config_test.go 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811
  1. package config_test
  2. import (
  3. "encoding/json"
  4. "os"
  5. "path/filepath"
  6. "strings"
  7. "testing"
  8. "github.com/spf13/viper"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "github.com/drakkan/sftpgo/v2/common"
  12. "github.com/drakkan/sftpgo/v2/config"
  13. "github.com/drakkan/sftpgo/v2/dataprovider"
  14. "github.com/drakkan/sftpgo/v2/ftpd"
  15. "github.com/drakkan/sftpgo/v2/httpclient"
  16. "github.com/drakkan/sftpgo/v2/httpd"
  17. "github.com/drakkan/sftpgo/v2/kms"
  18. "github.com/drakkan/sftpgo/v2/sftpd"
  19. "github.com/drakkan/sftpgo/v2/util"
  20. )
  21. const (
  22. tempConfigName = "temp"
  23. )
  24. func reset() {
  25. viper.Reset()
  26. config.Init()
  27. }
  28. func TestLoadConfigTest(t *testing.T) {
  29. reset()
  30. configDir := ".."
  31. err := config.LoadConfig(configDir, "")
  32. assert.NoError(t, err)
  33. assert.NotEqual(t, httpd.Conf{}, config.GetHTTPConfig())
  34. assert.NotEqual(t, dataprovider.Config{}, config.GetProviderConf())
  35. assert.NotEqual(t, sftpd.Configuration{}, config.GetSFTPDConfig())
  36. assert.NotEqual(t, httpclient.Config{}, config.GetHTTPConfig())
  37. confName := tempConfigName + ".json"
  38. configFilePath := filepath.Join(configDir, confName)
  39. err = config.LoadConfig(configDir, confName)
  40. assert.NoError(t, err)
  41. err = os.WriteFile(configFilePath, []byte("{invalid json}"), os.ModePerm)
  42. assert.NoError(t, err)
  43. err = config.LoadConfig(configDir, confName)
  44. assert.NoError(t, err)
  45. err = os.WriteFile(configFilePath, []byte(`{"sftpd": {"max_auth_tries": "a"}}`), os.ModePerm)
  46. assert.NoError(t, err)
  47. err = config.LoadConfig(configDir, confName)
  48. assert.Error(t, err)
  49. err = os.Remove(configFilePath)
  50. assert.NoError(t, err)
  51. }
  52. func TestLoadConfigFileNotFound(t *testing.T) {
  53. reset()
  54. viper.SetConfigName("configfile")
  55. err := config.LoadConfig(os.TempDir(), "")
  56. assert.NoError(t, err)
  57. }
  58. func TestEmptyBanner(t *testing.T) {
  59. reset()
  60. configDir := ".."
  61. confName := tempConfigName + ".json"
  62. configFilePath := filepath.Join(configDir, confName)
  63. err := config.LoadConfig(configDir, "")
  64. assert.NoError(t, err)
  65. sftpdConf := config.GetSFTPDConfig()
  66. sftpdConf.Banner = " "
  67. c := make(map[string]sftpd.Configuration)
  68. c["sftpd"] = sftpdConf
  69. jsonConf, _ := json.Marshal(c)
  70. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  71. assert.NoError(t, err)
  72. err = config.LoadConfig(configDir, confName)
  73. assert.NoError(t, err)
  74. sftpdConf = config.GetSFTPDConfig()
  75. assert.NotEmpty(t, strings.TrimSpace(sftpdConf.Banner))
  76. err = os.Remove(configFilePath)
  77. assert.NoError(t, err)
  78. ftpdConf := config.GetFTPDConfig()
  79. ftpdConf.Banner = " "
  80. c1 := make(map[string]ftpd.Configuration)
  81. c1["ftpd"] = ftpdConf
  82. jsonConf, _ = json.Marshal(c1)
  83. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  84. assert.NoError(t, err)
  85. err = config.LoadConfig(configDir, confName)
  86. assert.NoError(t, err)
  87. ftpdConf = config.GetFTPDConfig()
  88. assert.NotEmpty(t, strings.TrimSpace(ftpdConf.Banner))
  89. err = os.Remove(configFilePath)
  90. assert.NoError(t, err)
  91. }
  92. func TestInvalidUploadMode(t *testing.T) {
  93. reset()
  94. configDir := ".."
  95. confName := tempConfigName + ".json"
  96. configFilePath := filepath.Join(configDir, confName)
  97. err := config.LoadConfig(configDir, "")
  98. assert.NoError(t, err)
  99. commonConf := config.GetCommonConfig()
  100. commonConf.UploadMode = 10
  101. c := make(map[string]common.Configuration)
  102. c["common"] = commonConf
  103. jsonConf, err := json.Marshal(c)
  104. assert.NoError(t, err)
  105. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  106. assert.NoError(t, err)
  107. err = config.LoadConfig(configDir, confName)
  108. assert.NoError(t, err)
  109. assert.Equal(t, 0, config.GetCommonConfig().UploadMode)
  110. err = os.Remove(configFilePath)
  111. assert.NoError(t, err)
  112. }
  113. func TestInvalidExternalAuthScope(t *testing.T) {
  114. reset()
  115. configDir := ".."
  116. confName := tempConfigName + ".json"
  117. configFilePath := filepath.Join(configDir, confName)
  118. err := config.LoadConfig(configDir, "")
  119. assert.NoError(t, err)
  120. providerConf := config.GetProviderConf()
  121. providerConf.ExternalAuthScope = 100
  122. c := make(map[string]dataprovider.Config)
  123. c["data_provider"] = providerConf
  124. jsonConf, err := json.Marshal(c)
  125. assert.NoError(t, err)
  126. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  127. assert.NoError(t, err)
  128. err = config.LoadConfig(configDir, confName)
  129. assert.NoError(t, err)
  130. assert.Equal(t, 0, config.GetProviderConf().ExternalAuthScope)
  131. err = os.Remove(configFilePath)
  132. assert.NoError(t, err)
  133. }
  134. func TestInvalidCredentialsPath(t *testing.T) {
  135. reset()
  136. configDir := ".."
  137. confName := tempConfigName + ".json"
  138. configFilePath := filepath.Join(configDir, confName)
  139. err := config.LoadConfig(configDir, "")
  140. assert.NoError(t, err)
  141. providerConf := config.GetProviderConf()
  142. providerConf.CredentialsPath = ""
  143. c := make(map[string]dataprovider.Config)
  144. c["data_provider"] = providerConf
  145. jsonConf, err := json.Marshal(c)
  146. assert.NoError(t, err)
  147. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  148. assert.NoError(t, err)
  149. err = config.LoadConfig(configDir, confName)
  150. assert.NoError(t, err)
  151. assert.Equal(t, "credentials", config.GetProviderConf().CredentialsPath)
  152. err = os.Remove(configFilePath)
  153. assert.NoError(t, err)
  154. }
  155. func TestInvalidProxyProtocol(t *testing.T) {
  156. reset()
  157. configDir := ".."
  158. confName := tempConfigName + ".json"
  159. configFilePath := filepath.Join(configDir, confName)
  160. err := config.LoadConfig(configDir, "")
  161. assert.NoError(t, err)
  162. commonConf := config.GetCommonConfig()
  163. commonConf.ProxyProtocol = 10
  164. c := make(map[string]common.Configuration)
  165. c["common"] = commonConf
  166. jsonConf, err := json.Marshal(c)
  167. assert.NoError(t, err)
  168. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  169. assert.NoError(t, err)
  170. err = config.LoadConfig(configDir, confName)
  171. assert.NoError(t, err)
  172. assert.Equal(t, 0, config.GetCommonConfig().ProxyProtocol)
  173. err = os.Remove(configFilePath)
  174. assert.NoError(t, err)
  175. }
  176. func TestInvalidUsersBaseDir(t *testing.T) {
  177. reset()
  178. configDir := ".."
  179. confName := tempConfigName + ".json"
  180. configFilePath := filepath.Join(configDir, confName)
  181. err := config.LoadConfig(configDir, "")
  182. assert.NoError(t, err)
  183. providerConf := config.GetProviderConf()
  184. providerConf.UsersBaseDir = "."
  185. c := make(map[string]dataprovider.Config)
  186. c["data_provider"] = providerConf
  187. jsonConf, err := json.Marshal(c)
  188. assert.NoError(t, err)
  189. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  190. assert.NoError(t, err)
  191. err = config.LoadConfig(configDir, confName)
  192. assert.NoError(t, err)
  193. assert.Empty(t, config.GetProviderConf().UsersBaseDir)
  194. err = os.Remove(configFilePath)
  195. assert.NoError(t, err)
  196. }
  197. func TestSetGetConfig(t *testing.T) {
  198. reset()
  199. sftpdConf := config.GetSFTPDConfig()
  200. sftpdConf.MaxAuthTries = 10
  201. config.SetSFTPDConfig(sftpdConf)
  202. assert.Equal(t, sftpdConf.MaxAuthTries, config.GetSFTPDConfig().MaxAuthTries)
  203. dataProviderConf := config.GetProviderConf()
  204. dataProviderConf.Host = "test host"
  205. config.SetProviderConf(dataProviderConf)
  206. assert.Equal(t, dataProviderConf.Host, config.GetProviderConf().Host)
  207. httpdConf := config.GetHTTPDConfig()
  208. httpdConf.Bindings = append(httpdConf.Bindings, httpd.Binding{Address: "0.0.0.0"})
  209. config.SetHTTPDConfig(httpdConf)
  210. assert.Equal(t, httpdConf.Bindings[0].Address, config.GetHTTPDConfig().Bindings[0].Address)
  211. commonConf := config.GetCommonConfig()
  212. commonConf.IdleTimeout = 10
  213. config.SetCommonConfig(commonConf)
  214. assert.Equal(t, commonConf.IdleTimeout, config.GetCommonConfig().IdleTimeout)
  215. ftpdConf := config.GetFTPDConfig()
  216. ftpdConf.CertificateFile = "cert"
  217. ftpdConf.CertificateKeyFile = "key"
  218. config.SetFTPDConfig(ftpdConf)
  219. assert.Equal(t, ftpdConf.CertificateFile, config.GetFTPDConfig().CertificateFile)
  220. assert.Equal(t, ftpdConf.CertificateKeyFile, config.GetFTPDConfig().CertificateKeyFile)
  221. webDavConf := config.GetWebDAVDConfig()
  222. webDavConf.CertificateFile = "dav_cert"
  223. webDavConf.CertificateKeyFile = "dav_key"
  224. config.SetWebDAVDConfig(webDavConf)
  225. assert.Equal(t, webDavConf.CertificateFile, config.GetWebDAVDConfig().CertificateFile)
  226. assert.Equal(t, webDavConf.CertificateKeyFile, config.GetWebDAVDConfig().CertificateKeyFile)
  227. kmsConf := config.GetKMSConfig()
  228. kmsConf.Secrets.MasterKeyPath = "apath"
  229. kmsConf.Secrets.URL = "aurl"
  230. config.SetKMSConfig(kmsConf)
  231. assert.Equal(t, kmsConf.Secrets.MasterKeyPath, config.GetKMSConfig().Secrets.MasterKeyPath)
  232. assert.Equal(t, kmsConf.Secrets.URL, config.GetKMSConfig().Secrets.URL)
  233. telemetryConf := config.GetTelemetryConfig()
  234. telemetryConf.BindPort = 10001
  235. telemetryConf.BindAddress = "0.0.0.0"
  236. config.SetTelemetryConfig(telemetryConf)
  237. assert.Equal(t, telemetryConf.BindPort, config.GetTelemetryConfig().BindPort)
  238. assert.Equal(t, telemetryConf.BindAddress, config.GetTelemetryConfig().BindAddress)
  239. }
  240. func TestServiceToStart(t *testing.T) {
  241. reset()
  242. configDir := ".."
  243. err := config.LoadConfig(configDir, "")
  244. assert.NoError(t, err)
  245. assert.True(t, config.HasServicesToStart())
  246. sftpdConf := config.GetSFTPDConfig()
  247. sftpdConf.Bindings[0].Port = 0
  248. config.SetSFTPDConfig(sftpdConf)
  249. assert.False(t, config.HasServicesToStart())
  250. ftpdConf := config.GetFTPDConfig()
  251. ftpdConf.Bindings[0].Port = 2121
  252. config.SetFTPDConfig(ftpdConf)
  253. assert.True(t, config.HasServicesToStart())
  254. ftpdConf.Bindings[0].Port = 0
  255. config.SetFTPDConfig(ftpdConf)
  256. webdavdConf := config.GetWebDAVDConfig()
  257. webdavdConf.Bindings[0].Port = 9000
  258. config.SetWebDAVDConfig(webdavdConf)
  259. assert.True(t, config.HasServicesToStart())
  260. webdavdConf.Bindings[0].Port = 0
  261. config.SetWebDAVDConfig(webdavdConf)
  262. assert.False(t, config.HasServicesToStart())
  263. sftpdConf.Bindings[0].Port = 2022
  264. config.SetSFTPDConfig(sftpdConf)
  265. assert.True(t, config.HasServicesToStart())
  266. }
  267. func TestPluginsFromEnv(t *testing.T) {
  268. reset()
  269. os.Setenv("SFTPGO_PLUGINS__0__TYPE", "notifier")
  270. os.Setenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__FS_EVENTS", "upload,download")
  271. os.Setenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__USER_EVENTS", "add,update")
  272. os.Setenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__RETRY_MAX_TIME", "2")
  273. os.Setenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__RETRY_QUEUE_MAX_SIZE", "1000")
  274. os.Setenv("SFTPGO_PLUGINS__0__CMD", "plugin_start_cmd")
  275. os.Setenv("SFTPGO_PLUGINS__0__ARGS", "arg1,arg2")
  276. os.Setenv("SFTPGO_PLUGINS__0__SHA256SUM", "0a71ded61fccd59c4f3695b51c1b3d180da8d2d77ea09ccee20dac242675c193")
  277. os.Setenv("SFTPGO_PLUGINS__0__AUTO_MTLS", "1")
  278. os.Setenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__SCHEME", kms.SchemeAWS)
  279. os.Setenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__ENCRYPTED_STATUS", kms.SecretStatusAWS)
  280. t.Cleanup(func() {
  281. os.Unsetenv("SFTPGO_PLUGINS__0__TYPE")
  282. os.Unsetenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__FS_EVENTS")
  283. os.Unsetenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__USER_EVENTS")
  284. os.Unsetenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__RETRY_MAX_TIME")
  285. os.Unsetenv("SFTPGO_PLUGINS__0__NOTIFIER_OPTIONS__RETRY_QUEUE_MAX_SIZE")
  286. os.Unsetenv("SFTPGO_PLUGINS__0__CMD")
  287. os.Unsetenv("SFTPGO_PLUGINS__0__ARGS")
  288. os.Unsetenv("SFTPGO_PLUGINS__0__SHA256SUM")
  289. os.Unsetenv("SFTPGO_PLUGINS__0__AUTO_MTLS")
  290. os.Unsetenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__SCHEME")
  291. os.Unsetenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__ENCRYPTED_STATUS")
  292. })
  293. configDir := ".."
  294. err := config.LoadConfig(configDir, "")
  295. assert.NoError(t, err)
  296. pluginsConf := config.GetPluginsConfig()
  297. require.Len(t, pluginsConf, 1)
  298. pluginConf := pluginsConf[0]
  299. require.Equal(t, "notifier", pluginConf.Type)
  300. require.Len(t, pluginConf.NotifierOptions.FsEvents, 2)
  301. require.True(t, util.IsStringInSlice("upload", pluginConf.NotifierOptions.FsEvents))
  302. require.True(t, util.IsStringInSlice("download", pluginConf.NotifierOptions.FsEvents))
  303. require.Len(t, pluginConf.NotifierOptions.UserEvents, 2)
  304. require.Equal(t, "add", pluginConf.NotifierOptions.UserEvents[0])
  305. require.Equal(t, "update", pluginConf.NotifierOptions.UserEvents[1])
  306. require.Equal(t, 2, pluginConf.NotifierOptions.RetryMaxTime)
  307. require.Equal(t, 1000, pluginConf.NotifierOptions.RetryQueueMaxSize)
  308. require.Equal(t, "plugin_start_cmd", pluginConf.Cmd)
  309. require.Len(t, pluginConf.Args, 2)
  310. require.Equal(t, "arg1", pluginConf.Args[0])
  311. require.Equal(t, "arg2", pluginConf.Args[1])
  312. require.Equal(t, "0a71ded61fccd59c4f3695b51c1b3d180da8d2d77ea09ccee20dac242675c193", pluginConf.SHA256Sum)
  313. require.True(t, pluginConf.AutoMTLS)
  314. require.Equal(t, kms.SchemeAWS, pluginConf.KMSOptions.Scheme)
  315. require.Equal(t, kms.SecretStatusAWS, pluginConf.KMSOptions.EncryptedStatus)
  316. configAsJSON, err := json.Marshal(pluginsConf)
  317. require.NoError(t, err)
  318. confName := tempConfigName + ".json"
  319. configFilePath := filepath.Join(configDir, confName)
  320. err = os.WriteFile(configFilePath, configAsJSON, os.ModePerm)
  321. assert.NoError(t, err)
  322. os.Setenv("SFTPGO_PLUGINS__0__CMD", "plugin_start_cmd1")
  323. os.Setenv("SFTPGO_PLUGINS__0__ARGS", "")
  324. os.Setenv("SFTPGO_PLUGINS__0__AUTO_MTLS", "0")
  325. os.Setenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__SCHEME", kms.SchemeVaultTransit)
  326. os.Setenv("SFTPGO_PLUGINS__0__KMS_OPTIONS__ENCRYPTED_STATUS", kms.SecretStatusVaultTransit)
  327. err = config.LoadConfig(configDir, confName)
  328. assert.NoError(t, err)
  329. pluginsConf = config.GetPluginsConfig()
  330. require.Len(t, pluginsConf, 1)
  331. pluginConf = pluginsConf[0]
  332. require.Equal(t, "notifier", pluginConf.Type)
  333. require.Len(t, pluginConf.NotifierOptions.FsEvents, 2)
  334. require.True(t, util.IsStringInSlice("upload", pluginConf.NotifierOptions.FsEvents))
  335. require.True(t, util.IsStringInSlice("download", pluginConf.NotifierOptions.FsEvents))
  336. require.Len(t, pluginConf.NotifierOptions.UserEvents, 2)
  337. require.Equal(t, "add", pluginConf.NotifierOptions.UserEvents[0])
  338. require.Equal(t, "update", pluginConf.NotifierOptions.UserEvents[1])
  339. require.Equal(t, 2, pluginConf.NotifierOptions.RetryMaxTime)
  340. require.Equal(t, 1000, pluginConf.NotifierOptions.RetryQueueMaxSize)
  341. require.Equal(t, "plugin_start_cmd1", pluginConf.Cmd)
  342. require.Len(t, pluginConf.Args, 0)
  343. require.Equal(t, "0a71ded61fccd59c4f3695b51c1b3d180da8d2d77ea09ccee20dac242675c193", pluginConf.SHA256Sum)
  344. require.False(t, pluginConf.AutoMTLS)
  345. require.Equal(t, kms.SchemeVaultTransit, pluginConf.KMSOptions.Scheme)
  346. require.Equal(t, kms.SecretStatusVaultTransit, pluginConf.KMSOptions.EncryptedStatus)
  347. err = os.Remove(configFilePath)
  348. assert.NoError(t, err)
  349. }
  350. func TestRateLimitersFromEnv(t *testing.T) {
  351. reset()
  352. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__AVERAGE", "100")
  353. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__PERIOD", "2000")
  354. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__BURST", "10")
  355. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__TYPE", "2")
  356. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__PROTOCOLS", "SSH, FTP")
  357. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__GENERATE_DEFENDER_EVENTS", "1")
  358. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__ENTRIES_SOFT_LIMIT", "50")
  359. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__0__ENTRIES_HARD_LIMIT", "100")
  360. os.Setenv("SFTPGO_COMMON__RATE_LIMITERS__8__AVERAGE", "50")
  361. t.Cleanup(func() {
  362. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__AVERAGE")
  363. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__PERIOD")
  364. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__BURST")
  365. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__TYPE")
  366. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__PROTOCOLS")
  367. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__GENERATE_DEFENDER_EVENTS")
  368. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__ENTRIES_SOFT_LIMIT")
  369. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__0__ENTRIES_HARD_LIMIT")
  370. os.Unsetenv("SFTPGO_COMMON__RATE_LIMITERS__8__AVERAGE")
  371. })
  372. configDir := ".."
  373. err := config.LoadConfig(configDir, "")
  374. assert.NoError(t, err)
  375. limiters := config.GetCommonConfig().RateLimitersConfig
  376. require.Len(t, limiters, 2)
  377. require.Equal(t, int64(100), limiters[0].Average)
  378. require.Equal(t, int64(2000), limiters[0].Period)
  379. require.Equal(t, 10, limiters[0].Burst)
  380. require.Equal(t, 2, limiters[0].Type)
  381. protocols := limiters[0].Protocols
  382. require.Len(t, protocols, 2)
  383. require.True(t, util.IsStringInSlice(common.ProtocolFTP, protocols))
  384. require.True(t, util.IsStringInSlice(common.ProtocolSSH, protocols))
  385. require.True(t, limiters[0].GenerateDefenderEvents)
  386. require.Equal(t, 50, limiters[0].EntriesSoftLimit)
  387. require.Equal(t, 100, limiters[0].EntriesHardLimit)
  388. require.Equal(t, int64(50), limiters[1].Average)
  389. // we check the default values here
  390. require.Equal(t, int64(1000), limiters[1].Period)
  391. require.Equal(t, 1, limiters[1].Burst)
  392. require.Equal(t, 2, limiters[1].Type)
  393. protocols = limiters[1].Protocols
  394. require.Len(t, protocols, 4)
  395. require.True(t, util.IsStringInSlice(common.ProtocolFTP, protocols))
  396. require.True(t, util.IsStringInSlice(common.ProtocolSSH, protocols))
  397. require.True(t, util.IsStringInSlice(common.ProtocolWebDAV, protocols))
  398. require.True(t, util.IsStringInSlice(common.ProtocolHTTP, protocols))
  399. require.False(t, limiters[1].GenerateDefenderEvents)
  400. require.Equal(t, 100, limiters[1].EntriesSoftLimit)
  401. require.Equal(t, 150, limiters[1].EntriesHardLimit)
  402. }
  403. func TestSFTPDBindingsFromEnv(t *testing.T) {
  404. reset()
  405. os.Setenv("SFTPGO_SFTPD__BINDINGS__0__ADDRESS", "127.0.0.1")
  406. os.Setenv("SFTPGO_SFTPD__BINDINGS__0__PORT", "2200")
  407. os.Setenv("SFTPGO_SFTPD__BINDINGS__0__APPLY_PROXY_CONFIG", "false")
  408. os.Setenv("SFTPGO_SFTPD__BINDINGS__3__ADDRESS", "127.0.1.1")
  409. os.Setenv("SFTPGO_SFTPD__BINDINGS__3__PORT", "2203")
  410. t.Cleanup(func() {
  411. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__0__ADDRESS")
  412. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__0__PORT")
  413. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__0__APPLY_PROXY_CONFIG")
  414. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__3__ADDRESS")
  415. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__3__PORT")
  416. })
  417. configDir := ".."
  418. err := config.LoadConfig(configDir, "")
  419. assert.NoError(t, err)
  420. bindings := config.GetSFTPDConfig().Bindings
  421. require.Len(t, bindings, 2)
  422. require.Equal(t, 2200, bindings[0].Port)
  423. require.Equal(t, "127.0.0.1", bindings[0].Address)
  424. require.False(t, bindings[0].ApplyProxyConfig)
  425. require.Equal(t, 2203, bindings[1].Port)
  426. require.Equal(t, "127.0.1.1", bindings[1].Address)
  427. require.True(t, bindings[1].ApplyProxyConfig) // default value
  428. }
  429. func TestFTPDBindingsFromEnv(t *testing.T) {
  430. reset()
  431. os.Setenv("SFTPGO_FTPD__BINDINGS__0__ADDRESS", "127.0.0.1")
  432. os.Setenv("SFTPGO_FTPD__BINDINGS__0__PORT", "2200")
  433. os.Setenv("SFTPGO_FTPD__BINDINGS__0__APPLY_PROXY_CONFIG", "f")
  434. os.Setenv("SFTPGO_FTPD__BINDINGS__0__TLS_MODE", "2")
  435. os.Setenv("SFTPGO_FTPD__BINDINGS__0__FORCE_PASSIVE_IP", "127.0.1.2")
  436. os.Setenv("SFTPGO_FTPD__BINDINGS__0__TLS_CIPHER_SUITES", "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
  437. os.Setenv("SFTPGO_FTPD__BINDINGS__9__ADDRESS", "127.0.1.1")
  438. os.Setenv("SFTPGO_FTPD__BINDINGS__9__PORT", "2203")
  439. os.Setenv("SFTPGO_FTPD__BINDINGS__9__TLS_MODE", "1")
  440. os.Setenv("SFTPGO_FTPD__BINDINGS__9__FORCE_PASSIVE_IP", "127.0.1.1")
  441. os.Setenv("SFTPGO_FTPD__BINDINGS__9__CLIENT_AUTH_TYPE", "2")
  442. t.Cleanup(func() {
  443. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__ADDRESS")
  444. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__PORT")
  445. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__APPLY_PROXY_CONFIG")
  446. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__TLS_MODE")
  447. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__FORCE_PASSIVE_IP")
  448. os.Unsetenv("SFTPGO_FTPD__BINDINGS__0__TLS_CIPHER_SUITES")
  449. os.Unsetenv("SFTPGO_FTPD__BINDINGS__9__ADDRESS")
  450. os.Unsetenv("SFTPGO_FTPD__BINDINGS__9__PORT")
  451. os.Unsetenv("SFTPGO_FTPD__BINDINGS__9__TLS_MODE")
  452. os.Unsetenv("SFTPGO_FTPD__BINDINGS__9__FORCE_PASSIVE_IP")
  453. os.Unsetenv("SFTPGO_FTPD__BINDINGS__9__CLIENT_AUTH_TYPE")
  454. })
  455. configDir := ".."
  456. err := config.LoadConfig(configDir, "")
  457. assert.NoError(t, err)
  458. bindings := config.GetFTPDConfig().Bindings
  459. require.Len(t, bindings, 2)
  460. require.Equal(t, 2200, bindings[0].Port)
  461. require.Equal(t, "127.0.0.1", bindings[0].Address)
  462. require.False(t, bindings[0].ApplyProxyConfig)
  463. require.Equal(t, 2, bindings[0].TLSMode)
  464. require.Equal(t, "127.0.1.2", bindings[0].ForcePassiveIP)
  465. require.Equal(t, 0, bindings[0].ClientAuthType)
  466. require.Len(t, bindings[0].TLSCipherSuites, 2)
  467. require.Equal(t, "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256", bindings[0].TLSCipherSuites[0])
  468. require.Equal(t, "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", bindings[0].TLSCipherSuites[1])
  469. require.Equal(t, 2203, bindings[1].Port)
  470. require.Equal(t, "127.0.1.1", bindings[1].Address)
  471. require.True(t, bindings[1].ApplyProxyConfig) // default value
  472. require.Equal(t, 1, bindings[1].TLSMode)
  473. require.Equal(t, "127.0.1.1", bindings[1].ForcePassiveIP)
  474. require.Equal(t, 2, bindings[1].ClientAuthType)
  475. require.Nil(t, bindings[1].TLSCipherSuites)
  476. }
  477. func TestWebDAVBindingsFromEnv(t *testing.T) {
  478. reset()
  479. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__1__ADDRESS", "127.0.0.1")
  480. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__1__PORT", "8000")
  481. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__1__ENABLE_HTTPS", "0")
  482. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__1__TLS_CIPHER_SUITES", "TLS_RSA_WITH_AES_128_CBC_SHA ")
  483. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__1__PROXY_ALLOWED", "192.168.10.1")
  484. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__2__ADDRESS", "127.0.1.1")
  485. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__2__PORT", "9000")
  486. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__2__ENABLE_HTTPS", "1")
  487. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__2__CLIENT_AUTH_TYPE", "1")
  488. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__2__PREFIX", "/dav2")
  489. t.Cleanup(func() {
  490. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__1__ADDRESS")
  491. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__1__PORT")
  492. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__1__ENABLE_HTTPS")
  493. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__1__TLS_CIPHER_SUITES")
  494. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__1__PROXY_ALLOWED")
  495. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__2__ADDRESS")
  496. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__2__PORT")
  497. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__2__ENABLE_HTTPS")
  498. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__2__CLIENT_AUTH_TYPE")
  499. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__2__PREFIX")
  500. })
  501. configDir := ".."
  502. err := config.LoadConfig(configDir, "")
  503. assert.NoError(t, err)
  504. bindings := config.GetWebDAVDConfig().Bindings
  505. require.Len(t, bindings, 3)
  506. require.Equal(t, 0, bindings[0].Port)
  507. require.Empty(t, bindings[0].Address)
  508. require.False(t, bindings[0].EnableHTTPS)
  509. require.Len(t, bindings[0].TLSCipherSuites, 0)
  510. require.Empty(t, bindings[0].Prefix)
  511. require.Equal(t, 8000, bindings[1].Port)
  512. require.Equal(t, "127.0.0.1", bindings[1].Address)
  513. require.False(t, bindings[1].EnableHTTPS)
  514. require.Equal(t, 0, bindings[1].ClientAuthType)
  515. require.Len(t, bindings[1].TLSCipherSuites, 1)
  516. require.Equal(t, "TLS_RSA_WITH_AES_128_CBC_SHA", bindings[1].TLSCipherSuites[0])
  517. require.Equal(t, "192.168.10.1", bindings[1].ProxyAllowed[0])
  518. require.Empty(t, bindings[1].Prefix)
  519. require.Equal(t, 9000, bindings[2].Port)
  520. require.Equal(t, "127.0.1.1", bindings[2].Address)
  521. require.True(t, bindings[2].EnableHTTPS)
  522. require.Equal(t, 1, bindings[2].ClientAuthType)
  523. require.Nil(t, bindings[2].TLSCipherSuites)
  524. require.Equal(t, "/dav2", bindings[2].Prefix)
  525. }
  526. func TestHTTPDBindingsFromEnv(t *testing.T) {
  527. reset()
  528. sockPath := filepath.Clean(os.TempDir())
  529. os.Setenv("SFTPGO_HTTPD__BINDINGS__0__ADDRESS", sockPath)
  530. os.Setenv("SFTPGO_HTTPD__BINDINGS__0__PORT", "0")
  531. os.Setenv("SFTPGO_HTTPD__BINDINGS__0__TLS_CIPHER_SUITES", " TLS_AES_128_GCM_SHA256")
  532. os.Setenv("SFTPGO_HTTPD__BINDINGS__1__ADDRESS", "127.0.0.1")
  533. os.Setenv("SFTPGO_HTTPD__BINDINGS__1__PORT", "8000")
  534. os.Setenv("SFTPGO_HTTPD__BINDINGS__1__ENABLE_HTTPS", "0")
  535. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__ADDRESS", "127.0.1.1")
  536. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__PORT", "9000")
  537. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_WEB_ADMIN", "0")
  538. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_WEB_CLIENT", "0")
  539. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_HTTPS", "1")
  540. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__CLIENT_AUTH_TYPE", "1")
  541. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__TLS_CIPHER_SUITES", " TLS_AES_256_GCM_SHA384 , TLS_CHACHA20_POLY1305_SHA256")
  542. os.Setenv("SFTPGO_HTTPD__BINDINGS__2__PROXY_ALLOWED", " 192.168.9.1 , 172.16.25.0/24")
  543. t.Cleanup(func() {
  544. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__0__ADDRESS")
  545. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__0__PORT")
  546. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__0__TLS_CIPHER_SUITES")
  547. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__1__ADDRESS")
  548. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__1__PORT")
  549. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__1__ENABLE_HTTPS")
  550. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__ADDRESS")
  551. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__PORT")
  552. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_HTTPS")
  553. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_WEB_ADMIN")
  554. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__ENABLE_WEB_CLIENT")
  555. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__CLIENT_AUTH_TYPE")
  556. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__TLS_CIPHER_SUITES")
  557. os.Unsetenv("SFTPGO_HTTPD__BINDINGS__2__PROXY_ALLOWED")
  558. })
  559. configDir := ".."
  560. err := config.LoadConfig(configDir, "")
  561. assert.NoError(t, err)
  562. bindings := config.GetHTTPDConfig().Bindings
  563. require.Len(t, bindings, 3)
  564. require.Equal(t, 0, bindings[0].Port)
  565. require.Equal(t, sockPath, bindings[0].Address)
  566. require.False(t, bindings[0].EnableHTTPS)
  567. require.True(t, bindings[0].EnableWebAdmin)
  568. require.True(t, bindings[0].EnableWebClient)
  569. require.Len(t, bindings[0].TLSCipherSuites, 1)
  570. require.Equal(t, "TLS_AES_128_GCM_SHA256", bindings[0].TLSCipherSuites[0])
  571. require.Equal(t, 8000, bindings[1].Port)
  572. require.Equal(t, "127.0.0.1", bindings[1].Address)
  573. require.False(t, bindings[1].EnableHTTPS)
  574. require.True(t, bindings[1].EnableWebAdmin)
  575. require.True(t, bindings[1].EnableWebClient)
  576. require.Nil(t, bindings[1].TLSCipherSuites)
  577. require.Equal(t, 9000, bindings[2].Port)
  578. require.Equal(t, "127.0.1.1", bindings[2].Address)
  579. require.True(t, bindings[2].EnableHTTPS)
  580. require.False(t, bindings[2].EnableWebAdmin)
  581. require.False(t, bindings[2].EnableWebClient)
  582. require.Equal(t, 1, bindings[2].ClientAuthType)
  583. require.Len(t, bindings[2].TLSCipherSuites, 2)
  584. require.Equal(t, "TLS_AES_256_GCM_SHA384", bindings[2].TLSCipherSuites[0])
  585. require.Equal(t, "TLS_CHACHA20_POLY1305_SHA256", bindings[2].TLSCipherSuites[1])
  586. require.Len(t, bindings[2].ProxyAllowed, 2)
  587. require.Equal(t, "192.168.9.1", bindings[2].ProxyAllowed[0])
  588. require.Equal(t, "172.16.25.0/24", bindings[2].ProxyAllowed[1])
  589. }
  590. func TestHTTPClientCertificatesFromEnv(t *testing.T) {
  591. reset()
  592. configDir := ".."
  593. confName := tempConfigName + ".json"
  594. configFilePath := filepath.Join(configDir, confName)
  595. err := config.LoadConfig(configDir, "")
  596. assert.NoError(t, err)
  597. httpConf := config.GetHTTPConfig()
  598. httpConf.Certificates = append(httpConf.Certificates, httpclient.TLSKeyPair{
  599. Cert: "cert",
  600. Key: "key",
  601. })
  602. c := make(map[string]httpclient.Config)
  603. c["http"] = httpConf
  604. jsonConf, err := json.Marshal(c)
  605. require.NoError(t, err)
  606. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  607. require.NoError(t, err)
  608. err = config.LoadConfig(configDir, confName)
  609. require.NoError(t, err)
  610. require.Len(t, config.GetHTTPConfig().Certificates, 1)
  611. require.Equal(t, "cert", config.GetHTTPConfig().Certificates[0].Cert)
  612. require.Equal(t, "key", config.GetHTTPConfig().Certificates[0].Key)
  613. os.Setenv("SFTPGO_HTTP__CERTIFICATES__0__CERT", "cert0")
  614. os.Setenv("SFTPGO_HTTP__CERTIFICATES__0__KEY", "key0")
  615. os.Setenv("SFTPGO_HTTP__CERTIFICATES__8__CERT", "cert8")
  616. os.Setenv("SFTPGO_HTTP__CERTIFICATES__9__CERT", "cert9")
  617. os.Setenv("SFTPGO_HTTP__CERTIFICATES__9__KEY", "key9")
  618. t.Cleanup(func() {
  619. os.Unsetenv("SFTPGO_HTTP__CERTIFICATES__0__CERT")
  620. os.Unsetenv("SFTPGO_HTTP__CERTIFICATES__0__KEY")
  621. os.Unsetenv("SFTPGO_HTTP__CERTIFICATES__8__CERT")
  622. os.Unsetenv("SFTPGO_HTTP__CERTIFICATES__9__CERT")
  623. os.Unsetenv("SFTPGO_HTTP__CERTIFICATES__9__KEY")
  624. })
  625. err = config.LoadConfig(configDir, confName)
  626. require.NoError(t, err)
  627. require.Len(t, config.GetHTTPConfig().Certificates, 2)
  628. require.Equal(t, "cert0", config.GetHTTPConfig().Certificates[0].Cert)
  629. require.Equal(t, "key0", config.GetHTTPConfig().Certificates[0].Key)
  630. require.Equal(t, "cert9", config.GetHTTPConfig().Certificates[1].Cert)
  631. require.Equal(t, "key9", config.GetHTTPConfig().Certificates[1].Key)
  632. err = os.Remove(configFilePath)
  633. assert.NoError(t, err)
  634. config.Init()
  635. err = config.LoadConfig(configDir, "")
  636. require.NoError(t, err)
  637. require.Len(t, config.GetHTTPConfig().Certificates, 2)
  638. require.Equal(t, "cert0", config.GetHTTPConfig().Certificates[0].Cert)
  639. require.Equal(t, "key0", config.GetHTTPConfig().Certificates[0].Key)
  640. require.Equal(t, "cert9", config.GetHTTPConfig().Certificates[1].Cert)
  641. require.Equal(t, "key9", config.GetHTTPConfig().Certificates[1].Key)
  642. }
  643. func TestHTTPClientHeadersFromEnv(t *testing.T) {
  644. reset()
  645. configDir := ".."
  646. confName := tempConfigName + ".json"
  647. configFilePath := filepath.Join(configDir, confName)
  648. err := config.LoadConfig(configDir, "")
  649. assert.NoError(t, err)
  650. httpConf := config.GetHTTPConfig()
  651. httpConf.Headers = append(httpConf.Headers, httpclient.Header{
  652. Key: "key",
  653. Value: "value",
  654. URL: "url",
  655. })
  656. c := make(map[string]httpclient.Config)
  657. c["http"] = httpConf
  658. jsonConf, err := json.Marshal(c)
  659. require.NoError(t, err)
  660. err = os.WriteFile(configFilePath, jsonConf, os.ModePerm)
  661. require.NoError(t, err)
  662. err = config.LoadConfig(configDir, confName)
  663. require.NoError(t, err)
  664. require.Len(t, config.GetHTTPConfig().Headers, 1)
  665. require.Equal(t, "key", config.GetHTTPConfig().Headers[0].Key)
  666. require.Equal(t, "value", config.GetHTTPConfig().Headers[0].Value)
  667. require.Equal(t, "url", config.GetHTTPConfig().Headers[0].URL)
  668. os.Setenv("SFTPGO_HTTP__HEADERS__0__KEY", "key0")
  669. os.Setenv("SFTPGO_HTTP__HEADERS__0__VALUE", "value0")
  670. os.Setenv("SFTPGO_HTTP__HEADERS__0__URL", "url0")
  671. os.Setenv("SFTPGO_HTTP__HEADERS__8__KEY", "key8")
  672. os.Setenv("SFTPGO_HTTP__HEADERS__9__KEY", "key9")
  673. os.Setenv("SFTPGO_HTTP__HEADERS__9__VALUE", "value9")
  674. os.Setenv("SFTPGO_HTTP__HEADERS__9__URL", "url9")
  675. t.Cleanup(func() {
  676. os.Unsetenv("SFTPGO_HTTP__HEADERS__0__KEY")
  677. os.Unsetenv("SFTPGO_HTTP__HEADERS__0__VALUE")
  678. os.Unsetenv("SFTPGO_HTTP__HEADERS__0__URL")
  679. os.Unsetenv("SFTPGO_HTTP__HEADERS__8__KEY")
  680. os.Unsetenv("SFTPGO_HTTP__HEADERS__9__KEY")
  681. os.Unsetenv("SFTPGO_HTTP__HEADERS__9__VALUE")
  682. os.Unsetenv("SFTPGO_HTTP__HEADERS__9__URL")
  683. })
  684. err = config.LoadConfig(configDir, confName)
  685. require.NoError(t, err)
  686. require.Len(t, config.GetHTTPConfig().Headers, 2)
  687. require.Equal(t, "key0", config.GetHTTPConfig().Headers[0].Key)
  688. require.Equal(t, "value0", config.GetHTTPConfig().Headers[0].Value)
  689. require.Equal(t, "url0", config.GetHTTPConfig().Headers[0].URL)
  690. require.Equal(t, "key9", config.GetHTTPConfig().Headers[1].Key)
  691. require.Equal(t, "value9", config.GetHTTPConfig().Headers[1].Value)
  692. require.Equal(t, "url9", config.GetHTTPConfig().Headers[1].URL)
  693. err = os.Remove(configFilePath)
  694. assert.NoError(t, err)
  695. config.Init()
  696. err = config.LoadConfig(configDir, "")
  697. require.NoError(t, err)
  698. require.Len(t, config.GetHTTPConfig().Headers, 2)
  699. require.Equal(t, "key0", config.GetHTTPConfig().Headers[0].Key)
  700. require.Equal(t, "value0", config.GetHTTPConfig().Headers[0].Value)
  701. require.Equal(t, "url0", config.GetHTTPConfig().Headers[0].URL)
  702. require.Equal(t, "key9", config.GetHTTPConfig().Headers[1].Key)
  703. require.Equal(t, "value9", config.GetHTTPConfig().Headers[1].Value)
  704. require.Equal(t, "url9", config.GetHTTPConfig().Headers[1].URL)
  705. }
  706. func TestConfigFromEnv(t *testing.T) {
  707. reset()
  708. os.Setenv("SFTPGO_SFTPD__BINDINGS__0__ADDRESS", "127.0.0.1")
  709. os.Setenv("SFTPGO_WEBDAVD__BINDINGS__0__PORT", "12000")
  710. os.Setenv("SFTPGO_DATA_PROVIDER__PASSWORD_HASHING__ARGON2_OPTIONS__ITERATIONS", "41")
  711. os.Setenv("SFTPGO_DATA_PROVIDER__POOL_SIZE", "10")
  712. os.Setenv("SFTPGO_DATA_PROVIDER__ACTIONS__EXECUTE_ON", "add")
  713. os.Setenv("SFTPGO_KMS__SECRETS__URL", "local")
  714. os.Setenv("SFTPGO_KMS__SECRETS__MASTER_KEY_PATH", "path")
  715. os.Setenv("SFTPGO_TELEMETRY__TLS_CIPHER_SUITES", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA")
  716. t.Cleanup(func() {
  717. os.Unsetenv("SFTPGO_SFTPD__BINDINGS__0__ADDRESS")
  718. os.Unsetenv("SFTPGO_WEBDAVD__BINDINGS__0__PORT")
  719. os.Unsetenv("SFTPGO_DATA_PROVIDER__PASSWORD_HASHING__ARGON2_OPTIONS__ITERATIONS")
  720. os.Unsetenv("SFTPGO_DATA_PROVIDER__POOL_SIZE")
  721. os.Unsetenv("SFTPGO_DATA_PROVIDER__ACTIONS__EXECUTE_ON")
  722. os.Unsetenv("SFTPGO_KMS__SECRETS__URL")
  723. os.Unsetenv("SFTPGO_KMS__SECRETS__MASTER_KEY_PATH")
  724. os.Unsetenv("SFTPGO_TELEMETRY__TLS_CIPHER_SUITES")
  725. })
  726. err := config.LoadConfig(".", "invalid config")
  727. assert.NoError(t, err)
  728. sftpdConfig := config.GetSFTPDConfig()
  729. assert.Equal(t, "127.0.0.1", sftpdConfig.Bindings[0].Address)
  730. assert.Equal(t, 12000, config.GetWebDAVDConfig().Bindings[0].Port)
  731. dataProviderConf := config.GetProviderConf()
  732. assert.Equal(t, uint32(41), dataProviderConf.PasswordHashing.Argon2Options.Iterations)
  733. assert.Equal(t, 10, dataProviderConf.PoolSize)
  734. assert.Len(t, dataProviderConf.Actions.ExecuteOn, 1)
  735. assert.Contains(t, dataProviderConf.Actions.ExecuteOn, "add")
  736. kmsConfig := config.GetKMSConfig()
  737. assert.Equal(t, "local", kmsConfig.Secrets.URL)
  738. assert.Equal(t, "path", kmsConfig.Secrets.MasterKeyPath)
  739. telemetryConfig := config.GetTelemetryConfig()
  740. assert.Len(t, telemetryConfig.TLSCipherSuites, 2)
  741. assert.Equal(t, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", telemetryConfig.TLSCipherSuites[0])
  742. assert.Equal(t, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", telemetryConfig.TLSCipherSuites[1])
  743. }