// Copyright (c) Tailscale Inc & AUTHORS // SPDX-License-Identifier: BSD-3-Clause package source import ( "cmp" "errors" "math" "reflect" "strconv" "testing" "tailscale.com/util/syspolicy/setting" ) func TestKeyToVariableName(t *testing.T) { tests := []struct { name string key setting.Key want string wantErr error }{ { name: "empty", key: "", wantErr: errEmptyKey, }, { name: "lowercase", key: "tailnet", want: "TS_TAILNET", }, { name: "CamelCase", key: "AuthKey", want: "TS_AUTH_KEY", }, { name: "LongerCamelCase", key: "ManagedByOrganizationName", want: "TS_MANAGED_BY_ORGANIZATION_NAME", }, { name: "UPPERCASE", key: "UPPERCASE", want: "TS_UPPERCASE", }, { name: "WithAbbrev/Front", key: "DNSServer", want: "TS_DNS_SERVER", }, { name: "WithAbbrev/Middle", key: "ExitNodeAllowLANAccess", want: "TS_EXIT_NODE_ALLOW_LAN_ACCESS", }, { name: "WithAbbrev/Back", key: "ExitNodeID", want: "TS_EXIT_NODE_ID", }, { name: "WithDigits/Single/Front", key: "0TestKey", want: "TS_0_TEST_KEY", }, { name: "WithDigits/Multi/Front", key: "64TestKey", want: "TS_64_TEST_KEY", }, { name: "WithDigits/Single/Middle", key: "Test0Key", want: "TS_TEST_0_KEY", }, { name: "WithDigits/Multi/Middle", key: "Test64Key", want: "TS_TEST_64_KEY", }, { name: "WithDigits/Single/Back", key: "TestKey0", want: "TS_TEST_KEY_0", }, { name: "WithDigits/Multi/Back", key: "TestKey64", want: "TS_TEST_KEY_64", }, { name: "WithDigits/Multi/Back", key: "TestKey64", want: "TS_TEST_KEY_64", }, { name: "WithPathSeparators/Single", key: "Key/Subkey", want: "TS_KEY_SUBKEY", }, { name: "WithPathSeparators/Multi", key: "Root/Level1/Level2", want: "TS_ROOT_LEVEL_1_LEVEL_2", }, { name: "Mixed", key: "Network/DNSServer/IPAddress", want: "TS_NETWORK_DNS_SERVER_IP_ADDRESS", }, { name: "Non-Alphanumeric/NonASCII/1", key: "ж", wantErr: errInvalidKey, }, { name: "Non-Alphanumeric/NonASCII/2", key: "KeyжName", wantErr: errInvalidKey, }, { name: "Non-Alphanumeric/Space", key: "Key Name", wantErr: errInvalidKey, }, { name: "Non-Alphanumeric/Punct", key: "Key!Name", wantErr: errInvalidKey, }, { name: "Non-Alphanumeric/Backslash", key: `Key\Name`, wantErr: errInvalidKey, }, } for _, tt := range tests { t.Run(cmp.Or(tt.name, string(tt.key)), func(t *testing.T) { got, err := keyToEnvVarName(tt.key) checkError(t, err, tt.wantErr, true) if got != tt.want { t.Fatalf("got %q; want %q", got, tt.want) } }) } } func TestEnvPolicyStore(t *testing.T) { blankEnv := func(string) (string, bool) { return "", false } makeEnv := func(wantName, value string) func(string) (string, bool) { return func(gotName string) (string, bool) { if gotName != wantName { return "", false } return value, true } } tests := []struct { name string key setting.Key lookup func(string) (string, bool) want any wantErr error }{ { name: "NotConfigured/String", key: "AuthKey", lookup: blankEnv, wantErr: setting.ErrNotConfigured, want: "", }, { name: "Configured/String/Empty", key: "AuthKey", lookup: makeEnv("TS_AUTH_KEY", ""), want: "", }, { name: "Configured/String/NonEmpty", key: "AuthKey", lookup: makeEnv("TS_AUTH_KEY", "ABC123"), want: "ABC123", }, { name: "NotConfigured/UInt64", key: "IntegerSetting", lookup: blankEnv, wantErr: setting.ErrNotConfigured, want: uint64(0), }, { name: "Configured/UInt64/Empty", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", ""), wantErr: setting.ErrNotConfigured, want: uint64(0), }, { name: "Configured/UInt64/Zero", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", "0"), want: uint64(0), }, { name: "Configured/UInt64/NonZero", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", "12345"), want: uint64(12345), }, { name: "Configured/UInt64/MaxUInt64", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", strconv.FormatUint(math.MaxUint64, 10)), want: uint64(math.MaxUint64), }, { name: "Configured/UInt64/Negative", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", "-1"), wantErr: setting.ErrTypeMismatch, want: uint64(0), }, { name: "Configured/UInt64/Hex", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", "0xDEADBEEF"), want: uint64(0xDEADBEEF), }, { name: "NotConfigured/Bool", key: "LogSCMInteractions", lookup: blankEnv, wantErr: setting.ErrNotConfigured, want: false, }, { name: "Configured/Bool/Empty", key: "LogSCMInteractions", lookup: makeEnv("TS_LOG_SCM_INTERACTIONS", ""), wantErr: setting.ErrNotConfigured, want: false, }, { name: "Configured/Bool/True", key: "LogSCMInteractions", lookup: makeEnv("TS_LOG_SCM_INTERACTIONS", "true"), want: true, }, { name: "Configured/Bool/False", key: "LogSCMInteractions", lookup: makeEnv("TS_LOG_SCM_INTERACTIONS", "False"), want: false, }, { name: "Configured/Bool/1", key: "LogSCMInteractions", lookup: makeEnv("TS_LOG_SCM_INTERACTIONS", "1"), want: true, }, { name: "Configured/Bool/0", key: "LogSCMInteractions", lookup: makeEnv("TS_LOG_SCM_INTERACTIONS", "0"), want: false, }, { name: "Configured/Bool/Invalid", key: "IntegerSetting", lookup: makeEnv("TS_INTEGER_SETTING", "NotABool"), wantErr: setting.ErrTypeMismatch, want: false, }, { name: "NotConfigured/StringArray", key: "AllowedSuggestedExitNodes", lookup: blankEnv, wantErr: setting.ErrNotConfigured, want: []string(nil), }, { name: "Configured/StringArray/Empty", key: "AllowedSuggestedExitNodes", lookup: makeEnv("TS_ALLOWED_SUGGESTED_EXIT_NODES", ""), want: []string(nil), }, { name: "Configured/StringArray/Spaces", key: "AllowedSuggestedExitNodes", lookup: makeEnv("TS_ALLOWED_SUGGESTED_EXIT_NODES", " \t "), want: []string{}, }, { name: "Configured/StringArray/Single", key: "AllowedSuggestedExitNodes", lookup: makeEnv("TS_ALLOWED_SUGGESTED_EXIT_NODES", "NodeA"), want: []string{"NodeA"}, }, { name: "Configured/StringArray/Multi", key: "AllowedSuggestedExitNodes", lookup: makeEnv("TS_ALLOWED_SUGGESTED_EXIT_NODES", "NodeA,NodeB,NodeC"), want: []string{"NodeA", "NodeB", "NodeC"}, }, { name: "Configured/StringArray/WithBlank", key: "AllowedSuggestedExitNodes", lookup: makeEnv("TS_ALLOWED_SUGGESTED_EXIT_NODES", "NodeA,\t,, ,NodeB"), want: []string{"NodeA", "NodeB"}, }, } for _, tt := range tests { t.Run(cmp.Or(tt.name, string(tt.key)), func(t *testing.T) { oldLookupEnv := lookupEnv t.Cleanup(func() { lookupEnv = oldLookupEnv }) lookupEnv = tt.lookup var got any var err error var store EnvPolicyStore switch tt.want.(type) { case string: got, err = store.ReadString(tt.key) case uint64: got, err = store.ReadUInt64(tt.key) case bool: got, err = store.ReadBoolean(tt.key) case []string: got, err = store.ReadStringArray(tt.key) } checkError(t, err, tt.wantErr, false) if !reflect.DeepEqual(got, tt.want) { t.Errorf("got %v; want %v", got, tt.want) } }) } } func checkError(tb testing.TB, got, want error, fatal bool) { tb.Helper() f := tb.Errorf if fatal { f = tb.Fatalf } if (want == nil && got != nil) || (want != nil && got == nil) || (want != nil && got != nil && !errors.Is(got, want) && want.Error() != got.Error()) { f("gotErr: %v; wantErr: %v", got, want) } }