Files
netlink/bridge_linux_test.go
Matteo Dallaglio c7039a4139 bridge: add per-device BridgeVlanTunnelShowDev
Add BridgeVlanTunnelShowDev(link) to retrieve VLAN-to-tunnel-ID mappings
for a specific device, equivalent to `bridge vlan tunnelshow dev DEV`.

The existing BridgeVlanTunnelShow() returns a flat []TunnelInfo for all
bridge ports. Since TunnelInfo only contains {TunId, Vid} without an
ifindex, callers cannot determine which device each mapping belongs to.
This forces users to shell out to `bridge -j vlan tunnelshow dev <name>`
and parse JSON instead.

The internal bridgeVlanTunnelShowBy(ifindex) helper
performs a full dump and filters client-side by ifindex (matching how
iproute2 implements `bridge vlan tunnelshow dev DEV`). When ifindex is 0,
all devices are returned.

BridgeVlanTunnelShow() is refactored to use the same helper with no
behavior change (ifindex=0 dumps all devices).

Signed-off-by: Matteo Dallaglio <mdallagl@redhat.com>
2026-02-09 12:15:43 -08:00

460 lines
11 KiB
Go

package netlink
import (
"fmt"
"io/ioutil"
"testing"
"github.com/vishvananda/netlink/nl"
)
func TestBridgeVlan(t *testing.T) {
minKernelRequired(t, 3, 10)
t.Cleanup(setUpNetlinkTest(t))
if err := remountSysfs(); err != nil {
t.Fatal(err)
}
bridgeName := "foo"
bridge := &Bridge{LinkAttrs: LinkAttrs{Name: bridgeName}}
if err := LinkAdd(bridge); err != nil {
t.Fatal(err)
}
if err := ioutil.WriteFile(fmt.Sprintf("/sys/devices/virtual/net/%s/bridge/vlan_filtering", bridgeName), []byte("1"), 0644); err != nil {
t.Fatal(err)
}
if vlanMap, err := BridgeVlanList(); err != nil {
t.Fatal(err)
} else {
if len(vlanMap) != 1 {
t.Fatal()
}
if vInfo, ok := vlanMap[int32(bridge.Index)]; !ok {
t.Fatal("vlanMap should include foo port vlan info")
} else {
if len(vInfo) != 1 {
t.Fatal()
} else {
if !vInfo[0].EngressUntag() || !vInfo[0].PortVID() || vInfo[0].Vid != 1 {
t.Fatalf("bridge vlan show get wrong return %s", vInfo[0].String())
}
}
}
}
dummy := &Dummy{LinkAttrs: LinkAttrs{Name: "dum1"}}
if err := LinkAdd(dummy); err != nil {
t.Fatal(err)
}
if err := LinkSetMaster(dummy, bridge); err != nil {
t.Fatal(err)
}
if err := BridgeVlanAdd(dummy, 2, false, false, false, false); err != nil {
t.Fatal(err)
}
if err := BridgeVlanAdd(dummy, 3, true, true, false, false); err != nil {
t.Fatal(err)
}
if err := BridgeVlanAddRange(dummy, 4, 6, false, false, false, false); err != nil {
t.Fatal(err)
}
if vlanMap, err := BridgeVlanList(); err != nil {
t.Fatal(err)
} else {
if len(vlanMap) != 2 {
t.Fatal()
}
if vInfo, ok := vlanMap[int32(bridge.Index)]; !ok {
t.Fatal("vlanMap should include foo port vlan info")
} else {
if fmt.Sprintf("%v", vInfo) != "[{Flags:6 Vid:1}]" {
t.Fatalf("unexpected result %v", vInfo)
}
}
if vInfo, ok := vlanMap[int32(dummy.Index)]; !ok {
t.Fatal("vlanMap should include dum1 port vlan info")
} else {
if fmt.Sprintf("%v", vInfo) != "[{Flags:4 Vid:1} {Flags:0 Vid:2} {Flags:6 Vid:3} {Flags:0 Vid:4} {Flags:0 Vid:5} {Flags:0 Vid:6}]" {
t.Fatalf("unexpected result %v", vInfo)
}
}
}
}
func TestBridgeVlanTunnelInfo(t *testing.T) {
minKernelRequired(t, 4, 11)
t.Cleanup(setUpNetlinkTest(t))
if err := remountSysfs(); err != nil {
t.Fatal(err)
}
bridgeName := "br0"
vxlanName := "vxlan0"
// ip link add br0 type bridge
bridge := &Bridge{LinkAttrs: LinkAttrs{Name: bridgeName}}
if err := LinkAdd(bridge); err != nil {
t.Fatal(err)
}
// ip link add vxlan0 type vxlan dstport 4789 nolearning external local 10.0.1.1
vxlan := &Vxlan{
// local
SrcAddr: []byte("10.0.1.1"),
Learning: false,
// external
FlowBased: true,
// dstport
Port: 4789,
LinkAttrs: LinkAttrs{Name: vxlanName},
}
if err := LinkAdd(vxlan); err != nil {
t.Fatal(err)
}
// ip link set dev vxlan0 master br0
if err := LinkSetMaster(vxlan, bridge); err != nil {
t.Fatal(err)
}
// ip link set br0 type bridge vlan_filtering 1
if err := BridgeSetVlanFiltering(bridge, true); err != nil {
t.Fatal(err)
}
// bridge link set dev vxlan0 vlan_tunnel on
if err := LinkSetVlanTunnel(vxlan, true); err != nil {
t.Fatal(err)
}
p, err := LinkGetProtinfo(vxlan)
if err != nil {
t.Fatal(err)
}
if !p.VlanTunnel {
t.Fatal("vlan tunnel should be enabled on vxlan device")
}
// bridge vlan add vid 10 dev vxlan0
if err := BridgeVlanAdd(vxlan, 10, false, false, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add vid 11 dev vxlan0
if err := BridgeVlanAdd(vxlan, 11, false, false, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add dev vxlan0 vid 10 tunnel_info id 20
if err := BridgeVlanAddTunnelInfo(vxlan, 10, 20, false, false); err != nil {
t.Fatal(err)
}
tis, err := BridgeVlanTunnelShow()
if err != nil {
t.Fatal(err)
}
if len(tis) != 1 {
t.Fatal("only one tunnel info")
}
ti := tis[0]
if ti.TunId != 20 || ti.Vid != 10 {
t.Fatal("unexpected result")
}
// bridge vlan del dev vxlan0 vid 10 tunnel_info id 20
if err := BridgeVlanDelTunnelInfo(vxlan, 10, 20, false, false); err != nil {
t.Fatal(err)
}
tis, err = BridgeVlanTunnelShow()
if err != nil {
t.Fatal(err)
}
if len(tis) != 0 {
t.Fatal("tunnel info should have been deleted")
}
// bridge vlan add dev vxlan0 vid 10-11 tunnel_info id 20-21
if err := BridgeVlanAddRangeTunnelInfoRange(vxlan, 10, 11, 20, 21, false, false); err != nil {
t.Fatal(err)
}
tis, err = BridgeVlanTunnelShow()
if err != nil {
t.Fatal(err)
}
if len(tis) != 2 {
t.Fatal("two tunnel info")
}
// bridge vlan del dev vxlan0 vid 10-11 tunnel_info id 20-21
if err := BridgeVlanDelRangeTunnelInfoRange(vxlan, 10, 11, 20, 21, false, false); err != nil {
t.Fatal(err)
}
tis, err = BridgeVlanTunnelShow()
if err != nil {
t.Fatal(err)
}
if len(tis) != 0 {
t.Fatal("tunnel info should have been deleted")
}
}
func TestBridgeVni(t *testing.T) {
minKernelRequired(t, 5, 18)
t.Cleanup(setUpNetlinkTest(t))
vxlanName := "vxlan0"
// ip link add vxlan0 type vxlan dstport 4789 nolearning external vnifilter
vxlan := &Vxlan{
LinkAttrs: LinkAttrs{Name: vxlanName},
Learning: false,
FlowBased: true,
VniFilter: true,
}
if err := LinkAdd(vxlan); err != nil {
t.Fatal(err)
}
link, err := LinkByName(vxlanName)
if err != nil {
t.Fatal(err)
}
// bridge vni add dev vxlan0 vni 100
if err := BridgeVniAdd(link, 100); err != nil {
t.Fatal(err)
}
// bridge vni show
vniMap, err := BridgeVniList()
if err != nil {
t.Fatal(err)
}
vnis := vniMap[int32(link.Attrs().Index)]
if len(vnis) != 1 {
t.Fatalf("expected 1 VNI, got %d", len(vnis))
}
if vnis[0].Vni != 100 {
t.Fatalf("expected VNI 100, got %d", vnis[0].Vni)
}
if vnis[0].VniEnd != 0 {
t.Fatalf("expected VniEnd 0 for single VNI, got %d", vnis[0].VniEnd)
}
// bridge vni del dev vxlan0 vni 100
if err := BridgeVniDel(link, 100); err != nil {
t.Fatal(err)
}
vniMap, err = BridgeVniList()
if err != nil {
t.Fatal(err)
}
vnis = vniMap[int32(link.Attrs().Index)]
if len(vnis) != 0 {
t.Fatalf("expected 0 VNI entries after delete, got %d", len(vnis))
}
// bridge vni add dev vxlan0 vni 200-210
if err := BridgeVniAddRange(link, 200, 210); err != nil {
t.Fatal(err)
}
// bridge vni show
vniMap, err = BridgeVniList()
if err != nil {
t.Fatal(err)
}
vnis = vniMap[int32(link.Attrs().Index)]
if len(vnis) != 1 {
t.Fatalf("expected 1 VNI range entry, got %d", len(vnis))
}
if vnis[0].Vni != 200 {
t.Fatalf("expected VNI start 200, got %d", vnis[0].Vni)
}
if vnis[0].VniEnd != 210 {
t.Fatalf("expected VNI end 210, got %d", vnis[0].VniEnd)
}
// bridge vni del dev vxlan0 vni 200-210
if err := BridgeVniDelRange(link, 200, 210); err != nil {
t.Fatal(err)
}
vniMap, err = BridgeVniList()
if err != nil {
t.Fatal(err)
}
vnis = vniMap[int32(link.Attrs().Index)]
if len(vnis) != 0 {
t.Fatalf("expected 0 VNI entries after range delete, got %d", len(vnis))
}
}
func setupBridgeWithTwoVxlans(t *testing.T) (*Bridge, *Vxlan, *Vxlan) {
t.Helper()
// ip link add br0 type bridge
bridge := &Bridge{LinkAttrs: LinkAttrs{Name: "br0"}}
if err := LinkAdd(bridge); err != nil {
t.Fatal(err)
}
// ip link add vxlan0 type vxlan dstport 4789 nolearning external local 10.0.1.1
vxlan0 := &Vxlan{
LinkAttrs: LinkAttrs{Name: "vxlan0"},
SrcAddr: []byte("10.0.1.1"),
Learning: false,
FlowBased: true,
Port: 4789,
}
if err := LinkAdd(vxlan0); err != nil {
t.Fatal(err)
}
// ip link add vxlan1 type vxlan dstport 4790 nolearning external local 10.0.1.1
vxlan1 := &Vxlan{
LinkAttrs: LinkAttrs{Name: "vxlan1"},
SrcAddr: []byte("10.0.1.1"),
Learning: false,
FlowBased: true,
Port: 4790,
}
if err := LinkAdd(vxlan1); err != nil {
t.Fatal(err)
}
// ip link set dev vxlan0 master br0
// ip link set dev vxlan1 master br0
for _, vxlan := range []*Vxlan{vxlan0, vxlan1} {
if err := LinkSetMaster(vxlan, bridge); err != nil {
t.Fatal(err)
}
}
// ip link set br0 type bridge vlan_filtering 1
if err := BridgeSetVlanFiltering(bridge, true); err != nil {
t.Fatal(err)
}
// bridge link set dev vxlan0 vlan_tunnel on
// bridge link set dev vxlan1 vlan_tunnel on
for _, vxlan := range []*Vxlan{vxlan0, vxlan1} {
if err := LinkSetVlanTunnel(vxlan, true); err != nil {
t.Fatal(err)
}
}
return bridge, vxlan0, vxlan1
}
func TestBridgeVlanTunnelShowDev(t *testing.T) {
minKernelRequired(t, 4, 11)
t.Cleanup(setUpNetlinkTest(t))
if err := remountSysfs(); err != nil {
t.Fatal(err)
}
bridge, vxlan0, vxlan1 := setupBridgeWithTwoVxlans(t)
// bridge vlan add vid 10 dev vxlan0
if err := BridgeVlanAdd(vxlan0, 10, false, false, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add dev vxlan0 vid 10 tunnel_info id 100
if err := BridgeVlanAddTunnelInfo(vxlan0, 10, 100, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add vid 11 dev vxlan0
if err := BridgeVlanAdd(vxlan0, 11, false, false, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add dev vxlan0 vid 11 tunnel_info id 101
if err := BridgeVlanAddTunnelInfo(vxlan0, 11, 101, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add vid 20 dev vxlan1
if err := BridgeVlanAdd(vxlan1, 20, false, false, false, false); err != nil {
t.Fatal(err)
}
// bridge vlan add dev vxlan1 vid 20 tunnel_info id 200
if err := BridgeVlanAddTunnelInfo(vxlan1, 20, 200, false, false); err != nil {
t.Fatal(err)
}
// Verify vxlan0 returns only its tunnel infos
tis, err := BridgeVlanTunnelShowDev(vxlan0)
if err != nil {
t.Fatal(err)
}
if len(tis) != 2 {
t.Fatalf("vxlan0: expected 2 tunnel infos, got %d: %v", len(tis), tis)
}
if tis[0] != (nl.TunnelInfo{Vid: 10, TunId: 100}) || tis[1] != (nl.TunnelInfo{Vid: 11, TunId: 101}) {
t.Fatalf("vxlan0: unexpected tunnel infos: %+v", tis)
}
// Verify vxlan1 returns only its tunnel infos
tis, err = BridgeVlanTunnelShowDev(vxlan1)
if err != nil {
t.Fatal(err)
}
if len(tis) != 1 {
t.Fatalf("vxlan1: expected 1 tunnel info, got %d: %v", len(tis), tis)
}
if tis[0] != (nl.TunnelInfo{Vid: 20, TunId: 200}) {
t.Fatalf("vxlan1: unexpected tunnel info: %+v", tis)
}
// Verify bridge itself returns no tunnel infos
tis, err = BridgeVlanTunnelShowDev(bridge)
if err != nil {
t.Fatal(err)
}
if len(tis) != 0 {
t.Fatalf("bridge: expected 0 tunnel infos, got %d: %v", len(tis), tis)
}
}
func TestBridgeGroupFwdMask(t *testing.T) {
minKernelRequired(t, 4, 15) //minimal release for per-port group_fwd_mask
t.Cleanup(setUpNetlinkTest(t))
if err := remountSysfs(); err != nil {
t.Fatal(err)
}
bridgeName := "foo"
var mask uint16 = 0xfff0
bridge := &Bridge{LinkAttrs: LinkAttrs{Name: bridgeName}, GroupFwdMask: &mask}
if err := LinkAdd(bridge); err != nil {
t.Fatal(err)
}
brlink, err := LinkByName(bridgeName)
if err != nil {
t.Fatal(err)
}
if *(brlink.(*Bridge).GroupFwdMask) != mask {
t.Fatalf("created bridge has group_fwd_mask value %x, different from expected %x",
*(brlink.(*Bridge).GroupFwdMask), mask)
}
dummyName := "dm1"
dummy := &Dummy{LinkAttrs: LinkAttrs{Name: dummyName, MasterIndex: brlink.Attrs().Index}}
if err := LinkAdd(dummy); err != nil {
t.Fatal(err)
}
dmLink, err := LinkByName(dummyName)
if err != nil {
t.Fatal(err)
}
if err = LinkSetBRSlaveGroupFwdMask(dmLink, mask); err != nil {
t.Fatal(err)
}
}