telemetry_test.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package telemetry
  15. import (
  16. "net/http"
  17. "net/http/httptest"
  18. "os"
  19. "path/filepath"
  20. "runtime"
  21. "testing"
  22. "github.com/stretchr/testify/require"
  23. "github.com/drakkan/sftpgo/v2/internal/common"
  24. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  25. )
  26. const (
  27. httpsCert = `-----BEGIN CERTIFICATE-----
  28. MIICHTCCAaKgAwIBAgIUHnqw7QnB1Bj9oUsNpdb+ZkFPOxMwCgYIKoZIzj0EAwIw
  29. RTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGElu
  30. dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yMDAyMDQwOTUzMDRaFw0zMDAyMDEw
  31. OTUzMDRaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYD
  32. VQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwdjAQBgcqhkjOPQIBBgUrgQQA
  33. IgNiAARCjRMqJ85rzMC998X5z761nJ+xL3bkmGVqWvrJ51t5OxV0v25NsOgR82CA
  34. NXUgvhVYs7vNFN+jxtb2aj6Xg+/2G/BNxkaFspIVCzgWkxiz7XE4lgUwX44FCXZM
  35. 3+JeUbKjUzBRMB0GA1UdDgQWBBRhLw+/o3+Z02MI/d4tmaMui9W16jAfBgNVHSME
  36. GDAWgBRhLw+/o3+Z02MI/d4tmaMui9W16jAPBgNVHRMBAf8EBTADAQH/MAoGCCqG
  37. SM49BAMCA2kAMGYCMQDqLt2lm8mE+tGgtjDmtFgdOcI72HSbRQ74D5rYTzgST1rY
  38. /8wTi5xl8TiFUyLMUsICMQC5ViVxdXbhuG7gX6yEqSkMKZICHpO8hqFwOD/uaFVI
  39. dV4vKmHUzwK/eIx+8Ay3neE=
  40. -----END CERTIFICATE-----`
  41. httpsKey = `-----BEGIN EC PARAMETERS-----
  42. BgUrgQQAIg==
  43. -----END EC PARAMETERS-----
  44. -----BEGIN EC PRIVATE KEY-----
  45. MIGkAgEBBDCfMNsN6miEE3rVyUPwElfiJSWaR5huPCzUenZOfJT04GAcQdWvEju3
  46. UM2lmBLIXpGgBwYFK4EEACKhZANiAARCjRMqJ85rzMC998X5z761nJ+xL3bkmGVq
  47. WvrJ51t5OxV0v25NsOgR82CANXUgvhVYs7vNFN+jxtb2aj6Xg+/2G/BNxkaFspIV
  48. CzgWkxiz7XE4lgUwX44FCXZM3+JeUbI=
  49. -----END EC PRIVATE KEY-----`
  50. )
  51. func TestInitialization(t *testing.T) {
  52. configDir := filepath.Join(".", "..", "..")
  53. providerConf := dataprovider.Config{
  54. Driver: dataprovider.MemoryDataProviderName,
  55. BackupsPath: "backups",
  56. }
  57. err := dataprovider.Initialize(providerConf, configDir, false)
  58. require.NoError(t, err)
  59. commonConfig := common.Configuration{}
  60. err = common.Initialize(commonConfig, 0)
  61. require.NoError(t, err)
  62. c := Conf{
  63. BindPort: 10000,
  64. BindAddress: "invalid address",
  65. EnableProfiler: false,
  66. }
  67. err = c.Initialize(configDir)
  68. require.Error(t, err)
  69. c.AuthUserFile = "missing"
  70. err = c.Initialize(".")
  71. require.Error(t, err)
  72. err = ReloadCertificateMgr()
  73. require.NoError(t, err)
  74. c.AuthUserFile = ""
  75. c.CertificateFile = "crt"
  76. c.CertificateKeyFile = "key"
  77. err = c.Initialize(".")
  78. require.Error(t, err)
  79. certPath := filepath.Join(os.TempDir(), "test.crt")
  80. keyPath := filepath.Join(os.TempDir(), "test.key")
  81. err = os.WriteFile(certPath, []byte(httpsCert), os.ModePerm)
  82. require.NoError(t, err)
  83. err = os.WriteFile(keyPath, []byte(httpsKey), os.ModePerm)
  84. require.NoError(t, err)
  85. c.CertificateFile = certPath
  86. c.CertificateKeyFile = keyPath
  87. err = c.Initialize(".")
  88. require.Error(t, err)
  89. err = ReloadCertificateMgr()
  90. require.NoError(t, err)
  91. err = os.Remove(certPath)
  92. require.NoError(t, err)
  93. err = os.Remove(keyPath)
  94. require.NoError(t, err)
  95. }
  96. func TestShouldBind(t *testing.T) {
  97. c := Conf{
  98. BindPort: 10000,
  99. EnableProfiler: false,
  100. }
  101. require.True(t, c.ShouldBind())
  102. c.BindPort = 0
  103. require.False(t, c.ShouldBind())
  104. if runtime.GOOS != "windows" {
  105. c.BindAddress = "/absolute/path"
  106. require.True(t, c.ShouldBind())
  107. }
  108. }
  109. func TestRouter(t *testing.T) {
  110. authUserFile := filepath.Join(os.TempDir(), "http_users.txt")
  111. authUserData := []byte("test1:$2y$05$bcHSED7aO1cfLto6ZdDBOOKzlwftslVhtpIkRhAtSa4GuLmk5mola\n")
  112. err := os.WriteFile(authUserFile, authUserData, os.ModePerm)
  113. require.NoError(t, err)
  114. httpAuth, err = common.NewBasicAuthProvider(authUserFile)
  115. require.NoError(t, err)
  116. initializeRouter(true)
  117. testServer := httptest.NewServer(router)
  118. defer testServer.Close()
  119. req, err := http.NewRequest(http.MethodGet, "/healthz", nil)
  120. require.NoError(t, err)
  121. rr := httptest.NewRecorder()
  122. testServer.Config.Handler.ServeHTTP(rr, req)
  123. require.Equal(t, http.StatusOK, rr.Code)
  124. require.Equal(t, "ok", rr.Body.String())
  125. req, err = http.NewRequest(http.MethodGet, "/metrics", nil)
  126. require.NoError(t, err)
  127. rr = httptest.NewRecorder()
  128. testServer.Config.Handler.ServeHTTP(rr, req)
  129. require.Equal(t, http.StatusUnauthorized, rr.Code)
  130. req.SetBasicAuth("test1", "password1")
  131. rr = httptest.NewRecorder()
  132. testServer.Config.Handler.ServeHTTP(rr, req)
  133. require.Equal(t, http.StatusOK, rr.Code)
  134. req, err = http.NewRequest(http.MethodGet, pprofBasePath+"/pprof/", nil)
  135. require.NoError(t, err)
  136. rr = httptest.NewRecorder()
  137. testServer.Config.Handler.ServeHTTP(rr, req)
  138. require.Equal(t, http.StatusUnauthorized, rr.Code)
  139. req.SetBasicAuth("test1", "password1")
  140. rr = httptest.NewRecorder()
  141. testServer.Config.Handler.ServeHTTP(rr, req)
  142. require.Equal(t, http.StatusOK, rr.Code)
  143. httpAuth, err = common.NewBasicAuthProvider("")
  144. require.NoError(t, err)
  145. req, err = http.NewRequest(http.MethodGet, "/metrics", nil)
  146. require.NoError(t, err)
  147. rr = httptest.NewRecorder()
  148. testServer.Config.Handler.ServeHTTP(rr, req)
  149. require.Equal(t, http.StatusOK, rr.Code)
  150. err = os.Remove(authUserFile)
  151. require.NoError(t, err)
  152. }