helpers_test.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. // +build e2e_testing
  2. package e2e
  3. import (
  4. "crypto/rand"
  5. "encoding/binary"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "net"
  10. "os"
  11. "testing"
  12. "time"
  13. "github.com/google/gopacket"
  14. "github.com/google/gopacket/layers"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula"
  17. "github.com/slackhq/nebula/cert"
  18. "github.com/slackhq/nebula/e2e/router"
  19. "github.com/stretchr/testify/assert"
  20. "golang.org/x/crypto/curve25519"
  21. "golang.org/x/crypto/ed25519"
  22. "gopkg.in/yaml.v2"
  23. )
  24. type m map[string]interface{}
  25. // newSimpleServer creates a nebula instance with many assumptions
  26. func newSimpleServer(caCrt *cert.NebulaCertificate, caKey []byte, name string, udpIp net.IP) (*nebula.Control, net.IP, *net.UDPAddr) {
  27. l := NewTestLogger()
  28. vpnIpNet := &net.IPNet{IP: make([]byte, len(udpIp)), Mask: net.IPMask{255, 255, 255, 0}}
  29. copy(vpnIpNet.IP, udpIp)
  30. vpnIpNet.IP[1] += 128
  31. udpAddr := net.UDPAddr{
  32. IP: udpIp,
  33. Port: 4242,
  34. }
  35. _, _, myPrivKey, myPEM := newTestCert(caCrt, caKey, name, time.Now(), time.Now().Add(5*time.Minute), vpnIpNet, nil, []string{})
  36. caB, err := caCrt.MarshalToPEM()
  37. if err != nil {
  38. panic(err)
  39. }
  40. mc := m{
  41. "pki": m{
  42. "ca": string(caB),
  43. "cert": string(myPEM),
  44. "key": string(myPrivKey),
  45. },
  46. //"tun": m{"disabled": true},
  47. "firewall": m{
  48. "outbound": []m{{
  49. "proto": "any",
  50. "port": "any",
  51. "host": "any",
  52. }},
  53. "inbound": []m{{
  54. "proto": "any",
  55. "port": "any",
  56. "host": "any",
  57. }},
  58. },
  59. "listen": m{
  60. "host": udpAddr.IP.String(),
  61. "port": udpAddr.Port,
  62. },
  63. "logging": m{
  64. "timestamp_format": fmt.Sprintf("%v 15:04:05.000000", name),
  65. "level": l.Level.String(),
  66. },
  67. }
  68. cb, err := yaml.Marshal(mc)
  69. if err != nil {
  70. panic(err)
  71. }
  72. config := nebula.NewConfig(l)
  73. config.LoadString(string(cb))
  74. control, err := nebula.Main(config, false, "e2e-test", l, nil)
  75. if err != nil {
  76. panic(err)
  77. }
  78. return control, vpnIpNet.IP, &udpAddr
  79. }
  80. // newTestCaCert will generate a CA cert
  81. func newTestCaCert(before, after time.Time, ips, subnets []*net.IPNet, groups []string) (*cert.NebulaCertificate, []byte, []byte, []byte) {
  82. pub, priv, err := ed25519.GenerateKey(rand.Reader)
  83. if before.IsZero() {
  84. before = time.Now().Add(time.Second * -60).Round(time.Second)
  85. }
  86. if after.IsZero() {
  87. after = time.Now().Add(time.Second * 60).Round(time.Second)
  88. }
  89. nc := &cert.NebulaCertificate{
  90. Details: cert.NebulaCertificateDetails{
  91. Name: "test ca",
  92. NotBefore: time.Unix(before.Unix(), 0),
  93. NotAfter: time.Unix(after.Unix(), 0),
  94. PublicKey: pub,
  95. IsCA: true,
  96. InvertedGroups: make(map[string]struct{}),
  97. },
  98. }
  99. if len(ips) > 0 {
  100. nc.Details.Ips = ips
  101. }
  102. if len(subnets) > 0 {
  103. nc.Details.Subnets = subnets
  104. }
  105. if len(groups) > 0 {
  106. nc.Details.Groups = groups
  107. }
  108. err = nc.Sign(priv)
  109. if err != nil {
  110. panic(err)
  111. }
  112. pem, err := nc.MarshalToPEM()
  113. if err != nil {
  114. panic(err)
  115. }
  116. return nc, pub, priv, pem
  117. }
  118. // newTestCert will generate a signed certificate with the provided details.
  119. // Expiry times are defaulted if you do not pass them in
  120. func newTestCert(ca *cert.NebulaCertificate, key []byte, name string, before, after time.Time, ip *net.IPNet, subnets []*net.IPNet, groups []string) (*cert.NebulaCertificate, []byte, []byte, []byte) {
  121. issuer, err := ca.Sha256Sum()
  122. if err != nil {
  123. panic(err)
  124. }
  125. if before.IsZero() {
  126. before = time.Now().Add(time.Second * -60).Round(time.Second)
  127. }
  128. if after.IsZero() {
  129. after = time.Now().Add(time.Second * 60).Round(time.Second)
  130. }
  131. pub, rawPriv := x25519Keypair()
  132. nc := &cert.NebulaCertificate{
  133. Details: cert.NebulaCertificateDetails{
  134. Name: name,
  135. Ips: []*net.IPNet{ip},
  136. Subnets: subnets,
  137. Groups: groups,
  138. NotBefore: time.Unix(before.Unix(), 0),
  139. NotAfter: time.Unix(after.Unix(), 0),
  140. PublicKey: pub,
  141. IsCA: false,
  142. Issuer: issuer,
  143. InvertedGroups: make(map[string]struct{}),
  144. },
  145. }
  146. err = nc.Sign(key)
  147. if err != nil {
  148. panic(err)
  149. }
  150. pem, err := nc.MarshalToPEM()
  151. if err != nil {
  152. panic(err)
  153. }
  154. return nc, pub, cert.MarshalX25519PrivateKey(rawPriv), pem
  155. }
  156. func x25519Keypair() ([]byte, []byte) {
  157. var pubkey, privkey [32]byte
  158. if _, err := io.ReadFull(rand.Reader, privkey[:]); err != nil {
  159. panic(err)
  160. }
  161. curve25519.ScalarBaseMult(&pubkey, &privkey)
  162. return pubkey[:], privkey[:]
  163. }
  164. func ip2int(ip []byte) uint32 {
  165. if len(ip) == 16 {
  166. return binary.BigEndian.Uint32(ip[12:16])
  167. }
  168. return binary.BigEndian.Uint32(ip)
  169. }
  170. func int2ip(nn uint32) net.IP {
  171. ip := make(net.IP, 4)
  172. binary.BigEndian.PutUint32(ip, nn)
  173. return ip
  174. }
  175. type doneCb func()
  176. func deadline(t *testing.T, seconds time.Duration) doneCb {
  177. timeout := time.After(seconds * time.Second)
  178. done := make(chan bool)
  179. go func() {
  180. select {
  181. case <-timeout:
  182. t.Fatal("Test did not finish in time")
  183. case <-done:
  184. }
  185. }()
  186. return func() {
  187. done <- true
  188. }
  189. }
  190. func assertTunnel(t *testing.T, vpnIpA, vpnIpB net.IP, controlA, controlB *nebula.Control, r *router.R) {
  191. // Send a packet from them to me
  192. controlB.InjectTunUDPPacket(vpnIpA, 80, 90, []byte("Hi from B"))
  193. bPacket := r.RouteUntilTxTun(controlB, controlA)
  194. assertUdpPacket(t, []byte("Hi from B"), bPacket, vpnIpB, vpnIpA, 90, 80)
  195. // And once more from me to them
  196. controlA.InjectTunUDPPacket(vpnIpB, 80, 90, []byte("Hello from A"))
  197. aPacket := r.RouteUntilTxTun(controlA, controlB)
  198. assertUdpPacket(t, []byte("Hello from A"), aPacket, vpnIpA, vpnIpB, 90, 80)
  199. }
  200. func assertHostInfoPair(t *testing.T, addrA, addrB *net.UDPAddr, vpnIpA, vpnIpB net.IP, controlA, controlB *nebula.Control) {
  201. // Get both host infos
  202. hBinA := controlA.GetHostInfoByVpnIP(ip2int(vpnIpB), false)
  203. assert.NotNil(t, hBinA, "Host B was not found by vpnIP in controlA")
  204. hAinB := controlB.GetHostInfoByVpnIP(ip2int(vpnIpA), false)
  205. assert.NotNil(t, hAinB, "Host A was not found by vpnIP in controlB")
  206. // Check that both vpn and real addr are correct
  207. assert.Equal(t, vpnIpB, hBinA.VpnIP, "Host B VpnIp is wrong in control A")
  208. assert.Equal(t, vpnIpA, hAinB.VpnIP, "Host A VpnIp is wrong in control B")
  209. assert.Equal(t, addrB.IP.To16(), hBinA.CurrentRemote.IP.To16(), "Host B remote ip is wrong in control A")
  210. assert.Equal(t, addrA.IP.To16(), hAinB.CurrentRemote.IP.To16(), "Host A remote ip is wrong in control B")
  211. assert.Equal(t, addrB.Port, int(hBinA.CurrentRemote.Port), "Host B remote port is wrong in control A")
  212. assert.Equal(t, addrA.Port, int(hAinB.CurrentRemote.Port), "Host A remote port is wrong in control B")
  213. // Check that our indexes match
  214. assert.Equal(t, hBinA.LocalIndex, hAinB.RemoteIndex, "Host B local index does not match host A remote index")
  215. assert.Equal(t, hBinA.RemoteIndex, hAinB.LocalIndex, "Host B remote index does not match host A local index")
  216. //TODO: Would be nice to assert this memory
  217. //checkIndexes := func(name string, hm *HostMap, hi *HostInfo) {
  218. // hBbyIndex := hmA.Indexes[hBinA.localIndexId]
  219. // assert.NotNil(t, hBbyIndex, "Could not host info by local index in %s", name)
  220. // assert.Equal(t, &hBbyIndex, &hBinA, "%s Indexes map did not point to the right host info", name)
  221. //
  222. // //TODO: remote indexes are susceptible to collision
  223. // hBbyRemoteIndex := hmA.RemoteIndexes[hBinA.remoteIndexId]
  224. // assert.NotNil(t, hBbyIndex, "Could not host info by remote index in %s", name)
  225. // assert.Equal(t, &hBbyRemoteIndex, &hBinA, "%s RemoteIndexes did not point to the right host info", name)
  226. //}
  227. //
  228. //// Check hostmap indexes too
  229. //checkIndexes("hmA", hmA, hBinA)
  230. //checkIndexes("hmB", hmB, hAinB)
  231. }
  232. func assertUdpPacket(t *testing.T, expected, b []byte, fromIp, toIp net.IP, fromPort, toPort uint16) {
  233. packet := gopacket.NewPacket(b, layers.LayerTypeIPv4, gopacket.Lazy)
  234. v4 := packet.Layer(layers.LayerTypeIPv4).(*layers.IPv4)
  235. assert.NotNil(t, v4, "No ipv4 data found")
  236. assert.Equal(t, fromIp, v4.SrcIP, "Source ip was incorrect")
  237. assert.Equal(t, toIp, v4.DstIP, "Dest ip was incorrect")
  238. udp := packet.Layer(layers.LayerTypeUDP).(*layers.UDP)
  239. assert.NotNil(t, udp, "No udp data found")
  240. assert.Equal(t, fromPort, uint16(udp.SrcPort), "Source port was incorrect")
  241. assert.Equal(t, toPort, uint16(udp.DstPort), "Dest port was incorrect")
  242. data := packet.ApplicationLayer()
  243. assert.NotNil(t, data)
  244. assert.Equal(t, expected, data.Payload(), "Data was incorrect")
  245. }
  246. func NewTestLogger() *logrus.Logger {
  247. l := logrus.New()
  248. v := os.Getenv("TEST_LOGS")
  249. if v == "" {
  250. l.SetOutput(ioutil.Discard)
  251. return l
  252. }
  253. switch v {
  254. case "2":
  255. l.SetLevel(logrus.DebugLevel)
  256. case "3":
  257. l.SetLevel(logrus.TraceLevel)
  258. default:
  259. l.SetLevel(logrus.InfoLevel)
  260. }
  261. return l
  262. }