libnetwork_test.go 52 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net"
  9. "net/http"
  10. "net/http/httptest"
  11. "os"
  12. "os/exec"
  13. "runtime"
  14. "strconv"
  15. "strings"
  16. "sync"
  17. "testing"
  18. log "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/pkg/plugins"
  20. "github.com/docker/docker/pkg/reexec"
  21. "github.com/docker/libnetwork"
  22. "github.com/docker/libnetwork/config"
  23. "github.com/docker/libnetwork/datastore"
  24. "github.com/docker/libnetwork/driverapi"
  25. "github.com/docker/libnetwork/ipamapi"
  26. "github.com/docker/libnetwork/netlabel"
  27. "github.com/docker/libnetwork/options"
  28. "github.com/docker/libnetwork/osl"
  29. "github.com/docker/libnetwork/testutils"
  30. "github.com/docker/libnetwork/types"
  31. "github.com/opencontainers/runc/libcontainer"
  32. "github.com/opencontainers/runc/libcontainer/configs"
  33. "github.com/vishvananda/netlink"
  34. "github.com/vishvananda/netns"
  35. )
  36. const (
  37. bridgeNetType = "bridge"
  38. )
  39. var controller libnetwork.NetworkController
  40. func TestMain(m *testing.M) {
  41. if reexec.Init() {
  42. return
  43. }
  44. if err := createController(); err != nil {
  45. log.Errorf("Error creating controller: %v", err)
  46. os.Exit(1)
  47. }
  48. //libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  49. x := m.Run()
  50. controller.Stop()
  51. os.Exit(x)
  52. }
  53. func createController() error {
  54. var err error
  55. // Cleanup local datastore file
  56. os.Remove(datastore.DefaultScopes("")[datastore.LocalScope].Client.Address)
  57. option := options.Generic{
  58. "EnableIPForwarding": true,
  59. }
  60. genericOption := make(map[string]interface{})
  61. genericOption[netlabel.GenericData] = option
  62. cfgOptions, err := libnetwork.OptionBoltdbWithRandomDBFile()
  63. if err != nil {
  64. return err
  65. }
  66. controller, err = libnetwork.New(append(cfgOptions, config.OptionDriverConfig(bridgeNetType, genericOption))...)
  67. if err != nil {
  68. return err
  69. }
  70. return nil
  71. }
  72. func createTestNetwork(networkType, networkName string, netOption options.Generic, ipamV4Configs, ipamV6Configs []*libnetwork.IpamConf) (libnetwork.Network, error) {
  73. return controller.NewNetwork(networkType, networkName,
  74. libnetwork.NetworkOptionGeneric(netOption),
  75. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4Configs, ipamV6Configs, nil))
  76. }
  77. func getEmptyGenericOption() map[string]interface{} {
  78. genericOption := make(map[string]interface{})
  79. genericOption[netlabel.GenericData] = options.Generic{}
  80. return genericOption
  81. }
  82. func getPortMapping() []types.PortBinding {
  83. return []types.PortBinding{
  84. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  85. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  86. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  87. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  88. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  89. }
  90. }
  91. func TestNull(t *testing.T) {
  92. cnt, err := controller.NewSandbox("null_container",
  93. libnetwork.OptionHostname("test"),
  94. libnetwork.OptionDomainname("docker.io"),
  95. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  96. if err != nil {
  97. t.Fatal(err)
  98. }
  99. network, err := createTestNetwork("null", "testnull", options.Generic{}, nil, nil)
  100. if err != nil {
  101. t.Fatal(err)
  102. }
  103. ep, err := network.CreateEndpoint("testep")
  104. if err != nil {
  105. t.Fatal(err)
  106. }
  107. err = ep.Join(cnt)
  108. if err != nil {
  109. t.Fatal(err)
  110. }
  111. err = ep.Leave(cnt)
  112. if err != nil {
  113. t.Fatal(err)
  114. }
  115. if err := ep.Delete(false); err != nil {
  116. t.Fatal(err)
  117. }
  118. if err := cnt.Delete(); err != nil {
  119. t.Fatal(err)
  120. }
  121. // host type is special network. Cannot be removed.
  122. err = network.Delete()
  123. if err == nil {
  124. t.Fatal(err)
  125. }
  126. if _, ok := err.(types.ForbiddenError); !ok {
  127. t.Fatalf("Unexpected error type")
  128. }
  129. }
  130. func TestHost(t *testing.T) {
  131. sbx1, err := controller.NewSandbox("host_c1",
  132. libnetwork.OptionHostname("test1"),
  133. libnetwork.OptionDomainname("docker.io"),
  134. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  135. libnetwork.OptionUseDefaultSandbox())
  136. if err != nil {
  137. t.Fatal(err)
  138. }
  139. defer func() {
  140. if err := sbx1.Delete(); err != nil {
  141. t.Fatal(err)
  142. }
  143. }()
  144. sbx2, err := controller.NewSandbox("host_c2",
  145. libnetwork.OptionHostname("test2"),
  146. libnetwork.OptionDomainname("docker.io"),
  147. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  148. libnetwork.OptionUseDefaultSandbox())
  149. if err != nil {
  150. t.Fatal(err)
  151. }
  152. defer func() {
  153. if err := sbx2.Delete(); err != nil {
  154. t.Fatal(err)
  155. }
  156. }()
  157. network, err := createTestNetwork("host", "testhost", options.Generic{}, nil, nil)
  158. if err != nil {
  159. t.Fatal(err)
  160. }
  161. ep1, err := network.CreateEndpoint("testep1")
  162. if err != nil {
  163. t.Fatal(err)
  164. }
  165. if err := ep1.Join(sbx1); err != nil {
  166. t.Fatal(err)
  167. }
  168. ep2, err := network.CreateEndpoint("testep2")
  169. if err != nil {
  170. t.Fatal(err)
  171. }
  172. if err := ep2.Join(sbx2); err != nil {
  173. t.Fatal(err)
  174. }
  175. if err := ep1.Leave(sbx1); err != nil {
  176. t.Fatal(err)
  177. }
  178. if err := ep2.Leave(sbx2); err != nil {
  179. t.Fatal(err)
  180. }
  181. if err := ep1.Delete(false); err != nil {
  182. t.Fatal(err)
  183. }
  184. if err := ep2.Delete(false); err != nil {
  185. t.Fatal(err)
  186. }
  187. // Try to create another host endpoint and join/leave that.
  188. cnt3, err := controller.NewSandbox("host_c3",
  189. libnetwork.OptionHostname("test3"),
  190. libnetwork.OptionDomainname("docker.io"),
  191. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  192. libnetwork.OptionUseDefaultSandbox())
  193. if err != nil {
  194. t.Fatal(err)
  195. }
  196. defer func() {
  197. if err := cnt3.Delete(); err != nil {
  198. t.Fatal(err)
  199. }
  200. }()
  201. ep3, err := network.CreateEndpoint("testep3")
  202. if err != nil {
  203. t.Fatal(err)
  204. }
  205. if err := ep3.Join(sbx2); err != nil {
  206. t.Fatal(err)
  207. }
  208. if err := ep3.Leave(sbx2); err != nil {
  209. t.Fatal(err)
  210. }
  211. if err := ep3.Delete(false); err != nil {
  212. t.Fatal(err)
  213. }
  214. }
  215. func TestBridge(t *testing.T) {
  216. if !testutils.IsRunningInContainer() {
  217. defer testutils.SetupTestOSContext(t)()
  218. }
  219. netOption := options.Generic{
  220. netlabel.EnableIPv6: true,
  221. netlabel.GenericData: options.Generic{
  222. "BridgeName": "testnetwork",
  223. "EnableICC": true,
  224. "EnableIPMasquerade": true,
  225. },
  226. }
  227. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  228. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  229. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption, ipamV4ConfList, ipamV6ConfList)
  230. if err != nil {
  231. t.Fatal(err)
  232. }
  233. defer func() {
  234. if err := network.Delete(); err != nil {
  235. t.Fatal(err)
  236. }
  237. }()
  238. ep, err := network.CreateEndpoint("testep")
  239. if err != nil {
  240. t.Fatal(err)
  241. }
  242. sb, err := controller.NewSandbox(containerID, libnetwork.OptionPortMapping(getPortMapping()))
  243. if err != nil {
  244. t.Fatal(err)
  245. }
  246. defer func() {
  247. if err := sb.Delete(); err != nil {
  248. t.Fatal(err)
  249. }
  250. }()
  251. err = ep.Join(sb)
  252. if err != nil {
  253. t.Fatal(err)
  254. }
  255. epInfo, err := ep.DriverInfo()
  256. if err != nil {
  257. t.Fatal(err)
  258. }
  259. pmd, ok := epInfo[netlabel.PortMap]
  260. if !ok {
  261. t.Fatalf("Could not find expected info in endpoint data")
  262. }
  263. pm, ok := pmd.([]types.PortBinding)
  264. if !ok {
  265. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  266. }
  267. if len(pm) != 5 {
  268. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  269. }
  270. }
  271. // Testing IPV6 from MAC address
  272. func TestBridgeIpv6FromMac(t *testing.T) {
  273. if !testutils.IsRunningInContainer() {
  274. defer testutils.SetupTestOSContext(t)()
  275. }
  276. netOption := options.Generic{
  277. netlabel.GenericData: options.Generic{
  278. "BridgeName": "testipv6mac",
  279. "EnableICC": true,
  280. "EnableIPMasquerade": true,
  281. },
  282. }
  283. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  284. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  285. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac",
  286. libnetwork.NetworkOptionGeneric(netOption),
  287. libnetwork.NetworkOptionEnableIPv6(true),
  288. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  289. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  290. if err != nil {
  291. t.Fatal(err)
  292. }
  293. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  294. epOption := options.Generic{netlabel.MacAddress: mac}
  295. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  296. if err != nil {
  297. t.Fatal(err)
  298. }
  299. iface := ep.Info().Iface()
  300. if !bytes.Equal(iface.MacAddress(), mac) {
  301. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  302. }
  303. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  304. expIP.IP = ip
  305. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  306. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  307. }
  308. if err := ep.Delete(false); err != nil {
  309. t.Fatal(err)
  310. }
  311. if err := network.Delete(); err != nil {
  312. t.Fatal(err)
  313. }
  314. }
  315. func TestUnknownDriver(t *testing.T) {
  316. if !testutils.IsRunningInContainer() {
  317. defer testutils.SetupTestOSContext(t)()
  318. }
  319. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{}, nil, nil)
  320. if err == nil {
  321. t.Fatal("Expected to fail. But instead succeeded")
  322. }
  323. if _, ok := err.(types.NotFoundError); !ok {
  324. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  325. }
  326. }
  327. func TestNilRemoteDriver(t *testing.T) {
  328. _, err := controller.NewNetwork("framerelay", "dummy",
  329. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  330. if err == nil {
  331. t.Fatal("Expected to fail. But instead succeeded")
  332. }
  333. if _, ok := err.(types.NotFoundError); !ok {
  334. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  335. }
  336. }
  337. func TestNetworkName(t *testing.T) {
  338. if !testutils.IsRunningInContainer() {
  339. defer testutils.SetupTestOSContext(t)()
  340. }
  341. netOption := options.Generic{
  342. netlabel.GenericData: options.Generic{
  343. "BridgeName": "testnetwork",
  344. },
  345. }
  346. _, err := createTestNetwork(bridgeNetType, "", netOption, nil, nil)
  347. if err == nil {
  348. t.Fatal("Expected to fail. But instead succeeded")
  349. }
  350. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  351. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  352. }
  353. networkName := "testnetwork"
  354. n, err := createTestNetwork(bridgeNetType, networkName, netOption, nil, nil)
  355. if err != nil {
  356. t.Fatal(err)
  357. }
  358. defer func() {
  359. if err := n.Delete(); err != nil {
  360. t.Fatal(err)
  361. }
  362. }()
  363. if n.Name() != networkName {
  364. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  365. }
  366. }
  367. func TestNetworkType(t *testing.T) {
  368. if !testutils.IsRunningInContainer() {
  369. defer testutils.SetupTestOSContext(t)()
  370. }
  371. netOption := options.Generic{
  372. netlabel.GenericData: options.Generic{
  373. "BridgeName": "testnetwork",
  374. },
  375. }
  376. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption, nil, nil)
  377. if err != nil {
  378. t.Fatal(err)
  379. }
  380. defer func() {
  381. if err := n.Delete(); err != nil {
  382. t.Fatal(err)
  383. }
  384. }()
  385. if n.Type() != bridgeNetType {
  386. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  387. }
  388. }
  389. func TestNetworkID(t *testing.T) {
  390. if !testutils.IsRunningInContainer() {
  391. defer testutils.SetupTestOSContext(t)()
  392. }
  393. netOption := options.Generic{
  394. netlabel.GenericData: options.Generic{
  395. "BridgeName": "testnetwork",
  396. },
  397. }
  398. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption, nil, nil)
  399. if err != nil {
  400. t.Fatal(err)
  401. }
  402. defer func() {
  403. if err := n.Delete(); err != nil {
  404. t.Fatal(err)
  405. }
  406. }()
  407. if n.ID() == "" {
  408. t.Fatal("Expected non-empty network id")
  409. }
  410. }
  411. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  412. if !testutils.IsRunningInContainer() {
  413. defer testutils.SetupTestOSContext(t)()
  414. }
  415. netOption := options.Generic{
  416. "BridgeName": "testnetwork",
  417. }
  418. option := options.Generic{
  419. netlabel.GenericData: netOption,
  420. }
  421. network, err := createTestNetwork(bridgeNetType, "testnetwork", option, nil, nil)
  422. if err != nil {
  423. t.Fatal(err)
  424. }
  425. ep, err := network.CreateEndpoint("testep")
  426. if err != nil {
  427. t.Fatal(err)
  428. }
  429. err = network.Delete()
  430. if err == nil {
  431. t.Fatal("Expected to fail. But instead succeeded")
  432. }
  433. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  434. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  435. }
  436. // Done testing. Now cleanup.
  437. if err := ep.Delete(false); err != nil {
  438. t.Fatal(err)
  439. }
  440. if err := network.Delete(); err != nil {
  441. t.Fatal(err)
  442. }
  443. }
  444. func TestUnknownNetwork(t *testing.T) {
  445. if !testutils.IsRunningInContainer() {
  446. defer testutils.SetupTestOSContext(t)()
  447. }
  448. netOption := options.Generic{
  449. "BridgeName": "testnetwork",
  450. }
  451. option := options.Generic{
  452. netlabel.GenericData: netOption,
  453. }
  454. network, err := createTestNetwork(bridgeNetType, "testnetwork", option, nil, nil)
  455. if err != nil {
  456. t.Fatal(err)
  457. }
  458. err = network.Delete()
  459. if err != nil {
  460. t.Fatal(err)
  461. }
  462. err = network.Delete()
  463. if err == nil {
  464. t.Fatal("Expected to fail. But instead succeeded")
  465. }
  466. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  467. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  468. }
  469. }
  470. func TestUnknownEndpoint(t *testing.T) {
  471. if !testutils.IsRunningInContainer() {
  472. defer testutils.SetupTestOSContext(t)()
  473. }
  474. netOption := options.Generic{
  475. "BridgeName": "testnetwork",
  476. }
  477. option := options.Generic{
  478. netlabel.GenericData: netOption,
  479. }
  480. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24"}}
  481. network, err := createTestNetwork(bridgeNetType, "testnetwork", option, ipamV4ConfList, nil)
  482. if err != nil {
  483. t.Fatal(err)
  484. }
  485. _, err = network.CreateEndpoint("")
  486. if err == nil {
  487. t.Fatal("Expected to fail. But instead succeeded")
  488. }
  489. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  490. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  491. }
  492. ep, err := network.CreateEndpoint("testep")
  493. if err != nil {
  494. t.Fatal(err)
  495. }
  496. err = ep.Delete(false)
  497. if err != nil {
  498. t.Fatal(err)
  499. }
  500. // Done testing. Now cleanup
  501. if err := network.Delete(); err != nil {
  502. t.Fatal(err)
  503. }
  504. }
  505. func TestNetworkEndpointsWalkers(t *testing.T) {
  506. if !testutils.IsRunningInContainer() {
  507. defer testutils.SetupTestOSContext(t)()
  508. }
  509. // Create network 1 and add 2 endpoint: ep11, ep12
  510. netOption := options.Generic{
  511. netlabel.GenericData: options.Generic{
  512. "BridgeName": "network1",
  513. },
  514. }
  515. net1, err := createTestNetwork(bridgeNetType, "network1", netOption, nil, nil)
  516. if err != nil {
  517. t.Fatal(err)
  518. }
  519. defer func() {
  520. if err := net1.Delete(); err != nil {
  521. t.Fatal(err)
  522. }
  523. }()
  524. ep11, err := net1.CreateEndpoint("ep11")
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. defer func() {
  529. if err := ep11.Delete(false); err != nil {
  530. t.Fatal(err)
  531. }
  532. }()
  533. ep12, err := net1.CreateEndpoint("ep12")
  534. if err != nil {
  535. t.Fatal(err)
  536. }
  537. defer func() {
  538. if err := ep12.Delete(false); err != nil {
  539. t.Fatal(err)
  540. }
  541. }()
  542. // Test list methods on net1
  543. epList1 := net1.Endpoints()
  544. if len(epList1) != 2 {
  545. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  546. }
  547. // endpoint order is not guaranteed
  548. for _, e := range epList1 {
  549. if e != ep11 && e != ep12 {
  550. t.Fatal("Endpoints() did not return all the expected elements")
  551. }
  552. }
  553. // Test Endpoint Walk method
  554. var epName string
  555. var epWanted libnetwork.Endpoint
  556. wlk := func(ep libnetwork.Endpoint) bool {
  557. if ep.Name() == epName {
  558. epWanted = ep
  559. return true
  560. }
  561. return false
  562. }
  563. // Look for ep1 on network1
  564. epName = "ep11"
  565. net1.WalkEndpoints(wlk)
  566. if epWanted == nil {
  567. t.Fatal(err)
  568. }
  569. if ep11 != epWanted {
  570. t.Fatal(err)
  571. }
  572. current := len(controller.Networks())
  573. // Create network 2
  574. netOption = options.Generic{
  575. netlabel.GenericData: options.Generic{
  576. "BridgeName": "network2",
  577. },
  578. }
  579. net2, err := createTestNetwork(bridgeNetType, "network2", netOption, nil, nil)
  580. if err != nil {
  581. t.Fatal(err)
  582. }
  583. defer func() {
  584. if err := net2.Delete(); err != nil {
  585. t.Fatal(err)
  586. }
  587. }()
  588. // Test Networks method
  589. if len(controller.Networks()) != current+1 {
  590. t.Fatalf("Did not find the expected number of networks")
  591. }
  592. // Test Network Walk method
  593. var netName string
  594. var netWanted libnetwork.Network
  595. nwWlk := func(nw libnetwork.Network) bool {
  596. if nw.Name() == netName {
  597. netWanted = nw
  598. return true
  599. }
  600. return false
  601. }
  602. // Look for network named "network1" and "network2"
  603. netName = "network1"
  604. controller.WalkNetworks(nwWlk)
  605. if netWanted == nil {
  606. t.Fatal(err)
  607. }
  608. if net1.ID() != netWanted.ID() {
  609. t.Fatal(err)
  610. }
  611. netName = "network2"
  612. controller.WalkNetworks(nwWlk)
  613. if netWanted == nil {
  614. t.Fatal(err)
  615. }
  616. if net2.ID() != netWanted.ID() {
  617. t.Fatal(err)
  618. }
  619. }
  620. func TestDuplicateEndpoint(t *testing.T) {
  621. if !testutils.IsRunningInContainer() {
  622. defer testutils.SetupTestOSContext(t)()
  623. }
  624. netOption := options.Generic{
  625. netlabel.GenericData: options.Generic{
  626. "BridgeName": "testnetwork",
  627. },
  628. }
  629. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption, nil, nil)
  630. if err != nil {
  631. t.Fatal(err)
  632. }
  633. defer func() {
  634. if err := n.Delete(); err != nil {
  635. t.Fatal(err)
  636. }
  637. }()
  638. ep, err := n.CreateEndpoint("ep1")
  639. if err != nil {
  640. t.Fatal(err)
  641. }
  642. defer func() {
  643. if err := ep.Delete(false); err != nil {
  644. t.Fatal(err)
  645. }
  646. }()
  647. ep2, err := n.CreateEndpoint("ep1")
  648. defer func() {
  649. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  650. if ep2 != nil {
  651. if err := ep2.Delete(false); err != nil {
  652. t.Fatal(err)
  653. }
  654. }
  655. }()
  656. if err == nil {
  657. t.Fatal("Expected to fail. But instead succeeded")
  658. }
  659. if _, ok := err.(types.ForbiddenError); !ok {
  660. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  661. }
  662. }
  663. func TestControllerQuery(t *testing.T) {
  664. if !testutils.IsRunningInContainer() {
  665. defer testutils.SetupTestOSContext(t)()
  666. }
  667. // Create network 1
  668. netOption := options.Generic{
  669. netlabel.GenericData: options.Generic{
  670. "BridgeName": "network1",
  671. },
  672. }
  673. net1, err := createTestNetwork(bridgeNetType, "network1", netOption, nil, nil)
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. defer func() {
  678. if err := net1.Delete(); err != nil {
  679. t.Fatal(err)
  680. }
  681. }()
  682. // Create network 2
  683. netOption = options.Generic{
  684. netlabel.GenericData: options.Generic{
  685. "BridgeName": "network2",
  686. },
  687. }
  688. net2, err := createTestNetwork(bridgeNetType, "network2", netOption, nil, nil)
  689. if err != nil {
  690. t.Fatal(err)
  691. }
  692. defer func() {
  693. if err := net2.Delete(); err != nil {
  694. t.Fatal(err)
  695. }
  696. }()
  697. _, err = controller.NetworkByName("")
  698. if err == nil {
  699. t.Fatalf("NetworkByName() succeeded with invalid target name")
  700. }
  701. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  702. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  703. }
  704. _, err = controller.NetworkByID("")
  705. if err == nil {
  706. t.Fatalf("NetworkByID() succeeded with invalid target id")
  707. }
  708. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  709. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  710. }
  711. g, err := controller.NetworkByID("network1")
  712. if err == nil {
  713. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  714. }
  715. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  716. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  717. }
  718. g, err = controller.NetworkByName("network1")
  719. if err != nil {
  720. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  721. }
  722. if g == nil {
  723. t.Fatalf("NetworkByName() did not find the network")
  724. }
  725. if g != net1 {
  726. t.Fatalf("NetworkByName() returned the wrong network")
  727. }
  728. g, err = controller.NetworkByID(net1.ID())
  729. if err != nil {
  730. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  731. }
  732. if net1.ID() != g.ID() {
  733. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  734. }
  735. g, err = controller.NetworkByName("network2")
  736. if err != nil {
  737. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  738. }
  739. if g == nil {
  740. t.Fatalf("NetworkByName() did not find the network")
  741. }
  742. if g != net2 {
  743. t.Fatalf("NetworkByName() returned the wrong network")
  744. }
  745. g, err = controller.NetworkByID(net2.ID())
  746. if err != nil {
  747. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  748. }
  749. if net2.ID() != g.ID() {
  750. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  751. }
  752. }
  753. func TestNetworkQuery(t *testing.T) {
  754. if !testutils.IsRunningInContainer() {
  755. defer testutils.SetupTestOSContext(t)()
  756. }
  757. // Create network 1 and add 2 endpoint: ep11, ep12
  758. netOption := options.Generic{
  759. netlabel.GenericData: options.Generic{
  760. "BridgeName": "network1",
  761. },
  762. }
  763. net1, err := createTestNetwork(bridgeNetType, "network1", netOption, nil, nil)
  764. if err != nil {
  765. t.Fatal(err)
  766. }
  767. defer func() {
  768. if err := net1.Delete(); err != nil {
  769. t.Fatal(err)
  770. }
  771. }()
  772. ep11, err := net1.CreateEndpoint("ep11")
  773. if err != nil {
  774. t.Fatal(err)
  775. }
  776. defer func() {
  777. if err := ep11.Delete(false); err != nil {
  778. t.Fatal(err)
  779. }
  780. }()
  781. ep12, err := net1.CreateEndpoint("ep12")
  782. if err != nil {
  783. t.Fatal(err)
  784. }
  785. defer func() {
  786. if err := ep12.Delete(false); err != nil {
  787. t.Fatal(err)
  788. }
  789. }()
  790. e, err := net1.EndpointByName("ep11")
  791. if err != nil {
  792. t.Fatal(err)
  793. }
  794. if ep11 != e {
  795. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  796. }
  797. e, err = net1.EndpointByName("")
  798. if err == nil {
  799. t.Fatalf("EndpointByName() succeeded with invalid target name")
  800. }
  801. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  802. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  803. }
  804. e, err = net1.EndpointByName("IamNotAnEndpoint")
  805. if err == nil {
  806. t.Fatalf("EndpointByName() succeeded with unknown target name")
  807. }
  808. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  809. t.Fatal(err)
  810. }
  811. if e != nil {
  812. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  813. }
  814. e, err = net1.EndpointByID(ep12.ID())
  815. if err != nil {
  816. t.Fatal(err)
  817. }
  818. if ep12.ID() != e.ID() {
  819. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  820. }
  821. e, err = net1.EndpointByID("")
  822. if err == nil {
  823. t.Fatalf("EndpointByID() succeeded with invalid target id")
  824. }
  825. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  826. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  827. }
  828. }
  829. const containerID = "valid_c"
  830. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  831. origns, err := netns.Get()
  832. if err != nil {
  833. t.Fatalf("Could not get the current netns: %v", err)
  834. }
  835. defer origns.Close()
  836. key := info.Sandbox().Key()
  837. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  838. if err != nil {
  839. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  840. }
  841. defer f.Close()
  842. runtime.LockOSThread()
  843. defer runtime.UnlockOSThread()
  844. nsFD := f.Fd()
  845. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  846. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  847. }
  848. defer netns.Set(origns)
  849. _, err = netlink.LinkByName("eth0")
  850. if err != nil {
  851. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  852. }
  853. _, err = netlink.LinkByName("eth1")
  854. if err != nil {
  855. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  856. }
  857. }
  858. func TestEndpointJoin(t *testing.T) {
  859. if !testutils.IsRunningInContainer() {
  860. defer testutils.SetupTestOSContext(t)()
  861. }
  862. // Create network 1 and add 2 endpoint: ep11, ep12
  863. netOption := options.Generic{
  864. netlabel.GenericData: options.Generic{
  865. "BridgeName": "testnetwork1",
  866. "EnableICC": true,
  867. "EnableIPMasquerade": true,
  868. },
  869. }
  870. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  871. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1",
  872. libnetwork.NetworkOptionGeneric(netOption),
  873. libnetwork.NetworkOptionEnableIPv6(true),
  874. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  875. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  876. if err != nil {
  877. t.Fatal(err)
  878. }
  879. defer func() {
  880. if err := n1.Delete(); err != nil {
  881. t.Fatal(err)
  882. }
  883. }()
  884. ep1, err := n1.CreateEndpoint("ep1")
  885. if err != nil {
  886. t.Fatal(err)
  887. }
  888. defer func() {
  889. if err := ep1.Delete(false); err != nil {
  890. t.Fatal(err)
  891. }
  892. }()
  893. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  894. info := ep1.Info()
  895. iface := info.Iface()
  896. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  897. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  898. }
  899. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  900. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  901. }
  902. if len(info.Gateway()) != 0 {
  903. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  904. }
  905. if len(info.GatewayIPv6()) != 0 {
  906. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  907. }
  908. if info.Sandbox() != nil {
  909. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  910. }
  911. // test invalid joins
  912. err = ep1.Join(nil)
  913. if err == nil {
  914. t.Fatalf("Expected to fail join with nil Sandbox")
  915. }
  916. if _, ok := err.(types.BadRequestError); !ok {
  917. t.Fatalf("Unexpected error type returned: %T", err)
  918. }
  919. fsbx := &fakeSandbox{}
  920. if err = ep1.Join(fsbx); err == nil {
  921. t.Fatalf("Expected to fail join with invalid Sandbox")
  922. }
  923. if _, ok := err.(types.BadRequestError); !ok {
  924. t.Fatalf("Unexpected error type returned: %T", err)
  925. }
  926. sb, err := controller.NewSandbox(containerID,
  927. libnetwork.OptionHostname("test"),
  928. libnetwork.OptionDomainname("docker.io"),
  929. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  930. if err != nil {
  931. t.Fatal(err)
  932. }
  933. defer func() {
  934. if err := sb.Delete(); err != nil {
  935. t.Fatal(err)
  936. }
  937. }()
  938. err = ep1.Join(sb)
  939. runtime.LockOSThread()
  940. if err != nil {
  941. t.Fatal(err)
  942. }
  943. defer func() {
  944. err = ep1.Leave(sb)
  945. runtime.LockOSThread()
  946. if err != nil {
  947. t.Fatal(err)
  948. }
  949. }()
  950. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  951. info = ep1.Info()
  952. if len(info.Gateway()) == 0 {
  953. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  954. }
  955. if len(info.GatewayIPv6()) == 0 {
  956. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  957. }
  958. if info.Sandbox() == nil {
  959. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  960. }
  961. // Check endpoint provided container information
  962. if ep1.Info().Sandbox().Key() != sb.Key() {
  963. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  964. }
  965. // Attempt retrieval of endpoint interfaces statistics
  966. stats, err := sb.Statistics()
  967. if err != nil {
  968. t.Fatal(err)
  969. }
  970. if _, ok := stats["eth0"]; !ok {
  971. t.Fatalf("Did not find eth0 statistics")
  972. }
  973. // Now test the container joining another network
  974. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  975. options.Generic{
  976. netlabel.GenericData: options.Generic{
  977. "BridgeName": "testnetwork2",
  978. },
  979. }, nil, nil)
  980. if err != nil {
  981. t.Fatal(err)
  982. }
  983. defer func() {
  984. if err := n2.Delete(); err != nil {
  985. t.Fatal(err)
  986. }
  987. }()
  988. ep2, err := n2.CreateEndpoint("ep2")
  989. if err != nil {
  990. t.Fatal(err)
  991. }
  992. defer func() {
  993. if err := ep2.Delete(false); err != nil {
  994. t.Fatal(err)
  995. }
  996. }()
  997. err = ep2.Join(sb)
  998. if err != nil {
  999. t.Fatal(err)
  1000. }
  1001. runtime.LockOSThread()
  1002. defer func() {
  1003. err = ep2.Leave(sb)
  1004. runtime.LockOSThread()
  1005. if err != nil {
  1006. t.Fatal(err)
  1007. }
  1008. }()
  1009. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1010. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1011. }
  1012. checkSandbox(t, info)
  1013. }
  1014. type fakeSandbox struct{}
  1015. func (f *fakeSandbox) ID() string {
  1016. return "fake sandbox"
  1017. }
  1018. func (f *fakeSandbox) ContainerID() string {
  1019. return ""
  1020. }
  1021. func (f *fakeSandbox) Key() string {
  1022. return "fake key"
  1023. }
  1024. func (f *fakeSandbox) Labels() map[string]interface{} {
  1025. return nil
  1026. }
  1027. func (f *fakeSandbox) Statistics() (map[string]*types.InterfaceStatistics, error) {
  1028. return nil, nil
  1029. }
  1030. func (f *fakeSandbox) Refresh(opts ...libnetwork.SandboxOption) error {
  1031. return nil
  1032. }
  1033. func (f *fakeSandbox) Delete() error {
  1034. return nil
  1035. }
  1036. func (f *fakeSandbox) Rename(name string) error {
  1037. return nil
  1038. }
  1039. func (f *fakeSandbox) SetKey(key string) error {
  1040. return nil
  1041. }
  1042. func (f *fakeSandbox) ResolveName(name string, ipType int) []net.IP {
  1043. return nil
  1044. }
  1045. func (f *fakeSandbox) ResolveIP(ip string) string {
  1046. return ""
  1047. }
  1048. func (f *fakeSandbox) Endpoints() []libnetwork.Endpoint {
  1049. return nil
  1050. }
  1051. func TestExternalKey(t *testing.T) {
  1052. externalKeyTest(t, false)
  1053. }
  1054. func externalKeyTest(t *testing.T, reexec bool) {
  1055. if !testutils.IsRunningInContainer() {
  1056. defer testutils.SetupTestOSContext(t)()
  1057. }
  1058. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1059. netlabel.GenericData: options.Generic{
  1060. "BridgeName": "testnetwork",
  1061. },
  1062. }, nil, nil)
  1063. if err != nil {
  1064. t.Fatal(err)
  1065. }
  1066. defer func() {
  1067. if err := n.Delete(); err != nil {
  1068. t.Fatal(err)
  1069. }
  1070. }()
  1071. ep, err := n.CreateEndpoint("ep1")
  1072. if err != nil {
  1073. t.Fatal(err)
  1074. }
  1075. defer func() {
  1076. err = ep.Delete(false)
  1077. if err != nil {
  1078. t.Fatal(err)
  1079. }
  1080. }()
  1081. ep2, err := n.CreateEndpoint("ep2")
  1082. if err != nil {
  1083. t.Fatal(err)
  1084. }
  1085. defer func() {
  1086. err = ep2.Delete(false)
  1087. if err != nil {
  1088. t.Fatal(err)
  1089. }
  1090. }()
  1091. cnt, err := controller.NewSandbox(containerID,
  1092. libnetwork.OptionHostname("test"),
  1093. libnetwork.OptionDomainname("docker.io"),
  1094. libnetwork.OptionUseExternalKey(),
  1095. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1096. defer func() {
  1097. if err := cnt.Delete(); err != nil {
  1098. t.Fatal(err)
  1099. }
  1100. osl.GC()
  1101. }()
  1102. // Join endpoint to sandbox before SetKey
  1103. err = ep.Join(cnt)
  1104. runtime.LockOSThread()
  1105. if err != nil {
  1106. t.Fatal(err)
  1107. }
  1108. defer func() {
  1109. err = ep.Leave(cnt)
  1110. runtime.LockOSThread()
  1111. if err != nil {
  1112. t.Fatal(err)
  1113. }
  1114. }()
  1115. sbox := ep.Info().Sandbox()
  1116. if sbox == nil {
  1117. t.Fatalf("Expected to have a valid Sandbox")
  1118. }
  1119. if reexec {
  1120. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  1121. if err == nil {
  1122. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  1123. }
  1124. } else {
  1125. // Setting an non-existing key (namespace) must fail
  1126. if err := sbox.SetKey("this-must-fail"); err == nil {
  1127. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1128. }
  1129. }
  1130. // Create a new OS sandbox using the osl API before using it in SetKey
  1131. if extOsBox, err := osl.NewSandbox("ValidKey", true); err != nil {
  1132. t.Fatalf("Failed to create new osl sandbox")
  1133. } else {
  1134. defer func() {
  1135. if err := extOsBox.Destroy(); err != nil {
  1136. log.Warnf("Failed to remove os sandbox: %v", err)
  1137. }
  1138. }()
  1139. }
  1140. if reexec {
  1141. err := reexecSetKey("ValidKey", containerID, controller.ID())
  1142. if err != nil {
  1143. t.Fatalf("SetExternalKey failed with %v", err)
  1144. }
  1145. } else {
  1146. if err := sbox.SetKey("ValidKey"); err != nil {
  1147. t.Fatalf("Setkey failed with %v", err)
  1148. }
  1149. }
  1150. // Join endpoint to sandbox after SetKey
  1151. err = ep2.Join(sbox)
  1152. if err != nil {
  1153. t.Fatal(err)
  1154. }
  1155. runtime.LockOSThread()
  1156. defer func() {
  1157. err = ep2.Leave(sbox)
  1158. runtime.LockOSThread()
  1159. if err != nil {
  1160. t.Fatal(err)
  1161. }
  1162. }()
  1163. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1164. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1165. }
  1166. checkSandbox(t, ep.Info())
  1167. }
  1168. func reexecSetKey(key string, containerID string, controllerID string) error {
  1169. var (
  1170. state libcontainer.State
  1171. b []byte
  1172. err error
  1173. )
  1174. state.NamespacePaths = make(map[configs.NamespaceType]string)
  1175. state.NamespacePaths[configs.NamespaceType("NEWNET")] = key
  1176. if b, err = json.Marshal(state); err != nil {
  1177. return err
  1178. }
  1179. cmd := &exec.Cmd{
  1180. Path: reexec.Self(),
  1181. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  1182. Stdin: strings.NewReader(string(b)),
  1183. Stdout: os.Stdout,
  1184. Stderr: os.Stderr,
  1185. }
  1186. return cmd.Run()
  1187. }
  1188. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  1189. if !testutils.IsRunningInContainer() {
  1190. defer testutils.SetupTestOSContext(t)()
  1191. }
  1192. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1193. netlabel.GenericData: options.Generic{
  1194. "BridgeName": "testnetwork",
  1195. },
  1196. }, nil, nil)
  1197. if err != nil {
  1198. t.Fatal(err)
  1199. }
  1200. defer func() {
  1201. if err := n.Delete(); err != nil {
  1202. t.Fatal(err)
  1203. }
  1204. }()
  1205. ep, err := n.CreateEndpoint("ep1")
  1206. if err != nil {
  1207. t.Fatal(err)
  1208. }
  1209. defer func() {
  1210. err = ep.Delete(false)
  1211. if err != nil {
  1212. t.Fatal(err)
  1213. }
  1214. }()
  1215. cnt, err := controller.NewSandbox(containerID,
  1216. libnetwork.OptionHostname("test"),
  1217. libnetwork.OptionDomainname("docker.io"),
  1218. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1219. defer func() {
  1220. if err := cnt.Delete(); err != nil {
  1221. t.Fatal(err)
  1222. }
  1223. }()
  1224. err = ep.Join(cnt)
  1225. runtime.LockOSThread()
  1226. if err != nil {
  1227. t.Fatal(err)
  1228. }
  1229. defer func() {
  1230. err = ep.Leave(cnt)
  1231. runtime.LockOSThread()
  1232. if err != nil {
  1233. t.Fatal(err)
  1234. }
  1235. }()
  1236. err = ep.Delete(false)
  1237. if err == nil {
  1238. t.Fatal("Expected to fail. But instead succeeded")
  1239. }
  1240. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1241. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1242. }
  1243. }
  1244. func TestEndpointMultipleJoins(t *testing.T) {
  1245. if !testutils.IsRunningInContainer() {
  1246. defer testutils.SetupTestOSContext(t)()
  1247. }
  1248. n, err := createTestNetwork(bridgeNetType, "testmultiple", options.Generic{
  1249. netlabel.GenericData: options.Generic{
  1250. "BridgeName": "testmultiple",
  1251. },
  1252. }, nil, nil)
  1253. if err != nil {
  1254. t.Fatal(err)
  1255. }
  1256. defer func() {
  1257. if err := n.Delete(); err != nil {
  1258. t.Fatal(err)
  1259. }
  1260. }()
  1261. ep, err := n.CreateEndpoint("ep1")
  1262. if err != nil {
  1263. t.Fatal(err)
  1264. }
  1265. defer func() {
  1266. if err := ep.Delete(false); err != nil {
  1267. t.Fatal(err)
  1268. }
  1269. }()
  1270. sbx1, err := controller.NewSandbox(containerID,
  1271. libnetwork.OptionHostname("test"),
  1272. libnetwork.OptionDomainname("docker.io"),
  1273. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1274. defer func() {
  1275. if err := sbx1.Delete(); err != nil {
  1276. t.Fatal(err)
  1277. }
  1278. }()
  1279. sbx2, err := controller.NewSandbox("c2")
  1280. defer func() {
  1281. if err := sbx2.Delete(); err != nil {
  1282. t.Fatal(err)
  1283. }
  1284. runtime.LockOSThread()
  1285. }()
  1286. err = ep.Join(sbx1)
  1287. runtime.LockOSThread()
  1288. if err != nil {
  1289. t.Fatal(err)
  1290. }
  1291. defer func() {
  1292. err = ep.Leave(sbx1)
  1293. runtime.LockOSThread()
  1294. if err != nil {
  1295. t.Fatal(err)
  1296. }
  1297. }()
  1298. err = ep.Join(sbx2)
  1299. if err == nil {
  1300. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1301. }
  1302. if _, ok := err.(types.ForbiddenError); !ok {
  1303. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1304. }
  1305. }
  1306. func TestLeaveAll(t *testing.T) {
  1307. if !testutils.IsRunningInContainer() {
  1308. defer testutils.SetupTestOSContext(t)()
  1309. }
  1310. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1311. netlabel.GenericData: options.Generic{
  1312. "BridgeName": "testnetwork",
  1313. },
  1314. }, nil, nil)
  1315. if err != nil {
  1316. t.Fatal(err)
  1317. }
  1318. defer func() {
  1319. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  1320. if err := n.Delete(); err != nil {
  1321. t.Fatal(err)
  1322. }
  1323. }()
  1324. ep1, err := n.CreateEndpoint("ep1")
  1325. if err != nil {
  1326. t.Fatal(err)
  1327. }
  1328. ep2, err := n.CreateEndpoint("ep2")
  1329. if err != nil {
  1330. t.Fatal(err)
  1331. }
  1332. cnt, err := controller.NewSandbox("leaveall")
  1333. if err != nil {
  1334. t.Fatal(err)
  1335. }
  1336. err = ep1.Join(cnt)
  1337. if err != nil {
  1338. t.Fatalf("Failed to join ep1: %v", err)
  1339. }
  1340. runtime.LockOSThread()
  1341. err = ep2.Join(cnt)
  1342. if err != nil {
  1343. t.Fatalf("Failed to join ep2: %v", err)
  1344. }
  1345. runtime.LockOSThread()
  1346. err = cnt.Delete()
  1347. if err != nil {
  1348. t.Fatal(err)
  1349. }
  1350. }
  1351. func TestontainerInvalidLeave(t *testing.T) {
  1352. if !testutils.IsRunningInContainer() {
  1353. defer testutils.SetupTestOSContext(t)()
  1354. }
  1355. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1356. netlabel.GenericData: options.Generic{
  1357. "BridgeName": "testnetwork",
  1358. },
  1359. }, nil, nil)
  1360. if err != nil {
  1361. t.Fatal(err)
  1362. }
  1363. defer func() {
  1364. if err := n.Delete(); err != nil {
  1365. t.Fatal(err)
  1366. }
  1367. }()
  1368. ep, err := n.CreateEndpoint("ep1")
  1369. if err != nil {
  1370. t.Fatal(err)
  1371. }
  1372. defer func() {
  1373. if err := ep.Delete(false); err != nil {
  1374. t.Fatal(err)
  1375. }
  1376. }()
  1377. cnt, err := controller.NewSandbox(containerID,
  1378. libnetwork.OptionHostname("test"),
  1379. libnetwork.OptionDomainname("docker.io"),
  1380. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1381. if err != nil {
  1382. t.Fatal(err)
  1383. }
  1384. defer func() {
  1385. if err := cnt.Delete(); err != nil {
  1386. t.Fatal(err)
  1387. }
  1388. }()
  1389. err = ep.Leave(cnt)
  1390. if err == nil {
  1391. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1392. }
  1393. if _, ok := err.(types.ForbiddenError); !ok {
  1394. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1395. }
  1396. if err := ep.Leave(nil); err == nil {
  1397. t.Fatalf("Expected to fail leave nil Sandbox")
  1398. }
  1399. if _, ok := err.(types.BadRequestError); !ok {
  1400. t.Fatalf("Unexpected error type returned: %T", err)
  1401. }
  1402. fsbx := &fakeSandbox{}
  1403. if err = ep.Leave(fsbx); err == nil {
  1404. t.Fatalf("Expected to fail leave with invalid Sandbox")
  1405. }
  1406. if _, ok := err.(types.BadRequestError); !ok {
  1407. t.Fatalf("Unexpected error type returned: %T", err)
  1408. }
  1409. }
  1410. func TestEndpointUpdateParent(t *testing.T) {
  1411. if !testutils.IsRunningInContainer() {
  1412. defer testutils.SetupTestOSContext(t)()
  1413. }
  1414. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1415. netlabel.GenericData: options.Generic{
  1416. "BridgeName": "testnetwork",
  1417. },
  1418. }, nil, nil)
  1419. if err != nil {
  1420. t.Fatal(err)
  1421. }
  1422. defer func() {
  1423. if err := n.Delete(); err != nil {
  1424. t.Fatal(err)
  1425. }
  1426. }()
  1427. ep1, err := n.CreateEndpoint("ep1")
  1428. if err != nil {
  1429. t.Fatal(err)
  1430. }
  1431. ep2, err := n.CreateEndpoint("ep2")
  1432. if err != nil {
  1433. t.Fatal(err)
  1434. }
  1435. sbx1, err := controller.NewSandbox(containerID,
  1436. libnetwork.OptionHostname("test"),
  1437. libnetwork.OptionDomainname("docker.io"),
  1438. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1439. if err != nil {
  1440. t.Fatal(err)
  1441. }
  1442. defer func() {
  1443. if err := sbx1.Delete(); err != nil {
  1444. t.Fatal(err)
  1445. }
  1446. }()
  1447. sbx2, err := controller.NewSandbox("c2",
  1448. libnetwork.OptionHostname("test2"),
  1449. libnetwork.OptionDomainname("docker.io"),
  1450. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1451. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1452. if err != nil {
  1453. t.Fatal(err)
  1454. }
  1455. defer func() {
  1456. if err := sbx2.Delete(); err != nil {
  1457. t.Fatal(err)
  1458. }
  1459. }()
  1460. err = ep1.Join(sbx1)
  1461. runtime.LockOSThread()
  1462. if err != nil {
  1463. t.Fatal(err)
  1464. }
  1465. err = ep2.Join(sbx2)
  1466. runtime.LockOSThread()
  1467. if err != nil {
  1468. t.Fatal(err)
  1469. }
  1470. }
  1471. func TestEnableIPv6(t *testing.T) {
  1472. if !testutils.IsRunningInContainer() {
  1473. defer testutils.SetupTestOSContext(t)()
  1474. }
  1475. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1476. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  1477. //take a copy of resolv.conf for restoring after test completes
  1478. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1479. if err != nil {
  1480. t.Fatal(err)
  1481. }
  1482. //cleanup
  1483. defer func() {
  1484. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1485. t.Fatal(err)
  1486. }
  1487. }()
  1488. netOption := options.Generic{
  1489. netlabel.EnableIPv6: true,
  1490. netlabel.GenericData: options.Generic{
  1491. "BridgeName": "testnetwork",
  1492. },
  1493. }
  1494. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  1495. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  1496. if err != nil {
  1497. t.Fatal(err)
  1498. }
  1499. defer func() {
  1500. if err := n.Delete(); err != nil {
  1501. t.Fatal(err)
  1502. }
  1503. }()
  1504. ep1, err := n.CreateEndpoint("ep1")
  1505. if err != nil {
  1506. t.Fatal(err)
  1507. }
  1508. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1509. t.Fatal(err)
  1510. }
  1511. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1512. defer os.Remove(resolvConfPath)
  1513. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1514. if err != nil {
  1515. t.Fatal(err)
  1516. }
  1517. defer func() {
  1518. if err := sb.Delete(); err != nil {
  1519. t.Fatal(err)
  1520. }
  1521. }()
  1522. err = ep1.Join(sb)
  1523. if err != nil {
  1524. t.Fatal(err)
  1525. }
  1526. content, err := ioutil.ReadFile(resolvConfPath)
  1527. if err != nil {
  1528. t.Fatal(err)
  1529. }
  1530. if !bytes.Equal(content, expectedResolvConf) {
  1531. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  1532. }
  1533. if err != nil {
  1534. t.Fatal(err)
  1535. }
  1536. }
  1537. func TestResolvConfHost(t *testing.T) {
  1538. if !testutils.IsRunningInContainer() {
  1539. defer testutils.SetupTestOSContext(t)()
  1540. }
  1541. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1542. //take a copy of resolv.conf for restoring after test completes
  1543. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1544. if err != nil {
  1545. t.Fatal(err)
  1546. }
  1547. //cleanup
  1548. defer func() {
  1549. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1550. t.Fatal(err)
  1551. }
  1552. }()
  1553. n, err := controller.NetworkByName("testhost")
  1554. if err != nil {
  1555. t.Fatal(err)
  1556. }
  1557. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  1558. if err != nil {
  1559. t.Fatal(err)
  1560. }
  1561. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1562. t.Fatal(err)
  1563. }
  1564. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1565. defer os.Remove(resolvConfPath)
  1566. sb, err := controller.NewSandbox(containerID,
  1567. libnetwork.OptionResolvConfPath(resolvConfPath),
  1568. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1569. if err != nil {
  1570. t.Fatal(err)
  1571. }
  1572. defer func() {
  1573. if err := sb.Delete(); err != nil {
  1574. t.Fatal(err)
  1575. }
  1576. }()
  1577. err = ep1.Join(sb)
  1578. if err != nil {
  1579. t.Fatal(err)
  1580. }
  1581. defer func() {
  1582. err = ep1.Leave(sb)
  1583. if err != nil {
  1584. t.Fatal(err)
  1585. }
  1586. }()
  1587. finfo, err := os.Stat(resolvConfPath)
  1588. if err != nil {
  1589. t.Fatal(err)
  1590. }
  1591. fmode := (os.FileMode)(0644)
  1592. if finfo.Mode() != fmode {
  1593. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1594. }
  1595. content, err := ioutil.ReadFile(resolvConfPath)
  1596. if err != nil {
  1597. t.Fatal(err)
  1598. }
  1599. if !bytes.Equal(content, tmpResolvConf) {
  1600. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1601. }
  1602. }
  1603. func TestResolvConf(t *testing.T) {
  1604. if !testutils.IsRunningInContainer() {
  1605. defer testutils.SetupTestOSContext(t)()
  1606. }
  1607. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1608. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1609. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  1610. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1611. //take a copy of resolv.conf for restoring after test completes
  1612. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1613. if err != nil {
  1614. t.Fatal(err)
  1615. }
  1616. //cleanup
  1617. defer func() {
  1618. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1619. t.Fatal(err)
  1620. }
  1621. }()
  1622. netOption := options.Generic{
  1623. netlabel.GenericData: options.Generic{
  1624. "BridgeName": "testnetwork",
  1625. },
  1626. }
  1627. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, nil)
  1628. if err != nil {
  1629. t.Fatal(err)
  1630. }
  1631. defer func() {
  1632. if err := n.Delete(); err != nil {
  1633. t.Fatal(err)
  1634. }
  1635. }()
  1636. ep, err := n.CreateEndpoint("ep")
  1637. if err != nil {
  1638. t.Fatal(err)
  1639. }
  1640. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1641. t.Fatal(err)
  1642. }
  1643. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1644. defer os.Remove(resolvConfPath)
  1645. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1646. if err != nil {
  1647. t.Fatal(err)
  1648. }
  1649. defer func() {
  1650. if err := sb1.Delete(); err != nil {
  1651. t.Fatal(err)
  1652. }
  1653. }()
  1654. err = ep.Join(sb1)
  1655. runtime.LockOSThread()
  1656. if err != nil {
  1657. t.Fatal(err)
  1658. }
  1659. finfo, err := os.Stat(resolvConfPath)
  1660. if err != nil {
  1661. t.Fatal(err)
  1662. }
  1663. fmode := (os.FileMode)(0644)
  1664. if finfo.Mode() != fmode {
  1665. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1666. }
  1667. content, err := ioutil.ReadFile(resolvConfPath)
  1668. if err != nil {
  1669. t.Fatal(err)
  1670. }
  1671. if !bytes.Equal(content, expectedResolvConf1) {
  1672. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1673. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1674. }
  1675. err = ep.Leave(sb1)
  1676. runtime.LockOSThread()
  1677. if err != nil {
  1678. t.Fatal(err)
  1679. }
  1680. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1681. t.Fatal(err)
  1682. }
  1683. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1684. if err != nil {
  1685. t.Fatal(err)
  1686. }
  1687. defer func() {
  1688. if err := sb2.Delete(); err != nil {
  1689. t.Fatal(err)
  1690. }
  1691. }()
  1692. err = ep.Join(sb2)
  1693. runtime.LockOSThread()
  1694. if err != nil {
  1695. t.Fatal(err)
  1696. }
  1697. content, err = ioutil.ReadFile(resolvConfPath)
  1698. if err != nil {
  1699. t.Fatal(err)
  1700. }
  1701. if !bytes.Equal(content, expectedResolvConf1) {
  1702. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1703. }
  1704. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1705. t.Fatal(err)
  1706. }
  1707. err = ep.Leave(sb2)
  1708. runtime.LockOSThread()
  1709. if err != nil {
  1710. t.Fatal(err)
  1711. }
  1712. err = ep.Join(sb2)
  1713. runtime.LockOSThread()
  1714. if err != nil {
  1715. t.Fatal(err)
  1716. }
  1717. content, err = ioutil.ReadFile(resolvConfPath)
  1718. if err != nil {
  1719. t.Fatal(err)
  1720. }
  1721. if !bytes.Equal(content, tmpResolvConf3) {
  1722. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1723. }
  1724. }
  1725. func TestInvalidRemoteDriver(t *testing.T) {
  1726. if !testutils.IsRunningInContainer() {
  1727. t.Skip("Skipping test when not running inside a Container")
  1728. }
  1729. mux := http.NewServeMux()
  1730. server := httptest.NewServer(mux)
  1731. if server == nil {
  1732. t.Fatal("Failed to start a HTTP Server")
  1733. }
  1734. defer server.Close()
  1735. type pluginRequest struct {
  1736. name string
  1737. }
  1738. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1739. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1740. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1741. })
  1742. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1743. t.Fatal(err)
  1744. }
  1745. defer func() {
  1746. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1747. t.Fatal(err)
  1748. }
  1749. }()
  1750. if err := ioutil.WriteFile("/etc/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1751. t.Fatal(err)
  1752. }
  1753. ctrlr, err := libnetwork.New()
  1754. if err != nil {
  1755. t.Fatal(err)
  1756. }
  1757. defer ctrlr.Stop()
  1758. _, err = ctrlr.NewNetwork("invalid-network-driver", "dummy",
  1759. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1760. if err == nil {
  1761. t.Fatal("Expected to fail. But instead succeeded")
  1762. }
  1763. if err != plugins.ErrNotImplements {
  1764. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1765. }
  1766. }
  1767. func TestValidRemoteDriver(t *testing.T) {
  1768. if !testutils.IsRunningInContainer() {
  1769. t.Skip("Skipping test when not running inside a Container")
  1770. }
  1771. mux := http.NewServeMux()
  1772. server := httptest.NewServer(mux)
  1773. if server == nil {
  1774. t.Fatal("Failed to start a HTTP Server")
  1775. }
  1776. defer server.Close()
  1777. type pluginRequest struct {
  1778. name string
  1779. }
  1780. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1781. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1782. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1783. })
  1784. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1785. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1786. fmt.Fprintf(w, "null")
  1787. })
  1788. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1789. t.Fatal(err)
  1790. }
  1791. defer func() {
  1792. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1793. t.Fatal(err)
  1794. }
  1795. }()
  1796. if err := ioutil.WriteFile("/etc/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1797. t.Fatal(err)
  1798. }
  1799. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1800. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1801. if err != nil {
  1802. // Only fail if we could not find the plugin driver
  1803. if _, ok := err.(types.NotFoundError); ok {
  1804. t.Fatal(err)
  1805. }
  1806. return
  1807. }
  1808. defer func() {
  1809. if err := n.Delete(); err != nil {
  1810. t.Fatal(err)
  1811. }
  1812. }()
  1813. }
  1814. var (
  1815. once sync.Once
  1816. start = make(chan struct{})
  1817. done = make(chan chan struct{}, numThreads-1)
  1818. origns = netns.None()
  1819. testns = netns.None()
  1820. sboxes = make([]libnetwork.Sandbox, numThreads)
  1821. )
  1822. const (
  1823. iterCnt = 25
  1824. numThreads = 3
  1825. first = 1
  1826. last = numThreads
  1827. debug = false
  1828. )
  1829. func createGlobalInstance(t *testing.T) {
  1830. var err error
  1831. defer close(start)
  1832. origns, err = netns.Get()
  1833. if err != nil {
  1834. t.Fatal(err)
  1835. }
  1836. if testutils.IsRunningInContainer() {
  1837. testns = origns
  1838. } else {
  1839. testns, err = netns.New()
  1840. if err != nil {
  1841. t.Fatal(err)
  1842. }
  1843. }
  1844. netOption := options.Generic{
  1845. netlabel.GenericData: options.Generic{
  1846. "BridgeName": "network",
  1847. },
  1848. }
  1849. net1, err := controller.NetworkByName("testhost")
  1850. if err != nil {
  1851. t.Fatal(err)
  1852. }
  1853. net2, err := createTestNetwork("bridge", "network2", netOption, nil, nil)
  1854. if err != nil {
  1855. t.Fatal(err)
  1856. }
  1857. _, err = net1.CreateEndpoint("pep1")
  1858. if err != nil {
  1859. t.Fatal(err)
  1860. }
  1861. _, err = net2.CreateEndpoint("pep2")
  1862. if err != nil {
  1863. t.Fatal(err)
  1864. }
  1865. _, err = net2.CreateEndpoint("pep3")
  1866. if err != nil {
  1867. t.Fatal(err)
  1868. }
  1869. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1870. t.Fatal(err)
  1871. }
  1872. for thd := first + 1; thd <= last; thd++ {
  1873. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1874. t.Fatal(err)
  1875. }
  1876. }
  1877. }
  1878. func debugf(format string, a ...interface{}) (int, error) {
  1879. if debug {
  1880. return fmt.Printf(format, a...)
  1881. }
  1882. return 0, nil
  1883. }
  1884. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1885. debugf("J%d.", thrNumber)
  1886. var err error
  1887. sb := sboxes[thrNumber-1]
  1888. err = ep.Join(sb)
  1889. runtime.LockOSThread()
  1890. if err != nil {
  1891. if _, ok := err.(types.ForbiddenError); !ok {
  1892. t.Fatalf("thread %d: %v", thrNumber, err)
  1893. }
  1894. debugf("JE%d(%v).", thrNumber, err)
  1895. }
  1896. debugf("JD%d.", thrNumber)
  1897. }
  1898. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1899. debugf("L%d.", thrNumber)
  1900. var err error
  1901. sb := sboxes[thrNumber-1]
  1902. err = ep.Leave(sb)
  1903. runtime.LockOSThread()
  1904. if err != nil {
  1905. if _, ok := err.(types.ForbiddenError); !ok {
  1906. t.Fatalf("thread %d: %v", thrNumber, err)
  1907. }
  1908. debugf("LE%d(%v).", thrNumber, err)
  1909. }
  1910. debugf("LD%d.", thrNumber)
  1911. }
  1912. func runParallelTests(t *testing.T, thrNumber int) {
  1913. var (
  1914. ep libnetwork.Endpoint
  1915. sb libnetwork.Sandbox
  1916. err error
  1917. )
  1918. t.Parallel()
  1919. pTest := flag.Lookup("test.parallel")
  1920. if pTest == nil {
  1921. t.Skip("Skipped because test.parallel flag not set;")
  1922. }
  1923. numParallel, err := strconv.Atoi(pTest.Value.String())
  1924. if err != nil {
  1925. t.Fatal(err)
  1926. }
  1927. if numParallel < numThreads {
  1928. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1929. }
  1930. runtime.LockOSThread()
  1931. defer runtime.UnlockOSThread()
  1932. if thrNumber == first {
  1933. createGlobalInstance(t)
  1934. }
  1935. if thrNumber != first {
  1936. select {
  1937. case <-start:
  1938. }
  1939. thrdone := make(chan struct{})
  1940. done <- thrdone
  1941. defer close(thrdone)
  1942. if thrNumber == last {
  1943. defer close(done)
  1944. }
  1945. err = netns.Set(testns)
  1946. if err != nil {
  1947. t.Fatal(err)
  1948. }
  1949. }
  1950. defer netns.Set(origns)
  1951. net1, err := controller.NetworkByName("testhost")
  1952. if err != nil {
  1953. t.Fatal(err)
  1954. }
  1955. if net1 == nil {
  1956. t.Fatal("Could not find testhost")
  1957. }
  1958. net2, err := controller.NetworkByName("network2")
  1959. if err != nil {
  1960. t.Fatal(err)
  1961. }
  1962. if net2 == nil {
  1963. t.Fatal("Could not find network2")
  1964. }
  1965. epName := fmt.Sprintf("pep%d", thrNumber)
  1966. if thrNumber == first {
  1967. ep, err = net1.EndpointByName(epName)
  1968. } else {
  1969. ep, err = net2.EndpointByName(epName)
  1970. }
  1971. if err != nil {
  1972. t.Fatal(err)
  1973. }
  1974. if ep == nil {
  1975. t.Fatal("Got nil ep with no error")
  1976. }
  1977. cid := fmt.Sprintf("%drace", thrNumber)
  1978. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1979. if sb == nil {
  1980. t.Fatalf("Got nil sandbox for container: %s", cid)
  1981. }
  1982. for i := 0; i < iterCnt; i++ {
  1983. parallelJoin(t, sb, ep, thrNumber)
  1984. parallelLeave(t, sb, ep, thrNumber)
  1985. }
  1986. debugf("\n")
  1987. err = sb.Delete()
  1988. if err != nil {
  1989. t.Fatal(err)
  1990. }
  1991. if thrNumber == first {
  1992. for thrdone := range done {
  1993. select {
  1994. case <-thrdone:
  1995. }
  1996. }
  1997. testns.Close()
  1998. if err := net2.Delete(); err != nil {
  1999. t.Fatal(err)
  2000. }
  2001. } else {
  2002. err = ep.Delete(false)
  2003. if err != nil {
  2004. t.Fatal(err)
  2005. }
  2006. }
  2007. }
  2008. func TestParallel1(t *testing.T) {
  2009. runParallelTests(t, 1)
  2010. }
  2011. func TestParallel2(t *testing.T) {
  2012. runParallelTests(t, 2)
  2013. }
  2014. func TestParallel3(t *testing.T) {
  2015. runParallelTests(t, 3)
  2016. }
  2017. func TestNullIpam(t *testing.T) {
  2018. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  2019. if err == nil || err.Error() != "ipv4 pool is empty" {
  2020. t.Fatal("bridge network should complain empty pool")
  2021. }
  2022. }