2021-07-17 14:38:59 +02:00
|
|
|
package management_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-07-22 10:28:00 +02:00
|
|
|
pb "github.com/golang/protobuf/proto" //nolint
|
|
|
|
log "github.com/sirupsen/logrus"
|
2021-07-22 15:23:24 +02:00
|
|
|
"github.com/wiretrustee/wiretrustee/encryption"
|
2021-07-18 20:51:09 +02:00
|
|
|
"io/ioutil"
|
2021-07-22 10:28:00 +02:00
|
|
|
"math/rand"
|
2021-07-18 20:51:09 +02:00
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2021-07-22 10:28:00 +02:00
|
|
|
sync2 "sync"
|
2021-07-18 20:51:09 +02:00
|
|
|
"time"
|
|
|
|
|
2021-07-17 14:38:59 +02:00
|
|
|
. "github.com/onsi/ginkgo"
|
|
|
|
. "github.com/onsi/gomega"
|
|
|
|
mgmt "github.com/wiretrustee/wiretrustee/management"
|
|
|
|
mgmtProto "github.com/wiretrustee/wiretrustee/management/proto"
|
|
|
|
"github.com/wiretrustee/wiretrustee/util"
|
|
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
|
|
"google.golang.org/grpc"
|
|
|
|
"google.golang.org/grpc/keepalive"
|
|
|
|
)
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
const (
|
|
|
|
ValidSetupKey = "A2C8E62B-38F5-4553-B31E-DD66C696CEBB"
|
|
|
|
InvalidSetupKey = "INVALID_SETUP_KEY"
|
|
|
|
)
|
|
|
|
|
|
|
|
var _ = Describe("Management service", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
|
|
|
|
var (
|
2021-07-22 10:28:00 +02:00
|
|
|
addr string
|
|
|
|
server *grpc.Server
|
|
|
|
dataDir string
|
|
|
|
client mgmtProto.ManagementServiceClient
|
|
|
|
serverPubKey wgtypes.Key
|
|
|
|
conn *grpc.ClientConn
|
2021-07-17 14:38:59 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
BeforeEach(func() {
|
2021-07-22 10:28:00 +02:00
|
|
|
level, _ := log.ParseLevel("Debug")
|
|
|
|
log.SetLevel(level)
|
2021-07-17 14:38:59 +02:00
|
|
|
var err error
|
|
|
|
dataDir, err = ioutil.TempDir("", "wiretrustee_mgmt_test_tmp_*")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
err = util.CopyFileContents("testdata/store.json", filepath.Join(dataDir, "store.json"))
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
var listener net.Listener
|
|
|
|
server, listener = startServer(dataDir)
|
|
|
|
addr = listener.Addr().String()
|
2021-07-22 10:28:00 +02:00
|
|
|
client, conn = createRawClient(addr)
|
|
|
|
|
|
|
|
// server public key
|
|
|
|
resp, err := client.GetServerKey(context.TODO(), &mgmtProto.Empty{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
serverPubKey, err = wgtypes.ParseKey(resp.Key)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
AfterEach(func() {
|
|
|
|
server.Stop()
|
2021-07-22 10:28:00 +02:00
|
|
|
err := conn.Close()
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:53:15 +02:00
|
|
|
err = os.RemoveAll(dataDir)
|
2021-07-17 14:38:59 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when calling IsHealthy endpoint", func() {
|
|
|
|
Specify("a non-error result is returned", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
healthy, err := client.IsHealthy(context.TODO(), &mgmtProto.Empty{})
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
Expect(healthy).ToNot(BeNil())
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when calling Sync endpoint", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when there are 3 peers registered under one account", func() {
|
|
|
|
Specify("a list containing other 2 peers is returned", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
key, _ := wgtypes.GenerateKey()
|
2021-07-22 10:28:00 +02:00
|
|
|
key1, _ := wgtypes.GenerateKey()
|
|
|
|
key2, _ := wgtypes.GenerateKey()
|
|
|
|
registerPeerWithValidSetupKey(key, client)
|
|
|
|
registerPeerWithValidSetupKey(key1, client)
|
|
|
|
registerPeerWithValidSetupKey(key2, client)
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
messageBytes, err := pb.Marshal(&mgmtProto.SyncRequest{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:23:24 +02:00
|
|
|
encryptedBytes, err := encryption.Encrypt(messageBytes, serverPubKey, key)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
sync, err := client.Sync(context.TODO(), &mgmtProto.EncryptedMessage{
|
|
|
|
WgPubKey: key.PublicKey().String(),
|
|
|
|
Body: encryptedBytes,
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
encryptedResponse := &mgmtProto.EncryptedMessage{}
|
|
|
|
err = sync.RecvMsg(encryptedResponse)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:23:24 +02:00
|
|
|
decryptedBytes, err := encryption.Decrypt(encryptedResponse.Body, serverPubKey, key)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
resp := &mgmtProto.SyncResponse{}
|
|
|
|
err = pb.Unmarshal(decryptedBytes, resp)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
Expect(resp.Peers).To(HaveLen(2))
|
|
|
|
Expect(resp.Peers).To(ContainElements(key1.PublicKey().String(), key2.PublicKey().String()))
|
2021-07-17 14:38:59 +02:00
|
|
|
|
|
|
|
})
|
|
|
|
})
|
2021-07-22 10:28:00 +02:00
|
|
|
|
|
|
|
Context("when there is a new peer registered", func() {
|
|
|
|
Specify("an update is returned", func() {
|
|
|
|
// register only a single peer
|
|
|
|
key, _ := wgtypes.GenerateKey()
|
|
|
|
registerPeerWithValidSetupKey(key, client)
|
|
|
|
|
|
|
|
messageBytes, err := pb.Marshal(&mgmtProto.SyncRequest{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:23:24 +02:00
|
|
|
encryptedBytes, err := encryption.Encrypt(messageBytes, serverPubKey, key)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
sync, err := client.Sync(context.TODO(), &mgmtProto.EncryptedMessage{
|
|
|
|
WgPubKey: key.PublicKey().String(),
|
|
|
|
Body: encryptedBytes,
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
// after the initial sync call we have 0 peer updates
|
|
|
|
encryptedResponse := &mgmtProto.EncryptedMessage{}
|
|
|
|
err = sync.RecvMsg(encryptedResponse)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:23:24 +02:00
|
|
|
decryptedBytes, err := encryption.Decrypt(encryptedResponse.Body, serverPubKey, key)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
resp := &mgmtProto.SyncResponse{}
|
|
|
|
err = pb.Unmarshal(decryptedBytes, resp)
|
|
|
|
Expect(resp.Peers).To(HaveLen(0))
|
|
|
|
|
|
|
|
wg := sync2.WaitGroup{}
|
|
|
|
wg.Add(1)
|
|
|
|
|
|
|
|
// continue listening on updates for a peer
|
|
|
|
go func() {
|
|
|
|
err = sync.RecvMsg(encryptedResponse)
|
|
|
|
|
2021-07-22 15:23:24 +02:00
|
|
|
decryptedBytes, err = encryption.Decrypt(encryptedResponse.Body, serverPubKey, key)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
resp = &mgmtProto.SyncResponse{}
|
|
|
|
err = pb.Unmarshal(decryptedBytes, resp)
|
|
|
|
wg.Done()
|
|
|
|
|
|
|
|
}()
|
|
|
|
|
|
|
|
// register a new peer
|
|
|
|
key1, _ := wgtypes.GenerateKey()
|
|
|
|
registerPeerWithValidSetupKey(key1, client)
|
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
Expect(resp.Peers).To(ContainElements(key1.PublicKey().String()))
|
|
|
|
Expect(resp.Peers).To(HaveLen(1))
|
|
|
|
})
|
|
|
|
})
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when calling GetServerKey endpoint", func() {
|
|
|
|
Specify("a public Wireguard key of the service is returned", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
resp, err := client.GetServerKey(context.TODO(), &mgmtProto.Empty{})
|
|
|
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
Expect(resp).ToNot(BeNil())
|
|
|
|
Expect(resp.Key).ToNot(BeNil())
|
|
|
|
Expect(resp.ExpiresAt).ToNot(BeNil())
|
|
|
|
|
|
|
|
//check if the key is a valid Wireguard key
|
|
|
|
key, err := wgtypes.ParseKey(resp.Key)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
Expect(key).ToNot(BeNil())
|
|
|
|
|
|
|
|
})
|
|
|
|
})
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when calling RegisterPeer endpoint", func() {
|
|
|
|
|
|
|
|
Context("with an invalid setup key", func() {
|
|
|
|
Specify("an error is returned", func() {
|
|
|
|
|
|
|
|
key, _ := wgtypes.GenerateKey()
|
2021-07-17 14:38:59 +02:00
|
|
|
resp, err := client.RegisterPeer(context.TODO(), &mgmtProto.RegisterPeerRequest{
|
|
|
|
Key: key.PublicKey().String(),
|
2021-07-22 10:28:00 +02:00
|
|
|
SetupKey: InvalidSetupKey,
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
Expect(resp).To(BeNil())
|
|
|
|
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
Context("with a valid setup key", func() {
|
|
|
|
It("a non error result is returned", func() {
|
|
|
|
|
|
|
|
key, _ := wgtypes.GenerateKey()
|
|
|
|
resp := registerPeerWithValidSetupKey(key, client)
|
|
|
|
|
2021-07-17 14:38:59 +02:00
|
|
|
Expect(resp).ToNot(BeNil())
|
|
|
|
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
Context("when there are 50 peers registered under one account", func() {
|
|
|
|
Context("when there are 10 more peers registered under the same account", func() {
|
|
|
|
Specify("all of the 50 peers will get updates of 10 newly registered peers", func() {
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
initialPeers := 20
|
|
|
|
additionalPeers := 10
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
var peers []wgtypes.Key
|
|
|
|
for i := 0; i < initialPeers; i++ {
|
|
|
|
key, _ := wgtypes.GenerateKey()
|
|
|
|
registerPeerWithValidSetupKey(key, client)
|
|
|
|
peers = append(peers, key)
|
|
|
|
}
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
wg := sync2.WaitGroup{}
|
|
|
|
wg.Add(initialPeers + initialPeers*additionalPeers)
|
2021-07-22 15:53:15 +02:00
|
|
|
|
|
|
|
var clients []mgmtProto.ManagementService_SyncClient
|
2021-07-22 10:28:00 +02:00
|
|
|
for _, peer := range peers {
|
|
|
|
messageBytes, err := pb.Marshal(&mgmtProto.SyncRequest{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-22 15:23:24 +02:00
|
|
|
encryptedBytes, err := encryption.Encrypt(messageBytes, serverPubKey, peer)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 15:53:15 +02:00
|
|
|
// open stream
|
|
|
|
sync, err := client.Sync(context.TODO(), &mgmtProto.EncryptedMessage{
|
|
|
|
WgPubKey: peer.PublicKey().String(),
|
|
|
|
Body: encryptedBytes,
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
clients = append(clients, sync)
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
// receive stream
|
|
|
|
peer := peer
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
encryptedResponse := &mgmtProto.EncryptedMessage{}
|
|
|
|
err = sync.RecvMsg(encryptedResponse)
|
2021-07-22 15:53:15 +02:00
|
|
|
if err != nil {
|
2021-07-22 10:28:00 +02:00
|
|
|
break
|
|
|
|
}
|
2021-07-22 15:23:24 +02:00
|
|
|
decryptedBytes, err := encryption.Decrypt(encryptedResponse.Body, serverPubKey, peer)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
resp := &mgmtProto.SyncResponse{}
|
|
|
|
err = pb.Unmarshal(decryptedBytes, resp)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
wg.Done()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
for i := 0; i < additionalPeers; i++ {
|
|
|
|
key, _ := wgtypes.GenerateKey()
|
|
|
|
registerPeerWithValidSetupKey(key, client)
|
|
|
|
rand.Seed(time.Now().UnixNano())
|
|
|
|
n := rand.Intn(500)
|
|
|
|
time.Sleep(time.Duration(n) * time.Millisecond)
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Wait()
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 15:53:15 +02:00
|
|
|
for _, syncClient := range clients {
|
|
|
|
err := syncClient.CloseSend()
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
}
|
|
|
|
|
2021-07-17 14:38:59 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
func registerPeerWithValidSetupKey(key wgtypes.Key, client mgmtProto.ManagementServiceClient) *mgmtProto.RegisterPeerResponse {
|
|
|
|
|
|
|
|
resp, err := client.RegisterPeer(context.TODO(), &mgmtProto.RegisterPeerRequest{
|
|
|
|
Key: key.PublicKey().String(),
|
|
|
|
SetupKey: ValidSetupKey,
|
|
|
|
})
|
|
|
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
return resp
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func createRawClient(addr string) (mgmtProto.ManagementServiceClient, *grpc.ClientConn) {
|
2021-07-17 14:51:16 +02:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
defer cancel()
|
2021-07-17 14:38:59 +02:00
|
|
|
conn, err := grpc.DialContext(ctx, addr, grpc.WithInsecure(),
|
|
|
|
grpc.WithBlock(),
|
|
|
|
grpc.WithKeepaliveParams(keepalive.ClientParameters{
|
2021-07-17 14:51:16 +02:00
|
|
|
Time: 10 * time.Second,
|
2021-07-17 14:38:59 +02:00
|
|
|
Timeout: 2 * time.Second,
|
|
|
|
}))
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
|
2021-07-22 10:28:00 +02:00
|
|
|
return mgmtProto.NewManagementServiceClient(conn), conn
|
2021-07-17 14:38:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func startServer(dataDir string) (*grpc.Server, net.Listener) {
|
|
|
|
lis, err := net.Listen("tcp", ":0")
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
s := grpc.NewServer()
|
|
|
|
server, err := mgmt.NewServer(dataDir)
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
mgmtProto.RegisterManagementServiceServer(s, server)
|
|
|
|
go func() {
|
|
|
|
if err := s.Serve(lis); err != nil {
|
2021-07-22 10:28:00 +02:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2021-07-17 14:38:59 +02:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
return s, lis
|
|
|
|
}
|