2016-01-03 20:56:19 +00:00
|
|
|
// Copyright (C) 2016 The Syncthing Authors.
|
|
|
|
//
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
2017-02-09 06:52:18 +00:00
|
|
|
// You can obtain one at https://mozilla.org/MPL/2.0/.
|
2016-01-03 20:56:19 +00:00
|
|
|
|
2019-03-26 19:53:58 +00:00
|
|
|
package api
|
2016-01-03 20:56:19 +00:00
|
|
|
|
2016-01-14 10:06:36 +00:00
|
|
|
import (
|
2016-03-12 12:17:25 +00:00
|
|
|
"bytes"
|
|
|
|
"compress/gzip"
|
2020-11-17 12:19:04 +00:00
|
|
|
"context"
|
2016-05-26 07:25:34 +00:00
|
|
|
"encoding/json"
|
2016-03-24 08:55:33 +00:00
|
|
|
"fmt"
|
2016-07-02 19:38:39 +00:00
|
|
|
"io"
|
2016-03-24 08:55:33 +00:00
|
|
|
"net"
|
2016-03-12 12:17:25 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2017-12-13 09:34:47 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2024-02-10 20:02:42 +00:00
|
|
|
"slices"
|
2016-09-03 08:33:34 +00:00
|
|
|
"strconv"
|
2016-03-24 08:55:33 +00:00
|
|
|
"strings"
|
2016-01-14 10:06:36 +00:00
|
|
|
"testing"
|
2016-03-24 08:55:33 +00:00
|
|
|
"time"
|
2016-01-14 10:06:36 +00:00
|
|
|
|
2016-03-12 12:17:25 +00:00
|
|
|
"github.com/d4l3k/messagediff"
|
2020-05-25 06:51:27 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/assets"
|
2022-07-28 17:36:39 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/build"
|
2016-01-14 10:06:36 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/config"
|
2021-03-03 07:53:50 +00:00
|
|
|
connmocks "github.com/syncthing/syncthing/lib/connections/mocks"
|
2024-01-04 10:07:12 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/db"
|
|
|
|
"github.com/syncthing/syncthing/lib/db/backend"
|
2021-03-03 07:53:50 +00:00
|
|
|
discovermocks "github.com/syncthing/syncthing/lib/discover/mocks"
|
2017-04-13 17:14:34 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/events"
|
2021-03-03 07:53:50 +00:00
|
|
|
eventmocks "github.com/syncthing/syncthing/lib/events/mocks"
|
2017-12-13 09:34:47 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/fs"
|
2019-03-26 19:53:58 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/locations"
|
2021-03-03 07:53:50 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/logger"
|
|
|
|
loggermocks "github.com/syncthing/syncthing/lib/logger/mocks"
|
2022-04-05 19:32:06 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/model"
|
2021-03-03 07:53:50 +00:00
|
|
|
modelmocks "github.com/syncthing/syncthing/lib/model/mocks"
|
2016-01-14 10:06:36 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/protocol"
|
2023-05-03 08:25:36 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/rand"
|
2020-12-22 19:17:14 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/svcutil"
|
2016-03-12 12:17:25 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/sync"
|
2019-10-16 18:31:46 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/tlsutil"
|
2019-03-26 19:53:58 +00:00
|
|
|
"github.com/syncthing/syncthing/lib/ur"
|
2020-11-17 12:19:04 +00:00
|
|
|
"github.com/thejerf/suture/v4"
|
2016-01-14 10:06:36 +00:00
|
|
|
)
|
2016-01-03 20:56:19 +00:00
|
|
|
|
2019-05-11 06:41:32 +00:00
|
|
|
var (
|
2021-03-03 07:53:50 +00:00
|
|
|
confDir = filepath.Join("testdata", "config")
|
|
|
|
dev1 protocol.DeviceID
|
|
|
|
apiCfg = newMockedConfig()
|
|
|
|
testAPIKey = "foobarbaz"
|
2019-05-11 06:41:32 +00:00
|
|
|
)
|
|
|
|
|
2020-10-22 17:54:35 +00:00
|
|
|
func init() {
|
|
|
|
dev1, _ = protocol.DeviceIDFromString("AIR6LPZ-7K4PTTV-UXQSMUU-CPQ5YWH-OEDFIIQ-JUG777G-2YQXXR5-YD6AWQR")
|
2023-07-29 08:24:44 +00:00
|
|
|
apiCfg.GUIReturns(config.GUIConfiguration{APIKey: testAPIKey, RawAddress: "127.0.0.1:0"})
|
2020-10-22 17:54:35 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 19:53:58 +00:00
|
|
|
func TestMain(m *testing.M) {
|
|
|
|
orig := locations.GetBaseDir(locations.ConfigBaseDir)
|
2019-05-11 06:41:32 +00:00
|
|
|
locations.SetBaseDir(locations.ConfigBaseDir, confDir)
|
2019-03-26 19:53:58 +00:00
|
|
|
|
|
|
|
exitCode := m.Run()
|
|
|
|
|
|
|
|
locations.SetBaseDir(locations.ConfigBaseDir, orig)
|
|
|
|
|
|
|
|
os.Exit(exitCode)
|
|
|
|
}
|
|
|
|
|
2016-01-14 10:06:36 +00:00
|
|
|
func TestStopAfterBrokenConfig(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-01-14 10:06:36 +00:00
|
|
|
cfg := config.Configuration{
|
|
|
|
GUI: config.GUIConfiguration{
|
|
|
|
RawAddress: "127.0.0.1:0",
|
|
|
|
RawUseTLS: false,
|
|
|
|
},
|
|
|
|
}
|
2020-11-20 13:21:54 +00:00
|
|
|
w := config.Wrap("/dev/null", cfg, protocol.LocalDeviceID, events.NoopLogger)
|
2016-01-14 10:06:36 +00:00
|
|
|
|
2024-01-04 10:07:12 +00:00
|
|
|
mdb, _ := db.NewLowlevel(backend.OpenMemory(), events.NoopLogger)
|
|
|
|
kdb := db.NewMiscDataNamespace(mdb)
|
|
|
|
srv := New(protocol.LocalDeviceID, w, "", "syncthing", nil, nil, nil, events.NoopLogger, nil, nil, nil, nil, nil, nil, false, kdb).(*service)
|
2021-04-26 20:13:59 +00:00
|
|
|
|
2016-06-06 22:12:23 +00:00
|
|
|
srv.started = make(chan string)
|
2016-01-14 10:06:36 +00:00
|
|
|
|
2020-12-22 19:17:14 +00:00
|
|
|
sup := suture.New("test", svcutil.SpecWithDebugLogger(l))
|
2016-01-14 10:06:36 +00:00
|
|
|
sup.Add(srv)
|
2020-11-17 12:19:04 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
sup.ServeBackground(ctx)
|
2016-01-14 10:06:36 +00:00
|
|
|
|
|
|
|
<-srv.started
|
|
|
|
|
|
|
|
// Service is now running, listening on a random port on localhost. Now we
|
|
|
|
// request a config change to a completely invalid listen address. The
|
|
|
|
// commit will fail and the service will be in a broken state.
|
|
|
|
|
|
|
|
newCfg := config.Configuration{
|
|
|
|
GUI: config.GUIConfiguration{
|
|
|
|
RawAddress: "totally not a valid address",
|
|
|
|
RawUseTLS: false,
|
|
|
|
},
|
|
|
|
}
|
2016-06-06 22:12:23 +00:00
|
|
|
if err := srv.VerifyConfiguration(cfg, newCfg); err == nil {
|
|
|
|
t.Fatal("Verify config should have failed")
|
2016-01-14 10:06:36 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 12:19:04 +00:00
|
|
|
cancel()
|
2016-01-14 10:06:36 +00:00
|
|
|
}
|
2016-03-12 12:17:25 +00:00
|
|
|
|
|
|
|
func TestAssetsDir(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-03-12 12:17:25 +00:00
|
|
|
// For any given request to $FILE, we should return the first found of
|
|
|
|
// - assetsdir/$THEME/$FILE
|
|
|
|
// - compiled in asset $THEME/$FILE
|
|
|
|
// - assetsdir/default/$FILE
|
|
|
|
// - compiled in asset default/$FILE
|
|
|
|
|
|
|
|
// The asset map contains compressed assets, so create a couple of gzip compressed assets here.
|
|
|
|
buf := new(bytes.Buffer)
|
|
|
|
gw := gzip.NewWriter(buf)
|
2019-02-02 11:16:27 +00:00
|
|
|
gw.Write([]byte("default"))
|
2016-03-12 12:17:25 +00:00
|
|
|
gw.Close()
|
2020-05-25 06:51:27 +00:00
|
|
|
def := assets.Asset{
|
|
|
|
Content: buf.String(),
|
|
|
|
Gzipped: true,
|
|
|
|
}
|
2016-03-12 12:17:25 +00:00
|
|
|
|
|
|
|
buf = new(bytes.Buffer)
|
|
|
|
gw = gzip.NewWriter(buf)
|
2019-02-02 11:16:27 +00:00
|
|
|
gw.Write([]byte("foo"))
|
2016-03-12 12:17:25 +00:00
|
|
|
gw.Close()
|
2020-05-25 06:51:27 +00:00
|
|
|
foo := assets.Asset{
|
|
|
|
Content: buf.String(),
|
|
|
|
Gzipped: true,
|
|
|
|
}
|
2016-03-12 12:17:25 +00:00
|
|
|
|
2016-06-07 07:46:45 +00:00
|
|
|
e := &staticsServer{
|
2016-03-12 12:17:25 +00:00
|
|
|
theme: "foo",
|
|
|
|
mut: sync.NewRWMutex(),
|
|
|
|
assetDir: "testdata",
|
2020-05-25 06:51:27 +00:00
|
|
|
assets: map[string]assets.Asset{
|
2016-03-12 12:17:25 +00:00
|
|
|
"foo/a": foo, // overridden in foo/a
|
|
|
|
"foo/b": foo,
|
|
|
|
"default/a": def, // overridden in default/a (but foo/a takes precedence)
|
|
|
|
"default/b": def, // overridden in default/b (but foo/b takes precedence)
|
|
|
|
"default/c": def,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
s := httptest.NewServer(e)
|
|
|
|
defer s.Close()
|
|
|
|
|
|
|
|
// assetsdir/foo/a exists, overrides compiled in
|
|
|
|
expectURLToContain(t, s.URL+"/a", "overridden-foo")
|
|
|
|
|
2016-05-08 10:54:22 +00:00
|
|
|
// foo/b is compiled in, default/b is overridden, return compiled in
|
2016-03-12 12:17:25 +00:00
|
|
|
expectURLToContain(t, s.URL+"/b", "foo")
|
|
|
|
|
|
|
|
// only exists as compiled in default/c so use that
|
|
|
|
expectURLToContain(t, s.URL+"/c", "default")
|
|
|
|
|
2016-05-08 10:54:22 +00:00
|
|
|
// only exists as overridden default/d so use that
|
2016-03-12 12:17:25 +00:00
|
|
|
expectURLToContain(t, s.URL+"/d", "overridden-default")
|
|
|
|
}
|
|
|
|
|
|
|
|
func expectURLToContain(t *testing.T, url, exp string) {
|
|
|
|
res, err := http.Get(url)
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if res.StatusCode != 200 {
|
|
|
|
t.Errorf("Got %s instead of 200 OK", res.Status)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-11-22 07:59:47 +00:00
|
|
|
data, err := io.ReadAll(res.Body)
|
2016-03-12 12:17:25 +00:00
|
|
|
res.Body.Close()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(data) != exp {
|
|
|
|
t.Errorf("Got %q instead of %q on %q", data, exp, url)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDirNames(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-03-12 12:17:25 +00:00
|
|
|
names := dirNames("testdata")
|
2019-03-26 19:53:58 +00:00
|
|
|
expected := []string{"config", "default", "foo", "testfolder"}
|
2016-03-12 12:17:25 +00:00
|
|
|
if diff, equal := messagediff.PrettyDiff(expected, names); !equal {
|
|
|
|
t.Errorf("Unexpected dirNames return: %#v\n%s", names, diff)
|
|
|
|
}
|
|
|
|
}
|
2016-03-24 08:09:13 +00:00
|
|
|
|
2016-03-24 10:17:04 +00:00
|
|
|
type httpTestCase struct {
|
|
|
|
URL string // URL to check
|
|
|
|
Code int // Expected result code
|
|
|
|
Type string // Expected content type
|
|
|
|
Prefix string // Expected result prefix
|
|
|
|
Timeout time.Duration // Defaults to a second
|
|
|
|
}
|
|
|
|
|
2016-03-24 08:55:33 +00:00
|
|
|
func TestAPIServiceRequests(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-03-24 08:09:13 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-04-05 19:32:06 +00:00
|
|
|
t.Cleanup(cancel)
|
2016-03-24 08:55:33 +00:00
|
|
|
|
2016-03-24 10:17:04 +00:00
|
|
|
cases := []httpTestCase{
|
|
|
|
// /rest/db
|
|
|
|
{
|
2024-02-11 08:20:29 +00:00
|
|
|
URL: "/rest/db/completion?device=" + protocol.LocalDeviceID.String() + "&folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
Timeout: 15 * time.Second,
|
2016-03-24 10:17:04 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/db/file?folder=default&file=something",
|
|
|
|
Code: 404,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/db/ignores?folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/db/need?folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/db/status?folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/db/browse?folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "null",
|
|
|
|
},
|
2022-04-05 19:32:06 +00:00
|
|
|
{
|
|
|
|
URL: "/rest/db/status?folder=default",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
2016-03-24 10:17:04 +00:00
|
|
|
|
|
|
|
// /rest/stats
|
|
|
|
{
|
|
|
|
URL: "/rest/stats/device",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "null",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/stats/folder",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "null",
|
|
|
|
},
|
|
|
|
|
|
|
|
// /rest/svc
|
|
|
|
{
|
|
|
|
URL: "/rest/svc/deviceid?id=" + protocol.LocalDeviceID.String(),
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/svc/lang",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "[",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/svc/report",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
Timeout: 5 * time.Second,
|
|
|
|
},
|
|
|
|
|
|
|
|
// /rest/system
|
|
|
|
{
|
|
|
|
URL: "/rest/system/browse?current=~",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "[",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/config",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/config/insync",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/connections",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "null",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/discovery",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/error?since=0",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/ping",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/status",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/version",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/debug",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/log?since=0",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/system/log.txt?since=0",
|
|
|
|
Code: 200,
|
|
|
|
Type: "text/plain",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
2020-10-22 17:54:35 +00:00
|
|
|
|
|
|
|
// /rest/config
|
2020-11-01 20:36:54 +00:00
|
|
|
{
|
|
|
|
URL: "/rest/config",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
2020-10-22 17:54:35 +00:00
|
|
|
{
|
|
|
|
URL: "/rest/config/folders",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/folders/missing",
|
|
|
|
Code: 404,
|
|
|
|
Type: "text/plain",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/devices",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/devices/illegalid",
|
|
|
|
Code: 400,
|
|
|
|
Type: "text/plain",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/devices/" + protocol.GlobalDeviceID.String(),
|
|
|
|
Code: 404,
|
|
|
|
Type: "text/plain",
|
|
|
|
Prefix: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/options",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/gui",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
URL: "/rest/config/ldap",
|
|
|
|
Code: 200,
|
|
|
|
Type: "application/json",
|
|
|
|
Prefix: "{",
|
|
|
|
},
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 10:17:04 +00:00
|
|
|
|
|
|
|
for _, tc := range cases {
|
2023-07-29 08:24:44 +00:00
|
|
|
tc := tc
|
2024-02-11 08:20:29 +00:00
|
|
|
t.Run(tc.URL, func(t *testing.T) {
|
2023-07-29 08:24:44 +00:00
|
|
|
t.Parallel()
|
2022-04-05 19:32:06 +00:00
|
|
|
testHTTPRequest(t, baseURL, tc, testAPIKey)
|
|
|
|
})
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-24 10:17:04 +00:00
|
|
|
// testHTTPRequest tries the given test case, comparing the result code,
|
|
|
|
// content type, and result prefix.
|
2016-05-21 13:48:55 +00:00
|
|
|
func testHTTPRequest(t *testing.T, baseURL string, tc httpTestCase, apikey string) {
|
2024-07-08 22:37:44 +00:00
|
|
|
// Since running tests in parallel, the previous 1s timeout proved to be too short.
|
|
|
|
// https://github.com/syncthing/syncthing/issues/9455
|
|
|
|
timeout := 10 * time.Second
|
2016-03-24 10:17:04 +00:00
|
|
|
if tc.Timeout > 0 {
|
|
|
|
timeout = tc.Timeout
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 10:17:04 +00:00
|
|
|
cli := &http.Client{
|
|
|
|
Timeout: timeout,
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
|
|
|
|
2016-05-21 13:48:55 +00:00
|
|
|
req, err := http.NewRequest("GET", baseURL+tc.URL, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error requesting %s: %v", tc.URL, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
req.Header.Set("X-API-Key", apikey)
|
|
|
|
|
|
|
|
resp, err := cli.Do(req)
|
2016-03-24 08:55:33 +00:00
|
|
|
if err != nil {
|
2016-03-24 10:17:04 +00:00
|
|
|
t.Errorf("Unexpected error requesting %s: %v", tc.URL, err)
|
|
|
|
return
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 10:17:04 +00:00
|
|
|
defer resp.Body.Close()
|
2016-03-24 08:55:33 +00:00
|
|
|
|
2016-03-24 10:17:04 +00:00
|
|
|
if resp.StatusCode != tc.Code {
|
|
|
|
t.Errorf("Get on %s should have returned status code %d, not %s", tc.URL, tc.Code, resp.Status)
|
|
|
|
return
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
|
|
|
|
2016-03-24 10:17:04 +00:00
|
|
|
ct := resp.Header.Get("Content-Type")
|
|
|
|
if !strings.HasPrefix(ct, tc.Type) {
|
|
|
|
t.Errorf("The content type on %s should be %q, not %q", tc.URL, tc.Type, ct)
|
|
|
|
return
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 10:17:04 +00:00
|
|
|
|
2021-11-22 07:59:47 +00:00
|
|
|
data, err := io.ReadAll(resp.Body)
|
2016-03-24 08:55:33 +00:00
|
|
|
if err != nil {
|
2016-03-24 10:17:04 +00:00
|
|
|
t.Errorf("Unexpected error reading %s: %v", tc.URL, err)
|
|
|
|
return
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 10:17:04 +00:00
|
|
|
|
|
|
|
if !bytes.HasPrefix(data, []byte(tc.Prefix)) {
|
|
|
|
t.Errorf("Returned data from %s does not have prefix %q: %s", tc.URL, tc.Prefix, data)
|
|
|
|
return
|
2016-03-24 08:55:33 +00:00
|
|
|
}
|
2016-03-24 08:09:13 +00:00
|
|
|
}
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
func hasSessionCookie(cookies []*http.Cookie) bool {
|
|
|
|
for _, cookie := range cookies {
|
|
|
|
if cookie.MaxAge >= 0 && strings.HasPrefix(cookie.Name, "sessionid") {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
func hasDeleteSessionCookie(cookies []*http.Cookie) bool {
|
|
|
|
for _, cookie := range cookies {
|
|
|
|
if cookie.MaxAge < 0 && strings.HasPrefix(cookie.Name, "sessionid") {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
func httpGet(url string, basicAuthUsername string, basicAuthPassword string, xapikeyHeader string, authorizationBearer string, cookies []*http.Cookie, t *testing.T) *http.Response {
|
|
|
|
req, err := http.NewRequest("GET", url, nil)
|
|
|
|
for _, cookie := range cookies {
|
|
|
|
req.AddCookie(cookie)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if basicAuthUsername != "" || basicAuthPassword != "" {
|
|
|
|
req.SetBasicAuth(basicAuthUsername, basicAuthPassword)
|
|
|
|
}
|
|
|
|
|
|
|
|
if xapikeyHeader != "" {
|
|
|
|
req.Header.Set("X-API-Key", xapikeyHeader)
|
|
|
|
}
|
|
|
|
|
|
|
|
if authorizationBearer != "" {
|
|
|
|
req.Header.Set("Authorization", "Bearer "+authorizationBearer)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
func httpPost(url string, body map[string]string, cookies []*http.Cookie, t *testing.T) *http.Response {
|
2023-10-06 11:00:58 +00:00
|
|
|
bodyBytes, err := json.Marshal(body)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := http.NewRequest("POST", url, bytes.NewReader(bodyBytes))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
for _, cookie := range cookies {
|
|
|
|
req.AddCookie(cookie)
|
|
|
|
}
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2016-04-18 20:24:38 +00:00
|
|
|
func TestHTTPLogin(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
httpGetBasicAuth := func(url string, username string, password string) *http.Response {
|
|
|
|
return httpGet(url, username, password, "", "", nil, t)
|
|
|
|
}
|
|
|
|
|
|
|
|
httpGetXapikey := func(url string, xapikeyHeader string) *http.Response {
|
|
|
|
return httpGet(url, "", "", xapikeyHeader, "", nil, t)
|
|
|
|
}
|
|
|
|
|
|
|
|
httpGetAuthorizationBearer := func(url string, bearer string) *http.Response {
|
|
|
|
return httpGet(url, "", "", "", bearer, nil, t)
|
|
|
|
}
|
|
|
|
|
|
|
|
testWith := func(sendBasicAuthPrompt bool, expectedOkStatus int, expectedFailStatus int, path string) {
|
|
|
|
cfg := newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
|
|
|
User: "üser",
|
|
|
|
Password: "$2a$10$IdIZTxTg/dCNuNEGlmLynOjqg4B1FvDKuIV5e0BB3pnWVHNb8.GSq", // bcrypt of "räksmörgås" in UTF-8
|
|
|
|
RawAddress: "127.0.0.1:0",
|
|
|
|
APIKey: testAPIKey,
|
|
|
|
SendBasicAuthPrompt: sendBasicAuthPrompt,
|
|
|
|
})
|
|
|
|
baseURL, cancel, err := startHTTP(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
url := baseURL + path
|
|
|
|
|
|
|
|
t.Run(fmt.Sprintf("%d path", expectedOkStatus), func(t *testing.T) {
|
|
|
|
t.Run("no auth is rejected", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "", "")
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for unauthed request", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for unauthed request")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("incorrect password is rejected", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "üser", "rksmrgs")
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for incorrect password", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for incorrect password")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("incorrect username is rejected", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "user", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for incorrect username", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for incorrect username")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("UTF-8 auth works", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for authed request (UTF-8)", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if !hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie for authed request (UTF-8)")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
t.Run("Logout removes the session cookie", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for authed request (UTF-8)", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
|
|
|
if !hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie for authed request (UTF-8)")
|
|
|
|
}
|
|
|
|
logoutResp := httpPost(baseURL+"/rest/noauth/auth/logout", nil, resp.Cookies(), t)
|
|
|
|
if !hasDeleteSessionCookie(logoutResp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie to be deleted for logout request")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Session cookie is invalid after logout", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
loginResp := httpGetBasicAuth(url, "üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if loginResp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for authed request (UTF-8)", expectedOkStatus, loginResp.StatusCode)
|
|
|
|
}
|
|
|
|
if !hasSessionCookie(loginResp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie for authed request (UTF-8)")
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := httpGet(url, "", "", "", "", loginResp.Cookies(), t)
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for cookie-authed request (UTF-8)", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
httpPost(baseURL+"/rest/noauth/auth/logout", nil, loginResp.Cookies(), t)
|
|
|
|
resp = httpGet(url, "", "", "", "", loginResp.Cookies(), t)
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
|
|
|
t.Errorf("Expected session to be invalid (status %d) after logout, got status: %d", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
t.Run("ISO-8859-1 auth works", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetBasicAuth(url, "\xfcser", "r\xe4ksm\xf6rg\xe5s") // escaped ISO-8859-1
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for authed request (ISO-8859-1)", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if !hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie for authed request (ISO-8859-1)")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("bad X-API-Key is rejected", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetXapikey(url, testAPIKey+"X")
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for bad API key", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for bad API key")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("good X-API-Key is accepted", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetXapikey(url, testAPIKey)
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
|
|
|
t.Errorf("Unexpected non-%d return code %d for API key", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
2023-10-10 05:48:35 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for API key")
|
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("bad Bearer is rejected", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetAuthorizationBearer(url, testAPIKey+"X")
|
|
|
|
if resp.StatusCode != expectedFailStatus {
|
2023-10-10 05:48:35 +00:00
|
|
|
t.Errorf("Unexpected non-%d return code %d for bad Authorization: Bearer", expectedFailStatus, resp.StatusCode)
|
|
|
|
}
|
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for bad Authorization: Bearer")
|
2023-10-06 11:00:58 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("good Bearer is accepted", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGetAuthorizationBearer(url, testAPIKey)
|
|
|
|
if resp.StatusCode != expectedOkStatus {
|
2023-10-10 05:48:35 +00:00
|
|
|
t.Errorf("Unexpected non-%d return code %d for Authorization: Bearer", expectedOkStatus, resp.StatusCode)
|
|
|
|
}
|
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for bad Authorization: Bearer")
|
2023-10-06 11:00:58 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-10-10 05:48:35 +00:00
|
|
|
testWith(true, http.StatusOK, http.StatusOK, "/")
|
2023-10-06 11:00:58 +00:00
|
|
|
testWith(true, http.StatusOK, http.StatusUnauthorized, "/meta.js")
|
|
|
|
testWith(true, http.StatusNotFound, http.StatusUnauthorized, "/any-path/that/does/nooooooot/match-any/noauth-pattern")
|
|
|
|
|
2023-10-10 05:48:35 +00:00
|
|
|
testWith(false, http.StatusOK, http.StatusOK, "/")
|
2023-10-06 11:00:58 +00:00
|
|
|
testWith(false, http.StatusOK, http.StatusForbidden, "/meta.js")
|
|
|
|
testWith(false, http.StatusNotFound, http.StatusForbidden, "/any-path/that/does/nooooooot/match-any/noauth-pattern")
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHtmlFormLogin(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
cfg := newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
2023-10-06 11:00:58 +00:00
|
|
|
User: "üser",
|
|
|
|
Password: "$2a$10$IdIZTxTg/dCNuNEGlmLynOjqg4B1FvDKuIV5e0BB3pnWVHNb8.GSq", // bcrypt of "räksmörgås" in UTF-8
|
|
|
|
SendBasicAuthPrompt: false,
|
2021-03-03 07:53:50 +00:00
|
|
|
})
|
2020-11-17 12:19:04 +00:00
|
|
|
baseURL, cancel, err := startHTTP(cfg)
|
2016-04-18 20:24:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Cleanup(cancel)
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
loginUrl := baseURL + "/rest/noauth/auth/password"
|
|
|
|
resourceUrl := baseURL + "/meta.js"
|
|
|
|
resourceUrl404 := baseURL + "/any-path/that/does/nooooooot/match-any/noauth-pattern"
|
|
|
|
|
|
|
|
performLogin := func(username string, password string) *http.Response {
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
return httpPost(loginUrl, map[string]string{"username": username, "password": password}, nil, t)
|
2023-10-06 11:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
performResourceRequest := func(url string, cookies []*http.Cookie) *http.Response {
|
|
|
|
return httpGet(url, "", "", "", "", cookies, t)
|
|
|
|
}
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
testNoAuthPath := func(noAuthPath string) {
|
|
|
|
t.Run("auth is not needed for "+noAuthPath, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
resp := httpGet(baseURL+noAuthPath, "", "", "", "", nil, t)
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Errorf("Unexpected non-200 return code %d at %s", resp.StatusCode, noAuthPath)
|
|
|
|
}
|
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie at " + noAuthPath)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
testNoAuthPath("/index.html")
|
|
|
|
testNoAuthPath("/rest/svc/lang")
|
|
|
|
|
|
|
|
t.Run("incorrect password is rejected with 403", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
resp := performLogin("üser", "rksmrgs") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for incorrect password", resp.StatusCode)
|
|
|
|
}
|
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for incorrect password")
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
resp = performResourceRequest(resourceUrl, resp.Cookies())
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for incorrect password", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
t.Run("incorrect username is rejected with 403", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
resp := performLogin("user", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for incorrect username", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for incorrect username")
|
|
|
|
}
|
|
|
|
resp = performResourceRequest(resourceUrl, resp.Cookies())
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for incorrect username", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("UTF-8 auth works", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
// JSON is always UTF-8, so ISO-8859-1 case is not applicable
|
|
|
|
resp := performLogin("üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != http.StatusNoContent {
|
|
|
|
t.Errorf("Unexpected non-204 return code %d for authed request (UTF-8)", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
resp = performResourceRequest(resourceUrl, resp.Cookies())
|
2023-07-26 11:13:06 +00:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Errorf("Unexpected non-200 return code %d for authed request (UTF-8)", resp.StatusCode)
|
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
t.Run("Logout removes the session cookie", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
// JSON is always UTF-8, so ISO-8859-1 case is not applicable
|
|
|
|
resp := performLogin("üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if resp.StatusCode != http.StatusNoContent {
|
|
|
|
t.Errorf("Unexpected non-204 return code %d for authed request (UTF-8)", resp.StatusCode)
|
|
|
|
}
|
|
|
|
logoutResp := httpPost(baseURL+"/rest/noauth/auth/logout", nil, resp.Cookies(), t)
|
|
|
|
if !hasDeleteSessionCookie(logoutResp.Cookies()) {
|
|
|
|
t.Errorf("Expected session cookie to be deleted for logout request")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Session cookie is invalid after logout", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
// JSON is always UTF-8, so ISO-8859-1 case is not applicable
|
|
|
|
loginResp := performLogin("üser", "räksmörgås") // string literals in Go source code are in UTF-8
|
|
|
|
if loginResp.StatusCode != http.StatusNoContent {
|
|
|
|
t.Errorf("Unexpected non-204 return code %d for authed request (UTF-8)", loginResp.StatusCode)
|
|
|
|
}
|
|
|
|
resp := performResourceRequest(resourceUrl, loginResp.Cookies())
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Errorf("Unexpected non-200 return code %d for authed request (UTF-8)", resp.StatusCode)
|
|
|
|
}
|
|
|
|
httpPost(baseURL+"/rest/noauth/auth/logout", nil, loginResp.Cookies(), t)
|
|
|
|
resp = performResourceRequest(resourceUrl, loginResp.Cookies())
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Expected session to be invalid (status 403) after logout, got status: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
t.Run("form login is not applicable to other URLs", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
lib/api: Extract session store (#9425)
This is an extract from PR #9175, which can be reviewed in isolation to
reduce the volume of changes to review all at once in #9175. There are
about to be several services and API handlers that read and set cookies
and session state, so this abstraction will prove helpful.
In particular a motivating cause for this is that with the current
architecture in PR #9175, in `api.go` the [`webauthnService` needs to
access the
session](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dR309-R310)
for authentication purposes but needs to be instantiated before the
`configMuxBuilder` for config purposes, because the WebAuthn additions
to config management need to perform WebAuthn registration ceremonies,
but currently the session management is embedded in the
`basicAuthAndSessionMiddleware` which is [instantiated much
later](https://github.com/syncthing/syncthing/pull/9175/files#diff-e2e14f22d818b8e635572ef0ee7718dee875c365e07225d760a6faae8be7772dL371-R380)
and only if authentication is enabled in `guiCfg`. This refactorization
extracts the session management out from `basicAuthAndSessionMiddleware`
so that `basicAuthAndSessionMiddleware` and `webauthnService` can both
use the same shared session management service to perform session
management logic.
### Testing
This is a refactorization intended to not change any externally
observable behaviour, so existing tests (e.g., `api_auth_test.go`)
should cover this where appropriate. I have manually verified that:
- Appending `+ "foo"` to the cookie name in `createSession` causes
`TestHtmlFormLogin/invalid_URL_returns_403_before_auth_and_404_after_auth`
and `TestHtmlFormLogin/UTF-8_auth_works` to fail
- Inverting the return value of `hasValidSession` cases a whole bunch of
tests in `TestHTTPLogin` and `TestHtmlFormLogin` to fail
- (Fixed) Changing the cookie to `MaxAge: 1000` in `destroySession` does
NOT cause any tests to fail!
- Added tests `TestHtmlFormLogin/Logout_removes_the_session_cookie`,
`TestHTTPLogin/*/Logout_removes_the_session_cookie`,
`TestHtmlFormLogin/Session_cookie_is_invalid_after_logout` and
`TestHTTPLogin/200_path#01/Session_cookie_is_invalid_after_logout` to
cover this.
- Manually verified that these tests pass both before and after the
changes in this PR, and that changing the cookie to `MaxAge: 1000` or
not calling `m.tokens.Delete(cookie.Value)` in `destroySession` makes
the respective pair of tests fail.
2024-03-21 12:09:47 +00:00
|
|
|
resp := httpPost(baseURL+"/meta.js", map[string]string{"username": "üser", "password": "räksmörgås"}, nil, t)
|
2023-10-06 11:00:58 +00:00
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for incorrect form login URL", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
if hasSessionCookie(resp.Cookies()) {
|
|
|
|
t.Errorf("Unexpected session cookie for incorrect form login URL")
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
t.Run("invalid URL returns 403 before auth and 404 after auth", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
resp := performResourceRequest(resourceUrl404, nil)
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Unexpected non-403 return code %d for unauthed request", resp.StatusCode)
|
|
|
|
}
|
|
|
|
resp = performLogin("üser", "räksmörgås")
|
|
|
|
if resp.StatusCode != http.StatusNoContent {
|
|
|
|
t.Errorf("Unexpected non-204 return code %d for authed request", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
2023-10-06 11:00:58 +00:00
|
|
|
resp = performResourceRequest(resourceUrl404, resp.Cookies())
|
|
|
|
if resp.StatusCode != http.StatusNotFound {
|
|
|
|
t.Errorf("Unexpected non-404 return code %d for authed request", resp.StatusCode)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2023-10-06 11:00:58 +00:00
|
|
|
}
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
func TestApiCache(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
cfg := newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
|
|
|
RawAddress: "127.0.0.1:0",
|
|
|
|
APIKey: testAPIKey,
|
2023-07-26 11:13:06 +00:00
|
|
|
})
|
2023-10-06 11:00:58 +00:00
|
|
|
baseURL, cancel, err := startHTTP(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
t.Cleanup(cancel)
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
httpGet := func(url string, bearer string) *http.Response {
|
|
|
|
return httpGet(url, "", "", "", bearer, nil, t)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("meta.js has no-cache headers", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
url := baseURL + "/meta.js"
|
|
|
|
resp := httpGet(url, testAPIKey)
|
|
|
|
if resp.Header.Get("Cache-Control") != "max-age=0, no-cache, no-store" {
|
|
|
|
t.Errorf("Expected no-cache headers at %s", url)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
t.Run("/rest/ has no-cache headers", func(t *testing.T) {
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Parallel()
|
2023-10-06 11:00:58 +00:00
|
|
|
url := baseURL + "/rest/system/version"
|
|
|
|
resp := httpGet(url, testAPIKey)
|
|
|
|
if resp.Header.Get("Cache-Control") != "max-age=0, no-cache, no-store" {
|
|
|
|
t.Errorf("Expected no-cache headers at %s", url)
|
2023-07-26 11:13:06 +00:00
|
|
|
}
|
|
|
|
})
|
2016-04-18 20:24:38 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 12:19:04 +00:00
|
|
|
func startHTTP(cfg config.Wrapper) (string, context.CancelFunc, error) {
|
2021-03-03 07:53:50 +00:00
|
|
|
m := new(modelmocks.Model)
|
2016-04-18 20:24:38 +00:00
|
|
|
assetDir := "../../gui"
|
2021-03-03 07:53:50 +00:00
|
|
|
eventSub := new(eventmocks.BufferedSubscription)
|
|
|
|
diskEventSub := new(eventmocks.BufferedSubscription)
|
|
|
|
discoverer := new(discovermocks.Manager)
|
|
|
|
connections := new(connmocks.Service)
|
|
|
|
errorLog := new(loggermocks.Recorder)
|
|
|
|
systemLog := new(loggermocks.Recorder)
|
|
|
|
for _, l := range []*loggermocks.Recorder{errorLog, systemLog} {
|
|
|
|
l.SinceReturns([]logger.Line{
|
|
|
|
{
|
|
|
|
When: time.Now(),
|
|
|
|
Message: "Test message",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
2016-06-06 22:12:23 +00:00
|
|
|
addrChan := make(chan string)
|
2021-03-03 07:53:50 +00:00
|
|
|
mockedSummary := &modelmocks.FolderSummaryService{}
|
2022-04-05 19:32:06 +00:00
|
|
|
mockedSummary.SummaryReturns(new(model.FolderSummary), nil)
|
2016-04-18 20:24:38 +00:00
|
|
|
|
|
|
|
// Instantiate the API service
|
2019-03-26 19:53:58 +00:00
|
|
|
urService := ur.New(cfg, m, connections, false)
|
2024-01-04 10:07:12 +00:00
|
|
|
mdb, _ := db.NewLowlevel(backend.OpenMemory(), events.NoopLogger)
|
|
|
|
kdb := db.NewMiscDataNamespace(mdb)
|
|
|
|
svc := New(protocol.LocalDeviceID, cfg, assetDir, "syncthing", m, eventSub, diskEventSub, events.NoopLogger, discoverer, connections, urService, mockedSummary, errorLog, systemLog, false, kdb).(*service)
|
2016-06-06 22:12:23 +00:00
|
|
|
svc.started = addrChan
|
|
|
|
|
|
|
|
// Actually start the API service
|
2018-08-13 18:39:08 +00:00
|
|
|
supervisor := suture.New("API test", suture.Spec{
|
2018-09-08 09:56:56 +00:00
|
|
|
PassThroughPanics: true,
|
2018-08-13 18:39:08 +00:00
|
|
|
})
|
2016-06-06 22:12:23 +00:00
|
|
|
supervisor.Add(svc)
|
2020-11-17 12:19:04 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
supervisor.ServeBackground(ctx)
|
2016-04-18 20:24:38 +00:00
|
|
|
|
|
|
|
// Make sure the API service is listening, and get the URL to use.
|
2016-06-06 22:12:23 +00:00
|
|
|
addr := <-addrChan
|
|
|
|
tcpAddr, err := net.ResolveTCPAddr("tcp", addr)
|
2016-04-18 20:24:38 +00:00
|
|
|
if err != nil {
|
2020-11-17 12:19:04 +00:00
|
|
|
cancel()
|
|
|
|
return "", cancel, fmt.Errorf("weird address from API service: %w", err)
|
2016-04-18 20:24:38 +00:00
|
|
|
}
|
2016-09-03 08:33:34 +00:00
|
|
|
|
2020-10-22 17:54:35 +00:00
|
|
|
host, _, _ := net.SplitHostPort(cfg.GUI().RawAddress)
|
2016-09-03 08:33:34 +00:00
|
|
|
if host == "" || host == "0.0.0.0" {
|
|
|
|
host = "127.0.0.1"
|
|
|
|
}
|
|
|
|
baseURL := fmt.Sprintf("http://%s", net.JoinHostPort(host, strconv.Itoa(tcpAddr.Port)))
|
2016-04-18 20:24:38 +00:00
|
|
|
|
2020-11-17 12:19:04 +00:00
|
|
|
return baseURL, cancel, nil
|
2016-04-18 20:24:38 +00:00
|
|
|
}
|
2016-05-21 13:48:55 +00:00
|
|
|
|
|
|
|
func TestCSRFRequired(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-11-24 11:08:44 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting base URL:", err)
|
|
|
|
}
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Cleanup(cancel)
|
2016-05-21 13:48:55 +00:00
|
|
|
|
|
|
|
cli := &http.Client{
|
2019-11-06 08:52:03 +00:00
|
|
|
Timeout: time.Minute,
|
2016-05-21 13:48:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Getting the base URL (i.e. "/") should succeed.
|
|
|
|
|
|
|
|
resp, err := cli.Get(baseURL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting base URL:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Fatal("Getting base URL should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find the returned CSRF token for future use
|
|
|
|
|
|
|
|
var csrfTokenName, csrfTokenValue string
|
|
|
|
for _, cookie := range resp.Cookies() {
|
|
|
|
if strings.HasPrefix(cookie.Name, "CSRF-Token") {
|
|
|
|
csrfTokenName = cookie.Name
|
|
|
|
csrfTokenValue = cookie.Value
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-06 11:00:58 +00:00
|
|
|
if csrfTokenValue == "" {
|
|
|
|
t.Fatal("Failed to initialize CSRF test: no CSRF cookie returned from " + baseURL)
|
|
|
|
}
|
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest without a token should fail", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Get(baseURL + "/rest/system/config")
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Fatal("Getting /rest/system/config without CSRF token should fail, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest with a token should succeed", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/config", nil)
|
|
|
|
req.Header.Set("X-"+csrfTokenName, csrfTokenValue)
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Do(req)
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Fatal("Getting /rest/system/config with CSRF token should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest with an incorrect API key should fail, X-API-Key version", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/config", nil)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey+"X")
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Do(req)
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Fatal("Getting /rest/system/config with incorrect API token should fail, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest with an incorrect API key should fail, Bearer auth version", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/config", nil)
|
|
|
|
req.Header.Set("Authorization", "Bearer "+testAPIKey+"X")
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Do(req)
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Fatal("Getting /rest/system/config with incorrect API token should fail, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest with the API key should succeed", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/config", nil)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Do(req)
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Fatal("Getting /rest/system/config with API key should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
|
2023-07-26 11:13:06 +00:00
|
|
|
t.Run("/rest with the API key as a bearer token should succeed", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/config", nil)
|
|
|
|
req.Header.Set("Authorization", "Bearer "+testAPIKey)
|
2023-07-26 21:33:45 +00:00
|
|
|
resp, err := cli.Do(req)
|
2023-07-26 11:13:06 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting /rest/system/config:", err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Fatal("Getting /rest/system/config with API key should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
})
|
2016-05-21 13:48:55 +00:00
|
|
|
}
|
2016-05-26 07:25:34 +00:00
|
|
|
|
|
|
|
func TestRandomString(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-05-26 07:25:34 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-05-26 07:25:34 +00:00
|
|
|
cli := &http.Client{
|
|
|
|
Timeout: time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
// The default should be to return a 32 character random string
|
|
|
|
|
|
|
|
for _, url := range []string{"/rest/svc/random/string", "/rest/svc/random/string?length=-1", "/rest/svc/random/string?length=yo"} {
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+url, nil)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
|
|
|
resp, err := cli.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var res map[string]string
|
|
|
|
if err := json.NewDecoder(resp.Body).Decode(&res); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(res["random"]) != 32 {
|
|
|
|
t.Errorf("Expected 32 random characters, got %q of length %d", res["random"], len(res["random"]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We can ask for a different length if we like
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/svc/random/string?length=27", nil)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
|
|
|
resp, err := cli.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var res map[string]string
|
|
|
|
if err := json.NewDecoder(resp.Body).Decode(&res); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(res["random"]) != 27 {
|
|
|
|
t.Errorf("Expected 27 random characters, got %q of length %d", res["random"], len(res["random"]))
|
|
|
|
}
|
|
|
|
}
|
2016-07-02 19:38:39 +00:00
|
|
|
|
|
|
|
func TestConfigPostOK(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-07-02 19:38:39 +00:00
|
|
|
cfg := bytes.NewBuffer([]byte(`{
|
|
|
|
"version": 15,
|
|
|
|
"folders": [
|
2019-07-14 09:03:14 +00:00
|
|
|
{
|
|
|
|
"id": "foo",
|
|
|
|
"path": "TestConfigPostOK"
|
|
|
|
}
|
2016-07-02 19:38:39 +00:00
|
|
|
]
|
|
|
|
}`))
|
|
|
|
|
|
|
|
resp, err := testConfigPost(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Expected 200 OK, not", resp.Status)
|
|
|
|
}
|
2019-07-14 09:03:14 +00:00
|
|
|
os.RemoveAll("TestConfigPostOK")
|
2016-07-02 19:38:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfigPostDupFolder(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-07-02 19:38:39 +00:00
|
|
|
cfg := bytes.NewBuffer([]byte(`{
|
|
|
|
"version": 15,
|
|
|
|
"folders": [
|
|
|
|
{"id": "foo"},
|
|
|
|
{"id": "foo"}
|
|
|
|
]
|
|
|
|
}`))
|
|
|
|
|
|
|
|
resp, err := testConfigPost(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusBadRequest {
|
|
|
|
t.Error("Expected 400 Bad Request, not", resp.Status)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testConfigPost(data io.Reader) (*http.Response, error) {
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-07-02 19:38:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-07-02 19:38:39 +00:00
|
|
|
cli := &http.Client{
|
|
|
|
Timeout: time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("POST", baseURL+"/rest/system/config", data)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
|
|
|
return cli.Do(req)
|
|
|
|
}
|
2016-09-03 08:33:34 +00:00
|
|
|
|
|
|
|
func TestHostCheck(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-09-03 08:33:34 +00:00
|
|
|
// An API service bound to localhost should reject non-localhost host Headers
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
cfg := newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{RawAddress: "127.0.0.1:0"})
|
2020-11-17 12:19:04 +00:00
|
|
|
baseURL, cancel, err := startHTTP(cfg)
|
2016-09-03 08:33:34 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-09-03 08:33:34 +00:00
|
|
|
|
|
|
|
// A normal HTTP get to the localhost-bound service should succeed
|
|
|
|
|
|
|
|
resp, err := http.Get(baseURL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Regular HTTP get: expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A request with a suspicious Host header should fail
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "example.com"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Error("Suspicious Host header: expected 403 Forbidden, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A request with an explicit "localhost:8384" Host header should pass
|
|
|
|
|
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "localhost:8384"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Explicit localhost:8384: expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A request with an explicit "localhost" Host header (no port) should pass
|
|
|
|
|
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "localhost"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Explicit localhost: expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A server with InsecureSkipHostCheck set behaves differently
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
cfg = newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
|
|
|
RawAddress: "127.0.0.1:0",
|
|
|
|
InsecureSkipHostCheck: true,
|
|
|
|
})
|
2020-11-17 12:19:04 +00:00
|
|
|
baseURL, cancel, err = startHTTP(cfg)
|
2016-09-03 08:33:34 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-09-03 08:33:34 +00:00
|
|
|
|
|
|
|
// A request with a suspicious Host header should be allowed
|
|
|
|
|
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "example.com"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Incorrect host header, check disabled: expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
2023-07-29 08:24:44 +00:00
|
|
|
if !testing.Short() {
|
|
|
|
// A server bound to a wildcard address also doesn't do the check
|
2016-09-03 08:33:34 +00:00
|
|
|
|
2023-07-29 08:24:44 +00:00
|
|
|
cfg = newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
|
|
|
RawAddress: "0.0.0.0:0",
|
|
|
|
})
|
|
|
|
baseURL, cancel, err = startHTTP(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer cancel()
|
2016-09-03 08:33:34 +00:00
|
|
|
|
2023-07-29 08:24:44 +00:00
|
|
|
// A request with a suspicious Host header should be allowed
|
2016-09-03 08:33:34 +00:00
|
|
|
|
2023-07-29 08:24:44 +00:00
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "example.com"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Incorrect host header, wildcard bound: expected 200 OK, not", resp.Status)
|
|
|
|
}
|
2016-09-03 08:33:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// This should all work over IPv6 as well
|
|
|
|
|
2019-09-03 20:14:36 +00:00
|
|
|
if runningInContainer() {
|
|
|
|
// Working IPv6 in Docker can't be taken for granted.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
cfg = newMockedConfig()
|
|
|
|
cfg.GUIReturns(config.GUIConfiguration{
|
|
|
|
RawAddress: "[::1]:0",
|
|
|
|
})
|
2020-11-17 12:19:04 +00:00
|
|
|
baseURL, cancel, err = startHTTP(cfg)
|
2016-09-03 08:33:34 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-09-03 08:33:34 +00:00
|
|
|
|
|
|
|
// A normal HTTP get to the localhost-bound service should succeed
|
|
|
|
|
|
|
|
resp, err = http.Get(baseURL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Regular HTTP get (IPv6): expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A request with a suspicious Host header should fail
|
|
|
|
|
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "example.com"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Error("Suspicious Host header (IPv6): expected 403 Forbidden, not", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A request with an explicit "localhost:8384" Host header should pass
|
|
|
|
|
|
|
|
req, _ = http.NewRequest("GET", baseURL, nil)
|
|
|
|
req.Host = "localhost:8384"
|
|
|
|
resp, err = http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Error("Explicit localhost:8384 (IPv6): expected 200 OK, not", resp.Status)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAddressIsLocalhost(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-09-03 08:33:34 +00:00
|
|
|
testcases := []struct {
|
|
|
|
address string
|
|
|
|
result bool
|
|
|
|
}{
|
|
|
|
// These are all valid localhost addresses
|
|
|
|
{"localhost", true},
|
2016-10-03 08:34:13 +00:00
|
|
|
{"LOCALHOST", true},
|
2018-03-15 10:29:52 +00:00
|
|
|
{"localhost.", true},
|
2016-09-03 08:33:34 +00:00
|
|
|
{"::1", true},
|
|
|
|
{"127.0.0.1", true},
|
2018-03-15 10:29:52 +00:00
|
|
|
{"127.23.45.56", true},
|
2016-09-03 08:33:34 +00:00
|
|
|
{"localhost:8080", true},
|
2016-10-03 08:34:13 +00:00
|
|
|
{"LOCALHOST:8000", true},
|
2018-03-15 10:29:52 +00:00
|
|
|
{"localhost.:8080", true},
|
2016-09-03 08:33:34 +00:00
|
|
|
{"[::1]:8080", true},
|
|
|
|
{"127.0.0.1:8080", true},
|
2018-03-15 10:29:52 +00:00
|
|
|
{"127.23.45.56:8080", true},
|
2021-02-27 07:52:49 +00:00
|
|
|
{"www.localhost", true},
|
|
|
|
{"www.localhost:8080", true},
|
2016-09-03 08:33:34 +00:00
|
|
|
|
|
|
|
// These are all non-localhost addresses
|
|
|
|
{"example.com", false},
|
|
|
|
{"example.com:8080", false},
|
2018-03-15 10:29:52 +00:00
|
|
|
{"localhost.com", false},
|
|
|
|
{"localhost.com:8080", false},
|
2016-09-03 08:33:34 +00:00
|
|
|
{"192.0.2.10", false},
|
|
|
|
{"192.0.2.10:8080", false},
|
|
|
|
{"0.0.0.0", false},
|
|
|
|
{"0.0.0.0:8080", false},
|
|
|
|
{"::", false},
|
|
|
|
{"[::]:8080", false},
|
|
|
|
{":8080", false},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testcases {
|
|
|
|
result := addressIsLocalhost(tc.address)
|
|
|
|
if result != tc.result {
|
|
|
|
t.Errorf("addressIsLocalhost(%q)=%v, expected %v", tc.address, result, tc.result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-09-06 22:16:50 +00:00
|
|
|
|
|
|
|
func TestAccessControlAllowOriginHeader(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-09-06 22:16:50 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-09-06 22:16:50 +00:00
|
|
|
cli := &http.Client{
|
|
|
|
Timeout: time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("GET", baseURL+"/rest/system/status", nil)
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
|
|
|
resp, err := cli.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
t.Fatal("GET on /rest/system/status should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
if resp.Header.Get("Access-Control-Allow-Origin") != "*" {
|
|
|
|
t.Fatal("GET on /rest/system/status should return a 'Access-Control-Allow-Origin: *' header")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestOptionsRequest(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
baseURL, cancel, err := startHTTP(apiCfg)
|
2016-09-06 22:16:50 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2016-09-06 22:16:50 +00:00
|
|
|
cli := &http.Client{
|
|
|
|
Timeout: time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("OPTIONS", baseURL+"/rest/system/status", nil)
|
|
|
|
resp, err := cli.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusNoContent {
|
|
|
|
t.Fatal("OPTIONS on /rest/system/status should succeed, not", resp.Status)
|
|
|
|
}
|
|
|
|
if resp.Header.Get("Access-Control-Allow-Origin") != "*" {
|
|
|
|
t.Fatal("OPTIONS on /rest/system/status should return a 'Access-Control-Allow-Origin: *' header")
|
|
|
|
}
|
2020-11-01 20:36:54 +00:00
|
|
|
if resp.Header.Get("Access-Control-Allow-Methods") != "GET, POST, PUT, PATCH, DELETE, OPTIONS" {
|
|
|
|
t.Fatal("OPTIONS on /rest/system/status should return a 'Access-Control-Allow-Methods: GET, POST, PUT, PATCH, DELETE, OPTIONS' header")
|
2016-09-06 22:16:50 +00:00
|
|
|
}
|
|
|
|
if resp.Header.Get("Access-Control-Allow-Headers") != "Content-Type, X-API-Key" {
|
|
|
|
t.Fatal("OPTIONS on /rest/system/status should return a 'Access-Control-Allow-Headers: Content-Type, X-API-KEY' header")
|
|
|
|
}
|
|
|
|
}
|
2017-04-13 17:14:34 +00:00
|
|
|
|
|
|
|
func TestEventMasks(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-03 07:53:50 +00:00
|
|
|
cfg := newMockedConfig()
|
|
|
|
defSub := new(eventmocks.BufferedSubscription)
|
|
|
|
diskSub := new(eventmocks.BufferedSubscription)
|
2024-01-04 10:07:12 +00:00
|
|
|
mdb, _ := db.NewLowlevel(backend.OpenMemory(), events.NoopLogger)
|
|
|
|
kdb := db.NewMiscDataNamespace(mdb)
|
|
|
|
svc := New(protocol.LocalDeviceID, cfg, "", "syncthing", nil, defSub, diskSub, events.NoopLogger, nil, nil, nil, nil, nil, nil, false, kdb).(*service)
|
2017-04-13 17:14:34 +00:00
|
|
|
|
2019-03-26 19:53:58 +00:00
|
|
|
if mask := svc.getEventMask(""); mask != DefaultEventMask {
|
|
|
|
t.Errorf("incorrect default mask %x != %x", int64(mask), int64(DefaultEventMask))
|
2017-04-13 17:14:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
expected := events.FolderSummary | events.LocalChangeDetected
|
|
|
|
if mask := svc.getEventMask("FolderSummary,LocalChangeDetected"); mask != expected {
|
|
|
|
t.Errorf("incorrect parsed mask %x != %x", int64(mask), int64(expected))
|
|
|
|
}
|
|
|
|
|
|
|
|
expected = 0
|
2017-07-20 13:10:46 +00:00
|
|
|
if mask := svc.getEventMask("WeirdEvent,something else that doesn't exist"); mask != expected {
|
2017-04-13 17:14:34 +00:00
|
|
|
t.Errorf("incorrect parsed mask %x != %x", int64(mask), int64(expected))
|
|
|
|
}
|
|
|
|
|
2019-03-26 19:53:58 +00:00
|
|
|
if res := svc.getEventSub(DefaultEventMask); res != defSub {
|
2017-04-13 17:14:34 +00:00
|
|
|
t.Errorf("should have returned the given default event sub")
|
|
|
|
}
|
2019-03-26 19:53:58 +00:00
|
|
|
if res := svc.getEventSub(DiskEventMask); res != diskSub {
|
2017-04-13 17:14:34 +00:00
|
|
|
t.Errorf("should have returned the given disk event sub")
|
|
|
|
}
|
|
|
|
if res := svc.getEventSub(events.LocalIndexUpdated); res == nil || res == defSub || res == diskSub {
|
|
|
|
t.Errorf("should have returned a valid, non-default event sub")
|
|
|
|
}
|
|
|
|
}
|
2017-12-13 09:34:47 +00:00
|
|
|
|
|
|
|
func TestBrowse(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-12-13 09:34:47 +00:00
|
|
|
pathSep := string(os.PathSeparator)
|
|
|
|
|
2023-05-03 08:25:36 +00:00
|
|
|
ffs := fs.NewFilesystem(fs.FilesystemTypeFake, rand.String(32)+"?nostfolder=true")
|
2017-12-13 09:34:47 +00:00
|
|
|
|
2023-05-03 08:25:36 +00:00
|
|
|
_ = ffs.Mkdir("dir", 0o755)
|
|
|
|
_ = fs.WriteFile(ffs, "file", []byte("hello"), 0o644)
|
|
|
|
_ = ffs.Mkdir("MiXEDCase", 0o755)
|
2017-12-13 09:34:47 +00:00
|
|
|
|
|
|
|
// We expect completion to return the full path to the completed
|
|
|
|
// directory, with an ending slash.
|
2023-05-03 08:25:36 +00:00
|
|
|
dirPath := "dir" + pathSep
|
|
|
|
mixedCaseDirPath := "MiXEDCase" + pathSep
|
2017-12-13 09:34:47 +00:00
|
|
|
|
|
|
|
cases := []struct {
|
|
|
|
current string
|
|
|
|
returns []string
|
|
|
|
}{
|
2022-08-23 13:44:11 +00:00
|
|
|
// The directory without slash is completed to one with slash.
|
2023-05-03 08:25:36 +00:00
|
|
|
{"dir", []string{"dir" + pathSep}},
|
2017-12-13 09:34:47 +00:00
|
|
|
// With slash it's completed to its contents.
|
|
|
|
// Dirs are given pathSeps.
|
|
|
|
// Files are not returned.
|
2023-05-03 08:25:36 +00:00
|
|
|
{"", []string{mixedCaseDirPath, dirPath}},
|
2017-12-13 09:34:47 +00:00
|
|
|
// Globbing is automatic based on prefix.
|
2023-05-03 08:25:36 +00:00
|
|
|
{"d", []string{dirPath}},
|
|
|
|
{"di", []string{dirPath}},
|
|
|
|
{"dir", []string{dirPath}},
|
|
|
|
{"f", nil},
|
|
|
|
{"q", nil},
|
2022-08-23 13:44:11 +00:00
|
|
|
// Globbing is case-insensitive
|
2023-05-03 08:25:36 +00:00
|
|
|
{"mixed", []string{mixedCaseDirPath}},
|
2017-12-13 09:34:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2023-05-03 08:25:36 +00:00
|
|
|
ret := browseFiles(ffs, tc.current)
|
2023-08-21 17:44:33 +00:00
|
|
|
if !slices.Equal(ret, tc.returns) {
|
2017-12-13 09:34:47 +00:00
|
|
|
t.Errorf("browseFiles(%q) => %q, expected %q", tc.current, ret, tc.returns)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-01 19:13:11 +00:00
|
|
|
func TestPrefixMatch(t *testing.T) {
|
2019-09-05 11:35:51 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2018-11-01 19:13:11 +00:00
|
|
|
cases := []struct {
|
|
|
|
s string
|
|
|
|
prefix string
|
|
|
|
expected int
|
|
|
|
}{
|
|
|
|
{"aaaA", "aaa", matchExact},
|
|
|
|
{"AAAX", "BBB", noMatch},
|
|
|
|
{"AAAX", "aAa", matchCaseIns},
|
|
|
|
{"äÜX", "äü", matchCaseIns},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
|
|
|
ret := checkPrefixMatch(tc.s, tc.prefix)
|
|
|
|
if ret != tc.expected {
|
|
|
|
t.Errorf("checkPrefixMatch(%q, %q) => %v, expected %v", tc.s, tc.prefix, ret, tc.expected)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-30 11:36:11 +00:00
|
|
|
func TestShouldRegenerateCertificate(t *testing.T) {
|
2019-10-16 18:31:46 +00:00
|
|
|
// Self signed certificates expiring in less than a month are errored so we
|
|
|
|
// can regenerate in time.
|
2021-11-07 22:59:48 +00:00
|
|
|
crt, err := tlsutil.NewCertificateInMemory("foo.example.com", 29)
|
2019-10-16 18:31:46 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-07-30 11:36:11 +00:00
|
|
|
if err := shouldRegenerateCertificate(crt); err == nil {
|
2019-10-16 18:31:46 +00:00
|
|
|
t.Error("expected expiry error")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Certificates with at least 31 days of life left are fine.
|
2021-11-07 22:59:48 +00:00
|
|
|
crt, err = tlsutil.NewCertificateInMemory("foo.example.com", 31)
|
2019-10-16 18:31:46 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-07-30 11:36:11 +00:00
|
|
|
if err := shouldRegenerateCertificate(crt); err != nil {
|
2019-10-16 18:31:46 +00:00
|
|
|
t.Error("expected no error:", err)
|
|
|
|
}
|
|
|
|
|
2022-07-28 17:36:39 +00:00
|
|
|
if build.IsDarwin {
|
2019-10-16 18:31:46 +00:00
|
|
|
// Certificates with too long an expiry time are not allowed on macOS
|
2021-11-07 22:59:48 +00:00
|
|
|
crt, err = tlsutil.NewCertificateInMemory("foo.example.com", 1000)
|
2019-10-16 18:31:46 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-07-30 11:36:11 +00:00
|
|
|
if err := shouldRegenerateCertificate(crt); err == nil {
|
2019-10-16 18:31:46 +00:00
|
|
|
t.Error("expected expiry error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-22 17:54:35 +00:00
|
|
|
func TestConfigChanges(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
const testAPIKey = "foobarbaz"
|
|
|
|
cfg := config.Configuration{
|
|
|
|
GUI: config.GUIConfiguration{
|
|
|
|
RawAddress: "127.0.0.1:0",
|
|
|
|
RawUseTLS: false,
|
|
|
|
APIKey: testAPIKey,
|
|
|
|
},
|
|
|
|
}
|
2021-11-22 07:59:47 +00:00
|
|
|
tmpFile, err := os.CreateTemp("", "syncthing-testConfig-")
|
2020-10-22 17:54:35 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
defer os.Remove(tmpFile.Name())
|
2020-11-20 13:21:54 +00:00
|
|
|
w := config.Wrap(tmpFile.Name(), cfg, protocol.LocalDeviceID, events.NoopLogger)
|
2020-10-22 17:54:35 +00:00
|
|
|
tmpFile.Close()
|
2021-03-11 13:51:00 +00:00
|
|
|
cfgCtx, cfgCancel := context.WithCancel(context.Background())
|
|
|
|
go w.Serve(cfgCtx)
|
|
|
|
defer cfgCancel()
|
2020-11-17 12:19:04 +00:00
|
|
|
baseURL, cancel, err := startHTTP(w)
|
2020-10-22 17:54:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Unexpected error from getting base URL:", err)
|
|
|
|
}
|
2020-11-17 12:19:04 +00:00
|
|
|
defer cancel()
|
2020-10-22 17:54:35 +00:00
|
|
|
|
|
|
|
cli := &http.Client{
|
2021-02-05 14:33:37 +00:00
|
|
|
Timeout: time.Minute,
|
2020-10-22 17:54:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
do := func(req *http.Request, status int) *http.Response {
|
|
|
|
t.Helper()
|
|
|
|
req.Header.Set("X-API-Key", testAPIKey)
|
|
|
|
resp, err := cli.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp.StatusCode != status {
|
|
|
|
t.Errorf("Expected status %v, got %v", status, resp.StatusCode)
|
|
|
|
}
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
mod := func(method, path string, data interface{}) {
|
|
|
|
t.Helper()
|
|
|
|
bs, err := json.Marshal(data)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
req, _ := http.NewRequest(method, baseURL+path, bytes.NewReader(bs))
|
|
|
|
do(req, http.StatusOK).Body.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
get := func(path string) *http.Response {
|
|
|
|
t.Helper()
|
|
|
|
req, _ := http.NewRequest(http.MethodGet, baseURL+path, nil)
|
|
|
|
return do(req, http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
dev1Path := "/rest/config/devices/" + dev1.String()
|
|
|
|
|
|
|
|
// Create device
|
|
|
|
mod(http.MethodPut, "/rest/config/devices", []config.DeviceConfiguration{{DeviceID: dev1}})
|
|
|
|
|
|
|
|
// Check its there
|
|
|
|
get(dev1Path).Body.Close()
|
|
|
|
|
|
|
|
// Modify just a single attribute
|
|
|
|
mod(http.MethodPatch, dev1Path, map[string]bool{"Paused": true})
|
|
|
|
|
|
|
|
// Check that attribute
|
|
|
|
resp := get(dev1Path)
|
|
|
|
var dev config.DeviceConfiguration
|
|
|
|
if err := unmarshalTo(resp.Body, &dev); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !dev.Paused {
|
|
|
|
t.Error("Expected device to be paused")
|
|
|
|
}
|
|
|
|
|
|
|
|
folder2Path := "/rest/config/folders/folder2"
|
|
|
|
|
|
|
|
// Create a folder and add another
|
|
|
|
mod(http.MethodPut, "/rest/config/folders", []config.FolderConfiguration{{ID: "folder1", Path: "folder1"}})
|
|
|
|
mod(http.MethodPut, folder2Path, config.FolderConfiguration{ID: "folder2", Path: "folder2"})
|
|
|
|
|
|
|
|
// Check they are there
|
|
|
|
get("/rest/config/folders/folder1").Body.Close()
|
|
|
|
get(folder2Path).Body.Close()
|
|
|
|
|
|
|
|
// Modify just a single attribute
|
|
|
|
mod(http.MethodPatch, folder2Path, map[string]bool{"Paused": true})
|
|
|
|
|
|
|
|
// Check that attribute
|
|
|
|
resp = get(folder2Path)
|
|
|
|
var folder config.FolderConfiguration
|
|
|
|
if err := unmarshalTo(resp.Body, &folder); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !dev.Paused {
|
|
|
|
t.Error("Expected folder to be paused")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete folder2
|
|
|
|
req, _ := http.NewRequest(http.MethodDelete, baseURL+folder2Path, nil)
|
|
|
|
do(req, http.StatusOK)
|
|
|
|
|
|
|
|
// Check folder1 is still there and folder2 gone
|
|
|
|
get("/rest/config/folders/folder1").Body.Close()
|
|
|
|
req, _ = http.NewRequest(http.MethodGet, baseURL+folder2Path, nil)
|
|
|
|
do(req, http.StatusNotFound)
|
|
|
|
|
|
|
|
mod(http.MethodPatch, "/rest/config/options", map[string]int{"maxSendKbps": 50})
|
|
|
|
resp = get("/rest/config/options")
|
|
|
|
var opts config.OptionsConfiguration
|
|
|
|
if err := unmarshalTo(resp.Body, &opts); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if opts.MaxSendKbps != 50 {
|
2022-08-23 13:44:11 +00:00
|
|
|
t.Error("Expected 50 for MaxSendKbps, got", opts.MaxSendKbps)
|
2020-10-22 17:54:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 12:15:03 +00:00
|
|
|
func TestSanitizedHostname(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
in, out string
|
|
|
|
}{
|
|
|
|
{"foo.BAR-baz", "foo.bar-baz"},
|
|
|
|
{"~.~-Min 1:a Räksmörgås-dator 😀😎 ~.~-", "min1araksmorgas-dator"},
|
|
|
|
{"Vicenç-PC", "vicenc-pc"},
|
|
|
|
{"~.~-~.~-", ""},
|
|
|
|
{"", ""},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
|
|
|
res, err := sanitizedHostname(tc.in)
|
|
|
|
if tc.out == "" && err == nil {
|
|
|
|
t.Errorf("%q should cause error", tc.in)
|
|
|
|
} else if res != tc.out {
|
|
|
|
t.Errorf("%q => %q, expected %q", tc.in, res, tc.out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-03 20:14:36 +00:00
|
|
|
// runningInContainer returns true if we are inside Docker or LXC. It might
|
|
|
|
// be prone to false negatives if things change in the future, but likely
|
|
|
|
// not false positives.
|
|
|
|
func runningInContainer() bool {
|
2022-07-28 17:36:39 +00:00
|
|
|
if !build.IsLinux {
|
2019-09-03 20:14:36 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2021-11-22 07:59:47 +00:00
|
|
|
bs, err := os.ReadFile("/proc/1/cgroup")
|
2019-09-03 20:14:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if bytes.Contains(bs, []byte("/docker/")) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if bytes.Contains(bs, []byte("/lxc/")) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|