mirror of https://github.com/aya-rs/aya
test: add the possibility to run a test inside a network namespace
For tests that do networking operations, this allows to have a clean-state network namespace and interfaces for each test. Mainly, this avoids "device or resource busy" errors when reusing the loopback interface across tests.pull/696/head
parent
e95f76a5b3
commit
c74813f8c5
@ -0,0 +1,72 @@
|
|||||||
|
//! Utilities to run tests
|
||||||
|
|
||||||
|
use std::{
|
||||||
|
ffi::CString,
|
||||||
|
io, process,
|
||||||
|
sync::atomic::{AtomicU64, Ordering},
|
||||||
|
};
|
||||||
|
|
||||||
|
use aya::netlink_set_link_up;
|
||||||
|
use libc::if_nametoindex;
|
||||||
|
use netns_rs::{get_from_current_thread, NetNs};
|
||||||
|
|
||||||
|
pub struct NetNsGuard {
|
||||||
|
name: String,
|
||||||
|
old_ns: NetNs,
|
||||||
|
ns: Option<NetNs>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl NetNsGuard {
|
||||||
|
pub fn new() -> Self {
|
||||||
|
let old_ns = get_from_current_thread().expect("Failed to get current netns");
|
||||||
|
|
||||||
|
static COUNTER: AtomicU64 = AtomicU64::new(0);
|
||||||
|
let pid = process::id();
|
||||||
|
let name = format!("aya-test-{pid}-{}", COUNTER.fetch_add(1, Ordering::Relaxed));
|
||||||
|
|
||||||
|
// Create and enter netns
|
||||||
|
let ns = NetNs::new(&name).unwrap_or_else(|e| panic!("Failed to create netns {name}: {e}"));
|
||||||
|
let netns = Self {
|
||||||
|
old_ns,
|
||||||
|
ns: Some(ns),
|
||||||
|
name,
|
||||||
|
};
|
||||||
|
|
||||||
|
let ns = netns.ns.as_ref().unwrap();
|
||||||
|
ns.enter()
|
||||||
|
.unwrap_or_else(|e| panic!("Failed to enter network namespace {}: {e}", netns.name));
|
||||||
|
println!("Entered network namespace {}", netns.name);
|
||||||
|
|
||||||
|
// By default, the loopback in a new netns is down. Set it up.
|
||||||
|
let lo = CString::new("lo").unwrap();
|
||||||
|
unsafe {
|
||||||
|
let idx = if_nametoindex(lo.as_ptr());
|
||||||
|
if idx == 0 {
|
||||||
|
panic!(
|
||||||
|
"Interface `lo` not found in netns {}: {}",
|
||||||
|
netns.name,
|
||||||
|
io::Error::last_os_error()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
netlink_set_link_up(idx as i32)
|
||||||
|
.unwrap_or_else(|e| panic!("Failed to set `lo` up in netns {}: {e}", netns.name));
|
||||||
|
}
|
||||||
|
|
||||||
|
netns
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Drop for NetNsGuard {
|
||||||
|
fn drop(&mut self) {
|
||||||
|
// Avoid panic in panic
|
||||||
|
if let Err(e) = self.old_ns.enter() {
|
||||||
|
eprintln!("Failed to return to original netns: {e}");
|
||||||
|
}
|
||||||
|
if let Some(ns) = self.ns.take() {
|
||||||
|
if let Err(e) = ns.remove() {
|
||||||
|
eprintln!("Failed to remove netns {}: {e}", self.name);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
println!("Exited network namespace {}", self.name);
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue