Skip to content

Commit f449e62

Browse files
committed
mgmtfn/k8splugin: add network setup unit test
Signed-off-by: Cristian Staretu <[email protected]>
1 parent e406b3d commit f449e62

File tree

2 files changed

+259
-37
lines changed

2 files changed

+259
-37
lines changed

mgmtfn/k8splugin/driver_test.go

+215
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,215 @@
1+
/***
2+
Copyright 2016 Cisco Systems Inc. All rights reserved.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
http://www.apache.org/licenses/LICENSE-2.0
8+
9+
Unless required by applicable law or agreed to in writing, software
10+
distributed under the License is distributed on an "AS IS" BASIS,
11+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
See the License for the specific language governing permissions and
13+
limitations under the License.
14+
*/
15+
16+
package k8splugin
17+
18+
import (
19+
"fmt"
20+
"net"
21+
"os/exec"
22+
"runtime"
23+
24+
"github.com/vishvananda/netlink"
25+
"github.com/vishvananda/netns"
26+
. "gopkg.in/check.v1"
27+
)
28+
29+
type NetSetup struct {
30+
newNS netns.NsHandle
31+
globalNS netns.NsHandle
32+
pid int
33+
cmd *exec.Cmd
34+
ifName string
35+
link netlink.Link
36+
}
37+
38+
var _ = Suite(&NetSetup{})
39+
40+
func (s *NetSetup) SetUpTest(c *C) {
41+
la := netlink.NewLinkAttrs()
42+
s.ifName = "testlinkfoo"
43+
la.Name = s.ifName
44+
runtime.LockOSThread()
45+
locked := true
46+
defer func() {
47+
if locked {
48+
runtime.UnlockOSThread()
49+
}
50+
}()
51+
52+
globalNS, err := netns.Get()
53+
if err != nil {
54+
c.Fatalf("failed to get the global network namespace: %v", err)
55+
}
56+
s.globalNS = globalNS
57+
defer func() {
58+
netns.Set(globalNS)
59+
}()
60+
61+
newNS, err := netns.New()
62+
if err != nil {
63+
c.Fatal("failed to create new network namespace")
64+
}
65+
s.newNS = newNS
66+
67+
cmd := exec.Command("sleep", "infinity")
68+
if err = cmd.Start(); err != nil {
69+
c.Fatalf("failed to start the 'sleep 9999' process: %v", err)
70+
}
71+
s.cmd = cmd
72+
73+
s.pid = cmd.Process.Pid
74+
75+
if err = netns.Set(globalNS); err != nil {
76+
c.Fatalf("failed to return to the global netns: %v", err)
77+
}
78+
79+
// the rest of the code should run without a locked thread
80+
if locked {
81+
runtime.UnlockOSThread()
82+
locked = false
83+
}
84+
85+
dummy := &netlink.Dummy{LinkAttrs: la}
86+
if err := netlink.LinkAdd(dummy); err != nil {
87+
c.Fatalf("failed to add dummy interface: %v", err)
88+
}
89+
90+
link, err := netlink.LinkByName(la.Name)
91+
if err != nil {
92+
c.Fatalf("failed to get interface by name: %v", err)
93+
}
94+
s.link = link
95+
96+
netIf, err := net.InterfaceByName(la.Name)
97+
if err != nil {
98+
c.Fatalf("InterfaceByName failed: %v", err)
99+
}
100+
101+
if netIf.Flags&net.FlagUp != 0 {
102+
c.Fatalf("expected interface to be down, but it's up")
103+
}
104+
}
105+
106+
func (s *NetSetup) TearDownTest(c *C) {
107+
s.newNS.Close()
108+
s.cmd.Process.Kill()
109+
netns.Set(s.globalNS)
110+
s.globalNS.Close()
111+
netlink.LinkDel(s.link)
112+
}
113+
114+
func (s *NetSetup) TestNetSetup(c *C) {
115+
newName := "testlinknewname"
116+
address := "192.168.68.68/24"
117+
defGW := "192.168.68.1"
118+
staticRoute := "192.168.32.0/24"
119+
120+
if err := setIfAttrs(s.pid, s.ifName, address, newName); err != nil {
121+
c.Fatalf("setIfAttrs failed: %v", err)
122+
}
123+
124+
if err := setDefGw(s.pid, defGW, newName); err != nil {
125+
c.Fatalf("setDefGw failed: %v", err)
126+
}
127+
128+
if err := addStaticRoute(s.pid, staticRoute, newName); err != nil {
129+
c.Fatalf("addStaticRoute failed: %v", err)
130+
}
131+
132+
// check if the interface still has its old name & is in globalNS
133+
if _, err := netlink.LinkByName(s.ifName); err == nil {
134+
c.Fatal("interface wasn't moved to the namespace")
135+
}
136+
137+
// check if the interface has been renamed & is in globalNS
138+
if _, err := netlink.LinkByName(newName); err == nil {
139+
c.Fatal("interface wasn't moved to the namespace")
140+
}
141+
142+
runtime.LockOSThread()
143+
defer runtime.UnlockOSThread()
144+
145+
if err := netns.Set(s.newNS); err != nil {
146+
c.Fatalf("failed to enter the new network namespace: %v", err)
147+
}
148+
149+
// ensure the interface's name has been changed
150+
newLink, err := netlink.LinkByName(newName)
151+
if err != nil {
152+
c.Fatalf("failed to get interface by name: %v", err)
153+
}
154+
defer netlink.LinkDel(newLink)
155+
156+
// ensure that the interface's IP address has been set properly
157+
addresses, err := netlink.AddrList(newLink, netlink.FAMILY_V4)
158+
ifAddr := addresses[0].IPNet.String()
159+
if address != ifAddr {
160+
c.Errorf("expected IP address %v, found: %v", address, ifAddr)
161+
}
162+
163+
netIf, err := net.InterfaceByName(newName)
164+
if err != nil {
165+
c.Errorf("InterfaceByName failed: %v", err)
166+
}
167+
168+
// ensure the default gateway route has been set properly
169+
routes, err := netlink.RouteList(newLink, netlink.FAMILY_V4)
170+
if err != nil {
171+
c.Errorf("failed to fetch routes")
172+
}
173+
174+
foundDefaultGW := false
175+
foundStaticRoute := false
176+
for _, route := range routes {
177+
gw := route.Gw.String()
178+
if gw != defGW {
179+
continue
180+
}
181+
if route.Dst != nil {
182+
c.Errorf("expected nil GW Dst, found: %v", route.Dst)
183+
}
184+
if route.Src != nil {
185+
c.Errorf("expected nil GW Src, found: %v", route.Dst)
186+
}
187+
foundDefaultGW = true
188+
}
189+
if !foundDefaultGW {
190+
c.Error("couldn't find default gateway")
191+
}
192+
193+
for _, route := range routes {
194+
dst := fmt.Sprintf("%v", route.Dst)
195+
if dst != staticRoute {
196+
continue
197+
}
198+
if route.Gw != nil {
199+
c.Errorf("expected nil gateway, found: %v", route.Gw)
200+
}
201+
if route.Src != nil {
202+
c.Errorf("expected nil source, found: %v", route.Dst)
203+
}
204+
foundStaticRoute = true
205+
}
206+
207+
if !foundStaticRoute {
208+
c.Error("couldn't find static route")
209+
}
210+
211+
// ensure that the interface is up
212+
if netIf.Flags&net.FlagUp == 0 {
213+
c.Errorf("expected interface to be up, but it's down")
214+
}
215+
}

mgmtfn/k8splugin/kubeClient_test.go

+44-37
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ import (
2222
"io/ioutil"
2323
"net/http"
2424
"net/http/httputil"
25-
"os"
2625
osexec "os/exec"
2726
"strings"
2827
"testing"
@@ -32,6 +31,7 @@ import (
3231
"github.com/contiv/netplugin/core"
3332
"github.com/contiv/netplugin/netplugin/plugin"
3433
"github.com/gorilla/mux"
34+
. "gopkg.in/check.v1"
3535
)
3636

3737
const (
@@ -344,7 +344,7 @@ func epWatch(r *http.Request, iter int) (interface{}, bool, error) {
344344
}
345345

346346
// setupTestServer creates a listener for the rest requests.
347-
func setupTestServer(m *testing.M) {
347+
func setupTestServer(c *C) {
348348

349349
// Read client cert
350350
cert, err := tls.LoadX509KeyPair("/tmp/certs/server.crt", "/tmp/certs/server.key")
@@ -405,7 +405,7 @@ func setupTestServer(m *testing.M) {
405405
log.Fatalf("Kube server not ready after 5 sec")
406406
}
407407

408-
func setupCerts(m *testing.M) {
408+
func setupCerts(c *C) {
409409
_, err := osexec.Command("mkdir", "-p", contivKubeCfgDir).CombinedOutput()
410410
if err != nil {
411411
log.Fatalf("mkdir failed: %v", err)
@@ -419,43 +419,50 @@ func setupCerts(m *testing.M) {
419419
}
420420
}
421421

422-
// TestMain sets up a fake kube server to enable testing the client
423-
func TestMain(m *testing.M) {
424-
setupCerts(m)
425-
setupTestServer(m)
426-
os.Exit(m.Run())
427-
}
428-
429-
func verifySvc(m *testing.T, drv *KubeTestNetDrv) {
422+
func verifySvc(c *C, drv *KubeTestNetDrv) {
430423
ls, ok := drv.services["LipService"]
431424
if !ok {
432-
m.Errorf("Service was not correctly updated on client")
425+
c.Errorf("Service was not correctly updated on client")
433426
} else {
434-
m.Logf("service: %+v", ls)
427+
c.Logf("service: %+v", ls)
435428
if ls.IPAddress != testClusterIP {
436-
m.Errorf("ClusterIP is incorrect")
429+
c.Errorf("ClusterIP is incorrect")
437430
}
438431

439432
if len(ls.Ports) != 1 {
440-
m.Errorf("Noumber of ports is incorrect")
433+
c.Errorf("Noumber of ports is incorrect")
441434
}
442435

443436
if ls.Ports[0].Protocol != "TCP" {
444-
m.Errorf("Protocol is incorrect")
437+
c.Errorf("Protocol is incorrect")
445438
}
446439

447440
if ls.Ports[0].SvcPort != testSvcPort {
448-
m.Errorf("Svc port is incorrect")
441+
c.Errorf("Svc port is incorrect")
449442
}
450443

451444
if ls.Ports[0].ProvPort != testTgtPort {
452-
m.Errorf("Prov port is incorrect")
445+
c.Errorf("Prov port is incorrect")
453446
}
454447
}
455448
}
456449

450+
func Test(t *testing.T) {
451+
TestingT(t)
452+
}
453+
454+
type TestKube struct{}
455+
456+
var _ = Suite(&TestKube{})
457+
458+
// sets up a fake kube server to enable testing the client
459+
func (s *TestKube) SetUpSuite(c *C) {
460+
setupCerts(c)
461+
setupTestServer(c)
462+
}
463+
457464
// TestKubeWatch tests the watch interface
458-
func TestKubeWatch(m *testing.T) {
465+
func (s *TestKube) TestKubeWatch(c *C) {
459466
drv := &KubeTestNetDrv{}
460467
np := &plugin.NetPlugin{
461468
NetworkDriver: drv,
@@ -465,64 +472,64 @@ func TestKubeWatch(m *testing.T) {
465472
totalEPResp = 0
466473

467474
InitKubServiceWatch(np)
468-
m.Logf("--ADD--")
475+
c.Logf("--ADD--")
469476
maxEPResp = 0
470477
maxSvcResp = 1
471478
for ix := 0; ix < 2; ix++ {
472479
time.Sleep(time.Second)
473480
}
474-
m.Logf("Drv: %+v", drv)
481+
c.Logf("Drv: %+v", drv)
475482
if drv.numAddSvc != 1 {
476-
m.Errorf("Add service was not seen by client")
483+
c.Errorf("Add service was not seen by client")
477484
} else {
478-
m.Logf("Add service seen by client, as expected")
485+
c.Logf("Add service seen by client, as expected")
479486
}
480487

481-
verifySvc(m, drv)
488+
verifySvc(c, drv)
482489

483490
if len(drv.providers) != 0 {
484-
m.Errorf("Provider list is incorrect")
491+
c.Errorf("Provider list is incorrect")
485492

486493
}
487494

488-
m.Logf("--DEL--")
495+
c.Logf("--DEL--")
489496
maxEPResp = 0
490497
maxSvcResp = 2
491498
for ix := 0; ix < 3; ix++ {
492499
time.Sleep(time.Second)
493500
}
494-
m.Logf("Drv: %+v", drv)
501+
c.Logf("Drv: %+v", drv)
495502
if drv.numDelSvc != 1 {
496-
m.Errorf("Del service was not seen by client")
503+
c.Errorf("Del service was not seen by client")
497504
} else {
498-
m.Logf("Del service seen by client, as expected")
505+
c.Logf("Del service seen by client, as expected")
499506
}
500507

501508
_, ok := drv.services["LipService"]
502509
if ok {
503-
m.Errorf("Service was not deleted on client")
510+
c.Errorf("Service was not deleted on client")
504511
}
505512

506-
m.Logf("--CLOSE--")
513+
c.Logf("--CLOSE--")
507514
maxEPResp = 6
508515
maxSvcResp = 4
509516
for ix := 0; ix < 8; ix++ {
510517
time.Sleep(time.Second)
511518
}
512-
m.Logf("Drv: %+v", drv)
513-
m.Logf("services: %+v", drv.services["LipService"])
519+
c.Logf("Drv: %+v", drv)
520+
c.Logf("services: %+v", drv.services["LipService"])
514521
if (drv.numAddSvc != 3) || (drv.numDelSvc != 1) || (drv.numProvUpd != 6) {
515-
m.Errorf("All updates were not seen by client")
522+
c.Errorf("All updates were not seen by client")
516523
}
517524

518-
verifySvc(m, drv)
525+
verifySvc(c, drv)
519526

520527
provs, ok := drv.providers["LipService"]
521528
if !ok {
522-
m.Errorf("Providers were not updated on client")
529+
c.Errorf("Providers were not updated on client")
523530
} else {
524531
if len(provs) != 2 {
525-
m.Errorf("Providers were not updated correctly on client")
532+
c.Errorf("Providers were not updated correctly on client")
526533
}
527534
}
528535
}

0 commit comments

Comments
 (0)