1
0

protocol_test.go 281 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common_test
  15. import (
  16. "bufio"
  17. "bytes"
  18. "crypto/rand"
  19. "encoding/json"
  20. "errors"
  21. "fmt"
  22. "io"
  23. "io/fs"
  24. "math"
  25. "net"
  26. "net/http"
  27. "os"
  28. "path"
  29. "path/filepath"
  30. "runtime"
  31. "strings"
  32. "sync"
  33. "testing"
  34. "time"
  35. _ "github.com/go-sql-driver/mysql"
  36. _ "github.com/jackc/pgx/v5/stdlib"
  37. _ "github.com/mattn/go-sqlite3"
  38. "github.com/mhale/smtpd"
  39. "github.com/minio/sio"
  40. "github.com/pkg/sftp"
  41. "github.com/pquerna/otp"
  42. "github.com/pquerna/otp/totp"
  43. "github.com/rs/xid"
  44. "github.com/rs/zerolog"
  45. "github.com/sftpgo/sdk"
  46. "github.com/stretchr/testify/assert"
  47. "github.com/stretchr/testify/require"
  48. "github.com/studio-b12/gowebdav"
  49. "golang.org/x/crypto/ssh"
  50. "github.com/drakkan/sftpgo/v2/internal/common"
  51. "github.com/drakkan/sftpgo/v2/internal/config"
  52. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  53. "github.com/drakkan/sftpgo/v2/internal/httpclient"
  54. "github.com/drakkan/sftpgo/v2/internal/httpdtest"
  55. "github.com/drakkan/sftpgo/v2/internal/kms"
  56. "github.com/drakkan/sftpgo/v2/internal/logger"
  57. "github.com/drakkan/sftpgo/v2/internal/mfa"
  58. "github.com/drakkan/sftpgo/v2/internal/sftpd"
  59. "github.com/drakkan/sftpgo/v2/internal/smtp"
  60. "github.com/drakkan/sftpgo/v2/internal/util"
  61. "github.com/drakkan/sftpgo/v2/internal/vfs"
  62. "github.com/drakkan/sftpgo/v2/internal/webdavd"
  63. )
  64. const (
  65. httpAddr = "127.0.0.1:9999"
  66. httpProxyAddr = "127.0.0.1:7777"
  67. sftpServerAddr = "127.0.0.1:4022"
  68. smtpServerAddr = "127.0.0.1:2525"
  69. webDavServerPort = 9191
  70. httpFsPort = 34567
  71. defaultUsername = "test_common_sftp"
  72. defaultPassword = "test_password"
  73. defaultSFTPUsername = "test_common_sftpfs_user"
  74. defaultHTTPFsUsername = "httpfs_ftp_user"
  75. httpFsWellKnowDir = "/wellknow"
  76. osWindows = "windows"
  77. testFileName = "test_file_common_sftp.dat"
  78. testDir = "test_dir_common"
  79. )
  80. var (
  81. configDir = filepath.Join(".", "..", "..")
  82. allPerms = []string{dataprovider.PermAny}
  83. homeBasePath string
  84. logFilePath string
  85. backupsPath string
  86. testFileContent = []byte("test data")
  87. lastReceivedEmail receivedEmail
  88. )
  89. func TestMain(m *testing.M) {
  90. homeBasePath = os.TempDir()
  91. logFilePath = filepath.Join(configDir, "common_test.log")
  92. backupsPath = filepath.Join(os.TempDir(), "backups")
  93. logger.InitLogger(logFilePath, 5, 1, 28, false, false, zerolog.DebugLevel)
  94. os.Setenv("SFTPGO_DATA_PROVIDER__CREATE_DEFAULT_ADMIN", "1")
  95. os.Setenv("SFTPGO_COMMON__ALLOW_SELF_CONNECTIONS", "1")
  96. os.Setenv("SFTPGO_DEFAULT_ADMIN_USERNAME", "admin")
  97. os.Setenv("SFTPGO_DEFAULT_ADMIN_PASSWORD", "password")
  98. err := config.LoadConfig(configDir, "")
  99. if err != nil {
  100. logger.ErrorToConsole("error loading configuration: %v", err)
  101. os.Exit(1)
  102. }
  103. providerConf := config.GetProviderConf()
  104. providerConf.BackupsPath = backupsPath
  105. logger.InfoToConsole("Starting COMMON tests, provider: %v", providerConf.Driver)
  106. err = dataprovider.Initialize(providerConf, configDir, true)
  107. if err != nil {
  108. logger.ErrorToConsole("error initializing data provider: %v", err)
  109. os.Exit(1)
  110. }
  111. err = common.Initialize(config.GetCommonConfig(), 0)
  112. if err != nil {
  113. logger.WarnToConsole("error initializing common: %v", err)
  114. os.Exit(1)
  115. }
  116. httpConfig := config.GetHTTPConfig()
  117. httpConfig.Timeout = 5
  118. httpConfig.RetryMax = 0
  119. httpConfig.Initialize(configDir) //nolint:errcheck
  120. kmsConfig := config.GetKMSConfig()
  121. err = kmsConfig.Initialize()
  122. if err != nil {
  123. logger.ErrorToConsole("error initializing kms: %v", err)
  124. os.Exit(1)
  125. }
  126. mfaConfig := config.GetMFAConfig()
  127. err = mfaConfig.Initialize()
  128. if err != nil {
  129. logger.ErrorToConsole("error initializing MFA: %v", err)
  130. os.Exit(1)
  131. }
  132. sftpdConf := config.GetSFTPDConfig()
  133. sftpdConf.Bindings[0].Port = 4022
  134. sftpdConf.EnabledSSHCommands = []string{"*"}
  135. sftpdConf.Bindings = append(sftpdConf.Bindings, sftpd.Binding{
  136. Port: 4024,
  137. })
  138. sftpdConf.KeyboardInteractiveAuthentication = true
  139. httpdConf := config.GetHTTPDConfig()
  140. httpdConf.Bindings[0].Port = 4080
  141. httpdtest.SetBaseURL("http://127.0.0.1:4080")
  142. webDavConf := config.GetWebDAVDConfig()
  143. webDavConf.Bindings = []webdavd.Binding{
  144. {
  145. Port: webDavServerPort,
  146. },
  147. }
  148. go func() {
  149. if err := sftpdConf.Initialize(configDir); err != nil {
  150. logger.ErrorToConsole("could not start SFTP server: %v", err)
  151. os.Exit(1)
  152. }
  153. }()
  154. go func() {
  155. if err := httpdConf.Initialize(configDir, 0); err != nil {
  156. logger.ErrorToConsole("could not start HTTP server: %v", err)
  157. os.Exit(1)
  158. }
  159. }()
  160. go func() {
  161. if err := webDavConf.Initialize(configDir); err != nil {
  162. logger.ErrorToConsole("could not start WebDAV server: %v", err)
  163. os.Exit(1)
  164. }
  165. }()
  166. waitTCPListening(sftpdConf.Bindings[0].GetAddress())
  167. waitTCPListening(httpdConf.Bindings[0].GetAddress())
  168. waitTCPListening(webDavConf.Bindings[0].GetAddress())
  169. startHTTPFs()
  170. go func() {
  171. // start a test HTTP server to receive action notifications
  172. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  173. fmt.Fprintf(w, "OK\n")
  174. })
  175. http.HandleFunc("/404", func(w http.ResponseWriter, r *http.Request) {
  176. w.WriteHeader(http.StatusNotFound)
  177. fmt.Fprintf(w, "Not found\n")
  178. })
  179. http.HandleFunc("/multipart", func(w http.ResponseWriter, r *http.Request) {
  180. err := r.ParseMultipartForm(1048576)
  181. if err != nil {
  182. w.WriteHeader(http.StatusInternalServerError)
  183. fmt.Fprintf(w, "KO\n")
  184. return
  185. }
  186. defer r.MultipartForm.RemoveAll() //nolint:errcheck
  187. fmt.Fprintf(w, "OK\n")
  188. })
  189. if err := http.ListenAndServe(httpAddr, nil); err != nil {
  190. logger.ErrorToConsole("could not start HTTP notification server: %v", err)
  191. os.Exit(1)
  192. }
  193. }()
  194. go func() {
  195. common.Config.ProxyProtocol = 2
  196. listener, err := net.Listen("tcp", httpProxyAddr)
  197. if err != nil {
  198. logger.ErrorToConsole("error creating listener for proxy protocol server: %v", err)
  199. os.Exit(1)
  200. }
  201. proxyListener, err := common.Config.GetProxyListener(listener)
  202. if err != nil {
  203. logger.ErrorToConsole("error creating proxy protocol listener: %v", err)
  204. os.Exit(1)
  205. }
  206. common.Config.ProxyProtocol = 0
  207. s := &http.Server{}
  208. if err := s.Serve(proxyListener); err != nil {
  209. logger.ErrorToConsole("could not start HTTP proxy protocol server: %v", err)
  210. os.Exit(1)
  211. }
  212. }()
  213. go func() {
  214. if err := smtpd.ListenAndServe(smtpServerAddr, func(remoteAddr net.Addr, from string, to []string, data []byte) error {
  215. lastReceivedEmail.set(from, to, data)
  216. return nil
  217. }, "SFTPGo test", "localhost"); err != nil {
  218. logger.ErrorToConsole("could not start SMTP server: %v", err)
  219. os.Exit(1)
  220. }
  221. }()
  222. waitTCPListening(httpAddr)
  223. waitTCPListening(httpProxyAddr)
  224. waitTCPListening(smtpServerAddr)
  225. exitCode := m.Run()
  226. os.Remove(logFilePath)
  227. os.RemoveAll(backupsPath)
  228. os.Exit(exitCode)
  229. }
  230. func TestBaseConnection(t *testing.T) {
  231. u := getTestUser()
  232. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  233. assert.NoError(t, err)
  234. err = os.RemoveAll(user.GetHomeDir())
  235. assert.NoError(t, err)
  236. conn, client, err := getSftpClient(user)
  237. if assert.NoError(t, err) {
  238. defer conn.Close()
  239. defer client.Close()
  240. assert.NoError(t, checkBasicSFTP(client))
  241. _, err = client.ReadDir(testDir)
  242. assert.ErrorIs(t, err, os.ErrNotExist)
  243. err = client.RemoveDirectory(testDir)
  244. assert.ErrorIs(t, err, os.ErrNotExist)
  245. err = client.Mkdir(testDir)
  246. assert.NoError(t, err)
  247. err = client.Mkdir(testDir)
  248. assert.Error(t, err)
  249. info, err := client.Stat(testDir)
  250. if assert.NoError(t, err) {
  251. assert.True(t, info.IsDir())
  252. }
  253. err = client.Rename(testDir, testDir)
  254. if assert.Error(t, err) {
  255. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  256. }
  257. err = client.Rename(testDir, path.Join(testDir, "sub"))
  258. if assert.Error(t, err) {
  259. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  260. }
  261. err = client.RemoveDirectory(testDir)
  262. assert.NoError(t, err)
  263. err = client.Remove(testFileName)
  264. assert.ErrorIs(t, err, os.ErrNotExist)
  265. f, err := client.Create(testFileName)
  266. assert.NoError(t, err)
  267. _, err = f.Write(testFileContent)
  268. assert.NoError(t, err)
  269. err = f.Close()
  270. assert.NoError(t, err)
  271. linkName := testFileName + ".link"
  272. err = client.Rename(testFileName, testFileName)
  273. if assert.Error(t, err) {
  274. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  275. }
  276. err = client.Symlink(testFileName, linkName)
  277. assert.NoError(t, err)
  278. err = client.Symlink(testFileName, testFileName)
  279. assert.Error(t, err)
  280. info, err = client.Stat(testFileName)
  281. if assert.NoError(t, err) {
  282. assert.Equal(t, int64(len(testFileContent)), info.Size())
  283. assert.False(t, info.IsDir())
  284. }
  285. info, err = client.Lstat(linkName)
  286. if assert.NoError(t, err) {
  287. assert.NotEqual(t, int64(7), info.Size())
  288. assert.True(t, info.Mode()&os.ModeSymlink != 0)
  289. assert.False(t, info.IsDir())
  290. }
  291. err = client.RemoveDirectory(linkName)
  292. if assert.Error(t, err) {
  293. assert.Contains(t, err.Error(), "SSH_FX_FAILURE")
  294. }
  295. err = client.Remove(testFileName)
  296. assert.NoError(t, err)
  297. err = client.Remove(linkName)
  298. assert.NoError(t, err)
  299. err = client.Rename(testFileName, "test")
  300. assert.ErrorIs(t, err, os.ErrNotExist)
  301. f, err = client.Create(testFileName)
  302. assert.NoError(t, err)
  303. err = f.Close()
  304. assert.NoError(t, err)
  305. err = client.Rename(testFileName, testFileName+"1")
  306. assert.NoError(t, err)
  307. err = client.Remove(testFileName + "1")
  308. assert.NoError(t, err)
  309. err = client.RemoveDirectory("missing")
  310. assert.Error(t, err)
  311. } else {
  312. printLatestLogs(10)
  313. }
  314. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  315. assert.NoError(t, err)
  316. err = os.RemoveAll(user.GetHomeDir())
  317. assert.NoError(t, err)
  318. }
  319. func TestRemoveAll(t *testing.T) {
  320. u := getTestUser()
  321. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  322. assert.NoError(t, err)
  323. webDavClient := getWebDavClient(user)
  324. err = webDavClient.RemoveAll("/")
  325. if assert.Error(t, err) {
  326. assert.True(t, gowebdav.IsErrCode(err, http.StatusForbidden))
  327. }
  328. testDir := "baseDir"
  329. err = webDavClient.RemoveAll(testDir)
  330. assert.NoError(t, err)
  331. conn, client, err := getSftpClient(user)
  332. if assert.NoError(t, err) {
  333. defer conn.Close()
  334. defer client.Close()
  335. err = client.Mkdir(testDir)
  336. assert.NoError(t, err)
  337. err = writeSFTPFile(path.Join(testDir, testFileName), 1234, client)
  338. assert.NoError(t, err)
  339. err = webDavClient.RemoveAll(path.Join(testDir, testFileName))
  340. assert.NoError(t, err)
  341. _, err = client.Stat(path.Join(testDir, testFileName))
  342. assert.Error(t, err)
  343. err = writeSFTPFile(path.Join(testDir, testFileName), 1234, client)
  344. assert.NoError(t, err)
  345. err = webDavClient.RemoveAll(testDir)
  346. assert.NoError(t, err)
  347. _, err = client.Stat(testDir)
  348. assert.Error(t, err)
  349. }
  350. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  351. assert.NoError(t, err)
  352. err = os.RemoveAll(user.GetHomeDir())
  353. assert.NoError(t, err)
  354. }
  355. func TestRelativeSymlinks(t *testing.T) {
  356. u := getTestUser()
  357. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  358. assert.NoError(t, err)
  359. err = os.RemoveAll(user.GetHomeDir())
  360. assert.NoError(t, err)
  361. conn, client, err := getSftpClient(user)
  362. if assert.NoError(t, err) {
  363. defer conn.Close()
  364. defer client.Close()
  365. linkName := testFileName + "_link"
  366. err = client.Symlink("non-existent-file", linkName)
  367. assert.NoError(t, err)
  368. err = client.Remove(linkName)
  369. assert.NoError(t, err)
  370. testDir := "sub"
  371. err = client.Mkdir(testDir)
  372. assert.NoError(t, err)
  373. f, err := client.Create(path.Join(testDir, testFileName))
  374. assert.NoError(t, err)
  375. _, err = f.Write(testFileContent)
  376. assert.NoError(t, err)
  377. err = f.Close()
  378. assert.NoError(t, err)
  379. err = client.Symlink(path.Join(testDir, testFileName), linkName)
  380. assert.NoError(t, err)
  381. _, err = client.Stat(linkName)
  382. assert.NoError(t, err)
  383. p, err := client.ReadLink(linkName)
  384. assert.NoError(t, err)
  385. assert.Equal(t, path.Join("/", testDir, testFileName), p)
  386. err = client.Remove(linkName)
  387. assert.NoError(t, err)
  388. err = client.Symlink(testFileName, path.Join(testDir, linkName))
  389. assert.NoError(t, err)
  390. _, err = client.Stat(path.Join(testDir, linkName))
  391. assert.NoError(t, err)
  392. p, err = client.ReadLink(path.Join(testDir, linkName))
  393. assert.NoError(t, err)
  394. assert.Equal(t, path.Join("/", testDir, testFileName), p)
  395. f, err = client.Create(testFileName)
  396. assert.NoError(t, err)
  397. _, err = f.Write(testFileContent)
  398. assert.NoError(t, err)
  399. err = f.Close()
  400. assert.NoError(t, err)
  401. err = client.Symlink(testFileName, linkName)
  402. assert.NoError(t, err)
  403. _, err = client.Stat(linkName)
  404. assert.NoError(t, err)
  405. p, err = client.ReadLink(linkName)
  406. assert.NoError(t, err)
  407. assert.Equal(t, path.Join("/", testFileName), p)
  408. }
  409. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  410. assert.NoError(t, err)
  411. err = os.RemoveAll(user.GetHomeDir())
  412. assert.NoError(t, err)
  413. }
  414. func TestCheckFsAfterUpdate(t *testing.T) {
  415. u := getTestUser()
  416. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  417. assert.NoError(t, err)
  418. conn, client, err := getSftpClient(user)
  419. if assert.NoError(t, err) {
  420. defer conn.Close()
  421. defer client.Close()
  422. err = checkBasicSFTP(client)
  423. assert.NoError(t, err)
  424. }
  425. // remove the home dir, it will not be re-created
  426. err = os.RemoveAll(user.GetHomeDir())
  427. assert.NoError(t, err)
  428. conn, client, err = getSftpClient(user)
  429. if assert.NoError(t, err) {
  430. defer conn.Close()
  431. defer client.Close()
  432. err = checkBasicSFTP(client)
  433. assert.Error(t, err)
  434. } else {
  435. printLatestLogs(10)
  436. }
  437. // update the user and login again, this time the home dir will be created
  438. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  439. assert.NoError(t, err)
  440. conn, client, err = getSftpClient(user)
  441. if assert.NoError(t, err) {
  442. defer conn.Close()
  443. defer client.Close()
  444. err = checkBasicSFTP(client)
  445. assert.NoError(t, err)
  446. }
  447. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  448. assert.NoError(t, err)
  449. err = os.RemoveAll(user.GetHomeDir())
  450. assert.NoError(t, err)
  451. }
  452. func TestSetStat(t *testing.T) {
  453. u := getTestUser()
  454. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  455. assert.NoError(t, err)
  456. err = os.RemoveAll(user.GetHomeDir())
  457. assert.NoError(t, err)
  458. conn, client, err := getSftpClient(user)
  459. if assert.NoError(t, err) {
  460. defer conn.Close()
  461. defer client.Close()
  462. f, err := client.Create(testFileName)
  463. assert.NoError(t, err)
  464. _, err = f.Write(testFileContent)
  465. assert.NoError(t, err)
  466. err = f.Close()
  467. assert.NoError(t, err)
  468. acmodTime := time.Now().Add(36 * time.Hour)
  469. err = client.Chtimes(testFileName, acmodTime, acmodTime)
  470. assert.NoError(t, err)
  471. newFi, err := client.Lstat(testFileName)
  472. assert.NoError(t, err)
  473. diff := math.Abs(newFi.ModTime().Sub(acmodTime).Seconds())
  474. assert.LessOrEqual(t, diff, float64(1))
  475. if runtime.GOOS != osWindows {
  476. err = client.Chown(testFileName, os.Getuid(), os.Getgid())
  477. assert.NoError(t, err)
  478. }
  479. newPerm := os.FileMode(0666)
  480. err = client.Chmod(testFileName, newPerm)
  481. assert.NoError(t, err)
  482. newFi, err = client.Lstat(testFileName)
  483. if assert.NoError(t, err) {
  484. assert.Equal(t, newPerm, newFi.Mode().Perm())
  485. }
  486. err = client.Truncate(testFileName, 2)
  487. assert.NoError(t, err)
  488. info, err := client.Stat(testFileName)
  489. if assert.NoError(t, err) {
  490. assert.Equal(t, int64(2), info.Size())
  491. }
  492. err = client.Remove(testFileName)
  493. assert.NoError(t, err)
  494. err = client.Truncate(testFileName, 0)
  495. assert.ErrorIs(t, err, os.ErrNotExist)
  496. err = client.Chtimes(testFileName, acmodTime, acmodTime)
  497. assert.ErrorIs(t, err, os.ErrNotExist)
  498. if runtime.GOOS != osWindows {
  499. err = client.Chown(testFileName, os.Getuid(), os.Getgid())
  500. assert.ErrorIs(t, err, os.ErrNotExist)
  501. }
  502. err = client.Chmod(testFileName, newPerm)
  503. assert.ErrorIs(t, err, os.ErrNotExist)
  504. }
  505. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  506. assert.NoError(t, err)
  507. err = os.RemoveAll(user.GetHomeDir())
  508. assert.NoError(t, err)
  509. }
  510. func TestCryptFsUserUploadErrorOverwrite(t *testing.T) {
  511. u := getCryptFsUser()
  512. u.QuotaSize = 6000
  513. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  514. assert.NoError(t, err)
  515. var buf []byte
  516. for i := 0; i < 4000; i++ {
  517. buf = append(buf, []byte("a")...)
  518. }
  519. bufSize := int64(len(buf))
  520. reader := bytes.NewReader(buf)
  521. conn, client, err := getSftpClient(user)
  522. if assert.NoError(t, err) {
  523. defer conn.Close()
  524. defer client.Close()
  525. f, err := client.Create(testFileName + "_big")
  526. assert.NoError(t, err)
  527. n, err := io.Copy(f, reader)
  528. assert.NoError(t, err)
  529. assert.Equal(t, bufSize, n)
  530. err = f.Close()
  531. assert.NoError(t, err)
  532. encryptedSize, err := getEncryptedFileSize(bufSize)
  533. assert.NoError(t, err)
  534. expectedSize := encryptedSize
  535. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  536. assert.NoError(t, err)
  537. assert.Equal(t, 1, user.UsedQuotaFiles)
  538. assert.Equal(t, expectedSize, user.UsedQuotaSize)
  539. // now write a small file
  540. f, err = client.Create(testFileName)
  541. assert.NoError(t, err)
  542. _, err = f.Write(testFileContent)
  543. assert.NoError(t, err)
  544. err = f.Close()
  545. assert.NoError(t, err)
  546. encryptedSize, err = getEncryptedFileSize(int64(len(testFileContent)))
  547. assert.NoError(t, err)
  548. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  549. assert.NoError(t, err)
  550. assert.Equal(t, 2, user.UsedQuotaFiles)
  551. assert.Equal(t, expectedSize+encryptedSize, user.UsedQuotaSize)
  552. // try to overwrite this file with a big one, this cause an overquota error
  553. // the partial file is deleted and the quota updated
  554. _, err = reader.Seek(0, io.SeekStart)
  555. assert.NoError(t, err)
  556. f, err = client.Create(testFileName)
  557. assert.NoError(t, err)
  558. _, err = io.Copy(f, reader)
  559. assert.Error(t, err)
  560. err = f.Close()
  561. assert.Error(t, err)
  562. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  563. assert.NoError(t, err)
  564. assert.Equal(t, 1, user.UsedQuotaFiles)
  565. assert.Equal(t, expectedSize, user.UsedQuotaSize)
  566. }
  567. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  568. assert.NoError(t, err)
  569. err = os.RemoveAll(user.GetHomeDir())
  570. assert.NoError(t, err)
  571. }
  572. func TestChtimesOpenHandle(t *testing.T) {
  573. localUser, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  574. assert.NoError(t, err)
  575. sftpUser, _, err := httpdtest.AddUser(getTestSFTPUser(), http.StatusCreated)
  576. assert.NoError(t, err)
  577. u := getCryptFsUser()
  578. cryptFsUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  579. assert.NoError(t, err)
  580. for _, user := range []dataprovider.User{localUser, sftpUser, cryptFsUser} {
  581. conn, client, err := getSftpClient(user)
  582. if assert.NoError(t, err) {
  583. defer conn.Close()
  584. defer client.Close()
  585. f, err := client.Create(testFileName)
  586. assert.NoError(t, err, "user %v", user.Username)
  587. f1, err := client.Create(testFileName + "1")
  588. assert.NoError(t, err, "user %v", user.Username)
  589. acmodTime := time.Now().Add(36 * time.Hour)
  590. err = client.Chtimes(testFileName, acmodTime, acmodTime)
  591. assert.NoError(t, err, "user %v", user.Username)
  592. _, err = f.Write(testFileContent)
  593. assert.NoError(t, err, "user %v", user.Username)
  594. err = f.Close()
  595. assert.NoError(t, err, "user %v", user.Username)
  596. err = f1.Close()
  597. assert.NoError(t, err, "user %v", user.Username)
  598. info, err := client.Lstat(testFileName)
  599. assert.NoError(t, err, "user %v", user.Username)
  600. diff := math.Abs(info.ModTime().Sub(acmodTime).Seconds())
  601. assert.LessOrEqual(t, diff, float64(1), "user %v", user.Username)
  602. info1, err := client.Lstat(testFileName + "1")
  603. assert.NoError(t, err, "user %v", user.Username)
  604. diff = math.Abs(info1.ModTime().Sub(acmodTime).Seconds())
  605. assert.Greater(t, diff, float64(86400), "user %v", user.Username)
  606. }
  607. }
  608. _, err = httpdtest.RemoveUser(sftpUser, http.StatusOK)
  609. assert.NoError(t, err)
  610. _, err = httpdtest.RemoveUser(localUser, http.StatusOK)
  611. assert.NoError(t, err)
  612. err = os.RemoveAll(localUser.GetHomeDir())
  613. assert.NoError(t, err)
  614. _, err = httpdtest.RemoveUser(cryptFsUser, http.StatusOK)
  615. assert.NoError(t, err)
  616. err = os.RemoveAll(cryptFsUser.GetHomeDir())
  617. assert.NoError(t, err)
  618. }
  619. func TestWaitForConnections(t *testing.T) {
  620. u := getTestUser()
  621. u.UploadBandwidth = 128
  622. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  623. assert.NoError(t, err)
  624. testFileSize := int64(524288)
  625. conn, client, err := getSftpClient(user)
  626. if assert.NoError(t, err) {
  627. defer conn.Close()
  628. defer client.Close()
  629. err = common.CheckClosing()
  630. assert.NoError(t, err)
  631. var wg sync.WaitGroup
  632. wg.Add(1)
  633. go func() {
  634. defer wg.Done()
  635. time.Sleep(1 * time.Second)
  636. common.WaitForTransfers(10)
  637. common.WaitForTransfers(0)
  638. common.WaitForTransfers(10)
  639. }()
  640. err = writeSFTPFileNoCheck(testFileName, testFileSize, client)
  641. assert.NoError(t, err)
  642. wg.Wait()
  643. err = common.CheckClosing()
  644. assert.EqualError(t, err, common.ErrShuttingDown.Error())
  645. _, err = client.Stat(testFileName)
  646. if assert.Error(t, err) {
  647. assert.Contains(t, err.Error(), common.ErrShuttingDown.Error())
  648. }
  649. }
  650. _, _, err = getSftpClient(user)
  651. assert.Error(t, err)
  652. err = common.Initialize(common.Config, 0)
  653. assert.NoError(t, err)
  654. conn, client, err = getSftpClient(user)
  655. if assert.NoError(t, err) {
  656. defer conn.Close()
  657. defer client.Close()
  658. info, err := client.Stat(testFileName)
  659. if assert.NoError(t, err) {
  660. assert.Equal(t, testFileSize, info.Size())
  661. }
  662. err = client.Remove(testFileName)
  663. assert.NoError(t, err)
  664. var wg sync.WaitGroup
  665. wg.Add(1)
  666. go func() {
  667. defer wg.Done()
  668. time.Sleep(1 * time.Second)
  669. common.WaitForTransfers(1)
  670. }()
  671. err = writeSFTPFileNoCheck(testFileName, testFileSize, client)
  672. // we don't have an error here because the service won't really stop
  673. assert.NoError(t, err)
  674. wg.Wait()
  675. }
  676. err = common.Initialize(common.Config, 0)
  677. assert.NoError(t, err)
  678. common.WaitForTransfers(1)
  679. err = common.Initialize(common.Config, 0)
  680. assert.NoError(t, err)
  681. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  682. assert.NoError(t, err)
  683. err = os.RemoveAll(user.GetHomeDir())
  684. assert.NoError(t, err)
  685. }
  686. func TestCheckParentDirs(t *testing.T) {
  687. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  688. assert.NoError(t, err)
  689. testDir := "/path/to/sub/dir"
  690. conn, client, err := getSftpClient(user)
  691. if assert.NoError(t, err) {
  692. defer conn.Close()
  693. defer client.Close()
  694. _, err = client.Stat(testDir)
  695. assert.ErrorIs(t, err, os.ErrNotExist)
  696. c := common.NewBaseConnection(xid.New().String(), common.ProtocolSFTP, "", "", user)
  697. err = c.CheckParentDirs(testDir)
  698. assert.NoError(t, err)
  699. _, err = client.Stat(testDir)
  700. assert.NoError(t, err)
  701. err = c.CheckParentDirs(testDir)
  702. assert.NoError(t, err)
  703. }
  704. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  705. assert.NoError(t, err)
  706. err = os.RemoveAll(user.GetHomeDir())
  707. assert.NoError(t, err)
  708. u := getTestUser()
  709. u.Permissions["/"] = []string{dataprovider.PermUpload, dataprovider.PermListItems, dataprovider.PermDownload}
  710. user, _, err = httpdtest.AddUser(u, http.StatusCreated)
  711. assert.NoError(t, err)
  712. conn, client, err = getSftpClient(user)
  713. if assert.NoError(t, err) {
  714. defer conn.Close()
  715. defer client.Close()
  716. c := common.NewBaseConnection(xid.New().String(), common.ProtocolSFTP, "", "", user)
  717. err = c.CheckParentDirs(testDir)
  718. assert.ErrorIs(t, err, sftp.ErrSSHFxPermissionDenied)
  719. }
  720. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  721. assert.NoError(t, err)
  722. err = os.RemoveAll(user.GetHomeDir())
  723. assert.NoError(t, err)
  724. }
  725. func TestPermissionErrors(t *testing.T) {
  726. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  727. assert.NoError(t, err)
  728. u := getTestSFTPUser()
  729. subDir := "/sub"
  730. u.Permissions[subDir] = nil
  731. sftpUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  732. assert.NoError(t, err)
  733. conn, client, err := getSftpClient(user)
  734. if assert.NoError(t, err) {
  735. defer conn.Close()
  736. defer client.Close()
  737. err = client.MkdirAll(path.Join(subDir, subDir))
  738. assert.NoError(t, err)
  739. f, err := client.Create(path.Join(subDir, subDir, testFileName))
  740. if assert.NoError(t, err) {
  741. _, err = f.Write(testFileContent)
  742. assert.NoError(t, err)
  743. err = f.Close()
  744. assert.NoError(t, err)
  745. }
  746. }
  747. conn, client, err = getSftpClient(sftpUser)
  748. if assert.NoError(t, err) {
  749. defer conn.Close()
  750. defer client.Close()
  751. assert.NoError(t, checkBasicSFTP(client))
  752. _, err = client.ReadDir(subDir)
  753. assert.ErrorIs(t, err, os.ErrPermission)
  754. err = client.Mkdir(path.Join(subDir, subDir))
  755. assert.ErrorIs(t, err, os.ErrPermission)
  756. err = client.RemoveDirectory(path.Join(subDir, subDir))
  757. assert.ErrorIs(t, err, os.ErrPermission)
  758. err = client.Symlink("test", path.Join(subDir, subDir))
  759. assert.ErrorIs(t, err, os.ErrPermission)
  760. err = client.Chmod(path.Join(subDir, subDir), os.ModePerm)
  761. assert.ErrorIs(t, err, os.ErrPermission)
  762. err = client.Chown(path.Join(subDir, subDir), os.Getuid(), os.Getgid())
  763. assert.ErrorIs(t, err, os.ErrPermission)
  764. err = client.Chtimes(path.Join(subDir, subDir), time.Now(), time.Now())
  765. assert.ErrorIs(t, err, os.ErrPermission)
  766. err = client.Truncate(path.Join(subDir, subDir), 0)
  767. assert.ErrorIs(t, err, os.ErrPermission)
  768. err = client.Remove(path.Join(subDir, subDir, testFileName))
  769. assert.ErrorIs(t, err, os.ErrPermission)
  770. }
  771. _, err = httpdtest.RemoveUser(sftpUser, http.StatusOK)
  772. assert.NoError(t, err)
  773. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  774. assert.NoError(t, err)
  775. err = os.RemoveAll(user.GetHomeDir())
  776. assert.NoError(t, err)
  777. }
  778. func TestHiddenPatternFilter(t *testing.T) {
  779. deniedDir := "/denied_hidden"
  780. u := getTestUser()
  781. u.Filters.FilePatterns = []sdk.PatternsFilter{
  782. {
  783. Path: deniedDir,
  784. DeniedPatterns: []string{"*.txt", "beta*"},
  785. DenyPolicy: sdk.DenyPolicyHide,
  786. },
  787. }
  788. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  789. assert.NoError(t, err)
  790. dirName := "beta"
  791. subDirName := "testDir"
  792. testFile := filepath.Join(u.GetHomeDir(), deniedDir, "file.txt")
  793. testFile1 := filepath.Join(u.GetHomeDir(), deniedDir, "beta.txt")
  794. testHiddenFile := filepath.Join(u.GetHomeDir(), deniedDir, dirName, subDirName, "hidden.jpg")
  795. err = os.MkdirAll(filepath.Join(u.GetHomeDir(), deniedDir), os.ModePerm)
  796. assert.NoError(t, err)
  797. err = os.WriteFile(testFile, testFileContent, os.ModePerm)
  798. assert.NoError(t, err)
  799. err = os.WriteFile(testFile1, testFileContent, os.ModePerm)
  800. assert.NoError(t, err)
  801. err = os.MkdirAll(filepath.Join(u.GetHomeDir(), deniedDir, dirName, subDirName), os.ModePerm)
  802. assert.NoError(t, err)
  803. err = os.WriteFile(testHiddenFile, testFileContent, os.ModePerm)
  804. assert.NoError(t, err)
  805. conn, client, err := getSftpClient(user)
  806. if assert.NoError(t, err) {
  807. defer conn.Close()
  808. defer client.Close()
  809. files, err := client.ReadDir(deniedDir)
  810. assert.NoError(t, err)
  811. assert.Len(t, files, 0)
  812. err = client.Remove(path.Join(deniedDir, filepath.Base(testFile)))
  813. assert.ErrorIs(t, err, os.ErrNotExist)
  814. err = client.Chtimes(path.Join(deniedDir, filepath.Base(testFile)), time.Now(), time.Now())
  815. assert.ErrorIs(t, err, os.ErrNotExist)
  816. _, err = client.Stat(path.Join(deniedDir, filepath.Base(testFile1)))
  817. assert.ErrorIs(t, err, os.ErrNotExist)
  818. err = client.RemoveDirectory(path.Join(deniedDir, dirName))
  819. assert.ErrorIs(t, err, os.ErrNotExist)
  820. err = client.Rename(path.Join(deniedDir, dirName), path.Join(deniedDir, "newname"))
  821. assert.ErrorIs(t, err, os.ErrPermission)
  822. err = client.Mkdir(path.Join(deniedDir, "beta1"))
  823. assert.ErrorIs(t, err, os.ErrPermission)
  824. err = writeSFTPFile(path.Join(deniedDir, "afile.txt"), 1024, client)
  825. assert.ErrorIs(t, err, os.ErrPermission)
  826. err = writeSFTPFile(path.Join(deniedDir, dirName, subDirName, "afile.jpg"), 1024, client)
  827. assert.ErrorIs(t, err, os.ErrPermission)
  828. _, err = client.Open(path.Join(deniedDir, dirName, subDirName, filepath.Base(testHiddenFile)))
  829. assert.ErrorIs(t, err, os.ErrNotExist)
  830. err = client.Symlink(path.Join(deniedDir, dirName), dirName)
  831. assert.ErrorIs(t, err, os.ErrNotExist)
  832. err = writeSFTPFile(path.Join(deniedDir, testFileName), 1024, client)
  833. assert.NoError(t, err)
  834. err = client.Symlink(path.Join(deniedDir, testFileName), path.Join(deniedDir, "symlink.txt"))
  835. assert.ErrorIs(t, err, os.ErrPermission)
  836. files, err = client.ReadDir(deniedDir)
  837. assert.NoError(t, err)
  838. assert.Len(t, files, 1)
  839. }
  840. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  841. assert.NoError(t, err)
  842. u.Filters.FilePatterns = []sdk.PatternsFilter{
  843. {
  844. Path: deniedDir,
  845. DeniedPatterns: []string{"*.txt", "beta*"},
  846. DenyPolicy: sdk.DenyPolicyDefault,
  847. },
  848. }
  849. user, _, err = httpdtest.AddUser(u, http.StatusCreated)
  850. assert.NoError(t, err)
  851. conn, client, err = getSftpClient(user)
  852. if assert.NoError(t, err) {
  853. defer conn.Close()
  854. defer client.Close()
  855. files, err := client.ReadDir(deniedDir)
  856. assert.NoError(t, err)
  857. assert.Len(t, files, 4)
  858. _, err = client.Stat(path.Join(deniedDir, filepath.Base(testFile)))
  859. assert.NoError(t, err)
  860. err = client.Chtimes(path.Join(deniedDir, filepath.Base(testFile)), time.Now(), time.Now())
  861. assert.ErrorIs(t, err, os.ErrPermission)
  862. err = client.Mkdir(path.Join(deniedDir, "beta2"))
  863. assert.ErrorIs(t, err, os.ErrPermission)
  864. err = writeSFTPFile(path.Join(deniedDir, "afile2.txt"), 1024, client)
  865. assert.ErrorIs(t, err, os.ErrPermission)
  866. err = client.Symlink(path.Join(deniedDir, testFileName), path.Join(deniedDir, "link.txt"))
  867. assert.ErrorIs(t, err, os.ErrPermission)
  868. err = writeSFTPFile(path.Join(deniedDir, dirName, subDirName, "afile.jpg"), 1024, client)
  869. assert.NoError(t, err)
  870. f, err := client.Open(path.Join(deniedDir, dirName, subDirName, filepath.Base(testHiddenFile)))
  871. assert.NoError(t, err)
  872. err = f.Close()
  873. assert.NoError(t, err)
  874. }
  875. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  876. assert.NoError(t, err)
  877. err = os.RemoveAll(user.GetHomeDir())
  878. assert.NoError(t, err)
  879. }
  880. func TestHiddenRoot(t *testing.T) {
  881. // only the "/ftp" directory is allowed and visibile in the "/" path
  882. // within /ftp any file/directory is allowed and visibile
  883. u := getTestUser()
  884. u.Filters.FilePatterns = []sdk.PatternsFilter{
  885. {
  886. Path: "/",
  887. AllowedPatterns: []string{"ftp"},
  888. DenyPolicy: sdk.DenyPolicyHide,
  889. },
  890. {
  891. Path: "/ftp",
  892. AllowedPatterns: []string{"*"},
  893. },
  894. }
  895. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  896. assert.NoError(t, err)
  897. for i := 0; i < 10; i++ {
  898. err = os.MkdirAll(filepath.Join(user.HomeDir, fmt.Sprintf("ftp%d", i)), os.ModePerm)
  899. assert.NoError(t, err)
  900. }
  901. err = os.WriteFile(filepath.Join(user.HomeDir, testFileName), []byte(""), 0666)
  902. assert.NoError(t, err)
  903. err = os.WriteFile(filepath.Join(user.HomeDir, "ftp.txt"), []byte(""), 0666)
  904. assert.NoError(t, err)
  905. conn, client, err := getSftpClient(user)
  906. if assert.NoError(t, err) {
  907. defer conn.Close()
  908. defer client.Close()
  909. err = client.Mkdir("ftp")
  910. assert.NoError(t, err)
  911. entries, err := client.ReadDir("/")
  912. assert.NoError(t, err)
  913. if assert.Len(t, entries, 1) {
  914. assert.Equal(t, "ftp", entries[0].Name())
  915. }
  916. _, err = client.Stat(".")
  917. assert.NoError(t, err)
  918. for _, name := range []string{testFileName, "ftp.txt"} {
  919. _, err = client.Stat(name)
  920. assert.ErrorIs(t, err, os.ErrNotExist)
  921. }
  922. for i := 0; i < 10; i++ {
  923. _, err = client.Stat(fmt.Sprintf("ftp%d", i))
  924. assert.ErrorIs(t, err, os.ErrNotExist)
  925. }
  926. err = writeSFTPFile(testFileName, 4096, client)
  927. assert.ErrorIs(t, err, os.ErrPermission)
  928. err = writeSFTPFile("ftp123", 4096, client)
  929. assert.ErrorIs(t, err, os.ErrPermission)
  930. err = client.Rename(testFileName, testFileName+"_rename")
  931. assert.ErrorIs(t, err, os.ErrPermission)
  932. err = writeSFTPFile(path.Join("/ftp", testFileName), 4096, client)
  933. assert.NoError(t, err)
  934. err = client.Mkdir("/ftp/dir")
  935. assert.NoError(t, err)
  936. err = client.Rename(path.Join("/ftp", testFileName), path.Join("/ftp/dir", testFileName))
  937. assert.NoError(t, err)
  938. }
  939. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  940. assert.NoError(t, err)
  941. err = os.RemoveAll(user.GetHomeDir())
  942. assert.NoError(t, err)
  943. }
  944. func TestFileNotAllowedErrors(t *testing.T) {
  945. deniedDir := "/denied"
  946. u := getTestUser()
  947. u.Filters.FilePatterns = []sdk.PatternsFilter{
  948. {
  949. Path: deniedDir,
  950. DeniedPatterns: []string{"*.txt"},
  951. },
  952. }
  953. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  954. assert.NoError(t, err)
  955. conn, client, err := getSftpClient(user)
  956. if assert.NoError(t, err) {
  957. defer conn.Close()
  958. defer client.Close()
  959. testFile := filepath.Join(u.GetHomeDir(), deniedDir, "file.txt")
  960. err = os.MkdirAll(filepath.Join(u.GetHomeDir(), deniedDir), os.ModePerm)
  961. assert.NoError(t, err)
  962. err = os.WriteFile(testFile, testFileContent, os.ModePerm)
  963. assert.NoError(t, err)
  964. err = client.Remove(path.Join(deniedDir, "file.txt"))
  965. assert.ErrorIs(t, err, os.ErrPermission)
  966. err = client.Rename(path.Join(deniedDir, "file.txt"), path.Join(deniedDir, "file1.txt"))
  967. assert.ErrorIs(t, err, os.ErrPermission)
  968. }
  969. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  970. assert.NoError(t, err)
  971. err = os.RemoveAll(user.GetHomeDir())
  972. assert.NoError(t, err)
  973. }
  974. func TestRootDirVirtualFolder(t *testing.T) {
  975. u := getTestUser()
  976. u.QuotaFiles = 1000
  977. u.UploadDataTransfer = 1000
  978. u.DownloadDataTransfer = 5000
  979. mappedPath1 := filepath.Join(os.TempDir(), "mapped1")
  980. folderName1 := filepath.Base(mappedPath1)
  981. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  982. BaseVirtualFolder: vfs.BaseVirtualFolder{
  983. Name: folderName1,
  984. MappedPath: mappedPath1,
  985. FsConfig: vfs.Filesystem{
  986. Provider: sdk.CryptedFilesystemProvider,
  987. CryptConfig: vfs.CryptFsConfig{
  988. Passphrase: kms.NewPlainSecret("cryptsecret"),
  989. },
  990. },
  991. },
  992. VirtualPath: "/",
  993. QuotaFiles: 1000,
  994. })
  995. mappedPath2 := filepath.Join(os.TempDir(), "mapped2")
  996. folderName2 := filepath.Base(mappedPath2)
  997. vdirPath2 := "/vmapped"
  998. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  999. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1000. Name: folderName2,
  1001. MappedPath: mappedPath2,
  1002. },
  1003. VirtualPath: vdirPath2,
  1004. QuotaFiles: -1,
  1005. QuotaSize: -1,
  1006. })
  1007. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1008. assert.NoError(t, err)
  1009. f, err := user.GetVirtualFolderForPath("/")
  1010. assert.NoError(t, err)
  1011. assert.Equal(t, "/", f.VirtualPath)
  1012. conn, client, err := getSftpClient(user)
  1013. if assert.NoError(t, err) {
  1014. defer conn.Close()
  1015. defer client.Close()
  1016. err = checkBasicSFTP(client)
  1017. assert.NoError(t, err)
  1018. f, err := client.Create(testFileName)
  1019. if assert.NoError(t, err) {
  1020. _, err = f.Write(testFileContent)
  1021. assert.NoError(t, err)
  1022. err = f.Close()
  1023. assert.NoError(t, err)
  1024. }
  1025. assert.NoFileExists(t, filepath.Join(user.HomeDir, testFileName))
  1026. assert.FileExists(t, filepath.Join(mappedPath1, testFileName))
  1027. entries, err := client.ReadDir(".")
  1028. if assert.NoError(t, err) {
  1029. assert.Len(t, entries, 2)
  1030. }
  1031. user, _, err := httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1032. assert.NoError(t, err)
  1033. assert.Equal(t, 0, user.UsedQuotaFiles)
  1034. folder, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1035. assert.NoError(t, err)
  1036. assert.Equal(t, 1, folder.UsedQuotaFiles)
  1037. f, err = client.Create(path.Join(vdirPath2, testFileName))
  1038. if assert.NoError(t, err) {
  1039. _, err = f.Write(testFileContent)
  1040. assert.NoError(t, err)
  1041. err = f.Close()
  1042. assert.NoError(t, err)
  1043. }
  1044. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1045. assert.NoError(t, err)
  1046. assert.Equal(t, 1, user.UsedQuotaFiles)
  1047. folder, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1048. assert.NoError(t, err)
  1049. assert.Equal(t, 1, folder.UsedQuotaFiles)
  1050. err = client.Rename(testFileName, path.Join(vdirPath2, testFileName+"_rename"))
  1051. assert.Error(t, err)
  1052. err = client.Rename(path.Join(vdirPath2, testFileName), testFileName+"_rename")
  1053. assert.Error(t, err)
  1054. err = client.Rename(testFileName, testFileName+"_rename")
  1055. assert.NoError(t, err)
  1056. err = client.Rename(path.Join(vdirPath2, testFileName), path.Join(vdirPath2, testFileName+"_rename"))
  1057. assert.NoError(t, err)
  1058. }
  1059. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1060. assert.NoError(t, err)
  1061. err = os.RemoveAll(user.GetHomeDir())
  1062. assert.NoError(t, err)
  1063. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1064. assert.NoError(t, err)
  1065. err = os.RemoveAll(mappedPath1)
  1066. assert.NoError(t, err)
  1067. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1068. assert.NoError(t, err)
  1069. err = os.RemoveAll(mappedPath2)
  1070. assert.NoError(t, err)
  1071. }
  1072. func TestTruncateQuotaLimits(t *testing.T) {
  1073. u := getTestUser()
  1074. u.QuotaSize = 20
  1075. u.UploadDataTransfer = 1000
  1076. u.DownloadDataTransfer = 5000
  1077. mappedPath1 := filepath.Join(os.TempDir(), "mapped1")
  1078. folderName1 := filepath.Base(mappedPath1)
  1079. vdirPath1 := "/vmapped1"
  1080. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1081. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1082. Name: folderName1,
  1083. MappedPath: mappedPath1,
  1084. },
  1085. VirtualPath: vdirPath1,
  1086. QuotaFiles: 10,
  1087. })
  1088. mappedPath2 := filepath.Join(os.TempDir(), "mapped2")
  1089. folderName2 := filepath.Base(mappedPath2)
  1090. vdirPath2 := "/vmapped2"
  1091. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1092. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1093. Name: folderName2,
  1094. MappedPath: mappedPath2,
  1095. },
  1096. VirtualPath: vdirPath2,
  1097. QuotaFiles: -1,
  1098. QuotaSize: -1,
  1099. })
  1100. localUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1101. assert.NoError(t, err)
  1102. u = getTestSFTPUser()
  1103. u.QuotaSize = 20
  1104. sftpUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1105. assert.NoError(t, err)
  1106. for _, user := range []dataprovider.User{localUser, sftpUser} {
  1107. conn, client, err := getSftpClient(user)
  1108. if assert.NoError(t, err) {
  1109. defer conn.Close()
  1110. defer client.Close()
  1111. f, err := client.OpenFile(testFileName, os.O_WRONLY|os.O_CREATE)
  1112. if assert.NoError(t, err) {
  1113. n, err := f.Write(testFileContent)
  1114. assert.NoError(t, err)
  1115. assert.Equal(t, len(testFileContent), n)
  1116. err = f.Truncate(2)
  1117. assert.NoError(t, err)
  1118. expectedQuotaFiles := 0
  1119. expectedQuotaSize := int64(2)
  1120. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1121. assert.NoError(t, err)
  1122. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  1123. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  1124. _, err = f.Seek(expectedQuotaSize, io.SeekStart)
  1125. assert.NoError(t, err)
  1126. n, err = f.Write(testFileContent)
  1127. assert.NoError(t, err)
  1128. assert.Equal(t, len(testFileContent), n)
  1129. err = f.Truncate(5)
  1130. assert.NoError(t, err)
  1131. expectedQuotaSize = int64(5)
  1132. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1133. assert.NoError(t, err)
  1134. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  1135. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  1136. _, err = f.Seek(expectedQuotaSize, io.SeekStart)
  1137. assert.NoError(t, err)
  1138. n, err = f.Write(testFileContent)
  1139. assert.NoError(t, err)
  1140. assert.Equal(t, len(testFileContent), n)
  1141. err = f.Close()
  1142. assert.NoError(t, err)
  1143. expectedQuotaFiles = 1
  1144. expectedQuotaSize = int64(5) + int64(len(testFileContent))
  1145. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1146. assert.NoError(t, err)
  1147. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  1148. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  1149. }
  1150. // now truncate by path
  1151. err = client.Truncate(testFileName, 5)
  1152. assert.NoError(t, err)
  1153. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1154. assert.NoError(t, err)
  1155. assert.Equal(t, 1, user.UsedQuotaFiles)
  1156. assert.Equal(t, int64(5), user.UsedQuotaSize)
  1157. // now open an existing file without truncate it, quota should not change
  1158. f, err = client.OpenFile(testFileName, os.O_WRONLY)
  1159. if assert.NoError(t, err) {
  1160. err = f.Close()
  1161. assert.NoError(t, err)
  1162. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1163. assert.NoError(t, err)
  1164. assert.Equal(t, 1, user.UsedQuotaFiles)
  1165. assert.Equal(t, int64(5), user.UsedQuotaSize)
  1166. }
  1167. // open the file truncating it
  1168. f, err = client.OpenFile(testFileName, os.O_WRONLY|os.O_TRUNC)
  1169. if assert.NoError(t, err) {
  1170. err = f.Close()
  1171. assert.NoError(t, err)
  1172. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1173. assert.NoError(t, err)
  1174. assert.Equal(t, 1, user.UsedQuotaFiles)
  1175. assert.Equal(t, int64(0), user.UsedQuotaSize)
  1176. }
  1177. // now test max write size
  1178. f, err = client.OpenFile(testFileName, os.O_WRONLY)
  1179. if assert.NoError(t, err) {
  1180. n, err := f.Write(testFileContent)
  1181. assert.NoError(t, err)
  1182. assert.Equal(t, len(testFileContent), n)
  1183. err = f.Truncate(11)
  1184. assert.NoError(t, err)
  1185. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1186. assert.NoError(t, err)
  1187. assert.Equal(t, 1, user.UsedQuotaFiles)
  1188. assert.Equal(t, int64(11), user.UsedQuotaSize)
  1189. _, err = f.Seek(int64(11), io.SeekStart)
  1190. assert.NoError(t, err)
  1191. n, err = f.Write(testFileContent)
  1192. assert.NoError(t, err)
  1193. assert.Equal(t, len(testFileContent), n)
  1194. err = f.Truncate(5)
  1195. assert.NoError(t, err)
  1196. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1197. assert.NoError(t, err)
  1198. assert.Equal(t, 1, user.UsedQuotaFiles)
  1199. assert.Equal(t, int64(5), user.UsedQuotaSize)
  1200. _, err = f.Seek(int64(5), io.SeekStart)
  1201. assert.NoError(t, err)
  1202. n, err = f.Write(testFileContent)
  1203. assert.NoError(t, err)
  1204. assert.Equal(t, len(testFileContent), n)
  1205. err = f.Truncate(12)
  1206. assert.NoError(t, err)
  1207. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1208. assert.NoError(t, err)
  1209. assert.Equal(t, 1, user.UsedQuotaFiles)
  1210. assert.Equal(t, int64(12), user.UsedQuotaSize)
  1211. _, err = f.Seek(int64(12), io.SeekStart)
  1212. assert.NoError(t, err)
  1213. _, err = f.Write(testFileContent)
  1214. if assert.Error(t, err) {
  1215. assert.Contains(t, err.Error(), common.ErrQuotaExceeded.Error())
  1216. }
  1217. err = f.Close()
  1218. assert.Error(t, err)
  1219. // the file is deleted
  1220. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1221. assert.NoError(t, err)
  1222. assert.Equal(t, 0, user.UsedQuotaFiles)
  1223. assert.Equal(t, int64(0), user.UsedQuotaSize)
  1224. }
  1225. if user.Username == defaultUsername {
  1226. // basic test inside a virtual folder
  1227. vfileName1 := path.Join(vdirPath1, testFileName)
  1228. f, err = client.OpenFile(vfileName1, os.O_WRONLY|os.O_CREATE)
  1229. if assert.NoError(t, err) {
  1230. n, err := f.Write(testFileContent)
  1231. assert.NoError(t, err)
  1232. assert.Equal(t, len(testFileContent), n)
  1233. err = f.Truncate(2)
  1234. assert.NoError(t, err)
  1235. expectedQuotaFiles := 0
  1236. expectedQuotaSize := int64(2)
  1237. fold, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1238. assert.NoError(t, err)
  1239. assert.Equal(t, expectedQuotaSize, fold.UsedQuotaSize)
  1240. assert.Equal(t, expectedQuotaFiles, fold.UsedQuotaFiles)
  1241. err = f.Close()
  1242. assert.NoError(t, err)
  1243. expectedQuotaFiles = 1
  1244. fold, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1245. assert.NoError(t, err)
  1246. assert.Equal(t, expectedQuotaSize, fold.UsedQuotaSize)
  1247. assert.Equal(t, expectedQuotaFiles, fold.UsedQuotaFiles)
  1248. }
  1249. err = client.Truncate(vfileName1, 1)
  1250. assert.NoError(t, err)
  1251. fold, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1252. assert.NoError(t, err)
  1253. assert.Equal(t, int64(1), fold.UsedQuotaSize)
  1254. assert.Equal(t, 1, fold.UsedQuotaFiles)
  1255. // now test on vdirPath2, the folder quota is included in the user's quota
  1256. vfileName2 := path.Join(vdirPath2, testFileName)
  1257. f, err = client.OpenFile(vfileName2, os.O_WRONLY|os.O_CREATE)
  1258. if assert.NoError(t, err) {
  1259. n, err := f.Write(testFileContent)
  1260. assert.NoError(t, err)
  1261. assert.Equal(t, len(testFileContent), n)
  1262. err = f.Truncate(3)
  1263. assert.NoError(t, err)
  1264. expectedQuotaFiles := 0
  1265. expectedQuotaSize := int64(3)
  1266. fold, _, err := httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1267. assert.NoError(t, err)
  1268. assert.Equal(t, expectedQuotaSize, fold.UsedQuotaSize)
  1269. assert.Equal(t, expectedQuotaFiles, fold.UsedQuotaFiles)
  1270. err = f.Close()
  1271. assert.NoError(t, err)
  1272. expectedQuotaFiles = 1
  1273. fold, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1274. assert.NoError(t, err)
  1275. assert.Equal(t, expectedQuotaSize, fold.UsedQuotaSize)
  1276. assert.Equal(t, expectedQuotaFiles, fold.UsedQuotaFiles)
  1277. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1278. assert.NoError(t, err)
  1279. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  1280. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  1281. }
  1282. // cleanup
  1283. err = os.RemoveAll(user.GetHomeDir())
  1284. assert.NoError(t, err)
  1285. if user.Username == defaultUsername {
  1286. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1287. assert.NoError(t, err)
  1288. user.Password = defaultPassword
  1289. user.QuotaSize = 0
  1290. user.ID = 0
  1291. user.CreatedAt = 0
  1292. _, resp, err := httpdtest.AddUser(user, http.StatusCreated)
  1293. assert.NoError(t, err, string(resp))
  1294. }
  1295. }
  1296. }
  1297. }
  1298. _, err = httpdtest.RemoveUser(sftpUser, http.StatusOK)
  1299. assert.NoError(t, err)
  1300. _, err = httpdtest.RemoveUser(localUser, http.StatusOK)
  1301. assert.NoError(t, err)
  1302. err = os.RemoveAll(localUser.GetHomeDir())
  1303. assert.NoError(t, err)
  1304. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1305. assert.NoError(t, err)
  1306. err = os.RemoveAll(mappedPath1)
  1307. assert.NoError(t, err)
  1308. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1309. assert.NoError(t, err)
  1310. err = os.RemoveAll(mappedPath2)
  1311. assert.NoError(t, err)
  1312. }
  1313. func TestVirtualFoldersQuotaRenameOverwrite(t *testing.T) {
  1314. testFileSize := int64(131072)
  1315. testFileSize1 := int64(65537)
  1316. testFileName1 := "test_file1.dat" //nolint:goconst
  1317. u := getTestUser()
  1318. u.QuotaFiles = 0
  1319. u.QuotaSize = 0
  1320. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  1321. folderName1 := filepath.Base(mappedPath1)
  1322. vdirPath1 := "/vdir1" //nolint:goconst
  1323. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  1324. folderName2 := filepath.Base(mappedPath2)
  1325. vdirPath2 := "/vdir2" //nolint:goconst
  1326. mappedPath3 := filepath.Join(os.TempDir(), "vdir3")
  1327. folderName3 := filepath.Base(mappedPath3)
  1328. vdirPath3 := "/vdir3"
  1329. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1330. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1331. Name: folderName1,
  1332. MappedPath: mappedPath1,
  1333. },
  1334. VirtualPath: vdirPath1,
  1335. QuotaFiles: 2,
  1336. QuotaSize: 0,
  1337. })
  1338. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1339. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1340. MappedPath: mappedPath2,
  1341. Name: folderName2,
  1342. },
  1343. VirtualPath: vdirPath2,
  1344. QuotaFiles: 0,
  1345. QuotaSize: testFileSize + testFileSize1 + 1,
  1346. })
  1347. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1348. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1349. Name: folderName3,
  1350. MappedPath: mappedPath3,
  1351. },
  1352. VirtualPath: vdirPath3,
  1353. QuotaFiles: 2,
  1354. QuotaSize: testFileSize * 2,
  1355. })
  1356. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1357. assert.NoError(t, err)
  1358. conn, client, err := getSftpClient(user)
  1359. if assert.NoError(t, err) {
  1360. defer conn.Close()
  1361. defer client.Close()
  1362. err = writeSFTPFile(path.Join(vdirPath1, testFileName), testFileSize, client)
  1363. assert.NoError(t, err)
  1364. f, err := client.Open(path.Join(vdirPath1, testFileName))
  1365. assert.NoError(t, err)
  1366. contents, err := io.ReadAll(f)
  1367. assert.NoError(t, err)
  1368. err = f.Close()
  1369. assert.NoError(t, err)
  1370. assert.Len(t, contents, int(testFileSize))
  1371. err = writeSFTPFile(path.Join(vdirPath2, testFileName), testFileSize, client)
  1372. assert.NoError(t, err)
  1373. err = writeSFTPFile(path.Join(vdirPath1, testFileName1), testFileSize1, client)
  1374. assert.NoError(t, err)
  1375. err = writeSFTPFile(path.Join(vdirPath2, testFileName1), testFileSize1, client)
  1376. assert.NoError(t, err)
  1377. err = writeSFTPFile(testFileName, testFileSize, client)
  1378. assert.NoError(t, err)
  1379. err = writeSFTPFile(testFileName1, testFileSize1, client)
  1380. assert.NoError(t, err)
  1381. err = writeSFTPFile(path.Join(vdirPath3, testFileName), testFileSize, client)
  1382. assert.NoError(t, err)
  1383. err = writeSFTPFile(path.Join(vdirPath3, testFileName+"1"), testFileSize, client)
  1384. assert.NoError(t, err)
  1385. err = client.Rename(testFileName, path.Join(vdirPath1, testFileName+".rename"))
  1386. assert.Error(t, err)
  1387. // we overwrite an existing file and we have unlimited size
  1388. err = client.Rename(testFileName, path.Join(vdirPath1, testFileName))
  1389. assert.NoError(t, err)
  1390. // we have no space and we try to overwrite a bigger file with a smaller one, this should succeed
  1391. err = client.Rename(testFileName1, path.Join(vdirPath2, testFileName))
  1392. assert.NoError(t, err)
  1393. err = writeSFTPFile(path.Join(vdirPath2, testFileName), testFileSize, client)
  1394. assert.NoError(t, err)
  1395. err = writeSFTPFile(testFileName, testFileSize, client)
  1396. assert.NoError(t, err)
  1397. // we have no space and we try to overwrite a smaller file with a bigger one, this should fail
  1398. err = client.Rename(testFileName, path.Join(vdirPath2, testFileName1))
  1399. assert.Error(t, err)
  1400. fi, err := client.Stat(path.Join(vdirPath1, testFileName1))
  1401. if assert.NoError(t, err) {
  1402. assert.Equal(t, testFileSize1, fi.Size())
  1403. }
  1404. // we are overquota inside vdir3 size 2/2 and size 262144/262144
  1405. err = client.Rename(path.Join(vdirPath1, testFileName1), path.Join(vdirPath3, testFileName1+".rename"))
  1406. assert.Error(t, err)
  1407. // we overwrite an existing file and we have enough size
  1408. err = client.Rename(path.Join(vdirPath1, testFileName1), path.Join(vdirPath3, testFileName))
  1409. assert.NoError(t, err)
  1410. testFileName2 := "test_file2.dat"
  1411. err = writeSFTPFile(testFileName2, testFileSize+testFileSize1, client)
  1412. assert.NoError(t, err)
  1413. // we overwrite an existing file and we haven't enough size
  1414. err = client.Rename(testFileName2, path.Join(vdirPath3, testFileName))
  1415. assert.Error(t, err)
  1416. // now remove a file from vdir3, create a dir with 2 files and try to rename it in vdir3
  1417. // this will fail since the rename will result in 3 files inside vdir3 and quota limits only
  1418. // allow 2 total files there
  1419. err = client.Remove(path.Join(vdirPath3, testFileName+"1"))
  1420. assert.NoError(t, err)
  1421. aDir := "a dir"
  1422. err = client.Mkdir(aDir)
  1423. assert.NoError(t, err)
  1424. err = writeSFTPFile(path.Join(aDir, testFileName1), testFileSize1, client)
  1425. assert.NoError(t, err)
  1426. err = writeSFTPFile(path.Join(aDir, testFileName1+"1"), testFileSize1, client)
  1427. assert.NoError(t, err)
  1428. err = client.Rename(aDir, path.Join(vdirPath3, aDir))
  1429. assert.Error(t, err)
  1430. }
  1431. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1432. assert.NoError(t, err)
  1433. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1434. assert.NoError(t, err)
  1435. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1436. assert.NoError(t, err)
  1437. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName3}, http.StatusOK)
  1438. assert.NoError(t, err)
  1439. err = os.RemoveAll(user.GetHomeDir())
  1440. assert.NoError(t, err)
  1441. err = os.RemoveAll(mappedPath1)
  1442. assert.NoError(t, err)
  1443. err = os.RemoveAll(mappedPath2)
  1444. assert.NoError(t, err)
  1445. err = os.RemoveAll(mappedPath3)
  1446. assert.NoError(t, err)
  1447. }
  1448. func TestQuotaRenameOverwrite(t *testing.T) {
  1449. u := getTestUser()
  1450. u.QuotaFiles = 100
  1451. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1452. assert.NoError(t, err)
  1453. conn, client, err := getSftpClient(user)
  1454. if assert.NoError(t, err) {
  1455. defer conn.Close()
  1456. defer client.Close()
  1457. testFileSize := int64(131072)
  1458. testFileSize1 := int64(65537)
  1459. testFileName1 := "test_file1.dat"
  1460. err = writeSFTPFile(testFileName, testFileSize, client)
  1461. assert.NoError(t, err)
  1462. f, err := client.Open(testFileName)
  1463. assert.NoError(t, err)
  1464. contents := make([]byte, testFileSize)
  1465. n, err := io.ReadFull(f, contents)
  1466. assert.NoError(t, err)
  1467. assert.Equal(t, int(testFileSize), n)
  1468. err = f.Close()
  1469. assert.NoError(t, err)
  1470. err = writeSFTPFile(testFileName1, testFileSize1, client)
  1471. assert.NoError(t, err)
  1472. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1473. assert.NoError(t, err)
  1474. assert.Equal(t, int64(0), user.UsedDownloadDataTransfer)
  1475. assert.Equal(t, int64(0), user.UsedUploadDataTransfer)
  1476. assert.Equal(t, 2, user.UsedQuotaFiles)
  1477. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  1478. err = client.Rename(testFileName, testFileName1)
  1479. assert.NoError(t, err)
  1480. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1481. assert.NoError(t, err)
  1482. assert.Equal(t, int64(0), user.UsedDownloadDataTransfer)
  1483. assert.Equal(t, int64(0), user.UsedUploadDataTransfer)
  1484. assert.Equal(t, 1, user.UsedQuotaFiles)
  1485. assert.Equal(t, testFileSize, user.UsedQuotaSize)
  1486. err = client.Remove(testFileName1)
  1487. assert.NoError(t, err)
  1488. err = writeSFTPFile(testFileName, testFileSize, client)
  1489. assert.NoError(t, err)
  1490. err = writeSFTPFile(testFileName1, testFileSize1, client)
  1491. assert.NoError(t, err)
  1492. err = client.Rename(testFileName1, testFileName)
  1493. assert.NoError(t, err)
  1494. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1495. assert.NoError(t, err)
  1496. assert.Equal(t, 1, user.UsedQuotaFiles)
  1497. assert.Equal(t, testFileSize1, user.UsedQuotaSize)
  1498. }
  1499. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1500. assert.NoError(t, err)
  1501. err = os.RemoveAll(user.GetHomeDir())
  1502. assert.NoError(t, err)
  1503. }
  1504. func TestVirtualFoldersQuotaValues(t *testing.T) {
  1505. u := getTestUser()
  1506. u.QuotaFiles = 100
  1507. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  1508. vdirPath1 := "/vdir1"
  1509. folderName1 := filepath.Base(mappedPath1)
  1510. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  1511. vdirPath2 := "/vdir2"
  1512. folderName2 := filepath.Base(mappedPath2)
  1513. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1514. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1515. Name: folderName1,
  1516. MappedPath: mappedPath1,
  1517. },
  1518. VirtualPath: vdirPath1,
  1519. // quota is included in the user's one
  1520. QuotaFiles: -1,
  1521. QuotaSize: -1,
  1522. })
  1523. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1524. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1525. Name: folderName2,
  1526. MappedPath: mappedPath2,
  1527. },
  1528. VirtualPath: vdirPath2,
  1529. // quota is unlimited and excluded from user's one
  1530. QuotaFiles: 0,
  1531. QuotaSize: 0,
  1532. })
  1533. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1534. assert.NoError(t, err)
  1535. conn, client, err := getSftpClient(user)
  1536. if assert.NoError(t, err) {
  1537. defer conn.Close()
  1538. defer client.Close()
  1539. testFileSize := int64(131072)
  1540. err = writeSFTPFile(testFileName, testFileSize, client)
  1541. assert.NoError(t, err)
  1542. // we copy the same file two times to test quota update on file overwrite
  1543. err = writeSFTPFile(path.Join(vdirPath1, testFileName), testFileSize, client)
  1544. assert.NoError(t, err)
  1545. err = writeSFTPFile(path.Join(vdirPath1, testFileName), testFileSize, client)
  1546. assert.NoError(t, err)
  1547. err = writeSFTPFile(path.Join(vdirPath2, testFileName), testFileSize, client)
  1548. assert.NoError(t, err)
  1549. err = writeSFTPFile(path.Join(vdirPath2, testFileName), testFileSize, client)
  1550. assert.NoError(t, err)
  1551. expectedQuotaFiles := 2
  1552. expectedQuotaSize := testFileSize * 2
  1553. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1554. assert.NoError(t, err)
  1555. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  1556. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  1557. f, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1558. assert.NoError(t, err)
  1559. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  1560. assert.Equal(t, 1, f.UsedQuotaFiles)
  1561. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1562. assert.NoError(t, err)
  1563. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  1564. assert.Equal(t, 1, f.UsedQuotaFiles)
  1565. err = client.Remove(path.Join(vdirPath1, testFileName))
  1566. assert.NoError(t, err)
  1567. err = client.Remove(path.Join(vdirPath2, testFileName))
  1568. assert.NoError(t, err)
  1569. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1570. assert.NoError(t, err)
  1571. assert.Equal(t, int64(0), f.UsedQuotaSize)
  1572. assert.Equal(t, 0, f.UsedQuotaFiles)
  1573. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1574. assert.NoError(t, err)
  1575. assert.Equal(t, int64(0), f.UsedQuotaSize)
  1576. assert.Equal(t, 0, f.UsedQuotaFiles)
  1577. }
  1578. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1579. assert.NoError(t, err)
  1580. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1581. assert.NoError(t, err)
  1582. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1583. assert.NoError(t, err)
  1584. err = os.RemoveAll(user.GetHomeDir())
  1585. assert.NoError(t, err)
  1586. err = os.RemoveAll(mappedPath1)
  1587. assert.NoError(t, err)
  1588. err = os.RemoveAll(mappedPath2)
  1589. assert.NoError(t, err)
  1590. }
  1591. func TestQuotaRenameInsideSameVirtualFolder(t *testing.T) {
  1592. u := getTestUser()
  1593. u.QuotaFiles = 100
  1594. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  1595. vdirPath1 := "/vdir1"
  1596. folderName1 := filepath.Base(mappedPath1)
  1597. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  1598. vdirPath2 := "/vdir2"
  1599. folderName2 := filepath.Base(mappedPath2)
  1600. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1601. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1602. Name: folderName1,
  1603. MappedPath: mappedPath1,
  1604. },
  1605. VirtualPath: vdirPath1,
  1606. // quota is included in the user's one
  1607. QuotaFiles: -1,
  1608. QuotaSize: -1,
  1609. })
  1610. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1611. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1612. Name: folderName2,
  1613. MappedPath: mappedPath2,
  1614. },
  1615. VirtualPath: vdirPath2,
  1616. // quota is unlimited and excluded from user's one
  1617. QuotaFiles: 0,
  1618. QuotaSize: 0,
  1619. })
  1620. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1621. assert.NoError(t, err)
  1622. conn, client, err := getSftpClient(user)
  1623. if assert.NoError(t, err) {
  1624. defer conn.Close()
  1625. defer client.Close()
  1626. testFileName1 := "test_file1.dat"
  1627. testFileSize := int64(131072)
  1628. testFileSize1 := int64(65535)
  1629. dir1 := "dir1" //nolint:goconst
  1630. dir2 := "dir2" //nolint:goconst
  1631. assert.NoError(t, err)
  1632. err = client.Mkdir(path.Join(vdirPath1, dir1))
  1633. assert.NoError(t, err)
  1634. err = client.Mkdir(path.Join(vdirPath1, dir2))
  1635. assert.NoError(t, err)
  1636. err = client.Mkdir(path.Join(vdirPath2, dir1))
  1637. assert.NoError(t, err)
  1638. err = client.Mkdir(path.Join(vdirPath2, dir2))
  1639. assert.NoError(t, err)
  1640. err = writeSFTPFile(path.Join(vdirPath1, dir1, testFileName), testFileSize, client)
  1641. assert.NoError(t, err)
  1642. err = writeSFTPFile(path.Join(vdirPath1, dir2, testFileName1), testFileSize1, client)
  1643. assert.NoError(t, err)
  1644. err = writeSFTPFile(path.Join(vdirPath2, dir1, testFileName), testFileSize, client)
  1645. assert.NoError(t, err)
  1646. err = writeSFTPFile(path.Join(vdirPath2, dir2, testFileName1), testFileSize1, client)
  1647. assert.NoError(t, err)
  1648. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1649. assert.NoError(t, err)
  1650. assert.Equal(t, 2, user.UsedQuotaFiles)
  1651. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  1652. f, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1653. assert.NoError(t, err)
  1654. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1655. assert.Equal(t, 2, f.UsedQuotaFiles)
  1656. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1657. assert.NoError(t, err)
  1658. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1659. assert.Equal(t, 2, f.UsedQuotaFiles)
  1660. // initial files:
  1661. // - vdir1/dir1/testFileName
  1662. // - vdir1/dir2/testFileName1
  1663. // - vdir2/dir1/testFileName
  1664. // - vdir2/dir2/testFileName1
  1665. //
  1666. // rename a file inside vdir1 it is included inside user quota, so we have:
  1667. // - vdir1/dir1/testFileName.rename
  1668. // - vdir1/dir2/testFileName1
  1669. // - vdir2/dir1/testFileName
  1670. // - vdir2/dir2/testFileName1
  1671. err = client.Rename(path.Join(vdirPath1, dir1, testFileName), path.Join(vdirPath1, dir1, testFileName+".rename"))
  1672. assert.NoError(t, err)
  1673. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1674. assert.NoError(t, err)
  1675. assert.Equal(t, 2, user.UsedQuotaFiles)
  1676. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  1677. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1678. assert.NoError(t, err)
  1679. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1680. assert.Equal(t, 2, f.UsedQuotaFiles)
  1681. // rename a file inside vdir2, it isn't included inside user quota, so we have:
  1682. // - vdir1/dir1/testFileName.rename
  1683. // - vdir1/dir2/testFileName1
  1684. // - vdir2/dir1/testFileName.rename
  1685. // - vdir2/dir2/testFileName1
  1686. err = client.Rename(path.Join(vdirPath2, dir1, testFileName), path.Join(vdirPath2, dir1, testFileName+".rename"))
  1687. assert.NoError(t, err)
  1688. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1689. assert.NoError(t, err)
  1690. assert.Equal(t, 2, user.UsedQuotaFiles)
  1691. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  1692. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1693. assert.NoError(t, err)
  1694. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1695. assert.Equal(t, 2, f.UsedQuotaFiles)
  1696. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1697. assert.NoError(t, err)
  1698. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1699. assert.Equal(t, 2, f.UsedQuotaFiles)
  1700. // rename a file inside vdir2 overwriting an existing, we now have:
  1701. // - vdir1/dir1/testFileName.rename
  1702. // - vdir1/dir2/testFileName1
  1703. // - vdir2/dir1/testFileName.rename (initial testFileName1)
  1704. err = client.Rename(path.Join(vdirPath2, dir2, testFileName1), path.Join(vdirPath2, dir1, testFileName+".rename"))
  1705. assert.NoError(t, err)
  1706. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1707. assert.NoError(t, err)
  1708. assert.Equal(t, 2, user.UsedQuotaFiles)
  1709. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  1710. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1711. assert.NoError(t, err)
  1712. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1713. assert.Equal(t, 1, f.UsedQuotaFiles)
  1714. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1715. assert.NoError(t, err)
  1716. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1717. assert.Equal(t, 2, f.UsedQuotaFiles)
  1718. // rename a file inside vdir1 overwriting an existing, we now have:
  1719. // - vdir1/dir1/testFileName.rename (initial testFileName1)
  1720. // - vdir2/dir1/testFileName.rename (initial testFileName1)
  1721. err = client.Rename(path.Join(vdirPath1, dir2, testFileName1), path.Join(vdirPath1, dir1, testFileName+".rename"))
  1722. assert.NoError(t, err)
  1723. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1724. assert.NoError(t, err)
  1725. assert.Equal(t, 1, user.UsedQuotaFiles)
  1726. assert.Equal(t, testFileSize1, user.UsedQuotaSize)
  1727. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1728. assert.NoError(t, err)
  1729. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1730. assert.Equal(t, 1, f.UsedQuotaFiles)
  1731. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1732. assert.NoError(t, err)
  1733. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1734. assert.Equal(t, 1, f.UsedQuotaFiles)
  1735. // rename a directory inside the same virtual folder, quota should not change
  1736. err = client.RemoveDirectory(path.Join(vdirPath1, dir2))
  1737. assert.NoError(t, err)
  1738. err = client.RemoveDirectory(path.Join(vdirPath2, dir2))
  1739. assert.NoError(t, err)
  1740. err = client.Rename(path.Join(vdirPath1, dir1), path.Join(vdirPath1, dir2))
  1741. assert.NoError(t, err)
  1742. err = client.Rename(path.Join(vdirPath2, dir1), path.Join(vdirPath2, dir2))
  1743. assert.NoError(t, err)
  1744. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1745. assert.NoError(t, err)
  1746. assert.Equal(t, 1, user.UsedQuotaFiles)
  1747. assert.Equal(t, testFileSize1, user.UsedQuotaSize)
  1748. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1749. assert.NoError(t, err)
  1750. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1751. assert.Equal(t, 1, f.UsedQuotaFiles)
  1752. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1753. assert.NoError(t, err)
  1754. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1755. assert.Equal(t, 1, f.UsedQuotaFiles)
  1756. }
  1757. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1758. assert.NoError(t, err)
  1759. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1760. assert.NoError(t, err)
  1761. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1762. assert.NoError(t, err)
  1763. err = os.RemoveAll(user.GetHomeDir())
  1764. assert.NoError(t, err)
  1765. err = os.RemoveAll(mappedPath1)
  1766. assert.NoError(t, err)
  1767. err = os.RemoveAll(mappedPath2)
  1768. assert.NoError(t, err)
  1769. }
  1770. func TestQuotaRenameBetweenVirtualFolder(t *testing.T) {
  1771. u := getTestUser()
  1772. u.QuotaFiles = 100
  1773. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  1774. folderName1 := filepath.Base(mappedPath1)
  1775. vdirPath1 := "/vdir1"
  1776. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  1777. folderName2 := filepath.Base(mappedPath2)
  1778. vdirPath2 := "/vdir2"
  1779. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1780. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1781. Name: folderName1,
  1782. MappedPath: mappedPath1,
  1783. },
  1784. VirtualPath: vdirPath1,
  1785. // quota is included in the user's one
  1786. QuotaFiles: -1,
  1787. QuotaSize: -1,
  1788. })
  1789. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1790. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1791. Name: folderName2,
  1792. MappedPath: mappedPath2,
  1793. },
  1794. VirtualPath: vdirPath2,
  1795. // quota is unlimited and excluded from user's one
  1796. QuotaFiles: 0,
  1797. QuotaSize: 0,
  1798. })
  1799. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1800. assert.NoError(t, err)
  1801. conn, client, err := getSftpClient(user)
  1802. if assert.NoError(t, err) {
  1803. defer conn.Close()
  1804. defer client.Close()
  1805. testFileName1 := "test_file1.dat"
  1806. testFileSize := int64(131072)
  1807. testFileSize1 := int64(65535)
  1808. dir1 := "dir1"
  1809. dir2 := "dir2"
  1810. err = client.Mkdir(path.Join(vdirPath1, dir1))
  1811. assert.NoError(t, err)
  1812. err = client.Mkdir(path.Join(vdirPath1, dir2))
  1813. assert.NoError(t, err)
  1814. err = client.Mkdir(path.Join(vdirPath2, dir1))
  1815. assert.NoError(t, err)
  1816. err = client.Mkdir(path.Join(vdirPath2, dir2))
  1817. assert.NoError(t, err)
  1818. err = writeSFTPFile(path.Join(vdirPath1, dir1, testFileName), testFileSize, client)
  1819. assert.NoError(t, err)
  1820. err = writeSFTPFile(path.Join(vdirPath1, dir2, testFileName1), testFileSize1, client)
  1821. assert.NoError(t, err)
  1822. err = writeSFTPFile(path.Join(vdirPath2, dir1, testFileName), testFileSize, client)
  1823. assert.NoError(t, err)
  1824. err = writeSFTPFile(path.Join(vdirPath2, dir2, testFileName1), testFileSize1, client)
  1825. assert.NoError(t, err)
  1826. // initial files:
  1827. // - vdir1/dir1/testFileName
  1828. // - vdir1/dir2/testFileName1
  1829. // - vdir2/dir1/testFileName
  1830. // - vdir2/dir2/testFileName1
  1831. //
  1832. // rename a file from vdir1 to vdir2, vdir1 is included inside user quota, so we have:
  1833. // - vdir1/dir1/testFileName
  1834. // - vdir2/dir1/testFileName
  1835. // - vdir2/dir2/testFileName1
  1836. // - vdir2/dir1/testFileName1.rename
  1837. err = client.Rename(path.Join(vdirPath1, dir2, testFileName1), path.Join(vdirPath2, dir1, testFileName1+".rename"))
  1838. assert.NoError(t, err)
  1839. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1840. assert.NoError(t, err)
  1841. assert.Equal(t, 1, user.UsedQuotaFiles)
  1842. assert.Equal(t, testFileSize, user.UsedQuotaSize)
  1843. f, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1844. assert.NoError(t, err)
  1845. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  1846. assert.Equal(t, 1, f.UsedQuotaFiles)
  1847. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1848. assert.NoError(t, err)
  1849. assert.Equal(t, testFileSize+testFileSize1+testFileSize1, f.UsedQuotaSize)
  1850. assert.Equal(t, 3, f.UsedQuotaFiles)
  1851. // rename a file from vdir2 to vdir1, vdir2 is not included inside user quota, so we have:
  1852. // - vdir1/dir1/testFileName
  1853. // - vdir1/dir2/testFileName.rename
  1854. // - vdir2/dir2/testFileName1
  1855. // - vdir2/dir1/testFileName1.rename
  1856. err = client.Rename(path.Join(vdirPath2, dir1, testFileName), path.Join(vdirPath1, dir2, testFileName+".rename"))
  1857. assert.NoError(t, err)
  1858. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1859. assert.NoError(t, err)
  1860. assert.Equal(t, 2, user.UsedQuotaFiles)
  1861. assert.Equal(t, testFileSize*2, user.UsedQuotaSize)
  1862. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1863. assert.NoError(t, err)
  1864. assert.Equal(t, testFileSize*2, f.UsedQuotaSize)
  1865. assert.Equal(t, 2, f.UsedQuotaFiles)
  1866. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1867. assert.NoError(t, err)
  1868. assert.Equal(t, testFileSize1*2, f.UsedQuotaSize)
  1869. assert.Equal(t, 2, f.UsedQuotaFiles)
  1870. // rename a file from vdir1 to vdir2 overwriting an existing file, vdir1 is included inside user quota, so we have:
  1871. // - vdir1/dir2/testFileName.rename
  1872. // - vdir2/dir2/testFileName1 (is the initial testFileName)
  1873. // - vdir2/dir1/testFileName1.rename
  1874. err = client.Rename(path.Join(vdirPath1, dir1, testFileName), path.Join(vdirPath2, dir2, testFileName1))
  1875. assert.NoError(t, err)
  1876. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1877. assert.NoError(t, err)
  1878. assert.Equal(t, 1, user.UsedQuotaFiles)
  1879. assert.Equal(t, testFileSize, user.UsedQuotaSize)
  1880. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1881. assert.NoError(t, err)
  1882. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  1883. assert.Equal(t, 1, f.UsedQuotaFiles)
  1884. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1885. assert.NoError(t, err)
  1886. assert.Equal(t, testFileSize1+testFileSize, f.UsedQuotaSize)
  1887. assert.Equal(t, 2, f.UsedQuotaFiles)
  1888. // rename a file from vdir2 to vdir1 overwriting an existing file, vdir2 is not included inside user quota, so we have:
  1889. // - vdir1/dir2/testFileName.rename (is the initial testFileName1)
  1890. // - vdir2/dir2/testFileName1 (is the initial testFileName)
  1891. err = client.Rename(path.Join(vdirPath2, dir1, testFileName1+".rename"), path.Join(vdirPath1, dir2, testFileName+".rename"))
  1892. assert.NoError(t, err)
  1893. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1894. assert.NoError(t, err)
  1895. assert.Equal(t, 1, user.UsedQuotaFiles)
  1896. assert.Equal(t, testFileSize1, user.UsedQuotaSize)
  1897. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1898. assert.NoError(t, err)
  1899. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  1900. assert.Equal(t, 1, f.UsedQuotaFiles)
  1901. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1902. assert.NoError(t, err)
  1903. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  1904. assert.Equal(t, 1, f.UsedQuotaFiles)
  1905. err = writeSFTPFile(path.Join(vdirPath1, dir2, testFileName), testFileSize, client)
  1906. assert.NoError(t, err)
  1907. err = writeSFTPFile(path.Join(vdirPath2, dir2, testFileName), testFileSize1, client)
  1908. assert.NoError(t, err)
  1909. err = writeSFTPFile(path.Join(vdirPath2, dir2, testFileName+"1.dupl"), testFileSize1, client)
  1910. assert.NoError(t, err)
  1911. err = client.RemoveDirectory(path.Join(vdirPath1, dir1))
  1912. assert.NoError(t, err)
  1913. err = client.RemoveDirectory(path.Join(vdirPath2, dir1))
  1914. assert.NoError(t, err)
  1915. // - vdir1/dir2/testFileName.rename (initial testFileName1)
  1916. // - vdir1/dir2/testFileName
  1917. // - vdir2/dir2/testFileName1 (initial testFileName)
  1918. // - vdir2/dir2/testFileName (initial testFileName1)
  1919. // - vdir2/dir2/testFileName1.dupl
  1920. // rename directories between the two virtual folders
  1921. err = client.Rename(path.Join(vdirPath2, dir2), path.Join(vdirPath1, dir1))
  1922. assert.NoError(t, err)
  1923. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1924. assert.NoError(t, err)
  1925. assert.Equal(t, 5, user.UsedQuotaFiles)
  1926. assert.Equal(t, testFileSize1*3+testFileSize*2, user.UsedQuotaSize)
  1927. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1928. assert.NoError(t, err)
  1929. assert.Equal(t, testFileSize1*3+testFileSize*2, f.UsedQuotaSize)
  1930. assert.Equal(t, 5, f.UsedQuotaFiles)
  1931. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1932. assert.NoError(t, err)
  1933. assert.Equal(t, int64(0), f.UsedQuotaSize)
  1934. assert.Equal(t, 0, f.UsedQuotaFiles)
  1935. // now move on vpath2
  1936. err = client.Rename(path.Join(vdirPath1, dir2), path.Join(vdirPath2, dir1))
  1937. assert.NoError(t, err)
  1938. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  1939. assert.NoError(t, err)
  1940. assert.Equal(t, 3, user.UsedQuotaFiles)
  1941. assert.Equal(t, testFileSize1*2+testFileSize, user.UsedQuotaSize)
  1942. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  1943. assert.NoError(t, err)
  1944. assert.Equal(t, testFileSize1*2+testFileSize, f.UsedQuotaSize)
  1945. assert.Equal(t, 3, f.UsedQuotaFiles)
  1946. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  1947. assert.NoError(t, err)
  1948. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  1949. assert.Equal(t, 2, f.UsedQuotaFiles)
  1950. }
  1951. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  1952. assert.NoError(t, err)
  1953. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  1954. assert.NoError(t, err)
  1955. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  1956. assert.NoError(t, err)
  1957. err = os.RemoveAll(user.GetHomeDir())
  1958. assert.NoError(t, err)
  1959. err = os.RemoveAll(mappedPath1)
  1960. assert.NoError(t, err)
  1961. err = os.RemoveAll(mappedPath2)
  1962. assert.NoError(t, err)
  1963. }
  1964. func TestQuotaRenameFromVirtualFolder(t *testing.T) {
  1965. u := getTestUser()
  1966. u.QuotaFiles = 100
  1967. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  1968. folderName1 := filepath.Base(mappedPath1)
  1969. vdirPath1 := "/vdir1"
  1970. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  1971. folderName2 := filepath.Base(mappedPath2)
  1972. vdirPath2 := "/vdir2"
  1973. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1974. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1975. Name: folderName1,
  1976. MappedPath: mappedPath1,
  1977. },
  1978. VirtualPath: vdirPath1,
  1979. // quota is included in the user's one
  1980. QuotaFiles: -1,
  1981. QuotaSize: -1,
  1982. })
  1983. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  1984. BaseVirtualFolder: vfs.BaseVirtualFolder{
  1985. Name: folderName2,
  1986. MappedPath: mappedPath2,
  1987. },
  1988. VirtualPath: vdirPath2,
  1989. // quota is unlimited and excluded from user's one
  1990. QuotaFiles: 0,
  1991. QuotaSize: 0,
  1992. })
  1993. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  1994. assert.NoError(t, err)
  1995. conn, client, err := getSftpClient(user)
  1996. if assert.NoError(t, err) {
  1997. defer conn.Close()
  1998. defer client.Close()
  1999. testFileName1 := "test_file1.dat"
  2000. testFileSize := int64(131072)
  2001. testFileSize1 := int64(65535)
  2002. dir1 := "dir1"
  2003. dir2 := "dir2"
  2004. err = client.Mkdir(path.Join(vdirPath1, dir1))
  2005. assert.NoError(t, err)
  2006. err = client.Mkdir(path.Join(vdirPath1, dir2))
  2007. assert.NoError(t, err)
  2008. err = client.Mkdir(path.Join(vdirPath2, dir1))
  2009. assert.NoError(t, err)
  2010. err = client.Mkdir(path.Join(vdirPath2, dir2))
  2011. assert.NoError(t, err)
  2012. err = writeSFTPFile(path.Join(vdirPath1, dir1, testFileName), testFileSize, client)
  2013. assert.NoError(t, err)
  2014. err = writeSFTPFile(path.Join(vdirPath1, dir2, testFileName1), testFileSize1, client)
  2015. assert.NoError(t, err)
  2016. err = writeSFTPFile(path.Join(vdirPath2, dir1, testFileName), testFileSize, client)
  2017. assert.NoError(t, err)
  2018. err = writeSFTPFile(path.Join(vdirPath2, dir2, testFileName1), testFileSize1, client)
  2019. assert.NoError(t, err)
  2020. // initial files:
  2021. // - vdir1/dir1/testFileName
  2022. // - vdir1/dir2/testFileName1
  2023. // - vdir2/dir1/testFileName
  2024. // - vdir2/dir2/testFileName1
  2025. //
  2026. // rename a file from vdir1 to the user home dir, vdir1 is included in user quota so we have:
  2027. // - testFileName
  2028. // - vdir1/dir2/testFileName1
  2029. // - vdir2/dir1/testFileName
  2030. // - vdir2/dir2/testFileName1
  2031. err = client.Rename(path.Join(vdirPath1, dir1, testFileName), path.Join(testFileName))
  2032. assert.NoError(t, err)
  2033. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2034. assert.NoError(t, err)
  2035. assert.Equal(t, 2, user.UsedQuotaFiles)
  2036. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  2037. f, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2038. assert.NoError(t, err)
  2039. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2040. assert.Equal(t, 1, f.UsedQuotaFiles)
  2041. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2042. assert.NoError(t, err)
  2043. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  2044. assert.Equal(t, 2, f.UsedQuotaFiles)
  2045. // rename a file from vdir2 to the user home dir, vdir2 is not included in user quota so we have:
  2046. // - testFileName
  2047. // - testFileName1
  2048. // - vdir1/dir2/testFileName1
  2049. // - vdir2/dir1/testFileName
  2050. err = client.Rename(path.Join(vdirPath2, dir2, testFileName1), path.Join(testFileName1))
  2051. assert.NoError(t, err)
  2052. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2053. assert.NoError(t, err)
  2054. assert.Equal(t, 3, user.UsedQuotaFiles)
  2055. assert.Equal(t, testFileSize+testFileSize1+testFileSize1, user.UsedQuotaSize)
  2056. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2057. assert.NoError(t, err)
  2058. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2059. assert.Equal(t, 1, f.UsedQuotaFiles)
  2060. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2061. assert.NoError(t, err)
  2062. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2063. assert.Equal(t, 1, f.UsedQuotaFiles)
  2064. // rename a file from vdir1 to the user home dir overwriting an existing file, vdir1 is included in user quota so we have:
  2065. // - testFileName (initial testFileName1)
  2066. // - testFileName1
  2067. // - vdir2/dir1/testFileName
  2068. err = client.Rename(path.Join(vdirPath1, dir2, testFileName1), path.Join(testFileName))
  2069. assert.NoError(t, err)
  2070. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2071. assert.NoError(t, err)
  2072. assert.Equal(t, 2, user.UsedQuotaFiles)
  2073. assert.Equal(t, testFileSize1+testFileSize1, user.UsedQuotaSize)
  2074. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2075. assert.NoError(t, err)
  2076. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2077. assert.Equal(t, 0, f.UsedQuotaFiles)
  2078. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2079. assert.NoError(t, err)
  2080. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2081. assert.Equal(t, 1, f.UsedQuotaFiles)
  2082. // rename a file from vdir2 to the user home dir overwriting an existing file, vdir2 is not included in user quota so we have:
  2083. // - testFileName (initial testFileName1)
  2084. // - testFileName1 (initial testFileName)
  2085. err = client.Rename(path.Join(vdirPath2, dir1, testFileName), path.Join(testFileName1))
  2086. assert.NoError(t, err)
  2087. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2088. assert.NoError(t, err)
  2089. assert.Equal(t, 2, user.UsedQuotaFiles)
  2090. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  2091. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2092. assert.NoError(t, err)
  2093. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2094. assert.Equal(t, 0, f.UsedQuotaFiles)
  2095. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2096. assert.NoError(t, err)
  2097. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2098. assert.Equal(t, 0, f.UsedQuotaFiles)
  2099. // dir rename
  2100. err = writeSFTPFile(path.Join(vdirPath1, dir1, testFileName), testFileSize, client)
  2101. assert.NoError(t, err)
  2102. err = writeSFTPFile(path.Join(vdirPath1, dir1, testFileName1), testFileSize1, client)
  2103. assert.NoError(t, err)
  2104. err = writeSFTPFile(path.Join(vdirPath2, dir1, testFileName), testFileSize, client)
  2105. assert.NoError(t, err)
  2106. err = writeSFTPFile(path.Join(vdirPath2, dir1, testFileName1), testFileSize1, client)
  2107. assert.NoError(t, err)
  2108. // - testFileName (initial testFileName1)
  2109. // - testFileName1 (initial testFileName)
  2110. // - vdir1/dir1/testFileName
  2111. // - vdir1/dir1/testFileName1
  2112. // - dir1/testFileName
  2113. // - dir1/testFileName1
  2114. err = client.Rename(path.Join(vdirPath2, dir1), dir1)
  2115. assert.NoError(t, err)
  2116. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2117. assert.NoError(t, err)
  2118. assert.Equal(t, 6, user.UsedQuotaFiles)
  2119. assert.Equal(t, testFileSize*3+testFileSize1*3, user.UsedQuotaSize)
  2120. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2121. assert.NoError(t, err)
  2122. assert.Equal(t, testFileSize+testFileSize1, f.UsedQuotaSize)
  2123. assert.Equal(t, 2, f.UsedQuotaFiles)
  2124. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2125. assert.NoError(t, err)
  2126. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2127. assert.Equal(t, 0, f.UsedQuotaFiles)
  2128. // - testFileName (initial testFileName1)
  2129. // - testFileName1 (initial testFileName)
  2130. // - dir2/testFileName
  2131. // - dir2/testFileName1
  2132. // - dir1/testFileName
  2133. // - dir1/testFileName1
  2134. err = client.Rename(path.Join(vdirPath1, dir1), dir2)
  2135. assert.NoError(t, err)
  2136. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2137. assert.NoError(t, err)
  2138. assert.Equal(t, 6, user.UsedQuotaFiles)
  2139. assert.Equal(t, testFileSize*3+testFileSize1*3, user.UsedQuotaSize)
  2140. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2141. assert.NoError(t, err)
  2142. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2143. assert.Equal(t, 0, f.UsedQuotaFiles)
  2144. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2145. assert.NoError(t, err)
  2146. assert.Equal(t, int64(0), f.UsedQuotaSize)
  2147. assert.Equal(t, 0, f.UsedQuotaFiles)
  2148. }
  2149. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2150. assert.NoError(t, err)
  2151. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  2152. assert.NoError(t, err)
  2153. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  2154. assert.NoError(t, err)
  2155. err = os.RemoveAll(user.GetHomeDir())
  2156. assert.NoError(t, err)
  2157. err = os.RemoveAll(mappedPath1)
  2158. assert.NoError(t, err)
  2159. err = os.RemoveAll(mappedPath2)
  2160. assert.NoError(t, err)
  2161. }
  2162. func TestQuotaRenameToVirtualFolder(t *testing.T) {
  2163. u := getTestUser()
  2164. u.QuotaFiles = 100
  2165. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  2166. folderName1 := filepath.Base(mappedPath1)
  2167. vdirPath1 := "/vdir1"
  2168. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  2169. folderName2 := filepath.Base(mappedPath2)
  2170. vdirPath2 := "/vdir2"
  2171. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2172. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2173. Name: folderName1,
  2174. MappedPath: mappedPath1,
  2175. },
  2176. VirtualPath: vdirPath1,
  2177. // quota is included in the user's one
  2178. QuotaFiles: -1,
  2179. QuotaSize: -1,
  2180. })
  2181. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2182. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2183. Name: folderName2,
  2184. MappedPath: mappedPath2,
  2185. },
  2186. VirtualPath: vdirPath2,
  2187. // quota is unlimited and excluded from user's one
  2188. QuotaFiles: 0,
  2189. QuotaSize: 0,
  2190. })
  2191. u.Permissions[vdirPath1] = []string{dataprovider.PermListItems, dataprovider.PermDownload, dataprovider.PermUpload,
  2192. dataprovider.PermOverwrite, dataprovider.PermDelete, dataprovider.PermCreateSymlinks, dataprovider.PermCreateDirs,
  2193. dataprovider.PermRename}
  2194. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2195. assert.NoError(t, err)
  2196. conn, client, err := getSftpClient(user)
  2197. if assert.NoError(t, err) {
  2198. defer conn.Close()
  2199. defer client.Close()
  2200. testFileName1 := "test_file1.dat"
  2201. testFileSize := int64(131072)
  2202. testFileSize1 := int64(65535)
  2203. dir1 := "dir1"
  2204. dir2 := "dir2"
  2205. err = client.Mkdir(path.Join(vdirPath1, dir1))
  2206. assert.NoError(t, err)
  2207. err = client.Mkdir(path.Join(vdirPath1, dir2))
  2208. assert.NoError(t, err)
  2209. err = client.Mkdir(path.Join(vdirPath2, dir1))
  2210. assert.NoError(t, err)
  2211. err = client.Mkdir(path.Join(vdirPath2, dir2))
  2212. assert.NoError(t, err)
  2213. err = writeSFTPFile(testFileName, testFileSize, client)
  2214. assert.NoError(t, err)
  2215. err = writeSFTPFile(testFileName1, testFileSize1, client)
  2216. assert.NoError(t, err)
  2217. // initial files:
  2218. // - testFileName
  2219. // - testFileName1
  2220. //
  2221. // rename a file from user home dir to vdir1, vdir1 is included in user quota so we have:
  2222. // - testFileName
  2223. // - /vdir1/dir1/testFileName1
  2224. err = client.Rename(testFileName1, path.Join(vdirPath1, dir1, testFileName1))
  2225. assert.NoError(t, err)
  2226. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2227. assert.NoError(t, err)
  2228. assert.Equal(t, 2, user.UsedQuotaFiles)
  2229. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  2230. f, _, err := httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2231. assert.NoError(t, err)
  2232. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2233. assert.Equal(t, 1, f.UsedQuotaFiles)
  2234. // rename a file from user home dir to vdir2, vdir2 is not included in user quota so we have:
  2235. // - /vdir2/dir1/testFileName
  2236. // - /vdir1/dir1/testFileName1
  2237. err = client.Rename(testFileName, path.Join(vdirPath2, dir1, testFileName))
  2238. assert.NoError(t, err)
  2239. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2240. assert.NoError(t, err)
  2241. assert.Equal(t, 1, user.UsedQuotaFiles)
  2242. assert.Equal(t, testFileSize1, user.UsedQuotaSize)
  2243. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2244. assert.NoError(t, err)
  2245. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2246. assert.Equal(t, 1, f.UsedQuotaFiles)
  2247. // upload two new files to the user home dir so we have:
  2248. // - testFileName
  2249. // - testFileName1
  2250. // - /vdir1/dir1/testFileName1
  2251. // - /vdir2/dir1/testFileName
  2252. err = writeSFTPFile(testFileName, testFileSize, client)
  2253. assert.NoError(t, err)
  2254. err = writeSFTPFile(testFileName1, testFileSize1, client)
  2255. assert.NoError(t, err)
  2256. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2257. assert.NoError(t, err)
  2258. assert.Equal(t, 3, user.UsedQuotaFiles)
  2259. assert.Equal(t, testFileSize+testFileSize1+testFileSize1, user.UsedQuotaSize)
  2260. // rename a file from user home dir to vdir1 overwriting an existing file, vdir1 is included in user quota so we have:
  2261. // - testFileName1
  2262. // - /vdir1/dir1/testFileName1 (initial testFileName)
  2263. // - /vdir2/dir1/testFileName
  2264. err = client.Rename(testFileName, path.Join(vdirPath1, dir1, testFileName1))
  2265. assert.NoError(t, err)
  2266. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2267. assert.NoError(t, err)
  2268. assert.Equal(t, 2, user.UsedQuotaFiles)
  2269. assert.Equal(t, testFileSize+testFileSize1, user.UsedQuotaSize)
  2270. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2271. assert.NoError(t, err)
  2272. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2273. assert.Equal(t, 1, f.UsedQuotaFiles)
  2274. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2275. assert.NoError(t, err)
  2276. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2277. assert.Equal(t, 1, f.UsedQuotaFiles)
  2278. // rename a file from user home dir to vdir2 overwriting an existing file, vdir2 is not included in user quota so we have:
  2279. // - /vdir1/dir1/testFileName1 (initial testFileName)
  2280. // - /vdir2/dir1/testFileName (initial testFileName1)
  2281. err = client.Rename(testFileName1, path.Join(vdirPath2, dir1, testFileName))
  2282. assert.NoError(t, err)
  2283. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2284. assert.NoError(t, err)
  2285. assert.Equal(t, 1, user.UsedQuotaFiles)
  2286. assert.Equal(t, testFileSize, user.UsedQuotaSize)
  2287. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2288. assert.NoError(t, err)
  2289. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2290. assert.Equal(t, 1, f.UsedQuotaFiles)
  2291. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2292. assert.NoError(t, err)
  2293. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2294. assert.Equal(t, 1, f.UsedQuotaFiles)
  2295. err = client.Mkdir(dir1)
  2296. assert.NoError(t, err)
  2297. err = writeSFTPFile(path.Join(dir1, testFileName), testFileSize, client)
  2298. assert.NoError(t, err)
  2299. err = writeSFTPFile(path.Join(dir1, testFileName1), testFileSize1, client)
  2300. assert.NoError(t, err)
  2301. // - /dir1/testFileName
  2302. // - /dir1/testFileName1
  2303. // - /vdir1/dir1/testFileName1 (initial testFileName)
  2304. // - /vdir2/dir1/testFileName (initial testFileName1)
  2305. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2306. assert.NoError(t, err)
  2307. assert.Equal(t, 3, user.UsedQuotaFiles)
  2308. assert.Equal(t, testFileSize*2+testFileSize1, user.UsedQuotaSize)
  2309. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2310. assert.NoError(t, err)
  2311. assert.Equal(t, testFileSize, f.UsedQuotaSize)
  2312. assert.Equal(t, 1, f.UsedQuotaFiles)
  2313. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2314. assert.NoError(t, err)
  2315. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2316. assert.Equal(t, 1, f.UsedQuotaFiles)
  2317. // - /vdir1/adir/testFileName
  2318. // - /vdir1/adir/testFileName1
  2319. // - /vdir1/dir1/testFileName1 (initial testFileName)
  2320. // - /vdir2/dir1/testFileName (initial testFileName1)
  2321. err = client.Rename(dir1, path.Join(vdirPath1, "adir"))
  2322. assert.NoError(t, err)
  2323. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2324. assert.NoError(t, err)
  2325. assert.Equal(t, 3, user.UsedQuotaFiles)
  2326. assert.Equal(t, testFileSize*2+testFileSize1, user.UsedQuotaSize)
  2327. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2328. assert.NoError(t, err)
  2329. assert.Equal(t, testFileSize*2+testFileSize1, f.UsedQuotaSize)
  2330. assert.Equal(t, 3, f.UsedQuotaFiles)
  2331. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2332. assert.NoError(t, err)
  2333. assert.Equal(t, testFileSize1, f.UsedQuotaSize)
  2334. assert.Equal(t, 1, f.UsedQuotaFiles)
  2335. err = client.Mkdir(dir1)
  2336. assert.NoError(t, err)
  2337. err = writeSFTPFile(path.Join(dir1, testFileName), testFileSize, client)
  2338. assert.NoError(t, err)
  2339. err = writeSFTPFile(path.Join(dir1, testFileName1), testFileSize1, client)
  2340. assert.NoError(t, err)
  2341. // - /vdir1/adir/testFileName
  2342. // - /vdir1/adir/testFileName1
  2343. // - /vdir1/dir1/testFileName1 (initial testFileName)
  2344. // - /vdir2/dir1/testFileName (initial testFileName1)
  2345. // - /vdir2/adir/testFileName
  2346. // - /vdir2/adir/testFileName1
  2347. err = client.Rename(dir1, path.Join(vdirPath2, "adir"))
  2348. assert.NoError(t, err)
  2349. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2350. assert.NoError(t, err)
  2351. assert.Equal(t, 3, user.UsedQuotaFiles)
  2352. assert.Equal(t, testFileSize*2+testFileSize1, user.UsedQuotaSize)
  2353. f, _, err = httpdtest.GetFolderByName(folderName1, http.StatusOK)
  2354. assert.NoError(t, err)
  2355. assert.Equal(t, testFileSize*2+testFileSize1, f.UsedQuotaSize)
  2356. assert.Equal(t, 3, f.UsedQuotaFiles)
  2357. f, _, err = httpdtest.GetFolderByName(folderName2, http.StatusOK)
  2358. assert.NoError(t, err)
  2359. assert.Equal(t, testFileSize1*2+testFileSize, f.UsedQuotaSize)
  2360. assert.Equal(t, 3, f.UsedQuotaFiles)
  2361. }
  2362. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2363. assert.NoError(t, err)
  2364. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  2365. assert.NoError(t, err)
  2366. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  2367. assert.NoError(t, err)
  2368. err = os.RemoveAll(user.GetHomeDir())
  2369. assert.NoError(t, err)
  2370. err = os.RemoveAll(mappedPath1)
  2371. assert.NoError(t, err)
  2372. err = os.RemoveAll(mappedPath2)
  2373. assert.NoError(t, err)
  2374. }
  2375. func TestTransferQuotaLimits(t *testing.T) {
  2376. u := getTestUser()
  2377. u.TotalDataTransfer = 1
  2378. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2379. assert.NoError(t, err)
  2380. conn, client, err := getSftpClient(user)
  2381. if assert.NoError(t, err) {
  2382. defer conn.Close()
  2383. defer client.Close()
  2384. testFileSize := int64(524288)
  2385. err = writeSFTPFile(testFileName, testFileSize, client)
  2386. assert.NoError(t, err)
  2387. f, err := client.Open(testFileName)
  2388. assert.NoError(t, err)
  2389. contents := make([]byte, testFileSize)
  2390. n, err := io.ReadFull(f, contents)
  2391. assert.NoError(t, err)
  2392. assert.Equal(t, int(testFileSize), n)
  2393. assert.Len(t, contents, int(testFileSize))
  2394. err = f.Close()
  2395. assert.NoError(t, err)
  2396. _, err = client.Open(testFileName)
  2397. if assert.Error(t, err) {
  2398. assert.Contains(t, err.Error(), "SSH_FX_FAILURE")
  2399. assert.Contains(t, err.Error(), common.ErrReadQuotaExceeded.Error())
  2400. }
  2401. err = writeSFTPFile(testFileName, testFileSize, client)
  2402. if assert.Error(t, err) {
  2403. assert.Contains(t, err.Error(), "SSH_FX_FAILURE")
  2404. assert.Contains(t, err.Error(), common.ErrQuotaExceeded.Error())
  2405. }
  2406. }
  2407. // test the limit while uploading/downloading
  2408. user.TotalDataTransfer = 0
  2409. user.UploadDataTransfer = 1
  2410. user.DownloadDataTransfer = 1
  2411. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  2412. assert.NoError(t, err)
  2413. conn, client, err = getSftpClient(user)
  2414. if assert.NoError(t, err) {
  2415. defer conn.Close()
  2416. defer client.Close()
  2417. testFileSize := int64(450000)
  2418. err = writeSFTPFile(testFileName, testFileSize, client)
  2419. assert.NoError(t, err)
  2420. f, err := client.Open(testFileName)
  2421. if assert.NoError(t, err) {
  2422. _, err = io.Copy(io.Discard, f)
  2423. assert.NoError(t, err)
  2424. err = f.Close()
  2425. assert.NoError(t, err)
  2426. }
  2427. f, err = client.Open(testFileName)
  2428. if assert.NoError(t, err) {
  2429. _, err = io.Copy(io.Discard, f)
  2430. if assert.Error(t, err) {
  2431. assert.Contains(t, err.Error(), "SSH_FX_FAILURE")
  2432. assert.Contains(t, err.Error(), common.ErrReadQuotaExceeded.Error())
  2433. }
  2434. err = f.Close()
  2435. assert.Error(t, err)
  2436. }
  2437. err = writeSFTPFile(testFileName, testFileSize, client)
  2438. if assert.Error(t, err) {
  2439. assert.Contains(t, err.Error(), "SSH_FX_FAILURE")
  2440. assert.Contains(t, err.Error(), common.ErrQuotaExceeded.Error())
  2441. }
  2442. }
  2443. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2444. assert.NoError(t, err)
  2445. err = os.RemoveAll(user.GetHomeDir())
  2446. assert.NoError(t, err)
  2447. }
  2448. func TestVirtualFoldersLink(t *testing.T) {
  2449. u := getTestUser()
  2450. mappedPath1 := filepath.Join(os.TempDir(), "vdir1")
  2451. folderName1 := filepath.Base(mappedPath1)
  2452. vdirPath1 := "/vdir1"
  2453. mappedPath2 := filepath.Join(os.TempDir(), "vdir2")
  2454. folderName2 := filepath.Base(mappedPath2)
  2455. vdirPath2 := "/vdir2"
  2456. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2457. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2458. Name: folderName1,
  2459. MappedPath: mappedPath1,
  2460. },
  2461. VirtualPath: vdirPath1,
  2462. // quota is included in the user's one
  2463. QuotaFiles: -1,
  2464. QuotaSize: -1,
  2465. })
  2466. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2467. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2468. Name: folderName2,
  2469. MappedPath: mappedPath2,
  2470. },
  2471. VirtualPath: vdirPath2,
  2472. // quota is unlimited and excluded from user's one
  2473. QuotaFiles: 0,
  2474. QuotaSize: 0,
  2475. })
  2476. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2477. assert.NoError(t, err)
  2478. conn, client, err := getSftpClient(user)
  2479. if assert.NoError(t, err) {
  2480. defer conn.Close()
  2481. defer client.Close()
  2482. testFileSize := int64(131072)
  2483. testDir := "adir"
  2484. err = writeSFTPFile(testFileName, testFileSize, client)
  2485. assert.NoError(t, err)
  2486. err = writeSFTPFile(path.Join(vdirPath1, testFileName), testFileSize, client)
  2487. assert.NoError(t, err)
  2488. err = writeSFTPFile(path.Join(vdirPath2, testFileName), testFileSize, client)
  2489. assert.NoError(t, err)
  2490. err = client.Mkdir(path.Join(vdirPath1, testDir))
  2491. assert.NoError(t, err)
  2492. err = client.Mkdir(path.Join(vdirPath2, testDir))
  2493. assert.NoError(t, err)
  2494. err = client.Symlink(testFileName, testFileName+".link")
  2495. assert.NoError(t, err)
  2496. err = client.Symlink(path.Join(vdirPath1, testFileName), path.Join(vdirPath1, testFileName+".link"))
  2497. assert.NoError(t, err)
  2498. err = client.Symlink(path.Join(vdirPath1, testFileName), path.Join(vdirPath1, testDir, testFileName+".link"))
  2499. assert.NoError(t, err)
  2500. err = client.Symlink(path.Join(vdirPath2, testFileName), path.Join(vdirPath2, testFileName+".link"))
  2501. assert.NoError(t, err)
  2502. err = client.Symlink(path.Join(vdirPath2, testFileName), path.Join(vdirPath2, testDir, testFileName+".link"))
  2503. assert.NoError(t, err)
  2504. err = client.Symlink(path.Join("/", testFileName), path.Join(vdirPath1, testFileName+".link1"))
  2505. if assert.Error(t, err) {
  2506. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2507. }
  2508. err = client.Symlink(path.Join("/", testFileName), path.Join(vdirPath1, testDir, testFileName+".link1"))
  2509. if assert.Error(t, err) {
  2510. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2511. }
  2512. err = client.Symlink(path.Join("/", testFileName), path.Join(vdirPath2, testFileName+".link1"))
  2513. if assert.Error(t, err) {
  2514. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2515. }
  2516. err = client.Symlink(path.Join("/", testFileName), path.Join(vdirPath2, testDir, testFileName+".link1"))
  2517. if assert.Error(t, err) {
  2518. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2519. }
  2520. err = client.Symlink(path.Join(vdirPath1, testFileName), testFileName+".link1")
  2521. if assert.Error(t, err) {
  2522. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2523. }
  2524. err = client.Symlink(path.Join(vdirPath2, testFileName), testFileName+".link1")
  2525. if assert.Error(t, err) {
  2526. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2527. }
  2528. err = client.Symlink(path.Join(vdirPath1, testFileName), path.Join(vdirPath2, testDir, testFileName+".link1"))
  2529. if assert.Error(t, err) {
  2530. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2531. }
  2532. err = client.Symlink(path.Join(vdirPath2, testFileName), path.Join(vdirPath1, testFileName+".link1"))
  2533. if assert.Error(t, err) {
  2534. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2535. }
  2536. err = client.Symlink("/", "/roolink")
  2537. assert.ErrorIs(t, err, os.ErrPermission)
  2538. err = client.Symlink(testFileName, "/")
  2539. assert.ErrorIs(t, err, os.ErrPermission)
  2540. err = client.Symlink(testFileName, vdirPath1)
  2541. if assert.Error(t, err) {
  2542. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2543. }
  2544. err = client.Symlink(vdirPath1, testFileName+".link2")
  2545. if assert.Error(t, err) {
  2546. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2547. }
  2548. }
  2549. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2550. assert.NoError(t, err)
  2551. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName1}, http.StatusOK)
  2552. assert.NoError(t, err)
  2553. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName2}, http.StatusOK)
  2554. assert.NoError(t, err)
  2555. err = os.RemoveAll(user.GetHomeDir())
  2556. assert.NoError(t, err)
  2557. err = os.RemoveAll(mappedPath1)
  2558. assert.NoError(t, err)
  2559. err = os.RemoveAll(mappedPath2)
  2560. assert.NoError(t, err)
  2561. }
  2562. func TestCrossFolderRename(t *testing.T) {
  2563. folder1 := "folder1"
  2564. folder2 := "folder2"
  2565. folder3 := "folder3"
  2566. folder4 := "folder4"
  2567. folder5 := "folder5"
  2568. folder6 := "folder6"
  2569. folder7 := "folder7"
  2570. baseUser, resp, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  2571. assert.NoError(t, err, string(resp))
  2572. u := getCryptFsUser()
  2573. u.VirtualFolders = []vfs.VirtualFolder{
  2574. {
  2575. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2576. Name: folder1,
  2577. MappedPath: filepath.Join(os.TempDir(), folder1),
  2578. FsConfig: vfs.Filesystem{
  2579. Provider: sdk.CryptedFilesystemProvider,
  2580. CryptConfig: vfs.CryptFsConfig{
  2581. Passphrase: kms.NewPlainSecret(defaultPassword),
  2582. },
  2583. },
  2584. },
  2585. VirtualPath: path.Join("/", folder1),
  2586. QuotaSize: -1,
  2587. QuotaFiles: -1,
  2588. },
  2589. {
  2590. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2591. Name: folder2,
  2592. MappedPath: filepath.Join(os.TempDir(), folder2),
  2593. FsConfig: vfs.Filesystem{
  2594. Provider: sdk.CryptedFilesystemProvider,
  2595. CryptConfig: vfs.CryptFsConfig{
  2596. Passphrase: kms.NewPlainSecret(defaultPassword),
  2597. },
  2598. },
  2599. },
  2600. VirtualPath: path.Join("/", folder2),
  2601. QuotaSize: -1,
  2602. QuotaFiles: -1,
  2603. },
  2604. {
  2605. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2606. Name: folder3,
  2607. MappedPath: filepath.Join(os.TempDir(), folder3),
  2608. FsConfig: vfs.Filesystem{
  2609. Provider: sdk.CryptedFilesystemProvider,
  2610. CryptConfig: vfs.CryptFsConfig{
  2611. Passphrase: kms.NewPlainSecret(defaultPassword + "mod"),
  2612. },
  2613. },
  2614. },
  2615. VirtualPath: path.Join("/", folder3),
  2616. QuotaSize: -1,
  2617. QuotaFiles: -1,
  2618. },
  2619. {
  2620. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2621. Name: folder4,
  2622. MappedPath: filepath.Join(os.TempDir(), folder4),
  2623. FsConfig: vfs.Filesystem{
  2624. Provider: sdk.SFTPFilesystemProvider,
  2625. SFTPConfig: vfs.SFTPFsConfig{
  2626. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  2627. Endpoint: sftpServerAddr,
  2628. Username: baseUser.Username,
  2629. Prefix: path.Join("/", folder4),
  2630. },
  2631. Password: kms.NewPlainSecret(defaultPassword),
  2632. },
  2633. },
  2634. },
  2635. VirtualPath: path.Join("/", folder4),
  2636. QuotaSize: -1,
  2637. QuotaFiles: -1,
  2638. },
  2639. {
  2640. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2641. Name: folder5,
  2642. MappedPath: filepath.Join(os.TempDir(), folder5),
  2643. FsConfig: vfs.Filesystem{
  2644. Provider: sdk.SFTPFilesystemProvider,
  2645. SFTPConfig: vfs.SFTPFsConfig{
  2646. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  2647. Endpoint: sftpServerAddr,
  2648. Username: baseUser.Username,
  2649. Prefix: path.Join("/", folder5),
  2650. },
  2651. Password: kms.NewPlainSecret(defaultPassword),
  2652. },
  2653. },
  2654. },
  2655. VirtualPath: path.Join("/", folder5),
  2656. QuotaSize: -1,
  2657. QuotaFiles: -1,
  2658. },
  2659. {
  2660. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2661. Name: folder6,
  2662. MappedPath: filepath.Join(os.TempDir(), folder6),
  2663. FsConfig: vfs.Filesystem{
  2664. Provider: sdk.SFTPFilesystemProvider,
  2665. SFTPConfig: vfs.SFTPFsConfig{
  2666. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  2667. Endpoint: "127.0.0.1:4024",
  2668. Username: baseUser.Username,
  2669. Prefix: path.Join("/", folder6),
  2670. },
  2671. Password: kms.NewPlainSecret(defaultPassword),
  2672. },
  2673. },
  2674. },
  2675. VirtualPath: path.Join("/", folder6),
  2676. QuotaSize: -1,
  2677. QuotaFiles: -1,
  2678. },
  2679. {
  2680. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2681. Name: folder7,
  2682. MappedPath: filepath.Join(os.TempDir(), folder7),
  2683. FsConfig: vfs.Filesystem{
  2684. Provider: sdk.SFTPFilesystemProvider,
  2685. SFTPConfig: vfs.SFTPFsConfig{
  2686. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  2687. Endpoint: sftpServerAddr,
  2688. Username: baseUser.Username,
  2689. Prefix: path.Join("/", folder4),
  2690. },
  2691. Password: kms.NewPlainSecret(defaultPassword),
  2692. },
  2693. },
  2694. },
  2695. VirtualPath: path.Join("/", folder7),
  2696. QuotaSize: -1,
  2697. QuotaFiles: -1,
  2698. },
  2699. }
  2700. user, resp, err := httpdtest.AddUser(u, http.StatusCreated)
  2701. assert.NoError(t, err, string(resp))
  2702. conn, client, err := getSftpClient(user)
  2703. if assert.NoError(t, err) {
  2704. defer conn.Close()
  2705. defer client.Close()
  2706. subDir := "testSubDir"
  2707. err = client.Mkdir(subDir)
  2708. assert.NoError(t, err)
  2709. err = writeSFTPFile(path.Join(subDir, "afile.bin"), 64, client)
  2710. assert.NoError(t, err)
  2711. err = client.Rename(subDir, path.Join("/", folder1, subDir))
  2712. assert.NoError(t, err)
  2713. _, err = client.Stat(path.Join("/", folder1, subDir))
  2714. assert.NoError(t, err)
  2715. _, err = client.Stat(path.Join("/", folder1, subDir, "afile.bin"))
  2716. assert.NoError(t, err)
  2717. err = client.Rename(path.Join("/", folder1, subDir), path.Join("/", folder2, subDir))
  2718. assert.NoError(t, err)
  2719. _, err = client.Stat(path.Join("/", folder2, subDir))
  2720. assert.NoError(t, err)
  2721. _, err = client.Stat(path.Join("/", folder2, subDir, "afile.bin"))
  2722. assert.NoError(t, err)
  2723. err = client.Rename(path.Join("/", folder2, subDir), path.Join("/", folder3, subDir))
  2724. assert.ErrorIs(t, err, os.ErrPermission)
  2725. err = writeSFTPFile(path.Join("/", folder3, "file.bin"), 64, client)
  2726. assert.NoError(t, err)
  2727. err = client.Rename(path.Join("/", folder3, "file.bin"), "/renamed.bin")
  2728. assert.ErrorIs(t, err, os.ErrPermission)
  2729. err = client.Rename(path.Join("/", folder3, "file.bin"), path.Join("/", folder2, "/renamed.bin"))
  2730. assert.ErrorIs(t, err, os.ErrPermission)
  2731. err = client.Rename(path.Join("/", folder3, "file.bin"), path.Join("/", folder3, "/renamed.bin"))
  2732. assert.NoError(t, err)
  2733. err = writeSFTPFile("/afile.bin", 64, client)
  2734. assert.NoError(t, err)
  2735. err = client.Rename("afile.bin", path.Join("/", folder4, "afile_renamed.bin"))
  2736. assert.ErrorIs(t, err, os.ErrPermission)
  2737. err = writeSFTPFile(path.Join("/", folder4, "afile.bin"), 64, client)
  2738. assert.NoError(t, err)
  2739. err = client.Rename(path.Join("/", folder4, "afile.bin"), path.Join("/", folder5, "afile_renamed.bin"))
  2740. assert.NoError(t, err)
  2741. err = client.Rename(path.Join("/", folder5, "afile_renamed.bin"), path.Join("/", folder6, "afile_renamed.bin"))
  2742. assert.ErrorIs(t, err, os.ErrPermission)
  2743. err = writeSFTPFile(path.Join("/", folder4, "afile.bin"), 64, client)
  2744. assert.NoError(t, err)
  2745. _, err = client.Stat(path.Join("/", folder7, "afile.bin"))
  2746. assert.NoError(t, err)
  2747. err = client.Rename(path.Join("/", folder4, "afile.bin"), path.Join("/", folder7, "afile.bin"))
  2748. assert.NoError(t, err)
  2749. }
  2750. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2751. assert.NoError(t, err)
  2752. err = os.RemoveAll(user.GetHomeDir())
  2753. assert.NoError(t, err)
  2754. _, err = httpdtest.RemoveUser(baseUser, http.StatusOK)
  2755. assert.NoError(t, err)
  2756. err = os.RemoveAll(baseUser.GetHomeDir())
  2757. assert.NoError(t, err)
  2758. for _, folderName := range []string{folder1, folder2, folder3, folder4, folder5, folder6, folder7} {
  2759. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName}, http.StatusOK)
  2760. assert.NoError(t, err)
  2761. err = os.RemoveAll(filepath.Join(os.TempDir(), folderName))
  2762. assert.NoError(t, err)
  2763. }
  2764. }
  2765. func TestDirs(t *testing.T) {
  2766. u := getTestUser()
  2767. mappedPath := filepath.Join(os.TempDir(), "vdir")
  2768. folderName := filepath.Base(mappedPath)
  2769. vdirPath := "/path/vdir"
  2770. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2771. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2772. Name: folderName,
  2773. MappedPath: mappedPath,
  2774. },
  2775. VirtualPath: vdirPath,
  2776. })
  2777. u.Permissions["/subdir"] = []string{dataprovider.PermDownload, dataprovider.PermUpload,
  2778. dataprovider.PermDelete, dataprovider.PermCreateDirs, dataprovider.PermRename, dataprovider.PermListItems}
  2779. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2780. assert.NoError(t, err)
  2781. conn, client, err := getSftpClient(user)
  2782. if assert.NoError(t, err) {
  2783. defer conn.Close()
  2784. defer client.Close()
  2785. info, err := client.ReadDir("/")
  2786. if assert.NoError(t, err) {
  2787. if assert.Len(t, info, 1) {
  2788. assert.Equal(t, "path", info[0].Name())
  2789. }
  2790. }
  2791. fi, err := client.Stat(path.Dir(vdirPath))
  2792. if assert.NoError(t, err) {
  2793. assert.True(t, fi.IsDir())
  2794. }
  2795. err = client.RemoveDirectory("/")
  2796. assert.ErrorIs(t, err, os.ErrPermission)
  2797. err = client.RemoveDirectory(vdirPath)
  2798. assert.ErrorIs(t, err, os.ErrPermission)
  2799. err = client.RemoveDirectory(path.Dir(vdirPath))
  2800. if assert.Error(t, err) {
  2801. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2802. }
  2803. err = client.Mkdir(vdirPath)
  2804. assert.ErrorIs(t, err, os.ErrPermission)
  2805. err = client.Mkdir("adir")
  2806. assert.NoError(t, err)
  2807. err = client.Rename("/adir", path.Dir(vdirPath))
  2808. if assert.Error(t, err) {
  2809. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2810. }
  2811. err = client.MkdirAll("/subdir/adir")
  2812. assert.NoError(t, err)
  2813. err = client.Rename("adir", "subdir/adir")
  2814. if assert.Error(t, err) {
  2815. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2816. }
  2817. err = writeSFTPFile("/subdir/afile.bin", 64, client)
  2818. assert.NoError(t, err)
  2819. err = writeSFTPFile("/afile.bin", 32, client)
  2820. assert.NoError(t, err)
  2821. err = client.Rename("afile.bin", "subdir/afile.bin")
  2822. assert.ErrorIs(t, err, os.ErrPermission)
  2823. err = client.Rename("afile.bin", "subdir/afile1.bin")
  2824. assert.NoError(t, err)
  2825. err = client.Rename(path.Dir(vdirPath), "renamed_vdir")
  2826. if assert.Error(t, err) {
  2827. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  2828. }
  2829. }
  2830. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2831. assert.NoError(t, err)
  2832. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName}, http.StatusOK)
  2833. assert.NoError(t, err)
  2834. err = os.RemoveAll(user.GetHomeDir())
  2835. assert.NoError(t, err)
  2836. err = os.RemoveAll(mappedPath)
  2837. assert.NoError(t, err)
  2838. }
  2839. func TestCryptFsStat(t *testing.T) {
  2840. user, _, err := httpdtest.AddUser(getCryptFsUser(), http.StatusCreated)
  2841. assert.NoError(t, err)
  2842. conn, client, err := getSftpClient(user)
  2843. if assert.NoError(t, err) {
  2844. defer conn.Close()
  2845. defer client.Close()
  2846. testFileSize := int64(4096)
  2847. err = writeSFTPFile(testFileName, testFileSize, client)
  2848. assert.NoError(t, err)
  2849. info, err := client.Stat(testFileName)
  2850. if assert.NoError(t, err) {
  2851. assert.Equal(t, testFileSize, info.Size())
  2852. }
  2853. info, err = os.Stat(filepath.Join(user.HomeDir, testFileName))
  2854. if assert.NoError(t, err) {
  2855. assert.Greater(t, info.Size(), testFileSize)
  2856. }
  2857. }
  2858. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2859. assert.NoError(t, err)
  2860. err = os.RemoveAll(user.GetHomeDir())
  2861. assert.NoError(t, err)
  2862. }
  2863. func TestFsPermissionErrors(t *testing.T) {
  2864. if runtime.GOOS == osWindows {
  2865. t.Skip("this test is not available on Windows")
  2866. }
  2867. user, _, err := httpdtest.AddUser(getCryptFsUser(), http.StatusCreated)
  2868. assert.NoError(t, err)
  2869. conn, client, err := getSftpClient(user)
  2870. if assert.NoError(t, err) {
  2871. defer conn.Close()
  2872. defer client.Close()
  2873. testDir := "tDir"
  2874. err = client.Mkdir(testDir)
  2875. assert.NoError(t, err)
  2876. err = os.Chmod(user.GetHomeDir(), 0111)
  2877. assert.NoError(t, err)
  2878. err = client.RemoveDirectory(testDir)
  2879. assert.ErrorIs(t, err, os.ErrPermission)
  2880. err = client.Rename(testDir, testDir+"1")
  2881. assert.ErrorIs(t, err, os.ErrPermission)
  2882. err = os.Chmod(user.GetHomeDir(), os.ModePerm)
  2883. assert.NoError(t, err)
  2884. }
  2885. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2886. assert.NoError(t, err)
  2887. err = os.RemoveAll(user.GetHomeDir())
  2888. assert.NoError(t, err)
  2889. }
  2890. func TestRenameErrorOutsideHomeDir(t *testing.T) {
  2891. if runtime.GOOS == osWindows {
  2892. t.Skip("this test is not available on Windows")
  2893. }
  2894. oldUploadMode := common.Config.UploadMode
  2895. oldTempPath := common.Config.TempPath
  2896. common.Config.UploadMode = common.UploadModeAtomicWithResume
  2897. common.Config.TempPath = filepath.Clean(os.TempDir())
  2898. vfs.SetTempPath(common.Config.TempPath)
  2899. u := getTestUser()
  2900. u.QuotaFiles = 1000
  2901. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2902. assert.NoError(t, err)
  2903. conn, client, err := getSftpClient(user)
  2904. if assert.NoError(t, err) {
  2905. defer conn.Close()
  2906. defer client.Close()
  2907. err = os.Chmod(user.GetHomeDir(), 0555)
  2908. assert.NoError(t, err)
  2909. err = checkBasicSFTP(client)
  2910. assert.NoError(t, err)
  2911. f, err := client.Create(testFileName)
  2912. assert.NoError(t, err)
  2913. _, err = f.Write(testFileContent)
  2914. assert.NoError(t, err)
  2915. err = f.Close()
  2916. assert.ErrorIs(t, err, os.ErrPermission)
  2917. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  2918. assert.NoError(t, err)
  2919. assert.Equal(t, 0, user.UsedQuotaFiles)
  2920. assert.Equal(t, int64(0), user.UsedQuotaSize)
  2921. err = os.Chmod(user.GetHomeDir(), os.ModeDir)
  2922. assert.NoError(t, err)
  2923. }
  2924. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  2925. assert.NoError(t, err)
  2926. err = os.RemoveAll(user.GetHomeDir())
  2927. assert.NoError(t, err)
  2928. common.Config.UploadMode = oldUploadMode
  2929. common.Config.TempPath = oldTempPath
  2930. vfs.SetTempPath(oldTempPath)
  2931. }
  2932. func TestResolvePathError(t *testing.T) {
  2933. u := getTestUser()
  2934. u.HomeDir = "relative_path"
  2935. conn := common.NewBaseConnection("", common.ProtocolFTP, "", "", u)
  2936. testPath := "apath"
  2937. _, err := conn.ListDir(testPath)
  2938. assert.Error(t, err)
  2939. err = conn.CreateDir(testPath, true)
  2940. assert.Error(t, err)
  2941. err = conn.RemoveDir(testPath)
  2942. assert.Error(t, err)
  2943. err = conn.Rename(testPath, testPath+"1")
  2944. assert.Error(t, err)
  2945. err = conn.CreateSymlink(testPath, testPath+".sym")
  2946. assert.Error(t, err)
  2947. _, err = conn.DoStat(testPath, 0, false)
  2948. assert.Error(t, err)
  2949. err = conn.RemoveAll(testPath)
  2950. assert.Error(t, err)
  2951. err = conn.SetStat(testPath, &common.StatAttributes{
  2952. Atime: time.Now(),
  2953. Mtime: time.Now(),
  2954. })
  2955. assert.Error(t, err)
  2956. u = getTestUser()
  2957. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  2958. BaseVirtualFolder: vfs.BaseVirtualFolder{
  2959. MappedPath: "relative_mapped_path",
  2960. },
  2961. VirtualPath: "/vpath",
  2962. })
  2963. err = os.MkdirAll(u.HomeDir, os.ModePerm)
  2964. assert.NoError(t, err)
  2965. conn.User = u
  2966. err = conn.Rename(testPath, "/vpath/subpath")
  2967. assert.Error(t, err)
  2968. outHomePath := filepath.Join(os.TempDir(), testFileName)
  2969. err = os.WriteFile(outHomePath, testFileContent, os.ModePerm)
  2970. assert.NoError(t, err)
  2971. err = os.Symlink(outHomePath, filepath.Join(u.HomeDir, testFileName+".link"))
  2972. assert.NoError(t, err)
  2973. err = os.WriteFile(filepath.Join(u.HomeDir, testFileName), testFileContent, os.ModePerm)
  2974. assert.NoError(t, err)
  2975. err = conn.CreateSymlink(testFileName, testFileName+".link")
  2976. assert.Error(t, err)
  2977. err = os.RemoveAll(u.GetHomeDir())
  2978. assert.NoError(t, err)
  2979. err = os.Remove(outHomePath)
  2980. assert.NoError(t, err)
  2981. }
  2982. func TestUserPasswordHashing(t *testing.T) {
  2983. if config.GetProviderConf().Driver == dataprovider.MemoryDataProviderName {
  2984. t.Skip("this test is not supported with the memory provider")
  2985. }
  2986. u := getTestUser()
  2987. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  2988. assert.NoError(t, err)
  2989. err = dataprovider.Close()
  2990. assert.NoError(t, err)
  2991. err = config.LoadConfig(configDir, "")
  2992. assert.NoError(t, err)
  2993. providerConf := config.GetProviderConf()
  2994. providerConf.PasswordHashing.Algo = dataprovider.HashingAlgoArgon2ID
  2995. err = dataprovider.Initialize(providerConf, configDir, true)
  2996. assert.NoError(t, err)
  2997. currentUser, err := dataprovider.UserExists(user.Username, "")
  2998. assert.NoError(t, err)
  2999. assert.True(t, strings.HasPrefix(currentUser.Password, "$2a$"))
  3000. conn, client, err := getSftpClient(user)
  3001. if assert.NoError(t, err) {
  3002. defer conn.Close()
  3003. defer client.Close()
  3004. err = checkBasicSFTP(client)
  3005. assert.NoError(t, err)
  3006. }
  3007. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  3008. assert.NoError(t, err)
  3009. err = os.RemoveAll(user.GetHomeDir())
  3010. assert.NoError(t, err)
  3011. u = getTestUser()
  3012. user, _, err = httpdtest.AddUser(u, http.StatusCreated)
  3013. assert.NoError(t, err)
  3014. currentUser, err = dataprovider.UserExists(user.Username, "")
  3015. assert.NoError(t, err)
  3016. assert.True(t, strings.HasPrefix(currentUser.Password, "$argon2id$"))
  3017. conn, client, err = getSftpClient(user)
  3018. if assert.NoError(t, err) {
  3019. defer conn.Close()
  3020. defer client.Close()
  3021. err = checkBasicSFTP(client)
  3022. assert.NoError(t, err)
  3023. }
  3024. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  3025. assert.NoError(t, err)
  3026. err = os.RemoveAll(user.GetHomeDir())
  3027. assert.NoError(t, err)
  3028. err = dataprovider.Close()
  3029. assert.NoError(t, err)
  3030. err = config.LoadConfig(configDir, "")
  3031. assert.NoError(t, err)
  3032. providerConf = config.GetProviderConf()
  3033. err = dataprovider.Initialize(providerConf, configDir, true)
  3034. assert.NoError(t, err)
  3035. }
  3036. func TestAllowList(t *testing.T) {
  3037. configCopy := common.Config
  3038. entries := []dataprovider.IPListEntry{
  3039. {
  3040. IPOrNet: "172.18.1.1/32",
  3041. Type: dataprovider.IPListTypeAllowList,
  3042. Mode: dataprovider.ListModeAllow,
  3043. Protocols: 0,
  3044. },
  3045. {
  3046. IPOrNet: "172.18.1.2/32",
  3047. Type: dataprovider.IPListTypeAllowList,
  3048. Mode: dataprovider.ListModeAllow,
  3049. Protocols: 0,
  3050. },
  3051. {
  3052. IPOrNet: "10.8.7.0/24",
  3053. Type: dataprovider.IPListTypeAllowList,
  3054. Mode: dataprovider.ListModeAllow,
  3055. Protocols: 5,
  3056. },
  3057. {
  3058. IPOrNet: "0.0.0.0/0",
  3059. Type: dataprovider.IPListTypeAllowList,
  3060. Mode: dataprovider.ListModeAllow,
  3061. Protocols: 8,
  3062. },
  3063. {
  3064. IPOrNet: "::/0",
  3065. Type: dataprovider.IPListTypeAllowList,
  3066. Mode: dataprovider.ListModeAllow,
  3067. Protocols: 8,
  3068. },
  3069. }
  3070. for _, e := range entries {
  3071. _, resp, err := httpdtest.AddIPListEntry(e, http.StatusCreated)
  3072. assert.NoError(t, err, string(resp))
  3073. }
  3074. common.Config.AllowListStatus = 1
  3075. err := common.Initialize(common.Config, 0)
  3076. assert.NoError(t, err)
  3077. assert.True(t, common.Config.IsAllowListEnabled())
  3078. testIP := "172.18.1.1"
  3079. assert.NoError(t, common.Connections.IsNewConnectionAllowed(testIP, common.ProtocolFTP))
  3080. entry := entries[0]
  3081. entry.Protocols = 1
  3082. _, _, err = httpdtest.UpdateIPListEntry(entry, http.StatusOK)
  3083. assert.NoError(t, err)
  3084. assert.Error(t, common.Connections.IsNewConnectionAllowed(testIP, common.ProtocolFTP))
  3085. assert.NoError(t, common.Connections.IsNewConnectionAllowed(testIP, common.ProtocolSSH))
  3086. _, err = httpdtest.RemoveIPListEntry(entry, http.StatusOK)
  3087. assert.NoError(t, err)
  3088. entries = entries[1:]
  3089. assert.Error(t, common.Connections.IsNewConnectionAllowed(testIP, common.ProtocolSSH))
  3090. assert.Error(t, common.Connections.IsNewConnectionAllowed("172.18.1.3", common.ProtocolSSH))
  3091. assert.NoError(t, common.Connections.IsNewConnectionAllowed("172.18.1.3", common.ProtocolHTTP))
  3092. assert.NoError(t, common.Connections.IsNewConnectionAllowed("10.8.7.3", common.ProtocolWebDAV))
  3093. assert.NoError(t, common.Connections.IsNewConnectionAllowed("10.8.7.4", common.ProtocolSSH))
  3094. assert.Error(t, common.Connections.IsNewConnectionAllowed("10.8.7.4", common.ProtocolFTP))
  3095. assert.NoError(t, common.Connections.IsNewConnectionAllowed("10.8.7.4", common.ProtocolHTTP))
  3096. assert.NoError(t, common.Connections.IsNewConnectionAllowed("2001:0db8::1428:57ab", common.ProtocolHTTP))
  3097. assert.Error(t, common.Connections.IsNewConnectionAllowed("2001:0db8::1428:57ab", common.ProtocolSSH))
  3098. assert.Error(t, common.Connections.IsNewConnectionAllowed("10.8.8.2", common.ProtocolWebDAV))
  3099. assert.Error(t, common.Connections.IsNewConnectionAllowed("invalid IP", common.ProtocolHTTP))
  3100. common.Config = configCopy
  3101. err = common.Initialize(common.Config, 0)
  3102. assert.NoError(t, err)
  3103. assert.False(t, common.Config.IsAllowListEnabled())
  3104. for _, e := range entries {
  3105. _, err := httpdtest.RemoveIPListEntry(e, http.StatusOK)
  3106. assert.NoError(t, err)
  3107. }
  3108. }
  3109. func TestDbDefenderErrors(t *testing.T) {
  3110. if !isDbDefenderSupported() {
  3111. t.Skip("this test is not supported with the current database provider")
  3112. }
  3113. configCopy := common.Config
  3114. common.Config.DefenderConfig.Enabled = true
  3115. common.Config.DefenderConfig.Driver = common.DefenderDriverProvider
  3116. err := common.Initialize(common.Config, 0)
  3117. assert.NoError(t, err)
  3118. testIP := "127.1.1.1"
  3119. hosts, err := common.GetDefenderHosts()
  3120. assert.NoError(t, err)
  3121. assert.Len(t, hosts, 0)
  3122. common.AddDefenderEvent(testIP, common.ProtocolSSH, common.HostEventLimitExceeded)
  3123. hosts, err = common.GetDefenderHosts()
  3124. assert.NoError(t, err)
  3125. assert.Len(t, hosts, 1)
  3126. score, err := common.GetDefenderScore(testIP)
  3127. assert.NoError(t, err)
  3128. assert.Equal(t, 3, score)
  3129. banTime, err := common.GetDefenderBanTime(testIP)
  3130. assert.NoError(t, err)
  3131. assert.Nil(t, banTime)
  3132. err = dataprovider.Close()
  3133. assert.NoError(t, err)
  3134. common.AddDefenderEvent(testIP, common.ProtocolFTP, common.HostEventLimitExceeded)
  3135. _, err = common.GetDefenderHosts()
  3136. assert.Error(t, err)
  3137. _, err = common.GetDefenderHost(testIP)
  3138. assert.Error(t, err)
  3139. _, err = common.GetDefenderBanTime(testIP)
  3140. assert.Error(t, err)
  3141. _, err = common.GetDefenderScore(testIP)
  3142. assert.Error(t, err)
  3143. err = config.LoadConfig(configDir, "")
  3144. assert.NoError(t, err)
  3145. providerConf := config.GetProviderConf()
  3146. err = dataprovider.Initialize(providerConf, configDir, true)
  3147. assert.NoError(t, err)
  3148. err = dataprovider.CleanupDefender(util.GetTimeAsMsSinceEpoch(time.Now().Add(1 * time.Hour)))
  3149. assert.NoError(t, err)
  3150. common.Config = configCopy
  3151. err = common.Initialize(common.Config, 0)
  3152. assert.NoError(t, err)
  3153. }
  3154. func TestDelayedQuotaUpdater(t *testing.T) {
  3155. err := dataprovider.Close()
  3156. assert.NoError(t, err)
  3157. err = config.LoadConfig(configDir, "")
  3158. assert.NoError(t, err)
  3159. providerConf := config.GetProviderConf()
  3160. providerConf.DelayedQuotaUpdate = 120
  3161. err = dataprovider.Initialize(providerConf, configDir, true)
  3162. assert.NoError(t, err)
  3163. u := getTestUser()
  3164. u.QuotaFiles = 100
  3165. u.TotalDataTransfer = 2000
  3166. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  3167. assert.NoError(t, err)
  3168. err = dataprovider.UpdateUserQuota(&user, 10, 6000, false)
  3169. assert.NoError(t, err)
  3170. err = dataprovider.UpdateUserTransferQuota(&user, 100, 200, false)
  3171. assert.NoError(t, err)
  3172. files, size, ulSize, dlSize, err := dataprovider.GetUsedQuota(user.Username)
  3173. assert.NoError(t, err)
  3174. assert.Equal(t, 10, files)
  3175. assert.Equal(t, int64(6000), size)
  3176. assert.Equal(t, int64(100), ulSize)
  3177. assert.Equal(t, int64(200), dlSize)
  3178. userGet, err := dataprovider.UserExists(user.Username, "")
  3179. assert.NoError(t, err)
  3180. assert.Equal(t, 0, userGet.UsedQuotaFiles)
  3181. assert.Equal(t, int64(0), userGet.UsedQuotaSize)
  3182. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  3183. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  3184. err = dataprovider.UpdateUserQuota(&user, 10, 6000, true)
  3185. assert.NoError(t, err)
  3186. err = dataprovider.UpdateUserTransferQuota(&user, 100, 200, true)
  3187. assert.NoError(t, err)
  3188. files, size, ulSize, dlSize, err = dataprovider.GetUsedQuota(user.Username)
  3189. assert.NoError(t, err)
  3190. assert.Equal(t, 10, files)
  3191. assert.Equal(t, int64(6000), size)
  3192. assert.Equal(t, int64(100), ulSize)
  3193. assert.Equal(t, int64(200), dlSize)
  3194. userGet, err = dataprovider.UserExists(user.Username, "")
  3195. assert.NoError(t, err)
  3196. assert.Equal(t, 10, userGet.UsedQuotaFiles)
  3197. assert.Equal(t, int64(6000), userGet.UsedQuotaSize)
  3198. assert.Equal(t, int64(100), userGet.UsedUploadDataTransfer)
  3199. assert.Equal(t, int64(200), userGet.UsedDownloadDataTransfer)
  3200. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  3201. assert.NoError(t, err)
  3202. err = os.RemoveAll(user.GetHomeDir())
  3203. assert.NoError(t, err)
  3204. folder := vfs.BaseVirtualFolder{
  3205. Name: "folder",
  3206. MappedPath: filepath.Join(os.TempDir(), "p"),
  3207. }
  3208. err = dataprovider.AddFolder(&folder, "", "", "")
  3209. assert.NoError(t, err)
  3210. err = dataprovider.UpdateVirtualFolderQuota(&folder, 10, 6000, false)
  3211. assert.NoError(t, err)
  3212. files, size, err = dataprovider.GetUsedVirtualFolderQuota(folder.Name)
  3213. assert.NoError(t, err)
  3214. assert.Equal(t, 10, files)
  3215. assert.Equal(t, int64(6000), size)
  3216. folderGet, err := dataprovider.GetFolderByName(folder.Name)
  3217. assert.NoError(t, err)
  3218. assert.Equal(t, 0, folderGet.UsedQuotaFiles)
  3219. assert.Equal(t, int64(0), folderGet.UsedQuotaSize)
  3220. err = dataprovider.UpdateVirtualFolderQuota(&folder, 10, 6000, true)
  3221. assert.NoError(t, err)
  3222. files, size, err = dataprovider.GetUsedVirtualFolderQuota(folder.Name)
  3223. assert.NoError(t, err)
  3224. assert.Equal(t, 10, files)
  3225. assert.Equal(t, int64(6000), size)
  3226. folderGet, err = dataprovider.GetFolderByName(folder.Name)
  3227. assert.NoError(t, err)
  3228. assert.Equal(t, 10, folderGet.UsedQuotaFiles)
  3229. assert.Equal(t, int64(6000), folderGet.UsedQuotaSize)
  3230. err = dataprovider.DeleteFolder(folder.Name, "", "", "")
  3231. assert.NoError(t, err)
  3232. err = dataprovider.Close()
  3233. assert.NoError(t, err)
  3234. err = config.LoadConfig(configDir, "")
  3235. assert.NoError(t, err)
  3236. providerConf = config.GetProviderConf()
  3237. err = dataprovider.Initialize(providerConf, configDir, true)
  3238. assert.NoError(t, err)
  3239. }
  3240. func TestPasswordCaching(t *testing.T) {
  3241. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  3242. assert.NoError(t, err)
  3243. dbUser, err := dataprovider.UserExists(user.Username, "")
  3244. assert.NoError(t, err)
  3245. found, match := dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3246. assert.False(t, found)
  3247. assert.False(t, match)
  3248. user.Password = "wrong"
  3249. _, _, err = getSftpClient(user)
  3250. assert.Error(t, err)
  3251. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3252. assert.False(t, found)
  3253. assert.False(t, match)
  3254. user.Password = ""
  3255. conn, client, err := getSftpClient(user)
  3256. if assert.NoError(t, err) {
  3257. defer conn.Close()
  3258. defer client.Close()
  3259. err = checkBasicSFTP(client)
  3260. assert.NoError(t, err)
  3261. }
  3262. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3263. assert.True(t, found)
  3264. assert.True(t, match)
  3265. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword+"_", dbUser.Password)
  3266. assert.True(t, found)
  3267. assert.False(t, match)
  3268. found, match = dataprovider.CheckCachedUserPassword(user.Username+"_", defaultPassword, dbUser.Password)
  3269. assert.False(t, found)
  3270. assert.False(t, match)
  3271. user, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  3272. assert.NoError(t, err)
  3273. // the password was not changed
  3274. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3275. assert.True(t, found)
  3276. assert.True(t, match)
  3277. // the password hash will change
  3278. user.Password = defaultPassword
  3279. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  3280. assert.NoError(t, err)
  3281. dbUser, err = dataprovider.UserExists(user.Username, "")
  3282. assert.NoError(t, err)
  3283. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3284. assert.False(t, found)
  3285. assert.False(t, match)
  3286. conn, client, err = getSftpClient(user)
  3287. if assert.NoError(t, err) {
  3288. defer conn.Close()
  3289. defer client.Close()
  3290. err = checkBasicSFTP(client)
  3291. assert.NoError(t, err)
  3292. }
  3293. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3294. assert.True(t, found)
  3295. assert.True(t, match)
  3296. //change password
  3297. newPassword := defaultPassword + "mod"
  3298. user.Password = newPassword
  3299. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  3300. assert.NoError(t, err)
  3301. dbUser, err = dataprovider.UserExists(user.Username, "")
  3302. assert.NoError(t, err)
  3303. found, match = dataprovider.CheckCachedUserPassword(user.Username, newPassword, dbUser.Password)
  3304. assert.False(t, found)
  3305. assert.False(t, match)
  3306. conn, client, err = getSftpClient(user)
  3307. if assert.NoError(t, err) {
  3308. defer conn.Close()
  3309. defer client.Close()
  3310. err = checkBasicSFTP(client)
  3311. assert.NoError(t, err)
  3312. }
  3313. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3314. assert.True(t, found)
  3315. assert.False(t, match)
  3316. found, match = dataprovider.CheckCachedUserPassword(user.Username, newPassword, dbUser.Password)
  3317. assert.True(t, found)
  3318. assert.True(t, match)
  3319. // update the password
  3320. err = dataprovider.UpdateUserPassword(user.Username, defaultPassword, "", "", "")
  3321. assert.NoError(t, err)
  3322. dbUser, err = dataprovider.UserExists(user.Username, "")
  3323. assert.NoError(t, err)
  3324. // the stored hash does not match
  3325. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3326. assert.False(t, found)
  3327. assert.False(t, match)
  3328. user.Password = defaultPassword
  3329. conn, client, err = getSftpClient(user)
  3330. if assert.NoError(t, err) {
  3331. defer conn.Close()
  3332. defer client.Close()
  3333. err = checkBasicSFTP(client)
  3334. assert.NoError(t, err)
  3335. }
  3336. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3337. assert.True(t, found)
  3338. assert.True(t, match)
  3339. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  3340. assert.NoError(t, err)
  3341. err = os.RemoveAll(user.GetHomeDir())
  3342. assert.NoError(t, err)
  3343. found, match = dataprovider.CheckCachedUserPassword(user.Username, defaultPassword, dbUser.Password)
  3344. assert.False(t, found)
  3345. assert.False(t, match)
  3346. }
  3347. func TestEventRule(t *testing.T) {
  3348. if runtime.GOOS == osWindows {
  3349. t.Skip("this test is not available on Windows")
  3350. }
  3351. smtpCfg := smtp.Config{
  3352. Host: "127.0.0.1",
  3353. Port: 2525,
  3354. From: "[email protected]",
  3355. TemplatesPath: "templates",
  3356. }
  3357. err := smtpCfg.Initialize(configDir, true)
  3358. require.NoError(t, err)
  3359. a1 := dataprovider.BaseEventAction{
  3360. Name: "action1",
  3361. Type: dataprovider.ActionTypeHTTP,
  3362. Options: dataprovider.BaseEventActionOptions{
  3363. HTTPConfig: dataprovider.EventActionHTTPConfig{
  3364. Endpoint: "http://localhost",
  3365. Timeout: 20,
  3366. Method: http.MethodGet,
  3367. },
  3368. },
  3369. }
  3370. a2 := dataprovider.BaseEventAction{
  3371. Name: "action2",
  3372. Type: dataprovider.ActionTypeBackup,
  3373. }
  3374. a3 := dataprovider.BaseEventAction{
  3375. Name: "action3",
  3376. Type: dataprovider.ActionTypeEmail,
  3377. Options: dataprovider.BaseEventActionOptions{
  3378. EmailConfig: dataprovider.EventActionEmailConfig{
  3379. Recipients: []string{"[email protected]", "[email protected]"},
  3380. Bcc: []string{"[email protected]"},
  3381. Subject: `New "{{Event}}" from "{{Name}}" status {{StatusString}}`,
  3382. Body: "Fs path {{FsPath}}, size: {{FileSize}}, protocol: {{Protocol}}, IP: {{IP}} Data: {{ObjectData}} {{ErrorString}}",
  3383. },
  3384. },
  3385. }
  3386. a4 := dataprovider.BaseEventAction{
  3387. Name: "action4",
  3388. Type: dataprovider.ActionTypeEmail,
  3389. Options: dataprovider.BaseEventActionOptions{
  3390. EmailConfig: dataprovider.EventActionEmailConfig{
  3391. Recipients: []string{"[email protected]"},
  3392. Subject: `Failed "{{Event}}" from "{{Name}}"`,
  3393. Body: "Fs path {{FsPath}}, protocol: {{Protocol}}, IP: {{IP}} {{ErrorString}}",
  3394. },
  3395. },
  3396. }
  3397. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  3398. assert.NoError(t, err)
  3399. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  3400. assert.NoError(t, err)
  3401. action3, _, err := httpdtest.AddEventAction(a3, http.StatusCreated)
  3402. assert.NoError(t, err)
  3403. action4, _, err := httpdtest.AddEventAction(a4, http.StatusCreated)
  3404. assert.NoError(t, err)
  3405. r1 := dataprovider.EventRule{
  3406. Name: "test rule1",
  3407. Status: 1,
  3408. Trigger: dataprovider.EventTriggerFsEvent,
  3409. Conditions: dataprovider.EventConditions{
  3410. FsEvents: []string{"upload"},
  3411. Options: dataprovider.ConditionOptions{
  3412. FsPaths: []dataprovider.ConditionPattern{
  3413. {
  3414. Pattern: "/subdir/*.dat",
  3415. },
  3416. {
  3417. Pattern: "/**/*.txt",
  3418. },
  3419. },
  3420. },
  3421. },
  3422. Actions: []dataprovider.EventAction{
  3423. {
  3424. BaseEventAction: dataprovider.BaseEventAction{
  3425. Name: action1.Name,
  3426. },
  3427. Order: 1,
  3428. Options: dataprovider.EventActionOptions{
  3429. ExecuteSync: true,
  3430. StopOnFailure: true,
  3431. },
  3432. },
  3433. {
  3434. BaseEventAction: dataprovider.BaseEventAction{
  3435. Name: action2.Name,
  3436. },
  3437. Order: 2,
  3438. },
  3439. {
  3440. BaseEventAction: dataprovider.BaseEventAction{
  3441. Name: action3.Name,
  3442. },
  3443. Order: 3,
  3444. },
  3445. {
  3446. BaseEventAction: dataprovider.BaseEventAction{
  3447. Name: action4.Name,
  3448. },
  3449. Order: 4,
  3450. Options: dataprovider.EventActionOptions{
  3451. IsFailureAction: true,
  3452. },
  3453. },
  3454. },
  3455. }
  3456. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  3457. assert.NoError(t, err)
  3458. r2 := dataprovider.EventRule{
  3459. Name: "test rule2",
  3460. Status: 1,
  3461. Trigger: dataprovider.EventTriggerFsEvent,
  3462. Conditions: dataprovider.EventConditions{
  3463. FsEvents: []string{"download"},
  3464. Options: dataprovider.ConditionOptions{
  3465. FsPaths: []dataprovider.ConditionPattern{
  3466. {
  3467. Pattern: "/**/*.dat",
  3468. },
  3469. },
  3470. },
  3471. },
  3472. Actions: []dataprovider.EventAction{
  3473. {
  3474. BaseEventAction: dataprovider.BaseEventAction{
  3475. Name: action3.Name,
  3476. },
  3477. Order: 1,
  3478. },
  3479. {
  3480. BaseEventAction: dataprovider.BaseEventAction{
  3481. Name: action4.Name,
  3482. },
  3483. Order: 2,
  3484. Options: dataprovider.EventActionOptions{
  3485. IsFailureAction: true,
  3486. },
  3487. },
  3488. },
  3489. }
  3490. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  3491. assert.NoError(t, err)
  3492. r3 := dataprovider.EventRule{
  3493. Name: "test rule3",
  3494. Status: 1,
  3495. Trigger: dataprovider.EventTriggerProviderEvent,
  3496. Conditions: dataprovider.EventConditions{
  3497. ProviderEvents: []string{"delete"},
  3498. },
  3499. Actions: []dataprovider.EventAction{
  3500. {
  3501. BaseEventAction: dataprovider.BaseEventAction{
  3502. Name: action3.Name,
  3503. },
  3504. Order: 1,
  3505. },
  3506. },
  3507. }
  3508. rule3, _, err := httpdtest.AddEventRule(r3, http.StatusCreated)
  3509. assert.NoError(t, err)
  3510. uploadScriptPath := filepath.Join(os.TempDir(), "upload.sh")
  3511. u := getTestUser()
  3512. u.DownloadDataTransfer = 1
  3513. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  3514. assert.NoError(t, err)
  3515. movedFileName := "moved.dat"
  3516. movedPath := filepath.Join(user.HomeDir, movedFileName)
  3517. err = os.WriteFile(uploadScriptPath, getUploadScriptContent(movedPath, "", 0), 0755)
  3518. assert.NoError(t, err)
  3519. action1.Type = dataprovider.ActionTypeCommand
  3520. action1.Options = dataprovider.BaseEventActionOptions{
  3521. CmdConfig: dataprovider.EventActionCommandConfig{
  3522. Cmd: uploadScriptPath,
  3523. Timeout: 10,
  3524. EnvVars: []dataprovider.KeyValue{
  3525. {
  3526. Key: "SFTPGO_ACTION_PATH",
  3527. Value: "{{FsPath}}",
  3528. },
  3529. {
  3530. Key: "CUSTOM_ENV_VAR",
  3531. Value: "value",
  3532. },
  3533. },
  3534. },
  3535. }
  3536. action1, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  3537. assert.NoError(t, err)
  3538. dirName := "subdir"
  3539. conn, client, err := getSftpClient(user)
  3540. if assert.NoError(t, err) {
  3541. defer conn.Close()
  3542. defer client.Close()
  3543. size := int64(32768)
  3544. // rule conditions does not match
  3545. err = writeSFTPFileNoCheck(testFileName, size, client)
  3546. assert.NoError(t, err)
  3547. info, err := client.Stat(testFileName)
  3548. if assert.NoError(t, err) {
  3549. assert.Equal(t, size, info.Size())
  3550. }
  3551. err = client.Mkdir(dirName)
  3552. assert.NoError(t, err)
  3553. err = client.Mkdir("subdir1")
  3554. assert.NoError(t, err)
  3555. // rule conditions match
  3556. lastReceivedEmail.reset()
  3557. err = writeSFTPFileNoCheck(path.Join(dirName, testFileName), size, client)
  3558. assert.NoError(t, err)
  3559. _, err = client.Stat(path.Join(dirName, testFileName))
  3560. assert.Error(t, err)
  3561. info, err = client.Stat(movedFileName)
  3562. if assert.NoError(t, err) {
  3563. assert.Equal(t, size, info.Size())
  3564. }
  3565. assert.Eventually(t, func() bool {
  3566. return lastReceivedEmail.get().From != ""
  3567. }, 3000*time.Millisecond, 100*time.Millisecond)
  3568. email := lastReceivedEmail.get()
  3569. assert.Len(t, email.To, 3)
  3570. assert.True(t, util.Contains(email.To, "[email protected]"))
  3571. assert.True(t, util.Contains(email.To, "[email protected]"))
  3572. assert.True(t, util.Contains(email.To, "[email protected]"))
  3573. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: New "upload" from "%s" status OK`, user.Username))
  3574. // test the failure action, we download a file that exceeds the transfer quota limit
  3575. err = writeSFTPFileNoCheck(path.Join("subdir1", testFileName), 1*1024*1024+65535, client)
  3576. assert.NoError(t, err)
  3577. lastReceivedEmail.reset()
  3578. f, err := client.Open(path.Join("subdir1", testFileName))
  3579. assert.NoError(t, err)
  3580. _, err = io.ReadAll(f)
  3581. if assert.Error(t, err) {
  3582. assert.Contains(t, err.Error(), common.ErrReadQuotaExceeded.Error())
  3583. }
  3584. err = f.Close()
  3585. assert.Error(t, err)
  3586. assert.Eventually(t, func() bool {
  3587. return lastReceivedEmail.get().From != ""
  3588. }, 3000*time.Millisecond, 100*time.Millisecond)
  3589. email = lastReceivedEmail.get()
  3590. assert.Len(t, email.To, 3)
  3591. assert.True(t, util.Contains(email.To, "[email protected]"))
  3592. assert.True(t, util.Contains(email.To, "[email protected]"))
  3593. assert.True(t, util.Contains(email.To, "[email protected]"))
  3594. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: New "download" from "%s" status KO`, user.Username))
  3595. assert.Contains(t, email.Data, `"download" failed`)
  3596. assert.Contains(t, email.Data, common.ErrReadQuotaExceeded.Error())
  3597. _, err = httpdtest.UpdateTransferQuotaUsage(user, "", http.StatusOK)
  3598. assert.NoError(t, err)
  3599. // remove the upload script to test the failure action
  3600. err = os.Remove(uploadScriptPath)
  3601. assert.NoError(t, err)
  3602. lastReceivedEmail.reset()
  3603. err = writeSFTPFileNoCheck(path.Join(dirName, testFileName), size, client)
  3604. assert.Error(t, err)
  3605. assert.Eventually(t, func() bool {
  3606. return lastReceivedEmail.get().From != ""
  3607. }, 3000*time.Millisecond, 100*time.Millisecond)
  3608. email = lastReceivedEmail.get()
  3609. assert.Len(t, email.To, 1)
  3610. assert.True(t, util.Contains(email.To, "[email protected]"))
  3611. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: Failed "upload" from "%s"`, user.Username))
  3612. assert.Contains(t, email.Data, fmt.Sprintf(`action %q failed`, action1.Name))
  3613. // now test the download rule
  3614. lastReceivedEmail.reset()
  3615. f, err = client.Open(movedFileName)
  3616. assert.NoError(t, err)
  3617. contents, err := io.ReadAll(f)
  3618. assert.NoError(t, err)
  3619. err = f.Close()
  3620. assert.NoError(t, err)
  3621. assert.Len(t, contents, int(size))
  3622. assert.Eventually(t, func() bool {
  3623. return lastReceivedEmail.get().From != ""
  3624. }, 3000*time.Millisecond, 100*time.Millisecond)
  3625. email = lastReceivedEmail.get()
  3626. assert.Len(t, email.To, 3)
  3627. assert.True(t, util.Contains(email.To, "[email protected]"))
  3628. assert.True(t, util.Contains(email.To, "[email protected]"))
  3629. assert.True(t, util.Contains(email.To, "[email protected]"))
  3630. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: New "download" from "%s"`, user.Username))
  3631. }
  3632. // test upload action command with arguments
  3633. action1.Options.CmdConfig.Args = []string{"{{Event}}", "{{VirtualPath}}", "custom_arg"}
  3634. action1, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  3635. assert.NoError(t, err)
  3636. uploadLogFilePath := filepath.Join(os.TempDir(), "upload.log")
  3637. err = os.WriteFile(uploadScriptPath, getUploadScriptContent(movedPath, uploadLogFilePath, 0), 0755)
  3638. assert.NoError(t, err)
  3639. conn, client, err = getSftpClient(user)
  3640. if assert.NoError(t, err) {
  3641. defer conn.Close()
  3642. defer client.Close()
  3643. err = writeSFTPFileNoCheck(path.Join(dirName, testFileName), 123, client)
  3644. assert.NoError(t, err)
  3645. logContent, err := os.ReadFile(uploadLogFilePath)
  3646. assert.NoError(t, err)
  3647. assert.Equal(t, fmt.Sprintf("upload %s custom_arg", util.CleanPath(path.Join(dirName, testFileName))),
  3648. strings.TrimSpace(string(logContent)))
  3649. err = os.Remove(uploadLogFilePath)
  3650. assert.NoError(t, err)
  3651. lastReceivedEmail.reset()
  3652. assert.Eventually(t, func() bool {
  3653. return lastReceivedEmail.get().From != ""
  3654. }, 3000*time.Millisecond, 100*time.Millisecond)
  3655. }
  3656. lastReceivedEmail.reset()
  3657. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  3658. assert.NoError(t, err)
  3659. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  3660. assert.NoError(t, err)
  3661. assert.Eventually(t, func() bool {
  3662. return lastReceivedEmail.get().From != ""
  3663. }, 3000*time.Millisecond, 100*time.Millisecond)
  3664. email := lastReceivedEmail.get()
  3665. assert.Len(t, email.To, 3)
  3666. assert.True(t, util.Contains(email.To, "[email protected]"))
  3667. assert.True(t, util.Contains(email.To, "[email protected]"))
  3668. assert.True(t, util.Contains(email.To, "[email protected]"))
  3669. assert.Contains(t, email.Data, `Subject: New "delete" from "admin"`)
  3670. _, err = httpdtest.RemoveEventRule(rule3, http.StatusOK)
  3671. assert.NoError(t, err)
  3672. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  3673. assert.NoError(t, err)
  3674. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  3675. assert.NoError(t, err)
  3676. _, err = httpdtest.RemoveEventAction(action3, http.StatusOK)
  3677. assert.NoError(t, err)
  3678. _, err = httpdtest.RemoveEventAction(action4, http.StatusOK)
  3679. assert.NoError(t, err)
  3680. lastReceivedEmail.reset()
  3681. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  3682. assert.NoError(t, err)
  3683. err = os.RemoveAll(user.GetHomeDir())
  3684. assert.NoError(t, err)
  3685. smtpCfg = smtp.Config{}
  3686. err = smtpCfg.Initialize(configDir, true)
  3687. require.NoError(t, err)
  3688. }
  3689. func TestEventRuleProviderEvents(t *testing.T) {
  3690. if runtime.GOOS == osWindows {
  3691. t.Skip("this test is not available on Windows")
  3692. }
  3693. smtpCfg := smtp.Config{
  3694. Host: "127.0.0.1",
  3695. Port: 2525,
  3696. From: "[email protected]",
  3697. TemplatesPath: "templates",
  3698. }
  3699. err := smtpCfg.Initialize(configDir, true)
  3700. require.NoError(t, err)
  3701. saveObjectScriptPath := filepath.Join(os.TempDir(), "provider.sh")
  3702. outPath := filepath.Join(os.TempDir(), "provider_out.json")
  3703. err = os.WriteFile(saveObjectScriptPath, getSaveProviderObjectScriptContent(outPath, 0), 0755)
  3704. assert.NoError(t, err)
  3705. a1 := dataprovider.BaseEventAction{
  3706. Name: "a1",
  3707. Type: dataprovider.ActionTypeCommand,
  3708. Options: dataprovider.BaseEventActionOptions{
  3709. CmdConfig: dataprovider.EventActionCommandConfig{
  3710. Cmd: saveObjectScriptPath,
  3711. Timeout: 10,
  3712. EnvVars: []dataprovider.KeyValue{
  3713. {
  3714. Key: "SFTPGO_OBJECT_DATA",
  3715. Value: "{{ObjectData}}",
  3716. },
  3717. },
  3718. },
  3719. },
  3720. }
  3721. a2 := dataprovider.BaseEventAction{
  3722. Name: "a2",
  3723. Type: dataprovider.ActionTypeEmail,
  3724. Options: dataprovider.BaseEventActionOptions{
  3725. EmailConfig: dataprovider.EventActionEmailConfig{
  3726. Recipients: []string{"[email protected]"},
  3727. Subject: `New "{{Event}}" from "{{Name}}"`,
  3728. Body: "Object name: {{ObjectName}} object type: {{ObjectType}} Data: {{ObjectData}}",
  3729. },
  3730. },
  3731. }
  3732. a3 := dataprovider.BaseEventAction{
  3733. Name: "a3",
  3734. Type: dataprovider.ActionTypeEmail,
  3735. Options: dataprovider.BaseEventActionOptions{
  3736. EmailConfig: dataprovider.EventActionEmailConfig{
  3737. Recipients: []string{"[email protected]"},
  3738. Subject: `Failed "{{Event}}" from "{{Name}}"`,
  3739. Body: "Object name: {{ObjectName}} object type: {{ObjectType}}, IP: {{IP}}",
  3740. },
  3741. },
  3742. }
  3743. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  3744. assert.NoError(t, err)
  3745. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  3746. assert.NoError(t, err)
  3747. action3, _, err := httpdtest.AddEventAction(a3, http.StatusCreated)
  3748. assert.NoError(t, err)
  3749. r := dataprovider.EventRule{
  3750. Name: "rule",
  3751. Status: 1,
  3752. Trigger: dataprovider.EventTriggerProviderEvent,
  3753. Conditions: dataprovider.EventConditions{
  3754. ProviderEvents: []string{"update"},
  3755. },
  3756. Actions: []dataprovider.EventAction{
  3757. {
  3758. BaseEventAction: dataprovider.BaseEventAction{
  3759. Name: action1.Name,
  3760. },
  3761. Order: 1,
  3762. Options: dataprovider.EventActionOptions{
  3763. StopOnFailure: true,
  3764. },
  3765. },
  3766. {
  3767. BaseEventAction: dataprovider.BaseEventAction{
  3768. Name: action2.Name,
  3769. },
  3770. Order: 2,
  3771. },
  3772. {
  3773. BaseEventAction: dataprovider.BaseEventAction{
  3774. Name: action3.Name,
  3775. },
  3776. Order: 3,
  3777. Options: dataprovider.EventActionOptions{
  3778. IsFailureAction: true,
  3779. StopOnFailure: true,
  3780. },
  3781. },
  3782. },
  3783. }
  3784. rule, _, err := httpdtest.AddEventRule(r, http.StatusCreated)
  3785. assert.NoError(t, err)
  3786. lastReceivedEmail.reset()
  3787. // create and update a folder to trigger the rule
  3788. folder := vfs.BaseVirtualFolder{
  3789. Name: "ftest rule",
  3790. MappedPath: filepath.Join(os.TempDir(), "p"),
  3791. }
  3792. folder, _, err = httpdtest.AddFolder(folder, http.StatusCreated)
  3793. assert.NoError(t, err)
  3794. // no action is triggered on add
  3795. assert.NoFileExists(t, outPath)
  3796. // update the folder
  3797. _, _, err = httpdtest.UpdateFolder(folder, http.StatusOK)
  3798. assert.NoError(t, err)
  3799. if assert.Eventually(t, func() bool {
  3800. _, err := os.Stat(outPath)
  3801. return err == nil
  3802. }, 2*time.Second, 100*time.Millisecond) {
  3803. content, err := os.ReadFile(outPath)
  3804. assert.NoError(t, err)
  3805. var folderGet vfs.BaseVirtualFolder
  3806. err = json.Unmarshal(content, &folderGet)
  3807. assert.NoError(t, err)
  3808. assert.Equal(t, folder, folderGet)
  3809. err = os.Remove(outPath)
  3810. assert.NoError(t, err)
  3811. assert.Eventually(t, func() bool {
  3812. return lastReceivedEmail.get().From != ""
  3813. }, 3000*time.Millisecond, 100*time.Millisecond)
  3814. email := lastReceivedEmail.get()
  3815. assert.Len(t, email.To, 1)
  3816. assert.True(t, util.Contains(email.To, "[email protected]"))
  3817. assert.Contains(t, email.Data, `Subject: New "update" from "admin"`)
  3818. }
  3819. // now delete the script to generate an error
  3820. lastReceivedEmail.reset()
  3821. err = os.Remove(saveObjectScriptPath)
  3822. assert.NoError(t, err)
  3823. _, _, err = httpdtest.UpdateFolder(folder, http.StatusOK)
  3824. assert.NoError(t, err)
  3825. assert.NoFileExists(t, outPath)
  3826. assert.Eventually(t, func() bool {
  3827. return lastReceivedEmail.get().From != ""
  3828. }, 3000*time.Millisecond, 100*time.Millisecond)
  3829. email := lastReceivedEmail.get()
  3830. assert.Len(t, email.To, 1)
  3831. assert.True(t, util.Contains(email.To, "[email protected]"))
  3832. assert.Contains(t, email.Data, `Subject: Failed "update" from "admin"`)
  3833. assert.Contains(t, email.Data, fmt.Sprintf("Object name: %s object type: folder", folder.Name))
  3834. lastReceivedEmail.reset()
  3835. // generate an error for the failure action
  3836. smtpCfg = smtp.Config{}
  3837. err = smtpCfg.Initialize(configDir, true)
  3838. require.NoError(t, err)
  3839. _, _, err = httpdtest.UpdateFolder(folder, http.StatusOK)
  3840. assert.NoError(t, err)
  3841. assert.NoFileExists(t, outPath)
  3842. email = lastReceivedEmail.get()
  3843. assert.Len(t, email.To, 0)
  3844. _, err = httpdtest.RemoveFolder(folder, http.StatusOK)
  3845. assert.NoError(t, err)
  3846. _, err = httpdtest.RemoveEventRule(rule, http.StatusOK)
  3847. assert.NoError(t, err)
  3848. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  3849. assert.NoError(t, err)
  3850. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  3851. assert.NoError(t, err)
  3852. _, err = httpdtest.RemoveEventAction(action3, http.StatusOK)
  3853. assert.NoError(t, err)
  3854. }
  3855. func TestEventRuleFsActions(t *testing.T) {
  3856. dirsToCreate := []string{
  3857. "/basedir/1",
  3858. "/basedir/sub/2",
  3859. "/basedir/3",
  3860. }
  3861. a1 := dataprovider.BaseEventAction{
  3862. Name: "a1",
  3863. Type: dataprovider.ActionTypeFilesystem,
  3864. Options: dataprovider.BaseEventActionOptions{
  3865. FsConfig: dataprovider.EventActionFilesystemConfig{
  3866. Type: dataprovider.FilesystemActionMkdirs,
  3867. MkDirs: dirsToCreate,
  3868. },
  3869. },
  3870. }
  3871. a2 := dataprovider.BaseEventAction{
  3872. Name: "a2",
  3873. Type: dataprovider.ActionTypeFilesystem,
  3874. Options: dataprovider.BaseEventActionOptions{
  3875. FsConfig: dataprovider.EventActionFilesystemConfig{
  3876. Type: dataprovider.FilesystemActionRename,
  3877. Renames: []dataprovider.KeyValue{
  3878. {
  3879. Key: "/{{VirtualDirPath}}/{{ObjectName}}",
  3880. Value: "/{{ObjectName}}_renamed",
  3881. },
  3882. },
  3883. },
  3884. },
  3885. }
  3886. a3 := dataprovider.BaseEventAction{
  3887. Name: "a3",
  3888. Type: dataprovider.ActionTypeFilesystem,
  3889. Options: dataprovider.BaseEventActionOptions{
  3890. FsConfig: dataprovider.EventActionFilesystemConfig{
  3891. Type: dataprovider.FilesystemActionDelete,
  3892. Deletes: []string{"/{{ObjectName}}_renamed"},
  3893. },
  3894. },
  3895. }
  3896. a4 := dataprovider.BaseEventAction{
  3897. Name: "a4",
  3898. Type: dataprovider.ActionTypeFolderQuotaReset,
  3899. }
  3900. a5 := dataprovider.BaseEventAction{
  3901. Name: "a5",
  3902. Type: dataprovider.ActionTypeUserQuotaReset,
  3903. }
  3904. a6 := dataprovider.BaseEventAction{
  3905. Name: "a6",
  3906. Type: dataprovider.ActionTypeFilesystem,
  3907. Options: dataprovider.BaseEventActionOptions{
  3908. FsConfig: dataprovider.EventActionFilesystemConfig{
  3909. Type: dataprovider.FilesystemActionExist,
  3910. Exist: []string{"/{{VirtualPath}}"},
  3911. },
  3912. },
  3913. }
  3914. action1, resp, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  3915. assert.NoError(t, err, string(resp))
  3916. action2, resp, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  3917. assert.NoError(t, err, string(resp))
  3918. action3, resp, err := httpdtest.AddEventAction(a3, http.StatusCreated)
  3919. assert.NoError(t, err, string(resp))
  3920. action4, resp, err := httpdtest.AddEventAction(a4, http.StatusCreated)
  3921. assert.NoError(t, err, string(resp))
  3922. action5, resp, err := httpdtest.AddEventAction(a5, http.StatusCreated)
  3923. assert.NoError(t, err, string(resp))
  3924. action6, resp, err := httpdtest.AddEventAction(a6, http.StatusCreated)
  3925. assert.NoError(t, err, string(resp))
  3926. r1 := dataprovider.EventRule{
  3927. Name: "r1",
  3928. Status: 1,
  3929. Trigger: dataprovider.EventTriggerProviderEvent,
  3930. Conditions: dataprovider.EventConditions{
  3931. ProviderEvents: []string{"add"},
  3932. },
  3933. Actions: []dataprovider.EventAction{
  3934. {
  3935. BaseEventAction: dataprovider.BaseEventAction{
  3936. Name: action1.Name,
  3937. },
  3938. Order: 1,
  3939. },
  3940. },
  3941. }
  3942. r2 := dataprovider.EventRule{
  3943. Name: "r2",
  3944. Status: 1,
  3945. Trigger: dataprovider.EventTriggerFsEvent,
  3946. Conditions: dataprovider.EventConditions{
  3947. FsEvents: []string{"upload"},
  3948. },
  3949. Actions: []dataprovider.EventAction{
  3950. {
  3951. BaseEventAction: dataprovider.BaseEventAction{
  3952. Name: action2.Name,
  3953. },
  3954. Order: 1,
  3955. Options: dataprovider.EventActionOptions{
  3956. ExecuteSync: true,
  3957. },
  3958. },
  3959. {
  3960. BaseEventAction: dataprovider.BaseEventAction{
  3961. Name: action5.Name,
  3962. },
  3963. Order: 2,
  3964. },
  3965. },
  3966. }
  3967. r3 := dataprovider.EventRule{
  3968. Name: "r3",
  3969. Status: 1,
  3970. Trigger: dataprovider.EventTriggerFsEvent,
  3971. Conditions: dataprovider.EventConditions{
  3972. FsEvents: []string{"mkdir"},
  3973. },
  3974. Actions: []dataprovider.EventAction{
  3975. {
  3976. BaseEventAction: dataprovider.BaseEventAction{
  3977. Name: action3.Name,
  3978. },
  3979. Order: 1,
  3980. },
  3981. {
  3982. BaseEventAction: dataprovider.BaseEventAction{
  3983. Name: action6.Name,
  3984. },
  3985. Order: 2,
  3986. },
  3987. },
  3988. }
  3989. r4 := dataprovider.EventRule{
  3990. Name: "r4",
  3991. Status: 1,
  3992. Trigger: dataprovider.EventTriggerFsEvent,
  3993. Conditions: dataprovider.EventConditions{
  3994. FsEvents: []string{"rmdir"},
  3995. },
  3996. Actions: []dataprovider.EventAction{
  3997. {
  3998. BaseEventAction: dataprovider.BaseEventAction{
  3999. Name: action4.Name,
  4000. },
  4001. Order: 1,
  4002. },
  4003. },
  4004. }
  4005. r5 := dataprovider.EventRule{
  4006. Name: "r5",
  4007. Status: 1,
  4008. Trigger: dataprovider.EventTriggerProviderEvent,
  4009. Conditions: dataprovider.EventConditions{
  4010. ProviderEvents: []string{"add"},
  4011. },
  4012. Actions: []dataprovider.EventAction{
  4013. {
  4014. BaseEventAction: dataprovider.BaseEventAction{
  4015. Name: action4.Name,
  4016. },
  4017. Order: 1,
  4018. },
  4019. },
  4020. }
  4021. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4022. assert.NoError(t, err)
  4023. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  4024. assert.NoError(t, err)
  4025. rule3, _, err := httpdtest.AddEventRule(r3, http.StatusCreated)
  4026. assert.NoError(t, err)
  4027. rule4, _, err := httpdtest.AddEventRule(r4, http.StatusCreated)
  4028. assert.NoError(t, err)
  4029. rule5, _, err := httpdtest.AddEventRule(r5, http.StatusCreated)
  4030. assert.NoError(t, err)
  4031. folderMappedPath := filepath.Join(os.TempDir(), "folder")
  4032. err = os.MkdirAll(folderMappedPath, os.ModePerm)
  4033. assert.NoError(t, err)
  4034. err = os.WriteFile(filepath.Join(folderMappedPath, "file.txt"), []byte("1"), 0666)
  4035. assert.NoError(t, err)
  4036. folder, _, err := httpdtest.AddFolder(vfs.BaseVirtualFolder{
  4037. Name: "test folder",
  4038. MappedPath: folderMappedPath,
  4039. }, http.StatusCreated)
  4040. assert.NoError(t, err)
  4041. assert.Eventually(t, func() bool {
  4042. folderGet, _, err := httpdtest.GetFolderByName(folder.Name, http.StatusOK)
  4043. if err != nil {
  4044. return false
  4045. }
  4046. return folderGet.UsedQuotaFiles == 1 && folderGet.UsedQuotaSize == 1
  4047. }, 2*time.Second, 100*time.Millisecond)
  4048. u := getTestUser()
  4049. u.Filters.DisableFsChecks = true
  4050. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4051. assert.NoError(t, err)
  4052. conn, client, err := getSftpClient(user)
  4053. if assert.NoError(t, err) {
  4054. defer conn.Close()
  4055. defer client.Close()
  4056. // check initial directories creation
  4057. for _, dir := range dirsToCreate {
  4058. assert.Eventually(t, func() bool {
  4059. _, err := client.Stat(dir)
  4060. return err == nil
  4061. }, 2*time.Second, 100*time.Millisecond)
  4062. }
  4063. // upload a file and check the sync rename
  4064. size := int64(32768)
  4065. err = writeSFTPFileNoCheck(path.Join("basedir", testFileName), size, client)
  4066. assert.NoError(t, err)
  4067. _, err = client.Stat(path.Join("basedir", testFileName))
  4068. assert.Error(t, err)
  4069. info, err := client.Stat(testFileName + "_renamed")
  4070. if assert.NoError(t, err) {
  4071. assert.Equal(t, size, info.Size())
  4072. }
  4073. assert.NoError(t, err)
  4074. assert.Eventually(t, func() bool {
  4075. userGet, _, err := httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  4076. if err != nil {
  4077. return false
  4078. }
  4079. return userGet.UsedQuotaFiles == 1 && userGet.UsedQuotaSize == size
  4080. }, 2*time.Second, 100*time.Millisecond)
  4081. for i := 0; i < 2; i++ {
  4082. err = client.Mkdir(testFileName)
  4083. assert.NoError(t, err)
  4084. assert.Eventually(t, func() bool {
  4085. _, err = client.Stat(testFileName + "_renamed")
  4086. return err != nil
  4087. }, 2*time.Second, 100*time.Millisecond)
  4088. err = client.RemoveDirectory(testFileName)
  4089. assert.NoError(t, err)
  4090. }
  4091. err = client.Mkdir(testFileName + "_renamed")
  4092. assert.NoError(t, err)
  4093. err = client.Mkdir(testFileName)
  4094. assert.NoError(t, err)
  4095. assert.Eventually(t, func() bool {
  4096. _, err = client.Stat(testFileName + "_renamed")
  4097. return err != nil
  4098. }, 2*time.Second, 100*time.Millisecond)
  4099. }
  4100. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4101. assert.NoError(t, err)
  4102. err = os.RemoveAll(user.GetHomeDir())
  4103. assert.NoError(t, err)
  4104. _, err = httpdtest.RemoveFolder(folder, http.StatusOK)
  4105. assert.NoError(t, err)
  4106. err = os.RemoveAll(folderMappedPath)
  4107. assert.NoError(t, err)
  4108. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4109. assert.NoError(t, err)
  4110. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  4111. assert.NoError(t, err)
  4112. _, err = httpdtest.RemoveEventRule(rule3, http.StatusOK)
  4113. assert.NoError(t, err)
  4114. _, err = httpdtest.RemoveEventRule(rule4, http.StatusOK)
  4115. assert.NoError(t, err)
  4116. _, err = httpdtest.RemoveEventRule(rule5, http.StatusOK)
  4117. assert.NoError(t, err)
  4118. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4119. assert.NoError(t, err)
  4120. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  4121. assert.NoError(t, err)
  4122. _, err = httpdtest.RemoveEventAction(action3, http.StatusOK)
  4123. assert.NoError(t, err)
  4124. _, err = httpdtest.RemoveEventAction(action4, http.StatusOK)
  4125. assert.NoError(t, err)
  4126. _, err = httpdtest.RemoveEventAction(action5, http.StatusOK)
  4127. assert.NoError(t, err)
  4128. _, err = httpdtest.RemoveEventAction(action6, http.StatusOK)
  4129. assert.NoError(t, err)
  4130. }
  4131. func TestEventRulePreDelete(t *testing.T) {
  4132. movePath := "recycle bin"
  4133. a1 := dataprovider.BaseEventAction{
  4134. Name: "a1",
  4135. Type: dataprovider.ActionTypeFilesystem,
  4136. Options: dataprovider.BaseEventActionOptions{
  4137. FsConfig: dataprovider.EventActionFilesystemConfig{
  4138. Type: dataprovider.FilesystemActionRename,
  4139. Renames: []dataprovider.KeyValue{
  4140. {
  4141. Key: "/{{VirtualPath}}",
  4142. Value: fmt.Sprintf("/%s/{{VirtualPath}}", movePath),
  4143. },
  4144. },
  4145. },
  4146. },
  4147. }
  4148. action1, resp, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4149. assert.NoError(t, err, string(resp))
  4150. r1 := dataprovider.EventRule{
  4151. Name: "rule1",
  4152. Status: 1,
  4153. Trigger: dataprovider.EventTriggerFsEvent,
  4154. Conditions: dataprovider.EventConditions{
  4155. FsEvents: []string{"pre-delete"},
  4156. Options: dataprovider.ConditionOptions{
  4157. FsPaths: []dataprovider.ConditionPattern{
  4158. {
  4159. Pattern: fmt.Sprintf("/%s/**", movePath),
  4160. InverseMatch: true,
  4161. },
  4162. },
  4163. },
  4164. },
  4165. Actions: []dataprovider.EventAction{
  4166. {
  4167. BaseEventAction: dataprovider.BaseEventAction{
  4168. Name: action1.Name,
  4169. },
  4170. Order: 1,
  4171. Options: dataprovider.EventActionOptions{
  4172. ExecuteSync: true,
  4173. },
  4174. },
  4175. },
  4176. }
  4177. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4178. assert.NoError(t, err)
  4179. u := getTestUser()
  4180. u.QuotaFiles = 1000
  4181. u.VirtualFolders = []vfs.VirtualFolder{
  4182. {
  4183. BaseVirtualFolder: vfs.BaseVirtualFolder{
  4184. Name: movePath,
  4185. MappedPath: filepath.Join(os.TempDir(), movePath),
  4186. },
  4187. VirtualPath: "/" + movePath,
  4188. QuotaFiles: 1000,
  4189. },
  4190. }
  4191. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4192. assert.NoError(t, err)
  4193. conn, client, err := getSftpClient(user)
  4194. if assert.NoError(t, err) {
  4195. defer conn.Close()
  4196. defer client.Close()
  4197. testDir := "sub dir"
  4198. err = client.MkdirAll(testDir)
  4199. assert.NoError(t, err)
  4200. err = writeSFTPFile(testFileName, 100, client)
  4201. assert.NoError(t, err)
  4202. err = writeSFTPFile(path.Join(testDir, testFileName), 100, client)
  4203. assert.NoError(t, err)
  4204. err = client.Remove(testFileName)
  4205. assert.NoError(t, err)
  4206. err = client.Remove(path.Join(testDir, testFileName))
  4207. assert.NoError(t, err)
  4208. // check files
  4209. _, err = client.Stat(testFileName)
  4210. assert.ErrorIs(t, err, os.ErrNotExist)
  4211. _, err = client.Stat(path.Join(testDir, testFileName))
  4212. assert.ErrorIs(t, err, os.ErrNotExist)
  4213. _, err = client.Stat(path.Join("/", movePath, testFileName))
  4214. assert.NoError(t, err)
  4215. _, err = client.Stat(path.Join("/", movePath, testDir, testFileName))
  4216. assert.NoError(t, err)
  4217. // check quota
  4218. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  4219. assert.NoError(t, err)
  4220. assert.Equal(t, 0, user.UsedQuotaFiles)
  4221. assert.Equal(t, int64(0), user.UsedQuotaSize)
  4222. folder, _, err := httpdtest.GetFolderByName(movePath, http.StatusOK)
  4223. assert.NoError(t, err)
  4224. assert.Equal(t, 2, folder.UsedQuotaFiles)
  4225. assert.Equal(t, int64(200), folder.UsedQuotaSize)
  4226. // pre-delete action is not executed in movePath
  4227. err = client.Remove(path.Join("/", movePath, testFileName))
  4228. assert.NoError(t, err)
  4229. // check quota
  4230. folder, _, err = httpdtest.GetFolderByName(movePath, http.StatusOK)
  4231. assert.NoError(t, err)
  4232. assert.Equal(t, 1, folder.UsedQuotaFiles)
  4233. assert.Equal(t, int64(100), folder.UsedQuotaSize)
  4234. }
  4235. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4236. assert.NoError(t, err)
  4237. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4238. assert.NoError(t, err)
  4239. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4240. assert.NoError(t, err)
  4241. err = os.RemoveAll(user.GetHomeDir())
  4242. assert.NoError(t, err)
  4243. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: movePath}, http.StatusOK)
  4244. assert.NoError(t, err)
  4245. err = os.RemoveAll(filepath.Join(os.TempDir(), movePath))
  4246. assert.NoError(t, err)
  4247. }
  4248. func TestEventRulePreDownloadUpload(t *testing.T) {
  4249. testDir := "/d"
  4250. a1 := dataprovider.BaseEventAction{
  4251. Name: "a1",
  4252. Type: dataprovider.ActionTypeFilesystem,
  4253. Options: dataprovider.BaseEventActionOptions{
  4254. FsConfig: dataprovider.EventActionFilesystemConfig{
  4255. Type: dataprovider.FilesystemActionMkdirs,
  4256. MkDirs: []string{testDir},
  4257. },
  4258. },
  4259. }
  4260. action1, resp, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4261. assert.NoError(t, err, string(resp))
  4262. a2 := dataprovider.BaseEventAction{
  4263. Name: "a2",
  4264. Type: dataprovider.ActionTypeFilesystem,
  4265. Options: dataprovider.BaseEventActionOptions{
  4266. FsConfig: dataprovider.EventActionFilesystemConfig{
  4267. Type: dataprovider.FilesystemActionRename,
  4268. Renames: []dataprovider.KeyValue{
  4269. {
  4270. Key: "/missing source",
  4271. Value: "/missing target",
  4272. },
  4273. },
  4274. },
  4275. },
  4276. }
  4277. action2, resp, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  4278. assert.NoError(t, err, string(resp))
  4279. r1 := dataprovider.EventRule{
  4280. Name: "rule1",
  4281. Status: 1,
  4282. Trigger: dataprovider.EventTriggerFsEvent,
  4283. Conditions: dataprovider.EventConditions{
  4284. FsEvents: []string{"pre-download", "pre-upload"},
  4285. },
  4286. Actions: []dataprovider.EventAction{
  4287. {
  4288. BaseEventAction: dataprovider.BaseEventAction{
  4289. Name: action1.Name,
  4290. },
  4291. Order: 1,
  4292. Options: dataprovider.EventActionOptions{
  4293. ExecuteSync: true,
  4294. },
  4295. },
  4296. },
  4297. }
  4298. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4299. assert.NoError(t, err)
  4300. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  4301. assert.NoError(t, err)
  4302. conn, client, err := getSftpClient(user)
  4303. if assert.NoError(t, err) {
  4304. defer conn.Close()
  4305. defer client.Close()
  4306. // the rule will always succeed, so uploads/downloads will work
  4307. err = writeSFTPFile(testFileName, 100, client)
  4308. assert.NoError(t, err)
  4309. _, err = client.Stat(testDir)
  4310. assert.NoError(t, err)
  4311. err = client.RemoveDirectory(testDir)
  4312. assert.NoError(t, err)
  4313. f, err := client.Open(testFileName)
  4314. assert.NoError(t, err)
  4315. contents := make([]byte, 100)
  4316. n, err := io.ReadFull(f, contents)
  4317. assert.NoError(t, err)
  4318. assert.Equal(t, int(100), n)
  4319. err = f.Close()
  4320. assert.NoError(t, err)
  4321. // disable the rule
  4322. rule1.Status = 0
  4323. _, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  4324. assert.NoError(t, err)
  4325. err = client.RemoveDirectory(testDir)
  4326. assert.NoError(t, err)
  4327. err = client.Remove(testFileName)
  4328. assert.NoError(t, err)
  4329. err = writeSFTPFile(testFileName, 100, client)
  4330. assert.NoError(t, err)
  4331. _, err = client.Stat(testDir)
  4332. assert.ErrorIs(t, err, fs.ErrNotExist)
  4333. // now update the rule so that it will always fail
  4334. rule1.Status = 1
  4335. rule1.Actions = []dataprovider.EventAction{
  4336. {
  4337. BaseEventAction: dataprovider.BaseEventAction{
  4338. Name: action2.Name,
  4339. },
  4340. Order: 1,
  4341. Options: dataprovider.EventActionOptions{
  4342. ExecuteSync: true,
  4343. },
  4344. },
  4345. }
  4346. _, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  4347. assert.NoError(t, err)
  4348. _, err = client.Open(testFileName)
  4349. assert.ErrorIs(t, err, os.ErrPermission)
  4350. err = client.Remove(testFileName)
  4351. assert.NoError(t, err)
  4352. err = writeSFTPFile(testFileName, 100, client)
  4353. assert.ErrorIs(t, err, os.ErrPermission)
  4354. }
  4355. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4356. assert.NoError(t, err)
  4357. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4358. assert.NoError(t, err)
  4359. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  4360. assert.NoError(t, err)
  4361. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4362. assert.NoError(t, err)
  4363. err = os.RemoveAll(user.GetHomeDir())
  4364. assert.NoError(t, err)
  4365. }
  4366. func TestFsActionCopy(t *testing.T) {
  4367. a1 := dataprovider.BaseEventAction{
  4368. Name: "a1",
  4369. Type: dataprovider.ActionTypeFilesystem,
  4370. Options: dataprovider.BaseEventActionOptions{
  4371. FsConfig: dataprovider.EventActionFilesystemConfig{
  4372. Type: dataprovider.FilesystemActionCopy,
  4373. Copy: []dataprovider.KeyValue{
  4374. {
  4375. Key: "/{{VirtualPath}}/",
  4376. Value: "/dircopy/",
  4377. },
  4378. },
  4379. },
  4380. },
  4381. }
  4382. action1, resp, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4383. assert.NoError(t, err, string(resp))
  4384. r1 := dataprovider.EventRule{
  4385. Name: "rule1",
  4386. Status: 1,
  4387. Trigger: dataprovider.EventTriggerFsEvent,
  4388. Conditions: dataprovider.EventConditions{
  4389. FsEvents: []string{"upload"},
  4390. },
  4391. Actions: []dataprovider.EventAction{
  4392. {
  4393. BaseEventAction: dataprovider.BaseEventAction{
  4394. Name: action1.Name,
  4395. },
  4396. Order: 1,
  4397. Options: dataprovider.EventActionOptions{
  4398. ExecuteSync: true,
  4399. },
  4400. },
  4401. },
  4402. }
  4403. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4404. assert.NoError(t, err)
  4405. u := getTestUser()
  4406. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4407. assert.NoError(t, err)
  4408. conn, client, err := getSftpClient(user)
  4409. if assert.NoError(t, err) {
  4410. defer conn.Close()
  4411. defer client.Close()
  4412. err = writeSFTPFile(testFileName, 100, client)
  4413. assert.NoError(t, err)
  4414. _, err = client.Stat(path.Join("dircopy", testFileName))
  4415. assert.NoError(t, err)
  4416. action1.Options.FsConfig.Copy = []dataprovider.KeyValue{
  4417. {
  4418. Key: "/missing path",
  4419. Value: "/copied path",
  4420. },
  4421. }
  4422. _, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  4423. assert.NoError(t, err)
  4424. // copy a missing path will fail
  4425. err = writeSFTPFile(testFileName, 100, client)
  4426. assert.Error(t, err)
  4427. }
  4428. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4429. assert.NoError(t, err)
  4430. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4431. assert.NoError(t, err)
  4432. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4433. assert.NoError(t, err)
  4434. err = os.RemoveAll(user.GetHomeDir())
  4435. assert.NoError(t, err)
  4436. }
  4437. func TestEventFsActionsGroupFilters(t *testing.T) {
  4438. smtpCfg := smtp.Config{
  4439. Host: "127.0.0.1",
  4440. Port: 2525,
  4441. From: "[email protected]",
  4442. TemplatesPath: "templates",
  4443. }
  4444. err := smtpCfg.Initialize(configDir, true)
  4445. require.NoError(t, err)
  4446. a1 := dataprovider.BaseEventAction{
  4447. Name: "a1",
  4448. Type: dataprovider.ActionTypeEmail,
  4449. Options: dataprovider.BaseEventActionOptions{
  4450. EmailConfig: dataprovider.EventActionEmailConfig{
  4451. Recipients: []string{"[email protected]"},
  4452. Subject: `New "{{Event}}" from "{{Name}}" status {{StatusString}}`,
  4453. Body: "Fs path {{FsPath}}, size: {{FileSize}}, protocol: {{Protocol}}, IP: {{IP}} {{ErrorString}}",
  4454. },
  4455. },
  4456. }
  4457. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4458. assert.NoError(t, err)
  4459. r1 := dataprovider.EventRule{
  4460. Name: "rule1",
  4461. Status: 1,
  4462. Trigger: dataprovider.EventTriggerFsEvent,
  4463. Conditions: dataprovider.EventConditions{
  4464. FsEvents: []string{"upload"},
  4465. Options: dataprovider.ConditionOptions{
  4466. GroupNames: []dataprovider.ConditionPattern{
  4467. {
  4468. Pattern: "group*",
  4469. },
  4470. },
  4471. },
  4472. },
  4473. Actions: []dataprovider.EventAction{
  4474. {
  4475. BaseEventAction: dataprovider.BaseEventAction{
  4476. Name: action1.Name,
  4477. },
  4478. Order: 1,
  4479. Options: dataprovider.EventActionOptions{
  4480. ExecuteSync: true,
  4481. },
  4482. },
  4483. },
  4484. }
  4485. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4486. assert.NoError(t, err)
  4487. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  4488. assert.NoError(t, err)
  4489. conn, client, err := getSftpClient(user)
  4490. if assert.NoError(t, err) {
  4491. defer conn.Close()
  4492. defer client.Close()
  4493. // the user has no group, so the rule does not match
  4494. lastReceivedEmail.reset()
  4495. err = writeSFTPFile(testFileName, 32, client)
  4496. assert.NoError(t, err)
  4497. assert.Empty(t, lastReceivedEmail.get().From)
  4498. }
  4499. g1 := dataprovider.Group{
  4500. BaseGroup: sdk.BaseGroup{
  4501. Name: "agroup1",
  4502. },
  4503. }
  4504. group1, _, err := httpdtest.AddGroup(g1, http.StatusCreated)
  4505. assert.NoError(t, err)
  4506. g2 := dataprovider.Group{
  4507. BaseGroup: sdk.BaseGroup{
  4508. Name: "group2",
  4509. },
  4510. }
  4511. group2, _, err := httpdtest.AddGroup(g2, http.StatusCreated)
  4512. assert.NoError(t, err)
  4513. user.Groups = []sdk.GroupMapping{
  4514. {
  4515. Name: group1.Name,
  4516. Type: sdk.GroupTypePrimary,
  4517. },
  4518. }
  4519. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  4520. assert.NoError(t, err)
  4521. conn, client, err = getSftpClient(user)
  4522. if assert.NoError(t, err) {
  4523. defer conn.Close()
  4524. defer client.Close()
  4525. // the group does not match
  4526. lastReceivedEmail.reset()
  4527. err = writeSFTPFile(testFileName, 32, client)
  4528. assert.NoError(t, err)
  4529. assert.Empty(t, lastReceivedEmail.get().From)
  4530. }
  4531. user.Groups = append(user.Groups, sdk.GroupMapping{
  4532. Name: group2.Name,
  4533. Type: sdk.GroupTypeSecondary,
  4534. })
  4535. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  4536. assert.NoError(t, err)
  4537. conn, client, err = getSftpClient(user)
  4538. if assert.NoError(t, err) {
  4539. defer conn.Close()
  4540. defer client.Close()
  4541. // the group matches
  4542. lastReceivedEmail.reset()
  4543. err = writeSFTPFile(testFileName, 32, client)
  4544. assert.NoError(t, err)
  4545. assert.NotEmpty(t, lastReceivedEmail.get().From)
  4546. }
  4547. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4548. assert.NoError(t, err)
  4549. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4550. assert.NoError(t, err)
  4551. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4552. assert.NoError(t, err)
  4553. err = os.RemoveAll(user.GetHomeDir())
  4554. assert.NoError(t, err)
  4555. _, err = httpdtest.RemoveGroup(group1, http.StatusOK)
  4556. assert.NoError(t, err)
  4557. _, err = httpdtest.RemoveGroup(group2, http.StatusOK)
  4558. assert.NoError(t, err)
  4559. smtpCfg = smtp.Config{}
  4560. err = smtpCfg.Initialize(configDir, true)
  4561. require.NoError(t, err)
  4562. }
  4563. func TestBackupAsAttachment(t *testing.T) {
  4564. smtpCfg := smtp.Config{
  4565. Host: "127.0.0.1",
  4566. Port: 2525,
  4567. From: "[email protected]",
  4568. TemplatesPath: "templates",
  4569. }
  4570. err := smtpCfg.Initialize(configDir, true)
  4571. require.NoError(t, err)
  4572. a1 := dataprovider.BaseEventAction{
  4573. Name: "a1",
  4574. Type: dataprovider.ActionTypeBackup,
  4575. }
  4576. a2 := dataprovider.BaseEventAction{
  4577. Name: "a2",
  4578. Type: dataprovider.ActionTypeEmail,
  4579. Options: dataprovider.BaseEventActionOptions{
  4580. EmailConfig: dataprovider.EventActionEmailConfig{
  4581. Recipients: []string{"[email protected]"},
  4582. Subject: `"{{Event}} {{StatusString}}"`,
  4583. Body: "Domain: {{Name}}",
  4584. Attachments: []string{"/{{VirtualPath}}"},
  4585. },
  4586. },
  4587. }
  4588. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4589. assert.NoError(t, err)
  4590. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  4591. assert.NoError(t, err)
  4592. r1 := dataprovider.EventRule{
  4593. Name: "test rule certificate",
  4594. Status: 1,
  4595. Trigger: dataprovider.EventTriggerCertificate,
  4596. Actions: []dataprovider.EventAction{
  4597. {
  4598. BaseEventAction: dataprovider.BaseEventAction{
  4599. Name: action1.Name,
  4600. },
  4601. Order: 1,
  4602. },
  4603. {
  4604. BaseEventAction: dataprovider.BaseEventAction{
  4605. Name: action2.Name,
  4606. },
  4607. Order: 2,
  4608. },
  4609. },
  4610. }
  4611. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4612. assert.NoError(t, err)
  4613. lastReceivedEmail.reset()
  4614. renewalEvent := "Certificate renewal"
  4615. common.HandleCertificateEvent(common.EventParams{
  4616. Name: "example.com",
  4617. Timestamp: time.Now().UnixNano(),
  4618. Status: 1,
  4619. Event: renewalEvent,
  4620. })
  4621. assert.Eventually(t, func() bool {
  4622. return lastReceivedEmail.get().From != ""
  4623. }, 3000*time.Millisecond, 100*time.Millisecond)
  4624. email := lastReceivedEmail.get()
  4625. assert.Len(t, email.To, 1)
  4626. assert.True(t, util.Contains(email.To, "[email protected]"))
  4627. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "%s OK"`, renewalEvent))
  4628. assert.Contains(t, email.Data, `Domain: example.com`)
  4629. assert.Contains(t, email.Data, "Content-Type: application/json")
  4630. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4631. assert.NoError(t, err)
  4632. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4633. assert.NoError(t, err)
  4634. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  4635. assert.NoError(t, err)
  4636. smtpCfg = smtp.Config{}
  4637. err = smtpCfg.Initialize(configDir, true)
  4638. require.NoError(t, err)
  4639. }
  4640. func TestEventActionHTTPMultipart(t *testing.T) {
  4641. a1 := dataprovider.BaseEventAction{
  4642. Name: "action1",
  4643. Type: dataprovider.ActionTypeHTTP,
  4644. Options: dataprovider.BaseEventActionOptions{
  4645. HTTPConfig: dataprovider.EventActionHTTPConfig{
  4646. Endpoint: fmt.Sprintf("http://%s/multipart", httpAddr),
  4647. Method: http.MethodPut,
  4648. Parts: []dataprovider.HTTPPart{
  4649. {
  4650. Name: "part1",
  4651. Headers: []dataprovider.KeyValue{
  4652. {
  4653. Key: "Content-Type",
  4654. Value: "application/json",
  4655. },
  4656. },
  4657. Body: `{"FilePath": "{{VirtualPath}}"}`,
  4658. },
  4659. {
  4660. Name: "file",
  4661. Filepath: "/{{VirtualPath}}",
  4662. },
  4663. },
  4664. },
  4665. },
  4666. }
  4667. action1, resp, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4668. assert.NoError(t, err, string(resp))
  4669. r1 := dataprovider.EventRule{
  4670. Name: "test http multipart",
  4671. Status: 1,
  4672. Trigger: dataprovider.EventTriggerFsEvent,
  4673. Conditions: dataprovider.EventConditions{
  4674. FsEvents: []string{"upload"},
  4675. },
  4676. Actions: []dataprovider.EventAction{
  4677. {
  4678. BaseEventAction: dataprovider.BaseEventAction{
  4679. Name: action1.Name,
  4680. },
  4681. Options: dataprovider.EventActionOptions{
  4682. ExecuteSync: true,
  4683. },
  4684. Order: 1,
  4685. },
  4686. },
  4687. }
  4688. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4689. assert.NoError(t, err)
  4690. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  4691. assert.NoError(t, err)
  4692. conn, client, err := getSftpClient(user)
  4693. if assert.NoError(t, err) {
  4694. defer conn.Close()
  4695. defer client.Close()
  4696. f, err := client.Create(testFileName)
  4697. assert.NoError(t, err)
  4698. _, err = f.Write(testFileContent)
  4699. assert.NoError(t, err)
  4700. err = f.Close()
  4701. assert.NoError(t, err)
  4702. // now add an missing file to the http multipart action
  4703. action1.Options.HTTPConfig.Parts = append(action1.Options.HTTPConfig.Parts, dataprovider.HTTPPart{
  4704. Name: "file1",
  4705. Filepath: "/missing",
  4706. })
  4707. _, resp, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  4708. assert.NoError(t, err, string(resp))
  4709. f, err = client.Create("testfile.txt")
  4710. assert.NoError(t, err)
  4711. _, err = f.Write(testFileContent)
  4712. assert.NoError(t, err)
  4713. err = f.Close()
  4714. assert.Error(t, err)
  4715. }
  4716. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4717. assert.NoError(t, err)
  4718. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4719. assert.NoError(t, err)
  4720. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  4721. assert.NoError(t, err)
  4722. err = os.RemoveAll(user.GetHomeDir())
  4723. assert.NoError(t, err)
  4724. }
  4725. func TestEventActionCompress(t *testing.T) {
  4726. a1 := dataprovider.BaseEventAction{
  4727. Name: "action1",
  4728. Type: dataprovider.ActionTypeFilesystem,
  4729. Options: dataprovider.BaseEventActionOptions{
  4730. FsConfig: dataprovider.EventActionFilesystemConfig{
  4731. Type: dataprovider.FilesystemActionCompress,
  4732. Compress: dataprovider.EventActionFsCompress{
  4733. Name: "/{{VirtualPath}}.zip",
  4734. Paths: []string{"/{{VirtualPath}}"},
  4735. },
  4736. },
  4737. },
  4738. }
  4739. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4740. assert.NoError(t, err)
  4741. r1 := dataprovider.EventRule{
  4742. Name: "test compress",
  4743. Status: 1,
  4744. Trigger: dataprovider.EventTriggerFsEvent,
  4745. Conditions: dataprovider.EventConditions{
  4746. FsEvents: []string{"upload"},
  4747. },
  4748. Actions: []dataprovider.EventAction{
  4749. {
  4750. BaseEventAction: dataprovider.BaseEventAction{
  4751. Name: action1.Name,
  4752. },
  4753. Order: 1,
  4754. Options: dataprovider.EventActionOptions{
  4755. ExecuteSync: true,
  4756. },
  4757. },
  4758. },
  4759. }
  4760. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4761. assert.NoError(t, err)
  4762. u := getTestUser()
  4763. u.QuotaFiles = 1000
  4764. localUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4765. assert.NoError(t, err)
  4766. u = getTestSFTPUser()
  4767. u.FsConfig.SFTPConfig.BufferSize = 1
  4768. u.QuotaFiles = 1000
  4769. sftpUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4770. assert.NoError(t, err)
  4771. u = getCryptFsUser()
  4772. u.QuotaFiles = 1000
  4773. cryptFsUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4774. assert.NoError(t, err)
  4775. for _, user := range []dataprovider.User{localUser, sftpUser, cryptFsUser} {
  4776. // cleanup home dir
  4777. err = os.RemoveAll(user.GetHomeDir())
  4778. assert.NoError(t, err)
  4779. rule1.Conditions.Options.Names = []dataprovider.ConditionPattern{
  4780. {
  4781. Pattern: user.Username,
  4782. },
  4783. }
  4784. _, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  4785. assert.NoError(t, err)
  4786. conn, client, err := getSftpClient(user)
  4787. if assert.NoError(t, err) {
  4788. defer conn.Close()
  4789. defer client.Close()
  4790. expectedQuotaSize := int64(len(testFileContent))
  4791. expectedQuotaFiles := 1
  4792. if user.Username == cryptFsUser.Username {
  4793. encryptedFileSize, err := getEncryptedFileSize(expectedQuotaSize)
  4794. assert.NoError(t, err)
  4795. expectedQuotaSize = encryptedFileSize
  4796. }
  4797. f, err := client.Create(testFileName)
  4798. assert.NoError(t, err)
  4799. _, err = f.Write(testFileContent)
  4800. assert.NoError(t, err)
  4801. err = f.Close()
  4802. assert.NoError(t, err)
  4803. info, err := client.Stat(testFileName + ".zip")
  4804. if assert.NoError(t, err) {
  4805. assert.Greater(t, info.Size(), int64(0))
  4806. // check quota
  4807. archiveSize := info.Size()
  4808. if user.Username == cryptFsUser.Username {
  4809. encryptedFileSize, err := getEncryptedFileSize(archiveSize)
  4810. assert.NoError(t, err)
  4811. archiveSize = encryptedFileSize
  4812. }
  4813. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  4814. assert.NoError(t, err)
  4815. assert.Equal(t, expectedQuotaFiles+1, user.UsedQuotaFiles,
  4816. "quota file does no match for user %q", user.Username)
  4817. assert.Equal(t, expectedQuotaSize+archiveSize, user.UsedQuotaSize,
  4818. "quota size does no match for user %q", user.Username)
  4819. }
  4820. // now overwrite the same file
  4821. f, err = client.Create(testFileName)
  4822. assert.NoError(t, err)
  4823. _, err = f.Write(testFileContent)
  4824. assert.NoError(t, err)
  4825. err = f.Close()
  4826. assert.NoError(t, err)
  4827. info, err = client.Stat(testFileName + ".zip")
  4828. if assert.NoError(t, err) {
  4829. assert.Greater(t, info.Size(), int64(0))
  4830. archiveSize := info.Size()
  4831. if user.Username == cryptFsUser.Username {
  4832. encryptedFileSize, err := getEncryptedFileSize(archiveSize)
  4833. assert.NoError(t, err)
  4834. archiveSize = encryptedFileSize
  4835. }
  4836. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  4837. assert.NoError(t, err)
  4838. assert.Equal(t, expectedQuotaFiles+1, user.UsedQuotaFiles,
  4839. "quota file after overwrite does no match for user %q", user.Username)
  4840. assert.Equal(t, expectedQuotaSize+archiveSize, user.UsedQuotaSize,
  4841. "quota size after overwrite does no match for user %q", user.Username)
  4842. }
  4843. }
  4844. if user.Username == localUser.Username {
  4845. err = os.RemoveAll(user.GetHomeDir())
  4846. assert.NoError(t, err)
  4847. }
  4848. }
  4849. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  4850. assert.NoError(t, err)
  4851. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  4852. assert.NoError(t, err)
  4853. _, err = httpdtest.RemoveUser(sftpUser, http.StatusOK)
  4854. assert.NoError(t, err)
  4855. _, err = httpdtest.RemoveUser(localUser, http.StatusOK)
  4856. assert.NoError(t, err)
  4857. err = os.RemoveAll(localUser.GetHomeDir())
  4858. assert.NoError(t, err)
  4859. _, err = httpdtest.RemoveUser(cryptFsUser, http.StatusOK)
  4860. assert.NoError(t, err)
  4861. err = os.RemoveAll(cryptFsUser.GetHomeDir())
  4862. assert.NoError(t, err)
  4863. }
  4864. func TestEventActionCompressQuotaErrors(t *testing.T) {
  4865. smtpCfg := smtp.Config{
  4866. Host: "127.0.0.1",
  4867. Port: 2525,
  4868. From: "[email protected]",
  4869. TemplatesPath: "templates",
  4870. }
  4871. err := smtpCfg.Initialize(configDir, true)
  4872. require.NoError(t, err)
  4873. testDir := "archiveDir"
  4874. zipPath := "/archive.zip"
  4875. a1 := dataprovider.BaseEventAction{
  4876. Name: "action1",
  4877. Type: dataprovider.ActionTypeFilesystem,
  4878. Options: dataprovider.BaseEventActionOptions{
  4879. FsConfig: dataprovider.EventActionFilesystemConfig{
  4880. Type: dataprovider.FilesystemActionCompress,
  4881. Compress: dataprovider.EventActionFsCompress{
  4882. Name: zipPath,
  4883. Paths: []string{"/" + testDir},
  4884. },
  4885. },
  4886. },
  4887. }
  4888. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  4889. assert.NoError(t, err)
  4890. a2 := dataprovider.BaseEventAction{
  4891. Name: "action2",
  4892. Type: dataprovider.ActionTypeEmail,
  4893. Options: dataprovider.BaseEventActionOptions{
  4894. EmailConfig: dataprovider.EventActionEmailConfig{
  4895. Recipients: []string{"[email protected]"},
  4896. Subject: `"Compress failed"`,
  4897. Body: "Error: {{ErrorString}}",
  4898. },
  4899. },
  4900. }
  4901. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  4902. assert.NoError(t, err)
  4903. r1 := dataprovider.EventRule{
  4904. Name: "test compress",
  4905. Status: 1,
  4906. Trigger: dataprovider.EventTriggerFsEvent,
  4907. Conditions: dataprovider.EventConditions{
  4908. FsEvents: []string{"rename"},
  4909. },
  4910. Actions: []dataprovider.EventAction{
  4911. {
  4912. BaseEventAction: dataprovider.BaseEventAction{
  4913. Name: action1.Name,
  4914. },
  4915. Order: 1,
  4916. },
  4917. {
  4918. BaseEventAction: dataprovider.BaseEventAction{
  4919. Name: action2.Name,
  4920. },
  4921. Options: dataprovider.EventActionOptions{
  4922. IsFailureAction: true,
  4923. },
  4924. Order: 2,
  4925. },
  4926. },
  4927. }
  4928. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  4929. assert.NoError(t, err)
  4930. fileSize := int64(100)
  4931. u := getTestUser()
  4932. u.QuotaSize = 10 * fileSize
  4933. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  4934. assert.NoError(t, err)
  4935. conn, client, err := getSftpClient(user)
  4936. if assert.NoError(t, err) {
  4937. defer conn.Close()
  4938. defer client.Close()
  4939. err = client.MkdirAll(path.Join(testDir, "1", "1"))
  4940. assert.NoError(t, err)
  4941. err = writeSFTPFile(path.Join(testDir, "1", testFileName), fileSize, client)
  4942. assert.NoError(t, err)
  4943. err = client.MkdirAll(path.Join(testDir, "2", "2"))
  4944. assert.NoError(t, err)
  4945. err = writeSFTPFile(path.Join(testDir, "2", testFileName), fileSize, client)
  4946. assert.NoError(t, err)
  4947. err = client.Symlink(path.Join(testDir, "2", testFileName), path.Join(testDir, "2", testFileName+"_link"))
  4948. assert.NoError(t, err)
  4949. // trigger the compress action
  4950. err = client.Mkdir("a")
  4951. assert.NoError(t, err)
  4952. err = client.Rename("a", "b")
  4953. assert.NoError(t, err)
  4954. assert.Eventually(t, func() bool {
  4955. _, err := client.Stat(zipPath)
  4956. return err == nil
  4957. }, 3*time.Second, 100*time.Millisecond)
  4958. err = client.Remove(zipPath)
  4959. assert.NoError(t, err)
  4960. // add other 6 file, the compress action should fail with a quota error
  4961. err = writeSFTPFile(path.Join(testDir, "1", "1", testFileName), fileSize, client)
  4962. assert.NoError(t, err)
  4963. err = writeSFTPFile(path.Join(testDir, "2", "2", testFileName), fileSize, client)
  4964. assert.NoError(t, err)
  4965. err = writeSFTPFile(path.Join(testDir, "1", "1", testFileName+"1"), fileSize, client)
  4966. assert.NoError(t, err)
  4967. err = writeSFTPFile(path.Join(testDir, "2", "2", testFileName+"2"), fileSize, client)
  4968. assert.NoError(t, err)
  4969. err = writeSFTPFile(path.Join(testDir, "1", testFileName+"1"), fileSize, client)
  4970. assert.NoError(t, err)
  4971. err = writeSFTPFile(path.Join(testDir, "2", testFileName+"2"), fileSize, client)
  4972. assert.NoError(t, err)
  4973. lastReceivedEmail.reset()
  4974. err = client.Rename("b", "a")
  4975. assert.NoError(t, err)
  4976. assert.Eventually(t, func() bool {
  4977. return lastReceivedEmail.get().From != ""
  4978. }, 3*time.Second, 100*time.Millisecond)
  4979. email := lastReceivedEmail.get()
  4980. assert.Len(t, email.To, 1)
  4981. assert.True(t, util.Contains(email.To, "[email protected]"))
  4982. assert.Contains(t, email.Data, `Subject: "Compress failed"`)
  4983. assert.Contains(t, email.Data, common.ErrQuotaExceeded.Error())
  4984. // update quota size so the user is already overquota
  4985. user.QuotaSize = 7 * fileSize
  4986. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  4987. assert.NoError(t, err)
  4988. lastReceivedEmail.reset()
  4989. err = client.Rename("a", "b")
  4990. assert.NoError(t, err)
  4991. assert.Eventually(t, func() bool {
  4992. return lastReceivedEmail.get().From != ""
  4993. }, 3*time.Second, 100*time.Millisecond)
  4994. email = lastReceivedEmail.get()
  4995. assert.Len(t, email.To, 1)
  4996. assert.True(t, util.Contains(email.To, "[email protected]"))
  4997. assert.Contains(t, email.Data, `Subject: "Compress failed"`)
  4998. assert.Contains(t, email.Data, common.ErrQuotaExceeded.Error())
  4999. // remove the path to compress to trigger an error for size estimation
  5000. out, err := runSSHCommand(fmt.Sprintf("sftpgo-remove %s", testDir), user)
  5001. assert.NoError(t, err, string(out))
  5002. lastReceivedEmail.reset()
  5003. err = client.Rename("b", "a")
  5004. assert.NoError(t, err)
  5005. assert.Eventually(t, func() bool {
  5006. return lastReceivedEmail.get().From != ""
  5007. }, 3*time.Second, 100*time.Millisecond)
  5008. email = lastReceivedEmail.get()
  5009. assert.Len(t, email.To, 1)
  5010. assert.True(t, util.Contains(email.To, "[email protected]"))
  5011. assert.Contains(t, email.Data, `Subject: "Compress failed"`)
  5012. assert.Contains(t, email.Data, "unable to estimate archive size")
  5013. }
  5014. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5015. assert.NoError(t, err)
  5016. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5017. assert.NoError(t, err)
  5018. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  5019. assert.NoError(t, err)
  5020. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5021. assert.NoError(t, err)
  5022. err = os.RemoveAll(user.GetHomeDir())
  5023. assert.NoError(t, err)
  5024. smtpCfg = smtp.Config{}
  5025. err = smtpCfg.Initialize(configDir, true)
  5026. require.NoError(t, err)
  5027. }
  5028. func TestEventActionCompressQuotaFolder(t *testing.T) {
  5029. testDir := "/folder"
  5030. a1 := dataprovider.BaseEventAction{
  5031. Name: "action1",
  5032. Type: dataprovider.ActionTypeFilesystem,
  5033. Options: dataprovider.BaseEventActionOptions{
  5034. FsConfig: dataprovider.EventActionFilesystemConfig{
  5035. Type: dataprovider.FilesystemActionCompress,
  5036. Compress: dataprovider.EventActionFsCompress{
  5037. Name: "/{{VirtualPath}}.zip",
  5038. Paths: []string{"/{{VirtualPath}}", testDir},
  5039. },
  5040. },
  5041. },
  5042. }
  5043. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5044. assert.NoError(t, err)
  5045. r1 := dataprovider.EventRule{
  5046. Name: "test compress",
  5047. Status: 1,
  5048. Trigger: dataprovider.EventTriggerFsEvent,
  5049. Conditions: dataprovider.EventConditions{
  5050. FsEvents: []string{"upload"},
  5051. },
  5052. Actions: []dataprovider.EventAction{
  5053. {
  5054. BaseEventAction: dataprovider.BaseEventAction{
  5055. Name: action1.Name,
  5056. },
  5057. Order: 1,
  5058. Options: dataprovider.EventActionOptions{
  5059. ExecuteSync: true,
  5060. },
  5061. },
  5062. },
  5063. }
  5064. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5065. assert.NoError(t, err)
  5066. u := getTestUser()
  5067. u.QuotaFiles = 1000
  5068. mappedPath := filepath.Join(os.TempDir(), "virtualpath")
  5069. folderName := filepath.Base(mappedPath)
  5070. vdirPath := "/virtualpath"
  5071. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  5072. BaseVirtualFolder: vfs.BaseVirtualFolder{
  5073. Name: folderName,
  5074. MappedPath: mappedPath,
  5075. },
  5076. VirtualPath: vdirPath,
  5077. QuotaSize: -1,
  5078. QuotaFiles: -1,
  5079. })
  5080. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  5081. assert.NoError(t, err)
  5082. conn, client, err := getSftpClient(user)
  5083. if assert.NoError(t, err) {
  5084. defer conn.Close()
  5085. defer client.Close()
  5086. err = client.Mkdir(testDir)
  5087. assert.NoError(t, err)
  5088. expectedQuotaSize := int64(len(testFileContent))
  5089. expectedQuotaFiles := 1
  5090. err = client.Symlink(path.Join(testDir, testFileName), path.Join(testDir, testFileName+"_link"))
  5091. assert.NoError(t, err)
  5092. f, err := client.Create(path.Join(testDir, testFileName))
  5093. assert.NoError(t, err)
  5094. _, err = f.Write(testFileContent)
  5095. assert.NoError(t, err)
  5096. err = f.Close()
  5097. assert.NoError(t, err)
  5098. info, err := client.Stat(path.Join(testDir, testFileName) + ".zip")
  5099. if assert.NoError(t, err) {
  5100. assert.Greater(t, info.Size(), int64(0))
  5101. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  5102. assert.NoError(t, err)
  5103. expectedQuotaFiles++
  5104. expectedQuotaSize += info.Size()
  5105. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  5106. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  5107. }
  5108. vfolder, _, err := httpdtest.GetFolderByName(folderName, http.StatusOK)
  5109. assert.NoError(t, err)
  5110. assert.Equal(t, 0, vfolder.UsedQuotaFiles)
  5111. assert.Equal(t, int64(0), vfolder.UsedQuotaSize)
  5112. // upload in the virtual path
  5113. f, err = client.Create(path.Join(vdirPath, testFileName))
  5114. assert.NoError(t, err)
  5115. _, err = f.Write(testFileContent)
  5116. assert.NoError(t, err)
  5117. err = f.Close()
  5118. assert.NoError(t, err)
  5119. info, err = client.Stat(path.Join(vdirPath, testFileName) + ".zip")
  5120. if assert.NoError(t, err) {
  5121. assert.Greater(t, info.Size(), int64(0))
  5122. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  5123. assert.NoError(t, err)
  5124. expectedQuotaFiles += 2
  5125. expectedQuotaSize += info.Size() + int64(len(testFileContent))
  5126. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  5127. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  5128. vfolder, _, err := httpdtest.GetFolderByName(folderName, http.StatusOK)
  5129. assert.NoError(t, err)
  5130. assert.Equal(t, 2, vfolder.UsedQuotaFiles)
  5131. assert.Equal(t, info.Size()+int64(len(testFileContent)), vfolder.UsedQuotaSize)
  5132. }
  5133. }
  5134. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5135. assert.NoError(t, err)
  5136. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5137. assert.NoError(t, err)
  5138. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5139. assert.NoError(t, err)
  5140. err = os.RemoveAll(user.GetHomeDir())
  5141. assert.NoError(t, err)
  5142. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName}, http.StatusOK)
  5143. assert.NoError(t, err)
  5144. err = os.RemoveAll(mappedPath)
  5145. assert.NoError(t, err)
  5146. }
  5147. func TestEventActionCompressErrors(t *testing.T) {
  5148. a1 := dataprovider.BaseEventAction{
  5149. Name: "action1",
  5150. Type: dataprovider.ActionTypeFilesystem,
  5151. Options: dataprovider.BaseEventActionOptions{
  5152. FsConfig: dataprovider.EventActionFilesystemConfig{
  5153. Type: dataprovider.FilesystemActionCompress,
  5154. Compress: dataprovider.EventActionFsCompress{
  5155. Name: "/{{VirtualPath}}.zip",
  5156. Paths: []string{"/{{VirtualPath}}.zip"}, // cannot compress itself
  5157. },
  5158. },
  5159. },
  5160. }
  5161. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5162. assert.NoError(t, err)
  5163. r1 := dataprovider.EventRule{
  5164. Name: "test compress",
  5165. Status: 1,
  5166. Trigger: dataprovider.EventTriggerFsEvent,
  5167. Conditions: dataprovider.EventConditions{
  5168. FsEvents: []string{"upload"},
  5169. },
  5170. Actions: []dataprovider.EventAction{
  5171. {
  5172. BaseEventAction: dataprovider.BaseEventAction{
  5173. Name: action1.Name,
  5174. },
  5175. Order: 1,
  5176. Options: dataprovider.EventActionOptions{
  5177. ExecuteSync: true,
  5178. },
  5179. },
  5180. },
  5181. }
  5182. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5183. assert.NoError(t, err)
  5184. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  5185. assert.NoError(t, err)
  5186. conn, client, err := getSftpClient(user)
  5187. if assert.NoError(t, err) {
  5188. defer conn.Close()
  5189. defer client.Close()
  5190. f, err := client.Create(testFileName)
  5191. assert.NoError(t, err)
  5192. _, err = f.Write(testFileContent)
  5193. assert.NoError(t, err)
  5194. err = f.Close()
  5195. assert.Error(t, err)
  5196. }
  5197. // try to compress a missing file
  5198. action1.Options.FsConfig.Compress.Paths = []string{"/missing file"}
  5199. _, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  5200. assert.NoError(t, err)
  5201. conn, client, err = getSftpClient(user)
  5202. if assert.NoError(t, err) {
  5203. defer conn.Close()
  5204. defer client.Close()
  5205. f, err := client.Create(testFileName)
  5206. assert.NoError(t, err)
  5207. _, err = f.Write(testFileContent)
  5208. assert.NoError(t, err)
  5209. err = f.Close()
  5210. assert.Error(t, err)
  5211. }
  5212. // try to overwrite a directory
  5213. testDir := "/adir"
  5214. action1.Options.FsConfig.Compress.Name = testDir
  5215. action1.Options.FsConfig.Compress.Paths = []string{"/{{VirtualPath}}"}
  5216. _, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  5217. assert.NoError(t, err)
  5218. conn, client, err = getSftpClient(user)
  5219. if assert.NoError(t, err) {
  5220. defer conn.Close()
  5221. defer client.Close()
  5222. err = client.Mkdir(testDir)
  5223. assert.NoError(t, err)
  5224. f, err := client.Create(testFileName)
  5225. assert.NoError(t, err)
  5226. _, err = f.Write(testFileContent)
  5227. assert.NoError(t, err)
  5228. err = f.Close()
  5229. assert.Error(t, err)
  5230. }
  5231. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5232. assert.NoError(t, err)
  5233. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5234. assert.NoError(t, err)
  5235. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5236. assert.NoError(t, err)
  5237. err = os.RemoveAll(user.GetHomeDir())
  5238. assert.NoError(t, err)
  5239. }
  5240. func TestEventActionEmailAttachments(t *testing.T) {
  5241. smtpCfg := smtp.Config{
  5242. Host: "127.0.0.1",
  5243. Port: 2525,
  5244. From: "[email protected]",
  5245. TemplatesPath: "templates",
  5246. }
  5247. err := smtpCfg.Initialize(configDir, true)
  5248. require.NoError(t, err)
  5249. a1 := dataprovider.BaseEventAction{
  5250. Name: "action1",
  5251. Type: dataprovider.ActionTypeFilesystem,
  5252. Options: dataprovider.BaseEventActionOptions{
  5253. FsConfig: dataprovider.EventActionFilesystemConfig{
  5254. Type: dataprovider.FilesystemActionCompress,
  5255. Compress: dataprovider.EventActionFsCompress{
  5256. Name: "/archive/{{VirtualPath}}.zip",
  5257. Paths: []string{"/{{VirtualPath}}"},
  5258. },
  5259. },
  5260. },
  5261. }
  5262. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5263. assert.NoError(t, err)
  5264. a2 := dataprovider.BaseEventAction{
  5265. Name: "action2",
  5266. Type: dataprovider.ActionTypeEmail,
  5267. Options: dataprovider.BaseEventActionOptions{
  5268. EmailConfig: dataprovider.EventActionEmailConfig{
  5269. Recipients: []string{"[email protected]"},
  5270. Subject: `"{{Event}}" from "{{Name}}"`,
  5271. Body: "Fs path {{FsPath}}, size: {{FileSize}}, protocol: {{Protocol}}, IP: {{IP}}",
  5272. Attachments: []string{"/archive/{{VirtualPath}}.zip"},
  5273. },
  5274. },
  5275. }
  5276. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  5277. assert.NoError(t, err)
  5278. r1 := dataprovider.EventRule{
  5279. Name: "test email with attachment",
  5280. Status: 1,
  5281. Trigger: dataprovider.EventTriggerFsEvent,
  5282. Conditions: dataprovider.EventConditions{
  5283. FsEvents: []string{"upload"},
  5284. },
  5285. Actions: []dataprovider.EventAction{
  5286. {
  5287. BaseEventAction: dataprovider.BaseEventAction{
  5288. Name: action1.Name,
  5289. },
  5290. Order: 1,
  5291. },
  5292. {
  5293. BaseEventAction: dataprovider.BaseEventAction{
  5294. Name: action2.Name,
  5295. },
  5296. Order: 2,
  5297. },
  5298. },
  5299. }
  5300. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5301. assert.NoError(t, err)
  5302. localUser, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  5303. assert.NoError(t, err)
  5304. u := getTestSFTPUser()
  5305. u.FsConfig.SFTPConfig.BufferSize = 1
  5306. sftpUser, _, err := httpdtest.AddUser(u, http.StatusCreated)
  5307. assert.NoError(t, err)
  5308. cryptFsUser, _, err := httpdtest.AddUser(getCryptFsUser(), http.StatusCreated)
  5309. assert.NoError(t, err)
  5310. for _, user := range []dataprovider.User{localUser, sftpUser, cryptFsUser} {
  5311. conn, client, err := getSftpClient(user)
  5312. if assert.NoError(t, err) {
  5313. defer conn.Close()
  5314. defer client.Close()
  5315. lastReceivedEmail.reset()
  5316. f, err := client.Create(testFileName)
  5317. assert.NoError(t, err)
  5318. _, err = f.Write(testFileContent)
  5319. assert.NoError(t, err)
  5320. err = f.Close()
  5321. assert.NoError(t, err)
  5322. assert.Eventually(t, func() bool {
  5323. return lastReceivedEmail.get().From != ""
  5324. }, 1500*time.Millisecond, 100*time.Millisecond)
  5325. email := lastReceivedEmail.get()
  5326. assert.Len(t, email.To, 1)
  5327. assert.True(t, util.Contains(email.To, "[email protected]"))
  5328. assert.Contains(t, email.Data, `Subject: "upload" from`)
  5329. assert.Contains(t, email.Data, "Content-Disposition: attachment")
  5330. }
  5331. }
  5332. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5333. assert.NoError(t, err)
  5334. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5335. assert.NoError(t, err)
  5336. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  5337. assert.NoError(t, err)
  5338. _, err = httpdtest.RemoveUser(sftpUser, http.StatusOK)
  5339. assert.NoError(t, err)
  5340. _, err = httpdtest.RemoveUser(localUser, http.StatusOK)
  5341. assert.NoError(t, err)
  5342. err = os.RemoveAll(localUser.GetHomeDir())
  5343. assert.NoError(t, err)
  5344. _, err = httpdtest.RemoveUser(cryptFsUser, http.StatusOK)
  5345. assert.NoError(t, err)
  5346. err = os.RemoveAll(cryptFsUser.GetHomeDir())
  5347. assert.NoError(t, err)
  5348. smtpCfg = smtp.Config{}
  5349. err = smtpCfg.Initialize(configDir, true)
  5350. require.NoError(t, err)
  5351. }
  5352. func TestEventActionsRetentionReports(t *testing.T) {
  5353. smtpCfg := smtp.Config{
  5354. Host: "127.0.0.1",
  5355. Port: 2525,
  5356. From: "[email protected]",
  5357. TemplatesPath: "templates",
  5358. }
  5359. err := smtpCfg.Initialize(configDir, true)
  5360. require.NoError(t, err)
  5361. testDir := "/d"
  5362. a1 := dataprovider.BaseEventAction{
  5363. Name: "action1",
  5364. Type: dataprovider.ActionTypeDataRetentionCheck,
  5365. Options: dataprovider.BaseEventActionOptions{
  5366. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  5367. Folders: []dataprovider.FolderRetention{
  5368. {
  5369. Path: testDir,
  5370. Retention: 1,
  5371. DeleteEmptyDirs: true,
  5372. IgnoreUserPermissions: true,
  5373. },
  5374. },
  5375. },
  5376. },
  5377. }
  5378. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5379. assert.NoError(t, err)
  5380. a2 := dataprovider.BaseEventAction{
  5381. Name: "action2",
  5382. Type: dataprovider.ActionTypeEmail,
  5383. Options: dataprovider.BaseEventActionOptions{
  5384. EmailConfig: dataprovider.EventActionEmailConfig{
  5385. Recipients: []string{"[email protected]"},
  5386. Subject: `"{{Event}}" from "{{Name}}"`,
  5387. Body: "Fs path {{FsPath}}, size: {{FileSize}}, protocol: {{Protocol}}, IP: {{IP}}",
  5388. Attachments: []string{dataprovider.RetentionReportPlaceHolder},
  5389. },
  5390. },
  5391. }
  5392. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  5393. assert.NoError(t, err)
  5394. a3 := dataprovider.BaseEventAction{
  5395. Name: "action3",
  5396. Type: dataprovider.ActionTypeHTTP,
  5397. Options: dataprovider.BaseEventActionOptions{
  5398. HTTPConfig: dataprovider.EventActionHTTPConfig{
  5399. Endpoint: fmt.Sprintf("http://%s/", httpAddr),
  5400. Timeout: 20,
  5401. Method: http.MethodPost,
  5402. Body: dataprovider.RetentionReportPlaceHolder,
  5403. },
  5404. },
  5405. }
  5406. action3, _, err := httpdtest.AddEventAction(a3, http.StatusCreated)
  5407. assert.NoError(t, err)
  5408. a4 := dataprovider.BaseEventAction{
  5409. Name: "action4",
  5410. Type: dataprovider.ActionTypeHTTP,
  5411. Options: dataprovider.BaseEventActionOptions{
  5412. HTTPConfig: dataprovider.EventActionHTTPConfig{
  5413. Endpoint: fmt.Sprintf("http://%s/multipart", httpAddr),
  5414. Timeout: 20,
  5415. Method: http.MethodPost,
  5416. Parts: []dataprovider.HTTPPart{
  5417. {
  5418. Name: "reports.zip",
  5419. Filepath: dataprovider.RetentionReportPlaceHolder,
  5420. },
  5421. },
  5422. },
  5423. },
  5424. }
  5425. action4, _, err := httpdtest.AddEventAction(a4, http.StatusCreated)
  5426. assert.NoError(t, err)
  5427. r1 := dataprovider.EventRule{
  5428. Name: "test rule1",
  5429. Status: 1,
  5430. Trigger: dataprovider.EventTriggerFsEvent,
  5431. Conditions: dataprovider.EventConditions{
  5432. FsEvents: []string{"upload"},
  5433. },
  5434. Actions: []dataprovider.EventAction{
  5435. {
  5436. BaseEventAction: dataprovider.BaseEventAction{
  5437. Name: action1.Name,
  5438. },
  5439. Order: 1,
  5440. Options: dataprovider.EventActionOptions{
  5441. ExecuteSync: true,
  5442. StopOnFailure: true,
  5443. },
  5444. },
  5445. {
  5446. BaseEventAction: dataprovider.BaseEventAction{
  5447. Name: action2.Name,
  5448. },
  5449. Order: 2,
  5450. Options: dataprovider.EventActionOptions{
  5451. ExecuteSync: true,
  5452. StopOnFailure: true,
  5453. },
  5454. },
  5455. {
  5456. BaseEventAction: dataprovider.BaseEventAction{
  5457. Name: action3.Name,
  5458. },
  5459. Order: 3,
  5460. Options: dataprovider.EventActionOptions{
  5461. ExecuteSync: true,
  5462. StopOnFailure: true,
  5463. },
  5464. },
  5465. {
  5466. BaseEventAction: dataprovider.BaseEventAction{
  5467. Name: action4.Name,
  5468. },
  5469. Order: 4,
  5470. Options: dataprovider.EventActionOptions{
  5471. ExecuteSync: true,
  5472. StopOnFailure: true,
  5473. },
  5474. },
  5475. },
  5476. }
  5477. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5478. assert.NoError(t, err)
  5479. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  5480. assert.NoError(t, err)
  5481. conn, client, err := getSftpClient(user)
  5482. if assert.NoError(t, err) {
  5483. defer conn.Close()
  5484. defer client.Close()
  5485. subdir := path.Join(testDir, "sub")
  5486. err = client.MkdirAll(subdir)
  5487. assert.NoError(t, err)
  5488. lastReceivedEmail.reset()
  5489. f, err := client.Create(testFileName)
  5490. assert.NoError(t, err)
  5491. _, err = f.Write(testFileContent)
  5492. assert.NoError(t, err)
  5493. err = f.Close()
  5494. assert.NoError(t, err)
  5495. email := lastReceivedEmail.get()
  5496. assert.Len(t, email.To, 1)
  5497. assert.True(t, util.Contains(email.To, "[email protected]"))
  5498. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "upload" from "%s"`, user.Username))
  5499. assert.Contains(t, email.Data, "Content-Disposition: attachment")
  5500. _, err = client.Stat(testDir)
  5501. assert.NoError(t, err)
  5502. _, err = client.Stat(subdir)
  5503. assert.ErrorIs(t, err, os.ErrNotExist)
  5504. err = client.Mkdir(subdir)
  5505. assert.NoError(t, err)
  5506. newName := path.Join(testDir, testFileName)
  5507. err = client.Rename(testFileName, newName)
  5508. assert.NoError(t, err)
  5509. err = client.Chtimes(newName, time.Now().Add(-24*time.Hour), time.Now().Add(-24*time.Hour))
  5510. assert.NoError(t, err)
  5511. lastReceivedEmail.reset()
  5512. f, err = client.Create(testFileName)
  5513. assert.NoError(t, err)
  5514. _, err = f.Write(testFileContent)
  5515. assert.NoError(t, err)
  5516. err = f.Close()
  5517. assert.NoError(t, err)
  5518. email = lastReceivedEmail.get()
  5519. assert.Len(t, email.To, 1)
  5520. _, err = client.Stat(subdir)
  5521. assert.ErrorIs(t, err, os.ErrNotExist)
  5522. _, err = client.Stat(subdir)
  5523. assert.ErrorIs(t, err, os.ErrNotExist)
  5524. }
  5525. // now remove the retention check to test errors
  5526. rule1.Actions = []dataprovider.EventAction{
  5527. {
  5528. BaseEventAction: dataprovider.BaseEventAction{
  5529. Name: action2.Name,
  5530. },
  5531. Order: 2,
  5532. Options: dataprovider.EventActionOptions{
  5533. ExecuteSync: true,
  5534. StopOnFailure: false,
  5535. },
  5536. },
  5537. {
  5538. BaseEventAction: dataprovider.BaseEventAction{
  5539. Name: action3.Name,
  5540. },
  5541. Order: 3,
  5542. Options: dataprovider.EventActionOptions{
  5543. ExecuteSync: true,
  5544. StopOnFailure: false,
  5545. },
  5546. },
  5547. {
  5548. BaseEventAction: dataprovider.BaseEventAction{
  5549. Name: action4.Name,
  5550. },
  5551. Order: 4,
  5552. Options: dataprovider.EventActionOptions{
  5553. ExecuteSync: true,
  5554. StopOnFailure: false,
  5555. },
  5556. },
  5557. }
  5558. _, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  5559. assert.NoError(t, err)
  5560. conn, client, err = getSftpClient(user)
  5561. if assert.NoError(t, err) {
  5562. defer conn.Close()
  5563. defer client.Close()
  5564. f, err := client.Create(testFileName)
  5565. assert.NoError(t, err)
  5566. _, err = f.Write(testFileContent)
  5567. assert.NoError(t, err)
  5568. err = f.Close()
  5569. assert.Error(t, err)
  5570. }
  5571. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5572. assert.NoError(t, err)
  5573. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5574. assert.NoError(t, err)
  5575. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  5576. assert.NoError(t, err)
  5577. _, err = httpdtest.RemoveEventAction(action3, http.StatusOK)
  5578. assert.NoError(t, err)
  5579. _, err = httpdtest.RemoveEventAction(action4, http.StatusOK)
  5580. assert.NoError(t, err)
  5581. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5582. assert.NoError(t, err)
  5583. err = os.RemoveAll(user.GetHomeDir())
  5584. assert.NoError(t, err)
  5585. smtpCfg = smtp.Config{}
  5586. err = smtpCfg.Initialize(configDir, true)
  5587. require.NoError(t, err)
  5588. }
  5589. func TestEventRuleFirstUploadDownloadActions(t *testing.T) {
  5590. smtpCfg := smtp.Config{
  5591. Host: "127.0.0.1",
  5592. Port: 2525,
  5593. From: "[email protected]",
  5594. TemplatesPath: "templates",
  5595. }
  5596. err := smtpCfg.Initialize(configDir, true)
  5597. require.NoError(t, err)
  5598. a1 := dataprovider.BaseEventAction{
  5599. Name: "action1",
  5600. Type: dataprovider.ActionTypeEmail,
  5601. Options: dataprovider.BaseEventActionOptions{
  5602. EmailConfig: dataprovider.EventActionEmailConfig{
  5603. Recipients: []string{"[email protected]"},
  5604. Subject: `"{{Event}}" from "{{Name}}"`,
  5605. Body: "Fs path {{FsPath}}, size: {{FileSize}}, protocol: {{Protocol}}, IP: {{IP}}",
  5606. },
  5607. },
  5608. }
  5609. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5610. assert.NoError(t, err)
  5611. r1 := dataprovider.EventRule{
  5612. Name: "test first upload rule",
  5613. Status: 1,
  5614. Trigger: dataprovider.EventTriggerFsEvent,
  5615. Conditions: dataprovider.EventConditions{
  5616. FsEvents: []string{"first-upload"},
  5617. },
  5618. Actions: []dataprovider.EventAction{
  5619. {
  5620. BaseEventAction: dataprovider.BaseEventAction{
  5621. Name: action1.Name,
  5622. },
  5623. Order: 1,
  5624. },
  5625. },
  5626. }
  5627. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5628. assert.NoError(t, err)
  5629. r2 := dataprovider.EventRule{
  5630. Name: "test first download rule",
  5631. Status: 1,
  5632. Trigger: dataprovider.EventTriggerFsEvent,
  5633. Conditions: dataprovider.EventConditions{
  5634. FsEvents: []string{"first-download"},
  5635. },
  5636. Actions: []dataprovider.EventAction{
  5637. {
  5638. BaseEventAction: dataprovider.BaseEventAction{
  5639. Name: action1.Name,
  5640. },
  5641. Order: 1,
  5642. },
  5643. },
  5644. }
  5645. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  5646. assert.NoError(t, err)
  5647. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  5648. assert.NoError(t, err)
  5649. conn, client, err := getSftpClient(user)
  5650. if assert.NoError(t, err) {
  5651. defer conn.Close()
  5652. defer client.Close()
  5653. testFileSize := int64(32768)
  5654. lastReceivedEmail.reset()
  5655. err = writeSFTPFileNoCheck(testFileName, testFileSize, client)
  5656. assert.NoError(t, err)
  5657. assert.Eventually(t, func() bool {
  5658. return lastReceivedEmail.get().From != ""
  5659. }, 1500*time.Millisecond, 100*time.Millisecond)
  5660. email := lastReceivedEmail.get()
  5661. assert.Len(t, email.To, 1)
  5662. assert.True(t, util.Contains(email.To, "[email protected]"))
  5663. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "first-upload" from "%s"`, user.Username))
  5664. lastReceivedEmail.reset()
  5665. // a new upload will not produce a new notification
  5666. err = writeSFTPFileNoCheck(testFileName+"_1", 32768, client)
  5667. assert.NoError(t, err)
  5668. assert.Never(t, func() bool {
  5669. return lastReceivedEmail.get().From != ""
  5670. }, 1000*time.Millisecond, 100*time.Millisecond)
  5671. // the same for download
  5672. f, err := client.Open(testFileName)
  5673. assert.NoError(t, err)
  5674. contents := make([]byte, testFileSize)
  5675. n, err := io.ReadFull(f, contents)
  5676. assert.NoError(t, err)
  5677. assert.Equal(t, int(testFileSize), n)
  5678. err = f.Close()
  5679. assert.NoError(t, err)
  5680. assert.Eventually(t, func() bool {
  5681. return lastReceivedEmail.get().From != ""
  5682. }, 1500*time.Millisecond, 100*time.Millisecond)
  5683. email = lastReceivedEmail.get()
  5684. assert.Len(t, email.To, 1)
  5685. assert.True(t, util.Contains(email.To, "[email protected]"))
  5686. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "first-download" from "%s"`, user.Username))
  5687. // download again
  5688. lastReceivedEmail.reset()
  5689. f, err = client.Open(testFileName)
  5690. assert.NoError(t, err)
  5691. contents = make([]byte, testFileSize)
  5692. n, err = io.ReadFull(f, contents)
  5693. assert.NoError(t, err)
  5694. assert.Equal(t, int(testFileSize), n)
  5695. err = f.Close()
  5696. assert.NoError(t, err)
  5697. assert.Never(t, func() bool {
  5698. return lastReceivedEmail.get().From != ""
  5699. }, 1000*time.Millisecond, 100*time.Millisecond)
  5700. }
  5701. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5702. assert.NoError(t, err)
  5703. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  5704. assert.NoError(t, err)
  5705. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5706. assert.NoError(t, err)
  5707. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5708. assert.NoError(t, err)
  5709. err = os.RemoveAll(user.GetHomeDir())
  5710. assert.NoError(t, err)
  5711. smtpCfg = smtp.Config{}
  5712. err = smtpCfg.Initialize(configDir, true)
  5713. require.NoError(t, err)
  5714. }
  5715. func TestEventRuleRenameEvent(t *testing.T) {
  5716. smtpCfg := smtp.Config{
  5717. Host: "127.0.0.1",
  5718. Port: 2525,
  5719. From: "[email protected]",
  5720. TemplatesPath: "templates",
  5721. }
  5722. err := smtpCfg.Initialize(configDir, true)
  5723. require.NoError(t, err)
  5724. a1 := dataprovider.BaseEventAction{
  5725. Name: "action1",
  5726. Type: dataprovider.ActionTypeEmail,
  5727. Options: dataprovider.BaseEventActionOptions{
  5728. EmailConfig: dataprovider.EventActionEmailConfig{
  5729. Recipients: []string{"[email protected]"},
  5730. Subject: `"{{Event}}" from "{{Name}}"`,
  5731. ContentType: 1,
  5732. Body: `<p>Fs path {{FsPath}}, Target path "{{VirtualTargetDirPath}}/{{TargetName}}", size: {{FileSize}}</p>`,
  5733. },
  5734. },
  5735. }
  5736. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5737. assert.NoError(t, err)
  5738. r1 := dataprovider.EventRule{
  5739. Name: "test rename rule",
  5740. Status: 1,
  5741. Trigger: dataprovider.EventTriggerFsEvent,
  5742. Conditions: dataprovider.EventConditions{
  5743. FsEvents: []string{"rename"},
  5744. },
  5745. Actions: []dataprovider.EventAction{
  5746. {
  5747. BaseEventAction: dataprovider.BaseEventAction{
  5748. Name: action1.Name,
  5749. },
  5750. Order: 1,
  5751. },
  5752. },
  5753. }
  5754. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5755. assert.NoError(t, err)
  5756. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  5757. assert.NoError(t, err)
  5758. conn, client, err := getSftpClient(user)
  5759. if assert.NoError(t, err) {
  5760. defer conn.Close()
  5761. defer client.Close()
  5762. testFileSize := int64(32768)
  5763. lastReceivedEmail.reset()
  5764. err = writeSFTPFileNoCheck(testFileName, testFileSize, client)
  5765. assert.NoError(t, err)
  5766. err = client.Mkdir("subdir")
  5767. assert.NoError(t, err)
  5768. err = client.Rename(testFileName, path.Join("/subdir", testFileName))
  5769. assert.NoError(t, err)
  5770. assert.Eventually(t, func() bool {
  5771. return lastReceivedEmail.get().From != ""
  5772. }, 1500*time.Millisecond, 100*time.Millisecond)
  5773. email := lastReceivedEmail.get()
  5774. assert.Len(t, email.To, 1)
  5775. assert.True(t, util.Contains(email.To, "[email protected]"))
  5776. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "rename" from "%s"`, user.Username))
  5777. assert.Contains(t, email.Data, "Content-Type: text/html")
  5778. assert.Contains(t, email.Data, fmt.Sprintf("Target path %q", path.Join("/subdir", testFileName)))
  5779. }
  5780. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  5781. assert.NoError(t, err)
  5782. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  5783. assert.NoError(t, err)
  5784. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  5785. assert.NoError(t, err)
  5786. err = os.RemoveAll(user.GetHomeDir())
  5787. assert.NoError(t, err)
  5788. smtpCfg = smtp.Config{}
  5789. err = smtpCfg.Initialize(configDir, true)
  5790. require.NoError(t, err)
  5791. }
  5792. func TestEventRuleIDPLogin(t *testing.T) {
  5793. smtpCfg := smtp.Config{
  5794. Host: "127.0.0.1",
  5795. Port: 2525,
  5796. From: "[email protected]",
  5797. TemplatesPath: "templates",
  5798. }
  5799. err := smtpCfg.Initialize(configDir, true)
  5800. require.NoError(t, err)
  5801. lastReceivedEmail.reset()
  5802. username := `test_"idp_"login`
  5803. custom1 := `cust"oa"1`
  5804. u := map[string]any{
  5805. "username": "{{Name}}",
  5806. "status": 1,
  5807. "home_dir": filepath.Join(os.TempDir(), "{{IDPFieldcustom1}}"),
  5808. "permissions": map[string][]string{
  5809. "/": {dataprovider.PermAny},
  5810. },
  5811. }
  5812. userTmpl, err := json.Marshal(u)
  5813. require.NoError(t, err)
  5814. a := map[string]any{
  5815. "username": "{{Name}}",
  5816. "status": 1,
  5817. "permissions": []string{dataprovider.PermAdminAny},
  5818. }
  5819. adminTmpl, err := json.Marshal(a)
  5820. require.NoError(t, err)
  5821. a1 := dataprovider.BaseEventAction{
  5822. Name: "a1",
  5823. Type: dataprovider.ActionTypeIDPAccountCheck,
  5824. Options: dataprovider.BaseEventActionOptions{
  5825. IDPConfig: dataprovider.EventActionIDPAccountCheck{
  5826. Mode: 1, // create if not exists
  5827. TemplateUser: string(userTmpl),
  5828. TemplateAdmin: string(adminTmpl),
  5829. },
  5830. },
  5831. }
  5832. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  5833. assert.NoError(t, err)
  5834. a2 := dataprovider.BaseEventAction{
  5835. Name: "a2",
  5836. Type: dataprovider.ActionTypeEmail,
  5837. Options: dataprovider.BaseEventActionOptions{
  5838. EmailConfig: dataprovider.EventActionEmailConfig{
  5839. Recipients: []string{"[email protected]"},
  5840. Subject: `"{{Event}} {{StatusString}}"`,
  5841. Body: "{{Name}} Custom field: {{IDPFieldcustom1}}",
  5842. },
  5843. },
  5844. }
  5845. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  5846. assert.NoError(t, err)
  5847. r1 := dataprovider.EventRule{
  5848. Name: "test rule IDP login",
  5849. Status: 1,
  5850. Trigger: dataprovider.EventTriggerIDPLogin,
  5851. Conditions: dataprovider.EventConditions{
  5852. IDPLoginEvent: dataprovider.IDPLoginUser,
  5853. },
  5854. Actions: []dataprovider.EventAction{
  5855. {
  5856. BaseEventAction: dataprovider.BaseEventAction{
  5857. Name: action1.Name, // the rule is not sync and will be skipped
  5858. },
  5859. Order: 1,
  5860. },
  5861. {
  5862. BaseEventAction: dataprovider.BaseEventAction{
  5863. Name: action2.Name,
  5864. },
  5865. Order: 2,
  5866. },
  5867. },
  5868. }
  5869. rule1, resp, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  5870. assert.NoError(t, err, string(resp))
  5871. customFields := map[string]any{
  5872. "custom1": custom1,
  5873. }
  5874. user, admin, err := common.HandleIDPLoginEvent(common.EventParams{
  5875. Name: username,
  5876. Event: common.IDPLoginUser,
  5877. Status: 1,
  5878. }, &customFields)
  5879. assert.Nil(t, user)
  5880. assert.Nil(t, admin)
  5881. assert.NoError(t, err)
  5882. rule1.Actions[0].Options.ExecuteSync = true
  5883. rule1, resp, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  5884. assert.NoError(t, err, string(resp))
  5885. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  5886. Name: username,
  5887. Event: common.IDPLoginUser,
  5888. Status: 1,
  5889. }, &customFields)
  5890. if assert.NotNil(t, user) {
  5891. assert.Equal(t, filepath.Join(os.TempDir(), custom1), user.GetHomeDir())
  5892. _, err = httpdtest.RemoveUser(*user, http.StatusOK)
  5893. assert.NoError(t, err)
  5894. }
  5895. assert.Nil(t, admin)
  5896. assert.NoError(t, err)
  5897. assert.Eventually(t, func() bool {
  5898. return lastReceivedEmail.get().From != ""
  5899. }, 3000*time.Millisecond, 100*time.Millisecond)
  5900. email := lastReceivedEmail.get()
  5901. assert.Len(t, email.To, 1)
  5902. assert.True(t, util.Contains(email.To, "[email protected]"))
  5903. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "%s OK"`, common.IDPLoginUser))
  5904. assert.Contains(t, email.Data, username)
  5905. assert.Contains(t, email.Data, custom1)
  5906. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  5907. Name: username,
  5908. Event: common.IDPLoginAdmin,
  5909. Status: 1,
  5910. }, &customFields)
  5911. assert.Nil(t, user)
  5912. assert.Nil(t, admin)
  5913. assert.NoError(t, err)
  5914. rule1.Conditions.IDPLoginEvent = dataprovider.IDPLoginAny
  5915. rule1.Actions = []dataprovider.EventAction{
  5916. {
  5917. BaseEventAction: dataprovider.BaseEventAction{
  5918. Name: action1.Name,
  5919. },
  5920. Options: dataprovider.EventActionOptions{
  5921. ExecuteSync: true,
  5922. },
  5923. Order: 1,
  5924. },
  5925. }
  5926. rule1, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  5927. assert.NoError(t, err)
  5928. r2 := dataprovider.EventRule{
  5929. Name: "test email on IDP login",
  5930. Status: 1,
  5931. Trigger: dataprovider.EventTriggerIDPLogin,
  5932. Conditions: dataprovider.EventConditions{
  5933. IDPLoginEvent: dataprovider.IDPLoginAdmin,
  5934. },
  5935. Actions: []dataprovider.EventAction{
  5936. {
  5937. BaseEventAction: dataprovider.BaseEventAction{
  5938. Name: action2.Name,
  5939. },
  5940. Order: 1,
  5941. },
  5942. },
  5943. }
  5944. rule2, resp, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  5945. assert.NoError(t, err, string(resp))
  5946. lastReceivedEmail.reset()
  5947. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  5948. Name: username,
  5949. Event: common.IDPLoginAdmin,
  5950. Status: 1,
  5951. }, &customFields)
  5952. assert.Nil(t, user)
  5953. if assert.NotNil(t, admin) {
  5954. assert.Equal(t, 1, admin.Status)
  5955. }
  5956. assert.NoError(t, err)
  5957. assert.Eventually(t, func() bool {
  5958. return lastReceivedEmail.get().From != ""
  5959. }, 3000*time.Millisecond, 100*time.Millisecond)
  5960. email = lastReceivedEmail.get()
  5961. assert.Len(t, email.To, 1)
  5962. assert.True(t, util.Contains(email.To, "[email protected]"))
  5963. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "%s OK"`, common.IDPLoginAdmin))
  5964. assert.Contains(t, email.Data, username)
  5965. assert.Contains(t, email.Data, custom1)
  5966. admin.Status = 0
  5967. _, _, err = httpdtest.UpdateAdmin(*admin, http.StatusOK)
  5968. assert.NoError(t, err)
  5969. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  5970. Name: username,
  5971. Event: common.IDPLoginAdmin,
  5972. Status: 1,
  5973. }, &customFields)
  5974. assert.Nil(t, user)
  5975. if assert.NotNil(t, admin) {
  5976. assert.Equal(t, 0, admin.Status)
  5977. }
  5978. assert.NoError(t, err)
  5979. action1.Options.IDPConfig.Mode = 0
  5980. action1, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  5981. assert.NoError(t, err)
  5982. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  5983. Name: username,
  5984. Event: common.IDPLoginAdmin,
  5985. Status: 1,
  5986. }, &customFields)
  5987. assert.Nil(t, user)
  5988. if assert.NotNil(t, admin) {
  5989. assert.Equal(t, 1, admin.Status)
  5990. }
  5991. assert.NoError(t, err)
  5992. _, err = httpdtest.RemoveAdmin(*admin, http.StatusOK)
  5993. assert.NoError(t, err)
  5994. r3 := dataprovider.EventRule{
  5995. Name: "test rule2 IDP login",
  5996. Status: 1,
  5997. Trigger: dataprovider.EventTriggerIDPLogin,
  5998. Conditions: dataprovider.EventConditions{
  5999. IDPLoginEvent: dataprovider.IDPLoginAny,
  6000. },
  6001. Actions: []dataprovider.EventAction{
  6002. {
  6003. BaseEventAction: dataprovider.BaseEventAction{
  6004. Name: action1.Name,
  6005. },
  6006. Order: 1,
  6007. Options: dataprovider.EventActionOptions{
  6008. ExecuteSync: true,
  6009. },
  6010. },
  6011. },
  6012. }
  6013. rule3, resp, err := httpdtest.AddEventRule(r3, http.StatusCreated)
  6014. assert.NoError(t, err, string(resp))
  6015. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  6016. Name: username,
  6017. Event: common.IDPLoginAdmin,
  6018. Status: 1,
  6019. }, &customFields)
  6020. assert.Nil(t, user)
  6021. assert.Nil(t, admin)
  6022. if assert.Error(t, err) {
  6023. assert.Contains(t, err.Error(), "more than one account check action rules matches")
  6024. }
  6025. _, err = httpdtest.RemoveEventRule(rule3, http.StatusOK)
  6026. assert.NoError(t, err)
  6027. action1.Options.IDPConfig.TemplateAdmin = `{}`
  6028. action1, _, err = httpdtest.UpdateEventAction(action1, http.StatusOK)
  6029. assert.NoError(t, err)
  6030. _, _, err = common.HandleIDPLoginEvent(common.EventParams{
  6031. Name: username,
  6032. Event: common.IDPLoginAdmin,
  6033. Status: 1,
  6034. }, &customFields)
  6035. assert.ErrorIs(t, err, util.ErrValidation)
  6036. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  6037. assert.NoError(t, err)
  6038. user, admin, err = common.HandleIDPLoginEvent(common.EventParams{
  6039. Name: username,
  6040. Event: common.IDPLoginAdmin,
  6041. Status: 1,
  6042. }, &customFields)
  6043. assert.Nil(t, user)
  6044. assert.Nil(t, admin)
  6045. assert.NoError(t, err)
  6046. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  6047. assert.NoError(t, err)
  6048. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  6049. assert.NoError(t, err)
  6050. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  6051. assert.NoError(t, err)
  6052. smtpCfg = smtp.Config{}
  6053. err = smtpCfg.Initialize(configDir, true)
  6054. require.NoError(t, err)
  6055. }
  6056. func TestEventRuleEmailField(t *testing.T) {
  6057. smtpCfg := smtp.Config{
  6058. Host: "127.0.0.1",
  6059. Port: 2525,
  6060. From: "[email protected]",
  6061. TemplatesPath: "templates",
  6062. }
  6063. err := smtpCfg.Initialize(configDir, true)
  6064. require.NoError(t, err)
  6065. lastReceivedEmail.reset()
  6066. a1 := dataprovider.BaseEventAction{
  6067. Name: "action1",
  6068. Type: dataprovider.ActionTypeEmail,
  6069. Options: dataprovider.BaseEventActionOptions{
  6070. EmailConfig: dataprovider.EventActionEmailConfig{
  6071. Recipients: []string{"{{Email}}"},
  6072. Subject: `"{{Event}}" from "{{Name}}"`,
  6073. Body: "Sample email body",
  6074. },
  6075. },
  6076. }
  6077. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  6078. assert.NoError(t, err)
  6079. a2 := dataprovider.BaseEventAction{
  6080. Name: "action2",
  6081. Type: dataprovider.ActionTypeEmail,
  6082. Options: dataprovider.BaseEventActionOptions{
  6083. EmailConfig: dataprovider.EventActionEmailConfig{
  6084. Recipients: []string{"[email protected]"},
  6085. Subject: `"Failure`,
  6086. Body: "{{ErrorString}}",
  6087. },
  6088. },
  6089. }
  6090. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  6091. assert.NoError(t, err)
  6092. r1 := dataprovider.EventRule{
  6093. Name: "r1",
  6094. Status: 1,
  6095. Trigger: dataprovider.EventTriggerFsEvent,
  6096. Conditions: dataprovider.EventConditions{
  6097. FsEvents: []string{"mkdir"},
  6098. },
  6099. Actions: []dataprovider.EventAction{
  6100. {
  6101. BaseEventAction: dataprovider.BaseEventAction{
  6102. Name: action1.Name,
  6103. },
  6104. },
  6105. },
  6106. }
  6107. r2 := dataprovider.EventRule{
  6108. Name: "test rule2",
  6109. Status: 1,
  6110. Trigger: dataprovider.EventTriggerProviderEvent,
  6111. Conditions: dataprovider.EventConditions{
  6112. ProviderEvents: []string{"add"},
  6113. },
  6114. Actions: []dataprovider.EventAction{
  6115. {
  6116. BaseEventAction: dataprovider.BaseEventAction{
  6117. Name: action1.Name,
  6118. },
  6119. Order: 1,
  6120. },
  6121. {
  6122. BaseEventAction: dataprovider.BaseEventAction{
  6123. Name: action2.Name,
  6124. },
  6125. Options: dataprovider.EventActionOptions{
  6126. IsFailureAction: true,
  6127. },
  6128. },
  6129. },
  6130. }
  6131. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  6132. assert.NoError(t, err)
  6133. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  6134. assert.NoError(t, err)
  6135. u := getTestUser()
  6136. u.Email = "[email protected]"
  6137. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6138. assert.NoError(t, err)
  6139. assert.Eventually(t, func() bool {
  6140. return lastReceivedEmail.get().From != ""
  6141. }, 3000*time.Millisecond, 100*time.Millisecond)
  6142. email := lastReceivedEmail.get()
  6143. assert.Len(t, email.To, 1)
  6144. assert.True(t, util.Contains(email.To, user.Email))
  6145. assert.Contains(t, email.Data, `Subject: "add" from "admin"`)
  6146. // if we add a user without email the notification will fail
  6147. lastReceivedEmail.reset()
  6148. u1 := getTestUser()
  6149. u1.Username += "_1"
  6150. user1, _, err := httpdtest.AddUser(u1, http.StatusCreated)
  6151. assert.NoError(t, err)
  6152. assert.Eventually(t, func() bool {
  6153. return lastReceivedEmail.get().From != ""
  6154. }, 3000*time.Millisecond, 100*time.Millisecond)
  6155. email = lastReceivedEmail.get()
  6156. assert.Len(t, email.To, 1)
  6157. assert.True(t, util.Contains(email.To, "[email protected]"))
  6158. assert.Contains(t, email.Data, `no recipient addresses set`)
  6159. conn, client, err := getSftpClient(user)
  6160. if assert.NoError(t, err) {
  6161. defer conn.Close()
  6162. defer client.Close()
  6163. lastReceivedEmail.reset()
  6164. err = client.Mkdir(testFileName)
  6165. assert.NoError(t, err)
  6166. assert.Eventually(t, func() bool {
  6167. return lastReceivedEmail.get().From != ""
  6168. }, 3000*time.Millisecond, 100*time.Millisecond)
  6169. email := lastReceivedEmail.get()
  6170. assert.Len(t, email.To, 1)
  6171. assert.True(t, util.Contains(email.To, user.Email))
  6172. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "mkdir" from "%s"`, user.Username))
  6173. }
  6174. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  6175. assert.NoError(t, err)
  6176. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  6177. assert.NoError(t, err)
  6178. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  6179. assert.NoError(t, err)
  6180. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  6181. assert.NoError(t, err)
  6182. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6183. assert.NoError(t, err)
  6184. err = os.RemoveAll(user.GetHomeDir())
  6185. assert.NoError(t, err)
  6186. _, err = httpdtest.RemoveUser(user1, http.StatusOK)
  6187. assert.NoError(t, err)
  6188. smtpCfg = smtp.Config{}
  6189. err = smtpCfg.Initialize(configDir, true)
  6190. require.NoError(t, err)
  6191. }
  6192. func TestEventRuleCertificate(t *testing.T) {
  6193. smtpCfg := smtp.Config{
  6194. Host: "127.0.0.1",
  6195. Port: 2525,
  6196. From: "[email protected]",
  6197. TemplatesPath: "templates",
  6198. }
  6199. err := smtpCfg.Initialize(configDir, true)
  6200. require.NoError(t, err)
  6201. lastReceivedEmail.reset()
  6202. a1 := dataprovider.BaseEventAction{
  6203. Name: "action1",
  6204. Type: dataprovider.ActionTypeEmail,
  6205. Options: dataprovider.BaseEventActionOptions{
  6206. EmailConfig: dataprovider.EventActionEmailConfig{
  6207. Recipients: []string{"[email protected]"},
  6208. Subject: `"{{Event}} {{StatusString}}"`,
  6209. ContentType: 0,
  6210. Body: "Domain: {{Name}} Timestamp: {{Timestamp}} {{ErrorString}}",
  6211. },
  6212. },
  6213. }
  6214. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  6215. assert.NoError(t, err)
  6216. a2 := dataprovider.BaseEventAction{
  6217. Name: "action2",
  6218. Type: dataprovider.ActionTypeFolderQuotaReset,
  6219. }
  6220. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  6221. assert.NoError(t, err)
  6222. r1 := dataprovider.EventRule{
  6223. Name: "test rule certificate",
  6224. Status: 1,
  6225. Trigger: dataprovider.EventTriggerCertificate,
  6226. Actions: []dataprovider.EventAction{
  6227. {
  6228. BaseEventAction: dataprovider.BaseEventAction{
  6229. Name: action1.Name,
  6230. },
  6231. Order: 1,
  6232. },
  6233. },
  6234. }
  6235. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  6236. assert.NoError(t, err)
  6237. r2 := dataprovider.EventRule{
  6238. Name: "test rule 2",
  6239. Status: 1,
  6240. Trigger: dataprovider.EventTriggerCertificate,
  6241. Actions: []dataprovider.EventAction{
  6242. {
  6243. BaseEventAction: dataprovider.BaseEventAction{
  6244. Name: action1.Name,
  6245. },
  6246. Order: 1,
  6247. },
  6248. {
  6249. BaseEventAction: dataprovider.BaseEventAction{
  6250. Name: action2.Name,
  6251. },
  6252. Order: 2,
  6253. },
  6254. },
  6255. }
  6256. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  6257. assert.NoError(t, err)
  6258. renewalEvent := "Certificate renewal"
  6259. common.HandleCertificateEvent(common.EventParams{
  6260. Name: "example.com",
  6261. Timestamp: time.Now().UnixNano(),
  6262. Status: 1,
  6263. Event: renewalEvent,
  6264. })
  6265. assert.Eventually(t, func() bool {
  6266. return lastReceivedEmail.get().From != ""
  6267. }, 3000*time.Millisecond, 100*time.Millisecond)
  6268. email := lastReceivedEmail.get()
  6269. assert.Len(t, email.To, 1)
  6270. assert.True(t, util.Contains(email.To, "[email protected]"))
  6271. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "%s OK"`, renewalEvent))
  6272. assert.Contains(t, email.Data, "Content-Type: text/plain")
  6273. assert.Contains(t, email.Data, `Domain: example.com Timestamp`)
  6274. lastReceivedEmail.reset()
  6275. params := common.EventParams{
  6276. Name: "example.com",
  6277. Timestamp: time.Now().UnixNano(),
  6278. Status: 2,
  6279. Event: renewalEvent,
  6280. }
  6281. errRenew := errors.New("generic renew error")
  6282. params.AddError(errRenew)
  6283. common.HandleCertificateEvent(params)
  6284. assert.Eventually(t, func() bool {
  6285. return lastReceivedEmail.get().From != ""
  6286. }, 3000*time.Millisecond, 100*time.Millisecond)
  6287. email = lastReceivedEmail.get()
  6288. assert.Len(t, email.To, 1)
  6289. assert.True(t, util.Contains(email.To, "[email protected]"))
  6290. assert.Contains(t, email.Data, fmt.Sprintf(`Subject: "%s KO"`, renewalEvent))
  6291. assert.Contains(t, email.Data, `Domain: example.com Timestamp`)
  6292. assert.Contains(t, email.Data, errRenew.Error())
  6293. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  6294. assert.NoError(t, err)
  6295. _, err = httpdtest.RemoveEventRule(rule2, http.StatusOK)
  6296. assert.NoError(t, err)
  6297. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  6298. assert.NoError(t, err)
  6299. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  6300. assert.NoError(t, err)
  6301. // ignored no more certificate rules
  6302. common.HandleCertificateEvent(common.EventParams{
  6303. Name: "example.com",
  6304. Timestamp: time.Now().UnixNano(),
  6305. Status: 1,
  6306. Event: renewalEvent,
  6307. })
  6308. smtpCfg = smtp.Config{}
  6309. err = smtpCfg.Initialize(configDir, true)
  6310. require.NoError(t, err)
  6311. }
  6312. func TestEventRuleIPBlocked(t *testing.T) {
  6313. oldConfig := config.GetCommonConfig()
  6314. cfg := config.GetCommonConfig()
  6315. cfg.DefenderConfig.Enabled = true
  6316. cfg.DefenderConfig.Threshold = 3
  6317. cfg.DefenderConfig.ScoreLimitExceeded = 2
  6318. err := common.Initialize(cfg, 0)
  6319. assert.NoError(t, err)
  6320. smtpCfg := smtp.Config{
  6321. Host: "127.0.0.1",
  6322. Port: 2525,
  6323. From: "[email protected]",
  6324. TemplatesPath: "templates",
  6325. }
  6326. err = smtpCfg.Initialize(configDir, true)
  6327. require.NoError(t, err)
  6328. a1 := dataprovider.BaseEventAction{
  6329. Name: "action1",
  6330. Type: dataprovider.ActionTypeEmail,
  6331. Options: dataprovider.BaseEventActionOptions{
  6332. EmailConfig: dataprovider.EventActionEmailConfig{
  6333. Recipients: []string{"[email protected]", "[email protected]"},
  6334. Subject: `New "{{Event}}"`,
  6335. Body: "IP: {{IP}} Timestamp: {{Timestamp}}",
  6336. },
  6337. },
  6338. }
  6339. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  6340. assert.NoError(t, err)
  6341. a2 := dataprovider.BaseEventAction{
  6342. Name: "action2",
  6343. Type: dataprovider.ActionTypeFolderQuotaReset,
  6344. }
  6345. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  6346. assert.NoError(t, err)
  6347. r1 := dataprovider.EventRule{
  6348. Name: "test rule ip blocked",
  6349. Status: 1,
  6350. Trigger: dataprovider.EventTriggerIPBlocked,
  6351. Actions: []dataprovider.EventAction{
  6352. {
  6353. BaseEventAction: dataprovider.BaseEventAction{
  6354. Name: action1.Name,
  6355. },
  6356. Order: 1,
  6357. },
  6358. },
  6359. }
  6360. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  6361. assert.NoError(t, err)
  6362. r2 := dataprovider.EventRule{
  6363. Name: "test rule 2",
  6364. Status: 1,
  6365. Trigger: dataprovider.EventTriggerIPBlocked,
  6366. Actions: []dataprovider.EventAction{
  6367. {
  6368. BaseEventAction: dataprovider.BaseEventAction{
  6369. Name: action1.Name,
  6370. },
  6371. Order: 1,
  6372. },
  6373. {
  6374. BaseEventAction: dataprovider.BaseEventAction{
  6375. Name: action2.Name,
  6376. },
  6377. Order: 2,
  6378. },
  6379. },
  6380. }
  6381. rule2, _, err := httpdtest.AddEventRule(r2, http.StatusCreated)
  6382. assert.NoError(t, err)
  6383. u := getTestUser()
  6384. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6385. assert.NoError(t, err)
  6386. lastReceivedEmail.reset()
  6387. time.Sleep(300 * time.Millisecond)
  6388. assert.Empty(t, lastReceivedEmail.get().From, lastReceivedEmail.get().Data)
  6389. for i := 0; i < 3; i++ {
  6390. user.Password = "wrong_pwd"
  6391. _, _, err = getSftpClient(user)
  6392. assert.Error(t, err)
  6393. }
  6394. // the client is now banned
  6395. user.Password = defaultPassword
  6396. _, _, err = getSftpClient(user)
  6397. assert.Error(t, err)
  6398. // check the email notification
  6399. assert.Eventually(t, func() bool {
  6400. return lastReceivedEmail.get().From != ""
  6401. }, 3000*time.Millisecond, 100*time.Millisecond)
  6402. email := lastReceivedEmail.get()
  6403. assert.Len(t, email.To, 2)
  6404. assert.True(t, util.Contains(email.To, "[email protected]"))
  6405. assert.True(t, util.Contains(email.To, "[email protected]"))
  6406. assert.Contains(t, email.Data, `Subject: New "IP Blocked"`)
  6407. err = dataprovider.DeleteEventRule(rule1.Name, "", "", "")
  6408. assert.NoError(t, err)
  6409. err = dataprovider.DeleteEventRule(rule2.Name, "", "", "")
  6410. assert.NoError(t, err)
  6411. err = dataprovider.DeleteEventAction(action1.Name, "", "", "")
  6412. assert.NoError(t, err)
  6413. err = dataprovider.DeleteEventAction(action2.Name, "", "", "")
  6414. assert.NoError(t, err)
  6415. err = dataprovider.DeleteUser(user.Username, "", "", "")
  6416. assert.NoError(t, err)
  6417. err = os.RemoveAll(user.GetHomeDir())
  6418. assert.NoError(t, err)
  6419. smtpCfg = smtp.Config{}
  6420. err = smtpCfg.Initialize(configDir, true)
  6421. require.NoError(t, err)
  6422. err = common.Initialize(oldConfig, 0)
  6423. assert.NoError(t, err)
  6424. }
  6425. func TestEventRulePasswordExpiration(t *testing.T) {
  6426. smtpCfg := smtp.Config{
  6427. Host: "127.0.0.1",
  6428. Port: 2525,
  6429. From: "[email protected]",
  6430. TemplatesPath: "templates",
  6431. }
  6432. err := smtpCfg.Initialize(configDir, true)
  6433. require.NoError(t, err)
  6434. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  6435. assert.NoError(t, err)
  6436. a1 := dataprovider.BaseEventAction{
  6437. Name: "a1",
  6438. Type: dataprovider.ActionTypeEmail,
  6439. Options: dataprovider.BaseEventActionOptions{
  6440. EmailConfig: dataprovider.EventActionEmailConfig{
  6441. Recipients: []string{"[email protected]"},
  6442. Subject: `Failure`,
  6443. Body: "Failure action",
  6444. },
  6445. },
  6446. }
  6447. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  6448. assert.NoError(t, err)
  6449. a2 := dataprovider.BaseEventAction{
  6450. Name: "a2",
  6451. Type: dataprovider.ActionTypePasswordExpirationCheck,
  6452. Options: dataprovider.BaseEventActionOptions{
  6453. PwdExpirationConfig: dataprovider.EventActionPasswordExpiration{
  6454. Threshold: 10,
  6455. },
  6456. },
  6457. }
  6458. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  6459. assert.NoError(t, err)
  6460. a3 := dataprovider.BaseEventAction{
  6461. Name: "a3",
  6462. Type: dataprovider.ActionTypeEmail,
  6463. Options: dataprovider.BaseEventActionOptions{
  6464. EmailConfig: dataprovider.EventActionEmailConfig{
  6465. Recipients: []string{"[email protected]"},
  6466. Subject: `OK`,
  6467. Body: "OK action",
  6468. },
  6469. },
  6470. }
  6471. action3, _, err := httpdtest.AddEventAction(a3, http.StatusCreated)
  6472. assert.NoError(t, err)
  6473. r1 := dataprovider.EventRule{
  6474. Name: "rule1",
  6475. Status: 1,
  6476. Trigger: dataprovider.EventTriggerFsEvent,
  6477. Conditions: dataprovider.EventConditions{
  6478. FsEvents: []string{"mkdir"},
  6479. },
  6480. Actions: []dataprovider.EventAction{
  6481. {
  6482. BaseEventAction: dataprovider.BaseEventAction{
  6483. Name: action2.Name,
  6484. },
  6485. Order: 1,
  6486. },
  6487. {
  6488. BaseEventAction: dataprovider.BaseEventAction{
  6489. Name: action3.Name,
  6490. },
  6491. Order: 2,
  6492. },
  6493. {
  6494. BaseEventAction: dataprovider.BaseEventAction{
  6495. Name: action1.Name,
  6496. },
  6497. Options: dataprovider.EventActionOptions{
  6498. IsFailureAction: true,
  6499. },
  6500. },
  6501. },
  6502. }
  6503. rule1, resp, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  6504. assert.NoError(t, err, string(resp))
  6505. dirName := "aTestDir"
  6506. conn, client, err := getSftpClient(user)
  6507. if assert.NoError(t, err) {
  6508. defer conn.Close()
  6509. defer client.Close()
  6510. lastReceivedEmail.reset()
  6511. err := client.Mkdir(dirName)
  6512. assert.NoError(t, err)
  6513. // the user has no password expiration, the check will be skipped and the ok action executed
  6514. assert.Eventually(t, func() bool {
  6515. return lastReceivedEmail.get().From != ""
  6516. }, 1500*time.Millisecond, 100*time.Millisecond)
  6517. email := lastReceivedEmail.get()
  6518. assert.Len(t, email.To, 1)
  6519. assert.Contains(t, email.To, "[email protected]")
  6520. err = client.RemoveDirectory(dirName)
  6521. assert.NoError(t, err)
  6522. }
  6523. user.Filters.PasswordExpiration = 20
  6524. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  6525. assert.NoError(t, err)
  6526. conn, client, err = getSftpClient(user)
  6527. if assert.NoError(t, err) {
  6528. defer conn.Close()
  6529. defer client.Close()
  6530. lastReceivedEmail.reset()
  6531. err := client.Mkdir(dirName)
  6532. assert.NoError(t, err)
  6533. // the passowrd is not about to expire, the check will be skipped and the ok action executed
  6534. assert.Eventually(t, func() bool {
  6535. return lastReceivedEmail.get().From != ""
  6536. }, 1500*time.Millisecond, 100*time.Millisecond)
  6537. email := lastReceivedEmail.get()
  6538. assert.Len(t, email.To, 1)
  6539. assert.Contains(t, email.To, "[email protected]")
  6540. err = client.RemoveDirectory(dirName)
  6541. assert.NoError(t, err)
  6542. }
  6543. user.Filters.PasswordExpiration = 5
  6544. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  6545. assert.NoError(t, err)
  6546. conn, client, err = getSftpClient(user)
  6547. if assert.NoError(t, err) {
  6548. defer conn.Close()
  6549. defer client.Close()
  6550. lastReceivedEmail.reset()
  6551. err := client.Mkdir(dirName)
  6552. assert.NoError(t, err)
  6553. // the passowrd is about to expire, the user has no email, the failure action will be executed
  6554. assert.Eventually(t, func() bool {
  6555. return lastReceivedEmail.get().From != ""
  6556. }, 1500*time.Millisecond, 100*time.Millisecond)
  6557. email := lastReceivedEmail.get()
  6558. assert.Len(t, email.To, 1)
  6559. assert.Contains(t, email.To, "[email protected]")
  6560. err = client.RemoveDirectory(dirName)
  6561. assert.NoError(t, err)
  6562. }
  6563. // remove the success action
  6564. rule1.Actions = []dataprovider.EventAction{
  6565. {
  6566. BaseEventAction: dataprovider.BaseEventAction{
  6567. Name: action2.Name,
  6568. },
  6569. Order: 1,
  6570. },
  6571. {
  6572. BaseEventAction: dataprovider.BaseEventAction{
  6573. Name: action1.Name,
  6574. },
  6575. Options: dataprovider.EventActionOptions{
  6576. IsFailureAction: true,
  6577. },
  6578. },
  6579. }
  6580. _, _, err = httpdtest.UpdateEventRule(rule1, http.StatusOK)
  6581. assert.NoError(t, err)
  6582. user.Email = "[email protected]"
  6583. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  6584. assert.NoError(t, err)
  6585. conn, client, err = getSftpClient(user)
  6586. if assert.NoError(t, err) {
  6587. defer conn.Close()
  6588. defer client.Close()
  6589. lastReceivedEmail.reset()
  6590. err := client.Mkdir(dirName)
  6591. assert.NoError(t, err)
  6592. // the passowrd expiration will be notified
  6593. assert.Eventually(t, func() bool {
  6594. return lastReceivedEmail.get().From != ""
  6595. }, 1500*time.Millisecond, 100*time.Millisecond)
  6596. email := lastReceivedEmail.get()
  6597. assert.Len(t, email.To, 1)
  6598. assert.Contains(t, email.To, user.Email)
  6599. assert.Contains(t, email.Data, "your SFTPGo password expires in 5 days")
  6600. err = client.RemoveDirectory(dirName)
  6601. assert.NoError(t, err)
  6602. }
  6603. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  6604. assert.NoError(t, err)
  6605. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  6606. assert.NoError(t, err)
  6607. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  6608. assert.NoError(t, err)
  6609. _, err = httpdtest.RemoveEventAction(action3, http.StatusOK)
  6610. assert.NoError(t, err)
  6611. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6612. assert.NoError(t, err)
  6613. err = os.RemoveAll(user.GetHomeDir())
  6614. assert.NoError(t, err)
  6615. smtpCfg = smtp.Config{}
  6616. err = smtpCfg.Initialize(configDir, true)
  6617. require.NoError(t, err)
  6618. }
  6619. func TestSyncUploadAction(t *testing.T) {
  6620. if runtime.GOOS == osWindows {
  6621. t.Skip("this test is not available on Windows")
  6622. }
  6623. uploadScriptPath := filepath.Join(os.TempDir(), "upload.sh")
  6624. common.Config.Actions.ExecuteOn = []string{"upload"}
  6625. common.Config.Actions.ExecuteSync = []string{"upload"}
  6626. common.Config.Actions.Hook = uploadScriptPath
  6627. u := getTestUser()
  6628. u.QuotaFiles = 1000
  6629. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6630. assert.NoError(t, err)
  6631. movedFileName := "moved.dat"
  6632. movedPath := filepath.Join(user.HomeDir, movedFileName)
  6633. err = os.WriteFile(uploadScriptPath, getUploadScriptContent(movedPath, "", 0), 0755)
  6634. assert.NoError(t, err)
  6635. conn, client, err := getSftpClient(user)
  6636. if assert.NoError(t, err) {
  6637. defer conn.Close()
  6638. defer client.Close()
  6639. size := int64(32768)
  6640. err = writeSFTPFileNoCheck(testFileName, size, client)
  6641. assert.NoError(t, err)
  6642. _, err = client.Stat(testFileName)
  6643. assert.Error(t, err)
  6644. info, err := client.Stat(movedFileName)
  6645. if assert.NoError(t, err) {
  6646. assert.Equal(t, size, info.Size())
  6647. }
  6648. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  6649. assert.NoError(t, err)
  6650. assert.Equal(t, 1, user.UsedQuotaFiles)
  6651. assert.Equal(t, size, user.UsedQuotaSize)
  6652. // test some hook failure
  6653. // the uploaded file is moved and the hook fails, it will be not removed from the quota
  6654. err = os.WriteFile(uploadScriptPath, getUploadScriptContent(movedPath, "", 1), 0755)
  6655. assert.NoError(t, err)
  6656. err = writeSFTPFileNoCheck(testFileName+"_1", size, client)
  6657. assert.Error(t, err)
  6658. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  6659. assert.NoError(t, err)
  6660. assert.Equal(t, 2, user.UsedQuotaFiles)
  6661. assert.Equal(t, size*2, user.UsedQuotaSize)
  6662. // the uploaded file is not moved and the hook fails, the uploaded file will be deleted
  6663. // and removed from the quota
  6664. movedPath = filepath.Join(user.HomeDir, "missing dir", movedFileName)
  6665. err = os.WriteFile(uploadScriptPath, getUploadScriptContent(movedPath, "", 1), 0755)
  6666. assert.NoError(t, err)
  6667. err = writeSFTPFileNoCheck(testFileName+"_2", size, client)
  6668. assert.Error(t, err)
  6669. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  6670. assert.NoError(t, err)
  6671. assert.Equal(t, 2, user.UsedQuotaFiles)
  6672. assert.Equal(t, size*2, user.UsedQuotaSize)
  6673. // overwrite an existing file
  6674. _, err = client.Stat(movedFileName)
  6675. assert.NoError(t, err)
  6676. err = writeSFTPFileNoCheck(movedFileName, size, client)
  6677. assert.Error(t, err)
  6678. _, err = client.Stat(movedFileName)
  6679. assert.Error(t, err)
  6680. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  6681. assert.NoError(t, err)
  6682. assert.Equal(t, 1, user.UsedQuotaFiles)
  6683. assert.Equal(t, size, user.UsedQuotaSize)
  6684. }
  6685. err = os.Remove(uploadScriptPath)
  6686. assert.NoError(t, err)
  6687. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6688. assert.NoError(t, err)
  6689. err = os.RemoveAll(user.GetHomeDir())
  6690. assert.NoError(t, err)
  6691. common.Config.Actions.ExecuteOn = nil
  6692. common.Config.Actions.ExecuteSync = nil
  6693. common.Config.Actions.Hook = uploadScriptPath
  6694. }
  6695. func TestQuotaTrackDisabled(t *testing.T) {
  6696. err := dataprovider.Close()
  6697. assert.NoError(t, err)
  6698. err = config.LoadConfig(configDir, "")
  6699. assert.NoError(t, err)
  6700. providerConf := config.GetProviderConf()
  6701. providerConf.TrackQuota = 0
  6702. err = dataprovider.Initialize(providerConf, configDir, true)
  6703. assert.NoError(t, err)
  6704. user, _, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  6705. assert.NoError(t, err)
  6706. conn, client, err := getSftpClient(user)
  6707. if assert.NoError(t, err) {
  6708. defer conn.Close()
  6709. defer client.Close()
  6710. err = writeSFTPFile(testFileName, 32, client)
  6711. assert.NoError(t, err)
  6712. err = client.Rename(testFileName, testFileName+"1")
  6713. assert.NoError(t, err)
  6714. }
  6715. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6716. assert.NoError(t, err)
  6717. err = os.RemoveAll(user.GetHomeDir())
  6718. assert.NoError(t, err)
  6719. err = dataprovider.Close()
  6720. assert.NoError(t, err)
  6721. err = config.LoadConfig(configDir, "")
  6722. assert.NoError(t, err)
  6723. providerConf = config.GetProviderConf()
  6724. err = dataprovider.Initialize(providerConf, configDir, true)
  6725. assert.NoError(t, err)
  6726. }
  6727. func TestGetQuotaError(t *testing.T) {
  6728. if dataprovider.GetProviderStatus().Driver == "memory" {
  6729. t.Skip("this test is not available with the memory provider")
  6730. }
  6731. u := getTestUser()
  6732. u.TotalDataTransfer = 2000
  6733. mappedPath := filepath.Join(os.TempDir(), "vdir")
  6734. folderName := filepath.Base(mappedPath)
  6735. vdirPath := "/vpath"
  6736. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  6737. BaseVirtualFolder: vfs.BaseVirtualFolder{
  6738. Name: folderName,
  6739. MappedPath: mappedPath,
  6740. },
  6741. VirtualPath: vdirPath,
  6742. QuotaSize: 0,
  6743. QuotaFiles: 10,
  6744. })
  6745. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6746. assert.NoError(t, err)
  6747. conn, client, err := getSftpClient(user)
  6748. if assert.NoError(t, err) {
  6749. defer conn.Close()
  6750. defer client.Close()
  6751. err = writeSFTPFile(testFileName, 32, client)
  6752. assert.NoError(t, err)
  6753. err = dataprovider.Close()
  6754. assert.NoError(t, err)
  6755. err = client.Rename(testFileName, path.Join(vdirPath, testFileName))
  6756. assert.Error(t, err)
  6757. err = config.LoadConfig(configDir, "")
  6758. assert.NoError(t, err)
  6759. providerConf := config.GetProviderConf()
  6760. err = dataprovider.Initialize(providerConf, configDir, true)
  6761. assert.NoError(t, err)
  6762. }
  6763. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6764. assert.NoError(t, err)
  6765. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName}, http.StatusOK)
  6766. assert.NoError(t, err)
  6767. err = os.RemoveAll(user.GetHomeDir())
  6768. assert.NoError(t, err)
  6769. err = os.RemoveAll(mappedPath)
  6770. assert.NoError(t, err)
  6771. }
  6772. func TestRetentionAPI(t *testing.T) {
  6773. u := getTestUser()
  6774. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6775. assert.NoError(t, err)
  6776. uploadPath := path.Join(testDir, testFileName)
  6777. conn, client, err := getSftpClient(user)
  6778. if assert.NoError(t, err) {
  6779. defer conn.Close()
  6780. defer client.Close()
  6781. err = client.Mkdir(testDir)
  6782. assert.NoError(t, err)
  6783. err = writeSFTPFile(uploadPath, 32, client)
  6784. assert.NoError(t, err)
  6785. folderRetention := []dataprovider.FolderRetention{
  6786. {
  6787. Path: "/",
  6788. Retention: 24,
  6789. DeleteEmptyDirs: true,
  6790. },
  6791. }
  6792. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6793. assert.NoError(t, err)
  6794. assert.Eventually(t, func() bool {
  6795. return len(common.RetentionChecks.Get("")) == 0
  6796. }, 1000*time.Millisecond, 50*time.Millisecond)
  6797. _, err = client.Stat(uploadPath)
  6798. assert.NoError(t, err)
  6799. err = client.Chtimes(uploadPath, time.Now().Add(-48*time.Hour), time.Now().Add(-48*time.Hour))
  6800. assert.NoError(t, err)
  6801. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6802. assert.NoError(t, err)
  6803. assert.Eventually(t, func() bool {
  6804. return len(common.RetentionChecks.Get("")) == 0
  6805. }, 1000*time.Millisecond, 50*time.Millisecond)
  6806. _, err = client.Stat(uploadPath)
  6807. assert.ErrorIs(t, err, os.ErrNotExist)
  6808. _, err = client.Stat(testDir)
  6809. assert.ErrorIs(t, err, os.ErrNotExist)
  6810. err = client.Mkdir(testDir)
  6811. assert.NoError(t, err)
  6812. err = writeSFTPFile(uploadPath, 32, client)
  6813. assert.NoError(t, err)
  6814. folderRetention[0].DeleteEmptyDirs = false
  6815. err = client.Chtimes(uploadPath, time.Now().Add(-48*time.Hour), time.Now().Add(-48*time.Hour))
  6816. assert.NoError(t, err)
  6817. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6818. assert.NoError(t, err)
  6819. assert.Eventually(t, func() bool {
  6820. return len(common.RetentionChecks.Get("")) == 0
  6821. }, 1000*time.Millisecond, 50*time.Millisecond)
  6822. _, err = client.Stat(uploadPath)
  6823. assert.ErrorIs(t, err, os.ErrNotExist)
  6824. _, err = client.Stat(testDir)
  6825. assert.NoError(t, err)
  6826. err = writeSFTPFile(uploadPath, 32, client)
  6827. assert.NoError(t, err)
  6828. err = client.Chtimes(uploadPath, time.Now().Add(-48*time.Hour), time.Now().Add(-48*time.Hour))
  6829. assert.NoError(t, err)
  6830. }
  6831. // remove delete permissions to the user
  6832. user.Permissions["/"+testDir] = []string{dataprovider.PermListItems, dataprovider.PermUpload,
  6833. dataprovider.PermCreateDirs, dataprovider.PermChtimes}
  6834. user, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  6835. assert.NoError(t, err)
  6836. conn, client, err = getSftpClient(user)
  6837. if assert.NoError(t, err) {
  6838. defer conn.Close()
  6839. defer client.Close()
  6840. innerUploadFilePath := path.Join("/"+testDir, testDir, testFileName)
  6841. err = client.Mkdir(path.Join(testDir, testDir))
  6842. assert.NoError(t, err)
  6843. err = writeSFTPFile(innerUploadFilePath, 32, client)
  6844. assert.NoError(t, err)
  6845. err = client.Chtimes(innerUploadFilePath, time.Now().Add(-48*time.Hour), time.Now().Add(-48*time.Hour))
  6846. assert.NoError(t, err)
  6847. folderRetention := []dataprovider.FolderRetention{
  6848. {
  6849. Path: "/missing",
  6850. Retention: 24,
  6851. },
  6852. {
  6853. Path: "/" + testDir,
  6854. Retention: 24,
  6855. DeleteEmptyDirs: true,
  6856. },
  6857. {
  6858. Path: path.Dir(innerUploadFilePath),
  6859. Retention: 0,
  6860. IgnoreUserPermissions: true,
  6861. },
  6862. }
  6863. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6864. assert.NoError(t, err)
  6865. assert.Eventually(t, func() bool {
  6866. return len(common.RetentionChecks.Get("")) == 0
  6867. }, 1000*time.Millisecond, 50*time.Millisecond)
  6868. _, err = client.Stat(uploadPath)
  6869. assert.NoError(t, err)
  6870. _, err = client.Stat(innerUploadFilePath)
  6871. assert.NoError(t, err)
  6872. folderRetention[1].IgnoreUserPermissions = true
  6873. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6874. assert.NoError(t, err)
  6875. assert.Eventually(t, func() bool {
  6876. return len(common.RetentionChecks.Get("")) == 0
  6877. }, 1000*time.Millisecond, 50*time.Millisecond)
  6878. _, err = client.Stat(uploadPath)
  6879. assert.ErrorIs(t, err, os.ErrNotExist)
  6880. _, err = client.Stat(innerUploadFilePath)
  6881. assert.NoError(t, err)
  6882. folderRetention = []dataprovider.FolderRetention{
  6883. {
  6884. Path: "/" + testDir,
  6885. Retention: 24,
  6886. DeleteEmptyDirs: true,
  6887. IgnoreUserPermissions: true,
  6888. },
  6889. }
  6890. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6891. assert.NoError(t, err)
  6892. assert.Eventually(t, func() bool {
  6893. return len(common.RetentionChecks.Get("")) == 0
  6894. }, 1000*time.Millisecond, 50*time.Millisecond)
  6895. _, err = client.Stat(innerUploadFilePath)
  6896. assert.ErrorIs(t, err, os.ErrNotExist)
  6897. }
  6898. // finally test some errors removing files or folders
  6899. if runtime.GOOS != osWindows {
  6900. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  6901. err := os.MkdirAll(dirPath, os.ModePerm)
  6902. assert.NoError(t, err)
  6903. filePath := filepath.Join(dirPath, "f.dat")
  6904. err = os.WriteFile(filePath, nil, os.ModePerm)
  6905. assert.NoError(t, err)
  6906. err = os.Chtimes(filePath, time.Now().Add(-72*time.Hour), time.Now().Add(-72*time.Hour))
  6907. assert.NoError(t, err)
  6908. err = os.Chmod(dirPath, 0001)
  6909. assert.NoError(t, err)
  6910. folderRetention := []dataprovider.FolderRetention{
  6911. {
  6912. Path: "/adir",
  6913. Retention: 24,
  6914. DeleteEmptyDirs: true,
  6915. IgnoreUserPermissions: true,
  6916. },
  6917. }
  6918. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6919. assert.NoError(t, err)
  6920. assert.Eventually(t, func() bool {
  6921. return len(common.RetentionChecks.Get("")) == 0
  6922. }, 1000*time.Millisecond, 50*time.Millisecond)
  6923. err = os.Chmod(dirPath, 0555)
  6924. assert.NoError(t, err)
  6925. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6926. assert.NoError(t, err)
  6927. assert.Eventually(t, func() bool {
  6928. return len(common.RetentionChecks.Get("")) == 0
  6929. }, 1000*time.Millisecond, 50*time.Millisecond)
  6930. err = os.Chmod(dirPath, os.ModePerm)
  6931. assert.NoError(t, err)
  6932. _, err = httpdtest.StartRetentionCheck(user.Username, folderRetention, http.StatusAccepted)
  6933. assert.NoError(t, err)
  6934. assert.Eventually(t, func() bool {
  6935. return len(common.RetentionChecks.Get("")) == 0
  6936. }, 1000*time.Millisecond, 50*time.Millisecond)
  6937. assert.NoDirExists(t, dirPath)
  6938. }
  6939. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6940. assert.NoError(t, err)
  6941. err = os.RemoveAll(user.GetHomeDir())
  6942. assert.NoError(t, err)
  6943. }
  6944. func TestRenameDir(t *testing.T) {
  6945. u := getTestUser()
  6946. testDir := "/dir-to-rename"
  6947. u.Permissions[testDir] = []string{dataprovider.PermListItems, dataprovider.PermUpload}
  6948. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6949. assert.NoError(t, err)
  6950. conn, client, err := getSftpClient(user)
  6951. if assert.NoError(t, err) {
  6952. defer conn.Close()
  6953. defer client.Close()
  6954. err = client.Mkdir(testDir)
  6955. assert.NoError(t, err)
  6956. err = writeSFTPFile(path.Join(testDir, testFileName), 32, client)
  6957. assert.NoError(t, err)
  6958. err = client.Rename(testDir, testDir+"_rename")
  6959. assert.ErrorIs(t, err, os.ErrPermission)
  6960. }
  6961. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  6962. assert.NoError(t, err)
  6963. err = os.RemoveAll(user.GetHomeDir())
  6964. assert.NoError(t, err)
  6965. }
  6966. func TestBuiltinKeyboardInteractiveAuthentication(t *testing.T) {
  6967. u := getTestUser()
  6968. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  6969. assert.NoError(t, err)
  6970. authMethods := []ssh.AuthMethod{
  6971. ssh.KeyboardInteractive(func(user, instruction string, questions []string, echos []bool) ([]string, error) {
  6972. return []string{defaultPassword}, nil
  6973. }),
  6974. }
  6975. conn, client, err := getCustomAuthSftpClient(user, authMethods)
  6976. if assert.NoError(t, err) {
  6977. defer conn.Close()
  6978. defer client.Close()
  6979. assert.NoError(t, checkBasicSFTP(client))
  6980. err = writeSFTPFile(testFileName, 4096, client)
  6981. assert.NoError(t, err)
  6982. }
  6983. // add multi-factor authentication
  6984. configName, _, secret, _, err := mfa.GenerateTOTPSecret(mfa.GetAvailableTOTPConfigNames()[0], user.Username)
  6985. assert.NoError(t, err)
  6986. user.Password = defaultPassword
  6987. user.Filters.TOTPConfig = dataprovider.UserTOTPConfig{
  6988. Enabled: true,
  6989. ConfigName: configName,
  6990. Secret: kms.NewPlainSecret(secret),
  6991. Protocols: []string{common.ProtocolSSH},
  6992. }
  6993. err = dataprovider.UpdateUser(&user, "", "", "")
  6994. assert.NoError(t, err)
  6995. passcode, err := generateTOTPPasscode(secret, otp.AlgorithmSHA1)
  6996. assert.NoError(t, err)
  6997. passwordAsked := false
  6998. passcodeAsked := false
  6999. authMethods = []ssh.AuthMethod{
  7000. ssh.KeyboardInteractive(func(user, instruction string, questions []string, echos []bool) ([]string, error) {
  7001. var answers []string
  7002. if strings.HasPrefix(questions[0], "Password") {
  7003. answers = append(answers, defaultPassword)
  7004. passwordAsked = true
  7005. } else {
  7006. answers = append(answers, passcode)
  7007. passcodeAsked = true
  7008. }
  7009. return answers, nil
  7010. }),
  7011. }
  7012. conn, client, err = getCustomAuthSftpClient(user, authMethods)
  7013. if assert.NoError(t, err) {
  7014. defer conn.Close()
  7015. defer client.Close()
  7016. assert.NoError(t, checkBasicSFTP(client))
  7017. err = writeSFTPFile(testFileName, 4096, client)
  7018. assert.NoError(t, err)
  7019. }
  7020. assert.True(t, passwordAsked)
  7021. assert.True(t, passcodeAsked)
  7022. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7023. assert.NoError(t, err)
  7024. err = os.RemoveAll(user.GetHomeDir())
  7025. assert.NoError(t, err)
  7026. }
  7027. func TestRenameSymlink(t *testing.T) {
  7028. u := getTestUser()
  7029. testDir := "/dir-no-create-links"
  7030. otherDir := "otherdir"
  7031. u.Permissions[testDir] = []string{dataprovider.PermListItems, dataprovider.PermUpload, dataprovider.PermDelete,
  7032. dataprovider.PermCreateDirs}
  7033. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7034. assert.NoError(t, err)
  7035. conn, client, err := getSftpClient(user)
  7036. if assert.NoError(t, err) {
  7037. defer conn.Close()
  7038. defer client.Close()
  7039. err = client.Mkdir(otherDir)
  7040. assert.NoError(t, err)
  7041. err = client.Symlink(otherDir, otherDir+".link")
  7042. assert.NoError(t, err)
  7043. err = client.Rename(otherDir+".link", path.Join(testDir, "symlink"))
  7044. assert.ErrorIs(t, err, os.ErrPermission)
  7045. err = client.Rename(otherDir+".link", "allowed_link")
  7046. assert.NoError(t, err)
  7047. }
  7048. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7049. assert.NoError(t, err)
  7050. err = os.RemoveAll(user.GetHomeDir())
  7051. assert.NoError(t, err)
  7052. }
  7053. func TestSplittedDeletePerms(t *testing.T) {
  7054. u := getTestUser()
  7055. u.Permissions["/"] = []string{dataprovider.PermListItems, dataprovider.PermUpload, dataprovider.PermDeleteDirs,
  7056. dataprovider.PermCreateDirs}
  7057. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7058. assert.NoError(t, err)
  7059. conn, client, err := getSftpClient(user)
  7060. if assert.NoError(t, err) {
  7061. defer conn.Close()
  7062. defer client.Close()
  7063. err = writeSFTPFile(testFileName, 4096, client)
  7064. assert.NoError(t, err)
  7065. err = client.Remove(testFileName)
  7066. assert.Error(t, err)
  7067. err = client.Mkdir(testDir)
  7068. assert.NoError(t, err)
  7069. err = client.RemoveDirectory(testDir)
  7070. assert.NoError(t, err)
  7071. }
  7072. u.Permissions["/"] = []string{dataprovider.PermListItems, dataprovider.PermUpload, dataprovider.PermDeleteFiles,
  7073. dataprovider.PermCreateDirs, dataprovider.PermOverwrite}
  7074. _, _, err = httpdtest.UpdateUser(u, http.StatusOK, "")
  7075. assert.NoError(t, err)
  7076. conn, client, err = getSftpClient(user)
  7077. if assert.NoError(t, err) {
  7078. defer conn.Close()
  7079. defer client.Close()
  7080. err = writeSFTPFile(testFileName, 4096, client)
  7081. assert.NoError(t, err)
  7082. err = client.Remove(testFileName)
  7083. assert.NoError(t, err)
  7084. err = client.Mkdir(testDir)
  7085. assert.NoError(t, err)
  7086. err = client.RemoveDirectory(testDir)
  7087. assert.Error(t, err)
  7088. }
  7089. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7090. assert.NoError(t, err)
  7091. err = os.RemoveAll(user.GetHomeDir())
  7092. assert.NoError(t, err)
  7093. }
  7094. func TestSplittedRenamePerms(t *testing.T) {
  7095. u := getTestUser()
  7096. u.Permissions["/"] = []string{dataprovider.PermListItems, dataprovider.PermUpload, dataprovider.PermRenameDirs,
  7097. dataprovider.PermCreateDirs}
  7098. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7099. assert.NoError(t, err)
  7100. conn, client, err := getSftpClient(user)
  7101. if assert.NoError(t, err) {
  7102. defer conn.Close()
  7103. defer client.Close()
  7104. err = writeSFTPFile(testFileName, 4096, client)
  7105. assert.NoError(t, err)
  7106. err = client.Mkdir(testDir)
  7107. assert.NoError(t, err)
  7108. err = client.Rename(testFileName, testFileName+"_renamed")
  7109. assert.Error(t, err)
  7110. err = client.Rename(testDir, testDir+"_renamed")
  7111. assert.NoError(t, err)
  7112. }
  7113. u.Permissions["/"] = []string{dataprovider.PermListItems, dataprovider.PermUpload, dataprovider.PermRenameFiles,
  7114. dataprovider.PermCreateDirs, dataprovider.PermOverwrite}
  7115. _, _, err = httpdtest.UpdateUser(u, http.StatusOK, "")
  7116. assert.NoError(t, err)
  7117. conn, client, err = getSftpClient(user)
  7118. if assert.NoError(t, err) {
  7119. defer conn.Close()
  7120. defer client.Close()
  7121. err = writeSFTPFile(testFileName, 4096, client)
  7122. assert.NoError(t, err)
  7123. err = client.Mkdir(testDir)
  7124. assert.NoError(t, err)
  7125. err = client.Rename(testFileName, testFileName+"_renamed")
  7126. assert.NoError(t, err)
  7127. err = client.Rename(testDir, testDir+"_renamed")
  7128. assert.Error(t, err)
  7129. }
  7130. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7131. assert.NoError(t, err)
  7132. err = os.RemoveAll(user.GetHomeDir())
  7133. assert.NoError(t, err)
  7134. }
  7135. func TestSFTPLoopError(t *testing.T) {
  7136. smtpCfg := smtp.Config{
  7137. Host: "127.0.0.1",
  7138. Port: 2525,
  7139. From: "[email protected]",
  7140. TemplatesPath: "templates",
  7141. }
  7142. err := smtpCfg.Initialize(configDir, true)
  7143. require.NoError(t, err)
  7144. user1 := getTestUser()
  7145. user2 := getTestUser()
  7146. user1.Username += "1"
  7147. user2.Username += "2"
  7148. // user1 is a local account with a virtual SFTP folder to user2
  7149. // user2 has user1 as SFTP fs
  7150. user1.VirtualFolders = append(user1.VirtualFolders, vfs.VirtualFolder{
  7151. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7152. Name: "sftp",
  7153. FsConfig: vfs.Filesystem{
  7154. Provider: sdk.SFTPFilesystemProvider,
  7155. SFTPConfig: vfs.SFTPFsConfig{
  7156. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  7157. Endpoint: sftpServerAddr,
  7158. Username: user2.Username,
  7159. },
  7160. Password: kms.NewPlainSecret(defaultPassword),
  7161. },
  7162. },
  7163. },
  7164. VirtualPath: "/vdir",
  7165. })
  7166. user2.FsConfig.Provider = sdk.SFTPFilesystemProvider
  7167. user2.FsConfig.SFTPConfig = vfs.SFTPFsConfig{
  7168. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  7169. Endpoint: sftpServerAddr,
  7170. Username: user1.Username,
  7171. },
  7172. Password: kms.NewPlainSecret(defaultPassword),
  7173. }
  7174. user1, resp, err := httpdtest.AddUser(user1, http.StatusCreated)
  7175. assert.NoError(t, err, string(resp))
  7176. user2, resp, err = httpdtest.AddUser(user2, http.StatusCreated)
  7177. assert.NoError(t, err, string(resp))
  7178. // test metadata check event error
  7179. a1 := dataprovider.BaseEventAction{
  7180. Name: "a1",
  7181. Type: dataprovider.ActionTypeMetadataCheck,
  7182. }
  7183. action1, _, err := httpdtest.AddEventAction(a1, http.StatusCreated)
  7184. assert.NoError(t, err)
  7185. a2 := dataprovider.BaseEventAction{
  7186. Name: "a2",
  7187. Type: dataprovider.ActionTypeEmail,
  7188. Options: dataprovider.BaseEventActionOptions{
  7189. EmailConfig: dataprovider.EventActionEmailConfig{
  7190. Recipients: []string{"[email protected]"},
  7191. Subject: `Failed action"`,
  7192. Body: "Test body",
  7193. },
  7194. },
  7195. }
  7196. action2, _, err := httpdtest.AddEventAction(a2, http.StatusCreated)
  7197. assert.NoError(t, err)
  7198. r1 := dataprovider.EventRule{
  7199. Name: "rule1",
  7200. Status: 1,
  7201. Trigger: dataprovider.EventTriggerProviderEvent,
  7202. Conditions: dataprovider.EventConditions{
  7203. ProviderEvents: []string{"update"},
  7204. },
  7205. Actions: []dataprovider.EventAction{
  7206. {
  7207. BaseEventAction: dataprovider.BaseEventAction{
  7208. Name: action1.Name,
  7209. },
  7210. Order: 1,
  7211. },
  7212. {
  7213. BaseEventAction: dataprovider.BaseEventAction{
  7214. Name: action2.Name,
  7215. },
  7216. Order: 2,
  7217. Options: dataprovider.EventActionOptions{
  7218. IsFailureAction: true,
  7219. },
  7220. },
  7221. },
  7222. }
  7223. rule1, _, err := httpdtest.AddEventRule(r1, http.StatusCreated)
  7224. assert.NoError(t, err)
  7225. lastReceivedEmail.reset()
  7226. _, _, err = httpdtest.UpdateUser(user2, http.StatusOK, "")
  7227. assert.NoError(t, err)
  7228. assert.Eventually(t, func() bool {
  7229. return lastReceivedEmail.get().From != ""
  7230. }, 3000*time.Millisecond, 100*time.Millisecond)
  7231. email := lastReceivedEmail.get()
  7232. assert.Len(t, email.To, 1)
  7233. assert.True(t, util.Contains(email.To, "[email protected]"))
  7234. assert.Contains(t, email.Data, `Subject: Failed action`)
  7235. user1.VirtualFolders[0].FsConfig.SFTPConfig.Password = kms.NewPlainSecret(defaultPassword)
  7236. user2.FsConfig.SFTPConfig.Password = kms.NewPlainSecret(defaultPassword)
  7237. conn := common.NewBaseConnection("", common.ProtocolWebDAV, "", "", user1)
  7238. _, _, err = conn.GetFsAndResolvedPath(user1.VirtualFolders[0].VirtualPath)
  7239. assert.ErrorIs(t, err, os.ErrPermission)
  7240. conn = common.NewBaseConnection("", common.ProtocolSFTP, "", "", user1)
  7241. _, _, err = conn.GetFsAndResolvedPath(user1.VirtualFolders[0].VirtualPath)
  7242. assert.Error(t, err)
  7243. conn = common.NewBaseConnection("", common.ProtocolFTP, "", "", user1)
  7244. _, _, err = conn.GetFsAndResolvedPath(user1.VirtualFolders[0].VirtualPath)
  7245. assert.Error(t, err)
  7246. _, err = httpdtest.RemoveEventRule(rule1, http.StatusOK)
  7247. assert.NoError(t, err)
  7248. _, err = httpdtest.RemoveEventAction(action1, http.StatusOK)
  7249. assert.NoError(t, err)
  7250. _, err = httpdtest.RemoveEventAction(action2, http.StatusOK)
  7251. assert.NoError(t, err)
  7252. _, err = httpdtest.RemoveUser(user1, http.StatusOK)
  7253. assert.NoError(t, err)
  7254. err = os.RemoveAll(user1.GetHomeDir())
  7255. assert.NoError(t, err)
  7256. _, err = httpdtest.RemoveUser(user2, http.StatusOK)
  7257. assert.NoError(t, err)
  7258. err = os.RemoveAll(user2.GetHomeDir())
  7259. assert.NoError(t, err)
  7260. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: "sftp"}, http.StatusOK)
  7261. assert.NoError(t, err)
  7262. smtpCfg = smtp.Config{}
  7263. err = smtpCfg.Initialize(configDir, true)
  7264. require.NoError(t, err)
  7265. }
  7266. func TestNonLocalCrossRename(t *testing.T) {
  7267. baseUser, resp, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  7268. assert.NoError(t, err, string(resp))
  7269. u := getTestUser()
  7270. u.HomeDir += "_folders"
  7271. u.Username += "_folders"
  7272. mappedPathSFTP := filepath.Join(os.TempDir(), "sftp")
  7273. folderNameSFTP := filepath.Base(mappedPathSFTP)
  7274. vdirSFTPPath := "/vdir/sftp"
  7275. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7276. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7277. Name: folderNameSFTP,
  7278. FsConfig: vfs.Filesystem{
  7279. Provider: sdk.SFTPFilesystemProvider,
  7280. SFTPConfig: vfs.SFTPFsConfig{
  7281. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  7282. Endpoint: sftpServerAddr,
  7283. Username: baseUser.Username,
  7284. },
  7285. Password: kms.NewPlainSecret(defaultPassword),
  7286. },
  7287. },
  7288. },
  7289. VirtualPath: vdirSFTPPath,
  7290. })
  7291. mappedPathCrypt := filepath.Join(os.TempDir(), "crypt")
  7292. folderNameCrypt := filepath.Base(mappedPathCrypt)
  7293. vdirCryptPath := "/vdir/crypt"
  7294. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7295. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7296. Name: folderNameCrypt,
  7297. FsConfig: vfs.Filesystem{
  7298. Provider: sdk.CryptedFilesystemProvider,
  7299. CryptConfig: vfs.CryptFsConfig{
  7300. Passphrase: kms.NewPlainSecret(defaultPassword),
  7301. },
  7302. },
  7303. MappedPath: mappedPathCrypt,
  7304. },
  7305. VirtualPath: vdirCryptPath,
  7306. })
  7307. user, resp, err := httpdtest.AddUser(u, http.StatusCreated)
  7308. assert.NoError(t, err, string(resp))
  7309. conn, client, err := getSftpClient(user)
  7310. if assert.NoError(t, err) {
  7311. defer conn.Close()
  7312. defer client.Close()
  7313. assert.NoError(t, checkBasicSFTP(client))
  7314. err = writeSFTPFile(testFileName, 4096, client)
  7315. assert.NoError(t, err)
  7316. err = writeSFTPFile(path.Join(vdirSFTPPath, testFileName), 8192, client)
  7317. assert.NoError(t, err)
  7318. err = writeSFTPFile(path.Join(vdirCryptPath, testFileName), 16384, client)
  7319. assert.NoError(t, err)
  7320. err = client.Rename(path.Join(vdirSFTPPath, testFileName), path.Join(vdirCryptPath, testFileName+".rename"))
  7321. assert.ErrorIs(t, err, os.ErrPermission)
  7322. err = client.Rename(path.Join(vdirCryptPath, testFileName), path.Join(vdirSFTPPath, testFileName+".rename"))
  7323. assert.ErrorIs(t, err, os.ErrPermission)
  7324. err = client.Rename(testFileName, path.Join(vdirCryptPath, testFileName+".rename"))
  7325. assert.ErrorIs(t, err, os.ErrPermission)
  7326. err = client.Rename(testFileName, path.Join(vdirSFTPPath, testFileName+".rename"))
  7327. assert.ErrorIs(t, err, os.ErrPermission)
  7328. err = client.Rename(path.Join(vdirSFTPPath, testFileName), testFileName+".rename")
  7329. assert.ErrorIs(t, err, os.ErrPermission)
  7330. err = client.Rename(path.Join(vdirCryptPath, testFileName), testFileName+".rename")
  7331. assert.ErrorIs(t, err, os.ErrPermission)
  7332. // rename on local fs or on the same folder must work
  7333. err = client.Rename(testFileName, testFileName+".rename")
  7334. assert.NoError(t, err)
  7335. err = client.Rename(path.Join(vdirSFTPPath, testFileName), path.Join(vdirSFTPPath, testFileName+"_rename"))
  7336. assert.NoError(t, err)
  7337. err = client.Rename(path.Join(vdirCryptPath, testFileName), path.Join(vdirCryptPath, testFileName+"_rename"))
  7338. assert.NoError(t, err)
  7339. // renaming a virtual folder is not allowed
  7340. err = client.Rename(vdirSFTPPath, vdirSFTPPath+"_rename")
  7341. assert.ErrorIs(t, err, os.ErrPermission)
  7342. err = client.Rename(vdirCryptPath, vdirCryptPath+"_rename")
  7343. assert.ErrorIs(t, err, os.ErrPermission)
  7344. err = client.Rename(vdirCryptPath, path.Join(vdirCryptPath, "rename"))
  7345. assert.ErrorIs(t, err, os.ErrPermission)
  7346. err = client.Mkdir(path.Join(vdirCryptPath, "subcryptdir"))
  7347. assert.NoError(t, err)
  7348. err = client.Rename(path.Join(vdirCryptPath, "subcryptdir"), vdirCryptPath)
  7349. assert.ErrorIs(t, err, os.ErrPermission)
  7350. // renaming root folder is not allowed
  7351. err = client.Rename("/", "new_name")
  7352. assert.ErrorIs(t, err, os.ErrPermission)
  7353. // renaming a path to a virtual folder is not allowed
  7354. err = client.Rename("/vdir", "new_vdir")
  7355. if assert.Error(t, err) {
  7356. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  7357. }
  7358. }
  7359. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7360. assert.NoError(t, err)
  7361. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderNameCrypt}, http.StatusOK)
  7362. assert.NoError(t, err)
  7363. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderNameSFTP}, http.StatusOK)
  7364. assert.NoError(t, err)
  7365. _, err = httpdtest.RemoveUser(baseUser, http.StatusOK)
  7366. assert.NoError(t, err)
  7367. err = os.RemoveAll(user.GetHomeDir())
  7368. assert.NoError(t, err)
  7369. err = os.RemoveAll(baseUser.GetHomeDir())
  7370. assert.NoError(t, err)
  7371. err = os.RemoveAll(mappedPathCrypt)
  7372. assert.NoError(t, err)
  7373. err = os.RemoveAll(mappedPathSFTP)
  7374. assert.NoError(t, err)
  7375. }
  7376. func TestNonLocalCrossRenameNonLocalBaseUser(t *testing.T) {
  7377. baseUser, resp, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  7378. assert.NoError(t, err, string(resp))
  7379. u := getTestSFTPUser()
  7380. mappedPathLocal := filepath.Join(os.TempDir(), "local")
  7381. folderNameLocal := filepath.Base(mappedPathLocal)
  7382. vdirLocalPath := "/vdir/local"
  7383. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7384. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7385. Name: folderNameLocal,
  7386. MappedPath: mappedPathLocal,
  7387. },
  7388. VirtualPath: vdirLocalPath,
  7389. })
  7390. mappedPathCrypt := filepath.Join(os.TempDir(), "crypt")
  7391. folderNameCrypt := filepath.Base(mappedPathCrypt)
  7392. vdirCryptPath := "/vdir/crypt"
  7393. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7394. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7395. Name: folderNameCrypt,
  7396. FsConfig: vfs.Filesystem{
  7397. Provider: sdk.CryptedFilesystemProvider,
  7398. CryptConfig: vfs.CryptFsConfig{
  7399. Passphrase: kms.NewPlainSecret(defaultPassword),
  7400. },
  7401. },
  7402. MappedPath: mappedPathCrypt,
  7403. },
  7404. VirtualPath: vdirCryptPath,
  7405. })
  7406. user, resp, err := httpdtest.AddUser(u, http.StatusCreated)
  7407. assert.NoError(t, err, string(resp))
  7408. conn, client, err := getSftpClient(user)
  7409. if assert.NoError(t, err) {
  7410. defer conn.Close()
  7411. defer client.Close()
  7412. assert.NoError(t, checkBasicSFTP(client))
  7413. err = writeSFTPFile(testFileName, 4096, client)
  7414. assert.NoError(t, err)
  7415. err = writeSFTPFile(path.Join(vdirLocalPath, testFileName), 8192, client)
  7416. assert.NoError(t, err)
  7417. err = writeSFTPFile(path.Join(vdirCryptPath, testFileName), 16384, client)
  7418. assert.NoError(t, err)
  7419. err = client.Rename(path.Join(vdirLocalPath, testFileName), path.Join(vdirCryptPath, testFileName+".rename"))
  7420. assert.ErrorIs(t, err, os.ErrPermission)
  7421. err = client.Rename(path.Join(vdirCryptPath, testFileName), path.Join(vdirLocalPath, testFileName+".rename"))
  7422. assert.ErrorIs(t, err, os.ErrPermission)
  7423. err = client.Rename(testFileName, path.Join(vdirCryptPath, testFileName+".rename"))
  7424. assert.ErrorIs(t, err, os.ErrPermission)
  7425. err = client.Rename(testFileName, path.Join(vdirLocalPath, testFileName+".rename"))
  7426. assert.ErrorIs(t, err, os.ErrPermission)
  7427. err = client.Rename(path.Join(vdirLocalPath, testFileName), testFileName+".rename")
  7428. assert.ErrorIs(t, err, os.ErrPermission)
  7429. err = client.Rename(path.Join(vdirCryptPath, testFileName), testFileName+".rename")
  7430. assert.ErrorIs(t, err, os.ErrPermission)
  7431. // rename on local fs or on the same folder must work
  7432. err = client.Rename(testFileName, testFileName+".rename")
  7433. assert.NoError(t, err)
  7434. err = client.Rename(path.Join(vdirLocalPath, testFileName), path.Join(vdirLocalPath, testFileName+"_rename"))
  7435. assert.NoError(t, err)
  7436. err = client.Rename(path.Join(vdirCryptPath, testFileName), path.Join(vdirCryptPath, testFileName+"_rename"))
  7437. assert.NoError(t, err)
  7438. // renaming a virtual folder is not allowed
  7439. err = client.Rename(vdirLocalPath, vdirLocalPath+"_rename")
  7440. assert.ErrorIs(t, err, os.ErrPermission)
  7441. err = client.Rename(vdirCryptPath, vdirCryptPath+"_rename")
  7442. assert.ErrorIs(t, err, os.ErrPermission)
  7443. // renaming root folder is not allowed
  7444. err = client.Rename("/", "new_name")
  7445. assert.ErrorIs(t, err, os.ErrPermission)
  7446. // renaming a path to a virtual folder is not allowed
  7447. err = client.Rename("/vdir", "new_vdir")
  7448. if assert.Error(t, err) {
  7449. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  7450. }
  7451. }
  7452. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7453. assert.NoError(t, err)
  7454. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderNameCrypt}, http.StatusOK)
  7455. assert.NoError(t, err)
  7456. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderNameLocal}, http.StatusOK)
  7457. assert.NoError(t, err)
  7458. _, err = httpdtest.RemoveUser(baseUser, http.StatusOK)
  7459. assert.NoError(t, err)
  7460. err = os.RemoveAll(user.GetHomeDir())
  7461. assert.NoError(t, err)
  7462. err = os.RemoveAll(baseUser.GetHomeDir())
  7463. assert.NoError(t, err)
  7464. err = os.RemoveAll(mappedPathCrypt)
  7465. assert.NoError(t, err)
  7466. err = os.RemoveAll(mappedPathLocal)
  7467. assert.NoError(t, err)
  7468. }
  7469. func TestCopyAndRemoveSSHCommands(t *testing.T) {
  7470. u := getTestUser()
  7471. u.QuotaFiles = 1000
  7472. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7473. assert.NoError(t, err)
  7474. conn, client, err := getSftpClient(user)
  7475. if assert.NoError(t, err) {
  7476. defer conn.Close()
  7477. defer client.Close()
  7478. fileSize := int64(32)
  7479. err = writeSFTPFile(testFileName, fileSize, client)
  7480. assert.NoError(t, err)
  7481. testFileNameCopy := testFileName + "_copy"
  7482. out, err := runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", testFileName, testFileNameCopy), user)
  7483. assert.NoError(t, err, string(out))
  7484. // the resolved destination path match the source path
  7485. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", testFileName, path.Dir(testFileName)), user)
  7486. assert.Error(t, err, string(out))
  7487. info, err := client.Stat(testFileNameCopy)
  7488. if assert.NoError(t, err) {
  7489. assert.Equal(t, fileSize, info.Size())
  7490. }
  7491. testDir := "test dir"
  7492. err = client.Mkdir(testDir)
  7493. assert.NoError(t, err)
  7494. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s '%s'`, testFileName, testDir), user)
  7495. assert.NoError(t, err, string(out))
  7496. info, err = client.Stat(path.Join(testDir, testFileName))
  7497. if assert.NoError(t, err) {
  7498. assert.Equal(t, fileSize, info.Size())
  7499. }
  7500. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7501. assert.NoError(t, err)
  7502. assert.Equal(t, 3*fileSize, user.UsedQuotaSize)
  7503. assert.Equal(t, 3, user.UsedQuotaFiles)
  7504. out, err = runSSHCommand(fmt.Sprintf("sftpgo-remove %s", testFileNameCopy), user)
  7505. assert.NoError(t, err, string(out))
  7506. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-remove '%s'`, testDir), user)
  7507. assert.NoError(t, err, string(out))
  7508. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7509. assert.NoError(t, err)
  7510. assert.Equal(t, fileSize, user.UsedQuotaSize)
  7511. assert.Equal(t, 1, user.UsedQuotaFiles)
  7512. _, err = client.Stat(testFileNameCopy)
  7513. assert.ErrorIs(t, err, os.ErrNotExist)
  7514. // create a dir tree
  7515. dir1 := "dir1"
  7516. dir2 := "dir 2"
  7517. err = client.MkdirAll(path.Join(dir1, dir2))
  7518. assert.NoError(t, err)
  7519. toCreate := []string{
  7520. path.Join(dir1, testFileName),
  7521. path.Join(dir1, dir2, testFileName),
  7522. }
  7523. for _, p := range toCreate {
  7524. err = writeSFTPFile(p, fileSize, client)
  7525. assert.NoError(t, err)
  7526. }
  7527. // create a symlink, copying a symlink is not supported
  7528. err = client.Symlink(path.Join("/", dir1, testFileName), path.Join("/", dir1, testFileName+"_link"))
  7529. assert.NoError(t, err)
  7530. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", path.Join("/", dir1, testFileName+"_link"),
  7531. path.Join("/", testFileName+"_link")), user)
  7532. assert.Error(t, err, string(out))
  7533. // copying a dir inside itself should fail
  7534. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", path.Join("/", dir1),
  7535. path.Join("/", dir1, "sub")), user)
  7536. assert.Error(t, err, string(out))
  7537. // copy source and dest must differ
  7538. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", path.Join("/", dir1),
  7539. path.Join("/", dir1)), user)
  7540. assert.Error(t, err, string(out))
  7541. // copy a missing file/dir should fail
  7542. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", path.Join("/", "missing_entry"),
  7543. path.Join("/", dir1)), user)
  7544. assert.Error(t, err, string(out))
  7545. // try to overwrite a file with a dir
  7546. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", path.Join("/", dir1), testFileName), user)
  7547. assert.Error(t, err, string(out))
  7548. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s "%s"`, dir1, dir2), user)
  7549. assert.NoError(t, err, string(out))
  7550. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7551. assert.NoError(t, err)
  7552. assert.Equal(t, 5*fileSize, user.UsedQuotaSize)
  7553. assert.Equal(t, 5, user.UsedQuotaFiles)
  7554. // copy again, quota must remain unchanged
  7555. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s/ "%s"`, dir1, dir2), user)
  7556. assert.NoError(t, err, string(out))
  7557. _, err = client.Stat(dir2)
  7558. assert.NoError(t, err)
  7559. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7560. assert.NoError(t, err)
  7561. assert.Equal(t, 5*fileSize, user.UsedQuotaSize)
  7562. assert.Equal(t, 5, user.UsedQuotaFiles)
  7563. // now copy inside target
  7564. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s "%s"`, dir1, dir2), user)
  7565. assert.NoError(t, err, string(out))
  7566. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7567. assert.NoError(t, err)
  7568. assert.Equal(t, 7*fileSize, user.UsedQuotaSize)
  7569. assert.Equal(t, 7, user.UsedQuotaFiles)
  7570. for _, p := range []string{dir1, dir2} {
  7571. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-remove "%s"`, p), user)
  7572. assert.NoError(t, err, string(out))
  7573. _, err = client.Stat(p)
  7574. assert.ErrorIs(t, err, os.ErrNotExist)
  7575. }
  7576. user, _, err = httpdtest.GetUserByUsername(user.Username, http.StatusOK)
  7577. assert.NoError(t, err)
  7578. assert.Equal(t, fileSize, user.UsedQuotaSize)
  7579. assert.Equal(t, 1, user.UsedQuotaFiles)
  7580. // test quota errors
  7581. user.QuotaFiles = 1
  7582. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  7583. assert.NoError(t, err)
  7584. // quota files exceeded
  7585. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", testFileName, testFileNameCopy), user)
  7586. assert.Error(t, err, string(out))
  7587. user.QuotaFiles = 1000
  7588. user.QuotaSize = fileSize + 1
  7589. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  7590. assert.NoError(t, err)
  7591. // quota size exceeded after the copy
  7592. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", testFileName, testFileNameCopy), user)
  7593. assert.Error(t, err, string(out))
  7594. user.QuotaSize = fileSize - 1
  7595. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  7596. assert.NoError(t, err)
  7597. // quota size exceeded
  7598. out, err = runSSHCommand(fmt.Sprintf("sftpgo-copy %s %s", testFileName, testFileNameCopy), user)
  7599. assert.Error(t, err, string(out))
  7600. }
  7601. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7602. assert.NoError(t, err)
  7603. err = os.RemoveAll(user.GetHomeDir())
  7604. assert.NoError(t, err)
  7605. }
  7606. func TestCopyAndRemovePermissions(t *testing.T) {
  7607. u := getTestUser()
  7608. restrictedPath := "/dir/path"
  7609. patternFilterPath := "/patterns"
  7610. u.Filters.FilePatterns = []sdk.PatternsFilter{
  7611. {
  7612. Path: patternFilterPath,
  7613. DeniedPatterns: []string{"*.dat"},
  7614. },
  7615. }
  7616. u.Permissions[restrictedPath] = []string{}
  7617. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7618. assert.NoError(t, err)
  7619. conn, client, err := getSftpClient(user)
  7620. if assert.NoError(t, err) {
  7621. defer conn.Close()
  7622. defer client.Close()
  7623. err = client.MkdirAll(restrictedPath)
  7624. assert.NoError(t, err)
  7625. err = client.MkdirAll(patternFilterPath)
  7626. assert.NoError(t, err)
  7627. err = writeSFTPFile(testFileName, 100, client)
  7628. assert.NoError(t, err)
  7629. // getting file writer will fail
  7630. out, err := runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, testFileName, restrictedPath), user)
  7631. assert.Error(t, err, string(out))
  7632. // file pattern not allowed
  7633. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, testFileName, patternFilterPath), user)
  7634. assert.Error(t, err, string(out))
  7635. testDir := path.Join("/", path.Base(restrictedPath))
  7636. err = client.Mkdir(testDir)
  7637. assert.NoError(t, err)
  7638. err = writeSFTPFile(path.Join(testDir, testFileName), 100, client)
  7639. assert.NoError(t, err)
  7640. // creating target dir will fail
  7641. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s/`, testDir, restrictedPath), user)
  7642. assert.Error(t, err, string(out))
  7643. // get dir contents will fail
  7644. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s /`, restrictedPath), user)
  7645. assert.Error(t, err, string(out))
  7646. // get dir contents will fail
  7647. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-remove %s`, restrictedPath), user)
  7648. assert.Error(t, err, string(out))
  7649. // give list dir permissions and retry, now delete will fail
  7650. user.Permissions[restrictedPath] = []string{dataprovider.PermListItems, dataprovider.PermUpload}
  7651. user.Permissions[testDir] = []string{dataprovider.PermListItems}
  7652. _, _, err = httpdtest.UpdateUser(user, http.StatusOK, "")
  7653. assert.NoError(t, err)
  7654. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, testFileName, restrictedPath), user)
  7655. assert.NoError(t, err, string(out))
  7656. // overwrite will fail, no permission
  7657. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, testFileName, restrictedPath), user)
  7658. assert.Error(t, err, string(out))
  7659. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-remove %s`, restrictedPath), user)
  7660. assert.Error(t, err, string(out))
  7661. // try to copy a file from testDir, we have only list permissions so getFileReader will fail
  7662. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, path.Join(testDir, testFileName), testFileName+".copy"), user)
  7663. assert.Error(t, err, string(out))
  7664. }
  7665. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7666. assert.NoError(t, err)
  7667. err = os.RemoveAll(user.GetHomeDir())
  7668. assert.NoError(t, err)
  7669. }
  7670. func TestCrossFoldersCopy(t *testing.T) {
  7671. baseUser, resp, err := httpdtest.AddUser(getTestUser(), http.StatusCreated)
  7672. assert.NoError(t, err, string(resp))
  7673. u := getTestUser()
  7674. u.Username += "_1"
  7675. u.HomeDir = filepath.Join(os.TempDir(), u.Username)
  7676. u.QuotaFiles = 1000
  7677. mappedPath1 := filepath.Join(os.TempDir(), "mapped1")
  7678. folderName1 := filepath.Base(mappedPath1)
  7679. vpath1 := "/vdirs/vdir1"
  7680. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7681. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7682. Name: folderName1,
  7683. MappedPath: mappedPath1,
  7684. },
  7685. VirtualPath: vpath1,
  7686. QuotaSize: -1,
  7687. QuotaFiles: -1,
  7688. })
  7689. mappedPath2 := filepath.Join(os.TempDir(), "mapped1", "dir", "mapped2")
  7690. folderName2 := filepath.Base(mappedPath2)
  7691. vpath2 := "/vdirs/vdir2"
  7692. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7693. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7694. Name: folderName2,
  7695. MappedPath: mappedPath2,
  7696. },
  7697. VirtualPath: vpath2,
  7698. QuotaSize: -1,
  7699. QuotaFiles: -1,
  7700. })
  7701. mappedPath3 := filepath.Join(os.TempDir(), "mapped3")
  7702. folderName3 := filepath.Base(mappedPath3)
  7703. vpath3 := "/vdirs/vdir3"
  7704. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7705. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7706. Name: folderName3,
  7707. MappedPath: mappedPath3,
  7708. FsConfig: vfs.Filesystem{
  7709. Provider: sdk.CryptedFilesystemProvider,
  7710. CryptConfig: vfs.CryptFsConfig{
  7711. Passphrase: kms.NewPlainSecret(defaultPassword),
  7712. },
  7713. },
  7714. },
  7715. VirtualPath: vpath3,
  7716. QuotaSize: -1,
  7717. QuotaFiles: -1,
  7718. })
  7719. mappedPath4 := filepath.Join(os.TempDir(), "mapped4")
  7720. folderName4 := filepath.Base(mappedPath4)
  7721. vpath4 := "/vdirs/vdir4"
  7722. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  7723. BaseVirtualFolder: vfs.BaseVirtualFolder{
  7724. Name: folderName4,
  7725. MappedPath: mappedPath4,
  7726. FsConfig: vfs.Filesystem{
  7727. Provider: sdk.SFTPFilesystemProvider,
  7728. SFTPConfig: vfs.SFTPFsConfig{
  7729. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  7730. Endpoint: sftpServerAddr,
  7731. Username: baseUser.Username,
  7732. },
  7733. Password: kms.NewPlainSecret(defaultPassword),
  7734. },
  7735. },
  7736. },
  7737. VirtualPath: vpath4,
  7738. QuotaSize: -1,
  7739. QuotaFiles: -1,
  7740. })
  7741. user, resp, err := httpdtest.AddUser(u, http.StatusCreated)
  7742. assert.NoError(t, err, string(resp))
  7743. conn, client, err := getSftpClient(user)
  7744. if assert.NoError(t, err) {
  7745. defer conn.Close()
  7746. defer client.Close()
  7747. baseFileSize := int64(100)
  7748. err = writeSFTPFile(path.Join(vpath1, testFileName), baseFileSize+1, client)
  7749. assert.NoError(t, err)
  7750. err = writeSFTPFile(path.Join(vpath2, testFileName), baseFileSize+2, client)
  7751. assert.NoError(t, err)
  7752. err = writeSFTPFile(path.Join(vpath3, testFileName), baseFileSize+3, client)
  7753. assert.NoError(t, err)
  7754. err = writeSFTPFile(path.Join(vpath4, testFileName), baseFileSize+4, client)
  7755. assert.NoError(t, err)
  7756. // cannot remove a directory with virtual folders inside
  7757. out, err := runSSHCommand(fmt.Sprintf(`sftpgo-remove %s`, path.Dir(vpath1)), user)
  7758. assert.Error(t, err, string(out))
  7759. // copy across virtual folders
  7760. copyDir := "/copy"
  7761. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s/`, path.Dir(vpath1), copyDir), user)
  7762. assert.NoError(t, err, string(out))
  7763. // check the copy
  7764. info, err := client.Stat(path.Join(copyDir, vpath1, testFileName))
  7765. if assert.NoError(t, err) {
  7766. assert.Equal(t, baseFileSize+1, info.Size())
  7767. }
  7768. info, err = client.Stat(path.Join(copyDir, vpath2, testFileName))
  7769. if assert.NoError(t, err) {
  7770. assert.Equal(t, baseFileSize+2, info.Size())
  7771. }
  7772. info, err = client.Stat(path.Join(copyDir, vpath3, testFileName))
  7773. if assert.NoError(t, err) {
  7774. assert.Equal(t, baseFileSize+3, info.Size())
  7775. }
  7776. info, err = client.Stat(path.Join(copyDir, vpath4, testFileName))
  7777. if assert.NoError(t, err) {
  7778. assert.Equal(t, baseFileSize+4, info.Size())
  7779. }
  7780. // nested fs paths
  7781. out, err = runSSHCommand(fmt.Sprintf(`sftpgo-copy %s %s`, vpath1, vpath2), user)
  7782. assert.Error(t, err, string(out))
  7783. }
  7784. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7785. assert.NoError(t, err)
  7786. err = os.RemoveAll(user.GetHomeDir())
  7787. assert.NoError(t, err)
  7788. _, err = httpdtest.RemoveUser(baseUser, http.StatusOK)
  7789. assert.NoError(t, err)
  7790. err = os.RemoveAll(baseUser.GetHomeDir())
  7791. assert.NoError(t, err)
  7792. for _, folderName := range []string{folderName1, folderName2, folderName3, folderName4} {
  7793. _, err = httpdtest.RemoveFolder(vfs.BaseVirtualFolder{Name: folderName}, http.StatusOK)
  7794. assert.NoError(t, err)
  7795. err = os.RemoveAll(filepath.Join(os.TempDir(), folderName))
  7796. assert.NoError(t, err)
  7797. }
  7798. }
  7799. func TestHTTPFs(t *testing.T) {
  7800. u := getTestUserWithHTTPFs()
  7801. user, _, err := httpdtest.AddUser(u, http.StatusCreated)
  7802. assert.NoError(t, err)
  7803. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  7804. assert.NoError(t, err)
  7805. conn := common.NewBaseConnection(xid.New().String(), common.ProtocolFTP, "", "", user)
  7806. err = conn.CreateDir(httpFsWellKnowDir, false)
  7807. assert.NoError(t, err)
  7808. err = os.WriteFile(filepath.Join(os.TempDir(), "httpfs", defaultHTTPFsUsername, httpFsWellKnowDir, "file.txt"), []byte("data"), 0666)
  7809. assert.NoError(t, err)
  7810. err = conn.Copy(httpFsWellKnowDir, httpFsWellKnowDir+"_copy")
  7811. assert.NoError(t, err)
  7812. _, err = httpdtest.RemoveUser(user, http.StatusOK)
  7813. assert.NoError(t, err)
  7814. err = os.RemoveAll(user.GetHomeDir())
  7815. assert.NoError(t, err)
  7816. }
  7817. func TestProxyProtocol(t *testing.T) {
  7818. resp, err := httpclient.Get(fmt.Sprintf("http://%v", httpProxyAddr))
  7819. if assert.NoError(t, err) {
  7820. defer resp.Body.Close()
  7821. assert.Equal(t, http.StatusBadRequest, resp.StatusCode)
  7822. }
  7823. }
  7824. func TestSetProtocol(t *testing.T) {
  7825. conn := common.NewBaseConnection("id", "sshd_exec", "", "", dataprovider.User{BaseUser: sdk.BaseUser{HomeDir: os.TempDir()}})
  7826. conn.SetProtocol(common.ProtocolSCP)
  7827. require.Equal(t, "SCP_id", conn.GetID())
  7828. }
  7829. func TestGetFsError(t *testing.T) {
  7830. u := getTestUser()
  7831. u.FsConfig.Provider = sdk.GCSFilesystemProvider
  7832. u.FsConfig.GCSConfig.Bucket = "test"
  7833. u.FsConfig.GCSConfig.Credentials = kms.NewPlainSecret("invalid JSON for credentials")
  7834. conn := common.NewBaseConnection("", common.ProtocolFTP, "", "", u)
  7835. _, _, err := conn.GetFsAndResolvedPath("/vpath")
  7836. assert.Error(t, err)
  7837. }
  7838. func waitTCPListening(address string) {
  7839. for {
  7840. conn, err := net.Dial("tcp", address)
  7841. if err != nil {
  7842. logger.WarnToConsole("tcp server %v not listening: %v", address, err)
  7843. time.Sleep(100 * time.Millisecond)
  7844. continue
  7845. }
  7846. logger.InfoToConsole("tcp server %v now listening", address)
  7847. conn.Close()
  7848. break
  7849. }
  7850. }
  7851. func checkBasicSFTP(client *sftp.Client) error {
  7852. _, err := client.Getwd()
  7853. if err != nil {
  7854. return err
  7855. }
  7856. _, err = client.ReadDir(".")
  7857. return err
  7858. }
  7859. func getCustomAuthSftpClient(user dataprovider.User, authMethods []ssh.AuthMethod) (*ssh.Client, *sftp.Client, error) {
  7860. var sftpClient *sftp.Client
  7861. config := &ssh.ClientConfig{
  7862. User: user.Username,
  7863. HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
  7864. return nil
  7865. },
  7866. Auth: authMethods,
  7867. Timeout: 5 * time.Second,
  7868. }
  7869. conn, err := ssh.Dial("tcp", sftpServerAddr, config)
  7870. if err != nil {
  7871. return conn, sftpClient, err
  7872. }
  7873. sftpClient, err = sftp.NewClient(conn)
  7874. if err != nil {
  7875. conn.Close()
  7876. }
  7877. return conn, sftpClient, err
  7878. }
  7879. func getSftpClient(user dataprovider.User) (*ssh.Client, *sftp.Client, error) {
  7880. var sftpClient *sftp.Client
  7881. config := &ssh.ClientConfig{
  7882. User: user.Username,
  7883. HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
  7884. return nil
  7885. },
  7886. Timeout: 5 * time.Second,
  7887. }
  7888. if user.Password != "" {
  7889. config.Auth = []ssh.AuthMethod{ssh.Password(user.Password)}
  7890. } else {
  7891. config.Auth = []ssh.AuthMethod{ssh.Password(defaultPassword)}
  7892. }
  7893. conn, err := ssh.Dial("tcp", sftpServerAddr, config)
  7894. if err != nil {
  7895. return conn, sftpClient, err
  7896. }
  7897. sftpClient, err = sftp.NewClient(conn)
  7898. if err != nil {
  7899. conn.Close()
  7900. }
  7901. return conn, sftpClient, err
  7902. }
  7903. func runSSHCommand(command string, user dataprovider.User) ([]byte, error) {
  7904. var sshSession *ssh.Session
  7905. var output []byte
  7906. config := &ssh.ClientConfig{
  7907. User: user.Username,
  7908. HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
  7909. return nil
  7910. },
  7911. Timeout: 5 * time.Second,
  7912. }
  7913. if user.Password != "" {
  7914. config.Auth = []ssh.AuthMethod{ssh.Password(user.Password)}
  7915. } else {
  7916. config.Auth = []ssh.AuthMethod{ssh.Password(defaultPassword)}
  7917. }
  7918. conn, err := ssh.Dial("tcp", sftpServerAddr, config)
  7919. if err != nil {
  7920. return output, err
  7921. }
  7922. defer conn.Close()
  7923. sshSession, err = conn.NewSession()
  7924. if err != nil {
  7925. return output, err
  7926. }
  7927. var stdout, stderr bytes.Buffer
  7928. sshSession.Stdout = &stdout
  7929. sshSession.Stderr = &stderr
  7930. err = sshSession.Run(command)
  7931. if err != nil {
  7932. return nil, fmt.Errorf("failed to run command %v: %v", command, stderr.Bytes())
  7933. }
  7934. return stdout.Bytes(), err
  7935. }
  7936. func getWebDavClient(user dataprovider.User) *gowebdav.Client {
  7937. rootPath := fmt.Sprintf("http://localhost:%d/", webDavServerPort)
  7938. pwd := defaultPassword
  7939. if user.Password != "" {
  7940. pwd = user.Password
  7941. }
  7942. client := gowebdav.NewClient(rootPath, user.Username, pwd)
  7943. client.SetTimeout(10 * time.Second)
  7944. return client
  7945. }
  7946. func getTestUser() dataprovider.User {
  7947. user := dataprovider.User{
  7948. BaseUser: sdk.BaseUser{
  7949. Username: defaultUsername,
  7950. Password: defaultPassword,
  7951. HomeDir: filepath.Join(homeBasePath, defaultUsername),
  7952. Status: 1,
  7953. ExpirationDate: 0,
  7954. },
  7955. }
  7956. user.Permissions = make(map[string][]string)
  7957. user.Permissions["/"] = allPerms
  7958. return user
  7959. }
  7960. func getTestSFTPUser() dataprovider.User {
  7961. u := getTestUser()
  7962. u.Username = defaultSFTPUsername
  7963. u.FsConfig.Provider = sdk.SFTPFilesystemProvider
  7964. u.FsConfig.SFTPConfig.Endpoint = sftpServerAddr
  7965. u.FsConfig.SFTPConfig.Username = defaultUsername
  7966. u.FsConfig.SFTPConfig.Password = kms.NewPlainSecret(defaultPassword)
  7967. return u
  7968. }
  7969. func getCryptFsUser() dataprovider.User {
  7970. u := getTestUser()
  7971. u.Username += "_crypt"
  7972. u.FsConfig.Provider = sdk.CryptedFilesystemProvider
  7973. u.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret(defaultPassword)
  7974. return u
  7975. }
  7976. func getTestUserWithHTTPFs() dataprovider.User {
  7977. u := getTestUser()
  7978. u.FsConfig.Provider = sdk.HTTPFilesystemProvider
  7979. u.FsConfig.HTTPConfig = vfs.HTTPFsConfig{
  7980. BaseHTTPFsConfig: sdk.BaseHTTPFsConfig{
  7981. Endpoint: fmt.Sprintf("http://127.0.0.1:%d/api/v1", httpFsPort),
  7982. Username: defaultHTTPFsUsername,
  7983. },
  7984. }
  7985. return u
  7986. }
  7987. func writeSFTPFile(name string, size int64, client *sftp.Client) error {
  7988. err := writeSFTPFileNoCheck(name, size, client)
  7989. if err != nil {
  7990. return err
  7991. }
  7992. info, err := client.Stat(name)
  7993. if err != nil {
  7994. return err
  7995. }
  7996. if info.Size() != size {
  7997. return fmt.Errorf("file size mismatch, wanted %v, actual %v", size, info.Size())
  7998. }
  7999. return nil
  8000. }
  8001. func writeSFTPFileNoCheck(name string, size int64, client *sftp.Client) error {
  8002. content := make([]byte, size)
  8003. _, err := rand.Read(content)
  8004. if err != nil {
  8005. return err
  8006. }
  8007. f, err := client.Create(name)
  8008. if err != nil {
  8009. return err
  8010. }
  8011. _, err = io.Copy(f, bytes.NewBuffer(content))
  8012. if err != nil {
  8013. f.Close()
  8014. return err
  8015. }
  8016. return f.Close()
  8017. }
  8018. func getUploadScriptContent(movedPath, logFilePath string, exitStatus int) []byte {
  8019. content := []byte("#!/bin/sh\n\n")
  8020. content = append(content, []byte("sleep 1\n")...)
  8021. if logFilePath != "" {
  8022. content = append(content, []byte(fmt.Sprintf("echo $@ > %v\n", logFilePath))...)
  8023. }
  8024. content = append(content, []byte(fmt.Sprintf("mv ${SFTPGO_ACTION_PATH} %v\n", movedPath))...)
  8025. content = append(content, []byte(fmt.Sprintf("exit %d", exitStatus))...)
  8026. return content
  8027. }
  8028. func getSaveProviderObjectScriptContent(outFilePath string, exitStatus int) []byte {
  8029. content := []byte("#!/bin/sh\n\n")
  8030. content = append(content, []byte(fmt.Sprintf("echo ${SFTPGO_OBJECT_DATA} > %v\n", outFilePath))...)
  8031. content = append(content, []byte(fmt.Sprintf("exit %d", exitStatus))...)
  8032. return content
  8033. }
  8034. func generateTOTPPasscode(secret string, algo otp.Algorithm) (string, error) {
  8035. return totp.GenerateCodeCustom(secret, time.Now(), totp.ValidateOpts{
  8036. Period: 30,
  8037. Skew: 1,
  8038. Digits: otp.DigitsSix,
  8039. Algorithm: algo,
  8040. })
  8041. }
  8042. func isDbDefenderSupported() bool {
  8043. // SQLite shares the implementation with other SQL-based provider but it makes no sense
  8044. // to use it outside test cases
  8045. switch dataprovider.GetProviderStatus().Driver {
  8046. case dataprovider.MySQLDataProviderName, dataprovider.PGSQLDataProviderName,
  8047. dataprovider.CockroachDataProviderName, dataprovider.SQLiteDataProviderName:
  8048. return true
  8049. default:
  8050. return false
  8051. }
  8052. }
  8053. func getEncryptedFileSize(size int64) (int64, error) {
  8054. encSize, err := sio.EncryptedSize(uint64(size))
  8055. return int64(encSize) + 33, err
  8056. }
  8057. func printLatestLogs(maxNumberOfLines int) {
  8058. var lines []string
  8059. f, err := os.Open(logFilePath)
  8060. if err != nil {
  8061. return
  8062. }
  8063. defer f.Close()
  8064. scanner := bufio.NewScanner(f)
  8065. for scanner.Scan() {
  8066. lines = append(lines, scanner.Text()+"\r\n")
  8067. for len(lines) > maxNumberOfLines {
  8068. lines = lines[1:]
  8069. }
  8070. }
  8071. if scanner.Err() != nil {
  8072. logger.WarnToConsole("Unable to print latest logs: %v", scanner.Err())
  8073. return
  8074. }
  8075. for _, line := range lines {
  8076. logger.DebugToConsole(line)
  8077. }
  8078. }
  8079. type receivedEmail struct {
  8080. sync.RWMutex
  8081. From string
  8082. To []string
  8083. Data string
  8084. }
  8085. func (e *receivedEmail) set(from string, to []string, data []byte) {
  8086. e.Lock()
  8087. defer e.Unlock()
  8088. e.From = from
  8089. e.To = to
  8090. e.Data = strings.ReplaceAll(string(data), "=\r\n", "")
  8091. }
  8092. func (e *receivedEmail) reset() {
  8093. e.Lock()
  8094. defer e.Unlock()
  8095. e.From = ""
  8096. e.To = nil
  8097. e.Data = ""
  8098. }
  8099. func (e *receivedEmail) get() receivedEmail {
  8100. e.RLock()
  8101. defer e.RUnlock()
  8102. return receivedEmail{
  8103. From: e.From,
  8104. To: e.To,
  8105. Data: e.Data,
  8106. }
  8107. }
  8108. func startHTTPFs() {
  8109. go func() {
  8110. readdirCallback := func(name string) []os.FileInfo {
  8111. if name == httpFsWellKnowDir {
  8112. return []os.FileInfo{vfs.NewFileInfo("ghost.txt", false, 0, time.Unix(0, 0), false)}
  8113. }
  8114. return nil
  8115. }
  8116. callbacks := &httpdtest.HTTPFsCallbacks{
  8117. Readdir: readdirCallback,
  8118. }
  8119. if err := httpdtest.StartTestHTTPFs(httpFsPort, callbacks); err != nil {
  8120. logger.ErrorToConsole("could not start HTTPfs test server: %v", err)
  8121. os.Exit(1)
  8122. }
  8123. }()
  8124. waitTCPListening(fmt.Sprintf(":%d", httpFsPort))
  8125. }