driver_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558
  1. package remote
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "io/ioutil"
  6. "net"
  7. "net/http"
  8. "net/http/httptest"
  9. "os"
  10. "testing"
  11. "github.com/docker/docker/pkg/plugins"
  12. "github.com/docker/libnetwork/datastore"
  13. "github.com/docker/libnetwork/driverapi"
  14. _ "github.com/docker/libnetwork/testutils"
  15. "github.com/docker/libnetwork/types"
  16. )
  17. func decodeToMap(r *http.Request) (res map[string]interface{}, err error) {
  18. err = json.NewDecoder(r.Body).Decode(&res)
  19. return
  20. }
  21. func handle(t *testing.T, mux *http.ServeMux, method string, h func(map[string]interface{}) interface{}) {
  22. mux.HandleFunc(fmt.Sprintf("/%s.%s", driverapi.NetworkPluginEndpointType, method), func(w http.ResponseWriter, r *http.Request) {
  23. ask, err := decodeToMap(r)
  24. if err != nil {
  25. t.Fatal(err)
  26. }
  27. answer := h(ask)
  28. err = json.NewEncoder(w).Encode(&answer)
  29. if err != nil {
  30. t.Fatal(err)
  31. }
  32. })
  33. }
  34. func setupPlugin(t *testing.T, name string, mux *http.ServeMux) func() {
  35. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  36. t.Fatal(err)
  37. }
  38. server := httptest.NewServer(mux)
  39. if server == nil {
  40. t.Fatal("Failed to start a HTTP Server")
  41. }
  42. if err := ioutil.WriteFile(fmt.Sprintf("/etc/docker/plugins/%s.spec", name), []byte(server.URL), 0644); err != nil {
  43. t.Fatal(err)
  44. }
  45. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  46. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  47. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  48. })
  49. return func() {
  50. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  51. t.Fatal(err)
  52. }
  53. server.Close()
  54. }
  55. }
  56. type testEndpoint struct {
  57. t *testing.T
  58. src string
  59. dst string
  60. address string
  61. addressIPv6 string
  62. macAddress string
  63. gateway string
  64. gatewayIPv6 string
  65. resolvConfPath string
  66. hostsPath string
  67. nextHop string
  68. destination string
  69. routeType int
  70. disableGatewayService bool
  71. }
  72. func (test *testEndpoint) Interface() driverapi.InterfaceInfo {
  73. return test
  74. }
  75. func (test *testEndpoint) Address() *net.IPNet {
  76. if test.address == "" {
  77. return nil
  78. }
  79. nw, _ := types.ParseCIDR(test.address)
  80. return nw
  81. }
  82. func (test *testEndpoint) AddressIPv6() *net.IPNet {
  83. if test.addressIPv6 == "" {
  84. return nil
  85. }
  86. nw, _ := types.ParseCIDR(test.addressIPv6)
  87. return nw
  88. }
  89. func (test *testEndpoint) MacAddress() net.HardwareAddr {
  90. if test.macAddress == "" {
  91. return nil
  92. }
  93. mac, _ := net.ParseMAC(test.macAddress)
  94. return mac
  95. }
  96. func (test *testEndpoint) SetMacAddress(mac net.HardwareAddr) error {
  97. if test.macAddress != "" {
  98. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", test.macAddress, mac)
  99. }
  100. if mac == nil {
  101. return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
  102. }
  103. test.macAddress = mac.String()
  104. return nil
  105. }
  106. func (test *testEndpoint) SetIPAddress(address *net.IPNet) error {
  107. if address.IP == nil {
  108. return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
  109. }
  110. if address.IP.To4() == nil {
  111. return setAddress(&test.addressIPv6, address)
  112. }
  113. return setAddress(&test.address, address)
  114. }
  115. func setAddress(ifaceAddr *string, address *net.IPNet) error {
  116. if *ifaceAddr != "" {
  117. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  118. }
  119. *ifaceAddr = address.String()
  120. return nil
  121. }
  122. func (test *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  123. return test
  124. }
  125. func compareIPs(t *testing.T, kind string, shouldBe string, supplied net.IP) {
  126. ip := net.ParseIP(shouldBe)
  127. if ip == nil {
  128. t.Fatalf(`Invalid IP to test against: "%s"`, shouldBe)
  129. }
  130. if !ip.Equal(supplied) {
  131. t.Fatalf(`%s IPs are not equal: expected "%s", got %v`, kind, shouldBe, supplied)
  132. }
  133. }
  134. func compareIPNets(t *testing.T, kind string, shouldBe string, supplied net.IPNet) {
  135. _, net, _ := net.ParseCIDR(shouldBe)
  136. if net == nil {
  137. t.Fatalf(`Invalid IP network to test against: "%s"`, shouldBe)
  138. }
  139. if !types.CompareIPNet(net, &supplied) {
  140. t.Fatalf(`%s IP networks are not equal: expected "%s", got %v`, kind, shouldBe, supplied)
  141. }
  142. }
  143. func (test *testEndpoint) SetGateway(ipv4 net.IP) error {
  144. compareIPs(test.t, "Gateway", test.gateway, ipv4)
  145. return nil
  146. }
  147. func (test *testEndpoint) SetGatewayIPv6(ipv6 net.IP) error {
  148. compareIPs(test.t, "GatewayIPv6", test.gatewayIPv6, ipv6)
  149. return nil
  150. }
  151. func (test *testEndpoint) SetNames(src string, dst string) error {
  152. if test.src != src {
  153. test.t.Fatalf(`Wrong SrcName; expected "%s", got "%s"`, test.src, src)
  154. }
  155. if test.dst != dst {
  156. test.t.Fatalf(`Wrong DstPrefix; expected "%s", got "%s"`, test.dst, dst)
  157. }
  158. return nil
  159. }
  160. func (test *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  161. compareIPNets(test.t, "Destination", test.destination, *destination)
  162. compareIPs(test.t, "NextHop", test.nextHop, nextHop)
  163. if test.routeType != routeType {
  164. test.t.Fatalf(`Wrong RouteType; expected "%d", got "%d"`, test.routeType, routeType)
  165. }
  166. return nil
  167. }
  168. func (test *testEndpoint) DisableGatewayService() {
  169. test.disableGatewayService = true
  170. }
  171. func TestGetEmptyCapabilities(t *testing.T) {
  172. var plugin = "test-net-driver-empty-cap"
  173. mux := http.NewServeMux()
  174. defer setupPlugin(t, plugin, mux)()
  175. handle(t, mux, "GetCapabilities", func(msg map[string]interface{}) interface{} {
  176. return map[string]interface{}{}
  177. })
  178. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  179. if err != nil {
  180. t.Fatal(err)
  181. }
  182. d := newDriver(plugin, p.Client)
  183. if d.Type() != plugin {
  184. t.Fatal("Driver type does not match that given")
  185. }
  186. _, err = d.(*driver).getCapabilities()
  187. if err == nil {
  188. t.Fatal("There should be error reported when get empty capability")
  189. }
  190. }
  191. func TestGetExtraCapabilities(t *testing.T) {
  192. var plugin = "test-net-driver-extra-cap"
  193. mux := http.NewServeMux()
  194. defer setupPlugin(t, plugin, mux)()
  195. handle(t, mux, "GetCapabilities", func(msg map[string]interface{}) interface{} {
  196. return map[string]interface{}{
  197. "Scope": "local",
  198. "foo": "bar",
  199. }
  200. })
  201. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  202. if err != nil {
  203. t.Fatal(err)
  204. }
  205. d := newDriver(plugin, p.Client)
  206. if d.Type() != plugin {
  207. t.Fatal("Driver type does not match that given")
  208. }
  209. c, err := d.(*driver).getCapabilities()
  210. if err != nil {
  211. t.Fatal(err)
  212. } else if c.DataScope != datastore.LocalScope {
  213. t.Fatalf("get capability '%s', expecting 'local'", c.DataScope)
  214. }
  215. }
  216. func TestGetInvalidCapabilities(t *testing.T) {
  217. var plugin = "test-net-driver-invalid-cap"
  218. mux := http.NewServeMux()
  219. defer setupPlugin(t, plugin, mux)()
  220. handle(t, mux, "GetCapabilities", func(msg map[string]interface{}) interface{} {
  221. return map[string]interface{}{
  222. "Scope": "fake",
  223. }
  224. })
  225. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  226. if err != nil {
  227. t.Fatal(err)
  228. }
  229. d := newDriver(plugin, p.Client)
  230. if d.Type() != plugin {
  231. t.Fatal("Driver type does not match that given")
  232. }
  233. _, err = d.(*driver).getCapabilities()
  234. if err == nil {
  235. t.Fatal("There should be error reported when get invalid capability")
  236. }
  237. }
  238. func TestRemoteDriver(t *testing.T) {
  239. var plugin = "test-net-driver"
  240. ep := &testEndpoint{
  241. t: t,
  242. src: "vethsrc",
  243. dst: "vethdst",
  244. address: "192.168.5.7/16",
  245. addressIPv6: "2001:DB8::5:7/48",
  246. macAddress: "",
  247. gateway: "192.168.0.1",
  248. gatewayIPv6: "2001:DB8::1",
  249. hostsPath: "/here/comes/the/host/path",
  250. resolvConfPath: "/there/goes/the/resolv/conf",
  251. destination: "10.0.0.0/8",
  252. nextHop: "10.0.0.1",
  253. routeType: 1,
  254. }
  255. mux := http.NewServeMux()
  256. defer setupPlugin(t, plugin, mux)()
  257. var networkID string
  258. handle(t, mux, "GetCapabilities", func(msg map[string]interface{}) interface{} {
  259. return map[string]interface{}{
  260. "Scope": "global",
  261. }
  262. })
  263. handle(t, mux, "CreateNetwork", func(msg map[string]interface{}) interface{} {
  264. nid := msg["NetworkID"]
  265. var ok bool
  266. if networkID, ok = nid.(string); !ok {
  267. t.Fatal("RPC did not include network ID string")
  268. }
  269. return map[string]interface{}{}
  270. })
  271. handle(t, mux, "DeleteNetwork", func(msg map[string]interface{}) interface{} {
  272. if nid, ok := msg["NetworkID"]; !ok || nid != networkID {
  273. t.Fatal("Network ID missing or does not match that created")
  274. }
  275. return map[string]interface{}{}
  276. })
  277. handle(t, mux, "CreateEndpoint", func(msg map[string]interface{}) interface{} {
  278. iface := map[string]interface{}{
  279. "MacAddress": ep.macAddress,
  280. }
  281. return map[string]interface{}{
  282. "Interface": iface,
  283. }
  284. })
  285. handle(t, mux, "Join", func(msg map[string]interface{}) interface{} {
  286. options := msg["Options"].(map[string]interface{})
  287. foo, ok := options["foo"].(string)
  288. if !ok || foo != "fooValue" {
  289. t.Fatalf("Did not receive expected foo string in request options: %+v", msg)
  290. }
  291. return map[string]interface{}{
  292. "Gateway": ep.gateway,
  293. "GatewayIPv6": ep.gatewayIPv6,
  294. "HostsPath": ep.hostsPath,
  295. "ResolvConfPath": ep.resolvConfPath,
  296. "InterfaceName": map[string]interface{}{
  297. "SrcName": ep.src,
  298. "DstPrefix": ep.dst,
  299. },
  300. "StaticRoutes": []map[string]interface{}{
  301. {
  302. "Destination": ep.destination,
  303. "RouteType": ep.routeType,
  304. "NextHop": ep.nextHop,
  305. },
  306. },
  307. }
  308. })
  309. handle(t, mux, "Leave", func(msg map[string]interface{}) interface{} {
  310. return map[string]string{}
  311. })
  312. handle(t, mux, "DeleteEndpoint", func(msg map[string]interface{}) interface{} {
  313. return map[string]interface{}{}
  314. })
  315. handle(t, mux, "EndpointOperInfo", func(msg map[string]interface{}) interface{} {
  316. return map[string]interface{}{
  317. "Value": map[string]string{
  318. "Arbitrary": "key",
  319. "Value": "pairs?",
  320. },
  321. }
  322. })
  323. handle(t, mux, "DiscoverNew", func(msg map[string]interface{}) interface{} {
  324. return map[string]string{}
  325. })
  326. handle(t, mux, "DiscoverDelete", func(msg map[string]interface{}) interface{} {
  327. return map[string]interface{}{}
  328. })
  329. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  330. if err != nil {
  331. t.Fatal(err)
  332. }
  333. d := newDriver(plugin, p.Client)
  334. if d.Type() != plugin {
  335. t.Fatal("Driver type does not match that given")
  336. }
  337. c, err := d.(*driver).getCapabilities()
  338. if err != nil {
  339. t.Fatal(err)
  340. } else if c.DataScope != datastore.GlobalScope {
  341. t.Fatalf("get capability '%s', expecting 'global'", c.DataScope)
  342. }
  343. netID := "dummy-network"
  344. err = d.CreateNetwork(netID, map[string]interface{}{}, nil, nil)
  345. if err != nil {
  346. t.Fatal(err)
  347. }
  348. endID := "dummy-endpoint"
  349. err = d.CreateEndpoint(netID, endID, ep, map[string]interface{}{})
  350. if err != nil {
  351. t.Fatal(err)
  352. }
  353. joinOpts := map[string]interface{}{"foo": "fooValue"}
  354. err = d.Join(netID, endID, "sandbox-key", ep, joinOpts)
  355. if err != nil {
  356. t.Fatal(err)
  357. }
  358. if _, err = d.EndpointOperInfo(netID, endID); err != nil {
  359. t.Fatal(err)
  360. }
  361. if err = d.Leave(netID, endID); err != nil {
  362. t.Fatal(err)
  363. }
  364. if err = d.DeleteEndpoint(netID, endID); err != nil {
  365. t.Fatal(err)
  366. }
  367. if err = d.DeleteNetwork(netID); err != nil {
  368. t.Fatal(err)
  369. }
  370. data := driverapi.NodeDiscoveryData{
  371. Address: "192.168.1.1",
  372. }
  373. if err = d.DiscoverNew(driverapi.NodeDiscovery, data); err != nil {
  374. t.Fatal(err)
  375. }
  376. if err = d.DiscoverDelete(driverapi.NodeDiscovery, data); err != nil {
  377. t.Fatal(err)
  378. }
  379. }
  380. func TestDriverError(t *testing.T) {
  381. var plugin = "test-net-driver-error"
  382. mux := http.NewServeMux()
  383. defer setupPlugin(t, plugin, mux)()
  384. handle(t, mux, "CreateEndpoint", func(msg map[string]interface{}) interface{} {
  385. return map[string]interface{}{
  386. "Err": "this should get raised as an error",
  387. }
  388. })
  389. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  390. if err != nil {
  391. t.Fatal(err)
  392. }
  393. driver := newDriver(plugin, p.Client)
  394. if err := driver.CreateEndpoint("dummy", "dummy", &testEndpoint{t: t}, map[string]interface{}{}); err == nil {
  395. t.Fatalf("Expected error from driver")
  396. }
  397. }
  398. func TestMissingValues(t *testing.T) {
  399. var plugin = "test-net-driver-missing"
  400. mux := http.NewServeMux()
  401. defer setupPlugin(t, plugin, mux)()
  402. ep := &testEndpoint{
  403. t: t,
  404. }
  405. handle(t, mux, "CreateEndpoint", func(msg map[string]interface{}) interface{} {
  406. iface := map[string]interface{}{
  407. "Address": ep.address,
  408. "AddressIPv6": ep.addressIPv6,
  409. "MacAddress": ep.macAddress,
  410. }
  411. return map[string]interface{}{
  412. "Interface": iface,
  413. }
  414. })
  415. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  416. if err != nil {
  417. t.Fatal(err)
  418. }
  419. driver := newDriver(plugin, p.Client)
  420. if err := driver.CreateEndpoint("dummy", "dummy", ep, map[string]interface{}{}); err != nil {
  421. t.Fatal(err)
  422. }
  423. }
  424. type rollbackEndpoint struct {
  425. }
  426. func (r *rollbackEndpoint) Interface() driverapi.InterfaceInfo {
  427. return r
  428. }
  429. func (r *rollbackEndpoint) MacAddress() net.HardwareAddr {
  430. return nil
  431. }
  432. func (r *rollbackEndpoint) Address() *net.IPNet {
  433. return nil
  434. }
  435. func (r *rollbackEndpoint) AddressIPv6() *net.IPNet {
  436. return nil
  437. }
  438. func (r *rollbackEndpoint) SetMacAddress(mac net.HardwareAddr) error {
  439. return fmt.Errorf("invalid mac")
  440. }
  441. func (r *rollbackEndpoint) SetIPAddress(ip *net.IPNet) error {
  442. return fmt.Errorf("invalid ip")
  443. }
  444. func TestRollback(t *testing.T) {
  445. var plugin = "test-net-driver-rollback"
  446. mux := http.NewServeMux()
  447. defer setupPlugin(t, plugin, mux)()
  448. rolledback := false
  449. handle(t, mux, "CreateEndpoint", func(msg map[string]interface{}) interface{} {
  450. iface := map[string]interface{}{
  451. "Address": "192.168.4.5/16",
  452. "AddressIPv6": "",
  453. "MacAddress": "7a:12:34:56:78:90",
  454. }
  455. return map[string]interface{}{
  456. "Interface": interface{}(iface),
  457. }
  458. })
  459. handle(t, mux, "DeleteEndpoint", func(msg map[string]interface{}) interface{} {
  460. rolledback = true
  461. return map[string]interface{}{}
  462. })
  463. p, err := plugins.Get(plugin, driverapi.NetworkPluginEndpointType)
  464. if err != nil {
  465. t.Fatal(err)
  466. }
  467. driver := newDriver(plugin, p.Client)
  468. ep := &rollbackEndpoint{}
  469. if err := driver.CreateEndpoint("dummy", "dummy", ep.Interface(), map[string]interface{}{}); err == nil {
  470. t.Fatalf("Expected error from driver")
  471. }
  472. if !rolledback {
  473. t.Fatalf("Expected to have had DeleteEndpoint called")
  474. }
  475. }