2022-09-30 13:47:11 +02:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2024-07-03 11:33:02 +02:00
|
|
|
"context"
|
2022-09-30 13:47:11 +02:00
|
|
|
"net/netip"
|
|
|
|
"testing"
|
2024-10-23 12:05:02 +02:00
|
|
|
"time"
|
2023-05-19 11:42:25 +02:00
|
|
|
|
2024-10-23 12:05:02 +02:00
|
|
|
"github.com/stretchr/testify/assert"
|
2023-05-19 11:42:25 +02:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
|
|
|
nbdns "github.com/netbirdio/netbird/dns"
|
|
|
|
"github.com/netbirdio/netbird/management/server/activity"
|
2024-03-27 18:48:48 +01:00
|
|
|
nbgroup "github.com/netbirdio/netbird/management/server/group"
|
2023-11-28 13:45:26 +01:00
|
|
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
2024-08-07 10:52:31 +02:00
|
|
|
"github.com/netbirdio/netbird/management/server/telemetry"
|
2022-09-30 13:47:11 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
group1ID = "group1"
|
|
|
|
group2ID = "group2"
|
|
|
|
existingNSGroupName = "existing"
|
|
|
|
existingNSGroupID = "existingNSGroup"
|
|
|
|
nsGroupPeer1Key = "BhRPtynAAYRDy08+q4HTMsos8fs4plTP4NOSh7C1ry8="
|
|
|
|
nsGroupPeer2Key = "/yF0+vCfv+mRR5k0dca0TrGdO/oiNeAI58gToZm5NyI="
|
2022-11-03 18:39:37 +01:00
|
|
|
validDomain = "example.com"
|
|
|
|
invalidDomain = "dnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdns.com"
|
2024-01-25 09:50:27 +01:00
|
|
|
testUserID = "testingUser"
|
2022-09-30 13:47:11 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCreateNameServerGroup(t *testing.T) {
|
|
|
|
type input struct {
|
2023-10-19 19:32:42 +02:00
|
|
|
name string
|
|
|
|
description string
|
|
|
|
enabled bool
|
|
|
|
groups []string
|
|
|
|
nameServers []nbdns.NameServer
|
|
|
|
primary bool
|
|
|
|
domains []string
|
|
|
|
searchDomains bool
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
inputArgs input
|
|
|
|
shouldCreate bool
|
|
|
|
errFunc require.ErrorAssertionFunc
|
|
|
|
expectedNSGroup *nbdns.NameServerGroup
|
|
|
|
}{
|
|
|
|
{
|
2022-11-03 18:39:37 +01:00
|
|
|
name: "Create A NS Group With Primary Status",
|
2022-09-30 13:47:11 +02:00
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
|
|
|
groups: []string{group1ID},
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.NoError,
|
|
|
|
shouldCreate: true,
|
|
|
|
expectedNSGroup: &nbdns.NameServerGroup{
|
|
|
|
Name: "super",
|
|
|
|
Description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
Primary: true,
|
|
|
|
Groups: []string{group1ID},
|
|
|
|
NameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Enabled: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Create A NS Group With Domains",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
|
|
|
groups: []string{group1ID},
|
|
|
|
primary: false,
|
|
|
|
domains: []string{validDomain},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.NoError,
|
|
|
|
shouldCreate: true,
|
|
|
|
expectedNSGroup: &nbdns.NameServerGroup{
|
|
|
|
Name: "super",
|
|
|
|
Description: "super",
|
|
|
|
Primary: false,
|
|
|
|
Domains: []string{"example.com"},
|
2022-09-30 13:47:11 +02:00
|
|
|
Groups: []string{group1ID},
|
|
|
|
NameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Enabled: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Name Exist",
|
|
|
|
inputArgs: input{
|
|
|
|
name: existingNSGroupName,
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Name Is Small",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Name Is Large",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "1234567890123456789012345678901234567890extra",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Create A NS Group With No Nameservers Should Fail",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2024-02-19 14:29:20 +01:00
|
|
|
name: "Create A NS Group With More Than 3 Nameservers Should Fail",
|
2022-09-30 13:47:11 +02:00
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.3.3"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
2024-02-19 14:29:20 +01:00
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.4.4"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
2022-09-30 13:47:11 +02:00
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Groups Is Empty",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Group Doesn't Exist",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{"missingGroup"},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Group ID Is Invalid",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
groups: []string{""},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
2022-11-03 18:39:37 +01:00
|
|
|
{
|
|
|
|
name: "Should Not Create If No Domain Or Primary",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
|
|
|
groups: []string{group1ID},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Should Not Create If Domain List Is Invalid",
|
|
|
|
inputArgs: input{
|
|
|
|
name: "super",
|
|
|
|
description: "super",
|
|
|
|
groups: []string{group1ID},
|
|
|
|
domains: []string{invalidDomain},
|
|
|
|
nameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
t.Run(testCase.name, func(t *testing.T) {
|
|
|
|
am, err := createNSManager(t)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to create account manager")
|
|
|
|
}
|
|
|
|
|
|
|
|
account, err := initTestNSAccount(t, am)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to init testing account")
|
|
|
|
}
|
|
|
|
|
|
|
|
outNSGroup, err := am.CreateNameServerGroup(
|
2024-07-03 11:33:02 +02:00
|
|
|
context.Background(),
|
2022-09-30 13:47:11 +02:00
|
|
|
account.Id,
|
|
|
|
testCase.inputArgs.name,
|
|
|
|
testCase.inputArgs.description,
|
|
|
|
testCase.inputArgs.nameServers,
|
|
|
|
testCase.inputArgs.groups,
|
2022-11-03 18:39:37 +01:00
|
|
|
testCase.inputArgs.primary,
|
|
|
|
testCase.inputArgs.domains,
|
2022-09-30 13:47:11 +02:00
|
|
|
testCase.inputArgs.enabled,
|
2023-01-25 16:29:59 +01:00
|
|
|
userID,
|
2023-10-19 19:32:42 +02:00
|
|
|
testCase.inputArgs.searchDomains,
|
2022-09-30 13:47:11 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
testCase.errFunc(t, err)
|
|
|
|
|
|
|
|
if !testCase.shouldCreate {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// assign generated ID
|
|
|
|
testCase.expectedNSGroup.ID = outNSGroup.ID
|
|
|
|
|
|
|
|
if !testCase.expectedNSGroup.IsEqual(outNSGroup) {
|
|
|
|
t.Errorf("new nameserver group didn't match expected ns group:\nGot %#v\nExpected:%#v\n", outNSGroup, testCase.expectedNSGroup)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSaveNameServerGroup(t *testing.T) {
|
|
|
|
|
|
|
|
existingNSGroup := &nbdns.NameServerGroup{
|
|
|
|
ID: "testingNSGroup",
|
|
|
|
Name: "super",
|
|
|
|
Description: "super",
|
2022-11-03 18:39:37 +01:00
|
|
|
Primary: true,
|
2022-09-30 13:47:11 +02:00
|
|
|
NameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Groups: []string{group1ID},
|
|
|
|
Enabled: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
validGroups := []string{group2ID}
|
|
|
|
invalidGroups := []string{"nonExisting"}
|
2022-11-03 18:39:37 +01:00
|
|
|
disabledPrimary := false
|
|
|
|
validDomains := []string{validDomain}
|
|
|
|
invalidDomains := []string{invalidDomain}
|
|
|
|
|
2022-09-30 13:47:11 +02:00
|
|
|
validNameServerList := []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
invalidNameServerListLarge := []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.3.3"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
2024-02-19 14:29:20 +01:00
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.4.4"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
invalidID := "doesntExist"
|
|
|
|
validName := "12345678901234567890qw"
|
|
|
|
invalidNameLarge := "12345678901234567890qwertyuiopqwertyuiop1"
|
|
|
|
invalidNameSmall := ""
|
|
|
|
invalidNameExisting := existingNSGroupName
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
existingNSGroup *nbdns.NameServerGroup
|
|
|
|
newID *string
|
|
|
|
newName *string
|
2022-11-03 18:39:37 +01:00
|
|
|
newPrimary *bool
|
|
|
|
newDomains []string
|
2022-09-30 13:47:11 +02:00
|
|
|
newNSList []nbdns.NameServer
|
|
|
|
newGroups []string
|
|
|
|
skipCopying bool
|
|
|
|
shouldCreate bool
|
|
|
|
errFunc require.ErrorAssertionFunc
|
|
|
|
expectedNSGroup *nbdns.NameServerGroup
|
|
|
|
}{
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Config Name Server Group",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newName: &validName,
|
|
|
|
newGroups: validGroups,
|
2022-11-03 18:39:37 +01:00
|
|
|
newPrimary: &disabledPrimary,
|
|
|
|
newDomains: validDomains,
|
2022-09-30 13:47:11 +02:00
|
|
|
newNSList: validNameServerList,
|
|
|
|
errFunc: require.NoError,
|
|
|
|
shouldCreate: true,
|
|
|
|
expectedNSGroup: &nbdns.NameServerGroup{
|
|
|
|
ID: "testingNSGroup",
|
|
|
|
Name: validName,
|
2022-11-03 18:39:37 +01:00
|
|
|
Primary: false,
|
|
|
|
Domains: validDomains,
|
2022-09-30 13:47:11 +02:00
|
|
|
Description: "super",
|
|
|
|
NameServers: validNameServerList,
|
|
|
|
Groups: validGroups,
|
|
|
|
Enabled: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Name Is Small",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newName: &invalidNameSmall,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Name Is Large",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newName: &invalidNameLarge,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Name Exists",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newName: &invalidNameExisting,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If ID Don't Exist",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newID: &invalidID,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Nameserver List Is Small",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newNSList: []nbdns.NameServer{},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Nameserver List Is Large",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newNSList: invalidNameServerListLarge,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Groups List Is Empty",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newGroups: []string{},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Groups List Has Empty ID",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newGroups: []string{""},
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Groups List Has Non Existing Group ID",
|
2022-09-30 13:47:11 +02:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newGroups: invalidGroups,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
2022-11-03 18:39:37 +01:00
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Domains List Is Empty",
|
2022-11-03 18:39:37 +01:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newPrimary: &disabledPrimary,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Primary And Domains",
|
2022-11-03 18:39:37 +01:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newPrimary: &existingNSGroup.Primary,
|
|
|
|
newDomains: validDomains,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
|
|
|
{
|
2022-11-07 15:38:21 +01:00
|
|
|
name: "Should Not Config If Domains List Is Invalid",
|
2022-11-03 18:39:37 +01:00
|
|
|
existingNSGroup: existingNSGroup,
|
|
|
|
newPrimary: &disabledPrimary,
|
|
|
|
newDomains: invalidDomains,
|
|
|
|
errFunc: require.Error,
|
|
|
|
shouldCreate: false,
|
|
|
|
},
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
t.Run(testCase.name, func(t *testing.T) {
|
|
|
|
am, err := createNSManager(t)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to create account manager")
|
|
|
|
}
|
|
|
|
|
|
|
|
account, err := initTestNSAccount(t, am)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to init testing account")
|
|
|
|
}
|
|
|
|
|
|
|
|
account.NameServerGroups[testCase.existingNSGroup.ID] = testCase.existingNSGroup
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
err = am.Store.SaveAccount(context.Background(), account)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error("account should be saved")
|
|
|
|
}
|
|
|
|
|
|
|
|
var nsGroupToSave *nbdns.NameServerGroup
|
|
|
|
|
|
|
|
if !testCase.skipCopying {
|
|
|
|
nsGroupToSave = testCase.existingNSGroup.Copy()
|
|
|
|
|
|
|
|
if testCase.newID != nil {
|
|
|
|
nsGroupToSave.ID = *testCase.newID
|
|
|
|
}
|
|
|
|
|
|
|
|
if testCase.newName != nil {
|
|
|
|
nsGroupToSave.Name = *testCase.newName
|
|
|
|
}
|
|
|
|
|
|
|
|
if testCase.newGroups != nil {
|
|
|
|
nsGroupToSave.Groups = testCase.newGroups
|
|
|
|
}
|
|
|
|
|
|
|
|
if testCase.newNSList != nil {
|
|
|
|
nsGroupToSave.NameServers = testCase.newNSList
|
|
|
|
}
|
2022-11-03 18:39:37 +01:00
|
|
|
|
|
|
|
if testCase.newPrimary != nil {
|
|
|
|
nsGroupToSave.Primary = *testCase.newPrimary
|
|
|
|
}
|
|
|
|
|
|
|
|
if testCase.newDomains != nil {
|
|
|
|
nsGroupToSave.Domains = testCase.newDomains
|
|
|
|
}
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
err = am.SaveNameServerGroup(context.Background(), account.Id, userID, nsGroupToSave)
|
2022-09-30 13:47:11 +02:00
|
|
|
|
|
|
|
testCase.errFunc(t, err)
|
|
|
|
|
|
|
|
if !testCase.shouldCreate {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
account, err = am.Store.GetAccount(context.Background(), account.Id)
|
2022-11-07 12:10:56 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2022-09-30 13:47:11 +02:00
|
|
|
savedNSGroup, saved := account.NameServerGroups[testCase.expectedNSGroup.ID]
|
|
|
|
require.True(t, saved)
|
|
|
|
|
|
|
|
if !testCase.expectedNSGroup.IsEqual(savedNSGroup) {
|
|
|
|
t.Errorf("new nameserver group didn't match expected group:\nGot %#v\nExpected:%#v\n", savedNSGroup, testCase.expectedNSGroup)
|
|
|
|
}
|
|
|
|
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDeleteNameServerGroup(t *testing.T) {
|
|
|
|
nsGroupID := "testingNSGroup"
|
|
|
|
|
|
|
|
testingNSGroup := &nbdns.NameServerGroup{
|
|
|
|
ID: nsGroupID,
|
|
|
|
Name: "super",
|
|
|
|
Description: "super",
|
|
|
|
NameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.2.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Groups: []string{group1ID},
|
|
|
|
Enabled: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
am, err := createNSManager(t)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to create account manager")
|
|
|
|
}
|
|
|
|
|
|
|
|
account, err := initTestNSAccount(t, am)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to init testing account")
|
|
|
|
}
|
|
|
|
|
|
|
|
account.NameServerGroups[testingNSGroup.ID] = testingNSGroup
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
err = am.Store.SaveAccount(context.Background(), account)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to save account")
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
err = am.DeleteNameServerGroup(context.Background(), account.Id, testingNSGroup.ID, userID)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error("deleting nameserver group failed with error: ", err)
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
savedAccount, err := am.Store.GetAccount(context.Background(), account.Id)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to retrieve saved account with error: ", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, found := savedAccount.NameServerGroups[testingNSGroup.ID]
|
|
|
|
if found {
|
|
|
|
t.Error("nameserver group shouldn't be found after delete")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetNameServerGroup(t *testing.T) {
|
|
|
|
|
|
|
|
am, err := createNSManager(t)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to create account manager")
|
|
|
|
}
|
|
|
|
|
|
|
|
account, err := initTestNSAccount(t, am)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to init testing account")
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
foundGroup, err := am.GetNameServerGroup(context.Background(), account.Id, testUserID, existingNSGroupID)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error("getting existing nameserver group failed with error: ", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if foundGroup == nil {
|
|
|
|
t.Error("got a nil group while getting nameserver group with ID")
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
_, err = am.GetNameServerGroup(context.Background(), account.Id, testUserID, "not existing")
|
2022-09-30 13:47:11 +02:00
|
|
|
if err == nil {
|
|
|
|
t.Error("getting not existing nameserver group should return error, got nil")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func createNSManager(t *testing.T) (*DefaultAccountManager, error) {
|
2023-11-10 16:33:13 +01:00
|
|
|
t.Helper()
|
2022-09-30 13:47:11 +02:00
|
|
|
store, err := createNSStore(t)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-02 15:11:32 +01:00
|
|
|
eventStore := &activity.InMemoryEventStore{}
|
2024-08-07 10:52:31 +02:00
|
|
|
|
|
|
|
metrics, err := telemetry.NewDefaultAppMetrics(context.Background())
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
return BuildManager(context.Background(), store, NewPeersUpdateManager(nil), nil, "", "netbird.selfhosted", eventStore, nil, false, MocIntegratedValidator{}, metrics)
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func createNSStore(t *testing.T) (Store, error) {
|
2023-11-10 16:33:13 +01:00
|
|
|
t.Helper()
|
2022-09-30 13:47:11 +02:00
|
|
|
dataDir := t.TempDir()
|
2024-10-10 12:35:03 +02:00
|
|
|
store, cleanUp, err := NewTestStoreFromSQL(context.Background(), "", dataDir)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-05-16 18:28:37 +02:00
|
|
|
t.Cleanup(cleanUp)
|
2022-09-30 13:47:11 +02:00
|
|
|
|
|
|
|
return store, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func initTestNSAccount(t *testing.T, am *DefaultAccountManager) (*Account, error) {
|
2023-11-10 16:33:13 +01:00
|
|
|
t.Helper()
|
2023-11-28 13:45:26 +01:00
|
|
|
peer1 := &nbpeer.Peer{
|
2022-09-30 13:47:11 +02:00
|
|
|
Key: nsGroupPeer1Key,
|
|
|
|
Name: "test-host1@netbird.io",
|
2023-11-28 13:45:26 +01:00
|
|
|
Meta: nbpeer.PeerSystemMeta{
|
2022-09-30 13:47:11 +02:00
|
|
|
Hostname: "test-host1@netbird.io",
|
|
|
|
GoOS: "linux",
|
|
|
|
Kernel: "Linux",
|
|
|
|
Core: "21.04",
|
|
|
|
Platform: "x86_64",
|
|
|
|
OS: "Ubuntu",
|
|
|
|
WtVersion: "development",
|
|
|
|
UIVersion: "development",
|
|
|
|
},
|
|
|
|
}
|
2023-11-28 13:45:26 +01:00
|
|
|
peer2 := &nbpeer.Peer{
|
2022-09-30 13:47:11 +02:00
|
|
|
Key: nsGroupPeer2Key,
|
|
|
|
Name: "test-host2@netbird.io",
|
2023-11-28 13:45:26 +01:00
|
|
|
Meta: nbpeer.PeerSystemMeta{
|
2022-09-30 13:47:11 +02:00
|
|
|
Hostname: "test-host2@netbird.io",
|
|
|
|
GoOS: "linux",
|
|
|
|
Kernel: "Linux",
|
|
|
|
Core: "21.04",
|
|
|
|
Platform: "x86_64",
|
|
|
|
OS: "Ubuntu",
|
|
|
|
WtVersion: "development",
|
|
|
|
UIVersion: "development",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
existingNSGroup := nbdns.NameServerGroup{
|
|
|
|
ID: existingNSGroupID,
|
|
|
|
Name: existingNSGroupName,
|
|
|
|
Description: "",
|
|
|
|
NameServers: []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("8.8.8.8"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("8.8.4.4"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Groups: []string{group1ID},
|
|
|
|
Enabled: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
accountID := "testingAcc"
|
2024-01-25 09:50:27 +01:00
|
|
|
userID := testUserID
|
2022-09-30 13:47:11 +02:00
|
|
|
domain := "example.com"
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
account := newAccountWithId(context.Background(), accountID, userID, domain)
|
2022-09-30 13:47:11 +02:00
|
|
|
|
|
|
|
account.NameServerGroups[existingNSGroup.ID] = &existingNSGroup
|
|
|
|
|
2024-03-27 18:48:48 +01:00
|
|
|
newGroup1 := &nbgroup.Group{
|
2023-01-17 17:34:40 +01:00
|
|
|
ID: group1ID,
|
|
|
|
Name: group1ID,
|
|
|
|
}
|
|
|
|
|
2024-03-27 18:48:48 +01:00
|
|
|
newGroup2 := &nbgroup.Group{
|
2023-01-17 17:34:40 +01:00
|
|
|
ID: group2ID,
|
|
|
|
Name: group2ID,
|
2022-09-30 13:47:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
account.Groups[newGroup1.ID] = newGroup1
|
|
|
|
account.Groups[newGroup2.ID] = newGroup2
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
err := am.Store.SaveAccount(context.Background(), account)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-07-03 11:33:02 +02:00
|
|
|
_, _, _, err = am.AddPeer(context.Background(), "", userID, peer1)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-07-03 11:33:02 +02:00
|
|
|
_, _, _, err = am.AddPeer(context.Background(), "", userID, peer2)
|
2022-09-30 13:47:11 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return account, nil
|
|
|
|
}
|
2023-08-16 11:25:38 +02:00
|
|
|
|
|
|
|
func TestValidateDomain(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
domain string
|
|
|
|
errFunc require.ErrorAssertionFunc
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Valid domain name with multiple labels",
|
|
|
|
domain: "123.example.com",
|
|
|
|
errFunc: require.NoError,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Valid domain name with hyphen",
|
|
|
|
domain: "test-example.com",
|
|
|
|
errFunc: require.NoError,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain name with double hyphen",
|
|
|
|
domain: "test--example.com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain name with only one label",
|
|
|
|
domain: "com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain name with a label exceeding 63 characters",
|
|
|
|
domain: "dnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdnsdns.com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain name starting with a hyphen",
|
|
|
|
domain: "-example.com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain name ending with a hyphen",
|
|
|
|
domain: "example.com-",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain with unicode",
|
|
|
|
domain: "example?,.com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain with space before top-level domain",
|
|
|
|
domain: "space .example.com",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid domain with trailing space",
|
|
|
|
domain: "example.com ",
|
|
|
|
errFunc: require.Error,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
t.Run(testCase.name, func(t *testing.T) {
|
|
|
|
testCase.errFunc(t, validateDomain(testCase.domain))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2024-10-23 12:05:02 +02:00
|
|
|
|
|
|
|
func TestNameServerAccountPeersUpdate(t *testing.T) {
|
|
|
|
manager, account, peer1, peer2, peer3 := setupNetworkMapTest(t)
|
|
|
|
|
|
|
|
var newNameServerGroupA *nbdns.NameServerGroup
|
|
|
|
var newNameServerGroupB *nbdns.NameServerGroup
|
|
|
|
|
|
|
|
err := manager.SaveGroups(context.Background(), account.Id, userID, []*nbgroup.Group{
|
|
|
|
{
|
|
|
|
ID: "groupA",
|
|
|
|
Name: "GroupA",
|
|
|
|
Peers: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ID: "groupB",
|
|
|
|
Name: "GroupB",
|
|
|
|
Peers: []string{peer1.ID, peer2.ID, peer3.ID},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
updMsg := manager.peersUpdateManager.CreateChannel(context.Background(), peer1.ID)
|
|
|
|
t.Cleanup(func() {
|
|
|
|
manager.peersUpdateManager.CloseChannel(context.Background(), peer1.ID)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Creating a nameserver group with a distribution group no peers should not update account peers
|
|
|
|
// and not send peer update
|
|
|
|
t.Run("creating nameserver group with distribution group no peers", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldNotReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
newNameServerGroupA, err = manager.CreateNameServerGroup(
|
|
|
|
context.Background(), account.Id, "nsGroupA", "nsGroupA", []nbdns.NameServer{{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
}},
|
|
|
|
[]string{"groupA"},
|
|
|
|
true, []string{}, true, userID, false,
|
|
|
|
)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldNotReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// saving a nameserver group with a distribution group with no peers should not update account peers
|
|
|
|
// and not send peer update
|
|
|
|
t.Run("saving nameserver group with distribution group no peers", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldNotReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
err = manager.SaveNameServerGroup(context.Background(), account.Id, userID, newNameServerGroupA)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldNotReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Creating a nameserver group with a distribution group no peers should update account peers and send peer update
|
|
|
|
t.Run("creating nameserver group with distribution group has peers", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
newNameServerGroupB, err = manager.CreateNameServerGroup(
|
|
|
|
context.Background(), account.Id, "nsGroupB", "nsGroupB", []nbdns.NameServer{{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.1"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
}},
|
|
|
|
[]string{"groupB"},
|
|
|
|
true, []string{}, true, userID, false,
|
|
|
|
)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldNotReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// saving a nameserver group with a distribution group with peers should update account peers and send peer update
|
|
|
|
t.Run("saving nameserver group with distribution group has peers", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
newNameServerGroupB.NameServers = []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("8.8.8.8"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
err = manager.SaveNameServerGroup(context.Background(), account.Id, userID, newNameServerGroupB)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// saving unchanged nameserver group should update account peers and not send peer update
|
|
|
|
t.Run("saving unchanged nameserver group", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldNotReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
newNameServerGroupB.NameServers = []nbdns.NameServer{
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("1.1.1.2"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
IP: netip.MustParseAddr("8.8.8.8"),
|
|
|
|
NSType: nbdns.UDPNameServerType,
|
|
|
|
Port: nbdns.DefaultDNSPort,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
err = manager.SaveNameServerGroup(context.Background(), account.Id, userID, newNameServerGroupB)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldNotReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Deleting a nameserver group should update account peers and send peer update
|
|
|
|
t.Run("deleting nameserver group", func(t *testing.T) {
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
peerShouldReceiveUpdate(t, updMsg)
|
|
|
|
close(done)
|
|
|
|
}()
|
|
|
|
|
|
|
|
err = manager.DeleteNameServerGroup(context.Background(), account.Id, newNameServerGroupB.ID, userID)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Error("timeout waiting for peerShouldReceiveUpdate")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|