2021-05-21 14:55:42 +03:00
|
|
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
2021-06-15 19:42:41 +03:00
|
|
|
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
2021-05-21 14:55:42 +03:00
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
package dhcpd
|
|
|
|
|
|
|
|
import (
|
2022-07-08 15:17:47 +03:00
|
|
|
"fmt"
|
2020-07-03 18:20:01 +03:00
|
|
|
"net"
|
2021-10-18 15:29:29 +03:00
|
|
|
"strings"
|
2020-07-03 18:20:01 +03:00
|
|
|
"testing"
|
2022-08-23 18:22:49 +03:00
|
|
|
"time"
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2022-08-23 18:22:49 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
2021-10-18 15:29:29 +03:00
|
|
|
"github.com/AdguardTeam/golibs/stringutil"
|
2021-10-22 11:58:18 +03:00
|
|
|
"github.com/AdguardTeam/golibs/testutil"
|
2020-07-03 18:20:01 +03:00
|
|
|
"github.com/insomniacslk/dhcp/dhcpv4"
|
|
|
|
"github.com/stretchr/testify/assert"
|
2021-02-12 13:27:44 +03:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-08-15 18:31:32 +03:00
|
|
|
|
|
|
|
//lint:ignore SA1019 See the TODO in go.mod.
|
|
|
|
"github.com/mdlayher/raw"
|
2020-07-03 18:20:01 +03:00
|
|
|
)
|
|
|
|
|
2022-07-08 15:17:47 +03:00
|
|
|
var (
|
|
|
|
DefaultRangeStart = net.IP{192, 168, 10, 100}
|
|
|
|
DefaultRangeEnd = net.IP{192, 168, 10, 200}
|
|
|
|
DefaultGatewayIP = net.IP{192, 168, 10, 1}
|
2022-08-23 18:22:49 +03:00
|
|
|
DefaultSelfIP = net.IP{192, 168, 10, 2}
|
2022-07-08 15:17:47 +03:00
|
|
|
DefaultSubnetMask = net.IP{255, 255, 255, 0}
|
|
|
|
)
|
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
func notify4(flags uint32) {
|
|
|
|
}
|
|
|
|
|
2021-10-18 15:29:29 +03:00
|
|
|
// defaultV4ServerConf returns the default configuration for *v4Server to use in
|
|
|
|
// tests.
|
|
|
|
func defaultV4ServerConf() (conf V4ServerConf) {
|
|
|
|
return V4ServerConf{
|
2020-07-03 18:20:01 +03:00
|
|
|
Enabled: true,
|
2022-07-08 15:17:47 +03:00
|
|
|
RangeStart: DefaultRangeStart,
|
|
|
|
RangeEnd: DefaultRangeEnd,
|
|
|
|
GatewayIP: DefaultGatewayIP,
|
|
|
|
SubnetMask: DefaultSubnetMask,
|
2020-07-03 18:20:01 +03:00
|
|
|
notify: notify4,
|
2022-08-23 18:22:49 +03:00
|
|
|
dnsIPAddrs: []net.IP{DefaultSelfIP},
|
2021-10-18 15:29:29 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// defaultSrv prepares the default DHCPServer to use in tests. The underlying
|
|
|
|
// type of s is *v4Server.
|
|
|
|
func defaultSrv(t *testing.T) (s DHCPServer) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
var err error
|
|
|
|
s, err = v4Create(defaultV4ServerConf())
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-10-18 15:29:29 +03:00
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
2022-08-23 18:22:49 +03:00
|
|
|
func TestV4Server_leasing(t *testing.T) {
|
|
|
|
const (
|
|
|
|
staticName = "static-client"
|
|
|
|
anotherName = "another-client"
|
|
|
|
)
|
|
|
|
|
|
|
|
staticIP := net.IP{192, 168, 10, 10}
|
|
|
|
anotherIP := DefaultRangeStart
|
|
|
|
staticMAC := net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}
|
|
|
|
anotherMAC := net.HardwareAddr{0xBB, 0xBB, 0xBB, 0xBB, 0xBB, 0xBB}
|
|
|
|
|
|
|
|
s := defaultSrv(t)
|
|
|
|
|
|
|
|
t.Run("add_static", func(t *testing.T) {
|
|
|
|
err := s.AddStaticLease(&Lease{
|
|
|
|
Expiry: time.Unix(leaseExpireStatic, 0),
|
|
|
|
Hostname: staticName,
|
|
|
|
HWAddr: staticMAC,
|
|
|
|
IP: staticIP,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
t.Run("same_name", func(t *testing.T) {
|
|
|
|
err = s.AddStaticLease(&Lease{
|
|
|
|
Expiry: time.Unix(leaseExpireStatic, 0),
|
|
|
|
Hostname: staticName,
|
|
|
|
HWAddr: anotherMAC,
|
|
|
|
IP: anotherIP,
|
|
|
|
})
|
|
|
|
assert.ErrorIs(t, err, ErrDupHostname)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("same_mac", func(t *testing.T) {
|
|
|
|
wantErrMsg := "dhcpv4: adding static lease: removing " +
|
|
|
|
"dynamic leases for " + anotherIP.String() +
|
|
|
|
" (" + staticMAC.String() + "): static lease already exists"
|
|
|
|
|
|
|
|
err = s.AddStaticLease(&Lease{
|
|
|
|
Expiry: time.Unix(leaseExpireStatic, 0),
|
|
|
|
Hostname: anotherName,
|
|
|
|
HWAddr: staticMAC,
|
|
|
|
IP: anotherIP,
|
|
|
|
})
|
|
|
|
testutil.AssertErrorMsg(t, wantErrMsg, err)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("same_ip", func(t *testing.T) {
|
|
|
|
wantErrMsg := "dhcpv4: adding static lease: removing " +
|
|
|
|
"dynamic leases for " + staticIP.String() +
|
|
|
|
" (" + anotherMAC.String() + "): static lease already exists"
|
|
|
|
|
|
|
|
err = s.AddStaticLease(&Lease{
|
|
|
|
Expiry: time.Unix(leaseExpireStatic, 0),
|
|
|
|
Hostname: anotherName,
|
|
|
|
HWAddr: anotherMAC,
|
|
|
|
IP: staticIP,
|
|
|
|
})
|
|
|
|
testutil.AssertErrorMsg(t, wantErrMsg, err)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("add_dynamic", func(t *testing.T) {
|
|
|
|
s4, ok := s.(*v4Server)
|
|
|
|
require.True(t, ok)
|
|
|
|
|
|
|
|
discoverAnOffer := func(
|
|
|
|
t *testing.T,
|
|
|
|
name string,
|
|
|
|
ip net.IP,
|
|
|
|
mac net.HardwareAddr,
|
|
|
|
) (resp *dhcpv4.DHCPv4) {
|
|
|
|
testutil.CleanupAndRequireSuccess(t, func() (err error) {
|
|
|
|
return s.ResetLeases(s.GetLeases(LeasesStatic))
|
|
|
|
})
|
|
|
|
|
|
|
|
req, err := dhcpv4.NewDiscovery(
|
|
|
|
mac,
|
|
|
|
dhcpv4.WithOption(dhcpv4.OptHostName(name)),
|
|
|
|
dhcpv4.WithOption(dhcpv4.OptRequestedIPAddress(ip)),
|
|
|
|
dhcpv4.WithOption(dhcpv4.OptClientIdentifier([]byte{1, 2, 3, 4, 5, 6, 8})),
|
|
|
|
dhcpv4.WithGatewayIP(DefaultGatewayIP),
|
|
|
|
)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
resp = &dhcpv4.DHCPv4{}
|
|
|
|
res := s4.process(req, resp)
|
|
|
|
require.Positive(t, res)
|
|
|
|
require.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
|
|
|
|
|
|
resp.ClientHWAddr = mac
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("same_name", func(t *testing.T) {
|
|
|
|
resp := discoverAnOffer(t, staticName, anotherIP, anotherMAC)
|
|
|
|
|
|
|
|
req, err := dhcpv4.NewRequestFromOffer(resp, dhcpv4.WithOption(
|
|
|
|
dhcpv4.OptHostName(staticName),
|
|
|
|
))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
res := s4.process(req, resp)
|
|
|
|
require.Positive(t, res)
|
|
|
|
|
|
|
|
assert.Equal(t, aghnet.GenerateHostname(resp.YourIPAddr), resp.HostName())
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("same_mac", func(t *testing.T) {
|
|
|
|
resp := discoverAnOffer(t, anotherName, anotherIP, staticMAC)
|
|
|
|
|
|
|
|
req, err := dhcpv4.NewRequestFromOffer(resp, dhcpv4.WithOption(
|
|
|
|
dhcpv4.OptHostName(anotherName),
|
|
|
|
))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
res := s4.process(req, resp)
|
|
|
|
require.Positive(t, res)
|
|
|
|
|
|
|
|
fqdnOptData := resp.Options.Get(dhcpv4.OptionFQDN)
|
|
|
|
require.Len(t, fqdnOptData, 3+len(staticName))
|
|
|
|
assert.Equal(t, []uint8(staticName), fqdnOptData[3:])
|
|
|
|
|
|
|
|
assert.Equal(t, staticIP, resp.YourIPAddr)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("same_ip", func(t *testing.T) {
|
|
|
|
resp := discoverAnOffer(t, anotherName, staticIP, anotherMAC)
|
|
|
|
|
|
|
|
req, err := dhcpv4.NewRequestFromOffer(resp, dhcpv4.WithOption(
|
|
|
|
dhcpv4.OptHostName(anotherName),
|
|
|
|
))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
res := s4.process(req, resp)
|
|
|
|
require.Positive(t, res)
|
|
|
|
|
|
|
|
assert.NotEqual(t, staticIP, resp.YourIPAddr)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-07-08 15:17:47 +03:00
|
|
|
func TestV4Server_AddRemove_static(t *testing.T) {
|
2021-10-18 15:29:29 +03:00
|
|
|
s := defaultSrv(t)
|
|
|
|
|
2020-07-03 18:20:01 +03:00
|
|
|
ls := s.GetLeases(LeasesStatic)
|
2022-07-08 15:17:47 +03:00
|
|
|
require.Empty(t, ls)
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
lease *Lease
|
|
|
|
name string
|
|
|
|
wantErrMsg string
|
|
|
|
}{{
|
|
|
|
lease: &Lease{
|
|
|
|
Hostname: "success.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
|
|
|
},
|
|
|
|
name: "success",
|
|
|
|
wantErrMsg: "",
|
|
|
|
}, {
|
|
|
|
lease: &Lease{
|
|
|
|
Hostname: "probably-router.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: DefaultGatewayIP,
|
|
|
|
},
|
|
|
|
name: "with_gateway_ip",
|
|
|
|
wantErrMsg: "dhcpv4: adding static lease: " +
|
|
|
|
"can't assign the gateway IP 192.168.10.1 to the lease",
|
|
|
|
}, {
|
|
|
|
lease: &Lease{
|
|
|
|
Hostname: "ip6.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.ParseIP("ffff::1"),
|
|
|
|
},
|
|
|
|
name: "ipv6",
|
|
|
|
wantErrMsg: `dhcpv4: adding static lease: ` +
|
|
|
|
`invalid ip "ffff::1", only ipv4 is supported`,
|
|
|
|
}, {
|
|
|
|
lease: &Lease{
|
|
|
|
Hostname: "bad-mac.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
|
|
|
},
|
|
|
|
name: "bad_mac",
|
|
|
|
wantErrMsg: `dhcpv4: adding static lease: bad mac address "aa:aa": ` +
|
|
|
|
`bad mac address length 2, allowed: [6 8 20]`,
|
|
|
|
}, {
|
|
|
|
lease: &Lease{
|
|
|
|
Hostname: "bad-lbl-.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
|
|
|
},
|
|
|
|
name: "bad_hostname",
|
|
|
|
wantErrMsg: `dhcpv4: adding static lease: validating hostname: ` +
|
|
|
|
`bad domain name "bad-lbl-.local": ` +
|
|
|
|
`bad domain name label "bad-lbl-": bad domain name label rune '-'`,
|
|
|
|
}}
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2022-07-08 15:17:47 +03:00
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
err := s.AddStaticLease(tc.lease)
|
|
|
|
testutil.AssertErrorMsg(t, tc.wantErrMsg, err)
|
|
|
|
if tc.wantErrMsg != "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = s.RemoveStaticLease(&Lease{
|
|
|
|
IP: tc.lease.IP,
|
|
|
|
HWAddr: tc.lease.HWAddr,
|
|
|
|
})
|
|
|
|
diffErrMsg := fmt.Sprintf("dhcpv4: lease for ip %s is different: %+v", tc.lease.IP, tc.lease)
|
|
|
|
testutil.AssertErrorMsg(t, diffErrMsg, err)
|
|
|
|
|
|
|
|
// Remove static lease.
|
|
|
|
err = s.RemoveStaticLease(tc.lease)
|
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
|
|
|
|
|
|
|
ls = s.GetLeases(LeasesStatic)
|
|
|
|
require.Emptyf(t, ls, "after %s", tc.name)
|
2021-02-12 13:27:44 +03:00
|
|
|
}
|
2020-07-03 18:20:01 +03:00
|
|
|
}
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
func TestV4_AddReplace(t *testing.T) {
|
2021-10-18 15:29:29 +03:00
|
|
|
sIface := defaultSrv(t)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
2021-02-04 15:12:34 +03:00
|
|
|
s, ok := sIface.(*v4Server)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.True(t, ok)
|
|
|
|
|
|
|
|
dynLeases := []Lease{{
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "dynamic-1.local",
|
|
|
|
HWAddr: net.HardwareAddr{0x11, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
2021-02-12 13:27:44 +03:00
|
|
|
}, {
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "dynamic-2.local",
|
|
|
|
HWAddr: net.HardwareAddr{0x22, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 151},
|
2021-02-12 13:27:44 +03:00
|
|
|
}}
|
|
|
|
|
|
|
|
for i := range dynLeases {
|
2021-10-18 15:29:29 +03:00
|
|
|
err := s.addLease(&dynLeases[i])
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2020-07-03 18:20:01 +03:00
|
|
|
}
|
|
|
|
|
2021-06-16 16:48:46 +03:00
|
|
|
stLeases := []*Lease{{
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "static-1.local",
|
|
|
|
HWAddr: net.HardwareAddr{0x33, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
2021-02-12 13:27:44 +03:00
|
|
|
}, {
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "static-2.local",
|
|
|
|
HWAddr: net.HardwareAddr{0x22, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 152},
|
2021-02-12 13:27:44 +03:00
|
|
|
}}
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
for _, l := range stLeases {
|
2021-10-18 15:29:29 +03:00
|
|
|
err := s.AddStaticLease(l)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
}
|
2020-07-03 18:20:01 +03:00
|
|
|
|
|
|
|
ls := s.GetLeases(LeasesStatic)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.Len(t, ls, 2)
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
for i, l := range ls {
|
|
|
|
assert.True(t, stLeases[i].IP.Equal(l.IP))
|
|
|
|
assert.Equal(t, stLeases[i].HWAddr, l.HWAddr)
|
2021-03-18 17:07:13 +03:00
|
|
|
assert.True(t, l.IsStatic())
|
2021-02-12 13:27:44 +03:00
|
|
|
}
|
2020-07-03 18:20:01 +03:00
|
|
|
}
|
|
|
|
|
2021-10-18 15:29:29 +03:00
|
|
|
func TestV4Server_Process_optionsPriority(t *testing.T) {
|
|
|
|
defaultIP := net.IP{192, 168, 1, 1}
|
|
|
|
knownIP := net.IP{1, 2, 3, 4}
|
|
|
|
|
|
|
|
// prepareSrv creates a *v4Server and sets the opt6IPs in the initial
|
|
|
|
// configuration of the server as the value for DHCP option 6.
|
|
|
|
prepareSrv := func(t *testing.T, opt6IPs []net.IP) (s *v4Server) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
conf := defaultV4ServerConf()
|
|
|
|
if len(opt6IPs) > 0 {
|
|
|
|
b := &strings.Builder{}
|
|
|
|
stringutil.WriteToBuilder(b, "6 ips ", opt6IPs[0].String())
|
|
|
|
for _, ip := range opt6IPs[1:] {
|
|
|
|
stringutil.WriteToBuilder(b, ",", ip.String())
|
|
|
|
}
|
|
|
|
conf.Options = []string{b.String()}
|
2022-08-26 14:30:31 +03:00
|
|
|
} else {
|
|
|
|
defer func() { s.options.Update(dhcpv4.OptDNS(defaultIP)) }()
|
2021-10-18 15:29:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
ss, err := v4Create(conf)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
var ok bool
|
|
|
|
s, ok = ss.(*v4Server)
|
|
|
|
require.True(t, ok)
|
|
|
|
|
|
|
|
s.conf.dnsIPAddrs = []net.IP{defaultIP}
|
|
|
|
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkResp creates a discovery message with DHCP option 6 requested amd
|
|
|
|
// asserts the response to contain wantIPs in this option.
|
|
|
|
checkResp := func(t *testing.T, s *v4Server, wantIPs []net.IP) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
mac := net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}
|
|
|
|
req, err := dhcpv4.NewDiscovery(mac, dhcpv4.WithRequestedOptions(
|
|
|
|
dhcpv4.OptionDomainNameServer,
|
|
|
|
))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
var resp *dhcpv4.DHCPv4
|
|
|
|
resp, err = dhcpv4.NewReplyFromRequest(req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
res := s.process(req, resp)
|
|
|
|
require.Equal(t, 1, res)
|
|
|
|
|
|
|
|
o := resp.GetOneOption(dhcpv4.OptionDomainNameServer)
|
|
|
|
require.NotEmpty(t, o)
|
|
|
|
|
|
|
|
wantData := []byte{}
|
|
|
|
for _, ip := range wantIPs {
|
|
|
|
wantData = append(wantData, ip...)
|
|
|
|
}
|
|
|
|
assert.Equal(t, o, wantData)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("default", func(t *testing.T) {
|
|
|
|
s := prepareSrv(t, nil)
|
|
|
|
|
|
|
|
checkResp(t, s, []net.IP{defaultIP})
|
2021-02-12 13:27:44 +03:00
|
|
|
})
|
2021-10-18 15:29:29 +03:00
|
|
|
|
|
|
|
t.Run("explicitly_configured", func(t *testing.T) {
|
|
|
|
s := prepareSrv(t, []net.IP{knownIP, knownIP})
|
|
|
|
|
|
|
|
checkResp(t, s, []net.IP{knownIP, knownIP})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestV4StaticLease_Get(t *testing.T) {
|
|
|
|
sIface := defaultSrv(t)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
2021-02-04 15:12:34 +03:00
|
|
|
s, ok := sIface.(*v4Server)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.True(t, ok)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-01-13 16:56:05 +03:00
|
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
2022-08-26 14:30:31 +03:00
|
|
|
s.options.Update(dhcpv4.OptDNS(s.conf.dnsIPAddrs...))
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-06-16 16:48:46 +03:00
|
|
|
l := &Lease{
|
2021-05-06 13:02:48 +03:00
|
|
|
Hostname: "static-1.local",
|
|
|
|
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
|
|
|
IP: net.IP{192, 168, 10, 150},
|
2021-02-12 13:27:44 +03:00
|
|
|
}
|
2021-10-18 15:29:29 +03:00
|
|
|
err := s.AddStaticLease(l)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
var req, resp *dhcpv4.DHCPv4
|
|
|
|
mac := net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}
|
|
|
|
|
|
|
|
t.Run("discover", func(t *testing.T) {
|
2021-09-13 20:05:41 +03:00
|
|
|
req, err = dhcpv4.NewDiscovery(mac, dhcpv4.WithRequestedOptions(
|
|
|
|
dhcpv4.OptionDomainNameServer,
|
|
|
|
))
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
2021-04-15 17:52:53 +03:00
|
|
|
resp, err = dhcpv4.NewReplyFromRequest(req)
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
})
|
2021-04-15 17:52:53 +03:00
|
|
|
|
|
|
|
// Don't continue if we got any errors in the previous subtest.
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
t.Run("offer", func(t *testing.T) {
|
|
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
|
|
assert.Equal(t, mac, resp.ClientHWAddr)
|
|
|
|
assert.True(t, l.IP.Equal(resp.YourIPAddr))
|
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(resp.Router()[0]))
|
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(resp.ServerIdentifier()))
|
2021-04-20 15:07:57 +03:00
|
|
|
assert.Equal(t, s.conf.subnet.Mask, resp.SubnetMask())
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("request", func(t *testing.T) {
|
|
|
|
req, err = dhcpv4.NewRequestFromOffer(resp)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
resp, err = dhcpv4.NewReplyFromRequest(req)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
})
|
2021-04-15 17:52:53 +03:00
|
|
|
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
t.Run("ack", func(t *testing.T) {
|
|
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
|
|
assert.Equal(t, mac, resp.ClientHWAddr)
|
|
|
|
assert.True(t, l.IP.Equal(resp.YourIPAddr))
|
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(resp.Router()[0]))
|
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(resp.ServerIdentifier()))
|
2021-04-20 15:07:57 +03:00
|
|
|
assert.Equal(t, s.conf.subnet.Mask, resp.SubnetMask())
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
})
|
2020-07-03 18:20:01 +03:00
|
|
|
|
|
|
|
dnsAddrs := resp.DNS()
|
2021-02-12 13:27:44 +03:00
|
|
|
require.Len(t, dnsAddrs, 1)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(dnsAddrs[0]))
|
|
|
|
|
|
|
|
t.Run("check_lease", func(t *testing.T) {
|
|
|
|
ls := s.GetLeases(LeasesStatic)
|
|
|
|
require.Len(t, ls, 1)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.True(t, l.IP.Equal(ls[0].IP))
|
|
|
|
assert.Equal(t, mac, ls[0].HWAddr)
|
|
|
|
})
|
2020-07-03 18:20:01 +03:00
|
|
|
}
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
func TestV4DynamicLease_Get(t *testing.T) {
|
2021-10-18 15:29:29 +03:00
|
|
|
conf := defaultV4ServerConf()
|
|
|
|
conf.Options = []string{
|
|
|
|
"81 hex 303132",
|
|
|
|
"82 ip 1.2.3.4",
|
|
|
|
}
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
var err error
|
2021-10-18 15:29:29 +03:00
|
|
|
sIface, err := v4Create(conf)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
2021-02-04 15:12:34 +03:00
|
|
|
s, ok := sIface.(*v4Server)
|
2021-02-12 13:27:44 +03:00
|
|
|
require.True(t, ok)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-01-13 16:56:05 +03:00
|
|
|
s.conf.dnsIPAddrs = []net.IP{{192, 168, 10, 1}}
|
2022-08-26 14:30:31 +03:00
|
|
|
s.options.Update(dhcpv4.OptDNS(s.conf.dnsIPAddrs...))
|
2020-07-03 18:20:01 +03:00
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
var req, resp *dhcpv4.DHCPv4
|
|
|
|
mac := net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}
|
|
|
|
|
|
|
|
t.Run("discover", func(t *testing.T) {
|
2021-09-13 20:05:41 +03:00
|
|
|
req, err = dhcpv4.NewDiscovery(mac, dhcpv4.WithRequestedOptions(
|
|
|
|
dhcpv4.OptionFQDN,
|
|
|
|
dhcpv4.OptionRelayAgentInformation,
|
|
|
|
))
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
resp, err = dhcpv4.NewReplyFromRequest(req)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
})
|
2021-03-16 19:11:32 +03:00
|
|
|
|
|
|
|
// Don't continue if we got any errors in the previous subtest.
|
2021-04-15 17:52:53 +03:00
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
t.Run("offer", func(t *testing.T) {
|
|
|
|
assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
|
|
|
|
assert.Equal(t, mac, resp.ClientHWAddr)
|
2021-03-16 19:11:32 +03:00
|
|
|
|
|
|
|
assert.Equal(t, s.conf.RangeStart, resp.YourIPAddr)
|
|
|
|
assert.Equal(t, s.conf.GatewayIP, resp.ServerIdentifier())
|
|
|
|
|
|
|
|
router := resp.Router()
|
|
|
|
require.Len(t, router, 1)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-03-16 19:11:32 +03:00
|
|
|
assert.Equal(t, s.conf.GatewayIP, router[0])
|
|
|
|
|
2021-04-20 15:07:57 +03:00
|
|
|
assert.Equal(t, s.conf.subnet.Mask, resp.SubnetMask())
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
2021-09-13 20:05:41 +03:00
|
|
|
assert.Equal(t, []byte("012"), resp.Options.Get(dhcpv4.OptionFQDN))
|
2021-03-16 19:11:32 +03:00
|
|
|
|
2021-09-13 20:05:41 +03:00
|
|
|
rai := resp.RelayAgentInfo()
|
|
|
|
require.NotNil(t, rai)
|
|
|
|
assert.Equal(t, net.IP{1, 2, 3, 4}, net.IP(rai.ToBytes()))
|
2021-02-12 13:27:44 +03:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("request", func(t *testing.T) {
|
2021-04-15 17:52:53 +03:00
|
|
|
req, err = dhcpv4.NewRequestFromOffer(resp)
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
2021-04-15 17:52:53 +03:00
|
|
|
resp, err = dhcpv4.NewReplyFromRequest(req)
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
assert.Equal(t, 1, s.process(req, resp))
|
|
|
|
})
|
2021-04-15 17:52:53 +03:00
|
|
|
|
|
|
|
require.NoError(t, err)
|
2021-02-12 13:27:44 +03:00
|
|
|
|
|
|
|
t.Run("ack", func(t *testing.T) {
|
|
|
|
assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
|
|
|
|
assert.Equal(t, mac, resp.ClientHWAddr)
|
|
|
|
assert.True(t, s.conf.RangeStart.Equal(resp.YourIPAddr))
|
2021-05-06 13:02:48 +03:00
|
|
|
|
|
|
|
router := resp.Router()
|
|
|
|
require.Len(t, router, 1)
|
|
|
|
|
|
|
|
assert.Equal(t, s.conf.GatewayIP, router[0])
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.True(t, s.conf.GatewayIP.Equal(resp.ServerIdentifier()))
|
2021-04-20 15:07:57 +03:00
|
|
|
assert.Equal(t, s.conf.subnet.Mask, resp.SubnetMask())
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
|
|
|
|
})
|
2020-07-03 18:20:01 +03:00
|
|
|
|
|
|
|
dnsAddrs := resp.DNS()
|
2021-02-12 13:27:44 +03:00
|
|
|
require.Len(t, dnsAddrs, 1)
|
2021-04-15 17:52:53 +03:00
|
|
|
|
2021-01-20 17:27:53 +03:00
|
|
|
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0]))
|
2020-07-03 18:20:01 +03:00
|
|
|
|
|
|
|
// check lease
|
2021-02-12 13:27:44 +03:00
|
|
|
t.Run("check_lease", func(t *testing.T) {
|
|
|
|
ls := s.GetLeases(LeasesDynamic)
|
2021-04-15 17:52:53 +03:00
|
|
|
require.Len(t, ls, 1)
|
|
|
|
|
2021-02-12 13:27:44 +03:00
|
|
|
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ls[0].IP))
|
|
|
|
assert.Equal(t, mac, ls[0].HWAddr)
|
|
|
|
})
|
|
|
|
}
|
2021-04-13 16:00:09 +03:00
|
|
|
|
2021-04-19 16:04:40 +03:00
|
|
|
func TestNormalizeHostname(t *testing.T) {
|
2021-04-13 16:00:09 +03:00
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
hostname string
|
|
|
|
wantErrMsg string
|
|
|
|
want string
|
|
|
|
}{{
|
|
|
|
name: "success",
|
|
|
|
hostname: "example.com",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "example.com",
|
|
|
|
}, {
|
|
|
|
name: "success_empty",
|
|
|
|
hostname: "",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "",
|
|
|
|
}, {
|
|
|
|
name: "success_spaces",
|
|
|
|
hostname: "my device 01",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "my-device-01",
|
|
|
|
}, {
|
2021-04-19 16:04:40 +03:00
|
|
|
name: "success_underscores",
|
|
|
|
hostname: "my_device_01",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "my-device-01",
|
2021-04-13 16:00:09 +03:00
|
|
|
}, {
|
2021-04-19 16:04:40 +03:00
|
|
|
name: "error_part",
|
|
|
|
hostname: "device !!!",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "device",
|
|
|
|
}, {
|
|
|
|
name: "error_part_spaces",
|
|
|
|
hostname: "device ! ! !",
|
|
|
|
wantErrMsg: "",
|
|
|
|
want: "device",
|
|
|
|
}, {
|
|
|
|
name: "error",
|
|
|
|
hostname: "!!!",
|
2021-05-06 13:02:48 +03:00
|
|
|
wantErrMsg: `normalizing "!!!": no valid parts`,
|
2021-04-19 16:04:40 +03:00
|
|
|
want: "",
|
|
|
|
}, {
|
|
|
|
name: "error_spaces",
|
|
|
|
hostname: "! ! !",
|
2021-05-06 13:02:48 +03:00
|
|
|
wantErrMsg: `normalizing "! ! !": no valid parts`,
|
2021-04-19 16:04:40 +03:00
|
|
|
want: "",
|
2021-04-13 16:00:09 +03:00
|
|
|
}}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
2021-04-19 16:04:40 +03:00
|
|
|
got, err := normalizeHostname(tc.hostname)
|
2021-10-22 11:58:18 +03:00
|
|
|
testutil.AssertErrorMsg(t, tc.wantErrMsg, err)
|
2021-04-13 16:00:09 +03:00
|
|
|
assert.Equal(t, tc.want, got)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2021-09-07 18:33:23 +03:00
|
|
|
|
|
|
|
// fakePacketConn is a mock implementation of net.PacketConn to simplify
|
|
|
|
// testing.
|
|
|
|
type fakePacketConn struct {
|
|
|
|
// writeTo is used to substitute net.PacketConn's WriteTo method.
|
|
|
|
writeTo func(p []byte, addr net.Addr) (n int, err error)
|
|
|
|
// net.PacketConn is embedded here simply to make *fakePacketConn a
|
|
|
|
// net.PacketConn without actually implementing all methods.
|
|
|
|
net.PacketConn
|
|
|
|
}
|
|
|
|
|
|
|
|
// WriteTo implements net.PacketConn interface for *fakePacketConn.
|
|
|
|
func (fc *fakePacketConn) WriteTo(p []byte, addr net.Addr) (n int, err error) {
|
|
|
|
return fc.writeTo(p, addr)
|
|
|
|
}
|
|
|
|
|
2021-09-30 18:28:19 +03:00
|
|
|
func TestV4Server_Send(t *testing.T) {
|
|
|
|
s := &v4Server{}
|
2021-09-07 18:33:23 +03:00
|
|
|
|
2021-09-30 18:28:19 +03:00
|
|
|
var (
|
|
|
|
defaultIP = net.IP{99, 99, 99, 99}
|
|
|
|
knownIP = net.IP{4, 2, 4, 2}
|
|
|
|
knownMAC = net.HardwareAddr{6, 5, 4, 3, 2, 1}
|
|
|
|
)
|
2021-09-07 18:33:23 +03:00
|
|
|
|
|
|
|
defaultPeer := &net.UDPAddr{
|
2021-09-30 18:28:19 +03:00
|
|
|
IP: defaultIP,
|
|
|
|
// Use neither client nor server port to check it actually
|
|
|
|
// changed.
|
|
|
|
Port: dhcpv4.ClientPort + dhcpv4.ServerPort,
|
2021-09-07 18:33:23 +03:00
|
|
|
}
|
2021-09-30 18:28:19 +03:00
|
|
|
defaultResp := &dhcpv4.DHCPv4{}
|
2021-09-07 18:33:23 +03:00
|
|
|
|
|
|
|
testCases := []struct {
|
2021-09-30 18:28:19 +03:00
|
|
|
want net.Addr
|
|
|
|
req *dhcpv4.DHCPv4
|
|
|
|
resp *dhcpv4.DHCPv4
|
|
|
|
name string
|
2021-09-07 18:33:23 +03:00
|
|
|
}{{
|
2021-09-30 18:28:19 +03:00
|
|
|
name: "giaddr",
|
|
|
|
req: &dhcpv4.DHCPv4{GatewayIPAddr: knownIP},
|
|
|
|
resp: defaultResp,
|
|
|
|
want: &net.UDPAddr{
|
|
|
|
IP: knownIP,
|
2021-09-07 18:33:23 +03:00
|
|
|
Port: dhcpv4.ServerPort,
|
|
|
|
},
|
|
|
|
}, {
|
2021-09-30 18:28:19 +03:00
|
|
|
name: "nak",
|
|
|
|
req: &dhcpv4.DHCPv4{},
|
|
|
|
resp: &dhcpv4.DHCPv4{
|
|
|
|
Options: dhcpv4.OptionsFromList(
|
|
|
|
dhcpv4.OptMessageType(dhcpv4.MessageTypeNak),
|
|
|
|
),
|
2021-09-07 18:33:23 +03:00
|
|
|
},
|
2021-09-30 18:28:19 +03:00
|
|
|
want: defaultPeer,
|
|
|
|
}, {
|
|
|
|
name: "ciaddr",
|
|
|
|
req: &dhcpv4.DHCPv4{ClientIPAddr: knownIP},
|
|
|
|
resp: &dhcpv4.DHCPv4{},
|
|
|
|
want: &net.UDPAddr{
|
|
|
|
IP: knownIP,
|
2021-09-07 18:33:23 +03:00
|
|
|
Port: dhcpv4.ClientPort,
|
|
|
|
},
|
2021-09-30 18:28:19 +03:00
|
|
|
}, {
|
|
|
|
name: "chaddr",
|
|
|
|
req: &dhcpv4.DHCPv4{ClientHWAddr: knownMAC},
|
|
|
|
resp: &dhcpv4.DHCPv4{YourIPAddr: knownIP},
|
|
|
|
want: &dhcpUnicastAddr{
|
2022-08-15 18:31:32 +03:00
|
|
|
Addr: raw.Addr{HardwareAddr: knownMAC},
|
2021-09-30 18:28:19 +03:00
|
|
|
yiaddr: knownIP,
|
|
|
|
},
|
|
|
|
}, {
|
|
|
|
name: "who_are_you",
|
|
|
|
req: &dhcpv4.DHCPv4{},
|
|
|
|
resp: &dhcpv4.DHCPv4{},
|
|
|
|
want: defaultPeer,
|
2021-09-07 18:33:23 +03:00
|
|
|
}}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
2021-09-30 18:28:19 +03:00
|
|
|
conn := &fakePacketConn{
|
|
|
|
writeTo: func(_ []byte, addr net.Addr) (_ int, _ error) {
|
|
|
|
assert.Equal(t, tc.want, addr)
|
|
|
|
|
|
|
|
return 0, nil
|
|
|
|
},
|
|
|
|
}
|
2021-09-07 18:33:23 +03:00
|
|
|
|
2021-09-30 18:28:19 +03:00
|
|
|
s.send(cloneUDPAddr(defaultPeer), conn, tc.req, tc.resp)
|
|
|
|
})
|
2021-09-07 18:33:23 +03:00
|
|
|
}
|
2021-09-30 18:28:19 +03:00
|
|
|
|
|
|
|
t.Run("giaddr_nak", func(t *testing.T) {
|
|
|
|
req := &dhcpv4.DHCPv4{
|
|
|
|
GatewayIPAddr: knownIP,
|
|
|
|
}
|
|
|
|
// Ensure the request is for unicast.
|
|
|
|
req.SetUnicast()
|
|
|
|
resp := &dhcpv4.DHCPv4{
|
|
|
|
Options: dhcpv4.OptionsFromList(
|
|
|
|
dhcpv4.OptMessageType(dhcpv4.MessageTypeNak),
|
|
|
|
),
|
|
|
|
}
|
|
|
|
want := &net.UDPAddr{
|
|
|
|
IP: req.GatewayIPAddr,
|
|
|
|
Port: dhcpv4.ServerPort,
|
|
|
|
}
|
|
|
|
|
|
|
|
conn := &fakePacketConn{
|
|
|
|
writeTo: func(_ []byte, addr net.Addr) (n int, err error) {
|
|
|
|
assert.Equal(t, want, addr)
|
|
|
|
|
|
|
|
return 0, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
s.send(cloneUDPAddr(defaultPeer), conn, req, resp)
|
|
|
|
assert.True(t, resp.IsBroadcast())
|
|
|
|
})
|
2021-09-07 18:33:23 +03:00
|
|
|
}
|