mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 02:08:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			513 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			513 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package util
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"net"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/sets"
 | |
| 	fake "k8s.io/kubernetes/pkg/proxy/util/testing"
 | |
| )
 | |
| 
 | |
| func TestValidateWorks(t *testing.T) {
 | |
| 	if isValidEndpoint("", 0) {
 | |
| 		t.Errorf("Didn't fail for empty set")
 | |
| 	}
 | |
| 	if isValidEndpoint("foobar", 0) {
 | |
| 		t.Errorf("Didn't fail with invalid port")
 | |
| 	}
 | |
| 	if isValidEndpoint("foobar", -1) {
 | |
| 		t.Errorf("Didn't fail with a negative port")
 | |
| 	}
 | |
| 	if !isValidEndpoint("foobar", 8080) {
 | |
| 		t.Errorf("Failed a valid config.")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBuildPortsToEndpointsMap(t *testing.T) {
 | |
| 	endpoints := &v1.Endpoints{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "testnamespace"},
 | |
| 		Subsets: []v1.EndpointSubset{
 | |
| 			{
 | |
| 				Addresses: []v1.EndpointAddress{
 | |
| 					{IP: "10.0.0.1"},
 | |
| 					{IP: "10.0.0.2"},
 | |
| 				},
 | |
| 				Ports: []v1.EndpointPort{
 | |
| 					{Name: "http", Port: 80},
 | |
| 					{Name: "https", Port: 443},
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				Addresses: []v1.EndpointAddress{
 | |
| 					{IP: "10.0.0.1"},
 | |
| 					{IP: "10.0.0.3"},
 | |
| 				},
 | |
| 				Ports: []v1.EndpointPort{
 | |
| 					{Name: "http", Port: 8080},
 | |
| 					{Name: "dns", Port: 53},
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				Addresses: []v1.EndpointAddress{},
 | |
| 				Ports: []v1.EndpointPort{
 | |
| 					{Name: "http", Port: 8888},
 | |
| 					{Name: "ssh", Port: 22},
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				Addresses: []v1.EndpointAddress{
 | |
| 					{IP: "10.0.0.1"},
 | |
| 				},
 | |
| 				Ports: []v1.EndpointPort{},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	expectedPortsToEndpoints := map[string][]string{
 | |
| 		"http":  {"10.0.0.1:80", "10.0.0.2:80", "10.0.0.1:8080", "10.0.0.3:8080"},
 | |
| 		"https": {"10.0.0.1:443", "10.0.0.2:443"},
 | |
| 		"dns":   {"10.0.0.1:53", "10.0.0.3:53"},
 | |
| 	}
 | |
| 
 | |
| 	portsToEndpoints := BuildPortsToEndpointsMap(endpoints)
 | |
| 	if !reflect.DeepEqual(expectedPortsToEndpoints, portsToEndpoints) {
 | |
| 		t.Errorf("expected ports to endpoints not seen")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestIsProxyableIP(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		ip   string
 | |
| 		want error
 | |
| 	}{
 | |
| 		{"127.0.0.1", ErrAddressNotAllowed},
 | |
| 		{"127.0.0.2", ErrAddressNotAllowed},
 | |
| 		{"169.254.169.254", ErrAddressNotAllowed},
 | |
| 		{"169.254.1.1", ErrAddressNotAllowed},
 | |
| 		{"224.0.0.0", ErrAddressNotAllowed},
 | |
| 		{"10.0.0.1", nil},
 | |
| 		{"192.168.0.1", nil},
 | |
| 		{"172.16.0.1", nil},
 | |
| 		{"8.8.8.8", nil},
 | |
| 		{"::1", ErrAddressNotAllowed},
 | |
| 		{"fe80::", ErrAddressNotAllowed},
 | |
| 		{"ff02::", ErrAddressNotAllowed},
 | |
| 		{"ff01::", ErrAddressNotAllowed},
 | |
| 		{"2600::", nil},
 | |
| 		{"1", ErrAddressNotAllowed},
 | |
| 		{"", ErrAddressNotAllowed},
 | |
| 	}
 | |
| 
 | |
| 	for i := range testCases {
 | |
| 		got := IsProxyableIP(testCases[i].ip)
 | |
| 		if testCases[i].want != got {
 | |
| 			t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type dummyResolver struct {
 | |
| 	ips []string
 | |
| 	err error
 | |
| }
 | |
| 
 | |
| func (r *dummyResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error) {
 | |
| 	if r.err != nil {
 | |
| 		return nil, r.err
 | |
| 	}
 | |
| 	resp := []net.IPAddr{}
 | |
| 	for _, ipString := range r.ips {
 | |
| 		resp = append(resp, net.IPAddr{IP: net.ParseIP(ipString)})
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func TestIsProxyableHostname(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		hostname string
 | |
| 		ips      []string
 | |
| 		want     error
 | |
| 	}{
 | |
| 		{"k8s.io", []string{}, ErrNoAddresses},
 | |
| 		{"k8s.io", []string{"8.8.8.8"}, nil},
 | |
| 		{"k8s.io", []string{"169.254.169.254"}, ErrAddressNotAllowed},
 | |
| 		{"k8s.io", []string{"127.0.0.1", "8.8.8.8"}, ErrAddressNotAllowed},
 | |
| 	}
 | |
| 
 | |
| 	for i := range testCases {
 | |
| 		resolv := dummyResolver{ips: testCases[i].ips}
 | |
| 		got := IsProxyableHostname(context.Background(), &resolv, testCases[i].hostname)
 | |
| 		if testCases[i].want != got {
 | |
| 			t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestShouldSkipService(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		service    *v1.Service
 | |
| 		svcName    types.NamespacedName
 | |
| 		shouldSkip bool
 | |
| 	}{
 | |
| 		{
 | |
| 			// Cluster IP is None
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: v1.ClusterIPNone,
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: true,
 | |
| 		},
 | |
| 		{
 | |
| 			// Cluster IP is empty
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: "",
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: true,
 | |
| 		},
 | |
| 		{
 | |
| 			// ExternalName type service
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: "1.2.3.4",
 | |
| 					Type:      v1.ServiceTypeExternalName,
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: true,
 | |
| 		},
 | |
| 		{
 | |
| 			// ClusterIP type service with ClusterIP set
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: "1.2.3.4",
 | |
| 					Type:      v1.ServiceTypeClusterIP,
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: false,
 | |
| 		},
 | |
| 		{
 | |
| 			// NodePort type service with ClusterIP set
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: "1.2.3.4",
 | |
| 					Type:      v1.ServiceTypeNodePort,
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: false,
 | |
| 		},
 | |
| 		{
 | |
| 			// LoadBalancer type service with ClusterIP set
 | |
| 			service: &v1.Service{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					ClusterIP: "1.2.3.4",
 | |
| 					Type:      v1.ServiceTypeLoadBalancer,
 | |
| 				},
 | |
| 			},
 | |
| 			svcName:    types.NamespacedName{Namespace: "foo", Name: "bar"},
 | |
| 			shouldSkip: false,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i := range testCases {
 | |
| 		skip := ShouldSkipService(testCases[i].svcName, testCases[i].service)
 | |
| 		if skip != testCases[i].shouldSkip {
 | |
| 			t.Errorf("case %d: expect %v, got %v", i, testCases[i].shouldSkip, skip)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type InterfaceAddrsPair struct {
 | |
| 	itf   net.Interface
 | |
| 	addrs []net.Addr
 | |
| }
 | |
| 
 | |
| func TestGetNodeAddressses(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		cidrs         []string
 | |
| 		nw            *fake.FakeNetwork
 | |
| 		itfAddrsPairs []InterfaceAddrsPair
 | |
| 		expected      sets.String
 | |
| 	}{
 | |
| 		{ // case 0
 | |
| 			cidrs: []string{"10.20.30.0/24"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("10.20.30.51"),
 | |
| 		},
 | |
| 		{ // case 1
 | |
| 			cidrs: []string{"0.0.0.0/0"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("0.0.0.0/0"),
 | |
| 		},
 | |
| 		{ // case 2
 | |
| 			cidrs: []string{"2001:db8::/32", "::1/128"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("2001:db8::1", "::1"),
 | |
| 		},
 | |
| 		{ // case 3
 | |
| 			cidrs: []string{"::/0"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("::/0"),
 | |
| 		},
 | |
| 		{ // case 4
 | |
| 			cidrs: []string{"127.0.0.1/32"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("127.0.0.1"),
 | |
| 		},
 | |
| 		{ // case 5
 | |
| 			cidrs: []string{"127.0.0.0/8"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "127.0.1.1/8"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("127.0.1.1"),
 | |
| 		},
 | |
| 		{ // case 6
 | |
| 			cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("10.20.30.51", "100.200.201.1"),
 | |
| 		},
 | |
| 		{ // case 7
 | |
| 			cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString(),
 | |
| 		},
 | |
| 		{ // case 8
 | |
| 			cidrs: []string{},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("0.0.0.0/0", "::/0"),
 | |
| 		},
 | |
| 		{ // case 9
 | |
| 			cidrs: []string{},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("0.0.0.0/0", "::/0"),
 | |
| 		},
 | |
| 		{ // case 9
 | |
| 			cidrs: []string{"1.2.3.0/24", "0.0.0.0/0"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("0.0.0.0/0"),
 | |
| 		},
 | |
| 		{ // case 10
 | |
| 			cidrs: []string{"0.0.0.0/0", "1.2.3.0/24", "::1/128"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("0.0.0.0/0", "::1"),
 | |
| 		},
 | |
| 		{ // case 11
 | |
| 			cidrs: []string{"::/0", "1.2.3.0/24", "::1/128"},
 | |
| 			nw:    fake.NewFakeNetwork(),
 | |
| 			itfAddrsPairs: []InterfaceAddrsPair{
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
 | |
| 				},
 | |
| 				{
 | |
| 					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | |
| 					addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
 | |
| 				},
 | |
| 			},
 | |
| 			expected: sets.NewString("::/0", "1.2.3.4"),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i := range testCases {
 | |
| 		for _, pair := range testCases[i].itfAddrsPairs {
 | |
| 			testCases[i].nw.AddInterfaceAddr(&pair.itf, pair.addrs)
 | |
| 		}
 | |
| 		addrList, err := GetNodeAddresses(testCases[i].cidrs, testCases[i].nw)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("case [%d], unexpected error: %v", i, err)
 | |
| 		}
 | |
| 		if !addrList.Equal(testCases[i].expected) {
 | |
| 			t.Errorf("case [%d], unexpected mismatch, expected: %v, got: %v", i, testCases[i].expected, addrList)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAppendPortIfNeeded(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		name   string
 | |
| 		addr   string
 | |
| 		port   int32
 | |
| 		expect string
 | |
| 	}{
 | |
| 		{
 | |
| 			name:   "IPv4 all-zeros bind address has port",
 | |
| 			addr:   "0.0.0.0:12345",
 | |
| 			port:   23456,
 | |
| 			expect: "0.0.0.0:12345",
 | |
| 		},
 | |
| 		{
 | |
| 			name:   "non-zeros IPv4 config",
 | |
| 			addr:   "9.8.7.6",
 | |
| 			port:   12345,
 | |
| 			expect: "9.8.7.6:12345",
 | |
| 		},
 | |
| 		{
 | |
| 			name:   "IPv6 \"[::]\" bind address has port",
 | |
| 			addr:   "[::]:12345",
 | |
| 			port:   23456,
 | |
| 			expect: "[::]:12345",
 | |
| 		},
 | |
| 		{
 | |
| 			name:   "IPv6 config",
 | |
| 			addr:   "fd00:1::5",
 | |
| 			port:   23456,
 | |
| 			expect: "[fd00:1::5]:23456",
 | |
| 		},
 | |
| 		{
 | |
| 			name:   "Invalid IPv6 Config",
 | |
| 			addr:   "[fd00:1::5]",
 | |
| 			port:   12345,
 | |
| 			expect: "[fd00:1::5]",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i := range testCases {
 | |
| 		got := AppendPortIfNeeded(testCases[i].addr, testCases[i].port)
 | |
| 		if testCases[i].expect != got {
 | |
| 			t.Errorf("case %s: expected %v, got %v", testCases[i].name, testCases[i].expect, got)
 | |
| 		}
 | |
| 	}
 | |
| }
 | 
