2021-05-09 09:12:05 -06:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"gopkg.in/check.v1"
|
2021-08-02 13:06:26 -06:00
|
|
|
"inet.af/netaddr"
|
2021-05-09 09:12:05 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
func Test(t *testing.T) {
|
|
|
|
check.TestingT(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = check.Suite(&Suite{})
|
|
|
|
|
|
|
|
type Suite struct{}
|
|
|
|
|
2021-11-13 01:36:45 -07:00
|
|
|
var (
|
|
|
|
tmpDir string
|
2021-11-15 09:16:04 -07:00
|
|
|
app Headscale
|
2021-11-13 01:36:45 -07:00
|
|
|
)
|
2021-05-09 09:12:05 -06:00
|
|
|
|
|
|
|
func (s *Suite) SetUpTest(c *check.C) {
|
|
|
|
s.ResetDB(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TearDownTest(c *check.C) {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) ResetDB(c *check.C) {
|
|
|
|
if len(tmpDir) != 0 {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
var err error
|
|
|
|
tmpDir, err = ioutil.TempDir("", "autoygg-client-test")
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-08-02 13:06:26 -06:00
|
|
|
cfg := Config{
|
2022-01-16 06:16:59 -07:00
|
|
|
IPPrefixes: []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("10.27.0.0/23"),
|
|
|
|
},
|
2021-08-02 13:06:26 -06:00
|
|
|
}
|
2021-05-09 09:12:05 -06:00
|
|
|
|
2021-11-15 09:16:04 -07:00
|
|
|
app = Headscale{
|
2022-06-05 09:47:26 -06:00
|
|
|
cfg: &cfg,
|
2021-05-09 09:12:05 -06:00
|
|
|
dbType: "sqlite3",
|
|
|
|
dbString: tmpDir + "/headscale_test.db",
|
|
|
|
}
|
2021-11-15 09:16:04 -07:00
|
|
|
err = app.initDB()
|
2021-05-09 09:12:05 -06:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 09:16:04 -07:00
|
|
|
db, err := app.openDB()
|
2021-07-04 13:40:46 -06:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 09:16:04 -07:00
|
|
|
app.db = db
|
2021-05-09 09:12:05 -06:00
|
|
|
}
|
2022-01-31 05:18:50 -07:00
|
|
|
|
|
|
|
// Enusre an error is returned when an invalid auth mode
|
|
|
|
// is supplied.
|
2022-01-31 08:27:43 -07:00
|
|
|
func (s *Suite) TestInvalidClientAuthMode(c *check.C) {
|
2022-02-21 08:09:23 -07:00
|
|
|
_, isValid := LookupTLSClientAuthMode("invalid")
|
|
|
|
c.Assert(isValid, check.Equals, false)
|
2022-01-31 05:18:50 -07:00
|
|
|
}
|
|
|
|
|
2022-01-31 08:27:43 -07:00
|
|
|
// Ensure that all client auth modes return a nil error.
|
|
|
|
func (s *Suite) TestAuthModes(c *check.C) {
|
|
|
|
modes := []string{"disabled", "relaxed", "enforced"}
|
2022-01-31 05:18:50 -07:00
|
|
|
|
2022-01-31 08:27:43 -07:00
|
|
|
for _, v := range modes {
|
2022-02-21 08:09:23 -07:00
|
|
|
_, isValid := LookupTLSClientAuthMode(v)
|
|
|
|
c.Assert(isValid, check.Equals, true)
|
2022-01-31 08:27:43 -07:00
|
|
|
}
|
2022-01-31 05:18:50 -07:00
|
|
|
}
|