2021-05-09 15:12:05 +00:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
2021-11-22 19:59:44 +00:00
|
|
|
"github.com/patrickmn/go-cache"
|
2021-05-09 15:12:05 +00:00
|
|
|
"gopkg.in/check.v1"
|
2021-08-02 19:06:26 +00:00
|
|
|
"inet.af/netaddr"
|
2021-05-09 15:12:05 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func Test(t *testing.T) {
|
|
|
|
check.TestingT(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = check.Suite(&Suite{})
|
|
|
|
|
|
|
|
type Suite struct{}
|
|
|
|
|
2021-11-13 08:36:45 +00:00
|
|
|
var (
|
|
|
|
tmpDir string
|
2021-11-15 16:16:04 +00:00
|
|
|
app Headscale
|
2021-11-13 08:36:45 +00:00
|
|
|
)
|
2021-05-09 15:12:05 +00:00
|
|
|
|
|
|
|
func (s *Suite) SetUpTest(c *check.C) {
|
|
|
|
s.ResetDB(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TearDownTest(c *check.C) {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) ResetDB(c *check.C) {
|
|
|
|
if len(tmpDir) != 0 {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
var err error
|
|
|
|
tmpDir, err = ioutil.TempDir("", "autoygg-client-test")
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-08-02 19:06:26 +00:00
|
|
|
cfg := Config{
|
2022-01-16 13:16:59 +00:00
|
|
|
IPPrefixes: []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("10.27.0.0/23"),
|
|
|
|
},
|
2021-08-02 19:06:26 +00:00
|
|
|
}
|
2021-05-09 15:12:05 +00:00
|
|
|
|
2021-11-15 16:16:04 +00:00
|
|
|
app = Headscale{
|
2021-05-09 15:12:05 +00:00
|
|
|
cfg: cfg,
|
|
|
|
dbType: "sqlite3",
|
|
|
|
dbString: tmpDir + "/headscale_test.db",
|
2021-11-22 19:59:44 +00:00
|
|
|
requestedExpiryCache: cache.New(
|
|
|
|
requestedExpiryCacheExpiration,
|
|
|
|
requestedExpiryCacheCleanupInterval,
|
|
|
|
),
|
2021-05-09 15:12:05 +00:00
|
|
|
}
|
2021-11-15 16:16:04 +00:00
|
|
|
err = app.initDB()
|
2021-05-09 15:12:05 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 16:16:04 +00:00
|
|
|
db, err := app.openDB()
|
2021-07-04 19:40:46 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 16:16:04 +00:00
|
|
|
app.db = db
|
2021-05-09 15:12:05 +00:00
|
|
|
}
|
2022-01-31 12:18:50 +00:00
|
|
|
|
|
|
|
// Enusre an error is returned when an invalid auth mode
|
|
|
|
// is supplied.
|
2022-01-31 15:27:43 +00:00
|
|
|
func (s *Suite) TestInvalidClientAuthMode(c *check.C) {
|
2022-02-21 15:09:23 +00:00
|
|
|
_, isValid := LookupTLSClientAuthMode("invalid")
|
|
|
|
c.Assert(isValid, check.Equals, false)
|
2022-01-31 12:18:50 +00:00
|
|
|
}
|
|
|
|
|
2022-01-31 15:27:43 +00:00
|
|
|
// Ensure that all client auth modes return a nil error.
|
|
|
|
func (s *Suite) TestAuthModes(c *check.C) {
|
|
|
|
modes := []string{"disabled", "relaxed", "enforced"}
|
2022-01-31 12:18:50 +00:00
|
|
|
|
2022-01-31 15:27:43 +00:00
|
|
|
for _, v := range modes {
|
2022-02-21 15:09:23 +00:00
|
|
|
_, isValid := LookupTLSClientAuthMode(v)
|
|
|
|
c.Assert(isValid, check.Equals, true)
|
2022-01-31 15:27:43 +00:00
|
|
|
}
|
2022-01-31 12:18:50 +00:00
|
|
|
}
|