Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "shill/openvpn_management_server.h" |
| 6 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 7 | #include <netinet/in.h> |
| 8 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 9 | #include <chromeos/dbus/service_constants.h> |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 10 | #include <gtest/gtest.h> |
| 11 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 12 | #include "shill/glib.h" |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 13 | #include "shill/key_value_store.h" |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 14 | #include "shill/mock_event_dispatcher.h" |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 15 | #include "shill/mock_openvpn_driver.h" |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 16 | #include "shill/mock_sockets.h" |
| 17 | |
Darin Petkov | 3273da7 | 2013-02-13 11:50:25 +0100 | [diff] [blame] | 18 | using base::Bind; |
| 19 | using base::Unretained; |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 20 | using std::string; |
Darin Petkov | 4646302 | 2012-03-29 14:57:32 +0200 | [diff] [blame] | 21 | using std::vector; |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 22 | using testing::_; |
Darin Petkov | e08084d | 2012-06-11 13:19:35 +0200 | [diff] [blame] | 23 | using testing::Assign; |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 24 | using testing::InSequence; |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 25 | using testing::Return; |
| 26 | using testing::ReturnNew; |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 27 | |
| 28 | namespace shill { |
| 29 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 30 | namespace { |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 31 | MATCHER_P(VoidStringEq, value, "") { |
| 32 | return value == reinterpret_cast<const char *>(arg); |
| 33 | } |
| 34 | } // namespace {} |
| 35 | |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 36 | class OpenVPNManagementServerTest : public testing::Test { |
| 37 | public: |
| 38 | OpenVPNManagementServerTest() |
Paul Stewart | 451aa7f | 2012-04-11 19:07:58 -0700 | [diff] [blame] | 39 | : server_(&driver_, &glib_) {} |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 40 | |
| 41 | virtual ~OpenVPNManagementServerTest() {} |
| 42 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 43 | protected: |
| 44 | static const int kConnectedSocket; |
| 45 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 46 | void SetSockets() { server_.sockets_ = &sockets_; } |
| 47 | void SetDispatcher() { server_.dispatcher_ = &dispatcher_; } |
Darin Petkov | ffd3306 | 2012-06-11 19:23:42 +0200 | [diff] [blame] | 48 | void ExpectNotStarted() { EXPECT_FALSE(server_.IsStarted()); } |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 49 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 50 | void SetConnectedSocket() { |
| 51 | server_.connected_socket_ = kConnectedSocket; |
| 52 | SetSockets(); |
| 53 | } |
| 54 | |
| 55 | void ExpectSend(const string &value) { |
| 56 | EXPECT_CALL(sockets_, |
| 57 | Send(kConnectedSocket, VoidStringEq(value), value.size(), 0)) |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 58 | .WillOnce(Return(value.size())); |
| 59 | } |
| 60 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 61 | void ExpectStaticChallengeResponse() { |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 62 | driver_.args()->SetString(kOpenVPNUserProperty, "jojo"); |
| 63 | driver_.args()->SetString(kOpenVPNPasswordProperty, "yoyo"); |
| 64 | driver_.args()->SetString(kOpenVPNOTPProperty, "123456"); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 65 | SetConnectedSocket(); |
| 66 | ExpectSend("username \"Auth\" jojo\n"); |
| 67 | ExpectSend("password \"Auth\" \"SCRV1:eW95bw==:MTIzNDU2\"\n"); |
| 68 | } |
| 69 | |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 70 | void ExpectAuthenticationResponse() { |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 71 | driver_.args()->SetString(kOpenVPNUserProperty, "jojo"); |
| 72 | driver_.args()->SetString(kOpenVPNPasswordProperty, "yoyo"); |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 73 | SetConnectedSocket(); |
| 74 | ExpectSend("username \"Auth\" jojo\n"); |
| 75 | ExpectSend("password \"Auth\" \"yoyo\"\n"); |
| 76 | } |
| 77 | |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 78 | void ExpectPINResponse() { |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 79 | driver_.args()->SetString(kOpenVPNPinProperty, "987654"); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 80 | SetConnectedSocket(); |
| 81 | ExpectSend("password \"User-Specific TPM Token FOO\" \"987654\"\n"); |
| 82 | } |
| 83 | |
Darin Petkov | a5e07ef | 2012-07-09 14:27:57 +0200 | [diff] [blame] | 84 | void ExpectHoldRelease() { |
| 85 | SetConnectedSocket(); |
| 86 | ExpectSend("hold release\n"); |
| 87 | } |
| 88 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 89 | void ExpectRestart() { |
| 90 | SetConnectedSocket(); |
| 91 | ExpectSend("signal SIGUSR1\n"); |
| 92 | } |
| 93 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 94 | InputData CreateInputDataFromString(const string &str) { |
| 95 | InputData data( |
| 96 | reinterpret_cast<unsigned char *>(const_cast<char *>(str.data())), |
| 97 | str.size()); |
| 98 | return data; |
| 99 | } |
| 100 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 101 | void SendSignal(const string &signal) { |
| 102 | server_.SendSignal(signal); |
| 103 | } |
| 104 | |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 105 | void OnInput(InputData *data) { |
| 106 | server_.OnInput(data); |
| 107 | } |
| 108 | |
| 109 | void ProcessMessage(const string &message) { |
| 110 | server_.ProcessMessage(message); |
| 111 | } |
| 112 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 113 | bool ProcessSuccessMessage(const string &message) { |
| 114 | return server_.ProcessSuccessMessage(message); |
| 115 | } |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 116 | |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 117 | bool ProcessStateMessage(const string &message) { |
| 118 | return server_.ProcessStateMessage(message); |
| 119 | } |
| 120 | |
Darin Petkov | 16e7032 | 2013-03-07 15:54:23 +0100 | [diff] [blame] | 121 | bool ProcessAuthTokenMessage(const string &message) { |
| 122 | return server_.ProcessAuthTokenMessage(message); |
| 123 | } |
| 124 | |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 125 | bool GetHoldWaiting() { return server_.hold_waiting_; } |
| 126 | |
Darin Petkov | aba8932 | 2013-03-11 14:48:22 +0100 | [diff] [blame] | 127 | static string ParseSubstring( |
| 128 | const string &message, const string &start, const string &end) { |
| 129 | return OpenVPNManagementServer::ParseSubstring(message, start, end); |
| 130 | } |
| 131 | |
| 132 | static string ParsePasswordTag(const string &message) { |
| 133 | return OpenVPNManagementServer::ParsePasswordTag(message); |
| 134 | } |
| 135 | |
| 136 | static string ParsePasswordFailedReason(const string &message) { |
| 137 | return OpenVPNManagementServer::ParsePasswordFailedReason(message); |
| 138 | } |
| 139 | |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 140 | void SetClientState(const string &state) { |
| 141 | server_.state_ = state; |
| 142 | } |
| 143 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 144 | GLib glib_; |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 145 | MockOpenVPNDriver driver_; |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 146 | MockSockets sockets_; |
| 147 | MockEventDispatcher dispatcher_; |
mukesh agrawal | 7efde5b | 2013-05-08 11:36:58 -0700 | [diff] [blame] | 148 | OpenVPNManagementServer server_; // Destroy before anything it references. |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 149 | }; |
| 150 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 151 | // static |
| 152 | const int OpenVPNManagementServerTest::kConnectedSocket = 555; |
| 153 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 154 | TEST_F(OpenVPNManagementServerTest, StartStarted) { |
| 155 | SetSockets(); |
Darin Petkov | 4646302 | 2012-03-29 14:57:32 +0200 | [diff] [blame] | 156 | EXPECT_TRUE(server_.Start(NULL, NULL, NULL)); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 157 | } |
| 158 | |
| 159 | TEST_F(OpenVPNManagementServerTest, StartSocketFail) { |
| 160 | EXPECT_CALL(sockets_, Socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) |
| 161 | .WillOnce(Return(-1)); |
Darin Petkov | 4646302 | 2012-03-29 14:57:32 +0200 | [diff] [blame] | 162 | EXPECT_FALSE(server_.Start(NULL, &sockets_, NULL)); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 163 | ExpectNotStarted(); |
| 164 | } |
| 165 | |
| 166 | TEST_F(OpenVPNManagementServerTest, StartGetSockNameFail) { |
| 167 | const int kSocket = 123; |
| 168 | EXPECT_CALL(sockets_, Socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) |
| 169 | .WillOnce(Return(kSocket)); |
| 170 | EXPECT_CALL(sockets_, Bind(kSocket, _, _)).WillOnce(Return(0)); |
| 171 | EXPECT_CALL(sockets_, Listen(kSocket, 1)).WillOnce(Return(0)); |
| 172 | EXPECT_CALL(sockets_, GetSockName(kSocket, _, _)).WillOnce(Return(-1)); |
| 173 | EXPECT_CALL(sockets_, Close(kSocket)).WillOnce(Return(0)); |
Darin Petkov | 4646302 | 2012-03-29 14:57:32 +0200 | [diff] [blame] | 174 | EXPECT_FALSE(server_.Start(NULL, &sockets_, NULL)); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 175 | ExpectNotStarted(); |
| 176 | } |
| 177 | |
Darin Petkov | 78f6326 | 2012-03-26 01:30:24 +0200 | [diff] [blame] | 178 | TEST_F(OpenVPNManagementServerTest, Start) { |
Paul Stewart | 406c473 | 2013-08-01 09:30:12 -0700 | [diff] [blame] | 179 | const string kStaticChallenge = "static-challenge"; |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 180 | driver_.args()->SetString(kOpenVPNStaticChallengeProperty, kStaticChallenge); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 181 | const int kSocket = 123; |
| 182 | EXPECT_CALL(sockets_, Socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) |
| 183 | .WillOnce(Return(kSocket)); |
| 184 | EXPECT_CALL(sockets_, Bind(kSocket, _, _)).WillOnce(Return(0)); |
| 185 | EXPECT_CALL(sockets_, Listen(kSocket, 1)).WillOnce(Return(0)); |
| 186 | EXPECT_CALL(sockets_, GetSockName(kSocket, _, _)).WillOnce(Return(0)); |
| 187 | EXPECT_CALL(dispatcher_, |
Darin Petkov | 3273da7 | 2013-02-13 11:50:25 +0100 | [diff] [blame] | 188 | CreateReadyHandler(kSocket, IOHandler::kModeInput, _)) |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 189 | .WillOnce(ReturnNew<IOHandler>()); |
Paul Stewart | 406c473 | 2013-08-01 09:30:12 -0700 | [diff] [blame] | 190 | vector<vector<string>> options; |
Darin Petkov | 4646302 | 2012-03-29 14:57:32 +0200 | [diff] [blame] | 191 | EXPECT_TRUE(server_.Start(&dispatcher_, &sockets_, &options)); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 192 | EXPECT_EQ(&sockets_, server_.sockets_); |
| 193 | EXPECT_EQ(kSocket, server_.socket_); |
| 194 | EXPECT_TRUE(server_.ready_handler_.get()); |
| 195 | EXPECT_EQ(&dispatcher_, server_.dispatcher_); |
Paul Stewart | 406c473 | 2013-08-01 09:30:12 -0700 | [diff] [blame] | 196 | vector<vector<string>> expected_options { |
Paul Stewart | b26347a | 2013-08-02 12:12:09 -0700 | [diff] [blame] | 197 | { "management", "127.0.0.1", "0" }, |
| 198 | { "management-client" }, |
| 199 | { "management-hold" }, |
| 200 | { "management-query-passwords" }, |
| 201 | { "static-challenge", kStaticChallenge, "1" } |
Paul Stewart | 406c473 | 2013-08-01 09:30:12 -0700 | [diff] [blame] | 202 | }; |
| 203 | EXPECT_EQ(expected_options, options); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 204 | } |
| 205 | |
| 206 | TEST_F(OpenVPNManagementServerTest, Stop) { |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 207 | EXPECT_TRUE(server_.state().empty()); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 208 | SetSockets(); |
| 209 | server_.input_handler_.reset(new IOHandler()); |
| 210 | const int kConnectedSocket = 234; |
| 211 | server_.connected_socket_ = kConnectedSocket; |
| 212 | EXPECT_CALL(sockets_, Close(kConnectedSocket)).WillOnce(Return(0)); |
| 213 | SetDispatcher(); |
| 214 | server_.ready_handler_.reset(new IOHandler()); |
| 215 | const int kSocket = 345; |
| 216 | server_.socket_ = kSocket; |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 217 | SetClientState(OpenVPNManagementServer::kStateReconnecting); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 218 | EXPECT_CALL(sockets_, Close(kSocket)).WillOnce(Return(0)); |
| 219 | server_.Stop(); |
| 220 | EXPECT_FALSE(server_.input_handler_.get()); |
| 221 | EXPECT_EQ(-1, server_.connected_socket_); |
| 222 | EXPECT_FALSE(server_.dispatcher_); |
| 223 | EXPECT_FALSE(server_.ready_handler_.get()); |
| 224 | EXPECT_EQ(-1, server_.socket_); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 225 | EXPECT_TRUE(server_.state().empty()); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 226 | ExpectNotStarted(); |
| 227 | } |
| 228 | |
| 229 | TEST_F(OpenVPNManagementServerTest, OnReadyAcceptFail) { |
| 230 | const int kSocket = 333; |
| 231 | SetSockets(); |
| 232 | EXPECT_CALL(sockets_, Accept(kSocket, NULL, NULL)).WillOnce(Return(-1)); |
| 233 | server_.OnReady(kSocket); |
| 234 | EXPECT_EQ(-1, server_.connected_socket_); |
| 235 | } |
| 236 | |
| 237 | TEST_F(OpenVPNManagementServerTest, OnReady) { |
| 238 | const int kSocket = 111; |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 239 | SetConnectedSocket(); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 240 | SetDispatcher(); |
| 241 | EXPECT_CALL(sockets_, Accept(kSocket, NULL, NULL)) |
| 242 | .WillOnce(Return(kConnectedSocket)); |
| 243 | server_.ready_handler_.reset(new IOHandler()); |
Darin Petkov | 3273da7 | 2013-02-13 11:50:25 +0100 | [diff] [blame] | 244 | EXPECT_CALL(dispatcher_, CreateInputHandler(kConnectedSocket, _, _)) |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 245 | .WillOnce(ReturnNew<IOHandler>()); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 246 | ExpectSend("state on\n"); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 247 | server_.OnReady(kSocket); |
| 248 | EXPECT_EQ(kConnectedSocket, server_.connected_socket_); |
| 249 | EXPECT_FALSE(server_.ready_handler_.get()); |
| 250 | EXPECT_TRUE(server_.input_handler_.get()); |
| 251 | } |
| 252 | |
| 253 | TEST_F(OpenVPNManagementServerTest, OnInput) { |
| 254 | { |
| 255 | string s; |
| 256 | InputData data = CreateInputDataFromString(s); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 257 | OnInput(&data); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 258 | } |
| 259 | { |
| 260 | string s = "foo\n" |
| 261 | ">INFO:...\n" |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 262 | ">PASSWORD:Need 'Auth' SC:user/password/otp\n" |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 263 | ">PASSWORD:Need 'User-Specific TPM Token FOO' ...\n" |
Darin Petkov | 0440b9b | 2012-04-17 16:11:56 +0200 | [diff] [blame] | 264 | ">PASSWORD:Verification Failed: .\n" |
Darin Petkov | 16e7032 | 2013-03-07 15:54:23 +0100 | [diff] [blame] | 265 | ">PASSWORD:Auth-Token:ToKeN==\n" |
Darin Petkov | a5e07ef | 2012-07-09 14:27:57 +0200 | [diff] [blame] | 266 | ">STATE:123,RECONNECTING,detail,...,...\n" |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 267 | ">HOLD:Waiting for hold release\n" |
| 268 | "SUCCESS: Hold released."; |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 269 | InputData data = CreateInputDataFromString(s); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 270 | ExpectStaticChallengeResponse(); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 271 | ExpectPINResponse(); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 272 | EXPECT_CALL(driver_, FailService(Service::kFailureConnect, |
| 273 | Service::kErrorDetailsNone)); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 274 | EXPECT_CALL(driver_, OnReconnecting(_)); |
| 275 | EXPECT_FALSE(GetHoldWaiting()); |
| 276 | OnInput(&data); |
| 277 | EXPECT_TRUE(GetHoldWaiting()); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 278 | } |
| 279 | } |
| 280 | |
Darin Petkov | e08084d | 2012-06-11 13:19:35 +0200 | [diff] [blame] | 281 | TEST_F(OpenVPNManagementServerTest, OnInputStop) { |
| 282 | string s = |
| 283 | ">PASSWORD:Verification Failed: .\n" |
| 284 | ">STATE:123,RECONNECTING,detail,...,..."; |
| 285 | InputData data = CreateInputDataFromString(s); |
| 286 | SetSockets(); |
| 287 | // Stops the server after the first message is processed. |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 288 | EXPECT_CALL(driver_, FailService(Service::kFailureConnect, |
| 289 | Service::kErrorDetailsNone)) |
Darin Petkov | e08084d | 2012-06-11 13:19:35 +0200 | [diff] [blame] | 290 | .WillOnce(Assign(&server_.sockets_, reinterpret_cast<Sockets *>(NULL))); |
| 291 | // The second message should not be processed. |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 292 | EXPECT_CALL(driver_, OnReconnecting(_)).Times(0); |
| 293 | OnInput(&data); |
Darin Petkov | e08084d | 2012-06-11 13:19:35 +0200 | [diff] [blame] | 294 | } |
| 295 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 296 | TEST_F(OpenVPNManagementServerTest, ProcessMessage) { |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 297 | ProcessMessage("foo"); |
| 298 | ProcessMessage(">INFO:"); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 299 | |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 300 | EXPECT_CALL(driver_, OnReconnecting(_)); |
| 301 | ProcessMessage(">STATE:123,RECONNECTING,detail,...,..."); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 302 | } |
| 303 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 304 | TEST_F(OpenVPNManagementServerTest, ProcessSuccessMessage) { |
| 305 | EXPECT_FALSE(ProcessSuccessMessage("foo")); |
| 306 | EXPECT_TRUE(ProcessSuccessMessage("SUCCESS: foo")); |
| 307 | } |
| 308 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 309 | TEST_F(OpenVPNManagementServerTest, ProcessInfoMessage) { |
| 310 | EXPECT_FALSE(server_.ProcessInfoMessage("foo")); |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 311 | EXPECT_TRUE(server_.ProcessInfoMessage(">INFO:foo")); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 312 | } |
| 313 | |
| 314 | TEST_F(OpenVPNManagementServerTest, ProcessStateMessage) { |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 315 | EXPECT_TRUE(server_.state().empty()); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 316 | EXPECT_FALSE(ProcessStateMessage("foo")); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 317 | EXPECT_TRUE(server_.state().empty()); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 318 | EXPECT_TRUE(ProcessStateMessage(">STATE:123,WAIT,detail,...,...")); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 319 | EXPECT_EQ("WAIT", server_.state()); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 320 | { |
| 321 | InSequence seq; |
| 322 | EXPECT_CALL(driver_, |
| 323 | OnReconnecting(OpenVPNDriver::kReconnectReasonUnknown)); |
| 324 | EXPECT_CALL(driver_, |
| 325 | OnReconnecting(OpenVPNDriver::kReconnectReasonTLSError)); |
| 326 | } |
| 327 | EXPECT_TRUE(ProcessStateMessage(">STATE:123,RECONNECTING,detail,...,...")); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 328 | EXPECT_EQ(OpenVPNManagementServer::kStateReconnecting, server_.state()); |
Darin Petkov | 0cd0d1e | 2013-02-11 12:49:10 +0100 | [diff] [blame] | 329 | EXPECT_TRUE(ProcessStateMessage(">STATE:123,RECONNECTING,tls-error,...,...")); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 330 | } |
| 331 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 332 | TEST_F(OpenVPNManagementServerTest, ProcessNeedPasswordMessageAuthSC) { |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 333 | ExpectStaticChallengeResponse(); |
| 334 | EXPECT_TRUE( |
| 335 | server_.ProcessNeedPasswordMessage( |
| 336 | ">PASSWORD:Need 'Auth' SC:user/password/otp")); |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 337 | EXPECT_FALSE(driver_.args()->ContainsString(kOpenVPNOTPProperty)); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 338 | } |
| 339 | |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 340 | TEST_F(OpenVPNManagementServerTest, ProcessNeedPasswordMessageAuth) { |
| 341 | ExpectAuthenticationResponse(); |
| 342 | EXPECT_TRUE( |
| 343 | server_.ProcessNeedPasswordMessage( |
| 344 | ">PASSWORD:Need 'Auth' username/password")); |
| 345 | } |
| 346 | |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 347 | TEST_F(OpenVPNManagementServerTest, ProcessNeedPasswordMessageTPMToken) { |
| 348 | ExpectPINResponse(); |
| 349 | EXPECT_TRUE( |
| 350 | server_.ProcessNeedPasswordMessage( |
| 351 | ">PASSWORD:Need 'User-Specific TPM Token FOO' ...")); |
| 352 | } |
| 353 | |
| 354 | TEST_F(OpenVPNManagementServerTest, ProcessNeedPasswordMessageUnknown) { |
| 355 | EXPECT_FALSE(server_.ProcessNeedPasswordMessage("foo")); |
| 356 | } |
| 357 | |
Darin Petkov | aba8932 | 2013-03-11 14:48:22 +0100 | [diff] [blame] | 358 | TEST_F(OpenVPNManagementServerTest, ParseSubstring) { |
| 359 | EXPECT_EQ("", ParseSubstring("", "'", "'")); |
| 360 | EXPECT_EQ("", ParseSubstring(" ", "'", "'")); |
| 361 | EXPECT_EQ("", ParseSubstring("'", "'", "'")); |
| 362 | EXPECT_EQ("", ParseSubstring("''", "'", "'")); |
| 363 | EXPECT_EQ("", ParseSubstring("] [", "[", "]")); |
| 364 | EXPECT_EQ("", ParseSubstring("[]", "[", "]")); |
| 365 | EXPECT_EQ("bar", ParseSubstring("foo['bar']zoo", "['", "']")); |
| 366 | EXPECT_EQ("bar", ParseSubstring("foo['bar']", "['", "']")); |
| 367 | EXPECT_EQ("bar", ParseSubstring("['bar']zoo", "['", "']")); |
| 368 | EXPECT_EQ("bar", ParseSubstring("['bar']['zoo']", "['", "']")); |
| 369 | } |
| 370 | |
| 371 | TEST_F(OpenVPNManagementServerTest, ParsePasswordTag) { |
| 372 | EXPECT_EQ("", ParsePasswordTag("")); |
| 373 | EXPECT_EQ("Auth", |
| 374 | ParsePasswordTag( |
| 375 | ">PASSWORD:Verification Failed: 'Auth' " |
| 376 | "['REVOKED: client certificate has been revoked']")); |
| 377 | } |
| 378 | |
| 379 | TEST_F(OpenVPNManagementServerTest, ParsePasswordFailedReason) { |
| 380 | EXPECT_EQ("", ParsePasswordFailedReason("")); |
| 381 | EXPECT_EQ("REVOKED: client certificate has been revoked", |
| 382 | ParsePasswordFailedReason( |
| 383 | ">PASSWORD:Verification Failed: 'Auth' " |
| 384 | "['REVOKED: client certificate has been revoked']")); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 385 | } |
| 386 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 387 | TEST_F(OpenVPNManagementServerTest, PerformStaticChallengeNoCreds) { |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 388 | EXPECT_CALL(driver_, FailService(Service::kFailureInternal, |
| 389 | Service::kErrorDetailsNone)).Times(3); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 390 | server_.PerformStaticChallenge("Auth"); |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 391 | driver_.args()->SetString(kOpenVPNUserProperty, "jojo"); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 392 | server_.PerformStaticChallenge("Auth"); |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 393 | driver_.args()->SetString(kOpenVPNPasswordProperty, "yoyo"); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 394 | server_.PerformStaticChallenge("Auth"); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 395 | } |
| 396 | |
| 397 | TEST_F(OpenVPNManagementServerTest, PerformStaticChallenge) { |
| 398 | ExpectStaticChallengeResponse(); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 399 | server_.PerformStaticChallenge("Auth"); |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 400 | EXPECT_FALSE(driver_.args()->ContainsString(kOpenVPNOTPProperty)); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 401 | } |
| 402 | |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 403 | TEST_F(OpenVPNManagementServerTest, PerformAuthenticationNoCreds) { |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 404 | EXPECT_CALL(driver_, FailService(Service::kFailureInternal, |
| 405 | Service::kErrorDetailsNone)).Times(2); |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 406 | server_.PerformAuthentication("Auth"); |
Ben Chan | 7372878 | 2013-09-20 13:40:54 -0700 | [diff] [blame] | 407 | driver_.args()->SetString(kOpenVPNUserProperty, "jojo"); |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 408 | server_.PerformAuthentication("Auth"); |
| 409 | } |
| 410 | |
| 411 | TEST_F(OpenVPNManagementServerTest, PerformAuthentication) { |
| 412 | ExpectAuthenticationResponse(); |
| 413 | server_.PerformAuthentication("Auth"); |
| 414 | } |
| 415 | |
Darin Petkov | a5e07ef | 2012-07-09 14:27:57 +0200 | [diff] [blame] | 416 | TEST_F(OpenVPNManagementServerTest, ProcessHoldMessage) { |
| 417 | EXPECT_FALSE(server_.hold_release_); |
| 418 | EXPECT_FALSE(server_.hold_waiting_); |
| 419 | |
| 420 | EXPECT_FALSE(server_.ProcessHoldMessage("foo")); |
| 421 | |
| 422 | EXPECT_TRUE(server_.ProcessHoldMessage(">HOLD:Waiting for hold release")); |
| 423 | EXPECT_FALSE(server_.hold_release_); |
| 424 | EXPECT_TRUE(server_.hold_waiting_); |
| 425 | |
| 426 | ExpectHoldRelease(); |
| 427 | server_.hold_release_ = true; |
| 428 | server_.hold_waiting_ = false; |
| 429 | EXPECT_TRUE(server_.ProcessHoldMessage(">HOLD:Waiting for hold release")); |
| 430 | EXPECT_TRUE(server_.hold_release_); |
| 431 | EXPECT_FALSE(server_.hold_waiting_); |
| 432 | } |
| 433 | |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 434 | TEST_F(OpenVPNManagementServerTest, SupplyTPMTokenNoPIN) { |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 435 | EXPECT_CALL(driver_, FailService(Service::kFailureInternal, |
| 436 | Service::kErrorDetailsNone)); |
Darin Petkov | e0d5dd1 | 2012-04-04 16:10:48 +0200 | [diff] [blame] | 437 | server_.SupplyTPMToken("User-Specific TPM Token FOO"); |
| 438 | } |
| 439 | |
| 440 | TEST_F(OpenVPNManagementServerTest, SupplyTPMToken) { |
| 441 | ExpectPINResponse(); |
| 442 | server_.SupplyTPMToken("User-Specific TPM Token FOO"); |
| 443 | } |
| 444 | |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 445 | TEST_F(OpenVPNManagementServerTest, Send) { |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 446 | const char kMessage[] = "foo\n"; |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 447 | SetConnectedSocket(); |
| 448 | ExpectSend(kMessage); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 449 | server_.Send(kMessage); |
| 450 | } |
| 451 | |
| 452 | TEST_F(OpenVPNManagementServerTest, SendState) { |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 453 | SetConnectedSocket(); |
| 454 | ExpectSend("state off\n"); |
Darin Petkov | 271fe52 | 2012-03-27 13:47:29 +0200 | [diff] [blame] | 455 | server_.SendState("off"); |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 456 | } |
| 457 | |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 458 | TEST_F(OpenVPNManagementServerTest, SendUsername) { |
| 459 | SetConnectedSocket(); |
| 460 | ExpectSend("username \"Auth\" joesmith\n"); |
| 461 | server_.SendUsername("Auth", "joesmith"); |
| 462 | } |
| 463 | |
| 464 | TEST_F(OpenVPNManagementServerTest, SendPassword) { |
| 465 | SetConnectedSocket(); |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 466 | ExpectSend("password \"Auth\" \"foo\\\"bar\"\n"); |
| 467 | server_.SendPassword("Auth", "foo\"bar"); |
Darin Petkov | 683942b | 2012-03-27 18:00:04 +0200 | [diff] [blame] | 468 | } |
| 469 | |
Darin Petkov | 0440b9b | 2012-04-17 16:11:56 +0200 | [diff] [blame] | 470 | TEST_F(OpenVPNManagementServerTest, ProcessFailedPasswordMessage) { |
| 471 | EXPECT_FALSE(server_.ProcessFailedPasswordMessage("foo")); |
Darin Petkov | 1c049c7 | 2013-03-21 13:15:45 +0100 | [diff] [blame] | 472 | EXPECT_CALL(driver_, FailService(Service::kFailureConnect, |
| 473 | Service::kErrorDetailsNone)).Times(3); |
| 474 | EXPECT_CALL(driver_, FailService(Service::kFailureConnect, "Revoked.")); |
Darin Petkov | 0440b9b | 2012-04-17 16:11:56 +0200 | [diff] [blame] | 475 | EXPECT_TRUE( |
| 476 | server_.ProcessFailedPasswordMessage(">PASSWORD:Verification Failed: .")); |
Darin Petkov | aba8932 | 2013-03-11 14:48:22 +0100 | [diff] [blame] | 477 | EXPECT_TRUE( |
| 478 | server_.ProcessFailedPasswordMessage( |
| 479 | ">PASSWORD:Verification Failed: 'Private Key' ['Reason']")); |
| 480 | EXPECT_TRUE( |
| 481 | server_.ProcessFailedPasswordMessage( |
| 482 | ">PASSWORD:Verification Failed: 'Auth'")); |
| 483 | EXPECT_TRUE( |
| 484 | server_.ProcessFailedPasswordMessage( |
| 485 | ">PASSWORD:Verification Failed: 'Auth' ['Revoked.']")); |
Darin Petkov | 0440b9b | 2012-04-17 16:11:56 +0200 | [diff] [blame] | 486 | } |
| 487 | |
Darin Petkov | 16e7032 | 2013-03-07 15:54:23 +0100 | [diff] [blame] | 488 | TEST_F(OpenVPNManagementServerTest, ProcessAuthTokenMessage) { |
| 489 | EXPECT_FALSE(ProcessAuthTokenMessage("foo")); |
| 490 | EXPECT_TRUE(ProcessAuthTokenMessage(">PASSWORD:Auth-Token:ToKeN==")); |
| 491 | } |
| 492 | |
Darin Petkov | a42afe3 | 2013-02-05 16:53:52 +0100 | [diff] [blame] | 493 | TEST_F(OpenVPNManagementServerTest, SendSignal) { |
| 494 | SetConnectedSocket(); |
| 495 | ExpectSend("signal SIGUSR2\n"); |
| 496 | SendSignal("SIGUSR2"); |
| 497 | } |
| 498 | |
| 499 | TEST_F(OpenVPNManagementServerTest, Restart) { |
| 500 | ExpectRestart(); |
| 501 | server_.Restart(); |
| 502 | } |
| 503 | |
Darin Petkov | a5e07ef | 2012-07-09 14:27:57 +0200 | [diff] [blame] | 504 | TEST_F(OpenVPNManagementServerTest, SendHoldRelease) { |
| 505 | ExpectHoldRelease(); |
| 506 | server_.SendHoldRelease(); |
| 507 | } |
| 508 | |
| 509 | TEST_F(OpenVPNManagementServerTest, Hold) { |
| 510 | EXPECT_FALSE(server_.hold_release_); |
| 511 | EXPECT_FALSE(server_.hold_waiting_); |
| 512 | |
| 513 | server_.ReleaseHold(); |
| 514 | EXPECT_TRUE(server_.hold_release_); |
| 515 | EXPECT_FALSE(server_.hold_waiting_); |
| 516 | |
| 517 | server_.Hold(); |
| 518 | EXPECT_FALSE(server_.hold_release_); |
| 519 | EXPECT_FALSE(server_.hold_waiting_); |
| 520 | |
| 521 | server_.hold_waiting_ = true; |
| 522 | ExpectHoldRelease(); |
| 523 | server_.ReleaseHold(); |
| 524 | EXPECT_TRUE(server_.hold_release_); |
| 525 | EXPECT_FALSE(server_.hold_waiting_); |
| 526 | } |
| 527 | |
Darin Petkov | daaa553 | 2012-07-24 15:37:55 +0200 | [diff] [blame] | 528 | TEST_F(OpenVPNManagementServerTest, EscapeToQuote) { |
| 529 | EXPECT_EQ("", OpenVPNManagementServer::EscapeToQuote("")); |
| 530 | EXPECT_EQ("foo './", OpenVPNManagementServer::EscapeToQuote("foo './")); |
| 531 | EXPECT_EQ("\\\\", OpenVPNManagementServer::EscapeToQuote("\\")); |
| 532 | EXPECT_EQ("\\\"", OpenVPNManagementServer::EscapeToQuote("\"")); |
| 533 | EXPECT_EQ("\\\\\\\"foo\\\\bar\\\"", |
| 534 | OpenVPNManagementServer::EscapeToQuote("\\\"foo\\bar\"")); |
| 535 | } |
| 536 | |
Darin Petkov | 1c11520 | 2012-03-22 15:35:47 +0100 | [diff] [blame] | 537 | } // namespace shill |