mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			89 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			89 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package sysctl
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"reflect"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"k8s.io/apimachinery/pkg/util/version"
 | 
						|
)
 | 
						|
 | 
						|
func Test_getSafeSysctlAllowlist(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		name       string
 | 
						|
		getVersion func() (*version.Version, error)
 | 
						|
		want       []string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "failed to get kernelVersion, only return safeSysctls with no kernelVersion limit",
 | 
						|
			getVersion: func() (*version.Version, error) {
 | 
						|
				return nil, fmt.Errorf("fork error")
 | 
						|
			},
 | 
						|
			want: []string{
 | 
						|
				"kernel.shm_rmid_forced",
 | 
						|
				"net.ipv4.ip_local_port_range",
 | 
						|
				"net.ipv4.tcp_syncookies",
 | 
						|
				"net.ipv4.ping_group_range",
 | 
						|
				"net.ipv4.ip_unprivileged_port_start",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "kernelVersion is 3.18.0, return safeSysctls with no kernelVersion limit and net.ipv4.ip_local_reserved_ports",
 | 
						|
			getVersion: func() (*version.Version, error) {
 | 
						|
				kernelVersionStr := "3.18.0-957.27.2.el7.x86_64"
 | 
						|
				return version.ParseGeneric(kernelVersionStr)
 | 
						|
			},
 | 
						|
			want: []string{
 | 
						|
				"kernel.shm_rmid_forced",
 | 
						|
				"net.ipv4.ip_local_port_range",
 | 
						|
				"net.ipv4.tcp_syncookies",
 | 
						|
				"net.ipv4.ping_group_range",
 | 
						|
				"net.ipv4.ip_unprivileged_port_start",
 | 
						|
				"net.ipv4.ip_local_reserved_ports",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "kernelVersion is 5.15.0, return safeSysctls with no kernelVersion limit and kernelVersion below 5.15.0",
 | 
						|
			getVersion: func() (*version.Version, error) {
 | 
						|
				kernelVersionStr := "5.15.0-75-generic"
 | 
						|
				return version.ParseGeneric(kernelVersionStr)
 | 
						|
			},
 | 
						|
			want: []string{
 | 
						|
				"kernel.shm_rmid_forced",
 | 
						|
				"net.ipv4.ip_local_port_range",
 | 
						|
				"net.ipv4.tcp_syncookies",
 | 
						|
				"net.ipv4.ping_group_range",
 | 
						|
				"net.ipv4.ip_unprivileged_port_start",
 | 
						|
				"net.ipv4.ip_local_reserved_ports",
 | 
						|
				"net.ipv4.tcp_keepalive_time",
 | 
						|
				"net.ipv4.tcp_fin_timeout",
 | 
						|
				"net.ipv4.tcp_keepalive_intvl",
 | 
						|
				"net.ipv4.tcp_keepalive_probes",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, tt := range tests {
 | 
						|
		t.Run(tt.name, func(t *testing.T) {
 | 
						|
			if got := getSafeSysctlAllowlist(tt.getVersion); !reflect.DeepEqual(got, tt.want) {
 | 
						|
				t.Errorf("getSafeSysctlAllowlist() = %v, want %v", got, tt.want)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |