|
|
|
@ -35,6 +35,156 @@ import (
|
|
|
|
|
. "github.com/onsi/gomega"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func checkBridgeConfig03x(version string, originalNS ns.NetNS) {
|
|
|
|
|
const BRNAME = "cni0"
|
|
|
|
|
const IFNAME = "eth0"
|
|
|
|
|
|
|
|
|
|
gwaddr, subnet, err := net.ParseCIDR("10.1.2.1/24")
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
conf := fmt.Sprintf(`{
|
|
|
|
|
"cniVersion": "%s",
|
|
|
|
|
"name": "mynet",
|
|
|
|
|
"type": "bridge",
|
|
|
|
|
"bridge": "%s",
|
|
|
|
|
"isDefaultGateway": true,
|
|
|
|
|
"ipMasq": false,
|
|
|
|
|
"ipam": {
|
|
|
|
|
"type": "host-local",
|
|
|
|
|
"subnet": "%s"
|
|
|
|
|
}
|
|
|
|
|
}`, version, BRNAME, subnet.String())
|
|
|
|
|
|
|
|
|
|
targetNs, err := ns.NewNS()
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
defer targetNs.Close()
|
|
|
|
|
|
|
|
|
|
args := &skel.CmdArgs{
|
|
|
|
|
ContainerID: "dummy",
|
|
|
|
|
Netns: targetNs.Path(),
|
|
|
|
|
IfName: IFNAME,
|
|
|
|
|
StdinData: []byte(conf),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var result *current.Result
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
r, raw, err := testutils.CmdAddWithResult(targetNs.Path(), IFNAME, []byte(conf), func() error {
|
|
|
|
|
return cmdAdd(args)
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(strings.Index(string(raw), "\"interfaces\":")).Should(BeNumerically(">", 0))
|
|
|
|
|
|
|
|
|
|
result, err = current.GetResult(r)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
Expect(len(result.Interfaces)).To(Equal(3))
|
|
|
|
|
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
|
|
|
|
Expect(result.Interfaces[2].Name).To(Equal(IFNAME))
|
|
|
|
|
|
|
|
|
|
// Make sure bridge link exists
|
|
|
|
|
link, err := netlink.LinkByName(result.Interfaces[0].Name)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link.Attrs().Name).To(Equal(BRNAME))
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Bridge{}))
|
|
|
|
|
Expect(link.Attrs().HardwareAddr.String()).To(Equal(result.Interfaces[0].Mac))
|
|
|
|
|
hwAddr := fmt.Sprintf("%s", link.Attrs().HardwareAddr)
|
|
|
|
|
Expect(hwAddr).To(HavePrefix(hwaddr.PrivateMACPrefixString))
|
|
|
|
|
|
|
|
|
|
// Ensure bridge has gateway address
|
|
|
|
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(addrs)).To(BeNumerically(">", 0))
|
|
|
|
|
found := false
|
|
|
|
|
subnetPrefix, subnetBits := subnet.Mask.Size()
|
|
|
|
|
for _, a := range addrs {
|
|
|
|
|
aPrefix, aBits := a.IPNet.Mask.Size()
|
|
|
|
|
if a.IPNet.IP.Equal(gwaddr) && aPrefix == subnetPrefix && aBits == subnetBits {
|
|
|
|
|
found = true
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Expect(found).To(Equal(true))
|
|
|
|
|
|
|
|
|
|
// Check for the veth link in the main namespace
|
|
|
|
|
links, err := netlink.LinkList()
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
|
|
|
|
|
|
|
|
|
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Veth{}))
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Find the veth peer in the container namespace and the default route
|
|
|
|
|
err = targetNs.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(IFNAME)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link.Attrs().Name).To(Equal(IFNAME))
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Veth{}))
|
|
|
|
|
|
|
|
|
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(addrs)).To(Equal(1))
|
|
|
|
|
|
|
|
|
|
hwAddr := fmt.Sprintf("%s", link.Attrs().HardwareAddr)
|
|
|
|
|
Expect(hwAddr).To(HavePrefix(hwaddr.PrivateMACPrefixString))
|
|
|
|
|
|
|
|
|
|
// Ensure the default route
|
|
|
|
|
routes, err := netlink.RouteList(link, 0)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
var defaultRouteFound bool
|
|
|
|
|
for _, route := range routes {
|
|
|
|
|
defaultRouteFound = (route.Dst == nil && route.Src == nil && route.Gw.Equal(gwaddr))
|
|
|
|
|
if defaultRouteFound {
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Expect(defaultRouteFound).To(Equal(true))
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
err := testutils.CmdDelWithResult(targetNs.Path(), IFNAME, func() error {
|
|
|
|
|
return cmdDel(args)
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Make sure the host veth has been deleted
|
|
|
|
|
err = targetNs.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(IFNAME)
|
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeNil())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Make sure the container veth has been deleted
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(result.Interfaces[1].Name)
|
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeNil())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var _ = Describe("bridge Operations", func() {
|
|
|
|
|
var originalNS ns.NetNS
|
|
|
|
|
|
|
|
|
@ -54,7 +204,7 @@ var _ = Describe("bridge Operations", func() {
|
|
|
|
|
|
|
|
|
|
conf := &NetConf{
|
|
|
|
|
NetConf: types.NetConf{
|
|
|
|
|
CNIVersion: "0.3.0",
|
|
|
|
|
CNIVersion: "0.3.1",
|
|
|
|
|
Name: "testConfig",
|
|
|
|
|
Type: "bridge",
|
|
|
|
|
},
|
|
|
|
@ -99,7 +249,7 @@ var _ = Describe("bridge Operations", func() {
|
|
|
|
|
|
|
|
|
|
conf := &NetConf{
|
|
|
|
|
NetConf: types.NetConf{
|
|
|
|
|
CNIVersion: "0.3.0",
|
|
|
|
|
CNIVersion: "0.3.1",
|
|
|
|
|
Name: "testConfig",
|
|
|
|
|
Type: "bridge",
|
|
|
|
|
},
|
|
|
|
@ -123,154 +273,12 @@ var _ = Describe("bridge Operations", func() {
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
It("configures and deconfigures a bridge and veth with default route with ADD/DEL", func() {
|
|
|
|
|
const BRNAME = "cni0"
|
|
|
|
|
const IFNAME = "eth0"
|
|
|
|
|
It("configures and deconfigures a bridge and veth with default route with ADD/DEL for 0.3.0 config", func() {
|
|
|
|
|
checkBridgeConfig03x("0.3.0", originalNS)
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
gwaddr, subnet, err := net.ParseCIDR("10.1.2.1/24")
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
conf := fmt.Sprintf(`{
|
|
|
|
|
"cniVersion": "0.3.0",
|
|
|
|
|
"name": "mynet",
|
|
|
|
|
"type": "bridge",
|
|
|
|
|
"bridge": "%s",
|
|
|
|
|
"isDefaultGateway": true,
|
|
|
|
|
"ipMasq": false,
|
|
|
|
|
"ipam": {
|
|
|
|
|
"type": "host-local",
|
|
|
|
|
"subnet": "%s"
|
|
|
|
|
}
|
|
|
|
|
}`, BRNAME, subnet.String())
|
|
|
|
|
|
|
|
|
|
targetNs, err := ns.NewNS()
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
defer targetNs.Close()
|
|
|
|
|
|
|
|
|
|
args := &skel.CmdArgs{
|
|
|
|
|
ContainerID: "dummy",
|
|
|
|
|
Netns: targetNs.Path(),
|
|
|
|
|
IfName: IFNAME,
|
|
|
|
|
StdinData: []byte(conf),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var result *current.Result
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
r, raw, err := testutils.CmdAddWithResult(targetNs.Path(), IFNAME, []byte(conf), func() error {
|
|
|
|
|
return cmdAdd(args)
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(strings.Index(string(raw), "\"interfaces\":")).Should(BeNumerically(">", 0))
|
|
|
|
|
|
|
|
|
|
result, err = current.GetResult(r)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
Expect(len(result.Interfaces)).To(Equal(3))
|
|
|
|
|
Expect(result.Interfaces[0].Name).To(Equal(BRNAME))
|
|
|
|
|
Expect(result.Interfaces[2].Name).To(Equal(IFNAME))
|
|
|
|
|
|
|
|
|
|
// Make sure bridge link exists
|
|
|
|
|
link, err := netlink.LinkByName(result.Interfaces[0].Name)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link.Attrs().Name).To(Equal(BRNAME))
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Bridge{}))
|
|
|
|
|
Expect(link.Attrs().HardwareAddr.String()).To(Equal(result.Interfaces[0].Mac))
|
|
|
|
|
hwAddr := fmt.Sprintf("%s", link.Attrs().HardwareAddr)
|
|
|
|
|
Expect(hwAddr).To(HavePrefix(hwaddr.PrivateMACPrefixString))
|
|
|
|
|
|
|
|
|
|
// Ensure bridge has gateway address
|
|
|
|
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(addrs)).To(BeNumerically(">", 0))
|
|
|
|
|
found := false
|
|
|
|
|
subnetPrefix, subnetBits := subnet.Mask.Size()
|
|
|
|
|
for _, a := range addrs {
|
|
|
|
|
aPrefix, aBits := a.IPNet.Mask.Size()
|
|
|
|
|
if a.IPNet.IP.Equal(gwaddr) && aPrefix == subnetPrefix && aBits == subnetBits {
|
|
|
|
|
found = true
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Expect(found).To(Equal(true))
|
|
|
|
|
|
|
|
|
|
// Check for the veth link in the main namespace
|
|
|
|
|
links, err := netlink.LinkList()
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback
|
|
|
|
|
|
|
|
|
|
link, err = netlink.LinkByName(result.Interfaces[1].Name)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Veth{}))
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Find the veth peer in the container namespace and the default route
|
|
|
|
|
err = targetNs.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(IFNAME)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(link.Attrs().Name).To(Equal(IFNAME))
|
|
|
|
|
Expect(link).To(BeAssignableToTypeOf(&netlink.Veth{}))
|
|
|
|
|
|
|
|
|
|
addrs, err := netlink.AddrList(link, syscall.AF_INET)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
Expect(len(addrs)).To(Equal(1))
|
|
|
|
|
|
|
|
|
|
hwAddr := fmt.Sprintf("%s", link.Attrs().HardwareAddr)
|
|
|
|
|
Expect(hwAddr).To(HavePrefix(hwaddr.PrivateMACPrefixString))
|
|
|
|
|
|
|
|
|
|
// Ensure the default route
|
|
|
|
|
routes, err := netlink.RouteList(link, 0)
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
var defaultRouteFound bool
|
|
|
|
|
for _, route := range routes {
|
|
|
|
|
defaultRouteFound = (route.Dst == nil && route.Src == nil && route.Gw.Equal(gwaddr))
|
|
|
|
|
if defaultRouteFound {
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Expect(defaultRouteFound).To(Equal(true))
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
err := testutils.CmdDelWithResult(targetNs.Path(), IFNAME, func() error {
|
|
|
|
|
return cmdDel(args)
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Make sure the host veth has been deleted
|
|
|
|
|
err = targetNs.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(IFNAME)
|
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeNil())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
|
|
// Make sure the container veth has been deleted
|
|
|
|
|
err = originalNS.Do(func(ns.NetNS) error {
|
|
|
|
|
defer GinkgoRecover()
|
|
|
|
|
|
|
|
|
|
link, err := netlink.LinkByName(result.Interfaces[1].Name)
|
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
|
Expect(link).To(BeNil())
|
|
|
|
|
return nil
|
|
|
|
|
})
|
|
|
|
|
It("configures and deconfigures a bridge and veth with default route with ADD/DEL for 0.3.1 config", func() {
|
|
|
|
|
checkBridgeConfig03x("0.3.1", originalNS)
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
It("deconfigures an unconfigured bridge with DEL", func() {
|
|
|
|
@ -457,7 +465,7 @@ var _ = Describe("bridge Operations", func() {
|
|
|
|
|
|
|
|
|
|
conf := &NetConf{
|
|
|
|
|
NetConf: types.NetConf{
|
|
|
|
|
CNIVersion: "0.3.0",
|
|
|
|
|
CNIVersion: "0.3.1",
|
|
|
|
|
Name: "testConfig",
|
|
|
|
|
Type: "bridge",
|
|
|
|
|
},
|
|
|
|
|