node_test.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. package controller
  2. import (
  3. "testing"
  4. "github.com/gravitl/netmaker/database"
  5. "github.com/gravitl/netmaker/logic"
  6. "github.com/gravitl/netmaker/logic/acls"
  7. "github.com/gravitl/netmaker/logic/acls/nodeacls"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/stretchr/testify/assert"
  10. )
  11. func TestCreateEgressGateway(t *testing.T) {
  12. var gateway models.EgressGatewayRequest
  13. gateway.Interface = "eth0"
  14. gateway.Ranges = []string{"10.100.100.0/24"}
  15. gateway.NetID = "skynet"
  16. database.InitializeDatabase()
  17. deleteAllNetworks()
  18. createNet()
  19. t.Run("NoNodes", func(t *testing.T) {
  20. node, err := logic.CreateEgressGateway(gateway)
  21. assert.Equal(t, models.Node{}, node)
  22. assert.EqualError(t, err, "could not find any records")
  23. })
  24. t.Run("Non-linux node", func(t *testing.T) {
  25. createnode := models.Node{PublicKey: "DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=", Name: "testnode", Endpoint: "10.0.0.1", MacAddress: "01:02:03:04:05:06", Password: "password", Network: "skynet", OS: "windows"}
  26. err := logic.CreateNode(&createnode)
  27. assert.Nil(t, err)
  28. gateway.NodeID = createnode.ID
  29. node, err := logic.CreateEgressGateway(gateway)
  30. assert.Equal(t, models.Node{}, node)
  31. assert.EqualError(t, err, "windows is unsupported for egress gateways")
  32. })
  33. t.Run("Success-Nat-Enabled", func(t *testing.T) {
  34. deleteAllNodes()
  35. testnode := createTestNode()
  36. gateway.NodeID = testnode.ID
  37. gateway.NatEnabled = "yes"
  38. node, err := logic.CreateEgressGateway(gateway)
  39. t.Log(node.EgressGatewayNatEnabled)
  40. t.Log(node.PostUp)
  41. t.Log(node.PostDown)
  42. assert.Nil(t, err)
  43. assert.Contains(t, node.PostUp, "-j MASQUERADE")
  44. assert.Contains(t, node.PostDown, "-j MASQUERADE")
  45. })
  46. t.Run("Success-Nat-Disabled", func(t *testing.T) {
  47. deleteAllNodes()
  48. testnode := createTestNode()
  49. gateway.NodeID = testnode.ID
  50. gateway.NatEnabled = "no"
  51. node, err := logic.CreateEgressGateway(gateway)
  52. t.Log(node.EgressGatewayNatEnabled)
  53. t.Log(node.PostUp)
  54. t.Log(node.PostDown)
  55. assert.Nil(t, err)
  56. assert.NotContains(t, node.PostUp, "-j MASUERADE")
  57. assert.NotContains(t, node.PostDown, "-j MASUERADE")
  58. })
  59. t.Run("Success", func(t *testing.T) {
  60. var gateway models.EgressGatewayRequest
  61. gateway.Interface = "eth0"
  62. gateway.Ranges = []string{"10.100.100.0/24"}
  63. gateway.NetID = "skynet"
  64. deleteAllNodes()
  65. testnode := createTestNode()
  66. gateway.NodeID = testnode.ID
  67. node, err := logic.CreateEgressGateway(gateway)
  68. t.Log(node)
  69. assert.Nil(t, err)
  70. assert.Contains(t, node.PostUp, "-j MASQUERADE")
  71. assert.Contains(t, node.PostDown, "-j MASQUERADE")
  72. assert.Equal(t, "yes", node.IsEgressGateway)
  73. assert.Equal(t, gateway.Ranges, node.EgressGatewayRanges)
  74. })
  75. }
  76. func TestDeleteEgressGateway(t *testing.T) {
  77. var gateway models.EgressGatewayRequest
  78. database.InitializeDatabase()
  79. deleteAllNetworks()
  80. createNet()
  81. testnode := createTestNode()
  82. gateway.Interface = "eth0"
  83. gateway.Ranges = []string{"10.100.100.0/24"}
  84. gateway.NetID = "skynet"
  85. gateway.NodeID = testnode.ID
  86. t.Run("Success", func(t *testing.T) {
  87. node, err := logic.CreateEgressGateway(gateway)
  88. assert.Nil(t, err)
  89. assert.Equal(t, "yes", node.IsEgressGateway)
  90. assert.Equal(t, []string{"10.100.100.0/24"}, node.EgressGatewayRanges)
  91. node, err = logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  92. assert.Nil(t, err)
  93. assert.Equal(t, "no", node.IsEgressGateway)
  94. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  95. assert.Equal(t, "", node.PostUp)
  96. assert.Equal(t, "", node.PostDown)
  97. })
  98. t.Run("NotGateway", func(t *testing.T) {
  99. node, err := logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  100. assert.Nil(t, err)
  101. assert.Equal(t, "no", node.IsEgressGateway)
  102. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  103. assert.Equal(t, "", node.PostUp)
  104. assert.Equal(t, "", node.PostDown)
  105. })
  106. t.Run("BadNode", func(t *testing.T) {
  107. node, err := logic.DeleteEgressGateway(gateway.NetID, "01:02:03")
  108. assert.EqualError(t, err, "no result found")
  109. assert.Equal(t, models.Node{}, node)
  110. deleteAllNodes()
  111. })
  112. }
  113. func TestGetNetworkNodes(t *testing.T) {
  114. database.InitializeDatabase()
  115. deleteAllNetworks()
  116. createNet()
  117. t.Run("BadNet", func(t *testing.T) {
  118. node, err := logic.GetNetworkNodes("badnet")
  119. assert.Nil(t, err)
  120. assert.Nil(t, node)
  121. })
  122. t.Run("NoNodes", func(t *testing.T) {
  123. node, err := logic.GetNetworkNodes("skynet")
  124. assert.Nil(t, err)
  125. assert.Nil(t, node)
  126. })
  127. t.Run("Success", func(t *testing.T) {
  128. createTestNode()
  129. node, err := logic.GetNetworkNodes("skynet")
  130. assert.Nil(t, err)
  131. assert.NotEqual(t, []models.Node(nil), node)
  132. })
  133. }
  134. func TestUncordonNode(t *testing.T) {
  135. database.InitializeDatabase()
  136. deleteAllNetworks()
  137. createNet()
  138. node := createTestNode()
  139. t.Run("BadID", func(t *testing.T) {
  140. resp, err := logic.UncordonNode("blahblah")
  141. assert.Equal(t, models.Node{}, resp)
  142. assert.EqualError(t, err, "no result found")
  143. })
  144. t.Run("Success", func(t *testing.T) {
  145. resp, err := logic.UncordonNode(node.ID)
  146. assert.Nil(t, err)
  147. assert.Equal(t, "no", resp.IsPending)
  148. })
  149. }
  150. func TestValidateEgressGateway(t *testing.T) {
  151. var gateway models.EgressGatewayRequest
  152. t.Run("EmptyRange", func(t *testing.T) {
  153. gateway.Interface = "eth0"
  154. gateway.Ranges = []string{}
  155. err := logic.ValidateEgressGateway(gateway)
  156. assert.EqualError(t, err, "IP Ranges Cannot Be Empty")
  157. })
  158. t.Run("EmptyInterface", func(t *testing.T) {
  159. gateway.Interface = ""
  160. err := logic.ValidateEgressGateway(gateway)
  161. assert.NotNil(t, err)
  162. assert.Equal(t, "interface cannot be empty", err.Error())
  163. })
  164. t.Run("Success", func(t *testing.T) {
  165. gateway.Interface = "eth0"
  166. gateway.Ranges = []string{"10.100.100.0/24"}
  167. err := logic.ValidateEgressGateway(gateway)
  168. assert.Nil(t, err)
  169. })
  170. }
  171. func TestNodeACLs(t *testing.T) {
  172. deleteAllNodes()
  173. node1 := models.Node{PublicKey: "DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=", Name: "testnode", Endpoint: "10.0.0.50", MacAddress: "01:02:03:04:05:06", Password: "password", Network: "skynet", OS: "linux"}
  174. node2 := models.Node{PublicKey: "DM5qhLAE20FG7BbfBCger+Ac9D2NDOwCtY1rbYDXf14=", Name: "testnode", Endpoint: "10.0.0.100", MacAddress: "01:02:03:04:05:07", Password: "password", Network: "skynet", OS: "linux"}
  175. logic.CreateNode(&node1)
  176. logic.CreateNode(&node2)
  177. t.Run("acls not present", func(t *testing.T) {
  178. currentACL, err := nodeacls.FetchAllACLs(nodeacls.NetworkID(node1.Network))
  179. assert.Nil(t, err)
  180. assert.NotNil(t, currentACL)
  181. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID))
  182. assert.Nil(t, err)
  183. assert.NotNil(t, node1ACL)
  184. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID)])
  185. })
  186. t.Run("node acls exists after creates", func(t *testing.T) {
  187. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID))
  188. assert.Nil(t, err)
  189. assert.NotNil(t, node1ACL)
  190. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID))
  191. assert.Nil(t, err)
  192. assert.NotNil(t, node2ACL)
  193. assert.Equal(t, acls.Allowed, node2ACL[acls.AclID(node1.ID)])
  194. })
  195. t.Run("node acls correct after fetch", func(t *testing.T) {
  196. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID))
  197. assert.Nil(t, err)
  198. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID)])
  199. })
  200. t.Run("node acls correct after modify", func(t *testing.T) {
  201. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID))
  202. assert.Nil(t, err)
  203. assert.NotNil(t, node1ACL)
  204. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID))
  205. assert.Nil(t, err)
  206. assert.NotNil(t, node2ACL)
  207. currentACL, err := nodeacls.DisallowNodes(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID), nodeacls.NodeID(node2.ID))
  208. assert.Nil(t, err)
  209. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID)][acls.AclID(node2.ID)])
  210. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID)][acls.AclID(node1.ID)])
  211. currentACL.Save(acls.ContainerID(node1.Network))
  212. })
  213. t.Run("node acls correct after add new node not allowed", func(t *testing.T) {
  214. node3 := models.Node{PublicKey: "this-is-not-valid", Name: "testnode3", Endpoint: "10.0.0.100", MacAddress: "01:02:03:04:05:07", Password: "password", Network: "skynet", OS: "linux"}
  215. logic.CreateNode(&node3)
  216. var currentACL, err = nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  217. assert.Nil(t, err)
  218. assert.NotNil(t, currentACL)
  219. assert.Equal(t, acls.NotPresent, currentACL[acls.AclID(node1.ID)][acls.AclID(node3.ID)])
  220. nodeACL, err := nodeacls.CreateNodeACL(nodeacls.NetworkID(node3.Network), nodeacls.NodeID(node3.ID), acls.NotAllowed)
  221. assert.Nil(t, err)
  222. nodeACL.Save(acls.ContainerID(node3.Network), acls.AclID(node3.ID))
  223. currentACL, err = nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  224. assert.Nil(t, err)
  225. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID)][acls.AclID(node3.ID)])
  226. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID)][acls.AclID(node3.ID)])
  227. })
  228. t.Run("node acls removed", func(t *testing.T) {
  229. retNetworkACL, err := nodeacls.RemoveNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID))
  230. assert.Nil(t, err)
  231. assert.NotNil(t, retNetworkACL)
  232. assert.Equal(t, acls.NotPresent, retNetworkACL[acls.AclID(node2.ID)][acls.AclID(node1.ID)])
  233. })
  234. deleteAllNodes()
  235. }
  236. func deleteAllNodes() {
  237. database.DeleteAllRecords(database.NODES_TABLE_NAME)
  238. }
  239. func createTestNode() *models.Node {
  240. createnode := models.Node{PublicKey: "DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=", Name: "testnode", Endpoint: "10.0.0.1", MacAddress: "01:02:03:04:05:06", Password: "password", Network: "skynet", OS: "linux"}
  241. logic.CreateNode(&createnode)
  242. return &createnode
  243. }