mirror of https://github.com/cloudreve/Cloudreve
112 lines
2.8 KiB
Go
112 lines
2.8 KiB
Go
package dbfs
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/cloudreve/Cloudreve/v4/ent"
|
|
"github.com/cloudreve/Cloudreve/v4/pkg/filemanager/fs"
|
|
"github.com/cloudreve/Cloudreve/v4/pkg/util"
|
|
)
|
|
|
|
const MaxFileNameLength = 256
|
|
|
|
// validateFileName validates the file name.
|
|
func validateFileName(name string) error {
|
|
if len(name) >= MaxFileNameLength || len(name) == 0 {
|
|
return fmt.Errorf("length of name must be between 1 and 255")
|
|
}
|
|
|
|
if strings.ContainsAny(name, "\\/:*?\"<>|") {
|
|
return fmt.Errorf("name contains illegal characters")
|
|
}
|
|
|
|
if name == "." || name == ".." {
|
|
return fmt.Errorf("name cannot be only dot")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// validateExtension validates the file extension.
|
|
func validateExtension(name string, policy *ent.StoragePolicy) error {
|
|
if len(policy.Settings.FileType) == 0 {
|
|
return nil
|
|
}
|
|
|
|
inList := util.IsInExtensionList(policy.Settings.FileType, name)
|
|
if (policy.Settings.IsFileTypeDenyList && inList) || (!policy.Settings.IsFileTypeDenyList && !inList) {
|
|
return fmt.Errorf("file extension is not allowed")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func validateFileNameRegexp(name string, policy *ent.StoragePolicy) error {
|
|
if policy.Settings.NameRegexp == "" {
|
|
return nil
|
|
}
|
|
|
|
match, err := regexp.MatchString(policy.Settings.NameRegexp, name)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid file name regexp: %s", err)
|
|
}
|
|
|
|
if (policy.Settings.IsNameRegexpDenyList && match) || (!policy.Settings.IsNameRegexpDenyList && !match) {
|
|
return fmt.Errorf("file name is not allowed by regexp")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// validateFileSize validates the file size.
|
|
func validateFileSize(size int64, policy *ent.StoragePolicy) error {
|
|
if policy.MaxSize == 0 {
|
|
return nil
|
|
} else if size > policy.MaxSize {
|
|
return fs.ErrFileSizeTooBig
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// validateNewFile validates the upload request.
|
|
func validateNewFile(fileName string, size int64, policy *ent.StoragePolicy) error {
|
|
if err := validateFileName(fileName); err != nil {
|
|
return fs.ErrIllegalObjectName.WithError(err)
|
|
}
|
|
|
|
if err := validateExtension(fileName, policy); err != nil {
|
|
return fs.ErrIllegalObjectName.WithError(err)
|
|
}
|
|
|
|
if err := validateFileNameRegexp(fileName, policy); err != nil {
|
|
return fs.ErrIllegalObjectName.WithError(err)
|
|
}
|
|
|
|
if err := validateFileSize(size, policy); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (f *DBFS) validateUserCapacity(ctx context.Context, size int64, u *ent.User) error {
|
|
capacity, err := f.Capacity(ctx, u)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get user capacity: %s", err)
|
|
}
|
|
|
|
return f.validateUserCapacityRaw(ctx, size, capacity)
|
|
}
|
|
|
|
// validateUserCapacityRaw validates the user capacity, but does not fetch the capacity.
|
|
func (f *DBFS) validateUserCapacityRaw(ctx context.Context, size int64, capacity *fs.Capacity) error {
|
|
if capacity.Used+size > capacity.Total {
|
|
return fs.ErrInsufficientCapacity
|
|
}
|
|
return nil
|
|
}
|