emqx/apps/emqx_psk/test/emqx_psk_SUITE.erl

184 lines
6.0 KiB
Erlang

%%--------------------------------------------------------------------
%% Copyright (c) 2020-2024 EMQ Technologies Co., Ltd. All Rights Reserved.
%%
%% Licensed under the Apache License, Version 2.0 (the "License");
%% you may not use this file except in compliance with the License.
%% You may obtain a copy of the License at
%% http://www.apache.org/licenses/LICENSE-2.0
%%
%% Unless required by applicable law or agreed to in writing, software
%% distributed under the License is distributed on an "AS IS" BASIS,
%% WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
%% See the License for the specific language governing permissions and
%% limitations under the License.
%%--------------------------------------------------------------------
-module(emqx_psk_SUITE).
-compile(nowarn_export_all).
-compile(export_all).
-include_lib("common_test/include/ct.hrl").
-include_lib("eunit/include/eunit.hrl").
-include("emqx_psk.hrl").
-define(CR, 13).
-define(LF, 10).
all() -> [{group, normal}, {group, ciphers}].
groups() ->
[
{normal, [], emqx_common_test_helpers:all(?MODULE)},
{ciphers, [], [ciphers_test]}
].
init_per_suite(Config) ->
Apps = emqx_cth_suite:start(
[
emqx,
{emqx_psk, #{
config => #{
psk_authentication => #{
enable => true,
init_file => filename:join(?config(data_dir, Config), "init.psk"),
separator => <<":">>
}
}
}}
],
#{work_dir => emqx_cth_suite:work_dir(Config)}
),
[{suite_apps, Apps} | Config].
end_per_suite(Config) ->
ok = emqx_cth_suite:stop(?config(suite_apps, Config)).
t_psk_lookup(_) ->
PSKIdentity1 = <<"myclient1">>,
SharedSecret1 = <<"8c701116e9127c57a99d5563709af3deaca75563e2c4dd0865701ae839fb6d79">>,
?assertEqual({stop, {ok, SharedSecret1}}, emqx_psk:on_psk_lookup(PSKIdentity1, any)),
PSKIdentity2 = <<"myclient2">>,
SharedSecret2 = <<"d1e617d3b963757bfc21dad3fea169716c3a2f053f23decaea5cdfaabd04bfc4">>,
?assertEqual({stop, {ok, SharedSecret2}}, emqx_psk:on_psk_lookup(PSKIdentity2, any)),
?assertEqual(ignore, emqx_psk:on_psk_lookup(<<"myclient3">>, any)),
ClientLookup = fun
(psk, undefined, _) -> {ok, SharedSecret1};
(psk, _, _) -> error
end,
ClientTLSOpts = #{
versions => ['tlsv1.2'],
ciphers => ["PSK-AES256-CBC-SHA"],
psk_identity => "myclient1",
verify => verify_none,
user_lookup_fun => {ClientLookup, undefined}
},
ServerTLSOpts = #{
versions => ['tlsv1.2'],
ciphers => ["PSK-AES256-CBC-SHA"],
verify => verify_none,
reuseaddr => true,
user_lookup_fun => {fun emqx_tls_psk:lookup/3, undefined}
},
emqx_config:put([listeners, ssl, default, ssl_options], ServerTLSOpts),
emqx_listeners:restart_listener('ssl:default'),
{ok, Socket} = ssl:connect("127.0.0.1", 8883, maps:to_list(ClientTLSOpts)),
ssl:close(Socket),
ClientTLSOpts1 = ClientTLSOpts#{psk_identity => "myclient2"},
?assertMatch({error, _}, ssl:connect("127.0.0.1", 8883, maps:to_list(ClientTLSOpts1))),
ok.
t_start_stop(_) ->
?assertNotEqual(undefined, erlang:whereis(emqx_psk)),
?assertEqual(ok, emqx_psk:stop()),
timer:sleep(1000),
?assertNotEqual(undefined, erlang:whereis(emqx_psk)).
t_unexpected(_) ->
?assertEqual({error, unexpected}, emqx_psk:call(unexpected)),
?assertEqual(ok, gen_server:cast(emqx_psk, unexpected)),
?assertEqual(unexpected, erlang:send(erlang:whereis(emqx_psk), unexpected)).
t_load_unload(_) ->
emqx_psk:unload(),
timer:sleep(600),
?assertEqual([], emqx_hooks:lookup('tls_handshake.psk_lookup')),
emqx_psk:load(),
?assertMatch([_Hook], emqx_hooks:lookup('tls_handshake.psk_lookup')).
t_import(_) ->
Init = emqx_conf:get([psk_authentication, init_file], undefined),
Separator = emqx_conf:get([psk_authentication, separator], ?DEFAULT_DELIMITER),
ChunkSize = emqx_conf:get([psk_authentication, chunk_size], 50),
?assertEqual(ok, emqx_psk:import(Init)),
Keys0 = lists:sort(mnesia:dirty_all_keys(emqx_psk)),
?assert(length(Keys0) > 0),
{atomic, ok} = mnesia:clear_table(emqx_psk),
ok = emqx_psk:import_psks(Init, Separator, ChunkSize),
Keys1 = lists:sort(mnesia:dirty_all_keys(emqx_psk)),
?assertEqual(Keys0, Keys1),
?assertMatch({error, _}, emqx_psk:import("~/_none_")),
ok.
t_trim_crlf(_) ->
Bin = <<1, 2>>,
?assertEqual(Bin, emqx_psk:trim_crlf(Bin)),
?assertEqual(Bin, emqx_psk:trim_crlf(<<Bin/binary, ?LF>>)),
?assertEqual(Bin, emqx_psk:trim_crlf(<<Bin/binary, ?CR, ?LF>>)).
ciphers_test(Config) ->
Ciphers = [
"PSK-AES256-GCM-SHA384",
"PSK-AES128-GCM-SHA256",
"PSK-AES256-CBC-SHA384",
"PSK-AES256-CBC-SHA",
"PSK-AES128-CBC-SHA256",
"PSK-AES128-CBC-SHA"
],
lists:foreach(fun(Cipher) -> cipher_test(Cipher, Config) end, Ciphers).
cipher_test(Cipher, _) ->
ct:pal("Test PSK with Cipher:~p~n", [Cipher]),
PSKIdentity1 = "myclient1",
SharedSecret1 = <<"8c701116e9127c57a99d5563709af3deaca75563e2c4dd0865701ae839fb6d79">>,
ClientLookup = fun
(psk, undefined, _) -> {ok, SharedSecret1};
(psk, _, _) -> error
end,
ClientTLSOpts = #{
versions => ['tlsv1.2'],
ciphers => [Cipher],
psk_identity => PSKIdentity1,
verify => verify_none,
user_lookup_fun => {ClientLookup, undefined}
},
ServerTLSOpts = #{
versions => ['tlsv1.2'],
ciphers => [Cipher],
verify => verify_none,
reuseaddr => true,
user_lookup_fun => {fun emqx_tls_psk:lookup/3, undefined}
},
emqx_config:put([listeners, ssl, default, ssl_options], ServerTLSOpts),
emqx_listeners:restart_listener('ssl:default'),
{ok, Socket} = ssl:connect("127.0.0.1", 8883, maps:to_list(ClientTLSOpts)),
ssl:close(Socket),
ok.