remote_test.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "fmt"
  17. "net"
  18. "net/url"
  19. "os"
  20. "sync"
  21. "syscall"
  22. "testing"
  23. "time"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  25. "github.com/coreos/flannel/pkg/ip"
  26. "github.com/coreos/flannel/subnet"
  27. )
  28. const expectedNetwork = "10.1.0.0/16"
  29. type fixture struct {
  30. ctx context.Context
  31. cancel context.CancelFunc
  32. srvAddr string
  33. registry *subnet.MockSubnetRegistry
  34. sm subnet.Manager
  35. wg sync.WaitGroup
  36. }
  37. func newFixture(t *testing.T) *fixture {
  38. f := &fixture{}
  39. config := fmt.Sprintf(`{"Network": %q}`, expectedNetwork)
  40. f.registry = subnet.NewMockRegistry("", config, nil)
  41. sm := subnet.NewMockManager(f.registry)
  42. f.srvAddr = "127.0.0.1:9999"
  43. f.ctx, f.cancel = context.WithCancel(context.Background())
  44. f.wg.Add(1)
  45. go func() {
  46. RunServer(f.ctx, sm, f.srvAddr, "", "", "")
  47. f.wg.Done()
  48. }()
  49. var err error
  50. f.sm, err = NewRemoteManager(f.srvAddr, "", "", "")
  51. if err != nil {
  52. panic(fmt.Sprintf("Failed to create remote mananager: %v", err))
  53. }
  54. for i := 0; ; i++ {
  55. _, err := f.sm.GetNetworkConfig(f.ctx, "_")
  56. if err == nil {
  57. break
  58. }
  59. if isConnRefused(err) {
  60. if i == 100 {
  61. t.Fatalf("Out of connection retries")
  62. }
  63. fmt.Println("Connection refused, retrying...")
  64. time.Sleep(300 * time.Millisecond)
  65. continue
  66. }
  67. t.Fatalf("GetNetworkConfig failed: %v", err)
  68. }
  69. return f
  70. }
  71. func (f *fixture) Close() {
  72. f.cancel()
  73. f.wg.Wait()
  74. }
  75. func mustParseIP4(s string) ip.IP4 {
  76. a, err := ip.ParseIP4(s)
  77. if err != nil {
  78. panic(err)
  79. }
  80. return a
  81. }
  82. func mustParseIP4Net(s string) ip.IP4Net {
  83. _, n, err := net.ParseCIDR(s)
  84. if err != nil {
  85. panic(err)
  86. }
  87. return ip.FromIPNet(n)
  88. }
  89. func isConnRefused(err error) bool {
  90. if uerr, ok := err.(*url.Error); ok {
  91. if operr, ok := uerr.Err.(*net.OpError); ok {
  92. if oserr, ok := operr.Err.(*os.SyscallError); ok {
  93. return oserr.Err == syscall.ECONNREFUSED
  94. }
  95. return operr.Err == syscall.ECONNREFUSED
  96. }
  97. }
  98. return false
  99. }
  100. func TestGetConfig(t *testing.T) {
  101. f := newFixture(t)
  102. defer f.Close()
  103. cfg, err := f.sm.GetNetworkConfig(f.ctx, "_")
  104. if err != nil {
  105. t.Fatalf("GetNetworkConfig failed: %v", err)
  106. }
  107. if cfg.Network.String() != expectedNetwork {
  108. t.Errorf("GetNetworkConfig returned bad network: %v vs %v", cfg.Network, expectedNetwork)
  109. }
  110. }
  111. func TestAcquireRenewLease(t *testing.T) {
  112. f := newFixture(t)
  113. defer f.Close()
  114. attrs := &subnet.LeaseAttrs{
  115. PublicIP: mustParseIP4("1.1.1.1"),
  116. }
  117. l, err := f.sm.AcquireLease(f.ctx, "_", attrs)
  118. if err != nil {
  119. t.Fatalf("AcquireLease failed: %v", err)
  120. }
  121. if !mustParseIP4Net(expectedNetwork).Contains(l.Subnet.IP) {
  122. t.Errorf("AcquireLease returned subnet not in network: %v (in %v)", l.Subnet, expectedNetwork)
  123. }
  124. if err = f.sm.RenewLease(f.ctx, "_", l); err != nil {
  125. t.Errorf("RenewLease failed: %v", err)
  126. }
  127. }
  128. func TestWatchLeases(t *testing.T) {
  129. f := newFixture(t)
  130. defer f.Close()
  131. events := make(chan []subnet.Event)
  132. f.wg.Add(1)
  133. go func() {
  134. subnet.WatchLeases(f.ctx, f.sm, "_", nil, events)
  135. f.wg.Done()
  136. }()
  137. // skip over the initial snapshot
  138. <-events
  139. attrs := &subnet.LeaseAttrs{
  140. PublicIP: mustParseIP4("1.1.1.2"),
  141. }
  142. l, err := f.sm.AcquireLease(f.ctx, "_", attrs)
  143. if err != nil {
  144. t.Errorf("AcquireLease failed: %v", err)
  145. return
  146. }
  147. if !mustParseIP4Net(expectedNetwork).Contains(l.Subnet.IP) {
  148. t.Errorf("AcquireLease returned subnet not in network: %v (in %v)", l.Subnet, expectedNetwork)
  149. }
  150. evtBatch := <-events
  151. if len(evtBatch) != 1 {
  152. t.Fatalf("WatchSubnets produced wrong sized event batch")
  153. }
  154. evt := evtBatch[0]
  155. if evt.Type != subnet.EventAdded {
  156. t.Fatalf("WatchSubnets produced wrong event type")
  157. }
  158. if evt.Lease.Key() != l.Key() {
  159. t.Errorf("WatchSubnet produced wrong subnet: expected %s, got %s", l.Key(), evt.Lease.Key())
  160. }
  161. }
  162. func TestRevokeLease(t *testing.T) {
  163. f := newFixture(t)
  164. defer f.Close()
  165. attrs := &subnet.LeaseAttrs{
  166. PublicIP: mustParseIP4("1.1.1.1"),
  167. }
  168. l, err := f.sm.AcquireLease(f.ctx, "_", attrs)
  169. if err != nil {
  170. t.Fatalf("AcquireLease failed: %v", err)
  171. }
  172. if err := f.sm.RevokeLease(f.ctx, "_", l.Subnet); err != nil {
  173. t.Fatalf("RevokeLease failed: %v", err)
  174. }
  175. _, err = f.sm.WatchLease(f.ctx, "_", l.Subnet, nil)
  176. if err == nil {
  177. t.Fatalf("Revoked lease found")
  178. }
  179. }
  180. func TestWatchNetworks(t *testing.T) {
  181. f := newFixture(t)
  182. defer f.Close()
  183. events := make(chan []subnet.Event)
  184. f.wg.Add(1)
  185. go func() {
  186. subnet.WatchNetworks(f.ctx, f.sm, events)
  187. f.wg.Done()
  188. }()
  189. // skip over the initial snapshot
  190. <-events
  191. expectedNetname := "foobar"
  192. config := fmt.Sprintf(`{"Network": %q}`, expectedNetwork)
  193. err := f.registry.CreateNetwork(f.ctx, expectedNetname, config)
  194. if err != nil {
  195. t.Errorf("create network failed: %v", err)
  196. }
  197. evtBatch := <-events
  198. if len(evtBatch) != 1 {
  199. t.Fatalf("WatchNetworks create produced wrong sized event batch")
  200. }
  201. evt := evtBatch[0]
  202. if evt.Type != subnet.EventAdded {
  203. t.Fatalf("WatchNetworks create produced wrong event type")
  204. }
  205. if evt.Network != expectedNetname {
  206. t.Errorf("WatchNetwork create produced wrong network: expected %s, got %s", expectedNetname, evt.Network)
  207. }
  208. err = f.registry.DeleteNetwork(f.ctx, expectedNetname)
  209. if err != nil {
  210. t.Errorf("delete network failed: %v", err)
  211. }
  212. evtBatch = <-events
  213. if len(evtBatch) != 1 {
  214. t.Fatalf("WatchNetworks delete produced wrong sized event batch")
  215. }
  216. evt = evtBatch[0]
  217. if evt.Type != subnet.EventRemoved {
  218. t.Fatalf("WatchNetworks delete produced wrong event type")
  219. }
  220. if evt.Network != expectedNetname {
  221. t.Errorf("WatchNetwork delete produced wrong network: expected %s, got %s", expectedNetname, evt.Network)
  222. }
  223. }