
This PR introduces two new modes for detecting local traffic in a cluster. 1) detectLocalByBridgeInterface: This takes a bridge name as argument and decides all traffic that match on their originating interface being that of this bridge, shall be considered as local pod traffic. 2) detectLocalByInterfaceNamePrefix: This takes an interface prefix name as argument and decides all traffic that match on their originating interface names having a prefix that matches this argument shall be considered as local pod traffic. Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
279 lines
7.1 KiB
Go
279 lines
7.1 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package iptables
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
utiliptables "k8s.io/kubernetes/pkg/util/iptables"
|
|
iptablestest "k8s.io/kubernetes/pkg/util/iptables/testing"
|
|
)
|
|
|
|
func TestNoOpLocalDetector(t *testing.T) {
|
|
localDetector := NewNoOpLocalDetector()
|
|
if localDetector.IsImplemented() {
|
|
t.Error("NoOpLocalDetector returns true for IsImplemented")
|
|
}
|
|
|
|
ifLocal := localDetector.IfLocal()
|
|
if len(ifLocal) != 0 {
|
|
t.Errorf("NoOpLocalDetector returns %v for IsLocal (expected nil)", ifLocal)
|
|
}
|
|
|
|
ifNotLocal := localDetector.IfNotLocal()
|
|
if len(ifNotLocal) != 0 {
|
|
t.Errorf("NoOpLocalDetector returns %v for IsNotLocal (expected nil)", ifNotLocal)
|
|
}
|
|
}
|
|
|
|
func TestNewDetectLocalByCIDR(t *testing.T) {
|
|
cases := []struct {
|
|
cidr string
|
|
ipt utiliptables.Interface
|
|
errExpected bool
|
|
}{
|
|
{
|
|
cidr: "10.0.0.0/14",
|
|
ipt: iptablestest.NewFake(),
|
|
errExpected: false,
|
|
},
|
|
{
|
|
cidr: "2002::1234:abcd:ffff:c0a8:101/64",
|
|
ipt: iptablestest.NewIPv6Fake(),
|
|
errExpected: false,
|
|
},
|
|
{
|
|
cidr: "10.0.0.0/14",
|
|
ipt: iptablestest.NewIPv6Fake(),
|
|
errExpected: true,
|
|
},
|
|
{
|
|
cidr: "2002::1234:abcd:ffff:c0a8:101/64",
|
|
ipt: iptablestest.NewFake(),
|
|
errExpected: true,
|
|
},
|
|
{
|
|
cidr: "10.0.0.0",
|
|
ipt: iptablestest.NewFake(),
|
|
errExpected: true,
|
|
},
|
|
{
|
|
cidr: "2002::1234:abcd:ffff:c0a8:101",
|
|
ipt: iptablestest.NewIPv6Fake(),
|
|
errExpected: true,
|
|
},
|
|
{
|
|
cidr: "",
|
|
ipt: iptablestest.NewFake(),
|
|
errExpected: true,
|
|
},
|
|
{
|
|
cidr: "",
|
|
ipt: iptablestest.NewIPv6Fake(),
|
|
errExpected: true,
|
|
},
|
|
}
|
|
for i, c := range cases {
|
|
r, err := NewDetectLocalByCIDR(c.cidr, c.ipt)
|
|
if c.errExpected {
|
|
if err == nil {
|
|
t.Errorf("Case[%d] expected error, but succeeded with: %q", i, r)
|
|
}
|
|
continue
|
|
}
|
|
if err != nil {
|
|
t.Errorf("Case[%d] failed with error: %v", i, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDetectLocalByCIDR(t *testing.T) {
|
|
cases := []struct {
|
|
cidr string
|
|
ipt utiliptables.Interface
|
|
expectedIfLocalOutput []string
|
|
expectedIfNotLocalOutput []string
|
|
}{
|
|
{
|
|
cidr: "10.0.0.0/14",
|
|
ipt: iptablestest.NewFake(),
|
|
expectedIfLocalOutput: []string{"-s", "10.0.0.0/14"},
|
|
expectedIfNotLocalOutput: []string{"!", "-s", "10.0.0.0/14"},
|
|
},
|
|
{
|
|
cidr: "2002::1234:abcd:ffff:c0a8:101/64",
|
|
ipt: iptablestest.NewIPv6Fake(),
|
|
expectedIfLocalOutput: []string{"-s", "2002::1234:abcd:ffff:c0a8:101/64"},
|
|
expectedIfNotLocalOutput: []string{"!", "-s", "2002::1234:abcd:ffff:c0a8:101/64"},
|
|
},
|
|
}
|
|
for _, c := range cases {
|
|
localDetector, err := NewDetectLocalByCIDR(c.cidr, c.ipt)
|
|
if err != nil {
|
|
t.Errorf("Error initializing localDetector: %v", err)
|
|
continue
|
|
}
|
|
if !localDetector.IsImplemented() {
|
|
t.Error("DetectLocalByCIDR returns false for IsImplemented")
|
|
}
|
|
|
|
ifLocal := localDetector.IfLocal()
|
|
ifNotLocal := localDetector.IfNotLocal()
|
|
|
|
if !reflect.DeepEqual(ifLocal, c.expectedIfLocalOutput) {
|
|
t.Errorf("IfLocal, expected: '%v', but got: '%v'", c.expectedIfLocalOutput, ifLocal)
|
|
}
|
|
|
|
if !reflect.DeepEqual(ifNotLocal, c.expectedIfNotLocalOutput) {
|
|
t.Errorf("IfNotLocal, expected: '%v', but got: '%v'", c.expectedIfNotLocalOutput, ifNotLocal)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNewDetectLocalByBridgeInterface(t *testing.T) {
|
|
cases := []struct {
|
|
ifaceName string
|
|
errExpected bool
|
|
}{
|
|
{
|
|
ifaceName: "avz",
|
|
errExpected: false,
|
|
},
|
|
{
|
|
ifaceName: "",
|
|
errExpected: true,
|
|
},
|
|
}
|
|
for i, c := range cases {
|
|
r, err := NewDetectLocalByBridgeInterface(c.ifaceName)
|
|
if c.errExpected {
|
|
if err == nil {
|
|
t.Errorf("Case[%d] expected error, but succeeded with: %q", i, r)
|
|
}
|
|
continue
|
|
}
|
|
if err != nil {
|
|
t.Errorf("Case[%d] failed with error: %v", i, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNewDetectLocalByInterfaceNamePrefix(t *testing.T) {
|
|
cases := []struct {
|
|
ifacePrefix string
|
|
errExpected bool
|
|
}{
|
|
{
|
|
ifacePrefix: "veth",
|
|
errExpected: false,
|
|
},
|
|
{
|
|
ifacePrefix: "cbr0",
|
|
errExpected: false,
|
|
},
|
|
{
|
|
ifacePrefix: "",
|
|
errExpected: true,
|
|
},
|
|
}
|
|
for i, c := range cases {
|
|
r, err := NewDetectLocalByInterfaceNamePrefix(c.ifacePrefix)
|
|
if c.errExpected {
|
|
if err == nil {
|
|
t.Errorf("Case[%d] expected error, but succeeded with: %q", i, r)
|
|
}
|
|
continue
|
|
}
|
|
if err != nil {
|
|
t.Errorf("Case[%d] failed with error: %v", i, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDetectLocalByBridgeInterface(t *testing.T) {
|
|
cases := []struct {
|
|
ifaceName string
|
|
expectedJumpIfOutput []string
|
|
expectedJumpIfNotOutput []string
|
|
}{
|
|
{
|
|
ifaceName: "eth0",
|
|
expectedJumpIfOutput: []string{"-i", "eth0"},
|
|
expectedJumpIfNotOutput: []string{"!", "-i", "eth0"},
|
|
},
|
|
}
|
|
for _, c := range cases {
|
|
localDetector, err := NewDetectLocalByBridgeInterface(c.ifaceName)
|
|
if err != nil {
|
|
t.Errorf("Error initializing localDetector: %v", err)
|
|
continue
|
|
}
|
|
if !localDetector.IsImplemented() {
|
|
t.Error("DetectLocalByBridgeInterface returns false for IsImplemented")
|
|
}
|
|
|
|
ifLocal := localDetector.IfLocal()
|
|
ifNotLocal := localDetector.IfNotLocal()
|
|
|
|
if !reflect.DeepEqual(ifLocal, c.expectedJumpIfOutput) {
|
|
t.Errorf("IfLocal, expected: '%v', but got: '%v'", c.expectedJumpIfOutput, ifLocal)
|
|
}
|
|
|
|
if !reflect.DeepEqual(ifNotLocal, c.expectedJumpIfNotOutput) {
|
|
t.Errorf("IfNotLocal, expected: '%v', but got: '%v'", c.expectedJumpIfNotOutput, ifNotLocal)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDetectLocalByInterfaceNamePrefix(t *testing.T) {
|
|
cases := []struct {
|
|
ifacePrefix string
|
|
chain string
|
|
args []string
|
|
expectedJumpIfOutput []string
|
|
expectedJumpIfNotOutput []string
|
|
}{
|
|
{
|
|
ifacePrefix: "eth0",
|
|
expectedJumpIfOutput: []string{"-i", "eth0+"},
|
|
expectedJumpIfNotOutput: []string{"!", "-i", "eth0+"},
|
|
},
|
|
}
|
|
for _, c := range cases {
|
|
localDetector, err := NewDetectLocalByInterfaceNamePrefix(c.ifacePrefix)
|
|
if err != nil {
|
|
t.Errorf("Error initializing localDetector: %v", err)
|
|
continue
|
|
}
|
|
if !localDetector.IsImplemented() {
|
|
t.Error("DetectLocalByInterfaceNamePrefix returns false for IsImplemented")
|
|
}
|
|
|
|
ifLocal := localDetector.IfLocal()
|
|
ifNotLocal := localDetector.IfNotLocal()
|
|
|
|
if !reflect.DeepEqual(ifLocal, c.expectedJumpIfOutput) {
|
|
t.Errorf("IfLocal, expected: '%v', but got: '%v'", c.expectedJumpIfOutput, ifLocal)
|
|
}
|
|
|
|
if !reflect.DeepEqual(ifNotLocal, c.expectedJumpIfNotOutput) {
|
|
t.Errorf("IfNotLocal, expected: '%v', but got: '%v'", c.expectedJumpIfNotOutput, ifNotLocal)
|
|
}
|
|
}
|
|
}
|