13 "github.com/edwarnicke/exechelper"
14 "github.com/stretchr/testify/assert"
15 "github.com/stretchr/testify/suite"
20 DEFAULT_NETWORK_NUM int = 1
23 var isPersistent = flag.Bool("persist", false, "persists topology config")
24 var isVerbose = flag.Bool("verbose", false, "verbose test output")
25 var isUnconfiguring = flag.Bool("unconfigure", false, "remove topology")
26 var isVppDebug = flag.Bool("debug", false, "attach gdb to vpp")
27 var nConfiguredCpus = flag.Int("cpus", 1, "number of CPUs assigned to vpp")
28 var vppSourceFileDir = flag.String("vppsrc", "", "vpp source file directory")
30 type HstSuite struct {
32 containers map[string]*Container
34 netConfigs []NetConfig
35 netInterfaces map[string]*NetInterface
36 ip4AddrAllocator *Ip4AddressAllocator
37 testIds map[string]string
38 cpuAllocator *CpuAllocatorT
39 cpuContexts []*CpuContext
43 func (s *HstSuite) SetupSuite() {
45 s.cpuAllocator, err = CpuAllocator()
47 s.FailNow("failed to init cpu allocator: %v", err)
49 s.cpuPerVpp = *nConfiguredCpus
52 func (s *HstSuite) AllocateCpus() []int {
53 cpuCtx, err := s.cpuAllocator.Allocate(s.cpuPerVpp)
55 s.AddCpuContext(cpuCtx)
59 func (s *HstSuite) AddCpuContext(cpuCtx *CpuContext) {
60 s.cpuContexts = append(s.cpuContexts, cpuCtx)
63 func (s *HstSuite) TearDownSuite() {
64 s.unconfigureNetworkTopology()
67 func (s *HstSuite) TearDownTest() {
71 for _, c := range s.cpuContexts {
78 func (s *HstSuite) skipIfUnconfiguring() {
80 s.skip("skipping to unconfigure")
84 func (s *HstSuite) SetupTest() {
85 s.skipIfUnconfiguring()
90 func (s *HstSuite) setupVolumes() {
91 for _, volume := range s.volumes {
92 cmd := "docker volume create --name=" + volume
98 func (s *HstSuite) setupContainers() {
99 for _, container := range s.containers {
100 if !container.isOptional {
106 func (s *HstSuite) hstFail() {
110 func (s *HstSuite) assertNil(object interface{}, msgAndArgs ...interface{}) {
111 if !assert.Nil(s.T(), object, msgAndArgs...) {
116 func (s *HstSuite) assertNotNil(object interface{}, msgAndArgs ...interface{}) {
117 if !assert.NotNil(s.T(), object, msgAndArgs...) {
122 func (s *HstSuite) assertEqual(expected, actual interface{}, msgAndArgs ...interface{}) {
123 if !assert.Equal(s.T(), expected, actual, msgAndArgs...) {
128 func (s *HstSuite) assertNotEqual(expected, actual interface{}, msgAndArgs ...interface{}) {
129 if !assert.NotEqual(s.T(), expected, actual, msgAndArgs...) {
134 func (s *HstSuite) assertContains(testString, contains interface{}, msgAndArgs ...interface{}) {
135 if !assert.Contains(s.T(), testString, contains, msgAndArgs...) {
140 func (s *HstSuite) assertNotContains(testString, contains interface{}, msgAndArgs ...interface{}) {
141 if !assert.NotContains(s.T(), testString, contains, msgAndArgs...) {
146 func (s *HstSuite) assertNotEmpty(object interface{}, msgAndArgs ...interface{}) {
147 if !assert.NotEmpty(s.T(), object, msgAndArgs...) {
152 func (s *HstSuite) log(args ...any) {
159 func (s *HstSuite) skip(args ...any) {
164 func (s *HstSuite) SkipIfMultiWorker(args ...any) {
165 if *nConfiguredCpus > 1 {
166 s.skip("test case not supported with multiple vpp workers")
170 func (s *HstSuite) SkipUnlessExtendedTestsBuilt() {
171 imageName := "hs-test/nginx-http3"
173 cmd := exec.Command("docker", "images", imageName)
174 byteOutput, err := cmd.CombinedOutput()
176 s.log("error while searching for docker image")
179 if !strings.Contains(string(byteOutput), imageName) {
180 s.skip("extended tests not built")
184 func (s *HstSuite) resetContainers() {
185 for _, container := range s.containers {
190 func (s *HstSuite) removeVolumes() {
191 for _, volumeName := range s.volumes {
192 cmd := "docker volume rm " + volumeName
194 os.RemoveAll(volumeName)
198 func (s *HstSuite) getContainerByName(name string) *Container {
199 return s.containers[name]
203 * Create a copy and return its address, so that individial tests which call this
204 * are not able to modify the original container and affect other tests by doing that
206 func (s *HstSuite) getTransientContainerByName(name string) *Container {
207 containerCopy := *s.containers[name]
208 return &containerCopy
211 func (s *HstSuite) loadContainerTopology(topologyName string) {
212 data, err := ioutil.ReadFile(containerTopologyDir + topologyName + ".yaml")
214 s.T().Fatalf("read error: %v", err)
216 var yamlTopo YamlTopology
217 err = yaml.Unmarshal(data, &yamlTopo)
219 s.T().Fatalf("unmarshal error: %v", err)
222 for _, elem := range yamlTopo.Volumes {
223 volumeMap := elem["volume"].(VolumeConfig)
224 hostDir := volumeMap["host-dir"].(string)
225 s.volumes = append(s.volumes, hostDir)
228 s.containers = make(map[string]*Container)
229 for _, elem := range yamlTopo.Containers {
230 newContainer, err := newContainer(elem)
231 newContainer.suite = s
233 s.T().Fatalf("container config error: %v", err)
235 s.containers[newContainer.name] = newContainer
239 func (s *HstSuite) loadNetworkTopology(topologyName string) {
240 data, err := ioutil.ReadFile(networkTopologyDir + topologyName + ".yaml")
242 s.T().Fatalf("read error: %v", err)
244 var yamlTopo YamlTopology
245 err = yaml.Unmarshal(data, &yamlTopo)
247 s.T().Fatalf("unmarshal error: %v", err)
250 s.ip4AddrAllocator = NewIp4AddressAllocator()
251 s.netInterfaces = make(map[string]*NetInterface)
252 for _, elem := range yamlTopo.Devices {
253 switch elem["type"].(string) {
256 if namespace, err := newNetNamespace(elem); err == nil {
257 s.netConfigs = append(s.netConfigs, &namespace)
259 s.T().Fatalf("network config error: %v", err)
264 if netIf, err := newNetworkInterface(elem, s.ip4AddrAllocator); err == nil {
265 s.netConfigs = append(s.netConfigs, netIf)
266 s.netInterfaces[netIf.Name()] = netIf
268 s.T().Fatalf("network config error: %v", err)
273 if bridge, err := newBridge(elem); err == nil {
274 s.netConfigs = append(s.netConfigs, &bridge)
276 s.T().Fatalf("network config error: %v", err)
283 func (s *HstSuite) configureNetworkTopology(topologyName string) {
284 s.loadNetworkTopology(topologyName)
286 if *isUnconfiguring {
290 for _, nc := range s.netConfigs {
291 if err := nc.configure(); err != nil {
292 s.T().Fatalf("network config error: %v", err)
297 func (s *HstSuite) unconfigureNetworkTopology() {
301 for _, nc := range s.netConfigs {
306 func (s *HstSuite) getTestId() string {
307 testName := s.T().Name()
309 if s.testIds == nil {
310 s.testIds = map[string]string{}
313 if _, ok := s.testIds[testName]; !ok {
314 s.testIds[testName] = time.Now().Format("2006-01-02_15-04-05")
317 return s.testIds[testName]
320 func (s *HstSuite) startServerApp(running chan error, done chan struct{}, env []string) {
321 cmd := exec.Command("iperf3", "-4", "-s")
328 msg := fmt.Errorf("failed to start iperf server: %v", err)
337 func (s *HstSuite) startClientApp(ipAddress string, env []string, clnCh chan error, clnRes chan string) {
345 cmd := exec.Command("iperf3", "-c", ipAddress, "-u", "-l", "1460", "-b", "10g")
350 o, err := cmd.CombinedOutput()
353 clnCh <- fmt.Errorf("failed to start client app '%s'.\n%s", err, o)
356 time.Sleep(1 * time.Second)
360 clnRes <- fmt.Sprintf("Client output: %s", o)
366 func (s *HstSuite) startHttpServer(running chan struct{}, done chan struct{}, addressPort, netNs string) {
367 cmd := newCommand([]string{"./http_server", addressPort}, netNs)
371 fmt.Println("Failed to start http server")
374 running <- struct{}{}
379 func (s *HstSuite) startWget(finished chan error, server_ip, port, query, netNs string) {
381 finished <- errors.New("wget error")
384 cmd := newCommand([]string{"wget", "--timeout=10", "--no-proxy", "--tries=5", "-O", "/dev/null", server_ip + ":" + port + "/" + query},
387 o, err := cmd.CombinedOutput()
389 finished <- fmt.Errorf("wget error: '%v\n\n%s'", err, o)
391 } else if !strings.Contains(string(o), "200 OK") {
392 finished <- fmt.Errorf("wget error: response not 200 OK")