bridge_linux_test.go 33 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238
  1. package bridge
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "fmt"
  6. "net"
  7. "regexp"
  8. "strconv"
  9. "testing"
  10. "github.com/docker/docker/internal/testutils/netnsutils"
  11. "github.com/docker/docker/libnetwork/driverapi"
  12. "github.com/docker/docker/libnetwork/ipamutils"
  13. "github.com/docker/docker/libnetwork/iptables"
  14. "github.com/docker/docker/libnetwork/netlabel"
  15. "github.com/docker/docker/libnetwork/netutils"
  16. "github.com/docker/docker/libnetwork/options"
  17. "github.com/docker/docker/libnetwork/portallocator"
  18. "github.com/docker/docker/libnetwork/types"
  19. "github.com/vishvananda/netlink"
  20. "gotest.tools/v3/assert"
  21. is "gotest.tools/v3/assert/cmp"
  22. )
  23. func TestEndpointMarshalling(t *testing.T) {
  24. ip1, _ := types.ParseCIDR("172.22.0.9/16")
  25. ip2, _ := types.ParseCIDR("2001:db8::9")
  26. mac, _ := net.ParseMAC("ac:bd:24:57:66:77")
  27. e := &bridgeEndpoint{
  28. id: "d2c015a1fe5930650cbcd50493efba0500bcebd8ee1f4401a16319f8a567de33",
  29. nid: "ee33fbb43c323f1920b6b35a0101552ac22ede960d0e5245e9738bccc68b2415",
  30. addr: ip1,
  31. addrv6: ip2,
  32. macAddress: mac,
  33. srcName: "veth123456",
  34. config: &endpointConfiguration{MacAddress: mac},
  35. containerConfig: &containerConfiguration{
  36. ParentEndpoints: []string{"one", "due", "three"},
  37. ChildEndpoints: []string{"four", "five", "six"},
  38. },
  39. extConnConfig: &connectivityConfiguration{
  40. ExposedPorts: []types.TransportPort{
  41. {
  42. Proto: 6,
  43. Port: uint16(18),
  44. },
  45. },
  46. PortBindings: []types.PortBinding{
  47. {
  48. Proto: 6,
  49. IP: net.ParseIP("17210.33.9.56"),
  50. Port: uint16(18),
  51. HostPort: uint16(3000),
  52. HostPortEnd: uint16(14000),
  53. },
  54. },
  55. },
  56. portMapping: []types.PortBinding{
  57. {
  58. Proto: 17,
  59. IP: net.ParseIP("172.33.9.56"),
  60. Port: uint16(99),
  61. HostIP: net.ParseIP("10.10.100.2"),
  62. HostPort: uint16(9900),
  63. HostPortEnd: uint16(10000),
  64. },
  65. {
  66. Proto: 6,
  67. IP: net.ParseIP("171.33.9.56"),
  68. Port: uint16(55),
  69. HostIP: net.ParseIP("10.11.100.2"),
  70. HostPort: uint16(5500),
  71. HostPortEnd: uint16(55000),
  72. },
  73. },
  74. }
  75. b, err := json.Marshal(e)
  76. if err != nil {
  77. t.Fatal(err)
  78. }
  79. ee := &bridgeEndpoint{}
  80. err = json.Unmarshal(b, ee)
  81. if err != nil {
  82. t.Fatal(err)
  83. }
  84. if e.id != ee.id || e.nid != ee.nid || e.srcName != ee.srcName || !bytes.Equal(e.macAddress, ee.macAddress) ||
  85. !types.CompareIPNet(e.addr, ee.addr) || !types.CompareIPNet(e.addrv6, ee.addrv6) ||
  86. !compareEpConfig(e.config, ee.config) ||
  87. !compareContainerConfig(e.containerConfig, ee.containerConfig) ||
  88. !compareConnConfig(e.extConnConfig, ee.extConnConfig) ||
  89. !compareBindings(e.portMapping, ee.portMapping) {
  90. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v", e, ee)
  91. }
  92. }
  93. func compareEpConfig(a, b *endpointConfiguration) bool {
  94. if a == b {
  95. return true
  96. }
  97. if a == nil || b == nil {
  98. return false
  99. }
  100. return bytes.Equal(a.MacAddress, b.MacAddress)
  101. }
  102. func compareContainerConfig(a, b *containerConfiguration) bool {
  103. if a == b {
  104. return true
  105. }
  106. if a == nil || b == nil {
  107. return false
  108. }
  109. if len(a.ParentEndpoints) != len(b.ParentEndpoints) ||
  110. len(a.ChildEndpoints) != len(b.ChildEndpoints) {
  111. return false
  112. }
  113. for i := 0; i < len(a.ParentEndpoints); i++ {
  114. if a.ParentEndpoints[i] != b.ParentEndpoints[i] {
  115. return false
  116. }
  117. }
  118. for i := 0; i < len(a.ChildEndpoints); i++ {
  119. if a.ChildEndpoints[i] != b.ChildEndpoints[i] {
  120. return false
  121. }
  122. }
  123. return true
  124. }
  125. func compareConnConfig(a, b *connectivityConfiguration) bool {
  126. if a == b {
  127. return true
  128. }
  129. if a == nil || b == nil {
  130. return false
  131. }
  132. if len(a.ExposedPorts) != len(b.ExposedPorts) ||
  133. len(a.PortBindings) != len(b.PortBindings) {
  134. return false
  135. }
  136. for i := 0; i < len(a.ExposedPorts); i++ {
  137. if !a.ExposedPorts[i].Equal(&b.ExposedPorts[i]) {
  138. return false
  139. }
  140. }
  141. for i := 0; i < len(a.PortBindings); i++ {
  142. if !comparePortBinding(&a.PortBindings[i], &b.PortBindings[i]) {
  143. return false
  144. }
  145. }
  146. return true
  147. }
  148. // comparePortBinding returns whether the given PortBindings are equal.
  149. func comparePortBinding(p *types.PortBinding, o *types.PortBinding) bool {
  150. if p == o {
  151. return true
  152. }
  153. if o == nil {
  154. return false
  155. }
  156. if p.Proto != o.Proto || p.Port != o.Port ||
  157. p.HostPort != o.HostPort || p.HostPortEnd != o.HostPortEnd {
  158. return false
  159. }
  160. if p.IP != nil {
  161. if !p.IP.Equal(o.IP) {
  162. return false
  163. }
  164. } else {
  165. if o.IP != nil {
  166. return false
  167. }
  168. }
  169. if p.HostIP != nil {
  170. if !p.HostIP.Equal(o.HostIP) {
  171. return false
  172. }
  173. } else {
  174. if o.HostIP != nil {
  175. return false
  176. }
  177. }
  178. return true
  179. }
  180. func compareBindings(a, b []types.PortBinding) bool {
  181. if len(a) != len(b) {
  182. return false
  183. }
  184. for i := 0; i < len(a); i++ {
  185. if !comparePortBinding(&a[i], &b[i]) {
  186. return false
  187. }
  188. }
  189. return true
  190. }
  191. func getIPv4Data(t *testing.T) []driverapi.IPAMData {
  192. ipd := driverapi.IPAMData{AddressSpace: "full"}
  193. nw, err := netutils.FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  194. if err != nil {
  195. t.Fatal(err)
  196. }
  197. ipd.Pool = nw
  198. // Set network gateway to X.X.X.1
  199. ipd.Gateway = types.GetIPNetCopy(nw)
  200. ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
  201. return []driverapi.IPAMData{ipd}
  202. }
  203. func TestCreateFullOptions(t *testing.T) {
  204. defer netnsutils.SetupTestOSContext(t)()
  205. d := newDriver()
  206. config := &configuration{
  207. EnableIPForwarding: true,
  208. EnableIPTables: true,
  209. }
  210. // Test this scenario: Default gw address does not belong to
  211. // container network and it's greater than bridge address
  212. cnw, _ := types.ParseCIDR("172.16.122.0/24")
  213. bnw, _ := types.ParseCIDR("172.16.0.0/24")
  214. br, _ := types.ParseCIDR("172.16.0.1/16")
  215. defgw, _ := types.ParseCIDR("172.16.0.100/16")
  216. genericOption := make(map[string]interface{})
  217. genericOption[netlabel.GenericData] = config
  218. if err := d.configure(genericOption); err != nil {
  219. t.Fatalf("Failed to setup driver config: %v", err)
  220. }
  221. netOption := make(map[string]interface{})
  222. netOption[netlabel.EnableIPv6] = true
  223. netOption[netlabel.GenericData] = &networkConfiguration{
  224. BridgeName: DefaultBridgeName,
  225. }
  226. ipdList := []driverapi.IPAMData{
  227. {
  228. Pool: bnw,
  229. Gateway: br,
  230. AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
  231. },
  232. }
  233. err := d.CreateNetwork("dummy", netOption, nil, ipdList, nil)
  234. if err != nil {
  235. t.Fatalf("Failed to create bridge: %v", err)
  236. }
  237. // Verify the IP address allocated for the endpoint belongs to the container network
  238. epOptions := make(map[string]interface{})
  239. te := newTestEndpoint(cnw, 10)
  240. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  241. if err != nil {
  242. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  243. }
  244. if !cnw.Contains(te.Interface().Address().IP) {
  245. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  246. }
  247. }
  248. func TestCreateNoConfig(t *testing.T) {
  249. defer netnsutils.SetupTestOSContext(t)()
  250. d := newDriver()
  251. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  252. genericOption := make(map[string]interface{})
  253. genericOption[netlabel.GenericData] = netconfig
  254. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
  255. t.Fatalf("Failed to create bridge: %v", err)
  256. }
  257. }
  258. func TestCreateFullOptionsLabels(t *testing.T) {
  259. defer netnsutils.SetupTestOSContext(t)()
  260. d := newDriver()
  261. config := &configuration{
  262. EnableIPForwarding: true,
  263. }
  264. genericOption := make(map[string]interface{})
  265. genericOption[netlabel.GenericData] = config
  266. if err := d.configure(genericOption); err != nil {
  267. t.Fatalf("Failed to setup driver config: %v", err)
  268. }
  269. bndIPs := "127.0.0.1"
  270. testHostIPv4 := "1.2.3.4"
  271. nwV6s := "2001:db8:2600:2700:2800::/80"
  272. gwV6s := "2001:db8:2600:2700:2800::25/80"
  273. nwV6, _ := types.ParseCIDR(nwV6s)
  274. gwV6, _ := types.ParseCIDR(gwV6s)
  275. labels := map[string]string{
  276. BridgeName: DefaultBridgeName,
  277. DefaultBridge: "true",
  278. EnableICC: "true",
  279. EnableIPMasquerade: "true",
  280. DefaultBindingIP: bndIPs,
  281. netlabel.HostIPv4: testHostIPv4,
  282. }
  283. netOption := make(map[string]interface{})
  284. netOption[netlabel.EnableIPv6] = true
  285. netOption[netlabel.GenericData] = labels
  286. ipdList := getIPv4Data(t)
  287. ipd6List := []driverapi.IPAMData{
  288. {
  289. Pool: nwV6,
  290. AuxAddresses: map[string]*net.IPNet{
  291. DefaultGatewayV6AuxKey: gwV6,
  292. },
  293. },
  294. }
  295. err := d.CreateNetwork("dummy", netOption, nil, ipdList, ipd6List)
  296. if err != nil {
  297. t.Fatalf("Failed to create bridge: %v", err)
  298. }
  299. nw, ok := d.networks["dummy"]
  300. if !ok {
  301. t.Fatal("Cannot find dummy network in bridge driver")
  302. }
  303. if nw.config.BridgeName != DefaultBridgeName {
  304. t.Fatal("incongruent name in bridge network")
  305. }
  306. if !nw.config.EnableIPv6 {
  307. t.Fatal("incongruent EnableIPv6 in bridge network")
  308. }
  309. if !nw.config.EnableICC {
  310. t.Fatal("incongruent EnableICC in bridge network")
  311. }
  312. if !nw.config.EnableIPMasquerade {
  313. t.Fatal("incongruent EnableIPMasquerade in bridge network")
  314. }
  315. bndIP := net.ParseIP(bndIPs)
  316. if !bndIP.Equal(nw.config.DefaultBindingIP) {
  317. t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
  318. }
  319. hostIP := net.ParseIP(testHostIPv4)
  320. if !hostIP.Equal(nw.config.HostIPv4) {
  321. t.Fatalf("Unexpected: %v", nw.config.HostIPv4)
  322. }
  323. if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
  324. t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
  325. }
  326. if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
  327. t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
  328. }
  329. // In short here we are testing --fixed-cidr-v6 daemon option
  330. // plus --mac-address run option
  331. mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
  332. epOptions := map[string]interface{}{netlabel.MacAddress: mac}
  333. te := newTestEndpoint(ipdList[0].Pool, 20)
  334. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  335. if err != nil {
  336. t.Fatal(err)
  337. }
  338. if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
  339. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
  340. }
  341. if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
  342. t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
  343. }
  344. }
  345. func TestCreate(t *testing.T) {
  346. defer netnsutils.SetupTestOSContext(t)()
  347. d := newDriver()
  348. if err := d.configure(nil); err != nil {
  349. t.Fatalf("Failed to setup driver config: %v", err)
  350. }
  351. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  352. genericOption := make(map[string]interface{})
  353. genericOption[netlabel.GenericData] = netconfig
  354. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
  355. t.Fatalf("Failed to create bridge: %v", err)
  356. }
  357. err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil)
  358. if err == nil {
  359. t.Fatal("Expected bridge driver to refuse creation of second network with default name")
  360. }
  361. if _, ok := err.(types.ForbiddenError); !ok {
  362. t.Fatal("Creation of second network with default name failed with unexpected error type")
  363. }
  364. }
  365. func TestCreateFail(t *testing.T) {
  366. defer netnsutils.SetupTestOSContext(t)()
  367. d := newDriver()
  368. if err := d.configure(nil); err != nil {
  369. t.Fatalf("Failed to setup driver config: %v", err)
  370. }
  371. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  372. genericOption := make(map[string]interface{})
  373. genericOption[netlabel.GenericData] = netconfig
  374. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err == nil {
  375. t.Fatal("Bridge creation was expected to fail")
  376. }
  377. }
  378. func TestCreateMultipleNetworks(t *testing.T) {
  379. defer netnsutils.SetupTestOSContext(t)()
  380. d := newDriver()
  381. config := &configuration{
  382. EnableIPTables: true,
  383. }
  384. genericOption := make(map[string]interface{})
  385. genericOption[netlabel.GenericData] = config
  386. if err := d.configure(genericOption); err != nil {
  387. t.Fatalf("Failed to setup driver config: %v", err)
  388. }
  389. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  390. genericOption = make(map[string]interface{})
  391. genericOption[netlabel.GenericData] = config1
  392. if err := d.CreateNetwork("1", genericOption, nil, getIPv4Data(t), nil); err != nil {
  393. t.Fatalf("Failed to create bridge: %v", err)
  394. }
  395. verifyV4INCEntries(d.networks, t)
  396. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  397. genericOption[netlabel.GenericData] = config2
  398. if err := d.CreateNetwork("2", genericOption, nil, getIPv4Data(t), nil); err != nil {
  399. t.Fatalf("Failed to create bridge: %v", err)
  400. }
  401. verifyV4INCEntries(d.networks, t)
  402. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  403. genericOption[netlabel.GenericData] = config3
  404. if err := d.CreateNetwork("3", genericOption, nil, getIPv4Data(t), nil); err != nil {
  405. t.Fatalf("Failed to create bridge: %v", err)
  406. }
  407. verifyV4INCEntries(d.networks, t)
  408. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  409. genericOption[netlabel.GenericData] = config4
  410. if err := d.CreateNetwork("4", genericOption, nil, getIPv4Data(t), nil); err != nil {
  411. t.Fatalf("Failed to create bridge: %v", err)
  412. }
  413. verifyV4INCEntries(d.networks, t)
  414. if err := d.DeleteNetwork("1"); err != nil {
  415. t.Log(err)
  416. }
  417. verifyV4INCEntries(d.networks, t)
  418. if err := d.DeleteNetwork("2"); err != nil {
  419. t.Log(err)
  420. }
  421. verifyV4INCEntries(d.networks, t)
  422. if err := d.DeleteNetwork("3"); err != nil {
  423. t.Log(err)
  424. }
  425. verifyV4INCEntries(d.networks, t)
  426. if err := d.DeleteNetwork("4"); err != nil {
  427. t.Log(err)
  428. }
  429. verifyV4INCEntries(d.networks, t)
  430. }
  431. // Verify the network isolation rules are installed for each network
  432. func verifyV4INCEntries(networks map[string]*bridgeNetwork, t *testing.T) {
  433. iptable := iptables.GetIptable(iptables.IPv4)
  434. out1, err := iptable.Raw("-S", IsolationChain1)
  435. if err != nil {
  436. t.Fatal(err)
  437. }
  438. out2, err := iptable.Raw("-S", IsolationChain2)
  439. if err != nil {
  440. t.Fatal(err)
  441. }
  442. for _, n := range networks {
  443. re := regexp.MustCompile(fmt.Sprintf("-i %s ! -o %s -j %s", n.config.BridgeName, n.config.BridgeName, IsolationChain2))
  444. matches := re.FindAllString(string(out1[:]), -1)
  445. if len(matches) != 1 {
  446. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out1[:]))
  447. }
  448. re = regexp.MustCompile(fmt.Sprintf("-o %s -j DROP", n.config.BridgeName))
  449. matches = re.FindAllString(string(out2[:]), -1)
  450. if len(matches) != 1 {
  451. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out2[:]))
  452. }
  453. }
  454. }
  455. type testInterface struct {
  456. mac net.HardwareAddr
  457. addr *net.IPNet
  458. addrv6 *net.IPNet
  459. srcName string
  460. dstName string
  461. }
  462. type testEndpoint struct {
  463. iface *testInterface
  464. gw net.IP
  465. gw6 net.IP
  466. routes []types.StaticRoute
  467. }
  468. func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
  469. addr := types.GetIPNetCopy(nw)
  470. addr.IP[len(addr.IP)-1] = ordinal
  471. return &testEndpoint{iface: &testInterface{addr: addr}}
  472. }
  473. func (te *testEndpoint) Interface() *testInterface {
  474. return te.iface
  475. }
  476. func (i *testInterface) MacAddress() net.HardwareAddr {
  477. return i.mac
  478. }
  479. func (i *testInterface) Address() *net.IPNet {
  480. return i.addr
  481. }
  482. func (i *testInterface) AddressIPv6() *net.IPNet {
  483. return i.addrv6
  484. }
  485. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  486. if i.mac != nil {
  487. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  488. }
  489. if mac == nil {
  490. return types.InvalidParameterErrorf("tried to set nil MAC address to endpoint interface")
  491. }
  492. i.mac = types.GetMacCopy(mac)
  493. return nil
  494. }
  495. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  496. if address.IP == nil {
  497. return types.InvalidParameterErrorf("tried to set nil IP address to endpoint interface")
  498. }
  499. if address.IP.To4() == nil {
  500. return setAddress(&i.addrv6, address)
  501. }
  502. return setAddress(&i.addr, address)
  503. }
  504. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  505. if *ifaceAddr != nil {
  506. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  507. }
  508. *ifaceAddr = types.GetIPNetCopy(address)
  509. return nil
  510. }
  511. func (i *testInterface) SetNames(srcName string, dstName string) error {
  512. i.srcName = srcName
  513. i.dstName = dstName
  514. return nil
  515. }
  516. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  517. if te.iface != nil {
  518. return te.iface
  519. }
  520. return nil
  521. }
  522. func (te *testEndpoint) SetGateway(gw net.IP) error {
  523. te.gw = gw
  524. return nil
  525. }
  526. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  527. te.gw6 = gw6
  528. return nil
  529. }
  530. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  531. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  532. return nil
  533. }
  534. func (te *testEndpoint) AddTableEntry(tableName string, key string, value []byte) error {
  535. return nil
  536. }
  537. func (te *testEndpoint) DisableGatewayService() {}
  538. func TestQueryEndpointInfo(t *testing.T) {
  539. testQueryEndpointInfo(t, true)
  540. }
  541. func TestQueryEndpointInfoHairpin(t *testing.T) {
  542. testQueryEndpointInfo(t, false)
  543. }
  544. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  545. defer netnsutils.SetupTestOSContext(t)()
  546. d := newDriver()
  547. d.portAllocator = portallocator.NewInstance()
  548. config := &configuration{
  549. EnableIPTables: true,
  550. EnableUserlandProxy: ulPxyEnabled,
  551. }
  552. genericOption := make(map[string]interface{})
  553. genericOption[netlabel.GenericData] = config
  554. if err := d.configure(genericOption); err != nil {
  555. t.Fatalf("Failed to setup driver config: %v", err)
  556. }
  557. netconfig := &networkConfiguration{
  558. BridgeName: DefaultBridgeName,
  559. EnableICC: false,
  560. }
  561. genericOption = make(map[string]interface{})
  562. genericOption[netlabel.GenericData] = netconfig
  563. ipdList := getIPv4Data(t)
  564. err := d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
  565. if err != nil {
  566. t.Fatalf("Failed to create bridge: %v", err)
  567. }
  568. sbOptions := make(map[string]interface{})
  569. sbOptions[netlabel.PortMap] = getPortMapping()
  570. te := newTestEndpoint(ipdList[0].Pool, 11)
  571. err = d.CreateEndpoint("net1", "ep1", te.Interface(), nil)
  572. if err != nil {
  573. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  574. }
  575. err = d.Join("net1", "ep1", "sbox", te, sbOptions)
  576. if err != nil {
  577. t.Fatalf("Failed to join the endpoint: %v", err)
  578. }
  579. err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
  580. if err != nil {
  581. t.Fatalf("Failed to program external connectivity: %v", err)
  582. }
  583. network, ok := d.networks["net1"]
  584. if !ok {
  585. t.Fatalf("Cannot find network %s inside driver", "net1")
  586. }
  587. ep := network.endpoints["ep1"]
  588. data, err := d.EndpointOperInfo(network.id, ep.id)
  589. if err != nil {
  590. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  591. }
  592. pmd, ok := data[netlabel.PortMap]
  593. if !ok {
  594. t.Fatal("Endpoint operational data does not contain port mapping data")
  595. }
  596. pm, ok := pmd.([]types.PortBinding)
  597. if !ok {
  598. t.Fatal("Unexpected format for port mapping in endpoint operational data")
  599. }
  600. if len(ep.portMapping) != len(pm) {
  601. t.Fatal("Incomplete data for port mapping in endpoint operational data")
  602. }
  603. for i, pb := range ep.portMapping {
  604. if !comparePortBinding(&pb, &pm[i]) {
  605. t.Fatal("Unexpected data for port mapping in endpoint operational data")
  606. }
  607. }
  608. err = d.RevokeExternalConnectivity("net1", "ep1")
  609. if err != nil {
  610. t.Fatal(err)
  611. }
  612. // release host mapped ports
  613. err = d.Leave("net1", "ep1")
  614. if err != nil {
  615. t.Fatal(err)
  616. }
  617. }
  618. func getExposedPorts() []types.TransportPort {
  619. return []types.TransportPort{
  620. {Proto: types.TCP, Port: uint16(5000)},
  621. {Proto: types.UDP, Port: uint16(400)},
  622. {Proto: types.TCP, Port: uint16(600)},
  623. }
  624. }
  625. func getPortMapping() []types.PortBinding {
  626. return []types.PortBinding{
  627. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  628. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  629. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  630. }
  631. }
  632. func TestLinkContainers(t *testing.T) {
  633. defer netnsutils.SetupTestOSContext(t)()
  634. d := newDriver()
  635. iptable := iptables.GetIptable(iptables.IPv4)
  636. config := &configuration{
  637. EnableIPTables: true,
  638. }
  639. genericOption := make(map[string]interface{})
  640. genericOption[netlabel.GenericData] = config
  641. if err := d.configure(genericOption); err != nil {
  642. t.Fatalf("Failed to setup driver config: %v", err)
  643. }
  644. netconfig := &networkConfiguration{
  645. BridgeName: DefaultBridgeName,
  646. EnableICC: false,
  647. }
  648. genericOption = make(map[string]interface{})
  649. genericOption[netlabel.GenericData] = netconfig
  650. ipdList := getIPv4Data(t)
  651. err := d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
  652. if err != nil {
  653. t.Fatalf("Failed to create bridge: %v", err)
  654. }
  655. te1 := newTestEndpoint(ipdList[0].Pool, 11)
  656. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), nil)
  657. if err != nil {
  658. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  659. }
  660. exposedPorts := getExposedPorts()
  661. sbOptions := make(map[string]interface{})
  662. sbOptions[netlabel.ExposedPorts] = exposedPorts
  663. err = d.Join("net1", "ep1", "sbox", te1, sbOptions)
  664. if err != nil {
  665. t.Fatalf("Failed to join the endpoint: %v", err)
  666. }
  667. err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
  668. if err != nil {
  669. t.Fatalf("Failed to program external connectivity: %v", err)
  670. }
  671. addr1 := te1.iface.addr
  672. if addr1.IP.To4() == nil {
  673. t.Fatal("No Ipv4 address assigned to the endpoint: ep1")
  674. }
  675. te2 := newTestEndpoint(ipdList[0].Pool, 22)
  676. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  677. if err != nil {
  678. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  679. }
  680. addr2 := te2.iface.addr
  681. if addr2.IP.To4() == nil {
  682. t.Fatal("No Ipv4 address assigned to the endpoint: ep2")
  683. }
  684. sbOptions = make(map[string]interface{})
  685. sbOptions[netlabel.GenericData] = options.Generic{
  686. "ChildEndpoints": []string{"ep1"},
  687. }
  688. err = d.Join("net1", "ep2", "", te2, sbOptions)
  689. if err != nil {
  690. t.Fatal("Failed to link ep1 and ep2")
  691. }
  692. err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
  693. if err != nil {
  694. t.Fatalf("Failed to program external connectivity: %v", err)
  695. }
  696. out, _ := iptable.Raw("-L", DockerChain)
  697. for _, pm := range exposedPorts {
  698. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  699. re := regexp.MustCompile(regex)
  700. matches := re.FindAllString(string(out[:]), -1)
  701. if len(matches) != 1 {
  702. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  703. }
  704. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  705. matched, _ := regexp.MatchString(regex, string(out[:]))
  706. if !matched {
  707. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  708. }
  709. }
  710. err = d.RevokeExternalConnectivity("net1", "ep2")
  711. if err != nil {
  712. t.Fatalf("Failed to revoke external connectivity: %v", err)
  713. }
  714. err = d.Leave("net1", "ep2")
  715. if err != nil {
  716. t.Fatal("Failed to unlink ep1 and ep2")
  717. }
  718. out, _ = iptable.Raw("-L", DockerChain)
  719. for _, pm := range exposedPorts {
  720. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  721. re := regexp.MustCompile(regex)
  722. matches := re.FindAllString(string(out[:]), -1)
  723. if len(matches) != 0 {
  724. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  725. }
  726. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  727. matched, _ := regexp.MatchString(regex, string(out[:]))
  728. if matched {
  729. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  730. }
  731. }
  732. // Error condition test with an invalid endpoint-id "ep4"
  733. sbOptions = make(map[string]interface{})
  734. sbOptions[netlabel.GenericData] = options.Generic{
  735. "ChildEndpoints": []string{"ep1", "ep4"},
  736. }
  737. err = d.Join("net1", "ep2", "", te2, sbOptions)
  738. if err != nil {
  739. t.Fatal(err)
  740. }
  741. err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
  742. if err != nil {
  743. out, _ = iptable.Raw("-L", DockerChain)
  744. for _, pm := range exposedPorts {
  745. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  746. re := regexp.MustCompile(regex)
  747. matches := re.FindAllString(string(out[:]), -1)
  748. if len(matches) != 0 {
  749. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  750. }
  751. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  752. matched, _ := regexp.MatchString(regex, string(out[:]))
  753. if matched {
  754. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  755. }
  756. }
  757. } else {
  758. t.Fatal("Expected Join to fail given link conditions are not satisfied")
  759. }
  760. }
  761. func TestValidateConfig(t *testing.T) {
  762. defer netnsutils.SetupTestOSContext(t)()
  763. // Test mtu
  764. c := networkConfiguration{Mtu: -2}
  765. err := c.Validate()
  766. if err == nil {
  767. t.Fatal("Failed to detect invalid MTU number")
  768. }
  769. c.Mtu = 9000
  770. err = c.Validate()
  771. if err != nil {
  772. t.Fatal("unexpected validation error on MTU number")
  773. }
  774. // Bridge network
  775. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  776. c = networkConfiguration{
  777. AddressIPv4: network,
  778. }
  779. err = c.Validate()
  780. if err != nil {
  781. t.Fatal(err)
  782. }
  783. // Test v4 gw
  784. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  785. err = c.Validate()
  786. if err == nil {
  787. t.Fatal("Failed to detect invalid default gateway")
  788. }
  789. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  790. err = c.Validate()
  791. if err != nil {
  792. t.Fatal("Unexpected validation error on default gateway")
  793. }
  794. // Test v6 gw
  795. _, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
  796. c = networkConfiguration{
  797. EnableIPv6: true,
  798. AddressIPv6: v6nw,
  799. DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
  800. }
  801. err = c.Validate()
  802. if err == nil {
  803. t.Fatal("Failed to detect invalid v6 default gateway")
  804. }
  805. c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
  806. err = c.Validate()
  807. if err != nil {
  808. t.Fatal("Unexpected validation error on v6 default gateway")
  809. }
  810. c.AddressIPv6 = nil
  811. err = c.Validate()
  812. if err == nil {
  813. t.Fatal("Failed to detect invalid v6 default gateway")
  814. }
  815. c.AddressIPv6 = nil
  816. err = c.Validate()
  817. if err == nil {
  818. t.Fatal("Failed to detect invalid v6 default gateway")
  819. }
  820. }
  821. func TestValidateFixedCIDRV6(t *testing.T) {
  822. tests := []struct {
  823. doc, input, expectedErr string
  824. }{
  825. {
  826. doc: "valid",
  827. input: "2001:db8::/32",
  828. },
  829. {
  830. // fixed-cidr-v6 doesn't have to be specified.
  831. doc: "empty",
  832. },
  833. {
  834. // Using the LL subnet prefix is ok.
  835. doc: "Link-Local subnet prefix",
  836. input: "fe80::/64",
  837. },
  838. {
  839. // Using a nonstandard LL prefix that doesn't overlap with the standard LL prefix
  840. // is ok.
  841. doc: "non-overlapping link-local prefix",
  842. input: "fe80:1234::/80",
  843. },
  844. {
  845. // Overlapping with the standard LL prefix isn't allowed.
  846. doc: "overlapping link-local prefix fe80::/63",
  847. input: "fe80::/63",
  848. expectedErr: "clash with the Link-Local prefix 'fe80::/64'",
  849. },
  850. {
  851. // Overlapping with the standard LL prefix isn't allowed.
  852. doc: "overlapping link-local subnet fe80::/65",
  853. input: "fe80::/65",
  854. expectedErr: "clash with the Link-Local prefix 'fe80::/64'",
  855. },
  856. {
  857. // The address has to be valid IPv6 subnet.
  858. doc: "invalid IPv6 subnet",
  859. input: "2000:db8::",
  860. expectedErr: "invalid CIDR address: 2000:db8::",
  861. },
  862. {
  863. doc: "non-IPv6 subnet",
  864. input: "10.3.4.5/24",
  865. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  866. },
  867. {
  868. doc: "IPv4-mapped subnet 1",
  869. input: "::ffff:10.2.4.0/24",
  870. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  871. },
  872. {
  873. doc: "IPv4-mapped subnet 2",
  874. input: "::ffff:a01:203/24",
  875. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  876. },
  877. {
  878. doc: "invalid subnet",
  879. input: "nonsense",
  880. expectedErr: "invalid CIDR address: nonsense",
  881. },
  882. }
  883. for _, tc := range tests {
  884. tc := tc
  885. t.Run(tc.doc, func(t *testing.T) {
  886. err := ValidateFixedCIDRV6(tc.input)
  887. if tc.expectedErr == "" {
  888. assert.Check(t, err)
  889. } else {
  890. assert.Check(t, is.Error(err, tc.expectedErr))
  891. }
  892. })
  893. }
  894. }
  895. func TestSetDefaultGw(t *testing.T) {
  896. defer netnsutils.SetupTestOSContext(t)()
  897. d := newDriver()
  898. if err := d.configure(nil); err != nil {
  899. t.Fatalf("Failed to setup driver config: %v", err)
  900. }
  901. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  902. ipdList := getIPv4Data(t)
  903. gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
  904. gw4[3] = 254
  905. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  906. config := &networkConfiguration{
  907. BridgeName: DefaultBridgeName,
  908. AddressIPv6: subnetv6,
  909. DefaultGatewayIPv4: gw4,
  910. DefaultGatewayIPv6: gw6,
  911. }
  912. genericOption := make(map[string]interface{})
  913. genericOption[netlabel.EnableIPv6] = true
  914. genericOption[netlabel.GenericData] = config
  915. err := d.CreateNetwork("dummy", genericOption, nil, ipdList, nil)
  916. if err != nil {
  917. t.Fatalf("Failed to create bridge: %v", err)
  918. }
  919. te := newTestEndpoint(ipdList[0].Pool, 10)
  920. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  921. if err != nil {
  922. t.Fatalf("Failed to create endpoint: %v", err)
  923. }
  924. err = d.Join("dummy", "ep", "sbox", te, nil)
  925. if err != nil {
  926. t.Fatalf("Failed to join endpoint: %v", err)
  927. }
  928. if !gw4.Equal(te.gw) {
  929. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  930. }
  931. if !gw6.Equal(te.gw6) {
  932. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  933. }
  934. }
  935. func TestCleanupIptableRules(t *testing.T) {
  936. defer netnsutils.SetupTestOSContext(t)()
  937. bridgeChain := []iptables.ChainInfo{
  938. {Name: DockerChain, Table: iptables.Nat},
  939. {Name: DockerChain, Table: iptables.Filter},
  940. {Name: IsolationChain1, Table: iptables.Filter},
  941. }
  942. ipVersions := []iptables.IPVersion{iptables.IPv4, iptables.IPv6}
  943. for _, version := range ipVersions {
  944. if _, _, _, _, err := setupIPChains(configuration{EnableIPTables: true}, version); err != nil {
  945. t.Fatalf("Error setting up ip chains for %s: %v", version, err)
  946. }
  947. iptable := iptables.GetIptable(version)
  948. for _, chainInfo := range bridgeChain {
  949. if !iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
  950. t.Fatalf("iptables version %s chain %s of %s table should have been created", version, chainInfo.Name, chainInfo.Table)
  951. }
  952. }
  953. removeIPChains(version)
  954. for _, chainInfo := range bridgeChain {
  955. if iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
  956. t.Fatalf("iptables version %s chain %s of %s table should have been deleted", version, chainInfo.Name, chainInfo.Table)
  957. }
  958. }
  959. }
  960. }
  961. func TestCreateWithExistingBridge(t *testing.T) {
  962. defer netnsutils.SetupTestOSContext(t)()
  963. d := newDriver()
  964. if err := d.configure(nil); err != nil {
  965. t.Fatalf("Failed to setup driver config: %v", err)
  966. }
  967. brName := "br111"
  968. br := &netlink.Bridge{
  969. LinkAttrs: netlink.LinkAttrs{
  970. Name: brName,
  971. },
  972. }
  973. if err := netlink.LinkAdd(br); err != nil {
  974. t.Fatalf("Failed to create bridge interface: %v", err)
  975. }
  976. defer netlink.LinkDel(br)
  977. if err := netlink.LinkSetUp(br); err != nil {
  978. t.Fatalf("Failed to set bridge interface up: %v", err)
  979. }
  980. ip := net.IP{192, 168, 122, 1}
  981. addr := &netlink.Addr{IPNet: &net.IPNet{
  982. IP: ip,
  983. Mask: net.IPv4Mask(255, 255, 255, 0),
  984. }}
  985. if err := netlink.AddrAdd(br, addr); err != nil {
  986. t.Fatalf("Failed to add IP address to bridge: %v", err)
  987. }
  988. netconfig := &networkConfiguration{BridgeName: brName}
  989. genericOption := make(map[string]interface{})
  990. genericOption[netlabel.GenericData] = netconfig
  991. ipv4Data := []driverapi.IPAMData{{
  992. AddressSpace: "full",
  993. Pool: types.GetIPNetCopy(addr.IPNet),
  994. Gateway: types.GetIPNetCopy(addr.IPNet),
  995. }}
  996. // Set network gateway to X.X.X.1
  997. ipv4Data[0].Gateway.IP[len(ipv4Data[0].Gateway.IP)-1] = 1
  998. if err := d.CreateNetwork(brName, genericOption, nil, ipv4Data, nil); err != nil {
  999. t.Fatalf("Failed to create bridge network: %v", err)
  1000. }
  1001. nw, err := d.getNetwork(brName)
  1002. if err != nil {
  1003. t.Fatalf("Failed to getNetwork(%s): %v", brName, err)
  1004. }
  1005. addrs4, err := nw.bridge.addresses(netlink.FAMILY_V4)
  1006. if err != nil {
  1007. t.Fatalf("Failed to get the bridge network's address: %v", err)
  1008. }
  1009. if !addrs4[0].IP.Equal(ip) {
  1010. t.Fatal("Creating bridge network with existing bridge interface unexpectedly modified the IP address of the bridge")
  1011. }
  1012. if err := d.DeleteNetwork(brName); err != nil {
  1013. t.Fatalf("Failed to delete network %s: %v", brName, err)
  1014. }
  1015. if _, err := netlink.LinkByName(brName); err != nil {
  1016. t.Fatal("Deleting bridge network that using existing bridge interface unexpectedly deleted the bridge interface")
  1017. }
  1018. }
  1019. func TestCreateParallel(t *testing.T) {
  1020. c := netnsutils.SetupTestOSContextEx(t)
  1021. defer c.Cleanup(t)
  1022. d := newDriver()
  1023. d.portAllocator = portallocator.NewInstance()
  1024. if err := d.configure(nil); err != nil {
  1025. t.Fatalf("Failed to setup driver config: %v", err)
  1026. }
  1027. ipV4Data := getIPv4Data(t)
  1028. ch := make(chan error, 100)
  1029. for i := 0; i < 100; i++ {
  1030. name := "net" + strconv.Itoa(i)
  1031. c.Go(t, func() {
  1032. config := &networkConfiguration{BridgeName: name}
  1033. genericOption := make(map[string]interface{})
  1034. genericOption[netlabel.GenericData] = config
  1035. if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err != nil {
  1036. ch <- fmt.Errorf("failed to create %s", name)
  1037. return
  1038. }
  1039. if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err == nil {
  1040. ch <- fmt.Errorf("failed was able to create overlap %s", name)
  1041. return
  1042. }
  1043. ch <- nil
  1044. })
  1045. }
  1046. // wait for the go routines
  1047. var success int
  1048. for i := 0; i < 100; i++ {
  1049. val := <-ch
  1050. if val == nil {
  1051. success++
  1052. }
  1053. }
  1054. if success != 1 {
  1055. t.Fatalf("Success should be 1 instead: %d", success)
  1056. }
  1057. }