2
0

helpers_test.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325
  1. //go:build e2e_testing
  2. // +build e2e_testing
  3. package e2e
  4. import (
  5. "crypto/rand"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "testing"
  11. "time"
  12. "github.com/google/gopacket"
  13. "github.com/google/gopacket/layers"
  14. "github.com/imdario/mergo"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula"
  17. "github.com/slackhq/nebula/cert"
  18. "github.com/slackhq/nebula/config"
  19. "github.com/slackhq/nebula/e2e/router"
  20. "github.com/slackhq/nebula/iputil"
  21. "github.com/stretchr/testify/assert"
  22. "golang.org/x/crypto/curve25519"
  23. "golang.org/x/crypto/ed25519"
  24. "gopkg.in/yaml.v2"
  25. )
  26. type m map[string]interface{}
  27. // newSimpleServer creates a nebula instance with many assumptions
  28. func newSimpleServer(caCrt *cert.NebulaCertificate, caKey []byte, name string, udpIp net.IP, overrides m) (*nebula.Control, *net.IPNet, *net.UDPAddr, *config.C) {
  29. l := NewTestLogger()
  30. vpnIpNet := &net.IPNet{IP: make([]byte, len(udpIp)), Mask: net.IPMask{255, 255, 255, 0}}
  31. copy(vpnIpNet.IP, udpIp)
  32. vpnIpNet.IP[1] += 128
  33. udpAddr := net.UDPAddr{
  34. IP: udpIp,
  35. Port: 4242,
  36. }
  37. _, _, myPrivKey, myPEM := newTestCert(caCrt, caKey, name, time.Now(), time.Now().Add(5*time.Minute), vpnIpNet, nil, []string{})
  38. caB, err := caCrt.MarshalToPEM()
  39. if err != nil {
  40. panic(err)
  41. }
  42. mc := m{
  43. "pki": m{
  44. "ca": string(caB),
  45. "cert": string(myPEM),
  46. "key": string(myPrivKey),
  47. },
  48. //"tun": m{"disabled": true},
  49. "firewall": m{
  50. "outbound": []m{{
  51. "proto": "any",
  52. "port": "any",
  53. "host": "any",
  54. }},
  55. "inbound": []m{{
  56. "proto": "any",
  57. "port": "any",
  58. "host": "any",
  59. }},
  60. },
  61. //"handshakes": m{
  62. // "try_interval": "1s",
  63. //},
  64. "listen": m{
  65. "host": udpAddr.IP.String(),
  66. "port": udpAddr.Port,
  67. },
  68. "logging": m{
  69. "timestamp_format": fmt.Sprintf("%v 15:04:05.000000", name),
  70. "level": l.Level.String(),
  71. },
  72. "timers": m{
  73. "pending_deletion_interval": 2,
  74. "connection_alive_interval": 2,
  75. },
  76. }
  77. if overrides != nil {
  78. err = mergo.Merge(&overrides, mc, mergo.WithAppendSlice)
  79. if err != nil {
  80. panic(err)
  81. }
  82. mc = overrides
  83. }
  84. cb, err := yaml.Marshal(mc)
  85. if err != nil {
  86. panic(err)
  87. }
  88. c := config.NewC(l)
  89. c.LoadString(string(cb))
  90. control, err := nebula.Main(c, false, "e2e-test", l, nil)
  91. if err != nil {
  92. panic(err)
  93. }
  94. return control, vpnIpNet, &udpAddr, c
  95. }
  96. // newTestCaCert will generate a CA cert
  97. func newTestCaCert(before, after time.Time, ips, subnets []*net.IPNet, groups []string) (*cert.NebulaCertificate, []byte, []byte, []byte) {
  98. pub, priv, err := ed25519.GenerateKey(rand.Reader)
  99. if before.IsZero() {
  100. before = time.Now().Add(time.Second * -60).Round(time.Second)
  101. }
  102. if after.IsZero() {
  103. after = time.Now().Add(time.Second * 60).Round(time.Second)
  104. }
  105. nc := &cert.NebulaCertificate{
  106. Details: cert.NebulaCertificateDetails{
  107. Name: "test ca",
  108. NotBefore: time.Unix(before.Unix(), 0),
  109. NotAfter: time.Unix(after.Unix(), 0),
  110. PublicKey: pub,
  111. IsCA: true,
  112. InvertedGroups: make(map[string]struct{}),
  113. },
  114. }
  115. if len(ips) > 0 {
  116. nc.Details.Ips = ips
  117. }
  118. if len(subnets) > 0 {
  119. nc.Details.Subnets = subnets
  120. }
  121. if len(groups) > 0 {
  122. nc.Details.Groups = groups
  123. }
  124. err = nc.Sign(priv)
  125. if err != nil {
  126. panic(err)
  127. }
  128. pem, err := nc.MarshalToPEM()
  129. if err != nil {
  130. panic(err)
  131. }
  132. return nc, pub, priv, pem
  133. }
  134. // newTestCert will generate a signed certificate with the provided details.
  135. // Expiry times are defaulted if you do not pass them in
  136. func newTestCert(ca *cert.NebulaCertificate, key []byte, name string, before, after time.Time, ip *net.IPNet, subnets []*net.IPNet, groups []string) (*cert.NebulaCertificate, []byte, []byte, []byte) {
  137. issuer, err := ca.Sha256Sum()
  138. if err != nil {
  139. panic(err)
  140. }
  141. if before.IsZero() {
  142. before = time.Now().Add(time.Second * -60).Round(time.Second)
  143. }
  144. if after.IsZero() {
  145. after = time.Now().Add(time.Second * 60).Round(time.Second)
  146. }
  147. pub, rawPriv := x25519Keypair()
  148. nc := &cert.NebulaCertificate{
  149. Details: cert.NebulaCertificateDetails{
  150. Name: name,
  151. Ips: []*net.IPNet{ip},
  152. Subnets: subnets,
  153. Groups: groups,
  154. NotBefore: time.Unix(before.Unix(), 0),
  155. NotAfter: time.Unix(after.Unix(), 0),
  156. PublicKey: pub,
  157. IsCA: false,
  158. Issuer: issuer,
  159. InvertedGroups: make(map[string]struct{}),
  160. },
  161. }
  162. err = nc.Sign(key)
  163. if err != nil {
  164. panic(err)
  165. }
  166. pem, err := nc.MarshalToPEM()
  167. if err != nil {
  168. panic(err)
  169. }
  170. return nc, pub, cert.MarshalX25519PrivateKey(rawPriv), pem
  171. }
  172. func x25519Keypair() ([]byte, []byte) {
  173. privkey := make([]byte, 32)
  174. if _, err := io.ReadFull(rand.Reader, privkey); err != nil {
  175. panic(err)
  176. }
  177. pubkey, err := curve25519.X25519(privkey, curve25519.Basepoint)
  178. if err != nil {
  179. panic(err)
  180. }
  181. return pubkey, privkey
  182. }
  183. type doneCb func()
  184. func deadline(t *testing.T, seconds time.Duration) doneCb {
  185. timeout := time.After(seconds * time.Second)
  186. done := make(chan bool)
  187. go func() {
  188. select {
  189. case <-timeout:
  190. t.Fatal("Test did not finish in time")
  191. case <-done:
  192. }
  193. }()
  194. return func() {
  195. done <- true
  196. }
  197. }
  198. func assertTunnel(t *testing.T, vpnIpA, vpnIpB net.IP, controlA, controlB *nebula.Control, r *router.R) {
  199. // Send a packet from them to me
  200. controlB.InjectTunUDPPacket(vpnIpA, 80, 90, []byte("Hi from B"))
  201. bPacket := r.RouteForAllUntilTxTun(controlA)
  202. assertUdpPacket(t, []byte("Hi from B"), bPacket, vpnIpB, vpnIpA, 90, 80)
  203. // And once more from me to them
  204. controlA.InjectTunUDPPacket(vpnIpB, 80, 90, []byte("Hello from A"))
  205. aPacket := r.RouteForAllUntilTxTun(controlB)
  206. assertUdpPacket(t, []byte("Hello from A"), aPacket, vpnIpA, vpnIpB, 90, 80)
  207. }
  208. func assertHostInfoPair(t *testing.T, addrA, addrB *net.UDPAddr, vpnIpA, vpnIpB net.IP, controlA, controlB *nebula.Control) {
  209. // Get both host infos
  210. hBinA := controlA.GetHostInfoByVpnIp(iputil.Ip2VpnIp(vpnIpB), false)
  211. assert.NotNil(t, hBinA, "Host B was not found by vpnIp in controlA")
  212. hAinB := controlB.GetHostInfoByVpnIp(iputil.Ip2VpnIp(vpnIpA), false)
  213. assert.NotNil(t, hAinB, "Host A was not found by vpnIp in controlB")
  214. // Check that both vpn and real addr are correct
  215. assert.Equal(t, vpnIpB, hBinA.VpnIp, "Host B VpnIp is wrong in control A")
  216. assert.Equal(t, vpnIpA, hAinB.VpnIp, "Host A VpnIp is wrong in control B")
  217. assert.Equal(t, addrB.IP.To16(), hBinA.CurrentRemote.IP.To16(), "Host B remote ip is wrong in control A")
  218. assert.Equal(t, addrA.IP.To16(), hAinB.CurrentRemote.IP.To16(), "Host A remote ip is wrong in control B")
  219. assert.Equal(t, addrB.Port, int(hBinA.CurrentRemote.Port), "Host B remote port is wrong in control A")
  220. assert.Equal(t, addrA.Port, int(hAinB.CurrentRemote.Port), "Host A remote port is wrong in control B")
  221. // Check that our indexes match
  222. assert.Equal(t, hBinA.LocalIndex, hAinB.RemoteIndex, "Host B local index does not match host A remote index")
  223. assert.Equal(t, hBinA.RemoteIndex, hAinB.LocalIndex, "Host B remote index does not match host A local index")
  224. //TODO: Would be nice to assert this memory
  225. //checkIndexes := func(name string, hm *HostMap, hi *HostInfo) {
  226. // hBbyIndex := hmA.Indexes[hBinA.localIndexId]
  227. // assert.NotNil(t, hBbyIndex, "Could not host info by local index in %s", name)
  228. // assert.Equal(t, &hBbyIndex, &hBinA, "%s Indexes map did not point to the right host info", name)
  229. //
  230. // //TODO: remote indexes are susceptible to collision
  231. // hBbyRemoteIndex := hmA.RemoteIndexes[hBinA.remoteIndexId]
  232. // assert.NotNil(t, hBbyIndex, "Could not host info by remote index in %s", name)
  233. // assert.Equal(t, &hBbyRemoteIndex, &hBinA, "%s RemoteIndexes did not point to the right host info", name)
  234. //}
  235. //
  236. //// Check hostmap indexes too
  237. //checkIndexes("hmA", hmA, hBinA)
  238. //checkIndexes("hmB", hmB, hAinB)
  239. }
  240. func assertUdpPacket(t *testing.T, expected, b []byte, fromIp, toIp net.IP, fromPort, toPort uint16) {
  241. packet := gopacket.NewPacket(b, layers.LayerTypeIPv4, gopacket.Lazy)
  242. v4 := packet.Layer(layers.LayerTypeIPv4).(*layers.IPv4)
  243. assert.NotNil(t, v4, "No ipv4 data found")
  244. assert.Equal(t, fromIp, v4.SrcIP, "Source ip was incorrect")
  245. assert.Equal(t, toIp, v4.DstIP, "Dest ip was incorrect")
  246. udp := packet.Layer(layers.LayerTypeUDP).(*layers.UDP)
  247. assert.NotNil(t, udp, "No udp data found")
  248. assert.Equal(t, fromPort, uint16(udp.SrcPort), "Source port was incorrect")
  249. assert.Equal(t, toPort, uint16(udp.DstPort), "Dest port was incorrect")
  250. data := packet.ApplicationLayer()
  251. assert.NotNil(t, data)
  252. assert.Equal(t, expected, data.Payload(), "Data was incorrect")
  253. }
  254. func NewTestLogger() *logrus.Logger {
  255. l := logrus.New()
  256. v := os.Getenv("TEST_LOGS")
  257. if v == "" {
  258. l.SetOutput(io.Discard)
  259. l.SetLevel(logrus.PanicLevel)
  260. return l
  261. }
  262. switch v {
  263. case "2":
  264. l.SetLevel(logrus.DebugLevel)
  265. case "3":
  266. l.SetLevel(logrus.TraceLevel)
  267. default:
  268. l.SetLevel(logrus.InfoLevel)
  269. }
  270. return l
  271. }