docker_api_network_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "github.com/docker/docker/pkg/integration/checker"
  10. "github.com/docker/engine-api/types"
  11. "github.com/docker/engine-api/types/filters"
  12. "github.com/docker/engine-api/types/network"
  13. "github.com/go-check/check"
  14. )
  15. func (s *DockerSuite) TestApiNetworkGetDefaults(c *check.C) {
  16. testRequires(c, DaemonIsLinux)
  17. // By default docker daemon creates 3 networks. check if they are present
  18. defaults := []string{"bridge", "host", "none"}
  19. for _, nn := range defaults {
  20. c.Assert(isNetworkAvailable(c, nn), checker.Equals, true)
  21. }
  22. }
  23. func (s *DockerSuite) TestApiNetworkCreateDelete(c *check.C) {
  24. testRequires(c, DaemonIsLinux)
  25. // Create a network
  26. name := "testnetwork"
  27. config := types.NetworkCreate{
  28. Name: name,
  29. CheckDuplicate: true,
  30. }
  31. id := createNetwork(c, config, true)
  32. c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
  33. // delete the network and make sure it is deleted
  34. deleteNetwork(c, id, true)
  35. c.Assert(isNetworkAvailable(c, name), checker.Equals, false)
  36. }
  37. func (s *DockerSuite) TestApiNetworkCreateCheckDuplicate(c *check.C) {
  38. testRequires(c, DaemonIsLinux)
  39. name := "testcheckduplicate"
  40. configOnCheck := types.NetworkCreate{
  41. Name: name,
  42. CheckDuplicate: true,
  43. }
  44. configNotCheck := types.NetworkCreate{
  45. Name: name,
  46. CheckDuplicate: false,
  47. }
  48. // Creating a new network first
  49. createNetwork(c, configOnCheck, true)
  50. c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
  51. // Creating another network with same name and CheckDuplicate must fail
  52. createNetwork(c, configOnCheck, false)
  53. // Creating another network with same name and not CheckDuplicate must succeed
  54. createNetwork(c, configNotCheck, true)
  55. }
  56. func (s *DockerSuite) TestApiNetworkFilter(c *check.C) {
  57. testRequires(c, DaemonIsLinux)
  58. nr := getNetworkResource(c, getNetworkIDByName(c, "bridge"))
  59. c.Assert(nr.Name, checker.Equals, "bridge")
  60. }
  61. func (s *DockerSuite) TestApiNetworkInspect(c *check.C) {
  62. testRequires(c, DaemonIsLinux)
  63. // Inspect default bridge network
  64. nr := getNetworkResource(c, "bridge")
  65. c.Assert(nr.Name, checker.Equals, "bridge")
  66. // run a container and attach it to the default bridge network
  67. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  68. containerID := strings.TrimSpace(out)
  69. containerIP := findContainerIP(c, "test", "bridge")
  70. // inspect default bridge network again and make sure the container is connected
  71. nr = getNetworkResource(c, nr.ID)
  72. c.Assert(nr.Driver, checker.Equals, "bridge")
  73. c.Assert(nr.Scope, checker.Equals, "local")
  74. c.Assert(nr.Internal, checker.Equals, false)
  75. c.Assert(nr.EnableIPv6, checker.Equals, false)
  76. c.Assert(nr.IPAM.Driver, checker.Equals, "default")
  77. c.Assert(len(nr.Containers), checker.Equals, 1)
  78. c.Assert(nr.Containers[containerID], checker.NotNil)
  79. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  80. c.Assert(err, checker.IsNil)
  81. c.Assert(ip.String(), checker.Equals, containerIP)
  82. // IPAM configuration inspect
  83. ipam := network.IPAM{
  84. Driver: "default",
  85. Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}},
  86. }
  87. config := types.NetworkCreate{
  88. Name: "br0",
  89. Driver: "bridge",
  90. IPAM: ipam,
  91. Options: map[string]string{"foo": "bar", "opts": "dopts"},
  92. }
  93. id0 := createNetwork(c, config, true)
  94. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true)
  95. nr = getNetworkResource(c, id0)
  96. c.Assert(len(nr.IPAM.Config), checker.Equals, 1)
  97. c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16")
  98. c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24")
  99. c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254")
  100. c.Assert(nr.Options["foo"], checker.Equals, "bar")
  101. c.Assert(nr.Options["opts"], checker.Equals, "dopts")
  102. // delete the network and make sure it is deleted
  103. deleteNetwork(c, id0, true)
  104. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false)
  105. }
  106. func (s *DockerSuite) TestApiNetworkConnectDisconnect(c *check.C) {
  107. testRequires(c, DaemonIsLinux)
  108. // Create test network
  109. name := "testnetwork"
  110. config := types.NetworkCreate{
  111. Name: name,
  112. }
  113. id := createNetwork(c, config, true)
  114. nr := getNetworkResource(c, id)
  115. c.Assert(nr.Name, checker.Equals, name)
  116. c.Assert(nr.ID, checker.Equals, id)
  117. c.Assert(len(nr.Containers), checker.Equals, 0)
  118. // run a container
  119. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  120. containerID := strings.TrimSpace(out)
  121. // connect the container to the test network
  122. connectNetwork(c, nr.ID, containerID)
  123. // inspect the network to make sure container is connected
  124. nr = getNetworkResource(c, nr.ID)
  125. c.Assert(len(nr.Containers), checker.Equals, 1)
  126. c.Assert(nr.Containers[containerID], checker.NotNil)
  127. // check if container IP matches network inspect
  128. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  129. c.Assert(err, checker.IsNil)
  130. containerIP := findContainerIP(c, "test", "testnetwork")
  131. c.Assert(ip.String(), checker.Equals, containerIP)
  132. // disconnect container from the network
  133. disconnectNetwork(c, nr.ID, containerID)
  134. nr = getNetworkResource(c, nr.ID)
  135. c.Assert(nr.Name, checker.Equals, name)
  136. c.Assert(len(nr.Containers), checker.Equals, 0)
  137. // delete the network
  138. deleteNetwork(c, nr.ID, true)
  139. }
  140. func (s *DockerSuite) TestApiNetworkIpamMultipleBridgeNetworks(c *check.C) {
  141. testRequires(c, DaemonIsLinux)
  142. // test0 bridge network
  143. ipam0 := network.IPAM{
  144. Driver: "default",
  145. Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}},
  146. }
  147. config0 := types.NetworkCreate{
  148. Name: "test0",
  149. Driver: "bridge",
  150. IPAM: ipam0,
  151. }
  152. id0 := createNetwork(c, config0, true)
  153. c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true)
  154. ipam1 := network.IPAM{
  155. Driver: "default",
  156. Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}},
  157. }
  158. // test1 bridge network overlaps with test0
  159. config1 := types.NetworkCreate{
  160. Name: "test1",
  161. Driver: "bridge",
  162. IPAM: ipam1,
  163. }
  164. createNetwork(c, config1, false)
  165. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false)
  166. ipam2 := network.IPAM{
  167. Driver: "default",
  168. Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}},
  169. }
  170. // test2 bridge network does not overlap
  171. config2 := types.NetworkCreate{
  172. Name: "test2",
  173. Driver: "bridge",
  174. IPAM: ipam2,
  175. }
  176. createNetwork(c, config2, true)
  177. c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true)
  178. // remove test0 and retry to create test1
  179. deleteNetwork(c, id0, true)
  180. createNetwork(c, config1, true)
  181. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true)
  182. // for networks w/o ipam specified, docker will choose proper non-overlapping subnets
  183. createNetwork(c, types.NetworkCreate{Name: "test3"}, true)
  184. c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true)
  185. createNetwork(c, types.NetworkCreate{Name: "test4"}, true)
  186. c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true)
  187. createNetwork(c, types.NetworkCreate{Name: "test5"}, true)
  188. c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true)
  189. for i := 1; i < 6; i++ {
  190. deleteNetwork(c, fmt.Sprintf("test%d", i), true)
  191. }
  192. }
  193. func (s *DockerSuite) TestApiCreateDeletePredefinedNetworks(c *check.C) {
  194. testRequires(c, DaemonIsLinux)
  195. createDeletePredefinedNetwork(c, "bridge")
  196. createDeletePredefinedNetwork(c, "none")
  197. createDeletePredefinedNetwork(c, "host")
  198. }
  199. func createDeletePredefinedNetwork(c *check.C, name string) {
  200. // Create pre-defined network
  201. config := types.NetworkCreate{
  202. Name: name,
  203. CheckDuplicate: true,
  204. }
  205. shouldSucceed := false
  206. createNetwork(c, config, shouldSucceed)
  207. deleteNetwork(c, name, shouldSucceed)
  208. }
  209. func isNetworkAvailable(c *check.C, name string) bool {
  210. status, body, err := sockRequest("GET", "/networks", nil)
  211. c.Assert(status, checker.Equals, http.StatusOK)
  212. c.Assert(err, checker.IsNil)
  213. nJSON := []types.NetworkResource{}
  214. err = json.Unmarshal(body, &nJSON)
  215. c.Assert(err, checker.IsNil)
  216. for _, n := range nJSON {
  217. if n.Name == name {
  218. return true
  219. }
  220. }
  221. return false
  222. }
  223. func getNetworkIDByName(c *check.C, name string) string {
  224. var (
  225. v = url.Values{}
  226. filterArgs = filters.NewArgs()
  227. )
  228. filterArgs.Add("name", name)
  229. filterJSON, err := filters.ToParam(filterArgs)
  230. c.Assert(err, checker.IsNil)
  231. v.Set("filters", filterJSON)
  232. status, body, err := sockRequest("GET", "/networks?"+v.Encode(), nil)
  233. c.Assert(status, checker.Equals, http.StatusOK)
  234. c.Assert(err, checker.IsNil)
  235. nJSON := []types.NetworkResource{}
  236. err = json.Unmarshal(body, &nJSON)
  237. c.Assert(err, checker.IsNil)
  238. c.Assert(len(nJSON), checker.Equals, 1)
  239. return nJSON[0].ID
  240. }
  241. func getNetworkResource(c *check.C, id string) *types.NetworkResource {
  242. _, obj, err := sockRequest("GET", "/networks/"+id, nil)
  243. c.Assert(err, checker.IsNil)
  244. nr := types.NetworkResource{}
  245. err = json.Unmarshal(obj, &nr)
  246. c.Assert(err, checker.IsNil)
  247. return &nr
  248. }
  249. func createNetwork(c *check.C, config types.NetworkCreate, shouldSucceed bool) string {
  250. status, resp, err := sockRequest("POST", "/networks/create", config)
  251. if !shouldSucceed {
  252. c.Assert(status, checker.Not(checker.Equals), http.StatusCreated)
  253. return ""
  254. }
  255. c.Assert(status, checker.Equals, http.StatusCreated)
  256. c.Assert(err, checker.IsNil)
  257. var nr types.NetworkCreateResponse
  258. err = json.Unmarshal(resp, &nr)
  259. c.Assert(err, checker.IsNil)
  260. return nr.ID
  261. }
  262. func connectNetwork(c *check.C, nid, cid string) {
  263. config := types.NetworkConnect{
  264. Container: cid,
  265. }
  266. status, _, err := sockRequest("POST", "/networks/"+nid+"/connect", config)
  267. c.Assert(status, checker.Equals, http.StatusOK)
  268. c.Assert(err, checker.IsNil)
  269. }
  270. func disconnectNetwork(c *check.C, nid, cid string) {
  271. config := types.NetworkConnect{
  272. Container: cid,
  273. }
  274. status, _, err := sockRequest("POST", "/networks/"+nid+"/disconnect", config)
  275. c.Assert(status, checker.Equals, http.StatusOK)
  276. c.Assert(err, checker.IsNil)
  277. }
  278. func deleteNetwork(c *check.C, id string, shouldSucceed bool) {
  279. status, _, err := sockRequest("DELETE", "/networks/"+id, nil)
  280. if !shouldSucceed {
  281. c.Assert(status, checker.Not(checker.Equals), http.StatusOK)
  282. return
  283. }
  284. c.Assert(status, checker.Equals, http.StatusOK)
  285. c.Assert(err, checker.IsNil)
  286. }