/* * Copyright (c) 2018, Psiphon Inc. * All rights reserved. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . * */ package protocol import ( "fmt" "reflect" "testing" ) func TestTunnelProtocolValidation(t *testing.T) { err := SupportedTunnelProtocols.Validate() if err != nil { t.Errorf("unexpected Validate error: %s", err) } invalidProtocols := TunnelProtocols{"OSSH", "INVALID-PROTOCOL"} err = invalidProtocols.Validate() if err == nil { t.Errorf("unexpected Validate success") } pruneProtocols := make(TunnelProtocols, 0) for i, p := range SupportedTunnelProtocols { pruneProtocols = append(pruneProtocols, fmt.Sprintf("INVALID-PROTOCOL-%d", i)) pruneProtocols = append(pruneProtocols, p) } pruneProtocols = append(pruneProtocols, fmt.Sprintf("INVALID-PROTOCOL-%d", len(SupportedTunnelProtocols))) prunedProtocols := pruneProtocols.PruneInvalid() if !reflect.DeepEqual(prunedProtocols, SupportedTunnelProtocols) { t.Errorf("unexpected %+v != %+v", prunedProtocols, SupportedTunnelProtocols) } } func TestTLSProfileValidation(t *testing.T) { // Test: valid profiles err := SupportedTLSProfiles.Validate(nil) if err != nil { t.Errorf("unexpected Validate error: %s", err) } // Test: invalid profile profiles := TLSProfiles{TLS_PROFILE_RANDOMIZED, "INVALID-TLS-PROFILE"} err = profiles.Validate(nil) if err == nil { t.Errorf("unexpected Validate success") } // Test: valid custom profile customProfiles := []string{"CUSTOM-TLS-PROFILE"} profiles = TLSProfiles{TLS_PROFILE_RANDOMIZED, "CUSTOM-TLS-PROFILE"} err = profiles.Validate(customProfiles) if err != nil { t.Errorf("unexpected Validate error: %s", err) } // Test: prune invalid profiles pruneProfiles := make(TLSProfiles, 0) for i, p := range SupportedTLSProfiles { pruneProfiles = append(pruneProfiles, fmt.Sprintf("INVALID-PROFILE-%d", i)) pruneProfiles = append(pruneProfiles, p) } pruneProfiles = append(pruneProfiles, fmt.Sprintf("INVALID-PROFILE-%d", len(SupportedTLSProfiles))) prunedProfiles := pruneProfiles.PruneInvalid(nil) if !reflect.DeepEqual(prunedProfiles, SupportedTLSProfiles) { t.Errorf("unexpected %+v != %+v", prunedProfiles, SupportedTLSProfiles) } // Test: don't prune valid custom profiles pruneProfiles = TLSProfiles{TLS_PROFILE_RANDOMIZED, "CUSTOM-TLS-PROFILE"} prunedProfiles = pruneProfiles.PruneInvalid(customProfiles) if !reflect.DeepEqual(prunedProfiles, pruneProfiles) { t.Errorf("unexpected %+v != %+v", prunedProfiles, pruneProfiles) } }