eventmanager_test.go 74 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "errors"
  19. "fmt"
  20. "io"
  21. "mime/multipart"
  22. "net/http"
  23. "net/url"
  24. "os"
  25. "path"
  26. "path/filepath"
  27. "runtime"
  28. "strings"
  29. "testing"
  30. "time"
  31. "github.com/klauspost/compress/zip"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. sdkkms "github.com/sftpgo/sdk/kms"
  35. "github.com/stretchr/testify/assert"
  36. "github.com/stretchr/testify/require"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/kms"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. func TestEventRuleMatch(t *testing.T) {
  43. role := "role1"
  44. conditions := &dataprovider.EventConditions{
  45. ProviderEvents: []string{"add", "update"},
  46. Options: dataprovider.ConditionOptions{
  47. Names: []dataprovider.ConditionPattern{
  48. {
  49. Pattern: "user1",
  50. InverseMatch: true,
  51. },
  52. },
  53. RoleNames: []dataprovider.ConditionPattern{
  54. {
  55. Pattern: role,
  56. },
  57. },
  58. },
  59. }
  60. res := eventManager.checkProviderEventMatch(conditions, &EventParams{
  61. Name: "user1",
  62. Role: role,
  63. Event: "add",
  64. })
  65. assert.False(t, res)
  66. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  67. Name: "user2",
  68. Role: role,
  69. Event: "update",
  70. })
  71. assert.True(t, res)
  72. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  73. Name: "user2",
  74. Role: role,
  75. Event: "delete",
  76. })
  77. assert.False(t, res)
  78. conditions.Options.ProviderObjects = []string{"api_key"}
  79. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  80. Name: "user2",
  81. Event: "update",
  82. Role: role,
  83. ObjectType: "share",
  84. })
  85. assert.False(t, res)
  86. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  87. Name: "user2",
  88. Event: "update",
  89. Role: role,
  90. ObjectType: "api_key",
  91. })
  92. assert.True(t, res)
  93. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  94. Name: "user2",
  95. Event: "update",
  96. Role: role + "1",
  97. ObjectType: "api_key",
  98. })
  99. assert.False(t, res)
  100. // now test fs events
  101. conditions = &dataprovider.EventConditions{
  102. FsEvents: []string{operationUpload, operationDownload},
  103. Options: dataprovider.ConditionOptions{
  104. Names: []dataprovider.ConditionPattern{
  105. {
  106. Pattern: "user*",
  107. },
  108. {
  109. Pattern: "tester*",
  110. },
  111. },
  112. RoleNames: []dataprovider.ConditionPattern{
  113. {
  114. Pattern: role,
  115. InverseMatch: true,
  116. },
  117. },
  118. FsPaths: []dataprovider.ConditionPattern{
  119. {
  120. Pattern: "/**/*.txt",
  121. },
  122. },
  123. Protocols: []string{ProtocolSFTP},
  124. MinFileSize: 10,
  125. MaxFileSize: 30,
  126. },
  127. }
  128. params := EventParams{
  129. Name: "tester4",
  130. Event: operationDelete,
  131. VirtualPath: "/path.txt",
  132. Protocol: ProtocolSFTP,
  133. ObjectName: "path.txt",
  134. FileSize: 20,
  135. }
  136. res = eventManager.checkFsEventMatch(conditions, &params)
  137. assert.False(t, res)
  138. params.Event = operationDownload
  139. res = eventManager.checkFsEventMatch(conditions, &params)
  140. assert.True(t, res)
  141. params.Role = role
  142. res = eventManager.checkFsEventMatch(conditions, &params)
  143. assert.False(t, res)
  144. params.Role = ""
  145. params.Name = "name"
  146. res = eventManager.checkFsEventMatch(conditions, &params)
  147. assert.False(t, res)
  148. params.Name = "user5"
  149. res = eventManager.checkFsEventMatch(conditions, &params)
  150. assert.True(t, res)
  151. params.VirtualPath = "/sub/f.jpg"
  152. params.ObjectName = path.Base(params.VirtualPath)
  153. res = eventManager.checkFsEventMatch(conditions, &params)
  154. assert.False(t, res)
  155. params.VirtualPath = "/sub/f.txt"
  156. params.ObjectName = path.Base(params.VirtualPath)
  157. res = eventManager.checkFsEventMatch(conditions, &params)
  158. assert.True(t, res)
  159. params.Protocol = ProtocolHTTP
  160. res = eventManager.checkFsEventMatch(conditions, &params)
  161. assert.False(t, res)
  162. params.Protocol = ProtocolSFTP
  163. params.FileSize = 5
  164. res = eventManager.checkFsEventMatch(conditions, &params)
  165. assert.False(t, res)
  166. params.FileSize = 50
  167. res = eventManager.checkFsEventMatch(conditions, &params)
  168. assert.False(t, res)
  169. params.FileSize = 25
  170. res = eventManager.checkFsEventMatch(conditions, &params)
  171. assert.True(t, res)
  172. // bad pattern
  173. conditions.Options.Names = []dataprovider.ConditionPattern{
  174. {
  175. Pattern: "[-]",
  176. },
  177. }
  178. res = eventManager.checkFsEventMatch(conditions, &params)
  179. assert.False(t, res)
  180. // check fs events with group name filters
  181. conditions = &dataprovider.EventConditions{
  182. FsEvents: []string{operationUpload, operationDownload},
  183. Options: dataprovider.ConditionOptions{
  184. GroupNames: []dataprovider.ConditionPattern{
  185. {
  186. Pattern: "group*",
  187. },
  188. {
  189. Pattern: "testgroup*",
  190. },
  191. },
  192. },
  193. }
  194. params = EventParams{
  195. Name: "user1",
  196. Event: operationUpload,
  197. }
  198. res = eventManager.checkFsEventMatch(conditions, &params)
  199. assert.False(t, res)
  200. params.Groups = []sdk.GroupMapping{
  201. {
  202. Name: "g1",
  203. Type: sdk.GroupTypePrimary,
  204. },
  205. {
  206. Name: "g2",
  207. Type: sdk.GroupTypeSecondary,
  208. },
  209. }
  210. res = eventManager.checkFsEventMatch(conditions, &params)
  211. assert.False(t, res)
  212. params.Groups = []sdk.GroupMapping{
  213. {
  214. Name: "testgroup2",
  215. Type: sdk.GroupTypePrimary,
  216. },
  217. {
  218. Name: "g2",
  219. Type: sdk.GroupTypeSecondary,
  220. },
  221. }
  222. res = eventManager.checkFsEventMatch(conditions, &params)
  223. assert.True(t, res)
  224. // check user conditions
  225. user := dataprovider.User{}
  226. user.Username = "u1"
  227. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  228. assert.True(t, res)
  229. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  230. Names: []dataprovider.ConditionPattern{
  231. {
  232. Pattern: "user",
  233. },
  234. },
  235. })
  236. assert.False(t, res)
  237. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  238. RoleNames: []dataprovider.ConditionPattern{
  239. {
  240. Pattern: role,
  241. },
  242. },
  243. })
  244. assert.False(t, res)
  245. user.Role = role
  246. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  247. RoleNames: []dataprovider.ConditionPattern{
  248. {
  249. Pattern: role,
  250. },
  251. },
  252. })
  253. assert.True(t, res)
  254. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  255. GroupNames: []dataprovider.ConditionPattern{
  256. {
  257. Pattern: "group",
  258. },
  259. },
  260. RoleNames: []dataprovider.ConditionPattern{
  261. {
  262. Pattern: role,
  263. },
  264. },
  265. })
  266. assert.False(t, res)
  267. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  268. IDPLoginEvent: 0,
  269. }, &EventParams{
  270. Event: IDPLoginAdmin,
  271. })
  272. assert.True(t, res)
  273. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  274. IDPLoginEvent: 2,
  275. }, &EventParams{
  276. Event: IDPLoginAdmin,
  277. })
  278. assert.True(t, res)
  279. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  280. IDPLoginEvent: 1,
  281. }, &EventParams{
  282. Event: IDPLoginAdmin,
  283. })
  284. assert.False(t, res)
  285. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  286. IDPLoginEvent: 1,
  287. }, &EventParams{
  288. Event: IDPLoginUser,
  289. })
  290. assert.True(t, res)
  291. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  292. IDPLoginEvent: 1,
  293. }, &EventParams{
  294. Name: "user",
  295. Event: IDPLoginUser,
  296. })
  297. assert.True(t, res)
  298. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  299. IDPLoginEvent: 1,
  300. Options: dataprovider.ConditionOptions{
  301. Names: []dataprovider.ConditionPattern{
  302. {
  303. Pattern: "abc",
  304. },
  305. },
  306. },
  307. }, &EventParams{
  308. Name: "user",
  309. Event: IDPLoginUser,
  310. })
  311. assert.False(t, res)
  312. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  313. IDPLoginEvent: 2,
  314. }, &EventParams{
  315. Name: "user",
  316. Event: IDPLoginUser,
  317. })
  318. assert.False(t, res)
  319. }
  320. func TestDoubleStarMatching(t *testing.T) {
  321. c := dataprovider.ConditionPattern{
  322. Pattern: "/mydir/**",
  323. }
  324. res := checkEventConditionPattern(c, "/mydir")
  325. assert.True(t, res)
  326. res = checkEventConditionPattern(c, "/mydirname")
  327. assert.False(t, res)
  328. res = checkEventConditionPattern(c, "/mydir/sub")
  329. assert.True(t, res)
  330. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  331. assert.True(t, res)
  332. c.Pattern = "/**/*"
  333. res = checkEventConditionPattern(c, "/mydir")
  334. assert.True(t, res)
  335. res = checkEventConditionPattern(c, "/mydirname")
  336. assert.True(t, res)
  337. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  338. assert.True(t, res)
  339. c.Pattern = "/**/*.filepart"
  340. res = checkEventConditionPattern(c, "/file.filepart")
  341. assert.True(t, res)
  342. res = checkEventConditionPattern(c, "/mydir/sub/file.filepart")
  343. assert.True(t, res)
  344. res = checkEventConditionPattern(c, "/file.txt")
  345. assert.False(t, res)
  346. res = checkEventConditionPattern(c, "/mydir/file.txt")
  347. assert.False(t, res)
  348. c.Pattern = "/mydir/**/*.txt"
  349. res = checkEventConditionPattern(c, "/mydir")
  350. assert.False(t, res)
  351. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  352. assert.False(t, res)
  353. res = checkEventConditionPattern(c, "/mydir/sub")
  354. assert.False(t, res)
  355. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  356. assert.False(t, res)
  357. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  358. assert.True(t, res)
  359. c.InverseMatch = true
  360. assert.True(t, checkEventConditionPattern(c, "/mydir"))
  361. assert.True(t, checkEventConditionPattern(c, "/mydirname/f.txt"))
  362. assert.True(t, checkEventConditionPattern(c, "/mydir/sub"))
  363. assert.True(t, checkEventConditionPattern(c, "/mydir/sub/dir"))
  364. assert.False(t, checkEventConditionPattern(c, "/mydir/sub/dir/a.txt"))
  365. }
  366. func TestMutlipleDoubleStarMatching(t *testing.T) {
  367. patterns := []dataprovider.ConditionPattern{
  368. {
  369. Pattern: "/**/*.txt",
  370. InverseMatch: false,
  371. },
  372. {
  373. Pattern: "/**/*.tmp",
  374. InverseMatch: false,
  375. },
  376. }
  377. assert.False(t, checkEventConditionPatterns("/mydir", patterns))
  378. assert.True(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  379. assert.True(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  380. assert.False(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  381. assert.False(t, checkEventConditionPatterns("/mydir/sub", patterns))
  382. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  383. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  384. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  385. }
  386. func TestMultipleDoubleStarMatchingInverse(t *testing.T) {
  387. patterns := []dataprovider.ConditionPattern{
  388. {
  389. Pattern: "/**/*.txt",
  390. InverseMatch: true,
  391. },
  392. {
  393. Pattern: "/**/*.tmp",
  394. InverseMatch: true,
  395. },
  396. }
  397. assert.True(t, checkEventConditionPatterns("/mydir", patterns))
  398. assert.False(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  399. assert.False(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  400. assert.True(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  401. assert.True(t, checkEventConditionPatterns("/mydir/sub", patterns))
  402. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  403. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  404. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  405. }
  406. func TestGroupConditionPatterns(t *testing.T) {
  407. group1 := "group1"
  408. group2 := "group2"
  409. patterns := []dataprovider.ConditionPattern{
  410. {
  411. Pattern: group1,
  412. },
  413. {
  414. Pattern: group2,
  415. },
  416. }
  417. inversePatterns := []dataprovider.ConditionPattern{
  418. {
  419. Pattern: group1,
  420. InverseMatch: true,
  421. },
  422. {
  423. Pattern: group2,
  424. InverseMatch: true,
  425. },
  426. }
  427. groups := []sdk.GroupMapping{
  428. {
  429. Name: "group3",
  430. Type: sdk.GroupTypePrimary,
  431. },
  432. }
  433. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  434. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  435. groups = []sdk.GroupMapping{
  436. {
  437. Name: group1,
  438. Type: sdk.GroupTypePrimary,
  439. },
  440. {
  441. Name: "group4",
  442. Type: sdk.GroupTypePrimary,
  443. },
  444. }
  445. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  446. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  447. groups = []sdk.GroupMapping{
  448. {
  449. Name: group1,
  450. Type: sdk.GroupTypePrimary,
  451. },
  452. }
  453. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  454. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  455. groups = []sdk.GroupMapping{
  456. {
  457. Name: "group11",
  458. Type: sdk.GroupTypePrimary,
  459. },
  460. }
  461. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  462. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  463. }
  464. func TestEventManager(t *testing.T) {
  465. startEventScheduler()
  466. action := &dataprovider.BaseEventAction{
  467. Name: "test_action",
  468. Type: dataprovider.ActionTypeHTTP,
  469. Options: dataprovider.BaseEventActionOptions{
  470. HTTPConfig: dataprovider.EventActionHTTPConfig{
  471. Endpoint: "http://localhost",
  472. Timeout: 20,
  473. Method: http.MethodGet,
  474. },
  475. },
  476. }
  477. err := dataprovider.AddEventAction(action, "", "", "")
  478. assert.NoError(t, err)
  479. rule := &dataprovider.EventRule{
  480. Name: "rule",
  481. Status: 1,
  482. Trigger: dataprovider.EventTriggerFsEvent,
  483. Conditions: dataprovider.EventConditions{
  484. FsEvents: []string{operationUpload},
  485. },
  486. Actions: []dataprovider.EventAction{
  487. {
  488. BaseEventAction: dataprovider.BaseEventAction{
  489. Name: action.Name,
  490. },
  491. Order: 1,
  492. },
  493. },
  494. }
  495. err = dataprovider.AddEventRule(rule, "", "", "")
  496. assert.NoError(t, err)
  497. eventManager.RLock()
  498. assert.Len(t, eventManager.FsEvents, 1)
  499. assert.Len(t, eventManager.ProviderEvents, 0)
  500. assert.Len(t, eventManager.Schedules, 0)
  501. assert.Len(t, eventManager.schedulesMapping, 0)
  502. eventManager.RUnlock()
  503. rule.Trigger = dataprovider.EventTriggerProviderEvent
  504. rule.Conditions = dataprovider.EventConditions{
  505. ProviderEvents: []string{"add"},
  506. }
  507. err = dataprovider.UpdateEventRule(rule, "", "", "")
  508. assert.NoError(t, err)
  509. eventManager.RLock()
  510. assert.Len(t, eventManager.FsEvents, 0)
  511. assert.Len(t, eventManager.ProviderEvents, 1)
  512. assert.Len(t, eventManager.Schedules, 0)
  513. assert.Len(t, eventManager.schedulesMapping, 0)
  514. eventManager.RUnlock()
  515. rule.Trigger = dataprovider.EventTriggerSchedule
  516. rule.Conditions = dataprovider.EventConditions{
  517. Schedules: []dataprovider.Schedule{
  518. {
  519. Hours: "0",
  520. DayOfWeek: "*",
  521. DayOfMonth: "*",
  522. Month: "*",
  523. },
  524. },
  525. }
  526. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  527. eventManager.addUpdateRuleInternal(*rule)
  528. eventManager.RLock()
  529. assert.Len(t, eventManager.FsEvents, 0)
  530. assert.Len(t, eventManager.ProviderEvents, 0)
  531. assert.Len(t, eventManager.Schedules, 0)
  532. assert.Len(t, eventManager.schedulesMapping, 0)
  533. eventManager.RUnlock()
  534. assert.Eventually(t, func() bool {
  535. _, err = dataprovider.EventRuleExists(rule.Name)
  536. ok := errors.Is(err, util.ErrNotFound)
  537. return ok
  538. }, 2*time.Second, 100*time.Millisecond)
  539. rule.DeletedAt = 0
  540. err = dataprovider.AddEventRule(rule, "", "", "")
  541. assert.NoError(t, err)
  542. eventManager.RLock()
  543. assert.Len(t, eventManager.FsEvents, 0)
  544. assert.Len(t, eventManager.ProviderEvents, 0)
  545. assert.Len(t, eventManager.Schedules, 1)
  546. assert.Len(t, eventManager.schedulesMapping, 1)
  547. eventManager.RUnlock()
  548. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  549. assert.NoError(t, err)
  550. eventManager.RLock()
  551. assert.Len(t, eventManager.FsEvents, 0)
  552. assert.Len(t, eventManager.ProviderEvents, 0)
  553. assert.Len(t, eventManager.Schedules, 0)
  554. assert.Len(t, eventManager.schedulesMapping, 0)
  555. eventManager.RUnlock()
  556. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  557. assert.NoError(t, err)
  558. stopEventScheduler()
  559. }
  560. func TestEventManagerErrors(t *testing.T) {
  561. startEventScheduler()
  562. providerConf := dataprovider.GetProviderConfig()
  563. err := dataprovider.Close()
  564. assert.NoError(t, err)
  565. params := EventParams{
  566. sender: "sender",
  567. }
  568. _, err = params.getUsers()
  569. assert.Error(t, err)
  570. _, err = params.getFolders()
  571. assert.Error(t, err)
  572. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  573. assert.Error(t, err)
  574. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  575. assert.Error(t, err)
  576. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  577. assert.Error(t, err)
  578. err = executeUserExpirationCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  579. assert.Error(t, err)
  580. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{},
  581. dataprovider.ConditionOptions{}, &EventParams{}, time.Time{})
  582. assert.Error(t, err)
  583. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  584. assert.Error(t, err)
  585. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  586. assert.Error(t, err)
  587. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  588. assert.Error(t, err)
  589. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  590. assert.Error(t, err)
  591. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  592. assert.Error(t, err)
  593. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  594. assert.Error(t, err)
  595. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  596. dataprovider.ConditionOptions{}, &EventParams{})
  597. assert.Error(t, err)
  598. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  599. assert.Error(t, err)
  600. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  601. assert.Error(t, err)
  602. groupName := "agroup"
  603. err = executeQuotaResetForUser(&dataprovider.User{
  604. Groups: []sdk.GroupMapping{
  605. {
  606. Name: groupName,
  607. Type: sdk.GroupTypePrimary,
  608. },
  609. },
  610. })
  611. assert.Error(t, err)
  612. err = executeDataRetentionCheckForUser(dataprovider.User{
  613. Groups: []sdk.GroupMapping{
  614. {
  615. Name: groupName,
  616. Type: sdk.GroupTypePrimary,
  617. },
  618. },
  619. }, nil, &EventParams{}, "")
  620. assert.Error(t, err)
  621. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  622. Groups: []sdk.GroupMapping{
  623. {
  624. Name: groupName,
  625. Type: sdk.GroupTypePrimary,
  626. },
  627. },
  628. })
  629. assert.Error(t, err)
  630. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  631. Groups: []sdk.GroupMapping{
  632. {
  633. Name: groupName,
  634. Type: sdk.GroupTypePrimary,
  635. },
  636. },
  637. })
  638. assert.Error(t, err)
  639. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  640. Groups: []sdk.GroupMapping{
  641. {
  642. Name: groupName,
  643. Type: sdk.GroupTypePrimary,
  644. },
  645. },
  646. })
  647. assert.Error(t, err)
  648. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  649. Groups: []sdk.GroupMapping{
  650. {
  651. Name: groupName,
  652. Type: sdk.GroupTypePrimary,
  653. },
  654. },
  655. })
  656. assert.Error(t, err)
  657. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  658. Groups: []sdk.GroupMapping{
  659. {
  660. Name: groupName,
  661. Type: sdk.GroupTypePrimary,
  662. },
  663. },
  664. })
  665. assert.Error(t, err)
  666. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  667. Groups: []sdk.GroupMapping{
  668. {
  669. Name: groupName,
  670. Type: sdk.GroupTypePrimary,
  671. },
  672. },
  673. })
  674. assert.Error(t, err)
  675. err = executePwdExpirationCheckForUser(&dataprovider.User{
  676. Groups: []sdk.GroupMapping{
  677. {
  678. Name: groupName,
  679. Type: sdk.GroupTypePrimary,
  680. },
  681. }}, dataprovider.EventActionPasswordExpiration{})
  682. assert.Error(t, err)
  683. _, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  684. Method: http.MethodPost,
  685. Parts: []dataprovider.HTTPPart{
  686. {
  687. Name: "p1",
  688. },
  689. },
  690. }, nil, nil, dataprovider.User{
  691. BaseUser: sdk.BaseUser{
  692. Username: "u",
  693. },
  694. Groups: []sdk.GroupMapping{
  695. {
  696. Name: groupName,
  697. Type: sdk.GroupTypePrimary,
  698. },
  699. },
  700. }, &EventParams{}, false)
  701. assert.Error(t, err)
  702. dataRetentionAction := dataprovider.BaseEventAction{
  703. Type: dataprovider.ActionTypeDataRetentionCheck,
  704. Options: dataprovider.BaseEventActionOptions{
  705. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  706. Folders: []dataprovider.FolderRetention{
  707. {
  708. Path: "/",
  709. Retention: 24,
  710. },
  711. },
  712. },
  713. },
  714. }
  715. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  716. Names: []dataprovider.ConditionPattern{
  717. {
  718. Pattern: "username1",
  719. },
  720. },
  721. })
  722. if assert.Error(t, err) {
  723. assert.Contains(t, err.Error(), "unable to get users")
  724. }
  725. eventManager.loadRules()
  726. eventManager.RLock()
  727. assert.Len(t, eventManager.FsEvents, 0)
  728. assert.Len(t, eventManager.ProviderEvents, 0)
  729. assert.Len(t, eventManager.Schedules, 0)
  730. eventManager.RUnlock()
  731. // rule with invalid trigger
  732. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  733. Name: "test rule",
  734. Status: 1,
  735. Trigger: -1,
  736. })
  737. eventManager.RLock()
  738. assert.Len(t, eventManager.FsEvents, 0)
  739. assert.Len(t, eventManager.ProviderEvents, 0)
  740. assert.Len(t, eventManager.Schedules, 0)
  741. eventManager.RUnlock()
  742. // rule with invalid cronspec
  743. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  744. Name: "test rule",
  745. Status: 1,
  746. Trigger: dataprovider.EventTriggerSchedule,
  747. Conditions: dataprovider.EventConditions{
  748. Schedules: []dataprovider.Schedule{
  749. {
  750. Hours: "1000",
  751. },
  752. },
  753. },
  754. })
  755. eventManager.RLock()
  756. assert.Len(t, eventManager.FsEvents, 0)
  757. assert.Len(t, eventManager.ProviderEvents, 0)
  758. assert.Len(t, eventManager.Schedules, 0)
  759. eventManager.RUnlock()
  760. err = dataprovider.Initialize(providerConf, configDir, true)
  761. assert.NoError(t, err)
  762. stopEventScheduler()
  763. }
  764. func TestDateTimePlaceholder(t *testing.T) {
  765. oldTZ := Config.TZ
  766. Config.TZ = ""
  767. dateTime := time.Now()
  768. params := EventParams{
  769. Timestamp: dateTime,
  770. }
  771. replacements := params.getStringReplacements(false, false)
  772. r := strings.NewReplacer(replacements...)
  773. res := r.Replace("{{.DateTime}}")
  774. assert.Equal(t, dateTime.UTC().Format(dateTimeMillisFormat), res)
  775. res = r.Replace("{{.Year}}-{{.Month}}-{{.Day}}T{{.Hour}}:{{.Minute}}")
  776. assert.Equal(t, dateTime.UTC().Format(dateTimeMillisFormat)[:16], res)
  777. Config.TZ = "local"
  778. replacements = params.getStringReplacements(false, false)
  779. r = strings.NewReplacer(replacements...)
  780. res = r.Replace("{{.DateTime}}")
  781. assert.Equal(t, dateTime.Local().Format(dateTimeMillisFormat), res)
  782. res = r.Replace("{{.Year}}-{{.Month}}-{{.Day}}T{{.Hour}}:{{.Minute}}")
  783. assert.Equal(t, dateTime.Local().Format(dateTimeMillisFormat)[:16], res)
  784. Config.TZ = oldTZ
  785. }
  786. func TestEventRuleActions(t *testing.T) {
  787. actionName := "test rule action"
  788. action := dataprovider.BaseEventAction{
  789. Name: actionName,
  790. Type: dataprovider.ActionTypeBackup,
  791. }
  792. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  793. assert.NoError(t, err)
  794. action.Type = -1
  795. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  796. assert.Error(t, err)
  797. action = dataprovider.BaseEventAction{
  798. Name: actionName,
  799. Type: dataprovider.ActionTypeHTTP,
  800. Options: dataprovider.BaseEventActionOptions{
  801. HTTPConfig: dataprovider.EventActionHTTPConfig{
  802. Endpoint: "http://foo\x7f.com/", // invalid URL
  803. SkipTLSVerify: true,
  804. Body: `"data": "{{.ObjectDataString}}"`,
  805. Method: http.MethodPost,
  806. QueryParameters: []dataprovider.KeyValue{
  807. {
  808. Key: "param",
  809. Value: "value",
  810. },
  811. },
  812. Timeout: 5,
  813. Headers: []dataprovider.KeyValue{
  814. {
  815. Key: "Content-Type",
  816. Value: "application/json",
  817. },
  818. },
  819. Username: "httpuser",
  820. },
  821. },
  822. }
  823. action.Options.SetEmptySecretsIfNil()
  824. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  825. if assert.Error(t, err) {
  826. assert.Contains(t, err.Error(), "invalid endpoint")
  827. }
  828. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  829. params := &EventParams{
  830. Name: "a",
  831. Object: &dataprovider.User{
  832. BaseUser: sdk.BaseUser{
  833. Username: "test user",
  834. },
  835. },
  836. }
  837. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  838. assert.NoError(t, err)
  839. action.Options.HTTPConfig.Method = http.MethodGet
  840. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  841. assert.NoError(t, err)
  842. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  843. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  844. if assert.Error(t, err) {
  845. assert.Contains(t, err.Error(), "unexpected status code: 404")
  846. }
  847. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  848. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  849. assert.Error(t, err)
  850. action.Options.HTTPConfig.QueryParameters = nil
  851. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  852. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  853. assert.Error(t, err)
  854. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  855. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  856. if assert.Error(t, err) {
  857. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  858. }
  859. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  860. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  861. action.Options.HTTPConfig.Body = ""
  862. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  863. {
  864. Name: "p1",
  865. Filepath: "path",
  866. },
  867. }
  868. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  869. assert.Contains(t, getErrorString(err), "error getting user")
  870. action.Options.HTTPConfig.Parts = nil
  871. action.Options.HTTPConfig.Body = "{{.ObjectData}}"
  872. // test disk and transfer quota reset
  873. username1 := "user1"
  874. username2 := "user2"
  875. user1 := dataprovider.User{
  876. BaseUser: sdk.BaseUser{
  877. Username: username1,
  878. HomeDir: filepath.Join(os.TempDir(), username1),
  879. Status: 1,
  880. Permissions: map[string][]string{
  881. "/": {dataprovider.PermAny},
  882. },
  883. },
  884. }
  885. user2 := dataprovider.User{
  886. BaseUser: sdk.BaseUser{
  887. Username: username2,
  888. HomeDir: filepath.Join(os.TempDir(), username2),
  889. Status: 1,
  890. Permissions: map[string][]string{
  891. "/": {dataprovider.PermAny},
  892. },
  893. },
  894. }
  895. user2.Filters.PasswordExpiration = 10
  896. err = dataprovider.AddUser(&user1, "", "", "")
  897. assert.NoError(t, err)
  898. err = dataprovider.AddUser(&user2, "", "", "")
  899. assert.NoError(t, err)
  900. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  901. Threshold: 20,
  902. }, dataprovider.ConditionOptions{
  903. Names: []dataprovider.ConditionPattern{
  904. {
  905. Pattern: user2.Username,
  906. },
  907. },
  908. }, &EventParams{})
  909. // smtp not configured
  910. assert.Error(t, err)
  911. action = dataprovider.BaseEventAction{
  912. Type: dataprovider.ActionTypeUserQuotaReset,
  913. }
  914. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  915. Names: []dataprovider.ConditionPattern{
  916. {
  917. Pattern: username1,
  918. },
  919. },
  920. })
  921. assert.Error(t, err) // no home dir
  922. // create the home dir
  923. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  924. assert.NoError(t, err)
  925. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  926. assert.NoError(t, err)
  927. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  928. Names: []dataprovider.ConditionPattern{
  929. {
  930. Pattern: username1,
  931. },
  932. },
  933. })
  934. assert.NoError(t, err)
  935. userGet, err := dataprovider.UserExists(username1, "")
  936. assert.NoError(t, err)
  937. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  938. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  939. // simulate another quota scan in progress
  940. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  941. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  942. Names: []dataprovider.ConditionPattern{
  943. {
  944. Pattern: username1,
  945. },
  946. },
  947. })
  948. assert.Error(t, err)
  949. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  950. // non matching pattern
  951. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  952. Names: []dataprovider.ConditionPattern{
  953. {
  954. Pattern: "don't match",
  955. },
  956. },
  957. })
  958. assert.Error(t, err)
  959. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  960. action = dataprovider.BaseEventAction{
  961. Type: dataprovider.ActionTypeUserExpirationCheck,
  962. }
  963. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  964. Names: []dataprovider.ConditionPattern{
  965. {
  966. Pattern: "don't match",
  967. },
  968. },
  969. })
  970. assert.Error(t, err)
  971. assert.Contains(t, getErrorString(err), "no user expiration check executed")
  972. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  973. Names: []dataprovider.ConditionPattern{
  974. {
  975. Pattern: username1,
  976. },
  977. },
  978. })
  979. assert.NoError(t, err)
  980. dataRetentionAction := dataprovider.BaseEventAction{
  981. Type: dataprovider.ActionTypeDataRetentionCheck,
  982. Options: dataprovider.BaseEventActionOptions{
  983. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  984. Folders: []dataprovider.FolderRetention{
  985. {
  986. Path: "",
  987. Retention: 24,
  988. },
  989. },
  990. },
  991. },
  992. }
  993. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  994. Names: []dataprovider.ConditionPattern{
  995. {
  996. Pattern: username1,
  997. },
  998. },
  999. })
  1000. assert.Error(t, err) // invalid config, no folder path specified
  1001. retentionDir := "testretention"
  1002. dataRetentionAction = dataprovider.BaseEventAction{
  1003. Type: dataprovider.ActionTypeDataRetentionCheck,
  1004. Options: dataprovider.BaseEventActionOptions{
  1005. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  1006. Folders: []dataprovider.FolderRetention{
  1007. {
  1008. Path: path.Join("/", retentionDir),
  1009. Retention: 24,
  1010. DeleteEmptyDirs: true,
  1011. },
  1012. },
  1013. },
  1014. },
  1015. }
  1016. // create some test files
  1017. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  1018. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  1019. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  1020. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  1021. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  1022. assert.NoError(t, err)
  1023. for _, f := range []string{file1, file2, file3, file4} {
  1024. err = os.WriteFile(f, []byte(""), 0666)
  1025. assert.NoError(t, err)
  1026. }
  1027. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  1028. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  1029. assert.NoError(t, err)
  1030. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  1031. assert.NoError(t, err)
  1032. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  1033. assert.NoError(t, err)
  1034. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1035. Names: []dataprovider.ConditionPattern{
  1036. {
  1037. Pattern: username1,
  1038. },
  1039. },
  1040. })
  1041. assert.NoError(t, err)
  1042. assert.FileExists(t, file1)
  1043. assert.NoFileExists(t, file2)
  1044. assert.FileExists(t, file3)
  1045. assert.NoDirExists(t, filepath.Dir(file4))
  1046. // simulate another check in progress
  1047. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  1048. assert.NotNil(t, c)
  1049. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1050. Names: []dataprovider.ConditionPattern{
  1051. {
  1052. Pattern: username1,
  1053. },
  1054. },
  1055. })
  1056. assert.Error(t, err)
  1057. RetentionChecks.remove(user1.Username)
  1058. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1059. Names: []dataprovider.ConditionPattern{
  1060. {
  1061. Pattern: "no match",
  1062. },
  1063. },
  1064. })
  1065. assert.Error(t, err)
  1066. assert.Contains(t, getErrorString(err), "no retention check executed")
  1067. // test file exists action
  1068. action = dataprovider.BaseEventAction{
  1069. Type: dataprovider.ActionTypeFilesystem,
  1070. Options: dataprovider.BaseEventActionOptions{
  1071. FsConfig: dataprovider.EventActionFilesystemConfig{
  1072. Type: dataprovider.FilesystemActionExist,
  1073. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  1074. },
  1075. },
  1076. }
  1077. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1078. Names: []dataprovider.ConditionPattern{
  1079. {
  1080. Pattern: "no match",
  1081. },
  1082. },
  1083. })
  1084. assert.Error(t, err)
  1085. assert.Contains(t, getErrorString(err), "no existence check executed")
  1086. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1087. Names: []dataprovider.ConditionPattern{
  1088. {
  1089. Pattern: username1,
  1090. },
  1091. },
  1092. })
  1093. assert.NoError(t, err)
  1094. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  1095. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1096. Names: []dataprovider.ConditionPattern{
  1097. {
  1098. Pattern: username1,
  1099. },
  1100. },
  1101. })
  1102. assert.Error(t, err)
  1103. err = os.RemoveAll(user1.GetHomeDir())
  1104. assert.NoError(t, err)
  1105. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  1106. assert.NoError(t, err)
  1107. action.Type = dataprovider.ActionTypeTransferQuotaReset
  1108. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1109. Names: []dataprovider.ConditionPattern{
  1110. {
  1111. Pattern: username1,
  1112. },
  1113. },
  1114. })
  1115. assert.NoError(t, err)
  1116. userGet, err = dataprovider.UserExists(username1, "")
  1117. assert.NoError(t, err)
  1118. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  1119. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  1120. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1121. Names: []dataprovider.ConditionPattern{
  1122. {
  1123. Pattern: "no match",
  1124. },
  1125. },
  1126. })
  1127. assert.Error(t, err)
  1128. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  1129. action.Type = dataprovider.ActionTypeFilesystem
  1130. action.Options = dataprovider.BaseEventActionOptions{
  1131. FsConfig: dataprovider.EventActionFilesystemConfig{
  1132. Type: dataprovider.FilesystemActionRename,
  1133. Renames: []dataprovider.RenameConfig{
  1134. {
  1135. KeyValue: dataprovider.KeyValue{
  1136. Key: "/source",
  1137. Value: "/target",
  1138. },
  1139. },
  1140. },
  1141. },
  1142. }
  1143. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1144. Names: []dataprovider.ConditionPattern{
  1145. {
  1146. Pattern: "no match",
  1147. },
  1148. },
  1149. })
  1150. assert.Error(t, err)
  1151. assert.Contains(t, getErrorString(err), "no rename executed")
  1152. action.Options = dataprovider.BaseEventActionOptions{
  1153. FsConfig: dataprovider.EventActionFilesystemConfig{
  1154. Type: dataprovider.FilesystemActionDelete,
  1155. Deletes: []string{"/dir1"},
  1156. },
  1157. }
  1158. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1159. Names: []dataprovider.ConditionPattern{
  1160. {
  1161. Pattern: "no match",
  1162. },
  1163. },
  1164. })
  1165. assert.Error(t, err)
  1166. assert.Contains(t, getErrorString(err), "no delete executed")
  1167. action.Options = dataprovider.BaseEventActionOptions{
  1168. FsConfig: dataprovider.EventActionFilesystemConfig{
  1169. Type: dataprovider.FilesystemActionMkdirs,
  1170. Deletes: []string{"/dir1"},
  1171. },
  1172. }
  1173. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1174. Names: []dataprovider.ConditionPattern{
  1175. {
  1176. Pattern: "no match",
  1177. },
  1178. },
  1179. })
  1180. assert.Error(t, err)
  1181. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1182. action.Options = dataprovider.BaseEventActionOptions{
  1183. FsConfig: dataprovider.EventActionFilesystemConfig{
  1184. Type: dataprovider.FilesystemActionCompress,
  1185. Compress: dataprovider.EventActionFsCompress{
  1186. Name: "test.zip",
  1187. Paths: []string{"/{{.VirtualPath}}"},
  1188. },
  1189. },
  1190. }
  1191. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1192. Names: []dataprovider.ConditionPattern{
  1193. {
  1194. Pattern: "no match",
  1195. },
  1196. },
  1197. })
  1198. assert.Error(t, err)
  1199. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1200. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1201. GroupNames: []dataprovider.ConditionPattern{
  1202. {
  1203. Pattern: "no match",
  1204. },
  1205. },
  1206. })
  1207. assert.Error(t, err)
  1208. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1209. err = dataprovider.DeleteUser(username1, "", "", "")
  1210. assert.NoError(t, err)
  1211. err = dataprovider.DeleteUser(username2, "", "", "")
  1212. assert.NoError(t, err)
  1213. // test folder quota reset
  1214. foldername1 := "f1"
  1215. foldername2 := "f2"
  1216. folder1 := vfs.BaseVirtualFolder{
  1217. Name: foldername1,
  1218. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1219. }
  1220. folder2 := vfs.BaseVirtualFolder{
  1221. Name: foldername2,
  1222. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1223. }
  1224. err = dataprovider.AddFolder(&folder1, "", "", "")
  1225. assert.NoError(t, err)
  1226. err = dataprovider.AddFolder(&folder2, "", "", "")
  1227. assert.NoError(t, err)
  1228. action = dataprovider.BaseEventAction{
  1229. Type: dataprovider.ActionTypeFolderQuotaReset,
  1230. }
  1231. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1232. Names: []dataprovider.ConditionPattern{
  1233. {
  1234. Pattern: foldername1,
  1235. },
  1236. },
  1237. })
  1238. assert.Error(t, err) // no home dir
  1239. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1240. assert.NoError(t, err)
  1241. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1242. assert.NoError(t, err)
  1243. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1244. Names: []dataprovider.ConditionPattern{
  1245. {
  1246. Pattern: foldername1,
  1247. },
  1248. },
  1249. })
  1250. assert.NoError(t, err)
  1251. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1252. assert.NoError(t, err)
  1253. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1254. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1255. // simulate another quota scan in progress
  1256. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1257. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1258. Names: []dataprovider.ConditionPattern{
  1259. {
  1260. Pattern: foldername1,
  1261. },
  1262. },
  1263. })
  1264. assert.Error(t, err)
  1265. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1266. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1267. Names: []dataprovider.ConditionPattern{
  1268. {
  1269. Pattern: "no folder match",
  1270. },
  1271. },
  1272. })
  1273. if assert.Error(t, err) {
  1274. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1275. }
  1276. body, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1277. Method: http.MethodPost,
  1278. }, nil, nil, dataprovider.User{}, &EventParams{}, true)
  1279. assert.NoError(t, err)
  1280. assert.Nil(t, body)
  1281. body, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1282. Method: http.MethodPost,
  1283. Body: "test body",
  1284. }, nil, nil, dataprovider.User{}, &EventParams{}, false)
  1285. assert.NoError(t, err)
  1286. assert.NotNil(t, body)
  1287. err = os.RemoveAll(folder1.MappedPath)
  1288. assert.NoError(t, err)
  1289. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1290. assert.NoError(t, err)
  1291. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1292. assert.NoError(t, err)
  1293. }
  1294. func TestIDPAccountCheckRule(t *testing.T) {
  1295. _, _, err := executeIDPAccountCheckRule(dataprovider.EventRule{}, EventParams{})
  1296. if assert.Error(t, err) {
  1297. assert.Contains(t, err.Error(), "no action executed")
  1298. }
  1299. _, _, err = executeIDPAccountCheckRule(dataprovider.EventRule{
  1300. Actions: []dataprovider.EventAction{
  1301. {
  1302. BaseEventAction: dataprovider.BaseEventAction{
  1303. Name: "n",
  1304. Type: dataprovider.ActionTypeIDPAccountCheck,
  1305. },
  1306. },
  1307. },
  1308. }, EventParams{Event: "invalid"})
  1309. if assert.Error(t, err) {
  1310. assert.Contains(t, err.Error(), "unsupported IDP login event")
  1311. }
  1312. // invalid json
  1313. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateAdmin: "{"}, &EventParams{Name: "missing admin"})
  1314. assert.Error(t, err)
  1315. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "["}, &EventParams{Name: "missing user"})
  1316. assert.Error(t, err)
  1317. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "{}"}, &EventParams{Name: "invalid user template"})
  1318. assert.ErrorIs(t, err, util.ErrValidation)
  1319. username := "u"
  1320. c := &dataprovider.EventActionIDPAccountCheck{
  1321. Mode: 1,
  1322. TemplateUser: `{"username":"` + username + `","status":1,"home_dir":"` + util.JSONEscape(filepath.Join(os.TempDir())) + `","permissions":{"/":["*"]}}`,
  1323. }
  1324. params := &EventParams{
  1325. Name: username,
  1326. Event: IDPLoginUser,
  1327. }
  1328. user, err := executeUserCheckAction(c, params)
  1329. assert.NoError(t, err)
  1330. assert.Equal(t, username, user.Username)
  1331. assert.Equal(t, 1, user.Status)
  1332. user.Status = 0
  1333. err = dataprovider.UpdateUser(user, "", "", "")
  1334. assert.NoError(t, err)
  1335. // the user is not changed
  1336. user, err = executeUserCheckAction(c, params)
  1337. assert.NoError(t, err)
  1338. assert.Equal(t, username, user.Username)
  1339. assert.Equal(t, 0, user.Status)
  1340. // change the mode, the user is now updated
  1341. c.Mode = 0
  1342. user, err = executeUserCheckAction(c, params)
  1343. assert.NoError(t, err)
  1344. assert.Equal(t, username, user.Username)
  1345. assert.Equal(t, 1, user.Status)
  1346. assert.Empty(t, user.Password)
  1347. assert.Len(t, user.PublicKeys, 0)
  1348. assert.Len(t, user.Filters.TLSCerts, 0)
  1349. assert.Empty(t, user.Email)
  1350. assert.Empty(t, user.Description)
  1351. // Update the profile attribute and make sure they are preserved
  1352. user.Password = "secret"
  1353. user.Email = "[email protected]"
  1354. user.Filters.AdditionalEmails = []string{"[email protected]"}
  1355. user.Description = "some desc"
  1356. user.Filters.TLSCerts = []string{serverCert}
  1357. user.PublicKeys = []string{"ssh-rsa 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 nicola@p1"}
  1358. err = dataprovider.UpdateUser(user, "", "", "")
  1359. assert.NoError(t, err)
  1360. user, err = executeUserCheckAction(c, params)
  1361. assert.NoError(t, err)
  1362. assert.Equal(t, username, user.Username)
  1363. assert.Equal(t, 1, user.Status)
  1364. assert.NotEmpty(t, user.Password)
  1365. assert.Len(t, user.PublicKeys, 1)
  1366. assert.Len(t, user.Filters.TLSCerts, 1)
  1367. assert.NotEmpty(t, user.Email)
  1368. assert.Len(t, user.Filters.AdditionalEmails, 1)
  1369. assert.NotEmpty(t, user.Description)
  1370. err = dataprovider.DeleteUser(username, "", "", "")
  1371. assert.NoError(t, err)
  1372. // check rule consistency
  1373. r := dataprovider.EventRule{
  1374. Actions: []dataprovider.EventAction{
  1375. {
  1376. BaseEventAction: dataprovider.BaseEventAction{
  1377. Type: dataprovider.ActionTypeIDPAccountCheck,
  1378. },
  1379. Order: 1,
  1380. },
  1381. },
  1382. }
  1383. err = r.CheckActionsConsistency("")
  1384. if assert.Error(t, err) {
  1385. assert.Contains(t, err.Error(), "IDP account check action is only supported for IDP login trigger")
  1386. }
  1387. r.Trigger = dataprovider.EventTriggerIDPLogin
  1388. err = r.CheckActionsConsistency("")
  1389. if assert.Error(t, err) {
  1390. assert.Contains(t, err.Error(), "IDP account check must be a sync action")
  1391. }
  1392. r.Actions[0].Options.ExecuteSync = true
  1393. err = r.CheckActionsConsistency("")
  1394. assert.NoError(t, err)
  1395. r.Actions = append(r.Actions, dataprovider.EventAction{
  1396. BaseEventAction: dataprovider.BaseEventAction{
  1397. Type: dataprovider.ActionTypeCommand,
  1398. },
  1399. Options: dataprovider.EventActionOptions{
  1400. ExecuteSync: true,
  1401. },
  1402. Order: 2,
  1403. })
  1404. err = r.CheckActionsConsistency("")
  1405. if assert.Error(t, err) {
  1406. assert.Contains(t, err.Error(), "IDP account check must be the only sync action")
  1407. }
  1408. }
  1409. func TestUserExpirationCheck(t *testing.T) {
  1410. username := "test_user_expiration_check"
  1411. user := dataprovider.User{
  1412. BaseUser: sdk.BaseUser{
  1413. Username: username,
  1414. Permissions: map[string][]string{
  1415. "/": {dataprovider.PermAny},
  1416. },
  1417. HomeDir: filepath.Join(os.TempDir(), username),
  1418. ExpirationDate: util.GetTimeAsMsSinceEpoch(time.Now().Add(-24 * time.Hour)),
  1419. },
  1420. }
  1421. user.Filters.PasswordExpiration = 5
  1422. err := dataprovider.AddUser(&user, "", "", "")
  1423. assert.NoError(t, err)
  1424. conditions := dataprovider.ConditionOptions{
  1425. Names: []dataprovider.ConditionPattern{
  1426. {
  1427. Pattern: username,
  1428. },
  1429. },
  1430. }
  1431. err = executeUserExpirationCheckRuleAction(conditions, &EventParams{})
  1432. if assert.Error(t, err) {
  1433. assert.Contains(t, err.Error(), "expired users")
  1434. }
  1435. // the check will be skipped, the user is expired
  1436. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{Threshold: 10}, conditions, &EventParams{})
  1437. assert.NoError(t, err)
  1438. err = dataprovider.DeleteUser(username, "", "", "")
  1439. assert.NoError(t, err)
  1440. err = os.RemoveAll(user.GetHomeDir())
  1441. assert.NoError(t, err)
  1442. }
  1443. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1444. username := "test_user_action_group_matching"
  1445. user := dataprovider.User{
  1446. BaseUser: sdk.BaseUser{
  1447. Username: username,
  1448. Permissions: map[string][]string{
  1449. "/": {dataprovider.PermAny},
  1450. },
  1451. HomeDir: filepath.Join(os.TempDir(), username),
  1452. },
  1453. }
  1454. err := dataprovider.AddUser(&user, "", "", "")
  1455. assert.NoError(t, err)
  1456. conditions := dataprovider.ConditionOptions{
  1457. GroupNames: []dataprovider.ConditionPattern{
  1458. {
  1459. Pattern: "agroup",
  1460. },
  1461. },
  1462. }
  1463. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1464. if assert.Error(t, err) {
  1465. assert.Contains(t, err.Error(), "no delete executed")
  1466. }
  1467. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1468. if assert.Error(t, err) {
  1469. assert.Contains(t, err.Error(), "no mkdir executed")
  1470. }
  1471. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1472. if assert.Error(t, err) {
  1473. assert.Contains(t, err.Error(), "no rename executed")
  1474. }
  1475. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1476. if assert.Error(t, err) {
  1477. assert.Contains(t, err.Error(), "no existence check executed")
  1478. }
  1479. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1480. if assert.Error(t, err) {
  1481. assert.Contains(t, err.Error(), "no copy executed")
  1482. }
  1483. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1484. if assert.Error(t, err) {
  1485. assert.Contains(t, err.Error(), "no user quota reset executed")
  1486. }
  1487. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1488. if assert.Error(t, err) {
  1489. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1490. }
  1491. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1492. if assert.Error(t, err) {
  1493. assert.Contains(t, err.Error(), "no retention check executed")
  1494. }
  1495. err = dataprovider.DeleteUser(username, "", "", "")
  1496. assert.NoError(t, err)
  1497. err = os.RemoveAll(user.GetHomeDir())
  1498. assert.NoError(t, err)
  1499. }
  1500. func TestGetFileContent(t *testing.T) {
  1501. username := "test_user_get_file_content"
  1502. user := dataprovider.User{
  1503. BaseUser: sdk.BaseUser{
  1504. Username: username,
  1505. Permissions: map[string][]string{
  1506. "/": {dataprovider.PermAny},
  1507. },
  1508. HomeDir: filepath.Join(os.TempDir(), username),
  1509. },
  1510. }
  1511. err := dataprovider.AddUser(&user, "", "", "")
  1512. assert.NoError(t, err)
  1513. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1514. assert.NoError(t, err)
  1515. fileContent := []byte("test file content")
  1516. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1517. assert.NoError(t, err)
  1518. conn := NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1519. replacer := strings.NewReplacer("old", "new")
  1520. files, err := getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1521. assert.NoError(t, err)
  1522. if assert.Len(t, files, 1) {
  1523. var b bytes.Buffer
  1524. _, err = files[0].Writer(&b)
  1525. assert.NoError(t, err)
  1526. assert.Equal(t, fileContent, b.Bytes())
  1527. }
  1528. // missing file
  1529. _, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1530. assert.Error(t, err)
  1531. // directory
  1532. _, err = getMailAttachments(conn, []string{"/"}, replacer)
  1533. assert.Error(t, err)
  1534. // files too large
  1535. content := make([]byte, maxAttachmentsSize/2+1)
  1536. _, err = rand.Read(content)
  1537. assert.NoError(t, err)
  1538. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1539. assert.NoError(t, err)
  1540. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1541. assert.NoError(t, err)
  1542. files, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1543. assert.NoError(t, err)
  1544. if assert.Len(t, files, 1) {
  1545. var b bytes.Buffer
  1546. _, err = files[0].Writer(&b)
  1547. assert.NoError(t, err)
  1548. assert.Equal(t, content, b.Bytes())
  1549. }
  1550. _, err = getMailAttachments(conn, []string{"/file1.txt", "/file2.txt"}, replacer)
  1551. if assert.Error(t, err) {
  1552. assert.Contains(t, err.Error(), "size too large")
  1553. }
  1554. // change the filesystem provider
  1555. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1556. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1557. err = dataprovider.UpdateUser(&user, "", "", "")
  1558. assert.NoError(t, err)
  1559. conn = NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1560. // the file is not encrypted so reading the encryption header will fail
  1561. files, err = getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1562. assert.NoError(t, err)
  1563. if assert.Len(t, files, 1) {
  1564. var b bytes.Buffer
  1565. _, err = files[0].Writer(&b)
  1566. assert.Error(t, err)
  1567. }
  1568. err = dataprovider.DeleteUser(username, "", "", "")
  1569. assert.NoError(t, err)
  1570. err = os.RemoveAll(user.GetHomeDir())
  1571. assert.NoError(t, err)
  1572. }
  1573. func TestFilesystemActionErrors(t *testing.T) {
  1574. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1575. if assert.Error(t, err) {
  1576. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1577. }
  1578. username := "test_user_for_actions"
  1579. testReplacer := strings.NewReplacer("old", "new")
  1580. user := dataprovider.User{
  1581. BaseUser: sdk.BaseUser{
  1582. Username: username,
  1583. Permissions: map[string][]string{
  1584. "/": {dataprovider.PermAny},
  1585. },
  1586. HomeDir: filepath.Join(os.TempDir(), username),
  1587. },
  1588. FsConfig: vfs.Filesystem{
  1589. Provider: sdk.SFTPFilesystemProvider,
  1590. SFTPConfig: vfs.SFTPFsConfig{
  1591. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1592. Endpoint: "127.0.0.1:4022",
  1593. Username: username,
  1594. },
  1595. Password: kms.NewPlainSecret("pwd"),
  1596. },
  1597. },
  1598. }
  1599. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1600. Recipients: []string{"[email protected]"},
  1601. Subject: "subject",
  1602. Body: "body",
  1603. Attachments: []string{"/file.txt"},
  1604. }, &EventParams{
  1605. sender: username,
  1606. })
  1607. assert.Error(t, err)
  1608. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1609. err = executeDeleteFileFsAction(conn, "", nil)
  1610. assert.Error(t, err)
  1611. err = dataprovider.AddUser(&user, "", "", "")
  1612. assert.NoError(t, err)
  1613. // check root fs fails
  1614. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1615. assert.Error(t, err)
  1616. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1617. assert.Error(t, err)
  1618. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1619. assert.Error(t, err)
  1620. err = executeExistFsActionForUser(nil, testReplacer, user)
  1621. assert.Error(t, err)
  1622. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1623. assert.Error(t, err)
  1624. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1625. assert.Error(t, err)
  1626. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1627. assert.Error(t, err)
  1628. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1629. Recipients: []string{"[email protected]"},
  1630. Subject: "subject",
  1631. Body: "body",
  1632. Attachments: []string{"/file1.txt"},
  1633. }, &EventParams{
  1634. sender: username,
  1635. })
  1636. assert.Error(t, err)
  1637. fn := getFileContentFn(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1638. var b bytes.Buffer
  1639. _, err = fn(&b)
  1640. assert.Error(t, err)
  1641. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1642. Endpoint: "http://127.0.0.1:9999/",
  1643. Method: http.MethodPost,
  1644. Parts: []dataprovider.HTTPPart{
  1645. {
  1646. Name: "p1",
  1647. Filepath: "/filepath",
  1648. },
  1649. },
  1650. }, &EventParams{
  1651. sender: username,
  1652. })
  1653. assert.Error(t, err)
  1654. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1655. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1656. err = dataprovider.DeleteUser(username, "", "", "")
  1657. assert.NoError(t, err)
  1658. err = dataprovider.AddUser(&user, "", "", "")
  1659. assert.NoError(t, err)
  1660. err = executeRenameFsActionForUser([]dataprovider.RenameConfig{
  1661. {
  1662. KeyValue: dataprovider.KeyValue{
  1663. Key: "/p1",
  1664. Value: "/p1",
  1665. },
  1666. },
  1667. }, testReplacer, user)
  1668. if assert.Error(t, err) {
  1669. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1670. }
  1671. err = executeRuleAction(dataprovider.BaseEventAction{
  1672. Type: dataprovider.ActionTypeFilesystem,
  1673. Options: dataprovider.BaseEventActionOptions{
  1674. FsConfig: dataprovider.EventActionFilesystemConfig{
  1675. Type: dataprovider.FilesystemActionRename,
  1676. Renames: []dataprovider.RenameConfig{
  1677. {
  1678. KeyValue: dataprovider.KeyValue{
  1679. Key: "/p2",
  1680. Value: "/p2",
  1681. },
  1682. },
  1683. },
  1684. },
  1685. },
  1686. }, &EventParams{}, dataprovider.ConditionOptions{
  1687. Names: []dataprovider.ConditionPattern{
  1688. {
  1689. Pattern: username,
  1690. },
  1691. },
  1692. })
  1693. assert.Error(t, err)
  1694. if runtime.GOOS != osWindows {
  1695. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1696. err := os.MkdirAll(dirPath, os.ModePerm)
  1697. assert.NoError(t, err)
  1698. filePath := filepath.Join(dirPath, "f.dat")
  1699. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1700. assert.NoError(t, err)
  1701. err = os.Chmod(dirPath, 0001)
  1702. assert.NoError(t, err)
  1703. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1704. assert.Error(t, err)
  1705. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1706. assert.Error(t, err)
  1707. err = os.Chmod(dirPath, 0555)
  1708. assert.NoError(t, err)
  1709. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1710. if assert.Error(t, err) {
  1711. assert.Contains(t, err.Error(), "unable to remove file")
  1712. }
  1713. err = executeRuleAction(dataprovider.BaseEventAction{
  1714. Type: dataprovider.ActionTypeFilesystem,
  1715. Options: dataprovider.BaseEventActionOptions{
  1716. FsConfig: dataprovider.EventActionFilesystemConfig{
  1717. Type: dataprovider.FilesystemActionDelete,
  1718. Deletes: []string{"/adir/sub/f.dat"},
  1719. },
  1720. },
  1721. }, &EventParams{}, dataprovider.ConditionOptions{
  1722. Names: []dataprovider.ConditionPattern{
  1723. {
  1724. Pattern: username,
  1725. },
  1726. },
  1727. })
  1728. assert.Error(t, err)
  1729. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1730. if assert.Error(t, err) {
  1731. assert.Contains(t, err.Error(), "unable to create dir")
  1732. }
  1733. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1734. if assert.Error(t, err) {
  1735. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1736. }
  1737. err = executeRuleAction(dataprovider.BaseEventAction{
  1738. Type: dataprovider.ActionTypeFilesystem,
  1739. Options: dataprovider.BaseEventActionOptions{
  1740. FsConfig: dataprovider.EventActionFilesystemConfig{
  1741. Type: dataprovider.FilesystemActionMkdirs,
  1742. MkDirs: []string{"/adir/sub/sub1"},
  1743. },
  1744. },
  1745. }, &EventParams{}, dataprovider.ConditionOptions{
  1746. Names: []dataprovider.ConditionPattern{
  1747. {
  1748. Pattern: username,
  1749. },
  1750. },
  1751. })
  1752. assert.Error(t, err)
  1753. err = os.Chmod(dirPath, os.ModePerm)
  1754. assert.NoError(t, err)
  1755. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1756. wr := &zipWriterWrapper{
  1757. Name: "test.zip",
  1758. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1759. Entries: map[string]bool{},
  1760. }
  1761. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub", nil, 0)
  1762. assert.Error(t, err)
  1763. assert.Contains(t, getErrorString(err), "is outside base dir")
  1764. }
  1765. wr := &zipWriterWrapper{
  1766. Name: xid.New().String() + ".zip",
  1767. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1768. Entries: map[string]bool{},
  1769. }
  1770. err = addZipEntry(wr, conn, "/p1", "/", nil, 2000)
  1771. assert.ErrorIs(t, err, util.ErrRecursionTooDeep)
  1772. err = dataprovider.DeleteUser(username, "", "", "")
  1773. assert.NoError(t, err)
  1774. err = os.RemoveAll(user.GetHomeDir())
  1775. assert.NoError(t, err)
  1776. }
  1777. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1778. oldProviderConf := dataprovider.GetProviderConfig()
  1779. providerConf := dataprovider.GetProviderConfig()
  1780. providerConf.TrackQuota = 0
  1781. err := dataprovider.Close()
  1782. assert.NoError(t, err)
  1783. err = dataprovider.Initialize(providerConf, configDir, true)
  1784. assert.NoError(t, err)
  1785. username := "u1"
  1786. user := dataprovider.User{
  1787. BaseUser: sdk.BaseUser{
  1788. Username: username,
  1789. HomeDir: filepath.Join(os.TempDir(), username),
  1790. Status: 1,
  1791. Permissions: map[string][]string{
  1792. "/": {dataprovider.PermAny},
  1793. },
  1794. },
  1795. FsConfig: vfs.Filesystem{
  1796. Provider: sdk.LocalFilesystemProvider,
  1797. },
  1798. }
  1799. err = dataprovider.AddUser(&user, "", "", "")
  1800. assert.NoError(t, err)
  1801. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1802. assert.NoError(t, err)
  1803. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1804. &EventParams{}, dataprovider.ConditionOptions{
  1805. Names: []dataprovider.ConditionPattern{
  1806. {
  1807. Pattern: username,
  1808. },
  1809. },
  1810. })
  1811. assert.Error(t, err)
  1812. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1813. &EventParams{}, dataprovider.ConditionOptions{
  1814. Names: []dataprovider.ConditionPattern{
  1815. {
  1816. Pattern: username,
  1817. },
  1818. },
  1819. })
  1820. assert.Error(t, err)
  1821. err = os.RemoveAll(user.GetHomeDir())
  1822. assert.NoError(t, err)
  1823. err = dataprovider.DeleteUser(username, "", "", "")
  1824. assert.NoError(t, err)
  1825. foldername := "f1"
  1826. folder := vfs.BaseVirtualFolder{
  1827. Name: foldername,
  1828. MappedPath: filepath.Join(os.TempDir(), foldername),
  1829. }
  1830. err = dataprovider.AddFolder(&folder, "", "", "")
  1831. assert.NoError(t, err)
  1832. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1833. assert.NoError(t, err)
  1834. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1835. &EventParams{}, dataprovider.ConditionOptions{
  1836. Names: []dataprovider.ConditionPattern{
  1837. {
  1838. Pattern: foldername,
  1839. },
  1840. },
  1841. })
  1842. assert.Error(t, err)
  1843. err = os.RemoveAll(folder.MappedPath)
  1844. assert.NoError(t, err)
  1845. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1846. assert.NoError(t, err)
  1847. err = dataprovider.Close()
  1848. assert.NoError(t, err)
  1849. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1850. assert.NoError(t, err)
  1851. }
  1852. func TestScheduledActions(t *testing.T) {
  1853. startEventScheduler()
  1854. backupsPath := filepath.Join(os.TempDir(), "backups")
  1855. err := os.RemoveAll(backupsPath)
  1856. assert.NoError(t, err)
  1857. now := time.Now().UTC().Format(dateTimeMillisFormat)
  1858. // The backup action sets the home directory to the backup path.
  1859. expectedDirPath := filepath.Join(backupsPath, fmt.Sprintf("%s_%s_%s", now[0:4], now[5:7], now[8:10]))
  1860. action1 := &dataprovider.BaseEventAction{
  1861. Name: "action1",
  1862. Type: dataprovider.ActionTypeBackup,
  1863. }
  1864. err = dataprovider.AddEventAction(action1, "", "", "")
  1865. assert.NoError(t, err)
  1866. action2 := &dataprovider.BaseEventAction{
  1867. Name: "action2",
  1868. Type: dataprovider.ActionTypeFilesystem,
  1869. Options: dataprovider.BaseEventActionOptions{
  1870. FsConfig: dataprovider.EventActionFilesystemConfig{
  1871. Type: dataprovider.FilesystemActionMkdirs,
  1872. MkDirs: []string{"{{.Year}}_{{.Month}}_{{.Day}}"},
  1873. },
  1874. },
  1875. }
  1876. err = dataprovider.AddEventAction(action2, "", "", "")
  1877. assert.NoError(t, err)
  1878. rule := &dataprovider.EventRule{
  1879. Name: "rule",
  1880. Status: 1,
  1881. Trigger: dataprovider.EventTriggerSchedule,
  1882. Conditions: dataprovider.EventConditions{
  1883. Schedules: []dataprovider.Schedule{
  1884. {
  1885. Hours: "11",
  1886. DayOfWeek: "*",
  1887. DayOfMonth: "*",
  1888. Month: "*",
  1889. },
  1890. },
  1891. },
  1892. Actions: []dataprovider.EventAction{
  1893. {
  1894. BaseEventAction: dataprovider.BaseEventAction{
  1895. Name: action1.Name,
  1896. },
  1897. Order: 1,
  1898. },
  1899. {
  1900. BaseEventAction: dataprovider.BaseEventAction{
  1901. Name: action2.Name,
  1902. },
  1903. Order: 2,
  1904. },
  1905. },
  1906. }
  1907. job := eventCronJob{
  1908. ruleName: rule.Name,
  1909. }
  1910. job.Run() // rule not found
  1911. assert.NoDirExists(t, backupsPath)
  1912. err = dataprovider.AddEventRule(rule, "", "", "")
  1913. assert.NoError(t, err)
  1914. job.Run()
  1915. assert.DirExists(t, backupsPath)
  1916. assert.DirExists(t, expectedDirPath)
  1917. action1.Type = dataprovider.ActionTypeEmail
  1918. action1.Options = dataprovider.BaseEventActionOptions{
  1919. EmailConfig: dataprovider.EventActionEmailConfig{
  1920. Recipients: []string{"[email protected]"},
  1921. Subject: "test with attachments",
  1922. Body: "body",
  1923. Attachments: []string{"/file1.txt"},
  1924. },
  1925. }
  1926. err = dataprovider.UpdateEventAction(action1, "", "", "")
  1927. assert.NoError(t, err)
  1928. job.Run() // action is not compatible with a scheduled rule
  1929. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1930. assert.NoError(t, err)
  1931. err = dataprovider.DeleteEventAction(action1.Name, "", "", "")
  1932. assert.NoError(t, err)
  1933. err = dataprovider.DeleteEventAction(action2.Name, "", "", "")
  1934. assert.NoError(t, err)
  1935. err = os.RemoveAll(backupsPath)
  1936. assert.NoError(t, err)
  1937. stopEventScheduler()
  1938. }
  1939. func TestEventParamsCopy(t *testing.T) {
  1940. params := EventParams{
  1941. Name: "name",
  1942. Event: "event",
  1943. Extension: "ext",
  1944. Status: 1,
  1945. errors: []string{"error1"},
  1946. retentionChecks: []executedRetentionCheck{},
  1947. }
  1948. paramsCopy := params.getACopy()
  1949. assert.Equal(t, params, *paramsCopy)
  1950. params.Name = "name mod"
  1951. paramsCopy.Event = "event mod"
  1952. paramsCopy.Status = 2
  1953. params.errors = append(params.errors, "error2")
  1954. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1955. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1956. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1957. assert.Equal(t, "name mod", params.Name)
  1958. assert.Equal(t, "name", paramsCopy.Name)
  1959. assert.Equal(t, "event", params.Event)
  1960. assert.Equal(t, "event mod", paramsCopy.Event)
  1961. assert.Equal(t, 1, params.Status)
  1962. assert.Equal(t, 2, paramsCopy.Status)
  1963. params = EventParams{
  1964. retentionChecks: []executedRetentionCheck{
  1965. {
  1966. Username: "u",
  1967. ActionName: "a",
  1968. Results: []folderRetentionCheckResult{
  1969. {
  1970. Path: "p",
  1971. Retention: 1,
  1972. },
  1973. },
  1974. },
  1975. },
  1976. }
  1977. paramsCopy = params.getACopy()
  1978. require.Len(t, paramsCopy.retentionChecks, 1)
  1979. paramsCopy.retentionChecks[0].Username = "u_copy"
  1980. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1981. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1982. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1983. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1984. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1985. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1986. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  1987. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  1988. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  1989. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  1990. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  1991. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  1992. assert.Nil(t, params.IDPCustomFields)
  1993. params.addIDPCustomFields(nil)
  1994. assert.Nil(t, params.IDPCustomFields)
  1995. params.IDPCustomFields = &map[string]string{
  1996. "field1": "val1",
  1997. }
  1998. paramsCopy = params.getACopy()
  1999. for k, v := range *paramsCopy.IDPCustomFields {
  2000. assert.Equal(t, "field1", k)
  2001. assert.Equal(t, "val1", v)
  2002. }
  2003. assert.Equal(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  2004. (*paramsCopy.IDPCustomFields)["field1"] = "val2"
  2005. assert.NotEqual(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  2006. params.Metadata = map[string]string{"key": "value"}
  2007. paramsCopy = params.getACopy()
  2008. params.Metadata["key1"] = "value1"
  2009. require.Equal(t, map[string]string{"key": "value"}, paramsCopy.Metadata)
  2010. }
  2011. func TestEventParamsStatusFromError(t *testing.T) {
  2012. params := EventParams{Status: 1}
  2013. params.AddError(os.ErrNotExist)
  2014. assert.Equal(t, 1, params.Status)
  2015. params = EventParams{Status: 1, updateStatusFromError: true}
  2016. params.AddError(os.ErrNotExist)
  2017. assert.Equal(t, 2, params.Status)
  2018. }
  2019. type testWriter struct {
  2020. errTest error
  2021. sentinel string
  2022. }
  2023. func (w *testWriter) Write(p []byte) (int, error) {
  2024. if w.errTest != nil {
  2025. return 0, w.errTest
  2026. }
  2027. if w.sentinel == string(p) {
  2028. return 0, io.ErrUnexpectedEOF
  2029. }
  2030. return len(p), nil
  2031. }
  2032. func TestWriteHTTPPartsError(t *testing.T) {
  2033. m := multipart.NewWriter(&testWriter{
  2034. errTest: io.ErrShortWrite,
  2035. })
  2036. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{}, false)
  2037. assert.ErrorIs(t, err, io.ErrShortWrite)
  2038. body := "test body"
  2039. m = multipart.NewWriter(&testWriter{sentinel: body})
  2040. err = writeHTTPPart(m, dataprovider.HTTPPart{
  2041. Body: body,
  2042. }, nil, nil, nil, &EventParams{}, false)
  2043. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  2044. }
  2045. func TestReplacePathsPlaceholders(t *testing.T) {
  2046. replacer := strings.NewReplacer("{{.VirtualPath}}", "/path1")
  2047. paths := []string{"{{.VirtualPath}}", "/path1"}
  2048. paths = replacePathsPlaceholders(paths, replacer)
  2049. assert.Equal(t, []string{"/path1"}, paths)
  2050. paths = []string{"{{.VirtualPath}}", "/path2"}
  2051. paths = replacePathsPlaceholders(paths, replacer)
  2052. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  2053. }
  2054. func TestEstimateZipSizeErrors(t *testing.T) {
  2055. u := dataprovider.User{
  2056. BaseUser: sdk.BaseUser{
  2057. Username: "u",
  2058. HomeDir: filepath.Join(os.TempDir(), "u"),
  2059. Status: 1,
  2060. Permissions: map[string][]string{
  2061. "/": {dataprovider.PermAny},
  2062. },
  2063. QuotaSize: 1000,
  2064. },
  2065. }
  2066. err := dataprovider.AddUser(&u, "", "", "")
  2067. assert.NoError(t, err)
  2068. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  2069. assert.NoError(t, err)
  2070. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  2071. _, _, _, _, err = getFileWriter(conn, "/missing/path/file.txt", -1) //nolint:dogsled
  2072. assert.Error(t, err)
  2073. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  2074. assert.True(t, conn.IsNotExistError(err))
  2075. if runtime.GOOS != osWindows {
  2076. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  2077. assert.NoError(t, err)
  2078. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  2079. assert.NoError(t, err)
  2080. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  2081. assert.NoError(t, err)
  2082. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  2083. assert.Error(t, err, "size %d", size)
  2084. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  2085. assert.NoError(t, err)
  2086. }
  2087. err = dataprovider.DeleteUser(u.Username, "", "", "")
  2088. assert.NoError(t, err)
  2089. err = os.RemoveAll(u.GetHomeDir())
  2090. assert.NoError(t, err)
  2091. }
  2092. func TestOnDemandRule(t *testing.T) {
  2093. a := &dataprovider.BaseEventAction{
  2094. Name: "a",
  2095. Type: dataprovider.ActionTypeBackup,
  2096. Options: dataprovider.BaseEventActionOptions{},
  2097. }
  2098. err := dataprovider.AddEventAction(a, "", "", "")
  2099. assert.NoError(t, err)
  2100. r := &dataprovider.EventRule{
  2101. Name: "test on demand rule",
  2102. Status: 1,
  2103. Trigger: dataprovider.EventTriggerOnDemand,
  2104. Actions: []dataprovider.EventAction{
  2105. {
  2106. BaseEventAction: dataprovider.BaseEventAction{
  2107. Name: a.Name,
  2108. },
  2109. },
  2110. },
  2111. }
  2112. err = dataprovider.AddEventRule(r, "", "", "")
  2113. assert.NoError(t, err)
  2114. err = RunOnDemandRule(r.Name)
  2115. assert.NoError(t, err)
  2116. r.Status = 0
  2117. err = dataprovider.UpdateEventRule(r, "", "", "")
  2118. assert.NoError(t, err)
  2119. err = RunOnDemandRule(r.Name)
  2120. assert.ErrorIs(t, err, util.ErrValidation)
  2121. assert.Contains(t, err.Error(), "is inactive")
  2122. r.Status = 1
  2123. r.Trigger = dataprovider.EventTriggerCertificate
  2124. err = dataprovider.UpdateEventRule(r, "", "", "")
  2125. assert.NoError(t, err)
  2126. err = RunOnDemandRule(r.Name)
  2127. assert.ErrorIs(t, err, util.ErrValidation)
  2128. assert.Contains(t, err.Error(), "is not defined as on-demand")
  2129. a1 := &dataprovider.BaseEventAction{
  2130. Name: "a1",
  2131. Type: dataprovider.ActionTypeEmail,
  2132. Options: dataprovider.BaseEventActionOptions{
  2133. EmailConfig: dataprovider.EventActionEmailConfig{
  2134. Recipients: []string{"[email protected]"},
  2135. Subject: "subject",
  2136. Body: "body",
  2137. Attachments: []string{"/{{.VirtualPath}}"},
  2138. },
  2139. },
  2140. }
  2141. err = dataprovider.AddEventAction(a1, "", "", "")
  2142. assert.NoError(t, err)
  2143. r.Trigger = dataprovider.EventTriggerOnDemand
  2144. r.Actions = []dataprovider.EventAction{
  2145. {
  2146. BaseEventAction: dataprovider.BaseEventAction{
  2147. Name: a1.Name,
  2148. },
  2149. },
  2150. }
  2151. err = dataprovider.UpdateEventRule(r, "", "", "")
  2152. assert.NoError(t, err)
  2153. err = RunOnDemandRule(r.Name)
  2154. assert.ErrorIs(t, err, util.ErrValidation)
  2155. assert.Contains(t, err.Error(), "incosistent actions")
  2156. err = dataprovider.DeleteEventRule(r.Name, "", "", "")
  2157. assert.NoError(t, err)
  2158. err = dataprovider.DeleteEventAction(a.Name, "", "", "")
  2159. assert.NoError(t, err)
  2160. err = dataprovider.DeleteEventAction(a1.Name, "", "", "")
  2161. assert.NoError(t, err)
  2162. err = RunOnDemandRule(r.Name)
  2163. assert.ErrorIs(t, err, util.ErrNotFound)
  2164. }
  2165. func getErrorString(err error) string {
  2166. if err == nil {
  2167. return ""
  2168. }
  2169. return err.Error()
  2170. }
  2171. func TestHTTPEndpointWithPlaceholders(t *testing.T) {
  2172. c := dataprovider.EventActionHTTPConfig{
  2173. Endpoint: "http://127.0.0.1:8080/base/url/{{.Name}}/{{.VirtualPath}}/upload",
  2174. QueryParameters: []dataprovider.KeyValue{
  2175. {
  2176. Key: "u",
  2177. Value: "{{.Name}}",
  2178. },
  2179. {
  2180. Key: "p",
  2181. Value: "{{.VirtualPath}}",
  2182. },
  2183. },
  2184. }
  2185. name := "uname"
  2186. vPath := "/a dir/@ file.txt"
  2187. replacer := strings.NewReplacer("{{.Name}}", name, "{{.VirtualPath}}", vPath)
  2188. u, err := getHTTPRuleActionEndpoint(&c, replacer)
  2189. assert.NoError(t, err)
  2190. expected := "http://127.0.0.1:8080/base/url/" + url.PathEscape(name) + "/" + url.PathEscape(vPath) +
  2191. "/upload?" + "p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2192. assert.Equal(t, expected, u)
  2193. c.Endpoint = "http://127.0.0.1/upload"
  2194. u, err = getHTTPRuleActionEndpoint(&c, replacer)
  2195. assert.NoError(t, err)
  2196. expected = c.Endpoint + "?p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2197. assert.Equal(t, expected, u)
  2198. }
  2199. func TestMetadataReplacement(t *testing.T) {
  2200. params := &EventParams{
  2201. Metadata: map[string]string{
  2202. "key": "value",
  2203. },
  2204. }
  2205. replacements := params.getStringReplacements(false, false)
  2206. replacer := strings.NewReplacer(replacements...)
  2207. reader, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{Body: "{{.Metadata}} {{.MetadataString}}"}, replacer, nil, dataprovider.User{}, params, false)
  2208. require.NoError(t, err)
  2209. data, err := io.ReadAll(reader)
  2210. require.NoError(t, err)
  2211. assert.Equal(t, `{"key":"value"} {\"key\":\"value\"}`, string(data))
  2212. }
  2213. func TestUserInactivityCheck(t *testing.T) {
  2214. username1 := "user1"
  2215. username2 := "user2"
  2216. user1 := dataprovider.User{
  2217. BaseUser: sdk.BaseUser{
  2218. Username: username1,
  2219. HomeDir: filepath.Join(os.TempDir(), username1),
  2220. Status: 1,
  2221. Permissions: map[string][]string{
  2222. "/": {dataprovider.PermAny},
  2223. },
  2224. },
  2225. }
  2226. user2 := dataprovider.User{
  2227. BaseUser: sdk.BaseUser{
  2228. Username: username2,
  2229. HomeDir: filepath.Join(os.TempDir(), username2),
  2230. Status: 1,
  2231. Permissions: map[string][]string{
  2232. "/": {dataprovider.PermAny},
  2233. },
  2234. },
  2235. }
  2236. days := user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2237. assert.Equal(t, 0, days)
  2238. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2239. err := executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2240. DisableThreshold: 10,
  2241. }, time.Now().Add(12*24*time.Hour))
  2242. assert.Error(t, err)
  2243. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2244. err = executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2245. DeleteThreshold: 10,
  2246. }, time.Now().Add(12*24*time.Hour))
  2247. assert.Error(t, err)
  2248. err = dataprovider.AddUser(&user1, "", "", "")
  2249. assert.NoError(t, err)
  2250. err = dataprovider.AddUser(&user2, "", "", "")
  2251. assert.NoError(t, err)
  2252. user1, err = dataprovider.UserExists(username1, "")
  2253. assert.NoError(t, err)
  2254. assert.Equal(t, 1, user1.Status)
  2255. days = user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2256. assert.Equal(t, 10, days)
  2257. days = user1.InactivityDays(time.Now().Add(-10*24*time.Hour + 5*time.Second))
  2258. assert.Equal(t, -9, days)
  2259. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2260. DisableThreshold: 10,
  2261. }, dataprovider.ConditionOptions{
  2262. Names: []dataprovider.ConditionPattern{
  2263. {
  2264. Pattern: "not matching",
  2265. },
  2266. },
  2267. }, &EventParams{}, time.Now().Add(12*24*time.Hour))
  2268. assert.NoError(t, err)
  2269. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2270. DisableThreshold: 10,
  2271. }, dataprovider.ConditionOptions{
  2272. Names: []dataprovider.ConditionPattern{
  2273. {
  2274. Pattern: user1.Username,
  2275. },
  2276. },
  2277. }, &EventParams{}, time.Now())
  2278. assert.NoError(t, err) // no action
  2279. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2280. DisableThreshold: 10,
  2281. }, dataprovider.ConditionOptions{
  2282. Names: []dataprovider.ConditionPattern{
  2283. {
  2284. Pattern: user1.Username,
  2285. },
  2286. },
  2287. }, &EventParams{}, time.Now().Add(-12*24*time.Hour))
  2288. assert.NoError(t, err) // no action
  2289. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2290. DisableThreshold: 10,
  2291. DeleteThreshold: 20,
  2292. }, dataprovider.ConditionOptions{
  2293. Names: []dataprovider.ConditionPattern{
  2294. {
  2295. Pattern: user1.Username,
  2296. },
  2297. },
  2298. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2299. // both thresholds exceeded, the user will be disabled
  2300. if assert.Error(t, err) {
  2301. assert.Contains(t, err.Error(), "executed inactivity check actions for users")
  2302. }
  2303. user1, err = dataprovider.UserExists(username1, "")
  2304. assert.NoError(t, err)
  2305. assert.Equal(t, 0, user1.Status)
  2306. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2307. DisableThreshold: 10,
  2308. }, dataprovider.ConditionOptions{
  2309. Names: []dataprovider.ConditionPattern{
  2310. {
  2311. Pattern: user1.Username,
  2312. },
  2313. },
  2314. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2315. assert.NoError(t, err) // already disabled, no action
  2316. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2317. DisableThreshold: 10,
  2318. DeleteThreshold: 20,
  2319. }, dataprovider.ConditionOptions{
  2320. Names: []dataprovider.ConditionPattern{
  2321. {
  2322. Pattern: user1.Username,
  2323. },
  2324. },
  2325. }, &EventParams{}, time.Now().Add(-30*24*time.Hour))
  2326. assert.NoError(t, err)
  2327. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2328. DisableThreshold: 10,
  2329. DeleteThreshold: 20,
  2330. }, dataprovider.ConditionOptions{
  2331. Names: []dataprovider.ConditionPattern{
  2332. {
  2333. Pattern: user1.Username,
  2334. },
  2335. },
  2336. }, &EventParams{}, time.Now())
  2337. assert.NoError(t, err)
  2338. user1, err = dataprovider.UserExists(username1, "")
  2339. assert.NoError(t, err)
  2340. assert.Equal(t, 0, user1.Status)
  2341. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2342. DisableThreshold: 10,
  2343. DeleteThreshold: 20,
  2344. }, dataprovider.ConditionOptions{
  2345. Names: []dataprovider.ConditionPattern{
  2346. {
  2347. Pattern: user1.Username,
  2348. },
  2349. },
  2350. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // the user is disabled, will be now deleted
  2351. assert.Error(t, err)
  2352. _, err = dataprovider.UserExists(username1, "")
  2353. assert.ErrorIs(t, err, util.ErrNotFound)
  2354. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2355. DeleteThreshold: 20,
  2356. }, dataprovider.ConditionOptions{
  2357. Names: []dataprovider.ConditionPattern{
  2358. {
  2359. Pattern: user2.Username,
  2360. },
  2361. },
  2362. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // no disable threshold, user deleted
  2363. assert.Error(t, err)
  2364. _, err = dataprovider.UserExists(username2, "")
  2365. assert.ErrorIs(t, err, util.ErrNotFound)
  2366. err = dataprovider.DeleteUser(username1, "", "", "")
  2367. assert.Error(t, err)
  2368. err = dataprovider.DeleteUser(username2, "", "", "")
  2369. assert.Error(t, err)
  2370. }