2020-09-27 19:24:08 +00:00
|
|
|
package filesystem
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"path/filepath"
|
|
|
|
"sort"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
2021-01-17 02:06:22 +00:00
|
|
|
"sync/atomic"
|
2020-09-27 19:24:08 +00:00
|
|
|
"time"
|
2021-01-10 22:25:39 +00:00
|
|
|
|
|
|
|
"emperror.dev/errors"
|
|
|
|
"github.com/gabriel-vasile/mimetype"
|
|
|
|
"github.com/karrick/godirwalk"
|
2021-08-02 21:07:00 +00:00
|
|
|
ignore "github.com/sabhiram/go-gitignore"
|
|
|
|
|
2021-01-10 22:25:39 +00:00
|
|
|
"github.com/pterodactyl/wings/config"
|
|
|
|
"github.com/pterodactyl/wings/system"
|
2020-09-27 19:24:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Filesystem struct {
|
|
|
|
mu sync.RWMutex
|
|
|
|
lastLookupTime *usageLookupTime
|
2020-12-26 01:04:18 +00:00
|
|
|
lookupInProgress *system.AtomicBool
|
2020-09-27 19:24:08 +00:00
|
|
|
diskUsed int64
|
|
|
|
diskCheckInterval time.Duration
|
2021-01-11 00:33:39 +00:00
|
|
|
denylist *ignore.GitIgnore
|
2020-09-27 19:24:08 +00:00
|
|
|
|
|
|
|
// The maximum amount of disk space (in bytes) that this Filesystem instance can use.
|
|
|
|
diskLimit int64
|
|
|
|
|
|
|
|
// The root data directory path for this Filesystem instance.
|
|
|
|
root string
|
2020-10-01 04:46:32 +00:00
|
|
|
|
|
|
|
isTest bool
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
2021-01-16 20:03:55 +00:00
|
|
|
// New creates a new Filesystem instance for a given server.
|
2021-01-11 00:33:39 +00:00
|
|
|
func New(root string, size int64, denylist []string) *Filesystem {
|
2020-09-27 19:24:08 +00:00
|
|
|
return &Filesystem{
|
|
|
|
root: root,
|
|
|
|
diskLimit: size,
|
|
|
|
diskCheckInterval: time.Duration(config.Get().System.DiskCheckInterval),
|
|
|
|
lastLookupTime: &usageLookupTime{},
|
2020-12-26 01:04:18 +00:00
|
|
|
lookupInProgress: system.NewAtomicBool(false),
|
2021-01-11 00:33:39 +00:00
|
|
|
denylist: ignore.CompileIgnoreLines(denylist...),
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-16 20:03:55 +00:00
|
|
|
// Path returns the root path for the Filesystem instance.
|
2020-09-27 19:24:08 +00:00
|
|
|
func (fs *Filesystem) Path() string {
|
|
|
|
return fs.root
|
|
|
|
}
|
|
|
|
|
2021-01-16 20:03:55 +00:00
|
|
|
// File returns a reader for a file instance as well as the stat information.
|
|
|
|
func (fs *Filesystem) File(p string) (*os.File, Stat, error) {
|
2020-09-27 19:24:08 +00:00
|
|
|
cleaned, err := fs.SafePath(p)
|
|
|
|
if err != nil {
|
2021-01-16 20:03:55 +00:00
|
|
|
return nil, Stat{}, err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2021-01-16 20:03:55 +00:00
|
|
|
st, err := fs.Stat(cleaned)
|
2020-12-25 21:57:26 +00:00
|
|
|
if err != nil {
|
2021-01-16 20:03:55 +00:00
|
|
|
return nil, Stat{}, err
|
2020-12-25 21:57:26 +00:00
|
|
|
}
|
|
|
|
if st.IsDir() {
|
2021-04-17 20:29:18 +00:00
|
|
|
return nil, Stat{}, newFilesystemError(ErrCodeIsDirectory, nil)
|
2020-10-02 03:40:25 +00:00
|
|
|
}
|
2020-10-01 04:46:32 +00:00
|
|
|
f, err := os.Open(cleaned)
|
2020-09-27 19:24:08 +00:00
|
|
|
if err != nil {
|
2021-01-16 20:03:55 +00:00
|
|
|
return nil, Stat{}, err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2020-12-25 21:57:26 +00:00
|
|
|
return f, st, nil
|
|
|
|
}
|
2020-10-01 04:46:32 +00:00
|
|
|
|
2021-01-10 22:25:39 +00:00
|
|
|
// Acts by creating the given file and path on the disk if it is not present already. If
|
|
|
|
// it is present, the file is opened using the defaults which will truncate the contents.
|
|
|
|
// The opened file is then returned to the caller.
|
|
|
|
func (fs *Filesystem) Touch(p string, flag int) (*os.File, error) {
|
|
|
|
cleaned, err := fs.SafePath(p)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-15 17:37:56 +00:00
|
|
|
f, err := os.OpenFile(cleaned, flag, 0o644)
|
2021-01-10 22:25:39 +00:00
|
|
|
if err == nil {
|
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
// If the error is not because it doesn't exist then we just need to bail at this point.
|
|
|
|
if !errors.Is(err, os.ErrNotExist) {
|
2021-01-31 02:43:35 +00:00
|
|
|
return nil, errors.Wrap(err, "server/filesystem: touch: failed to open file handle")
|
2021-01-10 22:25:39 +00:00
|
|
|
}
|
2021-02-10 20:56:48 +00:00
|
|
|
// Only create and chown the directory if it doesn't exist.
|
|
|
|
if _, err := os.Stat(filepath.Dir(cleaned)); errors.Is(err, os.ErrNotExist) {
|
|
|
|
// Create the path leading up to the file we're trying to create, setting the final perms
|
|
|
|
// on it as we go.
|
2021-11-15 17:37:56 +00:00
|
|
|
if err := os.MkdirAll(filepath.Dir(cleaned), 0o755); err != nil {
|
2021-02-10 20:56:48 +00:00
|
|
|
return nil, errors.Wrap(err, "server/filesystem: touch: failed to create directory tree")
|
|
|
|
}
|
|
|
|
if err := fs.Chown(filepath.Dir(cleaned)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-01-10 22:25:39 +00:00
|
|
|
}
|
|
|
|
o := &fileOpener{}
|
|
|
|
// Try to open the file now that we have created the pathing necessary for it, and then
|
|
|
|
// Chown that file so that the permissions don't mess with things.
|
2021-11-15 17:37:56 +00:00
|
|
|
f, err = o.open(cleaned, flag, 0o644)
|
2021-01-10 22:25:39 +00:00
|
|
|
if err != nil {
|
2021-01-31 02:43:35 +00:00
|
|
|
return nil, errors.Wrap(err, "server/filesystem: touch: failed to open file with wait")
|
2021-01-10 22:25:39 +00:00
|
|
|
}
|
|
|
|
_ = fs.Chown(cleaned)
|
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
|
2021-01-16 19:48:30 +00:00
|
|
|
// Writefile writes a file to the system. If the file does not already exist one
|
2021-01-17 02:06:22 +00:00
|
|
|
// will be created. This will also properly recalculate the disk space used by
|
|
|
|
// the server when writing new files or modifying existing ones.
|
2020-09-27 19:24:08 +00:00
|
|
|
func (fs *Filesystem) Writefile(p string, r io.Reader) error {
|
|
|
|
cleaned, err := fs.SafePath(p)
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var currentSize int64
|
|
|
|
// If the file does not exist on the system already go ahead and create the pathway
|
|
|
|
// to it and an empty file. We'll then write to it later on after this completes.
|
2020-12-20 19:17:53 +00:00
|
|
|
stat, err := os.Stat(cleaned)
|
|
|
|
if err != nil && !os.IsNotExist(err) {
|
2021-01-31 02:43:35 +00:00
|
|
|
return errors.Wrap(err, "server/filesystem: writefile: failed to stat file")
|
2020-12-20 19:17:53 +00:00
|
|
|
} else if err == nil {
|
2020-09-27 19:24:08 +00:00
|
|
|
if stat.IsDir() {
|
2021-04-17 20:29:18 +00:00
|
|
|
return errors.WithStack(&Error{code: ErrCodeIsDirectory, resolved: cleaned})
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
currentSize = stat.Size()
|
|
|
|
}
|
|
|
|
|
|
|
|
br := bufio.NewReader(r)
|
2020-12-20 19:17:53 +00:00
|
|
|
// Check that the new size we're writing to the disk can fit. If there is currently
|
|
|
|
// a file we'll subtract that current file size from the size of the buffer to determine
|
|
|
|
// the amount of new data we're writing (or amount we're removing if smaller).
|
|
|
|
if err := fs.HasSpaceFor(int64(br.Size()) - currentSize); err != nil {
|
2020-09-27 19:24:08 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-02-10 20:56:48 +00:00
|
|
|
// Touch the file and return the handle to it at this point. This will create the file,
|
|
|
|
// any necessary directories, and set the proper owner of the file.
|
2021-01-10 22:25:39 +00:00
|
|
|
file, err := fs.Touch(cleaned, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
|
2020-09-27 19:24:08 +00:00
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
buf := make([]byte, 1024*4)
|
|
|
|
sz, err := io.CopyBuffer(file, r, buf)
|
|
|
|
|
|
|
|
// Adjust the disk usage to account for the old size and the new size of the file.
|
|
|
|
fs.addDisk(sz - currentSize)
|
|
|
|
|
2023-02-08 02:11:56 +00:00
|
|
|
return fs.unsafeChown(cleaned)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Creates a new directory (name) at a specified path (p) for the server.
|
|
|
|
func (fs *Filesystem) CreateDirectory(name string, p string) error {
|
|
|
|
cleaned, err := fs.SafePath(path.Join(p, name))
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2021-11-15 17:37:56 +00:00
|
|
|
return os.MkdirAll(cleaned, 0o755)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
2022-05-21 21:01:12 +00:00
|
|
|
// Rename moves (or renames) a file or directory.
|
2020-09-27 19:24:08 +00:00
|
|
|
func (fs *Filesystem) Rename(from string, to string) error {
|
|
|
|
cleanedFrom, err := fs.SafePath(from)
|
|
|
|
if err != nil {
|
2022-05-21 21:01:12 +00:00
|
|
|
return errors.WithStack(err)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cleanedTo, err := fs.SafePath(to)
|
|
|
|
if err != nil {
|
2022-05-21 21:01:12 +00:00
|
|
|
return errors.WithStack(err)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// If the target file or directory already exists the rename function will fail, so just
|
|
|
|
// bail out now.
|
|
|
|
if _, err := os.Stat(cleanedTo); err == nil {
|
|
|
|
return os.ErrExist
|
|
|
|
}
|
|
|
|
|
|
|
|
if cleanedTo == fs.Path() {
|
|
|
|
return errors.New("attempting to rename into an invalid directory space")
|
|
|
|
}
|
|
|
|
|
|
|
|
d := strings.TrimSuffix(cleanedTo, path.Base(cleanedTo))
|
|
|
|
// Ensure that the directory we're moving into exists correctly on the system. Only do this if
|
|
|
|
// we're not at the root directory level.
|
|
|
|
if d != fs.Path() {
|
2021-11-15 17:37:56 +00:00
|
|
|
if mkerr := os.MkdirAll(d, 0o755); mkerr != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return errors.WithMessage(mkerr, "failed to create directory structure for file rename")
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-21 21:01:12 +00:00
|
|
|
if err := os.Rename(cleanedFrom, cleanedTo); err != nil {
|
|
|
|
return errors.WithStack(err)
|
|
|
|
}
|
|
|
|
return nil
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Recursively iterates over a file or directory and sets the permissions on all of the
|
|
|
|
// underlying files. Iterate over all of the files and directories. If it is a file just
|
|
|
|
// go ahead and perform the chown operation. Otherwise dig deeper into the directory until
|
|
|
|
// we've run out of directories to dig into.
|
|
|
|
func (fs *Filesystem) Chown(path string) error {
|
|
|
|
cleaned, err := fs.SafePath(path)
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2023-02-08 02:11:56 +00:00
|
|
|
return fs.unsafeChown(cleaned)
|
|
|
|
}
|
2020-10-01 04:47:42 +00:00
|
|
|
|
2023-02-08 02:11:56 +00:00
|
|
|
// unsafeChown chowns the given path, without checking if the path is safe. This should only be used
|
|
|
|
// when the path has already been checked.
|
|
|
|
func (fs *Filesystem) unsafeChown(path string) error {
|
2020-10-01 04:46:32 +00:00
|
|
|
if fs.isTest {
|
|
|
|
return nil
|
|
|
|
}
|
2020-09-27 19:24:08 +00:00
|
|
|
|
|
|
|
uid := config.Get().System.User.Uid
|
|
|
|
gid := config.Get().System.User.Gid
|
|
|
|
|
|
|
|
// Start by just chowning the initial path that we received.
|
2023-02-08 02:11:56 +00:00
|
|
|
if err := os.Chown(path, uid, gid); err != nil {
|
2021-01-31 02:43:35 +00:00
|
|
|
return errors.Wrap(err, "server/filesystem: chown: failed to chown path")
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// If this is not a directory we can now return from the function, there is nothing
|
|
|
|
// left that we need to do.
|
2023-02-08 02:11:56 +00:00
|
|
|
if st, err := os.Stat(path); err != nil || !st.IsDir() {
|
2020-09-27 19:24:08 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If this was a directory, begin walking over its contents recursively and ensure that all
|
|
|
|
// of the subfiles and directories get their permissions updated as well.
|
2023-02-08 02:11:56 +00:00
|
|
|
err := godirwalk.Walk(path, &godirwalk.Options{
|
2020-09-27 19:24:08 +00:00
|
|
|
Unsorted: true,
|
|
|
|
Callback: func(p string, e *godirwalk.Dirent) error {
|
2021-02-10 20:56:48 +00:00
|
|
|
// Do not attempt to chown a symlink. Go's os.Chown function will affect the symlink
|
2020-09-27 19:24:08 +00:00
|
|
|
// so if it points to a location outside the data directory the user would be able to
|
|
|
|
// (un)intentionally modify that files permissions.
|
|
|
|
if e.IsSymlink() {
|
|
|
|
if e.IsDir() {
|
|
|
|
return godirwalk.SkipThis
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return os.Chown(p, uid, gid)
|
|
|
|
},
|
|
|
|
})
|
2021-01-31 02:43:35 +00:00
|
|
|
return errors.Wrap(err, "server/filesystem: chown: failed to chown during walk function")
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
2020-11-29 20:07:45 +00:00
|
|
|
func (fs *Filesystem) Chmod(path string, mode os.FileMode) error {
|
|
|
|
cleaned, err := fs.SafePath(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if fs.isTest {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := os.Chmod(cleaned, mode); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-01 04:53:50 +00:00
|
|
|
// Begin looping up to 50 times to try and create a unique copy file name. This will take
|
|
|
|
// an input of "file.txt" and generate "file copy.txt". If that name is already taken, it will
|
|
|
|
// then try to write "file copy 2.txt" and so on, until reaching 50 loops. At that point we
|
|
|
|
// won't waste anymore time, just use the current timestamp and make that copy.
|
|
|
|
//
|
|
|
|
// Could probably make this more efficient by checking if there are any files matching the copy
|
|
|
|
// pattern, and trying to find the highest number and then incrementing it by one rather than
|
|
|
|
// looping endlessly.
|
|
|
|
func (fs *Filesystem) findCopySuffix(dir string, name string, extension string) (string, error) {
|
|
|
|
var i int
|
2020-12-27 18:49:08 +00:00
|
|
|
suffix := " copy"
|
2020-10-01 04:53:50 +00:00
|
|
|
|
|
|
|
for i = 0; i < 51; i++ {
|
|
|
|
if i > 0 {
|
|
|
|
suffix = " copy " + strconv.Itoa(i)
|
|
|
|
}
|
|
|
|
|
|
|
|
n := name + suffix + extension
|
|
|
|
// If we stat the file and it does not exist that means we're good to create the copy. If it
|
|
|
|
// does exist, we'll just continue to the next loop and try again.
|
|
|
|
if _, err := fs.Stat(path.Join(dir, n)); err != nil {
|
2020-11-08 23:15:39 +00:00
|
|
|
if !errors.Is(err, os.ErrNotExist) {
|
2020-11-28 23:57:10 +00:00
|
|
|
return "", err
|
2020-10-01 04:53:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
if i == 50 {
|
|
|
|
suffix = "copy." + time.Now().Format(time.RFC3339)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return name + suffix + extension, nil
|
|
|
|
}
|
|
|
|
|
2020-09-27 19:24:08 +00:00
|
|
|
// Copies a given file to the same location and appends a suffix to the file to indicate that
|
|
|
|
// it has been copied.
|
|
|
|
func (fs *Filesystem) Copy(p string) error {
|
|
|
|
cleaned, err := fs.SafePath(p)
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
s, err := os.Stat(cleaned)
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
} else if s.IsDir() || !s.Mode().IsRegular() {
|
|
|
|
// If this is a directory or not a regular file, just throw a not-exist error
|
|
|
|
// since anything calling this function should understand what that means.
|
|
|
|
return os.ErrNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that copying this file wouldn't put the server over its limit.
|
2020-12-20 19:17:53 +00:00
|
|
|
if err := fs.HasSpaceFor(s.Size()); err != nil {
|
2020-09-27 19:24:08 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
base := filepath.Base(cleaned)
|
|
|
|
relative := strings.TrimSuffix(strings.TrimPrefix(cleaned, fs.Path()), base)
|
|
|
|
extension := filepath.Ext(base)
|
|
|
|
name := strings.TrimSuffix(base, extension)
|
|
|
|
|
|
|
|
// Ensure that ".tar" is also counted as apart of the file extension.
|
|
|
|
// There might be a better way to handle this for other double file extensions,
|
|
|
|
// but this is a good workaround for now.
|
|
|
|
if strings.HasSuffix(name, ".tar") {
|
|
|
|
extension = ".tar" + extension
|
|
|
|
name = strings.TrimSuffix(name, ".tar")
|
|
|
|
}
|
|
|
|
|
|
|
|
source, err := os.Open(cleaned)
|
|
|
|
if err != nil {
|
2020-11-28 23:57:10 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
defer source.Close()
|
|
|
|
|
2020-10-01 04:53:50 +00:00
|
|
|
n, err := fs.findCopySuffix(relative, name, extension)
|
2020-11-08 23:15:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-27 19:24:08 +00:00
|
|
|
|
2020-10-01 04:53:50 +00:00
|
|
|
return fs.Writefile(path.Join(relative, n), source)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
2021-01-17 02:06:22 +00:00
|
|
|
// TruncateRootDirectory removes _all_ files and directories from a server's
|
|
|
|
// data directory and resets the used disk space to zero.
|
|
|
|
func (fs *Filesystem) TruncateRootDirectory() error {
|
|
|
|
if err := os.RemoveAll(fs.Path()); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-11-15 17:37:56 +00:00
|
|
|
if err := os.Mkdir(fs.Path(), 0o755); err != nil {
|
2021-01-17 02:06:22 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
atomic.StoreInt64(&fs.diskUsed, 0)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete removes a file or folder from the system. Prevents the user from
|
|
|
|
// accidentally (or maliciously) removing their root server data directory.
|
2020-09-27 19:24:08 +00:00
|
|
|
func (fs *Filesystem) Delete(p string) error {
|
|
|
|
// This is one of the few (only?) places in the codebase where we're explicitly not using
|
|
|
|
// the SafePath functionality when working with user provided input. If we did, you would
|
2023-02-08 21:22:26 +00:00
|
|
|
// not be able to delete a file that is a symlink pointing to a location outside the data
|
2020-09-27 19:24:08 +00:00
|
|
|
// directory.
|
|
|
|
//
|
|
|
|
// We also want to avoid resolving a symlink that points _within_ the data directory and thus
|
|
|
|
// deleting the actual source file for the symlink rather than the symlink itself. For these
|
|
|
|
// purposes just resolve the actual file path using filepath.Join() and confirm that the path
|
|
|
|
// exists within the data directory.
|
|
|
|
resolved := fs.unsafeFilePath(p)
|
|
|
|
if !fs.unsafeIsInDataDirectory(resolved) {
|
2020-11-08 21:52:20 +00:00
|
|
|
return NewBadPathResolution(p, resolved)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Block any whoopsies.
|
|
|
|
if resolved == fs.Path() {
|
|
|
|
return errors.New("cannot delete root server directory")
|
|
|
|
}
|
|
|
|
|
2023-02-08 21:22:26 +00:00
|
|
|
st, err := os.Lstat(resolved)
|
|
|
|
if err != nil {
|
2020-09-27 19:24:08 +00:00
|
|
|
if !os.IsNotExist(err) {
|
|
|
|
fs.error(err).Warn("error while attempting to stat file before deletion")
|
2023-02-08 21:22:26 +00:00
|
|
|
return err
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2023-02-08 21:22:26 +00:00
|
|
|
|
|
|
|
// The following logic is used to handle a case where a user attempts to
|
|
|
|
// delete a file that does not exist through a directory symlink.
|
|
|
|
// We don't want to reveal that the file does not exist, so we validate
|
|
|
|
// the path of the symlink and return a bad path error if it is invalid.
|
|
|
|
|
|
|
|
// The requested file or directory doesn't exist, so at this point we
|
|
|
|
// need to iterate up the path chain until we hit a directory that
|
|
|
|
// _does_ exist and can be validated.
|
|
|
|
parts := strings.Split(filepath.Dir(resolved), "/")
|
|
|
|
|
|
|
|
// Range over all the path parts and form directory paths from the end
|
|
|
|
// moving up until we have a valid resolution, or we run out of paths to
|
|
|
|
// try.
|
|
|
|
for k := range parts {
|
|
|
|
try := strings.Join(parts[:(len(parts)-k)], "/")
|
|
|
|
if !fs.unsafeIsInDataDirectory(try) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
t, err := filepath.EvalSymlinks(try)
|
|
|
|
if err == nil {
|
|
|
|
if !fs.unsafeIsInDataDirectory(t) {
|
|
|
|
return NewBadPathResolution(p, t)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
2023-02-08 21:22:26 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Always return early if the file does not exist.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the file is not a symlink, we need to check that it is not within a
|
|
|
|
// symlinked directory that points outside the data directory.
|
|
|
|
if st.Mode()&os.ModeSymlink == 0 {
|
|
|
|
ep, err := filepath.EvalSymlinks(resolved)
|
|
|
|
if err != nil {
|
|
|
|
if !os.IsNotExist(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if !fs.unsafeIsInDataDirectory(ep) {
|
|
|
|
return NewBadPathResolution(p, ep)
|
2020-09-27 19:24:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-08 21:22:26 +00:00
|
|
|
if st.IsDir() {
|
|
|
|
if s, err := fs.DirectorySize(resolved); err == nil {
|
|
|
|
fs.addDisk(-s)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
fs.addDisk(-st.Size())
|
|
|
|
}
|
2020-10-01 04:47:42 +00:00
|
|
|
|
2020-09-27 19:24:08 +00:00
|
|
|
return os.RemoveAll(resolved)
|
|
|
|
}
|
|
|
|
|
|
|
|
type fileOpener struct {
|
|
|
|
busy uint
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempts to open a given file up to "attempts" number of times, using a backoff. If the file
|
|
|
|
// cannot be opened because of a "text file busy" error, we will attempt until the number of attempts
|
|
|
|
// has been exhaused, at which point we will abort with an error.
|
|
|
|
func (fo *fileOpener) open(path string, flags int, perm os.FileMode) (*os.File, error) {
|
|
|
|
for {
|
|
|
|
f, err := os.OpenFile(path, flags, perm)
|
|
|
|
|
|
|
|
// If there is an error because the text file is busy, go ahead and sleep for a few
|
|
|
|
// hundred milliseconds and then try again up to three times before just returning the
|
|
|
|
// error back to the caller.
|
|
|
|
//
|
|
|
|
// Based on code from: https://github.com/golang/go/issues/22220#issuecomment-336458122
|
|
|
|
if err != nil && fo.busy < 3 && strings.Contains(err.Error(), "text file busy") {
|
|
|
|
time.Sleep(100 * time.Millisecond << fo.busy)
|
|
|
|
fo.busy++
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return f, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-16 20:03:55 +00:00
|
|
|
// ListDirectory lists the contents of a given directory and returns stat
|
|
|
|
// information about each file and folder within it.
|
|
|
|
func (fs *Filesystem) ListDirectory(p string) ([]Stat, error) {
|
2020-09-27 19:24:08 +00:00
|
|
|
cleaned, err := fs.SafePath(p)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
files, err := ioutil.ReadDir(cleaned)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
|
|
|
// You must initialize the output of this directory as a non-nil value otherwise
|
|
|
|
// when it is marshaled into a JSON object you'll just get 'null' back, which will
|
|
|
|
// break the panel badly.
|
2021-01-16 20:03:55 +00:00
|
|
|
out := make([]Stat, len(files))
|
2020-09-27 19:24:08 +00:00
|
|
|
|
|
|
|
// Iterate over all of the files and directories returned and perform an async process
|
|
|
|
// to get the mime-type for them all.
|
|
|
|
for i, file := range files {
|
|
|
|
wg.Add(1)
|
|
|
|
|
|
|
|
go func(idx int, f os.FileInfo) {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
var m *mimetype.MIME
|
2021-11-15 17:37:56 +00:00
|
|
|
d := "inode/directory"
|
2020-09-27 19:24:08 +00:00
|
|
|
if !f.IsDir() {
|
2020-10-02 04:28:38 +00:00
|
|
|
cleanedp := filepath.Join(cleaned, f.Name())
|
|
|
|
if f.Mode()&os.ModeSymlink != 0 {
|
|
|
|
cleanedp, _ = fs.SafePath(filepath.Join(cleaned, f.Name()))
|
|
|
|
}
|
|
|
|
|
2022-05-07 19:53:08 +00:00
|
|
|
// Don't try to detect the type on a pipe — this will just hang the application and
|
|
|
|
// you'll never get a response back.
|
|
|
|
//
|
|
|
|
// @see https://github.com/pterodactyl/panel/issues/4059
|
|
|
|
if cleanedp != "" && f.Mode()&os.ModeNamedPipe == 0 {
|
2020-09-27 19:24:08 +00:00
|
|
|
m, _ = mimetype.DetectFile(filepath.Join(cleaned, f.Name()))
|
|
|
|
} else {
|
|
|
|
// Just pass this for an unknown type because the file could not safely be resolved within
|
|
|
|
// the server data path.
|
|
|
|
d = "application/octet-stream"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-16 20:03:55 +00:00
|
|
|
st := Stat{FileInfo: f, Mimetype: d}
|
2020-09-27 19:24:08 +00:00
|
|
|
if m != nil {
|
|
|
|
st.Mimetype = m.String()
|
|
|
|
}
|
|
|
|
out[idx] = st
|
|
|
|
}(i, file)
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
// Sort the output alphabetically to begin with since we've run the output
|
|
|
|
// through an asynchronous process and the order is gonna be very random.
|
|
|
|
sort.SliceStable(out, func(i, j int) bool {
|
2021-01-16 20:03:55 +00:00
|
|
|
if out[i].Name() == out[j].Name() || out[i].Name() > out[j].Name() {
|
2020-09-27 19:24:08 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
})
|
|
|
|
|
|
|
|
// Then, sort it so that directories are listed first in the output. Everything
|
|
|
|
// will continue to be alphabetized at this point.
|
|
|
|
sort.SliceStable(out, func(i, j int) bool {
|
2021-01-16 20:03:55 +00:00
|
|
|
return out[i].IsDir()
|
2020-09-27 19:24:08 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
2021-09-01 15:54:41 +00:00
|
|
|
|
|
|
|
func (fs *Filesystem) Chtimes(path string, atime, mtime time.Time) error {
|
|
|
|
cleaned, err := fs.SafePath(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if fs.isTest {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := os.Chtimes(cleaned, atime, mtime); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|