| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043 |
- package dataprovider
- import (
- "encoding/json"
- "errors"
- "fmt"
- "net"
- "os"
- "path"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- "golang.org/x/net/webdav"
- "github.com/drakkan/sftpgo/kms"
- "github.com/drakkan/sftpgo/logger"
- "github.com/drakkan/sftpgo/utils"
- "github.com/drakkan/sftpgo/vfs"
- )
- // Available permissions for SFTPGo users
- const (
- // All permissions are granted
- PermAny = "*"
- // List items such as files and directories is allowed
- PermListItems = "list"
- // download files is allowed
- PermDownload = "download"
- // upload files is allowed
- PermUpload = "upload"
- // overwrite an existing file, while uploading, is allowed
- // upload permission is required to allow file overwrite
- PermOverwrite = "overwrite"
- // delete files or directories is allowed
- PermDelete = "delete"
- // rename files or directories is allowed
- PermRename = "rename"
- // create directories is allowed
- PermCreateDirs = "create_dirs"
- // create symbolic links is allowed
- PermCreateSymlinks = "create_symlinks"
- // changing file or directory permissions is allowed
- PermChmod = "chmod"
- // changing file or directory owner and group is allowed
- PermChown = "chown"
- // changing file or directory access and modification time is allowed
- PermChtimes = "chtimes"
- )
- // Available login methods
- const (
- LoginMethodNoAuthTryed = "no_auth_tryed"
- LoginMethodPassword = "password"
- SSHLoginMethodPublicKey = "publickey"
- SSHLoginMethodKeyboardInteractive = "keyboard-interactive"
- SSHLoginMethodKeyAndPassword = "publickey+password"
- SSHLoginMethodKeyAndKeyboardInt = "publickey+keyboard-interactive"
- LoginMethodTLSCertificate = "TLSCertificate"
- LoginMethodTLSCertificateAndPwd = "TLSCertificate+password"
- )
- // TLSUsername defines the TLS certificate attribute to use as username
- type TLSUsername string
- // Supported certificate attributes to use as username
- const (
- TLSUsernameNone TLSUsername = "None"
- TLSUsernameCN TLSUsername = "CommonName"
- )
- var (
- errNoMatchingVirtualFolder = errors.New("no matching virtual folder found")
- )
- // CachedUser adds fields useful for caching to a SFTPGo user
- type CachedUser struct {
- User User
- Expiration time.Time
- Password string
- LockSystem webdav.LockSystem
- }
- // IsExpired returns true if the cached user is expired
- func (c *CachedUser) IsExpired() bool {
- if c.Expiration.IsZero() {
- return false
- }
- return c.Expiration.Before(time.Now())
- }
- // ExtensionsFilter defines filters based on file extensions.
- // These restrictions do not apply to files listing for performance reasons, so
- // a denied file cannot be downloaded/overwritten/renamed but will still be
- // in the list of files.
- // System commands such as Git and rsync interacts with the filesystem directly
- // and they are not aware about these restrictions so they are not allowed
- // inside paths with extensions filters
- type ExtensionsFilter struct {
- // Virtual path, if no other specific filter is defined, the filter apply for
- // sub directories too.
- // For example if filters are defined for the paths "/" and "/sub" then the
- // filters for "/" are applied for any file outside the "/sub" directory
- Path string `json:"path"`
- // only files with these, case insensitive, extensions are allowed.
- // Shell like expansion is not supported so you have to specify ".jpg" and
- // not "*.jpg". If you want shell like patterns use pattern filters
- AllowedExtensions []string `json:"allowed_extensions,omitempty"`
- // files with these, case insensitive, extensions are not allowed.
- // Denied file extensions are evaluated before the allowed ones
- DeniedExtensions []string `json:"denied_extensions,omitempty"`
- }
- // PatternsFilter defines filters based on shell like patterns.
- // These restrictions do not apply to files listing for performance reasons, so
- // a denied file cannot be downloaded/overwritten/renamed but will still be
- // in the list of files.
- // System commands such as Git and rsync interacts with the filesystem directly
- // and they are not aware about these restrictions so they are not allowed
- // inside paths with extensions filters
- type PatternsFilter struct {
- // Virtual path, if no other specific filter is defined, the filter apply for
- // sub directories too.
- // For example if filters are defined for the paths "/" and "/sub" then the
- // filters for "/" are applied for any file outside the "/sub" directory
- Path string `json:"path"`
- // files with these, case insensitive, patterns are allowed.
- // Denied file patterns are evaluated before the allowed ones
- AllowedPatterns []string `json:"allowed_patterns,omitempty"`
- // files with these, case insensitive, patterns are not allowed.
- // Denied file patterns are evaluated before the allowed ones
- DeniedPatterns []string `json:"denied_patterns,omitempty"`
- }
- // UserFilters defines additional restrictions for a user
- type UserFilters struct {
- // only clients connecting from these IP/Mask are allowed.
- // IP/Mask must be in CIDR notation as defined in RFC 4632 and RFC 4291
- // for example "192.0.2.0/24" or "2001:db8::/32"
- AllowedIP []string `json:"allowed_ip,omitempty"`
- // clients connecting from these IP/Mask are not allowed.
- // Denied rules will be evaluated before allowed ones
- DeniedIP []string `json:"denied_ip,omitempty"`
- // these login methods are not allowed.
- // If null or empty any available login method is allowed
- DeniedLoginMethods []string `json:"denied_login_methods,omitempty"`
- // these protocols are not allowed.
- // If null or empty any available protocol is allowed
- DeniedProtocols []string `json:"denied_protocols,omitempty"`
- // filters based on file extensions.
- // Please note that these restrictions can be easily bypassed.
- FileExtensions []ExtensionsFilter `json:"file_extensions,omitempty"`
- // filter based on shell patterns
- FilePatterns []PatternsFilter `json:"file_patterns,omitempty"`
- // max size allowed for a single upload, 0 means unlimited
- MaxUploadFileSize int64 `json:"max_upload_file_size,omitempty"`
- // TLS certificate attribute to use as username.
- // For FTP clients it must match the name provided using the
- // "USER" command
- TLSUsername TLSUsername `json:"tls_username,omitempty"`
- }
- // User defines a SFTPGo user
- type User struct {
- // Database unique identifier
- ID int64 `json:"id"`
- // 1 enabled, 0 disabled (login is not allowed)
- Status int `json:"status"`
- // Username
- Username string `json:"username"`
- // Account expiration date as unix timestamp in milliseconds. An expired account cannot login.
- // 0 means no expiration
- ExpirationDate int64 `json:"expiration_date"`
- // Password used for password authentication.
- // For users created using SFTPGo REST API the password is be stored using argon2id hashing algo.
- // Checking passwords stored with bcrypt, pbkdf2, md5crypt and sha512crypt is supported too.
- Password string `json:"password,omitempty"`
- // PublicKeys used for public key authentication. At least one between password and a public key is mandatory
- PublicKeys []string `json:"public_keys,omitempty"`
- // The user cannot upload or download files outside this directory. Must be an absolute path
- HomeDir string `json:"home_dir"`
- // Mapping between virtual paths and virtual folders
- VirtualFolders []vfs.VirtualFolder `json:"virtual_folders,omitempty"`
- // If sftpgo runs as root system user then the created files and directories will be assigned to this system UID
- UID int `json:"uid"`
- // If sftpgo runs as root system user then the created files and directories will be assigned to this system GID
- GID int `json:"gid"`
- // Maximum concurrent sessions. 0 means unlimited
- MaxSessions int `json:"max_sessions"`
- // Maximum size allowed as bytes. 0 means unlimited
- QuotaSize int64 `json:"quota_size"`
- // Maximum number of files allowed. 0 means unlimited
- QuotaFiles int `json:"quota_files"`
- // List of the granted permissions
- Permissions map[string][]string `json:"permissions"`
- // Used quota as bytes
- UsedQuotaSize int64 `json:"used_quota_size"`
- // Used quota as number of files
- UsedQuotaFiles int `json:"used_quota_files"`
- // Last quota update as unix timestamp in milliseconds
- LastQuotaUpdate int64 `json:"last_quota_update"`
- // Maximum upload bandwidth as KB/s, 0 means unlimited
- UploadBandwidth int64 `json:"upload_bandwidth"`
- // Maximum download bandwidth as KB/s, 0 means unlimited
- DownloadBandwidth int64 `json:"download_bandwidth"`
- // Last login as unix timestamp in milliseconds
- LastLogin int64 `json:"last_login"`
- // Additional restrictions
- Filters UserFilters `json:"filters"`
- // Filesystem configuration details
- FsConfig vfs.Filesystem `json:"filesystem"`
- // optional description, for example full name
- Description string `json:"description,omitempty"`
- // free form text field for external systems
- AdditionalInfo string `json:"additional_info,omitempty"`
- // we store the filesystem here using the base path as key.
- fsCache map[string]vfs.Fs `json:"-"`
- }
- // GetFilesystem returns the base filesystem for this user
- func (u *User) GetFilesystem(connectionID string) (fs vfs.Fs, err error) {
- fs, err = u.getRootFs(connectionID)
- if err != nil {
- return fs, err
- }
- u.fsCache = make(map[string]vfs.Fs)
- u.fsCache["/"] = fs
- return fs, err
- }
- func (u *User) getRootFs(connectionID string) (fs vfs.Fs, err error) {
- switch u.FsConfig.Provider {
- case vfs.S3FilesystemProvider:
- return vfs.NewS3Fs(connectionID, u.GetHomeDir(), "", u.FsConfig.S3Config)
- case vfs.GCSFilesystemProvider:
- config := u.FsConfig.GCSConfig
- config.CredentialFile = u.GetGCSCredentialsFilePath()
- return vfs.NewGCSFs(connectionID, u.GetHomeDir(), "", config)
- case vfs.AzureBlobFilesystemProvider:
- return vfs.NewAzBlobFs(connectionID, u.GetHomeDir(), "", u.FsConfig.AzBlobConfig)
- case vfs.CryptedFilesystemProvider:
- return vfs.NewCryptFs(connectionID, u.GetHomeDir(), "", u.FsConfig.CryptConfig)
- case vfs.SFTPFilesystemProvider:
- return vfs.NewSFTPFs(connectionID, "", u.FsConfig.SFTPConfig)
- default:
- return vfs.NewOsFs(connectionID, u.GetHomeDir(), ""), nil
- }
- }
- // CheckFsRoot check the root directory for the main fs and the virtual folders.
- // It returns an error if the main filesystem cannot be created
- func (u *User) CheckFsRoot(connectionID string) error {
- fs, err := u.GetFilesystemForPath("/", connectionID)
- if err != nil {
- logger.Warn(logSender, connectionID, "could not create main filesystem for user %#v err: %v", u.Username, err)
- return err
- }
- fs.CheckRootPath(u.Username, u.GetUID(), u.GetGID())
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- fs, err = u.GetFilesystemForPath(v.VirtualPath, connectionID)
- if err == nil {
- fs.CheckRootPath(u.Username, u.GetUID(), u.GetGID())
- }
- // now check intermediary folders
- fs, err = u.GetFilesystemForPath(path.Dir(v.VirtualPath), connectionID)
- if err == nil && !fs.HasVirtualFolders() {
- fsPath, err := fs.ResolvePath(v.VirtualPath)
- if err != nil {
- continue
- }
- err = fs.MkdirAll(fsPath, u.GetUID(), u.GetGID())
- logger.Debug(logSender, connectionID, "create intermediary dir to %#v, path %#v, err: %v",
- v.VirtualPath, fsPath, err)
- }
- }
- return nil
- }
- // HideConfidentialData hides user confidential data
- func (u *User) HideConfidentialData() {
- u.Password = ""
- switch u.FsConfig.Provider {
- case vfs.S3FilesystemProvider:
- u.FsConfig.S3Config.AccessSecret.Hide()
- case vfs.GCSFilesystemProvider:
- u.FsConfig.GCSConfig.Credentials.Hide()
- case vfs.AzureBlobFilesystemProvider:
- u.FsConfig.AzBlobConfig.AccountKey.Hide()
- case vfs.CryptedFilesystemProvider:
- u.FsConfig.CryptConfig.Passphrase.Hide()
- case vfs.SFTPFilesystemProvider:
- u.FsConfig.SFTPConfig.Password.Hide()
- u.FsConfig.SFTPConfig.PrivateKey.Hide()
- }
- for idx := range u.VirtualFolders {
- folder := &u.VirtualFolders[idx]
- folder.HideConfidentialData()
- }
- }
- func (u *User) hasRedactedSecret() bool {
- switch u.FsConfig.Provider {
- case vfs.S3FilesystemProvider:
- if u.FsConfig.S3Config.AccessSecret.IsRedacted() {
- return true
- }
- case vfs.GCSFilesystemProvider:
- if u.FsConfig.GCSConfig.Credentials.IsRedacted() {
- return true
- }
- case vfs.AzureBlobFilesystemProvider:
- if u.FsConfig.AzBlobConfig.AccountKey.IsRedacted() {
- return true
- }
- case vfs.CryptedFilesystemProvider:
- if u.FsConfig.CryptConfig.Passphrase.IsRedacted() {
- return true
- }
- case vfs.SFTPFilesystemProvider:
- if u.FsConfig.SFTPConfig.Password.IsRedacted() {
- return true
- }
- if u.FsConfig.SFTPConfig.PrivateKey.IsRedacted() {
- return true
- }
- }
- for idx := range u.VirtualFolders {
- folder := &u.VirtualFolders[idx]
- if folder.HasRedactedSecret() {
- return true
- }
- }
- return false
- }
- // CloseFs closes the underlying filesystems
- func (u *User) CloseFs() error {
- if u.fsCache == nil {
- return nil
- }
- var err error
- for _, fs := range u.fsCache {
- errClose := fs.Close()
- if err == nil {
- err = errClose
- }
- }
- return err
- }
- // IsPasswordHashed returns true if the password is hashed
- func (u *User) IsPasswordHashed() bool {
- return utils.IsStringPrefixInSlice(u.Password, hashPwdPrefixes)
- }
- // IsTLSUsernameVerificationEnabled returns true if we need to extract the username
- // from the client TLS certificate
- func (u *User) IsTLSUsernameVerificationEnabled() bool {
- if u.Filters.TLSUsername != "" {
- return u.Filters.TLSUsername != TLSUsernameNone
- }
- return false
- }
- // SetEmptySecrets sets to empty any user secret
- func (u *User) SetEmptySecrets() {
- u.FsConfig.S3Config.AccessSecret = kms.NewEmptySecret()
- u.FsConfig.GCSConfig.Credentials = kms.NewEmptySecret()
- u.FsConfig.AzBlobConfig.AccountKey = kms.NewEmptySecret()
- u.FsConfig.CryptConfig.Passphrase = kms.NewEmptySecret()
- u.FsConfig.SFTPConfig.Password = kms.NewEmptySecret()
- u.FsConfig.SFTPConfig.PrivateKey = kms.NewEmptySecret()
- for idx := range u.VirtualFolders {
- folder := &u.VirtualFolders[idx]
- folder.FsConfig.SetEmptySecretsIfNil()
- }
- }
- // GetPermissionsForPath returns the permissions for the given path.
- // The path must be a SFTPGo exposed path
- func (u *User) GetPermissionsForPath(p string) []string {
- permissions := []string{}
- if perms, ok := u.Permissions["/"]; ok {
- // if only root permissions are defined returns them unconditionally
- if len(u.Permissions) == 1 {
- return perms
- }
- // fallback permissions
- permissions = perms
- }
- dirsForPath := utils.GetDirsForVirtualPath(p)
- // dirsForPath contains all the dirs for a given path in reverse order
- // for example if the path is: /1/2/3/4 it contains:
- // [ "/1/2/3/4", "/1/2/3", "/1/2", "/1", "/" ]
- // so the first match is the one we are interested to
- for idx := range dirsForPath {
- if perms, ok := u.Permissions[dirsForPath[idx]]; ok {
- permissions = perms
- break
- }
- }
- return permissions
- }
- // GetFilesystemForPath returns the filesystem for the given path
- func (u *User) GetFilesystemForPath(virtualPath, connectionID string) (vfs.Fs, error) {
- if u.fsCache == nil {
- u.fsCache = make(map[string]vfs.Fs)
- }
- if virtualPath != "" && virtualPath != "/" && len(u.VirtualFolders) > 0 {
- folder, err := u.GetVirtualFolderForPath(virtualPath)
- if err == nil {
- if fs, ok := u.fsCache[folder.VirtualPath]; ok {
- return fs, nil
- }
- fs, err := folder.GetFilesystem(connectionID)
- if err == nil {
- u.fsCache[folder.VirtualPath] = fs
- }
- return fs, err
- }
- }
- if val, ok := u.fsCache["/"]; ok {
- return val, nil
- }
- return u.GetFilesystem(connectionID)
- }
- // GetVirtualFolderForPath returns the virtual folder containing the specified virtual path.
- // If the path is not inside a virtual folder an error is returned
- func (u *User) GetVirtualFolderForPath(virtualPath string) (vfs.VirtualFolder, error) {
- var folder vfs.VirtualFolder
- if len(u.VirtualFolders) == 0 {
- return folder, errNoMatchingVirtualFolder
- }
- dirsForPath := utils.GetDirsForVirtualPath(virtualPath)
- for index := range dirsForPath {
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- if v.VirtualPath == dirsForPath[index] {
- return *v, nil
- }
- }
- }
- return folder, errNoMatchingVirtualFolder
- }
- // ScanQuota scans the user home dir and virtual folders, included in its quota,
- // and returns the number of files and their size
- func (u *User) ScanQuota() (int, int64, error) {
- fs, err := u.getRootFs("")
- if err != nil {
- return 0, 0, err
- }
- defer fs.Close()
- numFiles, size, err := fs.ScanRootDirContents()
- if err != nil {
- return numFiles, size, err
- }
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- if !v.IsIncludedInUserQuota() {
- continue
- }
- num, s, err := v.ScanQuota()
- if err != nil {
- return numFiles, size, err
- }
- numFiles += num
- size += s
- }
- return numFiles, size, nil
- }
- // GetVirtualFoldersInPath returns the virtual folders inside virtualPath including
- // any parents
- func (u *User) GetVirtualFoldersInPath(virtualPath string) map[string]bool {
- result := make(map[string]bool)
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- dirsForPath := utils.GetDirsForVirtualPath(v.VirtualPath)
- for index := range dirsForPath {
- d := dirsForPath[index]
- if d == "/" {
- continue
- }
- if path.Dir(d) == virtualPath {
- result[d] = true
- }
- }
- }
- return result
- }
- // AddVirtualDirs adds virtual folders, if defined, to the given files list
- func (u *User) AddVirtualDirs(list []os.FileInfo, virtualPath string) []os.FileInfo {
- if len(u.VirtualFolders) == 0 {
- return list
- }
- for dir := range u.GetVirtualFoldersInPath(virtualPath) {
- fi := vfs.NewFileInfo(dir, true, 0, time.Now(), false)
- found := false
- for index := range list {
- if list[index].Name() == fi.Name() {
- list[index] = fi
- found = true
- break
- }
- }
- if !found {
- list = append(list, fi)
- }
- }
- return list
- }
- // IsMappedPath returns true if the specified filesystem path has a virtual folder mapping.
- // The filesystem path must be cleaned before calling this method
- func (u *User) IsMappedPath(fsPath string) bool {
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- if fsPath == v.MappedPath {
- return true
- }
- }
- return false
- }
- // IsVirtualFolder returns true if the specified virtual path is a virtual folder
- func (u *User) IsVirtualFolder(virtualPath string) bool {
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- if virtualPath == v.VirtualPath {
- return true
- }
- }
- return false
- }
- // HasVirtualFoldersInside returns true if there are virtual folders inside the
- // specified virtual path. We assume that path are cleaned
- func (u *User) HasVirtualFoldersInside(virtualPath string) bool {
- if virtualPath == "/" && len(u.VirtualFolders) > 0 {
- return true
- }
- for idx := range u.VirtualFolders {
- v := &u.VirtualFolders[idx]
- if len(v.VirtualPath) > len(virtualPath) {
- if strings.HasPrefix(v.VirtualPath, virtualPath+"/") {
- return true
- }
- }
- }
- return false
- }
- // HasPermissionsInside returns true if the specified virtualPath has no permissions itself and
- // no subdirs with defined permissions
- func (u *User) HasPermissionsInside(virtualPath string) bool {
- for dir := range u.Permissions {
- if dir == virtualPath {
- return true
- } else if len(dir) > len(virtualPath) {
- if strings.HasPrefix(dir, virtualPath+"/") {
- return true
- }
- }
- }
- return false
- }
- // HasPerm returns true if the user has the given permission or any permission
- func (u *User) HasPerm(permission, path string) bool {
- perms := u.GetPermissionsForPath(path)
- if utils.IsStringInSlice(PermAny, perms) {
- return true
- }
- return utils.IsStringInSlice(permission, perms)
- }
- // HasPerms return true if the user has all the given permissions
- func (u *User) HasPerms(permissions []string, path string) bool {
- perms := u.GetPermissionsForPath(path)
- if utils.IsStringInSlice(PermAny, perms) {
- return true
- }
- for _, permission := range permissions {
- if !utils.IsStringInSlice(permission, perms) {
- return false
- }
- }
- return true
- }
- // HasNoQuotaRestrictions returns true if no quota restrictions need to be applyed
- func (u *User) HasNoQuotaRestrictions(checkFiles bool) bool {
- if u.QuotaSize == 0 && (!checkFiles || u.QuotaFiles == 0) {
- return true
- }
- return false
- }
- // IsLoginMethodAllowed returns true if the specified login method is allowed
- func (u *User) IsLoginMethodAllowed(loginMethod string, partialSuccessMethods []string) bool {
- if len(u.Filters.DeniedLoginMethods) == 0 {
- return true
- }
- if len(partialSuccessMethods) == 1 {
- for _, method := range u.GetNextAuthMethods(partialSuccessMethods, true) {
- if method == loginMethod {
- return true
- }
- }
- }
- if utils.IsStringInSlice(loginMethod, u.Filters.DeniedLoginMethods) {
- return false
- }
- return true
- }
- // GetNextAuthMethods returns the list of authentications methods that
- // can continue for multi-step authentication
- func (u *User) GetNextAuthMethods(partialSuccessMethods []string, isPasswordAuthEnabled bool) []string {
- var methods []string
- if len(partialSuccessMethods) != 1 {
- return methods
- }
- if partialSuccessMethods[0] != SSHLoginMethodPublicKey {
- return methods
- }
- for _, method := range u.GetAllowedLoginMethods() {
- if method == SSHLoginMethodKeyAndPassword && isPasswordAuthEnabled {
- methods = append(methods, LoginMethodPassword)
- }
- if method == SSHLoginMethodKeyAndKeyboardInt {
- methods = append(methods, SSHLoginMethodKeyboardInteractive)
- }
- }
- return methods
- }
- // IsPartialAuth returns true if the specified login method is a step for
- // a multi-step Authentication.
- // We support publickey+password and publickey+keyboard-interactive, so
- // only publickey can returns partial success.
- // We can have partial success if only multi-step Auth methods are enabled
- func (u *User) IsPartialAuth(loginMethod string) bool {
- if loginMethod != SSHLoginMethodPublicKey {
- return false
- }
- for _, method := range u.GetAllowedLoginMethods() {
- if method == LoginMethodTLSCertificate || method == LoginMethodTLSCertificateAndPwd {
- continue
- }
- if !utils.IsStringInSlice(method, SSHMultiStepsLoginMethods) {
- return false
- }
- }
- return true
- }
- // GetAllowedLoginMethods returns the allowed login methods
- func (u *User) GetAllowedLoginMethods() []string {
- var allowedMethods []string
- for _, method := range ValidLoginMethods {
- if !utils.IsStringInSlice(method, u.Filters.DeniedLoginMethods) {
- allowedMethods = append(allowedMethods, method)
- }
- }
- return allowedMethods
- }
- // IsFileAllowed returns true if the specified file is allowed by the file restrictions filters
- func (u *User) IsFileAllowed(virtualPath string) bool {
- return u.isFilePatternAllowed(virtualPath) && u.isFileExtensionAllowed(virtualPath)
- }
- func (u *User) isFileExtensionAllowed(virtualPath string) bool {
- if len(u.Filters.FileExtensions) == 0 {
- return true
- }
- dirsForPath := utils.GetDirsForVirtualPath(path.Dir(virtualPath))
- var filter ExtensionsFilter
- for _, dir := range dirsForPath {
- for _, f := range u.Filters.FileExtensions {
- if f.Path == dir {
- filter = f
- break
- }
- }
- if filter.Path != "" {
- break
- }
- }
- if filter.Path != "" {
- toMatch := strings.ToLower(virtualPath)
- for _, denied := range filter.DeniedExtensions {
- if strings.HasSuffix(toMatch, denied) {
- return false
- }
- }
- for _, allowed := range filter.AllowedExtensions {
- if strings.HasSuffix(toMatch, allowed) {
- return true
- }
- }
- return len(filter.AllowedExtensions) == 0
- }
- return true
- }
- func (u *User) isFilePatternAllowed(virtualPath string) bool {
- if len(u.Filters.FilePatterns) == 0 {
- return true
- }
- dirsForPath := utils.GetDirsForVirtualPath(path.Dir(virtualPath))
- var filter PatternsFilter
- for _, dir := range dirsForPath {
- for _, f := range u.Filters.FilePatterns {
- if f.Path == dir {
- filter = f
- break
- }
- }
- if filter.Path != "" {
- break
- }
- }
- if filter.Path != "" {
- toMatch := strings.ToLower(path.Base(virtualPath))
- for _, denied := range filter.DeniedPatterns {
- matched, err := path.Match(denied, toMatch)
- if err != nil || matched {
- return false
- }
- }
- for _, allowed := range filter.AllowedPatterns {
- matched, err := path.Match(allowed, toMatch)
- if err == nil && matched {
- return true
- }
- }
- return len(filter.AllowedPatterns) == 0
- }
- return true
- }
- // IsLoginFromAddrAllowed returns true if the login is allowed from the specified remoteAddr.
- // If AllowedIP is defined only the specified IP/Mask can login.
- // If DeniedIP is defined the specified IP/Mask cannot login.
- // If an IP is both allowed and denied then login will be denied
- func (u *User) IsLoginFromAddrAllowed(remoteAddr string) bool {
- if len(u.Filters.AllowedIP) == 0 && len(u.Filters.DeniedIP) == 0 {
- return true
- }
- remoteIP := net.ParseIP(utils.GetIPFromRemoteAddress(remoteAddr))
- // if remoteIP is invalid we allow login, this should never happen
- if remoteIP == nil {
- logger.Warn(logSender, "", "login allowed for invalid IP. remote address: %#v", remoteAddr)
- return true
- }
- for _, IPMask := range u.Filters.DeniedIP {
- _, IPNet, err := net.ParseCIDR(IPMask)
- if err != nil {
- return false
- }
- if IPNet.Contains(remoteIP) {
- return false
- }
- }
- for _, IPMask := range u.Filters.AllowedIP {
- _, IPNet, err := net.ParseCIDR(IPMask)
- if err != nil {
- return false
- }
- if IPNet.Contains(remoteIP) {
- return true
- }
- }
- return len(u.Filters.AllowedIP) == 0
- }
- // GetPermissionsAsJSON returns the permissions as json byte array
- func (u *User) GetPermissionsAsJSON() ([]byte, error) {
- return json.Marshal(u.Permissions)
- }
- // GetPublicKeysAsJSON returns the public keys as json byte array
- func (u *User) GetPublicKeysAsJSON() ([]byte, error) {
- return json.Marshal(u.PublicKeys)
- }
- // GetFiltersAsJSON returns the filters as json byte array
- func (u *User) GetFiltersAsJSON() ([]byte, error) {
- return json.Marshal(u.Filters)
- }
- // GetFsConfigAsJSON returns the filesystem config as json byte array
- func (u *User) GetFsConfigAsJSON() ([]byte, error) {
- return json.Marshal(u.FsConfig)
- }
- // GetUID returns a validate uid, suitable for use with os.Chown
- func (u *User) GetUID() int {
- if u.UID <= 0 || u.UID > 65535 {
- return -1
- }
- return u.UID
- }
- // GetGID returns a validate gid, suitable for use with os.Chown
- func (u *User) GetGID() int {
- if u.GID <= 0 || u.GID > 65535 {
- return -1
- }
- return u.GID
- }
- // GetHomeDir returns the shortest path name equivalent to the user's home directory
- func (u *User) GetHomeDir() string {
- return filepath.Clean(u.HomeDir)
- }
- // HasQuotaRestrictions returns true if there is a quota restriction on number of files or size or both
- func (u *User) HasQuotaRestrictions() bool {
- return u.QuotaFiles > 0 || u.QuotaSize > 0
- }
- // GetQuotaSummary returns used quota and limits if defined
- func (u *User) GetQuotaSummary() string {
- var result string
- result = "Files: " + strconv.Itoa(u.UsedQuotaFiles)
- if u.QuotaFiles > 0 {
- result += "/" + strconv.Itoa(u.QuotaFiles)
- }
- if u.UsedQuotaSize > 0 || u.QuotaSize > 0 {
- result += ". Size: " + utils.ByteCountIEC(u.UsedQuotaSize)
- if u.QuotaSize > 0 {
- result += "/" + utils.ByteCountIEC(u.QuotaSize)
- }
- }
- return result
- }
- // GetPermissionsAsString returns the user's permissions as comma separated string
- func (u *User) GetPermissionsAsString() string {
- result := ""
- for dir, perms := range u.Permissions {
- dirPerms := strings.Join(perms, ", ")
- dp := fmt.Sprintf("%#v: %#v", dir, dirPerms)
- if dir == "/" {
- if result != "" {
- result = dp + ", " + result
- } else {
- result = dp
- }
- } else {
- if result != "" {
- result += ", "
- }
- result += dp
- }
- }
- return result
- }
- // GetBandwidthAsString returns bandwidth limits if defines
- func (u *User) GetBandwidthAsString() string {
- result := "Download: "
- if u.DownloadBandwidth > 0 {
- result += utils.ByteCountIEC(u.DownloadBandwidth*1000) + "/s."
- } else {
- result += "unlimited."
- }
- result += " Upload: "
- if u.UploadBandwidth > 0 {
- result += utils.ByteCountIEC(u.UploadBandwidth*1000) + "/s."
- } else {
- result += "unlimited."
- }
- return result
- }
- // GetInfoString returns user's info as string.
- // Storage provider, number of public keys, max sessions, uid,
- // gid, denied and allowed IP/Mask are returned
- func (u *User) GetInfoString() string {
- var result string
- if u.LastLogin > 0 {
- t := utils.GetTimeFromMsecSinceEpoch(u.LastLogin)
- result += fmt.Sprintf("Last login: %v ", t.Format("2006-01-02 15:04:05")) // YYYY-MM-DD HH:MM:SS
- }
- switch u.FsConfig.Provider {
- case vfs.S3FilesystemProvider:
- result += "Storage: S3 "
- case vfs.GCSFilesystemProvider:
- result += "Storage: GCS "
- case vfs.AzureBlobFilesystemProvider:
- result += "Storage: Azure "
- case vfs.CryptedFilesystemProvider:
- result += "Storage: Encrypted "
- case vfs.SFTPFilesystemProvider:
- result += "Storage: SFTP "
- }
- if len(u.PublicKeys) > 0 {
- result += fmt.Sprintf("Public keys: %v ", len(u.PublicKeys))
- }
- if u.MaxSessions > 0 {
- result += fmt.Sprintf("Max sessions: %v ", u.MaxSessions)
- }
- if u.UID > 0 {
- result += fmt.Sprintf("UID: %v ", u.UID)
- }
- if u.GID > 0 {
- result += fmt.Sprintf("GID: %v ", u.GID)
- }
- if len(u.Filters.DeniedIP) > 0 {
- result += fmt.Sprintf("Denied IP/Mask: %v ", len(u.Filters.DeniedIP))
- }
- if len(u.Filters.AllowedIP) > 0 {
- result += fmt.Sprintf("Allowed IP/Mask: %v ", len(u.Filters.AllowedIP))
- }
- return result
- }
- // GetExpirationDateAsString returns expiration date formatted as YYYY-MM-DD
- func (u *User) GetExpirationDateAsString() string {
- if u.ExpirationDate > 0 {
- t := utils.GetTimeFromMsecSinceEpoch(u.ExpirationDate)
- return t.Format("2006-01-02")
- }
- return ""
- }
- // GetAllowedIPAsString returns the allowed IP as comma separated string
- func (u *User) GetAllowedIPAsString() string {
- return strings.Join(u.Filters.AllowedIP, ",")
- }
- // GetDeniedIPAsString returns the denied IP as comma separated string
- func (u *User) GetDeniedIPAsString() string {
- return strings.Join(u.Filters.DeniedIP, ",")
- }
- // SetEmptySecretsIfNil sets the secrets to empty if nil
- func (u *User) SetEmptySecretsIfNil() {
- u.FsConfig.SetEmptySecretsIfNil()
- for idx := range u.VirtualFolders {
- vfolder := &u.VirtualFolders[idx]
- vfolder.FsConfig.SetEmptySecretsIfNil()
- }
- }
- func (u *User) getACopy() User {
- u.SetEmptySecretsIfNil()
- pubKeys := make([]string, len(u.PublicKeys))
- copy(pubKeys, u.PublicKeys)
- virtualFolders := make([]vfs.VirtualFolder, 0, len(u.VirtualFolders))
- for idx := range u.VirtualFolders {
- vfolder := u.VirtualFolders[idx].GetACopy()
- virtualFolders = append(virtualFolders, vfolder)
- }
- permissions := make(map[string][]string)
- for k, v := range u.Permissions {
- perms := make([]string, len(v))
- copy(perms, v)
- permissions[k] = perms
- }
- filters := UserFilters{}
- filters.MaxUploadFileSize = u.Filters.MaxUploadFileSize
- filters.TLSUsername = u.Filters.TLSUsername
- filters.AllowedIP = make([]string, len(u.Filters.AllowedIP))
- copy(filters.AllowedIP, u.Filters.AllowedIP)
- filters.DeniedIP = make([]string, len(u.Filters.DeniedIP))
- copy(filters.DeniedIP, u.Filters.DeniedIP)
- filters.DeniedLoginMethods = make([]string, len(u.Filters.DeniedLoginMethods))
- copy(filters.DeniedLoginMethods, u.Filters.DeniedLoginMethods)
- filters.FileExtensions = make([]ExtensionsFilter, len(u.Filters.FileExtensions))
- copy(filters.FileExtensions, u.Filters.FileExtensions)
- filters.FilePatterns = make([]PatternsFilter, len(u.Filters.FilePatterns))
- copy(filters.FilePatterns, u.Filters.FilePatterns)
- filters.DeniedProtocols = make([]string, len(u.Filters.DeniedProtocols))
- copy(filters.DeniedProtocols, u.Filters.DeniedProtocols)
- return User{
- ID: u.ID,
- Username: u.Username,
- Password: u.Password,
- PublicKeys: pubKeys,
- HomeDir: u.HomeDir,
- VirtualFolders: virtualFolders,
- UID: u.UID,
- GID: u.GID,
- MaxSessions: u.MaxSessions,
- QuotaSize: u.QuotaSize,
- QuotaFiles: u.QuotaFiles,
- Permissions: permissions,
- UsedQuotaSize: u.UsedQuotaSize,
- UsedQuotaFiles: u.UsedQuotaFiles,
- LastQuotaUpdate: u.LastQuotaUpdate,
- UploadBandwidth: u.UploadBandwidth,
- DownloadBandwidth: u.DownloadBandwidth,
- Status: u.Status,
- ExpirationDate: u.ExpirationDate,
- LastLogin: u.LastLogin,
- Filters: filters,
- FsConfig: u.FsConfig.GetACopy(),
- AdditionalInfo: u.AdditionalInfo,
- Description: u.Description,
- }
- }
- func (u *User) getNotificationFieldsAsSlice(action string) []string {
- return []string{action, u.Username,
- strconv.FormatInt(u.ID, 10),
- strconv.FormatInt(int64(u.Status), 10),
- strconv.FormatInt(u.ExpirationDate, 10),
- u.HomeDir,
- strconv.FormatInt(int64(u.UID), 10),
- strconv.FormatInt(int64(u.GID), 10),
- }
- }
- // GetEncrytionAdditionalData returns the additional data to use for AEAD
- func (u *User) GetEncrytionAdditionalData() string {
- return u.Username
- }
- // GetGCSCredentialsFilePath returns the path for GCS credentials
- func (u *User) GetGCSCredentialsFilePath() string {
- return filepath.Join(credentialsDirPath, fmt.Sprintf("%v_gcs_credentials.json", u.Username))
- }
|