func wireNetworker( log lager.Logger, tag string, networkPoolCIDR *net.IPNet, externalIP net.IP, iptablesMgr kawasaki.IPTablesConfigurer, interfacePrefix string, chainPrefix string, propManager *properties.Manager, networkModulePath string) gardener.Networker { runner := &logging.Runner{CommandRunner: linux_command_runner.New(), Logger: log.Session("network-runner")} hostConfigurer := &configure.Host{ Veth: &devices.VethCreator{}, Link: &devices.Link{Name: "guardian"}, Bridge: &devices.Bridge{}, Logger: log.Session("network-host-configurer"), } containerCfgApplier := &configure.Container{ Logger: log.Session("network-container-configurer"), Link: &devices.Link{Name: "guardian"}, } idGenerator := kawasaki.NewSequentialIDGenerator(time.Now().UnixNano()) portPool, err := ports.NewPool(uint32(*portPoolStart), uint32(*portPoolSize), ports.State{}) if err != nil { log.Fatal("invalid pool range", err) } switch networkModulePath { case "": return kawasaki.New( kawasaki.NewManager(runner, "/var/run/netns"), kawasaki.SpecParserFunc(kawasaki.ParseSpec), subnets.NewPool(networkPoolCIDR), kawasaki.NewConfigCreator(idGenerator, interfacePrefix, chainPrefix, externalIP), kawasaki.NewConfigurer( hostConfigurer, containerCfgApplier, iptablesMgr, &netns.Execer{}, ), propManager, iptables.NewPortForwarder(runner), portPool, ) default: if _, err := os.Stat(networkModulePath); err != nil { log.Fatal("failed-to-stat-network-module", err) return nil } return gardener.ForeignNetworkAdaptor{ ForeignNetworker: genclient.New(networkModulePath), } } }
containerHandle = fmt.Sprintf("h-%d", GinkgoParallelNode()) iptablesChain = "" externalIP = nil containerIP = nil }) JustBeforeEach(func() { spec = &kawasaki.PortForwarderSpec{ IPTableChain: iptablesChain, ExternalIP: externalIP, ContainerIP: containerIP, FromPort: externalPort, ToPort: containerPort, } forwarder = iptables.NewPortForwarder(linux_command_runner.New()) }) Context("when NetworkConfig is valid", func() { BeforeEach(func() { externalIP = net.ParseIP("127.0.0.1") containerIP = net.ParseIP("127.0.0.2") iptablesChain = fmt.Sprintf("chain-%s", containerHandle) createChainCmd := exec.Command("iptables", "-w", "-t", "nat", "-N", iptablesChain) Expect(createChainCmd.Run()).To(Succeed()) }) AfterEach(func() { // clean up rules created by PortForwarder deleteRuleCmd := exec.Command(