mirror of https://github.com/slackhq/nebula.git
122 lines
3.6 KiB
Go
122 lines
3.6 KiB
Go
package nebula
|
|
|
|
import (
|
|
"net"
|
|
"net/netip"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/slackhq/nebula/cert"
|
|
"github.com/slackhq/nebula/test"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestControl_GetHostInfoByVpnIp(t *testing.T) {
|
|
//TODO: with multiple certificate versions we have a problem with this test
|
|
// Some certs versions have different characteristics and each version implements their own Copy() func
|
|
// which means this is not a good place to test for exposing memory
|
|
l := test.NewLogger()
|
|
// Special care must be taken to re-use all objects provided to the hostmap and certificate in the expectedInfo object
|
|
// To properly ensure we are not exposing core memory to the caller
|
|
hm := newHostMap(l)
|
|
hm.preferredRanges.Store(&[]netip.Prefix{})
|
|
|
|
remote1 := netip.MustParseAddrPort("0.0.0.100:4444")
|
|
remote2 := netip.MustParseAddrPort("[1:2:3:4:5:6:7:8]:4444")
|
|
|
|
ipNet := net.IPNet{
|
|
IP: remote1.Addr().AsSlice(),
|
|
Mask: net.IPMask{255, 255, 255, 0},
|
|
}
|
|
|
|
ipNet2 := net.IPNet{
|
|
IP: remote2.Addr().AsSlice(),
|
|
Mask: net.IPMask{255, 255, 255, 0},
|
|
}
|
|
|
|
remotes := NewRemoteList([]netip.Addr{netip.IPv4Unspecified()}, nil)
|
|
remotes.unlockedPrependV4(netip.IPv4Unspecified(), netAddrToProtoV4AddrPort(remote1.Addr(), remote1.Port()))
|
|
remotes.unlockedPrependV6(netip.IPv4Unspecified(), netAddrToProtoV6AddrPort(remote2.Addr(), remote2.Port()))
|
|
|
|
vpnIp, ok := netip.AddrFromSlice(ipNet.IP)
|
|
assert.True(t, ok)
|
|
|
|
crt := &dummyCert{}
|
|
hm.unlockedAddHostInfo(&HostInfo{
|
|
remote: remote1,
|
|
remotes: remotes,
|
|
ConnectionState: &ConnectionState{
|
|
peerCert: &cert.CachedCertificate{Certificate: crt},
|
|
},
|
|
remoteIndexId: 200,
|
|
localIndexId: 201,
|
|
vpnAddrs: []netip.Addr{vpnIp},
|
|
relayState: RelayState{
|
|
relays: map[netip.Addr]struct{}{},
|
|
relayForByAddr: map[netip.Addr]*Relay{},
|
|
relayForByIdx: map[uint32]*Relay{},
|
|
},
|
|
}, &Interface{})
|
|
|
|
vpnIp2, ok := netip.AddrFromSlice(ipNet2.IP)
|
|
assert.True(t, ok)
|
|
|
|
hm.unlockedAddHostInfo(&HostInfo{
|
|
remote: remote1,
|
|
remotes: remotes,
|
|
ConnectionState: &ConnectionState{
|
|
peerCert: nil,
|
|
},
|
|
remoteIndexId: 200,
|
|
localIndexId: 201,
|
|
vpnAddrs: []netip.Addr{vpnIp2},
|
|
relayState: RelayState{
|
|
relays: map[netip.Addr]struct{}{},
|
|
relayForByAddr: map[netip.Addr]*Relay{},
|
|
relayForByIdx: map[uint32]*Relay{},
|
|
},
|
|
}, &Interface{})
|
|
|
|
c := Control{
|
|
f: &Interface{
|
|
hostMap: hm,
|
|
},
|
|
l: logrus.New(),
|
|
}
|
|
|
|
thi := c.GetHostInfoByVpnAddr(vpnIp, false)
|
|
|
|
expectedInfo := ControlHostInfo{
|
|
VpnAddrs: []netip.Addr{vpnIp},
|
|
LocalIndex: 201,
|
|
RemoteIndex: 200,
|
|
RemoteAddrs: []netip.AddrPort{remote2, remote1},
|
|
Cert: crt.Copy(),
|
|
MessageCounter: 0,
|
|
CurrentRemote: remote1,
|
|
CurrentRelaysToMe: []netip.Addr{},
|
|
CurrentRelaysThroughMe: []netip.Addr{},
|
|
}
|
|
|
|
// Make sure we don't have any unexpected fields
|
|
assertFields(t, []string{"VpnAddrs", "LocalIndex", "RemoteIndex", "RemoteAddrs", "Cert", "MessageCounter", "CurrentRemote", "CurrentRelaysToMe", "CurrentRelaysThroughMe"}, thi)
|
|
assert.EqualValues(t, &expectedInfo, thi)
|
|
test.AssertDeepCopyEqual(t, &expectedInfo, thi)
|
|
|
|
// Make sure we don't panic if the host info doesn't have a cert yet
|
|
assert.NotPanics(t, func() {
|
|
thi = c.GetHostInfoByVpnAddr(vpnIp2, false)
|
|
})
|
|
}
|
|
|
|
func assertFields(t *testing.T, expected []string, actualStruct interface{}) {
|
|
val := reflect.ValueOf(actualStruct).Elem()
|
|
fields := make([]string, val.NumField())
|
|
for i := 0; i < val.NumField(); i++ {
|
|
fields[i] = val.Type().Field(i).Name
|
|
}
|
|
|
|
assert.Equal(t, expected, fields)
|
|
}
|