mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
d152888722
Changes included: - Allow index specification at link creation time - replace syscall with golang.org/x/sys/unix - related: Use IFF_MULTI_QUEUE from x/sys/unix to define TUNTAP_MULTI_QUEUE - related: Use IFLA_* constants from x/sys/unix - Fix index out of range when no metadata for gretap - added encapsulation attributes for Iptun and Sittun to support SIT tunnels - Expose xfrm state's statistics - Support invert in ip rules - Support LWTUNNEL_ENCAP_SEG6 - Support setting and retrieving route MTU/AdvMSS - Fix CalcRtable array parameter bug - added support for Foo-over-UDP netlink calls - Support num{tx,rx}queues and udp6zerocsum{tx,rx} - tuntap: Add multiqueue support - Retrieve VLAN ID when listing neighbour - Fix LinkAdd for sit tunnel on 3.10 kernel - Add support for managing source MACVLANs - Two functions: one for adding bond slave, one for getting veth peer index - Eliminate cgo from netlink - Don't overwrite the XDP file descriptor with flags - Fix reference to BPF instructions (on Kernel 4.13) - Add Matchall filter - Send IFA_CACHEINFO when setting up addresses - Support IPv6 GRE Tun and Tap - Add List option to RouteSubscribeWithOptions, AddrSubscribeWithOptions, and LinkSubscribeWithOptions - Add Fq and Fq_Codel Qdisc support Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
375 lines
8.3 KiB
Go
375 lines
8.3 KiB
Go
// +build linux
|
|
|
|
package ipvs
|
|
|
|
import (
|
|
"net"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/docker/libnetwork/testutils"
|
|
"github.com/vishvananda/netlink"
|
|
"github.com/vishvananda/netlink/nl"
|
|
"golang.org/x/sys/unix"
|
|
"gotest.tools/assert"
|
|
is "gotest.tools/assert/cmp"
|
|
)
|
|
|
|
var (
|
|
schedMethods = []string{
|
|
RoundRobin,
|
|
LeastConnection,
|
|
DestinationHashing,
|
|
SourceHashing,
|
|
}
|
|
|
|
protocols = []string{
|
|
"TCP",
|
|
"UDP",
|
|
"FWM",
|
|
}
|
|
|
|
fwdMethods = []uint32{
|
|
ConnectionFlagMasq,
|
|
ConnectionFlagTunnel,
|
|
ConnectionFlagDirectRoute,
|
|
}
|
|
|
|
fwdMethodStrings = []string{
|
|
"Masq",
|
|
"Tunnel",
|
|
"Route",
|
|
}
|
|
)
|
|
|
|
func lookupFwMethod(fwMethod uint32) string {
|
|
|
|
switch fwMethod {
|
|
case ConnectionFlagMasq:
|
|
return fwdMethodStrings[0]
|
|
case ConnectionFlagTunnel:
|
|
return fwdMethodStrings[1]
|
|
case ConnectionFlagDirectRoute:
|
|
return fwdMethodStrings[2]
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func checkDestination(t *testing.T, i *Handle, s *Service, d *Destination, checkPresent bool) {
|
|
var dstFound bool
|
|
|
|
dstArray, err := i.GetDestinations(s)
|
|
assert.NilError(t, err)
|
|
|
|
for _, dst := range dstArray {
|
|
if dst.Address.Equal(d.Address) && dst.Port == d.Port && lookupFwMethod(dst.ConnectionFlags) == lookupFwMethod(d.ConnectionFlags) {
|
|
dstFound = true
|
|
break
|
|
}
|
|
}
|
|
|
|
switch checkPresent {
|
|
case true: //The test expects the service to be present
|
|
if !dstFound {
|
|
|
|
t.Fatalf("Did not find the service %s in ipvs output", d.Address.String())
|
|
}
|
|
case false: //The test expects that the service should not be present
|
|
if dstFound {
|
|
t.Fatalf("Did not find the destination %s fwdMethod %s in ipvs output", d.Address.String(), lookupFwMethod(d.ConnectionFlags))
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func checkService(t *testing.T, i *Handle, s *Service, checkPresent bool) {
|
|
|
|
svcArray, err := i.GetServices()
|
|
assert.NilError(t, err)
|
|
|
|
var svcFound bool
|
|
|
|
for _, svc := range svcArray {
|
|
|
|
if svc.Protocol == s.Protocol && svc.Address.String() == s.Address.String() && svc.Port == s.Port {
|
|
svcFound = true
|
|
break
|
|
}
|
|
}
|
|
|
|
switch checkPresent {
|
|
case true: //The test expects the service to be present
|
|
if !svcFound {
|
|
|
|
t.Fatalf("Did not find the service %s in ipvs output", s.Address.String())
|
|
}
|
|
case false: //The test expects that the service should not be present
|
|
if svcFound {
|
|
t.Fatalf("Did not expect the service %s in ipvs output", s.Address.String())
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func TestGetFamily(t *testing.T) {
|
|
if testutils.RunningOnCircleCI() {
|
|
t.Skip("Skipping as not supported on CIRCLE CI kernel")
|
|
}
|
|
|
|
id, err := getIPVSFamily()
|
|
assert.NilError(t, err)
|
|
assert.Check(t, 0 != id)
|
|
}
|
|
|
|
func TestService(t *testing.T) {
|
|
if testutils.RunningOnCircleCI() {
|
|
t.Skip("Skipping as not supported on CIRCLE CI kernel")
|
|
}
|
|
|
|
defer testutils.SetupTestOSContext(t)()
|
|
|
|
i, err := New("")
|
|
assert.NilError(t, err)
|
|
|
|
for _, protocol := range protocols {
|
|
for _, schedMethod := range schedMethods {
|
|
|
|
s := Service{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
SchedName: schedMethod,
|
|
}
|
|
|
|
switch protocol {
|
|
case "FWM":
|
|
s.FWMark = 1234
|
|
case "TCP":
|
|
s.Protocol = unix.IPPROTO_TCP
|
|
s.Port = 80
|
|
s.Address = net.ParseIP("1.2.3.4")
|
|
s.Netmask = 0xFFFFFFFF
|
|
case "UDP":
|
|
s.Protocol = unix.IPPROTO_UDP
|
|
s.Port = 53
|
|
s.Address = net.ParseIP("2.3.4.5")
|
|
}
|
|
|
|
err := i.NewService(&s)
|
|
assert.NilError(t, err)
|
|
checkService(t, i, &s, true)
|
|
for _, updateSchedMethod := range schedMethods {
|
|
if updateSchedMethod == schedMethod {
|
|
continue
|
|
}
|
|
|
|
s.SchedName = updateSchedMethod
|
|
err = i.UpdateService(&s)
|
|
assert.NilError(t, err)
|
|
checkService(t, i, &s, true)
|
|
|
|
scopy, err := i.GetService(&s)
|
|
assert.NilError(t, err)
|
|
assert.Check(t, is.Equal((*scopy).Address.String(), s.Address.String()))
|
|
assert.Check(t, is.Equal((*scopy).Port, s.Port))
|
|
assert.Check(t, is.Equal((*scopy).Protocol, s.Protocol))
|
|
}
|
|
|
|
err = i.DelService(&s)
|
|
assert.NilError(t, err)
|
|
checkService(t, i, &s, false)
|
|
}
|
|
}
|
|
|
|
svcs := []Service{
|
|
{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
SchedName: RoundRobin,
|
|
Protocol: unix.IPPROTO_TCP,
|
|
Port: 80,
|
|
Address: net.ParseIP("10.20.30.40"),
|
|
Netmask: 0xFFFFFFFF,
|
|
},
|
|
{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
SchedName: LeastConnection,
|
|
Protocol: unix.IPPROTO_UDP,
|
|
Port: 8080,
|
|
Address: net.ParseIP("10.20.30.41"),
|
|
Netmask: 0xFFFFFFFF,
|
|
},
|
|
}
|
|
// Create services for testing flush
|
|
for _, svc := range svcs {
|
|
if !i.IsServicePresent(&svc) {
|
|
err = i.NewService(&svc)
|
|
assert.NilError(t, err)
|
|
checkService(t, i, &svc, true)
|
|
} else {
|
|
t.Errorf("svc: %v exists", svc)
|
|
}
|
|
}
|
|
err = i.Flush()
|
|
assert.NilError(t, err)
|
|
got, err := i.GetServices()
|
|
assert.NilError(t, err)
|
|
if len(got) != 0 {
|
|
t.Errorf("Unexpected services after flush")
|
|
}
|
|
}
|
|
|
|
func createDummyInterface(t *testing.T) {
|
|
if testutils.RunningOnCircleCI() {
|
|
t.Skip("Skipping as not supported on CIRCLE CI kernel")
|
|
}
|
|
|
|
dummy := &netlink.Dummy{
|
|
LinkAttrs: netlink.LinkAttrs{
|
|
Name: "dummy",
|
|
},
|
|
}
|
|
|
|
err := netlink.LinkAdd(dummy)
|
|
assert.NilError(t, err)
|
|
|
|
dummyLink, err := netlink.LinkByName("dummy")
|
|
assert.NilError(t, err)
|
|
|
|
ip, ipNet, err := net.ParseCIDR("10.1.1.1/24")
|
|
assert.NilError(t, err)
|
|
|
|
ipNet.IP = ip
|
|
|
|
ipAddr := &netlink.Addr{IPNet: ipNet, Label: ""}
|
|
err = netlink.AddrAdd(dummyLink, ipAddr)
|
|
assert.NilError(t, err)
|
|
}
|
|
|
|
func TestDestination(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
|
|
createDummyInterface(t)
|
|
i, err := New("")
|
|
assert.NilError(t, err)
|
|
|
|
for _, protocol := range protocols {
|
|
|
|
s := Service{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
SchedName: RoundRobin,
|
|
}
|
|
|
|
switch protocol {
|
|
case "FWM":
|
|
s.FWMark = 1234
|
|
case "TCP":
|
|
s.Protocol = unix.IPPROTO_TCP
|
|
s.Port = 80
|
|
s.Address = net.ParseIP("1.2.3.4")
|
|
s.Netmask = 0xFFFFFFFF
|
|
case "UDP":
|
|
s.Protocol = unix.IPPROTO_UDP
|
|
s.Port = 53
|
|
s.Address = net.ParseIP("2.3.4.5")
|
|
}
|
|
|
|
err := i.NewService(&s)
|
|
assert.NilError(t, err)
|
|
checkService(t, i, &s, true)
|
|
|
|
s.SchedName = ""
|
|
for _, fwdMethod := range fwdMethods {
|
|
d1 := Destination{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
Address: net.ParseIP("10.1.1.2"),
|
|
Port: 5000,
|
|
Weight: 1,
|
|
ConnectionFlags: fwdMethod,
|
|
}
|
|
|
|
err := i.NewDestination(&s, &d1)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d1, true)
|
|
d2 := Destination{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
Address: net.ParseIP("10.1.1.3"),
|
|
Port: 5000,
|
|
Weight: 1,
|
|
ConnectionFlags: fwdMethod,
|
|
}
|
|
|
|
err = i.NewDestination(&s, &d2)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d2, true)
|
|
|
|
d3 := Destination{
|
|
AddressFamily: nl.FAMILY_V4,
|
|
Address: net.ParseIP("10.1.1.4"),
|
|
Port: 5000,
|
|
Weight: 1,
|
|
ConnectionFlags: fwdMethod,
|
|
}
|
|
|
|
err = i.NewDestination(&s, &d3)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d3, true)
|
|
|
|
for _, updateFwdMethod := range fwdMethods {
|
|
if updateFwdMethod == fwdMethod {
|
|
continue
|
|
}
|
|
d1.ConnectionFlags = updateFwdMethod
|
|
err = i.UpdateDestination(&s, &d1)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d1, true)
|
|
|
|
d2.ConnectionFlags = updateFwdMethod
|
|
err = i.UpdateDestination(&s, &d2)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d2, true)
|
|
|
|
d3.ConnectionFlags = updateFwdMethod
|
|
err = i.UpdateDestination(&s, &d3)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d3, true)
|
|
}
|
|
|
|
err = i.DelDestination(&s, &d1)
|
|
assert.NilError(t, err)
|
|
err = i.DelDestination(&s, &d2)
|
|
assert.NilError(t, err)
|
|
err = i.DelDestination(&s, &d3)
|
|
assert.NilError(t, err)
|
|
checkDestination(t, i, &s, &d3, false)
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTimeouts(t *testing.T) {
|
|
if testutils.RunningOnCircleCI() {
|
|
t.Skip("Skipping as not supported on CIRCLE CI kernel")
|
|
}
|
|
defer testutils.SetupTestOSContext(t)()
|
|
|
|
i, err := New("")
|
|
assert.NilError(t, err)
|
|
|
|
_, err = i.GetConfig()
|
|
assert.NilError(t, err)
|
|
|
|
cfg := Config{66 * time.Second, 66 * time.Second, 66 * time.Second}
|
|
err = i.SetConfig(&cfg)
|
|
assert.NilError(t, err)
|
|
|
|
c2, err := i.GetConfig()
|
|
assert.NilError(t, err)
|
|
assert.DeepEqual(t, cfg, *c2)
|
|
|
|
// A timeout value 0 means that the current timeout value of the corresponding entry is preserved
|
|
cfg = Config{77 * time.Second, 0 * time.Second, 77 * time.Second}
|
|
err = i.SetConfig(&cfg)
|
|
assert.NilError(t, err)
|
|
|
|
c3, err := i.GetConfig()
|
|
assert.NilError(t, err)
|
|
assert.DeepEqual(t, *c3, Config{77 * time.Second, 66 * time.Second, 77 * time.Second})
|
|
}
|