cryptfs_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. package sftpd_test
  2. import (
  3. "crypto/sha256"
  4. "fmt"
  5. "net/http"
  6. "os"
  7. "path"
  8. "path/filepath"
  9. "testing"
  10. "time"
  11. "github.com/minio/sio"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/drakkan/sftpgo/dataprovider"
  14. "github.com/drakkan/sftpgo/httpd"
  15. "github.com/drakkan/sftpgo/kms"
  16. "github.com/drakkan/sftpgo/vfs"
  17. )
  18. const (
  19. testPassphrase = "test passphrase"
  20. )
  21. func TestBasicSFTPCryptoHandling(t *testing.T) {
  22. usePubKey := false
  23. u := getTestUserWithCryptFs(usePubKey)
  24. u.QuotaSize = 6553600
  25. user, _, err := httpd.AddUser(u, http.StatusOK)
  26. assert.NoError(t, err)
  27. client, err := getSftpClient(user, usePubKey)
  28. if assert.NoError(t, err) {
  29. defer client.Close()
  30. testFilePath := filepath.Join(homeBasePath, testFileName)
  31. testFileSize := int64(65535)
  32. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  33. assert.NoError(t, err)
  34. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  35. expectedQuotaFiles := user.UsedQuotaFiles + 1
  36. err = createTestFile(testFilePath, testFileSize)
  37. assert.NoError(t, err)
  38. err = sftpUploadFile(testFilePath, path.Join("/missing_dir", testFileName), testFileSize, client)
  39. assert.Error(t, err)
  40. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  41. assert.NoError(t, err)
  42. localDownloadPath := filepath.Join(homeBasePath, testDLFileName)
  43. err = sftpDownloadFile(testFileName, localDownloadPath, testFileSize, client)
  44. assert.NoError(t, err)
  45. initialHash, err := computeHashForFile(sha256.New(), testFilePath)
  46. assert.NoError(t, err)
  47. downloadedFileHash, err := computeHashForFile(sha256.New(), localDownloadPath)
  48. assert.NoError(t, err)
  49. assert.Equal(t, initialHash, downloadedFileHash)
  50. info, err := os.Stat(filepath.Join(user.HomeDir, testFileName))
  51. if assert.NoError(t, err) {
  52. assert.Equal(t, encryptedFileSize, info.Size())
  53. }
  54. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  55. assert.NoError(t, err)
  56. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  57. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  58. result, err := client.ReadDir(".")
  59. assert.NoError(t, err)
  60. if assert.Len(t, result, 1) {
  61. assert.Equal(t, testFileSize, result[0].Size())
  62. }
  63. info, err = client.Stat(testFileName)
  64. if assert.NoError(t, err) {
  65. assert.Equal(t, testFileSize, info.Size())
  66. }
  67. err = client.Remove(testFileName)
  68. assert.NoError(t, err)
  69. _, err = client.Lstat(testFileName)
  70. assert.Error(t, err)
  71. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  72. assert.NoError(t, err)
  73. assert.Equal(t, expectedQuotaFiles-1, user.UsedQuotaFiles)
  74. assert.Equal(t, expectedQuotaSize-encryptedFileSize, user.UsedQuotaSize)
  75. err = os.Remove(testFilePath)
  76. assert.NoError(t, err)
  77. err = os.Remove(localDownloadPath)
  78. assert.NoError(t, err)
  79. }
  80. _, err = httpd.RemoveUser(user, http.StatusOK)
  81. assert.NoError(t, err)
  82. err = os.RemoveAll(user.GetHomeDir())
  83. assert.NoError(t, err)
  84. }
  85. func TestOpenReadWriteCryptoFs(t *testing.T) {
  86. // read and write is not supported on crypto fs
  87. usePubKey := false
  88. u := getTestUserWithCryptFs(usePubKey)
  89. u.QuotaSize = 6553600
  90. user, _, err := httpd.AddUser(u, http.StatusOK)
  91. assert.NoError(t, err)
  92. client, err := getSftpClient(user, usePubKey)
  93. if assert.NoError(t, err) {
  94. defer client.Close()
  95. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  96. if assert.NoError(t, err) {
  97. testData := []byte("sample test data")
  98. n, err := sftpFile.Write(testData)
  99. assert.NoError(t, err)
  100. assert.Equal(t, len(testData), n)
  101. buffer := make([]byte, 128)
  102. _, err = sftpFile.ReadAt(buffer, 1)
  103. if assert.Error(t, err) {
  104. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  105. }
  106. err = sftpFile.Close()
  107. assert.NoError(t, err)
  108. }
  109. }
  110. _, err = httpd.RemoveUser(user, http.StatusOK)
  111. assert.NoError(t, err)
  112. err = os.RemoveAll(user.GetHomeDir())
  113. assert.NoError(t, err)
  114. }
  115. func TestEmptyFile(t *testing.T) {
  116. usePubKey := true
  117. u := getTestUserWithCryptFs(usePubKey)
  118. user, _, err := httpd.AddUser(u, http.StatusOK)
  119. assert.NoError(t, err)
  120. client, err := getSftpClient(user, usePubKey)
  121. if assert.NoError(t, err) {
  122. defer client.Close()
  123. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  124. if assert.NoError(t, err) {
  125. testData := []byte("")
  126. n, err := sftpFile.Write(testData)
  127. assert.NoError(t, err)
  128. assert.Equal(t, len(testData), n)
  129. err = sftpFile.Close()
  130. assert.NoError(t, err)
  131. }
  132. info, err := client.Stat(testFileName)
  133. if assert.NoError(t, err) {
  134. assert.Equal(t, int64(0), info.Size())
  135. }
  136. localDownloadPath := filepath.Join(homeBasePath, testDLFileName)
  137. err = sftpDownloadFile(testFileName, localDownloadPath, 0, client)
  138. assert.NoError(t, err)
  139. encryptedFileSize, err := getEncryptedFileSize(0)
  140. assert.NoError(t, err)
  141. info, err = os.Stat(filepath.Join(user.HomeDir, testFileName))
  142. if assert.NoError(t, err) {
  143. assert.Equal(t, encryptedFileSize, info.Size())
  144. }
  145. err = os.Remove(localDownloadPath)
  146. assert.NoError(t, err)
  147. }
  148. _, err = httpd.RemoveUser(user, http.StatusOK)
  149. assert.NoError(t, err)
  150. err = os.RemoveAll(user.GetHomeDir())
  151. assert.NoError(t, err)
  152. }
  153. func TestUploadResumeCryptFs(t *testing.T) {
  154. // upload resume is not supported
  155. usePubKey := true
  156. u := getTestUserWithCryptFs(usePubKey)
  157. user, _, err := httpd.AddUser(u, http.StatusOK)
  158. assert.NoError(t, err)
  159. err = os.RemoveAll(user.GetHomeDir())
  160. assert.NoError(t, err)
  161. client, err := getSftpClient(user, usePubKey)
  162. if assert.NoError(t, err) {
  163. defer client.Close()
  164. testFilePath := filepath.Join(homeBasePath, testFileName)
  165. testFileSize := int64(65535)
  166. appendDataSize := int64(65535)
  167. err = createTestFile(testFilePath, testFileSize)
  168. assert.NoError(t, err)
  169. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  170. assert.NoError(t, err)
  171. err = appendToTestFile(testFilePath, appendDataSize)
  172. assert.NoError(t, err)
  173. err = sftpUploadResumeFile(testFilePath, testFileName, testFileSize, false, client)
  174. if assert.Error(t, err) {
  175. assert.Contains(t, err.Error(), "SSH_FX_OP_UNSUPPORTED")
  176. }
  177. }
  178. _, err = httpd.RemoveUser(user, http.StatusOK)
  179. assert.NoError(t, err)
  180. err = os.RemoveAll(user.GetHomeDir())
  181. assert.NoError(t, err)
  182. }
  183. func TestQuotaFileReplaceCryptFs(t *testing.T) {
  184. usePubKey := false
  185. u := getTestUserWithCryptFs(usePubKey)
  186. u.QuotaFiles = 1000
  187. user, _, err := httpd.AddUser(u, http.StatusOK)
  188. assert.NoError(t, err)
  189. err = os.RemoveAll(user.GetHomeDir())
  190. assert.NoError(t, err)
  191. testFileSize := int64(65535)
  192. testFilePath := filepath.Join(homeBasePath, testFileName)
  193. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  194. assert.NoError(t, err)
  195. client, err := getSftpClient(user, usePubKey)
  196. if assert.NoError(t, err) { //nolint:dupl
  197. defer client.Close()
  198. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  199. expectedQuotaFiles := user.UsedQuotaFiles + 1
  200. err = createTestFile(testFilePath, testFileSize)
  201. assert.NoError(t, err)
  202. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  203. assert.NoError(t, err)
  204. // now replace the same file, the quota must not change
  205. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  206. assert.NoError(t, err)
  207. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  208. assert.NoError(t, err)
  209. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  210. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  211. // now create a symlink, replace it with a file and check the quota
  212. // replacing a symlink is like uploading a new file
  213. err = client.Symlink(testFileName, testFileName+".link")
  214. assert.NoError(t, err)
  215. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  216. assert.NoError(t, err)
  217. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  218. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  219. expectedQuotaFiles = expectedQuotaFiles + 1
  220. expectedQuotaSize = expectedQuotaSize + encryptedFileSize
  221. err = sftpUploadFile(testFilePath, testFileName+".link", testFileSize, client)
  222. assert.NoError(t, err)
  223. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  224. assert.NoError(t, err)
  225. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  226. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  227. }
  228. // now set a quota size restriction and upload the same file, upload should fail for space limit exceeded
  229. user.QuotaSize = encryptedFileSize*2 - 1
  230. user, _, err = httpd.UpdateUser(user, http.StatusOK, "")
  231. assert.NoError(t, err)
  232. client, err = getSftpClient(user, usePubKey)
  233. if assert.NoError(t, err) {
  234. defer client.Close()
  235. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  236. assert.Error(t, err, "quota size exceeded, file upload must fail")
  237. err = client.Remove(testFileName)
  238. assert.NoError(t, err)
  239. }
  240. _, err = httpd.RemoveUser(user, http.StatusOK)
  241. assert.NoError(t, err)
  242. err = os.Remove(testFilePath)
  243. assert.NoError(t, err)
  244. err = os.RemoveAll(user.GetHomeDir())
  245. assert.NoError(t, err)
  246. }
  247. func TestQuotaScanCryptFs(t *testing.T) {
  248. usePubKey := false
  249. user, _, err := httpd.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusOK)
  250. assert.NoError(t, err)
  251. testFileSize := int64(65535)
  252. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  253. assert.NoError(t, err)
  254. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  255. expectedQuotaFiles := user.UsedQuotaFiles + 1
  256. client, err := getSftpClient(user, usePubKey)
  257. if assert.NoError(t, err) {
  258. defer client.Close()
  259. testFilePath := filepath.Join(homeBasePath, testFileName)
  260. err = createTestFile(testFilePath, testFileSize)
  261. assert.NoError(t, err)
  262. err = sftpUploadFile(testFilePath, testFileName, testFileSize, client)
  263. assert.NoError(t, err)
  264. err = os.Remove(testFilePath)
  265. assert.NoError(t, err)
  266. }
  267. _, err = httpd.RemoveUser(user, http.StatusOK)
  268. assert.NoError(t, err)
  269. // create user with the same home dir, so there is at least an untracked file
  270. user, _, err = httpd.AddUser(getTestUser(usePubKey), http.StatusOK)
  271. assert.NoError(t, err)
  272. _, err = httpd.StartQuotaScan(user, http.StatusAccepted)
  273. assert.NoError(t, err)
  274. assert.Eventually(t, func() bool {
  275. scans, _, err := httpd.GetQuotaScans(http.StatusOK)
  276. if err == nil {
  277. return len(scans) == 0
  278. }
  279. return false
  280. }, 1*time.Second, 50*time.Millisecond)
  281. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  282. assert.NoError(t, err)
  283. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  284. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  285. _, err = httpd.RemoveUser(user, http.StatusOK)
  286. assert.NoError(t, err)
  287. err = os.RemoveAll(user.GetHomeDir())
  288. assert.NoError(t, err)
  289. }
  290. func TestGetMimeType(t *testing.T) {
  291. usePubKey := true
  292. user, _, err := httpd.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusOK)
  293. assert.NoError(t, err)
  294. client, err := getSftpClient(user, usePubKey)
  295. if assert.NoError(t, err) {
  296. defer client.Close()
  297. sftpFile, err := client.OpenFile(testFileName, os.O_RDWR|os.O_CREATE|os.O_TRUNC)
  298. if assert.NoError(t, err) {
  299. testData := []byte("some UTF-8 text so we should get a text/plain mime type")
  300. n, err := sftpFile.Write(testData)
  301. assert.NoError(t, err)
  302. assert.Equal(t, len(testData), n)
  303. err = sftpFile.Close()
  304. assert.NoError(t, err)
  305. }
  306. }
  307. user.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret(testPassphrase)
  308. fs, err := user.GetFilesystem("connID")
  309. if assert.NoError(t, err) {
  310. assert.True(t, vfs.IsCryptOsFs(fs))
  311. mime, err := fs.GetMimeType(filepath.Join(user.GetHomeDir(), testFileName))
  312. assert.NoError(t, err)
  313. assert.Equal(t, "text/plain; charset=utf-8", mime)
  314. }
  315. _, err = httpd.RemoveUser(user, http.StatusOK)
  316. assert.NoError(t, err)
  317. err = os.RemoveAll(user.GetHomeDir())
  318. assert.NoError(t, err)
  319. }
  320. func TestTruncate(t *testing.T) {
  321. // truncate is not supported
  322. usePubKey := true
  323. user, _, err := httpd.AddUser(getTestUserWithCryptFs(usePubKey), http.StatusOK)
  324. assert.NoError(t, err)
  325. client, err := getSftpClient(user, usePubKey)
  326. if assert.NoError(t, err) {
  327. defer client.Close()
  328. f, err := client.OpenFile(testFileName, os.O_WRONLY)
  329. if assert.NoError(t, err) {
  330. err = f.Truncate(0)
  331. assert.NoError(t, err)
  332. err = f.Truncate(1)
  333. assert.Error(t, err)
  334. }
  335. err = f.Close()
  336. assert.NoError(t, err)
  337. err = client.Truncate(testFileName, 0)
  338. assert.Error(t, err)
  339. }
  340. _, err = httpd.RemoveUser(user, http.StatusOK)
  341. assert.NoError(t, err)
  342. err = os.RemoveAll(user.GetHomeDir())
  343. assert.NoError(t, err)
  344. }
  345. func TestSCPBasicHandlingCryptoFs(t *testing.T) {
  346. if len(scpPath) == 0 {
  347. t.Skip("scp command not found, unable to execute this test")
  348. }
  349. usePubKey := true
  350. u := getTestUserWithCryptFs(usePubKey)
  351. u.QuotaSize = 6553600
  352. user, _, err := httpd.AddUser(u, http.StatusOK)
  353. assert.NoError(t, err)
  354. testFilePath := filepath.Join(homeBasePath, testFileName)
  355. testFileSize := int64(131074)
  356. encryptedFileSize, err := getEncryptedFileSize(testFileSize)
  357. assert.NoError(t, err)
  358. expectedQuotaSize := user.UsedQuotaSize + encryptedFileSize
  359. expectedQuotaFiles := user.UsedQuotaFiles + 1
  360. err = createTestFile(testFilePath, testFileSize)
  361. assert.NoError(t, err)
  362. remoteUpPath := fmt.Sprintf("%v@127.0.0.1:%v", user.Username, "/")
  363. remoteDownPath := fmt.Sprintf("%v@127.0.0.1:%v", user.Username, path.Join("/", testFileName))
  364. localPath := filepath.Join(homeBasePath, "scp_download.dat")
  365. // test to download a missing file
  366. err = scpDownload(localPath, remoteDownPath, false, false)
  367. assert.Error(t, err, "downloading a missing file via scp must fail")
  368. err = scpUpload(testFilePath, remoteUpPath, false, false)
  369. assert.NoError(t, err)
  370. err = scpDownload(localPath, remoteDownPath, false, false)
  371. assert.NoError(t, err)
  372. fi, err := os.Stat(localPath)
  373. if assert.NoError(t, err) {
  374. assert.Equal(t, testFileSize, fi.Size())
  375. }
  376. fi, err = os.Stat(filepath.Join(user.GetHomeDir(), testFileName))
  377. if assert.NoError(t, err) {
  378. assert.Equal(t, encryptedFileSize, fi.Size())
  379. }
  380. err = os.Remove(localPath)
  381. assert.NoError(t, err)
  382. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  383. assert.NoError(t, err)
  384. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  385. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  386. // now overwrite the existing file
  387. err = scpUpload(testFilePath, remoteUpPath, false, false)
  388. assert.NoError(t, err)
  389. user, _, err = httpd.GetUserByID(user.ID, http.StatusOK)
  390. assert.NoError(t, err)
  391. assert.Equal(t, expectedQuotaFiles, user.UsedQuotaFiles)
  392. assert.Equal(t, expectedQuotaSize, user.UsedQuotaSize)
  393. assert.NoError(t, err)
  394. _, err = httpd.RemoveUser(user, http.StatusOK)
  395. assert.NoError(t, err)
  396. err = os.RemoveAll(user.GetHomeDir())
  397. assert.NoError(t, err)
  398. err = os.Remove(testFilePath)
  399. assert.NoError(t, err)
  400. }
  401. func TestSCPRecursiveCryptFs(t *testing.T) {
  402. if len(scpPath) == 0 {
  403. t.Skip("scp command not found, unable to execute this test")
  404. }
  405. usePubKey := true
  406. u := getTestUserWithCryptFs(usePubKey)
  407. user, _, err := httpd.AddUser(u, http.StatusOK)
  408. assert.NoError(t, err)
  409. testBaseDirName := "atestdir"
  410. testBaseDirPath := filepath.Join(homeBasePath, testBaseDirName)
  411. testBaseDirDownName := "test_dir_down" //nolint:goconst
  412. testBaseDirDownPath := filepath.Join(homeBasePath, testBaseDirDownName)
  413. testFilePath := filepath.Join(homeBasePath, testBaseDirName, testFileName)
  414. testFilePath1 := filepath.Join(homeBasePath, testBaseDirName, testBaseDirName, testFileName)
  415. testFileSize := int64(131074)
  416. err = createTestFile(testFilePath, testFileSize)
  417. assert.NoError(t, err)
  418. err = createTestFile(testFilePath1, testFileSize)
  419. assert.NoError(t, err)
  420. remoteDownPath := fmt.Sprintf("%v@127.0.0.1:%v", user.Username, path.Join("/", testBaseDirName))
  421. remoteUpPath := fmt.Sprintf("%v@127.0.0.1:%v", user.Username, "/")
  422. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  423. assert.NoError(t, err)
  424. // overwrite existing dir
  425. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  426. assert.NoError(t, err)
  427. err = scpDownload(testBaseDirDownPath, remoteDownPath, true, true)
  428. assert.NoError(t, err)
  429. // test download without passing -r
  430. err = scpDownload(testBaseDirDownPath, remoteDownPath, true, false)
  431. assert.Error(t, err, "recursive download without -r must fail")
  432. fi, err := os.Stat(filepath.Join(testBaseDirDownPath, testFileName))
  433. if assert.NoError(t, err) {
  434. assert.Equal(t, testFileSize, fi.Size())
  435. }
  436. fi, err = os.Stat(filepath.Join(testBaseDirDownPath, testBaseDirName, testFileName))
  437. if assert.NoError(t, err) {
  438. assert.Equal(t, testFileSize, fi.Size())
  439. }
  440. // upload to a non existent dir
  441. remoteUpPath = fmt.Sprintf("%v@127.0.0.1:%v", user.Username, "/non_existent_dir")
  442. err = scpUpload(testBaseDirPath, remoteUpPath, true, false)
  443. assert.Error(t, err, "uploading via scp to a non existent dir must fail")
  444. err = os.RemoveAll(testBaseDirPath)
  445. assert.NoError(t, err)
  446. err = os.RemoveAll(testBaseDirDownPath)
  447. assert.NoError(t, err)
  448. err = os.RemoveAll(user.GetHomeDir())
  449. assert.NoError(t, err)
  450. _, err = httpd.RemoveUser(user, http.StatusOK)
  451. assert.NoError(t, err)
  452. }
  453. func getEncryptedFileSize(size int64) (int64, error) {
  454. encSize, err := sio.EncryptedSize(uint64(size))
  455. return int64(encSize) + 33, err
  456. }
  457. func getTestUserWithCryptFs(usePubKey bool) dataprovider.User {
  458. u := getTestUser(usePubKey)
  459. u.FsConfig.Provider = dataprovider.CryptedFilesystemProvider
  460. u.FsConfig.CryptConfig.Passphrase = kms.NewPlainSecret(testPassphrase)
  461. return u
  462. }