ptp: increase test coverage to 1.0.0 and older spec versions
Signed-off-by: Dan Williams <dcbw@redhat.com>
This commit is contained in:
parent
bbf7189c32
commit
f56545ca74
@ -17,11 +17,15 @@ package main
|
|||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/containernetworking/cni/pkg/skel"
|
"github.com/containernetworking/cni/pkg/skel"
|
||||||
"github.com/containernetworking/cni/pkg/types"
|
"github.com/containernetworking/cni/pkg/types"
|
||||||
current "github.com/containernetworking/cni/pkg/types/100"
|
"github.com/containernetworking/cni/pkg/types/020"
|
||||||
|
"github.com/containernetworking/cni/pkg/types/040"
|
||||||
|
"github.com/containernetworking/cni/pkg/types/100"
|
||||||
"github.com/containernetworking/plugins/pkg/ns"
|
"github.com/containernetworking/plugins/pkg/ns"
|
||||||
"github.com/containernetworking/plugins/pkg/testutils"
|
"github.com/containernetworking/plugins/pkg/testutils"
|
||||||
|
|
||||||
@ -41,7 +45,7 @@ type Net struct {
|
|||||||
IPAM *allocator.IPAMConfig `json:"ipam"`
|
IPAM *allocator.IPAMConfig `json:"ipam"`
|
||||||
DNS types.DNS `json:"dns"`
|
DNS types.DNS `json:"dns"`
|
||||||
RawPrevResult map[string]interface{} `json:"prevResult,omitempty"`
|
RawPrevResult map[string]interface{} `json:"prevResult,omitempty"`
|
||||||
PrevResult current.Result `json:"-"`
|
PrevResult types100.Result `json:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func buildOneConfig(netName string, cniVersion string, orig *Net, prevResult types.Result) (*Net, error) {
|
func buildOneConfig(netName string, cniVersion string, orig *Net, prevResult types.Result) (*Net, error) {
|
||||||
@ -87,43 +91,166 @@ func buildOneConfig(netName string, cniVersion string, orig *Net, prevResult typ
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type tester interface {
|
||||||
|
// verifyResult minimally verifies the Result and returns the interface's IP addresses and MAC address
|
||||||
|
verifyResult(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string)
|
||||||
|
}
|
||||||
|
|
||||||
|
type testerBase struct{}
|
||||||
|
|
||||||
|
type testerV10x testerBase
|
||||||
|
type testerV04x testerBase
|
||||||
|
type testerV03x testerBase
|
||||||
|
type testerV01xOr02x testerBase
|
||||||
|
|
||||||
|
func newTesterByVersion(version string) tester {
|
||||||
|
switch {
|
||||||
|
case strings.HasPrefix(version, "1.0."):
|
||||||
|
return &testerV10x{}
|
||||||
|
case strings.HasPrefix(version, "0.4."):
|
||||||
|
return &testerV04x{}
|
||||||
|
case strings.HasPrefix(version, "0.3."):
|
||||||
|
return &testerV03x{}
|
||||||
|
default:
|
||||||
|
return &testerV01xOr02x{}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type resultIP struct {
|
||||||
|
ip string
|
||||||
|
gw string
|
||||||
|
}
|
||||||
|
|
||||||
|
// verifyResult minimally verifies the Result and returns the interface's IP addresses and MAC address
|
||||||
|
func (t *testerV10x) verifyResult(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string) {
|
||||||
|
r, err := types100.GetResult(result)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
|
Expect(r.Interfaces).To(HaveLen(2))
|
||||||
|
Expect(r.Interfaces[0].Name).To(HavePrefix("veth"))
|
||||||
|
Expect(r.Interfaces[0].Mac).To(HaveLen(17))
|
||||||
|
Expect(r.Interfaces[0].Sandbox).To(BeEmpty())
|
||||||
|
Expect(r.Interfaces[1].Name).To(Equal(expectedIfName))
|
||||||
|
Expect(r.Interfaces[1].Sandbox).To(Equal(expectedSandbox))
|
||||||
|
|
||||||
|
Expect(r.DNS).To(Equal(expectedDNS))
|
||||||
|
|
||||||
|
// Grab IPs from container interface
|
||||||
|
ips := []resultIP{}
|
||||||
|
for _, ipc := range r.IPs {
|
||||||
|
if *ipc.Interface == 1 {
|
||||||
|
ips = append(ips, resultIP{
|
||||||
|
ip: ipc.Address.IP.String(),
|
||||||
|
gw: ipc.Gateway.String(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ips, r.Interfaces[1].Mac
|
||||||
|
}
|
||||||
|
|
||||||
|
func verify0403(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string) {
|
||||||
|
r, err := types040.GetResult(result)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
|
Expect(r.Interfaces).To(HaveLen(2))
|
||||||
|
Expect(r.Interfaces[0].Name).To(HavePrefix("veth"))
|
||||||
|
Expect(r.Interfaces[0].Mac).To(HaveLen(17))
|
||||||
|
Expect(r.Interfaces[0].Sandbox).To(BeEmpty())
|
||||||
|
Expect(r.Interfaces[1].Name).To(Equal(expectedIfName))
|
||||||
|
Expect(r.Interfaces[1].Sandbox).To(Equal(expectedSandbox))
|
||||||
|
|
||||||
|
Expect(r.DNS).To(Equal(expectedDNS))
|
||||||
|
|
||||||
|
// Grab IPs from container interface
|
||||||
|
ips := []resultIP{}
|
||||||
|
for _, ipc := range r.IPs {
|
||||||
|
if *ipc.Interface == 1 {
|
||||||
|
ips = append(ips, resultIP{
|
||||||
|
ip: ipc.Address.IP.String(),
|
||||||
|
gw: ipc.Gateway.String(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ips, r.Interfaces[1].Mac
|
||||||
|
}
|
||||||
|
|
||||||
|
// verifyResult minimally verifies the Result and returns the interface's IP addresses and MAC address
|
||||||
|
func (t *testerV04x) verifyResult(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string) {
|
||||||
|
return verify0403(result, expectedIfName, expectedSandbox, expectedDNS)
|
||||||
|
}
|
||||||
|
|
||||||
|
// verifyResult minimally verifies the Result and returns the interface's IP addresses and MAC address
|
||||||
|
func (t *testerV03x) verifyResult(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string) {
|
||||||
|
return verify0403(result, expectedIfName, expectedSandbox, expectedDNS)
|
||||||
|
}
|
||||||
|
|
||||||
|
// verifyResult minimally verifies the Result and returns the interface's IP addresses and MAC address
|
||||||
|
func (t *testerV01xOr02x) verifyResult(result types.Result, expectedIfName, expectedSandbox string, expectedDNS types.DNS) ([]resultIP, string) {
|
||||||
|
r, err := types020.GetResult(result)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
|
ips := []resultIP{}
|
||||||
|
if r.IP4 != nil && r.IP4.IP.IP != nil {
|
||||||
|
ips = append(ips, resultIP{
|
||||||
|
ip: r.IP4.IP.IP.String(),
|
||||||
|
gw: r.IP4.Gateway.String(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
if r.IP6 != nil && r.IP6.IP.IP != nil {
|
||||||
|
ips = append(ips, resultIP{
|
||||||
|
ip: r.IP6.IP.IP.String(),
|
||||||
|
gw: r.IP6.Gateway.String(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// 0.2 and earlier don't return MAC address
|
||||||
|
return ips, ""
|
||||||
|
}
|
||||||
|
|
||||||
var _ = Describe("ptp Operations", func() {
|
var _ = Describe("ptp Operations", func() {
|
||||||
var originalNS ns.NetNS
|
var originalNS, targetNS ns.NetNS
|
||||||
|
var dataDir string
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
// Create a new NetNS so we don't modify the host
|
// Create a new NetNS so we don't modify the host
|
||||||
var err error
|
var err error
|
||||||
originalNS, err = testutils.NewNS()
|
originalNS, err = testutils.NewNS()
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
targetNS, err = testutils.NewNS()
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
|
dataDir, err = ioutil.TempDir("", "ptp_test")
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
})
|
})
|
||||||
|
|
||||||
AfterEach(func() {
|
AfterEach(func() {
|
||||||
|
Expect(os.RemoveAll(dataDir)).To(Succeed())
|
||||||
Expect(originalNS.Close()).To(Succeed())
|
Expect(originalNS.Close()).To(Succeed())
|
||||||
Expect(testutils.UnmountNS(originalNS)).To(Succeed())
|
Expect(testutils.UnmountNS(originalNS)).To(Succeed())
|
||||||
|
Expect(targetNS.Close()).To(Succeed())
|
||||||
|
Expect(testutils.UnmountNS(targetNS)).To(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
doTest := func(conf string, numIPs int, expectedDNSConf types.DNS) {
|
doTest := func(conf, cniVersion string, numIPs int, expectedDNSConf types.DNS, targetNS ns.NetNS) {
|
||||||
const IFNAME = "ptp0"
|
const IFNAME = "ptp0"
|
||||||
|
|
||||||
targetNs, err := testutils.NewNS()
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
defer targetNs.Close()
|
|
||||||
|
|
||||||
args := &skel.CmdArgs{
|
args := &skel.CmdArgs{
|
||||||
ContainerID: "dummy",
|
ContainerID: "dummy",
|
||||||
Netns: targetNs.Path(),
|
Netns: targetNS.Path(),
|
||||||
IfName: IFNAME,
|
IfName: IFNAME,
|
||||||
StdinData: []byte(conf),
|
StdinData: []byte(conf),
|
||||||
}
|
}
|
||||||
|
|
||||||
var resI types.Result
|
var result types.Result
|
||||||
var res *current.Result
|
|
||||||
|
|
||||||
// Execute the plugin with the ADD command, creating the veth endpoints
|
// Execute the plugin with the ADD command, creating the veth endpoints
|
||||||
err = originalNS.Do(func(ns.NetNS) error {
|
err := originalNS.Do(func(ns.NetNS) error {
|
||||||
defer GinkgoRecover()
|
defer GinkgoRecover()
|
||||||
|
|
||||||
resI, _, err = testutils.CmdAddWithArgs(args, func() error {
|
var err error
|
||||||
|
result, _, err = testutils.CmdAddWithArgs(args, func() error {
|
||||||
return cmdAdd(args)
|
return cmdAdd(args)
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
@ -131,32 +258,25 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
res, err = current.NewResultFromResult(resI)
|
t := newTesterByVersion(cniVersion)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
ips, mac := t.verifyResult(result, IFNAME, targetNS.Path(), expectedDNSConf)
|
||||||
|
Expect(len(ips)).To(Equal(numIPs))
|
||||||
|
|
||||||
// Make sure ptp link exists in the target namespace
|
// Make sure ptp link exists in the target namespace
|
||||||
// Then, ping the gateway
|
// Then, ping the gateway
|
||||||
seenIPs := 0
|
err = targetNS.Do(func(ns.NetNS) error {
|
||||||
|
|
||||||
wantMac := ""
|
|
||||||
err = targetNs.Do(func(ns.NetNS) error {
|
|
||||||
defer GinkgoRecover()
|
defer GinkgoRecover()
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
wantMac = link.Attrs().HardwareAddr.String()
|
if mac != "" {
|
||||||
|
Expect(mac).To(Equal(link.Attrs().HardwareAddr.String()))
|
||||||
|
}
|
||||||
|
|
||||||
for _, ipc := range res.IPs {
|
for _, ipc := range ips {
|
||||||
if *ipc.Interface != 1 {
|
fmt.Fprintln(GinkgoWriter, "ping", ipc.ip, "->", ipc.gw)
|
||||||
continue
|
if err := testutils.Ping(ipc.ip, ipc.gw, 30); err != nil {
|
||||||
}
|
return fmt.Errorf("ping %s -> %s failed: %s", ipc.ip, ipc.gw, err)
|
||||||
seenIPs += 1
|
|
||||||
saddr := ipc.Address.IP.String()
|
|
||||||
daddr := ipc.Gateway.String()
|
|
||||||
fmt.Fprintln(GinkgoWriter, "ping", saddr, "->", daddr)
|
|
||||||
|
|
||||||
if err := testutils.Ping(saddr, daddr, 30); err != nil {
|
|
||||||
return fmt.Errorf("ping %s -> %s failed: %s", saddr, daddr, err)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -164,121 +284,6 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
Expect(seenIPs).To(Equal(numIPs))
|
|
||||||
|
|
||||||
// make sure the interfaces are correct
|
|
||||||
Expect(res.Interfaces).To(HaveLen(2))
|
|
||||||
|
|
||||||
Expect(res.Interfaces[0].Name).To(HavePrefix("veth"))
|
|
||||||
Expect(res.Interfaces[0].Mac).To(HaveLen(17))
|
|
||||||
Expect(res.Interfaces[0].Sandbox).To(BeEmpty())
|
|
||||||
|
|
||||||
Expect(res.Interfaces[1].Name).To(Equal(IFNAME))
|
|
||||||
Expect(res.Interfaces[1].Mac).To(Equal(wantMac))
|
|
||||||
Expect(res.Interfaces[1].Sandbox).To(Equal(targetNs.Path()))
|
|
||||||
|
|
||||||
// make sure DNS is correct
|
|
||||||
Expect(res.DNS).To(Equal(expectedDNSConf))
|
|
||||||
|
|
||||||
// Call the plugins with the DEL command, deleting the veth endpoints
|
|
||||||
err = originalNS.Do(func(ns.NetNS) error {
|
|
||||||
defer GinkgoRecover()
|
|
||||||
|
|
||||||
err := testutils.CmdDelWithArgs(args, func() error {
|
|
||||||
return cmdDel(args)
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
// Make sure ptp link has been deleted
|
|
||||||
err = targetNs.Do(func(ns.NetNS) error {
|
|
||||||
defer GinkgoRecover()
|
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
|
||||||
Expect(err).To(HaveOccurred())
|
|
||||||
Expect(link).To(BeNil())
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
}
|
|
||||||
|
|
||||||
doTestv4 := func(conf string, netName string, numIPs int) {
|
|
||||||
const IFNAME = "ptp0"
|
|
||||||
|
|
||||||
targetNs, err := testutils.NewNS()
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
defer targetNs.Close()
|
|
||||||
|
|
||||||
args := &skel.CmdArgs{
|
|
||||||
ContainerID: "dummy",
|
|
||||||
Netns: targetNs.Path(),
|
|
||||||
IfName: IFNAME,
|
|
||||||
StdinData: []byte(conf),
|
|
||||||
}
|
|
||||||
|
|
||||||
var resI types.Result
|
|
||||||
var res *current.Result
|
|
||||||
|
|
||||||
// Execute the plugin with the ADD command, creating the veth endpoints
|
|
||||||
err = originalNS.Do(func(ns.NetNS) error {
|
|
||||||
defer GinkgoRecover()
|
|
||||||
|
|
||||||
resI, _, err = testutils.CmdAddWithArgs(args, func() error {
|
|
||||||
return cmdAdd(args)
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
res, err = current.NewResultFromResult(resI)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
// Make sure ptp link exists in the target namespace
|
|
||||||
// Then, ping the gateway
|
|
||||||
seenIPs := 0
|
|
||||||
|
|
||||||
wantMac := ""
|
|
||||||
err = targetNs.Do(func(ns.NetNS) error {
|
|
||||||
defer GinkgoRecover()
|
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
wantMac = link.Attrs().HardwareAddr.String()
|
|
||||||
|
|
||||||
for _, ipc := range res.IPs {
|
|
||||||
if *ipc.Interface != 1 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
seenIPs += 1
|
|
||||||
saddr := ipc.Address.IP.String()
|
|
||||||
daddr := ipc.Gateway.String()
|
|
||||||
fmt.Fprintln(GinkgoWriter, "ping", saddr, "->", daddr)
|
|
||||||
|
|
||||||
if err := testutils.Ping(saddr, daddr, 30); err != nil {
|
|
||||||
return fmt.Errorf("ping %s -> %s failed: %s", saddr, daddr, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
Expect(seenIPs).To(Equal(numIPs))
|
|
||||||
|
|
||||||
// make sure the interfaces are correct
|
|
||||||
Expect(res.Interfaces).To(HaveLen(2))
|
|
||||||
|
|
||||||
Expect(res.Interfaces[0].Name).To(HavePrefix("veth"))
|
|
||||||
Expect(res.Interfaces[0].Mac).To(HaveLen(17))
|
|
||||||
Expect(res.Interfaces[0].Sandbox).To(BeEmpty())
|
|
||||||
|
|
||||||
Expect(res.Interfaces[1].Name).To(Equal(IFNAME))
|
|
||||||
Expect(res.Interfaces[1].Mac).To(Equal(wantMac))
|
|
||||||
Expect(res.Interfaces[1].Sandbox).To(Equal(targetNs.Path()))
|
|
||||||
|
|
||||||
// call CmdCheck
|
// call CmdCheck
|
||||||
n := &Net{}
|
n := &Net{}
|
||||||
err = json.Unmarshal([]byte(conf), &n)
|
err = json.Unmarshal([]byte(conf), &n)
|
||||||
@ -287,8 +292,7 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
n.IPAM, _, err = allocator.LoadIPAMConfig([]byte(conf), "")
|
n.IPAM, _, err = allocator.LoadIPAMConfig([]byte(conf), "")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
cniVersion := "0.4.0"
|
newConf, err := buildOneConfig(n.Name, cniVersion, n, result)
|
||||||
newConf, err := buildOneConfig(netName, cniVersion, n, resI)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
confString, err := json.Marshal(newConf)
|
confString, err := json.Marshal(newConf)
|
||||||
@ -299,11 +303,13 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
// CNI Check host-device in the target namespace
|
// CNI Check host-device in the target namespace
|
||||||
err = originalNS.Do(func(ns.NetNS) error {
|
err = originalNS.Do(func(ns.NetNS) error {
|
||||||
defer GinkgoRecover()
|
defer GinkgoRecover()
|
||||||
var err error
|
return testutils.CmdCheckWithArgs(args, func() error { return cmdCheck(args) })
|
||||||
err = testutils.CmdCheckWithArgs(args, func() error { return cmdCheck(args) })
|
|
||||||
return err
|
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
if testutils.SpecVersionHasCHECK(cniVersion) {
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
} else {
|
||||||
|
Expect(err).To(MatchError("config version does not allow CHECK"))
|
||||||
|
}
|
||||||
|
|
||||||
args.StdinData = []byte(conf)
|
args.StdinData = []byte(conf)
|
||||||
|
|
||||||
@ -320,7 +326,7 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
// Make sure ptp link has been deleted
|
// Make sure ptp link has been deleted
|
||||||
err = targetNs.Do(func(ns.NetNS) error {
|
err = targetNS.Do(func(ns.NetNS) error {
|
||||||
defer GinkgoRecover()
|
defer GinkgoRecover()
|
||||||
|
|
||||||
link, err := netlink.LinkByName(IFNAME)
|
link, err := netlink.LinkByName(IFNAME)
|
||||||
@ -331,227 +337,200 @@ var _ = Describe("ptp Operations", func() {
|
|||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
}
|
}
|
||||||
|
|
||||||
It("configures and deconfigures a ptp link with ADD/DEL", func() {
|
for _, ver := range testutils.AllSpecVersions {
|
||||||
dnsConf := types.DNS{
|
// Redefine ver inside for scope so real value is picked up by each dynamically defined It()
|
||||||
Nameservers: []string{"10.1.2.123"},
|
// See Gingkgo's "Patterns for dynamically generating tests" documentation.
|
||||||
Domain: "some.domain.test",
|
ver := ver
|
||||||
Search: []string{"search.test"},
|
|
||||||
Options: []string{"option1:foo"},
|
|
||||||
}
|
|
||||||
dnsConfBytes, err := json.Marshal(dnsConf)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
conf := fmt.Sprintf(`{
|
It(fmt.Sprintf("[%s] configures and deconfigures a ptp link with ADD/DEL", ver), func() {
|
||||||
"cniVersion": "0.3.1",
|
dnsConf := types.DNS{
|
||||||
"name": "mynet",
|
Nameservers: []string{"10.1.2.123"},
|
||||||
"type": "ptp",
|
Domain: "some.domain.test",
|
||||||
"ipMasq": true,
|
Search: []string{"search.test"},
|
||||||
"mtu": 5000,
|
Options: []string{"option1:foo"},
|
||||||
"ipam": {
|
}
|
||||||
"type": "host-local",
|
dnsConfBytes, err := json.Marshal(dnsConf)
|
||||||
"subnet": "10.1.2.0/24"
|
|
||||||
},
|
|
||||||
"dns": %s
|
|
||||||
}`, string(dnsConfBytes))
|
|
||||||
|
|
||||||
doTest(conf, 1, dnsConf)
|
|
||||||
})
|
|
||||||
|
|
||||||
It("configures and deconfigures a dual-stack ptp link with ADD/DEL", func() {
|
|
||||||
conf := `{
|
|
||||||
"cniVersion": "0.3.1",
|
|
||||||
"name": "mynet",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"ranges": [
|
|
||||||
[{ "subnet": "10.1.2.0/24"}],
|
|
||||||
[{ "subnet": "2001:db8:1::0/66"}]
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}`
|
|
||||||
|
|
||||||
doTest(conf, 2, types.DNS{})
|
|
||||||
})
|
|
||||||
|
|
||||||
It("does not override IPAM DNS settings if no DNS settings provided", func() {
|
|
||||||
ipamDNSConf := types.DNS{
|
|
||||||
Nameservers: []string{"10.1.2.123"},
|
|
||||||
Domain: "some.domain.test",
|
|
||||||
Search: []string{"search.test"},
|
|
||||||
Options: []string{"option1:foo"},
|
|
||||||
}
|
|
||||||
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
defer os.RemoveAll(resolvConfPath)
|
|
||||||
|
|
||||||
conf := fmt.Sprintf(`{
|
|
||||||
"cniVersion": "0.3.1",
|
|
||||||
"name": "mynet",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"subnet": "10.1.2.0/24",
|
|
||||||
"resolvConf": "%s"
|
|
||||||
}
|
|
||||||
}`, resolvConfPath)
|
|
||||||
|
|
||||||
doTest(conf, 1, ipamDNSConf)
|
|
||||||
})
|
|
||||||
|
|
||||||
It("overrides IPAM DNS settings if any DNS settings provided", func() {
|
|
||||||
ipamDNSConf := types.DNS{
|
|
||||||
Nameservers: []string{"10.1.2.123"},
|
|
||||||
Domain: "some.domain.test",
|
|
||||||
Search: []string{"search.test"},
|
|
||||||
Options: []string{"option1:foo"},
|
|
||||||
}
|
|
||||||
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
defer os.RemoveAll(resolvConfPath)
|
|
||||||
|
|
||||||
for _, ptpDNSConf := range []types.DNS{
|
|
||||||
{
|
|
||||||
Nameservers: []string{"10.1.2.234"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Domain: "someother.domain.test",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Search: []string{"search.elsewhere.test"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Options: []string{"option2:bar"},
|
|
||||||
},
|
|
||||||
} {
|
|
||||||
dnsConfBytes, err := json.Marshal(ptpDNSConf)
|
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
conf := fmt.Sprintf(`{
|
conf := fmt.Sprintf(`{
|
||||||
"cniVersion": "0.3.1",
|
"cniVersion": "%s",
|
||||||
"name": "mynet",
|
"name": "mynet",
|
||||||
"type": "ptp",
|
"type": "ptp",
|
||||||
"ipMasq": true,
|
"ipMasq": true,
|
||||||
"mtu": 5000,
|
"mtu": 5000,
|
||||||
"ipam": {
|
"ipam": {
|
||||||
"type": "host-local",
|
"type": "host-local",
|
||||||
"subnet": "10.1.2.0/24",
|
"subnet": "10.1.2.0/24",
|
||||||
"resolvConf": "%s"
|
"dataDir": "%s"
|
||||||
},
|
},
|
||||||
"dns": %s
|
"dns": %s
|
||||||
}`, resolvConfPath, string(dnsConfBytes))
|
}`, ver, dataDir, string(dnsConfBytes))
|
||||||
|
|
||||||
doTest(conf, 1, ptpDNSConf)
|
doTest(conf, ver, 1, dnsConf, targetNS)
|
||||||
}
|
})
|
||||||
})
|
|
||||||
|
|
||||||
It("overrides IPAM DNS settings if any empty list DNS settings provided", func() {
|
It(fmt.Sprintf("[%s] configures and deconfigures a dual-stack ptp link with ADD/DEL", ver), func() {
|
||||||
ipamDNSConf := types.DNS{
|
conf := fmt.Sprintf(`{
|
||||||
Nameservers: []string{"10.1.2.123"},
|
"cniVersion": "%s",
|
||||||
Domain: "some.domain.test",
|
"name": "mynet",
|
||||||
Search: []string{"search.test"},
|
"type": "ptp",
|
||||||
Options: []string{"option1:foo"},
|
"ipMasq": true,
|
||||||
}
|
"mtu": 5000,
|
||||||
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
"ipam": {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
"type": "host-local",
|
||||||
defer os.RemoveAll(resolvConfPath)
|
"ranges": [
|
||||||
|
[{ "subnet": "10.1.2.0/24"}],
|
||||||
|
[{ "subnet": "2001:db8:1::0/66"}]
|
||||||
|
],
|
||||||
|
"dataDir": "%s"
|
||||||
|
}
|
||||||
|
}`, ver, dataDir)
|
||||||
|
|
||||||
conf := fmt.Sprintf(`{
|
doTest(conf, ver, 2, types.DNS{}, targetNS)
|
||||||
"cniVersion": "0.3.1",
|
})
|
||||||
"name": "mynet",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"subnet": "10.1.2.0/24",
|
|
||||||
"resolvConf": "%s"
|
|
||||||
},
|
|
||||||
"dns": {
|
|
||||||
"nameservers": [],
|
|
||||||
"search": [],
|
|
||||||
"options": []
|
|
||||||
}
|
|
||||||
}`, resolvConfPath)
|
|
||||||
|
|
||||||
doTest(conf, 1, types.DNS{})
|
It(fmt.Sprintf("[%s] does not override IPAM DNS settings if no DNS settings provided", ver), func() {
|
||||||
})
|
ipamDNSConf := types.DNS{
|
||||||
|
Nameservers: []string{"10.1.2.123"},
|
||||||
|
Domain: "some.domain.test",
|
||||||
|
Search: []string{"search.test"},
|
||||||
|
Options: []string{"option1:foo"},
|
||||||
|
}
|
||||||
|
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
defer os.RemoveAll(resolvConfPath)
|
||||||
|
|
||||||
It("deconfigures an unconfigured ptp link with DEL", func() {
|
conf := fmt.Sprintf(`{
|
||||||
const IFNAME = "ptp0"
|
"cniVersion": "%s",
|
||||||
|
"name": "mynet",
|
||||||
|
"type": "ptp",
|
||||||
|
"ipMasq": true,
|
||||||
|
"mtu": 5000,
|
||||||
|
"ipam": {
|
||||||
|
"type": "host-local",
|
||||||
|
"subnet": "10.1.2.0/24",
|
||||||
|
"resolvConf": "%s",
|
||||||
|
"dataDir": "%s"
|
||||||
|
}
|
||||||
|
}`, ver, resolvConfPath, dataDir)
|
||||||
|
|
||||||
conf := fmt.Sprintf(`{
|
doTest(conf, ver, 1, ipamDNSConf, targetNS)
|
||||||
"cniVersion": "%s",
|
})
|
||||||
"name": "mynet",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"subnet": "10.1.2.0/24"
|
|
||||||
}
|
|
||||||
}`, current.ImplementedSpecVersion)
|
|
||||||
|
|
||||||
targetNs, err := testutils.NewNS()
|
It(fmt.Sprintf("[%s] overrides IPAM DNS settings if any DNS settings provided", ver), func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
ipamDNSConf := types.DNS{
|
||||||
defer targetNs.Close()
|
Nameservers: []string{"10.1.2.123"},
|
||||||
|
Domain: "some.domain.test",
|
||||||
|
Search: []string{"search.test"},
|
||||||
|
Options: []string{"option1:foo"},
|
||||||
|
}
|
||||||
|
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
defer os.RemoveAll(resolvConfPath)
|
||||||
|
|
||||||
args := &skel.CmdArgs{
|
for _, ptpDNSConf := range []types.DNS{
|
||||||
ContainerID: "dummy",
|
{
|
||||||
Netns: targetNs.Path(),
|
Nameservers: []string{"10.1.2.234"},
|
||||||
IfName: IFNAME,
|
},
|
||||||
StdinData: []byte(conf),
|
{
|
||||||
}
|
Domain: "someother.domain.test",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Search: []string{"search.elsewhere.test"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Options: []string{"option2:bar"},
|
||||||
|
},
|
||||||
|
} {
|
||||||
|
dnsConfBytes, err := json.Marshal(ptpDNSConf)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
// Call the plugins with the DEL command. It should not error even though the veth doesn't exist.
|
conf := fmt.Sprintf(`{
|
||||||
err = originalNS.Do(func(ns.NetNS) error {
|
"cniVersion": "%s",
|
||||||
defer GinkgoRecover()
|
"name": "mynet",
|
||||||
|
"type": "ptp",
|
||||||
|
"ipMasq": true,
|
||||||
|
"mtu": 5000,
|
||||||
|
"ipam": {
|
||||||
|
"type": "host-local",
|
||||||
|
"subnet": "10.1.2.0/24",
|
||||||
|
"resolvConf": "%s",
|
||||||
|
"dataDir": "%s"
|
||||||
|
},
|
||||||
|
"dns": %s
|
||||||
|
}`, ver, resolvConfPath, dataDir, string(dnsConfBytes))
|
||||||
|
|
||||||
err := testutils.CmdDelWithArgs(args, func() error {
|
doTest(conf, ver, 1, ptpDNSConf, targetNS)
|
||||||
return cmdDel(args)
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
It(fmt.Sprintf("[%s] overrides IPAM DNS settings if any empty list DNS settings provided", ver), func() {
|
||||||
|
ipamDNSConf := types.DNS{
|
||||||
|
Nameservers: []string{"10.1.2.123"},
|
||||||
|
Domain: "some.domain.test",
|
||||||
|
Search: []string{"search.test"},
|
||||||
|
Options: []string{"option1:foo"},
|
||||||
|
}
|
||||||
|
resolvConfPath, err := testutils.TmpResolvConf(ipamDNSConf)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
defer os.RemoveAll(resolvConfPath)
|
||||||
|
|
||||||
|
conf := fmt.Sprintf(`{
|
||||||
|
"cniVersion": "%s",
|
||||||
|
"name": "mynet",
|
||||||
|
"type": "ptp",
|
||||||
|
"ipMasq": true,
|
||||||
|
"mtu": 5000,
|
||||||
|
"ipam": {
|
||||||
|
"type": "host-local",
|
||||||
|
"subnet": "10.1.2.0/24",
|
||||||
|
"dataDir": "%s",
|
||||||
|
"resolvConf": "%s"
|
||||||
|
},
|
||||||
|
"dns": {
|
||||||
|
"nameservers": [],
|
||||||
|
"search": [],
|
||||||
|
"options": []
|
||||||
|
}
|
||||||
|
}`, ver, dataDir, resolvConfPath)
|
||||||
|
|
||||||
|
doTest(conf, ver, 1, types.DNS{}, targetNS)
|
||||||
|
})
|
||||||
|
|
||||||
|
It(fmt.Sprintf("[%s] deconfigures an unconfigured ptp link with DEL", ver), func() {
|
||||||
|
const IFNAME = "ptp0"
|
||||||
|
|
||||||
|
conf := fmt.Sprintf(`{
|
||||||
|
"cniVersion": "%s",
|
||||||
|
"name": "mynet",
|
||||||
|
"type": "ptp",
|
||||||
|
"ipMasq": true,
|
||||||
|
"mtu": 5000,
|
||||||
|
"ipam": {
|
||||||
|
"type": "host-local",
|
||||||
|
"dataDir": "%s",
|
||||||
|
"subnet": "10.1.2.0/24"
|
||||||
|
}
|
||||||
|
}`, ver, dataDir)
|
||||||
|
|
||||||
|
args := &skel.CmdArgs{
|
||||||
|
ContainerID: "dummy",
|
||||||
|
Netns: targetNS.Path(),
|
||||||
|
IfName: IFNAME,
|
||||||
|
StdinData: []byte(conf),
|
||||||
|
}
|
||||||
|
|
||||||
|
// Call the plugins with the DEL command. It should not error even though the veth doesn't exist.
|
||||||
|
err := originalNS.Do(func(ns.NetNS) error {
|
||||||
|
defer GinkgoRecover()
|
||||||
|
|
||||||
|
err := testutils.CmdDelWithArgs(args, func() error {
|
||||||
|
return cmdDel(args)
|
||||||
|
})
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
return nil
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
return nil
|
|
||||||
})
|
})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
}
|
||||||
})
|
|
||||||
|
|
||||||
It("configures and deconfigures a CNI V4 ptp link with ADD/DEL", func() {
|
|
||||||
conf := `{
|
|
||||||
"cniVersion": "0.4.0",
|
|
||||||
"name": "ptpNetv4",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"subnet": "10.1.2.0/24"
|
|
||||||
}
|
|
||||||
}`
|
|
||||||
|
|
||||||
doTestv4(conf, "ptpNetv4", 1)
|
|
||||||
})
|
|
||||||
|
|
||||||
It("configures and deconfigures a CNI V4 dual-stack ptp link with ADD/DEL", func() {
|
|
||||||
conf := `{
|
|
||||||
"cniVersion": "0.4.0",
|
|
||||||
"name": "ptpNetv4ds",
|
|
||||||
"type": "ptp",
|
|
||||||
"ipMasq": true,
|
|
||||||
"mtu": 5000,
|
|
||||||
"ipam": {
|
|
||||||
"type": "host-local",
|
|
||||||
"ranges": [
|
|
||||||
[{ "subnet": "10.1.2.0/24"}],
|
|
||||||
[{ "subnet": "2001:db8:1::0/66"}]
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}`
|
|
||||||
|
|
||||||
doTestv4(conf, "ptpNetv4ds", 2)
|
|
||||||
})
|
|
||||||
})
|
})
|
||||||
|
Loading…
x
Reference in New Issue
Block a user