123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package util
- import (
- "context"
- "net"
- "testing"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/apimachinery/pkg/util/sets"
- fake "k8s.io/kubernetes/pkg/proxy/util/testing"
- )
- func TestIsProxyableIP(t *testing.T) {
- testCases := []struct {
- ip string
- want error
- }{
- {"127.0.0.1", ErrAddressNotAllowed},
- {"127.0.0.2", ErrAddressNotAllowed},
- {"169.254.169.254", ErrAddressNotAllowed},
- {"169.254.1.1", ErrAddressNotAllowed},
- {"224.0.0.0", ErrAddressNotAllowed},
- {"10.0.0.1", nil},
- {"192.168.0.1", nil},
- {"172.16.0.1", nil},
- {"8.8.8.8", nil},
- {"::1", ErrAddressNotAllowed},
- {"fe80::", ErrAddressNotAllowed},
- {"ff02::", ErrAddressNotAllowed},
- {"ff01::", ErrAddressNotAllowed},
- {"2600::", nil},
- {"1", ErrAddressNotAllowed},
- {"", ErrAddressNotAllowed},
- }
- for i := range testCases {
- got := IsProxyableIP(testCases[i].ip)
- if testCases[i].want != got {
- t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
- }
- }
- }
- type dummyResolver struct {
- ips []string
- err error
- }
- func (r *dummyResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error) {
- if r.err != nil {
- return nil, r.err
- }
- resp := []net.IPAddr{}
- for _, ipString := range r.ips {
- resp = append(resp, net.IPAddr{IP: net.ParseIP(ipString)})
- }
- return resp, nil
- }
- func TestIsProxyableHostname(t *testing.T) {
- testCases := []struct {
- hostname string
- ips []string
- want error
- }{
- {"k8s.io", []string{}, ErrNoAddresses},
- {"k8s.io", []string{"8.8.8.8"}, nil},
- {"k8s.io", []string{"169.254.169.254"}, ErrAddressNotAllowed},
- {"k8s.io", []string{"127.0.0.1", "8.8.8.8"}, ErrAddressNotAllowed},
- }
- for i := range testCases {
- resolv := dummyResolver{ips: testCases[i].ips}
- got := IsProxyableHostname(context.Background(), &resolv, testCases[i].hostname)
- if testCases[i].want != got {
- t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
- }
- }
- }
- func TestShouldSkipService(t *testing.T) {
- testCases := []struct {
- service *v1.Service
- svcName types.NamespacedName
- shouldSkip bool
- }{
- {
- // Cluster IP is None
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: v1.ClusterIPNone,
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: true,
- },
- {
- // Cluster IP is empty
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: "",
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: true,
- },
- {
- // ExternalName type service
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: "1.2.3.4",
- Type: v1.ServiceTypeExternalName,
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: true,
- },
- {
- // ClusterIP type service with ClusterIP set
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: "1.2.3.4",
- Type: v1.ServiceTypeClusterIP,
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: false,
- },
- {
- // NodePort type service with ClusterIP set
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: "1.2.3.4",
- Type: v1.ServiceTypeNodePort,
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: false,
- },
- {
- // LoadBalancer type service with ClusterIP set
- service: &v1.Service{
- ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
- Spec: v1.ServiceSpec{
- ClusterIP: "1.2.3.4",
- Type: v1.ServiceTypeLoadBalancer,
- },
- },
- svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
- shouldSkip: false,
- },
- }
- for i := range testCases {
- skip := ShouldSkipService(testCases[i].svcName, testCases[i].service)
- if skip != testCases[i].shouldSkip {
- t.Errorf("case %d: expect %v, got %v", i, testCases[i].shouldSkip, skip)
- }
- }
- }
- type InterfaceAddrsPair struct {
- itf net.Interface
- addrs []net.Addr
- }
- func TestGetNodeAddressses(t *testing.T) {
- testCases := []struct {
- cidrs []string
- nw *fake.FakeNetwork
- itfAddrsPairs []InterfaceAddrsPair
- expected sets.String
- }{
- { // case 0
- cidrs: []string{"10.20.30.0/24"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
- },
- {
- itf: net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
- },
- },
- expected: sets.NewString("10.20.30.51"),
- },
- { // case 1
- cidrs: []string{"0.0.0.0/0"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
- },
- },
- expected: sets.NewString("0.0.0.0/0"),
- },
- { // case 2
- cidrs: []string{"2001:db8::/32", "::1/128"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
- },
- },
- expected: sets.NewString("2001:db8::1", "::1"),
- },
- { // case 3
- cidrs: []string{"::/0"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
- },
- },
- expected: sets.NewString("::/0"),
- },
- { // case 4
- cidrs: []string{"127.0.0.1/32"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
- },
- },
- expected: sets.NewString("127.0.0.1"),
- },
- { // case 5
- cidrs: []string{"127.0.0.0/8"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "127.0.1.1/8"}},
- },
- },
- expected: sets.NewString("127.0.1.1"),
- },
- { // case 6
- cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
- },
- {
- itf: net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
- },
- },
- expected: sets.NewString("10.20.30.51", "100.200.201.1"),
- },
- { // case 7
- cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
- },
- },
- expected: sets.NewString(),
- },
- { // case 8
- cidrs: []string{},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
- },
- },
- expected: sets.NewString("0.0.0.0/0", "::/0"),
- },
- { // case 9
- cidrs: []string{},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
- },
- },
- expected: sets.NewString("0.0.0.0/0", "::/0"),
- },
- { // case 9
- cidrs: []string{"1.2.3.0/24", "0.0.0.0/0"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
- },
- },
- expected: sets.NewString("0.0.0.0/0"),
- },
- { // case 10
- cidrs: []string{"0.0.0.0/0", "1.2.3.0/24", "::1/128"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
- },
- },
- expected: sets.NewString("0.0.0.0/0", "::1"),
- },
- { // case 11
- cidrs: []string{"::/0", "1.2.3.0/24", "::1/128"},
- nw: fake.NewFakeNetwork(),
- itfAddrsPairs: []InterfaceAddrsPair{
- {
- itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
- },
- {
- itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
- addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
- },
- },
- expected: sets.NewString("::/0", "1.2.3.4"),
- },
- }
- for i := range testCases {
- for _, pair := range testCases[i].itfAddrsPairs {
- testCases[i].nw.AddInterfaceAddr(&pair.itf, pair.addrs)
- }
- addrList, err := GetNodeAddresses(testCases[i].cidrs, testCases[i].nw)
- if err != nil {
- t.Errorf("case [%d], unexpected error: %v", i, err)
- }
- if !addrList.Equal(testCases[i].expected) {
- t.Errorf("case [%d], unexpected mismatch, expected: %v, got: %v", i, testCases[i].expected, addrList)
- }
- }
- }
- func TestAppendPortIfNeeded(t *testing.T) {
- testCases := []struct {
- name string
- addr string
- port int32
- expect string
- }{
- {
- name: "IPv4 all-zeros bind address has port",
- addr: "0.0.0.0:12345",
- port: 23456,
- expect: "0.0.0.0:12345",
- },
- {
- name: "non-zeros IPv4 config",
- addr: "9.8.7.6",
- port: 12345,
- expect: "9.8.7.6:12345",
- },
- {
- name: "IPv6 \"[::]\" bind address has port",
- addr: "[::]:12345",
- port: 23456,
- expect: "[::]:12345",
- },
- {
- name: "IPv6 config",
- addr: "fd00:1::5",
- port: 23456,
- expect: "[fd00:1::5]:23456",
- },
- {
- name: "Invalid IPv6 Config",
- addr: "[fd00:1::5]",
- port: 12345,
- expect: "[fd00:1::5]",
- },
- }
- for i := range testCases {
- got := AppendPortIfNeeded(testCases[i].addr, testCases[i].port)
- if testCases[i].expect != got {
- t.Errorf("case %s: expected %v, got %v", testCases[i].name, testCases[i].expect, got)
- }
- }
- }
|