diff --git a/internal/common/eventmanager.go b/internal/common/eventmanager.go index 555454512..3ad270b1e 100644 --- a/internal/common/eventmanager.go +++ b/internal/common/eventmanager.go @@ -1374,6 +1374,7 @@ func getHTTPRuleActionBody(c *dataprovider.EventActionHTTPConfig, replacer *stri go func() { defer w.Close() defer user.CloseFs() //nolint:errcheck + defer conn.CloseFS() //nolint:errcheck for _, part := range c.Parts { h := make(textproto.MIMEHeader) @@ -1591,6 +1592,8 @@ func executeEmailRuleAction(c dataprovider.EventActionEmailConfig, params *Event return fmt.Errorf("error getting email attachments, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + res, err := getMailAttachments(conn, fileAttachments, replacer) if err != nil { return err @@ -1652,6 +1655,8 @@ func executeDeleteFsActionForUser(deletes []string, replacer *strings.Replacer, return fmt.Errorf("delete error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + for _, item := range replacePathsPlaceholders(deletes, replacer) { info, err := conn.DoStat(item, 0, false) if err != nil { @@ -1720,6 +1725,8 @@ func executeMkDirsFsActionForUser(dirs []string, replacer *strings.Replacer, use return fmt.Errorf("mkdir error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + for _, item := range replacePathsPlaceholders(dirs, replacer) { if err = conn.CheckParentDirs(path.Dir(item)); err != nil { return fmt.Errorf("unable to check parent dirs for %q, user %q: %w", item, user.Username, err) @@ -1779,6 +1786,8 @@ func executeRenameFsActionForUser(renames []dataprovider.RenameConfig, replacer return fmt.Errorf("rename error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + for _, item := range renames { source := util.CleanPath(replaceWithReplacer(item.Key, replacer)) target := util.CleanPath(replaceWithReplacer(item.Value, replacer)) @@ -1808,6 +1817,8 @@ func executeCopyFsActionForUser(keyVals []dataprovider.KeyValue, replacer *strin return fmt.Errorf("copy error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + for _, item := range keyVals { source := util.CleanPath(replaceWithReplacer(item.Key, replacer)) target := util.CleanPath(replaceWithReplacer(item.Value, replacer)) @@ -1839,6 +1850,8 @@ func executeExistFsActionForUser(exist []string, replacer *strings.Replacer, return fmt.Errorf("existence check error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + for _, item := range replacePathsPlaceholders(exist, replacer) { if _, err = conn.DoStat(item, 0, false); err != nil { return fmt.Errorf("error checking existence for path %q, user %q: %w", item, user.Username, err) @@ -1997,6 +2010,8 @@ func executeCompressFsActionForUser(c dataprovider.EventActionFsCompress, replac return fmt.Errorf("compress error, unable to check root fs for user %q: %w", user.Username, err) } conn := NewBaseConnection(connectionID, protocolEventAction, "", "", user) + defer conn.CloseFS() //nolint:errcheck + name := util.CleanPath(replaceWithReplacer(c.Name, replacer)) conn.CheckParentDirs(path.Dir(name)) //nolint:errcheck paths := make([]string, 0, len(c.Paths)) diff --git a/internal/httpd/api_shares.go b/internal/httpd/api_shares.go index a54f8c74d..6594d59de 100644 --- a/internal/httpd/api_shares.go +++ b/internal/httpd/api_shares.go @@ -575,6 +575,7 @@ func validateBrowsableShare(share dataprovider.Share, connection *Connection) er basePath := share.Paths[0] info, err := connection.Stat(basePath, 0) if err != nil { + connection.CloseFS() //nolint:errcheck return util.NewI18nError( fmt.Errorf("unable to check the share directory: %w", err), util.I18nErrorShareInvalidPath,