mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	The nodeIPs to be used for nodePorts were collected using netlink which was unnecessary complex and caused se #93858
		
			
				
	
	
		
			1402 lines
		
	
	
		
			37 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1402 lines
		
	
	
		
			37 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2017 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package util
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"math/rand"
 | 
						|
	"net"
 | 
						|
	"reflect"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						|
	fake "k8s.io/kubernetes/pkg/proxy/util/testing"
 | 
						|
	netutils "k8s.io/utils/net"
 | 
						|
)
 | 
						|
 | 
						|
func TestValidateWorks(t *testing.T) {
 | 
						|
	if isValidEndpoint("", 0) {
 | 
						|
		t.Errorf("Didn't fail for empty set")
 | 
						|
	}
 | 
						|
	if isValidEndpoint("foobar", 0) {
 | 
						|
		t.Errorf("Didn't fail with invalid port")
 | 
						|
	}
 | 
						|
	if isValidEndpoint("foobar", -1) {
 | 
						|
		t.Errorf("Didn't fail with a negative port")
 | 
						|
	}
 | 
						|
	if !isValidEndpoint("foobar", 8080) {
 | 
						|
		t.Errorf("Failed a valid config.")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestBuildPortsToEndpointsMap(t *testing.T) {
 | 
						|
	endpoints := &v1.Endpoints{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "testnamespace"},
 | 
						|
		Subsets: []v1.EndpointSubset{
 | 
						|
			{
 | 
						|
				Addresses: []v1.EndpointAddress{
 | 
						|
					{IP: "10.0.0.1"},
 | 
						|
					{IP: "10.0.0.2"},
 | 
						|
				},
 | 
						|
				Ports: []v1.EndpointPort{
 | 
						|
					{Name: "http", Port: 80},
 | 
						|
					{Name: "https", Port: 443},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Addresses: []v1.EndpointAddress{
 | 
						|
					{IP: "10.0.0.1"},
 | 
						|
					{IP: "10.0.0.3"},
 | 
						|
				},
 | 
						|
				Ports: []v1.EndpointPort{
 | 
						|
					{Name: "http", Port: 8080},
 | 
						|
					{Name: "dns", Port: 53},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Addresses: []v1.EndpointAddress{},
 | 
						|
				Ports: []v1.EndpointPort{
 | 
						|
					{Name: "http", Port: 8888},
 | 
						|
					{Name: "ssh", Port: 22},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Addresses: []v1.EndpointAddress{
 | 
						|
					{IP: "10.0.0.1"},
 | 
						|
				},
 | 
						|
				Ports: []v1.EndpointPort{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	expectedPortsToEndpoints := map[string][]string{
 | 
						|
		"http":  {"10.0.0.1:80", "10.0.0.2:80", "10.0.0.1:8080", "10.0.0.3:8080"},
 | 
						|
		"https": {"10.0.0.1:443", "10.0.0.2:443"},
 | 
						|
		"dns":   {"10.0.0.1:53", "10.0.0.3:53"},
 | 
						|
	}
 | 
						|
 | 
						|
	portsToEndpoints := BuildPortsToEndpointsMap(endpoints)
 | 
						|
	if !reflect.DeepEqual(expectedPortsToEndpoints, portsToEndpoints) {
 | 
						|
		t.Errorf("expected ports to endpoints not seen")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIsProxyableIP(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		ip   string
 | 
						|
		want error
 | 
						|
	}{
 | 
						|
		{"127.0.0.1", ErrAddressNotAllowed},
 | 
						|
		{"127.0.0.2", ErrAddressNotAllowed},
 | 
						|
		{"169.254.169.254", ErrAddressNotAllowed},
 | 
						|
		{"169.254.1.1", ErrAddressNotAllowed},
 | 
						|
		{"224.0.0.0", ErrAddressNotAllowed},
 | 
						|
		{"10.0.0.1", nil},
 | 
						|
		{"192.168.0.1", nil},
 | 
						|
		{"172.16.0.1", nil},
 | 
						|
		{"8.8.8.8", nil},
 | 
						|
		{"::1", ErrAddressNotAllowed},
 | 
						|
		{"fe80::", ErrAddressNotAllowed},
 | 
						|
		{"ff02::", ErrAddressNotAllowed},
 | 
						|
		{"ff01::", ErrAddressNotAllowed},
 | 
						|
		{"2600::", nil},
 | 
						|
		{"1", ErrAddressNotAllowed},
 | 
						|
		{"", ErrAddressNotAllowed},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		got := IsProxyableIP(testCases[i].ip)
 | 
						|
		if testCases[i].want != got {
 | 
						|
			t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type dummyResolver struct {
 | 
						|
	ips []string
 | 
						|
	err error
 | 
						|
}
 | 
						|
 | 
						|
func (r *dummyResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error) {
 | 
						|
	if r.err != nil {
 | 
						|
		return nil, r.err
 | 
						|
	}
 | 
						|
	resp := []net.IPAddr{}
 | 
						|
	for _, ipString := range r.ips {
 | 
						|
		resp = append(resp, net.IPAddr{IP: netutils.ParseIPSloppy(ipString)})
 | 
						|
	}
 | 
						|
	return resp, nil
 | 
						|
}
 | 
						|
 | 
						|
func TestIsProxyableHostname(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		hostname string
 | 
						|
		ips      []string
 | 
						|
		want     error
 | 
						|
	}{
 | 
						|
		{"k8s.io", []string{}, ErrNoAddresses},
 | 
						|
		{"k8s.io", []string{"8.8.8.8"}, nil},
 | 
						|
		{"k8s.io", []string{"169.254.169.254"}, ErrAddressNotAllowed},
 | 
						|
		{"k8s.io", []string{"127.0.0.1", "8.8.8.8"}, ErrAddressNotAllowed},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		resolv := dummyResolver{ips: testCases[i].ips}
 | 
						|
		got := IsProxyableHostname(context.Background(), &resolv, testCases[i].hostname)
 | 
						|
		if testCases[i].want != got {
 | 
						|
			t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestIsAllowedHost(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		ip     string
 | 
						|
		denied []string
 | 
						|
		want   error
 | 
						|
	}{
 | 
						|
		{"8.8.8.8", []string{}, nil},
 | 
						|
		{"169.254.169.254", []string{"169.0.0.0/8"}, ErrAddressNotAllowed},
 | 
						|
		{"169.254.169.254", []string{"fce8::/15", "169.254.169.0/24"}, ErrAddressNotAllowed},
 | 
						|
		{"fce9:beef::", []string{"fce8::/15", "169.254.169.0/24"}, ErrAddressNotAllowed},
 | 
						|
		{"127.0.0.1", []string{"127.0.0.1/32"}, ErrAddressNotAllowed},
 | 
						|
		{"34.107.204.206", []string{"fce8::/15"}, nil},
 | 
						|
		{"fce9:beef::", []string{"127.0.0.1/32"}, nil},
 | 
						|
		{"34.107.204.206", []string{"127.0.0.1/32"}, nil},
 | 
						|
		{"127.0.0.1", []string{}, nil},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		var denyList []*net.IPNet
 | 
						|
		for _, cidrStr := range testCases[i].denied {
 | 
						|
			_, ipNet, err := netutils.ParseCIDRSloppy(cidrStr)
 | 
						|
			if err != nil {
 | 
						|
				t.Fatalf("bad IP for test case: %v: %v", cidrStr, err)
 | 
						|
			}
 | 
						|
			denyList = append(denyList, ipNet)
 | 
						|
		}
 | 
						|
		got := IsAllowedHost(netutils.ParseIPSloppy(testCases[i].ip), denyList)
 | 
						|
		if testCases[i].want != got {
 | 
						|
			t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestShouldSkipService(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		service    *v1.Service
 | 
						|
		shouldSkip bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			// Cluster IP is None
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: v1.ClusterIPNone,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Cluster IP is empty
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "",
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// ExternalName type service
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "1.2.3.4",
 | 
						|
					Type:      v1.ServiceTypeExternalName,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// ClusterIP type service with ClusterIP set
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "1.2.3.4",
 | 
						|
					Type:      v1.ServiceTypeClusterIP,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// NodePort type service with ClusterIP set
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "1.2.3.4",
 | 
						|
					Type:      v1.ServiceTypeNodePort,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// LoadBalancer type service with ClusterIP set
 | 
						|
			service: &v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "1.2.3.4",
 | 
						|
					Type:      v1.ServiceTypeLoadBalancer,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			shouldSkip: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		skip := ShouldSkipService(testCases[i].service)
 | 
						|
		if skip != testCases[i].shouldSkip {
 | 
						|
			t.Errorf("case %d: expect %v, got %v", i, testCases[i].shouldSkip, skip)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestNewFilteredDialContext(t *testing.T) {
 | 
						|
 | 
						|
	_, cidr, _ := netutils.ParseCIDRSloppy("1.1.1.1/28")
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		name string
 | 
						|
 | 
						|
		// opts passed to NewFilteredDialContext
 | 
						|
		opts *FilteredDialOptions
 | 
						|
 | 
						|
		// value passed to dial
 | 
						|
		dial string
 | 
						|
 | 
						|
		// value expected to be passed to resolve
 | 
						|
		expectResolve string
 | 
						|
		// result from resolver
 | 
						|
		resolveTo  []net.IPAddr
 | 
						|
		resolveErr error
 | 
						|
 | 
						|
		// expect the wrapped dialer to be called
 | 
						|
		expectWrappedDial bool
 | 
						|
		// expect an error result
 | 
						|
		expectErr string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:              "allow with nil opts",
 | 
						|
			opts:              nil,
 | 
						|
			dial:              "127.0.0.1:8080",
 | 
						|
			expectResolve:     "", // resolver not called, no-op opts
 | 
						|
			expectWrappedDial: true,
 | 
						|
			expectErr:         "",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:              "allow localhost",
 | 
						|
			opts:              &FilteredDialOptions{AllowLocalLoopback: true},
 | 
						|
			dial:              "127.0.0.1:8080",
 | 
						|
			expectResolve:     "", // resolver not called, no-op opts
 | 
						|
			expectWrappedDial: true,
 | 
						|
			expectErr:         "",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:              "disallow localhost",
 | 
						|
			opts:              &FilteredDialOptions{AllowLocalLoopback: false},
 | 
						|
			dial:              "127.0.0.1:8080",
 | 
						|
			expectResolve:     "127.0.0.1",
 | 
						|
			resolveTo:         []net.IPAddr{{IP: netutils.ParseIPSloppy("127.0.0.1")}},
 | 
						|
			expectWrappedDial: false,
 | 
						|
			expectErr:         "address not allowed",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:              "disallow IP",
 | 
						|
			opts:              &FilteredDialOptions{AllowLocalLoopback: false, DialHostCIDRDenylist: []*net.IPNet{cidr}},
 | 
						|
			dial:              "foo.com:8080",
 | 
						|
			expectResolve:     "foo.com",
 | 
						|
			resolveTo:         []net.IPAddr{{IP: netutils.ParseIPSloppy("1.1.1.1")}},
 | 
						|
			expectWrappedDial: false,
 | 
						|
			expectErr:         "address not allowed",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:              "allow IP",
 | 
						|
			opts:              &FilteredDialOptions{AllowLocalLoopback: false, DialHostCIDRDenylist: []*net.IPNet{cidr}},
 | 
						|
			dial:              "foo.com:8080",
 | 
						|
			expectResolve:     "foo.com",
 | 
						|
			resolveTo:         []net.IPAddr{{IP: netutils.ParseIPSloppy("2.2.2.2")}},
 | 
						|
			expectWrappedDial: true,
 | 
						|
			expectErr:         "",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		t.Run(tc.name, func(t *testing.T) {
 | 
						|
			wrappedDialer := &testDialer{}
 | 
						|
			testResolver := &testResolver{addrs: tc.resolveTo, err: tc.resolveErr}
 | 
						|
			dialer := NewFilteredDialContext(wrappedDialer.DialContext, testResolver, tc.opts)
 | 
						|
			_, err := dialer(context.TODO(), "tcp", tc.dial)
 | 
						|
 | 
						|
			if tc.expectResolve != testResolver.resolveAddress {
 | 
						|
				t.Fatalf("expected to resolve %s, got %s", tc.expectResolve, testResolver.resolveAddress)
 | 
						|
			}
 | 
						|
			if tc.expectWrappedDial != wrappedDialer.called {
 | 
						|
				t.Fatalf("expected wrapped dialer called %v, got %v", tc.expectWrappedDial, wrappedDialer.called)
 | 
						|
			}
 | 
						|
 | 
						|
			if err != nil {
 | 
						|
				if len(tc.expectErr) == 0 {
 | 
						|
					t.Fatalf("unexpected error: %v", err)
 | 
						|
				} else if !strings.Contains(err.Error(), tc.expectErr) {
 | 
						|
					t.Fatalf("expected error containing %q, got %v", tc.expectErr, err)
 | 
						|
				}
 | 
						|
			} else {
 | 
						|
				if len(tc.expectErr) > 0 {
 | 
						|
					t.Fatalf("expected error, got none")
 | 
						|
				}
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type testDialer struct {
 | 
						|
	called bool
 | 
						|
}
 | 
						|
 | 
						|
func (t *testDialer) DialContext(_ context.Context, network, address string) (net.Conn, error) {
 | 
						|
	t.called = true
 | 
						|
	return nil, nil
 | 
						|
}
 | 
						|
 | 
						|
type testResolver struct {
 | 
						|
	addrs []net.IPAddr
 | 
						|
	err   error
 | 
						|
 | 
						|
	resolveAddress string
 | 
						|
}
 | 
						|
 | 
						|
func (t *testResolver) LookupIPAddr(_ context.Context, address string) ([]net.IPAddr, error) {
 | 
						|
	t.resolveAddress = address
 | 
						|
	return t.addrs, t.err
 | 
						|
}
 | 
						|
 | 
						|
type InterfaceAddrsPair struct {
 | 
						|
	itf   net.Interface
 | 
						|
	addrs []net.Addr
 | 
						|
}
 | 
						|
 | 
						|
func TestGetNodeAddresses(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		cidrs         []string
 | 
						|
		nw            *fake.FakeNetwork
 | 
						|
		itfAddrsPairs []InterfaceAddrsPair
 | 
						|
		expected      sets.String
 | 
						|
		expectedErr   error
 | 
						|
	}{
 | 
						|
		{ // case 0
 | 
						|
			cidrs: []string{"10.20.30.0/24"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("10.20.30.51"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("100.200.201.1"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("10.20.30.51"),
 | 
						|
		},
 | 
						|
		{ // case 1
 | 
						|
			cidrs: []string{"0.0.0.0/0"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("10.20.30.51"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("127.0.0.1"), Mask: net.CIDRMask(8, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("0.0.0.0/0"),
 | 
						|
		},
 | 
						|
		{ // case 2
 | 
						|
			cidrs: []string{"2001:db8::/32", "::1/128"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("2001:db8::1"), Mask: net.CIDRMask(32, 128)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("::1"), Mask: net.CIDRMask(128, 128)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("2001:db8::1", "::1"),
 | 
						|
		},
 | 
						|
		{ // case 3
 | 
						|
			cidrs: []string{"::/0"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("2001:db8::1"), Mask: net.CIDRMask(32, 128)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("::1"), Mask: net.CIDRMask(128, 128)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("::/0"),
 | 
						|
		},
 | 
						|
		{ // case 4
 | 
						|
			cidrs: []string{"127.0.0.1/32"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("10.20.30.51"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("127.0.0.1"), Mask: net.CIDRMask(8, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("127.0.0.1"),
 | 
						|
		},
 | 
						|
		{ // case 5
 | 
						|
			cidrs: []string{"127.0.0.0/8"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("127.0.1.1"), Mask: net.CIDRMask(8, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("127.0.1.1"),
 | 
						|
		},
 | 
						|
		{ // case 6
 | 
						|
			cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("10.20.30.51"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("100.200.201.1"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("10.20.30.51", "100.200.201.1"),
 | 
						|
		},
 | 
						|
		{ // case 7
 | 
						|
			cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("192.168.1.2"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("127.0.0.1"), Mask: net.CIDRMask(8, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected:    nil,
 | 
						|
			expectedErr: fmt.Errorf("no addresses found for cidrs %v", []string{"10.20.30.0/24", "100.200.201.0/24"}),
 | 
						|
		},
 | 
						|
		{ // case 8
 | 
						|
			cidrs: []string{},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("192.168.1.2"), Mask: net.CIDRMask(24, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("127.0.0.1"), Mask: net.CIDRMask(8, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("0.0.0.0/0", "::/0"),
 | 
						|
		},
 | 
						|
		{ // case 9
 | 
						|
			cidrs: []string{},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("2001:db8::1"), Mask: net.CIDRMask(32, 128)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("::1"), Mask: net.CIDRMask(128, 128)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("0.0.0.0/0", "::/0"),
 | 
						|
		},
 | 
						|
		{ // case 9
 | 
						|
			cidrs: []string{"1.2.3.0/24", "0.0.0.0/0"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("1.2.3.4"), Mask: net.CIDRMask(30, 32)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("0.0.0.0/0"),
 | 
						|
		},
 | 
						|
		{ // case 10
 | 
						|
			cidrs: []string{"0.0.0.0/0", "1.2.3.0/24", "::1/128"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("1.2.3.4"), Mask: net.CIDRMask(30, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("::1"), Mask: net.CIDRMask(128, 128)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("0.0.0.0/0", "::1"),
 | 
						|
		},
 | 
						|
		{ // case 11
 | 
						|
			cidrs: []string{"::/0", "1.2.3.0/24", "::1/128"},
 | 
						|
			nw:    fake.NewFakeNetwork(),
 | 
						|
			itfAddrsPairs: []InterfaceAddrsPair{
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("1.2.3.4"), Mask: net.CIDRMask(30, 32)}},
 | 
						|
				},
 | 
						|
				{
 | 
						|
					itf:   net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
 | 
						|
					addrs: []net.Addr{&net.IPNet{IP: netutils.ParseIPSloppy("::1"), Mask: net.CIDRMask(128, 128)}},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: sets.NewString("::/0", "1.2.3.4"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		for _, pair := range testCases[i].itfAddrsPairs {
 | 
						|
			testCases[i].nw.AddInterfaceAddr(&pair.itf, pair.addrs)
 | 
						|
		}
 | 
						|
		addrList, err := GetNodeAddresses(testCases[i].cidrs, testCases[i].nw)
 | 
						|
		if !reflect.DeepEqual(err, testCases[i].expectedErr) {
 | 
						|
			t.Errorf("case [%d], unexpected error: %v", i, err)
 | 
						|
		}
 | 
						|
 | 
						|
		if !addrList.Equal(testCases[i].expected) {
 | 
						|
			t.Errorf("case [%d], unexpected mismatch, expected: %v, got: %v", i, testCases[i].expected, addrList)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAppendPortIfNeeded(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name   string
 | 
						|
		addr   string
 | 
						|
		port   int32
 | 
						|
		expect string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:   "IPv4 all-zeros bind address has port",
 | 
						|
			addr:   "0.0.0.0:12345",
 | 
						|
			port:   23456,
 | 
						|
			expect: "0.0.0.0:12345",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:   "non-zeros IPv4 config",
 | 
						|
			addr:   "9.8.7.6",
 | 
						|
			port:   12345,
 | 
						|
			expect: "9.8.7.6:12345",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:   "IPv6 \"[::]\" bind address has port",
 | 
						|
			addr:   "[::]:12345",
 | 
						|
			port:   23456,
 | 
						|
			expect: "[::]:12345",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:   "IPv6 config",
 | 
						|
			addr:   "fd00:1::5",
 | 
						|
			port:   23456,
 | 
						|
			expect: "[fd00:1::5]:23456",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:   "Invalid IPv6 Config",
 | 
						|
			addr:   "[fd00:1::5]",
 | 
						|
			port:   12345,
 | 
						|
			expect: "[fd00:1::5]",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i := range testCases {
 | 
						|
		got := AppendPortIfNeeded(testCases[i].addr, testCases[i].port)
 | 
						|
		if testCases[i].expect != got {
 | 
						|
			t.Errorf("case %s: expected %v, got %v", testCases[i].name, testCases[i].expect, got)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestShuffleStrings(t *testing.T) {
 | 
						|
	var src []string
 | 
						|
	dest := ShuffleStrings(src)
 | 
						|
 | 
						|
	if dest != nil {
 | 
						|
		t.Errorf("ShuffleStrings for a nil slice got a non-nil slice")
 | 
						|
	}
 | 
						|
 | 
						|
	src = []string{"a", "b", "c", "d", "e", "f"}
 | 
						|
	dest = ShuffleStrings(src)
 | 
						|
 | 
						|
	if len(src) != len(dest) {
 | 
						|
		t.Errorf("Shuffled slice is wrong length, expected %v got %v", len(src), len(dest))
 | 
						|
	}
 | 
						|
 | 
						|
	m := make(map[string]bool, len(dest))
 | 
						|
	for _, s := range dest {
 | 
						|
		m[s] = true
 | 
						|
	}
 | 
						|
 | 
						|
	for _, k := range src {
 | 
						|
		if _, exists := m[k]; !exists {
 | 
						|
			t.Errorf("Element %v missing from shuffled slice", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestMapIPsByIPFamily(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		desc            string
 | 
						|
		ipString        []string
 | 
						|
		wantIPv6        bool
 | 
						|
		expectCorrect   []string
 | 
						|
		expectIncorrect []string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			desc:            "empty input IPv4",
 | 
						|
			ipString:        []string{},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "empty input IPv6",
 | 
						|
			ipString:        []string{},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv6",
 | 
						|
			ipString:        []string{"fd00:20::1"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"fd00:20::1"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4",
 | 
						|
			ipString:        []string{"192.168.200.2"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"192.168.200.2"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4 and IPv6",
 | 
						|
			ipString:        []string{"192.168.200.2", "192.1.34.23", "fd00:20::1", "2001:db9::3"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
			expectIncorrect: []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv4 and IPv6",
 | 
						|
			ipString:        []string{"192.168.200.2", "192.1.34.23", "fd00:20::1", "2001:db9::3"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
			expectIncorrect: []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv4 only",
 | 
						|
			ipString:        []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4 only",
 | 
						|
			ipString:        []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"192.168.200.2", "192.1.34.23"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv6 only",
 | 
						|
			ipString:        []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv6 only",
 | 
						|
			ipString:        []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   []string{"fd00:20::1", "2001:db9::3"},
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testcase := range testCases {
 | 
						|
		t.Run(testcase.desc, func(t *testing.T) {
 | 
						|
			ipFamily := v1.IPv4Protocol
 | 
						|
			otherIPFamily := v1.IPv6Protocol
 | 
						|
 | 
						|
			if testcase.wantIPv6 {
 | 
						|
				ipFamily = v1.IPv6Protocol
 | 
						|
				otherIPFamily = v1.IPv4Protocol
 | 
						|
			}
 | 
						|
 | 
						|
			ipMap := MapIPsByIPFamily(testcase.ipString)
 | 
						|
 | 
						|
			if !reflect.DeepEqual(testcase.expectCorrect, ipMap[ipFamily]) {
 | 
						|
				t.Errorf("Test %v failed: expected %v, got %v", testcase.desc, testcase.expectCorrect, ipMap[ipFamily])
 | 
						|
			}
 | 
						|
			if !reflect.DeepEqual(testcase.expectIncorrect, ipMap[otherIPFamily]) {
 | 
						|
				t.Errorf("Test %v failed: expected %v, got %v", testcase.desc, testcase.expectIncorrect, ipMap[otherIPFamily])
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestMapCIDRsByIPFamily(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		desc            string
 | 
						|
		ipString        []string
 | 
						|
		wantIPv6        bool
 | 
						|
		expectCorrect   []string
 | 
						|
		expectIncorrect []string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			desc:            "empty input IPv4",
 | 
						|
			ipString:        []string{},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "empty input IPv6",
 | 
						|
			ipString:        []string{},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv6",
 | 
						|
			ipString:        []string{"fd00:20::1/64"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"fd00:20::1/64"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4",
 | 
						|
			ipString:        []string{"192.168.200.2/24"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"192.168.200.2/24"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4 and IPv6",
 | 
						|
			ipString:        []string{"192.168.200.2/24", "192.1.34.23/24", "fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			expectIncorrect: []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv4 and IPv6",
 | 
						|
			ipString:        []string{"192.168.200.2/24", "192.1.34.23/24", "fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
			expectIncorrect: []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv4 only",
 | 
						|
			ipString:        []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv4 only",
 | 
						|
			ipString:        []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"192.168.200.2/24", "192.1.34.23/24"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv4 and receive IPv6 only",
 | 
						|
			ipString:        []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			wantIPv6:        false,
 | 
						|
			expectCorrect:   nil,
 | 
						|
			expectIncorrect: []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:            "want IPv6 and receive IPv6 only",
 | 
						|
			ipString:        []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			wantIPv6:        true,
 | 
						|
			expectCorrect:   []string{"fd00:20::1/64", "2001:db9::3/64"},
 | 
						|
			expectIncorrect: nil,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testcase := range testCases {
 | 
						|
		t.Run(testcase.desc, func(t *testing.T) {
 | 
						|
			ipFamily := v1.IPv4Protocol
 | 
						|
			otherIPFamily := v1.IPv6Protocol
 | 
						|
 | 
						|
			if testcase.wantIPv6 {
 | 
						|
				ipFamily = v1.IPv6Protocol
 | 
						|
				otherIPFamily = v1.IPv4Protocol
 | 
						|
			}
 | 
						|
 | 
						|
			cidrMap := MapCIDRsByIPFamily(testcase.ipString)
 | 
						|
 | 
						|
			if !reflect.DeepEqual(testcase.expectCorrect, cidrMap[ipFamily]) {
 | 
						|
				t.Errorf("Test %v failed: expected %v, got %v", testcase.desc, testcase.expectCorrect, cidrMap[ipFamily])
 | 
						|
			}
 | 
						|
			if !reflect.DeepEqual(testcase.expectIncorrect, cidrMap[otherIPFamily]) {
 | 
						|
				t.Errorf("Test %v failed: expected %v, got %v", testcase.desc, testcase.expectIncorrect, cidrMap[otherIPFamily])
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetClusterIPByFamily(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name           string
 | 
						|
		service        v1.Service
 | 
						|
		requestFamily  v1.IPFamily
 | 
						|
		expectedResult string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:           "old style service ipv4. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "10.0.0.10",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "10.0.0.10",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "old style service ipv4. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "10.0.0.10",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "old style service ipv6. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "2000::1",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "2000::1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "old style service ipv6. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: "2000::1",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service single stack ipv4. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "10.0.0.10",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"10.0.0.10"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv4Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service single stack ipv4. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"10.0.0.10"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv4Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service single stack ipv6. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "2000::1",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"2000::1"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv6Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service single stack ipv6. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"2000::1"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv6Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// dual stack
 | 
						|
		{
 | 
						|
			name:           "service dual stack ipv4,6. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "10.0.0.10",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"10.0.0.10", "2000::1"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv4Protocol, v1.IPv6Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service dual stack ipv4,6. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "2000::1",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"10.0.0.10", "2000::1"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv4Protocol, v1.IPv6Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service dual stack ipv6,4. want ipv6",
 | 
						|
			requestFamily:  v1.IPv6Protocol,
 | 
						|
			expectedResult: "2000::1",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"2000::1", "10.0.0.10"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv6Protocol, v1.IPv4Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		{
 | 
						|
			name:           "service dual stack ipv6,4. want ipv4",
 | 
						|
			requestFamily:  v1.IPv4Protocol,
 | 
						|
			expectedResult: "10.0.0.10",
 | 
						|
			service: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIPs: []string{"2000::1", "10.0.0.10"},
 | 
						|
					IPFamilies: []v1.IPFamily{v1.IPv6Protocol, v1.IPv4Protocol},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		t.Run(testCase.name, func(t *testing.T) {
 | 
						|
			ip := GetClusterIPByFamily(testCase.requestFamily, &testCase.service)
 | 
						|
			if ip != testCase.expectedResult {
 | 
						|
				t.Fatalf("expected ip:%v got %v", testCase.expectedResult, ip)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type fakeClosable struct {
 | 
						|
	closed bool
 | 
						|
}
 | 
						|
 | 
						|
func (c *fakeClosable) Close() error {
 | 
						|
	c.closed = true
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func TestRevertPorts(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		replacementPorts []netutils.LocalPort
 | 
						|
		existingPorts    []netutils.LocalPort
 | 
						|
		expectToBeClose  []bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			replacementPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			existingPorts:   []netutils.LocalPort{},
 | 
						|
			expectToBeClose: []bool{true, true, true},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			replacementPorts: []netutils.LocalPort{},
 | 
						|
			existingPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			expectToBeClose: []bool{},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			replacementPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			existingPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			expectToBeClose: []bool{false, false, false},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			replacementPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			existingPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			expectToBeClose: []bool{false, true, false},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			replacementPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
			},
 | 
						|
			existingPorts: []netutils.LocalPort{
 | 
						|
				{Port: 5001},
 | 
						|
				{Port: 5002},
 | 
						|
				{Port: 5003},
 | 
						|
				{Port: 5004},
 | 
						|
			},
 | 
						|
			expectToBeClose: []bool{false, false, false},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		replacementPortsMap := make(map[netutils.LocalPort]netutils.Closeable)
 | 
						|
		for _, lp := range tc.replacementPorts {
 | 
						|
			replacementPortsMap[lp] = &fakeClosable{}
 | 
						|
		}
 | 
						|
		existingPortsMap := make(map[netutils.LocalPort]netutils.Closeable)
 | 
						|
		for _, lp := range tc.existingPorts {
 | 
						|
			existingPortsMap[lp] = &fakeClosable{}
 | 
						|
		}
 | 
						|
		RevertPorts(replacementPortsMap, existingPortsMap)
 | 
						|
		for j, expectation := range tc.expectToBeClose {
 | 
						|
			if replacementPortsMap[tc.replacementPorts[j]].(*fakeClosable).closed != expectation {
 | 
						|
				t.Errorf("Expect replacement localport %v to be %v in test case %v", tc.replacementPorts[j], expectation, i)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		for _, lp := range tc.existingPorts {
 | 
						|
			if existingPortsMap[lp].(*fakeClosable).closed == true {
 | 
						|
				t.Errorf("Expect existing localport %v to be false in test case %v", lp, i)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestLineBufferWrite(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		input    []interface{}
 | 
						|
		expected string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:     "none",
 | 
						|
			input:    []interface{}{},
 | 
						|
			expected: "\n",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "one string",
 | 
						|
			input:    []interface{}{"test1"},
 | 
						|
			expected: "test1\n",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "one slice",
 | 
						|
			input:    []interface{}{[]string{"test1", "test2"}},
 | 
						|
			expected: "test1 test2\n",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "mixed",
 | 
						|
			input:    []interface{}{"s1", "s2", []string{"s3", "s4"}, "", "s5", []string{}, []string{"s6"}, "s7"},
 | 
						|
			expected: "s1 s2 s3 s4  s5  s6 s7\n",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	testBuffer := LineBuffer{}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		t.Run(testCase.name, func(t *testing.T) {
 | 
						|
			testBuffer.Reset()
 | 
						|
			testBuffer.Write(testCase.input...)
 | 
						|
			if want, got := testCase.expected, string(testBuffer.Bytes()); !strings.EqualFold(want, got) {
 | 
						|
				t.Fatalf("write word is %v\n expected: %q, got: %q", testCase.input, want, got)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestLineBufferWritePanic(t *testing.T) {
 | 
						|
	defer func() {
 | 
						|
		if r := recover(); r == nil {
 | 
						|
			t.Errorf("did not panic")
 | 
						|
		}
 | 
						|
	}()
 | 
						|
	testBuffer := LineBuffer{}
 | 
						|
	testBuffer.Write("string", []string{"a", "slice"}, 1234)
 | 
						|
}
 | 
						|
 | 
						|
func TestLineBufferWriteBytes(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		bytes    []byte
 | 
						|
		expected string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:     "empty bytes",
 | 
						|
			bytes:    []byte{},
 | 
						|
			expected: "\n",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "test bytes",
 | 
						|
			bytes:    []byte("test write bytes line"),
 | 
						|
			expected: "test write bytes line\n",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	testBuffer := LineBuffer{}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		t.Run(testCase.name, func(t *testing.T) {
 | 
						|
			testBuffer.Reset()
 | 
						|
			testBuffer.WriteBytes(testCase.bytes)
 | 
						|
			if want, got := testCase.expected, string(testBuffer.Bytes()); !strings.EqualFold(want, got) {
 | 
						|
				t.Fatalf("write bytes is %v\n expected: %s, got: %s", testCase.bytes, want, got)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestWriteCountLines(t *testing.T) {
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		name     string
 | 
						|
		expected int
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:     "write no line",
 | 
						|
			expected: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "write one line",
 | 
						|
			expected: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "write 100 lines",
 | 
						|
			expected: 100,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "write 1000 lines",
 | 
						|
			expected: 1000,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "write 10000 lines",
 | 
						|
			expected: 10000,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:     "write 100000 lines",
 | 
						|
			expected: 100000,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	testBuffer := LineBuffer{}
 | 
						|
	for _, testCase := range testCases {
 | 
						|
		t.Run(testCase.name, func(t *testing.T) {
 | 
						|
			testBuffer.Reset()
 | 
						|
			for i := 0; i < testCase.expected; i++ {
 | 
						|
				testBuffer.Write(randSeq())
 | 
						|
			}
 | 
						|
			n := CountBytesLines(testBuffer.Bytes())
 | 
						|
			if n != testCase.expected {
 | 
						|
				t.Fatalf("lines expected: %d, got: %d", testCase.expected, n)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// obtained from https://stackoverflow.com/a/22892986
 | 
						|
var letters = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ")
 | 
						|
 | 
						|
func randSeq() string {
 | 
						|
	b := make([]rune, 30)
 | 
						|
	for i := range b {
 | 
						|
		b[i] = letters[rand.Intn(len(letters))]
 | 
						|
	}
 | 
						|
	return string(b)
 | 
						|
}
 | 
						|
 | 
						|
func mustParseIPAddr(str string) net.Addr {
 | 
						|
	a, err := net.ResolveIPAddr("ip", str)
 | 
						|
	if err != nil {
 | 
						|
		panic("mustParseIPAddr")
 | 
						|
	}
 | 
						|
	return a
 | 
						|
}
 | 
						|
func mustParseIPNet(str string) net.Addr {
 | 
						|
	_, n, err := netutils.ParseCIDRSloppy(str)
 | 
						|
	if err != nil {
 | 
						|
		panic("mustParseIPNet")
 | 
						|
	}
 | 
						|
	return n
 | 
						|
}
 | 
						|
func mustParseUnix(str string) net.Addr {
 | 
						|
	n, err := net.ResolveUnixAddr("unix", str)
 | 
						|
	if err != nil {
 | 
						|
		panic("mustParseUnix")
 | 
						|
	}
 | 
						|
	return n
 | 
						|
}
 | 
						|
 | 
						|
type cidrValidator struct {
 | 
						|
	cidr *net.IPNet
 | 
						|
}
 | 
						|
 | 
						|
func (v *cidrValidator) isValid(ip net.IP) bool {
 | 
						|
	return v.cidr.Contains(ip)
 | 
						|
}
 | 
						|
func newCidrValidator(cidr string) func(ip net.IP) bool {
 | 
						|
	_, n, err := netutils.ParseCIDRSloppy(cidr)
 | 
						|
	if err != nil {
 | 
						|
		panic("mustParseIPNet")
 | 
						|
	}
 | 
						|
	obj := cidrValidator{n}
 | 
						|
	return obj.isValid
 | 
						|
}
 | 
						|
 | 
						|
func TestAddressSet(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		name      string
 | 
						|
		validator func(ip net.IP) bool
 | 
						|
		input     []net.Addr
 | 
						|
		expected  sets.String
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			"Empty",
 | 
						|
			func(ip net.IP) bool { return false },
 | 
						|
			nil,
 | 
						|
			sets.NewString(),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Reject IPAddr x 2",
 | 
						|
			func(ip net.IP) bool { return false },
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseIPAddr("8.8.8.8"),
 | 
						|
				mustParseIPAddr("1000::"),
 | 
						|
			},
 | 
						|
			sets.NewString(),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Accept IPAddr x 2",
 | 
						|
			func(ip net.IP) bool { return true },
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseIPAddr("8.8.8.8"),
 | 
						|
				mustParseIPAddr("1000::"),
 | 
						|
			},
 | 
						|
			sets.NewString("8.8.8.8", "1000::"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Accept IPNet x 2",
 | 
						|
			func(ip net.IP) bool { return true },
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseIPNet("8.8.8.8/32"),
 | 
						|
				mustParseIPNet("1000::/128"),
 | 
						|
			},
 | 
						|
			sets.NewString("8.8.8.8", "1000::"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Accept Unix x 2",
 | 
						|
			func(ip net.IP) bool { return true },
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseUnix("/tmp/sock1"),
 | 
						|
				mustParseUnix("/tmp/sock2"),
 | 
						|
			},
 | 
						|
			sets.NewString(),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Cidr IPv4",
 | 
						|
			newCidrValidator("192.168.1.0/24"),
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseIPAddr("8.8.8.8"),
 | 
						|
				mustParseIPAddr("1000::"),
 | 
						|
				mustParseIPAddr("192.168.1.1"),
 | 
						|
			},
 | 
						|
			sets.NewString("192.168.1.1"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			"Cidr IPv6",
 | 
						|
			newCidrValidator("1000::/64"),
 | 
						|
			[]net.Addr{
 | 
						|
				mustParseIPAddr("8.8.8.8"),
 | 
						|
				mustParseIPAddr("1000::"),
 | 
						|
				mustParseIPAddr("192.168.1.1"),
 | 
						|
			},
 | 
						|
			sets.NewString("1000::"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		if !tc.expected.Equal(AddressSet(tc.validator, tc.input)) {
 | 
						|
			t.Errorf("%s", tc.name)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |