2024-11-12 15:42:19 +00:00
|
|
|
//
|
2024-11-14 10:02:26 +00:00
|
|
|
// MigrationManagerTests.swift
|
2024-11-12 15:42:19 +00:00
|
|
|
// Passepartout
|
|
|
|
//
|
|
|
|
// Created by Davide De Rosa on 11/12/24.
|
|
|
|
// Copyright (c) 2024 Davide De Rosa. All rights reserved.
|
|
|
|
//
|
|
|
|
// https://github.com/passepartoutvpn
|
|
|
|
//
|
|
|
|
// This file is part of Passepartout.
|
|
|
|
//
|
|
|
|
// Passepartout is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// Passepartout is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with Passepartout. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
import CommonLibrary
|
2024-11-12 15:42:19 +00:00
|
|
|
import Foundation
|
|
|
|
@testable import LegacyV2
|
|
|
|
import PassepartoutKit
|
|
|
|
import XCTest
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
@MainActor
|
|
|
|
final class MigrationManagerTests: XCTestCase {
|
|
|
|
}
|
|
|
|
|
|
|
|
extension MigrationManagerTests {
|
|
|
|
func test_givenStrategy_whenFetchV2_thenReturnsProfilesV2() async throws {
|
|
|
|
let sut = newStrategy()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let profilesV2 = try await sut.fetchProfilesV2()
|
|
|
|
XCTAssertEqual(profilesV2.count, 6)
|
|
|
|
XCTAssertEqual(Set(profilesV2.map(\.header.name)), [
|
|
|
|
"Hide.me",
|
|
|
|
"ProtonVPN",
|
|
|
|
"TorGuard",
|
|
|
|
"vps-ta-cert-cbc256-lzo",
|
|
|
|
"vps-wg",
|
|
|
|
"Windscribe"
|
|
|
|
])
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
func test_givenManager_whenFetch_thenReturnsMigratableProfiles() async throws {
|
|
|
|
let sut = newManager()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let migratable = try await sut.fetchMigratableProfiles()
|
|
|
|
let expectedIDs = [
|
|
|
|
"069F76BD-1F6B-425C-AD83-62477A8B6558",
|
|
|
|
"239AD322-7440-4198-990A-D91379916FE2",
|
|
|
|
"38208B87-0545-4B11-A762-D04ED7CB904F",
|
|
|
|
"5D108793-7F62-4B4C-B194-0A7204C02E99",
|
|
|
|
"8A568345-85C4-44C1-A9C4-612E8B07ADC5",
|
|
|
|
"981E7CBD-7733-4CF3-9A51-2777614ED5D4"
|
|
|
|
]
|
|
|
|
let expectedNames = [
|
|
|
|
"Hide.me",
|
|
|
|
"ProtonVPN",
|
|
|
|
"TorGuard",
|
|
|
|
"vps-ta-cert-cbc256-lzo",
|
|
|
|
"vps-wg",
|
|
|
|
"Windscribe"
|
|
|
|
]
|
|
|
|
|
|
|
|
XCTAssertEqual(migratable.count, 6)
|
|
|
|
XCTAssertEqual(Set(migratable.map(\.id)), Set(expectedIDs.compactMap(UUID.init(uuidString:))))
|
|
|
|
XCTAssertEqual(Set(migratable.map(\.name)), Set(expectedNames))
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
func test_givenManager_whenMigrateHideMe_thenIsExpected() async throws {
|
|
|
|
let sut = newManager()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let id = try XCTUnwrap(UUID(uuidString: "8A568345-85C4-44C1-A9C4-612E8B07ADC5"))
|
2024-11-16 11:29:03 +00:00
|
|
|
let migrated = try await sut.migratedProfile(withId: id)
|
2024-11-14 10:02:26 +00:00
|
|
|
let profile = try XCTUnwrap(migrated)
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
XCTAssertEqual(profile.id, id)
|
|
|
|
XCTAssertEqual(profile.name, "Hide.me")
|
|
|
|
XCTAssertEqual(profile.attributes.lastUpdate, Date(timeIntervalSinceReferenceDate: 673117681.24825))
|
|
|
|
|
|
|
|
XCTAssertEqual(profile.modules.count, 3)
|
|
|
|
|
|
|
|
let onDemand = try XCTUnwrap(profile.firstModule(ofType: OnDemandModule.self))
|
|
|
|
XCTAssertTrue(onDemand.isEnabled)
|
|
|
|
XCTAssertEqual(onDemand.policy, .excluding)
|
|
|
|
XCTAssertEqual(onDemand.withSSIDs, [
|
|
|
|
"Safe Wi-Fi": true,
|
|
|
|
"Friend's House": false
|
|
|
|
])
|
|
|
|
XCTAssertTrue(onDemand.withOtherNetworks.isEmpty)
|
|
|
|
|
|
|
|
let openVPN = try XCTUnwrap(profile.firstModule(ofType: OpenVPNModule.self))
|
|
|
|
XCTAssertEqual(openVPN.credentials?.username, "foo")
|
|
|
|
XCTAssertEqual(openVPN.credentials?.password, "bar")
|
|
|
|
|
|
|
|
let dns = try XCTUnwrap(profile.firstModule(ofType: DNSModule.self))
|
|
|
|
let dohURL = try XCTUnwrap(URL(string: "https://1.1.1.1/dns-query"))
|
|
|
|
XCTAssertEqual(dns.protocolType, .https(url: dohURL))
|
|
|
|
XCTAssertEqual(dns.servers, [
|
|
|
|
Address(rawValue: "1.1.1.1"),
|
|
|
|
Address(rawValue: "1.0.0.1")
|
|
|
|
])
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
func test_givenManager_whenMigrateProtonVPN_thenIsExpected() async throws {
|
|
|
|
let sut = newManager()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let id = try XCTUnwrap(UUID(uuidString: "981E7CBD-7733-4CF3-9A51-2777614ED5D4"))
|
2024-11-16 11:29:03 +00:00
|
|
|
let migrated = try await sut.migratedProfile(withId: id)
|
2024-11-14 10:02:26 +00:00
|
|
|
let profile = try XCTUnwrap(migrated)
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
XCTAssertEqual(profile.id, id)
|
|
|
|
XCTAssertEqual(profile.name, "ProtonVPN")
|
|
|
|
XCTAssertEqual(profile.attributes.lastUpdate, Date(timeIntervalSinceReferenceDate: 724509584.854822))
|
|
|
|
|
|
|
|
XCTAssertEqual(profile.modules.count, 2)
|
|
|
|
|
|
|
|
let onDemand = try XCTUnwrap(profile.firstModule(ofType: OnDemandModule.self))
|
|
|
|
XCTAssertTrue(onDemand.isEnabled)
|
|
|
|
XCTAssertEqual(onDemand.policy, .excluding)
|
|
|
|
XCTAssertTrue(onDemand.withSSIDs.isEmpty)
|
|
|
|
XCTAssertTrue(onDemand.withOtherNetworks.isEmpty)
|
|
|
|
|
|
|
|
let openVPN = try XCTUnwrap(profile.firstModule(ofType: OpenVPNModule.self))
|
|
|
|
XCTAssertEqual(openVPN.credentials?.username, "foo")
|
|
|
|
XCTAssertEqual(openVPN.credentials?.password, "bar")
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
func test_givenManager_whenMigrateVPSOpenVPN_thenIsExpected() async throws {
|
|
|
|
let sut = newManager()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let id = try XCTUnwrap(UUID(uuidString: "239AD322-7440-4198-990A-D91379916FE2"))
|
2024-11-16 11:29:03 +00:00
|
|
|
let migrated = try await sut.migratedProfile(withId: id)
|
2024-11-14 10:02:26 +00:00
|
|
|
let profile = try XCTUnwrap(migrated)
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
XCTAssertEqual(profile.id, id)
|
|
|
|
XCTAssertEqual(profile.name, "vps-ta-cert-cbc256-lzo")
|
|
|
|
XCTAssertEqual(profile.attributes.lastUpdate, Date(timeIntervalSinceReferenceDate: 726164772.28976))
|
|
|
|
|
|
|
|
XCTAssertEqual(profile.modules.count, 2)
|
|
|
|
|
|
|
|
let onDemand = try XCTUnwrap(profile.firstModule(ofType: OnDemandModule.self))
|
|
|
|
XCTAssertTrue(onDemand.isEnabled)
|
|
|
|
XCTAssertEqual(onDemand.policy, .excluding)
|
|
|
|
XCTAssertTrue(onDemand.withSSIDs.isEmpty)
|
|
|
|
XCTAssertTrue(onDemand.withOtherNetworks.isEmpty)
|
|
|
|
|
|
|
|
let openVPN = try XCTUnwrap(profile.firstModule(ofType: OpenVPNModule.self))
|
|
|
|
XCTAssertNil(openVPN.credentials)
|
|
|
|
let cfg = try XCTUnwrap(openVPN.configuration)
|
|
|
|
XCTAssertEqual(cfg.remotes, [
|
|
|
|
try .init("1.2.3.4", .init(.udp, 1198))
|
|
|
|
])
|
|
|
|
XCTAssertEqual(cfg.authUserPass, false)
|
|
|
|
XCTAssertEqual(cfg.cipher, .aes256cbc)
|
|
|
|
XCTAssertEqual(cfg.digest, .sha256)
|
|
|
|
XCTAssertEqual(cfg.keepAliveInterval, 25.0)
|
|
|
|
XCTAssertEqual(cfg.checksEKU, true)
|
|
|
|
XCTAssertEqual(cfg.tlsWrap?.strategy, .auth)
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
func test_givenManager_whenMigrateVPSWireGuard_thenIsExpected() async throws {
|
|
|
|
let sut = newManager()
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
let id = try XCTUnwrap(UUID(uuidString: "069F76BD-1F6B-425C-AD83-62477A8B6558"))
|
2024-11-16 11:29:03 +00:00
|
|
|
let migrated = try await sut.migratedProfile(withId: id)
|
2024-11-14 10:02:26 +00:00
|
|
|
let profile = try XCTUnwrap(migrated)
|
2024-11-12 15:42:19 +00:00
|
|
|
|
|
|
|
XCTAssertEqual(profile.id, id)
|
|
|
|
XCTAssertEqual(profile.name, "vps-wg")
|
|
|
|
XCTAssertEqual(profile.attributes.lastUpdate, Date(timeIntervalSinceReferenceDate: 727398252.46203))
|
|
|
|
|
|
|
|
XCTAssertEqual(profile.modules.count, 2)
|
|
|
|
|
|
|
|
let onDemand = try XCTUnwrap(profile.firstModule(ofType: OnDemandModule.self))
|
|
|
|
XCTAssertFalse(onDemand.isEnabled)
|
|
|
|
XCTAssertEqual(onDemand.policy, .including)
|
|
|
|
XCTAssertTrue(onDemand.withSSIDs.isEmpty)
|
|
|
|
XCTAssertTrue(onDemand.withOtherNetworks.isEmpty)
|
|
|
|
|
|
|
|
let wireGuard = try XCTUnwrap(profile.firstModule(ofType: WireGuardModule.self))
|
|
|
|
let cfg = try XCTUnwrap(wireGuard.configuration)
|
|
|
|
XCTAssertEqual(cfg.interface.privateKey.rawValue, "6L8Cv9zpG8RTDDwvZMhv6OR3kGdd+yATuKnMQWVLT1Q=")
|
|
|
|
XCTAssertEqual(cfg.interface.addresses, [
|
|
|
|
try .init("4.5.6.7", 32)
|
|
|
|
])
|
|
|
|
XCTAssertEqual(cfg.interface.dns?.servers, [
|
|
|
|
try XCTUnwrap(Address(rawValue: "1.1.1.1"))
|
|
|
|
])
|
|
|
|
XCTAssertNil(cfg.interface.mtu)
|
|
|
|
XCTAssertEqual(cfg.peers.count, 1)
|
|
|
|
let peer = try XCTUnwrap(cfg.peers.first)
|
|
|
|
XCTAssertEqual(peer.publicKey.rawValue, "JZc2trzk1WZTOUTjag1lcUZ2ePpFQYSpU2d0wqAw6mU=")
|
|
|
|
XCTAssertEqual(peer.endpoint?.rawValue, "8.8.8.8:55555")
|
|
|
|
XCTAssertEqual(peer.allowedIPs, [
|
|
|
|
try .init("0.0.0.0", 0)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-11-14 10:02:26 +00:00
|
|
|
private extension MigrationManagerTests {
|
|
|
|
func newStrategy() -> ProfileV2MigrationStrategy {
|
|
|
|
guard let baseURL = Bundle(for: MigrationManagerTests.self).resourceURL else {
|
2024-11-12 15:42:19 +00:00
|
|
|
fatalError()
|
|
|
|
}
|
2024-11-14 10:02:26 +00:00
|
|
|
return ProfileV2MigrationStrategy(
|
2024-11-12 15:42:19 +00:00
|
|
|
coreDataLogger: nil,
|
|
|
|
profilesContainerName: "Profiles",
|
|
|
|
baseURL: baseURL,
|
|
|
|
cloudKitIdentifier: nil
|
|
|
|
)
|
|
|
|
}
|
2024-11-14 10:02:26 +00:00
|
|
|
|
|
|
|
func newManager() -> MigrationManager {
|
|
|
|
let strategy = newStrategy()
|
|
|
|
return MigrationManager(profileStrategy: strategy)
|
|
|
|
}
|
2024-11-12 15:42:19 +00:00
|
|
|
}
|