common_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626
  1. package common
  2. import (
  3. "fmt"
  4. "net"
  5. "net/http"
  6. "os"
  7. "os/exec"
  8. "runtime"
  9. "strings"
  10. "sync/atomic"
  11. "testing"
  12. "time"
  13. "github.com/rs/zerolog"
  14. "github.com/spf13/viper"
  15. "github.com/stretchr/testify/assert"
  16. "github.com/stretchr/testify/require"
  17. "github.com/drakkan/sftpgo/dataprovider"
  18. "github.com/drakkan/sftpgo/httpclient"
  19. "github.com/drakkan/sftpgo/kms"
  20. "github.com/drakkan/sftpgo/logger"
  21. "github.com/drakkan/sftpgo/vfs"
  22. )
  23. const (
  24. logSenderTest = "common_test"
  25. httpAddr = "127.0.0.1:9999"
  26. httpProxyAddr = "127.0.0.1:7777"
  27. configDir = ".."
  28. osWindows = "windows"
  29. userTestUsername = "common_test_username"
  30. userTestPwd = "common_test_pwd"
  31. )
  32. type providerConf struct {
  33. Config dataprovider.Config `json:"data_provider" mapstructure:"data_provider"`
  34. }
  35. type fakeConnection struct {
  36. *BaseConnection
  37. command string
  38. }
  39. func (c *fakeConnection) AddUser(user dataprovider.User) error {
  40. fs, err := user.GetFilesystem(c.GetID())
  41. if err != nil {
  42. return err
  43. }
  44. c.BaseConnection.User = user
  45. c.BaseConnection.Fs = fs
  46. return nil
  47. }
  48. func (c *fakeConnection) Disconnect() error {
  49. Connections.Remove(c.GetID())
  50. return nil
  51. }
  52. func (c *fakeConnection) GetClientVersion() string {
  53. return ""
  54. }
  55. func (c *fakeConnection) GetCommand() string {
  56. return c.command
  57. }
  58. func (c *fakeConnection) GetRemoteAddress() string {
  59. return ""
  60. }
  61. type customNetConn struct {
  62. net.Conn
  63. id string
  64. isClosed bool
  65. }
  66. func (c *customNetConn) Close() error {
  67. Connections.RemoveSSHConnection(c.id)
  68. c.isClosed = true
  69. return c.Conn.Close()
  70. }
  71. func TestMain(m *testing.M) {
  72. logfilePath := "common_test.log"
  73. logger.InitLogger(logfilePath, 5, 1, 28, false, zerolog.DebugLevel)
  74. viper.SetEnvPrefix("sftpgo")
  75. replacer := strings.NewReplacer(".", "__")
  76. viper.SetEnvKeyReplacer(replacer)
  77. viper.SetConfigName("sftpgo")
  78. viper.AutomaticEnv()
  79. viper.AllowEmptyEnv(true)
  80. driver, err := initializeDataprovider(-1)
  81. if err != nil {
  82. logger.WarnToConsole("error initializing data provider: %v", err)
  83. os.Exit(1)
  84. }
  85. logger.InfoToConsole("Starting COMMON tests, provider: %v", driver)
  86. err = Initialize(Configuration{})
  87. if err != nil {
  88. logger.WarnToConsole("error initializing common: %v", err)
  89. os.Exit(1)
  90. }
  91. httpConfig := httpclient.Config{
  92. Timeout: 5,
  93. }
  94. httpConfig.Initialize(configDir)
  95. go func() {
  96. // start a test HTTP server to receive action notifications
  97. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  98. fmt.Fprintf(w, "OK\n")
  99. })
  100. http.HandleFunc("/404", func(w http.ResponseWriter, r *http.Request) {
  101. w.WriteHeader(http.StatusNotFound)
  102. fmt.Fprintf(w, "Not found\n")
  103. })
  104. if err := http.ListenAndServe(httpAddr, nil); err != nil {
  105. logger.ErrorToConsole("could not start HTTP notification server: %v", err)
  106. os.Exit(1)
  107. }
  108. }()
  109. go func() {
  110. Config.ProxyProtocol = 2
  111. listener, err := net.Listen("tcp", httpProxyAddr)
  112. if err != nil {
  113. logger.ErrorToConsole("error creating listener for proxy protocol server: %v", err)
  114. os.Exit(1)
  115. }
  116. proxyListener, err := Config.GetProxyListener(listener)
  117. if err != nil {
  118. logger.ErrorToConsole("error creating proxy protocol listener: %v", err)
  119. os.Exit(1)
  120. }
  121. Config.ProxyProtocol = 0
  122. s := &http.Server{}
  123. if err := s.Serve(proxyListener); err != nil {
  124. logger.ErrorToConsole("could not start HTTP proxy protocol server: %v", err)
  125. os.Exit(1)
  126. }
  127. }()
  128. waitTCPListening(httpAddr)
  129. waitTCPListening(httpProxyAddr)
  130. exitCode := m.Run()
  131. os.Remove(logfilePath) //nolint:errcheck
  132. os.Exit(exitCode)
  133. }
  134. func waitTCPListening(address string) {
  135. for {
  136. conn, err := net.Dial("tcp", address)
  137. if err != nil {
  138. logger.WarnToConsole("tcp server %v not listening: %v\n", address, err)
  139. time.Sleep(100 * time.Millisecond)
  140. continue
  141. }
  142. logger.InfoToConsole("tcp server %v now listening\n", address)
  143. conn.Close()
  144. break
  145. }
  146. }
  147. func initializeDataprovider(trackQuota int) (string, error) {
  148. configDir := ".."
  149. viper.AddConfigPath(configDir)
  150. if err := viper.ReadInConfig(); err != nil {
  151. return "", err
  152. }
  153. var cfg providerConf
  154. if err := viper.Unmarshal(&cfg); err != nil {
  155. return "", err
  156. }
  157. if trackQuota >= 0 && trackQuota <= 2 {
  158. cfg.Config.TrackQuota = trackQuota
  159. }
  160. return cfg.Config.Driver, dataprovider.Initialize(cfg.Config, configDir)
  161. }
  162. func closeDataprovider() error {
  163. return dataprovider.Close()
  164. }
  165. func TestSSHConnections(t *testing.T) {
  166. conn1, conn2 := net.Pipe()
  167. now := time.Now()
  168. sshConn1 := NewSSHConnection("id1", conn1)
  169. sshConn2 := NewSSHConnection("id2", conn2)
  170. sshConn3 := NewSSHConnection("id3", conn2)
  171. assert.Equal(t, "id1", sshConn1.GetID())
  172. assert.Equal(t, "id2", sshConn2.GetID())
  173. assert.Equal(t, "id3", sshConn3.GetID())
  174. sshConn1.UpdateLastActivity()
  175. assert.GreaterOrEqual(t, sshConn1.GetLastActivity().UnixNano(), now.UnixNano())
  176. Connections.AddSSHConnection(sshConn1)
  177. Connections.AddSSHConnection(sshConn2)
  178. Connections.AddSSHConnection(sshConn3)
  179. Connections.RLock()
  180. assert.Len(t, Connections.sshConnections, 3)
  181. Connections.RUnlock()
  182. Connections.RemoveSSHConnection(sshConn1.id)
  183. Connections.RLock()
  184. assert.Len(t, Connections.sshConnections, 2)
  185. assert.Equal(t, sshConn3.id, Connections.sshConnections[0].id)
  186. assert.Equal(t, sshConn2.id, Connections.sshConnections[1].id)
  187. Connections.RUnlock()
  188. Connections.RemoveSSHConnection(sshConn1.id)
  189. Connections.RLock()
  190. assert.Len(t, Connections.sshConnections, 2)
  191. assert.Equal(t, sshConn3.id, Connections.sshConnections[0].id)
  192. assert.Equal(t, sshConn2.id, Connections.sshConnections[1].id)
  193. Connections.RUnlock()
  194. Connections.RemoveSSHConnection(sshConn2.id)
  195. Connections.RLock()
  196. assert.Len(t, Connections.sshConnections, 1)
  197. assert.Equal(t, sshConn3.id, Connections.sshConnections[0].id)
  198. Connections.RUnlock()
  199. Connections.RemoveSSHConnection(sshConn3.id)
  200. Connections.RLock()
  201. assert.Len(t, Connections.sshConnections, 0)
  202. Connections.RUnlock()
  203. assert.NoError(t, sshConn1.Close())
  204. assert.NoError(t, sshConn2.Close())
  205. assert.NoError(t, sshConn3.Close())
  206. }
  207. func TestDefenderIntegration(t *testing.T) {
  208. // by default defender is nil
  209. configCopy := Config
  210. ip := "127.1.1.1"
  211. assert.Nil(t, ReloadDefender())
  212. AddDefenderEvent(ip, HostEventNoLoginTried)
  213. assert.False(t, IsBanned(ip))
  214. assert.Nil(t, GetDefenderBanTime(ip))
  215. assert.False(t, Unban(ip))
  216. assert.Equal(t, 0, GetDefenderScore(ip))
  217. Config.DefenderConfig = DefenderConfig{
  218. Enabled: true,
  219. BanTime: 10,
  220. BanTimeIncrement: 50,
  221. Threshold: 0,
  222. ScoreInvalid: 2,
  223. ScoreValid: 1,
  224. ObservationTime: 15,
  225. EntriesSoftLimit: 100,
  226. EntriesHardLimit: 150,
  227. }
  228. err := Initialize(Config)
  229. assert.Error(t, err)
  230. Config.DefenderConfig.Threshold = 3
  231. err = Initialize(Config)
  232. assert.NoError(t, err)
  233. assert.Nil(t, ReloadDefender())
  234. AddDefenderEvent(ip, HostEventNoLoginTried)
  235. assert.False(t, IsBanned(ip))
  236. assert.Equal(t, 2, GetDefenderScore(ip))
  237. assert.False(t, Unban(ip))
  238. assert.Nil(t, GetDefenderBanTime(ip))
  239. AddDefenderEvent(ip, HostEventLoginFailed)
  240. assert.True(t, IsBanned(ip))
  241. assert.Equal(t, 0, GetDefenderScore(ip))
  242. assert.NotNil(t, GetDefenderBanTime(ip))
  243. assert.True(t, Unban(ip))
  244. assert.Nil(t, GetDefenderBanTime(ip))
  245. assert.False(t, Unban(ip))
  246. Config = configCopy
  247. }
  248. func TestMaxConnections(t *testing.T) {
  249. oldValue := Config.MaxTotalConnections
  250. Config.MaxTotalConnections = 1
  251. assert.True(t, Connections.IsNewConnectionAllowed())
  252. c := NewBaseConnection("id", ProtocolSFTP, dataprovider.User{}, nil)
  253. fakeConn := &fakeConnection{
  254. BaseConnection: c,
  255. }
  256. Connections.Add(fakeConn)
  257. assert.Len(t, Connections.GetStats(), 1)
  258. assert.False(t, Connections.IsNewConnectionAllowed())
  259. res := Connections.Close(fakeConn.GetID())
  260. assert.True(t, res)
  261. assert.Eventually(t, func() bool { return len(Connections.GetStats()) == 0 }, 300*time.Millisecond, 50*time.Millisecond)
  262. Config.MaxTotalConnections = oldValue
  263. }
  264. func TestIdleConnections(t *testing.T) {
  265. configCopy := Config
  266. Config.IdleTimeout = 1
  267. err := Initialize(Config)
  268. assert.NoError(t, err)
  269. conn1, conn2 := net.Pipe()
  270. customConn1 := &customNetConn{
  271. Conn: conn1,
  272. id: "id1",
  273. }
  274. customConn2 := &customNetConn{
  275. Conn: conn2,
  276. id: "id2",
  277. }
  278. sshConn1 := NewSSHConnection(customConn1.id, customConn1)
  279. sshConn2 := NewSSHConnection(customConn2.id, customConn2)
  280. username := "test_user"
  281. user := dataprovider.User{
  282. Username: username,
  283. }
  284. c := NewBaseConnection(sshConn1.id+"_1", ProtocolSFTP, user, nil)
  285. c.lastActivity = time.Now().Add(-24 * time.Hour).UnixNano()
  286. fakeConn := &fakeConnection{
  287. BaseConnection: c,
  288. }
  289. // both ssh connections are expired but they should get removed only
  290. // if there is no associated connection
  291. sshConn1.lastActivity = c.lastActivity
  292. sshConn2.lastActivity = c.lastActivity
  293. Connections.AddSSHConnection(sshConn1)
  294. Connections.Add(fakeConn)
  295. assert.Equal(t, Connections.GetActiveSessions(username), 1)
  296. c = NewBaseConnection(sshConn2.id+"_1", ProtocolSSH, user, nil)
  297. fakeConn = &fakeConnection{
  298. BaseConnection: c,
  299. }
  300. Connections.AddSSHConnection(sshConn2)
  301. Connections.Add(fakeConn)
  302. assert.Equal(t, Connections.GetActiveSessions(username), 2)
  303. cFTP := NewBaseConnection("id2", ProtocolFTP, dataprovider.User{}, nil)
  304. cFTP.lastActivity = time.Now().UnixNano()
  305. fakeConn = &fakeConnection{
  306. BaseConnection: cFTP,
  307. }
  308. Connections.Add(fakeConn)
  309. assert.Equal(t, Connections.GetActiveSessions(username), 2)
  310. assert.Len(t, Connections.GetStats(), 3)
  311. Connections.RLock()
  312. assert.Len(t, Connections.sshConnections, 2)
  313. Connections.RUnlock()
  314. startIdleTimeoutTicker(100 * time.Millisecond)
  315. assert.Eventually(t, func() bool { return Connections.GetActiveSessions(username) == 1 }, 1*time.Second, 200*time.Millisecond)
  316. assert.Eventually(t, func() bool {
  317. Connections.RLock()
  318. defer Connections.RUnlock()
  319. return len(Connections.sshConnections) == 1
  320. }, 1*time.Second, 200*time.Millisecond)
  321. stopIdleTimeoutTicker()
  322. assert.Len(t, Connections.GetStats(), 2)
  323. c.lastActivity = time.Now().Add(-24 * time.Hour).UnixNano()
  324. cFTP.lastActivity = time.Now().Add(-24 * time.Hour).UnixNano()
  325. sshConn2.lastActivity = c.lastActivity
  326. startIdleTimeoutTicker(100 * time.Millisecond)
  327. assert.Eventually(t, func() bool { return len(Connections.GetStats()) == 0 }, 1*time.Second, 200*time.Millisecond)
  328. assert.Eventually(t, func() bool {
  329. Connections.RLock()
  330. defer Connections.RUnlock()
  331. return len(Connections.sshConnections) == 0
  332. }, 1*time.Second, 200*time.Millisecond)
  333. stopIdleTimeoutTicker()
  334. assert.True(t, customConn1.isClosed)
  335. assert.True(t, customConn2.isClosed)
  336. Config = configCopy
  337. }
  338. func TestCloseConnection(t *testing.T) {
  339. c := NewBaseConnection("id", ProtocolSFTP, dataprovider.User{}, nil)
  340. fakeConn := &fakeConnection{
  341. BaseConnection: c,
  342. }
  343. assert.True(t, Connections.IsNewConnectionAllowed())
  344. Connections.Add(fakeConn)
  345. assert.Len(t, Connections.GetStats(), 1)
  346. res := Connections.Close(fakeConn.GetID())
  347. assert.True(t, res)
  348. assert.Eventually(t, func() bool { return len(Connections.GetStats()) == 0 }, 300*time.Millisecond, 50*time.Millisecond)
  349. res = Connections.Close(fakeConn.GetID())
  350. assert.False(t, res)
  351. Connections.Remove(fakeConn.GetID())
  352. }
  353. func TestSwapConnection(t *testing.T) {
  354. c := NewBaseConnection("id", ProtocolFTP, dataprovider.User{}, nil)
  355. fakeConn := &fakeConnection{
  356. BaseConnection: c,
  357. }
  358. Connections.Add(fakeConn)
  359. if assert.Len(t, Connections.GetStats(), 1) {
  360. assert.Equal(t, "", Connections.GetStats()[0].Username)
  361. }
  362. c = NewBaseConnection("id", ProtocolFTP, dataprovider.User{
  363. Username: userTestUsername,
  364. }, nil)
  365. fakeConn = &fakeConnection{
  366. BaseConnection: c,
  367. }
  368. err := Connections.Swap(fakeConn)
  369. assert.NoError(t, err)
  370. if assert.Len(t, Connections.GetStats(), 1) {
  371. assert.Equal(t, userTestUsername, Connections.GetStats()[0].Username)
  372. }
  373. res := Connections.Close(fakeConn.GetID())
  374. assert.True(t, res)
  375. assert.Eventually(t, func() bool { return len(Connections.GetStats()) == 0 }, 300*time.Millisecond, 50*time.Millisecond)
  376. err = Connections.Swap(fakeConn)
  377. assert.Error(t, err)
  378. }
  379. func TestAtomicUpload(t *testing.T) {
  380. configCopy := Config
  381. Config.UploadMode = UploadModeStandard
  382. assert.False(t, Config.IsAtomicUploadEnabled())
  383. Config.UploadMode = UploadModeAtomic
  384. assert.True(t, Config.IsAtomicUploadEnabled())
  385. Config.UploadMode = UploadModeAtomicWithResume
  386. assert.True(t, Config.IsAtomicUploadEnabled())
  387. Config = configCopy
  388. }
  389. func TestConnectionStatus(t *testing.T) {
  390. username := "test_user"
  391. user := dataprovider.User{
  392. Username: username,
  393. }
  394. fs := vfs.NewOsFs("", os.TempDir(), nil)
  395. c1 := NewBaseConnection("id1", ProtocolSFTP, user, fs)
  396. fakeConn1 := &fakeConnection{
  397. BaseConnection: c1,
  398. }
  399. t1 := NewBaseTransfer(nil, c1, nil, "/p1", "/r1", TransferUpload, 0, 0, 0, true, fs)
  400. t1.BytesReceived = 123
  401. t2 := NewBaseTransfer(nil, c1, nil, "/p2", "/r2", TransferDownload, 0, 0, 0, true, fs)
  402. t2.BytesSent = 456
  403. c2 := NewBaseConnection("id2", ProtocolSSH, user, nil)
  404. fakeConn2 := &fakeConnection{
  405. BaseConnection: c2,
  406. command: "md5sum",
  407. }
  408. c3 := NewBaseConnection("id3", ProtocolWebDAV, user, nil)
  409. fakeConn3 := &fakeConnection{
  410. BaseConnection: c3,
  411. command: "PROPFIND",
  412. }
  413. t3 := NewBaseTransfer(nil, c3, nil, "/p2", "/r2", TransferDownload, 0, 0, 0, true, fs)
  414. Connections.Add(fakeConn1)
  415. Connections.Add(fakeConn2)
  416. Connections.Add(fakeConn3)
  417. stats := Connections.GetStats()
  418. assert.Len(t, stats, 3)
  419. for _, stat := range stats {
  420. assert.Equal(t, stat.Username, username)
  421. assert.True(t, strings.HasPrefix(stat.GetConnectionInfo(), stat.Protocol))
  422. assert.True(t, strings.HasPrefix(stat.GetConnectionDuration(), "00:"))
  423. if stat.ConnectionID == "SFTP_id1" {
  424. assert.Len(t, stat.Transfers, 2)
  425. assert.Greater(t, len(stat.GetTransfersAsString()), 0)
  426. for _, tr := range stat.Transfers {
  427. if tr.OperationType == operationDownload {
  428. assert.True(t, strings.HasPrefix(tr.getConnectionTransferAsString(), "DL"))
  429. } else if tr.OperationType == operationUpload {
  430. assert.True(t, strings.HasPrefix(tr.getConnectionTransferAsString(), "UL"))
  431. }
  432. }
  433. } else if stat.ConnectionID == "DAV_id3" {
  434. assert.Len(t, stat.Transfers, 1)
  435. assert.Greater(t, len(stat.GetTransfersAsString()), 0)
  436. } else {
  437. assert.Equal(t, 0, len(stat.GetTransfersAsString()))
  438. }
  439. }
  440. err := t1.Close()
  441. assert.NoError(t, err)
  442. err = t2.Close()
  443. assert.NoError(t, err)
  444. err = fakeConn3.SignalTransfersAbort()
  445. assert.NoError(t, err)
  446. assert.Equal(t, int32(1), atomic.LoadInt32(&t3.AbortTransfer))
  447. err = t3.Close()
  448. assert.NoError(t, err)
  449. err = fakeConn3.SignalTransfersAbort()
  450. assert.Error(t, err)
  451. Connections.Remove(fakeConn1.GetID())
  452. stats = Connections.GetStats()
  453. assert.Len(t, stats, 2)
  454. assert.Equal(t, fakeConn3.GetID(), stats[0].ConnectionID)
  455. assert.Equal(t, fakeConn2.GetID(), stats[1].ConnectionID)
  456. Connections.Remove(fakeConn2.GetID())
  457. stats = Connections.GetStats()
  458. assert.Len(t, stats, 1)
  459. assert.Equal(t, fakeConn3.GetID(), stats[0].ConnectionID)
  460. Connections.Remove(fakeConn3.GetID())
  461. stats = Connections.GetStats()
  462. assert.Len(t, stats, 0)
  463. }
  464. func TestQuotaScans(t *testing.T) {
  465. username := "username"
  466. assert.True(t, QuotaScans.AddUserQuotaScan(username))
  467. assert.False(t, QuotaScans.AddUserQuotaScan(username))
  468. if assert.Len(t, QuotaScans.GetUsersQuotaScans(), 1) {
  469. assert.Equal(t, QuotaScans.GetUsersQuotaScans()[0].Username, username)
  470. }
  471. assert.True(t, QuotaScans.RemoveUserQuotaScan(username))
  472. assert.False(t, QuotaScans.RemoveUserQuotaScan(username))
  473. assert.Len(t, QuotaScans.GetUsersQuotaScans(), 0)
  474. folderName := "/folder"
  475. assert.True(t, QuotaScans.AddVFolderQuotaScan(folderName))
  476. assert.False(t, QuotaScans.AddVFolderQuotaScan(folderName))
  477. if assert.Len(t, QuotaScans.GetVFoldersQuotaScans(), 1) {
  478. assert.Equal(t, QuotaScans.GetVFoldersQuotaScans()[0].MappedPath, folderName)
  479. }
  480. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(folderName))
  481. assert.False(t, QuotaScans.RemoveVFolderQuotaScan(folderName))
  482. assert.Len(t, QuotaScans.GetVFoldersQuotaScans(), 0)
  483. }
  484. func TestProxyProtocolVersion(t *testing.T) {
  485. c := Configuration{
  486. ProxyProtocol: 1,
  487. }
  488. proxyListener, err := c.GetProxyListener(nil)
  489. assert.NoError(t, err)
  490. assert.Nil(t, proxyListener.Policy)
  491. c.ProxyProtocol = 2
  492. proxyListener, err = c.GetProxyListener(nil)
  493. assert.NoError(t, err)
  494. assert.NotNil(t, proxyListener.Policy)
  495. c.ProxyProtocol = 1
  496. c.ProxyAllowed = []string{"invalid"}
  497. _, err = c.GetProxyListener(nil)
  498. assert.Error(t, err)
  499. c.ProxyProtocol = 2
  500. _, err = c.GetProxyListener(nil)
  501. assert.Error(t, err)
  502. }
  503. func TestProxyProtocol(t *testing.T) {
  504. httpClient := httpclient.GetHTTPClient()
  505. resp, err := httpClient.Get(fmt.Sprintf("http://%v", httpProxyAddr))
  506. if assert.NoError(t, err) {
  507. defer resp.Body.Close()
  508. assert.Equal(t, http.StatusBadRequest, resp.StatusCode)
  509. }
  510. }
  511. func TestPostConnectHook(t *testing.T) {
  512. Config.PostConnectHook = ""
  513. ipAddr := "127.0.0.1"
  514. assert.NoError(t, Config.ExecutePostConnectHook(ipAddr, ProtocolFTP))
  515. Config.PostConnectHook = "http://foo\x7f.com/"
  516. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolSFTP))
  517. Config.PostConnectHook = "http://invalid:1234/"
  518. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolSFTP))
  519. Config.PostConnectHook = fmt.Sprintf("http://%v/404", httpAddr)
  520. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolFTP))
  521. Config.PostConnectHook = fmt.Sprintf("http://%v", httpAddr)
  522. assert.NoError(t, Config.ExecutePostConnectHook(ipAddr, ProtocolFTP))
  523. Config.PostConnectHook = "invalid"
  524. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolFTP))
  525. if runtime.GOOS == osWindows {
  526. Config.PostConnectHook = "C:\\bad\\command"
  527. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolSFTP))
  528. } else {
  529. Config.PostConnectHook = "/invalid/path"
  530. assert.Error(t, Config.ExecutePostConnectHook(ipAddr, ProtocolSFTP))
  531. hookCmd, err := exec.LookPath("true")
  532. assert.NoError(t, err)
  533. Config.PostConnectHook = hookCmd
  534. assert.NoError(t, Config.ExecutePostConnectHook(ipAddr, ProtocolSFTP))
  535. }
  536. Config.PostConnectHook = ""
  537. }
  538. func TestCryptoConvertFileInfo(t *testing.T) {
  539. name := "name"
  540. fs, err := vfs.NewCryptFs("connID1", os.TempDir(), vfs.CryptFsConfig{Passphrase: kms.NewPlainSecret("secret")})
  541. require.NoError(t, err)
  542. cryptFs := fs.(*vfs.CryptFs)
  543. info := vfs.NewFileInfo(name, true, 48, time.Now(), false)
  544. assert.Equal(t, info, cryptFs.ConvertFileInfo(info))
  545. info = vfs.NewFileInfo(name, false, 48, time.Now(), false)
  546. assert.NotEqual(t, info.Size(), cryptFs.ConvertFileInfo(info).Size())
  547. info = vfs.NewFileInfo(name, false, 33, time.Now(), false)
  548. assert.Equal(t, int64(0), cryptFs.ConvertFileInfo(info).Size())
  549. info = vfs.NewFileInfo(name, false, 1, time.Now(), false)
  550. assert.Equal(t, int64(0), cryptFs.ConvertFileInfo(info).Size())
  551. }