cryptfs_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494
  1. package sftpd_test
  2. import (
  3. "crypto/sha256"
  4. "fmt"
  5. "net/http"
  6. "os"
  7. "path"
  8. "path/filepath"
  9. "testing"
  10. "time"
  11. "github.com/minio/sio"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/drakkan/sftpgo/v2/dataprovider"
  14. "github.com/drakkan/sftpgo/v2/httpdtest"
  15. "github.com/drakkan/sftpgo/v2/sdk"
  16. "github.com/drakkan/sftpgo/v2/sdk/kms"
  17. "github.com/drakkan/sftpgo/v2/vfs"
  18. )
  19. const (
  20. testPassphrase = "test passphrase"
  21. )
  22. func TestBasicSFTPCryptoHandling(t *testing.T) {
  23. usePubKey := false
  24. u := getTestUserWithCryptFs(usePubKey)
  25. u.QuotaSize = 6553600
  26. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  27. assert.NoError(t, err)
  28. conn, client, err := getSftpClient(user, usePubKey)
  29. if assert.NoError(t, err) {
  30. defer conn.Close()
  31. defer client.Close()
  32. testFilePath := filepath.Join(homeBasePath, testFileName)
  33. testFileSize := int64(65535)
  34. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  35. assert.NoError(t, err)
  36. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  37. expectedQuotaFiles := user.UsedQuotaFiles + 1
  38. err = createTestFile(testFilePath, testFileSize)
  39. assert.NoError(t, err)
  40. err = sftpUploadFile(testFilePath, path.Join("/missing_dir", testFileName), testFileSize, client)
  41. assert.Error(t, err)
  42. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  43. assert.NoError(t, err)
  44. localDownloadPath := filepath.Join(homeBasePath, testDLFileName)
  45. err = sftpDownloadFile(testFileName, localDownloadPath, testFileSize, client)
  46. assert.NoError(t, err)
  47. initialHash, err := computeHashForFile(sha256.New(), testFilePath)
  48. assert.NoError(t, err)
  49. downloadedFileHash, err := computeHashForFile(sha256.New(), localDownloadPath)
  50. assert.NoError(t, err)
  51. assert.Equal(t, initialHash, downloadedFileHash)
  52. info, err := os.Stat(filepath.Join(user.HomeDir, testFileName))
  53. if assert.NoError(t, err) {
  54. assert.Equal(t, encryptedFileSize, info.Size())
  55. }
  56. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  57. assert.NoError(t, err)
  58. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  59. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  60. result, err := client.ReadDir(".")
  61. assert.NoError(t, err)
  62. if assert.Len(t, result, 1) {
  63. assert.Equal(t, testFileSize, result[0].Size())
  64. }
  65. info, err = client.Stat(testFileName)
  66. if assert.NoError(t, err) {
  67. assert.Equal(t, testFileSize, info.Size())
  68. }
  69. err = client.Remove(testFileName)
  70. assert.NoError(t, err)
  71. _, err = client.Lstat(testFileName)
  72. assert.Error(t, err)
  73. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  74. assert.NoError(t, err)
  75. assert.Equal(t, expectedQuotaFiles-1, user.UsedQuotaFiles)
  76. assert.Equal(t, expectedQuotaSize-encryptedFileSize, user.UsedQuotaSize)
  77. err = os.Remove(testFilePath)
  78. assert.NoError(t, err)
  79. err = os.Remove(localDownloadPath)
  80. assert.NoError(t, err)
  81. }
  82. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  83. assert.NoError(t, err)
  84. err = os.RemoveAll(user.GetHomeDir())
  85. assert.NoError(t, err)
  86. }
  87. func TestOpenReadWriteCryptoFs(t *testing.T) {
  88. // read and write is not supported on crypto fs
  89. usePubKey := false
  90. u := getTestUserWithCryptFs(usePubKey)
  91. u.QuotaSize = 6553600
  92. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  93. assert.NoError(t, err)
  94. conn, client, err := getSftpClient(user, usePubKey)
  95. if assert.NoError(t, err) {
  96. defer conn.Close()
  97. defer client.Close()
  98. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  99. if assert.NoError(t, err) {
  100. testData := []byte("sample test data")
  101. n, err := sftpFile.Write(testData)
  102. assert.NoError(t, err)
  103. assert.Equal(t, len(testData), n)
  104. buffer := make([]byte, 128)
  105. _, err = sftpFile.ReadAt(buffer, 1)
  106. if assert.Error(t, err) {
  107. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  108. }
  109. err = sftpFile.Close()
  110. assert.NoError(t, err)
  111. }
  112. }
  113. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  114. assert.NoError(t, err)
  115. err = os.RemoveAll(user.GetHomeDir())
  116. assert.NoError(t, err)
  117. }
  118. func TestEmptyFile(t *testing.T) {
  119. usePubKey := true
  120. u := getTestUserWithCryptFs(usePubKey)
  121. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  122. assert.NoError(t, err)
  123. conn, client, err := getSftpClient(user, usePubKey)
  124. if assert.NoError(t, err) {
  125. defer conn.Close()
  126. defer client.Close()
  127. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  128. if assert.NoError(t, err) {
  129. testData := []byte("")
  130. n, err := sftpFile.Write(testData)
  131. assert.NoError(t, err)
  132. assert.Equal(t, len(testData), n)
  133. err = sftpFile.Close()
  134. assert.NoError(t, err)
  135. }
  136. info, err := client.Stat(testFileName)
  137. if assert.NoError(t, err) {
  138. assert.Equal(t, int64(0), info.Size())
  139. }
  140. localDownloadPath := filepath.Join(homeBasePath, testDLFileName)
  141. err = sftpDownloadFile(testFileName, localDownloadPath, 0, client)
  142. assert.NoError(t, err)
  143. encryptedFileSize, err := getEncryptedFileSize(0)
  144. assert.NoError(t, err)
  145. info, err = os.Stat(filepath.Join(user.HomeDir, testFileName))
  146. if assert.NoError(t, err) {
  147. assert.Equal(t, encryptedFileSize, info.Size())
  148. }
  149. err = os.Remove(localDownloadPath)
  150. assert.NoError(t, err)
  151. }
  152. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  153. assert.NoError(t, err)
  154. err = os.RemoveAll(user.GetHomeDir())
  155. assert.NoError(t, err)
  156. }
  157. func TestUploadResumeCryptFs(t *testing.T) {
  158. // resuming uploads is not supported
  159. usePubKey := true
  160. u := getTestUserWithCryptFs(usePubKey)
  161. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  162. assert.NoError(t, err)
  163. err = os.RemoveAll(user.GetHomeDir())
  164. assert.NoError(t, err)
  165. conn, client, err := getSftpClient(user, usePubKey)
  166. if assert.NoError(t, err) {
  167. defer conn.Close()
  168. defer client.Close()
  169. testFilePath := filepath.Join(homeBasePath, testFileName)
  170. testFileSize := int64(65535)
  171. appendDataSize := int64(65535)
  172. err = createTestFile(testFilePath, testFileSize)
  173. assert.NoError(t, err)
  174. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  175. assert.NoError(t, err)
  176. err = appendToTestFile(testFilePath, appendDataSize)
  177. assert.NoError(t, err)
  178. err = sftpUploadResumeFile(testFilePath, testFileName, testFileSize, false, client)
  179. if assert.Error(t, err) {
  180. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  181. }
  182. }
  183. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  184. assert.NoError(t, err)
  185. err = os.RemoveAll(user.GetHomeDir())
  186. assert.NoError(t, err)
  187. }
  188. func TestQuotaFileReplaceCryptFs(t *testing.T) {
  189. usePubKey := false
  190. u := getTestUserWithCryptFs(usePubKey)
  191. u.QuotaFiles = 1000
  192. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  193. assert.NoError(t, err)
  194. err = os.RemoveAll(user.GetHomeDir())
  195. assert.NoError(t, err)
  196. testFileSize := int64(65535)
  197. testFilePath := filepath.Join(homeBasePath, testFileName)
  198. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  199. assert.NoError(t, err)
  200. conn, client, err := getSftpClient(user, usePubKey)
  201. if assert.NoError(t, err) { //nolint:dupl
  202. defer conn.Close()
  203. defer client.Close()
  204. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  205. expectedQuotaFiles := user.UsedQuotaFiles + 1
  206. err = createTestFile(testFilePath, testFileSize)
  207. assert.NoError(t, err)
  208. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  209. assert.NoError(t, err)
  210. // now replace the same file, the quota must not change
  211. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  212. assert.NoError(t, err)
  213. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  214. assert.NoError(t, err)
  215. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  216. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  217. // now create a symlink, replace it with a file and check the quota
  218. // replacing a symlink is like uploading a new file
  219. err = client.Symlink(testFileName, testFileName+".link")
  220. assert.NoError(t, err)
  221. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  222. assert.NoError(t, err)
  223. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  224. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  225. expectedQuotaFiles = expectedQuotaFiles + 1
  226. expectedQuotaSize = expectedQuotaSize + encryptedFileSize
  227. err = sftpUploadFile(testFilePath, testFileName+".link", testFileSize, client)
  228. assert.NoError(t, err)
  229. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  230. assert.NoError(t, err)
  231. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  232. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  233. }
  234. // now set a quota size restriction and upload the same file, upload should fail for space limit exceeded
  235. user.QuotaSize = encryptedFileSize*2 - 1
  236. user, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  237. assert.NoError(t, err)
  238. conn, client, err = getSftpClient(user, usePubKey)
  239. if assert.NoError(t, err) {
  240. defer conn.Close()
  241. defer client.Close()
  242. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  243. assert.Error(t, err, "quota size exceeded, file upload must fail")
  244. err = client.Remove(testFileName)
  245. assert.NoError(t, err)
  246. }
  247. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  248. assert.NoError(t, err)
  249. err = os.Remove(testFilePath)
  250. assert.NoError(t, err)
  251. err = os.RemoveAll(user.GetHomeDir())
  252. assert.NoError(t, err)
  253. }
  254. func TestQuotaScanCryptFs(t *testing.T) {
  255. usePubKey := false
  256. user, _, err := httpdtest.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusCreated)
  257. assert.NoError(t, err)
  258. testFileSize := int64(65535)
  259. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  260. assert.NoError(t, err)
  261. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  262. expectedQuotaFiles := user.UsedQuotaFiles + 1
  263. conn, client, err := getSftpClient(user, usePubKey)
  264. if assert.NoError(t, err) {
  265. defer conn.Close()
  266. defer client.Close()
  267. testFilePath := filepath.Join(homeBasePath, testFileName)
  268. err = createTestFile(testFilePath, testFileSize)
  269. assert.NoError(t, err)
  270. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  271. assert.NoError(t, err)
  272. err = os.Remove(testFilePath)
  273. assert.NoError(t, err)
  274. }
  275. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  276. assert.NoError(t, err)
  277. // create user with the same home dir, so there is at least an untracked file
  278. user, _, err = httpdtest.AddUser(getTestUser(usePubKey), http.StatusCreated)
  279. assert.NoError(t, err)
  280. _, err = httpdtest.StartQuotaScan(user, http.StatusAccepted)
  281. assert.NoError(t, err)
  282. assert.Eventually(t, func() bool {
  283. scans, _, err := httpdtest.GetQuotaScans(http.StatusOK)
  284. if err == nil {
  285. return len(scans) == 0
  286. }
  287. return false
  288. }, 1*time.Second, 50*time.Millisecond)
  289. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  290. assert.NoError(t, err)
  291. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  292. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  293. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  294. assert.NoError(t, err)
  295. err = os.RemoveAll(user.GetHomeDir())
  296. assert.NoError(t, err)
  297. }
  298. func TestGetMimeTypeCryptFs(t *testing.T) {
  299. usePubKey := true
  300. user, _, err := httpdtest.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusCreated)
  301. assert.NoError(t, err)
  302. conn, client, err := getSftpClient(user, usePubKey)
  303. if assert.NoError(t, err) {
  304. defer conn.Close()
  305. defer client.Close()
  306. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  307. if assert.NoError(t, err) {
  308. testData := []byte("some UTF-8 text so we should get a text/plain mime type")
  309. n, err := sftpFile.Write(testData)
  310. assert.NoError(t, err)
  311. assert.Equal(t, len(testData), n)
  312. err = sftpFile.Close()
  313. assert.NoError(t, err)
  314. }
  315. }
  316. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret(testPassphrase)
  317. fs, err := user.GetFilesystem("connID")
  318. if assert.NoError(t, err) {
  319. assert.True(t, vfs.IsCryptOsFs(fs))
  320. mime, err := fs.GetMimeType(filepath.Join(user.GetHomeDir(), testFileName))
  321. assert.NoError(t, err)
  322. assert.Equal(t, "text/plain; charset=utf-8", mime)
  323. }
  324. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  325. assert.NoError(t, err)
  326. err = os.RemoveAll(user.GetHomeDir())
  327. assert.NoError(t, err)
  328. }
  329. func TestTruncate(t *testing.T) {
  330. // truncate is not supported
  331. usePubKey := true
  332. user, _, err := httpdtest.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusCreated)
  333. assert.NoError(t, err)
  334. conn, client, err := getSftpClient(user, usePubKey)
  335. if assert.NoError(t, err) {
  336. defer conn.Close()
  337. defer client.Close()
  338. f, err := client.OpenFile(testFileName, os.O_WRONLY)
  339. if assert.NoError(t, err) {
  340. err = f.Truncate(0)
  341. assert.NoError(t, err)
  342. err = f.Truncate(1)
  343. assert.Error(t, err)
  344. }
  345. err = f.Close()
  346. assert.NoError(t, err)
  347. err = client.Truncate(testFileName, 0)
  348. assert.Error(t, err)
  349. }
  350. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  351. assert.NoError(t, err)
  352. err = os.RemoveAll(user.GetHomeDir())
  353. assert.NoError(t, err)
  354. }
  355. func TestSCPBasicHandlingCryptoFs(t *testing.T) {
  356. if len(scpPath) == 0 {
  357. t.Skip("scp command not found, unable to execute this test")
  358. }
  359. usePubKey := true
  360. u := getTestUserWithCryptFs(usePubKey)
  361. u.QuotaSize = 6553600
  362. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  363. assert.NoError(t, err)
  364. testFilePath := filepath.Join(homeBasePath, testFileName)
  365. testFileSize := int64(131074)
  366. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  367. assert.NoError(t, err)
  368. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  369. expectedQuotaFiles := user.UsedQuotaFiles + 1
  370. err = createTestFile(testFilePath, testFileSize)
  371. assert.NoError(t, err)
  372. remoteUpPath := fmt.Sprintf("%[email protected]:%v", user.Username, "/")
  373. remoteDownPath := fmt.Sprintf("%[email protected]:%v", user.Username, path.Join("/", testFileName))
  374. localPath := filepath.Join(homeBasePath, "scp_download.dat")
  375. // test to download a missing file
  376. err = scpDownload(localPath, remoteDownPath, false, false)
  377. assert.Error(t, err, "downloading a missing file via scp must fail")
  378. err = scpUpload(testFilePath, remoteUpPath, false, false)
  379. assert.NoError(t, err)
  380. err = scpDownload(localPath, remoteDownPath, false, false)
  381. assert.NoError(t, err)
  382. fi, err := os.Stat(localPath)
  383. if assert.NoError(t, err) {
  384. assert.Equal(t, testFileSize, fi.Size())
  385. }
  386. fi, err = os.Stat(filepath.Join(user.GetHomeDir(), testFileName))
  387. if assert.NoError(t, err) {
  388. assert.Equal(t, encryptedFileSize, fi.Size())
  389. }
  390. err = os.Remove(localPath)
  391. assert.NoError(t, err)
  392. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  393. assert.NoError(t, err)
  394. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  395. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  396. // now overwrite the existing file
  397. err = scpUpload(testFilePath, remoteUpPath, false, false)
  398. assert.NoError(t, err)
  399. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  400. assert.NoError(t, err)
  401. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  402. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  403. assert.NoError(t, err)
  404. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  405. assert.NoError(t, err)
  406. err = os.RemoveAll(user.GetHomeDir())
  407. assert.NoError(t, err)
  408. err = os.Remove(testFilePath)
  409. assert.NoError(t, err)
  410. }
  411. func TestSCPRecursiveCryptFs(t *testing.T) {
  412. if len(scpPath) == 0 {
  413. t.Skip("scp command not found, unable to execute this test")
  414. }
  415. usePubKey := true
  416. u := getTestUserWithCryptFs(usePubKey)
  417. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  418. assert.NoError(t, err)
  419. testBaseDirName := "atestdir"
  420. testBaseDirPath := filepath.Join(homeBasePath, testBaseDirName)
  421. testBaseDirDownName := "test_dir_down" //nolint:goconst
  422. testBaseDirDownPath := filepath.Join(homeBasePath, testBaseDirDownName)
  423. testFilePath := filepath.Join(homeBasePath, testBaseDirName, testFileName)
  424. testFilePath1 := filepath.Join(homeBasePath, testBaseDirName, testBaseDirName, testFileName)
  425. testFileSize := int64(131074)
  426. err = createTestFile(testFilePath, testFileSize)
  427. assert.NoError(t, err)
  428. err = createTestFile(testFilePath1, testFileSize)
  429. assert.NoError(t, err)
  430. remoteDownPath := fmt.Sprintf("%[email protected]:%v", user.Username, path.Join("/", testBaseDirName))
  431. remoteUpPath := fmt.Sprintf("%[email protected]:%v", user.Username, "/")
  432. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  433. assert.NoError(t, err)
  434. // overwrite existing dir
  435. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  436. assert.NoError(t, err)
  437. err = scpDownload(testBaseDirDownPath, remoteDownPath, true, true)
  438. assert.NoError(t, err)
  439. // test download without passing -r
  440. err = scpDownload(testBaseDirDownPath, remoteDownPath, true, false)
  441. assert.Error(t, err, "recursive download without -r must fail")
  442. fi, err := os.Stat(filepath.Join(testBaseDirDownPath, testFileName))
  443. if assert.NoError(t, err) {
  444. assert.Equal(t, testFileSize, fi.Size())
  445. }
  446. fi, err = os.Stat(filepath.Join(testBaseDirDownPath, testBaseDirName, testFileName))
  447. if assert.NoError(t, err) {
  448. assert.Equal(t, testFileSize, fi.Size())
  449. }
  450. // upload to a non existent dir
  451. remoteUpPath = fmt.Sprintf("%[email protected]:%v", user.Username, "/non_existent_dir")
  452. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  453. assert.Error(t, err, "uploading via scp to a non existent dir must fail")
  454. err = os.RemoveAll(testBaseDirPath)
  455. assert.NoError(t, err)
  456. err = os.RemoveAll(testBaseDirDownPath)
  457. assert.NoError(t, err)
  458. err = os.RemoveAll(user.GetHomeDir())
  459. assert.NoError(t, err)
  460. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  461. assert.NoError(t, err)
  462. }
  463. func getEncryptedFileSize(size int64) (int64, error) {
  464. encSize, err := sio.EncryptedSize(uint64(size))
  465. return int64(encSize) + 33, err
  466. }
  467. func getTestUserWithCryptFs(usePubKey bool) dataprovider.User {
  468. u := getTestUser(usePubKey)
  469. u.FsConfig.Provider = sdk.CryptedFilesystemProvider
  470. u.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret(testPassphrase)
  471. return u
  472. }