aboutsummaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorBaylac-Jacqué Félix <felix@alternativebit.fr>2017-09-13 17:25:27 +0200
committerBaylac-Jacqué Félix <felix@alternativebit.fr>2017-09-16 17:11:27 +0200
commit544fb266e00229f9960b13dda864408a3500dd27 (patch)
tree544aa70c64ae6ad20d3509fa857f195324a629c2 /tests
parentImplemented RPC set's payload parser. (diff)
downloadwireguard-hs-544fb266e00229f9960b13dda864408a3500dd27.tar.xz
wireguard-hs-544fb266e00229f9960b13dda864408a3500dd27.zip
Implemented rpc request parser.
Diffstat (limited to 'tests')
-rw-r--r--tests/spec/Network/WireGuard/RPCSpec.hs20
1 files changed, 18 insertions, 2 deletions
diff --git a/tests/spec/Network/WireGuard/RPCSpec.hs b/tests/spec/Network/WireGuard/RPCSpec.hs
index ec77662..e0c3e87 100644
--- a/tests/spec/Network/WireGuard/RPCSpec.hs
+++ b/tests/spec/Network/WireGuard/RPCSpec.hs
@@ -25,12 +25,13 @@ import Test.Hspec (Spec, describe,
import Network.WireGuard.RPC (serveConduit, showPeer)
import Network.WireGuard.Internal.RpcParsers (deviceParser, peerParser,
- setPayloadParser)
+ setPayloadParser, requestParser)
import Network.WireGuard.Internal.State (Device(..), Peer(..),
createDevice, createPeer)
import Network.WireGuard.Internal.Data.Types (PresharedKey, PeerId)
import qualified Network.WireGuard.Internal.Data.RpcTypes as RPC (RpcDevicePayload(..), RpcPeerPayload(..),
- RpcSetPayload(..))
+ RpcSetPayload(..), RpcRequest(..),
+ OpType(..))
spec :: Spec
spec = do
@@ -174,6 +175,21 @@ spec = do
let expectedPayload = RPC.RpcSetPayload expectedDevice []
let result = feed (parse setPayloadParser $ BC.pack "private_key=e84b5a6d2717c1003a13b431570353dbaca9146cf150c5f8575680feba52027a\nlisten_port=777\nfwmark=0\n") BC.empty
eitherResult result `shouldBe` Right expectedPayload
+ describe "requestParser" $ do
+ it "must correctly parse a set operation" $ do
+ pkHex <- unhex $ BC.pack "e84b5a6d2717c1003a13b431570353dbaca9146cf150c5f8575680feba52027a"
+ let pk = DH.dhBytesToPair $ BA.convert pkHex
+ pubHex <- unhex $ BC.pack "662e14fd594556f522604703340351258903b64f35553763f19426ab2a515c58"
+ let pubK = fromJust . DH.dhBytesToPub $ BA.convert pubHex
+ let expectedDevice = RPC.RpcDevicePayload pk 777 (Just 0) False
+ let expectedPeer = RPC.RpcPeerPayload pubK False Nothing (SockAddrInet 1337 $ tupleToHostAddress (192,168,1,1)) 0 False [IPv4Range (read "192.168.1.0/24" :: AddrRange IPv4)]
+ let expectedResult = RPC.RpcRequest RPC.Set . Just $ RPC.RpcSetPayload expectedDevice [expectedPeer]
+ let result = feed (parse requestParser $ BC.pack "set=1\nprivate_key=e84b5a6d2717c1003a13b431570353dbaca9146cf150c5f8575680feba52027a\nlisten_port=777\nfwmark=0\npublic_key=662e14fd594556f522604703340351258903b64f35553763f19426ab2a515c58\nendpoint=192.168.1.1:1337\nallowed_ip=192.168.1.0/24\n\n") BC.empty
+ eitherResult result `shouldBe` Right expectedResult
+ it "must correctly parse a get operation" $ do
+ let expectedResult = RPC.RpcRequest RPC.Get Nothing
+ let result = feed (parse requestParser $ BC.pack "get=1\n\n") BC.empty
+ eitherResult result `shouldBe` Right expectedResult
where
testDevice = do
pkH <- unhex $ BC.pack "e84b5a6d2717c1003a13b431570353dbaca9146cf150c5f8575680feba52027a"