1
0

user_test.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. package ovpm_test
  2. import (
  3. "fmt"
  4. "testing"
  5. "github.com/Sirupsen/logrus"
  6. "github.com/cad/ovpm"
  7. )
  8. func TestCreateNewUser(t *testing.T) {
  9. // Initialize:
  10. ovpm.Testing = true
  11. ovpm.SetupDB("sqlite3", ":memory:")
  12. defer ovpm.CeaseDB()
  13. ovpm.Init("localhost", "")
  14. server, _ := ovpm.GetServerInstance()
  15. // Prepare:
  16. username := "testUser"
  17. password := "testPasswd1234"
  18. // Test:
  19. user, err := ovpm.CreateNewUser(username, password)
  20. if err != nil {
  21. t.Fatalf("user can not be created: %v", err)
  22. }
  23. // Is user nil?
  24. if user == nil {
  25. t.Fatalf("user is expected to be 'NOT nil' but it is 'nil' %+v", user)
  26. }
  27. // Is user empty?
  28. if *user == (ovpm.DBUser{}) {
  29. t.Fatalf("user is expected to be 'NOT EMPTY' but it is 'EMPTY' %+v", user)
  30. }
  31. // Is user acutally exist in the system?
  32. user2, err := ovpm.GetUser(username)
  33. if err != nil {
  34. t.Fatalf("user can not be retrieved: %v", err)
  35. }
  36. // Are users the same?
  37. if !areUsersEqual(user, user2) {
  38. t.Fatalf("users are expected to be 'NOT TO DIFFER' but they are 'DIFFERENT'")
  39. }
  40. // Is user's server serial number correct?
  41. if !server.CheckSerial(user.ServerSerialNumber) {
  42. t.Fatalf("user's ServerSerialNumber is expected to be 'CORRECT' but it is 'INCORRECT' instead %+v", user)
  43. }
  44. // Does User interface work properly?
  45. if user.GetUsername() != user.Username {
  46. t.Errorf("user.GetUsername() is expected to return '%s' but it returns '%s' %+v", user.Username, user.GetUsername(), user)
  47. }
  48. if user.GetServerSerialNumber() != user.ServerSerialNumber {
  49. t.Errorf("user.GetServerSerialNumber() is expected to return '%s' but it returns '%s' %+v", user.ServerSerialNumber, user.GetServerSerialNumber(), user)
  50. }
  51. if user.GetCert() != user.Cert {
  52. t.Errorf("user.GetCert() is expected to return '%s' but it returns '%s' %+v", user.Cert, user.GetCert(), user)
  53. }
  54. }
  55. func TestUserPasswordCorrect(t *testing.T) {
  56. // Initialize:
  57. ovpm.Testing = true
  58. ovpm.SetupDB("sqlite3", ":memory:")
  59. defer ovpm.CeaseDB()
  60. ovpm.Init("localhost", "")
  61. // Prepare:
  62. initialPassword := "g00dp@ssW0rd9"
  63. user, _ := ovpm.CreateNewUser("testUser", initialPassword)
  64. // Test:
  65. // Is user created with the correct password?
  66. if !user.CheckPassword(initialPassword) {
  67. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", initialPassword, user)
  68. }
  69. }
  70. func TestUserPasswordReset(t *testing.T) {
  71. // Initialize:
  72. ovpm.Testing = true
  73. ovpm.SetupDB("sqlite3", ":memory:")
  74. defer ovpm.CeaseDB()
  75. ovpm.Init("localhost", "")
  76. // Prepare:
  77. initialPassword := "g00dp@ssW0rd9"
  78. user, _ := ovpm.CreateNewUser("testUser", initialPassword)
  79. // Test:
  80. // Reset user's password.
  81. newPassword := "@n0th3rP@ssw0rd"
  82. user.ResetPassword(newPassword)
  83. // Is newPassword set correctly?
  84. if !user.CheckPassword(newPassword) {
  85. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", newPassword, user)
  86. }
  87. // Is initialPassword is invalid now?
  88. if user.CheckPassword(initialPassword) {
  89. t.Fatalf("user's password must be '%s', but CheckPassword returns true for the old password '%s' %+v", newPassword, initialPassword, user)
  90. }
  91. }
  92. func TestUserDelete(t *testing.T) {
  93. // Initialize:
  94. ovpm.Testing = true
  95. ovpm.SetupDB("sqlite3", ":memory:")
  96. defer ovpm.CeaseDB()
  97. ovpm.Init("localhost", "")
  98. // Prepare:
  99. username := "testUser"
  100. user, _ := ovpm.CreateNewUser(username, "1234")
  101. // Test:
  102. // Is user fetchable?
  103. _, err := ovpm.GetUser(username)
  104. if err != nil {
  105. t.Fatalf("user '%s' expected to be 'EXIST', but we failed to get it %+v: %v", username, user, err)
  106. }
  107. // Delete the user.
  108. err = user.Delete()
  109. // Is user deleted?
  110. if err != nil {
  111. t.Fatalf("user is expected to be deleted, but we got this error instead: %v", err)
  112. }
  113. // Is user now fetchable? (It shouldn't be.)
  114. u1, err := ovpm.GetUser(username)
  115. if err == nil {
  116. t.Fatalf("user '%s' expected to be 'NOT EXIST', but it does exist instead: %v", username, user)
  117. }
  118. // Is user nil?
  119. if u1 != nil {
  120. t.Fatalf("not found user should be 'nil' but it's '%v' instead", u1)
  121. }
  122. }
  123. func TestUserGet(t *testing.T) {
  124. // Initialize:
  125. ovpm.Testing = true
  126. ovpm.SetupDB("sqlite3", ":memory:")
  127. defer ovpm.CeaseDB()
  128. ovpm.Init("localhost", "")
  129. // Prepare:
  130. username := "testUser"
  131. user, _ := ovpm.CreateNewUser(username, "1234")
  132. // Test:
  133. // Is user fetchable?
  134. fetchedUser, err := ovpm.GetUser(username)
  135. if err != nil {
  136. t.Fatalf("user should be fetchable but instead we got this error: %v", err)
  137. }
  138. // Is fetched user same with the created one?
  139. if !areUsersEqual(user, fetchedUser) {
  140. t.Fatalf("fetched user should be same with the created user but it differs")
  141. }
  142. }
  143. func TestUserGetAll(t *testing.T) {
  144. // Initialize:
  145. ovpm.Testing = true
  146. ovpm.SetupDB("sqlite3", ":memory:")
  147. defer ovpm.CeaseDB()
  148. ovpm.Init("localhost", "")
  149. count := 5
  150. // Prepare:
  151. var users []*ovpm.DBUser
  152. for i := 0; i < count; i++ {
  153. username := fmt.Sprintf("user%d", i)
  154. password := fmt.Sprintf("password%d", i)
  155. user, _ := ovpm.CreateNewUser(username, password)
  156. users = append(users, user)
  157. }
  158. // Test:
  159. // Get all users.
  160. fetchedUsers, err := ovpm.GetAllUsers()
  161. // Is users are fetchable.
  162. if err != nil {
  163. t.Fatalf("users are expected to be fetchable but we got this error instead: %v", err)
  164. }
  165. // Is the fetched user count is correct?
  166. if len(fetchedUsers) != count {
  167. t.Fatalf("fetched user count is expected to be '%d', but it is '%d' instead", count, len(fetchedUsers))
  168. }
  169. // Are returned users same with the created ones?
  170. for i, user := range fetchedUsers {
  171. if !areUsersEqual(user, users[i]) {
  172. t.Fatalf("user %s[%d] is expected to be 'SAME' with the created one of it, but they are 'DIFFERENT'", user.GetUsername(), i)
  173. }
  174. }
  175. }
  176. func TestUserRenew(t *testing.T) {
  177. // Initialize:
  178. ovpm.Testing = true
  179. ovpm.SetupDB("sqlite3", ":memory:")
  180. defer ovpm.CeaseDB()
  181. ovpm.Init("localhost", "")
  182. // Prepare:
  183. user, _ := ovpm.CreateNewUser("user", "1234")
  184. // Test:
  185. // Re initialize the server.
  186. ovpm.Init("example.com", "3333") // This causes implicit Renew() on every user in the system.
  187. // Fetch user back.
  188. fetchedUser, _ := ovpm.GetUser(user.GetUsername())
  189. // Aren't users certificates different?
  190. if user.Cert == fetchedUser.Cert {
  191. t.Fatalf("fetched user's certificate is expected to be 'DIFFERENT' from the created user (since server is re initialized), but it's 'SAME' instead")
  192. }
  193. }
  194. // areUsersEqual compares given users and returns true if they are the same.
  195. func areUsersEqual(user1, user2 *ovpm.DBUser) bool {
  196. if user1.Cert != user2.Cert {
  197. logrus.Info("Cert %v != %v", user1.Cert, user2.Cert)
  198. return false
  199. }
  200. if user1.Username != user2.Username {
  201. logrus.Infof("Username %v != %v", user1.Username, user2.Username)
  202. return false
  203. }
  204. if user1.Password != user2.Password {
  205. logrus.Infof("Password %v != %v", user1.Password, user2.Password)
  206. return false
  207. }
  208. if user1.ServerSerialNumber != user2.ServerSerialNumber {
  209. logrus.Infof("ServerSerialNumber %v != %v", user1.ServerSerialNumber, user2.ServerSerialNumber)
  210. return false
  211. }
  212. logrus.Infof("users are the same!")
  213. return true
  214. }