httpd_test.go 166 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201
  1. package httpd_test
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "mime/multipart"
  10. "net"
  11. "net/http"
  12. "net/http/httptest"
  13. "net/url"
  14. "os"
  15. "path/filepath"
  16. "runtime"
  17. "strconv"
  18. "strings"
  19. "testing"
  20. "time"
  21. "github.com/go-chi/render"
  22. _ "github.com/go-sql-driver/mysql"
  23. _ "github.com/lib/pq"
  24. _ "github.com/mattn/go-sqlite3"
  25. "github.com/rs/zerolog"
  26. "github.com/stretchr/testify/assert"
  27. "github.com/stretchr/testify/require"
  28. "github.com/drakkan/sftpgo/common"
  29. "github.com/drakkan/sftpgo/config"
  30. "github.com/drakkan/sftpgo/dataprovider"
  31. "github.com/drakkan/sftpgo/httpd"
  32. "github.com/drakkan/sftpgo/kms"
  33. "github.com/drakkan/sftpgo/logger"
  34. "github.com/drakkan/sftpgo/utils"
  35. "github.com/drakkan/sftpgo/vfs"
  36. )
  37. const (
  38. defaultUsername = "test_user"
  39. defaultPassword = "test_password"
  40. testPubKey = "ssh-rsa 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 nicola@p1"
  41. userPath = "/api/v1/user"
  42. folderPath = "/api/v1/folder"
  43. activeConnectionsPath = "/api/v1/connection"
  44. serverStatusPath = "/api/v1/status"
  45. quotaScanPath = "/api/v1/quota_scan"
  46. quotaScanVFolderPath = "/api/v1/folder_quota_scan"
  47. updateUsedQuotaPath = "/api/v1/quota_update"
  48. updateFolderUsedQuotaPath = "/api/v1/folder_quota_update"
  49. defenderUnban = "/api/v1/defender/unban"
  50. versionPath = "/api/v1/version"
  51. metricsPath = "/metrics"
  52. webBasePath = "/web"
  53. webUsersPath = "/web/users"
  54. webUserPath = "/web/user"
  55. webFoldersPath = "/web/folders"
  56. webFolderPath = "/web/folder"
  57. webConnectionsPath = "/web/connections"
  58. webStatusPath = "/web/status"
  59. configDir = ".."
  60. httpsCert = `-----BEGIN CERTIFICATE-----
  61. MIICHTCCAaKgAwIBAgIUHnqw7QnB1Bj9oUsNpdb+ZkFPOxMwCgYIKoZIzj0EAwIw
  62. RTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGElu
  63. dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yMDAyMDQwOTUzMDRaFw0zMDAyMDEw
  64. OTUzMDRaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYD
  65. VQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwdjAQBgcqhkjOPQIBBgUrgQQA
  66. IgNiAARCjRMqJ85rzMC998X5z761nJ+xL3bkmGVqWvrJ51t5OxV0v25NsOgR82CA
  67. NXUgvhVYs7vNFN+jxtb2aj6Xg+/2G/BNxkaFspIVCzgWkxiz7XE4lgUwX44FCXZM
  68. 3+JeUbKjUzBRMB0GA1UdDgQWBBRhLw+/o3+Z02MI/d4tmaMui9W16jAfBgNVHSME
  69. GDAWgBRhLw+/o3+Z02MI/d4tmaMui9W16jAPBgNVHRMBAf8EBTADAQH/MAoGCCqG
  70. SM49BAMCA2kAMGYCMQDqLt2lm8mE+tGgtjDmtFgdOcI72HSbRQ74D5rYTzgST1rY
  71. /8wTi5xl8TiFUyLMUsICMQC5ViVxdXbhuG7gX6yEqSkMKZICHpO8hqFwOD/uaFVI
  72. dV4vKmHUzwK/eIx+8Ay3neE=
  73. -----END CERTIFICATE-----`
  74. httpsKey = `-----BEGIN EC PARAMETERS-----
  75. BgUrgQQAIg==
  76. -----END EC PARAMETERS-----
  77. -----BEGIN EC PRIVATE KEY-----
  78. MIGkAgEBBDCfMNsN6miEE3rVyUPwElfiJSWaR5huPCzUenZOfJT04GAcQdWvEju3
  79. UM2lmBLIXpGgBwYFK4EEACKhZANiAARCjRMqJ85rzMC998X5z761nJ+xL3bkmGVq
  80. WvrJ51t5OxV0v25NsOgR82CANXUgvhVYs7vNFN+jxtb2aj6Xg+/2G/BNxkaFspIV
  81. CzgWkxiz7XE4lgUwX44FCXZM3+JeUbI=
  82. -----END EC PRIVATE KEY-----`
  83. sftpPrivateKey = `-----BEGIN OPENSSH PRIVATE KEY-----
  84. b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
  85. QyNTUxOQAAACB+RB4yNTZz9mHOkawwUibNdemijVV3ErMeLxWUBlCN/gAAAJA7DjpfOw46
  86. XwAAAAtzc2gtZWQyNTUxOQAAACB+RB4yNTZz9mHOkawwUibNdemijVV3ErMeLxWUBlCN/g
  87. AAAEA0E24gi8ab/XRSvJ85TGZJMe6HVmwxSG4ExPfTMwwe2n5EHjI1NnP2Yc6RrDBSJs11
  88. 6aKNVXcSsx4vFZQGUI3+AAAACW5pY29sYUBwMQECAwQ=
  89. -----END OPENSSH PRIVATE KEY-----`
  90. sftpPkeyFingerprint = "SHA256:QVQ06XHZZbYZzqfrsZcf3Yozy2WTnqQPeLOkcJCdbP0"
  91. )
  92. var (
  93. defaultPerms = []string{dataprovider.PermAny}
  94. homeBasePath string
  95. backupsPath string
  96. credentialsPath string
  97. testServer *httptest.Server
  98. providerDriverName string
  99. )
  100. type fakeConnection struct {
  101. *common.BaseConnection
  102. command string
  103. }
  104. func (c *fakeConnection) Disconnect() error {
  105. common.Connections.Remove(c.GetID())
  106. return nil
  107. }
  108. func (c *fakeConnection) GetClientVersion() string {
  109. return ""
  110. }
  111. func (c *fakeConnection) GetCommand() string {
  112. return c.command
  113. }
  114. func (c *fakeConnection) GetRemoteAddress() string {
  115. return ""
  116. }
  117. func TestMain(m *testing.M) {
  118. homeBasePath = os.TempDir()
  119. logfilePath := filepath.Join(configDir, "sftpgo_api_test.log")
  120. logger.InitLogger(logfilePath, 5, 1, 28, false, zerolog.DebugLevel)
  121. err := config.LoadConfig(configDir, "")
  122. if err != nil {
  123. logger.WarnToConsole("error loading configuration: %v", err)
  124. os.Exit(1)
  125. }
  126. providerConf := config.GetProviderConf()
  127. credentialsPath = filepath.Join(os.TempDir(), "test_credentials")
  128. providerConf.CredentialsPath = credentialsPath
  129. providerDriverName = providerConf.Driver
  130. os.RemoveAll(credentialsPath) //nolint:errcheck
  131. logger.InfoToConsole("Starting HTTPD tests, provider: %v", providerConf.Driver)
  132. err = common.Initialize(config.GetCommonConfig())
  133. if err != nil {
  134. logger.WarnToConsole("error initializing common: %v", err)
  135. os.Exit(1)
  136. }
  137. err = dataprovider.Initialize(providerConf, configDir)
  138. if err != nil {
  139. logger.WarnToConsole("error initializing data provider: %v", err)
  140. os.Exit(1)
  141. }
  142. httpConfig := config.GetHTTPConfig()
  143. httpConfig.Initialize(configDir)
  144. kmsConfig := config.GetKMSConfig()
  145. err = kmsConfig.Initialize()
  146. if err != nil {
  147. logger.ErrorToConsole("error initializing kms: %v", err)
  148. os.Exit(1)
  149. }
  150. httpdConf := config.GetHTTPDConfig()
  151. httpdConf.BindPort = 8081
  152. httpd.SetBaseURLAndCredentials("http://127.0.0.1:8081", "", "")
  153. backupsPath = filepath.Join(os.TempDir(), "test_backups")
  154. httpdConf.BackupsPath = backupsPath
  155. err = os.MkdirAll(backupsPath, os.ModePerm)
  156. if err != nil {
  157. logger.ErrorToConsole("error creating backups path: %v", err)
  158. os.Exit(1)
  159. }
  160. go func() {
  161. if err := httpdConf.Initialize(configDir); err != nil {
  162. logger.ErrorToConsole("could not start HTTP server: %v", err)
  163. os.Exit(1)
  164. }
  165. }()
  166. waitTCPListening(fmt.Sprintf("%s:%d", httpdConf.BindAddress, httpdConf.BindPort))
  167. // now start an https server
  168. certPath := filepath.Join(os.TempDir(), "test.crt")
  169. keyPath := filepath.Join(os.TempDir(), "test.key")
  170. err = ioutil.WriteFile(certPath, []byte(httpsCert), os.ModePerm)
  171. if err != nil {
  172. logger.ErrorToConsole("error writing HTTPS certificate: %v", err)
  173. os.Exit(1)
  174. }
  175. err = ioutil.WriteFile(keyPath, []byte(httpsKey), os.ModePerm)
  176. if err != nil {
  177. logger.ErrorToConsole("error writing HTTPS private key: %v", err)
  178. os.Exit(1)
  179. }
  180. httpdConf.BindPort = 8443
  181. httpdConf.CertificateFile = certPath
  182. httpdConf.CertificateKeyFile = keyPath
  183. go func() {
  184. if err := httpdConf.Initialize(configDir); err != nil {
  185. logger.ErrorToConsole("could not start HTTPS server: %v", err)
  186. os.Exit(1)
  187. }
  188. }()
  189. waitTCPListening(fmt.Sprintf("%s:%d", httpdConf.BindAddress, httpdConf.BindPort))
  190. httpd.ReloadCertificateMgr() //nolint:errcheck
  191. testServer = httptest.NewServer(httpd.GetHTTPRouter())
  192. defer testServer.Close()
  193. exitCode := m.Run()
  194. os.Remove(logfilePath) //nolint:errcheck
  195. os.RemoveAll(backupsPath) //nolint:errcheck
  196. os.RemoveAll(credentialsPath) //nolint:errcheck
  197. os.Remove(certPath) //nolint:errcheck
  198. os.Remove(keyPath) //nolint:errcheck
  199. os.Exit(exitCode) //nolint:errcheck
  200. }
  201. func TestInitialization(t *testing.T) {
  202. err := config.LoadConfig(configDir, "")
  203. assert.NoError(t, err)
  204. invalidFile := "invalid file"
  205. httpdConf := config.GetHTTPDConfig()
  206. httpdConf.BackupsPath = "test_backups"
  207. httpdConf.AuthUserFile = invalidFile
  208. err = httpdConf.Initialize(configDir)
  209. assert.Error(t, err)
  210. httpdConf.BackupsPath = backupsPath
  211. httpdConf.AuthUserFile = ""
  212. httpdConf.CertificateFile = invalidFile
  213. httpdConf.CertificateKeyFile = invalidFile
  214. err = httpdConf.Initialize(configDir)
  215. assert.Error(t, err)
  216. httpdConf.CertificateFile = ""
  217. httpdConf.CertificateKeyFile = ""
  218. httpdConf.TemplatesPath = "."
  219. err = httpdConf.Initialize(configDir)
  220. assert.Error(t, err)
  221. err = httpd.ReloadCertificateMgr()
  222. assert.NoError(t, err, "reloading TLS Certificate must return nil error if no certificate is configured")
  223. httpdConf = config.GetHTTPDConfig()
  224. httpdConf.BackupsPath = ".."
  225. err = httpdConf.Initialize(configDir)
  226. assert.Error(t, err)
  227. httpdConf.BackupsPath = backupsPath
  228. httpdConf.CertificateFile = invalidFile
  229. httpdConf.CertificateKeyFile = invalidFile
  230. httpdConf.StaticFilesPath = ""
  231. httpdConf.TemplatesPath = ""
  232. err = httpdConf.Initialize(configDir)
  233. assert.Error(t, err)
  234. }
  235. func TestBasicUserHandling(t *testing.T) {
  236. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  237. assert.NoError(t, err)
  238. user.MaxSessions = 10
  239. user.QuotaSize = 4096
  240. user.QuotaFiles = 2
  241. user.UploadBandwidth = 128
  242. user.DownloadBandwidth = 64
  243. user.ExpirationDate = utils.GetTimeAsMsSinceEpoch(time.Now())
  244. user.AdditionalInfo = "some free text"
  245. originalUser := user
  246. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  247. assert.NoError(t, err)
  248. assert.Equal(t, originalUser.ID, user.ID)
  249. users, _, err := httpd.GetUsers(0, 0, defaultUsername, http.StatusOK)
  250. assert.NoError(t, err)
  251. assert.Equal(t, 1, len(users))
  252. _, err = httpd.RemoveUser(user, http.StatusOK)
  253. assert.NoError(t, err)
  254. }
  255. func TestUserStatus(t *testing.T) {
  256. u := getTestUser()
  257. u.Status = 3
  258. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  259. assert.NoError(t, err)
  260. u.Status = 0
  261. user, _, err := httpd.AddUser(u, http.StatusOK)
  262. assert.NoError(t, err)
  263. user.Status = 2
  264. _, _, err = httpd.UpdateUser(user, http.StatusBadRequest, "")
  265. assert.NoError(t, err)
  266. user.Status = 1
  267. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  268. assert.NoError(t, err)
  269. _, err = httpd.RemoveUser(user, http.StatusOK)
  270. assert.NoError(t, err)
  271. }
  272. func TestAddUserNoCredentials(t *testing.T) {
  273. u := getTestUser()
  274. u.Password = ""
  275. u.PublicKeys = []string{}
  276. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  277. assert.NoError(t, err)
  278. }
  279. func TestAddUserNoUsername(t *testing.T) {
  280. u := getTestUser()
  281. u.Username = ""
  282. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  283. assert.NoError(t, err)
  284. }
  285. func TestAddUserNoHomeDir(t *testing.T) {
  286. u := getTestUser()
  287. u.HomeDir = ""
  288. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  289. assert.NoError(t, err)
  290. }
  291. func TestAddUserInvalidHomeDir(t *testing.T) {
  292. u := getTestUser()
  293. u.HomeDir = "relative_path" //nolint:goconst
  294. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  295. assert.NoError(t, err)
  296. }
  297. func TestAddUserNoPerms(t *testing.T) {
  298. u := getTestUser()
  299. u.Permissions = make(map[string][]string)
  300. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  301. assert.NoError(t, err)
  302. u.Permissions["/"] = []string{}
  303. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  304. assert.NoError(t, err)
  305. }
  306. func TestAddUserInvalidPerms(t *testing.T) {
  307. u := getTestUser()
  308. u.Permissions["/"] = []string{"invalidPerm"}
  309. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  310. assert.NoError(t, err)
  311. // permissions for root dir are mandatory
  312. u.Permissions["/"] = []string{}
  313. u.Permissions["/somedir"] = []string{dataprovider.PermAny}
  314. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  315. assert.NoError(t, err)
  316. u.Permissions["/"] = []string{dataprovider.PermAny}
  317. u.Permissions["/subdir/.."] = []string{dataprovider.PermAny}
  318. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  319. assert.NoError(t, err)
  320. }
  321. func TestAddUserInvalidFilters(t *testing.T) {
  322. u := getTestUser()
  323. u.Filters.AllowedIP = []string{"192.168.1.0/24", "192.168.2.0"}
  324. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  325. assert.NoError(t, err)
  326. u.Filters.AllowedIP = []string{}
  327. u.Filters.DeniedIP = []string{"192.168.3.0/16", "invalid"}
  328. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  329. assert.NoError(t, err)
  330. u.Filters.DeniedIP = []string{}
  331. u.Filters.DeniedLoginMethods = []string{"invalid"}
  332. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  333. assert.NoError(t, err)
  334. u.Filters.DeniedLoginMethods = dataprovider.ValidSSHLoginMethods
  335. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  336. assert.NoError(t, err)
  337. u.Filters.DeniedLoginMethods = []string{}
  338. u.Filters.FileExtensions = []dataprovider.ExtensionsFilter{
  339. {
  340. Path: "relative",
  341. AllowedExtensions: []string{},
  342. DeniedExtensions: []string{},
  343. },
  344. }
  345. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  346. assert.NoError(t, err)
  347. u.Filters.FileExtensions = []dataprovider.ExtensionsFilter{
  348. {
  349. Path: "/",
  350. AllowedExtensions: []string{},
  351. DeniedExtensions: []string{},
  352. },
  353. }
  354. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  355. assert.NoError(t, err)
  356. u.Filters.FileExtensions = []dataprovider.ExtensionsFilter{
  357. {
  358. Path: "/subdir",
  359. AllowedExtensions: []string{".zip"},
  360. DeniedExtensions: []string{},
  361. },
  362. {
  363. Path: "/subdir",
  364. AllowedExtensions: []string{".rar"},
  365. DeniedExtensions: []string{".jpg"},
  366. },
  367. }
  368. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  369. assert.NoError(t, err)
  370. u.Filters.FileExtensions = nil
  371. u.Filters.FilePatterns = []dataprovider.PatternsFilter{
  372. {
  373. Path: "relative",
  374. AllowedPatterns: []string{},
  375. DeniedPatterns: []string{},
  376. },
  377. }
  378. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  379. assert.NoError(t, err)
  380. u.Filters.FilePatterns = []dataprovider.PatternsFilter{
  381. {
  382. Path: "/",
  383. AllowedPatterns: []string{},
  384. DeniedPatterns: []string{},
  385. },
  386. }
  387. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  388. assert.NoError(t, err)
  389. u.Filters.FilePatterns = []dataprovider.PatternsFilter{
  390. {
  391. Path: "/subdir",
  392. AllowedPatterns: []string{"*.zip"},
  393. },
  394. {
  395. Path: "/subdir",
  396. AllowedPatterns: []string{"*.rar"},
  397. DeniedPatterns: []string{"*.jpg"},
  398. },
  399. }
  400. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  401. assert.NoError(t, err)
  402. u.Filters.FilePatterns = []dataprovider.PatternsFilter{
  403. {
  404. Path: "/subdir",
  405. AllowedPatterns: []string{"a\\"},
  406. },
  407. }
  408. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  409. assert.NoError(t, err)
  410. u.Filters.DeniedProtocols = []string{"invalid"}
  411. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  412. assert.NoError(t, err)
  413. u.Filters.DeniedProtocols = dataprovider.ValidProtocols
  414. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  415. assert.NoError(t, err)
  416. }
  417. func TestAddUserInvalidFsConfig(t *testing.T) {
  418. u := getTestUser()
  419. u.FsConfig.Provider = dataprovider.S3FilesystemProvider
  420. u.FsConfig.S3Config.Bucket = ""
  421. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  422. assert.NoError(t, err)
  423. err = os.RemoveAll(credentialsPath)
  424. assert.NoError(t, err)
  425. err = os.MkdirAll(credentialsPath, 0700)
  426. assert.NoError(t, err)
  427. u.FsConfig.S3Config.Bucket = "testbucket"
  428. u.FsConfig.S3Config.Region = "eu-west-1"
  429. u.FsConfig.S3Config.AccessKey = "access-key"
  430. u.FsConfig.S3Config.AccessSecret = kms.NewSecret(kms.SecretStatusRedacted, "access-secret", "", "")
  431. u.FsConfig.S3Config.Endpoint = "http://127.0.0.1:9000/path?a=b"
  432. u.FsConfig.S3Config.StorageClass = "Standard" //nolint:goconst
  433. u.FsConfig.S3Config.KeyPrefix = "/adir/subdir/"
  434. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  435. assert.NoError(t, err)
  436. u.FsConfig.S3Config.AccessSecret.SetStatus(kms.SecretStatusPlain)
  437. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  438. assert.NoError(t, err)
  439. u.FsConfig.S3Config.KeyPrefix = ""
  440. u.FsConfig.S3Config.UploadPartSize = 3
  441. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  442. assert.NoError(t, err)
  443. u.FsConfig.S3Config.UploadPartSize = 5001
  444. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  445. assert.NoError(t, err)
  446. u.FsConfig.S3Config.UploadPartSize = 0
  447. u.FsConfig.S3Config.UploadConcurrency = -1
  448. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  449. assert.NoError(t, err)
  450. u = getTestUser()
  451. u.FsConfig.Provider = dataprovider.GCSFilesystemProvider
  452. u.FsConfig.GCSConfig.Bucket = ""
  453. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  454. assert.NoError(t, err)
  455. u.FsConfig.GCSConfig.Bucket = "abucket"
  456. u.FsConfig.GCSConfig.StorageClass = "Standard"
  457. u.FsConfig.GCSConfig.KeyPrefix = "/somedir/subdir/"
  458. u.FsConfig.GCSConfig.Credentials = kms.NewSecret(kms.SecretStatusRedacted, "test", "", "") //nolint:goconst
  459. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  460. assert.NoError(t, err)
  461. u.FsConfig.GCSConfig.Credentials.SetStatus(kms.SecretStatusPlain)
  462. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  463. assert.NoError(t, err)
  464. u.FsConfig.GCSConfig.KeyPrefix = "somedir/subdir/" //nolint:goconst
  465. u.FsConfig.GCSConfig.Credentials = kms.NewEmptySecret()
  466. u.FsConfig.GCSConfig.AutomaticCredentials = 0
  467. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  468. assert.NoError(t, err)
  469. u.FsConfig.GCSConfig.Credentials = kms.NewSecret(kms.SecretStatusSecretBox, "invalid", "", "")
  470. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  471. assert.NoError(t, err)
  472. u = getTestUser()
  473. u.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  474. u.FsConfig.AzBlobConfig.SASURL = "http://foo\x7f.com/"
  475. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  476. assert.NoError(t, err)
  477. u.FsConfig.AzBlobConfig.SASURL = ""
  478. u.FsConfig.AzBlobConfig.AccountName = "name"
  479. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  480. assert.NoError(t, err)
  481. u.FsConfig.AzBlobConfig.Container = "container"
  482. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  483. assert.NoError(t, err)
  484. u.FsConfig.AzBlobConfig.AccountKey = kms.NewSecret(kms.SecretStatusRedacted, "key", "", "")
  485. u.FsConfig.AzBlobConfig.KeyPrefix = "/amedir/subdir/"
  486. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  487. assert.NoError(t, err)
  488. u.FsConfig.AzBlobConfig.AccountKey.SetStatus(kms.SecretStatusPlain)
  489. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  490. assert.NoError(t, err)
  491. u.FsConfig.AzBlobConfig.KeyPrefix = "amedir/subdir/"
  492. u.FsConfig.AzBlobConfig.UploadPartSize = -1
  493. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  494. assert.NoError(t, err)
  495. u.FsConfig.AzBlobConfig.UploadPartSize = 101
  496. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  497. assert.NoError(t, err)
  498. u = getTestUser()
  499. u.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  500. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  501. assert.NoError(t, err)
  502. u.FsConfig.CryptConfig.Passphrase = kms.NewSecret(kms.SecretStatusRedacted, "akey", "", "")
  503. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  504. assert.NoError(t, err)
  505. u = getTestUser()
  506. u.FsConfig.Provider = dataprovider.SFTPFilesystemProvider
  507. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  508. assert.NoError(t, err)
  509. u.FsConfig.SFTPConfig.Password = kms.NewSecret(kms.SecretStatusRedacted, "randompkey", "", "")
  510. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  511. assert.NoError(t, err)
  512. u.FsConfig.SFTPConfig.Password = kms.NewEmptySecret()
  513. u.FsConfig.SFTPConfig.PrivateKey = kms.NewSecret(kms.SecretStatusRedacted, "keyforpkey", "", "")
  514. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  515. assert.NoError(t, err)
  516. }
  517. func TestAddUserInvalidVirtualFolders(t *testing.T) {
  518. u := getTestUser()
  519. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  520. BaseVirtualFolder: vfs.BaseVirtualFolder{
  521. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  522. },
  523. VirtualPath: "vdir",
  524. })
  525. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  526. assert.NoError(t, err)
  527. u.VirtualFolders = nil
  528. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  529. BaseVirtualFolder: vfs.BaseVirtualFolder{
  530. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  531. },
  532. VirtualPath: "/",
  533. })
  534. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  535. assert.NoError(t, err)
  536. u.VirtualFolders = nil
  537. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  538. BaseVirtualFolder: vfs.BaseVirtualFolder{
  539. MappedPath: filepath.Join(u.GetHomeDir(), "mapped_dir"),
  540. },
  541. VirtualPath: "/vdir",
  542. })
  543. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  544. assert.NoError(t, err)
  545. u.VirtualFolders = nil
  546. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  547. BaseVirtualFolder: vfs.BaseVirtualFolder{
  548. MappedPath: u.GetHomeDir(),
  549. },
  550. VirtualPath: "/vdir",
  551. })
  552. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  553. assert.NoError(t, err)
  554. u.VirtualFolders = nil
  555. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  556. BaseVirtualFolder: vfs.BaseVirtualFolder{
  557. MappedPath: filepath.Join(u.GetHomeDir(), ".."),
  558. },
  559. VirtualPath: "/vdir",
  560. })
  561. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  562. assert.NoError(t, err)
  563. u.VirtualFolders = nil
  564. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  565. BaseVirtualFolder: vfs.BaseVirtualFolder{
  566. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  567. },
  568. VirtualPath: "/vdir",
  569. })
  570. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  571. BaseVirtualFolder: vfs.BaseVirtualFolder{
  572. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  573. },
  574. VirtualPath: "/vdir",
  575. })
  576. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  577. assert.NoError(t, err)
  578. u.VirtualFolders = nil
  579. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  580. BaseVirtualFolder: vfs.BaseVirtualFolder{
  581. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  582. },
  583. VirtualPath: "/vdir1",
  584. })
  585. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  586. BaseVirtualFolder: vfs.BaseVirtualFolder{
  587. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  588. },
  589. VirtualPath: "/vdir2",
  590. })
  591. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  592. assert.NoError(t, err)
  593. u.VirtualFolders = nil
  594. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  595. BaseVirtualFolder: vfs.BaseVirtualFolder{
  596. MappedPath: filepath.Join(os.TempDir(), "mapped_dir", "subdir"),
  597. },
  598. VirtualPath: "/vdir1",
  599. })
  600. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  601. BaseVirtualFolder: vfs.BaseVirtualFolder{
  602. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  603. },
  604. VirtualPath: "/vdir2",
  605. })
  606. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  607. assert.NoError(t, err)
  608. u.VirtualFolders = nil
  609. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  610. BaseVirtualFolder: vfs.BaseVirtualFolder{
  611. MappedPath: filepath.Join(os.TempDir(), "mapped_dir"),
  612. },
  613. VirtualPath: "/vdir1",
  614. })
  615. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  616. BaseVirtualFolder: vfs.BaseVirtualFolder{
  617. MappedPath: filepath.Join(os.TempDir(), "mapped_dir", "subdir"),
  618. },
  619. VirtualPath: "/vdir2",
  620. })
  621. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  622. assert.NoError(t, err)
  623. u.VirtualFolders = nil
  624. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  625. BaseVirtualFolder: vfs.BaseVirtualFolder{
  626. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  627. },
  628. VirtualPath: "/vdir1/subdir",
  629. })
  630. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  631. BaseVirtualFolder: vfs.BaseVirtualFolder{
  632. MappedPath: filepath.Join(os.TempDir(), "mapped_dir2"),
  633. },
  634. VirtualPath: "/vdir1/../vdir1",
  635. })
  636. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  637. assert.NoError(t, err)
  638. u.VirtualFolders = nil
  639. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  640. BaseVirtualFolder: vfs.BaseVirtualFolder{
  641. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  642. },
  643. VirtualPath: "/vdir1/",
  644. })
  645. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  646. BaseVirtualFolder: vfs.BaseVirtualFolder{
  647. MappedPath: filepath.Join(os.TempDir(), "mapped_dir2"),
  648. },
  649. VirtualPath: "/vdir1/subdir",
  650. })
  651. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  652. assert.NoError(t, err)
  653. u.VirtualFolders = nil
  654. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  655. BaseVirtualFolder: vfs.BaseVirtualFolder{
  656. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  657. },
  658. VirtualPath: "/vdir1/",
  659. QuotaSize: -1,
  660. QuotaFiles: 1,
  661. })
  662. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  663. assert.NoError(t, err)
  664. u.VirtualFolders = nil
  665. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  666. BaseVirtualFolder: vfs.BaseVirtualFolder{
  667. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  668. },
  669. VirtualPath: "/vdir1/",
  670. QuotaSize: 1,
  671. QuotaFiles: -1,
  672. })
  673. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  674. assert.NoError(t, err)
  675. u.VirtualFolders = nil
  676. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  677. BaseVirtualFolder: vfs.BaseVirtualFolder{
  678. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  679. },
  680. VirtualPath: "/vdir1/",
  681. QuotaSize: -2,
  682. QuotaFiles: 0,
  683. })
  684. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  685. assert.NoError(t, err)
  686. u.VirtualFolders = nil
  687. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  688. BaseVirtualFolder: vfs.BaseVirtualFolder{
  689. MappedPath: filepath.Join(os.TempDir(), "mapped_dir1"),
  690. },
  691. VirtualPath: "/vdir1/",
  692. QuotaSize: 0,
  693. QuotaFiles: -2,
  694. })
  695. _, _, err = httpd.AddUser(u, http.StatusBadRequest)
  696. assert.NoError(t, err)
  697. }
  698. func TestUserPublicKey(t *testing.T) {
  699. u := getTestUser()
  700. invalidPubKey := "invalid"
  701. validPubKey := "ssh-rsa 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 nicola@p1"
  702. u.PublicKeys = []string{invalidPubKey}
  703. _, _, err := httpd.AddUser(u, http.StatusBadRequest)
  704. assert.NoError(t, err)
  705. u.PublicKeys = []string{validPubKey}
  706. user, _, err := httpd.AddUser(u, http.StatusOK)
  707. assert.NoError(t, err)
  708. user.PublicKeys = []string{validPubKey, invalidPubKey}
  709. _, _, err = httpd.UpdateUser(user, http.StatusBadRequest, "")
  710. assert.NoError(t, err)
  711. user.PublicKeys = []string{validPubKey, validPubKey, validPubKey}
  712. _, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  713. assert.NoError(t, err)
  714. _, err = httpd.RemoveUser(user, http.StatusOK)
  715. assert.NoError(t, err)
  716. }
  717. func TestUpdateUser(t *testing.T) {
  718. u := getTestUser()
  719. u.UsedQuotaFiles = 1
  720. u.UsedQuotaSize = 2
  721. user, _, err := httpd.AddUser(u, http.StatusOK)
  722. assert.NoError(t, err)
  723. assert.Equal(t, 0, user.UsedQuotaFiles)
  724. assert.Equal(t, int64(0), user.UsedQuotaSize)
  725. user.HomeDir = filepath.Join(homeBasePath, "testmod")
  726. user.UID = 33
  727. user.GID = 101
  728. user.MaxSessions = 10
  729. user.QuotaSize = 4096
  730. user.QuotaFiles = 2
  731. user.Permissions["/"] = []string{dataprovider.PermCreateDirs, dataprovider.PermDelete, dataprovider.PermDownload}
  732. user.Permissions["/subdir"] = []string{dataprovider.PermListItems, dataprovider.PermUpload}
  733. user.Filters.AllowedIP = []string{"192.168.1.0/24", "192.168.2.0/24"}
  734. user.Filters.DeniedIP = []string{"192.168.3.0/24", "192.168.4.0/24"}
  735. user.Filters.DeniedLoginMethods = []string{dataprovider.LoginMethodPassword}
  736. user.Filters.DeniedProtocols = []string{common.ProtocolWebDAV}
  737. user.Filters.FileExtensions = append(user.Filters.FileExtensions, dataprovider.ExtensionsFilter{
  738. Path: "/subdir",
  739. AllowedExtensions: []string{".zip", ".rar"},
  740. DeniedExtensions: []string{".jpg", ".png"},
  741. })
  742. user.Filters.FilePatterns = append(user.Filters.FilePatterns, dataprovider.PatternsFilter{
  743. Path: "/subdir",
  744. AllowedPatterns: []string{"*.zip", "*.rar"},
  745. DeniedPatterns: []string{"*.jpg", "*.png"},
  746. })
  747. user.Filters.MaxUploadFileSize = 4096
  748. user.UploadBandwidth = 1024
  749. user.DownloadBandwidth = 512
  750. user.VirtualFolders = nil
  751. mappedPath1 := filepath.Join(os.TempDir(), "mapped_dir1")
  752. mappedPath2 := filepath.Join(os.TempDir(), "mapped_dir2")
  753. user.VirtualFolders = append(user.VirtualFolders, vfs.VirtualFolder{
  754. BaseVirtualFolder: vfs.BaseVirtualFolder{
  755. MappedPath: mappedPath1,
  756. },
  757. VirtualPath: "/vdir1",
  758. })
  759. user.VirtualFolders = append(user.VirtualFolders, vfs.VirtualFolder{
  760. BaseVirtualFolder: vfs.BaseVirtualFolder{
  761. MappedPath: mappedPath2,
  762. },
  763. VirtualPath: "/vdir12/subdir",
  764. QuotaSize: 123,
  765. QuotaFiles: 2,
  766. })
  767. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  768. assert.NoError(t, err)
  769. _, _, err = httpd.UpdateUser(user, http.StatusBadRequest, "invalid")
  770. assert.NoError(t, err)
  771. user, _, err = httpd.UpdateUser(user, http.StatusOK, "0")
  772. assert.NoError(t, err)
  773. user, _, err = httpd.UpdateUser(user, http.StatusOK, "1")
  774. assert.NoError(t, err)
  775. user.Permissions["/subdir"] = []string{}
  776. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  777. assert.NoError(t, err)
  778. assert.Len(t, user.Permissions["/subdir"], 0)
  779. assert.Len(t, user.VirtualFolders, 2)
  780. for _, folder := range user.VirtualFolders {
  781. assert.Greater(t, folder.ID, int64(0))
  782. if folder.VirtualPath == "/vdir12/subdir" {
  783. assert.Equal(t, int64(123), folder.QuotaSize)
  784. assert.Equal(t, 2, folder.QuotaFiles)
  785. }
  786. }
  787. folder, _, err := httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  788. assert.NoError(t, err)
  789. if assert.Len(t, folder, 1) {
  790. f := folder[0]
  791. assert.Len(t, f.Users, 1)
  792. assert.Contains(t, f.Users, user.Username)
  793. }
  794. _, err = httpd.RemoveUser(user, http.StatusOK)
  795. assert.NoError(t, err)
  796. // removing the user must remove folder mapping
  797. folder, _, err = httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  798. assert.NoError(t, err)
  799. if assert.Len(t, folder, 1) {
  800. f := folder[0]
  801. assert.Len(t, f.Users, 0)
  802. _, err = httpd.RemoveFolder(f, http.StatusOK)
  803. assert.NoError(t, err)
  804. }
  805. folder, _, err = httpd.GetFolders(0, 0, mappedPath2, http.StatusOK)
  806. assert.NoError(t, err)
  807. if assert.Len(t, folder, 1) {
  808. f := folder[0]
  809. assert.Len(t, f.Users, 0)
  810. _, err = httpd.RemoveFolder(f, http.StatusOK)
  811. assert.NoError(t, err)
  812. }
  813. }
  814. func TestUpdateUserQuotaUsage(t *testing.T) {
  815. u := getTestUser()
  816. usedQuotaFiles := 1
  817. usedQuotaSize := int64(65535)
  818. u.UsedQuotaFiles = usedQuotaFiles
  819. u.UsedQuotaSize = usedQuotaSize
  820. user, _, err := httpd.AddUser(u, http.StatusOK)
  821. assert.NoError(t, err)
  822. _, err = httpd.UpdateQuotaUsage(u, "invalid_mode", http.StatusBadRequest)
  823. assert.NoError(t, err)
  824. _, err = httpd.UpdateQuotaUsage(u, "", http.StatusOK)
  825. assert.NoError(t, err)
  826. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  827. assert.NoError(t, err)
  828. assert.Equal(t, usedQuotaFiles, user.UsedQuotaFiles)
  829. assert.Equal(t, usedQuotaSize, user.UsedQuotaSize)
  830. _, err = httpd.UpdateQuotaUsage(u, "add", http.StatusBadRequest)
  831. assert.NoError(t, err, "user has no quota restrictions add mode should fail")
  832. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  833. assert.NoError(t, err)
  834. assert.Equal(t, usedQuotaFiles, user.UsedQuotaFiles)
  835. assert.Equal(t, usedQuotaSize, user.UsedQuotaSize)
  836. user.QuotaFiles = 100
  837. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  838. assert.NoError(t, err)
  839. _, err = httpd.UpdateQuotaUsage(u, "add", http.StatusOK)
  840. assert.NoError(t, err)
  841. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  842. assert.NoError(t, err)
  843. assert.Equal(t, 2*usedQuotaFiles, user.UsedQuotaFiles)
  844. assert.Equal(t, 2*usedQuotaSize, user.UsedQuotaSize)
  845. u.UsedQuotaFiles = -1
  846. _, err = httpd.UpdateQuotaUsage(u, "", http.StatusBadRequest)
  847. assert.NoError(t, err)
  848. u.UsedQuotaFiles = usedQuotaFiles
  849. u.Username = u.Username + "1"
  850. _, err = httpd.UpdateQuotaUsage(u, "", http.StatusNotFound)
  851. assert.NoError(t, err)
  852. _, err = httpd.RemoveUser(user, http.StatusOK)
  853. assert.NoError(t, err)
  854. }
  855. func TestUserFolderMapping(t *testing.T) {
  856. mappedPath1 := filepath.Join(os.TempDir(), "mapped_dir1")
  857. mappedPath2 := filepath.Join(os.TempDir(), "mapped_dir2")
  858. u1 := getTestUser()
  859. u1.VirtualFolders = append(u1.VirtualFolders, vfs.VirtualFolder{
  860. BaseVirtualFolder: vfs.BaseVirtualFolder{
  861. MappedPath: mappedPath1,
  862. UsedQuotaFiles: 2,
  863. UsedQuotaSize: 123,
  864. },
  865. VirtualPath: "/vdir",
  866. QuotaSize: -1,
  867. QuotaFiles: -1,
  868. })
  869. user1, _, err := httpd.AddUser(u1, http.StatusOK)
  870. assert.NoError(t, err)
  871. // virtual folder must be auto created
  872. folders, _, err := httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  873. assert.NoError(t, err)
  874. if assert.Len(t, folders, 1) {
  875. folder := folders[0]
  876. assert.Len(t, folder.Users, 1)
  877. assert.Contains(t, folder.Users, user1.Username)
  878. assert.Equal(t, 0, folder.UsedQuotaFiles)
  879. assert.Equal(t, int64(0), folder.UsedQuotaSize)
  880. }
  881. u2 := getTestUser()
  882. u2.Username = defaultUsername + "2"
  883. u2.VirtualFolders = append(u2.VirtualFolders, vfs.VirtualFolder{
  884. BaseVirtualFolder: vfs.BaseVirtualFolder{
  885. MappedPath: mappedPath1,
  886. },
  887. VirtualPath: "/vdir1",
  888. QuotaSize: 0,
  889. QuotaFiles: 0,
  890. })
  891. u2.VirtualFolders = append(u2.VirtualFolders, vfs.VirtualFolder{
  892. BaseVirtualFolder: vfs.BaseVirtualFolder{
  893. MappedPath: mappedPath2,
  894. },
  895. VirtualPath: "/vdir2",
  896. QuotaSize: -1,
  897. QuotaFiles: -1,
  898. })
  899. user2, _, err := httpd.AddUser(u2, http.StatusOK)
  900. assert.NoError(t, err)
  901. folders, _, err = httpd.GetFolders(0, 0, mappedPath2, http.StatusOK)
  902. assert.NoError(t, err)
  903. if assert.Len(t, folders, 1) {
  904. folder := folders[0]
  905. assert.Len(t, folder.Users, 1)
  906. assert.Contains(t, folder.Users, user2.Username)
  907. }
  908. folders, _, err = httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  909. assert.NoError(t, err)
  910. if assert.Len(t, folders, 1) {
  911. folder := folders[0]
  912. assert.Len(t, folder.Users, 2)
  913. assert.Contains(t, folder.Users, user1.Username)
  914. assert.Contains(t, folder.Users, user2.Username)
  915. }
  916. // now update user2 removing mappedPath1
  917. user2.VirtualFolders = nil
  918. user2.VirtualFolders = append(user2.VirtualFolders, vfs.VirtualFolder{
  919. BaseVirtualFolder: vfs.BaseVirtualFolder{
  920. MappedPath: mappedPath2,
  921. UsedQuotaFiles: 2,
  922. UsedQuotaSize: 123,
  923. },
  924. VirtualPath: "/vdir",
  925. QuotaSize: 0,
  926. QuotaFiles: 0,
  927. })
  928. user2, _, err = httpd.UpdateUser(user2, http.StatusOK, "")
  929. assert.NoError(t, err)
  930. folders, _, err = httpd.GetFolders(0, 0, mappedPath2, http.StatusOK)
  931. assert.NoError(t, err)
  932. if assert.Len(t, folders, 1) {
  933. folder := folders[0]
  934. assert.Len(t, folder.Users, 1)
  935. assert.Contains(t, folder.Users, user2.Username)
  936. assert.Equal(t, 0, folder.UsedQuotaFiles)
  937. assert.Equal(t, int64(0), folder.UsedQuotaSize)
  938. }
  939. folders, _, err = httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  940. assert.NoError(t, err)
  941. if assert.Len(t, folders, 1) {
  942. folder := folders[0]
  943. assert.Len(t, folder.Users, 1)
  944. assert.Contains(t, folder.Users, user1.Username)
  945. }
  946. // add mappedPath1 again to user2
  947. user2.VirtualFolders = append(user2.VirtualFolders, vfs.VirtualFolder{
  948. BaseVirtualFolder: vfs.BaseVirtualFolder{
  949. MappedPath: mappedPath1,
  950. },
  951. VirtualPath: "/vdir1",
  952. })
  953. user2, _, err = httpd.UpdateUser(user2, http.StatusOK, "")
  954. assert.NoError(t, err)
  955. folders, _, err = httpd.GetFolders(0, 0, mappedPath2, http.StatusOK)
  956. assert.NoError(t, err)
  957. if assert.Len(t, folders, 1) {
  958. folder := folders[0]
  959. assert.Len(t, folder.Users, 1)
  960. assert.Contains(t, folder.Users, user2.Username)
  961. }
  962. // removing virtual folders should clear relations on both side
  963. _, err = httpd.RemoveFolder(vfs.BaseVirtualFolder{MappedPath: mappedPath2}, http.StatusOK)
  964. assert.NoError(t, err)
  965. user2, _, err = httpd.GetUserByID(user2.ID, http.StatusOK)
  966. assert.NoError(t, err)
  967. if assert.Len(t, user2.VirtualFolders, 1) {
  968. folder := user2.VirtualFolders[0]
  969. assert.Equal(t, mappedPath1, folder.MappedPath)
  970. }
  971. user1, _, err = httpd.GetUserByID(user1.ID, http.StatusOK)
  972. assert.NoError(t, err)
  973. if assert.Len(t, user2.VirtualFolders, 1) {
  974. folder := user2.VirtualFolders[0]
  975. assert.Equal(t, mappedPath1, folder.MappedPath)
  976. }
  977. folders, _, err = httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  978. assert.NoError(t, err)
  979. if assert.Len(t, folders, 1) {
  980. folder := folders[0]
  981. assert.Len(t, folder.Users, 2)
  982. }
  983. // removing a user should clear virtual folder mapping
  984. _, err = httpd.RemoveUser(user1, http.StatusOK)
  985. assert.NoError(t, err)
  986. folders, _, err = httpd.GetFolders(0, 0, mappedPath1, http.StatusOK)
  987. assert.NoError(t, err)
  988. if assert.Len(t, folders, 1) {
  989. folder := folders[0]
  990. assert.Len(t, folder.Users, 1)
  991. assert.Contains(t, folder.Users, user2.Username)
  992. }
  993. // removing a folder should clear mapping on the user side too
  994. _, err = httpd.RemoveFolder(vfs.BaseVirtualFolder{MappedPath: mappedPath1}, http.StatusOK)
  995. assert.NoError(t, err)
  996. user2, _, err = httpd.GetUserByID(user2.ID, http.StatusOK)
  997. assert.NoError(t, err)
  998. assert.Len(t, user2.VirtualFolders, 0)
  999. _, err = httpd.RemoveUser(user2, http.StatusOK)
  1000. assert.NoError(t, err)
  1001. }
  1002. func TestUserS3Config(t *testing.T) {
  1003. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1004. assert.NoError(t, err)
  1005. user.FsConfig.Provider = dataprovider.S3FilesystemProvider
  1006. user.FsConfig.S3Config.Bucket = "test" //nolint:goconst
  1007. user.FsConfig.S3Config.Region = "us-east-1" //nolint:goconst
  1008. user.FsConfig.S3Config.AccessKey = "Server-Access-Key"
  1009. user.FsConfig.S3Config.AccessSecret = kms.NewPlainSecret("Server-Access-Secret")
  1010. user.FsConfig.S3Config.Endpoint = "http://127.0.0.1:9000"
  1011. user.FsConfig.S3Config.UploadPartSize = 8
  1012. user, body, err := httpd.UpdateUser(user, http.StatusOK, "")
  1013. assert.NoError(t, err, string(body))
  1014. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.S3Config.AccessSecret.GetStatus())
  1015. assert.NotEmpty(t, user.FsConfig.S3Config.AccessSecret.GetPayload())
  1016. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1017. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetKey())
  1018. _, err = httpd.RemoveUser(user, http.StatusOK)
  1019. assert.NoError(t, err)
  1020. user.Password = defaultPassword
  1021. user.ID = 0
  1022. secret := kms.NewSecret(kms.SecretStatusSecretBox, "Server-Access-Secret", "", "")
  1023. user.FsConfig.S3Config.AccessSecret = secret
  1024. _, _, err = httpd.AddUser(user, http.StatusOK)
  1025. assert.Error(t, err)
  1026. user.FsConfig.S3Config.AccessSecret.SetStatus(kms.SecretStatusPlain)
  1027. user, _, err = httpd.AddUser(user, http.StatusOK)
  1028. assert.NoError(t, err)
  1029. initialSecretPayload := user.FsConfig.S3Config.AccessSecret.GetPayload()
  1030. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.S3Config.AccessSecret.GetStatus())
  1031. assert.NotEmpty(t, initialSecretPayload)
  1032. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1033. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetKey())
  1034. user.FsConfig.Provider = dataprovider.S3FilesystemProvider
  1035. user.FsConfig.S3Config.Bucket = "test-bucket"
  1036. user.FsConfig.S3Config.Region = "us-east-1" //nolint:goconst
  1037. user.FsConfig.S3Config.AccessKey = "Server-Access-Key1"
  1038. user.FsConfig.S3Config.Endpoint = "http://localhost:9000"
  1039. user.FsConfig.S3Config.KeyPrefix = "somedir/subdir" //nolint:goconst
  1040. user.FsConfig.S3Config.UploadConcurrency = 5
  1041. user, bb, err := httpd.UpdateUser(user, http.StatusOK, "")
  1042. assert.NoError(t, err, string(bb))
  1043. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.S3Config.AccessSecret.GetStatus())
  1044. assert.Equal(t, initialSecretPayload, user.FsConfig.S3Config.AccessSecret.GetPayload())
  1045. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1046. assert.Empty(t, user.FsConfig.S3Config.AccessSecret.GetKey())
  1047. // test user without access key and access secret (shared config state)
  1048. user.FsConfig.Provider = dataprovider.S3FilesystemProvider
  1049. user.FsConfig.S3Config.Bucket = "testbucket"
  1050. user.FsConfig.S3Config.Region = "us-east-1"
  1051. user.FsConfig.S3Config.AccessKey = ""
  1052. user.FsConfig.S3Config.AccessSecret = kms.NewEmptySecret()
  1053. user.FsConfig.S3Config.Endpoint = ""
  1054. user.FsConfig.S3Config.KeyPrefix = "somedir/subdir"
  1055. user.FsConfig.S3Config.UploadPartSize = 6
  1056. user.FsConfig.S3Config.UploadConcurrency = 4
  1057. user, body, err = httpd.UpdateUser(user, http.StatusOK, "")
  1058. assert.NoError(t, err, string(body))
  1059. assert.True(t, user.FsConfig.S3Config.AccessSecret.IsEmpty())
  1060. _, err = httpd.RemoveUser(user, http.StatusOK)
  1061. assert.NoError(t, err)
  1062. user.Password = defaultPassword
  1063. user.ID = 0
  1064. // shared credential test for add instead of update
  1065. user, _, err = httpd.AddUser(user, http.StatusOK)
  1066. assert.NoError(t, err)
  1067. assert.True(t, user.FsConfig.S3Config.AccessSecret.IsEmpty())
  1068. _, err = httpd.RemoveUser(user, http.StatusOK)
  1069. assert.NoError(t, err)
  1070. }
  1071. func TestUserGCSConfig(t *testing.T) {
  1072. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1073. assert.NoError(t, err)
  1074. err = os.RemoveAll(credentialsPath)
  1075. assert.NoError(t, err)
  1076. err = os.MkdirAll(credentialsPath, 0700)
  1077. assert.NoError(t, err)
  1078. user.FsConfig.Provider = dataprovider.GCSFilesystemProvider
  1079. user.FsConfig.GCSConfig.Bucket = "test"
  1080. user.FsConfig.GCSConfig.Credentials = kms.NewPlainSecret("fake credentials") //nolint:goconst
  1081. user, bb, err := httpd.UpdateUser(user, http.StatusOK, "")
  1082. assert.NoError(t, err, string(bb))
  1083. credentialFile := filepath.Join(credentialsPath, fmt.Sprintf("%v_gcs_credentials.json", user.Username))
  1084. assert.FileExists(t, credentialFile)
  1085. creds, err := ioutil.ReadFile(credentialFile)
  1086. assert.NoError(t, err)
  1087. secret := kms.NewEmptySecret()
  1088. err = json.Unmarshal(creds, secret)
  1089. assert.NoError(t, err)
  1090. err = secret.Decrypt()
  1091. assert.NoError(t, err)
  1092. assert.Equal(t, "fake credentials", secret.GetPayload())
  1093. user.FsConfig.GCSConfig.Credentials = kms.NewSecret(kms.SecretStatusSecretBox, "fake encrypted credentials", "", "")
  1094. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1095. assert.NoError(t, err)
  1096. assert.FileExists(t, credentialFile)
  1097. creds, err = ioutil.ReadFile(credentialFile)
  1098. assert.NoError(t, err)
  1099. secret = kms.NewEmptySecret()
  1100. err = json.Unmarshal(creds, secret)
  1101. assert.NoError(t, err)
  1102. err = secret.Decrypt()
  1103. assert.NoError(t, err)
  1104. assert.Equal(t, "fake credentials", secret.GetPayload())
  1105. _, err = httpd.RemoveUser(user, http.StatusOK)
  1106. assert.NoError(t, err)
  1107. user.Password = defaultPassword
  1108. user.ID = 0
  1109. user.FsConfig.GCSConfig.Credentials = kms.NewSecret(kms.SecretStatusSecretBox, "fake credentials", "", "")
  1110. _, _, err = httpd.AddUser(user, http.StatusOK)
  1111. assert.Error(t, err)
  1112. user.FsConfig.GCSConfig.Credentials.SetStatus(kms.SecretStatusPlain)
  1113. user, body, err := httpd.AddUser(user, http.StatusOK)
  1114. assert.NoError(t, err, string(body))
  1115. err = os.RemoveAll(credentialsPath)
  1116. assert.NoError(t, err)
  1117. err = os.MkdirAll(credentialsPath, 0700)
  1118. assert.NoError(t, err)
  1119. user.FsConfig.GCSConfig.Credentials = kms.NewEmptySecret()
  1120. user.FsConfig.GCSConfig.AutomaticCredentials = 1
  1121. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1122. assert.NoError(t, err)
  1123. assert.NoFileExists(t, credentialFile)
  1124. user.FsConfig.GCSConfig = vfs.GCSFsConfig{}
  1125. user.FsConfig.Provider = dataprovider.S3FilesystemProvider
  1126. user.FsConfig.S3Config.Bucket = "test1"
  1127. user.FsConfig.S3Config.Region = "us-east-1"
  1128. user.FsConfig.S3Config.AccessKey = "Server-Access-Key1"
  1129. user.FsConfig.S3Config.AccessSecret = kms.NewPlainSecret("secret")
  1130. user.FsConfig.S3Config.Endpoint = "http://localhost:9000"
  1131. user.FsConfig.S3Config.KeyPrefix = "somedir/subdir"
  1132. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1133. assert.NoError(t, err)
  1134. user.FsConfig.S3Config = vfs.S3FsConfig{}
  1135. user.FsConfig.Provider = dataprovider.GCSFilesystemProvider
  1136. user.FsConfig.GCSConfig.Bucket = "test1"
  1137. user.FsConfig.GCSConfig.Credentials = kms.NewPlainSecret("fake credentials")
  1138. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1139. assert.NoError(t, err)
  1140. _, err = httpd.RemoveUser(user, http.StatusOK)
  1141. assert.NoError(t, err)
  1142. }
  1143. func TestUserAzureBlobConfig(t *testing.T) {
  1144. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1145. assert.NoError(t, err)
  1146. user.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  1147. user.FsConfig.AzBlobConfig.Container = "test"
  1148. user.FsConfig.AzBlobConfig.AccountName = "Server-Account-Name"
  1149. user.FsConfig.AzBlobConfig.AccountKey = kms.NewPlainSecret("Server-Account-Key")
  1150. user.FsConfig.AzBlobConfig.Endpoint = "http://127.0.0.1:9000"
  1151. user.FsConfig.AzBlobConfig.UploadPartSize = 8
  1152. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1153. assert.NoError(t, err)
  1154. initialPayload := user.FsConfig.AzBlobConfig.AccountKey.GetPayload()
  1155. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1156. assert.NotEmpty(t, initialPayload)
  1157. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1158. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1159. user.FsConfig.AzBlobConfig.AccountKey.SetStatus(kms.SecretStatusSecretBox)
  1160. user.FsConfig.AzBlobConfig.AccountKey.SetAdditionalData("data")
  1161. user.FsConfig.AzBlobConfig.AccountKey.SetKey("fake key")
  1162. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1163. assert.NoError(t, err)
  1164. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1165. assert.Equal(t, initialPayload, user.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  1166. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1167. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1168. _, err = httpd.RemoveUser(user, http.StatusOK)
  1169. assert.NoError(t, err)
  1170. user.Password = defaultPassword
  1171. user.ID = 0
  1172. secret := kms.NewSecret(kms.SecretStatusSecretBox, "Server-Account-Key", "", "")
  1173. user.FsConfig.AzBlobConfig.AccountKey = secret
  1174. _, _, err = httpd.AddUser(user, http.StatusOK)
  1175. assert.Error(t, err)
  1176. user.FsConfig.AzBlobConfig.AccountKey = kms.NewPlainSecret("Server-Account-Key-Test")
  1177. user, _, err = httpd.AddUser(user, http.StatusOK)
  1178. assert.NoError(t, err)
  1179. initialPayload = user.FsConfig.AzBlobConfig.AccountKey.GetPayload()
  1180. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1181. assert.NotEmpty(t, initialPayload)
  1182. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1183. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1184. user.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  1185. user.FsConfig.AzBlobConfig.Container = "test-container"
  1186. user.FsConfig.AzBlobConfig.Endpoint = "http://localhost:9001"
  1187. user.FsConfig.AzBlobConfig.KeyPrefix = "somedir/subdir"
  1188. user.FsConfig.AzBlobConfig.UploadConcurrency = 5
  1189. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1190. assert.NoError(t, err)
  1191. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1192. assert.NotEmpty(t, initialPayload)
  1193. assert.Equal(t, initialPayload, user.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  1194. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1195. assert.Empty(t, user.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1196. // test user without access key and access secret (sas)
  1197. user.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  1198. user.FsConfig.AzBlobConfig.SASURL = "https://myaccount.blob.core.windows.net/pictures/profile.jpg?sv=2012-02-12&st=2009-02-09&se=2009-02-10&sr=c&sp=r&si=YWJjZGVmZw%3d%3d&sig=dD80ihBh5jfNpymO5Hg1IdiJIEvHcJpCMiCMnN%2fRnbI%3d"
  1199. user.FsConfig.AzBlobConfig.KeyPrefix = "somedir/subdir"
  1200. user.FsConfig.AzBlobConfig.AccountName = ""
  1201. user.FsConfig.AzBlobConfig.AccountKey = kms.NewEmptySecret()
  1202. user.FsConfig.AzBlobConfig.UploadPartSize = 6
  1203. user.FsConfig.AzBlobConfig.UploadConcurrency = 4
  1204. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1205. assert.NoError(t, err)
  1206. assert.True(t, user.FsConfig.AzBlobConfig.AccountKey.IsEmpty())
  1207. _, err = httpd.RemoveUser(user, http.StatusOK)
  1208. assert.NoError(t, err)
  1209. user.Password = defaultPassword
  1210. user.ID = 0
  1211. // sas test for add instead of update
  1212. user, _, err = httpd.AddUser(user, http.StatusOK)
  1213. assert.NoError(t, err)
  1214. assert.True(t, user.FsConfig.AzBlobConfig.AccountKey.IsEmpty())
  1215. _, err = httpd.RemoveUser(user, http.StatusOK)
  1216. assert.NoError(t, err)
  1217. }
  1218. func TestUserCryptFs(t *testing.T) {
  1219. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1220. assert.NoError(t, err)
  1221. user.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  1222. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("crypt passphrase")
  1223. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1224. assert.NoError(t, err)
  1225. initialPayload := user.FsConfig.CryptConfig.Passphrase.GetPayload()
  1226. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.CryptConfig.Passphrase.GetStatus())
  1227. assert.NotEmpty(t, initialPayload)
  1228. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1229. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetKey())
  1230. user.FsConfig.CryptConfig.Passphrase.SetStatus(kms.SecretStatusSecretBox)
  1231. user.FsConfig.CryptConfig.Passphrase.SetAdditionalData("data")
  1232. user.FsConfig.CryptConfig.Passphrase.SetKey("fake pass key")
  1233. user, bb, err := httpd.UpdateUser(user, http.StatusOK, "")
  1234. assert.NoError(t, err, string(bb))
  1235. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.CryptConfig.Passphrase.GetStatus())
  1236. assert.Equal(t, initialPayload, user.FsConfig.CryptConfig.Passphrase.GetPayload())
  1237. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1238. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetKey())
  1239. _, err = httpd.RemoveUser(user, http.StatusOK)
  1240. assert.NoError(t, err)
  1241. user.Password = defaultPassword
  1242. user.ID = 0
  1243. secret := kms.NewSecret(kms.SecretStatusSecretBox, "invalid encrypted payload", "", "")
  1244. user.FsConfig.CryptConfig.Passphrase = secret
  1245. _, _, err = httpd.AddUser(user, http.StatusOK)
  1246. assert.Error(t, err)
  1247. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("passphrase test")
  1248. user, _, err = httpd.AddUser(user, http.StatusOK)
  1249. assert.NoError(t, err)
  1250. initialPayload = user.FsConfig.CryptConfig.Passphrase.GetPayload()
  1251. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.CryptConfig.Passphrase.GetStatus())
  1252. assert.NotEmpty(t, initialPayload)
  1253. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1254. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetKey())
  1255. user.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  1256. user.FsConfig.CryptConfig.Passphrase.SetKey("pass")
  1257. user, bb, err = httpd.UpdateUser(user, http.StatusOK, "")
  1258. assert.NoError(t, err, string(bb))
  1259. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.CryptConfig.Passphrase.GetStatus())
  1260. assert.NotEmpty(t, initialPayload)
  1261. assert.Equal(t, initialPayload, user.FsConfig.CryptConfig.Passphrase.GetPayload())
  1262. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1263. assert.Empty(t, user.FsConfig.CryptConfig.Passphrase.GetKey())
  1264. _, err = httpd.RemoveUser(user, http.StatusOK)
  1265. assert.NoError(t, err)
  1266. }
  1267. func TestUserSFTPFs(t *testing.T) {
  1268. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1269. assert.NoError(t, err)
  1270. user.FsConfig.Provider = dataprovider.SFTPFilesystemProvider
  1271. user.FsConfig.SFTPConfig.Endpoint = "127.0.0.1:2022"
  1272. user.FsConfig.SFTPConfig.Username = "sftp_user"
  1273. user.FsConfig.SFTPConfig.Password = kms.NewPlainSecret("sftp_pwd")
  1274. user.FsConfig.SFTPConfig.PrivateKey = kms.NewPlainSecret(sftpPrivateKey)
  1275. user.FsConfig.SFTPConfig.Fingerprints = []string{sftpPkeyFingerprint}
  1276. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1277. assert.NoError(t, err)
  1278. assert.Equal(t, "/", user.FsConfig.SFTPConfig.Prefix)
  1279. initialPwdPayload := user.FsConfig.SFTPConfig.Password.GetPayload()
  1280. initialPkeyPayload := user.FsConfig.SFTPConfig.PrivateKey.GetPayload()
  1281. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.Password.GetStatus())
  1282. assert.NotEmpty(t, initialPwdPayload)
  1283. assert.Empty(t, user.FsConfig.SFTPConfig.Password.GetAdditionalData())
  1284. assert.Empty(t, user.FsConfig.SFTPConfig.Password.GetKey())
  1285. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1286. assert.NotEmpty(t, initialPkeyPayload)
  1287. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1288. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1289. user.FsConfig.SFTPConfig.Password.SetStatus(kms.SecretStatusSecretBox)
  1290. user.FsConfig.SFTPConfig.Password.SetAdditionalData("adata")
  1291. user.FsConfig.SFTPConfig.Password.SetKey("fake pwd key")
  1292. user.FsConfig.SFTPConfig.PrivateKey.SetStatus(kms.SecretStatusSecretBox)
  1293. user.FsConfig.SFTPConfig.PrivateKey.SetAdditionalData("adata")
  1294. user.FsConfig.SFTPConfig.PrivateKey.SetKey("fake key")
  1295. user, bb, err := httpd.UpdateUser(user, http.StatusOK, "")
  1296. assert.NoError(t, err, string(bb))
  1297. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.Password.GetStatus())
  1298. assert.Equal(t, initialPwdPayload, user.FsConfig.SFTPConfig.Password.GetPayload())
  1299. assert.Empty(t, user.FsConfig.SFTPConfig.Password.GetAdditionalData())
  1300. assert.Empty(t, user.FsConfig.SFTPConfig.Password.GetKey())
  1301. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1302. assert.Equal(t, initialPkeyPayload, user.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  1303. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1304. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1305. _, err = httpd.RemoveUser(user, http.StatusOK)
  1306. assert.NoError(t, err)
  1307. user.Password = defaultPassword
  1308. user.ID = 0
  1309. secret := kms.NewSecret(kms.SecretStatusSecretBox, "invalid encrypted payload", "", "")
  1310. user.FsConfig.SFTPConfig.Password = secret
  1311. _, _, err = httpd.AddUser(user, http.StatusOK)
  1312. assert.Error(t, err)
  1313. user.FsConfig.SFTPConfig.Password = kms.NewEmptySecret()
  1314. user.FsConfig.SFTPConfig.PrivateKey = secret
  1315. _, _, err = httpd.AddUser(user, http.StatusOK)
  1316. assert.Error(t, err)
  1317. user.FsConfig.SFTPConfig.PrivateKey = kms.NewPlainSecret(sftpPrivateKey)
  1318. user, _, err = httpd.AddUser(user, http.StatusOK)
  1319. assert.NoError(t, err)
  1320. initialPkeyPayload = user.FsConfig.SFTPConfig.PrivateKey.GetPayload()
  1321. assert.Empty(t, user.FsConfig.SFTPConfig.Password.GetStatus())
  1322. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1323. assert.NotEmpty(t, initialPkeyPayload)
  1324. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1325. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1326. user.FsConfig.Provider = dataprovider.SFTPFilesystemProvider
  1327. user.FsConfig.SFTPConfig.PrivateKey.SetKey("k")
  1328. user, bb, err = httpd.UpdateUser(user, http.StatusOK, "")
  1329. assert.NoError(t, err, string(bb))
  1330. assert.Equal(t, kms.SecretStatusSecretBox, user.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1331. assert.NotEmpty(t, initialPkeyPayload)
  1332. assert.Equal(t, initialPkeyPayload, user.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  1333. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1334. assert.Empty(t, user.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1335. _, err = httpd.RemoveUser(user, http.StatusOK)
  1336. assert.NoError(t, err)
  1337. }
  1338. func TestUserHiddenFields(t *testing.T) {
  1339. err := dataprovider.Close()
  1340. assert.NoError(t, err)
  1341. err = config.LoadConfig(configDir, "")
  1342. assert.NoError(t, err)
  1343. providerConf := config.GetProviderConf()
  1344. providerConf.PreferDatabaseCredentials = true
  1345. err = dataprovider.Initialize(providerConf, configDir)
  1346. assert.NoError(t, err)
  1347. // sensitive data must be hidden but not deleted from the dataprovider
  1348. usernames := []string{"user1", "user2", "user3", "user4", "user5"}
  1349. u1 := getTestUser()
  1350. u1.Username = usernames[0]
  1351. u1.FsConfig.Provider = dataprovider.S3FilesystemProvider
  1352. u1.FsConfig.S3Config.Bucket = "test"
  1353. u1.FsConfig.S3Config.Region = "us-east-1"
  1354. u1.FsConfig.S3Config.AccessKey = "S3-Access-Key"
  1355. u1.FsConfig.S3Config.AccessSecret = kms.NewPlainSecret("S3-Access-Secret")
  1356. user1, _, err := httpd.AddUser(u1, http.StatusOK)
  1357. assert.NoError(t, err)
  1358. u2 := getTestUser()
  1359. u2.Username = usernames[1]
  1360. u2.FsConfig.Provider = dataprovider.GCSFilesystemProvider
  1361. u2.FsConfig.GCSConfig.Bucket = "test"
  1362. u2.FsConfig.GCSConfig.Credentials = kms.NewPlainSecret("fake credentials")
  1363. user2, _, err := httpd.AddUser(u2, http.StatusOK)
  1364. assert.NoError(t, err)
  1365. u3 := getTestUser()
  1366. u3.Username = usernames[2]
  1367. u3.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  1368. u3.FsConfig.AzBlobConfig.Container = "test"
  1369. u3.FsConfig.AzBlobConfig.AccountName = "Server-Account-Name"
  1370. u3.FsConfig.AzBlobConfig.AccountKey = kms.NewPlainSecret("Server-Account-Key")
  1371. user3, _, err := httpd.AddUser(u3, http.StatusOK)
  1372. assert.NoError(t, err)
  1373. u4 := getTestUser()
  1374. u4.Username = usernames[3]
  1375. u4.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  1376. u4.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("test passphrase")
  1377. user4, _, err := httpd.AddUser(u4, http.StatusOK)
  1378. assert.NoError(t, err)
  1379. u5 := getTestUser()
  1380. u5.Username = usernames[4]
  1381. u5.FsConfig.Provider = dataprovider.SFTPFilesystemProvider
  1382. u5.FsConfig.SFTPConfig.Endpoint = "127.0.0.1:2022"
  1383. u5.FsConfig.SFTPConfig.Username = "sftp_user"
  1384. u5.FsConfig.SFTPConfig.Password = kms.NewPlainSecret("apassword")
  1385. u5.FsConfig.SFTPConfig.PrivateKey = kms.NewPlainSecret(sftpPrivateKey)
  1386. u5.FsConfig.SFTPConfig.Fingerprints = []string{sftpPkeyFingerprint}
  1387. u5.FsConfig.SFTPConfig.Prefix = "/prefix"
  1388. user5, _, err := httpd.AddUser(u5, http.StatusOK)
  1389. assert.NoError(t, err)
  1390. users, _, err := httpd.GetUsers(0, 0, "", http.StatusOK)
  1391. assert.NoError(t, err)
  1392. assert.GreaterOrEqual(t, len(users), 5)
  1393. for _, username := range usernames {
  1394. users, _, err = httpd.GetUsers(0, 0, username, http.StatusOK)
  1395. assert.NoError(t, err)
  1396. if assert.Len(t, users, 1) {
  1397. user := users[0]
  1398. assert.Empty(t, user.Password)
  1399. }
  1400. }
  1401. user1, _, err = httpd.GetUserByID(user1.ID, http.StatusOK)
  1402. assert.NoError(t, err)
  1403. assert.Empty(t, user1.Password)
  1404. assert.Empty(t, user1.FsConfig.S3Config.AccessSecret.GetKey())
  1405. assert.Empty(t, user1.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1406. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetStatus())
  1407. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetPayload())
  1408. user2, _, err = httpd.GetUserByID(user2.ID, http.StatusOK)
  1409. assert.NoError(t, err)
  1410. assert.Empty(t, user2.Password)
  1411. assert.Empty(t, user2.FsConfig.GCSConfig.Credentials.GetKey())
  1412. assert.Empty(t, user2.FsConfig.GCSConfig.Credentials.GetAdditionalData())
  1413. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetStatus())
  1414. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetPayload())
  1415. user3, _, err = httpd.GetUserByID(user3.ID, http.StatusOK)
  1416. assert.NoError(t, err)
  1417. assert.Empty(t, user3.Password)
  1418. assert.Empty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1419. assert.Empty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1420. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1421. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  1422. user4, _, err = httpd.GetUserByID(user4.ID, http.StatusOK)
  1423. assert.NoError(t, err)
  1424. assert.Empty(t, user4.Password)
  1425. assert.Empty(t, user4.FsConfig.CryptConfig.Passphrase.GetKey())
  1426. assert.Empty(t, user4.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1427. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetStatus())
  1428. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetPayload())
  1429. user5, _, err = httpd.GetUserByID(user5.ID, http.StatusOK)
  1430. assert.NoError(t, err)
  1431. assert.Empty(t, user5.Password)
  1432. assert.Empty(t, user5.FsConfig.SFTPConfig.Password.GetKey())
  1433. assert.Empty(t, user5.FsConfig.SFTPConfig.Password.GetAdditionalData())
  1434. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetStatus())
  1435. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetPayload())
  1436. assert.Empty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1437. assert.Empty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1438. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1439. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  1440. assert.Equal(t, "/prefix", user5.FsConfig.SFTPConfig.Prefix)
  1441. // finally check that we have all the data inside the data provider
  1442. user1, err = dataprovider.GetUserByID(user1.ID)
  1443. assert.NoError(t, err)
  1444. assert.NotEmpty(t, user1.Password)
  1445. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetKey())
  1446. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1447. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetStatus())
  1448. assert.NotEmpty(t, user1.FsConfig.S3Config.AccessSecret.GetPayload())
  1449. err = user1.FsConfig.S3Config.AccessSecret.Decrypt()
  1450. assert.NoError(t, err)
  1451. assert.Equal(t, kms.SecretStatusPlain, user1.FsConfig.S3Config.AccessSecret.GetStatus())
  1452. assert.Equal(t, u1.FsConfig.S3Config.AccessSecret.GetPayload(), user1.FsConfig.S3Config.AccessSecret.GetPayload())
  1453. assert.Empty(t, user1.FsConfig.S3Config.AccessSecret.GetKey())
  1454. assert.Empty(t, user1.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  1455. user2, err = dataprovider.GetUserByID(user2.ID)
  1456. assert.NoError(t, err)
  1457. assert.NotEmpty(t, user2.Password)
  1458. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetKey())
  1459. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetAdditionalData())
  1460. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetStatus())
  1461. assert.NotEmpty(t, user2.FsConfig.GCSConfig.Credentials.GetPayload())
  1462. err = user2.FsConfig.GCSConfig.Credentials.Decrypt()
  1463. assert.NoError(t, err)
  1464. assert.Equal(t, kms.SecretStatusPlain, user2.FsConfig.GCSConfig.Credentials.GetStatus())
  1465. assert.Equal(t, u2.FsConfig.GCSConfig.Credentials.GetPayload(), user2.FsConfig.GCSConfig.Credentials.GetPayload())
  1466. assert.Empty(t, user2.FsConfig.GCSConfig.Credentials.GetKey())
  1467. assert.Empty(t, user2.FsConfig.GCSConfig.Credentials.GetAdditionalData())
  1468. user3, err = dataprovider.GetUserByID(user3.ID)
  1469. assert.NoError(t, err)
  1470. assert.NotEmpty(t, user3.Password)
  1471. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1472. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1473. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1474. assert.NotEmpty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  1475. err = user3.FsConfig.AzBlobConfig.AccountKey.Decrypt()
  1476. assert.NoError(t, err)
  1477. assert.Equal(t, kms.SecretStatusPlain, user3.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  1478. assert.Equal(t, u3.FsConfig.AzBlobConfig.AccountKey.GetPayload(), user3.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  1479. assert.Empty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetKey())
  1480. assert.Empty(t, user3.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  1481. user4, err = dataprovider.GetUserByID(user4.ID)
  1482. assert.NoError(t, err)
  1483. assert.NotEmpty(t, user4.Password)
  1484. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetKey())
  1485. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1486. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetStatus())
  1487. assert.NotEmpty(t, user4.FsConfig.CryptConfig.Passphrase.GetPayload())
  1488. err = user4.FsConfig.CryptConfig.Passphrase.Decrypt()
  1489. assert.NoError(t, err)
  1490. assert.Equal(t, kms.SecretStatusPlain, user4.FsConfig.CryptConfig.Passphrase.GetStatus())
  1491. assert.Equal(t, u4.FsConfig.CryptConfig.Passphrase.GetPayload(), user4.FsConfig.CryptConfig.Passphrase.GetPayload())
  1492. assert.Empty(t, user4.FsConfig.CryptConfig.Passphrase.GetKey())
  1493. assert.Empty(t, user4.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  1494. user5, err = dataprovider.GetUserByID(user5.ID)
  1495. assert.NoError(t, err)
  1496. assert.NotEmpty(t, user5.Password)
  1497. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetKey())
  1498. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetAdditionalData())
  1499. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetStatus())
  1500. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.Password.GetPayload())
  1501. err = user5.FsConfig.SFTPConfig.Password.Decrypt()
  1502. assert.NoError(t, err)
  1503. assert.Equal(t, kms.SecretStatusPlain, user5.FsConfig.SFTPConfig.Password.GetStatus())
  1504. assert.Equal(t, u5.FsConfig.SFTPConfig.Password.GetPayload(), user5.FsConfig.SFTPConfig.Password.GetPayload())
  1505. assert.Empty(t, user5.FsConfig.SFTPConfig.Password.GetKey())
  1506. assert.Empty(t, user5.FsConfig.SFTPConfig.Password.GetAdditionalData())
  1507. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1508. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1509. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1510. assert.NotEmpty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  1511. err = user5.FsConfig.SFTPConfig.PrivateKey.Decrypt()
  1512. assert.NoError(t, err)
  1513. assert.Equal(t, kms.SecretStatusPlain, user5.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  1514. assert.Equal(t, u5.FsConfig.SFTPConfig.PrivateKey.GetPayload(), user5.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  1515. assert.Empty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetKey())
  1516. assert.Empty(t, user5.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  1517. _, err = httpd.RemoveUser(user1, http.StatusOK)
  1518. assert.NoError(t, err)
  1519. _, err = httpd.RemoveUser(user2, http.StatusOK)
  1520. assert.NoError(t, err)
  1521. _, err = httpd.RemoveUser(user3, http.StatusOK)
  1522. assert.NoError(t, err)
  1523. _, err = httpd.RemoveUser(user4, http.StatusOK)
  1524. assert.NoError(t, err)
  1525. _, err = httpd.RemoveUser(user5, http.StatusOK)
  1526. assert.NoError(t, err)
  1527. err = dataprovider.Close()
  1528. assert.NoError(t, err)
  1529. err = config.LoadConfig(configDir, "")
  1530. assert.NoError(t, err)
  1531. providerConf = config.GetProviderConf()
  1532. providerConf.CredentialsPath = credentialsPath
  1533. err = os.RemoveAll(credentialsPath)
  1534. assert.NoError(t, err)
  1535. err = dataprovider.Initialize(providerConf, configDir)
  1536. assert.NoError(t, err)
  1537. }
  1538. func TestSecretObject(t *testing.T) {
  1539. s := kms.NewPlainSecret("test data")
  1540. s.SetAdditionalData("username")
  1541. require.True(t, s.IsValid())
  1542. err := s.Encrypt()
  1543. require.NoError(t, err)
  1544. require.Equal(t, kms.SecretStatusSecretBox, s.GetStatus())
  1545. require.NotEmpty(t, s.GetPayload())
  1546. require.NotEmpty(t, s.GetKey())
  1547. require.True(t, s.IsValid())
  1548. err = s.Decrypt()
  1549. require.NoError(t, err)
  1550. require.Equal(t, kms.SecretStatusPlain, s.GetStatus())
  1551. require.Equal(t, "test data", s.GetPayload())
  1552. require.Empty(t, s.GetKey())
  1553. oldFormat := "$aes$5b97e3a3324a2f53e2357483383367c0$0ed3132b584742ab217866219da633266782b69b13e50ebc6ddfb7c4fbf2f2a414c6d5f813"
  1554. s, err = kms.GetSecretFromCompatString(oldFormat)
  1555. require.NoError(t, err)
  1556. require.True(t, s.IsValid())
  1557. require.Equal(t, kms.SecretStatusPlain, s.GetStatus())
  1558. require.Equal(t, "test data", s.GetPayload())
  1559. require.Empty(t, s.GetKey())
  1560. }
  1561. func TestSecretObjectCompatibility(t *testing.T) {
  1562. // this is manually tested against vault too
  1563. testPayload := "test payload"
  1564. s := kms.NewPlainSecret(testPayload)
  1565. require.True(t, s.IsValid())
  1566. err := s.Encrypt()
  1567. require.NoError(t, err)
  1568. localAsJSON, err := json.Marshal(s)
  1569. assert.NoError(t, err)
  1570. for _, secretStatus := range []string{kms.SecretStatusSecretBox} {
  1571. kmsConfig := config.GetKMSConfig()
  1572. assert.Empty(t, kmsConfig.Secrets.MasterKeyPath)
  1573. if secretStatus == kms.SecretStatusVaultTransit {
  1574. os.Setenv("VAULT_SERVER_URL", "http://127.0.0.1:8200")
  1575. os.Setenv("VAULT_SERVER_TOKEN", "s.9lYGq83MbgG5KR5kfebXVyhJ")
  1576. kmsConfig.Secrets.URL = "hashivault://mykey"
  1577. }
  1578. err := kmsConfig.Initialize()
  1579. assert.NoError(t, err)
  1580. // encrypt without a master key
  1581. secret := kms.NewPlainSecret(testPayload)
  1582. secret.SetAdditionalData("add data")
  1583. err = secret.Encrypt()
  1584. assert.NoError(t, err)
  1585. assert.Equal(t, 0, secret.GetMode())
  1586. secretClone := secret.Clone()
  1587. err = secretClone.Decrypt()
  1588. assert.NoError(t, err)
  1589. assert.Equal(t, testPayload, secretClone.GetPayload())
  1590. if secretStatus == kms.SecretStatusVaultTransit {
  1591. // decrypt the local secret now that the provider is vault
  1592. secretLocal := kms.NewEmptySecret()
  1593. err = json.Unmarshal(localAsJSON, secretLocal)
  1594. assert.NoError(t, err)
  1595. assert.Equal(t, kms.SecretStatusSecretBox, secretLocal.GetStatus())
  1596. assert.Equal(t, 0, secretLocal.GetMode())
  1597. err = secretLocal.Decrypt()
  1598. assert.NoError(t, err)
  1599. assert.Equal(t, testPayload, secretLocal.GetPayload())
  1600. assert.Equal(t, kms.SecretStatusPlain, secretLocal.GetStatus())
  1601. err = secretLocal.Encrypt()
  1602. assert.NoError(t, err)
  1603. assert.Equal(t, kms.SecretStatusSecretBox, secretLocal.GetStatus())
  1604. assert.Equal(t, 0, secretLocal.GetMode())
  1605. }
  1606. asJSON, err := json.Marshal(secret)
  1607. assert.NoError(t, err)
  1608. masterKeyPath := filepath.Join(os.TempDir(), "mkey")
  1609. err = ioutil.WriteFile(masterKeyPath, []byte("test key"), os.ModePerm)
  1610. assert.NoError(t, err)
  1611. config := kms.Configuration{
  1612. Secrets: kms.Secrets{
  1613. MasterKeyPath: masterKeyPath,
  1614. },
  1615. }
  1616. if secretStatus == kms.SecretStatusVaultTransit {
  1617. config.Secrets.URL = "hashivault://mykey"
  1618. }
  1619. err = config.Initialize()
  1620. assert.NoError(t, err)
  1621. // now build the secret from JSON
  1622. secret = kms.NewEmptySecret()
  1623. err = json.Unmarshal(asJSON, secret)
  1624. assert.NoError(t, err)
  1625. assert.Equal(t, 0, secret.GetMode())
  1626. err = secret.Decrypt()
  1627. assert.NoError(t, err)
  1628. assert.Equal(t, testPayload, secret.GetPayload())
  1629. err = secret.Encrypt()
  1630. assert.NoError(t, err)
  1631. assert.Equal(t, 1, secret.GetMode())
  1632. err = secret.Decrypt()
  1633. assert.NoError(t, err)
  1634. assert.Equal(t, testPayload, secret.GetPayload())
  1635. if secretStatus == kms.SecretStatusVaultTransit {
  1636. // decrypt the local secret encryped without a master key now that
  1637. // the provider is vault and a master key is set.
  1638. // The provider will not change, the master key will be used
  1639. secretLocal := kms.NewEmptySecret()
  1640. err = json.Unmarshal(localAsJSON, secretLocal)
  1641. assert.NoError(t, err)
  1642. assert.Equal(t, kms.SecretStatusSecretBox, secretLocal.GetStatus())
  1643. assert.Equal(t, 0, secretLocal.GetMode())
  1644. err = secretLocal.Decrypt()
  1645. assert.NoError(t, err)
  1646. assert.Equal(t, testPayload, secretLocal.GetPayload())
  1647. assert.Equal(t, kms.SecretStatusPlain, secretLocal.GetStatus())
  1648. err = secretLocal.Encrypt()
  1649. assert.NoError(t, err)
  1650. assert.Equal(t, kms.SecretStatusSecretBox, secretLocal.GetStatus())
  1651. assert.Equal(t, 1, secretLocal.GetMode())
  1652. }
  1653. err = kmsConfig.Initialize()
  1654. assert.NoError(t, err)
  1655. err = os.Remove(masterKeyPath)
  1656. assert.NoError(t, err)
  1657. if secretStatus == kms.SecretStatusVaultTransit {
  1658. os.Unsetenv("VAULT_SERVER_URL")
  1659. os.Unsetenv("VAULT_SERVER_TOKEN")
  1660. }
  1661. }
  1662. }
  1663. func TestUpdateUserNoCredentials(t *testing.T) {
  1664. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1665. assert.NoError(t, err)
  1666. user.Password = ""
  1667. user.PublicKeys = []string{}
  1668. // password and public key will be omitted from json serialization if empty and so they will remain unchanged
  1669. // and no validation error will be raised
  1670. _, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  1671. assert.NoError(t, err)
  1672. _, err = httpd.RemoveUser(user, http.StatusOK)
  1673. assert.NoError(t, err)
  1674. }
  1675. func TestUpdateUserEmptyHomeDir(t *testing.T) {
  1676. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1677. assert.NoError(t, err)
  1678. user.HomeDir = ""
  1679. _, _, err = httpd.UpdateUser(user, http.StatusBadRequest, "")
  1680. assert.NoError(t, err)
  1681. _, err = httpd.RemoveUser(user, http.StatusOK)
  1682. assert.NoError(t, err)
  1683. }
  1684. func TestUpdateUserInvalidHomeDir(t *testing.T) {
  1685. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1686. assert.NoError(t, err)
  1687. user.HomeDir = "relative_path"
  1688. _, _, err = httpd.UpdateUser(user, http.StatusBadRequest, "")
  1689. assert.NoError(t, err)
  1690. _, err = httpd.RemoveUser(user, http.StatusOK)
  1691. assert.NoError(t, err)
  1692. }
  1693. func TestUpdateNonExistentUser(t *testing.T) {
  1694. _, _, err := httpd.UpdateUser(getTestUser(), http.StatusNotFound, "")
  1695. assert.NoError(t, err)
  1696. }
  1697. func TestGetNonExistentUser(t *testing.T) {
  1698. _, _, err := httpd.GetUserByID(0, http.StatusNotFound)
  1699. assert.NoError(t, err)
  1700. }
  1701. func TestDeleteNonExistentUser(t *testing.T) {
  1702. _, err := httpd.RemoveUser(getTestUser(), http.StatusNotFound)
  1703. assert.NoError(t, err)
  1704. }
  1705. func TestAddDuplicateUser(t *testing.T) {
  1706. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1707. assert.NoError(t, err)
  1708. _, _, err = httpd.AddUser(getTestUser(), http.StatusInternalServerError)
  1709. assert.NoError(t, err)
  1710. _, _, err = httpd.AddUser(getTestUser(), http.StatusOK)
  1711. assert.Error(t, err, "adding a duplicate user must fail")
  1712. _, err = httpd.RemoveUser(user, http.StatusOK)
  1713. assert.NoError(t, err)
  1714. }
  1715. func TestGetUsers(t *testing.T) {
  1716. user1, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1717. assert.NoError(t, err)
  1718. u := getTestUser()
  1719. u.Username = defaultUsername + "1"
  1720. user2, _, err := httpd.AddUser(u, http.StatusOK)
  1721. assert.NoError(t, err)
  1722. users, _, err := httpd.GetUsers(0, 0, "", http.StatusOK)
  1723. assert.NoError(t, err)
  1724. assert.GreaterOrEqual(t, len(users), 2)
  1725. users, _, err = httpd.GetUsers(1, 0, "", http.StatusOK)
  1726. assert.NoError(t, err)
  1727. assert.Equal(t, 1, len(users))
  1728. users, _, err = httpd.GetUsers(1, 1, "", http.StatusOK)
  1729. assert.NoError(t, err)
  1730. assert.Equal(t, 1, len(users))
  1731. _, _, err = httpd.GetUsers(1, 1, "", http.StatusInternalServerError)
  1732. assert.Error(t, err)
  1733. _, err = httpd.RemoveUser(user1, http.StatusOK)
  1734. assert.NoError(t, err)
  1735. _, err = httpd.RemoveUser(user2, http.StatusOK)
  1736. assert.NoError(t, err)
  1737. }
  1738. func TestGetQuotaScans(t *testing.T) {
  1739. _, _, err := httpd.GetQuotaScans(http.StatusOK)
  1740. assert.NoError(t, err)
  1741. _, _, err = httpd.GetQuotaScans(http.StatusInternalServerError)
  1742. assert.Error(t, err)
  1743. _, _, err = httpd.GetFoldersQuotaScans(http.StatusOK)
  1744. assert.NoError(t, err)
  1745. _, _, err = httpd.GetFoldersQuotaScans(http.StatusInternalServerError)
  1746. assert.Error(t, err)
  1747. }
  1748. func TestStartQuotaScan(t *testing.T) {
  1749. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1750. assert.NoError(t, err)
  1751. _, err = httpd.StartQuotaScan(user, http.StatusAccepted)
  1752. assert.NoError(t, err)
  1753. _, err = httpd.RemoveUser(user, http.StatusOK)
  1754. assert.NoError(t, err)
  1755. folder := vfs.BaseVirtualFolder{
  1756. MappedPath: filepath.Join(os.TempDir(), "folder"),
  1757. }
  1758. _, _, err = httpd.AddFolder(folder, http.StatusOK)
  1759. assert.NoError(t, err)
  1760. _, err = httpd.StartFolderQuotaScan(folder, http.StatusAccepted)
  1761. assert.NoError(t, err)
  1762. for {
  1763. quotaScan, _, err := httpd.GetFoldersQuotaScans(http.StatusOK)
  1764. if !assert.NoError(t, err, "Error getting active scans") {
  1765. break
  1766. }
  1767. if len(quotaScan) == 0 {
  1768. break
  1769. }
  1770. time.Sleep(100 * time.Millisecond)
  1771. }
  1772. _, err = httpd.RemoveFolder(folder, http.StatusOK)
  1773. assert.NoError(t, err)
  1774. }
  1775. func TestUpdateFolderQuotaUsage(t *testing.T) {
  1776. f := vfs.BaseVirtualFolder{
  1777. MappedPath: filepath.Join(os.TempDir(), "folder"),
  1778. }
  1779. usedQuotaFiles := 1
  1780. usedQuotaSize := int64(65535)
  1781. f.UsedQuotaFiles = usedQuotaFiles
  1782. f.UsedQuotaSize = usedQuotaSize
  1783. folder, _, err := httpd.AddFolder(f, http.StatusOK)
  1784. if assert.NoError(t, err) {
  1785. assert.Equal(t, usedQuotaFiles, folder.UsedQuotaFiles)
  1786. assert.Equal(t, usedQuotaSize, folder.UsedQuotaSize)
  1787. }
  1788. _, err = httpd.UpdateFolderQuotaUsage(folder, "invalid mode", http.StatusBadRequest)
  1789. assert.NoError(t, err)
  1790. _, err = httpd.UpdateFolderQuotaUsage(f, "reset", http.StatusOK)
  1791. assert.NoError(t, err)
  1792. folders, _, err := httpd.GetFolders(0, 0, f.MappedPath, http.StatusOK)
  1793. assert.NoError(t, err)
  1794. if assert.Len(t, folders, 1) {
  1795. folder = folders[0]
  1796. assert.Equal(t, usedQuotaFiles, folder.UsedQuotaFiles)
  1797. assert.Equal(t, usedQuotaSize, folder.UsedQuotaSize)
  1798. }
  1799. _, err = httpd.UpdateFolderQuotaUsage(f, "add", http.StatusOK)
  1800. assert.NoError(t, err)
  1801. folders, _, err = httpd.GetFolders(0, 0, f.MappedPath, http.StatusOK)
  1802. assert.NoError(t, err)
  1803. if assert.Len(t, folders, 1) {
  1804. folder = folders[0]
  1805. assert.Equal(t, 2*usedQuotaFiles, folder.UsedQuotaFiles)
  1806. assert.Equal(t, 2*usedQuotaSize, folder.UsedQuotaSize)
  1807. }
  1808. f.UsedQuotaSize = -1
  1809. _, err = httpd.UpdateFolderQuotaUsage(f, "", http.StatusBadRequest)
  1810. assert.NoError(t, err)
  1811. f.UsedQuotaSize = usedQuotaSize
  1812. f.MappedPath = f.MappedPath + "1"
  1813. _, err = httpd.UpdateFolderQuotaUsage(f, "", http.StatusNotFound)
  1814. assert.NoError(t, err)
  1815. _, err = httpd.RemoveFolder(folder, http.StatusOK)
  1816. assert.NoError(t, err)
  1817. }
  1818. func TestGetVersion(t *testing.T) {
  1819. _, _, err := httpd.GetVersion(http.StatusOK)
  1820. assert.NoError(t, err)
  1821. _, _, err = httpd.GetVersion(http.StatusInternalServerError)
  1822. assert.Error(t, err, "get version request must succeed, we requested to check a wrong status code")
  1823. }
  1824. func TestGetStatus(t *testing.T) {
  1825. _, _, err := httpd.GetStatus(http.StatusOK)
  1826. assert.NoError(t, err)
  1827. _, _, err = httpd.GetStatus(http.StatusBadRequest)
  1828. assert.Error(t, err, "get provider status request must succeed, we requested to check a wrong status code")
  1829. }
  1830. func TestGetConnections(t *testing.T) {
  1831. _, _, err := httpd.GetConnections(http.StatusOK)
  1832. assert.NoError(t, err)
  1833. _, _, err = httpd.GetConnections(http.StatusInternalServerError)
  1834. assert.Error(t, err, "get sftp connections request must succeed, we requested to check a wrong status code")
  1835. }
  1836. func TestCloseActiveConnection(t *testing.T) {
  1837. _, err := httpd.CloseConnection("non_existent_id", http.StatusNotFound)
  1838. assert.NoError(t, err)
  1839. user := getTestUser()
  1840. c := common.NewBaseConnection("connID", common.ProtocolSFTP, user, nil)
  1841. fakeConn := &fakeConnection{
  1842. BaseConnection: c,
  1843. }
  1844. common.Connections.Add(fakeConn)
  1845. _, err = httpd.CloseConnection(c.GetID(), http.StatusOK)
  1846. assert.NoError(t, err)
  1847. assert.Len(t, common.Connections.GetStats(), 0)
  1848. }
  1849. func TestCloseConnectionAfterUserUpdateDelete(t *testing.T) {
  1850. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1851. assert.NoError(t, err)
  1852. c := common.NewBaseConnection("connID", common.ProtocolFTP, user, nil)
  1853. fakeConn := &fakeConnection{
  1854. BaseConnection: c,
  1855. }
  1856. common.Connections.Add(fakeConn)
  1857. c1 := common.NewBaseConnection("connID1", common.ProtocolSFTP, user, nil)
  1858. fakeConn1 := &fakeConnection{
  1859. BaseConnection: c1,
  1860. }
  1861. common.Connections.Add(fakeConn1)
  1862. user, _, err = httpd.UpdateUser(user, http.StatusOK, "0")
  1863. assert.NoError(t, err)
  1864. assert.Len(t, common.Connections.GetStats(), 2)
  1865. user, _, err = httpd.UpdateUser(user, http.StatusOK, "1")
  1866. assert.NoError(t, err)
  1867. assert.Len(t, common.Connections.GetStats(), 0)
  1868. common.Connections.Add(fakeConn)
  1869. common.Connections.Add(fakeConn1)
  1870. assert.Len(t, common.Connections.GetStats(), 2)
  1871. _, err = httpd.RemoveUser(user, http.StatusOK)
  1872. assert.NoError(t, err)
  1873. assert.Len(t, common.Connections.GetStats(), 0)
  1874. }
  1875. func TestUserBaseDir(t *testing.T) {
  1876. err := dataprovider.Close()
  1877. assert.NoError(t, err)
  1878. err = config.LoadConfig(configDir, "")
  1879. assert.NoError(t, err)
  1880. providerConf := config.GetProviderConf()
  1881. providerConf.UsersBaseDir = homeBasePath
  1882. err = dataprovider.Initialize(providerConf, configDir)
  1883. assert.NoError(t, err)
  1884. u := getTestUser()
  1885. u.HomeDir = ""
  1886. user, _, err := httpd.AddUser(u, http.StatusOK)
  1887. if assert.Error(t, err) {
  1888. assert.EqualError(t, err, "HomeDir mismatch")
  1889. }
  1890. assert.Equal(t, filepath.Join(providerConf.UsersBaseDir, u.Username), user.HomeDir)
  1891. _, err = httpd.RemoveUser(user, http.StatusOK)
  1892. assert.NoError(t, err)
  1893. err = dataprovider.Close()
  1894. assert.NoError(t, err)
  1895. err = config.LoadConfig(configDir, "")
  1896. assert.NoError(t, err)
  1897. providerConf = config.GetProviderConf()
  1898. providerConf.CredentialsPath = credentialsPath
  1899. err = os.RemoveAll(credentialsPath)
  1900. assert.NoError(t, err)
  1901. err = dataprovider.Initialize(providerConf, configDir)
  1902. assert.NoError(t, err)
  1903. }
  1904. func TestQuotaTrackingDisabled(t *testing.T) {
  1905. err := dataprovider.Close()
  1906. assert.NoError(t, err)
  1907. err = config.LoadConfig(configDir, "")
  1908. assert.NoError(t, err)
  1909. providerConf := config.GetProviderConf()
  1910. providerConf.TrackQuota = 0
  1911. err = dataprovider.Initialize(providerConf, configDir)
  1912. assert.NoError(t, err)
  1913. // user quota scan must fail
  1914. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  1915. assert.NoError(t, err)
  1916. _, err = httpd.StartQuotaScan(user, http.StatusForbidden)
  1917. assert.NoError(t, err)
  1918. _, err = httpd.UpdateQuotaUsage(user, "", http.StatusForbidden)
  1919. assert.NoError(t, err)
  1920. _, err = httpd.RemoveUser(user, http.StatusOK)
  1921. assert.NoError(t, err)
  1922. // folder quota scan must fail
  1923. folder := vfs.BaseVirtualFolder{
  1924. MappedPath: filepath.Clean(os.TempDir()),
  1925. }
  1926. folder, _, err = httpd.AddFolder(folder, http.StatusOK)
  1927. assert.NoError(t, err)
  1928. _, err = httpd.StartFolderQuotaScan(folder, http.StatusForbidden)
  1929. assert.NoError(t, err)
  1930. _, err = httpd.UpdateFolderQuotaUsage(folder, "", http.StatusForbidden)
  1931. assert.NoError(t, err)
  1932. _, err = httpd.RemoveFolder(folder, http.StatusOK)
  1933. assert.NoError(t, err)
  1934. err = dataprovider.Close()
  1935. assert.NoError(t, err)
  1936. err = config.LoadConfig(configDir, "")
  1937. assert.NoError(t, err)
  1938. providerConf = config.GetProviderConf()
  1939. providerConf.CredentialsPath = credentialsPath
  1940. err = os.RemoveAll(credentialsPath)
  1941. assert.NoError(t, err)
  1942. err = dataprovider.Initialize(providerConf, configDir)
  1943. assert.NoError(t, err)
  1944. }
  1945. func TestProviderErrors(t *testing.T) {
  1946. err := dataprovider.Close()
  1947. assert.NoError(t, err)
  1948. _, _, err = httpd.GetUserByID(0, http.StatusInternalServerError)
  1949. assert.NoError(t, err)
  1950. _, _, err = httpd.GetUsers(1, 0, defaultUsername, http.StatusInternalServerError)
  1951. assert.NoError(t, err)
  1952. _, _, err = httpd.UpdateUser(dataprovider.User{}, http.StatusInternalServerError, "")
  1953. assert.NoError(t, err)
  1954. _, err = httpd.RemoveUser(dataprovider.User{}, http.StatusInternalServerError)
  1955. assert.NoError(t, err)
  1956. _, err = httpd.RemoveFolder(vfs.BaseVirtualFolder{MappedPath: "apath"}, http.StatusInternalServerError)
  1957. assert.NoError(t, err)
  1958. status, _, err := httpd.GetStatus(http.StatusOK)
  1959. if assert.NoError(t, err) {
  1960. assert.False(t, status.DataProvider.IsActive)
  1961. }
  1962. _, _, err = httpd.Dumpdata("backup.json", "", http.StatusInternalServerError)
  1963. assert.NoError(t, err)
  1964. _, _, err = httpd.GetFolders(0, 0, "", http.StatusInternalServerError)
  1965. assert.NoError(t, err)
  1966. user := getTestUser()
  1967. user.ID = 1
  1968. backupData := dataprovider.BackupData{}
  1969. backupData.Users = append(backupData.Users, user)
  1970. backupContent, err := json.Marshal(backupData)
  1971. assert.NoError(t, err)
  1972. backupFilePath := filepath.Join(backupsPath, "backup.json")
  1973. err = ioutil.WriteFile(backupFilePath, backupContent, os.ModePerm)
  1974. assert.NoError(t, err)
  1975. _, _, err = httpd.Loaddata(backupFilePath, "", "", http.StatusInternalServerError)
  1976. assert.NoError(t, err)
  1977. backupData.Folders = append(backupData.Folders, vfs.BaseVirtualFolder{MappedPath: os.TempDir()})
  1978. backupContent, err = json.Marshal(backupData)
  1979. assert.NoError(t, err)
  1980. err = ioutil.WriteFile(backupFilePath, backupContent, os.ModePerm)
  1981. assert.NoError(t, err)
  1982. _, _, err = httpd.Loaddata(backupFilePath, "", "", http.StatusInternalServerError)
  1983. assert.NoError(t, err)
  1984. err = os.Remove(backupFilePath)
  1985. assert.NoError(t, err)
  1986. req, err := http.NewRequest(http.MethodGet, webUserPath+"?cloneFromId=1234", nil)
  1987. assert.NoError(t, err)
  1988. rr := executeRequest(req)
  1989. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  1990. err = config.LoadConfig(configDir, "")
  1991. assert.NoError(t, err)
  1992. providerConf := config.GetProviderConf()
  1993. providerConf.CredentialsPath = credentialsPath
  1994. err = os.RemoveAll(credentialsPath)
  1995. assert.NoError(t, err)
  1996. err = dataprovider.Initialize(providerConf, configDir)
  1997. assert.NoError(t, err)
  1998. }
  1999. func TestFolders(t *testing.T) {
  2000. folder := vfs.BaseVirtualFolder{
  2001. MappedPath: "relative path",
  2002. }
  2003. _, _, err := httpd.AddFolder(folder, http.StatusBadRequest)
  2004. assert.NoError(t, err)
  2005. folder.MappedPath = filepath.Clean(os.TempDir())
  2006. folder1, _, err := httpd.AddFolder(folder, http.StatusOK)
  2007. assert.NoError(t, err)
  2008. assert.Equal(t, folder.MappedPath, folder1.MappedPath)
  2009. assert.Equal(t, 0, folder1.UsedQuotaFiles)
  2010. assert.Equal(t, int64(0), folder1.UsedQuotaSize)
  2011. assert.Equal(t, int64(0), folder1.LastQuotaUpdate)
  2012. // adding a duplicate folder must fail
  2013. _, _, err = httpd.AddFolder(folder, http.StatusOK)
  2014. assert.Error(t, err)
  2015. folder.MappedPath = filepath.Join(os.TempDir(), "vfolder")
  2016. folder.UsedQuotaFiles = 1
  2017. folder.UsedQuotaSize = 345
  2018. folder.LastQuotaUpdate = 10
  2019. folder2, _, err := httpd.AddFolder(folder, http.StatusOK)
  2020. assert.NoError(t, err)
  2021. assert.Equal(t, 1, folder2.UsedQuotaFiles)
  2022. assert.Equal(t, int64(345), folder2.UsedQuotaSize)
  2023. assert.Equal(t, int64(10), folder2.LastQuotaUpdate)
  2024. folders, _, err := httpd.GetFolders(0, 0, "", http.StatusOK)
  2025. assert.NoError(t, err)
  2026. numResults := len(folders)
  2027. assert.GreaterOrEqual(t, numResults, 2)
  2028. folders, _, err = httpd.GetFolders(0, 1, "", http.StatusOK)
  2029. assert.NoError(t, err)
  2030. assert.Len(t, folders, numResults-1)
  2031. folders, _, err = httpd.GetFolders(1, 0, "", http.StatusOK)
  2032. assert.NoError(t, err)
  2033. assert.Len(t, folders, 1)
  2034. folders, _, err = httpd.GetFolders(0, 0, folder1.MappedPath, http.StatusOK)
  2035. assert.NoError(t, err)
  2036. if assert.Len(t, folders, 1) {
  2037. f := folders[0]
  2038. assert.Equal(t, folder1.MappedPath, f.MappedPath)
  2039. }
  2040. folders, _, err = httpd.GetFolders(0, 0, folder2.MappedPath, http.StatusOK)
  2041. assert.NoError(t, err)
  2042. if assert.Len(t, folders, 1) {
  2043. f := folders[0]
  2044. assert.Equal(t, folder2.MappedPath, f.MappedPath)
  2045. }
  2046. _, err = httpd.RemoveFolder(vfs.BaseVirtualFolder{}, http.StatusBadRequest)
  2047. assert.NoError(t, err)
  2048. _, err = httpd.RemoveFolder(vfs.BaseVirtualFolder{
  2049. MappedPath: "invalid",
  2050. }, http.StatusNotFound)
  2051. assert.NoError(t, err)
  2052. _, err = httpd.RemoveFolder(folder1, http.StatusOK)
  2053. assert.NoError(t, err)
  2054. _, err = httpd.RemoveFolder(folder2, http.StatusOK)
  2055. assert.NoError(t, err)
  2056. }
  2057. func TestDumpdata(t *testing.T) {
  2058. err := dataprovider.Close()
  2059. assert.NoError(t, err)
  2060. err = config.LoadConfig(configDir, "")
  2061. assert.NoError(t, err)
  2062. providerConf := config.GetProviderConf()
  2063. err = dataprovider.Initialize(providerConf, configDir)
  2064. assert.NoError(t, err)
  2065. _, _, err = httpd.Dumpdata("", "", http.StatusBadRequest)
  2066. assert.NoError(t, err)
  2067. _, _, err = httpd.Dumpdata(filepath.Join(backupsPath, "backup.json"), "", http.StatusBadRequest)
  2068. assert.NoError(t, err)
  2069. _, _, err = httpd.Dumpdata("../backup.json", "", http.StatusBadRequest)
  2070. assert.NoError(t, err)
  2071. _, _, err = httpd.Dumpdata("backup.json", "0", http.StatusOK)
  2072. assert.NoError(t, err)
  2073. _, _, err = httpd.Dumpdata("backup.json", "1", http.StatusOK)
  2074. assert.NoError(t, err)
  2075. err = os.Remove(filepath.Join(backupsPath, "backup.json"))
  2076. assert.NoError(t, err)
  2077. if runtime.GOOS != "windows" {
  2078. err = os.Chmod(backupsPath, 0001)
  2079. assert.NoError(t, err)
  2080. _, _, err = httpd.Dumpdata("bck.json", "", http.StatusInternalServerError)
  2081. assert.NoError(t, err)
  2082. // subdir cannot be created
  2083. _, _, err = httpd.Dumpdata(filepath.Join("subdir", "bck.json"), "", http.StatusInternalServerError)
  2084. assert.NoError(t, err)
  2085. err = os.Chmod(backupsPath, 0755)
  2086. assert.NoError(t, err)
  2087. }
  2088. err = dataprovider.Close()
  2089. assert.NoError(t, err)
  2090. err = config.LoadConfig(configDir, "")
  2091. assert.NoError(t, err)
  2092. providerConf = config.GetProviderConf()
  2093. providerConf.CredentialsPath = credentialsPath
  2094. err = os.RemoveAll(credentialsPath)
  2095. assert.NoError(t, err)
  2096. err = dataprovider.Initialize(providerConf, configDir)
  2097. assert.NoError(t, err)
  2098. }
  2099. func TestDefenderAPI(t *testing.T) {
  2100. oldConfig := config.GetCommonConfig()
  2101. cfg := config.GetCommonConfig()
  2102. cfg.DefenderConfig.Enabled = true
  2103. cfg.DefenderConfig.Threshold = 3
  2104. err := common.Initialize(cfg)
  2105. require.NoError(t, err)
  2106. ip := "::1"
  2107. response, _, err := httpd.GetBanTime(ip, http.StatusOK)
  2108. require.NoError(t, err)
  2109. banTime, ok := response["date_time"]
  2110. require.True(t, ok)
  2111. assert.Nil(t, banTime)
  2112. response, _, err = httpd.GetScore(ip, http.StatusOK)
  2113. require.NoError(t, err)
  2114. score, ok := response["score"]
  2115. require.True(t, ok)
  2116. assert.Equal(t, float64(0), score)
  2117. err = httpd.UnbanIP(ip, http.StatusNotFound)
  2118. require.NoError(t, err)
  2119. common.AddDefenderEvent(ip, common.HostEventNoLoginTried)
  2120. response, _, err = httpd.GetScore(ip, http.StatusOK)
  2121. require.NoError(t, err)
  2122. score, ok = response["score"]
  2123. require.True(t, ok)
  2124. assert.Equal(t, float64(2), score)
  2125. common.AddDefenderEvent(ip, common.HostEventNoLoginTried)
  2126. response, _, err = httpd.GetBanTime(ip, http.StatusOK)
  2127. require.NoError(t, err)
  2128. banTime, ok = response["date_time"]
  2129. require.True(t, ok)
  2130. assert.NotNil(t, banTime)
  2131. err = httpd.UnbanIP(ip, http.StatusOK)
  2132. require.NoError(t, err)
  2133. err = httpd.UnbanIP(ip, http.StatusNotFound)
  2134. require.NoError(t, err)
  2135. err = common.Initialize(oldConfig)
  2136. require.NoError(t, err)
  2137. }
  2138. func TestDefenderAPIErrors(t *testing.T) {
  2139. _, _, err := httpd.GetBanTime("", http.StatusBadRequest)
  2140. require.NoError(t, err)
  2141. _, _, err = httpd.GetBanTime("invalid", http.StatusBadRequest)
  2142. require.NoError(t, err)
  2143. _, _, err = httpd.GetScore("", http.StatusBadRequest)
  2144. require.NoError(t, err)
  2145. err = httpd.UnbanIP("", http.StatusBadRequest)
  2146. require.NoError(t, err)
  2147. }
  2148. func TestLoaddata(t *testing.T) {
  2149. mappedPath := filepath.Join(os.TempDir(), "restored_folder")
  2150. user := getTestUser()
  2151. user.ID = 1
  2152. user.Username = "test_user_restore"
  2153. backupData := dataprovider.BackupData{}
  2154. backupData.Users = append(backupData.Users, user)
  2155. backupData.Folders = []vfs.BaseVirtualFolder{
  2156. {
  2157. MappedPath: mappedPath,
  2158. UsedQuotaSize: 123,
  2159. UsedQuotaFiles: 456,
  2160. LastQuotaUpdate: 789,
  2161. Users: []string{"user"},
  2162. },
  2163. {
  2164. MappedPath: mappedPath,
  2165. },
  2166. }
  2167. backupContent, err := json.Marshal(backupData)
  2168. assert.NoError(t, err)
  2169. backupFilePath := filepath.Join(backupsPath, "backup.json")
  2170. err = ioutil.WriteFile(backupFilePath, backupContent, os.ModePerm)
  2171. assert.NoError(t, err)
  2172. _, _, err = httpd.Loaddata(backupFilePath, "a", "", http.StatusBadRequest)
  2173. assert.NoError(t, err)
  2174. _, _, err = httpd.Loaddata(backupFilePath, "", "a", http.StatusBadRequest)
  2175. assert.NoError(t, err)
  2176. _, _, err = httpd.Loaddata("backup.json", "1", "", http.StatusBadRequest)
  2177. assert.NoError(t, err)
  2178. _, _, err = httpd.Loaddata(backupFilePath+"a", "1", "", http.StatusBadRequest)
  2179. assert.NoError(t, err)
  2180. if runtime.GOOS != "windows" {
  2181. err = os.Chmod(backupFilePath, 0111)
  2182. assert.NoError(t, err)
  2183. _, _, err = httpd.Loaddata(backupFilePath, "1", "", http.StatusInternalServerError)
  2184. assert.NoError(t, err)
  2185. err = os.Chmod(backupFilePath, 0644)
  2186. assert.NoError(t, err)
  2187. }
  2188. // add user and folder from backup
  2189. _, _, err = httpd.Loaddata(backupFilePath, "1", "", http.StatusOK)
  2190. assert.NoError(t, err)
  2191. // update user from backup
  2192. _, _, err = httpd.Loaddata(backupFilePath, "2", "", http.StatusOK)
  2193. assert.NoError(t, err)
  2194. users, _, err := httpd.GetUsers(1, 0, user.Username, http.StatusOK)
  2195. assert.NoError(t, err)
  2196. if assert.Len(t, users, 1) {
  2197. user = users[0]
  2198. _, err = httpd.RemoveUser(user, http.StatusOK)
  2199. assert.NoError(t, err)
  2200. }
  2201. folders, _, err := httpd.GetFolders(1, 0, mappedPath, http.StatusOK)
  2202. assert.NoError(t, err)
  2203. if assert.Len(t, folders, 1) {
  2204. folder := folders[0]
  2205. assert.Equal(t, mappedPath, folder.MappedPath)
  2206. assert.Equal(t, int64(123), folder.UsedQuotaSize)
  2207. assert.Equal(t, 456, folder.UsedQuotaFiles)
  2208. assert.Equal(t, int64(789), folder.LastQuotaUpdate)
  2209. assert.Len(t, folder.Users, 0)
  2210. _, err = httpd.RemoveFolder(folder, http.StatusOK)
  2211. assert.NoError(t, err)
  2212. }
  2213. err = os.Remove(backupFilePath)
  2214. assert.NoError(t, err)
  2215. err = createTestFile(backupFilePath, 10485761)
  2216. assert.NoError(t, err)
  2217. _, _, err = httpd.Loaddata(backupFilePath, "1", "0", http.StatusBadRequest)
  2218. assert.NoError(t, err)
  2219. err = os.Remove(backupFilePath)
  2220. assert.NoError(t, err)
  2221. err = createTestFile(backupFilePath, 65535)
  2222. assert.NoError(t, err)
  2223. _, _, err = httpd.Loaddata(backupFilePath, "1", "0", http.StatusBadRequest)
  2224. assert.NoError(t, err)
  2225. err = os.Remove(backupFilePath)
  2226. assert.NoError(t, err)
  2227. }
  2228. func TestLoaddataMode(t *testing.T) {
  2229. user := getTestUser()
  2230. user.ID = 1
  2231. user.Username = "test_user_restore"
  2232. backupData := dataprovider.BackupData{}
  2233. backupData.Users = append(backupData.Users, user)
  2234. backupContent, _ := json.Marshal(backupData)
  2235. backupFilePath := filepath.Join(backupsPath, "backup.json")
  2236. err := ioutil.WriteFile(backupFilePath, backupContent, os.ModePerm)
  2237. assert.NoError(t, err)
  2238. _, _, err = httpd.Loaddata(backupFilePath, "0", "0", http.StatusOK)
  2239. assert.NoError(t, err)
  2240. users, _, err := httpd.GetUsers(1, 0, user.Username, http.StatusOK)
  2241. assert.NoError(t, err)
  2242. assert.Equal(t, 1, len(users))
  2243. user = users[0]
  2244. oldUploadBandwidth := user.UploadBandwidth
  2245. user.UploadBandwidth = oldUploadBandwidth + 128
  2246. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  2247. assert.NoError(t, err)
  2248. _, _, err = httpd.Loaddata(backupFilePath, "0", "1", http.StatusOK)
  2249. assert.NoError(t, err)
  2250. c := common.NewBaseConnection("connID", common.ProtocolFTP, user, nil)
  2251. fakeConn := &fakeConnection{
  2252. BaseConnection: c,
  2253. }
  2254. common.Connections.Add(fakeConn)
  2255. assert.Len(t, common.Connections.GetStats(), 1)
  2256. users, _, err = httpd.GetUsers(1, 0, user.Username, http.StatusOK)
  2257. assert.NoError(t, err)
  2258. assert.Equal(t, 1, len(users))
  2259. user = users[0]
  2260. assert.NotEqual(t, oldUploadBandwidth, user.UploadBandwidth)
  2261. _, _, err = httpd.Loaddata(backupFilePath, "0", "2", http.StatusOK)
  2262. assert.NoError(t, err)
  2263. // mode 2 will update the user and close the previous connection
  2264. assert.Len(t, common.Connections.GetStats(), 0)
  2265. users, _, err = httpd.GetUsers(1, 0, user.Username, http.StatusOK)
  2266. assert.NoError(t, err)
  2267. assert.Equal(t, 1, len(users))
  2268. user = users[0]
  2269. assert.Equal(t, oldUploadBandwidth, user.UploadBandwidth)
  2270. _, err = httpd.RemoveUser(user, http.StatusOK)
  2271. assert.NoError(t, err)
  2272. err = os.Remove(backupFilePath)
  2273. assert.NoError(t, err)
  2274. }
  2275. func TestHTTPSConnection(t *testing.T) {
  2276. client := &http.Client{
  2277. Timeout: 5 * time.Second,
  2278. }
  2279. resp, err := client.Get("https://localhost:8443" + metricsPath)
  2280. if assert.Error(t, err) {
  2281. if !strings.Contains(err.Error(), "certificate is not valid") &&
  2282. !strings.Contains(err.Error(), "certificate signed by unknown authority") {
  2283. assert.Fail(t, err.Error())
  2284. }
  2285. } else {
  2286. resp.Body.Close()
  2287. }
  2288. }
  2289. // test using mock http server
  2290. func TestBasicUserHandlingMock(t *testing.T) {
  2291. user := getTestUser()
  2292. userAsJSON := getUserAsJSON(t, user)
  2293. req, err := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2294. assert.NoError(t, err)
  2295. rr := executeRequest(req)
  2296. checkResponseCode(t, http.StatusOK, rr.Code)
  2297. err = render.DecodeJSON(rr.Body, &user)
  2298. assert.NoError(t, err)
  2299. req, _ = http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2300. rr = executeRequest(req)
  2301. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  2302. user.MaxSessions = 10
  2303. user.UploadBandwidth = 128
  2304. user.Permissions["/"] = []string{dataprovider.PermAny, dataprovider.PermDelete, dataprovider.PermDownload}
  2305. userAsJSON = getUserAsJSON(t, user)
  2306. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2307. rr = executeRequest(req)
  2308. checkResponseCode(t, http.StatusOK, rr.Code)
  2309. req, _ = http.NewRequest(http.MethodGet, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2310. rr = executeRequest(req)
  2311. checkResponseCode(t, http.StatusOK, rr.Code)
  2312. var updatedUser dataprovider.User
  2313. err = render.DecodeJSON(rr.Body, &updatedUser)
  2314. assert.NoError(t, err)
  2315. assert.Equal(t, user.MaxSessions, updatedUser.MaxSessions)
  2316. assert.Equal(t, user.UploadBandwidth, updatedUser.UploadBandwidth)
  2317. assert.Equal(t, 1, len(updatedUser.Permissions["/"]))
  2318. assert.True(t, utils.IsStringInSlice(dataprovider.PermAny, updatedUser.Permissions["/"]))
  2319. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2320. rr = executeRequest(req)
  2321. checkResponseCode(t, http.StatusOK, rr.Code)
  2322. }
  2323. func TestGetUserByIdInvalidParamsMock(t *testing.T) {
  2324. req, _ := http.NewRequest(http.MethodGet, userPath+"/0", nil)
  2325. rr := executeRequest(req)
  2326. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2327. req, _ = http.NewRequest(http.MethodGet, userPath+"/a", nil)
  2328. rr = executeRequest(req)
  2329. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2330. }
  2331. func TestAddUserNoUsernameMock(t *testing.T) {
  2332. user := getTestUser()
  2333. user.Username = ""
  2334. userAsJSON := getUserAsJSON(t, user)
  2335. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2336. rr := executeRequest(req)
  2337. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2338. }
  2339. func TestAddUserInvalidHomeDirMock(t *testing.T) {
  2340. user := getTestUser()
  2341. user.HomeDir = "relative_path"
  2342. userAsJSON := getUserAsJSON(t, user)
  2343. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2344. rr := executeRequest(req)
  2345. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2346. }
  2347. func TestAddUserInvalidPermsMock(t *testing.T) {
  2348. user := getTestUser()
  2349. user.Permissions["/"] = []string{}
  2350. userAsJSON := getUserAsJSON(t, user)
  2351. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2352. rr := executeRequest(req)
  2353. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2354. }
  2355. func TestAddFolderInvalidJsonMock(t *testing.T) {
  2356. req, _ := http.NewRequest(http.MethodPost, folderPath, bytes.NewBuffer([]byte("invalid json")))
  2357. rr := executeRequest(req)
  2358. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2359. }
  2360. func TestUnbanInvalidJsonMock(t *testing.T) {
  2361. req, _ := http.NewRequest(http.MethodPost, defenderUnban, bytes.NewBuffer([]byte("invalid json")))
  2362. rr := executeRequest(req)
  2363. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2364. }
  2365. func TestAddUserInvalidJsonMock(t *testing.T) {
  2366. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer([]byte("invalid json")))
  2367. rr := executeRequest(req)
  2368. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2369. }
  2370. func TestUpdateUserMock(t *testing.T) {
  2371. user := getTestUser()
  2372. userAsJSON := getUserAsJSON(t, user)
  2373. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2374. rr := executeRequest(req)
  2375. checkResponseCode(t, http.StatusOK, rr.Code)
  2376. err := render.DecodeJSON(rr.Body, &user)
  2377. assert.NoError(t, err)
  2378. // permissions should not change if empty or nil
  2379. permissions := user.Permissions
  2380. user.Permissions = make(map[string][]string)
  2381. userAsJSON = getUserAsJSON(t, user)
  2382. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2383. rr = executeRequest(req)
  2384. checkResponseCode(t, http.StatusOK, rr.Code)
  2385. req, _ = http.NewRequest(http.MethodGet, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2386. rr = executeRequest(req)
  2387. checkResponseCode(t, http.StatusOK, rr.Code)
  2388. var updatedUser dataprovider.User
  2389. err = render.DecodeJSON(rr.Body, &updatedUser)
  2390. assert.NoError(t, err)
  2391. for dir, perms := range permissions {
  2392. if actualPerms, ok := updatedUser.Permissions[dir]; ok {
  2393. for _, v := range actualPerms {
  2394. assert.True(t, utils.IsStringInSlice(v, perms))
  2395. }
  2396. } else {
  2397. assert.Fail(t, "Permissions directories mismatch")
  2398. }
  2399. }
  2400. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2401. rr = executeRequest(req)
  2402. checkResponseCode(t, http.StatusOK, rr.Code)
  2403. }
  2404. func TestUpdateUserQuotaUsageMock(t *testing.T) {
  2405. var user dataprovider.User
  2406. u := getTestUser()
  2407. usedQuotaFiles := 1
  2408. usedQuotaSize := int64(65535)
  2409. u.UsedQuotaFiles = usedQuotaFiles
  2410. u.UsedQuotaSize = usedQuotaSize
  2411. userAsJSON := getUserAsJSON(t, u)
  2412. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2413. rr := executeRequest(req)
  2414. checkResponseCode(t, http.StatusOK, rr.Code)
  2415. err := render.DecodeJSON(rr.Body, &user)
  2416. assert.NoError(t, err)
  2417. req, _ = http.NewRequest(http.MethodPut, updateUsedQuotaPath, bytes.NewBuffer(userAsJSON))
  2418. rr = executeRequest(req)
  2419. checkResponseCode(t, http.StatusOK, rr.Code)
  2420. req, _ = http.NewRequest(http.MethodGet, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2421. rr = executeRequest(req)
  2422. checkResponseCode(t, http.StatusOK, rr.Code)
  2423. err = render.DecodeJSON(rr.Body, &user)
  2424. assert.NoError(t, err)
  2425. assert.Equal(t, usedQuotaFiles, user.UsedQuotaFiles)
  2426. assert.Equal(t, usedQuotaSize, user.UsedQuotaSize)
  2427. req, _ = http.NewRequest(http.MethodPut, updateUsedQuotaPath, bytes.NewBuffer([]byte("string")))
  2428. rr = executeRequest(req)
  2429. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2430. assert.True(t, common.QuotaScans.AddUserQuotaScan(user.Username))
  2431. req, _ = http.NewRequest(http.MethodPut, updateUsedQuotaPath, bytes.NewBuffer(userAsJSON))
  2432. rr = executeRequest(req)
  2433. checkResponseCode(t, http.StatusConflict, rr.Code)
  2434. assert.True(t, common.QuotaScans.RemoveUserQuotaScan(user.Username))
  2435. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2436. rr = executeRequest(req)
  2437. checkResponseCode(t, http.StatusOK, rr.Code)
  2438. }
  2439. func TestUserPermissionsMock(t *testing.T) {
  2440. user := getTestUser()
  2441. user.Permissions = make(map[string][]string)
  2442. user.Permissions["/somedir"] = []string{dataprovider.PermAny}
  2443. userAsJSON := getUserAsJSON(t, user)
  2444. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2445. rr := executeRequest(req)
  2446. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2447. user.Permissions = make(map[string][]string)
  2448. user.Permissions["/"] = []string{dataprovider.PermAny}
  2449. user.Permissions[".."] = []string{dataprovider.PermAny}
  2450. userAsJSON = getUserAsJSON(t, user)
  2451. req, _ = http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2452. rr = executeRequest(req)
  2453. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2454. user.Permissions = make(map[string][]string)
  2455. user.Permissions["/"] = []string{dataprovider.PermAny}
  2456. userAsJSON = getUserAsJSON(t, user)
  2457. req, _ = http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2458. rr = executeRequest(req)
  2459. checkResponseCode(t, http.StatusOK, rr.Code)
  2460. err := render.DecodeJSON(rr.Body, &user)
  2461. assert.NoError(t, err)
  2462. user.Permissions["/somedir"] = []string{"invalid"}
  2463. userAsJSON = getUserAsJSON(t, user)
  2464. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2465. rr = executeRequest(req)
  2466. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2467. delete(user.Permissions, "/somedir")
  2468. user.Permissions["/somedir/.."] = []string{dataprovider.PermAny}
  2469. userAsJSON = getUserAsJSON(t, user)
  2470. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2471. rr = executeRequest(req)
  2472. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2473. delete(user.Permissions, "/somedir/..")
  2474. user.Permissions["not_abs_path"] = []string{dataprovider.PermAny}
  2475. userAsJSON = getUserAsJSON(t, user)
  2476. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2477. rr = executeRequest(req)
  2478. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2479. delete(user.Permissions, "not_abs_path")
  2480. user.Permissions["/somedir/../otherdir/"] = []string{dataprovider.PermListItems}
  2481. userAsJSON = getUserAsJSON(t, user)
  2482. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2483. rr = executeRequest(req)
  2484. checkResponseCode(t, http.StatusOK, rr.Code)
  2485. req, _ = http.NewRequest(http.MethodGet, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2486. rr = executeRequest(req)
  2487. checkResponseCode(t, http.StatusOK, rr.Code)
  2488. var updatedUser dataprovider.User
  2489. err = render.DecodeJSON(rr.Body, &updatedUser)
  2490. assert.NoError(t, err)
  2491. if val, ok := updatedUser.Permissions["/otherdir"]; ok {
  2492. assert.True(t, utils.IsStringInSlice(dataprovider.PermListItems, val))
  2493. assert.Equal(t, 1, len(val))
  2494. } else {
  2495. assert.Fail(t, "expected dir not found in permissions")
  2496. }
  2497. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2498. rr = executeRequest(req)
  2499. checkResponseCode(t, http.StatusOK, rr.Code)
  2500. }
  2501. func TestUpdateUserInvalidJsonMock(t *testing.T) {
  2502. user := getTestUser()
  2503. userAsJSON := getUserAsJSON(t, user)
  2504. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2505. rr := executeRequest(req)
  2506. checkResponseCode(t, http.StatusOK, rr.Code)
  2507. err := render.DecodeJSON(rr.Body, &user)
  2508. assert.NoError(t, err)
  2509. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer([]byte("Invalid json")))
  2510. rr = executeRequest(req)
  2511. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2512. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2513. rr = executeRequest(req)
  2514. checkResponseCode(t, http.StatusOK, rr.Code)
  2515. }
  2516. func TestUpdateUserInvalidParamsMock(t *testing.T) {
  2517. user := getTestUser()
  2518. userAsJSON := getUserAsJSON(t, user)
  2519. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2520. rr := executeRequest(req)
  2521. checkResponseCode(t, http.StatusOK, rr.Code)
  2522. err := render.DecodeJSON(rr.Body, &user)
  2523. assert.NoError(t, err)
  2524. user.HomeDir = ""
  2525. userAsJSON = getUserAsJSON(t, user)
  2526. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(user.ID, 10), bytes.NewBuffer(userAsJSON))
  2527. rr = executeRequest(req)
  2528. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2529. userID := user.ID
  2530. user.ID = 0
  2531. userAsJSON = getUserAsJSON(t, user)
  2532. req, _ = http.NewRequest(http.MethodPut, userPath+"/"+strconv.FormatInt(userID, 10), bytes.NewBuffer(userAsJSON))
  2533. rr = executeRequest(req)
  2534. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2535. user.ID = userID
  2536. req, _ = http.NewRequest(http.MethodPut, userPath+"/0", bytes.NewBuffer(userAsJSON))
  2537. rr = executeRequest(req)
  2538. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2539. req, _ = http.NewRequest(http.MethodPut, userPath+"/a", bytes.NewBuffer(userAsJSON))
  2540. rr = executeRequest(req)
  2541. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2542. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2543. rr = executeRequest(req)
  2544. checkResponseCode(t, http.StatusOK, rr.Code)
  2545. }
  2546. func TestGetUsersMock(t *testing.T) {
  2547. user := getTestUser()
  2548. userAsJSON := getUserAsJSON(t, user)
  2549. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2550. rr := executeRequest(req)
  2551. checkResponseCode(t, http.StatusOK, rr.Code)
  2552. err := render.DecodeJSON(rr.Body, &user)
  2553. assert.NoError(t, err)
  2554. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=510&offset=0&order=ASC&username="+defaultUsername, nil)
  2555. rr = executeRequest(req)
  2556. checkResponseCode(t, http.StatusOK, rr.Code)
  2557. var users []dataprovider.User
  2558. err = render.DecodeJSON(rr.Body, &users)
  2559. assert.NoError(t, err)
  2560. assert.Equal(t, 1, len(users))
  2561. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=a&offset=0&order=ASC", nil)
  2562. rr = executeRequest(req)
  2563. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2564. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=a&order=ASC", nil)
  2565. rr = executeRequest(req)
  2566. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2567. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASCa", nil)
  2568. rr = executeRequest(req)
  2569. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2570. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2571. rr = executeRequest(req)
  2572. checkResponseCode(t, http.StatusOK, rr.Code)
  2573. }
  2574. func TestDeleteUserInvalidParamsMock(t *testing.T) {
  2575. req, _ := http.NewRequest(http.MethodDelete, userPath+"/0", nil)
  2576. rr := executeRequest(req)
  2577. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2578. req, _ = http.NewRequest(http.MethodDelete, userPath+"/a", nil)
  2579. rr = executeRequest(req)
  2580. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2581. }
  2582. func TestGetQuotaScansMock(t *testing.T) {
  2583. req, err := http.NewRequest("GET", quotaScanPath, nil)
  2584. assert.NoError(t, err)
  2585. rr := executeRequest(req)
  2586. checkResponseCode(t, http.StatusOK, rr.Code)
  2587. }
  2588. func TestStartQuotaScanMock(t *testing.T) {
  2589. user := getTestUser()
  2590. userAsJSON := getUserAsJSON(t, user)
  2591. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2592. rr := executeRequest(req)
  2593. checkResponseCode(t, http.StatusOK, rr.Code)
  2594. err := render.DecodeJSON(rr.Body, &user)
  2595. assert.NoError(t, err)
  2596. _, err = os.Stat(user.HomeDir)
  2597. if err == nil {
  2598. err = os.Remove(user.HomeDir)
  2599. assert.NoError(t, err)
  2600. }
  2601. // simulate a duplicate quota scan
  2602. userAsJSON = getUserAsJSON(t, user)
  2603. common.QuotaScans.AddUserQuotaScan(user.Username)
  2604. req, _ = http.NewRequest(http.MethodPost, quotaScanPath, bytes.NewBuffer(userAsJSON))
  2605. rr = executeRequest(req)
  2606. checkResponseCode(t, http.StatusConflict, rr.Code)
  2607. assert.True(t, common.QuotaScans.RemoveUserQuotaScan(user.Username))
  2608. userAsJSON = getUserAsJSON(t, user)
  2609. req, _ = http.NewRequest(http.MethodPost, quotaScanPath, bytes.NewBuffer(userAsJSON))
  2610. rr = executeRequest(req)
  2611. checkResponseCode(t, http.StatusAccepted, rr.Code)
  2612. for {
  2613. var scans []common.ActiveQuotaScan
  2614. req, _ = http.NewRequest(http.MethodGet, quotaScanPath, nil)
  2615. rr = executeRequest(req)
  2616. checkResponseCode(t, http.StatusOK, rr.Code)
  2617. err = render.DecodeJSON(rr.Body, &scans)
  2618. if !assert.NoError(t, err, "Error getting active scans") {
  2619. break
  2620. }
  2621. if len(scans) == 0 {
  2622. break
  2623. }
  2624. time.Sleep(100 * time.Millisecond)
  2625. }
  2626. _, err = os.Stat(user.HomeDir)
  2627. if err != nil && os.IsNotExist(err) {
  2628. err = os.MkdirAll(user.HomeDir, os.ModePerm)
  2629. assert.NoError(t, err)
  2630. }
  2631. req, _ = http.NewRequest(http.MethodPost, quotaScanPath, bytes.NewBuffer(userAsJSON))
  2632. rr = executeRequest(req)
  2633. checkResponseCode(t, http.StatusAccepted, rr.Code)
  2634. for {
  2635. var scans []common.ActiveQuotaScan
  2636. req, _ = http.NewRequest(http.MethodGet, quotaScanPath, nil)
  2637. rr = executeRequest(req)
  2638. checkResponseCode(t, http.StatusOK, rr.Code)
  2639. err = render.DecodeJSON(rr.Body, &scans)
  2640. if !assert.NoError(t, err) {
  2641. assert.Fail(t, err.Error(), "Error getting active scans")
  2642. break
  2643. }
  2644. if len(scans) == 0 {
  2645. break
  2646. }
  2647. time.Sleep(100 * time.Millisecond)
  2648. }
  2649. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2650. rr = executeRequest(req)
  2651. checkResponseCode(t, http.StatusOK, rr.Code)
  2652. err = os.RemoveAll(user.GetHomeDir())
  2653. assert.NoError(t, err)
  2654. }
  2655. func TestUpdateFolderQuotaUsageMock(t *testing.T) {
  2656. mappedPath := filepath.Join(os.TempDir(), "vfolder")
  2657. f := vfs.BaseVirtualFolder{
  2658. MappedPath: mappedPath,
  2659. }
  2660. usedQuotaFiles := 1
  2661. usedQuotaSize := int64(65535)
  2662. f.UsedQuotaFiles = usedQuotaFiles
  2663. f.UsedQuotaSize = usedQuotaSize
  2664. var folder vfs.BaseVirtualFolder
  2665. folderAsJSON, err := json.Marshal(f)
  2666. assert.NoError(t, err)
  2667. req, _ := http.NewRequest(http.MethodPost, folderPath, bytes.NewBuffer(folderAsJSON))
  2668. rr := executeRequest(req)
  2669. checkResponseCode(t, http.StatusOK, rr.Code)
  2670. err = render.DecodeJSON(rr.Body, &folder)
  2671. assert.NoError(t, err)
  2672. req, _ = http.NewRequest(http.MethodPut, updateFolderUsedQuotaPath, bytes.NewBuffer(folderAsJSON))
  2673. rr = executeRequest(req)
  2674. checkResponseCode(t, http.StatusOK, rr.Code)
  2675. var folders []vfs.BaseVirtualFolder
  2676. url, err := url.Parse(folderPath)
  2677. assert.NoError(t, err)
  2678. q := url.Query()
  2679. q.Add("folder_path", mappedPath)
  2680. url.RawQuery = q.Encode()
  2681. req, _ = http.NewRequest(http.MethodGet, url.String(), nil)
  2682. rr = executeRequest(req)
  2683. checkResponseCode(t, http.StatusOK, rr.Code)
  2684. err = render.DecodeJSON(rr.Body, &folders)
  2685. assert.NoError(t, err)
  2686. if assert.Len(t, folders, 1) {
  2687. folder = folders[0]
  2688. assert.Equal(t, usedQuotaFiles, folder.UsedQuotaFiles)
  2689. assert.Equal(t, usedQuotaSize, folder.UsedQuotaSize)
  2690. }
  2691. req, _ = http.NewRequest(http.MethodPut, updateFolderUsedQuotaPath, bytes.NewBuffer([]byte("string")))
  2692. rr = executeRequest(req)
  2693. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2694. assert.True(t, common.QuotaScans.AddVFolderQuotaScan(mappedPath))
  2695. req, _ = http.NewRequest(http.MethodPut, updateFolderUsedQuotaPath, bytes.NewBuffer(folderAsJSON))
  2696. rr = executeRequest(req)
  2697. checkResponseCode(t, http.StatusConflict, rr.Code)
  2698. assert.True(t, common.QuotaScans.RemoveVFolderQuotaScan(mappedPath))
  2699. url, err = url.Parse(folderPath)
  2700. assert.NoError(t, err)
  2701. q = url.Query()
  2702. q.Add("folder_path", mappedPath)
  2703. url.RawQuery = q.Encode()
  2704. req, _ = http.NewRequest(http.MethodDelete, url.String(), nil)
  2705. rr = executeRequest(req)
  2706. checkResponseCode(t, http.StatusOK, rr.Code)
  2707. }
  2708. func TestStartFolderQuotaScanMock(t *testing.T) {
  2709. mappedPath := filepath.Join(os.TempDir(), "vfolder")
  2710. folder := vfs.BaseVirtualFolder{
  2711. MappedPath: mappedPath,
  2712. }
  2713. folderAsJSON, err := json.Marshal(folder)
  2714. assert.NoError(t, err)
  2715. req, _ := http.NewRequest(http.MethodPost, folderPath, bytes.NewBuffer(folderAsJSON))
  2716. rr := executeRequest(req)
  2717. checkResponseCode(t, http.StatusOK, rr.Code)
  2718. _, err = os.Stat(mappedPath)
  2719. if err == nil {
  2720. err = os.Remove(mappedPath)
  2721. assert.NoError(t, err)
  2722. }
  2723. // simulate a duplicate quota scan
  2724. common.QuotaScans.AddVFolderQuotaScan(mappedPath)
  2725. req, _ = http.NewRequest(http.MethodPost, quotaScanVFolderPath, bytes.NewBuffer(folderAsJSON))
  2726. rr = executeRequest(req)
  2727. checkResponseCode(t, http.StatusConflict, rr.Code)
  2728. assert.True(t, common.QuotaScans.RemoveVFolderQuotaScan(mappedPath))
  2729. // and now a real quota scan
  2730. _, err = os.Stat(mappedPath)
  2731. if err != nil && os.IsNotExist(err) {
  2732. err = os.MkdirAll(mappedPath, os.ModePerm)
  2733. assert.NoError(t, err)
  2734. }
  2735. req, _ = http.NewRequest(http.MethodPost, quotaScanVFolderPath, bytes.NewBuffer(folderAsJSON))
  2736. rr = executeRequest(req)
  2737. checkResponseCode(t, http.StatusAccepted, rr.Code)
  2738. var scans []common.ActiveVirtualFolderQuotaScan
  2739. for {
  2740. req, _ = http.NewRequest(http.MethodGet, quotaScanVFolderPath, nil)
  2741. rr = executeRequest(req)
  2742. checkResponseCode(t, http.StatusOK, rr.Code)
  2743. err = render.DecodeJSON(rr.Body, &scans)
  2744. if !assert.NoError(t, err, "Error getting active folders scans") {
  2745. break
  2746. }
  2747. if len(scans) == 0 {
  2748. break
  2749. }
  2750. time.Sleep(100 * time.Millisecond)
  2751. }
  2752. // cleanup
  2753. url, err := url.Parse(folderPath)
  2754. assert.NoError(t, err)
  2755. q := url.Query()
  2756. q.Add("folder_path", mappedPath)
  2757. url.RawQuery = q.Encode()
  2758. req, _ = http.NewRequest(http.MethodDelete, url.String(), nil)
  2759. rr = executeRequest(req)
  2760. checkResponseCode(t, http.StatusOK, rr.Code)
  2761. err = os.RemoveAll(folderPath)
  2762. assert.NoError(t, err)
  2763. err = os.RemoveAll(mappedPath)
  2764. assert.NoError(t, err)
  2765. }
  2766. func TestStartQuotaScanNonExistentUserMock(t *testing.T) {
  2767. user := getTestUser()
  2768. userAsJSON := getUserAsJSON(t, user)
  2769. req, _ := http.NewRequest(http.MethodPost, quotaScanPath, bytes.NewBuffer(userAsJSON))
  2770. rr := executeRequest(req)
  2771. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2772. }
  2773. func TestStartQuotaScanBadUserMock(t *testing.T) {
  2774. req, _ := http.NewRequest(http.MethodPost, quotaScanPath, bytes.NewBuffer([]byte("invalid json")))
  2775. rr := executeRequest(req)
  2776. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2777. }
  2778. func TestStartQuotaScanBadFolderMock(t *testing.T) {
  2779. req, _ := http.NewRequest(http.MethodPost, quotaScanVFolderPath, bytes.NewBuffer([]byte("invalid json")))
  2780. rr := executeRequest(req)
  2781. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2782. }
  2783. func TestStartQuotaScanNonExistentFolderMock(t *testing.T) {
  2784. folder := vfs.BaseVirtualFolder{
  2785. MappedPath: os.TempDir(),
  2786. }
  2787. folderAsJSON, err := json.Marshal(folder)
  2788. assert.NoError(t, err)
  2789. req, _ := http.NewRequest(http.MethodPost, quotaScanVFolderPath, bytes.NewBuffer(folderAsJSON))
  2790. rr := executeRequest(req)
  2791. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2792. }
  2793. func TestGetFoldersMock(t *testing.T) {
  2794. mappedPath := filepath.Join(os.TempDir(), "vfolder")
  2795. folder := vfs.BaseVirtualFolder{
  2796. MappedPath: mappedPath,
  2797. }
  2798. folderAsJSON, err := json.Marshal(folder)
  2799. assert.NoError(t, err)
  2800. req, _ := http.NewRequest(http.MethodPost, folderPath, bytes.NewBuffer(folderAsJSON))
  2801. rr := executeRequest(req)
  2802. checkResponseCode(t, http.StatusOK, rr.Code)
  2803. err = render.DecodeJSON(rr.Body, &folder)
  2804. assert.NoError(t, err)
  2805. var folders []vfs.BaseVirtualFolder
  2806. url, err := url.Parse(folderPath + "?limit=510&offset=0&order=DESC")
  2807. assert.NoError(t, err)
  2808. q := url.Query()
  2809. q.Add("folder_path", mappedPath)
  2810. url.RawQuery = q.Encode()
  2811. req, _ = http.NewRequest(http.MethodGet, url.String(), nil)
  2812. rr = executeRequest(req)
  2813. checkResponseCode(t, http.StatusOK, rr.Code)
  2814. err = render.DecodeJSON(rr.Body, &folders)
  2815. assert.NoError(t, err)
  2816. assert.Len(t, folders, 1)
  2817. req, _ = http.NewRequest(http.MethodGet, folderPath+"?limit=a&offset=0&order=ASC", nil)
  2818. rr = executeRequest(req)
  2819. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2820. req, _ = http.NewRequest(http.MethodGet, folderPath+"?limit=1&offset=a&order=ASC", nil)
  2821. rr = executeRequest(req)
  2822. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2823. req, _ = http.NewRequest(http.MethodGet, folderPath+"?limit=1&offset=0&order=ASCa", nil)
  2824. rr = executeRequest(req)
  2825. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2826. url, err = url.Parse(folderPath)
  2827. assert.NoError(t, err)
  2828. q = url.Query()
  2829. q.Add("folder_path", mappedPath)
  2830. url.RawQuery = q.Encode()
  2831. req, _ = http.NewRequest(http.MethodDelete, url.String(), nil)
  2832. rr = executeRequest(req)
  2833. checkResponseCode(t, http.StatusOK, rr.Code)
  2834. }
  2835. func TestGetVersionMock(t *testing.T) {
  2836. req, _ := http.NewRequest(http.MethodGet, versionPath, nil)
  2837. rr := executeRequest(req)
  2838. checkResponseCode(t, http.StatusOK, rr.Code)
  2839. }
  2840. func TestGetConnectionsMock(t *testing.T) {
  2841. req, _ := http.NewRequest(http.MethodGet, activeConnectionsPath, nil)
  2842. rr := executeRequest(req)
  2843. checkResponseCode(t, http.StatusOK, rr.Code)
  2844. }
  2845. func TestGetStatusMock(t *testing.T) {
  2846. req, _ := http.NewRequest(http.MethodGet, serverStatusPath, nil)
  2847. rr := executeRequest(req)
  2848. checkResponseCode(t, http.StatusOK, rr.Code)
  2849. }
  2850. func TestDeleteActiveConnectionMock(t *testing.T) {
  2851. req, _ := http.NewRequest(http.MethodDelete, activeConnectionsPath+"/connectionID", nil)
  2852. rr := executeRequest(req)
  2853. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2854. }
  2855. func TestNotFoundMock(t *testing.T) {
  2856. req, _ := http.NewRequest(http.MethodGet, "/non/existing/path", nil)
  2857. rr := executeRequest(req)
  2858. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2859. }
  2860. func TestMethodNotAllowedMock(t *testing.T) {
  2861. req, _ := http.NewRequest(http.MethodPost, activeConnectionsPath, nil)
  2862. rr := executeRequest(req)
  2863. checkResponseCode(t, http.StatusMethodNotAllowed, rr.Code)
  2864. }
  2865. func TestMetricsMock(t *testing.T) {
  2866. req, _ := http.NewRequest(http.MethodGet, metricsPath, nil)
  2867. rr := executeRequest(req)
  2868. checkResponseCode(t, http.StatusOK, rr.Code)
  2869. }
  2870. func TestHealthCheck(t *testing.T) {
  2871. req, _ := http.NewRequest(http.MethodGet, "/healthz", nil)
  2872. rr := executeRequest(req)
  2873. checkResponseCode(t, http.StatusOK, rr.Code)
  2874. assert.Equal(t, "ok", rr.Body.String())
  2875. }
  2876. func TestGetWebRootMock(t *testing.T) {
  2877. req, _ := http.NewRequest(http.MethodGet, "/", nil)
  2878. rr := executeRequest(req)
  2879. checkResponseCode(t, http.StatusMovedPermanently, rr.Code)
  2880. req, _ = http.NewRequest(http.MethodGet, webBasePath, nil)
  2881. rr = executeRequest(req)
  2882. checkResponseCode(t, http.StatusMovedPermanently, rr.Code)
  2883. }
  2884. func TestBasicWebUsersMock(t *testing.T) {
  2885. user := getTestUser()
  2886. userAsJSON := getUserAsJSON(t, user)
  2887. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  2888. rr := executeRequest(req)
  2889. checkResponseCode(t, http.StatusOK, rr.Code)
  2890. err := render.DecodeJSON(rr.Body, &user)
  2891. assert.NoError(t, err)
  2892. user1 := getTestUser()
  2893. user1.Username += "1"
  2894. user1AsJSON := getUserAsJSON(t, user1)
  2895. req, _ = http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(user1AsJSON))
  2896. rr = executeRequest(req)
  2897. checkResponseCode(t, http.StatusOK, rr.Code)
  2898. err = render.DecodeJSON(rr.Body, &user1)
  2899. assert.NoError(t, err)
  2900. req, _ = http.NewRequest(http.MethodGet, webUsersPath, nil)
  2901. rr = executeRequest(req)
  2902. checkResponseCode(t, http.StatusOK, rr.Code)
  2903. req, _ = http.NewRequest(http.MethodGet, webUsersPath+"?qlimit=a", nil)
  2904. rr = executeRequest(req)
  2905. checkResponseCode(t, http.StatusOK, rr.Code)
  2906. req, _ = http.NewRequest(http.MethodGet, webUsersPath+"?qlimit=1", nil)
  2907. rr = executeRequest(req)
  2908. checkResponseCode(t, http.StatusOK, rr.Code)
  2909. req, _ = http.NewRequest(http.MethodGet, webUserPath, nil)
  2910. rr = executeRequest(req)
  2911. checkResponseCode(t, http.StatusOK, rr.Code)
  2912. req, _ = http.NewRequest(http.MethodGet, webUserPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2913. rr = executeRequest(req)
  2914. checkResponseCode(t, http.StatusOK, rr.Code)
  2915. req, _ = http.NewRequest(http.MethodGet, webUserPath+"/0", nil)
  2916. rr = executeRequest(req)
  2917. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2918. req, _ = http.NewRequest(http.MethodGet, webUserPath+"/a", nil)
  2919. rr = executeRequest(req)
  2920. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2921. form := make(url.Values)
  2922. form.Set("username", user.Username)
  2923. b, contentType, _ := getMultipartFormData(form, "", "")
  2924. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  2925. req.Header.Set("Content-Type", contentType)
  2926. rr = executeRequest(req)
  2927. checkResponseCode(t, http.StatusOK, rr.Code)
  2928. b, contentType, _ = getMultipartFormData(form, "", "")
  2929. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  2930. req.Header.Set("Content-Type", contentType)
  2931. rr = executeRequest(req)
  2932. checkResponseCode(t, http.StatusOK, rr.Code)
  2933. b, contentType, _ = getMultipartFormData(form, "", "")
  2934. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/0", &b)
  2935. req.Header.Set("Content-Type", contentType)
  2936. rr = executeRequest(req)
  2937. checkResponseCode(t, http.StatusNotFound, rr.Code)
  2938. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/a", &b)
  2939. req.Header.Set("Content-Type", contentType)
  2940. rr = executeRequest(req)
  2941. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  2942. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  2943. rr = executeRequest(req)
  2944. checkResponseCode(t, http.StatusOK, rr.Code)
  2945. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user1.ID, 10), nil)
  2946. rr = executeRequest(req)
  2947. checkResponseCode(t, http.StatusOK, rr.Code)
  2948. }
  2949. func TestWebUserAddMock(t *testing.T) {
  2950. user := getTestUser()
  2951. user.UploadBandwidth = 32
  2952. user.DownloadBandwidth = 64
  2953. user.UID = 1000
  2954. user.AdditionalInfo = "info"
  2955. mappedDir := filepath.Join(os.TempDir(), "mapped")
  2956. form := make(url.Values)
  2957. form.Set("username", user.Username)
  2958. form.Set("home_dir", user.HomeDir)
  2959. form.Set("password", user.Password)
  2960. form.Set("status", strconv.Itoa(user.Status))
  2961. form.Set("expiration_date", "")
  2962. form.Set("permissions", "*")
  2963. form.Set("sub_dirs_permissions", " /subdir::list ,download ")
  2964. form.Set("virtual_folders", fmt.Sprintf(" /vdir:: %v :: 2 :: 1024", mappedDir))
  2965. form.Set("allowed_extensions", "/dir2::.jpg,.png\n/dir2::.ico\n/dir1::.rar")
  2966. form.Set("denied_extensions", "/dir2::.webp,.webp\n/dir2::.tiff\n/dir1::.zip")
  2967. form.Set("allowed_patterns", "/dir2::*.jpg,*.png\n/dir1::*.png")
  2968. form.Set("denied_patterns", "/dir1::*.zip\n/dir3::*.rar\n/dir2::*.mkv")
  2969. form.Set("additional_info", user.AdditionalInfo)
  2970. b, contentType, _ := getMultipartFormData(form, "", "")
  2971. // test invalid url escape
  2972. req, _ := http.NewRequest(http.MethodPost, webUserPath+"?a=%2", &b)
  2973. req.Header.Set("Content-Type", contentType)
  2974. rr := executeRequest(req)
  2975. checkResponseCode(t, http.StatusOK, rr.Code)
  2976. form.Set("public_keys", testPubKey)
  2977. form.Set("uid", strconv.FormatInt(int64(user.UID), 10))
  2978. form.Set("gid", "a")
  2979. b, contentType, _ = getMultipartFormData(form, "", "")
  2980. // test invalid gid
  2981. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  2982. req.Header.Set("Content-Type", contentType)
  2983. rr = executeRequest(req)
  2984. checkResponseCode(t, http.StatusOK, rr.Code)
  2985. form.Set("gid", "0")
  2986. form.Set("max_sessions", "a")
  2987. b, contentType, _ = getMultipartFormData(form, "", "")
  2988. // test invalid max sessions
  2989. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  2990. req.Header.Set("Content-Type", contentType)
  2991. rr = executeRequest(req)
  2992. checkResponseCode(t, http.StatusOK, rr.Code)
  2993. form.Set("max_sessions", "0")
  2994. form.Set("quota_size", "a")
  2995. b, contentType, _ = getMultipartFormData(form, "", "")
  2996. // test invalid quota size
  2997. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  2998. req.Header.Set("Content-Type", contentType)
  2999. rr = executeRequest(req)
  3000. checkResponseCode(t, http.StatusOK, rr.Code)
  3001. form.Set("quota_size", "0")
  3002. form.Set("quota_files", "a")
  3003. b, contentType, _ = getMultipartFormData(form, "", "")
  3004. // test invalid quota files
  3005. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3006. req.Header.Set("Content-Type", contentType)
  3007. rr = executeRequest(req)
  3008. checkResponseCode(t, http.StatusOK, rr.Code)
  3009. form.Set("quota_files", "0")
  3010. form.Set("upload_bandwidth", "a")
  3011. b, contentType, _ = getMultipartFormData(form, "", "")
  3012. // test invalid upload bandwidth
  3013. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3014. req.Header.Set("Content-Type", contentType)
  3015. rr = executeRequest(req)
  3016. checkResponseCode(t, http.StatusOK, rr.Code)
  3017. form.Set("upload_bandwidth", strconv.FormatInt(user.UploadBandwidth, 10))
  3018. form.Set("download_bandwidth", "a")
  3019. b, contentType, _ = getMultipartFormData(form, "", "")
  3020. // test invalid download bandwidth
  3021. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3022. req.Header.Set("Content-Type", contentType)
  3023. rr = executeRequest(req)
  3024. checkResponseCode(t, http.StatusOK, rr.Code)
  3025. form.Set("download_bandwidth", strconv.FormatInt(user.DownloadBandwidth, 10))
  3026. form.Set("status", "a")
  3027. b, contentType, _ = getMultipartFormData(form, "", "")
  3028. // test invalid status
  3029. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3030. req.Header.Set("Content-Type", contentType)
  3031. rr = executeRequest(req)
  3032. checkResponseCode(t, http.StatusOK, rr.Code)
  3033. form.Set("status", strconv.Itoa(user.Status))
  3034. form.Set("expiration_date", "123")
  3035. b, contentType, _ = getMultipartFormData(form, "", "")
  3036. // test invalid expiration date
  3037. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3038. req.Header.Set("Content-Type", contentType)
  3039. rr = executeRequest(req)
  3040. checkResponseCode(t, http.StatusOK, rr.Code)
  3041. form.Set("expiration_date", "")
  3042. form.Set("allowed_ip", "invalid,ip")
  3043. b, contentType, _ = getMultipartFormData(form, "", "")
  3044. // test invalid allowed_ip
  3045. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3046. req.Header.Set("Content-Type", contentType)
  3047. rr = executeRequest(req)
  3048. checkResponseCode(t, http.StatusOK, rr.Code)
  3049. form.Set("allowed_ip", "")
  3050. form.Set("denied_ip", "192.168.1.2") // it should be 192.168.1.2/32
  3051. b, contentType, _ = getMultipartFormData(form, "", "")
  3052. // test invalid denied_ip
  3053. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3054. req.Header.Set("Content-Type", contentType)
  3055. rr = executeRequest(req)
  3056. checkResponseCode(t, http.StatusOK, rr.Code)
  3057. form.Set("denied_ip", "")
  3058. // test invalid max file upload size
  3059. form.Set("max_upload_file_size", "a")
  3060. b, contentType, _ = getMultipartFormData(form, "", "")
  3061. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3062. req.Header.Set("Content-Type", contentType)
  3063. rr = executeRequest(req)
  3064. checkResponseCode(t, http.StatusOK, rr.Code)
  3065. form.Set("max_upload_file_size", "1000")
  3066. b, contentType, _ = getMultipartFormData(form, "", "")
  3067. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3068. req.Header.Set("Content-Type", contentType)
  3069. rr = executeRequest(req)
  3070. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3071. // the user already exists, was created with the above request
  3072. b, contentType, _ = getMultipartFormData(form, "", "")
  3073. req, _ = http.NewRequest(http.MethodPost, webUserPath, &b)
  3074. req.Header.Set("Content-Type", contentType)
  3075. rr = executeRequest(req)
  3076. checkResponseCode(t, http.StatusOK, rr.Code)
  3077. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3078. rr = executeRequest(req)
  3079. checkResponseCode(t, http.StatusOK, rr.Code)
  3080. var users []dataprovider.User
  3081. err := render.DecodeJSON(rr.Body, &users)
  3082. assert.NoError(t, err)
  3083. assert.Equal(t, 1, len(users))
  3084. newUser := users[0]
  3085. assert.Equal(t, user.UID, newUser.UID)
  3086. assert.Equal(t, user.UploadBandwidth, newUser.UploadBandwidth)
  3087. assert.Equal(t, user.DownloadBandwidth, newUser.DownloadBandwidth)
  3088. assert.Equal(t, int64(1000), newUser.Filters.MaxUploadFileSize)
  3089. assert.Equal(t, user.AdditionalInfo, newUser.AdditionalInfo)
  3090. assert.True(t, utils.IsStringInSlice(testPubKey, newUser.PublicKeys))
  3091. if val, ok := newUser.Permissions["/subdir"]; ok {
  3092. assert.True(t, utils.IsStringInSlice(dataprovider.PermListItems, val))
  3093. assert.True(t, utils.IsStringInSlice(dataprovider.PermDownload, val))
  3094. } else {
  3095. assert.Fail(t, "user permissions must contain /somedir", "actual: %v", newUser.Permissions)
  3096. }
  3097. assert.Len(t, newUser.VirtualFolders, 1)
  3098. for _, v := range newUser.VirtualFolders {
  3099. assert.Equal(t, v.VirtualPath, "/vdir")
  3100. assert.Equal(t, v.MappedPath, mappedDir)
  3101. assert.Equal(t, v.QuotaFiles, 2)
  3102. assert.Equal(t, v.QuotaSize, int64(1024))
  3103. }
  3104. assert.Len(t, newUser.Filters.FileExtensions, 2)
  3105. for _, filter := range newUser.Filters.FileExtensions {
  3106. if filter.Path == "/dir1" {
  3107. assert.Len(t, filter.DeniedExtensions, 1)
  3108. assert.Len(t, filter.AllowedExtensions, 1)
  3109. assert.True(t, utils.IsStringInSlice(".zip", filter.DeniedExtensions))
  3110. assert.True(t, utils.IsStringInSlice(".rar", filter.AllowedExtensions))
  3111. }
  3112. if filter.Path == "/dir2" {
  3113. assert.Len(t, filter.DeniedExtensions, 2)
  3114. assert.Len(t, filter.AllowedExtensions, 3)
  3115. assert.True(t, utils.IsStringInSlice(".jpg", filter.AllowedExtensions))
  3116. assert.True(t, utils.IsStringInSlice(".png", filter.AllowedExtensions))
  3117. assert.True(t, utils.IsStringInSlice(".ico", filter.AllowedExtensions))
  3118. assert.True(t, utils.IsStringInSlice(".webp", filter.DeniedExtensions))
  3119. assert.True(t, utils.IsStringInSlice(".tiff", filter.DeniedExtensions))
  3120. }
  3121. }
  3122. assert.Len(t, newUser.Filters.FilePatterns, 3)
  3123. for _, filter := range newUser.Filters.FilePatterns {
  3124. if filter.Path == "/dir1" {
  3125. assert.Len(t, filter.DeniedPatterns, 1)
  3126. assert.Len(t, filter.AllowedPatterns, 1)
  3127. assert.True(t, utils.IsStringInSlice("*.png", filter.AllowedPatterns))
  3128. assert.True(t, utils.IsStringInSlice("*.zip", filter.DeniedPatterns))
  3129. }
  3130. if filter.Path == "/dir2" {
  3131. assert.Len(t, filter.DeniedPatterns, 1)
  3132. assert.Len(t, filter.AllowedPatterns, 2)
  3133. assert.True(t, utils.IsStringInSlice("*.jpg", filter.AllowedPatterns))
  3134. assert.True(t, utils.IsStringInSlice("*.png", filter.AllowedPatterns))
  3135. assert.True(t, utils.IsStringInSlice("*.mkv", filter.DeniedPatterns))
  3136. }
  3137. if filter.Path == "/dir3" {
  3138. assert.Len(t, filter.DeniedPatterns, 1)
  3139. assert.Len(t, filter.AllowedPatterns, 0)
  3140. assert.True(t, utils.IsStringInSlice("*.rar", filter.DeniedPatterns))
  3141. }
  3142. }
  3143. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(newUser.ID, 10), nil)
  3144. rr = executeRequest(req)
  3145. checkResponseCode(t, http.StatusOK, rr.Code)
  3146. url, err := url.Parse(folderPath)
  3147. assert.NoError(t, err)
  3148. q := url.Query()
  3149. q.Add("folder_path", mappedDir)
  3150. url.RawQuery = q.Encode()
  3151. req, _ = http.NewRequest(http.MethodDelete, url.String(), nil)
  3152. rr = executeRequest(req)
  3153. checkResponseCode(t, http.StatusOK, rr.Code)
  3154. }
  3155. func TestWebUserUpdateMock(t *testing.T) {
  3156. user := getTestUser()
  3157. userAsJSON := getUserAsJSON(t, user)
  3158. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3159. rr := executeRequest(req)
  3160. checkResponseCode(t, http.StatusOK, rr.Code)
  3161. err := render.DecodeJSON(rr.Body, &user)
  3162. assert.NoError(t, err)
  3163. user.MaxSessions = 1
  3164. user.QuotaFiles = 2
  3165. user.QuotaSize = 3
  3166. user.GID = 1000
  3167. user.AdditionalInfo = "new additional info"
  3168. form := make(url.Values)
  3169. form.Set("username", user.Username)
  3170. form.Set("home_dir", user.HomeDir)
  3171. form.Set("uid", "0")
  3172. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3173. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3174. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3175. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3176. form.Set("upload_bandwidth", "0")
  3177. form.Set("download_bandwidth", "0")
  3178. form.Set("permissions", "*")
  3179. form.Set("sub_dirs_permissions", "/otherdir :: list ,upload ")
  3180. form.Set("status", strconv.Itoa(user.Status))
  3181. form.Set("expiration_date", "2020-01-01 00:00:00")
  3182. form.Set("allowed_ip", " 192.168.1.3/32, 192.168.2.0/24 ")
  3183. form.Set("denied_ip", " 10.0.0.2/32 ")
  3184. form.Set("denied_extensions", "/dir1::.zip")
  3185. form.Set("ssh_login_methods", dataprovider.SSHLoginMethodKeyboardInteractive)
  3186. form.Set("denied_protocols", common.ProtocolFTP)
  3187. form.Set("max_upload_file_size", "100")
  3188. form.Set("disconnect", "1")
  3189. form.Set("additional_info", user.AdditionalInfo)
  3190. b, contentType, _ := getMultipartFormData(form, "", "")
  3191. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3192. req.Header.Set("Content-Type", contentType)
  3193. rr = executeRequest(req)
  3194. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3195. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3196. rr = executeRequest(req)
  3197. checkResponseCode(t, http.StatusOK, rr.Code)
  3198. var users []dataprovider.User
  3199. err = render.DecodeJSON(rr.Body, &users)
  3200. assert.NoError(t, err)
  3201. assert.Equal(t, 1, len(users))
  3202. updateUser := users[0]
  3203. assert.Equal(t, user.HomeDir, updateUser.HomeDir)
  3204. assert.Equal(t, user.MaxSessions, updateUser.MaxSessions)
  3205. assert.Equal(t, user.QuotaFiles, updateUser.QuotaFiles)
  3206. assert.Equal(t, user.QuotaSize, updateUser.QuotaSize)
  3207. assert.Equal(t, user.UID, updateUser.UID)
  3208. assert.Equal(t, user.GID, updateUser.GID)
  3209. assert.Equal(t, user.AdditionalInfo, updateUser.AdditionalInfo)
  3210. assert.Equal(t, int64(100), updateUser.Filters.MaxUploadFileSize)
  3211. if val, ok := updateUser.Permissions["/otherdir"]; ok {
  3212. assert.True(t, utils.IsStringInSlice(dataprovider.PermListItems, val))
  3213. assert.True(t, utils.IsStringInSlice(dataprovider.PermUpload, val))
  3214. } else {
  3215. assert.Fail(t, "user permissions must contains /otherdir", "actual: %v", updateUser.Permissions)
  3216. }
  3217. assert.True(t, utils.IsStringInSlice("192.168.1.3/32", updateUser.Filters.AllowedIP))
  3218. assert.True(t, utils.IsStringInSlice("10.0.0.2/32", updateUser.Filters.DeniedIP))
  3219. assert.True(t, utils.IsStringInSlice(dataprovider.SSHLoginMethodKeyboardInteractive, updateUser.Filters.DeniedLoginMethods))
  3220. assert.True(t, utils.IsStringInSlice(common.ProtocolFTP, updateUser.Filters.DeniedProtocols))
  3221. assert.True(t, utils.IsStringInSlice(".zip", updateUser.Filters.FileExtensions[0].DeniedExtensions))
  3222. req, err = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3223. assert.NoError(t, err)
  3224. rr = executeRequest(req)
  3225. checkResponseCode(t, http.StatusOK, rr.Code)
  3226. }
  3227. func TestRenderWebCloneUserMock(t *testing.T) {
  3228. user, _, err := httpd.AddUser(getTestUser(), http.StatusOK)
  3229. assert.NoError(t, err)
  3230. req, err := http.NewRequest(http.MethodGet, webUserPath+"?cloneFromId=a", nil)
  3231. assert.NoError(t, err)
  3232. rr := executeRequest(req)
  3233. checkResponseCode(t, http.StatusBadRequest, rr.Code)
  3234. req, err = http.NewRequest(http.MethodGet, webUserPath+"?cloneFromId=1234", nil)
  3235. assert.NoError(t, err)
  3236. rr = executeRequest(req)
  3237. checkResponseCode(t, http.StatusNotFound, rr.Code)
  3238. req, err = http.NewRequest(http.MethodGet, webUserPath+fmt.Sprintf("?cloneFromId=%v", user.ID), nil)
  3239. assert.NoError(t, err)
  3240. rr = executeRequest(req)
  3241. checkResponseCode(t, http.StatusOK, rr.Code)
  3242. if config.GetProviderConf().Driver != "memory" {
  3243. user.FsConfig = dataprovider.Filesystem{
  3244. Provider: dataprovider.CryptedFilesystemProvider,
  3245. CryptConfig: vfs.CryptFsConfig{
  3246. Passphrase: kms.NewPlainSecret("secret"),
  3247. },
  3248. }
  3249. err = user.FsConfig.CryptConfig.Passphrase.Encrypt()
  3250. assert.NoError(t, err)
  3251. user.FsConfig.CryptConfig.Passphrase.SetStatus(kms.SecretStatusAWS)
  3252. user.Password = defaultPassword
  3253. err = dataprovider.UpdateUser(user)
  3254. assert.NoError(t, err)
  3255. req, err = http.NewRequest(http.MethodGet, webUserPath+fmt.Sprintf("?cloneFromId=%v", user.ID), nil)
  3256. assert.NoError(t, err)
  3257. rr = executeRequest(req)
  3258. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  3259. }
  3260. _, err = httpd.RemoveUser(user, http.StatusOK)
  3261. assert.NoError(t, err)
  3262. }
  3263. func TestWebUserS3Mock(t *testing.T) {
  3264. user := getTestUser()
  3265. userAsJSON := getUserAsJSON(t, user)
  3266. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3267. rr := executeRequest(req)
  3268. checkResponseCode(t, http.StatusOK, rr.Code)
  3269. err := render.DecodeJSON(rr.Body, &user)
  3270. assert.NoError(t, err)
  3271. user.FsConfig.Provider = dataprovider.S3FilesystemProvider
  3272. user.FsConfig.S3Config.Bucket = "test"
  3273. user.FsConfig.S3Config.Region = "eu-west-1"
  3274. user.FsConfig.S3Config.AccessKey = "access-key"
  3275. user.FsConfig.S3Config.AccessSecret = kms.NewPlainSecret("access-secret")
  3276. user.FsConfig.S3Config.Endpoint = "http://127.0.0.1:9000/path?a=b"
  3277. user.FsConfig.S3Config.StorageClass = "Standard"
  3278. user.FsConfig.S3Config.KeyPrefix = "somedir/subdir/"
  3279. user.FsConfig.S3Config.UploadPartSize = 5
  3280. user.FsConfig.S3Config.UploadConcurrency = 4
  3281. form := make(url.Values)
  3282. form.Set("username", user.Username)
  3283. form.Set("home_dir", user.HomeDir)
  3284. form.Set("uid", "0")
  3285. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3286. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3287. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3288. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3289. form.Set("upload_bandwidth", "0")
  3290. form.Set("download_bandwidth", "0")
  3291. form.Set("permissions", "*")
  3292. form.Set("sub_dirs_permissions", "")
  3293. form.Set("status", strconv.Itoa(user.Status))
  3294. form.Set("expiration_date", "2020-01-01 00:00:00")
  3295. form.Set("allowed_ip", "")
  3296. form.Set("denied_ip", "")
  3297. form.Set("fs_provider", "1")
  3298. form.Set("s3_bucket", user.FsConfig.S3Config.Bucket)
  3299. form.Set("s3_region", user.FsConfig.S3Config.Region)
  3300. form.Set("s3_access_key", user.FsConfig.S3Config.AccessKey)
  3301. form.Set("s3_access_secret", user.FsConfig.S3Config.AccessSecret.GetPayload())
  3302. form.Set("s3_storage_class", user.FsConfig.S3Config.StorageClass)
  3303. form.Set("s3_endpoint", user.FsConfig.S3Config.Endpoint)
  3304. form.Set("s3_key_prefix", user.FsConfig.S3Config.KeyPrefix)
  3305. form.Set("allowed_extensions", "/dir1::.jpg,.png")
  3306. form.Set("denied_extensions", "/dir2::.zip")
  3307. form.Set("max_upload_file_size", "0")
  3308. // test invalid s3_upload_part_size
  3309. form.Set("s3_upload_part_size", "a")
  3310. b, contentType, _ := getMultipartFormData(form, "", "")
  3311. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3312. req.Header.Set("Content-Type", contentType)
  3313. rr = executeRequest(req)
  3314. checkResponseCode(t, http.StatusOK, rr.Code)
  3315. // test invalid s3_concurrency
  3316. form.Set("s3_upload_part_size", strconv.FormatInt(user.FsConfig.S3Config.UploadPartSize, 10))
  3317. form.Set("s3_upload_concurrency", "a")
  3318. b, contentType, _ = getMultipartFormData(form, "", "")
  3319. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3320. req.Header.Set("Content-Type", contentType)
  3321. rr = executeRequest(req)
  3322. checkResponseCode(t, http.StatusOK, rr.Code)
  3323. // now add the user
  3324. form.Set("s3_upload_concurrency", strconv.Itoa(user.FsConfig.S3Config.UploadConcurrency))
  3325. b, contentType, _ = getMultipartFormData(form, "", "")
  3326. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3327. req.Header.Set("Content-Type", contentType)
  3328. rr = executeRequest(req)
  3329. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3330. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3331. rr = executeRequest(req)
  3332. checkResponseCode(t, http.StatusOK, rr.Code)
  3333. var users []dataprovider.User
  3334. err = render.DecodeJSON(rr.Body, &users)
  3335. assert.NoError(t, err)
  3336. assert.Equal(t, 1, len(users))
  3337. updateUser := users[0]
  3338. assert.Equal(t, int64(1577836800000), updateUser.ExpirationDate)
  3339. assert.Equal(t, updateUser.FsConfig.S3Config.Bucket, user.FsConfig.S3Config.Bucket)
  3340. assert.Equal(t, updateUser.FsConfig.S3Config.Region, user.FsConfig.S3Config.Region)
  3341. assert.Equal(t, updateUser.FsConfig.S3Config.AccessKey, user.FsConfig.S3Config.AccessKey)
  3342. assert.Equal(t, updateUser.FsConfig.S3Config.StorageClass, user.FsConfig.S3Config.StorageClass)
  3343. assert.Equal(t, updateUser.FsConfig.S3Config.Endpoint, user.FsConfig.S3Config.Endpoint)
  3344. assert.Equal(t, updateUser.FsConfig.S3Config.KeyPrefix, user.FsConfig.S3Config.KeyPrefix)
  3345. assert.Equal(t, updateUser.FsConfig.S3Config.UploadPartSize, user.FsConfig.S3Config.UploadPartSize)
  3346. assert.Equal(t, updateUser.FsConfig.S3Config.UploadConcurrency, user.FsConfig.S3Config.UploadConcurrency)
  3347. assert.Equal(t, 2, len(updateUser.Filters.FileExtensions))
  3348. assert.Equal(t, kms.SecretStatusSecretBox, updateUser.FsConfig.S3Config.AccessSecret.GetStatus())
  3349. assert.NotEmpty(t, updateUser.FsConfig.S3Config.AccessSecret.GetPayload())
  3350. assert.Empty(t, updateUser.FsConfig.S3Config.AccessSecret.GetKey())
  3351. assert.Empty(t, updateUser.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  3352. // now check that a redacted password is not saved
  3353. form.Set("s3_access_secret", "[**redacted**] ")
  3354. b, contentType, _ = getMultipartFormData(form, "", "")
  3355. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3356. req.Header.Set("Content-Type", contentType)
  3357. rr = executeRequest(req)
  3358. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3359. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3360. rr = executeRequest(req)
  3361. checkResponseCode(t, http.StatusOK, rr.Code)
  3362. users = nil
  3363. err = render.DecodeJSON(rr.Body, &users)
  3364. assert.NoError(t, err)
  3365. assert.Equal(t, 1, len(users))
  3366. lastUpdatedUser := users[0]
  3367. assert.Equal(t, kms.SecretStatusSecretBox, lastUpdatedUser.FsConfig.S3Config.AccessSecret.GetStatus())
  3368. assert.Equal(t, updateUser.FsConfig.S3Config.AccessSecret.GetPayload(), lastUpdatedUser.FsConfig.S3Config.AccessSecret.GetPayload())
  3369. assert.Empty(t, lastUpdatedUser.FsConfig.S3Config.AccessSecret.GetKey())
  3370. assert.Empty(t, lastUpdatedUser.FsConfig.S3Config.AccessSecret.GetAdditionalData())
  3371. // now clear credentials
  3372. form.Set("s3_access_key", "")
  3373. form.Set("s3_access_secret", "")
  3374. b, contentType, _ = getMultipartFormData(form, "", "")
  3375. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3376. req.Header.Set("Content-Type", contentType)
  3377. rr = executeRequest(req)
  3378. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3379. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3380. rr = executeRequest(req)
  3381. checkResponseCode(t, http.StatusOK, rr.Code)
  3382. users = nil
  3383. err = render.DecodeJSON(rr.Body, &users)
  3384. assert.NoError(t, err)
  3385. assert.Equal(t, 1, len(users))
  3386. assert.True(t, users[0].FsConfig.S3Config.AccessSecret.IsEmpty())
  3387. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3388. rr = executeRequest(req)
  3389. checkResponseCode(t, http.StatusOK, rr.Code)
  3390. }
  3391. func TestWebUserGCSMock(t *testing.T) {
  3392. user := getTestUser()
  3393. userAsJSON := getUserAsJSON(t, user)
  3394. req, err := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3395. assert.NoError(t, err)
  3396. rr := executeRequest(req)
  3397. checkResponseCode(t, http.StatusOK, rr.Code)
  3398. err = render.DecodeJSON(rr.Body, &user)
  3399. assert.NoError(t, err)
  3400. credentialsFilePath := filepath.Join(os.TempDir(), "gcs.json")
  3401. err = createTestFile(credentialsFilePath, 0)
  3402. assert.NoError(t, err)
  3403. user.FsConfig.Provider = dataprovider.GCSFilesystemProvider
  3404. user.FsConfig.GCSConfig.Bucket = "test"
  3405. user.FsConfig.GCSConfig.KeyPrefix = "somedir/subdir/"
  3406. user.FsConfig.GCSConfig.StorageClass = "standard"
  3407. form := make(url.Values)
  3408. form.Set("username", user.Username)
  3409. form.Set("home_dir", user.HomeDir)
  3410. form.Set("uid", "0")
  3411. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3412. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3413. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3414. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3415. form.Set("upload_bandwidth", "0")
  3416. form.Set("download_bandwidth", "0")
  3417. form.Set("permissions", "*")
  3418. form.Set("sub_dirs_permissions", "")
  3419. form.Set("status", strconv.Itoa(user.Status))
  3420. form.Set("expiration_date", "2020-01-01 00:00:00")
  3421. form.Set("allowed_ip", "")
  3422. form.Set("denied_ip", "")
  3423. form.Set("fs_provider", "2")
  3424. form.Set("gcs_bucket", user.FsConfig.GCSConfig.Bucket)
  3425. form.Set("gcs_storage_class", user.FsConfig.GCSConfig.StorageClass)
  3426. form.Set("gcs_key_prefix", user.FsConfig.GCSConfig.KeyPrefix)
  3427. form.Set("allowed_extensions", "/dir1::.jpg,.png")
  3428. form.Set("max_upload_file_size", "0")
  3429. b, contentType, _ := getMultipartFormData(form, "", "")
  3430. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3431. req.Header.Set("Content-Type", contentType)
  3432. rr = executeRequest(req)
  3433. checkResponseCode(t, http.StatusOK, rr.Code)
  3434. b, contentType, _ = getMultipartFormData(form, "gcs_credential_file", credentialsFilePath)
  3435. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3436. req.Header.Set("Content-Type", contentType)
  3437. rr = executeRequest(req)
  3438. checkResponseCode(t, http.StatusOK, rr.Code)
  3439. err = createTestFile(credentialsFilePath, 4096)
  3440. assert.NoError(t, err)
  3441. b, contentType, _ = getMultipartFormData(form, "gcs_credential_file", credentialsFilePath)
  3442. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3443. req.Header.Set("Content-Type", contentType)
  3444. rr = executeRequest(req)
  3445. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3446. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3447. rr = executeRequest(req)
  3448. checkResponseCode(t, http.StatusOK, rr.Code)
  3449. var users []dataprovider.User
  3450. err = render.DecodeJSON(rr.Body, &users)
  3451. assert.NoError(t, err)
  3452. assert.Equal(t, 1, len(users))
  3453. updateUser := users[0]
  3454. assert.Equal(t, int64(1577836800000), updateUser.ExpirationDate)
  3455. assert.Equal(t, user.FsConfig.Provider, updateUser.FsConfig.Provider)
  3456. assert.Equal(t, user.FsConfig.GCSConfig.Bucket, updateUser.FsConfig.GCSConfig.Bucket)
  3457. assert.Equal(t, user.FsConfig.GCSConfig.StorageClass, updateUser.FsConfig.GCSConfig.StorageClass)
  3458. assert.Equal(t, user.FsConfig.GCSConfig.KeyPrefix, updateUser.FsConfig.GCSConfig.KeyPrefix)
  3459. assert.Equal(t, "/dir1", updateUser.Filters.FileExtensions[0].Path)
  3460. form.Set("gcs_auto_credentials", "on")
  3461. b, contentType, _ = getMultipartFormData(form, "", "")
  3462. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3463. req.Header.Set("Content-Type", contentType)
  3464. rr = executeRequest(req)
  3465. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3466. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3467. rr = executeRequest(req)
  3468. checkResponseCode(t, http.StatusOK, rr.Code)
  3469. err = render.DecodeJSON(rr.Body, &users)
  3470. assert.NoError(t, err)
  3471. assert.Equal(t, 1, len(users))
  3472. updateUser = users[0]
  3473. assert.Equal(t, 1, updateUser.FsConfig.GCSConfig.AutomaticCredentials)
  3474. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3475. rr = executeRequest(req)
  3476. checkResponseCode(t, http.StatusOK, rr.Code)
  3477. err = os.Remove(credentialsFilePath)
  3478. assert.NoError(t, err)
  3479. }
  3480. func TestWebUserAzureBlobMock(t *testing.T) {
  3481. user := getTestUser()
  3482. userAsJSON := getUserAsJSON(t, user)
  3483. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3484. rr := executeRequest(req)
  3485. checkResponseCode(t, http.StatusOK, rr.Code)
  3486. err := render.DecodeJSON(rr.Body, &user)
  3487. assert.NoError(t, err)
  3488. user.FsConfig.Provider = dataprovider.AzureBlobFilesystemProvider
  3489. user.FsConfig.AzBlobConfig.Container = "container"
  3490. user.FsConfig.AzBlobConfig.AccountName = "aname"
  3491. user.FsConfig.AzBlobConfig.AccountKey = kms.NewPlainSecret("access-skey")
  3492. user.FsConfig.AzBlobConfig.Endpoint = "http://127.0.0.1:9000/path?b=c"
  3493. user.FsConfig.AzBlobConfig.KeyPrefix = "somedir/subdir/"
  3494. user.FsConfig.AzBlobConfig.UploadPartSize = 5
  3495. user.FsConfig.AzBlobConfig.UploadConcurrency = 4
  3496. user.FsConfig.AzBlobConfig.UseEmulator = true
  3497. form := make(url.Values)
  3498. form.Set("username", user.Username)
  3499. form.Set("home_dir", user.HomeDir)
  3500. form.Set("uid", "0")
  3501. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3502. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3503. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3504. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3505. form.Set("upload_bandwidth", "0")
  3506. form.Set("download_bandwidth", "0")
  3507. form.Set("permissions", "*")
  3508. form.Set("sub_dirs_permissions", "")
  3509. form.Set("status", strconv.Itoa(user.Status))
  3510. form.Set("expiration_date", "2020-01-01 00:00:00")
  3511. form.Set("allowed_ip", "")
  3512. form.Set("denied_ip", "")
  3513. form.Set("fs_provider", "3")
  3514. form.Set("az_container", user.FsConfig.AzBlobConfig.Container)
  3515. form.Set("az_account_name", user.FsConfig.AzBlobConfig.AccountName)
  3516. form.Set("az_account_key", user.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  3517. form.Set("az_sas_url", user.FsConfig.AzBlobConfig.SASURL)
  3518. form.Set("az_endpoint", user.FsConfig.AzBlobConfig.Endpoint)
  3519. form.Set("az_key_prefix", user.FsConfig.AzBlobConfig.KeyPrefix)
  3520. form.Set("az_use_emulator", "checked")
  3521. form.Set("allowed_extensions", "/dir1::.jpg,.png")
  3522. form.Set("denied_extensions", "/dir2::.zip")
  3523. form.Set("max_upload_file_size", "0")
  3524. // test invalid az_upload_part_size
  3525. form.Set("az_upload_part_size", "a")
  3526. b, contentType, _ := getMultipartFormData(form, "", "")
  3527. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3528. req.Header.Set("Content-Type", contentType)
  3529. rr = executeRequest(req)
  3530. checkResponseCode(t, http.StatusOK, rr.Code)
  3531. // test invalid az_upload_concurrency
  3532. form.Set("az_upload_part_size", strconv.FormatInt(user.FsConfig.AzBlobConfig.UploadPartSize, 10))
  3533. form.Set("az_upload_concurrency", "a")
  3534. b, contentType, _ = getMultipartFormData(form, "", "")
  3535. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3536. req.Header.Set("Content-Type", contentType)
  3537. rr = executeRequest(req)
  3538. checkResponseCode(t, http.StatusOK, rr.Code)
  3539. // now add the user
  3540. form.Set("az_upload_concurrency", strconv.Itoa(user.FsConfig.AzBlobConfig.UploadConcurrency))
  3541. b, contentType, _ = getMultipartFormData(form, "", "")
  3542. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3543. req.Header.Set("Content-Type", contentType)
  3544. rr = executeRequest(req)
  3545. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3546. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3547. rr = executeRequest(req)
  3548. checkResponseCode(t, http.StatusOK, rr.Code)
  3549. var users []dataprovider.User
  3550. err = render.DecodeJSON(rr.Body, &users)
  3551. assert.NoError(t, err)
  3552. assert.Equal(t, 1, len(users))
  3553. updateUser := users[0]
  3554. assert.Equal(t, int64(1577836800000), updateUser.ExpirationDate)
  3555. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.Container, user.FsConfig.AzBlobConfig.Container)
  3556. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.AccountName, user.FsConfig.AzBlobConfig.AccountName)
  3557. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.Endpoint, user.FsConfig.AzBlobConfig.Endpoint)
  3558. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.SASURL, user.FsConfig.AzBlobConfig.SASURL)
  3559. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.KeyPrefix, user.FsConfig.AzBlobConfig.KeyPrefix)
  3560. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.UploadPartSize, user.FsConfig.AzBlobConfig.UploadPartSize)
  3561. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.UploadConcurrency, user.FsConfig.AzBlobConfig.UploadConcurrency)
  3562. assert.Equal(t, 2, len(updateUser.Filters.FileExtensions))
  3563. assert.Equal(t, kms.SecretStatusSecretBox, updateUser.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  3564. assert.NotEmpty(t, updateUser.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  3565. assert.Empty(t, updateUser.FsConfig.AzBlobConfig.AccountKey.GetKey())
  3566. assert.Empty(t, updateUser.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  3567. // now check that a redacted password is not saved
  3568. form.Set("az_account_key", "[**redacted**] ")
  3569. b, contentType, _ = getMultipartFormData(form, "", "")
  3570. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3571. req.Header.Set("Content-Type", contentType)
  3572. rr = executeRequest(req)
  3573. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3574. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3575. rr = executeRequest(req)
  3576. checkResponseCode(t, http.StatusOK, rr.Code)
  3577. users = nil
  3578. err = render.DecodeJSON(rr.Body, &users)
  3579. assert.NoError(t, err)
  3580. assert.Equal(t, 1, len(users))
  3581. lastUpdatedUser := users[0]
  3582. assert.Equal(t, kms.SecretStatusSecretBox, lastUpdatedUser.FsConfig.AzBlobConfig.AccountKey.GetStatus())
  3583. assert.Equal(t, updateUser.FsConfig.AzBlobConfig.AccountKey.GetPayload(), lastUpdatedUser.FsConfig.AzBlobConfig.AccountKey.GetPayload())
  3584. assert.Empty(t, lastUpdatedUser.FsConfig.AzBlobConfig.AccountKey.GetKey())
  3585. assert.Empty(t, lastUpdatedUser.FsConfig.AzBlobConfig.AccountKey.GetAdditionalData())
  3586. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3587. rr = executeRequest(req)
  3588. checkResponseCode(t, http.StatusOK, rr.Code)
  3589. }
  3590. func TestWebUserCryptMock(t *testing.T) {
  3591. user := getTestUser()
  3592. userAsJSON := getUserAsJSON(t, user)
  3593. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3594. rr := executeRequest(req)
  3595. checkResponseCode(t, http.StatusOK, rr.Code)
  3596. err := render.DecodeJSON(rr.Body, &user)
  3597. assert.NoError(t, err)
  3598. user.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  3599. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("crypted passphrase")
  3600. form := make(url.Values)
  3601. form.Set("username", user.Username)
  3602. form.Set("home_dir", user.HomeDir)
  3603. form.Set("uid", "0")
  3604. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3605. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3606. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3607. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3608. form.Set("upload_bandwidth", "0")
  3609. form.Set("download_bandwidth", "0")
  3610. form.Set("permissions", "*")
  3611. form.Set("sub_dirs_permissions", "")
  3612. form.Set("status", strconv.Itoa(user.Status))
  3613. form.Set("expiration_date", "2020-01-01 00:00:00")
  3614. form.Set("allowed_ip", "")
  3615. form.Set("denied_ip", "")
  3616. form.Set("fs_provider", "4")
  3617. form.Set("crypt_passphrase", "")
  3618. form.Set("allowed_extensions", "/dir1::.jpg,.png")
  3619. form.Set("denied_extensions", "/dir2::.zip")
  3620. form.Set("max_upload_file_size", "0")
  3621. // passphrase cannot be empty
  3622. b, contentType, _ := getMultipartFormData(form, "", "")
  3623. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3624. req.Header.Set("Content-Type", contentType)
  3625. rr = executeRequest(req)
  3626. checkResponseCode(t, http.StatusOK, rr.Code)
  3627. form.Set("crypt_passphrase", user.FsConfig.CryptConfig.Passphrase.GetPayload())
  3628. b, contentType, _ = getMultipartFormData(form, "", "")
  3629. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3630. req.Header.Set("Content-Type", contentType)
  3631. rr = executeRequest(req)
  3632. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3633. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3634. rr = executeRequest(req)
  3635. checkResponseCode(t, http.StatusOK, rr.Code)
  3636. var users []dataprovider.User
  3637. err = render.DecodeJSON(rr.Body, &users)
  3638. assert.NoError(t, err)
  3639. assert.Equal(t, 1, len(users))
  3640. updateUser := users[0]
  3641. assert.Equal(t, int64(1577836800000), updateUser.ExpirationDate)
  3642. assert.Equal(t, 2, len(updateUser.Filters.FileExtensions))
  3643. assert.Equal(t, kms.SecretStatusSecretBox, updateUser.FsConfig.CryptConfig.Passphrase.GetStatus())
  3644. assert.NotEmpty(t, updateUser.FsConfig.CryptConfig.Passphrase.GetPayload())
  3645. assert.Empty(t, updateUser.FsConfig.CryptConfig.Passphrase.GetKey())
  3646. assert.Empty(t, updateUser.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  3647. // now check that a redacted password is not saved
  3648. form.Set("crypt_passphrase", "[**redacted**] ")
  3649. b, contentType, _ = getMultipartFormData(form, "", "")
  3650. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3651. req.Header.Set("Content-Type", contentType)
  3652. rr = executeRequest(req)
  3653. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3654. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3655. rr = executeRequest(req)
  3656. checkResponseCode(t, http.StatusOK, rr.Code)
  3657. users = nil
  3658. err = render.DecodeJSON(rr.Body, &users)
  3659. assert.NoError(t, err)
  3660. assert.Equal(t, 1, len(users))
  3661. lastUpdatedUser := users[0]
  3662. assert.Equal(t, kms.SecretStatusSecretBox, lastUpdatedUser.FsConfig.CryptConfig.Passphrase.GetStatus())
  3663. assert.Equal(t, updateUser.FsConfig.CryptConfig.Passphrase.GetPayload(), lastUpdatedUser.FsConfig.CryptConfig.Passphrase.GetPayload())
  3664. assert.Empty(t, lastUpdatedUser.FsConfig.CryptConfig.Passphrase.GetKey())
  3665. assert.Empty(t, lastUpdatedUser.FsConfig.CryptConfig.Passphrase.GetAdditionalData())
  3666. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3667. rr = executeRequest(req)
  3668. checkResponseCode(t, http.StatusOK, rr.Code)
  3669. }
  3670. func TestWebUserSFTPFsMock(t *testing.T) {
  3671. user := getTestUser()
  3672. userAsJSON := getUserAsJSON(t, user)
  3673. req, _ := http.NewRequest(http.MethodPost, userPath, bytes.NewBuffer(userAsJSON))
  3674. rr := executeRequest(req)
  3675. checkResponseCode(t, http.StatusOK, rr.Code)
  3676. err := render.DecodeJSON(rr.Body, &user)
  3677. assert.NoError(t, err)
  3678. user.FsConfig.Provider = dataprovider.SFTPFilesystemProvider
  3679. user.FsConfig.SFTPConfig.Endpoint = "127.0.0.1"
  3680. user.FsConfig.SFTPConfig.Username = "sftpuser"
  3681. user.FsConfig.SFTPConfig.Password = kms.NewPlainSecret("pwd")
  3682. user.FsConfig.SFTPConfig.PrivateKey = kms.NewPlainSecret(sftpPrivateKey)
  3683. user.FsConfig.SFTPConfig.Fingerprints = []string{sftpPkeyFingerprint}
  3684. user.FsConfig.SFTPConfig.Prefix = "/home/sftpuser"
  3685. form := make(url.Values)
  3686. form.Set("username", user.Username)
  3687. form.Set("home_dir", user.HomeDir)
  3688. form.Set("uid", "0")
  3689. form.Set("gid", strconv.FormatInt(int64(user.GID), 10))
  3690. form.Set("max_sessions", strconv.FormatInt(int64(user.MaxSessions), 10))
  3691. form.Set("quota_size", strconv.FormatInt(user.QuotaSize, 10))
  3692. form.Set("quota_files", strconv.FormatInt(int64(user.QuotaFiles), 10))
  3693. form.Set("upload_bandwidth", "0")
  3694. form.Set("download_bandwidth", "0")
  3695. form.Set("permissions", "*")
  3696. form.Set("sub_dirs_permissions", "")
  3697. form.Set("status", strconv.Itoa(user.Status))
  3698. form.Set("expiration_date", "2020-01-01 00:00:00")
  3699. form.Set("allowed_ip", "")
  3700. form.Set("denied_ip", "")
  3701. form.Set("fs_provider", "5")
  3702. form.Set("crypt_passphrase", "")
  3703. form.Set("allowed_extensions", "/dir1::.jpg,.png")
  3704. form.Set("denied_extensions", "/dir2::.zip")
  3705. form.Set("max_upload_file_size", "0")
  3706. // empty sftpconfig
  3707. b, contentType, _ := getMultipartFormData(form, "", "")
  3708. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3709. req.Header.Set("Content-Type", contentType)
  3710. rr = executeRequest(req)
  3711. checkResponseCode(t, http.StatusOK, rr.Code)
  3712. form.Set("sftp_endpoint", user.FsConfig.SFTPConfig.Endpoint)
  3713. form.Set("sftp_username", user.FsConfig.SFTPConfig.Username)
  3714. form.Set("sftp_password", user.FsConfig.SFTPConfig.Password.GetPayload())
  3715. form.Set("sftp_private_key", user.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  3716. form.Set("sftp_fingerprints", user.FsConfig.SFTPConfig.Fingerprints[0])
  3717. form.Set("sftp_prefix", user.FsConfig.SFTPConfig.Prefix)
  3718. b, contentType, _ = getMultipartFormData(form, "", "")
  3719. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3720. req.Header.Set("Content-Type", contentType)
  3721. rr = executeRequest(req)
  3722. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3723. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3724. rr = executeRequest(req)
  3725. checkResponseCode(t, http.StatusOK, rr.Code)
  3726. var users []dataprovider.User
  3727. err = render.DecodeJSON(rr.Body, &users)
  3728. assert.NoError(t, err)
  3729. assert.Equal(t, 1, len(users))
  3730. updateUser := users[0]
  3731. assert.Equal(t, int64(1577836800000), updateUser.ExpirationDate)
  3732. assert.Equal(t, 2, len(updateUser.Filters.FileExtensions))
  3733. assert.Equal(t, kms.SecretStatusSecretBox, updateUser.FsConfig.SFTPConfig.Password.GetStatus())
  3734. assert.NotEmpty(t, updateUser.FsConfig.SFTPConfig.Password.GetPayload())
  3735. assert.Empty(t, updateUser.FsConfig.SFTPConfig.Password.GetKey())
  3736. assert.Empty(t, updateUser.FsConfig.SFTPConfig.Password.GetAdditionalData())
  3737. assert.Equal(t, kms.SecretStatusSecretBox, updateUser.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  3738. assert.NotEmpty(t, updateUser.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  3739. assert.Empty(t, updateUser.FsConfig.SFTPConfig.PrivateKey.GetKey())
  3740. assert.Empty(t, updateUser.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  3741. assert.Equal(t, updateUser.FsConfig.SFTPConfig.Prefix, user.FsConfig.SFTPConfig.Prefix)
  3742. assert.Equal(t, updateUser.FsConfig.SFTPConfig.Username, user.FsConfig.SFTPConfig.Username)
  3743. assert.Equal(t, updateUser.FsConfig.SFTPConfig.Endpoint, user.FsConfig.SFTPConfig.Endpoint)
  3744. assert.Len(t, updateUser.FsConfig.SFTPConfig.Fingerprints, 1)
  3745. assert.Contains(t, updateUser.FsConfig.SFTPConfig.Fingerprints, sftpPkeyFingerprint)
  3746. // now check that a redacted credentials are not saved
  3747. form.Set("sftp_password", "[**redacted**] ")
  3748. form.Set("sftp_private_key", "[**redacted**]")
  3749. b, contentType, _ = getMultipartFormData(form, "", "")
  3750. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/"+strconv.FormatInt(user.ID, 10), &b)
  3751. req.Header.Set("Content-Type", contentType)
  3752. rr = executeRequest(req)
  3753. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3754. req, _ = http.NewRequest(http.MethodGet, userPath+"?limit=1&offset=0&order=ASC&username="+user.Username, nil)
  3755. rr = executeRequest(req)
  3756. checkResponseCode(t, http.StatusOK, rr.Code)
  3757. users = nil
  3758. err = render.DecodeJSON(rr.Body, &users)
  3759. assert.NoError(t, err)
  3760. assert.Equal(t, 1, len(users))
  3761. lastUpdatedUser := users[0]
  3762. assert.Equal(t, kms.SecretStatusSecretBox, lastUpdatedUser.FsConfig.SFTPConfig.Password.GetStatus())
  3763. assert.Equal(t, updateUser.FsConfig.SFTPConfig.Password.GetPayload(), lastUpdatedUser.FsConfig.SFTPConfig.Password.GetPayload())
  3764. assert.Empty(t, lastUpdatedUser.FsConfig.SFTPConfig.Password.GetKey())
  3765. assert.Empty(t, lastUpdatedUser.FsConfig.SFTPConfig.Password.GetAdditionalData())
  3766. assert.Equal(t, kms.SecretStatusSecretBox, lastUpdatedUser.FsConfig.SFTPConfig.PrivateKey.GetStatus())
  3767. assert.Equal(t, updateUser.FsConfig.SFTPConfig.PrivateKey.GetPayload(), lastUpdatedUser.FsConfig.SFTPConfig.PrivateKey.GetPayload())
  3768. assert.Empty(t, lastUpdatedUser.FsConfig.SFTPConfig.PrivateKey.GetKey())
  3769. assert.Empty(t, lastUpdatedUser.FsConfig.SFTPConfig.PrivateKey.GetAdditionalData())
  3770. req, _ = http.NewRequest(http.MethodDelete, userPath+"/"+strconv.FormatInt(user.ID, 10), nil)
  3771. rr = executeRequest(req)
  3772. checkResponseCode(t, http.StatusOK, rr.Code)
  3773. }
  3774. func TestAddWebFoldersMock(t *testing.T) {
  3775. mappedPath := filepath.Clean(os.TempDir())
  3776. form := make(url.Values)
  3777. form.Set("mapped_path", mappedPath)
  3778. req, err := http.NewRequest(http.MethodPost, webFolderPath, strings.NewReader(form.Encode()))
  3779. assert.NoError(t, err)
  3780. req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
  3781. rr := executeRequest(req)
  3782. checkResponseCode(t, http.StatusSeeOther, rr.Code)
  3783. // adding the same folder will fail since the path must be unique
  3784. req, err = http.NewRequest(http.MethodPost, webFolderPath, strings.NewReader(form.Encode()))
  3785. assert.NoError(t, err)
  3786. req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
  3787. rr = executeRequest(req)
  3788. checkResponseCode(t, http.StatusOK, rr.Code)
  3789. // invalid form
  3790. req, err = http.NewRequest(http.MethodPost, webFolderPath, strings.NewReader(form.Encode()))
  3791. assert.NoError(t, err)
  3792. req.Header.Set("Content-Type", "text/plain; boundary=")
  3793. rr = executeRequest(req)
  3794. checkResponseCode(t, http.StatusOK, rr.Code)
  3795. // now render the add folder page
  3796. req, err = http.NewRequest(http.MethodGet, webFolderPath, nil)
  3797. assert.NoError(t, err)
  3798. rr = executeRequest(req)
  3799. checkResponseCode(t, http.StatusOK, rr.Code)
  3800. var folders []vfs.BaseVirtualFolder
  3801. url, err := url.Parse(folderPath)
  3802. assert.NoError(t, err)
  3803. q := url.Query()
  3804. q.Add("folder_path", mappedPath)
  3805. url.RawQuery = q.Encode()
  3806. req, _ = http.NewRequest(http.MethodGet, url.String(), nil)
  3807. rr = executeRequest(req)
  3808. checkResponseCode(t, http.StatusOK, rr.Code)
  3809. err = render.DecodeJSON(rr.Body, &folders)
  3810. assert.NoError(t, err)
  3811. if assert.Len(t, folders, 1) {
  3812. folder := folders[0]
  3813. assert.Equal(t, mappedPath, folder.MappedPath)
  3814. }
  3815. // cleanup
  3816. url, err = url.Parse(folderPath)
  3817. assert.NoError(t, err)
  3818. q = url.Query()
  3819. q.Add("folder_path", mappedPath)
  3820. url.RawQuery = q.Encode()
  3821. req, _ = http.NewRequest(http.MethodDelete, url.String(), nil)
  3822. rr = executeRequest(req)
  3823. checkResponseCode(t, http.StatusOK, rr.Code)
  3824. }
  3825. func TestWebFoldersMock(t *testing.T) {
  3826. mappedPath1 := filepath.Join(os.TempDir(), "vfolder1")
  3827. mappedPath2 := filepath.Join(os.TempDir(), "vfolder2")
  3828. folders := []vfs.BaseVirtualFolder{
  3829. {
  3830. MappedPath: mappedPath1,
  3831. },
  3832. {
  3833. MappedPath: mappedPath2,
  3834. },
  3835. }
  3836. for _, folder := range folders {
  3837. folderAsJSON, err := json.Marshal(folder)
  3838. assert.NoError(t, err)
  3839. req, _ := http.NewRequest(http.MethodPost, folderPath, bytes.NewBuffer(folderAsJSON))
  3840. rr := executeRequest(req)
  3841. checkResponseCode(t, http.StatusOK, rr.Code)
  3842. }
  3843. req, err := http.NewRequest(http.MethodGet, webFoldersPath, nil)
  3844. assert.NoError(t, err)
  3845. rr := executeRequest(req)
  3846. checkResponseCode(t, http.StatusOK, rr.Code)
  3847. req, err = http.NewRequest(http.MethodGet, webFoldersPath+"?qlimit=a", nil)
  3848. assert.NoError(t, err)
  3849. rr = executeRequest(req)
  3850. checkResponseCode(t, http.StatusOK, rr.Code)
  3851. req, err = http.NewRequest(http.MethodGet, webFoldersPath+"?qlimit=1", nil)
  3852. assert.NoError(t, err)
  3853. rr = executeRequest(req)
  3854. checkResponseCode(t, http.StatusOK, rr.Code)
  3855. for _, folder := range folders {
  3856. url, err := url.Parse(folderPath)
  3857. assert.NoError(t, err)
  3858. q := url.Query()
  3859. q.Add("folder_path", folder.MappedPath)
  3860. url.RawQuery = q.Encode()
  3861. req, _ := http.NewRequest(http.MethodDelete, url.String(), nil)
  3862. rr := executeRequest(req)
  3863. checkResponseCode(t, http.StatusOK, rr.Code)
  3864. }
  3865. }
  3866. func TestProviderClosedMock(t *testing.T) {
  3867. dataprovider.Close()
  3868. req, _ := http.NewRequest(http.MethodGet, webFoldersPath, nil)
  3869. rr := executeRequest(req)
  3870. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  3871. req, _ = http.NewRequest(http.MethodGet, webUsersPath, nil)
  3872. rr = executeRequest(req)
  3873. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  3874. req, _ = http.NewRequest(http.MethodGet, webUserPath+"/0", nil)
  3875. rr = executeRequest(req)
  3876. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  3877. form := make(url.Values)
  3878. form.Set("username", "test")
  3879. req, _ = http.NewRequest(http.MethodPost, webUserPath+"/0", strings.NewReader(form.Encode()))
  3880. rr = executeRequest(req)
  3881. checkResponseCode(t, http.StatusInternalServerError, rr.Code)
  3882. err := config.LoadConfig(configDir, "")
  3883. assert.NoError(t, err)
  3884. providerConf := config.GetProviderConf()
  3885. providerConf.CredentialsPath = credentialsPath
  3886. err = os.RemoveAll(credentialsPath)
  3887. assert.NoError(t, err)
  3888. err = dataprovider.Initialize(providerConf, configDir)
  3889. assert.NoError(t, err)
  3890. }
  3891. func TestGetWebConnectionsMock(t *testing.T) {
  3892. req, _ := http.NewRequest(http.MethodGet, webConnectionsPath, nil)
  3893. rr := executeRequest(req)
  3894. checkResponseCode(t, http.StatusOK, rr.Code)
  3895. }
  3896. func TestGetWebStatusMock(t *testing.T) {
  3897. req, _ := http.NewRequest(http.MethodGet, webStatusPath, nil)
  3898. rr := executeRequest(req)
  3899. checkResponseCode(t, http.StatusOK, rr.Code)
  3900. }
  3901. func TestStaticFilesMock(t *testing.T) {
  3902. req, _ := http.NewRequest(http.MethodGet, "/static/favicon.ico", nil)
  3903. rr := executeRequest(req)
  3904. checkResponseCode(t, http.StatusOK, rr.Code)
  3905. }
  3906. func waitTCPListening(address string) {
  3907. for {
  3908. conn, err := net.Dial("tcp", address)
  3909. if err != nil {
  3910. logger.WarnToConsole("tcp server %v not listening: %v\n", address, err)
  3911. time.Sleep(100 * time.Millisecond)
  3912. continue
  3913. }
  3914. logger.InfoToConsole("tcp server %v now listening\n", address)
  3915. conn.Close()
  3916. break
  3917. }
  3918. }
  3919. func getTestUser() dataprovider.User {
  3920. user := dataprovider.User{
  3921. Username: defaultUsername,
  3922. Password: defaultPassword,
  3923. HomeDir: filepath.Join(homeBasePath, defaultUsername),
  3924. Status: 1,
  3925. }
  3926. user.Permissions = make(map[string][]string)
  3927. user.Permissions["/"] = defaultPerms
  3928. return user
  3929. }
  3930. func getUserAsJSON(t *testing.T, user dataprovider.User) []byte {
  3931. json, err := json.Marshal(user)
  3932. assert.NoError(t, err)
  3933. return json
  3934. }
  3935. func executeRequest(req *http.Request) *httptest.ResponseRecorder {
  3936. rr := httptest.NewRecorder()
  3937. testServer.Config.Handler.ServeHTTP(rr, req)
  3938. return rr
  3939. }
  3940. func checkResponseCode(t *testing.T, expected, actual int) {
  3941. assert.Equal(t, expected, actual)
  3942. }
  3943. func createTestFile(path string, size int64) error {
  3944. baseDir := filepath.Dir(path)
  3945. if _, err := os.Stat(baseDir); os.IsNotExist(err) {
  3946. err = os.MkdirAll(baseDir, os.ModePerm)
  3947. if err != nil {
  3948. return err
  3949. }
  3950. }
  3951. content := make([]byte, size)
  3952. if size > 0 {
  3953. _, err := rand.Read(content)
  3954. if err != nil {
  3955. return err
  3956. }
  3957. }
  3958. return ioutil.WriteFile(path, content, os.ModePerm)
  3959. }
  3960. func getMultipartFormData(values url.Values, fileFieldName, filePath string) (bytes.Buffer, string, error) {
  3961. var b bytes.Buffer
  3962. w := multipart.NewWriter(&b)
  3963. for k, v := range values {
  3964. for _, s := range v {
  3965. if err := w.WriteField(k, s); err != nil {
  3966. return b, "", err
  3967. }
  3968. }
  3969. }
  3970. if len(fileFieldName) > 0 && len(filePath) > 0 {
  3971. fw, err := w.CreateFormFile(fileFieldName, filepath.Base(filePath))
  3972. if err != nil {
  3973. return b, "", err
  3974. }
  3975. f, err := os.Open(filePath)
  3976. if err != nil {
  3977. return b, "", err
  3978. }
  3979. defer f.Close()
  3980. if _, err = io.Copy(fw, f); err != nil {
  3981. return b, "", err
  3982. }
  3983. }
  3984. err := w.Close()
  3985. return b, w.FormDataContentType(), err
  3986. }
  3987. func BenchmarkSecretDecryption(b *testing.B) {
  3988. s := kms.NewPlainSecret("test data")
  3989. s.SetAdditionalData("username")
  3990. err := s.Encrypt()
  3991. require.NoError(b, err)
  3992. for i := 0; i < b.N; i++ {
  3993. err = s.Clone().Decrypt()
  3994. require.NoError(b, err)
  3995. }
  3996. }