// // StandardOpenVPNParserTests.swift // PassepartoutKit // // Created by Davide De Rosa on 11/10/18. // Copyright (c) 2024 Davide De Rosa. All rights reserved. // // https://github.com/passepartoutvpn // // This file is part of PassepartoutKit. // // PassepartoutKit is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // PassepartoutKit is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with PassepartoutKit. If not, see . // import PassepartoutKit @testable import PassepartoutOpenVPNOpenSSL import XCTest final class StandardOpenVPNParserTests: XCTestCase { private let parser = StandardOpenVPNParser() func test_givenOption_whenEnumerateComponents_thenAreParsedCorrectly() throws { let sut = StandardOpenVPNParser.Option.remote let components = try XCTUnwrap(sut.spacedComponents(in: "remote one.two.com 12345 tcp")) XCTAssertEqual(components, ["remote", "one.two.com", "12345", "tcp"]) } // MARK: Lines func test_givenLZO_whenParse_thenIsHandled() throws { XCTAssertNil(try parser.parsed(fromLines: ["comp-lzo"]).warning) XCTAssertNoThrow(try parser.parsed(fromLines: ["comp-lzo no"])) XCTAssertNoThrow(try parser.parsed(fromLines: ["comp-lzo yes"])) XCTAssertNoThrow(try parser.parsed(fromLines: ["compress"])) XCTAssertNoThrow(try parser.parsed(fromLines: ["compress lzo"])) } func test_givenKeepAlive_whenParse_thenIsHandled() throws { let cfg1 = try parser.parsed(fromLines: ["ping 10", "ping-restart 60"]) let cfg2 = try parser.parsed(fromLines: ["keepalive 10 60"]) let cfg3 = try parser.parsed(fromLines: ["keepalive 15 600"]) XCTAssertEqual(cfg1.configuration.keepAliveInterval, cfg2.configuration.keepAliveInterval) XCTAssertEqual(cfg1.configuration.keepAliveTimeout, cfg2.configuration.keepAliveTimeout) XCTAssertNotEqual(cfg1.configuration.keepAliveInterval, cfg3.configuration.keepAliveInterval) XCTAssertNotEqual(cfg1.configuration.keepAliveTimeout, cfg3.configuration.keepAliveTimeout) } func test_givenDHCPOption_whenParse_thenIsHandled() throws { let lines = [ "dhcp-option DNS 8.8.8.8", "dhcp-option DNS6 ffff::1", "dhcp-option DOMAIN first-domain.net", "dhcp-option DOMAIN second-domain.org", "dhcp-option DOMAIN-SEARCH fake-main.net", "dhcp-option DOMAIN-SEARCH main.net", "dhcp-option DOMAIN-SEARCH one.com", "dhcp-option DOMAIN-SEARCH two.com", "dhcp-option PROXY_HTTP 1.2.3.4 8081", "dhcp-option PROXY_HTTPS 7.8.9.10 8082", "dhcp-option PROXY_AUTO_CONFIG_URL https://pac/", "dhcp-option PROXY_BYPASS foo.com bar.org net.chat" ] XCTAssertNoThrow(try parser.parsed(fromLines: lines)) let parsed = try parser.parsed(fromLines: lines).configuration XCTAssertEqual(parsed.dnsServers, ["8.8.8.8", "ffff::1"]) XCTAssertEqual(parsed.dnsDomain, "second-domain.org") XCTAssertEqual(parsed.searchDomains, ["fake-main.net", "main.net", "one.com", "two.com"]) XCTAssertEqual(parsed.httpProxy?.address.rawValue, "1.2.3.4") XCTAssertEqual(parsed.httpProxy?.port, 8081) XCTAssertEqual(parsed.httpsProxy?.address.rawValue, "7.8.9.10") XCTAssertEqual(parsed.httpsProxy?.port, 8082) XCTAssertEqual(parsed.proxyAutoConfigurationURL?.absoluteString, "https://pac/") XCTAssertEqual(parsed.proxyBypassDomains, ["foo.com", "bar.org", "net.chat"]) } func test_givenRedirectGateway_whenParse_thenIsHandled() throws { let parsed = try parser.parsed(fromLines: ["redirect-gateway def1 block-local"]).configuration let routingPolicies = try XCTUnwrap(parsed.routingPolicies) XCTAssertEqual(Set(routingPolicies), Set([.IPv4, .blockLocal])) } func test_givenConnectionBlock_whenParse_thenFails() throws { let lines = ["", ""] XCTAssertThrowsError(try parser.parsed(fromLines: lines)) } // MARK: URL func test_givenPIA_whenParse_thenIsParsedCorrectly() throws { let file = try parser.parsed(fromURL: url(withName: "pia-hungary")) XCTAssertEqual(file.configuration.remotes, [ try? ExtendedEndpoint("hungary.privateinternetaccess.com", .init(.udp, 1198)), try? ExtendedEndpoint("hungary.privateinternetaccess.com", .init(.tcp, 502)) ].compactMap { $0 }) XCTAssertEqual(file.configuration.cipher, .aes128cbc) XCTAssertEqual(file.configuration.digest, .sha1) XCTAssertEqual(file.configuration.authUserPass, true) XCTAssertEqual(file.configuration.compressionAlgorithm, .disabled) XCTAssertEqual(file.configuration.renegotiatesAfter, .zero) XCTAssertTrue(file.configuration.ca?.pem.hasPrefix("-----BEGIN CERTIFICATE-----") ?? false) } func test_givenProtonVPN_whenParse_thenIsParsedCorrectly() throws { let file = try parser.parsed(fromURL: url(withName: "protonvpn")) XCTAssertEqual(file.configuration.remotes, [ try? ExtendedEndpoint("103.212.227.123", .init(.udp, 5060)), try? ExtendedEndpoint("103.212.227.123", .init(.udp, 1194)), try? ExtendedEndpoint("103.212.227.123", .init(.udp, 443)), try? ExtendedEndpoint("103.212.227.123", .init(.udp, 4569)), try? ExtendedEndpoint("103.212.227.123", .init(.udp, 80)) ].compactMap { $0 }) XCTAssertEqual(file.configuration.randomizeEndpoint, true) XCTAssertEqual(file.configuration.cipher, .aes256cbc) XCTAssertEqual(file.configuration.digest, .sha512) XCTAssertEqual(file.configuration.renegotiatesAfter, .zero) XCTAssertEqual(file.configuration.authUserPass, true) let mask = Data("this-is-a-mask".utf8) XCTAssertEqual(file.configuration.xorMethod, .obfuscate(mask: SecureData(mask))) XCTAssertTrue(file.configuration.ca?.pem.hasPrefix("-----BEGIN CERTIFICATE-----") ?? false) XCTAssertEqual(file.configuration.tlsWrap?.strategy, .auth) XCTAssertEqual(file.configuration.tlsWrap?.key.direction, .client) XCTAssertTrue(file.configuration.tlsWrap?.key.hexString.hasPrefix("6acef03f62675b4b1bbd03e53b187727") ?? false) } func test_givenXOR_whenParse_thenIsHandled() throws { let asciiData = "F" let singleMask = try XCTUnwrap(SecureData(String(repeating: asciiData, count: 1))) let multiMask = try XCTUnwrap(SecureData(String(repeating: asciiData, count: 4))) let cfg = try parser.parsed(fromLines: ["scramble xormask F"]) XCTAssertNil(cfg.warning) XCTAssertEqual(cfg.configuration.xorMethod, OpenVPN.XORMethod.xormask(mask: singleMask)) let cfg2 = try parser.parsed(fromLines: ["scramble reverse"]) XCTAssertNil(cfg.warning) XCTAssertEqual(cfg2.configuration.xorMethod, OpenVPN.XORMethod.reverse) let cfg3 = try parser.parsed(fromLines: ["scramble xorptrpos"]) XCTAssertNil(cfg.warning) XCTAssertEqual(cfg3.configuration.xorMethod, OpenVPN.XORMethod.xorptrpos) let cfg4 = try parser.parsed(fromLines: ["scramble obfuscate FFFF"]) XCTAssertNil(cfg.warning) XCTAssertEqual(cfg4.configuration.xorMethod, OpenVPN.XORMethod.obfuscate(mask: multiMask)) } } // MARK: - Helpers private extension StandardOpenVPNParserTests { func url(withName name: String) -> URL { guard let url = Bundle.module.url(forResource: name, withExtension: "ovpn") else { fatalError("Cannot find URL in bundle") } return url } }