-
Notifications
You must be signed in to change notification settings - Fork 42
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
microcloud/cmd: Check uplink network config before setting up the clu…
…ster Fixes #210 This catches two situations: 1. Invalid OVN ranges in UPLINK networks (range outside gateway subnet, etc) 2. UPLINK gateway subnets that contain any system's management address; these should be on separate interfaces and shouldn't conflict Signed-off-by: Wesley Hershberger <[email protected]>
- Loading branch information
1 parent
a28d437
commit 1dc355b
Showing
3 changed files
with
277 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,188 @@ | ||
package main | ||
|
||
import ( | ||
"testing" | ||
|
||
lxdAPI "github.com/canonical/lxd/shared/api" | ||
|
||
"github.com/canonical/microcloud/microcloud/mdns" | ||
"github.com/canonical/microcloud/microcloud/service" | ||
) | ||
|
||
func newSystemWithNetworks(address string, networks []lxdAPI.NetworksPost) InitSystem { | ||
return InitSystem{ | ||
ServerInfo: mdns.ServerInfo{ | ||
Name: "testSystem", | ||
Address: address, | ||
}, | ||
Networks: networks, | ||
} | ||
} | ||
|
||
func newSystemWithUplinkNetConfig(address string, config map[string]string) InitSystem { | ||
return newSystemWithNetworks(address, []lxdAPI.NetworksPost{{ | ||
Name: "UPLINK", | ||
Type: "physical", | ||
NetworkPut: lxdAPI.NetworkPut{ | ||
Config: config, | ||
}, | ||
}}) | ||
} | ||
|
||
func newTestHandler(addr string, t *testing.T) *service.Handler { | ||
handler, err := service.NewHandler("testSystem", addr, "/tmp/microcloud_test_hander", true, true) | ||
if err != nil { | ||
t.Fatalf("Failed to create test service handler: %s", err) | ||
} | ||
|
||
return handler | ||
} | ||
|
||
func newTestSystemsMap(systems ...InitSystem) map[string]InitSystem { | ||
systemsMap := map[string]InitSystem{} | ||
|
||
for _, system := range systems { | ||
systemsMap[system.ServerInfo.Name] = system | ||
} | ||
|
||
return systemsMap | ||
} | ||
|
||
func ensureValidateSystemsPasses(handler *service.Handler, testSystems map[string]InitSystem, t *testing.T) { | ||
for testName, system := range testSystems { | ||
systems := newTestSystemsMap(system) | ||
|
||
err := validateSystems(handler, systems) | ||
if err != nil { | ||
t.Fatalf("Valid system %q failed validate: %s", testName, err) | ||
} | ||
} | ||
} | ||
|
||
func ensureValidateSystemsFails(handler *service.Handler, testSystems map[string]InitSystem, t *testing.T) { | ||
for testName, system := range testSystems { | ||
systems := newTestSystemsMap(system) | ||
|
||
err := validateSystems(handler, systems) | ||
if err == nil { | ||
t.Fatalf("Invalid system %q passed validation", testName) | ||
} | ||
} | ||
} | ||
|
||
func TestValidateSystemsIP4(t *testing.T) { | ||
address := "192.168.1.27" | ||
handler := newTestHandler(address, t) | ||
|
||
// Each entry in these maps is validated individually | ||
validSystems := map[string]InitSystem{ | ||
"plainGateway": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "10.234.0.1/16", | ||
}), | ||
"16Net": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "10.42.0.1/16", | ||
"ipv4.ovn.ranges": "10.42.1.1-10.42.5.255", | ||
}), | ||
"24Net": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "190.168.4.1/24", | ||
"ipv4.ovn.ranges": "190.168.4.50-190.168.4.60", | ||
}), | ||
} | ||
|
||
ensureValidateSystemsPasses(handler, validSystems, t) | ||
|
||
invalidSystems := map[string]InitSystem{ | ||
"gatewayIsSubnetAddr": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "192.168.28.0/24", | ||
}), | ||
"backwardsRange": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "10.42.0.1/16", | ||
"ipv4.ovn.ranges": "10.42.5.255-10.42.1.1", | ||
}), | ||
"rangesOutsideGateway": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "10.1.1.0/24", | ||
"ipv4.ovn.ranges": "10.2.2.50-10.2.2.100", | ||
}), | ||
"uplinkContainsManagementAddr": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "192.168.1.1/24", | ||
"ipv4.ovn.ranges": "192.168.1.50-192.168.1.200", | ||
}), | ||
"uplinkContainsManagementAddrNoRange": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv4.gateway": "192.168.1.1/16", | ||
}), | ||
} | ||
|
||
ensureValidateSystemsFails(handler, invalidSystems, t) | ||
} | ||
|
||
func TestValidateSystemsIP6(t *testing.T) { | ||
address := "fc00:feed:beef::bed1" | ||
handler := newTestHandler(address, t) | ||
|
||
validSystems := map[string]InitSystem{ | ||
"plainGateway": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv6.gateway": "fc00:bad:feed::1/64", | ||
}), | ||
"64Net": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv6.gateway": "fc00:bad:feed::1/64", | ||
"ipv6.ovn.ranges": "fc00:bad:feed::f-fc00:bad:feed::fffe", | ||
}), | ||
} | ||
|
||
ensureValidateSystemsPasses(handler, validSystems, t) | ||
|
||
invalidSystems := map[string]InitSystem{ | ||
"gatewayIsSubnetAddr": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv6.gateway": "fc00:feed:f00d::0/64", | ||
}), | ||
"rangesOutsideGateway": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv6.gateway": "fc00:feed:f00d::1/64", | ||
"ipv6.ovn.ranges": "fc00:feed:beef::f-fc00:feed:beef::fffe", | ||
}), | ||
"uplinkContainsManagementAddr": newSystemWithUplinkNetConfig(address, map[string]string{ | ||
"ipv6.gateway": "fc00:feed:beef::1/64", | ||
}), | ||
} | ||
|
||
ensureValidateSystemsFails(handler, invalidSystems, t) | ||
} | ||
|
||
func TestValidateSystemsMultiSystem(t *testing.T) { | ||
localAddr := "10.23.1.72" | ||
handler := newTestHandler(localAddr, t) | ||
|
||
uplinkConfig := map[string]string{ | ||
"ipv4.gateway": "10.100.1.1/16", | ||
} | ||
|
||
sys1 := newSystemWithUplinkNetConfig(localAddr, uplinkConfig) | ||
|
||
sys2 := newSystemWithUplinkNetConfig("10.100.20.20", uplinkConfig) | ||
sys2.ServerInfo.Name = "sys2" | ||
|
||
systems := newTestSystemsMap(sys1, sys2) | ||
|
||
err := validateSystems(handler, systems) | ||
if err == nil { | ||
t.Fatalf("sys1 and sys2 with conflicting uplink and management networks passed validation") | ||
} | ||
|
||
localAddr = "fc00:feed:beef::f00d" | ||
handler = newTestHandler(localAddr, t) | ||
|
||
uplinkConfig = map[string]string{ | ||
"ipv6.gateway": "fc00:bad:feed::1/64", | ||
} | ||
|
||
sys3 := newSystemWithUplinkNetConfig(localAddr, uplinkConfig) | ||
|
||
sys4 := newSystemWithUplinkNetConfig("fc00:bad:feed::f00d", uplinkConfig) | ||
sys4.ServerInfo.Name = "sys4" | ||
|
||
systems = newTestSystemsMap(sys3, sys4) | ||
|
||
err = validateSystems(handler, systems) | ||
if err == nil { | ||
t.Fatalf("sys3 and sys4 with conflicting uplink and default networks passed validation") | ||
} | ||
} |