user_test.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. package ovpm_test
  2. import (
  3. "fmt"
  4. "net"
  5. "testing"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/cad/ovpm"
  8. )
  9. func TestCreateNewUser(t *testing.T) {
  10. // Initialize:
  11. ovpm.SetupDB("sqlite3", ":memory:")
  12. defer ovpm.CeaseDB()
  13. ovpm.Init("localhost", "", ovpm.UDPProto)
  14. server, _ := ovpm.GetServerInstance()
  15. // Prepare:
  16. username := "testUser"
  17. password := "testPasswd1234"
  18. noGW := false
  19. // Test:
  20. user, err := ovpm.CreateNewUser(username, password, noGW, 0)
  21. if err != nil {
  22. t.Fatalf("user can not be created: %v", err)
  23. }
  24. // Is user nil?
  25. if user == nil {
  26. t.Fatalf("user is expected to be 'NOT nil' but it is 'nil' %+v", user)
  27. }
  28. // Is user empty?
  29. if *user == (ovpm.DBUser{}) {
  30. t.Fatalf("user is expected to be 'NOT EMPTY' but it is 'EMPTY' %+v", user)
  31. }
  32. // Is user acutally exist in the system?
  33. user2, err := ovpm.GetUser(username)
  34. if err != nil {
  35. t.Fatalf("user can not be retrieved: %v", err)
  36. }
  37. // Are users the same?
  38. if !areUsersEqual(user, user2) {
  39. t.Fatalf("users are expected to be 'NOT TO DIFFER' but they are 'DIFFERENT'")
  40. }
  41. // Is user's server serial number correct?
  42. if !server.CheckSerial(user.ServerSerialNumber) {
  43. t.Fatalf("user's ServerSerialNumber is expected to be 'CORRECT' but it is 'INCORRECT' instead %+v", user)
  44. }
  45. // Does User interface work properly?
  46. if user.GetUsername() != user.Username {
  47. t.Errorf("user.GetUsername() is expected to return '%s' but it returns '%s' %+v", user.Username, user.GetUsername(), user)
  48. }
  49. if user.GetServerSerialNumber() != user.ServerSerialNumber {
  50. t.Errorf("user.GetServerSerialNumber() is expected to return '%s' but it returns '%s' %+v", user.ServerSerialNumber, user.GetServerSerialNumber(), user)
  51. }
  52. if user.GetCert() != user.Cert {
  53. t.Errorf("user.GetCert() is expected to return '%s' but it returns '%s' %+v", user.Cert, user.GetCert(), user)
  54. }
  55. user.Delete()
  56. // Is NoGW attr working properly?
  57. noGW = true
  58. user, err = ovpm.CreateNewUser(username, password, noGW, 0)
  59. if err != nil {
  60. t.Fatalf("user can not be created: %v", err)
  61. }
  62. if user.NoGW != noGW {
  63. t.Fatalf("user.NoGW is expected to be %t but it's %t instead", noGW, user.NoGW)
  64. }
  65. }
  66. func TestUserUpdate(t *testing.T) {
  67. // Initialize:
  68. ovpm.SetupDB("sqlite3", ":memory:")
  69. defer ovpm.CeaseDB()
  70. ovpm.Init("localhost", "", ovpm.UDPProto)
  71. // Prepare:
  72. username := "testUser"
  73. password := "testPasswd1234"
  74. noGW := false
  75. // Test:
  76. user, err := ovpm.CreateNewUser(username, password, noGW, 0)
  77. if err != nil {
  78. t.Fatalf("user can not be created: %v", err)
  79. }
  80. var updatetests = []struct {
  81. password string
  82. noGW bool
  83. ok bool
  84. }{
  85. {"testpw", false, true},
  86. {"123", false, true},
  87. {"123", false, true},
  88. {"", true, true},
  89. }
  90. for _, tt := range updatetests {
  91. err := user.Update(tt.password, tt.noGW, 0)
  92. if (err == nil) != tt.ok {
  93. t.Errorf("user is expected to be able to update but it gave us this error instead: %v", err)
  94. }
  95. }
  96. }
  97. func TestUserPasswordCorrect(t *testing.T) {
  98. // Initialize:
  99. ovpm.SetupDB("sqlite3", ":memory:")
  100. defer ovpm.CeaseDB()
  101. ovpm.Init("localhost", "", ovpm.UDPProto)
  102. // Prepare:
  103. initialPassword := "g00dp@ssW0rd9"
  104. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0)
  105. // Test:
  106. // Is user created with the correct password?
  107. if !user.CheckPassword(initialPassword) {
  108. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", initialPassword, user)
  109. }
  110. }
  111. func TestUserPasswordReset(t *testing.T) {
  112. // Initialize:
  113. ovpm.SetupDB("sqlite3", ":memory:")
  114. defer ovpm.CeaseDB()
  115. ovpm.Init("localhost", "", ovpm.UDPProto)
  116. // Prepare:
  117. initialPassword := "g00dp@ssW0rd9"
  118. user, _ := ovpm.CreateNewUser("testUser", initialPassword, false, 0)
  119. // Test:
  120. // Reset user's password.
  121. newPassword := "@n0th3rP@ssw0rd"
  122. user.ResetPassword(newPassword)
  123. // Is newPassword set correctly?
  124. if !user.CheckPassword(newPassword) {
  125. t.Fatalf("user's password must be '%s', but CheckPassword fails +%v", newPassword, user)
  126. }
  127. // Is initialPassword is invalid now?
  128. if user.CheckPassword(initialPassword) {
  129. t.Fatalf("user's password must be '%s', but CheckPassword returns true for the old password '%s' %+v", newPassword, initialPassword, user)
  130. }
  131. }
  132. func TestUserDelete(t *testing.T) {
  133. // Initialize:
  134. ovpm.SetupDB("sqlite3", ":memory:")
  135. defer ovpm.CeaseDB()
  136. ovpm.Init("localhost", "", ovpm.UDPProto)
  137. // Prepare:
  138. username := "testUser"
  139. user, _ := ovpm.CreateNewUser(username, "1234", false, 0)
  140. // Test:
  141. // Is user fetchable?
  142. _, err := ovpm.GetUser(username)
  143. if err != nil {
  144. t.Fatalf("user '%s' expected to be 'EXIST', but we failed to get it %+v: %v", username, user, err)
  145. }
  146. // Delete the user.
  147. err = user.Delete()
  148. // Is user deleted?
  149. if err != nil {
  150. t.Fatalf("user is expected to be deleted, but we got this error instead: %v", err)
  151. }
  152. // Is user now fetchable? (It shouldn't be.)
  153. u1, err := ovpm.GetUser(username)
  154. if err == nil {
  155. t.Fatalf("user '%s' expected to be 'NOT EXIST', but it does exist instead: %v", username, user)
  156. }
  157. // Is user nil?
  158. if u1 != nil {
  159. t.Fatalf("not found user should be 'nil' but it's '%v' instead", u1)
  160. }
  161. }
  162. func TestUserGet(t *testing.T) {
  163. // Initialize:
  164. ovpm.SetupDB("sqlite3", ":memory:")
  165. defer ovpm.CeaseDB()
  166. ovpm.Init("localhost", "", ovpm.UDPProto)
  167. // Prepare:
  168. username := "testUser"
  169. user, _ := ovpm.CreateNewUser(username, "1234", false, 0)
  170. // Test:
  171. // Is user fetchable?
  172. fetchedUser, err := ovpm.GetUser(username)
  173. if err != nil {
  174. t.Fatalf("user should be fetchable but instead we got this error: %v", err)
  175. }
  176. // Is fetched user same with the created one?
  177. if !areUsersEqual(user, fetchedUser) {
  178. t.Fatalf("fetched user should be same with the created user but it differs")
  179. }
  180. }
  181. func TestUserGetAll(t *testing.T) {
  182. // Initialize:
  183. ovpm.SetupDB("sqlite3", ":memory:")
  184. defer ovpm.CeaseDB()
  185. ovpm.Init("localhost", "", ovpm.UDPProto)
  186. count := 5
  187. // Prepare:
  188. var users []*ovpm.DBUser
  189. for i := 0; i < count; i++ {
  190. username := fmt.Sprintf("user%d", i)
  191. password := fmt.Sprintf("password%d", i)
  192. user, _ := ovpm.CreateNewUser(username, password, false, 0)
  193. users = append(users, user)
  194. }
  195. // Test:
  196. // Get all users.
  197. fetchedUsers, err := ovpm.GetAllUsers()
  198. // Is users are fetchable.
  199. if err != nil {
  200. t.Fatalf("users are expected to be fetchable but we got this error instead: %v", err)
  201. }
  202. // Is the fetched user count is correct?
  203. if len(fetchedUsers) != count {
  204. t.Fatalf("fetched user count is expected to be '%d', but it is '%d' instead", count, len(fetchedUsers))
  205. }
  206. // Are returned users same with the created ones?
  207. for i, user := range fetchedUsers {
  208. if !areUsersEqual(user, users[i]) {
  209. t.Fatalf("user %s[%d] is expected to be 'SAME' with the created one of it, but they are 'DIFFERENT'", user.GetUsername(), i)
  210. }
  211. }
  212. }
  213. func TestUserRenew(t *testing.T) {
  214. // Initialize:
  215. ovpm.SetupDB("sqlite3", ":memory:")
  216. defer ovpm.CeaseDB()
  217. ovpm.Init("localhost", "", ovpm.UDPProto)
  218. // Prepare:
  219. user, _ := ovpm.CreateNewUser("user", "1234", false, 0)
  220. // Test:
  221. // Re initialize the server.
  222. ovpm.Init("example.com", "3333", ovpm.UDPProto) // This causes implicit Renew() on every user in the system.
  223. // Fetch user back.
  224. fetchedUser, _ := ovpm.GetUser(user.GetUsername())
  225. // Aren't users certificates different?
  226. if user.Cert == fetchedUser.Cert {
  227. t.Fatalf("fetched user's certificate is expected to be 'DIFFERENT' from the created user (since server is re initialized), but it's 'SAME' instead")
  228. }
  229. }
  230. func TestUserIPAllocator(t *testing.T) {
  231. // Initialize:
  232. ovpm.SetupDB("sqlite3", ":memory:")
  233. defer ovpm.CeaseDB()
  234. ovpm.Init("localhost", "", ovpm.UDPProto)
  235. // Prepare:
  236. // Test:
  237. var iptests = []struct {
  238. username string
  239. gw bool
  240. hostid uint32
  241. expectedIP string
  242. pass bool
  243. }{
  244. {"user1", false, 0, "10.9.0.2/24", true},
  245. {"user2", false, 0, "10.9.0.3/24", true},
  246. {"user3", true, 0, "10.9.0.4/24", true},
  247. {"user4", true, ovpm.IP2HostID(net.ParseIP("10.9.0.5").To4()), "10.9.0.5/24", true},
  248. {"user5", true, ovpm.IP2HostID(net.ParseIP("192.168.1.1").To4()), "10.9.0.6/24", false},
  249. {"user6", true, ovpm.IP2HostID(net.ParseIP("10.9.0.7").To4()), "10.9.0.7/24", true},
  250. {"user7", true, 0, "10.9.0.8/24", true},
  251. }
  252. for _, tt := range iptests {
  253. user, err := ovpm.CreateNewUser(tt.username, "pass", tt.gw, tt.hostid)
  254. if (err == nil) == !tt.pass {
  255. t.Fatalf("expected pass %t %s", tt.pass, err)
  256. }
  257. if user != nil {
  258. if user.GetIPNet() != tt.expectedIP {
  259. t.Fatalf("%s is expected to be %s", user.GetIPNet(), tt.expectedIP)
  260. }
  261. }
  262. }
  263. }
  264. // areUsersEqual compares given users and returns true if they are the same.
  265. func areUsersEqual(user1, user2 *ovpm.DBUser) bool {
  266. if user1.Cert != user2.Cert {
  267. logrus.Info("Cert %v != %v", user1.Cert, user2.Cert)
  268. return false
  269. }
  270. if user1.Username != user2.Username {
  271. logrus.Infof("Username %v != %v", user1.Username, user2.Username)
  272. return false
  273. }
  274. if user1.Hash != user2.Hash {
  275. logrus.Infof("Password %v != %v", user1.Hash, user2.Hash)
  276. return false
  277. }
  278. if user1.ServerSerialNumber != user2.ServerSerialNumber {
  279. logrus.Infof("ServerSerialNumber %v != %v", user1.ServerSerialNumber, user2.ServerSerialNumber)
  280. return false
  281. }
  282. logrus.Infof("users are the same!")
  283. return true
  284. }
  285. func init() {
  286. ovpm.Testing = true
  287. }