route_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. package overlay
  2. import (
  3. "fmt"
  4. "net"
  5. "testing"
  6. "github.com/slackhq/nebula/config"
  7. "github.com/slackhq/nebula/iputil"
  8. "github.com/slackhq/nebula/test"
  9. "github.com/stretchr/testify/assert"
  10. )
  11. func Test_parseRoutes(t *testing.T) {
  12. l := test.NewLogger()
  13. c := config.NewC(l)
  14. _, n, _ := net.ParseCIDR("10.0.0.0/24")
  15. // test no routes config
  16. routes, err := parseRoutes(c, n)
  17. assert.Nil(t, err)
  18. assert.Len(t, routes, 0)
  19. // not an array
  20. c.Settings["tun"] = map[interface{}]interface{}{"routes": "hi"}
  21. routes, err = parseRoutes(c, n)
  22. assert.Nil(t, routes)
  23. assert.EqualError(t, err, "tun.routes is not an array")
  24. // no routes
  25. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{}}
  26. routes, err = parseRoutes(c, n)
  27. assert.Nil(t, err)
  28. assert.Len(t, routes, 0)
  29. // weird route
  30. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{"asdf"}}
  31. routes, err = parseRoutes(c, n)
  32. assert.Nil(t, routes)
  33. assert.EqualError(t, err, "entry 1 in tun.routes is invalid")
  34. // no mtu
  35. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{}}}
  36. routes, err = parseRoutes(c, n)
  37. assert.Nil(t, routes)
  38. assert.EqualError(t, err, "entry 1.mtu in tun.routes is not present")
  39. // bad mtu
  40. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "nope"}}}
  41. routes, err = parseRoutes(c, n)
  42. assert.Nil(t, routes)
  43. assert.EqualError(t, err, "entry 1.mtu in tun.routes is not an integer: strconv.Atoi: parsing \"nope\": invalid syntax")
  44. // low mtu
  45. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "499"}}}
  46. routes, err = parseRoutes(c, n)
  47. assert.Nil(t, routes)
  48. assert.EqualError(t, err, "entry 1.mtu in tun.routes is below 500: 499")
  49. // missing route
  50. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "500"}}}
  51. routes, err = parseRoutes(c, n)
  52. assert.Nil(t, routes)
  53. assert.EqualError(t, err, "entry 1.route in tun.routes is not present")
  54. // unparsable route
  55. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "500", "route": "nope"}}}
  56. routes, err = parseRoutes(c, n)
  57. assert.Nil(t, routes)
  58. assert.EqualError(t, err, "entry 1.route in tun.routes failed to parse: invalid CIDR address: nope")
  59. // below network range
  60. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "500", "route": "1.0.0.0/8"}}}
  61. routes, err = parseRoutes(c, n)
  62. assert.Nil(t, routes)
  63. assert.EqualError(t, err, "entry 1.route in tun.routes is not contained within the network attached to the certificate; route: 1.0.0.0/8, network: 10.0.0.0/24")
  64. // above network range
  65. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{map[interface{}]interface{}{"mtu": "500", "route": "10.0.1.0/24"}}}
  66. routes, err = parseRoutes(c, n)
  67. assert.Nil(t, routes)
  68. assert.EqualError(t, err, "entry 1.route in tun.routes is not contained within the network attached to the certificate; route: 10.0.1.0/24, network: 10.0.0.0/24")
  69. // happy case
  70. c.Settings["tun"] = map[interface{}]interface{}{"routes": []interface{}{
  71. map[interface{}]interface{}{"mtu": "9000", "route": "10.0.0.0/29"},
  72. map[interface{}]interface{}{"mtu": "8000", "route": "10.0.0.1/32"},
  73. }}
  74. routes, err = parseRoutes(c, n)
  75. assert.Nil(t, err)
  76. assert.Len(t, routes, 2)
  77. tested := 0
  78. for _, r := range routes {
  79. assert.True(t, r.Install)
  80. if r.MTU == 8000 {
  81. assert.Equal(t, "10.0.0.1/32", r.Cidr.String())
  82. tested++
  83. } else {
  84. assert.Equal(t, 9000, r.MTU)
  85. assert.Equal(t, "10.0.0.0/29", r.Cidr.String())
  86. tested++
  87. }
  88. }
  89. if tested != 2 {
  90. t.Fatal("Did not see both routes")
  91. }
  92. }
  93. func Test_parseUnsafeRoutes(t *testing.T) {
  94. l := test.NewLogger()
  95. c := config.NewC(l)
  96. _, n, _ := net.ParseCIDR("10.0.0.0/24")
  97. // test no routes config
  98. routes, err := parseUnsafeRoutes(c, n)
  99. assert.Nil(t, err)
  100. assert.Len(t, routes, 0)
  101. // not an array
  102. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": "hi"}
  103. routes, err = parseUnsafeRoutes(c, n)
  104. assert.Nil(t, routes)
  105. assert.EqualError(t, err, "tun.unsafe_routes is not an array")
  106. // no routes
  107. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{}}
  108. routes, err = parseUnsafeRoutes(c, n)
  109. assert.Nil(t, err)
  110. assert.Len(t, routes, 0)
  111. // weird route
  112. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{"asdf"}}
  113. routes, err = parseUnsafeRoutes(c, n)
  114. assert.Nil(t, routes)
  115. assert.EqualError(t, err, "entry 1 in tun.unsafe_routes is invalid")
  116. // no via
  117. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{}}}
  118. routes, err = parseUnsafeRoutes(c, n)
  119. assert.Nil(t, routes)
  120. assert.EqualError(t, err, "entry 1.via in tun.unsafe_routes is not present")
  121. // invalid via
  122. for _, invalidValue := range []interface{}{
  123. 127, false, nil, 1.0, []string{"1", "2"},
  124. } {
  125. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": invalidValue}}}
  126. routes, err = parseUnsafeRoutes(c, n)
  127. assert.Nil(t, routes)
  128. assert.EqualError(t, err, fmt.Sprintf("entry 1.via in tun.unsafe_routes is not a string: found %T", invalidValue))
  129. }
  130. // unparsable via
  131. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"mtu": "500", "via": "nope"}}}
  132. routes, err = parseUnsafeRoutes(c, n)
  133. assert.Nil(t, routes)
  134. assert.EqualError(t, err, "entry 1.via in tun.unsafe_routes failed to parse address: nope")
  135. // missing route
  136. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "500"}}}
  137. routes, err = parseUnsafeRoutes(c, n)
  138. assert.Nil(t, routes)
  139. assert.EqualError(t, err, "entry 1.route in tun.unsafe_routes is not present")
  140. // unparsable route
  141. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "500", "route": "nope"}}}
  142. routes, err = parseUnsafeRoutes(c, n)
  143. assert.Nil(t, routes)
  144. assert.EqualError(t, err, "entry 1.route in tun.unsafe_routes failed to parse: invalid CIDR address: nope")
  145. // within network range
  146. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "route": "10.0.0.0/24"}}}
  147. routes, err = parseUnsafeRoutes(c, n)
  148. assert.Nil(t, routes)
  149. assert.EqualError(t, err, "entry 1.route in tun.unsafe_routes is contained within the network attached to the certificate; route: 10.0.0.0/24, network: 10.0.0.0/24")
  150. // below network range
  151. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "route": "1.0.0.0/8"}}}
  152. routes, err = parseUnsafeRoutes(c, n)
  153. assert.Len(t, routes, 1)
  154. assert.Nil(t, err)
  155. // above network range
  156. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "route": "10.0.1.0/24"}}}
  157. routes, err = parseUnsafeRoutes(c, n)
  158. assert.Len(t, routes, 1)
  159. assert.Nil(t, err)
  160. // no mtu
  161. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "route": "1.0.0.0/8"}}}
  162. routes, err = parseUnsafeRoutes(c, n)
  163. assert.Len(t, routes, 1)
  164. assert.Equal(t, 0, routes[0].MTU)
  165. // bad mtu
  166. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "nope"}}}
  167. routes, err = parseUnsafeRoutes(c, n)
  168. assert.Nil(t, routes)
  169. assert.EqualError(t, err, "entry 1.mtu in tun.unsafe_routes is not an integer: strconv.Atoi: parsing \"nope\": invalid syntax")
  170. // low mtu
  171. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "499"}}}
  172. routes, err = parseUnsafeRoutes(c, n)
  173. assert.Nil(t, routes)
  174. assert.EqualError(t, err, "entry 1.mtu in tun.unsafe_routes is below 500: 499")
  175. // bad install
  176. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "9000", "route": "1.0.0.0/29", "install": "nope"}}}
  177. routes, err = parseUnsafeRoutes(c, n)
  178. assert.Nil(t, routes)
  179. assert.EqualError(t, err, "entry 1.install in tun.unsafe_routes is not a boolean: strconv.ParseBool: parsing \"nope\": invalid syntax")
  180. // happy case
  181. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{
  182. map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "9000", "route": "1.0.0.0/29", "install": "t"},
  183. map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "8000", "route": "1.0.0.1/32", "install": 0},
  184. map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "1500", "metric": 1234, "route": "1.0.0.2/32", "install": 1},
  185. map[interface{}]interface{}{"via": "127.0.0.1", "mtu": "1500", "metric": 1234, "route": "1.0.0.2/32"},
  186. }}
  187. routes, err = parseUnsafeRoutes(c, n)
  188. assert.Nil(t, err)
  189. assert.Len(t, routes, 4)
  190. tested := 0
  191. for _, r := range routes {
  192. if r.MTU == 8000 {
  193. assert.Equal(t, "1.0.0.1/32", r.Cidr.String())
  194. assert.False(t, r.Install)
  195. tested++
  196. } else if r.MTU == 9000 {
  197. assert.Equal(t, 9000, r.MTU)
  198. assert.Equal(t, "1.0.0.0/29", r.Cidr.String())
  199. assert.True(t, r.Install)
  200. tested++
  201. } else {
  202. assert.Equal(t, 1500, r.MTU)
  203. assert.Equal(t, 1234, r.Metric)
  204. assert.Equal(t, "1.0.0.2/32", r.Cidr.String())
  205. assert.True(t, r.Install)
  206. tested++
  207. }
  208. }
  209. if tested != 4 {
  210. t.Fatal("Did not see all unsafe_routes")
  211. }
  212. }
  213. func Test_makeRouteTree(t *testing.T) {
  214. l := test.NewLogger()
  215. c := config.NewC(l)
  216. _, n, _ := net.ParseCIDR("10.0.0.0/24")
  217. c.Settings["tun"] = map[interface{}]interface{}{"unsafe_routes": []interface{}{
  218. map[interface{}]interface{}{"via": "192.168.0.1", "route": "1.0.0.0/28"},
  219. map[interface{}]interface{}{"via": "192.168.0.2", "route": "1.0.0.1/32"},
  220. }}
  221. routes, err := parseUnsafeRoutes(c, n)
  222. assert.NoError(t, err)
  223. assert.Len(t, routes, 2)
  224. routeTree, err := makeRouteTree(l, routes, true)
  225. assert.NoError(t, err)
  226. ip := iputil.Ip2VpnIp(net.ParseIP("1.0.0.2"))
  227. ok, r := routeTree.MostSpecificContains(ip)
  228. assert.True(t, ok)
  229. assert.Equal(t, iputil.Ip2VpnIp(net.ParseIP("192.168.0.1")), r)
  230. ip = iputil.Ip2VpnIp(net.ParseIP("1.0.0.1"))
  231. ok, r = routeTree.MostSpecificContains(ip)
  232. assert.True(t, ok)
  233. assert.Equal(t, iputil.Ip2VpnIp(net.ParseIP("192.168.0.2")), r)
  234. ip = iputil.Ip2VpnIp(net.ParseIP("1.1.0.1"))
  235. ok, r = routeTree.MostSpecificContains(ip)
  236. assert.False(t, ok)
  237. }