eventmanager_test.go 57 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "errors"
  19. "fmt"
  20. "io"
  21. "mime/multipart"
  22. "net/http"
  23. "net/url"
  24. "os"
  25. "path"
  26. "path/filepath"
  27. "runtime"
  28. "strings"
  29. "testing"
  30. "time"
  31. "github.com/klauspost/compress/zip"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. sdkkms "github.com/sftpgo/sdk/kms"
  35. "github.com/stretchr/testify/assert"
  36. "github.com/stretchr/testify/require"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/kms"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. func TestEventRuleMatch(t *testing.T) {
  43. role := "role1"
  44. conditions := dataprovider.EventConditions{
  45. ProviderEvents: []string{"add", "update"},
  46. Options: dataprovider.ConditionOptions{
  47. Names: []dataprovider.ConditionPattern{
  48. {
  49. Pattern: "user1",
  50. InverseMatch: true,
  51. },
  52. },
  53. RoleNames: []dataprovider.ConditionPattern{
  54. {
  55. Pattern: role,
  56. },
  57. },
  58. },
  59. }
  60. res := eventManager.checkProviderEventMatch(conditions, EventParams{
  61. Name: "user1",
  62. Role: role,
  63. Event: "add",
  64. })
  65. assert.False(t, res)
  66. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  67. Name: "user2",
  68. Role: role,
  69. Event: "update",
  70. })
  71. assert.True(t, res)
  72. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  73. Name: "user2",
  74. Role: role,
  75. Event: "delete",
  76. })
  77. assert.False(t, res)
  78. conditions.Options.ProviderObjects = []string{"api_key"}
  79. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  80. Name: "user2",
  81. Event: "update",
  82. Role: role,
  83. ObjectType: "share",
  84. })
  85. assert.False(t, res)
  86. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  87. Name: "user2",
  88. Event: "update",
  89. Role: role,
  90. ObjectType: "api_key",
  91. })
  92. assert.True(t, res)
  93. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  94. Name: "user2",
  95. Event: "update",
  96. Role: role + "1",
  97. ObjectType: "api_key",
  98. })
  99. assert.False(t, res)
  100. // now test fs events
  101. conditions = dataprovider.EventConditions{
  102. FsEvents: []string{operationUpload, operationDownload},
  103. Options: dataprovider.ConditionOptions{
  104. Names: []dataprovider.ConditionPattern{
  105. {
  106. Pattern: "user*",
  107. },
  108. {
  109. Pattern: "tester*",
  110. },
  111. },
  112. RoleNames: []dataprovider.ConditionPattern{
  113. {
  114. Pattern: role,
  115. InverseMatch: true,
  116. },
  117. },
  118. FsPaths: []dataprovider.ConditionPattern{
  119. {
  120. Pattern: "/**/*.txt",
  121. },
  122. },
  123. Protocols: []string{ProtocolSFTP},
  124. MinFileSize: 10,
  125. MaxFileSize: 30,
  126. },
  127. }
  128. params := EventParams{
  129. Name: "tester4",
  130. Event: operationDelete,
  131. VirtualPath: "/path.txt",
  132. Protocol: ProtocolSFTP,
  133. ObjectName: "path.txt",
  134. FileSize: 20,
  135. }
  136. res = eventManager.checkFsEventMatch(conditions, params)
  137. assert.False(t, res)
  138. params.Event = operationDownload
  139. res = eventManager.checkFsEventMatch(conditions, params)
  140. assert.True(t, res)
  141. params.Role = role
  142. res = eventManager.checkFsEventMatch(conditions, params)
  143. assert.False(t, res)
  144. params.Role = ""
  145. params.Name = "name"
  146. res = eventManager.checkFsEventMatch(conditions, params)
  147. assert.False(t, res)
  148. params.Name = "user5"
  149. res = eventManager.checkFsEventMatch(conditions, params)
  150. assert.True(t, res)
  151. params.VirtualPath = "/sub/f.jpg"
  152. params.ObjectName = path.Base(params.VirtualPath)
  153. res = eventManager.checkFsEventMatch(conditions, params)
  154. assert.False(t, res)
  155. params.VirtualPath = "/sub/f.txt"
  156. params.ObjectName = path.Base(params.VirtualPath)
  157. res = eventManager.checkFsEventMatch(conditions, params)
  158. assert.True(t, res)
  159. params.Protocol = ProtocolHTTP
  160. res = eventManager.checkFsEventMatch(conditions, params)
  161. assert.False(t, res)
  162. params.Protocol = ProtocolSFTP
  163. params.FileSize = 5
  164. res = eventManager.checkFsEventMatch(conditions, params)
  165. assert.False(t, res)
  166. params.FileSize = 50
  167. res = eventManager.checkFsEventMatch(conditions, params)
  168. assert.False(t, res)
  169. params.FileSize = 25
  170. res = eventManager.checkFsEventMatch(conditions, params)
  171. assert.True(t, res)
  172. // bad pattern
  173. conditions.Options.Names = []dataprovider.ConditionPattern{
  174. {
  175. Pattern: "[-]",
  176. },
  177. }
  178. res = eventManager.checkFsEventMatch(conditions, params)
  179. assert.False(t, res)
  180. // check fs events with group name filters
  181. conditions = dataprovider.EventConditions{
  182. FsEvents: []string{operationUpload, operationDownload},
  183. Options: dataprovider.ConditionOptions{
  184. GroupNames: []dataprovider.ConditionPattern{
  185. {
  186. Pattern: "group*",
  187. },
  188. {
  189. Pattern: "testgroup*",
  190. },
  191. },
  192. },
  193. }
  194. params = EventParams{
  195. Name: "user1",
  196. Event: operationUpload,
  197. }
  198. res = eventManager.checkFsEventMatch(conditions, params)
  199. assert.False(t, res)
  200. params.Groups = []sdk.GroupMapping{
  201. {
  202. Name: "g1",
  203. Type: sdk.GroupTypePrimary,
  204. },
  205. {
  206. Name: "g2",
  207. Type: sdk.GroupTypeSecondary,
  208. },
  209. }
  210. res = eventManager.checkFsEventMatch(conditions, params)
  211. assert.False(t, res)
  212. params.Groups = []sdk.GroupMapping{
  213. {
  214. Name: "testgroup2",
  215. Type: sdk.GroupTypePrimary,
  216. },
  217. {
  218. Name: "g2",
  219. Type: sdk.GroupTypeSecondary,
  220. },
  221. }
  222. res = eventManager.checkFsEventMatch(conditions, params)
  223. assert.True(t, res)
  224. // check user conditions
  225. user := dataprovider.User{}
  226. user.Username = "u1"
  227. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  228. assert.True(t, res)
  229. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  230. Names: []dataprovider.ConditionPattern{
  231. {
  232. Pattern: "user",
  233. },
  234. },
  235. })
  236. assert.False(t, res)
  237. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  238. RoleNames: []dataprovider.ConditionPattern{
  239. {
  240. Pattern: role,
  241. },
  242. },
  243. })
  244. assert.False(t, res)
  245. user.Role = role
  246. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  247. RoleNames: []dataprovider.ConditionPattern{
  248. {
  249. Pattern: role,
  250. },
  251. },
  252. })
  253. assert.True(t, res)
  254. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  255. GroupNames: []dataprovider.ConditionPattern{
  256. {
  257. Pattern: "group",
  258. },
  259. },
  260. RoleNames: []dataprovider.ConditionPattern{
  261. {
  262. Pattern: role,
  263. },
  264. },
  265. })
  266. assert.False(t, res)
  267. }
  268. func TestDoubleStarMatching(t *testing.T) {
  269. c := dataprovider.ConditionPattern{
  270. Pattern: "/mydir/**",
  271. }
  272. res := checkEventConditionPattern(c, "/mydir")
  273. assert.True(t, res)
  274. res = checkEventConditionPattern(c, "/mydirname")
  275. assert.False(t, res)
  276. res = checkEventConditionPattern(c, "/mydir/sub")
  277. assert.True(t, res)
  278. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  279. assert.True(t, res)
  280. c.Pattern = "/**/*"
  281. res = checkEventConditionPattern(c, "/mydir")
  282. assert.True(t, res)
  283. res = checkEventConditionPattern(c, "/mydirname")
  284. assert.True(t, res)
  285. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  286. assert.True(t, res)
  287. c.Pattern = "/mydir/**/*.txt"
  288. res = checkEventConditionPattern(c, "/mydir")
  289. assert.False(t, res)
  290. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  291. assert.False(t, res)
  292. res = checkEventConditionPattern(c, "/mydir/sub")
  293. assert.False(t, res)
  294. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  295. assert.False(t, res)
  296. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  297. assert.True(t, res)
  298. }
  299. func TestEventManager(t *testing.T) {
  300. startEventScheduler()
  301. action := &dataprovider.BaseEventAction{
  302. Name: "test_action",
  303. Type: dataprovider.ActionTypeHTTP,
  304. Options: dataprovider.BaseEventActionOptions{
  305. HTTPConfig: dataprovider.EventActionHTTPConfig{
  306. Endpoint: "http://localhost",
  307. Timeout: 20,
  308. Method: http.MethodGet,
  309. },
  310. },
  311. }
  312. err := dataprovider.AddEventAction(action, "", "", "")
  313. assert.NoError(t, err)
  314. rule := &dataprovider.EventRule{
  315. Name: "rule",
  316. Status: 1,
  317. Trigger: dataprovider.EventTriggerFsEvent,
  318. Conditions: dataprovider.EventConditions{
  319. FsEvents: []string{operationUpload},
  320. },
  321. Actions: []dataprovider.EventAction{
  322. {
  323. BaseEventAction: dataprovider.BaseEventAction{
  324. Name: action.Name,
  325. },
  326. Order: 1,
  327. },
  328. },
  329. }
  330. err = dataprovider.AddEventRule(rule, "", "", "")
  331. assert.NoError(t, err)
  332. eventManager.RLock()
  333. assert.Len(t, eventManager.FsEvents, 1)
  334. assert.Len(t, eventManager.ProviderEvents, 0)
  335. assert.Len(t, eventManager.Schedules, 0)
  336. assert.Len(t, eventManager.schedulesMapping, 0)
  337. eventManager.RUnlock()
  338. rule.Trigger = dataprovider.EventTriggerProviderEvent
  339. rule.Conditions = dataprovider.EventConditions{
  340. ProviderEvents: []string{"add"},
  341. }
  342. err = dataprovider.UpdateEventRule(rule, "", "", "")
  343. assert.NoError(t, err)
  344. eventManager.RLock()
  345. assert.Len(t, eventManager.FsEvents, 0)
  346. assert.Len(t, eventManager.ProviderEvents, 1)
  347. assert.Len(t, eventManager.Schedules, 0)
  348. assert.Len(t, eventManager.schedulesMapping, 0)
  349. eventManager.RUnlock()
  350. rule.Trigger = dataprovider.EventTriggerSchedule
  351. rule.Conditions = dataprovider.EventConditions{
  352. Schedules: []dataprovider.Schedule{
  353. {
  354. Hours: "0",
  355. DayOfWeek: "*",
  356. DayOfMonth: "*",
  357. Month: "*",
  358. },
  359. },
  360. }
  361. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  362. eventManager.addUpdateRuleInternal(*rule)
  363. eventManager.RLock()
  364. assert.Len(t, eventManager.FsEvents, 0)
  365. assert.Len(t, eventManager.ProviderEvents, 0)
  366. assert.Len(t, eventManager.Schedules, 0)
  367. assert.Len(t, eventManager.schedulesMapping, 0)
  368. eventManager.RUnlock()
  369. assert.Eventually(t, func() bool {
  370. _, err = dataprovider.EventRuleExists(rule.Name)
  371. ok := errors.Is(err, util.ErrNotFound)
  372. return ok
  373. }, 2*time.Second, 100*time.Millisecond)
  374. rule.DeletedAt = 0
  375. err = dataprovider.AddEventRule(rule, "", "", "")
  376. assert.NoError(t, err)
  377. eventManager.RLock()
  378. assert.Len(t, eventManager.FsEvents, 0)
  379. assert.Len(t, eventManager.ProviderEvents, 0)
  380. assert.Len(t, eventManager.Schedules, 1)
  381. assert.Len(t, eventManager.schedulesMapping, 1)
  382. eventManager.RUnlock()
  383. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  384. assert.NoError(t, err)
  385. eventManager.RLock()
  386. assert.Len(t, eventManager.FsEvents, 0)
  387. assert.Len(t, eventManager.ProviderEvents, 0)
  388. assert.Len(t, eventManager.Schedules, 0)
  389. assert.Len(t, eventManager.schedulesMapping, 0)
  390. eventManager.RUnlock()
  391. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  392. assert.NoError(t, err)
  393. stopEventScheduler()
  394. }
  395. func TestEventManagerErrors(t *testing.T) {
  396. startEventScheduler()
  397. providerConf := dataprovider.GetProviderConfig()
  398. err := dataprovider.Close()
  399. assert.NoError(t, err)
  400. params := EventParams{
  401. sender: "sender",
  402. }
  403. _, err = params.getUsers()
  404. assert.Error(t, err)
  405. _, err = params.getFolders()
  406. assert.Error(t, err)
  407. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  408. assert.Error(t, err)
  409. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  410. assert.Error(t, err)
  411. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  412. assert.Error(t, err)
  413. err = executeMetadataCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  414. assert.Error(t, err)
  415. err = executeUserExpirationCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  416. assert.Error(t, err)
  417. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  418. assert.Error(t, err)
  419. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  420. assert.Error(t, err)
  421. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  422. assert.Error(t, err)
  423. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  424. assert.Error(t, err)
  425. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  426. assert.Error(t, err)
  427. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  428. assert.Error(t, err)
  429. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  430. dataprovider.ConditionOptions{}, &EventParams{})
  431. assert.Error(t, err)
  432. groupName := "agroup"
  433. err = executeQuotaResetForUser(&dataprovider.User{
  434. Groups: []sdk.GroupMapping{
  435. {
  436. Name: groupName,
  437. Type: sdk.GroupTypePrimary,
  438. },
  439. },
  440. })
  441. assert.Error(t, err)
  442. err = executeMetadataCheckForUser(&dataprovider.User{
  443. Groups: []sdk.GroupMapping{
  444. {
  445. Name: groupName,
  446. Type: sdk.GroupTypePrimary,
  447. },
  448. },
  449. })
  450. assert.Error(t, err)
  451. err = executeDataRetentionCheckForUser(dataprovider.User{
  452. Groups: []sdk.GroupMapping{
  453. {
  454. Name: groupName,
  455. Type: sdk.GroupTypePrimary,
  456. },
  457. },
  458. }, nil, &EventParams{}, "")
  459. assert.Error(t, err)
  460. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  461. Groups: []sdk.GroupMapping{
  462. {
  463. Name: groupName,
  464. Type: sdk.GroupTypePrimary,
  465. },
  466. },
  467. })
  468. assert.Error(t, err)
  469. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  470. Groups: []sdk.GroupMapping{
  471. {
  472. Name: groupName,
  473. Type: sdk.GroupTypePrimary,
  474. },
  475. },
  476. })
  477. assert.Error(t, err)
  478. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  479. Groups: []sdk.GroupMapping{
  480. {
  481. Name: groupName,
  482. Type: sdk.GroupTypePrimary,
  483. },
  484. },
  485. })
  486. assert.Error(t, err)
  487. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  488. Groups: []sdk.GroupMapping{
  489. {
  490. Name: groupName,
  491. Type: sdk.GroupTypePrimary,
  492. },
  493. },
  494. })
  495. assert.Error(t, err)
  496. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  497. Groups: []sdk.GroupMapping{
  498. {
  499. Name: groupName,
  500. Type: sdk.GroupTypePrimary,
  501. },
  502. },
  503. })
  504. assert.Error(t, err)
  505. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  506. Groups: []sdk.GroupMapping{
  507. {
  508. Name: groupName,
  509. Type: sdk.GroupTypePrimary,
  510. },
  511. },
  512. })
  513. assert.Error(t, err)
  514. err = executePwdExpirationCheckForUser(&dataprovider.User{
  515. Groups: []sdk.GroupMapping{
  516. {
  517. Name: groupName,
  518. Type: sdk.GroupTypePrimary,
  519. },
  520. }}, dataprovider.EventActionPasswordExpiration{})
  521. assert.Error(t, err)
  522. _, _, err = getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  523. Method: http.MethodPost,
  524. Parts: []dataprovider.HTTPPart{
  525. {
  526. Name: "p1",
  527. },
  528. },
  529. }, nil, nil, dataprovider.User{
  530. BaseUser: sdk.BaseUser{
  531. Username: "u",
  532. },
  533. Groups: []sdk.GroupMapping{
  534. {
  535. Name: groupName,
  536. Type: sdk.GroupTypePrimary,
  537. },
  538. },
  539. }, &EventParams{})
  540. assert.Error(t, err)
  541. dataRetentionAction := dataprovider.BaseEventAction{
  542. Type: dataprovider.ActionTypeDataRetentionCheck,
  543. Options: dataprovider.BaseEventActionOptions{
  544. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  545. Folders: []dataprovider.FolderRetention{
  546. {
  547. Path: "/",
  548. Retention: 24,
  549. },
  550. },
  551. },
  552. },
  553. }
  554. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  555. Names: []dataprovider.ConditionPattern{
  556. {
  557. Pattern: "username1",
  558. },
  559. },
  560. })
  561. if assert.Error(t, err) {
  562. assert.Contains(t, err.Error(), "unable to get users")
  563. }
  564. eventManager.loadRules()
  565. eventManager.RLock()
  566. assert.Len(t, eventManager.FsEvents, 0)
  567. assert.Len(t, eventManager.ProviderEvents, 0)
  568. assert.Len(t, eventManager.Schedules, 0)
  569. eventManager.RUnlock()
  570. // rule with invalid trigger
  571. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  572. Name: "test rule",
  573. Status: 1,
  574. Trigger: -1,
  575. })
  576. eventManager.RLock()
  577. assert.Len(t, eventManager.FsEvents, 0)
  578. assert.Len(t, eventManager.ProviderEvents, 0)
  579. assert.Len(t, eventManager.Schedules, 0)
  580. eventManager.RUnlock()
  581. // rule with invalid cronspec
  582. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  583. Name: "test rule",
  584. Status: 1,
  585. Trigger: dataprovider.EventTriggerSchedule,
  586. Conditions: dataprovider.EventConditions{
  587. Schedules: []dataprovider.Schedule{
  588. {
  589. Hours: "1000",
  590. },
  591. },
  592. },
  593. })
  594. eventManager.RLock()
  595. assert.Len(t, eventManager.FsEvents, 0)
  596. assert.Len(t, eventManager.ProviderEvents, 0)
  597. assert.Len(t, eventManager.Schedules, 0)
  598. eventManager.RUnlock()
  599. err = dataprovider.Initialize(providerConf, configDir, true)
  600. assert.NoError(t, err)
  601. stopEventScheduler()
  602. }
  603. func TestEventRuleActions(t *testing.T) {
  604. actionName := "test rule action"
  605. action := dataprovider.BaseEventAction{
  606. Name: actionName,
  607. Type: dataprovider.ActionTypeBackup,
  608. }
  609. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  610. assert.NoError(t, err)
  611. action.Type = -1
  612. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  613. assert.Error(t, err)
  614. action = dataprovider.BaseEventAction{
  615. Name: actionName,
  616. Type: dataprovider.ActionTypeHTTP,
  617. Options: dataprovider.BaseEventActionOptions{
  618. HTTPConfig: dataprovider.EventActionHTTPConfig{
  619. Endpoint: "http://foo\x7f.com/", // invalid URL
  620. SkipTLSVerify: true,
  621. Body: "{{ObjectData}}",
  622. Method: http.MethodPost,
  623. QueryParameters: []dataprovider.KeyValue{
  624. {
  625. Key: "param",
  626. Value: "value",
  627. },
  628. },
  629. Timeout: 5,
  630. Headers: []dataprovider.KeyValue{
  631. {
  632. Key: "Content-Type",
  633. Value: "application/json",
  634. },
  635. },
  636. Username: "httpuser",
  637. },
  638. },
  639. }
  640. action.Options.SetEmptySecretsIfNil()
  641. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  642. if assert.Error(t, err) {
  643. assert.Contains(t, err.Error(), "invalid endpoint")
  644. }
  645. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  646. params := &EventParams{
  647. Name: "a",
  648. Object: &dataprovider.User{
  649. BaseUser: sdk.BaseUser{
  650. Username: "test user",
  651. },
  652. },
  653. }
  654. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  655. assert.NoError(t, err)
  656. action.Options.HTTPConfig.Method = http.MethodGet
  657. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  658. assert.NoError(t, err)
  659. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  660. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  661. if assert.Error(t, err) {
  662. assert.Contains(t, err.Error(), "unexpected status code: 404")
  663. }
  664. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  665. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  666. assert.Error(t, err)
  667. action.Options.HTTPConfig.QueryParameters = nil
  668. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  669. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  670. assert.Error(t, err)
  671. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  672. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  673. if assert.Error(t, err) {
  674. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  675. }
  676. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  677. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  678. action.Options.HTTPConfig.Body = ""
  679. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  680. {
  681. Name: "p1",
  682. Filepath: "path",
  683. },
  684. }
  685. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  686. assert.Contains(t, getErrorString(err), "error getting user")
  687. action.Options.HTTPConfig.Parts = nil
  688. action.Options.HTTPConfig.Body = "{{ObjectData}}"
  689. // test disk and transfer quota reset
  690. username1 := "user1"
  691. username2 := "user2"
  692. user1 := dataprovider.User{
  693. BaseUser: sdk.BaseUser{
  694. Username: username1,
  695. HomeDir: filepath.Join(os.TempDir(), username1),
  696. Status: 1,
  697. Permissions: map[string][]string{
  698. "/": {dataprovider.PermAny},
  699. },
  700. },
  701. }
  702. user2 := dataprovider.User{
  703. BaseUser: sdk.BaseUser{
  704. Username: username2,
  705. HomeDir: filepath.Join(os.TempDir(), username2),
  706. Status: 1,
  707. Permissions: map[string][]string{
  708. "/": {dataprovider.PermAny},
  709. },
  710. },
  711. }
  712. user2.Filters.PasswordExpiration = 10
  713. err = dataprovider.AddUser(&user1, "", "", "")
  714. assert.NoError(t, err)
  715. err = dataprovider.AddUser(&user2, "", "", "")
  716. assert.NoError(t, err)
  717. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  718. Threshold: 20,
  719. }, dataprovider.ConditionOptions{
  720. Names: []dataprovider.ConditionPattern{
  721. {
  722. Pattern: user2.Username,
  723. },
  724. },
  725. }, &EventParams{})
  726. // smtp not configured
  727. assert.Error(t, err)
  728. action = dataprovider.BaseEventAction{
  729. Type: dataprovider.ActionTypeUserQuotaReset,
  730. }
  731. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  732. Names: []dataprovider.ConditionPattern{
  733. {
  734. Pattern: username1,
  735. },
  736. },
  737. })
  738. assert.Error(t, err) // no home dir
  739. // create the home dir
  740. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  741. assert.NoError(t, err)
  742. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  743. assert.NoError(t, err)
  744. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  745. Names: []dataprovider.ConditionPattern{
  746. {
  747. Pattern: username1,
  748. },
  749. },
  750. })
  751. assert.NoError(t, err)
  752. userGet, err := dataprovider.UserExists(username1, "")
  753. assert.NoError(t, err)
  754. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  755. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  756. // simulate another quota scan in progress
  757. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  758. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  759. Names: []dataprovider.ConditionPattern{
  760. {
  761. Pattern: username1,
  762. },
  763. },
  764. })
  765. assert.Error(t, err)
  766. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  767. // non matching pattern
  768. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  769. Names: []dataprovider.ConditionPattern{
  770. {
  771. Pattern: "don't match",
  772. },
  773. },
  774. })
  775. assert.Error(t, err)
  776. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  777. action = dataprovider.BaseEventAction{
  778. Type: dataprovider.ActionTypeMetadataCheck,
  779. }
  780. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  781. Names: []dataprovider.ConditionPattern{
  782. {
  783. Pattern: "don't match",
  784. },
  785. },
  786. })
  787. assert.Error(t, err)
  788. assert.Contains(t, getErrorString(err), "no metadata check executed")
  789. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  790. Names: []dataprovider.ConditionPattern{
  791. {
  792. Pattern: username1,
  793. },
  794. },
  795. })
  796. assert.NoError(t, err)
  797. // simulate another metadata check in progress
  798. assert.True(t, ActiveMetadataChecks.Add(username1, ""))
  799. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  800. Names: []dataprovider.ConditionPattern{
  801. {
  802. Pattern: username1,
  803. },
  804. },
  805. })
  806. assert.Error(t, err)
  807. assert.True(t, ActiveMetadataChecks.Remove(username1))
  808. action = dataprovider.BaseEventAction{
  809. Type: dataprovider.ActionTypeUserExpirationCheck,
  810. }
  811. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  812. Names: []dataprovider.ConditionPattern{
  813. {
  814. Pattern: "don't match",
  815. },
  816. },
  817. })
  818. assert.Error(t, err)
  819. assert.Contains(t, getErrorString(err), "no user expiration check executed")
  820. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  821. Names: []dataprovider.ConditionPattern{
  822. {
  823. Pattern: username1,
  824. },
  825. },
  826. })
  827. assert.NoError(t, err)
  828. dataRetentionAction := dataprovider.BaseEventAction{
  829. Type: dataprovider.ActionTypeDataRetentionCheck,
  830. Options: dataprovider.BaseEventActionOptions{
  831. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  832. Folders: []dataprovider.FolderRetention{
  833. {
  834. Path: "",
  835. Retention: 24,
  836. },
  837. },
  838. },
  839. },
  840. }
  841. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  842. Names: []dataprovider.ConditionPattern{
  843. {
  844. Pattern: username1,
  845. },
  846. },
  847. })
  848. assert.Error(t, err) // invalid config, no folder path specified
  849. retentionDir := "testretention"
  850. dataRetentionAction = dataprovider.BaseEventAction{
  851. Type: dataprovider.ActionTypeDataRetentionCheck,
  852. Options: dataprovider.BaseEventActionOptions{
  853. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  854. Folders: []dataprovider.FolderRetention{
  855. {
  856. Path: path.Join("/", retentionDir),
  857. Retention: 24,
  858. DeleteEmptyDirs: true,
  859. },
  860. },
  861. },
  862. },
  863. }
  864. // create some test files
  865. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  866. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  867. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  868. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  869. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  870. assert.NoError(t, err)
  871. for _, f := range []string{file1, file2, file3, file4} {
  872. err = os.WriteFile(f, []byte(""), 0666)
  873. assert.NoError(t, err)
  874. }
  875. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  876. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  877. assert.NoError(t, err)
  878. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  879. assert.NoError(t, err)
  880. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  881. assert.NoError(t, err)
  882. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  883. Names: []dataprovider.ConditionPattern{
  884. {
  885. Pattern: username1,
  886. },
  887. },
  888. })
  889. assert.NoError(t, err)
  890. assert.FileExists(t, file1)
  891. assert.NoFileExists(t, file2)
  892. assert.FileExists(t, file3)
  893. assert.NoDirExists(t, filepath.Dir(file4))
  894. // simulate another check in progress
  895. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  896. assert.NotNil(t, c)
  897. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  898. Names: []dataprovider.ConditionPattern{
  899. {
  900. Pattern: username1,
  901. },
  902. },
  903. })
  904. assert.Error(t, err)
  905. RetentionChecks.remove(user1.Username)
  906. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  907. Names: []dataprovider.ConditionPattern{
  908. {
  909. Pattern: "no match",
  910. },
  911. },
  912. })
  913. assert.Error(t, err)
  914. assert.Contains(t, getErrorString(err), "no retention check executed")
  915. // test file exists action
  916. action = dataprovider.BaseEventAction{
  917. Type: dataprovider.ActionTypeFilesystem,
  918. Options: dataprovider.BaseEventActionOptions{
  919. FsConfig: dataprovider.EventActionFilesystemConfig{
  920. Type: dataprovider.FilesystemActionExist,
  921. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  922. },
  923. },
  924. }
  925. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  926. Names: []dataprovider.ConditionPattern{
  927. {
  928. Pattern: "no match",
  929. },
  930. },
  931. })
  932. assert.Error(t, err)
  933. assert.Contains(t, getErrorString(err), "no existence check executed")
  934. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  935. Names: []dataprovider.ConditionPattern{
  936. {
  937. Pattern: username1,
  938. },
  939. },
  940. })
  941. assert.NoError(t, err)
  942. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  943. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  944. Names: []dataprovider.ConditionPattern{
  945. {
  946. Pattern: username1,
  947. },
  948. },
  949. })
  950. assert.Error(t, err)
  951. err = os.RemoveAll(user1.GetHomeDir())
  952. assert.NoError(t, err)
  953. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  954. assert.NoError(t, err)
  955. action.Type = dataprovider.ActionTypeTransferQuotaReset
  956. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  957. Names: []dataprovider.ConditionPattern{
  958. {
  959. Pattern: username1,
  960. },
  961. },
  962. })
  963. assert.NoError(t, err)
  964. userGet, err = dataprovider.UserExists(username1, "")
  965. assert.NoError(t, err)
  966. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  967. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  968. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  969. Names: []dataprovider.ConditionPattern{
  970. {
  971. Pattern: "no match",
  972. },
  973. },
  974. })
  975. assert.Error(t, err)
  976. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  977. action.Type = dataprovider.ActionTypeFilesystem
  978. action.Options = dataprovider.BaseEventActionOptions{
  979. FsConfig: dataprovider.EventActionFilesystemConfig{
  980. Type: dataprovider.FilesystemActionRename,
  981. Renames: []dataprovider.KeyValue{
  982. {
  983. Key: "/source",
  984. Value: "/target",
  985. },
  986. },
  987. },
  988. }
  989. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  990. Names: []dataprovider.ConditionPattern{
  991. {
  992. Pattern: "no match",
  993. },
  994. },
  995. })
  996. assert.Error(t, err)
  997. assert.Contains(t, getErrorString(err), "no rename executed")
  998. action.Options = dataprovider.BaseEventActionOptions{
  999. FsConfig: dataprovider.EventActionFilesystemConfig{
  1000. Type: dataprovider.FilesystemActionDelete,
  1001. Deletes: []string{"/dir1"},
  1002. },
  1003. }
  1004. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1005. Names: []dataprovider.ConditionPattern{
  1006. {
  1007. Pattern: "no match",
  1008. },
  1009. },
  1010. })
  1011. assert.Error(t, err)
  1012. assert.Contains(t, getErrorString(err), "no delete executed")
  1013. action.Options = dataprovider.BaseEventActionOptions{
  1014. FsConfig: dataprovider.EventActionFilesystemConfig{
  1015. Type: dataprovider.FilesystemActionMkdirs,
  1016. Deletes: []string{"/dir1"},
  1017. },
  1018. }
  1019. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1020. Names: []dataprovider.ConditionPattern{
  1021. {
  1022. Pattern: "no match",
  1023. },
  1024. },
  1025. })
  1026. assert.Error(t, err)
  1027. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1028. action.Options = dataprovider.BaseEventActionOptions{
  1029. FsConfig: dataprovider.EventActionFilesystemConfig{
  1030. Type: dataprovider.FilesystemActionCompress,
  1031. Compress: dataprovider.EventActionFsCompress{
  1032. Name: "test.zip",
  1033. Paths: []string{"/{{VirtualPath}}"},
  1034. },
  1035. },
  1036. }
  1037. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1038. Names: []dataprovider.ConditionPattern{
  1039. {
  1040. Pattern: "no match",
  1041. },
  1042. },
  1043. })
  1044. assert.Error(t, err)
  1045. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1046. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1047. GroupNames: []dataprovider.ConditionPattern{
  1048. {
  1049. Pattern: "no match",
  1050. },
  1051. },
  1052. })
  1053. assert.Error(t, err)
  1054. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1055. err = dataprovider.DeleteUser(username1, "", "", "")
  1056. assert.NoError(t, err)
  1057. err = dataprovider.DeleteUser(username2, "", "", "")
  1058. assert.NoError(t, err)
  1059. // test folder quota reset
  1060. foldername1 := "f1"
  1061. foldername2 := "f2"
  1062. folder1 := vfs.BaseVirtualFolder{
  1063. Name: foldername1,
  1064. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1065. }
  1066. folder2 := vfs.BaseVirtualFolder{
  1067. Name: foldername2,
  1068. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1069. }
  1070. err = dataprovider.AddFolder(&folder1, "", "", "")
  1071. assert.NoError(t, err)
  1072. err = dataprovider.AddFolder(&folder2, "", "", "")
  1073. assert.NoError(t, err)
  1074. action = dataprovider.BaseEventAction{
  1075. Type: dataprovider.ActionTypeFolderQuotaReset,
  1076. }
  1077. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1078. Names: []dataprovider.ConditionPattern{
  1079. {
  1080. Pattern: foldername1,
  1081. },
  1082. },
  1083. })
  1084. assert.Error(t, err) // no home dir
  1085. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1086. assert.NoError(t, err)
  1087. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1088. assert.NoError(t, err)
  1089. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1090. Names: []dataprovider.ConditionPattern{
  1091. {
  1092. Pattern: foldername1,
  1093. },
  1094. },
  1095. })
  1096. assert.NoError(t, err)
  1097. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1098. assert.NoError(t, err)
  1099. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1100. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1101. // simulate another quota scan in progress
  1102. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1103. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1104. Names: []dataprovider.ConditionPattern{
  1105. {
  1106. Pattern: foldername1,
  1107. },
  1108. },
  1109. })
  1110. assert.Error(t, err)
  1111. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1112. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1113. Names: []dataprovider.ConditionPattern{
  1114. {
  1115. Pattern: "no folder match",
  1116. },
  1117. },
  1118. })
  1119. if assert.Error(t, err) {
  1120. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1121. }
  1122. body, _, err := getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  1123. Method: http.MethodPost,
  1124. }, nil, nil, dataprovider.User{}, &EventParams{})
  1125. assert.NoError(t, err)
  1126. assert.Nil(t, body)
  1127. err = os.RemoveAll(folder1.MappedPath)
  1128. assert.NoError(t, err)
  1129. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1130. assert.NoError(t, err)
  1131. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1132. assert.NoError(t, err)
  1133. }
  1134. func TestUserExpirationCheck(t *testing.T) {
  1135. username := "test_user_expiration_check"
  1136. user := dataprovider.User{
  1137. BaseUser: sdk.BaseUser{
  1138. Username: username,
  1139. Permissions: map[string][]string{
  1140. "/": {dataprovider.PermAny},
  1141. },
  1142. HomeDir: filepath.Join(os.TempDir(), username),
  1143. ExpirationDate: util.GetTimeAsMsSinceEpoch(time.Now().Add(-24 * time.Hour)),
  1144. },
  1145. }
  1146. user.Filters.PasswordExpiration = 5
  1147. err := dataprovider.AddUser(&user, "", "", "")
  1148. assert.NoError(t, err)
  1149. conditions := dataprovider.ConditionOptions{
  1150. Names: []dataprovider.ConditionPattern{
  1151. {
  1152. Pattern: username,
  1153. },
  1154. },
  1155. }
  1156. err = executeUserExpirationCheckRuleAction(conditions, &EventParams{})
  1157. if assert.Error(t, err) {
  1158. assert.Contains(t, err.Error(), "expired users")
  1159. }
  1160. // the check will be skipped, the user is expired
  1161. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{Threshold: 10}, conditions, &EventParams{})
  1162. assert.NoError(t, err)
  1163. err = dataprovider.DeleteUser(username, "", "", "")
  1164. assert.NoError(t, err)
  1165. err = os.RemoveAll(user.GetHomeDir())
  1166. assert.NoError(t, err)
  1167. }
  1168. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1169. username := "test_user_action_group_matching"
  1170. user := dataprovider.User{
  1171. BaseUser: sdk.BaseUser{
  1172. Username: username,
  1173. Permissions: map[string][]string{
  1174. "/": {dataprovider.PermAny},
  1175. },
  1176. HomeDir: filepath.Join(os.TempDir(), username),
  1177. },
  1178. }
  1179. err := dataprovider.AddUser(&user, "", "", "")
  1180. assert.NoError(t, err)
  1181. conditions := dataprovider.ConditionOptions{
  1182. GroupNames: []dataprovider.ConditionPattern{
  1183. {
  1184. Pattern: "agroup",
  1185. },
  1186. },
  1187. }
  1188. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1189. if assert.Error(t, err) {
  1190. assert.Contains(t, err.Error(), "no delete executed")
  1191. }
  1192. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1193. if assert.Error(t, err) {
  1194. assert.Contains(t, err.Error(), "no mkdir executed")
  1195. }
  1196. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1197. if assert.Error(t, err) {
  1198. assert.Contains(t, err.Error(), "no rename executed")
  1199. }
  1200. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1201. if assert.Error(t, err) {
  1202. assert.Contains(t, err.Error(), "no existence check executed")
  1203. }
  1204. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1205. if assert.Error(t, err) {
  1206. assert.Contains(t, err.Error(), "no copy executed")
  1207. }
  1208. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1209. if assert.Error(t, err) {
  1210. assert.Contains(t, err.Error(), "no user quota reset executed")
  1211. }
  1212. err = executeMetadataCheckRuleAction(conditions, &EventParams{})
  1213. if assert.Error(t, err) {
  1214. assert.Contains(t, err.Error(), "no metadata check executed")
  1215. }
  1216. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1217. if assert.Error(t, err) {
  1218. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1219. }
  1220. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1221. if assert.Error(t, err) {
  1222. assert.Contains(t, err.Error(), "no retention check executed")
  1223. }
  1224. err = dataprovider.DeleteUser(username, "", "", "")
  1225. assert.NoError(t, err)
  1226. err = os.RemoveAll(user.GetHomeDir())
  1227. assert.NoError(t, err)
  1228. }
  1229. func TestGetFileContent(t *testing.T) {
  1230. username := "test_user_get_file_content"
  1231. user := dataprovider.User{
  1232. BaseUser: sdk.BaseUser{
  1233. Username: username,
  1234. Permissions: map[string][]string{
  1235. "/": {dataprovider.PermAny},
  1236. },
  1237. HomeDir: filepath.Join(os.TempDir(), username),
  1238. },
  1239. }
  1240. err := dataprovider.AddUser(&user, "", "", "")
  1241. assert.NoError(t, err)
  1242. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1243. assert.NoError(t, err)
  1244. fileContent := []byte("test file content")
  1245. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1246. assert.NoError(t, err)
  1247. conn := NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1248. replacer := strings.NewReplacer("old", "new")
  1249. files, err := getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1250. assert.NoError(t, err)
  1251. if assert.Len(t, files, 1) {
  1252. var b bytes.Buffer
  1253. _, err = files[0].Writer(&b)
  1254. assert.NoError(t, err)
  1255. assert.Equal(t, fileContent, b.Bytes())
  1256. }
  1257. // missing file
  1258. _, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1259. assert.Error(t, err)
  1260. // directory
  1261. _, err = getMailAttachments(conn, []string{"/"}, replacer)
  1262. assert.Error(t, err)
  1263. // files too large
  1264. content := make([]byte, maxAttachmentsSize/2+1)
  1265. _, err = rand.Read(content)
  1266. assert.NoError(t, err)
  1267. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1268. assert.NoError(t, err)
  1269. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1270. assert.NoError(t, err)
  1271. files, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1272. assert.NoError(t, err)
  1273. if assert.Len(t, files, 1) {
  1274. var b bytes.Buffer
  1275. _, err = files[0].Writer(&b)
  1276. assert.NoError(t, err)
  1277. assert.Equal(t, content, b.Bytes())
  1278. }
  1279. _, err = getMailAttachments(conn, []string{"/file1.txt", "/file2.txt"}, replacer)
  1280. if assert.Error(t, err) {
  1281. assert.Contains(t, err.Error(), "size too large")
  1282. }
  1283. // change the filesystem provider
  1284. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1285. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1286. err = dataprovider.UpdateUser(&user, "", "", "")
  1287. assert.NoError(t, err)
  1288. conn = NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1289. // the file is not encrypted so reading the encryption header will fail
  1290. files, err = getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1291. assert.NoError(t, err)
  1292. if assert.Len(t, files, 1) {
  1293. var b bytes.Buffer
  1294. _, err = files[0].Writer(&b)
  1295. assert.Error(t, err)
  1296. }
  1297. err = dataprovider.DeleteUser(username, "", "", "")
  1298. assert.NoError(t, err)
  1299. err = os.RemoveAll(user.GetHomeDir())
  1300. assert.NoError(t, err)
  1301. }
  1302. func TestFilesystemActionErrors(t *testing.T) {
  1303. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1304. if assert.Error(t, err) {
  1305. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1306. }
  1307. username := "test_user_for_actions"
  1308. testReplacer := strings.NewReplacer("old", "new")
  1309. user := dataprovider.User{
  1310. BaseUser: sdk.BaseUser{
  1311. Username: username,
  1312. Permissions: map[string][]string{
  1313. "/": {dataprovider.PermAny},
  1314. },
  1315. HomeDir: filepath.Join(os.TempDir(), username),
  1316. },
  1317. FsConfig: vfs.Filesystem{
  1318. Provider: sdk.SFTPFilesystemProvider,
  1319. SFTPConfig: vfs.SFTPFsConfig{
  1320. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1321. Endpoint: "127.0.0.1:4022",
  1322. Username: username,
  1323. },
  1324. Password: kms.NewPlainSecret("pwd"),
  1325. },
  1326. },
  1327. }
  1328. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1329. Recipients: []string{"[email protected]"},
  1330. Subject: "subject",
  1331. Body: "body",
  1332. Attachments: []string{"/file.txt"},
  1333. }, &EventParams{
  1334. sender: username,
  1335. })
  1336. assert.Error(t, err)
  1337. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1338. err = executeDeleteFileFsAction(conn, "", nil)
  1339. assert.Error(t, err)
  1340. err = dataprovider.AddUser(&user, "", "", "")
  1341. assert.NoError(t, err)
  1342. // check root fs fails
  1343. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1344. assert.Error(t, err)
  1345. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1346. assert.Error(t, err)
  1347. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1348. assert.Error(t, err)
  1349. err = executeExistFsActionForUser(nil, testReplacer, user)
  1350. assert.Error(t, err)
  1351. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1352. assert.Error(t, err)
  1353. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1354. assert.Error(t, err)
  1355. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1356. assert.Error(t, err)
  1357. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1358. Recipients: []string{"[email protected]"},
  1359. Subject: "subject",
  1360. Body: "body",
  1361. Attachments: []string{"/file1.txt"},
  1362. }, &EventParams{
  1363. sender: username,
  1364. })
  1365. assert.Error(t, err)
  1366. fn := getFileContentFn(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1367. var b bytes.Buffer
  1368. _, err = fn(&b)
  1369. assert.Error(t, err)
  1370. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1371. Endpoint: "http://127.0.0.1:9999/",
  1372. Method: http.MethodPost,
  1373. Parts: []dataprovider.HTTPPart{
  1374. {
  1375. Name: "p1",
  1376. Filepath: "/filepath",
  1377. },
  1378. },
  1379. }, &EventParams{
  1380. sender: username,
  1381. })
  1382. assert.Error(t, err)
  1383. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1384. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1385. err = dataprovider.DeleteUser(username, "", "", "")
  1386. assert.NoError(t, err)
  1387. err = dataprovider.AddUser(&user, "", "", "")
  1388. assert.NoError(t, err)
  1389. err = executeRenameFsActionForUser([]dataprovider.KeyValue{
  1390. {
  1391. Key: "/p1",
  1392. Value: "/p1",
  1393. },
  1394. }, testReplacer, user)
  1395. if assert.Error(t, err) {
  1396. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1397. }
  1398. err = executeRuleAction(dataprovider.BaseEventAction{
  1399. Type: dataprovider.ActionTypeFilesystem,
  1400. Options: dataprovider.BaseEventActionOptions{
  1401. FsConfig: dataprovider.EventActionFilesystemConfig{
  1402. Type: dataprovider.FilesystemActionRename,
  1403. Renames: []dataprovider.KeyValue{
  1404. {
  1405. Key: "/p2",
  1406. Value: "/p2",
  1407. },
  1408. },
  1409. },
  1410. },
  1411. }, &EventParams{}, dataprovider.ConditionOptions{
  1412. Names: []dataprovider.ConditionPattern{
  1413. {
  1414. Pattern: username,
  1415. },
  1416. },
  1417. })
  1418. assert.Error(t, err)
  1419. if runtime.GOOS != osWindows {
  1420. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1421. err := os.MkdirAll(dirPath, os.ModePerm)
  1422. assert.NoError(t, err)
  1423. filePath := filepath.Join(dirPath, "f.dat")
  1424. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1425. assert.NoError(t, err)
  1426. err = os.Chmod(dirPath, 0001)
  1427. assert.NoError(t, err)
  1428. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1429. assert.Error(t, err)
  1430. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1431. assert.Error(t, err)
  1432. err = os.Chmod(dirPath, 0555)
  1433. assert.NoError(t, err)
  1434. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1435. if assert.Error(t, err) {
  1436. assert.Contains(t, err.Error(), "unable to remove file")
  1437. }
  1438. err = executeRuleAction(dataprovider.BaseEventAction{
  1439. Type: dataprovider.ActionTypeFilesystem,
  1440. Options: dataprovider.BaseEventActionOptions{
  1441. FsConfig: dataprovider.EventActionFilesystemConfig{
  1442. Type: dataprovider.FilesystemActionDelete,
  1443. Deletes: []string{"/adir/sub/f.dat"},
  1444. },
  1445. },
  1446. }, &EventParams{}, dataprovider.ConditionOptions{
  1447. Names: []dataprovider.ConditionPattern{
  1448. {
  1449. Pattern: username,
  1450. },
  1451. },
  1452. })
  1453. assert.Error(t, err)
  1454. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1455. if assert.Error(t, err) {
  1456. assert.Contains(t, err.Error(), "unable to create dir")
  1457. }
  1458. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1459. if assert.Error(t, err) {
  1460. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1461. }
  1462. err = executeRuleAction(dataprovider.BaseEventAction{
  1463. Type: dataprovider.ActionTypeFilesystem,
  1464. Options: dataprovider.BaseEventActionOptions{
  1465. FsConfig: dataprovider.EventActionFilesystemConfig{
  1466. Type: dataprovider.FilesystemActionMkdirs,
  1467. MkDirs: []string{"/adir/sub/sub1"},
  1468. },
  1469. },
  1470. }, &EventParams{}, dataprovider.ConditionOptions{
  1471. Names: []dataprovider.ConditionPattern{
  1472. {
  1473. Pattern: username,
  1474. },
  1475. },
  1476. })
  1477. assert.Error(t, err)
  1478. err = os.Chmod(dirPath, os.ModePerm)
  1479. assert.NoError(t, err)
  1480. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1481. wr := &zipWriterWrapper{
  1482. Name: "test.zip",
  1483. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1484. Entries: map[string]bool{},
  1485. }
  1486. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub")
  1487. assert.Error(t, err)
  1488. assert.Contains(t, getErrorString(err), "is outside base dir")
  1489. }
  1490. err = dataprovider.DeleteUser(username, "", "", "")
  1491. assert.NoError(t, err)
  1492. err = os.RemoveAll(user.GetHomeDir())
  1493. assert.NoError(t, err)
  1494. }
  1495. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1496. oldProviderConf := dataprovider.GetProviderConfig()
  1497. providerConf := dataprovider.GetProviderConfig()
  1498. providerConf.TrackQuota = 0
  1499. err := dataprovider.Close()
  1500. assert.NoError(t, err)
  1501. err = dataprovider.Initialize(providerConf, configDir, true)
  1502. assert.NoError(t, err)
  1503. username := "u1"
  1504. user := dataprovider.User{
  1505. BaseUser: sdk.BaseUser{
  1506. Username: username,
  1507. HomeDir: filepath.Join(os.TempDir(), username),
  1508. Status: 1,
  1509. Permissions: map[string][]string{
  1510. "/": {dataprovider.PermAny},
  1511. },
  1512. },
  1513. FsConfig: vfs.Filesystem{
  1514. Provider: sdk.LocalFilesystemProvider,
  1515. },
  1516. }
  1517. err = dataprovider.AddUser(&user, "", "", "")
  1518. assert.NoError(t, err)
  1519. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1520. assert.NoError(t, err)
  1521. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1522. &EventParams{}, dataprovider.ConditionOptions{
  1523. Names: []dataprovider.ConditionPattern{
  1524. {
  1525. Pattern: username,
  1526. },
  1527. },
  1528. })
  1529. assert.Error(t, err)
  1530. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1531. &EventParams{}, dataprovider.ConditionOptions{
  1532. Names: []dataprovider.ConditionPattern{
  1533. {
  1534. Pattern: username,
  1535. },
  1536. },
  1537. })
  1538. assert.Error(t, err)
  1539. err = os.RemoveAll(user.GetHomeDir())
  1540. assert.NoError(t, err)
  1541. err = dataprovider.DeleteUser(username, "", "", "")
  1542. assert.NoError(t, err)
  1543. foldername := "f1"
  1544. folder := vfs.BaseVirtualFolder{
  1545. Name: foldername,
  1546. MappedPath: filepath.Join(os.TempDir(), foldername),
  1547. }
  1548. err = dataprovider.AddFolder(&folder, "", "", "")
  1549. assert.NoError(t, err)
  1550. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1551. assert.NoError(t, err)
  1552. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1553. &EventParams{}, dataprovider.ConditionOptions{
  1554. Names: []dataprovider.ConditionPattern{
  1555. {
  1556. Pattern: foldername,
  1557. },
  1558. },
  1559. })
  1560. assert.Error(t, err)
  1561. err = os.RemoveAll(folder.MappedPath)
  1562. assert.NoError(t, err)
  1563. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1564. assert.NoError(t, err)
  1565. err = dataprovider.Close()
  1566. assert.NoError(t, err)
  1567. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1568. assert.NoError(t, err)
  1569. }
  1570. func TestScheduledActions(t *testing.T) {
  1571. startEventScheduler()
  1572. backupsPath := filepath.Join(os.TempDir(), "backups")
  1573. err := os.RemoveAll(backupsPath)
  1574. assert.NoError(t, err)
  1575. action := &dataprovider.BaseEventAction{
  1576. Name: "action",
  1577. Type: dataprovider.ActionTypeBackup,
  1578. }
  1579. err = dataprovider.AddEventAction(action, "", "", "")
  1580. assert.NoError(t, err)
  1581. rule := &dataprovider.EventRule{
  1582. Name: "rule",
  1583. Status: 1,
  1584. Trigger: dataprovider.EventTriggerSchedule,
  1585. Conditions: dataprovider.EventConditions{
  1586. Schedules: []dataprovider.Schedule{
  1587. {
  1588. Hours: "11",
  1589. DayOfWeek: "*",
  1590. DayOfMonth: "*",
  1591. Month: "*",
  1592. },
  1593. },
  1594. },
  1595. Actions: []dataprovider.EventAction{
  1596. {
  1597. BaseEventAction: dataprovider.BaseEventAction{
  1598. Name: action.Name,
  1599. },
  1600. Order: 1,
  1601. },
  1602. },
  1603. }
  1604. job := eventCronJob{
  1605. ruleName: rule.Name,
  1606. }
  1607. job.Run() // rule not found
  1608. assert.NoDirExists(t, backupsPath)
  1609. err = dataprovider.AddEventRule(rule, "", "", "")
  1610. assert.NoError(t, err)
  1611. job.Run()
  1612. assert.DirExists(t, backupsPath)
  1613. action.Type = dataprovider.ActionTypeEmail
  1614. action.Options = dataprovider.BaseEventActionOptions{
  1615. EmailConfig: dataprovider.EventActionEmailConfig{
  1616. Recipients: []string{"[email protected]"},
  1617. Subject: "test with attachments",
  1618. Body: "body",
  1619. Attachments: []string{"/file1.txt"},
  1620. },
  1621. }
  1622. err = dataprovider.UpdateEventAction(action, "", "", "")
  1623. assert.NoError(t, err)
  1624. job.Run() // action is not compatible with a scheduled rule
  1625. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1626. assert.NoError(t, err)
  1627. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  1628. assert.NoError(t, err)
  1629. err = os.RemoveAll(backupsPath)
  1630. assert.NoError(t, err)
  1631. stopEventScheduler()
  1632. }
  1633. func TestEventParamsCopy(t *testing.T) {
  1634. params := EventParams{
  1635. Name: "name",
  1636. Event: "event",
  1637. Status: 1,
  1638. errors: []string{"error1"},
  1639. retentionChecks: []executedRetentionCheck{},
  1640. }
  1641. paramsCopy := params.getACopy()
  1642. assert.Equal(t, params, *paramsCopy)
  1643. params.Name = "name mod"
  1644. paramsCopy.Event = "event mod"
  1645. paramsCopy.Status = 2
  1646. params.errors = append(params.errors, "error2")
  1647. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1648. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1649. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1650. assert.Equal(t, "name mod", params.Name)
  1651. assert.Equal(t, "name", paramsCopy.Name)
  1652. assert.Equal(t, "event", params.Event)
  1653. assert.Equal(t, "event mod", paramsCopy.Event)
  1654. assert.Equal(t, 1, params.Status)
  1655. assert.Equal(t, 2, paramsCopy.Status)
  1656. params = EventParams{
  1657. retentionChecks: []executedRetentionCheck{
  1658. {
  1659. Username: "u",
  1660. ActionName: "a",
  1661. Results: []folderRetentionCheckResult{
  1662. {
  1663. Path: "p",
  1664. Retention: 1,
  1665. },
  1666. },
  1667. },
  1668. },
  1669. }
  1670. paramsCopy = params.getACopy()
  1671. require.Len(t, paramsCopy.retentionChecks, 1)
  1672. paramsCopy.retentionChecks[0].Username = "u_copy"
  1673. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1674. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1675. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1676. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1677. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1678. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1679. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  1680. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  1681. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  1682. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  1683. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  1684. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  1685. }
  1686. func TestEventParamsStatusFromError(t *testing.T) {
  1687. params := EventParams{Status: 1}
  1688. params.AddError(os.ErrNotExist)
  1689. assert.Equal(t, 1, params.Status)
  1690. params = EventParams{Status: 1, updateStatusFromError: true}
  1691. params.AddError(os.ErrNotExist)
  1692. assert.Equal(t, 2, params.Status)
  1693. }
  1694. type testWriter struct {
  1695. errTest error
  1696. sentinel string
  1697. }
  1698. func (w *testWriter) Write(p []byte) (int, error) {
  1699. if w.errTest != nil {
  1700. return 0, w.errTest
  1701. }
  1702. if w.sentinel == string(p) {
  1703. return 0, io.ErrUnexpectedEOF
  1704. }
  1705. return len(p), nil
  1706. }
  1707. func TestWriteHTTPPartsError(t *testing.T) {
  1708. m := multipart.NewWriter(&testWriter{
  1709. errTest: io.ErrShortWrite,
  1710. })
  1711. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{})
  1712. assert.ErrorIs(t, err, io.ErrShortWrite)
  1713. body := "test body"
  1714. m = multipart.NewWriter(&testWriter{sentinel: body})
  1715. err = writeHTTPPart(m, dataprovider.HTTPPart{
  1716. Body: body,
  1717. }, nil, nil, nil, &EventParams{})
  1718. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  1719. }
  1720. func TestReplacePathsPlaceholders(t *testing.T) {
  1721. replacer := strings.NewReplacer("{{VirtualPath}}", "/path1")
  1722. paths := []string{"{{VirtualPath}}", "/path1"}
  1723. paths = replacePathsPlaceholders(paths, replacer)
  1724. assert.Equal(t, []string{"/path1"}, paths)
  1725. paths = []string{"{{VirtualPath}}", "/path2"}
  1726. paths = replacePathsPlaceholders(paths, replacer)
  1727. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  1728. }
  1729. func TestEstimateZipSizeErrors(t *testing.T) {
  1730. u := dataprovider.User{
  1731. BaseUser: sdk.BaseUser{
  1732. Username: "u",
  1733. HomeDir: filepath.Join(os.TempDir(), "u"),
  1734. Status: 1,
  1735. Permissions: map[string][]string{
  1736. "/": {dataprovider.PermAny},
  1737. },
  1738. QuotaSize: 1000,
  1739. },
  1740. }
  1741. err := dataprovider.AddUser(&u, "", "", "")
  1742. assert.NoError(t, err)
  1743. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  1744. assert.NoError(t, err)
  1745. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  1746. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  1747. assert.True(t, conn.IsNotExistError(err))
  1748. if runtime.GOOS != osWindows {
  1749. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  1750. assert.NoError(t, err)
  1751. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  1752. assert.NoError(t, err)
  1753. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  1754. assert.NoError(t, err)
  1755. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  1756. assert.Error(t, err, "size %d", size)
  1757. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  1758. assert.NoError(t, err)
  1759. }
  1760. err = dataprovider.DeleteUser(u.Username, "", "", "")
  1761. assert.NoError(t, err)
  1762. err = os.RemoveAll(u.GetHomeDir())
  1763. assert.NoError(t, err)
  1764. }
  1765. func TestOnDemandRule(t *testing.T) {
  1766. a := &dataprovider.BaseEventAction{
  1767. Name: "a",
  1768. Type: dataprovider.ActionTypeBackup,
  1769. Options: dataprovider.BaseEventActionOptions{},
  1770. }
  1771. err := dataprovider.AddEventAction(a, "", "", "")
  1772. assert.NoError(t, err)
  1773. r := &dataprovider.EventRule{
  1774. Name: "test on demand rule",
  1775. Status: 1,
  1776. Trigger: dataprovider.EventTriggerOnDemand,
  1777. Actions: []dataprovider.EventAction{
  1778. {
  1779. BaseEventAction: dataprovider.BaseEventAction{
  1780. Name: a.Name,
  1781. },
  1782. },
  1783. },
  1784. }
  1785. err = dataprovider.AddEventRule(r, "", "", "")
  1786. assert.NoError(t, err)
  1787. err = RunOnDemandRule(r.Name)
  1788. assert.NoError(t, err)
  1789. r.Status = 0
  1790. err = dataprovider.UpdateEventRule(r, "", "", "")
  1791. assert.NoError(t, err)
  1792. err = RunOnDemandRule(r.Name)
  1793. assert.ErrorIs(t, err, util.ErrValidation)
  1794. assert.Contains(t, err.Error(), "is inactive")
  1795. r.Status = 1
  1796. r.Trigger = dataprovider.EventTriggerCertificate
  1797. err = dataprovider.UpdateEventRule(r, "", "", "")
  1798. assert.NoError(t, err)
  1799. err = RunOnDemandRule(r.Name)
  1800. assert.ErrorIs(t, err, util.ErrValidation)
  1801. assert.Contains(t, err.Error(), "is not defined as on-demand")
  1802. a1 := &dataprovider.BaseEventAction{
  1803. Name: "a1",
  1804. Type: dataprovider.ActionTypeEmail,
  1805. Options: dataprovider.BaseEventActionOptions{
  1806. EmailConfig: dataprovider.EventActionEmailConfig{
  1807. Recipients: []string{"[email protected]"},
  1808. Subject: "subject",
  1809. Body: "body",
  1810. Attachments: []string{"/{{VirtualPath}}"},
  1811. },
  1812. },
  1813. }
  1814. err = dataprovider.AddEventAction(a1, "", "", "")
  1815. assert.NoError(t, err)
  1816. r.Trigger = dataprovider.EventTriggerOnDemand
  1817. r.Actions = []dataprovider.EventAction{
  1818. {
  1819. BaseEventAction: dataprovider.BaseEventAction{
  1820. Name: a1.Name,
  1821. },
  1822. },
  1823. }
  1824. err = dataprovider.UpdateEventRule(r, "", "", "")
  1825. assert.NoError(t, err)
  1826. err = RunOnDemandRule(r.Name)
  1827. assert.ErrorIs(t, err, util.ErrValidation)
  1828. assert.Contains(t, err.Error(), "incosistent actions")
  1829. err = dataprovider.DeleteEventRule(r.Name, "", "", "")
  1830. assert.NoError(t, err)
  1831. err = dataprovider.DeleteEventAction(a.Name, "", "", "")
  1832. assert.NoError(t, err)
  1833. err = dataprovider.DeleteEventAction(a1.Name, "", "", "")
  1834. assert.NoError(t, err)
  1835. err = RunOnDemandRule(r.Name)
  1836. assert.ErrorIs(t, err, util.ErrNotFound)
  1837. }
  1838. func getErrorString(err error) string {
  1839. if err == nil {
  1840. return ""
  1841. }
  1842. return err.Error()
  1843. }
  1844. func TestHTTPEndpointWithPlaceholders(t *testing.T) {
  1845. c := dataprovider.EventActionHTTPConfig{
  1846. Endpoint: "http://127.0.0.1:8080/base/url/{{Name}}/{{VirtualPath}}/upload",
  1847. QueryParameters: []dataprovider.KeyValue{
  1848. {
  1849. Key: "u",
  1850. Value: "{{Name}}",
  1851. },
  1852. {
  1853. Key: "p",
  1854. Value: "{{VirtualPath}}",
  1855. },
  1856. },
  1857. }
  1858. name := "uname"
  1859. vPath := "/a dir/@ file.txt"
  1860. replacer := strings.NewReplacer("{{Name}}", name, "{{VirtualPath}}", vPath)
  1861. u, err := getHTTPRuleActionEndpoint(c, replacer)
  1862. assert.NoError(t, err)
  1863. expected := "http://127.0.0.1:8080/base/url/" + url.PathEscape(name) + "/" + url.PathEscape(vPath) +
  1864. "/upload?" + "p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  1865. assert.Equal(t, expected, u)
  1866. c.Endpoint = "http://127.0.0.1/upload"
  1867. u, err = getHTTPRuleActionEndpoint(c, replacer)
  1868. assert.NoError(t, err)
  1869. expected = c.Endpoint + "?p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  1870. assert.Equal(t, expected, u)
  1871. }