k3s/pkg/proxy/util/utils_test.go

399 lines
12 KiB
Go
Raw Normal View History

/*
Copyright 2017 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package util
import (
"context"
2018-01-17 02:23:33 +00:00
"net"
"testing"
2018-08-15 13:51:19 +00:00
"k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
2018-01-17 02:23:33 +00:00
"k8s.io/apimachinery/pkg/util/sets"
2018-01-17 02:30:19 +00:00
fake "k8s.io/kubernetes/pkg/proxy/util/testing"
)
func TestIsProxyableIP(t *testing.T) {
testCases := []struct {
ip string
want error
}{
{"127.0.0.1", ErrAddressNotAllowed},
{"127.0.0.2", ErrAddressNotAllowed},
{"169.254.169.254", ErrAddressNotAllowed},
{"169.254.1.1", ErrAddressNotAllowed},
{"224.0.0.0", ErrAddressNotAllowed},
{"10.0.0.1", nil},
{"192.168.0.1", nil},
{"172.16.0.1", nil},
{"8.8.8.8", nil},
{"::1", ErrAddressNotAllowed},
{"fe80::", ErrAddressNotAllowed},
{"ff02::", ErrAddressNotAllowed},
{"ff01::", ErrAddressNotAllowed},
{"2600::", nil},
{"1", ErrAddressNotAllowed},
{"", ErrAddressNotAllowed},
}
for i := range testCases {
got := IsProxyableIP(testCases[i].ip)
if testCases[i].want != got {
t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
}
}
}
type dummyResolver struct {
ips []string
err error
}
func (r *dummyResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error) {
if r.err != nil {
return nil, r.err
}
resp := []net.IPAddr{}
for _, ipString := range r.ips {
resp = append(resp, net.IPAddr{IP: net.ParseIP(ipString)})
}
return resp, nil
}
func TestIsProxyableHostname(t *testing.T) {
testCases := []struct {
hostname string
ips []string
want error
}{
{"k8s.io", []string{}, ErrNoAddresses},
{"k8s.io", []string{"8.8.8.8"}, nil},
{"k8s.io", []string{"169.254.169.254"}, ErrAddressNotAllowed},
{"k8s.io", []string{"127.0.0.1", "8.8.8.8"}, ErrAddressNotAllowed},
}
for i := range testCases {
resolv := dummyResolver{ips: testCases[i].ips}
got := IsProxyableHostname(context.Background(), &resolv, testCases[i].hostname)
if testCases[i].want != got {
t.Errorf("case %d: expected %v, got %v", i, testCases[i].want, got)
}
}
}
func TestShouldSkipService(t *testing.T) {
testCases := []struct {
2018-08-15 13:51:19 +00:00
service *v1.Service
svcName types.NamespacedName
shouldSkip bool
}{
{
// Cluster IP is None
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: v1.ClusterIPNone,
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: true,
},
{
// Cluster IP is empty
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: "",
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: true,
},
{
// ExternalName type service
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: "1.2.3.4",
2018-08-15 13:51:19 +00:00
Type: v1.ServiceTypeExternalName,
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: true,
},
{
// ClusterIP type service with ClusterIP set
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: "1.2.3.4",
2018-08-15 13:51:19 +00:00
Type: v1.ServiceTypeClusterIP,
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: false,
},
{
// NodePort type service with ClusterIP set
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: "1.2.3.4",
2018-08-15 13:51:19 +00:00
Type: v1.ServiceTypeNodePort,
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: false,
},
{
// LoadBalancer type service with ClusterIP set
2018-08-15 13:51:19 +00:00
service: &v1.Service{
ObjectMeta: metav1.ObjectMeta{Namespace: "foo", Name: "bar"},
2018-08-15 13:51:19 +00:00
Spec: v1.ServiceSpec{
ClusterIP: "1.2.3.4",
2018-08-15 13:51:19 +00:00
Type: v1.ServiceTypeLoadBalancer,
},
},
svcName: types.NamespacedName{Namespace: "foo", Name: "bar"},
shouldSkip: false,
},
}
for i := range testCases {
skip := ShouldSkipService(testCases[i].svcName, testCases[i].service)
if skip != testCases[i].shouldSkip {
t.Errorf("case %d: expect %v, got %v", i, testCases[i].shouldSkip, skip)
}
}
}
2018-01-17 02:23:33 +00:00
type InterfaceAddrsPair struct {
itf net.Interface
addrs []net.Addr
}
func TestGetNodeAddressses(t *testing.T) {
testCases := []struct {
cidrs []string
2018-01-17 02:30:19 +00:00
nw *fake.FakeNetwork
2018-01-17 02:23:33 +00:00
itfAddrsPairs []InterfaceAddrsPair
expected sets.String
}{
{ // case 0
cidrs: []string{"10.20.30.0/24"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("10.20.30.51"),
},
{ // case 1
cidrs: []string{"0.0.0.0/0"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("0.0.0.0/0"),
},
{ // case 2
cidrs: []string{"2001:db8::/32", "::1/128"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("2001:db8::1", "::1"),
},
{ // case 3
cidrs: []string{"::/0"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("::/0"),
},
{ // case 4
cidrs: []string{"127.0.0.1/32"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("127.0.0.1"),
},
{ // case 5
cidrs: []string{"127.0.0.0/8"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "127.0.1.1/8"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("127.0.1.1"),
},
{ // case 6
cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "10.20.30.51/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 2, MTU: 0, Name: "eth1", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "100.200.201.1/24"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("10.20.30.51", "100.200.201.1"),
},
{ // case 7
cidrs: []string{"10.20.30.0/24", "100.200.201.0/24"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString(),
},
{ // case 8
cidrs: []string{},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "192.168.1.2/24"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "127.0.0.1/8"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("0.0.0.0/0", "::/0"),
},
{ // case 9
cidrs: []string{},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "2001:db8::1/32"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("0.0.0.0/0", "::/0"),
},
{ // case 9
cidrs: []string{"1.2.3.0/24", "0.0.0.0/0"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("0.0.0.0/0"),
},
{ // case 10
cidrs: []string{"0.0.0.0/0", "1.2.3.0/24", "::1/128"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("0.0.0.0/0", "::1"),
},
{ // case 11
cidrs: []string{"::/0", "1.2.3.0/24", "::1/128"},
2018-01-17 02:30:19 +00:00
nw: fake.NewFakeNetwork(),
2018-01-17 02:23:33 +00:00
itfAddrsPairs: []InterfaceAddrsPair{
{
itf: net.Interface{Index: 0, MTU: 0, Name: "eth0", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "1.2.3.4/30"}},
2018-01-17 02:23:33 +00:00
},
{
itf: net.Interface{Index: 1, MTU: 0, Name: "lo", HardwareAddr: nil, Flags: 0},
2018-01-17 02:30:19 +00:00
addrs: []net.Addr{fake.AddrStruct{Val: "::1/128"}},
2018-01-17 02:23:33 +00:00
},
},
expected: sets.NewString("::/0", "1.2.3.4"),
},
}
for i := range testCases {
for _, pair := range testCases[i].itfAddrsPairs {
testCases[i].nw.AddInterfaceAddr(&pair.itf, pair.addrs)
}
addrList, err := GetNodeAddresses(testCases[i].cidrs, testCases[i].nw)
if err != nil {
t.Errorf("case [%d], unexpected error: %v", i, err)
}
if !addrList.Equal(testCases[i].expected) {
t.Errorf("case [%d], unexpected mismatch, expected: %v, got: %v", i, testCases[i].expected, addrList)
}
}
}