mirror of
https://github.com/opentofu/opentofu.git
synced 2024-12-26 00:41:27 -06:00
f84ab99b7d
This is a companion to cidrsubnet that allows bulk-allocation of multiple subnet addresses at once, with automatic numbering. Unlike cidrsubnet, cidrsubnets allows each of the allocations to have a different prefix length, and will pack the networks consecutively into the given address space. cidrsubnets can potentially create more complicated addressing schemes than cidrsubnet alone can, because it's able to take into account the full set of requested prefix lengths rather than just one at a time.
321 lines
6.8 KiB
Go
321 lines
6.8 KiB
Go
package funcs
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/zclconf/go-cty/cty"
|
|
)
|
|
|
|
func TestCidrHost(t *testing.T) {
|
|
tests := []struct {
|
|
Prefix cty.Value
|
|
Hostnum cty.Value
|
|
Want cty.Value
|
|
Err bool
|
|
}{
|
|
{
|
|
cty.StringVal("192.168.1.0/24"),
|
|
cty.NumberIntVal(5),
|
|
cty.StringVal("192.168.1.5"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("192.168.1.0/24"),
|
|
cty.NumberIntVal(-5),
|
|
cty.StringVal("192.168.1.251"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("192.168.1.0/24"),
|
|
cty.NumberIntVal(-256),
|
|
cty.StringVal("192.168.1.0"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("192.168.1.0/30"),
|
|
cty.NumberIntVal(255),
|
|
cty.UnknownVal(cty.String),
|
|
true, // 255 doesn't fit in two bits
|
|
},
|
|
{
|
|
cty.StringVal("192.168.1.0/30"),
|
|
cty.NumberIntVal(-255),
|
|
cty.UnknownVal(cty.String),
|
|
true, // 255 doesn't fit in two bits
|
|
},
|
|
{
|
|
cty.StringVal("not-a-cidr"),
|
|
cty.NumberIntVal(6),
|
|
cty.UnknownVal(cty.String),
|
|
true, // not a valid CIDR mask
|
|
},
|
|
{
|
|
cty.StringVal("10.256.0.0/8"),
|
|
cty.NumberIntVal(6),
|
|
cty.UnknownVal(cty.String),
|
|
true, // can't have an octet >255
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(fmt.Sprintf("cidrhost(%#v, %#v)", test.Prefix, test.Hostnum), func(t *testing.T) {
|
|
got, err := CidrHost(test.Prefix, test.Hostnum)
|
|
|
|
if test.Err {
|
|
if err == nil {
|
|
t.Fatal("succeeded; want error")
|
|
}
|
|
return
|
|
} else if err != nil {
|
|
t.Fatalf("unexpected error: %s", err)
|
|
}
|
|
|
|
if !got.RawEquals(test.Want) {
|
|
t.Errorf("wrong result\ngot: %#v\nwant: %#v", got, test.Want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCidrNetmask(t *testing.T) {
|
|
tests := []struct {
|
|
Prefix cty.Value
|
|
Want cty.Value
|
|
Err bool
|
|
}{
|
|
{
|
|
cty.StringVal("192.168.1.0/24"),
|
|
cty.StringVal("255.255.255.0"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("192.168.1.0/32"),
|
|
cty.StringVal("255.255.255.255"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("0.0.0.0/0"),
|
|
cty.StringVal("0.0.0.0"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("1::/64"),
|
|
cty.StringVal("ffff:ffff:ffff:ffff::"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("not-a-cidr"),
|
|
cty.UnknownVal(cty.String),
|
|
true, // not a valid CIDR mask
|
|
},
|
|
{
|
|
cty.StringVal("110.256.0.0/8"),
|
|
cty.UnknownVal(cty.String),
|
|
true, // can't have an octet >255
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(fmt.Sprintf("cidrnetmask(%#v)", test.Prefix), func(t *testing.T) {
|
|
got, err := CidrNetmask(test.Prefix)
|
|
|
|
if test.Err {
|
|
if err == nil {
|
|
t.Fatal("succeeded; want error")
|
|
}
|
|
return
|
|
} else if err != nil {
|
|
t.Fatalf("unexpected error: %s", err)
|
|
}
|
|
|
|
if !got.RawEquals(test.Want) {
|
|
t.Errorf("wrong result\ngot: %#v\nwant: %#v", got, test.Want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCidrSubnet(t *testing.T) {
|
|
tests := []struct {
|
|
Prefix cty.Value
|
|
Newbits cty.Value
|
|
Netnum cty.Value
|
|
Want cty.Value
|
|
Err bool
|
|
}{
|
|
{
|
|
cty.StringVal("192.168.2.0/20"),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(6),
|
|
cty.StringVal("192.168.6.0/24"),
|
|
false,
|
|
},
|
|
{
|
|
cty.StringVal("fe80::/48"),
|
|
cty.NumberIntVal(16),
|
|
cty.NumberIntVal(6),
|
|
cty.StringVal("fe80:0:0:6::/64"),
|
|
false,
|
|
},
|
|
{ // IPv4 address encoded in IPv6 syntax gets normalized
|
|
cty.StringVal("::ffff:192.168.0.0/112"),
|
|
cty.NumberIntVal(8),
|
|
cty.NumberIntVal(6),
|
|
cty.StringVal("192.168.6.0/24"),
|
|
false,
|
|
},
|
|
{ // not enough bits left
|
|
cty.StringVal("192.168.0.0/30"),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(6),
|
|
cty.UnknownVal(cty.String),
|
|
true,
|
|
},
|
|
{ // can't encode 16 in 2 bits
|
|
cty.StringVal("192.168.0.0/168"),
|
|
cty.NumberIntVal(2),
|
|
cty.NumberIntVal(16),
|
|
cty.StringVal("fe80:0:0:6::/64"),
|
|
true,
|
|
},
|
|
{ // not a valid CIDR mask
|
|
cty.StringVal("not-a-cidr"),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(6),
|
|
cty.StringVal("fe80:0:0:6::/64"),
|
|
true,
|
|
},
|
|
{ // can't have an octet >255
|
|
cty.StringVal("10.256.0.0/8"),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(6),
|
|
cty.StringVal("fe80:0:0:6::/64"),
|
|
true,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(fmt.Sprintf("cidrsubnet(%#v, %#v, %#v)", test.Prefix, test.Newbits, test.Netnum), func(t *testing.T) {
|
|
got, err := CidrSubnet(test.Prefix, test.Newbits, test.Netnum)
|
|
|
|
if test.Err {
|
|
if err == nil {
|
|
t.Fatal("succeeded; want error")
|
|
}
|
|
return
|
|
} else if err != nil {
|
|
t.Fatalf("unexpected error: %s", err)
|
|
}
|
|
|
|
if !got.RawEquals(test.Want) {
|
|
t.Errorf("wrong result\ngot: %#v\nwant: %#v", got, test.Want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
func TestCidrSubnets(t *testing.T) {
|
|
tests := []struct {
|
|
Prefix cty.Value
|
|
Newbits []cty.Value
|
|
Want cty.Value
|
|
Err string
|
|
}{
|
|
{
|
|
cty.StringVal("10.0.0.0/21"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(3),
|
|
cty.NumberIntVal(3),
|
|
cty.NumberIntVal(3),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(4),
|
|
cty.NumberIntVal(7),
|
|
cty.NumberIntVal(7),
|
|
cty.NumberIntVal(7),
|
|
},
|
|
cty.ListVal([]cty.Value{
|
|
cty.StringVal("10.0.0.0/24"),
|
|
cty.StringVal("10.0.1.0/24"),
|
|
cty.StringVal("10.0.2.0/24"),
|
|
cty.StringVal("10.0.3.0/25"),
|
|
cty.StringVal("10.0.3.128/25"),
|
|
cty.StringVal("10.0.4.0/25"),
|
|
cty.StringVal("10.0.4.128/28"),
|
|
cty.StringVal("10.0.4.144/28"),
|
|
cty.StringVal("10.0.4.160/28"),
|
|
}),
|
|
``,
|
|
},
|
|
{
|
|
cty.StringVal("10.0.0.0/30"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(3),
|
|
},
|
|
cty.UnknownVal(cty.List(cty.String)),
|
|
`would extend prefix to 33 bits, which is too long for an IPv4 address`,
|
|
},
|
|
{
|
|
cty.StringVal("10.0.0.0/8"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(1),
|
|
},
|
|
cty.UnknownVal(cty.List(cty.String)),
|
|
`not enough remaining address space for a subnet with a prefix of 9 bits after 10.128.0.0/9`,
|
|
},
|
|
{
|
|
cty.StringVal("10.0.0.0/8"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(0),
|
|
},
|
|
cty.UnknownVal(cty.List(cty.String)),
|
|
`must extend prefix by at least one bit`,
|
|
},
|
|
{
|
|
cty.StringVal("10.0.0.0/8"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(-1),
|
|
},
|
|
cty.UnknownVal(cty.List(cty.String)),
|
|
`must extend prefix by at least one bit`,
|
|
},
|
|
{
|
|
cty.StringVal("fe80::/48"),
|
|
[]cty.Value{
|
|
cty.NumberIntVal(1),
|
|
cty.NumberIntVal(33),
|
|
},
|
|
cty.UnknownVal(cty.List(cty.String)),
|
|
`may not extend prefix by more than 32 bits`,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(fmt.Sprintf("cidrsubnets(%#v, %#v)", test.Prefix, test.Newbits), func(t *testing.T) {
|
|
got, err := CidrSubnets(test.Prefix, test.Newbits...)
|
|
wantErr := test.Err != ""
|
|
|
|
if wantErr {
|
|
if err == nil {
|
|
t.Fatal("succeeded; want error")
|
|
}
|
|
if err.Error() != test.Err {
|
|
t.Fatalf("wrong error\ngot: %s\nwant: %s", err.Error(), test.Err)
|
|
}
|
|
return
|
|
} else if err != nil {
|
|
t.Fatalf("unexpected error: %s", err)
|
|
}
|
|
|
|
if !got.RawEquals(test.Want) {
|
|
t.Errorf("wrong result\ngot: %#v\nwant: %#v", got, test.Want)
|
|
}
|
|
})
|
|
}
|
|
}
|