mirror of
				https://github.com/containers/podman.git
				synced 2025-11-04 08:56:05 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			132 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			132 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package network
 | 
						|
 | 
						|
import (
 | 
						|
	"net"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/containers/podman/v2/pkg/domain/entities"
 | 
						|
)
 | 
						|
 | 
						|
func Test_validateBridgeOptions(t *testing.T) {
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name    string
 | 
						|
		subnet  net.IPNet
 | 
						|
		ipRange net.IPNet
 | 
						|
		gateway net.IP
 | 
						|
		isIPv6  bool
 | 
						|
		wantErr bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:   "IPv4 subnet only",
 | 
						|
			subnet: net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv4 subnet and range",
 | 
						|
			subnet:  net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
			ipRange: net.IPNet{IP: net.IPv4(192, 168, 0, 128), Mask: net.IPv4Mask(255, 255, 255, 128)},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv4 subnet and gateway",
 | 
						|
			subnet:  net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
			gateway: net.ParseIP("192.168.0.10"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv4 subnet, range and gateway",
 | 
						|
			subnet:  net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
			ipRange: net.IPNet{IP: net.IPv4(192, 168, 0, 128), Mask: net.IPv4Mask(255, 255, 255, 128)},
 | 
						|
			gateway: net.ParseIP("192.168.0.10"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:   "IPv6 subnet only",
 | 
						|
			subnet: net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 subnet and range",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			ipRange: net.IPNet{IP: net.ParseIP("2001:DB8:0:0:1::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff:ffff::"))},
 | 
						|
			isIPv6:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 subnet and gateway",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			gateway: net.ParseIP("2001:DB8::2"),
 | 
						|
			isIPv6:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 subnet, range and gateway",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			ipRange: net.IPNet{IP: net.ParseIP("2001:DB8:0:0:1::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff:ffff::"))},
 | 
						|
			gateway: net.ParseIP("2001:DB8::2"),
 | 
						|
			isIPv6:  true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 subnet, range and gateway without IPv6 option (PODMAN SUPPORTS IT UNLIKE DOCKER)",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			ipRange: net.IPNet{IP: net.ParseIP("2001:DB8:0:0:1::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff:ffff::"))},
 | 
						|
			gateway: net.ParseIP("2001:DB8::2"),
 | 
						|
			isIPv6:  false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "range provided but not subnet",
 | 
						|
			ipRange: net.IPNet{IP: net.IPv4(192, 168, 0, 128), Mask: net.IPv4Mask(255, 255, 255, 128)},
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "gateway provided but not subnet",
 | 
						|
			gateway: net.ParseIP("192.168.0.10"),
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv4 subnet but IPv6 required",
 | 
						|
			subnet:  net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
			ipRange: net.IPNet{IP: net.IPv4(192, 168, 0, 128), Mask: net.IPv4Mask(255, 255, 255, 128)},
 | 
						|
			gateway: net.ParseIP("192.168.0.10"),
 | 
						|
			isIPv6:  true,
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 required but IPv4 options used",
 | 
						|
			subnet:  net.IPNet{IP: net.IPv4(192, 168, 0, 0), Mask: net.IPv4Mask(255, 255, 255, 0)},
 | 
						|
			ipRange: net.IPNet{IP: net.IPv4(192, 168, 0, 128), Mask: net.IPv4Mask(255, 255, 255, 128)},
 | 
						|
			gateway: net.ParseIP("192.168.0.10"),
 | 
						|
			isIPv6:  true,
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "IPv6 required but not subnet provided",
 | 
						|
			isIPv6:  true,
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "range out of the subnet",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			ipRange: net.IPNet{IP: net.ParseIP("2001:1:1::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff:ffff::"))},
 | 
						|
			gateway: net.ParseIP("2001:DB8::2"),
 | 
						|
			isIPv6:  true,
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:    "gateway out of the subnet",
 | 
						|
			subnet:  net.IPNet{IP: net.ParseIP("2001:DB8::"), Mask: net.IPMask(net.ParseIP("ffff:ffff:ffff::"))},
 | 
						|
			gateway: net.ParseIP("2001::2"),
 | 
						|
			isIPv6:  true,
 | 
						|
			wantErr: true,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tt := range tests {
 | 
						|
		tt := tt
 | 
						|
		t.Run(tt.name, func(t *testing.T) {
 | 
						|
			options := entities.NetworkCreateOptions{
 | 
						|
				Subnet:  tt.subnet,
 | 
						|
				Range:   tt.ipRange,
 | 
						|
				Gateway: tt.gateway,
 | 
						|
				IPv6:    tt.isIPv6,
 | 
						|
			}
 | 
						|
			if err := validateBridgeOptions(options); (err != nil) != tt.wantErr {
 | 
						|
				t.Errorf("validateBridgeOptions() error = %v, wantErr %v", err, tt.wantErr)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |