netty5/common/src/test/java/io/netty/util/NetUtilTest.java
Nikolay Fedorovskikh 01eb428b39 Move methods for decode hex dump into StringUtil
Motivation:

PR #6811 introduced a public utility methods to decode hex dump and its parts, but they are not visible from netty-common.

Modifications:

1. Move the `decodeHexByte`, `decodeHexDump` and `decodeHexNibble` methods into `StringUtils`.
2. Apply these methods where applicable.
3. Remove similar methods from other locations (e.g. `HpackHex` test class).

Result:

Less code duplication.
2017-06-23 18:52:42 +02:00

789 lines
36 KiB
Java

/*
* Copyright 2012 The Netty Project
*
* The Netty Project licenses this file to you under the Apache License,
* version 2.0 (the "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations
* under the License.
*/
package io.netty.util;
import io.netty.util.internal.StringUtil;
import org.junit.Test;
import java.net.Inet6Address;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.net.UnknownHostException;
import java.util.HashMap;
import java.util.Map;
import java.util.Map.Entry;
import static io.netty.util.NetUtil.*;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
public class NetUtilTest {
private static final class TestMap extends HashMap<String, String> {
private static final long serialVersionUID = -298642816998608473L;
TestMap(String... values) {
for (int i = 0; i < values.length; i += 2) {
String key = values[i];
String value = values[i + 1];
put(key, value);
}
}
}
private static final Map<String, String> validIpV4Hosts = new TestMap(
"192.168.1.0", "c0a80100",
"10.255.255.254", "0afffffe",
"172.18.5.4", "ac120504",
"0.0.0.0", "00000000",
"127.0.0.1", "7f000001",
"255.255.255.255", "ffffffff",
"1.2.3.4", "01020304");
private static final Map<String, String> invalidIpV4Hosts = new TestMap(
"1.256.3.4", null,
"256.0.0.1", null,
"1.1.1.1.1", null,
"x.255.255.255", null,
"0.1:0.0", null,
"0.1.0.0:", null,
"127.0.0.", null,
"1.2..4", null,
"192.0.1", null,
"192.0.1.1.1", null,
"192.0.1.a", null,
"19a.0.1.1", null,
"a.0.1.1", null,
".0.1.1", null,
"127.0.0", null,
"192.0.1.256", null,
"0.0.200.259", null,
"1.1.-1.1", null,
"1.1. 1.1", null,
"1.1.1.1 ", null,
"1.1.+1.1", null,
"0.0x1.0.255", null,
"0.01x.0.255", null,
"0.x01.0.255", null,
"0.-.0.0", null,
"0..0.0", null,
"0.A.0.0", null,
"0.1111.0.0", null,
"...", null);
private static final Map<String, String> validIpV6Hosts = new TestMap(
"::ffff:5.6.7.8", "00000000000000000000ffff05060708",
"fdf8:f53b:82e4::53", "fdf8f53b82e400000000000000000053",
"fe80::200:5aee:feaa:20a2", "fe8000000000000002005aeefeaa20a2",
"2001::1", "20010000000000000000000000000001",
"2001:0000:4136:e378:8000:63bf:3fff:fdd2", "200100004136e378800063bf3ffffdd2",
"2001:0002:6c::430", "20010002006c00000000000000000430",
"2001:10:240:ab::a", "20010010024000ab000000000000000a",
"2002:cb0a:3cdd:1::1", "2002cb0a3cdd00010000000000000001",
"2001:db8:8:4::2", "20010db8000800040000000000000002",
"ff01:0:0:0:0:0:0:2", "ff010000000000000000000000000002",
"[fdf8:f53b:82e4::53]", "fdf8f53b82e400000000000000000053",
"[fe80::200:5aee:feaa:20a2]", "fe8000000000000002005aeefeaa20a2",
"[2001::1]", "20010000000000000000000000000001",
"[2001:0000:4136:e378:8000:63bf:3fff:fdd2]", "200100004136e378800063bf3ffffdd2",
"0:1:2:3:4:5:6:789a", "0000000100020003000400050006789a",
"0:1:2:3::f", "0000000100020003000000000000000f",
"0:0:0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
"0:0:0:0:0::10.0.0.1", "00000000000000000000ffff0a000001",
"0:0:0:0::10.0.0.1", "00000000000000000000ffff0a000001",
"::0:0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
"0::0:0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
"0:0::0:0:0:10.0.0.1", "00000000000000000000ffff0a000001",
"0:0:0::0:0:10.0.0.1", "00000000000000000000ffff0a000001",
"0:0:0:0::0:10.0.0.1", "00000000000000000000ffff0a000001",
"0:0:0:0:0:ffff:10.0.0.1", "00000000000000000000ffff0a000001",
"::ffff:192.168.0.1", "00000000000000000000ffffc0a80001",
// Test if various interface names after the percent sign are recognized.
"[::1%1]", "00000000000000000000000000000001",
"[::1%eth0]", "00000000000000000000000000000001",
"[::1%%]", "00000000000000000000000000000001",
"0:0:0:0:0:ffff:10.0.0.1%", "00000000000000000000ffff0a000001",
"0:0:0:0:0:ffff:10.0.0.1%1", "00000000000000000000ffff0a000001",
"[0:0:0:0:0:ffff:10.0.0.1%1]", "00000000000000000000ffff0a000001",
"[0:0:0:0:0::10.0.0.1%1]", "00000000000000000000ffff0a000001",
"[::0:0:0:0:ffff:10.0.0.1%1]", "00000000000000000000ffff0a000001",
"::0:0:0:0:ffff:10.0.0.1%1", "00000000000000000000ffff0a000001",
"::1%1", "00000000000000000000000000000001",
"::1%eth0", "00000000000000000000000000000001",
"::1%%", "00000000000000000000000000000001",
// Tests with leading or trailing compression
"0:0:0:0:0:0:0::", "00000000000000000000000000000000",
"0:0:0:0:0:0::", "00000000000000000000000000000000",
"0:0:0:0:0::", "00000000000000000000000000000000",
"0:0:0:0::", "00000000000000000000000000000000",
"0:0:0::", "00000000000000000000000000000000",
"0:0::", "00000000000000000000000000000000",
"0::", "00000000000000000000000000000000",
"::", "00000000000000000000000000000000",
"::0", "00000000000000000000000000000000",
"::0:0", "00000000000000000000000000000000",
"::0:0:0", "00000000000000000000000000000000",
"::0:0:0:0", "00000000000000000000000000000000",
"::0:0:0:0:0", "00000000000000000000000000000000",
"::0:0:0:0:0:0", "00000000000000000000000000000000",
"::0:0:0:0:0:0:0", "00000000000000000000000000000000");
private static final Map<String, String> invalidIpV6Hosts = new TestMap(
// Test method with garbage.
"Obvious Garbage", null,
// Test method with preferred style, too many :
"0:1:2:3:4:5:6:7:8", null,
// Test method with preferred style, not enough :
"0:1:2:3:4:5:6", null,
// Test method with preferred style, bad digits.
"0:1:2:3:4:5:6:x", null,
// Test method with preferred style, adjacent :
"0:1:2:3:4:5:6::7", null,
// Too many : separators trailing
"0:1:2:3:4:5:6:7::", null,
// Too many : separators leading
"::0:1:2:3:4:5:6:7", null,
// Too many : separators trailing
"1:2:3:4:5:6:7:", null,
// Too many : separators leading
":1:2:3:4:5:6:7", null,
// Compression with : separators trailing
"0:1:2:3:4:5::7:", null,
"0:1:2:3:4::7:", null,
"0:1:2:3::7:", null,
"0:1:2::7:", null,
"0:1::7:", null,
"0::7:", null,
// Compression at start with : separators trailing
"::0:1:2:3:4:5:7:", null,
"::0:1:2:3:4:7:", null,
"::0:1:2:3:7:", null,
"::0:1:2:7:", null,
"::0:1:7:", null,
"::7:", null,
// The : separators leading and trailing
":1:2:3:4:5:6:7:", null,
":1:2:3:4:5:6:", null,
":1:2:3:4:5:", null,
":1:2:3:4:", null,
":1:2:3:", null,
":1:2:", null,
":1:", null,
// Compression with : separators leading
":1::2:3:4:5:6:7", null,
":1::3:4:5:6:7", null,
":1::4:5:6:7", null,
":1::5:6:7", null,
":1::6:7", null,
":1::7", null,
":1:2:3:4:5:6::7", null,
":1:3:4:5:6::7", null,
":1:4:5:6::7", null,
":1:5:6::7", null,
":1:6::7", null,
":1::", null,
// Compression trailing with : separators leading
":1:2:3:4:5:6:7::", null,
":1:3:4:5:6:7::", null,
":1:4:5:6:7::", null,
":1:5:6:7::", null,
":1:6:7::", null,
":1:7::", null,
// Double compression
"1::2:3:4:5:6::", null,
"::1:2:3:4:5::6", null,
"::1:2:3:4:5:6::", null,
"::1:2:3:4:5::", null,
"::1:2:3:4::", null,
"::1:2:3::", null,
"::1:2::", null,
"::0::", null,
"12::0::12", null,
// Too many : separators leading 0
"0::1:2:3:4:5:6:7", null,
// Test method with preferred style, too many digits.
"0:1:2:3:4:5:6:789abcdef", null,
// Test method with compressed style, bad digits.
"0:1:2:3::x", null,
// Test method with compressed style, too many adjacent :
"0:1:2:::3", null,
// Test method with compressed style, too many digits.
"0:1:2:3::abcde", null,
// Test method with compressed style, not enough :
"0:1", null,
// Test method with ipv4 style, bad ipv6 digits.
"0:0:0:0:0:x:10.0.0.1", null,
// Test method with ipv4 style, bad ipv4 digits.
"0:0:0:0:0:0:10.0.0.x", null,
// Test method with ipv4 style, too many ipv6 digits.
"0:0:0:0:0:00000:10.0.0.1", null,
// Test method with ipv4 style, too many :
"0:0:0:0:0:0:0:10.0.0.1", null,
// Test method with ipv4 style, not enough :
"0:0:0:0:0:10.0.0.1", null,
// Test method with ipv4 style, too many .
"0:0:0:0:0:0:10.0.0.0.1", null,
// Test method with ipv4 style, not enough .
"0:0:0:0:0:0:10.0.1", null,
// Test method with ipv4 style, adjacent .
"0:0:0:0:0:0:10..0.0.1", null,
// Test method with ipv4 style, leading .
"0:0:0:0:0:0:.0.0.1", null,
// Test method with ipv4 style, leading .
"0:0:0:0:0:0:.10.0.0.1", null,
// Test method with ipv4 style, trailing .
"0:0:0:0:0:0:10.0.0.", null,
// Test method with ipv4 style, trailing .
"0:0:0:0:0:0:10.0.0.1.", null,
// Test method with compressed ipv4 style, bad ipv6 digits.
"::fffx:192.168.0.1", null,
// Test method with compressed ipv4 style, bad ipv4 digits.
"::ffff:192.168.0.x", null,
// Test method with compressed ipv4 style, too many adjacent :
":::ffff:192.168.0.1", null,
// Test method with compressed ipv4 style, too many ipv6 digits.
"::fffff:192.168.0.1", null,
// Test method with compressed ipv4 style, too many ipv4 digits.
"::ffff:1923.168.0.1", null,
// Test method with compressed ipv4 style, not enough :
":ffff:192.168.0.1", null,
// Test method with compressed ipv4 style, too many .
"::ffff:192.168.0.1.2", null,
// Test method with compressed ipv4 style, not enough .
"::ffff:192.168.0", null,
// Test method with compressed ipv4 style, adjacent .
"::ffff:192.168..0.1", null,
// Test method, bad ipv6 digits.
"x:0:0:0:0:0:10.0.0.1", null,
// Test method, bad ipv4 digits.
"0:0:0:0:0:0:x.0.0.1", null,
// Test method, too many ipv6 digits.
"00000:0:0:0:0:0:10.0.0.1", null,
// Test method, too many ipv4 digits.
"0:0:0:0:0:0:10.0.0.1000", null,
// Test method, too many :
"0:0:0:0:0:0:0:10.0.0.1", null,
// Test method, not enough :
"0:0:0:0:0:10.0.0.1", null,
// Test method, out of order trailing :
"0:0:0:0:0:10.0.0.1:", null,
// Test method, out of order leading :
":0:0:0:0:0:10.0.0.1", null,
// Test method, out of order leading :
"0:0:0:0::10.0.0.1:", null,
// Test method, out of order trailing :
":0:0:0:0::10.0.0.1", null,
// Test method, too many .
"0:0:0:0:0:0:10.0.0.0.1", null,
// Test method, not enough .
"0:0:0:0:0:0:10.0.1", null,
// Test method, adjacent .
"0:0:0:0:0:0:10.0.0..1", null,
// Empty contents
"", null,
// Invalid single compression
":", null,
":::", null,
// Trailing : (max number of : = 8)
"2001:0:4136:e378:8000:63bf:3fff:fdd2:", null,
// Leading : (max number of : = 8)
":aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222", null,
// Invalid character
"1234:2345:3456:4567:5678:6789::X890", null,
// Trailing . in IPv4
"::ffff:255.255.255.255.", null,
// To many characters in IPv4
"::ffff:0.0.1111.0", null,
// Test method, adjacent .
"::ffff:0.0..0", null,
// Not enough IPv4 entries trailing .
"::ffff:127.0.0.", null,
// Invalid trailing IPv4 character
"::ffff:127.0.0.a", null,
// Invalid leading IPv4 character
"::ffff:a.0.0.1", null,
// Invalid middle IPv4 character
"::ffff:127.a.0.1", null,
// Invalid middle IPv4 character
"::ffff:127.0.a.1", null,
// Not enough IPv4 entries no trailing .
"::ffff:1.2.4", null,
// Extra IPv4 entry
"::ffff:192.168.0.1.255", null,
// Not enough IPv6 content
":ffff:192.168.0.1.255", null,
// Intermixed IPv4 and IPv6 symbols
"::ffff:255.255:255.255.", null,
// Invalid IPv4 mapped address - invalid ipv4 separator
"0:0:0::0:0:00f.0.0.1", null,
// Invalid IPv4 mapped address - not enough f's
"0:0:0:0:0:fff:1.0.0.1", null,
// Invalid IPv4 mapped address - not IPv4 mapped, not IPv4 compatible
"0:0:0:0:0:ff00:1.0.0.1", null,
// Invalid IPv4 mapped address - not IPv4 mapped, not IPv4 compatible
"0:0:0:0:0:ff:1.0.0.1", null,
// Invalid IPv4 mapped address - too many f's
"0:0:0:0:0:fffff:1.0.0.1", null,
// Invalid IPv4 mapped address - too many bytes (too many 0's)
"0:0:0:0:0:0:ffff:1.0.0.1", null,
// Invalid IPv4 mapped address - too many bytes (too many 0's)
"::0:0:0:0:0:ffff:1.0.0.1", null,
// Invalid IPv4 mapped address - too many bytes (too many 0's)
"0:0:0:0:0:0::1.0.0.1", null,
// Invalid IPv4 mapped address - too many bytes (too many 0's)
"0:0:0:0:0:00000:1.0.0.1", null,
// Invalid IPv4 mapped address - too few bytes (not enough 0's)
"0:0:0:0:ffff:1.0.0.1", null,
// Invalid IPv4 mapped address - too few bytes (not enough 0's)
"ffff:192.168.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"0:0:0:0:0:ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"0:0:0:0:ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"0:0:0:ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"0:0:ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"0:ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - 0's after the mapped ffff indicator
"ffff::10.0.0.1", null,
// Invalid IPv4 mapped address - not all 0's before the mapped separator
"1:0:0:0:0:ffff:10.0.0.1", null,
// Address that is similar to IPv4 mapped, but is invalid
"0:0:0:0:ffff:ffff:1.0.0.1", null,
// Valid number of separators, but invalid IPv4 format
"::1:2:3:4:5:6.7.8.9", null,
// Too many digits
"0:0:0:0:0:0:ffff:10.0.0.1", null,
// Invalid IPv4 format
":1.2.3.4", null,
// Invalid IPv4 format
"::.2.3.4", null,
// Invalid IPv4 format
"::ffff:0.1.2.", null);
private static final Map<byte[], String> ipv6ToAddressStrings = new HashMap<byte[], String>() {
private static final long serialVersionUID = 2999763170377573184L;
{
// From the RFC 5952 http://tools.ietf.org/html/rfc5952#section-4
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 1
},
"2001:db8::1");
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 0, 0, 0,
0, 2, 0, 1
},
"2001:db8::2:1");
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 1,
0, 1, 0, 1,
0, 1, 0, 1
},
"2001:db8:0:1:1:1:1:1");
// Other examples
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 0, 0, 0,
0, 2, 0, 1
},
"2001:db8::2:1");
put(new byte[] {
32, 1, 0, 0,
0, 0, 0, 1,
0, 0, 0, 0,
0, 0, 0, 1
},
"2001:0:0:1::1");
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 1, 0, 0,
0, 0, 0, 1
},
"2001:db8::1:0:0:1");
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 1, 0, 0,
0, 0, 0, 0
},
"2001:db8:0:0:1::");
put(new byte[] {
32, 1, 13, -72,
0, 0, 0, 0,
0, 0, 0, 0,
0, 2, 0, 0
},
"2001:db8::2:0");
put(new byte[] {
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 1
},
"::1");
put(new byte[] {
0, 0, 0, 0,
0, 0, 0, 1,
0, 0, 0, 0,
0, 0, 0, 1
},
"::1:0:0:0:1");
put(new byte[] {
0, 0, 0, 0,
1, 0, 0, 1,
0, 0, 0, 0,
1, 0, 0, 0
},
"::100:1:0:0:100:0");
put(new byte[] {
32, 1, 0, 0,
65, 54, -29, 120,
-128, 0, 99, -65,
63, -1, -3, -46
},
"2001:0:4136:e378:8000:63bf:3fff:fdd2");
put(new byte[] {
-86, -86, -69, -69,
-52, -52, -35, -35,
-18, -18, -1, -1,
17, 17, 34, 34
},
"aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222");
put(new byte[] {
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 0
},
"::");
}
};
private static final Map<String, String> ipv4MappedToIPv6AddressStrings = new TestMap(
// IPv4 addresses
"255.255.255.255", "::ffff:255.255.255.255",
"0.0.0.0", "::ffff:0.0.0.0",
"127.0.0.1", "::ffff:127.0.0.1",
"1.2.3.4", "::ffff:1.2.3.4",
"192.168.0.1", "::ffff:192.168.0.1",
// IPv4 compatible addresses are deprecated [1], so we don't support outputting them, but we do support
// parsing them into IPv4 mapped addresses. These values are treated the same as a plain IPv4 address above.
// [1] https://tools.ietf.org/html/rfc4291#section-2.5.5.1
"0:0:0:0:0:0:255.254.253.252", "::ffff:255.254.253.252",
"0:0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0::0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0::0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:0:0:1.2.3.4", "::ffff:1.2.3.4",
"0::0:0:1.2.3.4", "::ffff:1.2.3.4",
"0:0::0:1.2.3.4", "::ffff:1.2.3.4",
"0:0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:0:1.2.3.4", "::ffff:1.2.3.4",
"0::0:1.2.3.4", "::ffff:1.2.3.4",
"0:0::1.2.3.4", "::ffff:1.2.3.4",
"::0:1.2.3.4", "::ffff:1.2.3.4",
"::1.2.3.4", "::ffff:1.2.3.4",
// IPv4 mapped (fully specified)
"0:0:0:0:0:ffff:1.2.3.4", "::ffff:1.2.3.4",
// IPv6 addresses
// Fully specified
"2001:0:4136:e378:8000:63bf:3fff:fdd2", "2001:0:4136:e378:8000:63bf:3fff:fdd2",
"aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222", "aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222",
"0:0:0:0:0:0:0:0", "::",
"0:0:0:0:0:0:0:1", "::1",
// Compressing at the beginning
"::1:0:0:0:1", "::1:0:0:0:1",
"::1:ffff:ffff", "::1:ffff:ffff",
"::", "::",
"::1", "::1",
"::ffff", "::ffff",
"::ffff:0", "::ffff:0",
"::ffff:ffff", "::ffff:ffff",
"::0987:9876:8765", "::987:9876:8765",
"::0987:9876:8765:7654", "::987:9876:8765:7654",
"::0987:9876:8765:7654:6543", "::987:9876:8765:7654:6543",
"::0987:9876:8765:7654:6543:5432", "::987:9876:8765:7654:6543:5432",
// Note the compression is removed (rfc 5952 section 4.2.2)
"::0987:9876:8765:7654:6543:5432:3210", "0:987:9876:8765:7654:6543:5432:3210",
// Compressing at the end
// Note the compression is removed (rfc 5952 section 4.2.2)
"2001:db8:abcd:bcde:cdef:def1:ef12::", "2001:db8:abcd:bcde:cdef:def1:ef12:0",
"2001:db8:abcd:bcde:cdef:def1::", "2001:db8:abcd:bcde:cdef:def1::",
"2001:db8:abcd:bcde:cdef::", "2001:db8:abcd:bcde:cdef::",
"2001:db8:abcd:bcde::", "2001:db8:abcd:bcde::",
"2001:db8:abcd::", "2001:db8:abcd::",
"2001:1234::", "2001:1234::",
"2001::", "2001::",
"0::", "::",
// Compressing in the middle
"1234:2345::7890", "1234:2345::7890",
"1234::2345:7890", "1234::2345:7890",
"1234:2345:3456::7890", "1234:2345:3456::7890",
"1234:2345::3456:7890", "1234:2345::3456:7890",
"1234::2345:3456:7890", "1234::2345:3456:7890",
"1234:2345:3456:4567::7890", "1234:2345:3456:4567::7890",
"1234:2345:3456::4567:7890", "1234:2345:3456::4567:7890",
"1234:2345::3456:4567:7890", "1234:2345::3456:4567:7890",
"1234::2345:3456:4567:7890", "1234::2345:3456:4567:7890",
"1234:2345:3456:4567:5678::7890", "1234:2345:3456:4567:5678::7890",
"1234:2345:3456:4567::5678:7890", "1234:2345:3456:4567::5678:7890",
"1234:2345:3456::4567:5678:7890", "1234:2345:3456::4567:5678:7890",
"1234:2345::3456:4567:5678:7890", "1234:2345::3456:4567:5678:7890",
"1234::2345:3456:4567:5678:7890", "1234::2345:3456:4567:5678:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234:2345:3456:4567:5678:6789::7890", "1234:2345:3456:4567:5678:6789:0:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234:2345:3456:4567:5678::6789:7890", "1234:2345:3456:4567:5678:0:6789:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234:2345:3456:4567::5678:6789:7890", "1234:2345:3456:4567:0:5678:6789:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234:2345:3456::4567:5678:6789:7890", "1234:2345:3456:0:4567:5678:6789:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234:2345::3456:4567:5678:6789:7890", "1234:2345:0:3456:4567:5678:6789:7890",
// Note the compression is removed (rfc 5952 section 4.2.2)
"1234::2345:3456:4567:5678:6789:7890", "1234:0:2345:3456:4567:5678:6789:7890",
// IPv4 mapped addresses
"::ffff:255.255.255.255", "::ffff:255.255.255.255",
"::ffff:0.0.0.0", "::ffff:0.0.0.0",
"::ffff:127.0.0.1", "::ffff:127.0.0.1",
"::ffff:1.2.3.4", "::ffff:1.2.3.4",
"::ffff:192.168.0.1", "::ffff:192.168.0.1");
@Test
public void testLocalhost() {
assertNotNull(LOCALHOST);
}
@Test
public void testLoopback() {
assertNotNull(LOOPBACK_IF);
}
@Test
public void testIsValidIpV4Address() {
for (String host : validIpV4Hosts.keySet()) {
assertTrue(host, isValidIpV4Address(host));
}
for (String host : invalidIpV4Hosts.keySet()) {
assertFalse(host, isValidIpV4Address(host));
}
}
@Test
public void testIsValidIpV6Address() {
for (String host : validIpV6Hosts.keySet()) {
assertTrue(host, isValidIpV6Address(host));
if (host.charAt(0) != '[' && !host.contains("%")) {
assertNotNull(host, getByName(host, true));
String hostMod = '[' + host + ']';
assertTrue(hostMod, isValidIpV6Address(hostMod));
hostMod = host + '%';
assertTrue(hostMod, isValidIpV6Address(hostMod));
hostMod = host + "%eth1";
assertTrue(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "%]";
assertTrue(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "%1]";
assertTrue(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "]%";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "]%1";
assertFalse(hostMod, isValidIpV6Address(hostMod));
}
}
for (String host : invalidIpV6Hosts.keySet()) {
assertFalse(host, isValidIpV6Address(host));
assertNull(host, getByName(host));
String hostMod = '[' + host + ']';
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = host + '%';
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = host + "%eth1";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "%]";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "%1]";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "]%";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host + "]%1";
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = host + ']';
assertFalse(hostMod, isValidIpV6Address(hostMod));
hostMod = '[' + host;
assertFalse(hostMod, isValidIpV6Address(hostMod));
}
}
@Test
public void testCreateByteArrayFromIpAddressString() {
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
String ip = e.getKey();
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
}
for (Entry<String, String> e : invalidIpV4Hosts.entrySet()) {
String ip = e.getKey();
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
}
for (Entry<String, String> e : validIpV6Hosts.entrySet()) {
String ip = e.getKey();
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
}
for (Entry<String, String> e : invalidIpV6Hosts.entrySet()) {
String ip = e.getKey();
assertHexDumpEquals(e.getValue(), createByteArrayFromIpAddressString(ip), ip);
}
}
@Test
public void testBytesToIpAddress() throws UnknownHostException {
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
assertEquals(e.getKey(), bytesToIpAddress(createByteArrayFromIpAddressString(e.getKey())));
assertEquals(e.getKey(), bytesToIpAddress(validIpV4ToBytes(e.getKey())));
}
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
assertEquals(testEntry.getValue(), bytesToIpAddress(testEntry.getKey()));
}
}
@Test
public void testIp6AddressToString() throws UnknownHostException {
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
assertEquals(testEntry.getValue(), toAddressString(InetAddress.getByAddress(testEntry.getKey())));
}
}
@Test
public void testIp4AddressToString() throws UnknownHostException {
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
assertEquals(e.getKey(), toAddressString(InetAddress.getByAddress(unhex(e.getValue()))));
}
}
@Test
public void testIpv4MappedIp6GetByName() {
for (Entry<String, String> testEntry : ipv4MappedToIPv6AddressStrings.entrySet()) {
String srcIp = testEntry.getKey();
String dstIp = testEntry.getValue();
Inet6Address inet6Address = getByName(srcIp, true);
assertNotNull(srcIp + ", " + dstIp, inet6Address);
assertEquals(srcIp, dstIp, toAddressString(inet6Address, true));
}
}
@Test
public void testInvalidIpv4MappedIp6GetByName() {
for (String host : invalidIpV4Hosts.keySet()) {
assertNull(host, getByName(host, true));
}
for (String host : invalidIpV6Hosts.keySet()) {
assertNull(host, getByName(host, true));
}
}
@Test
public void testIp6InetSocketAddressToString() throws UnknownHostException {
for (Entry<byte[], String> testEntry : ipv6ToAddressStrings.entrySet()) {
assertEquals('[' + testEntry.getValue() + "]:9999",
toSocketAddressString(new InetSocketAddress(InetAddress.getByAddress(testEntry.getKey()), 9999)));
}
}
@Test
public void testIp4SocketAddressToString() throws UnknownHostException {
for (Entry<String, String> e : validIpV4Hosts.entrySet()) {
assertEquals(e.getKey() + ":9999",
toSocketAddressString(new InetSocketAddress(InetAddress.getByAddress(unhex(e.getValue())), 9999)));
}
}
private static void assertHexDumpEquals(String expected, byte[] actual, String message) {
assertEquals(message, expected, hex(actual));
}
private static String hex(byte[] value) {
if (value == null) {
return null;
}
StringBuilder buf = new StringBuilder(value.length << 1);
for (byte b: value) {
String hex = StringUtil.byteToHexString(b);
if (hex.length() == 1) {
buf.append('0');
}
buf.append(hex);
}
return buf.toString();
}
private static byte[] unhex(String value) {
return value != null ? StringUtil.decodeHexDump(value) : null;
}
}