On 02/04/2021 10:35, Dumitru Ceara wrote:
> Due to slight differences in behavior and/or output of some of the
> utilities used by the tests when run on different distributions some
> tests were failing, e.g., when run on Ubuntu 20.04.
>
> Use "tcpdump -nn" to avoid host and port resolution; also update "nc"
> usage to avoid options that behave differently on various distributions.
>
> This commit adds no guarantee that tests will pass on all possible
> distributions, only tested on: Fedora 32 and Ubuntu 20.04.
>
> Signed-off-by: Dumitru Ceara <[email protected]>
> ---
> tests/system-ovn.at | 75
> +++++++++++++++++++++------------------------------
> 1 file changed, 31 insertions(+), 44 deletions(-)
>
> diff --git a/tests/system-ovn.at b/tests/system-ovn.at
> index 4885303d1..b6c679907 100644
> --- a/tests/system-ovn.at
> +++ b/tests/system-ovn.at
> @@ -4555,13 +4555,13 @@ NS_CHECK_EXEC([lsp], [nc 88.88.88.89 8080 -z], [0])
>
> # Capture IPv4 UDP hairpinned packets.
> filter="dst 42.42.42.1 and dst port 2021 and udp"
> -NS_CHECK_EXEC([lsp], [tcpdump -n -c 2 -i lsp ${filter} > lsp.pcap &])
> +NS_CHECK_EXEC([lsp], [tcpdump -nn -c 2 -i lsp ${filter} > lsp.pcap &])
>
> sleep 1
>
> # Generate IPv4 UDP hairpin traffic.
> -NS_CHECK_EXEC([lsp], [nc -u 88.88.88.88 4040 -z &], [0])
> -NS_CHECK_EXEC([lsp], [nc -u 88.88.88.89 4040 -z &], [0])
> +NS_CHECK_EXEC([lsp], [echo a | nc -u 88.88.88.88 4040 &], [0])
Why this change?
> +NS_CHECK_EXEC([lsp], [echo a | nc -u 88.88.88.89 4040 &], [0])
>
> # Check hairpin traffic.
> OVS_WAIT_UNTIL([
> @@ -4639,15 +4639,15 @@ NS_CHECK_EXEC([lsp], [timeout 2s nc -k -l 4200::1
> 4041 &], [0])
> NS_CHECK_EXEC([lsp], [nc 8800::0088 8080 -z], [0])
> NS_CHECK_EXEC([lsp], [nc 8800::0089 8080 -z], [0])
>
> -# Capture IPv4 UDP hairpinned packets.
> +# Capture IPv6 UDP hairpinned packets.
> filter="dst 4200::1 and dst port 2021 and udp"
> -NS_CHECK_EXEC([lsp], [tcpdump -n -c 2 -i lsp $filter > lsp.pcap &])
> +NS_CHECK_EXEC([lsp], [tcpdump -nn -c 2 -i lsp $filter > lsp.pcap &])
>
> sleep 1
>
> # Generate IPv6 UDP hairpin traffic.
> -NS_CHECK_EXEC([lsp], [nc -u 8800::0088 4040 -z &], [0])
> -NS_CHECK_EXEC([lsp], [nc -u 8800::0089 4040 -z &], [0])
> +NS_CHECK_EXEC([lsp], [echo a | nc -u 8800::0088 4040 &], [0])
> +NS_CHECK_EXEC([lsp], [echo a | nc -u 8800::0089 4040 &], [0])
>
> # Check hairpin traffic.
> OVS_WAIT_UNTIL([
> @@ -4757,21 +4757,17 @@ ADD_VETH(sw1-p1-rej, sw1-p1-rej, br-int,
> "20.0.0.3/24", "40:54:00:00:00:03", \
> sleep 1
>
> # Capture packets in sw0-p1-rej.
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 4 -i sw0-p1-rej tcp >
> sw0-p1-rej-ip4.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 4 -i sw0-p1-rej tcp >
> sw0-p1-rej-ip4.pcap &], [0])
>
> sleep 1
>
> OVS_WAIT_UNTIL([
> - ip netns exec sw0-p1-rej nc 10.0.0.4 80 2> r
> - res=$(cat r)
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw0-p1-rej nc -vz 10.0.0.4 80 2>&1 | grep -i 'connection
> refused'
> ])
>
> # Now send traffic to port 84
> OVS_WAIT_UNTIL([
> - ip netns exec sw0-p1-rej nc 10.0.0.4 84 2> r
> - res=$(cat r)
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw0-p1-rej nc -vz 10.0.0.4 84 2>&1 | grep -i 'connection
> refused'
> ])
>
> OVS_WAIT_UNTIL([
> @@ -4789,14 +4785,12 @@ OVS_WAIT_UNTIL([
> # Without this sleep, test case fails intermittently.
> sleep 3
>
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 2 -i sw0-p2-rej tcp port 80 >
> sw0-p2-rej-ip6.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 2 -i sw0-p2-rej tcp port 80 >
> sw0-p2-rej-ip6.pcap &], [0])
>
> sleep 1
>
> OVS_WAIT_UNTIL([
> - ip netns exec sw0-p2-rej nc -6 aef0::3 80 2> r
> - res=$(cat r)
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw0-p2-rej nc -vz6 aef0::3 80 2>&1 | grep -i 'connection
> refused'
> ])
>
>
> @@ -4811,57 +4805,55 @@ ovn-nbctl acl-add sw1 to-lport 1004 "ip" allow-related
> ovn-nbctl --log acl-add pg0 to-lport 1004 "outport == @pg0 && ip && tcp &&
> tcp.dst == 84" reject
>
> OVS_WAIT_UNTIL([
> - ip netns exec sw1-p1-rej nc 10.0.0.4 84 2> r
> - res=$(cat r)
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw1-p1-rej nc -vz 10.0.0.4 84 2>&1 | grep -i 'connection
> refused'
Is there a risk that you will pick up another spurious "connection
refused"? Why not keep to "ncat: connection refused"? Or is that one of
the differences between Fedora and Ubuntu.
Also, why are you adding "-z"?
> ])
>
> # Now test for IPv4 UDP.
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 1 -i sw0-p1-rej udp port 90 >
> sw0-p1-rej-udp.pcap &], [0])
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 1 -i sw0-p1-rej udp port 90 >
> sw0-p1-rej-udp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
>
> printf '.%.0s' {1..100} > foo
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo
> c=$(cat sw0-p1-rej-icmp.pcap | grep \
> -"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port dnsix unreachable" | uniq | wc
> -l)
> +"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l)
> test $c -eq 1
> ])
>
> rm -f *.pcap
>
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 1 -i sw0-p1-rej udp port 94 >
> sw0-p1-rej-udp.pcap &], [0])
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 1 -i sw0-p1-rej udp port 94 >
> sw0-p1-rej-udp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
>
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p1-rej nc -u 10.0.0.4 94 < foo
> c=$(cat sw0-p1-rej-icmp.pcap | grep \
> -"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port objcall unreachable" | uniq |
> wc -l)
> +"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 94 unreachable" | uniq | wc -l)
> test $c -eq 1
> ])
>
> # Now test for IPv6 UDP.
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 1 -i sw0-p2-rej udp port 90 >
> sw0-p2-rej-ip6-udp.pcap &], [0])
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 1 -i sw0-p2-rej udp port 90 >
> sw0-p2-rej-ip6-udp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
>
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo
> c=$(cat sw0-p2-rej-icmp6.pcap | grep \
> "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \
> -aef0::3 udp port dnsix" | uniq | wc -l)
> +aef0::3 udp port 90" | uniq | wc -l)
> test $c -eq 1
> ])
>
> rm -f *.pcap
>
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 1 -i sw0-p2-rej udp port 94 >
> sw0-p2-rej-ip6-udp.pcap &], [0])
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 1 -i sw0-p2-rej udp port 94 >
> sw0-p2-rej-ip6-udp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
>
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p2-rej nc -u -6 aef0::3 94 < foo
> c=$(cat sw0-p2-rej-icmp6.pcap | grep \
> "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \
> -aef0::3 udp port objcall" | uniq | wc -l)
> +aef0::3 udp port 94" | uniq | wc -l)
> test $c -eq 1
> ])
>
> @@ -4871,39 +4863,34 @@ ovn-nbctl pg-add pg0 sw0-p1-rej sw0-p2-rej
> ovn-nbctl --log acl-add pg0 from-lport 1004 "inport == @pg0 && ip && (tcp ||
> udp)" reject
>
> OVS_WAIT_UNTIL([
> - ip netns exec sw0-p1-rej nc 10.0.0.4 80 2> r
> - res=$(cat r)
> - echo "result = $res"
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw0-p1-rej nc -vz 10.0.0.4 80 2>&1 | grep -i 'connection
> refused'
> ])
>
> OVS_WAIT_UNTIL([
> - ip netns exec sw0-p2-rej nc -6 aef0::3 80 2> r
> - res=$(cat r)
> - test "$res" = "Ncat: Connection refused."
> + ip netns exec sw0-p2-rej nc -vz6 aef0::3 80 2>&1 | grep -i 'connection
> refused'
> ])
>
> rm -f *.pcap
>
> -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -n -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -nn -c 1 -i sw0-p1-rej icmp >
> sw0-p1-rej-icmp.pcap &], [0])
>
> printf '.%.0s' {1..100} > foo
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo
> c=$(cat sw0-p1-rej-icmp.pcap | grep \
> -"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port dnsix unreachable" | uniq | wc
> -l)
> +"10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l)
> test $c -eq 1
> ])
>
> rm -f *.pcap
> # Now test for IPv6 UDP.
> -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -n -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
> +NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -nn -c 1 -i sw0-p2-rej icmp6 >
> sw0-p2-rej-icmp6.pcap &], [0])
>
> OVS_WAIT_UNTIL([
> ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo
> c=$(cat sw0-p2-rej-icmp6.pcap | grep \
> "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \
> -aef0::3 udp port dnsix" | uniq | wc -l)
> +aef0::3 udp port 90" | uniq | wc -l)
> test $c -eq 1
> ])
>
>
> _______________________________________________
> dev mailing list
> [email protected]
> https://mail.openvswitch.org/mailman/listinfo/ovs-dev
>
LGTM
Acked-by: Mark D. Gray <[email protected]>
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev