2
0

node_test.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. package controller
  2. import (
  3. "net"
  4. "testing"
  5. "github.com/google/uuid"
  6. "github.com/gravitl/netmaker/logic"
  7. "github.com/gravitl/netmaker/logic/acls"
  8. "github.com/gravitl/netmaker/logic/acls/nodeacls"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/stretchr/testify/assert"
  11. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  12. )
  13. var nonLinuxHost models.Host
  14. var linuxHost models.Host
  15. func TestCreateEgressGateway(t *testing.T) {
  16. var gateway models.EgressGatewayRequest
  17. gateway.Ranges = []string{"10.100.100.0/24"}
  18. gateway.NetID = "skynet"
  19. deleteAllNetworks()
  20. createNet()
  21. t.Run("NoNodes", func(t *testing.T) {
  22. node, err := logic.CreateEgressGateway(gateway)
  23. assert.Equal(t, models.Node{}, node)
  24. assert.EqualError(t, err, "could not find any records")
  25. })
  26. t.Run("Non-linux node", func(t *testing.T) {
  27. createnode := createNodeWithParams("", "")
  28. createNodeHosts()
  29. createnode.HostID = nonLinuxHost.ID
  30. err := logic.AssociateNodeToHost(createnode, &nonLinuxHost)
  31. assert.Nil(t, err)
  32. gateway.NodeID = createnode.ID.String()
  33. node, err := logic.CreateEgressGateway(gateway)
  34. assert.Equal(t, models.Node{}, node)
  35. assert.EqualError(t, err, "windows is unsupported for egress gateways")
  36. })
  37. t.Run("Success-Nat-Enabled", func(t *testing.T) {
  38. deleteAllNodes()
  39. testnode := createTestNode()
  40. gateway.NodeID = testnode.ID.String()
  41. gateway.NatEnabled = "yes"
  42. node, err := logic.CreateEgressGateway(gateway)
  43. t.Log(node.EgressGatewayNatEnabled)
  44. assert.Nil(t, err)
  45. })
  46. t.Run("Success-Nat-Disabled", func(t *testing.T) {
  47. deleteAllNodes()
  48. testnode := createTestNode()
  49. gateway.NodeID = testnode.ID.String()
  50. gateway.NatEnabled = "no"
  51. node, err := logic.CreateEgressGateway(gateway)
  52. t.Log(node.EgressGatewayNatEnabled)
  53. assert.Nil(t, err)
  54. })
  55. t.Run("Success", func(t *testing.T) {
  56. var gateway models.EgressGatewayRequest
  57. gateway.Ranges = []string{"10.100.100.0/24"}
  58. gateway.NetID = "skynet"
  59. deleteAllNodes()
  60. testnode := createTestNode()
  61. gateway.NodeID = testnode.ID.String()
  62. node, err := logic.CreateEgressGateway(gateway)
  63. t.Log(node)
  64. assert.Nil(t, err)
  65. assert.Equal(t, true, node.IsEgressGateway)
  66. assert.Equal(t, gateway.Ranges, node.EgressGatewayRanges)
  67. })
  68. }
  69. func TestDeleteEgressGateway(t *testing.T) {
  70. var gateway models.EgressGatewayRequest
  71. deleteAllNetworks()
  72. createNet()
  73. testnode := createTestNode()
  74. gateway.Ranges = []string{"10.100.100.0/24"}
  75. gateway.NetID = "skynet"
  76. gateway.NodeID = testnode.ID.String()
  77. t.Run("Success", func(t *testing.T) {
  78. node, err := logic.CreateEgressGateway(gateway)
  79. assert.Nil(t, err)
  80. assert.Equal(t, true, node.IsEgressGateway)
  81. assert.Equal(t, []string{"10.100.100.0/24"}, node.EgressGatewayRanges)
  82. node, err = logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  83. assert.Nil(t, err)
  84. assert.Equal(t, false, node.IsEgressGateway)
  85. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  86. })
  87. t.Run("NotGateway", func(t *testing.T) {
  88. node, err := logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  89. assert.Nil(t, err)
  90. assert.Equal(t, false, node.IsEgressGateway)
  91. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  92. })
  93. t.Run("BadNode", func(t *testing.T) {
  94. node, err := logic.DeleteEgressGateway(gateway.NetID, "01:02:03")
  95. assert.EqualError(t, err, "no result found")
  96. assert.Equal(t, models.Node{}, node)
  97. deleteAllNodes()
  98. })
  99. }
  100. func TestGetNetworkNodes(t *testing.T) {
  101. deleteAllNetworks()
  102. createNet()
  103. t.Run("BadNet", func(t *testing.T) {
  104. node, err := logic.GetNetworkNodes("badnet")
  105. assert.Nil(t, err)
  106. assert.Equal(t, []models.Node{}, node)
  107. })
  108. t.Run("NoNodes", func(t *testing.T) {
  109. node, err := logic.GetNetworkNodes("skynet")
  110. assert.Nil(t, err)
  111. assert.Equal(t, []models.Node{}, node)
  112. })
  113. t.Run("Success", func(t *testing.T) {
  114. createTestNode()
  115. node, err := logic.GetNetworkNodes("skynet")
  116. assert.Nil(t, err)
  117. assert.NotEqual(t, []models.LegacyNode(nil), node)
  118. })
  119. }
  120. func TestValidateEgressGateway(t *testing.T) {
  121. var gateway models.EgressGatewayRequest
  122. t.Run("EmptyRange", func(t *testing.T) {
  123. gateway.Ranges = []string{}
  124. err := logic.ValidateEgressGateway(gateway)
  125. assert.EqualError(t, err, "IP Ranges Cannot Be Empty")
  126. })
  127. t.Run("Success", func(t *testing.T) {
  128. gateway.Ranges = []string{"10.100.100.0/24"}
  129. err := logic.ValidateEgressGateway(gateway)
  130. assert.Nil(t, err)
  131. })
  132. }
  133. func TestNodeACLs(t *testing.T) {
  134. deleteAllNodes()
  135. node1 := createNodeWithParams("", "10.0.0.50/32")
  136. node2 := createNodeWithParams("", "10.0.0.100/32")
  137. logic.AssociateNodeToHost(node1, &linuxHost)
  138. logic.AssociateNodeToHost(node2, &linuxHost)
  139. t.Run("acls not present", func(t *testing.T) {
  140. currentACL, err := nodeacls.FetchAllACLs(nodeacls.NetworkID(node1.Network))
  141. assert.Nil(t, err)
  142. assert.NotNil(t, currentACL)
  143. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  144. assert.Nil(t, err)
  145. assert.NotNil(t, node1ACL)
  146. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID.String())])
  147. })
  148. t.Run("node acls exists after creates", func(t *testing.T) {
  149. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  150. assert.Nil(t, err)
  151. assert.NotNil(t, node1ACL)
  152. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID.String()))
  153. assert.Nil(t, err)
  154. assert.NotNil(t, node2ACL)
  155. assert.Equal(t, acls.Allowed, node2ACL[acls.AclID(node1.ID.String())])
  156. })
  157. t.Run("node acls correct after fetch", func(t *testing.T) {
  158. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  159. assert.Nil(t, err)
  160. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID.String())])
  161. })
  162. t.Run("node acls correct after modify", func(t *testing.T) {
  163. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  164. assert.Nil(t, err)
  165. assert.NotNil(t, node1ACL)
  166. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID.String()))
  167. assert.Nil(t, err)
  168. assert.NotNil(t, node2ACL)
  169. currentACL, err := nodeacls.DisallowNodes(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()), nodeacls.NodeID(node2.ID.String()))
  170. assert.Nil(t, err)
  171. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node2.ID.String())])
  172. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID.String())][acls.AclID(node1.ID.String())])
  173. currentACL.Save(acls.ContainerID(node1.Network))
  174. })
  175. t.Run("node acls correct after add new node not allowed", func(t *testing.T) {
  176. node3 := createNodeWithParams("", "10.0.0.100/32")
  177. createNodeHosts()
  178. n, e := logic.GetNetwork(node3.Network)
  179. assert.Nil(t, e)
  180. n.DefaultACL = "no"
  181. e = logic.SaveNetwork(&n)
  182. assert.Nil(t, e)
  183. err := logic.AssociateNodeToHost(node3, &linuxHost)
  184. assert.Nil(t, err)
  185. currentACL, err := nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  186. assert.Nil(t, err)
  187. assert.NotNil(t, currentACL)
  188. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node3.ID.String())])
  189. nodeACL, err := nodeacls.CreateNodeACL(nodeacls.NetworkID(node3.Network), nodeacls.NodeID(node3.ID.String()), acls.NotAllowed)
  190. assert.Nil(t, err)
  191. nodeACL.Save(acls.ContainerID(node3.Network), acls.AclID(node3.ID.String()))
  192. currentACL, err = nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  193. assert.Nil(t, err)
  194. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node3.ID.String())])
  195. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID.String())][acls.AclID(node3.ID.String())])
  196. })
  197. t.Run("node acls removed", func(t *testing.T) {
  198. retNetworkACL, err := nodeacls.RemoveNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  199. assert.Nil(t, err)
  200. assert.NotNil(t, retNetworkACL)
  201. assert.Equal(t, acls.NotPresent, retNetworkACL[acls.AclID(node2.ID.String())][acls.AclID(node1.ID.String())])
  202. })
  203. deleteAllNodes()
  204. }
  205. func deleteAllNodes() {
  206. nodes, _ := logic.GetAllNodes()
  207. for _, n := range nodes {
  208. logic.DeleteNode(&n, true)
  209. }
  210. }
  211. func createTestNode() *models.Node {
  212. createNodeHosts()
  213. n := createNodeWithParams("skynet", "")
  214. _ = logic.AssociateNodeToHost(n, &linuxHost)
  215. return n
  216. }
  217. func createNodeWithParams(network, address string) *models.Node {
  218. _, ipnet, _ := net.ParseCIDR("10.0.0.1/32")
  219. tmpCNode := models.CommonNode{
  220. ID: uuid.New(),
  221. Network: "skynet",
  222. Address: *ipnet,
  223. DNSOn: true,
  224. }
  225. if len(network) > 0 {
  226. tmpCNode.Network = network
  227. }
  228. if len(address) > 0 {
  229. _, ipnet2, _ := net.ParseCIDR(address)
  230. tmpCNode.Address = *ipnet2
  231. }
  232. createnode := models.Node{
  233. CommonNode: tmpCNode,
  234. }
  235. return &createnode
  236. }
  237. func createNodeHosts() {
  238. k, _ := wgtypes.ParseKey("DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=")
  239. linuxHost = models.Host{
  240. ID: uuid.New(),
  241. PublicKey: k.PublicKey(),
  242. HostPass: "password",
  243. OS: "linux",
  244. Name: "linuxhost",
  245. }
  246. _ = logic.CreateHost(&linuxHost)
  247. nonLinuxHost = models.Host{
  248. ID: uuid.New(),
  249. OS: "windows",
  250. PublicKey: k.PublicKey(),
  251. Name: "windowshost",
  252. HostPass: "password",
  253. }
  254. _ = logic.CreateHost(&nonLinuxHost)
  255. }