package swarm import ( "fmt" "net" "strings" "testing" "github.com/spf13/pflag" ) // Helper function to set static slices func getCIDR(_ net.IP, cidr *net.IPNet, _ error) net.IPNet { return *cidr } func equalCIDR(c1 net.IPNet, c2 net.IPNet) bool { return c1.String() == c2.String() } func setUpIPNetFlagSet(ipsp *[]net.IPNet) *pflag.FlagSet { f := pflag.NewFlagSet("test", pflag.ContinueOnError) f.VarP(newIPNetSliceValue([]net.IPNet{}, ipsp), "cidrs", "", "Command separated list!") return f } func TestIPNets(t *testing.T) { var ips []net.IPNet f := setUpIPNetFlagSet(&ips) vals := []string{"192.168.1.1/24", "10.0.0.1/16", "fd00:0:0:0:0:0:0:2/64"} arg := fmt.Sprintf("--cidrs=%s", strings.Join(vals, ",")) err := f.Parse([]string{arg}) if err != nil { t.Fatal("expected no error; got", err) } for i, v := range ips { if _, cidr, _ := net.ParseCIDR(vals[i]); cidr == nil { t.Fatalf("invalid string being converted to CIDR: %s", vals[i]) } else if !equalCIDR(*cidr, v) { t.Fatalf("expected ips[%d] to be %s but got: %s from GetIPSlice", i, vals[i], v) } } } func TestIPNetCalledTwice(t *testing.T) { var cidrs []net.IPNet f := setUpIPNetFlagSet(&cidrs) in := []string{"192.168.1.2/16,fd00::/64", "10.0.0.1/24"} expected := []net.IPNet{ getCIDR(net.ParseCIDR("192.168.1.2/16")), getCIDR(net.ParseCIDR("fd00::/64")), getCIDR(net.ParseCIDR("10.0.0.1/24")), } argfmt := "--cidrs=%s" arg1 := fmt.Sprintf(argfmt, in[0]) arg2 := fmt.Sprintf(argfmt, in[1]) err := f.Parse([]string{arg1, arg2}) if err != nil { t.Fatal("expected no error; got", err) } for i, v := range cidrs { if !equalCIDR(expected[i], v) { t.Fatalf("expected cidrs[%d] to be %s but got: %s", i, expected[i], v) } } } func TestIPNetBadQuoting(t *testing.T) { tests := []struct { Want []net.IPNet FlagArg []string }{ { Want: []net.IPNet{ getCIDR(net.ParseCIDR("a4ab:61d:f03e:5d7d:fad7:d4c2:a1a5:568/128")), getCIDR(net.ParseCIDR("203.107.49.208/32")), getCIDR(net.ParseCIDR("14.57.204.90/32")), }, FlagArg: []string{ "a4ab:61d:f03e:5d7d:fad7:d4c2:a1a5:568/128", "203.107.49.208/32", "14.57.204.90/32", }, }, { Want: []net.IPNet{ getCIDR(net.ParseCIDR("204.228.73.195/32")), getCIDR(net.ParseCIDR("86.141.15.94/32")), }, FlagArg: []string{ "204.228.73.195/32", "86.141.15.94/32", }, }, { Want: []net.IPNet{ getCIDR(net.ParseCIDR("c70c:db36:3001:890f:c6ea:3f9b:7a39:cc3f/128")), getCIDR(net.ParseCIDR("4d17:1d6e:e699:bd7a:88c5:5e7e:ac6a:4472/128")), }, FlagArg: []string{ "c70c:db36:3001:890f:c6ea:3f9b:7a39:cc3f/128", "4d17:1d6e:e699:bd7a:88c5:5e7e:ac6a:4472/128", }, }, { Want: []net.IPNet{ getCIDR(net.ParseCIDR("5170:f971:cfac:7be3:512a:af37:952c:bc33/128")), getCIDR(net.ParseCIDR("93.21.145.140/32")), getCIDR(net.ParseCIDR("2cac:61d3:c5ff:6caf:73e0:1b1a:c336:c1ca/128")), }, FlagArg: []string{ " 5170:f971:cfac:7be3:512a:af37:952c:bc33/128 , 93.21.145.140/32 ", "2cac:61d3:c5ff:6caf:73e0:1b1a:c336:c1ca/128", }, }, { Want: []net.IPNet{ getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")), getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")), getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")), getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")), }, FlagArg: []string{ `"2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128, 2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128,2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128 "`, " 2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128", }, }, } for i, test := range tests { var cidrs []net.IPNet f := setUpIPNetFlagSet(&cidrs) if err := f.Parse([]string{fmt.Sprintf("--cidrs=%s", strings.Join(test.FlagArg, ","))}); err != nil { t.Fatalf("flag parsing failed with error: %s\nparsing:\t%#v\nwant:\t\t%s", err, test.FlagArg, test.Want[i]) } for j, b := range cidrs { if !equalCIDR(b, test.Want[j]) { t.Fatalf("bad value parsed for test %d on net.IP %d:\nwant:\t%s\ngot:\t%s", i, j, test.Want[j], b) } } } }