|
|
@@ -126,34 +126,37 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w1, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
- hostnames: []string{"b", "c"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"b", "c"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -172,34 +175,37 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w2, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
- hostnames: []string{"b", "c"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"b", "c"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -218,34 +224,37 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: DefaultKiloSubnet,
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["a"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
- hostnames: []string{"b", "c"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: logicalLocationPrefix + nodes["b"].Location,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet, nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"b", "c"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP, nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -264,44 +273,48 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w1, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
- hostnames: []string{"b"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
+ hostnames: []string{"b"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["c"].Endpoint,
|
|
|
- key: nodes["c"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
- hostnames: []string{"c"},
|
|
|
- privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["c"].Endpoint,
|
|
|
+ key: nodes["c"].Key,
|
|
|
+ persistentKeepalive: nodes["c"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"c"},
|
|
|
+ privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w4,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w4,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -320,44 +333,48 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w2, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
- hostnames: []string{"b"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
+ hostnames: []string{"b"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["c"].Endpoint,
|
|
|
- key: nodes["c"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
- hostnames: []string{"c"},
|
|
|
- privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["c"].Endpoint,
|
|
|
+ key: nodes["c"].Key,
|
|
|
+ persistentKeepalive: nodes["c"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"c"},
|
|
|
+ privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w4,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w4,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -376,44 +393,48 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w3, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
- hostnames: []string{"b"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
+ hostnames: []string{"b"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["c"].Endpoint,
|
|
|
- key: nodes["c"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
- hostnames: []string{"c"},
|
|
|
- privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["c"].Endpoint,
|
|
|
+ key: nodes["c"].Key,
|
|
|
+ persistentKeepalive: nodes["c"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"c"},
|
|
|
+ privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w4,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w4,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|
|
|
@@ -432,44 +453,48 @@ func TestNewTopology(t *testing.T) {
|
|
|
wireGuardCIDR: &net.IPNet{IP: w4, Mask: net.CIDRMask(16, 32)},
|
|
|
segments: []*segment{
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["a"].Endpoint,
|
|
|
- key: nodes["a"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
- hostnames: []string{"a"},
|
|
|
- privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
- wireGuardIP: w1,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["a"].Subnet, nodes["a"].InternalIP, {IP: w1, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["a"].Endpoint,
|
|
|
+ key: nodes["a"].Key,
|
|
|
+ persistentKeepalive: nodes["a"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["a"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["a"].Subnet},
|
|
|
+ hostnames: []string{"a"},
|
|
|
+ privateIPs: []net.IP{nodes["a"].InternalIP.IP},
|
|
|
+ wireGuardIP: w1,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["b"].Endpoint,
|
|
|
- key: nodes["b"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
- hostnames: []string{"b"},
|
|
|
- privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
- wireGuardIP: w2,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["b"].Subnet, nodes["b"].InternalIP, {IP: w2, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["b"].Endpoint,
|
|
|
+ key: nodes["b"].Key,
|
|
|
+ persistentKeepalive: nodes["b"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["b"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["b"].Subnet},
|
|
|
+ hostnames: []string{"b"},
|
|
|
+ privateIPs: []net.IP{nodes["b"].InternalIP.IP},
|
|
|
+ wireGuardIP: w2,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["c"].Endpoint,
|
|
|
- key: nodes["c"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
- hostnames: []string{"c"},
|
|
|
- privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
- wireGuardIP: w3,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["c"].Subnet, nodes["c"].InternalIP, {IP: w3, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["c"].Endpoint,
|
|
|
+ key: nodes["c"].Key,
|
|
|
+ persistentKeepalive: nodes["c"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["c"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["c"].Subnet},
|
|
|
+ hostnames: []string{"c"},
|
|
|
+ privateIPs: []net.IP{nodes["c"].InternalIP.IP},
|
|
|
+ wireGuardIP: w3,
|
|
|
},
|
|
|
{
|
|
|
- allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
- endpoint: nodes["d"].Endpoint,
|
|
|
- key: nodes["d"].Key,
|
|
|
- location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
- cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
- hostnames: []string{"d"},
|
|
|
- privateIPs: nil,
|
|
|
- wireGuardIP: w4,
|
|
|
+ allowedIPs: []*net.IPNet{nodes["d"].Subnet, {IP: w4, Mask: net.CIDRMask(32, 32)}},
|
|
|
+ endpoint: nodes["d"].Endpoint,
|
|
|
+ key: nodes["d"].Key,
|
|
|
+ persistentKeepalive: nodes["d"].PersistentKeepalive,
|
|
|
+ location: nodeLocationPrefix + nodes["d"].Name,
|
|
|
+ cidrs: []*net.IPNet{nodes["d"].Subnet},
|
|
|
+ hostnames: []string{"d"},
|
|
|
+ privateIPs: nil,
|
|
|
+ wireGuardIP: w4,
|
|
|
},
|
|
|
},
|
|
|
peers: []*Peer{peers["a"], peers["b"]},
|