mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-25 14:35:48 +03:00
7fab31beae
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master Closes #2508. Squashed commit of the following: commit 5b9d33f9cd352756831f63e34c4aea48674628c1 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 20 17:15:17 2021 +0300 util: replace net.IPNet with pointer commit 680126de7d59464077f9edf1bbaa925dd3fcee19 Merge: d3ba6a6c5a50efad
Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 20 17:02:41 2021 +0300 Merge branch 'master' into 2508-ip-conversion-vol2 commit d3ba6a6cdd01c0aa736418fdb86ed40120169fe9 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 19 18:29:54 2021 +0300 all: remove last conversion commit 88b63f11a6c3f8705d7fa0c448c50dd646cc9214 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 19 14:12:45 2021 +0300 all: improve code quality commit 71af60c70a0dbaf55e2221023d6d2e4993c9e9a7 Merge: 98af37849f75725d
Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 17:13:27 2021 +0300 Merge branch 'master' into 2508-ip-conversion-vol2 commit 98af3784ce44d0993d171653c13d6e83bb8d1e6a Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 16:32:53 2021 +0300 all: log changes commit e99595a172bae1e844019d344544be84ddd65e4e Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 16:06:49 2021 +0300 all: fix or remove remaining net.IP <-> string conversions commit 7fd0634ce945f7e4c9b856684c5199f8a84a543e Author: Eugene Burkov <e.burkov@adguard.com> Date: Fri Jan 15 15:36:17 2021 +0300 all: remove redundant net.IP <-> string converions commit 5df8af030421237d41b67ed659f83526cc258199 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Jan 14 16:35:25 2021 +0300 stats: remove redundant net.IP <-> string conversion commit fbe4e3fc015e6898063543a90c04401d76dbb18f Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Jan 14 16:20:35 2021 +0300 querylog: remove redundant net.IP <-> string conversion
238 lines
7.5 KiB
Go
238 lines
7.5 KiB
Go
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
|
|
|
package dhcpd
|
|
|
|
import (
|
|
"net"
|
|
"testing"
|
|
|
|
"github.com/insomniacslk/dhcp/dhcpv4"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func notify4(flags uint32) {
|
|
}
|
|
|
|
func TestV4StaticLeaseAddRemove(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
s, err := v4Create(conf)
|
|
assert.Nil(t, err)
|
|
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Empty(t, ls)
|
|
|
|
// add static lease
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// try to add the same static lease - fail
|
|
assert.NotNil(t, s.AddStaticLease(l))
|
|
|
|
// check
|
|
ls = s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 1)
|
|
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
|
|
|
|
// try to remove static lease - fail
|
|
l.IP = net.IP{192, 168, 10, 110}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.NotNil(t, s.RemoveStaticLease(l))
|
|
|
|
// remove static lease
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.RemoveStaticLease(l))
|
|
|
|
// check
|
|
ls = s.GetLeases(LeasesStatic)
|
|
assert.Empty(t, ls)
|
|
}
|
|
|
|
func TestV4StaticLeaseAddReplaceDynamic(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
|
|
// add dynamic lease
|
|
ld := Lease{}
|
|
ld.IP = net.IP{192, 168, 10, 150}
|
|
ld.HWAddr, _ = net.ParseMAC("11:aa:aa:aa:aa:aa")
|
|
s.addLease(&ld)
|
|
|
|
// add dynamic lease
|
|
{
|
|
ld := Lease{}
|
|
ld.IP = net.IP{192, 168, 10, 151}
|
|
ld.HWAddr, _ = net.ParseMAC("22:aa:aa:aa:aa:aa")
|
|
s.addLease(&ld)
|
|
}
|
|
|
|
// add static lease with the same IP
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("33:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// add static lease with the same MAC
|
|
l = Lease{}
|
|
l.IP = net.IP{192, 168, 10, 152}
|
|
l.HWAddr, _ = net.ParseMAC("22:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// check
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 2)
|
|
|
|
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
|
|
assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
|
|
|
|
assert.True(t, net.IP{192, 168, 10, 152}.Equal(ls[1].IP))
|
|
assert.Equal(t, "22:aa:aa:aa:aa:aa", ls[1].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[1].Expiry.Unix())
|
|
}
|
|
|
|
func TestV4StaticLeaseGet(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
|
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// "Discover"
|
|
mac, _ := net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
req, _ := dhcpv4.NewDiscovery(mac)
|
|
resp, _ := dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Offer"
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
|
|
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
// "Request"
|
|
req, _ = dhcpv4.NewRequestFromOffer(resp)
|
|
resp, _ = dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Ack"
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
|
|
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
dnsAddrs := resp.DNS()
|
|
assert.Len(t, dnsAddrs, 1)
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0]))
|
|
|
|
// check lease
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 1)
|
|
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
}
|
|
|
|
func TestV4DynamicLeaseGet(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
Options: []string{
|
|
"81 hex 303132",
|
|
"82 ip 1.2.3.4",
|
|
},
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
|
|
|
// "Discover"
|
|
mac, _ := net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
req, _ := dhcpv4.NewDiscovery(mac)
|
|
resp, _ := dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Offer"
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
|
|
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
assert.Equal(t, []byte("012"), resp.Options[uint8(dhcpv4.OptionFQDN)])
|
|
assert.True(t, net.IP{1, 2, 3, 4}.Equal(net.IP(resp.Options[uint8(dhcpv4.OptionRelayAgentInformation)])))
|
|
|
|
// "Request"
|
|
req, _ = dhcpv4.NewRequestFromOffer(resp)
|
|
resp, _ = dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Ack"
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
|
|
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
dnsAddrs := resp.DNS()
|
|
assert.Len(t, dnsAddrs, 1)
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0]))
|
|
|
|
// check lease
|
|
ls := s.GetLeases(LeasesDynamic)
|
|
assert.Len(t, ls, 1)
|
|
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ls[0].IP))
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
|
|
start := net.IP{192, 168, 10, 100}
|
|
stop := net.IP{192, 168, 10, 200}
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 10, 99}))
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 11, 100}))
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 11, 201}))
|
|
assert.True(t, ip4InRange(start, stop, net.IP{192, 168, 10, 100}))
|
|
}
|