| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246 |
- package common
- import (
- "errors"
- "fmt"
- "os"
- "os/exec"
- "path/filepath"
- "runtime"
- "testing"
- "github.com/stretchr/testify/assert"
- "github.com/drakkan/sftpgo/v2/dataprovider"
- "github.com/drakkan/sftpgo/v2/sdk"
- "github.com/drakkan/sftpgo/v2/vfs"
- )
- func TestNewActionNotification(t *testing.T) {
- user := &dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: "username",
- },
- }
- user.FsConfig.Provider = sdk.LocalFilesystemProvider
- user.FsConfig.S3Config = vfs.S3FsConfig{
- S3FsConfig: sdk.S3FsConfig{
- Bucket: "s3bucket",
- Endpoint: "endpoint",
- },
- }
- user.FsConfig.GCSConfig = vfs.GCSFsConfig{
- GCSFsConfig: sdk.GCSFsConfig{
- Bucket: "gcsbucket",
- },
- }
- user.FsConfig.AzBlobConfig = vfs.AzBlobFsConfig{
- AzBlobFsConfig: sdk.AzBlobFsConfig{
- Container: "azcontainer",
- Endpoint: "azendpoint",
- },
- }
- user.FsConfig.SFTPConfig = vfs.SFTPFsConfig{
- SFTPFsConfig: sdk.SFTPFsConfig{
- Endpoint: "sftpendpoint",
- },
- }
- a := newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSFTP, 123, 0, errors.New("fake error"))
- assert.Equal(t, user.Username, a.Username)
- assert.Equal(t, 0, len(a.Bucket))
- assert.Equal(t, 0, len(a.Endpoint))
- assert.Equal(t, 0, a.Status)
- user.FsConfig.Provider = sdk.S3FilesystemProvider
- a = newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSSH, 123, 0, nil)
- assert.Equal(t, "s3bucket", a.Bucket)
- assert.Equal(t, "endpoint", a.Endpoint)
- assert.Equal(t, 1, a.Status)
- user.FsConfig.Provider = sdk.GCSFilesystemProvider
- a = newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSCP, 123, 0, ErrQuotaExceeded)
- assert.Equal(t, "gcsbucket", a.Bucket)
- assert.Equal(t, 0, len(a.Endpoint))
- assert.Equal(t, 2, a.Status)
- user.FsConfig.Provider = sdk.AzureBlobFilesystemProvider
- a = newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSCP, 123, 0, nil)
- assert.Equal(t, "azcontainer", a.Bucket)
- assert.Equal(t, "azendpoint", a.Endpoint)
- assert.Equal(t, 1, a.Status)
- a = newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSCP, 123, os.O_APPEND, nil)
- assert.Equal(t, "azcontainer", a.Bucket)
- assert.Equal(t, "azendpoint", a.Endpoint)
- assert.Equal(t, 1, a.Status)
- assert.Equal(t, os.O_APPEND, a.OpenFlags)
- user.FsConfig.Provider = sdk.SFTPFilesystemProvider
- a = newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSFTP, 123, 0, nil)
- assert.Equal(t, "sftpendpoint", a.Endpoint)
- }
- func TestActionHTTP(t *testing.T) {
- actionsCopy := Config.Actions
- Config.Actions = ProtocolActions{
- ExecuteOn: []string{operationDownload},
- Hook: fmt.Sprintf("http://%v", httpAddr),
- }
- user := &dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: "username",
- },
- }
- a := newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSFTP, 123, 0, nil)
- err := actionHandler.Handle(a)
- assert.NoError(t, err)
- Config.Actions.Hook = "http://invalid:1234"
- err = actionHandler.Handle(a)
- assert.Error(t, err)
- Config.Actions.Hook = fmt.Sprintf("http://%v/404", httpAddr)
- err = actionHandler.Handle(a)
- if assert.Error(t, err) {
- assert.EqualError(t, err, errUnexpectedHTTResponse.Error())
- }
- Config.Actions = actionsCopy
- }
- func TestActionCMD(t *testing.T) {
- if runtime.GOOS == osWindows {
- t.Skip("this test is not available on Windows")
- }
- actionsCopy := Config.Actions
- hookCmd, err := exec.LookPath("true")
- assert.NoError(t, err)
- Config.Actions = ProtocolActions{
- ExecuteOn: []string{operationDownload},
- Hook: hookCmd,
- }
- user := &dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: "username",
- },
- }
- a := newActionNotification(user, operationDownload, "path", "vpath", "target", "", ProtocolSFTP, 123, 0, nil)
- err = actionHandler.Handle(a)
- assert.NoError(t, err)
- ExecuteActionNotification(user, OperationSSHCmd, "path", "vpath", "target", "sha1sum", ProtocolSSH, 0, nil)
- Config.Actions = actionsCopy
- }
- func TestWrongActions(t *testing.T) {
- actionsCopy := Config.Actions
- badCommand := "/bad/command"
- if runtime.GOOS == osWindows {
- badCommand = "C:\\bad\\command"
- }
- Config.Actions = ProtocolActions{
- ExecuteOn: []string{operationUpload},
- Hook: badCommand,
- }
- user := &dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: "username",
- },
- }
- a := newActionNotification(user, operationUpload, "", "", "", "", ProtocolSFTP, 123, 0, nil)
- err := actionHandler.Handle(a)
- assert.Error(t, err, "action with bad command must fail")
- a.Action = operationDelete
- err = actionHandler.Handle(a)
- assert.EqualError(t, err, errUnconfiguredAction.Error())
- Config.Actions.Hook = "http://foo\x7f.com/"
- a.Action = operationUpload
- err = actionHandler.Handle(a)
- assert.Error(t, err, "action with bad url must fail")
- Config.Actions.Hook = ""
- err = actionHandler.Handle(a)
- if assert.Error(t, err) {
- assert.EqualError(t, err, errNoHook.Error())
- }
- Config.Actions.Hook = "relative path"
- err = actionHandler.Handle(a)
- if assert.Error(t, err) {
- assert.EqualError(t, err, fmt.Sprintf("invalid notification command %#v", Config.Actions.Hook))
- }
- Config.Actions = actionsCopy
- }
- func TestPreDeleteAction(t *testing.T) {
- if runtime.GOOS == osWindows {
- t.Skip("this test is not available on Windows")
- }
- actionsCopy := Config.Actions
- hookCmd, err := exec.LookPath("true")
- assert.NoError(t, err)
- Config.Actions = ProtocolActions{
- ExecuteOn: []string{operationPreDelete},
- Hook: hookCmd,
- }
- homeDir := filepath.Join(os.TempDir(), "test_user")
- err = os.MkdirAll(homeDir, os.ModePerm)
- assert.NoError(t, err)
- user := dataprovider.User{
- BaseUser: sdk.BaseUser{
- Username: "username",
- HomeDir: homeDir,
- },
- }
- user.Permissions = make(map[string][]string)
- user.Permissions["/"] = []string{dataprovider.PermAny}
- fs := vfs.NewOsFs("id", homeDir, "")
- c := NewBaseConnection("id", ProtocolSFTP, "", user)
- testfile := filepath.Join(user.HomeDir, "testfile")
- err = os.WriteFile(testfile, []byte("test"), os.ModePerm)
- assert.NoError(t, err)
- info, err := os.Stat(testfile)
- assert.NoError(t, err)
- err = c.RemoveFile(fs, testfile, "testfile", info)
- assert.NoError(t, err)
- assert.FileExists(t, testfile)
- os.RemoveAll(homeDir)
- Config.Actions = actionsCopy
- }
- type actionHandlerStub struct {
- called bool
- }
- func (h *actionHandlerStub) Handle(notification *ActionNotification) error {
- h.called = true
- return nil
- }
- func TestInitializeActionHandler(t *testing.T) {
- handler := &actionHandlerStub{}
- InitializeActionHandler(handler)
- t.Cleanup(func() {
- InitializeActionHandler(&defaultActionHandler{})
- })
- err := actionHandler.Handle(&ActionNotification{})
- assert.NoError(t, err)
- assert.True(t, handler.called)
- }
|