eventmanager_test.go 73 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "errors"
  19. "fmt"
  20. "io"
  21. "mime/multipart"
  22. "net/http"
  23. "net/url"
  24. "os"
  25. "path"
  26. "path/filepath"
  27. "runtime"
  28. "strings"
  29. "testing"
  30. "time"
  31. "github.com/klauspost/compress/zip"
  32. "github.com/rs/xid"
  33. "github.com/sftpgo/sdk"
  34. sdkkms "github.com/sftpgo/sdk/kms"
  35. "github.com/stretchr/testify/assert"
  36. "github.com/stretchr/testify/require"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/kms"
  39. "github.com/drakkan/sftpgo/v2/internal/util"
  40. "github.com/drakkan/sftpgo/v2/internal/vfs"
  41. )
  42. func TestEventRuleMatch(t *testing.T) {
  43. role := "role1"
  44. conditions := &dataprovider.EventConditions{
  45. ProviderEvents: []string{"add", "update"},
  46. Options: dataprovider.ConditionOptions{
  47. Names: []dataprovider.ConditionPattern{
  48. {
  49. Pattern: "user1",
  50. InverseMatch: true,
  51. },
  52. },
  53. RoleNames: []dataprovider.ConditionPattern{
  54. {
  55. Pattern: role,
  56. },
  57. },
  58. },
  59. }
  60. res := eventManager.checkProviderEventMatch(conditions, &EventParams{
  61. Name: "user1",
  62. Role: role,
  63. Event: "add",
  64. })
  65. assert.False(t, res)
  66. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  67. Name: "user2",
  68. Role: role,
  69. Event: "update",
  70. })
  71. assert.True(t, res)
  72. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  73. Name: "user2",
  74. Role: role,
  75. Event: "delete",
  76. })
  77. assert.False(t, res)
  78. conditions.Options.ProviderObjects = []string{"api_key"}
  79. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  80. Name: "user2",
  81. Event: "update",
  82. Role: role,
  83. ObjectType: "share",
  84. })
  85. assert.False(t, res)
  86. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  87. Name: "user2",
  88. Event: "update",
  89. Role: role,
  90. ObjectType: "api_key",
  91. })
  92. assert.True(t, res)
  93. res = eventManager.checkProviderEventMatch(conditions, &EventParams{
  94. Name: "user2",
  95. Event: "update",
  96. Role: role + "1",
  97. ObjectType: "api_key",
  98. })
  99. assert.False(t, res)
  100. // now test fs events
  101. conditions = &dataprovider.EventConditions{
  102. FsEvents: []string{operationUpload, operationDownload},
  103. Options: dataprovider.ConditionOptions{
  104. Names: []dataprovider.ConditionPattern{
  105. {
  106. Pattern: "user*",
  107. },
  108. {
  109. Pattern: "tester*",
  110. },
  111. },
  112. RoleNames: []dataprovider.ConditionPattern{
  113. {
  114. Pattern: role,
  115. InverseMatch: true,
  116. },
  117. },
  118. FsPaths: []dataprovider.ConditionPattern{
  119. {
  120. Pattern: "/**/*.txt",
  121. },
  122. },
  123. Protocols: []string{ProtocolSFTP},
  124. MinFileSize: 10,
  125. MaxFileSize: 30,
  126. },
  127. }
  128. params := EventParams{
  129. Name: "tester4",
  130. Event: operationDelete,
  131. VirtualPath: "/path.txt",
  132. Protocol: ProtocolSFTP,
  133. ObjectName: "path.txt",
  134. FileSize: 20,
  135. }
  136. res = eventManager.checkFsEventMatch(conditions, &params)
  137. assert.False(t, res)
  138. params.Event = operationDownload
  139. res = eventManager.checkFsEventMatch(conditions, &params)
  140. assert.True(t, res)
  141. params.Role = role
  142. res = eventManager.checkFsEventMatch(conditions, &params)
  143. assert.False(t, res)
  144. params.Role = ""
  145. params.Name = "name"
  146. res = eventManager.checkFsEventMatch(conditions, &params)
  147. assert.False(t, res)
  148. params.Name = "user5"
  149. res = eventManager.checkFsEventMatch(conditions, &params)
  150. assert.True(t, res)
  151. params.VirtualPath = "/sub/f.jpg"
  152. params.ObjectName = path.Base(params.VirtualPath)
  153. res = eventManager.checkFsEventMatch(conditions, &params)
  154. assert.False(t, res)
  155. params.VirtualPath = "/sub/f.txt"
  156. params.ObjectName = path.Base(params.VirtualPath)
  157. res = eventManager.checkFsEventMatch(conditions, &params)
  158. assert.True(t, res)
  159. params.Protocol = ProtocolHTTP
  160. res = eventManager.checkFsEventMatch(conditions, &params)
  161. assert.False(t, res)
  162. params.Protocol = ProtocolSFTP
  163. params.FileSize = 5
  164. res = eventManager.checkFsEventMatch(conditions, &params)
  165. assert.False(t, res)
  166. params.FileSize = 50
  167. res = eventManager.checkFsEventMatch(conditions, &params)
  168. assert.False(t, res)
  169. params.FileSize = 25
  170. res = eventManager.checkFsEventMatch(conditions, &params)
  171. assert.True(t, res)
  172. // bad pattern
  173. conditions.Options.Names = []dataprovider.ConditionPattern{
  174. {
  175. Pattern: "[-]",
  176. },
  177. }
  178. res = eventManager.checkFsEventMatch(conditions, &params)
  179. assert.False(t, res)
  180. // check fs events with group name filters
  181. conditions = &dataprovider.EventConditions{
  182. FsEvents: []string{operationUpload, operationDownload},
  183. Options: dataprovider.ConditionOptions{
  184. GroupNames: []dataprovider.ConditionPattern{
  185. {
  186. Pattern: "group*",
  187. },
  188. {
  189. Pattern: "testgroup*",
  190. },
  191. },
  192. },
  193. }
  194. params = EventParams{
  195. Name: "user1",
  196. Event: operationUpload,
  197. }
  198. res = eventManager.checkFsEventMatch(conditions, &params)
  199. assert.False(t, res)
  200. params.Groups = []sdk.GroupMapping{
  201. {
  202. Name: "g1",
  203. Type: sdk.GroupTypePrimary,
  204. },
  205. {
  206. Name: "g2",
  207. Type: sdk.GroupTypeSecondary,
  208. },
  209. }
  210. res = eventManager.checkFsEventMatch(conditions, &params)
  211. assert.False(t, res)
  212. params.Groups = []sdk.GroupMapping{
  213. {
  214. Name: "testgroup2",
  215. Type: sdk.GroupTypePrimary,
  216. },
  217. {
  218. Name: "g2",
  219. Type: sdk.GroupTypeSecondary,
  220. },
  221. }
  222. res = eventManager.checkFsEventMatch(conditions, &params)
  223. assert.True(t, res)
  224. // check user conditions
  225. user := dataprovider.User{}
  226. user.Username = "u1"
  227. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  228. assert.True(t, res)
  229. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  230. Names: []dataprovider.ConditionPattern{
  231. {
  232. Pattern: "user",
  233. },
  234. },
  235. })
  236. assert.False(t, res)
  237. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  238. RoleNames: []dataprovider.ConditionPattern{
  239. {
  240. Pattern: role,
  241. },
  242. },
  243. })
  244. assert.False(t, res)
  245. user.Role = role
  246. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  247. RoleNames: []dataprovider.ConditionPattern{
  248. {
  249. Pattern: role,
  250. },
  251. },
  252. })
  253. assert.True(t, res)
  254. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  255. GroupNames: []dataprovider.ConditionPattern{
  256. {
  257. Pattern: "group",
  258. },
  259. },
  260. RoleNames: []dataprovider.ConditionPattern{
  261. {
  262. Pattern: role,
  263. },
  264. },
  265. })
  266. assert.False(t, res)
  267. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  268. IDPLoginEvent: 0,
  269. }, &EventParams{
  270. Event: IDPLoginAdmin,
  271. })
  272. assert.True(t, res)
  273. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  274. IDPLoginEvent: 2,
  275. }, &EventParams{
  276. Event: IDPLoginAdmin,
  277. })
  278. assert.True(t, res)
  279. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  280. IDPLoginEvent: 1,
  281. }, &EventParams{
  282. Event: IDPLoginAdmin,
  283. })
  284. assert.False(t, res)
  285. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  286. IDPLoginEvent: 1,
  287. }, &EventParams{
  288. Event: IDPLoginUser,
  289. })
  290. assert.True(t, res)
  291. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  292. IDPLoginEvent: 1,
  293. }, &EventParams{
  294. Name: "user",
  295. Event: IDPLoginUser,
  296. })
  297. assert.True(t, res)
  298. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  299. IDPLoginEvent: 1,
  300. Options: dataprovider.ConditionOptions{
  301. Names: []dataprovider.ConditionPattern{
  302. {
  303. Pattern: "abc",
  304. },
  305. },
  306. },
  307. }, &EventParams{
  308. Name: "user",
  309. Event: IDPLoginUser,
  310. })
  311. assert.False(t, res)
  312. res = eventManager.checkIPDLoginEventMatch(&dataprovider.EventConditions{
  313. IDPLoginEvent: 2,
  314. }, &EventParams{
  315. Name: "user",
  316. Event: IDPLoginUser,
  317. })
  318. assert.False(t, res)
  319. }
  320. func TestDoubleStarMatching(t *testing.T) {
  321. c := dataprovider.ConditionPattern{
  322. Pattern: "/mydir/**",
  323. }
  324. res := checkEventConditionPattern(c, "/mydir")
  325. assert.True(t, res)
  326. res = checkEventConditionPattern(c, "/mydirname")
  327. assert.False(t, res)
  328. res = checkEventConditionPattern(c, "/mydir/sub")
  329. assert.True(t, res)
  330. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  331. assert.True(t, res)
  332. c.Pattern = "/**/*"
  333. res = checkEventConditionPattern(c, "/mydir")
  334. assert.True(t, res)
  335. res = checkEventConditionPattern(c, "/mydirname")
  336. assert.True(t, res)
  337. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  338. assert.True(t, res)
  339. c.Pattern = "/**/*.filepart"
  340. res = checkEventConditionPattern(c, "/file.filepart")
  341. assert.True(t, res)
  342. res = checkEventConditionPattern(c, "/mydir/sub/file.filepart")
  343. assert.True(t, res)
  344. res = checkEventConditionPattern(c, "/file.txt")
  345. assert.False(t, res)
  346. res = checkEventConditionPattern(c, "/mydir/file.txt")
  347. assert.False(t, res)
  348. c.Pattern = "/mydir/**/*.txt"
  349. res = checkEventConditionPattern(c, "/mydir")
  350. assert.False(t, res)
  351. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  352. assert.False(t, res)
  353. res = checkEventConditionPattern(c, "/mydir/sub")
  354. assert.False(t, res)
  355. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  356. assert.False(t, res)
  357. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  358. assert.True(t, res)
  359. c.InverseMatch = true
  360. assert.True(t, checkEventConditionPattern(c, "/mydir"))
  361. assert.True(t, checkEventConditionPattern(c, "/mydirname/f.txt"))
  362. assert.True(t, checkEventConditionPattern(c, "/mydir/sub"))
  363. assert.True(t, checkEventConditionPattern(c, "/mydir/sub/dir"))
  364. assert.False(t, checkEventConditionPattern(c, "/mydir/sub/dir/a.txt"))
  365. }
  366. func TestMutlipleDoubleStarMatching(t *testing.T) {
  367. patterns := []dataprovider.ConditionPattern{
  368. {
  369. Pattern: "/**/*.txt",
  370. InverseMatch: false,
  371. },
  372. {
  373. Pattern: "/**/*.tmp",
  374. InverseMatch: false,
  375. },
  376. }
  377. assert.False(t, checkEventConditionPatterns("/mydir", patterns))
  378. assert.True(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  379. assert.True(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  380. assert.False(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  381. assert.False(t, checkEventConditionPatterns("/mydir/sub", patterns))
  382. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  383. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  384. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  385. }
  386. func TestMultipleDoubleStarMatchingInverse(t *testing.T) {
  387. patterns := []dataprovider.ConditionPattern{
  388. {
  389. Pattern: "/**/*.txt",
  390. InverseMatch: true,
  391. },
  392. {
  393. Pattern: "/**/*.tmp",
  394. InverseMatch: true,
  395. },
  396. }
  397. assert.True(t, checkEventConditionPatterns("/mydir", patterns))
  398. assert.False(t, checkEventConditionPatterns("/mydir/test.tmp", patterns))
  399. assert.False(t, checkEventConditionPatterns("/mydir/test.txt", patterns))
  400. assert.True(t, checkEventConditionPatterns("/mydir/test.csv", patterns))
  401. assert.True(t, checkEventConditionPatterns("/mydir/sub", patterns))
  402. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.tmp", patterns))
  403. assert.False(t, checkEventConditionPatterns("/mydir/sub/test.txt", patterns))
  404. assert.True(t, checkEventConditionPatterns("/mydir/sub/test.csv", patterns))
  405. }
  406. func TestGroupConditionPatterns(t *testing.T) {
  407. group1 := "group1"
  408. group2 := "group2"
  409. patterns := []dataprovider.ConditionPattern{
  410. {
  411. Pattern: group1,
  412. },
  413. {
  414. Pattern: group2,
  415. },
  416. }
  417. inversePatterns := []dataprovider.ConditionPattern{
  418. {
  419. Pattern: group1,
  420. InverseMatch: true,
  421. },
  422. {
  423. Pattern: group2,
  424. InverseMatch: true,
  425. },
  426. }
  427. groups := []sdk.GroupMapping{
  428. {
  429. Name: "group3",
  430. Type: sdk.GroupTypePrimary,
  431. },
  432. }
  433. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  434. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  435. groups = []sdk.GroupMapping{
  436. {
  437. Name: group1,
  438. Type: sdk.GroupTypePrimary,
  439. },
  440. {
  441. Name: "group4",
  442. Type: sdk.GroupTypePrimary,
  443. },
  444. }
  445. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  446. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  447. groups = []sdk.GroupMapping{
  448. {
  449. Name: group1,
  450. Type: sdk.GroupTypePrimary,
  451. },
  452. }
  453. assert.True(t, checkEventGroupConditionPatterns(groups, patterns))
  454. assert.False(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  455. groups = []sdk.GroupMapping{
  456. {
  457. Name: "group11",
  458. Type: sdk.GroupTypePrimary,
  459. },
  460. }
  461. assert.False(t, checkEventGroupConditionPatterns(groups, patterns))
  462. assert.True(t, checkEventGroupConditionPatterns(groups, inversePatterns))
  463. }
  464. func TestEventManager(t *testing.T) {
  465. startEventScheduler()
  466. action := &dataprovider.BaseEventAction{
  467. Name: "test_action",
  468. Type: dataprovider.ActionTypeHTTP,
  469. Options: dataprovider.BaseEventActionOptions{
  470. HTTPConfig: dataprovider.EventActionHTTPConfig{
  471. Endpoint: "http://localhost",
  472. Timeout: 20,
  473. Method: http.MethodGet,
  474. },
  475. },
  476. }
  477. err := dataprovider.AddEventAction(action, "", "", "")
  478. assert.NoError(t, err)
  479. rule := &dataprovider.EventRule{
  480. Name: "rule",
  481. Status: 1,
  482. Trigger: dataprovider.EventTriggerFsEvent,
  483. Conditions: dataprovider.EventConditions{
  484. FsEvents: []string{operationUpload},
  485. },
  486. Actions: []dataprovider.EventAction{
  487. {
  488. BaseEventAction: dataprovider.BaseEventAction{
  489. Name: action.Name,
  490. },
  491. Order: 1,
  492. },
  493. },
  494. }
  495. err = dataprovider.AddEventRule(rule, "", "", "")
  496. assert.NoError(t, err)
  497. eventManager.RLock()
  498. assert.Len(t, eventManager.FsEvents, 1)
  499. assert.Len(t, eventManager.ProviderEvents, 0)
  500. assert.Len(t, eventManager.Schedules, 0)
  501. assert.Len(t, eventManager.schedulesMapping, 0)
  502. eventManager.RUnlock()
  503. rule.Trigger = dataprovider.EventTriggerProviderEvent
  504. rule.Conditions = dataprovider.EventConditions{
  505. ProviderEvents: []string{"add"},
  506. }
  507. err = dataprovider.UpdateEventRule(rule, "", "", "")
  508. assert.NoError(t, err)
  509. eventManager.RLock()
  510. assert.Len(t, eventManager.FsEvents, 0)
  511. assert.Len(t, eventManager.ProviderEvents, 1)
  512. assert.Len(t, eventManager.Schedules, 0)
  513. assert.Len(t, eventManager.schedulesMapping, 0)
  514. eventManager.RUnlock()
  515. rule.Trigger = dataprovider.EventTriggerSchedule
  516. rule.Conditions = dataprovider.EventConditions{
  517. Schedules: []dataprovider.Schedule{
  518. {
  519. Hours: "0",
  520. DayOfWeek: "*",
  521. DayOfMonth: "*",
  522. Month: "*",
  523. },
  524. },
  525. }
  526. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  527. eventManager.addUpdateRuleInternal(*rule)
  528. eventManager.RLock()
  529. assert.Len(t, eventManager.FsEvents, 0)
  530. assert.Len(t, eventManager.ProviderEvents, 0)
  531. assert.Len(t, eventManager.Schedules, 0)
  532. assert.Len(t, eventManager.schedulesMapping, 0)
  533. eventManager.RUnlock()
  534. assert.Eventually(t, func() bool {
  535. _, err = dataprovider.EventRuleExists(rule.Name)
  536. ok := errors.Is(err, util.ErrNotFound)
  537. return ok
  538. }, 2*time.Second, 100*time.Millisecond)
  539. rule.DeletedAt = 0
  540. err = dataprovider.AddEventRule(rule, "", "", "")
  541. assert.NoError(t, err)
  542. eventManager.RLock()
  543. assert.Len(t, eventManager.FsEvents, 0)
  544. assert.Len(t, eventManager.ProviderEvents, 0)
  545. assert.Len(t, eventManager.Schedules, 1)
  546. assert.Len(t, eventManager.schedulesMapping, 1)
  547. eventManager.RUnlock()
  548. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  549. assert.NoError(t, err)
  550. eventManager.RLock()
  551. assert.Len(t, eventManager.FsEvents, 0)
  552. assert.Len(t, eventManager.ProviderEvents, 0)
  553. assert.Len(t, eventManager.Schedules, 0)
  554. assert.Len(t, eventManager.schedulesMapping, 0)
  555. eventManager.RUnlock()
  556. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  557. assert.NoError(t, err)
  558. stopEventScheduler()
  559. }
  560. func TestEventManagerErrors(t *testing.T) {
  561. startEventScheduler()
  562. providerConf := dataprovider.GetProviderConfig()
  563. err := dataprovider.Close()
  564. assert.NoError(t, err)
  565. params := EventParams{
  566. sender: "sender",
  567. }
  568. _, err = params.getUsers()
  569. assert.Error(t, err)
  570. _, err = params.getFolders()
  571. assert.Error(t, err)
  572. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  573. assert.Error(t, err)
  574. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  575. assert.Error(t, err)
  576. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  577. assert.Error(t, err)
  578. err = executeUserExpirationCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  579. assert.Error(t, err)
  580. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{},
  581. dataprovider.ConditionOptions{}, &EventParams{}, time.Time{})
  582. assert.Error(t, err)
  583. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  584. assert.Error(t, err)
  585. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  586. assert.Error(t, err)
  587. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  588. assert.Error(t, err)
  589. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  590. assert.Error(t, err)
  591. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  592. assert.Error(t, err)
  593. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  594. assert.Error(t, err)
  595. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  596. dataprovider.ConditionOptions{}, &EventParams{})
  597. assert.Error(t, err)
  598. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  599. assert.Error(t, err)
  600. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{}, &EventParams{})
  601. assert.Error(t, err)
  602. groupName := "agroup"
  603. err = executeQuotaResetForUser(&dataprovider.User{
  604. Groups: []sdk.GroupMapping{
  605. {
  606. Name: groupName,
  607. Type: sdk.GroupTypePrimary,
  608. },
  609. },
  610. })
  611. assert.Error(t, err)
  612. err = executeDataRetentionCheckForUser(dataprovider.User{
  613. Groups: []sdk.GroupMapping{
  614. {
  615. Name: groupName,
  616. Type: sdk.GroupTypePrimary,
  617. },
  618. },
  619. }, nil, &EventParams{}, "")
  620. assert.Error(t, err)
  621. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  622. Groups: []sdk.GroupMapping{
  623. {
  624. Name: groupName,
  625. Type: sdk.GroupTypePrimary,
  626. },
  627. },
  628. })
  629. assert.Error(t, err)
  630. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  631. Groups: []sdk.GroupMapping{
  632. {
  633. Name: groupName,
  634. Type: sdk.GroupTypePrimary,
  635. },
  636. },
  637. })
  638. assert.Error(t, err)
  639. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  640. Groups: []sdk.GroupMapping{
  641. {
  642. Name: groupName,
  643. Type: sdk.GroupTypePrimary,
  644. },
  645. },
  646. })
  647. assert.Error(t, err)
  648. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  649. Groups: []sdk.GroupMapping{
  650. {
  651. Name: groupName,
  652. Type: sdk.GroupTypePrimary,
  653. },
  654. },
  655. })
  656. assert.Error(t, err)
  657. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  658. Groups: []sdk.GroupMapping{
  659. {
  660. Name: groupName,
  661. Type: sdk.GroupTypePrimary,
  662. },
  663. },
  664. })
  665. assert.Error(t, err)
  666. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  667. Groups: []sdk.GroupMapping{
  668. {
  669. Name: groupName,
  670. Type: sdk.GroupTypePrimary,
  671. },
  672. },
  673. })
  674. assert.Error(t, err)
  675. err = executePwdExpirationCheckForUser(&dataprovider.User{
  676. Groups: []sdk.GroupMapping{
  677. {
  678. Name: groupName,
  679. Type: sdk.GroupTypePrimary,
  680. },
  681. }}, dataprovider.EventActionPasswordExpiration{})
  682. assert.Error(t, err)
  683. _, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  684. Method: http.MethodPost,
  685. Parts: []dataprovider.HTTPPart{
  686. {
  687. Name: "p1",
  688. },
  689. },
  690. }, nil, nil, dataprovider.User{
  691. BaseUser: sdk.BaseUser{
  692. Username: "u",
  693. },
  694. Groups: []sdk.GroupMapping{
  695. {
  696. Name: groupName,
  697. Type: sdk.GroupTypePrimary,
  698. },
  699. },
  700. }, &EventParams{}, false)
  701. assert.Error(t, err)
  702. dataRetentionAction := dataprovider.BaseEventAction{
  703. Type: dataprovider.ActionTypeDataRetentionCheck,
  704. Options: dataprovider.BaseEventActionOptions{
  705. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  706. Folders: []dataprovider.FolderRetention{
  707. {
  708. Path: "/",
  709. Retention: 24,
  710. },
  711. },
  712. },
  713. },
  714. }
  715. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  716. Names: []dataprovider.ConditionPattern{
  717. {
  718. Pattern: "username1",
  719. },
  720. },
  721. })
  722. if assert.Error(t, err) {
  723. assert.Contains(t, err.Error(), "unable to get users")
  724. }
  725. eventManager.loadRules()
  726. eventManager.RLock()
  727. assert.Len(t, eventManager.FsEvents, 0)
  728. assert.Len(t, eventManager.ProviderEvents, 0)
  729. assert.Len(t, eventManager.Schedules, 0)
  730. eventManager.RUnlock()
  731. // rule with invalid trigger
  732. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  733. Name: "test rule",
  734. Status: 1,
  735. Trigger: -1,
  736. })
  737. eventManager.RLock()
  738. assert.Len(t, eventManager.FsEvents, 0)
  739. assert.Len(t, eventManager.ProviderEvents, 0)
  740. assert.Len(t, eventManager.Schedules, 0)
  741. eventManager.RUnlock()
  742. // rule with invalid cronspec
  743. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  744. Name: "test rule",
  745. Status: 1,
  746. Trigger: dataprovider.EventTriggerSchedule,
  747. Conditions: dataprovider.EventConditions{
  748. Schedules: []dataprovider.Schedule{
  749. {
  750. Hours: "1000",
  751. },
  752. },
  753. },
  754. })
  755. eventManager.RLock()
  756. assert.Len(t, eventManager.FsEvents, 0)
  757. assert.Len(t, eventManager.ProviderEvents, 0)
  758. assert.Len(t, eventManager.Schedules, 0)
  759. eventManager.RUnlock()
  760. err = dataprovider.Initialize(providerConf, configDir, true)
  761. assert.NoError(t, err)
  762. stopEventScheduler()
  763. }
  764. func TestDateTimePlaceholder(t *testing.T) {
  765. dateTime := time.Now()
  766. params := EventParams{
  767. Timestamp: dateTime,
  768. }
  769. replacements := params.getStringReplacements(false, false)
  770. r := strings.NewReplacer(replacements...)
  771. res := r.Replace("{{DateTime}}")
  772. assert.Equal(t, dateTime.UTC().Format(dateTimeMillisFormat), res)
  773. res = r.Replace("{{Year}}-{{Month}}-{{Day}}T{{Hour}}:{{Minute}}")
  774. assert.Equal(t, dateTime.UTC().Format(dateTimeMillisFormat)[:16], res)
  775. }
  776. func TestEventRuleActions(t *testing.T) {
  777. actionName := "test rule action"
  778. action := dataprovider.BaseEventAction{
  779. Name: actionName,
  780. Type: dataprovider.ActionTypeBackup,
  781. }
  782. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  783. assert.NoError(t, err)
  784. action.Type = -1
  785. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  786. assert.Error(t, err)
  787. action = dataprovider.BaseEventAction{
  788. Name: actionName,
  789. Type: dataprovider.ActionTypeHTTP,
  790. Options: dataprovider.BaseEventActionOptions{
  791. HTTPConfig: dataprovider.EventActionHTTPConfig{
  792. Endpoint: "http://foo\x7f.com/", // invalid URL
  793. SkipTLSVerify: true,
  794. Body: `"data": "{{ObjectDataString}}"`,
  795. Method: http.MethodPost,
  796. QueryParameters: []dataprovider.KeyValue{
  797. {
  798. Key: "param",
  799. Value: "value",
  800. },
  801. },
  802. Timeout: 5,
  803. Headers: []dataprovider.KeyValue{
  804. {
  805. Key: "Content-Type",
  806. Value: "application/json",
  807. },
  808. },
  809. Username: "httpuser",
  810. },
  811. },
  812. }
  813. action.Options.SetEmptySecretsIfNil()
  814. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  815. if assert.Error(t, err) {
  816. assert.Contains(t, err.Error(), "invalid endpoint")
  817. }
  818. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  819. params := &EventParams{
  820. Name: "a",
  821. Object: &dataprovider.User{
  822. BaseUser: sdk.BaseUser{
  823. Username: "test user",
  824. },
  825. },
  826. }
  827. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  828. assert.NoError(t, err)
  829. action.Options.HTTPConfig.Method = http.MethodGet
  830. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  831. assert.NoError(t, err)
  832. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  833. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  834. if assert.Error(t, err) {
  835. assert.Contains(t, err.Error(), "unexpected status code: 404")
  836. }
  837. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  838. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  839. assert.Error(t, err)
  840. action.Options.HTTPConfig.QueryParameters = nil
  841. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  842. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  843. assert.Error(t, err)
  844. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  845. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  846. if assert.Error(t, err) {
  847. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  848. }
  849. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  850. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  851. action.Options.HTTPConfig.Body = ""
  852. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  853. {
  854. Name: "p1",
  855. Filepath: "path",
  856. },
  857. }
  858. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  859. assert.Contains(t, getErrorString(err), "error getting user")
  860. action.Options.HTTPConfig.Parts = nil
  861. action.Options.HTTPConfig.Body = "{{ObjectData}}"
  862. // test disk and transfer quota reset
  863. username1 := "user1"
  864. username2 := "user2"
  865. user1 := dataprovider.User{
  866. BaseUser: sdk.BaseUser{
  867. Username: username1,
  868. HomeDir: filepath.Join(os.TempDir(), username1),
  869. Status: 1,
  870. Permissions: map[string][]string{
  871. "/": {dataprovider.PermAny},
  872. },
  873. },
  874. }
  875. user2 := dataprovider.User{
  876. BaseUser: sdk.BaseUser{
  877. Username: username2,
  878. HomeDir: filepath.Join(os.TempDir(), username2),
  879. Status: 1,
  880. Permissions: map[string][]string{
  881. "/": {dataprovider.PermAny},
  882. },
  883. },
  884. }
  885. user2.Filters.PasswordExpiration = 10
  886. err = dataprovider.AddUser(&user1, "", "", "")
  887. assert.NoError(t, err)
  888. err = dataprovider.AddUser(&user2, "", "", "")
  889. assert.NoError(t, err)
  890. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  891. Threshold: 20,
  892. }, dataprovider.ConditionOptions{
  893. Names: []dataprovider.ConditionPattern{
  894. {
  895. Pattern: user2.Username,
  896. },
  897. },
  898. }, &EventParams{})
  899. // smtp not configured
  900. assert.Error(t, err)
  901. action = dataprovider.BaseEventAction{
  902. Type: dataprovider.ActionTypeUserQuotaReset,
  903. }
  904. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  905. Names: []dataprovider.ConditionPattern{
  906. {
  907. Pattern: username1,
  908. },
  909. },
  910. })
  911. assert.Error(t, err) // no home dir
  912. // create the home dir
  913. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  914. assert.NoError(t, err)
  915. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  916. assert.NoError(t, err)
  917. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  918. Names: []dataprovider.ConditionPattern{
  919. {
  920. Pattern: username1,
  921. },
  922. },
  923. })
  924. assert.NoError(t, err)
  925. userGet, err := dataprovider.UserExists(username1, "")
  926. assert.NoError(t, err)
  927. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  928. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  929. // simulate another quota scan in progress
  930. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  931. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  932. Names: []dataprovider.ConditionPattern{
  933. {
  934. Pattern: username1,
  935. },
  936. },
  937. })
  938. assert.Error(t, err)
  939. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  940. // non matching pattern
  941. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  942. Names: []dataprovider.ConditionPattern{
  943. {
  944. Pattern: "don't match",
  945. },
  946. },
  947. })
  948. assert.Error(t, err)
  949. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  950. action = dataprovider.BaseEventAction{
  951. Type: dataprovider.ActionTypeUserExpirationCheck,
  952. }
  953. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  954. Names: []dataprovider.ConditionPattern{
  955. {
  956. Pattern: "don't match",
  957. },
  958. },
  959. })
  960. assert.Error(t, err)
  961. assert.Contains(t, getErrorString(err), "no user expiration check executed")
  962. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  963. Names: []dataprovider.ConditionPattern{
  964. {
  965. Pattern: username1,
  966. },
  967. },
  968. })
  969. assert.NoError(t, err)
  970. dataRetentionAction := dataprovider.BaseEventAction{
  971. Type: dataprovider.ActionTypeDataRetentionCheck,
  972. Options: dataprovider.BaseEventActionOptions{
  973. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  974. Folders: []dataprovider.FolderRetention{
  975. {
  976. Path: "",
  977. Retention: 24,
  978. },
  979. },
  980. },
  981. },
  982. }
  983. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  984. Names: []dataprovider.ConditionPattern{
  985. {
  986. Pattern: username1,
  987. },
  988. },
  989. })
  990. assert.Error(t, err) // invalid config, no folder path specified
  991. retentionDir := "testretention"
  992. dataRetentionAction = dataprovider.BaseEventAction{
  993. Type: dataprovider.ActionTypeDataRetentionCheck,
  994. Options: dataprovider.BaseEventActionOptions{
  995. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  996. Folders: []dataprovider.FolderRetention{
  997. {
  998. Path: path.Join("/", retentionDir),
  999. Retention: 24,
  1000. DeleteEmptyDirs: true,
  1001. },
  1002. },
  1003. },
  1004. },
  1005. }
  1006. // create some test files
  1007. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  1008. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  1009. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  1010. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  1011. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  1012. assert.NoError(t, err)
  1013. for _, f := range []string{file1, file2, file3, file4} {
  1014. err = os.WriteFile(f, []byte(""), 0666)
  1015. assert.NoError(t, err)
  1016. }
  1017. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  1018. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  1019. assert.NoError(t, err)
  1020. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  1021. assert.NoError(t, err)
  1022. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  1023. assert.NoError(t, err)
  1024. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1025. Names: []dataprovider.ConditionPattern{
  1026. {
  1027. Pattern: username1,
  1028. },
  1029. },
  1030. })
  1031. assert.NoError(t, err)
  1032. assert.FileExists(t, file1)
  1033. assert.NoFileExists(t, file2)
  1034. assert.FileExists(t, file3)
  1035. assert.NoDirExists(t, filepath.Dir(file4))
  1036. // simulate another check in progress
  1037. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  1038. assert.NotNil(t, c)
  1039. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1040. Names: []dataprovider.ConditionPattern{
  1041. {
  1042. Pattern: username1,
  1043. },
  1044. },
  1045. })
  1046. assert.Error(t, err)
  1047. RetentionChecks.remove(user1.Username)
  1048. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  1049. Names: []dataprovider.ConditionPattern{
  1050. {
  1051. Pattern: "no match",
  1052. },
  1053. },
  1054. })
  1055. assert.Error(t, err)
  1056. assert.Contains(t, getErrorString(err), "no retention check executed")
  1057. // test file exists action
  1058. action = dataprovider.BaseEventAction{
  1059. Type: dataprovider.ActionTypeFilesystem,
  1060. Options: dataprovider.BaseEventActionOptions{
  1061. FsConfig: dataprovider.EventActionFilesystemConfig{
  1062. Type: dataprovider.FilesystemActionExist,
  1063. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  1064. },
  1065. },
  1066. }
  1067. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1068. Names: []dataprovider.ConditionPattern{
  1069. {
  1070. Pattern: "no match",
  1071. },
  1072. },
  1073. })
  1074. assert.Error(t, err)
  1075. assert.Contains(t, getErrorString(err), "no existence check executed")
  1076. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1077. Names: []dataprovider.ConditionPattern{
  1078. {
  1079. Pattern: username1,
  1080. },
  1081. },
  1082. })
  1083. assert.NoError(t, err)
  1084. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  1085. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1086. Names: []dataprovider.ConditionPattern{
  1087. {
  1088. Pattern: username1,
  1089. },
  1090. },
  1091. })
  1092. assert.Error(t, err)
  1093. err = os.RemoveAll(user1.GetHomeDir())
  1094. assert.NoError(t, err)
  1095. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  1096. assert.NoError(t, err)
  1097. action.Type = dataprovider.ActionTypeTransferQuotaReset
  1098. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1099. Names: []dataprovider.ConditionPattern{
  1100. {
  1101. Pattern: username1,
  1102. },
  1103. },
  1104. })
  1105. assert.NoError(t, err)
  1106. userGet, err = dataprovider.UserExists(username1, "")
  1107. assert.NoError(t, err)
  1108. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  1109. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  1110. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1111. Names: []dataprovider.ConditionPattern{
  1112. {
  1113. Pattern: "no match",
  1114. },
  1115. },
  1116. })
  1117. assert.Error(t, err)
  1118. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  1119. action.Type = dataprovider.ActionTypeFilesystem
  1120. action.Options = dataprovider.BaseEventActionOptions{
  1121. FsConfig: dataprovider.EventActionFilesystemConfig{
  1122. Type: dataprovider.FilesystemActionRename,
  1123. Renames: []dataprovider.KeyValue{
  1124. {
  1125. Key: "/source",
  1126. Value: "/target",
  1127. },
  1128. },
  1129. },
  1130. }
  1131. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1132. Names: []dataprovider.ConditionPattern{
  1133. {
  1134. Pattern: "no match",
  1135. },
  1136. },
  1137. })
  1138. assert.Error(t, err)
  1139. assert.Contains(t, getErrorString(err), "no rename executed")
  1140. action.Options = dataprovider.BaseEventActionOptions{
  1141. FsConfig: dataprovider.EventActionFilesystemConfig{
  1142. Type: dataprovider.FilesystemActionDelete,
  1143. Deletes: []string{"/dir1"},
  1144. },
  1145. }
  1146. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1147. Names: []dataprovider.ConditionPattern{
  1148. {
  1149. Pattern: "no match",
  1150. },
  1151. },
  1152. })
  1153. assert.Error(t, err)
  1154. assert.Contains(t, getErrorString(err), "no delete executed")
  1155. action.Options = dataprovider.BaseEventActionOptions{
  1156. FsConfig: dataprovider.EventActionFilesystemConfig{
  1157. Type: dataprovider.FilesystemActionMkdirs,
  1158. Deletes: []string{"/dir1"},
  1159. },
  1160. }
  1161. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1162. Names: []dataprovider.ConditionPattern{
  1163. {
  1164. Pattern: "no match",
  1165. },
  1166. },
  1167. })
  1168. assert.Error(t, err)
  1169. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1170. action.Options = dataprovider.BaseEventActionOptions{
  1171. FsConfig: dataprovider.EventActionFilesystemConfig{
  1172. Type: dataprovider.FilesystemActionCompress,
  1173. Compress: dataprovider.EventActionFsCompress{
  1174. Name: "test.zip",
  1175. Paths: []string{"/{{VirtualPath}}"},
  1176. },
  1177. },
  1178. }
  1179. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1180. Names: []dataprovider.ConditionPattern{
  1181. {
  1182. Pattern: "no match",
  1183. },
  1184. },
  1185. })
  1186. assert.Error(t, err)
  1187. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1188. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1189. GroupNames: []dataprovider.ConditionPattern{
  1190. {
  1191. Pattern: "no match",
  1192. },
  1193. },
  1194. })
  1195. assert.Error(t, err)
  1196. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1197. err = dataprovider.DeleteUser(username1, "", "", "")
  1198. assert.NoError(t, err)
  1199. err = dataprovider.DeleteUser(username2, "", "", "")
  1200. assert.NoError(t, err)
  1201. // test folder quota reset
  1202. foldername1 := "f1"
  1203. foldername2 := "f2"
  1204. folder1 := vfs.BaseVirtualFolder{
  1205. Name: foldername1,
  1206. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1207. }
  1208. folder2 := vfs.BaseVirtualFolder{
  1209. Name: foldername2,
  1210. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1211. }
  1212. err = dataprovider.AddFolder(&folder1, "", "", "")
  1213. assert.NoError(t, err)
  1214. err = dataprovider.AddFolder(&folder2, "", "", "")
  1215. assert.NoError(t, err)
  1216. action = dataprovider.BaseEventAction{
  1217. Type: dataprovider.ActionTypeFolderQuotaReset,
  1218. }
  1219. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1220. Names: []dataprovider.ConditionPattern{
  1221. {
  1222. Pattern: foldername1,
  1223. },
  1224. },
  1225. })
  1226. assert.Error(t, err) // no home dir
  1227. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1228. assert.NoError(t, err)
  1229. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1230. assert.NoError(t, err)
  1231. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1232. Names: []dataprovider.ConditionPattern{
  1233. {
  1234. Pattern: foldername1,
  1235. },
  1236. },
  1237. })
  1238. assert.NoError(t, err)
  1239. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1240. assert.NoError(t, err)
  1241. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1242. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1243. // simulate another quota scan in progress
  1244. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1245. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1246. Names: []dataprovider.ConditionPattern{
  1247. {
  1248. Pattern: foldername1,
  1249. },
  1250. },
  1251. })
  1252. assert.Error(t, err)
  1253. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1254. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1255. Names: []dataprovider.ConditionPattern{
  1256. {
  1257. Pattern: "no folder match",
  1258. },
  1259. },
  1260. })
  1261. if assert.Error(t, err) {
  1262. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1263. }
  1264. body, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1265. Method: http.MethodPost,
  1266. }, nil, nil, dataprovider.User{}, &EventParams{}, true)
  1267. assert.NoError(t, err)
  1268. assert.Nil(t, body)
  1269. body, _, err = getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{
  1270. Method: http.MethodPost,
  1271. Body: "test body",
  1272. }, nil, nil, dataprovider.User{}, &EventParams{}, false)
  1273. assert.NoError(t, err)
  1274. assert.NotNil(t, body)
  1275. err = os.RemoveAll(folder1.MappedPath)
  1276. assert.NoError(t, err)
  1277. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1278. assert.NoError(t, err)
  1279. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1280. assert.NoError(t, err)
  1281. }
  1282. func TestIDPAccountCheckRule(t *testing.T) {
  1283. _, _, err := executeIDPAccountCheckRule(dataprovider.EventRule{}, EventParams{})
  1284. if assert.Error(t, err) {
  1285. assert.Contains(t, err.Error(), "no action executed")
  1286. }
  1287. _, _, err = executeIDPAccountCheckRule(dataprovider.EventRule{
  1288. Actions: []dataprovider.EventAction{
  1289. {
  1290. BaseEventAction: dataprovider.BaseEventAction{
  1291. Name: "n",
  1292. Type: dataprovider.ActionTypeIDPAccountCheck,
  1293. },
  1294. },
  1295. },
  1296. }, EventParams{Event: "invalid"})
  1297. if assert.Error(t, err) {
  1298. assert.Contains(t, err.Error(), "unsupported IDP login event")
  1299. }
  1300. // invalid json
  1301. _, err = executeAdminCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateAdmin: "{"}, &EventParams{Name: "missing admin"})
  1302. assert.Error(t, err)
  1303. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "["}, &EventParams{Name: "missing user"})
  1304. assert.Error(t, err)
  1305. _, err = executeUserCheckAction(&dataprovider.EventActionIDPAccountCheck{TemplateUser: "{}"}, &EventParams{Name: "invalid user template"})
  1306. assert.ErrorIs(t, err, util.ErrValidation)
  1307. username := "u"
  1308. c := &dataprovider.EventActionIDPAccountCheck{
  1309. Mode: 1,
  1310. TemplateUser: `{"username":"` + username + `","status":1,"home_dir":"` + util.JSONEscape(filepath.Join(os.TempDir())) + `","permissions":{"/":["*"]}}`,
  1311. }
  1312. params := &EventParams{
  1313. Name: username,
  1314. Event: IDPLoginUser,
  1315. }
  1316. user, err := executeUserCheckAction(c, params)
  1317. assert.NoError(t, err)
  1318. assert.Equal(t, username, user.Username)
  1319. assert.Equal(t, 1, user.Status)
  1320. user.Status = 0
  1321. err = dataprovider.UpdateUser(user, "", "", "")
  1322. assert.NoError(t, err)
  1323. // the user is not changed
  1324. user, err = executeUserCheckAction(c, params)
  1325. assert.NoError(t, err)
  1326. assert.Equal(t, username, user.Username)
  1327. assert.Equal(t, 0, user.Status)
  1328. // change the mode, the user is now updated
  1329. c.Mode = 0
  1330. user, err = executeUserCheckAction(c, params)
  1331. assert.NoError(t, err)
  1332. assert.Equal(t, username, user.Username)
  1333. assert.Equal(t, 1, user.Status)
  1334. assert.Empty(t, user.Password)
  1335. assert.Len(t, user.PublicKeys, 0)
  1336. assert.Len(t, user.Filters.TLSCerts, 0)
  1337. assert.Empty(t, user.Email)
  1338. assert.Empty(t, user.Description)
  1339. // Update the profile attribute and make sure they are preserved
  1340. user.Password = "secret"
  1341. user.Email = "[email protected]"
  1342. user.Description = "some desc"
  1343. user.Filters.TLSCerts = []string{serverCert}
  1344. user.PublicKeys = []string{"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC03jj0D+djk7pxIf/0OhrxrchJTRZklofJ1NoIu4752Sq02mdXmarMVsqJ1cAjV5LBVy3D1F5U6XW4rppkXeVtd04Pxb09ehtH0pRRPaoHHlALiJt8CoMpbKYMA8b3KXPPriGxgGomvtU2T2RMURSwOZbMtpsugfjYSWenyYX+VORYhylWnSXL961LTyC21ehd6d6QnW9G7E5hYMITMY9TuQZz3bROYzXiTsgN0+g6Hn7exFQp50p45StUMfV/SftCMdCxlxuyGny2CrN/vfjO7xxOo2uv7q1qm10Q46KPWJQv+pgZ/OfL+EDjy07n5QVSKHlbx+2nT4Q0EgOSQaCTYwn3YjtABfIxWwgAFdyj6YlPulCL22qU4MYhDcA6PSBwDdf8hvxBfvsiHdM+JcSHvv8/VeJhk6CmnZxGY0fxBupov27z3yEO8nAg8k+6PaUiW1MSUfuGMF/ktB8LOstXsEPXSszuyXiOv4DaryOXUiSn7bmRqKcEFlJusO6aZP0= nicola@p1"}
  1345. err = dataprovider.UpdateUser(user, "", "", "")
  1346. assert.NoError(t, err)
  1347. user, err = executeUserCheckAction(c, params)
  1348. assert.NoError(t, err)
  1349. assert.Equal(t, username, user.Username)
  1350. assert.Equal(t, 1, user.Status)
  1351. assert.NotEmpty(t, user.Password)
  1352. assert.Len(t, user.PublicKeys, 1)
  1353. assert.Len(t, user.Filters.TLSCerts, 1)
  1354. assert.NotEmpty(t, user.Email)
  1355. assert.NotEmpty(t, user.Description)
  1356. err = dataprovider.DeleteUser(username, "", "", "")
  1357. assert.NoError(t, err)
  1358. // check rule consistency
  1359. r := dataprovider.EventRule{
  1360. Actions: []dataprovider.EventAction{
  1361. {
  1362. BaseEventAction: dataprovider.BaseEventAction{
  1363. Type: dataprovider.ActionTypeIDPAccountCheck,
  1364. },
  1365. Order: 1,
  1366. },
  1367. },
  1368. }
  1369. err = r.CheckActionsConsistency("")
  1370. if assert.Error(t, err) {
  1371. assert.Contains(t, err.Error(), "IDP account check action is only supported for IDP login trigger")
  1372. }
  1373. r.Trigger = dataprovider.EventTriggerIDPLogin
  1374. err = r.CheckActionsConsistency("")
  1375. if assert.Error(t, err) {
  1376. assert.Contains(t, err.Error(), "IDP account check must be a sync action")
  1377. }
  1378. r.Actions[0].Options.ExecuteSync = true
  1379. err = r.CheckActionsConsistency("")
  1380. assert.NoError(t, err)
  1381. r.Actions = append(r.Actions, dataprovider.EventAction{
  1382. BaseEventAction: dataprovider.BaseEventAction{
  1383. Type: dataprovider.ActionTypeCommand,
  1384. },
  1385. Options: dataprovider.EventActionOptions{
  1386. ExecuteSync: true,
  1387. },
  1388. Order: 2,
  1389. })
  1390. err = r.CheckActionsConsistency("")
  1391. if assert.Error(t, err) {
  1392. assert.Contains(t, err.Error(), "IDP account check must be the only sync action")
  1393. }
  1394. }
  1395. func TestUserExpirationCheck(t *testing.T) {
  1396. username := "test_user_expiration_check"
  1397. user := dataprovider.User{
  1398. BaseUser: sdk.BaseUser{
  1399. Username: username,
  1400. Permissions: map[string][]string{
  1401. "/": {dataprovider.PermAny},
  1402. },
  1403. HomeDir: filepath.Join(os.TempDir(), username),
  1404. ExpirationDate: util.GetTimeAsMsSinceEpoch(time.Now().Add(-24 * time.Hour)),
  1405. },
  1406. }
  1407. user.Filters.PasswordExpiration = 5
  1408. err := dataprovider.AddUser(&user, "", "", "")
  1409. assert.NoError(t, err)
  1410. conditions := dataprovider.ConditionOptions{
  1411. Names: []dataprovider.ConditionPattern{
  1412. {
  1413. Pattern: username,
  1414. },
  1415. },
  1416. }
  1417. err = executeUserExpirationCheckRuleAction(conditions, &EventParams{})
  1418. if assert.Error(t, err) {
  1419. assert.Contains(t, err.Error(), "expired users")
  1420. }
  1421. // the check will be skipped, the user is expired
  1422. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{Threshold: 10}, conditions, &EventParams{})
  1423. assert.NoError(t, err)
  1424. err = dataprovider.DeleteUser(username, "", "", "")
  1425. assert.NoError(t, err)
  1426. err = os.RemoveAll(user.GetHomeDir())
  1427. assert.NoError(t, err)
  1428. }
  1429. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1430. username := "test_user_action_group_matching"
  1431. user := dataprovider.User{
  1432. BaseUser: sdk.BaseUser{
  1433. Username: username,
  1434. Permissions: map[string][]string{
  1435. "/": {dataprovider.PermAny},
  1436. },
  1437. HomeDir: filepath.Join(os.TempDir(), username),
  1438. },
  1439. }
  1440. err := dataprovider.AddUser(&user, "", "", "")
  1441. assert.NoError(t, err)
  1442. conditions := dataprovider.ConditionOptions{
  1443. GroupNames: []dataprovider.ConditionPattern{
  1444. {
  1445. Pattern: "agroup",
  1446. },
  1447. },
  1448. }
  1449. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1450. if assert.Error(t, err) {
  1451. assert.Contains(t, err.Error(), "no delete executed")
  1452. }
  1453. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1454. if assert.Error(t, err) {
  1455. assert.Contains(t, err.Error(), "no mkdir executed")
  1456. }
  1457. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1458. if assert.Error(t, err) {
  1459. assert.Contains(t, err.Error(), "no rename executed")
  1460. }
  1461. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1462. if assert.Error(t, err) {
  1463. assert.Contains(t, err.Error(), "no existence check executed")
  1464. }
  1465. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1466. if assert.Error(t, err) {
  1467. assert.Contains(t, err.Error(), "no copy executed")
  1468. }
  1469. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1470. if assert.Error(t, err) {
  1471. assert.Contains(t, err.Error(), "no user quota reset executed")
  1472. }
  1473. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1474. if assert.Error(t, err) {
  1475. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1476. }
  1477. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1478. if assert.Error(t, err) {
  1479. assert.Contains(t, err.Error(), "no retention check executed")
  1480. }
  1481. err = dataprovider.DeleteUser(username, "", "", "")
  1482. assert.NoError(t, err)
  1483. err = os.RemoveAll(user.GetHomeDir())
  1484. assert.NoError(t, err)
  1485. }
  1486. func TestGetFileContent(t *testing.T) {
  1487. username := "test_user_get_file_content"
  1488. user := dataprovider.User{
  1489. BaseUser: sdk.BaseUser{
  1490. Username: username,
  1491. Permissions: map[string][]string{
  1492. "/": {dataprovider.PermAny},
  1493. },
  1494. HomeDir: filepath.Join(os.TempDir(), username),
  1495. },
  1496. }
  1497. err := dataprovider.AddUser(&user, "", "", "")
  1498. assert.NoError(t, err)
  1499. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1500. assert.NoError(t, err)
  1501. fileContent := []byte("test file content")
  1502. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1503. assert.NoError(t, err)
  1504. conn := NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1505. replacer := strings.NewReplacer("old", "new")
  1506. files, err := getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1507. assert.NoError(t, err)
  1508. if assert.Len(t, files, 1) {
  1509. var b bytes.Buffer
  1510. _, err = files[0].Writer(&b)
  1511. assert.NoError(t, err)
  1512. assert.Equal(t, fileContent, b.Bytes())
  1513. }
  1514. // missing file
  1515. _, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1516. assert.Error(t, err)
  1517. // directory
  1518. _, err = getMailAttachments(conn, []string{"/"}, replacer)
  1519. assert.Error(t, err)
  1520. // files too large
  1521. content := make([]byte, maxAttachmentsSize/2+1)
  1522. _, err = rand.Read(content)
  1523. assert.NoError(t, err)
  1524. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1525. assert.NoError(t, err)
  1526. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1527. assert.NoError(t, err)
  1528. files, err = getMailAttachments(conn, []string{"/file1.txt"}, replacer)
  1529. assert.NoError(t, err)
  1530. if assert.Len(t, files, 1) {
  1531. var b bytes.Buffer
  1532. _, err = files[0].Writer(&b)
  1533. assert.NoError(t, err)
  1534. assert.Equal(t, content, b.Bytes())
  1535. }
  1536. _, err = getMailAttachments(conn, []string{"/file1.txt", "/file2.txt"}, replacer)
  1537. if assert.Error(t, err) {
  1538. assert.Contains(t, err.Error(), "size too large")
  1539. }
  1540. // change the filesystem provider
  1541. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1542. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1543. err = dataprovider.UpdateUser(&user, "", "", "")
  1544. assert.NoError(t, err)
  1545. conn = NewBaseConnection(xid.New().String(), protocolEventAction, "", "", user)
  1546. // the file is not encrypted so reading the encryption header will fail
  1547. files, err = getMailAttachments(conn, []string{"/file.txt"}, replacer)
  1548. assert.NoError(t, err)
  1549. if assert.Len(t, files, 1) {
  1550. var b bytes.Buffer
  1551. _, err = files[0].Writer(&b)
  1552. assert.Error(t, err)
  1553. }
  1554. err = dataprovider.DeleteUser(username, "", "", "")
  1555. assert.NoError(t, err)
  1556. err = os.RemoveAll(user.GetHomeDir())
  1557. assert.NoError(t, err)
  1558. }
  1559. func TestFilesystemActionErrors(t *testing.T) {
  1560. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1561. if assert.Error(t, err) {
  1562. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1563. }
  1564. username := "test_user_for_actions"
  1565. testReplacer := strings.NewReplacer("old", "new")
  1566. user := dataprovider.User{
  1567. BaseUser: sdk.BaseUser{
  1568. Username: username,
  1569. Permissions: map[string][]string{
  1570. "/": {dataprovider.PermAny},
  1571. },
  1572. HomeDir: filepath.Join(os.TempDir(), username),
  1573. },
  1574. FsConfig: vfs.Filesystem{
  1575. Provider: sdk.SFTPFilesystemProvider,
  1576. SFTPConfig: vfs.SFTPFsConfig{
  1577. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1578. Endpoint: "127.0.0.1:4022",
  1579. Username: username,
  1580. },
  1581. Password: kms.NewPlainSecret("pwd"),
  1582. },
  1583. },
  1584. }
  1585. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1586. Recipients: []string{"[email protected]"},
  1587. Subject: "subject",
  1588. Body: "body",
  1589. Attachments: []string{"/file.txt"},
  1590. }, &EventParams{
  1591. sender: username,
  1592. })
  1593. assert.Error(t, err)
  1594. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1595. err = executeDeleteFileFsAction(conn, "", nil)
  1596. assert.Error(t, err)
  1597. err = dataprovider.AddUser(&user, "", "", "")
  1598. assert.NoError(t, err)
  1599. // check root fs fails
  1600. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1601. assert.Error(t, err)
  1602. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1603. assert.Error(t, err)
  1604. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1605. assert.Error(t, err)
  1606. err = executeExistFsActionForUser(nil, testReplacer, user)
  1607. assert.Error(t, err)
  1608. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1609. assert.Error(t, err)
  1610. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1611. assert.Error(t, err)
  1612. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1613. assert.Error(t, err)
  1614. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1615. Recipients: []string{"[email protected]"},
  1616. Subject: "subject",
  1617. Body: "body",
  1618. Attachments: []string{"/file1.txt"},
  1619. }, &EventParams{
  1620. sender: username,
  1621. })
  1622. assert.Error(t, err)
  1623. fn := getFileContentFn(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1624. var b bytes.Buffer
  1625. _, err = fn(&b)
  1626. assert.Error(t, err)
  1627. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1628. Endpoint: "http://127.0.0.1:9999/",
  1629. Method: http.MethodPost,
  1630. Parts: []dataprovider.HTTPPart{
  1631. {
  1632. Name: "p1",
  1633. Filepath: "/filepath",
  1634. },
  1635. },
  1636. }, &EventParams{
  1637. sender: username,
  1638. })
  1639. assert.Error(t, err)
  1640. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1641. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1642. err = dataprovider.DeleteUser(username, "", "", "")
  1643. assert.NoError(t, err)
  1644. err = dataprovider.AddUser(&user, "", "", "")
  1645. assert.NoError(t, err)
  1646. err = executeRenameFsActionForUser([]dataprovider.KeyValue{
  1647. {
  1648. Key: "/p1",
  1649. Value: "/p1",
  1650. },
  1651. }, testReplacer, user)
  1652. if assert.Error(t, err) {
  1653. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1654. }
  1655. err = executeRuleAction(dataprovider.BaseEventAction{
  1656. Type: dataprovider.ActionTypeFilesystem,
  1657. Options: dataprovider.BaseEventActionOptions{
  1658. FsConfig: dataprovider.EventActionFilesystemConfig{
  1659. Type: dataprovider.FilesystemActionRename,
  1660. Renames: []dataprovider.KeyValue{
  1661. {
  1662. Key: "/p2",
  1663. Value: "/p2",
  1664. },
  1665. },
  1666. },
  1667. },
  1668. }, &EventParams{}, dataprovider.ConditionOptions{
  1669. Names: []dataprovider.ConditionPattern{
  1670. {
  1671. Pattern: username,
  1672. },
  1673. },
  1674. })
  1675. assert.Error(t, err)
  1676. if runtime.GOOS != osWindows {
  1677. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1678. err := os.MkdirAll(dirPath, os.ModePerm)
  1679. assert.NoError(t, err)
  1680. filePath := filepath.Join(dirPath, "f.dat")
  1681. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1682. assert.NoError(t, err)
  1683. err = os.Chmod(dirPath, 0001)
  1684. assert.NoError(t, err)
  1685. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1686. assert.Error(t, err)
  1687. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1688. assert.Error(t, err)
  1689. err = os.Chmod(dirPath, 0555)
  1690. assert.NoError(t, err)
  1691. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1692. if assert.Error(t, err) {
  1693. assert.Contains(t, err.Error(), "unable to remove file")
  1694. }
  1695. err = executeRuleAction(dataprovider.BaseEventAction{
  1696. Type: dataprovider.ActionTypeFilesystem,
  1697. Options: dataprovider.BaseEventActionOptions{
  1698. FsConfig: dataprovider.EventActionFilesystemConfig{
  1699. Type: dataprovider.FilesystemActionDelete,
  1700. Deletes: []string{"/adir/sub/f.dat"},
  1701. },
  1702. },
  1703. }, &EventParams{}, dataprovider.ConditionOptions{
  1704. Names: []dataprovider.ConditionPattern{
  1705. {
  1706. Pattern: username,
  1707. },
  1708. },
  1709. })
  1710. assert.Error(t, err)
  1711. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1712. if assert.Error(t, err) {
  1713. assert.Contains(t, err.Error(), "unable to create dir")
  1714. }
  1715. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1716. if assert.Error(t, err) {
  1717. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1718. }
  1719. err = executeRuleAction(dataprovider.BaseEventAction{
  1720. Type: dataprovider.ActionTypeFilesystem,
  1721. Options: dataprovider.BaseEventActionOptions{
  1722. FsConfig: dataprovider.EventActionFilesystemConfig{
  1723. Type: dataprovider.FilesystemActionMkdirs,
  1724. MkDirs: []string{"/adir/sub/sub1"},
  1725. },
  1726. },
  1727. }, &EventParams{}, dataprovider.ConditionOptions{
  1728. Names: []dataprovider.ConditionPattern{
  1729. {
  1730. Pattern: username,
  1731. },
  1732. },
  1733. })
  1734. assert.Error(t, err)
  1735. err = os.Chmod(dirPath, os.ModePerm)
  1736. assert.NoError(t, err)
  1737. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1738. wr := &zipWriterWrapper{
  1739. Name: "test.zip",
  1740. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1741. Entries: map[string]bool{},
  1742. }
  1743. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub", nil, 0)
  1744. assert.Error(t, err)
  1745. assert.Contains(t, getErrorString(err), "is outside base dir")
  1746. }
  1747. wr := &zipWriterWrapper{
  1748. Name: xid.New().String() + ".zip",
  1749. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1750. Entries: map[string]bool{},
  1751. }
  1752. err = addZipEntry(wr, conn, "/p1", "/", nil, 2000)
  1753. assert.ErrorIs(t, err, util.ErrRecursionTooDeep)
  1754. err = dataprovider.DeleteUser(username, "", "", "")
  1755. assert.NoError(t, err)
  1756. err = os.RemoveAll(user.GetHomeDir())
  1757. assert.NoError(t, err)
  1758. }
  1759. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1760. oldProviderConf := dataprovider.GetProviderConfig()
  1761. providerConf := dataprovider.GetProviderConfig()
  1762. providerConf.TrackQuota = 0
  1763. err := dataprovider.Close()
  1764. assert.NoError(t, err)
  1765. err = dataprovider.Initialize(providerConf, configDir, true)
  1766. assert.NoError(t, err)
  1767. username := "u1"
  1768. user := dataprovider.User{
  1769. BaseUser: sdk.BaseUser{
  1770. Username: username,
  1771. HomeDir: filepath.Join(os.TempDir(), username),
  1772. Status: 1,
  1773. Permissions: map[string][]string{
  1774. "/": {dataprovider.PermAny},
  1775. },
  1776. },
  1777. FsConfig: vfs.Filesystem{
  1778. Provider: sdk.LocalFilesystemProvider,
  1779. },
  1780. }
  1781. err = dataprovider.AddUser(&user, "", "", "")
  1782. assert.NoError(t, err)
  1783. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1784. assert.NoError(t, err)
  1785. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1786. &EventParams{}, dataprovider.ConditionOptions{
  1787. Names: []dataprovider.ConditionPattern{
  1788. {
  1789. Pattern: username,
  1790. },
  1791. },
  1792. })
  1793. assert.Error(t, err)
  1794. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1795. &EventParams{}, dataprovider.ConditionOptions{
  1796. Names: []dataprovider.ConditionPattern{
  1797. {
  1798. Pattern: username,
  1799. },
  1800. },
  1801. })
  1802. assert.Error(t, err)
  1803. err = os.RemoveAll(user.GetHomeDir())
  1804. assert.NoError(t, err)
  1805. err = dataprovider.DeleteUser(username, "", "", "")
  1806. assert.NoError(t, err)
  1807. foldername := "f1"
  1808. folder := vfs.BaseVirtualFolder{
  1809. Name: foldername,
  1810. MappedPath: filepath.Join(os.TempDir(), foldername),
  1811. }
  1812. err = dataprovider.AddFolder(&folder, "", "", "")
  1813. assert.NoError(t, err)
  1814. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1815. assert.NoError(t, err)
  1816. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1817. &EventParams{}, dataprovider.ConditionOptions{
  1818. Names: []dataprovider.ConditionPattern{
  1819. {
  1820. Pattern: foldername,
  1821. },
  1822. },
  1823. })
  1824. assert.Error(t, err)
  1825. err = os.RemoveAll(folder.MappedPath)
  1826. assert.NoError(t, err)
  1827. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1828. assert.NoError(t, err)
  1829. err = dataprovider.Close()
  1830. assert.NoError(t, err)
  1831. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1832. assert.NoError(t, err)
  1833. }
  1834. func TestScheduledActions(t *testing.T) {
  1835. startEventScheduler()
  1836. backupsPath := filepath.Join(os.TempDir(), "backups")
  1837. err := os.RemoveAll(backupsPath)
  1838. assert.NoError(t, err)
  1839. action := &dataprovider.BaseEventAction{
  1840. Name: "action",
  1841. Type: dataprovider.ActionTypeBackup,
  1842. }
  1843. err = dataprovider.AddEventAction(action, "", "", "")
  1844. assert.NoError(t, err)
  1845. rule := &dataprovider.EventRule{
  1846. Name: "rule",
  1847. Status: 1,
  1848. Trigger: dataprovider.EventTriggerSchedule,
  1849. Conditions: dataprovider.EventConditions{
  1850. Schedules: []dataprovider.Schedule{
  1851. {
  1852. Hours: "11",
  1853. DayOfWeek: "*",
  1854. DayOfMonth: "*",
  1855. Month: "*",
  1856. },
  1857. },
  1858. },
  1859. Actions: []dataprovider.EventAction{
  1860. {
  1861. BaseEventAction: dataprovider.BaseEventAction{
  1862. Name: action.Name,
  1863. },
  1864. Order: 1,
  1865. },
  1866. },
  1867. }
  1868. job := eventCronJob{
  1869. ruleName: rule.Name,
  1870. }
  1871. job.Run() // rule not found
  1872. assert.NoDirExists(t, backupsPath)
  1873. err = dataprovider.AddEventRule(rule, "", "", "")
  1874. assert.NoError(t, err)
  1875. job.Run()
  1876. assert.DirExists(t, backupsPath)
  1877. action.Type = dataprovider.ActionTypeEmail
  1878. action.Options = dataprovider.BaseEventActionOptions{
  1879. EmailConfig: dataprovider.EventActionEmailConfig{
  1880. Recipients: []string{"[email protected]"},
  1881. Subject: "test with attachments",
  1882. Body: "body",
  1883. Attachments: []string{"/file1.txt"},
  1884. },
  1885. }
  1886. err = dataprovider.UpdateEventAction(action, "", "", "")
  1887. assert.NoError(t, err)
  1888. job.Run() // action is not compatible with a scheduled rule
  1889. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1890. assert.NoError(t, err)
  1891. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  1892. assert.NoError(t, err)
  1893. err = os.RemoveAll(backupsPath)
  1894. assert.NoError(t, err)
  1895. stopEventScheduler()
  1896. }
  1897. func TestEventParamsCopy(t *testing.T) {
  1898. params := EventParams{
  1899. Name: "name",
  1900. Event: "event",
  1901. Extension: "ext",
  1902. Status: 1,
  1903. errors: []string{"error1"},
  1904. retentionChecks: []executedRetentionCheck{},
  1905. }
  1906. paramsCopy := params.getACopy()
  1907. assert.Equal(t, params, *paramsCopy)
  1908. params.Name = "name mod"
  1909. paramsCopy.Event = "event mod"
  1910. paramsCopy.Status = 2
  1911. params.errors = append(params.errors, "error2")
  1912. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1913. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1914. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1915. assert.Equal(t, "name mod", params.Name)
  1916. assert.Equal(t, "name", paramsCopy.Name)
  1917. assert.Equal(t, "event", params.Event)
  1918. assert.Equal(t, "event mod", paramsCopy.Event)
  1919. assert.Equal(t, 1, params.Status)
  1920. assert.Equal(t, 2, paramsCopy.Status)
  1921. params = EventParams{
  1922. retentionChecks: []executedRetentionCheck{
  1923. {
  1924. Username: "u",
  1925. ActionName: "a",
  1926. Results: []folderRetentionCheckResult{
  1927. {
  1928. Path: "p",
  1929. Retention: 1,
  1930. },
  1931. },
  1932. },
  1933. },
  1934. }
  1935. paramsCopy = params.getACopy()
  1936. require.Len(t, paramsCopy.retentionChecks, 1)
  1937. paramsCopy.retentionChecks[0].Username = "u_copy"
  1938. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1939. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1940. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1941. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1942. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1943. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1944. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  1945. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  1946. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  1947. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  1948. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  1949. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  1950. assert.Nil(t, params.IDPCustomFields)
  1951. params.addIDPCustomFields(nil)
  1952. assert.Nil(t, params.IDPCustomFields)
  1953. params.IDPCustomFields = &map[string]string{
  1954. "field1": "val1",
  1955. }
  1956. paramsCopy = params.getACopy()
  1957. for k, v := range *paramsCopy.IDPCustomFields {
  1958. assert.Equal(t, "field1", k)
  1959. assert.Equal(t, "val1", v)
  1960. }
  1961. assert.Equal(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  1962. (*paramsCopy.IDPCustomFields)["field1"] = "val2"
  1963. assert.NotEqual(t, params.IDPCustomFields, paramsCopy.IDPCustomFields)
  1964. params.Metadata = map[string]string{"key": "value"}
  1965. paramsCopy = params.getACopy()
  1966. params.Metadata["key1"] = "value1"
  1967. require.Equal(t, map[string]string{"key": "value"}, paramsCopy.Metadata)
  1968. }
  1969. func TestEventParamsStatusFromError(t *testing.T) {
  1970. params := EventParams{Status: 1}
  1971. params.AddError(os.ErrNotExist)
  1972. assert.Equal(t, 1, params.Status)
  1973. params = EventParams{Status: 1, updateStatusFromError: true}
  1974. params.AddError(os.ErrNotExist)
  1975. assert.Equal(t, 2, params.Status)
  1976. }
  1977. type testWriter struct {
  1978. errTest error
  1979. sentinel string
  1980. }
  1981. func (w *testWriter) Write(p []byte) (int, error) {
  1982. if w.errTest != nil {
  1983. return 0, w.errTest
  1984. }
  1985. if w.sentinel == string(p) {
  1986. return 0, io.ErrUnexpectedEOF
  1987. }
  1988. return len(p), nil
  1989. }
  1990. func TestWriteHTTPPartsError(t *testing.T) {
  1991. m := multipart.NewWriter(&testWriter{
  1992. errTest: io.ErrShortWrite,
  1993. })
  1994. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{}, false)
  1995. assert.ErrorIs(t, err, io.ErrShortWrite)
  1996. body := "test body"
  1997. m = multipart.NewWriter(&testWriter{sentinel: body})
  1998. err = writeHTTPPart(m, dataprovider.HTTPPart{
  1999. Body: body,
  2000. }, nil, nil, nil, &EventParams{}, false)
  2001. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  2002. }
  2003. func TestReplacePathsPlaceholders(t *testing.T) {
  2004. replacer := strings.NewReplacer("{{VirtualPath}}", "/path1")
  2005. paths := []string{"{{VirtualPath}}", "/path1"}
  2006. paths = replacePathsPlaceholders(paths, replacer)
  2007. assert.Equal(t, []string{"/path1"}, paths)
  2008. paths = []string{"{{VirtualPath}}", "/path2"}
  2009. paths = replacePathsPlaceholders(paths, replacer)
  2010. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  2011. }
  2012. func TestEstimateZipSizeErrors(t *testing.T) {
  2013. u := dataprovider.User{
  2014. BaseUser: sdk.BaseUser{
  2015. Username: "u",
  2016. HomeDir: filepath.Join(os.TempDir(), "u"),
  2017. Status: 1,
  2018. Permissions: map[string][]string{
  2019. "/": {dataprovider.PermAny},
  2020. },
  2021. QuotaSize: 1000,
  2022. },
  2023. }
  2024. err := dataprovider.AddUser(&u, "", "", "")
  2025. assert.NoError(t, err)
  2026. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  2027. assert.NoError(t, err)
  2028. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  2029. _, _, _, _, err = getFileWriter(conn, "/missing/path/file.txt", -1) //nolint:dogsled
  2030. assert.Error(t, err)
  2031. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  2032. assert.True(t, conn.IsNotExistError(err))
  2033. if runtime.GOOS != osWindows {
  2034. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  2035. assert.NoError(t, err)
  2036. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  2037. assert.NoError(t, err)
  2038. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  2039. assert.NoError(t, err)
  2040. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  2041. assert.Error(t, err, "size %d", size)
  2042. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  2043. assert.NoError(t, err)
  2044. }
  2045. err = dataprovider.DeleteUser(u.Username, "", "", "")
  2046. assert.NoError(t, err)
  2047. err = os.RemoveAll(u.GetHomeDir())
  2048. assert.NoError(t, err)
  2049. }
  2050. func TestOnDemandRule(t *testing.T) {
  2051. a := &dataprovider.BaseEventAction{
  2052. Name: "a",
  2053. Type: dataprovider.ActionTypeBackup,
  2054. Options: dataprovider.BaseEventActionOptions{},
  2055. }
  2056. err := dataprovider.AddEventAction(a, "", "", "")
  2057. assert.NoError(t, err)
  2058. r := &dataprovider.EventRule{
  2059. Name: "test on demand rule",
  2060. Status: 1,
  2061. Trigger: dataprovider.EventTriggerOnDemand,
  2062. Actions: []dataprovider.EventAction{
  2063. {
  2064. BaseEventAction: dataprovider.BaseEventAction{
  2065. Name: a.Name,
  2066. },
  2067. },
  2068. },
  2069. }
  2070. err = dataprovider.AddEventRule(r, "", "", "")
  2071. assert.NoError(t, err)
  2072. err = RunOnDemandRule(r.Name)
  2073. assert.NoError(t, err)
  2074. r.Status = 0
  2075. err = dataprovider.UpdateEventRule(r, "", "", "")
  2076. assert.NoError(t, err)
  2077. err = RunOnDemandRule(r.Name)
  2078. assert.ErrorIs(t, err, util.ErrValidation)
  2079. assert.Contains(t, err.Error(), "is inactive")
  2080. r.Status = 1
  2081. r.Trigger = dataprovider.EventTriggerCertificate
  2082. err = dataprovider.UpdateEventRule(r, "", "", "")
  2083. assert.NoError(t, err)
  2084. err = RunOnDemandRule(r.Name)
  2085. assert.ErrorIs(t, err, util.ErrValidation)
  2086. assert.Contains(t, err.Error(), "is not defined as on-demand")
  2087. a1 := &dataprovider.BaseEventAction{
  2088. Name: "a1",
  2089. Type: dataprovider.ActionTypeEmail,
  2090. Options: dataprovider.BaseEventActionOptions{
  2091. EmailConfig: dataprovider.EventActionEmailConfig{
  2092. Recipients: []string{"[email protected]"},
  2093. Subject: "subject",
  2094. Body: "body",
  2095. Attachments: []string{"/{{VirtualPath}}"},
  2096. },
  2097. },
  2098. }
  2099. err = dataprovider.AddEventAction(a1, "", "", "")
  2100. assert.NoError(t, err)
  2101. r.Trigger = dataprovider.EventTriggerOnDemand
  2102. r.Actions = []dataprovider.EventAction{
  2103. {
  2104. BaseEventAction: dataprovider.BaseEventAction{
  2105. Name: a1.Name,
  2106. },
  2107. },
  2108. }
  2109. err = dataprovider.UpdateEventRule(r, "", "", "")
  2110. assert.NoError(t, err)
  2111. err = RunOnDemandRule(r.Name)
  2112. assert.ErrorIs(t, err, util.ErrValidation)
  2113. assert.Contains(t, err.Error(), "incosistent actions")
  2114. err = dataprovider.DeleteEventRule(r.Name, "", "", "")
  2115. assert.NoError(t, err)
  2116. err = dataprovider.DeleteEventAction(a.Name, "", "", "")
  2117. assert.NoError(t, err)
  2118. err = dataprovider.DeleteEventAction(a1.Name, "", "", "")
  2119. assert.NoError(t, err)
  2120. err = RunOnDemandRule(r.Name)
  2121. assert.ErrorIs(t, err, util.ErrNotFound)
  2122. }
  2123. func getErrorString(err error) string {
  2124. if err == nil {
  2125. return ""
  2126. }
  2127. return err.Error()
  2128. }
  2129. func TestHTTPEndpointWithPlaceholders(t *testing.T) {
  2130. c := dataprovider.EventActionHTTPConfig{
  2131. Endpoint: "http://127.0.0.1:8080/base/url/{{Name}}/{{VirtualPath}}/upload",
  2132. QueryParameters: []dataprovider.KeyValue{
  2133. {
  2134. Key: "u",
  2135. Value: "{{Name}}",
  2136. },
  2137. {
  2138. Key: "p",
  2139. Value: "{{VirtualPath}}",
  2140. },
  2141. },
  2142. }
  2143. name := "uname"
  2144. vPath := "/a dir/@ file.txt"
  2145. replacer := strings.NewReplacer("{{Name}}", name, "{{VirtualPath}}", vPath)
  2146. u, err := getHTTPRuleActionEndpoint(&c, replacer)
  2147. assert.NoError(t, err)
  2148. expected := "http://127.0.0.1:8080/base/url/" + url.PathEscape(name) + "/" + url.PathEscape(vPath) +
  2149. "/upload?" + "p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2150. assert.Equal(t, expected, u)
  2151. c.Endpoint = "http://127.0.0.1/upload"
  2152. u, err = getHTTPRuleActionEndpoint(&c, replacer)
  2153. assert.NoError(t, err)
  2154. expected = c.Endpoint + "?p=" + url.QueryEscape(vPath) + "&u=" + url.QueryEscape(name)
  2155. assert.Equal(t, expected, u)
  2156. }
  2157. func TestMetadataReplacement(t *testing.T) {
  2158. params := &EventParams{
  2159. Metadata: map[string]string{
  2160. "key": "value",
  2161. },
  2162. }
  2163. replacements := params.getStringReplacements(false, false)
  2164. replacer := strings.NewReplacer(replacements...)
  2165. reader, _, err := getHTTPRuleActionBody(&dataprovider.EventActionHTTPConfig{Body: "{{Metadata}} {{MetadataString}}"}, replacer, nil, dataprovider.User{}, params, false)
  2166. require.NoError(t, err)
  2167. data, err := io.ReadAll(reader)
  2168. require.NoError(t, err)
  2169. assert.Equal(t, `{"key":"value"} {\"key\":\"value\"}`, string(data))
  2170. }
  2171. func TestUserInactivityCheck(t *testing.T) {
  2172. username1 := "user1"
  2173. username2 := "user2"
  2174. user1 := dataprovider.User{
  2175. BaseUser: sdk.BaseUser{
  2176. Username: username1,
  2177. HomeDir: filepath.Join(os.TempDir(), username1),
  2178. Status: 1,
  2179. Permissions: map[string][]string{
  2180. "/": {dataprovider.PermAny},
  2181. },
  2182. },
  2183. }
  2184. user2 := dataprovider.User{
  2185. BaseUser: sdk.BaseUser{
  2186. Username: username2,
  2187. HomeDir: filepath.Join(os.TempDir(), username2),
  2188. Status: 1,
  2189. Permissions: map[string][]string{
  2190. "/": {dataprovider.PermAny},
  2191. },
  2192. },
  2193. }
  2194. days := user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2195. assert.Equal(t, 0, days)
  2196. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2197. err := executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2198. DisableThreshold: 10,
  2199. }, time.Now().Add(12*24*time.Hour))
  2200. assert.Error(t, err)
  2201. user2.LastLogin = util.GetTimeAsMsSinceEpoch(time.Now())
  2202. err = executeInactivityCheckForUser(&user2, dataprovider.EventActionUserInactivity{
  2203. DeleteThreshold: 10,
  2204. }, time.Now().Add(12*24*time.Hour))
  2205. assert.Error(t, err)
  2206. err = dataprovider.AddUser(&user1, "", "", "")
  2207. assert.NoError(t, err)
  2208. err = dataprovider.AddUser(&user2, "", "", "")
  2209. assert.NoError(t, err)
  2210. user1, err = dataprovider.UserExists(username1, "")
  2211. assert.NoError(t, err)
  2212. assert.Equal(t, 1, user1.Status)
  2213. days = user1.InactivityDays(time.Now().Add(10*24*time.Hour + 5*time.Second))
  2214. assert.Equal(t, 10, days)
  2215. days = user1.InactivityDays(time.Now().Add(-10*24*time.Hour + 5*time.Second))
  2216. assert.Equal(t, -9, days)
  2217. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2218. DisableThreshold: 10,
  2219. }, dataprovider.ConditionOptions{
  2220. Names: []dataprovider.ConditionPattern{
  2221. {
  2222. Pattern: "not matching",
  2223. },
  2224. },
  2225. }, &EventParams{}, time.Now().Add(12*24*time.Hour))
  2226. assert.NoError(t, err)
  2227. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2228. DisableThreshold: 10,
  2229. }, dataprovider.ConditionOptions{
  2230. Names: []dataprovider.ConditionPattern{
  2231. {
  2232. Pattern: user1.Username,
  2233. },
  2234. },
  2235. }, &EventParams{}, time.Now())
  2236. assert.NoError(t, err) // no action
  2237. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2238. DisableThreshold: 10,
  2239. }, dataprovider.ConditionOptions{
  2240. Names: []dataprovider.ConditionPattern{
  2241. {
  2242. Pattern: user1.Username,
  2243. },
  2244. },
  2245. }, &EventParams{}, time.Now().Add(-12*24*time.Hour))
  2246. assert.NoError(t, err) // no action
  2247. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2248. DisableThreshold: 10,
  2249. DeleteThreshold: 20,
  2250. }, dataprovider.ConditionOptions{
  2251. Names: []dataprovider.ConditionPattern{
  2252. {
  2253. Pattern: user1.Username,
  2254. },
  2255. },
  2256. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2257. // both thresholds exceeded, the user will be disabled
  2258. if assert.Error(t, err) {
  2259. assert.Contains(t, err.Error(), "executed inactivity check actions for users")
  2260. }
  2261. user1, err = dataprovider.UserExists(username1, "")
  2262. assert.NoError(t, err)
  2263. assert.Equal(t, 0, user1.Status)
  2264. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2265. DisableThreshold: 10,
  2266. }, dataprovider.ConditionOptions{
  2267. Names: []dataprovider.ConditionPattern{
  2268. {
  2269. Pattern: user1.Username,
  2270. },
  2271. },
  2272. }, &EventParams{}, time.Now().Add(30*24*time.Hour))
  2273. assert.NoError(t, err) // already disabled, no action
  2274. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2275. DisableThreshold: 10,
  2276. DeleteThreshold: 20,
  2277. }, dataprovider.ConditionOptions{
  2278. Names: []dataprovider.ConditionPattern{
  2279. {
  2280. Pattern: user1.Username,
  2281. },
  2282. },
  2283. }, &EventParams{}, time.Now().Add(-30*24*time.Hour))
  2284. assert.NoError(t, err)
  2285. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2286. DisableThreshold: 10,
  2287. DeleteThreshold: 20,
  2288. }, dataprovider.ConditionOptions{
  2289. Names: []dataprovider.ConditionPattern{
  2290. {
  2291. Pattern: user1.Username,
  2292. },
  2293. },
  2294. }, &EventParams{}, time.Now())
  2295. assert.NoError(t, err)
  2296. user1, err = dataprovider.UserExists(username1, "")
  2297. assert.NoError(t, err)
  2298. assert.Equal(t, 0, user1.Status)
  2299. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2300. DisableThreshold: 10,
  2301. DeleteThreshold: 20,
  2302. }, dataprovider.ConditionOptions{
  2303. Names: []dataprovider.ConditionPattern{
  2304. {
  2305. Pattern: user1.Username,
  2306. },
  2307. },
  2308. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // the user is disabled, will be now deleted
  2309. assert.Error(t, err)
  2310. _, err = dataprovider.UserExists(username1, "")
  2311. assert.ErrorIs(t, err, util.ErrNotFound)
  2312. err = executeUserInactivityCheckRuleAction(dataprovider.EventActionUserInactivity{
  2313. DeleteThreshold: 20,
  2314. }, dataprovider.ConditionOptions{
  2315. Names: []dataprovider.ConditionPattern{
  2316. {
  2317. Pattern: user2.Username,
  2318. },
  2319. },
  2320. }, &EventParams{}, time.Now().Add(30*24*time.Hour)) // no disable threshold, user deleted
  2321. assert.Error(t, err)
  2322. _, err = dataprovider.UserExists(username2, "")
  2323. assert.ErrorIs(t, err, util.ErrNotFound)
  2324. err = dataprovider.DeleteUser(username1, "", "", "")
  2325. assert.Error(t, err)
  2326. err = dataprovider.DeleteUser(username2, "", "", "")
  2327. assert.Error(t, err)
  2328. }