user_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368
  1. package ovpm_test
  2. import (
  3. "fmt"
  4. "net"
  5. "testing"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/cad/ovpm"
  8. )
  9. func TestCreateNewUser(t *testing.T) {
  10. // Initialize:
  11. db := ovpm.CreateDB("sqlite3", ":memory:")
  12. defer db.Cease()
  13. svr := ovpm.TheServer()
  14. svr.Init("localhost", "", ovpm.UDPProto, "", "")
  15. // Prepare:
  16. username := "test.User"
  17. password := "testPasswd1234"
  18. noGW := false
  19. // Test:
  20. user, err := ovpm.CreateNewUser(username, password, noGW, 0, true)
  21. if err != nil {
  22. t.Fatalf("user can not be created: %v", err)
  23. }
  24. // Is user nil?
  25. if user == nil {
  26. t.Fatalf("user is expected to be 'NOT nil' but it is 'nil' %+v", user)
  27. }
  28. // Is user acutally exist in the system?
  29. user2, err := ovpm.GetUser(username)
  30. if err != nil {
  31. t.Fatalf("user can not be retrieved: %v", err)
  32. }
  33. // Are users the same?
  34. if !areUsersEqual(user, user2) {
  35. t.Fatalf("users are expected to be 'NOT TO DIFFER' but they are 'DIFFERENT'")
  36. }
  37. // Is user's server serial number correct?
  38. if !svr.CheckSerial(user.ServerSerialNumber) {
  39. t.Fatalf("user's ServerSerialNumber is expected to be 'CORRECT' but it is 'INCORRECT' instead %+v", user)
  40. }
  41. // Does User interface work properly?
  42. if user.GetUsername() != user.Username {
  43. t.Errorf("user.GetUsername() is expected to return '%s' but it returns '%s' %+v", user.Username, user.GetUsername(), user)
  44. }
  45. if user.GetServerSerialNumber() != user.ServerSerialNumber {
  46. t.Errorf("user.GetServerSerialNumber() is expected to return '%s' but it returns '%s' %+v", user.ServerSerialNumber, user.GetServerSerialNumber(), user)
  47. }
  48. if user.GetCert() != user.Cert {
  49. t.Errorf("user.GetCert() is expected to return '%s' but it returns '%s' %+v", user.Cert, user.GetCert(), user)
  50. }
  51. user.Delete()
  52. // Is NoGW attr working properly?
  53. noGW = true
  54. user, err = ovpm.CreateNewUser(username, password, noGW, 0, true)
  55. if err != nil {
  56. t.Fatalf("user can not be created: %v", err)
  57. }
  58. if user.NoGW != noGW {
  59. t.Fatalf("user.NoGW is expected to be %t but it's %t instead", noGW, user.NoGW)
  60. }
  61. // Try to create a user with an invalid static ip.
  62. user = nil
  63. _, err = ovpm.CreateNewUser("staticuser", password, noGW, ovpm.IP2HostID(net.ParseIP("8.8.8.8").To4()), true)
  64. if err == nil {
  65. t.Fatalf("user creation expected to err but it didn't")
  66. }
  67. // Test username validation.
  68. var usernametests = []struct {
  69. username string
  70. ok bool
  71. }{
  72. {"asdf1240asfd", true},
  73. {"asdf.asfd", true},
  74. {"asdf12.12asfd", true},
  75. {"asd1f-as4fd", false},
  76. {"as0df a01sfd", false},
  77. {"a6sdf_as1fd", true},
  78. }
  79. for _, tt := range usernametests {
  80. _, err := ovpm.CreateNewUser(tt.username, "1234", false, 0, true)
  81. if ok := (err == nil); ok != tt.ok {
  82. t.Fatalf("expcted condition failed '%s': %v", tt.username, err)
  83. }
  84. }
  85. }
  86. func TestUserUpdate(t *testing.T) {
  87. // Initialize:
  88. db := ovpm.CreateDB("sqlite3", ":memory:")
  89. defer db.Cease()
  90. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  91. // Prepare:
  92. username := "testUser"
  93. password := "testPasswd1234"
  94. noGW := false
  95. // Test:
  96. user, err := ovpm.CreateNewUser(username, password, noGW, 0, true)
  97. if err != nil {
  98. t.Fatalf("user can not be created: %v", err)
  99. }
  100. var updatetests = []struct {
  101. password string
  102. noGW bool
  103. hostid uint32
  104. ok bool
  105. }{
  106. {"testpw", false, 0, true},
  107. {"123", false, 0, true},
  108. {"123", false, 0, true},
  109. {"", true, 0, true},
  110. {"", true, ovpm.IP2HostID(net.ParseIP("10.10.10.10").To4()), false}, // Invalid static address.
  111. {"333", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), true},
  112. {"222", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), true},
  113. }
  114. for _, tt := range updatetests {
  115. err := user.Update(tt.password, tt.noGW, tt.hostid, true)
  116. if (err == nil) != tt.ok {
  117. t.Errorf("user is expected to be able to update but it gave us this error instead: %v", err)
  118. }
  119. }
  120. }
  121. func TestUserPasswordCorrect(t *testing.T) {
  122. // Initialize:
  123. db := ovpm.CreateDB("sqlite3", ":memory:")
  124. defer db.Cease()
  125. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  126. // Prepare:
  127. initialPassword := "g00dp@ssW0rd9"
  128. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0, true)
  129. // Test:
  130. // Is user created with the correct password?
  131. if !user.CheckPassword(initialPassword) {
  132. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", initialPassword, user)
  133. }
  134. }
  135. func TestUserPasswordReset(t *testing.T) {
  136. // Initialize:
  137. db := ovpm.CreateDB("sqlite3", ":memory:")
  138. defer db.Cease()
  139. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  140. // Prepare:
  141. initialPassword := "g00dp@ssW0rd9"
  142. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0, true)
  143. // Test:
  144. // Reset user's password.
  145. newPassword := "@n0th3rP@ssw0rd"
  146. user.ResetPassword(newPassword)
  147. // Is newPassword set correctly?
  148. if !user.CheckPassword(newPassword) {
  149. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", newPassword, user)
  150. }
  151. // Is initialPassword is invalid now?
  152. if user.CheckPassword(initialPassword) {
  153. t.Fatalf("user's password must be '%s', but CheckPassword returns true for the old password '%s' %+v", newPassword, initialPassword, user)
  154. }
  155. }
  156. func TestUserDelete(t *testing.T) {
  157. // Initialize:
  158. db := ovpm.CreateDB("sqlite3", ":memory:")
  159. defer db.Cease()
  160. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  161. // Prepare:
  162. username := "testUser"
  163. user, _ := ovpm.CreateNewUser(username, "1234", false, 0, true)
  164. // Test:
  165. // Is user fetchable?
  166. _, err := ovpm.GetUser(username)
  167. if err != nil {
  168. t.Fatalf("user '%s' expected to be 'EXIST', but we failed to get it %+v: %v", username, user, err)
  169. }
  170. // Delete the user.
  171. err = user.Delete()
  172. // Is user deleted?
  173. if err != nil {
  174. t.Fatalf("user is expected to be deleted, but we got this error instead: %v", err)
  175. }
  176. // Is user now fetchable? (It shouldn't be.)
  177. u1, err := ovpm.GetUser(username)
  178. if err == nil {
  179. t.Fatalf("user '%s' expected to be 'NOT EXIST', but it does exist instead: %v", username, user)
  180. }
  181. // Is user nil?
  182. if u1 != nil {
  183. t.Fatalf("not found user should be 'nil' but it's '%v' instead", u1)
  184. }
  185. }
  186. func TestUserGet(t *testing.T) {
  187. // Initialize:
  188. db := ovpm.CreateDB("sqlite3", ":memory:")
  189. defer db.Cease()
  190. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  191. // Prepare:
  192. username := "testUser"
  193. user, _ := ovpm.CreateNewUser(username, "1234", false, 0, true)
  194. // Test:
  195. // Is user fetchable?
  196. fetchedUser, err := ovpm.GetUser(username)
  197. if err != nil {
  198. t.Fatalf("user should be fetchable but instead we got this error: %v", err)
  199. }
  200. // Is fetched user same with the created one?
  201. if !areUsersEqual(user, fetchedUser) {
  202. t.Fatalf("fetched user should be same with the created user but it differs")
  203. }
  204. }
  205. func TestUserGetAll(t *testing.T) {
  206. // Initialize:
  207. db := ovpm.CreateDB("sqlite3", ":memory:")
  208. defer db.Cease()
  209. ovpm.TheServer().Init("localhost", "", ovpm.UDPProto, "", "")
  210. count := 5
  211. // Prepare:
  212. var users []*ovpm.User
  213. for i := 0; i < count; i++ {
  214. username := fmt.Sprintf("user%d", i)
  215. password := fmt.Sprintf("password%d", i)
  216. user, _ := ovpm.CreateNewUser(username, password, false, 0, true)
  217. users = append(users, user)
  218. }
  219. // Test:
  220. // Get all users.
  221. fetchedUsers, err := ovpm.GetAllUsers()
  222. // Is users are fetchable.
  223. if err != nil {
  224. t.Fatalf("users are expected to be fetchable but we got this error instead: %v", err)
  225. }
  226. // Is the fetched user count is correct?
  227. if len(fetchedUsers) != count {
  228. t.Fatalf("fetched user count is expected to be '%d', but it is '%d' instead", count, len(fetchedUsers))
  229. }
  230. // Are returned users same with the created ones?
  231. for i, user := range fetchedUsers {
  232. if !areUsersEqual(user, users[i]) {
  233. t.Fatalf("user %s[%d] is expected to be 'SAME' with the created one of it, but they are 'DIFFERENT'", user.GetUsername(), i)
  234. }
  235. }
  236. }
  237. func TestUserRenew(t *testing.T) {
  238. // Initialize:
  239. db := ovpm.CreateDB("sqlite3", ":memory:")
  240. defer db.Cease()
  241. svr := ovpm.TheServer()
  242. svr.Init("localhost", "", ovpm.UDPProto, "", "")
  243. // Prepare:
  244. user, _ := ovpm.CreateNewUser("user", "1234", false, 0, true)
  245. // Test:
  246. // Re initialize the server.
  247. svr.Init("example.com", "3333", ovpm.UDPProto, "", "") // This causes implicit Renew() on every user in the system.
  248. // Fetch user back.
  249. fetchedUser, _ := ovpm.GetUser(user.GetUsername())
  250. // Aren't users certificates different?
  251. if user.Cert == fetchedUser.Cert {
  252. t.Fatalf("fetched user's certificate is expected to be 'DIFFERENT' from the created user (since server is re initialized), but it's 'SAME' instead")
  253. }
  254. }
  255. func TestUserIPAllocator(t *testing.T) {
  256. // Initialize:
  257. db := ovpm.CreateDB("sqlite3", ":memory:")
  258. defer db.Cease()
  259. svr := ovpm.TheServer()
  260. svr.Init("localhost", "", ovpm.UDPProto, "", "")
  261. // Prepare:
  262. // Test:
  263. var iptests = []struct {
  264. username string
  265. gw bool
  266. hostid uint32
  267. expectedIP string
  268. pass bool
  269. }{
  270. {"user1", false, 0, "10.9.0.2/24", true},
  271. {"user2", false, 0, "10.9.0.3/24", true},
  272. {"user3", true, 0, "10.9.0.4/24", true},
  273. {"user4", true, ovpm.IP2HostID(net.ParseIP("10.9.0.5").To4()), "10.9.0.5/24", true},
  274. {"user6", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), "10.9.0.7/24", true},
  275. {"user7", true, 0, "10.9.0.6/24", true},
  276. {"user6", true, ovpm.IP2HostID(net.ParseIP("10.9.0.1").To4()), "10.9.0.7/24", false},
  277. }
  278. for _, tt := range iptests {
  279. user, err := ovpm.CreateNewUser(tt.username, "pass", tt.gw, tt.hostid, true)
  280. if (err == nil) == !tt.pass {
  281. t.Fatalf("expected pass %t %s", tt.pass, err)
  282. }
  283. if user != nil {
  284. if user.GetIPNet() != tt.expectedIP {
  285. t.Fatalf("user %s ip %s(%d) is expected to be %s", user.GetUsername(), user.GetIPNet(), user.GetHostID(), tt.expectedIP)
  286. }
  287. }
  288. }
  289. }
  290. // areUsersEqual compares given users and returns true if they are the same.
  291. func areUsersEqual(user1, user2 *ovpm.User) bool {
  292. if user1.GetCert() != user2.GetCert() {
  293. logrus.Info("Cert %v != %v", user1.GetCert(), user2.GetCert())
  294. return false
  295. }
  296. if user1.GetUsername() != user2.GetUsername() {
  297. logrus.Infof("Username %v != %v", user1.GetUsername(), user2.GetUsername())
  298. return false
  299. }
  300. if user1.GetServerSerialNumber() != user2.GetServerSerialNumber() {
  301. logrus.Infof("ServerSerialNumber %v != %v", user1.GetServerSerialNumber(), user2.GetServerSerialNumber())
  302. return false
  303. }
  304. logrus.Infof("users are the same!")
  305. return true
  306. }
  307. func init() {
  308. ovpm.Testing = true
  309. }