summaryrefslogtreecommitdiff
path: root/client_test.go
diff options
context:
space:
mode:
authorjwijenbergh <jeroenwijenbergh@protonmail.com>2022-10-18 18:29:10 +0200
committerjwijenbergh <jeroenwijenbergh@protonmail.com>2022-10-18 18:29:10 +0200
commit6aced56a28fa52e4796aa1aa139e4323b4154aca (patch)
tree56bf7af557317b553c6c30db2ec8d20090b6336d /client_test.go
parentcc057e07579f290eb1db8bdf348cb2e5ba760ab3 (diff)
Client: Move to its own package
Diffstat (limited to 'client_test.go')
-rw-r--r--client_test.go435
1 files changed, 0 insertions, 435 deletions
diff --git a/client_test.go b/client_test.go
deleted file mode 100644
index 583553b..0000000
--- a/client_test.go
+++ /dev/null
@@ -1,435 +0,0 @@
-package eduvpn
-
-import (
- "errors"
- "fmt"
- "net/http"
- "os"
- "os/exec"
- "strconv"
- "strings"
- "testing"
- "time"
-
- httpw "github.com/eduvpn/eduvpn-common/internal/http"
- "github.com/eduvpn/eduvpn-common/internal/oauth"
- "github.com/eduvpn/eduvpn-common/internal/util"
- "github.com/eduvpn/eduvpn-common/types"
-)
-
-func getServerURI(t *testing.T) string {
- serverURI := os.Getenv("SERVER_URI")
- if serverURI == "" {
- t.Skip("Skipping server test as no SERVER_URI env var has been passed")
- }
- serverURI, parseErr := util.EnsureValidURL(serverURI)
- if parseErr != nil {
- t.Skip("Skipping server test as the server uri is not valid")
- }
- return serverURI
-}
-
-func runCommand(t *testing.T, errBuffer *strings.Builder, name string, args ...string) error {
- cmd := exec.Command(name, args...)
-
- cmd.Stderr = errBuffer
- err := cmd.Start()
- if err != nil {
- return err
- }
-
- return cmd.Wait()
-}
-
-func loginOAuthSelenium(t *testing.T, url string, state *Client) {
- // We could use the go selenium library
- // But it does not support the latest selenium v4 just yet
- var errBuffer strings.Builder
- err := runCommand(t, &errBuffer, "python3", "selenium_eduvpn.py", url)
- if err != nil {
- t.Fatalf(
- "Login OAuth with selenium script failed with error %v and stderr %s",
- err,
- errBuffer.String(),
- )
- _ = state.CancelOAuth()
- }
-}
-
-func stateCallback(
- t *testing.T,
- oldState FSMStateID,
- newState FSMStateID,
- data interface{},
- state *Client,
-) {
- if newState == STATE_OAUTH_STARTED {
- url, ok := data.(string)
-
- if !ok {
- t.Fatalf("data is not a string for OAuth URL")
- }
- loginOAuthSelenium(t, url, state)
- }
-}
-
-func Test_server(t *testing.T) {
- serverURI := getServerURI(t)
- state := &Client{}
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- "configstest",
- "en",
- func(old FSMStateID, new FSMStateID, data interface{}) {
- stateCallback(t, old, new, data, state)
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
- if addErr != nil {
- t.Fatalf("Add error: %v", addErr)
- }
- _, _, configErr := state.GetConfigCustomServer(serverURI, false)
- if configErr != nil {
- t.Fatalf("Connect error: %v", configErr)
- }
-}
-
-func test_connect_oauth_parameter(
- t *testing.T,
- parameters httpw.URLParameters,
- expectedErr interface{},
-) {
- serverURI := getServerURI(t)
- state := &Client{}
- configDirectory := "test_oauth_parameters"
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- configDirectory,
- "en",
- func(oldState FSMStateID, newState FSMStateID, data interface{}) {
- if newState == STATE_OAUTH_STARTED {
- server, serverErr := state.Servers.GetCustomServer(serverURI)
- if serverErr != nil {
- t.Fatalf("No server with error: %v", serverErr)
- }
- port, portErr := server.GetOAuth().GetListenerPort()
- if portErr != nil {
- _ = state.CancelOAuth()
- t.Fatalf("No port with error: %v", portErr)
- }
- baseURL := fmt.Sprintf("http://127.0.0.1:%d/callback", port)
- url, err := httpw.HTTPConstructURL(baseURL, parameters)
- if err != nil {
- _ = state.CancelOAuth()
- t.Fatalf(
- "Error: Constructing url %s with parameters %s",
- baseURL,
- fmt.Sprint(parameters),
- )
- }
- go func() {
- _, getErr := http.Get(url)
- if getErr != nil {
- _ = state.CancelOAuth()
- t.Logf("HTTP GET error: %v", getErr)
- }
- }()
- }
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
-
- var wrappedErr *types.WrappedErrorMessage
-
- // We ensure the error is of a wrappedErrorMessage
- if !errors.As(addErr, &wrappedErr) {
- t.Fatalf("error %T = %v, wantErr %T", addErr, addErr, wrappedErr)
- }
-
- gotExpectedErr := wrappedErr.Cause()
-
- // Then we check if the cause is correct
- if !errors.As(gotExpectedErr, expectedErr) {
- t.Fatalf("error %T = %v, wantErr %T", gotExpectedErr, gotExpectedErr, expectedErr)
- }
-}
-
-func Test_connect_oauth_parameters(t *testing.T) {
- var (
- failedCallbackParameterError *oauth.OAuthCallbackParameterError
- failedCallbackStateMatchError *oauth.OAuthCallbackStateMatchError
- failedCallbackISSMatchError *oauth.OAuthCallbackISSMatchError
- )
-
-
- serverURI := getServerURI(t)
- // serverURI already ends with a / due to using the util EnsureValidURL function
- iss := serverURI
- tests := []struct {
- expectedErr interface{}
- parameters httpw.URLParameters
- }{
- // missing state and code
- {&failedCallbackParameterError, httpw.URLParameters{"iss": iss}},
- // missing state
- {&failedCallbackParameterError, httpw.URLParameters{"iss": iss, "code": "42"}},
- // invalid state
- {&failedCallbackStateMatchError, httpw.URLParameters{"iss": iss, "code": "42", "state": "21"}},
- // invalid iss
- {&failedCallbackISSMatchError, httpw.URLParameters{"iss": "37", "code": "42", "state": "21"}},
- }
-
- for _, test := range tests {
- test_connect_oauth_parameter(t, test.parameters, test.expectedErr)
- }
-}
-
-func Test_token_expired(t *testing.T) {
- serverURI := getServerURI(t)
- expiredTTL := os.Getenv("OAUTH_EXPIRED_TTL")
- if expiredTTL == "" {
- t.Log(
- "No expired TTL present, skipping this test. Set OAUTH_EXPIRED_TTL env variable to run this test",
- )
- return
- }
-
- // Convert the env variable to an int and signal error if it is not possible
- expiredInt, expiredErr := strconv.Atoi(expiredTTL)
- if expiredErr != nil {
- t.Fatalf("Cannot convert EXPIRED_TTL env variable to an int with error %v", expiredErr)
- }
-
- // Get a vpn state
- state := &Client{}
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- "configsexpired",
- "en",
- func(old FSMStateID, new FSMStateID, data interface{}) {
- stateCallback(t, old, new, data, state)
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
- if addErr != nil {
- t.Fatalf("Add error: %v", addErr)
- }
-
- _, _, configErr := state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("Connect error before expired: %v", configErr)
- }
-
- currentServer, serverErr := state.Servers.GetCurrentServer()
- if serverErr != nil {
- t.Fatalf("No server found")
- }
-
- oauth := currentServer.GetOAuth()
-
- accessToken := oauth.Token.Access
- refreshToken := oauth.Token.Refresh
-
- // Wait for TTL so that the tokens expire
- time.Sleep(time.Duration(expiredInt) * time.Second)
-
- _, _, configErr = state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("Connect error after expiry: %v", configErr)
- }
-
- // Check if tokens have changed
- accessTokenAfter := oauth.Token.Access
- refreshTokenAfter := oauth.Token.Refresh
-
- if accessToken == accessTokenAfter {
- t.Errorf("Access token is the same after refresh")
- }
-
- if refreshToken == refreshTokenAfter {
- t.Errorf("Refresh token is the same after refresh")
- }
-}
-
-func Test_token_invalid(t *testing.T) {
- serverURI := getServerURI(t)
- state := &Client{}
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- "configsinvalid",
- "en",
- func(old FSMStateID, new FSMStateID, data interface{}) {
- stateCallback(t, old, new, data, state)
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
- if addErr != nil {
- t.Fatalf("Add error: %v", addErr)
- }
-
- _, _, configErr := state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("Connect error before invalid: %v", configErr)
- }
-
- dummy_value := "37"
-
- currentServer, serverErr := state.Servers.GetCurrentServer()
- if serverErr != nil {
- t.Fatalf("No server found")
- }
-
- oauth := currentServer.GetOAuth()
-
- // Override tokens with invalid values
- oauth.Token.Access = dummy_value
- oauth.Token.Refresh = dummy_value
-
- _, _, configErr = state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("Connect error after invalid: %v", configErr)
- }
-
- if oauth.Token.Access == dummy_value {
- t.Errorf("Access token is equal to dummy value: %s", dummy_value)
- }
-
- if oauth.Token.Refresh == dummy_value {
- t.Errorf("Refresh token is equal to dummy value: %s", dummy_value)
- }
-}
-
-// Test if an invalid profile will be corrected
-func Test_invalid_profile_corrected(t *testing.T) {
- serverURI := getServerURI(t)
- state := &Client{}
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- "configscancelprofile",
- "en",
- func(old FSMStateID, new FSMStateID, data interface{}) {
- stateCallback(t, old, new, data, state)
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
- if addErr != nil {
- t.Fatalf("Add error: %v", addErr)
- }
-
- _, _, configErr := state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("First connect error: %v", configErr)
- }
-
- currentServer, serverErr := state.Servers.GetCurrentServer()
- if serverErr != nil {
- t.Fatalf("No server found")
- }
-
- base, baseErr := currentServer.GetBase()
- if baseErr != nil {
- t.Fatalf("No base found")
- }
-
- previousProfile := base.Profiles.Current
- base.Profiles.Current = "IDONOTEXIST"
-
- _, _, configErr = state.GetConfigCustomServer(serverURI, false)
-
- if configErr != nil {
- t.Fatalf("Second connect error: %v", configErr)
- }
-
- if base.Profiles.Current != previousProfile {
- t.Fatalf(
- "Profiles do no match: current %s and previous %s",
- base.Profiles.Current,
- previousProfile,
- )
- }
-}
-
-// Test if prefer tcp is handled correctly by checking the returned config and config type
-func Test_prefer_tcp(t *testing.T) {
- serverURI := getServerURI(t)
- state := &Client{}
-
- registerErr := state.Register(
- "org.letsconnect-vpn.app.linux",
- "configsprefertcp",
- "en",
- func(old FSMStateID, new FSMStateID, data interface{}) {
- stateCallback(t, old, new, data, state)
- },
- false,
- )
- if registerErr != nil {
- t.Fatalf("Register error: %v", registerErr)
- }
-
- _, addErr := state.AddCustomServer(serverURI)
- if addErr != nil {
- t.Fatalf("Add error: %v", addErr)
- }
-
- // get a config with preferTCP set to true
- config, configType, configErr := state.GetConfigCustomServer(serverURI, true)
-
- // Test server should accept prefer TCP!
- if configType != "openvpn" {
- t.Fatalf("Invalid protocol for prefer TCP, got: WireGuard, want: OpenVPN")
- }
-
- if configErr != nil {
- t.Fatalf("Config error: %v", configErr)
- }
-
- if !strings.HasSuffix(config, "remote eduvpnserver 1194 tcp\nremote eduvpnserver 1194 udp") {
- t.Fatalf("Suffix for prefer TCP is not in the right order for config: %s", config)
- }
-
- // get a config with preferTCP set to false
- config, configType, configErr = state.GetConfigCustomServer(serverURI, false)
- if configErr != nil {
- t.Fatalf("Config error: %v", configErr)
- }
-
- if configType == "openvpn" && !strings.HasSuffix(config, "remote eduvpnserver 1194 udp\nremote eduvpnserver 1194 tcp") {
- t.Fatalf("Suffix for disable prefer TCP is not in the right order for config: %s", config)
- }
-}