helpers_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. //go:build e2e_testing
  2. // +build e2e_testing
  3. package e2e
  4. import (
  5. "fmt"
  6. "io"
  7. "net/netip"
  8. "os"
  9. "strings"
  10. "testing"
  11. "time"
  12. "dario.cat/mergo"
  13. "github.com/google/gopacket"
  14. "github.com/google/gopacket/layers"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula"
  17. "github.com/slackhq/nebula/cert"
  18. "github.com/slackhq/nebula/cert_test"
  19. "github.com/slackhq/nebula/config"
  20. "github.com/slackhq/nebula/e2e/router"
  21. "github.com/stretchr/testify/assert"
  22. "github.com/stretchr/testify/require"
  23. "go.yaml.in/yaml/v3"
  24. )
  25. type m = map[string]any
  26. // newSimpleServer creates a nebula instance with many assumptions
  27. func newSimpleServer(v cert.Version, caCrt cert.Certificate, caKey []byte, name string, sVpnNetworks string, overrides m) (*nebula.Control, []netip.Prefix, netip.AddrPort, *config.C) {
  28. var vpnNetworks []netip.Prefix
  29. for _, sn := range strings.Split(sVpnNetworks, ",") {
  30. vpnIpNet, err := netip.ParsePrefix(strings.TrimSpace(sn))
  31. if err != nil {
  32. panic(err)
  33. }
  34. vpnNetworks = append(vpnNetworks, vpnIpNet)
  35. }
  36. if len(vpnNetworks) == 0 {
  37. panic("no vpn networks")
  38. }
  39. var udpAddr netip.AddrPort
  40. if vpnNetworks[0].Addr().Is4() {
  41. budpIp := vpnNetworks[0].Addr().As4()
  42. budpIp[1] -= 128
  43. udpAddr = netip.AddrPortFrom(netip.AddrFrom4(budpIp), 4242)
  44. } else {
  45. budpIp := vpnNetworks[0].Addr().As16()
  46. // beef for funsies
  47. budpIp[2] = 190
  48. budpIp[3] = 239
  49. udpAddr = netip.AddrPortFrom(netip.AddrFrom16(budpIp), 4242)
  50. }
  51. return newSimpleServerWithUdp(v, caCrt, caKey, name, sVpnNetworks, udpAddr, overrides)
  52. }
  53. func newSimpleServerWithUdp(v cert.Version, caCrt cert.Certificate, caKey []byte, name string, sVpnNetworks string, udpAddr netip.AddrPort, overrides m) (*nebula.Control, []netip.Prefix, netip.AddrPort, *config.C) {
  54. return newSimpleServerWithUdpAndUnsafeNetworks(v, caCrt, caKey, name, sVpnNetworks, udpAddr, "", overrides)
  55. }
  56. func newSimpleServerWithUdpAndUnsafeNetworks(v cert.Version, caCrt cert.Certificate, caKey []byte, name string, sVpnNetworks string, udpAddr netip.AddrPort, sUnsafeNetworks string, overrides m) (*nebula.Control, []netip.Prefix, netip.AddrPort, *config.C) {
  57. l := NewTestLogger()
  58. var vpnNetworks []netip.Prefix
  59. for _, sn := range strings.Split(sVpnNetworks, ",") {
  60. vpnIpNet, err := netip.ParsePrefix(strings.TrimSpace(sn))
  61. if err != nil {
  62. panic(err)
  63. }
  64. vpnNetworks = append(vpnNetworks, vpnIpNet)
  65. }
  66. if len(vpnNetworks) == 0 {
  67. panic("no vpn networks")
  68. }
  69. firewallInbound := []m{{
  70. "proto": "any",
  71. "port": "any",
  72. "host": "any",
  73. }}
  74. var unsafeNetworks []netip.Prefix
  75. if sUnsafeNetworks != "" {
  76. firewallInbound = []m{{
  77. "proto": "any",
  78. "port": "any",
  79. "host": "any",
  80. "local_cidr": "0.0.0.0/0",
  81. }}
  82. for _, sn := range strings.Split(sUnsafeNetworks, ",") {
  83. x, err := netip.ParsePrefix(strings.TrimSpace(sn))
  84. if err != nil {
  85. panic(err)
  86. }
  87. unsafeNetworks = append(unsafeNetworks, x)
  88. }
  89. }
  90. _, _, myPrivKey, myPEM := cert_test.NewTestCert(v, cert.Curve_CURVE25519, caCrt, caKey, name, time.Now(), time.Now().Add(5*time.Minute), vpnNetworks, unsafeNetworks, []string{})
  91. caB, err := caCrt.MarshalPEM()
  92. if err != nil {
  93. panic(err)
  94. }
  95. mc := m{
  96. "pki": m{
  97. "ca": string(caB),
  98. "cert": string(myPEM),
  99. "key": string(myPrivKey),
  100. },
  101. //"tun": m{"disabled": true},
  102. "firewall": m{
  103. "outbound": []m{{
  104. "proto": "any",
  105. "port": "any",
  106. "host": "any",
  107. }},
  108. "inbound": firewallInbound,
  109. },
  110. //"handshakes": m{
  111. // "try_interval": "1s",
  112. //},
  113. "listen": m{
  114. "host": udpAddr.Addr().String(),
  115. "port": udpAddr.Port(),
  116. },
  117. "logging": m{
  118. "timestamp_format": fmt.Sprintf("%v 15:04:05.000000", name),
  119. "level": l.Level.String(),
  120. },
  121. "timers": m{
  122. "pending_deletion_interval": 2,
  123. "connection_alive_interval": 2,
  124. },
  125. }
  126. if overrides != nil {
  127. final := m{}
  128. err = mergo.Merge(&final, overrides, mergo.WithAppendSlice)
  129. if err != nil {
  130. panic(err)
  131. }
  132. err = mergo.Merge(&final, mc, mergo.WithAppendSlice)
  133. if err != nil {
  134. panic(err)
  135. }
  136. mc = final
  137. }
  138. cb, err := yaml.Marshal(mc)
  139. if err != nil {
  140. panic(err)
  141. }
  142. c := config.NewC(l)
  143. c.LoadString(string(cb))
  144. control, err := nebula.Main(c, false, "e2e-test", l, nil)
  145. if err != nil {
  146. panic(err)
  147. }
  148. return control, vpnNetworks, udpAddr, c
  149. }
  150. // newServer creates a nebula instance with fewer assumptions
  151. func newServer(caCrt []cert.Certificate, certs []cert.Certificate, key []byte, overrides m) (*nebula.Control, []netip.Prefix, netip.AddrPort, *config.C) {
  152. l := NewTestLogger()
  153. vpnNetworks := certs[len(certs)-1].Networks()
  154. var udpAddr netip.AddrPort
  155. if vpnNetworks[0].Addr().Is4() {
  156. budpIp := vpnNetworks[0].Addr().As4()
  157. budpIp[1] -= 128
  158. udpAddr = netip.AddrPortFrom(netip.AddrFrom4(budpIp), 4242)
  159. } else {
  160. budpIp := vpnNetworks[0].Addr().As16()
  161. // beef for funsies
  162. budpIp[2] = 190
  163. budpIp[3] = 239
  164. udpAddr = netip.AddrPortFrom(netip.AddrFrom16(budpIp), 4242)
  165. }
  166. caStr := ""
  167. for _, ca := range caCrt {
  168. x, err := ca.MarshalPEM()
  169. if err != nil {
  170. panic(err)
  171. }
  172. caStr += string(x)
  173. }
  174. certStr := ""
  175. for _, c := range certs {
  176. x, err := c.MarshalPEM()
  177. if err != nil {
  178. panic(err)
  179. }
  180. certStr += string(x)
  181. }
  182. mc := m{
  183. "pki": m{
  184. "ca": caStr,
  185. "cert": certStr,
  186. "key": string(key),
  187. },
  188. //"tun": m{"disabled": true},
  189. "firewall": m{
  190. "outbound": []m{{
  191. "proto": "any",
  192. "port": "any",
  193. "host": "any",
  194. }},
  195. "inbound": []m{{
  196. "proto": "any",
  197. "port": "any",
  198. "host": "any",
  199. }},
  200. },
  201. //"handshakes": m{
  202. // "try_interval": "1s",
  203. //},
  204. "listen": m{
  205. "host": udpAddr.Addr().String(),
  206. "port": udpAddr.Port(),
  207. },
  208. "logging": m{
  209. "timestamp_format": fmt.Sprintf("%v 15:04:05.000000", certs[0].Name()),
  210. "level": l.Level.String(),
  211. },
  212. "timers": m{
  213. "pending_deletion_interval": 2,
  214. "connection_alive_interval": 2,
  215. },
  216. }
  217. if overrides != nil {
  218. final := m{}
  219. err := mergo.Merge(&final, overrides, mergo.WithAppendSlice)
  220. if err != nil {
  221. panic(err)
  222. }
  223. err = mergo.Merge(&final, mc, mergo.WithAppendSlice)
  224. if err != nil {
  225. panic(err)
  226. }
  227. mc = final
  228. }
  229. cb, err := yaml.Marshal(mc)
  230. if err != nil {
  231. panic(err)
  232. }
  233. c := config.NewC(l)
  234. cStr := string(cb)
  235. c.LoadString(cStr)
  236. control, err := nebula.Main(c, false, "e2e-test", l, nil)
  237. if err != nil {
  238. panic(err)
  239. }
  240. return control, vpnNetworks, udpAddr, c
  241. }
  242. type doneCb func()
  243. func deadline(t *testing.T, seconds time.Duration) doneCb {
  244. timeout := time.After(seconds * time.Second)
  245. done := make(chan bool)
  246. go func() {
  247. select {
  248. case <-timeout:
  249. t.Fatal("Test did not finish in time")
  250. case <-done:
  251. }
  252. }()
  253. return func() {
  254. done <- true
  255. }
  256. }
  257. func assertTunnel(t *testing.T, vpnIpA, vpnIpB netip.Addr, controlA, controlB *nebula.Control, r *router.R) {
  258. // Send a packet from them to me
  259. controlB.InjectTunUDPPacket(vpnIpA, 80, vpnIpB, 90, []byte("Hi from B"))
  260. bPacket := r.RouteForAllUntilTxTun(controlA)
  261. assertUdpPacket(t, []byte("Hi from B"), bPacket, vpnIpB, vpnIpA, 90, 80)
  262. // And once more from me to them
  263. controlA.InjectTunUDPPacket(vpnIpB, 80, vpnIpA, 90, []byte("Hello from A"))
  264. aPacket := r.RouteForAllUntilTxTun(controlB)
  265. assertUdpPacket(t, []byte("Hello from A"), aPacket, vpnIpA, vpnIpB, 90, 80)
  266. }
  267. func assertHostInfoPair(t *testing.T, addrA, addrB netip.AddrPort, vpnNetsA, vpnNetsB []netip.Prefix, controlA, controlB *nebula.Control) {
  268. // Get both host infos
  269. //TODO: CERT-V2 we may want to loop over each vpnAddr and assert all the things
  270. hBinA := controlA.GetHostInfoByVpnAddr(vpnNetsB[0].Addr(), false)
  271. require.NotNil(t, hBinA, "Host B was not found by vpnAddr in controlA")
  272. hAinB := controlB.GetHostInfoByVpnAddr(vpnNetsA[0].Addr(), false)
  273. require.NotNil(t, hAinB, "Host A was not found by vpnAddr in controlB")
  274. // Check that both vpn and real addr are correct
  275. assert.EqualValues(t, getAddrs(vpnNetsB), hBinA.VpnAddrs, "Host B VpnIp is wrong in control A")
  276. assert.EqualValues(t, getAddrs(vpnNetsA), hAinB.VpnAddrs, "Host A VpnIp is wrong in control B")
  277. assert.Equal(t, addrB, hBinA.CurrentRemote, "Host B remote is wrong in control A")
  278. assert.Equal(t, addrA, hAinB.CurrentRemote, "Host A remote is wrong in control B")
  279. // Check that our indexes match
  280. assert.Equal(t, hBinA.LocalIndex, hAinB.RemoteIndex, "Host B local index does not match host A remote index")
  281. assert.Equal(t, hBinA.RemoteIndex, hAinB.LocalIndex, "Host B remote index does not match host A local index")
  282. }
  283. func assertUdpPacket(t *testing.T, expected, b []byte, fromIp, toIp netip.Addr, fromPort, toPort uint16) {
  284. if toIp.Is6() {
  285. assertUdpPacket6(t, expected, b, fromIp, toIp, fromPort, toPort)
  286. } else {
  287. assertUdpPacket4(t, expected, b, fromIp, toIp, fromPort, toPort)
  288. }
  289. }
  290. func assertUdpPacket6(t *testing.T, expected, b []byte, fromIp, toIp netip.Addr, fromPort, toPort uint16) {
  291. packet := gopacket.NewPacket(b, layers.LayerTypeIPv6, gopacket.Lazy)
  292. v6 := packet.Layer(layers.LayerTypeIPv6).(*layers.IPv6)
  293. assert.NotNil(t, v6, "No ipv6 data found")
  294. assert.Equal(t, fromIp.AsSlice(), []byte(v6.SrcIP), "Source ip was incorrect")
  295. assert.Equal(t, toIp.AsSlice(), []byte(v6.DstIP), "Dest ip was incorrect")
  296. udp := packet.Layer(layers.LayerTypeUDP).(*layers.UDP)
  297. assert.NotNil(t, udp, "No udp data found")
  298. assert.Equal(t, fromPort, uint16(udp.SrcPort), "Source port was incorrect")
  299. assert.Equal(t, toPort, uint16(udp.DstPort), "Dest port was incorrect")
  300. data := packet.ApplicationLayer()
  301. assert.NotNil(t, data)
  302. assert.Equal(t, expected, data.Payload(), "Data was incorrect")
  303. }
  304. func assertUdpPacket4(t *testing.T, expected, b []byte, fromIp, toIp netip.Addr, fromPort, toPort uint16) {
  305. packet := gopacket.NewPacket(b, layers.LayerTypeIPv4, gopacket.Lazy)
  306. v4 := packet.Layer(layers.LayerTypeIPv4).(*layers.IPv4)
  307. assert.NotNil(t, v4, "No ipv4 data found")
  308. assert.Equal(t, fromIp.AsSlice(), []byte(v4.SrcIP), "Source ip was incorrect")
  309. assert.Equal(t, toIp.AsSlice(), []byte(v4.DstIP), "Dest ip was incorrect")
  310. udp := packet.Layer(layers.LayerTypeUDP).(*layers.UDP)
  311. assert.NotNil(t, udp, "No udp data found")
  312. assert.Equal(t, fromPort, uint16(udp.SrcPort), "Source port was incorrect")
  313. assert.Equal(t, toPort, uint16(udp.DstPort), "Dest port was incorrect")
  314. data := packet.ApplicationLayer()
  315. assert.NotNil(t, data)
  316. assert.Equal(t, expected, data.Payload(), "Data was incorrect")
  317. }
  318. func getAddrs(ns []netip.Prefix) []netip.Addr {
  319. var a []netip.Addr
  320. for _, n := range ns {
  321. a = append(a, n.Addr())
  322. }
  323. return a
  324. }
  325. func NewTestLogger() *logrus.Logger {
  326. l := logrus.New()
  327. v := os.Getenv("TEST_LOGS")
  328. if v == "" {
  329. l.SetOutput(io.Discard)
  330. l.SetLevel(logrus.PanicLevel)
  331. return l
  332. }
  333. switch v {
  334. case "2":
  335. l.SetLevel(logrus.DebugLevel)
  336. case "3":
  337. l.SetLevel(logrus.TraceLevel)
  338. default:
  339. l.SetLevel(logrus.InfoLevel)
  340. }
  341. return l
  342. }