mirror of
https://github.com/gogrlx/nats-server.git
synced 2026-04-02 11:48:43 -07:00
Only works for gateways and routes. When true the subject alt DNS name must match one url in the corresponding configuration Signed-off-by: Matthias Hanel <mh@synadia.com>
215 lines
6.2 KiB
Go
215 lines
6.2 KiB
Go
// Copyright 2012-2018 The NATS Authors
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package server
|
|
|
|
import (
|
|
"net/url"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/nats-io/jwt/v2"
|
|
)
|
|
|
|
func TestUserCloneNilPermissions(t *testing.T) {
|
|
user := &User{
|
|
Username: "foo",
|
|
Password: "bar",
|
|
}
|
|
|
|
clone := user.clone()
|
|
|
|
if !reflect.DeepEqual(user, clone) {
|
|
t.Fatalf("Cloned Users are incorrect.\nexpected: %+v\ngot: %+v",
|
|
user, clone)
|
|
}
|
|
|
|
clone.Password = "baz"
|
|
if reflect.DeepEqual(user, clone) {
|
|
t.Fatal("Expected Users to be different")
|
|
}
|
|
}
|
|
|
|
func TestUserClone(t *testing.T) {
|
|
user := &User{
|
|
Username: "foo",
|
|
Password: "bar",
|
|
Permissions: &Permissions{
|
|
Publish: &SubjectPermission{
|
|
Allow: []string{"foo"},
|
|
},
|
|
Subscribe: &SubjectPermission{
|
|
Allow: []string{"bar"},
|
|
},
|
|
},
|
|
}
|
|
|
|
clone := user.clone()
|
|
|
|
if !reflect.DeepEqual(user, clone) {
|
|
t.Fatalf("Cloned Users are incorrect.\nexpected: %+v\ngot: %+v",
|
|
user, clone)
|
|
}
|
|
|
|
clone.Permissions.Subscribe.Allow = []string{"baz"}
|
|
if reflect.DeepEqual(user, clone) {
|
|
t.Fatal("Expected Users to be different")
|
|
}
|
|
}
|
|
|
|
func TestUserClonePermissionsNoLists(t *testing.T) {
|
|
user := &User{
|
|
Username: "foo",
|
|
Password: "bar",
|
|
Permissions: &Permissions{},
|
|
}
|
|
|
|
clone := user.clone()
|
|
|
|
if clone.Permissions.Publish != nil {
|
|
t.Fatalf("Expected Publish to be nil, got: %v", clone.Permissions.Publish)
|
|
}
|
|
if clone.Permissions.Subscribe != nil {
|
|
t.Fatalf("Expected Subscribe to be nil, got: %v", clone.Permissions.Subscribe)
|
|
}
|
|
}
|
|
|
|
func TestUserCloneNoPermissions(t *testing.T) {
|
|
user := &User{
|
|
Username: "foo",
|
|
Password: "bar",
|
|
}
|
|
|
|
clone := user.clone()
|
|
|
|
if clone.Permissions != nil {
|
|
t.Fatalf("Expected Permissions to be nil, got: %v", clone.Permissions)
|
|
}
|
|
}
|
|
|
|
func TestUserCloneNil(t *testing.T) {
|
|
user := (*User)(nil)
|
|
clone := user.clone()
|
|
if clone != nil {
|
|
t.Fatalf("Expected nil, got: %+v", clone)
|
|
}
|
|
}
|
|
|
|
func TestUserUnknownAllowedConnectionType(t *testing.T) {
|
|
o := DefaultOptions()
|
|
o.Users = []*User{&User{
|
|
Username: "user",
|
|
Password: "pwd",
|
|
AllowedConnectionTypes: testCreateAllowedConnectionTypes([]string{jwt.ConnectionTypeStandard, "someNewType"}),
|
|
}}
|
|
_, err := NewServer(o)
|
|
if err == nil || !strings.Contains(err.Error(), "connection type") {
|
|
t.Fatalf("Expected error about unknown connection type, got %v", err)
|
|
}
|
|
|
|
o.Users[0].AllowedConnectionTypes = testCreateAllowedConnectionTypes([]string{"websocket"})
|
|
s, err := NewServer(o)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
s.mu.Lock()
|
|
user := s.opts.Users[0]
|
|
s.mu.Unlock()
|
|
for act := range user.AllowedConnectionTypes {
|
|
if act != jwt.ConnectionTypeWebsocket {
|
|
t.Fatalf("Expected map to have been updated with proper case, got %v", act)
|
|
}
|
|
}
|
|
// Same with NKey user now.
|
|
o.Users = nil
|
|
o.Nkeys = []*NkeyUser{&NkeyUser{
|
|
Nkey: "somekey",
|
|
AllowedConnectionTypes: testCreateAllowedConnectionTypes([]string{jwt.ConnectionTypeStandard, "someNewType"}),
|
|
}}
|
|
_, err = NewServer(o)
|
|
if err == nil || !strings.Contains(err.Error(), "connection type") {
|
|
t.Fatalf("Expected error about unknown connection type, got %v", err)
|
|
}
|
|
o.Nkeys[0].AllowedConnectionTypes = testCreateAllowedConnectionTypes([]string{"websocket"})
|
|
s, err = NewServer(o)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
s.mu.Lock()
|
|
nkey := s.opts.Nkeys[0]
|
|
s.mu.Unlock()
|
|
for act := range nkey.AllowedConnectionTypes {
|
|
if act != jwt.ConnectionTypeWebsocket {
|
|
t.Fatalf("Expected map to have been updated with proper case, got %v", act)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDNSAltNameMatching(t *testing.T) {
|
|
for idx, test := range []struct {
|
|
altName string
|
|
urls []string
|
|
match bool
|
|
}{
|
|
{"foo", []string{"FOO"}, true},
|
|
{"foo", []string{".."}, false},
|
|
{"foo", []string{"."}, false},
|
|
{"Foo", []string{"foO"}, true},
|
|
{"FOO", []string{"foo"}, true},
|
|
{"foo1", []string{"bar"}, false},
|
|
{"multi", []string{"m", "mu", "mul", "multi"}, true},
|
|
{"multi", []string{"multi", "m", "mu", "mul"}, true},
|
|
{"foo.bar", []string{"foo", "foo.bar.bar", "foo.baz"}, false},
|
|
{"foo.Bar", []string{"foo", "bar.foo", "Foo.Bar"}, true},
|
|
{"foo.*", []string{"foo", "bar.foo", "Foo.Bar"}, false}, // only match left most
|
|
{"f*.bar", []string{"foo", "bar.foo", "Foo.Bar"}, false},
|
|
{"*.bar", []string{"foo.bar"}, true},
|
|
{"*", []string{"baz.bar", "bar", "z.y"}, true},
|
|
{"*", []string{"bar"}, true},
|
|
{"*", []string{"."}, false},
|
|
{"*", []string{""}, true},
|
|
{"*", []string{"*"}, true},
|
|
{"bar.*", []string{"bar.*"}, true},
|
|
{"*.Y-X-red-mgmt.default.svc", []string{"A.Y-X-red-mgmt.default.svc"}, true},
|
|
{"*.Y-X-green-mgmt.default.svc", []string{"A.Y-X-green-mgmt.default.svc"}, true},
|
|
{"*.Y-X-blue-mgmt.default.svc", []string{"A.Y-X-blue-mgmt.default.svc"}, true},
|
|
{"Y-X-red-mgmt", []string{"Y-X-red-mgmt"}, true},
|
|
{"Y-X-red-mgmt", []string{"X-X-red-mgmt"}, false},
|
|
{"Y-X-red-mgmt", []string{"Y-X-green-mgmt"}, false},
|
|
{"Y-X-red-mgmt", []string{"Y"}, false},
|
|
{"Y-X-red-mgmt", []string{"Y-X"}, false},
|
|
{"Y-X-red-mgmt", []string{"Y-X-red"}, false},
|
|
{"Y-X-red-mgmt", []string{"X-red-mgmt"}, false},
|
|
{"Y-X-green-mgmt", []string{"Y-X-green-mgmt"}, true},
|
|
{"Y-X-blue-mgmt", []string{"Y-X-blue-mgmt"}, true},
|
|
{"connect.Y.local", []string{"connect.Y.local"}, true},
|
|
{"connect.Y.local", []string{".Y.local"}, false},
|
|
{"connect.Y.local", []string{"..local"}, false},
|
|
{"gcp.Y.local", []string{"gcp.Y.local"}, true},
|
|
{"uswest1.gcp.Y.local", []string{"uswest1.gcp.Y.local"}, true},
|
|
} {
|
|
urlSet := make([]*url.URL, len(test.urls))
|
|
for i, u := range test.urls {
|
|
var err error
|
|
urlSet[i], err = url.Parse("nats://" + u)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
if dnsAltNameMatches(dnsAltNameLabels(test.altName), urlSet) != test.match {
|
|
t.Fatal("Test", idx, "Match miss match, expected:", test.match)
|
|
}
|
|
}
|
|
}
|