connection_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. package common
  2. import (
  3. "os"
  4. "path"
  5. "path/filepath"
  6. "runtime"
  7. "testing"
  8. "time"
  9. "github.com/pkg/sftp"
  10. "github.com/stretchr/testify/assert"
  11. "github.com/drakkan/sftpgo/v2/dataprovider"
  12. "github.com/drakkan/sftpgo/v2/sdk"
  13. "github.com/drakkan/sftpgo/v2/vfs"
  14. )
  15. // MockOsFs mockable OsFs
  16. type MockOsFs struct {
  17. vfs.Fs
  18. hasVirtualFolders bool
  19. }
  20. // Name returns the name for the Fs implementation
  21. func (fs MockOsFs) Name() string {
  22. return "mockOsFs"
  23. }
  24. // HasVirtualFolders returns true if folders are emulated
  25. func (fs MockOsFs) HasVirtualFolders() bool {
  26. return fs.hasVirtualFolders
  27. }
  28. func (fs MockOsFs) IsUploadResumeSupported() bool {
  29. return !fs.hasVirtualFolders
  30. }
  31. func newMockOsFs(hasVirtualFolders bool, connectionID, rootDir string) vfs.Fs {
  32. return &MockOsFs{
  33. Fs: vfs.NewOsFs(connectionID, rootDir, ""),
  34. hasVirtualFolders: hasVirtualFolders,
  35. }
  36. }
  37. func TestRemoveErrors(t *testing.T) {
  38. mappedPath := filepath.Join(os.TempDir(), "map")
  39. homePath := filepath.Join(os.TempDir(), "home")
  40. user := dataprovider.User{
  41. BaseUser: sdk.BaseUser{
  42. Username: "remove_errors_user",
  43. HomeDir: homePath,
  44. },
  45. VirtualFolders: []vfs.VirtualFolder{
  46. {
  47. BaseVirtualFolder: vfs.BaseVirtualFolder{
  48. Name: filepath.Base(mappedPath),
  49. MappedPath: mappedPath,
  50. },
  51. VirtualPath: "/virtualpath",
  52. },
  53. },
  54. }
  55. user.Permissions = make(map[string][]string)
  56. user.Permissions["/"] = []string{dataprovider.PermAny}
  57. fs := vfs.NewOsFs("", os.TempDir(), "")
  58. conn := NewBaseConnection("", ProtocolFTP, "", user)
  59. err := conn.IsRemoveDirAllowed(fs, mappedPath, "/virtualpath1")
  60. if assert.Error(t, err) {
  61. assert.Contains(t, err.Error(), "permission denied")
  62. }
  63. err = conn.RemoveFile(fs, filepath.Join(homePath, "missing_file"), "/missing_file",
  64. vfs.NewFileInfo("info", false, 100, time.Now(), false))
  65. assert.Error(t, err)
  66. }
  67. func TestSetStatMode(t *testing.T) {
  68. oldSetStatMode := Config.SetstatMode
  69. Config.SetstatMode = 1
  70. fakePath := "fake path"
  71. user := dataprovider.User{
  72. BaseUser: sdk.BaseUser{
  73. HomeDir: os.TempDir(),
  74. },
  75. }
  76. user.Permissions = make(map[string][]string)
  77. user.Permissions["/"] = []string{dataprovider.PermAny}
  78. fs := newMockOsFs(true, "", user.GetHomeDir())
  79. conn := NewBaseConnection("", ProtocolWebDAV, "", user)
  80. err := conn.handleChmod(fs, fakePath, fakePath, nil)
  81. assert.NoError(t, err)
  82. err = conn.handleChown(fs, fakePath, fakePath, nil)
  83. assert.NoError(t, err)
  84. err = conn.handleChtimes(fs, fakePath, fakePath, nil)
  85. assert.NoError(t, err)
  86. Config.SetstatMode = 2
  87. err = conn.handleChmod(fs, fakePath, fakePath, nil)
  88. assert.NoError(t, err)
  89. Config.SetstatMode = oldSetStatMode
  90. }
  91. func TestRecursiveRenameWalkError(t *testing.T) {
  92. fs := vfs.NewOsFs("", os.TempDir(), "")
  93. conn := NewBaseConnection("", ProtocolWebDAV, "", dataprovider.User{})
  94. err := conn.checkRecursiveRenameDirPermissions(fs, fs, "/source", "/target")
  95. assert.ErrorIs(t, err, os.ErrNotExist)
  96. }
  97. func TestCrossRenameFsErrors(t *testing.T) {
  98. fs := vfs.NewOsFs("", os.TempDir(), "")
  99. conn := NewBaseConnection("", ProtocolWebDAV, "", dataprovider.User{})
  100. res := conn.hasSpaceForCrossRename(fs, vfs.QuotaCheckResult{}, 1, "missingsource")
  101. assert.False(t, res)
  102. if runtime.GOOS != osWindows {
  103. dirPath := filepath.Join(os.TempDir(), "d")
  104. err := os.Mkdir(dirPath, os.ModePerm)
  105. assert.NoError(t, err)
  106. err = os.Chmod(dirPath, 0001)
  107. assert.NoError(t, err)
  108. res = conn.hasSpaceForCrossRename(fs, vfs.QuotaCheckResult{}, 1, dirPath)
  109. assert.False(t, res)
  110. err = os.Chmod(dirPath, os.ModePerm)
  111. assert.NoError(t, err)
  112. err = os.Remove(dirPath)
  113. assert.NoError(t, err)
  114. }
  115. }
  116. func TestRenameVirtualFolders(t *testing.T) {
  117. vdir := "/avdir"
  118. u := dataprovider.User{}
  119. u.VirtualFolders = append(u.VirtualFolders, vfs.VirtualFolder{
  120. BaseVirtualFolder: vfs.BaseVirtualFolder{
  121. Name: "name",
  122. MappedPath: "mappedPath",
  123. },
  124. VirtualPath: vdir,
  125. })
  126. fs := vfs.NewOsFs("", os.TempDir(), "")
  127. conn := NewBaseConnection("", ProtocolFTP, "", u)
  128. res := conn.isRenamePermitted(fs, fs, "source", "target", vdir, "vdirtarget", nil)
  129. assert.False(t, res)
  130. }
  131. func TestUpdateQuotaAfterRename(t *testing.T) {
  132. user := dataprovider.User{
  133. BaseUser: sdk.BaseUser{
  134. Username: userTestUsername,
  135. HomeDir: filepath.Join(os.TempDir(), "home"),
  136. },
  137. }
  138. mappedPath := filepath.Join(os.TempDir(), "vdir")
  139. user.Permissions = make(map[string][]string)
  140. user.Permissions["/"] = []string{dataprovider.PermAny}
  141. user.VirtualFolders = append(user.VirtualFolders, vfs.VirtualFolder{
  142. BaseVirtualFolder: vfs.BaseVirtualFolder{
  143. MappedPath: mappedPath,
  144. },
  145. VirtualPath: "/vdir",
  146. QuotaFiles: -1,
  147. QuotaSize: -1,
  148. })
  149. user.VirtualFolders = append(user.VirtualFolders, vfs.VirtualFolder{
  150. BaseVirtualFolder: vfs.BaseVirtualFolder{
  151. MappedPath: mappedPath,
  152. },
  153. VirtualPath: "/vdir1",
  154. QuotaFiles: -1,
  155. QuotaSize: -1,
  156. })
  157. err := os.MkdirAll(user.GetHomeDir(), os.ModePerm)
  158. assert.NoError(t, err)
  159. err = os.MkdirAll(mappedPath, os.ModePerm)
  160. assert.NoError(t, err)
  161. fs, err := user.GetFilesystem("id")
  162. assert.NoError(t, err)
  163. c := NewBaseConnection("", ProtocolSFTP, "", user)
  164. request := sftp.NewRequest("Rename", "/testfile")
  165. if runtime.GOOS != osWindows {
  166. request.Filepath = "/dir"
  167. request.Target = path.Join("/vdir", "dir")
  168. testDirPath := filepath.Join(mappedPath, "dir")
  169. err := os.MkdirAll(testDirPath, os.ModePerm)
  170. assert.NoError(t, err)
  171. err = os.Chmod(testDirPath, 0001)
  172. assert.NoError(t, err)
  173. err = c.updateQuotaAfterRename(fs, request.Filepath, request.Target, testDirPath, 0)
  174. assert.Error(t, err)
  175. err = os.Chmod(testDirPath, os.ModePerm)
  176. assert.NoError(t, err)
  177. }
  178. testFile1 := "/testfile1"
  179. request.Target = testFile1
  180. request.Filepath = path.Join("/vdir", "file")
  181. err = c.updateQuotaAfterRename(fs, request.Filepath, request.Target, filepath.Join(mappedPath, "file"), 0)
  182. assert.Error(t, err)
  183. err = os.WriteFile(filepath.Join(mappedPath, "file"), []byte("test content"), os.ModePerm)
  184. assert.NoError(t, err)
  185. request.Filepath = testFile1
  186. request.Target = path.Join("/vdir", "file")
  187. err = c.updateQuotaAfterRename(fs, request.Filepath, request.Target, filepath.Join(mappedPath, "file"), 12)
  188. assert.NoError(t, err)
  189. err = os.WriteFile(filepath.Join(user.GetHomeDir(), "testfile1"), []byte("test content"), os.ModePerm)
  190. assert.NoError(t, err)
  191. request.Target = testFile1
  192. request.Filepath = path.Join("/vdir", "file")
  193. err = c.updateQuotaAfterRename(fs, request.Filepath, request.Target, filepath.Join(mappedPath, "file"), 12)
  194. assert.NoError(t, err)
  195. request.Target = path.Join("/vdir1", "file")
  196. request.Filepath = path.Join("/vdir", "file")
  197. err = c.updateQuotaAfterRename(fs, request.Filepath, request.Target, filepath.Join(mappedPath, "file"), 12)
  198. assert.NoError(t, err)
  199. err = os.RemoveAll(mappedPath)
  200. assert.NoError(t, err)
  201. err = os.RemoveAll(user.GetHomeDir())
  202. assert.NoError(t, err)
  203. }
  204. func TestErrorsMapping(t *testing.T) {
  205. fs := vfs.NewOsFs("", os.TempDir(), "")
  206. conn := NewBaseConnection("", ProtocolSFTP, "", dataprovider.User{BaseUser: sdk.BaseUser{HomeDir: os.TempDir()}})
  207. for _, protocol := range supportedProtocols {
  208. conn.SetProtocol(protocol)
  209. err := conn.GetFsError(fs, os.ErrNotExist)
  210. if protocol == ProtocolSFTP {
  211. assert.EqualError(t, err, sftp.ErrSSHFxNoSuchFile.Error())
  212. } else if protocol == ProtocolWebDAV || protocol == ProtocolFTP || protocol == ProtocolHTTP {
  213. assert.EqualError(t, err, os.ErrNotExist.Error())
  214. } else {
  215. assert.EqualError(t, err, ErrNotExist.Error())
  216. }
  217. err = conn.GetFsError(fs, os.ErrPermission)
  218. if protocol == ProtocolSFTP {
  219. assert.EqualError(t, err, sftp.ErrSSHFxPermissionDenied.Error())
  220. } else {
  221. assert.EqualError(t, err, ErrPermissionDenied.Error())
  222. }
  223. err = conn.GetFsError(fs, os.ErrClosed)
  224. if protocol == ProtocolSFTP {
  225. assert.EqualError(t, err, sftp.ErrSSHFxFailure.Error())
  226. } else {
  227. assert.EqualError(t, err, ErrGenericFailure.Error())
  228. }
  229. err = conn.GetFsError(fs, ErrPermissionDenied)
  230. if protocol == ProtocolSFTP {
  231. assert.EqualError(t, err, sftp.ErrSSHFxFailure.Error())
  232. } else {
  233. assert.EqualError(t, err, ErrPermissionDenied.Error())
  234. }
  235. err = conn.GetFsError(fs, vfs.ErrVfsUnsupported)
  236. if protocol == ProtocolSFTP {
  237. assert.EqualError(t, err, sftp.ErrSSHFxOpUnsupported.Error())
  238. } else {
  239. assert.EqualError(t, err, ErrOpUnsupported.Error())
  240. }
  241. err = conn.GetFsError(fs, vfs.ErrStorageSizeUnavailable)
  242. if protocol == ProtocolSFTP {
  243. assert.EqualError(t, err, sftp.ErrSSHFxOpUnsupported.Error())
  244. } else {
  245. assert.EqualError(t, err, vfs.ErrStorageSizeUnavailable.Error())
  246. }
  247. err = conn.GetQuotaExceededError()
  248. assert.True(t, conn.IsQuotaExceededError(err))
  249. err = conn.GetFsError(fs, nil)
  250. assert.NoError(t, err)
  251. err = conn.GetOpUnsupportedError()
  252. if protocol == ProtocolSFTP {
  253. assert.EqualError(t, err, sftp.ErrSSHFxOpUnsupported.Error())
  254. } else {
  255. assert.EqualError(t, err, ErrOpUnsupported.Error())
  256. }
  257. }
  258. }
  259. func TestMaxWriteSize(t *testing.T) {
  260. permissions := make(map[string][]string)
  261. permissions["/"] = []string{dataprovider.PermAny}
  262. user := dataprovider.User{
  263. BaseUser: sdk.BaseUser{
  264. Username: userTestUsername,
  265. Permissions: permissions,
  266. HomeDir: filepath.Clean(os.TempDir()),
  267. },
  268. }
  269. fs, err := user.GetFilesystem("123")
  270. assert.NoError(t, err)
  271. conn := NewBaseConnection("", ProtocolFTP, "", user)
  272. quotaResult := vfs.QuotaCheckResult{
  273. HasSpace: true,
  274. }
  275. size, err := conn.GetMaxWriteSize(quotaResult, false, 0, fs.IsUploadResumeSupported())
  276. assert.NoError(t, err)
  277. assert.Equal(t, int64(0), size)
  278. conn.User.Filters.MaxUploadFileSize = 100
  279. size, err = conn.GetMaxWriteSize(quotaResult, false, 0, fs.IsUploadResumeSupported())
  280. assert.NoError(t, err)
  281. assert.Equal(t, int64(100), size)
  282. quotaResult.QuotaSize = 1000
  283. size, err = conn.GetMaxWriteSize(quotaResult, false, 50, fs.IsUploadResumeSupported())
  284. assert.NoError(t, err)
  285. assert.Equal(t, int64(100), size)
  286. quotaResult.QuotaSize = 1000
  287. quotaResult.UsedSize = 990
  288. size, err = conn.GetMaxWriteSize(quotaResult, false, 50, fs.IsUploadResumeSupported())
  289. assert.NoError(t, err)
  290. assert.Equal(t, int64(60), size)
  291. quotaResult.QuotaSize = 0
  292. quotaResult.UsedSize = 0
  293. size, err = conn.GetMaxWriteSize(quotaResult, true, 100, fs.IsUploadResumeSupported())
  294. assert.True(t, conn.IsQuotaExceededError(err))
  295. assert.Equal(t, int64(0), size)
  296. size, err = conn.GetMaxWriteSize(quotaResult, true, 10, fs.IsUploadResumeSupported())
  297. assert.NoError(t, err)
  298. assert.Equal(t, int64(90), size)
  299. fs = newMockOsFs(true, fs.ConnectionID(), user.GetHomeDir())
  300. size, err = conn.GetMaxWriteSize(quotaResult, true, 100, fs.IsUploadResumeSupported())
  301. assert.EqualError(t, err, ErrOpUnsupported.Error())
  302. assert.Equal(t, int64(0), size)
  303. }