blob: e75f07d8c292625a875911708c4578742fde2668 [file] [log] [blame]
// Copyright 2020 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package netip_test
import (
"bytes"
"encoding/json"
"flag"
"fmt"
"internal/intern"
"internal/testenv"
"net"
. "net/netip"
"reflect"
"slices"
"sort"
"strings"
"testing"
)
var long = flag.Bool("long", false, "run long tests")
type uint128 = Uint128
var (
mustPrefix = MustParsePrefix
mustIP = MustParseAddr
mustIPPort = MustParseAddrPort
)
func TestParseAddr(t *testing.T) {
var validIPs = []struct {
in string
ip Addr // output of ParseAddr()
str string // output of String(). If "", use in.
wantErr string
}{
// Basic zero IPv4 address.
{
in: "0.0.0.0",
ip: MkAddr(Mk128(0, 0xffff00000000), Z4),
},
// Basic non-zero IPv4 address.
{
in: "192.168.140.255",
ip: MkAddr(Mk128(0, 0xffffc0a88cff), Z4),
},
// IPv4 address in windows-style "print all the digits" form.
{
in: "010.000.015.001",
wantErr: `ParseAddr("010.000.015.001"): IPv4 field has octet with leading zero`,
},
// IPv4 address with a silly amount of leading zeros.
{
in: "000001.00000002.00000003.000000004",
wantErr: `ParseAddr("000001.00000002.00000003.000000004"): IPv4 field has octet with leading zero`,
},
// 4-in-6 with octet with leading zero
{
in: "::ffff:1.2.03.4",
wantErr: `ParseAddr("::ffff:1.2.03.4"): IPv4 field has octet with leading zero`,
},
// 4-in-6 with octet with unexpected character
{
in: "::ffff:1.2.3.z",
wantErr: `ParseAddr("::ffff:1.2.3.z"): unexpected character (at "z")`,
},
// Basic zero IPv6 address.
{
in: "::",
ip: MkAddr(Mk128(0, 0), Z6noz),
},
// Localhost IPv6.
{
in: "::1",
ip: MkAddr(Mk128(0, 1), Z6noz),
},
// Fully expanded IPv6 address.
{
in: "fd7a:115c:a1e0:ab12:4843:cd96:626b:430b",
ip: MkAddr(Mk128(0xfd7a115ca1e0ab12, 0x4843cd96626b430b), Z6noz),
},
// IPv6 with elided fields in the middle.
{
in: "fd7a:115c::626b:430b",
ip: MkAddr(Mk128(0xfd7a115c00000000, 0x00000000626b430b), Z6noz),
},
// IPv6 with elided fields at the end.
{
in: "fd7a:115c:a1e0:ab12:4843:cd96::",
ip: MkAddr(Mk128(0xfd7a115ca1e0ab12, 0x4843cd9600000000), Z6noz),
},
// IPv6 with single elided field at the end.
{
in: "fd7a:115c:a1e0:ab12:4843:cd96:626b::",
ip: MkAddr(Mk128(0xfd7a115ca1e0ab12, 0x4843cd96626b0000), Z6noz),
str: "fd7a:115c:a1e0:ab12:4843:cd96:626b:0",
},
// IPv6 with single elided field in the middle.
{
in: "fd7a:115c:a1e0::4843:cd96:626b:430b",
ip: MkAddr(Mk128(0xfd7a115ca1e00000, 0x4843cd96626b430b), Z6noz),
str: "fd7a:115c:a1e0:0:4843:cd96:626b:430b",
},
// IPv6 with the trailing 32 bits written as IPv4 dotted decimal. (4in6)
{
in: "::ffff:192.168.140.255",
ip: MkAddr(Mk128(0, 0x0000ffffc0a88cff), Z6noz),
str: "::ffff:192.168.140.255",
},
// IPv6 with a zone specifier.
{
in: "fd7a:115c:a1e0:ab12:4843:cd96:626b:430b%eth0",
ip: MkAddr(Mk128(0xfd7a115ca1e0ab12, 0x4843cd96626b430b), intern.Get("eth0")),
},
// IPv6 with dotted decimal and zone specifier.
{
in: "1:2::ffff:192.168.140.255%eth1",
ip: MkAddr(Mk128(0x0001000200000000, 0x0000ffffc0a88cff), intern.Get("eth1")),
str: "1:2::ffff:c0a8:8cff%eth1",
},
// 4-in-6 with zone
{
in: "::ffff:192.168.140.255%eth1",
ip: MkAddr(Mk128(0, 0x0000ffffc0a88cff), intern.Get("eth1")),
str: "::ffff:192.168.140.255%eth1",
},
// IPv6 with capital letters.
{
in: "FD9E:1A04:F01D::1",
ip: MkAddr(Mk128(0xfd9e1a04f01d0000, 0x1), Z6noz),
str: "fd9e:1a04:f01d::1",
},
}
for _, test := range validIPs {
t.Run(test.in, func(t *testing.T) {
got, err := ParseAddr(test.in)
if err != nil {
if err.Error() == test.wantErr {
return
}
t.Fatal(err)
}
if test.wantErr != "" {
t.Fatalf("wanted error %q; got none", test.wantErr)
}
if got != test.ip {
t.Errorf("got %#v, want %#v", got, test.ip)
}
// Check that ParseAddr is a pure function.
got2, err := ParseAddr(test.in)
if err != nil {
t.Fatal(err)
}
if got != got2 {
t.Errorf("ParseAddr(%q) got 2 different results: %#v, %#v", test.in, got, got2)
}
// Check that ParseAddr(ip.String()) is the identity function.
s := got.String()
got3, err := ParseAddr(s)
if err != nil {
t.Fatal(err)
}
if got != got3 {
t.Errorf("ParseAddr(%q) != ParseAddr(ParseIP(%q).String()). Got %#v, want %#v", test.in, test.in, got3, got)
}
// Check that the slow-but-readable parser produces the same result.
slow, err := parseIPSlow(test.in)
if err != nil {
t.Fatal(err)
}
if got != slow {
t.Errorf("ParseAddr(%q) = %#v, parseIPSlow(%q) = %#v", test.in, got, test.in, slow)
}
// Check that the parsed IP formats as expected.
s = got.String()
wants := test.str
if wants == "" {
wants = test.in
}
if s != wants {
t.Errorf("ParseAddr(%q).String() got %q, want %q", test.in, s, wants)
}
// Check that AppendTo matches MarshalText.
TestAppendToMarshal(t, got)
// Check that MarshalText/UnmarshalText work similarly to
// ParseAddr/String (see TestIPMarshalUnmarshal for
// marshal-specific behavior that's not common with
// ParseAddr/String).
js := `"` + test.in + `"`
var jsgot Addr
if err := json.Unmarshal([]byte(js), &jsgot); err != nil {
t.Fatal(err)
}
if jsgot != got {
t.Errorf("json.Unmarshal(%q) = %#v, want %#v", test.in, jsgot, got)
}
jsb, err := json.Marshal(jsgot)
if err != nil {
t.Fatal(err)
}
jswant := `"` + wants + `"`
jsback := string(jsb)
if jsback != jswant {
t.Errorf("Marshal(Unmarshal(%q)) = %s, want %s", test.in, jsback, jswant)
}
})
}
var invalidIPs = []string{
// Empty string
"",
// Garbage non-IP
"bad",
// Single number. Some parsers accept this as an IPv4 address in
// big-endian uint32 form, but we don't.
"1234",
// IPv4 with a zone specifier
"1.2.3.4%eth0",
// IPv4 field must have at least one digit
".1.2.3",
"1.2.3.",
"1..2.3",
// IPv4 address too long
"1.2.3.4.5",
// IPv4 in dotted octal form
"0300.0250.0214.0377",
// IPv4 in dotted hex form
"0xc0.0xa8.0x8c.0xff",
// IPv4 in class B form
"192.168.12345",
// IPv4 in class B form, with a small enough number to be
// parseable as a regular dotted decimal field.
"127.0.1",
// IPv4 in class A form
"192.1234567",
// IPv4 in class A form, with a small enough number to be
// parseable as a regular dotted decimal field.
"127.1",
// IPv4 field has value >255
"192.168.300.1",
// IPv4 with too many fields
"192.168.0.1.5.6",
// IPv6 with not enough fields
"1:2:3:4:5:6:7",
// IPv6 with too many fields
"1:2:3:4:5:6:7:8:9",
// IPv6 with 8 fields and a :: expander
"1:2:3:4::5:6:7:8",
// IPv6 with a field bigger than 2b
"fe801::1",
// IPv6 with non-hex values in field
"fe80:tail:scal:e::",
// IPv6 with a zone delimiter but no zone.
"fe80::1%",
// IPv6 (without ellipsis) with too many fields for trailing embedded IPv4.
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:192.168.140.255",
// IPv6 (with ellipsis) with too many fields for trailing embedded IPv4.
"ffff::ffff:ffff:ffff:ffff:ffff:ffff:192.168.140.255",
// IPv6 with invalid embedded IPv4.
"::ffff:192.168.140.bad",
// IPv6 with multiple ellipsis ::.
"fe80::1::1",
// IPv6 with invalid non hex/colon character.
"fe80:1?:1",
// IPv6 with truncated bytes after single colon.
"fe80:",
// IPv6 with 5 zeros in last group
"0:0:0:0:0:ffff:0:00000",
// IPv6 with 5 zeros in one group and embedded IPv4
"0:0:0:0:00000:ffff:127.1.2.3",
}
for _, s := range invalidIPs {
t.Run(s, func(t *testing.T) {
got, err := ParseAddr(s)
if err == nil {
t.Errorf("ParseAddr(%q) = %#v, want error", s, got)
}
slow, err := parseIPSlow(s)
if err == nil {
t.Errorf("parseIPSlow(%q) = %#v, want error", s, slow)
}
std := net.ParseIP(s)
if std != nil {
t.Errorf("net.ParseIP(%q) = %#v, want error", s, std)
}
if s == "" {
// Don't test unmarshaling of "" here, do it in
// IPMarshalUnmarshal.
return
}
var jsgot Addr
js := []byte(`"` + s + `"`)
if err := json.Unmarshal(js, &jsgot); err == nil {
t.Errorf("json.Unmarshal(%q) = %#v, want error", s, jsgot)
}
})
}
}
func TestAddrFromSlice(t *testing.T) {
tests := []struct {
ip []byte
wantAddr Addr
wantOK bool
}{
{
ip: []byte{10, 0, 0, 1},
wantAddr: mustIP("10.0.0.1"),
wantOK: true,
},
{
ip: []byte{0xfe, 0x80, 15: 0x01},
wantAddr: mustIP("fe80::01"),
wantOK: true,
},
{
ip: []byte{0, 1, 2},
wantAddr: Addr{},
wantOK: false,
},
{
ip: nil,
wantAddr: Addr{},
wantOK: false,
},
}
for _, tt := range tests {
addr, ok := AddrFromSlice(tt.ip)
if ok != tt.wantOK || addr != tt.wantAddr {
t.Errorf("AddrFromSlice(%#v) = %#v, %v, want %#v, %v", tt.ip, addr, ok, tt.wantAddr, tt.wantOK)
}
}
}
func TestIPv4Constructors(t *testing.T) {
if AddrFrom4([4]byte{1, 2, 3, 4}) != MustParseAddr("1.2.3.4") {
t.Errorf("don't match")
}
}
func TestAddrMarshalUnmarshalBinary(t *testing.T) {
tests := []struct {
ip string
wantSize int
}{
{"", 0}, // zero IP
{"1.2.3.4", 4},
{"fd7a:115c:a1e0:ab12:4843:cd96:626b:430b", 16},
{"::ffff:c000:0280", 16},
{"::ffff:c000:0280%eth0", 20},
}
for _, tc := range tests {
var ip Addr
if len(tc.ip) > 0 {
ip = mustIP(tc.ip)
}
b, err := ip.MarshalBinary()
if err != nil {
t.Fatal(err)
}
if len(b) != tc.wantSize {
t.Fatalf("%q encoded to size %d; want %d", tc.ip, len(b), tc.wantSize)
}
var ip2 Addr
if err := ip2.UnmarshalBinary(b); err != nil {
t.Fatal(err)
}
if ip != ip2 {
t.Fatalf("got %v; want %v", ip2, ip)
}
}
// Cannot unmarshal from unexpected IP length.
for _, n := range []int{3, 5} {
var ip2 Addr
if err := ip2.UnmarshalBinary(bytes.Repeat([]byte{1}, n)); err == nil {
t.Fatalf("unmarshaled from unexpected IP length %d", n)
}
}
}
func TestAddrPortMarshalTextString(t *testing.T) {
tests := []struct {
in AddrPort
want string
}{
{mustIPPort("1.2.3.4:80"), "1.2.3.4:80"},
{mustIPPort("[::]:80"), "[::]:80"},
{mustIPPort("[1::CAFE]:80"), "[1::cafe]:80"},
{mustIPPort("[1::CAFE%en0]:80"), "[1::cafe%en0]:80"},
{mustIPPort("[::FFFF:192.168.140.255]:80"), "[::ffff:192.168.140.255]:80"},
{mustIPPort("[::FFFF:192.168.140.255%en0]:80"), "[::ffff:192.168.140.255%en0]:80"},
}
for i, tt := range tests {
if got := tt.in.String(); got != tt.want {
t.Errorf("%d. for (%v, %v) String = %q; want %q", i, tt.in.Addr(), tt.in.Port(), got, tt.want)
}
mt, err := tt.in.MarshalText()
if err != nil {
t.Errorf("%d. for (%v, %v) MarshalText error: %v", i, tt.in.Addr(), tt.in.Port(), err)
continue
}
if string(mt) != tt.want {
t.Errorf("%d. for (%v, %v) MarshalText = %q; want %q", i, tt.in.Addr(), tt.in.Port(), mt, tt.want)
}
}
}
func TestAddrPortMarshalUnmarshalBinary(t *testing.T) {
tests := []struct {
ipport string
wantSize int
}{
{"1.2.3.4:51820", 4 + 2},
{"[fd7a:115c:a1e0:ab12:4843:cd96:626b:430b]:80", 16 + 2},
{"[::ffff:c000:0280]:65535", 16 + 2},
{"[::ffff:c000:0280%eth0]:1", 20 + 2},
}
for _, tc := range tests {
var ipport AddrPort
if len(tc.ipport) > 0 {
ipport = mustIPPort(tc.ipport)
}
b, err := ipport.MarshalBinary()
if err != nil {
t.Fatal(err)
}
if len(b) != tc.wantSize {
t.Fatalf("%q encoded to size %d; want %d", tc.ipport, len(b), tc.wantSize)
}
var ipport2 AddrPort
if err := ipport2.UnmarshalBinary(b); err != nil {
t.Fatal(err)
}
if ipport != ipport2 {
t.Fatalf("got %v; want %v", ipport2, ipport)
}
}
// Cannot unmarshal from unexpected lengths.
for _, n := range []int{3, 7} {
var ipport2 AddrPort
if err := ipport2.UnmarshalBinary(bytes.Repeat([]byte{1}, n)); err == nil {
t.Fatalf("unmarshaled from unexpected length %d", n)
}
}
}
func TestPrefixMarshalTextString(t *testing.T) {
tests := []struct {
in Prefix
want string
}{
{mustPrefix("1.2.3.4/24"), "1.2.3.4/24"},
{mustPrefix("fd7a:115c:a1e0:ab12:4843:cd96:626b:430b/118"), "fd7a:115c:a1e0:ab12:4843:cd96:626b:430b/118"},
{mustPrefix("::ffff:c000:0280/96"), "::ffff:192.0.2.128/96"},
{mustPrefix("::ffff:192.168.140.255/8"), "::ffff:192.168.140.255/8"},
{PrefixFrom(mustIP("::ffff:c000:0280").WithZone("eth0"), 37), "::ffff:192.0.2.128/37"}, // Zone should be stripped
}
for i, tt := range tests {
if got := tt.in.String(); got != tt.want {
t.Errorf("%d. for %v String = %q; want %q", i, tt.in, got, tt.want)
}
mt, err := tt.in.MarshalText()
if err != nil {
t.Errorf("%d. for %v MarshalText error: %v", i, tt.in, err)
continue
}
if string(mt) != tt.want {
t.Errorf("%d. for %v MarshalText = %q; want %q", i, tt.in, mt, tt.want)
}
}
}
func TestPrefixMarshalUnmarshalBinary(t *testing.T) {
type testCase struct {
prefix Prefix
wantSize int
}
tests := []testCase{
{mustPrefix("1.2.3.4/24"), 4 + 1},
{mustPrefix("fd7a:115c:a1e0:ab12:4843:cd96:626b:430b/118"), 16 + 1},
{mustPrefix("::ffff:c000:0280/96"), 16 + 1},
{PrefixFrom(mustIP("::ffff:c000:0280").WithZone("eth0"), 37), 16 + 1}, // Zone should be stripped
}
tests = append(tests,
testCase{PrefixFrom(tests[0].prefix.Addr(), 33), tests[0].wantSize},
testCase{PrefixFrom(tests[1].prefix.Addr(), 129), tests[1].wantSize})
for _, tc := range tests {
prefix := tc.prefix
b, err := prefix.MarshalBinary()
if err != nil {
t.Fatal(err)
}
if len(b) != tc.wantSize {
t.Fatalf("%q encoded to size %d; want %d", tc.prefix, len(b), tc.wantSize)
}
var prefix2 Prefix
if err := prefix2.UnmarshalBinary(b); err != nil {
t.Fatal(err)
}
if prefix != prefix2 {
t.Fatalf("got %v; want %v", prefix2, prefix)
}
}
// Cannot unmarshal from unexpected lengths.
for _, n := range []int{3, 6} {
var prefix2 Prefix
if err := prefix2.UnmarshalBinary(bytes.Repeat([]byte{1}, n)); err == nil {
t.Fatalf("unmarshaled from unexpected length %d", n)
}
}
}
func TestAddrMarshalUnmarshal(t *testing.T) {
// This only tests the cases where Marshal/Unmarshal diverges from
// the behavior of ParseAddr/String. For the rest of the test cases,
// see TestParseAddr above.
orig := `""`
var ip Addr
if err := json.Unmarshal([]byte(orig), &ip); err != nil {
t.Fatalf("Unmarshal(%q) got error %v", orig, err)
}
if ip != (Addr{}) {
t.Errorf("Unmarshal(%q) is not the zero Addr", orig)
}
jsb, err := json.Marshal(ip)
if err != nil {
t.Fatalf("Marshal(%v) got error %v", ip, err)
}
back := string(jsb)
if back != orig {
t.Errorf("Marshal(Unmarshal(%q)) got %q, want %q", orig, back, orig)
}
}
func TestAddrFrom16(t *testing.T) {
tests := []struct {
name string
in [16]byte
want Addr
}{
{
name: "v6-raw",
in: [...]byte{15: 1},
want: MkAddr(Mk128(0, 1), Z6noz),
},
{
name: "v4-raw",
in: [...]byte{10: 0xff, 11: 0xff, 12: 1, 13: 2, 14: 3, 15: 4},
want: MkAddr(Mk128(0, 0xffff01020304), Z6noz),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got := AddrFrom16(tt.in)
if got != tt.want {
t.Errorf("got %#v; want %#v", got, tt.want)
}
})
}
}
func TestIPProperties(t *testing.T) {
var (
nilIP Addr
unicast4 = mustIP("192.0.2.1")
unicast6 = mustIP("2001:db8::1")
unicastZone6 = mustIP("2001:db8::1%eth0")
unicast6Unassigned = mustIP("4000::1") // not in 2000::/3.
multicast4 = mustIP("224.0.0.1")
multicast6 = mustIP("ff02::1")
multicastZone6 = mustIP("ff02::1%eth0")
llu4 = mustIP("169.254.0.1")
llu6 = mustIP("fe80::1")
llu6Last = mustIP("febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff")
lluZone6 = mustIP("fe80::1%eth0")
loopback4 = mustIP("127.0.0.1")
ilm6 = mustIP("ff01::1")
ilmZone6 = mustIP("ff01::1%eth0")
private4a = mustIP("10.0.0.1")
private4b = mustIP("172.16.0.1")
private4c = mustIP("192.168.1.1")
private6 = mustIP("fd00::1")
)
tests := []struct {
name string
ip Addr
globalUnicast bool
interfaceLocalMulticast bool
linkLocalMulticast bool
linkLocalUnicast bool
loopback bool
multicast bool
private bool
unspecified bool
}{
{
name: "nil",
ip: nilIP,
},
{
name: "unicast v4Addr",
ip: unicast4,
globalUnicast: true,
},
{
name: "unicast v6Addr",
ip: unicast6,
globalUnicast: true,
},
{
name: "unicast v6AddrZone",
ip: unicastZone6,
globalUnicast: true,
},
{
name: "unicast v6Addr unassigned",
ip: unicast6Unassigned,
globalUnicast: true,
},
{
name: "multicast v4Addr",
ip: multicast4,
linkLocalMulticast: true,
multicast: true,
},
{
name: "multicast v6Addr",
ip: multicast6,
linkLocalMulticast: true,
multicast: true,
},
{
name: "multicast v6AddrZone",
ip: multicastZone6,
linkLocalMulticast: true,
multicast: true,
},
{
name: "link-local unicast v4Addr",
ip: llu4,
linkLocalUnicast: true,
},
{
name: "link-local unicast v6Addr",
ip: llu6,
linkLocalUnicast: true,
},
{
name: "link-local unicast v6Addr upper bound",
ip: llu6Last,
linkLocalUnicast: true,
},
{
name: "link-local unicast v6AddrZone",
ip: lluZone6,
linkLocalUnicast: true,
},
{
name: "loopback v4Addr",
ip: loopback4,
loopback: true,
},
{
name: "loopback v6Addr",
ip: IPv6Loopback(),
loopback: true,
},
{
name: "interface-local multicast v6Addr",
ip: ilm6,
interfaceLocalMulticast: true,
multicast: true,
},
{
name: "interface-local multicast v6AddrZone",
ip: ilmZone6,
interfaceLocalMulticast: true,
multicast: true,
},
{
name: "private v4Addr 10/8",
ip: private4a,
globalUnicast: true,
private: true,
},
{
name: "private v4Addr 172.16/12",
ip: private4b,
globalUnicast: true,
private: true,
},
{
name: "private v4Addr 192.168/16",
ip: private4c,
globalUnicast: true,
private: true,
},
{
name: "private v6Addr",
ip: private6,
globalUnicast: true,
private: true,
},
{
name: "unspecified v4Addr",
ip: IPv4Unspecified(),
unspecified: true,
},
{
name: "unspecified v6Addr",
ip: IPv6Unspecified(),
unspecified: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gu := tt.ip.IsGlobalUnicast()
if gu != tt.globalUnicast {
t.Errorf("IsGlobalUnicast(%v) = %v; want %v", tt.ip, gu, tt.globalUnicast)
}
ilm := tt.ip.IsInterfaceLocalMulticast()
if ilm != tt.interfaceLocalMulticast {
t.Errorf("IsInterfaceLocalMulticast(%v) = %v; want %v", tt.ip, ilm, tt.interfaceLocalMulticast)
}
llu := tt.ip.IsLinkLocalUnicast()
if llu != tt.linkLocalUnicast {
t.Errorf("IsLinkLocalUnicast(%v) = %v; want %v", tt.ip, llu, tt.linkLocalUnicast)
}
llm := tt.ip.IsLinkLocalMulticast()
if llm != tt.linkLocalMulticast {
t.Errorf("IsLinkLocalMulticast(%v) = %v; want %v", tt.ip, llm, tt.linkLocalMulticast)
}
lo := tt.ip.IsLoopback()
if lo != tt.loopback {
t.Errorf("IsLoopback(%v) = %v; want %v", tt.ip, lo, tt.loopback)
}
multicast := tt.ip.IsMulticast()
if multicast != tt.multicast {
t.Errorf("IsMulticast(%v) = %v; want %v", tt.ip, multicast, tt.multicast)
}
private := tt.ip.IsPrivate()
if private != tt.private {
t.Errorf("IsPrivate(%v) = %v; want %v", tt.ip, private, tt.private)
}
unspecified := tt.ip.IsUnspecified()
if unspecified != tt.unspecified {
t.Errorf("IsUnspecified(%v) = %v; want %v", tt.ip, unspecified, tt.unspecified)
}
})
}
}
func TestAddrWellKnown(t *testing.T) {
tests := []struct {
name string
ip Addr
std net.IP
}{
{
name: "IPv6 link-local all nodes",
ip: IPv6LinkLocalAllNodes(),
std: net.IPv6linklocalallnodes,
},
{
name: "IPv6 link-local all routers",
ip: IPv6LinkLocalAllRouters(),
std: net.IPv6linklocalallrouters,
},
{
name: "IPv6 loopback",
ip: IPv6Loopback(),
std: net.IPv6loopback,
},
{
name: "IPv6 unspecified",
ip: IPv6Unspecified(),
std: net.IPv6unspecified,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
want := tt.std.String()
got := tt.ip.String()
if got != want {
t.Fatalf("got %s, want %s", got, want)
}
})
}
}
func TestAddrLessCompare(t *testing.T) {
tests := []struct {
a, b Addr
want bool
}{
{Addr{}, Addr{}, false},
{Addr{}, mustIP("1.2.3.4"), true},
{mustIP("1.2.3.4"), Addr{}, false},
{mustIP("1.2.3.4"), mustIP("0102:0304::0"), true},
{mustIP("0102:0304::0"), mustIP("1.2.3.4"), false},
{mustIP("1.2.3.4"), mustIP("1.2.3.4"), false},
{mustIP("::1"), mustIP("::2"), true},
{mustIP("::1"), mustIP("::1%foo"), true},
{mustIP("::1%foo"), mustIP("::2"), true},
{mustIP("::2"), mustIP("::3"), true},
{mustIP("::"), mustIP("0.0.0.0"), false},
{mustIP("0.0.0.0"), mustIP("::"), true},
{mustIP("::1%a"), mustIP("::1%b"), true},
{mustIP("::1%a"), mustIP("::1%a"), false},
{mustIP("::1%b"), mustIP("::1%a"), false},
}
for _, tt := range tests {
got := tt.a.Less(tt.b)
if got != tt.want {
t.Errorf("Less(%q, %q) = %v; want %v", tt.a, tt.b, got, tt.want)
}
cmp := tt.a.Compare(tt.b)
if got && cmp != -1 {
t.Errorf("Less(%q, %q) = true, but Compare = %v (not -1)", tt.a, tt.b, cmp)
}
if cmp < -1 || cmp > 1 {
t.Errorf("bogus Compare return value %v", cmp)
}
if cmp == 0 && tt.a != tt.b {
t.Errorf("Compare(%q, %q) = 0; but not equal", tt.a, tt.b)
}
if cmp == 1 && !tt.b.Less(tt.a) {
t.Errorf("Compare(%q, %q) = 1; but b.Less(a) isn't true", tt.a, tt.b)
}
// Also check inverse.
if got == tt.want && got {
got2 := tt.b.Less(tt.a)
if got2 {
t.Errorf("Less(%q, %q) was correctly %v, but so was Less(%q, %q)", tt.a, tt.b, got, tt.b, tt.a)
}
}
}
// And just sort.
values := []Addr{
mustIP("::1"),
mustIP("::2"),
Addr{},
mustIP("1.2.3.4"),
mustIP("8.8.8.8"),
mustIP("::1%foo"),
}
sort.Slice(values, func(i, j int) bool { return values[i].Less(values[j]) })
got := fmt.Sprintf("%s", values)
want := `[invalid IP 1.2.3.4 8.8.8.8 ::1 ::1%foo ::2]`
if got != want {
t.Errorf("unexpected sort\n got: %s\nwant: %s\n", got, want)
}
}
func TestAddrPortCompare(t *testing.T) {
tests := []struct {
a, b AddrPort
want int
}{
{AddrPort{}, AddrPort{}, 0},
{AddrPort{}, mustIPPort("1.2.3.4:80"), -1},
{mustIPPort("1.2.3.4:80"), mustIPPort("1.2.3.4:80"), 0},
{mustIPPort("[::1]:80"), mustIPPort("[::1]:80"), 0},
{mustIPPort("1.2.3.4:80"), mustIPPort("2.3.4.5:22"), -1},
{mustIPPort("[::1]:80"), mustIPPort("[::2]:22"), -1},
{mustIPPort("1.2.3.4:80"), mustIPPort("1.2.3.4:443"), -1},
{mustIPPort("[::1]:80"), mustIPPort("[::1]:443"), -1},
{mustIPPort("1.2.3.4:80"), mustIPPort("[0102:0304::0]:80"), -1},
}
for _, tt := range tests {
got := tt.a.Compare(tt.b)
if got != tt.want {
t.Errorf("Compare(%q, %q) = %v; want %v", tt.a, tt.b, got, tt.want)
}
// Also check inverse.
if got == tt.want {
got2 := tt.b.Compare(tt.a)
if want2 := -1 * tt.want; got2 != want2 {
t.Errorf("Compare(%q, %q) was correctly %v, but Compare(%q, %q) was %v", tt.a, tt.b, got, tt.b, tt.a, got2)
}
}
}
// And just sort.
values := []AddrPort{
mustIPPort("[::1]:80"),
mustIPPort("[::2]:80"),
AddrPort{},
mustIPPort("1.2.3.4:443"),
mustIPPort("8.8.8.8:8080"),
mustIPPort("[::1%foo]:1024"),
}
slices.SortFunc(values, func(a, b AddrPort) int { return a.Compare(b) })
got := fmt.Sprintf("%s", values)
want := `[invalid AddrPort 1.2.3.4:443 8.8.8.8:8080 [::1]:80 [::1%foo]:1024 [::2]:80]`
if got != want {
t.Errorf("unexpected sort\n got: %s\nwant: %s\n", got, want)
}
}
func TestPrefixCompare(t *testing.T) {
tests := []struct {
a, b Prefix
want int
}{
{Prefix{}, Prefix{}, 0},
{Prefix{}, mustPrefix("1.2.3.0/24"), -1},
{mustPrefix("1.2.3.0/24"), mustPrefix("1.2.3.0/24"), 0},
{mustPrefix("fe80::/64"), mustPrefix("fe80::/64"), 0},
{mustPrefix("1.2.3.0/24"), mustPrefix("1.2.4.0/24"), -1},
{mustPrefix("fe80::/64"), mustPrefix("fe90::/64"), -1},
{mustPrefix("1.2.0.0/16"), mustPrefix("1.2.0.0/24"), -1},
{mustPrefix("fe80::/48"), mustPrefix("fe80::/64"), -1},
{mustPrefix("1.2.3.0/24"), mustPrefix("fe80::/8"), -1},
}
for _, tt := range tests {
got := tt.a.Compare(tt.b)
if got != tt.want {
t.Errorf("Compare(%q, %q) = %v; want %v", tt.a, tt.b, got, tt.want)
}
// Also check inverse.
if got == tt.want {
got2 := tt.b.Compare(tt.a)
if want2 := -1 * tt.want; got2 != want2 {
t.Errorf("Compare(%q, %q) was correctly %v, but Compare(%q, %q) was %v", tt.a, tt.b, got, tt.b, tt.a, got2)
}
}
}
// And just sort.
values := []Prefix{
mustPrefix("1.2.3.0/24"),
mustPrefix("fe90::/64"),
mustPrefix("fe80::/64"),
mustPrefix("1.2.0.0/16"),
Prefix{},
mustPrefix("fe80::/48"),
mustPrefix("1.2.0.0/24"),
}
slices.SortFunc(values, func(a, b Prefix) int { return a.Compare(b) })
got := fmt.Sprintf("%s", values)
want := `[invalid Prefix 1.2.0.0/16 1.2.0.0/24 1.2.3.0/24 fe80::/48 fe80::/64 fe90::/64]`
if got != want {
t.Errorf("unexpected sort\n got: %s\nwant: %s\n", got, want)
}
}
func TestIPStringExpanded(t *testing.T) {
tests := []struct {
ip Addr
s string
}{
{
ip: Addr{},
s: "invalid IP",
},
{
ip: mustIP("192.0.2.1"),
s: "192.0.2.1",
},
{
ip: mustIP("::ffff:192.0.2.1"),
s: "0000:0000:0000:0000:0000:ffff:c000:0201",
},
{
ip: mustIP("2001:db8::1"),
s: "2001:0db8:0000:0000:0000:0000:0000:0001",
},
{
ip: mustIP("2001:db8::1%eth0"),
s: "2001:0db8:0000:0000:0000:0000:0000:0001%eth0",
},
}
for _, tt := range tests {
t.Run(tt.ip.String(), func(t *testing.T) {
want := tt.s
got := tt.ip.StringExpanded()
if got != want {
t.Fatalf("got %s, want %s", got, want)
}
})
}
}
func TestPrefixMasking(t *testing.T) {
type subtest struct {
ip Addr
bits uint8
p Prefix
ok bool
}
// makeIPv6 produces a set of IPv6 subtests with an optional zone identifier.
makeIPv6 := func(zone string) []subtest {
if zone != "" {
zone = "%" + zone
}
return []subtest{
{
ip: mustIP(fmt.Sprintf("2001:db8::1%s", zone)),
bits: 255,
},
{
ip: mustIP(fmt.Sprintf("2001:db8::1%s", zone)),
bits: 32,
p: mustPrefix("2001:db8::/32"),
ok: true,
},
{
ip: mustIP(fmt.Sprintf("fe80::dead:beef:dead:beef%s", zone)),
bits: 96,
p: mustPrefix("fe80::dead:beef:0:0/96"),
ok: true,
},
{
ip: mustIP(fmt.Sprintf("aaaa::%s", zone)),
bits: 4,
p: mustPrefix("a000::/4"),
ok: true,
},
{
ip: mustIP(fmt.Sprintf("::%s", zone)),
bits: 63,
p: mustPrefix("::/63"),
ok: true,
},
}
}
tests := []struct {
family string
subtests []subtest
}{
{
family: "nil",
subtests: []subtest{
{
bits: 255,
ok: true,
},
{
bits: 16,
ok: true,
},
},
},
{
family: "IPv4",
subtests: []subtest{
{
ip: mustIP("192.0.2.0"),
bits: 255,
},
{
ip: mustIP("192.0.2.0"),
bits: 16,
p: mustPrefix("192.0.0.0/16"),
ok: true,
},
{
ip: mustIP("255.255.255.255"),
bits: 20,
p: mustPrefix("255.255.240.0/20"),
ok: true,
},
{
// Partially masking one byte that contains both
// 1s and 0s on either side of the mask limit.
ip: mustIP("100.98.156.66"),
bits: 10,
p: mustPrefix("100.64.0.0/10"),
ok: true,
},
},
},
{
family: "IPv6",
subtests: makeIPv6(""),
},
{
family: "IPv6 zone",
subtests: makeIPv6("eth0"),
},
}
for _, tt := range tests {
t.Run(tt.family, func(t *testing.T) {
for _, st := range tt.subtests {
t.Run(st.p.String(), func(t *testing.T) {
// Ensure st.ip is not mutated.
orig := st.ip.String()
p, err := st.ip.Prefix(int(st.bits))
if st.ok && err != nil {
t.Fatalf("failed to produce prefix: %v", err)
}
if !st.ok && err == nil {
t.Fatal("expected an error, but none occurred")
}
if err != nil {
t.Logf("err: %v", err)
return
}
if !reflect.DeepEqual(p, st.p) {
t.Errorf("prefix = %q, want %q", p, st.p)
}
if got := st.ip.String(); got != orig {
t.Errorf("IP was mutated: %q, want %q", got, orig)
}
})
}
})
}
}
func TestPrefixMarshalUnmarshal(t *testing.T) {
tests := []string{
"",
"1.2.3.4/32",
"0.0.0.0/0",
"::/0",
"::1/128",
"2001:db8::/32",
}
for _, s := range tests {
t.Run(s, func(t *testing.T) {
// Ensure that JSON (and by extension, text) marshaling is
// sane by entering quoted input.
orig := `"` + s + `"`
var p Prefix
if err := json.Unmarshal([]byte(orig), &p); err != nil {
t.Fatalf("failed to unmarshal: %v", err)
}
pb, err := json.Marshal(p)
if err != nil {
t.Fatalf("failed to marshal: %v", err)
}
back := string(pb)
if orig != back {
t.Errorf("Marshal = %q; want %q", back, orig)
}
})
}
}
func TestPrefixUnmarshalTextNonZero(t *testing.T) {
ip := mustPrefix("fe80::/64")
if err := ip.UnmarshalText([]byte("xxx")); err == nil {
t.Fatal("unmarshaled into non-empty Prefix")
}
}
func TestIs4AndIs6(t *testing.T) {
tests := []struct {
ip Addr
is4 bool
is6 bool
}{
{Addr{}, false, false},
{mustIP("1.2.3.4"), true, false},
{mustIP("127.0.0.2"), true, false},
{mustIP("::1"), false, true},
{mustIP("::ffff:192.0.2.128"), false, true},
{mustIP("::fffe:c000:0280"), false, true},
{mustIP("::1%eth0"), false, true},
}
for _, tt := range tests {
got4 := tt.ip.Is4()
if got4 != tt.is4 {
t.Errorf("Is4(%q) = %v; want %v", tt.ip, got4, tt.is4)
}
got6 := tt.ip.Is6()
if got6 != tt.is6 {
t.Errorf("Is6(%q) = %v; want %v", tt.ip, got6, tt.is6)
}
}
}
func TestIs4In6(t *testing.T) {
tests := []struct {
ip Addr
want bool
wantUnmap Addr
}{
{Addr{}, false, Addr{}},
{mustIP("::ffff:c000:0280"), true, mustIP("192.0.2.128")},
{mustIP("::ffff:192.0.2.128"), true, mustIP("192.0.2.128")},
{mustIP("::ffff:192.0.2.128%eth0"), true, mustIP("192.0.2.128")},
{mustIP("::fffe:c000:0280"), false, mustIP("::fffe:c000:0280")},
{mustIP("::ffff:127.1.2.3"), true, mustIP("127.1.2.3")},
{mustIP("::ffff:7f01:0203"), true, mustIP("127.1.2.3")},
{mustIP("0:0:0:0:0000:ffff:127.1.2.3"), true, mustIP("127.1.2.3")},
{mustIP("0:0:0:0::ffff:127.1.2.3"), true, mustIP("127.1.2.3")},
{mustIP("::1"), false, mustIP("::1")},
{mustIP("1.2.3.4"), false, mustIP("1.2.3.4")},
}
for _, tt := range tests {
got := tt.ip.Is4In6()
if got != tt.want {
t.Errorf("Is4In6(%q) = %v; want %v", tt.ip, got, tt.want)
}
u := tt.ip.Unmap()
if u != tt.wantUnmap {
t.Errorf("Unmap(%q) = %v; want %v", tt.ip, u, tt.wantUnmap)
}
}
}
func TestPrefixMasked(t *testing.T) {
tests := []struct {
prefix Prefix
masked Prefix
}{
{
prefix: mustPrefix("192.168.0.255/24"),
masked: mustPrefix("192.168.0.0/24"),
},
{
prefix: mustPrefix("2100::/3"),
masked: mustPrefix("2000::/3"),
},
{
prefix: PrefixFrom(mustIP("2000::"), 129),
masked: Prefix{},
},
{
prefix: PrefixFrom(mustIP("1.2.3.4"), 33),
masked: Prefix{},
},
}
for _, test := range tests {
t.Run(test.prefix.String(), func(t *testing.T) {
got := test.prefix.Masked()
if got != test.masked {
t.Errorf("Masked=%s, want %s", got, test.masked)
}
})
}
}
func TestPrefix(t *testing.T) {
tests := []struct {
prefix string
ip Addr
bits int
str string
contains []Addr
notContains []Addr
}{
{
prefix: "192.168.0.0/24",
ip: mustIP("192.168.0.0"),
bits: 24,
contains: mustIPs("192.168.0.1", "192.168.0.55"),
notContains: mustIPs("192.168.1.1", "1.1.1.1"),
},
{
prefix: "192.168.1.1/32",
ip: mustIP("192.168.1.1"),
bits: 32,
contains: mustIPs("192.168.1.1"),
notContains: mustIPs("192.168.1.2"),
},
{
prefix: "100.64.0.0/10", // CGNAT range; prefix not multiple of 8
ip: mustIP("100.64.0.0"),
bits: 10,
contains: mustIPs("100.64.0.0", "100.64.0.1", "100.81.251.94", "100.100.100.100", "100.127.255.254", "100.127.255.255"),
notContains: mustIPs("100.63.255.255", "100.128.0.0"),
},
{
prefix: "2001:db8::/96",
ip: mustIP("2001:db8::"),
bits: 96,
contains: mustIPs("2001:db8::aaaa:bbbb", "2001:db8::1"),
notContains: mustIPs("2001:db8::1:aaaa:bbbb", "2001:db9::"),
},
{
prefix: "0.0.0.0/0",
ip: mustIP("0.0.0.0"),
bits: 0,
contains: mustIPs("192.168.0.1", "1.1.1.1"),
notContains: append(mustIPs("2001:db8::1"), Addr{}),
},
{
prefix: "::/0",
ip: mustIP("::"),
bits: 0,
contains: mustIPs("::1", "2001:db8::1"),
notContains: mustIPs("192.0.2.1"),
},
{
prefix: "2000::/3",
ip: mustIP("2000::"),
bits: 3,
contains: mustIPs("2001:db8::1"),
notContains: mustIPs("fe80::1"),
},
}
for _, test := range tests {
t.Run(test.prefix, func(t *testing.T) {
prefix, err := ParsePrefix(test.prefix)
if err != nil {
t.Fatal(err)
}
if prefix.Addr() != test.ip {
t.Errorf("IP=%s, want %s", prefix.Addr(), test.ip)
}
if prefix.Bits() != test.bits {
t.Errorf("bits=%d, want %d", prefix.Bits(), test.bits)
}
for _, ip := range test.contains {
if !prefix.Contains(ip) {
t.Errorf("does not contain %s", ip)
}
}
for _, ip := range test.notContains {
if prefix.Contains(ip) {
t.Errorf("contains %s", ip)
}
}
want := test.str
if want == "" {
want = test.prefix
}
if got := prefix.String(); got != want {
t.Errorf("prefix.String()=%q, want %q", got, want)
}
TestAppendToMarshal(t, prefix)
})
}
}
func TestPrefixFromInvalidBits(t *testing.T) {
v4 := MustParseAddr("1.2.3.4")
v6 := MustParseAddr("66::66")
tests := []struct {
ip Addr
in, want int
}{
{v4, 0, 0},
{v6, 0, 0},
{v4, 1, 1},
{v4, 33, -1},
{v6, 33, 33},
{v6, 127, 127},
{v6, 128, 128},
{v4, 254, -1},
{v4, 255, -1},
{v4, -1, -1},
{v6, -1, -1},
{v4, -5, -1},
{v6, -5, -1},
}
for _, tt := range tests {
p := PrefixFrom(tt.ip, tt.in)
if got := p.Bits(); got != tt.want {
t.Errorf("for (%v, %v), Bits out = %v; want %v", tt.ip, tt.in, got, tt.want)
}
}
}
func TestParsePrefixAllocs(t *testing.T) {
tests := []struct {
ip string
slash string
}{
{"192.168.1.0", "/24"},
{"aaaa:bbbb:cccc::", "/24"},
}
for _, test := range tests {
prefix := test.ip + test.slash
t.Run(prefix, func(t *testing.T) {
ipAllocs := int(testing.AllocsPerRun(5, func() {
ParseAddr(test.ip)
}))
prefixAllocs := int(testing.AllocsPerRun(5, func() {
ParsePrefix(prefix)
}))
if got := prefixAllocs - ipAllocs; got != 0 {
t.Errorf("allocs=%d, want 0", got)
}
})
}
}
func TestParsePrefixError(t *testing.T) {
tests := []struct {
prefix string
errstr string
}{
{
prefix: "192.168.0.0",
errstr: "no '/'",
},
{
prefix: "1.257.1.1/24",
errstr: "value >255",
},
{
prefix: "1.1.1.0/q",
errstr: "bad bits",
},
{
prefix: "1.1.1.0/-1",
errstr: "bad bits",
},
{
prefix: "1.1.1.0/33",
errstr: "out of range",
},
{
prefix: "2001::/129",
errstr: "out of range",
},
// Zones are not allowed: https://go.dev/issue/51899
{
prefix: "1.1.1.0%a/24",
errstr: "unexpected character",
},
{
prefix: "2001:db8::%a/32",
errstr: "zones cannot be present",
},
{
prefix: "1.1.1.0/+32",
errstr: "bad bits",
},
{
prefix: "1.1.1.0/-32",
errstr: "bad bits",
},
{
prefix: "1.1.1.0/032",
errstr: "bad bits",
},
{
prefix: "1.1.1.0/0032",
errstr: "bad bits",
},
}
for _, test := range tests {
t.Run(test.prefix, func(t *testing.T) {
_, err := ParsePrefix(test.prefix)
if err == nil {
t.Fatal("no error")
}
if got := err.Error(); !strings.Contains(got, test.errstr) {
t.Errorf("error is missing substring %q: %s", test.errstr, got)
}
})
}
}
func TestPrefixIsSingleIP(t *testing.T) {
tests := []struct {
ipp Prefix
want bool
}{
{ipp: mustPrefix("127.0.0.1/32"), want: true},
{ipp: mustPrefix("127.0.0.1/31"), want: false},
{ipp: mustPrefix("127.0.0.1/0"), want: false},
{ipp: mustPrefix("::1/128"), want: true},
{ipp: mustPrefix("::1/127"), want: false},
{ipp: mustPrefix("::1/0"), want: false},
{ipp: Prefix{}, want: false},
}
for _, tt := range tests {
got := tt.ipp.IsSingleIP()
if got != tt.want {
t.Errorf("IsSingleIP(%v) = %v want %v", tt.ipp, got, tt.want)
}
}
}
func mustIPs(strs ...string) []Addr {
var res []Addr
for _, s := range strs {
res = append(res, mustIP(s))
}
return res
}
func BenchmarkBinaryMarshalRoundTrip(b *testing.B) {
b.ReportAllocs()
tests := []struct {
name string
ip string
}{
{"ipv4", "1.2.3.4"},
{"ipv6", "2001:db8::1"},
{"ipv6+zone", "2001:db8::1%eth0"},
}
for _, tc := range tests {
b.Run(tc.name, func(b *testing.B) {
ip := mustIP(tc.ip)
for i := 0; i < b.N; i++ {
bt, err := ip.MarshalBinary()
if err != nil {
b.Fatal(err)
}
var ip2 Addr
if err := ip2.UnmarshalBinary(bt); err != nil {
b.Fatal(err)
}
}
})
}
}
func BenchmarkStdIPv4(b *testing.B) {
b.ReportAllocs()
ips := []net.IP{}
for i := 0; i < b.N; i++ {
ip := net.IPv4(8, 8, 8, 8)
ips = ips[:0]
for i := 0; i < 100; i++ {
ips = append(ips, ip)
}
}
}
func BenchmarkIPv4(b *testing.B) {
b.ReportAllocs()
ips := []Addr{}
for i := 0; i < b.N; i++ {
ip := IPv4(8, 8, 8, 8)
ips = ips[:0]
for i := 0; i < 100; i++ {
ips = append(ips, ip)
}
}
}
// ip4i was one of the possible representations of IP that came up in
// discussions, inlining IPv4 addresses, but having an "overflow"
// interface for IPv6 or IPv6 + zone. This is here for benchmarking.
type ip4i struct {
ip4 [4]byte
flags1 byte
flags2 byte
flags3 byte
flags4 byte
ipv6 any
}
func newip4i_v4(a, b, c, d byte) ip4i {
return ip4i{ip4: [4]byte{a, b, c, d}}
}
// BenchmarkIPv4_inline benchmarks the candidate representation, ip4i.
func BenchmarkIPv4_inline(b *testing.B) {
b.ReportAllocs()
ips := []ip4i{}
for i := 0; i < b.N; i++ {
ip := newip4i_v4(8, 8, 8, 8)
ips = ips[:0]
for i := 0; i < 100; i++ {
ips = append(ips, ip)
}
}
}
func BenchmarkStdIPv6(b *testing.B) {
b.ReportAllocs()
ips := []net.IP{}
for i := 0; i < b.N; i++ {
ip := net.ParseIP("2001:db8::1")
ips = ips[:0]
for i := 0; i < 100; i++ {
ips = append(ips, ip)
}
}
}
func BenchmarkIPv6(b *testing.B) {
b.ReportAllocs()
ips := []Addr{}
for i := 0; i < b.N; i++ {
ip := mustIP("2001:db8::1")
ips = ips[:0]
for i := 0; i < 100; i++ {
ips = append(ips, ip)
}
}
}
func BenchmarkIPv4Contains(b *testing.B) {
b.ReportAllocs()
prefix := PrefixFrom(IPv4(192, 168, 1, 0), 24)
ip := IPv4(192, 168, 1, 1)
for i := 0; i < b.N; i++ {
prefix.Contains(ip)
}
}
func BenchmarkIPv6Contains(b *testing.B) {
b.ReportAllocs()
prefix := MustParsePrefix("::1/128")
ip := MustParseAddr("::1")
for i := 0; i < b.N; i++ {
prefix.Contains(ip)
}
}
var parseBenchInputs = []struct {
name string
ip string
}{
{"v4", "192.168.1.1"},
{"v6", "fd7a:115c:a1e0:ab12:4843:cd96:626b:430b"},
{"v6_ellipsis", "fd7a:115c::626b:430b"},
{"v6_v4", "::ffff:192.168.140.255"},
{"v6_zone", "1:2::ffff:192.168.140.255%eth1"},
}
func BenchmarkParseAddr(b *testing.B) {
sinkInternValue = intern.Get("eth1") // Pin to not benchmark the intern package
for _, test := range parseBenchInputs {
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkIP, _ = ParseAddr(test.ip)
}
})
}
}
func BenchmarkStdParseIP(b *testing.B) {
for _, test := range parseBenchInputs {
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkStdIP = net.ParseIP(test.ip)
}
})
}
}
func BenchmarkAddrString(b *testing.B) {
for _, test := range parseBenchInputs {
ip := MustParseAddr(test.ip)
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkString = ip.String()
}
})
}
}
func BenchmarkIPStringExpanded(b *testing.B) {
for _, test := range parseBenchInputs {
ip := MustParseAddr(test.ip)
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkString = ip.StringExpanded()
}
})
}
}
func BenchmarkAddrMarshalText(b *testing.B) {
for _, test := range parseBenchInputs {
ip := MustParseAddr(test.ip)
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkBytes, _ = ip.MarshalText()
}
})
}
}
func BenchmarkAddrPortString(b *testing.B) {
for _, test := range parseBenchInputs {
ip := MustParseAddr(test.ip)
ipp := AddrPortFrom(ip, 60000)
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkString = ipp.String()
}
})
}
}
func BenchmarkAddrPortMarshalText(b *testing.B) {
for _, test := range parseBenchInputs {
ip := MustParseAddr(test.ip)
ipp := AddrPortFrom(ip, 60000)
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkBytes, _ = ipp.MarshalText()
}
})
}
}
func BenchmarkPrefixMasking(b *testing.B) {
tests := []struct {
name string
ip Addr
bits int
}{
{
name: "IPv4 /32",
ip: IPv4(192, 0, 2, 0),
bits: 32,
},
{
name: "IPv4 /17",
ip: IPv4(192, 0, 2, 0),
bits: 17,
},
{
name: "IPv4 /0",
ip: IPv4(192, 0, 2, 0),
bits: 0,
},
{
name: "IPv6 /128",
ip: mustIP("2001:db8::1"),
bits: 128,
},
{
name: "IPv6 /65",
ip: mustIP("2001:db8::1"),
bits: 65,
},
{
name: "IPv6 /0",
ip: mustIP("2001:db8::1"),
bits: 0,
},
{
name: "IPv6 zone /128",
ip: mustIP("2001:db8::1%eth0"),
bits: 128,
},
{
name: "IPv6 zone /65",
ip: mustIP("2001:db8::1%eth0"),
bits: 65,
},
{
name: "IPv6 zone /0",
ip: mustIP("2001:db8::1%eth0"),
bits: 0,
},
}
for _, tt := range tests {
b.Run(tt.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkPrefix, _ = tt.ip.Prefix(tt.bits)
}
})
}
}
func BenchmarkPrefixMarshalText(b *testing.B) {
b.ReportAllocs()
ipp := MustParsePrefix("66.55.44.33/22")
for i := 0; i < b.N; i++ {
sinkBytes, _ = ipp.MarshalText()
}
}
func BenchmarkParseAddrPort(b *testing.B) {
for _, test := range parseBenchInputs {
var ipp string
if strings.HasPrefix(test.name, "v6") {
ipp = fmt.Sprintf("[%s]:1234", test.ip)
} else {
ipp = fmt.Sprintf("%s:1234", test.ip)
}
b.Run(test.name, func(b *testing.B) {
b.ReportAllocs()
for i := 0; i < b.N; i++ {
sinkAddrPort, _ = ParseAddrPort(ipp)
}
})
}
}
func TestAs4(t *testing.T) {
tests := []struct {
ip Addr
want [4]byte
wantPanic bool
}{
{
ip: mustIP("1.2.3.4"),
want: [4]byte{1, 2, 3, 4},
},
{
ip: AddrFrom16(mustIP("1.2.3.4").As16()), // IPv4-in-IPv6
want: [4]byte{1, 2, 3, 4},
},
{
ip: mustIP("0.0.0.0"),
want: [4]byte{0, 0, 0, 0},
},
{
ip: Addr{},
wantPanic: true,
},
{
ip: mustIP("::1"),
wantPanic: true,
},
}
as4 := func(ip Addr) (v [4]byte, gotPanic bool) {
defer func() {
if recover() != nil {
gotPanic = true
return
}
}()
v = ip.As4()
return
}
for i, tt := range tests {
got, gotPanic := as4(tt.ip)
if gotPanic != tt.wantPanic {
t.Errorf("%d. panic on %v = %v; want %v", i, tt.ip, gotPanic, tt.wantPanic)
continue
}
if got != tt.want {
t.Errorf("%d. %v = %v; want %v", i, tt.ip, got, tt.want)
}
}
}
func TestPrefixOverlaps(t *testing.T) {
pfx := mustPrefix
tests := []struct {
a, b Prefix
want bool
}{
{Prefix{}, pfx("1.2.0.0/16"), false}, // first zero
{pfx("1.2.0.0/16"), Prefix{}, false}, // second zero
{pfx("::0/3"), pfx("0.0.0.0/3"), false}, // different families
{pfx("1.2.0.0/16"), pfx("1.2.0.0/16"), true}, // equal
{pfx("1.2.0.0/16"), pfx("1.2.3.0/24"), true},
{pfx("1.2.3.0/24"), pfx("1.2.0.0/16"), true},
{pfx("1.2.0.0/16"), pfx("1.2.3.0/32"), true},
{pfx("1.2.3.0/32"), pfx("1.2.0.0/16"), true},
// Match /0 either order
{pfx("1.2.3.0/32"), pfx("0.0.0.0/0"), true},
{pfx("0.0.0.0/0"), pfx("1.2.3.0/32"), true},
{pfx("1.2.3.0/32"), pfx("5.5.5.5/0"), true}, // normalization not required; /0 means true
// IPv6 overlapping
{pfx("5::1/128"), pfx("5::0/8"), true},
{pfx("5::0/8"), pfx("5::1/128"), true},
// IPv6 not overlapping
{pfx("1::1/128"), pfx("2::2/128"), false},
{pfx("0100::0/8"), pfx("::1/128"), false},
// IPv4-mapped IPv6 addresses should not overlap with IPv4.
{PrefixFrom(AddrFrom16(mustIP("1.2.0.0").As16()), 16), pfx("1.2.3.0/24"), false},
// Invalid prefixes
{PrefixFrom(mustIP("1.2.3.4"), 33), pfx("1.2.3.0/24"), false},
{PrefixFrom(mustIP("2000::"), 129), pfx("2000::/64"), false},
}
for i, tt := range tests {
if got := tt.a.Overlaps(tt.b); got != tt.want {
t.Errorf("%d. (%v).Overlaps(%v) = %v; want %v", i, tt.a, tt.b, got, tt.want)
}
// Overlaps is commutative
if got := tt.b.Overlaps(tt.a); got != tt.want {
t.Errorf("%d. (%v).Overlaps(%v) = %v; want %v", i, tt.b, tt.a, got, tt.want)
}
}
}
// Sink variables are here to force the compiler to not elide
// seemingly useless work in benchmarks and allocation tests. If you
// were to just `_ = foo()` within a test function, the compiler could
// correctly deduce that foo() does nothing and doesn't need to be
// called. By writing results to a global variable, we hide that fact
// from the compiler and force it to keep the code under test.
var (
sinkIP Addr
sinkStdIP net.IP
sinkAddrPort AddrPort
sinkPrefix Prefix
sinkPrefixSlice []Prefix
sinkInternValue *intern.Value
sinkIP16 [16]byte
sinkIP4 [4]byte
sinkBool bool
sinkString string
sinkBytes []byte
sinkUDPAddr = &net.UDPAddr{IP: make(net.IP, 0, 16)}
)
func TestNoAllocs(t *testing.T) {
// Wrappers that panic on error, to prove that our alloc-free
// methods are returning successfully.
panicIP := func(ip Addr, err error) Addr {
if err != nil {
panic(err)
}
return ip
}
panicPfx := func(pfx Prefix, err error) Prefix {
if err != nil {
panic(err)
}
return pfx
}
panicIPP := func(ipp AddrPort, err error) AddrPort {
if err != nil {
panic(err)
}
return ipp
}
test := func(name string, f func()) {
t.Run(name, func(t *testing.T) {
n := testing.AllocsPerRun(1000, f)
if n != 0 {
t.Fatalf("allocs = %d; want 0", int(n))
}
})
}
// Addr constructors
test("IPv4", func() { sinkIP = IPv4(1, 2, 3, 4) })
test("AddrFrom4", func() { sinkIP = AddrFrom4([4]byte{1, 2, 3, 4}) })
test("AddrFrom16", func() { sinkIP = AddrFrom16([16]byte{}) })
test("ParseAddr/4", func() { sinkIP = panicIP(ParseAddr("1.2.3.4")) })
test("ParseAddr/6", func() { sinkIP = panicIP(ParseAddr("::1")) })
test("MustParseAddr", func() { sinkIP = MustParseAddr("1.2.3.4") })
test("IPv6LinkLocalAllNodes", func() { sinkIP = IPv6LinkLocalAllNodes() })
test("IPv6LinkLocalAllRouters", func() { sinkIP = IPv6LinkLocalAllRouters() })
test("IPv6Loopback", func() { sinkIP = IPv6Loopback() })
test("IPv6Unspecified", func() { sinkIP = IPv6Unspecified() })
// Addr methods
test("Addr.IsZero", func() { sinkBool = MustParseAddr("1.2.3.4").IsZero() })
test("Addr.BitLen", func() { sinkBool = MustParseAddr("1.2.3.4").BitLen() == 8 })
test("Addr.Zone/4", func() { sinkBool = MustParseAddr("1.2.3.4").Zone() == "" })
test("Addr.Zone/6", func() { sinkBool = MustParseAddr("fe80::1").Zone() == "" })
test("Addr.Zone/6zone", func() { sinkBool = MustParseAddr("fe80::1%zone").Zone() == "" })
test("Addr.Compare", func() {
a := MustParseAddr("1.2.3.4")
b := MustParseAddr("2.3.4.5")
sinkBool = a.Compare(b) == 0
})
test("Addr.Less", func() {
a := MustParseAddr("1.2.3.4")
b := MustParseAddr("2.3.4.5")
sinkBool = a.Less(b)
})
test("Addr.Is4", func() { sinkBool = MustParseAddr("1.2.3.4").Is4() })
test("Addr.Is6", func() { sinkBool = MustParseAddr("fe80::1").Is6() })
test("Addr.Is4In6", func() { sinkBool = MustParseAddr("fe80::1").Is4In6() })
test("Addr.Unmap", func() { sinkIP = MustParseAddr("ffff::2.3.4.5").Unmap() })
test("Addr.WithZone", func() { sinkIP = MustParseAddr("fe80::1").WithZone("") })
test("Addr.IsGlobalUnicast", func() { sinkBool = MustParseAddr("2001:db8::1").IsGlobalUnicast() })
test("Addr.IsInterfaceLocalMulticast", func() { sinkBool = MustParseAddr("fe80::1").IsInterfaceLocalMulticast() })
test("Addr.IsLinkLocalMulticast", func() { sinkBool = MustParseAddr("fe80::1").IsLinkLocalMulticast() })
test("Addr.IsLinkLocalUnicast", func() { sinkBool = MustParseAddr("fe80::1").IsLinkLocalUnicast() })
test("Addr.IsLoopback", func() { sinkBool = MustParseAddr("fe80::1").IsLoopback() })
test("Addr.IsMulticast", func() { sinkBool = MustParseAddr("fe80::1").IsMulticast() })
test("Addr.IsPrivate", func() { sinkBool = MustParseAddr("fd00::1").IsPrivate() })
test("Addr.IsUnspecified", func() { sinkBool = IPv6Unspecified().IsUnspecified() })
test("Addr.Prefix/4", func() { sinkPrefix = panicPfx(MustParseAddr("1.2.3.4").Prefix(20)) })
test("Addr.Prefix/6", func() { sinkPrefix = panicPfx(MustParseAddr("fe80::1").Prefix(64)) })
test("Addr.As16", func() { sinkIP16 = MustParseAddr("1.2.3.4").As16() })
test("Addr.As4", func() { sinkIP4 = MustParseAddr("1.2.3.4").As4() })
test("Addr.Next", func() { sinkIP = MustParseAddr("1.2.3.4").Next() })
test("Addr.Prev", func() { sinkIP = MustParseAddr("1.2.3.4").Prev() })
// AddrPort constructors
test("AddrPortFrom", func() { sinkAddrPort = AddrPortFrom(IPv4(1, 2, 3, 4), 22) })
test("ParseAddrPort", func() { sinkAddrPort = panicIPP(ParseAddrPort("[::1]:1234")) })
test("MustParseAddrPort", func() { sinkAddrPort = MustParseAddrPort("[::1]:1234") })
// Prefix constructors
test("PrefixFrom", func() { sinkPrefix = PrefixFrom(IPv4(1, 2, 3, 4), 32) })
test("ParsePrefix/4", func() { sinkPrefix = panicPfx(ParsePrefix("1.2.3.4/20")) })
test("ParsePrefix/6", func() { sinkPrefix = panicPfx(ParsePrefix("fe80::1/64")) })
test("MustParsePrefix", func() { sinkPrefix = MustParsePrefix("1.2.3.4/20") })
// Prefix methods
test("Prefix.Contains", func() { sinkBool = MustParsePrefix("1.2.3.0/24").Contains(MustParseAddr("1.2.3.4")) })
test("Prefix.Overlaps", func() {
a, b := MustParsePrefix("1.2.3.0/24"), MustParsePrefix("1.2.0.0/16")
sinkBool = a.Overlaps(b)
})
test("Prefix.IsZero", func() { sinkBool = MustParsePrefix("1.2.0.0/16").IsZero() })
test("Prefix.IsSingleIP", func() { sinkBool = MustParsePrefix("1.2.3.4/32").IsSingleIP() })
test("Prefix.Masked", func() { sinkPrefix = MustParsePrefix("1.2.3.4/16").Masked() })
}
func TestAddrStringAllocs(t *testing.T) {
tests := []struct {
name string
ip Addr
wantAllocs int
}{
{"zero", Addr{}, 0},
{"ipv4", MustParseAddr("192.168.1.1"), 1},
{"ipv6", MustParseAddr("2001:db8::1"), 1},
{"ipv6+zone", MustParseAddr("2001:db8::1%eth0"), 1},
{"ipv4-in-ipv6", MustParseAddr("::ffff:192.168.1.1"), 1},
{"ipv4-in-ipv6+zone", MustParseAddr("::ffff:192.168.1.1%eth0"), 1},
}
optimizationOff := testenv.OptimizationOff()
for _, tc := range tests {
t.Run(tc.name, func(t *testing.T) {
if optimizationOff && strings.HasPrefix(tc.name, "ipv4-in-ipv6") {
// Optimizations are required to remove some allocs.
t.Skipf("skipping on %v", testenv.Builder())
}
allocs := int(testing.AllocsPerRun(1000, func() {
sinkString = tc.ip.String()
}))
if allocs != tc.wantAllocs {
t.Errorf("allocs=%d, want %d", allocs, tc.wantAllocs)
}
})
}
}
func TestPrefixString(t *testing.T) {
tests := []struct {
ipp Prefix
want string
}{
{Prefix{}, "invalid Prefix"},
{PrefixFrom(Addr{}, 8), "invalid Prefix"},
{PrefixFrom(MustParseAddr("1.2.3.4"), 88), "invalid Prefix"},
}
for _, tt := range tests {
if got := tt.ipp.String(); got != tt.want {
t.Errorf("(%#v).String() = %q want %q", tt.ipp, got, tt.want)
}
}
}
func TestInvalidAddrPortString(t *testing.T) {
tests := []struct {
ipp AddrPort
want string
}{
{AddrPort{}, "invalid AddrPort"},
{AddrPortFrom(Addr{}, 80), "invalid AddrPort"},
}
for _, tt := range tests {
if got := tt.ipp.String(); got != tt.want {
t.Errorf("(%#v).String() = %q want %q", tt.ipp, got, tt.want)
}
}
}
func TestAsSlice(t *testing.T) {
tests := []struct {
in Addr
want []byte
}{
{in: Addr{}, want: nil},
{in: mustIP("1.2.3.4"), want: []byte{1, 2, 3, 4}},
{in: mustIP("ffff::1"), want: []byte{0xff, 0xff, 15: 1}},
}
for _, test := range tests {
got := test.in.AsSlice()
if !bytes.Equal(got, test.want) {
t.Errorf("%v.AsSlice() = %v want %v", test.in, got, test.want)
}
}
}
var sink16 [16]byte
func BenchmarkAs16(b *testing.B) {
addr := MustParseAddr("1::10")
for i := 0; i < b.N; i++ {
sink16 = addr.As16()
}
}