eventmanager_test.go 51 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "bytes"
  17. "crypto/rand"
  18. "fmt"
  19. "io"
  20. "mime/multipart"
  21. "net/http"
  22. "os"
  23. "path"
  24. "path/filepath"
  25. "runtime"
  26. "strings"
  27. "testing"
  28. "time"
  29. "github.com/klauspost/compress/zip"
  30. "github.com/sftpgo/sdk"
  31. sdkkms "github.com/sftpgo/sdk/kms"
  32. "github.com/stretchr/testify/assert"
  33. "github.com/stretchr/testify/require"
  34. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  35. "github.com/drakkan/sftpgo/v2/internal/kms"
  36. "github.com/drakkan/sftpgo/v2/internal/util"
  37. "github.com/drakkan/sftpgo/v2/internal/vfs"
  38. )
  39. func TestEventRuleMatch(t *testing.T) {
  40. role := "role1"
  41. conditions := dataprovider.EventConditions{
  42. ProviderEvents: []string{"add", "update"},
  43. Options: dataprovider.ConditionOptions{
  44. Names: []dataprovider.ConditionPattern{
  45. {
  46. Pattern: "user1",
  47. InverseMatch: true,
  48. },
  49. },
  50. RoleNames: []dataprovider.ConditionPattern{
  51. {
  52. Pattern: role,
  53. },
  54. },
  55. },
  56. }
  57. res := eventManager.checkProviderEventMatch(conditions, EventParams{
  58. Name: "user1",
  59. Role: role,
  60. Event: "add",
  61. })
  62. assert.False(t, res)
  63. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  64. Name: "user2",
  65. Role: role,
  66. Event: "update",
  67. })
  68. assert.True(t, res)
  69. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  70. Name: "user2",
  71. Role: role,
  72. Event: "delete",
  73. })
  74. assert.False(t, res)
  75. conditions.Options.ProviderObjects = []string{"api_key"}
  76. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  77. Name: "user2",
  78. Event: "update",
  79. Role: role,
  80. ObjectType: "share",
  81. })
  82. assert.False(t, res)
  83. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  84. Name: "user2",
  85. Event: "update",
  86. Role: role,
  87. ObjectType: "api_key",
  88. })
  89. assert.True(t, res)
  90. res = eventManager.checkProviderEventMatch(conditions, EventParams{
  91. Name: "user2",
  92. Event: "update",
  93. Role: role + "1",
  94. ObjectType: "api_key",
  95. })
  96. assert.False(t, res)
  97. // now test fs events
  98. conditions = dataprovider.EventConditions{
  99. FsEvents: []string{operationUpload, operationDownload},
  100. Options: dataprovider.ConditionOptions{
  101. Names: []dataprovider.ConditionPattern{
  102. {
  103. Pattern: "user*",
  104. },
  105. {
  106. Pattern: "tester*",
  107. },
  108. },
  109. RoleNames: []dataprovider.ConditionPattern{
  110. {
  111. Pattern: role,
  112. InverseMatch: true,
  113. },
  114. },
  115. FsPaths: []dataprovider.ConditionPattern{
  116. {
  117. Pattern: "/**/*.txt",
  118. },
  119. },
  120. Protocols: []string{ProtocolSFTP},
  121. MinFileSize: 10,
  122. MaxFileSize: 30,
  123. },
  124. }
  125. params := EventParams{
  126. Name: "tester4",
  127. Event: operationDelete,
  128. VirtualPath: "/path.txt",
  129. Protocol: ProtocolSFTP,
  130. ObjectName: "path.txt",
  131. FileSize: 20,
  132. }
  133. res = eventManager.checkFsEventMatch(conditions, params)
  134. assert.False(t, res)
  135. params.Event = operationDownload
  136. res = eventManager.checkFsEventMatch(conditions, params)
  137. assert.True(t, res)
  138. params.Role = role
  139. res = eventManager.checkFsEventMatch(conditions, params)
  140. assert.False(t, res)
  141. params.Role = ""
  142. params.Name = "name"
  143. res = eventManager.checkFsEventMatch(conditions, params)
  144. assert.False(t, res)
  145. params.Name = "user5"
  146. res = eventManager.checkFsEventMatch(conditions, params)
  147. assert.True(t, res)
  148. params.VirtualPath = "/sub/f.jpg"
  149. params.ObjectName = path.Base(params.VirtualPath)
  150. res = eventManager.checkFsEventMatch(conditions, params)
  151. assert.False(t, res)
  152. params.VirtualPath = "/sub/f.txt"
  153. params.ObjectName = path.Base(params.VirtualPath)
  154. res = eventManager.checkFsEventMatch(conditions, params)
  155. assert.True(t, res)
  156. params.Protocol = ProtocolHTTP
  157. res = eventManager.checkFsEventMatch(conditions, params)
  158. assert.False(t, res)
  159. params.Protocol = ProtocolSFTP
  160. params.FileSize = 5
  161. res = eventManager.checkFsEventMatch(conditions, params)
  162. assert.False(t, res)
  163. params.FileSize = 50
  164. res = eventManager.checkFsEventMatch(conditions, params)
  165. assert.False(t, res)
  166. params.FileSize = 25
  167. res = eventManager.checkFsEventMatch(conditions, params)
  168. assert.True(t, res)
  169. // bad pattern
  170. conditions.Options.Names = []dataprovider.ConditionPattern{
  171. {
  172. Pattern: "[-]",
  173. },
  174. }
  175. res = eventManager.checkFsEventMatch(conditions, params)
  176. assert.False(t, res)
  177. // check fs events with group name filters
  178. conditions = dataprovider.EventConditions{
  179. FsEvents: []string{operationUpload, operationDownload},
  180. Options: dataprovider.ConditionOptions{
  181. GroupNames: []dataprovider.ConditionPattern{
  182. {
  183. Pattern: "group*",
  184. },
  185. {
  186. Pattern: "testgroup*",
  187. },
  188. },
  189. },
  190. }
  191. params = EventParams{
  192. Name: "user1",
  193. Event: operationUpload,
  194. }
  195. res = eventManager.checkFsEventMatch(conditions, params)
  196. assert.False(t, res)
  197. params.Groups = []sdk.GroupMapping{
  198. {
  199. Name: "g1",
  200. Type: sdk.GroupTypePrimary,
  201. },
  202. {
  203. Name: "g2",
  204. Type: sdk.GroupTypeSecondary,
  205. },
  206. }
  207. res = eventManager.checkFsEventMatch(conditions, params)
  208. assert.False(t, res)
  209. params.Groups = []sdk.GroupMapping{
  210. {
  211. Name: "testgroup2",
  212. Type: sdk.GroupTypePrimary,
  213. },
  214. {
  215. Name: "g2",
  216. Type: sdk.GroupTypeSecondary,
  217. },
  218. }
  219. res = eventManager.checkFsEventMatch(conditions, params)
  220. assert.True(t, res)
  221. // check user conditions
  222. user := dataprovider.User{}
  223. user.Username = "u1"
  224. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{})
  225. assert.True(t, res)
  226. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  227. Names: []dataprovider.ConditionPattern{
  228. {
  229. Pattern: "user",
  230. },
  231. },
  232. })
  233. assert.False(t, res)
  234. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  235. RoleNames: []dataprovider.ConditionPattern{
  236. {
  237. Pattern: role,
  238. },
  239. },
  240. })
  241. assert.False(t, res)
  242. user.Role = role
  243. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  244. RoleNames: []dataprovider.ConditionPattern{
  245. {
  246. Pattern: role,
  247. },
  248. },
  249. })
  250. assert.True(t, res)
  251. res = checkUserConditionOptions(&user, &dataprovider.ConditionOptions{
  252. GroupNames: []dataprovider.ConditionPattern{
  253. {
  254. Pattern: "group",
  255. },
  256. },
  257. RoleNames: []dataprovider.ConditionPattern{
  258. {
  259. Pattern: role,
  260. },
  261. },
  262. })
  263. assert.False(t, res)
  264. }
  265. func TestDoubleStarMatching(t *testing.T) {
  266. c := dataprovider.ConditionPattern{
  267. Pattern: "/mydir/**",
  268. }
  269. res := checkEventConditionPattern(c, "/mydir")
  270. assert.True(t, res)
  271. res = checkEventConditionPattern(c, "/mydirname")
  272. assert.False(t, res)
  273. res = checkEventConditionPattern(c, "/mydir/sub")
  274. assert.True(t, res)
  275. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  276. assert.True(t, res)
  277. c.Pattern = "/**/*"
  278. res = checkEventConditionPattern(c, "/mydir")
  279. assert.True(t, res)
  280. res = checkEventConditionPattern(c, "/mydirname")
  281. assert.True(t, res)
  282. res = checkEventConditionPattern(c, "/mydir/sub/dir/file.txt")
  283. assert.True(t, res)
  284. c.Pattern = "/mydir/**/*.txt"
  285. res = checkEventConditionPattern(c, "/mydir")
  286. assert.False(t, res)
  287. res = checkEventConditionPattern(c, "/mydirname/f.txt")
  288. assert.False(t, res)
  289. res = checkEventConditionPattern(c, "/mydir/sub")
  290. assert.False(t, res)
  291. res = checkEventConditionPattern(c, "/mydir/sub/dir")
  292. assert.False(t, res)
  293. res = checkEventConditionPattern(c, "/mydir/sub/dir/a.txt")
  294. assert.True(t, res)
  295. }
  296. func TestEventManager(t *testing.T) {
  297. startEventScheduler()
  298. action := &dataprovider.BaseEventAction{
  299. Name: "test_action",
  300. Type: dataprovider.ActionTypeHTTP,
  301. Options: dataprovider.BaseEventActionOptions{
  302. HTTPConfig: dataprovider.EventActionHTTPConfig{
  303. Endpoint: "http://localhost",
  304. Timeout: 20,
  305. Method: http.MethodGet,
  306. },
  307. },
  308. }
  309. err := dataprovider.AddEventAction(action, "", "", "")
  310. assert.NoError(t, err)
  311. rule := &dataprovider.EventRule{
  312. Name: "rule",
  313. Trigger: dataprovider.EventTriggerFsEvent,
  314. Conditions: dataprovider.EventConditions{
  315. FsEvents: []string{operationUpload},
  316. },
  317. Actions: []dataprovider.EventAction{
  318. {
  319. BaseEventAction: dataprovider.BaseEventAction{
  320. Name: action.Name,
  321. },
  322. Order: 1,
  323. },
  324. },
  325. }
  326. err = dataprovider.AddEventRule(rule, "", "", "")
  327. assert.NoError(t, err)
  328. eventManager.RLock()
  329. assert.Len(t, eventManager.FsEvents, 1)
  330. assert.Len(t, eventManager.ProviderEvents, 0)
  331. assert.Len(t, eventManager.Schedules, 0)
  332. assert.Len(t, eventManager.schedulesMapping, 0)
  333. eventManager.RUnlock()
  334. rule.Trigger = dataprovider.EventTriggerProviderEvent
  335. rule.Conditions = dataprovider.EventConditions{
  336. ProviderEvents: []string{"add"},
  337. }
  338. err = dataprovider.UpdateEventRule(rule, "", "", "")
  339. assert.NoError(t, err)
  340. eventManager.RLock()
  341. assert.Len(t, eventManager.FsEvents, 0)
  342. assert.Len(t, eventManager.ProviderEvents, 1)
  343. assert.Len(t, eventManager.Schedules, 0)
  344. assert.Len(t, eventManager.schedulesMapping, 0)
  345. eventManager.RUnlock()
  346. rule.Trigger = dataprovider.EventTriggerSchedule
  347. rule.Conditions = dataprovider.EventConditions{
  348. Schedules: []dataprovider.Schedule{
  349. {
  350. Hours: "0",
  351. DayOfWeek: "*",
  352. DayOfMonth: "*",
  353. Month: "*",
  354. },
  355. },
  356. }
  357. rule.DeletedAt = util.GetTimeAsMsSinceEpoch(time.Now().Add(-12 * time.Hour))
  358. eventManager.addUpdateRuleInternal(*rule)
  359. eventManager.RLock()
  360. assert.Len(t, eventManager.FsEvents, 0)
  361. assert.Len(t, eventManager.ProviderEvents, 0)
  362. assert.Len(t, eventManager.Schedules, 0)
  363. assert.Len(t, eventManager.schedulesMapping, 0)
  364. eventManager.RUnlock()
  365. assert.Eventually(t, func() bool {
  366. _, err = dataprovider.EventRuleExists(rule.Name)
  367. _, ok := err.(*util.RecordNotFoundError)
  368. return ok
  369. }, 2*time.Second, 100*time.Millisecond)
  370. rule.DeletedAt = 0
  371. err = dataprovider.AddEventRule(rule, "", "", "")
  372. assert.NoError(t, err)
  373. eventManager.RLock()
  374. assert.Len(t, eventManager.FsEvents, 0)
  375. assert.Len(t, eventManager.ProviderEvents, 0)
  376. assert.Len(t, eventManager.Schedules, 1)
  377. assert.Len(t, eventManager.schedulesMapping, 1)
  378. eventManager.RUnlock()
  379. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  380. assert.NoError(t, err)
  381. eventManager.RLock()
  382. assert.Len(t, eventManager.FsEvents, 0)
  383. assert.Len(t, eventManager.ProviderEvents, 0)
  384. assert.Len(t, eventManager.Schedules, 0)
  385. assert.Len(t, eventManager.schedulesMapping, 0)
  386. eventManager.RUnlock()
  387. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  388. assert.NoError(t, err)
  389. stopEventScheduler()
  390. }
  391. func TestEventManagerErrors(t *testing.T) {
  392. startEventScheduler()
  393. providerConf := dataprovider.GetProviderConfig()
  394. err := dataprovider.Close()
  395. assert.NoError(t, err)
  396. params := EventParams{
  397. sender: "sender",
  398. }
  399. _, err = params.getUsers()
  400. assert.Error(t, err)
  401. _, err = params.getFolders()
  402. assert.Error(t, err)
  403. err = executeUsersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  404. assert.Error(t, err)
  405. err = executeFoldersQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  406. assert.Error(t, err)
  407. err = executeTransferQuotaResetRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  408. assert.Error(t, err)
  409. err = executeMetadataCheckRuleAction(dataprovider.ConditionOptions{}, &EventParams{})
  410. assert.Error(t, err)
  411. err = executeDeleteFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  412. assert.Error(t, err)
  413. err = executeMkdirFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  414. assert.Error(t, err)
  415. err = executeRenameFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  416. assert.Error(t, err)
  417. err = executeExistFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  418. assert.Error(t, err)
  419. err = executeCopyFsRuleAction(nil, nil, dataprovider.ConditionOptions{}, &EventParams{})
  420. assert.Error(t, err)
  421. err = executeCompressFsRuleAction(dataprovider.EventActionFsCompress{}, nil, dataprovider.ConditionOptions{}, &EventParams{})
  422. assert.Error(t, err)
  423. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{},
  424. dataprovider.ConditionOptions{}, &EventParams{})
  425. assert.Error(t, err)
  426. groupName := "agroup"
  427. err = executeQuotaResetForUser(&dataprovider.User{
  428. Groups: []sdk.GroupMapping{
  429. {
  430. Name: groupName,
  431. Type: sdk.GroupTypePrimary,
  432. },
  433. },
  434. })
  435. assert.Error(t, err)
  436. err = executeMetadataCheckForUser(&dataprovider.User{
  437. Groups: []sdk.GroupMapping{
  438. {
  439. Name: groupName,
  440. Type: sdk.GroupTypePrimary,
  441. },
  442. },
  443. })
  444. assert.Error(t, err)
  445. err = executeDataRetentionCheckForUser(dataprovider.User{
  446. Groups: []sdk.GroupMapping{
  447. {
  448. Name: groupName,
  449. Type: sdk.GroupTypePrimary,
  450. },
  451. },
  452. }, nil, &EventParams{}, "")
  453. assert.Error(t, err)
  454. err = executeDeleteFsActionForUser(nil, nil, dataprovider.User{
  455. Groups: []sdk.GroupMapping{
  456. {
  457. Name: groupName,
  458. Type: sdk.GroupTypePrimary,
  459. },
  460. },
  461. })
  462. assert.Error(t, err)
  463. err = executeMkDirsFsActionForUser(nil, nil, dataprovider.User{
  464. Groups: []sdk.GroupMapping{
  465. {
  466. Name: groupName,
  467. Type: sdk.GroupTypePrimary,
  468. },
  469. },
  470. })
  471. assert.Error(t, err)
  472. err = executeRenameFsActionForUser(nil, nil, dataprovider.User{
  473. Groups: []sdk.GroupMapping{
  474. {
  475. Name: groupName,
  476. Type: sdk.GroupTypePrimary,
  477. },
  478. },
  479. })
  480. assert.Error(t, err)
  481. err = executeExistFsActionForUser(nil, nil, dataprovider.User{
  482. Groups: []sdk.GroupMapping{
  483. {
  484. Name: groupName,
  485. Type: sdk.GroupTypePrimary,
  486. },
  487. },
  488. })
  489. assert.Error(t, err)
  490. err = executeCopyFsActionForUser(nil, nil, dataprovider.User{
  491. Groups: []sdk.GroupMapping{
  492. {
  493. Name: groupName,
  494. Type: sdk.GroupTypePrimary,
  495. },
  496. },
  497. })
  498. assert.Error(t, err)
  499. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, nil, dataprovider.User{
  500. Groups: []sdk.GroupMapping{
  501. {
  502. Name: groupName,
  503. Type: sdk.GroupTypePrimary,
  504. },
  505. },
  506. })
  507. assert.Error(t, err)
  508. _, err = getMailAttachments(dataprovider.User{
  509. Groups: []sdk.GroupMapping{
  510. {
  511. Name: groupName,
  512. Type: sdk.GroupTypePrimary,
  513. },
  514. }}, []string{"/a", "/b"}, nil)
  515. assert.Error(t, err)
  516. err = executePwdExpirationCheckForUser(&dataprovider.User{
  517. Groups: []sdk.GroupMapping{
  518. {
  519. Name: groupName,
  520. Type: sdk.GroupTypePrimary,
  521. },
  522. }}, dataprovider.EventActionPasswordExpiration{})
  523. assert.Error(t, err)
  524. _, _, err = getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  525. Method: http.MethodPost,
  526. Parts: []dataprovider.HTTPPart{
  527. {
  528. Name: "p1",
  529. },
  530. },
  531. }, nil, nil, dataprovider.User{
  532. BaseUser: sdk.BaseUser{
  533. Username: "u",
  534. },
  535. Groups: []sdk.GroupMapping{
  536. {
  537. Name: groupName,
  538. Type: sdk.GroupTypePrimary,
  539. },
  540. },
  541. }, &EventParams{})
  542. assert.Error(t, err)
  543. dataRetentionAction := dataprovider.BaseEventAction{
  544. Type: dataprovider.ActionTypeDataRetentionCheck,
  545. Options: dataprovider.BaseEventActionOptions{
  546. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  547. Folders: []dataprovider.FolderRetention{
  548. {
  549. Path: "/",
  550. Retention: 24,
  551. },
  552. },
  553. },
  554. },
  555. }
  556. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  557. Names: []dataprovider.ConditionPattern{
  558. {
  559. Pattern: "username1",
  560. },
  561. },
  562. })
  563. if assert.Error(t, err) {
  564. assert.Contains(t, err.Error(), "unable to get users")
  565. }
  566. eventManager.loadRules()
  567. eventManager.RLock()
  568. assert.Len(t, eventManager.FsEvents, 0)
  569. assert.Len(t, eventManager.ProviderEvents, 0)
  570. assert.Len(t, eventManager.Schedules, 0)
  571. eventManager.RUnlock()
  572. // rule with invalid trigger
  573. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  574. Name: "test rule",
  575. Trigger: -1,
  576. })
  577. eventManager.RLock()
  578. assert.Len(t, eventManager.FsEvents, 0)
  579. assert.Len(t, eventManager.ProviderEvents, 0)
  580. assert.Len(t, eventManager.Schedules, 0)
  581. eventManager.RUnlock()
  582. // rule with invalid cronspec
  583. eventManager.addUpdateRuleInternal(dataprovider.EventRule{
  584. Name: "test rule",
  585. Trigger: dataprovider.EventTriggerSchedule,
  586. Conditions: dataprovider.EventConditions{
  587. Schedules: []dataprovider.Schedule{
  588. {
  589. Hours: "1000",
  590. },
  591. },
  592. },
  593. })
  594. eventManager.RLock()
  595. assert.Len(t, eventManager.FsEvents, 0)
  596. assert.Len(t, eventManager.ProviderEvents, 0)
  597. assert.Len(t, eventManager.Schedules, 0)
  598. eventManager.RUnlock()
  599. err = dataprovider.Initialize(providerConf, configDir, true)
  600. assert.NoError(t, err)
  601. stopEventScheduler()
  602. }
  603. func TestEventRuleActions(t *testing.T) {
  604. actionName := "test rule action"
  605. action := dataprovider.BaseEventAction{
  606. Name: actionName,
  607. Type: dataprovider.ActionTypeBackup,
  608. }
  609. err := executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  610. assert.NoError(t, err)
  611. action.Type = -1
  612. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  613. assert.Error(t, err)
  614. action = dataprovider.BaseEventAction{
  615. Name: actionName,
  616. Type: dataprovider.ActionTypeHTTP,
  617. Options: dataprovider.BaseEventActionOptions{
  618. HTTPConfig: dataprovider.EventActionHTTPConfig{
  619. Endpoint: "http://foo\x7f.com/", // invalid URL
  620. SkipTLSVerify: true,
  621. Body: "{{ObjectData}}",
  622. Method: http.MethodPost,
  623. QueryParameters: []dataprovider.KeyValue{
  624. {
  625. Key: "param",
  626. Value: "value",
  627. },
  628. },
  629. Timeout: 5,
  630. Headers: []dataprovider.KeyValue{
  631. {
  632. Key: "Content-Type",
  633. Value: "application/json",
  634. },
  635. },
  636. Username: "httpuser",
  637. },
  638. },
  639. }
  640. action.Options.SetEmptySecretsIfNil()
  641. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{})
  642. if assert.Error(t, err) {
  643. assert.Contains(t, err.Error(), "invalid endpoint")
  644. }
  645. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v", httpAddr)
  646. params := &EventParams{
  647. Name: "a",
  648. Object: &dataprovider.User{
  649. BaseUser: sdk.BaseUser{
  650. Username: "test user",
  651. },
  652. },
  653. }
  654. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  655. assert.NoError(t, err)
  656. action.Options.HTTPConfig.Method = http.MethodGet
  657. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  658. assert.NoError(t, err)
  659. action.Options.HTTPConfig.Endpoint = fmt.Sprintf("http://%v/404", httpAddr)
  660. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  661. if assert.Error(t, err) {
  662. assert.Contains(t, err.Error(), "unexpected status code: 404")
  663. }
  664. action.Options.HTTPConfig.Endpoint = "http://invalid:1234"
  665. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  666. assert.Error(t, err)
  667. action.Options.HTTPConfig.QueryParameters = nil
  668. action.Options.HTTPConfig.Endpoint = "http://bar\x7f.com/"
  669. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  670. assert.Error(t, err)
  671. action.Options.HTTPConfig.Password = kms.NewSecret(sdkkms.SecretStatusSecretBox, "payload", "key", "data")
  672. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  673. if assert.Error(t, err) {
  674. assert.Contains(t, err.Error(), "unable to decrypt HTTP password")
  675. }
  676. action.Options.HTTPConfig.Password = kms.NewEmptySecret()
  677. action.Options.HTTPConfig.Body = ""
  678. action.Options.HTTPConfig.Parts = []dataprovider.HTTPPart{
  679. {
  680. Name: "p1",
  681. Filepath: "path",
  682. },
  683. }
  684. err = executeRuleAction(action, params, dataprovider.ConditionOptions{})
  685. assert.Contains(t, getErrorString(err), "error getting user")
  686. action.Options.HTTPConfig.Parts = nil
  687. action.Options.HTTPConfig.Body = "{{ObjectData}}"
  688. // test disk and transfer quota reset
  689. username1 := "user1"
  690. username2 := "user2"
  691. user1 := dataprovider.User{
  692. BaseUser: sdk.BaseUser{
  693. Username: username1,
  694. HomeDir: filepath.Join(os.TempDir(), username1),
  695. Status: 1,
  696. Permissions: map[string][]string{
  697. "/": {dataprovider.PermAny},
  698. },
  699. },
  700. }
  701. user2 := dataprovider.User{
  702. BaseUser: sdk.BaseUser{
  703. Username: username2,
  704. HomeDir: filepath.Join(os.TempDir(), username2),
  705. Status: 1,
  706. Permissions: map[string][]string{
  707. "/": {dataprovider.PermAny},
  708. },
  709. },
  710. }
  711. user2.Filters.PasswordExpiration = 10
  712. err = dataprovider.AddUser(&user1, "", "", "")
  713. assert.NoError(t, err)
  714. err = dataprovider.AddUser(&user2, "", "", "")
  715. assert.NoError(t, err)
  716. err = executePwdExpirationCheckRuleAction(dataprovider.EventActionPasswordExpiration{
  717. Threshold: 20,
  718. }, dataprovider.ConditionOptions{
  719. Names: []dataprovider.ConditionPattern{
  720. {
  721. Pattern: user2.Username,
  722. },
  723. },
  724. }, &EventParams{})
  725. // smtp not configured
  726. assert.Error(t, err)
  727. action = dataprovider.BaseEventAction{
  728. Type: dataprovider.ActionTypeUserQuotaReset,
  729. }
  730. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  731. Names: []dataprovider.ConditionPattern{
  732. {
  733. Pattern: username1,
  734. },
  735. },
  736. })
  737. assert.Error(t, err) // no home dir
  738. // create the home dir
  739. err = os.MkdirAll(user1.GetHomeDir(), os.ModePerm)
  740. assert.NoError(t, err)
  741. err = os.WriteFile(filepath.Join(user1.GetHomeDir(), "file.txt"), []byte("user"), 0666)
  742. assert.NoError(t, err)
  743. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  744. Names: []dataprovider.ConditionPattern{
  745. {
  746. Pattern: username1,
  747. },
  748. },
  749. })
  750. assert.NoError(t, err)
  751. userGet, err := dataprovider.UserExists(username1, "")
  752. assert.NoError(t, err)
  753. assert.Equal(t, 1, userGet.UsedQuotaFiles)
  754. assert.Equal(t, int64(4), userGet.UsedQuotaSize)
  755. // simulate another quota scan in progress
  756. assert.True(t, QuotaScans.AddUserQuotaScan(username1, ""))
  757. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  758. Names: []dataprovider.ConditionPattern{
  759. {
  760. Pattern: username1,
  761. },
  762. },
  763. })
  764. assert.Error(t, err)
  765. assert.True(t, QuotaScans.RemoveUserQuotaScan(username1))
  766. // non matching pattern
  767. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  768. Names: []dataprovider.ConditionPattern{
  769. {
  770. Pattern: "don't match",
  771. },
  772. },
  773. })
  774. assert.Error(t, err)
  775. assert.Contains(t, getErrorString(err), "no user quota reset executed")
  776. action = dataprovider.BaseEventAction{
  777. Type: dataprovider.ActionTypeMetadataCheck,
  778. }
  779. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  780. Names: []dataprovider.ConditionPattern{
  781. {
  782. Pattern: "don't match",
  783. },
  784. },
  785. })
  786. assert.Error(t, err)
  787. assert.Contains(t, getErrorString(err), "no metadata check executed")
  788. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  789. Names: []dataprovider.ConditionPattern{
  790. {
  791. Pattern: username1,
  792. },
  793. },
  794. })
  795. assert.NoError(t, err)
  796. // simulate another metadata check in progress
  797. assert.True(t, ActiveMetadataChecks.Add(username1, ""))
  798. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  799. Names: []dataprovider.ConditionPattern{
  800. {
  801. Pattern: username1,
  802. },
  803. },
  804. })
  805. assert.Error(t, err)
  806. assert.True(t, ActiveMetadataChecks.Remove(username1))
  807. dataRetentionAction := dataprovider.BaseEventAction{
  808. Type: dataprovider.ActionTypeDataRetentionCheck,
  809. Options: dataprovider.BaseEventActionOptions{
  810. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  811. Folders: []dataprovider.FolderRetention{
  812. {
  813. Path: "",
  814. Retention: 24,
  815. },
  816. },
  817. },
  818. },
  819. }
  820. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  821. Names: []dataprovider.ConditionPattern{
  822. {
  823. Pattern: username1,
  824. },
  825. },
  826. })
  827. assert.Error(t, err) // invalid config, no folder path specified
  828. retentionDir := "testretention"
  829. dataRetentionAction = dataprovider.BaseEventAction{
  830. Type: dataprovider.ActionTypeDataRetentionCheck,
  831. Options: dataprovider.BaseEventActionOptions{
  832. RetentionConfig: dataprovider.EventActionDataRetentionConfig{
  833. Folders: []dataprovider.FolderRetention{
  834. {
  835. Path: path.Join("/", retentionDir),
  836. Retention: 24,
  837. DeleteEmptyDirs: true,
  838. },
  839. },
  840. },
  841. },
  842. }
  843. // create some test files
  844. file1 := filepath.Join(user1.GetHomeDir(), "file1.txt")
  845. file2 := filepath.Join(user1.GetHomeDir(), retentionDir, "file2.txt")
  846. file3 := filepath.Join(user1.GetHomeDir(), retentionDir, "file3.txt")
  847. file4 := filepath.Join(user1.GetHomeDir(), retentionDir, "sub", "file4.txt")
  848. err = os.MkdirAll(filepath.Dir(file4), os.ModePerm)
  849. assert.NoError(t, err)
  850. for _, f := range []string{file1, file2, file3, file4} {
  851. err = os.WriteFile(f, []byte(""), 0666)
  852. assert.NoError(t, err)
  853. }
  854. timeBeforeRetention := time.Now().Add(-48 * time.Hour)
  855. err = os.Chtimes(file1, timeBeforeRetention, timeBeforeRetention)
  856. assert.NoError(t, err)
  857. err = os.Chtimes(file2, timeBeforeRetention, timeBeforeRetention)
  858. assert.NoError(t, err)
  859. err = os.Chtimes(file4, timeBeforeRetention, timeBeforeRetention)
  860. assert.NoError(t, err)
  861. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  862. Names: []dataprovider.ConditionPattern{
  863. {
  864. Pattern: username1,
  865. },
  866. },
  867. })
  868. assert.NoError(t, err)
  869. assert.FileExists(t, file1)
  870. assert.NoFileExists(t, file2)
  871. assert.FileExists(t, file3)
  872. assert.NoDirExists(t, filepath.Dir(file4))
  873. // simulate another check in progress
  874. c := RetentionChecks.Add(RetentionCheck{}, &user1)
  875. assert.NotNil(t, c)
  876. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  877. Names: []dataprovider.ConditionPattern{
  878. {
  879. Pattern: username1,
  880. },
  881. },
  882. })
  883. assert.Error(t, err)
  884. RetentionChecks.remove(user1.Username)
  885. err = executeRuleAction(dataRetentionAction, &EventParams{}, dataprovider.ConditionOptions{
  886. Names: []dataprovider.ConditionPattern{
  887. {
  888. Pattern: "no match",
  889. },
  890. },
  891. })
  892. assert.Error(t, err)
  893. assert.Contains(t, getErrorString(err), "no retention check executed")
  894. // test file exists action
  895. action = dataprovider.BaseEventAction{
  896. Type: dataprovider.ActionTypeFilesystem,
  897. Options: dataprovider.BaseEventActionOptions{
  898. FsConfig: dataprovider.EventActionFilesystemConfig{
  899. Type: dataprovider.FilesystemActionExist,
  900. Exist: []string{"/file1.txt", path.Join("/", retentionDir, "file3.txt")},
  901. },
  902. },
  903. }
  904. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  905. Names: []dataprovider.ConditionPattern{
  906. {
  907. Pattern: "no match",
  908. },
  909. },
  910. })
  911. assert.Error(t, err)
  912. assert.Contains(t, getErrorString(err), "no existence check executed")
  913. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  914. Names: []dataprovider.ConditionPattern{
  915. {
  916. Pattern: username1,
  917. },
  918. },
  919. })
  920. assert.NoError(t, err)
  921. action.Options.FsConfig.Exist = []string{"/file1.txt", path.Join("/", retentionDir, "file2.txt")}
  922. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  923. Names: []dataprovider.ConditionPattern{
  924. {
  925. Pattern: username1,
  926. },
  927. },
  928. })
  929. assert.Error(t, err)
  930. err = os.RemoveAll(user1.GetHomeDir())
  931. assert.NoError(t, err)
  932. err = dataprovider.UpdateUserTransferQuota(&user1, 100, 100, true)
  933. assert.NoError(t, err)
  934. action.Type = dataprovider.ActionTypeTransferQuotaReset
  935. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  936. Names: []dataprovider.ConditionPattern{
  937. {
  938. Pattern: username1,
  939. },
  940. },
  941. })
  942. assert.NoError(t, err)
  943. userGet, err = dataprovider.UserExists(username1, "")
  944. assert.NoError(t, err)
  945. assert.Equal(t, int64(0), userGet.UsedDownloadDataTransfer)
  946. assert.Equal(t, int64(0), userGet.UsedUploadDataTransfer)
  947. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  948. Names: []dataprovider.ConditionPattern{
  949. {
  950. Pattern: "no match",
  951. },
  952. },
  953. })
  954. assert.Error(t, err)
  955. assert.Contains(t, getErrorString(err), "no transfer quota reset executed")
  956. action.Type = dataprovider.ActionTypeFilesystem
  957. action.Options = dataprovider.BaseEventActionOptions{
  958. FsConfig: dataprovider.EventActionFilesystemConfig{
  959. Type: dataprovider.FilesystemActionRename,
  960. Renames: []dataprovider.KeyValue{
  961. {
  962. Key: "/source",
  963. Value: "/target",
  964. },
  965. },
  966. },
  967. }
  968. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  969. Names: []dataprovider.ConditionPattern{
  970. {
  971. Pattern: "no match",
  972. },
  973. },
  974. })
  975. assert.Error(t, err)
  976. assert.Contains(t, getErrorString(err), "no rename executed")
  977. action.Options = dataprovider.BaseEventActionOptions{
  978. FsConfig: dataprovider.EventActionFilesystemConfig{
  979. Type: dataprovider.FilesystemActionDelete,
  980. Deletes: []string{"/dir1"},
  981. },
  982. }
  983. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  984. Names: []dataprovider.ConditionPattern{
  985. {
  986. Pattern: "no match",
  987. },
  988. },
  989. })
  990. assert.Error(t, err)
  991. assert.Contains(t, getErrorString(err), "no delete executed")
  992. action.Options = dataprovider.BaseEventActionOptions{
  993. FsConfig: dataprovider.EventActionFilesystemConfig{
  994. Type: dataprovider.FilesystemActionMkdirs,
  995. Deletes: []string{"/dir1"},
  996. },
  997. }
  998. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  999. Names: []dataprovider.ConditionPattern{
  1000. {
  1001. Pattern: "no match",
  1002. },
  1003. },
  1004. })
  1005. assert.Error(t, err)
  1006. assert.Contains(t, getErrorString(err), "no mkdir executed")
  1007. action.Options = dataprovider.BaseEventActionOptions{
  1008. FsConfig: dataprovider.EventActionFilesystemConfig{
  1009. Type: dataprovider.FilesystemActionCompress,
  1010. Compress: dataprovider.EventActionFsCompress{
  1011. Name: "test.zip",
  1012. Paths: []string{"/{{VirtualPath}}"},
  1013. },
  1014. },
  1015. }
  1016. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1017. Names: []dataprovider.ConditionPattern{
  1018. {
  1019. Pattern: "no match",
  1020. },
  1021. },
  1022. })
  1023. assert.Error(t, err)
  1024. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1025. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1026. GroupNames: []dataprovider.ConditionPattern{
  1027. {
  1028. Pattern: "no match",
  1029. },
  1030. },
  1031. })
  1032. assert.Error(t, err)
  1033. assert.Contains(t, getErrorString(err), "no file/folder compressed")
  1034. err = dataprovider.DeleteUser(username1, "", "", "")
  1035. assert.NoError(t, err)
  1036. err = dataprovider.DeleteUser(username2, "", "", "")
  1037. assert.NoError(t, err)
  1038. // test folder quota reset
  1039. foldername1 := "f1"
  1040. foldername2 := "f2"
  1041. folder1 := vfs.BaseVirtualFolder{
  1042. Name: foldername1,
  1043. MappedPath: filepath.Join(os.TempDir(), foldername1),
  1044. }
  1045. folder2 := vfs.BaseVirtualFolder{
  1046. Name: foldername2,
  1047. MappedPath: filepath.Join(os.TempDir(), foldername2),
  1048. }
  1049. err = dataprovider.AddFolder(&folder1, "", "", "")
  1050. assert.NoError(t, err)
  1051. err = dataprovider.AddFolder(&folder2, "", "", "")
  1052. assert.NoError(t, err)
  1053. action = dataprovider.BaseEventAction{
  1054. Type: dataprovider.ActionTypeFolderQuotaReset,
  1055. }
  1056. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1057. Names: []dataprovider.ConditionPattern{
  1058. {
  1059. Pattern: foldername1,
  1060. },
  1061. },
  1062. })
  1063. assert.Error(t, err) // no home dir
  1064. err = os.MkdirAll(folder1.MappedPath, os.ModePerm)
  1065. assert.NoError(t, err)
  1066. err = os.WriteFile(filepath.Join(folder1.MappedPath, "file.txt"), []byte("folder"), 0666)
  1067. assert.NoError(t, err)
  1068. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1069. Names: []dataprovider.ConditionPattern{
  1070. {
  1071. Pattern: foldername1,
  1072. },
  1073. },
  1074. })
  1075. assert.NoError(t, err)
  1076. folderGet, err := dataprovider.GetFolderByName(foldername1)
  1077. assert.NoError(t, err)
  1078. assert.Equal(t, 1, folderGet.UsedQuotaFiles)
  1079. assert.Equal(t, int64(6), folderGet.UsedQuotaSize)
  1080. // simulate another quota scan in progress
  1081. assert.True(t, QuotaScans.AddVFolderQuotaScan(foldername1))
  1082. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1083. Names: []dataprovider.ConditionPattern{
  1084. {
  1085. Pattern: foldername1,
  1086. },
  1087. },
  1088. })
  1089. assert.Error(t, err)
  1090. assert.True(t, QuotaScans.RemoveVFolderQuotaScan(foldername1))
  1091. err = executeRuleAction(action, &EventParams{}, dataprovider.ConditionOptions{
  1092. Names: []dataprovider.ConditionPattern{
  1093. {
  1094. Pattern: "no folder match",
  1095. },
  1096. },
  1097. })
  1098. if assert.Error(t, err) {
  1099. assert.Contains(t, err.Error(), "no folder quota reset executed")
  1100. }
  1101. body, _, err := getHTTPRuleActionBody(dataprovider.EventActionHTTPConfig{
  1102. Method: http.MethodPost,
  1103. }, nil, nil, dataprovider.User{}, &EventParams{})
  1104. assert.NoError(t, err)
  1105. assert.Nil(t, body)
  1106. err = os.RemoveAll(folder1.MappedPath)
  1107. assert.NoError(t, err)
  1108. err = dataprovider.DeleteFolder(foldername1, "", "", "")
  1109. assert.NoError(t, err)
  1110. err = dataprovider.DeleteFolder(foldername2, "", "", "")
  1111. assert.NoError(t, err)
  1112. }
  1113. func TestEventRuleActionsNoGroupMatching(t *testing.T) {
  1114. username := "test_user_action_group_matching"
  1115. user := dataprovider.User{
  1116. BaseUser: sdk.BaseUser{
  1117. Username: username,
  1118. Permissions: map[string][]string{
  1119. "/": {dataprovider.PermAny},
  1120. },
  1121. HomeDir: filepath.Join(os.TempDir(), username),
  1122. },
  1123. }
  1124. err := dataprovider.AddUser(&user, "", "", "")
  1125. assert.NoError(t, err)
  1126. conditions := dataprovider.ConditionOptions{
  1127. GroupNames: []dataprovider.ConditionPattern{
  1128. {
  1129. Pattern: "agroup",
  1130. },
  1131. },
  1132. }
  1133. err = executeDeleteFsRuleAction(nil, nil, conditions, &EventParams{})
  1134. if assert.Error(t, err) {
  1135. assert.Contains(t, err.Error(), "no delete executed")
  1136. }
  1137. err = executeMkdirFsRuleAction(nil, nil, conditions, &EventParams{})
  1138. if assert.Error(t, err) {
  1139. assert.Contains(t, err.Error(), "no mkdir executed")
  1140. }
  1141. err = executeRenameFsRuleAction(nil, nil, conditions, &EventParams{})
  1142. if assert.Error(t, err) {
  1143. assert.Contains(t, err.Error(), "no rename executed")
  1144. }
  1145. err = executeExistFsRuleAction(nil, nil, conditions, &EventParams{})
  1146. if assert.Error(t, err) {
  1147. assert.Contains(t, err.Error(), "no existence check executed")
  1148. }
  1149. err = executeCopyFsRuleAction(nil, nil, conditions, &EventParams{})
  1150. if assert.Error(t, err) {
  1151. assert.Contains(t, err.Error(), "no copy executed")
  1152. }
  1153. err = executeUsersQuotaResetRuleAction(conditions, &EventParams{})
  1154. if assert.Error(t, err) {
  1155. assert.Contains(t, err.Error(), "no user quota reset executed")
  1156. }
  1157. err = executeMetadataCheckRuleAction(conditions, &EventParams{})
  1158. if assert.Error(t, err) {
  1159. assert.Contains(t, err.Error(), "no metadata check executed")
  1160. }
  1161. err = executeTransferQuotaResetRuleAction(conditions, &EventParams{})
  1162. if assert.Error(t, err) {
  1163. assert.Contains(t, err.Error(), "no transfer quota reset executed")
  1164. }
  1165. err = executeDataRetentionCheckRuleAction(dataprovider.EventActionDataRetentionConfig{}, conditions, &EventParams{}, "")
  1166. if assert.Error(t, err) {
  1167. assert.Contains(t, err.Error(), "no retention check executed")
  1168. }
  1169. err = dataprovider.DeleteUser(username, "", "", "")
  1170. assert.NoError(t, err)
  1171. err = os.RemoveAll(user.GetHomeDir())
  1172. assert.NoError(t, err)
  1173. }
  1174. func TestGetFileContent(t *testing.T) {
  1175. username := "test_user_get_file_content"
  1176. user := dataprovider.User{
  1177. BaseUser: sdk.BaseUser{
  1178. Username: username,
  1179. Permissions: map[string][]string{
  1180. "/": {dataprovider.PermAny},
  1181. },
  1182. HomeDir: filepath.Join(os.TempDir(), username),
  1183. },
  1184. }
  1185. err := dataprovider.AddUser(&user, "", "", "")
  1186. assert.NoError(t, err)
  1187. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1188. assert.NoError(t, err)
  1189. fileContent := []byte("test file content")
  1190. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file.txt"), fileContent, 0666)
  1191. assert.NoError(t, err)
  1192. replacer := strings.NewReplacer("old", "new")
  1193. files, err := getMailAttachments(user, []string{"/file.txt"}, replacer)
  1194. assert.NoError(t, err)
  1195. if assert.Len(t, files, 1) {
  1196. assert.Equal(t, fileContent, files[0].Data)
  1197. }
  1198. // missing file
  1199. _, err = getMailAttachments(user, []string{"/file1.txt"}, replacer)
  1200. assert.Error(t, err)
  1201. // directory
  1202. _, err = getMailAttachments(user, []string{"/"}, replacer)
  1203. assert.Error(t, err)
  1204. // files too large
  1205. content := make([]byte, maxAttachmentsSize/2+1)
  1206. _, err = rand.Read(content)
  1207. assert.NoError(t, err)
  1208. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file1.txt"), content, 0666)
  1209. assert.NoError(t, err)
  1210. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "file2.txt"), content, 0666)
  1211. assert.NoError(t, err)
  1212. files, err = getMailAttachments(user, []string{"/file1.txt"}, replacer)
  1213. assert.NoError(t, err)
  1214. if assert.Len(t, files, 1) {
  1215. assert.Equal(t, content, files[0].Data)
  1216. }
  1217. _, err = getMailAttachments(user, []string{"/file1.txt", "/file2.txt"}, replacer)
  1218. if assert.Error(t, err) {
  1219. assert.Contains(t, err.Error(), "size too large")
  1220. }
  1221. // change the filesystem provider
  1222. user.FsConfig.Provider = sdk.CryptedFilesystemProvider
  1223. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret("pwd")
  1224. err = dataprovider.UpdateUser(&user, "", "", "")
  1225. assert.NoError(t, err)
  1226. // the file is not encrypted so reading the encryption header will fail
  1227. _, err = getMailAttachments(user, []string{"/file.txt"}, replacer)
  1228. assert.Error(t, err)
  1229. err = dataprovider.DeleteUser(username, "", "", "")
  1230. assert.NoError(t, err)
  1231. err = os.RemoveAll(user.GetHomeDir())
  1232. assert.NoError(t, err)
  1233. }
  1234. func TestFilesystemActionErrors(t *testing.T) {
  1235. err := executeFsRuleAction(dataprovider.EventActionFilesystemConfig{}, dataprovider.ConditionOptions{}, &EventParams{})
  1236. if assert.Error(t, err) {
  1237. assert.Contains(t, err.Error(), "unsupported filesystem action")
  1238. }
  1239. username := "test_user_for_actions"
  1240. testReplacer := strings.NewReplacer("old", "new")
  1241. user := dataprovider.User{
  1242. BaseUser: sdk.BaseUser{
  1243. Username: username,
  1244. Permissions: map[string][]string{
  1245. "/": {dataprovider.PermAny},
  1246. },
  1247. HomeDir: filepath.Join(os.TempDir(), username),
  1248. },
  1249. FsConfig: vfs.Filesystem{
  1250. Provider: sdk.SFTPFilesystemProvider,
  1251. SFTPConfig: vfs.SFTPFsConfig{
  1252. BaseSFTPFsConfig: sdk.BaseSFTPFsConfig{
  1253. Endpoint: "127.0.0.1:4022",
  1254. Username: username,
  1255. },
  1256. Password: kms.NewPlainSecret("pwd"),
  1257. },
  1258. },
  1259. }
  1260. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1261. Recipients: []string{"test@example.net"},
  1262. Subject: "subject",
  1263. Body: "body",
  1264. Attachments: []string{"/file.txt"},
  1265. }, &EventParams{
  1266. sender: username,
  1267. })
  1268. assert.Error(t, err)
  1269. conn := NewBaseConnection("", protocolEventAction, "", "", user)
  1270. err = executeDeleteFileFsAction(conn, "", nil)
  1271. assert.Error(t, err)
  1272. err = dataprovider.AddUser(&user, "", "", "")
  1273. assert.NoError(t, err)
  1274. // check root fs fails
  1275. err = executeDeleteFsActionForUser(nil, testReplacer, user)
  1276. assert.Error(t, err)
  1277. err = executeMkDirsFsActionForUser(nil, testReplacer, user)
  1278. assert.Error(t, err)
  1279. err = executeRenameFsActionForUser(nil, testReplacer, user)
  1280. assert.Error(t, err)
  1281. err = executeExistFsActionForUser(nil, testReplacer, user)
  1282. assert.Error(t, err)
  1283. err = executeCopyFsActionForUser(nil, testReplacer, user)
  1284. assert.Error(t, err)
  1285. err = executeCompressFsActionForUser(dataprovider.EventActionFsCompress{}, testReplacer, user)
  1286. assert.Error(t, err)
  1287. _, _, _, _, err = getFileWriter(conn, "/path.txt", -1) //nolint:dogsled
  1288. assert.Error(t, err)
  1289. err = executeEmailRuleAction(dataprovider.EventActionEmailConfig{
  1290. Recipients: []string{"test@example.net"},
  1291. Subject: "subject",
  1292. Body: "body",
  1293. Attachments: []string{"/file1.txt"},
  1294. }, &EventParams{
  1295. sender: username,
  1296. })
  1297. assert.Error(t, err)
  1298. _, err = getFileContent(NewBaseConnection("", protocolEventAction, "", "", user), "/f.txt", 1234)
  1299. assert.Error(t, err)
  1300. err = executeHTTPRuleAction(dataprovider.EventActionHTTPConfig{
  1301. Endpoint: "http://127.0.0.1:9999/",
  1302. Method: http.MethodPost,
  1303. Parts: []dataprovider.HTTPPart{
  1304. {
  1305. Name: "p1",
  1306. Filepath: "/filepath",
  1307. },
  1308. },
  1309. }, &EventParams{
  1310. sender: username,
  1311. })
  1312. assert.Error(t, err)
  1313. user.FsConfig.Provider = sdk.LocalFilesystemProvider
  1314. user.Permissions["/"] = []string{dataprovider.PermUpload}
  1315. err = dataprovider.DeleteUser(username, "", "", "")
  1316. assert.NoError(t, err)
  1317. err = dataprovider.AddUser(&user, "", "", "")
  1318. assert.NoError(t, err)
  1319. err = executeRenameFsActionForUser([]dataprovider.KeyValue{
  1320. {
  1321. Key: "/p1",
  1322. Value: "/p1",
  1323. },
  1324. }, testReplacer, user)
  1325. if assert.Error(t, err) {
  1326. assert.Contains(t, err.Error(), "the rename source and target cannot be the same")
  1327. }
  1328. err = executeRuleAction(dataprovider.BaseEventAction{
  1329. Type: dataprovider.ActionTypeFilesystem,
  1330. Options: dataprovider.BaseEventActionOptions{
  1331. FsConfig: dataprovider.EventActionFilesystemConfig{
  1332. Type: dataprovider.FilesystemActionRename,
  1333. Renames: []dataprovider.KeyValue{
  1334. {
  1335. Key: "/p2",
  1336. Value: "/p2",
  1337. },
  1338. },
  1339. },
  1340. },
  1341. }, &EventParams{}, dataprovider.ConditionOptions{
  1342. Names: []dataprovider.ConditionPattern{
  1343. {
  1344. Pattern: username,
  1345. },
  1346. },
  1347. })
  1348. assert.Error(t, err)
  1349. if runtime.GOOS != osWindows {
  1350. dirPath := filepath.Join(user.HomeDir, "adir", "sub")
  1351. err := os.MkdirAll(dirPath, os.ModePerm)
  1352. assert.NoError(t, err)
  1353. filePath := filepath.Join(dirPath, "f.dat")
  1354. err = os.WriteFile(filePath, []byte("test file content"), 0666)
  1355. assert.NoError(t, err)
  1356. err = os.Chmod(dirPath, 0001)
  1357. assert.NoError(t, err)
  1358. err = executeDeleteFsActionForUser([]string{"/adir/sub"}, testReplacer, user)
  1359. assert.Error(t, err)
  1360. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1361. assert.Error(t, err)
  1362. err = os.Chmod(dirPath, 0555)
  1363. assert.NoError(t, err)
  1364. err = executeDeleteFsActionForUser([]string{"/adir/sub/f.dat"}, testReplacer, user)
  1365. if assert.Error(t, err) {
  1366. assert.Contains(t, err.Error(), "unable to remove file")
  1367. }
  1368. err = executeRuleAction(dataprovider.BaseEventAction{
  1369. Type: dataprovider.ActionTypeFilesystem,
  1370. Options: dataprovider.BaseEventActionOptions{
  1371. FsConfig: dataprovider.EventActionFilesystemConfig{
  1372. Type: dataprovider.FilesystemActionDelete,
  1373. Deletes: []string{"/adir/sub/f.dat"},
  1374. },
  1375. },
  1376. }, &EventParams{}, dataprovider.ConditionOptions{
  1377. Names: []dataprovider.ConditionPattern{
  1378. {
  1379. Pattern: username,
  1380. },
  1381. },
  1382. })
  1383. assert.Error(t, err)
  1384. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub"}, testReplacer, user)
  1385. if assert.Error(t, err) {
  1386. assert.Contains(t, err.Error(), "unable to create dir")
  1387. }
  1388. err = executeMkDirsFsActionForUser([]string{"/adir/sub/sub/sub"}, testReplacer, user)
  1389. if assert.Error(t, err) {
  1390. assert.Contains(t, err.Error(), "unable to check parent dirs")
  1391. }
  1392. err = executeRuleAction(dataprovider.BaseEventAction{
  1393. Type: dataprovider.ActionTypeFilesystem,
  1394. Options: dataprovider.BaseEventActionOptions{
  1395. FsConfig: dataprovider.EventActionFilesystemConfig{
  1396. Type: dataprovider.FilesystemActionMkdirs,
  1397. MkDirs: []string{"/adir/sub/sub1"},
  1398. },
  1399. },
  1400. }, &EventParams{}, dataprovider.ConditionOptions{
  1401. Names: []dataprovider.ConditionPattern{
  1402. {
  1403. Pattern: username,
  1404. },
  1405. },
  1406. })
  1407. assert.Error(t, err)
  1408. err = os.Chmod(dirPath, os.ModePerm)
  1409. assert.NoError(t, err)
  1410. conn = NewBaseConnection("", protocolEventAction, "", "", user)
  1411. wr := &zipWriterWrapper{
  1412. Name: "test.zip",
  1413. Writer: zip.NewWriter(bytes.NewBuffer(nil)),
  1414. Entries: map[string]bool{},
  1415. }
  1416. err = addZipEntry(wr, conn, "/adir/sub/f.dat", "/adir/sub/sub")
  1417. assert.Error(t, err)
  1418. assert.Contains(t, getErrorString(err), "is outside base dir")
  1419. }
  1420. err = dataprovider.DeleteUser(username, "", "", "")
  1421. assert.NoError(t, err)
  1422. err = os.RemoveAll(user.GetHomeDir())
  1423. assert.NoError(t, err)
  1424. }
  1425. func TestQuotaActionsWithQuotaTrackDisabled(t *testing.T) {
  1426. oldProviderConf := dataprovider.GetProviderConfig()
  1427. providerConf := dataprovider.GetProviderConfig()
  1428. providerConf.TrackQuota = 0
  1429. err := dataprovider.Close()
  1430. assert.NoError(t, err)
  1431. err = dataprovider.Initialize(providerConf, configDir, true)
  1432. assert.NoError(t, err)
  1433. username := "u1"
  1434. user := dataprovider.User{
  1435. BaseUser: sdk.BaseUser{
  1436. Username: username,
  1437. HomeDir: filepath.Join(os.TempDir(), username),
  1438. Status: 1,
  1439. Permissions: map[string][]string{
  1440. "/": {dataprovider.PermAny},
  1441. },
  1442. },
  1443. FsConfig: vfs.Filesystem{
  1444. Provider: sdk.LocalFilesystemProvider,
  1445. },
  1446. }
  1447. err = dataprovider.AddUser(&user, "", "", "")
  1448. assert.NoError(t, err)
  1449. err = os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  1450. assert.NoError(t, err)
  1451. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeUserQuotaReset},
  1452. &EventParams{}, dataprovider.ConditionOptions{
  1453. Names: []dataprovider.ConditionPattern{
  1454. {
  1455. Pattern: username,
  1456. },
  1457. },
  1458. })
  1459. assert.Error(t, err)
  1460. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeTransferQuotaReset},
  1461. &EventParams{}, dataprovider.ConditionOptions{
  1462. Names: []dataprovider.ConditionPattern{
  1463. {
  1464. Pattern: username,
  1465. },
  1466. },
  1467. })
  1468. assert.Error(t, err)
  1469. err = os.RemoveAll(user.GetHomeDir())
  1470. assert.NoError(t, err)
  1471. err = dataprovider.DeleteUser(username, "", "", "")
  1472. assert.NoError(t, err)
  1473. foldername := "f1"
  1474. folder := vfs.BaseVirtualFolder{
  1475. Name: foldername,
  1476. MappedPath: filepath.Join(os.TempDir(), foldername),
  1477. }
  1478. err = dataprovider.AddFolder(&folder, "", "", "")
  1479. assert.NoError(t, err)
  1480. err = os.MkdirAll(folder.MappedPath, os.ModePerm)
  1481. assert.NoError(t, err)
  1482. err = executeRuleAction(dataprovider.BaseEventAction{Type: dataprovider.ActionTypeFolderQuotaReset},
  1483. &EventParams{}, dataprovider.ConditionOptions{
  1484. Names: []dataprovider.ConditionPattern{
  1485. {
  1486. Pattern: foldername,
  1487. },
  1488. },
  1489. })
  1490. assert.Error(t, err)
  1491. err = os.RemoveAll(folder.MappedPath)
  1492. assert.NoError(t, err)
  1493. err = dataprovider.DeleteFolder(foldername, "", "", "")
  1494. assert.NoError(t, err)
  1495. err = dataprovider.Close()
  1496. assert.NoError(t, err)
  1497. err = dataprovider.Initialize(oldProviderConf, configDir, true)
  1498. assert.NoError(t, err)
  1499. }
  1500. func TestScheduledActions(t *testing.T) {
  1501. startEventScheduler()
  1502. backupsPath := filepath.Join(os.TempDir(), "backups")
  1503. err := os.RemoveAll(backupsPath)
  1504. assert.NoError(t, err)
  1505. action := &dataprovider.BaseEventAction{
  1506. Name: "action",
  1507. Type: dataprovider.ActionTypeBackup,
  1508. }
  1509. err = dataprovider.AddEventAction(action, "", "", "")
  1510. assert.NoError(t, err)
  1511. rule := &dataprovider.EventRule{
  1512. Name: "rule",
  1513. Trigger: dataprovider.EventTriggerSchedule,
  1514. Conditions: dataprovider.EventConditions{
  1515. Schedules: []dataprovider.Schedule{
  1516. {
  1517. Hours: "11",
  1518. DayOfWeek: "*",
  1519. DayOfMonth: "*",
  1520. Month: "*",
  1521. },
  1522. },
  1523. },
  1524. Actions: []dataprovider.EventAction{
  1525. {
  1526. BaseEventAction: dataprovider.BaseEventAction{
  1527. Name: action.Name,
  1528. },
  1529. Order: 1,
  1530. },
  1531. },
  1532. }
  1533. job := eventCronJob{
  1534. ruleName: rule.Name,
  1535. }
  1536. job.Run() // rule not found
  1537. assert.NoDirExists(t, backupsPath)
  1538. err = dataprovider.AddEventRule(rule, "", "", "")
  1539. assert.NoError(t, err)
  1540. job.Run()
  1541. assert.DirExists(t, backupsPath)
  1542. action.Type = dataprovider.ActionTypeEmail
  1543. action.Options = dataprovider.BaseEventActionOptions{
  1544. EmailConfig: dataprovider.EventActionEmailConfig{
  1545. Recipients: []string{"example@example.com"},
  1546. Subject: "test with attachments",
  1547. Body: "body",
  1548. Attachments: []string{"/file1.txt"},
  1549. },
  1550. }
  1551. err = dataprovider.UpdateEventAction(action, "", "", "")
  1552. assert.NoError(t, err)
  1553. job.Run() // action is not compatible with a scheduled rule
  1554. err = dataprovider.DeleteEventRule(rule.Name, "", "", "")
  1555. assert.NoError(t, err)
  1556. err = dataprovider.DeleteEventAction(action.Name, "", "", "")
  1557. assert.NoError(t, err)
  1558. err = os.RemoveAll(backupsPath)
  1559. assert.NoError(t, err)
  1560. stopEventScheduler()
  1561. }
  1562. func TestEventParamsCopy(t *testing.T) {
  1563. params := EventParams{
  1564. Name: "name",
  1565. Event: "event",
  1566. Status: 1,
  1567. errors: []string{"error1"},
  1568. retentionChecks: []executedRetentionCheck{},
  1569. }
  1570. paramsCopy := params.getACopy()
  1571. assert.Equal(t, params, *paramsCopy)
  1572. params.Name = "name mod"
  1573. paramsCopy.Event = "event mod"
  1574. paramsCopy.Status = 2
  1575. params.errors = append(params.errors, "error2")
  1576. paramsCopy.errors = append(paramsCopy.errors, "error3")
  1577. assert.Equal(t, []string{"error1", "error3"}, paramsCopy.errors)
  1578. assert.Equal(t, []string{"error1", "error2"}, params.errors)
  1579. assert.Equal(t, "name mod", params.Name)
  1580. assert.Equal(t, "name", paramsCopy.Name)
  1581. assert.Equal(t, "event", params.Event)
  1582. assert.Equal(t, "event mod", paramsCopy.Event)
  1583. assert.Equal(t, 1, params.Status)
  1584. assert.Equal(t, 2, paramsCopy.Status)
  1585. params = EventParams{
  1586. retentionChecks: []executedRetentionCheck{
  1587. {
  1588. Username: "u",
  1589. ActionName: "a",
  1590. Results: []folderRetentionCheckResult{
  1591. {
  1592. Path: "p",
  1593. Retention: 1,
  1594. },
  1595. },
  1596. },
  1597. },
  1598. }
  1599. paramsCopy = params.getACopy()
  1600. require.Len(t, paramsCopy.retentionChecks, 1)
  1601. paramsCopy.retentionChecks[0].Username = "u_copy"
  1602. paramsCopy.retentionChecks[0].ActionName = "a_copy"
  1603. require.Len(t, paramsCopy.retentionChecks[0].Results, 1)
  1604. paramsCopy.retentionChecks[0].Results[0].Path = "p_copy"
  1605. paramsCopy.retentionChecks[0].Results[0].Retention = 2
  1606. assert.Equal(t, "u", params.retentionChecks[0].Username)
  1607. assert.Equal(t, "a", params.retentionChecks[0].ActionName)
  1608. assert.Equal(t, "p", params.retentionChecks[0].Results[0].Path)
  1609. assert.Equal(t, 1, params.retentionChecks[0].Results[0].Retention)
  1610. assert.Equal(t, "u_copy", paramsCopy.retentionChecks[0].Username)
  1611. assert.Equal(t, "a_copy", paramsCopy.retentionChecks[0].ActionName)
  1612. assert.Equal(t, "p_copy", paramsCopy.retentionChecks[0].Results[0].Path)
  1613. assert.Equal(t, 2, paramsCopy.retentionChecks[0].Results[0].Retention)
  1614. }
  1615. func TestEventParamsStatusFromError(t *testing.T) {
  1616. params := EventParams{Status: 1}
  1617. params.AddError(os.ErrNotExist)
  1618. assert.Equal(t, 1, params.Status)
  1619. params = EventParams{Status: 1, updateStatusFromError: true}
  1620. params.AddError(os.ErrNotExist)
  1621. assert.Equal(t, 2, params.Status)
  1622. }
  1623. type testWriter struct {
  1624. errTest error
  1625. sentinel string
  1626. }
  1627. func (w *testWriter) Write(p []byte) (int, error) {
  1628. if w.errTest != nil {
  1629. return 0, w.errTest
  1630. }
  1631. if w.sentinel == string(p) {
  1632. return 0, io.ErrUnexpectedEOF
  1633. }
  1634. return len(p), nil
  1635. }
  1636. func TestWriteHTTPPartsError(t *testing.T) {
  1637. m := multipart.NewWriter(&testWriter{
  1638. errTest: io.ErrShortWrite,
  1639. })
  1640. err := writeHTTPPart(m, dataprovider.HTTPPart{}, nil, nil, nil, &EventParams{})
  1641. assert.ErrorIs(t, err, io.ErrShortWrite)
  1642. body := "test body"
  1643. m = multipart.NewWriter(&testWriter{sentinel: body})
  1644. err = writeHTTPPart(m, dataprovider.HTTPPart{
  1645. Body: body,
  1646. }, nil, nil, nil, &EventParams{})
  1647. assert.ErrorIs(t, err, io.ErrUnexpectedEOF)
  1648. }
  1649. func TestReplacePathsPlaceholders(t *testing.T) {
  1650. replacer := strings.NewReplacer("{{VirtualPath}}", "/path1")
  1651. paths := []string{"{{VirtualPath}}", "/path1"}
  1652. paths = replacePathsPlaceholders(paths, replacer)
  1653. assert.Equal(t, []string{"/path1"}, paths)
  1654. paths = []string{"{{VirtualPath}}", "/path2"}
  1655. paths = replacePathsPlaceholders(paths, replacer)
  1656. assert.Equal(t, []string{"/path1", "/path2"}, paths)
  1657. }
  1658. func TestEstimateZipSizeErrors(t *testing.T) {
  1659. u := dataprovider.User{
  1660. BaseUser: sdk.BaseUser{
  1661. Username: "u",
  1662. HomeDir: filepath.Join(os.TempDir(), "u"),
  1663. Status: 1,
  1664. Permissions: map[string][]string{
  1665. "/": {dataprovider.PermAny},
  1666. },
  1667. QuotaSize: 1000,
  1668. },
  1669. }
  1670. err := dataprovider.AddUser(&u, "", "", "")
  1671. assert.NoError(t, err)
  1672. err = os.MkdirAll(u.GetHomeDir(), os.ModePerm)
  1673. assert.NoError(t, err)
  1674. conn := NewBaseConnection("", ProtocolFTP, "", "", u)
  1675. _, err = getSizeForPath(conn, "/missing", vfs.NewFileInfo("missing", true, 0, time.Now(), false))
  1676. assert.True(t, conn.IsNotExistError(err))
  1677. if runtime.GOOS != osWindows {
  1678. err = os.MkdirAll(filepath.Join(u.HomeDir, "d1", "d2", "sub"), os.ModePerm)
  1679. assert.NoError(t, err)
  1680. err = os.WriteFile(filepath.Join(u.HomeDir, "d1", "d2", "sub", "file.txt"), []byte("data"), 0666)
  1681. assert.NoError(t, err)
  1682. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), 0001)
  1683. assert.NoError(t, err)
  1684. size, err := estimateZipSize(conn, "/archive.zip", []string{"/d1"})
  1685. assert.Error(t, err, "size %d", size)
  1686. err = os.Chmod(filepath.Join(u.HomeDir, "d1", "d2"), os.ModePerm)
  1687. assert.NoError(t, err)
  1688. }
  1689. err = dataprovider.DeleteUser(u.Username, "", "", "")
  1690. assert.NoError(t, err)
  1691. err = os.RemoveAll(u.GetHomeDir())
  1692. assert.NoError(t, err)
  1693. }
  1694. func getErrorString(err error) string {
  1695. if err == nil {
  1696. return ""
  1697. }
  1698. return err.Error()
  1699. }