ipset_test.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246
  1. /*
  2. Copyright 2017 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package ipvs
  14. import (
  15. "testing"
  16. utilipset "k8s.io/kubernetes/pkg/util/ipset"
  17. fakeipset "k8s.io/kubernetes/pkg/util/ipset/testing"
  18. )
  19. func TestCheckIPSetVersion(t *testing.T) {
  20. testCases := []struct {
  21. name string
  22. vstring string
  23. valid bool
  24. }{
  25. {"4.0 < 6.0 is invalid", "4.0", false},
  26. {"5.1 < 6.0 is invalid", "5.1", false},
  27. {"5.2 < 6.0 is invalid", "5.1.2", false},
  28. {"7 is not a valid version", "7", false},
  29. {"6.0 is valid since >= 6.0", "6.0", true},
  30. {"6.1 is valid since >= 6.0", "6.1", true},
  31. {"6.19 is valid since >= 6.0", "6.19", true},
  32. {"7.0 is valid since >= 6.0", "7.0", true},
  33. {"8.1.2 is valid since >= 6.0", "8.1.2", true},
  34. {"9.3.4.0 is valid since >= 6.0", "9.3.4.0", true},
  35. {"not a valid semantic version", "total junk", false},
  36. }
  37. for _, testCase := range testCases {
  38. t.Run(testCase.name, func(t *testing.T) {
  39. valid := checkMinVersion(testCase.vstring)
  40. if testCase.valid != valid {
  41. t.Errorf("Expected result: %v, Got result: %v", testCase.valid, valid)
  42. }
  43. })
  44. }
  45. }
  46. const testIPSetVersion = "v6.19"
  47. func TestSyncIPSetEntries(t *testing.T) {
  48. testCases := []struct {
  49. name string
  50. set *utilipset.IPSet
  51. setType utilipset.Type
  52. ipv6 bool
  53. activeEntries []string
  54. currentEntries []string
  55. expectedEntries []string
  56. }{
  57. {
  58. name: "normal ipset sync",
  59. set: &utilipset.IPSet{
  60. Name: "foo",
  61. },
  62. setType: utilipset.HashIPPort,
  63. ipv6: false,
  64. activeEntries: []string{"172.17.0.4,tcp:80"},
  65. currentEntries: nil,
  66. expectedEntries: []string{"172.17.0.4,tcp:80"},
  67. },
  68. {
  69. name: "ipset IPv6 sync with no new entries",
  70. set: &utilipset.IPSet{
  71. Name: "abz",
  72. },
  73. setType: utilipset.HashIPPort,
  74. ipv6: true,
  75. activeEntries: []string{"FE80::0202:B3FF:FE1E:8329,tcp:80"},
  76. currentEntries: []string{"FE80::0202:B3FF:FE1E:8329,tcp:80"},
  77. expectedEntries: []string{"FE80::0202:B3FF:FE1E:8329,tcp:80"},
  78. },
  79. {
  80. name: "ipset sync with updated udp->tcp in hash",
  81. set: &utilipset.IPSet{
  82. Name: "bca",
  83. },
  84. setType: utilipset.HashIPPort,
  85. ipv6: false,
  86. activeEntries: []string{"172.17.0.4,tcp:80", "172.17.0.5,tcp:80"},
  87. currentEntries: []string{"172.17.0.5,udp:53"},
  88. expectedEntries: []string{"172.17.0.4,tcp:80", "172.17.0.5,tcp:80"},
  89. },
  90. {
  91. name: "ipset sync no updates required",
  92. set: &utilipset.IPSet{
  93. Name: "bar",
  94. },
  95. setType: utilipset.HashIPPortIP,
  96. ipv6: false,
  97. activeEntries: []string{"172.17.0.4,tcp:80:172.17.0.4"},
  98. currentEntries: []string{"172.17.0.4,tcp:80:172.17.0.4"},
  99. expectedEntries: []string{"172.17.0.4,tcp:80:172.17.0.4"},
  100. },
  101. {
  102. name: "ipset IPv6 sync, delete and add new entry",
  103. set: &utilipset.IPSet{
  104. Name: "baz",
  105. },
  106. setType: utilipset.HashIPPortIP,
  107. ipv6: true,
  108. activeEntries: []string{"FE80:0000:0000:0000:0202:B3FF:FE1E:8329,tcp:8080:FE80:0000:0000:0000:0202:B3FF:FE1E:8329"},
  109. currentEntries: []string{"1111:0000:0000:0000:0202:B3FF:FE1E:8329,tcp:8081:1111:0000:0000:0000:0202:B3FF:FE1E:8329:8081"},
  110. expectedEntries: []string{"FE80:0000:0000:0000:0202:B3FF:FE1E:8329,tcp:8080:FE80:0000:0000:0000:0202:B3FF:FE1E:8329"},
  111. },
  112. {
  113. name: "ipset sync, no current entries",
  114. set: &utilipset.IPSet{
  115. Name: "NOPE",
  116. },
  117. setType: utilipset.HashIPPortIP,
  118. ipv6: false,
  119. activeEntries: []string{"172.17.0.4,tcp:80,172.17.0.9", "172.17.0.5,tcp:80,172.17.0.10"},
  120. currentEntries: nil,
  121. expectedEntries: []string{"172.17.0.4,tcp:80,172.17.0.9", "172.17.0.5,tcp:80,172.17.0.10"},
  122. },
  123. {
  124. name: "ipset sync, no current entries with /16 subnet",
  125. set: &utilipset.IPSet{
  126. Name: "ABC-DEF",
  127. },
  128. setType: utilipset.HashIPPortNet,
  129. ipv6: false,
  130. activeEntries: []string{"172.17.0.4,tcp:80,172.17.0.0/16", "172.17.0.5,tcp:80,172.17.0.0/16"},
  131. currentEntries: nil,
  132. expectedEntries: []string{"172.17.0.4,tcp:80,172.17.0.0/16", "172.17.0.5,tcp:80,172.17.0.0/16"},
  133. },
  134. {
  135. name: "ipset IPv6 sync, no updates required with /32 subnet",
  136. set: &utilipset.IPSet{
  137. Name: "zar",
  138. },
  139. setType: utilipset.HashIPPortNet,
  140. ipv6: true,
  141. activeEntries: []string{"FE80::8329,tcp:8800,2001:db8::/32"},
  142. currentEntries: []string{"FE80::8329,tcp:8800,2001:db8::/32"},
  143. expectedEntries: []string{"FE80::8329,tcp:8800,2001:db8::/32"},
  144. },
  145. {
  146. name: "ipset IPv6 sync, current entries removed",
  147. set: &utilipset.IPSet{
  148. Name: "bbb",
  149. },
  150. setType: utilipset.HashIPPortNet,
  151. ipv6: true,
  152. activeEntries: nil,
  153. currentEntries: []string{"FE80::8329,udp:8801,2001:db8::/32"},
  154. expectedEntries: nil,
  155. },
  156. {
  157. name: "ipset sync, port entry removed",
  158. set: &utilipset.IPSet{
  159. Name: "AAA",
  160. },
  161. setType: utilipset.BitmapPort,
  162. activeEntries: nil,
  163. currentEntries: []string{"80"},
  164. expectedEntries: nil,
  165. },
  166. {
  167. name: "ipset sync, remove old and add new",
  168. set: &utilipset.IPSet{
  169. Name: "c-c-c",
  170. },
  171. setType: utilipset.BitmapPort,
  172. activeEntries: []string{"8080", "9090"},
  173. currentEntries: []string{"80"},
  174. expectedEntries: []string{"8080", "9090"},
  175. },
  176. {
  177. name: "ipset sync, remove many stale ports",
  178. set: &utilipset.IPSet{
  179. Name: "NODE-PORT",
  180. },
  181. setType: utilipset.BitmapPort,
  182. activeEntries: []string{"8080"},
  183. currentEntries: []string{"80", "9090", "8081", "8082"},
  184. expectedEntries: []string{"8080"},
  185. },
  186. {
  187. name: "ipset sync, add sctp entry",
  188. set: &utilipset.IPSet{
  189. Name: "sctp-1",
  190. },
  191. setType: utilipset.HashIPPort,
  192. ipv6: false,
  193. activeEntries: []string{"172.17.0.4,sctp:80"},
  194. currentEntries: nil,
  195. expectedEntries: []string{"172.17.0.4,sctp:80"},
  196. },
  197. {
  198. name: "ipset sync, add IPV6 sctp entry",
  199. set: &utilipset.IPSet{
  200. Name: "sctp-2",
  201. },
  202. setType: utilipset.HashIPPort,
  203. ipv6: true,
  204. activeEntries: []string{"FE80::0202:B3FF:FE1E:8329,sctp:80"},
  205. currentEntries: []string{"FE80::0202:B3FF:FE1E:8329,sctp:80"},
  206. expectedEntries: []string{"FE80::0202:B3FF:FE1E:8329,sctp:80"},
  207. },
  208. }
  209. for _, testCase := range testCases {
  210. t.Run(testCase.name, func(t *testing.T) {
  211. set := NewIPSet(fakeipset.NewFake(testIPSetVersion), testCase.set.Name, testCase.setType, testCase.ipv6, "comment-"+testCase.set.Name)
  212. if err := set.handle.CreateSet(&set.IPSet, true); err != nil {
  213. t.Errorf("Unexpected error: %v", err)
  214. }
  215. for _, entry := range testCase.currentEntries {
  216. set.handle.AddEntry(entry, testCase.set, true)
  217. }
  218. set.activeEntries.Insert(testCase.activeEntries...)
  219. set.syncIPSetEntries()
  220. for _, entry := range testCase.expectedEntries {
  221. found, err := set.handle.TestEntry(entry, testCase.set.Name)
  222. if err != nil {
  223. t.Errorf("Unexpected error: %v", err)
  224. }
  225. if !found {
  226. t.Errorf("Unexpected entry %q not found in set foo", entry)
  227. }
  228. }
  229. })
  230. }
  231. }