2024-09-27 10:19:39 +00:00
|
|
|
import ipaddress
|
|
|
|
import logging
|
2020-09-16 04:26:10 +00:00
|
|
|
import os
|
2017-05-19 18:54:05 +00:00
|
|
|
import subprocess
|
|
|
|
import time
|
2024-09-27 10:19:39 +00:00
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
import docker
|
|
|
|
|
|
|
|
|
|
|
|
class PartitionManager:
|
|
|
|
"""Allows introducing failures in the network between docker containers.
|
|
|
|
|
|
|
|
Can act as a context manager:
|
|
|
|
|
2020-05-14 20:08:15 +00:00
|
|
|
with PartitionManager() as pm:
|
2017-05-19 18:54:05 +00:00
|
|
|
pm.partition_instances(instance1, instance2)
|
|
|
|
...
|
|
|
|
# At exit all partitions are removed automatically.
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self._iptables_rules = []
|
2020-10-27 12:24:10 +00:00
|
|
|
self._netem_delayed_instances = []
|
2020-10-08 13:35:44 +00:00
|
|
|
_NetworkManager.get()
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
def drop_instance_zk_connections(self, instance, action="DROP"):
|
2017-05-19 18:54:05 +00:00
|
|
|
self._check_instance(instance)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
self._add_rule(
|
2024-08-26 17:10:49 +00:00
|
|
|
{
|
2024-09-03 03:24:03 +00:00
|
|
|
"source": instance.ip_address,
|
2024-08-26 17:10:49 +00:00
|
|
|
"destination_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
|
|
|
self._add_rule(
|
2024-08-26 17:10:49 +00:00
|
|
|
{
|
2024-09-03 03:24:03 +00:00
|
|
|
"destination": instance.ip_address,
|
2024-08-26 17:10:49 +00:00
|
|
|
"source_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
if instance.ipv6_address:
|
|
|
|
self._add_rule(
|
|
|
|
{
|
|
|
|
"source": instance.ipv6_address,
|
|
|
|
"destination_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
self._add_rule(
|
|
|
|
{
|
|
|
|
"destination": instance.ipv6_address,
|
|
|
|
"source_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2023-07-04 09:31:15 +00:00
|
|
|
def dump_rules(self):
|
2024-08-26 17:10:49 +00:00
|
|
|
v4 = _NetworkManager.get().dump_rules()
|
|
|
|
v6 = _NetworkManager.get().dump_v6_rules()
|
|
|
|
|
|
|
|
return v4 + v6
|
2023-07-04 09:31:15 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
def restore_instance_zk_connections(self, instance, action="DROP"):
|
2017-05-30 11:49:17 +00:00
|
|
|
self._check_instance(instance)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
self._delete_rule(
|
2024-08-26 17:10:49 +00:00
|
|
|
{
|
2024-09-03 03:24:03 +00:00
|
|
|
"source": instance.ip_address,
|
2024-08-26 17:10:49 +00:00
|
|
|
"destination_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
|
|
|
self._delete_rule(
|
2024-08-26 17:10:49 +00:00
|
|
|
{
|
2024-09-03 03:24:03 +00:00
|
|
|
"destination": instance.ip_address,
|
2024-08-26 17:10:49 +00:00
|
|
|
"source_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2017-05-30 11:49:17 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
if instance.ipv6_address:
|
|
|
|
self._delete_rule(
|
|
|
|
{
|
|
|
|
"source": instance.ipv6_address,
|
|
|
|
"destination_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
self._delete_rule(
|
|
|
|
{
|
|
|
|
"destination": instance.ipv6_address,
|
|
|
|
"source_port": 2181,
|
|
|
|
"action": action,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
def partition_instances(self, left, right, port=None, action="DROP"):
|
2017-05-19 18:54:05 +00:00
|
|
|
self._check_instance(left)
|
|
|
|
self._check_instance(right)
|
|
|
|
|
2017-08-01 17:36:00 +00:00
|
|
|
def create_rule(src, dst):
|
2022-03-22 16:39:58 +00:00
|
|
|
rule = {
|
|
|
|
"source": src.ip_address,
|
|
|
|
"destination": dst.ip_address,
|
|
|
|
"action": action,
|
|
|
|
}
|
2017-08-01 17:36:00 +00:00
|
|
|
if port is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
rule["destination_port"] = port
|
2017-08-01 17:36:00 +00:00
|
|
|
return rule
|
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
def create_rule_v6(src, dst):
|
|
|
|
rule = {
|
|
|
|
"source": src.ipv6_address,
|
|
|
|
"destination": dst.ipv6_address,
|
|
|
|
"action": action,
|
|
|
|
}
|
|
|
|
if port is not None:
|
|
|
|
rule["destination_port"] = port
|
|
|
|
return rule
|
|
|
|
|
2017-08-01 17:36:00 +00:00
|
|
|
self._add_rule(create_rule(left, right))
|
|
|
|
self._add_rule(create_rule(right, left))
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
if left.ipv6_address and right.ipv6_address:
|
|
|
|
self._add_rule(create_rule_v6(left, right))
|
|
|
|
self._add_rule(create_rule_v6(right, left))
|
|
|
|
|
2020-10-27 12:24:10 +00:00
|
|
|
def add_network_delay(self, instance, delay_ms):
|
|
|
|
self._add_tc_netem_delay(instance, delay_ms)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def heal_all(self):
|
|
|
|
while self._iptables_rules:
|
|
|
|
rule = self._iptables_rules.pop()
|
2024-08-26 17:10:49 +00:00
|
|
|
|
|
|
|
if self._is_ipv6_rule(rule):
|
|
|
|
_NetworkManager.get().delete_ip6tables_rule(**rule)
|
|
|
|
else:
|
|
|
|
_NetworkManager.get().delete_iptables_rule(**rule)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2020-10-27 12:24:10 +00:00
|
|
|
while self._netem_delayed_instances:
|
|
|
|
instance = self._netem_delayed_instances.pop()
|
2022-03-22 16:39:58 +00:00
|
|
|
instance.exec_in_container(
|
|
|
|
["bash", "-c", "tc qdisc del dev eth0 root netem"], user="root"
|
|
|
|
)
|
2020-10-27 12:24:10 +00:00
|
|
|
|
2017-08-02 14:42:35 +00:00
|
|
|
def pop_rules(self):
|
|
|
|
res = self._iptables_rules[:]
|
|
|
|
self.heal_all()
|
|
|
|
return res
|
|
|
|
|
|
|
|
def push_rules(self, rules):
|
|
|
|
for rule in rules:
|
|
|
|
self._add_rule(rule)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
@staticmethod
|
|
|
|
def _check_instance(instance):
|
|
|
|
if instance.ip_address is None:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception("Instance + " + instance.name + " is not launched!")
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
@staticmethod
|
|
|
|
def _is_ipv6_rule(rule):
|
2024-08-28 13:20:56 +00:00
|
|
|
if rule.get("source"):
|
2024-08-26 20:16:05 +00:00
|
|
|
return ipaddress.ip_address(rule["source"]).version == 6
|
2024-08-28 13:20:56 +00:00
|
|
|
if rule.get("destination"):
|
2024-08-26 20:16:05 +00:00
|
|
|
return ipaddress.ip_address(rule["destination"]).version == 6
|
2024-08-26 17:10:49 +00:00
|
|
|
|
2024-08-28 13:20:56 +00:00
|
|
|
return False
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def _add_rule(self, rule):
|
2024-08-26 17:10:49 +00:00
|
|
|
if self._is_ipv6_rule(rule):
|
|
|
|
_NetworkManager.get().add_ip6tables_rule(**rule)
|
|
|
|
else:
|
|
|
|
_NetworkManager.get().add_iptables_rule(**rule)
|
2017-05-19 18:54:05 +00:00
|
|
|
self._iptables_rules.append(rule)
|
|
|
|
|
2017-05-30 11:49:17 +00:00
|
|
|
def _delete_rule(self, rule):
|
2024-08-26 17:10:49 +00:00
|
|
|
if self._is_ipv6_rule(rule):
|
|
|
|
_NetworkManager.get().delete_ip6tables_rule(**rule)
|
|
|
|
else:
|
|
|
|
_NetworkManager.get().delete_iptables_rule(**rule)
|
2017-05-30 11:49:17 +00:00
|
|
|
self._iptables_rules.remove(rule)
|
|
|
|
|
2020-10-27 12:24:10 +00:00
|
|
|
def _add_tc_netem_delay(self, instance, delay_ms):
|
2022-03-22 16:39:58 +00:00
|
|
|
instance.exec_in_container(
|
|
|
|
[
|
|
|
|
"bash",
|
|
|
|
"-c",
|
|
|
|
"tc qdisc add dev eth0 root netem delay {}ms".format(delay_ms),
|
|
|
|
],
|
|
|
|
user="root",
|
|
|
|
)
|
2020-10-27 12:24:10 +00:00
|
|
|
self._netem_delayed_instances.append(instance)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def __enter__(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def __exit__(self, exc_type, exc_val, exc_tb):
|
|
|
|
self.heal_all()
|
|
|
|
|
2017-11-20 20:07:29 +00:00
|
|
|
def __del__(self):
|
|
|
|
self.heal_all()
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2020-02-06 12:18:19 +00:00
|
|
|
class PartitionManagerDisabler:
|
2017-08-02 14:42:35 +00:00
|
|
|
def __init__(self, manager):
|
|
|
|
self.manager = manager
|
|
|
|
self.rules = self.manager.pop_rules()
|
|
|
|
|
|
|
|
def __enter__(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def __exit__(self, exc_type, exc_val, exc_tb):
|
|
|
|
self.manager.push_rules(self.rules)
|
|
|
|
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
class _NetworkManager:
|
|
|
|
"""Execute commands inside a container with access to network settings.
|
|
|
|
|
|
|
|
We need to call iptables to create partitions, but we want to avoid sudo.
|
|
|
|
The way to circumvent this restriction is to run iptables in a container with network=host.
|
|
|
|
The container is long-running and periodically renewed - this is an optimization to avoid the overhead
|
|
|
|
of container creation on each call.
|
|
|
|
Source of the idea: https://github.com/worstcase/blockade/blob/master/blockade/host.py
|
|
|
|
"""
|
|
|
|
|
|
|
|
# Singleton instance.
|
|
|
|
_instance = None
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def get(cls, **kwargs):
|
|
|
|
if cls._instance is None:
|
|
|
|
cls._instance = cls(**kwargs)
|
|
|
|
return cls._instance
|
|
|
|
|
2024-09-05 04:23:20 +00:00
|
|
|
def setup_ip6tables_docker_user_chain(self):
|
2024-09-05 04:35:04 +00:00
|
|
|
_rules = subprocess.check_output(f"ip6tables-save", shell=True)
|
2024-09-05 04:23:20 +00:00
|
|
|
if "DOCKER-USER" in _rules.decode("utf-8"):
|
|
|
|
return
|
|
|
|
|
|
|
|
setup_cmds = [
|
|
|
|
["ip6tables", "--wait", "-N", "DOCKER-USER"],
|
|
|
|
["ip6tables", "--wait", "-I", "FORWARD", "-j", "DOCKER-USER"],
|
|
|
|
["ip6tables", "--wait", "-A", "DOCKER-USER", "-j", "RETURN"],
|
|
|
|
]
|
|
|
|
for cmd in setup_cmds:
|
|
|
|
self._exec_run(cmd, privileged=True)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def add_iptables_rule(self, **kwargs):
|
2022-03-22 16:39:58 +00:00
|
|
|
cmd = ["iptables", "--wait", "-I", "DOCKER-USER", "1"]
|
2017-05-19 18:54:05 +00:00
|
|
|
cmd.extend(self._iptables_cmd_suffix(**kwargs))
|
2021-06-29 18:01:56 +00:00
|
|
|
self._exec_run(cmd, privileged=True)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
def add_ip6tables_rule(self, **kwargs):
|
2024-09-05 04:23:20 +00:00
|
|
|
self.setup_ip6tables_docker_user_chain()
|
|
|
|
|
2024-08-26 17:11:48 +00:00
|
|
|
cmd = ["ip6tables", "--wait", "-I", "DOCKER-USER", "1"]
|
2024-08-26 17:10:49 +00:00
|
|
|
cmd.extend(self._iptables_cmd_suffix(**kwargs))
|
|
|
|
self._exec_run(cmd, privileged=True)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def delete_iptables_rule(self, **kwargs):
|
2022-03-22 16:39:58 +00:00
|
|
|
cmd = ["iptables", "--wait", "-D", "DOCKER-USER"]
|
2017-05-19 18:54:05 +00:00
|
|
|
cmd.extend(self._iptables_cmd_suffix(**kwargs))
|
2021-06-29 18:01:56 +00:00
|
|
|
self._exec_run(cmd, privileged=True)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
def delete_ip6tables_rule(self, **kwargs):
|
2024-08-26 17:11:48 +00:00
|
|
|
cmd = ["ip6tables", "--wait", "-D", "DOCKER-USER"]
|
2024-08-26 17:10:49 +00:00
|
|
|
cmd.extend(self._iptables_cmd_suffix(**kwargs))
|
|
|
|
self._exec_run(cmd, privileged=True)
|
|
|
|
|
2023-07-04 09:31:15 +00:00
|
|
|
def dump_rules(self):
|
|
|
|
cmd = ["iptables", "-L", "DOCKER-USER"]
|
|
|
|
return self._exec_run(cmd, privileged=True)
|
|
|
|
|
2024-08-26 17:10:49 +00:00
|
|
|
def dump_v6_rules(self):
|
2024-08-26 17:11:48 +00:00
|
|
|
cmd = ["ip6tables", "-L", "DOCKER-USER"]
|
2024-08-26 17:10:49 +00:00
|
|
|
return self._exec_run(cmd, privileged=True)
|
|
|
|
|
2021-06-04 14:33:22 +00:00
|
|
|
@staticmethod
|
|
|
|
def clean_all_user_iptables_rules():
|
2024-09-02 22:16:40 +00:00
|
|
|
for iptables in ("iptables", "ip6tables"):
|
|
|
|
for i in range(1000):
|
|
|
|
iptables_iter = i
|
|
|
|
# when rules will be empty, it will return error
|
2024-09-03 15:29:44 +00:00
|
|
|
res = subprocess.run(f"{iptables} --wait -D DOCKER-USER 1", shell=True)
|
2024-09-02 22:16:40 +00:00
|
|
|
|
|
|
|
if res.returncode != 0:
|
|
|
|
logging.info(
|
|
|
|
f"All {iptables} rules cleared, "
|
|
|
|
+ str(iptables_iter)
|
|
|
|
+ " iterations, last error: "
|
|
|
|
+ str(res.stderr)
|
|
|
|
)
|
|
|
|
break
|
2021-06-04 14:33:22 +00:00
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
@staticmethod
|
|
|
|
def _iptables_cmd_suffix(
|
2022-03-22 16:39:58 +00:00
|
|
|
source=None,
|
|
|
|
destination=None,
|
|
|
|
source_port=None,
|
|
|
|
destination_port=None,
|
|
|
|
action=None,
|
|
|
|
probability=None,
|
2024-08-30 21:46:56 +00:00
|
|
|
protocol=None,
|
2022-03-22 16:39:58 +00:00
|
|
|
custom_args=None,
|
|
|
|
):
|
2017-07-31 18:57:13 +00:00
|
|
|
ret = []
|
|
|
|
if probability is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(
|
|
|
|
[
|
|
|
|
"-m",
|
|
|
|
"statistic",
|
|
|
|
"--mode",
|
|
|
|
"random",
|
|
|
|
"--probability",
|
|
|
|
str(probability),
|
|
|
|
]
|
|
|
|
)
|
2024-08-30 21:46:56 +00:00
|
|
|
ret.extend(["-p", "tcp" if protocol is None else protocol])
|
2017-05-19 18:54:05 +00:00
|
|
|
if source is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(["-s", source])
|
2017-05-19 18:54:05 +00:00
|
|
|
if destination is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(["-d", destination])
|
2017-05-19 18:54:05 +00:00
|
|
|
if source_port is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(["--sport", str(source_port)])
|
2017-05-19 18:54:05 +00:00
|
|
|
if destination_port is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(["--dport", str(destination_port)])
|
2017-05-19 18:54:05 +00:00
|
|
|
if action is not None:
|
2022-03-22 16:39:58 +00:00
|
|
|
ret.extend(["-j"] + action.split())
|
2021-11-09 20:11:02 +00:00
|
|
|
if custom_args is not None:
|
|
|
|
ret.extend(custom_args)
|
2017-05-19 18:54:05 +00:00
|
|
|
return ret
|
|
|
|
|
|
|
|
def __init__(
|
2022-03-22 16:39:58 +00:00
|
|
|
self,
|
Fix network manager for integration tests
Sometimes you may get:
> raise subprocess.CalledProcessError(exit_code, cmd)
E subprocess.CalledProcessError: Command '['iptables', '--wait', '-D', 'DOCKER-USER', '-p', 'tcp', '-s', '172.16.2.3', '-d', '172.16.2.2', '-j', 'DROP']' returned non-zero exit status 137.
And only sometimes you may get the reason:
OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown
So this means that container for iptables does not exists anymore, and
the reason is the timeout. And the fact that container_exit_timeout was
equal to container_expire_timeout and was 120.
From the docker logs:
time="2023-07-16T15:46:52.513673446Z" level=debug msg="form data: {\"AttachStderr\":false,\"AttachStdin\":false,\"AttachStdout\":false,\"Cmd\":[\"sleep\",\"120\"],\"HostConfig\":{\"AutoRemove\":true,\"NetworkMode\":\"host\"},\"Image\":\"clickhouse/integration-helper:latest\",\"NetworkDisabled\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Tty\":false}"
time="2023-07-16T15:48:57.611857183Z" level=debug msg="form data: {\"AttachStderr\":false,\"AttachStdin\":false,\"AttachStdout\":false,\"Cmd\":[\"sleep\",\"120\"],\"HostConfig\":{\"AutoRemove\":true,\"NetworkMode\":\"host\"},\"Image\":\"clickhouse/integration-helper:latest\",\"NetworkDisabled\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Tty\":false}"
And then pytest will try to execute the iptables command:
time="2023-07-16T15:50:57.698705244Z" level=debug msg="starting exec command 860920ab2aa07e8d285050f200ac92423a3cf8ec3fb2f57683541e62cf6bc20e in container 66d6c96671b5e987345290ddd260727d96b99789b512d40f333f6263f42fd2f1"
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2023-07-18 10:09:58 +00:00
|
|
|
container_expire_timeout=600,
|
|
|
|
container_exit_timeout=660,
|
2022-03-22 16:39:58 +00:00
|
|
|
docker_api_version=os.environ.get("DOCKER_API_VERSION"),
|
|
|
|
):
|
Fix network manager for integration tests
Sometimes you may get:
> raise subprocess.CalledProcessError(exit_code, cmd)
E subprocess.CalledProcessError: Command '['iptables', '--wait', '-D', 'DOCKER-USER', '-p', 'tcp', '-s', '172.16.2.3', '-d', '172.16.2.2', '-j', 'DROP']' returned non-zero exit status 137.
And only sometimes you may get the reason:
OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown
So this means that container for iptables does not exists anymore, and
the reason is the timeout. And the fact that container_exit_timeout was
equal to container_expire_timeout and was 120.
From the docker logs:
time="2023-07-16T15:46:52.513673446Z" level=debug msg="form data: {\"AttachStderr\":false,\"AttachStdin\":false,\"AttachStdout\":false,\"Cmd\":[\"sleep\",\"120\"],\"HostConfig\":{\"AutoRemove\":true,\"NetworkMode\":\"host\"},\"Image\":\"clickhouse/integration-helper:latest\",\"NetworkDisabled\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Tty\":false}"
time="2023-07-16T15:48:57.611857183Z" level=debug msg="form data: {\"AttachStderr\":false,\"AttachStdin\":false,\"AttachStdout\":false,\"Cmd\":[\"sleep\",\"120\"],\"HostConfig\":{\"AutoRemove\":true,\"NetworkMode\":\"host\"},\"Image\":\"clickhouse/integration-helper:latest\",\"NetworkDisabled\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Tty\":false}"
And then pytest will try to execute the iptables command:
time="2023-07-16T15:50:57.698705244Z" level=debug msg="starting exec command 860920ab2aa07e8d285050f200ac92423a3cf8ec3fb2f57683541e62cf6bc20e in container 66d6c96671b5e987345290ddd260727d96b99789b512d40f333f6263f42fd2f1"
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2023-07-18 10:09:58 +00:00
|
|
|
# container should be alive for at least 15 seconds then the expiration
|
|
|
|
# timeout, this is the protection from the case when the container will
|
|
|
|
# be destroyed just when some test will try to use it.
|
|
|
|
assert container_exit_timeout >= container_expire_timeout + 15
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
self.container_expire_timeout = container_expire_timeout
|
|
|
|
self.container_exit_timeout = container_exit_timeout
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
self._docker_client = docker.DockerClient(
|
|
|
|
base_url="unix:///var/run/docker.sock",
|
|
|
|
version=docker_api_version,
|
|
|
|
timeout=600,
|
|
|
|
)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
|
|
|
self._container = None
|
|
|
|
|
|
|
|
self._ensure_container()
|
|
|
|
|
|
|
|
def _ensure_container(self):
|
|
|
|
if self._container is None or self._container_expire_time <= time.time():
|
2023-06-22 00:16:56 +00:00
|
|
|
image_name = "clickhouse/integration-helper:" + os.getenv(
|
2024-08-26 17:11:12 +00:00
|
|
|
"DOCKER_HELPER_TAG", "latest"
|
2023-06-22 00:16:56 +00:00
|
|
|
)
|
2020-12-07 09:25:27 +00:00
|
|
|
for i in range(5):
|
|
|
|
if self._container is not None:
|
|
|
|
try:
|
2022-05-11 17:46:33 +00:00
|
|
|
logging.debug("[network] Removing %s", self._container.id)
|
2020-12-07 09:25:27 +00:00
|
|
|
self._container.remove(force=True)
|
|
|
|
break
|
|
|
|
except docker.errors.NotFound:
|
|
|
|
break
|
|
|
|
except Exception as ex:
|
2022-03-22 16:39:58 +00:00
|
|
|
print(
|
|
|
|
"Error removing network blocade container, will try again",
|
|
|
|
str(ex),
|
|
|
|
)
|
2020-12-07 09:25:27 +00:00
|
|
|
time.sleep(i)
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
image = subprocess.check_output(
|
2023-06-22 00:16:56 +00:00
|
|
|
f"docker images -q {image_name} 2>/dev/null", shell=True
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2020-11-27 11:38:04 +00:00
|
|
|
if not image.strip():
|
|
|
|
print("No network image helper, will try download")
|
|
|
|
# for some reason docker api may hang if image doesn't exist, so we download it
|
|
|
|
# before running
|
|
|
|
for i in range(5):
|
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
subprocess.check_call( # STYLE_CHECK_ALLOW_SUBPROCESS_CHECK_CALL
|
2023-06-22 00:16:56 +00:00
|
|
|
f"docker pull {image_name}", shell=True
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2020-11-27 11:38:04 +00:00
|
|
|
break
|
|
|
|
except:
|
|
|
|
time.sleep(i)
|
|
|
|
else:
|
2023-06-22 00:16:56 +00:00
|
|
|
raise Exception(f"Cannot pull {image_name} image")
|
2020-10-09 14:38:31 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
self._container = self._docker_client.containers.run(
|
2023-06-22 00:16:56 +00:00
|
|
|
image_name,
|
2022-03-22 16:39:58 +00:00
|
|
|
auto_remove=True,
|
|
|
|
command=("sleep %s" % self.container_exit_timeout),
|
|
|
|
detach=True,
|
|
|
|
network_mode="host",
|
|
|
|
)
|
2022-05-11 17:46:33 +00:00
|
|
|
logging.debug("[network] Created new container %s", self._container.id)
|
2017-05-19 18:54:05 +00:00
|
|
|
self._container_expire_time = time.time() + self.container_expire_timeout
|
|
|
|
|
|
|
|
return self._container
|
|
|
|
|
2021-04-30 09:18:12 +00:00
|
|
|
def _exec_run_with_retry(self, cmd, retry_count, **kwargs):
|
|
|
|
for i in range(retry_count):
|
|
|
|
try:
|
|
|
|
self._exec_run(cmd, **kwargs)
|
|
|
|
except subprocess.CalledProcessError as e:
|
|
|
|
logging.error(f"_exec_run failed for {cmd}, {e}")
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
def _exec_run(self, cmd, **kwargs):
|
|
|
|
container = self._ensure_container()
|
|
|
|
|
|
|
|
handle = self._docker_client.api.exec_create(container.id, cmd, **kwargs)
|
2022-03-22 16:39:58 +00:00
|
|
|
output = self._docker_client.api.exec_start(handle).decode("utf8")
|
|
|
|
exit_code = self._docker_client.api.exec_inspect(handle)["ExitCode"]
|
2017-05-19 18:54:05 +00:00
|
|
|
|
2022-05-11 17:46:33 +00:00
|
|
|
logging.debug(
|
|
|
|
"[network] %s: %s (%s): %s", container.id, cmd, exit_code, output.strip()
|
|
|
|
)
|
|
|
|
|
2017-05-19 18:54:05 +00:00
|
|
|
if exit_code != 0:
|
2020-10-02 16:54:07 +00:00
|
|
|
print(output)
|
2017-05-19 18:54:05 +00:00
|
|
|
raise subprocess.CalledProcessError(exit_code, cmd)
|
|
|
|
|
|
|
|
return output
|
2021-05-27 12:54:47 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
|
2023-01-08 06:08:20 +00:00
|
|
|
# Approximately measure network I/O speed for interface
|
2021-05-27 12:54:47 +00:00
|
|
|
class NetThroughput(object):
|
2021-08-26 10:42:04 +00:00
|
|
|
def __init__(self, node):
|
2021-05-27 12:54:47 +00:00
|
|
|
self.node = node
|
2021-08-31 11:36:24 +00:00
|
|
|
# trying to get default interface and check it in /proc/net/dev
|
2022-03-22 16:39:58 +00:00
|
|
|
self.interface = self.node.exec_in_container(
|
|
|
|
[
|
|
|
|
"bash",
|
|
|
|
"-c",
|
|
|
|
"awk '{print $1 \" \" $2}' /proc/net/route | grep 00000000 | awk '{print $1}'",
|
|
|
|
]
|
|
|
|
).strip()
|
|
|
|
check = self.node.exec_in_container(
|
|
|
|
["bash", "-c", f'grep "^ *{self.interface}:" /proc/net/dev']
|
|
|
|
).strip()
|
|
|
|
if not check: # if check is not successful just try eth{1-10}
|
2021-08-31 11:36:24 +00:00
|
|
|
for i in range(10):
|
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
self.interface = self.node.exec_in_container(
|
|
|
|
[
|
|
|
|
"bash",
|
|
|
|
"-c",
|
|
|
|
f"awk '{{print $1}}' /proc/net/route | grep 'eth{i}'",
|
|
|
|
]
|
|
|
|
).strip()
|
2021-08-31 11:36:24 +00:00
|
|
|
break
|
|
|
|
except Exception as ex:
|
|
|
|
print(f"No interface eth{i}")
|
|
|
|
else:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
"No interface eth{1-10} and default interface not specified in /proc/net/route, maybe some special network configuration"
|
|
|
|
)
|
2021-08-31 11:36:24 +00:00
|
|
|
|
2021-05-27 12:54:47 +00:00
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
check = self.node.exec_in_container(
|
|
|
|
["bash", "-c", f'grep "^ *{self.interface}:" /proc/net/dev']
|
|
|
|
).strip()
|
2021-05-27 12:54:47 +00:00
|
|
|
if not check:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
f"No such interface {self.interface} found in /proc/net/dev"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
logging.error(
|
|
|
|
"All available interfaces %s",
|
|
|
|
self.node.exec_in_container(["bash", "-c", "cat /proc/net/dev"]),
|
|
|
|
)
|
|
|
|
raise Exception(
|
|
|
|
f"No such interface {self.interface} found in /proc/net/dev"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
|
|
|
|
self.current_in = self._get_in_bytes()
|
|
|
|
self.current_out = self._get_out_bytes()
|
|
|
|
self.measure_time = time.time()
|
|
|
|
|
|
|
|
def _get_in_bytes(self):
|
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
result = self.node.exec_in_container(
|
|
|
|
[
|
|
|
|
"bash",
|
|
|
|
"-c",
|
|
|
|
f'awk "/^ *{self.interface}:/"\' {{ if ($1 ~ /.*:[0-9][0-9]*/) {{ sub(/^.*:/, "") ; print $1 }} else {{ print $2 }} }}\' /proc/net/dev',
|
|
|
|
]
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
f"Cannot receive in bytes from /proc/net/dev for interface {self.interface}"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
return int(result)
|
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
f"Got non-numeric in bytes '{result}' from /proc/net/dev for interface {self.interface}"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
|
|
|
|
def _get_out_bytes(self):
|
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
result = self.node.exec_in_container(
|
|
|
|
[
|
|
|
|
"bash",
|
|
|
|
"-c",
|
|
|
|
f"awk \"/^ *{self.interface}:/\"' {{ if ($1 ~ /.*:[0-9][0-9]*/) {{ print $9 }} else {{ print $10 }} }}' /proc/net/dev",
|
|
|
|
]
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
f"Cannot receive out bytes from /proc/net/dev for interface {self.interface}"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
return int(result)
|
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
raise Exception(
|
|
|
|
f"Got non-numeric out bytes '{result}' from /proc/net/dev for interface {self.interface}"
|
|
|
|
)
|
2021-05-27 12:54:47 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
def measure_speed(self, measure="bytes"):
|
2021-05-27 12:54:47 +00:00
|
|
|
new_in = self._get_in_bytes()
|
|
|
|
new_out = self._get_out_bytes()
|
|
|
|
current_time = time.time()
|
|
|
|
in_speed = (new_in - self.current_in) / (current_time - self.measure_time)
|
|
|
|
out_speed = (new_out - self.current_out) / (current_time - self.measure_time)
|
|
|
|
|
|
|
|
self.current_out = new_out
|
|
|
|
self.current_in = new_in
|
|
|
|
self.measure_time = current_time
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
if measure == "bytes":
|
2021-05-27 12:54:47 +00:00
|
|
|
return in_speed, out_speed
|
2022-03-22 16:39:58 +00:00
|
|
|
elif measure == "kilobytes":
|
|
|
|
return in_speed / 1024.0, out_speed / 1024.0
|
|
|
|
elif measure == "megabytes":
|
2021-05-27 12:54:47 +00:00
|
|
|
return in_speed / (1024 * 1024), out_speed / (1024 * 1024)
|
|
|
|
else:
|
|
|
|
raise Exception(f"Unknown measure {measure}")
|