Bitcoin Core 30.99.0
P2P Digital Currency
netbase_tests.cpp
Go to the documentation of this file.
1// Copyright (c) 2012-present The Bitcoin Core developers
2// Distributed under the MIT software license, see the accompanying
3// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5#include <compat/compat.h>
6#include <net_permissions.h>
7#include <netaddress.h>
8#include <netbase.h>
9#include <netgroup.h>
10#include <protocol.h>
11#include <serialize.h>
12#include <streams.h>
14#include <util/strencodings.h>
15#include <util/translation.h>
16
17#include <string>
18#include <numeric>
19
20#include <boost/test/unit_test.hpp>
21
22using namespace std::literals;
23using namespace util::hex_literals;
24
26
27static CNetAddr ResolveIP(const std::string& ip)
28{
29 return LookupHost(ip, false).value_or(CNetAddr{});
30}
31
32static CNetAddr CreateInternal(const std::string& host)
33{
34 CNetAddr addr;
35 addr.SetInternal(host);
36 return addr;
37}
38
39BOOST_AUTO_TEST_CASE(netbase_networks)
40{
41 BOOST_CHECK(ResolveIP("127.0.0.1").GetNetwork() == NET_UNROUTABLE);
42 BOOST_CHECK(ResolveIP("::1").GetNetwork() == NET_UNROUTABLE);
43 BOOST_CHECK(ResolveIP("8.8.8.8").GetNetwork() == NET_IPV4);
44 BOOST_CHECK(ResolveIP("2001::8888").GetNetwork() == NET_IPV6);
45 BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").GetNetwork() == NET_ONION);
46 BOOST_CHECK(CreateInternal("foo.com").GetNetwork() == NET_INTERNAL);
47}
48
49BOOST_AUTO_TEST_CASE(netbase_properties)
50{
51
52 BOOST_CHECK(ResolveIP("127.0.0.1").IsIPv4());
53 BOOST_CHECK(ResolveIP("::FFFF:192.168.1.1").IsIPv4());
54 BOOST_CHECK(ResolveIP("::1").IsIPv6());
55 BOOST_CHECK(ResolveIP("10.0.0.1").IsRFC1918());
56 BOOST_CHECK(ResolveIP("192.168.1.1").IsRFC1918());
57 BOOST_CHECK(ResolveIP("172.31.255.255").IsRFC1918());
58 BOOST_CHECK(ResolveIP("198.18.0.0").IsRFC2544());
59 BOOST_CHECK(ResolveIP("198.19.255.255").IsRFC2544());
60 BOOST_CHECK(ResolveIP("2001:0DB8::").IsRFC3849());
61 BOOST_CHECK(ResolveIP("169.254.1.1").IsRFC3927());
62 BOOST_CHECK(ResolveIP("2002::1").IsRFC3964());
63 BOOST_CHECK(ResolveIP("FC00::").IsRFC4193());
64 BOOST_CHECK(ResolveIP("2001::2").IsRFC4380());
65 BOOST_CHECK(ResolveIP("2001:10::").IsRFC4843());
66 BOOST_CHECK(ResolveIP("2001:20::").IsRFC7343());
67 BOOST_CHECK(ResolveIP("FE80::").IsRFC4862());
68 BOOST_CHECK(ResolveIP("64:FF9B::").IsRFC6052());
69 BOOST_CHECK(ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion").IsTor());
70 BOOST_CHECK(ResolveIP("127.0.0.1").IsLocal());
72 BOOST_CHECK(ResolveIP("8.8.8.8").IsRoutable());
73 BOOST_CHECK(ResolveIP("2001::1").IsRoutable());
74 BOOST_CHECK(ResolveIP("127.0.0.1").IsValid());
75 BOOST_CHECK(CreateInternal("FD6B:88C0:8724:edb1:8e4:3588:e546:35ca").IsInternal());
76 BOOST_CHECK(CreateInternal("bar.com").IsInternal());
77
78}
79
80bool static TestSplitHost(const std::string& test, const std::string& host, uint16_t port, bool validPort=true)
81{
82 std::string hostOut;
83 uint16_t portOut{0};
84 bool validPortOut = SplitHostPort(test, portOut, hostOut);
85 return hostOut == host && portOut == port && validPortOut == validPort;
86}
87
88BOOST_AUTO_TEST_CASE(netbase_splithost)
89{
90 BOOST_CHECK(TestSplitHost("www.bitcoincore.org", "www.bitcoincore.org", 0));
91 BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]", "www.bitcoincore.org", 0));
92 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:80", "www.bitcoincore.org", 80));
93 BOOST_CHECK(TestSplitHost("[www.bitcoincore.org]:80", "www.bitcoincore.org", 80));
94 BOOST_CHECK(TestSplitHost("127.0.0.1", "127.0.0.1", 0));
95 BOOST_CHECK(TestSplitHost("127.0.0.1:8333", "127.0.0.1", 8333));
96 BOOST_CHECK(TestSplitHost("[127.0.0.1]", "127.0.0.1", 0));
97 BOOST_CHECK(TestSplitHost("[127.0.0.1]:8333", "127.0.0.1", 8333));
98 BOOST_CHECK(TestSplitHost("::ffff:127.0.0.1", "::ffff:127.0.0.1", 0));
99 BOOST_CHECK(TestSplitHost("[::ffff:127.0.0.1]:8333", "::ffff:127.0.0.1", 8333));
100 BOOST_CHECK(TestSplitHost("[::]:8333", "::", 8333));
101 BOOST_CHECK(TestSplitHost("::8333", "::8333", 0));
102 BOOST_CHECK(TestSplitHost(":8333", "", 8333));
103 BOOST_CHECK(TestSplitHost("[]:8333", "", 8333));
104 BOOST_CHECK(TestSplitHost("", "", 0));
105 BOOST_CHECK(TestSplitHost(":65535", "", 65535));
106 BOOST_CHECK(TestSplitHost(":65536", ":65536", 0, false));
107 BOOST_CHECK(TestSplitHost(":-1", ":-1", 0, false));
108 BOOST_CHECK(TestSplitHost("[]:70001", "[]:70001", 0, false));
109 BOOST_CHECK(TestSplitHost("[]:-1", "[]:-1", 0, false));
110 BOOST_CHECK(TestSplitHost("[]:-0", "[]:-0", 0, false));
111 BOOST_CHECK(TestSplitHost("[]:0", "", 0, false));
112 BOOST_CHECK(TestSplitHost("[]:1/2", "[]:1/2", 0, false));
113 BOOST_CHECK(TestSplitHost("[]:1E2", "[]:1E2", 0, false));
114 BOOST_CHECK(TestSplitHost("127.0.0.1:65536", "127.0.0.1:65536", 0, false));
115 BOOST_CHECK(TestSplitHost("127.0.0.1:0", "127.0.0.1", 0, false));
116 BOOST_CHECK(TestSplitHost("127.0.0.1:", "127.0.0.1:", 0, false));
117 BOOST_CHECK(TestSplitHost("127.0.0.1:1/2", "127.0.0.1:1/2", 0, false));
118 BOOST_CHECK(TestSplitHost("127.0.0.1:1E2", "127.0.0.1:1E2", 0, false));
119 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:65536", "www.bitcoincore.org:65536", 0, false));
120 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:0", "www.bitcoincore.org", 0, false));
121 BOOST_CHECK(TestSplitHost("www.bitcoincore.org:", "www.bitcoincore.org:", 0, false));
122}
123
124bool static TestParse(std::string src, std::string canon)
125{
126 CService addr(LookupNumeric(src, 65535));
127 return canon == addr.ToStringAddrPort();
128}
129
130BOOST_AUTO_TEST_CASE(netbase_lookupnumeric)
131{
132 BOOST_CHECK(TestParse("127.0.0.1", "127.0.0.1:65535"));
133 BOOST_CHECK(TestParse("127.0.0.1:8333", "127.0.0.1:8333"));
134 BOOST_CHECK(TestParse("::ffff:127.0.0.1", "127.0.0.1:65535"));
135 BOOST_CHECK(TestParse("::", "[::]:65535"));
136 BOOST_CHECK(TestParse("[::]:8333", "[::]:8333"));
137 BOOST_CHECK(TestParse("[127.0.0.1]", "127.0.0.1:65535"));
138 BOOST_CHECK(TestParse(":::", "[::]:0"));
139
140 // verify that an internal address fails to resolve
141 BOOST_CHECK(TestParse("[fd6b:88c0:8724:1:2:3:4:5]", "[::]:0"));
142 // and that a one-off resolves correctly
143 BOOST_CHECK(TestParse("[fd6c:88c0:8724:1:2:3:4:5]", "[fd6c:88c0:8724:1:2:3:4:5]:65535"));
144}
145
147{
148 CNetAddr addr1(ResolveIP("1.2.3.4"));
149 CNetAddr addr2(ResolveIP("::FFFF:0102:0304"));
150 BOOST_CHECK(addr2.IsIPv4());
151 BOOST_CHECK_EQUAL(addr1.ToStringAddr(), addr2.ToStringAddr());
152}
153
155{
156 BOOST_CHECK(LookupSubNet("1.2.3.0/24") == LookupSubNet("1.2.3.0/255.255.255.0"));
157 BOOST_CHECK(LookupSubNet("1.2.3.0/24") != LookupSubNet("1.2.4.0/255.255.255.0"));
158 BOOST_CHECK(LookupSubNet("1.2.3.0/24").Match(ResolveIP("1.2.3.4")));
159 BOOST_CHECK(!LookupSubNet("1.2.2.0/24").Match(ResolveIP("1.2.3.4")));
160 BOOST_CHECK(LookupSubNet("1.2.3.4").Match(ResolveIP("1.2.3.4")));
161 BOOST_CHECK(LookupSubNet("1.2.3.4/32").Match(ResolveIP("1.2.3.4")));
162 BOOST_CHECK(!LookupSubNet("1.2.3.4").Match(ResolveIP("5.6.7.8")));
163 BOOST_CHECK(!LookupSubNet("1.2.3.4/32").Match(ResolveIP("5.6.7.8")));
164 BOOST_CHECK(LookupSubNet("::ffff:127.0.0.1").Match(ResolveIP("127.0.0.1")));
165 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:8")));
166 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8").Match(ResolveIP("1:2:3:4:5:6:7:9")));
167 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:0/112").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
168 BOOST_CHECK(LookupSubNet("192.168.0.1/24").Match(ResolveIP("192.168.0.2")));
169 BOOST_CHECK(LookupSubNet("192.168.0.20/29").Match(ResolveIP("192.168.0.18")));
170 BOOST_CHECK(LookupSubNet("1.2.2.1/24").Match(ResolveIP("1.2.2.4")));
171 BOOST_CHECK(LookupSubNet("1.2.2.110/31").Match(ResolveIP("1.2.2.111")));
172 BOOST_CHECK(LookupSubNet("1.2.2.20/26").Match(ResolveIP("1.2.2.63")));
173 // All-Matching IPv6 Matches arbitrary IPv6
174 BOOST_CHECK(LookupSubNet("::/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
175 // But not `::` or `0.0.0.0` because they are considered invalid addresses
176 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("::")));
177 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("0.0.0.0")));
178 // Addresses from one network (IPv4) don't belong to subnets of another network (IPv6)
179 BOOST_CHECK(!LookupSubNet("::/0").Match(ResolveIP("1.2.3.4")));
180 // All-Matching IPv4 does not Match IPv6
181 BOOST_CHECK(!LookupSubNet("0.0.0.0/0").Match(ResolveIP("1:2:3:4:5:6:7:1234")));
182 // Invalid subnets Match nothing (not even invalid addresses)
183 BOOST_CHECK(!CSubNet().Match(ResolveIP("1.2.3.4")));
184 BOOST_CHECK(!LookupSubNet("").Match(ResolveIP("4.5.6.7")));
185 BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("0.0.0.0")));
186 BOOST_CHECK(!LookupSubNet("bloop").Match(ResolveIP("hab")));
187 // Check valid/invalid
188 BOOST_CHECK(LookupSubNet("1.2.3.0/0").IsValid());
189 BOOST_CHECK(!LookupSubNet("1.2.3.0/-1").IsValid());
190 BOOST_CHECK(!LookupSubNet("1.2.3.0/+24").IsValid());
191 BOOST_CHECK(LookupSubNet("1.2.3.0/32").IsValid());
192 BOOST_CHECK(!LookupSubNet("1.2.3.0/33").IsValid());
193 BOOST_CHECK(!LookupSubNet("1.2.3.0/300").IsValid());
194 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/0").IsValid());
195 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/33").IsValid());
196 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/-1").IsValid());
197 BOOST_CHECK(LookupSubNet("1:2:3:4:5:6:7:8/128").IsValid());
198 BOOST_CHECK(!LookupSubNet("1:2:3:4:5:6:7:8/129").IsValid());
199 BOOST_CHECK(!LookupSubNet("fuzzy").IsValid());
200
201 //CNetAddr constructor test
202 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).IsValid());
203 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.1")));
204 BOOST_CHECK(!CSubNet(ResolveIP("127.0.0.1")).Match(ResolveIP("127.0.0.2")));
205 BOOST_CHECK(CSubNet(ResolveIP("127.0.0.1")).ToString() == "127.0.0.1/32");
206
207 CSubNet subnet = CSubNet(ResolveIP("1.2.3.4"), 32);
208 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
209 subnet = CSubNet(ResolveIP("1.2.3.4"), 8);
210 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
211 subnet = CSubNet(ResolveIP("1.2.3.4"), 0);
212 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
213
214 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.255.255.255"));
215 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
216 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("255.0.0.0"));
217 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
218 subnet = CSubNet(ResolveIP("1.2.3.4"), ResolveIP("0.0.0.0"));
219 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
220
221 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).IsValid());
222 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:8")));
223 BOOST_CHECK(!CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).Match(ResolveIP("1:2:3:4:5:6:7:9")));
224 BOOST_CHECK(CSubNet(ResolveIP("1:2:3:4:5:6:7:8")).ToString() == "1:2:3:4:5:6:7:8/128");
225 // IPv4 address with IPv6 netmask or the other way around.
226 BOOST_CHECK(!CSubNet(ResolveIP("1.1.1.1"), ResolveIP("ffff::")).IsValid());
227 BOOST_CHECK(!CSubNet(ResolveIP("::1"), ResolveIP("255.0.0.0")).IsValid());
228
229 // Create Non-IP subnets.
230
231 const CNetAddr tor_addr{
232 ResolveIP("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion")};
233
234 subnet = CSubNet(tor_addr);
235 BOOST_CHECK(subnet.IsValid());
236 BOOST_CHECK_EQUAL(subnet.ToString(), tor_addr.ToStringAddr());
237 BOOST_CHECK(subnet.Match(tor_addr));
239 !subnet.Match(ResolveIP("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion")));
240 BOOST_CHECK(!subnet.Match(ResolveIP("1.2.3.4")));
241
242 BOOST_CHECK(!CSubNet(tor_addr, 200).IsValid());
243 BOOST_CHECK(!CSubNet(tor_addr, ResolveIP("255.0.0.0")).IsValid());
244
245 subnet = LookupSubNet("1.2.3.4/255.255.255.255");
246 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/32");
247 subnet = LookupSubNet("1.2.3.4/255.255.255.254");
248 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/31");
249 subnet = LookupSubNet("1.2.3.4/255.255.255.252");
250 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.4/30");
251 subnet = LookupSubNet("1.2.3.4/255.255.255.248");
252 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/29");
253 subnet = LookupSubNet("1.2.3.4/255.255.255.240");
254 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/28");
255 subnet = LookupSubNet("1.2.3.4/255.255.255.224");
256 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/27");
257 subnet = LookupSubNet("1.2.3.4/255.255.255.192");
258 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/26");
259 subnet = LookupSubNet("1.2.3.4/255.255.255.128");
260 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/25");
261 subnet = LookupSubNet("1.2.3.4/255.255.255.0");
262 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.3.0/24");
263 subnet = LookupSubNet("1.2.3.4/255.255.254.0");
264 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.2.0/23");
265 subnet = LookupSubNet("1.2.3.4/255.255.252.0");
266 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/22");
267 subnet = LookupSubNet("1.2.3.4/255.255.248.0");
268 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/21");
269 subnet = LookupSubNet("1.2.3.4/255.255.240.0");
270 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/20");
271 subnet = LookupSubNet("1.2.3.4/255.255.224.0");
272 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/19");
273 subnet = LookupSubNet("1.2.3.4/255.255.192.0");
274 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/18");
275 subnet = LookupSubNet("1.2.3.4/255.255.128.0");
276 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/17");
277 subnet = LookupSubNet("1.2.3.4/255.255.0.0");
278 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/16");
279 subnet = LookupSubNet("1.2.3.4/255.254.0.0");
280 BOOST_CHECK_EQUAL(subnet.ToString(), "1.2.0.0/15");
281 subnet = LookupSubNet("1.2.3.4/255.252.0.0");
282 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/14");
283 subnet = LookupSubNet("1.2.3.4/255.248.0.0");
284 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/13");
285 subnet = LookupSubNet("1.2.3.4/255.240.0.0");
286 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/12");
287 subnet = LookupSubNet("1.2.3.4/255.224.0.0");
288 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/11");
289 subnet = LookupSubNet("1.2.3.4/255.192.0.0");
290 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/10");
291 subnet = LookupSubNet("1.2.3.4/255.128.0.0");
292 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/9");
293 subnet = LookupSubNet("1.2.3.4/255.0.0.0");
294 BOOST_CHECK_EQUAL(subnet.ToString(), "1.0.0.0/8");
295 subnet = LookupSubNet("1.2.3.4/254.0.0.0");
296 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/7");
297 subnet = LookupSubNet("1.2.3.4/252.0.0.0");
298 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/6");
299 subnet = LookupSubNet("1.2.3.4/248.0.0.0");
300 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/5");
301 subnet = LookupSubNet("1.2.3.4/240.0.0.0");
302 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/4");
303 subnet = LookupSubNet("1.2.3.4/224.0.0.0");
304 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/3");
305 subnet = LookupSubNet("1.2.3.4/192.0.0.0");
306 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/2");
307 subnet = LookupSubNet("1.2.3.4/128.0.0.0");
308 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/1");
309 subnet = LookupSubNet("1.2.3.4/0.0.0.0");
310 BOOST_CHECK_EQUAL(subnet.ToString(), "0.0.0.0/0");
311
312 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
313 BOOST_CHECK_EQUAL(subnet.ToString(), "1:2:3:4:5:6:7:8/128");
314 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:0000:0000:0000:0000:0000:0000:0000");
315 BOOST_CHECK_EQUAL(subnet.ToString(), "1::/16");
316 subnet = LookupSubNet("1:2:3:4:5:6:7:8/0000:0000:0000:0000:0000:0000:0000:0000");
317 BOOST_CHECK_EQUAL(subnet.ToString(), "::/0");
318 // Invalid netmasks (with 1-bits after 0-bits)
319 subnet = LookupSubNet("1.2.3.4/255.255.232.0");
320 BOOST_CHECK(!subnet.IsValid());
321 subnet = LookupSubNet("1.2.3.4/255.0.255.255");
322 BOOST_CHECK(!subnet.IsValid());
323 subnet = LookupSubNet("1:2:3:4:5:6:7:8/ffff:ffff:ffff:fffe:ffff:ffff:ffff:ff0f");
324 BOOST_CHECK(!subnet.IsValid());
325}
326
327BOOST_AUTO_TEST_CASE(netbase_getgroup)
328{
329 NetGroupManager netgroupman{std::vector<bool>()}; // use /16
330 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("127.0.0.1")) == std::vector<unsigned char>({0})); // Local -> !Routable()
331 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("257.0.0.1")) == std::vector<unsigned char>({0})); // !Valid -> !Routable()
332 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("10.0.0.1")) == std::vector<unsigned char>({0})); // RFC1918 -> !Routable()
333 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("169.254.1.1")) == std::vector<unsigned char>({0})); // RFC3927 -> !Routable()
334 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("1.2.3.4")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // IPv4
335 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("::FFFF:0:102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6145
336 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("64:FF9B::102:304")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC6052
337 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2002:102:304:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC3964
338 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:0:9999:9999:9999:9999:FEFD:FCFB")) == std::vector<unsigned char>({(unsigned char)NET_IPV4, 1, 2})); // RFC4380
339 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:470:abcd:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 4, 112, 175})); //he.net
340 BOOST_CHECK(netgroupman.GetGroup(ResolveIP("2001:2001:9999:9999:9999:9999:9999:9999")) == std::vector<unsigned char>({(unsigned char)NET_IPV6, 32, 1, 32, 1})); //IPv6
341
342 // baz.net sha256 hash: 12929400eb4607c4ac075f087167e75286b179c693eb059a01774b864e8fe505
343 std::vector<unsigned char> internal_group = {NET_INTERNAL, 0x12, 0x92, 0x94, 0x00, 0xeb, 0x46, 0x07, 0xc4, 0xac, 0x07};
344 BOOST_CHECK(netgroupman.GetGroup(CreateInternal("baz.net")) == internal_group);
345}
346
347BOOST_AUTO_TEST_CASE(netbase_parsenetwork)
348{
353
358
359 // "tor" as a network specification was deprecated in 60dc8e4208 in favor of
360 // "onion" and later removed.
363
368}
369
370BOOST_AUTO_TEST_CASE(netpermissions_test)
371{
372 bilingual_str error;
373 NetWhitebindPermissions whitebindPermissions;
374 NetWhitelistPermissions whitelistPermissions;
375 ConnectionDirection connection_direction;
376
377 // Detect invalid white bind
378 BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
379 BOOST_CHECK(error.original.find("Cannot resolve -whitebind address") != std::string::npos);
380 BOOST_CHECK(!NetWhitebindPermissions::TryParse("127.0.0.1", whitebindPermissions, error));
381 BOOST_CHECK(error.original.find("Need to specify a port with -whitebind") != std::string::npos);
382 BOOST_CHECK(!NetWhitebindPermissions::TryParse("", whitebindPermissions, error));
383
384 // If no permission flags, assume backward compatibility
385 BOOST_CHECK(NetWhitebindPermissions::TryParse("1.2.3.4:32", whitebindPermissions, error));
386 BOOST_CHECK(error.empty());
394
395 // Can set one permission
396 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom@1.2.3.4:32", whitebindPermissions, error));
398 BOOST_CHECK(NetWhitebindPermissions::TryParse("@1.2.3.4:32", whitebindPermissions, error));
400
401 NetWhitebindPermissions noban, noban_download, download_noban, download;
402
403 // "noban" implies "download"
404 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban@1.2.3.4:32", noban, error));
408
409 // "noban,download" is equivalent to "noban"
410 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("noban,download@1.2.3.4:32", noban_download, error));
411 BOOST_CHECK_EQUAL(noban_download.m_flags, noban.m_flags);
412
413 // "download,noban" is equivalent to "noban"
414 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download,noban@1.2.3.4:32", download_noban, error));
415 BOOST_CHECK_EQUAL(download_noban.m_flags, noban.m_flags);
416
417 // "download" excludes (does not imply) "noban"
418 BOOST_REQUIRE(NetWhitebindPermissions::TryParse("download@1.2.3.4:32", download, error));
422
423 // Happy path, can parse flags
424 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay@1.2.3.4:32", whitebindPermissions, error));
425 // forcerelay should also activate the relay permission
427 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban@1.2.3.4:32", whitebindPermissions, error));
429 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitebindPermissions, error));
430 BOOST_CHECK(NetWhitebindPermissions::TryParse("all@1.2.3.4:32", whitebindPermissions, error));
432
433 // Allow dups
434 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,noban,noban@1.2.3.4:32", whitebindPermissions, error));
436
437 // Allow empty
438 BOOST_CHECK(NetWhitebindPermissions::TryParse("bloom,relay,,noban@1.2.3.4:32", whitebindPermissions, error));
440 BOOST_CHECK(NetWhitebindPermissions::TryParse(",@1.2.3.4:32", whitebindPermissions, error));
442 BOOST_CHECK(NetWhitebindPermissions::TryParse(",,@1.2.3.4:32", whitebindPermissions, error));
444
445 BOOST_CHECK(!NetWhitebindPermissions::TryParse("out,forcerelay@1.2.3.4:32", whitebindPermissions, error));
446 BOOST_CHECK(error.original.find("whitebind may only be used for incoming connections (\"out\" was passed)") != std::string::npos);
447
448 // Detect invalid flag
449 BOOST_CHECK(!NetWhitebindPermissions::TryParse("bloom,forcerelay,oopsie@1.2.3.4:32", whitebindPermissions, error));
450 BOOST_CHECK(error.original.find("Invalid P2P permission") != std::string::npos);
451
452 // Check netmask error
453 BOOST_CHECK(!NetWhitelistPermissions::TryParse("bloom,forcerelay,noban@1.2.3.4:32", whitelistPermissions, connection_direction, error));
454 BOOST_CHECK(error.original.find("Invalid netmask specified in -whitelist") != std::string::npos);
455
456 // Happy path for whitelist parsing
457 BOOST_CHECK(NetWhitelistPermissions::TryParse("noban@1.2.3.4", whitelistPermissions, connection_direction, error));
460
461 BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay@1.2.3.4/32", whitelistPermissions, connection_direction, error));
463 BOOST_CHECK(error.empty());
464 BOOST_CHECK_EQUAL(whitelistPermissions.m_subnet.ToString(), "1.2.3.4/32");
465 BOOST_CHECK(NetWhitelistPermissions::TryParse("bloom,forcerelay,noban,relay,mempool@1.2.3.4/32", whitelistPermissions, connection_direction, error));
466 BOOST_CHECK(NetWhitelistPermissions::TryParse("in,relay@1.2.3.4", whitelistPermissions, connection_direction, error));
467 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::In);
468 BOOST_CHECK(NetWhitelistPermissions::TryParse("out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
469 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Out);
470 BOOST_CHECK(NetWhitelistPermissions::TryParse("in,out,bloom@1.2.3.4", whitelistPermissions, connection_direction, error));
471 BOOST_CHECK_EQUAL(connection_direction, ConnectionDirection::Both);
472
474 BOOST_CHECK_EQUAL(strings.size(), 7U);
475 BOOST_CHECK(std::find(strings.begin(), strings.end(), "bloomfilter") != strings.end());
476 BOOST_CHECK(std::find(strings.begin(), strings.end(), "forcerelay") != strings.end());
477 BOOST_CHECK(std::find(strings.begin(), strings.end(), "relay") != strings.end());
478 BOOST_CHECK(std::find(strings.begin(), strings.end(), "noban") != strings.end());
479 BOOST_CHECK(std::find(strings.begin(), strings.end(), "mempool") != strings.end());
480 BOOST_CHECK(std::find(strings.begin(), strings.end(), "download") != strings.end());
481 BOOST_CHECK(std::find(strings.begin(), strings.end(), "addr") != strings.end());
482}
483
484BOOST_AUTO_TEST_CASE(netbase_dont_resolve_strings_with_embedded_nul_characters)
485{
486 BOOST_CHECK(LookupHost("127.0.0.1"s, false).has_value());
487 BOOST_CHECK(!LookupHost("127.0.0.1\0"s, false).has_value());
488 BOOST_CHECK(!LookupHost("127.0.0.1\0example.com"s, false).has_value());
489 BOOST_CHECK(!LookupHost("127.0.0.1\0example.com\0"s, false).has_value());
490
491 BOOST_CHECK(LookupSubNet("1.2.3.0/24"s).IsValid());
492 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0"s).IsValid());
493 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com"s).IsValid());
494 BOOST_CHECK(!LookupSubNet("1.2.3.0/24\0example.com\0"s).IsValid());
495 BOOST_CHECK(LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"s).IsValid());
496 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0"s).IsValid());
497 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com"s).IsValid());
498 BOOST_CHECK(!LookupSubNet("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion\0example.com\0"s).IsValid());
499}
500
501// Since CNetAddr (un)ser is tested separately in net_tests.cpp here we only
502// try a few edge cases for port, service flags and time.
503
504static const std::vector<CAddress> fixture_addresses({
505 CAddress{
506 CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0 /* port */),
507 NODE_NONE,
508 NodeSeconds{0x4966bc61s}, /* Fri Jan 9 02:54:25 UTC 2009 */
509 },
510 CAddress{
511 CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0x00f1 /* port */),
513 NodeSeconds{0x83766279s}, /* Tue Nov 22 11:22:33 UTC 2039 */
514 },
515 CAddress{
516 CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0xf1f2 /* port */),
518 NodeSeconds{0xffffffffs}, /* Sun Feb 7 06:28:15 UTC 2106 */
519 },
520});
521
522// fixture_addresses should equal to this when serialized in V1 format.
523// When this is unserialized from V1 format it should equal to fixture_addresses.
524static constexpr const char* stream_addrv1_hex =
525 "03" // number of entries
526
527 "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009
528 "0000000000000000" // service flags, NODE_NONE
529 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv4 embedded in IPv6)
530 "0000" // port
531
532 "79627683" // time, Tue Nov 22 11:22:33 UTC 2039
533 "0100000000000000" // service flags, NODE_NETWORK
534 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
535 "00f1" // port
536
537 "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106
538 "4804000000000000" // service flags, NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED
539 "00000000000000000000000000000001" // address, fixed 16 bytes (IPv6)
540 "f1f2"; // port
541
542// fixture_addresses should equal to this when serialized in V2 format.
543// When this is unserialized from V2 format it should equal to fixture_addresses.
544static constexpr const char* stream_addrv2_hex =
545 "03" // number of entries
546
547 "61bc6649" // time, Fri Jan 9 02:54:25 UTC 2009
548 "00" // service flags, COMPACTSIZE(NODE_NONE)
549 "02" // network id, IPv6
550 "10" // address length, COMPACTSIZE(16)
551 "00000000000000000000000000000001" // address
552 "0000" // port
553
554 "79627683" // time, Tue Nov 22 11:22:33 UTC 2039
555 "01" // service flags, COMPACTSIZE(NODE_NETWORK)
556 "02" // network id, IPv6
557 "10" // address length, COMPACTSIZE(16)
558 "00000000000000000000000000000001" // address
559 "00f1" // port
560
561 "ffffffff" // time, Sun Feb 7 06:28:15 UTC 2106
562 "fd4804" // service flags, COMPACTSIZE(NODE_WITNESS | NODE_COMPACT_FILTERS | NODE_NETWORK_LIMITED)
563 "02" // network id, IPv6
564 "10" // address length, COMPACTSIZE(16)
565 "00000000000000000000000000000001" // address
566 "f1f2"; // port
567
568BOOST_AUTO_TEST_CASE(caddress_serialize_v1)
569{
570 DataStream s{};
571
574}
575
576BOOST_AUTO_TEST_CASE(caddress_unserialize_v1)
577{
579 std::vector<CAddress> addresses_unserialized;
580
581 s >> CAddress::V1_NETWORK(addresses_unserialized);
582 BOOST_CHECK(fixture_addresses == addresses_unserialized);
583}
584
585BOOST_AUTO_TEST_CASE(caddress_serialize_v2)
586{
587 DataStream s{};
588
591}
592
593BOOST_AUTO_TEST_CASE(caddress_unserialize_v2)
594{
596 std::vector<CAddress> addresses_unserialized;
597
598 s >> CAddress::V2_NETWORK(addresses_unserialized);
599 BOOST_CHECK(fixture_addresses == addresses_unserialized);
600}
601
603{
606 BOOST_CHECK(IsBadPort(6000));
607
609 BOOST_CHECK(!IsBadPort(443));
610 BOOST_CHECK(!IsBadPort(8333));
611
612 // Check all possible ports and ensure we only flag the expected amount as bad
613 std::list<int> ports(std::numeric_limits<uint16_t>::max());
614 std::iota(ports.begin(), ports.end(), 1);
615 BOOST_CHECK_EQUAL(std::ranges::count_if(ports, IsBadPort), 85);
616}
617
618
619BOOST_AUTO_TEST_CASE(asmap_test_vectors)
620{
621 // Randomly generated encoded ASMap with 128 ranges, up to 20-bit AS numbers.
622 constexpr auto ASMAP_DATA{
623 "fd38d50f7d5d665357f64bba6bfc190d6078a7e68e5d3ac032edf47f8b5755f87881bfd3633d9aa7c1fa279b3"
624 "6fe26c63bbc9de44e0f04e5a382d8e1cddbe1c26653bc939d4327f287e8b4d1f8aff33176787cb0ff7cb28e3f"
625 "daef0f8f47357f801c9f7ff7a99f7f9c9f99de7f3156ae00f23eb27a303bc486aa3ccc31ec19394c2f8a53ddd"
626 "ea3cc56257f3b7e9b1f488be9c1137db823759aa4e071eef2e984aaf97b52d5f88d0f373dd190fe45e06efef1"
627 "df7278be680a73a74c76db4dd910f1d30752c57fe2bc9f079f1a1e1b036c2a69219f11c5e11980a3fa51f4f82"
628 "d36373de73b1863a8c27e36ae0e4f705be3d76ecff038a75bc0f92ba7e7f6f4080f1c47c34d095367ecf4406c"
629 "1e3bbc17ba4d6f79ea3f031b876799ac268b1e0ea9babf0f9a8e5f6c55e363c6363df46afc696d7afceaf49b6"
630 "e62df9e9dc27e70664cafe5c53df66dd0b8237678ada90e73f05ec60e6f6e96c3cbb1ea2f9dece115d5bdba10"
631 "33e53662a7d72a29477b5beb35710591d3e23e5f0379baea62ffdee535bcdf879cbf69b88d7ea37c8015381cf"
632 "63dc33d28f757a4a5e15d6a08"_hex};
633
634 // Convert to std::vector<bool> format that the ASMap interpreter uses.
635 std::vector<bool> asmap_bits;
636 asmap_bits.reserve(ASMAP_DATA.size() * 8);
637 for (auto byte : ASMAP_DATA) {
638 for (int bit = 0; bit < 8; ++bit) {
639 asmap_bits.push_back((std::to_integer<uint8_t>(byte) >> bit) & 1);
640 }
641 }
642
643 // Construct NetGroupManager with this data.
644 NetGroupManager netgroup{std::move(asmap_bits)};
645 BOOST_CHECK(netgroup.UsingASMap());
646
647 // Check some randomly-generated IPv6 addresses in it (biased towards the very beginning and
648 // very end of the 128-bit range).
649 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("0:1559:183:3728:224c:65a5:62e6:e991", false)), 961340);
650 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("d0:d493:faa0:8609:e927:8b75:293c:f5a4", false)), 961340);
651 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("2a0:26f:8b2c:2ee7:c7d1:3b24:4705:3f7f", false)), 693761);
652 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("a77:7cd4:4be5:a449:89f2:3212:78c6:ee38", false)), 0);
653 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1336:1ad6:2f26:4fe3:d809:7321:6e0d:4615", false)), 672176);
654 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("1d56:abd0:a52f:a8d5:d5a7:a610:581d:d792", false)), 499880);
655 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("378e:7290:54e5:bd36:4760:971c:e9b9:570d", false)), 0);
656 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("406c:820b:272a:c045:b74e:fc0a:9ef2:cecc", false)), 248495);
657 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("46c2:ae07:9d08:2d56:d473:2bc7:57e3:20ac", false)), 248495);
658 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("50d2:3db6:52fa:2e7:12ec:5bc4:1bd1:49f9", false)), 124471);
659 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("53e1:1812:ffa:dccf:f9f2:64be:75fa:795", false)), 539993);
660 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("544d:eeba:3990:35d1:ad66:f9a3:576d:8617", false)), 374443);
661 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("6a53:40dc:8f1d:3ffa:efeb:3aa3:df88:b94b", false)), 435070);
662 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("87aa:d1c9:9edb:91e7:aab1:9eb9:baa0:de18", false)), 244121);
663 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("9f00:48fa:88e3:4b67:a6f3:e6d2:5cc1:5be2", false)), 862116);
664 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("c49f:9cc6:86ad:ba08:4580:315e:dbd1:8a62", false)), 969411);
665 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("dff5:8021:61d:b17d:406d:7888:fdac:4a20", false)), 969411);
666 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("e888:6791:2960:d723:bcfd:47e1:2d8c:599f", false)), 824019);
667 BOOST_CHECK_EQUAL(netgroup.GetMappedAS(*LookupHost("ffff:d499:8c4b:4941:bc81:d5b9:b51e:85a8", false)), 824019);
668}
669
A CService with information about it as peer.
Definition: protocol.h:367
static constexpr SerParams V1_NETWORK
Definition: protocol.h:408
static constexpr SerParams V2_NETWORK
Definition: protocol.h:409
Network address.
Definition: netaddress.h:113
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
Definition: netaddress.cpp:173
A combination of a network address (CNetAddr) and a (TCP) port.
Definition: netaddress.h:530
std::string ToStringAddrPort() const
Definition: netaddress.cpp:903
std::string ToString() const
bool IsValid() const
bool Match(const CNetAddr &addr) const
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:130
Netgroup manager.
Definition: netgroup.h:16
NetPermissionFlags m_flags
static void AddFlag(NetPermissionFlags &flags, NetPermissionFlags f)
static void ClearFlag(NetPermissionFlags &flags, NetPermissionFlags f)
ClearFlag is only called with f == NetPermissionFlags::Implicit.
static std::vector< std::string > ToStrings(NetPermissionFlags flags)
static bool HasFlag(NetPermissionFlags flags, NetPermissionFlags f)
static bool TryParse(const std::string &str, NetWhitebindPermissions &output, bilingual_str &error)
static bool TryParse(const std::string &str, NetWhitelistPermissions &output, ConnectionDirection &output_connection_direction, bilingual_str &error)
#define COMPAT_IN6ADDR_LOOPBACK_INIT
Definition: compat.h:50
BOOST_FIXTURE_TEST_SUITE(cuckoocache_tests, BasicTestingSetup)
Test Suite for CuckooCache.
BOOST_AUTO_TEST_SUITE_END()
static CService ip(uint32_t i)
std::string HexStr(const std::span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
Definition: hex_base.cpp:30
static const std::string addr1
Definition: key_tests.cpp:30
static const std::string addr2
Definition: key_tests.cpp:31
""_hex is a compile-time user-defined literal returning a std::array<std::byte>, equivalent to ParseH...
Definition: strencodings.h:400
std::string ToString(const T &t)
Locale-independent version of std::to_string.
Definition: string.h:246
bool IsLocal(const CService &addr)
check whether a given address is potentially local
Definition: net.cpp:329
@ NET_CJDNS
CJDNS.
Definition: netaddress.h:50
@ NET_ONION
TOR (v2 or v3)
Definition: netaddress.h:44
@ NET_IPV6
IPv6.
Definition: netaddress.h:41
@ NET_IPV4
IPv4.
Definition: netaddress.h:38
@ NET_UNROUTABLE
Addresses from these networks are not publicly routable on the global Internet.
Definition: netaddress.h:35
@ NET_INTERNAL
A set of addresses that represent the hash of a string or FQDN.
Definition: netaddress.h:54
CSubNet LookupSubNet(const std::string &subnet_str)
Parse and resolve a specified subnet string into the appropriate internal representation.
Definition: netbase.cpp:812
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
Definition: netbase.cpp:173
enum Network ParseNetwork(const std::string &net_in)
Definition: netbase.cpp:100
CService LookupNumeric(const std::string &name, uint16_t portDefault, DNSLookupFn dns_lookup_function)
Resolve a service string with a numeric IP to its first corresponding service.
Definition: netbase.cpp:216
bool IsBadPort(uint16_t port)
Determine if a port is "bad" from the perspective of attempting to connect to a node on that port.
Definition: netbase.cpp:847
ConnectionDirection
Definition: netbase.h:33
static constexpr const char * stream_addrv1_hex
static constexpr const char * stream_addrv2_hex
static bool TestParse(std::string src, std::string canon)
static bool TestSplitHost(const std::string &test, const std::string &host, uint16_t port, bool validPort=true)
BOOST_AUTO_TEST_CASE(netbase_networks)
static const std::vector< CAddress > fixture_addresses({ CAddress{ CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0), NODE_NONE, NodeSeconds{0x4966bc61s}, }, CAddress{ CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0x00f1), NODE_NETWORK, NodeSeconds{0x83766279s}, }, CAddress{ CService(CNetAddr(in6_addr(COMPAT_IN6ADDR_LOOPBACK_INIT)), 0xf1f2), static_cast< ServiceFlags >(NODE_WITNESS|NODE_COMPACT_FILTERS|NODE_NETWORK_LIMITED), NodeSeconds{0xffffffffs}, }, })
static CNetAddr CreateInternal(const std::string &host)
static CNetAddr ResolveIP(const std::string &ip)
#define BOOST_CHECK_EQUAL(v1, v2)
Definition: object.cpp:18
#define BOOST_CHECK(expr)
Definition: object.cpp:17
ServiceFlags
nServices flags
Definition: protocol.h:309
@ NODE_NONE
Definition: protocol.h:312
@ NODE_WITNESS
Definition: protocol.h:320
@ NODE_NETWORK_LIMITED
Definition: protocol.h:327
@ NODE_NETWORK
Definition: protocol.h:315
@ NODE_COMPACT_FILTERS
Definition: protocol.h:323
std::vector< Byte > ParseHex(std::string_view hex_str)
Like TryParseHex, but returns an empty vector on invalid input.
Definition: strencodings.h:69
Basic testing setup.
Definition: setup_common.h:64
Bilingual messages:
Definition: translation.h:24
bool empty() const
Definition: translation.h:35
std::string original
Definition: translation.h:25
bool SplitHostPort(std::string_view in, uint16_t &portOut, std::string &hostOut)
Splits socket address string into host string and port value.
std::chrono::time_point< NodeClock, std::chrono::seconds > NodeSeconds
Definition: time.h:25