| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320 |
- //go:build e2e_testing
- // +build e2e_testing
- package e2e
- import (
- "fmt"
- "net/netip"
- "testing"
- "time"
- "github.com/slackhq/nebula/cert"
- "github.com/slackhq/nebula/cert_test"
- "github.com/slackhq/nebula/e2e/router"
- "github.com/stretchr/testify/assert"
- "gopkg.in/yaml.v3"
- )
- func TestDropInactiveTunnels(t *testing.T) {
- // The goal of this test is to ensure the shortest inactivity timeout will close the tunnel on both sides
- // under ideal conditions
- ca, _, caKey, _ := cert_test.NewTestCaCert(cert.Version1, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- myControl, myVpnIpNet, myUdpAddr, _ := newSimpleServer(cert.Version1, ca, caKey, "me", "10.128.0.1/24", m{"tunnels": m{"drop_inactive": true, "inactivity_timeout": "5s"}})
- theirControl, theirVpnIpNet, theirUdpAddr, _ := newSimpleServer(cert.Version1, ca, caKey, "them", "10.128.0.2/24", m{"tunnels": m{"drop_inactive": true, "inactivity_timeout": "10m"}})
- // Share our underlay information
- myControl.InjectLightHouseAddr(theirVpnIpNet[0].Addr(), theirUdpAddr)
- theirControl.InjectLightHouseAddr(myVpnIpNet[0].Addr(), myUdpAddr)
- // Start the servers
- myControl.Start()
- theirControl.Start()
- r := router.NewR(t, myControl, theirControl)
- r.Log("Assert the tunnel between me and them works")
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- r.Log("Go inactive and wait for the tunnels to get dropped")
- waitStart := time.Now()
- for {
- myIndexes := len(myControl.GetHostmap().Indexes)
- theirIndexes := len(theirControl.GetHostmap().Indexes)
- if myIndexes == 0 && theirIndexes == 0 {
- break
- }
- since := time.Since(waitStart)
- r.Logf("my tunnels: %v; their tunnels: %v; duration: %v", myIndexes, theirIndexes, since)
- if since > time.Second*30 {
- t.Fatal("Tunnel should have been declared inactive after 5 seconds and before 30 seconds")
- }
- time.Sleep(1 * time.Second)
- r.FlushAll()
- }
- r.Logf("Inactive tunnels were dropped within %v", time.Since(waitStart))
- myControl.Stop()
- theirControl.Stop()
- }
- func TestCertUpgrade(t *testing.T) {
- // The goal of this test is to ensure the shortest inactivity timeout will close the tunnel on both sides
- // under ideal conditions
- ca, _, caKey, _ := cert_test.NewTestCaCert(cert.Version1, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- caB, err := ca.MarshalPEM()
- if err != nil {
- panic(err)
- }
- ca2, _, caKey2, _ := cert_test.NewTestCaCert(cert.Version2, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- ca2B, err := ca2.MarshalPEM()
- if err != nil {
- panic(err)
- }
- caStr := fmt.Sprintf("%s\n%s", caB, ca2B)
- myCert, _, myPrivKey, _ := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "me", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.1/24")}, nil, []string{})
- _, myCert2Pem := cert_test.NewTestCertDifferentVersion(myCert, cert.Version2, ca2, caKey2)
- theirCert, _, theirPrivKey, _ := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "them", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.2/24")}, nil, []string{})
- theirCert2, _ := cert_test.NewTestCertDifferentVersion(theirCert, cert.Version2, ca2, caKey2)
- myControl, myVpnIpNet, myUdpAddr, myC := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{myCert}, myPrivKey, m{})
- theirControl, theirVpnIpNet, theirUdpAddr, _ := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{theirCert, theirCert2}, theirPrivKey, m{})
- // Share our underlay information
- myControl.InjectLightHouseAddr(theirVpnIpNet[0].Addr(), theirUdpAddr)
- theirControl.InjectLightHouseAddr(myVpnIpNet[0].Addr(), myUdpAddr)
- // Start the servers
- myControl.Start()
- theirControl.Start()
- r := router.NewR(t, myControl, theirControl)
- defer r.RenderFlow()
- r.Log("Assert the tunnel between me and them works")
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- r.Log("yay")
- //todo ???
- time.Sleep(1 * time.Second)
- r.FlushAll()
- mc := m{
- "pki": m{
- "ca": caStr,
- "cert": string(myCert2Pem),
- "key": string(myPrivKey),
- },
- //"tun": m{"disabled": true},
- "firewall": myC.Settings["firewall"],
- //"handshakes": m{
- // "try_interval": "1s",
- //},
- "listen": myC.Settings["listen"],
- "logging": myC.Settings["logging"],
- "timers": myC.Settings["timers"],
- }
- cb, err := yaml.Marshal(mc)
- if err != nil {
- panic(err)
- }
- r.Logf("reload new v2-only config")
- err = myC.ReloadConfigString(string(cb))
- assert.NoError(t, err)
- r.Log("yay, spin until their sees it")
- waitStart := time.Now()
- for {
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- c := theirControl.GetHostInfoByVpnAddr(myVpnIpNet[0].Addr(), false)
- if c == nil {
- r.Log("nil")
- } else {
- version := c.Cert.Version()
- r.Logf("version %d", version)
- if version == cert.Version2 {
- break
- }
- }
- since := time.Since(waitStart)
- if since > time.Second*10 {
- t.Fatal("Cert should be new by now")
- }
- time.Sleep(time.Second)
- }
- r.RenderHostmaps("Final hostmaps", myControl, theirControl)
- myControl.Stop()
- theirControl.Stop()
- }
- func TestCertDowngrade(t *testing.T) {
- // The goal of this test is to ensure the shortest inactivity timeout will close the tunnel on both sides
- // under ideal conditions
- ca, _, caKey, _ := cert_test.NewTestCaCert(cert.Version1, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- caB, err := ca.MarshalPEM()
- if err != nil {
- panic(err)
- }
- ca2, _, caKey2, _ := cert_test.NewTestCaCert(cert.Version2, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- ca2B, err := ca2.MarshalPEM()
- if err != nil {
- panic(err)
- }
- caStr := fmt.Sprintf("%s\n%s", caB, ca2B)
- myCert, _, myPrivKey, myCertPem := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "me", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.1/24")}, nil, []string{})
- myCert2, _ := cert_test.NewTestCertDifferentVersion(myCert, cert.Version2, ca2, caKey2)
- theirCert, _, theirPrivKey, _ := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "them", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.2/24")}, nil, []string{})
- theirCert2, _ := cert_test.NewTestCertDifferentVersion(theirCert, cert.Version2, ca2, caKey2)
- myControl, myVpnIpNet, myUdpAddr, myC := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{myCert2}, myPrivKey, m{})
- theirControl, theirVpnIpNet, theirUdpAddr, _ := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{theirCert, theirCert2}, theirPrivKey, m{})
- // Share our underlay information
- myControl.InjectLightHouseAddr(theirVpnIpNet[0].Addr(), theirUdpAddr)
- theirControl.InjectLightHouseAddr(myVpnIpNet[0].Addr(), myUdpAddr)
- // Start the servers
- myControl.Start()
- theirControl.Start()
- r := router.NewR(t, myControl, theirControl)
- defer r.RenderFlow()
- r.Log("Assert the tunnel between me and them works")
- //assertTunnel(t, theirVpnIpNet[0].Addr(), myVpnIpNet[0].Addr(), theirControl, myControl, r)
- //r.Log("yay")
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- r.Log("yay")
- //todo ???
- time.Sleep(1 * time.Second)
- r.FlushAll()
- mc := m{
- "pki": m{
- "ca": caStr,
- "cert": string(myCertPem),
- "key": string(myPrivKey),
- },
- "firewall": myC.Settings["firewall"],
- "listen": myC.Settings["listen"],
- "logging": myC.Settings["logging"],
- "timers": myC.Settings["timers"],
- }
- cb, err := yaml.Marshal(mc)
- if err != nil {
- panic(err)
- }
- r.Logf("reload new v1-only config")
- err = myC.ReloadConfigString(string(cb))
- assert.NoError(t, err)
- r.Log("yay, spin until their sees it")
- waitStart := time.Now()
- for {
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- c := theirControl.GetHostInfoByVpnAddr(myVpnIpNet[0].Addr(), false)
- c2 := myControl.GetHostInfoByVpnAddr(theirVpnIpNet[0].Addr(), false)
- if c == nil || c2 == nil {
- r.Log("nil")
- } else {
- version := c.Cert.Version()
- theirVersion := c2.Cert.Version()
- r.Logf("version %d,%d", version, theirVersion)
- if version == cert.Version1 {
- break
- }
- }
- since := time.Since(waitStart)
- if since > time.Second*5 {
- r.Log("it is unusual that the cert is not new yet, but not a failure yet")
- }
- if since > time.Second*10 {
- r.Log("wtf")
- t.Fatal("Cert should be new by now")
- }
- time.Sleep(time.Second)
- }
- r.RenderHostmaps("Final hostmaps", myControl, theirControl)
- myControl.Stop()
- theirControl.Stop()
- }
- func TestCertMismatchCorrection(t *testing.T) {
- // The goal of this test is to ensure the shortest inactivity timeout will close the tunnel on both sides
- // under ideal conditions
- ca, _, caKey, _ := cert_test.NewTestCaCert(cert.Version1, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- ca2, _, caKey2, _ := cert_test.NewTestCaCert(cert.Version2, cert.Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, []string{})
- myCert, _, myPrivKey, _ := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "me", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.1/24")}, nil, []string{})
- myCert2, _ := cert_test.NewTestCertDifferentVersion(myCert, cert.Version2, ca2, caKey2)
- theirCert, _, theirPrivKey, _ := cert_test.NewTestCert(cert.Version1, cert.Curve_CURVE25519, ca, caKey, "them", time.Now(), time.Now().Add(5*time.Minute), []netip.Prefix{netip.MustParsePrefix("10.128.0.2/24")}, nil, []string{})
- theirCert2, _ := cert_test.NewTestCertDifferentVersion(theirCert, cert.Version2, ca2, caKey2)
- myControl, myVpnIpNet, myUdpAddr, _ := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{myCert2}, myPrivKey, m{})
- theirControl, theirVpnIpNet, theirUdpAddr, _ := newServer([]cert.Certificate{ca, ca2}, []cert.Certificate{theirCert, theirCert2}, theirPrivKey, m{})
- // Share our underlay information
- myControl.InjectLightHouseAddr(theirVpnIpNet[0].Addr(), theirUdpAddr)
- theirControl.InjectLightHouseAddr(myVpnIpNet[0].Addr(), myUdpAddr)
- // Start the servers
- myControl.Start()
- theirControl.Start()
- r := router.NewR(t, myControl, theirControl)
- defer r.RenderFlow()
- r.Log("Assert the tunnel between me and them works")
- //assertTunnel(t, theirVpnIpNet[0].Addr(), myVpnIpNet[0].Addr(), theirControl, myControl, r)
- //r.Log("yay")
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- r.Log("yay")
- //todo ???
- time.Sleep(1 * time.Second)
- r.FlushAll()
- waitStart := time.Now()
- for {
- assertTunnel(t, myVpnIpNet[0].Addr(), theirVpnIpNet[0].Addr(), myControl, theirControl, r)
- c := theirControl.GetHostInfoByVpnAddr(myVpnIpNet[0].Addr(), false)
- c2 := myControl.GetHostInfoByVpnAddr(theirVpnIpNet[0].Addr(), false)
- if c == nil || c2 == nil {
- r.Log("nil")
- } else {
- version := c.Cert.Version()
- theirVersion := c2.Cert.Version()
- r.Logf("version %d,%d", version, theirVersion)
- if version == theirVersion {
- break
- }
- }
- since := time.Since(waitStart)
- if since > time.Second*5 {
- r.Log("wtf")
- }
- if since > time.Second*10 {
- r.Log("wtf")
- t.Fatal("Cert should be new by now")
- }
- time.Sleep(time.Second)
- }
- r.RenderHostmaps("Final hostmaps", myControl, theirControl)
- myControl.Stop()
- theirControl.Stop()
- }
|