memory.go 66 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package dataprovider
  15. import (
  16. "crypto/x509"
  17. "errors"
  18. "fmt"
  19. "os"
  20. "path/filepath"
  21. "sort"
  22. "sync"
  23. "time"
  24. "github.com/drakkan/sftpgo/v2/internal/logger"
  25. "github.com/drakkan/sftpgo/v2/internal/util"
  26. "github.com/drakkan/sftpgo/v2/internal/vfs"
  27. )
  28. var (
  29. errMemoryProviderClosed = errors.New("memory provider is closed")
  30. )
  31. type memoryProviderHandle struct {
  32. // configuration file to use for loading users
  33. configFile string
  34. sync.Mutex
  35. isClosed bool
  36. // slice with ordered usernames
  37. usernames []string
  38. // map for users, username is the key
  39. users map[string]User
  40. // slice with ordered group names
  41. groupnames []string
  42. // map for group, group name is the key
  43. groups map[string]Group
  44. // map for virtual folders, folder name is the key
  45. vfolders map[string]vfs.BaseVirtualFolder
  46. // slice with ordered folder names
  47. vfoldersNames []string
  48. // map for admins, username is the key
  49. admins map[string]Admin
  50. // slice with ordered admins
  51. adminsUsernames []string
  52. // map for API keys, keyID is the key
  53. apiKeys map[string]APIKey
  54. // slice with ordered API keys KeyID
  55. apiKeysIDs []string
  56. // map for shares, shareID is the key
  57. shares map[string]Share
  58. // slice with ordered shares shareID
  59. sharesIDs []string
  60. // map for event actions, name is the key
  61. actions map[string]BaseEventAction
  62. // slice with ordered actions
  63. actionsNames []string
  64. // map for event actions, name is the key
  65. rules map[string]EventRule
  66. // slice with ordered rules
  67. rulesNames []string
  68. }
  69. // MemoryProvider defines the auth provider for a memory store
  70. type MemoryProvider struct {
  71. dbHandle *memoryProviderHandle
  72. }
  73. func initializeMemoryProvider(basePath string) {
  74. configFile := ""
  75. if util.IsFileInputValid(config.Name) {
  76. configFile = config.Name
  77. if !filepath.IsAbs(configFile) {
  78. configFile = filepath.Join(basePath, configFile)
  79. }
  80. }
  81. provider = &MemoryProvider{
  82. dbHandle: &memoryProviderHandle{
  83. isClosed: false,
  84. usernames: []string{},
  85. users: make(map[string]User),
  86. groupnames: []string{},
  87. groups: make(map[string]Group),
  88. vfolders: make(map[string]vfs.BaseVirtualFolder),
  89. vfoldersNames: []string{},
  90. admins: make(map[string]Admin),
  91. adminsUsernames: []string{},
  92. apiKeys: make(map[string]APIKey),
  93. apiKeysIDs: []string{},
  94. shares: make(map[string]Share),
  95. sharesIDs: []string{},
  96. actions: make(map[string]BaseEventAction),
  97. actionsNames: []string{},
  98. rules: make(map[string]EventRule),
  99. rulesNames: []string{},
  100. configFile: configFile,
  101. },
  102. }
  103. if err := provider.reloadConfig(); err != nil {
  104. logger.Error(logSender, "", "unable to load initial data: %v", err)
  105. logger.ErrorToConsole("unable to load initial data: %v", err)
  106. }
  107. }
  108. func (p *MemoryProvider) checkAvailability() error {
  109. p.dbHandle.Lock()
  110. defer p.dbHandle.Unlock()
  111. if p.dbHandle.isClosed {
  112. return errMemoryProviderClosed
  113. }
  114. return nil
  115. }
  116. func (p *MemoryProvider) close() error {
  117. p.dbHandle.Lock()
  118. defer p.dbHandle.Unlock()
  119. if p.dbHandle.isClosed {
  120. return errMemoryProviderClosed
  121. }
  122. p.dbHandle.isClosed = true
  123. return nil
  124. }
  125. func (p *MemoryProvider) validateUserAndTLSCert(username, protocol string, tlsCert *x509.Certificate) (User, error) {
  126. var user User
  127. if tlsCert == nil {
  128. return user, errors.New("TLS certificate cannot be null or empty")
  129. }
  130. user, err := p.userExists(username)
  131. if err != nil {
  132. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  133. return user, err
  134. }
  135. return checkUserAndTLSCertificate(&user, protocol, tlsCert)
  136. }
  137. func (p *MemoryProvider) validateUserAndPass(username, password, ip, protocol string) (User, error) {
  138. var user User
  139. if password == "" {
  140. return user, errors.New("credentials cannot be null or empty")
  141. }
  142. user, err := p.userExists(username)
  143. if err != nil {
  144. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  145. return user, err
  146. }
  147. return checkUserAndPass(&user, password, ip, protocol)
  148. }
  149. func (p *MemoryProvider) validateUserAndPubKey(username string, pubKey []byte, isSSHCert bool) (User, string, error) {
  150. var user User
  151. if len(pubKey) == 0 {
  152. return user, "", errors.New("credentials cannot be null or empty")
  153. }
  154. user, err := p.userExists(username)
  155. if err != nil {
  156. providerLog(logger.LevelWarn, "error authenticating user %#v: %v", username, err)
  157. return user, "", err
  158. }
  159. return checkUserAndPubKey(&user, pubKey, isSSHCert)
  160. }
  161. func (p *MemoryProvider) validateAdminAndPass(username, password, ip string) (Admin, error) {
  162. admin, err := p.adminExists(username)
  163. if err != nil {
  164. providerLog(logger.LevelWarn, "error authenticating admin %#v: %v", username, err)
  165. return admin, ErrInvalidCredentials
  166. }
  167. err = admin.checkUserAndPass(password, ip)
  168. return admin, err
  169. }
  170. func (p *MemoryProvider) updateAPIKeyLastUse(keyID string) error {
  171. p.dbHandle.Lock()
  172. defer p.dbHandle.Unlock()
  173. if p.dbHandle.isClosed {
  174. return errMemoryProviderClosed
  175. }
  176. apiKey, err := p.apiKeyExistsInternal(keyID)
  177. if err != nil {
  178. return err
  179. }
  180. apiKey.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  181. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey
  182. return nil
  183. }
  184. func (p *MemoryProvider) setUpdatedAt(username string) {
  185. p.dbHandle.Lock()
  186. defer p.dbHandle.Unlock()
  187. if p.dbHandle.isClosed {
  188. return
  189. }
  190. user, err := p.userExistsInternal(username)
  191. if err != nil {
  192. return
  193. }
  194. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  195. p.dbHandle.users[user.Username] = user
  196. setLastUserUpdate()
  197. }
  198. func (p *MemoryProvider) updateLastLogin(username string) error {
  199. p.dbHandle.Lock()
  200. defer p.dbHandle.Unlock()
  201. if p.dbHandle.isClosed {
  202. return errMemoryProviderClosed
  203. }
  204. user, err := p.userExistsInternal(username)
  205. if err != nil {
  206. return err
  207. }
  208. user.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  209. p.dbHandle.users[user.Username] = user
  210. return nil
  211. }
  212. func (p *MemoryProvider) updateAdminLastLogin(username string) error {
  213. p.dbHandle.Lock()
  214. defer p.dbHandle.Unlock()
  215. if p.dbHandle.isClosed {
  216. return errMemoryProviderClosed
  217. }
  218. admin, err := p.adminExistsInternal(username)
  219. if err != nil {
  220. return err
  221. }
  222. admin.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  223. p.dbHandle.admins[admin.Username] = admin
  224. return nil
  225. }
  226. func (p *MemoryProvider) updateTransferQuota(username string, uploadSize, downloadSize int64, reset bool) error {
  227. p.dbHandle.Lock()
  228. defer p.dbHandle.Unlock()
  229. if p.dbHandle.isClosed {
  230. return errMemoryProviderClosed
  231. }
  232. user, err := p.userExistsInternal(username)
  233. if err != nil {
  234. providerLog(logger.LevelError, "unable to update transfer quota for user %#v error: %v", username, err)
  235. return err
  236. }
  237. if reset {
  238. user.UsedUploadDataTransfer = uploadSize
  239. user.UsedDownloadDataTransfer = downloadSize
  240. } else {
  241. user.UsedUploadDataTransfer += uploadSize
  242. user.UsedDownloadDataTransfer += downloadSize
  243. }
  244. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  245. providerLog(logger.LevelDebug, "transfer quota updated for user %#v, ul increment: %v dl increment: %v is reset? %v",
  246. username, uploadSize, downloadSize, reset)
  247. p.dbHandle.users[user.Username] = user
  248. return nil
  249. }
  250. func (p *MemoryProvider) updateQuota(username string, filesAdd int, sizeAdd int64, reset bool) error {
  251. p.dbHandle.Lock()
  252. defer p.dbHandle.Unlock()
  253. if p.dbHandle.isClosed {
  254. return errMemoryProviderClosed
  255. }
  256. user, err := p.userExistsInternal(username)
  257. if err != nil {
  258. providerLog(logger.LevelError, "unable to update quota for user %#v error: %v", username, err)
  259. return err
  260. }
  261. if reset {
  262. user.UsedQuotaSize = sizeAdd
  263. user.UsedQuotaFiles = filesAdd
  264. } else {
  265. user.UsedQuotaSize += sizeAdd
  266. user.UsedQuotaFiles += filesAdd
  267. }
  268. user.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  269. providerLog(logger.LevelDebug, "quota updated for user %#v, files increment: %v size increment: %v is reset? %v",
  270. username, filesAdd, sizeAdd, reset)
  271. p.dbHandle.users[user.Username] = user
  272. return nil
  273. }
  274. func (p *MemoryProvider) getUsedQuota(username string) (int, int64, int64, int64, error) {
  275. p.dbHandle.Lock()
  276. defer p.dbHandle.Unlock()
  277. if p.dbHandle.isClosed {
  278. return 0, 0, 0, 0, errMemoryProviderClosed
  279. }
  280. user, err := p.userExistsInternal(username)
  281. if err != nil {
  282. providerLog(logger.LevelError, "unable to get quota for user %#v error: %v", username, err)
  283. return 0, 0, 0, 0, err
  284. }
  285. return user.UsedQuotaFiles, user.UsedQuotaSize, user.UsedUploadDataTransfer, user.UsedDownloadDataTransfer, err
  286. }
  287. func (p *MemoryProvider) addUser(user *User) error {
  288. // we can query virtual folder while validating a user
  289. // so we have to check without holding the lock
  290. err := ValidateUser(user)
  291. if err != nil {
  292. return err
  293. }
  294. p.dbHandle.Lock()
  295. defer p.dbHandle.Unlock()
  296. if p.dbHandle.isClosed {
  297. return errMemoryProviderClosed
  298. }
  299. _, err = p.userExistsInternal(user.Username)
  300. if err == nil {
  301. return fmt.Errorf("username %#v already exists", user.Username)
  302. }
  303. user.ID = p.getNextID()
  304. user.LastQuotaUpdate = 0
  305. user.UsedQuotaSize = 0
  306. user.UsedQuotaFiles = 0
  307. user.UsedUploadDataTransfer = 0
  308. user.UsedDownloadDataTransfer = 0
  309. user.LastLogin = 0
  310. user.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  311. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  312. user.VirtualFolders = p.joinUserVirtualFoldersFields(user)
  313. for idx := range user.Groups {
  314. if err = p.addUserFromGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  315. return err
  316. }
  317. }
  318. p.dbHandle.users[user.Username] = user.getACopy()
  319. p.dbHandle.usernames = append(p.dbHandle.usernames, user.Username)
  320. sort.Strings(p.dbHandle.usernames)
  321. return nil
  322. }
  323. func (p *MemoryProvider) updateUser(user *User) error {
  324. // we can query virtual folder while validating a user
  325. // so we have to check without holding the lock
  326. err := ValidateUser(user)
  327. if err != nil {
  328. return err
  329. }
  330. p.dbHandle.Lock()
  331. defer p.dbHandle.Unlock()
  332. if p.dbHandle.isClosed {
  333. return errMemoryProviderClosed
  334. }
  335. u, err := p.userExistsInternal(user.Username)
  336. if err != nil {
  337. return err
  338. }
  339. for _, oldFolder := range u.VirtualFolders {
  340. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  341. }
  342. for idx := range u.Groups {
  343. if err = p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name); err != nil {
  344. return err
  345. }
  346. }
  347. user.VirtualFolders = p.joinUserVirtualFoldersFields(user)
  348. for idx := range user.Groups {
  349. if err = p.addUserFromGroupMapping(user.Username, user.Groups[idx].Name); err != nil {
  350. return err
  351. }
  352. }
  353. user.LastQuotaUpdate = u.LastQuotaUpdate
  354. user.UsedQuotaSize = u.UsedQuotaSize
  355. user.UsedQuotaFiles = u.UsedQuotaFiles
  356. user.UsedUploadDataTransfer = u.UsedUploadDataTransfer
  357. user.UsedDownloadDataTransfer = u.UsedDownloadDataTransfer
  358. user.LastLogin = u.LastLogin
  359. user.CreatedAt = u.CreatedAt
  360. user.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  361. user.ID = u.ID
  362. // pre-login and external auth hook will use the passed *user so save a copy
  363. p.dbHandle.users[user.Username] = user.getACopy()
  364. setLastUserUpdate()
  365. return nil
  366. }
  367. func (p *MemoryProvider) deleteUser(user User, softDelete bool) error {
  368. p.dbHandle.Lock()
  369. defer p.dbHandle.Unlock()
  370. if p.dbHandle.isClosed {
  371. return errMemoryProviderClosed
  372. }
  373. u, err := p.userExistsInternal(user.Username)
  374. if err != nil {
  375. return err
  376. }
  377. for _, oldFolder := range u.VirtualFolders {
  378. p.removeRelationFromFolderMapping(oldFolder.Name, u.Username, "")
  379. }
  380. for idx := range u.Groups {
  381. if err = p.removeUserFromGroupMapping(u.Username, u.Groups[idx].Name); err != nil {
  382. return err
  383. }
  384. }
  385. delete(p.dbHandle.users, user.Username)
  386. // this could be more efficient
  387. p.dbHandle.usernames = make([]string, 0, len(p.dbHandle.users))
  388. for username := range p.dbHandle.users {
  389. p.dbHandle.usernames = append(p.dbHandle.usernames, username)
  390. }
  391. sort.Strings(p.dbHandle.usernames)
  392. p.deleteAPIKeysWithUser(user.Username)
  393. p.deleteSharesWithUser(user.Username)
  394. return nil
  395. }
  396. func (p *MemoryProvider) updateUserPassword(username, password string) error {
  397. p.dbHandle.Lock()
  398. defer p.dbHandle.Unlock()
  399. if p.dbHandle.isClosed {
  400. return errMemoryProviderClosed
  401. }
  402. user, err := p.userExistsInternal(username)
  403. if err != nil {
  404. return err
  405. }
  406. user.Password = password
  407. p.dbHandle.users[username] = user
  408. return nil
  409. }
  410. func (p *MemoryProvider) dumpUsers() ([]User, error) {
  411. p.dbHandle.Lock()
  412. defer p.dbHandle.Unlock()
  413. users := make([]User, 0, len(p.dbHandle.usernames))
  414. var err error
  415. if p.dbHandle.isClosed {
  416. return users, errMemoryProviderClosed
  417. }
  418. for _, username := range p.dbHandle.usernames {
  419. u := p.dbHandle.users[username]
  420. user := u.getACopy()
  421. p.addVirtualFoldersToUser(&user)
  422. users = append(users, user)
  423. }
  424. return users, err
  425. }
  426. func (p *MemoryProvider) dumpFolders() ([]vfs.BaseVirtualFolder, error) {
  427. p.dbHandle.Lock()
  428. defer p.dbHandle.Unlock()
  429. folders := make([]vfs.BaseVirtualFolder, 0, len(p.dbHandle.vfoldersNames))
  430. if p.dbHandle.isClosed {
  431. return folders, errMemoryProviderClosed
  432. }
  433. for _, f := range p.dbHandle.vfolders {
  434. folders = append(folders, f)
  435. }
  436. return folders, nil
  437. }
  438. func (p *MemoryProvider) getRecentlyUpdatedUsers(after int64) ([]User, error) {
  439. if getLastUserUpdate() < after {
  440. return nil, nil
  441. }
  442. p.dbHandle.Lock()
  443. defer p.dbHandle.Unlock()
  444. if p.dbHandle.isClosed {
  445. return nil, errMemoryProviderClosed
  446. }
  447. users := make([]User, 0, 10)
  448. for _, username := range p.dbHandle.usernames {
  449. u := p.dbHandle.users[username]
  450. if u.UpdatedAt < after {
  451. continue
  452. }
  453. user := u.getACopy()
  454. p.addVirtualFoldersToUser(&user)
  455. if len(user.Groups) > 0 {
  456. groupMapping := make(map[string]Group)
  457. for idx := range user.Groups {
  458. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  459. if err != nil {
  460. continue
  461. }
  462. groupMapping[group.Name] = group
  463. }
  464. user.applyGroupSettings(groupMapping)
  465. }
  466. user.SetEmptySecretsIfNil()
  467. users = append(users, user)
  468. }
  469. return users, nil
  470. }
  471. func (p *MemoryProvider) getUsersForQuotaCheck(toFetch map[string]bool) ([]User, error) {
  472. users := make([]User, 0, 30)
  473. p.dbHandle.Lock()
  474. defer p.dbHandle.Unlock()
  475. if p.dbHandle.isClosed {
  476. return users, errMemoryProviderClosed
  477. }
  478. for _, username := range p.dbHandle.usernames {
  479. if needFolders, ok := toFetch[username]; ok {
  480. u := p.dbHandle.users[username]
  481. user := u.getACopy()
  482. if needFolders {
  483. p.addVirtualFoldersToUser(&user)
  484. }
  485. if len(user.Groups) > 0 {
  486. groupMapping := make(map[string]Group)
  487. for idx := range user.Groups {
  488. group, err := p.groupExistsInternal(user.Groups[idx].Name)
  489. if err != nil {
  490. continue
  491. }
  492. groupMapping[group.Name] = group
  493. }
  494. user.applyGroupSettings(groupMapping)
  495. }
  496. user.SetEmptySecretsIfNil()
  497. user.PrepareForRendering()
  498. users = append(users, user)
  499. }
  500. }
  501. return users, nil
  502. }
  503. func (p *MemoryProvider) getUsers(limit int, offset int, order string) ([]User, error) {
  504. users := make([]User, 0, limit)
  505. var err error
  506. p.dbHandle.Lock()
  507. defer p.dbHandle.Unlock()
  508. if p.dbHandle.isClosed {
  509. return users, errMemoryProviderClosed
  510. }
  511. if limit <= 0 {
  512. return users, err
  513. }
  514. itNum := 0
  515. if order == OrderASC {
  516. for _, username := range p.dbHandle.usernames {
  517. itNum++
  518. if itNum <= offset {
  519. continue
  520. }
  521. u := p.dbHandle.users[username]
  522. user := u.getACopy()
  523. p.addVirtualFoldersToUser(&user)
  524. user.PrepareForRendering()
  525. users = append(users, user)
  526. if len(users) >= limit {
  527. break
  528. }
  529. }
  530. } else {
  531. for i := len(p.dbHandle.usernames) - 1; i >= 0; i-- {
  532. itNum++
  533. if itNum <= offset {
  534. continue
  535. }
  536. username := p.dbHandle.usernames[i]
  537. u := p.dbHandle.users[username]
  538. user := u.getACopy()
  539. p.addVirtualFoldersToUser(&user)
  540. user.PrepareForRendering()
  541. users = append(users, user)
  542. if len(users) >= limit {
  543. break
  544. }
  545. }
  546. }
  547. return users, err
  548. }
  549. func (p *MemoryProvider) userExists(username string) (User, error) {
  550. p.dbHandle.Lock()
  551. defer p.dbHandle.Unlock()
  552. if p.dbHandle.isClosed {
  553. return User{}, errMemoryProviderClosed
  554. }
  555. user, err := p.userExistsInternal(username)
  556. if err != nil {
  557. return user, err
  558. }
  559. p.addVirtualFoldersToUser(&user)
  560. return user, nil
  561. }
  562. func (p *MemoryProvider) userExistsInternal(username string) (User, error) {
  563. if val, ok := p.dbHandle.users[username]; ok {
  564. return val.getACopy(), nil
  565. }
  566. return User{}, util.NewRecordNotFoundError(fmt.Sprintf("username %q does not exist", username))
  567. }
  568. func (p *MemoryProvider) groupExistsInternal(name string) (Group, error) {
  569. if val, ok := p.dbHandle.groups[name]; ok {
  570. return val.getACopy(), nil
  571. }
  572. return Group{}, util.NewRecordNotFoundError(fmt.Sprintf("group %q does not exist", name))
  573. }
  574. func (p *MemoryProvider) actionExistsInternal(name string) (BaseEventAction, error) {
  575. if val, ok := p.dbHandle.actions[name]; ok {
  576. return val.getACopy(), nil
  577. }
  578. return BaseEventAction{}, util.NewRecordNotFoundError(fmt.Sprintf("event action %q does not exist", name))
  579. }
  580. func (p *MemoryProvider) ruleExistsInternal(name string) (EventRule, error) {
  581. if val, ok := p.dbHandle.rules[name]; ok {
  582. return val.getACopy(), nil
  583. }
  584. return EventRule{}, util.NewRecordNotFoundError(fmt.Sprintf("event rule %q does not exist", name))
  585. }
  586. func (p *MemoryProvider) addAdmin(admin *Admin) error {
  587. p.dbHandle.Lock()
  588. defer p.dbHandle.Unlock()
  589. if p.dbHandle.isClosed {
  590. return errMemoryProviderClosed
  591. }
  592. err := admin.validate()
  593. if err != nil {
  594. return err
  595. }
  596. _, err = p.adminExistsInternal(admin.Username)
  597. if err == nil {
  598. return fmt.Errorf("admin %#v already exists", admin.Username)
  599. }
  600. admin.ID = p.getNextAdminID()
  601. admin.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  602. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  603. admin.LastLogin = 0
  604. p.dbHandle.admins[admin.Username] = admin.getACopy()
  605. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, admin.Username)
  606. sort.Strings(p.dbHandle.adminsUsernames)
  607. return nil
  608. }
  609. func (p *MemoryProvider) updateAdmin(admin *Admin) error {
  610. p.dbHandle.Lock()
  611. defer p.dbHandle.Unlock()
  612. if p.dbHandle.isClosed {
  613. return errMemoryProviderClosed
  614. }
  615. err := admin.validate()
  616. if err != nil {
  617. return err
  618. }
  619. a, err := p.adminExistsInternal(admin.Username)
  620. if err != nil {
  621. return err
  622. }
  623. admin.ID = a.ID
  624. admin.CreatedAt = a.CreatedAt
  625. admin.LastLogin = a.LastLogin
  626. admin.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  627. p.dbHandle.admins[admin.Username] = admin.getACopy()
  628. return nil
  629. }
  630. func (p *MemoryProvider) deleteAdmin(admin Admin) error {
  631. p.dbHandle.Lock()
  632. defer p.dbHandle.Unlock()
  633. if p.dbHandle.isClosed {
  634. return errMemoryProviderClosed
  635. }
  636. _, err := p.adminExistsInternal(admin.Username)
  637. if err != nil {
  638. return err
  639. }
  640. delete(p.dbHandle.admins, admin.Username)
  641. // this could be more efficient
  642. p.dbHandle.adminsUsernames = make([]string, 0, len(p.dbHandle.admins))
  643. for username := range p.dbHandle.admins {
  644. p.dbHandle.adminsUsernames = append(p.dbHandle.adminsUsernames, username)
  645. }
  646. sort.Strings(p.dbHandle.adminsUsernames)
  647. p.deleteAPIKeysWithAdmin(admin.Username)
  648. return nil
  649. }
  650. func (p *MemoryProvider) adminExists(username string) (Admin, error) {
  651. p.dbHandle.Lock()
  652. defer p.dbHandle.Unlock()
  653. if p.dbHandle.isClosed {
  654. return Admin{}, errMemoryProviderClosed
  655. }
  656. return p.adminExistsInternal(username)
  657. }
  658. func (p *MemoryProvider) adminExistsInternal(username string) (Admin, error) {
  659. if val, ok := p.dbHandle.admins[username]; ok {
  660. return val.getACopy(), nil
  661. }
  662. return Admin{}, util.NewRecordNotFoundError(fmt.Sprintf("admin %#v does not exist", username))
  663. }
  664. func (p *MemoryProvider) dumpAdmins() ([]Admin, error) {
  665. p.dbHandle.Lock()
  666. defer p.dbHandle.Unlock()
  667. admins := make([]Admin, 0, len(p.dbHandle.admins))
  668. if p.dbHandle.isClosed {
  669. return admins, errMemoryProviderClosed
  670. }
  671. for _, admin := range p.dbHandle.admins {
  672. admins = append(admins, admin)
  673. }
  674. return admins, nil
  675. }
  676. func (p *MemoryProvider) getAdmins(limit int, offset int, order string) ([]Admin, error) {
  677. admins := make([]Admin, 0, limit)
  678. p.dbHandle.Lock()
  679. defer p.dbHandle.Unlock()
  680. if p.dbHandle.isClosed {
  681. return admins, errMemoryProviderClosed
  682. }
  683. if limit <= 0 {
  684. return admins, nil
  685. }
  686. itNum := 0
  687. if order == OrderASC {
  688. for _, username := range p.dbHandle.adminsUsernames {
  689. itNum++
  690. if itNum <= offset {
  691. continue
  692. }
  693. a := p.dbHandle.admins[username]
  694. admin := a.getACopy()
  695. admin.HideConfidentialData()
  696. admins = append(admins, admin)
  697. if len(admins) >= limit {
  698. break
  699. }
  700. }
  701. } else {
  702. for i := len(p.dbHandle.adminsUsernames) - 1; i >= 0; i-- {
  703. itNum++
  704. if itNum <= offset {
  705. continue
  706. }
  707. username := p.dbHandle.adminsUsernames[i]
  708. a := p.dbHandle.admins[username]
  709. admin := a.getACopy()
  710. admin.HideConfidentialData()
  711. admins = append(admins, admin)
  712. if len(admins) >= limit {
  713. break
  714. }
  715. }
  716. }
  717. return admins, nil
  718. }
  719. func (p *MemoryProvider) updateFolderQuota(name string, filesAdd int, sizeAdd int64, reset bool) error {
  720. p.dbHandle.Lock()
  721. defer p.dbHandle.Unlock()
  722. if p.dbHandle.isClosed {
  723. return errMemoryProviderClosed
  724. }
  725. folder, err := p.folderExistsInternal(name)
  726. if err != nil {
  727. providerLog(logger.LevelError, "unable to update quota for folder %#v error: %v", name, err)
  728. return err
  729. }
  730. if reset {
  731. folder.UsedQuotaSize = sizeAdd
  732. folder.UsedQuotaFiles = filesAdd
  733. } else {
  734. folder.UsedQuotaSize += sizeAdd
  735. folder.UsedQuotaFiles += filesAdd
  736. }
  737. folder.LastQuotaUpdate = util.GetTimeAsMsSinceEpoch(time.Now())
  738. p.dbHandle.vfolders[name] = folder
  739. return nil
  740. }
  741. func (p *MemoryProvider) getGroups(limit, offset int, order string, minimal bool) ([]Group, error) {
  742. p.dbHandle.Lock()
  743. defer p.dbHandle.Unlock()
  744. if p.dbHandle.isClosed {
  745. return nil, errMemoryProviderClosed
  746. }
  747. if limit <= 0 {
  748. return nil, nil
  749. }
  750. groups := make([]Group, 0, limit)
  751. itNum := 0
  752. if order == OrderASC {
  753. for _, name := range p.dbHandle.groupnames {
  754. itNum++
  755. if itNum <= offset {
  756. continue
  757. }
  758. g := p.dbHandle.groups[name]
  759. group := g.getACopy()
  760. p.addVirtualFoldersToGroup(&group)
  761. group.PrepareForRendering()
  762. groups = append(groups, group)
  763. if len(groups) >= limit {
  764. break
  765. }
  766. }
  767. } else {
  768. for i := len(p.dbHandle.groupnames) - 1; i >= 0; i-- {
  769. itNum++
  770. if itNum <= offset {
  771. continue
  772. }
  773. name := p.dbHandle.groupnames[i]
  774. g := p.dbHandle.groups[name]
  775. group := g.getACopy()
  776. p.addVirtualFoldersToGroup(&group)
  777. group.PrepareForRendering()
  778. groups = append(groups, group)
  779. if len(groups) >= limit {
  780. break
  781. }
  782. }
  783. }
  784. return groups, nil
  785. }
  786. func (p *MemoryProvider) getGroupsWithNames(names []string) ([]Group, error) {
  787. p.dbHandle.Lock()
  788. defer p.dbHandle.Unlock()
  789. if p.dbHandle.isClosed {
  790. return nil, errMemoryProviderClosed
  791. }
  792. groups := make([]Group, 0, len(names))
  793. for _, name := range names {
  794. if val, ok := p.dbHandle.groups[name]; ok {
  795. group := val.getACopy()
  796. p.addVirtualFoldersToGroup(&group)
  797. groups = append(groups, group)
  798. }
  799. }
  800. return groups, nil
  801. }
  802. func (p *MemoryProvider) getUsersInGroups(names []string) ([]string, error) {
  803. p.dbHandle.Lock()
  804. defer p.dbHandle.Unlock()
  805. if p.dbHandle.isClosed {
  806. return nil, errMemoryProviderClosed
  807. }
  808. var users []string
  809. for _, name := range names {
  810. if val, ok := p.dbHandle.groups[name]; ok {
  811. group := val.getACopy()
  812. users = append(users, group.Users...)
  813. }
  814. }
  815. return users, nil
  816. }
  817. func (p *MemoryProvider) groupExists(name string) (Group, error) {
  818. p.dbHandle.Lock()
  819. defer p.dbHandle.Unlock()
  820. if p.dbHandle.isClosed {
  821. return Group{}, errMemoryProviderClosed
  822. }
  823. group, err := p.groupExistsInternal(name)
  824. if err != nil {
  825. return group, err
  826. }
  827. p.addVirtualFoldersToGroup(&group)
  828. return group, nil
  829. }
  830. func (p *MemoryProvider) addGroup(group *Group) error {
  831. if err := group.validate(); err != nil {
  832. return err
  833. }
  834. p.dbHandle.Lock()
  835. defer p.dbHandle.Unlock()
  836. if p.dbHandle.isClosed {
  837. return errMemoryProviderClosed
  838. }
  839. _, err := p.groupExistsInternal(group.Name)
  840. if err == nil {
  841. return fmt.Errorf("group %#v already exists", group.Name)
  842. }
  843. group.ID = p.getNextGroupID()
  844. group.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  845. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  846. group.VirtualFolders = p.joinGroupVirtualFoldersFields(group)
  847. p.dbHandle.groups[group.Name] = group.getACopy()
  848. p.dbHandle.groupnames = append(p.dbHandle.groupnames, group.Name)
  849. sort.Strings(p.dbHandle.groupnames)
  850. return nil
  851. }
  852. func (p *MemoryProvider) updateGroup(group *Group) error {
  853. if err := group.validate(); err != nil {
  854. return err
  855. }
  856. p.dbHandle.Lock()
  857. defer p.dbHandle.Unlock()
  858. if p.dbHandle.isClosed {
  859. return errMemoryProviderClosed
  860. }
  861. g, err := p.groupExistsInternal(group.Name)
  862. if err != nil {
  863. return err
  864. }
  865. for _, oldFolder := range g.VirtualFolders {
  866. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  867. }
  868. group.VirtualFolders = p.joinGroupVirtualFoldersFields(group)
  869. group.CreatedAt = g.CreatedAt
  870. group.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  871. group.ID = g.ID
  872. p.dbHandle.groups[group.Name] = group.getACopy()
  873. return nil
  874. }
  875. func (p *MemoryProvider) deleteGroup(group Group) error {
  876. p.dbHandle.Lock()
  877. defer p.dbHandle.Unlock()
  878. if p.dbHandle.isClosed {
  879. return errMemoryProviderClosed
  880. }
  881. g, err := p.groupExistsInternal(group.Name)
  882. if err != nil {
  883. return err
  884. }
  885. if len(g.Users) > 0 {
  886. return util.NewValidationError(fmt.Sprintf("the group %#v is referenced, it cannot be removed", group.Name))
  887. }
  888. for _, oldFolder := range g.VirtualFolders {
  889. p.removeRelationFromFolderMapping(oldFolder.Name, "", g.Name)
  890. }
  891. delete(p.dbHandle.groups, group.Name)
  892. // this could be more efficient
  893. p.dbHandle.groupnames = make([]string, 0, len(p.dbHandle.groups))
  894. for name := range p.dbHandle.groups {
  895. p.dbHandle.groupnames = append(p.dbHandle.groupnames, name)
  896. }
  897. sort.Strings(p.dbHandle.groupnames)
  898. return nil
  899. }
  900. func (p *MemoryProvider) dumpGroups() ([]Group, error) {
  901. p.dbHandle.Lock()
  902. defer p.dbHandle.Unlock()
  903. groups := make([]Group, 0, len(p.dbHandle.groups))
  904. var err error
  905. if p.dbHandle.isClosed {
  906. return groups, errMemoryProviderClosed
  907. }
  908. for _, name := range p.dbHandle.groupnames {
  909. g := p.dbHandle.groups[name]
  910. group := g.getACopy()
  911. p.addVirtualFoldersToGroup(&group)
  912. groups = append(groups, group)
  913. }
  914. return groups, err
  915. }
  916. func (p *MemoryProvider) getUsedFolderQuota(name string) (int, int64, error) {
  917. p.dbHandle.Lock()
  918. defer p.dbHandle.Unlock()
  919. if p.dbHandle.isClosed {
  920. return 0, 0, errMemoryProviderClosed
  921. }
  922. folder, err := p.folderExistsInternal(name)
  923. if err != nil {
  924. providerLog(logger.LevelError, "unable to get quota for folder %#v error: %v", name, err)
  925. return 0, 0, err
  926. }
  927. return folder.UsedQuotaFiles, folder.UsedQuotaSize, err
  928. }
  929. func (p *MemoryProvider) joinGroupVirtualFoldersFields(group *Group) []vfs.VirtualFolder {
  930. var folders []vfs.VirtualFolder
  931. for idx := range group.VirtualFolders {
  932. folder := &group.VirtualFolders[idx]
  933. f, err := p.addOrUpdateFolderInternal(&folder.BaseVirtualFolder, "", group.Name, 0, 0, 0)
  934. if err == nil {
  935. folder.BaseVirtualFolder = f
  936. folders = append(folders, *folder)
  937. }
  938. }
  939. return folders
  940. }
  941. func (p *MemoryProvider) addVirtualFoldersToGroup(group *Group) {
  942. if len(group.VirtualFolders) > 0 {
  943. var folders []vfs.VirtualFolder
  944. for idx := range group.VirtualFolders {
  945. folder := &group.VirtualFolders[idx]
  946. baseFolder, err := p.folderExistsInternal(folder.Name)
  947. if err != nil {
  948. continue
  949. }
  950. folder.BaseVirtualFolder = baseFolder.GetACopy()
  951. folders = append(folders, *folder)
  952. }
  953. group.VirtualFolders = folders
  954. }
  955. }
  956. func (p *MemoryProvider) addActionsToRule(rule *EventRule) {
  957. var actions []EventAction
  958. for idx := range rule.Actions {
  959. action := &rule.Actions[idx]
  960. baseAction, err := p.actionExistsInternal(action.Name)
  961. if err != nil {
  962. continue
  963. }
  964. baseAction.Options.SetEmptySecretsIfNil()
  965. action.BaseEventAction = baseAction
  966. actions = append(actions, *action)
  967. }
  968. rule.Actions = actions
  969. }
  970. func (p *MemoryProvider) addRuleToActionMapping(ruleName, actionName string) error {
  971. a, err := p.actionExistsInternal(actionName)
  972. if err != nil {
  973. return util.NewGenericError(fmt.Sprintf("action %q does not exist", actionName))
  974. }
  975. if !util.Contains(a.Rules, ruleName) {
  976. a.Rules = append(a.Rules, ruleName)
  977. p.dbHandle.actions[actionName] = a
  978. }
  979. return nil
  980. }
  981. func (p *MemoryProvider) removeRuleFromActionMapping(ruleName, actionName string) error {
  982. a, err := p.actionExistsInternal(actionName)
  983. if err != nil {
  984. providerLog(logger.LevelWarn, "action %q does not exist, cannot remove from mapping", actionName)
  985. return nil
  986. }
  987. if util.Contains(a.Rules, ruleName) {
  988. var rules []string
  989. for _, r := range a.Rules {
  990. if r != ruleName {
  991. rules = append(rules, r)
  992. }
  993. }
  994. a.Rules = rules
  995. p.dbHandle.actions[actionName] = a
  996. }
  997. return nil
  998. }
  999. func (p *MemoryProvider) addUserFromGroupMapping(username, groupname string) error {
  1000. g, err := p.groupExistsInternal(groupname)
  1001. if err != nil {
  1002. return err
  1003. }
  1004. if !util.Contains(g.Users, username) {
  1005. g.Users = append(g.Users, username)
  1006. p.dbHandle.groups[groupname] = g
  1007. }
  1008. return nil
  1009. }
  1010. func (p *MemoryProvider) removeUserFromGroupMapping(username, groupname string) error {
  1011. g, err := p.groupExistsInternal(groupname)
  1012. if err != nil {
  1013. return err
  1014. }
  1015. if util.Contains(g.Users, username) {
  1016. var users []string
  1017. for _, u := range g.Users {
  1018. if u != username {
  1019. users = append(users, u)
  1020. }
  1021. }
  1022. g.Users = users
  1023. p.dbHandle.groups[groupname] = g
  1024. }
  1025. return nil
  1026. }
  1027. func (p *MemoryProvider) joinUserVirtualFoldersFields(user *User) []vfs.VirtualFolder {
  1028. var folders []vfs.VirtualFolder
  1029. for idx := range user.VirtualFolders {
  1030. folder := &user.VirtualFolders[idx]
  1031. f, err := p.addOrUpdateFolderInternal(&folder.BaseVirtualFolder, user.Username, "", 0, 0, 0)
  1032. if err == nil {
  1033. folder.BaseVirtualFolder = f
  1034. folders = append(folders, *folder)
  1035. }
  1036. }
  1037. return folders
  1038. }
  1039. func (p *MemoryProvider) addVirtualFoldersToUser(user *User) {
  1040. if len(user.VirtualFolders) > 0 {
  1041. var folders []vfs.VirtualFolder
  1042. for idx := range user.VirtualFolders {
  1043. folder := &user.VirtualFolders[idx]
  1044. baseFolder, err := p.folderExistsInternal(folder.Name)
  1045. if err != nil {
  1046. continue
  1047. }
  1048. folder.BaseVirtualFolder = baseFolder.GetACopy()
  1049. folders = append(folders, *folder)
  1050. }
  1051. user.VirtualFolders = folders
  1052. }
  1053. }
  1054. func (p *MemoryProvider) removeRelationFromFolderMapping(folderName, username, groupname string) {
  1055. folder, err := p.folderExistsInternal(folderName)
  1056. if err == nil {
  1057. if username != "" {
  1058. var usernames []string
  1059. for _, user := range folder.Users {
  1060. if user != username {
  1061. usernames = append(usernames, user)
  1062. }
  1063. }
  1064. folder.Users = usernames
  1065. }
  1066. if groupname != "" {
  1067. var groups []string
  1068. for _, group := range folder.Groups {
  1069. if group != groupname {
  1070. groups = append(groups, group)
  1071. }
  1072. }
  1073. folder.Groups = groups
  1074. }
  1075. p.dbHandle.vfolders[folder.Name] = folder
  1076. }
  1077. }
  1078. func (p *MemoryProvider) updateFoldersMappingInternal(folder vfs.BaseVirtualFolder) {
  1079. p.dbHandle.vfolders[folder.Name] = folder
  1080. if !util.Contains(p.dbHandle.vfoldersNames, folder.Name) {
  1081. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, folder.Name)
  1082. sort.Strings(p.dbHandle.vfoldersNames)
  1083. }
  1084. }
  1085. func (p *MemoryProvider) addOrUpdateFolderInternal(baseFolder *vfs.BaseVirtualFolder, username, groupname string,
  1086. usedQuotaSize int64, usedQuotaFiles int, lastQuotaUpdate int64,
  1087. ) (vfs.BaseVirtualFolder, error) {
  1088. folder, err := p.folderExistsInternal(baseFolder.Name)
  1089. if err == nil {
  1090. // exists
  1091. folder.MappedPath = baseFolder.MappedPath
  1092. folder.Description = baseFolder.Description
  1093. folder.FsConfig = baseFolder.FsConfig.GetACopy()
  1094. if username != "" && !util.Contains(folder.Users, username) {
  1095. folder.Users = append(folder.Users, username)
  1096. }
  1097. if groupname != "" && !util.Contains(folder.Groups, groupname) {
  1098. folder.Groups = append(folder.Groups, groupname)
  1099. }
  1100. p.updateFoldersMappingInternal(folder)
  1101. return folder, nil
  1102. }
  1103. if _, ok := err.(*util.RecordNotFoundError); ok {
  1104. folder = baseFolder.GetACopy()
  1105. folder.ID = p.getNextFolderID()
  1106. folder.UsedQuotaSize = usedQuotaSize
  1107. folder.UsedQuotaFiles = usedQuotaFiles
  1108. folder.LastQuotaUpdate = lastQuotaUpdate
  1109. if username != "" {
  1110. folder.Users = []string{username}
  1111. }
  1112. if groupname != "" {
  1113. folder.Groups = []string{groupname}
  1114. }
  1115. p.updateFoldersMappingInternal(folder)
  1116. return folder, nil
  1117. }
  1118. return folder, err
  1119. }
  1120. func (p *MemoryProvider) folderExistsInternal(name string) (vfs.BaseVirtualFolder, error) {
  1121. if val, ok := p.dbHandle.vfolders[name]; ok {
  1122. return val, nil
  1123. }
  1124. return vfs.BaseVirtualFolder{}, util.NewRecordNotFoundError(fmt.Sprintf("folder %#v does not exist", name))
  1125. }
  1126. func (p *MemoryProvider) getFolders(limit, offset int, order string, minimal bool) ([]vfs.BaseVirtualFolder, error) {
  1127. folders := make([]vfs.BaseVirtualFolder, 0, limit)
  1128. var err error
  1129. p.dbHandle.Lock()
  1130. defer p.dbHandle.Unlock()
  1131. if p.dbHandle.isClosed {
  1132. return folders, errMemoryProviderClosed
  1133. }
  1134. if limit <= 0 {
  1135. return folders, err
  1136. }
  1137. itNum := 0
  1138. if order == OrderASC {
  1139. for _, name := range p.dbHandle.vfoldersNames {
  1140. itNum++
  1141. if itNum <= offset {
  1142. continue
  1143. }
  1144. f := p.dbHandle.vfolders[name]
  1145. folder := f.GetACopy()
  1146. folder.PrepareForRendering()
  1147. folders = append(folders, folder)
  1148. if len(folders) >= limit {
  1149. break
  1150. }
  1151. }
  1152. } else {
  1153. for i := len(p.dbHandle.vfoldersNames) - 1; i >= 0; i-- {
  1154. itNum++
  1155. if itNum <= offset {
  1156. continue
  1157. }
  1158. name := p.dbHandle.vfoldersNames[i]
  1159. f := p.dbHandle.vfolders[name]
  1160. folder := f.GetACopy()
  1161. folder.PrepareForRendering()
  1162. folders = append(folders, folder)
  1163. if len(folders) >= limit {
  1164. break
  1165. }
  1166. }
  1167. }
  1168. return folders, err
  1169. }
  1170. func (p *MemoryProvider) getFolderByName(name string) (vfs.BaseVirtualFolder, error) {
  1171. p.dbHandle.Lock()
  1172. defer p.dbHandle.Unlock()
  1173. if p.dbHandle.isClosed {
  1174. return vfs.BaseVirtualFolder{}, errMemoryProviderClosed
  1175. }
  1176. folder, err := p.folderExistsInternal(name)
  1177. if err != nil {
  1178. return vfs.BaseVirtualFolder{}, err
  1179. }
  1180. return folder.GetACopy(), nil
  1181. }
  1182. func (p *MemoryProvider) addFolder(folder *vfs.BaseVirtualFolder) error {
  1183. err := ValidateFolder(folder)
  1184. if err != nil {
  1185. return err
  1186. }
  1187. p.dbHandle.Lock()
  1188. defer p.dbHandle.Unlock()
  1189. if p.dbHandle.isClosed {
  1190. return errMemoryProviderClosed
  1191. }
  1192. _, err = p.folderExistsInternal(folder.Name)
  1193. if err == nil {
  1194. return fmt.Errorf("folder %#v already exists", folder.Name)
  1195. }
  1196. folder.ID = p.getNextFolderID()
  1197. folder.Users = nil
  1198. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1199. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, folder.Name)
  1200. sort.Strings(p.dbHandle.vfoldersNames)
  1201. return nil
  1202. }
  1203. func (p *MemoryProvider) updateFolder(folder *vfs.BaseVirtualFolder) error {
  1204. err := ValidateFolder(folder)
  1205. if err != nil {
  1206. return err
  1207. }
  1208. p.dbHandle.Lock()
  1209. defer p.dbHandle.Unlock()
  1210. if p.dbHandle.isClosed {
  1211. return errMemoryProviderClosed
  1212. }
  1213. f, err := p.folderExistsInternal(folder.Name)
  1214. if err != nil {
  1215. return err
  1216. }
  1217. folder.ID = f.ID
  1218. folder.LastQuotaUpdate = f.LastQuotaUpdate
  1219. folder.UsedQuotaFiles = f.UsedQuotaFiles
  1220. folder.UsedQuotaSize = f.UsedQuotaSize
  1221. folder.Users = f.Users
  1222. p.dbHandle.vfolders[folder.Name] = folder.GetACopy()
  1223. // now update the related users
  1224. for _, username := range folder.Users {
  1225. user, err := p.userExistsInternal(username)
  1226. if err == nil {
  1227. var folders []vfs.VirtualFolder
  1228. for idx := range user.VirtualFolders {
  1229. userFolder := &user.VirtualFolders[idx]
  1230. if folder.Name == userFolder.Name {
  1231. userFolder.BaseVirtualFolder = folder.GetACopy()
  1232. }
  1233. folders = append(folders, *userFolder)
  1234. }
  1235. user.VirtualFolders = folders
  1236. p.dbHandle.users[user.Username] = user
  1237. }
  1238. }
  1239. return nil
  1240. }
  1241. func (p *MemoryProvider) deleteFolder(folder vfs.BaseVirtualFolder) error {
  1242. p.dbHandle.Lock()
  1243. defer p.dbHandle.Unlock()
  1244. if p.dbHandle.isClosed {
  1245. return errMemoryProviderClosed
  1246. }
  1247. _, err := p.folderExistsInternal(folder.Name)
  1248. if err != nil {
  1249. return err
  1250. }
  1251. for _, username := range folder.Users {
  1252. user, err := p.userExistsInternal(username)
  1253. if err == nil {
  1254. var folders []vfs.VirtualFolder
  1255. for idx := range user.VirtualFolders {
  1256. userFolder := &user.VirtualFolders[idx]
  1257. if folder.Name != userFolder.Name {
  1258. folders = append(folders, *userFolder)
  1259. }
  1260. }
  1261. user.VirtualFolders = folders
  1262. p.dbHandle.users[user.Username] = user
  1263. }
  1264. }
  1265. for _, groupname := range folder.Groups {
  1266. group, err := p.groupExistsInternal(groupname)
  1267. if err == nil {
  1268. var folders []vfs.VirtualFolder
  1269. for idx := range group.VirtualFolders {
  1270. groupFolder := &group.VirtualFolders[idx]
  1271. if folder.Name != groupFolder.Name {
  1272. folders = append(folders, *groupFolder)
  1273. }
  1274. }
  1275. group.VirtualFolders = folders
  1276. p.dbHandle.groups[group.Name] = group
  1277. }
  1278. }
  1279. delete(p.dbHandle.vfolders, folder.Name)
  1280. p.dbHandle.vfoldersNames = []string{}
  1281. for name := range p.dbHandle.vfolders {
  1282. p.dbHandle.vfoldersNames = append(p.dbHandle.vfoldersNames, name)
  1283. }
  1284. sort.Strings(p.dbHandle.vfoldersNames)
  1285. return nil
  1286. }
  1287. func (p *MemoryProvider) apiKeyExistsInternal(keyID string) (APIKey, error) {
  1288. if val, ok := p.dbHandle.apiKeys[keyID]; ok {
  1289. return val.getACopy(), nil
  1290. }
  1291. return APIKey{}, util.NewRecordNotFoundError(fmt.Sprintf("API key %#v does not exist", keyID))
  1292. }
  1293. func (p *MemoryProvider) apiKeyExists(keyID string) (APIKey, error) {
  1294. p.dbHandle.Lock()
  1295. defer p.dbHandle.Unlock()
  1296. if p.dbHandle.isClosed {
  1297. return APIKey{}, errMemoryProviderClosed
  1298. }
  1299. return p.apiKeyExistsInternal(keyID)
  1300. }
  1301. func (p *MemoryProvider) addAPIKey(apiKey *APIKey) error {
  1302. err := apiKey.validate()
  1303. if err != nil {
  1304. return err
  1305. }
  1306. p.dbHandle.Lock()
  1307. defer p.dbHandle.Unlock()
  1308. if p.dbHandle.isClosed {
  1309. return errMemoryProviderClosed
  1310. }
  1311. _, err = p.apiKeyExistsInternal(apiKey.KeyID)
  1312. if err == nil {
  1313. return fmt.Errorf("API key %#v already exists", apiKey.KeyID)
  1314. }
  1315. if apiKey.User != "" {
  1316. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1317. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", apiKey.User))
  1318. }
  1319. }
  1320. if apiKey.Admin != "" {
  1321. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1322. return util.NewValidationError(fmt.Sprintf("related admin %#v does not exists", apiKey.User))
  1323. }
  1324. }
  1325. apiKey.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1326. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1327. apiKey.LastUseAt = 0
  1328. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1329. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, apiKey.KeyID)
  1330. sort.Strings(p.dbHandle.apiKeysIDs)
  1331. return nil
  1332. }
  1333. func (p *MemoryProvider) updateAPIKey(apiKey *APIKey) error {
  1334. err := apiKey.validate()
  1335. if err != nil {
  1336. return err
  1337. }
  1338. p.dbHandle.Lock()
  1339. defer p.dbHandle.Unlock()
  1340. if p.dbHandle.isClosed {
  1341. return errMemoryProviderClosed
  1342. }
  1343. k, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1344. if err != nil {
  1345. return err
  1346. }
  1347. if apiKey.User != "" {
  1348. if _, err := p.userExistsInternal(apiKey.User); err != nil {
  1349. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", apiKey.User))
  1350. }
  1351. }
  1352. if apiKey.Admin != "" {
  1353. if _, err := p.adminExistsInternal(apiKey.Admin); err != nil {
  1354. return util.NewValidationError(fmt.Sprintf("related admin %#v does not exists", apiKey.User))
  1355. }
  1356. }
  1357. apiKey.ID = k.ID
  1358. apiKey.KeyID = k.KeyID
  1359. apiKey.Key = k.Key
  1360. apiKey.CreatedAt = k.CreatedAt
  1361. apiKey.LastUseAt = k.LastUseAt
  1362. apiKey.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1363. p.dbHandle.apiKeys[apiKey.KeyID] = apiKey.getACopy()
  1364. return nil
  1365. }
  1366. func (p *MemoryProvider) deleteAPIKey(apiKey APIKey) error {
  1367. p.dbHandle.Lock()
  1368. defer p.dbHandle.Unlock()
  1369. if p.dbHandle.isClosed {
  1370. return errMemoryProviderClosed
  1371. }
  1372. _, err := p.apiKeyExistsInternal(apiKey.KeyID)
  1373. if err != nil {
  1374. return err
  1375. }
  1376. delete(p.dbHandle.apiKeys, apiKey.KeyID)
  1377. p.updateAPIKeysOrdering()
  1378. return nil
  1379. }
  1380. func (p *MemoryProvider) getAPIKeys(limit int, offset int, order string) ([]APIKey, error) {
  1381. apiKeys := make([]APIKey, 0, limit)
  1382. p.dbHandle.Lock()
  1383. defer p.dbHandle.Unlock()
  1384. if p.dbHandle.isClosed {
  1385. return apiKeys, errMemoryProviderClosed
  1386. }
  1387. if limit <= 0 {
  1388. return apiKeys, nil
  1389. }
  1390. itNum := 0
  1391. if order == OrderDESC {
  1392. for i := len(p.dbHandle.apiKeysIDs) - 1; i >= 0; i-- {
  1393. itNum++
  1394. if itNum <= offset {
  1395. continue
  1396. }
  1397. keyID := p.dbHandle.apiKeysIDs[i]
  1398. k := p.dbHandle.apiKeys[keyID]
  1399. apiKey := k.getACopy()
  1400. apiKey.HideConfidentialData()
  1401. apiKeys = append(apiKeys, apiKey)
  1402. if len(apiKeys) >= limit {
  1403. break
  1404. }
  1405. }
  1406. } else {
  1407. for _, keyID := range p.dbHandle.apiKeysIDs {
  1408. itNum++
  1409. if itNum <= offset {
  1410. continue
  1411. }
  1412. k := p.dbHandle.apiKeys[keyID]
  1413. apiKey := k.getACopy()
  1414. apiKey.HideConfidentialData()
  1415. apiKeys = append(apiKeys, apiKey)
  1416. if len(apiKeys) >= limit {
  1417. break
  1418. }
  1419. }
  1420. }
  1421. return apiKeys, nil
  1422. }
  1423. func (p *MemoryProvider) dumpAPIKeys() ([]APIKey, error) {
  1424. p.dbHandle.Lock()
  1425. defer p.dbHandle.Unlock()
  1426. apiKeys := make([]APIKey, 0, len(p.dbHandle.apiKeys))
  1427. if p.dbHandle.isClosed {
  1428. return apiKeys, errMemoryProviderClosed
  1429. }
  1430. for _, k := range p.dbHandle.apiKeys {
  1431. apiKeys = append(apiKeys, k)
  1432. }
  1433. return apiKeys, nil
  1434. }
  1435. func (p *MemoryProvider) deleteAPIKeysWithUser(username string) {
  1436. found := false
  1437. for k, v := range p.dbHandle.apiKeys {
  1438. if v.User == username {
  1439. delete(p.dbHandle.apiKeys, k)
  1440. found = true
  1441. }
  1442. }
  1443. if found {
  1444. p.updateAPIKeysOrdering()
  1445. }
  1446. }
  1447. func (p *MemoryProvider) deleteAPIKeysWithAdmin(username string) {
  1448. found := false
  1449. for k, v := range p.dbHandle.apiKeys {
  1450. if v.Admin == username {
  1451. delete(p.dbHandle.apiKeys, k)
  1452. found = true
  1453. }
  1454. }
  1455. if found {
  1456. p.updateAPIKeysOrdering()
  1457. }
  1458. }
  1459. func (p *MemoryProvider) deleteSharesWithUser(username string) {
  1460. found := false
  1461. for k, v := range p.dbHandle.shares {
  1462. if v.Username == username {
  1463. delete(p.dbHandle.shares, k)
  1464. found = true
  1465. }
  1466. }
  1467. if found {
  1468. p.updateSharesOrdering()
  1469. }
  1470. }
  1471. func (p *MemoryProvider) updateAPIKeysOrdering() {
  1472. // this could be more efficient
  1473. p.dbHandle.apiKeysIDs = make([]string, 0, len(p.dbHandle.apiKeys))
  1474. for keyID := range p.dbHandle.apiKeys {
  1475. p.dbHandle.apiKeysIDs = append(p.dbHandle.apiKeysIDs, keyID)
  1476. }
  1477. sort.Strings(p.dbHandle.apiKeysIDs)
  1478. }
  1479. func (p *MemoryProvider) updateSharesOrdering() {
  1480. // this could be more efficient
  1481. p.dbHandle.sharesIDs = make([]string, 0, len(p.dbHandle.shares))
  1482. for shareID := range p.dbHandle.shares {
  1483. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, shareID)
  1484. }
  1485. sort.Strings(p.dbHandle.sharesIDs)
  1486. }
  1487. func (p *MemoryProvider) shareExistsInternal(shareID, username string) (Share, error) {
  1488. if val, ok := p.dbHandle.shares[shareID]; ok {
  1489. if username != "" && val.Username != username {
  1490. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %#v does not exist", shareID))
  1491. }
  1492. return val.getACopy(), nil
  1493. }
  1494. return Share{}, util.NewRecordNotFoundError(fmt.Sprintf("Share %#v does not exist", shareID))
  1495. }
  1496. func (p *MemoryProvider) shareExists(shareID, username string) (Share, error) {
  1497. p.dbHandle.Lock()
  1498. defer p.dbHandle.Unlock()
  1499. if p.dbHandle.isClosed {
  1500. return Share{}, errMemoryProviderClosed
  1501. }
  1502. return p.shareExistsInternal(shareID, username)
  1503. }
  1504. func (p *MemoryProvider) addShare(share *Share) error {
  1505. err := share.validate()
  1506. if err != nil {
  1507. return err
  1508. }
  1509. p.dbHandle.Lock()
  1510. defer p.dbHandle.Unlock()
  1511. if p.dbHandle.isClosed {
  1512. return errMemoryProviderClosed
  1513. }
  1514. _, err = p.shareExistsInternal(share.ShareID, share.Username)
  1515. if err == nil {
  1516. return fmt.Errorf("share %#v already exists", share.ShareID)
  1517. }
  1518. if _, err := p.userExistsInternal(share.Username); err != nil {
  1519. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", share.Username))
  1520. }
  1521. if !share.IsRestore {
  1522. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1523. share.UpdatedAt = share.CreatedAt
  1524. share.LastUseAt = 0
  1525. share.UsedTokens = 0
  1526. }
  1527. if share.CreatedAt == 0 {
  1528. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1529. }
  1530. if share.UpdatedAt == 0 {
  1531. share.UpdatedAt = share.CreatedAt
  1532. }
  1533. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1534. p.dbHandle.sharesIDs = append(p.dbHandle.sharesIDs, share.ShareID)
  1535. sort.Strings(p.dbHandle.sharesIDs)
  1536. return nil
  1537. }
  1538. func (p *MemoryProvider) updateShare(share *Share) error {
  1539. err := share.validate()
  1540. if err != nil {
  1541. return err
  1542. }
  1543. p.dbHandle.Lock()
  1544. defer p.dbHandle.Unlock()
  1545. if p.dbHandle.isClosed {
  1546. return errMemoryProviderClosed
  1547. }
  1548. s, err := p.shareExistsInternal(share.ShareID, share.Username)
  1549. if err != nil {
  1550. return err
  1551. }
  1552. if _, err := p.userExistsInternal(share.Username); err != nil {
  1553. return util.NewValidationError(fmt.Sprintf("related user %#v does not exists", share.Username))
  1554. }
  1555. share.ID = s.ID
  1556. share.ShareID = s.ShareID
  1557. if !share.IsRestore {
  1558. share.UsedTokens = s.UsedTokens
  1559. share.CreatedAt = s.CreatedAt
  1560. share.LastUseAt = s.LastUseAt
  1561. share.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1562. }
  1563. if share.CreatedAt == 0 {
  1564. share.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1565. }
  1566. if share.UpdatedAt == 0 {
  1567. share.UpdatedAt = share.CreatedAt
  1568. }
  1569. p.dbHandle.shares[share.ShareID] = share.getACopy()
  1570. return nil
  1571. }
  1572. func (p *MemoryProvider) deleteShare(share Share) error {
  1573. p.dbHandle.Lock()
  1574. defer p.dbHandle.Unlock()
  1575. if p.dbHandle.isClosed {
  1576. return errMemoryProviderClosed
  1577. }
  1578. _, err := p.shareExistsInternal(share.ShareID, share.Username)
  1579. if err != nil {
  1580. return err
  1581. }
  1582. delete(p.dbHandle.shares, share.ShareID)
  1583. p.updateSharesOrdering()
  1584. return nil
  1585. }
  1586. func (p *MemoryProvider) getShares(limit int, offset int, order, username string) ([]Share, error) {
  1587. p.dbHandle.Lock()
  1588. defer p.dbHandle.Unlock()
  1589. if p.dbHandle.isClosed {
  1590. return []Share{}, errMemoryProviderClosed
  1591. }
  1592. if limit <= 0 {
  1593. return []Share{}, nil
  1594. }
  1595. shares := make([]Share, 0, limit)
  1596. itNum := 0
  1597. if order == OrderDESC {
  1598. for i := len(p.dbHandle.sharesIDs) - 1; i >= 0; i-- {
  1599. shareID := p.dbHandle.sharesIDs[i]
  1600. s := p.dbHandle.shares[shareID]
  1601. if s.Username != username {
  1602. continue
  1603. }
  1604. itNum++
  1605. if itNum <= offset {
  1606. continue
  1607. }
  1608. share := s.getACopy()
  1609. share.HideConfidentialData()
  1610. shares = append(shares, share)
  1611. if len(shares) >= limit {
  1612. break
  1613. }
  1614. }
  1615. } else {
  1616. for _, shareID := range p.dbHandle.sharesIDs {
  1617. s := p.dbHandle.shares[shareID]
  1618. if s.Username != username {
  1619. continue
  1620. }
  1621. itNum++
  1622. if itNum <= offset {
  1623. continue
  1624. }
  1625. share := s.getACopy()
  1626. share.HideConfidentialData()
  1627. shares = append(shares, share)
  1628. if len(shares) >= limit {
  1629. break
  1630. }
  1631. }
  1632. }
  1633. return shares, nil
  1634. }
  1635. func (p *MemoryProvider) dumpShares() ([]Share, error) {
  1636. p.dbHandle.Lock()
  1637. defer p.dbHandle.Unlock()
  1638. shares := make([]Share, 0, len(p.dbHandle.shares))
  1639. if p.dbHandle.isClosed {
  1640. return shares, errMemoryProviderClosed
  1641. }
  1642. for _, s := range p.dbHandle.shares {
  1643. shares = append(shares, s)
  1644. }
  1645. return shares, nil
  1646. }
  1647. func (p *MemoryProvider) updateShareLastUse(shareID string, numTokens int) error {
  1648. p.dbHandle.Lock()
  1649. defer p.dbHandle.Unlock()
  1650. if p.dbHandle.isClosed {
  1651. return errMemoryProviderClosed
  1652. }
  1653. share, err := p.shareExistsInternal(shareID, "")
  1654. if err != nil {
  1655. return err
  1656. }
  1657. share.LastUseAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1658. share.UsedTokens += numTokens
  1659. p.dbHandle.shares[share.ShareID] = share
  1660. return nil
  1661. }
  1662. func (p *MemoryProvider) getDefenderHosts(from int64, limit int) ([]DefenderEntry, error) {
  1663. return nil, ErrNotImplemented
  1664. }
  1665. func (p *MemoryProvider) getDefenderHostByIP(ip string, from int64) (DefenderEntry, error) {
  1666. return DefenderEntry{}, ErrNotImplemented
  1667. }
  1668. func (p *MemoryProvider) isDefenderHostBanned(ip string) (DefenderEntry, error) {
  1669. return DefenderEntry{}, ErrNotImplemented
  1670. }
  1671. func (p *MemoryProvider) updateDefenderBanTime(ip string, minutes int) error {
  1672. return ErrNotImplemented
  1673. }
  1674. func (p *MemoryProvider) deleteDefenderHost(ip string) error {
  1675. return ErrNotImplemented
  1676. }
  1677. func (p *MemoryProvider) addDefenderEvent(ip string, score int) error {
  1678. return ErrNotImplemented
  1679. }
  1680. func (p *MemoryProvider) setDefenderBanTime(ip string, banTime int64) error {
  1681. return ErrNotImplemented
  1682. }
  1683. func (p *MemoryProvider) cleanupDefender(from int64) error {
  1684. return ErrNotImplemented
  1685. }
  1686. func (p *MemoryProvider) addActiveTransfer(transfer ActiveTransfer) error {
  1687. return ErrNotImplemented
  1688. }
  1689. func (p *MemoryProvider) updateActiveTransferSizes(ulSize, dlSize, transferID int64, connectionID string) error {
  1690. return ErrNotImplemented
  1691. }
  1692. func (p *MemoryProvider) removeActiveTransfer(transferID int64, connectionID string) error {
  1693. return ErrNotImplemented
  1694. }
  1695. func (p *MemoryProvider) cleanupActiveTransfers(before time.Time) error {
  1696. return ErrNotImplemented
  1697. }
  1698. func (p *MemoryProvider) getActiveTransfers(from time.Time) ([]ActiveTransfer, error) {
  1699. return nil, ErrNotImplemented
  1700. }
  1701. func (p *MemoryProvider) addSharedSession(session Session) error {
  1702. return ErrNotImplemented
  1703. }
  1704. func (p *MemoryProvider) deleteSharedSession(key string) error {
  1705. return ErrNotImplemented
  1706. }
  1707. func (p *MemoryProvider) getSharedSession(key string) (Session, error) {
  1708. return Session{}, ErrNotImplemented
  1709. }
  1710. func (p *MemoryProvider) cleanupSharedSessions(sessionType SessionType, before int64) error {
  1711. return ErrNotImplemented
  1712. }
  1713. func (p *MemoryProvider) getEventActions(limit, offset int, order string, minimal bool) ([]BaseEventAction, error) {
  1714. p.dbHandle.Lock()
  1715. defer p.dbHandle.Unlock()
  1716. if p.dbHandle.isClosed {
  1717. return nil, errMemoryProviderClosed
  1718. }
  1719. if limit <= 0 {
  1720. return nil, nil
  1721. }
  1722. actions := make([]BaseEventAction, 0, limit)
  1723. itNum := 0
  1724. if order == OrderASC {
  1725. for _, name := range p.dbHandle.actionsNames {
  1726. itNum++
  1727. if itNum <= offset {
  1728. continue
  1729. }
  1730. a := p.dbHandle.actions[name]
  1731. action := a.getACopy()
  1732. action.PrepareForRendering()
  1733. actions = append(actions, action)
  1734. if len(actions) >= limit {
  1735. break
  1736. }
  1737. }
  1738. } else {
  1739. for i := len(p.dbHandle.actionsNames) - 1; i >= 0; i-- {
  1740. itNum++
  1741. if itNum <= offset {
  1742. continue
  1743. }
  1744. name := p.dbHandle.actionsNames[i]
  1745. a := p.dbHandle.actions[name]
  1746. action := a.getACopy()
  1747. action.PrepareForRendering()
  1748. actions = append(actions, action)
  1749. if len(actions) >= limit {
  1750. break
  1751. }
  1752. }
  1753. }
  1754. return actions, nil
  1755. }
  1756. func (p *MemoryProvider) dumpEventActions() ([]BaseEventAction, error) {
  1757. p.dbHandle.Lock()
  1758. defer p.dbHandle.Unlock()
  1759. if p.dbHandle.isClosed {
  1760. return nil, errMemoryProviderClosed
  1761. }
  1762. actions := make([]BaseEventAction, 0, len(p.dbHandle.actions))
  1763. for _, name := range p.dbHandle.actionsNames {
  1764. a := p.dbHandle.actions[name]
  1765. action := a.getACopy()
  1766. actions = append(actions, action)
  1767. }
  1768. return actions, nil
  1769. }
  1770. func (p *MemoryProvider) eventActionExists(name string) (BaseEventAction, error) {
  1771. p.dbHandle.Lock()
  1772. defer p.dbHandle.Unlock()
  1773. if p.dbHandle.isClosed {
  1774. return BaseEventAction{}, errMemoryProviderClosed
  1775. }
  1776. return p.actionExistsInternal(name)
  1777. }
  1778. func (p *MemoryProvider) addEventAction(action *BaseEventAction) error {
  1779. err := action.validate()
  1780. if err != nil {
  1781. return err
  1782. }
  1783. p.dbHandle.Lock()
  1784. defer p.dbHandle.Unlock()
  1785. if p.dbHandle.isClosed {
  1786. return errMemoryProviderClosed
  1787. }
  1788. _, err = p.actionExistsInternal(action.Name)
  1789. if err == nil {
  1790. return fmt.Errorf("event action %q already exists", action.Name)
  1791. }
  1792. action.ID = p.getNextActionID()
  1793. action.Rules = nil
  1794. p.dbHandle.actions[action.Name] = action.getACopy()
  1795. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, action.Name)
  1796. sort.Strings(p.dbHandle.actionsNames)
  1797. return nil
  1798. }
  1799. func (p *MemoryProvider) updateEventAction(action *BaseEventAction) error {
  1800. err := action.validate()
  1801. if err != nil {
  1802. return err
  1803. }
  1804. p.dbHandle.Lock()
  1805. defer p.dbHandle.Unlock()
  1806. if p.dbHandle.isClosed {
  1807. return errMemoryProviderClosed
  1808. }
  1809. oldAction, err := p.actionExistsInternal(action.Name)
  1810. if err != nil {
  1811. return fmt.Errorf("event action %s does not exist", action.Name)
  1812. }
  1813. action.ID = oldAction.ID
  1814. action.Name = oldAction.Name
  1815. action.Rules = nil
  1816. if len(oldAction.Rules) > 0 {
  1817. var relatedRules []string
  1818. for _, ruleName := range oldAction.Rules {
  1819. rule, err := p.ruleExistsInternal(ruleName)
  1820. if err == nil {
  1821. relatedRules = append(relatedRules, ruleName)
  1822. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1823. p.dbHandle.rules[ruleName] = rule
  1824. setLastRuleUpdate()
  1825. }
  1826. }
  1827. action.Rules = relatedRules
  1828. }
  1829. p.dbHandle.actions[action.Name] = action.getACopy()
  1830. return nil
  1831. }
  1832. func (p *MemoryProvider) deleteEventAction(action BaseEventAction) error {
  1833. p.dbHandle.Lock()
  1834. defer p.dbHandle.Unlock()
  1835. if p.dbHandle.isClosed {
  1836. return errMemoryProviderClosed
  1837. }
  1838. oldAction, err := p.actionExistsInternal(action.Name)
  1839. if err != nil {
  1840. return fmt.Errorf("event action %s does not exist", action.Name)
  1841. }
  1842. if len(oldAction.Rules) > 0 {
  1843. return util.NewValidationError(fmt.Sprintf("action %s is referenced, it cannot be removed", oldAction.Name))
  1844. }
  1845. delete(p.dbHandle.actions, action.Name)
  1846. // this could be more efficient
  1847. p.dbHandle.actionsNames = make([]string, 0, len(p.dbHandle.actions))
  1848. for name := range p.dbHandle.actions {
  1849. p.dbHandle.actionsNames = append(p.dbHandle.actionsNames, name)
  1850. }
  1851. sort.Strings(p.dbHandle.actionsNames)
  1852. return nil
  1853. }
  1854. func (p *MemoryProvider) getEventRules(limit, offset int, order string) ([]EventRule, error) {
  1855. p.dbHandle.Lock()
  1856. defer p.dbHandle.Unlock()
  1857. if p.dbHandle.isClosed {
  1858. return nil, errMemoryProviderClosed
  1859. }
  1860. if limit <= 0 {
  1861. return nil, nil
  1862. }
  1863. itNum := 0
  1864. rules := make([]EventRule, 0, limit)
  1865. if order == OrderASC {
  1866. for _, name := range p.dbHandle.rulesNames {
  1867. itNum++
  1868. if itNum <= offset {
  1869. continue
  1870. }
  1871. r := p.dbHandle.rules[name]
  1872. rule := r.getACopy()
  1873. p.addActionsToRule(&rule)
  1874. rule.PrepareForRendering()
  1875. rules = append(rules, rule)
  1876. if len(rules) >= limit {
  1877. break
  1878. }
  1879. }
  1880. } else {
  1881. for i := len(p.dbHandle.rulesNames) - 1; i >= 0; i-- {
  1882. itNum++
  1883. if itNum <= offset {
  1884. continue
  1885. }
  1886. name := p.dbHandle.rulesNames[i]
  1887. r := p.dbHandle.rules[name]
  1888. rule := r.getACopy()
  1889. p.addActionsToRule(&rule)
  1890. rule.PrepareForRendering()
  1891. rules = append(rules, rule)
  1892. if len(rules) >= limit {
  1893. break
  1894. }
  1895. }
  1896. }
  1897. return rules, nil
  1898. }
  1899. func (p *MemoryProvider) dumpEventRules() ([]EventRule, error) {
  1900. p.dbHandle.Lock()
  1901. defer p.dbHandle.Unlock()
  1902. if p.dbHandle.isClosed {
  1903. return nil, errMemoryProviderClosed
  1904. }
  1905. rules := make([]EventRule, 0, len(p.dbHandle.rules))
  1906. for _, name := range p.dbHandle.rulesNames {
  1907. r := p.dbHandle.rules[name]
  1908. rule := r.getACopy()
  1909. p.addActionsToRule(&rule)
  1910. rules = append(rules, rule)
  1911. }
  1912. return rules, nil
  1913. }
  1914. func (p *MemoryProvider) getRecentlyUpdatedRules(after int64) ([]EventRule, error) {
  1915. if getLastRuleUpdate() < after {
  1916. return nil, nil
  1917. }
  1918. p.dbHandle.Lock()
  1919. defer p.dbHandle.Unlock()
  1920. if p.dbHandle.isClosed {
  1921. return nil, errMemoryProviderClosed
  1922. }
  1923. rules := make([]EventRule, 0, 10)
  1924. for _, name := range p.dbHandle.rulesNames {
  1925. r := p.dbHandle.rules[name]
  1926. if r.UpdatedAt < after {
  1927. continue
  1928. }
  1929. rule := r.getACopy()
  1930. p.addActionsToRule(&rule)
  1931. rules = append(rules, rule)
  1932. }
  1933. return rules, nil
  1934. }
  1935. func (p *MemoryProvider) eventRuleExists(name string) (EventRule, error) {
  1936. p.dbHandle.Lock()
  1937. defer p.dbHandle.Unlock()
  1938. if p.dbHandle.isClosed {
  1939. return EventRule{}, errMemoryProviderClosed
  1940. }
  1941. rule, err := p.ruleExistsInternal(name)
  1942. if err != nil {
  1943. return rule, err
  1944. }
  1945. p.addActionsToRule(&rule)
  1946. return rule, nil
  1947. }
  1948. func (p *MemoryProvider) addEventRule(rule *EventRule) error {
  1949. if err := rule.validate(); err != nil {
  1950. return err
  1951. }
  1952. p.dbHandle.Lock()
  1953. defer p.dbHandle.Unlock()
  1954. if p.dbHandle.isClosed {
  1955. return errMemoryProviderClosed
  1956. }
  1957. _, err := p.ruleExistsInternal(rule.Name)
  1958. if err == nil {
  1959. return fmt.Errorf("event rule %q already exists", rule.Name)
  1960. }
  1961. rule.ID = p.getNextRuleID()
  1962. rule.CreatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  1963. rule.UpdatedAt = rule.CreatedAt
  1964. for idx := range rule.Actions {
  1965. if err := p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  1966. return err
  1967. }
  1968. }
  1969. sort.Slice(rule.Actions, func(i, j int) bool {
  1970. return rule.Actions[i].Order < rule.Actions[j].Order
  1971. })
  1972. p.dbHandle.rules[rule.Name] = rule.getACopy()
  1973. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, rule.Name)
  1974. sort.Strings(p.dbHandle.rulesNames)
  1975. setLastRuleUpdate()
  1976. return nil
  1977. }
  1978. func (p *MemoryProvider) updateEventRule(rule *EventRule) error {
  1979. if err := rule.validate(); err != nil {
  1980. return err
  1981. }
  1982. p.dbHandle.Lock()
  1983. defer p.dbHandle.Unlock()
  1984. if p.dbHandle.isClosed {
  1985. return errMemoryProviderClosed
  1986. }
  1987. oldRule, err := p.ruleExistsInternal(rule.Name)
  1988. if err != nil {
  1989. return err
  1990. }
  1991. for idx := range oldRule.Actions {
  1992. if err = p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name); err != nil {
  1993. return err
  1994. }
  1995. }
  1996. for idx := range rule.Actions {
  1997. if err = p.addRuleToActionMapping(rule.Name, rule.Actions[idx].Name); err != nil {
  1998. return err
  1999. }
  2000. }
  2001. rule.ID = oldRule.ID
  2002. rule.CreatedAt = oldRule.CreatedAt
  2003. rule.UpdatedAt = util.GetTimeAsMsSinceEpoch(time.Now())
  2004. sort.Slice(rule.Actions, func(i, j int) bool {
  2005. return rule.Actions[i].Order < rule.Actions[j].Order
  2006. })
  2007. p.dbHandle.rules[rule.Name] = rule.getACopy()
  2008. setLastRuleUpdate()
  2009. return nil
  2010. }
  2011. func (p *MemoryProvider) deleteEventRule(rule EventRule, softDelete bool) error {
  2012. p.dbHandle.Lock()
  2013. defer p.dbHandle.Unlock()
  2014. if p.dbHandle.isClosed {
  2015. return errMemoryProviderClosed
  2016. }
  2017. oldRule, err := p.ruleExistsInternal(rule.Name)
  2018. if err != nil {
  2019. return err
  2020. }
  2021. if len(oldRule.Actions) > 0 {
  2022. for idx := range oldRule.Actions {
  2023. if err = p.removeRuleFromActionMapping(rule.Name, oldRule.Actions[idx].Name); err != nil {
  2024. return err
  2025. }
  2026. }
  2027. }
  2028. delete(p.dbHandle.rules, rule.Name)
  2029. p.dbHandle.rulesNames = make([]string, 0, len(p.dbHandle.rules))
  2030. for name := range p.dbHandle.rules {
  2031. p.dbHandle.rulesNames = append(p.dbHandle.rulesNames, name)
  2032. }
  2033. sort.Strings(p.dbHandle.rulesNames)
  2034. setLastRuleUpdate()
  2035. return nil
  2036. }
  2037. func (p *MemoryProvider) getTaskByName(name string) (Task, error) {
  2038. return Task{}, ErrNotImplemented
  2039. }
  2040. func (p *MemoryProvider) addTask(name string) error {
  2041. return ErrNotImplemented
  2042. }
  2043. func (p *MemoryProvider) updateTask(name string, version int64) error {
  2044. return ErrNotImplemented
  2045. }
  2046. func (p *MemoryProvider) updateTaskTimestamp(name string) error {
  2047. return ErrNotImplemented
  2048. }
  2049. func (p *MemoryProvider) getNextID() int64 {
  2050. nextID := int64(1)
  2051. for _, v := range p.dbHandle.users {
  2052. if v.ID >= nextID {
  2053. nextID = v.ID + 1
  2054. }
  2055. }
  2056. return nextID
  2057. }
  2058. func (p *MemoryProvider) getNextFolderID() int64 {
  2059. nextID := int64(1)
  2060. for _, v := range p.dbHandle.vfolders {
  2061. if v.ID >= nextID {
  2062. nextID = v.ID + 1
  2063. }
  2064. }
  2065. return nextID
  2066. }
  2067. func (p *MemoryProvider) getNextAdminID() int64 {
  2068. nextID := int64(1)
  2069. for _, a := range p.dbHandle.admins {
  2070. if a.ID >= nextID {
  2071. nextID = a.ID + 1
  2072. }
  2073. }
  2074. return nextID
  2075. }
  2076. func (p *MemoryProvider) getNextGroupID() int64 {
  2077. nextID := int64(1)
  2078. for _, g := range p.dbHandle.groups {
  2079. if g.ID >= nextID {
  2080. nextID = g.ID + 1
  2081. }
  2082. }
  2083. return nextID
  2084. }
  2085. func (p *MemoryProvider) getNextActionID() int64 {
  2086. nextID := int64(1)
  2087. for _, a := range p.dbHandle.actions {
  2088. if a.ID >= nextID {
  2089. nextID = a.ID + 1
  2090. }
  2091. }
  2092. return nextID
  2093. }
  2094. func (p *MemoryProvider) getNextRuleID() int64 {
  2095. nextID := int64(1)
  2096. for _, r := range p.dbHandle.rules {
  2097. if r.ID >= nextID {
  2098. nextID = r.ID + 1
  2099. }
  2100. }
  2101. return nextID
  2102. }
  2103. func (p *MemoryProvider) clear() {
  2104. p.dbHandle.Lock()
  2105. defer p.dbHandle.Unlock()
  2106. p.dbHandle.usernames = []string{}
  2107. p.dbHandle.users = make(map[string]User)
  2108. p.dbHandle.vfoldersNames = []string{}
  2109. p.dbHandle.vfolders = make(map[string]vfs.BaseVirtualFolder)
  2110. p.dbHandle.admins = make(map[string]Admin)
  2111. p.dbHandle.adminsUsernames = []string{}
  2112. p.dbHandle.apiKeys = make(map[string]APIKey)
  2113. p.dbHandle.apiKeysIDs = []string{}
  2114. p.dbHandle.shares = make(map[string]Share)
  2115. p.dbHandle.sharesIDs = []string{}
  2116. }
  2117. func (p *MemoryProvider) reloadConfig() error {
  2118. if p.dbHandle.configFile == "" {
  2119. providerLog(logger.LevelDebug, "no dump configuration file defined")
  2120. return nil
  2121. }
  2122. providerLog(logger.LevelDebug, "loading dump from file: %#v", p.dbHandle.configFile)
  2123. fi, err := os.Stat(p.dbHandle.configFile)
  2124. if err != nil {
  2125. providerLog(logger.LevelError, "error loading dump: %v", err)
  2126. return err
  2127. }
  2128. if fi.Size() == 0 {
  2129. err = errors.New("dump configuration file is invalid, its size must be > 0")
  2130. providerLog(logger.LevelError, "error loading dump: %v", err)
  2131. return err
  2132. }
  2133. if fi.Size() > 10485760 {
  2134. err = errors.New("dump configuration file is invalid, its size must be <= 10485760 bytes")
  2135. providerLog(logger.LevelError, "error loading dump: %v", err)
  2136. return err
  2137. }
  2138. content, err := os.ReadFile(p.dbHandle.configFile)
  2139. if err != nil {
  2140. providerLog(logger.LevelError, "error loading dump: %v", err)
  2141. return err
  2142. }
  2143. dump, err := ParseDumpData(content)
  2144. if err != nil {
  2145. providerLog(logger.LevelError, "error loading dump: %v", err)
  2146. return err
  2147. }
  2148. p.clear()
  2149. if err := p.restoreFolders(dump); err != nil {
  2150. return err
  2151. }
  2152. if err := p.restoreGroups(dump); err != nil {
  2153. return err
  2154. }
  2155. if err := p.restoreUsers(dump); err != nil {
  2156. return err
  2157. }
  2158. if err := p.restoreAdmins(dump); err != nil {
  2159. return err
  2160. }
  2161. if err := p.restoreAPIKeys(dump); err != nil {
  2162. return err
  2163. }
  2164. if err := p.restoreShares(dump); err != nil {
  2165. return err
  2166. }
  2167. if err := p.restoreEventActions(dump); err != nil {
  2168. return err
  2169. }
  2170. if err := p.restoreEventRules(dump); err != nil {
  2171. return err
  2172. }
  2173. providerLog(logger.LevelDebug, "config loaded from file: %#v", p.dbHandle.configFile)
  2174. return nil
  2175. }
  2176. func (p *MemoryProvider) restoreEventActions(dump BackupData) error {
  2177. for _, action := range dump.EventActions {
  2178. a, err := p.eventActionExists(action.Name)
  2179. action := action // pin
  2180. if err == nil {
  2181. action.ID = a.ID
  2182. err = UpdateEventAction(&action, ActionExecutorSystem, "")
  2183. if err != nil {
  2184. providerLog(logger.LevelError, "error updating event action %q: %v", action.Name, err)
  2185. return err
  2186. }
  2187. } else {
  2188. err = AddEventAction(&action, ActionExecutorSystem, "")
  2189. if err != nil {
  2190. providerLog(logger.LevelError, "error adding event action %q: %v", action.Name, err)
  2191. return err
  2192. }
  2193. }
  2194. }
  2195. return nil
  2196. }
  2197. func (p *MemoryProvider) restoreEventRules(dump BackupData) error {
  2198. for _, rule := range dump.EventRules {
  2199. r, err := p.eventRuleExists(rule.Name)
  2200. rule := rule // pin
  2201. if err == nil {
  2202. rule.ID = r.ID
  2203. err = UpdateEventRule(&rule, ActionExecutorSystem, "")
  2204. if err != nil {
  2205. providerLog(logger.LevelError, "error updating event rule %q: %v", rule.Name, err)
  2206. return err
  2207. }
  2208. } else {
  2209. err = AddEventRule(&rule, ActionExecutorSystem, "")
  2210. if err != nil {
  2211. providerLog(logger.LevelError, "error adding event rule %q: %v", rule.Name, err)
  2212. return err
  2213. }
  2214. }
  2215. }
  2216. return nil
  2217. }
  2218. func (p *MemoryProvider) restoreShares(dump BackupData) error {
  2219. for _, share := range dump.Shares {
  2220. s, err := p.shareExists(share.ShareID, "")
  2221. share := share // pin
  2222. share.IsRestore = true
  2223. if err == nil {
  2224. share.ID = s.ID
  2225. err = UpdateShare(&share, ActionExecutorSystem, "")
  2226. if err != nil {
  2227. providerLog(logger.LevelError, "error updating share %#v: %v", share.ShareID, err)
  2228. return err
  2229. }
  2230. } else {
  2231. err = AddShare(&share, ActionExecutorSystem, "")
  2232. if err != nil {
  2233. providerLog(logger.LevelError, "error adding share %#v: %v", share.ShareID, err)
  2234. return err
  2235. }
  2236. }
  2237. }
  2238. return nil
  2239. }
  2240. func (p *MemoryProvider) restoreAPIKeys(dump BackupData) error {
  2241. for _, apiKey := range dump.APIKeys {
  2242. if apiKey.Key == "" {
  2243. return fmt.Errorf("cannot restore an empty API key: %+v", apiKey)
  2244. }
  2245. k, err := p.apiKeyExists(apiKey.KeyID)
  2246. apiKey := apiKey // pin
  2247. if err == nil {
  2248. apiKey.ID = k.ID
  2249. err = UpdateAPIKey(&apiKey, ActionExecutorSystem, "")
  2250. if err != nil {
  2251. providerLog(logger.LevelError, "error updating API key %#v: %v", apiKey.KeyID, err)
  2252. return err
  2253. }
  2254. } else {
  2255. err = AddAPIKey(&apiKey, ActionExecutorSystem, "")
  2256. if err != nil {
  2257. providerLog(logger.LevelError, "error adding API key %#v: %v", apiKey.KeyID, err)
  2258. return err
  2259. }
  2260. }
  2261. }
  2262. return nil
  2263. }
  2264. func (p *MemoryProvider) restoreAdmins(dump BackupData) error {
  2265. for _, admin := range dump.Admins {
  2266. admin := admin // pin
  2267. admin.Username = config.convertName(admin.Username)
  2268. a, err := p.adminExists(admin.Username)
  2269. if err == nil {
  2270. admin.ID = a.ID
  2271. err = UpdateAdmin(&admin, ActionExecutorSystem, "")
  2272. if err != nil {
  2273. providerLog(logger.LevelError, "error updating admin %#v: %v", admin.Username, err)
  2274. return err
  2275. }
  2276. } else {
  2277. err = AddAdmin(&admin, ActionExecutorSystem, "")
  2278. if err != nil {
  2279. providerLog(logger.LevelError, "error adding admin %#v: %v", admin.Username, err)
  2280. return err
  2281. }
  2282. }
  2283. }
  2284. return nil
  2285. }
  2286. func (p *MemoryProvider) restoreGroups(dump BackupData) error {
  2287. for _, group := range dump.Groups {
  2288. group := group // pin
  2289. group.Name = config.convertName(group.Name)
  2290. g, err := p.groupExists(group.Name)
  2291. if err == nil {
  2292. group.ID = g.ID
  2293. err = UpdateGroup(&group, g.Users, ActionExecutorSystem, "")
  2294. if err != nil {
  2295. providerLog(logger.LevelError, "error updating group %#v: %v", group.Name, err)
  2296. return err
  2297. }
  2298. } else {
  2299. group.Users = nil
  2300. err = AddGroup(&group, ActionExecutorSystem, "")
  2301. if err != nil {
  2302. providerLog(logger.LevelError, "error adding group %#v: %v", group.Name, err)
  2303. return err
  2304. }
  2305. }
  2306. }
  2307. return nil
  2308. }
  2309. func (p *MemoryProvider) restoreFolders(dump BackupData) error {
  2310. for _, folder := range dump.Folders {
  2311. folder := folder // pin
  2312. folder.Name = config.convertName(folder.Name)
  2313. f, err := p.getFolderByName(folder.Name)
  2314. if err == nil {
  2315. folder.ID = f.ID
  2316. err = UpdateFolder(&folder, f.Users, f.Groups, ActionExecutorSystem, "")
  2317. if err != nil {
  2318. providerLog(logger.LevelError, "error updating folder %#v: %v", folder.Name, err)
  2319. return err
  2320. }
  2321. } else {
  2322. folder.Users = nil
  2323. err = AddFolder(&folder, ActionExecutorSystem, "")
  2324. if err != nil {
  2325. providerLog(logger.LevelError, "error adding folder %#v: %v", folder.Name, err)
  2326. return err
  2327. }
  2328. }
  2329. }
  2330. return nil
  2331. }
  2332. func (p *MemoryProvider) restoreUsers(dump BackupData) error {
  2333. for _, user := range dump.Users {
  2334. user := user // pin
  2335. user.Username = config.convertName(user.Username)
  2336. u, err := p.userExists(user.Username)
  2337. if err == nil {
  2338. user.ID = u.ID
  2339. err = UpdateUser(&user, ActionExecutorSystem, "")
  2340. if err != nil {
  2341. providerLog(logger.LevelError, "error updating user %#v: %v", user.Username, err)
  2342. return err
  2343. }
  2344. } else {
  2345. err = AddUser(&user, ActionExecutorSystem, "")
  2346. if err != nil {
  2347. providerLog(logger.LevelError, "error adding user %#v: %v", user.Username, err)
  2348. return err
  2349. }
  2350. }
  2351. }
  2352. return nil
  2353. }
  2354. // initializeDatabase does nothing, no initilization is needed for memory provider
  2355. func (p *MemoryProvider) initializeDatabase() error {
  2356. return ErrNoInitRequired
  2357. }
  2358. func (p *MemoryProvider) migrateDatabase() error {
  2359. return ErrNoInitRequired
  2360. }
  2361. func (p *MemoryProvider) revertDatabase(targetVersion int) error {
  2362. return errors.New("memory provider does not store data, revert not possible")
  2363. }
  2364. func (p *MemoryProvider) resetDatabase() error {
  2365. return errors.New("memory provider does not store data, reset not possible")
  2366. }