2021-05-09 11:12:05 -04:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2022-09-02 03:16:19 -04:00
|
|
|
"net/netip"
|
2021-05-09 11:12:05 -04:00
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"gopkg.in/check.v1"
|
|
|
|
)
|
|
|
|
|
|
|
|
func Test(t *testing.T) {
|
|
|
|
check.TestingT(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = check.Suite(&Suite{})
|
|
|
|
|
|
|
|
type Suite struct{}
|
|
|
|
|
2021-11-13 03:36:45 -05:00
|
|
|
var (
|
|
|
|
tmpDir string
|
2021-11-15 11:16:04 -05:00
|
|
|
app Headscale
|
2021-11-13 03:36:45 -05:00
|
|
|
)
|
2021-05-09 11:12:05 -04:00
|
|
|
|
|
|
|
func (s *Suite) SetUpTest(c *check.C) {
|
|
|
|
s.ResetDB(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TearDownTest(c *check.C) {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) ResetDB(c *check.C) {
|
|
|
|
if len(tmpDir) != 0 {
|
|
|
|
os.RemoveAll(tmpDir)
|
|
|
|
}
|
|
|
|
var err error
|
2022-08-09 17:21:19 -04:00
|
|
|
tmpDir, err = os.MkdirTemp("", "autoygg-client-test")
|
2021-05-09 11:12:05 -04:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-08-02 15:06:26 -04:00
|
|
|
cfg := Config{
|
2022-09-02 03:16:19 -04:00
|
|
|
IPPrefixes: []netip.Prefix{
|
|
|
|
netip.MustParsePrefix("10.27.0.0/23"),
|
2022-01-16 08:16:59 -05:00
|
|
|
},
|
2021-08-02 15:06:26 -04:00
|
|
|
}
|
2021-05-09 11:12:05 -04:00
|
|
|
|
2021-11-15 11:16:04 -05:00
|
|
|
app = Headscale{
|
2022-06-05 11:47:26 -04:00
|
|
|
cfg: &cfg,
|
2021-05-09 11:12:05 -04:00
|
|
|
dbType: "sqlite3",
|
|
|
|
dbString: tmpDir + "/headscale_test.db",
|
|
|
|
}
|
2021-11-15 11:16:04 -05:00
|
|
|
err = app.initDB()
|
2021-05-09 11:12:05 -04:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 11:16:04 -05:00
|
|
|
db, err := app.openDB()
|
2021-07-04 15:40:46 -04:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-11-15 11:16:04 -05:00
|
|
|
app.db = db
|
2021-05-09 11:12:05 -04:00
|
|
|
}
|
2022-01-31 07:18:50 -05:00
|
|
|
|
|
|
|
// Enusre an error is returned when an invalid auth mode
|
|
|
|
// is supplied.
|
2022-01-31 10:27:43 -05:00
|
|
|
func (s *Suite) TestInvalidClientAuthMode(c *check.C) {
|
2022-02-21 10:09:23 -05:00
|
|
|
_, isValid := LookupTLSClientAuthMode("invalid")
|
|
|
|
c.Assert(isValid, check.Equals, false)
|
2022-01-31 07:18:50 -05:00
|
|
|
}
|
|
|
|
|
2022-01-31 10:27:43 -05:00
|
|
|
// Ensure that all client auth modes return a nil error.
|
|
|
|
func (s *Suite) TestAuthModes(c *check.C) {
|
|
|
|
modes := []string{"disabled", "relaxed", "enforced"}
|
2022-01-31 07:18:50 -05:00
|
|
|
|
2022-01-31 10:27:43 -05:00
|
|
|
for _, v := range modes {
|
2022-02-21 10:09:23 -05:00
|
|
|
_, isValid := LookupTLSClientAuthMode(v)
|
|
|
|
c.Assert(isValid, check.Equals, true)
|
2022-01-31 10:27:43 -05:00
|
|
|
}
|
2022-01-31 07:18:50 -05:00
|
|
|
}
|