2023-01-03 10:18:30 +01:00
|
|
|
// Copyright (C) 2019-2023 Nicola Murino
|
2022-07-17 20:16:00 +02:00
|
|
|
//
|
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
|
// it under the terms of the GNU Affero General Public License as published
|
|
|
|
|
// by the Free Software Foundation, version 3.
|
|
|
|
|
//
|
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
|
//
|
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
2023-01-03 10:18:30 +01:00
|
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2022-07-17 20:16:00 +02:00
|
|
|
|
2019-10-07 18:19:01 +02:00
|
|
|
package httpd
|
2019-07-20 12:26:52 +02:00
|
|
|
|
|
|
|
|
import (
|
2020-06-20 12:38:04 +02:00
|
|
|
"errors"
|
2021-09-25 12:20:31 +02:00
|
|
|
"fmt"
|
2019-07-20 12:26:52 +02:00
|
|
|
"net/http"
|
|
|
|
|
|
2020-05-06 19:36:34 +02:00
|
|
|
"github.com/go-chi/render"
|
|
|
|
|
|
2022-08-01 18:48:54 +02:00
|
|
|
"github.com/drakkan/sftpgo/v2/internal/common"
|
2022-07-24 16:18:54 +02:00
|
|
|
"github.com/drakkan/sftpgo/v2/internal/dataprovider"
|
|
|
|
|
"github.com/drakkan/sftpgo/v2/internal/logger"
|
|
|
|
|
"github.com/drakkan/sftpgo/v2/internal/vfs"
|
2019-07-20 12:26:52 +02:00
|
|
|
)
|
|
|
|
|
|
2020-06-20 12:38:04 +02:00
|
|
|
const (
|
|
|
|
|
quotaUpdateModeAdd = "add"
|
|
|
|
|
quotaUpdateModeReset = "reset"
|
|
|
|
|
)
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
type quotaUsage struct {
|
|
|
|
|
UsedQuotaSize int64 `json:"used_quota_size"`
|
|
|
|
|
UsedQuotaFiles int `json:"used_quota_files"`
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-30 11:42:36 +01:00
|
|
|
type transferQuotaUsage struct {
|
|
|
|
|
UsedUploadDataTransfer int64 `json:"used_upload_data_transfer"`
|
|
|
|
|
UsedDownloadDataTransfer int64 `json:"used_download_data_transfer"`
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func getUsersQuotaScans(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 18:08:32 +02:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2022-11-16 19:04:50 +01:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
render.JSON(w, r, common.QuotaScans.GetUsersQuotaScans(claims.Role))
|
2019-07-20 12:26:52 +02:00
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func getFoldersQuotaScans(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 18:08:32 +02:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2022-08-01 18:48:54 +02:00
|
|
|
render.JSON(w, r, common.QuotaScans.GetVFoldersQuotaScans())
|
2020-06-07 23:30:18 +02:00
|
|
|
}
|
|
|
|
|
|
2020-06-20 12:38:04 +02:00
|
|
|
func updateUserQuotaUsage(w http.ResponseWriter, r *http.Request) {
|
2021-06-07 21:52:43 +02:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
var usage quotaUsage
|
|
|
|
|
err := render.DecodeJSON(r.Body, &usage)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
doUpdateUserQuotaUsage(w, r, getURLParam(r, "username"), usage)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func updateFolderQuotaUsage(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
var usage quotaUsage
|
|
|
|
|
err := render.DecodeJSON(r.Body, &usage)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
doUpdateFolderQuotaUsage(w, r, getURLParam(r, "name"), usage)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func startUserQuotaScan(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
doStartUserQuotaScan(w, r, getURLParam(r, "username"))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func startFolderQuotaScan(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
doStartFolderQuotaScan(w, r, getURLParam(r, "name"))
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-30 11:42:36 +01:00
|
|
|
func updateUserTransferQuotaUsage(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2022-11-16 19:04:50 +01:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-01-30 11:42:36 +01:00
|
|
|
var usage transferQuotaUsage
|
2022-11-16 19:04:50 +01:00
|
|
|
err = render.DecodeJSON(r.Body, &usage)
|
2022-01-30 11:42:36 +01:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
if usage.UsedUploadDataTransfer < 0 || usage.UsedDownloadDataTransfer < 0 {
|
|
|
|
|
sendAPIResponse(w, r, errors.New("invalid used transfer quota parameters, negative values are not allowed"),
|
|
|
|
|
"", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
mode, err := getQuotaUpdateMode(r)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-11-16 19:04:50 +01:00
|
|
|
user, err := dataprovider.GetUserWithGroupSettings(getURLParam(r, "username"), claims.Role)
|
2022-01-30 11:42:36 +01:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
if mode == quotaUpdateModeAdd && !user.HasTransferQuotaRestrictions() && dataprovider.GetQuotaTracking() == 2 {
|
|
|
|
|
sendAPIResponse(w, r, errors.New("this user has no transfer quota restrictions, only reset mode is supported"),
|
|
|
|
|
"", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
err = dataprovider.UpdateUserTransferQuota(&user, usage.UsedUploadDataTransfer, usage.UsedDownloadDataTransfer,
|
|
|
|
|
mode == quotaUpdateModeReset)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
sendAPIResponse(w, r, err, "Quota updated", http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func doUpdateUserQuotaUsage(w http.ResponseWriter, r *http.Request, username string, usage quotaUsage) {
|
2022-11-16 19:04:50 +01:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2021-06-07 21:52:43 +02:00
|
|
|
if usage.UsedQuotaFiles < 0 || usage.UsedQuotaSize < 0 {
|
2021-03-21 19:15:47 +01:00
|
|
|
sendAPIResponse(w, r, errors.New("invalid used quota parameters, negative values are not allowed"),
|
2020-06-20 12:38:04 +02:00
|
|
|
"", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
mode, err := getQuotaUpdateMode(r)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-11-16 19:04:50 +01:00
|
|
|
user, err := dataprovider.GetUserWithGroupSettings(username, claims.Role)
|
2019-07-20 12:26:52 +02:00
|
|
|
if err != nil {
|
2020-06-20 12:38:04 +02:00
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
if mode == quotaUpdateModeAdd && !user.HasQuotaRestrictions() && dataprovider.GetQuotaTracking() == 2 {
|
|
|
|
|
sendAPIResponse(w, r, errors.New("this user has no quota restrictions, only reset mode is supported"),
|
|
|
|
|
"", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-11-16 19:04:50 +01:00
|
|
|
if !common.QuotaScans.AddUserQuotaScan(user.Username, user.Role) {
|
2020-06-20 12:38:04 +02:00
|
|
|
sendAPIResponse(w, r, err, "A quota scan is in progress for this user", http.StatusConflict)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-08-01 18:48:54 +02:00
|
|
|
defer common.QuotaScans.RemoveUserQuotaScan(user.Username)
|
2021-06-07 21:52:43 +02:00
|
|
|
err = dataprovider.UpdateUserQuota(&user, usage.UsedQuotaFiles, usage.UsedQuotaSize, mode == quotaUpdateModeReset)
|
2020-06-20 12:38:04 +02:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
2022-01-30 11:42:36 +01:00
|
|
|
return
|
2020-06-20 12:38:04 +02:00
|
|
|
}
|
2022-01-30 11:42:36 +01:00
|
|
|
sendAPIResponse(w, r, err, "Quota updated", http.StatusOK)
|
2020-06-20 12:38:04 +02:00
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func doUpdateFolderQuotaUsage(w http.ResponseWriter, r *http.Request, name string, usage quotaUsage) {
|
|
|
|
|
if usage.UsedQuotaFiles < 0 || usage.UsedQuotaSize < 0 {
|
2021-03-21 19:15:47 +01:00
|
|
|
sendAPIResponse(w, r, errors.New("invalid used quota parameters, negative values are not allowed"),
|
2020-06-20 12:38:04 +02:00
|
|
|
"", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
mode, err := getQuotaUpdateMode(r)
|
|
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
2021-06-07 21:52:43 +02:00
|
|
|
folder, err := dataprovider.GetFolderByName(name)
|
2020-06-20 12:38:04 +02:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-08-01 18:48:54 +02:00
|
|
|
if !common.QuotaScans.AddVFolderQuotaScan(folder.Name) {
|
2020-06-20 12:38:04 +02:00
|
|
|
sendAPIResponse(w, r, err, "A quota scan is in progress for this folder", http.StatusConflict)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-08-01 18:48:54 +02:00
|
|
|
defer common.QuotaScans.RemoveVFolderQuotaScan(folder.Name)
|
2021-06-07 21:52:43 +02:00
|
|
|
err = dataprovider.UpdateVirtualFolderQuota(&folder, usage.UsedQuotaFiles, usage.UsedQuotaSize, mode == quotaUpdateModeReset)
|
2020-06-20 12:38:04 +02:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
} else {
|
|
|
|
|
sendAPIResponse(w, r, err, "Quota updated", http.StatusOK)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func doStartUserQuotaScan(w http.ResponseWriter, r *http.Request, username string) {
|
2020-06-07 23:30:18 +02:00
|
|
|
if dataprovider.GetQuotaTracking() == 0 {
|
|
|
|
|
sendAPIResponse(w, r, nil, "Quota tracking is disabled!", http.StatusForbidden)
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-11-16 19:04:50 +01:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
user, err := dataprovider.GetUserWithGroupSettings(username, claims.Role)
|
2020-06-20 12:38:04 +02:00
|
|
|
if err != nil {
|
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
|
return
|
|
|
|
|
}
|
2022-11-16 19:04:50 +01:00
|
|
|
if !common.QuotaScans.AddUserQuotaScan(user.Username, user.Role) {
|
2023-02-27 19:02:43 +01:00
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("Another scan is already in progress for user %q", username),
|
2021-09-25 12:20:31 +02:00
|
|
|
http.StatusConflict)
|
2021-06-07 21:52:43 +02:00
|
|
|
return
|
2019-12-27 23:12:44 +01:00
|
|
|
}
|
2021-06-07 21:52:43 +02:00
|
|
|
go doUserQuotaScan(user) //nolint:errcheck
|
|
|
|
|
sendAPIResponse(w, r, err, "Scan started", http.StatusAccepted)
|
2019-12-27 23:12:44 +01:00
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func doStartFolderQuotaScan(w http.ResponseWriter, r *http.Request, name string) {
|
2020-06-20 12:38:04 +02:00
|
|
|
if dataprovider.GetQuotaTracking() == 0 {
|
|
|
|
|
sendAPIResponse(w, r, nil, "Quota tracking is disabled!", http.StatusForbidden)
|
|
|
|
|
return
|
|
|
|
|
}
|
2021-06-07 21:52:43 +02:00
|
|
|
folder, err := dataprovider.GetFolderByName(name)
|
2020-06-07 23:30:18 +02:00
|
|
|
if err != nil {
|
2020-06-20 12:38:04 +02:00
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
2020-06-07 23:30:18 +02:00
|
|
|
return
|
|
|
|
|
}
|
2022-08-01 18:48:54 +02:00
|
|
|
if !common.QuotaScans.AddVFolderQuotaScan(folder.Name) {
|
2023-02-27 19:02:43 +01:00
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Another scan is already in progress for folder %q", name),
|
2021-09-25 12:20:31 +02:00
|
|
|
http.StatusConflict)
|
2021-06-07 21:52:43 +02:00
|
|
|
return
|
2020-06-07 23:30:18 +02:00
|
|
|
}
|
2021-06-07 21:52:43 +02:00
|
|
|
go doFolderQuotaScan(folder) //nolint:errcheck
|
|
|
|
|
sendAPIResponse(w, r, err, "Scan started", http.StatusAccepted)
|
2020-06-07 23:30:18 +02:00
|
|
|
}
|
|
|
|
|
|
2021-06-07 21:52:43 +02:00
|
|
|
func doUserQuotaScan(user dataprovider.User) error {
|
2022-08-01 18:48:54 +02:00
|
|
|
defer common.QuotaScans.RemoveUserQuotaScan(user.Username)
|
2021-03-21 19:15:47 +01:00
|
|
|
numFiles, size, err := user.ScanQuota()
|
2020-01-19 07:41:05 +01:00
|
|
|
if err != nil {
|
2023-02-27 19:02:43 +01:00
|
|
|
logger.Warn(logSender, "", "error scanning user quota %q: %v", user.Username, err)
|
2020-06-07 23:30:18 +02:00
|
|
|
return err
|
|
|
|
|
}
|
2021-02-16 19:11:36 +01:00
|
|
|
err = dataprovider.UpdateUserQuota(&user, numFiles, size, true)
|
2023-02-27 19:02:43 +01:00
|
|
|
logger.Debug(logSender, "", "user quota scanned, user: %q, error: %v", user.Username, err)
|
2020-06-07 23:30:18 +02:00
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func doFolderQuotaScan(folder vfs.BaseVirtualFolder) error {
|
2022-08-01 18:48:54 +02:00
|
|
|
defer common.QuotaScans.RemoveVFolderQuotaScan(folder.Name)
|
2021-03-21 19:15:47 +01:00
|
|
|
f := vfs.VirtualFolder{
|
|
|
|
|
BaseVirtualFolder: folder,
|
|
|
|
|
VirtualPath: "/",
|
|
|
|
|
}
|
|
|
|
|
numFiles, size, err := f.ScanQuota()
|
2020-06-07 23:30:18 +02:00
|
|
|
if err != nil {
|
2023-02-27 19:02:43 +01:00
|
|
|
logger.Warn(logSender, "", "error scanning folder %q: %v", folder.Name, err)
|
2020-06-07 23:30:18 +02:00
|
|
|
return err
|
2019-07-20 12:26:52 +02:00
|
|
|
}
|
2021-02-16 19:11:36 +01:00
|
|
|
err = dataprovider.UpdateVirtualFolderQuota(&folder, numFiles, size, true)
|
2023-02-27 19:02:43 +01:00
|
|
|
logger.Debug(logSender, "", "virtual folder %q scanned, error: %v", folder.Name, err)
|
2020-01-19 07:41:05 +01:00
|
|
|
return err
|
2019-07-20 12:26:52 +02:00
|
|
|
}
|
2020-06-20 12:38:04 +02:00
|
|
|
|
|
|
|
|
func getQuotaUpdateMode(r *http.Request) (string, error) {
|
|
|
|
|
mode := quotaUpdateModeReset
|
|
|
|
|
if _, ok := r.URL.Query()["mode"]; ok {
|
|
|
|
|
mode = r.URL.Query().Get("mode")
|
|
|
|
|
if mode != quotaUpdateModeReset && mode != quotaUpdateModeAdd {
|
2021-03-21 19:15:47 +01:00
|
|
|
return "", errors.New("invalid mode")
|
2020-06-20 12:38:04 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return mode, nil
|
|
|
|
|
}
|