func TestGood(t *testing.T) { n := addrmgr.New("testgood", lookupFunc) addrsToAdd := 64 * 64 addrs := make([]*wire.NetAddress, addrsToAdd) var err error for i := 0; i < addrsToAdd; i++ { s := fmt.Sprintf("%d.173.147.%d:8333", i/64+60, i%64+60) addrs[i], err = n.DeserializeNetAddress(s) if err != nil { t.Errorf("Failed to turn %s into an address: %v", s, err) } } srcAddr := wire.NewNetAddressIPPort(net.IPv4(173, 144, 173, 111), 8333, 0) n.AddAddresses(addrs, srcAddr) for _, addr := range addrs { n.Good(addr) } numAddrs := n.NumAddresses() if numAddrs >= addrsToAdd { t.Errorf("Number of addresses is too many: %d vs %d", numAddrs, addrsToAdd) } numCache := len(n.AddressCache()) if numCache >= numAddrs/4 { t.Errorf("Number of addresses in cache: got %d, want %d", numCache, numAddrs/4) } }
func TestNeedMoreAddresses(t *testing.T) { n := addrmgr.New("testneedmoreaddresses", lookupFunc) addrsToAdd := 1500 b := n.NeedMoreAddresses() if !b { t.Errorf("Expected that we need more addresses") } addrs := make([]*wire.NetAddress, addrsToAdd) var err error for i := 0; i < addrsToAdd; i++ { s := fmt.Sprintf("%d.%d.173.147:8333", i/128+60, i%128+60) addrs[i], err = n.DeserializeNetAddress(s) if err != nil { t.Errorf("Failed to turn %s into an address: %v", s, err) } } srcAddr := wire.NewNetAddressIPPort(net.IPv4(173, 144, 173, 111), 8333, 0) n.AddAddresses(addrs, srcAddr) numAddrs := n.NumAddresses() if numAddrs > addrsToAdd { t.Errorf("Number of addresses is too many %d vs %d", numAddrs, addrsToAdd) } b = n.NeedMoreAddresses() if b { t.Errorf("Expected that we don't need more addresses") } }
// HostToNetAddress returns a netaddress given a host address. If the address is // a tor .onion address this will be taken care of. else if the host is not an // IP address it will be resolved (via tor if required). func (a *AddrManager) HostToNetAddress(host string, port uint16, services wire.ServiceFlag) (*wire.NetAddress, error) { // tor address is 16 char base32 + ".onion" var ip net.IP if len(host) == 22 && host[16:] == ".onion" { // go base32 encoding uses capitals (as does the rfc // but tor and bitcoind tend to user lowercase, so we switch // case here. data, err := base32.StdEncoding.DecodeString( strings.ToUpper(host[:16])) if err != nil { return nil, err } prefix := []byte{0xfd, 0x87, 0xd8, 0x7e, 0xeb, 0x43} ip = net.IP(append(prefix, data...)) } else if ip = net.ParseIP(host); ip == nil { ips, err := a.lookupFunc(host) if err != nil { return nil, err } if len(ips) == 0 { return nil, fmt.Errorf("no addresses found for %s", host) } ip = ips[0] } return wire.NewNetAddressIPPort(ip, port, services), nil }
// TestGroupKey tests the GroupKey function to ensure it properly groups various // IP addresses. func TestGroupKey(t *testing.T) { tests := []struct { name string ip string expected string }{ // Local addresses. {name: "ipv4 localhost", ip: "127.0.0.1", expected: "local"}, {name: "ipv6 localhost", ip: "::1", expected: "local"}, {name: "ipv4 zero", ip: "0.0.0.0", expected: "local"}, {name: "ipv4 first octet zero", ip: "0.1.2.3", expected: "local"}, // Unroutable addresses. {name: "ipv4 invalid bcast", ip: "255.255.255.255", expected: "unroutable"}, {name: "ipv4 rfc1918 10/8", ip: "10.1.2.3", expected: "unroutable"}, {name: "ipv4 rfc1918 172.16/12", ip: "172.16.1.2", expected: "unroutable"}, {name: "ipv4 rfc1918 192.168/16", ip: "192.168.1.2", expected: "unroutable"}, {name: "ipv6 rfc3849 2001:db8::/32", ip: "2001:db8::1234", expected: "unroutable"}, {name: "ipv4 rfc3927 169.254/16", ip: "169.254.1.2", expected: "unroutable"}, {name: "ipv6 rfc4193 fc00::/7", ip: "fc00::1234", expected: "unroutable"}, {name: "ipv6 rfc4843 2001:10::/28", ip: "2001:10::1234", expected: "unroutable"}, {name: "ipv6 rfc4862 fe80::/64", ip: "fe80::1234", expected: "unroutable"}, // IPv4 normal. {name: "ipv4 normal class a", ip: "12.1.2.3", expected: "12.1.0.0"}, {name: "ipv4 normal class b", ip: "173.1.2.3", expected: "173.1.0.0"}, {name: "ipv4 normal class c", ip: "196.1.2.3", expected: "196.1.0.0"}, // IPv6/IPv4 translations. {name: "ipv6 rfc3964 with ipv4 encap", ip: "2002:0c01:0203::", expected: "12.1.0.0"}, {name: "ipv6 rfc4380 toredo ipv4", ip: "2001:0:1234::f3fe:fdfc", expected: "12.1.0.0"}, {name: "ipv6 rfc6052 well-known prefix with ipv4", ip: "64:ff9b::0c01:0203", expected: "12.1.0.0"}, {name: "ipv6 rfc6145 translated ipv4", ip: "::ffff:0:0c01:0203", expected: "12.1.0.0"}, // Tor. {name: "ipv6 tor onioncat", ip: "fd87:d87e:eb43:1234::5678", expected: "tor:2"}, {name: "ipv6 tor onioncat 2", ip: "fd87:d87e:eb43:1245::6789", expected: "tor:2"}, {name: "ipv6 tor onioncat 3", ip: "fd87:d87e:eb43:1345::6789", expected: "tor:3"}, // IPv6 normal. {name: "ipv6 normal", ip: "2602:100::1", expected: "2602:100::"}, {name: "ipv6 normal 2", ip: "2602:0100::1234", expected: "2602:100::"}, {name: "ipv6 hurricane electric", ip: "2001:470:1f10:a1::2", expected: "2001:470:1000::"}, {name: "ipv6 hurricane electric 2", ip: "2001:0470:1f10:a1::2", expected: "2001:470:1000::"}, } for i, test := range tests { nip := net.ParseIP(test.ip) na := *wire.NewNetAddressIPPort(nip, 8333, wire.SFNodeNetwork) if key := addrmgr.GroupKey(&na); key != test.expected { t.Errorf("TestGroupKey #%d (%s): unexpected group key "+ "- got '%s', want '%s'", i, test.name, key, test.expected) } } }
// AddAddressByIP adds an address where we are given an ip:port and not a // wire.NetAddress. func (a *AddrManager) AddAddressByIP(addrIP string) error { // Split IP and port addr, portStr, err := net.SplitHostPort(addrIP) if err != nil { return err } // Put it in wire.Netaddress ip := net.ParseIP(addr) if ip == nil { return fmt.Errorf("invalid ip address %s", addr) } port, err := strconv.ParseUint(portStr, 10, 0) if err != nil { return fmt.Errorf("invalid port %s: %v", portStr, err) } na := wire.NewNetAddressIPPort(ip, uint16(port), 0) a.AddAddress(na, na) // XXX use correct src address return nil }
// GetBestLocalAddress returns the most appropriate local address to use // for the given remote address. func (a *AddrManager) GetBestLocalAddress(remoteAddr *wire.NetAddress) *wire.NetAddress { a.lamtx.Lock() defer a.lamtx.Unlock() bestreach := 0 var bestscore AddressPriority var bestAddress *wire.NetAddress for _, la := range a.localAddresses { reach := getReachabilityFrom(la.na, remoteAddr) if reach > bestreach || (reach == bestreach && la.score > bestscore) { bestreach = reach bestscore = la.score bestAddress = la.na } } if bestAddress != nil { log.Debugf("Suggesting address %s:%d for %s:%d", bestAddress.IP, bestAddress.Port, remoteAddr.IP, remoteAddr.Port) } else { log.Debugf("No worthy address for %s:%d", remoteAddr.IP, remoteAddr.Port) // Send something unroutable if nothing suitable. var ip net.IP if !IsIPv4(remoteAddr) && !IsOnionCatTor(remoteAddr) { ip = net.IPv6zero } else { ip = net.IPv4zero } services := wire.SFNodeNetwork | wire.SFNodeWitness | wire.SFNodeBloom bestAddress = wire.NewNetAddressIPPort(ip, 0, services) } return bestAddress }
// TestIPTypes ensures the various functions which determine the type of an IP // address based on RFCs work as intended. func TestIPTypes(t *testing.T) { type ipTest struct { in wire.NetAddress rfc1918 bool rfc2544 bool rfc3849 bool rfc3927 bool rfc3964 bool rfc4193 bool rfc4380 bool rfc4843 bool rfc4862 bool rfc5737 bool rfc6052 bool rfc6145 bool rfc6598 bool local bool valid bool routable bool } newIPTest := func(ip string, rfc1918, rfc2544, rfc3849, rfc3927, rfc3964, rfc4193, rfc4380, rfc4843, rfc4862, rfc5737, rfc6052, rfc6145, rfc6598, local, valid, routable bool) ipTest { nip := net.ParseIP(ip) na := *wire.NewNetAddressIPPort(nip, 8333, wire.SFNodeNetwork) test := ipTest{na, rfc1918, rfc2544, rfc3849, rfc3927, rfc3964, rfc4193, rfc4380, rfc4843, rfc4862, rfc5737, rfc6052, rfc6145, rfc6598, local, valid, routable} return test } tests := []ipTest{ newIPTest("10.255.255.255", true, false, false, false, false, false, false, false, false, false, false, false, false, false, true, false), newIPTest("192.168.0.1", true, false, false, false, false, false, false, false, false, false, false, false, false, false, true, false), newIPTest("172.31.255.1", true, false, false, false, false, false, false, false, false, false, false, false, false, false, true, false), newIPTest("172.32.1.1", false, false, false, false, false, false, false, false, false, false, false, false, false, false, true, true), newIPTest("169.254.250.120", false, false, false, true, false, false, false, false, false, false, false, false, false, false, true, false), newIPTest("0.0.0.0", false, false, false, false, false, false, false, false, false, false, false, false, false, true, false, false), newIPTest("255.255.255.255", false, false, false, false, false, false, false, false, false, false, false, false, false, false, false, false), newIPTest("127.0.0.1", false, false, false, false, false, false, false, false, false, false, false, false, false, true, true, false), newIPTest("fd00:dead::1", false, false, false, false, false, true, false, false, false, false, false, false, false, false, true, false), newIPTest("2001::1", false, false, false, false, false, false, true, false, false, false, false, false, false, false, true, true), newIPTest("2001:10:abcd::1:1", false, false, false, false, false, false, false, true, false, false, false, false, false, false, true, false), newIPTest("fe80::1", false, false, false, false, false, false, false, false, true, false, false, false, false, false, true, false), newIPTest("fe80:1::1", false, false, false, false, false, false, false, false, false, false, false, false, false, false, true, true), newIPTest("64:ff9b::1", false, false, false, false, false, false, false, false, false, false, true, false, false, false, true, true), newIPTest("::ffff:abcd:ef12:1", false, false, false, false, false, false, false, false, false, false, false, false, false, false, true, true), newIPTest("::1", false, false, false, false, false, false, false, false, false, false, false, false, false, true, true, false), newIPTest("198.18.0.1", false, true, false, false, false, false, false, false, false, false, false, false, false, false, true, false), newIPTest("100.127.255.1", false, false, false, false, false, false, false, false, false, false, false, false, true, false, true, false), newIPTest("203.0.113.1", false, false, false, false, false, false, false, false, false, false, false, false, false, false, true, false), } t.Logf("Running %d tests", len(tests)) for _, test := range tests { if rv := addrmgr.IsRFC1918(&test.in); rv != test.rfc1918 { t.Errorf("IsRFC1918 %s\n got: %v want: %v", test.in.IP, rv, test.rfc1918) } if rv := addrmgr.IsRFC3849(&test.in); rv != test.rfc3849 { t.Errorf("IsRFC3849 %s\n got: %v want: %v", test.in.IP, rv, test.rfc3849) } if rv := addrmgr.IsRFC3927(&test.in); rv != test.rfc3927 { t.Errorf("IsRFC3927 %s\n got: %v want: %v", test.in.IP, rv, test.rfc3927) } if rv := addrmgr.IsRFC3964(&test.in); rv != test.rfc3964 { t.Errorf("IsRFC3964 %s\n got: %v want: %v", test.in.IP, rv, test.rfc3964) } if rv := addrmgr.IsRFC4193(&test.in); rv != test.rfc4193 { t.Errorf("IsRFC4193 %s\n got: %v want: %v", test.in.IP, rv, test.rfc4193) } if rv := addrmgr.IsRFC4380(&test.in); rv != test.rfc4380 { t.Errorf("IsRFC4380 %s\n got: %v want: %v", test.in.IP, rv, test.rfc4380) } if rv := addrmgr.IsRFC4843(&test.in); rv != test.rfc4843 { t.Errorf("IsRFC4843 %s\n got: %v want: %v", test.in.IP, rv, test.rfc4843) } if rv := addrmgr.IsRFC4862(&test.in); rv != test.rfc4862 { t.Errorf("IsRFC4862 %s\n got: %v want: %v", test.in.IP, rv, test.rfc4862) } if rv := addrmgr.IsRFC6052(&test.in); rv != test.rfc6052 { t.Errorf("isRFC6052 %s\n got: %v want: %v", test.in.IP, rv, test.rfc6052) } if rv := addrmgr.IsRFC6145(&test.in); rv != test.rfc6145 { t.Errorf("IsRFC1918 %s\n got: %v want: %v", test.in.IP, rv, test.rfc6145) } if rv := addrmgr.IsLocal(&test.in); rv != test.local { t.Errorf("IsLocal %s\n got: %v want: %v", test.in.IP, rv, test.local) } if rv := addrmgr.IsValid(&test.in); rv != test.valid { t.Errorf("IsValid %s\n got: %v want: %v", test.in.IP, rv, test.valid) } if rv := addrmgr.IsRoutable(&test.in); rv != test.routable { t.Errorf("IsRoutable %s\n got: %v want: %v", test.in.IP, rv, test.routable) } } }
func addNaTest(ip string, port uint16, want string) { nip := net.ParseIP(ip) na := *wire.NewNetAddressIPPort(nip, port, wire.SFNodeNetwork) test := naTest{na, want} naTests = append(naTests, test) }