241 lines
8.9 KiB
C
241 lines
8.9 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Copyright 2017 Red Hat, Inc.
|
|
*/
|
|
|
|
#include "nm-default.h"
|
|
|
|
#include "nm-meta-setting-access.h"
|
|
#include "nm-vpn-helpers.h"
|
|
|
|
#include "nm-utils/nm-test-utils.h"
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
test_client_meta_check (void)
|
|
{
|
|
const NMMetaSettingInfoEditor *const*infos_p;
|
|
NMMetaSettingType m;
|
|
guint p;
|
|
|
|
G_STATIC_ASSERT (G_STRUCT_OFFSET (NMMetaAbstractInfo, meta_type) == G_STRUCT_OFFSET (NMMetaSettingInfoEditor, meta_type));
|
|
G_STATIC_ASSERT (G_STRUCT_OFFSET (NMMetaAbstractInfo, meta_type) == G_STRUCT_OFFSET (NMMetaPropertyInfo, meta_type));
|
|
|
|
for (m = 0; m < _NM_META_SETTING_TYPE_NUM; m++) {
|
|
const NMMetaSettingInfo *info = &nm_meta_setting_infos[m];
|
|
GType gtype;
|
|
|
|
g_assert (info);
|
|
g_assert (info->meta_type == m);
|
|
g_assert (info->setting_name);
|
|
g_assert (info->get_setting_gtype);
|
|
|
|
gtype = info->get_setting_gtype ();
|
|
g_assert (gtype != NM_TYPE_SETTING);
|
|
|
|
{
|
|
nm_auto_unref_gtypeclass GTypeClass *gclass = g_type_class_ref (gtype);
|
|
|
|
g_assert (G_TYPE_CHECK_CLASS_TYPE (gclass, gtype));
|
|
}
|
|
{
|
|
gs_unref_object NMSetting *setting = g_object_new (gtype, NULL);
|
|
|
|
g_assert (NM_IS_SETTING (setting));
|
|
g_assert (G_TYPE_CHECK_INSTANCE_TYPE (setting, gtype));
|
|
g_assert_cmpstr (nm_setting_get_name (setting), ==, info->setting_name);
|
|
}
|
|
}
|
|
|
|
for (m = 0; m < _NM_META_SETTING_TYPE_NUM; m++) {
|
|
const NMMetaSettingInfoEditor *info = &nm_meta_setting_infos_editor[m];
|
|
|
|
g_assert (info);
|
|
g_assert (info->meta_type == &nm_meta_type_setting_info_editor);
|
|
g_assert (info->general);
|
|
g_assert (info->general == &nm_meta_setting_infos[m]);
|
|
|
|
g_assert_cmpstr (info->general->setting_name, ==, info->meta_type->get_name ((const NMMetaAbstractInfo *) info, FALSE));
|
|
g_assert_cmpstr ("name", ==, info->meta_type->get_name ((const NMMetaAbstractInfo *) info, TRUE));
|
|
|
|
g_assert (info->properties_num == NM_PTRARRAY_LEN (info->properties));
|
|
|
|
if (info->properties_num) {
|
|
gs_unref_hashtable GHashTable *property_names = g_hash_table_new (nm_str_hash, g_str_equal);
|
|
|
|
g_assert (info->properties);
|
|
for (p = 0; p < info->properties_num; p++) {
|
|
const NMMetaPropertyInfo *pi = info->properties[p];
|
|
|
|
g_assert (pi);
|
|
g_assert (pi->meta_type == &nm_meta_type_property_info);
|
|
g_assert (pi->setting_info == info);
|
|
g_assert (pi->property_name);
|
|
|
|
g_assert (g_hash_table_add (property_names, (gpointer) pi->property_name));
|
|
|
|
g_assert_cmpstr (pi->property_name, ==, pi->meta_type->get_name ((const NMMetaAbstractInfo *) pi, FALSE));
|
|
g_assert_cmpstr (pi->property_name, ==, pi->meta_type->get_name ((const NMMetaAbstractInfo *) pi, TRUE));
|
|
|
|
g_assert (pi->property_type);
|
|
g_assert (pi->property_type->get_fcn);
|
|
}
|
|
g_assert (!info->properties[info->properties_num]);
|
|
} else
|
|
g_assert (!info->properties);
|
|
|
|
if (info->valid_parts) {
|
|
gsize i, l;
|
|
gs_unref_hashtable GHashTable *dup = g_hash_table_new (nm_direct_hash, NULL);
|
|
|
|
l = NM_PTRARRAY_LEN (info->valid_parts);
|
|
g_assert (l >= 2);
|
|
|
|
for (i = 0; info->valid_parts[i]; i++) {
|
|
g_assert (info->valid_parts[i]->setting_info);
|
|
g_assert (g_hash_table_add (dup, (gpointer) info->valid_parts[i]->setting_info));
|
|
|
|
if (i == 0) {
|
|
g_assert (info->valid_parts[i]->setting_info == &nm_meta_setting_infos_editor[NM_META_SETTING_TYPE_CONNECTION]);
|
|
g_assert (info->valid_parts[i]->mandatory);
|
|
}
|
|
if (i == 1) {
|
|
g_assert (info->valid_parts[i]->setting_info == &nm_meta_setting_infos_editor[m]);
|
|
g_assert (info->valid_parts[i]->mandatory);
|
|
}
|
|
}
|
|
g_assert (i == l);
|
|
}
|
|
}
|
|
|
|
for (m = 0; m < _NM_META_SETTING_TYPE_NUM; m++) {
|
|
const NMMetaSettingInfoEditor *info = &nm_meta_setting_infos_editor[m];
|
|
|
|
g_assert (nm_meta_setting_info_editor_find_by_name (info->general->setting_name, FALSE) == info);
|
|
g_assert (nm_meta_setting_info_editor_find_by_gtype (info->general->get_setting_gtype ()) == info);
|
|
|
|
for (p = 0; p < info->properties_num; p++) {
|
|
const NMMetaPropertyInfo *pi = info->properties[p];
|
|
|
|
g_assert (nm_meta_setting_info_editor_get_property_info (info, pi->property_name) == pi);
|
|
g_assert (nm_meta_property_info_find_by_name (info->general->setting_name, pi->property_name) == pi);
|
|
}
|
|
}
|
|
|
|
infos_p = nm_meta_setting_infos_editor_p ();
|
|
g_assert (infos_p);
|
|
for (m = 0; m < _NM_META_SETTING_TYPE_NUM; m++)
|
|
g_assert (infos_p[m] == &nm_meta_setting_infos_editor[m]);
|
|
g_assert (!infos_p[m]);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
test_client_import_wireguard_test0 (void)
|
|
{
|
|
gs_unref_object NMConnection *connection;
|
|
NMSettingWireGuard *s_wg;
|
|
NMWireGuardPeer *peer;
|
|
gs_free_error GError *error = NULL;
|
|
|
|
connection = nm_vpn_wireguard_import (NM_BUILD_SRCDIR"/clients/common/tests/wg-test0.conf",
|
|
&error);
|
|
|
|
g_assert_no_error (error);
|
|
|
|
g_assert_cmpstr (nm_connection_get_id (connection), ==, "wg-test0");
|
|
g_assert_cmpstr (nm_connection_get_interface_name (connection), ==, "wg-test0");
|
|
g_assert_cmpstr (nm_connection_get_connection_type (connection), ==, NM_SETTING_WIREGUARD_SETTING_NAME);
|
|
|
|
s_wg = NM_SETTING_WIREGUARD (nm_connection_get_setting (connection, NM_TYPE_SETTING_WIREGUARD));
|
|
|
|
g_assert_cmpint (nm_setting_wireguard_get_listen_port (s_wg), ==, 51820);
|
|
g_assert_cmpstr (nm_setting_wireguard_get_private_key (s_wg), ==, "yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=");
|
|
|
|
g_assert_cmpint (nm_setting_wireguard_get_peers_len (s_wg), ==, 3);
|
|
|
|
peer = nm_setting_wireguard_get_peer (s_wg, 0);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_public_key (peer), ==, "xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=");
|
|
g_assert_cmpstr (nm_wireguard_peer_get_endpoint (peer), ==, "192.95.5.67:1234");
|
|
g_assert_cmpint (nm_wireguard_peer_get_allowed_ips_len (peer), ==, 2);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_allowed_ip (peer, 0, NULL), ==, "10.192.122.3/32");
|
|
g_assert_cmpstr (nm_wireguard_peer_get_allowed_ip (peer, 1, NULL), ==, "10.192.124.1/24");
|
|
|
|
peer = nm_setting_wireguard_get_peer (s_wg, 1);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_public_key (peer), ==, "TrMvSoP4jYQlY6RIzBgbssQqY3vxI2Pi+y71lOWWXX0=");
|
|
g_assert_cmpstr (nm_wireguard_peer_get_endpoint (peer), ==, "[2607:5300:60:6b0::c05f:543]:2468");
|
|
g_assert_cmpint (nm_wireguard_peer_get_allowed_ips_len (peer), ==, 2);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_allowed_ip (peer, 0, NULL), ==, "10.192.122.4/32");
|
|
g_assert_cmpstr (nm_wireguard_peer_get_allowed_ip (peer, 1, NULL), ==, "192.168.0.0/16");
|
|
|
|
peer = nm_setting_wireguard_get_peer (s_wg, 2);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_public_key (peer), ==, "gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=");
|
|
g_assert_cmpstr (nm_wireguard_peer_get_endpoint (peer), ==, "test.wireguard.com:18981");
|
|
g_assert_cmpint (nm_wireguard_peer_get_allowed_ips_len (peer), ==, 1);
|
|
g_assert_cmpstr (nm_wireguard_peer_get_allowed_ip (peer, 0, NULL), ==, "10.10.10.230/32");
|
|
}
|
|
|
|
static void
|
|
test_client_import_wireguard_test1 (void)
|
|
{
|
|
gs_free_error GError *error = NULL;
|
|
|
|
nm_vpn_wireguard_import (NM_BUILD_SRCDIR"/clients/common/tests/wg-test1.conf", &error);
|
|
g_assert_error (error, NM_UTILS_ERROR, NM_UTILS_ERROR_INVALID_ARGUMENT);
|
|
g_assert (g_str_has_prefix (error->message, "invalid secret 'PrivateKey'"));
|
|
g_assert (g_str_has_suffix (error->message, "wg-test1.conf:2"));
|
|
}
|
|
|
|
static void
|
|
test_client_import_wireguard_test2 (void)
|
|
{
|
|
gs_free_error GError *error = NULL;
|
|
|
|
nm_vpn_wireguard_import (NM_BUILD_SRCDIR"/clients/common/tests/wg-test2.conf", &error);
|
|
|
|
g_assert_error (error, NM_UTILS_ERROR, NM_UTILS_ERROR_INVALID_ARGUMENT);
|
|
g_assert (g_str_has_prefix (error->message, "unrecognized line at"));
|
|
g_assert (g_str_has_suffix (error->message, "wg-test2.conf:5"));
|
|
}
|
|
|
|
static void
|
|
test_client_import_wireguard_test3 (void)
|
|
{
|
|
gs_free_error GError *error = NULL;
|
|
|
|
nm_vpn_wireguard_import (NM_BUILD_SRCDIR"/clients/common/tests/wg-test3.conf", &error);
|
|
g_assert_error (error, NM_UTILS_ERROR, NM_UTILS_ERROR_INVALID_ARGUMENT);
|
|
g_assert (g_str_has_prefix (error->message, "invalid value for 'ListenPort'"));
|
|
g_assert (g_str_has_suffix (error->message, "wg-test3.conf:3"));
|
|
}
|
|
|
|
static void
|
|
test_client_import_wireguard_missing (void)
|
|
{
|
|
gs_free_error GError *error = NULL;
|
|
|
|
nm_vpn_wireguard_import (NM_BUILD_SRCDIR"/clients/common/tests/wg-missing.conf", &error);
|
|
g_assert_error (error, G_FILE_ERROR, G_FILE_ERROR_NOENT);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
NMTST_DEFINE ();
|
|
|
|
int
|
|
main (int argc, char **argv)
|
|
{
|
|
nmtst_init (&argc, &argv, TRUE);
|
|
|
|
g_test_add_func ("/client/meta/check", test_client_meta_check);
|
|
g_test_add_func ("/client/import/wireguard/test0", test_client_import_wireguard_test0);
|
|
g_test_add_func ("/client/import/wireguard/test1", test_client_import_wireguard_test1);
|
|
g_test_add_func ("/client/import/wireguard/test2", test_client_import_wireguard_test2);
|
|
g_test_add_func ("/client/import/wireguard/test3", test_client_import_wireguard_test3);
|
|
g_test_add_func ("/client/import/wireguard/missing", test_client_import_wireguard_missing);
|
|
|
|
return g_test_run ();
|
|
}
|