refactor DHCPv4 integration test, inspect dnsmasq output

This commit is contained in:
Michael Stapelberg 2018-06-02 10:16:33 +02:00
parent f971088266
commit ddc110e826

View File

@ -2,133 +2,26 @@ package integration_test
import (
"bytes"
"fmt"
"io/ioutil"
"log"
"net"
"os"
"os/exec"
"regexp"
"strconv"
"strings"
"testing"
"time"
"golang.org/x/sys/unix"
"router7/internal/dhcp4"
"github.com/d2g/dhcp4"
"github.com/d2g/dhcp4client"
"github.com/google/go-cmp/cmp"
"github.com/google/gopacket"
"github.com/google/gopacket/layers"
"github.com/google/gopacket/pcap"
"github.com/google/gopacket/pcapgo"
)
var (
hardwareAddr net.HardwareAddr
)
func addHostname(p *dhcp4.Packet) {
var utsname unix.Utsname
if err := unix.Uname(&utsname); err != nil {
log.Fatal(err)
}
nnb := utsname.Nodename[:bytes.IndexByte(utsname.Nodename[:], 0)]
p.AddOption(dhcp4.OptionHostName, nnb)
}
func addClientId(p *dhcp4.Packet) {
id := make([]byte, len(hardwareAddr)+1)
id[0] = 1 // hardware type ethernet, https://tools.ietf.org/html/rfc1700
copy(id[1:], hardwareAddr)
p.AddOption(dhcp4.OptionClientIdentifier, id)
}
// dhcpRequest is a copy of (dhcp4client/Client).Request which
// includes the hostname.
func dhcpRequest(c *dhcp4client.Client) (bool, dhcp4.Packet, error) {
discoveryPacket := c.DiscoverPacket()
addHostname(&discoveryPacket)
addClientId(&discoveryPacket)
discoveryPacket.PadToMinSize()
if err := c.SendPacket(discoveryPacket); err != nil {
return false, discoveryPacket, err
}
offerPacket, err := c.GetOffer(&discoveryPacket)
if err != nil {
return false, offerPacket, err
}
requestPacket := c.RequestPacket(&offerPacket)
addHostname(&requestPacket)
addClientId(&requestPacket)
requestPacket.PadToMinSize()
if err := c.SendPacket(requestPacket); err != nil {
return false, requestPacket, err
}
acknowledgement, err := c.GetAcknowledgement(&requestPacket)
if err != nil {
return false, acknowledgement, err
}
acknowledgementOptions := acknowledgement.ParseOptions()
if dhcp4.MessageType(acknowledgementOptions[dhcp4.OptionDHCPMessageType][0]) != dhcp4.ACK {
return false, acknowledgement, nil
}
return true, acknowledgement, nil
}
type connection interface {
Close() error
Write(packet []byte) error
ReadFrom() ([]byte, net.IP, error)
SetReadTimeout(t time.Duration) error
}
type replayer struct {
underlying connection
}
func (r *replayer) Close() error { return r.underlying.Close() }
func (r *replayer) Write(b []byte) error { return r.underlying.Write(b) }
func (r *replayer) SetReadTimeout(t time.Duration) error { return r.underlying.SetReadTimeout(t) }
func (r *replayer) ReadFrom() ([]byte, net.IP, error) {
d, ip, err := r.underlying.ReadFrom()
log.Printf("d = %+v, ip = %v, err = %v", d, ip, err)
return d, ip, err
}
func dhcp() error {
v0, err := net.InterfaceByName("veth0a")
if err != nil {
return err
}
hardwareAddr = v0.HardwareAddr
pktsock, err := dhcp4client.NewPacketSock(v0.Index)
if err != nil {
return err
}
dhcp, err := dhcp4client.New(
dhcp4client.HardwareAddr(v0.HardwareAddr),
dhcp4client.Timeout(5*time.Second),
dhcp4client.Broadcast(false),
dhcp4client.Connection(&replayer{underlying: pktsock}),
)
if err != nil {
return err
}
//ok, ack, err := dhcpRequest(dhcp)
fmt.Println(dhcpRequest(dhcp))
return nil
}
func TestDHCPv4(t *testing.T) {
const ns = "ns0" // name of the network namespace to use for this test
@ -158,6 +51,7 @@ func TestDHCPv4(t *testing.T) {
ready.Close() // dnsmasq will re-create the file anyway
defer os.Remove(ready.Name()) // dnsmasq does not clean up its pid file
var stderr bytes.Buffer
dnsmasq := exec.Command("ip", "netns", "exec", ns, "dnsmasq",
"--keep-in-foreground", // cannot use --no-daemon because we need --pid-file
"--log-facility=-", // log to stderr
@ -171,7 +65,7 @@ func TestDHCPv4(t *testing.T) {
"--leasefile-ro", // do not create a lease database
)
dnsmasq.Stdout = os.Stdout
dnsmasq.Stderr = os.Stderr
dnsmasq.Stderr = &stderr
if err := dnsmasq.Start(); err != nil {
t.Fatal(err)
}
@ -229,9 +123,62 @@ func TestDHCPv4(t *testing.T) {
}()
// TODO: test the capture daemon
if err := dhcp(); err != nil {
iface, err := net.InterfaceByName("veth0a")
if err != nil {
t.Fatal(err)
}
c := dhcp4.Client{
Interface: iface,
}
if !c.ObtainOrRenew() {
t.Fatal(c.Err())
}
cfg := c.Config()
t.Logf("cfg = %+v", cfg)
if got, want := cfg.Router, "192.168.23.1"; got != want {
t.Errorf("config: unexpected router: got %q, want %q", got, want)
}
if err := c.Release(); err != nil {
t.Fatal(err)
}
// TODO: use inotify on the leases db to wait for this event
// TODO: alternatively, replace bytes.Buffer with a pipe and read from that
time.Sleep(100 * time.Millisecond) // give dnsmasq some time to process the DHCPRELEASE
// Kill dnsmasq to flush its log
done = true
dnsmasq.Process.Kill()
mac := iface.HardwareAddr.String()
lines := strings.Split(strings.TrimSpace(stderr.String()), "\n")
var dhcpActionRe = regexp.MustCompile(` (DHCP[^ ]*)`)
var actions []string
for _, line := range lines {
if !strings.HasPrefix(line, "dnsmasq-dhcp") {
continue
}
if !strings.Contains(line, mac) {
continue
}
matches := dhcpActionRe.FindStringSubmatch(line)
if matches == nil {
continue
}
actions = append(actions, matches[1])
}
want := []string{
"DHCPDISCOVER(veth0b)",
"DHCPOFFER(veth0b)",
"DHCPREQUEST(veth0b)",
"DHCPACK(veth0b)",
"DHCPRELEASE(veth0b)",
}
if diff := cmp.Diff(actions, want); diff != "" {
t.Errorf("dnsmasq log does not contain expected DHCP sequence: diff (-got +want):\n%s", diff)
}
time.Sleep(1 * time.Second)
handle.Close()
<-closed