-
Notifications
You must be signed in to change notification settings - Fork 443
/
config_test.go
95 lines (88 loc) · 2.24 KB
/
config_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package memberlist
import (
"net"
"testing"
)
func Test_IsValidAddressDefaults(t *testing.T) {
tests := []string{
"127.0.0.1",
"127.0.0.5",
"10.0.0.9",
"172.16.0.7",
"192.168.2.1",
"fe80::aede:48ff:fe00:1122",
"::1",
}
config := DefaultLANConfig()
for _, ip := range tests {
localV4 := net.ParseIP(ip)
if err := config.IPAllowed(localV4); err != nil {
t.Fatalf("IP %s Localhost Should be accepted for LAN", ip)
}
}
config = DefaultWANConfig()
for _, ip := range tests {
localV4 := net.ParseIP(ip)
if err := config.IPAllowed(localV4); err != nil {
t.Fatalf("IP %s Localhost Should be accepted for WAN", ip)
}
}
}
func Test_IsValidAddressOverride(t *testing.T) {
t.Parallel()
cases := []struct {
name string
allow []string
success []string
fail []string
}{
{
name: "Default, nil allows all",
allow: nil,
success: []string{"127.0.0.5", "10.0.0.9", "192.168.1.7", "::1"},
fail: []string{},
},
{
name: "Only IPv4",
allow: []string{"0.0.0.0/0"},
success: []string{"127.0.0.5", "10.0.0.9", "192.168.1.7"},
fail: []string{"fe80::38bc:4dff:fe62:b1ae", "::1"},
},
{
name: "Only IPv6",
allow: []string{"::0/0"},
success: []string{"fe80::38bc:4dff:fe62:b1ae", "::1"},
fail: []string{"127.0.0.5", "10.0.0.9", "192.168.1.7"},
},
{
name: "Only 127.0.0.0/8 and ::1",
allow: []string{"::1/128", "127.0.0.0/8"},
success: []string{"127.0.0.5", "::1"},
fail: []string{"::2", "178.250.0.187", "10.0.0.9", "192.168.1.7", "fe80::38bc:4dff:fe62:b1ae"},
},
}
for _, testCase := range cases {
t.Run(testCase.name, func(t *testing.T) {
config := DefaultLANConfig()
var err error
config.CIDRsAllowed, err = ParseCIDRs(testCase.allow)
if err != nil {
t.Fatalf("failed parsing %s", testCase.allow)
}
for _, ips := range testCase.success {
ip := net.ParseIP(ips)
if err := config.IPAllowed(ip); err != nil {
t.Fatalf("Test case with %s should pass", ip)
}
}
for _, ips := range testCase.fail {
ip := net.ParseIP(ips)
if err := config.IPAllowed(ip); err == nil {
t.Fatalf("Test case with %s should fail", ip)
}
}
})
}
}