enable ginkgolinter linter
Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com>
This commit is contained in:
parent
a02bf4b463
commit
09f36a295d
@ -11,6 +11,7 @@ linters:
|
|||||||
enable:
|
enable:
|
||||||
- contextcheck
|
- contextcheck
|
||||||
- gci
|
- gci
|
||||||
|
- ginkgolinter
|
||||||
- gocritic
|
- gocritic
|
||||||
- gofumpt
|
- gofumpt
|
||||||
- gosimple
|
- gosimple
|
||||||
|
@ -124,7 +124,7 @@ var _ = Describe("IP Operations", func() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, test := range testCases {
|
for _, test := range testCases {
|
||||||
Expect(len(test.ip.ToIP())).To(Equal(test.expectedLen))
|
Expect(test.ip.ToIP()).To(HaveLen(test.expectedLen))
|
||||||
Expect(test.ip.ToIP()).To(Equal(test.expectedIP))
|
Expect(test.ip.ToIP()).To(Equal(test.expectedIP))
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
@ -142,12 +142,12 @@ var _ = Describe("ConfigureIface", func() {
|
|||||||
|
|
||||||
v4addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
v4addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(v4addrs)).To(Equal(1))
|
Expect(v4addrs).To(HaveLen(1))
|
||||||
Expect(ipNetEqual(v4addrs[0].IPNet, ipv4)).To(Equal(true))
|
Expect(ipNetEqual(v4addrs[0].IPNet, ipv4)).To(BeTrue())
|
||||||
|
|
||||||
v6addrs, err := netlink.AddrList(link, syscall.AF_INET6)
|
v6addrs, err := netlink.AddrList(link, syscall.AF_INET6)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(v6addrs)).To(Equal(2))
|
Expect(v6addrs).To(HaveLen(2))
|
||||||
|
|
||||||
var found bool
|
var found bool
|
||||||
for _, a := range v6addrs {
|
for _, a := range v6addrs {
|
||||||
@ -156,7 +156,7 @@ var _ = Describe("ConfigureIface", func() {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(found).To(Equal(true))
|
Expect(found).To(BeTrue())
|
||||||
|
|
||||||
// Ensure the v4 route, v6 route, and subnet route
|
// Ensure the v4 route, v6 route, and subnet route
|
||||||
routes, err := netlink.RouteList(link, 0)
|
routes, err := netlink.RouteList(link, 0)
|
||||||
@ -176,8 +176,8 @@ var _ = Describe("ConfigureIface", func() {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(v4found).To(Equal(true))
|
Expect(v4found).To(BeTrue())
|
||||||
Expect(v6found).To(Equal(true))
|
Expect(v6found).To(BeTrue())
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
@ -215,8 +215,8 @@ var _ = Describe("ConfigureIface", func() {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(v4found).To(Equal(true))
|
Expect(v4found).To(BeTrue())
|
||||||
Expect(v6found).To(Equal(true))
|
Expect(v6found).To(BeTrue())
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
@ -26,29 +26,29 @@ var _ = Describe("Utils", func() {
|
|||||||
Describe("FormatChainName", func() {
|
Describe("FormatChainName", func() {
|
||||||
It("must format a short name", func() {
|
It("must format a short name", func() {
|
||||||
chain := FormatChainName("test", "1234")
|
chain := FormatChainName("test", "1234")
|
||||||
Expect(len(chain)).To(Equal(maxChainLength))
|
Expect(chain).To(HaveLen(maxChainLength))
|
||||||
Expect(chain).To(Equal("CNI-2bbe0c48b91a7d1b8a6753a8"))
|
Expect(chain).To(Equal("CNI-2bbe0c48b91a7d1b8a6753a8"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must truncate a long name", func() {
|
It("must truncate a long name", func() {
|
||||||
chain := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
chain := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
||||||
Expect(len(chain)).To(Equal(maxChainLength))
|
Expect(chain).To(HaveLen(maxChainLength))
|
||||||
Expect(chain).To(Equal("CNI-374f33fe84ab0ed84dcdebe3"))
|
Expect(chain).To(Equal("CNI-374f33fe84ab0ed84dcdebe3"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must be predictable", func() {
|
It("must be predictable", func() {
|
||||||
chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
||||||
chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
||||||
Expect(len(chain1)).To(Equal(maxChainLength))
|
Expect(chain1).To(HaveLen(maxChainLength))
|
||||||
Expect(len(chain2)).To(Equal(maxChainLength))
|
Expect(chain2).To(HaveLen(maxChainLength))
|
||||||
Expect(chain1).To(Equal(chain2))
|
Expect(chain1).To(Equal(chain2))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must change when a character changes", func() {
|
It("must change when a character changes", func() {
|
||||||
chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234")
|
||||||
chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1235")
|
chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1235")
|
||||||
Expect(len(chain1)).To(Equal(maxChainLength))
|
Expect(chain1).To(HaveLen(maxChainLength))
|
||||||
Expect(len(chain2)).To(Equal(maxChainLength))
|
Expect(chain2).To(HaveLen(maxChainLength))
|
||||||
Expect(chain1).To(Equal("CNI-374f33fe84ab0ed84dcdebe3"))
|
Expect(chain1).To(Equal("CNI-374f33fe84ab0ed84dcdebe3"))
|
||||||
Expect(chain1).NotTo(Equal(chain2))
|
Expect(chain1).NotTo(Equal(chain2))
|
||||||
})
|
})
|
||||||
@ -57,35 +57,35 @@ var _ = Describe("Utils", func() {
|
|||||||
Describe("MustFormatChainNameWithPrefix", func() {
|
Describe("MustFormatChainNameWithPrefix", func() {
|
||||||
It("generates a chain name with a prefix", func() {
|
It("generates a chain name with a prefix", func() {
|
||||||
chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-")
|
chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-")
|
||||||
Expect(len(chain)).To(Equal(maxChainLength))
|
Expect(chain).To(HaveLen(maxChainLength))
|
||||||
Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8"))
|
Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must format a short name", func() {
|
It("must format a short name", func() {
|
||||||
chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-")
|
chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-")
|
||||||
Expect(len(chain)).To(Equal(maxChainLength))
|
Expect(chain).To(HaveLen(maxChainLength))
|
||||||
Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8"))
|
Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must truncate a long name", func() {
|
It("must truncate a long name", func() {
|
||||||
chain := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
chain := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
||||||
Expect(len(chain)).To(Equal(maxChainLength))
|
Expect(chain).To(HaveLen(maxChainLength))
|
||||||
Expect(chain).To(Equal("CNI-PREFIX-374f33fe84ab0ed84"))
|
Expect(chain).To(Equal("CNI-PREFIX-374f33fe84ab0ed84"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must be predictable", func() {
|
It("must be predictable", func() {
|
||||||
chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
||||||
chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
||||||
Expect(len(chain1)).To(Equal(maxChainLength))
|
Expect(chain1).To(HaveLen(maxChainLength))
|
||||||
Expect(len(chain2)).To(Equal(maxChainLength))
|
Expect(chain2).To(HaveLen(maxChainLength))
|
||||||
Expect(chain1).To(Equal(chain2))
|
Expect(chain1).To(Equal(chain2))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must change when a character changes", func() {
|
It("must change when a character changes", func() {
|
||||||
chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-")
|
||||||
chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1235", "PREFIX-")
|
chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1235", "PREFIX-")
|
||||||
Expect(len(chain1)).To(Equal(maxChainLength))
|
Expect(chain1).To(HaveLen(maxChainLength))
|
||||||
Expect(len(chain2)).To(Equal(maxChainLength))
|
Expect(chain2).To(HaveLen(maxChainLength))
|
||||||
Expect(chain1).To(Equal("CNI-PREFIX-374f33fe84ab0ed84"))
|
Expect(chain1).To(Equal("CNI-PREFIX-374f33fe84ab0ed84"))
|
||||||
Expect(chain1).NotTo(Equal(chain2))
|
Expect(chain1).NotTo(Equal(chain2))
|
||||||
})
|
})
|
||||||
|
@ -122,7 +122,7 @@ var _ = Describe("DHCP Multiple Lease Operations", func() {
|
|||||||
|
|
||||||
addResult, err = current.GetResult(r)
|
addResult, err = current.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addResult.IPs)).To(Equal(1))
|
Expect(addResult.IPs).To(HaveLen(1))
|
||||||
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
@ -145,7 +145,7 @@ var _ = Describe("DHCP Multiple Lease Operations", func() {
|
|||||||
|
|
||||||
addResult, err = current.GetResult(r)
|
addResult, err = current.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addResult.IPs)).To(Equal(1))
|
Expect(addResult.IPs).To(HaveLen(1))
|
||||||
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.6/24"))
|
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.6/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
@ -271,7 +271,7 @@ var _ = Describe("DHCP Operations", func() {
|
|||||||
|
|
||||||
addResult, err = types100.GetResult(r)
|
addResult, err = types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addResult.IPs)).To(Equal(1))
|
Expect(addResult.IPs).To(HaveLen(1))
|
||||||
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
@ -314,7 +314,7 @@ var _ = Describe("DHCP Operations", func() {
|
|||||||
|
|
||||||
addResult, err = types100.GetResult(r)
|
addResult, err = types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addResult.IPs)).To(Equal(1))
|
Expect(addResult.IPs).To(HaveLen(1))
|
||||||
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
@ -594,7 +594,7 @@ var _ = Describe("DHCP Lease Unavailable Operations", func() {
|
|||||||
|
|
||||||
addResult, err = types100.GetResult(r)
|
addResult, err = types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addResult.IPs)).To(Equal(1))
|
Expect(addResult.IPs).To(HaveLen(1))
|
||||||
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
@ -77,7 +77,7 @@ func (t AllocatorTestCase) run(idx int) (*current.IPConfig, error) {
|
|||||||
p = append(p, Range{Subnet: types.IPNet(*subnet)})
|
p = append(p, Range{Subnet: types.IPNet(*subnet)})
|
||||||
}
|
}
|
||||||
|
|
||||||
Expect(p.Canonicalize()).To(BeNil())
|
Expect(p.Canonicalize()).To(Succeed())
|
||||||
|
|
||||||
store := fakestore.NewFakeStore(t.ipmap, map[string]net.IP{"rangeid": net.ParseIP(t.lastIP)})
|
store := fakestore.NewFakeStore(t.ipmap, map[string]net.IP{"rangeid": net.ParseIP(t.lastIP)})
|
||||||
|
|
||||||
@ -330,7 +330,7 @@ var _ = Describe("host-local ip allocator", func() {
|
|||||||
}
|
}
|
||||||
for idx, tc := range testCases {
|
for idx, tc := range testCases {
|
||||||
_, err := tc.run(idx)
|
_, err := tc.run(idx)
|
||||||
Expect(err).NotTo(BeNil())
|
Expect(err).To(HaveOccurred())
|
||||||
Expect(err.Error()).To(HavePrefix("no IP addresses available in range set"))
|
Expect(err.Error()).To(HavePrefix("no IP addresses available in range set"))
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
@ -114,7 +114,7 @@ var _ = Describe("host-local Operations", func() {
|
|||||||
Gateway: net.ParseIP("2001:db8:1::1"),
|
Gateway: net.ParseIP("2001:db8:1::1"),
|
||||||
},
|
},
|
||||||
))
|
))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
|
|
||||||
for _, expectedRoute := range []*types.Route{
|
for _, expectedRoute := range []*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0"), GW: nil},
|
{Dst: mustCIDR("0.0.0.0/0"), GW: nil},
|
||||||
@ -310,7 +310,7 @@ var _ = Describe("host-local Operations", func() {
|
|||||||
|
|
||||||
result0, err := types100.GetResult(r0)
|
result0, err := types100.GetResult(r0)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(result0.IPs)).Should(Equal(1))
|
Expect(result0.IPs).Should(HaveLen(1))
|
||||||
Expect(result0.IPs[0].Address.String()).Should(Equal("10.1.2.2/24"))
|
Expect(result0.IPs[0].Address.String()).Should(Equal("10.1.2.2/24"))
|
||||||
|
|
||||||
// Allocate the IP with the same container ID
|
// Allocate the IP with the same container ID
|
||||||
@ -330,7 +330,7 @@ var _ = Describe("host-local Operations", func() {
|
|||||||
|
|
||||||
result1, err := types100.GetResult(r1)
|
result1, err := types100.GetResult(r1)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(result1.IPs)).Should(Equal(1))
|
Expect(result1.IPs).Should(HaveLen(1))
|
||||||
Expect(result1.IPs[0].Address.String()).Should(Equal("10.1.2.3/24"))
|
Expect(result1.IPs[0].Address.String()).Should(Equal("10.1.2.3/24"))
|
||||||
|
|
||||||
// Allocate the IP with the same container ID again
|
// Allocate the IP with the same container ID again
|
||||||
|
@ -97,7 +97,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Gateway: net.ParseIP("3ffe:ffff:0::1"),
|
Gateway: net.ParseIP("3ffe:ffff:0::1"),
|
||||||
},
|
},
|
||||||
))
|
))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
|
|
||||||
Expect(result.Routes).To(Equal([]*types.Route{
|
Expect(result.Routes).To(Equal([]*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0")},
|
{Dst: mustCIDR("0.0.0.0/0")},
|
||||||
@ -206,7 +206,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Gateway: net.ParseIP("10.10.0.254"),
|
Gateway: net.ParseIP("10.10.0.254"),
|
||||||
}))
|
}))
|
||||||
|
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
Expect(result.Routes).To(Equal([]*types.Route{
|
Expect(result.Routes).To(Equal([]*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0")},
|
{Dst: mustCIDR("0.0.0.0/0")},
|
||||||
@ -272,7 +272,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Gateway: nil,
|
Gateway: nil,
|
||||||
}))
|
}))
|
||||||
|
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
|
|
||||||
// Release the IP
|
// Release the IP
|
||||||
err = testutils.CmdDelWithArgs(args, func() error {
|
err = testutils.CmdDelWithArgs(args, func() error {
|
||||||
@ -337,7 +337,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
||||||
},
|
},
|
||||||
))
|
))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
Expect(result.Routes).To(Equal([]*types.Route{
|
Expect(result.Routes).To(Equal([]*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
||||||
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
||||||
@ -407,7 +407,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
||||||
},
|
},
|
||||||
))
|
))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
Expect(result.Routes).To(Equal([]*types.Route{
|
Expect(result.Routes).To(Equal([]*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
||||||
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
||||||
@ -482,7 +482,7 @@ var _ = Describe("static Operations", func() {
|
|||||||
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
Address: mustCIDR("3ffe:ffff:0:01ff::1/64"),
|
||||||
},
|
},
|
||||||
))
|
))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
Expect(result.Routes).To(Equal([]*types.Route{
|
Expect(result.Routes).To(Equal([]*types.Route{
|
||||||
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
{Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")},
|
||||||
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
{Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")},
|
||||||
|
@ -485,9 +485,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
result = resultType.(*types100.Result)
|
result = resultType.(*types100.Result)
|
||||||
|
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(result.Interfaces)).To(Equal(4))
|
Expect(result.Interfaces).To(HaveLen(4))
|
||||||
} else {
|
} else {
|
||||||
Expect(len(result.Interfaces)).To(Equal(3))
|
Expect(result.Interfaces).To(HaveLen(3))
|
||||||
}
|
}
|
||||||
|
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
||||||
@ -531,9 +531,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
|
|
||||||
// Check the bridge vlan filtering equals true
|
// Check the bridge vlan filtering equals true
|
||||||
if tc.vlan != 0 {
|
if tc.vlan != 0 {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue())
|
||||||
} else {
|
} else {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Ensure bridge has expected gateway address(es)
|
// Ensure bridge has expected gateway address(es)
|
||||||
@ -544,7 +544,7 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
||||||
}
|
}
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(BeNumerically(">", 0))
|
Expect(addrs).ToNot(BeEmpty())
|
||||||
for _, cidr := range tc.expGWCIDRs {
|
for _, cidr := range tc.expGWCIDRs {
|
||||||
ip, subnet, err := net.ParseCIDR(cidr)
|
ip, subnet, err := net.ParseCIDR(cidr)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -558,16 +558,16 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(found).To(Equal(true), fmt.Sprintf("failed to find %s", cidr))
|
Expect(found).To(BeTrue(), fmt.Sprintf("failed to find %s", cidr))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for the veth link in the main namespace
|
// Check for the veth link in the main namespace
|
||||||
links, err := netlink.LinkList()
|
links, err := netlink.LinkList()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
||||||
} else {
|
} else {
|
||||||
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback
|
||||||
}
|
}
|
||||||
|
|
||||||
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
||||||
@ -613,9 +613,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local
|
Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
// ready when we read addresses.
|
// ready when we read addresses.
|
||||||
@ -650,7 +650,7 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -689,9 +689,9 @@ func (tester *testerV10x) cmdCheckTest(tc testCase, conf *Net, dataDir string) {
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local
|
Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
// ready when we read addresses.
|
// ready when we read addresses.
|
||||||
@ -726,7 +726,7 @@ func (tester *testerV10x) cmdCheckTest(tc testCase, conf *Net, dataDir string) {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -790,9 +790,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
result = resultType.(*types040.Result)
|
result = resultType.(*types040.Result)
|
||||||
|
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(result.Interfaces)).To(Equal(4))
|
Expect(result.Interfaces).To(HaveLen(4))
|
||||||
} else {
|
} else {
|
||||||
Expect(len(result.Interfaces)).To(Equal(3))
|
Expect(result.Interfaces).To(HaveLen(3))
|
||||||
}
|
}
|
||||||
|
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
||||||
@ -836,9 +836,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
|
|
||||||
// Check the bridge vlan filtering equals true
|
// Check the bridge vlan filtering equals true
|
||||||
if tc.vlan != 0 {
|
if tc.vlan != 0 {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue())
|
||||||
} else {
|
} else {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Ensure bridge has expected gateway address(es)
|
// Ensure bridge has expected gateway address(es)
|
||||||
@ -849,7 +849,7 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
||||||
}
|
}
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(BeNumerically(">", 0))
|
Expect(addrs).ToNot(BeEmpty())
|
||||||
for _, cidr := range tc.expGWCIDRs {
|
for _, cidr := range tc.expGWCIDRs {
|
||||||
ip, subnet, err := net.ParseCIDR(cidr)
|
ip, subnet, err := net.ParseCIDR(cidr)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -863,16 +863,16 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(found).To(Equal(true))
|
Expect(found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for the veth link in the main namespace
|
// Check for the veth link in the main namespace
|
||||||
links, err := netlink.LinkList()
|
links, err := netlink.LinkList()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
||||||
} else {
|
} else {
|
||||||
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback
|
||||||
}
|
}
|
||||||
|
|
||||||
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
||||||
@ -913,9 +913,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local
|
Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
// ready when we read addresses.
|
// ready when we read addresses.
|
||||||
@ -950,7 +950,7 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -989,9 +989,9 @@ func (tester *testerV04x) cmdCheckTest(tc testCase, conf *Net, dataDir string) {
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local
|
Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
// ready when we read addresses.
|
// ready when we read addresses.
|
||||||
@ -1026,7 +1026,7 @@ func (tester *testerV04x) cmdCheckTest(tc testCase, conf *Net, dataDir string) {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -1090,9 +1090,9 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
result = resultType.(*types040.Result)
|
result = resultType.(*types040.Result)
|
||||||
|
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(result.Interfaces)).To(Equal(4))
|
Expect(result.Interfaces).To(HaveLen(4))
|
||||||
} else {
|
} else {
|
||||||
Expect(len(result.Interfaces)).To(Equal(3))
|
Expect(result.Interfaces).To(HaveLen(3))
|
||||||
}
|
}
|
||||||
|
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
||||||
@ -1136,9 +1136,9 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
|
|
||||||
// Check the bridge vlan filtering equals true
|
// Check the bridge vlan filtering equals true
|
||||||
if tc.vlan != 0 {
|
if tc.vlan != 0 {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue())
|
||||||
} else {
|
} else {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Ensure bridge has expected gateway address(es)
|
// Ensure bridge has expected gateway address(es)
|
||||||
@ -1149,7 +1149,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
||||||
}
|
}
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(BeNumerically(">", 0))
|
Expect(addrs).ToNot(BeEmpty())
|
||||||
for _, cidr := range tc.expGWCIDRs {
|
for _, cidr := range tc.expGWCIDRs {
|
||||||
ip, subnet, err := net.ParseCIDR(cidr)
|
ip, subnet, err := net.ParseCIDR(cidr)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -1163,16 +1163,16 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(found).To(Equal(true))
|
Expect(found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for the veth link in the main namespace
|
// Check for the veth link in the main namespace
|
||||||
links, err := netlink.LinkList()
|
links, err := netlink.LinkList()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
||||||
} else {
|
} else {
|
||||||
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback
|
||||||
}
|
}
|
||||||
|
|
||||||
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
||||||
@ -1213,7 +1213,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
@ -1249,7 +1249,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result,
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -1362,9 +1362,9 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
|
|
||||||
// Check the bridge vlan filtering equals true
|
// Check the bridge vlan filtering equals true
|
||||||
if tc.vlan != 0 {
|
if tc.vlan != 0 {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue())
|
||||||
} else {
|
} else {
|
||||||
Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false))
|
Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Ensure bridge has expected gateway address(es)
|
// Ensure bridge has expected gateway address(es)
|
||||||
@ -1375,7 +1375,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL)
|
||||||
}
|
}
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(BeNumerically(">", 0))
|
Expect(addrs).ToNot(BeEmpty())
|
||||||
for _, cidr := range tc.expGWCIDRs {
|
for _, cidr := range tc.expGWCIDRs {
|
||||||
ip, subnet, err := net.ParseCIDR(cidr)
|
ip, subnet, err := net.ParseCIDR(cidr)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -1389,7 +1389,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(found).To(Equal(true))
|
Expect(found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for the veth link in the main namespace; can't
|
// Check for the veth link in the main namespace; can't
|
||||||
@ -1398,9 +1398,9 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
links, err := netlink.LinkList()
|
links, err := netlink.LinkList()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
if !tc.isLayer2 && tc.vlan != 0 {
|
if !tc.isLayer2 && tc.vlan != 0 {
|
||||||
Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback
|
||||||
} else {
|
} else {
|
||||||
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback
|
||||||
}
|
}
|
||||||
|
|
||||||
// Grab the vlan map in the host NS for checking later
|
// Grab the vlan map in the host NS for checking later
|
||||||
@ -1431,7 +1431,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs()
|
||||||
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
addrs, err := netlink.AddrList(link, netlink.FAMILY_V4)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(len(expCIDRsV4)))
|
Expect(addrs).To(HaveLen(len(expCIDRsV4)))
|
||||||
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
addrs, err = netlink.AddrList(link, netlink.FAMILY_V6)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Ignore link local address which may or may not be
|
// Ignore link local address which may or may not be
|
||||||
@ -1467,7 +1467,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(*found).To(Equal(true))
|
Expect(*found).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate VLAN in the host NS. Since 0.1.0/0.2.0 don't return
|
// Validate VLAN in the host NS. Since 0.1.0/0.2.0 don't return
|
||||||
@ -1929,7 +1929,7 @@ var _ = Describe("bridge Operations", func() {
|
|||||||
checkBridgeIPs := func(cidr0, cidr1 string) {
|
checkBridgeIPs := func(cidr0, cidr1 string) {
|
||||||
addrs, err := netlink.AddrList(bridge, family)
|
addrs, err := netlink.AddrList(bridge, family)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(expNumAddrs))
|
Expect(addrs).To(HaveLen(expNumAddrs))
|
||||||
addr := addrs[0].IPNet.String()
|
addr := addrs[0].IPNet.String()
|
||||||
Expect(addr).To(Equal(cidr0))
|
Expect(addr).To(Equal(cidr0))
|
||||||
if cidr1 != "" {
|
if cidr1 != "" {
|
||||||
@ -1939,7 +1939,7 @@ var _ = Describe("bridge Operations", func() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check if ForceAddress has default value
|
// Check if ForceAddress has default value
|
||||||
Expect(conf.ForceAddress).To(Equal(false))
|
Expect(conf.ForceAddress).To(BeFalse())
|
||||||
|
|
||||||
// Set first address on bridge
|
// Set first address on bridge
|
||||||
err = ensureAddr(bridge, family, &gwnFirst, conf.ForceAddress)
|
err = ensureAddr(bridge, family, &gwnFirst, conf.ForceAddress)
|
||||||
@ -2008,7 +2008,7 @@ var _ = Describe("bridge Operations", func() {
|
|||||||
_, _, err := setupBridge(conf)
|
_, _, err := setupBridge(conf)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
// Check if ForceAddress has default value
|
// Check if ForceAddress has default value
|
||||||
Expect(conf.ForceAddress).To(Equal(false))
|
Expect(conf.ForceAddress).To(BeFalse())
|
||||||
|
|
||||||
// Check if promiscuous mode is set correctly
|
// Check if promiscuous mode is set correctly
|
||||||
link, err := netlink.LinkByName("bridge0")
|
link, err := netlink.LinkByName("bridge0")
|
||||||
@ -2275,7 +2275,7 @@ var _ = Describe("bridge Operations", func() {
|
|||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
_, _, err := loadNetConf([]byte(test.netConfJSON("")), "")
|
_, _, err := loadNetConf([]byte(test.netConfJSON("")), "")
|
||||||
if test.err == nil {
|
if test.err == nil {
|
||||||
Expect(err).To(BeNil())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
} else {
|
} else {
|
||||||
Expect(err).To(Equal(test.err))
|
Expect(err).To(Equal(test.err))
|
||||||
}
|
}
|
||||||
|
@ -122,9 +122,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string {
|
|||||||
r, err := types100.GetResult(result)
|
r, err := types100.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -133,9 +133,9 @@ func verify0403(result types.Result, name string) string {
|
|||||||
r, err := types040.GetResult(result)
|
r, err := types040.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -292,7 +292,7 @@ var _ = Describe("dummy Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
@ -260,8 +260,8 @@ func (t *testerV10x) expectDpdkInterfaceIP(result types.Result, ipAddress string
|
|||||||
// check that the result was sane
|
// check that the result was sane
|
||||||
res, err := types100.NewResultFromResult(result)
|
res, err := types100.NewResultFromResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(res.Interfaces)).To(Equal(0))
|
Expect(res.Interfaces).To(BeEmpty())
|
||||||
Expect(len(res.IPs)).To(Equal(1))
|
Expect(res.IPs).To(HaveLen(1))
|
||||||
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -282,8 +282,8 @@ func (t *testerV04x) expectDpdkInterfaceIP(result types.Result, ipAddress string
|
|||||||
// check that the result was sane
|
// check that the result was sane
|
||||||
res, err := types040.NewResultFromResult(result)
|
res, err := types040.NewResultFromResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(res.Interfaces)).To(Equal(0))
|
Expect(res.Interfaces).To(BeEmpty())
|
||||||
Expect(len(res.IPs)).To(Equal(1))
|
Expect(res.IPs).To(HaveLen(1))
|
||||||
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -304,8 +304,8 @@ func (t *testerV03x) expectDpdkInterfaceIP(result types.Result, ipAddress string
|
|||||||
// check that the result was sane
|
// check that the result was sane
|
||||||
res, err := types040.NewResultFromResult(result)
|
res, err := types040.NewResultFromResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(res.Interfaces)).To(Equal(0))
|
Expect(res.Interfaces).To(BeEmpty())
|
||||||
Expect(len(res.IPs)).To(Equal(1))
|
Expect(res.IPs).To(HaveLen(1))
|
||||||
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
Expect(res.IPs[0].Address.String()).To(Equal(ipAddress))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -141,7 +141,7 @@ func ipvlanAddCheckDelTest(conf, masterName string, originalNS, targetNS ns.NetN
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -230,9 +230,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string {
|
|||||||
r, err := types100.GetResult(result)
|
r, err := types100.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -242,9 +242,9 @@ func (t *testerV04x) verifyResult(result types.Result, name string) string {
|
|||||||
r, err := types040.GetResult(result)
|
r, err := types040.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
|
@ -136,9 +136,9 @@ func (t *testerV10x) verifyResult(result types.Result, err error, name string, n
|
|||||||
r, err := types100.GetResult(result)
|
r, err := types100.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(numAddrs))
|
Expect(r.IPs).To(HaveLen(numAddrs))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -150,9 +150,9 @@ func verify0403(result types.Result, err error, name string, numAddrs int) strin
|
|||||||
r, err := types040.GetResult(result)
|
r, err := types040.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(numAddrs))
|
Expect(r.IPs).To(HaveLen(numAddrs))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -348,7 +348,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -460,7 +460,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(0))
|
Expect(addrs).To(BeEmpty())
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -546,7 +546,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -686,7 +686,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -768,7 +768,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(0))
|
Expect(addrs).To(BeEmpty())
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -853,7 +853,7 @@ var _ = Describe("macvlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(0))
|
Expect(addrs).To(BeEmpty())
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
@ -259,7 +259,7 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
|
|
||||||
t := newTesterByVersion(cniVersion)
|
t := newTesterByVersion(cniVersion)
|
||||||
ips, mac := t.verifyResult(result, IFNAME, targetNS.Path(), expectedDNSConf)
|
ips, mac := t.verifyResult(result, IFNAME, targetNS.Path(), expectedDNSConf)
|
||||||
Expect(len(ips)).To(Equal(numIPs))
|
Expect(ips).To(HaveLen(numIPs))
|
||||||
|
|
||||||
// Make sure ptp link exists in the target namespace
|
// Make sure ptp link exists in the target namespace
|
||||||
// Then, ping the gateway
|
// Then, ping the gateway
|
||||||
|
@ -125,9 +125,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string {
|
|||||||
r, err := types100.GetResult(result)
|
r, err := types100.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -136,9 +136,9 @@ func verify0403(result types.Result, name string) string {
|
|||||||
r, err := types040.GetResult(result)
|
r, err := types040.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -249,7 +249,7 @@ var _ = Describe("Add, check, remove tap plugin", func() {
|
|||||||
}
|
}
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
@ -129,9 +129,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string {
|
|||||||
r, err := types100.GetResult(result)
|
r, err := types100.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -140,9 +140,9 @@ func verify0403(result types.Result, name string) string {
|
|||||||
r, err := types040.GetResult(result)
|
r, err := types040.GetResult(result)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(r.Interfaces)).To(Equal(1))
|
Expect(r.Interfaces).To(HaveLen(1))
|
||||||
Expect(r.Interfaces[0].Name).To(Equal(name))
|
Expect(r.Interfaces[0].Name).To(Equal(name))
|
||||||
Expect(len(r.IPs)).To(Equal(1))
|
Expect(r.IPs).To(HaveLen(1))
|
||||||
|
|
||||||
return r.Interfaces[0].Mac
|
return r.Interfaces[0].Mac
|
||||||
}
|
}
|
||||||
@ -380,7 +380,7 @@ var _ = Describe("vlan Operations", func() {
|
|||||||
|
|
||||||
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addrs)).To(Equal(1))
|
Expect(addrs).To(HaveLen(1))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
@ -251,9 +251,9 @@ var _ = Describe("firewalld test", func() {
|
|||||||
result, err := current.GetResult(r)
|
result, err := current.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal("eth0"))
|
Expect(result.Interfaces[0].Name).To(Equal("eth0"))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ import (
|
|||||||
|
|
||||||
"github.com/containernetworking/cni/pkg/skel"
|
"github.com/containernetworking/cni/pkg/skel"
|
||||||
"github.com/containernetworking/cni/pkg/types"
|
"github.com/containernetworking/cni/pkg/types"
|
||||||
"github.com/containernetworking/cni/pkg/types/040"
|
types040 "github.com/containernetworking/cni/pkg/types/040"
|
||||||
current "github.com/containernetworking/cni/pkg/types/100"
|
current "github.com/containernetworking/cni/pkg/types/100"
|
||||||
"github.com/containernetworking/cni/pkg/version"
|
"github.com/containernetworking/cni/pkg/version"
|
||||||
"github.com/containernetworking/plugins/pkg/ns"
|
"github.com/containernetworking/plugins/pkg/ns"
|
||||||
@ -107,27 +107,27 @@ func validateFullRuleset(bytes []byte) {
|
|||||||
chains, err := ipt.ListChains("filter")
|
chains, err := ipt.ListChains("filter")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
foundAdmin, foundPriv := findChains(chains)
|
foundAdmin, foundPriv := findChains(chains)
|
||||||
Expect(foundAdmin).To(Equal(true))
|
Expect(foundAdmin).To(BeTrue())
|
||||||
Expect(foundPriv).To(Equal(true))
|
Expect(foundPriv).To(BeTrue())
|
||||||
|
|
||||||
// Look for the FORWARD chain jump rules to our custom chains
|
// Look for the FORWARD chain jump rules to our custom chains
|
||||||
rules, err := ipt.List("filter", "FORWARD")
|
rules, err := ipt.List("filter", "FORWARD")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(rules)).Should(BeNumerically(">", 1))
|
Expect(len(rules)).Should(BeNumerically(">", 1))
|
||||||
_, foundPriv = findForwardJumpRules(rules)
|
_, foundPriv = findForwardJumpRules(rules)
|
||||||
Expect(foundPriv).To(Equal(true))
|
Expect(foundPriv).To(BeTrue())
|
||||||
|
|
||||||
// Look for the allow rules in our custom FORWARD chain
|
// Look for the allow rules in our custom FORWARD chain
|
||||||
rules, err = ipt.List("filter", "CNI-FORWARD")
|
rules, err = ipt.List("filter", "CNI-FORWARD")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(rules)).Should(BeNumerically(">", 1))
|
Expect(len(rules)).Should(BeNumerically(">", 1))
|
||||||
foundAdmin, _ = findForwardJumpRules(rules)
|
foundAdmin, _ = findForwardJumpRules(rules)
|
||||||
Expect(foundAdmin).To(Equal(true))
|
Expect(foundAdmin).To(BeTrue())
|
||||||
|
|
||||||
// Look for the IP allow rules
|
// Look for the IP allow rules
|
||||||
foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address))
|
foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address))
|
||||||
Expect(foundOne).To(Equal(true))
|
Expect(foundOne).To(BeTrue())
|
||||||
Expect(foundTwo).To(Equal(true))
|
Expect(foundTwo).To(BeTrue())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -142,25 +142,25 @@ func validateCleanedUp(bytes []byte) {
|
|||||||
chains, err := ipt.ListChains("filter")
|
chains, err := ipt.ListChains("filter")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
foundAdmin, foundPriv := findChains(chains)
|
foundAdmin, foundPriv := findChains(chains)
|
||||||
Expect(foundAdmin).To(Equal(true))
|
Expect(foundAdmin).To(BeTrue())
|
||||||
Expect(foundPriv).To(Equal(true))
|
Expect(foundPriv).To(BeTrue())
|
||||||
|
|
||||||
// Look for the FORWARD chain jump rules to our custom chains
|
// Look for the FORWARD chain jump rules to our custom chains
|
||||||
rules, err := ipt.List("filter", "FORWARD")
|
rules, err := ipt.List("filter", "FORWARD")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
_, foundPriv = findForwardJumpRules(rules)
|
_, foundPriv = findForwardJumpRules(rules)
|
||||||
Expect(foundPriv).To(Equal(true))
|
Expect(foundPriv).To(BeTrue())
|
||||||
|
|
||||||
// Look for the allow rules in our custom FORWARD chain
|
// Look for the allow rules in our custom FORWARD chain
|
||||||
rules, err = ipt.List("filter", "CNI-FORWARD")
|
rules, err = ipt.List("filter", "CNI-FORWARD")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
foundAdmin, _ = findForwardJumpRules(rules)
|
foundAdmin, _ = findForwardJumpRules(rules)
|
||||||
Expect(foundAdmin).To(Equal(true))
|
Expect(foundAdmin).To(BeTrue())
|
||||||
|
|
||||||
// Expect no IP address rules for this IP
|
// Expect no IP address rules for this IP
|
||||||
foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address))
|
foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address))
|
||||||
Expect(foundOne).To(Equal(false))
|
Expect(foundOne).To(BeFalse())
|
||||||
Expect(foundTwo).To(Equal(false))
|
Expect(foundTwo).To(BeFalse())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -253,9 +253,9 @@ var _ = Describe("firewall plugin iptables backend", func() {
|
|||||||
result, err := current.GetResult(r)
|
result, err := current.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(2))
|
Expect(result.IPs).To(HaveLen(2))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
Expect(result.IPs[1].Address.String()).To(Equal("2001:db8:1:2::1/64"))
|
Expect(result.IPs[1].Address.String()).To(Equal("2001:db8:1:2::1/64"))
|
||||||
return nil
|
return nil
|
||||||
@ -350,7 +350,7 @@ var _ = Describe("firewall plugin iptables backend", func() {
|
|||||||
foundAdmin = true
|
foundAdmin = true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Expect(foundAdmin).To(Equal(true))
|
Expect(foundAdmin).To(BeTrue())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
@ -167,7 +167,7 @@ var _ = Describe("chain tests", func() {
|
|||||||
rules, err := ipt.List(TABLE, testChain.name)
|
rules, err := ipt.List(TABLE, testChain.name)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(rules)).To(Equal(3))
|
Expect(rules).To(HaveLen(3))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("deletes chains idempotently", func() {
|
It("deletes chains idempotently", func() {
|
||||||
|
@ -295,7 +295,7 @@ var _ = Describe("sbr test", func() {
|
|||||||
LinkIndex: expNet1.Routes[0].LinkIndex,
|
LinkIndex: expNet1.Routes[0].LinkIndex,
|
||||||
})
|
})
|
||||||
|
|
||||||
Expect(len(newStatus.Rules)).To(Equal(1))
|
Expect(newStatus.Rules).To(HaveLen(1))
|
||||||
Expect(newStatus.Rules[0].Table).To(Equal(100))
|
Expect(newStatus.Rules[0].Table).To(Equal(100))
|
||||||
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32"))
|
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32"))
|
||||||
devNet1 := newStatus.Devices[0]
|
devNet1 := newStatus.Devices[0]
|
||||||
@ -323,7 +323,7 @@ var _ = Describe("sbr test", func() {
|
|||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
// Check results. We expect the rule to have been removed.
|
// Check results. We expect the rule to have been removed.
|
||||||
Expect(len(retVal.Rules)).To(Equal(0))
|
Expect(retVal.Rules).To(BeEmpty())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("Works with a default route already set", func() {
|
It("Works with a default route already set", func() {
|
||||||
@ -393,7 +393,7 @@ var _ = Describe("sbr test", func() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Expect(len(newStatus.Rules)).To(Equal(1))
|
Expect(newStatus.Rules).To(HaveLen(1))
|
||||||
Expect(newStatus.Rules[0].Table).To(Equal(100))
|
Expect(newStatus.Rules[0].Table).To(Equal(100))
|
||||||
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32"))
|
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32"))
|
||||||
devNet1 := newStatus.Devices[0]
|
devNet1 := newStatus.Devices[0]
|
||||||
@ -504,7 +504,7 @@ var _ = Describe("sbr test", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
// 2 Rules will be created for each IP address. (100, 101)
|
// 2 Rules will be created for each IP address. (100, 101)
|
||||||
Expect(len(newStatus.Rules)).To(Equal(2))
|
Expect(newStatus.Rules).To(HaveLen(2))
|
||||||
|
|
||||||
// First entry corresponds to last table
|
// First entry corresponds to last table
|
||||||
Expect(newStatus.Rules[0].Table).To(Equal(101))
|
Expect(newStatus.Rules[0].Table).To(Equal(101))
|
||||||
|
@ -28,7 +28,7 @@ import (
|
|||||||
|
|
||||||
"github.com/containernetworking/cni/pkg/skel"
|
"github.com/containernetworking/cni/pkg/skel"
|
||||||
"github.com/containernetworking/cni/pkg/types"
|
"github.com/containernetworking/cni/pkg/types"
|
||||||
"github.com/containernetworking/cni/pkg/types/100"
|
types100 "github.com/containernetworking/cni/pkg/types/100"
|
||||||
"github.com/containernetworking/plugins/pkg/ns"
|
"github.com/containernetworking/plugins/pkg/ns"
|
||||||
"github.com/containernetworking/plugins/pkg/testutils"
|
"github.com/containernetworking/plugins/pkg/testutils"
|
||||||
)
|
)
|
||||||
@ -187,9 +187,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
Expect("/tmp/tuning-test/dummy_dummy0.json").ShouldNot(BeAnExistingFile())
|
Expect("/tmp/tuning-test/dummy_dummy0.json").ShouldNot(BeAnExistingFile())
|
||||||
@ -242,9 +242,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -323,9 +323,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -384,9 +384,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -465,9 +465,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -527,9 +527,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
Expect(result.Interfaces[0].Mac).To(Equal(mac))
|
Expect(result.Interfaces[0].Mac).To(Equal(mac))
|
||||||
@ -611,9 +611,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -674,9 +674,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -756,9 +756,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -822,9 +822,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -907,9 +907,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -988,9 +988,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -1108,9 +1108,9 @@ var _ = Describe("tuning plugin", func() {
|
|||||||
result, err := types100.GetResult(r)
|
result, err := types100.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
Expect(result.Interfaces[0].Name).To(Equal(IFNAME))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
|
|
||||||
err = testutils.CmdDel(originalNS.Path(),
|
err = testutils.CmdDel(originalNS.Path(),
|
||||||
|
@ -140,9 +140,9 @@ var _ = Describe("vrf plugin", func() {
|
|||||||
result, err := current.GetResult(r)
|
result, err := current.GetResult(r)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IF0Name))
|
Expect(result.Interfaces[0].Name).To(Equal(IF0Name))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
@ -298,7 +298,7 @@ var _ = Describe("vrf plugin", func() {
|
|||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL)
|
addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addresses)).To(Equal(1))
|
Expect(addresses).To(HaveLen(1))
|
||||||
Expect(addresses[0].IP.Equal(addr0.IP)).To(BeTrue())
|
Expect(addresses[0].IP.Equal(addr0.IP)).To(BeTrue())
|
||||||
Expect(addresses[0].Mask).To(Equal(addr0.Mask))
|
Expect(addresses[0].Mask).To(Equal(addr0.Mask))
|
||||||
return nil
|
return nil
|
||||||
@ -316,7 +316,7 @@ var _ = Describe("vrf plugin", func() {
|
|||||||
|
|
||||||
addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL)
|
addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(len(addresses)).To(Equal(1))
|
Expect(addresses).To(HaveLen(1))
|
||||||
Expect(addresses[0].IP.Equal(addr1.IP)).To(BeTrue())
|
Expect(addresses[0].IP.Equal(addr1.IP)).To(BeTrue())
|
||||||
Expect(addresses[0].Mask).To(Equal(addr1.Mask))
|
Expect(addresses[0].Mask).To(Equal(addr1.Mask))
|
||||||
return nil
|
return nil
|
||||||
@ -524,7 +524,7 @@ var _ = Describe("vrf plugin", func() {
|
|||||||
targetNS.Do(func(ns.NetNS) error {
|
targetNS.Do(func(ns.NetNS) error {
|
||||||
defer GinkgoRecover()
|
defer GinkgoRecover()
|
||||||
_, err := netlink.LinkByName(VRF0Name)
|
_, err := netlink.LinkByName(VRF0Name)
|
||||||
Expect(err).NotTo(BeNil())
|
Expect(err).To(HaveOccurred())
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@ -569,9 +569,9 @@ var _ = Describe("vrf plugin", func() {
|
|||||||
result, err := current.GetResult(prevRes)
|
result, err := current.GetResult(prevRes)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(len(result.Interfaces)).To(Equal(1))
|
Expect(result.Interfaces).To(HaveLen(1))
|
||||||
Expect(result.Interfaces[0].Name).To(Equal(IF0Name))
|
Expect(result.Interfaces[0].Name).To(Equal(IF0Name))
|
||||||
Expect(len(result.IPs)).To(Equal(1))
|
Expect(result.IPs).To(HaveLen(1))
|
||||||
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24"))
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
Loading…
x
Reference in New Issue
Block a user