ipset_test.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. package ipset
  4. import (
  5. "net/netip"
  6. "testing"
  7. "tailscale.com/tstest"
  8. "tailscale.com/types/views"
  9. )
  10. func pp(ss ...string) (ret []netip.Prefix) {
  11. for _, s := range ss {
  12. ret = append(ret, netip.MustParsePrefix(s))
  13. }
  14. return
  15. }
  16. func aa(ss ...string) (ret []netip.Addr) {
  17. for _, s := range ss {
  18. ret = append(ret, netip.MustParseAddr(s))
  19. }
  20. return
  21. }
  22. var newContainsIPFuncTests = []struct {
  23. name string
  24. pfx []netip.Prefix
  25. want string
  26. wantIn []netip.Addr
  27. wantOut []netip.Addr
  28. }{
  29. {
  30. name: "empty",
  31. pfx: pp(),
  32. want: "empty",
  33. wantOut: aa("8.8.8.8"),
  34. },
  35. {
  36. name: "cidr-list-1",
  37. pfx: pp("10.0.0.0/8"),
  38. want: "one-prefix",
  39. wantIn: aa("10.0.0.1", "10.2.3.4"),
  40. wantOut: aa("8.8.8.8"),
  41. },
  42. {
  43. name: "cidr-list-2",
  44. pfx: pp("1.0.0.0/8", "3.0.0.0/8"),
  45. want: "linear-contains",
  46. wantIn: aa("1.0.0.1", "3.0.0.1"),
  47. wantOut: aa("2.0.0.1"),
  48. },
  49. {
  50. name: "cidr-list-3",
  51. pfx: pp("1.0.0.0/8", "3.0.0.0/8", "5.0.0.0/8"),
  52. want: "linear-contains",
  53. wantIn: aa("1.0.0.1", "5.0.0.1"),
  54. wantOut: aa("2.0.0.1"),
  55. },
  56. {
  57. name: "cidr-list-4",
  58. pfx: pp("1.0.0.0/8", "3.0.0.0/8", "5.0.0.0/8", "7.0.0.0/8"),
  59. want: "linear-contains",
  60. wantIn: aa("1.0.0.1", "7.0.0.1"),
  61. wantOut: aa("2.0.0.1"),
  62. },
  63. {
  64. name: "cidr-list-5",
  65. pfx: pp("1.0.0.0/8", "3.0.0.0/8", "5.0.0.0/8", "7.0.0.0/8", "9.0.0.0/8"),
  66. want: "linear-contains",
  67. wantIn: aa("1.0.0.1", "9.0.0.1"),
  68. wantOut: aa("2.0.0.1"),
  69. },
  70. {
  71. name: "cidr-list-10",
  72. pfx: pp("1.0.0.0/8", "3.0.0.0/8", "5.0.0.0/8", "7.0.0.0/8", "9.0.0.0/8",
  73. "11.0.0.0/8", "13.0.0.0/8", "15.0.0.0/8", "17.0.0.0/8", "19.0.0.0/8"),
  74. want: "bart", // big enough that bart is faster than linear-contains
  75. wantIn: aa("1.0.0.1", "19.0.0.1"),
  76. wantOut: aa("2.0.0.1"),
  77. },
  78. {
  79. name: "one-ip",
  80. pfx: pp("10.1.0.0/32"),
  81. want: "one-ip",
  82. wantIn: aa("10.1.0.0"),
  83. wantOut: aa("10.0.0.9"),
  84. },
  85. {
  86. name: "two-ip",
  87. pfx: pp("10.1.0.0/32", "10.2.0.0/32"),
  88. want: "two-ip",
  89. wantIn: aa("10.1.0.0", "10.2.0.0"),
  90. wantOut: aa("8.8.8.8"),
  91. },
  92. {
  93. name: "three-ip",
  94. pfx: pp("10.1.0.0/32", "10.2.0.0/32", "10.3.0.0/32"),
  95. want: "ip-map",
  96. wantIn: aa("10.1.0.0", "10.2.0.0"),
  97. wantOut: aa("8.8.8.8"),
  98. },
  99. }
  100. func BenchmarkNewContainsIPFunc(b *testing.B) {
  101. for _, tt := range newContainsIPFuncTests {
  102. b.Run(tt.name, func(b *testing.B) {
  103. f := NewContainsIPFunc(views.SliceOf(tt.pfx))
  104. for i := 0; i < b.N; i++ {
  105. for _, ip := range tt.wantIn {
  106. if !f(ip) {
  107. b.Fatal("unexpected false")
  108. }
  109. }
  110. for _, ip := range tt.wantOut {
  111. if f(ip) {
  112. b.Fatal("unexpected true")
  113. }
  114. }
  115. }
  116. })
  117. }
  118. }
  119. func TestNewContainsIPFunc(t *testing.T) {
  120. for _, tt := range newContainsIPFuncTests {
  121. t.Run(tt.name, func(t *testing.T) {
  122. var got string
  123. tstest.Replace(t, &pathForTest, func(path string) { got = path })
  124. f := NewContainsIPFunc(views.SliceOf(tt.pfx))
  125. if got != tt.want {
  126. t.Errorf("func type = %q; want %q", got, tt.want)
  127. }
  128. for _, ip := range tt.wantIn {
  129. if !f(ip) {
  130. t.Errorf("match(%v) = false; want true", ip)
  131. }
  132. }
  133. for _, ip := range tt.wantOut {
  134. if f(ip) {
  135. t.Errorf("match(%v) = true; want false", ip)
  136. }
  137. }
  138. })
  139. }
  140. }