zgrab2/modules/oracle/types_test.go
Justin Bastress f322d0b691 less panic
2018-02-28 16:08:33 -05:00

825 lines
31 KiB
Go

package oracle
import (
"bytes"
"encoding/binary"
"encoding/hex"
"encoding/json"
"strconv"
"strings"
"testing"
)
func max(a, b int) int {
if a > b {
return a
}
return b
}
// debugging -- interleave hex dumps of expected/actual, highlight differences
func interleave(expected, actual []byte) string {
ret := make([]string, 0)
e := strings.Split(string(hex.Dump(expected)), "\n")
a := strings.Split(string(hex.Dump(actual)), "\n")
n := max(len(e), len(a))
for i := 0; i < n-1; i++ {
var ei, ai string = "", ""
if i < len(e) {
ei = e[i]
}
if i < len(a) {
ai = a[i]
}
m := max(len(ei), len(ai))
diff := make([]byte, m)
for j := 1; j < m; j++ {
var aij, eij byte = 32, 32
if j < len(ai) {
aij = ai[j]
}
if j < len(ei) {
eij = ei[j]
}
if aij != eij {
diff[j] = '!'
}
}
ret = append(ret, "E: "+ei)
ret = append(ret, "A: "+ai)
ret = append(ret, "D: "+string(diff))
}
return strings.Join(ret, "\n")
}
func fromHex(h string) []byte {
bytes := strings.Fields(h)
ret := make([]byte, len(bytes))
for i, v := range bytes {
b, err := strconv.ParseUint(v, 16, 8)
if err != nil {
panic(err)
}
ret[i] = byte(b)
}
return ret
}
var validHeaders = map[string]TNSHeader{
"00 08 00 01 02 03 00 45": TNSHeader{
Length: 8,
PacketChecksum: 1,
Type: 2,
Flags: 3,
HeaderChecksum: 0x45,
},
"f2 1e 01 00 07 06 76 54": TNSHeader{
Length: 0xF21E,
PacketChecksum: 0x0100,
Type: 0x07,
Flags: 0x06,
HeaderChecksum: 0x7654,
},
}
type TestCase struct {
Value *TNSPacket
Encoding string
}
func orPanic(ret []byte, err error) []byte {
if err != nil {
panic(err)
}
return ret
}
var validTNSData = map[string]TestCase{
"00.empty": TestCase{
Encoding: "00 0A 00 00 06 00 00 00 80 00",
Value: &TNSPacket{
Header: &TNSHeader{
Length: 0x0A,
PacketChecksum: 0,
Flags: 0,
Type: PacketTypeData,
HeaderChecksum: 0,
},
Body: &TNSData{
DataFlags: 0x8000,
Data: []byte{},
},
},
},
"00.trivial": TestCase{
Encoding: "00 10 00 00 06 00 00 00 00 01 31 32 33 34 35 36",
Value: &TNSPacket{
Header: &TNSHeader{
Length: 0x10,
PacketChecksum: 0,
Flags: 0,
Type: PacketTypeData,
HeaderChecksum: 0,
},
Body: &TNSData{
DataFlags: 1,
Data: []byte("123456"),
},
},
},
"01.NSN.Request": TestCase{
Encoding: "00 a8 00 00 06 00 00 00 00 00 de ad be ef 00 9e " + /* ................ */
"0a 20 03 00 00 04 00 00 04 00 03 00 00 00 00 00 " + /* . .............. */
"04 00 05 0a 20 03 00 00 08 00 01 00 00 04 ec 19 " + /* .... ........... */
"2c 7b 4c 00 12 00 01 de ad be ef 00 03 00 00 00 " + /* ,{L............. */
"04 00 04 00 01 00 01 00 02 00 01 00 05 00 00 00 " + /* ................ */
"00 00 04 00 05 0a 20 03 00 00 02 00 03 e0 e1 00 " + /* ...... ......... */
"02 00 06 fc ff 00 01 00 02 01 00 03 00 00 4e 54 " + /* ..............NT */
"53 00 02 00 02 00 00 00 00 00 04 00 05 0a 20 03 " + /* S............. . */
"00 00 0c 00 01 00 11 06 10 0c 0f 0a 0b 08 02 01 " + /* ................ */
"03 00 03 00 02 00 00 00 00 00 04 00 05 0a 20 03 " + /* .............. . */
"00 00 03 00 01 00 03 01 ", /* ........ */
Value: &TNSPacket{
Header: &TNSHeader{
Length: 0x00a8,
PacketChecksum: 0,
Flags: 0,
Type: PacketTypeData,
HeaderChecksum: 0,
},
Body: &TNSData{
DataFlags: 0,
Data: orPanic((&TNSDataNSN{
ID: DataIDNSN,
Version: encodeReleaseVersion("10.2.0.3.0"),
Options: NSNOptions(0),
Services: []NSNService{
NSNService{
Type: 4,
Values: []NSNValue{
*NSNValueVersion("10.2.0.3.0"),
*NSNValueBytes(fromHex("00 00 04 ec 19 2c 7b 4c")),
*NSNValueBytes(fromHex("de ad be ef 00 03 00 00 00 04 00 04 00 01 00 01 00 02")),
},
Marker: 0,
},
NSNService{
Type: 1,
Values: []NSNValue{
*NSNValueVersion("10.2.0.3.0"),
NSNValue{
Type: 3,
Value: fromHex("e0 e1"),
},
NSNValue{
Type: 6,
Value: fromHex("fc ff"),
},
NSNValue{
Type: 2,
Value: fromHex("01"),
},
NSNValue{
Type: 0,
Value: []byte("NTS"),
},
},
Marker: 0,
},
NSNService{
Type: 2,
Values: []NSNValue{
*NSNValueVersion("10.2.0.3.0"),
NSNValue{
Type: 1,
Value: fromHex("00 11 06 10 0c 0f 0a 0b 08 02 01 03"),
},
},
Marker: 0,
},
NSNService{
Type: 3,
Values: []NSNValue{
*NSNValueVersion("10.2.0.3.0"),
NSNValue{
Type: 1,
Value: fromHex("00 03 01"),
},
},
},
},
}).Encode()),
},
},
},
}
var validTNSConnect = map[string]TestCase{
"01. 013A-0139": TestCase{
Encoding: "00 ca 00 00 01 00 00 00 01 3a 01 2c 0c 41 20 00 " + /* .........:.,.A . */
"ff ff 7f 08 00 00 01 00 00 90 00 3a 00 00 08 00 " + /* ...........:.... */
"41 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 " + /* AA.............. */
"00 00 00 00 00 00 00 00 00 00 28 44 45 53 43 52 " + /* ..........(DESCR */
"49 50 54 49 4f 4e 3d 28 43 4f 4e 4e 45 43 54 5f " + /* IPTION=(CONNECT_ */
"44 41 54 41 3d 28 53 45 52 56 49 43 45 5f 4e 41 " + /* DATA=(SERVICE_NA */
"4d 45 3d 63 6b 64 62 29 28 43 49 44 3d 28 50 52 " + /* ME=ckdb)(CID=(PR */
"4f 47 52 41 4d 3d 67 73 71 6c 29 28 48 4f 53 54 " + /* OGRAM=gsql)(HOST */
"3d 4d 63 41 66 65 65 29 28 55 53 45 52 3d 72 6f " + /* =McAfee)(USER=ro */
"6f 74 29 29 29 28 41 44 44 52 45 53 53 3d 28 50 " + /* ot)))(ADDRESS=(P */
"52 4f 54 4f 43 4f 4c 3d 54 43 50 29 28 48 4f 53 " + /* ROTOCOL=TCP)(HOS */
"54 3d 31 30 2e 31 2e 35 30 2e 31 34 29 28 50 4f " + /* T=10.1.50.14)(PO */
"52 54 3d 31 35 32 31 29 29 29 ", /* RT=1521))) */
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x00ca, PacketChecksum: 0, Type: PacketTypeConnect, Flags: 0, HeaderChecksum: 0},
Body: &TNSConnect{
Version: 0x013a,
MinVersion: 0x012c,
GlobalServiceOptions: SOHeaderChecksum | SOFullDuplex | SOUnknown0040 | SOUnknown0001, // (0x0c41)
SDU: 0x2000,
TDU: 0xffff,
ProtocolCharacteristics: NTPCConfirmedRelease | NTPCTDUBasedIO | NTPCSpawnerRunning | NTPCDataTest | NTPCCallbackIO | NTPCAsyncIO | NTPCPacketIO | NTPCGenerateSIGURG, // 0x7F08
MaxBeforeAck: 0,
ByteOrder: defaultByteOrder,
DataLength: 0x0090,
DataOffset: 0x003A,
MaxResponseSize: 0x00000800,
ConnectFlags0: CFUnknown40 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFServicesWanted,
CrossFacility0: 0,
CrossFacility1: 0,
ConnectionID0: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
ConnectionID1: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
Unknown3A: []byte{},
ConnectDescriptor: "(DESCRIPTION=(CONNECT_DATA=(SERVICE_NAME=ckdb)(CID=(PROGRAM=gsql)(HOST=McAfee)(USER=root)))(ADDRESS=(PROTOCOL=TCP)(HOST=10.1.50.14)(PORT=1521)))",
},
},
},
"02. 138-138": TestCase{
Encoding: "01 00 00 00 01 04 00 00 01 38 01 2c 00 00 08 00 " + /* .........8.,.... */
"7f ff 86 0e 00 00 01 00 00 c6 00 3a 00 00 02 00 " + /* ...........:.... */
"61 61 00 00 00 00 00 00 00 00 00 00 04 10 00 00 " + /* aa.............. */
"00 03 00 00 00 00 00 00 00 00 28 44 45 53 43 52 " + /* ..........(DESCR */
"49 50 54 49 4f 4e 3d 28 41 44 44 52 45 53 53 3d " + /* IPTION=(ADDRESS= */
"28 50 52 4f 54 4f 43 4f 4c 3d 54 43 50 29 28 48 " + /* (PROTOCOL=TCP)(H */
"4f 53 54 3d 31 39 32 2e 31 36 38 2e 31 2e 32 32 " + /* OST=192.168.1.22 */
"31 29 28 50 4f 52 54 3d 31 35 32 31 29 29 28 43 " + /* 1)(PORT=1521))(C */
"4f 4e 4e 45 43 54 5f 44 41 54 41 3d 28 53 49 44 " + /* ONNECT_DATA=(SID */
"3d 76 6f 69 64 29 28 53 45 52 56 45 52 3d 44 45 " + /* =void)(SERVER=DE */
"44 49 43 41 54 45 44 29 28 43 49 44 3d 28 50 52 " + /* DICATED)(CID=(PR */
"4f 47 52 41 4d 3d 46 3a 5c 6f 72 61 63 6c 65 5c " + /* OGRAM=F:\oracle\ */
"6f 72 61 39 32 5c 62 69 6e 5c 73 71 6c 70 6c 75 " + /* ora92\bin\sqlplu */
"73 2e 65 78 65 29 28 48 4f 53 54 3d 46 41 4e 47 " + /* s.exe)(HOST=FANG */
"48 4f 4e 47 5a 48 41 4f 29 28 55 53 45 52 3d 41 " + /* HONGZHAO)(USER=A */
"64 6d 69 6e 69 73 74 72 61 74 6f 72 29 29 29 29 ", /* dministrator)))) */
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x0100, PacketChecksum: 0, Type: PacketTypeConnect, Flags: 0x04, HeaderChecksum: 0},
Body: &TNSConnect{
Version: 0x0138,
MinVersion: 0x012c,
GlobalServiceOptions: 0,
SDU: 0x0800,
TDU: 0x7fff,
ProtocolCharacteristics: NTPCHangon | NTPCCallbackIO | NTPCAsyncIO | NTPCGenerateSIGURG | NTPCUrgentIO | NTPCFullDuplex, // 0x860e
MaxBeforeAck: 0,
ByteOrder: defaultByteOrder,
DataLength: 0x00c6,
DataOffset: 0x003a,
MaxResponseSize: 0x00000200,
ConnectFlags0: CFUnknown40 | CFUnknown20 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFUnknown20 | CFServicesWanted,
CrossFacility0: 0,
CrossFacility1: 0,
ConnectionID0: [8]byte{0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x00, 0x03},
ConnectionID1: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
Unknown3A: []byte{},
ConnectDescriptor: "(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=192.168.1.221)(PORT=1521))(CONNECT_DATA=(SID=void)(SERVER=DEDICATED)(CID=(PROGRAM=F:\\oracle\\ora92\\bin\\sqlplus.exe)(HOST=FANGHONGZHAO)(USER=Administrator))))",
},
},
},
"03. 138-138": TestCase{
Encoding: "00 ec 00 00 01 04 00 00 01 38 01 2c 00 00 08 00 " + /* .........8.,.... */
"7f ff 86 0e 00 00 01 00 00 b2 00 3a 00 00 02 00 " + /* ...........:.... */
"61 61 00 00 00 00 00 00 00 00 00 00 10 ec 00 00 " + /* aa.............. */
"00 05 00 00 00 00 00 00 00 00 28 44 45 53 43 52 " + /* ..........(DESCR */
"49 50 54 49 4f 4e 3d 28 41 44 44 52 45 53 53 3d " + /* IPTION=(ADDRESS= */
"28 50 52 4f 54 4f 43 4f 4c 3d 54 43 50 29 28 48 " + /* (PROTOCOL=TCP)(H */
"4f 53 54 3d 41 41 29 28 50 4f 52 54 3d 31 35 32 " + /* OST=AA)(PORT=152 */
"31 29 29 28 43 4f 4e 4e 45 43 54 5f 44 41 54 41 " + /* 1))(CONNECT_DATA */
"3d 28 53 49 44 3d 76 6f 69 64 29 28 53 45 52 56 " + /* =(SID=void)(SERV */
"45 52 3d 44 45 44 49 43 41 54 45 44 29 28 43 49 " + /* ER=DEDICATED)(CI */
"44 3d 28 50 52 4f 47 52 41 4d 3d 44 3a 5c 6f 72 " + /* D=(PROGRAM=D:\or */
"61 63 6c 65 5c 6f 72 61 39 32 5c 62 69 6e 5c 73 " + /* acle\ora92\bin\s */
"71 6c 70 6c 75 73 2e 65 78 65 29 28 48 4f 53 54 " + /* qlplus.exe)(HOST */
"3d 48 49 4e 47 45 2d 48 41 4e 59 46 29 28 55 53 " + /* =HINGE-HANYF)(US */
"45 52 3d 68 61 6e 79 66 29 29 29 29 ", /* ER=hanyf)))) */
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x00EC, PacketChecksum: 0, Type: PacketTypeConnect, Flags: 0x04, HeaderChecksum: 0},
Body: &TNSConnect{
Version: 0x0138,
MinVersion: 0x012c,
GlobalServiceOptions: 0,
SDU: 0x0800,
TDU: 0x7fff,
ProtocolCharacteristics: NTPCHangon | NTPCCallbackIO | NTPCAsyncIO | NTPCGenerateSIGURG | NTPCUrgentIO | NTPCFullDuplex, // 0x860e
MaxBeforeAck: 0,
ByteOrder: defaultByteOrder,
DataLength: 0x00b2,
DataOffset: 0x003a,
MaxResponseSize: 0x00000200,
ConnectFlags0: CFUnknown40 | CFUnknown20 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFUnknown20 | CFServicesWanted,
CrossFacility0: 0,
CrossFacility1: 0,
ConnectionID0: [8]byte{0x00, 0x00, 0x10, 0xec, 0x00, 0x00, 0x00, 0x05},
ConnectionID1: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
Unknown3A: []byte{},
ConnectDescriptor: "(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=AA)(PORT=1521))(CONNECT_DATA=(SID=void)(SERVER=DEDICATED)(CID=(PROGRAM=D:\\oracle\\ora92\\bin\\sqlplus.exe)(HOST=HINGE-HANYF)(USER=hanyf))))",
},
},
},
"unknown": TestCase{
Encoding: "00 d7 00 00 01 00 00 00 01 3b 01 2c 0c 41 20 00 " + /* .........;.,.A . */
"ff ff 7f 08 00 00 01 00 00 91 00 46 00 00 08 00 " + /* ...........F.... */
"41 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 " + /* AA.............. */
"00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 20 " + /* ............ .. */
"00 00 00 00 00 00 28 44 45 53 43 52 49 50 54 49 " + /* ......(DESCRIPTI */
"4f 4e 3d 28 43 4f 4e 4e 45 43 54 5f 44 41 54 41 " + /* ON=(CONNECT_DATA */
"3d 28 53 49 44 3d 6f 72 63 6c 31 31 67 29 28 43 " + /* =(SID=orcl11g)(C */
"49 44 3d 28 50 52 4f 47 52 41 4d 3d 73 71 6c 70 " + /* ID=(PROGRAM=sqlp */
"6c 75 73 40 6b 61 6c 69 29 28 48 4f 53 54 3d 6b " + /* lus@kali)(HOST=k */
"61 6c 69 29 28 55 53 45 52 3d 72 6f 6f 74 29 29 " + /* ali)(USER=root)) */
"29 28 41 44 44 52 45 53 53 3d 28 50 52 4f 54 4f " + /* )(ADDRESS=(PROTO */
"43 4f 4c 3d 54 43 50 29 28 48 4f 53 54 3d 31 30 " + /* COL=TCP)(HOST=10 */
"2e 30 2e 37 32 2e 31 31 33 29 28 50 4f 52 54 3d " + /* .0.72.113)(PORT= */
"31 35 32 31 29 29 29 ",
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x00d7, PacketChecksum: 0, Type: PacketTypeConnect, Flags: 0, HeaderChecksum: 0},
Body: &TNSConnect{
Version: 0x013b,
MinVersion: 0x012c,
GlobalServiceOptions: SOHeaderChecksum | SOFullDuplex | SOUnknown0040 | SOUnknown0001, // (0x0c41)
SDU: 0x2000,
TDU: 0xffff,
ProtocolCharacteristics: NTPCConfirmedRelease | NTPCTDUBasedIO | NTPCSpawnerRunning | NTPCDataTest | NTPCCallbackIO | NTPCAsyncIO | NTPCPacketIO | NTPCGenerateSIGURG, // 0x7F08
MaxBeforeAck: 0,
ByteOrder: defaultByteOrder,
DataLength: 0x0091,
DataOffset: 0x0046, // points past the 12 bytes of \x00/\x20 at the start
MaxResponseSize: 0x00000800,
ConnectFlags0: CFUnknown40 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFServicesWanted,
CrossFacility0: 0,
CrossFacility1: 0,
ConnectionID0: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
ConnectionID1: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
Unknown3A: []byte{0x00, 0x00, 0x20, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
ConnectDescriptor: "(DESCRIPTION=(CONNECT_DATA=(SID=orcl11g)(CID=(PROGRAM=sqlplus@kali)(HOST=kali)(USER=root)))(ADDRESS=(PROTOCOL=TCP)(HOST=10.0.72.113)(PORT=1521)))",
},
},
},
"unknown3a": TestCase{
Encoding: "00 d7 00 00 01 00 00 00 01 3b 01 2c 0c 41 20 00 " + /* .........;.,.A . */
"ff ff 7f 08 00 00 01 00 00 91 00 46 00 00 08 00 " + /* ...........F.... */
"41 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 " + /* AA.............. */
"00 00 00 00 00 00 00 00 00 00 12 34 56 78 9a bc " + /* ............ .. */
"de fe dc ba 98 76 28 44 45 53 43 52 49 50 54 49 " + /* ......(DESCRIPTI */
"4f 4e 3d 28 43 4f 4e 4e 45 43 54 5f 44 41 54 41 " + /* ON=(CONNECT_DATA */
"3d 28 53 49 44 3d 6f 72 63 6c 31 31 67 29 28 43 " + /* =(SID=orcl11g)(C */
"49 44 3d 28 50 52 4f 47 52 41 4d 3d 73 71 6c 70 " + /* ID=(PROGRAM=sqlp */
"6c 75 73 40 6b 61 6c 69 29 28 48 4f 53 54 3d 6b " + /* lus@kali)(HOST=k */
"61 6c 69 29 28 55 53 45 52 3d 72 6f 6f 74 29 29 " + /* ali)(USER=root)) */
"29 28 41 44 44 52 45 53 53 3d 28 50 52 4f 54 4f " + /* )(ADDRESS=(PROTO */
"43 4f 4c 3d 54 43 50 29 28 48 4f 53 54 3d 31 30 " + /* COL=TCP)(HOST=10 */
"2e 30 2e 37 32 2e 31 31 33 29 28 50 4f 52 54 3d " + /* .0.72.113)(PORT= */
"31 35 32 31 29 29 29 ",
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x00d7, PacketChecksum: 0, Type: PacketTypeConnect, Flags: 0, HeaderChecksum: 0},
Body: &TNSConnect{
Version: 0x013b,
MinVersion: 0x012c,
GlobalServiceOptions: SOHeaderChecksum | SOFullDuplex | SOUnknown0040 | SOUnknown0001, // (0x0c41)
SDU: 0x2000,
TDU: 0xffff,
ProtocolCharacteristics: NTPCConfirmedRelease | NTPCTDUBasedIO | NTPCSpawnerRunning | NTPCDataTest | NTPCCallbackIO | NTPCAsyncIO | NTPCPacketIO | NTPCGenerateSIGURG, // 0x7F08
MaxBeforeAck: 0,
ByteOrder: defaultByteOrder,
DataLength: 0x0091,
DataOffset: 0x0046,
MaxResponseSize: 0x00000800,
ConnectFlags0: CFUnknown40 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFServicesWanted,
CrossFacility0: 0,
CrossFacility1: 0,
ConnectionID0: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
ConnectionID1: [8]byte{0, 0, 0, 0, 0, 0, 0, 0},
Unknown3A: []byte{0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xfe, 0xdc, 0xba, 0x98, 0x76},
ConnectDescriptor: "(DESCRIPTION=(CONNECT_DATA=(SID=orcl11g)(CID=(PROGRAM=sqlplus@kali)(HOST=kali)(USER=root)))(ADDRESS=(PROTOCOL=TCP)(HOST=10.0.72.113)(PORT=1521)))",
},
},
},
}
var validTNSAccept = map[string]TestCase{
"01. 013A-0139": TestCase{
Encoding: "00 20 00 00 02 00 00 00 01 39 00 00 08 00 7f ff " + /* . .......9...... */
"01 00 00 00 00 20 61 61 00 00 00 00 00 00 00 00 ", /* ..... aa........ */
Value: &TNSPacket{
Header: &TNSHeader{Length: 0x0020, PacketChecksum: 0, Type: PacketTypeAccept, Flags: 0, HeaderChecksum: 0},
Body: &TNSAccept{
Version: 0x0139,
GlobalServiceOptions: 0,
SDU: 0x0800,
TDU: 0x7fff,
ByteOrder: defaultByteOrder,
DataLength: 0,
DataOffset: 0x20,
ConnectFlags0: CFUnknown40 | CFUnknown20 | CFServicesWanted,
ConnectFlags1: CFUnknown40 | CFUnknown20 | CFServicesWanted,
Unknown18: []byte{0, 0, 0, 0, 0, 0, 0, 0},
AcceptData: []byte{},
},
},
},
}
func serialize(val interface{}) []byte {
// According to the comments in json.Marshal, JSON object keys are sorted,
// so this is suitable for comparison.
ret, err := json.Marshal(val)
if err != nil {
panic(err)
}
return ret
}
func min(a, b int) int {
if a < b {
return a
}
return b
}
func getTNSDriver() *TNSDriver {
return &TNSDriver{Mode: TNSModeOld}
}
// TODO: TNSRedirect
// TODO: Invalid cases
func TestTNSHeaderEncode(t *testing.T) {
driver := getTNSDriver()
for hex, header := range validHeaders {
bin := fromHex(hex)
encoded, err := header.Encode()
if err != nil {
t.Fatalf("TNSHeader.Encode error: %v", err)
}
if !bytes.Equal(bin, encoded) {
t.Errorf("TNSHeader.Encode mismatch:[\n%s\n]", interleave(bin, encoded))
}
decoded, err := driver.ReadTNSHeader(getSliceReader(bin))
if err != nil {
t.Fatalf("Decode error: %v", err)
}
jsonHeader := serialize(header)
jsonDecoded := serialize(decoded)
if !bytes.Equal(jsonHeader, jsonDecoded) {
t.Errorf("TNSHeader.Read mismatch:[\n%s\n]", interleave(jsonHeader, jsonDecoded))
}
}
}
func TestTNSConnect(t *testing.T) {
driver := getTNSDriver()
for tag, info := range validTNSConnect {
bin := fromHex(info.Encoding)
encoded, err := driver.EncodePacket(info.Value)
if err != nil {
t.Fatalf("%s: TNSConnect Error encoding packet: %v", tag, err)
}
if !bytes.Equal(bin, encoded) {
t.Errorf("%s: TNSConnect.Encode mismatch:[\n%s\n]", tag, interleave(bin, encoded))
}
reader := getSliceReader(bin)
response, err := driver.ReadTNSPacket(reader)
if err != nil {
t.Fatalf("%s: Error reading TNSConnect packet: %v", tag, err)
}
// TODO: check header
decoded, ok := response.Body.(*TNSConnect)
if !ok {
t.Fatalf("%s: Read wrong packet: %v", tag, response.Body)
}
jsonPacket := serialize(info.Value.Body)
jsonDecoded := serialize(decoded)
if !bytes.Equal(jsonPacket, jsonDecoded) {
t.Errorf("%s: TNSConnect.Read mismatch:[\n%s\n]", tag, interleave(jsonPacket, jsonDecoded))
}
if len(reader.Data) > 0 {
t.Errorf("%s: TNSConnect.Read: %d bytes left over", tag, len(reader.Data))
}
}
}
func TestTNSAccept(t *testing.T) {
driver := getTNSDriver()
for tag, info := range validTNSAccept {
bin := fromHex(info.Encoding)
encoded, err := driver.EncodePacket(info.Value)
if err != nil {
t.Fatalf("%s: TNSAccept Error encoding packet: %v", tag, err)
}
if !bytes.Equal(bin, encoded) {
t.Errorf("%s: TNSAccept.Encode mismatch:[\n%s\n]", tag, interleave(bin, encoded))
}
reader := getSliceReader(bin)
response, err := driver.ReadTNSPacket(reader)
if err != nil {
t.Fatalf("%s: Error reading TNSAccept packet: %v", tag, err)
}
// TODO: check header
decoded, ok := response.Body.(*TNSAccept)
if !ok {
t.Fatalf("%s: Read wrong packet: %v", tag, response.Body)
}
jsonPacket := serialize(info.Value.Body)
jsonDecoded := serialize(decoded)
if !bytes.Equal(jsonPacket, jsonDecoded) {
t.Errorf("%s: TNSAccept.Read mismatch:[\n%s\n]", tag, interleave(jsonPacket, jsonDecoded))
}
if len(reader.Data) > 0 {
t.Errorf("%s: TNSAccept.Read: %d bytes left over", tag, len(reader.Data))
}
}
}
func TestTNSData(t *testing.T) {
driver := getTNSDriver()
for tag, info := range validTNSData {
bin := fromHex(info.Encoding)
encoded, err := driver.EncodePacket(info.Value)
if err != nil {
t.Fatalf("%s: TNSData Error encoding packet: %v", tag, err)
}
if !bytes.Equal(bin, encoded) {
t.Errorf("%s: TNSData.Encode mismatch:[\n%s\n]", tag, interleave(bin, encoded))
}
reader := getSliceReader(bin)
response, err := driver.ReadTNSPacket(reader)
if err != nil {
t.Fatalf("%s: Error reading TNSData packet: %v", tag, err)
}
// TODO: check header
decoded, ok := response.Body.(*TNSData)
if !ok {
t.Fatalf("%s: Read wrong packet: %v", tag, response.Body)
}
jsonPacket := serialize(info.Value.Body)
jsonDecoded := serialize(decoded)
if !bytes.Equal(jsonPacket, jsonDecoded) {
t.Errorf("%s: TNSData.Read mismatch:[\n%s\n]", tag, interleave(jsonPacket, jsonDecoded))
}
if len(reader.Data) > 0 {
t.Errorf("%s: TNSData.Read: %d bytes left over", tag, len(reader.Data))
}
}
}
var descriptorValues = map[string]Descriptor{
//"()": Descriptor{},
"(DESCRIPTION=(ERR=1153)(VSNNUM=186647040)(ERROR_STACK=(ERROR=(CODE=1153)(EMFI=4)(ARGS='()'))(ERROR=(CODE=303)(EMFI=1))))": Descriptor{
DescriptorEntry{"DESCRIPTION.ERR", "1153"},
DescriptorEntry{"DESCRIPTION.VSNNUM", "186647040"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "1153"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "4"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.ARGS", "'()'"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "303"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "1"},
},
"(DESCRIPTION=\n\t(ERR=1153)\n\t(VSNNUM=186647040)\n\t(ERROR_STACK=\n\t\t(ERROR=(CODE=1153)(EMFI=4)(ARGS='()'))\n\t\t(ERROR=(CODE=303)(EMFI=1))\n\t)\n)\n": Descriptor{
DescriptorEntry{"DESCRIPTION.ERR", "1153"},
DescriptorEntry{"DESCRIPTION.VSNNUM", "186647040"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "1153"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "4"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.ARGS", "'()'"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "303"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "1"},
},
" (DESCRIPTION=\r\n (ERR=1153)\r\n (VSNNUM=186647040)\r\n (ERROR_STACK=\r\n (ERROR=(CODE=1153)(EMFI=4)(ARGS='()'))\r\n (ERROR=(CODE=303)(EMFI=1))\r\n )\r\n) ": Descriptor{
DescriptorEntry{"DESCRIPTION.ERR", "1153"},
DescriptorEntry{"DESCRIPTION.VSNNUM", "186647040"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "1153"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "4"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.ARGS", "'()'"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "303"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "1"},
},
"(DESCRIPTION=(ERR=1153)(VSNNUM=186647040)(ERROR_STACK=(ERROR=(CODE=1153)(EMFI=4)(ARGS='(embedded \\'quotes\\')'))(ERROR=(CODE= \" (23) \" )(EMFI=1))))": Descriptor{
DescriptorEntry{"DESCRIPTION.ERR", "1153"},
DescriptorEntry{"DESCRIPTION.VSNNUM", "186647040"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "1153"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "4"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.ARGS", "'(embedded \\'quotes\\')'"},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.CODE", "\" (23) \""},
DescriptorEntry{"DESCRIPTION.ERROR_STACK.ERROR.EMFI", "1"},
},
"(DESCRIPTION=(CONNECT_DATA=(SERVICE_NAME=)(CID=(PROGRAM=C:\\Users\\localadmin\\work\\oracle\\instantclient_11_2\\sqlplus.exe)(HOST=win10pc)(USER=localadmin)))(ADDRESS=(PROTOCOL=TCP)(HOST=127.0.0.1)(PORT=1521)))": Descriptor{
DescriptorEntry{"DESCRIPTION.CONNECT_DATA.SERVICE_NAME", ""},
DescriptorEntry{"DESCRIPTION.CONNECT_DATA.CID.PROGRAM", "C:\\Users\\localadmin\\work\\oracle\\instantclient_11_2\\sqlplus.exe"},
DescriptorEntry{"DESCRIPTION.CONNECT_DATA.CID.HOST", "win10pc"},
DescriptorEntry{"DESCRIPTION.CONNECT_DATA.CID.USER", "localadmin"},
DescriptorEntry{"DESCRIPTION.ADDRESS.PROTOCOL", "TCP"},
DescriptorEntry{"DESCRIPTION.ADDRESS.HOST", "127.0.0.1"},
DescriptorEntry{"DESCRIPTION.ADDRESS.PORT", "1521"},
},
}
var descriptorGetValuesTests = map[string]map[string][]string{
"(A=(B=(C=ABC1)(C=ABC2)(D=ABD))(E=AE)(F=))": map[string][]string{
"A.B.C": []string{"ABC1", "ABC2"},
"A.B.D": []string{"ABD"},
"A.E": []string{"AE"},
"does.not.exist": []string{},
"A.F": []string{""},
},
"(A=(B=(C=ABC1)(D=ABD1))(B=(C=ABC2)(D=ABD2))(B=(E=ABE)(D=ABD3))(F=(G=(H=AFGH)))(I=)(I=iii)(I=)(I=))": map[string][]string{
"A.B.C": []string{"ABC1", "ABC2"},
"A.B.D": []string{"ABD1", "ABD2", "ABD3"},
"A.B.E": []string{"ABE"},
"A.F.G.H": []string{"AFGH"},
"does.not.exist": []string{},
"A.I": []string{"", "iii", "", ""},
},
}
func TestDescriptorGetValues(t *testing.T) {
for descriptor, keyToValues := range descriptorGetValuesTests {
parsed, err := DecodeDescriptor(descriptor)
if err != nil {
t.Fatalf("Unexpected Error parsing descriptor '%s': %v", descriptor, err)
}
for key, expected := range keyToValues {
actual := parsed.GetValues(key)
if !stringSlicesEqual(expected, actual) {
t.Errorf("Descriptor.GetValues(%s) mismatch: expected [ %s ], got [ %s ]", key, strings.Join(expected, ", "), strings.Join(actual, ", "))
}
}
}
}
type GetValueTestResult struct {
Value string
Error error
}
var descriptorGetValueTests = map[string]map[string]GetValueTestResult{
"(A=(B=(C=ABC1)(C=ABC2)(D=ABD))(E=AE)(F=))": map[string]GetValueTestResult{
"A.B.C": {Value: "", Error: ErrUnexpectedResponse},
"A.B.D": {Value: "ABD", Error: nil},
"A.E": {Value: "AE", Error: nil},
"does.not.exist": {Value: "", Error: ErrUnexpectedResponse},
"A.F": {Value: "", Error: nil},
},
"(A=(B=(C=ABC1)(D=ABD1))(B=(C=ABC2)(D=ABD2))(B=(E=ABE)(D=ABD3))(F=(G=(H=AFGH)))(I=)(I=))": map[string]GetValueTestResult{
"A.B.C": {Value: "", Error: ErrUnexpectedResponse},
"A.B.D": {Value: "", Error: ErrUnexpectedResponse},
"A.B.E": {Value: "ABE", Error: nil},
"A.F.G.H": {Value: "AFGH", Error: nil},
"does.not.exist": {Value: "", Error: ErrUnexpectedResponse},
"A.I": {Value: "", Error: ErrUnexpectedResponse},
},
}
func TestDescriptorGetValue(t *testing.T) {
for descriptor, keyToValue := range descriptorGetValueTests {
parsed, err := DecodeDescriptor(descriptor)
if err != nil {
t.Fatalf("Unexpected Error parsing descriptor '%s': %v", descriptor, err)
}
for key, expected := range keyToValue {
actual, err := parsed.GetValue(key)
if expected.Value != actual || expected.Error != err {
t.Errorf("Descriptor.GetValue(%s) mismatch: expected %s / %v, got %s / %v", key, expected.Value, expected.Error, actual, err)
}
}
}
}
func removeSpace(s string) string {
ret := strings.Replace(s, "\r", "", -1)
ret = strings.Replace(ret, "\n", "", -1)
ret = strings.Replace(ret, "\t", "", -1)
ret = strings.Replace(ret, " ", "", -1)
return ret
}
func stringSlicesEqual(lhs, rhs []string) bool {
if len(lhs) != len(rhs) {
return false
}
for i, l := range lhs {
r := rhs[i]
if l != r {
return false
}
}
return true
}
func TestDecodeDescriptor(t *testing.T) {
for descriptor, expected := range descriptorValues {
parsed, err := DecodeDescriptor(descriptor)
if err != nil {
t.Fatalf("Failed to parse [[%s]]: %v", descriptor, err)
}
jsonParsed := serialize(parsed)
jsonExpected := serialize(expected)
if !bytes.Equal(jsonParsed, jsonExpected) {
t.Errorf("Descriptor mismatch for [[%s]]:[\n%s\n]", descriptor, interleave(jsonExpected, jsonParsed))
}
for _, kvp := range expected {
evs := expected.GetValues(kvp.Key)
avs := parsed.GetValues(kvp.Key)
if !stringSlicesEqual(evs, avs) {
t.Errorf("Descriptor.GetValues(%s) mismatch: expected [ %s ], got [ %s ]", kvp.Key, strings.Join(evs, ", "), strings.Join(avs, ", "))
}
if len(evs) == 1 {
ev, err := expected.GetValue(kvp.Key)
if err != nil {
t.Fatalf("Expected.GetValue(%s) failed: %v", kvp.Key, err)
}
av, err := parsed.GetValue(kvp.Key)
if err != nil {
t.Fatalf("Parsed.GetValue(%s) failed: %v", kvp.Key, err)
}
if ev != av {
t.Errorf("Descriptor.GetValue(%s) mismatch: expected %s, got %s", kvp.Key, ev, av)
}
} else {
av, err := parsed.GetValue(kvp.Key)
if err == nil {
t.Errorf("Descriptor.GetValue(%s) did not return error for duplicated key: %s / %v", kvp.Key, av, err)
}
}
badKey := "key.that.definitely.does.not.exist.in.any.test.data"
av, err := parsed.GetValue(badKey)
if err == nil {
t.Errorf("Descriptor.GetValue(%s) did not return error for bad key: %s / %v", badKey, av, err)
}
avs = parsed.GetValues(badKey)
if len(avs) != 0 {
t.Errorf("Descriptor.GetValues(%s) returned non-empty list: %s", badKey, strings.Join(avs, ", "))
}
}
}
}
var releaseVersions = map[string]ReleaseVersion{
"1.2.3.4.5": ReleaseVersion(0x01230405),
"0.0.0.0.0": ReleaseVersion(0),
"255.15.15.255.255": ReleaseVersion(0xFFFFFFFF),
}
var badReleaseVersions = []string{
"",
"1",
"1.2",
"1.2.3",
"1.2.3.4",
"256.0.0.0.0",
"0.16.0.0.0",
"0.0.16.0.0",
"0.0.0.256.0",
"0.0.0.0.256",
"a.b.c.d.e",
"A.B.C.D.E",
"p.q.r.s.t",
}
func TestReleaseVersion(t *testing.T) {
expectedBytes := make([]byte, 4)
for stringValue, version := range releaseVersions {
actualString := version.String()
if stringValue != actualString {
t.Errorf("ReleaseVersion.String() failed: 0x%08x gave %s, expected %s", uint32(version), actualString, stringValue)
}
binary.BigEndian.PutUint32(expectedBytes, uint32(version))
actualBytes := version.Bytes()
if !bytes.Equal(expectedBytes, actualBytes) {
t.Errorf("ReleaseVersion.Bytes() failed: 0x%08x gave %v, expected %v", uint32(version), actualBytes, expectedBytes)
}
encoded, err := EncodeReleaseVersion(stringValue)
if err != nil {
t.Fatalf("EncodeReleaseVersion(%s) failed: %v", stringValue, err)
}
if encoded != version {
t.Errorf("EncodeReleaseVersion(%s) failed: got 0x%08x, expected 0x%08x", stringValue, uint32(encoded), uint32(version))
}
}
for _, bad := range badReleaseVersions {
if ret, err := EncodeReleaseVersion(bad); err == nil {
t.Errorf("Successfully encoded bad ReleaseVersion %s: 0x%08x", bad, uint32(ret))
}
}
}