2020-02-21 16:13:21 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package interfaces
|
|
|
|
|
|
|
|
import (
|
2021-03-26 16:09:12 +00:00
|
|
|
"encoding/json"
|
2021-11-20 01:04:35 +00:00
|
|
|
"net"
|
2020-02-21 16:13:21 +00:00
|
|
|
"testing"
|
2021-03-27 01:38:05 +00:00
|
|
|
|
|
|
|
"inet.af/netaddr"
|
2020-02-21 16:13:21 +00:00
|
|
|
)
|
|
|
|
|
2020-04-10 02:10:55 +00:00
|
|
|
func TestGetState(t *testing.T) {
|
|
|
|
st, err := GetState()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2021-03-26 16:09:12 +00:00
|
|
|
j, err := json.MarshalIndent(st, "", "\t")
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("JSON: %v", err)
|
|
|
|
}
|
|
|
|
t.Logf("Got: %s", j)
|
2020-10-02 19:07:00 +00:00
|
|
|
t.Logf("As string: %s", st)
|
2020-02-21 16:13:21 +00:00
|
|
|
|
2020-04-10 02:10:55 +00:00
|
|
|
st2, err := GetState()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-11-20 01:04:35 +00:00
|
|
|
if !st.EqualFiltered(st2, UseAllInterfaces, UseAllIPs) {
|
2020-04-10 02:10:55 +00:00
|
|
|
// let's assume nobody was changing the system network interfaces between
|
|
|
|
// the two GetState calls.
|
|
|
|
t.Fatal("two States back-to-back were not equal")
|
|
|
|
}
|
2020-10-02 19:07:00 +00:00
|
|
|
|
2021-03-26 16:09:12 +00:00
|
|
|
t.Logf("As string:\n\t%s", st)
|
2020-02-21 16:13:21 +00:00
|
|
|
}
|
2020-07-06 17:34:52 +00:00
|
|
|
|
|
|
|
func TestLikelyHomeRouterIP(t *testing.T) {
|
2020-07-06 20:51:17 +00:00
|
|
|
gw, my, ok := LikelyHomeRouterIP()
|
|
|
|
if !ok {
|
|
|
|
t.Logf("no result")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
t.Logf("myIP = %v; gw = %v", my, gw)
|
2020-07-06 17:34:52 +00:00
|
|
|
}
|
2021-03-27 01:38:05 +00:00
|
|
|
|
2021-06-18 00:49:15 +00:00
|
|
|
func TestIsUsableV6(t *testing.T) {
|
2021-03-27 01:38:05 +00:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
ip string
|
|
|
|
want bool
|
|
|
|
}{
|
|
|
|
{"first ULA", "fc00::1", true},
|
|
|
|
{"Tailscale", "fd7a:115c:a1e0::1", false},
|
|
|
|
{"Cloud Run", "fddf:3978:feb1:d745::1", true},
|
|
|
|
{"zeros", "0000:0000:0000:0000:0000:0000:0000:0000", false},
|
|
|
|
{"Link Local", "fe80::1", false},
|
|
|
|
{"Global", "2602::1", true},
|
2021-07-28 18:30:06 +00:00
|
|
|
{"IPv4 public", "192.0.2.1", false},
|
|
|
|
{"IPv4 private", "192.168.1.1", false},
|
2021-03-27 01:38:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range tests {
|
2021-06-18 00:49:15 +00:00
|
|
|
if got := isUsableV6(netaddr.MustParseIP(test.ip)); got != test.want {
|
|
|
|
t.Errorf("isUsableV6(%s) = %v, want %v", test.name, got, test.want)
|
2021-03-27 01:38:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-11-20 01:04:35 +00:00
|
|
|
|
|
|
|
func TestStateEqualFilteredIPFilter(t *testing.T) {
|
|
|
|
// s1 and s2 are identical, except that an "interesting" interface
|
|
|
|
// has gained an "uninteresting" IP address.
|
|
|
|
|
|
|
|
s1 := &State{
|
|
|
|
InterfaceIPs: map[string][]netaddr.IPPrefix{"x": {
|
|
|
|
netaddr.MustParseIPPrefix("42.0.0.0/8"),
|
|
|
|
netaddr.MustParseIPPrefix("169.254.0.0/16"), // link local unicast
|
|
|
|
}},
|
|
|
|
Interface: map[string]Interface{"x": {Interface: &net.Interface{Name: "x"}}},
|
|
|
|
}
|
|
|
|
|
|
|
|
s2 := &State{
|
|
|
|
InterfaceIPs: map[string][]netaddr.IPPrefix{"x": {
|
|
|
|
netaddr.MustParseIPPrefix("42.0.0.0/8"),
|
|
|
|
netaddr.MustParseIPPrefix("169.254.0.0/16"), // link local unicast
|
|
|
|
netaddr.MustParseIPPrefix("127.0.0.0/8"), // loopback (added)
|
|
|
|
}},
|
|
|
|
Interface: map[string]Interface{"x": {Interface: &net.Interface{Name: "x"}}},
|
|
|
|
}
|
|
|
|
|
|
|
|
// s1 and s2 are different...
|
|
|
|
if s1.EqualFiltered(s2, UseAllInterfaces, UseAllIPs) {
|
|
|
|
t.Errorf("%+v != %+v", s1, s2)
|
|
|
|
}
|
|
|
|
// ...and they look different if you only restrict to interesting interfaces...
|
|
|
|
if s1.EqualFiltered(s2, UseInterestingInterfaces, UseAllIPs) {
|
|
|
|
t.Errorf("%+v != %+v when restricting to interesting interfaces _but not_ IPs", s1, s2)
|
|
|
|
}
|
|
|
|
// ...but because the additional IP address is uninteresting, we should treat them as the same.
|
|
|
|
if !s1.EqualFiltered(s2, UseInterestingInterfaces, UseInterestingIPs) {
|
|
|
|
t.Errorf("%+v == %+v when restricting to interesting interfaces and IPs", s1, s2)
|
|
|
|
}
|
|
|
|
}
|