summaryrefslogtreecommitdiff
path: root/vendor/github.com/containernetworking/plugins/pkg/testutils
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/containernetworking/plugins/pkg/testutils')
-rw-r--r--vendor/github.com/containernetworking/plugins/pkg/testutils/bad_reader.go33
-rw-r--r--vendor/github.com/containernetworking/plugins/pkg/testutils/cmd.go112
-rw-r--r--vendor/github.com/containernetworking/plugins/pkg/testutils/netns_linux.go157
-rw-r--r--vendor/github.com/containernetworking/plugins/pkg/testutils/ping.go55
4 files changed, 0 insertions, 357 deletions
diff --git a/vendor/github.com/containernetworking/plugins/pkg/testutils/bad_reader.go b/vendor/github.com/containernetworking/plugins/pkg/testutils/bad_reader.go
deleted file mode 100644
index f9d0ade..0000000
--- a/vendor/github.com/containernetworking/plugins/pkg/testutils/bad_reader.go
+++ /dev/null
@@ -1,33 +0,0 @@
-// Copyright 2016 CNI authors
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-package testutils
-
-import "errors"
-
-// BadReader is an io.Reader which always errors
-type BadReader struct {
- Error error
-}
-
-func (r *BadReader) Read(buffer []byte) (int, error) {
- if r.Error != nil {
- return 0, r.Error
- }
- return 0, errors.New("banana")
-}
-
-func (r *BadReader) Close() error {
- return nil
-}
diff --git a/vendor/github.com/containernetworking/plugins/pkg/testutils/cmd.go b/vendor/github.com/containernetworking/plugins/pkg/testutils/cmd.go
deleted file mode 100644
index ce600f6..0000000
--- a/vendor/github.com/containernetworking/plugins/pkg/testutils/cmd.go
+++ /dev/null
@@ -1,112 +0,0 @@
-// Copyright 2016 CNI authors
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-package testutils
-
-import (
- "io/ioutil"
- "os"
-
- "github.com/containernetworking/cni/pkg/skel"
- "github.com/containernetworking/cni/pkg/types"
- "github.com/containernetworking/cni/pkg/version"
-)
-
-func envCleanup() {
- os.Unsetenv("CNI_COMMAND")
- os.Unsetenv("CNI_PATH")
- os.Unsetenv("CNI_NETNS")
- os.Unsetenv("CNI_IFNAME")
- os.Unsetenv("CNI_CONTAINERID")
-}
-
-func CmdAdd(cniNetns, cniContainerID, cniIfname string, conf []byte, f func() error) (types.Result, []byte, error) {
- os.Setenv("CNI_COMMAND", "ADD")
- os.Setenv("CNI_PATH", os.Getenv("PATH"))
- os.Setenv("CNI_NETNS", cniNetns)
- os.Setenv("CNI_IFNAME", cniIfname)
- os.Setenv("CNI_CONTAINERID", cniContainerID)
- defer envCleanup()
-
- // Redirect stdout to capture plugin result
- oldStdout := os.Stdout
- r, w, err := os.Pipe()
- if err != nil {
- return nil, nil, err
- }
-
- os.Stdout = w
- err = f()
- w.Close()
-
- var out []byte
- if err == nil {
- out, err = ioutil.ReadAll(r)
- }
- os.Stdout = oldStdout
-
- // Return errors after restoring stdout so Ginkgo will correctly
- // emit verbose error information on stdout
- if err != nil {
- return nil, nil, err
- }
-
- // Plugin must return result in same version as specified in netconf
- versionDecoder := &version.ConfigDecoder{}
- confVersion, err := versionDecoder.Decode(conf)
- if err != nil {
- return nil, nil, err
- }
-
- result, err := version.NewResult(confVersion, out)
- if err != nil {
- return nil, nil, err
- }
-
- return result, out, nil
-}
-
-func CmdAddWithArgs(args *skel.CmdArgs, f func() error) (types.Result, []byte, error) {
- return CmdAdd(args.Netns, args.ContainerID, args.IfName, args.StdinData, f)
-}
-
-func CmdCheck(cniNetns, cniContainerID, cniIfname string, conf []byte, f func() error) error {
- os.Setenv("CNI_COMMAND", "CHECK")
- os.Setenv("CNI_PATH", os.Getenv("PATH"))
- os.Setenv("CNI_NETNS", cniNetns)
- os.Setenv("CNI_IFNAME", cniIfname)
- os.Setenv("CNI_CONTAINERID", cniContainerID)
- defer envCleanup()
-
- return f()
-}
-
-func CmdCheckWithArgs(args *skel.CmdArgs, f func() error) error {
- return CmdCheck(args.Netns, args.ContainerID, args.IfName, args.StdinData, f)
-}
-
-func CmdDel(cniNetns, cniContainerID, cniIfname string, f func() error) error {
- os.Setenv("CNI_COMMAND", "DEL")
- os.Setenv("CNI_PATH", os.Getenv("PATH"))
- os.Setenv("CNI_NETNS", cniNetns)
- os.Setenv("CNI_IFNAME", cniIfname)
- os.Setenv("CNI_CONTAINERID", cniContainerID)
- defer envCleanup()
-
- return f()
-}
-
-func CmdDelWithArgs(args *skel.CmdArgs, f func() error) error {
- return CmdDel(args.Netns, args.ContainerID, args.IfName, f)
-}
diff --git a/vendor/github.com/containernetworking/plugins/pkg/testutils/netns_linux.go b/vendor/github.com/containernetworking/plugins/pkg/testutils/netns_linux.go
deleted file mode 100644
index 6d56e40..0000000
--- a/vendor/github.com/containernetworking/plugins/pkg/testutils/netns_linux.go
+++ /dev/null
@@ -1,157 +0,0 @@
-// Copyright 2018 CNI authors
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-package testutils
-
-import (
- "crypto/rand"
- "fmt"
- "os"
- "path"
- "runtime"
- "strings"
- "sync"
-
- "github.com/containernetworking/plugins/pkg/ns"
- "golang.org/x/sys/unix"
-)
-
-const nsRunDir = "/var/run/netns"
-
-// Creates a new persistent (bind-mounted) network namespace and returns an object
-// representing that namespace, without switching to it.
-func NewNS() (ns.NetNS, error) {
-
- b := make([]byte, 16)
- _, err := rand.Reader.Read(b)
- if err != nil {
- return nil, fmt.Errorf("failed to generate random netns name: %v", err)
- }
-
- // Create the directory for mounting network namespaces
- // This needs to be a shared mountpoint in case it is mounted in to
- // other namespaces (containers)
- err = os.MkdirAll(nsRunDir, 0755)
- if err != nil {
- return nil, err
- }
-
- // Remount the namespace directory shared. This will fail if it is not
- // already a mountpoint, so bind-mount it on to itself to "upgrade" it
- // to a mountpoint.
- err = unix.Mount("", nsRunDir, "none", unix.MS_SHARED|unix.MS_REC, "")
- if err != nil {
- if err != unix.EINVAL {
- return nil, fmt.Errorf("mount --make-rshared %s failed: %q", nsRunDir, err)
- }
-
- // Recursively remount /var/run/netns on itself. The recursive flag is
- // so that any existing netns bindmounts are carried over.
- err = unix.Mount(nsRunDir, nsRunDir, "none", unix.MS_BIND|unix.MS_REC, "")
- if err != nil {
- return nil, fmt.Errorf("mount --rbind %s %s failed: %q", nsRunDir, nsRunDir, err)
- }
-
- // Now we can make it shared
- err = unix.Mount("", nsRunDir, "none", unix.MS_SHARED|unix.MS_REC, "")
- if err != nil {
- return nil, fmt.Errorf("mount --make-rshared %s failed: %q", nsRunDir, err)
- }
-
- }
-
- nsName := fmt.Sprintf("cnitest-%x-%x-%x-%x-%x", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])
-
- // create an empty file at the mount point
- nsPath := path.Join(nsRunDir, nsName)
- mountPointFd, err := os.Create(nsPath)
- if err != nil {
- return nil, err
- }
- mountPointFd.Close()
-
- // Ensure the mount point is cleaned up on errors; if the namespace
- // was successfully mounted this will have no effect because the file
- // is in-use
- defer os.RemoveAll(nsPath)
-
- var wg sync.WaitGroup
- wg.Add(1)
-
- // do namespace work in a dedicated goroutine, so that we can safely
- // Lock/Unlock OSThread without upsetting the lock/unlock state of
- // the caller of this function
- go (func() {
- defer wg.Done()
- runtime.LockOSThread()
- // Don't unlock. By not unlocking, golang will kill the OS thread when the
- // goroutine is done (for go1.10+)
-
- var origNS ns.NetNS
- origNS, err = ns.GetNS(getCurrentThreadNetNSPath())
- if err != nil {
- return
- }
- defer origNS.Close()
-
- // create a new netns on the current thread
- err = unix.Unshare(unix.CLONE_NEWNET)
- if err != nil {
- return
- }
-
- // Put this thread back to the orig ns, since it might get reused (pre go1.10)
- defer origNS.Set()
-
- // bind mount the netns from the current thread (from /proc) onto the
- // mount point. This causes the namespace to persist, even when there
- // are no threads in the ns.
- err = unix.Mount(getCurrentThreadNetNSPath(), nsPath, "none", unix.MS_BIND, "")
- if err != nil {
- err = fmt.Errorf("failed to bind mount ns at %s: %v", nsPath, err)
- }
- })()
- wg.Wait()
-
- if err != nil {
- return nil, fmt.Errorf("failed to create namespace: %v", err)
- }
-
- return ns.GetNS(nsPath)
-}
-
-// UnmountNS unmounts the NS held by the netns object
-func UnmountNS(ns ns.NetNS) error {
- nsPath := ns.Path()
- // Only unmount if it's been bind-mounted (don't touch namespaces in /proc...)
- if strings.HasPrefix(nsPath, nsRunDir) {
- if err := unix.Unmount(nsPath, 0); err != nil {
- return fmt.Errorf("failed to unmount NS: at %s: %v", nsPath, err)
- }
-
- if err := os.Remove(nsPath); err != nil {
- return fmt.Errorf("failed to remove ns path %s: %v", nsPath, err)
- }
- }
-
- return nil
-}
-
-// getCurrentThreadNetNSPath copied from pkg/ns
-func getCurrentThreadNetNSPath() string {
- // /proc/self/ns/net returns the namespace of the main thread, not
- // of whatever thread this goroutine is running on. Make sure we
- // use the thread's net namespace since the thread is switching around
- return fmt.Sprintf("/proc/%d/task/%d/ns/net", os.Getpid(), unix.Gettid())
-}
diff --git a/vendor/github.com/containernetworking/plugins/pkg/testutils/ping.go b/vendor/github.com/containernetworking/plugins/pkg/testutils/ping.go
deleted file mode 100644
index 5ee9db1..0000000
--- a/vendor/github.com/containernetworking/plugins/pkg/testutils/ping.go
+++ /dev/null
@@ -1,55 +0,0 @@
-// Copyright 2017 CNI authors
-//
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-// http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License.
-
-package testutils
-
-import (
- "bytes"
- "fmt"
- "os/exec"
- "strconv"
- "syscall"
-)
-
-// Ping shells out to the `ping` command. Returns nil if successful.
-func Ping(saddr, daddr string, isV6 bool, timeoutSec int) error {
- args := []string{
- "-c", "1",
- "-W", strconv.Itoa(timeoutSec),
- "-I", saddr,
- daddr,
- }
-
- bin := "ping"
- if isV6 {
- bin = "ping6"
- }
-
- cmd := exec.Command(bin, args...)
- var stderr bytes.Buffer
- cmd.Stderr = &stderr
-
- if err := cmd.Run(); err != nil {
- switch e := err.(type) {
- case *exec.ExitError:
- return fmt.Errorf("%v exit status %d: %s",
- args, e.Sys().(syscall.WaitStatus).ExitStatus(),
- stderr.String())
- default:
- return err
- }
- }
-
- return nil
-}