eventmanager_test.go 55 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "errors"
  19. "fmt"
  20. "io"
  21. "mime/multipart"
  22. "net/http"
  23. "net/url"
  24. "os"
  25. "path"
  26. "path/filepath"
  27. "runtime"
  28. "strings"
  29. "testing"
  30. "time"
  31. "github.com/klauspost/compress/zip"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. sdkkms "github.com/sftpgo/sdk/kms"
  35. "github.com/stretchr/testify/assert"
  36. "github.com/stretchr/testify/require"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/kms"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. func TestEventRuleMatch(t *testing.T) {
  43. role := "role1"
  44. conditions := dataprovider.EventConditions{
  45. ProviderEvents: []string{"add", "update"},
  46. Options: dataprovider.ConditionOptions{
  47. Names: []dataprovider.ConditionPattern{
  48. {
  49. Pattern: "user1",
  50. InverseMatch: true,
  51. },
  52. },
  53. RoleNames: []dataprovider.ConditionPattern{
  54. {
  55. Pattern: role,
  56. },
  57. },
  58. },
  59. }
  60. res := eventManager.checkProviderEventMatch(conditions, EventParams{
  61. Name: "user1",
  62. Role: role,
  63. Event: "add",
  64. })
  65. assert.False(t, res)
  66. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  67. Name: "user2",
  68. Role: role,
  69. Event: "update",
  70. })
  71. assert.True(t, res)
  72. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  73. Name: "user2",
  74. Role: role,
  75. Event: "delete",
  76. })
  77. assert.False(t, res)
  78. conditions.Options.ProviderObjects = []string{"api_key"}
  79. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  80. Name: "user2",
  81. Event: "update",
  82. Role: role,
  83. ObjectType: "share",
  84. })
  85. assert.False(t, res)
  86. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  87. Name: "user2",
  88. Event: "update",
  89. Role: role,
  90. ObjectType: "api_key",
  91. })
  92. assert.True(t, res)
  93. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  94. Name: "user2",
  95. Event: "update",
  96. Role: role + "1",
  97. ObjectType: "api_key",
  98. })
  99. assert.False(t, res)
  100. // now test fs events
  101. conditions = dataprovider.EventConditions{
  102. FsEvents: []string{operationUpload, operationDownload},
  103. Options: dataprovider.ConditionOptions{
  104. Names: []dataprovider.ConditionPattern{
  105. {
  106. Pattern: "user*",
  107. },
  108. {
  109. Pattern: "tester*",
  110. },
  111. },
  112. RoleNames: []dataprovider.ConditionPattern{
  113. {
  114. Pattern: role,
  115. InverseMatch: true,
  116. },
  117. },
  118. FsPaths: []dataprovider.ConditionPattern{
  119. {
  120. Pattern: "/**/*.txt",
  121. },
  122. },
  123. Protocols: []string{ProtocolSFTP},
  124. MinFileSize: 10,
  125. MaxFileSize: 30,
  126. },
  127. }
  128. params := EventParams{
  129. Name: "tester4",
  130. Event: operationDelete,
  131. VirtualPath: "/path.txt",
  132. Protocol: ProtocolSFTP,
  133. ObjectName: "path.txt",
  134. FileSize: 20,
  135. }
  136. res = eventManager.checkFsEventMatch(conditions, params)
  137. assert.False(t, res)
  138. params.Event = operationDownload
  139. res = eventManager.checkFsEventMatch(conditions, params)
  140. assert.True(t, res)
  141. params.Role = role
  142. res = eventManager.checkFsEventMatch(conditions, params)
  143. assert.False(t, res)
  144. params.Role = ""
  145. params.Name = "name"
  146. res = eventManager.checkFsEventMatch(conditions, params)
  147. assert.False(t, res)
  148. params.Name = "user5"
  149. res = eventManager.checkFsEventMatch(conditions, params)
  150. assert.True(t, res)
  151. params.VirtualPath = "/sub/f.jpg"
  152. params.ObjectName = path.Base(params.VirtualPath)
  153. res = eventManager.checkFsEventMatch(conditions, params)
  154. assert.False(t, res)
  155. params.VirtualPath = "/sub/f.txt"
  156. params.ObjectName = path.Base(params.VirtualPath)
  157. res = eventManager.checkFsEventMatch(conditions, params)
  158. assert.True(t, res)
  159. params.Protocol = ProtocolHTTP
  160. res = eventManager.checkFsEventMatch(conditions, params)
  161. assert.False(t, res)
  162. params.Protocol = ProtocolSFTP
  163. params.FileSize = 5
  164. res = eventManager.checkFsEventMatch(conditions, params)
  165. assert.False(t, res)
  166. params.FileSize = 50
  167. res = eventManager.checkFsEventMatch(conditions, params)
  168. assert.False(t, res)
  169. params.FileSize = 25
  170. res = eventManager.checkFsEventMatch(conditions, params)
  171. assert.True(t, res)
  172. // bad pattern
  173. conditions.Options.Names = []dataprovider.ConditionPattern{
  174. {
  175. Pattern: "[-]",
  176. },
  177. }
  178. res = eventManager.checkFsEventMatch(conditions, params)
  179. assert.False(t, res)
  180. // check fs events with group name filters
  181. conditions = dataprovider.EventConditions{
  182. FsEvents: []string{operationUpload, operationDownload},
  183. Options: dataprovider.ConditionOptions{
  184. GroupNames: []dataprovider.ConditionPattern{
  185. {
  186. Pattern: "group*",
  187. },
  188. {
  189. Pattern: "testgroup*",
  190. },
  191. },
  192. },
  193. }
  194. params = EventParams{
  195. Name: "user1",
  196. Event: operationUpload,
  197. }
  198. res = eventManager.checkFsEventMatch(conditions, params)
  199. assert.False(t, res)
  200. params.Groups = []sdk.GroupMapping{
  201. {
  202. Name: "g1",
  203. Type: sdk.GroupTypePrimary,
  204. },
  205. {
  206. Name: "g2",
  207. Type: sdk.GroupTypeSecondary,
  208. },
  209. }
  210. res = eventManager.checkFsEventMatch(conditions, params)
  211. assert.False(t, res)
  212. params.Groups = []sdk.GroupMapping{
  213. {
  214. Name: "testgroup2",
  215. Type: sdk.GroupTypePrimary,
  216. },
  217. {
  218. Name: "g2",
  219. Type: sdk.GroupTypeSecondary,
  220. },
  221. }
  222. res = eventManager.checkFsEventMatch(conditions, params)
  223. assert.True(t, res)
  224. // check user conditions
  225. user := dataprovider.User{}
  226. user.Username = "u1"
  227. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  228. assert.True(t, res)
  229. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  230. Names: []dataprovider.ConditionPattern{
  231. {
  232. Pattern: "user",
  233. },
  234. },
  235. })
  236. assert.False(t, res)
  237. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  238. RoleNames: []dataprovider.ConditionPattern{
  239. {
  240. Pattern: role,
  241. },
  242. },
  243. })
  244. assert.False(t, res)
  245. user.Role = role
  246. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  247. RoleNames: []dataprovider.ConditionPattern{
  248. {
  249. Pattern: role,
  250. },
  251. },
  252. })
  253. assert.True(t, res)
  254. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  255. GroupNames: []dataprovider.ConditionPattern{
  256. {
  257. Pattern: "group",
  258. },
  259. },
  260. RoleNames: []dataprovider.ConditionPattern{
  261. {
  262. Pattern: role,
  263. },
  264. },
  265. })
  266. assert.False(t, res)
  267. }
  268. func TestDoubleStarMatching(t *testing.T) {
  269. c := dataprovider.ConditionPattern{
  270. Pattern: "/mydir/**",
  271. }
  272. res := checkEventConditionPattern(c, "/mydir")
  273. assert.True(t, res)
  274. res = checkEventConditionPattern(c, "/mydirname")
  275. assert.False(t, res)
  276. res = checkEventConditionPattern(c, "/mydir/sub")
  277. assert.True(t, res)
  278. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  279. assert.True(t, res)
  280. c.Pattern = "/**/*"
  281. res = checkEventConditionPattern(c, "/mydir")
  282. assert.True(t, res)
  283. res = checkEventConditionPattern(c, "/mydirname")
  284. assert.True(t, res)
  285. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  286. assert.True(t, res)
  287. c.Pattern = "/mydir/**/*.txt"
  288. res = checkEventConditionPattern(c, "/mydir")
  289. assert.False(t, res)
  290. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  291. assert.False(t, res)
  292. res = checkEventConditionPattern(c, "/mydir/sub")
  293. assert.False(t, res)
  294. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  295. assert.False(t, res)
  296. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  297. assert.True(t, res)
  298. }
  299. func TestEventManager(t *testing.T) {
  300. startEventScheduler()
  301. action := &dataprovider.BaseEventAction{
  302. Name: "test_action",
  303. Type: dataprovider.ActionTypeHTTP,
  304. Options: dataprovider.BaseEventActionOptions{
  305. HTTPConfig: dataprovider.EventActionHTTPConfig{
  306. Endpoint: "http://localhost",
  307. Timeout: 20,
  308. Method: http.MethodGet,
  309. },
  310. },
  311. }
  312. err := dataprovider.AddEventAction(action, "", "", "")
  313. assert.NoError(t, err)
  314. rule := &dataprovider.EventRule{
  315. Name: "rule",
  316. Status: 1,
  317. Trigger: dataprovider.EventTriggerFsEvent,
  318. Conditions: dataprovider.EventConditions{
  319. FsEvents: []string{operationUpload},
  320. },
  321. Actions: []dataprovider.EventAction{
  322. {
  323. BaseEventAction: dataprovider.BaseEventAction{
  324. Name: action.Name,
  325. },
  326. Order: 1,
  327. },
  328. },
  329. }
  330. err = dataprovider.AddEventRule(rule, "", "", "")
  331. assert.NoError(t, err)
  332. eventManager.RLock()
  333. assert.Len(t, eventManager.FsEvents, 1)
  334. assert.Len(t, eventManager.ProviderEvents, 0)
  335. assert.Len(t, eventManager.Schedules, 0)
  336. assert.Len(t, eventManager.schedulesMapping, 0)
  337. eventManager.RUnlock()
  338. rule.Trigger = dataprovider.EventTriggerProviderEvent
  339. rule.Conditions = dataprovider.EventConditions{
  340. ProviderEvents: []string{"add"},
  341. }
  342. err = dataprovider.UpdateEventRule(rule, "", "", "")
  343. assert.NoError(t, err)
  344. eventManager.RLock()
  345. assert.Len(t, eventManager.FsEvents, 0)
  346. assert.Len(t, eventManager.ProviderEvents, 1)
  347. assert.Len(t, eventManager.Schedules, 0)
  348. assert.Len(t, eventManager.schedulesMapping, 0)
  349. eventManager.RUnlock()
  350. rule.Trigger = dataprovider.EventTriggerSchedule
  351. rule.Conditions = dataprovider.EventConditions{
  352. Schedules: []dataprovider.Schedule{
  353. {
  354. Hours: "0",
  355. DayOfWeek: "*",
  356. DayOfMonth: "*",
  357. Month: "*",
  358. },
  359. },
  360. }
  361. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  362. eventManager.addUpdateRuleInternal(*rule)
  363. eventManager.RLock()
  364. assert.Len(t, eventManager.FsEvents, 0)
  365. assert.Len(t, eventManager.ProviderEvents, 0)
  366. assert.Len(t, eventManager.Schedules, 0)
  367. assert.Len(t, eventManager.schedulesMapping, 0)
  368. eventManager.RUnlock()
  369. assert.Eventually(t, func() bool {
  370. _, err = dataprovider.EventRuleExists(rule.Name)
  371. ok := errors.Is(err, util.ErrNotFound)
  372. return ok
  373. }, 2*time.Second, 100*time.Millisecond)
  374. rule.DeletedAt = 0
  375. err = dataprovider.AddEventRule(rule, "", "", "")
  376. assert.NoError(t, err)
  377. eventManager.RLock()
  378. assert.Len(t, eventManager.FsEvents, 0)
  379. assert.Len(t, eventManager.ProviderEvents, 0)
  380. assert.Len(t, eventManager.Schedules, 1)
  381. assert.Len(t, eventManager.schedulesMapping, 1)
  382. eventManager.RUnlock()
  383. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  384. assert.NoError(t, err)
  385. eventManager.RLock()
  386. assert.Len(t, eventManager.FsEvents, 0)
  387. assert.Len(t, eventManager.ProviderEvents, 0)
  388. assert.Len(t, eventManager.Schedules, 0)
  389. assert.Len(t, eventManager.schedulesMapping, 0)
  390. eventManager.RUnlock()
  391. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  392. assert.NoError(t, err)
  393. stopEventScheduler()
  394. }
  395. func TestEventManagerErrors(t *testing.T) {
  396. startEventScheduler()
  397. providerConf := dataprovider.GetProviderConfig()
  398. err := dataprovider.Close()
  399. assert.NoError(t, err)
  400. params := EventParams{
  401. sender: "sender",
  402. }
  403. _, err = params.getUsers()
  404. assert.Error(t, err)
  405. _, err = params.getFolders()
  406. assert.Error(t, err)
  407. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  408. assert.Error(t, err)
  409. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  410. assert.Error(t, err)
  411. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  412. assert.Error(t, err)
  413. err = executeMetadataCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  414. assert.Error(t, err)
  415. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  416. assert.Error(t, err)
  417. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  418. assert.Error(t, err)
  419. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  420. assert.Error(t, err)
  421. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  422. assert.Error(t, err)
  423. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  424. assert.Error(t, err)
  425. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  426. assert.Error(t, err)
  427. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  428. dataprovider.ConditionOptions{}, &EventParams{})
  429. assert.Error(t, err)
  430. groupName := "agroup"
  431. err = executeQuotaResetForUser(&dataprovider.User{
  432. Groups: []sdk.GroupMapping{
  433. {
  434. Name: groupName,
  435. Type: sdk.GroupTypePrimary,
  436. },
  437. },
  438. })
  439. assert.Error(t, err)
  440. err = executeMetadataCheckForUser(&dataprovider.User{
  441. Groups: []sdk.GroupMapping{
  442. {
  443. Name: groupName,
  444. Type: sdk.GroupTypePrimary,
  445. },
  446. },
  447. })
  448. assert.Error(t, err)
  449. err = executeDataRetentionCheckForUser(dataprovider.User{
  450. Groups: []sdk.GroupMapping{
  451. {
  452. Name: groupName,
  453. Type: sdk.GroupTypePrimary,
  454. },
  455. },
  456. }, nil, &EventParams{}, "")
  457. assert.Error(t, err)
  458. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  459. Groups: []sdk.GroupMapping{
  460. {
  461. Name: groupName,
  462. Type: sdk.GroupTypePrimary,
  463. },
  464. },
  465. })
  466. assert.Error(t, err)
  467. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  468. Groups: []sdk.GroupMapping{
  469. {
  470. Name: groupName,
  471. Type: sdk.GroupTypePrimary,
  472. },
  473. },
  474. })
  475. assert.Error(t, err)
  476. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  477. Groups: []sdk.GroupMapping{
  478. {
  479. Name: groupName,
  480. Type: sdk.GroupTypePrimary,
  481. },
  482. },
  483. })
  484. assert.Error(t, err)
  485. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  486. Groups: []sdk.GroupMapping{
  487. {
  488. Name: groupName,
  489. Type: sdk.GroupTypePrimary,
  490. },
  491. },
  492. })
  493. assert.Error(t, err)
  494. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  495. Groups: []sdk.GroupMapping{
  496. {
  497. Name: groupName,
  498. Type: sdk.GroupTypePrimary,
  499. },
  500. },
  501. })
  502. assert.Error(t, err)
  503. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  504. Groups: []sdk.GroupMapping{
  505. {
  506. Name: groupName,
  507. Type: sdk.GroupTypePrimary,
  508. },
  509. },
  510. })
  511. assert.Error(t, err)
  512. err = executePwdExpirationCheckForUser(&dataprovider.User{
  513. Groups: []sdk.GroupMapping{
  514. {
  515. Name: groupName,
  516. Type: sdk.GroupTypePrimary,
  517. },
  518. }}, dataprovider.EventActionPasswordExpiration{})
  519. assert.Error(t, err)
  520. _, _, err = getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  521. Method: http.MethodPost,
  522. Parts: []dataprovider.HTTPPart{
  523. {
  524. Name: "p1",
  525. },
  526. },
  527. }, nil, nil, dataprovider.User{
  528. BaseUser: sdk.BaseUser{
  529. Username: "u",
  530. },
  531. Groups: []sdk.GroupMapping{
  532. {
  533. Name: groupName,
  534. Type: sdk.GroupTypePrimary,
  535. },
  536. },
  537. }, &EventParams{})
  538. assert.Error(t, err)
  539. dataRetentionAction := dataprovider.BaseEventAction{
  540. Type: dataprovider.ActionTypeDataRetentionCheck,
  541. Options: dataprovider.BaseEventActionOptions{
  542. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  543. Folders: []dataprovider.FolderRetention{
  544. {
  545. Path: "/",
  546. Retention: 24,
  547. },
  548. },
  549. },
  550. },
  551. }
  552. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  553. Names: []dataprovider.ConditionPattern{
  554. {
  555. Pattern: "username1",
  556. },
  557. },
  558. })
  559. if assert.Error(t, err) {
  560. assert.Contains(t, err.Error(), "unable to get users")
  561. }
  562. eventManager.loadRules()
  563. eventManager.RLock()
  564. assert.Len(t, eventManager.FsEvents, 0)
  565. assert.Len(t, eventManager.ProviderEvents, 0)
  566. assert.Len(t, eventManager.Schedules, 0)
  567. eventManager.RUnlock()
  568. // rule with invalid trigger
  569. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  570. Name: "test rule",
  571. Status: 1,
  572. Trigger: -1,
  573. })
  574. eventManager.RLock()
  575. assert.Len(t, eventManager.FsEvents, 0)
  576. assert.Len(t, eventManager.ProviderEvents, 0)
  577. assert.Len(t, eventManager.Schedules, 0)
  578. eventManager.RUnlock()
  579. // rule with invalid cronspec
  580. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  581. Name: "test rule",
  582. Status: 1,
  583. Trigger: dataprovider.EventTriggerSchedule,
  584. Conditions: dataprovider.EventConditions{
  585. Schedules: []dataprovider.Schedule{
  586. {
  587. Hours: "1000",
  588. },
  589. },
  590. },
  591. })
  592. eventManager.RLock()
  593. assert.Len(t, eventManager.FsEvents, 0)
  594. assert.Len(t, eventManager.ProviderEvents, 0)
  595. assert.Len(t, eventManager.Schedules, 0)
  596. eventManager.RUnlock()
  597. err = dataprovider.Initialize(providerConf, configDir, true)
  598. assert.NoError(t, err)
  599. stopEventScheduler()
  600. }
  601. func TestEventRuleActions(t *testing.T) {
  602. actionName := "test rule action"
  603. action := dataprovider.BaseEventAction{
  604. Name: actionName,
  605. Type: dataprovider.ActionTypeBackup,
  606. }
  607. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  608. assert.NoError(t, err)
  609. action.Type = -1
  610. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  611. assert.Error(t, err)
  612. action = dataprovider.BaseEventAction{
  613. Name: actionName,
  614. Type: dataprovider.ActionTypeHTTP,
  615. Options: dataprovider.BaseEventActionOptions{
  616. HTTPConfig: dataprovider.EventActionHTTPConfig{
  617. Endpoint: "http://foo\x7f.com/", // invalid URL
  618. SkipTLSVerify: true,
  619. Body: "{{ObjectData}}",
  620. Method: http.MethodPost,
  621. QueryParameters: []dataprovider.KeyValue{
  622. {
  623. Key: "param",
  624. Value: "value",
  625. },
  626. },
  627. Timeout: 5,
  628. Headers: []dataprovider.KeyValue{
  629. {
  630. Key: "Content-Type",
  631. Value: "application/json",
  632. },
  633. },
  634. Username: "httpuser",
  635. },
  636. },
  637. }
  638. action.Options.SetEmptySecretsIfNil()
  639. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  640. if assert.Error(t, err) {
  641. assert.Contains(t, err.Error(), "invalid endpoint")
  642. }
  643. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  644. params := &EventParams{
  645. Name: "a",
  646. Object: &dataprovider.User{
  647. BaseUser: sdk.BaseUser{
  648. Username: "test user",
  649. },
  650. },
  651. }
  652. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  653. assert.NoError(t, err)
  654. action.Options.HTTPConfig.Method = http.MethodGet
  655. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  656. assert.NoError(t, err)
  657. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  658. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  659. if assert.Error(t, err) {
  660. assert.Contains(t, err.Error(), "unexpected status code: 404")
  661. }
  662. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  663. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  664. assert.Error(t, err)
  665. action.Options.HTTPConfig.QueryParameters = nil
  666. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  667. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  668. assert.Error(t, err)
  669. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  670. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  671. if assert.Error(t, err) {
  672. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  673. }
  674. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  675. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  676. action.Options.HTTPConfig.Body = ""
  677. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  678. {
  679. Name: "p1",
  680. Filepath: "path",
  681. },
  682. }
  683. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  684. assert.Contains(t, getErrorString(err), "error getting user")
  685. action.Options.HTTPConfig.Parts = nil
  686. action.Options.HTTPConfig.Body = "{{ObjectData}}"
  687. // test disk and transfer quota reset
  688. username1 := "user1"
  689. username2 := "user2"
  690. user1 := dataprovider.User{
  691. BaseUser: sdk.BaseUser{
  692. Username: username1,
  693. HomeDir: filepath.Join(os.TempDir(), username1),
  694. Status: 1,
  695. Permissions: map[string][]string{
  696. "/": {dataprovider.PermAny},
  697. },
  698. },
  699. }
  700. user2 := dataprovider.User{
  701. BaseUser: sdk.BaseUser{
  702. Username: username2,
  703. HomeDir: filepath.Join(os.TempDir(), username2),
  704. Status: 1,
  705. Permissions: map[string][]string{
  706. "/": {dataprovider.PermAny},
  707. },
  708. },
  709. }
  710. user2.Filters.PasswordExpiration = 10
  711. err = dataprovider.AddUser(&user1, "", "", "")
  712. assert.NoError(t, err)
  713. err = dataprovider.AddUser(&user2, "", "", "")
  714. assert.NoError(t, err)
  715. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  716. Threshold: 20,
  717. }, dataprovider.ConditionOptions{
  718. Names: []dataprovider.ConditionPattern{
  719. {
  720. Pattern: user2.Username,
  721. },
  722. },
  723. }, &EventParams{})
  724. // smtp not configured
  725. assert.Error(t, err)
  726. action = dataprovider.BaseEventAction{
  727. Type: dataprovider.ActionTypeUserQuotaReset,
  728. }
  729. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  730. Names: []dataprovider.ConditionPattern{
  731. {
  732. Pattern: username1,
  733. },
  734. },
  735. })
  736. assert.Error(t, err) // no home dir
  737. // create the home dir
  738. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  739. assert.NoError(t, err)
  740. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  741. assert.NoError(t, err)
  742. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  743. Names: []dataprovider.ConditionPattern{
  744. {
  745. Pattern: username1,
  746. },
  747. },
  748. })
  749. assert.NoError(t, err)
  750. userGet, err := dataprovider.UserExists(username1, "")
  751. assert.NoError(t, err)
  752. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  753. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  754. // simulate another quota scan in progress
  755. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  756. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  757. Names: []dataprovider.ConditionPattern{
  758. {
  759. Pattern: username1,
  760. },
  761. },
  762. })
  763. assert.Error(t, err)
  764. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  765. // non matching pattern
  766. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  767. Names: []dataprovider.ConditionPattern{
  768. {
  769. Pattern: "don't match",
  770. },
  771. },
  772. })
  773. assert.Error(t, err)
  774. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  775. action = dataprovider.BaseEventAction{
  776. Type: dataprovider.ActionTypeMetadataCheck,
  777. }
  778. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  779. Names: []dataprovider.ConditionPattern{
  780. {
  781. Pattern: "don't match",
  782. },
  783. },
  784. })
  785. assert.Error(t, err)
  786. assert.Contains(t, getErrorString(err), "no metadata check executed")
  787. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  788. Names: []dataprovider.ConditionPattern{
  789. {
  790. Pattern: username1,
  791. },
  792. },
  793. })
  794. assert.NoError(t, err)
  795. // simulate another metadata check in progress
  796. assert.True(t, ActiveMetadataChecks.Add(username1, ""))
  797. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  798. Names: []dataprovider.ConditionPattern{
  799. {
  800. Pattern: username1,
  801. },
  802. },
  803. })
  804. assert.Error(t, err)
  805. assert.True(t, ActiveMetadataChecks.Remove(username1))
  806. dataRetentionAction := dataprovider.BaseEventAction{
  807. Type: dataprovider.ActionTypeDataRetentionCheck,
  808. Options: dataprovider.BaseEventActionOptions{
  809. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  810. Folders: []dataprovider.FolderRetention{
  811. {
  812. Path: "",
  813. Retention: 24,
  814. },
  815. },
  816. },
  817. },
  818. }
  819. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  820. Names: []dataprovider.ConditionPattern{
  821. {
  822. Pattern: username1,
  823. },
  824. },
  825. })
  826. assert.Error(t, err) // invalid config, no folder path specified
  827. retentionDir := "testretention"
  828. dataRetentionAction = dataprovider.BaseEventAction{
  829. Type: dataprovider.ActionTypeDataRetentionCheck,
  830. Options: dataprovider.BaseEventActionOptions{
  831. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  832. Folders: []dataprovider.FolderRetention{
  833. {
  834. Path: path.Join("/", retentionDir),
  835. Retention: 24,
  836. DeleteEmptyDirs: true,
  837. },
  838. },
  839. },
  840. },
  841. }
  842. // create some test files
  843. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  844. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  845. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  846. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  847. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  848. assert.NoError(t, err)
  849. for _, f := range []string{file1, file2, file3, file4} {
  850. err = os.WriteFile(f, []byte(""), 0666)
  851. assert.NoError(t, err)
  852. }
  853. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  854. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  855. assert.NoError(t, err)
  856. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  857. assert.NoError(t, err)
  858. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  859. assert.NoError(t, err)
  860. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  861. Names: []dataprovider.ConditionPattern{
  862. {
  863. Pattern: username1,
  864. },
  865. },
  866. })
  867. assert.NoError(t, err)
  868. assert.FileExists(t, file1)
  869. assert.NoFileExists(t, file2)
  870. assert.FileExists(t, file3)
  871. assert.NoDirExists(t, filepath.Dir(file4))
  872. // simulate another check in progress
  873. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  874. assert.NotNil(t, c)
  875. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  876. Names: []dataprovider.ConditionPattern{
  877. {
  878. Pattern: username1,
  879. },
  880. },
  881. })
  882. assert.Error(t, err)
  883. RetentionChecks.remove(user1.Username)
  884. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  885. Names: []dataprovider.ConditionPattern{
  886. {
  887. Pattern: "no match",
  888. },
  889. },
  890. })
  891. assert.Error(t, err)
  892. assert.Contains(t, getErrorString(err), "no retention check executed")
  893. // test file exists action
  894. action = dataprovider.BaseEventAction{
  895. Type: dataprovider.ActionTypeFilesystem,
  896. Options: dataprovider.BaseEventActionOptions{
  897. FsConfig: dataprovider.EventActionFilesystemConfig{
  898. Type: dataprovider.FilesystemActionExist,
  899. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  900. },
  901. },
  902. }
  903. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  904. Names: []dataprovider.ConditionPattern{
  905. {
  906. Pattern: "no match",
  907. },
  908. },
  909. })
  910. assert.Error(t, err)
  911. assert.Contains(t, getErrorString(err), "no existence check executed")
  912. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  913. Names: []dataprovider.ConditionPattern{
  914. {
  915. Pattern: username1,
  916. },
  917. },
  918. })
  919. assert.NoError(t, err)
  920. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  921. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  922. Names: []dataprovider.ConditionPattern{
  923. {
  924. Pattern: username1,
  925. },
  926. },
  927. })
  928. assert.Error(t, err)
  929. err = os.RemoveAll(user1.GetHomeDir())
  930. assert.NoError(t, err)
  931. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  932. assert.NoError(t, err)
  933. action.Type = dataprovider.ActionTypeTransferQuotaReset
  934. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  935. Names: []dataprovider.ConditionPattern{
  936. {
  937. Pattern: username1,
  938. },
  939. },
  940. })
  941. assert.NoError(t, err)
  942. userGet, err = dataprovider.UserExists(username1, "")
  943. assert.NoError(t, err)
  944. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  945. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  946. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  947. Names: []dataprovider.ConditionPattern{
  948. {
  949. Pattern: "no match",
  950. },
  951. },
  952. })
  953. assert.Error(t, err)
  954. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  955. action.Type = dataprovider.ActionTypeFilesystem
  956. action.Options = dataprovider.BaseEventActionOptions{
  957. FsConfig: dataprovider.EventActionFilesystemConfig{
  958. Type: dataprovider.FilesystemActionRename,
  959. Renames: []dataprovider.KeyValue{
  960. {
  961. Key: "/source",
  962. Value: "/target",
  963. },
  964. },
  965. },
  966. }
  967. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  968. Names: []dataprovider.ConditionPattern{
  969. {
  970. Pattern: "no match",
  971. },
  972. },
  973. })
  974. assert.Error(t, err)
  975. assert.Contains(t, getErrorString(err), "no rename executed")
  976. action.Options = dataprovider.BaseEventActionOptions{
  977. FsConfig: dataprovider.EventActionFilesystemConfig{
  978. Type: dataprovider.FilesystemActionDelete,
  979. Deletes: []string{"/dir1"},
  980. },
  981. }
  982. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  983. Names: []dataprovider.ConditionPattern{
  984. {
  985. Pattern: "no match",
  986. },
  987. },
  988. })
  989. assert.Error(t, err)
  990. assert.Contains(t, getErrorString(err), "no delete executed")
  991. action.Options = dataprovider.BaseEventActionOptions{
  992. FsConfig: dataprovider.EventActionFilesystemConfig{
  993. Type: dataprovider.FilesystemActionMkdirs,
  994. Deletes: []string{"/dir1"},
  995. },
  996. }
  997. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  998. Names: []dataprovider.ConditionPattern{
  999. {
  1000. Pattern: "no match",
  1001. },
  1002. },
  1003. })
  1004. assert.Error(t, err)
  1005. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1006. action.Options = dataprovider.BaseEventActionOptions{
  1007. FsConfig: dataprovider.EventActionFilesystemConfig{
  1008. Type: dataprovider.FilesystemActionCompress,
  1009. Compress: dataprovider.EventActionFsCompress{
  1010. Name: "test.zip",
  1011. Paths: []string{"/{{VirtualPath}}"},
  1012. },
  1013. },
  1014. }
  1015. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1016. Names: []dataprovider.ConditionPattern{
  1017. {
  1018. Pattern: "no match",
  1019. },
  1020. },
  1021. })
  1022. assert.Error(t, err)
  1023. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1024. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1025. GroupNames: []dataprovider.ConditionPattern{
  1026. {
  1027. Pattern: "no match",
  1028. },
  1029. },
  1030. })
  1031. assert.Error(t, err)
  1032. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1033. err = dataprovider.DeleteUser(username1, "", "", "")
  1034. assert.NoError(t, err)
  1035. err = dataprovider.DeleteUser(username2, "", "", "")
  1036. assert.NoError(t, err)
  1037. // test folder quota reset
  1038. foldername1 := "f1"
  1039. foldername2 := "f2"
  1040. folder1 := vfs.BaseVirtualFolder{
  1041. Name: foldername1,
  1042. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1043. }
  1044. folder2 := vfs.BaseVirtualFolder{
  1045. Name: foldername2,
  1046. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1047. }
  1048. err = dataprovider.AddFolder(&folder1, "", "", "")
  1049. assert.NoError(t, err)
  1050. err = dataprovider.AddFolder(&folder2, "", "", "")
  1051. assert.NoError(t, err)
  1052. action = dataprovider.BaseEventAction{
  1053. Type: dataprovider.ActionTypeFolderQuotaReset,
  1054. }
  1055. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1056. Names: []dataprovider.ConditionPattern{
  1057. {
  1058. Pattern: foldername1,
  1059. },
  1060. },
  1061. })
  1062. assert.Error(t, err) // no home dir
  1063. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1064. assert.NoError(t, err)
  1065. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1066. assert.NoError(t, err)
  1067. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1068. Names: []dataprovider.ConditionPattern{
  1069. {
  1070. Pattern: foldername1,
  1071. },
  1072. },
  1073. })
  1074. assert.NoError(t, err)
  1075. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1076. assert.NoError(t, err)
  1077. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1078. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1079. // simulate another quota scan in progress
  1080. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1081. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1082. Names: []dataprovider.ConditionPattern{
  1083. {
  1084. Pattern: foldername1,
  1085. },
  1086. },
  1087. })
  1088. assert.Error(t, err)
  1089. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1090. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1091. Names: []dataprovider.ConditionPattern{
  1092. {
  1093. Pattern: "no folder match",
  1094. },
  1095. },
  1096. })
  1097. if assert.Error(t, err) {
  1098. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1099. }
  1100. body, _, err := getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  1101. Method: http.MethodPost,
  1102. }, nil, nil, dataprovider.User{}, &EventParams{})
  1103. assert.NoError(t, err)
  1104. assert.Nil(t, body)
  1105. err = os.RemoveAll(folder1.MappedPath)
  1106. assert.NoError(t, err)
  1107. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1108. assert.NoError(t, err)
  1109. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1110. assert.NoError(t, err)
  1111. }
  1112. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1113. username := "test_user_action_group_matching"
  1114. user := dataprovider.User{
  1115. BaseUser: sdk.BaseUser{
  1116. Username: username,
  1117. Permissions: map[string][]string{
  1118. "/": {dataprovider.PermAny},
  1119. },
  1120. HomeDir: filepath.Join(os.TempDir(), username),
  1121. },
  1122. }
  1123. err := dataprovider.AddUser(&user, "", "", "")
  1124. assert.NoError(t, err)
  1125. conditions := dataprovider.ConditionOptions{
  1126. GroupNames: []dataprovider.ConditionPattern{
  1127. {
  1128. Pattern: "agroup",
  1129. },
  1130. },
  1131. }
  1132. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1133. if assert.Error(t, err) {
  1134. assert.Contains(t, err.Error(), "no delete executed")
  1135. }
  1136. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1137. if assert.Error(t, err) {
  1138. assert.Contains(t, err.Error(), "no mkdir executed")
  1139. }
  1140. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1141. if assert.Error(t, err) {
  1142. assert.Contains(t, err.Error(), "no rename executed")
  1143. }
  1144. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1145. if assert.Error(t, err) {
  1146. assert.Contains(t, err.Error(), "no existence check executed")
  1147. }
  1148. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1149. if assert.Error(t, err) {
  1150. assert.Contains(t, err.Error(), "no copy executed")
  1151. }
  1152. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1153. if assert.Error(t, err) {
  1154. assert.Contains(t, err.Error(), "no user quota reset executed")
  1155. }
  1156. err = executeMetadataCheckRuleAction(conditions, &EventParams{})
  1157. if assert.Error(t, err) {
  1158. assert.Contains(t, err.Error(), "no metadata check executed")
  1159. }
  1160. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1161. if assert.Error(t, err) {
  1162. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1163. }
  1164. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1165. if assert.Error(t, err) {
  1166. assert.Contains(t, err.Error(), "no retention check executed")
  1167. }
  1168. err = dataprovider.DeleteUser(username, "", "", "")
  1169. assert.NoError(t, err)
  1170. err = os.RemoveAll(user.GetHomeDir())
  1171. assert.NoError(t, err)
  1172. }
  1173. func TestGetFileContent(t *testing.T) {
  1174. username := "test_user_get_file_content"
  1175. user := dataprovider.User{
  1176. BaseUser: sdk.BaseUser{
  1177. Username: username,
  1178. Permissions: map[string][]string{
  1179. "/": {dataprovider.PermAny},
  1180. },
  1181. HomeDir: filepath.Join(os.TempDir(), username),
  1182. },
  1183. }
  1184. err := dataprovider.AddUser(&user, "", "", "")
  1185. assert.NoError(t, err)
  1186. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1187. assert.NoError(t, err)
  1188. fileContent := []byte("test file content")
  1189. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1190. assert.NoError(t, err)
  1191. conn := NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1192. replacer := strings.NewReplacer("old", "new")
  1193. files, err := getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1194. assert.NoError(t, err)
  1195. if assert.Len(t, files, 1) {
  1196. var b bytes.Buffer
  1197. _, err = files[0].Writer(&b)
  1198. assert.NoError(t, err)
  1199. assert.Equal(t, fileContent, b.Bytes())
  1200. }
  1201. // missing file
  1202. _, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1203. assert.Error(t, err)
  1204. // directory
  1205. _, err = getMailAttachments(conn, []string{"/"}, replacer)
  1206. assert.Error(t, err)
  1207. // files too large
  1208. content := make([]byte, maxAttachmentsSize/2+1)
  1209. _, err = rand.Read(content)
  1210. assert.NoError(t, err)
  1211. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1212. assert.NoError(t, err)
  1213. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1214. assert.NoError(t, err)
  1215. files, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1216. assert.NoError(t, err)
  1217. if assert.Len(t, files, 1) {
  1218. var b bytes.Buffer
  1219. _, err = files[0].Writer(&b)
  1220. assert.NoError(t, err)
  1221. assert.Equal(t, content, b.Bytes())
  1222. }
  1223. _, err = getMailAttachments(conn, []string{"/file1.txt", "/file2.txt"}, replacer)
  1224. if assert.Error(t, err) {
  1225. assert.Contains(t, err.Error(), "size too large")
  1226. }
  1227. // change the filesystem provider
  1228. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1229. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1230. err = dataprovider.UpdateUser(&user, "", "", "")
  1231. assert.NoError(t, err)
  1232. conn = NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1233. // the file is not encrypted so reading the encryption header will fail
  1234. files, err = getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1235. assert.NoError(t, err)
  1236. if assert.Len(t, files, 1) {
  1237. var b bytes.Buffer
  1238. _, err = files[0].Writer(&b)
  1239. assert.Error(t, err)
  1240. }
  1241. err = dataprovider.DeleteUser(username, "", "", "")
  1242. assert.NoError(t, err)
  1243. err = os.RemoveAll(user.GetHomeDir())
  1244. assert.NoError(t, err)
  1245. }
  1246. func TestFilesystemActionErrors(t *testing.T) {
  1247. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1248. if assert.Error(t, err) {
  1249. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1250. }
  1251. username := "test_user_for_actions"
  1252. testReplacer := strings.NewReplacer("old", "new")
  1253. user := dataprovider.User{
  1254. BaseUser: sdk.BaseUser{
  1255. Username: username,
  1256. Permissions: map[string][]string{
  1257. "/": {dataprovider.PermAny},
  1258. },
  1259. HomeDir: filepath.Join(os.TempDir(), username),
  1260. },
  1261. FsConfig: vfs.Filesystem{
  1262. Provider: sdk.SFTPFilesystemProvider,
  1263. SFTPConfig: vfs.SFTPFsConfig{
  1264. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1265. Endpoint: "127.0.0.1:4022",
  1266. Username: username,
  1267. },
  1268. Password: kms.NewPlainSecret("pwd"),
  1269. },
  1270. },
  1271. }
  1272. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1273. Recipients: []string{"[email protected]"},
  1274. Subject: "subject",
  1275. Body: "body",
  1276. Attachments: []string{"/file.txt"},
  1277. }, &EventParams{
  1278. sender: username,
  1279. })
  1280. assert.Error(t, err)
  1281. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1282. err = executeDeleteFileFsAction(conn, "", nil)
  1283. assert.Error(t, err)
  1284. err = dataprovider.AddUser(&user, "", "", "")
  1285. assert.NoError(t, err)
  1286. // check root fs fails
  1287. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1288. assert.Error(t, err)
  1289. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1290. assert.Error(t, err)
  1291. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1292. assert.Error(t, err)
  1293. err = executeExistFsActionForUser(nil, testReplacer, user)
  1294. assert.Error(t, err)
  1295. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1296. assert.Error(t, err)
  1297. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1298. assert.Error(t, err)
  1299. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1300. assert.Error(t, err)
  1301. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1302. Recipients: []string{"[email protected]"},
  1303. Subject: "subject",
  1304. Body: "body",
  1305. Attachments: []string{"/file1.txt"},
  1306. }, &EventParams{
  1307. sender: username,
  1308. })
  1309. assert.Error(t, err)
  1310. fn := getFileContentFn(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1311. var b bytes.Buffer
  1312. _, err = fn(&b)
  1313. assert.Error(t, err)
  1314. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1315. Endpoint: "http://127.0.0.1:9999/",
  1316. Method: http.MethodPost,
  1317. Parts: []dataprovider.HTTPPart{
  1318. {
  1319. Name: "p1",
  1320. Filepath: "/filepath",
  1321. },
  1322. },
  1323. }, &EventParams{
  1324. sender: username,
  1325. })
  1326. assert.Error(t, err)
  1327. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1328. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1329. err = dataprovider.DeleteUser(username, "", "", "")
  1330. assert.NoError(t, err)
  1331. err = dataprovider.AddUser(&user, "", "", "")
  1332. assert.NoError(t, err)
  1333. err = executeRenameFsActionForUser([]dataprovider.KeyValue{
  1334. {
  1335. Key: "/p1",
  1336. Value: "/p1",
  1337. },
  1338. }, testReplacer, user)
  1339. if assert.Error(t, err) {
  1340. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1341. }
  1342. err = executeRuleAction(dataprovider.BaseEventAction{
  1343. Type: dataprovider.ActionTypeFilesystem,
  1344. Options: dataprovider.BaseEventActionOptions{
  1345. FsConfig: dataprovider.EventActionFilesystemConfig{
  1346. Type: dataprovider.FilesystemActionRename,
  1347. Renames: []dataprovider.KeyValue{
  1348. {
  1349. Key: "/p2",
  1350. Value: "/p2",
  1351. },
  1352. },
  1353. },
  1354. },
  1355. }, &EventParams{}, dataprovider.ConditionOptions{
  1356. Names: []dataprovider.ConditionPattern{
  1357. {
  1358. Pattern: username,
  1359. },
  1360. },
  1361. })
  1362. assert.Error(t, err)
  1363. if runtime.GOOS != osWindows {
  1364. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1365. err := os.MkdirAll(dirPath, os.ModePerm)
  1366. assert.NoError(t, err)
  1367. filePath := filepath.Join(dirPath, "f.dat")
  1368. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1369. assert.NoError(t, err)
  1370. err = os.Chmod(dirPath, 0001)
  1371. assert.NoError(t, err)
  1372. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1373. assert.Error(t, err)
  1374. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1375. assert.Error(t, err)
  1376. err = os.Chmod(dirPath, 0555)
  1377. assert.NoError(t, err)
  1378. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1379. if assert.Error(t, err) {
  1380. assert.Contains(t, err.Error(), "unable to remove file")
  1381. }
  1382. err = executeRuleAction(dataprovider.BaseEventAction{
  1383. Type: dataprovider.ActionTypeFilesystem,
  1384. Options: dataprovider.BaseEventActionOptions{
  1385. FsConfig: dataprovider.EventActionFilesystemConfig{
  1386. Type: dataprovider.FilesystemActionDelete,
  1387. Deletes: []string{"/adir/sub/f.dat"},
  1388. },
  1389. },
  1390. }, &EventParams{}, dataprovider.ConditionOptions{
  1391. Names: []dataprovider.ConditionPattern{
  1392. {
  1393. Pattern: username,
  1394. },
  1395. },
  1396. })
  1397. assert.Error(t, err)
  1398. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1399. if assert.Error(t, err) {
  1400. assert.Contains(t, err.Error(), "unable to create dir")
  1401. }
  1402. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1403. if assert.Error(t, err) {
  1404. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1405. }
  1406. err = executeRuleAction(dataprovider.BaseEventAction{
  1407. Type: dataprovider.ActionTypeFilesystem,
  1408. Options: dataprovider.BaseEventActionOptions{
  1409. FsConfig: dataprovider.EventActionFilesystemConfig{
  1410. Type: dataprovider.FilesystemActionMkdirs,
  1411. MkDirs: []string{"/adir/sub/sub1"},
  1412. },
  1413. },
  1414. }, &EventParams{}, dataprovider.ConditionOptions{
  1415. Names: []dataprovider.ConditionPattern{
  1416. {
  1417. Pattern: username,
  1418. },
  1419. },
  1420. })
  1421. assert.Error(t, err)
  1422. err = os.Chmod(dirPath, os.ModePerm)
  1423. assert.NoError(t, err)
  1424. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1425. wr := &zipWriterWrapper{
  1426. Name: "test.zip",
  1427. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1428. Entries: map[string]bool{},
  1429. }
  1430. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub")
  1431. assert.Error(t, err)
  1432. assert.Contains(t, getErrorString(err), "is outside base dir")
  1433. }
  1434. err = dataprovider.DeleteUser(username, "", "", "")
  1435. assert.NoError(t, err)
  1436. err = os.RemoveAll(user.GetHomeDir())
  1437. assert.NoError(t, err)
  1438. }
  1439. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1440. oldProviderConf := dataprovider.GetProviderConfig()
  1441. providerConf := dataprovider.GetProviderConfig()
  1442. providerConf.TrackQuota = 0
  1443. err := dataprovider.Close()
  1444. assert.NoError(t, err)
  1445. err = dataprovider.Initialize(providerConf, configDir, true)
  1446. assert.NoError(t, err)
  1447. username := "u1"
  1448. user := dataprovider.User{
  1449. BaseUser: sdk.BaseUser{
  1450. Username: username,
  1451. HomeDir: filepath.Join(os.TempDir(), username),
  1452. Status: 1,
  1453. Permissions: map[string][]string{
  1454. "/": {dataprovider.PermAny},
  1455. },
  1456. },
  1457. FsConfig: vfs.Filesystem{
  1458. Provider: sdk.LocalFilesystemProvider,
  1459. },
  1460. }
  1461. err = dataprovider.AddUser(&user, "", "", "")
  1462. assert.NoError(t, err)
  1463. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1464. assert.NoError(t, err)
  1465. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1466. &EventParams{}, dataprovider.ConditionOptions{
  1467. Names: []dataprovider.ConditionPattern{
  1468. {
  1469. Pattern: username,
  1470. },
  1471. },
  1472. })
  1473. assert.Error(t, err)
  1474. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1475. &EventParams{}, dataprovider.ConditionOptions{
  1476. Names: []dataprovider.ConditionPattern{
  1477. {
  1478. Pattern: username,
  1479. },
  1480. },
  1481. })
  1482. assert.Error(t, err)
  1483. err = os.RemoveAll(user.GetHomeDir())
  1484. assert.NoError(t, err)
  1485. err = dataprovider.DeleteUser(username, "", "", "")
  1486. assert.NoError(t, err)
  1487. foldername := "f1"
  1488. folder := vfs.BaseVirtualFolder{
  1489. Name: foldername,
  1490. MappedPath: filepath.Join(os.TempDir(), foldername),
  1491. }
  1492. err = dataprovider.AddFolder(&folder, "", "", "")
  1493. assert.NoError(t, err)
  1494. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1495. assert.NoError(t, err)
  1496. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1497. &EventParams{}, dataprovider.ConditionOptions{
  1498. Names: []dataprovider.ConditionPattern{
  1499. {
  1500. Pattern: foldername,
  1501. },
  1502. },
  1503. })
  1504. assert.Error(t, err)
  1505. err = os.RemoveAll(folder.MappedPath)
  1506. assert.NoError(t, err)
  1507. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1508. assert.NoError(t, err)
  1509. err = dataprovider.Close()
  1510. assert.NoError(t, err)
  1511. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1512. assert.NoError(t, err)
  1513. }
  1514. func TestScheduledActions(t *testing.T) {
  1515. startEventScheduler()
  1516. backupsPath := filepath.Join(os.TempDir(), "backups")
  1517. err := os.RemoveAll(backupsPath)
  1518. assert.NoError(t, err)
  1519. action := &dataprovider.BaseEventAction{
  1520. Name: "action",
  1521. Type: dataprovider.ActionTypeBackup,
  1522. }
  1523. err = dataprovider.AddEventAction(action, "", "", "")
  1524. assert.NoError(t, err)
  1525. rule := &dataprovider.EventRule{
  1526. Name: "rule",
  1527. Status: 1,
  1528. Trigger: dataprovider.EventTriggerSchedule,
  1529. Conditions: dataprovider.EventConditions{
  1530. Schedules: []dataprovider.Schedule{
  1531. {
  1532. Hours: "11",
  1533. DayOfWeek: "*",
  1534. DayOfMonth: "*",
  1535. Month: "*",
  1536. },
  1537. },
  1538. },
  1539. Actions: []dataprovider.EventAction{
  1540. {
  1541. BaseEventAction: dataprovider.BaseEventAction{
  1542. Name: action.Name,
  1543. },
  1544. Order: 1,
  1545. },
  1546. },
  1547. }
  1548. job := eventCronJob{
  1549. ruleName: rule.Name,
  1550. }
  1551. job.Run() // rule not found
  1552. assert.NoDirExists(t, backupsPath)
  1553. err = dataprovider.AddEventRule(rule, "", "", "")
  1554. assert.NoError(t, err)
  1555. job.Run()
  1556. assert.DirExists(t, backupsPath)
  1557. action.Type = dataprovider.ActionTypeEmail
  1558. action.Options = dataprovider.BaseEventActionOptions{
  1559. EmailConfig: dataprovider.EventActionEmailConfig{
  1560. Recipients: []string{"[email protected]"},
  1561. Subject: "test with attachments",
  1562. Body: "body",
  1563. Attachments: []string{"/file1.txt"},
  1564. },
  1565. }
  1566. err = dataprovider.UpdateEventAction(action, "", "", "")
  1567. assert.NoError(t, err)
  1568. job.Run() // action is not compatible with a scheduled rule
  1569. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1570. assert.NoError(t, err)
  1571. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  1572. assert.NoError(t, err)
  1573. err = os.RemoveAll(backupsPath)
  1574. assert.NoError(t, err)
  1575. stopEventScheduler()
  1576. }
  1577. func TestEventParamsCopy(t *testing.T) {
  1578. params := EventParams{
  1579. Name: "name",
  1580. Event: "event",
  1581. Status: 1,
  1582. errors: []string{"error1"},
  1583. retentionChecks: []executedRetentionCheck{},
  1584. }
  1585. paramsCopy := params.getACopy()
  1586. assert.Equal(t, params, *paramsCopy)
  1587. params.Name = "name mod"
  1588. paramsCopy.Event = "event mod"
  1589. paramsCopy.Status = 2
  1590. params.errors = append(params.errors, "error2")
  1591. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1592. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1593. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1594. assert.Equal(t, "name mod", params.Name)
  1595. assert.Equal(t, "name", paramsCopy.Name)
  1596. assert.Equal(t, "event", params.Event)
  1597. assert.Equal(t, "event mod", paramsCopy.Event)
  1598. assert.Equal(t, 1, params.Status)
  1599. assert.Equal(t, 2, paramsCopy.Status)
  1600. params = EventParams{
  1601. retentionChecks: []executedRetentionCheck{
  1602. {
  1603. Username: "u",
  1604. ActionName: "a",
  1605. Results: []folderRetentionCheckResult{
  1606. {
  1607. Path: "p",
  1608. Retention: 1,
  1609. },
  1610. },
  1611. },
  1612. },
  1613. }
  1614. paramsCopy = params.getACopy()
  1615. require.Len(t, paramsCopy.retentionChecks, 1)
  1616. paramsCopy.retentionChecks[0].Username = "u_copy"
  1617. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1618. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1619. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1620. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1621. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1622. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1623. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  1624. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  1625. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  1626. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  1627. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  1628. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  1629. }
  1630. func TestEventParamsStatusFromError(t *testing.T) {
  1631. params := EventParams{Status: 1}
  1632. params.AddError(os.ErrNotExist)
  1633. assert.Equal(t, 1, params.Status)
  1634. params = EventParams{Status: 1, updateStatusFromError: true}
  1635. params.AddError(os.ErrNotExist)
  1636. assert.Equal(t, 2, params.Status)
  1637. }
  1638. type testWriter struct {
  1639. errTest error
  1640. sentinel string
  1641. }
  1642. func (w *testWriter) Write(p []byte) (int, error) {
  1643. if w.errTest != nil {
  1644. return 0, w.errTest
  1645. }
  1646. if w.sentinel == string(p) {
  1647. return 0, io.ErrUnexpectedEOF
  1648. }
  1649. return len(p), nil
  1650. }
  1651. func TestWriteHTTPPartsError(t *testing.T) {
  1652. m := multipart.NewWriter(&testWriter{
  1653. errTest: io.ErrShortWrite,
  1654. })
  1655. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{})
  1656. assert.ErrorIs(t, err, io.ErrShortWrite)
  1657. body := "test body"
  1658. m = multipart.NewWriter(&testWriter{sentinel: body})
  1659. err = writeHTTPPart(m, dataprovider.HTTPPart{
  1660. Body: body,
  1661. }, nil, nil, nil, &EventParams{})
  1662. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  1663. }
  1664. func TestReplacePathsPlaceholders(t *testing.T) {
  1665. replacer := strings.NewReplacer("{{VirtualPath}}", "/path1")
  1666. paths := []string{"{{VirtualPath}}", "/path1"}
  1667. paths = replacePathsPlaceholders(paths, replacer)
  1668. assert.Equal(t, []string{"/path1"}, paths)
  1669. paths = []string{"{{VirtualPath}}", "/path2"}
  1670. paths = replacePathsPlaceholders(paths, replacer)
  1671. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  1672. }
  1673. func TestEstimateZipSizeErrors(t *testing.T) {
  1674. u := dataprovider.User{
  1675. BaseUser: sdk.BaseUser{
  1676. Username: "u",
  1677. HomeDir: filepath.Join(os.TempDir(), "u"),
  1678. Status: 1,
  1679. Permissions: map[string][]string{
  1680. "/": {dataprovider.PermAny},
  1681. },
  1682. QuotaSize: 1000,
  1683. },
  1684. }
  1685. err := dataprovider.AddUser(&u, "", "", "")
  1686. assert.NoError(t, err)
  1687. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  1688. assert.NoError(t, err)
  1689. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  1690. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  1691. assert.True(t, conn.IsNotExistError(err))
  1692. if runtime.GOOS != osWindows {
  1693. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  1694. assert.NoError(t, err)
  1695. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  1696. assert.NoError(t, err)
  1697. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  1698. assert.NoError(t, err)
  1699. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  1700. assert.Error(t, err, "size %d", size)
  1701. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  1702. assert.NoError(t, err)
  1703. }
  1704. err = dataprovider.DeleteUser(u.Username, "", "", "")
  1705. assert.NoError(t, err)
  1706. err = os.RemoveAll(u.GetHomeDir())
  1707. assert.NoError(t, err)
  1708. }
  1709. func TestOnDemandRule(t *testing.T) {
  1710. a := &dataprovider.BaseEventAction{
  1711. Name: "a",
  1712. Type: dataprovider.ActionTypeBackup,
  1713. Options: dataprovider.BaseEventActionOptions{},
  1714. }
  1715. err := dataprovider.AddEventAction(a, "", "", "")
  1716. assert.NoError(t, err)
  1717. r := &dataprovider.EventRule{
  1718. Name: "test on demand rule",
  1719. Status: 1,
  1720. Trigger: dataprovider.EventTriggerOnDemand,
  1721. Actions: []dataprovider.EventAction{
  1722. {
  1723. BaseEventAction: dataprovider.BaseEventAction{
  1724. Name: a.Name,
  1725. },
  1726. },
  1727. },
  1728. }
  1729. err = dataprovider.AddEventRule(r, "", "", "")
  1730. assert.NoError(t, err)
  1731. err = RunOnDemandRule(r.Name)
  1732. assert.NoError(t, err)
  1733. r.Status = 0
  1734. err = dataprovider.UpdateEventRule(r, "", "", "")
  1735. assert.NoError(t, err)
  1736. err = RunOnDemandRule(r.Name)
  1737. assert.ErrorIs(t, err, util.ErrValidation)
  1738. assert.Contains(t, err.Error(), "is inactive")
  1739. r.Status = 1
  1740. r.Trigger = dataprovider.EventTriggerCertificate
  1741. err = dataprovider.UpdateEventRule(r, "", "", "")
  1742. assert.NoError(t, err)
  1743. err = RunOnDemandRule(r.Name)
  1744. assert.ErrorIs(t, err, util.ErrValidation)
  1745. assert.Contains(t, err.Error(), "is not defined as on-demand")
  1746. a1 := &dataprovider.BaseEventAction{
  1747. Name: "a1",
  1748. Type: dataprovider.ActionTypeEmail,
  1749. Options: dataprovider.BaseEventActionOptions{
  1750. EmailConfig: dataprovider.EventActionEmailConfig{
  1751. Recipients: []string{"[email protected]"},
  1752. Subject: "subject",
  1753. Body: "body",
  1754. Attachments: []string{"/{{VirtualPath}}"},
  1755. },
  1756. },
  1757. }
  1758. err = dataprovider.AddEventAction(a1, "", "", "")
  1759. assert.NoError(t, err)
  1760. r.Trigger = dataprovider.EventTriggerOnDemand
  1761. r.Actions = []dataprovider.EventAction{
  1762. {
  1763. BaseEventAction: dataprovider.BaseEventAction{
  1764. Name: a1.Name,
  1765. },
  1766. },
  1767. }
  1768. err = dataprovider.UpdateEventRule(r, "", "", "")
  1769. assert.NoError(t, err)
  1770. err = RunOnDemandRule(r.Name)
  1771. assert.ErrorIs(t, err, util.ErrValidation)
  1772. assert.Contains(t, err.Error(), "incosistent actions")
  1773. err = dataprovider.DeleteEventRule(r.Name, "", "", "")
  1774. assert.NoError(t, err)
  1775. err = dataprovider.DeleteEventAction(a.Name, "", "", "")
  1776. assert.NoError(t, err)
  1777. err = dataprovider.DeleteEventAction(a1.Name, "", "", "")
  1778. assert.NoError(t, err)
  1779. err = RunOnDemandRule(r.Name)
  1780. assert.ErrorIs(t, err, util.ErrNotFound)
  1781. }
  1782. func getErrorString(err error) string {
  1783. if err == nil {
  1784. return ""
  1785. }
  1786. return err.Error()
  1787. }
  1788. func TestHTTPEndpointWithPlaceholders(t *testing.T) {
  1789. c := dataprovider.EventActionHTTPConfig{
  1790. Endpoint: "http://127.0.0.1:8080/base/url/{{Name}}/{{VirtualPath}}/upload",
  1791. QueryParameters: []dataprovider.KeyValue{
  1792. {
  1793. Key: "u",
  1794. Value: "{{Name}}",
  1795. },
  1796. {
  1797. Key: "p",
  1798. Value: "{{VirtualPath}}",
  1799. },
  1800. },
  1801. }
  1802. name := "uname"
  1803. vPath := "/a dir/@ file.txt"
  1804. replacer := strings.NewReplacer("{{Name}}", name, "{{VirtualPath}}", vPath)
  1805. u, err := getHTTPRuleActionEndpoint(c, replacer)
  1806. assert.NoError(t, err)
  1807. expected := "http://127.0.0.1:8080/base/url/" + url.PathEscape(name) + "/" + url.PathEscape(vPath) +
  1808. "/upload?" + "p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  1809. assert.Equal(t, expected, u)
  1810. c.Endpoint = "http://127.0.0.1/upload"
  1811. u, err = getHTTPRuleActionEndpoint(c, replacer)
  1812. assert.NoError(t, err)
  1813. expected = c.Endpoint + "?p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  1814. assert.Equal(t, expected, u)
  1815. }