mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-17 02:48:28 -07:00
e8c1f5c8d3
Merge in DNS/adguard-home from 2508-ip-conversion to master Updates #2508. Squashed commit of the following: commit 3f64709fbc73ef74c11b910997be1e9bc337193c Merge: 5ac7faaaa0d67aa251
Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 13 16:21:34 2021 +0300 Merge branch 'master' into 2508-ip-conversion commit 5ac7faaaa9dda570fdb872acad5d13d078f46b64 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 13 12:00:11 2021 +0300 all: replace conditions with appropriate functions in tests commit 9e3fa9a115ed23024c57dd5192d5173477ddbf71 Merge: db992a42abba74859e
Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 13 10:47:10 2021 +0300 Merge branch 'master' into 2508-ip-conversion commit db992a42a2c6f315421e78a6a0492e2bfb3ce89d Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 12 18:55:53 2021 +0300 sysutil: fix linux tests commit f629b15d62349323ce2da05e68dc9cc0b5f6e194 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 12 18:41:20 2021 +0300 all: improve code quality commit 3bf03a75524040738562298bd1de6db536af130f Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 12 17:33:26 2021 +0300 sysutil: fix linux net.IP conversion commit 5d5b6994916923636e635588631b63b7e7b74e5f Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 12 14:57:26 2021 +0300 dnsforward: remove redundant net.IP <-> string conversion commit 0b955d99b7fad40942f21d1dd8734adb99126195 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 11 18:04:25 2021 +0300 dhcpd: remove net.IP <-> string conversion
239 lines
7.4 KiB
Go
239 lines
7.4 KiB
Go
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
|
|
|
package dhcpd
|
|
|
|
import (
|
|
"net"
|
|
"testing"
|
|
|
|
"github.com/insomniacslk/dhcp/dhcpv4"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func notify4(flags uint32) {
|
|
}
|
|
|
|
func TestV4StaticLeaseAddRemove(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
s, err := v4Create(conf)
|
|
assert.Nil(t, err)
|
|
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Empty(t, ls)
|
|
|
|
// add static lease
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// try to add the same static lease - fail
|
|
assert.NotNil(t, s.AddStaticLease(l))
|
|
|
|
// check
|
|
ls = s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 1)
|
|
assert.Equal(t, "192.168.10.150", ls[0].IP.String())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
|
|
|
|
// try to remove static lease - fail
|
|
l.IP = net.IP{192, 168, 10, 110}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.NotNil(t, s.RemoveStaticLease(l))
|
|
|
|
// remove static lease
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.RemoveStaticLease(l))
|
|
|
|
// check
|
|
ls = s.GetLeases(LeasesStatic)
|
|
assert.Empty(t, ls)
|
|
}
|
|
|
|
func TestV4StaticLeaseAddReplaceDynamic(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
|
|
// add dynamic lease
|
|
ld := Lease{}
|
|
ld.IP = net.IP{192, 168, 10, 150}
|
|
ld.HWAddr, _ = net.ParseMAC("11:aa:aa:aa:aa:aa")
|
|
s.addLease(&ld)
|
|
|
|
// add dynamic lease
|
|
{
|
|
ld := Lease{}
|
|
ld.IP = net.IP{192, 168, 10, 151}
|
|
ld.HWAddr, _ = net.ParseMAC("22:aa:aa:aa:aa:aa")
|
|
s.addLease(&ld)
|
|
}
|
|
|
|
// add static lease with the same IP
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("33:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// add static lease with the same MAC
|
|
l = Lease{}
|
|
l.IP = net.IP{192, 168, 10, 152}
|
|
l.HWAddr, _ = net.ParseMAC("22:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// check
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 2)
|
|
|
|
assert.Equal(t, "192.168.10.150", ls[0].IP.String())
|
|
assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
|
|
|
|
assert.Equal(t, "192.168.10.152", ls[1].IP.String())
|
|
assert.Equal(t, "22:aa:aa:aa:aa:aa", ls[1].HWAddr.String())
|
|
assert.EqualValues(t, leaseExpireStatic, ls[1].Expiry.Unix())
|
|
}
|
|
|
|
func TestV4StaticLeaseGet(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
|
|
|
l := Lease{}
|
|
l.IP = net.IP{192, 168, 10, 150}
|
|
l.HWAddr, _ = net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
assert.Nil(t, s.AddStaticLease(l))
|
|
|
|
// "Discover"
|
|
mac, _ := net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
req, _ := dhcpv4.NewDiscovery(mac)
|
|
resp, _ := dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Offer"
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String())
|
|
assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
|
|
assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String())
|
|
assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String())
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
// "Request"
|
|
req, _ = dhcpv4.NewRequestFromOffer(resp)
|
|
resp, _ = dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Ack"
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String())
|
|
assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
|
|
assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String())
|
|
assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String())
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
dnsAddrs := resp.DNS()
|
|
assert.Len(t, dnsAddrs, 1)
|
|
assert.Equal(t, "192.168.10.1", dnsAddrs[0].String())
|
|
|
|
// check lease
|
|
ls := s.GetLeases(LeasesStatic)
|
|
assert.Len(t, ls, 1)
|
|
assert.Equal(t, "192.168.10.150", ls[0].IP.String())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
}
|
|
|
|
func TestV4DynamicLeaseGet(t *testing.T) {
|
|
conf := V4ServerConf{
|
|
Enabled: true,
|
|
RangeStart: net.IP{192, 168, 10, 100},
|
|
RangeEnd: net.IP{192, 168, 10, 200},
|
|
GatewayIP: net.IP{192, 168, 10, 1},
|
|
SubnetMask: net.IP{255, 255, 255, 0},
|
|
notify: notify4,
|
|
Options: []string{
|
|
"81 hex 303132",
|
|
"82 ip 1.2.3.4",
|
|
},
|
|
}
|
|
sIface, err := v4Create(conf)
|
|
s := sIface.(*v4Server)
|
|
assert.Nil(t, err)
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
|
|
|
// "Discover"
|
|
mac, _ := net.ParseMAC("aa:aa:aa:aa:aa:aa")
|
|
req, _ := dhcpv4.NewDiscovery(mac)
|
|
resp, _ := dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Offer"
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String())
|
|
assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
|
|
assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String())
|
|
assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String())
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
assert.Equal(t, []byte("012"), resp.Options[uint8(dhcpv4.OptionFQDN)])
|
|
assert.Equal(t, "1.2.3.4", net.IP(resp.Options[uint8(dhcpv4.OptionRelayAgentInformation)]).String())
|
|
|
|
// "Request"
|
|
req, _ = dhcpv4.NewRequestFromOffer(resp)
|
|
resp, _ = dhcpv4.NewReplyFromRequest(req)
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
// check "Ack"
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
|
|
assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String())
|
|
assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
|
|
assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String())
|
|
assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String())
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
dnsAddrs := resp.DNS()
|
|
assert.Len(t, dnsAddrs, 1)
|
|
assert.Equal(t, "192.168.10.1", dnsAddrs[0].String())
|
|
|
|
// check lease
|
|
ls := s.GetLeases(LeasesDynamic)
|
|
assert.Len(t, ls, 1)
|
|
assert.Equal(t, "192.168.10.100", ls[0].IP.String())
|
|
assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
|
|
|
|
start := net.IP{192, 168, 10, 100}
|
|
stop := net.IP{192, 168, 10, 200}
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 10, 99}))
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 11, 100}))
|
|
assert.False(t, ip4InRange(start, stop, net.IP{192, 168, 11, 201}))
|
|
assert.True(t, ip4InRange(start, stop, net.IP{192, 168, 10, 100}))
|
|
}
|