2019-02-27 13:07:29 +03:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
/* Tests performed:
|
|
|
|
. Bad certificate
|
|
|
|
. Bad private key
|
|
|
|
. Valid certificate & private key */
|
|
|
|
func TestValidateCertificates(t *testing.T) {
|
2019-02-27 14:11:41 +03:00
|
|
|
var data tlsConfigStatus
|
2019-02-27 13:07:29 +03:00
|
|
|
|
|
|
|
// bad cert
|
2019-02-27 14:11:41 +03:00
|
|
|
data = validateCertificates("bad cert", "", "")
|
2019-02-27 13:07:29 +03:00
|
|
|
if !(data.WarningValidation != "" &&
|
|
|
|
!data.ValidCert &&
|
|
|
|
!data.ValidChain) {
|
|
|
|
t.Fatalf("bad cert: validateCertificates(): %v", data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// bad priv key
|
2019-02-27 14:11:41 +03:00
|
|
|
data = validateCertificates("", "bad priv key", "")
|
2019-02-27 13:07:29 +03:00
|
|
|
if !(data.WarningValidation != "" &&
|
|
|
|
!data.ValidKey) {
|
|
|
|
t.Fatalf("bad priv key: validateCertificates(): %v", data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// valid cert & priv key
|
2019-02-27 14:11:41 +03:00
|
|
|
CertificateChain := `-----BEGIN CERTIFICATE-----
|
2019-02-27 13:07:29 +03:00
|
|
|
MIICKzCCAZSgAwIBAgIJAMT9kPVJdM7LMA0GCSqGSIb3DQEBCwUAMC0xFDASBgNV
|
|
|
|
BAoMC0FkR3VhcmQgTHRkMRUwEwYDVQQDDAxBZEd1YXJkIEhvbWUwHhcNMTkwMjI3
|
|
|
|
MDkyNDIzWhcNNDYwNzE0MDkyNDIzWjAtMRQwEgYDVQQKDAtBZEd1YXJkIEx0ZDEV
|
|
|
|
MBMGA1UEAwwMQWRHdWFyZCBIb21lMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
|
|
|
|
gQCwvwUnPJiOvLcOaWmGu6Y68ksFr13nrXBcsDlhxlXy8PaohVi3XxEmt2OrVjKW
|
|
|
|
QFw/bdV4fZ9tdWFAVRRkgeGbIZzP7YBD1Ore/O5SQ+DbCCEafvjJCcXQIrTeKFE6
|
|
|
|
i9G3aSMHs0Pwq2LgV8U5mYotLrvyFiE8QPInJbDDMpaFYwIDAQABo1MwUTAdBgNV
|
|
|
|
HQ4EFgQUdLUmQpEqrhn4eKO029jYd2AAZEQwHwYDVR0jBBgwFoAUdLUmQpEqrhn4
|
|
|
|
eKO029jYd2AAZEQwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQB8
|
|
|
|
LwlXfbakf7qkVTlCNXgoY7RaJ8rJdPgOZPoCTVToEhT6u/cb1c2qp8QB0dNExDna
|
|
|
|
b0Z+dnODTZqQOJo6z/wIXlcUrnR4cQVvytXt8lFn+26l6Y6EMI26twC/xWr+1swq
|
|
|
|
Muj4FeWHVDerquH4yMr1jsYLD3ci+kc5sbIX6TfVxQ==
|
|
|
|
-----END CERTIFICATE-----`
|
2019-02-27 14:11:41 +03:00
|
|
|
PrivateKey := `-----BEGIN PRIVATE KEY-----
|
2019-02-27 13:07:29 +03:00
|
|
|
MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBALC/BSc8mI68tw5p
|
|
|
|
aYa7pjrySwWvXeetcFywOWHGVfLw9qiFWLdfESa3Y6tWMpZAXD9t1Xh9n211YUBV
|
|
|
|
FGSB4ZshnM/tgEPU6t787lJD4NsIIRp++MkJxdAitN4oUTqL0bdpIwezQ/CrYuBX
|
|
|
|
xTmZii0uu/IWITxA8iclsMMyloVjAgMBAAECgYEAmjzoG1h27UDkIlB9BVWl95TP
|
|
|
|
QVPLB81D267xNFDnWk1Lgr5zL/pnNjkdYjyjgpkBp1yKyE4gHV4skv5sAFWTcOCU
|
|
|
|
QCgfPfUn/rDFcxVzAdJVWAa/CpJNaZgjTPR8NTGU+Ztod+wfBESNCP5tbnuw0GbL
|
|
|
|
MuwdLQJGbzeJYpsNysECQQDfFHYoRNfgxHwMbX24GCoNZIgk12uDmGTA9CS5E+72
|
|
|
|
9t3V1y4CfXxSkfhqNbd5RWrUBRLEw9BKofBS7L9NMDKDAkEAytQoIueE1vqEAaRg
|
|
|
|
a3A1YDUekKesU5wKfKfKlXvNgB7Hwh4HuvoQS9RCvVhf/60Dvq8KSu6hSjkFRquj
|
|
|
|
FQ5roQJBAMwKwyiCD5MfJPeZDmzcbVpiocRQ5Z4wPbffl9dRTDnIA5AciZDthlFg
|
|
|
|
An/jMjZSMCxNl6UyFcqt5Et1EGVhuFECQQCZLXxaT+qcyHjlHJTMzuMgkz1QFbEp
|
|
|
|
O5EX70gpeGQMPDK0QSWpaazg956njJSDbNCFM4BccrdQbJu1cW4qOsfBAkAMgZuG
|
|
|
|
O88slmgTRHX4JGFmy3rrLiHNI2BbJSuJ++Yllz8beVzh6NfvuY+HKRCmPqoBPATU
|
|
|
|
kXS9jgARhhiWXJrk
|
|
|
|
-----END PRIVATE KEY-----`
|
2019-02-27 14:11:41 +03:00
|
|
|
data = validateCertificates(CertificateChain, PrivateKey, "")
|
2019-02-27 13:07:29 +03:00
|
|
|
notBefore, _ := time.Parse(time.RFC3339, "2019-02-27T09:24:23Z")
|
|
|
|
notAfter, _ := time.Parse(time.RFC3339, "2046-07-14T09:24:23Z")
|
|
|
|
if !(data.WarningValidation != "" /* self signed */ &&
|
|
|
|
data.ValidCert &&
|
|
|
|
!data.ValidChain &&
|
|
|
|
data.ValidKey &&
|
|
|
|
data.KeyType == "RSA" &&
|
|
|
|
data.Subject == "CN=AdGuard Home,O=AdGuard Ltd" &&
|
|
|
|
data.Issuer == "CN=AdGuard Home,O=AdGuard Ltd" &&
|
|
|
|
data.NotBefore == notBefore &&
|
|
|
|
data.NotAfter == notAfter &&
|
|
|
|
// data.DNSNames[0] == &&
|
2019-02-27 17:36:02 +03:00
|
|
|
data.ValidPair) {
|
2019-02-27 13:07:29 +03:00
|
|
|
t.Fatalf("valid cert & priv key: validateCertificates(): %v", data)
|
|
|
|
}
|
|
|
|
}
|
2019-03-20 14:24:33 +03:00
|
|
|
|
|
|
|
func TestValidateUpstream(t *testing.T) {
|
|
|
|
invalidUpstreams := []string{"1.2.3.4.5",
|
|
|
|
"123.3.7m",
|
|
|
|
"htttps://google.com/dns-query",
|
|
|
|
"[/host.com]tls://dns.adguard.com",
|
|
|
|
"[host.ru]#",
|
|
|
|
}
|
|
|
|
|
|
|
|
validDefaultUpstreams := []string{"1.1.1.1",
|
|
|
|
"tls://1.1.1.1",
|
|
|
|
"https://dns.adguard.com/dns-query",
|
|
|
|
"sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
|
|
|
}
|
|
|
|
|
|
|
|
validUpstreams := []string{"[/host.com/]1.1.1.1",
|
|
|
|
"[//]tls://1.1.1.1",
|
|
|
|
"[/www.host.com/]#",
|
|
|
|
"[/host.com/google.com/]8.8.8.8",
|
|
|
|
"[/host/]sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
|
|
|
}
|
|
|
|
for _, u := range invalidUpstreams {
|
|
|
|
_, err := validateUpstream(u)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("upstream %s is invalid but it pass through validation", u)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, u := range validDefaultUpstreams {
|
|
|
|
defaultUpstream, err := validateUpstream(u)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("upstream %s is valid but it doen't pass through validation cause: %s", u, err)
|
|
|
|
}
|
|
|
|
if !defaultUpstream {
|
|
|
|
t.Fatalf("upstream %s is default one!", u)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, u := range validUpstreams {
|
|
|
|
defaultUpstream, err := validateUpstream(u)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("upstream %s is valid but it doen't pass through validation cause: %s", u, err)
|
|
|
|
}
|
|
|
|
if defaultUpstream {
|
|
|
|
t.Fatalf("upstream %s is default one!", u)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateUpstreamsSet(t *testing.T) {
|
|
|
|
// Set of valid upstreams. There is no default upstream specified
|
|
|
|
upstreamsSet := []string{"[/host.com/]1.1.1.1",
|
|
|
|
"[//]tls://1.1.1.1",
|
|
|
|
"[/www.host.com/]#",
|
|
|
|
"[/host.com/google.com/]8.8.8.8",
|
|
|
|
"[/host/]sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
|
|
|
}
|
|
|
|
err := validateUpstreams(upstreamsSet)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("there is no default upstream")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Let's add default upstream
|
|
|
|
upstreamsSet = append(upstreamsSet, "8.8.8.8")
|
|
|
|
err = validateUpstreams(upstreamsSet)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("upstreams set is valid, but doesn't pass through validation cause: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Let's add invalid upstream
|
|
|
|
upstreamsSet = append(upstreamsSet, "dhcp://fake.dns")
|
|
|
|
err = validateUpstreams(upstreamsSet)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("there is an invalid upstream in set, but it pass through validation")
|
|
|
|
}
|
|
|
|
}
|