tunnelkit/Tests/TunnelKitOpenVPNTests/ConfigurationParserTests.swift

156 lines
7.0 KiB
Swift
Raw Normal View History

2018-11-10 09:54:50 +00:00
//
// ConfigurationParserTests.swift
// TunnelKitOpenVPNTests
2018-11-10 09:54:50 +00:00
//
// Created by Davide De Rosa on 11/10/18.
2022-02-04 11:42:58 +00:00
// Copyright (c) 2022 Davide De Rosa. All rights reserved.
2018-11-10 09:54:50 +00:00
//
// https://github.com/passepartoutvpn
2018-11-10 09:54:50 +00:00
//
// This file is part of TunnelKit.
//
// TunnelKit is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// TunnelKit is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>.
//
import XCTest
2021-10-25 14:27:27 +00:00
import TunnelKitCore
import TunnelKitOpenVPNCore
2018-11-10 09:54:50 +00:00
class ConfigurationParserTests: XCTestCase {
override func setUp() {
super.setUp()
// Put setup code here. This method is called before the invocation of each test method in the class.
}
override func tearDown() {
// Put teardown code here. This method is called after the invocation of each test method in the class.
super.tearDown()
}
// from lines
func testCompression() throws {
XCTAssertNil(try OpenVPN.ConfigurationParser.parsed(fromLines: ["comp-lzo"]).warning)
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromLines: ["comp-lzo no"]))
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromLines: ["comp-lzo yes"]))
// XCTAssertThrowsError(try OpenVPN.ConfigurationParser.parsed(fromLines: ["comp-lzo yes"]))
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromLines: ["compress"]))
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromLines: ["compress lzo"]))
}
2022-01-04 08:14:39 +00:00
func testKeepAlive() throws {
let cfg1 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["ping 10", "ping-restart 60"])
let cfg2 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["keepalive 10 60"])
let cfg3 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["keepalive 15 600"])
XCTAssertEqual(cfg1.configuration.keepAliveInterval, cfg2.configuration.keepAliveInterval)
XCTAssertEqual(cfg1.configuration.keepAliveTimeout, cfg2.configuration.keepAliveTimeout)
XCTAssertNotEqual(cfg1.configuration.keepAliveInterval, cfg3.configuration.keepAliveInterval)
XCTAssertNotEqual(cfg1.configuration.keepAliveTimeout, cfg3.configuration.keepAliveTimeout)
}
func testDHCPOption() throws {
let lines = [
"dhcp-option DNS 8.8.8.8",
"dhcp-option DNS6 ffff::1",
2020-12-18 18:09:50 +00:00
"dhcp-option DOMAIN fake-main.net",
"dhcp-option DOMAIN main.net",
"dhcp-option DOMAIN one.com",
"dhcp-option DOMAIN two.com",
"dhcp-option PROXY_HTTP 1.2.3.4 8081",
2019-04-13 17:03:27 +00:00
"dhcp-option PROXY_HTTPS 7.8.9.10 8082",
"dhcp-option PROXY_AUTO_CONFIG_URL https://pac/",
2019-04-13 17:03:27 +00:00
"dhcp-option PROXY_BYPASS foo.com bar.org net.chat"
]
2019-05-19 13:50:30 +00:00
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromLines: lines))
2019-05-19 13:50:30 +00:00
let parsed = try! OpenVPN.ConfigurationParser.parsed(fromLines: lines).configuration
XCTAssertEqual(parsed.dnsServers, ["8.8.8.8", "ffff::1"])
XCTAssertEqual(parsed.searchDomains, ["fake-main.net", "main.net", "one.com", "two.com"])
XCTAssertEqual(parsed.httpProxy?.address, "1.2.3.4")
XCTAssertEqual(parsed.httpProxy?.port, 8081)
XCTAssertEqual(parsed.httpsProxy?.address, "7.8.9.10")
XCTAssertEqual(parsed.httpsProxy?.port, 8082)
2019-10-22 19:03:25 +00:00
XCTAssertEqual(parsed.proxyAutoConfigurationURL?.absoluteString, "https://pac/")
2019-04-13 17:03:27 +00:00
XCTAssertEqual(parsed.proxyBypassDomains, ["foo.com", "bar.org", "net.chat"])
}
func testRedirectGateway() throws {
2019-05-19 13:50:30 +00:00
var parsed: OpenVPN.Configuration
2019-05-19 13:50:30 +00:00
parsed = try! OpenVPN.ConfigurationParser.parsed(fromLines: []).configuration
XCTAssertEqual(parsed.routingPolicies, nil)
XCTAssertNotEqual(parsed.routingPolicies, [])
2019-05-19 13:50:30 +00:00
parsed = try! OpenVPN.ConfigurationParser.parsed(fromLines: ["redirect-gateway ipv4 block-local"]).configuration
2019-05-19 00:08:49 +00:00
XCTAssertEqual(Set(parsed.routingPolicies!), Set([.IPv4, .blockLocal]))
}
func testConnectionBlock() throws {
let lines = ["<connection>", "</connection>"]
2019-05-19 13:50:30 +00:00
XCTAssertThrowsError(try OpenVPN.ConfigurationParser.parsed(fromLines: lines))
}
// from file
2018-11-10 09:54:50 +00:00
func testPIA() throws {
2019-05-19 13:50:30 +00:00
let file = try OpenVPN.ConfigurationParser.parsed(fromURL: url(withName: "pia-hungary"))
XCTAssertEqual(file.configuration.remotes, [
.init("hungary.privateinternetaccess.com", .init(.udp, 1198)),
.init("hungary.privateinternetaccess.com", .init(.tcp, 502)),
])
2018-11-10 09:54:50 +00:00
XCTAssertEqual(file.configuration.cipher, .aes128cbc)
XCTAssertEqual(file.configuration.digest, .sha1)
}
func testStripped() throws {
2019-05-19 13:50:30 +00:00
let lines = try OpenVPN.ConfigurationParser.parsed(fromURL: url(withName: "pia-hungary"), returnsStripped: true).strippedLines!
2018-11-10 09:54:50 +00:00
let stripped = lines.joined(separator: "\n")
print(stripped)
}
func testEncryptedCertificateKey() throws {
2019-04-01 22:09:18 +00:00
try privateTestEncryptedCertificateKey(pkcs: "1")
try privateTestEncryptedCertificateKey(pkcs: "8")
2019-04-01 22:09:18 +00:00
}
2019-09-03 20:11:53 +00:00
func testXOR() throws {
let cfg = try OpenVPN.ConfigurationParser.parsed(fromLines: ["scramble xormask F"])
XCTAssertNil(cfg.warning)
XCTAssertEqual(cfg.configuration.xorMethod, OpenVPN.XORMethod.xormask(mask: Data(repeating: Character("F").asciiValue!, count:1)))
let cfg2 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["scramble reverse"])
XCTAssertNil(cfg.warning)
XCTAssertEqual(cfg2.configuration.xorMethod, OpenVPN.XORMethod.reverse)
let cfg3 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["scramble xorptrpos"])
XCTAssertNil(cfg.warning)
XCTAssertEqual(cfg3.configuration.xorMethod, OpenVPN.XORMethod.xorptrpos)
let cfg4 = try OpenVPN.ConfigurationParser.parsed(fromLines: ["scramble obfuscate FFFF"])
2019-09-03 20:11:53 +00:00
XCTAssertNil(cfg.warning)
XCTAssertEqual(cfg4.configuration.xorMethod, OpenVPN.XORMethod.obfuscate(mask: Data(repeating: Character("F").asciiValue!, count:4)))
2019-09-03 20:11:53 +00:00
}
2019-04-01 22:09:18 +00:00
private func privateTestEncryptedCertificateKey(pkcs: String) throws {
2019-04-02 16:58:30 +00:00
let cfgURL = url(withName: "tunnelbear.enc.\(pkcs)")
2019-05-19 13:50:30 +00:00
XCTAssertThrowsError(try OpenVPN.ConfigurationParser.parsed(fromURL: cfgURL))
XCTAssertNoThrow(try OpenVPN.ConfigurationParser.parsed(fromURL: cfgURL, passphrase: "foobar"))
2019-04-01 22:55:44 +00:00
}
2018-11-10 09:54:50 +00:00
private func url(withName name: String) -> URL {
2021-10-25 14:27:27 +00:00
return Bundle.module.url(forResource: name, withExtension: "ovpn")!
2018-11-10 09:54:50 +00:00
}
}