| // |
| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| // |
| |
| package com.cloud.utils.net; |
| |
| import static org.hamcrest.Matchers.anyOf; |
| import static org.hamcrest.Matchers.contains; |
| import static org.hamcrest.Matchers.equalTo; |
| import static org.hamcrest.Matchers.greaterThanOrEqualTo; |
| import static org.hamcrest.Matchers.lessThanOrEqualTo; |
| import static org.hamcrest.Matchers.not; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertNotNull; |
| import static org.junit.Assert.assertThat; |
| import static org.junit.Assert.assertTrue; |
| |
| import java.math.BigInteger; |
| import java.net.InetAddress; |
| import java.net.NetworkInterface; |
| import java.net.SocketException; |
| import java.net.UnknownHostException; |
| import java.util.ArrayList; |
| import java.util.List; |
| import java.util.Set; |
| import java.util.SortedSet; |
| import java.util.TreeSet; |
| import java.util.stream.Collectors; |
| |
| import org.junit.Assert; |
| import org.junit.Test; |
| |
| import com.cloud.utils.exception.CloudRuntimeException; |
| import com.cloud.utils.net.NetUtils.SupersetOrSubset; |
| import com.googlecode.ipv6.IPv6Address; |
| import com.googlecode.ipv6.IPv6Network; |
| |
| import org.junit.runner.RunWith; |
| import org.mockito.MockedStatic; |
| import org.mockito.Mockito; |
| import org.mockito.runners.MockitoJUnitRunner; |
| |
| |
| @RunWith(MockitoJUnitRunner.class) |
| public class NetUtilsTest { |
| private static final String WIDE_SHARED_NET_CIDR_IP = "10.20.0.0"; |
| private static final List<String> WIDE_SHARED_NET_USED_IPS = List.of("10.20.0.22", "10.20.1.22", "10.20.2.22"); |
| |
| @Test |
| public void testGetRandomIpFromCidrWithSize24() throws Exception { |
| final String cidr = "192.168.124.1"; |
| final int size = 24; |
| final int netCharacters = 12; |
| |
| final long ip = NetUtils.getRandomIpFromCidr(cidr, size, new TreeSet<Long>()); |
| |
| assertThat("The ip " + NetUtils.long2Ip(ip) + " retrieved must be within the cidr " + cidr + "/" + size, cidr.substring(0, netCharacters), equalTo(NetUtils.long2Ip(ip) |
| .substring(0, netCharacters))); |
| } |
| |
| @Test |
| public void testGetRandomIpFromCidrWithSize16() throws Exception { |
| final String cidr = "192.168.124.1"; |
| final int size = 16; |
| final int netCharacters = 8; |
| |
| final long ip = NetUtils.getRandomIpFromCidr(cidr, 16, new TreeSet<Long>()); |
| |
| assertThat("The ip " + NetUtils.long2Ip(ip) + " retrieved must be within the cidr " + cidr + "/" + size, cidr.substring(0, netCharacters), equalTo(NetUtils.long2Ip(ip) |
| .substring(0, netCharacters))); |
| } |
| |
| @Test |
| public void testGetRandomIpFromCidrWithSize8() throws Exception { |
| final String cidr = "192.168.124.1"; |
| final int size = 8; |
| final int netCharacters = 4; |
| |
| final long ip = NetUtils.getRandomIpFromCidr(cidr, 16, new TreeSet<Long>()); |
| |
| assertThat("The ip " + NetUtils.long2Ip(ip) + " retrieved must be within the cidr " + cidr + "/" + size, cidr.substring(0, netCharacters), equalTo(NetUtils.long2Ip(ip) |
| .substring(0, netCharacters))); |
| } |
| |
| @Test |
| public void testGetRandomIpFromCidrUsignAvoid() throws Exception { |
| final String cidr = "192.168.124.1"; |
| final int size = 30; |
| |
| final SortedSet<Long> avoid = new TreeSet<Long>(); |
| long ip = NetUtils.getRandomIpFromCidr(cidr, size, avoid); |
| assertThat("We should be able to retrieve an ip on the first call.", ip, not(equalTo(-1L))); |
| avoid.add(ip); |
| ip = NetUtils.getRandomIpFromCidr(cidr, size, avoid); |
| assertThat("We should be able to retrieve an ip on the second call.", ip, not(equalTo(-1L))); |
| assertThat("ip returned is not in the avoid list", avoid, not(contains(ip))); |
| avoid.add(ip); |
| ip = NetUtils.getRandomIpFromCidr(cidr, size, avoid); |
| assertThat("We should be able to retrieve an ip on the third call.", ip, not(equalTo(-1L))); |
| assertThat("ip returned is not in the avoid list", avoid, not(contains(ip))); |
| avoid.add(ip); |
| ip = NetUtils.getRandomIpFromCidr(cidr, size, avoid); |
| assertEquals("This should be -1 because we ran out of ip addresses: " + ip, ip, -1); |
| } |
| |
| @Test |
| public void testIsValidS2SVpnPolicy() { |
| assertTrue(NetUtils.isValidS2SVpnPolicy("esp", "aes128-sha1")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("esp", "3des-sha1")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("esp", "3des-sha1,aes256-sha1")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("esp", "3des-md5;modp1024")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("esp", "3des-sha256,aes128-sha512;modp1536")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("ike", "3des-sha1;modp3072,aes128-sha1;modp1536")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("ike", "3des-md5;modp1024")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("ike", "3des-sha1;modp3072,aes128-sha1;modp1536")); |
| assertTrue(NetUtils.isValidS2SVpnPolicy("ike", "3des-sha256;modp3072,aes128-sha512;modp1536")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("ike", "aes128-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("ike", "3des-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("ike", "3des-sha1,aes256-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", "des-md5;modp1024,aes128-sha1;modp1536")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", "des-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", "abc-123,ase-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", "de-sh,aes-sha1")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", "")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", ";modp1536")); |
| assertFalse(NetUtils.isValidS2SVpnPolicy("esp", ",aes;modp1536,,,")); |
| } |
| |
| @Test |
| public void testGetIp6FromRange() { |
| assertEquals(NetUtils.getIp6FromRange("1234:5678::1-1234:5678::1"), "1234:5678::1"); |
| for (int i = 0; i < 5; i++) { |
| final String ip = NetUtils.getIp6FromRange("1234:5678::1-1234:5678::2"); |
| assertThat(ip, anyOf(equalTo("1234:5678::1"), equalTo("1234:5678::2"))); |
| } |
| String ipString = null; |
| final IPv6Address ipStart = IPv6Address.fromString("1234:5678::1"); |
| final IPv6Address ipEnd = IPv6Address.fromString("1234:5678::ffff:ffff:ffff:ffff"); |
| for (int i = 0; i < 10; i++) { |
| ipString = NetUtils.getIp6FromRange(ipStart.toString() + "-" + ipEnd.toString()); |
| final IPv6Address ip = IPv6Address.fromString(ipString); |
| assertThat(ip, greaterThanOrEqualTo(ipStart)); |
| assertThat(ip, lessThanOrEqualTo(ipEnd)); |
| } |
| } |
| |
| @Test |
| public void testCountIp6InRange() { |
| assertEquals(new BigInteger("2"), NetUtils.countIp6InRange("1234:5678::1-1234:5678::2")); |
| } |
| |
| @Test |
| public void testCountIp6InRangeWithInvalidRange() { |
| assertEquals(null, NetUtils.countIp6InRange("1234:5678::2-1234:5678::0")); |
| } |
| |
| @Test |
| public void testCountIp6InRangeWithNullStart() { |
| assertEquals(null, NetUtils.countIp6InRange("-1234:5678::0")); |
| } |
| |
| @Test |
| public void testCountIp6InRangeWithNoEnd() { |
| assertEquals(new BigInteger("1"), NetUtils.countIp6InRange("1234:5678::2")); |
| } |
| |
| @Test |
| public void testGetIp6CidrSize() { |
| assertEquals(NetUtils.getIp6CidrSize("1234:5678::1/32"), 32); |
| assertEquals(NetUtils.getIp6CidrSize("1234:5678::1"), 0); |
| } |
| |
| @Test |
| public void testIsValidIp6Cidr() { |
| assertTrue(NetUtils.isValidIp6Cidr("1234:5678::1/64")); |
| assertFalse(NetUtils.isValidIp6Cidr("1234:5678::1")); |
| } |
| |
| @Test |
| public void testIsValidMacAddr() { |
| assertTrue(NetUtils.isValidMac("ee:12:34:5:32:ff")); |
| assertTrue(NetUtils.isValidMac("ee.12.34.5.32.ff")); |
| assertTrue(NetUtils.isValidMac("ee-12-34-5-32-ff")); |
| assertFalse(NetUtils.isValidMac("aa.12:34:5:32:ff")); |
| assertFalse(NetUtils.isValidMac("gg.gg:gg:gg:gg:gg")); |
| } |
| |
| @Test |
| public void testIsUnicastMac() { |
| |
| assertTrue(NetUtils.isUnicastMac("ee:12:34:5:32:ff")); |
| assertFalse(NetUtils.isUnicastMac("ff:12:34:5:32:ff")); |
| assertFalse(NetUtils.isUnicastMac("01:12:34:5:32:ff")); |
| assertTrue(NetUtils.isUnicastMac("00:ff:ff:ff:ff:ff")); |
| } |
| |
| @Test |
| public void testIsValidIpv6() { |
| assertTrue(NetUtils.isValidIp6("fc00::1")); |
| assertFalse(NetUtils.isValidIp6("")); |
| assertFalse(NetUtils.isValidIp6(null)); |
| assertFalse(NetUtils.isValidIp6("1234:5678::1/64")); |
| } |
| |
| @Test |
| public void testIsIp6InRange() { |
| assertTrue(NetUtils.isIp6InRange("1234:5678:abcd::1", "1234:5678:abcd::1-1234:5678:abcd::1")); |
| assertFalse(NetUtils.isIp6InRange("1234:5678:abcd::1", "1234:5678:abcd::2-1234:5678:abcd::1")); |
| assertFalse(NetUtils.isIp6InRange("1234:5678:abcd::1", null)); |
| assertTrue(NetUtils.isIp6InRange("1234:5678:abcd::1", "1234:5678::1-1234:5679::1")); |
| } |
| |
| @Test |
| public void testIsIp6InNetwork() { |
| assertFalse(NetUtils.isIp6InNetwork(IPv6Address.fromString("1234:5678:abcd::1"), IPv6Network.fromString("1234:5678::/64"))); |
| assertTrue(NetUtils.isIp6InNetwork(IPv6Address.fromString("1234:5678::1"), IPv6Network.fromString("1234:5678::/64"))); |
| assertTrue(NetUtils.isIp6InNetwork(IPv6Address.fromString("1234:5678::ffff:ffff:ffff:ffff"), IPv6Network.fromString("1234:5678::/64"))); |
| assertTrue(NetUtils.isIp6InNetwork(IPv6Address.fromString("1234:5678::"), IPv6Network.fromString("1234:5678::/64"))); |
| } |
| |
| @Test |
| public void testGetNextIp6InRange() { |
| String range = "1234:5678::1-1234:5678::8000:0000"; |
| assertEquals(NetUtils.getNextIp6InRange("1234:5678::8000:0", range), "1234:5678::1"); |
| assertEquals(NetUtils.getNextIp6InRange("1234:5678::7fff:ffff", range), "1234:5678::8000:0"); |
| assertEquals(NetUtils.getNextIp6InRange("1234:5678::1", range), "1234:5678::2"); |
| range = "1234:5678::1-1234:5678::ffff:ffff:ffff:ffff"; |
| assertEquals(NetUtils.getNextIp6InRange("1234:5678::ffff:ffff:ffff:ffff", range), "1234:5678::1"); |
| } |
| |
| @Test |
| public void testIsIp6RangeOverlap() { |
| assertFalse(NetUtils.isIp6RangeOverlap("1234:5678::1-1234:5678::ffff", "1234:5678:1::1-1234:5678:1::ffff")); |
| assertTrue(NetUtils.isIp6RangeOverlap("1234:5678::1-1234:5678::ffff", "1234:5678::2-1234:5678::f")); |
| assertTrue(NetUtils.isIp6RangeOverlap("1234:5678::f-1234:5678::ffff", "1234:5678::2-1234:5678::f")); |
| assertFalse(NetUtils.isIp6RangeOverlap("1234:5678::f-1234:5678::ffff", "1234:5678::2-1234:5678::e")); |
| assertFalse(NetUtils.isIp6RangeOverlap("1234:5678::f-1234:5678::f", "1234:5678::2-1234:5678::e")); |
| } |
| |
| @Test |
| public void testStandardizeIp6Address() { |
| assertEquals(NetUtils.standardizeIp6Address("1234:0000:0000:5678:0000:0000:ABCD:0001"), "1234::5678:0:0:abcd:1"); |
| assertEquals(NetUtils.standardizeIp6Cidr("1234:0000:0000:5678:0000:0000:ABCD:0001/64"), "1234:0:0:5678::/64"); |
| } |
| |
| @Test |
| public void testGenerateUriForIsolatedPvlan() { |
| assertEquals("pvlan://123-i456", NetUtils.generateUriForPvlan("123", "456").toString()); |
| } |
| |
| @Test |
| public void testGenerateUriForCommunityPvlan() { |
| assertEquals("pvlan://123-c456", NetUtils.generateUriForPvlan("123", "456", "Community").toString()); |
| } |
| |
| @Test |
| public void testGenerateUriForPromiscuousPvlan() { |
| assertEquals("pvlan://123-p123", NetUtils.generateUriForPvlan("123", "123", "promiscuous").toString()); |
| } |
| |
| @Test |
| public void testGetPrimaryPvlanFromUri() { |
| assertEquals("123", NetUtils.getPrimaryPvlanFromUri(NetUtils.generateUriForPvlan("123", "456"))); |
| } |
| |
| @Test |
| public void testGetIsolatedPvlanFromUri() { |
| assertEquals("456", NetUtils.getIsolatedPvlanFromUri(NetUtils.generateUriForPvlan("123", "456"))); |
| } |
| |
| @Test |
| public void testIsValidCIDR() throws Exception { |
| //Test to check IP Range of 2 CIDR |
| final String cidrFirst = "10.0.144.0/20"; |
| final String cidrSecond = "10.0.151.0/20"; |
| final String cidrThird = "10.0.144.0/21"; |
| |
| assertTrue(NetUtils.isValidIp4Cidr(cidrFirst)); |
| assertTrue(NetUtils.isValidIp4Cidr(cidrSecond)); |
| assertTrue(NetUtils.isValidIp4Cidr(cidrThird));; |
| } |
| |
| @Test |
| public void testIsValidCidrList() throws Exception { |
| final String cidrFirst = "10.0.144.0/20,1.2.3.4/32,5.6.7.8/24"; |
| final String cidrSecond = "10.0.151.0/20,129.0.0.0/4"; |
| final String cidrThird = "10.0.144.0/21"; |
| |
| assertTrue(NetUtils.isValidCidrList(cidrFirst)); |
| assertTrue(NetUtils.isValidCidrList(cidrSecond)); |
| assertTrue(NetUtils.isValidCidrList(cidrThird)); |
| } |
| |
| @Test |
| public void testIsSameIpRange() { |
| final String cidrFirst = "10.0.144.0/20"; |
| final String cidrSecond = "10.0.151.0/20"; |
| final String cidrThird = "10.0.144.0/21"; |
| |
| //Check for exactly same CIDRs |
| assertTrue(NetUtils.isSameIpRange(cidrFirst, cidrFirst)); |
| //Check for 2 different CIDRs, but same IP Range |
| assertTrue(NetUtils.isSameIpRange(cidrFirst, cidrSecond)); |
| //Check for 2 different CIDRs and different IP Range |
| assertFalse(NetUtils.isSameIpRange(cidrFirst, cidrThird)); |
| //Check for Incorrect format of CIDR |
| assertFalse(NetUtils.isSameIpRange(cidrFirst, "10.3.6.5/50")); |
| } |
| |
| @Test |
| public void testGenerateMacOnIncrease() { |
| String mac = "06:01:23:00:45:67"; |
| assertEquals("06:01:25:00:45:67", NetUtils.generateMacOnIncrease(mac, 2)); |
| assertEquals("06:01:33:00:45:67", NetUtils.generateMacOnIncrease(mac, 16)); |
| mac = "06:ff:ff:00:45:67"; |
| assertEquals("06:00:00:00:45:67", NetUtils.generateMacOnIncrease(mac, 1)); |
| assertEquals("06:00:0f:00:45:67", NetUtils.generateMacOnIncrease(mac, 16)); |
| } |
| |
| @Test |
| public void testGetLocalIPString() { |
| assertNotNull(NetUtils.getLocalIPString()); |
| } |
| |
| @Test |
| public void testSameIsolationId() { |
| assertTrue(NetUtils.isSameIsolationId("1", "vlan://1")); |
| assertTrue(NetUtils.isSameIsolationId("", null)); |
| assertTrue(NetUtils.isSameIsolationId("UnTagged", "vlan://uNtAGGED")); |
| assertFalse(NetUtils.isSameIsolationId("2", "vlan://uNtAGGED")); |
| assertFalse(NetUtils.isSameIsolationId("2", "vlan://3")); |
| assertFalse(NetUtils.isSameIsolationId("bla", null)); |
| } |
| |
| @Test |
| public void testValidateGuestCidr() throws Exception { |
| final String[] validCidrs = {"10.1.1.1/16", "172.16.1.0/16", "192.168.1.0/24", "100.64.1.0/24"}; |
| final String[] invalidCidrs = {"172.33.1.0/16", "100.128.1.0/10"}; |
| |
| for (String cidr: validCidrs) { |
| assertTrue(NetUtils.validateGuestCidr(cidr)); |
| } |
| for (String cidr: invalidCidrs) { |
| assertFalse(NetUtils.validateGuestCidr(cidr)); |
| } |
| } |
| |
| @Test |
| public void testMac2Long() { |
| assertEquals(0l, NetUtils.mac2Long("00:00:00:00:00:00")); |
| assertEquals(1l, NetUtils.mac2Long("00:00:00:00:00:01")); |
| assertEquals(0xFFl, NetUtils.mac2Long("00:00:00:00:00:FF")); |
| assertEquals(0xFFAAl, NetUtils.mac2Long("00:00:00:00:FF:AA")); |
| assertEquals(0x11FFAAl, NetUtils.mac2Long("00:00:00:11:FF:AA")); |
| assertEquals(0x12345678l, NetUtils.mac2Long("00:00:12:34:56:78")); |
| assertEquals(0x123456789Al, NetUtils.mac2Long("00:12:34:56:78:9A")); |
| assertEquals(0x123456789ABCl, NetUtils.mac2Long("12:34:56:78:9A:BC")); |
| } |
| |
| @Test |
| public void testLong2Mac() { |
| assertEquals("00:00:00:00:00:00", NetUtils.long2Mac(0l)); |
| assertEquals("00:00:00:00:00:01", NetUtils.long2Mac(1l)); |
| assertEquals("00:00:00:00:00:ff", NetUtils.long2Mac(0xFFl)); |
| assertEquals("00:00:00:00:ff:aa", NetUtils.long2Mac(0xFFAAl)); |
| assertEquals("00:00:00:11:ff:aa", NetUtils.long2Mac(0x11FFAAl)); |
| assertEquals("00:00:12:34:56:78", NetUtils.long2Mac(0x12345678l)); |
| assertEquals("00:12:34:56:78:9a", NetUtils.long2Mac(0x123456789Al)); |
| assertEquals("12:34:56:78:9a:bc", NetUtils.long2Mac(0x123456789ABCl)); |
| } |
| |
| @Test |
| public void testIp2Long() { |
| assertEquals(0x7f000001l, NetUtils.ip2Long("127.0.0.1")); |
| assertEquals(0xc0a80001l, NetUtils.ip2Long("192.168.0.1")); |
| assertEquals(0x08080808l, NetUtils.ip2Long("8.8.8.8")); |
| } |
| |
| @Test |
| public void testLong2Ip() { |
| assertEquals("127.0.0.1", NetUtils.long2Ip(0x7f000001l)); |
| assertEquals("192.168.0.1", NetUtils.long2Ip(0xc0a80001l)); |
| assertEquals("8.8.8.8", NetUtils.long2Ip(0x08080808l)); |
| } |
| |
| @Test |
| public void test31BitPrefixStart() { |
| final String ipAddress = "192.168.0.0"; |
| final String cidr = "192.168.0.0/31"; |
| |
| final boolean isInRange = NetUtils.isIpWithInCidrRange(ipAddress, cidr); |
| |
| assertTrue("Check if the subnetUtils.setInclusiveHostCount(true) has been called.", isInRange); |
| } |
| |
| @Test |
| public void test31BitPrefixEnd() { |
| final String ipAddress = "192.168.0.1"; |
| final String cidr = "192.168.0.0/31"; |
| |
| final boolean isInRange = NetUtils.isIpWithInCidrRange(ipAddress, cidr); |
| |
| assertTrue("Check if the subnetUtils.setInclusiveHostCount(true) has been called.", isInRange); |
| } |
| |
| @Test |
| public void test31BitPrefixFail() { |
| final String ipAddress = "192.168.0.2"; |
| final String cidr = "192.168.0.0/31"; |
| |
| final boolean isInRange = NetUtils.isIpWithInCidrRange(ipAddress, cidr); |
| |
| assertFalse("Out of the range. Why did it return true?", isInRange); |
| } |
| |
| @Test |
| public void test31BitPrefixIpRangesOverlapd() { |
| final String gw = "192.168.0.0"; |
| String ip1; |
| String ip2; |
| |
| for (int i = 1, j = 2; i <= 254; i++, j++) { |
| ip1 = "192.168.0." + i; |
| ip2 = "192.168.0." + j; |
| |
| final boolean doesOverlap = NetUtils.ipRangesOverlap(ip1, ip2, gw, gw); |
| assertFalse("It should overlap, but it's a 31-bit ip", doesOverlap); |
| } |
| } |
| |
| @Test |
| public void test31BitPrefixIpRangesOverlapdFail() { |
| String gw; |
| String ip1; |
| String ip2; |
| |
| for (int i = 10, j = 12; i <= 254; i++, j++) { |
| gw = "192.168.0." + i; |
| ip1 = "192.168.0." + i; |
| ip2 = "192.168.0." + j; |
| |
| final boolean doesOverlap = NetUtils.ipRangesOverlap(ip1, ip2, gw, gw); |
| assertTrue("It overlaps!", doesOverlap); |
| } |
| } |
| |
| @Test |
| public void testIs31PrefixCidrFail() { |
| final String cidr = "10.10.0.0/32"; |
| final boolean is31PrefixCidr = NetUtils.is31PrefixCidr(cidr); |
| |
| assertFalse("It should fail! 32 bit prefix.", is31PrefixCidr); |
| } |
| |
| @Test |
| public void testIs31PrefixCidr() { |
| final String cidr = "10.10.0.0/31"; |
| final boolean is31PrefixCidr = NetUtils.is31PrefixCidr(cidr); |
| |
| assertTrue("It should pass! 31 bit prefix.", is31PrefixCidr); |
| } |
| |
| @Test |
| public void testGetCidrNetMask() { |
| final String cidr = "10.10.0.0/16"; |
| String netmask = NetUtils.getCidrNetmask("10.10.10.10/16"); |
| assertTrue(cidr + " does not generate valid netmask " + netmask,NetUtils.isValidIp4Netmask(netmask)); |
| } |
| |
| @Test |
| public void testGetCidrSubNet() { |
| final String cidr = "10.10.0.0/16"; |
| String subnet = NetUtils.getCidrSubNet("10.10.10.10/16"); |
| assertTrue(cidr + " does not contain " + subnet,NetUtils.isIpWithInCidrRange(subnet, cidr)); |
| } |
| |
| @Test |
| public void testGetCidrSubNetWithWidth() { |
| final String cidr = "10.10.0.0/16"; |
| String subnet = NetUtils.getCidrSubNet("10.10.10.10", 16); |
| assertTrue(cidr + " does not contain " + subnet,NetUtils.isIpWithInCidrRange(subnet, cidr)); |
| } |
| |
| @Test |
| public void testIsValidCidrSize() { |
| final String cidrsize = "16"; |
| long netbits = NetUtils.getCidrSizeFromString(cidrsize); |
| assertTrue(" does not compute " + cidrsize,netbits == 16); |
| } |
| |
| @Test(expected=CloudRuntimeException.class) |
| public void testIsInvalidCidrSize() { |
| final String cidrsize = "33"; |
| long netbits = NetUtils.getCidrSizeFromString(cidrsize); |
| assertTrue(" does not compute " + cidrsize,netbits == 16); |
| } |
| |
| @Test(expected=CloudRuntimeException.class) |
| public void testIsInvalidCidrString() { |
| final String cidrsize = "ggg"; |
| long netbits = NetUtils.getCidrSizeFromString(cidrsize); |
| assertTrue(" does not compute " + cidrsize,netbits == 16); |
| } |
| |
| @Test |
| public void testCidrToLongArray() { |
| final String cidr = "10.192.10.10/10"; |
| Long[] netbits = NetUtils.cidrToLong(cidr); |
| assertEquals("unexpected cidrsize " + netbits[1],10l, netbits[1].longValue()); |
| assertEquals("(un)expected <" + 0x0ac00000L + "> netaddress " + netbits[0].longValue(),netbits[0].longValue(),0x0ac00000l); |
| } |
| |
| @Test |
| public void testNetmaskFromCidr() { |
| long mask = NetUtils.netMaskFromCidr(1l); |
| assertEquals("mask not right: " + mask, 0x80000000, mask); |
| mask = NetUtils.netMaskFromCidr(32l); |
| assertEquals("mask not right: " + mask, 0xffffffff, mask); |
| } |
| |
| @Test |
| public void testIsCidrsNotEmptyWithNullCidrs() { |
| assertEquals(false, NetUtils.areCidrsNotEmpty(null, null)); |
| } |
| |
| @Test |
| public void testIsCidrsNotEmptyWithEmptyCidrs() { |
| assertEquals(false, NetUtils.areCidrsNotEmpty("", " ")); |
| } |
| |
| @Test |
| public void testIsCidrsNotEmpty() { |
| assertEquals(true, NetUtils.areCidrsNotEmpty("10.10.0.0/16", "10.1.2.3/16")); |
| } |
| |
| @Test |
| public void testIsNetowrkASubsetOrSupersetOfNetworkBWithEmptyValues() { |
| assertEquals(SupersetOrSubset.errorInCidrFormat, NetUtils.isNetowrkASubsetOrSupersetOfNetworkB("", null)); |
| } |
| |
| @Test |
| public void testIsNetworkAWithinNetworkBWithEmptyValues() { |
| assertEquals(false, NetUtils.isNetworkAWithinNetworkB("", null)); |
| } |
| |
| @Test |
| public void testIsNetworkAWithinNetworkB() { |
| assertTrue(NetUtils.isNetworkAWithinNetworkB("192.168.30.0/24", "192.168.30.0/23")); |
| assertTrue(NetUtils.isNetworkAWithinNetworkB("192.168.30.0/24", "192.168.30.0/22")); |
| assertFalse(NetUtils.isNetworkAWithinNetworkB("192.168.30.0/23", "192.168.30.0/24")); |
| assertFalse(NetUtils.isNetworkAWithinNetworkB("192.168.30.0/22", "192.168.30.0/24")); |
| assertTrue(NetUtils.isNetworkAWithinNetworkB("192.168.28.0/24", "192.168.28.0/23")); |
| assertTrue(NetUtils.isNetworkAWithinNetworkB("192.168.28.0/24", "192.168.28.0/22")); |
| assertFalse(NetUtils.isNetworkAWithinNetworkB("192.168.28.0/23", "192.168.28.0/24")); |
| assertFalse(NetUtils.isNetworkAWithinNetworkB("192.168.28.0/22", "192.168.28.0/24")); |
| assertTrue(NetUtils.isNetworkAWithinNetworkB("192.168.30.0/24", "192.168.28.0/22")); |
| } |
| |
| @Test |
| public void testIsNetworksOverlapWithEmptyValues() { |
| assertEquals(false, NetUtils.isNetworksOverlap("", null)); |
| } |
| @Test |
| public void testisNetworkorBroadCastIP(){ |
| //Checking the True conditions |
| assertTrue(NetUtils.isNetworkorBroadcastIP("192.168.0.0","255.255.255.0")); |
| assertTrue(NetUtils.isNetworkorBroadcastIP("192.168.0.255","255.255.255.0")); |
| assertTrue(NetUtils.isNetworkorBroadcastIP("192.168.0.127","255.255.255.128")); |
| assertTrue(NetUtils.isNetworkorBroadcastIP("192.168.0.63","255.255.255.192")); |
| |
| //Checking the False conditions |
| assertFalse(NetUtils.isNetworkorBroadcastIP("192.168.0.1","255.255.255.0")); |
| assertFalse(NetUtils.isNetworkorBroadcastIP("192.168.0.127","255.255.255.0")); |
| assertFalse(NetUtils.isNetworkorBroadcastIP("192.168.0.126","255.255.255.128")); |
| assertFalse(NetUtils.isNetworkorBroadcastIP("192.168.0.62","255.255.255.192")); |
| |
| assertTrue(NetUtils.isNetworkorBroadcastIP("192.168.0.63","255.255.255.192")); |
| assertFalse(NetUtils.isNetworkorBroadcastIP("192.168.0.63","255.255.255.128")); |
| } |
| |
| @Test |
| public void testIPv6EUI64Address() { |
| assertEquals(IPv6Address.fromString("2001:db8:100::47a:88ff:fe00:8b"), |
| NetUtils.EUI64Address("2001:db8:100::/64", "06:7a:88:00:00:8b")); |
| |
| assertEquals(IPv6Address.fromString("2a00:f10:121:b00:434:a0ff:fe00:1bc7"), |
| NetUtils.EUI64Address("2a00:f10:121:b00::/64", "06:34:a0:00:1b:c7")); |
| |
| assertEquals(IPv6Address.fromString("2001:980:7936:0:ea2a:eaff:fe58:eb98"), |
| NetUtils.EUI64Address("2001:980:7936::/64", "e8:2a:ea:58:eb:98")); |
| |
| assertEquals(IPv6Address.fromString("2001:980:7936:0:c23f:d5ff:fe68:2808"), |
| NetUtils.EUI64Address("2001:980:7936::/64", "c0:3f:d5:68:28:08")); |
| } |
| |
| @Test |
| public void testcreateSequenceBasedMacAddress(){ |
| long mac1 = NetUtils.createSequenceBasedMacAddress(10l,10l); |
| assertEquals(10l,(mac1 & (0x0al<<32)) >> 32); |
| assertEquals(10l,mac1 & 0x0al); |
| assertEquals(30l, mac1>>40); |
| |
| long mac2 = NetUtils.createSequenceBasedMacAddress(20l,15l); |
| assertEquals(15l, (mac2 & (0x0fl << 32)) >> 32); |
| assertEquals(20l, mac2 & 0x14l); |
| assertEquals(30l, mac1>>40); |
| } |
| |
| @Test |
| public void testIPv6LinkLocal() { |
| assertEquals(IPv6Address.fromString("fe80::fc54:ff:fe00:3e05"), NetUtils.ipv6LinkLocal("fe:54:00:00:3e:05")); |
| assertEquals(IPv6Address.fromString("fe80::42:e0ff:fee8:d6a3"), NetUtils.ipv6LinkLocal("02:42:e0:e8:d6:a3")); |
| assertEquals(IPv6Address.fromString("fe80::47a:88ff:fe00:8b"), NetUtils.ipv6LinkLocal("06:7a:88:00:00:8b")); |
| } |
| |
| @Test |
| public void testIsIpInCidrList() throws UnknownHostException { |
| String[] cidrs = "0.0.0.0/0,::/0".split(","); |
| System.out.println(NetUtils.isIpInCidrList(InetAddress.getByName("192.168.1.1"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("192.168.1.1"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("172.16.8.9"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("127.0.0.1"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("2001:db8:100::1"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("::1"), cidrs)); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("2a01:4f8:130:2192::2"), cidrs)); |
| |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("127.0.0.1"), "127.0.0.1/8".split(","))); |
| assertFalse(NetUtils.isIpInCidrList(InetAddress.getByName("192.168.1.1"), "127.0.0.1/8".split(","))); |
| |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("127.0.0.1"), "127.0.0.1/8,::1/128".split(","))); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("::1"), "127.0.0.1/8,::1/128".split(","))); |
| |
| assertFalse(NetUtils.isIpInCidrList(InetAddress.getByName("192.168.29.47"), "127.0.0.1/8,::1/128".split(","))); |
| assertFalse(NetUtils.isIpInCidrList(InetAddress.getByName("2001:db8:1938:3ff1::1"), "127.0.0.1/8,::1/128".split(","))); |
| |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("2a01:4f8:130:2192::2"), "::/0,127.0.0.1".split(","))); |
| assertTrue(NetUtils.isIpInCidrList(InetAddress.getByName("2001:db8:200:300::1"), "2001:db8:200::/48,127.0.0.1".split(","))); |
| assertFalse(NetUtils.isIpInCidrList(InetAddress.getByName("2001:db8:200:300::1"), "2001:db8:300::/64,127.0.0.1".split(","))); |
| assertFalse(NetUtils.isIpInCidrList(InetAddress.getByName("2a01:4f8:130:2192::2"), "2001:db8::/64,127.0.0.1".split(","))); |
| } |
| |
| @Test |
| public void testIsSiteLocalAddress() { |
| assertTrue(NetUtils.isSiteLocalAddress("192.168.0.1")); |
| assertTrue(NetUtils.isSiteLocalAddress("10.0.0.1")); |
| assertTrue(NetUtils.isSiteLocalAddress("172.16.0.1")); |
| assertTrue(NetUtils.isSiteLocalAddress("192.168.254.56")); |
| assertTrue(NetUtils.isSiteLocalAddress("10.254.254.254")); |
| assertFalse(NetUtils.isSiteLocalAddress("8.8.8.8")); |
| assertFalse(NetUtils.isSiteLocalAddress("8.8.4.4")); |
| assertFalse(NetUtils.isSiteLocalAddress("")); |
| assertFalse(NetUtils.isSiteLocalAddress(null)); |
| } |
| |
| @Test |
| public void testStaticVariables() { |
| assertEquals(80, NetUtils.HTTP_PORT); |
| assertEquals(443, NetUtils.HTTPS_PORT); |
| assertEquals(500, NetUtils.VPN_PORT); |
| assertEquals(4500, NetUtils.VPN_NATT_PORT); |
| assertEquals(1701, NetUtils.VPN_L2TP_PORT); |
| assertEquals(8081, NetUtils.HAPROXY_STATS_PORT); |
| |
| assertEquals("udp", NetUtils.UDP_PROTO); |
| assertEquals("tcp", NetUtils.TCP_PROTO); |
| assertEquals("any", NetUtils.ANY_PROTO); |
| assertEquals("icmp", NetUtils.ICMP_PROTO); |
| assertEquals("http", NetUtils.HTTP_PROTO); |
| assertEquals("ssl", NetUtils.SSL_PROTO); |
| |
| assertEquals("0.0.0.0/0", NetUtils.ALL_IP4_CIDRS); |
| assertEquals("::/0", NetUtils.ALL_IP6_CIDRS); |
| } |
| |
| @Test |
| public void testIsValidPort() { |
| assertTrue(NetUtils.isValidPort(80)); |
| assertTrue(NetUtils.isValidPort("80")); |
| assertTrue(NetUtils.isValidPort(443)); |
| assertTrue(NetUtils.isValidPort("443")); |
| assertTrue(NetUtils.isValidPort(0)); |
| assertTrue(NetUtils.isValidPort(65535)); |
| assertFalse(NetUtils.isValidPort(-1)); |
| assertFalse(NetUtils.isValidPort(65536)); |
| } |
| |
| @Test |
| public void testIsIpv4() { |
| assertTrue(NetUtils.isIpv4("192.168.1.1")); |
| assertFalse(NetUtils.isIpv4("2a01:4f8:130:2192::2")); |
| } |
| |
| @Test(expected = IllegalArgumentException.class) |
| public void testIsIpv4ExpectException() { |
| NetUtils.isIpv4("test"); |
| } |
| |
| @Test(expected = IllegalArgumentException.class) |
| public void testIsIpv4ExpectException2() { |
| NetUtils.isIpv4("2001:db8:300::/64"); |
| } |
| |
| @Test |
| public void testAllIpsOfDefaultNic() { |
| final String defaultHostIp = NetUtils.getDefaultHostIp(); |
| if (defaultHostIp != null) { |
| assertTrue(NetUtils.getAllDefaultNicIps().stream().anyMatch(defaultHostIp::contains)); |
| } |
| } |
| |
| @Test |
| public void testIsIPv6EUI64() { |
| assertTrue(NetUtils.isIPv6EUI64("fe80::5054:8fff:fe9f:af61")); |
| assertTrue(NetUtils.isIPv6EUI64("2a00:f10:305:0:464:64ff:fe00:4e0")); |
| assertFalse(NetUtils.isIPv6EUI64("2001:db8::100:1")); |
| assertFalse(NetUtils.isIPv6EUI64("2a01:4f9:2a:185f::2")); |
| } |
| |
| @Test |
| public void testLinkLocal() { |
| final String cidr = NetUtils.getLinkLocalCIDR(); |
| assertEquals("255.255.0.0", NetUtils.getLinkLocalNetMask()); |
| assertEquals("169.254.0.1", NetUtils.getLinkLocalGateway()); |
| assertEquals("169.254.0.0/16", cidr); |
| assertEquals("169.254.0.1", NetUtils.getLinkLocalFirstAddressFromCIDR(cidr)); |
| assertEquals("169.254.0.1/255.255.0.0", NetUtils.getLinkLocalAddressFromCIDR(cidr)); |
| assertEquals("169.254.240.1/255.255.240.0", NetUtils.getLinkLocalAddressFromCIDR("169.254.240.0/20")); |
| |
| String[] range = NetUtils.getLinkLocalIPRange("169.254.0.0/16"); |
| assertEquals("169.254.0.2", range[0]); |
| assertEquals("169.254.255.254", range[1]); |
| } |
| |
| @Test |
| public void testCidrNetmask() { |
| assertEquals("255.255.255.0", NetUtils.cidr2Netmask("192.168.0.0/24")); |
| assertEquals("255.255.0.0", NetUtils.cidr2Netmask("169.254.0.0/16")); |
| assertEquals("255.255.240.0", NetUtils.cidr2Netmask("169.254.240.0/20")); |
| } |
| |
| private void runTestGetAllIpsFromCidr(int cidrSize, int maxIps, boolean usedIpPresent, int resultSize) { |
| Set<Long> usedIps = new TreeSet<>(); |
| if (usedIpPresent) { |
| for (String ip : WIDE_SHARED_NET_USED_IPS) { |
| usedIps.add(NetUtils.ip2Long(ip)); |
| } |
| } |
| Set<Long> result = NetUtils.getAllIpsFromCidr(WIDE_SHARED_NET_CIDR_IP, cidrSize, usedIps, maxIps); |
| assertNotNull(result); |
| assertEquals(resultSize, result.size()); |
| if (usedIpPresent) { |
| for (String ip : WIDE_SHARED_NET_USED_IPS) { |
| assertFalse(result.contains(NetUtils.ip2Long(ip))); |
| } |
| } |
| } |
| |
| @Test |
| public void testGetAllIpsFromCidrNoneUsedNoLimit() { |
| runTestGetAllIpsFromCidr(22, -1, false, 1022); |
| } |
| |
| @Test |
| public void testGetAllIpsFromCidrNoneUsedLimit() { |
| runTestGetAllIpsFromCidr(22, 255, false, 255); |
| } |
| |
| @Test |
| public void testGetAllIpsFromCidrNoneUsedLessLimit() { |
| runTestGetAllIpsFromCidr(22, 10, false, 10); |
| } |
| |
| |
| @Test |
| public void testGetAllIpsFromCidrUsedNoLimit() { |
| runTestGetAllIpsFromCidr(22, -1, true, 1022 - WIDE_SHARED_NET_USED_IPS.size()); |
| } |
| |
| @Test |
| public void testGetAllIpsFromCidrUsedLimit() { |
| runTestGetAllIpsFromCidr(22, 50, true, 50); |
| List<String> usedIpsInRange = new ArrayList<>(WIDE_SHARED_NET_USED_IPS); |
| usedIpsInRange = usedIpsInRange.stream().filter(x -> x.startsWith("10.20.0.")).collect(Collectors.toList()); |
| runTestGetAllIpsFromCidr(24, 255, true, 254 - usedIpsInRange.size()); |
| } |
| |
| @Test |
| public void getNetworkInterfaceTestReturnNullWhenStringIsNull() { |
| NetworkInterface result = NetUtils.getNetworkInterface(null); |
| Assert.assertNull(result); |
| } |
| |
| @Test |
| public void getNetworkInterfaceTestReturnNullWhenStringIsEmpty() { |
| NetworkInterface result = NetUtils.getNetworkInterface(" "); |
| Assert.assertNull(result); |
| } |
| |
| @Test |
| public void getNetworkInterfaceTestReturnNullWhenGetByNameReturnsNull() throws SocketException { |
| MockedStatic<NetworkInterface> networkInterfaceMocked = Mockito.mockStatic(NetworkInterface.class); |
| Mockito.when(NetworkInterface.getByName(Mockito.anyString())).thenReturn(null); |
| NetworkInterface result = NetUtils.getNetworkInterface(" test "); |
| |
| Assert.assertNull(result); |
| networkInterfaceMocked.close(); |
| } |
| |
| @Test |
| public void getNetworkInterfaceTestReturnNullWhenGetByNameThrowsException() throws SocketException { |
| MockedStatic<NetworkInterface> networkInterfaceMocked = Mockito.mockStatic(NetworkInterface.class); |
| Mockito.when(NetworkInterface.getByName(Mockito.anyString())).thenThrow(SocketException.class); |
| NetworkInterface result = NetUtils.getNetworkInterface(" test "); |
| |
| Assert.assertNull(result); |
| networkInterfaceMocked.close(); |
| } |
| |
| @Test |
| public void getNetworkInterfaceTestReturnInterfaceReturnedByGetByName() throws SocketException { |
| MockedStatic<NetworkInterface> networkInterfaceMocked = Mockito.mockStatic(NetworkInterface.class); |
| NetworkInterface expected = Mockito.mock(NetworkInterface.class); |
| Mockito.when(NetworkInterface.getByName(Mockito.anyString())).thenReturn(expected); |
| |
| NetworkInterface result = NetUtils.getNetworkInterface(" test "); |
| |
| Assert.assertEquals(expected, result); |
| networkInterfaceMocked.close(); |
| } |
| } |