node_test.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. package controller
  2. import (
  3. "net"
  4. "testing"
  5. "github.com/google/uuid"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/logic/acls"
  9. "github.com/gravitl/netmaker/logic/acls/nodeacls"
  10. "github.com/gravitl/netmaker/models"
  11. "github.com/gravitl/netmaker/servercfg"
  12. "github.com/stretchr/testify/assert"
  13. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  14. )
  15. var nonLinuxHost models.Host
  16. var linuxHost models.Host
  17. func TestCreateEgressGateway(t *testing.T) {
  18. var gateway models.EgressGatewayRequest
  19. gateway.Ranges = []string{"10.100.100.0/24"}
  20. gateway.RangesWithMetric = append(gateway.RangesWithMetric, models.EgressRangeMetric{
  21. Network: "10.100.100.0/24",
  22. RouteMetric: 256,
  23. })
  24. gateway.NetID = "skynet"
  25. deleteAllNetworks()
  26. createNet()
  27. t.Run("NoNodes", func(t *testing.T) {
  28. node, err := logic.CreateEgressGateway(gateway)
  29. assert.Equal(t, models.Node{}, node)
  30. assert.EqualError(t, err, "could not find any records")
  31. })
  32. t.Run("Non-linux node", func(t *testing.T) {
  33. createnode := createNodeWithParams("", "")
  34. createNodeHosts()
  35. createnode.HostID = nonLinuxHost.ID
  36. err := logic.AssociateNodeToHost(createnode, &nonLinuxHost)
  37. assert.Nil(t, err)
  38. gateway.NodeID = createnode.ID.String()
  39. node, err := logic.CreateEgressGateway(gateway)
  40. assert.Equal(t, models.Node{}, node)
  41. assert.EqualError(t, err, "windows is unsupported for egress gateways")
  42. })
  43. t.Run("Success-Nat-Enabled", func(t *testing.T) {
  44. deleteAllNodes()
  45. testnode := createTestNode()
  46. gateway.NodeID = testnode.ID.String()
  47. gateway.NatEnabled = "yes"
  48. node, err := logic.CreateEgressGateway(gateway)
  49. t.Log(node.EgressGatewayNatEnabled)
  50. assert.Nil(t, err)
  51. })
  52. t.Run("Success-Nat-Disabled", func(t *testing.T) {
  53. deleteAllNodes()
  54. testnode := createTestNode()
  55. gateway.NodeID = testnode.ID.String()
  56. gateway.NatEnabled = "no"
  57. node, err := logic.CreateEgressGateway(gateway)
  58. t.Log(node.EgressGatewayNatEnabled)
  59. assert.Nil(t, err)
  60. })
  61. t.Run("Success", func(t *testing.T) {
  62. var gateway models.EgressGatewayRequest
  63. gateway.Ranges = []string{"10.100.100.0/24"}
  64. gateway.NetID = "skynet"
  65. deleteAllNodes()
  66. testnode := createTestNode()
  67. gateway.NodeID = testnode.ID.String()
  68. node, err := logic.CreateEgressGateway(gateway)
  69. t.Log(node)
  70. assert.Nil(t, err)
  71. assert.Equal(t, true, node.IsEgressGateway)
  72. assert.Equal(t, gateway.Ranges, node.EgressGatewayRanges)
  73. })
  74. }
  75. func TestDeleteEgressGateway(t *testing.T) {
  76. var gateway models.EgressGatewayRequest
  77. deleteAllNetworks()
  78. createNet()
  79. testnode := createTestNode()
  80. gateway.Ranges = []string{"10.100.100.0/24"}
  81. gateway.NetID = "skynet"
  82. gateway.NodeID = testnode.ID.String()
  83. t.Run("Success", func(t *testing.T) {
  84. node, err := logic.CreateEgressGateway(gateway)
  85. assert.Nil(t, err)
  86. assert.Equal(t, true, node.IsEgressGateway)
  87. assert.Equal(t, []string{"10.100.100.0/24"}, node.EgressGatewayRanges)
  88. node, err = logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  89. assert.Nil(t, err)
  90. assert.Equal(t, false, node.IsEgressGateway)
  91. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  92. })
  93. t.Run("NotGateway", func(t *testing.T) {
  94. node, err := logic.DeleteEgressGateway(gateway.NetID, gateway.NodeID)
  95. assert.Nil(t, err)
  96. assert.Equal(t, false, node.IsEgressGateway)
  97. assert.Equal(t, []string([]string{}), node.EgressGatewayRanges)
  98. })
  99. t.Run("BadNode", func(t *testing.T) {
  100. node, err := logic.DeleteEgressGateway(gateway.NetID, "01:02:03")
  101. assert.EqualError(t, err, "no result found")
  102. assert.Equal(t, models.Node{}, node)
  103. deleteAllNodes()
  104. })
  105. }
  106. func TestGetNetworkNodes(t *testing.T) {
  107. deleteAllNetworks()
  108. createNet()
  109. t.Run("BadNet", func(t *testing.T) {
  110. node, err := logic.GetNetworkNodes("badnet")
  111. assert.Nil(t, err)
  112. assert.Equal(t, []models.Node{}, node)
  113. })
  114. t.Run("NoNodes", func(t *testing.T) {
  115. node, err := logic.GetNetworkNodes("skynet")
  116. assert.Nil(t, err)
  117. assert.Equal(t, []models.Node{}, node)
  118. })
  119. t.Run("Success", func(t *testing.T) {
  120. createTestNode()
  121. node, err := logic.GetNetworkNodes("skynet")
  122. assert.Nil(t, err)
  123. assert.NotEqual(t, []models.LegacyNode(nil), node)
  124. })
  125. }
  126. func TestValidateEgressGateway(t *testing.T) {
  127. var gateway models.EgressGatewayRequest
  128. t.Run("Success", func(t *testing.T) {
  129. gateway.Ranges = []string{"10.100.100.0/24"}
  130. err := logic.ValidateEgressGateway(gateway)
  131. assert.Nil(t, err)
  132. })
  133. }
  134. func TestNodeACLs(t *testing.T) {
  135. deleteAllNodes()
  136. node1 := createNodeWithParams("", "10.0.0.50/32")
  137. node2 := createNodeWithParams("", "10.0.0.100/32")
  138. logic.AssociateNodeToHost(node1, &linuxHost)
  139. logic.AssociateNodeToHost(node2, &linuxHost)
  140. t.Run("acls not present", func(t *testing.T) {
  141. currentACL, err := nodeacls.FetchAllACLs(nodeacls.NetworkID(node1.Network))
  142. assert.Nil(t, err)
  143. assert.NotNil(t, currentACL)
  144. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  145. assert.Nil(t, err)
  146. assert.NotNil(t, node1ACL)
  147. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID.String())])
  148. })
  149. t.Run("node acls exists after creates", func(t *testing.T) {
  150. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  151. assert.Nil(t, err)
  152. assert.NotNil(t, node1ACL)
  153. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID.String()))
  154. assert.Nil(t, err)
  155. assert.NotNil(t, node2ACL)
  156. assert.Equal(t, acls.Allowed, node2ACL[acls.AclID(node1.ID.String())])
  157. })
  158. t.Run("node acls correct after fetch", func(t *testing.T) {
  159. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  160. assert.Nil(t, err)
  161. assert.Equal(t, acls.Allowed, node1ACL[acls.AclID(node2.ID.String())])
  162. })
  163. t.Run("node acls correct after modify", func(t *testing.T) {
  164. node1ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  165. assert.Nil(t, err)
  166. assert.NotNil(t, node1ACL)
  167. node2ACL, err := nodeacls.FetchNodeACL(nodeacls.NetworkID(node2.Network), nodeacls.NodeID(node2.ID.String()))
  168. assert.Nil(t, err)
  169. assert.NotNil(t, node2ACL)
  170. currentACL, err := nodeacls.DisallowNodes(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()), nodeacls.NodeID(node2.ID.String()))
  171. assert.Nil(t, err)
  172. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node2.ID.String())])
  173. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID.String())][acls.AclID(node1.ID.String())])
  174. currentACL.Save(acls.ContainerID(node1.Network))
  175. })
  176. t.Run("node acls correct after add new node not allowed", func(t *testing.T) {
  177. node3 := createNodeWithParams("", "10.0.0.100/32")
  178. createNodeHosts()
  179. n, e := logic.GetNetwork(node3.Network)
  180. assert.Nil(t, e)
  181. n.DefaultACL = "no"
  182. e = logic.SaveNetwork(&n)
  183. assert.Nil(t, e)
  184. err := logic.AssociateNodeToHost(node3, &linuxHost)
  185. assert.Nil(t, err)
  186. currentACL, err := nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  187. assert.Nil(t, err)
  188. assert.NotNil(t, currentACL)
  189. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node3.ID.String())])
  190. nodeACL, err := nodeacls.CreateNodeACL(nodeacls.NetworkID(node3.Network), nodeacls.NodeID(node3.ID.String()), acls.NotAllowed)
  191. assert.Nil(t, err)
  192. nodeACL.Save(acls.ContainerID(node3.Network), acls.AclID(node3.ID.String()))
  193. currentACL, err = nodeacls.FetchAllACLs(nodeacls.NetworkID(node3.Network))
  194. assert.Nil(t, err)
  195. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node1.ID.String())][acls.AclID(node3.ID.String())])
  196. assert.Equal(t, acls.NotAllowed, currentACL[acls.AclID(node2.ID.String())][acls.AclID(node3.ID.String())])
  197. })
  198. t.Run("node acls removed", func(t *testing.T) {
  199. retNetworkACL, err := nodeacls.RemoveNodeACL(nodeacls.NetworkID(node1.Network), nodeacls.NodeID(node1.ID.String()))
  200. assert.Nil(t, err)
  201. assert.NotNil(t, retNetworkACL)
  202. assert.Equal(t, acls.NotPresent, retNetworkACL[acls.AclID(node2.ID.String())][acls.AclID(node1.ID.String())])
  203. })
  204. deleteAllNodes()
  205. }
  206. func deleteAllNodes() {
  207. if servercfg.CacheEnabled() {
  208. logic.ClearNodeCache()
  209. }
  210. database.DeleteAllRecords(database.NODES_TABLE_NAME)
  211. }
  212. func createTestNode() *models.Node {
  213. createNodeHosts()
  214. n := createNodeWithParams("skynet", "")
  215. _ = logic.AssociateNodeToHost(n, &linuxHost)
  216. return n
  217. }
  218. func createNodeWithParams(network, address string) *models.Node {
  219. _, ipnet, _ := net.ParseCIDR("10.0.0.1/32")
  220. tmpCNode := models.CommonNode{
  221. ID: uuid.New(),
  222. Network: "skynet",
  223. Address: *ipnet,
  224. DNSOn: true,
  225. }
  226. if len(network) > 0 {
  227. tmpCNode.Network = network
  228. }
  229. if len(address) > 0 {
  230. _, ipnet2, _ := net.ParseCIDR(address)
  231. tmpCNode.Address = *ipnet2
  232. }
  233. createnode := models.Node{
  234. CommonNode: tmpCNode,
  235. }
  236. return &createnode
  237. }
  238. func createNodeHosts() {
  239. k, _ := wgtypes.ParseKey("DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=")
  240. linuxHost = models.Host{
  241. ID: uuid.New(),
  242. PublicKey: k.PublicKey(),
  243. HostPass: "password",
  244. OS: "linux",
  245. Name: "linuxhost",
  246. }
  247. _ = logic.CreateHost(&linuxHost)
  248. nonLinuxHost = models.Host{
  249. ID: uuid.New(),
  250. OS: "windows",
  251. PublicKey: k.PublicKey(),
  252. Name: "windowshost",
  253. HostPass: "password",
  254. }
  255. _ = logic.CreateHost(&nonLinuxHost)
  256. }