3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-11-25 13:29:27 +01:00
ergo/irc/utils/net_test.go

208 lines
6.0 KiB
Go
Raw Permalink Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
package utils
2016-04-21 14:32:17 +02:00
2019-01-22 11:01:01 +01:00
import "net"
import "reflect"
2016-04-21 14:32:17 +02:00
import "testing"
2019-01-22 11:01:01 +01:00
func assertEqual(supplied, expected interface{}, t *testing.T) {
if !reflect.DeepEqual(supplied, expected) {
t.Errorf("expected %v but got %v", expected, supplied)
}
}
2016-04-21 14:32:17 +02:00
// hostnames from https://github.com/DanielOaks/irc-parser-tests
var (
goodHostnames = []string{
"irc.example.com",
"i.coolguy.net",
"irc-srv.net.uk",
"iRC.CooLguY.NeT",
"gsf.ds342.co.uk",
"324.net.uk",
"xn--bcher-kva.ch",
"pentos",
"pentos.",
"www.google.com.",
2016-04-21 14:32:17 +02:00
}
badHostnames = []string{
"-lol-.net.uk",
"-lol.net.uk",
"_irc._sctp.lol.net.uk",
"irc.l%l.net.uk",
"irc..net.uk",
".",
2016-04-21 14:32:17 +02:00
"",
}
)
func TestIsHostname(t *testing.T) {
for _, name := range goodHostnames {
if !IsHostname(name) {
t.Error(
"Expected to pass, but could not validate hostname",
name,
)
}
}
for _, name := range badHostnames {
if IsHostname(name) {
t.Error(
"Expected to fail, but successfully validated hostname",
name,
)
}
}
}
2019-01-22 11:01:01 +01:00
func TestIsServerName(t *testing.T) {
if IsServerName("pentos") {
t.Error("irc server names must contain a period")
}
if !IsServerName("darwin.network") {
t.Error("failed to validate a perfectly good server name")
}
}
2019-01-22 11:01:01 +01:00
func TestNormalizeToNet(t *testing.T) {
a := net.ParseIP("8.8.8.8")
b := net.ParseIP("8.8.4.4")
if a == nil || b == nil {
panic("something has gone very wrong")
}
aNetwork := NormalizeIPToNet(a)
bNetwork := NormalizeIPToNet(b)
assertEqual(aNetwork.Contains(a), true, t)
assertEqual(bNetwork.Contains(b), true, t)
assertEqual(aNetwork.Contains(b), false, t)
assertEqual(bNetwork.Contains(a), false, t)
c := net.ParseIP("2001:4860:4860::8888")
d := net.ParseIP("2001:db8::1")
if c == nil || d == nil {
panic("something has gone very wrong")
}
cNetwork := NormalizeIPToNet(c)
dNetwork := NormalizeIPToNet(d)
assertEqual(cNetwork.Contains(c), true, t)
assertEqual(dNetwork.Contains(d), true, t)
assertEqual(dNetwork.Contains(c), false, t)
assertEqual(dNetwork.Contains(a), false, t)
assertEqual(cNetwork.Contains(b), false, t)
assertEqual(aNetwork.Contains(c), false, t)
assertEqual(bNetwork.Contains(c), false, t)
assertEqual(NetToNormalizedString(aNetwork), "8.8.8.8", t)
assertEqual(NetToNormalizedString(bNetwork), "8.8.4.4", t)
assertEqual(NetToNormalizedString(cNetwork), "2001:4860:4860::8888", t)
assertEqual(NetToNormalizedString(dNetwork), "2001:db8::1", t)
}
func TestNormalizedNetToString(t *testing.T) {
_, network, err := net.ParseCIDR("8.8.0.0/16")
if err != nil {
panic(err)
}
assertEqual(NetToNormalizedString(*network), "8.8.0.0/16", t)
normalized := NormalizeNet(*network)
assertEqual(normalized.Contains(net.ParseIP("8.8.4.4")), true, t)
assertEqual(normalized.Contains(net.ParseIP("1.1.1.1")), false, t)
assertEqual(NetToNormalizedString(normalized), "8.8.0.0/16", t)
_, network, err = net.ParseCIDR("8.8.4.4/32")
if err != nil {
panic(err)
}
assertEqual(NetToNormalizedString(*network), "8.8.4.4", t)
normalized = NormalizeNet(*network)
assertEqual(normalized.Contains(net.ParseIP("8.8.4.4")), true, t)
assertEqual(normalized.Contains(net.ParseIP("8.8.8.8")), false, t)
assertEqual(NetToNormalizedString(normalized), "8.8.4.4", t)
}
func TestNormalizedNet(t *testing.T) {
_, network, err := net.ParseCIDR("::ffff:8.8.4.4/128")
assertEqual(err, nil, t)
assertEqual(NetToNormalizedString(*network), "8.8.4.4", t)
normalizedNet := NormalizeIPToNet(net.ParseIP("8.8.4.4"))
assertEqual(NetToNormalizedString(normalizedNet), "8.8.4.4", t)
_, network, err = net.ParseCIDR("::ffff:8.8.0.0/112")
assertEqual(err, nil, t)
assertEqual(NetToNormalizedString(*network), "8.8.0.0/16", t)
_, v4Network, err := net.ParseCIDR("8.8.0.0/16")
assertEqual(err, nil, t)
normalizedNet = NormalizeNet(*v4Network)
assertEqual(NetToNormalizedString(normalizedNet), "8.8.0.0/16", t)
}
func TestNormalizedNetFromString(t *testing.T) {
network, err := NormalizedNetFromString("8.8.4.4/16")
assertEqual(err, nil, t)
assertEqual(NetToNormalizedString(network), "8.8.0.0/16", t)
assertEqual(network.Contains(net.ParseIP("8.8.8.8")), true, t)
network, err = NormalizedNetFromString("2001:0db8::1")
assertEqual(err, nil, t)
assertEqual(NetToNormalizedString(network), "2001:db8::1", t)
assertEqual(network.Contains(net.ParseIP("2001:0db8::1")), true, t)
}
2020-05-05 04:29:10 +02:00
func checkXFF(remoteAddr, forwardedHeader string, expectedStr string, t *testing.T) {
whitelistCIDRs := []string{"10.0.0.0/8", "127.0.0.1/8"}
var whitelist []net.IPNet
for _, str := range whitelistCIDRs {
_, wlNet, err := net.ParseCIDR(str)
if err != nil {
panic(err)
}
whitelist = append(whitelist, *wlNet)
}
expected := net.ParseIP(expectedStr)
actual := HandleXForwardedFor(remoteAddr, forwardedHeader, whitelist)
if !actual.Equal(expected) {
t.Errorf("handling %s and %s, expected %s, got %s", remoteAddr, forwardedHeader, expected, actual)
}
}
func TestXForwardedFor(t *testing.T) {
checkXFF("8.8.4.4:9999", "", "8.8.4.4", t)
// forged XFF header from untrustworthy external IP, should be ignored:
checkXFF("8.8.4.4:9999", "1.1.1.1", "8.8.4.4", t)
checkXFF("10.0.0.4:28432", "", "10.0.0.4", t)
checkXFF("10.0.0.4:28432", "8.8.4.4", "8.8.4.4", t)
checkXFF("10.0.0.4:28432", "10.0.0.3", "10.0.0.3", t)
checkXFF("10.0.0.4:28432", "1.1.1.1, 8.8.4.4", "8.8.4.4", t)
checkXFF("10.0.0.4:28432", "1.1.1.1,8.8.4.4", "8.8.4.4", t)
2020-05-05 04:29:10 +02:00
checkXFF("10.0.0.4:28432", "8.8.4.4, 1.1.1.1, 10.0.0.3", "1.1.1.1", t)
checkXFF("10.0.0.4:28432", "10.0.0.1, 10.0.0.2, 10.0.0.3", "10.0.0.1", t)
checkXFF("10.0.0.4:28432", "10.0.0.1, 10.0.0.2,10.0.0.3", "10.0.0.1", t)
2020-05-05 04:29:10 +02:00
checkXFF("@", "8.8.4.4, 1.1.1.1, 10.0.0.3", "1.1.1.1", t)
// invalid IP tests:
checkXFF("8.8.4.4:9999", "not_an_ip", "8.8.4.4", t)
checkXFF("10.0.0.4:28432", "not_an_ip", "10.0.0.4", t)
checkXFF("10.0.0.4:28432", "not_an_ip, 1.1.1.1, 10.0.0.3", "1.1.1.1", t)
checkXFF("10.0.0.4:28432", "8.8.4.4, not_an_ip, 10.0.0.3", "10.0.0.3", t)
checkXFF("10.0.0.4:28432", "8.8.4.4, not_an_ip", "10.0.0.4", t)
2020-05-05 04:29:10 +02:00
}