123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121 |
- package nebula
- import (
- "net"
- "net/netip"
- "reflect"
- "testing"
- "github.com/sirupsen/logrus"
- "github.com/slackhq/nebula/cert"
- "github.com/slackhq/nebula/test"
- "github.com/stretchr/testify/assert"
- )
- func TestControl_GetHostInfoByVpnIp(t *testing.T) {
- //TODO: CERT-V2 with multiple certificate versions we have a problem with this test
- // Some certs versions have different characteristics and each version implements their own Copy() func
- // which means this is not a good place to test for exposing memory
- l := test.NewLogger()
- // Special care must be taken to re-use all objects provided to the hostmap and certificate in the expectedInfo object
- // To properly ensure we are not exposing core memory to the caller
- hm := newHostMap(l)
- hm.preferredRanges.Store(&[]netip.Prefix{})
- remote1 := netip.MustParseAddrPort("0.0.0.100:4444")
- remote2 := netip.MustParseAddrPort("[1:2:3:4:5:6:7:8]:4444")
- ipNet := net.IPNet{
- IP: remote1.Addr().AsSlice(),
- Mask: net.IPMask{255, 255, 255, 0},
- }
- ipNet2 := net.IPNet{
- IP: remote2.Addr().AsSlice(),
- Mask: net.IPMask{255, 255, 255, 0},
- }
- remotes := NewRemoteList([]netip.Addr{netip.IPv4Unspecified()}, nil)
- remotes.unlockedPrependV4(netip.IPv4Unspecified(), netAddrToProtoV4AddrPort(remote1.Addr(), remote1.Port()))
- remotes.unlockedPrependV6(netip.IPv4Unspecified(), netAddrToProtoV6AddrPort(remote2.Addr(), remote2.Port()))
- vpnIp, ok := netip.AddrFromSlice(ipNet.IP)
- assert.True(t, ok)
- crt := &dummyCert{}
- hm.unlockedAddHostInfo(&HostInfo{
- remote: remote1,
- remotes: remotes,
- ConnectionState: &ConnectionState{
- peerCert: &cert.CachedCertificate{Certificate: crt},
- },
- remoteIndexId: 200,
- localIndexId: 201,
- vpnAddrs: []netip.Addr{vpnIp},
- relayState: RelayState{
- relays: nil,
- relayForByAddr: map[netip.Addr]*Relay{},
- relayForByIdx: map[uint32]*Relay{},
- },
- }, &Interface{})
- vpnIp2, ok := netip.AddrFromSlice(ipNet2.IP)
- assert.True(t, ok)
- hm.unlockedAddHostInfo(&HostInfo{
- remote: remote1,
- remotes: remotes,
- ConnectionState: &ConnectionState{
- peerCert: nil,
- },
- remoteIndexId: 200,
- localIndexId: 201,
- vpnAddrs: []netip.Addr{vpnIp2},
- relayState: RelayState{
- relays: nil,
- relayForByAddr: map[netip.Addr]*Relay{},
- relayForByIdx: map[uint32]*Relay{},
- },
- }, &Interface{})
- c := Control{
- f: &Interface{
- hostMap: hm,
- },
- l: logrus.New(),
- }
- thi := c.GetHostInfoByVpnAddr(vpnIp, false)
- expectedInfo := ControlHostInfo{
- VpnAddrs: []netip.Addr{vpnIp},
- LocalIndex: 201,
- RemoteIndex: 200,
- RemoteAddrs: []netip.AddrPort{remote2, remote1},
- Cert: crt.Copy(),
- MessageCounter: 0,
- CurrentRemote: remote1,
- CurrentRelaysToMe: []netip.Addr{},
- CurrentRelaysThroughMe: []netip.Addr{},
- }
- // Make sure we don't have any unexpected fields
- assertFields(t, []string{"VpnAddrs", "LocalIndex", "RemoteIndex", "RemoteAddrs", "Cert", "MessageCounter", "CurrentRemote", "CurrentRelaysToMe", "CurrentRelaysThroughMe"}, thi)
- assert.Equal(t, &expectedInfo, thi)
- test.AssertDeepCopyEqual(t, &expectedInfo, thi)
- // Make sure we don't panic if the host info doesn't have a cert yet
- assert.NotPanics(t, func() {
- thi = c.GetHostInfoByVpnAddr(vpnIp2, false)
- })
- }
- func assertFields(t *testing.T, expected []string, actualStruct any) {
- val := reflect.ValueOf(actualStruct).Elem()
- fields := make([]string, val.NumField())
- for i := 0; i < val.NumField(); i++ {
- fields[i] = val.Type().Field(i).Name
- }
- assert.Equal(t, expected, fields)
- }
|