eventmanager_test.go 74 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "errors"
  19. "fmt"
  20. "io"
  21. "mime/multipart"
  22. "net/http"
  23. "net/url"
  24. "os"
  25. "path"
  26. "path/filepath"
  27. "runtime"
  28. "strings"
  29. "testing"
  30. "time"
  31. "github.com/klauspost/compress/zip"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. sdkkms "github.com/sftpgo/sdk/kms"
  35. "github.com/stretchr/testify/assert"
  36. "github.com/stretchr/testify/require"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/kms"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. func TestEventRuleMatch(t *testing.T) {
  43. role := "role1"
  44. conditions := &dataprovider.EventConditions{
  45. ProviderEvents: []string{"add", "update"},
  46. Options: dataprovider.ConditionOptions{
  47. Names: []dataprovider.ConditionPattern{
  48. {
  49. Pattern: "user1",
  50. InverseMatch: true,
  51. },
  52. },
  53. RoleNames: []dataprovider.ConditionPattern{
  54. {
  55. Pattern: role,
  56. },
  57. },
  58. },
  59. }
  60. res := eventManager.checkProviderEventMatch(conditions, &EventParams{
  61. Name: "user1",
  62. Role: role,
  63. Event: "add",
  64. })
  65. assert.False(t, res)
  66. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  67. Name: "user2",
  68. Role: role,
  69. Event: "update",
  70. })
  71. assert.True(t, res)
  72. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  73. Name: "user2",
  74. Role: role,
  75. Event: "delete",
  76. })
  77. assert.False(t, res)
  78. conditions.Options.ProviderObjects = []string{"api_key"}
  79. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  80. Name: "user2",
  81. Event: "update",
  82. Role: role,
  83. ObjectType: "share",
  84. })
  85. assert.False(t, res)
  86. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  87. Name: "user2",
  88. Event: "update",
  89. Role: role,
  90. ObjectType: "api_key",
  91. })
  92. assert.True(t, res)
  93. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  94. Name: "user2",
  95. Event: "update",
  96. Role: role + "1",
  97. ObjectType: "api_key",
  98. })
  99. assert.False(t, res)
  100. // now test fs events
  101. conditions = &dataprovider.EventConditions{
  102. FsEvents: []string{operationUpload, operationDownload},
  103. Options: dataprovider.ConditionOptions{
  104. Names: []dataprovider.ConditionPattern{
  105. {
  106. Pattern: "user*",
  107. },
  108. {
  109. Pattern: "tester*",
  110. },
  111. },
  112. RoleNames: []dataprovider.ConditionPattern{
  113. {
  114. Pattern: role,
  115. InverseMatch: true,
  116. },
  117. },
  118. FsPaths: []dataprovider.ConditionPattern{
  119. {
  120. Pattern: "/**/*.txt",
  121. },
  122. },
  123. Protocols: []string{ProtocolSFTP},
  124. MinFileSize: 10,
  125. MaxFileSize: 30,
  126. },
  127. }
  128. params := EventParams{
  129. Name: "tester4",
  130. Event: operationDelete,
  131. VirtualPath: "/path.txt",
  132. Protocol: ProtocolSFTP,
  133. ObjectName: "path.txt",
  134. FileSize: 20,
  135. }
  136. res = eventManager.checkFsEventMatch(conditions, &params)
  137. assert.False(t, res)
  138. params.Event = operationDownload
  139. res = eventManager.checkFsEventMatch(conditions, &params)
  140. assert.True(t, res)
  141. params.Role = role
  142. res = eventManager.checkFsEventMatch(conditions, &params)
  143. assert.False(t, res)
  144. params.Role = ""
  145. params.Name = "name"
  146. res = eventManager.checkFsEventMatch(conditions, &params)
  147. assert.False(t, res)
  148. params.Name = "user5"
  149. res = eventManager.checkFsEventMatch(conditions, &params)
  150. assert.True(t, res)
  151. params.VirtualPath = "/sub/f.jpg"
  152. params.ObjectName = path.Base(params.VirtualPath)
  153. res = eventManager.checkFsEventMatch(conditions, &params)
  154. assert.False(t, res)
  155. params.VirtualPath = "/sub/f.txt"
  156. params.ObjectName = path.Base(params.VirtualPath)
  157. res = eventManager.checkFsEventMatch(conditions, &params)
  158. assert.True(t, res)
  159. params.Protocol = ProtocolHTTP
  160. res = eventManager.checkFsEventMatch(conditions, &params)
  161. assert.False(t, res)
  162. params.Protocol = ProtocolSFTP
  163. params.FileSize = 5
  164. res = eventManager.checkFsEventMatch(conditions, &params)
  165. assert.False(t, res)
  166. params.FileSize = 50
  167. res = eventManager.checkFsEventMatch(conditions, &params)
  168. assert.False(t, res)
  169. params.FileSize = 25
  170. res = eventManager.checkFsEventMatch(conditions, &params)
  171. assert.True(t, res)
  172. // bad pattern
  173. conditions.Options.Names = []dataprovider.ConditionPattern{
  174. {
  175. Pattern: "[-]",
  176. },
  177. }
  178. res = eventManager.checkFsEventMatch(conditions, &params)
  179. assert.False(t, res)
  180. // check fs events with group name filters
  181. conditions = &dataprovider.EventConditions{
  182. FsEvents: []string{operationUpload, operationDownload},
  183. Options: dataprovider.ConditionOptions{
  184. GroupNames: []dataprovider.ConditionPattern{
  185. {
  186. Pattern: "group*",
  187. },
  188. {
  189. Pattern: "testgroup*",
  190. },
  191. },
  192. },
  193. }
  194. params = EventParams{
  195. Name: "user1",
  196. Event: operationUpload,
  197. }
  198. res = eventManager.checkFsEventMatch(conditions, &params)
  199. assert.False(t, res)
  200. params.Groups = []sdk.GroupMapping{
  201. {
  202. Name: "g1",
  203. Type: sdk.GroupTypePrimary,
  204. },
  205. {
  206. Name: "g2",
  207. Type: sdk.GroupTypeSecondary,
  208. },
  209. }
  210. res = eventManager.checkFsEventMatch(conditions, &params)
  211. assert.False(t, res)
  212. params.Groups = []sdk.GroupMapping{
  213. {
  214. Name: "testgroup2",
  215. Type: sdk.GroupTypePrimary,
  216. },
  217. {
  218. Name: "g2",
  219. Type: sdk.GroupTypeSecondary,
  220. },
  221. }
  222. res = eventManager.checkFsEventMatch(conditions, &params)
  223. assert.True(t, res)
  224. // check user conditions
  225. user := dataprovider.User{}
  226. user.Username = "u1"
  227. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  228. assert.True(t, res)
  229. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  230. Names: []dataprovider.ConditionPattern{
  231. {
  232. Pattern: "user",
  233. },
  234. },
  235. })
  236. assert.False(t, res)
  237. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  238. RoleNames: []dataprovider.ConditionPattern{
  239. {
  240. Pattern: role,
  241. },
  242. },
  243. })
  244. assert.False(t, res)
  245. user.Role = role
  246. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  247. RoleNames: []dataprovider.ConditionPattern{
  248. {
  249. Pattern: role,
  250. },
  251. },
  252. })
  253. assert.True(t, res)
  254. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  255. GroupNames: []dataprovider.ConditionPattern{
  256. {
  257. Pattern: "group",
  258. },
  259. },
  260. RoleNames: []dataprovider.ConditionPattern{
  261. {
  262. Pattern: role,
  263. },
  264. },
  265. })
  266. assert.False(t, res)
  267. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  268. IDPLoginEvent: 0,
  269. }, &EventParams{
  270. Event: IDPLoginAdmin,
  271. })
  272. assert.True(t, res)
  273. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  274. IDPLoginEvent: 2,
  275. }, &EventParams{
  276. Event: IDPLoginAdmin,
  277. })
  278. assert.True(t, res)
  279. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  280. IDPLoginEvent: 1,
  281. }, &EventParams{
  282. Event: IDPLoginAdmin,
  283. })
  284. assert.False(t, res)
  285. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  286. IDPLoginEvent: 1,
  287. }, &EventParams{
  288. Event: IDPLoginUser,
  289. })
  290. assert.True(t, res)
  291. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  292. IDPLoginEvent: 1,
  293. }, &EventParams{
  294. Name: "user",
  295. Event: IDPLoginUser,
  296. })
  297. assert.True(t, res)
  298. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  299. IDPLoginEvent: 1,
  300. Options: dataprovider.ConditionOptions{
  301. Names: []dataprovider.ConditionPattern{
  302. {
  303. Pattern: "abc",
  304. },
  305. },
  306. },
  307. }, &EventParams{
  308. Name: "user",
  309. Event: IDPLoginUser,
  310. })
  311. assert.False(t, res)
  312. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  313. IDPLoginEvent: 2,
  314. }, &EventParams{
  315. Name: "user",
  316. Event: IDPLoginUser,
  317. })
  318. assert.False(t, res)
  319. }
  320. func TestDoubleStarMatching(t *testing.T) {
  321. c := dataprovider.ConditionPattern{
  322. Pattern: "/mydir/**",
  323. }
  324. res := checkEventConditionPattern(c, "/mydir")
  325. assert.True(t, res)
  326. res = checkEventConditionPattern(c, "/mydirname")
  327. assert.False(t, res)
  328. res = checkEventConditionPattern(c, "/mydir/sub")
  329. assert.True(t, res)
  330. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  331. assert.True(t, res)
  332. c.Pattern = "/**/*"
  333. res = checkEventConditionPattern(c, "/mydir")
  334. assert.True(t, res)
  335. res = checkEventConditionPattern(c, "/mydirname")
  336. assert.True(t, res)
  337. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  338. assert.True(t, res)
  339. c.Pattern = "/**/*.filepart"
  340. res = checkEventConditionPattern(c, "/file.filepart")
  341. assert.True(t, res)
  342. res = checkEventConditionPattern(c, "/mydir/sub/file.filepart")
  343. assert.True(t, res)
  344. res = checkEventConditionPattern(c, "/file.txt")
  345. assert.False(t, res)
  346. res = checkEventConditionPattern(c, "/mydir/file.txt")
  347. assert.False(t, res)
  348. c.Pattern = "/mydir/**/*.txt"
  349. res = checkEventConditionPattern(c, "/mydir")
  350. assert.False(t, res)
  351. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  352. assert.False(t, res)
  353. res = checkEventConditionPattern(c, "/mydir/sub")
  354. assert.False(t, res)
  355. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  356. assert.False(t, res)
  357. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  358. assert.True(t, res)
  359. c.InverseMatch = true
  360. assert.True(t, checkEventConditionPattern(c, "/mydir"))
  361. assert.True(t, checkEventConditionPattern(c, "/mydirname/f.txt"))
  362. assert.True(t, checkEventConditionPattern(c, "/mydir/sub"))
  363. assert.True(t, checkEventConditionPattern(c, "/mydir/sub/dir"))
  364. assert.False(t, checkEventConditionPattern(c, "/mydir/sub/dir/a.txt"))
  365. }
  366. func TestMutlipleDoubleStarMatching(t *testing.T) {
  367. patterns := []dataprovider.ConditionPattern{
  368. {
  369. Pattern: "/**/*.txt",
  370. InverseMatch: false,
  371. },
  372. {
  373. Pattern: "/**/*.tmp",
  374. InverseMatch: false,
  375. },
  376. }
  377. assert.False(t, checkEventConditionPatterns("/mydir", patterns))
  378. assert.True(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  379. assert.True(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  380. assert.False(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  381. assert.False(t, checkEventConditionPatterns("/mydir/sub", patterns))
  382. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  383. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  384. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  385. }
  386. func TestMultipleDoubleStarMatchingInverse(t *testing.T) {
  387. patterns := []dataprovider.ConditionPattern{
  388. {
  389. Pattern: "/**/*.txt",
  390. InverseMatch: true,
  391. },
  392. {
  393. Pattern: "/**/*.tmp",
  394. InverseMatch: true,
  395. },
  396. }
  397. assert.True(t, checkEventConditionPatterns("/mydir", patterns))
  398. assert.False(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  399. assert.False(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  400. assert.True(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  401. assert.True(t, checkEventConditionPatterns("/mydir/sub", patterns))
  402. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  403. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  404. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  405. }
  406. func TestGroupConditionPatterns(t *testing.T) {
  407. group1 := "group1"
  408. group2 := "group2"
  409. patterns := []dataprovider.ConditionPattern{
  410. {
  411. Pattern: group1,
  412. },
  413. {
  414. Pattern: group2,
  415. },
  416. }
  417. inversePatterns := []dataprovider.ConditionPattern{
  418. {
  419. Pattern: group1,
  420. InverseMatch: true,
  421. },
  422. {
  423. Pattern: group2,
  424. InverseMatch: true,
  425. },
  426. }
  427. groups := []sdk.GroupMapping{
  428. {
  429. Name: "group3",
  430. Type: sdk.GroupTypePrimary,
  431. },
  432. }
  433. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  434. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  435. groups = []sdk.GroupMapping{
  436. {
  437. Name: group1,
  438. Type: sdk.GroupTypePrimary,
  439. },
  440. {
  441. Name: "group4",
  442. Type: sdk.GroupTypePrimary,
  443. },
  444. }
  445. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  446. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  447. groups = []sdk.GroupMapping{
  448. {
  449. Name: group1,
  450. Type: sdk.GroupTypePrimary,
  451. },
  452. }
  453. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  454. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  455. groups = []sdk.GroupMapping{
  456. {
  457. Name: "group11",
  458. Type: sdk.GroupTypePrimary,
  459. },
  460. }
  461. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  462. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  463. }
  464. func TestEventManager(t *testing.T) {
  465. startEventScheduler()
  466. action := &dataprovider.BaseEventAction{
  467. Name: "test_action",
  468. Type: dataprovider.ActionTypeHTTP,
  469. Options: dataprovider.BaseEventActionOptions{
  470. HTTPConfig: dataprovider.EventActionHTTPConfig{
  471. Endpoint: "http://localhost",
  472. Timeout: 20,
  473. Method: http.MethodGet,
  474. },
  475. },
  476. }
  477. err := dataprovider.AddEventAction(action, "", "", "")
  478. assert.NoError(t, err)
  479. rule := &dataprovider.EventRule{
  480. Name: "rule",
  481. Status: 1,
  482. Trigger: dataprovider.EventTriggerFsEvent,
  483. Conditions: dataprovider.EventConditions{
  484. FsEvents: []string{operationUpload},
  485. },
  486. Actions: []dataprovider.EventAction{
  487. {
  488. BaseEventAction: dataprovider.BaseEventAction{
  489. Name: action.Name,
  490. },
  491. Order: 1,
  492. },
  493. },
  494. }
  495. err = dataprovider.AddEventRule(rule, "", "", "")
  496. assert.NoError(t, err)
  497. eventManager.RLock()
  498. assert.Len(t, eventManager.FsEvents, 1)
  499. assert.Len(t, eventManager.ProviderEvents, 0)
  500. assert.Len(t, eventManager.Schedules, 0)
  501. assert.Len(t, eventManager.schedulesMapping, 0)
  502. eventManager.RUnlock()
  503. rule.Trigger = dataprovider.EventTriggerProviderEvent
  504. rule.Conditions = dataprovider.EventConditions{
  505. ProviderEvents: []string{"add"},
  506. }
  507. err = dataprovider.UpdateEventRule(rule, "", "", "")
  508. assert.NoError(t, err)
  509. eventManager.RLock()
  510. assert.Len(t, eventManager.FsEvents, 0)
  511. assert.Len(t, eventManager.ProviderEvents, 1)
  512. assert.Len(t, eventManager.Schedules, 0)
  513. assert.Len(t, eventManager.schedulesMapping, 0)
  514. eventManager.RUnlock()
  515. rule.Trigger = dataprovider.EventTriggerSchedule
  516. rule.Conditions = dataprovider.EventConditions{
  517. Schedules: []dataprovider.Schedule{
  518. {
  519. Hours: "0",
  520. DayOfWeek: "*",
  521. DayOfMonth: "*",
  522. Month: "*",
  523. },
  524. },
  525. }
  526. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  527. eventManager.addUpdateRuleInternal(*rule)
  528. eventManager.RLock()
  529. assert.Len(t, eventManager.FsEvents, 0)
  530. assert.Len(t, eventManager.ProviderEvents, 0)
  531. assert.Len(t, eventManager.Schedules, 0)
  532. assert.Len(t, eventManager.schedulesMapping, 0)
  533. eventManager.RUnlock()
  534. assert.Eventually(t, func() bool {
  535. _, err = dataprovider.EventRuleExists(rule.Name)
  536. ok := errors.Is(err, util.ErrNotFound)
  537. return ok
  538. }, 2*time.Second, 100*time.Millisecond)
  539. rule.DeletedAt = 0
  540. err = dataprovider.AddEventRule(rule, "", "", "")
  541. assert.NoError(t, err)
  542. eventManager.RLock()
  543. assert.Len(t, eventManager.FsEvents, 0)
  544. assert.Len(t, eventManager.ProviderEvents, 0)
  545. assert.Len(t, eventManager.Schedules, 1)
  546. assert.Len(t, eventManager.schedulesMapping, 1)
  547. eventManager.RUnlock()
  548. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  549. assert.NoError(t, err)
  550. eventManager.RLock()
  551. assert.Len(t, eventManager.FsEvents, 0)
  552. assert.Len(t, eventManager.ProviderEvents, 0)
  553. assert.Len(t, eventManager.Schedules, 0)
  554. assert.Len(t, eventManager.schedulesMapping, 0)
  555. eventManager.RUnlock()
  556. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  557. assert.NoError(t, err)
  558. stopEventScheduler()
  559. }
  560. func TestEventManagerErrors(t *testing.T) {
  561. startEventScheduler()
  562. providerConf := dataprovider.GetProviderConfig()
  563. err := dataprovider.Close()
  564. assert.NoError(t, err)
  565. params := EventParams{
  566. sender: "sender",
  567. }
  568. _, err = params.getUsers()
  569. assert.Error(t, err)
  570. _, err = params.getFolders()
  571. assert.Error(t, err)
  572. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  573. assert.Error(t, err)
  574. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  575. assert.Error(t, err)
  576. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  577. assert.Error(t, err)
  578. err = executeUserExpirationCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  579. assert.Error(t, err)
  580. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{},
  581. dataprovider.ConditionOptions{}, &EventParams{}, time.Time{})
  582. assert.Error(t, err)
  583. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  584. assert.Error(t, err)
  585. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  586. assert.Error(t, err)
  587. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  588. assert.Error(t, err)
  589. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  590. assert.Error(t, err)
  591. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  592. assert.Error(t, err)
  593. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  594. assert.Error(t, err)
  595. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  596. dataprovider.ConditionOptions{}, &EventParams{})
  597. assert.Error(t, err)
  598. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  599. assert.Error(t, err)
  600. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  601. assert.Error(t, err)
  602. groupName := "agroup"
  603. err = executeQuotaResetForUser(&dataprovider.User{
  604. Groups: []sdk.GroupMapping{
  605. {
  606. Name: groupName,
  607. Type: sdk.GroupTypePrimary,
  608. },
  609. },
  610. })
  611. assert.Error(t, err)
  612. err = executeDataRetentionCheckForUser(dataprovider.User{
  613. Groups: []sdk.GroupMapping{
  614. {
  615. Name: groupName,
  616. Type: sdk.GroupTypePrimary,
  617. },
  618. },
  619. }, nil, &EventParams{}, "")
  620. assert.Error(t, err)
  621. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  622. Groups: []sdk.GroupMapping{
  623. {
  624. Name: groupName,
  625. Type: sdk.GroupTypePrimary,
  626. },
  627. },
  628. })
  629. assert.Error(t, err)
  630. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  631. Groups: []sdk.GroupMapping{
  632. {
  633. Name: groupName,
  634. Type: sdk.GroupTypePrimary,
  635. },
  636. },
  637. })
  638. assert.Error(t, err)
  639. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  640. Groups: []sdk.GroupMapping{
  641. {
  642. Name: groupName,
  643. Type: sdk.GroupTypePrimary,
  644. },
  645. },
  646. })
  647. assert.Error(t, err)
  648. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  649. Groups: []sdk.GroupMapping{
  650. {
  651. Name: groupName,
  652. Type: sdk.GroupTypePrimary,
  653. },
  654. },
  655. })
  656. assert.Error(t, err)
  657. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  658. Groups: []sdk.GroupMapping{
  659. {
  660. Name: groupName,
  661. Type: sdk.GroupTypePrimary,
  662. },
  663. },
  664. })
  665. assert.Error(t, err)
  666. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  667. Groups: []sdk.GroupMapping{
  668. {
  669. Name: groupName,
  670. Type: sdk.GroupTypePrimary,
  671. },
  672. },
  673. })
  674. assert.Error(t, err)
  675. err = executePwdExpirationCheckForUser(&dataprovider.User{
  676. Groups: []sdk.GroupMapping{
  677. {
  678. Name: groupName,
  679. Type: sdk.GroupTypePrimary,
  680. },
  681. }}, dataprovider.EventActionPasswordExpiration{})
  682. assert.Error(t, err)
  683. _, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  684. Method: http.MethodPost,
  685. Parts: []dataprovider.HTTPPart{
  686. {
  687. Name: "p1",
  688. },
  689. },
  690. }, nil, nil, dataprovider.User{
  691. BaseUser: sdk.BaseUser{
  692. Username: "u",
  693. },
  694. Groups: []sdk.GroupMapping{
  695. {
  696. Name: groupName,
  697. Type: sdk.GroupTypePrimary,
  698. },
  699. },
  700. }, &EventParams{}, false)
  701. assert.Error(t, err)
  702. dataRetentionAction := dataprovider.BaseEventAction{
  703. Type: dataprovider.ActionTypeDataRetentionCheck,
  704. Options: dataprovider.BaseEventActionOptions{
  705. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  706. Folders: []dataprovider.FolderRetention{
  707. {
  708. Path: "/",
  709. Retention: 24,
  710. },
  711. },
  712. },
  713. },
  714. }
  715. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  716. Names: []dataprovider.ConditionPattern{
  717. {
  718. Pattern: "username1",
  719. },
  720. },
  721. })
  722. if assert.Error(t, err) {
  723. assert.Contains(t, err.Error(), "unable to get users")
  724. }
  725. eventManager.loadRules()
  726. eventManager.RLock()
  727. assert.Len(t, eventManager.FsEvents, 0)
  728. assert.Len(t, eventManager.ProviderEvents, 0)
  729. assert.Len(t, eventManager.Schedules, 0)
  730. eventManager.RUnlock()
  731. // rule with invalid trigger
  732. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  733. Name: "test rule",
  734. Status: 1,
  735. Trigger: -1,
  736. })
  737. eventManager.RLock()
  738. assert.Len(t, eventManager.FsEvents, 0)
  739. assert.Len(t, eventManager.ProviderEvents, 0)
  740. assert.Len(t, eventManager.Schedules, 0)
  741. eventManager.RUnlock()
  742. // rule with invalid cronspec
  743. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  744. Name: "test rule",
  745. Status: 1,
  746. Trigger: dataprovider.EventTriggerSchedule,
  747. Conditions: dataprovider.EventConditions{
  748. Schedules: []dataprovider.Schedule{
  749. {
  750. Hours: "1000",
  751. },
  752. },
  753. },
  754. })
  755. eventManager.RLock()
  756. assert.Len(t, eventManager.FsEvents, 0)
  757. assert.Len(t, eventManager.ProviderEvents, 0)
  758. assert.Len(t, eventManager.Schedules, 0)
  759. eventManager.RUnlock()
  760. err = dataprovider.Initialize(providerConf, configDir, true)
  761. assert.NoError(t, err)
  762. stopEventScheduler()
  763. }
  764. func TestBuiltinRules(t *testing.T) {
  765. startEventScheduler()
  766. rule1 := util.GenerateUniqueID()
  767. loadBuiltinRulesFn = func() []dataprovider.EventRule {
  768. return []dataprovider.EventRule{
  769. {
  770. Name: rule1,
  771. Status: 1,
  772. CreatedAt: util.GetTimeAsMsSinceEpoch(time.Now()),
  773. UpdatedAt: util.GetTimeAsMsSinceEpoch(time.Now()),
  774. Trigger: dataprovider.EventTriggerSchedule,
  775. Conditions: dataprovider.EventConditions{
  776. Schedules: []dataprovider.Schedule{
  777. {
  778. Hours: "0",
  779. DayOfWeek: "*",
  780. DayOfMonth: "*",
  781. Month: "*",
  782. },
  783. },
  784. },
  785. Actions: []dataprovider.EventAction{
  786. {
  787. BaseEventAction: dataprovider.BaseEventAction{
  788. Name: "backup",
  789. Type: dataprovider.ActionTypeBackup,
  790. Options: dataprovider.BaseEventActionOptions{},
  791. },
  792. Order: 1,
  793. Options: dataprovider.EventActionOptions{},
  794. },
  795. },
  796. },
  797. }
  798. }
  799. eventManager.loadRules()
  800. eventManager.RLock()
  801. assert.Len(t, eventManager.FsEvents, 0)
  802. assert.Len(t, eventManager.ProviderEvents, 0)
  803. assert.Len(t, eventManager.Schedules, 1)
  804. eventManager.RUnlock()
  805. cronJob := eventCronJob{
  806. ruleName: rule1,
  807. }
  808. r, err := cronJob.getEventRule()
  809. assert.NoError(t, err)
  810. assert.Equal(t, rule1, r.Name)
  811. assert.Len(t, r.Actions, 1)
  812. assert.Equal(t, dataprovider.EventTriggerSchedule, r.Trigger)
  813. eventManager.RLock()
  814. eventManager.Schedules = nil
  815. eventManager.RUnlock()
  816. loadBuiltinRulesFn = nil
  817. eventManager.loadRules()
  818. eventManager.RLock()
  819. assert.Len(t, eventManager.FsEvents, 0)
  820. assert.Len(t, eventManager.ProviderEvents, 0)
  821. assert.Len(t, eventManager.Schedules, 0)
  822. eventManager.RUnlock()
  823. stopEventScheduler()
  824. }
  825. func TestEventRuleActions(t *testing.T) {
  826. actionName := "test rule action"
  827. action := dataprovider.BaseEventAction{
  828. Name: actionName,
  829. Type: dataprovider.ActionTypeBackup,
  830. }
  831. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  832. assert.NoError(t, err)
  833. action.Type = -1
  834. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  835. assert.Error(t, err)
  836. action = dataprovider.BaseEventAction{
  837. Name: actionName,
  838. Type: dataprovider.ActionTypeHTTP,
  839. Options: dataprovider.BaseEventActionOptions{
  840. HTTPConfig: dataprovider.EventActionHTTPConfig{
  841. Endpoint: "http://foo\x7f.com/", // invalid URL
  842. SkipTLSVerify: true,
  843. Body: `"data": "{{ObjectDataString}}"`,
  844. Method: http.MethodPost,
  845. QueryParameters: []dataprovider.KeyValue{
  846. {
  847. Key: "param",
  848. Value: "value",
  849. },
  850. },
  851. Timeout: 5,
  852. Headers: []dataprovider.KeyValue{
  853. {
  854. Key: "Content-Type",
  855. Value: "application/json",
  856. },
  857. },
  858. Username: "httpuser",
  859. },
  860. },
  861. }
  862. action.Options.SetEmptySecretsIfNil()
  863. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  864. if assert.Error(t, err) {
  865. assert.Contains(t, err.Error(), "invalid endpoint")
  866. }
  867. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  868. params := &EventParams{
  869. Name: "a",
  870. Object: &dataprovider.User{
  871. BaseUser: sdk.BaseUser{
  872. Username: "test user",
  873. },
  874. },
  875. }
  876. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  877. assert.NoError(t, err)
  878. action.Options.HTTPConfig.Method = http.MethodGet
  879. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  880. assert.NoError(t, err)
  881. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  882. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  883. if assert.Error(t, err) {
  884. assert.Contains(t, err.Error(), "unexpected status code: 404")
  885. }
  886. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  887. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  888. assert.Error(t, err)
  889. action.Options.HTTPConfig.QueryParameters = nil
  890. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  891. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  892. assert.Error(t, err)
  893. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  894. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  895. if assert.Error(t, err) {
  896. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  897. }
  898. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  899. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  900. action.Options.HTTPConfig.Body = ""
  901. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  902. {
  903. Name: "p1",
  904. Filepath: "path",
  905. },
  906. }
  907. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  908. assert.Contains(t, getErrorString(err), "error getting user")
  909. action.Options.HTTPConfig.Parts = nil
  910. action.Options.HTTPConfig.Body = "{{ObjectData}}"
  911. // test disk and transfer quota reset
  912. username1 := "user1"
  913. username2 := "user2"
  914. user1 := dataprovider.User{
  915. BaseUser: sdk.BaseUser{
  916. Username: username1,
  917. HomeDir: filepath.Join(os.TempDir(), username1),
  918. Status: 1,
  919. Permissions: map[string][]string{
  920. "/": {dataprovider.PermAny},
  921. },
  922. },
  923. }
  924. user2 := dataprovider.User{
  925. BaseUser: sdk.BaseUser{
  926. Username: username2,
  927. HomeDir: filepath.Join(os.TempDir(), username2),
  928. Status: 1,
  929. Permissions: map[string][]string{
  930. "/": {dataprovider.PermAny},
  931. },
  932. },
  933. }
  934. user2.Filters.PasswordExpiration = 10
  935. err = dataprovider.AddUser(&user1, "", "", "")
  936. assert.NoError(t, err)
  937. err = dataprovider.AddUser(&user2, "", "", "")
  938. assert.NoError(t, err)
  939. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  940. Threshold: 20,
  941. }, dataprovider.ConditionOptions{
  942. Names: []dataprovider.ConditionPattern{
  943. {
  944. Pattern: user2.Username,
  945. },
  946. },
  947. }, &EventParams{})
  948. // smtp not configured
  949. assert.Error(t, err)
  950. action = dataprovider.BaseEventAction{
  951. Type: dataprovider.ActionTypeUserQuotaReset,
  952. }
  953. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  954. Names: []dataprovider.ConditionPattern{
  955. {
  956. Pattern: username1,
  957. },
  958. },
  959. })
  960. assert.Error(t, err) // no home dir
  961. // create the home dir
  962. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  963. assert.NoError(t, err)
  964. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  965. assert.NoError(t, err)
  966. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  967. Names: []dataprovider.ConditionPattern{
  968. {
  969. Pattern: username1,
  970. },
  971. },
  972. })
  973. assert.NoError(t, err)
  974. userGet, err := dataprovider.UserExists(username1, "")
  975. assert.NoError(t, err)
  976. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  977. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  978. // simulate another quota scan in progress
  979. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  980. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  981. Names: []dataprovider.ConditionPattern{
  982. {
  983. Pattern: username1,
  984. },
  985. },
  986. })
  987. assert.Error(t, err)
  988. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  989. // non matching pattern
  990. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  991. Names: []dataprovider.ConditionPattern{
  992. {
  993. Pattern: "don't match",
  994. },
  995. },
  996. })
  997. assert.Error(t, err)
  998. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  999. action = dataprovider.BaseEventAction{
  1000. Type: dataprovider.ActionTypeUserExpirationCheck,
  1001. }
  1002. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1003. Names: []dataprovider.ConditionPattern{
  1004. {
  1005. Pattern: "don't match",
  1006. },
  1007. },
  1008. })
  1009. assert.Error(t, err)
  1010. assert.Contains(t, getErrorString(err), "no user expiration check executed")
  1011. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1012. Names: []dataprovider.ConditionPattern{
  1013. {
  1014. Pattern: username1,
  1015. },
  1016. },
  1017. })
  1018. assert.NoError(t, err)
  1019. dataRetentionAction := dataprovider.BaseEventAction{
  1020. Type: dataprovider.ActionTypeDataRetentionCheck,
  1021. Options: dataprovider.BaseEventActionOptions{
  1022. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  1023. Folders: []dataprovider.FolderRetention{
  1024. {
  1025. Path: "",
  1026. Retention: 24,
  1027. },
  1028. },
  1029. },
  1030. },
  1031. }
  1032. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1033. Names: []dataprovider.ConditionPattern{
  1034. {
  1035. Pattern: username1,
  1036. },
  1037. },
  1038. })
  1039. assert.Error(t, err) // invalid config, no folder path specified
  1040. retentionDir := "testretention"
  1041. dataRetentionAction = dataprovider.BaseEventAction{
  1042. Type: dataprovider.ActionTypeDataRetentionCheck,
  1043. Options: dataprovider.BaseEventActionOptions{
  1044. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  1045. Folders: []dataprovider.FolderRetention{
  1046. {
  1047. Path: path.Join("/", retentionDir),
  1048. Retention: 24,
  1049. DeleteEmptyDirs: true,
  1050. },
  1051. },
  1052. },
  1053. },
  1054. }
  1055. // create some test files
  1056. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  1057. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  1058. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  1059. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  1060. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  1061. assert.NoError(t, err)
  1062. for _, f := range []string{file1, file2, file3, file4} {
  1063. err = os.WriteFile(f, []byte(""), 0666)
  1064. assert.NoError(t, err)
  1065. }
  1066. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  1067. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  1068. assert.NoError(t, err)
  1069. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  1070. assert.NoError(t, err)
  1071. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  1072. assert.NoError(t, err)
  1073. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1074. Names: []dataprovider.ConditionPattern{
  1075. {
  1076. Pattern: username1,
  1077. },
  1078. },
  1079. })
  1080. assert.NoError(t, err)
  1081. assert.FileExists(t, file1)
  1082. assert.NoFileExists(t, file2)
  1083. assert.FileExists(t, file3)
  1084. assert.NoDirExists(t, filepath.Dir(file4))
  1085. // simulate another check in progress
  1086. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  1087. assert.NotNil(t, c)
  1088. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1089. Names: []dataprovider.ConditionPattern{
  1090. {
  1091. Pattern: username1,
  1092. },
  1093. },
  1094. })
  1095. assert.Error(t, err)
  1096. RetentionChecks.remove(user1.Username)
  1097. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1098. Names: []dataprovider.ConditionPattern{
  1099. {
  1100. Pattern: "no match",
  1101. },
  1102. },
  1103. })
  1104. assert.Error(t, err)
  1105. assert.Contains(t, getErrorString(err), "no retention check executed")
  1106. // test file exists action
  1107. action = dataprovider.BaseEventAction{
  1108. Type: dataprovider.ActionTypeFilesystem,
  1109. Options: dataprovider.BaseEventActionOptions{
  1110. FsConfig: dataprovider.EventActionFilesystemConfig{
  1111. Type: dataprovider.FilesystemActionExist,
  1112. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  1113. },
  1114. },
  1115. }
  1116. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1117. Names: []dataprovider.ConditionPattern{
  1118. {
  1119. Pattern: "no match",
  1120. },
  1121. },
  1122. })
  1123. assert.Error(t, err)
  1124. assert.Contains(t, getErrorString(err), "no existence check executed")
  1125. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1126. Names: []dataprovider.ConditionPattern{
  1127. {
  1128. Pattern: username1,
  1129. },
  1130. },
  1131. })
  1132. assert.NoError(t, err)
  1133. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  1134. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1135. Names: []dataprovider.ConditionPattern{
  1136. {
  1137. Pattern: username1,
  1138. },
  1139. },
  1140. })
  1141. assert.Error(t, err)
  1142. err = os.RemoveAll(user1.GetHomeDir())
  1143. assert.NoError(t, err)
  1144. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  1145. assert.NoError(t, err)
  1146. action.Type = dataprovider.ActionTypeTransferQuotaReset
  1147. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1148. Names: []dataprovider.ConditionPattern{
  1149. {
  1150. Pattern: username1,
  1151. },
  1152. },
  1153. })
  1154. assert.NoError(t, err)
  1155. userGet, err = dataprovider.UserExists(username1, "")
  1156. assert.NoError(t, err)
  1157. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  1158. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  1159. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1160. Names: []dataprovider.ConditionPattern{
  1161. {
  1162. Pattern: "no match",
  1163. },
  1164. },
  1165. })
  1166. assert.Error(t, err)
  1167. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  1168. action.Type = dataprovider.ActionTypeFilesystem
  1169. action.Options = dataprovider.BaseEventActionOptions{
  1170. FsConfig: dataprovider.EventActionFilesystemConfig{
  1171. Type: dataprovider.FilesystemActionRename,
  1172. Renames: []dataprovider.RenameConfig{
  1173. {
  1174. KeyValue: dataprovider.KeyValue{
  1175. Key: "/source",
  1176. Value: "/target",
  1177. },
  1178. },
  1179. },
  1180. },
  1181. }
  1182. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1183. Names: []dataprovider.ConditionPattern{
  1184. {
  1185. Pattern: "no match",
  1186. },
  1187. },
  1188. })
  1189. assert.Error(t, err)
  1190. assert.Contains(t, getErrorString(err), "no rename executed")
  1191. action.Options = dataprovider.BaseEventActionOptions{
  1192. FsConfig: dataprovider.EventActionFilesystemConfig{
  1193. Type: dataprovider.FilesystemActionDelete,
  1194. Deletes: []string{"/dir1"},
  1195. },
  1196. }
  1197. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1198. Names: []dataprovider.ConditionPattern{
  1199. {
  1200. Pattern: "no match",
  1201. },
  1202. },
  1203. })
  1204. assert.Error(t, err)
  1205. assert.Contains(t, getErrorString(err), "no delete executed")
  1206. action.Options = dataprovider.BaseEventActionOptions{
  1207. FsConfig: dataprovider.EventActionFilesystemConfig{
  1208. Type: dataprovider.FilesystemActionMkdirs,
  1209. Deletes: []string{"/dir1"},
  1210. },
  1211. }
  1212. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1213. Names: []dataprovider.ConditionPattern{
  1214. {
  1215. Pattern: "no match",
  1216. },
  1217. },
  1218. })
  1219. assert.Error(t, err)
  1220. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1221. action.Options = dataprovider.BaseEventActionOptions{
  1222. FsConfig: dataprovider.EventActionFilesystemConfig{
  1223. Type: dataprovider.FilesystemActionCompress,
  1224. Compress: dataprovider.EventActionFsCompress{
  1225. Name: "test.zip",
  1226. Paths: []string{"/{{VirtualPath}}"},
  1227. },
  1228. },
  1229. }
  1230. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1231. Names: []dataprovider.ConditionPattern{
  1232. {
  1233. Pattern: "no match",
  1234. },
  1235. },
  1236. })
  1237. assert.Error(t, err)
  1238. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1239. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1240. GroupNames: []dataprovider.ConditionPattern{
  1241. {
  1242. Pattern: "no match",
  1243. },
  1244. },
  1245. })
  1246. assert.Error(t, err)
  1247. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1248. err = dataprovider.DeleteUser(username1, "", "", "")
  1249. assert.NoError(t, err)
  1250. err = dataprovider.DeleteUser(username2, "", "", "")
  1251. assert.NoError(t, err)
  1252. // test folder quota reset
  1253. foldername1 := "f1"
  1254. foldername2 := "f2"
  1255. folder1 := vfs.BaseVirtualFolder{
  1256. Name: foldername1,
  1257. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1258. }
  1259. folder2 := vfs.BaseVirtualFolder{
  1260. Name: foldername2,
  1261. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1262. }
  1263. err = dataprovider.AddFolder(&folder1, "", "", "")
  1264. assert.NoError(t, err)
  1265. err = dataprovider.AddFolder(&folder2, "", "", "")
  1266. assert.NoError(t, err)
  1267. action = dataprovider.BaseEventAction{
  1268. Type: dataprovider.ActionTypeFolderQuotaReset,
  1269. }
  1270. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1271. Names: []dataprovider.ConditionPattern{
  1272. {
  1273. Pattern: foldername1,
  1274. },
  1275. },
  1276. })
  1277. assert.Error(t, err) // no home dir
  1278. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1279. assert.NoError(t, err)
  1280. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1281. assert.NoError(t, err)
  1282. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1283. Names: []dataprovider.ConditionPattern{
  1284. {
  1285. Pattern: foldername1,
  1286. },
  1287. },
  1288. })
  1289. assert.NoError(t, err)
  1290. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1291. assert.NoError(t, err)
  1292. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1293. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1294. // simulate another quota scan in progress
  1295. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1296. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1297. Names: []dataprovider.ConditionPattern{
  1298. {
  1299. Pattern: foldername1,
  1300. },
  1301. },
  1302. })
  1303. assert.Error(t, err)
  1304. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1305. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1306. Names: []dataprovider.ConditionPattern{
  1307. {
  1308. Pattern: "no folder match",
  1309. },
  1310. },
  1311. })
  1312. if assert.Error(t, err) {
  1313. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1314. }
  1315. body, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1316. Method: http.MethodPost,
  1317. }, nil, nil, dataprovider.User{}, &EventParams{}, true)
  1318. assert.NoError(t, err)
  1319. assert.Nil(t, body)
  1320. body, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1321. Method: http.MethodPost,
  1322. Body: "test body",
  1323. }, nil, nil, dataprovider.User{}, &EventParams{}, false)
  1324. assert.NoError(t, err)
  1325. assert.NotNil(t, body)
  1326. err = os.RemoveAll(folder1.MappedPath)
  1327. assert.NoError(t, err)
  1328. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1329. assert.NoError(t, err)
  1330. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1331. assert.NoError(t, err)
  1332. }
  1333. func TestIDPAccountCheckRule(t *testing.T) {
  1334. _, _, err := executeIDPAccountCheckRule(dataprovider.EventRule{}, EventParams{})
  1335. if assert.Error(t, err) {
  1336. assert.Contains(t, err.Error(), "no action executed")
  1337. }
  1338. _, _, err = executeIDPAccountCheckRule(dataprovider.EventRule{
  1339. Actions: []dataprovider.EventAction{
  1340. {
  1341. BaseEventAction: dataprovider.BaseEventAction{
  1342. Name: "n",
  1343. Type: dataprovider.ActionTypeIDPAccountCheck,
  1344. },
  1345. },
  1346. },
  1347. }, EventParams{Event: "invalid"})
  1348. if assert.Error(t, err) {
  1349. assert.Contains(t, err.Error(), "unsupported IDP login event")
  1350. }
  1351. // invalid json
  1352. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateAdmin: "{"}, &EventParams{Name: "missing admin"})
  1353. assert.Error(t, err)
  1354. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "["}, &EventParams{Name: "missing user"})
  1355. assert.Error(t, err)
  1356. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "{}"}, &EventParams{Name: "invalid user template"})
  1357. assert.ErrorIs(t, err, util.ErrValidation)
  1358. username := "u"
  1359. c := &dataprovider.EventActionIDPAccountCheck{
  1360. Mode: 1,
  1361. TemplateUser: `{"username":"` + username + `","status":1,"home_dir":"` + util.JSONEscape(filepath.Join(os.TempDir())) + `","permissions":{"/":["*"]}}`,
  1362. }
  1363. params := &EventParams{
  1364. Name: username,
  1365. Event: IDPLoginUser,
  1366. }
  1367. user, err := executeUserCheckAction(c, params)
  1368. assert.NoError(t, err)
  1369. assert.Equal(t, username, user.Username)
  1370. assert.Equal(t, 1, user.Status)
  1371. user.Status = 0
  1372. err = dataprovider.UpdateUser(user, "", "", "")
  1373. assert.NoError(t, err)
  1374. // the user is not changed
  1375. user, err = executeUserCheckAction(c, params)
  1376. assert.NoError(t, err)
  1377. assert.Equal(t, username, user.Username)
  1378. assert.Equal(t, 0, user.Status)
  1379. // change the mode, the user is now updated
  1380. c.Mode = 0
  1381. user, err = executeUserCheckAction(c, params)
  1382. assert.NoError(t, err)
  1383. assert.Equal(t, username, user.Username)
  1384. assert.Equal(t, 1, user.Status)
  1385. assert.Empty(t, user.Password)
  1386. assert.Len(t, user.PublicKeys, 0)
  1387. assert.Len(t, user.Filters.TLSCerts, 0)
  1388. assert.Empty(t, user.Email)
  1389. assert.Empty(t, user.Description)
  1390. // Update the profile attribute and make sure they are preserved
  1391. user.Password = "secret"
  1392. user.Email = "[email protected]"
  1393. user.Description = "some desc"
  1394. user.Filters.TLSCerts = []string{serverCert}
  1395. user.PublicKeys = []string{"ssh-rsa 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 nicola@p1"}
  1396. err = dataprovider.UpdateUser(user, "", "", "")
  1397. assert.NoError(t, err)
  1398. user, err = executeUserCheckAction(c, params)
  1399. assert.NoError(t, err)
  1400. assert.Equal(t, username, user.Username)
  1401. assert.Equal(t, 1, user.Status)
  1402. assert.NotEmpty(t, user.Password)
  1403. assert.Len(t, user.PublicKeys, 1)
  1404. assert.Len(t, user.Filters.TLSCerts, 1)
  1405. assert.NotEmpty(t, user.Email)
  1406. assert.NotEmpty(t, user.Description)
  1407. err = dataprovider.DeleteUser(username, "", "", "")
  1408. assert.NoError(t, err)
  1409. // check rule consistency
  1410. r := dataprovider.EventRule{
  1411. Actions: []dataprovider.EventAction{
  1412. {
  1413. BaseEventAction: dataprovider.BaseEventAction{
  1414. Type: dataprovider.ActionTypeIDPAccountCheck,
  1415. },
  1416. Order: 1,
  1417. },
  1418. },
  1419. }
  1420. err = r.CheckActionsConsistency("")
  1421. if assert.Error(t, err) {
  1422. assert.Contains(t, err.Error(), "IDP account check action is only supported for IDP login trigger")
  1423. }
  1424. r.Trigger = dataprovider.EventTriggerIDPLogin
  1425. err = r.CheckActionsConsistency("")
  1426. if assert.Error(t, err) {
  1427. assert.Contains(t, err.Error(), "IDP account check must be a sync action")
  1428. }
  1429. r.Actions[0].Options.ExecuteSync = true
  1430. err = r.CheckActionsConsistency("")
  1431. assert.NoError(t, err)
  1432. r.Actions = append(r.Actions, dataprovider.EventAction{
  1433. BaseEventAction: dataprovider.BaseEventAction{
  1434. Type: dataprovider.ActionTypeCommand,
  1435. },
  1436. Options: dataprovider.EventActionOptions{
  1437. ExecuteSync: true,
  1438. },
  1439. Order: 2,
  1440. })
  1441. err = r.CheckActionsConsistency("")
  1442. if assert.Error(t, err) {
  1443. assert.Contains(t, err.Error(), "IDP account check must be the only sync action")
  1444. }
  1445. }
  1446. func TestUserExpirationCheck(t *testing.T) {
  1447. username := "test_user_expiration_check"
  1448. user := dataprovider.User{
  1449. BaseUser: sdk.BaseUser{
  1450. Username: username,
  1451. Permissions: map[string][]string{
  1452. "/": {dataprovider.PermAny},
  1453. },
  1454. HomeDir: filepath.Join(os.TempDir(), username),
  1455. ExpirationDate: util.GetTimeAsMsSinceEpoch(time.Now().Add(-24 * time.Hour)),
  1456. },
  1457. }
  1458. user.Filters.PasswordExpiration = 5
  1459. err := dataprovider.AddUser(&user, "", "", "")
  1460. assert.NoError(t, err)
  1461. conditions := dataprovider.ConditionOptions{
  1462. Names: []dataprovider.ConditionPattern{
  1463. {
  1464. Pattern: username,
  1465. },
  1466. },
  1467. }
  1468. err = executeUserExpirationCheckRuleAction(conditions, &EventParams{})
  1469. if assert.Error(t, err) {
  1470. assert.Contains(t, err.Error(), "expired users")
  1471. }
  1472. // the check will be skipped, the user is expired
  1473. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{Threshold: 10}, conditions, &EventParams{})
  1474. assert.NoError(t, err)
  1475. err = dataprovider.DeleteUser(username, "", "", "")
  1476. assert.NoError(t, err)
  1477. err = os.RemoveAll(user.GetHomeDir())
  1478. assert.NoError(t, err)
  1479. }
  1480. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1481. username := "test_user_action_group_matching"
  1482. user := dataprovider.User{
  1483. BaseUser: sdk.BaseUser{
  1484. Username: username,
  1485. Permissions: map[string][]string{
  1486. "/": {dataprovider.PermAny},
  1487. },
  1488. HomeDir: filepath.Join(os.TempDir(), username),
  1489. },
  1490. }
  1491. err := dataprovider.AddUser(&user, "", "", "")
  1492. assert.NoError(t, err)
  1493. conditions := dataprovider.ConditionOptions{
  1494. GroupNames: []dataprovider.ConditionPattern{
  1495. {
  1496. Pattern: "agroup",
  1497. },
  1498. },
  1499. }
  1500. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1501. if assert.Error(t, err) {
  1502. assert.Contains(t, err.Error(), "no delete executed")
  1503. }
  1504. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1505. if assert.Error(t, err) {
  1506. assert.Contains(t, err.Error(), "no mkdir executed")
  1507. }
  1508. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1509. if assert.Error(t, err) {
  1510. assert.Contains(t, err.Error(), "no rename executed")
  1511. }
  1512. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1513. if assert.Error(t, err) {
  1514. assert.Contains(t, err.Error(), "no existence check executed")
  1515. }
  1516. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1517. if assert.Error(t, err) {
  1518. assert.Contains(t, err.Error(), "no copy executed")
  1519. }
  1520. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1521. if assert.Error(t, err) {
  1522. assert.Contains(t, err.Error(), "no user quota reset executed")
  1523. }
  1524. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1525. if assert.Error(t, err) {
  1526. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1527. }
  1528. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1529. if assert.Error(t, err) {
  1530. assert.Contains(t, err.Error(), "no retention check executed")
  1531. }
  1532. err = dataprovider.DeleteUser(username, "", "", "")
  1533. assert.NoError(t, err)
  1534. err = os.RemoveAll(user.GetHomeDir())
  1535. assert.NoError(t, err)
  1536. }
  1537. func TestGetFileContent(t *testing.T) {
  1538. username := "test_user_get_file_content"
  1539. user := dataprovider.User{
  1540. BaseUser: sdk.BaseUser{
  1541. Username: username,
  1542. Permissions: map[string][]string{
  1543. "/": {dataprovider.PermAny},
  1544. },
  1545. HomeDir: filepath.Join(os.TempDir(), username),
  1546. },
  1547. }
  1548. err := dataprovider.AddUser(&user, "", "", "")
  1549. assert.NoError(t, err)
  1550. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1551. assert.NoError(t, err)
  1552. fileContent := []byte("test file content")
  1553. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1554. assert.NoError(t, err)
  1555. conn := NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1556. replacer := strings.NewReplacer("old", "new")
  1557. files, err := getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1558. assert.NoError(t, err)
  1559. if assert.Len(t, files, 1) {
  1560. var b bytes.Buffer
  1561. _, err = files[0].Writer(&b)
  1562. assert.NoError(t, err)
  1563. assert.Equal(t, fileContent, b.Bytes())
  1564. }
  1565. // missing file
  1566. _, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1567. assert.Error(t, err)
  1568. // directory
  1569. _, err = getMailAttachments(conn, []string{"/"}, replacer)
  1570. assert.Error(t, err)
  1571. // files too large
  1572. content := make([]byte, maxAttachmentsSize/2+1)
  1573. _, err = rand.Read(content)
  1574. assert.NoError(t, err)
  1575. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1576. assert.NoError(t, err)
  1577. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1578. assert.NoError(t, err)
  1579. files, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1580. assert.NoError(t, err)
  1581. if assert.Len(t, files, 1) {
  1582. var b bytes.Buffer
  1583. _, err = files[0].Writer(&b)
  1584. assert.NoError(t, err)
  1585. assert.Equal(t, content, b.Bytes())
  1586. }
  1587. _, err = getMailAttachments(conn, []string{"/file1.txt", "/file2.txt"}, replacer)
  1588. if assert.Error(t, err) {
  1589. assert.Contains(t, err.Error(), "size too large")
  1590. }
  1591. // change the filesystem provider
  1592. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1593. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1594. err = dataprovider.UpdateUser(&user, "", "", "")
  1595. assert.NoError(t, err)
  1596. conn = NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1597. // the file is not encrypted so reading the encryption header will fail
  1598. files, err = getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1599. assert.NoError(t, err)
  1600. if assert.Len(t, files, 1) {
  1601. var b bytes.Buffer
  1602. _, err = files[0].Writer(&b)
  1603. assert.Error(t, err)
  1604. }
  1605. err = dataprovider.DeleteUser(username, "", "", "")
  1606. assert.NoError(t, err)
  1607. err = os.RemoveAll(user.GetHomeDir())
  1608. assert.NoError(t, err)
  1609. }
  1610. func TestFilesystemActionErrors(t *testing.T) {
  1611. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1612. if assert.Error(t, err) {
  1613. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1614. }
  1615. username := "test_user_for_actions"
  1616. testReplacer := strings.NewReplacer("old", "new")
  1617. user := dataprovider.User{
  1618. BaseUser: sdk.BaseUser{
  1619. Username: username,
  1620. Permissions: map[string][]string{
  1621. "/": {dataprovider.PermAny},
  1622. },
  1623. HomeDir: filepath.Join(os.TempDir(), username),
  1624. },
  1625. FsConfig: vfs.Filesystem{
  1626. Provider: sdk.SFTPFilesystemProvider,
  1627. SFTPConfig: vfs.SFTPFsConfig{
  1628. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1629. Endpoint: "127.0.0.1:4022",
  1630. Username: username,
  1631. },
  1632. Password: kms.NewPlainSecret("pwd"),
  1633. },
  1634. },
  1635. }
  1636. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1637. Recipients: []string{"[email protected]"},
  1638. Subject: "subject",
  1639. Body: "body",
  1640. Attachments: []string{"/file.txt"},
  1641. }, &EventParams{
  1642. sender: username,
  1643. })
  1644. assert.Error(t, err)
  1645. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1646. err = executeDeleteFileFsAction(conn, "", nil)
  1647. assert.Error(t, err)
  1648. err = dataprovider.AddUser(&user, "", "", "")
  1649. assert.NoError(t, err)
  1650. // check root fs fails
  1651. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1652. assert.Error(t, err)
  1653. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1654. assert.Error(t, err)
  1655. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1656. assert.Error(t, err)
  1657. err = executeExistFsActionForUser(nil, testReplacer, user)
  1658. assert.Error(t, err)
  1659. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1660. assert.Error(t, err)
  1661. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1662. assert.Error(t, err)
  1663. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1664. assert.Error(t, err)
  1665. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1666. Recipients: []string{"[email protected]"},
  1667. Subject: "subject",
  1668. Body: "body",
  1669. Attachments: []string{"/file1.txt"},
  1670. }, &EventParams{
  1671. sender: username,
  1672. })
  1673. assert.Error(t, err)
  1674. fn := getFileContentFn(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1675. var b bytes.Buffer
  1676. _, err = fn(&b)
  1677. assert.Error(t, err)
  1678. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1679. Endpoint: "http://127.0.0.1:9999/",
  1680. Method: http.MethodPost,
  1681. Parts: []dataprovider.HTTPPart{
  1682. {
  1683. Name: "p1",
  1684. Filepath: "/filepath",
  1685. },
  1686. },
  1687. }, &EventParams{
  1688. sender: username,
  1689. })
  1690. assert.Error(t, err)
  1691. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1692. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1693. err = dataprovider.DeleteUser(username, "", "", "")
  1694. assert.NoError(t, err)
  1695. err = dataprovider.AddUser(&user, "", "", "")
  1696. assert.NoError(t, err)
  1697. err = executeRenameFsActionForUser([]dataprovider.RenameConfig{
  1698. {
  1699. KeyValue: dataprovider.KeyValue{
  1700. Key: "/p1",
  1701. Value: "/p1",
  1702. },
  1703. },
  1704. }, testReplacer, user)
  1705. if assert.Error(t, err) {
  1706. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1707. }
  1708. err = executeRuleAction(dataprovider.BaseEventAction{
  1709. Type: dataprovider.ActionTypeFilesystem,
  1710. Options: dataprovider.BaseEventActionOptions{
  1711. FsConfig: dataprovider.EventActionFilesystemConfig{
  1712. Type: dataprovider.FilesystemActionRename,
  1713. Renames: []dataprovider.RenameConfig{
  1714. {
  1715. KeyValue: dataprovider.KeyValue{
  1716. Key: "/p2",
  1717. Value: "/p2",
  1718. },
  1719. },
  1720. },
  1721. },
  1722. },
  1723. }, &EventParams{}, dataprovider.ConditionOptions{
  1724. Names: []dataprovider.ConditionPattern{
  1725. {
  1726. Pattern: username,
  1727. },
  1728. },
  1729. })
  1730. assert.Error(t, err)
  1731. if runtime.GOOS != osWindows {
  1732. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1733. err := os.MkdirAll(dirPath, os.ModePerm)
  1734. assert.NoError(t, err)
  1735. filePath := filepath.Join(dirPath, "f.dat")
  1736. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1737. assert.NoError(t, err)
  1738. err = os.Chmod(dirPath, 0001)
  1739. assert.NoError(t, err)
  1740. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1741. assert.Error(t, err)
  1742. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1743. assert.Error(t, err)
  1744. err = os.Chmod(dirPath, 0555)
  1745. assert.NoError(t, err)
  1746. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1747. if assert.Error(t, err) {
  1748. assert.Contains(t, err.Error(), "unable to remove file")
  1749. }
  1750. err = executeRuleAction(dataprovider.BaseEventAction{
  1751. Type: dataprovider.ActionTypeFilesystem,
  1752. Options: dataprovider.BaseEventActionOptions{
  1753. FsConfig: dataprovider.EventActionFilesystemConfig{
  1754. Type: dataprovider.FilesystemActionDelete,
  1755. Deletes: []string{"/adir/sub/f.dat"},
  1756. },
  1757. },
  1758. }, &EventParams{}, dataprovider.ConditionOptions{
  1759. Names: []dataprovider.ConditionPattern{
  1760. {
  1761. Pattern: username,
  1762. },
  1763. },
  1764. })
  1765. assert.Error(t, err)
  1766. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1767. if assert.Error(t, err) {
  1768. assert.Contains(t, err.Error(), "unable to create dir")
  1769. }
  1770. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1771. if assert.Error(t, err) {
  1772. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1773. }
  1774. err = executeRuleAction(dataprovider.BaseEventAction{
  1775. Type: dataprovider.ActionTypeFilesystem,
  1776. Options: dataprovider.BaseEventActionOptions{
  1777. FsConfig: dataprovider.EventActionFilesystemConfig{
  1778. Type: dataprovider.FilesystemActionMkdirs,
  1779. MkDirs: []string{"/adir/sub/sub1"},
  1780. },
  1781. },
  1782. }, &EventParams{}, dataprovider.ConditionOptions{
  1783. Names: []dataprovider.ConditionPattern{
  1784. {
  1785. Pattern: username,
  1786. },
  1787. },
  1788. })
  1789. assert.Error(t, err)
  1790. err = os.Chmod(dirPath, os.ModePerm)
  1791. assert.NoError(t, err)
  1792. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1793. wr := &zipWriterWrapper{
  1794. Name: "test.zip",
  1795. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1796. Entries: map[string]bool{},
  1797. }
  1798. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub", 0)
  1799. assert.Error(t, err)
  1800. assert.Contains(t, getErrorString(err), "is outside base dir")
  1801. }
  1802. wr := &zipWriterWrapper{
  1803. Name: xid.New().String() + ".zip",
  1804. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1805. Entries: map[string]bool{},
  1806. }
  1807. err = addZipEntry(wr, conn, "/p1", "/", 2000)
  1808. assert.ErrorIs(t, err, util.ErrRecursionTooDeep)
  1809. err = dataprovider.DeleteUser(username, "", "", "")
  1810. assert.NoError(t, err)
  1811. err = os.RemoveAll(user.GetHomeDir())
  1812. assert.NoError(t, err)
  1813. }
  1814. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1815. oldProviderConf := dataprovider.GetProviderConfig()
  1816. providerConf := dataprovider.GetProviderConfig()
  1817. providerConf.TrackQuota = 0
  1818. err := dataprovider.Close()
  1819. assert.NoError(t, err)
  1820. err = dataprovider.Initialize(providerConf, configDir, true)
  1821. assert.NoError(t, err)
  1822. username := "u1"
  1823. user := dataprovider.User{
  1824. BaseUser: sdk.BaseUser{
  1825. Username: username,
  1826. HomeDir: filepath.Join(os.TempDir(), username),
  1827. Status: 1,
  1828. Permissions: map[string][]string{
  1829. "/": {dataprovider.PermAny},
  1830. },
  1831. },
  1832. FsConfig: vfs.Filesystem{
  1833. Provider: sdk.LocalFilesystemProvider,
  1834. },
  1835. }
  1836. err = dataprovider.AddUser(&user, "", "", "")
  1837. assert.NoError(t, err)
  1838. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1839. assert.NoError(t, err)
  1840. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1841. &EventParams{}, dataprovider.ConditionOptions{
  1842. Names: []dataprovider.ConditionPattern{
  1843. {
  1844. Pattern: username,
  1845. },
  1846. },
  1847. })
  1848. assert.Error(t, err)
  1849. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1850. &EventParams{}, dataprovider.ConditionOptions{
  1851. Names: []dataprovider.ConditionPattern{
  1852. {
  1853. Pattern: username,
  1854. },
  1855. },
  1856. })
  1857. assert.Error(t, err)
  1858. err = os.RemoveAll(user.GetHomeDir())
  1859. assert.NoError(t, err)
  1860. err = dataprovider.DeleteUser(username, "", "", "")
  1861. assert.NoError(t, err)
  1862. foldername := "f1"
  1863. folder := vfs.BaseVirtualFolder{
  1864. Name: foldername,
  1865. MappedPath: filepath.Join(os.TempDir(), foldername),
  1866. }
  1867. err = dataprovider.AddFolder(&folder, "", "", "")
  1868. assert.NoError(t, err)
  1869. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1870. assert.NoError(t, err)
  1871. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1872. &EventParams{}, dataprovider.ConditionOptions{
  1873. Names: []dataprovider.ConditionPattern{
  1874. {
  1875. Pattern: foldername,
  1876. },
  1877. },
  1878. })
  1879. assert.Error(t, err)
  1880. err = os.RemoveAll(folder.MappedPath)
  1881. assert.NoError(t, err)
  1882. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1883. assert.NoError(t, err)
  1884. err = dataprovider.Close()
  1885. assert.NoError(t, err)
  1886. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1887. assert.NoError(t, err)
  1888. }
  1889. func TestScheduledActions(t *testing.T) {
  1890. startEventScheduler()
  1891. backupsPath := filepath.Join(os.TempDir(), "backups")
  1892. err := os.RemoveAll(backupsPath)
  1893. assert.NoError(t, err)
  1894. action := &dataprovider.BaseEventAction{
  1895. Name: "action",
  1896. Type: dataprovider.ActionTypeBackup,
  1897. }
  1898. err = dataprovider.AddEventAction(action, "", "", "")
  1899. assert.NoError(t, err)
  1900. rule := &dataprovider.EventRule{
  1901. Name: "rule",
  1902. Status: 1,
  1903. Trigger: dataprovider.EventTriggerSchedule,
  1904. Conditions: dataprovider.EventConditions{
  1905. Schedules: []dataprovider.Schedule{
  1906. {
  1907. Hours: "11",
  1908. DayOfWeek: "*",
  1909. DayOfMonth: "*",
  1910. Month: "*",
  1911. },
  1912. },
  1913. },
  1914. Actions: []dataprovider.EventAction{
  1915. {
  1916. BaseEventAction: dataprovider.BaseEventAction{
  1917. Name: action.Name,
  1918. },
  1919. Order: 1,
  1920. },
  1921. },
  1922. }
  1923. job := eventCronJob{
  1924. ruleName: rule.Name,
  1925. }
  1926. job.Run() // rule not found
  1927. assert.NoDirExists(t, backupsPath)
  1928. err = dataprovider.AddEventRule(rule, "", "", "")
  1929. assert.NoError(t, err)
  1930. job.Run()
  1931. assert.DirExists(t, backupsPath)
  1932. action.Type = dataprovider.ActionTypeEmail
  1933. action.Options = dataprovider.BaseEventActionOptions{
  1934. EmailConfig: dataprovider.EventActionEmailConfig{
  1935. Recipients: []string{"[email protected]"},
  1936. Subject: "test with attachments",
  1937. Body: "body",
  1938. Attachments: []string{"/file1.txt"},
  1939. },
  1940. }
  1941. err = dataprovider.UpdateEventAction(action, "", "", "")
  1942. assert.NoError(t, err)
  1943. job.Run() // action is not compatible with a scheduled rule
  1944. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1945. assert.NoError(t, err)
  1946. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  1947. assert.NoError(t, err)
  1948. err = os.RemoveAll(backupsPath)
  1949. assert.NoError(t, err)
  1950. stopEventScheduler()
  1951. }
  1952. func TestEventParamsCopy(t *testing.T) {
  1953. params := EventParams{
  1954. Name: "name",
  1955. Event: "event",
  1956. Extension: "ext",
  1957. Status: 1,
  1958. errors: []string{"error1"},
  1959. retentionChecks: []executedRetentionCheck{},
  1960. }
  1961. paramsCopy := params.getACopy()
  1962. assert.Equal(t, params, *paramsCopy)
  1963. params.Name = "name mod"
  1964. paramsCopy.Event = "event mod"
  1965. paramsCopy.Status = 2
  1966. params.errors = append(params.errors, "error2")
  1967. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1968. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1969. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1970. assert.Equal(t, "name mod", params.Name)
  1971. assert.Equal(t, "name", paramsCopy.Name)
  1972. assert.Equal(t, "event", params.Event)
  1973. assert.Equal(t, "event mod", paramsCopy.Event)
  1974. assert.Equal(t, 1, params.Status)
  1975. assert.Equal(t, 2, paramsCopy.Status)
  1976. params = EventParams{
  1977. retentionChecks: []executedRetentionCheck{
  1978. {
  1979. Username: "u",
  1980. ActionName: "a",
  1981. Results: []folderRetentionCheckResult{
  1982. {
  1983. Path: "p",
  1984. Retention: 1,
  1985. },
  1986. },
  1987. },
  1988. },
  1989. }
  1990. paramsCopy = params.getACopy()
  1991. require.Len(t, paramsCopy.retentionChecks, 1)
  1992. paramsCopy.retentionChecks[0].Username = "u_copy"
  1993. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1994. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1995. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1996. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1997. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1998. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1999. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  2000. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  2001. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  2002. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  2003. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  2004. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  2005. assert.Nil(t, params.IDPCustomFields)
  2006. params.addIDPCustomFields(nil)
  2007. assert.Nil(t, params.IDPCustomFields)
  2008. params.IDPCustomFields = &map[string]string{
  2009. "field1": "val1",
  2010. }
  2011. paramsCopy = params.getACopy()
  2012. for k, v := range *paramsCopy.IDPCustomFields {
  2013. assert.Equal(t, "field1", k)
  2014. assert.Equal(t, "val1", v)
  2015. }
  2016. assert.Equal(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  2017. (*paramsCopy.IDPCustomFields)["field1"] = "val2"
  2018. assert.NotEqual(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  2019. params.Metadata = map[string]string{"key": "value"}
  2020. paramsCopy = params.getACopy()
  2021. params.Metadata["key1"] = "value1"
  2022. require.Equal(t, map[string]string{"key": "value"}, paramsCopy.Metadata)
  2023. }
  2024. func TestEventParamsStatusFromError(t *testing.T) {
  2025. params := EventParams{Status: 1}
  2026. params.AddError(os.ErrNotExist)
  2027. assert.Equal(t, 1, params.Status)
  2028. params = EventParams{Status: 1, updateStatusFromError: true}
  2029. params.AddError(os.ErrNotExist)
  2030. assert.Equal(t, 2, params.Status)
  2031. }
  2032. type testWriter struct {
  2033. errTest error
  2034. sentinel string
  2035. }
  2036. func (w *testWriter) Write(p []byte) (int, error) {
  2037. if w.errTest != nil {
  2038. return 0, w.errTest
  2039. }
  2040. if w.sentinel == string(p) {
  2041. return 0, io.ErrUnexpectedEOF
  2042. }
  2043. return len(p), nil
  2044. }
  2045. func TestWriteHTTPPartsError(t *testing.T) {
  2046. m := multipart.NewWriter(&testWriter{
  2047. errTest: io.ErrShortWrite,
  2048. })
  2049. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{}, false)
  2050. assert.ErrorIs(t, err, io.ErrShortWrite)
  2051. body := "test body"
  2052. m = multipart.NewWriter(&testWriter{sentinel: body})
  2053. err = writeHTTPPart(m, dataprovider.HTTPPart{
  2054. Body: body,
  2055. }, nil, nil, nil, &EventParams{}, false)
  2056. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  2057. }
  2058. func TestReplacePathsPlaceholders(t *testing.T) {
  2059. replacer := strings.NewReplacer("{{VirtualPath}}", "/path1")
  2060. paths := []string{"{{VirtualPath}}", "/path1"}
  2061. paths = replacePathsPlaceholders(paths, replacer)
  2062. assert.Equal(t, []string{"/path1"}, paths)
  2063. paths = []string{"{{VirtualPath}}", "/path2"}
  2064. paths = replacePathsPlaceholders(paths, replacer)
  2065. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  2066. }
  2067. func TestEstimateZipSizeErrors(t *testing.T) {
  2068. u := dataprovider.User{
  2069. BaseUser: sdk.BaseUser{
  2070. Username: "u",
  2071. HomeDir: filepath.Join(os.TempDir(), "u"),
  2072. Status: 1,
  2073. Permissions: map[string][]string{
  2074. "/": {dataprovider.PermAny},
  2075. },
  2076. QuotaSize: 1000,
  2077. },
  2078. }
  2079. err := dataprovider.AddUser(&u, "", "", "")
  2080. assert.NoError(t, err)
  2081. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  2082. assert.NoError(t, err)
  2083. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  2084. _, _, _, _, err = getFileWriter(conn, "/missing/path/file.txt", -1) //nolint:dogsled
  2085. assert.Error(t, err)
  2086. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  2087. assert.True(t, conn.IsNotExistError(err))
  2088. if runtime.GOOS != osWindows {
  2089. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  2090. assert.NoError(t, err)
  2091. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  2092. assert.NoError(t, err)
  2093. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  2094. assert.NoError(t, err)
  2095. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  2096. assert.Error(t, err, "size %d", size)
  2097. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  2098. assert.NoError(t, err)
  2099. }
  2100. err = dataprovider.DeleteUser(u.Username, "", "", "")
  2101. assert.NoError(t, err)
  2102. err = os.RemoveAll(u.GetHomeDir())
  2103. assert.NoError(t, err)
  2104. }
  2105. func TestOnDemandRule(t *testing.T) {
  2106. a := &dataprovider.BaseEventAction{
  2107. Name: "a",
  2108. Type: dataprovider.ActionTypeBackup,
  2109. Options: dataprovider.BaseEventActionOptions{},
  2110. }
  2111. err := dataprovider.AddEventAction(a, "", "", "")
  2112. assert.NoError(t, err)
  2113. r := &dataprovider.EventRule{
  2114. Name: "test on demand rule",
  2115. Status: 1,
  2116. Trigger: dataprovider.EventTriggerOnDemand,
  2117. Actions: []dataprovider.EventAction{
  2118. {
  2119. BaseEventAction: dataprovider.BaseEventAction{
  2120. Name: a.Name,
  2121. },
  2122. },
  2123. },
  2124. }
  2125. err = dataprovider.AddEventRule(r, "", "", "")
  2126. assert.NoError(t, err)
  2127. err = RunOnDemandRule(r.Name)
  2128. assert.NoError(t, err)
  2129. r.Status = 0
  2130. err = dataprovider.UpdateEventRule(r, "", "", "")
  2131. assert.NoError(t, err)
  2132. err = RunOnDemandRule(r.Name)
  2133. assert.ErrorIs(t, err, util.ErrValidation)
  2134. assert.Contains(t, err.Error(), "is inactive")
  2135. r.Status = 1
  2136. r.Trigger = dataprovider.EventTriggerCertificate
  2137. err = dataprovider.UpdateEventRule(r, "", "", "")
  2138. assert.NoError(t, err)
  2139. err = RunOnDemandRule(r.Name)
  2140. assert.ErrorIs(t, err, util.ErrValidation)
  2141. assert.Contains(t, err.Error(), "is not defined as on-demand")
  2142. a1 := &dataprovider.BaseEventAction{
  2143. Name: "a1",
  2144. Type: dataprovider.ActionTypeEmail,
  2145. Options: dataprovider.BaseEventActionOptions{
  2146. EmailConfig: dataprovider.EventActionEmailConfig{
  2147. Recipients: []string{"[email protected]"},
  2148. Subject: "subject",
  2149. Body: "body",
  2150. Attachments: []string{"/{{VirtualPath}}"},
  2151. },
  2152. },
  2153. }
  2154. err = dataprovider.AddEventAction(a1, "", "", "")
  2155. assert.NoError(t, err)
  2156. r.Trigger = dataprovider.EventTriggerOnDemand
  2157. r.Actions = []dataprovider.EventAction{
  2158. {
  2159. BaseEventAction: dataprovider.BaseEventAction{
  2160. Name: a1.Name,
  2161. },
  2162. },
  2163. }
  2164. err = dataprovider.UpdateEventRule(r, "", "", "")
  2165. assert.NoError(t, err)
  2166. err = RunOnDemandRule(r.Name)
  2167. assert.ErrorIs(t, err, util.ErrValidation)
  2168. assert.Contains(t, err.Error(), "incosistent actions")
  2169. err = dataprovider.DeleteEventRule(r.Name, "", "", "")
  2170. assert.NoError(t, err)
  2171. err = dataprovider.DeleteEventAction(a.Name, "", "", "")
  2172. assert.NoError(t, err)
  2173. err = dataprovider.DeleteEventAction(a1.Name, "", "", "")
  2174. assert.NoError(t, err)
  2175. err = RunOnDemandRule(r.Name)
  2176. assert.ErrorIs(t, err, util.ErrNotFound)
  2177. }
  2178. func getErrorString(err error) string {
  2179. if err == nil {
  2180. return ""
  2181. }
  2182. return err.Error()
  2183. }
  2184. func TestHTTPEndpointWithPlaceholders(t *testing.T) {
  2185. c := dataprovider.EventActionHTTPConfig{
  2186. Endpoint: "http://127.0.0.1:8080/base/url/{{Name}}/{{VirtualPath}}/upload",
  2187. QueryParameters: []dataprovider.KeyValue{
  2188. {
  2189. Key: "u",
  2190. Value: "{{Name}}",
  2191. },
  2192. {
  2193. Key: "p",
  2194. Value: "{{VirtualPath}}",
  2195. },
  2196. },
  2197. }
  2198. name := "uname"
  2199. vPath := "/a dir/@ file.txt"
  2200. replacer := strings.NewReplacer("{{Name}}", name, "{{VirtualPath}}", vPath)
  2201. u, err := getHTTPRuleActionEndpoint(&c, replacer)
  2202. assert.NoError(t, err)
  2203. expected := "http://127.0.0.1:8080/base/url/" + url.PathEscape(name) + "/" + url.PathEscape(vPath) +
  2204. "/upload?" + "p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2205. assert.Equal(t, expected, u)
  2206. c.Endpoint = "http://127.0.0.1/upload"
  2207. u, err = getHTTPRuleActionEndpoint(&c, replacer)
  2208. assert.NoError(t, err)
  2209. expected = c.Endpoint + "?p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2210. assert.Equal(t, expected, u)
  2211. }
  2212. func TestMetadataReplacement(t *testing.T) {
  2213. params := &EventParams{
  2214. Metadata: map[string]string{
  2215. "key": "value",
  2216. },
  2217. }
  2218. replacements := params.getStringReplacements(false, false)
  2219. replacer := strings.NewReplacer(replacements...)
  2220. reader, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{Body: "{{Metadata}} {{MetadataString}}"}, replacer, nil, dataprovider.User{}, params, false)
  2221. require.NoError(t, err)
  2222. data, err := io.ReadAll(reader)
  2223. require.NoError(t, err)
  2224. assert.Equal(t, `{"key":"value"} {\"key\":\"value\"}`, string(data))
  2225. }
  2226. func TestUserInactivityCheck(t *testing.T) {
  2227. username1 := "user1"
  2228. username2 := "user2"
  2229. user1 := dataprovider.User{
  2230. BaseUser: sdk.BaseUser{
  2231. Username: username1,
  2232. HomeDir: filepath.Join(os.TempDir(), username1),
  2233. Status: 1,
  2234. Permissions: map[string][]string{
  2235. "/": {dataprovider.PermAny},
  2236. },
  2237. },
  2238. }
  2239. user2 := dataprovider.User{
  2240. BaseUser: sdk.BaseUser{
  2241. Username: username2,
  2242. HomeDir: filepath.Join(os.TempDir(), username2),
  2243. Status: 1,
  2244. Permissions: map[string][]string{
  2245. "/": {dataprovider.PermAny},
  2246. },
  2247. },
  2248. }
  2249. days := user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2250. assert.Equal(t, 0, days)
  2251. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2252. err := executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2253. DisableThreshold: 10,
  2254. }, time.Now().Add(12*24*time.Hour))
  2255. assert.Error(t, err)
  2256. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2257. err = executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2258. DeleteThreshold: 10,
  2259. }, time.Now().Add(12*24*time.Hour))
  2260. assert.Error(t, err)
  2261. err = dataprovider.AddUser(&user1, "", "", "")
  2262. assert.NoError(t, err)
  2263. err = dataprovider.AddUser(&user2, "", "", "")
  2264. assert.NoError(t, err)
  2265. user1, err = dataprovider.UserExists(username1, "")
  2266. assert.NoError(t, err)
  2267. assert.Equal(t, 1, user1.Status)
  2268. days = user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2269. assert.Equal(t, 10, days)
  2270. days = user1.InactivityDays(time.Now().Add(-10*24*time.Hour + 5*time.Second))
  2271. assert.Equal(t, -9, days)
  2272. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2273. DisableThreshold: 10,
  2274. }, dataprovider.ConditionOptions{
  2275. Names: []dataprovider.ConditionPattern{
  2276. {
  2277. Pattern: "not matching",
  2278. },
  2279. },
  2280. }, &EventParams{}, time.Now().Add(12*24*time.Hour))
  2281. assert.NoError(t, err)
  2282. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2283. DisableThreshold: 10,
  2284. }, dataprovider.ConditionOptions{
  2285. Names: []dataprovider.ConditionPattern{
  2286. {
  2287. Pattern: user1.Username,
  2288. },
  2289. },
  2290. }, &EventParams{}, time.Now())
  2291. assert.NoError(t, err) // no action
  2292. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2293. DisableThreshold: 10,
  2294. }, dataprovider.ConditionOptions{
  2295. Names: []dataprovider.ConditionPattern{
  2296. {
  2297. Pattern: user1.Username,
  2298. },
  2299. },
  2300. }, &EventParams{}, time.Now().Add(-12*24*time.Hour))
  2301. assert.NoError(t, err) // no action
  2302. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2303. DisableThreshold: 10,
  2304. DeleteThreshold: 20,
  2305. }, dataprovider.ConditionOptions{
  2306. Names: []dataprovider.ConditionPattern{
  2307. {
  2308. Pattern: user1.Username,
  2309. },
  2310. },
  2311. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2312. // both thresholds exceeded, the user will be disabled
  2313. if assert.Error(t, err) {
  2314. assert.Contains(t, err.Error(), "executed inactivity check actions for users")
  2315. }
  2316. user1, err = dataprovider.UserExists(username1, "")
  2317. assert.NoError(t, err)
  2318. assert.Equal(t, 0, user1.Status)
  2319. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2320. DisableThreshold: 10,
  2321. }, dataprovider.ConditionOptions{
  2322. Names: []dataprovider.ConditionPattern{
  2323. {
  2324. Pattern: user1.Username,
  2325. },
  2326. },
  2327. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2328. assert.NoError(t, err) // already disabled, no action
  2329. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2330. DisableThreshold: 10,
  2331. DeleteThreshold: 20,
  2332. }, dataprovider.ConditionOptions{
  2333. Names: []dataprovider.ConditionPattern{
  2334. {
  2335. Pattern: user1.Username,
  2336. },
  2337. },
  2338. }, &EventParams{}, time.Now().Add(-30*24*time.Hour))
  2339. assert.NoError(t, err)
  2340. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2341. DisableThreshold: 10,
  2342. DeleteThreshold: 20,
  2343. }, dataprovider.ConditionOptions{
  2344. Names: []dataprovider.ConditionPattern{
  2345. {
  2346. Pattern: user1.Username,
  2347. },
  2348. },
  2349. }, &EventParams{}, time.Now())
  2350. assert.NoError(t, err)
  2351. user1, err = dataprovider.UserExists(username1, "")
  2352. assert.NoError(t, err)
  2353. assert.Equal(t, 0, user1.Status)
  2354. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2355. DisableThreshold: 10,
  2356. DeleteThreshold: 20,
  2357. }, dataprovider.ConditionOptions{
  2358. Names: []dataprovider.ConditionPattern{
  2359. {
  2360. Pattern: user1.Username,
  2361. },
  2362. },
  2363. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // the user is disabled, will be now deleted
  2364. assert.Error(t, err)
  2365. _, err = dataprovider.UserExists(username1, "")
  2366. assert.ErrorIs(t, err, util.ErrNotFound)
  2367. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2368. DeleteThreshold: 20,
  2369. }, dataprovider.ConditionOptions{
  2370. Names: []dataprovider.ConditionPattern{
  2371. {
  2372. Pattern: user2.Username,
  2373. },
  2374. },
  2375. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // no disable threshold, user deleted
  2376. assert.Error(t, err)
  2377. _, err = dataprovider.UserExists(username2, "")
  2378. assert.ErrorIs(t, err, util.ErrNotFound)
  2379. err = dataprovider.DeleteUser(username1, "", "", "")
  2380. assert.Error(t, err)
  2381. err = dataprovider.DeleteUser(username2, "", "", "")
  2382. assert.Error(t, err)
  2383. }