325 lines
10 KiB
Go
325 lines
10 KiB
Go
package pairing
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"regexp"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
"github.com/status-im/status-go/server"
|
|
)
|
|
|
|
func TestPairingServerSuite(t *testing.T) {
|
|
suite.Run(t, new(PairingServerSuite))
|
|
}
|
|
|
|
type PairingServerSuite struct {
|
|
suite.Suite
|
|
TestPairingServerComponents
|
|
}
|
|
|
|
func (s *PairingServerSuite) SetupTest() {
|
|
s.SetupPairingServerComponents(s.T())
|
|
}
|
|
|
|
func (s *PairingServerSuite) TestMultiBackgroundForeground() {
|
|
err := s.SS.Start()
|
|
s.Require().NoError(err)
|
|
s.SS.ToBackground()
|
|
s.SS.ToForeground()
|
|
s.SS.ToBackground()
|
|
s.SS.ToBackground()
|
|
s.SS.ToForeground()
|
|
s.SS.ToForeground()
|
|
s.Require().Regexp(regexp.MustCompile("(https://\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}:\\d{1,5})"), s.SS.MakeBaseURL().String()) // nolint: gosimple
|
|
}
|
|
|
|
func (s *PairingServerSuite) TestMultiTimeout() {
|
|
s.SS.SetTimeout(20)
|
|
|
|
err := s.SS.Start()
|
|
s.Require().NoError(err)
|
|
|
|
s.SS.ToBackground()
|
|
s.SS.ToForeground()
|
|
s.SS.ToBackground()
|
|
s.SS.ToBackground()
|
|
s.SS.ToForeground()
|
|
s.SS.ToForeground()
|
|
|
|
s.Require().Regexp(regexp.MustCompile("(https://\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}:\\d{1,5})"), s.SS.MakeBaseURL().String()) // nolint: gosimple
|
|
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToBackground()
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToForeground()
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToBackground()
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToBackground()
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToForeground()
|
|
time.Sleep(7 * time.Millisecond)
|
|
s.SS.ToForeground()
|
|
|
|
// Wait for timeout to expire
|
|
time.Sleep(40 * time.Millisecond)
|
|
s.Require().False(s.SS.IsRunning())
|
|
}
|
|
|
|
// TestPairingServer_StartPairingSend tests that a Server can send data to a ReceiverClient
|
|
func (s *PairingServerSuite) TestPairingServer_StartPairingSend() {
|
|
// Replace PairingServer.accountMounter with a MockPayloadMounter
|
|
pm := NewMockPayloadMounter(s.EphemeralAES)
|
|
s.SS.accountMounter = pm
|
|
|
|
err := s.SS.startSendingData()
|
|
s.Require().NoError(err)
|
|
|
|
cp, err := s.SS.MakeConnectionParams()
|
|
s.Require().NoError(err)
|
|
|
|
qr := cp.ToString()
|
|
|
|
// Client reads QR code and parses the connection string
|
|
ccp := new(ConnectionParams)
|
|
err = ccp.FromString(qr)
|
|
s.Require().NoError(err)
|
|
|
|
c, err := NewReceiverClient(nil, ccp, NewReceiverClientConfig())
|
|
s.Require().NoError(err)
|
|
|
|
// Compare cert values
|
|
cert := c.serverCert
|
|
cl := s.SS.GetCert().Leaf
|
|
s.Require().Equal(cl.Signature, cert.Signature)
|
|
s.Require().Zero(cl.PublicKey.(*ecdsa.PublicKey).X.Cmp(cert.PublicKey.(*ecdsa.PublicKey).X))
|
|
s.Require().Zero(cl.PublicKey.(*ecdsa.PublicKey).Y.Cmp(cert.PublicKey.(*ecdsa.PublicKey).Y))
|
|
s.Require().Equal(cl.Version, cert.Version)
|
|
s.Require().Zero(cl.SerialNumber.Cmp(cert.SerialNumber))
|
|
s.Require().Exactly(cl.NotBefore, cert.NotBefore)
|
|
s.Require().Exactly(cl.NotAfter, cert.NotAfter)
|
|
s.Require().Exactly(cl.IPAddresses, cert.IPAddresses)
|
|
|
|
// Replace ReceivingClient.accountReceiver with a MockPayloadReceiver
|
|
c.accountReceiver = NewMockPayloadReceiver(s.EphemeralAES)
|
|
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
err = c.receiveAccountData()
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(c.accountReceiver.Received(), s.SS.accountMounter.(*MockPayloadMounter).encryptor.payload.plain)
|
|
s.Require().Equal(c.accountReceiver.(*MockPayloadReceiver).encryptor.payload.encrypted, s.SS.accountMounter.(*MockPayloadMounter).encryptor.payload.encrypted)
|
|
}
|
|
|
|
// TestPairingServer_StartPairingReceive tests that a Server can receive data to a SenderClient
|
|
func (s *PairingServerSuite) TestPairingServer_StartPairingReceive() {
|
|
// Replace PairingServer.PayloadManager with a MockEncryptOnlyPayloadManager
|
|
pm := NewMockPayloadReceiver(s.EphemeralAES)
|
|
s.RS.accountReceiver = pm
|
|
|
|
err := s.RS.startReceivingData()
|
|
s.Require().NoError(err)
|
|
|
|
cp, err := s.RS.MakeConnectionParams()
|
|
s.Require().NoError(err)
|
|
|
|
qr := cp.ToString()
|
|
|
|
// Client reads QR code and parses the connection string
|
|
ccp := new(ConnectionParams)
|
|
err = ccp.FromString(qr)
|
|
s.Require().NoError(err)
|
|
|
|
c, err := NewSenderClient(nil, ccp, &SenderClientConfig{SenderConfig: &SenderConfig{}, ClientConfig: &ClientConfig{}})
|
|
s.Require().NoError(err)
|
|
|
|
// Compare cert values
|
|
cert := c.serverCert
|
|
cl := s.RS.GetCert().Leaf
|
|
s.Require().Equal(cl.Signature, cert.Signature)
|
|
s.Require().Zero(cl.PublicKey.(*ecdsa.PublicKey).X.Cmp(cert.PublicKey.(*ecdsa.PublicKey).X))
|
|
s.Require().Zero(cl.PublicKey.(*ecdsa.PublicKey).Y.Cmp(cert.PublicKey.(*ecdsa.PublicKey).Y))
|
|
s.Require().Equal(cl.Version, cert.Version)
|
|
s.Require().Zero(cl.SerialNumber.Cmp(cert.SerialNumber))
|
|
s.Require().Exactly(cl.NotBefore, cert.NotBefore)
|
|
s.Require().Exactly(cl.NotAfter, cert.NotAfter)
|
|
s.Require().Exactly(cl.IPAddresses, cert.IPAddresses)
|
|
|
|
// Replace SendingClient.accountMounter with a MockPayloadMounter
|
|
c.accountMounter = NewMockPayloadMounter(s.EphemeralAES)
|
|
s.Require().NoError(err)
|
|
|
|
err = c.sendAccountData()
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(c.accountMounter.(*MockPayloadMounter).encryptor.payload.plain, s.RS.accountReceiver.Received())
|
|
s.Require().Equal(s.RS.accountReceiver.(*MockPayloadReceiver).encryptor.getEncrypted(), c.accountMounter.(*MockPayloadMounter).encryptor.payload.encrypted)
|
|
}
|
|
|
|
func (s *PairingServerSuite) sendingSetup() *ReceiverClient {
|
|
// Replace PairingServer.PayloadManager with a MockPayloadReceiver
|
|
pm := NewMockPayloadMounter(s.EphemeralAES)
|
|
s.SS.accountMounter = pm
|
|
|
|
err := s.SS.startSendingData()
|
|
s.Require().NoError(err)
|
|
|
|
cp, err := s.SS.MakeConnectionParams()
|
|
s.Require().NoError(err)
|
|
|
|
qr := cp.ToString()
|
|
|
|
// Client reads QR code and parses the connection string
|
|
ccp := new(ConnectionParams)
|
|
err = ccp.FromString(qr)
|
|
s.Require().NoError(err)
|
|
|
|
c, err := NewReceiverClient(nil, ccp, NewReceiverClientConfig())
|
|
s.Require().NoError(err)
|
|
|
|
// Replace PairingClient.PayloadManager with a MockEncryptOnlyPayloadManager
|
|
c.accountReceiver = NewMockPayloadReceiver(s.EphemeralAES)
|
|
s.Require().NoError(err)
|
|
|
|
return c
|
|
}
|
|
|
|
func (s *PairingServerSuite) TestPairingServer_handlePairingChallengeMiddleware() {
|
|
c := s.sendingSetup()
|
|
|
|
// Attempt to get the private key data, this should fail because there is no challenge
|
|
err := c.receiveAccountData()
|
|
s.Require().Error(err)
|
|
s.Require().Equal("[client] status not ok when receiving account data, received '403 Forbidden'", err.Error())
|
|
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
challenge := c.challengeTaker.serverChallenge
|
|
|
|
// This is NOT a mistake! Call c.getChallenge() twice to check that the client gets the same challenge
|
|
// the server will only generate 1 challenge until the challenge is successfully completed
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(challenge, c.challengeTaker.serverChallenge)
|
|
|
|
// receiving account data should now work.
|
|
err = c.receiveAccountData()
|
|
s.Require().NoError(err)
|
|
|
|
// After a successful challenge the challenge should change
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
s.Require().NotEqual(challenge, c.challengeTaker.serverChallenge)
|
|
|
|
// Unlock the MockPayloadMounter to allow the test. Don't do this ordinarily
|
|
s.SS.accountMounter.(*MockPayloadMounter).encryptor.payload.locked = false
|
|
|
|
// receiving account data again using the new challenge
|
|
err = c.receiveAccountData()
|
|
s.Require().NoError(err)
|
|
}
|
|
|
|
func (s *PairingServerSuite) TestPairingServer_handlePairingChallengeMiddleware_block() {
|
|
c := s.sendingSetup()
|
|
|
|
// Attempt to get the private key data, this should fail because there is no challenge
|
|
err := c.receiveAccountData()
|
|
s.Require().Error(err)
|
|
s.Require().Equal("[client] status not ok when receiving account data, received '403 Forbidden'", err.Error())
|
|
|
|
// Get the challenge
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
|
|
// Simulate encrypting with a dodgy key, write some nonsense to the challenge field
|
|
c.challengeTaker.serverChallenge = make([]byte, 64)
|
|
_, err = rand.Read(c.challengeTaker.serverChallenge)
|
|
s.Require().NoError(err)
|
|
|
|
// Attempt again to get the account data, should fail
|
|
// behind the scenes the server will block the session if the client fails the challenge. There is no forgiveness!
|
|
err = c.receiveAccountData()
|
|
s.Require().Error(err)
|
|
s.Require().Equal("[client] status not ok when receiving account data, received '403 Forbidden'", err.Error())
|
|
|
|
// Get the real challenge
|
|
err = c.getChallenge()
|
|
s.Require().NoError(err)
|
|
|
|
// Attempt to get the account data, should fail because the client is now blocked.
|
|
err = c.receiveAccountData()
|
|
s.Require().Error(err)
|
|
s.Require().Equal("[client] status not ok when receiving account data, received '403 Forbidden'", err.Error())
|
|
}
|
|
|
|
const helloMsg = "Hello I like to be a tls server. You said: `"
|
|
|
|
func testHandler(t *testing.T) func(w http.ResponseWriter, r *http.Request) {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
say, ok := r.URL.Query()["say"]
|
|
if !ok || len(say) == 0 {
|
|
say = append(say, "nothing")
|
|
}
|
|
|
|
_, err := w.Write([]byte("Hello I like to be a tls server. You said: `" + say[0] + "` " + time.Now().String())) // nolint: goconst
|
|
if err != nil {
|
|
require.NoError(t, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func makeThingToSay() (string, error) {
|
|
b := make([]byte, 32)
|
|
_, err := rand.Read(b)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return hex.EncodeToString(b), nil
|
|
}
|
|
|
|
func (s *PairingServerSuite) TestGetOutboundIPWithFullServerE2e() {
|
|
s.SS.SetHandlers(server.HandlerPatternMap{"/hello": testHandler(s.T())})
|
|
|
|
err := s.SS.Start()
|
|
s.Require().NoError(err)
|
|
|
|
// Give time for the sever to be ready, hacky I know, I'll iron this out
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
// Server generates a QR code connection string
|
|
cp, err := s.SS.MakeConnectionParams()
|
|
s.Require().NoError(err)
|
|
|
|
qr := cp.ToString()
|
|
|
|
// Client reads QR code and parses the connection string
|
|
ccp := new(ConnectionParams)
|
|
err = ccp.FromString(qr)
|
|
s.Require().NoError(err)
|
|
|
|
c, err := NewReceiverClient(nil, ccp, NewReceiverClientConfig())
|
|
s.Require().NoError(err)
|
|
|
|
thing, err := makeThingToSay()
|
|
s.Require().NoError(err)
|
|
|
|
response, err := c.Get(c.baseAddress.String() + "/hello?say=" + thing)
|
|
s.Require().NoError(err)
|
|
|
|
defer response.Body.Close()
|
|
|
|
content, err := ioutil.ReadAll(response.Body)
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(helloMsg+thing+"`", string(content[:109]))
|
|
}
|