|
@@ -5,10 +5,10 @@ package testutils
|
|
|
|
|
|
import (
|
|
|
"runtime"
|
|
|
- "syscall"
|
|
|
"testing"
|
|
|
|
|
|
"github.com/docker/docker/libnetwork/ns"
|
|
|
+ "github.com/vishvananda/netns"
|
|
|
)
|
|
|
|
|
|
// SetupTestOSContext joins a new network namespace, and returns its associated
|
|
@@ -18,26 +18,40 @@ import (
|
|
|
//
|
|
|
// defer SetupTestOSContext(t)()
|
|
|
func SetupTestOSContext(t *testing.T) func() {
|
|
|
- runtime.LockOSThread()
|
|
|
- if err := syscall.Unshare(syscall.CLONE_NEWNET); err != nil {
|
|
|
- t.Fatalf("Failed to enter netns: %v", err)
|
|
|
+ origNS, err := netns.Get()
|
|
|
+ if err != nil {
|
|
|
+ t.Fatalf("Failed to open initial netns: %v", err)
|
|
|
+ }
|
|
|
+ restore := func() {
|
|
|
+ if err := netns.Set(origNS); err != nil {
|
|
|
+ t.Logf("Warning: failed to restore thread netns (%v)", err)
|
|
|
+ } else {
|
|
|
+ runtime.UnlockOSThread()
|
|
|
+ }
|
|
|
+
|
|
|
+ if err := origNS.Close(); err != nil {
|
|
|
+ t.Logf("Warning: netns closing failed (%v)", err)
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
- fd, err := syscall.Open("/proc/self/ns/net", syscall.O_RDONLY, 0)
|
|
|
+ runtime.LockOSThread()
|
|
|
+ newNS, err := netns.New()
|
|
|
if err != nil {
|
|
|
- t.Fatal("Failed to open netns file")
|
|
|
+ // netns.New() is not atomic: it could have encountered an error
|
|
|
+ // after unsharing the current thread's network namespace.
|
|
|
+ restore()
|
|
|
+ t.Fatalf("Failed to enter netns: %v", err)
|
|
|
}
|
|
|
|
|
|
// Since we are switching to a new test namespace make
|
|
|
// sure to re-initialize initNs context
|
|
|
ns.Init()
|
|
|
|
|
|
- runtime.LockOSThread()
|
|
|
-
|
|
|
return func() {
|
|
|
- if err := syscall.Close(fd); err != nil {
|
|
|
+ if err := newNS.Close(); err != nil {
|
|
|
t.Logf("Warning: netns closing failed (%v)", err)
|
|
|
}
|
|
|
- runtime.UnlockOSThread()
|
|
|
+ restore()
|
|
|
+ ns.Init()
|
|
|
}
|
|
|
}
|