user_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. package ovpm_test
  2. import (
  3. "fmt"
  4. "net"
  5. "reflect"
  6. "testing"
  7. "github.com/cad/ovpm/pki"
  8. "github.com/cad/ovpm"
  9. "github.com/sirupsen/logrus"
  10. )
  11. func TestCreateNewUser(t *testing.T) {
  12. // Initialize:
  13. db := ovpm.CreateDB("sqlite3", ":memory:")
  14. defer db.Cease()
  15. svr := ovpm.TheServer()
  16. svr.Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  17. // Preare:
  18. username := "test.User"
  19. password := "testPasswd1234"
  20. noGW := false
  21. // Test:
  22. user, err := ovpm.CreateNewUser(username, password, noGW, 0, true, "description")
  23. if err != nil {
  24. t.Fatalf("user can not be created: %v", err)
  25. }
  26. // Is user nil?
  27. if user == nil {
  28. t.Fatalf("user is expected to be 'NOT nil' but it is 'nil' %+v", user)
  29. }
  30. // Is user acutally exist in the system?
  31. user2, err := ovpm.GetUser(username)
  32. if err != nil {
  33. t.Fatalf("user can not be retrieved: %v", err)
  34. }
  35. // Are users the same?
  36. if !areUsersEqual(user, user2) {
  37. t.Fatalf("users are expected to be 'NOT TO DIFFER' but they are 'DIFFERENT'")
  38. }
  39. // Is user's server serial number correct?
  40. if !svr.CheckSerial(user.ServerSerialNumber) {
  41. t.Fatalf("user's ServerSerialNumber is expected to be 'CORRECT' but it is 'INCORRECT' instead %+v", user)
  42. }
  43. // Does User interface work properly?
  44. if user.GetUsername() != user.Username {
  45. t.Errorf("user.GetUsername() is expected to return '%s' but it returns '%s' %+v", user.Username, user.GetUsername(), user)
  46. }
  47. if user.GetServerSerialNumber() != user.ServerSerialNumber {
  48. t.Errorf("user.GetServerSerialNumber() is expected to return '%s' but it returns '%s' %+v", user.ServerSerialNumber, user.GetServerSerialNumber(), user)
  49. }
  50. if user.GetCert() != user.Cert {
  51. t.Errorf("user.GetCert() is expected to return '%s' but it returns '%s' %+v", user.Cert, user.GetCert(), user)
  52. }
  53. user.Delete()
  54. // Is NoGW attr working properly?
  55. noGW = true
  56. user, err = ovpm.CreateNewUser(username, password, noGW, 0, true, "description")
  57. if err != nil {
  58. t.Fatalf("user can not be created: %v", err)
  59. }
  60. if user.NoGW != noGW {
  61. t.Fatalf("user.NoGW is expected to be %t but it's %t instead", noGW, user.NoGW)
  62. }
  63. // Try to create a user with an invalid static ip.
  64. user = nil
  65. _, err = ovpm.CreateNewUser("staticuser", password, noGW, ovpm.IP2HostID(net.ParseIP("8.8.8.8").To4()), true, "description")
  66. if err == nil {
  67. t.Fatalf("user creation expected to err but it didn't")
  68. }
  69. // Test username validation.
  70. var usernametests = []struct {
  71. username string
  72. ok bool
  73. }{
  74. {"asdf1240asfd", true},
  75. {"asdf.asfd", true},
  76. {"asdf12.12asfd", true},
  77. {"asd1f-as4fd", false},
  78. {"as0df a01sfd", false},
  79. {"a6sdf_as1fd", true},
  80. }
  81. for _, tt := range usernametests {
  82. _, err := ovpm.CreateNewUser(tt.username, "1234", false, 0, true, "description")
  83. if ok := (err == nil); ok != tt.ok {
  84. t.Fatalf("expcted condition failed '%s': %v", tt.username, err)
  85. }
  86. }
  87. }
  88. func TestUserUpdate(t *testing.T) {
  89. // Initialize:
  90. db := ovpm.CreateDB("sqlite3", ":memory:")
  91. defer db.Cease()
  92. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  93. // Prepare:
  94. username := "testUser"
  95. password := "testPasswd1234"
  96. noGW := false
  97. // Test:
  98. user, err := ovpm.CreateNewUser(username, password, noGW, 0, true, "description")
  99. if err != nil {
  100. t.Fatalf("user can not be created: %v", err)
  101. }
  102. var updatetests = []struct {
  103. password string
  104. noGW bool
  105. hostid uint32
  106. ok bool
  107. }{
  108. {"testpw", false, 0, true},
  109. {"123", false, 0, true},
  110. {"123", false, 0, true},
  111. {"", true, 0, true},
  112. {"", true, ovpm.IP2HostID(net.ParseIP("10.10.10.10").To4()), false}, // Invalid static address.
  113. {"333", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), true},
  114. {"222", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), true},
  115. }
  116. for _, tt := range updatetests {
  117. err := user.Update(tt.password, tt.noGW, tt.hostid, true, "description")
  118. if (err == nil) != tt.ok {
  119. t.Errorf("user is expected to be able to update but it gave us this error instead: %v", err)
  120. }
  121. }
  122. }
  123. func TestUserPasswordCorrect(t *testing.T) {
  124. // Initialize:
  125. db := ovpm.CreateDB("sqlite3", ":memory:")
  126. defer db.Cease()
  127. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  128. // Prepare:
  129. initialPassword := "g00dp@ssW0rd9"
  130. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0, true, "description")
  131. // Test:
  132. // Is user created with the correct password?
  133. if !user.CheckPassword(initialPassword) {
  134. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", initialPassword, user)
  135. }
  136. }
  137. func TestUserPasswordReset(t *testing.T) {
  138. // Initialize:
  139. db := ovpm.CreateDB("sqlite3", ":memory:")
  140. defer db.Cease()
  141. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  142. // Prepare:
  143. initialPassword := "g00dp@ssW0rd9"
  144. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0, true, "description")
  145. // Test:
  146. // Reset user's password.
  147. newPassword := "@n0th3rP@ssw0rd"
  148. user.ResetPassword(newPassword)
  149. // Is newPassword set correctly?
  150. if !user.CheckPassword(newPassword) {
  151. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", newPassword, user)
  152. }
  153. // Is initialPassword is invalid now?
  154. if user.CheckPassword(initialPassword) {
  155. t.Fatalf("user's password must be '%s', but CheckPassword returns true for the old password '%s' %+v", newPassword, initialPassword, user)
  156. }
  157. }
  158. func TestUserDelete(t *testing.T) {
  159. // Initialize:
  160. db := ovpm.CreateDB("sqlite3", ":memory:")
  161. defer db.Cease()
  162. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  163. // Prepare:
  164. username := "testUser"
  165. user, _ := ovpm.CreateNewUser(username, "1234", false, 0, true, "description")
  166. // Test:
  167. // Is user fetchable?
  168. _, err := ovpm.GetUser(username)
  169. if err != nil {
  170. t.Fatalf("user '%s' expected to be 'EXIST', but we failed to get it %+v: %v", username, user, err)
  171. }
  172. // Delete the user.
  173. err = user.Delete()
  174. // Is user deleted?
  175. if err != nil {
  176. t.Fatalf("user is expected to be deleted, but we got this error instead: %v", err)
  177. }
  178. // Is user now fetchable? (It shouldn't be.)
  179. u1, err := ovpm.GetUser(username)
  180. if err == nil {
  181. t.Fatalf("user '%s' expected to be 'NOT EXIST', but it does exist instead: %v", username, user)
  182. }
  183. // Is user nil?
  184. if u1 != nil {
  185. t.Fatalf("not found user should be 'nil' but it's '%v' instead", u1)
  186. }
  187. }
  188. func TestUserGet(t *testing.T) {
  189. // Initialize:
  190. db := ovpm.CreateDB("sqlite3", ":memory:")
  191. defer db.Cease()
  192. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  193. // Prepare:
  194. username := "testUser"
  195. user, _ := ovpm.CreateNewUser(username, "1234", false, 0, true, "description")
  196. // Test:
  197. // Is user fetchable?
  198. fetchedUser, err := ovpm.GetUser(username)
  199. if err != nil {
  200. t.Fatalf("user should be fetchable but instead we got this error: %v", err)
  201. }
  202. // Is fetched user same with the created one?
  203. if !areUsersEqual(user, fetchedUser) {
  204. t.Fatalf("fetched user should be same with the created user but it differs")
  205. }
  206. }
  207. func TestUserGetAll(t *testing.T) {
  208. // Initialize:
  209. db := ovpm.CreateDB("sqlite3", ":memory:")
  210. defer db.Cease()
  211. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  212. count := 5
  213. // Prepare:
  214. var users []*ovpm.User
  215. for i := 0; i < count; i++ {
  216. username := fmt.Sprintf("user%d", i)
  217. password := fmt.Sprintf("password%d", i)
  218. user, _ := ovpm.CreateNewUser(username, password, false, 0, true, "description")
  219. users = append(users, user)
  220. }
  221. // Test:
  222. // Get all users.
  223. fetchedUsers, err := ovpm.GetAllUsers()
  224. // Is users are fetchable.
  225. if err != nil {
  226. t.Fatalf("users are expected to be fetchable but we got this error instead: %v", err)
  227. }
  228. // Is the fetched user count is correct?
  229. if len(fetchedUsers) != count {
  230. t.Fatalf("fetched user count is expected to be '%d', but it is '%d' instead", count, len(fetchedUsers))
  231. }
  232. // Are returned users same with the created ones?
  233. for i, user := range fetchedUsers {
  234. if !areUsersEqual(user, users[i]) {
  235. t.Fatalf("user %s[%d] is expected to be 'SAME' with the created one of it, but they are 'DIFFERENT'", user.GetUsername(), i)
  236. }
  237. }
  238. }
  239. func TestUserRenew(t *testing.T) {
  240. // Initialize:
  241. db := ovpm.CreateDB("sqlite3", ":memory:")
  242. defer db.Cease()
  243. svr := ovpm.TheServer()
  244. svr.Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  245. // Prepare:
  246. user, _ := ovpm.CreateNewUser("user", "1234", false, 0, true, "description")
  247. // Test:
  248. // Re initialize the server.
  249. svr.Init("example.com", "3333", ovpm.UDPProto, "", "", "", "", false) // This causes implicit Renew() on every user in the system.
  250. // Fetch user back.
  251. fetchedUser, _ := ovpm.GetUser(user.GetUsername())
  252. // Aren't users certificates different?
  253. if user.Cert == fetchedUser.Cert {
  254. t.Fatalf("fetched user's certificate is expected to be 'DIFFERENT' from the created user (since server is re initialized), but it's 'SAME' instead")
  255. }
  256. }
  257. func TestUserIPAllocator(t *testing.T) {
  258. // Initialize:
  259. db := ovpm.CreateDB("sqlite3", ":memory:")
  260. defer db.Cease()
  261. svr := ovpm.TheServer()
  262. svr.Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  263. // Prepare:
  264. // Test:
  265. var iptests = []struct {
  266. username string
  267. gw bool
  268. hostid uint32
  269. expectedIP string
  270. pass bool
  271. }{
  272. {"user1", false, 0, "10.9.0.2/24", true},
  273. {"user2", false, 0, "10.9.0.3/24", true},
  274. {"user3", true, 0, "10.9.0.4/24", true},
  275. {"user4", true, ovpm.IP2HostID(net.ParseIP("10.9.0.5").To4()), "10.9.0.5/24", true},
  276. {"user6", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), "10.9.0.7/24", true},
  277. {"user7", true, 0, "10.9.0.6/24", true},
  278. {"user6", true, ovpm.IP2HostID(net.ParseIP("10.9.0.1").To4()), "10.9.0.7/24", false},
  279. }
  280. for _, tt := range iptests {
  281. user, err := ovpm.CreateNewUser(tt.username, "pass", tt.gw, tt.hostid, true, "description")
  282. if (err == nil) == !tt.pass {
  283. t.Fatalf("expected pass %t %s", tt.pass, err)
  284. }
  285. if user != nil {
  286. if user.GetIPNet() != tt.expectedIP {
  287. t.Fatalf("user %s ip %s(%d) is expected to be %s", user.GetUsername(), user.GetIPNet(), user.GetHostID(), tt.expectedIP)
  288. }
  289. }
  290. }
  291. }
  292. func TestUser_ExpiresAt(t *testing.T) {
  293. // Initialize:
  294. db := ovpm.CreateDB("sqlite3", ":memory:")
  295. defer db.Cease()
  296. svr := ovpm.TheServer()
  297. svr.Init("localhost", "", ovpm.UDPProto, "", "", "", "", false)
  298. // Test:
  299. u1, err := ovpm.CreateNewUser("test", "1234", true, 0, false, "description")
  300. if err != nil {
  301. t.Fatalf("test preperation failed: %v", err)
  302. }
  303. cert, err := pki.ReadCertFromPEM(u1.Cert)
  304. if err != nil {
  305. t.Fatalf("test preperation failed: %v", err)
  306. }
  307. if !reflect.DeepEqual(u1.ExpiresAt(), cert.NotAfter) {
  308. t.Errorf("got (%s), want (%s)", u1.ExpiresAt(), cert.NotAfter)
  309. }
  310. }
  311. // areUsersEqual compares given users and returns true if they are the same.
  312. func areUsersEqual(user1, user2 *ovpm.User) bool {
  313. if user1.GetCert() != user2.GetCert() {
  314. logrus.Infof("Cert %v != %v", user1.GetCert(), user2.GetCert())
  315. return false
  316. }
  317. if user1.GetUsername() != user2.GetUsername() {
  318. logrus.Infof("Username %v != %v", user1.GetUsername(), user2.GetUsername())
  319. return false
  320. }
  321. if user1.GetServerSerialNumber() != user2.GetServerSerialNumber() {
  322. logrus.Infof("ServerSerialNumber %v != %v", user1.GetServerSerialNumber(), user2.GetServerSerialNumber())
  323. return false
  324. }
  325. logrus.Infof("users are the same!")
  326. return true
  327. }
  328. func init() {
  329. ovpm.Testing = true
  330. }