Published
- 5 min read
Raspberry Pi for QA
On a previous company the QA team needed to perform some scenarios that were difficult to reproduce, for instance force a buffering event. Their setup require deep technical understanding of Linux. In order to ease its world, I decided to create a neat service running on a Raspberry Pi.
The problems
Concretely, the scenarios that the QA needed to cover were:
Restrict the network performance
The test that the QA team were performing, included provoking buffering issues in media players. They found issues on how this could be achieved: in Chrome it could be achieved through Developer Tools, but what about mobile devices, or even worst: some weird embedded media players?
Access Geo-blocked content Since the company had customers world-wide and some of them used Geo-blocked content, they need to access those contents through the use of VPNs. This required spending some time configuration the VPN clients on their side
IP Blocking There were some scenarios (I cannot remember right now) that required to block the connection to some IP. This is really easy to do on a UNIX machine with iptables, but good luck doing that on Windows.
Modify DNS records It were some scenario where they needed to change the DNS records. For instance: www.google.com -> 192.168.1.100. I don’t remember the rationale to this requirement :(
Analyse HTTPS Traffic In the majority of the environments the connections with the company server’s were made with HTTPS. This caused a little bit of headache while analysing the HTTP traffic.
The solutions …
Since most of the scenarios require some networking tweaks, the obvious decision was Linux, even better: Raspberry Pi. The project consist in a NodeJS Express application that executed scripts on the RaspberryPi.
The raspberry PI have two network interfaces: the LAN and the WiFi. The configuration is setup in the interfaces file:
auto lo
iface lo inet loopback
auto eth0
auto wlan0
#static ethernet conf
iface eth0 inet static
address 192.168.1.100
netmask 255.255.255.0
gateway 192.168.1.1
dns-nameservers 8.8.4.4
iface wlan0 inet static
address 192.168.150.1
netmask 255.255.255.0
In the WiFi interface hostapd service is configured in order to serve a WiFi connection. This will configure the traffic outgoing traffic from wlan0 to eth0.
Playing with tc and ifb
The network performance restrictions can be applied using the tc command and the ifb module on Linux. This module redirects the traffic from one real network interface to a virtual one. When the traffic passes through the ifb0 interface the token bucket (htb) applies the network configuration
#Enable ifb module and setup the ifb0 interface
modprobe ifb numifbs=1 && ip link set dev ifb0 up
#Create a device that redirects all the traffic
#from eth0 to ifb0
tc qdisc add dev eth0 handle ffff: ingress && \
tc filter add dev eth0 parent ffff: protocol ip u32 \
match u32 0 0 action mirred egress redirect dev ifb0
#Modify the token bucket configuration
tc qdisc add dev ifb0 root handle 1: htb default 10 && \
tc class add dev ifb0 parent 1: classid 1:1 htb rate 1mb && \
tc class add dev ifb0 parent 1:1 classid 1:10 htb rate 1mb
OpenVPN and Iptables
In order to be able to avoid the Geo-blocking of contents, the company provide us a commercial VPN. This consisted on a series of OpenVPN configuration scripts for multiple countries. Therefore, the app only needs to call openvpn:
openvpn ALBANIA-TCP.ovpn
It’s really easy to block an IP on a Linux box, the app only needs to call the iptables, for example:
iptables -I FORWARD -s 192.168.150.0/24 -d 8.8.8.8 -j DROP
This snippet blocks the outgoing connections to 8.8.8.8 that goes out from the WiFi network
Networking stuff …
Regarding DNS Spoofing, it’s a little bit trickier, however the dnsmasq service is very useful in that situation.
dnsmasq schema
The clients connected to the WiFi will resolve the DNS queries thanks to the dnsmasq client listening to incoming connections. This service is able to perform custom DNS resolutions based on a file that works like a /etc/hosts file.
192.168.56.1 ubuntu.tecmint.lan
192.168.56.10 centos.tecmint.lan
Regarding the HTTPS Sniffer, the implemented solution implies having the SSL certificates from the company installed in a reverse proxy that terminates the SSL connection and forwards the HTTP traffic to an internal server that stores the decrypted requests on a cache.
HTTPS sniffer setup
This cache can be queried from the GUI to inspect the requests. There’s an additional implementation that allows to run pcap capture software directly on the network interface to inspect the packets from the UI.
This environment requires a little setup, that is the configuration of the proxy on the computers of the QA team.
Finally, the QA team were able to save a lot of time setting up their scenarios. With this app it’s only a matter of clicking buttons instead of executing weird scripts
The code
Don’t blame too much on the code quality: the whole project was implemented few years ago and as a side project on one or two weekends https://github.com/adriangalera/rpitester Here’s a video of me presenting that project ;)