mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
d152888722
Changes included: - Allow index specification at link creation time - replace syscall with golang.org/x/sys/unix - related: Use IFF_MULTI_QUEUE from x/sys/unix to define TUNTAP_MULTI_QUEUE - related: Use IFLA_* constants from x/sys/unix - Fix index out of range when no metadata for gretap - added encapsulation attributes for Iptun and Sittun to support SIT tunnels - Expose xfrm state's statistics - Support invert in ip rules - Support LWTUNNEL_ENCAP_SEG6 - Support setting and retrieving route MTU/AdvMSS - Fix CalcRtable array parameter bug - added support for Foo-over-UDP netlink calls - Support num{tx,rx}queues and udp6zerocsum{tx,rx} - tuntap: Add multiqueue support - Retrieve VLAN ID when listing neighbour - Fix LinkAdd for sit tunnel on 3.10 kernel - Add support for managing source MACVLANs - Two functions: one for adding bond slave, one for getting veth peer index - Eliminate cgo from netlink - Don't overwrite the XDP file descriptor with flags - Fix reference to BPF instructions (on Kernel 4.13) - Add Matchall filter - Send IFA_CACHEINFO when setting up addresses - Support IPv6 GRE Tun and Tap - Add List option to RouteSubscribeWithOptions, AddrSubscribeWithOptions, and LinkSubscribeWithOptions - Add Fq and Fq_Codel Qdisc support Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
177 lines
3.8 KiB
Go
177 lines
3.8 KiB
Go
package overlay
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
"syscall"
|
|
"testing"
|
|
"time"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"github.com/docker/docker/pkg/plugingetter"
|
|
"github.com/docker/libkv/store/consul"
|
|
"github.com/docker/libnetwork/datastore"
|
|
"github.com/docker/libnetwork/discoverapi"
|
|
"github.com/docker/libnetwork/driverapi"
|
|
"github.com/docker/libnetwork/netlabel"
|
|
_ "github.com/docker/libnetwork/testutils"
|
|
"github.com/vishvananda/netlink/nl"
|
|
)
|
|
|
|
func init() {
|
|
consul.Register()
|
|
}
|
|
|
|
type driverTester struct {
|
|
t *testing.T
|
|
d *driver
|
|
}
|
|
|
|
const testNetworkType = "overlay"
|
|
|
|
func setupDriver(t *testing.T) *driverTester {
|
|
dt := &driverTester{t: t}
|
|
config := make(map[string]interface{})
|
|
config[netlabel.GlobalKVClient] = discoverapi.DatastoreConfigData{
|
|
Scope: datastore.GlobalScope,
|
|
Provider: "consul",
|
|
Address: "127.0.0.01:8500",
|
|
}
|
|
|
|
if err := Init(dt, config); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
iface, err := net.InterfaceByName("eth0")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
addrs, err := iface.Addrs()
|
|
if err != nil || len(addrs) == 0 {
|
|
t.Fatal(err)
|
|
}
|
|
data := discoverapi.NodeDiscoveryData{
|
|
Address: addrs[0].String(),
|
|
Self: true,
|
|
}
|
|
dt.d.DiscoverNew(discoverapi.NodeDiscovery, data)
|
|
return dt
|
|
}
|
|
|
|
func cleanupDriver(t *testing.T, dt *driverTester) {
|
|
ch := make(chan struct{})
|
|
go func() {
|
|
Fini(dt.d)
|
|
close(ch)
|
|
}()
|
|
|
|
select {
|
|
case <-ch:
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatal("test timed out because Fini() did not return on time")
|
|
}
|
|
}
|
|
|
|
func (dt *driverTester) GetPluginGetter() plugingetter.PluginGetter {
|
|
return nil
|
|
}
|
|
|
|
func (dt *driverTester) RegisterDriver(name string, drv driverapi.Driver,
|
|
cap driverapi.Capability) error {
|
|
if name != testNetworkType {
|
|
dt.t.Fatalf("Expected driver register name to be %q. Instead got %q",
|
|
testNetworkType, name)
|
|
}
|
|
|
|
if _, ok := drv.(*driver); !ok {
|
|
dt.t.Fatalf("Expected driver type to be %T. Instead got %T",
|
|
&driver{}, drv)
|
|
}
|
|
|
|
dt.d = drv.(*driver)
|
|
return nil
|
|
}
|
|
|
|
func TestOverlayInit(t *testing.T) {
|
|
if err := Init(&driverTester{t: t}, nil); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestOverlayFiniWithoutConfig(t *testing.T) {
|
|
dt := &driverTester{t: t}
|
|
if err := Init(dt, nil); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
cleanupDriver(t, dt)
|
|
}
|
|
|
|
func TestOverlayConfig(t *testing.T) {
|
|
dt := setupDriver(t)
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
d := dt.d
|
|
if d.notifyCh == nil {
|
|
t.Fatal("Driver notify channel wasn't initialized after Config method")
|
|
}
|
|
|
|
if d.exitCh == nil {
|
|
t.Fatal("Driver serfloop exit channel wasn't initialized after Config method")
|
|
}
|
|
|
|
if d.serfInstance == nil {
|
|
t.Fatal("Driver serfinstance hasn't been initialized after Config method")
|
|
}
|
|
|
|
cleanupDriver(t, dt)
|
|
}
|
|
|
|
func TestOverlayType(t *testing.T) {
|
|
dt := &driverTester{t: t}
|
|
if err := Init(dt, nil); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if dt.d.Type() != testNetworkType {
|
|
t.Fatalf("Expected Type() to return %q. Instead got %q", testNetworkType,
|
|
dt.d.Type())
|
|
}
|
|
}
|
|
|
|
// Test that the netlink socket close unblock the watchMiss to avoid deadlock
|
|
func TestNetlinkSocket(t *testing.T) {
|
|
// This is the same code used by the overlay driver to create the netlink interface
|
|
// for the watch miss
|
|
nlSock, err := nl.Subscribe(syscall.NETLINK_ROUTE, syscall.RTNLGRP_NEIGH)
|
|
if err != nil {
|
|
t.Fatal()
|
|
}
|
|
// set the receive timeout to not remain stuck on the RecvFrom if the fd gets closed
|
|
tv := unix.NsecToTimeval(soTimeout.Nanoseconds())
|
|
err = nlSock.SetReceiveTimeout(&tv)
|
|
if err != nil {
|
|
t.Fatal()
|
|
}
|
|
n := &network{id: "testnetid"}
|
|
ch := make(chan error)
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
defer cancel()
|
|
go func() {
|
|
n.watchMiss(nlSock, fmt.Sprintf("/proc/%d/task/%d/ns/net", os.Getpid(), syscall.Gettid()))
|
|
ch <- nil
|
|
}()
|
|
time.Sleep(5 * time.Second)
|
|
nlSock.Close()
|
|
select {
|
|
case <-ch:
|
|
case <-ctx.Done():
|
|
{
|
|
t.Fatalf("Timeout expired")
|
|
}
|
|
}
|
|
}
|