mirror of
https://github.com/netbirdio/netbird.git
synced 2025-02-23 21:51:48 +01:00
* created InitializePeer and ClosePeerConnection functions * feature: simplify peer stopping * chore: remove unused code * feature: basic management service implementation (#44) * feat: basic management service implementation [FAILING TESTS] * test: fix healthcheck test * test: #39 add peer registration endpoint test * feat: #39 add setup key handling * feat: #39 add peer management store persistence * refactor: extract config read/write to the utility package * refactor: move file contents copy to the utility package * refactor: use Accounts instead of Users in the Store * feature: add management server Docker file * refactor: introduce datadir instead of config * chore: use filepath.Join to concat filepaths instead of string concat * refactor: move stop channel to the root * refactor: move stop channel to the root * review: fix PR review notes Co-authored-by: braginini <hello@wiretrustee.com> * Handle read config file errors * feature: add letsencrypt support to the management service * fix: lint warnings * chore: change default datadir * refactor: set default flags in code not Dockerfile * chore: remove unused code * Added RemovePeer and centralized configureDevice code * remove peer from the wg interface when closing proxy * remove config file * add iface tests * fix tests, validate if file exists before removing it * removed unused functions UpdateListenPort and ConfigureWithKeyGen * Ensure we don't wait for timeout when closing * Rename ClosePeerConnection to RemovePeerConnection * Avoid returning on uapi Accept failures * Added engine tests * Remove extra add address code * Adding iface.Close * Ensure Close the interface and disable parallel test execution * check err var when listing interfaces * chore: add synchronisation to peer management * chore: add connection status to track peer connection * refactor: remove unused code Co-authored-by: braginini <hello@wiretrustee.com> Co-authored-by: Mikhail Bragin <bangvalo@gmail.com>
164 lines
3.5 KiB
Go
164 lines
3.5 KiB
Go
package connection
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
ice "github.com/pion/ice/v2"
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/wiretrustee/wiretrustee/iface"
|
|
sig "github.com/wiretrustee/wiretrustee/signal"
|
|
"golang.zx2c4.com/wireguard/wgctrl"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
var engine *Engine
|
|
var testKey wgtypes.Key
|
|
var testPeer Peer
|
|
|
|
const ifaceName = "utun9991"
|
|
|
|
func Test_Start(t *testing.T) {
|
|
level, _ := log.ParseLevel("Debug")
|
|
log.SetLevel(level)
|
|
|
|
var err error
|
|
testKey, err = wgtypes.GenerateKey()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
iceUrl, err := ice.ParseURL("stun:stun.wiretrustee.com:3468")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
var stunURLs = []*ice.URL{iceUrl}
|
|
|
|
iFaceBlackList := make(map[string]struct{})
|
|
|
|
signalClient, err := sig.NewClient(ctx, "signal.wiretrustee.com:10000", testKey)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
engine = NewEngine(signalClient, stunURLs, ifaceName, "10.99.91.1/24", iFaceBlackList)
|
|
|
|
var emptyPeer []Peer
|
|
err = engine.Start(testKey, emptyPeer)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
wg, err := wgctrl.New()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer wg.Close()
|
|
|
|
_, err = wg.Device(ifaceName)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestEngine_InitializePeerWithoutRemote(t *testing.T) {
|
|
tmpKey, err := wgtypes.GenerateKey()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
testPeer = Peer{
|
|
tmpKey.PublicKey().String(),
|
|
"10.99.91.2/32",
|
|
}
|
|
go engine.InitializePeer(iface.WgPort, testKey, testPeer)
|
|
// Let the connections initialize
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
defer cancel()
|
|
for {
|
|
status := engine.GetPeerConnectionStatus(testPeer.WgPubKey)
|
|
err = ctx.Err()
|
|
if (status != nil && *status == StatusConnecting) || err != nil {
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
//success
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestEngine_Initialize2PeersWithoutRemote(t *testing.T) {
|
|
tmpKey1, err := wgtypes.GenerateKey()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tmpKey2, err := wgtypes.GenerateKey()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
testPeer1 := Peer{
|
|
tmpKey1.PublicKey().String(),
|
|
"10.99.91.2/32",
|
|
}
|
|
testPeer2 := Peer{
|
|
tmpKey2.PublicKey().String(),
|
|
"10.99.91.3/32",
|
|
}
|
|
go engine.InitializePeer(iface.WgPort, testKey, testPeer1)
|
|
go engine.InitializePeer(iface.WgPort, testKey, testPeer2)
|
|
// Let the connections initialize
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
defer cancel()
|
|
for {
|
|
status1 := engine.GetPeerConnectionStatus(testPeer1.WgPubKey)
|
|
status2 := engine.GetPeerConnectionStatus(testPeer2.WgPubKey)
|
|
err = ctx.Err()
|
|
if (status1 != nil && status2 != nil) || err != nil {
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if *status1 == StatusConnecting && *status2 == StatusConnecting {
|
|
//success
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestEngine_RemovePeerConnectionWithoutRemote(t *testing.T) {
|
|
|
|
// Let the connections initialize
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
defer cancel()
|
|
for {
|
|
status := engine.GetPeerConnectionStatus(testPeer.WgPubKey)
|
|
err := ctx.Err()
|
|
if (status != nil && *status == StatusConnecting) || err != nil {
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
break
|
|
}
|
|
}
|
|
|
|
// Let the connections close
|
|
err := engine.RemovePeerConnection(testPeer)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
status := engine.GetPeerConnectionStatus(testPeer.WgPubKey)
|
|
if status != nil {
|
|
t.Fatal(fmt.Errorf("wrong status %v", status))
|
|
}
|
|
}
|
|
|
|
func Test_CloseInterface(t *testing.T) {
|
|
err := iface.Close()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|