// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved. // See LICENSE.txt for license information. package config import ( "testing" "github.com/stretchr/testify/assert" "github.com/mattermost/mattermost-server/v5/model" "github.com/mattermost/mattermost-server/v5/utils" ) func TestDesanitize(t *testing.T) { actual := &model.Config{} actual.SetDefaults() // These setting should be ignored actual.LdapSettings.Enable = bToP(false) actual.FileSettings.DriverName = sToP("s3") // These settings should be desanitized into target. actual.LdapSettings.BindPassword = sToP("bind_password") actual.FileSettings.PublicLinkSalt = sToP("public_link_salt") actual.FileSettings.AmazonS3SecretAccessKey = sToP("amazon_s3_secret_access_key") actual.EmailSettings.SMTPPassword = sToP("smtp_password") actual.GitLabSettings.Secret = sToP("secret") actual.SqlSettings.DataSource = sToP("data_source") actual.SqlSettings.AtRestEncryptKey = sToP("at_rest_encrypt_key") actual.ElasticsearchSettings.Password = sToP("password") actual.SqlSettings.DataSourceReplicas = append(actual.SqlSettings.DataSourceReplicas, "replica0") actual.SqlSettings.DataSourceReplicas = append(actual.SqlSettings.DataSourceReplicas, "replica1") actual.SqlSettings.DataSourceSearchReplicas = append(actual.SqlSettings.DataSourceSearchReplicas, "search_replica0") actual.SqlSettings.DataSourceSearchReplicas = append(actual.SqlSettings.DataSourceSearchReplicas, "search_replica1") target := &model.Config{} target.SetDefaults() // These setting should be ignored target.LdapSettings.Enable = bToP(true) target.FileSettings.DriverName = sToP("file") // These settings should be updated from actual target.LdapSettings.BindPassword = sToP(model.FAKE_SETTING) target.FileSettings.PublicLinkSalt = sToP(model.FAKE_SETTING) target.FileSettings.AmazonS3SecretAccessKey = sToP(model.FAKE_SETTING) target.EmailSettings.SMTPPassword = sToP(model.FAKE_SETTING) target.GitLabSettings.Secret = sToP(model.FAKE_SETTING) target.SqlSettings.DataSource = sToP(model.FAKE_SETTING) target.SqlSettings.AtRestEncryptKey = sToP(model.FAKE_SETTING) target.ElasticsearchSettings.Password = sToP(model.FAKE_SETTING) target.SqlSettings.DataSourceReplicas = append(target.SqlSettings.DataSourceReplicas, "old_replica0") target.SqlSettings.DataSourceSearchReplicas = append(target.SqlSettings.DataSourceReplicas, "old_search_replica0") actualClone := actual.Clone() desanitize(actual, target) assert.Equal(t, actualClone, actual, "actual should not have been changed") // Verify the settings that should have been left untouched in target assert.True(t, *target.LdapSettings.Enable, "LdapSettings.Enable should not have changed") assert.Equal(t, "file", *target.FileSettings.DriverName, "FileSettings.DriverName should not have been changed") // Verify the settings that should have been desanitized into target assert.Equal(t, *actual.LdapSettings.BindPassword, *target.LdapSettings.BindPassword) assert.Equal(t, *actual.FileSettings.PublicLinkSalt, *target.FileSettings.PublicLinkSalt) assert.Equal(t, *actual.FileSettings.AmazonS3SecretAccessKey, *target.FileSettings.AmazonS3SecretAccessKey) assert.Equal(t, *actual.EmailSettings.SMTPPassword, *target.EmailSettings.SMTPPassword) assert.Equal(t, *actual.GitLabSettings.Secret, *target.GitLabSettings.Secret) assert.Equal(t, *actual.SqlSettings.DataSource, *target.SqlSettings.DataSource) assert.Equal(t, *actual.SqlSettings.AtRestEncryptKey, *target.SqlSettings.AtRestEncryptKey) assert.Equal(t, *actual.ElasticsearchSettings.Password, *target.ElasticsearchSettings.Password) assert.Equal(t, actual.SqlSettings.DataSourceReplicas, target.SqlSettings.DataSourceReplicas) assert.Equal(t, actual.SqlSettings.DataSourceSearchReplicas, target.SqlSettings.DataSourceSearchReplicas) } func TestFixInvalidLocales(t *testing.T) { utils.TranslationsPreInit() cfg := &model.Config{} cfg.SetDefaults() *cfg.LocalizationSettings.DefaultServerLocale = "en" *cfg.LocalizationSettings.DefaultClientLocale = "en" *cfg.LocalizationSettings.AvailableLocales = "" changed := FixInvalidLocales(cfg) assert.False(t, changed) *cfg.LocalizationSettings.DefaultServerLocale = "junk" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "en", *cfg.LocalizationSettings.DefaultServerLocale) *cfg.LocalizationSettings.DefaultServerLocale = "" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "en", *cfg.LocalizationSettings.DefaultServerLocale) *cfg.LocalizationSettings.AvailableLocales = "en" *cfg.LocalizationSettings.DefaultServerLocale = "de" changed = FixInvalidLocales(cfg) assert.False(t, changed) assert.NotContains(t, *cfg.LocalizationSettings.AvailableLocales, *cfg.LocalizationSettings.DefaultServerLocale, "DefaultServerLocale should not be added to AvailableLocales") *cfg.LocalizationSettings.AvailableLocales = "" *cfg.LocalizationSettings.DefaultClientLocale = "junk" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "en", *cfg.LocalizationSettings.DefaultClientLocale) *cfg.LocalizationSettings.DefaultClientLocale = "" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "en", *cfg.LocalizationSettings.DefaultClientLocale) *cfg.LocalizationSettings.AvailableLocales = "en" *cfg.LocalizationSettings.DefaultClientLocale = "de" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Contains(t, *cfg.LocalizationSettings.AvailableLocales, *cfg.LocalizationSettings.DefaultServerLocale, "DefaultClientLocale should have been added to AvailableLocales") // validate AvailableLocales *cfg.LocalizationSettings.DefaultServerLocale = "en" *cfg.LocalizationSettings.DefaultClientLocale = "en" *cfg.LocalizationSettings.AvailableLocales = "junk" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "", *cfg.LocalizationSettings.AvailableLocales) *cfg.LocalizationSettings.AvailableLocales = "en,de,junk" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.Equal(t, "", *cfg.LocalizationSettings.AvailableLocales) *cfg.LocalizationSettings.DefaultServerLocale = "fr" *cfg.LocalizationSettings.DefaultClientLocale = "de" *cfg.LocalizationSettings.AvailableLocales = "en" changed = FixInvalidLocales(cfg) assert.True(t, changed) assert.NotContains(t, *cfg.LocalizationSettings.AvailableLocales, *cfg.LocalizationSettings.DefaultServerLocale, "DefaultServerLocale should not be added to AvailableLocales") assert.Contains(t, *cfg.LocalizationSettings.AvailableLocales, *cfg.LocalizationSettings.DefaultClientLocale, "DefaultClientLocale should have been added to AvailableLocales") } func TestStripPassword(t *testing.T) { for name, test := range map[string]struct { DSN string Schema string ExpectedOut string }{ "mysql": { DSN: "mysql://mmuser:password@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", Schema: "mysql", ExpectedOut: "mysql://mmuser:@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", }, "mysql idempotent": { DSN: "mysql://mmuser:@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", Schema: "mysql", ExpectedOut: "mysql://mmuser:@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", }, "mysql: password with : and @": { DSN: "mysql://mmuser:p:assw@ord@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", Schema: "mysql", ExpectedOut: "mysql://mmuser:@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", }, "mysql: password with @ and :": { DSN: "mysql://mmuser:pa@sswo:rd@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", Schema: "mysql", ExpectedOut: "mysql://mmuser:@tcp(localhost:3306)/mattermost?charset=utf8mb4,utf8&readTimeout=30s", }, "postgres": { DSN: "postgres://mmuser:password@localhost:5432/mattermost?sslmode=disable&connect_timeout=10", Schema: "postgres", ExpectedOut: "postgres://mmuser:@localhost:5432/mattermost?sslmode=disable&connect_timeout=10", }, "pipe": { DSN: "mysql://user@unix(/path/to/socket)/dbname", Schema: "mysql", ExpectedOut: "mysql://user@unix(/path/to/socket)/dbname", }, "malformed without :": { DSN: "postgres://mmuserpassword@localhost:5432/mattermost?sslmode=disable&connect_timeout=10", Schema: "postgres", ExpectedOut: "postgres://mmuserpassword@localhost:5432/mattermost?sslmode=disable&connect_timeout=10", }, "malformed without @": { DSN: "postgres://mmuser:passwordlocalhost:5432/mattermost?sslmode=disable&connect_timeout=10", Schema: "postgres", ExpectedOut: "(omitted due to error parsing the DSN)", }, } { t.Run(name, func(t *testing.T) { out := stripPassword(test.DSN, test.Schema) assert.Equal(t, test.ExpectedOut, out) }) } } func sToP(s string) *string { return &s } func bToP(b bool) *bool { return &b }