUploadPath returns the path to use for an atomic upload
  272. func (*SFTPFs) GetAtomicUploadPath(name string) string {
  273. dir := path.Dir(name)
  274. guid := xid.New().String()
  275. return path.Join(dir, ".sftpgo-upload."+guid+"."+path.Base(name))
  276. }
  277. // GetRelativePath returns the path for a file relative to the sftp prefix if any.
  278. // This is the path as seen by SFTPGo users
  279. func (fs *SFTPFs) GetRelativePath(name string) string {
  280. rel := path.Clean(name)
  281. if rel == "." {
  282. rel = ""
  283. }
  284. if !path.IsAbs(rel) {
  285. return "/" + rel
  286. }
  287. if fs.config.Prefix != "/" {
  288. if !strings.HasPrefix(rel, fs.config.Prefix) {
  289. rel = "/"
  290. }
  291. rel = path.Clean("/" + strings.TrimPrefix(rel, fs.config.Prefix))
  292. }
  293. return rel
  294. }
  295. // Walk walks the file tree rooted at root, calling walkFn for each file or
  296. // directory in the tree, including root
  297. func (fs *SFTPFs) Walk(root string, walkFn filepath.WalkFunc) error {
  298. if err := fs.checkConnection(); err != nil {
  299. return err
  300. }
  301. walker := fs.sftpClient.Walk(root)
  302. for walker.Step() {
  303. err := walker.Err()
  304. if err != nil {
  305. return err
  306. }
  307. err = walkFn(walker.Path(), walker.Stat(), err)
  308. if err != nil {
  309. return err
  310. }
  311. }
  312. return nil
  313. }
  314. // Join joins any number of path elements into a single path
  315. func (*SFTPFs) Join(elem ...string) string {
  316. return path.Join(elem...)
  317. }
  318. // HasVirtualFolders returns true if folders are emulated
  319. func (*SFTPFs) HasVirtualFolders() bool {
  320. return false
  321. }
  322. // ResolvePath returns the matching filesystem path for the specified virtual path
  323. func (fs *SFTPFs) ResolvePath(virtualPath string) (string, error) {
  324. if !path.IsAbs(virtualPath) {
  325. virtualPath = path.Clean("/" + virtualPath)
  326. }
  327. fsPath := fs.Join(fs.config.Prefix, virtualPath)
  328. if fs.config.Prefix != "/" && fsPath != "/" {
  329. // we need to check if this path is a symlink outside the given prefix
  330. // or a file/dir inside a dir symlinked outside the prefix
  331. if err := fs.checkConnection(); err != nil {
  332. return "", err
  333. }
  334. var validatedPath string
  335. var err error
  336. validatedPath, err = fs.getRealPath(fsPath)
  337. if err != nil && !os.IsNotExist(err) {
  338. fsLog(fs, logger.LevelWarn, "Invalid path resolution, original path %v resolved %#v err: %v",
  339. virtualPath, fsPath, err)
  340. return "", err
  341. } else if os.IsNotExist(err) {
  342. for os.IsNotExist(err) {
  343. validatedPath = path.Dir(validatedPath)
  344. if validatedPath == "/" {
  345. err = nil
  346. break
  347. }
  348. validatedPath, err = fs.getRealPath(validatedPath)
  349. }
  350. if err != nil {
  351. fsLog(fs, logger.LevelWarn, "Invalid path resolution, dir %#v original path %#v resolved %#v err: %v",
  352. validatedPath, virtualPath, fsPath, err)
  353. return "", err
  354. }
  355. }
  356. if err := fs.isSubDir(validatedPath); err != nil {
  357. fsLog(fs, logger.LevelWarn, "Invalid path resolution, dir %#v original path %#v resolved %#v err: %v",
  358. validatedPath, virtualPath, fsPath, err)
  359. return "", err
  360. }
  361. }
  362. return fsPath, nil
  363. }
  364. // getRealPath returns the real remote path trying to resolve symbolic links if any
  365. func (fs *SFTPFs) getRealPath(name string) (string, error) {
  366. info, err := fs.sftpClient.Lstat(name)
  367. if err != nil {
  368. return name, err
  369. }
  370. if info.Mode()&os.ModeSymlink != 0 {
  371. return fs.sftpClient.ReadLink(name)
  372. }
  373. return name, err
  374. }
  375. func (fs *SFTPFs) isSubDir(name string) error {
  376. if name == fs.config.Prefix {
  377. return nil
  378. }
  379. if len(name) < len(fs.config.Prefix) {
  380. err := fmt.Errorf("path %#v is not inside: %#v", name, fs.config.Prefix)
  381. return err
  382. }
  383. if !strings.HasPrefix(name, fs.config.Prefix+"/") {
  384. err := fmt.Errorf("path %#v is not inside: %#v", name, fs.config.Prefix)
  385. return err
  386. }
  387. return nil
  388. }
  389. // GetDirSize returns the number of files and the size for a folder
  390. // including any subfolders
  391. func (fs *SFTPFs) GetDirSize(dirname string) (int, int64, error) {
  392. numFiles := 0
  393. size := int64(0)
  394. if err := fs.checkConnection(); err != nil {
  395. return numFiles, size, err
  396. }
  397. isDir, err := IsDirectory(fs, dirname)
  398. if err == nil && isDir {
  399. walker := fs.sftpClient.Walk(dirname)
  400. for walker.Step() {
  401. err := walker.Err()
  402. if err != nil {
  403. return numFiles, size, err
  404. }
  405. if walker.Stat().Mode().IsRegular() {
  406. size += walker.Stat().Size()
  407. numFiles++
  408. }
  409. }
  410. }
  411. return numFiles, size, err
  412. }
  413. // GetMimeType returns the content type
  414. func (fs *SFTPFs) GetMimeType(name string) (string, error) {
  415. if err := fs.checkConnection(); err != nil {
  416. return "", err
  417. }
  418. f, err := fs.sftpClient.OpenFile(name, os.O_RDONLY)
  419. if err != nil {
  420. return "", err
  421. }
  422. defer f.Close()
  423. var buf [512]byte
  424. n, err := io.ReadFull(f, buf[:])
  425. if err != nil && err != io.EOF && err != io.ErrUnexpectedEOF {
  426. return "", err
  427. }
  428. ctype := http.DetectContentType(buf[:n])
  429. // Rewind file.
  430. _, err = f.Seek(0, io.SeekStart)
  431. return ctype, err
  432. }
  433. // Close the connection
  434. func (fs *SFTPFs) Close() error {
  435. var sftpErr, sshErr error
  436. if fs.sftpClient != nil {
  437. sftpErr = fs.sftpClient.Close()
  438. }
  439. if fs.sshClient != nil {
  440. sshErr = fs.sshClient.Close()
  441. }
  442. if sftpErr != nil {
  443. return sftpErr
  444. }
  445. return sshErr
  446. }
  447. func (fs *SFTPFs) checkConnection() error {
  448. err := fs.closed()
  449. if err == nil {
  450. return nil
  451. }
  452. return fs.createConnection()
  453. }
  454. func (fs *SFTPFs) createConnection() error {
  455. var err error
  456. clientConfig := &ssh.ClientConfig{
  457. User: fs.config.Username,
  458. HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
  459. if len(fs.config.Fingerprints) > 0 {
  460. fp := ssh.FingerprintSHA256(key)
  461. for _, provided := range fs.config.Fingerprints {
  462. if provided == fp {
  463. return nil
  464. }
  465. }
  466. return fmt.Errorf("Invalid fingerprint %#v", fp)
  467. }
  468. fsLog(fs, logger.LevelWarn, "login without host key validation, please provide at least a fingerprint!")
  469. return nil
  470. },
  471. ClientVersion: fmt.Sprintf("SSH-2.0-SFTPGo_%v", version.Get().Version),
  472. }
  473. if fs.config.PrivateKey.GetPayload() != "" {
  474. signer, err := ssh.ParsePrivateKey([]byte(fs.config.PrivateKey.GetPayload()))
  475. if err != nil {
  476. fs.err <- err
  477. return err
  478. }
  479. clientConfig.Auth = append(clientConfig.Auth, ssh.PublicKeys(signer))
  480. }
  481. if fs.config.Password.GetPayload() != "" {
  482. clientConfig.Auth = append(clientConfig.Auth, ssh.Password(fs.config.Password.GetPayload()))
  483. }
  484. fs.sshClient, err = ssh.Dial("tcp", fs.config.Endpoint, clientConfig)
  485. if err != nil {
  486. fs.err <- err
  487. return err
  488. }
  489. fs.sftpClient, err = sftp.NewClient(fs.sshClient)
  490. if err != nil {
  491. fs.sshClient.Close()
  492. fs.err <- err
  493. return err
  494. }
  495. go fs.wait()
  496. return nil
  497. }
  498. func (fs *SFTPFs) wait() {
  499. // we wait on the sftp client otherwise if the channel is closed but not the connection
  500. // we don't detect the event.
  501. fs.err <- fs.sftpClient.Wait()
  502. fsLog(fs, logger.LevelDebug, "sftp channel closed")
  503. if fs.sshClient != nil {
  504. fs.sshClient.Close()
  505. }
  506. }
  507. func (fs *SFTPFs) closed() error {
  508. select {
  509. case err := <-fs.err:
  510. return err
  511. default:
  512. return nil
  513. }
  514. }