package plugins import ( "regexp" "strings" "github.com/goravel/framework/contracts/http" "github.com/spf13/cast" "panel/app/http/controllers" "panel/pkg/tools" ) type PureFtpdController struct { } type User struct { Username string `json:"username"` Path string `json:"path"` } func NewPureFtpdController() *PureFtpdController { return &PureFtpdController{} } // Status 获取运行状态 func (r *PureFtpdController) Status(ctx http.Context) http.Response { status, err := tools.ServiceStatus("pure-ftpd") if err != nil { return controllers.Error(ctx, http.StatusInternalServerError, "获取PureFtpd状态失败") } return controllers.Success(ctx, status) } // Restart 重启服务 func (r *PureFtpdController) Restart(ctx http.Context) http.Response { err := tools.ServiceRestart("pure-ftpd") if err != nil { return controllers.Error(ctx, http.StatusInternalServerError, "重启PureFtpd失败") } return controllers.Success(ctx, nil) } // Start 启动服务 func (r *PureFtpdController) Start(ctx http.Context) http.Response { err := tools.ServiceStart("pure-ftpd") if err != nil { return controllers.Error(ctx, http.StatusInternalServerError, "启动PureFtpd失败") } return controllers.Success(ctx, nil) } // Stop 停止服务 func (r *PureFtpdController) Stop(ctx http.Context) http.Response { err := tools.ServiceStop("pure-ftpd") if err != nil { return controllers.Error(ctx, http.StatusInternalServerError, "停止PureFtpd失败") } return controllers.Success(ctx, nil) } // List 获取用户列表 func (r *PureFtpdController) List(ctx http.Context) http.Response { listRaw, err := tools.Exec("pure-pw list") if err != nil { return controllers.Success(ctx, http.Json{ "total": 0, "items": []User{}, }) } listArr := strings.Split(listRaw, "\n") var users []User for _, v := range listArr { if len(v) == 0 { continue } match := regexp.MustCompile(`(\S+)\s+(\S+)`).FindStringSubmatch(v) users = append(users, User{ Username: match[1], Path: strings.Replace(match[2], "/./", "/", 1), }) } page := ctx.Request().QueryInt("page", 1) limit := ctx.Request().QueryInt("limit", 10) startIndex := (page - 1) * limit endIndex := page * limit if startIndex > len(users) { return controllers.Success(ctx, http.Json{ "total": 0, "items": []User{}, }) } if endIndex > len(users) { endIndex = len(users) } pagedUsers := users[startIndex:endIndex] return controllers.Success(ctx, http.Json{ "total": len(users), "items": pagedUsers, }) } // Add 添加用户 func (r *PureFtpdController) Add(ctx http.Context) http.Response { validator, err := ctx.Request().Validate(map[string]string{ "username": "required", "password": "required|min_len:6", "path": "required", }) if err != nil { return controllers.Error(ctx, http.StatusUnprocessableEntity, err.Error()) } if validator.Fails() { return controllers.Error(ctx, http.StatusUnprocessableEntity, validator.Errors().One()) } username := ctx.Request().Input("username") password := ctx.Request().Input("password") path := ctx.Request().Input("path") if !strings.HasPrefix(path, "/") { path = "/" + path } if !tools.Exists(path) { return controllers.Error(ctx, http.StatusUnprocessableEntity, "目录不存在") } if err = tools.Chmod(path, 0755); err != nil { return controllers.Error(ctx, http.StatusUnprocessableEntity, "修改目录权限失败") } if err = tools.Chown(path, "www", "www"); err != nil { return nil } if out, err := tools.Exec(`yes '` + password + `' | pure-pw useradd ` + username + ` -u www -g www -d ` + path); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if out, err := tools.Exec("pure-pw mkdb"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } return controllers.Success(ctx, nil) } // Delete 删除用户 func (r *PureFtpdController) Delete(ctx http.Context) http.Response { validator, err := ctx.Request().Validate(map[string]string{ "username": "required", }) if err != nil { return controllers.Error(ctx, http.StatusUnprocessableEntity, err.Error()) } if validator.Fails() { return controllers.Error(ctx, http.StatusUnprocessableEntity, validator.Errors().One()) } username := ctx.Request().Input("username") if out, err := tools.Exec("pure-pw userdel " + username + " -m"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if out, err := tools.Exec("pure-pw mkdb"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } return controllers.Success(ctx, nil) } // ChangePassword 修改密码 func (r *PureFtpdController) ChangePassword(ctx http.Context) http.Response { validator, err := ctx.Request().Validate(map[string]string{ "username": "required", "password": "required|min_len:6", }) if err != nil { return controllers.Error(ctx, http.StatusUnprocessableEntity, err.Error()) } if validator.Fails() { return controllers.Error(ctx, http.StatusUnprocessableEntity, validator.Errors().One()) } username := ctx.Request().Input("username") password := ctx.Request().Input("password") if out, err := tools.Exec(`yes '` + password + `' | pure-pw passwd ` + username + ` -m`); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if out, err := tools.Exec("pure-pw mkdb"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } return controllers.Success(ctx, nil) } // GetPort 获取端口 func (r *PureFtpdController) GetPort(ctx http.Context) http.Response { port, err := tools.Exec(`cat /www/server/pure-ftpd/etc/pure-ftpd.conf | grep "Bind" | awk '{print $2}' | awk -F "," '{print $2}'`) if err != nil { return controllers.Error(ctx, http.StatusInternalServerError, "获取PureFtpd端口失败") } return controllers.Success(ctx, cast.ToInt(port)) } // SetPort 设置端口 func (r *PureFtpdController) SetPort(ctx http.Context) http.Response { validator, err := ctx.Request().Validate(map[string]string{ "port": "required", }) if err != nil { return controllers.Error(ctx, http.StatusUnprocessableEntity, err.Error()) } if validator.Fails() { return controllers.Error(ctx, http.StatusUnprocessableEntity, validator.Errors().One()) } port := ctx.Request().Input("port") if out, err := tools.Exec(`sed -i "s/Bind.*/Bind 0.0.0.0,` + port + `/g" /www/server/pure-ftpd/etc/pure-ftpd.conf`); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if tools.IsRHEL() { if out, err := tools.Exec("firewall-cmd --zone=public --add-port=" + port + "/tcp --permanent"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if out, err := tools.Exec("firewall-cmd --reload"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } } else { if out, err := tools.Exec("ufw allow " + port + "/tcp"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } if out, err := tools.Exec("ufw reload"); err != nil { return controllers.Error(ctx, http.StatusInternalServerError, out) } } return r.Restart(ctx) }