2022-09-13 23:45:35 +03:00
|
|
|
//go:build darwin || freebsd || linux || openbsd
|
2021-05-21 14:55:42 +03:00
|
|
|
|
2019-03-01 20:03:22 +03:00
|
|
|
package dhcpd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net"
|
2022-10-14 15:29:44 +03:00
|
|
|
"net/netip"
|
2019-03-05 17:15:38 +03:00
|
|
|
"os"
|
2019-03-01 20:03:22 +03:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-10-19 19:28:18 +03:00
|
|
|
"github.com/AdguardTeam/golibs/testutil"
|
2019-12-03 19:24:30 +03:00
|
|
|
"github.com/stretchr/testify/assert"
|
2021-02-12 13:27:44 +03:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-10-21 20:42:00 +03:00
|
|
|
"golang.org/x/exp/slices"
|
2019-03-01 20:03:22 +03:00
|
|
|
)
|
|
|
|
|
2020-11-16 15:52:05 +03:00
|
|
|
func TestMain(m *testing.M) {
|
2022-10-27 16:11:36 +03:00
|
|
|
testutil.DiscardLogOutput(m)
|
2020-11-16 15:52:05 +03:00
|
|
|
}
|
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
func testNotify(flags uint32) {
|
2019-03-01 20:03:22 +03:00
|
|
|
}
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
// Leases database store/load.
|
2019-03-05 17:15:38 +03:00
|
|
|
func TestDB(t *testing.T) {
|
2020-07-03 18:20:01 +03:00
|
|
|
var err error
|
2022-09-13 23:45:35 +03:00
|
|
|
s := server{
|
2022-01-25 19:47:02 +03:00
|
|
|
conf: &ServerConfig{
|
2021-02-12 13:27:44 +03:00
|
|
|
DBFilePath: dbFilename,
|
|
|
|
},
|
|
|
|
}
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2022-09-13 23:45:35 +03:00
|
|
|
s.srv4, err = v4Create(&V4ServerConf{
|
2020-07-03 18:20:01 +03:00
|
|
|
Enabled: true,
|
2022-10-14 15:29:44 +03:00
|
|
|
RangeStart: netip.MustParseAddr("192.168.10.100"),
|
|
|
|
RangeEnd: netip.MustParseAddr("192.168.10.200"),
|
|
|
|
GatewayIP: netip.MustParseAddr("192.168.10.1"),
|
|
|
|
SubnetMask: netip.MustParseAddr("255.255.255.0"),
|
2020-07-03 18:20:01 +03:00
|
|
|
notify: testNotify,
|
2021-02-12 13:27:44 +03:00
|
|
|
})
|
2021-05-06 13:02:48 +03:00
|
|
|
require.NoError(t, err)
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
s.srv6, err = v6Create(V6ServerConf{})
|
2021-05-06 13:02:48 +03:00
|
|
|
require.NoError(t, err)
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2021-06-16 16:48:46 +03:00
|
|
|
leases := []*Lease{{
|
2021-05-06 13:02:48 +03:00
|
|
|
Expiry: time.Now().Add(time.Hour),
|
|
|
|
Hostname: "static-1.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
2023-03-23 16:52:01 +03:00
|
|
|
IP: netip.MustParseAddr("192.168.10.100"),
|
2021-02-12 13:27:44 +03:00
|
|
|
}, {
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "static-2.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xBB},
|
2023-03-23 16:52:01 +03:00
|
|
|
IP: netip.MustParseAddr("192.168.10.101"),
|
2021-02-12 13:27:44 +03:00
|
|
|
}}
|
2021-02-04 15:12:34 +03:00
|
|
|
|
|
|
|
srv4, ok := s.srv4.(*v4Server)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.True(t, ok)
|
2021-02-04 15:12:34 +03:00
|
|
|
|
2021-06-16 16:48:46 +03:00
|
|
|
err = srv4.addLease(leases[0])
|
2021-05-06 13:02:48 +03:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.srv4.AddStaticLease(leases[1])
|
|
|
|
require.NoError(t, err)
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2021-06-16 16:48:46 +03:00
|
|
|
err = s.dbStore()
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-10-22 11:58:18 +03:00
|
|
|
testutil.CleanupAndRequireSuccess(t, func() (err error) { return os.Remove(dbFilename) })
|
2021-06-16 16:48:46 +03:00
|
|
|
|
|
|
|
err = s.srv4.ResetLeases(nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.dbLoad()
|
|
|
|
require.NoError(t, err)
|
2019-03-05 17:15:38 +03:00
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
ll := s.srv4.GetLeases(LeasesAll)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.Len(t, ll, len(leases))
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, leases[1].HWAddr, ll[0].HWAddr)
|
|
|
|
assert.Equal(t, leases[1].IP, ll[0].IP)
|
2023-04-10 11:17:05 +03:00
|
|
|
assert.True(t, ll[0].IsStatic)
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, leases[0].HWAddr, ll[1].HWAddr)
|
|
|
|
assert.Equal(t, leases[0].IP, ll[1].IP)
|
|
|
|
assert.Equal(t, leases[0].Expiry.Unix(), ll[1].Expiry.Unix())
|
2019-03-05 17:15:38 +03:00
|
|
|
}
|
2019-07-17 11:55:21 +03:00
|
|
|
|
2019-12-03 19:24:30 +03:00
|
|
|
func TestNormalizeLeases(t *testing.T) {
|
2021-02-12 13:27:44 +03:00
|
|
|
dynLeases := []*Lease{{
|
|
|
|
HWAddr: net.HardwareAddr{1, 2, 3, 4},
|
|
|
|
}, {
|
|
|
|
HWAddr: net.HardwareAddr{1, 2, 3, 5},
|
|
|
|
}}
|
|
|
|
|
|
|
|
staticLeases := []*Lease{{
|
|
|
|
HWAddr: net.HardwareAddr{1, 2, 3, 4},
|
2023-03-23 16:52:01 +03:00
|
|
|
IP: netip.MustParseAddr("0.2.3.4"),
|
2021-02-12 13:27:44 +03:00
|
|
|
}, {
|
|
|
|
HWAddr: net.HardwareAddr{2, 2, 3, 4},
|
|
|
|
}}
|
2019-12-03 19:24:30 +03:00
|
|
|
|
2020-10-30 19:18:51 +03:00
|
|
|
leases := normalizeLeases(staticLeases, dynLeases)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.Len(t, leases, 3)
|
2019-12-03 19:24:30 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, leases[0].HWAddr, dynLeases[0].HWAddr)
|
|
|
|
assert.Equal(t, leases[0].IP, staticLeases[0].IP)
|
|
|
|
assert.Equal(t, leases[1].HWAddr, staticLeases[1].HWAddr)
|
|
|
|
assert.Equal(t, leases[2].HWAddr, dynLeases[1].HWAddr)
|
2019-12-03 19:24:30 +03:00
|
|
|
}
|
2021-09-07 18:33:23 +03:00
|
|
|
|
2021-10-19 19:28:18 +03:00
|
|
|
func TestV4Server_badRange(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
2022-10-14 15:29:44 +03:00
|
|
|
gatewayIP netip.Addr
|
|
|
|
subnetMask netip.Addr
|
2022-01-25 19:47:02 +03:00
|
|
|
wantErrMsg string
|
2021-10-19 19:28:18 +03:00
|
|
|
}{{
|
2022-10-14 15:29:44 +03:00
|
|
|
name: "gateway_in_range",
|
|
|
|
gatewayIP: netip.MustParseAddr("192.168.10.120"),
|
|
|
|
subnetMask: netip.MustParseAddr("255.255.255.0"),
|
2021-10-19 19:28:18 +03:00
|
|
|
wantErrMsg: "dhcpv4: gateway ip 192.168.10.120 in the ip range: " +
|
|
|
|
"192.168.10.20-192.168.10.200",
|
|
|
|
}, {
|
2022-10-14 15:29:44 +03:00
|
|
|
name: "outside_range_start",
|
|
|
|
gatewayIP: netip.MustParseAddr("192.168.10.1"),
|
|
|
|
subnetMask: netip.MustParseAddr("255.255.255.240"),
|
2021-10-19 19:28:18 +03:00
|
|
|
wantErrMsg: "dhcpv4: range start 192.168.10.20 is outside network " +
|
|
|
|
"192.168.10.1/28",
|
2022-01-25 19:47:02 +03:00
|
|
|
}, {
|
2022-10-14 15:29:44 +03:00
|
|
|
name: "outside_range_end",
|
|
|
|
gatewayIP: netip.MustParseAddr("192.168.10.1"),
|
|
|
|
subnetMask: netip.MustParseAddr("255.255.255.224"),
|
2021-10-19 19:28:18 +03:00
|
|
|
wantErrMsg: "dhcpv4: range end 192.168.10.200 is outside network " +
|
|
|
|
"192.168.10.1/27",
|
|
|
|
}}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
conf := V4ServerConf{
|
|
|
|
Enabled: true,
|
2022-10-14 15:29:44 +03:00
|
|
|
RangeStart: netip.MustParseAddr("192.168.10.20"),
|
|
|
|
RangeEnd: netip.MustParseAddr("192.168.10.200"),
|
2021-10-19 19:28:18 +03:00
|
|
|
GatewayIP: tc.gatewayIP,
|
|
|
|
SubnetMask: tc.subnetMask,
|
|
|
|
notify: testNotify,
|
|
|
|
}
|
|
|
|
|
2022-09-13 23:45:35 +03:00
|
|
|
_, err := v4Create(&conf)
|
2021-10-19 19:28:18 +03:00
|
|
|
testutil.AssertErrorMsg(t, tc.wantErrMsg, err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-07 18:33:23 +03:00
|
|
|
// cloneUDPAddr returns a deep copy of a.
|
2021-09-30 18:28:19 +03:00
|
|
|
func cloneUDPAddr(a *net.UDPAddr) (clone *net.UDPAddr) {
|
2021-09-07 18:33:23 +03:00
|
|
|
return &net.UDPAddr{
|
2022-10-21 20:42:00 +03:00
|
|
|
IP: slices.Clone(a.IP),
|
2021-09-07 18:33:23 +03:00
|
|
|
Port: a.Port,
|
|
|
|
Zone: a.Zone,
|
|
|
|
}
|
|
|
|
}
|