Skip to content
Snippets Groups Projects
auth_client_test.cc 4.53 KiB
Newer Older
  • Learn to ignore specific revisions
  • // Tests for auth_client.c.
    
    #include <stdlib.h>
    #include "gtest/gtest.h"
    extern "C" {
    #include "auth_client.h"
    }
    
    static const char *server = NULL;
    
    
    static const char *ssl_ca = "../authserv/test/testca/public/ca.pem";
    static const char *ssl_cert = "../authserv/test/testca/public/certs/client.pem";
    
    static const char *ssl_key = "../authserv/test/testca/private/client.key";
    
    static const char *ssl_bad_ca = "../authserv/test/testca-bad/ca.pem";
    static const char *ssl_bad_cert = "../authserv/test/testca-bad/certs/client.pem";
    static const char *ssl_bad_key = "../authserv/test/testca-bad/private/client.key";
    
    
    TEST(AuthClientCurlInterface, ErrorConversion) {
      int curl_err = 35;
      int err = auth_client_err_from_curl(curl_err);
      int translated = auth_client_err_to_curl(err);
      EXPECT_EQ(curl_err, translated);
    }
    
    
    class AuthClientTest
      : public ::testing::Test
    {
    public:
      AuthClientTest() {
        ac = auth_client_new("service", server);
        assert(ac != NULL);
        auth_client_set_verbose(ac, 1);
      }
    
      virtual ~AuthClientTest() {
        auth_client_free(ac);
      }
    
      auth_client_t ac;
    };
    
    TEST_F(AuthClientTest, CertSetupFailsWithoutCA) {
    
      EXPECT_NE(AC_OK,
                auth_client_set_certificate(ac, "nonexisting.pem", ssl_cert, ssl_key));
      EXPECT_NE(AC_OK,
                auth_client_set_certificate(ac, ssl_ca, "nonexisting.pem", ssl_key));
      EXPECT_NE(AC_OK,
                auth_client_set_certificate(ac, ssl_ca, ssl_cert, "nonexisting.key"));
    
    TEST_F(AuthClientTest, AuthOK) {
    
      result = auth_client_set_certificate(ac, ssl_ca, ssl_cert, ssl_key);
      EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
    
      result = auth_client_authenticate(ac, "user", "pass", NULL, "127.0.0.1", NULL);
    
      EXPECT_EQ(AC_OK, result) << "authenticate() error: " << auth_client_strerror(result)
                               << ", server=" << server;
    
    TEST_F(AuthClientTest, ManyAuthOK) {
      int result;
    
      for (int i = 0; i < 3; i++) {
    
        result = auth_client_set_certificate(ac, ssl_ca, ssl_cert, ssl_key);
        EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
        
        result = auth_client_authenticate(ac, "user", "pass", NULL, "127.0.0.1", NULL);
        EXPECT_EQ(AC_OK, result) << "authenticate() error: " << auth_client_strerror(result)
                                 << ", server=" << server;
      }
    
    }
    
    
    ale's avatar
    ale committed
    TEST_F(AuthClientTest, AuthFail) {
      int result;
    
      result = auth_client_set_certificate(ac, ssl_ca, ssl_cert, ssl_key);
      EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
    
    
      result = auth_client_authenticate(ac, "user", "bad_password", NULL, "127.0.0.1", NULL);
    
    ale's avatar
    ale committed
      EXPECT_NE(AC_OK, result) << "authenticate() didn't fail"
                               << ", server=" << server;
    }
    
    
    TEST_F(AuthClientTest, SSLFailsWithBadCertificate) {
    
      int result;
    
      // We can't tell auth_client to make an https request without a
      // client certificate, but we can try to force a failure by
      // providing a bad (unloadable) certificate, for example one where
      // the private and public keys do not match. In this case,
      // auth_client_set_certificate() should still succeed, since it
      // doesn't perform this kind of correctness check.
      result = auth_client_set_certificate(ac, ssl_ca, ssl_ca, ssl_key);
      EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
    
    
      result = auth_client_authenticate(ac, "user", "pass", NULL, "127.0.0.1", NULL);
    
      EXPECT_NE(AC_OK, result) << "authenticate() didn't fail, server=" << server;
    
    }
    
    // Test CA validation on the client.
    TEST_F(AuthClientTest, SSLFailsWithBadCAClientSide) {
      int result;
    
      result = auth_client_set_certificate(ac, ssl_bad_ca, ssl_cert, ssl_key);
      EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
    
    
      result = auth_client_authenticate(ac, "user", "pass", NULL, "127.0.0.1", NULL);
    
      EXPECT_NE(AC_OK, result) << "authenticate() didn't fail, server=" << server;
    }
    
    // Test CA validation on the server.
    TEST_F(AuthClientTest, SSLFailsWithBadCAServerSide) {
      int result;
    
      result = auth_client_set_certificate(ac, ssl_ca, ssl_bad_cert, ssl_bad_key);
      EXPECT_EQ(AC_OK, result) << "set_certificate() error: " << auth_client_strerror(result);
    
    
      result = auth_client_authenticate(ac, "user", "pass", NULL, "127.0.0.1", NULL);
    
      EXPECT_NE(AC_OK, result) << "authenticate() didn't fail, server=" << server;
    
    int main(int argc, char **argv) {
      server = getenv("AUTH_SERVER");
      if (server == NULL) {
        server = "localhost:1617";
      }
    
      ::testing::InitGoogleTest(&argc, argv);
      return RUN_ALL_TESTS();
    }