2015-08-12 19:12:27 +01:00
/**
* Copyright 2015 Vineet Garg < grgvineet @ gmail . com >
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation ; either version 2 of
* the License or ( at your option ) version 3 or any later version
* accepted by the membership of KDE e . V . ( or its successor approved
* by the membership of KDE e . V . ) , which shall act as a proxy
* defined in Section 14 of version 3 of the license .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
// This class tests the behaviour of the class LanLinkProvider, be sure to kill process kdeconnectd to avoid any port binding issues
# include "../core/backends/lan/lanlinkprovider.h"
# include "../core/backends/lan/server.h"
# include "../core/backends/lan/socketlinereader.h"
# include "../core/kdeconnectconfig.h"
# include <QAbstractSocket>
# include <QSslSocket>
# include <QtTest>
2015-12-01 15:25:34 +00:00
# include <QSslKey>
2015-08-12 19:12:27 +01:00
# include <QUdpSocket>
/*
* This class tests the working of LanLinkProvider under different conditions that when identity package is received over TCP , over UDP and same when the device is paired .
* It depends on KdeConnectConfig since LanLinkProvider internally uses it .
*/
class LanLinkProviderTest : public QObject
{
Q_OBJECT
2015-12-02 17:49:00 +00:00
public :
explicit LanLinkProviderTest ( )
: mLanLinkProvider ( true ) {
QStandardPaths : : setTestModeEnabled ( true ) ;
}
2015-08-12 19:12:27 +01:00
public Q_SLOTS :
void initTestCase ( ) ;
private Q_SLOTS :
void pairedDeviceTcpPackageReceived ( ) ;
void pairedDeviceUdpPackageReceived ( ) ;
void unpairedDeviceTcpPackageReceived ( ) ;
void unpairedDeviceUdpPackageReceived ( ) ;
private :
const int PORT = 8520 ;
// Add some private fields here
LanLinkProvider mLanLinkProvider ;
Server * mServer ;
SocketLineReader * mReader ;
QUdpSocket * mUdpSocket ;
QString mIdentityPackage ;
// Attributes for test device
QString deviceId ;
QString name ;
QCA : : PrivateKey privateKey ;
QSslCertificate certificate ;
QSslCertificate generateCertificate ( QString & , QCA : : PrivateKey & ) ;
void addTrustedDevice ( ) ;
void removeTrustedDevice ( ) ;
void setSocketAttributes ( QSslSocket * socket ) ;
void testIdentityPackage ( QByteArray & identityPackage ) ;
2015-08-12 19:19:15 +01:00
2015-08-12 19:12:27 +01:00
} ;
void LanLinkProviderTest : : initTestCase ( )
{
removeTrustedDevice ( ) ; // Remove trusted device if left by chance by any test
2016-11-26 14:38:08 +00:00
deviceId = QStringLiteral ( " testdevice " ) ;
name = QStringLiteral ( " Test Device " ) ;
2015-08-12 19:12:27 +01:00
privateKey = QCA : : KeyGenerator ( ) . createRSA ( 2048 ) ;
certificate = generateCertificate ( deviceId , privateKey ) ;
mLanLinkProvider . onStart ( ) ;
2016-11-26 14:38:08 +00:00
mIdentityPackage = QStringLiteral ( " { \" id \" :1439365924847, \" type \" : \" kdeconnect.identity \" , \" body \" :{ \" deviceId \" : \" testdevice \" , \" deviceName \" : \" Test Device \" , \" protocolVersion \" :6, \" deviceType \" : \" phone \" , \" tcpPort \" : " ) + QString : : number ( PORT ) + QStringLiteral ( " }} " ) ;
2015-08-12 19:12:27 +01:00
}
void LanLinkProviderTest : : pairedDeviceTcpPackageReceived ( )
{
KdeConnectConfig * kcc = KdeConnectConfig : : instance ( ) ;
addTrustedDevice ( ) ;
QUdpSocket * mUdpServer = new QUdpSocket ;
2016-08-08 18:38:58 +01:00
bool b = mUdpServer - > bind ( QHostAddress : : LocalHost , LanLinkProvider : : PORT , QUdpSocket : : ShareAddress ) ;
2015-12-02 17:49:00 +00:00
QVERIFY ( b ) ;
2015-08-12 19:12:27 +01:00
2015-09-11 17:21:18 +01:00
QSignalSpy spy ( mUdpServer , SIGNAL ( readyRead ( ) ) ) ;
2015-08-12 19:12:27 +01:00
mLanLinkProvider . onNetworkChange ( ) ;
2015-12-02 17:49:00 +00:00
QVERIFY ( ! spy . isEmpty ( ) | | spy . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QByteArray datagram ;
datagram . resize ( mUdpServer - > pendingDatagramSize ( ) ) ;
QHostAddress sender ;
mUdpServer - > readDatagram ( datagram . data ( ) , datagram . size ( ) , & sender ) ;
testIdentityPackage ( datagram ) ;
QJsonDocument jsonDocument = QJsonDocument : : fromJson ( datagram ) ;
2016-11-26 14:38:08 +00:00
QJsonObject body = jsonDocument . object ( ) . value ( QStringLiteral ( " body " ) ) . toObject ( ) ;
int tcpPort = body . value ( QStringLiteral ( " tcpPort " ) ) . toInt ( ) ;
2015-08-12 19:12:27 +01:00
QSslSocket socket ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy2 ( & socket , SIGNAL ( connected ( ) ) ) ;
2015-08-12 19:12:27 +01:00
socket . connectToHost ( sender , tcpPort ) ;
2015-09-11 17:21:18 +01:00
QVERIFY ( spy2 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QVERIFY2 ( socket . isOpen ( ) , " Socket disconnected immediately " ) ;
socket . write ( mIdentityPackage . toLatin1 ( ) ) ;
socket . waitForBytesWritten ( 2000 ) ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy3 ( & socket , SIGNAL ( encrypted ( ) ) ) ;
2015-08-12 19:12:27 +01:00
setSocketAttributes ( & socket ) ;
socket . addCaCertificate ( kcc - > certificate ( ) ) ;
socket . setPeerVerifyMode ( QSslSocket : : VerifyPeer ) ;
socket . setPeerVerifyName ( kcc - > name ( ) ) ;
socket . startServerEncryption ( ) ;
2015-09-11 17:21:18 +01:00
QVERIFY ( spy3 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QCOMPARE ( socket . sslErrors ( ) . size ( ) , 0 ) ;
QVERIFY2 ( socket . isValid ( ) , " Server socket disconnected " ) ;
QVERIFY2 ( socket . isEncrypted ( ) , " Server socket not yet encrypted " ) ;
QVERIFY2 ( ! socket . peerCertificate ( ) . isNull ( ) , " Peer certificate is null " ) ;
removeTrustedDevice ( ) ;
delete mUdpServer ;
}
void LanLinkProviderTest : : pairedDeviceUdpPackageReceived ( )
{
KdeConnectConfig * kcc = KdeConnectConfig : : instance ( ) ;
addTrustedDevice ( ) ;
mServer = new Server ( this ) ;
mUdpSocket = new QUdpSocket ( this ) ;
2015-12-02 17:49:00 +00:00
mServer - > listen ( QHostAddress : : LocalHost , PORT ) ;
2015-08-12 19:12:27 +01:00
2015-09-11 17:21:18 +01:00
QSignalSpy spy ( mServer , SIGNAL ( newConnection ( ) ) ) ;
2015-08-12 19:12:27 +01:00
2016-08-08 18:38:58 +01:00
qint64 bytesWritten = mUdpSocket - > writeDatagram ( mIdentityPackage . toLatin1 ( ) , QHostAddress : : LocalHost , LanLinkProvider : : PORT ) ; // write an identity package to udp socket here, we do not broadcast it here
2015-08-12 19:12:27 +01:00
QCOMPARE ( bytesWritten , mIdentityPackage . size ( ) ) ;
// We should have an incoming connection now, wait for incoming connection
2015-12-02 17:49:00 +00:00
QVERIFY ( ! spy . isEmpty ( ) | | spy . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QSslSocket * serverSocket = mServer - > nextPendingConnection ( ) ;
QVERIFY2 ( serverSocket ! = 0 , " Server socket is null " ) ;
QVERIFY2 ( serverSocket - > isOpen ( ) , " Server socket already closed " ) ;
mReader = new SocketLineReader ( serverSocket , this ) ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy2 ( mReader , SIGNAL ( readyRead ( ) ) ) ;
QVERIFY ( spy2 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QByteArray receivedPackage = mReader - > readLine ( ) ;
testIdentityPackage ( receivedPackage ) ;
// Received identiy package from LanLinkProvider now start ssl
2015-09-11 17:21:18 +01:00
QSignalSpy spy3 ( serverSocket , SIGNAL ( encrypted ( ) ) ) ;
QVERIFY ( connect ( serverSocket , static_cast < void ( QAbstractSocket : : * ) ( QAbstractSocket : : SocketError ) > ( & QSslSocket : : error ) ,
this , [ ] ( QAbstractSocket : : SocketError error ) { qDebug ( ) < < " error: " < < error ; } ) ) ;
2015-08-12 19:12:27 +01:00
setSocketAttributes ( serverSocket ) ;
serverSocket - > addCaCertificate ( kcc - > certificate ( ) ) ;
serverSocket - > setPeerVerifyMode ( QSslSocket : : VerifyPeer ) ;
serverSocket - > setPeerVerifyName ( kcc - > deviceId ( ) ) ;
2015-09-12 21:15:19 +01:00
serverSocket - > startClientEncryption ( ) ; // Its TCP server. but SSL client
2015-09-11 17:21:18 +01:00
QVERIFY ( ! serverSocket - > isEncrypted ( ) ) ;
spy3 . wait ( 2000 ) ;
qDebug ( ) < < " xxxxxxxxx " < < serverSocket - > sslErrors ( ) ;
2015-08-12 19:12:27 +01:00
QCOMPARE ( serverSocket - > sslErrors ( ) . size ( ) , 0 ) ;
QVERIFY2 ( serverSocket - > isValid ( ) , " Server socket disconnected " ) ;
QVERIFY2 ( serverSocket - > isEncrypted ( ) , " Server socket not yet encrypted " ) ;
QVERIFY2 ( ! serverSocket - > peerCertificate ( ) . isNull ( ) , " Peer certificate is null " ) ;
removeTrustedDevice ( ) ;
delete mServer ;
delete mUdpSocket ;
}
void LanLinkProviderTest : : unpairedDeviceTcpPackageReceived ( )
{
QUdpSocket * mUdpServer = new QUdpSocket ;
2016-08-08 18:38:58 +01:00
bool b = mUdpServer - > bind ( QHostAddress : : LocalHost , LanLinkProvider : : PORT , QUdpSocket : : ShareAddress ) ;
2015-12-02 17:49:00 +00:00
QVERIFY ( b ) ;
2015-08-12 19:12:27 +01:00
2015-09-11 17:21:18 +01:00
QSignalSpy spy ( mUdpServer , SIGNAL ( readyRead ( ) ) ) ;
2015-08-12 19:12:27 +01:00
mLanLinkProvider . onNetworkChange ( ) ;
2015-12-02 17:49:00 +00:00
QVERIFY ( ! spy . isEmpty ( ) | | spy . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QByteArray datagram ;
datagram . resize ( mUdpServer - > pendingDatagramSize ( ) ) ;
QHostAddress sender ;
mUdpServer - > readDatagram ( datagram . data ( ) , datagram . size ( ) , & sender ) ;
testIdentityPackage ( datagram ) ;
QJsonDocument jsonDocument = QJsonDocument : : fromJson ( datagram ) ;
2016-11-26 14:38:08 +00:00
QJsonObject body = jsonDocument . object ( ) . value ( QStringLiteral ( " body " ) ) . toObject ( ) ;
int tcpPort = body . value ( QStringLiteral ( " tcpPort " ) ) . toInt ( ) ;
2015-08-12 19:12:27 +01:00
QSslSocket socket ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy2 ( & socket , SIGNAL ( connected ( ) ) ) ;
2015-08-12 19:12:27 +01:00
socket . connectToHost ( sender , tcpPort ) ;
2015-09-11 17:21:18 +01:00
QVERIFY ( spy2 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QVERIFY2 ( socket . isOpen ( ) , " Socket disconnected immediately " ) ;
socket . write ( mIdentityPackage . toLatin1 ( ) ) ;
socket . waitForBytesWritten ( 2000 ) ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy3 ( & socket , SIGNAL ( encrypted ( ) ) ) ;
2015-08-12 19:12:27 +01:00
// We don't take care for sslErrors signal here, but signal will emit still we will get successful connection
setSocketAttributes ( & socket ) ;
socket . setPeerVerifyMode ( QSslSocket : : QueryPeer ) ;
2015-09-12 21:15:19 +01:00
socket . startServerEncryption ( ) ;
2015-08-12 19:12:27 +01:00
2015-09-11 17:21:18 +01:00
QVERIFY ( spy3 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QVERIFY2 ( socket . isValid ( ) , " Server socket disconnected " ) ;
QVERIFY2 ( socket . isEncrypted ( ) , " Server socket not yet encrypted " ) ;
QVERIFY2 ( ! socket . peerCertificate ( ) . isNull ( ) , " Peer certificate is null " ) ;
delete mUdpServer ;
}
void LanLinkProviderTest : : unpairedDeviceUdpPackageReceived ( )
{
mServer = new Server ( this ) ;
mUdpSocket = new QUdpSocket ( this ) ;
2015-12-02 17:49:00 +00:00
mServer - > listen ( QHostAddress : : LocalHost , PORT ) ;
2015-08-12 19:12:27 +01:00
2015-09-11 17:21:18 +01:00
QSignalSpy spy ( mServer , & Server : : newConnection ) ;
2016-08-08 18:38:58 +01:00
qint64 bytesWritten = mUdpSocket - > writeDatagram ( mIdentityPackage . toLatin1 ( ) , QHostAddress : : LocalHost , LanLinkProvider : : PORT ) ; // write an identity package to udp socket here, we do not broadcast it here
2015-08-12 19:12:27 +01:00
QCOMPARE ( bytesWritten , mIdentityPackage . size ( ) ) ;
2015-12-02 17:49:00 +00:00
QVERIFY ( ! spy . isEmpty ( ) | | spy . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QSslSocket * serverSocket = mServer - > nextPendingConnection ( ) ;
QVERIFY2 ( serverSocket ! = 0 , " Server socket is null " ) ;
QVERIFY2 ( serverSocket - > isOpen ( ) , " Server socket already closed " ) ;
mReader = new SocketLineReader ( serverSocket , this ) ;
2015-09-11 17:21:18 +01:00
QSignalSpy spy2 ( mReader , & SocketLineReader : : readyRead ) ;
QVERIFY ( spy2 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QByteArray receivedPackage = mReader - > readLine ( ) ;
QVERIFY2 ( ! receivedPackage . isEmpty ( ) , " Empty package received " ) ;
testIdentityPackage ( receivedPackage ) ;
// Received identity package from LanLinkProvider now start ssl
2015-09-11 17:21:18 +01:00
QSignalSpy spy3 ( serverSocket , SIGNAL ( encrypted ( ) ) ) ;
2015-08-12 19:12:27 +01:00
setSocketAttributes ( serverSocket ) ;
serverSocket - > setPeerVerifyMode ( QSslSocket : : QueryPeer ) ;
serverSocket - > startClientEncryption ( ) ; // Its TCP server. but SSL client
2015-09-11 17:21:18 +01:00
QVERIFY ( spy3 . wait ( ) ) ;
2015-08-12 19:12:27 +01:00
QVERIFY2 ( serverSocket - > isValid ( ) , " Server socket disconnected " ) ;
QVERIFY2 ( serverSocket - > isEncrypted ( ) , " Server socket not yet encrypted " ) ;
QVERIFY2 ( ! serverSocket - > peerCertificate ( ) . isNull ( ) , " Peer certificate is null " ) ;
delete mServer ;
delete mUdpSocket ;
}
void LanLinkProviderTest : : testIdentityPackage ( QByteArray & identityPackage )
{
QJsonDocument jsonDocument = QJsonDocument : : fromJson ( identityPackage ) ;
QJsonObject jsonObject = jsonDocument . object ( ) ;
2016-11-26 14:38:08 +00:00
QJsonObject body = jsonObject . value ( QStringLiteral ( " body " ) ) . toObject ( ) ;
2015-08-12 19:12:27 +01:00
QCOMPARE ( jsonObject . value ( " type " ) . toString ( ) , QString ( " kdeconnect.identity " ) ) ;
QVERIFY2 ( body . contains ( " deviceName " ) , " Device name not found in identity package " ) ;
QVERIFY2 ( body . contains ( " deviceId " ) , " Device id not found in identity package " ) ;
QVERIFY2 ( body . contains ( " protocolVersion " ) , " Protocol version not found in identity package " ) ;
QVERIFY2 ( body . contains ( " deviceType " ) , " Device type not found in identity package " ) ;
}
QSslCertificate LanLinkProviderTest : : generateCertificate ( QString & commonName , QCA : : PrivateKey & privateKey )
{
QDateTime startTime = QDateTime : : currentDateTime ( ) ;
QDateTime endTime = startTime . addYears ( 10 ) ;
QCA : : CertificateInfo certificateInfo ;
certificateInfo . insert ( QCA : : CommonName , commonName ) ;
2016-11-26 14:38:08 +00:00
certificateInfo . insert ( QCA : : Organization , QStringLiteral ( " KDE " ) ) ;
certificateInfo . insert ( QCA : : OrganizationalUnit , QStringLiteral ( " Kde connect " ) ) ;
2015-08-12 19:12:27 +01:00
QCA : : CertificateOptions certificateOptions ( QCA : : PKCS10 ) ;
certificateOptions . setSerialNumber ( 10 ) ;
certificateOptions . setInfo ( certificateInfo ) ;
certificateOptions . setValidityPeriod ( startTime , endTime ) ;
certificateOptions . setFormat ( QCA : : PKCS10 ) ;
QSslCertificate certificate = QSslCertificate ( QCA : : Certificate ( certificateOptions , privateKey ) . toPEM ( ) . toLatin1 ( ) ) ;
return certificate ;
}
2015-12-01 15:25:34 +00:00
void LanLinkProviderTest : : setSocketAttributes ( QSslSocket * socket )
{
2015-08-12 19:12:27 +01:00
socket - > setPrivateKey ( QSslKey ( privateKey . toPEM ( ) . toLatin1 ( ) , QSsl : : Rsa ) ) ;
socket - > setLocalCertificate ( certificate ) ;
}
void LanLinkProviderTest : : addTrustedDevice ( )
{
KdeConnectConfig * kcc = KdeConnectConfig : : instance ( ) ;
2016-11-26 14:38:08 +00:00
kcc - > addTrustedDevice ( deviceId , name , QStringLiteral ( " phone " ) ) ;
kcc - > setDeviceProperty ( deviceId , QStringLiteral ( " certificate " ) , QString : : fromLatin1 ( certificate . toPem ( ) ) ) ;
2015-08-12 19:12:27 +01:00
}
void LanLinkProviderTest : : removeTrustedDevice ( )
{
KdeConnectConfig * kcc = KdeConnectConfig : : instance ( ) ;
kcc - > removeTrustedDevice ( deviceId ) ;
}
QTEST_GUILESS_MAIN ( LanLinkProviderTest )
# include "lanlinkprovidertest.moc"