summaryrefslogtreecommitdiffhomepage
path: root/pkg/tcpip/link/muxed/injectable_test.go
diff options
context:
space:
mode:
authorGoogler <noreply@google.com>2019-02-07 13:44:57 -0800
committerShentubot <shentubot@google.com>2019-02-07 13:46:26 -0800
commite0afa8789963c18c1afed7d222754ef4b7415a7d (patch)
tree7022cf540cf9d557aa53780235cdb22497e28340 /pkg/tcpip/link/muxed/injectable_test.go
parent9ef3427ac14a84002497f3c8bac346486cb36f2b (diff)
Internal change.
PiperOrigin-RevId: 232937200 Change-Id: I5c3709cc8f1313313ff618a45e48c14a3a111cb4
Diffstat (limited to 'pkg/tcpip/link/muxed/injectable_test.go')
-rw-r--r--pkg/tcpip/link/muxed/injectable_test.go78
1 files changed, 78 insertions, 0 deletions
diff --git a/pkg/tcpip/link/muxed/injectable_test.go b/pkg/tcpip/link/muxed/injectable_test.go
new file mode 100644
index 000000000..8a1a863ff
--- /dev/null
+++ b/pkg/tcpip/link/muxed/injectable_test.go
@@ -0,0 +1,78 @@
+// Copyright 2019 Google LLC
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package injectable
+
+import (
+ "bytes"
+ "net"
+ "os"
+ "syscall"
+ "testing"
+
+ "gvisor.googlesource.com/gvisor/pkg/tcpip"
+ "gvisor.googlesource.com/gvisor/pkg/tcpip/buffer"
+ "gvisor.googlesource.com/gvisor/pkg/tcpip/link/fdbased"
+ "gvisor.googlesource.com/gvisor/pkg/tcpip/network/ipv4"
+ "gvisor.googlesource.com/gvisor/pkg/tcpip/stack"
+)
+
+func TestMuxedEndpointDispatch(t *testing.T) {
+ endpoint, sock, dstIP := makeMuxedTestEndpoint(t)
+ hdr := buffer.NewPrependable(1)
+ hdr.Prepend(1)[0] = 0xFA
+ packetRoute := stack.Route{RemoteAddress: dstIP}
+
+ endpoint.WritePacket(&packetRoute, hdr,
+ buffer.NewViewFromBytes([]byte{0xFB}).ToVectorisedView(), ipv4.ProtocolNumber)
+
+ buf := make([]byte, 6500)
+ bytesRead, err := sock.Read(buf)
+ if err != nil {
+ t.Fatalf("Unable to read from socketpair: %v", err)
+ }
+ if got, want := buf[:bytesRead], []byte{0xFA, 0xFB}; !bytes.Equal(got, want) {
+ t.Fatalf("Read %v from the socketpair, wanted %v", got, want)
+ }
+}
+
+func TestMuxedEndpointDispatchHdrOnly(t *testing.T) {
+ endpoint, sock, dstIP := makeMuxedTestEndpoint(t)
+ hdr := buffer.NewPrependable(1)
+ hdr.Prepend(1)[0] = 0xFA
+ packetRoute := stack.Route{RemoteAddress: dstIP}
+ endpoint.WritePacket(&packetRoute, hdr,
+ buffer.NewView(0).ToVectorisedView(), ipv4.ProtocolNumber)
+ buf := make([]byte, 6500)
+ bytesRead, err := sock.Read(buf)
+ if err != nil {
+ t.Fatalf("Unable to read from socketpair: %v", err)
+ }
+ if got, want := buf[:bytesRead], []byte{0xFA}; !bytes.Equal(got, want) {
+ t.Fatalf("Read %v from the socketpair, wanted %v", got, want)
+ }
+}
+
+func makeMuxedTestEndpoint(t *testing.T) (*MuxedInjectableEndpoint, *os.File, tcpip.Address) {
+ dstIP := tcpip.Address(net.ParseIP("1.2.3.4").To4())
+ pair, err := syscall.Socketpair(syscall.AF_UNIX,
+ syscall.SOCK_SEQPACKET|syscall.SOCK_CLOEXEC|syscall.SOCK_NONBLOCK, 0)
+ if err != nil {
+ t.Fatal("Failed to create socket pair:", err)
+ }
+ _, underlyingEndpoint := fdbased.NewInjectable(pair[1], 6500)
+ routes := map[tcpip.Address]stack.InjectableLinkEndpoint{dstIP: underlyingEndpoint}
+ _, endpoint := NewMuxedInjectableEndpoint(routes, 6500)
+ return endpoint, os.NewFile(uintptr(pair[0]), "test route end"), dstIP
+}