123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380 |
- // +build !windows
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package app
- import (
- "fmt"
- "reflect"
- "testing"
- proxyconfigapi "k8s.io/kubernetes/pkg/proxy/apis/config"
- "k8s.io/kubernetes/pkg/proxy/ipvs"
- proxyutiliptables "k8s.io/kubernetes/pkg/proxy/util/iptables"
- utiliptables "k8s.io/kubernetes/pkg/util/iptables"
- utiliptablestest "k8s.io/kubernetes/pkg/util/iptables/testing"
- )
- type fakeIPSetVersioner struct {
- version string // what to return
- err error // what to return
- }
- func (fake *fakeIPSetVersioner) GetVersion() (string, error) {
- return fake.version, fake.err
- }
- type fakeKernelCompatTester struct {
- ok bool
- }
- func (fake *fakeKernelCompatTester) IsCompatible() error {
- if !fake.ok {
- return fmt.Errorf("error")
- }
- return nil
- }
- // fakeKernelHandler implements KernelHandler.
- type fakeKernelHandler struct {
- modules []string
- kernelVersion string
- }
- func (fake *fakeKernelHandler) GetModules() ([]string, error) {
- return fake.modules, nil
- }
- func (fake *fakeKernelHandler) GetKernelVersion() (string, error) {
- return fake.kernelVersion, nil
- }
- func Test_getProxyMode(t *testing.T) {
- var cases = []struct {
- flag string
- ipsetVersion string
- kmods []string
- kernelVersion string
- kernelCompat bool
- ipsetError error
- expected string
- }{
- { // flag says userspace
- flag: "userspace",
- expected: proxyModeUserspace,
- },
- { // flag says iptables, kernel not compatible
- flag: "iptables",
- kernelCompat: false,
- expected: proxyModeUserspace,
- },
- { // flag says iptables, kernel is compatible
- flag: "iptables",
- kernelCompat: true,
- expected: proxyModeIPTables,
- },
- { // detect, kernel not compatible
- flag: "",
- kernelCompat: false,
- expected: proxyModeUserspace,
- },
- { // detect, kernel is compatible
- flag: "",
- kernelCompat: true,
- expected: proxyModeIPTables,
- },
- { // flag says ipvs, ipset version ok, kernel modules installed for linux kernel before 4.19
- flag: "ipvs",
- kmods: []string{"ip_vs", "ip_vs_rr", "ip_vs_wrr", "ip_vs_sh", "nf_conntrack_ipv4"},
- kernelVersion: "4.18",
- ipsetVersion: ipvs.MinIPSetCheckVersion,
- expected: proxyModeIPVS,
- },
- { // flag says ipvs, ipset version ok, kernel modules installed for linux kernel 4.19
- flag: "ipvs",
- kmods: []string{"ip_vs", "ip_vs_rr", "ip_vs_wrr", "ip_vs_sh", "nf_conntrack"},
- kernelVersion: "4.19",
- ipsetVersion: ipvs.MinIPSetCheckVersion,
- expected: proxyModeIPVS,
- },
- { // flag says ipvs, ipset version too low, fallback on iptables mode
- flag: "ipvs",
- kmods: []string{"ip_vs", "ip_vs_rr", "ip_vs_wrr", "ip_vs_sh", "nf_conntrack"},
- kernelVersion: "4.19",
- ipsetVersion: "0.0",
- kernelCompat: true,
- expected: proxyModeIPTables,
- },
- { // flag says ipvs, bad ipset version, fallback on iptables mode
- flag: "ipvs",
- kmods: []string{"ip_vs", "ip_vs_rr", "ip_vs_wrr", "ip_vs_sh", "nf_conntrack"},
- kernelVersion: "4.19",
- ipsetVersion: "a.b.c",
- kernelCompat: true,
- expected: proxyModeIPTables,
- },
- { // flag says ipvs, required kernel modules are not installed, fallback on iptables mode
- flag: "ipvs",
- kmods: []string{"foo", "bar", "baz"},
- kernelVersion: "4.19",
- ipsetVersion: ipvs.MinIPSetCheckVersion,
- kernelCompat: true,
- expected: proxyModeIPTables,
- },
- }
- for i, c := range cases {
- kcompater := &fakeKernelCompatTester{c.kernelCompat}
- ipsetver := &fakeIPSetVersioner{c.ipsetVersion, c.ipsetError}
- khandler := &fakeKernelHandler{
- modules: c.kmods,
- kernelVersion: c.kernelVersion,
- }
- r := getProxyMode(c.flag, khandler, ipsetver, kcompater)
- if r != c.expected {
- t.Errorf("Case[%d] Expected %q, got %q", i, c.expected, r)
- }
- }
- }
- func Test_getDetectLocalMode(t *testing.T) {
- cases := []struct {
- detectLocal string
- expected proxyconfigapi.LocalMode
- errExpected bool
- }{
- {
- detectLocal: "",
- expected: proxyconfigapi.LocalModeClusterCIDR,
- errExpected: false,
- },
- {
- detectLocal: string(proxyconfigapi.LocalModeClusterCIDR),
- expected: proxyconfigapi.LocalModeClusterCIDR,
- errExpected: false,
- },
- {
- detectLocal: "abcd",
- expected: proxyconfigapi.LocalMode("abcd"),
- errExpected: true,
- },
- }
- for i, c := range cases {
- proxyConfig := &proxyconfigapi.KubeProxyConfiguration{DetectLocalMode: proxyconfigapi.LocalMode(c.detectLocal)}
- r, err := getDetectLocalMode(proxyConfig)
- if c.errExpected {
- if err == nil {
- t.Errorf("Expected error, but did not fail for mode %v", c.detectLocal)
- }
- continue
- }
- if err != nil {
- t.Errorf("Got error parsing mode: %v", err)
- continue
- }
- if r != c.expected {
- t.Errorf("Case[%d] Expected %q got %q", i, c.expected, r)
- }
- }
- }
- func Test_getLocalDetector(t *testing.T) {
- cases := []struct {
- mode proxyconfigapi.LocalMode
- config *proxyconfigapi.KubeProxyConfiguration
- ipt utiliptables.Interface
- expected proxyutiliptables.LocalTrafficDetector
- errExpected bool
- }{
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0/14"},
- ipt: utiliptablestest.NewFake(),
- expected: resolveLocalDetector(t)(proxyutiliptables.NewDetectLocalByCIDR("10.0.0.0/14", utiliptablestest.NewFake())),
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "2002::1234:abcd:ffff:c0a8:101/64"},
- ipt: utiliptablestest.NewIpv6Fake(),
- expected: resolveLocalDetector(t)(proxyutiliptables.NewDetectLocalByCIDR("2002::1234:abcd:ffff:c0a8:101/64", utiliptablestest.NewIpv6Fake())),
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0"},
- ipt: utiliptablestest.NewFake(),
- expected: nil,
- errExpected: true,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "2002::1234:abcd:ffff:c0a8:101"},
- ipt: utiliptablestest.NewIpv6Fake(),
- expected: nil,
- errExpected: true,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0/14"},
- ipt: utiliptablestest.NewIpv6Fake(),
- expected: nil,
- errExpected: true,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "2002::1234:abcd:ffff:c0a8:101/64"},
- ipt: utiliptablestest.NewFake(),
- expected: nil,
- errExpected: true,
- },
- {
- mode: proxyconfigapi.LocalMode("abcd"),
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0/14"},
- ipt: utiliptablestest.NewFake(),
- expected: proxyutiliptables.NewNoOpLocalDetector(),
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: ""},
- ipt: utiliptablestest.NewFake(),
- expected: proxyutiliptables.NewNoOpLocalDetector(),
- errExpected: false,
- },
- }
- for i, c := range cases {
- r, err := getLocalDetector(c.mode, c.config, c.ipt)
- if c.errExpected {
- if err == nil {
- t.Errorf("Case[%d] Expected error, but succeeded with %v", i, r)
- }
- continue
- }
- if err != nil {
- t.Errorf("Case[%d] Error resolving detect-local: %v", i, err)
- continue
- }
- if !reflect.DeepEqual(r, c.expected) {
- t.Errorf("Case[%d] Unexpected detect-local implementation, expected: %q, got: %q", i, c.expected, r)
- }
- }
- }
- func Test_getDualStackLocalDetectorTuple(t *testing.T) {
- cases := []struct {
- mode proxyconfigapi.LocalMode
- config *proxyconfigapi.KubeProxyConfiguration
- ipt [2]utiliptables.Interface
- expected [2]proxyutiliptables.LocalTrafficDetector
- errExpected bool
- }{
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0/14,2002::1234:abcd:ffff:c0a8:101/64"},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: resolveDualStackLocalDetectors(t)(
- proxyutiliptables.NewDetectLocalByCIDR("10.0.0.0/14", utiliptablestest.NewFake()))(
- proxyutiliptables.NewDetectLocalByCIDR("2002::1234:abcd:ffff:c0a8:101/64", utiliptablestest.NewIpv6Fake())),
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "2002::1234:abcd:ffff:c0a8:101/64,10.0.0.0/14"},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: resolveDualStackLocalDetectors(t)(
- proxyutiliptables.NewDetectLocalByCIDR("10.0.0.0/14", utiliptablestest.NewFake()))(
- proxyutiliptables.NewDetectLocalByCIDR("2002::1234:abcd:ffff:c0a8:101/64", utiliptablestest.NewIpv6Fake())),
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "10.0.0.0/14"},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: [2]proxyutiliptables.LocalTrafficDetector{
- resolveLocalDetector(t)(proxyutiliptables.NewDetectLocalByCIDR("10.0.0.0/14", utiliptablestest.NewFake())),
- proxyutiliptables.NewNoOpLocalDetector()},
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: "2002::1234:abcd:ffff:c0a8:101/64"},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: [2]proxyutiliptables.LocalTrafficDetector{
- proxyutiliptables.NewNoOpLocalDetector(),
- resolveLocalDetector(t)(proxyutiliptables.NewDetectLocalByCIDR("2002::1234:abcd:ffff:c0a8:101/64", utiliptablestest.NewIpv6Fake()))},
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalModeClusterCIDR,
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: ""},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: [2]proxyutiliptables.LocalTrafficDetector{proxyutiliptables.NewNoOpLocalDetector(), proxyutiliptables.NewNoOpLocalDetector()},
- errExpected: false,
- },
- {
- mode: proxyconfigapi.LocalMode("abcd"),
- config: &proxyconfigapi.KubeProxyConfiguration{ClusterCIDR: ""},
- ipt: [2]utiliptables.Interface{utiliptablestest.NewFake(), utiliptablestest.NewIpv6Fake()},
- expected: [2]proxyutiliptables.LocalTrafficDetector{proxyutiliptables.NewNoOpLocalDetector(), proxyutiliptables.NewNoOpLocalDetector()},
- errExpected: false,
- },
- }
- for i, c := range cases {
- r, err := getDualStackLocalDetectorTuple(c.mode, c.config, c.ipt)
- if c.errExpected {
- if err == nil {
- t.Errorf("Case[%d] expected error, but succeeded with %q", i, r)
- }
- continue
- }
- if err != nil {
- t.Errorf("Case[%d] Error resolving detect-local: %v", i, err)
- continue
- }
- if !reflect.DeepEqual(r, c.expected) {
- t.Errorf("Case[%d] Unexpected detect-local implementation, expected: %q, got: %q", i, c.expected, r)
- }
- }
- }
- func resolveLocalDetector(t *testing.T) func(proxyutiliptables.LocalTrafficDetector, error) proxyutiliptables.LocalTrafficDetector {
- return func(localDetector proxyutiliptables.LocalTrafficDetector, err error) proxyutiliptables.LocalTrafficDetector {
- t.Helper()
- if err != nil {
- t.Fatalf("Error resolving detect-local: %v", err)
- }
- return localDetector
- }
- }
- func resolveDualStackLocalDetectors(t *testing.T) func(localDetector proxyutiliptables.LocalTrafficDetector, err1 error) func(proxyutiliptables.LocalTrafficDetector, error) [2]proxyutiliptables.LocalTrafficDetector {
- return func(localDetector proxyutiliptables.LocalTrafficDetector, err error) func(proxyutiliptables.LocalTrafficDetector, error) [2]proxyutiliptables.LocalTrafficDetector {
- t.Helper()
- if err != nil {
- t.Fatalf("Error resolving dual stack detect-local: %v", err)
- }
- return func(otherLocalDetector proxyutiliptables.LocalTrafficDetector, err1 error) [2]proxyutiliptables.LocalTrafficDetector {
- t.Helper()
- if err1 != nil {
- t.Fatalf("Error resolving dual stack detect-local: %v", err)
- }
- return [2]proxyutiliptables.LocalTrafficDetector{localDetector, otherLocalDetector}
- }
- }
- }
|